<?xml version="1.0" encoding="UTF-8"?>
	<oval_definitions
		xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
		xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
		xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
		xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
		xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
	  <generator>
	      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
	      <oval:schema_version>5.5</oval:schema_version>
	      <oval:timestamp>2022-05-20T06:26:47</oval:timestamp>
	  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:75679" version="1" class="patch">
	<metadata>
		<title>ImageMagick-6.8.8.1-5.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2012-0247" ref_url="https://www.suse.com/security/cve/CVE-2012-0247/" source="CVE"/>
		<reference ref_id="CVE-2012-0248" ref_url="https://www.suse.com/security/cve/CVE-2012-0248/" source="CVE"/>
		<reference ref_id="CVE-2012-1185" ref_url="https://www.suse.com/security/cve/CVE-2012-1185/" source="CVE"/>
		<reference ref_id="CVE-2012-1186" ref_url="https://www.suse.com/security/cve/CVE-2012-1186/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-6.8.8.1-5.21 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0247/">CVE-2012-0247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0248/">CVE-2012-0248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1185/">CVE-2012-1185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1186/">CVE-2012-1186</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141196" comment="ImageMagick-6.8.8.1-5.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141197" comment="libMagick++-6_Q16-3-6.8.8.1-5.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141198" comment="libMagickCore-6_Q16-1-6.8.8.1-5.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141199" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-5.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141200" comment="libMagickWand-6_Q16-1-6.8.8.1-5.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75680" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-31.1.0esr-1.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2008-5913" ref_url="https://www.suse.com/security/cve/CVE-2008-5913/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-0652" ref_url="https://www.suse.com/security/cve/CVE-2009-0652/" source="CVE"/>
		<reference ref_id="CVE-2009-0771" ref_url="https://www.suse.com/security/cve/CVE-2009-0771/" source="CVE"/>
		<reference ref_id="CVE-2009-0772" ref_url="https://www.suse.com/security/cve/CVE-2009-0772/" source="CVE"/>
		<reference ref_id="CVE-2009-0773" ref_url="https://www.suse.com/security/cve/CVE-2009-0773/" source="CVE"/>
		<reference ref_id="CVE-2009-0774" ref_url="https://www.suse.com/security/cve/CVE-2009-0774/" source="CVE"/>
		<reference ref_id="CVE-2009-0775" ref_url="https://www.suse.com/security/cve/CVE-2009-0775/" source="CVE"/>
		<reference ref_id="CVE-2009-0776" ref_url="https://www.suse.com/security/cve/CVE-2009-0776/" source="CVE"/>
		<reference ref_id="CVE-2009-0777" ref_url="https://www.suse.com/security/cve/CVE-2009-0777/" source="CVE"/>
		<reference ref_id="CVE-2009-1044" ref_url="https://www.suse.com/security/cve/CVE-2009-1044/" source="CVE"/>
		<reference ref_id="CVE-2009-1169" ref_url="https://www.suse.com/security/cve/CVE-2009-1169/" source="CVE"/>
		<reference ref_id="CVE-2009-1302" ref_url="https://www.suse.com/security/cve/CVE-2009-1302/" source="CVE"/>
		<reference ref_id="CVE-2009-1303" ref_url="https://www.suse.com/security/cve/CVE-2009-1303/" source="CVE"/>
		<reference ref_id="CVE-2009-1304" ref_url="https://www.suse.com/security/cve/CVE-2009-1304/" source="CVE"/>
		<reference ref_id="CVE-2009-1305" ref_url="https://www.suse.com/security/cve/CVE-2009-1305/" source="CVE"/>
		<reference ref_id="CVE-2009-1306" ref_url="https://www.suse.com/security/cve/CVE-2009-1306/" source="CVE"/>
		<reference ref_id="CVE-2009-1307" ref_url="https://www.suse.com/security/cve/CVE-2009-1307/" source="CVE"/>
		<reference ref_id="CVE-2009-1308" ref_url="https://www.suse.com/security/cve/CVE-2009-1308/" source="CVE"/>
		<reference ref_id="CVE-2009-1309" ref_url="https://www.suse.com/security/cve/CVE-2009-1309/" source="CVE"/>
		<reference ref_id="CVE-2009-1310" ref_url="https://www.suse.com/security/cve/CVE-2009-1310/" source="CVE"/>
		<reference ref_id="CVE-2009-1311" ref_url="https://www.suse.com/security/cve/CVE-2009-1311/" source="CVE"/>
		<reference ref_id="CVE-2009-1312" ref_url="https://www.suse.com/security/cve/CVE-2009-1312/" source="CVE"/>
		<reference ref_id="CVE-2009-1313" ref_url="https://www.suse.com/security/cve/CVE-2009-1313/" source="CVE"/>
		<reference ref_id="CVE-2009-1563" ref_url="https://www.suse.com/security/cve/CVE-2009-1563/" source="CVE"/>
		<reference ref_id="CVE-2009-2470" ref_url="https://www.suse.com/security/cve/CVE-2009-2470/" source="CVE"/>
		<reference ref_id="CVE-2009-2654" ref_url="https://www.suse.com/security/cve/CVE-2009-2654/" source="CVE"/>
		<reference ref_id="CVE-2009-3069" ref_url="https://www.suse.com/security/cve/CVE-2009-3069/" source="CVE"/>
		<reference ref_id="CVE-2009-3070" ref_url="https://www.suse.com/security/cve/CVE-2009-3070/" source="CVE"/>
		<reference ref_id="CVE-2009-3071" ref_url="https://www.suse.com/security/cve/CVE-2009-3071/" source="CVE"/>
		<reference ref_id="CVE-2009-3072" ref_url="https://www.suse.com/security/cve/CVE-2009-3072/" source="CVE"/>
		<reference ref_id="CVE-2009-3073" ref_url="https://www.suse.com/security/cve/CVE-2009-3073/" source="CVE"/>
		<reference ref_id="CVE-2009-3074" ref_url="https://www.suse.com/security/cve/CVE-2009-3074/" source="CVE"/>
		<reference ref_id="CVE-2009-3075" ref_url="https://www.suse.com/security/cve/CVE-2009-3075/" source="CVE"/>
		<reference ref_id="CVE-2009-3077" ref_url="https://www.suse.com/security/cve/CVE-2009-3077/" source="CVE"/>
		<reference ref_id="CVE-2009-3078" ref_url="https://www.suse.com/security/cve/CVE-2009-3078/" source="CVE"/>
		<reference ref_id="CVE-2009-3079" ref_url="https://www.suse.com/security/cve/CVE-2009-3079/" source="CVE"/>
		<reference ref_id="CVE-2009-3274" ref_url="https://www.suse.com/security/cve/CVE-2009-3274/" source="CVE"/>
		<reference ref_id="CVE-2009-3370" ref_url="https://www.suse.com/security/cve/CVE-2009-3370/" source="CVE"/>
		<reference ref_id="CVE-2009-3371" ref_url="https://www.suse.com/security/cve/CVE-2009-3371/" source="CVE"/>
		<reference ref_id="CVE-2009-3372" ref_url="https://www.suse.com/security/cve/CVE-2009-3372/" source="CVE"/>
		<reference ref_id="CVE-2009-3373" ref_url="https://www.suse.com/security/cve/CVE-2009-3373/" source="CVE"/>
		<reference ref_id="CVE-2009-3374" ref_url="https://www.suse.com/security/cve/CVE-2009-3374/" source="CVE"/>
		<reference ref_id="CVE-2009-3375" ref_url="https://www.suse.com/security/cve/CVE-2009-3375/" source="CVE"/>
		<reference ref_id="CVE-2009-3376" ref_url="https://www.suse.com/security/cve/CVE-2009-3376/" source="CVE"/>
		<reference ref_id="CVE-2009-3377" ref_url="https://www.suse.com/security/cve/CVE-2009-3377/" source="CVE"/>
		<reference ref_id="CVE-2009-3378" ref_url="https://www.suse.com/security/cve/CVE-2009-3378/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2009-3380" ref_url="https://www.suse.com/security/cve/CVE-2009-3380/" source="CVE"/>
		<reference ref_id="CVE-2009-3381" ref_url="https://www.suse.com/security/cve/CVE-2009-3381/" source="CVE"/>
		<reference ref_id="CVE-2009-3383" ref_url="https://www.suse.com/security/cve/CVE-2009-3383/" source="CVE"/>
		<reference ref_id="CVE-2009-3388" ref_url="https://www.suse.com/security/cve/CVE-2009-3388/" source="CVE"/>
		<reference ref_id="CVE-2009-3389" ref_url="https://www.suse.com/security/cve/CVE-2009-3389/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-3979" ref_url="https://www.suse.com/security/cve/CVE-2009-3979/" source="CVE"/>
		<reference ref_id="CVE-2009-3980" ref_url="https://www.suse.com/security/cve/CVE-2009-3980/" source="CVE"/>
		<reference ref_id="CVE-2009-3982" ref_url="https://www.suse.com/security/cve/CVE-2009-3982/" source="CVE"/>
		<reference ref_id="CVE-2009-3983" ref_url="https://www.suse.com/security/cve/CVE-2009-3983/" source="CVE"/>
		<reference ref_id="CVE-2009-3984" ref_url="https://www.suse.com/security/cve/CVE-2009-3984/" source="CVE"/>
		<reference ref_id="CVE-2009-3985" ref_url="https://www.suse.com/security/cve/CVE-2009-3985/" source="CVE"/>
		<reference ref_id="CVE-2010-0164" ref_url="https://www.suse.com/security/cve/CVE-2010-0164/" source="CVE"/>
		<reference ref_id="CVE-2010-0165" ref_url="https://www.suse.com/security/cve/CVE-2010-0165/" source="CVE"/>
		<reference ref_id="CVE-2010-0166" ref_url="https://www.suse.com/security/cve/CVE-2010-0166/" source="CVE"/>
		<reference ref_id="CVE-2010-0167" ref_url="https://www.suse.com/security/cve/CVE-2010-0167/" source="CVE"/>
		<reference ref_id="CVE-2010-0168" ref_url="https://www.suse.com/security/cve/CVE-2010-0168/" source="CVE"/>
		<reference ref_id="CVE-2010-0169" ref_url="https://www.suse.com/security/cve/CVE-2010-0169/" source="CVE"/>
		<reference ref_id="CVE-2010-0170" ref_url="https://www.suse.com/security/cve/CVE-2010-0170/" source="CVE"/>
		<reference ref_id="CVE-2010-0171" ref_url="https://www.suse.com/security/cve/CVE-2010-0171/" source="CVE"/>
		<reference ref_id="CVE-2010-0172" ref_url="https://www.suse.com/security/cve/CVE-2010-0172/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181/" source="CVE"/>
		<reference ref_id="CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182/" source="CVE"/>
		<reference ref_id="CVE-2010-0654" ref_url="https://www.suse.com/security/cve/CVE-2010-0654/" source="CVE"/>
		<reference ref_id="CVE-2010-1028" ref_url="https://www.suse.com/security/cve/CVE-2010-1028/" source="CVE"/>
		<reference ref_id="CVE-2010-1121" ref_url="https://www.suse.com/security/cve/CVE-2010-1121/" source="CVE"/>
		<reference ref_id="CVE-2010-1125" ref_url="https://www.suse.com/security/cve/CVE-2010-1125/" source="CVE"/>
		<reference ref_id="CVE-2010-1196" ref_url="https://www.suse.com/security/cve/CVE-2010-1196/" source="CVE"/>
		<reference ref_id="CVE-2010-1197" ref_url="https://www.suse.com/security/cve/CVE-2010-1197/" source="CVE"/>
		<reference ref_id="CVE-2010-1198" ref_url="https://www.suse.com/security/cve/CVE-2010-1198/" source="CVE"/>
		<reference ref_id="CVE-2010-1199" ref_url="https://www.suse.com/security/cve/CVE-2010-1199/" source="CVE"/>
		<reference ref_id="CVE-2010-1200" ref_url="https://www.suse.com/security/cve/CVE-2010-1200/" source="CVE"/>
		<reference ref_id="CVE-2010-1201" ref_url="https://www.suse.com/security/cve/CVE-2010-1201/" source="CVE"/>
		<reference ref_id="CVE-2010-1202" ref_url="https://www.suse.com/security/cve/CVE-2010-1202/" source="CVE"/>
		<reference ref_id="CVE-2010-1203" ref_url="https://www.suse.com/security/cve/CVE-2010-1203/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-1206" ref_url="https://www.suse.com/security/cve/CVE-2010-1206/" source="CVE"/>
		<reference ref_id="CVE-2010-1207" ref_url="https://www.suse.com/security/cve/CVE-2010-1207/" source="CVE"/>
		<reference ref_id="CVE-2010-1208" ref_url="https://www.suse.com/security/cve/CVE-2010-1208/" source="CVE"/>
		<reference ref_id="CVE-2010-1209" ref_url="https://www.suse.com/security/cve/CVE-2010-1209/" source="CVE"/>
		<reference ref_id="CVE-2010-1210" ref_url="https://www.suse.com/security/cve/CVE-2010-1210/" source="CVE"/>
		<reference ref_id="CVE-2010-1211" ref_url="https://www.suse.com/security/cve/CVE-2010-1211/" source="CVE"/>
		<reference ref_id="CVE-2010-1212" ref_url="https://www.suse.com/security/cve/CVE-2010-1212/" source="CVE"/>
		<reference ref_id="CVE-2010-1213" ref_url="https://www.suse.com/security/cve/CVE-2010-1213/" source="CVE"/>
		<reference ref_id="CVE-2010-1214" ref_url="https://www.suse.com/security/cve/CVE-2010-1214/" source="CVE"/>
		<reference ref_id="CVE-2010-1215" ref_url="https://www.suse.com/security/cve/CVE-2010-1215/" source="CVE"/>
		<reference ref_id="CVE-2010-2751" ref_url="https://www.suse.com/security/cve/CVE-2010-2751/" source="CVE"/>
		<reference ref_id="CVE-2010-2752" ref_url="https://www.suse.com/security/cve/CVE-2010-2752/" source="CVE"/>
		<reference ref_id="CVE-2010-2753" ref_url="https://www.suse.com/security/cve/CVE-2010-2753/" source="CVE"/>
		<reference ref_id="CVE-2010-2754" ref_url="https://www.suse.com/security/cve/CVE-2010-2754/" source="CVE"/>
		<reference ref_id="CVE-2010-2755" ref_url="https://www.suse.com/security/cve/CVE-2010-2755/" source="CVE"/>
		<reference ref_id="CVE-2010-2760" ref_url="https://www.suse.com/security/cve/CVE-2010-2760/" source="CVE"/>
		<reference ref_id="CVE-2010-2762" ref_url="https://www.suse.com/security/cve/CVE-2010-2762/" source="CVE"/>
		<reference ref_id="CVE-2010-2764" ref_url="https://www.suse.com/security/cve/CVE-2010-2764/" source="CVE"/>
		<reference ref_id="CVE-2010-2765" ref_url="https://www.suse.com/security/cve/CVE-2010-2765/" source="CVE"/>
		<reference ref_id="CVE-2010-2766" ref_url="https://www.suse.com/security/cve/CVE-2010-2766/" source="CVE"/>
		<reference ref_id="CVE-2010-2767" ref_url="https://www.suse.com/security/cve/CVE-2010-2767/" source="CVE"/>
		<reference ref_id="CVE-2010-2768" ref_url="https://www.suse.com/security/cve/CVE-2010-2768/" source="CVE"/>
		<reference ref_id="CVE-2010-2769" ref_url="https://www.suse.com/security/cve/CVE-2010-2769/" source="CVE"/>
		<reference ref_id="CVE-2010-3166" ref_url="https://www.suse.com/security/cve/CVE-2010-3166/" source="CVE"/>
		<reference ref_id="CVE-2010-3167" ref_url="https://www.suse.com/security/cve/CVE-2010-3167/" source="CVE"/>
		<reference ref_id="CVE-2010-3168" ref_url="https://www.suse.com/security/cve/CVE-2010-3168/" source="CVE"/>
		<reference ref_id="CVE-2010-3169" ref_url="https://www.suse.com/security/cve/CVE-2010-3169/" source="CVE"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2010-3173" ref_url="https://www.suse.com/security/cve/CVE-2010-3173/" source="CVE"/>
		<reference ref_id="CVE-2010-3174" ref_url="https://www.suse.com/security/cve/CVE-2010-3174/" source="CVE"/>
		<reference ref_id="CVE-2010-3175" ref_url="https://www.suse.com/security/cve/CVE-2010-3175/" source="CVE"/>
		<reference ref_id="CVE-2010-3176" ref_url="https://www.suse.com/security/cve/CVE-2010-3176/" source="CVE"/>
		<reference ref_id="CVE-2010-3177" ref_url="https://www.suse.com/security/cve/CVE-2010-3177/" source="CVE"/>
		<reference ref_id="CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178/" source="CVE"/>
		<reference ref_id="CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179/" source="CVE"/>
		<reference ref_id="CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180/" source="CVE"/>
		<reference ref_id="CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182/" source="CVE"/>
		<reference ref_id="CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183/" source="CVE"/>
		<reference ref_id="CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765/" source="CVE"/>
		<reference ref_id="CVE-2011-0068" ref_url="https://www.suse.com/security/cve/CVE-2011-0068/" source="CVE"/>
		<reference ref_id="CVE-2011-0069" ref_url="https://www.suse.com/security/cve/CVE-2011-0069/" source="CVE"/>
		<reference ref_id="CVE-2011-0070" ref_url="https://www.suse.com/security/cve/CVE-2011-0070/" source="CVE"/>
		<reference ref_id="CVE-2011-0079" ref_url="https://www.suse.com/security/cve/CVE-2011-0079/" source="CVE"/>
		<reference ref_id="CVE-2011-0080" ref_url="https://www.suse.com/security/cve/CVE-2011-0080/" source="CVE"/>
		<reference ref_id="CVE-2011-0081" ref_url="https://www.suse.com/security/cve/CVE-2011-0081/" source="CVE"/>
		<reference ref_id="CVE-2011-0084" ref_url="https://www.suse.com/security/cve/CVE-2011-0084/" source="CVE"/>
		<reference ref_id="CVE-2011-1187" ref_url="https://www.suse.com/security/cve/CVE-2011-1187/" source="CVE"/>
		<reference ref_id="CVE-2011-1202" ref_url="https://www.suse.com/security/cve/CVE-2011-1202/" source="CVE"/>
		<reference ref_id="CVE-2011-2366" ref_url="https://www.suse.com/security/cve/CVE-2011-2366/" source="CVE"/>
		<reference ref_id="CVE-2011-2367" ref_url="https://www.suse.com/security/cve/CVE-2011-2367/" source="CVE"/>
		<reference ref_id="CVE-2011-2368" ref_url="https://www.suse.com/security/cve/CVE-2011-2368/" source="CVE"/>
		<reference ref_id="CVE-2011-2369" ref_url="https://www.suse.com/security/cve/CVE-2011-2369/" source="CVE"/>
		<reference ref_id="CVE-2011-2370" ref_url="https://www.suse.com/security/cve/CVE-2011-2370/" source="CVE"/>
		<reference ref_id="CVE-2011-2371" ref_url="https://www.suse.com/security/cve/CVE-2011-2371/" source="CVE"/>
		<reference ref_id="CVE-2011-2372" ref_url="https://www.suse.com/security/cve/CVE-2011-2372/" source="CVE"/>
		<reference ref_id="CVE-2011-2373" ref_url="https://www.suse.com/security/cve/CVE-2011-2373/" source="CVE"/>
		<reference ref_id="CVE-2011-2374" ref_url="https://www.suse.com/security/cve/CVE-2011-2374/" source="CVE"/>
		<reference ref_id="CVE-2011-2375" ref_url="https://www.suse.com/security/cve/CVE-2011-2375/" source="CVE"/>
		<reference ref_id="CVE-2011-2377" ref_url="https://www.suse.com/security/cve/CVE-2011-2377/" source="CVE"/>
		<reference ref_id="CVE-2011-2985" ref_url="https://www.suse.com/security/cve/CVE-2011-2985/" source="CVE"/>
		<reference ref_id="CVE-2011-2986" ref_url="https://www.suse.com/security/cve/CVE-2011-2986/" source="CVE"/>
		<reference ref_id="CVE-2011-2988" ref_url="https://www.suse.com/security/cve/CVE-2011-2988/" source="CVE"/>
		<reference ref_id="CVE-2011-2989" ref_url="https://www.suse.com/security/cve/CVE-2011-2989/" source="CVE"/>
		<reference ref_id="CVE-2011-2990" ref_url="https://www.suse.com/security/cve/CVE-2011-2990/" source="CVE"/>
		<reference ref_id="CVE-2011-2991" ref_url="https://www.suse.com/security/cve/CVE-2011-2991/" source="CVE"/>
		<reference ref_id="CVE-2011-2992" ref_url="https://www.suse.com/security/cve/CVE-2011-2992/" source="CVE"/>
		<reference ref_id="CVE-2011-2993" ref_url="https://www.suse.com/security/cve/CVE-2011-2993/" source="CVE"/>
		<reference ref_id="CVE-2011-2995" ref_url="https://www.suse.com/security/cve/CVE-2011-2995/" source="CVE"/>
		<reference ref_id="CVE-2011-2996" ref_url="https://www.suse.com/security/cve/CVE-2011-2996/" source="CVE"/>
		<reference ref_id="CVE-2011-2997" ref_url="https://www.suse.com/security/cve/CVE-2011-2997/" source="CVE"/>
		<reference ref_id="CVE-2011-3000" ref_url="https://www.suse.com/security/cve/CVE-2011-3000/" source="CVE"/>
		<reference ref_id="CVE-2011-3001" ref_url="https://www.suse.com/security/cve/CVE-2011-3001/" source="CVE"/>
		<reference ref_id="CVE-2011-3002" ref_url="https://www.suse.com/security/cve/CVE-2011-3002/" source="CVE"/>
		<reference ref_id="CVE-2011-3003" ref_url="https://www.suse.com/security/cve/CVE-2011-3003/" source="CVE"/>
		<reference ref_id="CVE-2011-3004" ref_url="https://www.suse.com/security/cve/CVE-2011-3004/" source="CVE"/>
		<reference ref_id="CVE-2011-3005" ref_url="https://www.suse.com/security/cve/CVE-2011-3005/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3062" ref_url="https://www.suse.com/security/cve/CVE-2011-3062/" source="CVE"/>
		<reference ref_id="CVE-2011-3101" ref_url="https://www.suse.com/security/cve/CVE-2011-3101/" source="CVE"/>
		<reference ref_id="CVE-2011-3232" ref_url="https://www.suse.com/security/cve/CVE-2011-3232/" source="CVE"/>
		<reference ref_id="CVE-2011-3648" ref_url="https://www.suse.com/security/cve/CVE-2011-3648/" source="CVE"/>
		<reference ref_id="CVE-2011-3650" ref_url="https://www.suse.com/security/cve/CVE-2011-3650/" source="CVE"/>
		<reference ref_id="CVE-2011-3651" ref_url="https://www.suse.com/security/cve/CVE-2011-3651/" source="CVE"/>
		<reference ref_id="CVE-2011-3652" ref_url="https://www.suse.com/security/cve/CVE-2011-3652/" source="CVE"/>
		<reference ref_id="CVE-2011-3654" ref_url="https://www.suse.com/security/cve/CVE-2011-3654/" source="CVE"/>
		<reference ref_id="CVE-2011-3655" ref_url="https://www.suse.com/security/cve/CVE-2011-3655/" source="CVE"/>
		<reference ref_id="CVE-2011-3658" ref_url="https://www.suse.com/security/cve/CVE-2011-3658/" source="CVE"/>
		<reference ref_id="CVE-2011-3659" ref_url="https://www.suse.com/security/cve/CVE-2011-3659/" source="CVE"/>
		<reference ref_id="CVE-2011-3660" ref_url="https://www.suse.com/security/cve/CVE-2011-3660/" source="CVE"/>
		<reference ref_id="CVE-2011-3661" ref_url="https://www.suse.com/security/cve/CVE-2011-3661/" source="CVE"/>
		<reference ref_id="CVE-2011-3663" ref_url="https://www.suse.com/security/cve/CVE-2011-3663/" source="CVE"/>
		<reference ref_id="CVE-2012-0441" ref_url="https://www.suse.com/security/cve/CVE-2012-0441/" source="CVE"/>
		<reference ref_id="CVE-2012-0442" ref_url="https://www.suse.com/security/cve/CVE-2012-0442/" source="CVE"/>
		<reference ref_id="CVE-2012-0443" ref_url="https://www.suse.com/security/cve/CVE-2012-0443/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<reference ref_id="CVE-2012-0445" ref_url="https://www.suse.com/security/cve/CVE-2012-0445/" source="CVE"/>
		<reference ref_id="CVE-2012-0446" ref_url="https://www.suse.com/security/cve/CVE-2012-0446/" source="CVE"/>
		<reference ref_id="CVE-2012-0447" ref_url="https://www.suse.com/security/cve/CVE-2012-0447/" source="CVE"/>
		<reference ref_id="CVE-2012-0449" ref_url="https://www.suse.com/security/cve/CVE-2012-0449/" source="CVE"/>
		<reference ref_id="CVE-2012-0451" ref_url="https://www.suse.com/security/cve/CVE-2012-0451/" source="CVE"/>
		<reference ref_id="CVE-2012-0452" ref_url="https://www.suse.com/security/cve/CVE-2012-0452/" source="CVE"/>
		<reference ref_id="CVE-2012-0455" ref_url="https://www.suse.com/security/cve/CVE-2012-0455/" source="CVE"/>
		<reference ref_id="CVE-2012-0456" ref_url="https://www.suse.com/security/cve/CVE-2012-0456/" source="CVE"/>
		<reference ref_id="CVE-2012-0457" ref_url="https://www.suse.com/security/cve/CVE-2012-0457/" source="CVE"/>
		<reference ref_id="CVE-2012-0458" ref_url="https://www.suse.com/security/cve/CVE-2012-0458/" source="CVE"/>
		<reference ref_id="CVE-2012-0459" ref_url="https://www.suse.com/security/cve/CVE-2012-0459/" source="CVE"/>
		<reference ref_id="CVE-2012-0460" ref_url="https://www.suse.com/security/cve/CVE-2012-0460/" source="CVE"/>
		<reference ref_id="CVE-2012-0461" ref_url="https://www.suse.com/security/cve/CVE-2012-0461/" source="CVE"/>
		<reference ref_id="CVE-2012-0462" ref_url="https://www.suse.com/security/cve/CVE-2012-0462/" source="CVE"/>
		<reference ref_id="CVE-2012-0463" ref_url="https://www.suse.com/security/cve/CVE-2012-0463/" source="CVE"/>
		<reference ref_id="CVE-2012-0464" ref_url="https://www.suse.com/security/cve/CVE-2012-0464/" source="CVE"/>
		<reference ref_id="CVE-2012-0467" ref_url="https://www.suse.com/security/cve/CVE-2012-0467/" source="CVE"/>
		<reference ref_id="CVE-2012-0468" ref_url="https://www.suse.com/security/cve/CVE-2012-0468/" source="CVE"/>
		<reference ref_id="CVE-2012-0469" ref_url="https://www.suse.com/security/cve/CVE-2012-0469/" source="CVE"/>
		<reference ref_id="CVE-2012-0470" ref_url="https://www.suse.com/security/cve/CVE-2012-0470/" source="CVE"/>
		<reference ref_id="CVE-2012-0471" ref_url="https://www.suse.com/security/cve/CVE-2012-0471/" source="CVE"/>
		<reference ref_id="CVE-2012-0472" ref_url="https://www.suse.com/security/cve/CVE-2012-0472/" source="CVE"/>
		<reference ref_id="CVE-2012-0473" ref_url="https://www.suse.com/security/cve/CVE-2012-0473/" source="CVE"/>
		<reference ref_id="CVE-2012-0474" ref_url="https://www.suse.com/security/cve/CVE-2012-0474/" source="CVE"/>
		<reference ref_id="CVE-2012-0475" ref_url="https://www.suse.com/security/cve/CVE-2012-0475/" source="CVE"/>
		<reference ref_id="CVE-2012-0477" ref_url="https://www.suse.com/security/cve/CVE-2012-0477/" source="CVE"/>
		<reference ref_id="CVE-2012-0478" ref_url="https://www.suse.com/security/cve/CVE-2012-0478/" source="CVE"/>
		<reference ref_id="CVE-2012-0479" ref_url="https://www.suse.com/security/cve/CVE-2012-0479/" source="CVE"/>
		<reference ref_id="CVE-2012-0759" ref_url="https://www.suse.com/security/cve/CVE-2012-0759/" source="CVE"/>
		<reference ref_id="CVE-2012-1937" ref_url="https://www.suse.com/security/cve/CVE-2012-1937/" source="CVE"/>
		<reference ref_id="CVE-2012-1938" ref_url="https://www.suse.com/security/cve/CVE-2012-1938/" source="CVE"/>
		<reference ref_id="CVE-2012-1940" ref_url="https://www.suse.com/security/cve/CVE-2012-1940/" source="CVE"/>
		<reference ref_id="CVE-2012-1941" ref_url="https://www.suse.com/security/cve/CVE-2012-1941/" source="CVE"/>
		<reference ref_id="CVE-2012-1944" ref_url="https://www.suse.com/security/cve/CVE-2012-1944/" source="CVE"/>
		<reference ref_id="CVE-2012-1945" ref_url="https://www.suse.com/security/cve/CVE-2012-1945/" source="CVE"/>
		<reference ref_id="CVE-2012-1946" ref_url="https://www.suse.com/security/cve/CVE-2012-1946/" source="CVE"/>
		<reference ref_id="CVE-2012-1947" ref_url="https://www.suse.com/security/cve/CVE-2012-1947/" source="CVE"/>
		<reference ref_id="CVE-2012-1948" ref_url="https://www.suse.com/security/cve/CVE-2012-1948/" source="CVE"/>
		<reference ref_id="CVE-2012-1949" ref_url="https://www.suse.com/security/cve/CVE-2012-1949/" source="CVE"/>
		<reference ref_id="CVE-2012-1950" ref_url="https://www.suse.com/security/cve/CVE-2012-1950/" source="CVE"/>
		<reference ref_id="CVE-2012-1951" ref_url="https://www.suse.com/security/cve/CVE-2012-1951/" source="CVE"/>
		<reference ref_id="CVE-2012-1952" ref_url="https://www.suse.com/security/cve/CVE-2012-1952/" source="CVE"/>
		<reference ref_id="CVE-2012-1953" ref_url="https://www.suse.com/security/cve/CVE-2012-1953/" source="CVE"/>
		<reference ref_id="CVE-2012-1954" ref_url="https://www.suse.com/security/cve/CVE-2012-1954/" source="CVE"/>
		<reference ref_id="CVE-2012-1955" ref_url="https://www.suse.com/security/cve/CVE-2012-1955/" source="CVE"/>
		<reference ref_id="CVE-2012-1956" ref_url="https://www.suse.com/security/cve/CVE-2012-1956/" source="CVE"/>
		<reference ref_id="CVE-2012-1957" ref_url="https://www.suse.com/security/cve/CVE-2012-1957/" source="CVE"/>
		<reference ref_id="CVE-2012-1958" ref_url="https://www.suse.com/security/cve/CVE-2012-1958/" source="CVE"/>
		<reference ref_id="CVE-2012-1959" ref_url="https://www.suse.com/security/cve/CVE-2012-1959/" source="CVE"/>
		<reference ref_id="CVE-2012-1960" ref_url="https://www.suse.com/security/cve/CVE-2012-1960/" source="CVE"/>
		<reference ref_id="CVE-2012-1961" ref_url="https://www.suse.com/security/cve/CVE-2012-1961/" source="CVE"/>
		<reference ref_id="CVE-2012-1962" ref_url="https://www.suse.com/security/cve/CVE-2012-1962/" source="CVE"/>
		<reference ref_id="CVE-2012-1963" ref_url="https://www.suse.com/security/cve/CVE-2012-1963/" source="CVE"/>
		<reference ref_id="CVE-2012-1965" ref_url="https://www.suse.com/security/cve/CVE-2012-1965/" source="CVE"/>
		<reference ref_id="CVE-2012-1966" ref_url="https://www.suse.com/security/cve/CVE-2012-1966/" source="CVE"/>
		<reference ref_id="CVE-2012-1967" ref_url="https://www.suse.com/security/cve/CVE-2012-1967/" source="CVE"/>
		<reference ref_id="CVE-2012-1970" ref_url="https://www.suse.com/security/cve/CVE-2012-1970/" source="CVE"/>
		<reference ref_id="CVE-2012-1972" ref_url="https://www.suse.com/security/cve/CVE-2012-1972/" source="CVE"/>
		<reference ref_id="CVE-2012-1973" ref_url="https://www.suse.com/security/cve/CVE-2012-1973/" source="CVE"/>
		<reference ref_id="CVE-2012-1974" ref_url="https://www.suse.com/security/cve/CVE-2012-1974/" source="CVE"/>
		<reference ref_id="CVE-2012-1975" ref_url="https://www.suse.com/security/cve/CVE-2012-1975/" source="CVE"/>
		<reference ref_id="CVE-2012-1976" ref_url="https://www.suse.com/security/cve/CVE-2012-1976/" source="CVE"/>
		<reference ref_id="CVE-2012-3956" ref_url="https://www.suse.com/security/cve/CVE-2012-3956/" source="CVE"/>
		<reference ref_id="CVE-2012-3957" ref_url="https://www.suse.com/security/cve/CVE-2012-3957/" source="CVE"/>
		<reference ref_id="CVE-2012-3958" ref_url="https://www.suse.com/security/cve/CVE-2012-3958/" source="CVE"/>
		<reference ref_id="CVE-2012-3959" ref_url="https://www.suse.com/security/cve/CVE-2012-3959/" source="CVE"/>
		<reference ref_id="CVE-2012-3960" ref_url="https://www.suse.com/security/cve/CVE-2012-3960/" source="CVE"/>
		<reference ref_id="CVE-2012-3961" ref_url="https://www.suse.com/security/cve/CVE-2012-3961/" source="CVE"/>
		<reference ref_id="CVE-2012-3962" ref_url="https://www.suse.com/security/cve/CVE-2012-3962/" source="CVE"/>
		<reference ref_id="CVE-2012-3963" ref_url="https://www.suse.com/security/cve/CVE-2012-3963/" source="CVE"/>
		<reference ref_id="CVE-2012-3964" ref_url="https://www.suse.com/security/cve/CVE-2012-3964/" source="CVE"/>
		<reference ref_id="CVE-2012-3965" ref_url="https://www.suse.com/security/cve/CVE-2012-3965/" source="CVE"/>
		<reference ref_id="CVE-2012-3966" ref_url="https://www.suse.com/security/cve/CVE-2012-3966/" source="CVE"/>
		<reference ref_id="CVE-2012-3967" ref_url="https://www.suse.com/security/cve/CVE-2012-3967/" source="CVE"/>
		<reference ref_id="CVE-2012-3968" ref_url="https://www.suse.com/security/cve/CVE-2012-3968/" source="CVE"/>
		<reference ref_id="CVE-2012-3969" ref_url="https://www.suse.com/security/cve/CVE-2012-3969/" source="CVE"/>
		<reference ref_id="CVE-2012-3970" ref_url="https://www.suse.com/security/cve/CVE-2012-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-3971" ref_url="https://www.suse.com/security/cve/CVE-2012-3971/" source="CVE"/>
		<reference ref_id="CVE-2012-3972" ref_url="https://www.suse.com/security/cve/CVE-2012-3972/" source="CVE"/>
		<reference ref_id="CVE-2012-3973" ref_url="https://www.suse.com/security/cve/CVE-2012-3973/" source="CVE"/>
		<reference ref_id="CVE-2012-3975" ref_url="https://www.suse.com/security/cve/CVE-2012-3975/" source="CVE"/>
		<reference ref_id="CVE-2012-3976" ref_url="https://www.suse.com/security/cve/CVE-2012-3976/" source="CVE"/>
		<reference ref_id="CVE-2012-3978" ref_url="https://www.suse.com/security/cve/CVE-2012-3978/" source="CVE"/>
		<reference ref_id="CVE-2012-3980" ref_url="https://www.suse.com/security/cve/CVE-2012-3980/" source="CVE"/>
		<reference ref_id="CVE-2012-3982" ref_url="https://www.suse.com/security/cve/CVE-2012-3982/" source="CVE"/>
		<reference ref_id="CVE-2012-3983" ref_url="https://www.suse.com/security/cve/CVE-2012-3983/" source="CVE"/>
		<reference ref_id="CVE-2012-3984" ref_url="https://www.suse.com/security/cve/CVE-2012-3984/" source="CVE"/>
		<reference ref_id="CVE-2012-3985" ref_url="https://www.suse.com/security/cve/CVE-2012-3985/" source="CVE"/>
		<reference ref_id="CVE-2012-3986" ref_url="https://www.suse.com/security/cve/CVE-2012-3986/" source="CVE"/>
		<reference ref_id="CVE-2012-3988" ref_url="https://www.suse.com/security/cve/CVE-2012-3988/" source="CVE"/>
		<reference ref_id="CVE-2012-3989" ref_url="https://www.suse.com/security/cve/CVE-2012-3989/" source="CVE"/>
		<reference ref_id="CVE-2012-3990" ref_url="https://www.suse.com/security/cve/CVE-2012-3990/" source="CVE"/>
		<reference ref_id="CVE-2012-3991" ref_url="https://www.suse.com/security/cve/CVE-2012-3991/" source="CVE"/>
		<reference ref_id="CVE-2012-3992" ref_url="https://www.suse.com/security/cve/CVE-2012-3992/" source="CVE"/>
		<reference ref_id="CVE-2012-3993" ref_url="https://www.suse.com/security/cve/CVE-2012-3993/" source="CVE"/>
		<reference ref_id="CVE-2012-3994" ref_url="https://www.suse.com/security/cve/CVE-2012-3994/" source="CVE"/>
		<reference ref_id="CVE-2012-3995" ref_url="https://www.suse.com/security/cve/CVE-2012-3995/" source="CVE"/>
		<reference ref_id="CVE-2012-4179" ref_url="https://www.suse.com/security/cve/CVE-2012-4179/" source="CVE"/>
		<reference ref_id="CVE-2012-4180" ref_url="https://www.suse.com/security/cve/CVE-2012-4180/" source="CVE"/>
		<reference ref_id="CVE-2012-4181" ref_url="https://www.suse.com/security/cve/CVE-2012-4181/" source="CVE"/>
		<reference ref_id="CVE-2012-4182" ref_url="https://www.suse.com/security/cve/CVE-2012-4182/" source="CVE"/>
		<reference ref_id="CVE-2012-4183" ref_url="https://www.suse.com/security/cve/CVE-2012-4183/" source="CVE"/>
		<reference ref_id="CVE-2012-4184" ref_url="https://www.suse.com/security/cve/CVE-2012-4184/" source="CVE"/>
		<reference ref_id="CVE-2012-4185" ref_url="https://www.suse.com/security/cve/CVE-2012-4185/" source="CVE"/>
		<reference ref_id="CVE-2012-4186" ref_url="https://www.suse.com/security/cve/CVE-2012-4186/" source="CVE"/>
		<reference ref_id="CVE-2012-4187" ref_url="https://www.suse.com/security/cve/CVE-2012-4187/" source="CVE"/>
		<reference ref_id="CVE-2012-4188" ref_url="https://www.suse.com/security/cve/CVE-2012-4188/" source="CVE"/>
		<reference ref_id="CVE-2012-4191" ref_url="https://www.suse.com/security/cve/CVE-2012-4191/" source="CVE"/>
		<reference ref_id="CVE-2012-4192" ref_url="https://www.suse.com/security/cve/CVE-2012-4192/" source="CVE"/>
		<reference ref_id="CVE-2012-4193" ref_url="https://www.suse.com/security/cve/CVE-2012-4193/" source="CVE"/>
		<reference ref_id="CVE-2012-4194" ref_url="https://www.suse.com/security/cve/CVE-2012-4194/" source="CVE"/>
		<reference ref_id="CVE-2012-4195" ref_url="https://www.suse.com/security/cve/CVE-2012-4195/" source="CVE"/>
		<reference ref_id="CVE-2012-4196" ref_url="https://www.suse.com/security/cve/CVE-2012-4196/" source="CVE"/>
		<reference ref_id="CVE-2012-4201" ref_url="https://www.suse.com/security/cve/CVE-2012-4201/" source="CVE"/>
		<reference ref_id="CVE-2012-4202" ref_url="https://www.suse.com/security/cve/CVE-2012-4202/" source="CVE"/>
		<reference ref_id="CVE-2012-4203" ref_url="https://www.suse.com/security/cve/CVE-2012-4203/" source="CVE"/>
		<reference ref_id="CVE-2012-4204" ref_url="https://www.suse.com/security/cve/CVE-2012-4204/" source="CVE"/>
		<reference ref_id="CVE-2012-4205" ref_url="https://www.suse.com/security/cve/CVE-2012-4205/" source="CVE"/>
		<reference ref_id="CVE-2012-4207" ref_url="https://www.suse.com/security/cve/CVE-2012-4207/" source="CVE"/>
		<reference ref_id="CVE-2012-4208" ref_url="https://www.suse.com/security/cve/CVE-2012-4208/" source="CVE"/>
		<reference ref_id="CVE-2012-4209" ref_url="https://www.suse.com/security/cve/CVE-2012-4209/" source="CVE"/>
		<reference ref_id="CVE-2012-4210" ref_url="https://www.suse.com/security/cve/CVE-2012-4210/" source="CVE"/>
		<reference ref_id="CVE-2012-4212" ref_url="https://www.suse.com/security/cve/CVE-2012-4212/" source="CVE"/>
		<reference ref_id="CVE-2012-4213" ref_url="https://www.suse.com/security/cve/CVE-2012-4213/" source="CVE"/>
		<reference ref_id="CVE-2012-4214" ref_url="https://www.suse.com/security/cve/CVE-2012-4214/" source="CVE"/>
		<reference ref_id="CVE-2012-4215" ref_url="https://www.suse.com/security/cve/CVE-2012-4215/" source="CVE"/>
		<reference ref_id="CVE-2012-4216" ref_url="https://www.suse.com/security/cve/CVE-2012-4216/" source="CVE"/>
		<reference ref_id="CVE-2012-4217" ref_url="https://www.suse.com/security/cve/CVE-2012-4217/" source="CVE"/>
		<reference ref_id="CVE-2012-4218" ref_url="https://www.suse.com/security/cve/CVE-2012-4218/" source="CVE"/>
		<reference ref_id="CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829/" source="CVE"/>
		<reference ref_id="CVE-2012-5830" ref_url="https://www.suse.com/security/cve/CVE-2012-5830/" source="CVE"/>
		<reference ref_id="CVE-2012-5833" ref_url="https://www.suse.com/security/cve/CVE-2012-5833/" source="CVE"/>
		<reference ref_id="CVE-2012-5835" ref_url="https://www.suse.com/security/cve/CVE-2012-5835/" source="CVE"/>
		<reference ref_id="CVE-2012-5836" ref_url="https://www.suse.com/security/cve/CVE-2012-5836/" source="CVE"/>
		<reference ref_id="CVE-2012-5837" ref_url="https://www.suse.com/security/cve/CVE-2012-5837/" source="CVE"/>
		<reference ref_id="CVE-2012-5838" ref_url="https://www.suse.com/security/cve/CVE-2012-5838/" source="CVE"/>
		<reference ref_id="CVE-2012-5839" ref_url="https://www.suse.com/security/cve/CVE-2012-5839/" source="CVE"/>
		<reference ref_id="CVE-2012-5840" ref_url="https://www.suse.com/security/cve/CVE-2012-5840/" source="CVE"/>
		<reference ref_id="CVE-2012-5841" ref_url="https://www.suse.com/security/cve/CVE-2012-5841/" source="CVE"/>
		<reference ref_id="CVE-2012-5842" ref_url="https://www.suse.com/security/cve/CVE-2012-5842/" source="CVE"/>
		<reference ref_id="CVE-2012-5843" ref_url="https://www.suse.com/security/cve/CVE-2012-5843/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<reference ref_id="CVE-2013-0744" ref_url="https://www.suse.com/security/cve/CVE-2013-0744/" source="CVE"/>
		<reference ref_id="CVE-2013-0745" ref_url="https://www.suse.com/security/cve/CVE-2013-0745/" source="CVE"/>
		<reference ref_id="CVE-2013-0746" ref_url="https://www.suse.com/security/cve/CVE-2013-0746/" source="CVE"/>
		<reference ref_id="CVE-2013-0747" ref_url="https://www.suse.com/security/cve/CVE-2013-0747/" source="CVE"/>
		<reference ref_id="CVE-2013-0748" ref_url="https://www.suse.com/security/cve/CVE-2013-0748/" source="CVE"/>
		<reference ref_id="CVE-2013-0749" ref_url="https://www.suse.com/security/cve/CVE-2013-0749/" source="CVE"/>
		<reference ref_id="CVE-2013-0750" ref_url="https://www.suse.com/security/cve/CVE-2013-0750/" source="CVE"/>
		<reference ref_id="CVE-2013-0751" ref_url="https://www.suse.com/security/cve/CVE-2013-0751/" source="CVE"/>
		<reference ref_id="CVE-2013-0752" ref_url="https://www.suse.com/security/cve/CVE-2013-0752/" source="CVE"/>
		<reference ref_id="CVE-2013-0753" ref_url="https://www.suse.com/security/cve/CVE-2013-0753/" source="CVE"/>
		<reference ref_id="CVE-2013-0754" ref_url="https://www.suse.com/security/cve/CVE-2013-0754/" source="CVE"/>
		<reference ref_id="CVE-2013-0755" ref_url="https://www.suse.com/security/cve/CVE-2013-0755/" source="CVE"/>
		<reference ref_id="CVE-2013-0756" ref_url="https://www.suse.com/security/cve/CVE-2013-0756/" source="CVE"/>
		<reference ref_id="CVE-2013-0757" ref_url="https://www.suse.com/security/cve/CVE-2013-0757/" source="CVE"/>
		<reference ref_id="CVE-2013-0758" ref_url="https://www.suse.com/security/cve/CVE-2013-0758/" source="CVE"/>
		<reference ref_id="CVE-2013-0760" ref_url="https://www.suse.com/security/cve/CVE-2013-0760/" source="CVE"/>
		<reference ref_id="CVE-2013-0761" ref_url="https://www.suse.com/security/cve/CVE-2013-0761/" source="CVE"/>
		<reference ref_id="CVE-2013-0762" ref_url="https://www.suse.com/security/cve/CVE-2013-0762/" source="CVE"/>
		<reference ref_id="CVE-2013-0763" ref_url="https://www.suse.com/security/cve/CVE-2013-0763/" source="CVE"/>
		<reference ref_id="CVE-2013-0764" ref_url="https://www.suse.com/security/cve/CVE-2013-0764/" source="CVE"/>
		<reference ref_id="CVE-2013-0765" ref_url="https://www.suse.com/security/cve/CVE-2013-0765/" source="CVE"/>
		<reference ref_id="CVE-2013-0766" ref_url="https://www.suse.com/security/cve/CVE-2013-0766/" source="CVE"/>
		<reference ref_id="CVE-2013-0767" ref_url="https://www.suse.com/security/cve/CVE-2013-0767/" source="CVE"/>
		<reference ref_id="CVE-2013-0768" ref_url="https://www.suse.com/security/cve/CVE-2013-0768/" source="CVE"/>
		<reference ref_id="CVE-2013-0769" ref_url="https://www.suse.com/security/cve/CVE-2013-0769/" source="CVE"/>
		<reference ref_id="CVE-2013-0770" ref_url="https://www.suse.com/security/cve/CVE-2013-0770/" source="CVE"/>
		<reference ref_id="CVE-2013-0771" ref_url="https://www.suse.com/security/cve/CVE-2013-0771/" source="CVE"/>
		<reference ref_id="CVE-2013-0772" ref_url="https://www.suse.com/security/cve/CVE-2013-0772/" source="CVE"/>
		<reference ref_id="CVE-2013-0773" ref_url="https://www.suse.com/security/cve/CVE-2013-0773/" source="CVE"/>
		<reference ref_id="CVE-2013-0774" ref_url="https://www.suse.com/security/cve/CVE-2013-0774/" source="CVE"/>
		<reference ref_id="CVE-2013-0775" ref_url="https://www.suse.com/security/cve/CVE-2013-0775/" source="CVE"/>
		<reference ref_id="CVE-2013-0776" ref_url="https://www.suse.com/security/cve/CVE-2013-0776/" source="CVE"/>
		<reference ref_id="CVE-2013-0777" ref_url="https://www.suse.com/security/cve/CVE-2013-0777/" source="CVE"/>
		<reference ref_id="CVE-2013-0778" ref_url="https://www.suse.com/security/cve/CVE-2013-0778/" source="CVE"/>
		<reference ref_id="CVE-2013-0779" ref_url="https://www.suse.com/security/cve/CVE-2013-0779/" source="CVE"/>
		<reference ref_id="CVE-2013-0780" ref_url="https://www.suse.com/security/cve/CVE-2013-0780/" source="CVE"/>
		<reference ref_id="CVE-2013-0781" ref_url="https://www.suse.com/security/cve/CVE-2013-0781/" source="CVE"/>
		<reference ref_id="CVE-2013-0782" ref_url="https://www.suse.com/security/cve/CVE-2013-0782/" source="CVE"/>
		<reference ref_id="CVE-2013-0783" ref_url="https://www.suse.com/security/cve/CVE-2013-0783/" source="CVE"/>
		<reference ref_id="CVE-2013-0787" ref_url="https://www.suse.com/security/cve/CVE-2013-0787/" source="CVE"/>
		<reference ref_id="CVE-2013-0788" ref_url="https://www.suse.com/security/cve/CVE-2013-0788/" source="CVE"/>
		<reference ref_id="CVE-2013-0789" ref_url="https://www.suse.com/security/cve/CVE-2013-0789/" source="CVE"/>
		<reference ref_id="CVE-2013-0792" ref_url="https://www.suse.com/security/cve/CVE-2013-0792/" source="CVE"/>
		<reference ref_id="CVE-2013-0793" ref_url="https://www.suse.com/security/cve/CVE-2013-0793/" source="CVE"/>
		<reference ref_id="CVE-2013-0794" ref_url="https://www.suse.com/security/cve/CVE-2013-0794/" source="CVE"/>
		<reference ref_id="CVE-2013-0795" ref_url="https://www.suse.com/security/cve/CVE-2013-0795/" source="CVE"/>
		<reference ref_id="CVE-2013-0796" ref_url="https://www.suse.com/security/cve/CVE-2013-0796/" source="CVE"/>
		<reference ref_id="CVE-2013-0800" ref_url="https://www.suse.com/security/cve/CVE-2013-0800/" source="CVE"/>
		<reference ref_id="CVE-2013-0801" ref_url="https://www.suse.com/security/cve/CVE-2013-0801/" source="CVE"/>
		<reference ref_id="CVE-2013-1669" ref_url="https://www.suse.com/security/cve/CVE-2013-1669/" source="CVE"/>
		<reference ref_id="CVE-2013-1670" ref_url="https://www.suse.com/security/cve/CVE-2013-1670/" source="CVE"/>
		<reference ref_id="CVE-2013-1671" ref_url="https://www.suse.com/security/cve/CVE-2013-1671/" source="CVE"/>
		<reference ref_id="CVE-2013-1674" ref_url="https://www.suse.com/security/cve/CVE-2013-1674/" source="CVE"/>
		<reference ref_id="CVE-2013-1675" ref_url="https://www.suse.com/security/cve/CVE-2013-1675/" source="CVE"/>
		<reference ref_id="CVE-2013-1676" ref_url="https://www.suse.com/security/cve/CVE-2013-1676/" source="CVE"/>
		<reference ref_id="CVE-2013-1677" ref_url="https://www.suse.com/security/cve/CVE-2013-1677/" source="CVE"/>
		<reference ref_id="CVE-2013-1678" ref_url="https://www.suse.com/security/cve/CVE-2013-1678/" source="CVE"/>
		<reference ref_id="CVE-2013-1679" ref_url="https://www.suse.com/security/cve/CVE-2013-1679/" source="CVE"/>
		<reference ref_id="CVE-2013-1680" ref_url="https://www.suse.com/security/cve/CVE-2013-1680/" source="CVE"/>
		<reference ref_id="CVE-2013-1681" ref_url="https://www.suse.com/security/cve/CVE-2013-1681/" source="CVE"/>
		<reference ref_id="CVE-2013-1682" ref_url="https://www.suse.com/security/cve/CVE-2013-1682/" source="CVE"/>
		<reference ref_id="CVE-2013-1683" ref_url="https://www.suse.com/security/cve/CVE-2013-1683/" source="CVE"/>
		<reference ref_id="CVE-2013-1684" ref_url="https://www.suse.com/security/cve/CVE-2013-1684/" source="CVE"/>
		<reference ref_id="CVE-2013-1685" ref_url="https://www.suse.com/security/cve/CVE-2013-1685/" source="CVE"/>
		<reference ref_id="CVE-2013-1686" ref_url="https://www.suse.com/security/cve/CVE-2013-1686/" source="CVE"/>
		<reference ref_id="CVE-2013-1687" ref_url="https://www.suse.com/security/cve/CVE-2013-1687/" source="CVE"/>
		<reference ref_id="CVE-2013-1688" ref_url="https://www.suse.com/security/cve/CVE-2013-1688/" source="CVE"/>
		<reference ref_id="CVE-2013-1690" ref_url="https://www.suse.com/security/cve/CVE-2013-1690/" source="CVE"/>
		<reference ref_id="CVE-2013-1692" ref_url="https://www.suse.com/security/cve/CVE-2013-1692/" source="CVE"/>
		<reference ref_id="CVE-2013-1693" ref_url="https://www.suse.com/security/cve/CVE-2013-1693/" source="CVE"/>
		<reference ref_id="CVE-2013-1694" ref_url="https://www.suse.com/security/cve/CVE-2013-1694/" source="CVE"/>
		<reference ref_id="CVE-2013-1695" ref_url="https://www.suse.com/security/cve/CVE-2013-1695/" source="CVE"/>
		<reference ref_id="CVE-2013-1696" ref_url="https://www.suse.com/security/cve/CVE-2013-1696/" source="CVE"/>
		<reference ref_id="CVE-2013-1697" ref_url="https://www.suse.com/security/cve/CVE-2013-1697/" source="CVE"/>
		<reference ref_id="CVE-2013-1698" ref_url="https://www.suse.com/security/cve/CVE-2013-1698/" source="CVE"/>
		<reference ref_id="CVE-2013-1699" ref_url="https://www.suse.com/security/cve/CVE-2013-1699/" source="CVE"/>
		<reference ref_id="CVE-2013-1701" ref_url="https://www.suse.com/security/cve/CVE-2013-1701/" source="CVE"/>
		<reference ref_id="CVE-2013-1702" ref_url="https://www.suse.com/security/cve/CVE-2013-1702/" source="CVE"/>
		<reference ref_id="CVE-2013-1704" ref_url="https://www.suse.com/security/cve/CVE-2013-1704/" source="CVE"/>
		<reference ref_id="CVE-2013-1705" ref_url="https://www.suse.com/security/cve/CVE-2013-1705/" source="CVE"/>
		<reference ref_id="CVE-2013-1708" ref_url="https://www.suse.com/security/cve/CVE-2013-1708/" source="CVE"/>
		<reference ref_id="CVE-2013-1709" ref_url="https://www.suse.com/security/cve/CVE-2013-1709/" source="CVE"/>
		<reference ref_id="CVE-2013-1710" ref_url="https://www.suse.com/security/cve/CVE-2013-1710/" source="CVE"/>
		<reference ref_id="CVE-2013-1711" ref_url="https://www.suse.com/security/cve/CVE-2013-1711/" source="CVE"/>
		<reference ref_id="CVE-2013-1713" ref_url="https://www.suse.com/security/cve/CVE-2013-1713/" source="CVE"/>
		<reference ref_id="CVE-2013-1714" ref_url="https://www.suse.com/security/cve/CVE-2013-1714/" source="CVE"/>
		<reference ref_id="CVE-2013-1717" ref_url="https://www.suse.com/security/cve/CVE-2013-1717/" source="CVE"/>
		<reference ref_id="CVE-2013-1718" ref_url="https://www.suse.com/security/cve/CVE-2013-1718/" source="CVE"/>
		<reference ref_id="CVE-2013-1719" ref_url="https://www.suse.com/security/cve/CVE-2013-1719/" source="CVE"/>
		<reference ref_id="CVE-2013-1720" ref_url="https://www.suse.com/security/cve/CVE-2013-1720/" source="CVE"/>
		<reference ref_id="CVE-2013-1721" ref_url="https://www.suse.com/security/cve/CVE-2013-1721/" source="CVE"/>
		<reference ref_id="CVE-2013-1722" ref_url="https://www.suse.com/security/cve/CVE-2013-1722/" source="CVE"/>
		<reference ref_id="CVE-2013-1723" ref_url="https://www.suse.com/security/cve/CVE-2013-1723/" source="CVE"/>
		<reference ref_id="CVE-2013-1724" ref_url="https://www.suse.com/security/cve/CVE-2013-1724/" source="CVE"/>
		<reference ref_id="CVE-2013-1725" ref_url="https://www.suse.com/security/cve/CVE-2013-1725/" source="CVE"/>
		<reference ref_id="CVE-2013-1728" ref_url="https://www.suse.com/security/cve/CVE-2013-1728/" source="CVE"/>
		<reference ref_id="CVE-2013-1730" ref_url="https://www.suse.com/security/cve/CVE-2013-1730/" source="CVE"/>
		<reference ref_id="CVE-2013-1732" ref_url="https://www.suse.com/security/cve/CVE-2013-1732/" source="CVE"/>
		<reference ref_id="CVE-2013-1735" ref_url="https://www.suse.com/security/cve/CVE-2013-1735/" source="CVE"/>
		<reference ref_id="CVE-2013-1736" ref_url="https://www.suse.com/security/cve/CVE-2013-1736/" source="CVE"/>
		<reference ref_id="CVE-2013-1737" ref_url="https://www.suse.com/security/cve/CVE-2013-1737/" source="CVE"/>
		<reference ref_id="CVE-2013-1738" ref_url="https://www.suse.com/security/cve/CVE-2013-1738/" source="CVE"/>
		<reference ref_id="CVE-2013-5590" ref_url="https://www.suse.com/security/cve/CVE-2013-5590/" source="CVE"/>
		<reference ref_id="CVE-2013-5591" ref_url="https://www.suse.com/security/cve/CVE-2013-5591/" source="CVE"/>
		<reference ref_id="CVE-2013-5592" ref_url="https://www.suse.com/security/cve/CVE-2013-5592/" source="CVE"/>
		<reference ref_id="CVE-2013-5593" ref_url="https://www.suse.com/security/cve/CVE-2013-5593/" source="CVE"/>
		<reference ref_id="CVE-2013-5595" ref_url="https://www.suse.com/security/cve/CVE-2013-5595/" source="CVE"/>
		<reference ref_id="CVE-2013-5596" ref_url="https://www.suse.com/security/cve/CVE-2013-5596/" source="CVE"/>
		<reference ref_id="CVE-2013-5597" ref_url="https://www.suse.com/security/cve/CVE-2013-5597/" source="CVE"/>
		<reference ref_id="CVE-2013-5598" ref_url="https://www.suse.com/security/cve/CVE-2013-5598/" source="CVE"/>
		<reference ref_id="CVE-2013-5599" ref_url="https://www.suse.com/security/cve/CVE-2013-5599/" source="CVE"/>
		<reference ref_id="CVE-2013-5600" ref_url="https://www.suse.com/security/cve/CVE-2013-5600/" source="CVE"/>
		<reference ref_id="CVE-2013-5601" ref_url="https://www.suse.com/security/cve/CVE-2013-5601/" source="CVE"/>
		<reference ref_id="CVE-2013-5602" ref_url="https://www.suse.com/security/cve/CVE-2013-5602/" source="CVE"/>
		<reference ref_id="CVE-2013-5603" ref_url="https://www.suse.com/security/cve/CVE-2013-5603/" source="CVE"/>
		<reference ref_id="CVE-2013-5604" ref_url="https://www.suse.com/security/cve/CVE-2013-5604/" source="CVE"/>
		<reference ref_id="CVE-2013-5609" ref_url="https://www.suse.com/security/cve/CVE-2013-5609/" source="CVE"/>
		<reference ref_id="CVE-2013-5610" ref_url="https://www.suse.com/security/cve/CVE-2013-5610/" source="CVE"/>
		<reference ref_id="CVE-2013-5611" ref_url="https://www.suse.com/security/cve/CVE-2013-5611/" source="CVE"/>
		<reference ref_id="CVE-2013-5612" ref_url="https://www.suse.com/security/cve/CVE-2013-5612/" source="CVE"/>
		<reference ref_id="CVE-2013-5613" ref_url="https://www.suse.com/security/cve/CVE-2013-5613/" source="CVE"/>
		<reference ref_id="CVE-2013-5614" ref_url="https://www.suse.com/security/cve/CVE-2013-5614/" source="CVE"/>
		<reference ref_id="CVE-2013-5615" ref_url="https://www.suse.com/security/cve/CVE-2013-5615/" source="CVE"/>
		<reference ref_id="CVE-2013-5616" ref_url="https://www.suse.com/security/cve/CVE-2013-5616/" source="CVE"/>
		<reference ref_id="CVE-2013-5618" ref_url="https://www.suse.com/security/cve/CVE-2013-5618/" source="CVE"/>
		<reference ref_id="CVE-2013-5619" ref_url="https://www.suse.com/security/cve/CVE-2013-5619/" source="CVE"/>
		<reference ref_id="CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629/" source="CVE"/>
		<reference ref_id="CVE-2013-6630" ref_url="https://www.suse.com/security/cve/CVE-2013-6630/" source="CVE"/>
		<reference ref_id="CVE-2013-6671" ref_url="https://www.suse.com/security/cve/CVE-2013-6671/" source="CVE"/>
		<reference ref_id="CVE-2013-6672" ref_url="https://www.suse.com/security/cve/CVE-2013-6672/" source="CVE"/>
		<reference ref_id="CVE-2013-6673" ref_url="https://www.suse.com/security/cve/CVE-2013-6673/" source="CVE"/>
		<reference ref_id="CVE-2014-1477" ref_url="https://www.suse.com/security/cve/CVE-2014-1477/" source="CVE"/>
		<reference ref_id="CVE-2014-1478" ref_url="https://www.suse.com/security/cve/CVE-2014-1478/" source="CVE"/>
		<reference ref_id="CVE-2014-1479" ref_url="https://www.suse.com/security/cve/CVE-2014-1479/" source="CVE"/>
		<reference ref_id="CVE-2014-1480" ref_url="https://www.suse.com/security/cve/CVE-2014-1480/" source="CVE"/>
		<reference ref_id="CVE-2014-1481" ref_url="https://www.suse.com/security/cve/CVE-2014-1481/" source="CVE"/>
		<reference ref_id="CVE-2014-1482" ref_url="https://www.suse.com/security/cve/CVE-2014-1482/" source="CVE"/>
		<reference ref_id="CVE-2014-1483" ref_url="https://www.suse.com/security/cve/CVE-2014-1483/" source="CVE"/>
		<reference ref_id="CVE-2014-1484" ref_url="https://www.suse.com/security/cve/CVE-2014-1484/" source="CVE"/>
		<reference ref_id="CVE-2014-1485" ref_url="https://www.suse.com/security/cve/CVE-2014-1485/" source="CVE"/>
		<reference ref_id="CVE-2014-1486" ref_url="https://www.suse.com/security/cve/CVE-2014-1486/" source="CVE"/>
		<reference ref_id="CVE-2014-1487" ref_url="https://www.suse.com/security/cve/CVE-2014-1487/" source="CVE"/>
		<reference ref_id="CVE-2014-1488" ref_url="https://www.suse.com/security/cve/CVE-2014-1488/" source="CVE"/>
		<reference ref_id="CVE-2014-1489" ref_url="https://www.suse.com/security/cve/CVE-2014-1489/" source="CVE"/>
		<reference ref_id="CVE-2014-1490" ref_url="https://www.suse.com/security/cve/CVE-2014-1490/" source="CVE"/>
		<reference ref_id="CVE-2014-1491" ref_url="https://www.suse.com/security/cve/CVE-2014-1491/" source="CVE"/>
		<reference ref_id="CVE-2014-1544" ref_url="https://www.suse.com/security/cve/CVE-2014-1544/" source="CVE"/>
		<reference ref_id="CVE-2014-1547" ref_url="https://www.suse.com/security/cve/CVE-2014-1547/" source="CVE"/>
		<reference ref_id="CVE-2014-1548" ref_url="https://www.suse.com/security/cve/CVE-2014-1548/" source="CVE"/>
		<reference ref_id="CVE-2014-1553" ref_url="https://www.suse.com/security/cve/CVE-2014-1553/" source="CVE"/>
		<reference ref_id="CVE-2014-1554" ref_url="https://www.suse.com/security/cve/CVE-2014-1554/" source="CVE"/>
		<reference ref_id="CVE-2014-1555" ref_url="https://www.suse.com/security/cve/CVE-2014-1555/" source="CVE"/>
		<reference ref_id="CVE-2014-1556" ref_url="https://www.suse.com/security/cve/CVE-2014-1556/" source="CVE"/>
		<reference ref_id="CVE-2014-1557" ref_url="https://www.suse.com/security/cve/CVE-2014-1557/" source="CVE"/>
		<reference ref_id="CVE-2014-1562" ref_url="https://www.suse.com/security/cve/CVE-2014-1562/" source="CVE"/>
		<reference ref_id="CVE-2014-1563" ref_url="https://www.suse.com/security/cve/CVE-2014-1563/" source="CVE"/>
		<reference ref_id="CVE-2014-1564" ref_url="https://www.suse.com/security/cve/CVE-2014-1564/" source="CVE"/>
		<reference ref_id="CVE-2014-1565" ref_url="https://www.suse.com/security/cve/CVE-2014-1565/" source="CVE"/>
		<reference ref_id="CVE-2014-1567" ref_url="https://www.suse.com/security/cve/CVE-2014-1567/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-31.1.0esr-1.20 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-5913/">CVE-2008-5913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0652/">CVE-2009-0652</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0771/">CVE-2009-0771</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0772/">CVE-2009-0772</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0773/">CVE-2009-0773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0774/">CVE-2009-0774</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0775/">CVE-2009-0775</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0776/">CVE-2009-0776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0777/">CVE-2009-0777</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1044/">CVE-2009-1044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1169/">CVE-2009-1169</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1302/">CVE-2009-1302</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1303/">CVE-2009-1303</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1304/">CVE-2009-1304</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1305/">CVE-2009-1305</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1306/">CVE-2009-1306</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1307/">CVE-2009-1307</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1308/">CVE-2009-1308</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1309/">CVE-2009-1309</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1310/">CVE-2009-1310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1311/">CVE-2009-1311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1312/">CVE-2009-1312</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1313/">CVE-2009-1313</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1563/">CVE-2009-1563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2470/">CVE-2009-2470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2654/">CVE-2009-2654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3069/">CVE-2009-3069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3070/">CVE-2009-3070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3071/">CVE-2009-3071</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3072/">CVE-2009-3072</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3073/">CVE-2009-3073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3074/">CVE-2009-3074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3075/">CVE-2009-3075</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3077/">CVE-2009-3077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3078/">CVE-2009-3078</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3079/">CVE-2009-3079</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3274/">CVE-2009-3274</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3370/">CVE-2009-3370</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3371/">CVE-2009-3371</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3372/">CVE-2009-3372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3373/">CVE-2009-3373</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3374/">CVE-2009-3374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3375/">CVE-2009-3375</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3376/">CVE-2009-3376</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3377/">CVE-2009-3377</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3378/">CVE-2009-3378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3380/">CVE-2009-3380</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3381/">CVE-2009-3381</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3383/">CVE-2009-3383</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3388/">CVE-2009-3388</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3389/">CVE-2009-3389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3979/">CVE-2009-3979</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3980/">CVE-2009-3980</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3982/">CVE-2009-3982</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3983/">CVE-2009-3983</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3984/">CVE-2009-3984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3985/">CVE-2009-3985</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0164/">CVE-2010-0164</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0165/">CVE-2010-0165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0166/">CVE-2010-0166</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0167/">CVE-2010-0167</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0168/">CVE-2010-0168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0169/">CVE-2010-0169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0170/">CVE-2010-0170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0171/">CVE-2010-0171</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0172/">CVE-2010-0172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0654/">CVE-2010-0654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1028/">CVE-2010-1028</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1121/">CVE-2010-1121</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1125/">CVE-2010-1125</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1196/">CVE-2010-1196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1197/">CVE-2010-1197</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1198/">CVE-2010-1198</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1199/">CVE-2010-1199</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1200/">CVE-2010-1200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1201/">CVE-2010-1201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1202/">CVE-2010-1202</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1203/">CVE-2010-1203</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1206/">CVE-2010-1206</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1207/">CVE-2010-1207</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1208/">CVE-2010-1208</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1209/">CVE-2010-1209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1210/">CVE-2010-1210</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1211/">CVE-2010-1211</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1212/">CVE-2010-1212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1213/">CVE-2010-1213</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1214/">CVE-2010-1214</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1215/">CVE-2010-1215</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2751/">CVE-2010-2751</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2752/">CVE-2010-2752</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2753/">CVE-2010-2753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2754/">CVE-2010-2754</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2755/">CVE-2010-2755</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2760/">CVE-2010-2760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2762/">CVE-2010-2762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2764/">CVE-2010-2764</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2765/">CVE-2010-2765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2766/">CVE-2010-2766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2767/">CVE-2010-2767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2768/">CVE-2010-2768</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2769/">CVE-2010-2769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3166/">CVE-2010-3166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3167/">CVE-2010-3167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3168/">CVE-2010-3168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3169/">CVE-2010-3169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3173/">CVE-2010-3173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3174/">CVE-2010-3174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3175/">CVE-2010-3175</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3176/">CVE-2010-3176</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3177/">CVE-2010-3177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-0068/">CVE-2011-0068</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0069/">CVE-2011-0069</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0070/">CVE-2011-0070</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0079/">CVE-2011-0079</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0080/">CVE-2011-0080</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0081/">CVE-2011-0081</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0084/">CVE-2011-0084</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1187/">CVE-2011-1187</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1202/">CVE-2011-1202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2366/">CVE-2011-2366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2367/">CVE-2011-2367</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2368/">CVE-2011-2368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2369/">CVE-2011-2369</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2370/">CVE-2011-2370</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2371/">CVE-2011-2371</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2372/">CVE-2011-2372</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2373/">CVE-2011-2373</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2374/">CVE-2011-2374</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2375/">CVE-2011-2375</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2377/">CVE-2011-2377</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2985/">CVE-2011-2985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2986/">CVE-2011-2986</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2988/">CVE-2011-2988</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2989/">CVE-2011-2989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2990/">CVE-2011-2990</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2991/">CVE-2011-2991</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2992/">CVE-2011-2992</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2993/">CVE-2011-2993</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2995/">CVE-2011-2995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2996/">CVE-2011-2996</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2997/">CVE-2011-2997</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3000/">CVE-2011-3000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3001/">CVE-2011-3001</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3002/">CVE-2011-3002</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3003/">CVE-2011-3003</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3004/">CVE-2011-3004</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3005/">CVE-2011-3005</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3062/">CVE-2011-3062</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3101/">CVE-2011-3101</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3232/">CVE-2011-3232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3648/">CVE-2011-3648</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3650/">CVE-2011-3650</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3651/">CVE-2011-3651</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3652/">CVE-2011-3652</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3654/">CVE-2011-3654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3655/">CVE-2011-3655</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3658/">CVE-2011-3658</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3659/">CVE-2011-3659</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3660/">CVE-2011-3660</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3661/">CVE-2011-3661</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3663/">CVE-2011-3663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0441/">CVE-2012-0441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0442/">CVE-2012-0442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0443/">CVE-2012-0443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0445/">CVE-2012-0445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0446/">CVE-2012-0446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0447/">CVE-2012-0447</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0449/">CVE-2012-0449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0451/">CVE-2012-0451</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0452/">CVE-2012-0452</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0455/">CVE-2012-0455</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0456/">CVE-2012-0456</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0457/">CVE-2012-0457</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0458/">CVE-2012-0458</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0459/">CVE-2012-0459</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0460/">CVE-2012-0460</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0461/">CVE-2012-0461</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0462/">CVE-2012-0462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0463/">CVE-2012-0463</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0464/">CVE-2012-0464</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0467/">CVE-2012-0467</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0468/">CVE-2012-0468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0469/">CVE-2012-0469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0470/">CVE-2012-0470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0471/">CVE-2012-0471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0472/">CVE-2012-0472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0473/">CVE-2012-0473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0474/">CVE-2012-0474</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0475/">CVE-2012-0475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0477/">CVE-2012-0477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0478/">CVE-2012-0478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0479/">CVE-2012-0479</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0759/">CVE-2012-0759</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1937/">CVE-2012-1937</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1938/">CVE-2012-1938</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1940/">CVE-2012-1940</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1941/">CVE-2012-1941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1944/">CVE-2012-1944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1945/">CVE-2012-1945</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1946/">CVE-2012-1946</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1947/">CVE-2012-1947</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1948/">CVE-2012-1948</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1949/">CVE-2012-1949</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1950/">CVE-2012-1950</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1951/">CVE-2012-1951</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1952/">CVE-2012-1952</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1953/">CVE-2012-1953</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1954/">CVE-2012-1954</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1955/">CVE-2012-1955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1956/">CVE-2012-1956</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1957/">CVE-2012-1957</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1958/">CVE-2012-1958</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1959/">CVE-2012-1959</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1960/">CVE-2012-1960</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1961/">CVE-2012-1961</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1962/">CVE-2012-1962</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1963/">CVE-2012-1963</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1965/">CVE-2012-1965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1966/">CVE-2012-1966</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1967/">CVE-2012-1967</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1970/">CVE-2012-1970</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1972/">CVE-2012-1972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1973/">CVE-2012-1973</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1974/">CVE-2012-1974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1975/">CVE-2012-1975</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1976/">CVE-2012-1976</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3956/">CVE-2012-3956</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3957/">CVE-2012-3957</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3958/">CVE-2012-3958</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3959/">CVE-2012-3959</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3960/">CVE-2012-3960</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3961/">CVE-2012-3961</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3962/">CVE-2012-3962</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3963/">CVE-2012-3963</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3964/">CVE-2012-3964</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3965/">CVE-2012-3965</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3966/">CVE-2012-3966</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3967/">CVE-2012-3967</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3968/">CVE-2012-3968</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3969/">CVE-2012-3969</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3970/">CVE-2012-3970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3971/">CVE-2012-3971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3972/">CVE-2012-3972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3973/">CVE-2012-3973</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3975/">CVE-2012-3975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3976/">CVE-2012-3976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3978/">CVE-2012-3978</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3980/">CVE-2012-3980</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3982/">CVE-2012-3982</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3983/">CVE-2012-3983</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3984/">CVE-2012-3984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3985/">CVE-2012-3985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3986/">CVE-2012-3986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3988/">CVE-2012-3988</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3989/">CVE-2012-3989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3990/">CVE-2012-3990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3991/">CVE-2012-3991</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3992/">CVE-2012-3992</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3993/">CVE-2012-3993</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3994/">CVE-2012-3994</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3995/">CVE-2012-3995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4179/">CVE-2012-4179</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4180/">CVE-2012-4180</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4181/">CVE-2012-4181</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4182/">CVE-2012-4182</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4183/">CVE-2012-4183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4184/">CVE-2012-4184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4185/">CVE-2012-4185</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4186/">CVE-2012-4186</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4187/">CVE-2012-4187</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4188/">CVE-2012-4188</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4191/">CVE-2012-4191</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4192/">CVE-2012-4192</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4193/">CVE-2012-4193</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4194/">CVE-2012-4194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4195/">CVE-2012-4195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4196/">CVE-2012-4196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4201/">CVE-2012-4201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4202/">CVE-2012-4202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4203/">CVE-2012-4203</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4204/">CVE-2012-4204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4205/">CVE-2012-4205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4207/">CVE-2012-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4208/">CVE-2012-4208</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4209/">CVE-2012-4209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4210/">CVE-2012-4210</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4212/">CVE-2012-4212</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4213/">CVE-2012-4213</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4214/">CVE-2012-4214</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4215/">CVE-2012-4215</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4216/">CVE-2012-4216</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4217/">CVE-2012-4217</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4218/">CVE-2012-4218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5830/">CVE-2012-5830</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5833/">CVE-2012-5833</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5835/">CVE-2012-5835</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5836/">CVE-2012-5836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5837/">CVE-2012-5837</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5838/">CVE-2012-5838</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5839/">CVE-2012-5839</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5840/">CVE-2012-5840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5841/">CVE-2012-5841</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5842/">CVE-2012-5842</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5843/">CVE-2012-5843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0744/">CVE-2013-0744</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0745/">CVE-2013-0745</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0746/">CVE-2013-0746</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0747/">CVE-2013-0747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0748/">CVE-2013-0748</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0749/">CVE-2013-0749</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0750/">CVE-2013-0750</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0751/">CVE-2013-0751</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0752/">CVE-2013-0752</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0753/">CVE-2013-0753</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0754/">CVE-2013-0754</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0755/">CVE-2013-0755</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0756/">CVE-2013-0756</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0757/">CVE-2013-0757</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0758/">CVE-2013-0758</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0760/">CVE-2013-0760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0761/">CVE-2013-0761</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0762/">CVE-2013-0762</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0763/">CVE-2013-0763</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0764/">CVE-2013-0764</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0765/">CVE-2013-0765</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0766/">CVE-2013-0766</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0767/">CVE-2013-0767</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0768/">CVE-2013-0768</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0769/">CVE-2013-0769</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0770/">CVE-2013-0770</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0771/">CVE-2013-0771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0772/">CVE-2013-0772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0773/">CVE-2013-0773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0774/">CVE-2013-0774</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0775/">CVE-2013-0775</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0776/">CVE-2013-0776</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0777/">CVE-2013-0777</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0778/">CVE-2013-0778</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0779/">CVE-2013-0779</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0780/">CVE-2013-0780</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0781/">CVE-2013-0781</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0782/">CVE-2013-0782</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0783/">CVE-2013-0783</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0787/">CVE-2013-0787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0788/">CVE-2013-0788</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0789/">CVE-2013-0789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0792/">CVE-2013-0792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0793/">CVE-2013-0793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0794/">CVE-2013-0794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0795/">CVE-2013-0795</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0796/">CVE-2013-0796</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0800/">CVE-2013-0800</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0801/">CVE-2013-0801</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1669/">CVE-2013-1669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1670/">CVE-2013-1670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1671/">CVE-2013-1671</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1674/">CVE-2013-1674</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1675/">CVE-2013-1675</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1676/">CVE-2013-1676</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1677/">CVE-2013-1677</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1678/">CVE-2013-1678</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1679/">CVE-2013-1679</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1680/">CVE-2013-1680</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1681/">CVE-2013-1681</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1682/">CVE-2013-1682</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1683/">CVE-2013-1683</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1684/">CVE-2013-1684</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1685/">CVE-2013-1685</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1686/">CVE-2013-1686</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1687/">CVE-2013-1687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1688/">CVE-2013-1688</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1690/">CVE-2013-1690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1692/">CVE-2013-1692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1693/">CVE-2013-1693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1694/">CVE-2013-1694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1695/">CVE-2013-1695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1696/">CVE-2013-1696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1697/">CVE-2013-1697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1698/">CVE-2013-1698</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1699/">CVE-2013-1699</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1701/">CVE-2013-1701</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1702/">CVE-2013-1702</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1704/">CVE-2013-1704</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1705/">CVE-2013-1705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1708/">CVE-2013-1708</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1709/">CVE-2013-1709</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1710/">CVE-2013-1710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1711/">CVE-2013-1711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1713/">CVE-2013-1713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1714/">CVE-2013-1714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1717/">CVE-2013-1717</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1718/">CVE-2013-1718</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1719/">CVE-2013-1719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1720/">CVE-2013-1720</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1721/">CVE-2013-1721</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1722/">CVE-2013-1722</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1723/">CVE-2013-1723</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1724/">CVE-2013-1724</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1725/">CVE-2013-1725</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1728/">CVE-2013-1728</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1730/">CVE-2013-1730</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1732/">CVE-2013-1732</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1735/">CVE-2013-1735</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1736/">CVE-2013-1736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1737/">CVE-2013-1737</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1738/">CVE-2013-1738</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5590/">CVE-2013-5590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5591/">CVE-2013-5591</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5592/">CVE-2013-5592</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5593/">CVE-2013-5593</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5595/">CVE-2013-5595</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5596/">CVE-2013-5596</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5597/">CVE-2013-5597</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5598/">CVE-2013-5598</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5599/">CVE-2013-5599</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5600/">CVE-2013-5600</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5601/">CVE-2013-5601</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5602/">CVE-2013-5602</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5603/">CVE-2013-5603</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5604/">CVE-2013-5604</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5609/">CVE-2013-5609</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5610/">CVE-2013-5610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5611/">CVE-2013-5611</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5612/">CVE-2013-5612</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5613/">CVE-2013-5613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5614/">CVE-2013-5614</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5615/">CVE-2013-5615</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5616/">CVE-2013-5616</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5618/">CVE-2013-5618</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5619/">CVE-2013-5619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6630/">CVE-2013-6630</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-6671/">CVE-2013-6671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6672/">CVE-2013-6672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6673/">CVE-2013-6673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1477/">CVE-2014-1477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1478/">CVE-2014-1478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1479/">CVE-2014-1479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1480/">CVE-2014-1480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1481/">CVE-2014-1481</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1482/">CVE-2014-1482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1483/">CVE-2014-1483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1484/">CVE-2014-1484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1485/">CVE-2014-1485</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1486/">CVE-2014-1486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1487/">CVE-2014-1487</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1488/">CVE-2014-1488</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1489/">CVE-2014-1489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1490/">CVE-2014-1490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1491/">CVE-2014-1491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1544/">CVE-2014-1544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1547/">CVE-2014-1547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1548/">CVE-2014-1548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1553/">CVE-2014-1553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1554/">CVE-2014-1554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1555/">CVE-2014-1555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1556/">CVE-2014-1556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1557/">CVE-2014-1557</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1562/">CVE-2014-1562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1563/">CVE-2014-1563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1564/">CVE-2014-1564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1565/">CVE-2014-1565</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1567/">CVE-2014-1567</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141201" comment="MozillaFirefox-31.1.0esr-1.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141202" comment="MozillaFirefox-translations-31.1.0esr-1.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75681" version="1" class="patch">
	<metadata>
		<title>aaa_base-13.2+git20140911.61c1681-1.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-0461" ref_url="https://www.suse.com/security/cve/CVE-2011-0461/" source="CVE"/>
		<description>
These are all security issues fixed in the aaa_base-13.2+git20140911.61c1681-1.16 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0461/">CVE-2011-0461</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141203" comment="aaa_base-13.2+git20140911.61c1681-1.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141204" comment="aaa_base-extras-13.2+git20140911.61c1681-1.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75682" version="1" class="patch">
	<metadata>
		<title>accountsservice-0.6.35-1.126 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2012-2737" ref_url="https://www.suse.com/security/cve/CVE-2012-2737/" source="CVE"/>
		<description>
These are all security issues fixed in the accountsservice-0.6.35-1.126 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2737/">CVE-2012-2737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141205" comment="accountsservice-0.6.35-1.126 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141206" comment="accountsservice-lang-0.6.35-1.126 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141207" comment="libaccountsservice0-0.6.35-1.126 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141208" comment="typelib-1_0-AccountsService-1_0-0.6.35-1.126 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75683" version="1" class="patch">
	<metadata>
		<title>alsa-1.0.27.2-11.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-0035" ref_url="https://www.suse.com/security/cve/CVE-2009-0035/" source="CVE"/>
		<description>
These are all security issues fixed in the alsa-1.0.27.2-11.10 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0035/">CVE-2009-0035</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141209" comment="alsa-1.0.27.2-11.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141210" comment="libasound2-1.0.27.2-11.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140446" comment="libasound2-32bit-1.0.27.2-11.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75684" version="1" class="patch">
	<metadata>
		<title>argyllcms-1.6.3-1.179 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2012-1616" ref_url="https://www.suse.com/security/cve/CVE-2012-1616/" source="CVE"/>
		<description>
These are all security issues fixed in the argyllcms-1.6.3-1.179 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1616/">CVE-2012-1616</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141211" comment="argyllcms-1.6.3-1.179 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75685" version="1" class="patch">
	<metadata>
		<title>avahi-0.6.31-20.59 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-0758" ref_url="https://www.suse.com/security/cve/CVE-2009-0758/" source="CVE"/>
		<reference ref_id="CVE-2010-2244" ref_url="https://www.suse.com/security/cve/CVE-2010-2244/" source="CVE"/>
		<reference ref_id="CVE-2011-1002" ref_url="https://www.suse.com/security/cve/CVE-2011-1002/" source="CVE"/>
		<description>
These are all security issues fixed in the avahi-0.6.31-20.59 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0758/">CVE-2009-0758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2244/">CVE-2010-2244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1002/">CVE-2011-1002</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141212" comment="avahi-0.6.31-20.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141213" comment="avahi-lang-0.6.31-20.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141214" comment="libavahi-client3-0.6.31-20.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141215" comment="libavahi-client3-32bit-0.6.31-20.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141216" comment="libavahi-common3-0.6.31-20.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141217" comment="libavahi-common3-32bit-0.6.31-20.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141218" comment="libavahi-core7-0.6.31-20.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141219" comment="libdns_sd-0.6.31-20.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141220" comment="libdns_sd-32bit-0.6.31-20.59 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75686" version="1" class="patch">
	<metadata>
		<title>bash-4.2-75.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2014-2524" ref_url="https://www.suse.com/security/cve/CVE-2014-2524/" source="CVE"/>
		<reference ref_id="CVE-2014-6271" ref_url="https://www.suse.com/security/cve/CVE-2014-6271/" source="CVE"/>
		<reference ref_id="CVE-2014-7169" ref_url="https://www.suse.com/security/cve/CVE-2014-7169/" source="CVE"/>
		<reference ref_id="CVE-2014-7186" ref_url="https://www.suse.com/security/cve/CVE-2014-7186/" source="CVE"/>
		<reference ref_id="CVE-2014-7187" ref_url="https://www.suse.com/security/cve/CVE-2014-7187/" source="CVE"/>
		<description>
These are all security issues fixed in the bash-4.2-75.2 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2524/">CVE-2014-2524</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6271/">CVE-2014-6271</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7169/">CVE-2014-7169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7186/">CVE-2014-7186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7187/">CVE-2014-7187</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141221" comment="bash-4.2-75.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141222" comment="bash-doc-4.2-75.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141223" comment="bash-lang-4.2-75.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141224" comment="libreadline6-6.2-75.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141225" comment="libreadline6-32bit-6.2-75.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141226" comment="readline-doc-6.2-75.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75687" version="1" class="patch">
	<metadata>
		<title>bind-libs-32bit-9.9.5P1-1.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-0696" ref_url="https://www.suse.com/security/cve/CVE-2009-0696/" source="CVE"/>
		<reference ref_id="CVE-2009-4022" ref_url="https://www.suse.com/security/cve/CVE-2009-4022/" source="CVE"/>
		<reference ref_id="CVE-2010-3613" ref_url="https://www.suse.com/security/cve/CVE-2010-3613/" source="CVE"/>
		<reference ref_id="CVE-2010-3614" ref_url="https://www.suse.com/security/cve/CVE-2010-3614/" source="CVE"/>
		<reference ref_id="CVE-2010-3615" ref_url="https://www.suse.com/security/cve/CVE-2010-3615/" source="CVE"/>
		<reference ref_id="CVE-2011-0414" ref_url="https://www.suse.com/security/cve/CVE-2011-0414/" source="CVE"/>
		<reference ref_id="CVE-2011-1907" ref_url="https://www.suse.com/security/cve/CVE-2011-1907/" source="CVE"/>
		<reference ref_id="CVE-2011-1910" ref_url="https://www.suse.com/security/cve/CVE-2011-1910/" source="CVE"/>
		<reference ref_id="CVE-2011-2464" ref_url="https://www.suse.com/security/cve/CVE-2011-2464/" source="CVE"/>
		<reference ref_id="CVE-2011-4313" ref_url="https://www.suse.com/security/cve/CVE-2011-4313/" source="CVE"/>
		<reference ref_id="CVE-2012-1667" ref_url="https://www.suse.com/security/cve/CVE-2012-1667/" source="CVE"/>
		<reference ref_id="CVE-2012-3817" ref_url="https://www.suse.com/security/cve/CVE-2012-3817/" source="CVE"/>
		<reference ref_id="CVE-2012-3868" ref_url="https://www.suse.com/security/cve/CVE-2012-3868/" source="CVE"/>
		<reference ref_id="CVE-2012-4244" ref_url="https://www.suse.com/security/cve/CVE-2012-4244/" source="CVE"/>
		<reference ref_id="CVE-2012-5166" ref_url="https://www.suse.com/security/cve/CVE-2012-5166/" source="CVE"/>
		<reference ref_id="CVE-2012-5688" ref_url="https://www.suse.com/security/cve/CVE-2012-5688/" source="CVE"/>
		<reference ref_id="CVE-2012-5689" ref_url="https://www.suse.com/security/cve/CVE-2012-5689/" source="CVE"/>
		<reference ref_id="CVE-2013-2266" ref_url="https://www.suse.com/security/cve/CVE-2013-2266/" source="CVE"/>
		<reference ref_id="CVE-2013-4854" ref_url="https://www.suse.com/security/cve/CVE-2013-4854/" source="CVE"/>
		<reference ref_id="CVE-2014-0591" ref_url="https://www.suse.com/security/cve/CVE-2014-0591/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-libs-32bit-9.9.5P1-1.10 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0696/">CVE-2009-0696</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4022/">CVE-2009-4022</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3613/">CVE-2010-3613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3614/">CVE-2010-3614</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3615/">CVE-2010-3615</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0414/">CVE-2011-0414</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1907/">CVE-2011-1907</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1910/">CVE-2011-1910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2464/">CVE-2011-2464</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4313/">CVE-2011-4313</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1667/">CVE-2012-1667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3817/">CVE-2012-3817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3868/">CVE-2012-3868</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4244/">CVE-2012-4244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5166/">CVE-2012-5166</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5688/">CVE-2012-5688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5689/">CVE-2012-5689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2266/">CVE-2013-2266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4854/">CVE-2013-4854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0591/">CVE-2014-0591</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141227" comment="bind-libs-9.9.5P1-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141228" comment="bind-libs-32bit-9.9.5P1-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141229" comment="bind-utils-9.9.5P1-1.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75688" version="1" class="patch">
	<metadata>
		<title>bogofilter-1.2.4-3.56 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2010-2494" ref_url="https://www.suse.com/security/cve/CVE-2010-2494/" source="CVE"/>
		<reference ref_id="CVE-2012-5468" ref_url="https://www.suse.com/security/cve/CVE-2012-5468/" source="CVE"/>
		<description>
These are all security issues fixed in the bogofilter-1.2.4-3.56 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2494/">CVE-2010-2494</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5468/">CVE-2012-5468</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141230" comment="bogofilter-1.2.4-3.56 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75689" version="1" class="patch">
	<metadata>
		<title>bzip2-1.0.6-27.1129 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<description>
These are all security issues fixed in the bzip2-1.0.6-27.1129 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141231" comment="bzip2-1.0.6-27.1129 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141232" comment="libbz2-1-1.0.6-27.1129 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141233" comment="libbz2-1-32bit-1.0.6-27.1129 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75690" version="1" class="patch">
	<metadata>
		<title>cifs-utils-6.4-3.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2012-1586" ref_url="https://www.suse.com/security/cve/CVE-2012-1586/" source="CVE"/>
		<description>
These are all security issues fixed in the cifs-utils-6.4-3.5 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1586/">CVE-2012-1586</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141234" comment="cifs-utils-6.4-3.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75691" version="1" class="patch">
	<metadata>
		<title>clamav-0.98.4-1.46 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<reference ref_id="CVE-2011-2721" ref_url="https://www.suse.com/security/cve/CVE-2011-2721/" source="CVE"/>
		<reference ref_id="CVE-2011-3627" ref_url="https://www.suse.com/security/cve/CVE-2011-3627/" source="CVE"/>
		<reference ref_id="CVE-2012-1457" ref_url="https://www.suse.com/security/cve/CVE-2012-1457/" source="CVE"/>
		<reference ref_id="CVE-2012-1458" ref_url="https://www.suse.com/security/cve/CVE-2012-1458/" source="CVE"/>
		<reference ref_id="CVE-2012-1459" ref_url="https://www.suse.com/security/cve/CVE-2012-1459/" source="CVE"/>
		<description>
These are all security issues fixed in the clamav-0.98.4-1.46 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2721/">CVE-2011-2721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3627/">CVE-2011-3627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1457/">CVE-2012-1457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1458/">CVE-2012-1458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1459/">CVE-2012-1459</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141235" comment="clamav-0.98.4-1.46 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75692" version="1" class="patch">
	<metadata>
		<title>colord-1.1.7-2.42 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-4349" ref_url="https://www.suse.com/security/cve/CVE-2011-4349/" source="CVE"/>
		<description>
These are all security issues fixed in the colord-1.1.7-2.42 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4349/">CVE-2011-4349</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141236" comment="colord-1.1.7-2.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141237" comment="colord-gtk-lang-0.1.25-3.113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141238" comment="colord-lang-1.1.7-2.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141239" comment="libcolord-gtk1-0.1.25-3.113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141240" comment="libcolord2-1.1.7-2.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141241" comment="libcolord2-32bit-1.1.7-2.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141242" comment="libcolorhug2-1.1.7-2.42 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75693" version="1" class="patch">
	<metadata>
		<title>coolkey-1.1.0-147.71 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2007-4129" ref_url="https://www.suse.com/security/cve/CVE-2007-4129/" source="CVE"/>
		<description>
These are all security issues fixed in the coolkey-1.1.0-147.71 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4129/">CVE-2007-4129</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140495" comment="coolkey-1.1.0-147.71 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75694" version="1" class="patch">
	<metadata>
		<title>coreutils-8.22-5.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-0221" ref_url="https://www.suse.com/security/cve/CVE-2013-0221/" source="CVE"/>
		<reference ref_id="CVE-2013-0222" ref_url="https://www.suse.com/security/cve/CVE-2013-0222/" source="CVE"/>
		<reference ref_id="CVE-2013-0223" ref_url="https://www.suse.com/security/cve/CVE-2013-0223/" source="CVE"/>
		<description>
These are all security issues fixed in the coreutils-8.22-5.17 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0221/">CVE-2013-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0222/">CVE-2013-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0223/">CVE-2013-0223</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141243" comment="coreutils-8.22-5.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141244" comment="coreutils-lang-8.22-5.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75695" version="1" class="patch">
	<metadata>
		<title>cpio-2.11-26.182 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2010-0624" ref_url="https://www.suse.com/security/cve/CVE-2010-0624/" source="CVE"/>
		<description>
These are all security issues fixed in the cpio-2.11-26.182 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0624/">CVE-2010-0624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141245" comment="cpio-2.11-26.182 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141246" comment="cpio-lang-2.11-26.182 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141247" comment="tar-1.27.1-2.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141248" comment="tar-lang-1.27.1-2.22 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75696" version="1" class="patch">
	<metadata>
		<title>cpp48-4.8.3+r212056-6.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2014-5044" ref_url="https://www.suse.com/security/cve/CVE-2014-5044/" source="CVE"/>
		<description>
These are all security issues fixed in the cpp48-4.8.3+r212056-6.3 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5044/">CVE-2014-5044</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141249" comment="cpp48-4.8.3+r212056-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141250" comment="gcc48-4.8.3+r212056-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141251" comment="gcc48-32bit-4.8.3+r212056-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141252" comment="gcc48-c++-4.8.3+r212056-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141253" comment="gcc48-gij-4.8.3+r212056-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141254" comment="gcc48-gij-32bit-4.8.3+r212056-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141255" comment="gcc48-info-4.8.3+r212056-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141256" comment="libasan0-4.8.3+r212056-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141257" comment="libasan0-32bit-4.8.3+r212056-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141258" comment="libatomic1-4.8.3+r212056-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141259" comment="libatomic1-32bit-4.8.3+r212056-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141260" comment="libffi4-4.8.3+r212056-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141261" comment="libffi4-32bit-4.8.3+r212056-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141262" comment="libgcc_s1-4.8.3+r212056-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141263" comment="libgcc_s1-32bit-4.8.3+r212056-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141264" comment="libgcj48-4.8.3+r212056-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141265" comment="libgcj48-32bit-4.8.3+r212056-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141266" comment="libgcj48-jar-4.8.3+r212056-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141267" comment="libgcj_bc1-4.8.3+r212056-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141268" comment="libgfortran3-4.8.3+r212056-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141269" comment="libgomp1-4.8.3+r212056-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141270" comment="libgomp1-32bit-4.8.3+r212056-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141271" comment="libitm1-4.8.3+r212056-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141272" comment="libitm1-32bit-4.8.3+r212056-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141273" comment="libquadmath0-4.8.3+r212056-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141274" comment="libstdc++48-devel-4.8.3+r212056-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141275" comment="libstdc++48-devel-32bit-4.8.3+r212056-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141276" comment="libstdc++6-4.8.3+r212056-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141277" comment="libstdc++6-32bit-4.8.3+r212056-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141278" comment="libtsan0-4.8.3+r212056-6.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75697" version="1" class="patch">
	<metadata>
		<title>cron-4.2-55.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2006-2607" ref_url="https://www.suse.com/security/cve/CVE-2006-2607/" source="CVE"/>
		<reference ref_id="CVE-2010-0424" ref_url="https://www.suse.com/security/cve/CVE-2010-0424/" source="CVE"/>
		<description>
These are all security issues fixed in the cron-4.2-55.3 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2607/">CVE-2006-2607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0424/">CVE-2010-0424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141279" comment="cron-4.2-55.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141280" comment="cronie-1.4.11-55.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75698" version="1" class="patch">
	<metadata>
		<title>cups-1.7.5-2.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-0163" ref_url="https://www.suse.com/security/cve/CVE-2009-0163/" source="CVE"/>
		<reference ref_id="CVE-2009-2820" ref_url="https://www.suse.com/security/cve/CVE-2009-2820/" source="CVE"/>
		<reference ref_id="CVE-2009-3553" ref_url="https://www.suse.com/security/cve/CVE-2009-3553/" source="CVE"/>
		<reference ref_id="CVE-2010-0393" ref_url="https://www.suse.com/security/cve/CVE-2010-0393/" source="CVE"/>
		<reference ref_id="CVE-2010-0540" ref_url="https://www.suse.com/security/cve/CVE-2010-0540/" source="CVE"/>
		<reference ref_id="CVE-2010-0542" ref_url="https://www.suse.com/security/cve/CVE-2010-0542/" source="CVE"/>
		<reference ref_id="CVE-2010-1748" ref_url="https://www.suse.com/security/cve/CVE-2010-1748/" source="CVE"/>
		<reference ref_id="CVE-2010-2941" ref_url="https://www.suse.com/security/cve/CVE-2010-2941/" source="CVE"/>
		<reference ref_id="CVE-2012-5519" ref_url="https://www.suse.com/security/cve/CVE-2012-5519/" source="CVE"/>
		<reference ref_id="CVE-2012-6094" ref_url="https://www.suse.com/security/cve/CVE-2012-6094/" source="CVE"/>
		<reference ref_id="CVE-2014-2856" ref_url="https://www.suse.com/security/cve/CVE-2014-2856/" source="CVE"/>
		<reference ref_id="CVE-2014-3537" ref_url="https://www.suse.com/security/cve/CVE-2014-3537/" source="CVE"/>
		<reference ref_id="CVE-2014-5029" ref_url="https://www.suse.com/security/cve/CVE-2014-5029/" source="CVE"/>
		<reference ref_id="CVE-2014-5030" ref_url="https://www.suse.com/security/cve/CVE-2014-5030/" source="CVE"/>
		<reference ref_id="CVE-2014-5031" ref_url="https://www.suse.com/security/cve/CVE-2014-5031/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-1.7.5-2.7 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0163/">CVE-2009-0163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2820/">CVE-2009-2820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3553/">CVE-2009-3553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0393/">CVE-2010-0393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0540/">CVE-2010-0540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0542/">CVE-2010-0542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1748/">CVE-2010-1748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2941/">CVE-2010-2941</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5519/">CVE-2012-5519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6094/">CVE-2012-6094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2856/">CVE-2014-2856</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3537/">CVE-2014-3537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5029/">CVE-2014-5029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5030/">CVE-2014-5030</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5031/">CVE-2014-5031</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141281" comment="cups-1.7.5-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141282" comment="cups-client-1.7.5-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141283" comment="cups-libs-1.7.5-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141284" comment="cups-libs-32bit-1.7.5-2.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75699" version="1" class="patch">
	<metadata>
		<title>cups-filters-1.0.58-2.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-6473" ref_url="https://www.suse.com/security/cve/CVE-2013-6473/" source="CVE"/>
		<reference ref_id="CVE-2013-6474" ref_url="https://www.suse.com/security/cve/CVE-2013-6474/" source="CVE"/>
		<reference ref_id="CVE-2013-6475" ref_url="https://www.suse.com/security/cve/CVE-2013-6475/" source="CVE"/>
		<reference ref_id="CVE-2013-6476" ref_url="https://www.suse.com/security/cve/CVE-2013-6476/" source="CVE"/>
		<reference ref_id="CVE-2014-2707" ref_url="https://www.suse.com/security/cve/CVE-2014-2707/" source="CVE"/>
		<reference ref_id="CVE-2014-4336" ref_url="https://www.suse.com/security/cve/CVE-2014-4336/" source="CVE"/>
		<reference ref_id="CVE-2014-4337" ref_url="https://www.suse.com/security/cve/CVE-2014-4337/" source="CVE"/>
		<reference ref_id="CVE-2014-4338" ref_url="https://www.suse.com/security/cve/CVE-2014-4338/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-filters-1.0.58-2.6 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6473/">CVE-2013-6473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6474/">CVE-2013-6474</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6475/">CVE-2013-6475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6476/">CVE-2013-6476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2707/">CVE-2014-2707</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4336/">CVE-2014-4336</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4337/">CVE-2014-4337</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4338/">CVE-2014-4338</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141285" comment="cups-filters-1.0.58-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141286" comment="cups-filters-cups-browsed-1.0.58-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141287" comment="cups-filters-foomatic-rip-1.0.58-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141288" comment="cups-filters-ghostscript-1.0.58-2.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75700" version="1" class="patch">
	<metadata>
		<title>cups-pk-helper-0.2.5-3.75 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2012-4510" ref_url="https://www.suse.com/security/cve/CVE-2012-4510/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-pk-helper-0.2.5-3.75 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4510/">CVE-2012-4510</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140514" comment="cups-pk-helper-0.2.5-3.75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140515" comment="cups-pk-helper-lang-0.2.5-3.75 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75701" version="1" class="patch">
	<metadata>
		<title>curl-7.37.0-2.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-0037" ref_url="https://www.suse.com/security/cve/CVE-2009-0037/" source="CVE"/>
		<reference ref_id="CVE-2009-2417" ref_url="https://www.suse.com/security/cve/CVE-2009-2417/" source="CVE"/>
		<reference ref_id="CVE-2013-0249" ref_url="https://www.suse.com/security/cve/CVE-2013-0249/" source="CVE"/>
		<reference ref_id="CVE-2013-1944" ref_url="https://www.suse.com/security/cve/CVE-2013-1944/" source="CVE"/>
		<reference ref_id="CVE-2013-2174" ref_url="https://www.suse.com/security/cve/CVE-2013-2174/" source="CVE"/>
		<reference ref_id="CVE-2013-4545" ref_url="https://www.suse.com/security/cve/CVE-2013-4545/" source="CVE"/>
		<reference ref_id="CVE-2014-0015" ref_url="https://www.suse.com/security/cve/CVE-2014-0015/" source="CVE"/>
		<reference ref_id="CVE-2014-0138" ref_url="https://www.suse.com/security/cve/CVE-2014-0138/" source="CVE"/>
		<reference ref_id="CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139/" source="CVE"/>
		<reference ref_id="CVE-2014-3613" ref_url="https://www.suse.com/security/cve/CVE-2014-3613/" source="CVE"/>
		<reference ref_id="CVE-2014-3620" ref_url="https://www.suse.com/security/cve/CVE-2014-3620/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-7.37.0-2.5 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0037/">CVE-2009-0037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2417/">CVE-2009-2417</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0249/">CVE-2013-0249</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1944/">CVE-2013-1944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2174/">CVE-2013-2174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4545/">CVE-2013-4545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0015/">CVE-2014-0015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0138/">CVE-2014-0138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3613/">CVE-2014-3613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3620/">CVE-2014-3620</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141289" comment="curl-7.37.0-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141290" comment="libcurl4-7.37.0-2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141291" comment="libcurl4-32bit-7.37.0-2.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75702" version="1" class="patch">
	<metadata>
		<title>cvs-1.12.12-181.63 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2012-0804" ref_url="https://www.suse.com/security/cve/CVE-2012-0804/" source="CVE"/>
		<description>
These are all security issues fixed in the cvs-1.12.12-181.63 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0804/">CVE-2012-0804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140516" comment="cvs-1.12.12-181.63 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75703" version="1" class="patch">
	<metadata>
		<title>cyrus-sasl-2.1.26-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-0688" ref_url="https://www.suse.com/security/cve/CVE-2009-0688/" source="CVE"/>
		<description>
These are all security issues fixed in the cyrus-sasl-2.1.26-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0688/">CVE-2009-0688</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140518" comment="cyrus-sasl-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140519" comment="cyrus-sasl-32bit-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140520" comment="cyrus-sasl-crammd5-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140521" comment="cyrus-sasl-crammd5-32bit-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140522" comment="cyrus-sasl-digestmd5-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141292" comment="cyrus-sasl-digestmd5-32bit-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140523" comment="cyrus-sasl-gssapi-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140524" comment="cyrus-sasl-gssapi-32bit-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140527" comment="cyrus-sasl-plain-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140528" comment="cyrus-sasl-plain-32bit-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140529" comment="cyrus-sasl-saslauthd-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140532" comment="libsasl2-3-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140533" comment="libsasl2-3-32bit-2.1.26-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75704" version="1" class="patch">
	<metadata>
		<title>dbus-1-1.8.8-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2010-4352" ref_url="https://www.suse.com/security/cve/CVE-2010-4352/" source="CVE"/>
		<reference ref_id="CVE-2012-3524" ref_url="https://www.suse.com/security/cve/CVE-2012-3524/" source="CVE"/>
		<reference ref_id="CVE-2013-2168" ref_url="https://www.suse.com/security/cve/CVE-2013-2168/" source="CVE"/>
		<reference ref_id="CVE-2014-3477" ref_url="https://www.suse.com/security/cve/CVE-2014-3477/" source="CVE"/>
		<reference ref_id="CVE-2014-3532" ref_url="https://www.suse.com/security/cve/CVE-2014-3532/" source="CVE"/>
		<reference ref_id="CVE-2014-3533" ref_url="https://www.suse.com/security/cve/CVE-2014-3533/" source="CVE"/>
		<reference ref_id="CVE-2014-3635" ref_url="https://www.suse.com/security/cve/CVE-2014-3635/" source="CVE"/>
		<reference ref_id="CVE-2014-3636" ref_url="https://www.suse.com/security/cve/CVE-2014-3636/" source="CVE"/>
		<reference ref_id="CVE-2014-3637" ref_url="https://www.suse.com/security/cve/CVE-2014-3637/" source="CVE"/>
		<reference ref_id="CVE-2014-3638" ref_url="https://www.suse.com/security/cve/CVE-2014-3638/" source="CVE"/>
		<reference ref_id="CVE-2014-3639" ref_url="https://www.suse.com/security/cve/CVE-2014-3639/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-1.8.8-1.5 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4352/">CVE-2010-4352</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3524/">CVE-2012-3524</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2168/">CVE-2013-2168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3477/">CVE-2014-3477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3532/">CVE-2014-3532</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3533/">CVE-2014-3533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3635/">CVE-2014-3635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3636/">CVE-2014-3636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3637/">CVE-2014-3637</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3638/">CVE-2014-3638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3639/">CVE-2014-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141293" comment="dbus-1-1.8.8-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141294" comment="dbus-1-x11-1.8.8-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141295" comment="libdbus-1-3-1.8.8-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141296" comment="libdbus-1-3-32bit-1.8.8-1.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75705" version="1" class="patch">
	<metadata>
		<title>dbus-1-glib-0.100.2-3.58 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2010-1172" ref_url="https://www.suse.com/security/cve/CVE-2010-1172/" source="CVE"/>
		<reference ref_id="CVE-2013-0292" ref_url="https://www.suse.com/security/cve/CVE-2013-0292/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-glib-0.100.2-3.58 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1172/">CVE-2010-1172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0292/">CVE-2013-0292</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140539" comment="dbus-1-glib-0.100.2-3.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140540" comment="dbus-1-glib-32bit-0.100.2-3.58 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75706" version="1" class="patch">
	<metadata>
		<title>dhcp-4.2.6-7.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-1892" ref_url="https://www.suse.com/security/cve/CVE-2009-1892/" source="CVE"/>
		<reference ref_id="CVE-2010-2156" ref_url="https://www.suse.com/security/cve/CVE-2010-2156/" source="CVE"/>
		<reference ref_id="CVE-2010-3611" ref_url="https://www.suse.com/security/cve/CVE-2010-3611/" source="CVE"/>
		<reference ref_id="CVE-2010-3616" ref_url="https://www.suse.com/security/cve/CVE-2010-3616/" source="CVE"/>
		<reference ref_id="CVE-2011-0413" ref_url="https://www.suse.com/security/cve/CVE-2011-0413/" source="CVE"/>
		<reference ref_id="CVE-2011-0997" ref_url="https://www.suse.com/security/cve/CVE-2011-0997/" source="CVE"/>
		<reference ref_id="CVE-2011-2748" ref_url="https://www.suse.com/security/cve/CVE-2011-2748/" source="CVE"/>
		<reference ref_id="CVE-2011-2749" ref_url="https://www.suse.com/security/cve/CVE-2011-2749/" source="CVE"/>
		<reference ref_id="CVE-2011-4539" ref_url="https://www.suse.com/security/cve/CVE-2011-4539/" source="CVE"/>
		<reference ref_id="CVE-2011-4868" ref_url="https://www.suse.com/security/cve/CVE-2011-4868/" source="CVE"/>
		<reference ref_id="CVE-2012-3570" ref_url="https://www.suse.com/security/cve/CVE-2012-3570/" source="CVE"/>
		<reference ref_id="CVE-2012-3571" ref_url="https://www.suse.com/security/cve/CVE-2012-3571/" source="CVE"/>
		<reference ref_id="CVE-2012-3954" ref_url="https://www.suse.com/security/cve/CVE-2012-3954/" source="CVE"/>
		<reference ref_id="CVE-2012-3955" ref_url="https://www.suse.com/security/cve/CVE-2012-3955/" source="CVE"/>
		<reference ref_id="CVE-2013-2266" ref_url="https://www.suse.com/security/cve/CVE-2013-2266/" source="CVE"/>
		<description>
These are all security issues fixed in the dhcp-4.2.6-7.3 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1892/">CVE-2009-1892</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2156/">CVE-2010-2156</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3611/">CVE-2010-3611</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3616/">CVE-2010-3616</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0413/">CVE-2011-0413</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0997/">CVE-2011-0997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2748/">CVE-2011-2748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2749/">CVE-2011-2749</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4539/">CVE-2011-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4868/">CVE-2011-4868</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3570/">CVE-2012-3570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3571/">CVE-2012-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3954/">CVE-2012-3954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3955/">CVE-2012-3955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2266/">CVE-2013-2266</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141297" comment="dhcp-4.2.6-7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141298" comment="dhcp-client-4.2.6-7.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75707" version="1" class="patch">
	<metadata>
		<title>dia-0.97.2-13.253 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2008-5984" ref_url="https://www.suse.com/security/cve/CVE-2008-5984/" source="CVE"/>
		<description>
These are all security issues fixed in the dia-0.97.2-13.253 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5984/">CVE-2008-5984</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141299" comment="dia-0.97.2-13.253 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141300" comment="dia-lang-0.97.2-13.253 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75708" version="1" class="patch">
	<metadata>
		<title>dracut-037-34.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2012-4453" ref_url="https://www.suse.com/security/cve/CVE-2012-4453/" source="CVE"/>
		<description>
These are all security issues fixed in the dracut-037-34.4 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4453/">CVE-2012-4453</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141301" comment="dracut-037-34.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75709" version="1" class="patch">
	<metadata>
		<title>ecryptfs-utils-103-5.35 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-1831" ref_url="https://www.suse.com/security/cve/CVE-2011-1831/" source="CVE"/>
		<reference ref_id="CVE-2011-1832" ref_url="https://www.suse.com/security/cve/CVE-2011-1832/" source="CVE"/>
		<reference ref_id="CVE-2011-1833" ref_url="https://www.suse.com/security/cve/CVE-2011-1833/" source="CVE"/>
		<reference ref_id="CVE-2011-1834" ref_url="https://www.suse.com/security/cve/CVE-2011-1834/" source="CVE"/>
		<reference ref_id="CVE-2011-1835" ref_url="https://www.suse.com/security/cve/CVE-2011-1835/" source="CVE"/>
		<reference ref_id="CVE-2011-1836" ref_url="https://www.suse.com/security/cve/CVE-2011-1836/" source="CVE"/>
		<reference ref_id="CVE-2011-1837" ref_url="https://www.suse.com/security/cve/CVE-2011-1837/" source="CVE"/>
		<description>
These are all security issues fixed in the ecryptfs-utils-103-5.35 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1831/">CVE-2011-1831</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1832/">CVE-2011-1832</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1833/">CVE-2011-1833</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1834/">CVE-2011-1834</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1835/">CVE-2011-1835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1836/">CVE-2011-1836</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1837/">CVE-2011-1837</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141302" comment="ecryptfs-utils-103-5.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141303" comment="ecryptfs-utils-32bit-103-5.35 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75710" version="1" class="patch">
	<metadata>
		<title>elfutils-0.158-3.200 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2014-0172" ref_url="https://www.suse.com/security/cve/CVE-2014-0172/" source="CVE"/>
		<description>
These are all security issues fixed in the elfutils-0.158-3.200 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0172/">CVE-2014-0172</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141304" comment="elfutils-0.158-3.200 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141305" comment="libasm1-0.158-3.200 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141306" comment="libdw1-0.158-3.200 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141307" comment="libdw1-32bit-0.158-3.200 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141308" comment="libebl1-0.158-3.200 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141309" comment="libebl1-32bit-0.158-3.200 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141310" comment="libelf1-0.158-3.200 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141311" comment="libelf1-32bit-0.158-3.200 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75711" version="1" class="patch">
	<metadata>
		<title>emacs-24.3-14.44 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2012-0035" ref_url="https://www.suse.com/security/cve/CVE-2012-0035/" source="CVE"/>
		<reference ref_id="CVE-2014-3421" ref_url="https://www.suse.com/security/cve/CVE-2014-3421/" source="CVE"/>
		<reference ref_id="CVE-2014-3422" ref_url="https://www.suse.com/security/cve/CVE-2014-3422/" source="CVE"/>
		<reference ref_id="CVE-2014-3423" ref_url="https://www.suse.com/security/cve/CVE-2014-3423/" source="CVE"/>
		<reference ref_id="CVE-2014-3424" ref_url="https://www.suse.com/security/cve/CVE-2014-3424/" source="CVE"/>
		<description>
These are all security issues fixed in the emacs-24.3-14.44 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0035/">CVE-2012-0035</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3421/">CVE-2014-3421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3422/">CVE-2014-3422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3423/">CVE-2014-3423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3424/">CVE-2014-3424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141312" comment="emacs-24.3-14.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141313" comment="emacs-info-24.3-14.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141314" comment="emacs-x11-24.3-14.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141315" comment="etags-24.3-14.44 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75712" version="1" class="patch">
	<metadata>
		<title>empathy-3.10.3-1.131 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-3635" ref_url="https://www.suse.com/security/cve/CVE-2011-3635/" source="CVE"/>
		<description>
These are all security issues fixed in the empathy-3.10.3-1.131 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3635/">CVE-2011-3635</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141316" comment="empathy-3.10.3-1.131 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141317" comment="empathy-lang-3.10.3-1.131 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141318" comment="telepathy-mission-control-plugin-goa-3.10.3-1.131 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75713" version="1" class="patch">
	<metadata>
		<title>evince-3.10.3-1.213 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2010-2640" ref_url="https://www.suse.com/security/cve/CVE-2010-2640/" source="CVE"/>
		<reference ref_id="CVE-2010-2641" ref_url="https://www.suse.com/security/cve/CVE-2010-2641/" source="CVE"/>
		<reference ref_id="CVE-2010-2642" ref_url="https://www.suse.com/security/cve/CVE-2010-2642/" source="CVE"/>
		<reference ref_id="CVE-2010-2643" ref_url="https://www.suse.com/security/cve/CVE-2010-2643/" source="CVE"/>
		<description>
These are all security issues fixed in the evince-3.10.3-1.213 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2640/">CVE-2010-2640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2641/">CVE-2010-2641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2642/">CVE-2010-2642</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2643/">CVE-2010-2643</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141319" comment="evince-3.10.3-1.213 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141320" comment="evince-lang-3.10.3-1.213 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141321" comment="libevdocument3-4-3.10.3-1.213 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141322" comment="libevview3-3-3.10.3-1.213 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141323" comment="typelib-1_0-EvinceDocument-3_0-3.10.3-1.213 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141324" comment="typelib-1_0-EvinceView-3_0-3.10.3-1.213 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75714" version="1" class="patch">
	<metadata>
		<title>expat-2.1.0-13.232 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-2625" ref_url="https://www.suse.com/security/cve/CVE-2009-2625/" source="CVE"/>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<reference ref_id="CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876/" source="CVE"/>
		<reference ref_id="CVE-2012-1147" ref_url="https://www.suse.com/security/cve/CVE-2012-1147/" source="CVE"/>
		<reference ref_id="CVE-2012-1148" ref_url="https://www.suse.com/security/cve/CVE-2012-1148/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.1.0-13.232 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2625/">CVE-2009-2625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1147/">CVE-2012-1147</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1148/">CVE-2012-1148</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141325" comment="expat-2.1.0-13.232 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141326" comment="libexpat1-2.1.0-13.232 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141327" comment="libexpat1-32bit-2.1.0-13.232 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75715" version="1" class="patch">
	<metadata>
		<title>facter-2.0.2-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2014-3248" ref_url="https://www.suse.com/security/cve/CVE-2014-3248/" source="CVE"/>
		<description>
These are all security issues fixed in the facter-2.0.2-1.6 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3248/">CVE-2014-3248</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141328" comment="facter-2.0.2-1.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75716" version="1" class="patch">
	<metadata>
		<title>fetchmail-6.3.26-5.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-2666" ref_url="https://www.suse.com/security/cve/CVE-2009-2666/" source="CVE"/>
		<reference ref_id="CVE-2010-1167" ref_url="https://www.suse.com/security/cve/CVE-2010-1167/" source="CVE"/>
		<reference ref_id="CVE-2011-1947" ref_url="https://www.suse.com/security/cve/CVE-2011-1947/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2012-3482" ref_url="https://www.suse.com/security/cve/CVE-2012-3482/" source="CVE"/>
		<description>
These are all security issues fixed in the fetchmail-6.3.26-5.18 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2666/">CVE-2009-2666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1167/">CVE-2010-1167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1947/">CVE-2011-1947</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3482/">CVE-2012-3482</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141329" comment="fetchmail-6.3.26-5.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75717" version="1" class="patch">
	<metadata>
		<title>file-5.19-2.149 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2012-1571" ref_url="https://www.suse.com/security/cve/CVE-2012-1571/" source="CVE"/>
		<description>
These are all security issues fixed in the file-5.19-2.149 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1571/">CVE-2012-1571</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141330" comment="file-5.19-2.149 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141331" comment="file-magic-5.19-2.149 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141332" comment="libmagic1-5.19-2.149 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141333" comment="libmagic1-32bit-5.19-2.149 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75718" version="1" class="patch">
	<metadata>
		<title>finch-2.10.9-5.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-2694" ref_url="https://www.suse.com/security/cve/CVE-2009-2694/" source="CVE"/>
		<reference ref_id="CVE-2009-2703" ref_url="https://www.suse.com/security/cve/CVE-2009-2703/" source="CVE"/>
		<reference ref_id="CVE-2009-3026" ref_url="https://www.suse.com/security/cve/CVE-2009-3026/" source="CVE"/>
		<reference ref_id="CVE-2009-3083" ref_url="https://www.suse.com/security/cve/CVE-2009-3083/" source="CVE"/>
		<reference ref_id="CVE-2009-3084" ref_url="https://www.suse.com/security/cve/CVE-2009-3084/" source="CVE"/>
		<reference ref_id="CVE-2009-3085" ref_url="https://www.suse.com/security/cve/CVE-2009-3085/" source="CVE"/>
		<reference ref_id="CVE-2009-3615" ref_url="https://www.suse.com/security/cve/CVE-2009-3615/" source="CVE"/>
		<reference ref_id="CVE-2010-0013" ref_url="https://www.suse.com/security/cve/CVE-2010-0013/" source="CVE"/>
		<reference ref_id="CVE-2010-0277" ref_url="https://www.suse.com/security/cve/CVE-2010-0277/" source="CVE"/>
		<reference ref_id="CVE-2010-0420" ref_url="https://www.suse.com/security/cve/CVE-2010-0420/" source="CVE"/>
		<reference ref_id="CVE-2010-0423" ref_url="https://www.suse.com/security/cve/CVE-2010-0423/" source="CVE"/>
		<reference ref_id="CVE-2010-1624" ref_url="https://www.suse.com/security/cve/CVE-2010-1624/" source="CVE"/>
		<reference ref_id="CVE-2010-2528" ref_url="https://www.suse.com/security/cve/CVE-2010-2528/" source="CVE"/>
		<reference ref_id="CVE-2010-3711" ref_url="https://www.suse.com/security/cve/CVE-2010-3711/" source="CVE"/>
		<reference ref_id="CVE-2011-1091" ref_url="https://www.suse.com/security/cve/CVE-2011-1091/" source="CVE"/>
		<reference ref_id="CVE-2011-3594" ref_url="https://www.suse.com/security/cve/CVE-2011-3594/" source="CVE"/>
		<reference ref_id="CVE-2012-2214" ref_url="https://www.suse.com/security/cve/CVE-2012-2214/" source="CVE"/>
		<reference ref_id="CVE-2012-3374" ref_url="https://www.suse.com/security/cve/CVE-2012-3374/" source="CVE"/>
		<reference ref_id="CVE-2012-6152" ref_url="https://www.suse.com/security/cve/CVE-2012-6152/" source="CVE"/>
		<reference ref_id="CVE-2013-0271" ref_url="https://www.suse.com/security/cve/CVE-2013-0271/" source="CVE"/>
		<reference ref_id="CVE-2013-0272" ref_url="https://www.suse.com/security/cve/CVE-2013-0272/" source="CVE"/>
		<reference ref_id="CVE-2013-0273" ref_url="https://www.suse.com/security/cve/CVE-2013-0273/" source="CVE"/>
		<reference ref_id="CVE-2013-0274" ref_url="https://www.suse.com/security/cve/CVE-2013-0274/" source="CVE"/>
		<reference ref_id="CVE-2013-6477" ref_url="https://www.suse.com/security/cve/CVE-2013-6477/" source="CVE"/>
		<reference ref_id="CVE-2013-6478" ref_url="https://www.suse.com/security/cve/CVE-2013-6478/" source="CVE"/>
		<reference ref_id="CVE-2013-6479" ref_url="https://www.suse.com/security/cve/CVE-2013-6479/" source="CVE"/>
		<reference ref_id="CVE-2013-6481" ref_url="https://www.suse.com/security/cve/CVE-2013-6481/" source="CVE"/>
		<reference ref_id="CVE-2013-6482" ref_url="https://www.suse.com/security/cve/CVE-2013-6482/" source="CVE"/>
		<reference ref_id="CVE-2013-6483" ref_url="https://www.suse.com/security/cve/CVE-2013-6483/" source="CVE"/>
		<reference ref_id="CVE-2013-6484" ref_url="https://www.suse.com/security/cve/CVE-2013-6484/" source="CVE"/>
		<reference ref_id="CVE-2013-6485" ref_url="https://www.suse.com/security/cve/CVE-2013-6485/" source="CVE"/>
		<reference ref_id="CVE-2013-6486" ref_url="https://www.suse.com/security/cve/CVE-2013-6486/" source="CVE"/>
		<reference ref_id="CVE-2013-6487" ref_url="https://www.suse.com/security/cve/CVE-2013-6487/" source="CVE"/>
		<reference ref_id="CVE-2014-0020" ref_url="https://www.suse.com/security/cve/CVE-2014-0020/" source="CVE"/>
		<description>
These are all security issues fixed in the finch-2.10.9-5.15 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2694/">CVE-2009-2694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2703/">CVE-2009-2703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3026/">CVE-2009-3026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3083/">CVE-2009-3083</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3084/">CVE-2009-3084</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3085/">CVE-2009-3085</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3615/">CVE-2009-3615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0013/">CVE-2010-0013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0277/">CVE-2010-0277</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0420/">CVE-2010-0420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0423/">CVE-2010-0423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1624/">CVE-2010-1624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2528/">CVE-2010-2528</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3711/">CVE-2010-3711</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1091/">CVE-2011-1091</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3594/">CVE-2011-3594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2214/">CVE-2012-2214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3374/">CVE-2012-3374</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6152/">CVE-2012-6152</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0271/">CVE-2013-0271</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0272/">CVE-2013-0272</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0273/">CVE-2013-0273</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0274/">CVE-2013-0274</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6477/">CVE-2013-6477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6478/">CVE-2013-6478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6479/">CVE-2013-6479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6481/">CVE-2013-6481</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6482/">CVE-2013-6482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6483/">CVE-2013-6483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6484/">CVE-2013-6484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6485/">CVE-2013-6485</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-6486/">CVE-2013-6486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6487/">CVE-2013-6487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0020/">CVE-2014-0020</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141334" comment="finch-2.10.9-5.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141335" comment="libpurple-2.10.9-5.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141336" comment="libpurple-lang-2.10.9-5.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141337" comment="libpurple-meanwhile-2.10.9-5.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141338" comment="libpurple-tcl-2.10.9-5.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141339" comment="pidgin-2.10.9-5.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75719" version="1" class="patch">
	<metadata>
		<title>flash-player-11.2.202.406-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2008-4546" ref_url="https://www.suse.com/security/cve/CVE-2008-4546/" source="CVE"/>
		<reference ref_id="CVE-2009-0901" ref_url="https://www.suse.com/security/cve/CVE-2009-0901/" source="CVE"/>
		<reference ref_id="CVE-2009-1862" ref_url="https://www.suse.com/security/cve/CVE-2009-1862/" source="CVE"/>
		<reference ref_id="CVE-2009-1863" ref_url="https://www.suse.com/security/cve/CVE-2009-1863/" source="CVE"/>
		<reference ref_id="CVE-2009-1864" ref_url="https://www.suse.com/security/cve/CVE-2009-1864/" source="CVE"/>
		<reference ref_id="CVE-2009-1865" ref_url="https://www.suse.com/security/cve/CVE-2009-1865/" source="CVE"/>
		<reference ref_id="CVE-2009-1866" ref_url="https://www.suse.com/security/cve/CVE-2009-1866/" source="CVE"/>
		<reference ref_id="CVE-2009-1867" ref_url="https://www.suse.com/security/cve/CVE-2009-1867/" source="CVE"/>
		<reference ref_id="CVE-2009-1868" ref_url="https://www.suse.com/security/cve/CVE-2009-1868/" source="CVE"/>
		<reference ref_id="CVE-2009-1869" ref_url="https://www.suse.com/security/cve/CVE-2009-1869/" source="CVE"/>
		<reference ref_id="CVE-2009-1870" ref_url="https://www.suse.com/security/cve/CVE-2009-1870/" source="CVE"/>
		<reference ref_id="CVE-2009-2395" ref_url="https://www.suse.com/security/cve/CVE-2009-2395/" source="CVE"/>
		<reference ref_id="CVE-2009-2493" ref_url="https://www.suse.com/security/cve/CVE-2009-2493/" source="CVE"/>
		<reference ref_id="CVE-2009-3793" ref_url="https://www.suse.com/security/cve/CVE-2009-3793/" source="CVE"/>
		<reference ref_id="CVE-2009-3794" ref_url="https://www.suse.com/security/cve/CVE-2009-3794/" source="CVE"/>
		<reference ref_id="CVE-2009-3796" ref_url="https://www.suse.com/security/cve/CVE-2009-3796/" source="CVE"/>
		<reference ref_id="CVE-2009-3797" ref_url="https://www.suse.com/security/cve/CVE-2009-3797/" source="CVE"/>
		<reference ref_id="CVE-2009-3798" ref_url="https://www.suse.com/security/cve/CVE-2009-3798/" source="CVE"/>
		<reference ref_id="CVE-2009-3799" ref_url="https://www.suse.com/security/cve/CVE-2009-3799/" source="CVE"/>
		<reference ref_id="CVE-2009-3800" ref_url="https://www.suse.com/security/cve/CVE-2009-3800/" source="CVE"/>
		<reference ref_id="CVE-2009-3951" ref_url="https://www.suse.com/security/cve/CVE-2009-3951/" source="CVE"/>
		<reference ref_id="CVE-2010-0186" ref_url="https://www.suse.com/security/cve/CVE-2010-0186/" source="CVE"/>
		<reference ref_id="CVE-2010-0187" ref_url="https://www.suse.com/security/cve/CVE-2010-0187/" source="CVE"/>
		<reference ref_id="CVE-2010-0209" ref_url="https://www.suse.com/security/cve/CVE-2010-0209/" source="CVE"/>
		<reference ref_id="CVE-2010-1297" ref_url="https://www.suse.com/security/cve/CVE-2010-1297/" source="CVE"/>
		<reference ref_id="CVE-2010-2160" ref_url="https://www.suse.com/security/cve/CVE-2010-2160/" source="CVE"/>
		<reference ref_id="CVE-2010-2161" ref_url="https://www.suse.com/security/cve/CVE-2010-2161/" source="CVE"/>
		<reference ref_id="CVE-2010-2162" ref_url="https://www.suse.com/security/cve/CVE-2010-2162/" source="CVE"/>
		<reference ref_id="CVE-2010-2163" ref_url="https://www.suse.com/security/cve/CVE-2010-2163/" source="CVE"/>
		<reference ref_id="CVE-2010-2164" ref_url="https://www.suse.com/security/cve/CVE-2010-2164/" source="CVE"/>
		<reference ref_id="CVE-2010-2165" ref_url="https://www.suse.com/security/cve/CVE-2010-2165/" source="CVE"/>
		<reference ref_id="CVE-2010-2166" ref_url="https://www.suse.com/security/cve/CVE-2010-2166/" source="CVE"/>
		<reference ref_id="CVE-2010-2167" ref_url="https://www.suse.com/security/cve/CVE-2010-2167/" source="CVE"/>
		<reference ref_id="CVE-2010-2169" ref_url="https://www.suse.com/security/cve/CVE-2010-2169/" source="CVE"/>
		<reference ref_id="CVE-2010-2170" ref_url="https://www.suse.com/security/cve/CVE-2010-2170/" source="CVE"/>
		<reference ref_id="CVE-2010-2171" ref_url="https://www.suse.com/security/cve/CVE-2010-2171/" source="CVE"/>
		<reference ref_id="CVE-2010-2172" ref_url="https://www.suse.com/security/cve/CVE-2010-2172/" source="CVE"/>
		<reference ref_id="CVE-2010-2173" ref_url="https://www.suse.com/security/cve/CVE-2010-2173/" source="CVE"/>
		<reference ref_id="CVE-2010-2174" ref_url="https://www.suse.com/security/cve/CVE-2010-2174/" source="CVE"/>
		<reference ref_id="CVE-2010-2175" ref_url="https://www.suse.com/security/cve/CVE-2010-2175/" source="CVE"/>
		<reference ref_id="CVE-2010-2176" ref_url="https://www.suse.com/security/cve/CVE-2010-2176/" source="CVE"/>
		<reference ref_id="CVE-2010-2177" ref_url="https://www.suse.com/security/cve/CVE-2010-2177/" source="CVE"/>
		<reference ref_id="CVE-2010-2178" ref_url="https://www.suse.com/security/cve/CVE-2010-2178/" source="CVE"/>
		<reference ref_id="CVE-2010-2179" ref_url="https://www.suse.com/security/cve/CVE-2010-2179/" source="CVE"/>
		<reference ref_id="CVE-2010-2180" ref_url="https://www.suse.com/security/cve/CVE-2010-2180/" source="CVE"/>
		<reference ref_id="CVE-2010-2181" ref_url="https://www.suse.com/security/cve/CVE-2010-2181/" source="CVE"/>
		<reference ref_id="CVE-2010-2182" ref_url="https://www.suse.com/security/cve/CVE-2010-2182/" source="CVE"/>
		<reference ref_id="CVE-2010-2183" ref_url="https://www.suse.com/security/cve/CVE-2010-2183/" source="CVE"/>
		<reference ref_id="CVE-2010-2184" ref_url="https://www.suse.com/security/cve/CVE-2010-2184/" source="CVE"/>
		<reference ref_id="CVE-2010-2185" ref_url="https://www.suse.com/security/cve/CVE-2010-2185/" source="CVE"/>
		<reference ref_id="CVE-2010-2186" ref_url="https://www.suse.com/security/cve/CVE-2010-2186/" source="CVE"/>
		<reference ref_id="CVE-2010-2187" ref_url="https://www.suse.com/security/cve/CVE-2010-2187/" source="CVE"/>
		<reference ref_id="CVE-2010-2188" ref_url="https://www.suse.com/security/cve/CVE-2010-2188/" source="CVE"/>
		<reference ref_id="CVE-2010-2189" ref_url="https://www.suse.com/security/cve/CVE-2010-2189/" source="CVE"/>
		<reference ref_id="CVE-2010-2213" ref_url="https://www.suse.com/security/cve/CVE-2010-2213/" source="CVE"/>
		<reference ref_id="CVE-2010-2214" ref_url="https://www.suse.com/security/cve/CVE-2010-2214/" source="CVE"/>
		<reference ref_id="CVE-2010-2216" ref_url="https://www.suse.com/security/cve/CVE-2010-2216/" source="CVE"/>
		<reference ref_id="CVE-2010-2884" ref_url="https://www.suse.com/security/cve/CVE-2010-2884/" source="CVE"/>
		<reference ref_id="CVE-2010-3654" ref_url="https://www.suse.com/security/cve/CVE-2010-3654/" source="CVE"/>
		<reference ref_id="CVE-2011-0558" ref_url="https://www.suse.com/security/cve/CVE-2011-0558/" source="CVE"/>
		<reference ref_id="CVE-2011-0559" ref_url="https://www.suse.com/security/cve/CVE-2011-0559/" source="CVE"/>
		<reference ref_id="CVE-2011-0560" ref_url="https://www.suse.com/security/cve/CVE-2011-0560/" source="CVE"/>
		<reference ref_id="CVE-2011-0561" ref_url="https://www.suse.com/security/cve/CVE-2011-0561/" source="CVE"/>
		<reference ref_id="CVE-2011-0571" ref_url="https://www.suse.com/security/cve/CVE-2011-0571/" source="CVE"/>
		<reference ref_id="CVE-2011-0572" ref_url="https://www.suse.com/security/cve/CVE-2011-0572/" source="CVE"/>
		<reference ref_id="CVE-2011-0573" ref_url="https://www.suse.com/security/cve/CVE-2011-0573/" source="CVE"/>
		<reference ref_id="CVE-2011-0574" ref_url="https://www.suse.com/security/cve/CVE-2011-0574/" source="CVE"/>
		<reference ref_id="CVE-2011-0575" ref_url="https://www.suse.com/security/cve/CVE-2011-0575/" source="CVE"/>
		<reference ref_id="CVE-2011-0577" ref_url="https://www.suse.com/security/cve/CVE-2011-0577/" source="CVE"/>
		<reference ref_id="CVE-2011-0578" ref_url="https://www.suse.com/security/cve/CVE-2011-0578/" source="CVE"/>
		<reference ref_id="CVE-2011-0589" ref_url="https://www.suse.com/security/cve/CVE-2011-0589/" source="CVE"/>
		<reference ref_id="CVE-2011-0607" ref_url="https://www.suse.com/security/cve/CVE-2011-0607/" source="CVE"/>
		<reference ref_id="CVE-2011-0608" ref_url="https://www.suse.com/security/cve/CVE-2011-0608/" source="CVE"/>
		<reference ref_id="CVE-2011-0609" ref_url="https://www.suse.com/security/cve/CVE-2011-0609/" source="CVE"/>
		<reference ref_id="CVE-2011-0611" ref_url="https://www.suse.com/security/cve/CVE-2011-0611/" source="CVE"/>
		<reference ref_id="CVE-2011-0618" ref_url="https://www.suse.com/security/cve/CVE-2011-0618/" source="CVE"/>
		<reference ref_id="CVE-2011-0619" ref_url="https://www.suse.com/security/cve/CVE-2011-0619/" source="CVE"/>
		<reference ref_id="CVE-2011-0620" ref_url="https://www.suse.com/security/cve/CVE-2011-0620/" source="CVE"/>
		<reference ref_id="CVE-2011-0621" ref_url="https://www.suse.com/security/cve/CVE-2011-0621/" source="CVE"/>
		<reference ref_id="CVE-2011-0622" ref_url="https://www.suse.com/security/cve/CVE-2011-0622/" source="CVE"/>
		<reference ref_id="CVE-2011-0623" ref_url="https://www.suse.com/security/cve/CVE-2011-0623/" source="CVE"/>
		<reference ref_id="CVE-2011-0624" ref_url="https://www.suse.com/security/cve/CVE-2011-0624/" source="CVE"/>
		<reference ref_id="CVE-2011-0625" ref_url="https://www.suse.com/security/cve/CVE-2011-0625/" source="CVE"/>
		<reference ref_id="CVE-2011-0626" ref_url="https://www.suse.com/security/cve/CVE-2011-0626/" source="CVE"/>
		<reference ref_id="CVE-2011-0627" ref_url="https://www.suse.com/security/cve/CVE-2011-0627/" source="CVE"/>
		<reference ref_id="CVE-2011-2107" ref_url="https://www.suse.com/security/cve/CVE-2011-2107/" source="CVE"/>
		<reference ref_id="CVE-2011-2110" ref_url="https://www.suse.com/security/cve/CVE-2011-2110/" source="CVE"/>
		<reference ref_id="CVE-2011-2130" ref_url="https://www.suse.com/security/cve/CVE-2011-2130/" source="CVE"/>
		<reference ref_id="CVE-2011-2134" ref_url="https://www.suse.com/security/cve/CVE-2011-2134/" source="CVE"/>
		<reference ref_id="CVE-2011-2135" ref_url="https://www.suse.com/security/cve/CVE-2011-2135/" source="CVE"/>
		<reference ref_id="CVE-2011-2136" ref_url="https://www.suse.com/security/cve/CVE-2011-2136/" source="CVE"/>
		<reference ref_id="CVE-2011-2137" ref_url="https://www.suse.com/security/cve/CVE-2011-2137/" source="CVE"/>
		<reference ref_id="CVE-2011-2138" ref_url="https://www.suse.com/security/cve/CVE-2011-2138/" source="CVE"/>
		<reference ref_id="CVE-2011-2139" ref_url="https://www.suse.com/security/cve/CVE-2011-2139/" source="CVE"/>
		<reference ref_id="CVE-2011-2140" ref_url="https://www.suse.com/security/cve/CVE-2011-2140/" source="CVE"/>
		<reference ref_id="CVE-2011-2414" ref_url="https://www.suse.com/security/cve/CVE-2011-2414/" source="CVE"/>
		<reference ref_id="CVE-2011-2415" ref_url="https://www.suse.com/security/cve/CVE-2011-2415/" source="CVE"/>
		<reference ref_id="CVE-2011-2416" ref_url="https://www.suse.com/security/cve/CVE-2011-2416/" source="CVE"/>
		<reference ref_id="CVE-2011-2417" ref_url="https://www.suse.com/security/cve/CVE-2011-2417/" source="CVE"/>
		<reference ref_id="CVE-2011-2425" ref_url="https://www.suse.com/security/cve/CVE-2011-2425/" source="CVE"/>
		<reference ref_id="CVE-2011-2445" ref_url="https://www.suse.com/security/cve/CVE-2011-2445/" source="CVE"/>
		<reference ref_id="CVE-2011-2450" ref_url="https://www.suse.com/security/cve/CVE-2011-2450/" source="CVE"/>
		<reference ref_id="CVE-2011-2451" ref_url="https://www.suse.com/security/cve/CVE-2011-2451/" source="CVE"/>
		<reference ref_id="CVE-2011-2452" ref_url="https://www.suse.com/security/cve/CVE-2011-2452/" source="CVE"/>
		<reference ref_id="CVE-2011-2453" ref_url="https://www.suse.com/security/cve/CVE-2011-2453/" source="CVE"/>
		<reference ref_id="CVE-2011-2454" ref_url="https://www.suse.com/security/cve/CVE-2011-2454/" source="CVE"/>
		<reference ref_id="CVE-2011-2455" ref_url="https://www.suse.com/security/cve/CVE-2011-2455/" source="CVE"/>
		<reference ref_id="CVE-2011-2456" ref_url="https://www.suse.com/security/cve/CVE-2011-2456/" source="CVE"/>
		<reference ref_id="CVE-2011-2457" ref_url="https://www.suse.com/security/cve/CVE-2011-2457/" source="CVE"/>
		<reference ref_id="CVE-2011-2458" ref_url="https://www.suse.com/security/cve/CVE-2011-2458/" source="CVE"/>
		<reference ref_id="CVE-2011-2459" ref_url="https://www.suse.com/security/cve/CVE-2011-2459/" source="CVE"/>
		<reference ref_id="CVE-2011-2460" ref_url="https://www.suse.com/security/cve/CVE-2011-2460/" source="CVE"/>
		<reference ref_id="CVE-2012-0751" ref_url="https://www.suse.com/security/cve/CVE-2012-0751/" source="CVE"/>
		<reference ref_id="CVE-2012-0752" ref_url="https://www.suse.com/security/cve/CVE-2012-0752/" source="CVE"/>
		<reference ref_id="CVE-2012-0753" ref_url="https://www.suse.com/security/cve/CVE-2012-0753/" source="CVE"/>
		<reference ref_id="CVE-2012-0754" ref_url="https://www.suse.com/security/cve/CVE-2012-0754/" source="CVE"/>
		<reference ref_id="CVE-2012-0755" ref_url="https://www.suse.com/security/cve/CVE-2012-0755/" source="CVE"/>
		<reference ref_id="CVE-2012-0756" ref_url="https://www.suse.com/security/cve/CVE-2012-0756/" source="CVE"/>
		<reference ref_id="CVE-2012-0767" ref_url="https://www.suse.com/security/cve/CVE-2012-0767/" source="CVE"/>
		<reference ref_id="CVE-2012-0768" ref_url="https://www.suse.com/security/cve/CVE-2012-0768/" source="CVE"/>
		<reference ref_id="CVE-2012-0769" ref_url="https://www.suse.com/security/cve/CVE-2012-0769/" source="CVE"/>
		<reference ref_id="CVE-2012-0773" ref_url="https://www.suse.com/security/cve/CVE-2012-0773/" source="CVE"/>
		<reference ref_id="CVE-2012-0779" ref_url="https://www.suse.com/security/cve/CVE-2012-0779/" source="CVE"/>
		<reference ref_id="CVE-2012-1535" ref_url="https://www.suse.com/security/cve/CVE-2012-1535/" source="CVE"/>
		<reference ref_id="CVE-2012-2034" ref_url="https://www.suse.com/security/cve/CVE-2012-2034/" source="CVE"/>
		<reference ref_id="CVE-2012-2035" ref_url="https://www.suse.com/security/cve/CVE-2012-2035/" source="CVE"/>
		<reference ref_id="CVE-2012-2036" ref_url="https://www.suse.com/security/cve/CVE-2012-2036/" source="CVE"/>
		<reference ref_id="CVE-2012-2037" ref_url="https://www.suse.com/security/cve/CVE-2012-2037/" source="CVE"/>
		<reference ref_id="CVE-2012-2038" ref_url="https://www.suse.com/security/cve/CVE-2012-2038/" source="CVE"/>
		<reference ref_id="CVE-2012-2039" ref_url="https://www.suse.com/security/cve/CVE-2012-2039/" source="CVE"/>
		<reference ref_id="CVE-2012-2040" ref_url="https://www.suse.com/security/cve/CVE-2012-2040/" source="CVE"/>
		<reference ref_id="CVE-2012-5248" ref_url="https://www.suse.com/security/cve/CVE-2012-5248/" source="CVE"/>
		<reference ref_id="CVE-2012-5249" ref_url="https://www.suse.com/security/cve/CVE-2012-5249/" source="CVE"/>
		<reference ref_id="CVE-2012-5250" ref_url="https://www.suse.com/security/cve/CVE-2012-5250/" source="CVE"/>
		<reference ref_id="CVE-2012-5251" ref_url="https://www.suse.com/security/cve/CVE-2012-5251/" source="CVE"/>
		<reference ref_id="CVE-2012-5252" ref_url="https://www.suse.com/security/cve/CVE-2012-5252/" source="CVE"/>
		<reference ref_id="CVE-2012-5253" ref_url="https://www.suse.com/security/cve/CVE-2012-5253/" source="CVE"/>
		<reference ref_id="CVE-2012-5254" ref_url="https://www.suse.com/security/cve/CVE-2012-5254/" source="CVE"/>
		<reference ref_id="CVE-2012-5255" ref_url="https://www.suse.com/security/cve/CVE-2012-5255/" source="CVE"/>
		<reference ref_id="CVE-2012-5256" ref_url="https://www.suse.com/security/cve/CVE-2012-5256/" source="CVE"/>
		<reference ref_id="CVE-2012-5257" ref_url="https://www.suse.com/security/cve/CVE-2012-5257/" source="CVE"/>
		<reference ref_id="CVE-2012-5258" ref_url="https://www.suse.com/security/cve/CVE-2012-5258/" source="CVE"/>
		<reference ref_id="CVE-2012-5259" ref_url="https://www.suse.com/security/cve/CVE-2012-5259/" source="CVE"/>
		<reference ref_id="CVE-2012-5260" ref_url="https://www.suse.com/security/cve/CVE-2012-5260/" source="CVE"/>
		<reference ref_id="CVE-2012-5261" ref_url="https://www.suse.com/security/cve/CVE-2012-5261/" source="CVE"/>
		<reference ref_id="CVE-2012-5262" ref_url="https://www.suse.com/security/cve/CVE-2012-5262/" source="CVE"/>
		<reference ref_id="CVE-2012-5263" ref_url="https://www.suse.com/security/cve/CVE-2012-5263/" source="CVE"/>
		<reference ref_id="CVE-2012-5264" ref_url="https://www.suse.com/security/cve/CVE-2012-5264/" source="CVE"/>
		<reference ref_id="CVE-2012-5265" ref_url="https://www.suse.com/security/cve/CVE-2012-5265/" source="CVE"/>
		<reference ref_id="CVE-2012-5266" ref_url="https://www.suse.com/security/cve/CVE-2012-5266/" source="CVE"/>
		<reference ref_id="CVE-2012-5267" ref_url="https://www.suse.com/security/cve/CVE-2012-5267/" source="CVE"/>
		<reference ref_id="CVE-2012-5268" ref_url="https://www.suse.com/security/cve/CVE-2012-5268/" source="CVE"/>
		<reference ref_id="CVE-2012-5269" ref_url="https://www.suse.com/security/cve/CVE-2012-5269/" source="CVE"/>
		<reference ref_id="CVE-2012-5270" ref_url="https://www.suse.com/security/cve/CVE-2012-5270/" source="CVE"/>
		<reference ref_id="CVE-2012-5271" ref_url="https://www.suse.com/security/cve/CVE-2012-5271/" source="CVE"/>
		<reference ref_id="CVE-2012-5272" ref_url="https://www.suse.com/security/cve/CVE-2012-5272/" source="CVE"/>
		<reference ref_id="CVE-2012-5274" ref_url="https://www.suse.com/security/cve/CVE-2012-5274/" source="CVE"/>
		<reference ref_id="CVE-2012-5275" ref_url="https://www.suse.com/security/cve/CVE-2012-5275/" source="CVE"/>
		<reference ref_id="CVE-2012-5276" ref_url="https://www.suse.com/security/cve/CVE-2012-5276/" source="CVE"/>
		<reference ref_id="CVE-2012-5277" ref_url="https://www.suse.com/security/cve/CVE-2012-5277/" source="CVE"/>
		<reference ref_id="CVE-2012-5278" ref_url="https://www.suse.com/security/cve/CVE-2012-5278/" source="CVE"/>
		<reference ref_id="CVE-2012-5279" ref_url="https://www.suse.com/security/cve/CVE-2012-5279/" source="CVE"/>
		<reference ref_id="CVE-2012-5280" ref_url="https://www.suse.com/security/cve/CVE-2012-5280/" source="CVE"/>
		<reference ref_id="CVE-2012-5676" ref_url="https://www.suse.com/security/cve/CVE-2012-5676/" source="CVE"/>
		<reference ref_id="CVE-2012-5677" ref_url="https://www.suse.com/security/cve/CVE-2012-5677/" source="CVE"/>
		<reference ref_id="CVE-2012-5678" ref_url="https://www.suse.com/security/cve/CVE-2012-5678/" source="CVE"/>
		<reference ref_id="CVE-2013-0504" ref_url="https://www.suse.com/security/cve/CVE-2013-0504/" source="CVE"/>
		<reference ref_id="CVE-2013-0630" ref_url="https://www.suse.com/security/cve/CVE-2013-0630/" source="CVE"/>
		<reference ref_id="CVE-2013-0633" ref_url="https://www.suse.com/security/cve/CVE-2013-0633/" source="CVE"/>
		<reference ref_id="CVE-2013-0634" ref_url="https://www.suse.com/security/cve/CVE-2013-0634/" source="CVE"/>
		<reference ref_id="CVE-2013-0637" ref_url="https://www.suse.com/security/cve/CVE-2013-0637/" source="CVE"/>
		<reference ref_id="CVE-2013-0638" ref_url="https://www.suse.com/security/cve/CVE-2013-0638/" source="CVE"/>
		<reference ref_id="CVE-2013-0639" ref_url="https://www.suse.com/security/cve/CVE-2013-0639/" source="CVE"/>
		<reference ref_id="CVE-2013-0642" ref_url="https://www.suse.com/security/cve/CVE-2013-0642/" source="CVE"/>
		<reference ref_id="CVE-2013-0643" ref_url="https://www.suse.com/security/cve/CVE-2013-0643/" source="CVE"/>
		<reference ref_id="CVE-2013-0644" ref_url="https://www.suse.com/security/cve/CVE-2013-0644/" source="CVE"/>
		<reference ref_id="CVE-2013-0645" ref_url="https://www.suse.com/security/cve/CVE-2013-0645/" source="CVE"/>
		<reference ref_id="CVE-2013-0646" ref_url="https://www.suse.com/security/cve/CVE-2013-0646/" source="CVE"/>
		<reference ref_id="CVE-2013-0647" ref_url="https://www.suse.com/security/cve/CVE-2013-0647/" source="CVE"/>
		<reference ref_id="CVE-2013-0648" ref_url="https://www.suse.com/security/cve/CVE-2013-0648/" source="CVE"/>
		<reference ref_id="CVE-2013-0649" ref_url="https://www.suse.com/security/cve/CVE-2013-0649/" source="CVE"/>
		<reference ref_id="CVE-2013-0650" ref_url="https://www.suse.com/security/cve/CVE-2013-0650/" source="CVE"/>
		<reference ref_id="CVE-2013-1365" ref_url="https://www.suse.com/security/cve/CVE-2013-1365/" source="CVE"/>
		<reference ref_id="CVE-2013-1366" ref_url="https://www.suse.com/security/cve/CVE-2013-1366/" source="CVE"/>
		<reference ref_id="CVE-2013-1367" ref_url="https://www.suse.com/security/cve/CVE-2013-1367/" source="CVE"/>
		<reference ref_id="CVE-2013-1368" ref_url="https://www.suse.com/security/cve/CVE-2013-1368/" source="CVE"/>
		<reference ref_id="CVE-2013-1369" ref_url="https://www.suse.com/security/cve/CVE-2013-1369/" source="CVE"/>
		<reference ref_id="CVE-2013-1370" ref_url="https://www.suse.com/security/cve/CVE-2013-1370/" source="CVE"/>
		<reference ref_id="CVE-2013-1371" ref_url="https://www.suse.com/security/cve/CVE-2013-1371/" source="CVE"/>
		<reference ref_id="CVE-2013-1372" ref_url="https://www.suse.com/security/cve/CVE-2013-1372/" source="CVE"/>
		<reference ref_id="CVE-2013-1373" ref_url="https://www.suse.com/security/cve/CVE-2013-1373/" source="CVE"/>
		<reference ref_id="CVE-2013-1374" ref_url="https://www.suse.com/security/cve/CVE-2013-1374/" source="CVE"/>
		<reference ref_id="CVE-2013-1375" ref_url="https://www.suse.com/security/cve/CVE-2013-1375/" source="CVE"/>
		<reference ref_id="CVE-2013-1378" ref_url="https://www.suse.com/security/cve/CVE-2013-1378/" source="CVE"/>
		<reference ref_id="CVE-2013-1379" ref_url="https://www.suse.com/security/cve/CVE-2013-1379/" source="CVE"/>
		<reference ref_id="CVE-2013-1380" ref_url="https://www.suse.com/security/cve/CVE-2013-1380/" source="CVE"/>
		<reference ref_id="CVE-2013-2555" ref_url="https://www.suse.com/security/cve/CVE-2013-2555/" source="CVE"/>
		<reference ref_id="CVE-2013-2728" ref_url="https://www.suse.com/security/cve/CVE-2013-2728/" source="CVE"/>
		<reference ref_id="CVE-2013-3324" ref_url="https://www.suse.com/security/cve/CVE-2013-3324/" source="CVE"/>
		<reference ref_id="CVE-2013-3325" ref_url="https://www.suse.com/security/cve/CVE-2013-3325/" source="CVE"/>
		<reference ref_id="CVE-2013-3326" ref_url="https://www.suse.com/security/cve/CVE-2013-3326/" source="CVE"/>
		<reference ref_id="CVE-2013-3327" ref_url="https://www.suse.com/security/cve/CVE-2013-3327/" source="CVE"/>
		<reference ref_id="CVE-2013-3328" ref_url="https://www.suse.com/security/cve/CVE-2013-3328/" source="CVE"/>
		<reference ref_id="CVE-2013-3329" ref_url="https://www.suse.com/security/cve/CVE-2013-3329/" source="CVE"/>
		<reference ref_id="CVE-2013-3330" ref_url="https://www.suse.com/security/cve/CVE-2013-3330/" source="CVE"/>
		<reference ref_id="CVE-2013-3331" ref_url="https://www.suse.com/security/cve/CVE-2013-3331/" source="CVE"/>
		<reference ref_id="CVE-2013-3332" ref_url="https://www.suse.com/security/cve/CVE-2013-3332/" source="CVE"/>
		<reference ref_id="CVE-2013-3333" ref_url="https://www.suse.com/security/cve/CVE-2013-3333/" source="CVE"/>
		<reference ref_id="CVE-2013-3334" ref_url="https://www.suse.com/security/cve/CVE-2013-3334/" source="CVE"/>
		<reference ref_id="CVE-2013-3335" ref_url="https://www.suse.com/security/cve/CVE-2013-3335/" source="CVE"/>
		<reference ref_id="CVE-2013-3343" ref_url="https://www.suse.com/security/cve/CVE-2013-3343/" source="CVE"/>
		<reference ref_id="CVE-2013-3344" ref_url="https://www.suse.com/security/cve/CVE-2013-3344/" source="CVE"/>
		<reference ref_id="CVE-2013-3345" ref_url="https://www.suse.com/security/cve/CVE-2013-3345/" source="CVE"/>
		<reference ref_id="CVE-2013-3347" ref_url="https://www.suse.com/security/cve/CVE-2013-3347/" source="CVE"/>
		<reference ref_id="CVE-2013-3361" ref_url="https://www.suse.com/security/cve/CVE-2013-3361/" source="CVE"/>
		<reference ref_id="CVE-2013-3362" ref_url="https://www.suse.com/security/cve/CVE-2013-3362/" source="CVE"/>
		<reference ref_id="CVE-2013-3363" ref_url="https://www.suse.com/security/cve/CVE-2013-3363/" source="CVE"/>
		<reference ref_id="CVE-2013-5324" ref_url="https://www.suse.com/security/cve/CVE-2013-5324/" source="CVE"/>
		<reference ref_id="CVE-2013-5329" ref_url="https://www.suse.com/security/cve/CVE-2013-5329/" source="CVE"/>
		<reference ref_id="CVE-2013-5330" ref_url="https://www.suse.com/security/cve/CVE-2013-5330/" source="CVE"/>
		<reference ref_id="CVE-2013-5331" ref_url="https://www.suse.com/security/cve/CVE-2013-5331/" source="CVE"/>
		<reference ref_id="CVE-2013-5332" ref_url="https://www.suse.com/security/cve/CVE-2013-5332/" source="CVE"/>
		<reference ref_id="CVE-2014-0491" ref_url="https://www.suse.com/security/cve/CVE-2014-0491/" source="CVE"/>
		<reference ref_id="CVE-2014-0492" ref_url="https://www.suse.com/security/cve/CVE-2014-0492/" source="CVE"/>
		<reference ref_id="CVE-2014-0497" ref_url="https://www.suse.com/security/cve/CVE-2014-0497/" source="CVE"/>
		<reference ref_id="CVE-2014-0498" ref_url="https://www.suse.com/security/cve/CVE-2014-0498/" source="CVE"/>
		<reference ref_id="CVE-2014-0499" ref_url="https://www.suse.com/security/cve/CVE-2014-0499/" source="CVE"/>
		<reference ref_id="CVE-2014-0502" ref_url="https://www.suse.com/security/cve/CVE-2014-0502/" source="CVE"/>
		<reference ref_id="CVE-2014-0503" ref_url="https://www.suse.com/security/cve/CVE-2014-0503/" source="CVE"/>
		<reference ref_id="CVE-2014-0506" ref_url="https://www.suse.com/security/cve/CVE-2014-0506/" source="CVE"/>
		<reference ref_id="CVE-2014-0507" ref_url="https://www.suse.com/security/cve/CVE-2014-0507/" source="CVE"/>
		<reference ref_id="CVE-2014-0508" ref_url="https://www.suse.com/security/cve/CVE-2014-0508/" source="CVE"/>
		<reference ref_id="CVE-2014-0509" ref_url="https://www.suse.com/security/cve/CVE-2014-0509/" source="CVE"/>
		<reference ref_id="CVE-2014-0515" ref_url="https://www.suse.com/security/cve/CVE-2014-0515/" source="CVE"/>
		<reference ref_id="CVE-2014-0516" ref_url="https://www.suse.com/security/cve/CVE-2014-0516/" source="CVE"/>
		<reference ref_id="CVE-2014-0517" ref_url="https://www.suse.com/security/cve/CVE-2014-0517/" source="CVE"/>
		<reference ref_id="CVE-2014-0518" ref_url="https://www.suse.com/security/cve/CVE-2014-0518/" source="CVE"/>
		<reference ref_id="CVE-2014-0519" ref_url="https://www.suse.com/security/cve/CVE-2014-0519/" source="CVE"/>
		<reference ref_id="CVE-2014-0520" ref_url="https://www.suse.com/security/cve/CVE-2014-0520/" source="CVE"/>
		<reference ref_id="CVE-2014-0531" ref_url="https://www.suse.com/security/cve/CVE-2014-0531/" source="CVE"/>
		<reference ref_id="CVE-2014-0532" ref_url="https://www.suse.com/security/cve/CVE-2014-0532/" source="CVE"/>
		<reference ref_id="CVE-2014-0533" ref_url="https://www.suse.com/security/cve/CVE-2014-0533/" source="CVE"/>
		<reference ref_id="CVE-2014-0534" ref_url="https://www.suse.com/security/cve/CVE-2014-0534/" source="CVE"/>
		<reference ref_id="CVE-2014-0535" ref_url="https://www.suse.com/security/cve/CVE-2014-0535/" source="CVE"/>
		<reference ref_id="CVE-2014-0536" ref_url="https://www.suse.com/security/cve/CVE-2014-0536/" source="CVE"/>
		<reference ref_id="CVE-2014-0537" ref_url="https://www.suse.com/security/cve/CVE-2014-0537/" source="CVE"/>
		<reference ref_id="CVE-2014-0538" ref_url="https://www.suse.com/security/cve/CVE-2014-0538/" source="CVE"/>
		<reference ref_id="CVE-2014-0539" ref_url="https://www.suse.com/security/cve/CVE-2014-0539/" source="CVE"/>
		<reference ref_id="CVE-2014-0540" ref_url="https://www.suse.com/security/cve/CVE-2014-0540/" source="CVE"/>
		<reference ref_id="CVE-2014-0541" ref_url="https://www.suse.com/security/cve/CVE-2014-0541/" source="CVE"/>
		<reference ref_id="CVE-2014-0542" ref_url="https://www.suse.com/security/cve/CVE-2014-0542/" source="CVE"/>
		<reference ref_id="CVE-2014-0543" ref_url="https://www.suse.com/security/cve/CVE-2014-0543/" source="CVE"/>
		<reference ref_id="CVE-2014-0544" ref_url="https://www.suse.com/security/cve/CVE-2014-0544/" source="CVE"/>
		<reference ref_id="CVE-2014-0545" ref_url="https://www.suse.com/security/cve/CVE-2014-0545/" source="CVE"/>
		<reference ref_id="CVE-2014-0547" ref_url="https://www.suse.com/security/cve/CVE-2014-0547/" source="CVE"/>
		<reference ref_id="CVE-2014-0548" ref_url="https://www.suse.com/security/cve/CVE-2014-0548/" source="CVE"/>
		<reference ref_id="CVE-2014-0549" ref_url="https://www.suse.com/security/cve/CVE-2014-0549/" source="CVE"/>
		<reference ref_id="CVE-2014-0550" ref_url="https://www.suse.com/security/cve/CVE-2014-0550/" source="CVE"/>
		<reference ref_id="CVE-2014-0551" ref_url="https://www.suse.com/security/cve/CVE-2014-0551/" source="CVE"/>
		<reference ref_id="CVE-2014-0552" ref_url="https://www.suse.com/security/cve/CVE-2014-0552/" source="CVE"/>
		<reference ref_id="CVE-2014-0553" ref_url="https://www.suse.com/security/cve/CVE-2014-0553/" source="CVE"/>
		<reference ref_id="CVE-2014-0554" ref_url="https://www.suse.com/security/cve/CVE-2014-0554/" source="CVE"/>
		<reference ref_id="CVE-2014-0555" ref_url="https://www.suse.com/security/cve/CVE-2014-0555/" source="CVE"/>
		<reference ref_id="CVE-2014-0556" ref_url="https://www.suse.com/security/cve/CVE-2014-0556/" source="CVE"/>
		<reference ref_id="CVE-2014-0557" ref_url="https://www.suse.com/security/cve/CVE-2014-0557/" source="CVE"/>
		<reference ref_id="CVE-2014-0559" ref_url="https://www.suse.com/security/cve/CVE-2014-0559/" source="CVE"/>
		<reference ref_id="CVE-2014-4671" ref_url="https://www.suse.com/security/cve/CVE-2014-4671/" source="CVE"/>
		<description>
These are all security issues fixed in the flash-player-11.2.202.406-1.3 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4546/">CVE-2008-4546</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0901/">CVE-2009-0901</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1862/">CVE-2009-1862</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1863/">CVE-2009-1863</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1864/">CVE-2009-1864</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1865/">CVE-2009-1865</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1866/">CVE-2009-1866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1867/">CVE-2009-1867</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1868/">CVE-2009-1868</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1869/">CVE-2009-1869</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1870/">CVE-2009-1870</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2395/">CVE-2009-2395</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-2493/">CVE-2009-2493</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3793/">CVE-2009-3793</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3794/">CVE-2009-3794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3796/">CVE-2009-3796</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3797/">CVE-2009-3797</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3798/">CVE-2009-3798</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3799/">CVE-2009-3799</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3800/">CVE-2009-3800</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3951/">CVE-2009-3951</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0186/">CVE-2010-0186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0187/">CVE-2010-0187</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0209/">CVE-2010-0209</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1297/">CVE-2010-1297</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2160/">CVE-2010-2160</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2161/">CVE-2010-2161</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2162/">CVE-2010-2162</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2163/">CVE-2010-2163</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2164/">CVE-2010-2164</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2165/">CVE-2010-2165</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2166/">CVE-2010-2166</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2167/">CVE-2010-2167</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2169/">CVE-2010-2169</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2170/">CVE-2010-2170</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2171/">CVE-2010-2171</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2172/">CVE-2010-2172</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2173/">CVE-2010-2173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2174/">CVE-2010-2174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2175/">CVE-2010-2175</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2176/">CVE-2010-2176</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2177/">CVE-2010-2177</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2178/">CVE-2010-2178</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2179/">CVE-2010-2179</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2180/">CVE-2010-2180</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2181/">CVE-2010-2181</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2182/">CVE-2010-2182</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2183/">CVE-2010-2183</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2184/">CVE-2010-2184</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2185/">CVE-2010-2185</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2186/">CVE-2010-2186</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2187/">CVE-2010-2187</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2188/">CVE-2010-2188</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2189/">CVE-2010-2189</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2213/">CVE-2010-2213</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2214/">CVE-2010-2214</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2216/">CVE-2010-2216</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2884/">CVE-2010-2884</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3654/">CVE-2010-3654</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0558/">CVE-2011-0558</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0559/">CVE-2011-0559</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0560/">CVE-2011-0560</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0561/">CVE-2011-0561</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0571/">CVE-2011-0571</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0572/">CVE-2011-0572</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0573/">CVE-2011-0573</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0574/">CVE-2011-0574</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0575/">CVE-2011-0575</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0577/">CVE-2011-0577</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0578/">CVE-2011-0578</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0589/">CVE-2011-0589</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0607/">CVE-2011-0607</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0608/">CVE-2011-0608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0609/">CVE-2011-0609</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0611/">CVE-2011-0611</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0618/">CVE-2011-0618</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0619/">CVE-2011-0619</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0620/">CVE-2011-0620</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0621/">CVE-2011-0621</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0622/">CVE-2011-0622</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0623/">CVE-2011-0623</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0624/">CVE-2011-0624</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0625/">CVE-2011-0625</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0626/">CVE-2011-0626</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0627/">CVE-2011-0627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2107/">CVE-2011-2107</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2110/">CVE-2011-2110</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2130/">CVE-2011-2130</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2134/">CVE-2011-2134</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2135/">CVE-2011-2135</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2136/">CVE-2011-2136</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2137/">CVE-2011-2137</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2138/">CVE-2011-2138</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2139/">CVE-2011-2139</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2140/">CVE-2011-2140</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2414/">CVE-2011-2414</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2415/">CVE-2011-2415</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2416/">CVE-2011-2416</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2417/">CVE-2011-2417</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2425/">CVE-2011-2425</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2445/">CVE-2011-2445</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2450/">CVE-2011-2450</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2451/">CVE-2011-2451</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2452/">CVE-2011-2452</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2453/">CVE-2011-2453</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2454/">CVE-2011-2454</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2455/">CVE-2011-2455</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2456/">CVE-2011-2456</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2457/">CVE-2011-2457</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2458/">CVE-2011-2458</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2459/">CVE-2011-2459</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2460/">CVE-2011-2460</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0751/">CVE-2012-0751</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0752/">CVE-2012-0752</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0753/">CVE-2012-0753</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0754/">CVE-2012-0754</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0755/">CVE-2012-0755</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0756/">CVE-2012-0756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0767/">CVE-2012-0767</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0768/">CVE-2012-0768</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0769/">CVE-2012-0769</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0773/">CVE-2012-0773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0779/">CVE-2012-0779</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1535/">CVE-2012-1535</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-2034/">CVE-2012-2034</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-2035/">CVE-2012-2035</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-2036/">CVE-2012-2036</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-2037/">CVE-2012-2037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2038/">CVE-2012-2038</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-2039/">CVE-2012-2039</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-2040/">CVE-2012-2040</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5248/">CVE-2012-5248</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5249/">CVE-2012-5249</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5250/">CVE-2012-5250</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5251/">CVE-2012-5251</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5252/">CVE-2012-5252</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5253/">CVE-2012-5253</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5254/">CVE-2012-5254</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5255/">CVE-2012-5255</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5256/">CVE-2012-5256</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5257/">CVE-2012-5257</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5258/">CVE-2012-5258</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5259/">CVE-2012-5259</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5260/">CVE-2012-5260</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5261/">CVE-2012-5261</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5262/">CVE-2012-5262</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5263/">CVE-2012-5263</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5264/">CVE-2012-5264</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5265/">CVE-2012-5265</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5266/">CVE-2012-5266</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5267/">CVE-2012-5267</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5268/">CVE-2012-5268</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5269/">CVE-2012-5269</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5270/">CVE-2012-5270</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5271/">CVE-2012-5271</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5272/">CVE-2012-5272</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5274/">CVE-2012-5274</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5275/">CVE-2012-5275</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5276/">CVE-2012-5276</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5277/">CVE-2012-5277</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5278/">CVE-2012-5278</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5279/">CVE-2012-5279</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5280/">CVE-2012-5280</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5676/">CVE-2012-5676</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5677/">CVE-2012-5677</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5678/">CVE-2012-5678</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0504/">CVE-2013-0504</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0630/">CVE-2013-0630</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0633/">CVE-2013-0633</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0634/">CVE-2013-0634</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0637/">CVE-2013-0637</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0638/">CVE-2013-0638</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0639/">CVE-2013-0639</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0642/">CVE-2013-0642</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0643/">CVE-2013-0643</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0644/">CVE-2013-0644</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0645/">CVE-2013-0645</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0646/">CVE-2013-0646</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0647/">CVE-2013-0647</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0648/">CVE-2013-0648</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0649/">CVE-2013-0649</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0650/">CVE-2013-0650</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1365/">CVE-2013-1365</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1366/">CVE-2013-1366</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1367/">CVE-2013-1367</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1368/">CVE-2013-1368</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1369/">CVE-2013-1369</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1370/">CVE-2013-1370</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1371/">CVE-2013-1371</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1372/">CVE-2013-1372</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1373/">CVE-2013-1373</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1374/">CVE-2013-1374</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1375/">CVE-2013-1375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1378/">CVE-2013-1378</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1379/">CVE-2013-1379</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1380/">CVE-2013-1380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2555/">CVE-2013-2555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2728/">CVE-2013-2728</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3324/">CVE-2013-3324</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3325/">CVE-2013-3325</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3326/">CVE-2013-3326</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3327/">CVE-2013-3327</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3328/">CVE-2013-3328</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3329/">CVE-2013-3329</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3330/">CVE-2013-3330</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3331/">CVE-2013-3331</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3332/">CVE-2013-3332</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3333/">CVE-2013-3333</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3334/">CVE-2013-3334</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3335/">CVE-2013-3335</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3343/">CVE-2013-3343</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3344/">CVE-2013-3344</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3345/">CVE-2013-3345</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3347/">CVE-2013-3347</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3361/">CVE-2013-3361</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3362/">CVE-2013-3362</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3363/">CVE-2013-3363</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5324/">CVE-2013-5324</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5329/">CVE-2013-5329</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5330/">CVE-2013-5330</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5331/">CVE-2013-5331</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5332/">CVE-2013-5332</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0491/">CVE-2014-0491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0492/">CVE-2014-0492</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0497/">CVE-2014-0497</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0498/">CVE-2014-0498</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0499/">CVE-2014-0499</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0502/">CVE-2014-0502</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0503/">CVE-2014-0503</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0506/">CVE-2014-0506</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0507/">CVE-2014-0507</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0508/">CVE-2014-0508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0509/">CVE-2014-0509</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0515/">CVE-2014-0515</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0516/">CVE-2014-0516</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0517/">CVE-2014-0517</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0518/">CVE-2014-0518</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0519/">CVE-2014-0519</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0520/">CVE-2014-0520</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0531/">CVE-2014-0531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0532/">CVE-2014-0532</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0533/">CVE-2014-0533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0534/">CVE-2014-0534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0535/">CVE-2014-0535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0536/">CVE-2014-0536</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0537/">CVE-2014-0537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0538/">CVE-2014-0538</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0539/">CVE-2014-0539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0540/">CVE-2014-0540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0541/">CVE-2014-0541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0542/">CVE-2014-0542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0543/">CVE-2014-0543</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0544/">CVE-2014-0544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0545/">CVE-2014-0545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0547/">CVE-2014-0547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0548/">CVE-2014-0548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0549/">CVE-2014-0549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0550/">CVE-2014-0550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0551/">CVE-2014-0551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0552/">CVE-2014-0552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0553/">CVE-2014-0553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0554/">CVE-2014-0554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0555/">CVE-2014-0555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0556/">CVE-2014-0556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0557/">CVE-2014-0557</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0559/">CVE-2014-0559</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-4671/">CVE-2014-4671</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141340" comment="flash-player-11.2.202.406-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141341" comment="flash-player-gnome-11.2.202.406-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75720" version="1" class="patch">
	<metadata>
		<title>freerdp-1.0.2-7.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2014-0250" ref_url="https://www.suse.com/security/cve/CVE-2014-0250/" source="CVE"/>
		<reference ref_id="CVE-2014-0791" ref_url="https://www.suse.com/security/cve/CVE-2014-0791/" source="CVE"/>
		<description>
These are all security issues fixed in the freerdp-1.0.2-7.9 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0250/">CVE-2014-0250</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0791/">CVE-2014-0791</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141342" comment="freerdp-1.0.2-7.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141343" comment="libfreerdp-1_0-1.0.2-7.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141344" comment="libfreerdp-1_0-plugins-1.0.2-7.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75721" version="1" class="patch">
	<metadata>
		<title>ft2demos-2.5.3-2.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-0946" ref_url="https://www.suse.com/security/cve/CVE-2009-0946/" source="CVE"/>
		<reference ref_id="CVE-2010-2497" ref_url="https://www.suse.com/security/cve/CVE-2010-2497/" source="CVE"/>
		<reference ref_id="CVE-2010-2805" ref_url="https://www.suse.com/security/cve/CVE-2010-2805/" source="CVE"/>
		<reference ref_id="CVE-2010-3053" ref_url="https://www.suse.com/security/cve/CVE-2010-3053/" source="CVE"/>
		<reference ref_id="CVE-2010-3054" ref_url="https://www.suse.com/security/cve/CVE-2010-3054/" source="CVE"/>
		<reference ref_id="CVE-2010-3311" ref_url="https://www.suse.com/security/cve/CVE-2010-3311/" source="CVE"/>
		<reference ref_id="CVE-2010-3814" ref_url="https://www.suse.com/security/cve/CVE-2010-3814/" source="CVE"/>
		<reference ref_id="CVE-2011-0226" ref_url="https://www.suse.com/security/cve/CVE-2011-0226/" source="CVE"/>
		<reference ref_id="CVE-2012-5668" ref_url="https://www.suse.com/security/cve/CVE-2012-5668/" source="CVE"/>
		<reference ref_id="CVE-2012-5669" ref_url="https://www.suse.com/security/cve/CVE-2012-5669/" source="CVE"/>
		<reference ref_id="CVE-2012-5670" ref_url="https://www.suse.com/security/cve/CVE-2012-5670/" source="CVE"/>
		<description>
These are all security issues fixed in the ft2demos-2.5.3-2.11 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0946/">CVE-2009-0946</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2497/">CVE-2010-2497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2805/">CVE-2010-2805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3053/">CVE-2010-3053</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3054/">CVE-2010-3054</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3311/">CVE-2010-3311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3814/">CVE-2010-3814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0226/">CVE-2011-0226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5668/">CVE-2012-5668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5669/">CVE-2012-5669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5670/">CVE-2012-5670</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141345" comment="ft2demos-2.5.3-2.11 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75722" version="1" class="patch">
	<metadata>
		<title>fuse-2.9.3-3.65 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-3297" ref_url="https://www.suse.com/security/cve/CVE-2009-3297/" source="CVE"/>
		<reference ref_id="CVE-2011-0541" ref_url="https://www.suse.com/security/cve/CVE-2011-0541/" source="CVE"/>
		<description>
These are all security issues fixed in the fuse-2.9.3-3.65 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3297/">CVE-2009-3297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0541/">CVE-2011-0541</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141346" comment="fuse-2.9.3-3.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141347" comment="libfuse2-2.9.3-3.65 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75723" version="1" class="patch">
	<metadata>
		<title>g3utils-1.1.36-54.100 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2008-4936" ref_url="https://www.suse.com/security/cve/CVE-2008-4936/" source="CVE"/>
		<description>
These are all security issues fixed in the g3utils-1.1.36-54.100 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4936/">CVE-2008-4936</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141348" comment="g3utils-1.1.36-54.100 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141349" comment="mgetty-1.1.36-54.100 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75724" version="1" class="patch">
	<metadata>
		<title>gd-2.1.0-3.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2014-2497" ref_url="https://www.suse.com/security/cve/CVE-2014-2497/" source="CVE"/>
		<description>
These are all security issues fixed in the gd-2.1.0-3.12 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2497/">CVE-2014-2497</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141350" comment="gd-2.1.0-3.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141351" comment="gd-32bit-2.1.0-3.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75725" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-lang-2.30.6-1.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-2485" ref_url="https://www.suse.com/security/cve/CVE-2011-2485/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-lang-2.30.6-1.23 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2485/">CVE-2011-2485</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141352" comment="gdk-pixbuf-lang-2.30.6-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141353" comment="gdk-pixbuf-query-loaders-2.30.6-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141354" comment="gdk-pixbuf-query-loaders-32bit-2.30.6-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141355" comment="libgdk_pixbuf-2_0-0-2.30.6-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141356" comment="libgdk_pixbuf-2_0-0-32bit-2.30.6-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141357" comment="typelib-1_0-GdkPixbuf-2_0-2.30.6-1.23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75726" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-loader-rsvg-2.40.2-1.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-3146" ref_url="https://www.suse.com/security/cve/CVE-2011-3146/" source="CVE"/>
		<reference ref_id="CVE-2013-1881" ref_url="https://www.suse.com/security/cve/CVE-2013-1881/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-loader-rsvg-2.40.2-1.13 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3146/">CVE-2011-3146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1881/">CVE-2013-1881</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141358" comment="gdk-pixbuf-loader-rsvg-2.40.2-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141359" comment="librsvg-2-2-2.40.2-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141360" comment="librsvg-2-2-32bit-2.40.2-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141361" comment="rsvg-view-2.40.2-1.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75727" version="1" class="patch">
	<metadata>
		<title>gdm-3.10.0.1-13.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-1709" ref_url="https://www.suse.com/security/cve/CVE-2011-1709/" source="CVE"/>
		<description>
These are all security issues fixed in the gdm-3.10.0.1-13.3 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1709/">CVE-2011-1709</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141362" comment="gdm-3.10.0.1-13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141363" comment="gdm-branding-upstream-3.10.0.1-13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141364" comment="gdm-lang-3.10.0.1-13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141365" comment="gdmflexiserver-3.10.0.1-13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141366" comment="libgdm1-3.10.0.1-13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141367" comment="typelib-1_0-Gdm-1_0-3.10.0.1-13.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75728" version="1" class="patch">
	<metadata>
		<title>gimp-2.8.10-1.164 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2010-4540" ref_url="https://www.suse.com/security/cve/CVE-2010-4540/" source="CVE"/>
		<reference ref_id="CVE-2010-4541" ref_url="https://www.suse.com/security/cve/CVE-2010-4541/" source="CVE"/>
		<reference ref_id="CVE-2010-4542" ref_url="https://www.suse.com/security/cve/CVE-2010-4542/" source="CVE"/>
		<reference ref_id="CVE-2010-4543" ref_url="https://www.suse.com/security/cve/CVE-2010-4543/" source="CVE"/>
		<reference ref_id="CVE-2011-2896" ref_url="https://www.suse.com/security/cve/CVE-2011-2896/" source="CVE"/>
		<reference ref_id="CVE-2012-3236" ref_url="https://www.suse.com/security/cve/CVE-2012-3236/" source="CVE"/>
		<reference ref_id="CVE-2012-5576" ref_url="https://www.suse.com/security/cve/CVE-2012-5576/" source="CVE"/>
		<description>
These are all security issues fixed in the gimp-2.8.10-1.164 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4540/">CVE-2010-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4541/">CVE-2010-4541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4542/">CVE-2010-4542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4543/">CVE-2010-4543</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2896/">CVE-2011-2896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3236/">CVE-2012-3236</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5576/">CVE-2012-5576</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141368" comment="gimp-2.8.10-1.164 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141369" comment="gimp-lang-2.8.10-1.164 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141370" comment="gimp-plugins-python-2.8.10-1.164 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141371" comment="libgimp-2_0-0-2.8.10-1.164 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141372" comment="libgimpui-2_0-0-2.8.10-1.164 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75729" version="1" class="patch">
	<metadata>
		<title>glib2-lang-2.38.2-5.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2008-4316" ref_url="https://www.suse.com/security/cve/CVE-2008-4316/" source="CVE"/>
		<reference ref_id="CVE-2012-3524" ref_url="https://www.suse.com/security/cve/CVE-2012-3524/" source="CVE"/>
		<description>
These are all security issues fixed in the glib2-lang-2.38.2-5.12 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4316/">CVE-2008-4316</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3524/">CVE-2012-3524</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141373" comment="glib2-lang-2.38.2-5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141374" comment="glib2-tools-2.38.2-5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141375" comment="libgio-2_0-0-2.38.2-5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141376" comment="libgio-2_0-0-32bit-2.38.2-5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141377" comment="libgio-fam-2.38.2-5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141378" comment="libglib-2_0-0-2.38.2-5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141379" comment="libglib-2_0-0-32bit-2.38.2-5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141380" comment="libgmodule-2_0-0-2.38.2-5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141381" comment="libgmodule-2_0-0-32bit-2.38.2-5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141382" comment="libgobject-2_0-0-2.38.2-5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141383" comment="libgobject-2_0-0-32bit-2.38.2-5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141384" comment="libgthread-2_0-0-2.38.2-5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141385" comment="libgthread-2_0-0-32bit-2.38.2-5.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75730" version="1" class="patch">
	<metadata>
		<title>glibc-2.19-17.72 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-5029" ref_url="https://www.suse.com/security/cve/CVE-2009-5029/" source="CVE"/>
		<reference ref_id="CVE-2012-4412" ref_url="https://www.suse.com/security/cve/CVE-2012-4412/" source="CVE"/>
		<reference ref_id="CVE-2013-0242" ref_url="https://www.suse.com/security/cve/CVE-2013-0242/" source="CVE"/>
		<reference ref_id="CVE-2013-1914" ref_url="https://www.suse.com/security/cve/CVE-2013-1914/" source="CVE"/>
		<reference ref_id="CVE-2013-2207" ref_url="https://www.suse.com/security/cve/CVE-2013-2207/" source="CVE"/>
		<reference ref_id="CVE-2013-4237" ref_url="https://www.suse.com/security/cve/CVE-2013-4237/" source="CVE"/>
		<reference ref_id="CVE-2013-4332" ref_url="https://www.suse.com/security/cve/CVE-2013-4332/" source="CVE"/>
		<reference ref_id="CVE-2013-4458" ref_url="https://www.suse.com/security/cve/CVE-2013-4458/" source="CVE"/>
		<reference ref_id="CVE-2014-0475" ref_url="https://www.suse.com/security/cve/CVE-2014-0475/" source="CVE"/>
		<reference ref_id="CVE-2014-4043" ref_url="https://www.suse.com/security/cve/CVE-2014-4043/" source="CVE"/>
		<reference ref_id="CVE-2014-5119" ref_url="https://www.suse.com/security/cve/CVE-2014-5119/" source="CVE"/>
		<reference ref_id="CVE-2014-6040" ref_url="https://www.suse.com/security/cve/CVE-2014-6040/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-2.19-17.72 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5029/">CVE-2009-5029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4412/">CVE-2012-4412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0242/">CVE-2013-0242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1914/">CVE-2013-1914</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2207/">CVE-2013-2207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4237/">CVE-2013-4237</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4332/">CVE-2013-4332</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4458/">CVE-2013-4458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0475/">CVE-2014-0475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4043/">CVE-2014-4043</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5119/">CVE-2014-5119</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6040/">CVE-2014-6040</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141386" comment="glibc-2.19-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141387" comment="glibc-32bit-2.19-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141388" comment="glibc-devel-2.19-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141389" comment="glibc-devel-32bit-2.19-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141390" comment="glibc-i18ndata-2.19-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141391" comment="glibc-locale-2.19-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141392" comment="glibc-locale-32bit-2.19-17.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141393" comment="nscd-2.19-17.72 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75731" version="1" class="patch">
	<metadata>
		<title>gnome-keyring-3.10.1-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2012-3466" ref_url="https://www.suse.com/security/cve/CVE-2012-3466/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-keyring-3.10.1-4.1 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3466/">CVE-2012-3466</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141394" comment="gnome-keyring-3.10.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141395" comment="gnome-keyring-32bit-3.10.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141396" comment="gnome-keyring-lang-3.10.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141397" comment="gnome-keyring-pam-3.10.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141398" comment="gnome-keyring-pam-32bit-3.10.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141399" comment="libgck-modules-gnome-keyring-3.10.1-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75732" version="1" class="patch">
	<metadata>
		<title>gnome-online-accounts-3.10.5-1.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-0240" ref_url="https://www.suse.com/security/cve/CVE-2013-0240/" source="CVE"/>
		<reference ref_id="CVE-2013-1799" ref_url="https://www.suse.com/security/cve/CVE-2013-1799/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-online-accounts-3.10.5-1.11 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0240/">CVE-2013-0240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1799/">CVE-2013-1799</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141400" comment="gnome-online-accounts-3.10.5-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141401" comment="gnome-online-accounts-lang-3.10.5-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141402" comment="libgoa-1_0-0-3.10.5-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141403" comment="libgoa-backend-1_0-1-3.10.5-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141404" comment="typelib-1_0-Goa-1_0-3.10.5-1.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75733" version="1" class="patch">
	<metadata>
		<title>gnome-shell-3.10.4-22.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2010-4000" ref_url="https://www.suse.com/security/cve/CVE-2010-4000/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-shell-3.10.4-22.13 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4000/">CVE-2010-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141405" comment="gnome-shell-3.10.4-22.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141406" comment="gnome-shell-browser-plugin-3.10.4-22.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141407" comment="gnome-shell-calendar-3.10.4-22.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141408" comment="gnome-shell-lang-3.10.4-22.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75734" version="1" class="patch">
	<metadata>
		<title>gnutls-3.2.15-1.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2008-4989" ref_url="https://www.suse.com/security/cve/CVE-2008-4989/" source="CVE"/>
		<reference ref_id="CVE-2011-4128" ref_url="https://www.suse.com/security/cve/CVE-2011-4128/" source="CVE"/>
		<reference ref_id="CVE-2012-0390" ref_url="https://www.suse.com/security/cve/CVE-2012-0390/" source="CVE"/>
		<reference ref_id="CVE-2012-1569" ref_url="https://www.suse.com/security/cve/CVE-2012-1569/" source="CVE"/>
		<reference ref_id="CVE-2012-1573" ref_url="https://www.suse.com/security/cve/CVE-2012-1573/" source="CVE"/>
		<reference ref_id="CVE-2014-0092" ref_url="https://www.suse.com/security/cve/CVE-2014-0092/" source="CVE"/>
		<reference ref_id="CVE-2014-1959" ref_url="https://www.suse.com/security/cve/CVE-2014-1959/" source="CVE"/>
		<reference ref_id="CVE-2014-3466" ref_url="https://www.suse.com/security/cve/CVE-2014-3466/" source="CVE"/>
		<description>
These are all security issues fixed in the gnutls-3.2.15-1.8 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4989/">CVE-2008-4989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4128/">CVE-2011-4128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0390/">CVE-2012-0390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1569/">CVE-2012-1569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1573/">CVE-2012-1573</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0092/">CVE-2014-0092</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1959/">CVE-2014-1959</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3466/">CVE-2014-3466</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141409" comment="gnutls-3.2.15-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141410" comment="libgnutls28-3.2.15-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141411" comment="libgnutls28-32bit-3.2.15-1.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75735" version="1" class="patch">
	<metadata>
		<title>gpg2-2.0.24-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2010-2547" ref_url="https://www.suse.com/security/cve/CVE-2010-2547/" source="CVE"/>
		<reference ref_id="CVE-2013-4351" ref_url="https://www.suse.com/security/cve/CVE-2013-4351/" source="CVE"/>
		<reference ref_id="CVE-2013-4402" ref_url="https://www.suse.com/security/cve/CVE-2013-4402/" source="CVE"/>
		<reference ref_id="CVE-2014-4617" ref_url="https://www.suse.com/security/cve/CVE-2014-4617/" source="CVE"/>
		<description>
These are all security issues fixed in the gpg2-2.0.24-1.5 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2547/">CVE-2010-2547</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4351/">CVE-2013-4351</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4402/">CVE-2013-4402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4617/">CVE-2014-4617</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141412" comment="gpg2-2.0.24-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141413" comment="gpg2-lang-2.0.24-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75736" version="1" class="patch">
	<metadata>
		<title>gpgme-1.5.1-1.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2014-3564" ref_url="https://www.suse.com/security/cve/CVE-2014-3564/" source="CVE"/>
		<description>
These are all security issues fixed in the gpgme-1.5.1-1.12 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3564/">CVE-2014-3564</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140643" comment="gpgme-1.5.1-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140644" comment="libgpgme11-1.5.1-1.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75737" version="1" class="patch">
	<metadata>
		<title>groff-1.22.2-5.429 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-5044" ref_url="https://www.suse.com/security/cve/CVE-2009-5044/" source="CVE"/>
		<reference ref_id="CVE-2009-5080" ref_url="https://www.suse.com/security/cve/CVE-2009-5080/" source="CVE"/>
		<reference ref_id="CVE-2009-5081" ref_url="https://www.suse.com/security/cve/CVE-2009-5081/" source="CVE"/>
		<description>
These are all security issues fixed in the groff-1.22.2-5.429 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5044/">CVE-2009-5044</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-5080/">CVE-2009-5080</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-5081/">CVE-2009-5081</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140645" comment="groff-1.22.2-5.429 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75738" version="1" class="patch">
	<metadata>
		<title>gvim-7.4.326-2.62 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-0316" ref_url="https://www.suse.com/security/cve/CVE-2009-0316/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-7.4.326-2.62 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0316/">CVE-2009-0316</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140673" comment="gvim-7.4.326-2.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140674" comment="vim-7.4.326-2.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140675" comment="vim-data-7.4.326-2.62 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75739" version="1" class="patch">
	<metadata>
		<title>gzip-1.6-7.392 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-2624" ref_url="https://www.suse.com/security/cve/CVE-2009-2624/" source="CVE"/>
		<reference ref_id="CVE-2010-0001" ref_url="https://www.suse.com/security/cve/CVE-2010-0001/" source="CVE"/>
		<description>
These are all security issues fixed in the gzip-1.6-7.392 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2624/">CVE-2009-2624</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0001/">CVE-2010-0001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140677" comment="gzip-1.6-7.392 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75740" version="1" class="patch">
	<metadata>
		<title>hardlink-1.0-6.45 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-3630" ref_url="https://www.suse.com/security/cve/CVE-2011-3630/" source="CVE"/>
		<reference ref_id="CVE-2011-3631" ref_url="https://www.suse.com/security/cve/CVE-2011-3631/" source="CVE"/>
		<reference ref_id="CVE-2011-3632" ref_url="https://www.suse.com/security/cve/CVE-2011-3632/" source="CVE"/>
		<description>
These are all security issues fixed in the hardlink-1.0-6.45 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3630/">CVE-2011-3630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3631/">CVE-2011-3631</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3632/">CVE-2011-3632</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140678" comment="hardlink-1.0-6.45 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75741" version="1" class="patch">
	<metadata>
		<title>hplip-3.14.6-3.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2004-0801" ref_url="https://www.suse.com/security/cve/CVE-2004-0801/" source="CVE"/>
		<reference ref_id="CVE-2010-4267" ref_url="https://www.suse.com/security/cve/CVE-2010-4267/" source="CVE"/>
		<reference ref_id="CVE-2011-2697" ref_url="https://www.suse.com/security/cve/CVE-2011-2697/" source="CVE"/>
		<reference ref_id="CVE-2011-2722" ref_url="https://www.suse.com/security/cve/CVE-2011-2722/" source="CVE"/>
		<reference ref_id="CVE-2013-4325" ref_url="https://www.suse.com/security/cve/CVE-2013-4325/" source="CVE"/>
		<reference ref_id="CVE-2013-6402" ref_url="https://www.suse.com/security/cve/CVE-2013-6402/" source="CVE"/>
		<reference ref_id="CVE-2013-6427" ref_url="https://www.suse.com/security/cve/CVE-2013-6427/" source="CVE"/>
		<description>
These are all security issues fixed in the hplip-3.14.6-3.14 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2004-0801/">CVE-2004-0801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4267/">CVE-2010-4267</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2697/">CVE-2011-2697</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-2722/">CVE-2011-2722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4325/">CVE-2013-4325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6402/">CVE-2013-6402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6427/">CVE-2013-6427</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141414" comment="hplip-3.14.6-3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141415" comment="hplip-hpijs-3.14.6-3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141416" comment="hplip-sane-3.14.6-3.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75742" version="1" class="patch">
	<metadata>
		<title>ibus-chewing-1.4.10.1-2.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-4509" ref_url="https://www.suse.com/security/cve/CVE-2013-4509/" source="CVE"/>
		<description>
These are all security issues fixed in the ibus-chewing-1.4.10.1-2.25 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4509/">CVE-2013-4509</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141417" comment="ibus-chewing-1.4.10.1-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141418" comment="ibus-pinyin-1.5.0-2.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75743" version="1" class="patch">
	<metadata>
		<title>iputils-s20121221-2.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2010-2529" ref_url="https://www.suse.com/security/cve/CVE-2010-2529/" source="CVE"/>
		<description>
These are all security issues fixed in the iputils-s20121221-2.19 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2529/">CVE-2010-2529</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140686" comment="iputils-s20121221-2.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75744" version="1" class="patch">
	<metadata>
		<title>java-1_7_0-openjdk-1.7.0.65-3.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-3563" ref_url="https://www.suse.com/security/cve/CVE-2011-3563/" source="CVE"/>
		<reference ref_id="CVE-2011-3571" ref_url="https://www.suse.com/security/cve/CVE-2011-3571/" source="CVE"/>
		<reference ref_id="CVE-2011-5035" ref_url="https://www.suse.com/security/cve/CVE-2011-5035/" source="CVE"/>
		<reference ref_id="CVE-2012-0497" ref_url="https://www.suse.com/security/cve/CVE-2012-0497/" source="CVE"/>
		<reference ref_id="CVE-2012-0501" ref_url="https://www.suse.com/security/cve/CVE-2012-0501/" source="CVE"/>
		<reference ref_id="CVE-2012-0502" ref_url="https://www.suse.com/security/cve/CVE-2012-0502/" source="CVE"/>
		<reference ref_id="CVE-2012-0503" ref_url="https://www.suse.com/security/cve/CVE-2012-0503/" source="CVE"/>
		<reference ref_id="CVE-2012-0505" ref_url="https://www.suse.com/security/cve/CVE-2012-0505/" source="CVE"/>
		<reference ref_id="CVE-2012-0506" ref_url="https://www.suse.com/security/cve/CVE-2012-0506/" source="CVE"/>
		<reference ref_id="CVE-2012-0547" ref_url="https://www.suse.com/security/cve/CVE-2012-0547/" source="CVE"/>
		<reference ref_id="CVE-2012-1682" ref_url="https://www.suse.com/security/cve/CVE-2012-1682/" source="CVE"/>
		<reference ref_id="CVE-2012-1711" ref_url="https://www.suse.com/security/cve/CVE-2012-1711/" source="CVE"/>
		<reference ref_id="CVE-2012-1713" ref_url="https://www.suse.com/security/cve/CVE-2012-1713/" source="CVE"/>
		<reference ref_id="CVE-2012-1716" ref_url="https://www.suse.com/security/cve/CVE-2012-1716/" source="CVE"/>
		<reference ref_id="CVE-2012-1717" ref_url="https://www.suse.com/security/cve/CVE-2012-1717/" source="CVE"/>
		<reference ref_id="CVE-2012-1718" ref_url="https://www.suse.com/security/cve/CVE-2012-1718/" source="CVE"/>
		<reference ref_id="CVE-2012-1719" ref_url="https://www.suse.com/security/cve/CVE-2012-1719/" source="CVE"/>
		<reference ref_id="CVE-2012-1723" ref_url="https://www.suse.com/security/cve/CVE-2012-1723/" source="CVE"/>
		<reference ref_id="CVE-2012-1724" ref_url="https://www.suse.com/security/cve/CVE-2012-1724/" source="CVE"/>
		<reference ref_id="CVE-2012-1725" ref_url="https://www.suse.com/security/cve/CVE-2012-1725/" source="CVE"/>
		<reference ref_id="CVE-2012-1726" ref_url="https://www.suse.com/security/cve/CVE-2012-1726/" source="CVE"/>
		<reference ref_id="CVE-2012-3136" ref_url="https://www.suse.com/security/cve/CVE-2012-3136/" source="CVE"/>
		<reference ref_id="CVE-2012-3174" ref_url="https://www.suse.com/security/cve/CVE-2012-3174/" source="CVE"/>
		<reference ref_id="CVE-2012-3216" ref_url="https://www.suse.com/security/cve/CVE-2012-3216/" source="CVE"/>
		<reference ref_id="CVE-2012-4416" ref_url="https://www.suse.com/security/cve/CVE-2012-4416/" source="CVE"/>
		<reference ref_id="CVE-2012-4681" ref_url="https://www.suse.com/security/cve/CVE-2012-4681/" source="CVE"/>
		<reference ref_id="CVE-2012-5068" ref_url="https://www.suse.com/security/cve/CVE-2012-5068/" source="CVE"/>
		<reference ref_id="CVE-2012-5069" ref_url="https://www.suse.com/security/cve/CVE-2012-5069/" source="CVE"/>
		<reference ref_id="CVE-2012-5070" ref_url="https://www.suse.com/security/cve/CVE-2012-5070/" source="CVE"/>
		<reference ref_id="CVE-2012-5071" ref_url="https://www.suse.com/security/cve/CVE-2012-5071/" source="CVE"/>
		<reference ref_id="CVE-2012-5072" ref_url="https://www.suse.com/security/cve/CVE-2012-5072/" source="CVE"/>
		<reference ref_id="CVE-2012-5073" ref_url="https://www.suse.com/security/cve/CVE-2012-5073/" source="CVE"/>
		<reference ref_id="CVE-2012-5074" ref_url="https://www.suse.com/security/cve/CVE-2012-5074/" source="CVE"/>
		<reference ref_id="CVE-2012-5075" ref_url="https://www.suse.com/security/cve/CVE-2012-5075/" source="CVE"/>
		<reference ref_id="CVE-2012-5076" ref_url="https://www.suse.com/security/cve/CVE-2012-5076/" source="CVE"/>
		<reference ref_id="CVE-2012-5077" ref_url="https://www.suse.com/security/cve/CVE-2012-5077/" source="CVE"/>
		<reference ref_id="CVE-2012-5079" ref_url="https://www.suse.com/security/cve/CVE-2012-5079/" source="CVE"/>
		<reference ref_id="CVE-2012-5081" ref_url="https://www.suse.com/security/cve/CVE-2012-5081/" source="CVE"/>
		<reference ref_id="CVE-2012-5084" ref_url="https://www.suse.com/security/cve/CVE-2012-5084/" source="CVE"/>
		<reference ref_id="CVE-2012-5085" ref_url="https://www.suse.com/security/cve/CVE-2012-5085/" source="CVE"/>
		<reference ref_id="CVE-2012-5086" ref_url="https://www.suse.com/security/cve/CVE-2012-5086/" source="CVE"/>
		<reference ref_id="CVE-2012-5087" ref_url="https://www.suse.com/security/cve/CVE-2012-5087/" source="CVE"/>
		<reference ref_id="CVE-2012-5088" ref_url="https://www.suse.com/security/cve/CVE-2012-5088/" source="CVE"/>
		<reference ref_id="CVE-2012-5089" ref_url="https://www.suse.com/security/cve/CVE-2012-5089/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2013-0401" ref_url="https://www.suse.com/security/cve/CVE-2013-0401/" source="CVE"/>
		<reference ref_id="CVE-2013-0422" ref_url="https://www.suse.com/security/cve/CVE-2013-0422/" source="CVE"/>
		<reference ref_id="CVE-2013-0424" ref_url="https://www.suse.com/security/cve/CVE-2013-0424/" source="CVE"/>
		<reference ref_id="CVE-2013-0425" ref_url="https://www.suse.com/security/cve/CVE-2013-0425/" source="CVE"/>
		<reference ref_id="CVE-2013-0426" ref_url="https://www.suse.com/security/cve/CVE-2013-0426/" source="CVE"/>
		<reference ref_id="CVE-2013-0427" ref_url="https://www.suse.com/security/cve/CVE-2013-0427/" source="CVE"/>
		<reference ref_id="CVE-2013-0428" ref_url="https://www.suse.com/security/cve/CVE-2013-0428/" source="CVE"/>
		<reference ref_id="CVE-2013-0429" ref_url="https://www.suse.com/security/cve/CVE-2013-0429/" source="CVE"/>
		<reference ref_id="CVE-2013-0431" ref_url="https://www.suse.com/security/cve/CVE-2013-0431/" source="CVE"/>
		<reference ref_id="CVE-2013-0432" ref_url="https://www.suse.com/security/cve/CVE-2013-0432/" source="CVE"/>
		<reference ref_id="CVE-2013-0433" ref_url="https://www.suse.com/security/cve/CVE-2013-0433/" source="CVE"/>
		<reference ref_id="CVE-2013-0434" ref_url="https://www.suse.com/security/cve/CVE-2013-0434/" source="CVE"/>
		<reference ref_id="CVE-2013-0435" ref_url="https://www.suse.com/security/cve/CVE-2013-0435/" source="CVE"/>
		<reference ref_id="CVE-2013-0440" ref_url="https://www.suse.com/security/cve/CVE-2013-0440/" source="CVE"/>
		<reference ref_id="CVE-2013-0441" ref_url="https://www.suse.com/security/cve/CVE-2013-0441/" source="CVE"/>
		<reference ref_id="CVE-2013-0442" ref_url="https://www.suse.com/security/cve/CVE-2013-0442/" source="CVE"/>
		<reference ref_id="CVE-2013-0443" ref_url="https://www.suse.com/security/cve/CVE-2013-0443/" source="CVE"/>
		<reference ref_id="CVE-2013-0444" ref_url="https://www.suse.com/security/cve/CVE-2013-0444/" source="CVE"/>
		<reference ref_id="CVE-2013-0450" ref_url="https://www.suse.com/security/cve/CVE-2013-0450/" source="CVE"/>
		<reference ref_id="CVE-2013-0809" ref_url="https://www.suse.com/security/cve/CVE-2013-0809/" source="CVE"/>
		<reference ref_id="CVE-2013-1475" ref_url="https://www.suse.com/security/cve/CVE-2013-1475/" source="CVE"/>
		<reference ref_id="CVE-2013-1476" ref_url="https://www.suse.com/security/cve/CVE-2013-1476/" source="CVE"/>
		<reference ref_id="CVE-2013-1478" ref_url="https://www.suse.com/security/cve/CVE-2013-1478/" source="CVE"/>
		<reference ref_id="CVE-2013-1480" ref_url="https://www.suse.com/security/cve/CVE-2013-1480/" source="CVE"/>
		<reference ref_id="CVE-2013-1484" ref_url="https://www.suse.com/security/cve/CVE-2013-1484/" source="CVE"/>
		<reference ref_id="CVE-2013-1485" ref_url="https://www.suse.com/security/cve/CVE-2013-1485/" source="CVE"/>
		<reference ref_id="CVE-2013-1486" ref_url="https://www.suse.com/security/cve/CVE-2013-1486/" source="CVE"/>
		<reference ref_id="CVE-2013-1488" ref_url="https://www.suse.com/security/cve/CVE-2013-1488/" source="CVE"/>
		<reference ref_id="CVE-2013-1493" ref_url="https://www.suse.com/security/cve/CVE-2013-1493/" source="CVE"/>
		<reference ref_id="CVE-2013-1500" ref_url="https://www.suse.com/security/cve/CVE-2013-1500/" source="CVE"/>
		<reference ref_id="CVE-2013-1518" ref_url="https://www.suse.com/security/cve/CVE-2013-1518/" source="CVE"/>
		<reference ref_id="CVE-2013-1537" ref_url="https://www.suse.com/security/cve/CVE-2013-1537/" source="CVE"/>
		<reference ref_id="CVE-2013-1557" ref_url="https://www.suse.com/security/cve/CVE-2013-1557/" source="CVE"/>
		<reference ref_id="CVE-2013-1569" ref_url="https://www.suse.com/security/cve/CVE-2013-1569/" source="CVE"/>
		<reference ref_id="CVE-2013-1571" ref_url="https://www.suse.com/security/cve/CVE-2013-1571/" source="CVE"/>
		<reference ref_id="CVE-2013-2383" ref_url="https://www.suse.com/security/cve/CVE-2013-2383/" source="CVE"/>
		<reference ref_id="CVE-2013-2384" ref_url="https://www.suse.com/security/cve/CVE-2013-2384/" source="CVE"/>
		<reference ref_id="CVE-2013-2407" ref_url="https://www.suse.com/security/cve/CVE-2013-2407/" source="CVE"/>
		<reference ref_id="CVE-2013-2412" ref_url="https://www.suse.com/security/cve/CVE-2013-2412/" source="CVE"/>
		<reference ref_id="CVE-2013-2415" ref_url="https://www.suse.com/security/cve/CVE-2013-2415/" source="CVE"/>
		<reference ref_id="CVE-2013-2417" ref_url="https://www.suse.com/security/cve/CVE-2013-2417/" source="CVE"/>
		<reference ref_id="CVE-2013-2419" ref_url="https://www.suse.com/security/cve/CVE-2013-2419/" source="CVE"/>
		<reference ref_id="CVE-2013-2420" ref_url="https://www.suse.com/security/cve/CVE-2013-2420/" source="CVE"/>
		<reference ref_id="CVE-2013-2421" ref_url="https://www.suse.com/security/cve/CVE-2013-2421/" source="CVE"/>
		<reference ref_id="CVE-2013-2422" ref_url="https://www.suse.com/security/cve/CVE-2013-2422/" source="CVE"/>
		<reference ref_id="CVE-2013-2423" ref_url="https://www.suse.com/security/cve/CVE-2013-2423/" source="CVE"/>
		<reference ref_id="CVE-2013-2424" ref_url="https://www.suse.com/security/cve/CVE-2013-2424/" source="CVE"/>
		<reference ref_id="CVE-2013-2426" ref_url="https://www.suse.com/security/cve/CVE-2013-2426/" source="CVE"/>
		<reference ref_id="CVE-2013-2429" ref_url="https://www.suse.com/security/cve/CVE-2013-2429/" source="CVE"/>
		<reference ref_id="CVE-2013-2430" ref_url="https://www.suse.com/security/cve/CVE-2013-2430/" source="CVE"/>
		<reference ref_id="CVE-2013-2431" ref_url="https://www.suse.com/security/cve/CVE-2013-2431/" source="CVE"/>
		<reference ref_id="CVE-2013-2436" ref_url="https://www.suse.com/security/cve/CVE-2013-2436/" source="CVE"/>
		<reference ref_id="CVE-2013-2443" ref_url="https://www.suse.com/security/cve/CVE-2013-2443/" source="CVE"/>
		<reference ref_id="CVE-2013-2444" ref_url="https://www.suse.com/security/cve/CVE-2013-2444/" source="CVE"/>
		<reference ref_id="CVE-2013-2445" ref_url="https://www.suse.com/security/cve/CVE-2013-2445/" source="CVE"/>
		<reference ref_id="CVE-2013-2446" ref_url="https://www.suse.com/security/cve/CVE-2013-2446/" source="CVE"/>
		<reference ref_id="CVE-2013-2447" ref_url="https://www.suse.com/security/cve/CVE-2013-2447/" source="CVE"/>
		<reference ref_id="CVE-2013-2448" ref_url="https://www.suse.com/security/cve/CVE-2013-2448/" source="CVE"/>
		<reference ref_id="CVE-2013-2449" ref_url="https://www.suse.com/security/cve/CVE-2013-2449/" source="CVE"/>
		<reference ref_id="CVE-2013-2450" ref_url="https://www.suse.com/security/cve/CVE-2013-2450/" source="CVE"/>
		<reference ref_id="CVE-2013-2451" ref_url="https://www.suse.com/security/cve/CVE-2013-2451/" source="CVE"/>
		<reference ref_id="CVE-2013-2452" ref_url="https://www.suse.com/security/cve/CVE-2013-2452/" source="CVE"/>
		<reference ref_id="CVE-2013-2453" ref_url="https://www.suse.com/security/cve/CVE-2013-2453/" source="CVE"/>
		<reference ref_id="CVE-2013-2454" ref_url="https://www.suse.com/security/cve/CVE-2013-2454/" source="CVE"/>
		<reference ref_id="CVE-2013-2455" ref_url="https://www.suse.com/security/cve/CVE-2013-2455/" source="CVE"/>
		<reference ref_id="CVE-2013-2456" ref_url="https://www.suse.com/security/cve/CVE-2013-2456/" source="CVE"/>
		<reference ref_id="CVE-2013-2457" ref_url="https://www.suse.com/security/cve/CVE-2013-2457/" source="CVE"/>
		<reference ref_id="CVE-2013-2458" ref_url="https://www.suse.com/security/cve/CVE-2013-2458/" source="CVE"/>
		<reference ref_id="CVE-2013-2459" ref_url="https://www.suse.com/security/cve/CVE-2013-2459/" source="CVE"/>
		<reference ref_id="CVE-2013-2460" ref_url="https://www.suse.com/security/cve/CVE-2013-2460/" source="CVE"/>
		<reference ref_id="CVE-2013-2461" ref_url="https://www.suse.com/security/cve/CVE-2013-2461/" source="CVE"/>
		<reference ref_id="CVE-2013-2463" ref_url="https://www.suse.com/security/cve/CVE-2013-2463/" source="CVE"/>
		<reference ref_id="CVE-2013-2465" ref_url="https://www.suse.com/security/cve/CVE-2013-2465/" source="CVE"/>
		<reference ref_id="CVE-2013-2469" ref_url="https://www.suse.com/security/cve/CVE-2013-2469/" source="CVE"/>
		<reference ref_id="CVE-2013-2470" ref_url="https://www.suse.com/security/cve/CVE-2013-2470/" source="CVE"/>
		<reference ref_id="CVE-2013-2471" ref_url="https://www.suse.com/security/cve/CVE-2013-2471/" source="CVE"/>
		<reference ref_id="CVE-2013-2472" ref_url="https://www.suse.com/security/cve/CVE-2013-2472/" source="CVE"/>
		<reference ref_id="CVE-2013-2473" ref_url="https://www.suse.com/security/cve/CVE-2013-2473/" source="CVE"/>
		<reference ref_id="CVE-2013-3829" ref_url="https://www.suse.com/security/cve/CVE-2013-3829/" source="CVE"/>
		<reference ref_id="CVE-2013-4002" ref_url="https://www.suse.com/security/cve/CVE-2013-4002/" source="CVE"/>
		<reference ref_id="CVE-2013-5772" ref_url="https://www.suse.com/security/cve/CVE-2013-5772/" source="CVE"/>
		<reference ref_id="CVE-2013-5774" ref_url="https://www.suse.com/security/cve/CVE-2013-5774/" source="CVE"/>
		<reference ref_id="CVE-2013-5778" ref_url="https://www.suse.com/security/cve/CVE-2013-5778/" source="CVE"/>
		<reference ref_id="CVE-2013-5780" ref_url="https://www.suse.com/security/cve/CVE-2013-5780/" source="CVE"/>
		<reference ref_id="CVE-2013-5782" ref_url="https://www.suse.com/security/cve/CVE-2013-5782/" source="CVE"/>
		<reference ref_id="CVE-2013-5783" ref_url="https://www.suse.com/security/cve/CVE-2013-5783/" source="CVE"/>
		<reference ref_id="CVE-2013-5784" ref_url="https://www.suse.com/security/cve/CVE-2013-5784/" source="CVE"/>
		<reference ref_id="CVE-2013-5790" ref_url="https://www.suse.com/security/cve/CVE-2013-5790/" source="CVE"/>
		<reference ref_id="CVE-2013-5797" ref_url="https://www.suse.com/security/cve/CVE-2013-5797/" source="CVE"/>
		<reference ref_id="CVE-2013-5800" ref_url="https://www.suse.com/security/cve/CVE-2013-5800/" source="CVE"/>
		<reference ref_id="CVE-2013-5802" ref_url="https://www.suse.com/security/cve/CVE-2013-5802/" source="CVE"/>
		<reference ref_id="CVE-2013-5803" ref_url="https://www.suse.com/security/cve/CVE-2013-5803/" source="CVE"/>
		<reference ref_id="CVE-2013-5804" ref_url="https://www.suse.com/security/cve/CVE-2013-5804/" source="CVE"/>
		<reference ref_id="CVE-2013-5805" ref_url="https://www.suse.com/security/cve/CVE-2013-5805/" source="CVE"/>
		<reference ref_id="CVE-2013-5806" ref_url="https://www.suse.com/security/cve/CVE-2013-5806/" source="CVE"/>
		<reference ref_id="CVE-2013-5809" ref_url="https://www.suse.com/security/cve/CVE-2013-5809/" source="CVE"/>
		<reference ref_id="CVE-2013-5814" ref_url="https://www.suse.com/security/cve/CVE-2013-5814/" source="CVE"/>
		<reference ref_id="CVE-2013-5817" ref_url="https://www.suse.com/security/cve/CVE-2013-5817/" source="CVE"/>
		<reference ref_id="CVE-2013-5820" ref_url="https://www.suse.com/security/cve/CVE-2013-5820/" source="CVE"/>
		<reference ref_id="CVE-2013-5823" ref_url="https://www.suse.com/security/cve/CVE-2013-5823/" source="CVE"/>
		<reference ref_id="CVE-2013-5825" ref_url="https://www.suse.com/security/cve/CVE-2013-5825/" source="CVE"/>
		<reference ref_id="CVE-2013-5829" ref_url="https://www.suse.com/security/cve/CVE-2013-5829/" source="CVE"/>
		<reference ref_id="CVE-2013-5830" ref_url="https://www.suse.com/security/cve/CVE-2013-5830/" source="CVE"/>
		<reference ref_id="CVE-2013-5840" ref_url="https://www.suse.com/security/cve/CVE-2013-5840/" source="CVE"/>
		<reference ref_id="CVE-2013-5842" ref_url="https://www.suse.com/security/cve/CVE-2013-5842/" source="CVE"/>
		<reference ref_id="CVE-2013-5849" ref_url="https://www.suse.com/security/cve/CVE-2013-5849/" source="CVE"/>
		<reference ref_id="CVE-2013-5850" ref_url="https://www.suse.com/security/cve/CVE-2013-5850/" source="CVE"/>
		<reference ref_id="CVE-2013-5851" ref_url="https://www.suse.com/security/cve/CVE-2013-5851/" source="CVE"/>
		<reference ref_id="CVE-2013-5878" ref_url="https://www.suse.com/security/cve/CVE-2013-5878/" source="CVE"/>
		<reference ref_id="CVE-2013-5884" ref_url="https://www.suse.com/security/cve/CVE-2013-5884/" source="CVE"/>
		<reference ref_id="CVE-2013-5893" ref_url="https://www.suse.com/security/cve/CVE-2013-5893/" source="CVE"/>
		<reference ref_id="CVE-2013-5896" ref_url="https://www.suse.com/security/cve/CVE-2013-5896/" source="CVE"/>
		<reference ref_id="CVE-2013-5907" ref_url="https://www.suse.com/security/cve/CVE-2013-5907/" source="CVE"/>
		<reference ref_id="CVE-2013-5910" ref_url="https://www.suse.com/security/cve/CVE-2013-5910/" source="CVE"/>
		<reference ref_id="CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629/" source="CVE"/>
		<reference ref_id="CVE-2013-6954" ref_url="https://www.suse.com/security/cve/CVE-2013-6954/" source="CVE"/>
		<reference ref_id="CVE-2014-0368" ref_url="https://www.suse.com/security/cve/CVE-2014-0368/" source="CVE"/>
		<reference ref_id="CVE-2014-0373" ref_url="https://www.suse.com/security/cve/CVE-2014-0373/" source="CVE"/>
		<reference ref_id="CVE-2014-0376" ref_url="https://www.suse.com/security/cve/CVE-2014-0376/" source="CVE"/>
		<reference ref_id="CVE-2014-0408" ref_url="https://www.suse.com/security/cve/CVE-2014-0408/" source="CVE"/>
		<reference ref_id="CVE-2014-0411" ref_url="https://www.suse.com/security/cve/CVE-2014-0411/" source="CVE"/>
		<reference ref_id="CVE-2014-0416" ref_url="https://www.suse.com/security/cve/CVE-2014-0416/" source="CVE"/>
		<reference ref_id="CVE-2014-0422" ref_url="https://www.suse.com/security/cve/CVE-2014-0422/" source="CVE"/>
		<reference ref_id="CVE-2014-0423" ref_url="https://www.suse.com/security/cve/CVE-2014-0423/" source="CVE"/>
		<reference ref_id="CVE-2014-0428" ref_url="https://www.suse.com/security/cve/CVE-2014-0428/" source="CVE"/>
		<reference ref_id="CVE-2014-0429" ref_url="https://www.suse.com/security/cve/CVE-2014-0429/" source="CVE"/>
		<reference ref_id="CVE-2014-0446" ref_url="https://www.suse.com/security/cve/CVE-2014-0446/" source="CVE"/>
		<reference ref_id="CVE-2014-0451" ref_url="https://www.suse.com/security/cve/CVE-2014-0451/" source="CVE"/>
		<reference ref_id="CVE-2014-0452" ref_url="https://www.suse.com/security/cve/CVE-2014-0452/" source="CVE"/>
		<reference ref_id="CVE-2014-0453" ref_url="https://www.suse.com/security/cve/CVE-2014-0453/" source="CVE"/>
		<reference ref_id="CVE-2014-0454" ref_url="https://www.suse.com/security/cve/CVE-2014-0454/" source="CVE"/>
		<reference ref_id="CVE-2014-0455" ref_url="https://www.suse.com/security/cve/CVE-2014-0455/" source="CVE"/>
		<reference ref_id="CVE-2014-0456" ref_url="https://www.suse.com/security/cve/CVE-2014-0456/" source="CVE"/>
		<reference ref_id="CVE-2014-0457" ref_url="https://www.suse.com/security/cve/CVE-2014-0457/" source="CVE"/>
		<reference ref_id="CVE-2014-0458" ref_url="https://www.suse.com/security/cve/CVE-2014-0458/" source="CVE"/>
		<reference ref_id="CVE-2014-0459" ref_url="https://www.suse.com/security/cve/CVE-2014-0459/" source="CVE"/>
		<reference ref_id="CVE-2014-0460" ref_url="https://www.suse.com/security/cve/CVE-2014-0460/" source="CVE"/>
		<reference ref_id="CVE-2014-0461" ref_url="https://www.suse.com/security/cve/CVE-2014-0461/" source="CVE"/>
		<reference ref_id="CVE-2014-1876" ref_url="https://www.suse.com/security/cve/CVE-2014-1876/" source="CVE"/>
		<reference ref_id="CVE-2014-2397" ref_url="https://www.suse.com/security/cve/CVE-2014-2397/" source="CVE"/>
		<reference ref_id="CVE-2014-2398" ref_url="https://www.suse.com/security/cve/CVE-2014-2398/" source="CVE"/>
		<reference ref_id="CVE-2014-2402" ref_url="https://www.suse.com/security/cve/CVE-2014-2402/" source="CVE"/>
		<reference ref_id="CVE-2014-2403" ref_url="https://www.suse.com/security/cve/CVE-2014-2403/" source="CVE"/>
		<reference ref_id="CVE-2014-2412" ref_url="https://www.suse.com/security/cve/CVE-2014-2412/" source="CVE"/>
		<reference ref_id="CVE-2014-2413" ref_url="https://www.suse.com/security/cve/CVE-2014-2413/" source="CVE"/>
		<reference ref_id="CVE-2014-2414" ref_url="https://www.suse.com/security/cve/CVE-2014-2414/" source="CVE"/>
		<reference ref_id="CVE-2014-2421" ref_url="https://www.suse.com/security/cve/CVE-2014-2421/" source="CVE"/>
		<reference ref_id="CVE-2014-2423" ref_url="https://www.suse.com/security/cve/CVE-2014-2423/" source="CVE"/>
		<reference ref_id="CVE-2014-2427" ref_url="https://www.suse.com/security/cve/CVE-2014-2427/" source="CVE"/>
		<reference ref_id="CVE-2014-2483" ref_url="https://www.suse.com/security/cve/CVE-2014-2483/" source="CVE"/>
		<reference ref_id="CVE-2014-2490" ref_url="https://www.suse.com/security/cve/CVE-2014-2490/" source="CVE"/>
		<reference ref_id="CVE-2014-4209" ref_url="https://www.suse.com/security/cve/CVE-2014-4209/" source="CVE"/>
		<reference ref_id="CVE-2014-4216" ref_url="https://www.suse.com/security/cve/CVE-2014-4216/" source="CVE"/>
		<reference ref_id="CVE-2014-4218" ref_url="https://www.suse.com/security/cve/CVE-2014-4218/" source="CVE"/>
		<reference ref_id="CVE-2014-4219" ref_url="https://www.suse.com/security/cve/CVE-2014-4219/" source="CVE"/>
		<reference ref_id="CVE-2014-4221" ref_url="https://www.suse.com/security/cve/CVE-2014-4221/" source="CVE"/>
		<reference ref_id="CVE-2014-4223" ref_url="https://www.suse.com/security/cve/CVE-2014-4223/" source="CVE"/>
		<reference ref_id="CVE-2014-4244" ref_url="https://www.suse.com/security/cve/CVE-2014-4244/" source="CVE"/>
		<reference ref_id="CVE-2014-4252" ref_url="https://www.suse.com/security/cve/CVE-2014-4252/" source="CVE"/>
		<reference ref_id="CVE-2014-4262" ref_url="https://www.suse.com/security/cve/CVE-2014-4262/" source="CVE"/>
		<reference ref_id="CVE-2014-4263" ref_url="https://www.suse.com/security/cve/CVE-2014-4263/" source="CVE"/>
		<reference ref_id="CVE-2014-4264" ref_url="https://www.suse.com/security/cve/CVE-2014-4264/" source="CVE"/>
		<reference ref_id="CVE-2014-4266" ref_url="https://www.suse.com/security/cve/CVE-2014-4266/" source="CVE"/>
		<reference ref_id="CVE-2014-4268" ref_url="https://www.suse.com/security/cve/CVE-2014-4268/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_7_0-openjdk-1.7.0.65-3.7 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3563/">CVE-2011-3563</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3571/">CVE-2011-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5035/">CVE-2011-5035</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0497/">CVE-2012-0497</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0501/">CVE-2012-0501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0502/">CVE-2012-0502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0503/">CVE-2012-0503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0505/">CVE-2012-0505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0506/">CVE-2012-0506</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0547/">CVE-2012-0547</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1682/">CVE-2012-1682</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1711/">CVE-2012-1711</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1713/">CVE-2012-1713</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1716/">CVE-2012-1716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1717/">CVE-2012-1717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1718/">CVE-2012-1718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1719/">CVE-2012-1719</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1723/">CVE-2012-1723</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1724/">CVE-2012-1724</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1725/">CVE-2012-1725</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1726/">CVE-2012-1726</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3136/">CVE-2012-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3174/">CVE-2012-3174</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3216/">CVE-2012-3216</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4416/">CVE-2012-4416</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4681/">CVE-2012-4681</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5068/">CVE-2012-5068</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5069/">CVE-2012-5069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5070/">CVE-2012-5070</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5071/">CVE-2012-5071</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5072/">CVE-2012-5072</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5073/">CVE-2012-5073</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5074/">CVE-2012-5074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5075/">CVE-2012-5075</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5076/">CVE-2012-5076</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-5077/">CVE-2012-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5079/">CVE-2012-5079</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5081/">CVE-2012-5081</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5084/">CVE-2012-5084</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-5085/">CVE-2012-5085</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5086/">CVE-2012-5086</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5087/">CVE-2012-5087</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5088/">CVE-2012-5088</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5089/">CVE-2012-5089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0401/">CVE-2013-0401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0422/">CVE-2013-0422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0424/">CVE-2013-0424</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0425/">CVE-2013-0425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0426/">CVE-2013-0426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0427/">CVE-2013-0427</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0428/">CVE-2013-0428</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0429/">CVE-2013-0429</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0431/">CVE-2013-0431</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0432/">CVE-2013-0432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0433/">CVE-2013-0433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0434/">CVE-2013-0434</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0435/">CVE-2013-0435</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0440/">CVE-2013-0440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0441/">CVE-2013-0441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0442/">CVE-2013-0442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0443/">CVE-2013-0443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0444/">CVE-2013-0444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0450/">CVE-2013-0450</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0809/">CVE-2013-0809</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1475/">CVE-2013-1475</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1476/">CVE-2013-1476</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1478/">CVE-2013-1478</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1480/">CVE-2013-1480</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1484/">CVE-2013-1484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1485/">CVE-2013-1485</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1486/">CVE-2013-1486</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1488/">CVE-2013-1488</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1493/">CVE-2013-1493</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1500/">CVE-2013-1500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1518/">CVE-2013-1518</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1537/">CVE-2013-1537</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1557/">CVE-2013-1557</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1569/">CVE-2013-1569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1571/">CVE-2013-1571</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2383/">CVE-2013-2383</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2384/">CVE-2013-2384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2407/">CVE-2013-2407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2412/">CVE-2013-2412</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2415/">CVE-2013-2415</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2417/">CVE-2013-2417</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2419/">CVE-2013-2419</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2420/">CVE-2013-2420</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2421/">CVE-2013-2421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2422/">CVE-2013-2422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2423/">CVE-2013-2423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2424/">CVE-2013-2424</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2426/">CVE-2013-2426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2429/">CVE-2013-2429</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2430/">CVE-2013-2430</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2431/">CVE-2013-2431</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2436/">CVE-2013-2436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2443/">CVE-2013-2443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2444/">CVE-2013-2444</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2445/">CVE-2013-2445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2446/">CVE-2013-2446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2447/">CVE-2013-2447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2448/">CVE-2013-2448</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2449/">CVE-2013-2449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2450/">CVE-2013-2450</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2451/">CVE-2013-2451</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2452/">CVE-2013-2452</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2453/">CVE-2013-2453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2454/">CVE-2013-2454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2455/">CVE-2013-2455</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2456/">CVE-2013-2456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2457/">CVE-2013-2457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2458/">CVE-2013-2458</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2459/">CVE-2013-2459</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2460/">CVE-2013-2460</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2461/">CVE-2013-2461</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2463/">CVE-2013-2463</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2465/">CVE-2013-2465</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2469/">CVE-2013-2469</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2470/">CVE-2013-2470</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2471/">CVE-2013-2471</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2472/">CVE-2013-2472</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2473/">CVE-2013-2473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3829/">CVE-2013-3829</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4002/">CVE-2013-4002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5772/">CVE-2013-5772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5774/">CVE-2013-5774</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5778/">CVE-2013-5778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5780/">CVE-2013-5780</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5782/">CVE-2013-5782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5783/">CVE-2013-5783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5784/">CVE-2013-5784</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5790/">CVE-2013-5790</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-5797/">CVE-2013-5797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5800/">CVE-2013-5800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5802/">CVE-2013-5802</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5803/">CVE-2013-5803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5804/">CVE-2013-5804</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5805/">CVE-2013-5805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5806/">CVE-2013-5806</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5809/">CVE-2013-5809</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5814/">CVE-2013-5814</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5817/">CVE-2013-5817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5820/">CVE-2013-5820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5823/">CVE-2013-5823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5825/">CVE-2013-5825</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5829/">CVE-2013-5829</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5830/">CVE-2013-5830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5840/">CVE-2013-5840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5842/">CVE-2013-5842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5849/">CVE-2013-5849</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5850/">CVE-2013-5850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5851/">CVE-2013-5851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5878/">CVE-2013-5878</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5884/">CVE-2013-5884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5893/">CVE-2013-5893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5896/">CVE-2013-5896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5907/">CVE-2013-5907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5910/">CVE-2013-5910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6954/">CVE-2013-6954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0368/">CVE-2014-0368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0373/">CVE-2014-0373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0376/">CVE-2014-0376</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0408/">CVE-2014-0408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0411/">CVE-2014-0411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0416/">CVE-2014-0416</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0422/">CVE-2014-0422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0423/">CVE-2014-0423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0428/">CVE-2014-0428</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0429/">CVE-2014-0429</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0446/">CVE-2014-0446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0451/">CVE-2014-0451</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0452/">CVE-2014-0452</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0453/">CVE-2014-0453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0454/">CVE-2014-0454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0455/">CVE-2014-0455</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0456/">CVE-2014-0456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0457/">CVE-2014-0457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0458/">CVE-2014-0458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0459/">CVE-2014-0459</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0460/">CVE-2014-0460</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0461/">CVE-2014-0461</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1876/">CVE-2014-1876</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2397/">CVE-2014-2397</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2398/">CVE-2014-2398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2402/">CVE-2014-2402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2403/">CVE-2014-2403</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2412/">CVE-2014-2412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2413/">CVE-2014-2413</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2414/">CVE-2014-2414</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2421/">CVE-2014-2421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2423/">CVE-2014-2423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2427/">CVE-2014-2427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2483/">CVE-2014-2483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2490/">CVE-2014-2490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4209/">CVE-2014-4209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4216/">CVE-2014-4216</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4218/">CVE-2014-4218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4219/">CVE-2014-4219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4221/">CVE-2014-4221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4223/">CVE-2014-4223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4244/">CVE-2014-4244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4252/">CVE-2014-4252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4262/">CVE-2014-4262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4263/">CVE-2014-4263</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4264/">CVE-2014-4264</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4266/">CVE-2014-4266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4268/">CVE-2014-4268</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141419" comment="java-1_7_0-openjdk-1.7.0.65-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141420" comment="java-1_7_0-openjdk-headless-1.7.0.65-3.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75745" version="1" class="patch">
	<metadata>
		<title>java-1_7_0-openjdk-plugin-1.5.1-1.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-2513" ref_url="https://www.suse.com/security/cve/CVE-2011-2513/" source="CVE"/>
		<reference ref_id="CVE-2011-2514" ref_url="https://www.suse.com/security/cve/CVE-2011-2514/" source="CVE"/>
		<reference ref_id="CVE-2011-3377" ref_url="https://www.suse.com/security/cve/CVE-2011-3377/" source="CVE"/>
		<reference ref_id="CVE-2012-3422" ref_url="https://www.suse.com/security/cve/CVE-2012-3422/" source="CVE"/>
		<reference ref_id="CVE-2012-3423" ref_url="https://www.suse.com/security/cve/CVE-2012-3423/" source="CVE"/>
		<reference ref_id="CVE-2012-4540" ref_url="https://www.suse.com/security/cve/CVE-2012-4540/" source="CVE"/>
		<reference ref_id="CVE-2013-1926" ref_url="https://www.suse.com/security/cve/CVE-2013-1926/" source="CVE"/>
		<reference ref_id="CVE-2013-1927" ref_url="https://www.suse.com/security/cve/CVE-2013-1927/" source="CVE"/>
		<reference ref_id="CVE-2013-4349" ref_url="https://www.suse.com/security/cve/CVE-2013-4349/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_7_0-openjdk-plugin-1.5.1-1.13 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2513/">CVE-2011-2513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2514/">CVE-2011-2514</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3377/">CVE-2011-3377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3422/">CVE-2012-3422</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3423/">CVE-2012-3423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4540/">CVE-2012-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1926/">CVE-2013-1926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1927/">CVE-2013-1927</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4349/">CVE-2013-4349</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141421" comment="java-1_7_0-openjdk-plugin-1.5.1-1.13 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75746" version="1" class="patch">
	<metadata>
		<title>kbd-1.15.5-7.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-0460" ref_url="https://www.suse.com/security/cve/CVE-2011-0460/" source="CVE"/>
		<description>
These are all security issues fixed in the kbd-1.15.5-7.12 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0460/">CVE-2011-0460</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141422" comment="kbd-1.15.5-7.12 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75747" version="1" class="patch">
	<metadata>
		<title>kernel-default-3.12.28-4.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-3939" ref_url="https://www.suse.com/security/cve/CVE-2009-3939/" source="CVE"/>
		<reference ref_id="CVE-2009-4026" ref_url="https://www.suse.com/security/cve/CVE-2009-4026/" source="CVE"/>
		<reference ref_id="CVE-2009-4027" ref_url="https://www.suse.com/security/cve/CVE-2009-4027/" source="CVE"/>
		<reference ref_id="CVE-2009-4131" ref_url="https://www.suse.com/security/cve/CVE-2009-4131/" source="CVE"/>
		<reference ref_id="CVE-2009-4138" ref_url="https://www.suse.com/security/cve/CVE-2009-4138/" source="CVE"/>
		<reference ref_id="CVE-2009-4536" ref_url="https://www.suse.com/security/cve/CVE-2009-4536/" source="CVE"/>
		<reference ref_id="CVE-2009-4538" ref_url="https://www.suse.com/security/cve/CVE-2009-4538/" source="CVE"/>
		<reference ref_id="CVE-2010-1146" ref_url="https://www.suse.com/security/cve/CVE-2010-1146/" source="CVE"/>
		<reference ref_id="CVE-2010-1436" ref_url="https://www.suse.com/security/cve/CVE-2010-1436/" source="CVE"/>
		<reference ref_id="CVE-2010-1641" ref_url="https://www.suse.com/security/cve/CVE-2010-1641/" source="CVE"/>
		<reference ref_id="CVE-2010-2066" ref_url="https://www.suse.com/security/cve/CVE-2010-2066/" source="CVE"/>
		<reference ref_id="CVE-2010-2942" ref_url="https://www.suse.com/security/cve/CVE-2010-2942/" source="CVE"/>
		<reference ref_id="CVE-2010-2954" ref_url="https://www.suse.com/security/cve/CVE-2010-2954/" source="CVE"/>
		<reference ref_id="CVE-2010-2955" ref_url="https://www.suse.com/security/cve/CVE-2010-2955/" source="CVE"/>
		<reference ref_id="CVE-2010-3081" ref_url="https://www.suse.com/security/cve/CVE-2010-3081/" source="CVE"/>
		<reference ref_id="CVE-2010-3296" ref_url="https://www.suse.com/security/cve/CVE-2010-3296/" source="CVE"/>
		<reference ref_id="CVE-2010-3297" ref_url="https://www.suse.com/security/cve/CVE-2010-3297/" source="CVE"/>
		<reference ref_id="CVE-2010-3298" ref_url="https://www.suse.com/security/cve/CVE-2010-3298/" source="CVE"/>
		<reference ref_id="CVE-2010-3301" ref_url="https://www.suse.com/security/cve/CVE-2010-3301/" source="CVE"/>
		<reference ref_id="CVE-2010-3310" ref_url="https://www.suse.com/security/cve/CVE-2010-3310/" source="CVE"/>
		<reference ref_id="CVE-2011-0712" ref_url="https://www.suse.com/security/cve/CVE-2011-0712/" source="CVE"/>
		<reference ref_id="CVE-2011-1020" ref_url="https://www.suse.com/security/cve/CVE-2011-1020/" source="CVE"/>
		<reference ref_id="CVE-2011-1577" ref_url="https://www.suse.com/security/cve/CVE-2011-1577/" source="CVE"/>
		<reference ref_id="CVE-2011-2203" ref_url="https://www.suse.com/security/cve/CVE-2011-2203/" source="CVE"/>
		<reference ref_id="CVE-2012-0056" ref_url="https://www.suse.com/security/cve/CVE-2012-0056/" source="CVE"/>
		<reference ref_id="CVE-2012-2372" ref_url="https://www.suse.com/security/cve/CVE-2012-2372/" source="CVE"/>
		<reference ref_id="CVE-2013-0160" ref_url="https://www.suse.com/security/cve/CVE-2013-0160/" source="CVE"/>
		<reference ref_id="CVE-2013-0231" ref_url="https://www.suse.com/security/cve/CVE-2013-0231/" source="CVE"/>
		<reference ref_id="CVE-2013-0913" ref_url="https://www.suse.com/security/cve/CVE-2013-0913/" source="CVE"/>
		<reference ref_id="CVE-2013-2850" ref_url="https://www.suse.com/security/cve/CVE-2013-2850/" source="CVE"/>
		<reference ref_id="CVE-2013-4587" ref_url="https://www.suse.com/security/cve/CVE-2013-4587/" source="CVE"/>
		<reference ref_id="CVE-2013-6367" ref_url="https://www.suse.com/security/cve/CVE-2013-6367/" source="CVE"/>
		<reference ref_id="CVE-2013-6368" ref_url="https://www.suse.com/security/cve/CVE-2013-6368/" source="CVE"/>
		<reference ref_id="CVE-2013-6376" ref_url="https://www.suse.com/security/cve/CVE-2013-6376/" source="CVE"/>
		<reference ref_id="CVE-2014-0102" ref_url="https://www.suse.com/security/cve/CVE-2014-0102/" source="CVE"/>
		<reference ref_id="CVE-2014-0131" ref_url="https://www.suse.com/security/cve/CVE-2014-0131/" source="CVE"/>
		<reference ref_id="CVE-2014-0196" ref_url="https://www.suse.com/security/cve/CVE-2014-0196/" source="CVE"/>
		<reference ref_id="CVE-2014-0691" ref_url="https://www.suse.com/security/cve/CVE-2014-0691/" source="CVE"/>
		<reference ref_id="CVE-2014-2523" ref_url="https://www.suse.com/security/cve/CVE-2014-2523/" source="CVE"/>
		<reference ref_id="CVE-2014-3534" ref_url="https://www.suse.com/security/cve/CVE-2014-3534/" source="CVE"/>
		<reference ref_id="CVE-2014-3917" ref_url="https://www.suse.com/security/cve/CVE-2014-3917/" source="CVE"/>
		<reference ref_id="CVE-2014-3940" ref_url="https://www.suse.com/security/cve/CVE-2014-3940/" source="CVE"/>
		<reference ref_id="CVE-2014-4171" ref_url="https://www.suse.com/security/cve/CVE-2014-4171/" source="CVE"/>
		<reference ref_id="CVE-2014-4652" ref_url="https://www.suse.com/security/cve/CVE-2014-4652/" source="CVE"/>
		<reference ref_id="CVE-2014-4653" ref_url="https://www.suse.com/security/cve/CVE-2014-4653/" source="CVE"/>
		<reference ref_id="CVE-2014-4654" ref_url="https://www.suse.com/security/cve/CVE-2014-4654/" source="CVE"/>
		<reference ref_id="CVE-2014-4655" ref_url="https://www.suse.com/security/cve/CVE-2014-4655/" source="CVE"/>
		<reference ref_id="CVE-2014-4656" ref_url="https://www.suse.com/security/cve/CVE-2014-4656/" source="CVE"/>
		<reference ref_id="CVE-2014-4699" ref_url="https://www.suse.com/security/cve/CVE-2014-4699/" source="CVE"/>
		<reference ref_id="CVE-2014-4943" ref_url="https://www.suse.com/security/cve/CVE-2014-4943/" source="CVE"/>
		<reference ref_id="CVE-2014-5045" ref_url="https://www.suse.com/security/cve/CVE-2014-5045/" source="CVE"/>
		<reference ref_id="CVE-2014-5077" ref_url="https://www.suse.com/security/cve/CVE-2014-5077/" source="CVE"/>
		<reference ref_id="CVE-2014-5206" ref_url="https://www.suse.com/security/cve/CVE-2014-5206/" source="CVE"/>
		<reference ref_id="CVE-2014-5207" ref_url="https://www.suse.com/security/cve/CVE-2014-5207/" source="CVE"/>
		<reference ref_id="CVE-2014-5471" ref_url="https://www.suse.com/security/cve/CVE-2014-5471/" source="CVE"/>
		<reference ref_id="CVE-2014-5472" ref_url="https://www.suse.com/security/cve/CVE-2014-5472/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-default-3.12.28-4.6 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3939/">CVE-2009-3939</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4026/">CVE-2009-4026</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4027/">CVE-2009-4027</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4131/">CVE-2009-4131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4138/">CVE-2009-4138</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4536/">CVE-2009-4536</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4538/">CVE-2009-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1146/">CVE-2010-1146</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1436/">CVE-2010-1436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1641/">CVE-2010-1641</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-2066/">CVE-2010-2066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2942/">CVE-2010-2942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2954/">CVE-2010-2954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2955/">CVE-2010-2955</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3081/">CVE-2010-3081</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3296/">CVE-2010-3296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3297/">CVE-2010-3297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3298/">CVE-2010-3298</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3301/">CVE-2010-3301</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3310/">CVE-2010-3310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0712/">CVE-2011-0712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1020/">CVE-2011-1020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1577/">CVE-2011-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2203/">CVE-2011-2203</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0056/">CVE-2012-0056</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2372/">CVE-2012-2372</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0160/">CVE-2013-0160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0231/">CVE-2013-0231</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0913/">CVE-2013-0913</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2850/">CVE-2013-2850</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4587/">CVE-2013-4587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6367/">CVE-2013-6367</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6368/">CVE-2013-6368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6376/">CVE-2013-6376</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0102/">CVE-2014-0102</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0131/">CVE-2014-0131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0196/">CVE-2014-0196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0691/">CVE-2014-0691</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-2523/">CVE-2014-2523</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3534/">CVE-2014-3534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3917/">CVE-2014-3917</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3940/">CVE-2014-3940</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4171/">CVE-2014-4171</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4652/">CVE-2014-4652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4653/">CVE-2014-4653</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4654/">CVE-2014-4654</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4655/">CVE-2014-4655</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4656/">CVE-2014-4656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4699/">CVE-2014-4699</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4943/">CVE-2014-4943</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5045/">CVE-2014-5045</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-5077/">CVE-2014-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5206/">CVE-2014-5206</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5207/">CVE-2014-5207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5471/">CVE-2014-5471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5472/">CVE-2014-5472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141423" comment="kernel-default-3.12.28-4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141424" comment="kernel-default-devel-3.12.28-4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141425" comment="kernel-default-extra-3.12.28-4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141426" comment="kernel-devel-3.12.28-4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141427" comment="kernel-macros-3.12.28-4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141428" comment="kernel-source-3.12.28-4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141429" comment="kernel-syms-3.12.28-4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141430" comment="kernel-xen-3.12.28-4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141431" comment="kernel-xen-devel-3.12.28-4.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75748" version="1" class="patch">
	<metadata>
		<title>krb5-1.12.1-6.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2002-2443" ref_url="https://www.suse.com/security/cve/CVE-2002-2443/" source="CVE"/>
		<reference ref_id="CVE-2009-0844" ref_url="https://www.suse.com/security/cve/CVE-2009-0844/" source="CVE"/>
		<reference ref_id="CVE-2009-0845" ref_url="https://www.suse.com/security/cve/CVE-2009-0845/" source="CVE"/>
		<reference ref_id="CVE-2009-0846" ref_url="https://www.suse.com/security/cve/CVE-2009-0846/" source="CVE"/>
		<reference ref_id="CVE-2009-0847" ref_url="https://www.suse.com/security/cve/CVE-2009-0847/" source="CVE"/>
		<reference ref_id="CVE-2009-3295" ref_url="https://www.suse.com/security/cve/CVE-2009-3295/" source="CVE"/>
		<reference ref_id="CVE-2009-4212" ref_url="https://www.suse.com/security/cve/CVE-2009-4212/" source="CVE"/>
		<reference ref_id="CVE-2010-0283" ref_url="https://www.suse.com/security/cve/CVE-2010-0283/" source="CVE"/>
		<reference ref_id="CVE-2010-0628" ref_url="https://www.suse.com/security/cve/CVE-2010-0628/" source="CVE"/>
		<reference ref_id="CVE-2010-1320" ref_url="https://www.suse.com/security/cve/CVE-2010-1320/" source="CVE"/>
		<reference ref_id="CVE-2010-1321" ref_url="https://www.suse.com/security/cve/CVE-2010-1321/" source="CVE"/>
		<reference ref_id="CVE-2010-1322" ref_url="https://www.suse.com/security/cve/CVE-2010-1322/" source="CVE"/>
		<reference ref_id="CVE-2010-1323" ref_url="https://www.suse.com/security/cve/CVE-2010-1323/" source="CVE"/>
		<reference ref_id="CVE-2010-1324" ref_url="https://www.suse.com/security/cve/CVE-2010-1324/" source="CVE"/>
		<reference ref_id="CVE-2010-4020" ref_url="https://www.suse.com/security/cve/CVE-2010-4020/" source="CVE"/>
		<reference ref_id="CVE-2010-4021" ref_url="https://www.suse.com/security/cve/CVE-2010-4021/" source="CVE"/>
		<reference ref_id="CVE-2010-4022" ref_url="https://www.suse.com/security/cve/CVE-2010-4022/" source="CVE"/>
		<reference ref_id="CVE-2011-0281" ref_url="https://www.suse.com/security/cve/CVE-2011-0281/" source="CVE"/>
		<reference ref_id="CVE-2011-0282" ref_url="https://www.suse.com/security/cve/CVE-2011-0282/" source="CVE"/>
		<reference ref_id="CVE-2011-0284" ref_url="https://www.suse.com/security/cve/CVE-2011-0284/" source="CVE"/>
		<reference ref_id="CVE-2011-0285" ref_url="https://www.suse.com/security/cve/CVE-2011-0285/" source="CVE"/>
		<reference ref_id="CVE-2011-1527" ref_url="https://www.suse.com/security/cve/CVE-2011-1527/" source="CVE"/>
		<reference ref_id="CVE-2011-1528" ref_url="https://www.suse.com/security/cve/CVE-2011-1528/" source="CVE"/>
		<reference ref_id="CVE-2011-1529" ref_url="https://www.suse.com/security/cve/CVE-2011-1529/" source="CVE"/>
		<reference ref_id="CVE-2011-1530" ref_url="https://www.suse.com/security/cve/CVE-2011-1530/" source="CVE"/>
		<reference ref_id="CVE-2012-1012" ref_url="https://www.suse.com/security/cve/CVE-2012-1012/" source="CVE"/>
		<reference ref_id="CVE-2012-1013" ref_url="https://www.suse.com/security/cve/CVE-2012-1013/" source="CVE"/>
		<reference ref_id="CVE-2012-1016" ref_url="https://www.suse.com/security/cve/CVE-2012-1016/" source="CVE"/>
		<reference ref_id="CVE-2013-1415" ref_url="https://www.suse.com/security/cve/CVE-2013-1415/" source="CVE"/>
		<reference ref_id="CVE-2013-1417" ref_url="https://www.suse.com/security/cve/CVE-2013-1417/" source="CVE"/>
		<reference ref_id="CVE-2013-1418" ref_url="https://www.suse.com/security/cve/CVE-2013-1418/" source="CVE"/>
		<reference ref_id="CVE-2014-4341" ref_url="https://www.suse.com/security/cve/CVE-2014-4341/" source="CVE"/>
		<reference ref_id="CVE-2014-4342" ref_url="https://www.suse.com/security/cve/CVE-2014-4342/" source="CVE"/>
		<reference ref_id="CVE-2014-4343" ref_url="https://www.suse.com/security/cve/CVE-2014-4343/" source="CVE"/>
		<reference ref_id="CVE-2014-4344" ref_url="https://www.suse.com/security/cve/CVE-2014-4344/" source="CVE"/>
		<reference ref_id="CVE-2014-4345" ref_url="https://www.suse.com/security/cve/CVE-2014-4345/" source="CVE"/>
		<reference ref_id="CVE-2014-5351" ref_url="https://www.suse.com/security/cve/CVE-2014-5351/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-1.12.1-6.3 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2002-2443/">CVE-2002-2443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0844/">CVE-2009-0844</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0845/">CVE-2009-0845</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0846/">CVE-2009-0846</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0847/">CVE-2009-0847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3295/">CVE-2009-3295</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-4212/">CVE-2009-4212</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0283/">CVE-2010-0283</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0628/">CVE-2010-0628</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1320/">CVE-2010-1320</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1321/">CVE-2010-1321</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1322/">CVE-2010-1322</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1323/">CVE-2010-1323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1324/">CVE-2010-1324</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4020/">CVE-2010-4020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4021/">CVE-2010-4021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4022/">CVE-2010-4022</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0281/">CVE-2011-0281</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0282/">CVE-2011-0282</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0284/">CVE-2011-0284</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0285/">CVE-2011-0285</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1527/">CVE-2011-1527</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1528/">CVE-2011-1528</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1529/">CVE-2011-1529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1530/">CVE-2011-1530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1012/">CVE-2012-1012</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1013/">CVE-2012-1013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1016/">CVE-2012-1016</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1415/">CVE-2013-1415</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1417/">CVE-2013-1417</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1418/">CVE-2013-1418</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4341/">CVE-2014-4341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4342/">CVE-2014-4342</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4343/">CVE-2014-4343</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4344/">CVE-2014-4344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4345/">CVE-2014-4345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5351/">CVE-2014-5351</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141432" comment="krb5-1.12.1-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141433" comment="krb5-32bit-1.12.1-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141434" comment="krb5-client-1.12.1-6.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75749" version="1" class="patch">
	<metadata>
		<title>krb5-appl-clients-1.0.3-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-1526" ref_url="https://www.suse.com/security/cve/CVE-2011-1526/" source="CVE"/>
		<reference ref_id="CVE-2011-4862" ref_url="https://www.suse.com/security/cve/CVE-2011-4862/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-appl-clients-1.0.3-1.5 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1526/">CVE-2011-1526</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4862/">CVE-2011-4862</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140711" comment="krb5-appl-clients-1.0.3-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75750" version="1" class="patch">
	<metadata>
		<title>lcms-1.19-17.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-0793" ref_url="https://www.suse.com/security/cve/CVE-2009-0793/" source="CVE"/>
		<reference ref_id="CVE-2013-4276" ref_url="https://www.suse.com/security/cve/CVE-2013-4276/" source="CVE"/>
		<description>
These are all security issues fixed in the lcms-1.19-17.31 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0793/">CVE-2009-0793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4276/">CVE-2013-4276</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141435" comment="lcms-1.19-17.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140713" comment="liblcms1-1.19-17.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140714" comment="liblcms1-32bit-1.19-17.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75751" version="1" class="patch">
	<metadata>
		<title>libHX28-3.18-1.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2010-2947" ref_url="https://www.suse.com/security/cve/CVE-2010-2947/" source="CVE"/>
		<description>
These are all security issues fixed in the libHX28-3.18-1.19 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2947/">CVE-2010-2947</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140717" comment="libHX28-3.18-1.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140718" comment="libHX28-32bit-3.18-1.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75752" version="1" class="patch">
	<metadata>
		<title>libIlmImf-Imf_2_1-21-2.1.0-4.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-1720" ref_url="https://www.suse.com/security/cve/CVE-2009-1720/" source="CVE"/>
		<reference ref_id="CVE-2009-1721" ref_url="https://www.suse.com/security/cve/CVE-2009-1721/" source="CVE"/>
		<description>
These are all security issues fixed in the libIlmImf-Imf_2_1-21-2.1.0-4.5 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1720/">CVE-2009-1720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1721/">CVE-2009-1721</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140719" comment="libIlmImf-Imf_2_1-21-2.1.0-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141436" comment="libIlmImf-Imf_2_1-21-32bit-2.1.0-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140720" comment="openexr-2.1.0-4.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75753" version="1" class="patch">
	<metadata>
		<title>libX11-6-1.6.2-4.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-1981" ref_url="https://www.suse.com/security/cve/CVE-2013-1981/" source="CVE"/>
		<reference ref_id="CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997/" source="CVE"/>
		<reference ref_id="CVE-2013-2004" ref_url="https://www.suse.com/security/cve/CVE-2013-2004/" source="CVE"/>
		<description>
These are all security issues fixed in the libX11-6-1.6.2-4.12 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1981/">CVE-2013-1981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2004/">CVE-2013-2004</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140739" comment="libX11-6-1.6.2-4.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140740" comment="libX11-6-32bit-1.6.2-4.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140741" comment="libX11-data-1.6.2-4.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140742" comment="libX11-xcb1-1.6.2-4.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140743" comment="libX11-xcb1-32bit-1.6.2-4.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75754" version="1" class="patch">
	<metadata>
		<title>libXRes1-1.0.7-3.54 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-1988" ref_url="https://www.suse.com/security/cve/CVE-2013-1988/" source="CVE"/>
		<description>
These are all security issues fixed in the libXRes1-1.0.7-3.54 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1988/">CVE-2013-1988</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140744" comment="libXRes1-1.0.7-3.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140745" comment="libXRes1-32bit-1.0.7-3.54 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75755" version="1" class="patch">
	<metadata>
		<title>libXcursor1-1.1.14-3.60 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-2003" ref_url="https://www.suse.com/security/cve/CVE-2013-2003/" source="CVE"/>
		<description>
These are all security issues fixed in the libXcursor1-1.1.14-3.60 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2003/">CVE-2013-2003</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140746" comment="libXcursor1-1.1.14-3.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140747" comment="libXcursor1-32bit-1.1.14-3.60 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75756" version="1" class="patch">
	<metadata>
		<title>libXext6-1.3.2-3.61 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-1982" ref_url="https://www.suse.com/security/cve/CVE-2013-1982/" source="CVE"/>
		<description>
These are all security issues fixed in the libXext6-1.3.2-3.61 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1982/">CVE-2013-1982</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140748" comment="libXext6-1.3.2-3.61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140749" comment="libXext6-32bit-1.3.2-3.61 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75757" version="1" class="patch">
	<metadata>
		<title>libXfixes3-32bit-5.0.1-3.53 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-1983" ref_url="https://www.suse.com/security/cve/CVE-2013-1983/" source="CVE"/>
		<description>
These are all security issues fixed in the libXfixes3-32bit-5.0.1-3.53 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1983/">CVE-2013-1983</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140750" comment="libXfixes3-5.0.1-3.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140751" comment="libXfixes3-32bit-5.0.1-3.53 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75758" version="1" class="patch">
	<metadata>
		<title>libXfont1-1.4.7-2.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<reference ref_id="CVE-2013-6462" ref_url="https://www.suse.com/security/cve/CVE-2013-6462/" source="CVE"/>
		<reference ref_id="CVE-2014-0209" ref_url="https://www.suse.com/security/cve/CVE-2014-0209/" source="CVE"/>
		<reference ref_id="CVE-2014-0210" ref_url="https://www.suse.com/security/cve/CVE-2014-0210/" source="CVE"/>
		<reference ref_id="CVE-2014-0211" ref_url="https://www.suse.com/security/cve/CVE-2014-0211/" source="CVE"/>
		<description>
These are all security issues fixed in the libXfont1-1.4.7-2.9 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6462/">CVE-2013-6462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0209/">CVE-2014-0209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0210/">CVE-2014-0210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0211/">CVE-2014-0211</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141437" comment="libXfont1-1.4.7-2.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75759" version="1" class="patch">
	<metadata>
		<title>libXi6-1.7.2-3.62 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-1984" ref_url="https://www.suse.com/security/cve/CVE-2013-1984/" source="CVE"/>
		<reference ref_id="CVE-2013-1995" ref_url="https://www.suse.com/security/cve/CVE-2013-1995/" source="CVE"/>
		<reference ref_id="CVE-2013-1998" ref_url="https://www.suse.com/security/cve/CVE-2013-1998/" source="CVE"/>
		<description>
These are all security issues fixed in the libXi6-1.7.2-3.62 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1984/">CVE-2013-1984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1995/">CVE-2013-1995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1998/">CVE-2013-1998</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141438" comment="libXi6-1.7.2-3.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141439" comment="libXi6-32bit-1.7.2-3.62 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75760" version="1" class="patch">
	<metadata>
		<title>libXinerama1-1.1.3-3.55 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-1985" ref_url="https://www.suse.com/security/cve/CVE-2013-1985/" source="CVE"/>
		<description>
These are all security issues fixed in the libXinerama1-1.1.3-3.55 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1985/">CVE-2013-1985</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140755" comment="libXinerama1-1.1.3-3.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140756" comment="libXinerama1-32bit-1.1.3-3.55 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75761" version="1" class="patch">
	<metadata>
		<title>libXp6-1.0.2-3.58 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-2062" ref_url="https://www.suse.com/security/cve/CVE-2013-2062/" source="CVE"/>
		<description>
These are all security issues fixed in the libXp6-1.0.2-3.58 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2062/">CVE-2013-2062</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140757" comment="libXp6-1.0.2-3.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140758" comment="libXp6-32bit-1.0.2-3.58 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75762" version="1" class="patch">
	<metadata>
		<title>libXrandr2-1.4.2-3.56 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-1986" ref_url="https://www.suse.com/security/cve/CVE-2013-1986/" source="CVE"/>
		<description>
These are all security issues fixed in the libXrandr2-1.4.2-3.56 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1986/">CVE-2013-1986</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141440" comment="libXrandr2-1.4.2-3.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141441" comment="libXrandr2-32bit-1.4.2-3.56 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75763" version="1" class="patch">
	<metadata>
		<title>libXrender1-0.9.8-3.56 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-1987" ref_url="https://www.suse.com/security/cve/CVE-2013-1987/" source="CVE"/>
		<description>
These are all security issues fixed in the libXrender1-0.9.8-3.56 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1987/">CVE-2013-1987</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140761" comment="libXrender1-0.9.8-3.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140762" comment="libXrender1-32bit-0.9.8-3.56 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75764" version="1" class="patch">
	<metadata>
		<title>libXt6-1.1.4-3.59 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-2002" ref_url="https://www.suse.com/security/cve/CVE-2013-2002/" source="CVE"/>
		<reference ref_id="CVE-2013-2005" ref_url="https://www.suse.com/security/cve/CVE-2013-2005/" source="CVE"/>
		<description>
These are all security issues fixed in the libXt6-1.1.4-3.59 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2002/">CVE-2013-2002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2005/">CVE-2013-2005</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140763" comment="libXt6-1.1.4-3.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140764" comment="libXt6-32bit-1.1.4-3.59 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75765" version="1" class="patch">
	<metadata>
		<title>libXtst6-1.2.2-3.60 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-2063" ref_url="https://www.suse.com/security/cve/CVE-2013-2063/" source="CVE"/>
		<description>
These are all security issues fixed in the libXtst6-1.2.2-3.60 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2063/">CVE-2013-2063</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140765" comment="libXtst6-1.2.2-3.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140766" comment="libXtst6-32bit-1.2.2-3.60 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75766" version="1" class="patch">
	<metadata>
		<title>libXv1-1.0.10-3.57 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-1989" ref_url="https://www.suse.com/security/cve/CVE-2013-1989/" source="CVE"/>
		<reference ref_id="CVE-2013-2066" ref_url="https://www.suse.com/security/cve/CVE-2013-2066/" source="CVE"/>
		<description>
These are all security issues fixed in the libXv1-1.0.10-3.57 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1989/">CVE-2013-1989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2066/">CVE-2013-2066</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140767" comment="libXv1-1.0.10-3.57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140768" comment="libXv1-32bit-1.0.10-3.57 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75767" version="1" class="patch">
	<metadata>
		<title>libXvMC1-1.0.8-3.57 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-1990" ref_url="https://www.suse.com/security/cve/CVE-2013-1990/" source="CVE"/>
		<reference ref_id="CVE-2013-1999" ref_url="https://www.suse.com/security/cve/CVE-2013-1999/" source="CVE"/>
		<description>
These are all security issues fixed in the libXvMC1-1.0.8-3.57 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1990/">CVE-2013-1990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1999/">CVE-2013-1999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140769" comment="libXvMC1-1.0.8-3.57 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75768" version="1" class="patch">
	<metadata>
		<title>libXxf86dga1-1.1.4-3.59 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-1991" ref_url="https://www.suse.com/security/cve/CVE-2013-1991/" source="CVE"/>
		<reference ref_id="CVE-2013-2000" ref_url="https://www.suse.com/security/cve/CVE-2013-2000/" source="CVE"/>
		<description>
These are all security issues fixed in the libXxf86dga1-1.1.4-3.59 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1991/">CVE-2013-1991</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2000/">CVE-2013-2000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140773" comment="libXxf86dga1-1.1.4-3.59 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75769" version="1" class="patch">
	<metadata>
		<title>libXxf86vm1-1.1.3-3.54 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-2001" ref_url="https://www.suse.com/security/cve/CVE-2013-2001/" source="CVE"/>
		<description>
These are all security issues fixed in the libXxf86vm1-1.1.3-3.54 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2001/">CVE-2013-2001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140774" comment="libXxf86vm1-1.1.3-3.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140775" comment="libXxf86vm1-32bit-1.1.3-3.54 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75770" version="1" class="patch">
	<metadata>
		<title>libaugeas0-1.2.0-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2012-0786" ref_url="https://www.suse.com/security/cve/CVE-2012-0786/" source="CVE"/>
		<description>
These are all security issues fixed in the libaugeas0-1.2.0-1.5 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0786/">CVE-2012-0786</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141442" comment="libaugeas0-1.2.0-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75771" version="1" class="patch">
	<metadata>
		<title>libblkid1-2.25-6.69 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-0157" ref_url="https://www.suse.com/security/cve/CVE-2013-0157/" source="CVE"/>
		<description>
These are all security issues fixed in the libblkid1-2.25-6.69 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0157/">CVE-2013-0157</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141443" comment="libblkid1-2.25-6.69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141444" comment="libblkid1-32bit-2.25-6.69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141445" comment="libmount1-2.25-6.69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141446" comment="libmount1-32bit-2.25-6.69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141447" comment="libsmartcols1-2.25-6.69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141448" comment="libuuid-devel-2.25-6.69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141449" comment="libuuid1-2.25-6.69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141450" comment="libuuid1-32bit-2.25-6.69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141451" comment="python-libmount-2.25-6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141452" comment="util-linux-2.25-6.69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141453" comment="util-linux-lang-2.25-6.69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141454" comment="util-linux-systemd-2.25-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141455" comment="uuidd-2.25-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75772" version="1" class="patch">
	<metadata>
		<title>libcgroup1-0.41.rc1-1.30 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-1006" ref_url="https://www.suse.com/security/cve/CVE-2011-1006/" source="CVE"/>
		<reference ref_id="CVE-2011-1022" ref_url="https://www.suse.com/security/cve/CVE-2011-1022/" source="CVE"/>
		<description>
These are all security issues fixed in the libcgroup1-0.41.rc1-1.30 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1006/">CVE-2011-1006</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1022/">CVE-2011-1022</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141456" comment="libcgroup1-0.41.rc1-1.30 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75773" version="1" class="patch">
	<metadata>
		<title>libdcerpc-binding0-32bit-4.1.12-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2010-0926" ref_url="https://www.suse.com/security/cve/CVE-2010-0926/" source="CVE"/>
		<reference ref_id="CVE-2010-1635" ref_url="https://www.suse.com/security/cve/CVE-2010-1635/" source="CVE"/>
		<reference ref_id="CVE-2010-1642" ref_url="https://www.suse.com/security/cve/CVE-2010-1642/" source="CVE"/>
		<reference ref_id="CVE-2010-2063" ref_url="https://www.suse.com/security/cve/CVE-2010-2063/" source="CVE"/>
		<reference ref_id="CVE-2010-3069" ref_url="https://www.suse.com/security/cve/CVE-2010-3069/" source="CVE"/>
		<reference ref_id="CVE-2011-0719" ref_url="https://www.suse.com/security/cve/CVE-2011-0719/" source="CVE"/>
		<reference ref_id="CVE-2011-2522" ref_url="https://www.suse.com/security/cve/CVE-2011-2522/" source="CVE"/>
		<reference ref_id="CVE-2011-2694" ref_url="https://www.suse.com/security/cve/CVE-2011-2694/" source="CVE"/>
		<reference ref_id="CVE-2012-0817" ref_url="https://www.suse.com/security/cve/CVE-2012-0817/" source="CVE"/>
		<reference ref_id="CVE-2012-0870" ref_url="https://www.suse.com/security/cve/CVE-2012-0870/" source="CVE"/>
		<reference ref_id="CVE-2012-1182" ref_url="https://www.suse.com/security/cve/CVE-2012-1182/" source="CVE"/>
		<reference ref_id="CVE-2012-2111" ref_url="https://www.suse.com/security/cve/CVE-2012-2111/" source="CVE"/>
		<reference ref_id="CVE-2012-6150" ref_url="https://www.suse.com/security/cve/CVE-2012-6150/" source="CVE"/>
		<reference ref_id="CVE-2013-0172" ref_url="https://www.suse.com/security/cve/CVE-2013-0172/" source="CVE"/>
		<reference ref_id="CVE-2013-0213" ref_url="https://www.suse.com/security/cve/CVE-2013-0213/" source="CVE"/>
		<reference ref_id="CVE-2013-0214" ref_url="https://www.suse.com/security/cve/CVE-2013-0214/" source="CVE"/>
		<reference ref_id="CVE-2013-0454" ref_url="https://www.suse.com/security/cve/CVE-2013-0454/" source="CVE"/>
		<reference ref_id="CVE-2013-1863" ref_url="https://www.suse.com/security/cve/CVE-2013-1863/" source="CVE"/>
		<reference ref_id="CVE-2013-4124" ref_url="https://www.suse.com/security/cve/CVE-2013-4124/" source="CVE"/>
		<reference ref_id="CVE-2013-4408" ref_url="https://www.suse.com/security/cve/CVE-2013-4408/" source="CVE"/>
		<reference ref_id="CVE-2013-4475" ref_url="https://www.suse.com/security/cve/CVE-2013-4475/" source="CVE"/>
		<reference ref_id="CVE-2013-4476" ref_url="https://www.suse.com/security/cve/CVE-2013-4476/" source="CVE"/>
		<reference ref_id="CVE-2013-4496" ref_url="https://www.suse.com/security/cve/CVE-2013-4496/" source="CVE"/>
		<reference ref_id="CVE-2013-6442" ref_url="https://www.suse.com/security/cve/CVE-2013-6442/" source="CVE"/>
		<reference ref_id="CVE-2014-0178" ref_url="https://www.suse.com/security/cve/CVE-2014-0178/" source="CVE"/>
		<reference ref_id="CVE-2014-0239" ref_url="https://www.suse.com/security/cve/CVE-2014-0239/" source="CVE"/>
		<reference ref_id="CVE-2014-0244" ref_url="https://www.suse.com/security/cve/CVE-2014-0244/" source="CVE"/>
		<reference ref_id="CVE-2014-3493" ref_url="https://www.suse.com/security/cve/CVE-2014-3493/" source="CVE"/>
		<reference ref_id="CVE-2014-3560" ref_url="https://www.suse.com/security/cve/CVE-2014-3560/" source="CVE"/>
		<description>
These are all security issues fixed in the libdcerpc-binding0-32bit-4.1.12-3.2 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0926/">CVE-2010-0926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1635/">CVE-2010-1635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1642/">CVE-2010-1642</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2063/">CVE-2010-2063</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3069/">CVE-2010-3069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0719/">CVE-2011-0719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2522/">CVE-2011-2522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2694/">CVE-2011-2694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0817/">CVE-2012-0817</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0870/">CVE-2012-0870</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1182/">CVE-2012-1182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2111/">CVE-2012-2111</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-6150/">CVE-2012-6150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0172/">CVE-2013-0172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0213/">CVE-2013-0213</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0214/">CVE-2013-0214</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0454/">CVE-2013-0454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1863/">CVE-2013-1863</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4124/">CVE-2013-4124</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4408/">CVE-2013-4408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4475/">CVE-2013-4475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4476/">CVE-2013-4476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4496/">CVE-2013-4496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6442/">CVE-2013-6442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0178/">CVE-2014-0178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0239/">CVE-2014-0239</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0244/">CVE-2014-0244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3493/">CVE-2014-3493</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3560/">CVE-2014-3560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141457" comment="libdcerpc-binding0-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141458" comment="libdcerpc-binding0-32bit-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141459" comment="libdcerpc0-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141460" comment="libdcerpc0-32bit-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141461" comment="libgensec0-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141462" comment="libgensec0-32bit-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141463" comment="libndr-krb5pac0-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141464" comment="libndr-krb5pac0-32bit-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141465" comment="libndr-nbt0-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141466" comment="libndr-nbt0-32bit-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141467" comment="libndr-standard0-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141468" comment="libndr-standard0-32bit-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141469" comment="libndr0-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141470" comment="libndr0-32bit-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141471" comment="libnetapi0-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141472" comment="libnetapi0-32bit-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141473" comment="libpdb0-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141474" comment="libpdb0-32bit-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141475" comment="libregistry0-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141476" comment="libsamba-credentials0-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141477" comment="libsamba-credentials0-32bit-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141478" comment="libsamba-hostconfig0-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141479" comment="libsamba-hostconfig0-32bit-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141480" comment="libsamba-util0-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141481" comment="libsamba-util0-32bit-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141482" comment="libsamdb0-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141483" comment="libsamdb0-32bit-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141484" comment="libsmbclient-raw0-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141485" comment="libsmbclient-raw0-32bit-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141486" comment="libsmbclient0-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141487" comment="libsmbclient0-32bit-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141488" comment="libsmbconf0-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141489" comment="libsmbconf0-32bit-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141490" comment="libsmbldap0-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141491" comment="libsmbldap0-32bit-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141492" comment="libtevent-util0-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141493" comment="libtevent-util0-32bit-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141494" comment="libwbclient0-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141495" comment="libwbclient0-32bit-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141496" comment="samba-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141497" comment="samba-32bit-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141498" comment="samba-client-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141499" comment="samba-client-32bit-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141500" comment="samba-doc-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141501" comment="samba-libs-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141502" comment="samba-libs-32bit-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141503" comment="samba-winbind-4.1.12-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141504" comment="samba-winbind-32bit-4.1.12-3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75774" version="1" class="patch">
	<metadata>
		<title>libdmx1-1.1.3-3.52 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-1992" ref_url="https://www.suse.com/security/cve/CVE-2013-1992/" source="CVE"/>
		<description>
These are all security issues fixed in the libdmx1-1.1.3-3.52 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1992/">CVE-2013-1992</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140838" comment="libdmx1-1.1.3-3.52 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75775" version="1" class="patch">
	<metadata>
		<title>libecpg6-9.3.5-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2007-6600" ref_url="https://www.suse.com/security/cve/CVE-2007-6600/" source="CVE"/>
		<reference ref_id="CVE-2009-4034" ref_url="https://www.suse.com/security/cve/CVE-2009-4034/" source="CVE"/>
		<reference ref_id="CVE-2009-4136" ref_url="https://www.suse.com/security/cve/CVE-2009-4136/" source="CVE"/>
		<reference ref_id="CVE-2010-1169" ref_url="https://www.suse.com/security/cve/CVE-2010-1169/" source="CVE"/>
		<reference ref_id="CVE-2010-1170" ref_url="https://www.suse.com/security/cve/CVE-2010-1170/" source="CVE"/>
		<reference ref_id="CVE-2010-3433" ref_url="https://www.suse.com/security/cve/CVE-2010-3433/" source="CVE"/>
		<reference ref_id="CVE-2012-0866" ref_url="https://www.suse.com/security/cve/CVE-2012-0866/" source="CVE"/>
		<reference ref_id="CVE-2012-0867" ref_url="https://www.suse.com/security/cve/CVE-2012-0867/" source="CVE"/>
		<reference ref_id="CVE-2012-0868" ref_url="https://www.suse.com/security/cve/CVE-2012-0868/" source="CVE"/>
		<reference ref_id="CVE-2012-2143" ref_url="https://www.suse.com/security/cve/CVE-2012-2143/" source="CVE"/>
		<reference ref_id="CVE-2012-2655" ref_url="https://www.suse.com/security/cve/CVE-2012-2655/" source="CVE"/>
		<reference ref_id="CVE-2012-3488" ref_url="https://www.suse.com/security/cve/CVE-2012-3488/" source="CVE"/>
		<reference ref_id="CVE-2012-3489" ref_url="https://www.suse.com/security/cve/CVE-2012-3489/" source="CVE"/>
		<reference ref_id="CVE-2013-0255" ref_url="https://www.suse.com/security/cve/CVE-2013-0255/" source="CVE"/>
		<reference ref_id="CVE-2013-1899" ref_url="https://www.suse.com/security/cve/CVE-2013-1899/" source="CVE"/>
		<reference ref_id="CVE-2013-1900" ref_url="https://www.suse.com/security/cve/CVE-2013-1900/" source="CVE"/>
		<reference ref_id="CVE-2013-1901" ref_url="https://www.suse.com/security/cve/CVE-2013-1901/" source="CVE"/>
		<reference ref_id="CVE-2014-0060" ref_url="https://www.suse.com/security/cve/CVE-2014-0060/" source="CVE"/>
		<reference ref_id="CVE-2014-0061" ref_url="https://www.suse.com/security/cve/CVE-2014-0061/" source="CVE"/>
		<reference ref_id="CVE-2014-0062" ref_url="https://www.suse.com/security/cve/CVE-2014-0062/" source="CVE"/>
		<reference ref_id="CVE-2014-0063" ref_url="https://www.suse.com/security/cve/CVE-2014-0063/" source="CVE"/>
		<reference ref_id="CVE-2014-0064" ref_url="https://www.suse.com/security/cve/CVE-2014-0064/" source="CVE"/>
		<reference ref_id="CVE-2014-0065" ref_url="https://www.suse.com/security/cve/CVE-2014-0065/" source="CVE"/>
		<reference ref_id="CVE-2014-0066" ref_url="https://www.suse.com/security/cve/CVE-2014-0066/" source="CVE"/>
		<reference ref_id="CVE-2014-0067" ref_url="https://www.suse.com/security/cve/CVE-2014-0067/" source="CVE"/>
		<description>
These are all security issues fixed in the libecpg6-9.3.5-2.3 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6600/">CVE-2007-6600</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4034/">CVE-2009-4034</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4136/">CVE-2009-4136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1169/">CVE-2010-1169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1170/">CVE-2010-1170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3433/">CVE-2010-3433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0866/">CVE-2012-0866</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0867/">CVE-2012-0867</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0868/">CVE-2012-0868</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2143/">CVE-2012-2143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2655/">CVE-2012-2655</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3488/">CVE-2012-3488</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3489/">CVE-2012-3489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0255/">CVE-2013-0255</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1899/">CVE-2013-1899</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1900/">CVE-2013-1900</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1901/">CVE-2013-1901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0060/">CVE-2014-0060</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0061/">CVE-2014-0061</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0062/">CVE-2014-0062</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0063/">CVE-2014-0063</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0064/">CVE-2014-0064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0065/">CVE-2014-0065</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0066/">CVE-2014-0066</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0067/">CVE-2014-0067</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141505" comment="libecpg6-9.3.5-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141506" comment="libpq5-9.3.5-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141507" comment="libpq5-32bit-9.3.5-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141508" comment="postgresql93-9.3.5-2.24 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75776" version="1" class="patch">
	<metadata>
		<title>libevent-2_0-5-2.0.21-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2014-6272" ref_url="https://www.suse.com/security/cve/CVE-2014-6272/" source="CVE"/>
		<description>
These are all security issues fixed in the libevent-2_0-5-2.0.21-4.1 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6272/">CVE-2014-6272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140839" comment="libevent-2_0-5-2.0.21-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75777" version="1" class="patch">
	<metadata>
		<title>libexif12-0.6.21-6.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2012-2812" ref_url="https://www.suse.com/security/cve/CVE-2012-2812/" source="CVE"/>
		<reference ref_id="CVE-2012-2813" ref_url="https://www.suse.com/security/cve/CVE-2012-2813/" source="CVE"/>
		<reference ref_id="CVE-2012-2814" ref_url="https://www.suse.com/security/cve/CVE-2012-2814/" source="CVE"/>
		<reference ref_id="CVE-2012-2836" ref_url="https://www.suse.com/security/cve/CVE-2012-2836/" source="CVE"/>
		<reference ref_id="CVE-2012-2837" ref_url="https://www.suse.com/security/cve/CVE-2012-2837/" source="CVE"/>
		<reference ref_id="CVE-2012-2840" ref_url="https://www.suse.com/security/cve/CVE-2012-2840/" source="CVE"/>
		<reference ref_id="CVE-2012-2841" ref_url="https://www.suse.com/security/cve/CVE-2012-2841/" source="CVE"/>
		<description>
These are all security issues fixed in the libexif12-0.6.21-6.4 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2812/">CVE-2012-2812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2813/">CVE-2012-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2814/">CVE-2012-2814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2836/">CVE-2012-2836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2837/">CVE-2012-2837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2840/">CVE-2012-2840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2841/">CVE-2012-2841</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140840" comment="libexif12-0.6.21-6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140841" comment="libexif12-32bit-0.6.21-6.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75778" version="1" class="patch">
	<metadata>
		<title>libfbembed2_5-2.5.2.26539-13.42 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-2492" ref_url="https://www.suse.com/security/cve/CVE-2013-2492/" source="CVE"/>
		<description>
These are all security issues fixed in the libfbembed2_5-2.5.2.26539-13.42 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2492/">CVE-2013-2492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141509" comment="libfbembed2_5-2.5.2.26539-13.42 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75779" version="1" class="patch">
	<metadata>
		<title>libfreebl3-3.16.4-5.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-3640" ref_url="https://www.suse.com/security/cve/CVE-2011-3640/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<reference ref_id="CVE-2013-0791" ref_url="https://www.suse.com/security/cve/CVE-2013-0791/" source="CVE"/>
		<reference ref_id="CVE-2013-1620" ref_url="https://www.suse.com/security/cve/CVE-2013-1620/" source="CVE"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<reference ref_id="CVE-2013-1740" ref_url="https://www.suse.com/security/cve/CVE-2013-1740/" source="CVE"/>
		<reference ref_id="CVE-2013-5605" ref_url="https://www.suse.com/security/cve/CVE-2013-5605/" source="CVE"/>
		<reference ref_id="CVE-2014-1492" ref_url="https://www.suse.com/security/cve/CVE-2014-1492/" source="CVE"/>
		<reference ref_id="CVE-2014-1568" ref_url="https://www.suse.com/security/cve/CVE-2014-1568/" source="CVE"/>
		<description>
These are all security issues fixed in the libfreebl3-3.16.4-5.2 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3640/">CVE-2011-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0791/">CVE-2013-0791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1620/">CVE-2013-1620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1740/">CVE-2013-1740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5605/">CVE-2013-5605</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1492/">CVE-2014-1492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1568/">CVE-2014-1568</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141510" comment="libfreebl3-3.16.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141511" comment="libfreebl3-32bit-3.16.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141512" comment="libsoftokn3-3.16.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141513" comment="libsoftokn3-32bit-3.16.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141514" comment="mozilla-nss-3.16.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141515" comment="mozilla-nss-32bit-3.16.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141516" comment="mozilla-nss-certs-3.16.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141517" comment="mozilla-nss-certs-32bit-3.16.4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141518" comment="mozilla-nss-tools-3.16.4-5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75780" version="1" class="patch">
	<metadata>
		<title>libfreetype6-2.5.3-2.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-0946" ref_url="https://www.suse.com/security/cve/CVE-2009-0946/" source="CVE"/>
		<reference ref_id="CVE-2010-2497" ref_url="https://www.suse.com/security/cve/CVE-2010-2497/" source="CVE"/>
		<reference ref_id="CVE-2010-2805" ref_url="https://www.suse.com/security/cve/CVE-2010-2805/" source="CVE"/>
		<reference ref_id="CVE-2010-3053" ref_url="https://www.suse.com/security/cve/CVE-2010-3053/" source="CVE"/>
		<reference ref_id="CVE-2010-3054" ref_url="https://www.suse.com/security/cve/CVE-2010-3054/" source="CVE"/>
		<reference ref_id="CVE-2010-3311" ref_url="https://www.suse.com/security/cve/CVE-2010-3311/" source="CVE"/>
		<reference ref_id="CVE-2010-3814" ref_url="https://www.suse.com/security/cve/CVE-2010-3814/" source="CVE"/>
		<reference ref_id="CVE-2010-3855" ref_url="https://www.suse.com/security/cve/CVE-2010-3855/" source="CVE"/>
		<reference ref_id="CVE-2011-0226" ref_url="https://www.suse.com/security/cve/CVE-2011-0226/" source="CVE"/>
		<reference ref_id="CVE-2011-3256" ref_url="https://www.suse.com/security/cve/CVE-2011-3256/" source="CVE"/>
		<reference ref_id="CVE-2011-3439" ref_url="https://www.suse.com/security/cve/CVE-2011-3439/" source="CVE"/>
		<reference ref_id="CVE-2012-1126" ref_url="https://www.suse.com/security/cve/CVE-2012-1126/" source="CVE"/>
		<reference ref_id="CVE-2012-1127" ref_url="https://www.suse.com/security/cve/CVE-2012-1127/" source="CVE"/>
		<reference ref_id="CVE-2012-1128" ref_url="https://www.suse.com/security/cve/CVE-2012-1128/" source="CVE"/>
		<reference ref_id="CVE-2012-1129" ref_url="https://www.suse.com/security/cve/CVE-2012-1129/" source="CVE"/>
		<reference ref_id="CVE-2012-1130" ref_url="https://www.suse.com/security/cve/CVE-2012-1130/" source="CVE"/>
		<reference ref_id="CVE-2012-1131" ref_url="https://www.suse.com/security/cve/CVE-2012-1131/" source="CVE"/>
		<reference ref_id="CVE-2012-1132" ref_url="https://www.suse.com/security/cve/CVE-2012-1132/" source="CVE"/>
		<reference ref_id="CVE-2012-1133" ref_url="https://www.suse.com/security/cve/CVE-2012-1133/" source="CVE"/>
		<reference ref_id="CVE-2012-1134" ref_url="https://www.suse.com/security/cve/CVE-2012-1134/" source="CVE"/>
		<reference ref_id="CVE-2012-1135" ref_url="https://www.suse.com/security/cve/CVE-2012-1135/" source="CVE"/>
		<reference ref_id="CVE-2012-1136" ref_url="https://www.suse.com/security/cve/CVE-2012-1136/" source="CVE"/>
		<reference ref_id="CVE-2012-1137" ref_url="https://www.suse.com/security/cve/CVE-2012-1137/" source="CVE"/>
		<reference ref_id="CVE-2012-1138" ref_url="https://www.suse.com/security/cve/CVE-2012-1138/" source="CVE"/>
		<reference ref_id="CVE-2012-1139" ref_url="https://www.suse.com/security/cve/CVE-2012-1139/" source="CVE"/>
		<reference ref_id="CVE-2012-1140" ref_url="https://www.suse.com/security/cve/CVE-2012-1140/" source="CVE"/>
		<reference ref_id="CVE-2012-1141" ref_url="https://www.suse.com/security/cve/CVE-2012-1141/" source="CVE"/>
		<reference ref_id="CVE-2012-1142" ref_url="https://www.suse.com/security/cve/CVE-2012-1142/" source="CVE"/>
		<reference ref_id="CVE-2012-1143" ref_url="https://www.suse.com/security/cve/CVE-2012-1143/" source="CVE"/>
		<reference ref_id="CVE-2012-1144" ref_url="https://www.suse.com/security/cve/CVE-2012-1144/" source="CVE"/>
		<reference ref_id="CVE-2012-5668" ref_url="https://www.suse.com/security/cve/CVE-2012-5668/" source="CVE"/>
		<reference ref_id="CVE-2012-5669" ref_url="https://www.suse.com/security/cve/CVE-2012-5669/" source="CVE"/>
		<reference ref_id="CVE-2012-5670" ref_url="https://www.suse.com/security/cve/CVE-2012-5670/" source="CVE"/>
		<reference ref_id="CVE-2014-2240" ref_url="https://www.suse.com/security/cve/CVE-2014-2240/" source="CVE"/>
		<reference ref_id="CVE-2014-2241" ref_url="https://www.suse.com/security/cve/CVE-2014-2241/" source="CVE"/>
		<description>
These are all security issues fixed in the libfreetype6-2.5.3-2.18 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0946/">CVE-2009-0946</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2497/">CVE-2010-2497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2805/">CVE-2010-2805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3053/">CVE-2010-3053</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3054/">CVE-2010-3054</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3311/">CVE-2010-3311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3814/">CVE-2010-3814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3855/">CVE-2010-3855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0226/">CVE-2011-0226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3256/">CVE-2011-3256</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3439/">CVE-2011-3439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1126/">CVE-2012-1126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1127/">CVE-2012-1127</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1128/">CVE-2012-1128</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1129/">CVE-2012-1129</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1130/">CVE-2012-1130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1131/">CVE-2012-1131</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1132/">CVE-2012-1132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1133/">CVE-2012-1133</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1134/">CVE-2012-1134</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1135/">CVE-2012-1135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1136/">CVE-2012-1136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1137/">CVE-2012-1137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1138/">CVE-2012-1138</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1139/">CVE-2012-1139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1140/">CVE-2012-1140</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1141/">CVE-2012-1141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1142/">CVE-2012-1142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1143/">CVE-2012-1143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1144/">CVE-2012-1144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5668/">CVE-2012-5668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5669/">CVE-2012-5669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5670/">CVE-2012-5670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2240/">CVE-2014-2240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2241/">CVE-2014-2241</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141519" comment="libfreetype6-2.5.3-2.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141520" comment="libfreetype6-32bit-2.5.3-2.18 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75781" version="1" class="patch">
	<metadata>
		<title>libgadu3-1.11.4-1.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-6487" ref_url="https://www.suse.com/security/cve/CVE-2013-6487/" source="CVE"/>
		<reference ref_id="CVE-2014-3775" ref_url="https://www.suse.com/security/cve/CVE-2014-3775/" source="CVE"/>
		<description>
These are all security issues fixed in the libgadu3-1.11.4-1.12 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6487/">CVE-2013-6487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3775/">CVE-2014-3775</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141521" comment="libgadu3-1.11.4-1.12 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75782" version="1" class="patch">
	<metadata>
		<title>libgc1-7.2d-3.77 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2012-2673" ref_url="https://www.suse.com/security/cve/CVE-2012-2673/" source="CVE"/>
		<description>
These are all security issues fixed in the libgc1-7.2d-3.77 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2673/">CVE-2012-2673</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140590" comment="libgc1-7.2d-3.77 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75783" version="1" class="patch">
	<metadata>
		<title>libgcrypt20-1.6.1-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-4242" ref_url="https://www.suse.com/security/cve/CVE-2013-4242/" source="CVE"/>
		<description>
These are all security issues fixed in the libgcrypt20-1.6.1-9.1 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4242/">CVE-2013-4242</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141522" comment="libgcrypt20-1.6.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141523" comment="libgcrypt20-32bit-1.6.1-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75784" version="1" class="patch">
	<metadata>
		<title>libgnomesu-1.0.0-352.84 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-1946" ref_url="https://www.suse.com/security/cve/CVE-2011-1946/" source="CVE"/>
		<description>
These are all security issues fixed in the libgnomesu-1.0.0-352.84 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1946/">CVE-2011-1946</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141524" comment="libgnomesu-1.0.0-352.84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141525" comment="libgnomesu-lang-1.0.0-352.84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141526" comment="libgnomesu0-1.0.0-352.84 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75785" version="1" class="patch">
	<metadata>
		<title>libgssglue1-0.4-3.83 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-2709" ref_url="https://www.suse.com/security/cve/CVE-2011-2709/" source="CVE"/>
		<description>
These are all security issues fixed in the libgssglue1-0.4-3.83 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2709/">CVE-2011-2709</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140845" comment="libgssglue1-0.4-3.83 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140846" comment="libgssglue1-32bit-0.4-3.83 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75786" version="1" class="patch">
	<metadata>
		<title>libgudev-1_0-0-210-44.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2012-1174" ref_url="https://www.suse.com/security/cve/CVE-2012-1174/" source="CVE"/>
		<reference ref_id="CVE-2013-4288" ref_url="https://www.suse.com/security/cve/CVE-2013-4288/" source="CVE"/>
		<description>
These are all security issues fixed in the libgudev-1_0-0-210-44.1 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1174/">CVE-2012-1174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4288/">CVE-2013-4288</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141527" comment="libgudev-1_0-0-210-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141528" comment="libgudev-1_0-0-32bit-210-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141529" comment="libudev1-210-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141530" comment="libudev1-32bit-210-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141531" comment="systemd-210-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141532" comment="systemd-32bit-210-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141533" comment="systemd-bash-completion-210-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141534" comment="systemd-sysvinit-210-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141535" comment="udev-210-44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75787" version="1" class="patch">
	<metadata>
		<title>libid3tag0-0.15.1b-182.58 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2008-2109" ref_url="https://www.suse.com/security/cve/CVE-2008-2109/" source="CVE"/>
		<description>
These are all security issues fixed in the libid3tag0-0.15.1b-182.58 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2109/">CVE-2008-2109</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141536" comment="libid3tag0-0.15.1b-182.58 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75788" version="1" class="patch">
	<metadata>
		<title>libipa_hbac0-1.11.5.1-5.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2010-4341" ref_url="https://www.suse.com/security/cve/CVE-2010-4341/" source="CVE"/>
		<reference ref_id="CVE-2011-1758" ref_url="https://www.suse.com/security/cve/CVE-2011-1758/" source="CVE"/>
		<reference ref_id="CVE-2013-0219" ref_url="https://www.suse.com/security/cve/CVE-2013-0219/" source="CVE"/>
		<reference ref_id="CVE-2013-0220" ref_url="https://www.suse.com/security/cve/CVE-2013-0220/" source="CVE"/>
		<reference ref_id="CVE-2013-0287" ref_url="https://www.suse.com/security/cve/CVE-2013-0287/" source="CVE"/>
		<description>
These are all security issues fixed in the libipa_hbac0-1.11.5.1-5.20 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4341/">CVE-2010-4341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1758/">CVE-2011-1758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0219/">CVE-2013-0219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0220/">CVE-2013-0220</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0287/">CVE-2013-0287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141537" comment="libipa_hbac0-1.11.5.1-5.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141538" comment="libsss_idmap0-1.11.5.1-5.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141539" comment="python-sssd-config-1.11.5.1-5.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141540" comment="sssd-1.11.5.1-5.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141541" comment="sssd-32bit-1.11.5.1-5.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141542" comment="sssd-ad-1.11.5.1-5.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141543" comment="sssd-ipa-1.11.5.1-5.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141544" comment="sssd-krb5-1.11.5.1-5.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141545" comment="sssd-krb5-common-1.11.5.1-5.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141546" comment="sssd-ldap-1.11.5.1-5.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141547" comment="sssd-proxy-1.11.5.1-5.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141548" comment="sssd-tools-1.11.5.1-5.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75789" version="1" class="patch">
	<metadata>
		<title>libjavascriptcoregtk-1_0-0-2.2.7-3.63 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2012-5112" ref_url="https://www.suse.com/security/cve/CVE-2012-5112/" source="CVE"/>
		<reference ref_id="CVE-2012-5133" ref_url="https://www.suse.com/security/cve/CVE-2012-5133/" source="CVE"/>
		<description>
These are all security issues fixed in the libjavascriptcoregtk-1_0-0-2.2.7-3.63 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5112/">CVE-2012-5112</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5133/">CVE-2012-5133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141549" comment="libjavascriptcoregtk-1_0-0-2.2.7-3.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141550" comment="libjavascriptcoregtk-1_0-0-32bit-2.2.7-3.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141551" comment="libjavascriptcoregtk-3_0-0-2.2.7-3.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141552" comment="libwebkit2gtk-3_0-25-2.2.7-3.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141553" comment="libwebkitgtk-1_0-0-2.2.7-3.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141554" comment="libwebkitgtk-1_0-0-32bit-2.2.7-3.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141555" comment="libwebkitgtk-3_0-0-2.2.7-3.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141556" comment="libwebkitgtk2-lang-2.2.7-3.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141557" comment="libwebkitgtk3-lang-2.2.7-3.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141558" comment="typelib-1_0-JavaScriptCore-3_0-2.2.7-3.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141559" comment="typelib-1_0-WebKit-3_0-2.2.7-3.63 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75790" version="1" class="patch">
	<metadata>
		<title>libjbig2-2.0-12.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-6369" ref_url="https://www.suse.com/security/cve/CVE-2013-6369/" source="CVE"/>
		<description>
These are all security issues fixed in the libjbig2-2.0-12.13 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6369/">CVE-2013-6369</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141560" comment="libjbig2-2.0-12.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140690" comment="libjbig2-32bit-2.0-12.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75791" version="1" class="patch">
	<metadata>
		<title>libjson-c2-0.11-2.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-6370" ref_url="https://www.suse.com/security/cve/CVE-2013-6370/" source="CVE"/>
		<reference ref_id="CVE-2013-6371" ref_url="https://www.suse.com/security/cve/CVE-2013-6371/" source="CVE"/>
		<description>
These are all security issues fixed in the libjson-c2-0.11-2.22 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6370/">CVE-2013-6370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6371/">CVE-2013-6371</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140691" comment="libjson-c2-0.11-2.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140692" comment="libjson-c2-32bit-0.11-2.22 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75792" version="1" class="patch">
	<metadata>
		<title>libltdl7-2.4.2-14.60 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-3736" ref_url="https://www.suse.com/security/cve/CVE-2009-3736/" source="CVE"/>
		<description>
These are all security issues fixed in the libltdl7-2.4.2-14.60 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3736/">CVE-2009-3736</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140875" comment="libltdl7-2.4.2-14.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140876" comment="libltdl7-32bit-2.4.2-14.60 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75793" version="1" class="patch">
	<metadata>
		<title>liblua5_2-5.2.2-4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2014-5461" ref_url="https://www.suse.com/security/cve/CVE-2014-5461/" source="CVE"/>
		<description>
These are all security issues fixed in the liblua5_2-5.2.2-4.2 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5461/">CVE-2014-5461</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140879" comment="liblua5_2-5.2.2-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140881" comment="lua-5.2.2-4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75794" version="1" class="patch">
	<metadata>
		<title>liblzo2-2-2.08-1.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607/" source="CVE"/>
		<description>
These are all security issues fixed in the liblzo2-2-2.08-1.13 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141561" comment="liblzo2-2-2.08-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140883" comment="liblzo2-2-32bit-2.08-1.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75795" version="1" class="patch">
	<metadata>
		<title>libmikmod3-3.2.0-4.59 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2007-6720" ref_url="https://www.suse.com/security/cve/CVE-2007-6720/" source="CVE"/>
		<reference ref_id="CVE-2009-0179" ref_url="https://www.suse.com/security/cve/CVE-2009-0179/" source="CVE"/>
		<reference ref_id="CVE-2009-3995" ref_url="https://www.suse.com/security/cve/CVE-2009-3995/" source="CVE"/>
		<reference ref_id="CVE-2009-3996" ref_url="https://www.suse.com/security/cve/CVE-2009-3996/" source="CVE"/>
		<reference ref_id="CVE-2010-2546" ref_url="https://www.suse.com/security/cve/CVE-2010-2546/" source="CVE"/>
		<description>
These are all security issues fixed in the libmikmod3-3.2.0-4.59 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2007-6720/">CVE-2007-6720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0179/">CVE-2009-0179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3995/">CVE-2009-3995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3996/">CVE-2009-3996</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2546/">CVE-2010-2546</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141562" comment="libmikmod3-3.2.0-4.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141563" comment="libmikmod3-32bit-3.2.0-4.59 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75796" version="1" class="patch">
	<metadata>
		<title>libmms0-0.6.2-15.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2014-2892" ref_url="https://www.suse.com/security/cve/CVE-2014-2892/" source="CVE"/>
		<description>
These are all security issues fixed in the libmms0-0.6.2-15.8 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-2892/">CVE-2014-2892</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140884" comment="libmms0-0.6.2-15.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75797" version="1" class="patch">
	<metadata>
		<title>libmodplug1-0.8.8.4-13.69 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-1761" ref_url="https://www.suse.com/security/cve/CVE-2011-1761/" source="CVE"/>
		<reference ref_id="CVE-2013-4233" ref_url="https://www.suse.com/security/cve/CVE-2013-4233/" source="CVE"/>
		<reference ref_id="CVE-2013-4234" ref_url="https://www.suse.com/security/cve/CVE-2013-4234/" source="CVE"/>
		<description>
These are all security issues fixed in the libmodplug1-0.8.8.4-13.69 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1761/">CVE-2011-1761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4233/">CVE-2013-4233</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4234/">CVE-2013-4234</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140885" comment="libmodplug1-0.8.8.4-13.69 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75798" version="1" class="patch">
	<metadata>
		<title>libmspack0-0.4-3.64 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2010-2800" ref_url="https://www.suse.com/security/cve/CVE-2010-2800/" source="CVE"/>
		<reference ref_id="CVE-2010-2801" ref_url="https://www.suse.com/security/cve/CVE-2010-2801/" source="CVE"/>
		<description>
These are all security issues fixed in the libmspack0-0.4-3.64 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2800/">CVE-2010-2800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2801/">CVE-2010-2801</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141564" comment="libmspack0-0.4-3.64 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75799" version="1" class="patch">
	<metadata>
		<title>libmusicbrainz4-2.1.5-27.86 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2006-4197" ref_url="https://www.suse.com/security/cve/CVE-2006-4197/" source="CVE"/>
		<description>
These are all security issues fixed in the libmusicbrainz4-2.1.5-27.86 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4197/">CVE-2006-4197</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140886" comment="libmusicbrainz4-2.1.5-27.86 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75800" version="1" class="patch">
	<metadata>
		<title>libmysqlclient18-10.0.11-6.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2007-5970" ref_url="https://www.suse.com/security/cve/CVE-2007-5970/" source="CVE"/>
		<reference ref_id="CVE-2008-7247" ref_url="https://www.suse.com/security/cve/CVE-2008-7247/" source="CVE"/>
		<reference ref_id="CVE-2009-4019" ref_url="https://www.suse.com/security/cve/CVE-2009-4019/" source="CVE"/>
		<reference ref_id="CVE-2009-4028" ref_url="https://www.suse.com/security/cve/CVE-2009-4028/" source="CVE"/>
		<reference ref_id="CVE-2009-4030" ref_url="https://www.suse.com/security/cve/CVE-2009-4030/" source="CVE"/>
		<reference ref_id="CVE-2013-1976" ref_url="https://www.suse.com/security/cve/CVE-2013-1976/" source="CVE"/>
		<description>
These are all security issues fixed in the libmysqlclient18-10.0.11-6.4 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5970/">CVE-2007-5970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-7247/">CVE-2008-7247</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4019/">CVE-2009-4019</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4028/">CVE-2009-4028</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4030/">CVE-2009-4030</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1976/">CVE-2013-1976</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141565" comment="libmysqlclient18-10.0.11-6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141566" comment="libmysqlclient18-32bit-10.0.11-6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141567" comment="libmysqlclient_r18-10.0.11-6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141568" comment="libmysqlclient_r18-32bit-10.0.11-6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141569" comment="mariadb-10.0.11-6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141570" comment="mariadb-client-10.0.11-6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141571" comment="mariadb-errormessages-10.0.11-6.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75801" version="1" class="patch">
	<metadata>
		<title>libneon27-0.30.0-3.65 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-2473" ref_url="https://www.suse.com/security/cve/CVE-2009-2473/" source="CVE"/>
		<reference ref_id="CVE-2009-2474" ref_url="https://www.suse.com/security/cve/CVE-2009-2474/" source="CVE"/>
		<description>
These are all security issues fixed in the libneon27-0.30.0-3.65 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2473/">CVE-2009-2473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2474/">CVE-2009-2474</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140887" comment="libneon27-0.30.0-3.65 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75802" version="1" class="patch">
	<metadata>
		<title>libopenssl0_9_8-0.9.8j-59.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2006-7250" ref_url="https://www.suse.com/security/cve/CVE-2006-7250/" source="CVE"/>
		<reference ref_id="CVE-2009-0590" ref_url="https://www.suse.com/security/cve/CVE-2009-0590/" source="CVE"/>
		<reference ref_id="CVE-2009-0591" ref_url="https://www.suse.com/security/cve/CVE-2009-0591/" source="CVE"/>
		<reference ref_id="CVE-2009-0789" ref_url="https://www.suse.com/security/cve/CVE-2009-0789/" source="CVE"/>
		<reference ref_id="CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377/" source="CVE"/>
		<reference ref_id="CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378/" source="CVE"/>
		<reference ref_id="CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379/" source="CVE"/>
		<reference ref_id="CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386/" source="CVE"/>
		<reference ref_id="CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387/" source="CVE"/>
		<reference ref_id="CVE-2009-3245" ref_url="https://www.suse.com/security/cve/CVE-2009-3245/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-4355" ref_url="https://www.suse.com/security/cve/CVE-2009-4355/" source="CVE"/>
		<reference ref_id="CVE-2010-0740" ref_url="https://www.suse.com/security/cve/CVE-2010-0740/" source="CVE"/>
		<reference ref_id="CVE-2010-2939" ref_url="https://www.suse.com/security/cve/CVE-2010-2939/" source="CVE"/>
		<reference ref_id="CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864/" source="CVE"/>
		<reference ref_id="CVE-2010-4180" ref_url="https://www.suse.com/security/cve/CVE-2010-4180/" source="CVE"/>
		<reference ref_id="CVE-2010-4252" ref_url="https://www.suse.com/security/cve/CVE-2010-4252/" source="CVE"/>
		<reference ref_id="CVE-2011-0014" ref_url="https://www.suse.com/security/cve/CVE-2011-0014/" source="CVE"/>
		<reference ref_id="CVE-2011-3210" ref_url="https://www.suse.com/security/cve/CVE-2011-3210/" source="CVE"/>
		<reference ref_id="CVE-2011-4108" ref_url="https://www.suse.com/security/cve/CVE-2011-4108/" source="CVE"/>
		<reference ref_id="CVE-2011-4109" ref_url="https://www.suse.com/security/cve/CVE-2011-4109/" source="CVE"/>
		<reference ref_id="CVE-2011-4354" ref_url="https://www.suse.com/security/cve/CVE-2011-4354/" source="CVE"/>
		<reference ref_id="CVE-2011-4576" ref_url="https://www.suse.com/security/cve/CVE-2011-4576/" source="CVE"/>
		<reference ref_id="CVE-2011-4577" ref_url="https://www.suse.com/security/cve/CVE-2011-4577/" source="CVE"/>
		<reference ref_id="CVE-2011-4619" ref_url="https://www.suse.com/security/cve/CVE-2011-4619/" source="CVE"/>
		<reference ref_id="CVE-2011-5095" ref_url="https://www.suse.com/security/cve/CVE-2011-5095/" source="CVE"/>
		<reference ref_id="CVE-2012-0050" ref_url="https://www.suse.com/security/cve/CVE-2012-0050/" source="CVE"/>
		<reference ref_id="CVE-2012-0884" ref_url="https://www.suse.com/security/cve/CVE-2012-0884/" source="CVE"/>
		<reference ref_id="CVE-2012-1165" ref_url="https://www.suse.com/security/cve/CVE-2012-1165/" source="CVE"/>
		<reference ref_id="CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110/" source="CVE"/>
		<reference ref_id="CVE-2012-2131" ref_url="https://www.suse.com/security/cve/CVE-2012-2131/" source="CVE"/>
		<reference ref_id="CVE-2012-2333" ref_url="https://www.suse.com/security/cve/CVE-2012-2333/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2014-0076" ref_url="https://www.suse.com/security/cve/CVE-2014-0076/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-3505" ref_url="https://www.suse.com/security/cve/CVE-2014-3505/" source="CVE"/>
		<reference ref_id="CVE-2014-3506" ref_url="https://www.suse.com/security/cve/CVE-2014-3506/" source="CVE"/>
		<reference ref_id="CVE-2014-3507" ref_url="https://www.suse.com/security/cve/CVE-2014-3507/" source="CVE"/>
		<reference ref_id="CVE-2014-3508" ref_url="https://www.suse.com/security/cve/CVE-2014-3508/" source="CVE"/>
		<reference ref_id="CVE-2014-3510" ref_url="https://www.suse.com/security/cve/CVE-2014-3510/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl0_9_8-0.9.8j-59.11 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7250/">CVE-2006-7250</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0590/">CVE-2009-0590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0591/">CVE-2009-0591</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0789/">CVE-2009-0789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3245/">CVE-2009-3245</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4355/">CVE-2009-4355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0740/">CVE-2010-0740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2939/">CVE-2010-2939</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4180/">CVE-2010-4180</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4252/">CVE-2010-4252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0014/">CVE-2011-0014</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3210/">CVE-2011-3210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4108/">CVE-2011-4108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4109/">CVE-2011-4109</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4354/">CVE-2011-4354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4576/">CVE-2011-4576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4577/">CVE-2011-4577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4619/">CVE-2011-4619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5095/">CVE-2011-5095</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0050/">CVE-2012-0050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0884/">CVE-2012-0884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1165/">CVE-2012-1165</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2131/">CVE-2012-2131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2333/">CVE-2012-2333</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0076/">CVE-2014-0076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3505/">CVE-2014-3505</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3506/">CVE-2014-3506</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3507/">CVE-2014-3507</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3508/">CVE-2014-3508</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3510/">CVE-2014-3510</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141572" comment="libopenssl0_9_8-0.9.8j-59.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141573" comment="libopenssl0_9_8-32bit-0.9.8j-59.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75803" version="1" class="patch">
	<metadata>
		<title>libopenssl1_0_0-1.0.1i-2.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2006-7250" ref_url="https://www.suse.com/security/cve/CVE-2006-7250/" source="CVE"/>
		<reference ref_id="CVE-2008-5077" ref_url="https://www.suse.com/security/cve/CVE-2008-5077/" source="CVE"/>
		<reference ref_id="CVE-2009-0590" ref_url="https://www.suse.com/security/cve/CVE-2009-0590/" source="CVE"/>
		<reference ref_id="CVE-2009-0591" ref_url="https://www.suse.com/security/cve/CVE-2009-0591/" source="CVE"/>
		<reference ref_id="CVE-2009-0789" ref_url="https://www.suse.com/security/cve/CVE-2009-0789/" source="CVE"/>
		<reference ref_id="CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377/" source="CVE"/>
		<reference ref_id="CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378/" source="CVE"/>
		<reference ref_id="CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379/" source="CVE"/>
		<reference ref_id="CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386/" source="CVE"/>
		<reference ref_id="CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387/" source="CVE"/>
		<reference ref_id="CVE-2010-0740" ref_url="https://www.suse.com/security/cve/CVE-2010-0740/" source="CVE"/>
		<reference ref_id="CVE-2010-0742" ref_url="https://www.suse.com/security/cve/CVE-2010-0742/" source="CVE"/>
		<reference ref_id="CVE-2010-1633" ref_url="https://www.suse.com/security/cve/CVE-2010-1633/" source="CVE"/>
		<reference ref_id="CVE-2010-2939" ref_url="https://www.suse.com/security/cve/CVE-2010-2939/" source="CVE"/>
		<reference ref_id="CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864/" source="CVE"/>
		<reference ref_id="CVE-2010-5298" ref_url="https://www.suse.com/security/cve/CVE-2010-5298/" source="CVE"/>
		<reference ref_id="CVE-2011-0014" ref_url="https://www.suse.com/security/cve/CVE-2011-0014/" source="CVE"/>
		<reference ref_id="CVE-2011-3207" ref_url="https://www.suse.com/security/cve/CVE-2011-3207/" source="CVE"/>
		<reference ref_id="CVE-2011-3210" ref_url="https://www.suse.com/security/cve/CVE-2011-3210/" source="CVE"/>
		<reference ref_id="CVE-2011-4108" ref_url="https://www.suse.com/security/cve/CVE-2011-4108/" source="CVE"/>
		<reference ref_id="CVE-2011-4576" ref_url="https://www.suse.com/security/cve/CVE-2011-4576/" source="CVE"/>
		<reference ref_id="CVE-2011-4577" ref_url="https://www.suse.com/security/cve/CVE-2011-4577/" source="CVE"/>
		<reference ref_id="CVE-2011-4619" ref_url="https://www.suse.com/security/cve/CVE-2011-4619/" source="CVE"/>
		<reference ref_id="CVE-2012-0027" ref_url="https://www.suse.com/security/cve/CVE-2012-0027/" source="CVE"/>
		<reference ref_id="CVE-2012-0050" ref_url="https://www.suse.com/security/cve/CVE-2012-0050/" source="CVE"/>
		<reference ref_id="CVE-2012-0884" ref_url="https://www.suse.com/security/cve/CVE-2012-0884/" source="CVE"/>
		<reference ref_id="CVE-2012-1165" ref_url="https://www.suse.com/security/cve/CVE-2012-1165/" source="CVE"/>
		<reference ref_id="CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110/" source="CVE"/>
		<reference ref_id="CVE-2012-2686" ref_url="https://www.suse.com/security/cve/CVE-2012-2686/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2013-4353" ref_url="https://www.suse.com/security/cve/CVE-2013-4353/" source="CVE"/>
		<reference ref_id="CVE-2013-6449" ref_url="https://www.suse.com/security/cve/CVE-2013-6449/" source="CVE"/>
		<reference ref_id="CVE-2013-6450" ref_url="https://www.suse.com/security/cve/CVE-2013-6450/" source="CVE"/>
		<reference ref_id="CVE-2014-0076" ref_url="https://www.suse.com/security/cve/CVE-2014-0076/" source="CVE"/>
		<reference ref_id="CVE-2014-0160" ref_url="https://www.suse.com/security/cve/CVE-2014-0160/" source="CVE"/>
		<reference ref_id="CVE-2014-0195" ref_url="https://www.suse.com/security/cve/CVE-2014-0195/" source="CVE"/>
		<reference ref_id="CVE-2014-0198" ref_url="https://www.suse.com/security/cve/CVE-2014-0198/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-3505" ref_url="https://www.suse.com/security/cve/CVE-2014-3505/" source="CVE"/>
		<reference ref_id="CVE-2014-3506" ref_url="https://www.suse.com/security/cve/CVE-2014-3506/" source="CVE"/>
		<reference ref_id="CVE-2014-3507" ref_url="https://www.suse.com/security/cve/CVE-2014-3507/" source="CVE"/>
		<reference ref_id="CVE-2014-3508" ref_url="https://www.suse.com/security/cve/CVE-2014-3508/" source="CVE"/>
		<reference ref_id="CVE-2014-3509" ref_url="https://www.suse.com/security/cve/CVE-2014-3509/" source="CVE"/>
		<reference ref_id="CVE-2014-3510" ref_url="https://www.suse.com/security/cve/CVE-2014-3510/" source="CVE"/>
		<reference ref_id="CVE-2014-3511" ref_url="https://www.suse.com/security/cve/CVE-2014-3511/" source="CVE"/>
		<reference ref_id="CVE-2014-3512" ref_url="https://www.suse.com/security/cve/CVE-2014-3512/" source="CVE"/>
		<reference ref_id="CVE-2014-5139" ref_url="https://www.suse.com/security/cve/CVE-2014-5139/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl1_0_0-1.0.1i-2.12 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7250/">CVE-2006-7250</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5077/">CVE-2008-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0590/">CVE-2009-0590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0591/">CVE-2009-0591</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0789/">CVE-2009-0789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0740/">CVE-2010-0740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0742/">CVE-2010-0742</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-1633/">CVE-2010-1633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2939/">CVE-2010-2939</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5298/">CVE-2010-5298</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0014/">CVE-2011-0014</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3207/">CVE-2011-3207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3210/">CVE-2011-3210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4108/">CVE-2011-4108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4576/">CVE-2011-4576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4577/">CVE-2011-4577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4619/">CVE-2011-4619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0027/">CVE-2012-0027</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0050/">CVE-2012-0050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0884/">CVE-2012-0884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1165/">CVE-2012-1165</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2686/">CVE-2012-2686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4353/">CVE-2013-4353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6449/">CVE-2013-6449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6450/">CVE-2013-6450</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0076/">CVE-2014-0076</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0160/">CVE-2014-0160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0195/">CVE-2014-0195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0198/">CVE-2014-0198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3505/">CVE-2014-3505</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3506/">CVE-2014-3506</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3507/">CVE-2014-3507</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3508/">CVE-2014-3508</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3509/">CVE-2014-3509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3510/">CVE-2014-3510</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3511/">CVE-2014-3511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3512/">CVE-2014-3512</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-5139/">CVE-2014-5139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141574" comment="libopenssl1_0_0-1.0.1i-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141575" comment="libopenssl1_0_0-32bit-1.0.1i-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141576" comment="openssl-1.0.1i-2.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75804" version="1" class="patch">
	<metadata>
		<title>libpango-1_0-0-1.36.3-4.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-0020" ref_url="https://www.suse.com/security/cve/CVE-2011-0020/" source="CVE"/>
		<reference ref_id="CVE-2011-0064" ref_url="https://www.suse.com/security/cve/CVE-2011-0064/" source="CVE"/>
		<description>
These are all security issues fixed in the libpango-1_0-0-1.36.3-4.14 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0020/">CVE-2011-0020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0064/">CVE-2011-0064</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141577" comment="libpango-1_0-0-1.36.3-4.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141578" comment="libpango-1_0-0-32bit-1.36.3-4.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141579" comment="pango-modules-1.36.3-4.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141580" comment="pango-modules-32bit-1.36.3-4.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141581" comment="typelib-1_0-Pango-1_0-1.36.3-4.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75805" version="1" class="patch">
	<metadata>
		<title>libpcsclite1-1.8.10-3.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2010-0407" ref_url="https://www.suse.com/security/cve/CVE-2010-0407/" source="CVE"/>
		<reference ref_id="CVE-2010-4531" ref_url="https://www.suse.com/security/cve/CVE-2010-4531/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcsclite1-1.8.10-3.7 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0407/">CVE-2010-0407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4531/">CVE-2010-4531</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140900" comment="libpcsclite1-1.8.10-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141582" comment="libpcsclite1-32bit-1.8.10-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140901" comment="pcsc-lite-1.8.10-3.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75806" version="1" class="patch">
	<metadata>
		<title>libpng12-0-1.2.50-8.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3045" ref_url="https://www.suse.com/security/cve/CVE-2011-3045/" source="CVE"/>
		<reference ref_id="CVE-2011-3048" ref_url="https://www.suse.com/security/cve/CVE-2011-3048/" source="CVE"/>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<reference ref_id="CVE-2013-7353" ref_url="https://www.suse.com/security/cve/CVE-2013-7353/" source="CVE"/>
		<reference ref_id="CVE-2013-7354" ref_url="https://www.suse.com/security/cve/CVE-2013-7354/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng12-0-1.2.50-8.21 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3045/">CVE-2011-3045</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3048/">CVE-2011-3048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7353/">CVE-2013-7353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7354/">CVE-2013-7354</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141583" comment="libpng12-0-1.2.50-8.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141584" comment="libpng12-0-32bit-1.2.50-8.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75807" version="1" class="patch">
	<metadata>
		<title>libpng16-16-1.6.8-2.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501/" source="CVE"/>
		<reference ref_id="CVE-2011-2690" ref_url="https://www.suse.com/security/cve/CVE-2011-2690/" source="CVE"/>
		<reference ref_id="CVE-2011-2691" ref_url="https://www.suse.com/security/cve/CVE-2011-2691/" source="CVE"/>
		<reference ref_id="CVE-2011-2692" ref_url="https://www.suse.com/security/cve/CVE-2011-2692/" source="CVE"/>
		<reference ref_id="CVE-2011-3328" ref_url="https://www.suse.com/security/cve/CVE-2011-3328/" source="CVE"/>
		<reference ref_id="CVE-2013-6954" ref_url="https://www.suse.com/security/cve/CVE-2013-6954/" source="CVE"/>
		<reference ref_id="CVE-2014-0333" ref_url="https://www.suse.com/security/cve/CVE-2014-0333/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng16-16-1.6.8-2.24 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2690/">CVE-2011-2690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2691/">CVE-2011-2691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2692/">CVE-2011-2692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3328/">CVE-2011-3328</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6954/">CVE-2013-6954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0333/">CVE-2014-0333</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141585" comment="libpng16-16-1.6.8-2.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141586" comment="libpng16-16-32bit-1.6.8-2.24 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75808" version="1" class="patch">
	<metadata>
		<title>libpolkit0-0.112-2.189 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2010-0750" ref_url="https://www.suse.com/security/cve/CVE-2010-0750/" source="CVE"/>
		<reference ref_id="CVE-2011-1485" ref_url="https://www.suse.com/security/cve/CVE-2011-1485/" source="CVE"/>
		<reference ref_id="CVE-2013-4288" ref_url="https://www.suse.com/security/cve/CVE-2013-4288/" source="CVE"/>
		<description>
These are all security issues fixed in the libpolkit0-0.112-2.189 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0750/">CVE-2010-0750</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1485/">CVE-2011-1485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4288/">CVE-2013-4288</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141587" comment="libpolkit0-0.112-2.189 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141588" comment="libpolkit0-32bit-0.112-2.189 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141589" comment="polkit-0.112-2.189 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141590" comment="typelib-1_0-Polkit-1_0-0.112-2.189 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75809" version="1" class="patch">
	<metadata>
		<title>libpoppler-glib8-0.24.4-3.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-0799" ref_url="https://www.suse.com/security/cve/CVE-2009-0799/" source="CVE"/>
		<reference ref_id="CVE-2009-0800" ref_url="https://www.suse.com/security/cve/CVE-2009-0800/" source="CVE"/>
		<reference ref_id="CVE-2009-1179" ref_url="https://www.suse.com/security/cve/CVE-2009-1179/" source="CVE"/>
		<reference ref_id="CVE-2009-1180" ref_url="https://www.suse.com/security/cve/CVE-2009-1180/" source="CVE"/>
		<reference ref_id="CVE-2009-1181" ref_url="https://www.suse.com/security/cve/CVE-2009-1181/" source="CVE"/>
		<reference ref_id="CVE-2009-1182" ref_url="https://www.suse.com/security/cve/CVE-2009-1182/" source="CVE"/>
		<reference ref_id="CVE-2009-1183" ref_url="https://www.suse.com/security/cve/CVE-2009-1183/" source="CVE"/>
		<reference ref_id="CVE-2009-1187" ref_url="https://www.suse.com/security/cve/CVE-2009-1187/" source="CVE"/>
		<reference ref_id="CVE-2009-1188" ref_url="https://www.suse.com/security/cve/CVE-2009-1188/" source="CVE"/>
		<reference ref_id="CVE-2009-3607" ref_url="https://www.suse.com/security/cve/CVE-2009-3607/" source="CVE"/>
		<reference ref_id="CVE-2009-3608" ref_url="https://www.suse.com/security/cve/CVE-2009-3608/" source="CVE"/>
		<reference ref_id="CVE-2013-1788" ref_url="https://www.suse.com/security/cve/CVE-2013-1788/" source="CVE"/>
		<reference ref_id="CVE-2013-1789" ref_url="https://www.suse.com/security/cve/CVE-2013-1789/" source="CVE"/>
		<reference ref_id="CVE-2013-1790" ref_url="https://www.suse.com/security/cve/CVE-2013-1790/" source="CVE"/>
		<reference ref_id="CVE-2013-4473" ref_url="https://www.suse.com/security/cve/CVE-2013-4473/" source="CVE"/>
		<reference ref_id="CVE-2013-4474" ref_url="https://www.suse.com/security/cve/CVE-2013-4474/" source="CVE"/>
		<description>
These are all security issues fixed in the libpoppler-glib8-0.24.4-3.14 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0799/">CVE-2009-0799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0800/">CVE-2009-0800</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1179/">CVE-2009-1179</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1180/">CVE-2009-1180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1181/">CVE-2009-1181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1182/">CVE-2009-1182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1183/">CVE-2009-1183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1187/">CVE-2009-1187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1188/">CVE-2009-1188</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3607/">CVE-2009-3607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3608/">CVE-2009-3608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1788/">CVE-2013-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1789/">CVE-2013-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1790/">CVE-2013-1790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4473/">CVE-2013-4473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4474/">CVE-2013-4474</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141591" comment="libpoppler-glib8-0.24.4-3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141592" comment="libpoppler-qt4-4-0.24.4-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141593" comment="libpoppler44-0.24.4-3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141594" comment="poppler-tools-0.24.4-3.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75810" version="1" class="patch">
	<metadata>
		<title>libproxy1-0.4.11-11.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2012-4504" ref_url="https://www.suse.com/security/cve/CVE-2012-4504/" source="CVE"/>
		<description>
These are all security issues fixed in the libproxy1-0.4.11-11.2 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4504/">CVE-2012-4504</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141595" comment="libproxy1-0.4.11-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141596" comment="libproxy1-32bit-0.4.11-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141597" comment="libproxy1-config-gnome3-0.4.11-11.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141598" comment="libproxy1-config-gnome3-32bit-0.4.11-11.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141599" comment="libproxy1-networkmanager-0.4.11-11.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141600" comment="libproxy1-networkmanager-32bit-0.4.11-11.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75811" version="1" class="patch">
	<metadata>
		<title>libpulse-mainloop-glib0-32bit-5.0-2.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2014-3970" ref_url="https://www.suse.com/security/cve/CVE-2014-3970/" source="CVE"/>
		<description>
These are all security issues fixed in the libpulse-mainloop-glib0-32bit-5.0-2.7 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3970/">CVE-2014-3970</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140915" comment="libpulse-mainloop-glib0-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140916" comment="libpulse-mainloop-glib0-32bit-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140917" comment="libpulse0-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140918" comment="libpulse0-32bit-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140919" comment="pulseaudio-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140920" comment="pulseaudio-esound-compat-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140921" comment="pulseaudio-gdm-hooks-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140922" comment="pulseaudio-lang-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141601" comment="pulseaudio-module-bluetooth-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141602" comment="pulseaudio-module-gconf-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141603" comment="pulseaudio-module-jack-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141604" comment="pulseaudio-module-lirc-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140923" comment="pulseaudio-module-x11-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140924" comment="pulseaudio-module-zeroconf-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140925" comment="pulseaudio-utils-5.0-2.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75812" version="1" class="patch">
	<metadata>
		<title>libpython2_7-1_0-2.7.7-2.36 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-1521" ref_url="https://www.suse.com/security/cve/CVE-2011-1521/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-1753" ref_url="https://www.suse.com/security/cve/CVE-2013-1753/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-1912" ref_url="https://www.suse.com/security/cve/CVE-2014-1912/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<description>
These are all security issues fixed in the libpython2_7-1_0-2.7.7-2.36 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1521/">CVE-2011-1521</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1753/">CVE-2013-1753</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1912/">CVE-2014-1912</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141605" comment="libpython2_7-1_0-2.7.7-2.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141606" comment="libpython2_7-1_0-32bit-2.7.7-2.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141607" comment="python-base-2.7.7-2.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141608" comment="python-devel-2.7.7-2.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141609" comment="python-xml-2.7.7-2.36 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75813" version="1" class="patch">
	<metadata>
		<title>libpython3_4m1_0-3.4.1-2.38 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-2667" ref_url="https://www.suse.com/security/cve/CVE-2014-2667/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<description>
These are all security issues fixed in the libpython3_4m1_0-3.4.1-2.38 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-2667/">CVE-2014-2667</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141610" comment="libpython3_4m1_0-3.4.1-2.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141611" comment="python3-base-3.4.1-2.38 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75814" version="1" class="patch">
	<metadata>
		<title>libqt4-32bit-4.8.6-2.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-0945" ref_url="https://www.suse.com/security/cve/CVE-2009-0945/" source="CVE"/>
		<reference ref_id="CVE-2011-3193" ref_url="https://www.suse.com/security/cve/CVE-2011-3193/" source="CVE"/>
		<reference ref_id="CVE-2011-3922" ref_url="https://www.suse.com/security/cve/CVE-2011-3922/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2012-6093" ref_url="https://www.suse.com/security/cve/CVE-2012-6093/" source="CVE"/>
		<reference ref_id="CVE-2013-0254" ref_url="https://www.suse.com/security/cve/CVE-2013-0254/" source="CVE"/>
		<reference ref_id="CVE-2013-4549" ref_url="https://www.suse.com/security/cve/CVE-2013-4549/" source="CVE"/>
		<reference ref_id="CVE-2014-0190" ref_url="https://www.suse.com/security/cve/CVE-2014-0190/" source="CVE"/>
		<description>
These are all security issues fixed in the libqt4-32bit-4.8.6-2.11 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0945/">CVE-2009-0945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3193/">CVE-2011-3193</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3922/">CVE-2011-3922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6093/">CVE-2012-6093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0254/">CVE-2013-0254</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4549/">CVE-2013-4549</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0190/">CVE-2014-0190</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141612" comment="libqt4-4.8.6-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141613" comment="libqt4-32bit-4.8.6-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141614" comment="libqt4-qt3support-4.8.6-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141615" comment="libqt4-qt3support-32bit-4.8.6-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141616" comment="libqt4-sql-4.8.6-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141617" comment="libqt4-sql-32bit-4.8.6-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141618" comment="libqt4-sql-mysql-4.8.6-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141619" comment="libqt4-sql-mysql-32bit-4.8.6-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141620" comment="libqt4-sql-postgresql-4.8.6-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141621" comment="libqt4-sql-postgresql-32bit-4.8.6-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141622" comment="libqt4-sql-sqlite-4.8.6-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141623" comment="libqt4-sql-sqlite-32bit-4.8.6-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141624" comment="libqt4-sql-unixODBC-4.8.6-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141625" comment="libqt4-sql-unixODBC-32bit-4.8.6-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141626" comment="libqt4-x11-4.8.6-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141627" comment="libqt4-x11-32bit-4.8.6-2.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75815" version="1" class="patch">
	<metadata>
		<title>libraptor2-0-2.0.10-3.67 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2012-0037" ref_url="https://www.suse.com/security/cve/CVE-2012-0037/" source="CVE"/>
		<description>
These are all security issues fixed in the libraptor2-0-2.0.10-3.67 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0037/">CVE-2012-0037</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140928" comment="libraptor2-0-2.0.10-3.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141628" comment="raptor-2.0.10-3.67 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75816" version="1" class="patch">
	<metadata>
		<title>libraw9-0.15.4-3.88 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-2126" ref_url="https://www.suse.com/security/cve/CVE-2013-2126/" source="CVE"/>
		<reference ref_id="CVE-2013-2127" ref_url="https://www.suse.com/security/cve/CVE-2013-2127/" source="CVE"/>
		<description>
These are all security issues fixed in the libraw9-0.15.4-3.88 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2126/">CVE-2013-2126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2127/">CVE-2013-2127</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141629" comment="libraw9-0.15.4-3.88 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75817" version="1" class="patch">
	<metadata>
		<title>libreoffice-4.3.1.2-3.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2010-2935" ref_url="https://www.suse.com/security/cve/CVE-2010-2935/" source="CVE"/>
		<reference ref_id="CVE-2010-2936" ref_url="https://www.suse.com/security/cve/CVE-2010-2936/" source="CVE"/>
		<reference ref_id="CVE-2014-0247" ref_url="https://www.suse.com/security/cve/CVE-2014-0247/" source="CVE"/>
		<reference ref_id="CVE-2014-3524" ref_url="https://www.suse.com/security/cve/CVE-2014-3524/" source="CVE"/>
		<reference ref_id="CVE-2014-3575" ref_url="https://www.suse.com/security/cve/CVE-2014-3575/" source="CVE"/>
		<description>
These are all security issues fixed in the libreoffice-4.3.1.2-3.7 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2935/">CVE-2010-2935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2936/">CVE-2010-2936</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0247/">CVE-2014-0247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3524/">CVE-2014-3524</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3575/">CVE-2014-3575</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141630" comment="libreoffice-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141631" comment="libreoffice-base-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141632" comment="libreoffice-base-drivers-mysql-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141633" comment="libreoffice-base-drivers-postgresql-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141634" comment="libreoffice-calc-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141635" comment="libreoffice-calc-extensions-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141636" comment="libreoffice-draw-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141637" comment="libreoffice-filters-optional-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141638" comment="libreoffice-gnome-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141639" comment="libreoffice-icon-theme-tango-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141640" comment="libreoffice-impress-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141641" comment="libreoffice-l10n-af-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141642" comment="libreoffice-l10n-ar-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141643" comment="libreoffice-l10n-ca-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141644" comment="libreoffice-l10n-cs-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141645" comment="libreoffice-l10n-da-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141646" comment="libreoffice-l10n-de-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141647" comment="libreoffice-l10n-en-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141648" comment="libreoffice-l10n-es-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141649" comment="libreoffice-l10n-fi-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141650" comment="libreoffice-l10n-fr-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141651" comment="libreoffice-l10n-gu-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141652" comment="libreoffice-l10n-hi-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141653" comment="libreoffice-l10n-hu-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141654" comment="libreoffice-l10n-it-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141655" comment="libreoffice-l10n-ja-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141656" comment="libreoffice-l10n-ko-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141657" comment="libreoffice-l10n-nb-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141658" comment="libreoffice-l10n-nl-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141659" comment="libreoffice-l10n-nn-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141660" comment="libreoffice-l10n-pl-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141661" comment="libreoffice-l10n-pt-BR-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141662" comment="libreoffice-l10n-pt-PT-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141663" comment="libreoffice-l10n-ru-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141664" comment="libreoffice-l10n-sk-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141665" comment="libreoffice-l10n-sv-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141666" comment="libreoffice-l10n-xh-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141667" comment="libreoffice-l10n-zh-Hans-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141668" comment="libreoffice-l10n-zh-Hant-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141669" comment="libreoffice-l10n-zu-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141670" comment="libreoffice-mailmerge-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141671" comment="libreoffice-math-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141672" comment="libreoffice-officebean-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141673" comment="libreoffice-pyuno-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141674" comment="libreoffice-writer-4.3.1.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141675" comment="libreoffice-writer-extensions-4.3.1.2-3.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75818" version="1" class="patch">
	<metadata>
		<title>librpcsecgss3-0.19-16.56 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<description>
These are all security issues fixed in the librpcsecgss3-0.19-16.56 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141676" comment="librpcsecgss3-0.19-16.56 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75819" version="1" class="patch">
	<metadata>
		<title>libsilc-1_1-2-1.1.10-24.128 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2008-1227" ref_url="https://www.suse.com/security/cve/CVE-2008-1227/" source="CVE"/>
		<description>
These are all security issues fixed in the libsilc-1_1-2-1.1.10-24.128 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1227/">CVE-2008-1227</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141677" comment="libsilc-1_1-2-1.1.10-24.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141678" comment="libsilcclient-1_1-3-1.1.10-24.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141679" comment="silc-toolkit-1.1.10-24.128 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75820" version="1" class="patch">
	<metadata>
		<title>libsmi-0.4.8-18.63 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2010-2891" ref_url="https://www.suse.com/security/cve/CVE-2010-2891/" source="CVE"/>
		<description>
These are all security issues fixed in the libsmi-0.4.8-18.63 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2891/">CVE-2010-2891</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140932" comment="libsmi-0.4.8-18.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140933" comment="libsmi2-0.4.8-18.63 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75821" version="1" class="patch">
	<metadata>
		<title>libsndfile1-1.0.25-18.75 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-0186" ref_url="https://www.suse.com/security/cve/CVE-2009-0186/" source="CVE"/>
		<reference ref_id="CVE-2011-2696" ref_url="https://www.suse.com/security/cve/CVE-2011-2696/" source="CVE"/>
		<description>
These are all security issues fixed in the libsndfile1-1.0.25-18.75 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0186/">CVE-2009-0186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2696/">CVE-2011-2696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141680" comment="libsndfile1-1.0.25-18.75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141681" comment="libsndfile1-32bit-1.0.25-18.75 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75822" version="1" class="patch">
	<metadata>
		<title>libsnmp30-32bit-5.7.2.1-3.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2012-2141" ref_url="https://www.suse.com/security/cve/CVE-2012-2141/" source="CVE"/>
		<reference ref_id="CVE-2014-2284" ref_url="https://www.suse.com/security/cve/CVE-2014-2284/" source="CVE"/>
		<reference ref_id="CVE-2014-2285" ref_url="https://www.suse.com/security/cve/CVE-2014-2285/" source="CVE"/>
		<reference ref_id="CVE-2014-3565" ref_url="https://www.suse.com/security/cve/CVE-2014-3565/" source="CVE"/>
		<description>
These are all security issues fixed in the libsnmp30-32bit-5.7.2.1-3.8 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2141/">CVE-2012-2141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2284/">CVE-2014-2284</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2285/">CVE-2014-2285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3565/">CVE-2014-3565</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141682" comment="libsnmp30-5.7.2.1-3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141683" comment="libsnmp30-32bit-5.7.2.1-3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141684" comment="net-snmp-5.7.2.1-3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141685" comment="perl-SNMP-5.7.2.1-3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141686" comment="snmp-mibs-5.7.2.1-3.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75823" version="1" class="patch">
	<metadata>
		<title>libsoup-2_4-1-2.44.2-1.46 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-2054" ref_url="https://www.suse.com/security/cve/CVE-2011-2054/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-2_4-1-2.44.2-1.46 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2054/">CVE-2011-2054</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141687" comment="libsoup-2_4-1-2.44.2-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141688" comment="libsoup-2_4-1-32bit-2.44.2-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141689" comment="libsoup-lang-2.44.2-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141690" comment="typelib-1_0-Soup-2_4-2.44.2-1.46 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75824" version="1" class="patch">
	<metadata>
		<title>libspice-client-glib-2_0-8-0.25-3.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2012-4425" ref_url="https://www.suse.com/security/cve/CVE-2012-4425/" source="CVE"/>
		<description>
These are all security issues fixed in the libspice-client-glib-2_0-8-0.25-3.4 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4425/">CVE-2012-4425</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141691" comment="libspice-client-glib-2_0-8-0.25-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141692" comment="libspice-client-gtk-2_0-4-0.25-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141693" comment="libspice-client-gtk-3_0-4-0.25-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141694" comment="libspice-controller0-0.25-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141695" comment="typelib-1_0-SpiceClientGlib-2_0-0.25-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141696" comment="typelib-1_0-SpiceClientGtk-3_0-0.25-3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75825" version="1" class="patch">
	<metadata>
		<title>libssh4-0.6.3-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2012-4559" ref_url="https://www.suse.com/security/cve/CVE-2012-4559/" source="CVE"/>
		<reference ref_id="CVE-2012-4560" ref_url="https://www.suse.com/security/cve/CVE-2012-4560/" source="CVE"/>
		<reference ref_id="CVE-2012-4561" ref_url="https://www.suse.com/security/cve/CVE-2012-4561/" source="CVE"/>
		<reference ref_id="CVE-2013-0176" ref_url="https://www.suse.com/security/cve/CVE-2013-0176/" source="CVE"/>
		<reference ref_id="CVE-2014-0017" ref_url="https://www.suse.com/security/cve/CVE-2014-0017/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh4-0.6.3-1.4 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4559/">CVE-2012-4559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4560/">CVE-2012-4560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4561/">CVE-2012-4561</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0176/">CVE-2013-0176</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0017/">CVE-2014-0017</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141697" comment="libssh4-0.6.3-1.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75826" version="1" class="patch">
	<metadata>
		<title>libtag1-1.9.1-1.265 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2012-2396" ref_url="https://www.suse.com/security/cve/CVE-2012-2396/" source="CVE"/>
		<description>
These are all security issues fixed in the libtag1-1.9.1-1.265 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2396/">CVE-2012-2396</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140963" comment="libtag1-1.9.1-1.265 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141698" comment="libtag1-32bit-1.9.1-1.265 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140964" comment="libtag_c0-1.9.1-1.265 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141699" comment="libtag_c0-32bit-1.9.1-1.265 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140965" comment="taglib-1.9.1-1.265 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75827" version="1" class="patch">
	<metadata>
		<title>libtasn1-3.7-2.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2014-3467" ref_url="https://www.suse.com/security/cve/CVE-2014-3467/" source="CVE"/>
		<reference ref_id="CVE-2014-3468" ref_url="https://www.suse.com/security/cve/CVE-2014-3468/" source="CVE"/>
		<reference ref_id="CVE-2014-3469" ref_url="https://www.suse.com/security/cve/CVE-2014-3469/" source="CVE"/>
		<description>
These are all security issues fixed in the libtasn1-3.7-2.13 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3467/">CVE-2014-3467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3468/">CVE-2014-3468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3469/">CVE-2014-3469</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141700" comment="libtasn1-3.7-2.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141701" comment="libtasn1-6-3.7-2.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141702" comment="libtasn1-6-32bit-3.7-2.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75828" version="1" class="patch">
	<metadata>
		<title>libtiff5-32bit-4.0.3-9.78 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-2285" ref_url="https://www.suse.com/security/cve/CVE-2009-2285/" source="CVE"/>
		<reference ref_id="CVE-2009-2347" ref_url="https://www.suse.com/security/cve/CVE-2009-2347/" source="CVE"/>
		<reference ref_id="CVE-2010-2065" ref_url="https://www.suse.com/security/cve/CVE-2010-2065/" source="CVE"/>
		<reference ref_id="CVE-2010-2067" ref_url="https://www.suse.com/security/cve/CVE-2010-2067/" source="CVE"/>
		<reference ref_id="CVE-2010-2233" ref_url="https://www.suse.com/security/cve/CVE-2010-2233/" source="CVE"/>
		<reference ref_id="CVE-2010-4665" ref_url="https://www.suse.com/security/cve/CVE-2010-4665/" source="CVE"/>
		<reference ref_id="CVE-2011-0192" ref_url="https://www.suse.com/security/cve/CVE-2011-0192/" source="CVE"/>
		<reference ref_id="CVE-2011-1167" ref_url="https://www.suse.com/security/cve/CVE-2011-1167/" source="CVE"/>
		<reference ref_id="CVE-2012-1173" ref_url="https://www.suse.com/security/cve/CVE-2012-1173/" source="CVE"/>
		<reference ref_id="CVE-2012-2113" ref_url="https://www.suse.com/security/cve/CVE-2012-2113/" source="CVE"/>
		<reference ref_id="CVE-2012-3401" ref_url="https://www.suse.com/security/cve/CVE-2012-3401/" source="CVE"/>
		<reference ref_id="CVE-2012-4564" ref_url="https://www.suse.com/security/cve/CVE-2012-4564/" source="CVE"/>
		<reference ref_id="CVE-2013-1960" ref_url="https://www.suse.com/security/cve/CVE-2013-1960/" source="CVE"/>
		<reference ref_id="CVE-2013-1961" ref_url="https://www.suse.com/security/cve/CVE-2013-1961/" source="CVE"/>
		<reference ref_id="CVE-2013-4231" ref_url="https://www.suse.com/security/cve/CVE-2013-4231/" source="CVE"/>
		<reference ref_id="CVE-2013-4232" ref_url="https://www.suse.com/security/cve/CVE-2013-4232/" source="CVE"/>
		<reference ref_id="CVE-2013-4243" ref_url="https://www.suse.com/security/cve/CVE-2013-4243/" source="CVE"/>
		<reference ref_id="CVE-2013-4244" ref_url="https://www.suse.com/security/cve/CVE-2013-4244/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff5-32bit-4.0.3-9.78 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2285/">CVE-2009-2285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2347/">CVE-2009-2347</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2065/">CVE-2010-2065</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2067/">CVE-2010-2067</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2233/">CVE-2010-2233</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4665/">CVE-2010-4665</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0192/">CVE-2011-0192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1167/">CVE-2011-1167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1173/">CVE-2012-1173</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2113/">CVE-2012-2113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3401/">CVE-2012-3401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4564/">CVE-2012-4564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1960/">CVE-2013-1960</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1961/">CVE-2013-1961</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4231/">CVE-2013-4231</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4232/">CVE-2013-4232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4243/">CVE-2013-4243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4244/">CVE-2013-4244</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141703" comment="libtiff5-4.0.3-9.78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141704" comment="libtiff5-32bit-4.0.3-9.78 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75829" version="1" class="patch">
	<metadata>
		<title>libudisks2-0-2.1.3-1.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2014-0004" ref_url="https://www.suse.com/security/cve/CVE-2014-0004/" source="CVE"/>
		<description>
These are all security issues fixed in the libudisks2-0-2.1.3-1.14 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0004/">CVE-2014-0004</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140969" comment="libudisks2-0-2.1.3-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140970" comment="udisks2-2.1.3-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140971" comment="udisks2-lang-2.1.3-1.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75830" version="1" class="patch">
	<metadata>
		<title>libvirt-1.2.5-13.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2010-2242" ref_url="https://www.suse.com/security/cve/CVE-2010-2242/" source="CVE"/>
		<reference ref_id="CVE-2011-1146" ref_url="https://www.suse.com/security/cve/CVE-2011-1146/" source="CVE"/>
		<reference ref_id="CVE-2011-2511" ref_url="https://www.suse.com/security/cve/CVE-2011-2511/" source="CVE"/>
		<reference ref_id="CVE-2011-4600" ref_url="https://www.suse.com/security/cve/CVE-2011-4600/" source="CVE"/>
		<reference ref_id="CVE-2012-3445" ref_url="https://www.suse.com/security/cve/CVE-2012-3445/" source="CVE"/>
		<reference ref_id="CVE-2013-0170" ref_url="https://www.suse.com/security/cve/CVE-2013-0170/" source="CVE"/>
		<reference ref_id="CVE-2013-1962" ref_url="https://www.suse.com/security/cve/CVE-2013-1962/" source="CVE"/>
		<reference ref_id="CVE-2013-2218" ref_url="https://www.suse.com/security/cve/CVE-2013-2218/" source="CVE"/>
		<reference ref_id="CVE-2013-2230" ref_url="https://www.suse.com/security/cve/CVE-2013-2230/" source="CVE"/>
		<reference ref_id="CVE-2013-4153" ref_url="https://www.suse.com/security/cve/CVE-2013-4153/" source="CVE"/>
		<reference ref_id="CVE-2013-4154" ref_url="https://www.suse.com/security/cve/CVE-2013-4154/" source="CVE"/>
		<reference ref_id="CVE-2013-4239" ref_url="https://www.suse.com/security/cve/CVE-2013-4239/" source="CVE"/>
		<reference ref_id="CVE-2013-4296" ref_url="https://www.suse.com/security/cve/CVE-2013-4296/" source="CVE"/>
		<reference ref_id="CVE-2013-4297" ref_url="https://www.suse.com/security/cve/CVE-2013-4297/" source="CVE"/>
		<reference ref_id="CVE-2013-4311" ref_url="https://www.suse.com/security/cve/CVE-2013-4311/" source="CVE"/>
		<reference ref_id="CVE-2013-4399" ref_url="https://www.suse.com/security/cve/CVE-2013-4399/" source="CVE"/>
		<reference ref_id="CVE-2013-4400" ref_url="https://www.suse.com/security/cve/CVE-2013-4400/" source="CVE"/>
		<reference ref_id="CVE-2013-4401" ref_url="https://www.suse.com/security/cve/CVE-2013-4401/" source="CVE"/>
		<reference ref_id="CVE-2013-6436" ref_url="https://www.suse.com/security/cve/CVE-2013-6436/" source="CVE"/>
		<reference ref_id="CVE-2013-6457" ref_url="https://www.suse.com/security/cve/CVE-2013-6457/" source="CVE"/>
		<reference ref_id="CVE-2013-6458" ref_url="https://www.suse.com/security/cve/CVE-2013-6458/" source="CVE"/>
		<reference ref_id="CVE-2014-0028" ref_url="https://www.suse.com/security/cve/CVE-2014-0028/" source="CVE"/>
		<reference ref_id="CVE-2014-0179" ref_url="https://www.suse.com/security/cve/CVE-2014-0179/" source="CVE"/>
		<reference ref_id="CVE-2014-1447" ref_url="https://www.suse.com/security/cve/CVE-2014-1447/" source="CVE"/>
		<reference ref_id="CVE-2014-3633" ref_url="https://www.suse.com/security/cve/CVE-2014-3633/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirt-1.2.5-13.3 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2242/">CVE-2010-2242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1146/">CVE-2011-1146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2511/">CVE-2011-2511</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-4600/">CVE-2011-4600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3445/">CVE-2012-3445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0170/">CVE-2013-0170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1962/">CVE-2013-1962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2218/">CVE-2013-2218</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2230/">CVE-2013-2230</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4153/">CVE-2013-4153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4154/">CVE-2013-4154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4239/">CVE-2013-4239</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4296/">CVE-2013-4296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4297/">CVE-2013-4297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4311/">CVE-2013-4311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4399/">CVE-2013-4399</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4400/">CVE-2013-4400</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4401/">CVE-2013-4401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6436/">CVE-2013-6436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6457/">CVE-2013-6457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6458/">CVE-2013-6458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0028/">CVE-2014-0028</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0179/">CVE-2014-0179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1447/">CVE-2014-1447</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3633/">CVE-2014-3633</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141705" comment="libvirt-1.2.5-13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141706" comment="libvirt-client-1.2.5-13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141707" comment="libvirt-client-32bit-1.2.5-13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141708" comment="libvirt-daemon-1.2.5-13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141709" comment="libvirt-daemon-config-network-1.2.5-13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141710" comment="libvirt-daemon-config-nwfilter-1.2.5-13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141711" comment="libvirt-daemon-driver-interface-1.2.5-13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141712" comment="libvirt-daemon-driver-libxl-1.2.5-13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141713" comment="libvirt-daemon-driver-lxc-1.2.5-13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141714" comment="libvirt-daemon-driver-network-1.2.5-13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141715" comment="libvirt-daemon-driver-nodedev-1.2.5-13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141716" comment="libvirt-daemon-driver-nwfilter-1.2.5-13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141717" comment="libvirt-daemon-driver-qemu-1.2.5-13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141718" comment="libvirt-daemon-driver-secret-1.2.5-13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141719" comment="libvirt-daemon-driver-storage-1.2.5-13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141720" comment="libvirt-daemon-lxc-1.2.5-13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141721" comment="libvirt-daemon-qemu-1.2.5-13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141722" comment="libvirt-daemon-xen-1.2.5-13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141723" comment="libvirt-doc-1.2.5-13.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75831" version="1" class="patch">
	<metadata>
		<title>libvorbis0-1.3.3-8.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2008-1420" ref_url="https://www.suse.com/security/cve/CVE-2008-1420/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<description>
These are all security issues fixed in the libvorbis0-1.3.3-8.23 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1420/">CVE-2008-1420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141724" comment="libvorbis0-1.3.3-8.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140999" comment="libvorbis0-32bit-1.3.3-8.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141725" comment="libvorbisenc2-1.3.3-8.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141001" comment="libvorbisenc2-32bit-1.3.3-8.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141726" comment="libvorbisfile3-1.3.3-8.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141003" comment="libvorbisfile3-32bit-1.3.3-8.23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75832" version="1" class="patch">
	<metadata>
		<title>libvte9-0.28.2-17.83 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2012-2738" ref_url="https://www.suse.com/security/cve/CVE-2012-2738/" source="CVE"/>
		<description>
These are all security issues fixed in the libvte9-0.28.2-17.83 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2738/">CVE-2012-2738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141727" comment="libvte9-0.28.2-17.83 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75833" version="1" class="patch">
	<metadata>
		<title>libxcb-dri2-0-1.10-1.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-2064" ref_url="https://www.suse.com/security/cve/CVE-2013-2064/" source="CVE"/>
		<description>
These are all security issues fixed in the libxcb-dri2-0-1.10-1.21 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2064/">CVE-2013-2064</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141728" comment="libxcb-dri2-0-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141729" comment="libxcb-dri2-0-32bit-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141730" comment="libxcb-glx0-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141731" comment="libxcb-glx0-32bit-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141732" comment="libxcb-randr0-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141733" comment="libxcb-render0-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141734" comment="libxcb-render0-32bit-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141735" comment="libxcb-shape0-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141736" comment="libxcb-shm0-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141737" comment="libxcb-shm0-32bit-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141738" comment="libxcb-sync1-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141739" comment="libxcb-xf86dri0-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141740" comment="libxcb-xfixes0-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141741" comment="libxcb-xfixes0-32bit-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141742" comment="libxcb-xkb1-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141743" comment="libxcb-xkb1-32bit-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141744" comment="libxcb-xv0-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141745" comment="libxcb1-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141746" comment="libxcb1-32bit-1.10-1.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75834" version="1" class="patch">
	<metadata>
		<title>libxerces-c-3_1-3.1.1-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-1885" ref_url="https://www.suse.com/security/cve/CVE-2009-1885/" source="CVE"/>
		<description>
These are all security issues fixed in the libxerces-c-3_1-3.1.1-1.6 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1885/">CVE-2009-1885</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141747" comment="libxerces-c-3_1-3.1.1-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141748" comment="libxerces-c-3_1-32bit-3.1.1-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75835" version="1" class="patch">
	<metadata>
		<title>libxml2-2-2.9.1-6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2008-4225" ref_url="https://www.suse.com/security/cve/CVE-2008-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-4226" ref_url="https://www.suse.com/security/cve/CVE-2008-4226/" source="CVE"/>
		<reference ref_id="CVE-2008-4409" ref_url="https://www.suse.com/security/cve/CVE-2008-4409/" source="CVE"/>
		<reference ref_id="CVE-2010-4494" ref_url="https://www.suse.com/security/cve/CVE-2010-4494/" source="CVE"/>
		<reference ref_id="CVE-2011-1944" ref_url="https://www.suse.com/security/cve/CVE-2011-1944/" source="CVE"/>
		<reference ref_id="CVE-2012-5134" ref_url="https://www.suse.com/security/cve/CVE-2012-5134/" source="CVE"/>
		<reference ref_id="CVE-2013-0338" ref_url="https://www.suse.com/security/cve/CVE-2013-0338/" source="CVE"/>
		<reference ref_id="CVE-2013-1969" ref_url="https://www.suse.com/security/cve/CVE-2013-1969/" source="CVE"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2-2.9.1-6.2 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4225/">CVE-2008-4225</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4226/">CVE-2008-4226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4409/">CVE-2008-4409</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4494/">CVE-2010-4494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1944/">CVE-2011-1944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5134/">CVE-2012-5134</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0338/">CVE-2013-0338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1969/">CVE-2013-1969</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141749" comment="libxml2-2-2.9.1-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141750" comment="libxml2-2-32bit-2.9.1-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141751" comment="libxml2-tools-2.9.1-6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75836" version="1" class="patch">
	<metadata>
		<title>libyaml-0-2-0.1.6-1.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-6393" ref_url="https://www.suse.com/security/cve/CVE-2013-6393/" source="CVE"/>
		<reference ref_id="CVE-2014-2525" ref_url="https://www.suse.com/security/cve/CVE-2014-2525/" source="CVE"/>
		<description>
These are all security issues fixed in the libyaml-0-2-0.1.6-1.19 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6393/">CVE-2013-6393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2525/">CVE-2014-2525</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141752" comment="libyaml-0-2-0.1.6-1.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75837" version="1" class="patch">
	<metadata>
		<title>libzip2-0.11.1-4.62 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<reference ref_id="CVE-2012-1162" ref_url="https://www.suse.com/security/cve/CVE-2012-1162/" source="CVE"/>
		<reference ref_id="CVE-2012-1163" ref_url="https://www.suse.com/security/cve/CVE-2012-1163/" source="CVE"/>
		<description>
These are all security issues fixed in the libzip2-0.11.1-4.62 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1162/">CVE-2012-1162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1163/">CVE-2012-1163</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141753" comment="libzip2-0.11.1-4.62 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75838" version="1" class="patch">
	<metadata>
		<title>libzmq3-4.0.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2014-7202" ref_url="https://www.suse.com/security/cve/CVE-2014-7202/" source="CVE"/>
		<reference ref_id="CVE-2014-7203" ref_url="https://www.suse.com/security/cve/CVE-2014-7203/" source="CVE"/>
		<description>
These are all security issues fixed in the libzmq3-4.0.4-2.1 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7202/">CVE-2014-7202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7203/">CVE-2014-7203</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141754" comment="libzmq3-4.0.4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75839" version="1" class="patch">
	<metadata>
		<title>logrotate-3.8.7-3.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-1098" ref_url="https://www.suse.com/security/cve/CVE-2011-1098/" source="CVE"/>
		<reference ref_id="CVE-2011-1154" ref_url="https://www.suse.com/security/cve/CVE-2011-1154/" source="CVE"/>
		<reference ref_id="CVE-2011-1155" ref_url="https://www.suse.com/security/cve/CVE-2011-1155/" source="CVE"/>
		<description>
These are all security issues fixed in the logrotate-3.8.7-3.21 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1098/">CVE-2011-1098</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1154/">CVE-2011-1154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1155/">CVE-2011-1155</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141038" comment="logrotate-3.8.7-3.21 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75840" version="1" class="patch">
	<metadata>
		<title>m4-1.4.16-15.74 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-4029" ref_url="https://www.suse.com/security/cve/CVE-2009-4029/" source="CVE"/>
		<description>
These are all security issues fixed in the m4-1.4.16-15.74 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4029/">CVE-2009-4029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140466" comment="m4-1.4.16-15.74 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75841" version="1" class="patch">
	<metadata>
		<title>mipv6d-2.0.2.umip.0.4-19.77 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2010-2522" ref_url="https://www.suse.com/security/cve/CVE-2010-2522/" source="CVE"/>
		<reference ref_id="CVE-2010-2523" ref_url="https://www.suse.com/security/cve/CVE-2010-2523/" source="CVE"/>
		<description>
These are all security issues fixed in the mipv6d-2.0.2.umip.0.4-19.77 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2522/">CVE-2010-2522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2523/">CVE-2010-2523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141042" comment="mipv6d-2.0.2.umip.0.4-19.77 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75842" version="1" class="patch">
	<metadata>
		<title>mozilla-nspr-32bit-4.10.7-1.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545/" source="CVE"/>
		<description>
These are all security issues fixed in the mozilla-nspr-32bit-4.10.7-1.13 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141755" comment="mozilla-nspr-4.10.7-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141756" comment="mozilla-nspr-32bit-4.10.7-1.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75843" version="1" class="patch">
	<metadata>
		<title>mutt-1.5.21-44.38 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2014-0467" ref_url="https://www.suse.com/security/cve/CVE-2014-0467/" source="CVE"/>
		<description>
These are all security issues fixed in the mutt-1.5.21-44.38 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0467/">CVE-2014-0467</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141757" comment="mutt-1.5.21-44.38 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75844" version="1" class="patch">
	<metadata>
		<title>ntp-4.2.6p5-24.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-0159" ref_url="https://www.suse.com/security/cve/CVE-2009-0159/" source="CVE"/>
		<reference ref_id="CVE-2009-1252" ref_url="https://www.suse.com/security/cve/CVE-2009-1252/" source="CVE"/>
		<reference ref_id="CVE-2013-5211" ref_url="https://www.suse.com/security/cve/CVE-2013-5211/" source="CVE"/>
		<description>
These are all security issues fixed in the ntp-4.2.6p5-24.3 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0159/">CVE-2009-0159</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1252/">CVE-2009-1252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5211/">CVE-2013-5211</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141758" comment="ntp-4.2.6p5-24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141759" comment="ntp-doc-4.2.6p5-24.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75845" version="1" class="patch">
	<metadata>
		<title>opensc-0.13.0-1.122 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-0368" ref_url="https://www.suse.com/security/cve/CVE-2009-0368/" source="CVE"/>
		<reference ref_id="CVE-2010-4523" ref_url="https://www.suse.com/security/cve/CVE-2010-4523/" source="CVE"/>
		<description>
These are all security issues fixed in the opensc-0.13.0-1.122 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0368/">CVE-2009-0368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4523/">CVE-2010-4523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141044" comment="opensc-0.13.0-1.122 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75846" version="1" class="patch">
	<metadata>
		<title>openslp-2.0.0-2.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2010-3609" ref_url="https://www.suse.com/security/cve/CVE-2010-3609/" source="CVE"/>
		<description>
These are all security issues fixed in the openslp-2.0.0-2.9 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3609/">CVE-2010-3609</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141760" comment="openslp-2.0.0-2.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141761" comment="openslp-32bit-2.0.0-2.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75847" version="1" class="patch">
	<metadata>
		<title>openssh-6.6p1-4.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2014-2653" ref_url="https://www.suse.com/security/cve/CVE-2014-2653/" source="CVE"/>
		<description>
These are all security issues fixed in the openssh-6.6p1-4.6 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2653/">CVE-2014-2653</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141762" comment="openssh-6.6p1-4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141763" comment="openssh-helpers-6.6p1-4.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75848" version="1" class="patch">
	<metadata>
		<title>pam-1.1.8-11.57 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2010-3430" ref_url="https://www.suse.com/security/cve/CVE-2010-3430/" source="CVE"/>
		<reference ref_id="CVE-2010-3431" ref_url="https://www.suse.com/security/cve/CVE-2010-3431/" source="CVE"/>
		<reference ref_id="CVE-2010-3853" ref_url="https://www.suse.com/security/cve/CVE-2010-3853/" source="CVE"/>
		<reference ref_id="CVE-2011-3148" ref_url="https://www.suse.com/security/cve/CVE-2011-3148/" source="CVE"/>
		<reference ref_id="CVE-2011-3149" ref_url="https://www.suse.com/security/cve/CVE-2011-3149/" source="CVE"/>
		<reference ref_id="CVE-2014-2583" ref_url="https://www.suse.com/security/cve/CVE-2014-2583/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-1.1.8-11.57 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3430/">CVE-2010-3430</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3431/">CVE-2010-3431</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3853/">CVE-2010-3853</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3148/">CVE-2011-3148</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3149/">CVE-2011-3149</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2583/">CVE-2014-2583</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141764" comment="pam-1.1.8-11.57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141765" comment="pam-32bit-1.1.8-11.57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141766" comment="pam-doc-1.1.8-11.57 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75849" version="1" class="patch">
	<metadata>
		<title>pam-modules-12.1-23.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-3172" ref_url="https://www.suse.com/security/cve/CVE-2011-3172/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-modules-12.1-23.12 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3172/">CVE-2011-3172</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141767" comment="pam-modules-12.1-23.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141060" comment="pam-modules-32bit-12.1-23.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75850" version="1" class="patch">
	<metadata>
		<title>pam_krb5-2.4.4-4.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2008-3825" ref_url="https://www.suse.com/security/cve/CVE-2008-3825/" source="CVE"/>
		<reference ref_id="CVE-2009-1384" ref_url="https://www.suse.com/security/cve/CVE-2009-1384/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_krb5-2.4.4-4.5 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3825/">CVE-2008-3825</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1384/">CVE-2009-1384</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141061" comment="pam_krb5-2.4.4-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141062" comment="pam_krb5-32bit-2.4.4-4.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75851" version="1" class="patch">
	<metadata>
		<title>pam_ssh-2.0-1.40 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-1273" ref_url="https://www.suse.com/security/cve/CVE-2009-1273/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_ssh-2.0-1.40 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1273/">CVE-2009-1273</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141063" comment="pam_ssh-2.0-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141064" comment="pam_ssh-32bit-2.0-1.40 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75852" version="1" class="patch">
	<metadata>
		<title>patch-2.7.1-5.191 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2010-4651" ref_url="https://www.suse.com/security/cve/CVE-2010-4651/" source="CVE"/>
		<description>
These are all security issues fixed in the patch-2.7.1-5.191 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4651/">CVE-2010-4651</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141768" comment="patch-2.7.1-5.191 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75853" version="1" class="patch">
	<metadata>
		<title>pcsc-ccid-1.4.14-1.45 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2010-4530" ref_url="https://www.suse.com/security/cve/CVE-2010-4530/" source="CVE"/>
		<description>
These are all security issues fixed in the pcsc-ccid-1.4.14-1.45 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4530/">CVE-2010-4530</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141065" comment="pcsc-ccid-1.4.14-1.45 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75854" version="1" class="patch">
	<metadata>
		<title>perl-32bit-5.18.2-3.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2010-2761" ref_url="https://www.suse.com/security/cve/CVE-2010-2761/" source="CVE"/>
		<reference ref_id="CVE-2010-4410" ref_url="https://www.suse.com/security/cve/CVE-2010-4410/" source="CVE"/>
		<reference ref_id="CVE-2010-4411" ref_url="https://www.suse.com/security/cve/CVE-2010-4411/" source="CVE"/>
		<reference ref_id="CVE-2010-4777" ref_url="https://www.suse.com/security/cve/CVE-2010-4777/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-32bit-5.18.2-3.7 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2761/">CVE-2010-2761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4410/">CVE-2010-4410</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4411/">CVE-2010-4411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4777/">CVE-2010-4777</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141769" comment="perl-5.18.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141770" comment="perl-32bit-5.18.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141771" comment="perl-base-5.18.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141772" comment="perl-doc-5.18.2-3.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75855" version="1" class="patch">
	<metadata>
		<title>perl-Config-IniFiles-2.82-3.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2012-2451" ref_url="https://www.suse.com/security/cve/CVE-2012-2451/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Config-IniFiles-2.82-3.14 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2451/">CVE-2012-2451</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141066" comment="perl-Config-IniFiles-2.82-3.14 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75856" version="1" class="patch">
	<metadata>
		<title>perl-HTML-Parser-3.71-1.178 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-3627" ref_url="https://www.suse.com/security/cve/CVE-2009-3627/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-HTML-Parser-3.71-1.178 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3627/">CVE-2009-3627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141067" comment="perl-HTML-Parser-3.71-1.178 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75857" version="1" class="patch">
	<metadata>
		<title>perl-LWP-Protocol-https-6.04-5.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2014-3230" ref_url="https://www.suse.com/security/cve/CVE-2014-3230/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-LWP-Protocol-https-6.04-5.4 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3230/">CVE-2014-3230</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141068" comment="perl-LWP-Protocol-https-6.04-5.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75858" version="1" class="patch">
	<metadata>
		<title>perl-Tk-804.031-3.82 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2006-4484" ref_url="https://www.suse.com/security/cve/CVE-2006-4484/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Tk-804.031-3.82 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4484/">CVE-2006-4484</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141069" comment="perl-Tk-804.031-3.82 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75859" version="1" class="patch">
	<metadata>
		<title>perl-YAML-LibYAML-0.38-7.61 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2012-1152" ref_url="https://www.suse.com/security/cve/CVE-2012-1152/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-YAML-LibYAML-0.38-7.61 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1152/">CVE-2012-1152</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141773" comment="perl-YAML-LibYAML-0.38-7.61 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75860" version="1" class="patch">
	<metadata>
		<title>pidgin-otr-4.0.0-6.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2012-2369" ref_url="https://www.suse.com/security/cve/CVE-2012-2369/" source="CVE"/>
		<description>
These are all security issues fixed in the pidgin-otr-4.0.0-6.18 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2369/">CVE-2012-2369</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141774" comment="pidgin-otr-4.0.0-6.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75861" version="1" class="patch">
	<metadata>
		<title>ppp-2.4.7-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2014-3158" ref_url="https://www.suse.com/security/cve/CVE-2014-3158/" source="CVE"/>
		<description>
These are all security issues fixed in the ppp-2.4.7-1.7 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3158/">CVE-2014-3158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141072" comment="ppp-2.4.7-1.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75862" version="1" class="patch">
	<metadata>
		<title>procmail-3.22-267.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2014-3618" ref_url="https://www.suse.com/security/cve/CVE-2014-3618/" source="CVE"/>
		<description>
These are all security issues fixed in the procmail-3.22-267.12 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3618/">CVE-2014-3618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141775" comment="procmail-3.22-267.12 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75863" version="1" class="patch">
	<metadata>
		<title>puppet-3.6.2-3.62 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-3848" ref_url="https://www.suse.com/security/cve/CVE-2011-3848/" source="CVE"/>
		<reference ref_id="CVE-2011-3872" ref_url="https://www.suse.com/security/cve/CVE-2011-3872/" source="CVE"/>
		<reference ref_id="CVE-2012-3864" ref_url="https://www.suse.com/security/cve/CVE-2012-3864/" source="CVE"/>
		<reference ref_id="CVE-2012-3865" ref_url="https://www.suse.com/security/cve/CVE-2012-3865/" source="CVE"/>
		<reference ref_id="CVE-2012-3866" ref_url="https://www.suse.com/security/cve/CVE-2012-3866/" source="CVE"/>
		<reference ref_id="CVE-2012-3867" ref_url="https://www.suse.com/security/cve/CVE-2012-3867/" source="CVE"/>
		<reference ref_id="CVE-2013-3567" ref_url="https://www.suse.com/security/cve/CVE-2013-3567/" source="CVE"/>
		<reference ref_id="CVE-2013-4761" ref_url="https://www.suse.com/security/cve/CVE-2013-4761/" source="CVE"/>
		<reference ref_id="CVE-2013-4956" ref_url="https://www.suse.com/security/cve/CVE-2013-4956/" source="CVE"/>
		<reference ref_id="CVE-2014-3248" ref_url="https://www.suse.com/security/cve/CVE-2014-3248/" source="CVE"/>
		<reference ref_id="CVE-2014-3253" ref_url="https://www.suse.com/security/cve/CVE-2014-3253/" source="CVE"/>
		<description>
These are all security issues fixed in the puppet-3.6.2-3.62 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3848/">CVE-2011-3848</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3872/">CVE-2011-3872</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3864/">CVE-2012-3864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3865/">CVE-2012-3865</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3866/">CVE-2012-3866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3867/">CVE-2012-3867</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3567/">CVE-2013-3567</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4761/">CVE-2013-4761</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4956/">CVE-2013-4956</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3248/">CVE-2014-3248</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3253/">CVE-2014-3253</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141776" comment="puppet-3.6.2-3.62 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75864" version="1" class="patch">
	<metadata>
		<title>python-2.7.7-2.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<description>
These are all security issues fixed in the python-2.7.7-2.12 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141777" comment="python-2.7.7-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141778" comment="python-curses-2.7.7-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141779" comment="python-tk-2.7.7-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141780" comment="python3-3.4.1-2.76 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75865" version="1" class="patch">
	<metadata>
		<title>python-cupshelpers-1.4.5-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-4405" ref_url="https://www.suse.com/security/cve/CVE-2011-4405/" source="CVE"/>
		<description>
These are all security issues fixed in the python-cupshelpers-1.4.5-1.5 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4405/">CVE-2011-4405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141781" comment="python-cupshelpers-1.4.5-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141782" comment="system-config-printer-1.4.5-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141783" comment="system-config-printer-common-1.4.5-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141784" comment="system-config-printer-common-lang-1.4.5-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141785" comment="system-config-printer-dbus-service-1.4.5-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141786" comment="udev-configure-printer-1.4.5-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75866" version="1" class="patch">
	<metadata>
		<title>python-imaging-1.1.7-21.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2014-1932" ref_url="https://www.suse.com/security/cve/CVE-2014-1932/" source="CVE"/>
		<description>
These are all security issues fixed in the python-imaging-1.1.7-21.15 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1932/">CVE-2014-1932</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141787" comment="python-imaging-1.1.7-21.15 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75867" version="1" class="patch">
	<metadata>
		<title>python-libxml2-2.9.1-6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2008-4225" ref_url="https://www.suse.com/security/cve/CVE-2008-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-4226" ref_url="https://www.suse.com/security/cve/CVE-2008-4226/" source="CVE"/>
		<reference ref_id="CVE-2008-4409" ref_url="https://www.suse.com/security/cve/CVE-2008-4409/" source="CVE"/>
		<reference ref_id="CVE-2012-5134" ref_url="https://www.suse.com/security/cve/CVE-2012-5134/" source="CVE"/>
		<description>
These are all security issues fixed in the python-libxml2-2.9.1-6.2 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4225/">CVE-2008-4225</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4226/">CVE-2008-4226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4409/">CVE-2008-4409</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5134/">CVE-2012-5134</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141788" comment="python-libxml2-2.9.1-6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75868" version="1" class="patch">
	<metadata>
		<title>python-pyOpenSSL-0.14-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-4314" ref_url="https://www.suse.com/security/cve/CVE-2013-4314/" source="CVE"/>
		<description>
These are all security issues fixed in the python-pyOpenSSL-0.14-1.7 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4314/">CVE-2013-4314</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141789" comment="python-pyOpenSSL-0.14-1.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75869" version="1" class="patch">
	<metadata>
		<title>python-pywbem-0.7.0-4.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-6418" ref_url="https://www.suse.com/security/cve/CVE-2013-6418/" source="CVE"/>
		<description>
These are all security issues fixed in the python-pywbem-0.7.0-4.7 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6418/">CVE-2013-6418</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141085" comment="python-pywbem-0.7.0-4.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75870" version="1" class="patch">
	<metadata>
		<title>qemu-2.0.0-40.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2008-0928" ref_url="https://www.suse.com/security/cve/CVE-2008-0928/" source="CVE"/>
		<reference ref_id="CVE-2008-1945" ref_url="https://www.suse.com/security/cve/CVE-2008-1945/" source="CVE"/>
		<reference ref_id="CVE-2008-2382" ref_url="https://www.suse.com/security/cve/CVE-2008-2382/" source="CVE"/>
		<reference ref_id="CVE-2008-4539" ref_url="https://www.suse.com/security/cve/CVE-2008-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515/" source="CVE"/>
		<reference ref_id="CVE-2013-4148" ref_url="https://www.suse.com/security/cve/CVE-2013-4148/" source="CVE"/>
		<reference ref_id="CVE-2013-4149" ref_url="https://www.suse.com/security/cve/CVE-2013-4149/" source="CVE"/>
		<reference ref_id="CVE-2013-4150" ref_url="https://www.suse.com/security/cve/CVE-2013-4150/" source="CVE"/>
		<reference ref_id="CVE-2013-4151" ref_url="https://www.suse.com/security/cve/CVE-2013-4151/" source="CVE"/>
		<reference ref_id="CVE-2013-4526" ref_url="https://www.suse.com/security/cve/CVE-2013-4526/" source="CVE"/>
		<reference ref_id="CVE-2013-4527" ref_url="https://www.suse.com/security/cve/CVE-2013-4527/" source="CVE"/>
		<reference ref_id="CVE-2013-4529" ref_url="https://www.suse.com/security/cve/CVE-2013-4529/" source="CVE"/>
		<reference ref_id="CVE-2013-4530" ref_url="https://www.suse.com/security/cve/CVE-2013-4530/" source="CVE"/>
		<reference ref_id="CVE-2013-4531" ref_url="https://www.suse.com/security/cve/CVE-2013-4531/" source="CVE"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4535" ref_url="https://www.suse.com/security/cve/CVE-2013-4535/" source="CVE"/>
		<reference ref_id="CVE-2013-4536" ref_url="https://www.suse.com/security/cve/CVE-2013-4536/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540/" source="CVE"/>
		<reference ref_id="CVE-2013-4541" ref_url="https://www.suse.com/security/cve/CVE-2013-4541/" source="CVE"/>
		<reference ref_id="CVE-2013-4542" ref_url="https://www.suse.com/security/cve/CVE-2013-4542/" source="CVE"/>
		<reference ref_id="CVE-2013-4544" ref_url="https://www.suse.com/security/cve/CVE-2013-4544/" source="CVE"/>
		<reference ref_id="CVE-2013-6399" ref_url="https://www.suse.com/security/cve/CVE-2013-6399/" source="CVE"/>
		<reference ref_id="CVE-2014-0142" ref_url="https://www.suse.com/security/cve/CVE-2014-0142/" source="CVE"/>
		<reference ref_id="CVE-2014-0143" ref_url="https://www.suse.com/security/cve/CVE-2014-0143/" source="CVE"/>
		<reference ref_id="CVE-2014-0144" ref_url="https://www.suse.com/security/cve/CVE-2014-0144/" source="CVE"/>
		<reference ref_id="CVE-2014-0145" ref_url="https://www.suse.com/security/cve/CVE-2014-0145/" source="CVE"/>
		<reference ref_id="CVE-2014-0146" ref_url="https://www.suse.com/security/cve/CVE-2014-0146/" source="CVE"/>
		<reference ref_id="CVE-2014-0147" ref_url="https://www.suse.com/security/cve/CVE-2014-0147/" source="CVE"/>
		<reference ref_id="CVE-2014-0150" ref_url="https://www.suse.com/security/cve/CVE-2014-0150/" source="CVE"/>
		<reference ref_id="CVE-2014-0182" ref_url="https://www.suse.com/security/cve/CVE-2014-0182/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-0223" ref_url="https://www.suse.com/security/cve/CVE-2014-0223/" source="CVE"/>
		<reference ref_id="CVE-2014-3461" ref_url="https://www.suse.com/security/cve/CVE-2014-3461/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-2.0.0-40.7 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0928/">CVE-2008-0928</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1945/">CVE-2008-1945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2382/">CVE-2008-2382</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4539/">CVE-2008-4539</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4148/">CVE-2013-4148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4149/">CVE-2013-4149</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4150/">CVE-2013-4150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4151/">CVE-2013-4151</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4526/">CVE-2013-4526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4527/">CVE-2013-4527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4529/">CVE-2013-4529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4530/">CVE-2013-4530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4531/">CVE-2013-4531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4535/">CVE-2013-4535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4536/">CVE-2013-4536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4541/">CVE-2013-4541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4542/">CVE-2013-4542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4544/">CVE-2013-4544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6399/">CVE-2013-6399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0142/">CVE-2014-0142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0143/">CVE-2014-0143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0144/">CVE-2014-0144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0145/">CVE-2014-0145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0146/">CVE-2014-0146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0147/">CVE-2014-0147</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0150/">CVE-2014-0150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0182/">CVE-2014-0182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0223/">CVE-2014-0223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3461/">CVE-2014-3461</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141790" comment="qemu-2.0.0-40.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141791" comment="qemu-block-curl-2.0.0-40.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141792" comment="qemu-ipxe-1.0.0-40.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141793" comment="qemu-kvm-2.0.0-40.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141794" comment="qemu-seabios-1.7.4-40.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141795" comment="qemu-sgabios-8-40.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141796" comment="qemu-tools-2.0.0-40.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141797" comment="qemu-vgabios-1.7.4-40.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141798" comment="qemu-x86-2.0.0-40.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75871" version="1" class="patch">
	<metadata>
		<title>radvd-1.9.7-2.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-3602" ref_url="https://www.suse.com/security/cve/CVE-2011-3602/" source="CVE"/>
		<description>
These are all security issues fixed in the radvd-1.9.7-2.17 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3602/">CVE-2011-3602</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141103" comment="radvd-1.9.7-2.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75872" version="1" class="patch">
	<metadata>
		<title>rhythmbox-3.0.2-1.92 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2012-3355" ref_url="https://www.suse.com/security/cve/CVE-2012-3355/" source="CVE"/>
		<description>
These are all security issues fixed in the rhythmbox-3.0.2-1.92 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3355/">CVE-2012-3355</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141799" comment="rhythmbox-3.0.2-1.92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141800" comment="rhythmbox-lang-3.0.2-1.92 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75873" version="1" class="patch">
	<metadata>
		<title>rsync-3.1.0-2.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-1097" ref_url="https://www.suse.com/security/cve/CVE-2011-1097/" source="CVE"/>
		<reference ref_id="CVE-2014-2855" ref_url="https://www.suse.com/security/cve/CVE-2014-2855/" source="CVE"/>
		<description>
These are all security issues fixed in the rsync-3.1.0-2.7 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1097/">CVE-2011-1097</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2855/">CVE-2014-2855</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141801" comment="rsync-3.1.0-2.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75874" version="1" class="patch">
	<metadata>
		<title>rsyslog-8.4.0-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-3200" ref_url="https://www.suse.com/security/cve/CVE-2011-3200/" source="CVE"/>
		<reference ref_id="CVE-2013-4758" ref_url="https://www.suse.com/security/cve/CVE-2013-4758/" source="CVE"/>
		<reference ref_id="CVE-2013-6370" ref_url="https://www.suse.com/security/cve/CVE-2013-6370/" source="CVE"/>
		<reference ref_id="CVE-2013-6371" ref_url="https://www.suse.com/security/cve/CVE-2013-6371/" source="CVE"/>
		<reference ref_id="CVE-2014-3634" ref_url="https://www.suse.com/security/cve/CVE-2014-3634/" source="CVE"/>
		<description>
These are all security issues fixed in the rsyslog-8.4.0-2.2 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3200/">CVE-2011-3200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4758/">CVE-2013-4758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6370/">CVE-2013-6370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6371/">CVE-2013-6371</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3634/">CVE-2014-3634</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141802" comment="rsyslog-8.4.0-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75875" version="1" class="patch">
	<metadata>
		<title>rtkit-0.11_git201205151338-8.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-4326" ref_url="https://www.suse.com/security/cve/CVE-2013-4326/" source="CVE"/>
		<description>
These are all security issues fixed in the rtkit-0.11_git201205151338-8.17 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4326/">CVE-2013-4326</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141122" comment="rtkit-0.11_git201205151338-8.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75876" version="1" class="patch">
	<metadata>
		<title>ruby-2.1-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-4492" ref_url="https://www.suse.com/security/cve/CVE-2009-4492/" source="CVE"/>
		<reference ref_id="CVE-2010-0541" ref_url="https://www.suse.com/security/cve/CVE-2010-0541/" source="CVE"/>
		<reference ref_id="CVE-2011-1004" ref_url="https://www.suse.com/security/cve/CVE-2011-1004/" source="CVE"/>
		<reference ref_id="CVE-2011-1005" ref_url="https://www.suse.com/security/cve/CVE-2011-1005/" source="CVE"/>
		<reference ref_id="CVE-2011-4815" ref_url="https://www.suse.com/security/cve/CVE-2011-4815/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby-2.1-1.6 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4492/">CVE-2009-4492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0541/">CVE-2010-0541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1004/">CVE-2011-1004</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1005/">CVE-2011-1005</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4815/">CVE-2011-4815</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141123" comment="ruby-2.1-1.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75877" version="1" class="patch">
	<metadata>
		<title>shim-0.7-14.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2014-3675" ref_url="https://www.suse.com/security/cve/CVE-2014-3675/" source="CVE"/>
		<reference ref_id="CVE-2014-3676" ref_url="https://www.suse.com/security/cve/CVE-2014-3676/" source="CVE"/>
		<reference ref_id="CVE-2014-3677" ref_url="https://www.suse.com/security/cve/CVE-2014-3677/" source="CVE"/>
		<description>
These are all security issues fixed in the shim-0.7-14.2 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3675/">CVE-2014-3675</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3676/">CVE-2014-3676</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3677/">CVE-2014-3677</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141803" comment="shim-0.7-14.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75878" version="1" class="patch">
	<metadata>
		<title>socat-1.7.2.4-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-3571" ref_url="https://www.suse.com/security/cve/CVE-2013-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-0019" ref_url="https://www.suse.com/security/cve/CVE-2014-0019/" source="CVE"/>
		<description>
These are all security issues fixed in the socat-1.7.2.4-1.2 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3571/">CVE-2013-3571</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0019/">CVE-2014-0019</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141804" comment="socat-1.7.2.4-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75879" version="1" class="patch">
	<metadata>
		<title>squashfs-4.3-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2012-4024" ref_url="https://www.suse.com/security/cve/CVE-2012-4024/" source="CVE"/>
		<reference ref_id="CVE-2012-4025" ref_url="https://www.suse.com/security/cve/CVE-2012-4025/" source="CVE"/>
		<description>
These are all security issues fixed in the squashfs-4.3-1.15 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4024/">CVE-2012-4024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4025/">CVE-2012-4025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141805" comment="squashfs-4.3-1.15 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75880" version="1" class="patch">
	<metadata>
		<title>strongswan-5.1.3-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-0790" ref_url="https://www.suse.com/security/cve/CVE-2009-0790/" source="CVE"/>
		<reference ref_id="CVE-2012-2388" ref_url="https://www.suse.com/security/cve/CVE-2012-2388/" source="CVE"/>
		<reference ref_id="CVE-2013-2944" ref_url="https://www.suse.com/security/cve/CVE-2013-2944/" source="CVE"/>
		<reference ref_id="CVE-2013-5018" ref_url="https://www.suse.com/security/cve/CVE-2013-5018/" source="CVE"/>
		<reference ref_id="CVE-2013-6075" ref_url="https://www.suse.com/security/cve/CVE-2013-6075/" source="CVE"/>
		<reference ref_id="CVE-2013-6076" ref_url="https://www.suse.com/security/cve/CVE-2013-6076/" source="CVE"/>
		<reference ref_id="CVE-2014-2338" ref_url="https://www.suse.com/security/cve/CVE-2014-2338/" source="CVE"/>
		<description>
These are all security issues fixed in the strongswan-5.1.3-4.1 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0790/">CVE-2009-0790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2388/">CVE-2012-2388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2944/">CVE-2013-2944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5018/">CVE-2013-5018</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6075/">CVE-2013-6075</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6076/">CVE-2013-6076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2338/">CVE-2014-2338</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141806" comment="strongswan-5.1.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141807" comment="strongswan-doc-5.1.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141808" comment="strongswan-ipsec-5.1.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141809" comment="strongswan-libs0-5.1.3-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75881" version="1" class="patch">
	<metadata>
		<title>sudo-1.8.10p3-1.62 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2010-1163" ref_url="https://www.suse.com/security/cve/CVE-2010-1163/" source="CVE"/>
		<reference ref_id="CVE-2010-1646" ref_url="https://www.suse.com/security/cve/CVE-2010-1646/" source="CVE"/>
		<reference ref_id="CVE-2011-0010" ref_url="https://www.suse.com/security/cve/CVE-2011-0010/" source="CVE"/>
		<reference ref_id="CVE-2012-2337" ref_url="https://www.suse.com/security/cve/CVE-2012-2337/" source="CVE"/>
		<reference ref_id="CVE-2013-1775" ref_url="https://www.suse.com/security/cve/CVE-2013-1775/" source="CVE"/>
		<reference ref_id="CVE-2013-1776" ref_url="https://www.suse.com/security/cve/CVE-2013-1776/" source="CVE"/>
		<description>
These are all security issues fixed in the sudo-1.8.10p3-1.62 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1163/">CVE-2010-1163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1646/">CVE-2010-1646</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0010/">CVE-2011-0010</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2337/">CVE-2012-2337</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1775/">CVE-2013-1775</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-1776/">CVE-2013-1776</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141810" comment="sudo-1.8.10p3-1.62 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75882" version="1" class="patch">
	<metadata>
		<title>sysconfig-0.83.7-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-4182" ref_url="https://www.suse.com/security/cve/CVE-2011-4182/" source="CVE"/>
		<description>
These are all security issues fixed in the sysconfig-0.83.7-2.1 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4182/">CVE-2011-4182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141811" comment="sysconfig-0.83.7-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141812" comment="sysconfig-netconfig-0.83.7-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75883" version="1" class="patch">
	<metadata>
		<title>syslog-service-2.0-778.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2014-3634" ref_url="https://www.suse.com/security/cve/CVE-2014-3634/" source="CVE"/>
		<description>
These are all security issues fixed in the syslog-service-2.0-778.1 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3634/">CVE-2014-3634</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141134" comment="syslog-service-2.0-778.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75884" version="1" class="patch">
	<metadata>
		<title>sysvinit-tools-2.88+-94.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<description>
These are all security issues fixed in the sysvinit-tools-2.88+-94.13 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141813" comment="sysvinit-tools-2.88+-94.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141139" comment="whois-5.1.1-1.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75885" version="1" class="patch">
	<metadata>
		<title>telepathy-gabble-0.18.1-3.268 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-1000" ref_url="https://www.suse.com/security/cve/CVE-2011-1000/" source="CVE"/>
		<reference ref_id="CVE-2013-1431" ref_url="https://www.suse.com/security/cve/CVE-2013-1431/" source="CVE"/>
		<description>
These are all security issues fixed in the telepathy-gabble-0.18.1-3.268 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1000/">CVE-2011-1000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1431/">CVE-2013-1431</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141814" comment="telepathy-gabble-0.18.1-3.268 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75886" version="1" class="patch">
	<metadata>
		<title>telepathy-idle-0.2.0-1.62 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2007-6746" ref_url="https://www.suse.com/security/cve/CVE-2007-6746/" source="CVE"/>
		<description>
These are all security issues fixed in the telepathy-idle-0.2.0-1.62 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6746/">CVE-2007-6746</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141815" comment="telepathy-idle-0.2.0-1.62 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75887" version="1" class="patch">
	<metadata>
		<title>tftp-5.2-8.84 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-2199" ref_url="https://www.suse.com/security/cve/CVE-2011-2199/" source="CVE"/>
		<description>
These are all security issues fixed in the tftp-5.2-8.84 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2199/">CVE-2011-2199</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141816" comment="tftp-5.2-8.84 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75888" version="1" class="patch">
	<metadata>
		<title>tigervnc-1.3.0-17.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2014-0011" ref_url="https://www.suse.com/security/cve/CVE-2014-0011/" source="CVE"/>
		<description>
These are all security issues fixed in the tigervnc-1.3.0-17.3 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0011/">CVE-2014-0011</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141817" comment="tigervnc-1.3.0-17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141818" comment="xorg-x11-Xvnc-1.3.0-17.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75889" version="1" class="patch">
	<metadata>
		<title>unixODBC-2.3.1-4.95 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-1145" ref_url="https://www.suse.com/security/cve/CVE-2011-1145/" source="CVE"/>
		<description>
These are all security issues fixed in the unixODBC-2.3.1-4.95 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1145/">CVE-2011-1145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141819" comment="unixODBC-2.3.1-4.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141820" comment="unixODBC-32bit-2.3.1-4.95 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75890" version="1" class="patch">
	<metadata>
		<title>vino-3.10.1-1.86 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-0904" ref_url="https://www.suse.com/security/cve/CVE-2011-0904/" source="CVE"/>
		<reference ref_id="CVE-2011-0905" ref_url="https://www.suse.com/security/cve/CVE-2011-0905/" source="CVE"/>
		<reference ref_id="CVE-2011-1164" ref_url="https://www.suse.com/security/cve/CVE-2011-1164/" source="CVE"/>
		<description>
These are all security issues fixed in the vino-3.10.1-1.86 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0904/">CVE-2011-0904</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-0905/">CVE-2011-0905</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1164/">CVE-2011-1164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141821" comment="vino-3.10.1-1.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141822" comment="vino-lang-3.10.1-1.86 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75891" version="1" class="patch">
	<metadata>
		<title>vorbis-tools-1.4.0-16.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2008-1686" ref_url="https://www.suse.com/security/cve/CVE-2008-1686/" source="CVE"/>
		<description>
These are all security issues fixed in the vorbis-tools-1.4.0-16.9 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1686/">CVE-2008-1686</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141823" comment="vorbis-tools-1.4.0-16.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141824" comment="vorbis-tools-lang-1.4.0-16.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75892" version="1" class="patch">
	<metadata>
		<title>w3m-0.5.3-153.145 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2010-2074" ref_url="https://www.suse.com/security/cve/CVE-2010-2074/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<description>
These are all security issues fixed in the w3m-0.5.3-153.145 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2074/">CVE-2010-2074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141825" comment="w3m-0.5.3-153.145 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75893" version="1" class="patch">
	<metadata>
		<title>wdiff-1.2.1-3.64 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<description>
These are all security issues fixed in the wdiff-1.2.1-3.64 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140672" comment="wdiff-1.2.1-3.64 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75894" version="1" class="patch">
	<metadata>
		<title>wget-1.14-4.83 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2010-2252" ref_url="https://www.suse.com/security/cve/CVE-2010-2252/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<description>
These are all security issues fixed in the wget-1.14-4.83 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2252/">CVE-2010-2252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141826" comment="wget-1.14-4.83 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75895" version="1" class="patch">
	<metadata>
		<title>wireshark-1.10.9-1.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2009-1210" ref_url="https://www.suse.com/security/cve/CVE-2009-1210/" source="CVE"/>
		<reference ref_id="CVE-2009-1267" ref_url="https://www.suse.com/security/cve/CVE-2009-1267/" source="CVE"/>
		<reference ref_id="CVE-2009-1268" ref_url="https://www.suse.com/security/cve/CVE-2009-1268/" source="CVE"/>
		<reference ref_id="CVE-2009-1269" ref_url="https://www.suse.com/security/cve/CVE-2009-1269/" source="CVE"/>
		<reference ref_id="CVE-2009-3241" ref_url="https://www.suse.com/security/cve/CVE-2009-3241/" source="CVE"/>
		<reference ref_id="CVE-2009-3242" ref_url="https://www.suse.com/security/cve/CVE-2009-3242/" source="CVE"/>
		<reference ref_id="CVE-2009-3243" ref_url="https://www.suse.com/security/cve/CVE-2009-3243/" source="CVE"/>
		<reference ref_id="CVE-2010-1455" ref_url="https://www.suse.com/security/cve/CVE-2010-1455/" source="CVE"/>
		<reference ref_id="CVE-2010-2993" ref_url="https://www.suse.com/security/cve/CVE-2010-2993/" source="CVE"/>
		<reference ref_id="CVE-2010-3445" ref_url="https://www.suse.com/security/cve/CVE-2010-3445/" source="CVE"/>
		<reference ref_id="CVE-2010-4300" ref_url="https://www.suse.com/security/cve/CVE-2010-4300/" source="CVE"/>
		<reference ref_id="CVE-2010-4301" ref_url="https://www.suse.com/security/cve/CVE-2010-4301/" source="CVE"/>
		<reference ref_id="CVE-2010-4538" ref_url="https://www.suse.com/security/cve/CVE-2010-4538/" source="CVE"/>
		<reference ref_id="CVE-2011-0024" ref_url="https://www.suse.com/security/cve/CVE-2011-0024/" source="CVE"/>
		<reference ref_id="CVE-2011-0538" ref_url="https://www.suse.com/security/cve/CVE-2011-0538/" source="CVE"/>
		<reference ref_id="CVE-2011-0713" ref_url="https://www.suse.com/security/cve/CVE-2011-0713/" source="CVE"/>
		<reference ref_id="CVE-2011-1138" ref_url="https://www.suse.com/security/cve/CVE-2011-1138/" source="CVE"/>
		<reference ref_id="CVE-2011-1139" ref_url="https://www.suse.com/security/cve/CVE-2011-1139/" source="CVE"/>
		<reference ref_id="CVE-2011-1140" ref_url="https://www.suse.com/security/cve/CVE-2011-1140/" source="CVE"/>
		<reference ref_id="CVE-2011-1143" ref_url="https://www.suse.com/security/cve/CVE-2011-1143/" source="CVE"/>
		<reference ref_id="CVE-2011-1590" ref_url="https://www.suse.com/security/cve/CVE-2011-1590/" source="CVE"/>
		<reference ref_id="CVE-2011-1591" ref_url="https://www.suse.com/security/cve/CVE-2011-1591/" source="CVE"/>
		<reference ref_id="CVE-2011-1592" ref_url="https://www.suse.com/security/cve/CVE-2011-1592/" source="CVE"/>
		<reference ref_id="CVE-2011-1957" ref_url="https://www.suse.com/security/cve/CVE-2011-1957/" source="CVE"/>
		<reference ref_id="CVE-2011-1958" ref_url="https://www.suse.com/security/cve/CVE-2011-1958/" source="CVE"/>
		<reference ref_id="CVE-2011-1959" ref_url="https://www.suse.com/security/cve/CVE-2011-1959/" source="CVE"/>
		<reference ref_id="CVE-2011-2174" ref_url="https://www.suse.com/security/cve/CVE-2011-2174/" source="CVE"/>
		<reference ref_id="CVE-2011-2175" ref_url="https://www.suse.com/security/cve/CVE-2011-2175/" source="CVE"/>
		<reference ref_id="CVE-2011-2597" ref_url="https://www.suse.com/security/cve/CVE-2011-2597/" source="CVE"/>
		<reference ref_id="CVE-2011-2698" ref_url="https://www.suse.com/security/cve/CVE-2011-2698/" source="CVE"/>
		<reference ref_id="CVE-2011-3266" ref_url="https://www.suse.com/security/cve/CVE-2011-3266/" source="CVE"/>
		<reference ref_id="CVE-2011-3360" ref_url="https://www.suse.com/security/cve/CVE-2011-3360/" source="CVE"/>
		<reference ref_id="CVE-2011-3483" ref_url="https://www.suse.com/security/cve/CVE-2011-3483/" source="CVE"/>
		<reference ref_id="CVE-2012-2392" ref_url="https://www.suse.com/security/cve/CVE-2012-2392/" source="CVE"/>
		<reference ref_id="CVE-2012-2393" ref_url="https://www.suse.com/security/cve/CVE-2012-2393/" source="CVE"/>
		<reference ref_id="CVE-2012-2394" ref_url="https://www.suse.com/security/cve/CVE-2012-2394/" source="CVE"/>
		<reference ref_id="CVE-2012-3548" ref_url="https://www.suse.com/security/cve/CVE-2012-3548/" source="CVE"/>
		<reference ref_id="CVE-2012-4048" ref_url="https://www.suse.com/security/cve/CVE-2012-4048/" source="CVE"/>
		<reference ref_id="CVE-2012-4049" ref_url="https://www.suse.com/security/cve/CVE-2012-4049/" source="CVE"/>
		<reference ref_id="CVE-2012-4285" ref_url="https://www.suse.com/security/cve/CVE-2012-4285/" source="CVE"/>
		<reference ref_id="CVE-2012-4286" ref_url="https://www.suse.com/security/cve/CVE-2012-4286/" source="CVE"/>
		<reference ref_id="CVE-2012-4287" ref_url="https://www.suse.com/security/cve/CVE-2012-4287/" source="CVE"/>
		<reference ref_id="CVE-2012-4288" ref_url="https://www.suse.com/security/cve/CVE-2012-4288/" source="CVE"/>
		<reference ref_id="CVE-2012-4289" ref_url="https://www.suse.com/security/cve/CVE-2012-4289/" source="CVE"/>
		<reference ref_id="CVE-2012-4290" ref_url="https://www.suse.com/security/cve/CVE-2012-4290/" source="CVE"/>
		<reference ref_id="CVE-2012-4291" ref_url="https://www.suse.com/security/cve/CVE-2012-4291/" source="CVE"/>
		<reference ref_id="CVE-2012-4292" ref_url="https://www.suse.com/security/cve/CVE-2012-4292/" source="CVE"/>
		<reference ref_id="CVE-2012-4293" ref_url="https://www.suse.com/security/cve/CVE-2012-4293/" source="CVE"/>
		<reference ref_id="CVE-2012-4294" ref_url="https://www.suse.com/security/cve/CVE-2012-4294/" source="CVE"/>
		<reference ref_id="CVE-2012-4295" ref_url="https://www.suse.com/security/cve/CVE-2012-4295/" source="CVE"/>
		<reference ref_id="CVE-2012-4296" ref_url="https://www.suse.com/security/cve/CVE-2012-4296/" source="CVE"/>
		<reference ref_id="CVE-2012-4297" ref_url="https://www.suse.com/security/cve/CVE-2012-4297/" source="CVE"/>
		<reference ref_id="CVE-2012-4298" ref_url="https://www.suse.com/security/cve/CVE-2012-4298/" source="CVE"/>
		<reference ref_id="CVE-2012-5237" ref_url="https://www.suse.com/security/cve/CVE-2012-5237/" source="CVE"/>
		<reference ref_id="CVE-2012-5238" ref_url="https://www.suse.com/security/cve/CVE-2012-5238/" source="CVE"/>
		<reference ref_id="CVE-2012-5239" ref_url="https://www.suse.com/security/cve/CVE-2012-5239/" source="CVE"/>
		<reference ref_id="CVE-2012-5240" ref_url="https://www.suse.com/security/cve/CVE-2012-5240/" source="CVE"/>
		<reference ref_id="CVE-2012-5592" ref_url="https://www.suse.com/security/cve/CVE-2012-5592/" source="CVE"/>
		<reference ref_id="CVE-2012-5593" ref_url="https://www.suse.com/security/cve/CVE-2012-5593/" source="CVE"/>
		<reference ref_id="CVE-2012-5594" ref_url="https://www.suse.com/security/cve/CVE-2012-5594/" source="CVE"/>
		<reference ref_id="CVE-2012-5595" ref_url="https://www.suse.com/security/cve/CVE-2012-5595/" source="CVE"/>
		<reference ref_id="CVE-2012-5596" ref_url="https://www.suse.com/security/cve/CVE-2012-5596/" source="CVE"/>
		<reference ref_id="CVE-2012-5597" ref_url="https://www.suse.com/security/cve/CVE-2012-5597/" source="CVE"/>
		<reference ref_id="CVE-2012-5598" ref_url="https://www.suse.com/security/cve/CVE-2012-5598/" source="CVE"/>
		<reference ref_id="CVE-2012-5599" ref_url="https://www.suse.com/security/cve/CVE-2012-5599/" source="CVE"/>
		<reference ref_id="CVE-2012-5600" ref_url="https://www.suse.com/security/cve/CVE-2012-5600/" source="CVE"/>
		<reference ref_id="CVE-2012-5601" ref_url="https://www.suse.com/security/cve/CVE-2012-5601/" source="CVE"/>
		<reference ref_id="CVE-2012-5602" ref_url="https://www.suse.com/security/cve/CVE-2012-5602/" source="CVE"/>
		<reference ref_id="CVE-2013-1572" ref_url="https://www.suse.com/security/cve/CVE-2013-1572/" source="CVE"/>
		<reference ref_id="CVE-2013-1573" ref_url="https://www.suse.com/security/cve/CVE-2013-1573/" source="CVE"/>
		<reference ref_id="CVE-2013-1574" ref_url="https://www.suse.com/security/cve/CVE-2013-1574/" source="CVE"/>
		<reference ref_id="CVE-2013-1575" ref_url="https://www.suse.com/security/cve/CVE-2013-1575/" source="CVE"/>
		<reference ref_id="CVE-2013-1576" ref_url="https://www.suse.com/security/cve/CVE-2013-1576/" source="CVE"/>
		<reference ref_id="CVE-2013-1577" ref_url="https://www.suse.com/security/cve/CVE-2013-1577/" source="CVE"/>
		<reference ref_id="CVE-2013-1578" ref_url="https://www.suse.com/security/cve/CVE-2013-1578/" source="CVE"/>
		<reference ref_id="CVE-2013-1579" ref_url="https://www.suse.com/security/cve/CVE-2013-1579/" source="CVE"/>
		<reference ref_id="CVE-2013-1580" ref_url="https://www.suse.com/security/cve/CVE-2013-1580/" source="CVE"/>
		<reference ref_id="CVE-2013-1581" ref_url="https://www.suse.com/security/cve/CVE-2013-1581/" source="CVE"/>
		<reference ref_id="CVE-2013-1582" ref_url="https://www.suse.com/security/cve/CVE-2013-1582/" source="CVE"/>
		<reference ref_id="CVE-2013-1583" ref_url="https://www.suse.com/security/cve/CVE-2013-1583/" source="CVE"/>
		<reference ref_id="CVE-2013-1584" ref_url="https://www.suse.com/security/cve/CVE-2013-1584/" source="CVE"/>
		<reference ref_id="CVE-2013-1585" ref_url="https://www.suse.com/security/cve/CVE-2013-1585/" source="CVE"/>
		<reference ref_id="CVE-2013-1586" ref_url="https://www.suse.com/security/cve/CVE-2013-1586/" source="CVE"/>
		<reference ref_id="CVE-2013-1587" ref_url="https://www.suse.com/security/cve/CVE-2013-1587/" source="CVE"/>
		<reference ref_id="CVE-2013-1588" ref_url="https://www.suse.com/security/cve/CVE-2013-1588/" source="CVE"/>
		<reference ref_id="CVE-2013-1589" ref_url="https://www.suse.com/security/cve/CVE-2013-1589/" source="CVE"/>
		<reference ref_id="CVE-2013-1590" ref_url="https://www.suse.com/security/cve/CVE-2013-1590/" source="CVE"/>
		<reference ref_id="CVE-2013-2475" ref_url="https://www.suse.com/security/cve/CVE-2013-2475/" source="CVE"/>
		<reference ref_id="CVE-2013-2476" ref_url="https://www.suse.com/security/cve/CVE-2013-2476/" source="CVE"/>
		<reference ref_id="CVE-2013-2477" ref_url="https://www.suse.com/security/cve/CVE-2013-2477/" source="CVE"/>
		<reference ref_id="CVE-2013-2478" ref_url="https://www.suse.com/security/cve/CVE-2013-2478/" source="CVE"/>
		<reference ref_id="CVE-2013-2479" ref_url="https://www.suse.com/security/cve/CVE-2013-2479/" source="CVE"/>
		<reference ref_id="CVE-2013-2480" ref_url="https://www.suse.com/security/cve/CVE-2013-2480/" source="CVE"/>
		<reference ref_id="CVE-2013-2481" ref_url="https://www.suse.com/security/cve/CVE-2013-2481/" source="CVE"/>
		<reference ref_id="CVE-2013-2482" ref_url="https://www.suse.com/security/cve/CVE-2013-2482/" source="CVE"/>
		<reference ref_id="CVE-2013-2483" ref_url="https://www.suse.com/security/cve/CVE-2013-2483/" source="CVE"/>
		<reference ref_id="CVE-2013-2484" ref_url="https://www.suse.com/security/cve/CVE-2013-2484/" source="CVE"/>
		<reference ref_id="CVE-2013-2485" ref_url="https://www.suse.com/security/cve/CVE-2013-2485/" source="CVE"/>
		<reference ref_id="CVE-2013-2486" ref_url="https://www.suse.com/security/cve/CVE-2013-2486/" source="CVE"/>
		<reference ref_id="CVE-2013-2487" ref_url="https://www.suse.com/security/cve/CVE-2013-2487/" source="CVE"/>
		<reference ref_id="CVE-2013-2488" ref_url="https://www.suse.com/security/cve/CVE-2013-2488/" source="CVE"/>
		<reference ref_id="CVE-2013-3555" ref_url="https://www.suse.com/security/cve/CVE-2013-3555/" source="CVE"/>
		<reference ref_id="CVE-2013-3556" ref_url="https://www.suse.com/security/cve/CVE-2013-3556/" source="CVE"/>
		<reference ref_id="CVE-2013-3557" ref_url="https://www.suse.com/security/cve/CVE-2013-3557/" source="CVE"/>
		<reference ref_id="CVE-2013-3558" ref_url="https://www.suse.com/security/cve/CVE-2013-3558/" source="CVE"/>
		<reference ref_id="CVE-2013-3559" ref_url="https://www.suse.com/security/cve/CVE-2013-3559/" source="CVE"/>
		<reference ref_id="CVE-2013-3560" ref_url="https://www.suse.com/security/cve/CVE-2013-3560/" source="CVE"/>
		<reference ref_id="CVE-2013-3561" ref_url="https://www.suse.com/security/cve/CVE-2013-3561/" source="CVE"/>
		<reference ref_id="CVE-2013-3562" ref_url="https://www.suse.com/security/cve/CVE-2013-3562/" source="CVE"/>
		<reference ref_id="CVE-2013-4083" ref_url="https://www.suse.com/security/cve/CVE-2013-4083/" source="CVE"/>
		<reference ref_id="CVE-2013-4920" ref_url="https://www.suse.com/security/cve/CVE-2013-4920/" source="CVE"/>
		<reference ref_id="CVE-2013-4921" ref_url="https://www.suse.com/security/cve/CVE-2013-4921/" source="CVE"/>
		<reference ref_id="CVE-2013-4922" ref_url="https://www.suse.com/security/cve/CVE-2013-4922/" source="CVE"/>
		<reference ref_id="CVE-2013-4923" ref_url="https://www.suse.com/security/cve/CVE-2013-4923/" source="CVE"/>
		<reference ref_id="CVE-2013-4924" ref_url="https://www.suse.com/security/cve/CVE-2013-4924/" source="CVE"/>
		<reference ref_id="CVE-2013-4925" ref_url="https://www.suse.com/security/cve/CVE-2013-4925/" source="CVE"/>
		<reference ref_id="CVE-2013-4926" ref_url="https://www.suse.com/security/cve/CVE-2013-4926/" source="CVE"/>
		<reference ref_id="CVE-2013-4927" ref_url="https://www.suse.com/security/cve/CVE-2013-4927/" source="CVE"/>
		<reference ref_id="CVE-2013-4928" ref_url="https://www.suse.com/security/cve/CVE-2013-4928/" source="CVE"/>
		<reference ref_id="CVE-2013-4929" ref_url="https://www.suse.com/security/cve/CVE-2013-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-4930" ref_url="https://www.suse.com/security/cve/CVE-2013-4930/" source="CVE"/>
		<reference ref_id="CVE-2013-4931" ref_url="https://www.suse.com/security/cve/CVE-2013-4931/" source="CVE"/>
		<reference ref_id="CVE-2013-4932" ref_url="https://www.suse.com/security/cve/CVE-2013-4932/" source="CVE"/>
		<reference ref_id="CVE-2013-4933" ref_url="https://www.suse.com/security/cve/CVE-2013-4933/" source="CVE"/>
		<reference ref_id="CVE-2013-4934" ref_url="https://www.suse.com/security/cve/CVE-2013-4934/" source="CVE"/>
		<reference ref_id="CVE-2013-4935" ref_url="https://www.suse.com/security/cve/CVE-2013-4935/" source="CVE"/>
		<reference ref_id="CVE-2013-4936" ref_url="https://www.suse.com/security/cve/CVE-2013-4936/" source="CVE"/>
		<reference ref_id="CVE-2013-5717" ref_url="https://www.suse.com/security/cve/CVE-2013-5717/" source="CVE"/>
		<reference ref_id="CVE-2013-5718" ref_url="https://www.suse.com/security/cve/CVE-2013-5718/" source="CVE"/>
		<reference ref_id="CVE-2013-5719" ref_url="https://www.suse.com/security/cve/CVE-2013-5719/" source="CVE"/>
		<reference ref_id="CVE-2013-5720" ref_url="https://www.suse.com/security/cve/CVE-2013-5720/" source="CVE"/>
		<reference ref_id="CVE-2013-5721" ref_url="https://www.suse.com/security/cve/CVE-2013-5721/" source="CVE"/>
		<reference ref_id="CVE-2013-5722" ref_url="https://www.suse.com/security/cve/CVE-2013-5722/" source="CVE"/>
		<reference ref_id="CVE-2013-6336" ref_url="https://www.suse.com/security/cve/CVE-2013-6336/" source="CVE"/>
		<reference ref_id="CVE-2013-6337" ref_url="https://www.suse.com/security/cve/CVE-2013-6337/" source="CVE"/>
		<reference ref_id="CVE-2013-6338" ref_url="https://www.suse.com/security/cve/CVE-2013-6338/" source="CVE"/>
		<reference ref_id="CVE-2013-6339" ref_url="https://www.suse.com/security/cve/CVE-2013-6339/" source="CVE"/>
		<reference ref_id="CVE-2013-6340" ref_url="https://www.suse.com/security/cve/CVE-2013-6340/" source="CVE"/>
		<reference ref_id="CVE-2013-7112" ref_url="https://www.suse.com/security/cve/CVE-2013-7112/" source="CVE"/>
		<reference ref_id="CVE-2013-7113" ref_url="https://www.suse.com/security/cve/CVE-2013-7113/" source="CVE"/>
		<reference ref_id="CVE-2013-7114" ref_url="https://www.suse.com/security/cve/CVE-2013-7114/" source="CVE"/>
		<reference ref_id="CVE-2014-2281" ref_url="https://www.suse.com/security/cve/CVE-2014-2281/" source="CVE"/>
		<reference ref_id="CVE-2014-2282" ref_url="https://www.suse.com/security/cve/CVE-2014-2282/" source="CVE"/>
		<reference ref_id="CVE-2014-2283" ref_url="https://www.suse.com/security/cve/CVE-2014-2283/" source="CVE"/>
		<reference ref_id="CVE-2014-2299" ref_url="https://www.suse.com/security/cve/CVE-2014-2299/" source="CVE"/>
		<reference ref_id="CVE-2014-2907" ref_url="https://www.suse.com/security/cve/CVE-2014-2907/" source="CVE"/>
		<reference ref_id="CVE-2014-4020" ref_url="https://www.suse.com/security/cve/CVE-2014-4020/" source="CVE"/>
		<reference ref_id="CVE-2014-5161" ref_url="https://www.suse.com/security/cve/CVE-2014-5161/" source="CVE"/>
		<reference ref_id="CVE-2014-5162" ref_url="https://www.suse.com/security/cve/CVE-2014-5162/" source="CVE"/>
		<reference ref_id="CVE-2014-5163" ref_url="https://www.suse.com/security/cve/CVE-2014-5163/" source="CVE"/>
		<reference ref_id="CVE-2014-5164" ref_url="https://www.suse.com/security/cve/CVE-2014-5164/" source="CVE"/>
		<reference ref_id="CVE-2014-5165" ref_url="https://www.suse.com/security/cve/CVE-2014-5165/" source="CVE"/>
		<description>
These are all security issues fixed in the wireshark-1.10.9-1.11 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1210/">CVE-2009-1210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1267/">CVE-2009-1267</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1268/">CVE-2009-1268</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1269/">CVE-2009-1269</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3241/">CVE-2009-3241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3242/">CVE-2009-3242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3243/">CVE-2009-3243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1455/">CVE-2010-1455</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2993/">CVE-2010-2993</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3445/">CVE-2010-3445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4300/">CVE-2010-4300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4301/">CVE-2010-4301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4538/">CVE-2010-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0024/">CVE-2011-0024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0538/">CVE-2011-0538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0713/">CVE-2011-0713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1138/">CVE-2011-1138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1139/">CVE-2011-1139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1140/">CVE-2011-1140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1143/">CVE-2011-1143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1590/">CVE-2011-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1591/">CVE-2011-1591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1592/">CVE-2011-1592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1957/">CVE-2011-1957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1958/">CVE-2011-1958</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1959/">CVE-2011-1959</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2174/">CVE-2011-2174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2175/">CVE-2011-2175</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2597/">CVE-2011-2597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2698/">CVE-2011-2698</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3266/">CVE-2011-3266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3360/">CVE-2011-3360</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3483/">CVE-2011-3483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2392/">CVE-2012-2392</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2393/">CVE-2012-2393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2394/">CVE-2012-2394</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3548/">CVE-2012-3548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4048/">CVE-2012-4048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4049/">CVE-2012-4049</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4285/">CVE-2012-4285</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-4286/">CVE-2012-4286</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4287/">CVE-2012-4287</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4288/">CVE-2012-4288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4289/">CVE-2012-4289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4290/">CVE-2012-4290</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4291/">CVE-2012-4291</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4292/">CVE-2012-4292</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4293/">CVE-2012-4293</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4294/">CVE-2012-4294</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4295/">CVE-2012-4295</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4296/">CVE-2012-4296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4297/">CVE-2012-4297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4298/">CVE-2012-4298</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5237/">CVE-2012-5237</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5238/">CVE-2012-5238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5239/">CVE-2012-5239</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5240/">CVE-2012-5240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5592/">CVE-2012-5592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5593/">CVE-2012-5593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5594/">CVE-2012-5594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5595/">CVE-2012-5595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5596/">CVE-2012-5596</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5597/">CVE-2012-5597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5598/">CVE-2012-5598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5599/">CVE-2012-5599</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5600/">CVE-2012-5600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5601/">CVE-2012-5601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5602/">CVE-2012-5602</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1572/">CVE-2013-1572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1573/">CVE-2013-1573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1574/">CVE-2013-1574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1575/">CVE-2013-1575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1576/">CVE-2013-1576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1577/">CVE-2013-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1578/">CVE-2013-1578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1579/">CVE-2013-1579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1580/">CVE-2013-1580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1581/">CVE-2013-1581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1582/">CVE-2013-1582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1583/">CVE-2013-1583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1584/">CVE-2013-1584</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1585/">CVE-2013-1585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1586/">CVE-2013-1586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1587/">CVE-2013-1587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1588/">CVE-2013-1588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1589/">CVE-2013-1589</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1590/">CVE-2013-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2475/">CVE-2013-2475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2476/">CVE-2013-2476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2477/">CVE-2013-2477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2478/">CVE-2013-2478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2479/">CVE-2013-2479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2480/">CVE-2013-2480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2481/">CVE-2013-2481</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2482/">CVE-2013-2482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2483/">CVE-2013-2483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2484/">CVE-2013-2484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2485/">CVE-2013-2485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2486/">CVE-2013-2486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2487/">CVE-2013-2487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2488/">CVE-2013-2488</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3555/">CVE-2013-3555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3556/">CVE-2013-3556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3557/">CVE-2013-3557</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3558/">CVE-2013-3558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3559/">CVE-2013-3559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3560/">CVE-2013-3560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3561/">CVE-2013-3561</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3562/">CVE-2013-3562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4083/">CVE-2013-4083</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4920/">CVE-2013-4920</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4921/">CVE-2013-4921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4922/">CVE-2013-4922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4923/">CVE-2013-4923</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4924/">CVE-2013-4924</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4925/">CVE-2013-4925</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4926/">CVE-2013-4926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4927/">CVE-2013-4927</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4928/">CVE-2013-4928</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4929/">CVE-2013-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4930/">CVE-2013-4930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4931/">CVE-2013-4931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4932/">CVE-2013-4932</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4933/">CVE-2013-4933</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4934/">CVE-2013-4934</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4935/">CVE-2013-4935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4936/">CVE-2013-4936</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5717/">CVE-2013-5717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5718/">CVE-2013-5718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5719/">CVE-2013-5719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5720/">CVE-2013-5720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5721/">CVE-2013-5721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5722/">CVE-2013-5722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6336/">CVE-2013-6336</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6337/">CVE-2013-6337</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6338/">CVE-2013-6338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6339/">CVE-2013-6339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6340/">CVE-2013-6340</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7112/">CVE-2013-7112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7113/">CVE-2013-7113</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7114/">CVE-2013-7114</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2281/">CVE-2014-2281</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2282/">CVE-2014-2282</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2283/">CVE-2014-2283</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2299/">CVE-2014-2299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2907/">CVE-2014-2907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4020/">CVE-2014-4020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5161/">CVE-2014-5161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5162/">CVE-2014-5162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5163/">CVE-2014-5163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5164/">CVE-2014-5164</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5165/">CVE-2014-5165</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141827" comment="wireshark-1.10.9-1.11 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75896" version="1" class="patch">
	<metadata>
		<title>xalan-j2-2.7.0-264.133 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2014-0107" ref_url="https://www.suse.com/security/cve/CVE-2014-0107/" source="CVE"/>
		<description>
These are all security issues fixed in the xalan-j2-2.7.0-264.133 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0107/">CVE-2014-0107</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141828" comment="xalan-j2-2.7.0-264.133 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75897" version="1" class="patch">
	<metadata>
		<title>xen-4.4.1_06-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-1898" ref_url="https://www.suse.com/security/cve/CVE-2011-1898/" source="CVE"/>
		<reference ref_id="CVE-2012-0029" ref_url="https://www.suse.com/security/cve/CVE-2012-0029/" source="CVE"/>
		<reference ref_id="CVE-2012-0217" ref_url="https://www.suse.com/security/cve/CVE-2012-0217/" source="CVE"/>
		<reference ref_id="CVE-2012-2625" ref_url="https://www.suse.com/security/cve/CVE-2012-2625/" source="CVE"/>
		<reference ref_id="CVE-2012-3432" ref_url="https://www.suse.com/security/cve/CVE-2012-3432/" source="CVE"/>
		<reference ref_id="CVE-2012-3433" ref_url="https://www.suse.com/security/cve/CVE-2012-3433/" source="CVE"/>
		<reference ref_id="CVE-2012-4411" ref_url="https://www.suse.com/security/cve/CVE-2012-4411/" source="CVE"/>
		<reference ref_id="CVE-2012-4535" ref_url="https://www.suse.com/security/cve/CVE-2012-4535/" source="CVE"/>
		<reference ref_id="CVE-2012-4536" ref_url="https://www.suse.com/security/cve/CVE-2012-4536/" source="CVE"/>
		<reference ref_id="CVE-2012-4537" ref_url="https://www.suse.com/security/cve/CVE-2012-4537/" source="CVE"/>
		<reference ref_id="CVE-2012-4538" ref_url="https://www.suse.com/security/cve/CVE-2012-4538/" source="CVE"/>
		<reference ref_id="CVE-2012-4539" ref_url="https://www.suse.com/security/cve/CVE-2012-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-4544" ref_url="https://www.suse.com/security/cve/CVE-2012-4544/" source="CVE"/>
		<reference ref_id="CVE-2012-5510" ref_url="https://www.suse.com/security/cve/CVE-2012-5510/" source="CVE"/>
		<reference ref_id="CVE-2012-5511" ref_url="https://www.suse.com/security/cve/CVE-2012-5511/" source="CVE"/>
		<reference ref_id="CVE-2012-5513" ref_url="https://www.suse.com/security/cve/CVE-2012-5513/" source="CVE"/>
		<reference ref_id="CVE-2012-5514" ref_url="https://www.suse.com/security/cve/CVE-2012-5514/" source="CVE"/>
		<reference ref_id="CVE-2012-5515" ref_url="https://www.suse.com/security/cve/CVE-2012-5515/" source="CVE"/>
		<reference ref_id="CVE-2012-5525" ref_url="https://www.suse.com/security/cve/CVE-2012-5525/" source="CVE"/>
		<reference ref_id="CVE-2012-5634" ref_url="https://www.suse.com/security/cve/CVE-2012-5634/" source="CVE"/>
		<reference ref_id="CVE-2012-6075" ref_url="https://www.suse.com/security/cve/CVE-2012-6075/" source="CVE"/>
		<reference ref_id="CVE-2013-0151" ref_url="https://www.suse.com/security/cve/CVE-2013-0151/" source="CVE"/>
		<reference ref_id="CVE-2013-0152" ref_url="https://www.suse.com/security/cve/CVE-2013-0152/" source="CVE"/>
		<reference ref_id="CVE-2013-0153" ref_url="https://www.suse.com/security/cve/CVE-2013-0153/" source="CVE"/>
		<reference ref_id="CVE-2013-1442" ref_url="https://www.suse.com/security/cve/CVE-2013-1442/" source="CVE"/>
		<reference ref_id="CVE-2013-1917" ref_url="https://www.suse.com/security/cve/CVE-2013-1917/" source="CVE"/>
		<reference ref_id="CVE-2013-1918" ref_url="https://www.suse.com/security/cve/CVE-2013-1918/" source="CVE"/>
		<reference ref_id="CVE-2013-1919" ref_url="https://www.suse.com/security/cve/CVE-2013-1919/" source="CVE"/>
		<reference ref_id="CVE-2013-1922" ref_url="https://www.suse.com/security/cve/CVE-2013-1922/" source="CVE"/>
		<reference ref_id="CVE-2013-1952" ref_url="https://www.suse.com/security/cve/CVE-2013-1952/" source="CVE"/>
		<reference ref_id="CVE-2013-2007" ref_url="https://www.suse.com/security/cve/CVE-2013-2007/" source="CVE"/>
		<reference ref_id="CVE-2013-3495" ref_url="https://www.suse.com/security/cve/CVE-2013-3495/" source="CVE"/>
		<reference ref_id="CVE-2013-4355" ref_url="https://www.suse.com/security/cve/CVE-2013-4355/" source="CVE"/>
		<reference ref_id="CVE-2013-4356" ref_url="https://www.suse.com/security/cve/CVE-2013-4356/" source="CVE"/>
		<reference ref_id="CVE-2013-4361" ref_url="https://www.suse.com/security/cve/CVE-2013-4361/" source="CVE"/>
		<reference ref_id="CVE-2013-4375" ref_url="https://www.suse.com/security/cve/CVE-2013-4375/" source="CVE"/>
		<reference ref_id="CVE-2013-4416" ref_url="https://www.suse.com/security/cve/CVE-2013-4416/" source="CVE"/>
		<reference ref_id="CVE-2013-4494" ref_url="https://www.suse.com/security/cve/CVE-2013-4494/" source="CVE"/>
		<reference ref_id="CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540/" source="CVE"/>
		<reference ref_id="CVE-2013-4551" ref_url="https://www.suse.com/security/cve/CVE-2013-4551/" source="CVE"/>
		<reference ref_id="CVE-2013-4553" ref_url="https://www.suse.com/security/cve/CVE-2013-4553/" source="CVE"/>
		<reference ref_id="CVE-2013-4554" ref_url="https://www.suse.com/security/cve/CVE-2013-4554/" source="CVE"/>
		<reference ref_id="CVE-2014-3124" ref_url="https://www.suse.com/security/cve/CVE-2014-3124/" source="CVE"/>
		<reference ref_id="CVE-2014-6268" ref_url="https://www.suse.com/security/cve/CVE-2014-6268/" source="CVE"/>
		<reference ref_id="CVE-2014-7154" ref_url="https://www.suse.com/security/cve/CVE-2014-7154/" source="CVE"/>
		<reference ref_id="CVE-2014-7155" ref_url="https://www.suse.com/security/cve/CVE-2014-7155/" source="CVE"/>
		<reference ref_id="CVE-2014-7156" ref_url="https://www.suse.com/security/cve/CVE-2014-7156/" source="CVE"/>
		<reference ref_id="CVE-2014-7188" ref_url="https://www.suse.com/security/cve/CVE-2014-7188/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.4.1_06-2.2 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1898/">CVE-2011-1898</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0029/">CVE-2012-0029</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0217/">CVE-2012-0217</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2625/">CVE-2012-2625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3432/">CVE-2012-3432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3433/">CVE-2012-3433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4411/">CVE-2012-4411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4535/">CVE-2012-4535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4536/">CVE-2012-4536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4537/">CVE-2012-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4538/">CVE-2012-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4539/">CVE-2012-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4544/">CVE-2012-4544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5510/">CVE-2012-5510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5511/">CVE-2012-5511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5513/">CVE-2012-5513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5514/">CVE-2012-5514</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5515/">CVE-2012-5515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5525/">CVE-2012-5525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5634/">CVE-2012-5634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6075/">CVE-2012-6075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0151/">CVE-2013-0151</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0152/">CVE-2013-0152</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0153/">CVE-2013-0153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1442/">CVE-2013-1442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1917/">CVE-2013-1917</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1918/">CVE-2013-1918</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1919/">CVE-2013-1919</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1922/">CVE-2013-1922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1952/">CVE-2013-1952</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2007/">CVE-2013-2007</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3495/">CVE-2013-3495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4355/">CVE-2013-4355</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4356/">CVE-2013-4356</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4361/">CVE-2013-4361</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4375/">CVE-2013-4375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4416/">CVE-2013-4416</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4494/">CVE-2013-4494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4551/">CVE-2013-4551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4553/">CVE-2013-4553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4554/">CVE-2013-4554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3124/">CVE-2014-3124</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6268/">CVE-2014-6268</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7154/">CVE-2014-7154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7155/">CVE-2014-7155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7156/">CVE-2014-7156</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7188/">CVE-2014-7188</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141829" comment="xen-4.4.1_06-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141830" comment="xen-kmp-default-4.4.1_06_k3.12.28_4-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141831" comment="xen-libs-4.4.1_06-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141832" comment="xen-libs-32bit-4.4.1_06-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75898" version="1" class="patch">
	<metadata>
		<title>xf86-video-intel-2.99.914-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2014-4910" ref_url="https://www.suse.com/security/cve/CVE-2014-4910/" source="CVE"/>
		<description>
These are all security issues fixed in the xf86-video-intel-2.99.914-4.1 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4910/">CVE-2014-4910</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141833" comment="xf86-video-intel-2.99.914-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75899" version="1" class="patch">
	<metadata>
		<title>xinetd-2.3.15-7.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2012-0862" ref_url="https://www.suse.com/security/cve/CVE-2012-0862/" source="CVE"/>
		<reference ref_id="CVE-2013-4342" ref_url="https://www.suse.com/security/cve/CVE-2013-4342/" source="CVE"/>
		<description>
These are all security issues fixed in the xinetd-2.3.15-7.7 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0862/">CVE-2012-0862</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4342/">CVE-2013-4342</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141167" comment="xinetd-2.3.15-7.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75900" version="1" class="patch">
	<metadata>
		<title>xlockmore-5.43-5.33 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2013-4143" ref_url="https://www.suse.com/security/cve/CVE-2013-4143/" source="CVE"/>
		<description>
These are all security issues fixed in the xlockmore-5.43-5.33 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4143/">CVE-2013-4143</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141168" comment="xlockmore-5.43-5.33 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75901" version="1" class="patch">
	<metadata>
		<title>xorg-x11-7.6_1-14.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-0465" ref_url="https://www.suse.com/security/cve/CVE-2011-0465/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-7.6_1-14.17 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0465/">CVE-2011-0465</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141834" comment="xorg-x11-7.6_1-14.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141835" comment="xorg-x11-essentials-7.6_1-14.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141171" comment="xrdb-1.1.0-3.58 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75902" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libs-7.6-45.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libs-7.6-45.14 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141836" comment="xorg-x11-libs-7.6-45.14 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75903" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-7.6_1.15.2-12.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2010-2240" ref_url="https://www.suse.com/security/cve/CVE-2010-2240/" source="CVE"/>
		<reference ref_id="CVE-2013-1940" ref_url="https://www.suse.com/security/cve/CVE-2013-1940/" source="CVE"/>
		<reference ref_id="CVE-2013-4396" ref_url="https://www.suse.com/security/cve/CVE-2013-4396/" source="CVE"/>
		<reference ref_id="CVE-2013-6424" ref_url="https://www.suse.com/security/cve/CVE-2013-6424/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-7.6_1.15.2-12.17 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2240/">CVE-2010-2240</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-1940/">CVE-2013-1940</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4396/">CVE-2013-4396</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6424/">CVE-2013-6424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141837" comment="xorg-x11-server-7.6_1.15.2-12.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141838" comment="xorg-x11-server-extra-7.6_1.15.2-12.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75904" version="1" class="patch">
	<metadata>
		<title>yast2-3.1.108-1.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-3177" ref_url="https://www.suse.com/security/cve/CVE-2011-3177/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-3.1.108-1.16 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3177/">CVE-2011-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141839" comment="yast2-3.1.108-1.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75905" version="1" class="patch">
	<metadata>
		<title>yast2-core-3.1.11-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<reference ref_id="CVE-2011-3177" ref_url="https://www.suse.com/security/cve/CVE-2011-3177/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-core-3.1.11-1.9 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3177/">CVE-2011-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141840" comment="yast2-core-3.1.11-1.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75906" version="1" class="patch">
	<metadata>
		<title>zoo-2.10-1020.62 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="CVE-2006-0855" ref_url="https://www.suse.com/security/cve/CVE-2006-0855/" source="CVE"/>
		<reference ref_id="CVE-2007-1669" ref_url="https://www.suse.com/security/cve/CVE-2007-1669/" source="CVE"/>
		<description>
These are all security issues fixed in the zoo-2.10-1020.62 package on the GA media of SUSE Linux Enterprise Desktop 12.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-0855/">CVE-2006-0855</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1669/">CVE-2007-1669</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512004" comment="zoo-2.10-1020.62 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75907" version="1" class="patch">
	<metadata>
		<title>DirectFB-1.7.1-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-2977" ref_url="https://www.suse.com/security/cve/CVE-2014-2977/" source="CVE"/>
		<reference ref_id="CVE-2014-2978" ref_url="https://www.suse.com/security/cve/CVE-2014-2978/" source="CVE"/>
		<description>
These are all security issues fixed in the DirectFB-1.7.1-4.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-2977/">CVE-2014-2977</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-2978/">CVE-2014-2978</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109224" comment="DirectFB-1.7.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109231" comment="lib++dfb-1_7-1-1.7.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109233" comment="libdirectfb-1_7-1-1.7.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109234" comment="libdirectfb-1_7-1-32bit-1.7.1-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75908" version="1" class="patch">
	<metadata>
		<title>ImageMagick-6.8.8.1-8.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2012-0247" ref_url="https://www.suse.com/security/cve/CVE-2012-0247/" source="CVE"/>
		<reference ref_id="CVE-2012-0248" ref_url="https://www.suse.com/security/cve/CVE-2012-0248/" source="CVE"/>
		<reference ref_id="CVE-2012-1185" ref_url="https://www.suse.com/security/cve/CVE-2012-1185/" source="CVE"/>
		<reference ref_id="CVE-2012-1186" ref_url="https://www.suse.com/security/cve/CVE-2012-1186/" source="CVE"/>
		<reference ref_id="CVE-2014-8354" ref_url="https://www.suse.com/security/cve/CVE-2014-8354/" source="CVE"/>
		<reference ref_id="CVE-2014-8355" ref_url="https://www.suse.com/security/cve/CVE-2014-8355/" source="CVE"/>
		<reference ref_id="CVE-2014-8562" ref_url="https://www.suse.com/security/cve/CVE-2014-8562/" source="CVE"/>
		<reference ref_id="CVE-2014-8716" ref_url="https://www.suse.com/security/cve/CVE-2014-8716/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-6.8.8.1-8.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0247/">CVE-2012-0247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0248/">CVE-2012-0248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1185/">CVE-2012-1185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1186/">CVE-2012-1186</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8354/">CVE-2014-8354</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8355/">CVE-2014-8355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8562/">CVE-2014-8562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8716/">CVE-2014-8716</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009102628" comment="ImageMagick-6.8.8.1-8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102634" comment="libMagick++-6_Q16-3-6.8.8.1-8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102638" comment="libMagickCore-6_Q16-1-6.8.8.1-8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102637" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102640" comment="libMagickWand-6_Q16-1-6.8.8.1-8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75909" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-38.4.0esr-51.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-5913" ref_url="https://www.suse.com/security/cve/CVE-2008-5913/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-0652" ref_url="https://www.suse.com/security/cve/CVE-2009-0652/" source="CVE"/>
		<reference ref_id="CVE-2009-0771" ref_url="https://www.suse.com/security/cve/CVE-2009-0771/" source="CVE"/>
		<reference ref_id="CVE-2009-0772" ref_url="https://www.suse.com/security/cve/CVE-2009-0772/" source="CVE"/>
		<reference ref_id="CVE-2009-0773" ref_url="https://www.suse.com/security/cve/CVE-2009-0773/" source="CVE"/>
		<reference ref_id="CVE-2009-0774" ref_url="https://www.suse.com/security/cve/CVE-2009-0774/" source="CVE"/>
		<reference ref_id="CVE-2009-0775" ref_url="https://www.suse.com/security/cve/CVE-2009-0775/" source="CVE"/>
		<reference ref_id="CVE-2009-0776" ref_url="https://www.suse.com/security/cve/CVE-2009-0776/" source="CVE"/>
		<reference ref_id="CVE-2009-0777" ref_url="https://www.suse.com/security/cve/CVE-2009-0777/" source="CVE"/>
		<reference ref_id="CVE-2009-1044" ref_url="https://www.suse.com/security/cve/CVE-2009-1044/" source="CVE"/>
		<reference ref_id="CVE-2009-1169" ref_url="https://www.suse.com/security/cve/CVE-2009-1169/" source="CVE"/>
		<reference ref_id="CVE-2009-1302" ref_url="https://www.suse.com/security/cve/CVE-2009-1302/" source="CVE"/>
		<reference ref_id="CVE-2009-1303" ref_url="https://www.suse.com/security/cve/CVE-2009-1303/" source="CVE"/>
		<reference ref_id="CVE-2009-1304" ref_url="https://www.suse.com/security/cve/CVE-2009-1304/" source="CVE"/>
		<reference ref_id="CVE-2009-1305" ref_url="https://www.suse.com/security/cve/CVE-2009-1305/" source="CVE"/>
		<reference ref_id="CVE-2009-1306" ref_url="https://www.suse.com/security/cve/CVE-2009-1306/" source="CVE"/>
		<reference ref_id="CVE-2009-1307" ref_url="https://www.suse.com/security/cve/CVE-2009-1307/" source="CVE"/>
		<reference ref_id="CVE-2009-1308" ref_url="https://www.suse.com/security/cve/CVE-2009-1308/" source="CVE"/>
		<reference ref_id="CVE-2009-1309" ref_url="https://www.suse.com/security/cve/CVE-2009-1309/" source="CVE"/>
		<reference ref_id="CVE-2009-1310" ref_url="https://www.suse.com/security/cve/CVE-2009-1310/" source="CVE"/>
		<reference ref_id="CVE-2009-1311" ref_url="https://www.suse.com/security/cve/CVE-2009-1311/" source="CVE"/>
		<reference ref_id="CVE-2009-1312" ref_url="https://www.suse.com/security/cve/CVE-2009-1312/" source="CVE"/>
		<reference ref_id="CVE-2009-1313" ref_url="https://www.suse.com/security/cve/CVE-2009-1313/" source="CVE"/>
		<reference ref_id="CVE-2009-1563" ref_url="https://www.suse.com/security/cve/CVE-2009-1563/" source="CVE"/>
		<reference ref_id="CVE-2009-2470" ref_url="https://www.suse.com/security/cve/CVE-2009-2470/" source="CVE"/>
		<reference ref_id="CVE-2009-2654" ref_url="https://www.suse.com/security/cve/CVE-2009-2654/" source="CVE"/>
		<reference ref_id="CVE-2009-3069" ref_url="https://www.suse.com/security/cve/CVE-2009-3069/" source="CVE"/>
		<reference ref_id="CVE-2009-3070" ref_url="https://www.suse.com/security/cve/CVE-2009-3070/" source="CVE"/>
		<reference ref_id="CVE-2009-3071" ref_url="https://www.suse.com/security/cve/CVE-2009-3071/" source="CVE"/>
		<reference ref_id="CVE-2009-3072" ref_url="https://www.suse.com/security/cve/CVE-2009-3072/" source="CVE"/>
		<reference ref_id="CVE-2009-3073" ref_url="https://www.suse.com/security/cve/CVE-2009-3073/" source="CVE"/>
		<reference ref_id="CVE-2009-3074" ref_url="https://www.suse.com/security/cve/CVE-2009-3074/" source="CVE"/>
		<reference ref_id="CVE-2009-3075" ref_url="https://www.suse.com/security/cve/CVE-2009-3075/" source="CVE"/>
		<reference ref_id="CVE-2009-3077" ref_url="https://www.suse.com/security/cve/CVE-2009-3077/" source="CVE"/>
		<reference ref_id="CVE-2009-3078" ref_url="https://www.suse.com/security/cve/CVE-2009-3078/" source="CVE"/>
		<reference ref_id="CVE-2009-3079" ref_url="https://www.suse.com/security/cve/CVE-2009-3079/" source="CVE"/>
		<reference ref_id="CVE-2009-3274" ref_url="https://www.suse.com/security/cve/CVE-2009-3274/" source="CVE"/>
		<reference ref_id="CVE-2009-3370" ref_url="https://www.suse.com/security/cve/CVE-2009-3370/" source="CVE"/>
		<reference ref_id="CVE-2009-3371" ref_url="https://www.suse.com/security/cve/CVE-2009-3371/" source="CVE"/>
		<reference ref_id="CVE-2009-3372" ref_url="https://www.suse.com/security/cve/CVE-2009-3372/" source="CVE"/>
		<reference ref_id="CVE-2009-3373" ref_url="https://www.suse.com/security/cve/CVE-2009-3373/" source="CVE"/>
		<reference ref_id="CVE-2009-3374" ref_url="https://www.suse.com/security/cve/CVE-2009-3374/" source="CVE"/>
		<reference ref_id="CVE-2009-3375" ref_url="https://www.suse.com/security/cve/CVE-2009-3375/" source="CVE"/>
		<reference ref_id="CVE-2009-3376" ref_url="https://www.suse.com/security/cve/CVE-2009-3376/" source="CVE"/>
		<reference ref_id="CVE-2009-3377" ref_url="https://www.suse.com/security/cve/CVE-2009-3377/" source="CVE"/>
		<reference ref_id="CVE-2009-3378" ref_url="https://www.suse.com/security/cve/CVE-2009-3378/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2009-3380" ref_url="https://www.suse.com/security/cve/CVE-2009-3380/" source="CVE"/>
		<reference ref_id="CVE-2009-3381" ref_url="https://www.suse.com/security/cve/CVE-2009-3381/" source="CVE"/>
		<reference ref_id="CVE-2009-3383" ref_url="https://www.suse.com/security/cve/CVE-2009-3383/" source="CVE"/>
		<reference ref_id="CVE-2009-3388" ref_url="https://www.suse.com/security/cve/CVE-2009-3388/" source="CVE"/>
		<reference ref_id="CVE-2009-3389" ref_url="https://www.suse.com/security/cve/CVE-2009-3389/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-3979" ref_url="https://www.suse.com/security/cve/CVE-2009-3979/" source="CVE"/>
		<reference ref_id="CVE-2009-3980" ref_url="https://www.suse.com/security/cve/CVE-2009-3980/" source="CVE"/>
		<reference ref_id="CVE-2009-3982" ref_url="https://www.suse.com/security/cve/CVE-2009-3982/" source="CVE"/>
		<reference ref_id="CVE-2009-3983" ref_url="https://www.suse.com/security/cve/CVE-2009-3983/" source="CVE"/>
		<reference ref_id="CVE-2009-3984" ref_url="https://www.suse.com/security/cve/CVE-2009-3984/" source="CVE"/>
		<reference ref_id="CVE-2009-3985" ref_url="https://www.suse.com/security/cve/CVE-2009-3985/" source="CVE"/>
		<reference ref_id="CVE-2010-0164" ref_url="https://www.suse.com/security/cve/CVE-2010-0164/" source="CVE"/>
		<reference ref_id="CVE-2010-0165" ref_url="https://www.suse.com/security/cve/CVE-2010-0165/" source="CVE"/>
		<reference ref_id="CVE-2010-0166" ref_url="https://www.suse.com/security/cve/CVE-2010-0166/" source="CVE"/>
		<reference ref_id="CVE-2010-0167" ref_url="https://www.suse.com/security/cve/CVE-2010-0167/" source="CVE"/>
		<reference ref_id="CVE-2010-0168" ref_url="https://www.suse.com/security/cve/CVE-2010-0168/" source="CVE"/>
		<reference ref_id="CVE-2010-0169" ref_url="https://www.suse.com/security/cve/CVE-2010-0169/" source="CVE"/>
		<reference ref_id="CVE-2010-0170" ref_url="https://www.suse.com/security/cve/CVE-2010-0170/" source="CVE"/>
		<reference ref_id="CVE-2010-0171" ref_url="https://www.suse.com/security/cve/CVE-2010-0171/" source="CVE"/>
		<reference ref_id="CVE-2010-0172" ref_url="https://www.suse.com/security/cve/CVE-2010-0172/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181/" source="CVE"/>
		<reference ref_id="CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182/" source="CVE"/>
		<reference ref_id="CVE-2010-0654" ref_url="https://www.suse.com/security/cve/CVE-2010-0654/" source="CVE"/>
		<reference ref_id="CVE-2010-1028" ref_url="https://www.suse.com/security/cve/CVE-2010-1028/" source="CVE"/>
		<reference ref_id="CVE-2010-1121" ref_url="https://www.suse.com/security/cve/CVE-2010-1121/" source="CVE"/>
		<reference ref_id="CVE-2010-1125" ref_url="https://www.suse.com/security/cve/CVE-2010-1125/" source="CVE"/>
		<reference ref_id="CVE-2010-1196" ref_url="https://www.suse.com/security/cve/CVE-2010-1196/" source="CVE"/>
		<reference ref_id="CVE-2010-1197" ref_url="https://www.suse.com/security/cve/CVE-2010-1197/" source="CVE"/>
		<reference ref_id="CVE-2010-1198" ref_url="https://www.suse.com/security/cve/CVE-2010-1198/" source="CVE"/>
		<reference ref_id="CVE-2010-1199" ref_url="https://www.suse.com/security/cve/CVE-2010-1199/" source="CVE"/>
		<reference ref_id="CVE-2010-1200" ref_url="https://www.suse.com/security/cve/CVE-2010-1200/" source="CVE"/>
		<reference ref_id="CVE-2010-1201" ref_url="https://www.suse.com/security/cve/CVE-2010-1201/" source="CVE"/>
		<reference ref_id="CVE-2010-1202" ref_url="https://www.suse.com/security/cve/CVE-2010-1202/" source="CVE"/>
		<reference ref_id="CVE-2010-1203" ref_url="https://www.suse.com/security/cve/CVE-2010-1203/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-1206" ref_url="https://www.suse.com/security/cve/CVE-2010-1206/" source="CVE"/>
		<reference ref_id="CVE-2010-1207" ref_url="https://www.suse.com/security/cve/CVE-2010-1207/" source="CVE"/>
		<reference ref_id="CVE-2010-1208" ref_url="https://www.suse.com/security/cve/CVE-2010-1208/" source="CVE"/>
		<reference ref_id="CVE-2010-1209" ref_url="https://www.suse.com/security/cve/CVE-2010-1209/" source="CVE"/>
		<reference ref_id="CVE-2010-1210" ref_url="https://www.suse.com/security/cve/CVE-2010-1210/" source="CVE"/>
		<reference ref_id="CVE-2010-1211" ref_url="https://www.suse.com/security/cve/CVE-2010-1211/" source="CVE"/>
		<reference ref_id="CVE-2010-1212" ref_url="https://www.suse.com/security/cve/CVE-2010-1212/" source="CVE"/>
		<reference ref_id="CVE-2010-1213" ref_url="https://www.suse.com/security/cve/CVE-2010-1213/" source="CVE"/>
		<reference ref_id="CVE-2010-1214" ref_url="https://www.suse.com/security/cve/CVE-2010-1214/" source="CVE"/>
		<reference ref_id="CVE-2010-1215" ref_url="https://www.suse.com/security/cve/CVE-2010-1215/" source="CVE"/>
		<reference ref_id="CVE-2010-2751" ref_url="https://www.suse.com/security/cve/CVE-2010-2751/" source="CVE"/>
		<reference ref_id="CVE-2010-2752" ref_url="https://www.suse.com/security/cve/CVE-2010-2752/" source="CVE"/>
		<reference ref_id="CVE-2010-2753" ref_url="https://www.suse.com/security/cve/CVE-2010-2753/" source="CVE"/>
		<reference ref_id="CVE-2010-2754" ref_url="https://www.suse.com/security/cve/CVE-2010-2754/" source="CVE"/>
		<reference ref_id="CVE-2010-2755" ref_url="https://www.suse.com/security/cve/CVE-2010-2755/" source="CVE"/>
		<reference ref_id="CVE-2010-2760" ref_url="https://www.suse.com/security/cve/CVE-2010-2760/" source="CVE"/>
		<reference ref_id="CVE-2010-2762" ref_url="https://www.suse.com/security/cve/CVE-2010-2762/" source="CVE"/>
		<reference ref_id="CVE-2010-2764" ref_url="https://www.suse.com/security/cve/CVE-2010-2764/" source="CVE"/>
		<reference ref_id="CVE-2010-2765" ref_url="https://www.suse.com/security/cve/CVE-2010-2765/" source="CVE"/>
		<reference ref_id="CVE-2010-2766" ref_url="https://www.suse.com/security/cve/CVE-2010-2766/" source="CVE"/>
		<reference ref_id="CVE-2010-2767" ref_url="https://www.suse.com/security/cve/CVE-2010-2767/" source="CVE"/>
		<reference ref_id="CVE-2010-2768" ref_url="https://www.suse.com/security/cve/CVE-2010-2768/" source="CVE"/>
		<reference ref_id="CVE-2010-2769" ref_url="https://www.suse.com/security/cve/CVE-2010-2769/" source="CVE"/>
		<reference ref_id="CVE-2010-3166" ref_url="https://www.suse.com/security/cve/CVE-2010-3166/" source="CVE"/>
		<reference ref_id="CVE-2010-3167" ref_url="https://www.suse.com/security/cve/CVE-2010-3167/" source="CVE"/>
		<reference ref_id="CVE-2010-3168" ref_url="https://www.suse.com/security/cve/CVE-2010-3168/" source="CVE"/>
		<reference ref_id="CVE-2010-3169" ref_url="https://www.suse.com/security/cve/CVE-2010-3169/" source="CVE"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2010-3173" ref_url="https://www.suse.com/security/cve/CVE-2010-3173/" source="CVE"/>
		<reference ref_id="CVE-2010-3174" ref_url="https://www.suse.com/security/cve/CVE-2010-3174/" source="CVE"/>
		<reference ref_id="CVE-2010-3175" ref_url="https://www.suse.com/security/cve/CVE-2010-3175/" source="CVE"/>
		<reference ref_id="CVE-2010-3176" ref_url="https://www.suse.com/security/cve/CVE-2010-3176/" source="CVE"/>
		<reference ref_id="CVE-2010-3177" ref_url="https://www.suse.com/security/cve/CVE-2010-3177/" source="CVE"/>
		<reference ref_id="CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178/" source="CVE"/>
		<reference ref_id="CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179/" source="CVE"/>
		<reference ref_id="CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180/" source="CVE"/>
		<reference ref_id="CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182/" source="CVE"/>
		<reference ref_id="CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183/" source="CVE"/>
		<reference ref_id="CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765/" source="CVE"/>
		<reference ref_id="CVE-2011-0068" ref_url="https://www.suse.com/security/cve/CVE-2011-0068/" source="CVE"/>
		<reference ref_id="CVE-2011-0069" ref_url="https://www.suse.com/security/cve/CVE-2011-0069/" source="CVE"/>
		<reference ref_id="CVE-2011-0070" ref_url="https://www.suse.com/security/cve/CVE-2011-0070/" source="CVE"/>
		<reference ref_id="CVE-2011-0079" ref_url="https://www.suse.com/security/cve/CVE-2011-0079/" source="CVE"/>
		<reference ref_id="CVE-2011-0080" ref_url="https://www.suse.com/security/cve/CVE-2011-0080/" source="CVE"/>
		<reference ref_id="CVE-2011-0081" ref_url="https://www.suse.com/security/cve/CVE-2011-0081/" source="CVE"/>
		<reference ref_id="CVE-2011-0084" ref_url="https://www.suse.com/security/cve/CVE-2011-0084/" source="CVE"/>
		<reference ref_id="CVE-2011-1187" ref_url="https://www.suse.com/security/cve/CVE-2011-1187/" source="CVE"/>
		<reference ref_id="CVE-2011-1202" ref_url="https://www.suse.com/security/cve/CVE-2011-1202/" source="CVE"/>
		<reference ref_id="CVE-2011-2366" ref_url="https://www.suse.com/security/cve/CVE-2011-2366/" source="CVE"/>
		<reference ref_id="CVE-2011-2367" ref_url="https://www.suse.com/security/cve/CVE-2011-2367/" source="CVE"/>
		<reference ref_id="CVE-2011-2368" ref_url="https://www.suse.com/security/cve/CVE-2011-2368/" source="CVE"/>
		<reference ref_id="CVE-2011-2369" ref_url="https://www.suse.com/security/cve/CVE-2011-2369/" source="CVE"/>
		<reference ref_id="CVE-2011-2370" ref_url="https://www.suse.com/security/cve/CVE-2011-2370/" source="CVE"/>
		<reference ref_id="CVE-2011-2371" ref_url="https://www.suse.com/security/cve/CVE-2011-2371/" source="CVE"/>
		<reference ref_id="CVE-2011-2372" ref_url="https://www.suse.com/security/cve/CVE-2011-2372/" source="CVE"/>
		<reference ref_id="CVE-2011-2373" ref_url="https://www.suse.com/security/cve/CVE-2011-2373/" source="CVE"/>
		<reference ref_id="CVE-2011-2374" ref_url="https://www.suse.com/security/cve/CVE-2011-2374/" source="CVE"/>
		<reference ref_id="CVE-2011-2375" ref_url="https://www.suse.com/security/cve/CVE-2011-2375/" source="CVE"/>
		<reference ref_id="CVE-2011-2377" ref_url="https://www.suse.com/security/cve/CVE-2011-2377/" source="CVE"/>
		<reference ref_id="CVE-2011-2985" ref_url="https://www.suse.com/security/cve/CVE-2011-2985/" source="CVE"/>
		<reference ref_id="CVE-2011-2986" ref_url="https://www.suse.com/security/cve/CVE-2011-2986/" source="CVE"/>
		<reference ref_id="CVE-2011-2988" ref_url="https://www.suse.com/security/cve/CVE-2011-2988/" source="CVE"/>
		<reference ref_id="CVE-2011-2989" ref_url="https://www.suse.com/security/cve/CVE-2011-2989/" source="CVE"/>
		<reference ref_id="CVE-2011-2990" ref_url="https://www.suse.com/security/cve/CVE-2011-2990/" source="CVE"/>
		<reference ref_id="CVE-2011-2991" ref_url="https://www.suse.com/security/cve/CVE-2011-2991/" source="CVE"/>
		<reference ref_id="CVE-2011-2992" ref_url="https://www.suse.com/security/cve/CVE-2011-2992/" source="CVE"/>
		<reference ref_id="CVE-2011-2993" ref_url="https://www.suse.com/security/cve/CVE-2011-2993/" source="CVE"/>
		<reference ref_id="CVE-2011-2995" ref_url="https://www.suse.com/security/cve/CVE-2011-2995/" source="CVE"/>
		<reference ref_id="CVE-2011-2996" ref_url="https://www.suse.com/security/cve/CVE-2011-2996/" source="CVE"/>
		<reference ref_id="CVE-2011-2997" ref_url="https://www.suse.com/security/cve/CVE-2011-2997/" source="CVE"/>
		<reference ref_id="CVE-2011-3000" ref_url="https://www.suse.com/security/cve/CVE-2011-3000/" source="CVE"/>
		<reference ref_id="CVE-2011-3001" ref_url="https://www.suse.com/security/cve/CVE-2011-3001/" source="CVE"/>
		<reference ref_id="CVE-2011-3002" ref_url="https://www.suse.com/security/cve/CVE-2011-3002/" source="CVE"/>
		<reference ref_id="CVE-2011-3003" ref_url="https://www.suse.com/security/cve/CVE-2011-3003/" source="CVE"/>
		<reference ref_id="CVE-2011-3004" ref_url="https://www.suse.com/security/cve/CVE-2011-3004/" source="CVE"/>
		<reference ref_id="CVE-2011-3005" ref_url="https://www.suse.com/security/cve/CVE-2011-3005/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3062" ref_url="https://www.suse.com/security/cve/CVE-2011-3062/" source="CVE"/>
		<reference ref_id="CVE-2011-3101" ref_url="https://www.suse.com/security/cve/CVE-2011-3101/" source="CVE"/>
		<reference ref_id="CVE-2011-3232" ref_url="https://www.suse.com/security/cve/CVE-2011-3232/" source="CVE"/>
		<reference ref_id="CVE-2011-3648" ref_url="https://www.suse.com/security/cve/CVE-2011-3648/" source="CVE"/>
		<reference ref_id="CVE-2011-3650" ref_url="https://www.suse.com/security/cve/CVE-2011-3650/" source="CVE"/>
		<reference ref_id="CVE-2011-3651" ref_url="https://www.suse.com/security/cve/CVE-2011-3651/" source="CVE"/>
		<reference ref_id="CVE-2011-3652" ref_url="https://www.suse.com/security/cve/CVE-2011-3652/" source="CVE"/>
		<reference ref_id="CVE-2011-3654" ref_url="https://www.suse.com/security/cve/CVE-2011-3654/" source="CVE"/>
		<reference ref_id="CVE-2011-3655" ref_url="https://www.suse.com/security/cve/CVE-2011-3655/" source="CVE"/>
		<reference ref_id="CVE-2011-3658" ref_url="https://www.suse.com/security/cve/CVE-2011-3658/" source="CVE"/>
		<reference ref_id="CVE-2011-3659" ref_url="https://www.suse.com/security/cve/CVE-2011-3659/" source="CVE"/>
		<reference ref_id="CVE-2011-3660" ref_url="https://www.suse.com/security/cve/CVE-2011-3660/" source="CVE"/>
		<reference ref_id="CVE-2011-3661" ref_url="https://www.suse.com/security/cve/CVE-2011-3661/" source="CVE"/>
		<reference ref_id="CVE-2011-3663" ref_url="https://www.suse.com/security/cve/CVE-2011-3663/" source="CVE"/>
		<reference ref_id="CVE-2012-0441" ref_url="https://www.suse.com/security/cve/CVE-2012-0441/" source="CVE"/>
		<reference ref_id="CVE-2012-0442" ref_url="https://www.suse.com/security/cve/CVE-2012-0442/" source="CVE"/>
		<reference ref_id="CVE-2012-0443" ref_url="https://www.suse.com/security/cve/CVE-2012-0443/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<reference ref_id="CVE-2012-0445" ref_url="https://www.suse.com/security/cve/CVE-2012-0445/" source="CVE"/>
		<reference ref_id="CVE-2012-0446" ref_url="https://www.suse.com/security/cve/CVE-2012-0446/" source="CVE"/>
		<reference ref_id="CVE-2012-0447" ref_url="https://www.suse.com/security/cve/CVE-2012-0447/" source="CVE"/>
		<reference ref_id="CVE-2012-0449" ref_url="https://www.suse.com/security/cve/CVE-2012-0449/" source="CVE"/>
		<reference ref_id="CVE-2012-0451" ref_url="https://www.suse.com/security/cve/CVE-2012-0451/" source="CVE"/>
		<reference ref_id="CVE-2012-0452" ref_url="https://www.suse.com/security/cve/CVE-2012-0452/" source="CVE"/>
		<reference ref_id="CVE-2012-0455" ref_url="https://www.suse.com/security/cve/CVE-2012-0455/" source="CVE"/>
		<reference ref_id="CVE-2012-0456" ref_url="https://www.suse.com/security/cve/CVE-2012-0456/" source="CVE"/>
		<reference ref_id="CVE-2012-0457" ref_url="https://www.suse.com/security/cve/CVE-2012-0457/" source="CVE"/>
		<reference ref_id="CVE-2012-0458" ref_url="https://www.suse.com/security/cve/CVE-2012-0458/" source="CVE"/>
		<reference ref_id="CVE-2012-0459" ref_url="https://www.suse.com/security/cve/CVE-2012-0459/" source="CVE"/>
		<reference ref_id="CVE-2012-0460" ref_url="https://www.suse.com/security/cve/CVE-2012-0460/" source="CVE"/>
		<reference ref_id="CVE-2012-0461" ref_url="https://www.suse.com/security/cve/CVE-2012-0461/" source="CVE"/>
		<reference ref_id="CVE-2012-0462" ref_url="https://www.suse.com/security/cve/CVE-2012-0462/" source="CVE"/>
		<reference ref_id="CVE-2012-0463" ref_url="https://www.suse.com/security/cve/CVE-2012-0463/" source="CVE"/>
		<reference ref_id="CVE-2012-0464" ref_url="https://www.suse.com/security/cve/CVE-2012-0464/" source="CVE"/>
		<reference ref_id="CVE-2012-0467" ref_url="https://www.suse.com/security/cve/CVE-2012-0467/" source="CVE"/>
		<reference ref_id="CVE-2012-0468" ref_url="https://www.suse.com/security/cve/CVE-2012-0468/" source="CVE"/>
		<reference ref_id="CVE-2012-0469" ref_url="https://www.suse.com/security/cve/CVE-2012-0469/" source="CVE"/>
		<reference ref_id="CVE-2012-0470" ref_url="https://www.suse.com/security/cve/CVE-2012-0470/" source="CVE"/>
		<reference ref_id="CVE-2012-0471" ref_url="https://www.suse.com/security/cve/CVE-2012-0471/" source="CVE"/>
		<reference ref_id="CVE-2012-0472" ref_url="https://www.suse.com/security/cve/CVE-2012-0472/" source="CVE"/>
		<reference ref_id="CVE-2012-0473" ref_url="https://www.suse.com/security/cve/CVE-2012-0473/" source="CVE"/>
		<reference ref_id="CVE-2012-0474" ref_url="https://www.suse.com/security/cve/CVE-2012-0474/" source="CVE"/>
		<reference ref_id="CVE-2012-0475" ref_url="https://www.suse.com/security/cve/CVE-2012-0475/" source="CVE"/>
		<reference ref_id="CVE-2012-0477" ref_url="https://www.suse.com/security/cve/CVE-2012-0477/" source="CVE"/>
		<reference ref_id="CVE-2012-0478" ref_url="https://www.suse.com/security/cve/CVE-2012-0478/" source="CVE"/>
		<reference ref_id="CVE-2012-0479" ref_url="https://www.suse.com/security/cve/CVE-2012-0479/" source="CVE"/>
		<reference ref_id="CVE-2012-0759" ref_url="https://www.suse.com/security/cve/CVE-2012-0759/" source="CVE"/>
		<reference ref_id="CVE-2012-1937" ref_url="https://www.suse.com/security/cve/CVE-2012-1937/" source="CVE"/>
		<reference ref_id="CVE-2012-1938" ref_url="https://www.suse.com/security/cve/CVE-2012-1938/" source="CVE"/>
		<reference ref_id="CVE-2012-1940" ref_url="https://www.suse.com/security/cve/CVE-2012-1940/" source="CVE"/>
		<reference ref_id="CVE-2012-1941" ref_url="https://www.suse.com/security/cve/CVE-2012-1941/" source="CVE"/>
		<reference ref_id="CVE-2012-1944" ref_url="https://www.suse.com/security/cve/CVE-2012-1944/" source="CVE"/>
		<reference ref_id="CVE-2012-1945" ref_url="https://www.suse.com/security/cve/CVE-2012-1945/" source="CVE"/>
		<reference ref_id="CVE-2012-1946" ref_url="https://www.suse.com/security/cve/CVE-2012-1946/" source="CVE"/>
		<reference ref_id="CVE-2012-1947" ref_url="https://www.suse.com/security/cve/CVE-2012-1947/" source="CVE"/>
		<reference ref_id="CVE-2012-1948" ref_url="https://www.suse.com/security/cve/CVE-2012-1948/" source="CVE"/>
		<reference ref_id="CVE-2012-1949" ref_url="https://www.suse.com/security/cve/CVE-2012-1949/" source="CVE"/>
		<reference ref_id="CVE-2012-1950" ref_url="https://www.suse.com/security/cve/CVE-2012-1950/" source="CVE"/>
		<reference ref_id="CVE-2012-1951" ref_url="https://www.suse.com/security/cve/CVE-2012-1951/" source="CVE"/>
		<reference ref_id="CVE-2012-1952" ref_url="https://www.suse.com/security/cve/CVE-2012-1952/" source="CVE"/>
		<reference ref_id="CVE-2012-1953" ref_url="https://www.suse.com/security/cve/CVE-2012-1953/" source="CVE"/>
		<reference ref_id="CVE-2012-1954" ref_url="https://www.suse.com/security/cve/CVE-2012-1954/" source="CVE"/>
		<reference ref_id="CVE-2012-1955" ref_url="https://www.suse.com/security/cve/CVE-2012-1955/" source="CVE"/>
		<reference ref_id="CVE-2012-1956" ref_url="https://www.suse.com/security/cve/CVE-2012-1956/" source="CVE"/>
		<reference ref_id="CVE-2012-1957" ref_url="https://www.suse.com/security/cve/CVE-2012-1957/" source="CVE"/>
		<reference ref_id="CVE-2012-1958" ref_url="https://www.suse.com/security/cve/CVE-2012-1958/" source="CVE"/>
		<reference ref_id="CVE-2012-1959" ref_url="https://www.suse.com/security/cve/CVE-2012-1959/" source="CVE"/>
		<reference ref_id="CVE-2012-1960" ref_url="https://www.suse.com/security/cve/CVE-2012-1960/" source="CVE"/>
		<reference ref_id="CVE-2012-1961" ref_url="https://www.suse.com/security/cve/CVE-2012-1961/" source="CVE"/>
		<reference ref_id="CVE-2012-1962" ref_url="https://www.suse.com/security/cve/CVE-2012-1962/" source="CVE"/>
		<reference ref_id="CVE-2012-1963" ref_url="https://www.suse.com/security/cve/CVE-2012-1963/" source="CVE"/>
		<reference ref_id="CVE-2012-1965" ref_url="https://www.suse.com/security/cve/CVE-2012-1965/" source="CVE"/>
		<reference ref_id="CVE-2012-1966" ref_url="https://www.suse.com/security/cve/CVE-2012-1966/" source="CVE"/>
		<reference ref_id="CVE-2012-1967" ref_url="https://www.suse.com/security/cve/CVE-2012-1967/" source="CVE"/>
		<reference ref_id="CVE-2012-1970" ref_url="https://www.suse.com/security/cve/CVE-2012-1970/" source="CVE"/>
		<reference ref_id="CVE-2012-1972" ref_url="https://www.suse.com/security/cve/CVE-2012-1972/" source="CVE"/>
		<reference ref_id="CVE-2012-1973" ref_url="https://www.suse.com/security/cve/CVE-2012-1973/" source="CVE"/>
		<reference ref_id="CVE-2012-1974" ref_url="https://www.suse.com/security/cve/CVE-2012-1974/" source="CVE"/>
		<reference ref_id="CVE-2012-1975" ref_url="https://www.suse.com/security/cve/CVE-2012-1975/" source="CVE"/>
		<reference ref_id="CVE-2012-1976" ref_url="https://www.suse.com/security/cve/CVE-2012-1976/" source="CVE"/>
		<reference ref_id="CVE-2012-3956" ref_url="https://www.suse.com/security/cve/CVE-2012-3956/" source="CVE"/>
		<reference ref_id="CVE-2012-3957" ref_url="https://www.suse.com/security/cve/CVE-2012-3957/" source="CVE"/>
		<reference ref_id="CVE-2012-3958" ref_url="https://www.suse.com/security/cve/CVE-2012-3958/" source="CVE"/>
		<reference ref_id="CVE-2012-3959" ref_url="https://www.suse.com/security/cve/CVE-2012-3959/" source="CVE"/>
		<reference ref_id="CVE-2012-3960" ref_url="https://www.suse.com/security/cve/CVE-2012-3960/" source="CVE"/>
		<reference ref_id="CVE-2012-3961" ref_url="https://www.suse.com/security/cve/CVE-2012-3961/" source="CVE"/>
		<reference ref_id="CVE-2012-3962" ref_url="https://www.suse.com/security/cve/CVE-2012-3962/" source="CVE"/>
		<reference ref_id="CVE-2012-3963" ref_url="https://www.suse.com/security/cve/CVE-2012-3963/" source="CVE"/>
		<reference ref_id="CVE-2012-3964" ref_url="https://www.suse.com/security/cve/CVE-2012-3964/" source="CVE"/>
		<reference ref_id="CVE-2012-3965" ref_url="https://www.suse.com/security/cve/CVE-2012-3965/" source="CVE"/>
		<reference ref_id="CVE-2012-3966" ref_url="https://www.suse.com/security/cve/CVE-2012-3966/" source="CVE"/>
		<reference ref_id="CVE-2012-3967" ref_url="https://www.suse.com/security/cve/CVE-2012-3967/" source="CVE"/>
		<reference ref_id="CVE-2012-3968" ref_url="https://www.suse.com/security/cve/CVE-2012-3968/" source="CVE"/>
		<reference ref_id="CVE-2012-3969" ref_url="https://www.suse.com/security/cve/CVE-2012-3969/" source="CVE"/>
		<reference ref_id="CVE-2012-3970" ref_url="https://www.suse.com/security/cve/CVE-2012-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-3971" ref_url="https://www.suse.com/security/cve/CVE-2012-3971/" source="CVE"/>
		<reference ref_id="CVE-2012-3972" ref_url="https://www.suse.com/security/cve/CVE-2012-3972/" source="CVE"/>
		<reference ref_id="CVE-2012-3973" ref_url="https://www.suse.com/security/cve/CVE-2012-3973/" source="CVE"/>
		<reference ref_id="CVE-2012-3975" ref_url="https://www.suse.com/security/cve/CVE-2012-3975/" source="CVE"/>
		<reference ref_id="CVE-2012-3976" ref_url="https://www.suse.com/security/cve/CVE-2012-3976/" source="CVE"/>
		<reference ref_id="CVE-2012-3978" ref_url="https://www.suse.com/security/cve/CVE-2012-3978/" source="CVE"/>
		<reference ref_id="CVE-2012-3980" ref_url="https://www.suse.com/security/cve/CVE-2012-3980/" source="CVE"/>
		<reference ref_id="CVE-2012-3982" ref_url="https://www.suse.com/security/cve/CVE-2012-3982/" source="CVE"/>
		<reference ref_id="CVE-2012-3983" ref_url="https://www.suse.com/security/cve/CVE-2012-3983/" source="CVE"/>
		<reference ref_id="CVE-2012-3984" ref_url="https://www.suse.com/security/cve/CVE-2012-3984/" source="CVE"/>
		<reference ref_id="CVE-2012-3985" ref_url="https://www.suse.com/security/cve/CVE-2012-3985/" source="CVE"/>
		<reference ref_id="CVE-2012-3986" ref_url="https://www.suse.com/security/cve/CVE-2012-3986/" source="CVE"/>
		<reference ref_id="CVE-2012-3988" ref_url="https://www.suse.com/security/cve/CVE-2012-3988/" source="CVE"/>
		<reference ref_id="CVE-2012-3989" ref_url="https://www.suse.com/security/cve/CVE-2012-3989/" source="CVE"/>
		<reference ref_id="CVE-2012-3990" ref_url="https://www.suse.com/security/cve/CVE-2012-3990/" source="CVE"/>
		<reference ref_id="CVE-2012-3991" ref_url="https://www.suse.com/security/cve/CVE-2012-3991/" source="CVE"/>
		<reference ref_id="CVE-2012-3992" ref_url="https://www.suse.com/security/cve/CVE-2012-3992/" source="CVE"/>
		<reference ref_id="CVE-2012-3993" ref_url="https://www.suse.com/security/cve/CVE-2012-3993/" source="CVE"/>
		<reference ref_id="CVE-2012-3994" ref_url="https://www.suse.com/security/cve/CVE-2012-3994/" source="CVE"/>
		<reference ref_id="CVE-2012-3995" ref_url="https://www.suse.com/security/cve/CVE-2012-3995/" source="CVE"/>
		<reference ref_id="CVE-2012-4179" ref_url="https://www.suse.com/security/cve/CVE-2012-4179/" source="CVE"/>
		<reference ref_id="CVE-2012-4180" ref_url="https://www.suse.com/security/cve/CVE-2012-4180/" source="CVE"/>
		<reference ref_id="CVE-2012-4181" ref_url="https://www.suse.com/security/cve/CVE-2012-4181/" source="CVE"/>
		<reference ref_id="CVE-2012-4182" ref_url="https://www.suse.com/security/cve/CVE-2012-4182/" source="CVE"/>
		<reference ref_id="CVE-2012-4183" ref_url="https://www.suse.com/security/cve/CVE-2012-4183/" source="CVE"/>
		<reference ref_id="CVE-2012-4184" ref_url="https://www.suse.com/security/cve/CVE-2012-4184/" source="CVE"/>
		<reference ref_id="CVE-2012-4185" ref_url="https://www.suse.com/security/cve/CVE-2012-4185/" source="CVE"/>
		<reference ref_id="CVE-2012-4186" ref_url="https://www.suse.com/security/cve/CVE-2012-4186/" source="CVE"/>
		<reference ref_id="CVE-2012-4187" ref_url="https://www.suse.com/security/cve/CVE-2012-4187/" source="CVE"/>
		<reference ref_id="CVE-2012-4188" ref_url="https://www.suse.com/security/cve/CVE-2012-4188/" source="CVE"/>
		<reference ref_id="CVE-2012-4191" ref_url="https://www.suse.com/security/cve/CVE-2012-4191/" source="CVE"/>
		<reference ref_id="CVE-2012-4192" ref_url="https://www.suse.com/security/cve/CVE-2012-4192/" source="CVE"/>
		<reference ref_id="CVE-2012-4193" ref_url="https://www.suse.com/security/cve/CVE-2012-4193/" source="CVE"/>
		<reference ref_id="CVE-2012-4194" ref_url="https://www.suse.com/security/cve/CVE-2012-4194/" source="CVE"/>
		<reference ref_id="CVE-2012-4195" ref_url="https://www.suse.com/security/cve/CVE-2012-4195/" source="CVE"/>
		<reference ref_id="CVE-2012-4196" ref_url="https://www.suse.com/security/cve/CVE-2012-4196/" source="CVE"/>
		<reference ref_id="CVE-2012-4201" ref_url="https://www.suse.com/security/cve/CVE-2012-4201/" source="CVE"/>
		<reference ref_id="CVE-2012-4202" ref_url="https://www.suse.com/security/cve/CVE-2012-4202/" source="CVE"/>
		<reference ref_id="CVE-2012-4203" ref_url="https://www.suse.com/security/cve/CVE-2012-4203/" source="CVE"/>
		<reference ref_id="CVE-2012-4204" ref_url="https://www.suse.com/security/cve/CVE-2012-4204/" source="CVE"/>
		<reference ref_id="CVE-2012-4205" ref_url="https://www.suse.com/security/cve/CVE-2012-4205/" source="CVE"/>
		<reference ref_id="CVE-2012-4207" ref_url="https://www.suse.com/security/cve/CVE-2012-4207/" source="CVE"/>
		<reference ref_id="CVE-2012-4208" ref_url="https://www.suse.com/security/cve/CVE-2012-4208/" source="CVE"/>
		<reference ref_id="CVE-2012-4209" ref_url="https://www.suse.com/security/cve/CVE-2012-4209/" source="CVE"/>
		<reference ref_id="CVE-2012-4210" ref_url="https://www.suse.com/security/cve/CVE-2012-4210/" source="CVE"/>
		<reference ref_id="CVE-2012-4212" ref_url="https://www.suse.com/security/cve/CVE-2012-4212/" source="CVE"/>
		<reference ref_id="CVE-2012-4213" ref_url="https://www.suse.com/security/cve/CVE-2012-4213/" source="CVE"/>
		<reference ref_id="CVE-2012-4214" ref_url="https://www.suse.com/security/cve/CVE-2012-4214/" source="CVE"/>
		<reference ref_id="CVE-2012-4215" ref_url="https://www.suse.com/security/cve/CVE-2012-4215/" source="CVE"/>
		<reference ref_id="CVE-2012-4216" ref_url="https://www.suse.com/security/cve/CVE-2012-4216/" source="CVE"/>
		<reference ref_id="CVE-2012-4217" ref_url="https://www.suse.com/security/cve/CVE-2012-4217/" source="CVE"/>
		<reference ref_id="CVE-2012-4218" ref_url="https://www.suse.com/security/cve/CVE-2012-4218/" source="CVE"/>
		<reference ref_id="CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829/" source="CVE"/>
		<reference ref_id="CVE-2012-5830" ref_url="https://www.suse.com/security/cve/CVE-2012-5830/" source="CVE"/>
		<reference ref_id="CVE-2012-5833" ref_url="https://www.suse.com/security/cve/CVE-2012-5833/" source="CVE"/>
		<reference ref_id="CVE-2012-5835" ref_url="https://www.suse.com/security/cve/CVE-2012-5835/" source="CVE"/>
		<reference ref_id="CVE-2012-5836" ref_url="https://www.suse.com/security/cve/CVE-2012-5836/" source="CVE"/>
		<reference ref_id="CVE-2012-5837" ref_url="https://www.suse.com/security/cve/CVE-2012-5837/" source="CVE"/>
		<reference ref_id="CVE-2012-5838" ref_url="https://www.suse.com/security/cve/CVE-2012-5838/" source="CVE"/>
		<reference ref_id="CVE-2012-5839" ref_url="https://www.suse.com/security/cve/CVE-2012-5839/" source="CVE"/>
		<reference ref_id="CVE-2012-5840" ref_url="https://www.suse.com/security/cve/CVE-2012-5840/" source="CVE"/>
		<reference ref_id="CVE-2012-5841" ref_url="https://www.suse.com/security/cve/CVE-2012-5841/" source="CVE"/>
		<reference ref_id="CVE-2012-5842" ref_url="https://www.suse.com/security/cve/CVE-2012-5842/" source="CVE"/>
		<reference ref_id="CVE-2012-5843" ref_url="https://www.suse.com/security/cve/CVE-2012-5843/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<reference ref_id="CVE-2013-0744" ref_url="https://www.suse.com/security/cve/CVE-2013-0744/" source="CVE"/>
		<reference ref_id="CVE-2013-0745" ref_url="https://www.suse.com/security/cve/CVE-2013-0745/" source="CVE"/>
		<reference ref_id="CVE-2013-0746" ref_url="https://www.suse.com/security/cve/CVE-2013-0746/" source="CVE"/>
		<reference ref_id="CVE-2013-0747" ref_url="https://www.suse.com/security/cve/CVE-2013-0747/" source="CVE"/>
		<reference ref_id="CVE-2013-0748" ref_url="https://www.suse.com/security/cve/CVE-2013-0748/" source="CVE"/>
		<reference ref_id="CVE-2013-0749" ref_url="https://www.suse.com/security/cve/CVE-2013-0749/" source="CVE"/>
		<reference ref_id="CVE-2013-0750" ref_url="https://www.suse.com/security/cve/CVE-2013-0750/" source="CVE"/>
		<reference ref_id="CVE-2013-0751" ref_url="https://www.suse.com/security/cve/CVE-2013-0751/" source="CVE"/>
		<reference ref_id="CVE-2013-0752" ref_url="https://www.suse.com/security/cve/CVE-2013-0752/" source="CVE"/>
		<reference ref_id="CVE-2013-0753" ref_url="https://www.suse.com/security/cve/CVE-2013-0753/" source="CVE"/>
		<reference ref_id="CVE-2013-0754" ref_url="https://www.suse.com/security/cve/CVE-2013-0754/" source="CVE"/>
		<reference ref_id="CVE-2013-0755" ref_url="https://www.suse.com/security/cve/CVE-2013-0755/" source="CVE"/>
		<reference ref_id="CVE-2013-0756" ref_url="https://www.suse.com/security/cve/CVE-2013-0756/" source="CVE"/>
		<reference ref_id="CVE-2013-0757" ref_url="https://www.suse.com/security/cve/CVE-2013-0757/" source="CVE"/>
		<reference ref_id="CVE-2013-0758" ref_url="https://www.suse.com/security/cve/CVE-2013-0758/" source="CVE"/>
		<reference ref_id="CVE-2013-0760" ref_url="https://www.suse.com/security/cve/CVE-2013-0760/" source="CVE"/>
		<reference ref_id="CVE-2013-0761" ref_url="https://www.suse.com/security/cve/CVE-2013-0761/" source="CVE"/>
		<reference ref_id="CVE-2013-0762" ref_url="https://www.suse.com/security/cve/CVE-2013-0762/" source="CVE"/>
		<reference ref_id="CVE-2013-0763" ref_url="https://www.suse.com/security/cve/CVE-2013-0763/" source="CVE"/>
		<reference ref_id="CVE-2013-0764" ref_url="https://www.suse.com/security/cve/CVE-2013-0764/" source="CVE"/>
		<reference ref_id="CVE-2013-0765" ref_url="https://www.suse.com/security/cve/CVE-2013-0765/" source="CVE"/>
		<reference ref_id="CVE-2013-0766" ref_url="https://www.suse.com/security/cve/CVE-2013-0766/" source="CVE"/>
		<reference ref_id="CVE-2013-0767" ref_url="https://www.suse.com/security/cve/CVE-2013-0767/" source="CVE"/>
		<reference ref_id="CVE-2013-0768" ref_url="https://www.suse.com/security/cve/CVE-2013-0768/" source="CVE"/>
		<reference ref_id="CVE-2013-0769" ref_url="https://www.suse.com/security/cve/CVE-2013-0769/" source="CVE"/>
		<reference ref_id="CVE-2013-0770" ref_url="https://www.suse.com/security/cve/CVE-2013-0770/" source="CVE"/>
		<reference ref_id="CVE-2013-0771" ref_url="https://www.suse.com/security/cve/CVE-2013-0771/" source="CVE"/>
		<reference ref_id="CVE-2013-0772" ref_url="https://www.suse.com/security/cve/CVE-2013-0772/" source="CVE"/>
		<reference ref_id="CVE-2013-0773" ref_url="https://www.suse.com/security/cve/CVE-2013-0773/" source="CVE"/>
		<reference ref_id="CVE-2013-0774" ref_url="https://www.suse.com/security/cve/CVE-2013-0774/" source="CVE"/>
		<reference ref_id="CVE-2013-0775" ref_url="https://www.suse.com/security/cve/CVE-2013-0775/" source="CVE"/>
		<reference ref_id="CVE-2013-0776" ref_url="https://www.suse.com/security/cve/CVE-2013-0776/" source="CVE"/>
		<reference ref_id="CVE-2013-0777" ref_url="https://www.suse.com/security/cve/CVE-2013-0777/" source="CVE"/>
		<reference ref_id="CVE-2013-0778" ref_url="https://www.suse.com/security/cve/CVE-2013-0778/" source="CVE"/>
		<reference ref_id="CVE-2013-0779" ref_url="https://www.suse.com/security/cve/CVE-2013-0779/" source="CVE"/>
		<reference ref_id="CVE-2013-0780" ref_url="https://www.suse.com/security/cve/CVE-2013-0780/" source="CVE"/>
		<reference ref_id="CVE-2013-0781" ref_url="https://www.suse.com/security/cve/CVE-2013-0781/" source="CVE"/>
		<reference ref_id="CVE-2013-0782" ref_url="https://www.suse.com/security/cve/CVE-2013-0782/" source="CVE"/>
		<reference ref_id="CVE-2013-0783" ref_url="https://www.suse.com/security/cve/CVE-2013-0783/" source="CVE"/>
		<reference ref_id="CVE-2013-0787" ref_url="https://www.suse.com/security/cve/CVE-2013-0787/" source="CVE"/>
		<reference ref_id="CVE-2013-0788" ref_url="https://www.suse.com/security/cve/CVE-2013-0788/" source="CVE"/>
		<reference ref_id="CVE-2013-0789" ref_url="https://www.suse.com/security/cve/CVE-2013-0789/" source="CVE"/>
		<reference ref_id="CVE-2013-0792" ref_url="https://www.suse.com/security/cve/CVE-2013-0792/" source="CVE"/>
		<reference ref_id="CVE-2013-0793" ref_url="https://www.suse.com/security/cve/CVE-2013-0793/" source="CVE"/>
		<reference ref_id="CVE-2013-0794" ref_url="https://www.suse.com/security/cve/CVE-2013-0794/" source="CVE"/>
		<reference ref_id="CVE-2013-0795" ref_url="https://www.suse.com/security/cve/CVE-2013-0795/" source="CVE"/>
		<reference ref_id="CVE-2013-0796" ref_url="https://www.suse.com/security/cve/CVE-2013-0796/" source="CVE"/>
		<reference ref_id="CVE-2013-0800" ref_url="https://www.suse.com/security/cve/CVE-2013-0800/" source="CVE"/>
		<reference ref_id="CVE-2013-0801" ref_url="https://www.suse.com/security/cve/CVE-2013-0801/" source="CVE"/>
		<reference ref_id="CVE-2013-1669" ref_url="https://www.suse.com/security/cve/CVE-2013-1669/" source="CVE"/>
		<reference ref_id="CVE-2013-1670" ref_url="https://www.suse.com/security/cve/CVE-2013-1670/" source="CVE"/>
		<reference ref_id="CVE-2013-1671" ref_url="https://www.suse.com/security/cve/CVE-2013-1671/" source="CVE"/>
		<reference ref_id="CVE-2013-1674" ref_url="https://www.suse.com/security/cve/CVE-2013-1674/" source="CVE"/>
		<reference ref_id="CVE-2013-1675" ref_url="https://www.suse.com/security/cve/CVE-2013-1675/" source="CVE"/>
		<reference ref_id="CVE-2013-1676" ref_url="https://www.suse.com/security/cve/CVE-2013-1676/" source="CVE"/>
		<reference ref_id="CVE-2013-1677" ref_url="https://www.suse.com/security/cve/CVE-2013-1677/" source="CVE"/>
		<reference ref_id="CVE-2013-1678" ref_url="https://www.suse.com/security/cve/CVE-2013-1678/" source="CVE"/>
		<reference ref_id="CVE-2013-1679" ref_url="https://www.suse.com/security/cve/CVE-2013-1679/" source="CVE"/>
		<reference ref_id="CVE-2013-1680" ref_url="https://www.suse.com/security/cve/CVE-2013-1680/" source="CVE"/>
		<reference ref_id="CVE-2013-1681" ref_url="https://www.suse.com/security/cve/CVE-2013-1681/" source="CVE"/>
		<reference ref_id="CVE-2013-1682" ref_url="https://www.suse.com/security/cve/CVE-2013-1682/" source="CVE"/>
		<reference ref_id="CVE-2013-1683" ref_url="https://www.suse.com/security/cve/CVE-2013-1683/" source="CVE"/>
		<reference ref_id="CVE-2013-1684" ref_url="https://www.suse.com/security/cve/CVE-2013-1684/" source="CVE"/>
		<reference ref_id="CVE-2013-1685" ref_url="https://www.suse.com/security/cve/CVE-2013-1685/" source="CVE"/>
		<reference ref_id="CVE-2013-1686" ref_url="https://www.suse.com/security/cve/CVE-2013-1686/" source="CVE"/>
		<reference ref_id="CVE-2013-1687" ref_url="https://www.suse.com/security/cve/CVE-2013-1687/" source="CVE"/>
		<reference ref_id="CVE-2013-1688" ref_url="https://www.suse.com/security/cve/CVE-2013-1688/" source="CVE"/>
		<reference ref_id="CVE-2013-1690" ref_url="https://www.suse.com/security/cve/CVE-2013-1690/" source="CVE"/>
		<reference ref_id="CVE-2013-1692" ref_url="https://www.suse.com/security/cve/CVE-2013-1692/" source="CVE"/>
		<reference ref_id="CVE-2013-1693" ref_url="https://www.suse.com/security/cve/CVE-2013-1693/" source="CVE"/>
		<reference ref_id="CVE-2013-1694" ref_url="https://www.suse.com/security/cve/CVE-2013-1694/" source="CVE"/>
		<reference ref_id="CVE-2013-1695" ref_url="https://www.suse.com/security/cve/CVE-2013-1695/" source="CVE"/>
		<reference ref_id="CVE-2013-1696" ref_url="https://www.suse.com/security/cve/CVE-2013-1696/" source="CVE"/>
		<reference ref_id="CVE-2013-1697" ref_url="https://www.suse.com/security/cve/CVE-2013-1697/" source="CVE"/>
		<reference ref_id="CVE-2013-1698" ref_url="https://www.suse.com/security/cve/CVE-2013-1698/" source="CVE"/>
		<reference ref_id="CVE-2013-1699" ref_url="https://www.suse.com/security/cve/CVE-2013-1699/" source="CVE"/>
		<reference ref_id="CVE-2013-1701" ref_url="https://www.suse.com/security/cve/CVE-2013-1701/" source="CVE"/>
		<reference ref_id="CVE-2013-1702" ref_url="https://www.suse.com/security/cve/CVE-2013-1702/" source="CVE"/>
		<reference ref_id="CVE-2013-1704" ref_url="https://www.suse.com/security/cve/CVE-2013-1704/" source="CVE"/>
		<reference ref_id="CVE-2013-1705" ref_url="https://www.suse.com/security/cve/CVE-2013-1705/" source="CVE"/>
		<reference ref_id="CVE-2013-1708" ref_url="https://www.suse.com/security/cve/CVE-2013-1708/" source="CVE"/>
		<reference ref_id="CVE-2013-1709" ref_url="https://www.suse.com/security/cve/CVE-2013-1709/" source="CVE"/>
		<reference ref_id="CVE-2013-1710" ref_url="https://www.suse.com/security/cve/CVE-2013-1710/" source="CVE"/>
		<reference ref_id="CVE-2013-1711" ref_url="https://www.suse.com/security/cve/CVE-2013-1711/" source="CVE"/>
		<reference ref_id="CVE-2013-1713" ref_url="https://www.suse.com/security/cve/CVE-2013-1713/" source="CVE"/>
		<reference ref_id="CVE-2013-1714" ref_url="https://www.suse.com/security/cve/CVE-2013-1714/" source="CVE"/>
		<reference ref_id="CVE-2013-1717" ref_url="https://www.suse.com/security/cve/CVE-2013-1717/" source="CVE"/>
		<reference ref_id="CVE-2013-1718" ref_url="https://www.suse.com/security/cve/CVE-2013-1718/" source="CVE"/>
		<reference ref_id="CVE-2013-1719" ref_url="https://www.suse.com/security/cve/CVE-2013-1719/" source="CVE"/>
		<reference ref_id="CVE-2013-1720" ref_url="https://www.suse.com/security/cve/CVE-2013-1720/" source="CVE"/>
		<reference ref_id="CVE-2013-1721" ref_url="https://www.suse.com/security/cve/CVE-2013-1721/" source="CVE"/>
		<reference ref_id="CVE-2013-1722" ref_url="https://www.suse.com/security/cve/CVE-2013-1722/" source="CVE"/>
		<reference ref_id="CVE-2013-1723" ref_url="https://www.suse.com/security/cve/CVE-2013-1723/" source="CVE"/>
		<reference ref_id="CVE-2013-1724" ref_url="https://www.suse.com/security/cve/CVE-2013-1724/" source="CVE"/>
		<reference ref_id="CVE-2013-1725" ref_url="https://www.suse.com/security/cve/CVE-2013-1725/" source="CVE"/>
		<reference ref_id="CVE-2013-1728" ref_url="https://www.suse.com/security/cve/CVE-2013-1728/" source="CVE"/>
		<reference ref_id="CVE-2013-1730" ref_url="https://www.suse.com/security/cve/CVE-2013-1730/" source="CVE"/>
		<reference ref_id="CVE-2013-1732" ref_url="https://www.suse.com/security/cve/CVE-2013-1732/" source="CVE"/>
		<reference ref_id="CVE-2013-1735" ref_url="https://www.suse.com/security/cve/CVE-2013-1735/" source="CVE"/>
		<reference ref_id="CVE-2013-1736" ref_url="https://www.suse.com/security/cve/CVE-2013-1736/" source="CVE"/>
		<reference ref_id="CVE-2013-1737" ref_url="https://www.suse.com/security/cve/CVE-2013-1737/" source="CVE"/>
		<reference ref_id="CVE-2013-1738" ref_url="https://www.suse.com/security/cve/CVE-2013-1738/" source="CVE"/>
		<reference ref_id="CVE-2013-5590" ref_url="https://www.suse.com/security/cve/CVE-2013-5590/" source="CVE"/>
		<reference ref_id="CVE-2013-5591" ref_url="https://www.suse.com/security/cve/CVE-2013-5591/" source="CVE"/>
		<reference ref_id="CVE-2013-5592" ref_url="https://www.suse.com/security/cve/CVE-2013-5592/" source="CVE"/>
		<reference ref_id="CVE-2013-5593" ref_url="https://www.suse.com/security/cve/CVE-2013-5593/" source="CVE"/>
		<reference ref_id="CVE-2013-5595" ref_url="https://www.suse.com/security/cve/CVE-2013-5595/" source="CVE"/>
		<reference ref_id="CVE-2013-5596" ref_url="https://www.suse.com/security/cve/CVE-2013-5596/" source="CVE"/>
		<reference ref_id="CVE-2013-5597" ref_url="https://www.suse.com/security/cve/CVE-2013-5597/" source="CVE"/>
		<reference ref_id="CVE-2013-5598" ref_url="https://www.suse.com/security/cve/CVE-2013-5598/" source="CVE"/>
		<reference ref_id="CVE-2013-5599" ref_url="https://www.suse.com/security/cve/CVE-2013-5599/" source="CVE"/>
		<reference ref_id="CVE-2013-5600" ref_url="https://www.suse.com/security/cve/CVE-2013-5600/" source="CVE"/>
		<reference ref_id="CVE-2013-5601" ref_url="https://www.suse.com/security/cve/CVE-2013-5601/" source="CVE"/>
		<reference ref_id="CVE-2013-5602" ref_url="https://www.suse.com/security/cve/CVE-2013-5602/" source="CVE"/>
		<reference ref_id="CVE-2013-5603" ref_url="https://www.suse.com/security/cve/CVE-2013-5603/" source="CVE"/>
		<reference ref_id="CVE-2013-5604" ref_url="https://www.suse.com/security/cve/CVE-2013-5604/" source="CVE"/>
		<reference ref_id="CVE-2013-5609" ref_url="https://www.suse.com/security/cve/CVE-2013-5609/" source="CVE"/>
		<reference ref_id="CVE-2013-5610" ref_url="https://www.suse.com/security/cve/CVE-2013-5610/" source="CVE"/>
		<reference ref_id="CVE-2013-5611" ref_url="https://www.suse.com/security/cve/CVE-2013-5611/" source="CVE"/>
		<reference ref_id="CVE-2013-5612" ref_url="https://www.suse.com/security/cve/CVE-2013-5612/" source="CVE"/>
		<reference ref_id="CVE-2013-5613" ref_url="https://www.suse.com/security/cve/CVE-2013-5613/" source="CVE"/>
		<reference ref_id="CVE-2013-5614" ref_url="https://www.suse.com/security/cve/CVE-2013-5614/" source="CVE"/>
		<reference ref_id="CVE-2013-5615" ref_url="https://www.suse.com/security/cve/CVE-2013-5615/" source="CVE"/>
		<reference ref_id="CVE-2013-5616" ref_url="https://www.suse.com/security/cve/CVE-2013-5616/" source="CVE"/>
		<reference ref_id="CVE-2013-5618" ref_url="https://www.suse.com/security/cve/CVE-2013-5618/" source="CVE"/>
		<reference ref_id="CVE-2013-5619" ref_url="https://www.suse.com/security/cve/CVE-2013-5619/" source="CVE"/>
		<reference ref_id="CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629/" source="CVE"/>
		<reference ref_id="CVE-2013-6630" ref_url="https://www.suse.com/security/cve/CVE-2013-6630/" source="CVE"/>
		<reference ref_id="CVE-2013-6671" ref_url="https://www.suse.com/security/cve/CVE-2013-6671/" source="CVE"/>
		<reference ref_id="CVE-2013-6672" ref_url="https://www.suse.com/security/cve/CVE-2013-6672/" source="CVE"/>
		<reference ref_id="CVE-2013-6673" ref_url="https://www.suse.com/security/cve/CVE-2013-6673/" source="CVE"/>
		<reference ref_id="CVE-2014-1477" ref_url="https://www.suse.com/security/cve/CVE-2014-1477/" source="CVE"/>
		<reference ref_id="CVE-2014-1478" ref_url="https://www.suse.com/security/cve/CVE-2014-1478/" source="CVE"/>
		<reference ref_id="CVE-2014-1479" ref_url="https://www.suse.com/security/cve/CVE-2014-1479/" source="CVE"/>
		<reference ref_id="CVE-2014-1480" ref_url="https://www.suse.com/security/cve/CVE-2014-1480/" source="CVE"/>
		<reference ref_id="CVE-2014-1481" ref_url="https://www.suse.com/security/cve/CVE-2014-1481/" source="CVE"/>
		<reference ref_id="CVE-2014-1482" ref_url="https://www.suse.com/security/cve/CVE-2014-1482/" source="CVE"/>
		<reference ref_id="CVE-2014-1483" ref_url="https://www.suse.com/security/cve/CVE-2014-1483/" source="CVE"/>
		<reference ref_id="CVE-2014-1484" ref_url="https://www.suse.com/security/cve/CVE-2014-1484/" source="CVE"/>
		<reference ref_id="CVE-2014-1485" ref_url="https://www.suse.com/security/cve/CVE-2014-1485/" source="CVE"/>
		<reference ref_id="CVE-2014-1486" ref_url="https://www.suse.com/security/cve/CVE-2014-1486/" source="CVE"/>
		<reference ref_id="CVE-2014-1487" ref_url="https://www.suse.com/security/cve/CVE-2014-1487/" source="CVE"/>
		<reference ref_id="CVE-2014-1488" ref_url="https://www.suse.com/security/cve/CVE-2014-1488/" source="CVE"/>
		<reference ref_id="CVE-2014-1489" ref_url="https://www.suse.com/security/cve/CVE-2014-1489/" source="CVE"/>
		<reference ref_id="CVE-2014-1490" ref_url="https://www.suse.com/security/cve/CVE-2014-1490/" source="CVE"/>
		<reference ref_id="CVE-2014-1491" ref_url="https://www.suse.com/security/cve/CVE-2014-1491/" source="CVE"/>
		<reference ref_id="CVE-2014-1544" ref_url="https://www.suse.com/security/cve/CVE-2014-1544/" source="CVE"/>
		<reference ref_id="CVE-2014-1547" ref_url="https://www.suse.com/security/cve/CVE-2014-1547/" source="CVE"/>
		<reference ref_id="CVE-2014-1548" ref_url="https://www.suse.com/security/cve/CVE-2014-1548/" source="CVE"/>
		<reference ref_id="CVE-2014-1553" ref_url="https://www.suse.com/security/cve/CVE-2014-1553/" source="CVE"/>
		<reference ref_id="CVE-2014-1554" ref_url="https://www.suse.com/security/cve/CVE-2014-1554/" source="CVE"/>
		<reference ref_id="CVE-2014-1555" ref_url="https://www.suse.com/security/cve/CVE-2014-1555/" source="CVE"/>
		<reference ref_id="CVE-2014-1556" ref_url="https://www.suse.com/security/cve/CVE-2014-1556/" source="CVE"/>
		<reference ref_id="CVE-2014-1557" ref_url="https://www.suse.com/security/cve/CVE-2014-1557/" source="CVE"/>
		<reference ref_id="CVE-2014-1562" ref_url="https://www.suse.com/security/cve/CVE-2014-1562/" source="CVE"/>
		<reference ref_id="CVE-2014-1563" ref_url="https://www.suse.com/security/cve/CVE-2014-1563/" source="CVE"/>
		<reference ref_id="CVE-2014-1564" ref_url="https://www.suse.com/security/cve/CVE-2014-1564/" source="CVE"/>
		<reference ref_id="CVE-2014-1565" ref_url="https://www.suse.com/security/cve/CVE-2014-1565/" source="CVE"/>
		<reference ref_id="CVE-2014-1567" ref_url="https://www.suse.com/security/cve/CVE-2014-1567/" source="CVE"/>
		<reference ref_id="CVE-2014-1574" ref_url="https://www.suse.com/security/cve/CVE-2014-1574/" source="CVE"/>
		<reference ref_id="CVE-2014-1575" ref_url="https://www.suse.com/security/cve/CVE-2014-1575/" source="CVE"/>
		<reference ref_id="CVE-2014-1576" ref_url="https://www.suse.com/security/cve/CVE-2014-1576/" source="CVE"/>
		<reference ref_id="CVE-2014-1577" ref_url="https://www.suse.com/security/cve/CVE-2014-1577/" source="CVE"/>
		<reference ref_id="CVE-2014-1578" ref_url="https://www.suse.com/security/cve/CVE-2014-1578/" source="CVE"/>
		<reference ref_id="CVE-2014-1581" ref_url="https://www.suse.com/security/cve/CVE-2014-1581/" source="CVE"/>
		<reference ref_id="CVE-2014-1583" ref_url="https://www.suse.com/security/cve/CVE-2014-1583/" source="CVE"/>
		<reference ref_id="CVE-2014-1585" ref_url="https://www.suse.com/security/cve/CVE-2014-1585/" source="CVE"/>
		<reference ref_id="CVE-2014-1586" ref_url="https://www.suse.com/security/cve/CVE-2014-1586/" source="CVE"/>
		<reference ref_id="CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587/" source="CVE"/>
		<reference ref_id="CVE-2014-1588" ref_url="https://www.suse.com/security/cve/CVE-2014-1588/" source="CVE"/>
		<reference ref_id="CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590/" source="CVE"/>
		<reference ref_id="CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592/" source="CVE"/>
		<reference ref_id="CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593/" source="CVE"/>
		<reference ref_id="CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594/" source="CVE"/>
		<reference ref_id="CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634/" source="CVE"/>
		<reference ref_id="CVE-2014-8635" ref_url="https://www.suse.com/security/cve/CVE-2014-8635/" source="CVE"/>
		<reference ref_id="CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638/" source="CVE"/>
		<reference ref_id="CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639/" source="CVE"/>
		<reference ref_id="CVE-2014-8641" ref_url="https://www.suse.com/security/cve/CVE-2014-8641/" source="CVE"/>
		<reference ref_id="CVE-2015-0797" ref_url="https://www.suse.com/security/cve/CVE-2015-0797/" source="CVE"/>
		<reference ref_id="CVE-2015-0801" ref_url="https://www.suse.com/security/cve/CVE-2015-0801/" source="CVE"/>
		<reference ref_id="CVE-2015-0807" ref_url="https://www.suse.com/security/cve/CVE-2015-0807/" source="CVE"/>
		<reference ref_id="CVE-2015-0813" ref_url="https://www.suse.com/security/cve/CVE-2015-0813/" source="CVE"/>
		<reference ref_id="CVE-2015-0814" ref_url="https://www.suse.com/security/cve/CVE-2015-0814/" source="CVE"/>
		<reference ref_id="CVE-2015-0815" ref_url="https://www.suse.com/security/cve/CVE-2015-0815/" source="CVE"/>
		<reference ref_id="CVE-2015-0816" ref_url="https://www.suse.com/security/cve/CVE-2015-0816/" source="CVE"/>
		<reference ref_id="CVE-2015-0817" ref_url="https://www.suse.com/security/cve/CVE-2015-0817/" source="CVE"/>
		<reference ref_id="CVE-2015-0818" ref_url="https://www.suse.com/security/cve/CVE-2015-0818/" source="CVE"/>
		<reference ref_id="CVE-2015-0822" ref_url="https://www.suse.com/security/cve/CVE-2015-0822/" source="CVE"/>
		<reference ref_id="CVE-2015-0827" ref_url="https://www.suse.com/security/cve/CVE-2015-0827/" source="CVE"/>
		<reference ref_id="CVE-2015-0831" ref_url="https://www.suse.com/security/cve/CVE-2015-0831/" source="CVE"/>
		<reference ref_id="CVE-2015-0835" ref_url="https://www.suse.com/security/cve/CVE-2015-0835/" source="CVE"/>
		<reference ref_id="CVE-2015-0836" ref_url="https://www.suse.com/security/cve/CVE-2015-0836/" source="CVE"/>
		<reference ref_id="CVE-2015-2708" ref_url="https://www.suse.com/security/cve/CVE-2015-2708/" source="CVE"/>
		<reference ref_id="CVE-2015-2709" ref_url="https://www.suse.com/security/cve/CVE-2015-2709/" source="CVE"/>
		<reference ref_id="CVE-2015-2710" ref_url="https://www.suse.com/security/cve/CVE-2015-2710/" source="CVE"/>
		<reference ref_id="CVE-2015-2713" ref_url="https://www.suse.com/security/cve/CVE-2015-2713/" source="CVE"/>
		<reference ref_id="CVE-2015-2716" ref_url="https://www.suse.com/security/cve/CVE-2015-2716/" source="CVE"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722/" source="CVE"/>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725/" source="CVE"/>
		<reference ref_id="CVE-2015-2726" ref_url="https://www.suse.com/security/cve/CVE-2015-2726/" source="CVE"/>
		<reference ref_id="CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728/" source="CVE"/>
		<reference ref_id="CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730/" source="CVE"/>
		<reference ref_id="CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735/" source="CVE"/>
		<reference ref_id="CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736/" source="CVE"/>
		<reference ref_id="CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739/" source="CVE"/>
		<reference ref_id="CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740/" source="CVE"/>
		<reference ref_id="CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473/" source="CVE"/>
		<reference ref_id="CVE-2015-4474" ref_url="https://www.suse.com/security/cve/CVE-2015-4474/" source="CVE"/>
		<reference ref_id="CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475/" source="CVE"/>
		<reference ref_id="CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478/" source="CVE"/>
		<reference ref_id="CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479/" source="CVE"/>
		<reference ref_id="CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484/" source="CVE"/>
		<reference ref_id="CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485/" source="CVE"/>
		<reference ref_id="CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486/" source="CVE"/>
		<reference ref_id="CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487/" source="CVE"/>
		<reference ref_id="CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488/" source="CVE"/>
		<reference ref_id="CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492/" source="CVE"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="CVE-2015-4497" ref_url="https://www.suse.com/security/cve/CVE-2015-4497/" source="CVE"/>
		<reference ref_id="CVE-2015-4498" ref_url="https://www.suse.com/security/cve/CVE-2015-4498/" source="CVE"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<reference ref_id="CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188/" source="CVE"/>
		<reference ref_id="CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193/" source="CVE"/>
		<reference ref_id="CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194/" source="CVE"/>
		<reference ref_id="CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196/" source="CVE"/>
		<reference ref_id="CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197/" source="CVE"/>
		<reference ref_id="CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198/" source="CVE"/>
		<reference ref_id="CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199/" source="CVE"/>
		<reference ref_id="CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-38.4.0esr-51.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-5913/">CVE-2008-5913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0652/">CVE-2009-0652</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0771/">CVE-2009-0771</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0772/">CVE-2009-0772</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0773/">CVE-2009-0773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0774/">CVE-2009-0774</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0775/">CVE-2009-0775</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0776/">CVE-2009-0776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0777/">CVE-2009-0777</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1044/">CVE-2009-1044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1169/">CVE-2009-1169</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1302/">CVE-2009-1302</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1303/">CVE-2009-1303</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1304/">CVE-2009-1304</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1305/">CVE-2009-1305</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1306/">CVE-2009-1306</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1307/">CVE-2009-1307</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1308/">CVE-2009-1308</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1309/">CVE-2009-1309</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1310/">CVE-2009-1310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1311/">CVE-2009-1311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1312/">CVE-2009-1312</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1313/">CVE-2009-1313</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1563/">CVE-2009-1563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2470/">CVE-2009-2470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2654/">CVE-2009-2654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3069/">CVE-2009-3069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3070/">CVE-2009-3070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3071/">CVE-2009-3071</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3072/">CVE-2009-3072</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3073/">CVE-2009-3073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3074/">CVE-2009-3074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3075/">CVE-2009-3075</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3077/">CVE-2009-3077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3078/">CVE-2009-3078</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3079/">CVE-2009-3079</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3274/">CVE-2009-3274</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3370/">CVE-2009-3370</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3371/">CVE-2009-3371</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3372/">CVE-2009-3372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3373/">CVE-2009-3373</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3374/">CVE-2009-3374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3375/">CVE-2009-3375</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3376/">CVE-2009-3376</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3377/">CVE-2009-3377</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3378/">CVE-2009-3378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3380/">CVE-2009-3380</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3381/">CVE-2009-3381</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3383/">CVE-2009-3383</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3388/">CVE-2009-3388</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3389/">CVE-2009-3389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3979/">CVE-2009-3979</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3980/">CVE-2009-3980</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3982/">CVE-2009-3982</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3983/">CVE-2009-3983</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3984/">CVE-2009-3984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3985/">CVE-2009-3985</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0164/">CVE-2010-0164</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0165/">CVE-2010-0165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0166/">CVE-2010-0166</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0167/">CVE-2010-0167</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0168/">CVE-2010-0168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0169/">CVE-2010-0169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0170/">CVE-2010-0170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0171/">CVE-2010-0171</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0172/">CVE-2010-0172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0654/">CVE-2010-0654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1028/">CVE-2010-1028</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1121/">CVE-2010-1121</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1125/">CVE-2010-1125</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1196/">CVE-2010-1196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1197/">CVE-2010-1197</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1198/">CVE-2010-1198</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1199/">CVE-2010-1199</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1200/">CVE-2010-1200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1201/">CVE-2010-1201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1202/">CVE-2010-1202</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1203/">CVE-2010-1203</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1206/">CVE-2010-1206</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1207/">CVE-2010-1207</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1208/">CVE-2010-1208</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1209/">CVE-2010-1209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1210/">CVE-2010-1210</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1211/">CVE-2010-1211</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1212/">CVE-2010-1212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1213/">CVE-2010-1213</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1214/">CVE-2010-1214</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1215/">CVE-2010-1215</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2751/">CVE-2010-2751</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2752/">CVE-2010-2752</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2753/">CVE-2010-2753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2754/">CVE-2010-2754</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2755/">CVE-2010-2755</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2760/">CVE-2010-2760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2762/">CVE-2010-2762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2764/">CVE-2010-2764</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2765/">CVE-2010-2765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2766/">CVE-2010-2766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2767/">CVE-2010-2767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2768/">CVE-2010-2768</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2769/">CVE-2010-2769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3166/">CVE-2010-3166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3167/">CVE-2010-3167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3168/">CVE-2010-3168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3169/">CVE-2010-3169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3173/">CVE-2010-3173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3174/">CVE-2010-3174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3175/">CVE-2010-3175</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3176/">CVE-2010-3176</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3177/">CVE-2010-3177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-0068/">CVE-2011-0068</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0069/">CVE-2011-0069</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0070/">CVE-2011-0070</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0079/">CVE-2011-0079</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0080/">CVE-2011-0080</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0081/">CVE-2011-0081</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0084/">CVE-2011-0084</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1187/">CVE-2011-1187</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1202/">CVE-2011-1202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2366/">CVE-2011-2366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2367/">CVE-2011-2367</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2368/">CVE-2011-2368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2369/">CVE-2011-2369</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2370/">CVE-2011-2370</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2371/">CVE-2011-2371</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2372/">CVE-2011-2372</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2373/">CVE-2011-2373</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2374/">CVE-2011-2374</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2375/">CVE-2011-2375</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2377/">CVE-2011-2377</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2985/">CVE-2011-2985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2986/">CVE-2011-2986</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2988/">CVE-2011-2988</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2989/">CVE-2011-2989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2990/">CVE-2011-2990</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2991/">CVE-2011-2991</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2992/">CVE-2011-2992</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2993/">CVE-2011-2993</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2995/">CVE-2011-2995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2996/">CVE-2011-2996</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2997/">CVE-2011-2997</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3000/">CVE-2011-3000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3001/">CVE-2011-3001</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3002/">CVE-2011-3002</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3003/">CVE-2011-3003</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3004/">CVE-2011-3004</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3005/">CVE-2011-3005</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3062/">CVE-2011-3062</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3101/">CVE-2011-3101</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3232/">CVE-2011-3232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3648/">CVE-2011-3648</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3650/">CVE-2011-3650</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3651/">CVE-2011-3651</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3652/">CVE-2011-3652</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3654/">CVE-2011-3654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3655/">CVE-2011-3655</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3658/">CVE-2011-3658</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3659/">CVE-2011-3659</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3660/">CVE-2011-3660</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3661/">CVE-2011-3661</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3663/">CVE-2011-3663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0441/">CVE-2012-0441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0442/">CVE-2012-0442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0443/">CVE-2012-0443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0445/">CVE-2012-0445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0446/">CVE-2012-0446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0447/">CVE-2012-0447</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0449/">CVE-2012-0449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0451/">CVE-2012-0451</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0452/">CVE-2012-0452</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0455/">CVE-2012-0455</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0456/">CVE-2012-0456</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0457/">CVE-2012-0457</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0458/">CVE-2012-0458</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0459/">CVE-2012-0459</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0460/">CVE-2012-0460</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0461/">CVE-2012-0461</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0462/">CVE-2012-0462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0463/">CVE-2012-0463</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0464/">CVE-2012-0464</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0467/">CVE-2012-0467</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0468/">CVE-2012-0468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0469/">CVE-2012-0469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0470/">CVE-2012-0470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0471/">CVE-2012-0471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0472/">CVE-2012-0472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0473/">CVE-2012-0473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0474/">CVE-2012-0474</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0475/">CVE-2012-0475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0477/">CVE-2012-0477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0478/">CVE-2012-0478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0479/">CVE-2012-0479</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0759/">CVE-2012-0759</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1937/">CVE-2012-1937</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1938/">CVE-2012-1938</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1940/">CVE-2012-1940</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1941/">CVE-2012-1941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1944/">CVE-2012-1944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1945/">CVE-2012-1945</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1946/">CVE-2012-1946</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1947/">CVE-2012-1947</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1948/">CVE-2012-1948</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1949/">CVE-2012-1949</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1950/">CVE-2012-1950</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1951/">CVE-2012-1951</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1952/">CVE-2012-1952</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1953/">CVE-2012-1953</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1954/">CVE-2012-1954</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1955/">CVE-2012-1955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1956/">CVE-2012-1956</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1957/">CVE-2012-1957</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1958/">CVE-2012-1958</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1959/">CVE-2012-1959</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1960/">CVE-2012-1960</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1961/">CVE-2012-1961</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1962/">CVE-2012-1962</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1963/">CVE-2012-1963</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1965/">CVE-2012-1965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1966/">CVE-2012-1966</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1967/">CVE-2012-1967</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1970/">CVE-2012-1970</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1972/">CVE-2012-1972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1973/">CVE-2012-1973</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1974/">CVE-2012-1974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1975/">CVE-2012-1975</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1976/">CVE-2012-1976</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3956/">CVE-2012-3956</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3957/">CVE-2012-3957</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3958/">CVE-2012-3958</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3959/">CVE-2012-3959</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3960/">CVE-2012-3960</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3961/">CVE-2012-3961</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3962/">CVE-2012-3962</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3963/">CVE-2012-3963</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3964/">CVE-2012-3964</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3965/">CVE-2012-3965</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3966/">CVE-2012-3966</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3967/">CVE-2012-3967</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3968/">CVE-2012-3968</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3969/">CVE-2012-3969</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3970/">CVE-2012-3970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3971/">CVE-2012-3971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3972/">CVE-2012-3972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3973/">CVE-2012-3973</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3975/">CVE-2012-3975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3976/">CVE-2012-3976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3978/">CVE-2012-3978</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3980/">CVE-2012-3980</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3982/">CVE-2012-3982</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3983/">CVE-2012-3983</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3984/">CVE-2012-3984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3985/">CVE-2012-3985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3986/">CVE-2012-3986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3988/">CVE-2012-3988</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3989/">CVE-2012-3989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3990/">CVE-2012-3990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3991/">CVE-2012-3991</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3992/">CVE-2012-3992</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3993/">CVE-2012-3993</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3994/">CVE-2012-3994</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3995/">CVE-2012-3995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4179/">CVE-2012-4179</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4180/">CVE-2012-4180</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4181/">CVE-2012-4181</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4182/">CVE-2012-4182</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4183/">CVE-2012-4183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4184/">CVE-2012-4184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4185/">CVE-2012-4185</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4186/">CVE-2012-4186</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4187/">CVE-2012-4187</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4188/">CVE-2012-4188</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4191/">CVE-2012-4191</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4192/">CVE-2012-4192</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4193/">CVE-2012-4193</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4194/">CVE-2012-4194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4195/">CVE-2012-4195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4196/">CVE-2012-4196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4201/">CVE-2012-4201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4202/">CVE-2012-4202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4203/">CVE-2012-4203</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4204/">CVE-2012-4204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4205/">CVE-2012-4205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4207/">CVE-2012-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4208/">CVE-2012-4208</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4209/">CVE-2012-4209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4210/">CVE-2012-4210</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4212/">CVE-2012-4212</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4213/">CVE-2012-4213</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4214/">CVE-2012-4214</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4215/">CVE-2012-4215</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4216/">CVE-2012-4216</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4217/">CVE-2012-4217</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4218/">CVE-2012-4218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5830/">CVE-2012-5830</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5833/">CVE-2012-5833</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5835/">CVE-2012-5835</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5836/">CVE-2012-5836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5837/">CVE-2012-5837</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5838/">CVE-2012-5838</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5839/">CVE-2012-5839</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5840/">CVE-2012-5840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5841/">CVE-2012-5841</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5842/">CVE-2012-5842</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5843/">CVE-2012-5843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0744/">CVE-2013-0744</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0745/">CVE-2013-0745</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0746/">CVE-2013-0746</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0747/">CVE-2013-0747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0748/">CVE-2013-0748</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0749/">CVE-2013-0749</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0750/">CVE-2013-0750</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0751/">CVE-2013-0751</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0752/">CVE-2013-0752</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0753/">CVE-2013-0753</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0754/">CVE-2013-0754</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0755/">CVE-2013-0755</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0756/">CVE-2013-0756</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0757/">CVE-2013-0757</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0758/">CVE-2013-0758</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0760/">CVE-2013-0760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0761/">CVE-2013-0761</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0762/">CVE-2013-0762</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0763/">CVE-2013-0763</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0764/">CVE-2013-0764</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0765/">CVE-2013-0765</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0766/">CVE-2013-0766</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0767/">CVE-2013-0767</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0768/">CVE-2013-0768</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0769/">CVE-2013-0769</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0770/">CVE-2013-0770</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0771/">CVE-2013-0771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0772/">CVE-2013-0772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0773/">CVE-2013-0773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0774/">CVE-2013-0774</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0775/">CVE-2013-0775</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0776/">CVE-2013-0776</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0777/">CVE-2013-0777</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0778/">CVE-2013-0778</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0779/">CVE-2013-0779</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0780/">CVE-2013-0780</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0781/">CVE-2013-0781</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0782/">CVE-2013-0782</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0783/">CVE-2013-0783</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0787/">CVE-2013-0787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0788/">CVE-2013-0788</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0789/">CVE-2013-0789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0792/">CVE-2013-0792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0793/">CVE-2013-0793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0794/">CVE-2013-0794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0795/">CVE-2013-0795</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0796/">CVE-2013-0796</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0800/">CVE-2013-0800</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0801/">CVE-2013-0801</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1669/">CVE-2013-1669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1670/">CVE-2013-1670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1671/">CVE-2013-1671</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1674/">CVE-2013-1674</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1675/">CVE-2013-1675</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1676/">CVE-2013-1676</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1677/">CVE-2013-1677</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1678/">CVE-2013-1678</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1679/">CVE-2013-1679</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1680/">CVE-2013-1680</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1681/">CVE-2013-1681</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1682/">CVE-2013-1682</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1683/">CVE-2013-1683</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1684/">CVE-2013-1684</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1685/">CVE-2013-1685</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1686/">CVE-2013-1686</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1687/">CVE-2013-1687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1688/">CVE-2013-1688</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1690/">CVE-2013-1690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1692/">CVE-2013-1692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1693/">CVE-2013-1693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1694/">CVE-2013-1694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1695/">CVE-2013-1695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1696/">CVE-2013-1696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1697/">CVE-2013-1697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1698/">CVE-2013-1698</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1699/">CVE-2013-1699</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1701/">CVE-2013-1701</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1702/">CVE-2013-1702</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1704/">CVE-2013-1704</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1705/">CVE-2013-1705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1708/">CVE-2013-1708</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1709/">CVE-2013-1709</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1710/">CVE-2013-1710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1711/">CVE-2013-1711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1713/">CVE-2013-1713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1714/">CVE-2013-1714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1717/">CVE-2013-1717</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1718/">CVE-2013-1718</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1719/">CVE-2013-1719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1720/">CVE-2013-1720</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1721/">CVE-2013-1721</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1722/">CVE-2013-1722</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1723/">CVE-2013-1723</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1724/">CVE-2013-1724</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1725/">CVE-2013-1725</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1728/">CVE-2013-1728</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1730/">CVE-2013-1730</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1732/">CVE-2013-1732</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1735/">CVE-2013-1735</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1736/">CVE-2013-1736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1737/">CVE-2013-1737</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1738/">CVE-2013-1738</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5590/">CVE-2013-5590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5591/">CVE-2013-5591</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5592/">CVE-2013-5592</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5593/">CVE-2013-5593</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5595/">CVE-2013-5595</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5596/">CVE-2013-5596</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5597/">CVE-2013-5597</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5598/">CVE-2013-5598</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5599/">CVE-2013-5599</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5600/">CVE-2013-5600</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5601/">CVE-2013-5601</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5602/">CVE-2013-5602</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5603/">CVE-2013-5603</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5604/">CVE-2013-5604</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5609/">CVE-2013-5609</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5610/">CVE-2013-5610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5611/">CVE-2013-5611</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5612/">CVE-2013-5612</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5613/">CVE-2013-5613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5614/">CVE-2013-5614</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5615/">CVE-2013-5615</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5616/">CVE-2013-5616</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5618/">CVE-2013-5618</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5619/">CVE-2013-5619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6630/">CVE-2013-6630</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-6671/">CVE-2013-6671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6672/">CVE-2013-6672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6673/">CVE-2013-6673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1477/">CVE-2014-1477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1478/">CVE-2014-1478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1479/">CVE-2014-1479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1480/">CVE-2014-1480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1481/">CVE-2014-1481</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1482/">CVE-2014-1482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1483/">CVE-2014-1483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1484/">CVE-2014-1484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1485/">CVE-2014-1485</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1486/">CVE-2014-1486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1487/">CVE-2014-1487</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1488/">CVE-2014-1488</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1489/">CVE-2014-1489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1490/">CVE-2014-1490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1491/">CVE-2014-1491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1544/">CVE-2014-1544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1547/">CVE-2014-1547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1548/">CVE-2014-1548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1553/">CVE-2014-1553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1554/">CVE-2014-1554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1555/">CVE-2014-1555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1556/">CVE-2014-1556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1557/">CVE-2014-1557</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1562/">CVE-2014-1562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1563/">CVE-2014-1563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1564/">CVE-2014-1564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1565/">CVE-2014-1565</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1567/">CVE-2014-1567</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1574/">CVE-2014-1574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1575/">CVE-2014-1575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1576/">CVE-2014-1576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1577/">CVE-2014-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1578/">CVE-2014-1578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1581/">CVE-2014-1581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1583/">CVE-2014-1583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1585/">CVE-2014-1585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1586/">CVE-2014-1586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1588/">CVE-2014-1588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8635/">CVE-2014-8635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8641/">CVE-2014-8641</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0797/">CVE-2015-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0801/">CVE-2015-0801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0807/">CVE-2015-0807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0813/">CVE-2015-0813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0814/">CVE-2015-0814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0815/">CVE-2015-0815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0816/">CVE-2015-0816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0817/">CVE-2015-0817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0818/">CVE-2015-0818</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0822/">CVE-2015-0822</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0827/">CVE-2015-0827</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0831/">CVE-2015-0831</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0835/">CVE-2015-0835</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0836/">CVE-2015-0836</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2708/">CVE-2015-2708</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2709/">CVE-2015-2709</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2710/">CVE-2015-2710</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2713/">CVE-2015-2713</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2716/">CVE-2015-2716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2726/">CVE-2015-2726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4474/">CVE-2015-4474</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4497/">CVE-2015-4497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4498/">CVE-2015-4498</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116011" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009116014" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75910" version="1" class="patch">
	<metadata>
		<title>aaa_base-13.2+git20140911.61c1681-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-0461" ref_url="https://www.suse.com/security/cve/CVE-2011-0461/" source="CVE"/>
		<description>
These are all security issues fixed in the aaa_base-13.2+git20140911.61c1681-9.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0461/">CVE-2011-0461</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141841" comment="aaa_base-13.2+git20140911.61c1681-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141842" comment="aaa_base-extras-13.2+git20140911.61c1681-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75911" version="1" class="patch">
	<metadata>
		<title>accountsservice-0.6.35-3.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2012-2737" ref_url="https://www.suse.com/security/cve/CVE-2012-2737/" source="CVE"/>
		<description>
These are all security issues fixed in the accountsservice-0.6.35-3.10 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2737/">CVE-2012-2737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141843" comment="accountsservice-0.6.35-3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141844" comment="accountsservice-lang-0.6.35-3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141845" comment="libaccountsservice0-0.6.35-3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141846" comment="typelib-1_0-AccountsService-1_0-0.6.35-3.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75912" version="1" class="patch">
	<metadata>
		<title>alsa-1.0.27.2-11.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0035" ref_url="https://www.suse.com/security/cve/CVE-2009-0035/" source="CVE"/>
		<description>
These are all security issues fixed in the alsa-1.0.27.2-11.10 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0035/">CVE-2009-0035</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141209" comment="alsa-1.0.27.2-11.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141210" comment="libasound2-1.0.27.2-11.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140446" comment="libasound2-32bit-1.0.27.2-11.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75913" version="1" class="patch">
	<metadata>
		<title>argyllcms-1.6.3-1.179 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2012-1616" ref_url="https://www.suse.com/security/cve/CVE-2012-1616/" source="CVE"/>
		<description>
These are all security issues fixed in the argyllcms-1.6.3-1.179 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1616/">CVE-2012-1616</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141211" comment="argyllcms-1.6.3-1.179 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75914" version="1" class="patch">
	<metadata>
		<title>autofs-5.0.9-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-8169" ref_url="https://www.suse.com/security/cve/CVE-2014-8169/" source="CVE"/>
		<description>
These are all security issues fixed in the autofs-5.0.9-8.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8169/">CVE-2014-8169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110200" comment="autofs-5.0.9-8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75915" version="1" class="patch">
	<metadata>
		<title>avahi-0.6.31-20.59 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0758" ref_url="https://www.suse.com/security/cve/CVE-2009-0758/" source="CVE"/>
		<reference ref_id="CVE-2010-2244" ref_url="https://www.suse.com/security/cve/CVE-2010-2244/" source="CVE"/>
		<reference ref_id="CVE-2011-1002" ref_url="https://www.suse.com/security/cve/CVE-2011-1002/" source="CVE"/>
		<description>
These are all security issues fixed in the avahi-0.6.31-20.59 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0758/">CVE-2009-0758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2244/">CVE-2010-2244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1002/">CVE-2011-1002</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141212" comment="avahi-0.6.31-20.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141213" comment="avahi-lang-0.6.31-20.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141214" comment="libavahi-client3-0.6.31-20.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141215" comment="libavahi-client3-32bit-0.6.31-20.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141216" comment="libavahi-common3-0.6.31-20.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141217" comment="libavahi-common3-32bit-0.6.31-20.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141218" comment="libavahi-core7-0.6.31-20.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141219" comment="libdns_sd-0.6.31-20.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141220" comment="libdns_sd-32bit-0.6.31-20.59 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75916" version="1" class="patch">
	<metadata>
		<title>bash-4.2-75.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-2524" ref_url="https://www.suse.com/security/cve/CVE-2014-2524/" source="CVE"/>
		<reference ref_id="CVE-2014-6271" ref_url="https://www.suse.com/security/cve/CVE-2014-6271/" source="CVE"/>
		<reference ref_id="CVE-2014-7169" ref_url="https://www.suse.com/security/cve/CVE-2014-7169/" source="CVE"/>
		<reference ref_id="CVE-2014-7186" ref_url="https://www.suse.com/security/cve/CVE-2014-7186/" source="CVE"/>
		<reference ref_id="CVE-2014-7187" ref_url="https://www.suse.com/security/cve/CVE-2014-7187/" source="CVE"/>
		<description>
These are all security issues fixed in the bash-4.2-75.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2524/">CVE-2014-2524</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6271/">CVE-2014-6271</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7169/">CVE-2014-7169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7186/">CVE-2014-7186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7187/">CVE-2014-7187</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141221" comment="bash-4.2-75.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141222" comment="bash-doc-4.2-75.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141223" comment="bash-lang-4.2-75.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141224" comment="libreadline6-6.2-75.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141225" comment="libreadline6-32bit-6.2-75.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141226" comment="readline-doc-6.2-75.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75917" version="1" class="patch">
	<metadata>
		<title>bind-libs-32bit-9.9.6P1-30.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0696" ref_url="https://www.suse.com/security/cve/CVE-2009-0696/" source="CVE"/>
		<reference ref_id="CVE-2009-4022" ref_url="https://www.suse.com/security/cve/CVE-2009-4022/" source="CVE"/>
		<reference ref_id="CVE-2010-3613" ref_url="https://www.suse.com/security/cve/CVE-2010-3613/" source="CVE"/>
		<reference ref_id="CVE-2010-3614" ref_url="https://www.suse.com/security/cve/CVE-2010-3614/" source="CVE"/>
		<reference ref_id="CVE-2010-3615" ref_url="https://www.suse.com/security/cve/CVE-2010-3615/" source="CVE"/>
		<reference ref_id="CVE-2011-0414" ref_url="https://www.suse.com/security/cve/CVE-2011-0414/" source="CVE"/>
		<reference ref_id="CVE-2011-1907" ref_url="https://www.suse.com/security/cve/CVE-2011-1907/" source="CVE"/>
		<reference ref_id="CVE-2011-1910" ref_url="https://www.suse.com/security/cve/CVE-2011-1910/" source="CVE"/>
		<reference ref_id="CVE-2011-2464" ref_url="https://www.suse.com/security/cve/CVE-2011-2464/" source="CVE"/>
		<reference ref_id="CVE-2011-4313" ref_url="https://www.suse.com/security/cve/CVE-2011-4313/" source="CVE"/>
		<reference ref_id="CVE-2012-1667" ref_url="https://www.suse.com/security/cve/CVE-2012-1667/" source="CVE"/>
		<reference ref_id="CVE-2012-3817" ref_url="https://www.suse.com/security/cve/CVE-2012-3817/" source="CVE"/>
		<reference ref_id="CVE-2012-3868" ref_url="https://www.suse.com/security/cve/CVE-2012-3868/" source="CVE"/>
		<reference ref_id="CVE-2012-4244" ref_url="https://www.suse.com/security/cve/CVE-2012-4244/" source="CVE"/>
		<reference ref_id="CVE-2012-5166" ref_url="https://www.suse.com/security/cve/CVE-2012-5166/" source="CVE"/>
		<reference ref_id="CVE-2012-5688" ref_url="https://www.suse.com/security/cve/CVE-2012-5688/" source="CVE"/>
		<reference ref_id="CVE-2012-5689" ref_url="https://www.suse.com/security/cve/CVE-2012-5689/" source="CVE"/>
		<reference ref_id="CVE-2013-2266" ref_url="https://www.suse.com/security/cve/CVE-2013-2266/" source="CVE"/>
		<reference ref_id="CVE-2013-4854" ref_url="https://www.suse.com/security/cve/CVE-2013-4854/" source="CVE"/>
		<reference ref_id="CVE-2014-0591" ref_url="https://www.suse.com/security/cve/CVE-2014-0591/" source="CVE"/>
		<reference ref_id="CVE-2014-8500" ref_url="https://www.suse.com/security/cve/CVE-2014-8500/" source="CVE"/>
		<reference ref_id="CVE-2015-1349" ref_url="https://www.suse.com/security/cve/CVE-2015-1349/" source="CVE"/>
		<reference ref_id="CVE-2015-4620" ref_url="https://www.suse.com/security/cve/CVE-2015-4620/" source="CVE"/>
		<reference ref_id="CVE-2015-5477" ref_url="https://www.suse.com/security/cve/CVE-2015-5477/" source="CVE"/>
		<reference ref_id="CVE-2015-5722" ref_url="https://www.suse.com/security/cve/CVE-2015-5722/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-libs-32bit-9.9.6P1-30.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0696/">CVE-2009-0696</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4022/">CVE-2009-4022</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3613/">CVE-2010-3613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3614/">CVE-2010-3614</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3615/">CVE-2010-3615</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0414/">CVE-2011-0414</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1907/">CVE-2011-1907</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1910/">CVE-2011-1910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2464/">CVE-2011-2464</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4313/">CVE-2011-4313</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1667/">CVE-2012-1667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3817/">CVE-2012-3817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3868/">CVE-2012-3868</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4244/">CVE-2012-4244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5166/">CVE-2012-5166</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5688/">CVE-2012-5688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5689/">CVE-2012-5689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2266/">CVE-2013-2266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4854/">CVE-2013-4854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0591/">CVE-2014-0591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8500/">CVE-2014-8500</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1349/">CVE-2015-1349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4620/">CVE-2015-4620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5477/">CVE-2015-5477</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5722/">CVE-2015-5722</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141847" comment="bind-libs-9.9.6P1-30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141848" comment="bind-libs-32bit-9.9.6P1-30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141849" comment="bind-utils-9.9.6P1-30.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75918" version="1" class="patch">
	<metadata>
		<title>binutils-2.25.0-13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-8484" ref_url="https://www.suse.com/security/cve/CVE-2014-8484/" source="CVE"/>
		<reference ref_id="CVE-2014-8485" ref_url="https://www.suse.com/security/cve/CVE-2014-8485/" source="CVE"/>
		<reference ref_id="CVE-2014-8501" ref_url="https://www.suse.com/security/cve/CVE-2014-8501/" source="CVE"/>
		<reference ref_id="CVE-2014-8502" ref_url="https://www.suse.com/security/cve/CVE-2014-8502/" source="CVE"/>
		<reference ref_id="CVE-2014-8503" ref_url="https://www.suse.com/security/cve/CVE-2014-8503/" source="CVE"/>
		<reference ref_id="CVE-2014-8504" ref_url="https://www.suse.com/security/cve/CVE-2014-8504/" source="CVE"/>
		<reference ref_id="CVE-2014-8737" ref_url="https://www.suse.com/security/cve/CVE-2014-8737/" source="CVE"/>
		<reference ref_id="CVE-2014-8738" ref_url="https://www.suse.com/security/cve/CVE-2014-8738/" source="CVE"/>
		<description>
These are all security issues fixed in the binutils-2.25.0-13.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8484/">CVE-2014-8484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8485/">CVE-2014-8485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8501/">CVE-2014-8501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8502/">CVE-2014-8502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8503/">CVE-2014-8503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8504/">CVE-2014-8504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8737/">CVE-2014-8737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8738/">CVE-2014-8738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141850" comment="binutils-2.25.0-13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75919" version="1" class="patch">
	<metadata>
		<title>bogofilter-1.2.4-3.56 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-2494" ref_url="https://www.suse.com/security/cve/CVE-2010-2494/" source="CVE"/>
		<reference ref_id="CVE-2012-5468" ref_url="https://www.suse.com/security/cve/CVE-2012-5468/" source="CVE"/>
		<description>
These are all security issues fixed in the bogofilter-1.2.4-3.56 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2494/">CVE-2010-2494</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5468/">CVE-2012-5468</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141230" comment="bogofilter-1.2.4-3.56 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75920" version="1" class="patch">
	<metadata>
		<title>busybox-1.21.1-3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-9645" ref_url="https://www.suse.com/security/cve/CVE-2014-9645/" source="CVE"/>
		<description>
These are all security issues fixed in the busybox-1.21.1-3.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9645/">CVE-2014-9645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113975" comment="busybox-1.21.1-3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75921" version="1" class="patch">
	<metadata>
		<title>bzip2-1.0.6-27.1129 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<description>
These are all security issues fixed in the bzip2-1.0.6-27.1129 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141231" comment="bzip2-1.0.6-27.1129 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141232" comment="libbz2-1-1.0.6-27.1129 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141233" comment="libbz2-1-32bit-1.0.6-27.1129 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75922" version="1" class="patch">
	<metadata>
		<title>cifs-utils-6.4-6.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2012-1586" ref_url="https://www.suse.com/security/cve/CVE-2012-1586/" source="CVE"/>
		<description>
These are all security issues fixed in the cifs-utils-6.4-6.4 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1586/">CVE-2012-1586</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141851" comment="cifs-utils-6.4-6.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75923" version="1" class="patch">
	<metadata>
		<title>clamav-0.98.7-13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<reference ref_id="CVE-2011-2721" ref_url="https://www.suse.com/security/cve/CVE-2011-2721/" source="CVE"/>
		<reference ref_id="CVE-2011-3627" ref_url="https://www.suse.com/security/cve/CVE-2011-3627/" source="CVE"/>
		<reference ref_id="CVE-2012-1457" ref_url="https://www.suse.com/security/cve/CVE-2012-1457/" source="CVE"/>
		<reference ref_id="CVE-2012-1458" ref_url="https://www.suse.com/security/cve/CVE-2012-1458/" source="CVE"/>
		<reference ref_id="CVE-2012-1459" ref_url="https://www.suse.com/security/cve/CVE-2012-1459/" source="CVE"/>
		<reference ref_id="CVE-2013-6497" ref_url="https://www.suse.com/security/cve/CVE-2013-6497/" source="CVE"/>
		<reference ref_id="CVE-2014-9050" ref_url="https://www.suse.com/security/cve/CVE-2014-9050/" source="CVE"/>
		<reference ref_id="CVE-2014-9328" ref_url="https://www.suse.com/security/cve/CVE-2014-9328/" source="CVE"/>
		<reference ref_id="CVE-2015-1461" ref_url="https://www.suse.com/security/cve/CVE-2015-1461/" source="CVE"/>
		<reference ref_id="CVE-2015-1462" ref_url="https://www.suse.com/security/cve/CVE-2015-1462/" source="CVE"/>
		<reference ref_id="CVE-2015-1463" ref_url="https://www.suse.com/security/cve/CVE-2015-1463/" source="CVE"/>
		<reference ref_id="CVE-2015-2170" ref_url="https://www.suse.com/security/cve/CVE-2015-2170/" source="CVE"/>
		<reference ref_id="CVE-2015-2221" ref_url="https://www.suse.com/security/cve/CVE-2015-2221/" source="CVE"/>
		<reference ref_id="CVE-2015-2222" ref_url="https://www.suse.com/security/cve/CVE-2015-2222/" source="CVE"/>
		<reference ref_id="CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305/" source="CVE"/>
		<reference ref_id="CVE-2015-2668" ref_url="https://www.suse.com/security/cve/CVE-2015-2668/" source="CVE"/>
		<description>
These are all security issues fixed in the clamav-0.98.7-13.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2721/">CVE-2011-2721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3627/">CVE-2011-3627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1457/">CVE-2012-1457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1458/">CVE-2012-1458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1459/">CVE-2012-1459</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6497/">CVE-2013-6497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9050/">CVE-2014-9050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9328/">CVE-2014-9328</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1461/">CVE-2015-1461</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1462/">CVE-2015-1462</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1463/">CVE-2015-1463</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2170/">CVE-2015-2170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2221/">CVE-2015-2221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2222/">CVE-2015-2222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2668/">CVE-2015-2668</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109618" comment="clamav-0.98.7-13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75924" version="1" class="patch">
	<metadata>
		<title>colord-1.1.7-5.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-4349" ref_url="https://www.suse.com/security/cve/CVE-2011-4349/" source="CVE"/>
		<description>
These are all security issues fixed in the colord-1.1.7-5.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4349/">CVE-2011-4349</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141852" comment="colord-1.1.7-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141237" comment="colord-gtk-lang-0.1.25-3.113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141853" comment="colord-lang-1.1.7-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141239" comment="libcolord-gtk1-0.1.25-3.113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141854" comment="libcolord2-1.1.7-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141855" comment="libcolord2-32bit-1.1.7-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141856" comment="libcolorhug2-1.1.7-5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75925" version="1" class="patch">
	<metadata>
		<title>coolkey-1.1.0-147.71 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-4129" ref_url="https://www.suse.com/security/cve/CVE-2007-4129/" source="CVE"/>
		<description>
These are all security issues fixed in the coolkey-1.1.0-147.71 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4129/">CVE-2007-4129</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140495" comment="coolkey-1.1.0-147.71 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75926" version="1" class="patch">
	<metadata>
		<title>coreutils-8.22-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-0221" ref_url="https://www.suse.com/security/cve/CVE-2013-0221/" source="CVE"/>
		<reference ref_id="CVE-2013-0222" ref_url="https://www.suse.com/security/cve/CVE-2013-0222/" source="CVE"/>
		<reference ref_id="CVE-2013-0223" ref_url="https://www.suse.com/security/cve/CVE-2013-0223/" source="CVE"/>
		<reference ref_id="CVE-2015-4041" ref_url="https://www.suse.com/security/cve/CVE-2015-4041/" source="CVE"/>
		<reference ref_id="CVE-2015-4042" ref_url="https://www.suse.com/security/cve/CVE-2015-4042/" source="CVE"/>
		<description>
These are all security issues fixed in the coreutils-8.22-9.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0221/">CVE-2013-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0222/">CVE-2013-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0223/">CVE-2013-0223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4041/">CVE-2015-4041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4042/">CVE-2015-4042</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009114699" comment="coreutils-8.22-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114700" comment="coreutils-lang-8.22-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75927" version="1" class="patch">
	<metadata>
		<title>cpio-2.11-29.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-0624" ref_url="https://www.suse.com/security/cve/CVE-2010-0624/" source="CVE"/>
		<reference ref_id="CVE-2014-9112" ref_url="https://www.suse.com/security/cve/CVE-2014-9112/" source="CVE"/>
		<description>
These are all security issues fixed in the cpio-2.11-29.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0624/">CVE-2010-0624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9112/">CVE-2014-9112</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009102938" comment="cpio-2.11-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102939" comment="cpio-lang-2.11-29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75928" version="1" class="patch">
	<metadata>
		<title>cpp48-4.8.5-24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-5044" ref_url="https://www.suse.com/security/cve/CVE-2014-5044/" source="CVE"/>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<description>
These are all security issues fixed in the cpp48-4.8.5-24.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5044/">CVE-2014-5044</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009115214" comment="cpp48-4.8.5-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115215" comment="gcc48-4.8.5-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115258" comment="gcc48-32bit-4.8.5-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115217" comment="gcc48-c++-4.8.5-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115239" comment="gcc48-gij-4.8.5-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115238" comment="gcc48-gij-32bit-4.8.5-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115219" comment="gcc48-info-4.8.5-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115224" comment="libasan0-4.8.5-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115263" comment="libasan0-32bit-4.8.5-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115242" comment="libgcj48-4.8.5-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115241" comment="libgcj48-32bit-4.8.5-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115245" comment="libgcj48-jar-4.8.5-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115246" comment="libgcj_bc1-4.8.5-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115232" comment="libstdc++48-devel-4.8.5-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115271" comment="libstdc++48-devel-32bit-4.8.5-24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75929" version="1" class="patch">
	<metadata>
		<title>cron-4.2-58.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-2607" ref_url="https://www.suse.com/security/cve/CVE-2006-2607/" source="CVE"/>
		<reference ref_id="CVE-2010-0424" ref_url="https://www.suse.com/security/cve/CVE-2010-0424/" source="CVE"/>
		<description>
These are all security issues fixed in the cron-4.2-58.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2607/">CVE-2006-2607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0424/">CVE-2010-0424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140508" comment="cron-4.2-58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140509" comment="cronie-1.4.11-58.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75930" version="1" class="patch">
	<metadata>
		<title>cups-1.7.5-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0163" ref_url="https://www.suse.com/security/cve/CVE-2009-0163/" source="CVE"/>
		<reference ref_id="CVE-2009-2820" ref_url="https://www.suse.com/security/cve/CVE-2009-2820/" source="CVE"/>
		<reference ref_id="CVE-2009-3553" ref_url="https://www.suse.com/security/cve/CVE-2009-3553/" source="CVE"/>
		<reference ref_id="CVE-2010-0393" ref_url="https://www.suse.com/security/cve/CVE-2010-0393/" source="CVE"/>
		<reference ref_id="CVE-2010-0540" ref_url="https://www.suse.com/security/cve/CVE-2010-0540/" source="CVE"/>
		<reference ref_id="CVE-2010-0542" ref_url="https://www.suse.com/security/cve/CVE-2010-0542/" source="CVE"/>
		<reference ref_id="CVE-2010-1748" ref_url="https://www.suse.com/security/cve/CVE-2010-1748/" source="CVE"/>
		<reference ref_id="CVE-2010-2941" ref_url="https://www.suse.com/security/cve/CVE-2010-2941/" source="CVE"/>
		<reference ref_id="CVE-2012-5519" ref_url="https://www.suse.com/security/cve/CVE-2012-5519/" source="CVE"/>
		<reference ref_id="CVE-2012-6094" ref_url="https://www.suse.com/security/cve/CVE-2012-6094/" source="CVE"/>
		<reference ref_id="CVE-2014-2856" ref_url="https://www.suse.com/security/cve/CVE-2014-2856/" source="CVE"/>
		<reference ref_id="CVE-2014-3537" ref_url="https://www.suse.com/security/cve/CVE-2014-3537/" source="CVE"/>
		<reference ref_id="CVE-2014-5029" ref_url="https://www.suse.com/security/cve/CVE-2014-5029/" source="CVE"/>
		<reference ref_id="CVE-2014-5030" ref_url="https://www.suse.com/security/cve/CVE-2014-5030/" source="CVE"/>
		<reference ref_id="CVE-2014-5031" ref_url="https://www.suse.com/security/cve/CVE-2014-5031/" source="CVE"/>
		<reference ref_id="CVE-2014-9679" ref_url="https://www.suse.com/security/cve/CVE-2014-9679/" source="CVE"/>
		<reference ref_id="CVE-2015-1158" ref_url="https://www.suse.com/security/cve/CVE-2015-1158/" source="CVE"/>
		<reference ref_id="CVE-2015-1159" ref_url="https://www.suse.com/security/cve/CVE-2015-1159/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-1.7.5-9.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0163/">CVE-2009-0163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2820/">CVE-2009-2820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3553/">CVE-2009-3553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0393/">CVE-2010-0393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0540/">CVE-2010-0540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0542/">CVE-2010-0542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1748/">CVE-2010-1748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2941/">CVE-2010-2941</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5519/">CVE-2012-5519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6094/">CVE-2012-6094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2856/">CVE-2014-2856</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3537/">CVE-2014-3537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5029/">CVE-2014-5029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5030/">CVE-2014-5030</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5031/">CVE-2014-5031</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9679/">CVE-2014-9679</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1158/">CVE-2015-1158</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1159/">CVE-2015-1159</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110315" comment="cups-1.7.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110316" comment="cups-client-1.7.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110319" comment="cups-libs-1.7.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110320" comment="cups-libs-32bit-1.7.5-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75931" version="1" class="patch">
	<metadata>
		<title>cups-filters-1.0.58-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-6473" ref_url="https://www.suse.com/security/cve/CVE-2013-6473/" source="CVE"/>
		<reference ref_id="CVE-2013-6474" ref_url="https://www.suse.com/security/cve/CVE-2013-6474/" source="CVE"/>
		<reference ref_id="CVE-2013-6475" ref_url="https://www.suse.com/security/cve/CVE-2013-6475/" source="CVE"/>
		<reference ref_id="CVE-2013-6476" ref_url="https://www.suse.com/security/cve/CVE-2013-6476/" source="CVE"/>
		<reference ref_id="CVE-2014-2707" ref_url="https://www.suse.com/security/cve/CVE-2014-2707/" source="CVE"/>
		<reference ref_id="CVE-2014-4336" ref_url="https://www.suse.com/security/cve/CVE-2014-4336/" source="CVE"/>
		<reference ref_id="CVE-2014-4337" ref_url="https://www.suse.com/security/cve/CVE-2014-4337/" source="CVE"/>
		<reference ref_id="CVE-2014-4338" ref_url="https://www.suse.com/security/cve/CVE-2014-4338/" source="CVE"/>
		<reference ref_id="CVE-2015-2265" ref_url="https://www.suse.com/security/cve/CVE-2015-2265/" source="CVE"/>
		<reference ref_id="CVE-2015-3258" ref_url="https://www.suse.com/security/cve/CVE-2015-3258/" source="CVE"/>
		<reference ref_id="CVE-2015-3279" ref_url="https://www.suse.com/security/cve/CVE-2015-3279/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-filters-1.0.58-8.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6473/">CVE-2013-6473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6474/">CVE-2013-6474</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6475/">CVE-2013-6475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6476/">CVE-2013-6476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2707/">CVE-2014-2707</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4336/">CVE-2014-4336</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4337/">CVE-2014-4337</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4338/">CVE-2014-4338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2265/">CVE-2015-2265</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3258/">CVE-2015-3258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3279/">CVE-2015-3279</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009113515" comment="cups-filters-1.0.58-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113516" comment="cups-filters-cups-browsed-1.0.58-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113518" comment="cups-filters-foomatic-rip-1.0.58-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113519" comment="cups-filters-ghostscript-1.0.58-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75932" version="1" class="patch">
	<metadata>
		<title>cups-pk-helper-0.2.5-3.75 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2012-4510" ref_url="https://www.suse.com/security/cve/CVE-2012-4510/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-pk-helper-0.2.5-3.75 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4510/">CVE-2012-4510</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140514" comment="cups-pk-helper-0.2.5-3.75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140515" comment="cups-pk-helper-lang-0.2.5-3.75 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75933" version="1" class="patch">
	<metadata>
		<title>curl-7.37.0-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0037" ref_url="https://www.suse.com/security/cve/CVE-2009-0037/" source="CVE"/>
		<reference ref_id="CVE-2009-2417" ref_url="https://www.suse.com/security/cve/CVE-2009-2417/" source="CVE"/>
		<reference ref_id="CVE-2013-0249" ref_url="https://www.suse.com/security/cve/CVE-2013-0249/" source="CVE"/>
		<reference ref_id="CVE-2013-1944" ref_url="https://www.suse.com/security/cve/CVE-2013-1944/" source="CVE"/>
		<reference ref_id="CVE-2013-2174" ref_url="https://www.suse.com/security/cve/CVE-2013-2174/" source="CVE"/>
		<reference ref_id="CVE-2013-4545" ref_url="https://www.suse.com/security/cve/CVE-2013-4545/" source="CVE"/>
		<reference ref_id="CVE-2014-0015" ref_url="https://www.suse.com/security/cve/CVE-2014-0015/" source="CVE"/>
		<reference ref_id="CVE-2014-0138" ref_url="https://www.suse.com/security/cve/CVE-2014-0138/" source="CVE"/>
		<reference ref_id="CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139/" source="CVE"/>
		<reference ref_id="CVE-2014-3613" ref_url="https://www.suse.com/security/cve/CVE-2014-3613/" source="CVE"/>
		<reference ref_id="CVE-2014-3620" ref_url="https://www.suse.com/security/cve/CVE-2014-3620/" source="CVE"/>
		<reference ref_id="CVE-2014-3707" ref_url="https://www.suse.com/security/cve/CVE-2014-3707/" source="CVE"/>
		<reference ref_id="CVE-2014-8150" ref_url="https://www.suse.com/security/cve/CVE-2014-8150/" source="CVE"/>
		<reference ref_id="CVE-2015-3143" ref_url="https://www.suse.com/security/cve/CVE-2015-3143/" source="CVE"/>
		<reference ref_id="CVE-2015-3144" ref_url="https://www.suse.com/security/cve/CVE-2015-3144/" source="CVE"/>
		<reference ref_id="CVE-2015-3145" ref_url="https://www.suse.com/security/cve/CVE-2015-3145/" source="CVE"/>
		<reference ref_id="CVE-2015-3148" ref_url="https://www.suse.com/security/cve/CVE-2015-3148/" source="CVE"/>
		<reference ref_id="CVE-2015-3153" ref_url="https://www.suse.com/security/cve/CVE-2015-3153/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-7.37.0-15.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0037/">CVE-2009-0037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2417/">CVE-2009-2417</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0249/">CVE-2013-0249</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1944/">CVE-2013-1944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2174/">CVE-2013-2174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4545/">CVE-2013-4545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0015/">CVE-2014-0015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0138/">CVE-2014-0138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3613/">CVE-2014-3613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3620/">CVE-2014-3620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3707/">CVE-2014-3707</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8150/">CVE-2014-8150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3143/">CVE-2015-3143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3144/">CVE-2015-3144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3145/">CVE-2015-3145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3148/">CVE-2015-3148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3153/">CVE-2015-3153</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110168" comment="curl-7.37.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110172" comment="libcurl4-7.37.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110171" comment="libcurl4-32bit-7.37.0-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75934" version="1" class="patch">
	<metadata>
		<title>cvs-1.12.12-181.63 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2012-0804" ref_url="https://www.suse.com/security/cve/CVE-2012-0804/" source="CVE"/>
		<description>
These are all security issues fixed in the cvs-1.12.12-181.63 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0804/">CVE-2012-0804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140516" comment="cvs-1.12.12-181.63 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75935" version="1" class="patch">
	<metadata>
		<title>cyrus-sasl-2.1.26-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0688" ref_url="https://www.suse.com/security/cve/CVE-2009-0688/" source="CVE"/>
		<description>
These are all security issues fixed in the cyrus-sasl-2.1.26-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0688/">CVE-2009-0688</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140518" comment="cyrus-sasl-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140519" comment="cyrus-sasl-32bit-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140520" comment="cyrus-sasl-crammd5-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140521" comment="cyrus-sasl-crammd5-32bit-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140522" comment="cyrus-sasl-digestmd5-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141292" comment="cyrus-sasl-digestmd5-32bit-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140523" comment="cyrus-sasl-gssapi-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140524" comment="cyrus-sasl-gssapi-32bit-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140527" comment="cyrus-sasl-plain-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140528" comment="cyrus-sasl-plain-32bit-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140529" comment="cyrus-sasl-saslauthd-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140532" comment="libsasl2-3-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140533" comment="libsasl2-3-32bit-2.1.26-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75936" version="1" class="patch">
	<metadata>
		<title>dbus-1-1.8.16-14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-4352" ref_url="https://www.suse.com/security/cve/CVE-2010-4352/" source="CVE"/>
		<reference ref_id="CVE-2012-3524" ref_url="https://www.suse.com/security/cve/CVE-2012-3524/" source="CVE"/>
		<reference ref_id="CVE-2013-2168" ref_url="https://www.suse.com/security/cve/CVE-2013-2168/" source="CVE"/>
		<reference ref_id="CVE-2014-3477" ref_url="https://www.suse.com/security/cve/CVE-2014-3477/" source="CVE"/>
		<reference ref_id="CVE-2014-3532" ref_url="https://www.suse.com/security/cve/CVE-2014-3532/" source="CVE"/>
		<reference ref_id="CVE-2014-3533" ref_url="https://www.suse.com/security/cve/CVE-2014-3533/" source="CVE"/>
		<reference ref_id="CVE-2014-3635" ref_url="https://www.suse.com/security/cve/CVE-2014-3635/" source="CVE"/>
		<reference ref_id="CVE-2014-3636" ref_url="https://www.suse.com/security/cve/CVE-2014-3636/" source="CVE"/>
		<reference ref_id="CVE-2014-3637" ref_url="https://www.suse.com/security/cve/CVE-2014-3637/" source="CVE"/>
		<reference ref_id="CVE-2014-3638" ref_url="https://www.suse.com/security/cve/CVE-2014-3638/" source="CVE"/>
		<reference ref_id="CVE-2014-3639" ref_url="https://www.suse.com/security/cve/CVE-2014-3639/" source="CVE"/>
		<reference ref_id="CVE-2014-7824" ref_url="https://www.suse.com/security/cve/CVE-2014-7824/" source="CVE"/>
		<reference ref_id="CVE-2014-8148" ref_url="https://www.suse.com/security/cve/CVE-2014-8148/" source="CVE"/>
		<reference ref_id="CVE-2015-0245" ref_url="https://www.suse.com/security/cve/CVE-2015-0245/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-1.8.16-14.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4352/">CVE-2010-4352</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3524/">CVE-2012-3524</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2168/">CVE-2013-2168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3477/">CVE-2014-3477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3532/">CVE-2014-3532</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3533/">CVE-2014-3533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3635/">CVE-2014-3635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3636/">CVE-2014-3636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3637/">CVE-2014-3637</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3638/">CVE-2014-3638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3639/">CVE-2014-3639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7824/">CVE-2014-7824</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8148/">CVE-2014-8148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0245/">CVE-2015-0245</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107559" comment="dbus-1-1.8.16-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107561" comment="dbus-1-x11-1.8.16-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107564" comment="libdbus-1-3-1.8.16-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107565" comment="libdbus-1-3-32bit-1.8.16-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75937" version="1" class="patch">
	<metadata>
		<title>dbus-1-glib-0.100.2-3.58 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-1172" ref_url="https://www.suse.com/security/cve/CVE-2010-1172/" source="CVE"/>
		<reference ref_id="CVE-2013-0292" ref_url="https://www.suse.com/security/cve/CVE-2013-0292/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-glib-0.100.2-3.58 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1172/">CVE-2010-1172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0292/">CVE-2013-0292</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140539" comment="dbus-1-glib-0.100.2-3.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140540" comment="dbus-1-glib-32bit-0.100.2-3.58 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75938" version="1" class="patch">
	<metadata>
		<title>dhcp-4.3.3-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-1892" ref_url="https://www.suse.com/security/cve/CVE-2009-1892/" source="CVE"/>
		<reference ref_id="CVE-2010-2156" ref_url="https://www.suse.com/security/cve/CVE-2010-2156/" source="CVE"/>
		<reference ref_id="CVE-2010-3611" ref_url="https://www.suse.com/security/cve/CVE-2010-3611/" source="CVE"/>
		<reference ref_id="CVE-2010-3616" ref_url="https://www.suse.com/security/cve/CVE-2010-3616/" source="CVE"/>
		<reference ref_id="CVE-2011-0413" ref_url="https://www.suse.com/security/cve/CVE-2011-0413/" source="CVE"/>
		<reference ref_id="CVE-2011-0997" ref_url="https://www.suse.com/security/cve/CVE-2011-0997/" source="CVE"/>
		<reference ref_id="CVE-2011-2748" ref_url="https://www.suse.com/security/cve/CVE-2011-2748/" source="CVE"/>
		<reference ref_id="CVE-2011-2749" ref_url="https://www.suse.com/security/cve/CVE-2011-2749/" source="CVE"/>
		<reference ref_id="CVE-2011-4539" ref_url="https://www.suse.com/security/cve/CVE-2011-4539/" source="CVE"/>
		<reference ref_id="CVE-2011-4868" ref_url="https://www.suse.com/security/cve/CVE-2011-4868/" source="CVE"/>
		<reference ref_id="CVE-2012-3570" ref_url="https://www.suse.com/security/cve/CVE-2012-3570/" source="CVE"/>
		<reference ref_id="CVE-2012-3571" ref_url="https://www.suse.com/security/cve/CVE-2012-3571/" source="CVE"/>
		<reference ref_id="CVE-2012-3954" ref_url="https://www.suse.com/security/cve/CVE-2012-3954/" source="CVE"/>
		<reference ref_id="CVE-2012-3955" ref_url="https://www.suse.com/security/cve/CVE-2012-3955/" source="CVE"/>
		<reference ref_id="CVE-2013-2266" ref_url="https://www.suse.com/security/cve/CVE-2013-2266/" source="CVE"/>
		<description>
These are all security issues fixed in the dhcp-4.3.3-2.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1892/">CVE-2009-1892</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2156/">CVE-2010-2156</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3611/">CVE-2010-3611</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3616/">CVE-2010-3616</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0413/">CVE-2011-0413</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0997/">CVE-2011-0997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2748/">CVE-2011-2748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2749/">CVE-2011-2749</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4539/">CVE-2011-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4868/">CVE-2011-4868</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3570/">CVE-2012-3570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3571/">CVE-2012-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3954/">CVE-2012-3954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3955/">CVE-2012-3955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2266/">CVE-2013-2266</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141857" comment="dhcp-4.3.3-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141858" comment="dhcp-client-4.3.3-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75939" version="1" class="patch">
	<metadata>
		<title>dia-0.97.2-13.253 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-5984" ref_url="https://www.suse.com/security/cve/CVE-2008-5984/" source="CVE"/>
		<description>
These are all security issues fixed in the dia-0.97.2-13.253 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5984/">CVE-2008-5984</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141299" comment="dia-0.97.2-13.253 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141300" comment="dia-lang-0.97.2-13.253 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75940" version="1" class="patch">
	<metadata>
		<title>dnsmasq-2.71-8.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2015-3294" ref_url="https://www.suse.com/security/cve/CVE-2015-3294/" source="CVE"/>
		<description>
These are all security issues fixed in the dnsmasq-2.71-8.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3294/">CVE-2015-3294</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141859" comment="dnsmasq-2.71-8.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75941" version="1" class="patch">
	<metadata>
		<title>dracut-037-66.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2012-4453" ref_url="https://www.suse.com/security/cve/CVE-2012-4453/" source="CVE"/>
		<description>
These are all security issues fixed in the dracut-037-66.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4453/">CVE-2012-4453</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009138243" comment="dracut-037-66.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75942" version="1" class="patch">
	<metadata>
		<title>e2fsprogs-1.42.11-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2015-0247" ref_url="https://www.suse.com/security/cve/CVE-2015-0247/" source="CVE"/>
		<reference ref_id="CVE-2015-1572" ref_url="https://www.suse.com/security/cve/CVE-2015-1572/" source="CVE"/>
		<description>
These are all security issues fixed in the e2fsprogs-1.42.11-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-0247/">CVE-2015-0247</cve>
	<cve impact="low" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-1572/">CVE-2015-1572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009113256" comment="e2fsprogs-1.42.11-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113260" comment="libcom_err2-1.42.11-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113261" comment="libcom_err2-32bit-1.42.11-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113264" comment="libext2fs2-1.42.11-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75943" version="1" class="patch">
	<metadata>
		<title>ecryptfs-utils-103-5.35 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-1831" ref_url="https://www.suse.com/security/cve/CVE-2011-1831/" source="CVE"/>
		<reference ref_id="CVE-2011-1832" ref_url="https://www.suse.com/security/cve/CVE-2011-1832/" source="CVE"/>
		<reference ref_id="CVE-2011-1833" ref_url="https://www.suse.com/security/cve/CVE-2011-1833/" source="CVE"/>
		<reference ref_id="CVE-2011-1834" ref_url="https://www.suse.com/security/cve/CVE-2011-1834/" source="CVE"/>
		<reference ref_id="CVE-2011-1835" ref_url="https://www.suse.com/security/cve/CVE-2011-1835/" source="CVE"/>
		<reference ref_id="CVE-2011-1836" ref_url="https://www.suse.com/security/cve/CVE-2011-1836/" source="CVE"/>
		<reference ref_id="CVE-2011-1837" ref_url="https://www.suse.com/security/cve/CVE-2011-1837/" source="CVE"/>
		<description>
These are all security issues fixed in the ecryptfs-utils-103-5.35 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1831/">CVE-2011-1831</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1832/">CVE-2011-1832</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1833/">CVE-2011-1833</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1834/">CVE-2011-1834</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1835/">CVE-2011-1835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1836/">CVE-2011-1836</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1837/">CVE-2011-1837</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141302" comment="ecryptfs-utils-103-5.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141303" comment="ecryptfs-utils-32bit-103-5.35 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75944" version="1" class="patch">
	<metadata>
		<title>elfutils-0.158-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-0172" ref_url="https://www.suse.com/security/cve/CVE-2014-0172/" source="CVE"/>
		<reference ref_id="CVE-2014-9447" ref_url="https://www.suse.com/security/cve/CVE-2014-9447/" source="CVE"/>
		<description>
These are all security issues fixed in the elfutils-0.158-6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0172/">CVE-2014-0172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9447/">CVE-2014-9447</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106094" comment="elfutils-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106096" comment="libasm1-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106099" comment="libdw1-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106100" comment="libdw1-32bit-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106102" comment="libebl1-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106103" comment="libebl1-32bit-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106106" comment="libelf1-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106107" comment="libelf1-32bit-0.158-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75945" version="1" class="patch">
	<metadata>
		<title>emacs-24.3-14.44 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2012-0035" ref_url="https://www.suse.com/security/cve/CVE-2012-0035/" source="CVE"/>
		<reference ref_id="CVE-2014-3421" ref_url="https://www.suse.com/security/cve/CVE-2014-3421/" source="CVE"/>
		<reference ref_id="CVE-2014-3422" ref_url="https://www.suse.com/security/cve/CVE-2014-3422/" source="CVE"/>
		<reference ref_id="CVE-2014-3423" ref_url="https://www.suse.com/security/cve/CVE-2014-3423/" source="CVE"/>
		<reference ref_id="CVE-2014-3424" ref_url="https://www.suse.com/security/cve/CVE-2014-3424/" source="CVE"/>
		<description>
These are all security issues fixed in the emacs-24.3-14.44 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0035/">CVE-2012-0035</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3421/">CVE-2014-3421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3422/">CVE-2014-3422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3423/">CVE-2014-3423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3424/">CVE-2014-3424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141312" comment="emacs-24.3-14.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141313" comment="emacs-info-24.3-14.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141314" comment="emacs-x11-24.3-14.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141315" comment="etags-24.3-14.44 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75946" version="1" class="patch">
	<metadata>
		<title>empathy-3.10.3-1.131 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-3635" ref_url="https://www.suse.com/security/cve/CVE-2011-3635/" source="CVE"/>
		<description>
These are all security issues fixed in the empathy-3.10.3-1.131 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3635/">CVE-2011-3635</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141316" comment="empathy-3.10.3-1.131 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141317" comment="empathy-lang-3.10.3-1.131 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141318" comment="telepathy-mission-control-plugin-goa-3.10.3-1.131 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75947" version="1" class="patch">
	<metadata>
		<title>evince-3.10.3-1.213 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-2640" ref_url="https://www.suse.com/security/cve/CVE-2010-2640/" source="CVE"/>
		<reference ref_id="CVE-2010-2641" ref_url="https://www.suse.com/security/cve/CVE-2010-2641/" source="CVE"/>
		<reference ref_id="CVE-2010-2642" ref_url="https://www.suse.com/security/cve/CVE-2010-2642/" source="CVE"/>
		<reference ref_id="CVE-2010-2643" ref_url="https://www.suse.com/security/cve/CVE-2010-2643/" source="CVE"/>
		<description>
These are all security issues fixed in the evince-3.10.3-1.213 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2640/">CVE-2010-2640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2641/">CVE-2010-2641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2642/">CVE-2010-2642</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2643/">CVE-2010-2643</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141319" comment="evince-3.10.3-1.213 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141320" comment="evince-lang-3.10.3-1.213 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141321" comment="libevdocument3-4-3.10.3-1.213 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141322" comment="libevview3-3-3.10.3-1.213 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141323" comment="typelib-1_0-EvinceDocument-3_0-3.10.3-1.213 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141324" comment="typelib-1_0-EvinceView-3_0-3.10.3-1.213 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75948" version="1" class="patch">
	<metadata>
		<title>expat-2.1.0-13.232 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-2625" ref_url="https://www.suse.com/security/cve/CVE-2009-2625/" source="CVE"/>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<reference ref_id="CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876/" source="CVE"/>
		<reference ref_id="CVE-2012-1147" ref_url="https://www.suse.com/security/cve/CVE-2012-1147/" source="CVE"/>
		<reference ref_id="CVE-2012-1148" ref_url="https://www.suse.com/security/cve/CVE-2012-1148/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.1.0-13.232 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2625/">CVE-2009-2625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1147/">CVE-2012-1147</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1148/">CVE-2012-1148</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141325" comment="expat-2.1.0-13.232 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141326" comment="libexpat1-2.1.0-13.232 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141327" comment="libexpat1-32bit-2.1.0-13.232 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75949" version="1" class="patch">
	<metadata>
		<title>facter-2.0.2-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-3248" ref_url="https://www.suse.com/security/cve/CVE-2014-3248/" source="CVE"/>
		<description>
These are all security issues fixed in the facter-2.0.2-6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3248/">CVE-2014-3248</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141860" comment="facter-2.0.2-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75950" version="1" class="patch">
	<metadata>
		<title>fetchmail-6.3.26-5.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-2666" ref_url="https://www.suse.com/security/cve/CVE-2009-2666/" source="CVE"/>
		<reference ref_id="CVE-2010-1167" ref_url="https://www.suse.com/security/cve/CVE-2010-1167/" source="CVE"/>
		<reference ref_id="CVE-2011-1947" ref_url="https://www.suse.com/security/cve/CVE-2011-1947/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2012-3482" ref_url="https://www.suse.com/security/cve/CVE-2012-3482/" source="CVE"/>
		<description>
These are all security issues fixed in the fetchmail-6.3.26-5.18 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2666/">CVE-2009-2666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1167/">CVE-2010-1167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1947/">CVE-2011-1947</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3482/">CVE-2012-3482</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141329" comment="fetchmail-6.3.26-5.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75951" version="1" class="patch">
	<metadata>
		<title>file-5.19-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2012-1571" ref_url="https://www.suse.com/security/cve/CVE-2012-1571/" source="CVE"/>
		<reference ref_id="CVE-2014-3710" ref_url="https://www.suse.com/security/cve/CVE-2014-3710/" source="CVE"/>
		<reference ref_id="CVE-2014-8116" ref_url="https://www.suse.com/security/cve/CVE-2014-8116/" source="CVE"/>
		<reference ref_id="CVE-2014-8117" ref_url="https://www.suse.com/security/cve/CVE-2014-8117/" source="CVE"/>
		<description>
These are all security issues fixed in the file-5.19-9.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1571/">CVE-2012-1571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3710/">CVE-2014-3710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8116/">CVE-2014-8116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8117/">CVE-2014-8117</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009103557" comment="file-5.19-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009103559" comment="file-magic-5.19-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009103561" comment="libmagic1-5.19-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009103560" comment="libmagic1-32bit-5.19-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75952" version="1" class="patch">
	<metadata>
		<title>finch-2.10.9-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-2694" ref_url="https://www.suse.com/security/cve/CVE-2009-2694/" source="CVE"/>
		<reference ref_id="CVE-2009-2703" ref_url="https://www.suse.com/security/cve/CVE-2009-2703/" source="CVE"/>
		<reference ref_id="CVE-2009-3026" ref_url="https://www.suse.com/security/cve/CVE-2009-3026/" source="CVE"/>
		<reference ref_id="CVE-2009-3083" ref_url="https://www.suse.com/security/cve/CVE-2009-3083/" source="CVE"/>
		<reference ref_id="CVE-2009-3084" ref_url="https://www.suse.com/security/cve/CVE-2009-3084/" source="CVE"/>
		<reference ref_id="CVE-2009-3085" ref_url="https://www.suse.com/security/cve/CVE-2009-3085/" source="CVE"/>
		<reference ref_id="CVE-2009-3615" ref_url="https://www.suse.com/security/cve/CVE-2009-3615/" source="CVE"/>
		<reference ref_id="CVE-2010-0013" ref_url="https://www.suse.com/security/cve/CVE-2010-0013/" source="CVE"/>
		<reference ref_id="CVE-2010-0277" ref_url="https://www.suse.com/security/cve/CVE-2010-0277/" source="CVE"/>
		<reference ref_id="CVE-2010-0420" ref_url="https://www.suse.com/security/cve/CVE-2010-0420/" source="CVE"/>
		<reference ref_id="CVE-2010-0423" ref_url="https://www.suse.com/security/cve/CVE-2010-0423/" source="CVE"/>
		<reference ref_id="CVE-2010-1624" ref_url="https://www.suse.com/security/cve/CVE-2010-1624/" source="CVE"/>
		<reference ref_id="CVE-2010-2528" ref_url="https://www.suse.com/security/cve/CVE-2010-2528/" source="CVE"/>
		<reference ref_id="CVE-2010-3711" ref_url="https://www.suse.com/security/cve/CVE-2010-3711/" source="CVE"/>
		<reference ref_id="CVE-2011-1091" ref_url="https://www.suse.com/security/cve/CVE-2011-1091/" source="CVE"/>
		<reference ref_id="CVE-2011-3594" ref_url="https://www.suse.com/security/cve/CVE-2011-3594/" source="CVE"/>
		<reference ref_id="CVE-2012-2214" ref_url="https://www.suse.com/security/cve/CVE-2012-2214/" source="CVE"/>
		<reference ref_id="CVE-2012-3374" ref_url="https://www.suse.com/security/cve/CVE-2012-3374/" source="CVE"/>
		<reference ref_id="CVE-2012-6152" ref_url="https://www.suse.com/security/cve/CVE-2012-6152/" source="CVE"/>
		<reference ref_id="CVE-2013-0271" ref_url="https://www.suse.com/security/cve/CVE-2013-0271/" source="CVE"/>
		<reference ref_id="CVE-2013-0272" ref_url="https://www.suse.com/security/cve/CVE-2013-0272/" source="CVE"/>
		<reference ref_id="CVE-2013-0273" ref_url="https://www.suse.com/security/cve/CVE-2013-0273/" source="CVE"/>
		<reference ref_id="CVE-2013-0274" ref_url="https://www.suse.com/security/cve/CVE-2013-0274/" source="CVE"/>
		<reference ref_id="CVE-2013-6477" ref_url="https://www.suse.com/security/cve/CVE-2013-6477/" source="CVE"/>
		<reference ref_id="CVE-2013-6478" ref_url="https://www.suse.com/security/cve/CVE-2013-6478/" source="CVE"/>
		<reference ref_id="CVE-2013-6479" ref_url="https://www.suse.com/security/cve/CVE-2013-6479/" source="CVE"/>
		<reference ref_id="CVE-2013-6481" ref_url="https://www.suse.com/security/cve/CVE-2013-6481/" source="CVE"/>
		<reference ref_id="CVE-2013-6482" ref_url="https://www.suse.com/security/cve/CVE-2013-6482/" source="CVE"/>
		<reference ref_id="CVE-2013-6483" ref_url="https://www.suse.com/security/cve/CVE-2013-6483/" source="CVE"/>
		<reference ref_id="CVE-2013-6484" ref_url="https://www.suse.com/security/cve/CVE-2013-6484/" source="CVE"/>
		<reference ref_id="CVE-2013-6485" ref_url="https://www.suse.com/security/cve/CVE-2013-6485/" source="CVE"/>
		<reference ref_id="CVE-2013-6486" ref_url="https://www.suse.com/security/cve/CVE-2013-6486/" source="CVE"/>
		<reference ref_id="CVE-2013-6487" ref_url="https://www.suse.com/security/cve/CVE-2013-6487/" source="CVE"/>
		<reference ref_id="CVE-2014-0020" ref_url="https://www.suse.com/security/cve/CVE-2014-0020/" source="CVE"/>
		<reference ref_id="CVE-2014-3695" ref_url="https://www.suse.com/security/cve/CVE-2014-3695/" source="CVE"/>
		<reference ref_id="CVE-2014-3696" ref_url="https://www.suse.com/security/cve/CVE-2014-3696/" source="CVE"/>
		<reference ref_id="CVE-2014-3698" ref_url="https://www.suse.com/security/cve/CVE-2014-3698/" source="CVE"/>
		<description>
These are all security issues fixed in the finch-2.10.9-8.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2694/">CVE-2009-2694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2703/">CVE-2009-2703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3026/">CVE-2009-3026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3083/">CVE-2009-3083</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3084/">CVE-2009-3084</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3085/">CVE-2009-3085</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3615/">CVE-2009-3615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0013/">CVE-2010-0013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0277/">CVE-2010-0277</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0420/">CVE-2010-0420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0423/">CVE-2010-0423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1624/">CVE-2010-1624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2528/">CVE-2010-2528</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3711/">CVE-2010-3711</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1091/">CVE-2011-1091</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3594/">CVE-2011-3594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2214/">CVE-2012-2214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3374/">CVE-2012-3374</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6152/">CVE-2012-6152</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0271/">CVE-2013-0271</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0272/">CVE-2013-0272</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0273/">CVE-2013-0273</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0274/">CVE-2013-0274</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6477/">CVE-2013-6477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6478/">CVE-2013-6478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6479/">CVE-2013-6479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6481/">CVE-2013-6481</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6482/">CVE-2013-6482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6483/">CVE-2013-6483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6484/">CVE-2013-6484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6485/">CVE-2013-6485</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-6486/">CVE-2013-6486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6487/">CVE-2013-6487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0020/">CVE-2014-0020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3695/">CVE-2014-3695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3696/">CVE-2014-3696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3698/">CVE-2014-3698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009102676" comment="finch-2.10.9-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102678" comment="libpurple-2.10.9-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102681" comment="libpurple-lang-2.10.9-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102682" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102683" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102684" comment="pidgin-2.10.9-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75953" version="1" class="patch">
	<metadata>
		<title>flash-player-11.2.202.548-111.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-4546" ref_url="https://www.suse.com/security/cve/CVE-2008-4546/" source="CVE"/>
		<reference ref_id="CVE-2009-0901" ref_url="https://www.suse.com/security/cve/CVE-2009-0901/" source="CVE"/>
		<reference ref_id="CVE-2009-1862" ref_url="https://www.suse.com/security/cve/CVE-2009-1862/" source="CVE"/>
		<reference ref_id="CVE-2009-1863" ref_url="https://www.suse.com/security/cve/CVE-2009-1863/" source="CVE"/>
		<reference ref_id="CVE-2009-1864" ref_url="https://www.suse.com/security/cve/CVE-2009-1864/" source="CVE"/>
		<reference ref_id="CVE-2009-1865" ref_url="https://www.suse.com/security/cve/CVE-2009-1865/" source="CVE"/>
		<reference ref_id="CVE-2009-1866" ref_url="https://www.suse.com/security/cve/CVE-2009-1866/" source="CVE"/>
		<reference ref_id="CVE-2009-1867" ref_url="https://www.suse.com/security/cve/CVE-2009-1867/" source="CVE"/>
		<reference ref_id="CVE-2009-1868" ref_url="https://www.suse.com/security/cve/CVE-2009-1868/" source="CVE"/>
		<reference ref_id="CVE-2009-1869" ref_url="https://www.suse.com/security/cve/CVE-2009-1869/" source="CVE"/>
		<reference ref_id="CVE-2009-1870" ref_url="https://www.suse.com/security/cve/CVE-2009-1870/" source="CVE"/>
		<reference ref_id="CVE-2009-2395" ref_url="https://www.suse.com/security/cve/CVE-2009-2395/" source="CVE"/>
		<reference ref_id="CVE-2009-2493" ref_url="https://www.suse.com/security/cve/CVE-2009-2493/" source="CVE"/>
		<reference ref_id="CVE-2009-3793" ref_url="https://www.suse.com/security/cve/CVE-2009-3793/" source="CVE"/>
		<reference ref_id="CVE-2009-3794" ref_url="https://www.suse.com/security/cve/CVE-2009-3794/" source="CVE"/>
		<reference ref_id="CVE-2009-3796" ref_url="https://www.suse.com/security/cve/CVE-2009-3796/" source="CVE"/>
		<reference ref_id="CVE-2009-3797" ref_url="https://www.suse.com/security/cve/CVE-2009-3797/" source="CVE"/>
		<reference ref_id="CVE-2009-3798" ref_url="https://www.suse.com/security/cve/CVE-2009-3798/" source="CVE"/>
		<reference ref_id="CVE-2009-3799" ref_url="https://www.suse.com/security/cve/CVE-2009-3799/" source="CVE"/>
		<reference ref_id="CVE-2009-3800" ref_url="https://www.suse.com/security/cve/CVE-2009-3800/" source="CVE"/>
		<reference ref_id="CVE-2009-3951" ref_url="https://www.suse.com/security/cve/CVE-2009-3951/" source="CVE"/>
		<reference ref_id="CVE-2010-0186" ref_url="https://www.suse.com/security/cve/CVE-2010-0186/" source="CVE"/>
		<reference ref_id="CVE-2010-0187" ref_url="https://www.suse.com/security/cve/CVE-2010-0187/" source="CVE"/>
		<reference ref_id="CVE-2010-0209" ref_url="https://www.suse.com/security/cve/CVE-2010-0209/" source="CVE"/>
		<reference ref_id="CVE-2010-1297" ref_url="https://www.suse.com/security/cve/CVE-2010-1297/" source="CVE"/>
		<reference ref_id="CVE-2010-2160" ref_url="https://www.suse.com/security/cve/CVE-2010-2160/" source="CVE"/>
		<reference ref_id="CVE-2010-2161" ref_url="https://www.suse.com/security/cve/CVE-2010-2161/" source="CVE"/>
		<reference ref_id="CVE-2010-2162" ref_url="https://www.suse.com/security/cve/CVE-2010-2162/" source="CVE"/>
		<reference ref_id="CVE-2010-2163" ref_url="https://www.suse.com/security/cve/CVE-2010-2163/" source="CVE"/>
		<reference ref_id="CVE-2010-2164" ref_url="https://www.suse.com/security/cve/CVE-2010-2164/" source="CVE"/>
		<reference ref_id="CVE-2010-2165" ref_url="https://www.suse.com/security/cve/CVE-2010-2165/" source="CVE"/>
		<reference ref_id="CVE-2010-2166" ref_url="https://www.suse.com/security/cve/CVE-2010-2166/" source="CVE"/>
		<reference ref_id="CVE-2010-2167" ref_url="https://www.suse.com/security/cve/CVE-2010-2167/" source="CVE"/>
		<reference ref_id="CVE-2010-2169" ref_url="https://www.suse.com/security/cve/CVE-2010-2169/" source="CVE"/>
		<reference ref_id="CVE-2010-2170" ref_url="https://www.suse.com/security/cve/CVE-2010-2170/" source="CVE"/>
		<reference ref_id="CVE-2010-2171" ref_url="https://www.suse.com/security/cve/CVE-2010-2171/" source="CVE"/>
		<reference ref_id="CVE-2010-2172" ref_url="https://www.suse.com/security/cve/CVE-2010-2172/" source="CVE"/>
		<reference ref_id="CVE-2010-2173" ref_url="https://www.suse.com/security/cve/CVE-2010-2173/" source="CVE"/>
		<reference ref_id="CVE-2010-2174" ref_url="https://www.suse.com/security/cve/CVE-2010-2174/" source="CVE"/>
		<reference ref_id="CVE-2010-2175" ref_url="https://www.suse.com/security/cve/CVE-2010-2175/" source="CVE"/>
		<reference ref_id="CVE-2010-2176" ref_url="https://www.suse.com/security/cve/CVE-2010-2176/" source="CVE"/>
		<reference ref_id="CVE-2010-2177" ref_url="https://www.suse.com/security/cve/CVE-2010-2177/" source="CVE"/>
		<reference ref_id="CVE-2010-2178" ref_url="https://www.suse.com/security/cve/CVE-2010-2178/" source="CVE"/>
		<reference ref_id="CVE-2010-2179" ref_url="https://www.suse.com/security/cve/CVE-2010-2179/" source="CVE"/>
		<reference ref_id="CVE-2010-2180" ref_url="https://www.suse.com/security/cve/CVE-2010-2180/" source="CVE"/>
		<reference ref_id="CVE-2010-2181" ref_url="https://www.suse.com/security/cve/CVE-2010-2181/" source="CVE"/>
		<reference ref_id="CVE-2010-2182" ref_url="https://www.suse.com/security/cve/CVE-2010-2182/" source="CVE"/>
		<reference ref_id="CVE-2010-2183" ref_url="https://www.suse.com/security/cve/CVE-2010-2183/" source="CVE"/>
		<reference ref_id="CVE-2010-2184" ref_url="https://www.suse.com/security/cve/CVE-2010-2184/" source="CVE"/>
		<reference ref_id="CVE-2010-2185" ref_url="https://www.suse.com/security/cve/CVE-2010-2185/" source="CVE"/>
		<reference ref_id="CVE-2010-2186" ref_url="https://www.suse.com/security/cve/CVE-2010-2186/" source="CVE"/>
		<reference ref_id="CVE-2010-2187" ref_url="https://www.suse.com/security/cve/CVE-2010-2187/" source="CVE"/>
		<reference ref_id="CVE-2010-2188" ref_url="https://www.suse.com/security/cve/CVE-2010-2188/" source="CVE"/>
		<reference ref_id="CVE-2010-2189" ref_url="https://www.suse.com/security/cve/CVE-2010-2189/" source="CVE"/>
		<reference ref_id="CVE-2010-2213" ref_url="https://www.suse.com/security/cve/CVE-2010-2213/" source="CVE"/>
		<reference ref_id="CVE-2010-2214" ref_url="https://www.suse.com/security/cve/CVE-2010-2214/" source="CVE"/>
		<reference ref_id="CVE-2010-2216" ref_url="https://www.suse.com/security/cve/CVE-2010-2216/" source="CVE"/>
		<reference ref_id="CVE-2010-2884" ref_url="https://www.suse.com/security/cve/CVE-2010-2884/" source="CVE"/>
		<reference ref_id="CVE-2010-3654" ref_url="https://www.suse.com/security/cve/CVE-2010-3654/" source="CVE"/>
		<reference ref_id="CVE-2011-0558" ref_url="https://www.suse.com/security/cve/CVE-2011-0558/" source="CVE"/>
		<reference ref_id="CVE-2011-0559" ref_url="https://www.suse.com/security/cve/CVE-2011-0559/" source="CVE"/>
		<reference ref_id="CVE-2011-0560" ref_url="https://www.suse.com/security/cve/CVE-2011-0560/" source="CVE"/>
		<reference ref_id="CVE-2011-0561" ref_url="https://www.suse.com/security/cve/CVE-2011-0561/" source="CVE"/>
		<reference ref_id="CVE-2011-0571" ref_url="https://www.suse.com/security/cve/CVE-2011-0571/" source="CVE"/>
		<reference ref_id="CVE-2011-0572" ref_url="https://www.suse.com/security/cve/CVE-2011-0572/" source="CVE"/>
		<reference ref_id="CVE-2011-0573" ref_url="https://www.suse.com/security/cve/CVE-2011-0573/" source="CVE"/>
		<reference ref_id="CVE-2011-0574" ref_url="https://www.suse.com/security/cve/CVE-2011-0574/" source="CVE"/>
		<reference ref_id="CVE-2011-0575" ref_url="https://www.suse.com/security/cve/CVE-2011-0575/" source="CVE"/>
		<reference ref_id="CVE-2011-0577" ref_url="https://www.suse.com/security/cve/CVE-2011-0577/" source="CVE"/>
		<reference ref_id="CVE-2011-0578" ref_url="https://www.suse.com/security/cve/CVE-2011-0578/" source="CVE"/>
		<reference ref_id="CVE-2011-0589" ref_url="https://www.suse.com/security/cve/CVE-2011-0589/" source="CVE"/>
		<reference ref_id="CVE-2011-0607" ref_url="https://www.suse.com/security/cve/CVE-2011-0607/" source="CVE"/>
		<reference ref_id="CVE-2011-0608" ref_url="https://www.suse.com/security/cve/CVE-2011-0608/" source="CVE"/>
		<reference ref_id="CVE-2011-0609" ref_url="https://www.suse.com/security/cve/CVE-2011-0609/" source="CVE"/>
		<reference ref_id="CVE-2011-0611" ref_url="https://www.suse.com/security/cve/CVE-2011-0611/" source="CVE"/>
		<reference ref_id="CVE-2011-0618" ref_url="https://www.suse.com/security/cve/CVE-2011-0618/" source="CVE"/>
		<reference ref_id="CVE-2011-0619" ref_url="https://www.suse.com/security/cve/CVE-2011-0619/" source="CVE"/>
		<reference ref_id="CVE-2011-0620" ref_url="https://www.suse.com/security/cve/CVE-2011-0620/" source="CVE"/>
		<reference ref_id="CVE-2011-0621" ref_url="https://www.suse.com/security/cve/CVE-2011-0621/" source="CVE"/>
		<reference ref_id="CVE-2011-0622" ref_url="https://www.suse.com/security/cve/CVE-2011-0622/" source="CVE"/>
		<reference ref_id="CVE-2011-0623" ref_url="https://www.suse.com/security/cve/CVE-2011-0623/" source="CVE"/>
		<reference ref_id="CVE-2011-0624" ref_url="https://www.suse.com/security/cve/CVE-2011-0624/" source="CVE"/>
		<reference ref_id="CVE-2011-0625" ref_url="https://www.suse.com/security/cve/CVE-2011-0625/" source="CVE"/>
		<reference ref_id="CVE-2011-0626" ref_url="https://www.suse.com/security/cve/CVE-2011-0626/" source="CVE"/>
		<reference ref_id="CVE-2011-0627" ref_url="https://www.suse.com/security/cve/CVE-2011-0627/" source="CVE"/>
		<reference ref_id="CVE-2011-2107" ref_url="https://www.suse.com/security/cve/CVE-2011-2107/" source="CVE"/>
		<reference ref_id="CVE-2011-2110" ref_url="https://www.suse.com/security/cve/CVE-2011-2110/" source="CVE"/>
		<reference ref_id="CVE-2011-2130" ref_url="https://www.suse.com/security/cve/CVE-2011-2130/" source="CVE"/>
		<reference ref_id="CVE-2011-2134" ref_url="https://www.suse.com/security/cve/CVE-2011-2134/" source="CVE"/>
		<reference ref_id="CVE-2011-2135" ref_url="https://www.suse.com/security/cve/CVE-2011-2135/" source="CVE"/>
		<reference ref_id="CVE-2011-2136" ref_url="https://www.suse.com/security/cve/CVE-2011-2136/" source="CVE"/>
		<reference ref_id="CVE-2011-2137" ref_url="https://www.suse.com/security/cve/CVE-2011-2137/" source="CVE"/>
		<reference ref_id="CVE-2011-2138" ref_url="https://www.suse.com/security/cve/CVE-2011-2138/" source="CVE"/>
		<reference ref_id="CVE-2011-2139" ref_url="https://www.suse.com/security/cve/CVE-2011-2139/" source="CVE"/>
		<reference ref_id="CVE-2011-2140" ref_url="https://www.suse.com/security/cve/CVE-2011-2140/" source="CVE"/>
		<reference ref_id="CVE-2011-2414" ref_url="https://www.suse.com/security/cve/CVE-2011-2414/" source="CVE"/>
		<reference ref_id="CVE-2011-2415" ref_url="https://www.suse.com/security/cve/CVE-2011-2415/" source="CVE"/>
		<reference ref_id="CVE-2011-2416" ref_url="https://www.suse.com/security/cve/CVE-2011-2416/" source="CVE"/>
		<reference ref_id="CVE-2011-2417" ref_url="https://www.suse.com/security/cve/CVE-2011-2417/" source="CVE"/>
		<reference ref_id="CVE-2011-2425" ref_url="https://www.suse.com/security/cve/CVE-2011-2425/" source="CVE"/>
		<reference ref_id="CVE-2011-2445" ref_url="https://www.suse.com/security/cve/CVE-2011-2445/" source="CVE"/>
		<reference ref_id="CVE-2011-2450" ref_url="https://www.suse.com/security/cve/CVE-2011-2450/" source="CVE"/>
		<reference ref_id="CVE-2011-2451" ref_url="https://www.suse.com/security/cve/CVE-2011-2451/" source="CVE"/>
		<reference ref_id="CVE-2011-2452" ref_url="https://www.suse.com/security/cve/CVE-2011-2452/" source="CVE"/>
		<reference ref_id="CVE-2011-2453" ref_url="https://www.suse.com/security/cve/CVE-2011-2453/" source="CVE"/>
		<reference ref_id="CVE-2011-2454" ref_url="https://www.suse.com/security/cve/CVE-2011-2454/" source="CVE"/>
		<reference ref_id="CVE-2011-2455" ref_url="https://www.suse.com/security/cve/CVE-2011-2455/" source="CVE"/>
		<reference ref_id="CVE-2011-2456" ref_url="https://www.suse.com/security/cve/CVE-2011-2456/" source="CVE"/>
		<reference ref_id="CVE-2011-2457" ref_url="https://www.suse.com/security/cve/CVE-2011-2457/" source="CVE"/>
		<reference ref_id="CVE-2011-2458" ref_url="https://www.suse.com/security/cve/CVE-2011-2458/" source="CVE"/>
		<reference ref_id="CVE-2011-2459" ref_url="https://www.suse.com/security/cve/CVE-2011-2459/" source="CVE"/>
		<reference ref_id="CVE-2011-2460" ref_url="https://www.suse.com/security/cve/CVE-2011-2460/" source="CVE"/>
		<reference ref_id="CVE-2012-0751" ref_url="https://www.suse.com/security/cve/CVE-2012-0751/" source="CVE"/>
		<reference ref_id="CVE-2012-0752" ref_url="https://www.suse.com/security/cve/CVE-2012-0752/" source="CVE"/>
		<reference ref_id="CVE-2012-0753" ref_url="https://www.suse.com/security/cve/CVE-2012-0753/" source="CVE"/>
		<reference ref_id="CVE-2012-0754" ref_url="https://www.suse.com/security/cve/CVE-2012-0754/" source="CVE"/>
		<reference ref_id="CVE-2012-0755" ref_url="https://www.suse.com/security/cve/CVE-2012-0755/" source="CVE"/>
		<reference ref_id="CVE-2012-0756" ref_url="https://www.suse.com/security/cve/CVE-2012-0756/" source="CVE"/>
		<reference ref_id="CVE-2012-0767" ref_url="https://www.suse.com/security/cve/CVE-2012-0767/" source="CVE"/>
		<reference ref_id="CVE-2012-0768" ref_url="https://www.suse.com/security/cve/CVE-2012-0768/" source="CVE"/>
		<reference ref_id="CVE-2012-0769" ref_url="https://www.suse.com/security/cve/CVE-2012-0769/" source="CVE"/>
		<reference ref_id="CVE-2012-0773" ref_url="https://www.suse.com/security/cve/CVE-2012-0773/" source="CVE"/>
		<reference ref_id="CVE-2012-0779" ref_url="https://www.suse.com/security/cve/CVE-2012-0779/" source="CVE"/>
		<reference ref_id="CVE-2012-1535" ref_url="https://www.suse.com/security/cve/CVE-2012-1535/" source="CVE"/>
		<reference ref_id="CVE-2012-2034" ref_url="https://www.suse.com/security/cve/CVE-2012-2034/" source="CVE"/>
		<reference ref_id="CVE-2012-2035" ref_url="https://www.suse.com/security/cve/CVE-2012-2035/" source="CVE"/>
		<reference ref_id="CVE-2012-2036" ref_url="https://www.suse.com/security/cve/CVE-2012-2036/" source="CVE"/>
		<reference ref_id="CVE-2012-2037" ref_url="https://www.suse.com/security/cve/CVE-2012-2037/" source="CVE"/>
		<reference ref_id="CVE-2012-2038" ref_url="https://www.suse.com/security/cve/CVE-2012-2038/" source="CVE"/>
		<reference ref_id="CVE-2012-2039" ref_url="https://www.suse.com/security/cve/CVE-2012-2039/" source="CVE"/>
		<reference ref_id="CVE-2012-2040" ref_url="https://www.suse.com/security/cve/CVE-2012-2040/" source="CVE"/>
		<reference ref_id="CVE-2012-5248" ref_url="https://www.suse.com/security/cve/CVE-2012-5248/" source="CVE"/>
		<reference ref_id="CVE-2012-5249" ref_url="https://www.suse.com/security/cve/CVE-2012-5249/" source="CVE"/>
		<reference ref_id="CVE-2012-5250" ref_url="https://www.suse.com/security/cve/CVE-2012-5250/" source="CVE"/>
		<reference ref_id="CVE-2012-5251" ref_url="https://www.suse.com/security/cve/CVE-2012-5251/" source="CVE"/>
		<reference ref_id="CVE-2012-5252" ref_url="https://www.suse.com/security/cve/CVE-2012-5252/" source="CVE"/>
		<reference ref_id="CVE-2012-5253" ref_url="https://www.suse.com/security/cve/CVE-2012-5253/" source="CVE"/>
		<reference ref_id="CVE-2012-5254" ref_url="https://www.suse.com/security/cve/CVE-2012-5254/" source="CVE"/>
		<reference ref_id="CVE-2012-5255" ref_url="https://www.suse.com/security/cve/CVE-2012-5255/" source="CVE"/>
		<reference ref_id="CVE-2012-5256" ref_url="https://www.suse.com/security/cve/CVE-2012-5256/" source="CVE"/>
		<reference ref_id="CVE-2012-5257" ref_url="https://www.suse.com/security/cve/CVE-2012-5257/" source="CVE"/>
		<reference ref_id="CVE-2012-5258" ref_url="https://www.suse.com/security/cve/CVE-2012-5258/" source="CVE"/>
		<reference ref_id="CVE-2012-5259" ref_url="https://www.suse.com/security/cve/CVE-2012-5259/" source="CVE"/>
		<reference ref_id="CVE-2012-5260" ref_url="https://www.suse.com/security/cve/CVE-2012-5260/" source="CVE"/>
		<reference ref_id="CVE-2012-5261" ref_url="https://www.suse.com/security/cve/CVE-2012-5261/" source="CVE"/>
		<reference ref_id="CVE-2012-5262" ref_url="https://www.suse.com/security/cve/CVE-2012-5262/" source="CVE"/>
		<reference ref_id="CVE-2012-5263" ref_url="https://www.suse.com/security/cve/CVE-2012-5263/" source="CVE"/>
		<reference ref_id="CVE-2012-5264" ref_url="https://www.suse.com/security/cve/CVE-2012-5264/" source="CVE"/>
		<reference ref_id="CVE-2012-5265" ref_url="https://www.suse.com/security/cve/CVE-2012-5265/" source="CVE"/>
		<reference ref_id="CVE-2012-5266" ref_url="https://www.suse.com/security/cve/CVE-2012-5266/" source="CVE"/>
		<reference ref_id="CVE-2012-5267" ref_url="https://www.suse.com/security/cve/CVE-2012-5267/" source="CVE"/>
		<reference ref_id="CVE-2012-5268" ref_url="https://www.suse.com/security/cve/CVE-2012-5268/" source="CVE"/>
		<reference ref_id="CVE-2012-5269" ref_url="https://www.suse.com/security/cve/CVE-2012-5269/" source="CVE"/>
		<reference ref_id="CVE-2012-5270" ref_url="https://www.suse.com/security/cve/CVE-2012-5270/" source="CVE"/>
		<reference ref_id="CVE-2012-5271" ref_url="https://www.suse.com/security/cve/CVE-2012-5271/" source="CVE"/>
		<reference ref_id="CVE-2012-5272" ref_url="https://www.suse.com/security/cve/CVE-2012-5272/" source="CVE"/>
		<reference ref_id="CVE-2012-5274" ref_url="https://www.suse.com/security/cve/CVE-2012-5274/" source="CVE"/>
		<reference ref_id="CVE-2012-5275" ref_url="https://www.suse.com/security/cve/CVE-2012-5275/" source="CVE"/>
		<reference ref_id="CVE-2012-5276" ref_url="https://www.suse.com/security/cve/CVE-2012-5276/" source="CVE"/>
		<reference ref_id="CVE-2012-5277" ref_url="https://www.suse.com/security/cve/CVE-2012-5277/" source="CVE"/>
		<reference ref_id="CVE-2012-5278" ref_url="https://www.suse.com/security/cve/CVE-2012-5278/" source="CVE"/>
		<reference ref_id="CVE-2012-5279" ref_url="https://www.suse.com/security/cve/CVE-2012-5279/" source="CVE"/>
		<reference ref_id="CVE-2012-5280" ref_url="https://www.suse.com/security/cve/CVE-2012-5280/" source="CVE"/>
		<reference ref_id="CVE-2012-5676" ref_url="https://www.suse.com/security/cve/CVE-2012-5676/" source="CVE"/>
		<reference ref_id="CVE-2012-5677" ref_url="https://www.suse.com/security/cve/CVE-2012-5677/" source="CVE"/>
		<reference ref_id="CVE-2012-5678" ref_url="https://www.suse.com/security/cve/CVE-2012-5678/" source="CVE"/>
		<reference ref_id="CVE-2013-0504" ref_url="https://www.suse.com/security/cve/CVE-2013-0504/" source="CVE"/>
		<reference ref_id="CVE-2013-0630" ref_url="https://www.suse.com/security/cve/CVE-2013-0630/" source="CVE"/>
		<reference ref_id="CVE-2013-0633" ref_url="https://www.suse.com/security/cve/CVE-2013-0633/" source="CVE"/>
		<reference ref_id="CVE-2013-0634" ref_url="https://www.suse.com/security/cve/CVE-2013-0634/" source="CVE"/>
		<reference ref_id="CVE-2013-0637" ref_url="https://www.suse.com/security/cve/CVE-2013-0637/" source="CVE"/>
		<reference ref_id="CVE-2013-0638" ref_url="https://www.suse.com/security/cve/CVE-2013-0638/" source="CVE"/>
		<reference ref_id="CVE-2013-0639" ref_url="https://www.suse.com/security/cve/CVE-2013-0639/" source="CVE"/>
		<reference ref_id="CVE-2013-0642" ref_url="https://www.suse.com/security/cve/CVE-2013-0642/" source="CVE"/>
		<reference ref_id="CVE-2013-0643" ref_url="https://www.suse.com/security/cve/CVE-2013-0643/" source="CVE"/>
		<reference ref_id="CVE-2013-0644" ref_url="https://www.suse.com/security/cve/CVE-2013-0644/" source="CVE"/>
		<reference ref_id="CVE-2013-0645" ref_url="https://www.suse.com/security/cve/CVE-2013-0645/" source="CVE"/>
		<reference ref_id="CVE-2013-0646" ref_url="https://www.suse.com/security/cve/CVE-2013-0646/" source="CVE"/>
		<reference ref_id="CVE-2013-0647" ref_url="https://www.suse.com/security/cve/CVE-2013-0647/" source="CVE"/>
		<reference ref_id="CVE-2013-0648" ref_url="https://www.suse.com/security/cve/CVE-2013-0648/" source="CVE"/>
		<reference ref_id="CVE-2013-0649" ref_url="https://www.suse.com/security/cve/CVE-2013-0649/" source="CVE"/>
		<reference ref_id="CVE-2013-0650" ref_url="https://www.suse.com/security/cve/CVE-2013-0650/" source="CVE"/>
		<reference ref_id="CVE-2013-1365" ref_url="https://www.suse.com/security/cve/CVE-2013-1365/" source="CVE"/>
		<reference ref_id="CVE-2013-1366" ref_url="https://www.suse.com/security/cve/CVE-2013-1366/" source="CVE"/>
		<reference ref_id="CVE-2013-1367" ref_url="https://www.suse.com/security/cve/CVE-2013-1367/" source="CVE"/>
		<reference ref_id="CVE-2013-1368" ref_url="https://www.suse.com/security/cve/CVE-2013-1368/" source="CVE"/>
		<reference ref_id="CVE-2013-1369" ref_url="https://www.suse.com/security/cve/CVE-2013-1369/" source="CVE"/>
		<reference ref_id="CVE-2013-1370" ref_url="https://www.suse.com/security/cve/CVE-2013-1370/" source="CVE"/>
		<reference ref_id="CVE-2013-1371" ref_url="https://www.suse.com/security/cve/CVE-2013-1371/" source="CVE"/>
		<reference ref_id="CVE-2013-1372" ref_url="https://www.suse.com/security/cve/CVE-2013-1372/" source="CVE"/>
		<reference ref_id="CVE-2013-1373" ref_url="https://www.suse.com/security/cve/CVE-2013-1373/" source="CVE"/>
		<reference ref_id="CVE-2013-1374" ref_url="https://www.suse.com/security/cve/CVE-2013-1374/" source="CVE"/>
		<reference ref_id="CVE-2013-1375" ref_url="https://www.suse.com/security/cve/CVE-2013-1375/" source="CVE"/>
		<reference ref_id="CVE-2013-1378" ref_url="https://www.suse.com/security/cve/CVE-2013-1378/" source="CVE"/>
		<reference ref_id="CVE-2013-1379" ref_url="https://www.suse.com/security/cve/CVE-2013-1379/" source="CVE"/>
		<reference ref_id="CVE-2013-1380" ref_url="https://www.suse.com/security/cve/CVE-2013-1380/" source="CVE"/>
		<reference ref_id="CVE-2013-2555" ref_url="https://www.suse.com/security/cve/CVE-2013-2555/" source="CVE"/>
		<reference ref_id="CVE-2013-2728" ref_url="https://www.suse.com/security/cve/CVE-2013-2728/" source="CVE"/>
		<reference ref_id="CVE-2013-3324" ref_url="https://www.suse.com/security/cve/CVE-2013-3324/" source="CVE"/>
		<reference ref_id="CVE-2013-3325" ref_url="https://www.suse.com/security/cve/CVE-2013-3325/" source="CVE"/>
		<reference ref_id="CVE-2013-3326" ref_url="https://www.suse.com/security/cve/CVE-2013-3326/" source="CVE"/>
		<reference ref_id="CVE-2013-3327" ref_url="https://www.suse.com/security/cve/CVE-2013-3327/" source="CVE"/>
		<reference ref_id="CVE-2013-3328" ref_url="https://www.suse.com/security/cve/CVE-2013-3328/" source="CVE"/>
		<reference ref_id="CVE-2013-3329" ref_url="https://www.suse.com/security/cve/CVE-2013-3329/" source="CVE"/>
		<reference ref_id="CVE-2013-3330" ref_url="https://www.suse.com/security/cve/CVE-2013-3330/" source="CVE"/>
		<reference ref_id="CVE-2013-3331" ref_url="https://www.suse.com/security/cve/CVE-2013-3331/" source="CVE"/>
		<reference ref_id="CVE-2013-3332" ref_url="https://www.suse.com/security/cve/CVE-2013-3332/" source="CVE"/>
		<reference ref_id="CVE-2013-3333" ref_url="https://www.suse.com/security/cve/CVE-2013-3333/" source="CVE"/>
		<reference ref_id="CVE-2013-3334" ref_url="https://www.suse.com/security/cve/CVE-2013-3334/" source="CVE"/>
		<reference ref_id="CVE-2013-3335" ref_url="https://www.suse.com/security/cve/CVE-2013-3335/" source="CVE"/>
		<reference ref_id="CVE-2013-3343" ref_url="https://www.suse.com/security/cve/CVE-2013-3343/" source="CVE"/>
		<reference ref_id="CVE-2013-3344" ref_url="https://www.suse.com/security/cve/CVE-2013-3344/" source="CVE"/>
		<reference ref_id="CVE-2013-3345" ref_url="https://www.suse.com/security/cve/CVE-2013-3345/" source="CVE"/>
		<reference ref_id="CVE-2013-3347" ref_url="https://www.suse.com/security/cve/CVE-2013-3347/" source="CVE"/>
		<reference ref_id="CVE-2013-3361" ref_url="https://www.suse.com/security/cve/CVE-2013-3361/" source="CVE"/>
		<reference ref_id="CVE-2013-3362" ref_url="https://www.suse.com/security/cve/CVE-2013-3362/" source="CVE"/>
		<reference ref_id="CVE-2013-3363" ref_url="https://www.suse.com/security/cve/CVE-2013-3363/" source="CVE"/>
		<reference ref_id="CVE-2013-5324" ref_url="https://www.suse.com/security/cve/CVE-2013-5324/" source="CVE"/>
		<reference ref_id="CVE-2013-5329" ref_url="https://www.suse.com/security/cve/CVE-2013-5329/" source="CVE"/>
		<reference ref_id="CVE-2013-5330" ref_url="https://www.suse.com/security/cve/CVE-2013-5330/" source="CVE"/>
		<reference ref_id="CVE-2013-5331" ref_url="https://www.suse.com/security/cve/CVE-2013-5331/" source="CVE"/>
		<reference ref_id="CVE-2013-5332" ref_url="https://www.suse.com/security/cve/CVE-2013-5332/" source="CVE"/>
		<reference ref_id="CVE-2014-0491" ref_url="https://www.suse.com/security/cve/CVE-2014-0491/" source="CVE"/>
		<reference ref_id="CVE-2014-0492" ref_url="https://www.suse.com/security/cve/CVE-2014-0492/" source="CVE"/>
		<reference ref_id="CVE-2014-0497" ref_url="https://www.suse.com/security/cve/CVE-2014-0497/" source="CVE"/>
		<reference ref_id="CVE-2014-0498" ref_url="https://www.suse.com/security/cve/CVE-2014-0498/" source="CVE"/>
		<reference ref_id="CVE-2014-0499" ref_url="https://www.suse.com/security/cve/CVE-2014-0499/" source="CVE"/>
		<reference ref_id="CVE-2014-0502" ref_url="https://www.suse.com/security/cve/CVE-2014-0502/" source="CVE"/>
		<reference ref_id="CVE-2014-0503" ref_url="https://www.suse.com/security/cve/CVE-2014-0503/" source="CVE"/>
		<reference ref_id="CVE-2014-0506" ref_url="https://www.suse.com/security/cve/CVE-2014-0506/" source="CVE"/>
		<reference ref_id="CVE-2014-0507" ref_url="https://www.suse.com/security/cve/CVE-2014-0507/" source="CVE"/>
		<reference ref_id="CVE-2014-0508" ref_url="https://www.suse.com/security/cve/CVE-2014-0508/" source="CVE"/>
		<reference ref_id="CVE-2014-0509" ref_url="https://www.suse.com/security/cve/CVE-2014-0509/" source="CVE"/>
		<reference ref_id="CVE-2014-0515" ref_url="https://www.suse.com/security/cve/CVE-2014-0515/" source="CVE"/>
		<reference ref_id="CVE-2014-0516" ref_url="https://www.suse.com/security/cve/CVE-2014-0516/" source="CVE"/>
		<reference ref_id="CVE-2014-0517" ref_url="https://www.suse.com/security/cve/CVE-2014-0517/" source="CVE"/>
		<reference ref_id="CVE-2014-0518" ref_url="https://www.suse.com/security/cve/CVE-2014-0518/" source="CVE"/>
		<reference ref_id="CVE-2014-0519" ref_url="https://www.suse.com/security/cve/CVE-2014-0519/" source="CVE"/>
		<reference ref_id="CVE-2014-0520" ref_url="https://www.suse.com/security/cve/CVE-2014-0520/" source="CVE"/>
		<reference ref_id="CVE-2014-0531" ref_url="https://www.suse.com/security/cve/CVE-2014-0531/" source="CVE"/>
		<reference ref_id="CVE-2014-0532" ref_url="https://www.suse.com/security/cve/CVE-2014-0532/" source="CVE"/>
		<reference ref_id="CVE-2014-0533" ref_url="https://www.suse.com/security/cve/CVE-2014-0533/" source="CVE"/>
		<reference ref_id="CVE-2014-0534" ref_url="https://www.suse.com/security/cve/CVE-2014-0534/" source="CVE"/>
		<reference ref_id="CVE-2014-0535" ref_url="https://www.suse.com/security/cve/CVE-2014-0535/" source="CVE"/>
		<reference ref_id="CVE-2014-0536" ref_url="https://www.suse.com/security/cve/CVE-2014-0536/" source="CVE"/>
		<reference ref_id="CVE-2014-0537" ref_url="https://www.suse.com/security/cve/CVE-2014-0537/" source="CVE"/>
		<reference ref_id="CVE-2014-0538" ref_url="https://www.suse.com/security/cve/CVE-2014-0538/" source="CVE"/>
		<reference ref_id="CVE-2014-0539" ref_url="https://www.suse.com/security/cve/CVE-2014-0539/" source="CVE"/>
		<reference ref_id="CVE-2014-0540" ref_url="https://www.suse.com/security/cve/CVE-2014-0540/" source="CVE"/>
		<reference ref_id="CVE-2014-0541" ref_url="https://www.suse.com/security/cve/CVE-2014-0541/" source="CVE"/>
		<reference ref_id="CVE-2014-0542" ref_url="https://www.suse.com/security/cve/CVE-2014-0542/" source="CVE"/>
		<reference ref_id="CVE-2014-0543" ref_url="https://www.suse.com/security/cve/CVE-2014-0543/" source="CVE"/>
		<reference ref_id="CVE-2014-0544" ref_url="https://www.suse.com/security/cve/CVE-2014-0544/" source="CVE"/>
		<reference ref_id="CVE-2014-0545" ref_url="https://www.suse.com/security/cve/CVE-2014-0545/" source="CVE"/>
		<reference ref_id="CVE-2014-0547" ref_url="https://www.suse.com/security/cve/CVE-2014-0547/" source="CVE"/>
		<reference ref_id="CVE-2014-0548" ref_url="https://www.suse.com/security/cve/CVE-2014-0548/" source="CVE"/>
		<reference ref_id="CVE-2014-0549" ref_url="https://www.suse.com/security/cve/CVE-2014-0549/" source="CVE"/>
		<reference ref_id="CVE-2014-0550" ref_url="https://www.suse.com/security/cve/CVE-2014-0550/" source="CVE"/>
		<reference ref_id="CVE-2014-0551" ref_url="https://www.suse.com/security/cve/CVE-2014-0551/" source="CVE"/>
		<reference ref_id="CVE-2014-0552" ref_url="https://www.suse.com/security/cve/CVE-2014-0552/" source="CVE"/>
		<reference ref_id="CVE-2014-0553" ref_url="https://www.suse.com/security/cve/CVE-2014-0553/" source="CVE"/>
		<reference ref_id="CVE-2014-0554" ref_url="https://www.suse.com/security/cve/CVE-2014-0554/" source="CVE"/>
		<reference ref_id="CVE-2014-0555" ref_url="https://www.suse.com/security/cve/CVE-2014-0555/" source="CVE"/>
		<reference ref_id="CVE-2014-0556" ref_url="https://www.suse.com/security/cve/CVE-2014-0556/" source="CVE"/>
		<reference ref_id="CVE-2014-0557" ref_url="https://www.suse.com/security/cve/CVE-2014-0557/" source="CVE"/>
		<reference ref_id="CVE-2014-0558" ref_url="https://www.suse.com/security/cve/CVE-2014-0558/" source="CVE"/>
		<reference ref_id="CVE-2014-0559" ref_url="https://www.suse.com/security/cve/CVE-2014-0559/" source="CVE"/>
		<reference ref_id="CVE-2014-0564" ref_url="https://www.suse.com/security/cve/CVE-2014-0564/" source="CVE"/>
		<reference ref_id="CVE-2014-0569" ref_url="https://www.suse.com/security/cve/CVE-2014-0569/" source="CVE"/>
		<reference ref_id="CVE-2014-0573" ref_url="https://www.suse.com/security/cve/CVE-2014-0573/" source="CVE"/>
		<reference ref_id="CVE-2014-0574" ref_url="https://www.suse.com/security/cve/CVE-2014-0574/" source="CVE"/>
		<reference ref_id="CVE-2014-0576" ref_url="https://www.suse.com/security/cve/CVE-2014-0576/" source="CVE"/>
		<reference ref_id="CVE-2014-0577" ref_url="https://www.suse.com/security/cve/CVE-2014-0577/" source="CVE"/>
		<reference ref_id="CVE-2014-0580" ref_url="https://www.suse.com/security/cve/CVE-2014-0580/" source="CVE"/>
		<reference ref_id="CVE-2014-0581" ref_url="https://www.suse.com/security/cve/CVE-2014-0581/" source="CVE"/>
		<reference ref_id="CVE-2014-0582" ref_url="https://www.suse.com/security/cve/CVE-2014-0582/" source="CVE"/>
		<reference ref_id="CVE-2014-0583" ref_url="https://www.suse.com/security/cve/CVE-2014-0583/" source="CVE"/>
		<reference ref_id="CVE-2014-0584" ref_url="https://www.suse.com/security/cve/CVE-2014-0584/" source="CVE"/>
		<reference ref_id="CVE-2014-0585" ref_url="https://www.suse.com/security/cve/CVE-2014-0585/" source="CVE"/>
		<reference ref_id="CVE-2014-0586" ref_url="https://www.suse.com/security/cve/CVE-2014-0586/" source="CVE"/>
		<reference ref_id="CVE-2014-0587" ref_url="https://www.suse.com/security/cve/CVE-2014-0587/" source="CVE"/>
		<reference ref_id="CVE-2014-0588" ref_url="https://www.suse.com/security/cve/CVE-2014-0588/" source="CVE"/>
		<reference ref_id="CVE-2014-0589" ref_url="https://www.suse.com/security/cve/CVE-2014-0589/" source="CVE"/>
		<reference ref_id="CVE-2014-0590" ref_url="https://www.suse.com/security/cve/CVE-2014-0590/" source="CVE"/>
		<reference ref_id="CVE-2014-4671" ref_url="https://www.suse.com/security/cve/CVE-2014-4671/" source="CVE"/>
		<reference ref_id="CVE-2014-8437" ref_url="https://www.suse.com/security/cve/CVE-2014-8437/" source="CVE"/>
		<reference ref_id="CVE-2014-8438" ref_url="https://www.suse.com/security/cve/CVE-2014-8438/" source="CVE"/>
		<reference ref_id="CVE-2014-8439" ref_url="https://www.suse.com/security/cve/CVE-2014-8439/" source="CVE"/>
		<reference ref_id="CVE-2014-8440" ref_url="https://www.suse.com/security/cve/CVE-2014-8440/" source="CVE"/>
		<reference ref_id="CVE-2014-8441" ref_url="https://www.suse.com/security/cve/CVE-2014-8441/" source="CVE"/>
		<reference ref_id="CVE-2014-8442" ref_url="https://www.suse.com/security/cve/CVE-2014-8442/" source="CVE"/>
		<reference ref_id="CVE-2014-8443" ref_url="https://www.suse.com/security/cve/CVE-2014-8443/" source="CVE"/>
		<reference ref_id="CVE-2014-9162" ref_url="https://www.suse.com/security/cve/CVE-2014-9162/" source="CVE"/>
		<reference ref_id="CVE-2014-9163" ref_url="https://www.suse.com/security/cve/CVE-2014-9163/" source="CVE"/>
		<reference ref_id="CVE-2014-9164" ref_url="https://www.suse.com/security/cve/CVE-2014-9164/" source="CVE"/>
		<reference ref_id="CVE-2015-0301" ref_url="https://www.suse.com/security/cve/CVE-2015-0301/" source="CVE"/>
		<reference ref_id="CVE-2015-0302" ref_url="https://www.suse.com/security/cve/CVE-2015-0302/" source="CVE"/>
		<reference ref_id="CVE-2015-0303" ref_url="https://www.suse.com/security/cve/CVE-2015-0303/" source="CVE"/>
		<reference ref_id="CVE-2015-0304" ref_url="https://www.suse.com/security/cve/CVE-2015-0304/" source="CVE"/>
		<reference ref_id="CVE-2015-0305" ref_url="https://www.suse.com/security/cve/CVE-2015-0305/" source="CVE"/>
		<reference ref_id="CVE-2015-0306" ref_url="https://www.suse.com/security/cve/CVE-2015-0306/" source="CVE"/>
		<reference ref_id="CVE-2015-0307" ref_url="https://www.suse.com/security/cve/CVE-2015-0307/" source="CVE"/>
		<reference ref_id="CVE-2015-0308" ref_url="https://www.suse.com/security/cve/CVE-2015-0308/" source="CVE"/>
		<reference ref_id="CVE-2015-0309" ref_url="https://www.suse.com/security/cve/CVE-2015-0309/" source="CVE"/>
		<reference ref_id="CVE-2015-0310" ref_url="https://www.suse.com/security/cve/CVE-2015-0310/" source="CVE"/>
		<reference ref_id="CVE-2015-0311" ref_url="https://www.suse.com/security/cve/CVE-2015-0311/" source="CVE"/>
		<reference ref_id="CVE-2015-0313" ref_url="https://www.suse.com/security/cve/CVE-2015-0313/" source="CVE"/>
		<reference ref_id="CVE-2015-0314" ref_url="https://www.suse.com/security/cve/CVE-2015-0314/" source="CVE"/>
		<reference ref_id="CVE-2015-0315" ref_url="https://www.suse.com/security/cve/CVE-2015-0315/" source="CVE"/>
		<reference ref_id="CVE-2015-0316" ref_url="https://www.suse.com/security/cve/CVE-2015-0316/" source="CVE"/>
		<reference ref_id="CVE-2015-0317" ref_url="https://www.suse.com/security/cve/CVE-2015-0317/" source="CVE"/>
		<reference ref_id="CVE-2015-0318" ref_url="https://www.suse.com/security/cve/CVE-2015-0318/" source="CVE"/>
		<reference ref_id="CVE-2015-0319" ref_url="https://www.suse.com/security/cve/CVE-2015-0319/" source="CVE"/>
		<reference ref_id="CVE-2015-0320" ref_url="https://www.suse.com/security/cve/CVE-2015-0320/" source="CVE"/>
		<reference ref_id="CVE-2015-0321" ref_url="https://www.suse.com/security/cve/CVE-2015-0321/" source="CVE"/>
		<reference ref_id="CVE-2015-0322" ref_url="https://www.suse.com/security/cve/CVE-2015-0322/" source="CVE"/>
		<reference ref_id="CVE-2015-0323" ref_url="https://www.suse.com/security/cve/CVE-2015-0323/" source="CVE"/>
		<reference ref_id="CVE-2015-0324" ref_url="https://www.suse.com/security/cve/CVE-2015-0324/" source="CVE"/>
		<reference ref_id="CVE-2015-0325" ref_url="https://www.suse.com/security/cve/CVE-2015-0325/" source="CVE"/>
		<reference ref_id="CVE-2015-0326" ref_url="https://www.suse.com/security/cve/CVE-2015-0326/" source="CVE"/>
		<reference ref_id="CVE-2015-0327" ref_url="https://www.suse.com/security/cve/CVE-2015-0327/" source="CVE"/>
		<reference ref_id="CVE-2015-0328" ref_url="https://www.suse.com/security/cve/CVE-2015-0328/" source="CVE"/>
		<reference ref_id="CVE-2015-0329" ref_url="https://www.suse.com/security/cve/CVE-2015-0329/" source="CVE"/>
		<reference ref_id="CVE-2015-0330" ref_url="https://www.suse.com/security/cve/CVE-2015-0330/" source="CVE"/>
		<reference ref_id="CVE-2015-0331" ref_url="https://www.suse.com/security/cve/CVE-2015-0331/" source="CVE"/>
		<reference ref_id="CVE-2015-0332" ref_url="https://www.suse.com/security/cve/CVE-2015-0332/" source="CVE"/>
		<reference ref_id="CVE-2015-0333" ref_url="https://www.suse.com/security/cve/CVE-2015-0333/" source="CVE"/>
		<reference ref_id="CVE-2015-0334" ref_url="https://www.suse.com/security/cve/CVE-2015-0334/" source="CVE"/>
		<reference ref_id="CVE-2015-0335" ref_url="https://www.suse.com/security/cve/CVE-2015-0335/" source="CVE"/>
		<reference ref_id="CVE-2015-0336" ref_url="https://www.suse.com/security/cve/CVE-2015-0336/" source="CVE"/>
		<reference ref_id="CVE-2015-0337" ref_url="https://www.suse.com/security/cve/CVE-2015-0337/" source="CVE"/>
		<reference ref_id="CVE-2015-0338" ref_url="https://www.suse.com/security/cve/CVE-2015-0338/" source="CVE"/>
		<reference ref_id="CVE-2015-0339" ref_url="https://www.suse.com/security/cve/CVE-2015-0339/" source="CVE"/>
		<reference ref_id="CVE-2015-0340" ref_url="https://www.suse.com/security/cve/CVE-2015-0340/" source="CVE"/>
		<reference ref_id="CVE-2015-0341" ref_url="https://www.suse.com/security/cve/CVE-2015-0341/" source="CVE"/>
		<reference ref_id="CVE-2015-0342" ref_url="https://www.suse.com/security/cve/CVE-2015-0342/" source="CVE"/>
		<reference ref_id="CVE-2015-0346" ref_url="https://www.suse.com/security/cve/CVE-2015-0346/" source="CVE"/>
		<reference ref_id="CVE-2015-0347" ref_url="https://www.suse.com/security/cve/CVE-2015-0347/" source="CVE"/>
		<reference ref_id="CVE-2015-0348" ref_url="https://www.suse.com/security/cve/CVE-2015-0348/" source="CVE"/>
		<reference ref_id="CVE-2015-0349" ref_url="https://www.suse.com/security/cve/CVE-2015-0349/" source="CVE"/>
		<reference ref_id="CVE-2015-0350" ref_url="https://www.suse.com/security/cve/CVE-2015-0350/" source="CVE"/>
		<reference ref_id="CVE-2015-0351" ref_url="https://www.suse.com/security/cve/CVE-2015-0351/" source="CVE"/>
		<reference ref_id="CVE-2015-0352" ref_url="https://www.suse.com/security/cve/CVE-2015-0352/" source="CVE"/>
		<reference ref_id="CVE-2015-0353" ref_url="https://www.suse.com/security/cve/CVE-2015-0353/" source="CVE"/>
		<reference ref_id="CVE-2015-0354" ref_url="https://www.suse.com/security/cve/CVE-2015-0354/" source="CVE"/>
		<reference ref_id="CVE-2015-0355" ref_url="https://www.suse.com/security/cve/CVE-2015-0355/" source="CVE"/>
		<reference ref_id="CVE-2015-0356" ref_url="https://www.suse.com/security/cve/CVE-2015-0356/" source="CVE"/>
		<reference ref_id="CVE-2015-0357" ref_url="https://www.suse.com/security/cve/CVE-2015-0357/" source="CVE"/>
		<reference ref_id="CVE-2015-0358" ref_url="https://www.suse.com/security/cve/CVE-2015-0358/" source="CVE"/>
		<reference ref_id="CVE-2015-0359" ref_url="https://www.suse.com/security/cve/CVE-2015-0359/" source="CVE"/>
		<reference ref_id="CVE-2015-0360" ref_url="https://www.suse.com/security/cve/CVE-2015-0360/" source="CVE"/>
		<reference ref_id="CVE-2015-3038" ref_url="https://www.suse.com/security/cve/CVE-2015-3038/" source="CVE"/>
		<reference ref_id="CVE-2015-3039" ref_url="https://www.suse.com/security/cve/CVE-2015-3039/" source="CVE"/>
		<reference ref_id="CVE-2015-3040" ref_url="https://www.suse.com/security/cve/CVE-2015-3040/" source="CVE"/>
		<reference ref_id="CVE-2015-3041" ref_url="https://www.suse.com/security/cve/CVE-2015-3041/" source="CVE"/>
		<reference ref_id="CVE-2015-3042" ref_url="https://www.suse.com/security/cve/CVE-2015-3042/" source="CVE"/>
		<reference ref_id="CVE-2015-3043" ref_url="https://www.suse.com/security/cve/CVE-2015-3043/" source="CVE"/>
		<reference ref_id="CVE-2015-3044" ref_url="https://www.suse.com/security/cve/CVE-2015-3044/" source="CVE"/>
		<reference ref_id="CVE-2015-3077" ref_url="https://www.suse.com/security/cve/CVE-2015-3077/" source="CVE"/>
		<reference ref_id="CVE-2015-3078" ref_url="https://www.suse.com/security/cve/CVE-2015-3078/" source="CVE"/>
		<reference ref_id="CVE-2015-3079" ref_url="https://www.suse.com/security/cve/CVE-2015-3079/" source="CVE"/>
		<reference ref_id="CVE-2015-3080" ref_url="https://www.suse.com/security/cve/CVE-2015-3080/" source="CVE"/>
		<reference ref_id="CVE-2015-3081" ref_url="https://www.suse.com/security/cve/CVE-2015-3081/" source="CVE"/>
		<reference ref_id="CVE-2015-3082" ref_url="https://www.suse.com/security/cve/CVE-2015-3082/" source="CVE"/>
		<reference ref_id="CVE-2015-3083" ref_url="https://www.suse.com/security/cve/CVE-2015-3083/" source="CVE"/>
		<reference ref_id="CVE-2015-3084" ref_url="https://www.suse.com/security/cve/CVE-2015-3084/" source="CVE"/>
		<reference ref_id="CVE-2015-3085" ref_url="https://www.suse.com/security/cve/CVE-2015-3085/" source="CVE"/>
		<reference ref_id="CVE-2015-3086" ref_url="https://www.suse.com/security/cve/CVE-2015-3086/" source="CVE"/>
		<reference ref_id="CVE-2015-3087" ref_url="https://www.suse.com/security/cve/CVE-2015-3087/" source="CVE"/>
		<reference ref_id="CVE-2015-3088" ref_url="https://www.suse.com/security/cve/CVE-2015-3088/" source="CVE"/>
		<reference ref_id="CVE-2015-3089" ref_url="https://www.suse.com/security/cve/CVE-2015-3089/" source="CVE"/>
		<reference ref_id="CVE-2015-3090" ref_url="https://www.suse.com/security/cve/CVE-2015-3090/" source="CVE"/>
		<reference ref_id="CVE-2015-3091" ref_url="https://www.suse.com/security/cve/CVE-2015-3091/" source="CVE"/>
		<reference ref_id="CVE-2015-3092" ref_url="https://www.suse.com/security/cve/CVE-2015-3092/" source="CVE"/>
		<reference ref_id="CVE-2015-3093" ref_url="https://www.suse.com/security/cve/CVE-2015-3093/" source="CVE"/>
		<reference ref_id="CVE-2015-3096" ref_url="https://www.suse.com/security/cve/CVE-2015-3096/" source="CVE"/>
		<reference ref_id="CVE-2015-3098" ref_url="https://www.suse.com/security/cve/CVE-2015-3098/" source="CVE"/>
		<reference ref_id="CVE-2015-3099" ref_url="https://www.suse.com/security/cve/CVE-2015-3099/" source="CVE"/>
		<reference ref_id="CVE-2015-3100" ref_url="https://www.suse.com/security/cve/CVE-2015-3100/" source="CVE"/>
		<reference ref_id="CVE-2015-3102" ref_url="https://www.suse.com/security/cve/CVE-2015-3102/" source="CVE"/>
		<reference ref_id="CVE-2015-3103" ref_url="https://www.suse.com/security/cve/CVE-2015-3103/" source="CVE"/>
		<reference ref_id="CVE-2015-3104" ref_url="https://www.suse.com/security/cve/CVE-2015-3104/" source="CVE"/>
		<reference ref_id="CVE-2015-3105" ref_url="https://www.suse.com/security/cve/CVE-2015-3105/" source="CVE"/>
		<reference ref_id="CVE-2015-3106" ref_url="https://www.suse.com/security/cve/CVE-2015-3106/" source="CVE"/>
		<reference ref_id="CVE-2015-3107" ref_url="https://www.suse.com/security/cve/CVE-2015-3107/" source="CVE"/>
		<reference ref_id="CVE-2015-3108" ref_url="https://www.suse.com/security/cve/CVE-2015-3108/" source="CVE"/>
		<reference ref_id="CVE-2015-3113" ref_url="https://www.suse.com/security/cve/CVE-2015-3113/" source="CVE"/>
		<reference ref_id="CVE-2015-5119" ref_url="https://www.suse.com/security/cve/CVE-2015-5119/" source="CVE"/>
		<reference ref_id="CVE-2015-5122" ref_url="https://www.suse.com/security/cve/CVE-2015-5122/" source="CVE"/>
		<reference ref_id="CVE-2015-5123" ref_url="https://www.suse.com/security/cve/CVE-2015-5123/" source="CVE"/>
		<reference ref_id="CVE-2015-5124" ref_url="https://www.suse.com/security/cve/CVE-2015-5124/" source="CVE"/>
		<reference ref_id="CVE-2015-5125" ref_url="https://www.suse.com/security/cve/CVE-2015-5125/" source="CVE"/>
		<reference ref_id="CVE-2015-5127" ref_url="https://www.suse.com/security/cve/CVE-2015-5127/" source="CVE"/>
		<reference ref_id="CVE-2015-5128" ref_url="https://www.suse.com/security/cve/CVE-2015-5128/" source="CVE"/>
		<reference ref_id="CVE-2015-5129" ref_url="https://www.suse.com/security/cve/CVE-2015-5129/" source="CVE"/>
		<reference ref_id="CVE-2015-5130" ref_url="https://www.suse.com/security/cve/CVE-2015-5130/" source="CVE"/>
		<reference ref_id="CVE-2015-5131" ref_url="https://www.suse.com/security/cve/CVE-2015-5131/" source="CVE"/>
		<reference ref_id="CVE-2015-5132" ref_url="https://www.suse.com/security/cve/CVE-2015-5132/" source="CVE"/>
		<reference ref_id="CVE-2015-5133" ref_url="https://www.suse.com/security/cve/CVE-2015-5133/" source="CVE"/>
		<reference ref_id="CVE-2015-5134" ref_url="https://www.suse.com/security/cve/CVE-2015-5134/" source="CVE"/>
		<reference ref_id="CVE-2015-5539" ref_url="https://www.suse.com/security/cve/CVE-2015-5539/" source="CVE"/>
		<reference ref_id="CVE-2015-5540" ref_url="https://www.suse.com/security/cve/CVE-2015-5540/" source="CVE"/>
		<reference ref_id="CVE-2015-5541" ref_url="https://www.suse.com/security/cve/CVE-2015-5541/" source="CVE"/>
		<reference ref_id="CVE-2015-5544" ref_url="https://www.suse.com/security/cve/CVE-2015-5544/" source="CVE"/>
		<reference ref_id="CVE-2015-5545" ref_url="https://www.suse.com/security/cve/CVE-2015-5545/" source="CVE"/>
		<reference ref_id="CVE-2015-5546" ref_url="https://www.suse.com/security/cve/CVE-2015-5546/" source="CVE"/>
		<reference ref_id="CVE-2015-5547" ref_url="https://www.suse.com/security/cve/CVE-2015-5547/" source="CVE"/>
		<reference ref_id="CVE-2015-5548" ref_url="https://www.suse.com/security/cve/CVE-2015-5548/" source="CVE"/>
		<reference ref_id="CVE-2015-5549" ref_url="https://www.suse.com/security/cve/CVE-2015-5549/" source="CVE"/>
		<reference ref_id="CVE-2015-5550" ref_url="https://www.suse.com/security/cve/CVE-2015-5550/" source="CVE"/>
		<reference ref_id="CVE-2015-5551" ref_url="https://www.suse.com/security/cve/CVE-2015-5551/" source="CVE"/>
		<reference ref_id="CVE-2015-5552" ref_url="https://www.suse.com/security/cve/CVE-2015-5552/" source="CVE"/>
		<reference ref_id="CVE-2015-5553" ref_url="https://www.suse.com/security/cve/CVE-2015-5553/" source="CVE"/>
		<reference ref_id="CVE-2015-5554" ref_url="https://www.suse.com/security/cve/CVE-2015-5554/" source="CVE"/>
		<reference ref_id="CVE-2015-5555" ref_url="https://www.suse.com/security/cve/CVE-2015-5555/" source="CVE"/>
		<reference ref_id="CVE-2015-5556" ref_url="https://www.suse.com/security/cve/CVE-2015-5556/" source="CVE"/>
		<reference ref_id="CVE-2015-5557" ref_url="https://www.suse.com/security/cve/CVE-2015-5557/" source="CVE"/>
		<reference ref_id="CVE-2015-5558" ref_url="https://www.suse.com/security/cve/CVE-2015-5558/" source="CVE"/>
		<reference ref_id="CVE-2015-5559" ref_url="https://www.suse.com/security/cve/CVE-2015-5559/" source="CVE"/>
		<reference ref_id="CVE-2015-5560" ref_url="https://www.suse.com/security/cve/CVE-2015-5560/" source="CVE"/>
		<reference ref_id="CVE-2015-5561" ref_url="https://www.suse.com/security/cve/CVE-2015-5561/" source="CVE"/>
		<reference ref_id="CVE-2015-5562" ref_url="https://www.suse.com/security/cve/CVE-2015-5562/" source="CVE"/>
		<reference ref_id="CVE-2015-5563" ref_url="https://www.suse.com/security/cve/CVE-2015-5563/" source="CVE"/>
		<reference ref_id="CVE-2015-5567" ref_url="https://www.suse.com/security/cve/CVE-2015-5567/" source="CVE"/>
		<reference ref_id="CVE-2015-5568" ref_url="https://www.suse.com/security/cve/CVE-2015-5568/" source="CVE"/>
		<reference ref_id="CVE-2015-5569" ref_url="https://www.suse.com/security/cve/CVE-2015-5569/" source="CVE"/>
		<reference ref_id="CVE-2015-5570" ref_url="https://www.suse.com/security/cve/CVE-2015-5570/" source="CVE"/>
		<reference ref_id="CVE-2015-5571" ref_url="https://www.suse.com/security/cve/CVE-2015-5571/" source="CVE"/>
		<reference ref_id="CVE-2015-5572" ref_url="https://www.suse.com/security/cve/CVE-2015-5572/" source="CVE"/>
		<reference ref_id="CVE-2015-5573" ref_url="https://www.suse.com/security/cve/CVE-2015-5573/" source="CVE"/>
		<reference ref_id="CVE-2015-5574" ref_url="https://www.suse.com/security/cve/CVE-2015-5574/" source="CVE"/>
		<reference ref_id="CVE-2015-5575" ref_url="https://www.suse.com/security/cve/CVE-2015-5575/" source="CVE"/>
		<reference ref_id="CVE-2015-5576" ref_url="https://www.suse.com/security/cve/CVE-2015-5576/" source="CVE"/>
		<reference ref_id="CVE-2015-5577" ref_url="https://www.suse.com/security/cve/CVE-2015-5577/" source="CVE"/>
		<reference ref_id="CVE-2015-5578" ref_url="https://www.suse.com/security/cve/CVE-2015-5578/" source="CVE"/>
		<reference ref_id="CVE-2015-5579" ref_url="https://www.suse.com/security/cve/CVE-2015-5579/" source="CVE"/>
		<reference ref_id="CVE-2015-5580" ref_url="https://www.suse.com/security/cve/CVE-2015-5580/" source="CVE"/>
		<reference ref_id="CVE-2015-5581" ref_url="https://www.suse.com/security/cve/CVE-2015-5581/" source="CVE"/>
		<reference ref_id="CVE-2015-5582" ref_url="https://www.suse.com/security/cve/CVE-2015-5582/" source="CVE"/>
		<reference ref_id="CVE-2015-5584" ref_url="https://www.suse.com/security/cve/CVE-2015-5584/" source="CVE"/>
		<reference ref_id="CVE-2015-5587" ref_url="https://www.suse.com/security/cve/CVE-2015-5587/" source="CVE"/>
		<reference ref_id="CVE-2015-5588" ref_url="https://www.suse.com/security/cve/CVE-2015-5588/" source="CVE"/>
		<reference ref_id="CVE-2015-6676" ref_url="https://www.suse.com/security/cve/CVE-2015-6676/" source="CVE"/>
		<reference ref_id="CVE-2015-6677" ref_url="https://www.suse.com/security/cve/CVE-2015-6677/" source="CVE"/>
		<reference ref_id="CVE-2015-6678" ref_url="https://www.suse.com/security/cve/CVE-2015-6678/" source="CVE"/>
		<reference ref_id="CVE-2015-6679" ref_url="https://www.suse.com/security/cve/CVE-2015-6679/" source="CVE"/>
		<reference ref_id="CVE-2015-6682" ref_url="https://www.suse.com/security/cve/CVE-2015-6682/" source="CVE"/>
		<reference ref_id="CVE-2015-7625" ref_url="https://www.suse.com/security/cve/CVE-2015-7625/" source="CVE"/>
		<reference ref_id="CVE-2015-7626" ref_url="https://www.suse.com/security/cve/CVE-2015-7626/" source="CVE"/>
		<reference ref_id="CVE-2015-7627" ref_url="https://www.suse.com/security/cve/CVE-2015-7627/" source="CVE"/>
		<reference ref_id="CVE-2015-7628" ref_url="https://www.suse.com/security/cve/CVE-2015-7628/" source="CVE"/>
		<reference ref_id="CVE-2015-7629" ref_url="https://www.suse.com/security/cve/CVE-2015-7629/" source="CVE"/>
		<reference ref_id="CVE-2015-7630" ref_url="https://www.suse.com/security/cve/CVE-2015-7630/" source="CVE"/>
		<reference ref_id="CVE-2015-7631" ref_url="https://www.suse.com/security/cve/CVE-2015-7631/" source="CVE"/>
		<reference ref_id="CVE-2015-7632" ref_url="https://www.suse.com/security/cve/CVE-2015-7632/" source="CVE"/>
		<reference ref_id="CVE-2015-7633" ref_url="https://www.suse.com/security/cve/CVE-2015-7633/" source="CVE"/>
		<reference ref_id="CVE-2015-7634" ref_url="https://www.suse.com/security/cve/CVE-2015-7634/" source="CVE"/>
		<reference ref_id="CVE-2015-7643" ref_url="https://www.suse.com/security/cve/CVE-2015-7643/" source="CVE"/>
		<reference ref_id="CVE-2015-7644" ref_url="https://www.suse.com/security/cve/CVE-2015-7644/" source="CVE"/>
		<reference ref_id="CVE-2015-7645" ref_url="https://www.suse.com/security/cve/CVE-2015-7645/" source="CVE"/>
		<reference ref_id="CVE-2015-7651" ref_url="https://www.suse.com/security/cve/CVE-2015-7651/" source="CVE"/>
		<reference ref_id="CVE-2015-7652" ref_url="https://www.suse.com/security/cve/CVE-2015-7652/" source="CVE"/>
		<reference ref_id="CVE-2015-7653" ref_url="https://www.suse.com/security/cve/CVE-2015-7653/" source="CVE"/>
		<reference ref_id="CVE-2015-7654" ref_url="https://www.suse.com/security/cve/CVE-2015-7654/" source="CVE"/>
		<reference ref_id="CVE-2015-7655" ref_url="https://www.suse.com/security/cve/CVE-2015-7655/" source="CVE"/>
		<reference ref_id="CVE-2015-7656" ref_url="https://www.suse.com/security/cve/CVE-2015-7656/" source="CVE"/>
		<reference ref_id="CVE-2015-7657" ref_url="https://www.suse.com/security/cve/CVE-2015-7657/" source="CVE"/>
		<reference ref_id="CVE-2015-7658" ref_url="https://www.suse.com/security/cve/CVE-2015-7658/" source="CVE"/>
		<reference ref_id="CVE-2015-7659" ref_url="https://www.suse.com/security/cve/CVE-2015-7659/" source="CVE"/>
		<reference ref_id="CVE-2015-7660" ref_url="https://www.suse.com/security/cve/CVE-2015-7660/" source="CVE"/>
		<reference ref_id="CVE-2015-7661" ref_url="https://www.suse.com/security/cve/CVE-2015-7661/" source="CVE"/>
		<reference ref_id="CVE-2015-7662" ref_url="https://www.suse.com/security/cve/CVE-2015-7662/" source="CVE"/>
		<reference ref_id="CVE-2015-7663" ref_url="https://www.suse.com/security/cve/CVE-2015-7663/" source="CVE"/>
		<reference ref_id="CVE-2015-8042" ref_url="https://www.suse.com/security/cve/CVE-2015-8042/" source="CVE"/>
		<reference ref_id="CVE-2015-8043" ref_url="https://www.suse.com/security/cve/CVE-2015-8043/" source="CVE"/>
		<reference ref_id="CVE-2015-8044" ref_url="https://www.suse.com/security/cve/CVE-2015-8044/" source="CVE"/>
		<reference ref_id="CVE-2015-8046" ref_url="https://www.suse.com/security/cve/CVE-2015-8046/" source="CVE"/>
		<description>
These are all security issues fixed in the flash-player-11.2.202.548-111.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4546/">CVE-2008-4546</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0901/">CVE-2009-0901</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1862/">CVE-2009-1862</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1863/">CVE-2009-1863</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1864/">CVE-2009-1864</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1865/">CVE-2009-1865</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1866/">CVE-2009-1866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1867/">CVE-2009-1867</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1868/">CVE-2009-1868</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1869/">CVE-2009-1869</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1870/">CVE-2009-1870</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2395/">CVE-2009-2395</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-2493/">CVE-2009-2493</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3793/">CVE-2009-3793</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3794/">CVE-2009-3794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3796/">CVE-2009-3796</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3797/">CVE-2009-3797</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3798/">CVE-2009-3798</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3799/">CVE-2009-3799</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3800/">CVE-2009-3800</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3951/">CVE-2009-3951</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0186/">CVE-2010-0186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0187/">CVE-2010-0187</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0209/">CVE-2010-0209</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1297/">CVE-2010-1297</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2160/">CVE-2010-2160</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2161/">CVE-2010-2161</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2162/">CVE-2010-2162</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2163/">CVE-2010-2163</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2164/">CVE-2010-2164</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2165/">CVE-2010-2165</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2166/">CVE-2010-2166</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2167/">CVE-2010-2167</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2169/">CVE-2010-2169</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2170/">CVE-2010-2170</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2171/">CVE-2010-2171</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2172/">CVE-2010-2172</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2173/">CVE-2010-2173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2174/">CVE-2010-2174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2175/">CVE-2010-2175</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2176/">CVE-2010-2176</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2177/">CVE-2010-2177</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2178/">CVE-2010-2178</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2179/">CVE-2010-2179</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2180/">CVE-2010-2180</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2181/">CVE-2010-2181</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2182/">CVE-2010-2182</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2183/">CVE-2010-2183</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2184/">CVE-2010-2184</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2185/">CVE-2010-2185</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2186/">CVE-2010-2186</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2187/">CVE-2010-2187</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2188/">CVE-2010-2188</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2189/">CVE-2010-2189</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2213/">CVE-2010-2213</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2214/">CVE-2010-2214</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2216/">CVE-2010-2216</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2884/">CVE-2010-2884</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3654/">CVE-2010-3654</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0558/">CVE-2011-0558</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0559/">CVE-2011-0559</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0560/">CVE-2011-0560</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0561/">CVE-2011-0561</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0571/">CVE-2011-0571</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0572/">CVE-2011-0572</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0573/">CVE-2011-0573</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0574/">CVE-2011-0574</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0575/">CVE-2011-0575</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0577/">CVE-2011-0577</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0578/">CVE-2011-0578</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0589/">CVE-2011-0589</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0607/">CVE-2011-0607</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0608/">CVE-2011-0608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0609/">CVE-2011-0609</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0611/">CVE-2011-0611</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0618/">CVE-2011-0618</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0619/">CVE-2011-0619</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0620/">CVE-2011-0620</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0621/">CVE-2011-0621</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0622/">CVE-2011-0622</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0623/">CVE-2011-0623</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0624/">CVE-2011-0624</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0625/">CVE-2011-0625</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0626/">CVE-2011-0626</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0627/">CVE-2011-0627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2107/">CVE-2011-2107</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2110/">CVE-2011-2110</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2130/">CVE-2011-2130</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2134/">CVE-2011-2134</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2135/">CVE-2011-2135</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2136/">CVE-2011-2136</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2137/">CVE-2011-2137</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2138/">CVE-2011-2138</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2139/">CVE-2011-2139</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2140/">CVE-2011-2140</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2414/">CVE-2011-2414</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2415/">CVE-2011-2415</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2416/">CVE-2011-2416</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2417/">CVE-2011-2417</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2425/">CVE-2011-2425</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2445/">CVE-2011-2445</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2450/">CVE-2011-2450</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2451/">CVE-2011-2451</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2452/">CVE-2011-2452</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2453/">CVE-2011-2453</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2454/">CVE-2011-2454</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2455/">CVE-2011-2455</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2456/">CVE-2011-2456</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2457/">CVE-2011-2457</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2458/">CVE-2011-2458</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2459/">CVE-2011-2459</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2460/">CVE-2011-2460</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0751/">CVE-2012-0751</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0752/">CVE-2012-0752</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0753/">CVE-2012-0753</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0754/">CVE-2012-0754</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0755/">CVE-2012-0755</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0756/">CVE-2012-0756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0767/">CVE-2012-0767</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0768/">CVE-2012-0768</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0769/">CVE-2012-0769</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0773/">CVE-2012-0773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0779/">CVE-2012-0779</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1535/">CVE-2012-1535</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-2034/">CVE-2012-2034</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-2035/">CVE-2012-2035</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-2036/">CVE-2012-2036</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-2037/">CVE-2012-2037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2038/">CVE-2012-2038</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-2039/">CVE-2012-2039</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-2040/">CVE-2012-2040</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5248/">CVE-2012-5248</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5249/">CVE-2012-5249</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5250/">CVE-2012-5250</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5251/">CVE-2012-5251</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5252/">CVE-2012-5252</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5253/">CVE-2012-5253</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5254/">CVE-2012-5254</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5255/">CVE-2012-5255</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5256/">CVE-2012-5256</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5257/">CVE-2012-5257</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5258/">CVE-2012-5258</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5259/">CVE-2012-5259</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5260/">CVE-2012-5260</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5261/">CVE-2012-5261</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5262/">CVE-2012-5262</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5263/">CVE-2012-5263</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5264/">CVE-2012-5264</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5265/">CVE-2012-5265</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5266/">CVE-2012-5266</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5267/">CVE-2012-5267</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5268/">CVE-2012-5268</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5269/">CVE-2012-5269</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5270/">CVE-2012-5270</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5271/">CVE-2012-5271</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5272/">CVE-2012-5272</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5274/">CVE-2012-5274</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5275/">CVE-2012-5275</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5276/">CVE-2012-5276</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5277/">CVE-2012-5277</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5278/">CVE-2012-5278</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5279/">CVE-2012-5279</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5280/">CVE-2012-5280</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5676/">CVE-2012-5676</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5677/">CVE-2012-5677</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5678/">CVE-2012-5678</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0504/">CVE-2013-0504</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0630/">CVE-2013-0630</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0633/">CVE-2013-0633</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0634/">CVE-2013-0634</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0637/">CVE-2013-0637</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0638/">CVE-2013-0638</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0639/">CVE-2013-0639</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0642/">CVE-2013-0642</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0643/">CVE-2013-0643</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0644/">CVE-2013-0644</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0645/">CVE-2013-0645</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0646/">CVE-2013-0646</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0647/">CVE-2013-0647</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0648/">CVE-2013-0648</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0649/">CVE-2013-0649</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0650/">CVE-2013-0650</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1365/">CVE-2013-1365</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1366/">CVE-2013-1366</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1367/">CVE-2013-1367</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1368/">CVE-2013-1368</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1369/">CVE-2013-1369</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1370/">CVE-2013-1370</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1371/">CVE-2013-1371</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1372/">CVE-2013-1372</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1373/">CVE-2013-1373</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1374/">CVE-2013-1374</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1375/">CVE-2013-1375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1378/">CVE-2013-1378</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1379/">CVE-2013-1379</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1380/">CVE-2013-1380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2555/">CVE-2013-2555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2728/">CVE-2013-2728</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3324/">CVE-2013-3324</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3325/">CVE-2013-3325</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3326/">CVE-2013-3326</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3327/">CVE-2013-3327</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3328/">CVE-2013-3328</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3329/">CVE-2013-3329</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3330/">CVE-2013-3330</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3331/">CVE-2013-3331</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3332/">CVE-2013-3332</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3333/">CVE-2013-3333</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3334/">CVE-2013-3334</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3335/">CVE-2013-3335</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3343/">CVE-2013-3343</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3344/">CVE-2013-3344</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3345/">CVE-2013-3345</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3347/">CVE-2013-3347</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3361/">CVE-2013-3361</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3362/">CVE-2013-3362</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3363/">CVE-2013-3363</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5324/">CVE-2013-5324</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5329/">CVE-2013-5329</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5330/">CVE-2013-5330</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5331/">CVE-2013-5331</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5332/">CVE-2013-5332</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0491/">CVE-2014-0491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0492/">CVE-2014-0492</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0497/">CVE-2014-0497</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0498/">CVE-2014-0498</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0499/">CVE-2014-0499</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0502/">CVE-2014-0502</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0503/">CVE-2014-0503</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0506/">CVE-2014-0506</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0507/">CVE-2014-0507</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0508/">CVE-2014-0508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0509/">CVE-2014-0509</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0515/">CVE-2014-0515</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0516/">CVE-2014-0516</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0517/">CVE-2014-0517</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0518/">CVE-2014-0518</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0519/">CVE-2014-0519</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0520/">CVE-2014-0520</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0531/">CVE-2014-0531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0532/">CVE-2014-0532</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0533/">CVE-2014-0533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0534/">CVE-2014-0534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0535/">CVE-2014-0535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0536/">CVE-2014-0536</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0537/">CVE-2014-0537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0538/">CVE-2014-0538</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0539/">CVE-2014-0539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0540/">CVE-2014-0540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0541/">CVE-2014-0541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0542/">CVE-2014-0542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0543/">CVE-2014-0543</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0544/">CVE-2014-0544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0545/">CVE-2014-0545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0547/">CVE-2014-0547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0548/">CVE-2014-0548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0549/">CVE-2014-0549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0550/">CVE-2014-0550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0551/">CVE-2014-0551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0552/">CVE-2014-0552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0553/">CVE-2014-0553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0554/">CVE-2014-0554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0555/">CVE-2014-0555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0556/">CVE-2014-0556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0557/">CVE-2014-0557</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0558/">CVE-2014-0558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0559/">CVE-2014-0559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0564/">CVE-2014-0564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0569/">CVE-2014-0569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0573/">CVE-2014-0573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0574/">CVE-2014-0574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0576/">CVE-2014-0576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0577/">CVE-2014-0577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0580/">CVE-2014-0580</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0581/">CVE-2014-0581</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0582/">CVE-2014-0582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0583/">CVE-2014-0583</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0584/">CVE-2014-0584</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0585/">CVE-2014-0585</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0586/">CVE-2014-0586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0587/">CVE-2014-0587</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0588/">CVE-2014-0588</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0589/">CVE-2014-0589</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0590/">CVE-2014-0590</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-4671/">CVE-2014-4671</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8437/">CVE-2014-8437</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8438/">CVE-2014-8438</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8439/">CVE-2014-8439</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8440/">CVE-2014-8440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8441/">CVE-2014-8441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8442/">CVE-2014-8442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8443/">CVE-2014-8443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9162/">CVE-2014-9162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9163/">CVE-2014-9163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9164/">CVE-2014-9164</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0301/">CVE-2015-0301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0302/">CVE-2015-0302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0303/">CVE-2015-0303</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0304/">CVE-2015-0304</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0305/">CVE-2015-0305</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0306/">CVE-2015-0306</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0307/">CVE-2015-0307</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0308/">CVE-2015-0308</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0309/">CVE-2015-0309</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0310/">CVE-2015-0310</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0311/">CVE-2015-0311</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0313/">CVE-2015-0313</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0314/">CVE-2015-0314</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0315/">CVE-2015-0315</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0316/">CVE-2015-0316</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0317/">CVE-2015-0317</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0318/">CVE-2015-0318</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0319/">CVE-2015-0319</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0320/">CVE-2015-0320</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0321/">CVE-2015-0321</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0322/">CVE-2015-0322</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0323/">CVE-2015-0323</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0324/">CVE-2015-0324</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0325/">CVE-2015-0325</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0326/">CVE-2015-0326</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0327/">CVE-2015-0327</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0328/">CVE-2015-0328</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0329/">CVE-2015-0329</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0330/">CVE-2015-0330</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0331/">CVE-2015-0331</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0332/">CVE-2015-0332</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0333/">CVE-2015-0333</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0334/">CVE-2015-0334</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0335/">CVE-2015-0335</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0336/">CVE-2015-0336</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0337/">CVE-2015-0337</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0338/">CVE-2015-0338</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0339/">CVE-2015-0339</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0340/">CVE-2015-0340</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0341/">CVE-2015-0341</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0342/">CVE-2015-0342</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0346/">CVE-2015-0346</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0347/">CVE-2015-0347</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0348/">CVE-2015-0348</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0349/">CVE-2015-0349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0350/">CVE-2015-0350</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0351/">CVE-2015-0351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0352/">CVE-2015-0352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0353/">CVE-2015-0353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0354/">CVE-2015-0354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0355/">CVE-2015-0355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0356/">CVE-2015-0356</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0357/">CVE-2015-0357</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0358/">CVE-2015-0358</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0359/">CVE-2015-0359</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0360/">CVE-2015-0360</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3038/">CVE-2015-3038</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3039/">CVE-2015-3039</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3040/">CVE-2015-3040</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3041/">CVE-2015-3041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3042/">CVE-2015-3042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3043/">CVE-2015-3043</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3044/">CVE-2015-3044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3077/">CVE-2015-3077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3078/">CVE-2015-3078</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3079/">CVE-2015-3079</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3080/">CVE-2015-3080</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3081/">CVE-2015-3081</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3082/">CVE-2015-3082</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3083/">CVE-2015-3083</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3084/">CVE-2015-3084</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3085/">CVE-2015-3085</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3086/">CVE-2015-3086</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3087/">CVE-2015-3087</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3088/">CVE-2015-3088</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3089/">CVE-2015-3089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3090/">CVE-2015-3090</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3091/">CVE-2015-3091</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3092/">CVE-2015-3092</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3093/">CVE-2015-3093</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3096/">CVE-2015-3096</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3098/">CVE-2015-3098</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3099/">CVE-2015-3099</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3100/">CVE-2015-3100</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3102/">CVE-2015-3102</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3103/">CVE-2015-3103</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3104/">CVE-2015-3104</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3105/">CVE-2015-3105</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3106/">CVE-2015-3106</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3107/">CVE-2015-3107</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3108/">CVE-2015-3108</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3113/">CVE-2015-3113</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5119/">CVE-2015-5119</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5122/">CVE-2015-5122</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5123/">CVE-2015-5123</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5124/">CVE-2015-5124</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5125/">CVE-2015-5125</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5127/">CVE-2015-5127</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5128/">CVE-2015-5128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5129/">CVE-2015-5129</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5130/">CVE-2015-5130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5131/">CVE-2015-5131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5132/">CVE-2015-5132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5133/">CVE-2015-5133</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5134/">CVE-2015-5134</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5539/">CVE-2015-5539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5540/">CVE-2015-5540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5541/">CVE-2015-5541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5544/">CVE-2015-5544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5545/">CVE-2015-5545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5546/">CVE-2015-5546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5547/">CVE-2015-5547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5548/">CVE-2015-5548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5549/">CVE-2015-5549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5550/">CVE-2015-5550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5551/">CVE-2015-5551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5552/">CVE-2015-5552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5553/">CVE-2015-5553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5554/">CVE-2015-5554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5555/">CVE-2015-5555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5556/">CVE-2015-5556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5557/">CVE-2015-5557</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5558/">CVE-2015-5558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5559/">CVE-2015-5559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5560/">CVE-2015-5560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5561/">CVE-2015-5561</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5562/">CVE-2015-5562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5563/">CVE-2015-5563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5567/">CVE-2015-5567</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5568/">CVE-2015-5568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5569/">CVE-2015-5569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5570/">CVE-2015-5570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5571/">CVE-2015-5571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5572/">CVE-2015-5572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5573/">CVE-2015-5573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5574/">CVE-2015-5574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5575/">CVE-2015-5575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5576/">CVE-2015-5576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5577/">CVE-2015-5577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5578/">CVE-2015-5578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5579/">CVE-2015-5579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5580/">CVE-2015-5580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5581/">CVE-2015-5581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5582/">CVE-2015-5582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5584/">CVE-2015-5584</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5587/">CVE-2015-5587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5588/">CVE-2015-5588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6676/">CVE-2015-6676</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6677/">CVE-2015-6677</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6678/">CVE-2015-6678</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6679/">CVE-2015-6679</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6682/">CVE-2015-6682</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7625/">CVE-2015-7625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7626/">CVE-2015-7626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7627/">CVE-2015-7627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7628/">CVE-2015-7628</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7629/">CVE-2015-7629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7630/">CVE-2015-7630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7631/">CVE-2015-7631</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7632/">CVE-2015-7632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7633/">CVE-2015-7633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7634/">CVE-2015-7634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7643/">CVE-2015-7643</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7644/">CVE-2015-7644</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7645/">CVE-2015-7645</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7651/">CVE-2015-7651</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7652/">CVE-2015-7652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7653/">CVE-2015-7653</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7654/">CVE-2015-7654</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7655/">CVE-2015-7655</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7656/">CVE-2015-7656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7657/">CVE-2015-7657</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7658/">CVE-2015-7658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7659/">CVE-2015-7659</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7660/">CVE-2015-7660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7661/">CVE-2015-7661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7662/">CVE-2015-7662</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7663/">CVE-2015-7663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8042/">CVE-2015-8042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8043/">CVE-2015-8043</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8044/">CVE-2015-8044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8046/">CVE-2015-8046</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116120" comment="flash-player-11.2.202.548-111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009116121" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75954" version="1" class="patch">
	<metadata>
		<title>freerdp-1.0.2-7.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-0250" ref_url="https://www.suse.com/security/cve/CVE-2014-0250/" source="CVE"/>
		<reference ref_id="CVE-2014-0791" ref_url="https://www.suse.com/security/cve/CVE-2014-0791/" source="CVE"/>
		<description>
These are all security issues fixed in the freerdp-1.0.2-7.9 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0250/">CVE-2014-0250</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0791/">CVE-2014-0791</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141342" comment="freerdp-1.0.2-7.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141343" comment="libfreerdp-1_0-1.0.2-7.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141344" comment="libfreerdp-1_0-plugins-1.0.2-7.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75955" version="1" class="patch">
	<metadata>
		<title>ft2demos-2.5.5-7.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0946" ref_url="https://www.suse.com/security/cve/CVE-2009-0946/" source="CVE"/>
		<reference ref_id="CVE-2010-2497" ref_url="https://www.suse.com/security/cve/CVE-2010-2497/" source="CVE"/>
		<reference ref_id="CVE-2010-2805" ref_url="https://www.suse.com/security/cve/CVE-2010-2805/" source="CVE"/>
		<reference ref_id="CVE-2010-3053" ref_url="https://www.suse.com/security/cve/CVE-2010-3053/" source="CVE"/>
		<reference ref_id="CVE-2010-3054" ref_url="https://www.suse.com/security/cve/CVE-2010-3054/" source="CVE"/>
		<reference ref_id="CVE-2010-3311" ref_url="https://www.suse.com/security/cve/CVE-2010-3311/" source="CVE"/>
		<reference ref_id="CVE-2010-3814" ref_url="https://www.suse.com/security/cve/CVE-2010-3814/" source="CVE"/>
		<reference ref_id="CVE-2011-0226" ref_url="https://www.suse.com/security/cve/CVE-2011-0226/" source="CVE"/>
		<reference ref_id="CVE-2012-5668" ref_url="https://www.suse.com/security/cve/CVE-2012-5668/" source="CVE"/>
		<reference ref_id="CVE-2012-5669" ref_url="https://www.suse.com/security/cve/CVE-2012-5669/" source="CVE"/>
		<reference ref_id="CVE-2012-5670" ref_url="https://www.suse.com/security/cve/CVE-2012-5670/" source="CVE"/>
		<reference ref_id="CVE-2014-2240" ref_url="https://www.suse.com/security/cve/CVE-2014-2240/" source="CVE"/>
		<reference ref_id="CVE-2014-9656" ref_url="https://www.suse.com/security/cve/CVE-2014-9656/" source="CVE"/>
		<reference ref_id="CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657/" source="CVE"/>
		<reference ref_id="CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658/" source="CVE"/>
		<reference ref_id="CVE-2014-9659" ref_url="https://www.suse.com/security/cve/CVE-2014-9659/" source="CVE"/>
		<reference ref_id="CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660/" source="CVE"/>
		<reference ref_id="CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661/" source="CVE"/>
		<reference ref_id="CVE-2014-9662" ref_url="https://www.suse.com/security/cve/CVE-2014-9662/" source="CVE"/>
		<reference ref_id="CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663/" source="CVE"/>
		<reference ref_id="CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664/" source="CVE"/>
		<reference ref_id="CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665/" source="CVE"/>
		<reference ref_id="CVE-2014-9666" ref_url="https://www.suse.com/security/cve/CVE-2014-9666/" source="CVE"/>
		<reference ref_id="CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667/" source="CVE"/>
		<reference ref_id="CVE-2014-9668" ref_url="https://www.suse.com/security/cve/CVE-2014-9668/" source="CVE"/>
		<reference ref_id="CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669/" source="CVE"/>
		<reference ref_id="CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670/" source="CVE"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<reference ref_id="CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672/" source="CVE"/>
		<reference ref_id="CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673/" source="CVE"/>
		<reference ref_id="CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674/" source="CVE"/>
		<reference ref_id="CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675/" source="CVE"/>
		<description>
These are all security issues fixed in the ft2demos-2.5.5-7.5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0946/">CVE-2009-0946</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2497/">CVE-2010-2497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2805/">CVE-2010-2805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3053/">CVE-2010-3053</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3054/">CVE-2010-3054</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3311/">CVE-2010-3311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3814/">CVE-2010-3814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0226/">CVE-2011-0226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5668/">CVE-2012-5668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5669/">CVE-2012-5669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5670/">CVE-2012-5670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2240/">CVE-2014-2240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9656/">CVE-2014-9656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9659/">CVE-2014-9659</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9662/">CVE-2014-9662</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9666/">CVE-2014-9666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9668/">CVE-2014-9668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141861" comment="ft2demos-2.5.5-7.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75956" version="1" class="patch">
	<metadata>
		<title>fuse-2.9.3-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-3297" ref_url="https://www.suse.com/security/cve/CVE-2009-3297/" source="CVE"/>
		<reference ref_id="CVE-2011-0541" ref_url="https://www.suse.com/security/cve/CVE-2011-0541/" source="CVE"/>
		<reference ref_id="CVE-2015-3202" ref_url="https://www.suse.com/security/cve/CVE-2015-3202/" source="CVE"/>
		<description>
These are all security issues fixed in the fuse-2.9.3-5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3297/">CVE-2009-3297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0541/">CVE-2011-0541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3202/">CVE-2015-3202</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110488" comment="fuse-2.9.3-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110491" comment="libfuse2-2.9.3-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75957" version="1" class="patch">
	<metadata>
		<title>gd-2.1.0-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-2497" ref_url="https://www.suse.com/security/cve/CVE-2014-2497/" source="CVE"/>
		<reference ref_id="CVE-2014-9709" ref_url="https://www.suse.com/security/cve/CVE-2014-9709/" source="CVE"/>
		<description>
These are all security issues fixed in the gd-2.1.0-5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2497/">CVE-2014-2497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9709/">CVE-2014-9709</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109545" comment="gd-2.1.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109546" comment="gd-32bit-2.1.0-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75958" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-lang-2.30.6-1.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-2485" ref_url="https://www.suse.com/security/cve/CVE-2011-2485/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-lang-2.30.6-1.23 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2485/">CVE-2011-2485</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141352" comment="gdk-pixbuf-lang-2.30.6-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141353" comment="gdk-pixbuf-query-loaders-2.30.6-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141354" comment="gdk-pixbuf-query-loaders-32bit-2.30.6-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141355" comment="libgdk_pixbuf-2_0-0-2.30.6-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141356" comment="libgdk_pixbuf-2_0-0-32bit-2.30.6-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141357" comment="typelib-1_0-GdkPixbuf-2_0-2.30.6-1.23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75959" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-loader-rsvg-2.40.2-1.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-3146" ref_url="https://www.suse.com/security/cve/CVE-2011-3146/" source="CVE"/>
		<reference ref_id="CVE-2013-1881" ref_url="https://www.suse.com/security/cve/CVE-2013-1881/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-loader-rsvg-2.40.2-1.13 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3146/">CVE-2011-3146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1881/">CVE-2013-1881</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141358" comment="gdk-pixbuf-loader-rsvg-2.40.2-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141359" comment="librsvg-2-2-2.40.2-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141360" comment="librsvg-2-2-32bit-2.40.2-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141361" comment="rsvg-view-2.40.2-1.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75960" version="1" class="patch">
	<metadata>
		<title>gdm-3.10.0.1-23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-1709" ref_url="https://www.suse.com/security/cve/CVE-2011-1709/" source="CVE"/>
		<description>
These are all security issues fixed in the gdm-3.10.0.1-23.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1709/">CVE-2011-1709</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141862" comment="gdm-3.10.0.1-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141863" comment="gdm-branding-upstream-3.10.0.1-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141864" comment="gdm-lang-3.10.0.1-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141865" comment="gdmflexiserver-3.10.0.1-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141866" comment="libgdm1-3.10.0.1-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141867" comment="typelib-1_0-Gdm-1_0-3.10.0.1-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75961" version="1" class="patch">
	<metadata>
		<title>gimp-2.8.10-1.164 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-4540" ref_url="https://www.suse.com/security/cve/CVE-2010-4540/" source="CVE"/>
		<reference ref_id="CVE-2010-4541" ref_url="https://www.suse.com/security/cve/CVE-2010-4541/" source="CVE"/>
		<reference ref_id="CVE-2010-4542" ref_url="https://www.suse.com/security/cve/CVE-2010-4542/" source="CVE"/>
		<reference ref_id="CVE-2010-4543" ref_url="https://www.suse.com/security/cve/CVE-2010-4543/" source="CVE"/>
		<reference ref_id="CVE-2011-2896" ref_url="https://www.suse.com/security/cve/CVE-2011-2896/" source="CVE"/>
		<reference ref_id="CVE-2012-3236" ref_url="https://www.suse.com/security/cve/CVE-2012-3236/" source="CVE"/>
		<reference ref_id="CVE-2012-5576" ref_url="https://www.suse.com/security/cve/CVE-2012-5576/" source="CVE"/>
		<description>
These are all security issues fixed in the gimp-2.8.10-1.164 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4540/">CVE-2010-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4541/">CVE-2010-4541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4542/">CVE-2010-4542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4543/">CVE-2010-4543</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2896/">CVE-2011-2896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3236/">CVE-2012-3236</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5576/">CVE-2012-5576</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141368" comment="gimp-2.8.10-1.164 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141369" comment="gimp-lang-2.8.10-1.164 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141370" comment="gimp-plugins-python-2.8.10-1.164 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141371" comment="libgimp-2_0-0-2.8.10-1.164 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141372" comment="libgimpui-2_0-0-2.8.10-1.164 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75962" version="1" class="patch">
	<metadata>
		<title>glib2-lang-2.38.2-5.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-4316" ref_url="https://www.suse.com/security/cve/CVE-2008-4316/" source="CVE"/>
		<reference ref_id="CVE-2012-3524" ref_url="https://www.suse.com/security/cve/CVE-2012-3524/" source="CVE"/>
		<description>
These are all security issues fixed in the glib2-lang-2.38.2-5.12 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4316/">CVE-2008-4316</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3524/">CVE-2012-3524</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141373" comment="glib2-lang-2.38.2-5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141374" comment="glib2-tools-2.38.2-5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141375" comment="libgio-2_0-0-2.38.2-5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141376" comment="libgio-2_0-0-32bit-2.38.2-5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141377" comment="libgio-fam-2.38.2-5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141378" comment="libglib-2_0-0-2.38.2-5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141379" comment="libglib-2_0-0-32bit-2.38.2-5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141380" comment="libgmodule-2_0-0-2.38.2-5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141381" comment="libgmodule-2_0-0-32bit-2.38.2-5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141382" comment="libgobject-2_0-0-2.38.2-5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141383" comment="libgobject-2_0-0-32bit-2.38.2-5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141384" comment="libgthread-2_0-0-2.38.2-5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141385" comment="libgthread-2_0-0-32bit-2.38.2-5.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75963" version="1" class="patch">
	<metadata>
		<title>glibc-2.19-31.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-5029" ref_url="https://www.suse.com/security/cve/CVE-2009-5029/" source="CVE"/>
		<reference ref_id="CVE-2012-4412" ref_url="https://www.suse.com/security/cve/CVE-2012-4412/" source="CVE"/>
		<reference ref_id="CVE-2013-0242" ref_url="https://www.suse.com/security/cve/CVE-2013-0242/" source="CVE"/>
		<reference ref_id="CVE-2013-1914" ref_url="https://www.suse.com/security/cve/CVE-2013-1914/" source="CVE"/>
		<reference ref_id="CVE-2013-2207" ref_url="https://www.suse.com/security/cve/CVE-2013-2207/" source="CVE"/>
		<reference ref_id="CVE-2013-4237" ref_url="https://www.suse.com/security/cve/CVE-2013-4237/" source="CVE"/>
		<reference ref_id="CVE-2013-4332" ref_url="https://www.suse.com/security/cve/CVE-2013-4332/" source="CVE"/>
		<reference ref_id="CVE-2013-4458" ref_url="https://www.suse.com/security/cve/CVE-2013-4458/" source="CVE"/>
		<reference ref_id="CVE-2013-7423" ref_url="https://www.suse.com/security/cve/CVE-2013-7423/" source="CVE"/>
		<reference ref_id="CVE-2014-0475" ref_url="https://www.suse.com/security/cve/CVE-2014-0475/" source="CVE"/>
		<reference ref_id="CVE-2014-4043" ref_url="https://www.suse.com/security/cve/CVE-2014-4043/" source="CVE"/>
		<reference ref_id="CVE-2014-5119" ref_url="https://www.suse.com/security/cve/CVE-2014-5119/" source="CVE"/>
		<reference ref_id="CVE-2014-6040" ref_url="https://www.suse.com/security/cve/CVE-2014-6040/" source="CVE"/>
		<reference ref_id="CVE-2014-7817" ref_url="https://www.suse.com/security/cve/CVE-2014-7817/" source="CVE"/>
		<reference ref_id="CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121/" source="CVE"/>
		<reference ref_id="CVE-2014-9402" ref_url="https://www.suse.com/security/cve/CVE-2014-9402/" source="CVE"/>
		<reference ref_id="CVE-2015-1472" ref_url="https://www.suse.com/security/cve/CVE-2015-1472/" source="CVE"/>
		<reference ref_id="CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-2.19-31.9 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5029/">CVE-2009-5029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4412/">CVE-2012-4412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0242/">CVE-2013-0242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1914/">CVE-2013-1914</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2207/">CVE-2013-2207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4237/">CVE-2013-4237</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4332/">CVE-2013-4332</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4458/">CVE-2013-4458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7423/">CVE-2013-7423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0475/">CVE-2014-0475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4043/">CVE-2014-4043</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5119/">CVE-2014-5119</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6040/">CVE-2014-6040</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7817/">CVE-2014-7817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9402/">CVE-2014-9402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1472/">CVE-2015-1472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141868" comment="glibc-2.19-31.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141869" comment="glibc-32bit-2.19-31.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141870" comment="glibc-devel-2.19-31.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141871" comment="glibc-devel-32bit-2.19-31.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141872" comment="glibc-i18ndata-2.19-31.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141873" comment="glibc-locale-2.19-31.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141874" comment="glibc-locale-32bit-2.19-31.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141875" comment="nscd-2.19-31.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75964" version="1" class="patch">
	<metadata>
		<title>gnome-keyring-3.10.1-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2012-3466" ref_url="https://www.suse.com/security/cve/CVE-2012-3466/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-keyring-3.10.1-11.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3466/">CVE-2012-3466</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141876" comment="gnome-keyring-3.10.1-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141877" comment="gnome-keyring-32bit-3.10.1-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141878" comment="gnome-keyring-lang-3.10.1-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141879" comment="gnome-keyring-pam-3.10.1-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141880" comment="gnome-keyring-pam-32bit-3.10.1-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141881" comment="libgck-modules-gnome-keyring-3.10.1-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75965" version="1" class="patch">
	<metadata>
		<title>gnome-online-accounts-3.10.5-1.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-0240" ref_url="https://www.suse.com/security/cve/CVE-2013-0240/" source="CVE"/>
		<reference ref_id="CVE-2013-1799" ref_url="https://www.suse.com/security/cve/CVE-2013-1799/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-online-accounts-3.10.5-1.11 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0240/">CVE-2013-0240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1799/">CVE-2013-1799</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141400" comment="gnome-online-accounts-3.10.5-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141401" comment="gnome-online-accounts-lang-3.10.5-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141402" comment="libgoa-1_0-0-3.10.5-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141403" comment="libgoa-backend-1_0-1-3.10.5-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141404" comment="typelib-1_0-Goa-1_0-3.10.5-1.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75966" version="1" class="patch">
	<metadata>
		<title>gnome-settings-daemon-3.10.2-20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-7300" ref_url="https://www.suse.com/security/cve/CVE-2014-7300/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-settings-daemon-3.10.2-20.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7300/">CVE-2014-7300</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107802" comment="gnome-settings-daemon-3.10.2-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107804" comment="gnome-settings-daemon-lang-3.10.2-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75967" version="1" class="patch">
	<metadata>
		<title>gnome-shell-3.10.4-40.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-4000" ref_url="https://www.suse.com/security/cve/CVE-2010-4000/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-shell-3.10.4-40.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4000/">CVE-2010-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141882" comment="gnome-shell-3.10.4-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141883" comment="gnome-shell-browser-plugin-3.10.4-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141884" comment="gnome-shell-calendar-3.10.4-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141885" comment="gnome-shell-lang-3.10.4-40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75968" version="1" class="patch">
	<metadata>
		<title>gnutls-3.2.15-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-4989" ref_url="https://www.suse.com/security/cve/CVE-2008-4989/" source="CVE"/>
		<reference ref_id="CVE-2011-4128" ref_url="https://www.suse.com/security/cve/CVE-2011-4128/" source="CVE"/>
		<reference ref_id="CVE-2012-0390" ref_url="https://www.suse.com/security/cve/CVE-2012-0390/" source="CVE"/>
		<reference ref_id="CVE-2012-1569" ref_url="https://www.suse.com/security/cve/CVE-2012-1569/" source="CVE"/>
		<reference ref_id="CVE-2012-1573" ref_url="https://www.suse.com/security/cve/CVE-2012-1573/" source="CVE"/>
		<reference ref_id="CVE-2014-0092" ref_url="https://www.suse.com/security/cve/CVE-2014-0092/" source="CVE"/>
		<reference ref_id="CVE-2014-1959" ref_url="https://www.suse.com/security/cve/CVE-2014-1959/" source="CVE"/>
		<reference ref_id="CVE-2014-3466" ref_url="https://www.suse.com/security/cve/CVE-2014-3466/" source="CVE"/>
		<reference ref_id="CVE-2014-8564" ref_url="https://www.suse.com/security/cve/CVE-2014-8564/" source="CVE"/>
		<reference ref_id="CVE-2015-0294" ref_url="https://www.suse.com/security/cve/CVE-2015-0294/" source="CVE"/>
		<reference ref_id="CVE-2015-3622" ref_url="https://www.suse.com/security/cve/CVE-2015-3622/" source="CVE"/>
		<reference ref_id="CVE-2015-6251" ref_url="https://www.suse.com/security/cve/CVE-2015-6251/" source="CVE"/>
		<description>
These are all security issues fixed in the gnutls-3.2.15-11.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4989/">CVE-2008-4989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4128/">CVE-2011-4128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0390/">CVE-2012-0390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1569/">CVE-2012-1569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1573/">CVE-2012-1573</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0092/">CVE-2014-0092</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1959/">CVE-2014-1959</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3466/">CVE-2014-3466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8564/">CVE-2014-8564</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0294/">CVE-2015-0294</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3622/">CVE-2015-3622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6251/">CVE-2015-6251</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009114253" comment="gnutls-3.2.15-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114258" comment="libgnutls28-3.2.15-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114259" comment="libgnutls28-32bit-3.2.15-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75969" version="1" class="patch">
	<metadata>
		<title>gpg2-2.0.24-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-2547" ref_url="https://www.suse.com/security/cve/CVE-2010-2547/" source="CVE"/>
		<reference ref_id="CVE-2013-4351" ref_url="https://www.suse.com/security/cve/CVE-2013-4351/" source="CVE"/>
		<reference ref_id="CVE-2013-4402" ref_url="https://www.suse.com/security/cve/CVE-2013-4402/" source="CVE"/>
		<reference ref_id="CVE-2014-4617" ref_url="https://www.suse.com/security/cve/CVE-2014-4617/" source="CVE"/>
		<description>
These are all security issues fixed in the gpg2-2.0.24-1.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2547/">CVE-2010-2547</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4351/">CVE-2013-4351</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4402/">CVE-2013-4402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4617/">CVE-2014-4617</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141412" comment="gpg2-2.0.24-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141413" comment="gpg2-lang-2.0.24-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75970" version="1" class="patch">
	<metadata>
		<title>gpgme-1.5.1-1.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-3564" ref_url="https://www.suse.com/security/cve/CVE-2014-3564/" source="CVE"/>
		<description>
These are all security issues fixed in the gpgme-1.5.1-1.12 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3564/">CVE-2014-3564</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140643" comment="gpgme-1.5.1-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140644" comment="libgpgme11-1.5.1-1.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75971" version="1" class="patch">
	<metadata>
		<title>groff-1.22.2-5.429 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-5044" ref_url="https://www.suse.com/security/cve/CVE-2009-5044/" source="CVE"/>
		<reference ref_id="CVE-2009-5080" ref_url="https://www.suse.com/security/cve/CVE-2009-5080/" source="CVE"/>
		<reference ref_id="CVE-2009-5081" ref_url="https://www.suse.com/security/cve/CVE-2009-5081/" source="CVE"/>
		<description>
These are all security issues fixed in the groff-1.22.2-5.429 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5044/">CVE-2009-5044</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-5080/">CVE-2009-5080</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-5081/">CVE-2009-5081</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140645" comment="groff-1.22.2-5.429 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75972" version="1" class="patch">
	<metadata>
		<title>gstreamer-0_10-plugins-bad-0.10.23-17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2015-0797" ref_url="https://www.suse.com/security/cve/CVE-2015-0797/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-0_10-plugins-bad-0.10.23-17.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0797/">CVE-2015-0797</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109841" comment="gstreamer-0_10-plugins-bad-0.10.23-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109845" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109846" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109847" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109848" comment="libgstbasevideo-0_10-23-0.10.23-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109849" comment="libgstbasevideo-0_10-23-32bit-0.10.23-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109850" comment="libgstcodecparsers-0_10-23-0.10.23-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109852" comment="libgstphotography-0_10-23-0.10.23-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109853" comment="libgstphotography-0_10-23-32bit-0.10.23-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109854" comment="libgstsignalprocessor-0_10-23-0.10.23-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109855" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109856" comment="libgstvdp-0_10-23-0.10.23-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109857" comment="libgstvdp-0_10-23-32bit-0.10.23-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75973" version="1" class="patch">
	<metadata>
		<title>gvim-7.4.326-2.62 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0316" ref_url="https://www.suse.com/security/cve/CVE-2009-0316/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-7.4.326-2.62 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0316/">CVE-2009-0316</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140673" comment="gvim-7.4.326-2.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140674" comment="vim-7.4.326-2.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140675" comment="vim-data-7.4.326-2.62 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75974" version="1" class="patch">
	<metadata>
		<title>gzip-1.6-7.392 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-2624" ref_url="https://www.suse.com/security/cve/CVE-2009-2624/" source="CVE"/>
		<reference ref_id="CVE-2010-0001" ref_url="https://www.suse.com/security/cve/CVE-2010-0001/" source="CVE"/>
		<description>
These are all security issues fixed in the gzip-1.6-7.392 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2624/">CVE-2009-2624</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0001/">CVE-2010-0001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140677" comment="gzip-1.6-7.392 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75975" version="1" class="patch">
	<metadata>
		<title>hardlink-1.0-6.45 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-3630" ref_url="https://www.suse.com/security/cve/CVE-2011-3630/" source="CVE"/>
		<reference ref_id="CVE-2011-3631" ref_url="https://www.suse.com/security/cve/CVE-2011-3631/" source="CVE"/>
		<reference ref_id="CVE-2011-3632" ref_url="https://www.suse.com/security/cve/CVE-2011-3632/" source="CVE"/>
		<description>
These are all security issues fixed in the hardlink-1.0-6.45 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3630/">CVE-2011-3630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3631/">CVE-2011-3631</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3632/">CVE-2011-3632</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140678" comment="hardlink-1.0-6.45 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75976" version="1" class="patch">
	<metadata>
		<title>hplip-3.14.6-3.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2004-0801" ref_url="https://www.suse.com/security/cve/CVE-2004-0801/" source="CVE"/>
		<reference ref_id="CVE-2010-4267" ref_url="https://www.suse.com/security/cve/CVE-2010-4267/" source="CVE"/>
		<reference ref_id="CVE-2011-2697" ref_url="https://www.suse.com/security/cve/CVE-2011-2697/" source="CVE"/>
		<reference ref_id="CVE-2011-2722" ref_url="https://www.suse.com/security/cve/CVE-2011-2722/" source="CVE"/>
		<reference ref_id="CVE-2013-4325" ref_url="https://www.suse.com/security/cve/CVE-2013-4325/" source="CVE"/>
		<reference ref_id="CVE-2013-6402" ref_url="https://www.suse.com/security/cve/CVE-2013-6402/" source="CVE"/>
		<reference ref_id="CVE-2013-6427" ref_url="https://www.suse.com/security/cve/CVE-2013-6427/" source="CVE"/>
		<description>
These are all security issues fixed in the hplip-3.14.6-3.14 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2004-0801/">CVE-2004-0801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4267/">CVE-2010-4267</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2697/">CVE-2011-2697</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-2722/">CVE-2011-2722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4325/">CVE-2013-4325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6402/">CVE-2013-6402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6427/">CVE-2013-6427</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141414" comment="hplip-3.14.6-3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141415" comment="hplip-hpijs-3.14.6-3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141416" comment="hplip-sane-3.14.6-3.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75977" version="1" class="patch">
	<metadata>
		<title>hyper-v-6-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2012-2669" ref_url="https://www.suse.com/security/cve/CVE-2012-2669/" source="CVE"/>
		<reference ref_id="CVE-2012-5532" ref_url="https://www.suse.com/security/cve/CVE-2012-5532/" source="CVE"/>
		<description>
These are all security issues fixed in the hyper-v-6-11.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2669/">CVE-2012-2669</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-5532/">CVE-2012-5532</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141886" comment="hyper-v-6-11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75978" version="1" class="patch">
	<metadata>
		<title>ibus-chewing-1.4.10.1-2.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-4509" ref_url="https://www.suse.com/security/cve/CVE-2013-4509/" source="CVE"/>
		<description>
These are all security issues fixed in the ibus-chewing-1.4.10.1-2.25 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4509/">CVE-2013-4509</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141417" comment="ibus-chewing-1.4.10.1-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141418" comment="ibus-pinyin-1.5.0-2.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75979" version="1" class="patch">
	<metadata>
		<title>icu-52.1-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-9654" ref_url="https://www.suse.com/security/cve/CVE-2014-9654/" source="CVE"/>
		<description>
These are all security issues fixed in the icu-52.1-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9654/">CVE-2014-9654</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107566" comment="icu-52.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107572" comment="libicu52_1-52.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107571" comment="libicu52_1-32bit-52.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107573" comment="libicu52_1-data-52.1-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75980" version="1" class="patch">
	<metadata>
		<title>iputils-s20121221-2.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-2529" ref_url="https://www.suse.com/security/cve/CVE-2010-2529/" source="CVE"/>
		<description>
These are all security issues fixed in the iputils-s20121221-2.19 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2529/">CVE-2010-2529</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140686" comment="iputils-s20121221-2.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75981" version="1" class="patch">
	<metadata>
		<title>java-1_7_0-openjdk-1.7.0.91-21.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-3563" ref_url="https://www.suse.com/security/cve/CVE-2011-3563/" source="CVE"/>
		<reference ref_id="CVE-2011-3571" ref_url="https://www.suse.com/security/cve/CVE-2011-3571/" source="CVE"/>
		<reference ref_id="CVE-2011-5035" ref_url="https://www.suse.com/security/cve/CVE-2011-5035/" source="CVE"/>
		<reference ref_id="CVE-2012-0497" ref_url="https://www.suse.com/security/cve/CVE-2012-0497/" source="CVE"/>
		<reference ref_id="CVE-2012-0501" ref_url="https://www.suse.com/security/cve/CVE-2012-0501/" source="CVE"/>
		<reference ref_id="CVE-2012-0502" ref_url="https://www.suse.com/security/cve/CVE-2012-0502/" source="CVE"/>
		<reference ref_id="CVE-2012-0503" ref_url="https://www.suse.com/security/cve/CVE-2012-0503/" source="CVE"/>
		<reference ref_id="CVE-2012-0505" ref_url="https://www.suse.com/security/cve/CVE-2012-0505/" source="CVE"/>
		<reference ref_id="CVE-2012-0506" ref_url="https://www.suse.com/security/cve/CVE-2012-0506/" source="CVE"/>
		<reference ref_id="CVE-2012-0547" ref_url="https://www.suse.com/security/cve/CVE-2012-0547/" source="CVE"/>
		<reference ref_id="CVE-2012-1682" ref_url="https://www.suse.com/security/cve/CVE-2012-1682/" source="CVE"/>
		<reference ref_id="CVE-2012-1711" ref_url="https://www.suse.com/security/cve/CVE-2012-1711/" source="CVE"/>
		<reference ref_id="CVE-2012-1713" ref_url="https://www.suse.com/security/cve/CVE-2012-1713/" source="CVE"/>
		<reference ref_id="CVE-2012-1716" ref_url="https://www.suse.com/security/cve/CVE-2012-1716/" source="CVE"/>
		<reference ref_id="CVE-2012-1717" ref_url="https://www.suse.com/security/cve/CVE-2012-1717/" source="CVE"/>
		<reference ref_id="CVE-2012-1718" ref_url="https://www.suse.com/security/cve/CVE-2012-1718/" source="CVE"/>
		<reference ref_id="CVE-2012-1719" ref_url="https://www.suse.com/security/cve/CVE-2012-1719/" source="CVE"/>
		<reference ref_id="CVE-2012-1723" ref_url="https://www.suse.com/security/cve/CVE-2012-1723/" source="CVE"/>
		<reference ref_id="CVE-2012-1724" ref_url="https://www.suse.com/security/cve/CVE-2012-1724/" source="CVE"/>
		<reference ref_id="CVE-2012-1725" ref_url="https://www.suse.com/security/cve/CVE-2012-1725/" source="CVE"/>
		<reference ref_id="CVE-2012-1726" ref_url="https://www.suse.com/security/cve/CVE-2012-1726/" source="CVE"/>
		<reference ref_id="CVE-2012-3136" ref_url="https://www.suse.com/security/cve/CVE-2012-3136/" source="CVE"/>
		<reference ref_id="CVE-2012-3174" ref_url="https://www.suse.com/security/cve/CVE-2012-3174/" source="CVE"/>
		<reference ref_id="CVE-2012-3216" ref_url="https://www.suse.com/security/cve/CVE-2012-3216/" source="CVE"/>
		<reference ref_id="CVE-2012-4416" ref_url="https://www.suse.com/security/cve/CVE-2012-4416/" source="CVE"/>
		<reference ref_id="CVE-2012-4681" ref_url="https://www.suse.com/security/cve/CVE-2012-4681/" source="CVE"/>
		<reference ref_id="CVE-2012-5068" ref_url="https://www.suse.com/security/cve/CVE-2012-5068/" source="CVE"/>
		<reference ref_id="CVE-2012-5069" ref_url="https://www.suse.com/security/cve/CVE-2012-5069/" source="CVE"/>
		<reference ref_id="CVE-2012-5070" ref_url="https://www.suse.com/security/cve/CVE-2012-5070/" source="CVE"/>
		<reference ref_id="CVE-2012-5071" ref_url="https://www.suse.com/security/cve/CVE-2012-5071/" source="CVE"/>
		<reference ref_id="CVE-2012-5072" ref_url="https://www.suse.com/security/cve/CVE-2012-5072/" source="CVE"/>
		<reference ref_id="CVE-2012-5073" ref_url="https://www.suse.com/security/cve/CVE-2012-5073/" source="CVE"/>
		<reference ref_id="CVE-2012-5074" ref_url="https://www.suse.com/security/cve/CVE-2012-5074/" source="CVE"/>
		<reference ref_id="CVE-2012-5075" ref_url="https://www.suse.com/security/cve/CVE-2012-5075/" source="CVE"/>
		<reference ref_id="CVE-2012-5076" ref_url="https://www.suse.com/security/cve/CVE-2012-5076/" source="CVE"/>
		<reference ref_id="CVE-2012-5077" ref_url="https://www.suse.com/security/cve/CVE-2012-5077/" source="CVE"/>
		<reference ref_id="CVE-2012-5079" ref_url="https://www.suse.com/security/cve/CVE-2012-5079/" source="CVE"/>
		<reference ref_id="CVE-2012-5081" ref_url="https://www.suse.com/security/cve/CVE-2012-5081/" source="CVE"/>
		<reference ref_id="CVE-2012-5084" ref_url="https://www.suse.com/security/cve/CVE-2012-5084/" source="CVE"/>
		<reference ref_id="CVE-2012-5085" ref_url="https://www.suse.com/security/cve/CVE-2012-5085/" source="CVE"/>
		<reference ref_id="CVE-2012-5086" ref_url="https://www.suse.com/security/cve/CVE-2012-5086/" source="CVE"/>
		<reference ref_id="CVE-2012-5087" ref_url="https://www.suse.com/security/cve/CVE-2012-5087/" source="CVE"/>
		<reference ref_id="CVE-2012-5088" ref_url="https://www.suse.com/security/cve/CVE-2012-5088/" source="CVE"/>
		<reference ref_id="CVE-2012-5089" ref_url="https://www.suse.com/security/cve/CVE-2012-5089/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2013-0401" ref_url="https://www.suse.com/security/cve/CVE-2013-0401/" source="CVE"/>
		<reference ref_id="CVE-2013-0422" ref_url="https://www.suse.com/security/cve/CVE-2013-0422/" source="CVE"/>
		<reference ref_id="CVE-2013-0424" ref_url="https://www.suse.com/security/cve/CVE-2013-0424/" source="CVE"/>
		<reference ref_id="CVE-2013-0425" ref_url="https://www.suse.com/security/cve/CVE-2013-0425/" source="CVE"/>
		<reference ref_id="CVE-2013-0426" ref_url="https://www.suse.com/security/cve/CVE-2013-0426/" source="CVE"/>
		<reference ref_id="CVE-2013-0427" ref_url="https://www.suse.com/security/cve/CVE-2013-0427/" source="CVE"/>
		<reference ref_id="CVE-2013-0428" ref_url="https://www.suse.com/security/cve/CVE-2013-0428/" source="CVE"/>
		<reference ref_id="CVE-2013-0429" ref_url="https://www.suse.com/security/cve/CVE-2013-0429/" source="CVE"/>
		<reference ref_id="CVE-2013-0431" ref_url="https://www.suse.com/security/cve/CVE-2013-0431/" source="CVE"/>
		<reference ref_id="CVE-2013-0432" ref_url="https://www.suse.com/security/cve/CVE-2013-0432/" source="CVE"/>
		<reference ref_id="CVE-2013-0433" ref_url="https://www.suse.com/security/cve/CVE-2013-0433/" source="CVE"/>
		<reference ref_id="CVE-2013-0434" ref_url="https://www.suse.com/security/cve/CVE-2013-0434/" source="CVE"/>
		<reference ref_id="CVE-2013-0435" ref_url="https://www.suse.com/security/cve/CVE-2013-0435/" source="CVE"/>
		<reference ref_id="CVE-2013-0440" ref_url="https://www.suse.com/security/cve/CVE-2013-0440/" source="CVE"/>
		<reference ref_id="CVE-2013-0441" ref_url="https://www.suse.com/security/cve/CVE-2013-0441/" source="CVE"/>
		<reference ref_id="CVE-2013-0442" ref_url="https://www.suse.com/security/cve/CVE-2013-0442/" source="CVE"/>
		<reference ref_id="CVE-2013-0443" ref_url="https://www.suse.com/security/cve/CVE-2013-0443/" source="CVE"/>
		<reference ref_id="CVE-2013-0444" ref_url="https://www.suse.com/security/cve/CVE-2013-0444/" source="CVE"/>
		<reference ref_id="CVE-2013-0450" ref_url="https://www.suse.com/security/cve/CVE-2013-0450/" source="CVE"/>
		<reference ref_id="CVE-2013-0809" ref_url="https://www.suse.com/security/cve/CVE-2013-0809/" source="CVE"/>
		<reference ref_id="CVE-2013-1475" ref_url="https://www.suse.com/security/cve/CVE-2013-1475/" source="CVE"/>
		<reference ref_id="CVE-2013-1476" ref_url="https://www.suse.com/security/cve/CVE-2013-1476/" source="CVE"/>
		<reference ref_id="CVE-2013-1478" ref_url="https://www.suse.com/security/cve/CVE-2013-1478/" source="CVE"/>
		<reference ref_id="CVE-2013-1480" ref_url="https://www.suse.com/security/cve/CVE-2013-1480/" source="CVE"/>
		<reference ref_id="CVE-2013-1484" ref_url="https://www.suse.com/security/cve/CVE-2013-1484/" source="CVE"/>
		<reference ref_id="CVE-2013-1485" ref_url="https://www.suse.com/security/cve/CVE-2013-1485/" source="CVE"/>
		<reference ref_id="CVE-2013-1486" ref_url="https://www.suse.com/security/cve/CVE-2013-1486/" source="CVE"/>
		<reference ref_id="CVE-2013-1488" ref_url="https://www.suse.com/security/cve/CVE-2013-1488/" source="CVE"/>
		<reference ref_id="CVE-2013-1493" ref_url="https://www.suse.com/security/cve/CVE-2013-1493/" source="CVE"/>
		<reference ref_id="CVE-2013-1500" ref_url="https://www.suse.com/security/cve/CVE-2013-1500/" source="CVE"/>
		<reference ref_id="CVE-2013-1518" ref_url="https://www.suse.com/security/cve/CVE-2013-1518/" source="CVE"/>
		<reference ref_id="CVE-2013-1537" ref_url="https://www.suse.com/security/cve/CVE-2013-1537/" source="CVE"/>
		<reference ref_id="CVE-2013-1557" ref_url="https://www.suse.com/security/cve/CVE-2013-1557/" source="CVE"/>
		<reference ref_id="CVE-2013-1569" ref_url="https://www.suse.com/security/cve/CVE-2013-1569/" source="CVE"/>
		<reference ref_id="CVE-2013-1571" ref_url="https://www.suse.com/security/cve/CVE-2013-1571/" source="CVE"/>
		<reference ref_id="CVE-2013-2383" ref_url="https://www.suse.com/security/cve/CVE-2013-2383/" source="CVE"/>
		<reference ref_id="CVE-2013-2384" ref_url="https://www.suse.com/security/cve/CVE-2013-2384/" source="CVE"/>
		<reference ref_id="CVE-2013-2407" ref_url="https://www.suse.com/security/cve/CVE-2013-2407/" source="CVE"/>
		<reference ref_id="CVE-2013-2412" ref_url="https://www.suse.com/security/cve/CVE-2013-2412/" source="CVE"/>
		<reference ref_id="CVE-2013-2415" ref_url="https://www.suse.com/security/cve/CVE-2013-2415/" source="CVE"/>
		<reference ref_id="CVE-2013-2417" ref_url="https://www.suse.com/security/cve/CVE-2013-2417/" source="CVE"/>
		<reference ref_id="CVE-2013-2419" ref_url="https://www.suse.com/security/cve/CVE-2013-2419/" source="CVE"/>
		<reference ref_id="CVE-2013-2420" ref_url="https://www.suse.com/security/cve/CVE-2013-2420/" source="CVE"/>
		<reference ref_id="CVE-2013-2421" ref_url="https://www.suse.com/security/cve/CVE-2013-2421/" source="CVE"/>
		<reference ref_id="CVE-2013-2422" ref_url="https://www.suse.com/security/cve/CVE-2013-2422/" source="CVE"/>
		<reference ref_id="CVE-2013-2423" ref_url="https://www.suse.com/security/cve/CVE-2013-2423/" source="CVE"/>
		<reference ref_id="CVE-2013-2424" ref_url="https://www.suse.com/security/cve/CVE-2013-2424/" source="CVE"/>
		<reference ref_id="CVE-2013-2426" ref_url="https://www.suse.com/security/cve/CVE-2013-2426/" source="CVE"/>
		<reference ref_id="CVE-2013-2429" ref_url="https://www.suse.com/security/cve/CVE-2013-2429/" source="CVE"/>
		<reference ref_id="CVE-2013-2430" ref_url="https://www.suse.com/security/cve/CVE-2013-2430/" source="CVE"/>
		<reference ref_id="CVE-2013-2431" ref_url="https://www.suse.com/security/cve/CVE-2013-2431/" source="CVE"/>
		<reference ref_id="CVE-2013-2436" ref_url="https://www.suse.com/security/cve/CVE-2013-2436/" source="CVE"/>
		<reference ref_id="CVE-2013-2443" ref_url="https://www.suse.com/security/cve/CVE-2013-2443/" source="CVE"/>
		<reference ref_id="CVE-2013-2444" ref_url="https://www.suse.com/security/cve/CVE-2013-2444/" source="CVE"/>
		<reference ref_id="CVE-2013-2445" ref_url="https://www.suse.com/security/cve/CVE-2013-2445/" source="CVE"/>
		<reference ref_id="CVE-2013-2446" ref_url="https://www.suse.com/security/cve/CVE-2013-2446/" source="CVE"/>
		<reference ref_id="CVE-2013-2447" ref_url="https://www.suse.com/security/cve/CVE-2013-2447/" source="CVE"/>
		<reference ref_id="CVE-2013-2448" ref_url="https://www.suse.com/security/cve/CVE-2013-2448/" source="CVE"/>
		<reference ref_id="CVE-2013-2449" ref_url="https://www.suse.com/security/cve/CVE-2013-2449/" source="CVE"/>
		<reference ref_id="CVE-2013-2450" ref_url="https://www.suse.com/security/cve/CVE-2013-2450/" source="CVE"/>
		<reference ref_id="CVE-2013-2451" ref_url="https://www.suse.com/security/cve/CVE-2013-2451/" source="CVE"/>
		<reference ref_id="CVE-2013-2452" ref_url="https://www.suse.com/security/cve/CVE-2013-2452/" source="CVE"/>
		<reference ref_id="CVE-2013-2453" ref_url="https://www.suse.com/security/cve/CVE-2013-2453/" source="CVE"/>
		<reference ref_id="CVE-2013-2454" ref_url="https://www.suse.com/security/cve/CVE-2013-2454/" source="CVE"/>
		<reference ref_id="CVE-2013-2455" ref_url="https://www.suse.com/security/cve/CVE-2013-2455/" source="CVE"/>
		<reference ref_id="CVE-2013-2456" ref_url="https://www.suse.com/security/cve/CVE-2013-2456/" source="CVE"/>
		<reference ref_id="CVE-2013-2457" ref_url="https://www.suse.com/security/cve/CVE-2013-2457/" source="CVE"/>
		<reference ref_id="CVE-2013-2458" ref_url="https://www.suse.com/security/cve/CVE-2013-2458/" source="CVE"/>
		<reference ref_id="CVE-2013-2459" ref_url="https://www.suse.com/security/cve/CVE-2013-2459/" source="CVE"/>
		<reference ref_id="CVE-2013-2460" ref_url="https://www.suse.com/security/cve/CVE-2013-2460/" source="CVE"/>
		<reference ref_id="CVE-2013-2461" ref_url="https://www.suse.com/security/cve/CVE-2013-2461/" source="CVE"/>
		<reference ref_id="CVE-2013-2463" ref_url="https://www.suse.com/security/cve/CVE-2013-2463/" source="CVE"/>
		<reference ref_id="CVE-2013-2465" ref_url="https://www.suse.com/security/cve/CVE-2013-2465/" source="CVE"/>
		<reference ref_id="CVE-2013-2469" ref_url="https://www.suse.com/security/cve/CVE-2013-2469/" source="CVE"/>
		<reference ref_id="CVE-2013-2470" ref_url="https://www.suse.com/security/cve/CVE-2013-2470/" source="CVE"/>
		<reference ref_id="CVE-2013-2471" ref_url="https://www.suse.com/security/cve/CVE-2013-2471/" source="CVE"/>
		<reference ref_id="CVE-2013-2472" ref_url="https://www.suse.com/security/cve/CVE-2013-2472/" source="CVE"/>
		<reference ref_id="CVE-2013-2473" ref_url="https://www.suse.com/security/cve/CVE-2013-2473/" source="CVE"/>
		<reference ref_id="CVE-2013-3829" ref_url="https://www.suse.com/security/cve/CVE-2013-3829/" source="CVE"/>
		<reference ref_id="CVE-2013-4002" ref_url="https://www.suse.com/security/cve/CVE-2013-4002/" source="CVE"/>
		<reference ref_id="CVE-2013-5772" ref_url="https://www.suse.com/security/cve/CVE-2013-5772/" source="CVE"/>
		<reference ref_id="CVE-2013-5774" ref_url="https://www.suse.com/security/cve/CVE-2013-5774/" source="CVE"/>
		<reference ref_id="CVE-2013-5778" ref_url="https://www.suse.com/security/cve/CVE-2013-5778/" source="CVE"/>
		<reference ref_id="CVE-2013-5780" ref_url="https://www.suse.com/security/cve/CVE-2013-5780/" source="CVE"/>
		<reference ref_id="CVE-2013-5782" ref_url="https://www.suse.com/security/cve/CVE-2013-5782/" source="CVE"/>
		<reference ref_id="CVE-2013-5783" ref_url="https://www.suse.com/security/cve/CVE-2013-5783/" source="CVE"/>
		<reference ref_id="CVE-2013-5784" ref_url="https://www.suse.com/security/cve/CVE-2013-5784/" source="CVE"/>
		<reference ref_id="CVE-2013-5790" ref_url="https://www.suse.com/security/cve/CVE-2013-5790/" source="CVE"/>
		<reference ref_id="CVE-2013-5797" ref_url="https://www.suse.com/security/cve/CVE-2013-5797/" source="CVE"/>
		<reference ref_id="CVE-2013-5800" ref_url="https://www.suse.com/security/cve/CVE-2013-5800/" source="CVE"/>
		<reference ref_id="CVE-2013-5802" ref_url="https://www.suse.com/security/cve/CVE-2013-5802/" source="CVE"/>
		<reference ref_id="CVE-2013-5803" ref_url="https://www.suse.com/security/cve/CVE-2013-5803/" source="CVE"/>
		<reference ref_id="CVE-2013-5804" ref_url="https://www.suse.com/security/cve/CVE-2013-5804/" source="CVE"/>
		<reference ref_id="CVE-2013-5805" ref_url="https://www.suse.com/security/cve/CVE-2013-5805/" source="CVE"/>
		<reference ref_id="CVE-2013-5806" ref_url="https://www.suse.com/security/cve/CVE-2013-5806/" source="CVE"/>
		<reference ref_id="CVE-2013-5809" ref_url="https://www.suse.com/security/cve/CVE-2013-5809/" source="CVE"/>
		<reference ref_id="CVE-2013-5814" ref_url="https://www.suse.com/security/cve/CVE-2013-5814/" source="CVE"/>
		<reference ref_id="CVE-2013-5817" ref_url="https://www.suse.com/security/cve/CVE-2013-5817/" source="CVE"/>
		<reference ref_id="CVE-2013-5820" ref_url="https://www.suse.com/security/cve/CVE-2013-5820/" source="CVE"/>
		<reference ref_id="CVE-2013-5823" ref_url="https://www.suse.com/security/cve/CVE-2013-5823/" source="CVE"/>
		<reference ref_id="CVE-2013-5825" ref_url="https://www.suse.com/security/cve/CVE-2013-5825/" source="CVE"/>
		<reference ref_id="CVE-2013-5829" ref_url="https://www.suse.com/security/cve/CVE-2013-5829/" source="CVE"/>
		<reference ref_id="CVE-2013-5830" ref_url="https://www.suse.com/security/cve/CVE-2013-5830/" source="CVE"/>
		<reference ref_id="CVE-2013-5840" ref_url="https://www.suse.com/security/cve/CVE-2013-5840/" source="CVE"/>
		<reference ref_id="CVE-2013-5842" ref_url="https://www.suse.com/security/cve/CVE-2013-5842/" source="CVE"/>
		<reference ref_id="CVE-2013-5849" ref_url="https://www.suse.com/security/cve/CVE-2013-5849/" source="CVE"/>
		<reference ref_id="CVE-2013-5850" ref_url="https://www.suse.com/security/cve/CVE-2013-5850/" source="CVE"/>
		<reference ref_id="CVE-2013-5851" ref_url="https://www.suse.com/security/cve/CVE-2013-5851/" source="CVE"/>
		<reference ref_id="CVE-2013-5878" ref_url="https://www.suse.com/security/cve/CVE-2013-5878/" source="CVE"/>
		<reference ref_id="CVE-2013-5884" ref_url="https://www.suse.com/security/cve/CVE-2013-5884/" source="CVE"/>
		<reference ref_id="CVE-2013-5893" ref_url="https://www.suse.com/security/cve/CVE-2013-5893/" source="CVE"/>
		<reference ref_id="CVE-2013-5896" ref_url="https://www.suse.com/security/cve/CVE-2013-5896/" source="CVE"/>
		<reference ref_id="CVE-2013-5907" ref_url="https://www.suse.com/security/cve/CVE-2013-5907/" source="CVE"/>
		<reference ref_id="CVE-2013-5910" ref_url="https://www.suse.com/security/cve/CVE-2013-5910/" source="CVE"/>
		<reference ref_id="CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629/" source="CVE"/>
		<reference ref_id="CVE-2013-6954" ref_url="https://www.suse.com/security/cve/CVE-2013-6954/" source="CVE"/>
		<reference ref_id="CVE-2014-0368" ref_url="https://www.suse.com/security/cve/CVE-2014-0368/" source="CVE"/>
		<reference ref_id="CVE-2014-0373" ref_url="https://www.suse.com/security/cve/CVE-2014-0373/" source="CVE"/>
		<reference ref_id="CVE-2014-0376" ref_url="https://www.suse.com/security/cve/CVE-2014-0376/" source="CVE"/>
		<reference ref_id="CVE-2014-0408" ref_url="https://www.suse.com/security/cve/CVE-2014-0408/" source="CVE"/>
		<reference ref_id="CVE-2014-0411" ref_url="https://www.suse.com/security/cve/CVE-2014-0411/" source="CVE"/>
		<reference ref_id="CVE-2014-0416" ref_url="https://www.suse.com/security/cve/CVE-2014-0416/" source="CVE"/>
		<reference ref_id="CVE-2014-0422" ref_url="https://www.suse.com/security/cve/CVE-2014-0422/" source="CVE"/>
		<reference ref_id="CVE-2014-0423" ref_url="https://www.suse.com/security/cve/CVE-2014-0423/" source="CVE"/>
		<reference ref_id="CVE-2014-0428" ref_url="https://www.suse.com/security/cve/CVE-2014-0428/" source="CVE"/>
		<reference ref_id="CVE-2014-0429" ref_url="https://www.suse.com/security/cve/CVE-2014-0429/" source="CVE"/>
		<reference ref_id="CVE-2014-0446" ref_url="https://www.suse.com/security/cve/CVE-2014-0446/" source="CVE"/>
		<reference ref_id="CVE-2014-0451" ref_url="https://www.suse.com/security/cve/CVE-2014-0451/" source="CVE"/>
		<reference ref_id="CVE-2014-0452" ref_url="https://www.suse.com/security/cve/CVE-2014-0452/" source="CVE"/>
		<reference ref_id="CVE-2014-0453" ref_url="https://www.suse.com/security/cve/CVE-2014-0453/" source="CVE"/>
		<reference ref_id="CVE-2014-0454" ref_url="https://www.suse.com/security/cve/CVE-2014-0454/" source="CVE"/>
		<reference ref_id="CVE-2014-0455" ref_url="https://www.suse.com/security/cve/CVE-2014-0455/" source="CVE"/>
		<reference ref_id="CVE-2014-0456" ref_url="https://www.suse.com/security/cve/CVE-2014-0456/" source="CVE"/>
		<reference ref_id="CVE-2014-0457" ref_url="https://www.suse.com/security/cve/CVE-2014-0457/" source="CVE"/>
		<reference ref_id="CVE-2014-0458" ref_url="https://www.suse.com/security/cve/CVE-2014-0458/" source="CVE"/>
		<reference ref_id="CVE-2014-0459" ref_url="https://www.suse.com/security/cve/CVE-2014-0459/" source="CVE"/>
		<reference ref_id="CVE-2014-0460" ref_url="https://www.suse.com/security/cve/CVE-2014-0460/" source="CVE"/>
		<reference ref_id="CVE-2014-0461" ref_url="https://www.suse.com/security/cve/CVE-2014-0461/" source="CVE"/>
		<reference ref_id="CVE-2014-1876" ref_url="https://www.suse.com/security/cve/CVE-2014-1876/" source="CVE"/>
		<reference ref_id="CVE-2014-2397" ref_url="https://www.suse.com/security/cve/CVE-2014-2397/" source="CVE"/>
		<reference ref_id="CVE-2014-2398" ref_url="https://www.suse.com/security/cve/CVE-2014-2398/" source="CVE"/>
		<reference ref_id="CVE-2014-2402" ref_url="https://www.suse.com/security/cve/CVE-2014-2402/" source="CVE"/>
		<reference ref_id="CVE-2014-2403" ref_url="https://www.suse.com/security/cve/CVE-2014-2403/" source="CVE"/>
		<reference ref_id="CVE-2014-2412" ref_url="https://www.suse.com/security/cve/CVE-2014-2412/" source="CVE"/>
		<reference ref_id="CVE-2014-2413" ref_url="https://www.suse.com/security/cve/CVE-2014-2413/" source="CVE"/>
		<reference ref_id="CVE-2014-2414" ref_url="https://www.suse.com/security/cve/CVE-2014-2414/" source="CVE"/>
		<reference ref_id="CVE-2014-2421" ref_url="https://www.suse.com/security/cve/CVE-2014-2421/" source="CVE"/>
		<reference ref_id="CVE-2014-2423" ref_url="https://www.suse.com/security/cve/CVE-2014-2423/" source="CVE"/>
		<reference ref_id="CVE-2014-2427" ref_url="https://www.suse.com/security/cve/CVE-2014-2427/" source="CVE"/>
		<reference ref_id="CVE-2014-2483" ref_url="https://www.suse.com/security/cve/CVE-2014-2483/" source="CVE"/>
		<reference ref_id="CVE-2014-2490" ref_url="https://www.suse.com/security/cve/CVE-2014-2490/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-4209" ref_url="https://www.suse.com/security/cve/CVE-2014-4209/" source="CVE"/>
		<reference ref_id="CVE-2014-4216" ref_url="https://www.suse.com/security/cve/CVE-2014-4216/" source="CVE"/>
		<reference ref_id="CVE-2014-4218" ref_url="https://www.suse.com/security/cve/CVE-2014-4218/" source="CVE"/>
		<reference ref_id="CVE-2014-4219" ref_url="https://www.suse.com/security/cve/CVE-2014-4219/" source="CVE"/>
		<reference ref_id="CVE-2014-4221" ref_url="https://www.suse.com/security/cve/CVE-2014-4221/" source="CVE"/>
		<reference ref_id="CVE-2014-4223" ref_url="https://www.suse.com/security/cve/CVE-2014-4223/" source="CVE"/>
		<reference ref_id="CVE-2014-4244" ref_url="https://www.suse.com/security/cve/CVE-2014-4244/" source="CVE"/>
		<reference ref_id="CVE-2014-4252" ref_url="https://www.suse.com/security/cve/CVE-2014-4252/" source="CVE"/>
		<reference ref_id="CVE-2014-4262" ref_url="https://www.suse.com/security/cve/CVE-2014-4262/" source="CVE"/>
		<reference ref_id="CVE-2014-4263" ref_url="https://www.suse.com/security/cve/CVE-2014-4263/" source="CVE"/>
		<reference ref_id="CVE-2014-4264" ref_url="https://www.suse.com/security/cve/CVE-2014-4264/" source="CVE"/>
		<reference ref_id="CVE-2014-4266" ref_url="https://www.suse.com/security/cve/CVE-2014-4266/" source="CVE"/>
		<reference ref_id="CVE-2014-4268" ref_url="https://www.suse.com/security/cve/CVE-2014-4268/" source="CVE"/>
		<reference ref_id="CVE-2014-6457" ref_url="https://www.suse.com/security/cve/CVE-2014-6457/" source="CVE"/>
		<reference ref_id="CVE-2014-6502" ref_url="https://www.suse.com/security/cve/CVE-2014-6502/" source="CVE"/>
		<reference ref_id="CVE-2014-6504" ref_url="https://www.suse.com/security/cve/CVE-2014-6504/" source="CVE"/>
		<reference ref_id="CVE-2014-6506" ref_url="https://www.suse.com/security/cve/CVE-2014-6506/" source="CVE"/>
		<reference ref_id="CVE-2014-6511" ref_url="https://www.suse.com/security/cve/CVE-2014-6511/" source="CVE"/>
		<reference ref_id="CVE-2014-6512" ref_url="https://www.suse.com/security/cve/CVE-2014-6512/" source="CVE"/>
		<reference ref_id="CVE-2014-6513" ref_url="https://www.suse.com/security/cve/CVE-2014-6513/" source="CVE"/>
		<reference ref_id="CVE-2014-6517" ref_url="https://www.suse.com/security/cve/CVE-2014-6517/" source="CVE"/>
		<reference ref_id="CVE-2014-6519" ref_url="https://www.suse.com/security/cve/CVE-2014-6519/" source="CVE"/>
		<reference ref_id="CVE-2014-6531" ref_url="https://www.suse.com/security/cve/CVE-2014-6531/" source="CVE"/>
		<reference ref_id="CVE-2014-6558" ref_url="https://www.suse.com/security/cve/CVE-2014-6558/" source="CVE"/>
		<reference ref_id="CVE-2014-6585" ref_url="https://www.suse.com/security/cve/CVE-2014-6585/" source="CVE"/>
		<reference ref_id="CVE-2014-6587" ref_url="https://www.suse.com/security/cve/CVE-2014-6587/" source="CVE"/>
		<reference ref_id="CVE-2014-6591" ref_url="https://www.suse.com/security/cve/CVE-2014-6591/" source="CVE"/>
		<reference ref_id="CVE-2014-6593" ref_url="https://www.suse.com/security/cve/CVE-2014-6593/" source="CVE"/>
		<reference ref_id="CVE-2014-6601" ref_url="https://www.suse.com/security/cve/CVE-2014-6601/" source="CVE"/>
		<reference ref_id="CVE-2015-0383" ref_url="https://www.suse.com/security/cve/CVE-2015-0383/" source="CVE"/>
		<reference ref_id="CVE-2015-0395" ref_url="https://www.suse.com/security/cve/CVE-2015-0395/" source="CVE"/>
		<reference ref_id="CVE-2015-0400" ref_url="https://www.suse.com/security/cve/CVE-2015-0400/" source="CVE"/>
		<reference ref_id="CVE-2015-0407" ref_url="https://www.suse.com/security/cve/CVE-2015-0407/" source="CVE"/>
		<reference ref_id="CVE-2015-0408" ref_url="https://www.suse.com/security/cve/CVE-2015-0408/" source="CVE"/>
		<reference ref_id="CVE-2015-0410" ref_url="https://www.suse.com/security/cve/CVE-2015-0410/" source="CVE"/>
		<reference ref_id="CVE-2015-0412" ref_url="https://www.suse.com/security/cve/CVE-2015-0412/" source="CVE"/>
		<reference ref_id="CVE-2015-0460" ref_url="https://www.suse.com/security/cve/CVE-2015-0460/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2628" ref_url="https://www.suse.com/security/cve/CVE-2015-2628/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4881" ref_url="https://www.suse.com/security/cve/CVE-2015-4881/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_7_0-openjdk-1.7.0.91-21.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3563/">CVE-2011-3563</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3571/">CVE-2011-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5035/">CVE-2011-5035</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0497/">CVE-2012-0497</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0501/">CVE-2012-0501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0502/">CVE-2012-0502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0503/">CVE-2012-0503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0505/">CVE-2012-0505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0506/">CVE-2012-0506</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0547/">CVE-2012-0547</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1682/">CVE-2012-1682</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1711/">CVE-2012-1711</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1713/">CVE-2012-1713</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1716/">CVE-2012-1716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1717/">CVE-2012-1717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1718/">CVE-2012-1718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1719/">CVE-2012-1719</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1723/">CVE-2012-1723</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1724/">CVE-2012-1724</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1725/">CVE-2012-1725</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1726/">CVE-2012-1726</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3136/">CVE-2012-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3174/">CVE-2012-3174</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3216/">CVE-2012-3216</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4416/">CVE-2012-4416</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4681/">CVE-2012-4681</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5068/">CVE-2012-5068</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5069/">CVE-2012-5069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5070/">CVE-2012-5070</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5071/">CVE-2012-5071</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5072/">CVE-2012-5072</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5073/">CVE-2012-5073</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5074/">CVE-2012-5074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5075/">CVE-2012-5075</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5076/">CVE-2012-5076</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-5077/">CVE-2012-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5079/">CVE-2012-5079</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5081/">CVE-2012-5081</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5084/">CVE-2012-5084</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-5085/">CVE-2012-5085</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5086/">CVE-2012-5086</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5087/">CVE-2012-5087</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5088/">CVE-2012-5088</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5089/">CVE-2012-5089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0401/">CVE-2013-0401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0422/">CVE-2013-0422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0424/">CVE-2013-0424</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0425/">CVE-2013-0425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0426/">CVE-2013-0426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0427/">CVE-2013-0427</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0428/">CVE-2013-0428</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0429/">CVE-2013-0429</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0431/">CVE-2013-0431</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0432/">CVE-2013-0432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0433/">CVE-2013-0433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0434/">CVE-2013-0434</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0435/">CVE-2013-0435</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0440/">CVE-2013-0440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0441/">CVE-2013-0441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0442/">CVE-2013-0442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0443/">CVE-2013-0443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0444/">CVE-2013-0444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0450/">CVE-2013-0450</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0809/">CVE-2013-0809</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1475/">CVE-2013-1475</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1476/">CVE-2013-1476</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1478/">CVE-2013-1478</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1480/">CVE-2013-1480</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1484/">CVE-2013-1484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1485/">CVE-2013-1485</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1486/">CVE-2013-1486</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1488/">CVE-2013-1488</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1493/">CVE-2013-1493</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1500/">CVE-2013-1500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1518/">CVE-2013-1518</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1537/">CVE-2013-1537</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1557/">CVE-2013-1557</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1569/">CVE-2013-1569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1571/">CVE-2013-1571</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2383/">CVE-2013-2383</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2384/">CVE-2013-2384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2407/">CVE-2013-2407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2412/">CVE-2013-2412</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2415/">CVE-2013-2415</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2417/">CVE-2013-2417</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2419/">CVE-2013-2419</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2420/">CVE-2013-2420</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2421/">CVE-2013-2421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2422/">CVE-2013-2422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2423/">CVE-2013-2423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2424/">CVE-2013-2424</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2426/">CVE-2013-2426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2429/">CVE-2013-2429</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2430/">CVE-2013-2430</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2431/">CVE-2013-2431</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2436/">CVE-2013-2436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2443/">CVE-2013-2443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2444/">CVE-2013-2444</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2445/">CVE-2013-2445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2446/">CVE-2013-2446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2447/">CVE-2013-2447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2448/">CVE-2013-2448</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2449/">CVE-2013-2449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2450/">CVE-2013-2450</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2451/">CVE-2013-2451</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2452/">CVE-2013-2452</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2453/">CVE-2013-2453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2454/">CVE-2013-2454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2455/">CVE-2013-2455</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2456/">CVE-2013-2456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2457/">CVE-2013-2457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2458/">CVE-2013-2458</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2459/">CVE-2013-2459</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2460/">CVE-2013-2460</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2461/">CVE-2013-2461</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2463/">CVE-2013-2463</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2465/">CVE-2013-2465</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2469/">CVE-2013-2469</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2470/">CVE-2013-2470</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2471/">CVE-2013-2471</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2472/">CVE-2013-2472</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2473/">CVE-2013-2473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3829/">CVE-2013-3829</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4002/">CVE-2013-4002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5772/">CVE-2013-5772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5774/">CVE-2013-5774</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5778/">CVE-2013-5778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5780/">CVE-2013-5780</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5782/">CVE-2013-5782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5783/">CVE-2013-5783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5784/">CVE-2013-5784</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5790/">CVE-2013-5790</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-5797/">CVE-2013-5797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5800/">CVE-2013-5800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5802/">CVE-2013-5802</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5803/">CVE-2013-5803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5804/">CVE-2013-5804</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5805/">CVE-2013-5805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5806/">CVE-2013-5806</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5809/">CVE-2013-5809</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5814/">CVE-2013-5814</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5817/">CVE-2013-5817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5820/">CVE-2013-5820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5823/">CVE-2013-5823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5825/">CVE-2013-5825</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5829/">CVE-2013-5829</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5830/">CVE-2013-5830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5840/">CVE-2013-5840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5842/">CVE-2013-5842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5849/">CVE-2013-5849</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5850/">CVE-2013-5850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5851/">CVE-2013-5851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5878/">CVE-2013-5878</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5884/">CVE-2013-5884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5893/">CVE-2013-5893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5896/">CVE-2013-5896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5907/">CVE-2013-5907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5910/">CVE-2013-5910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6954/">CVE-2013-6954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0368/">CVE-2014-0368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0373/">CVE-2014-0373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0376/">CVE-2014-0376</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0408/">CVE-2014-0408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0411/">CVE-2014-0411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0416/">CVE-2014-0416</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0422/">CVE-2014-0422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0423/">CVE-2014-0423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0428/">CVE-2014-0428</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0429/">CVE-2014-0429</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0446/">CVE-2014-0446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0451/">CVE-2014-0451</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0452/">CVE-2014-0452</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0453/">CVE-2014-0453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0454/">CVE-2014-0454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0455/">CVE-2014-0455</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0456/">CVE-2014-0456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0457/">CVE-2014-0457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0458/">CVE-2014-0458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0459/">CVE-2014-0459</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0460/">CVE-2014-0460</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0461/">CVE-2014-0461</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1876/">CVE-2014-1876</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2397/">CVE-2014-2397</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2398/">CVE-2014-2398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2402/">CVE-2014-2402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2403/">CVE-2014-2403</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2412/">CVE-2014-2412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2413/">CVE-2014-2413</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2414/">CVE-2014-2414</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2421/">CVE-2014-2421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2423/">CVE-2014-2423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2427/">CVE-2014-2427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2483/">CVE-2014-2483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2490/">CVE-2014-2490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4209/">CVE-2014-4209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4216/">CVE-2014-4216</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4218/">CVE-2014-4218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4219/">CVE-2014-4219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4221/">CVE-2014-4221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4223/">CVE-2014-4223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4244/">CVE-2014-4244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4252/">CVE-2014-4252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4262/">CVE-2014-4262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4263/">CVE-2014-4263</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4264/">CVE-2014-4264</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4266/">CVE-2014-4266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4268/">CVE-2014-4268</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6457/">CVE-2014-6457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6502/">CVE-2014-6502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6504/">CVE-2014-6504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6506/">CVE-2014-6506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6511/">CVE-2014-6511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6512/">CVE-2014-6512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6513/">CVE-2014-6513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6517/">CVE-2014-6517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6519/">CVE-2014-6519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6531/">CVE-2014-6531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6558/">CVE-2014-6558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6585/">CVE-2014-6585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6587/">CVE-2014-6587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6591/">CVE-2014-6591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6593/">CVE-2014-6593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6601/">CVE-2014-6601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0383/">CVE-2015-0383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0395/">CVE-2015-0395</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0400/">CVE-2015-0400</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0407/">CVE-2015-0407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0408/">CVE-2015-0408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0410/">CVE-2015-0410</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0412/">CVE-2015-0412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0460/">CVE-2015-0460</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2628/">CVE-2015-2628</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4881/">CVE-2015-4881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009115439" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115443" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75982" version="1" class="patch">
	<metadata>
		<title>java-1_7_0-openjdk-plugin-1.6.1-2.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-2513" ref_url="https://www.suse.com/security/cve/CVE-2011-2513/" source="CVE"/>
		<reference ref_id="CVE-2011-2514" ref_url="https://www.suse.com/security/cve/CVE-2011-2514/" source="CVE"/>
		<reference ref_id="CVE-2011-3377" ref_url="https://www.suse.com/security/cve/CVE-2011-3377/" source="CVE"/>
		<reference ref_id="CVE-2012-3422" ref_url="https://www.suse.com/security/cve/CVE-2012-3422/" source="CVE"/>
		<reference ref_id="CVE-2012-3423" ref_url="https://www.suse.com/security/cve/CVE-2012-3423/" source="CVE"/>
		<reference ref_id="CVE-2012-4540" ref_url="https://www.suse.com/security/cve/CVE-2012-4540/" source="CVE"/>
		<reference ref_id="CVE-2013-1926" ref_url="https://www.suse.com/security/cve/CVE-2013-1926/" source="CVE"/>
		<reference ref_id="CVE-2013-1927" ref_url="https://www.suse.com/security/cve/CVE-2013-1927/" source="CVE"/>
		<reference ref_id="CVE-2013-4349" ref_url="https://www.suse.com/security/cve/CVE-2013-4349/" source="CVE"/>
		<reference ref_id="CVE-2015-5234" ref_url="https://www.suse.com/security/cve/CVE-2015-5234/" source="CVE"/>
		<reference ref_id="CVE-2015-5235" ref_url="https://www.suse.com/security/cve/CVE-2015-5235/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_7_0-openjdk-plugin-1.6.1-2.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2513/">CVE-2011-2513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2514/">CVE-2011-2514</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3377/">CVE-2011-3377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3422/">CVE-2012-3422</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3423/">CVE-2012-3423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4540/">CVE-2012-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1926/">CVE-2013-1926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1927/">CVE-2013-1927</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4349/">CVE-2013-4349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5234/">CVE-2015-5234</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5235/">CVE-2015-5235</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009114769" comment="java-1_7_0-openjdk-plugin-1.6.1-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141887" comment="java-1_8_0-openjdk-plugin-1.6.1-2.4.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75983" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openjdk-1.8.0.65-1.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2597" ref_url="https://www.suse.com/security/cve/CVE-2015-2597/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2619" ref_url="https://www.suse.com/security/cve/CVE-2015-2619/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2627" ref_url="https://www.suse.com/security/cve/CVE-2015-2627/" source="CVE"/>
		<reference ref_id="CVE-2015-2628" ref_url="https://www.suse.com/security/cve/CVE-2015-2628/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2659" ref_url="https://www.suse.com/security/cve/CVE-2015-2659/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4729" ref_url="https://www.suse.com/security/cve/CVE-2015-4729/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4736" ref_url="https://www.suse.com/security/cve/CVE-2015-4736/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4810" ref_url="https://www.suse.com/security/cve/CVE-2015-4810/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4868" ref_url="https://www.suse.com/security/cve/CVE-2015-4868/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4881" ref_url="https://www.suse.com/security/cve/CVE-2015-4881/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4901" ref_url="https://www.suse.com/security/cve/CVE-2015-4901/" source="CVE"/>
		<reference ref_id="CVE-2015-4902" ref_url="https://www.suse.com/security/cve/CVE-2015-4902/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4906" ref_url="https://www.suse.com/security/cve/CVE-2015-4906/" source="CVE"/>
		<reference ref_id="CVE-2015-4908" ref_url="https://www.suse.com/security/cve/CVE-2015-4908/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-4916" ref_url="https://www.suse.com/security/cve/CVE-2015-4916/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.65-1.13 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2597/">CVE-2015-2597</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2619/">CVE-2015-2619</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2627/">CVE-2015-2627</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2628/">CVE-2015-2628</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2659/">CVE-2015-2659</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4729/">CVE-2015-4729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4736/">CVE-2015-4736</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4810/">CVE-2015-4810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4868/">CVE-2015-4868</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4881/">CVE-2015-4881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4901/">CVE-2015-4901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4902/">CVE-2015-4902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4906/">CVE-2015-4906</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4908/">CVE-2015-4908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4916/">CVE-2015-4916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141888" comment="java-1_8_0-openjdk-1.8.0.65-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141889" comment="java-1_8_0-openjdk-headless-1.8.0.65-1.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75984" version="1" class="patch">
	<metadata>
		<title>kbd-1.15.5-8.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-0460" ref_url="https://www.suse.com/security/cve/CVE-2011-0460/" source="CVE"/>
		<description>
These are all security issues fixed in the kbd-1.15.5-8.4.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0460/">CVE-2011-0460</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141890" comment="kbd-1.15.5-8.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75985" version="1" class="patch">
	<metadata>
		<title>kernel-default-3.12.49-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-3939" ref_url="https://www.suse.com/security/cve/CVE-2009-3939/" source="CVE"/>
		<reference ref_id="CVE-2009-4026" ref_url="https://www.suse.com/security/cve/CVE-2009-4026/" source="CVE"/>
		<reference ref_id="CVE-2009-4027" ref_url="https://www.suse.com/security/cve/CVE-2009-4027/" source="CVE"/>
		<reference ref_id="CVE-2009-4131" ref_url="https://www.suse.com/security/cve/CVE-2009-4131/" source="CVE"/>
		<reference ref_id="CVE-2009-4138" ref_url="https://www.suse.com/security/cve/CVE-2009-4138/" source="CVE"/>
		<reference ref_id="CVE-2009-4536" ref_url="https://www.suse.com/security/cve/CVE-2009-4536/" source="CVE"/>
		<reference ref_id="CVE-2009-4538" ref_url="https://www.suse.com/security/cve/CVE-2009-4538/" source="CVE"/>
		<reference ref_id="CVE-2010-1146" ref_url="https://www.suse.com/security/cve/CVE-2010-1146/" source="CVE"/>
		<reference ref_id="CVE-2010-1436" ref_url="https://www.suse.com/security/cve/CVE-2010-1436/" source="CVE"/>
		<reference ref_id="CVE-2010-1641" ref_url="https://www.suse.com/security/cve/CVE-2010-1641/" source="CVE"/>
		<reference ref_id="CVE-2010-2066" ref_url="https://www.suse.com/security/cve/CVE-2010-2066/" source="CVE"/>
		<reference ref_id="CVE-2010-2942" ref_url="https://www.suse.com/security/cve/CVE-2010-2942/" source="CVE"/>
		<reference ref_id="CVE-2010-2954" ref_url="https://www.suse.com/security/cve/CVE-2010-2954/" source="CVE"/>
		<reference ref_id="CVE-2010-2955" ref_url="https://www.suse.com/security/cve/CVE-2010-2955/" source="CVE"/>
		<reference ref_id="CVE-2010-3081" ref_url="https://www.suse.com/security/cve/CVE-2010-3081/" source="CVE"/>
		<reference ref_id="CVE-2010-3296" ref_url="https://www.suse.com/security/cve/CVE-2010-3296/" source="CVE"/>
		<reference ref_id="CVE-2010-3297" ref_url="https://www.suse.com/security/cve/CVE-2010-3297/" source="CVE"/>
		<reference ref_id="CVE-2010-3298" ref_url="https://www.suse.com/security/cve/CVE-2010-3298/" source="CVE"/>
		<reference ref_id="CVE-2010-3301" ref_url="https://www.suse.com/security/cve/CVE-2010-3301/" source="CVE"/>
		<reference ref_id="CVE-2010-3310" ref_url="https://www.suse.com/security/cve/CVE-2010-3310/" source="CVE"/>
		<reference ref_id="CVE-2011-0712" ref_url="https://www.suse.com/security/cve/CVE-2011-0712/" source="CVE"/>
		<reference ref_id="CVE-2011-1020" ref_url="https://www.suse.com/security/cve/CVE-2011-1020/" source="CVE"/>
		<reference ref_id="CVE-2011-1577" ref_url="https://www.suse.com/security/cve/CVE-2011-1577/" source="CVE"/>
		<reference ref_id="CVE-2011-2203" ref_url="https://www.suse.com/security/cve/CVE-2011-2203/" source="CVE"/>
		<reference ref_id="CVE-2012-0056" ref_url="https://www.suse.com/security/cve/CVE-2012-0056/" source="CVE"/>
		<reference ref_id="CVE-2012-2372" ref_url="https://www.suse.com/security/cve/CVE-2012-2372/" source="CVE"/>
		<reference ref_id="CVE-2013-0160" ref_url="https://www.suse.com/security/cve/CVE-2013-0160/" source="CVE"/>
		<reference ref_id="CVE-2013-0231" ref_url="https://www.suse.com/security/cve/CVE-2013-0231/" source="CVE"/>
		<reference ref_id="CVE-2013-0913" ref_url="https://www.suse.com/security/cve/CVE-2013-0913/" source="CVE"/>
		<reference ref_id="CVE-2013-2850" ref_url="https://www.suse.com/security/cve/CVE-2013-2850/" source="CVE"/>
		<reference ref_id="CVE-2013-4587" ref_url="https://www.suse.com/security/cve/CVE-2013-4587/" source="CVE"/>
		<reference ref_id="CVE-2013-6367" ref_url="https://www.suse.com/security/cve/CVE-2013-6367/" source="CVE"/>
		<reference ref_id="CVE-2013-6368" ref_url="https://www.suse.com/security/cve/CVE-2013-6368/" source="CVE"/>
		<reference ref_id="CVE-2013-6376" ref_url="https://www.suse.com/security/cve/CVE-2013-6376/" source="CVE"/>
		<reference ref_id="CVE-2013-6405" ref_url="https://www.suse.com/security/cve/CVE-2013-6405/" source="CVE"/>
		<reference ref_id="CVE-2014-0102" ref_url="https://www.suse.com/security/cve/CVE-2014-0102/" source="CVE"/>
		<reference ref_id="CVE-2014-0131" ref_url="https://www.suse.com/security/cve/CVE-2014-0131/" source="CVE"/>
		<reference ref_id="CVE-2014-0196" ref_url="https://www.suse.com/security/cve/CVE-2014-0196/" source="CVE"/>
		<reference ref_id="CVE-2014-0691" ref_url="https://www.suse.com/security/cve/CVE-2014-0691/" source="CVE"/>
		<reference ref_id="CVE-2014-2523" ref_url="https://www.suse.com/security/cve/CVE-2014-2523/" source="CVE"/>
		<reference ref_id="CVE-2014-2568" ref_url="https://www.suse.com/security/cve/CVE-2014-2568/" source="CVE"/>
		<reference ref_id="CVE-2014-3185" ref_url="https://www.suse.com/security/cve/CVE-2014-3185/" source="CVE"/>
		<reference ref_id="CVE-2014-3534" ref_url="https://www.suse.com/security/cve/CVE-2014-3534/" source="CVE"/>
		<reference ref_id="CVE-2014-3610" ref_url="https://www.suse.com/security/cve/CVE-2014-3610/" source="CVE"/>
		<reference ref_id="CVE-2014-3611" ref_url="https://www.suse.com/security/cve/CVE-2014-3611/" source="CVE"/>
		<reference ref_id="CVE-2014-3647" ref_url="https://www.suse.com/security/cve/CVE-2014-3647/" source="CVE"/>
		<reference ref_id="CVE-2014-3673" ref_url="https://www.suse.com/security/cve/CVE-2014-3673/" source="CVE"/>
		<reference ref_id="CVE-2014-3687" ref_url="https://www.suse.com/security/cve/CVE-2014-3687/" source="CVE"/>
		<reference ref_id="CVE-2014-3690" ref_url="https://www.suse.com/security/cve/CVE-2014-3690/" source="CVE"/>
		<reference ref_id="CVE-2014-3917" ref_url="https://www.suse.com/security/cve/CVE-2014-3917/" source="CVE"/>
		<reference ref_id="CVE-2014-3940" ref_url="https://www.suse.com/security/cve/CVE-2014-3940/" source="CVE"/>
		<reference ref_id="CVE-2014-4171" ref_url="https://www.suse.com/security/cve/CVE-2014-4171/" source="CVE"/>
		<reference ref_id="CVE-2014-4608" ref_url="https://www.suse.com/security/cve/CVE-2014-4608/" source="CVE"/>
		<reference ref_id="CVE-2014-4652" ref_url="https://www.suse.com/security/cve/CVE-2014-4652/" source="CVE"/>
		<reference ref_id="CVE-2014-4653" ref_url="https://www.suse.com/security/cve/CVE-2014-4653/" source="CVE"/>
		<reference ref_id="CVE-2014-4654" ref_url="https://www.suse.com/security/cve/CVE-2014-4654/" source="CVE"/>
		<reference ref_id="CVE-2014-4655" ref_url="https://www.suse.com/security/cve/CVE-2014-4655/" source="CVE"/>
		<reference ref_id="CVE-2014-4656" ref_url="https://www.suse.com/security/cve/CVE-2014-4656/" source="CVE"/>
		<reference ref_id="CVE-2014-4699" ref_url="https://www.suse.com/security/cve/CVE-2014-4699/" source="CVE"/>
		<reference ref_id="CVE-2014-4943" ref_url="https://www.suse.com/security/cve/CVE-2014-4943/" source="CVE"/>
		<reference ref_id="CVE-2014-5045" ref_url="https://www.suse.com/security/cve/CVE-2014-5045/" source="CVE"/>
		<reference ref_id="CVE-2014-5077" ref_url="https://www.suse.com/security/cve/CVE-2014-5077/" source="CVE"/>
		<reference ref_id="CVE-2014-5206" ref_url="https://www.suse.com/security/cve/CVE-2014-5206/" source="CVE"/>
		<reference ref_id="CVE-2014-5207" ref_url="https://www.suse.com/security/cve/CVE-2014-5207/" source="CVE"/>
		<reference ref_id="CVE-2014-5471" ref_url="https://www.suse.com/security/cve/CVE-2014-5471/" source="CVE"/>
		<reference ref_id="CVE-2014-5472" ref_url="https://www.suse.com/security/cve/CVE-2014-5472/" source="CVE"/>
		<reference ref_id="CVE-2014-7822" ref_url="https://www.suse.com/security/cve/CVE-2014-7822/" source="CVE"/>
		<reference ref_id="CVE-2014-7826" ref_url="https://www.suse.com/security/cve/CVE-2014-7826/" source="CVE"/>
		<reference ref_id="CVE-2014-7841" ref_url="https://www.suse.com/security/cve/CVE-2014-7841/" source="CVE"/>
		<reference ref_id="CVE-2014-8086" ref_url="https://www.suse.com/security/cve/CVE-2014-8086/" source="CVE"/>
		<reference ref_id="CVE-2014-8133" ref_url="https://www.suse.com/security/cve/CVE-2014-8133/" source="CVE"/>
		<reference ref_id="CVE-2014-8159" ref_url="https://www.suse.com/security/cve/CVE-2014-8159/" source="CVE"/>
		<reference ref_id="CVE-2014-8160" ref_url="https://www.suse.com/security/cve/CVE-2014-8160/" source="CVE"/>
		<reference ref_id="CVE-2014-8559" ref_url="https://www.suse.com/security/cve/CVE-2014-8559/" source="CVE"/>
		<reference ref_id="CVE-2014-8709" ref_url="https://www.suse.com/security/cve/CVE-2014-8709/" source="CVE"/>
		<reference ref_id="CVE-2014-9090" ref_url="https://www.suse.com/security/cve/CVE-2014-9090/" source="CVE"/>
		<reference ref_id="CVE-2014-9419" ref_url="https://www.suse.com/security/cve/CVE-2014-9419/" source="CVE"/>
		<reference ref_id="CVE-2014-9420" ref_url="https://www.suse.com/security/cve/CVE-2014-9420/" source="CVE"/>
		<reference ref_id="CVE-2014-9584" ref_url="https://www.suse.com/security/cve/CVE-2014-9584/" source="CVE"/>
		<reference ref_id="CVE-2014-9585" ref_url="https://www.suse.com/security/cve/CVE-2014-9585/" source="CVE"/>
		<reference ref_id="CVE-2014-9728" ref_url="https://www.suse.com/security/cve/CVE-2014-9728/" source="CVE"/>
		<reference ref_id="CVE-2014-9729" ref_url="https://www.suse.com/security/cve/CVE-2014-9729/" source="CVE"/>
		<reference ref_id="CVE-2014-9730" ref_url="https://www.suse.com/security/cve/CVE-2014-9730/" source="CVE"/>
		<reference ref_id="CVE-2014-9731" ref_url="https://www.suse.com/security/cve/CVE-2014-9731/" source="CVE"/>
		<reference ref_id="CVE-2015-0272" ref_url="https://www.suse.com/security/cve/CVE-2015-0272/" source="CVE"/>
		<reference ref_id="CVE-2015-0777" ref_url="https://www.suse.com/security/cve/CVE-2015-0777/" source="CVE"/>
		<reference ref_id="CVE-2015-1465" ref_url="https://www.suse.com/security/cve/CVE-2015-1465/" source="CVE"/>
		<reference ref_id="CVE-2015-1805" ref_url="https://www.suse.com/security/cve/CVE-2015-1805/" source="CVE"/>
		<reference ref_id="CVE-2015-2041" ref_url="https://www.suse.com/security/cve/CVE-2015-2041/" source="CVE"/>
		<reference ref_id="CVE-2015-2042" ref_url="https://www.suse.com/security/cve/CVE-2015-2042/" source="CVE"/>
		<reference ref_id="CVE-2015-2150" ref_url="https://www.suse.com/security/cve/CVE-2015-2150/" source="CVE"/>
		<reference ref_id="CVE-2015-2666" ref_url="https://www.suse.com/security/cve/CVE-2015-2666/" source="CVE"/>
		<reference ref_id="CVE-2015-2830" ref_url="https://www.suse.com/security/cve/CVE-2015-2830/" source="CVE"/>
		<reference ref_id="CVE-2015-2922" ref_url="https://www.suse.com/security/cve/CVE-2015-2922/" source="CVE"/>
		<reference ref_id="CVE-2015-3212" ref_url="https://www.suse.com/security/cve/CVE-2015-3212/" source="CVE"/>
		<reference ref_id="CVE-2015-3331" ref_url="https://www.suse.com/security/cve/CVE-2015-3331/" source="CVE"/>
		<reference ref_id="CVE-2015-3332" ref_url="https://www.suse.com/security/cve/CVE-2015-3332/" source="CVE"/>
		<reference ref_id="CVE-2015-3339" ref_url="https://www.suse.com/security/cve/CVE-2015-3339/" source="CVE"/>
		<reference ref_id="CVE-2015-3636" ref_url="https://www.suse.com/security/cve/CVE-2015-3636/" source="CVE"/>
		<reference ref_id="CVE-2015-4036" ref_url="https://www.suse.com/security/cve/CVE-2015-4036/" source="CVE"/>
		<reference ref_id="CVE-2015-4167" ref_url="https://www.suse.com/security/cve/CVE-2015-4167/" source="CVE"/>
		<reference ref_id="CVE-2015-4692" ref_url="https://www.suse.com/security/cve/CVE-2015-4692/" source="CVE"/>
		<reference ref_id="CVE-2015-5156" ref_url="https://www.suse.com/security/cve/CVE-2015-5156/" source="CVE"/>
		<reference ref_id="CVE-2015-5157" ref_url="https://www.suse.com/security/cve/CVE-2015-5157/" source="CVE"/>
		<reference ref_id="CVE-2015-5283" ref_url="https://www.suse.com/security/cve/CVE-2015-5283/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-5364" ref_url="https://www.suse.com/security/cve/CVE-2015-5364/" source="CVE"/>
		<reference ref_id="CVE-2015-5366" ref_url="https://www.suse.com/security/cve/CVE-2015-5366/" source="CVE"/>
		<reference ref_id="CVE-2015-6252" ref_url="https://www.suse.com/security/cve/CVE-2015-6252/" source="CVE"/>
		<reference ref_id="CVE-2015-6937" ref_url="https://www.suse.com/security/cve/CVE-2015-6937/" source="CVE"/>
		<reference ref_id="CVE-2015-7613" ref_url="https://www.suse.com/security/cve/CVE-2015-7613/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-default-3.12.49-11.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3939/">CVE-2009-3939</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4026/">CVE-2009-4026</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4027/">CVE-2009-4027</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4131/">CVE-2009-4131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4138/">CVE-2009-4138</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4536/">CVE-2009-4536</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4538/">CVE-2009-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1146/">CVE-2010-1146</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1436/">CVE-2010-1436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1641/">CVE-2010-1641</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-2066/">CVE-2010-2066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2942/">CVE-2010-2942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2954/">CVE-2010-2954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2955/">CVE-2010-2955</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3081/">CVE-2010-3081</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3296/">CVE-2010-3296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3297/">CVE-2010-3297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3298/">CVE-2010-3298</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3301/">CVE-2010-3301</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3310/">CVE-2010-3310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0712/">CVE-2011-0712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1020/">CVE-2011-1020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1577/">CVE-2011-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2203/">CVE-2011-2203</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0056/">CVE-2012-0056</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2372/">CVE-2012-2372</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0160/">CVE-2013-0160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0231/">CVE-2013-0231</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0913/">CVE-2013-0913</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2850/">CVE-2013-2850</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4587/">CVE-2013-4587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6367/">CVE-2013-6367</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6368/">CVE-2013-6368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6376/">CVE-2013-6376</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-6405/">CVE-2013-6405</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0102/">CVE-2014-0102</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0131/">CVE-2014-0131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0196/">CVE-2014-0196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0691/">CVE-2014-0691</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-2523/">CVE-2014-2523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2568/">CVE-2014-2568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3185/">CVE-2014-3185</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3534/">CVE-2014-3534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3610/">CVE-2014-3610</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3611/">CVE-2014-3611</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-3647/">CVE-2014-3647</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3673/">CVE-2014-3673</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3687/">CVE-2014-3687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3690/">CVE-2014-3690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3917/">CVE-2014-3917</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3940/">CVE-2014-3940</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4171/">CVE-2014-4171</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4608/">CVE-2014-4608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4652/">CVE-2014-4652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4653/">CVE-2014-4653</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4654/">CVE-2014-4654</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4655/">CVE-2014-4655</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4656/">CVE-2014-4656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4699/">CVE-2014-4699</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4943/">CVE-2014-4943</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5045/">CVE-2014-5045</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-5077/">CVE-2014-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5206/">CVE-2014-5206</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5207/">CVE-2014-5207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5471/">CVE-2014-5471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5472/">CVE-2014-5472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7822/">CVE-2014-7822</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7826/">CVE-2014-7826</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7841/">CVE-2014-7841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8086/">CVE-2014-8086</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8133/">CVE-2014-8133</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8159/">CVE-2014-8159</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8160/">CVE-2014-8160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8559/">CVE-2014-8559</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8709/">CVE-2014-8709</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9090/">CVE-2014-9090</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9419/">CVE-2014-9419</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9420/">CVE-2014-9420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9584/">CVE-2014-9584</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9585/">CVE-2014-9585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9728/">CVE-2014-9728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9729/">CVE-2014-9729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9730/">CVE-2014-9730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9731/">CVE-2014-9731</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0272/">CVE-2015-0272</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0777/">CVE-2015-0777</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1465/">CVE-2015-1465</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1805/">CVE-2015-1805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2041/">CVE-2015-2041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2042/">CVE-2015-2042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2150/">CVE-2015-2150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2666/">CVE-2015-2666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2830/">CVE-2015-2830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2922/">CVE-2015-2922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3212/">CVE-2015-3212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3331/">CVE-2015-3331</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3332/">CVE-2015-3332</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3339/">CVE-2015-3339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3636/">CVE-2015-3636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4036/">CVE-2015-4036</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4167/">CVE-2015-4167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4692/">CVE-2015-4692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5156/">CVE-2015-5156</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5157/">CVE-2015-5157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5283/">CVE-2015-5283</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5364/">CVE-2015-5364</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5366/">CVE-2015-5366</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6252/">CVE-2015-6252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6937/">CVE-2015-6937</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-7613/">CVE-2015-7613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141891" comment="kernel-default-3.12.49-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141892" comment="kernel-default-devel-3.12.49-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141893" comment="kernel-default-extra-3.12.49-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141894" comment="kernel-devel-3.12.49-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141895" comment="kernel-macros-3.12.49-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141896" comment="kernel-source-3.12.49-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141897" comment="kernel-syms-3.12.49-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141898" comment="kernel-xen-3.12.49-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141899" comment="kernel-xen-devel-3.12.49-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75986" version="1" class="patch">
	<metadata>
		<title>krb5-1.12.1-19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2002-2443" ref_url="https://www.suse.com/security/cve/CVE-2002-2443/" source="CVE"/>
		<reference ref_id="CVE-2009-0844" ref_url="https://www.suse.com/security/cve/CVE-2009-0844/" source="CVE"/>
		<reference ref_id="CVE-2009-0845" ref_url="https://www.suse.com/security/cve/CVE-2009-0845/" source="CVE"/>
		<reference ref_id="CVE-2009-0846" ref_url="https://www.suse.com/security/cve/CVE-2009-0846/" source="CVE"/>
		<reference ref_id="CVE-2009-0847" ref_url="https://www.suse.com/security/cve/CVE-2009-0847/" source="CVE"/>
		<reference ref_id="CVE-2009-3295" ref_url="https://www.suse.com/security/cve/CVE-2009-3295/" source="CVE"/>
		<reference ref_id="CVE-2009-4212" ref_url="https://www.suse.com/security/cve/CVE-2009-4212/" source="CVE"/>
		<reference ref_id="CVE-2010-0283" ref_url="https://www.suse.com/security/cve/CVE-2010-0283/" source="CVE"/>
		<reference ref_id="CVE-2010-0628" ref_url="https://www.suse.com/security/cve/CVE-2010-0628/" source="CVE"/>
		<reference ref_id="CVE-2010-1320" ref_url="https://www.suse.com/security/cve/CVE-2010-1320/" source="CVE"/>
		<reference ref_id="CVE-2010-1321" ref_url="https://www.suse.com/security/cve/CVE-2010-1321/" source="CVE"/>
		<reference ref_id="CVE-2010-1322" ref_url="https://www.suse.com/security/cve/CVE-2010-1322/" source="CVE"/>
		<reference ref_id="CVE-2010-1323" ref_url="https://www.suse.com/security/cve/CVE-2010-1323/" source="CVE"/>
		<reference ref_id="CVE-2010-1324" ref_url="https://www.suse.com/security/cve/CVE-2010-1324/" source="CVE"/>
		<reference ref_id="CVE-2010-4020" ref_url="https://www.suse.com/security/cve/CVE-2010-4020/" source="CVE"/>
		<reference ref_id="CVE-2010-4021" ref_url="https://www.suse.com/security/cve/CVE-2010-4021/" source="CVE"/>
		<reference ref_id="CVE-2010-4022" ref_url="https://www.suse.com/security/cve/CVE-2010-4022/" source="CVE"/>
		<reference ref_id="CVE-2011-0281" ref_url="https://www.suse.com/security/cve/CVE-2011-0281/" source="CVE"/>
		<reference ref_id="CVE-2011-0282" ref_url="https://www.suse.com/security/cve/CVE-2011-0282/" source="CVE"/>
		<reference ref_id="CVE-2011-0284" ref_url="https://www.suse.com/security/cve/CVE-2011-0284/" source="CVE"/>
		<reference ref_id="CVE-2011-0285" ref_url="https://www.suse.com/security/cve/CVE-2011-0285/" source="CVE"/>
		<reference ref_id="CVE-2011-1527" ref_url="https://www.suse.com/security/cve/CVE-2011-1527/" source="CVE"/>
		<reference ref_id="CVE-2011-1528" ref_url="https://www.suse.com/security/cve/CVE-2011-1528/" source="CVE"/>
		<reference ref_id="CVE-2011-1529" ref_url="https://www.suse.com/security/cve/CVE-2011-1529/" source="CVE"/>
		<reference ref_id="CVE-2011-1530" ref_url="https://www.suse.com/security/cve/CVE-2011-1530/" source="CVE"/>
		<reference ref_id="CVE-2012-1012" ref_url="https://www.suse.com/security/cve/CVE-2012-1012/" source="CVE"/>
		<reference ref_id="CVE-2012-1013" ref_url="https://www.suse.com/security/cve/CVE-2012-1013/" source="CVE"/>
		<reference ref_id="CVE-2012-1016" ref_url="https://www.suse.com/security/cve/CVE-2012-1016/" source="CVE"/>
		<reference ref_id="CVE-2013-1415" ref_url="https://www.suse.com/security/cve/CVE-2013-1415/" source="CVE"/>
		<reference ref_id="CVE-2013-1417" ref_url="https://www.suse.com/security/cve/CVE-2013-1417/" source="CVE"/>
		<reference ref_id="CVE-2013-1418" ref_url="https://www.suse.com/security/cve/CVE-2013-1418/" source="CVE"/>
		<reference ref_id="CVE-2014-4341" ref_url="https://www.suse.com/security/cve/CVE-2014-4341/" source="CVE"/>
		<reference ref_id="CVE-2014-4342" ref_url="https://www.suse.com/security/cve/CVE-2014-4342/" source="CVE"/>
		<reference ref_id="CVE-2014-4343" ref_url="https://www.suse.com/security/cve/CVE-2014-4343/" source="CVE"/>
		<reference ref_id="CVE-2014-4344" ref_url="https://www.suse.com/security/cve/CVE-2014-4344/" source="CVE"/>
		<reference ref_id="CVE-2014-4345" ref_url="https://www.suse.com/security/cve/CVE-2014-4345/" source="CVE"/>
		<reference ref_id="CVE-2014-5351" ref_url="https://www.suse.com/security/cve/CVE-2014-5351/" source="CVE"/>
		<reference ref_id="CVE-2014-5352" ref_url="https://www.suse.com/security/cve/CVE-2014-5352/" source="CVE"/>
		<reference ref_id="CVE-2014-5353" ref_url="https://www.suse.com/security/cve/CVE-2014-5353/" source="CVE"/>
		<reference ref_id="CVE-2014-5354" ref_url="https://www.suse.com/security/cve/CVE-2014-5354/" source="CVE"/>
		<reference ref_id="CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355/" source="CVE"/>
		<reference ref_id="CVE-2014-9421" ref_url="https://www.suse.com/security/cve/CVE-2014-9421/" source="CVE"/>
		<reference ref_id="CVE-2014-9422" ref_url="https://www.suse.com/security/cve/CVE-2014-9422/" source="CVE"/>
		<reference ref_id="CVE-2014-9423" ref_url="https://www.suse.com/security/cve/CVE-2014-9423/" source="CVE"/>
		<reference ref_id="CVE-2015-2694" ref_url="https://www.suse.com/security/cve/CVE-2015-2694/" source="CVE"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="CVE-2015-2696" ref_url="https://www.suse.com/security/cve/CVE-2015-2696/" source="CVE"/>
		<reference ref_id="CVE-2015-2697" ref_url="https://www.suse.com/security/cve/CVE-2015-2697/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-1.12.1-19.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2002-2443/">CVE-2002-2443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0844/">CVE-2009-0844</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0845/">CVE-2009-0845</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0846/">CVE-2009-0846</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0847/">CVE-2009-0847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3295/">CVE-2009-3295</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-4212/">CVE-2009-4212</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0283/">CVE-2010-0283</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0628/">CVE-2010-0628</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1320/">CVE-2010-1320</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1321/">CVE-2010-1321</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1322/">CVE-2010-1322</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1323/">CVE-2010-1323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1324/">CVE-2010-1324</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4020/">CVE-2010-4020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4021/">CVE-2010-4021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4022/">CVE-2010-4022</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0281/">CVE-2011-0281</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0282/">CVE-2011-0282</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0284/">CVE-2011-0284</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0285/">CVE-2011-0285</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1527/">CVE-2011-1527</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1528/">CVE-2011-1528</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1529/">CVE-2011-1529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1530/">CVE-2011-1530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1012/">CVE-2012-1012</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1013/">CVE-2012-1013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1016/">CVE-2012-1016</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1415/">CVE-2013-1415</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1417/">CVE-2013-1417</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1418/">CVE-2013-1418</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4341/">CVE-2014-4341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4342/">CVE-2014-4342</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4343/">CVE-2014-4343</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4344/">CVE-2014-4344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4345/">CVE-2014-4345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5351/">CVE-2014-5351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5352/">CVE-2014-5352</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5353/">CVE-2014-5353</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5354/">CVE-2014-5354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9421/">CVE-2014-9421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9422/">CVE-2014-9422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9423/">CVE-2014-9423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2694/">CVE-2015-2694</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2696/">CVE-2015-2696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2697/">CVE-2015-2697</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009115941" comment="krb5-1.12.1-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115942" comment="krb5-32bit-1.12.1-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115943" comment="krb5-client-1.12.1-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75987" version="1" class="patch">
	<metadata>
		<title>krb5-appl-clients-1.0.3-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-1526" ref_url="https://www.suse.com/security/cve/CVE-2011-1526/" source="CVE"/>
		<reference ref_id="CVE-2011-4862" ref_url="https://www.suse.com/security/cve/CVE-2011-4862/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-appl-clients-1.0.3-1.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1526/">CVE-2011-1526</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4862/">CVE-2011-4862</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140711" comment="krb5-appl-clients-1.0.3-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75988" version="1" class="patch">
	<metadata>
		<title>lcms-1.19-17.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0793" ref_url="https://www.suse.com/security/cve/CVE-2009-0793/" source="CVE"/>
		<reference ref_id="CVE-2013-4276" ref_url="https://www.suse.com/security/cve/CVE-2013-4276/" source="CVE"/>
		<description>
These are all security issues fixed in the lcms-1.19-17.31 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0793/">CVE-2009-0793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4276/">CVE-2013-4276</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141435" comment="lcms-1.19-17.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140713" comment="liblcms1-1.19-17.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140714" comment="liblcms1-32bit-1.19-17.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75989" version="1" class="patch">
	<metadata>
		<title>libFLAC8-1.3.0-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-8962" ref_url="https://www.suse.com/security/cve/CVE-2014-8962/" source="CVE"/>
		<reference ref_id="CVE-2014-9028" ref_url="https://www.suse.com/security/cve/CVE-2014-9028/" source="CVE"/>
		<description>
These are all security issues fixed in the libFLAC8-1.3.0-6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8962/">CVE-2014-8962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9028/">CVE-2014-9028</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009102936" comment="libFLAC8-1.3.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102937" comment="libFLAC8-32bit-1.3.0-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75990" version="1" class="patch">
	<metadata>
		<title>libHX28-3.18-1.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-2947" ref_url="https://www.suse.com/security/cve/CVE-2010-2947/" source="CVE"/>
		<description>
These are all security issues fixed in the libHX28-3.18-1.19 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2947/">CVE-2010-2947</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140717" comment="libHX28-3.18-1.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140718" comment="libHX28-32bit-3.18-1.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75991" version="1" class="patch">
	<metadata>
		<title>libIlmImf-Imf_2_1-21-2.1.0-4.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-1720" ref_url="https://www.suse.com/security/cve/CVE-2009-1720/" source="CVE"/>
		<reference ref_id="CVE-2009-1721" ref_url="https://www.suse.com/security/cve/CVE-2009-1721/" source="CVE"/>
		<description>
These are all security issues fixed in the libIlmImf-Imf_2_1-21-2.1.0-4.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1720/">CVE-2009-1720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1721/">CVE-2009-1721</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140719" comment="libIlmImf-Imf_2_1-21-2.1.0-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141436" comment="libIlmImf-Imf_2_1-21-32bit-2.1.0-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140720" comment="openexr-2.1.0-4.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75992" version="1" class="patch">
	<metadata>
		<title>libQt5Core5-5.3.2-1.81 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2015-0295" ref_url="https://www.suse.com/security/cve/CVE-2015-0295/" source="CVE"/>
		<reference ref_id="CVE-2015-1858" ref_url="https://www.suse.com/security/cve/CVE-2015-1858/" source="CVE"/>
		<reference ref_id="CVE-2015-1859" ref_url="https://www.suse.com/security/cve/CVE-2015-1859/" source="CVE"/>
		<reference ref_id="CVE-2015-1860" ref_url="https://www.suse.com/security/cve/CVE-2015-1860/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Core5-5.3.2-1.81 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0295/">CVE-2015-0295</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1858/">CVE-2015-1858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1859/">CVE-2015-1859</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1860/">CVE-2015-1860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141900" comment="libQt5Core5-5.3.2-1.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141901" comment="libQt5DBus5-5.3.2-1.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141902" comment="libQt5Gui5-5.3.2-1.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141903" comment="libQt5Widgets5-5.3.2-1.81 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75993" version="1" class="patch">
	<metadata>
		<title>libX11-6-1.6.2-4.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-1981" ref_url="https://www.suse.com/security/cve/CVE-2013-1981/" source="CVE"/>
		<reference ref_id="CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997/" source="CVE"/>
		<reference ref_id="CVE-2013-2004" ref_url="https://www.suse.com/security/cve/CVE-2013-2004/" source="CVE"/>
		<description>
These are all security issues fixed in the libX11-6-1.6.2-4.12 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1981/">CVE-2013-1981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2004/">CVE-2013-2004</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140739" comment="libX11-6-1.6.2-4.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140740" comment="libX11-6-32bit-1.6.2-4.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140741" comment="libX11-data-1.6.2-4.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140742" comment="libX11-xcb1-1.6.2-4.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140743" comment="libX11-xcb1-32bit-1.6.2-4.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75994" version="1" class="patch">
	<metadata>
		<title>libXRes1-1.0.7-3.54 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-1988" ref_url="https://www.suse.com/security/cve/CVE-2013-1988/" source="CVE"/>
		<description>
These are all security issues fixed in the libXRes1-1.0.7-3.54 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1988/">CVE-2013-1988</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140744" comment="libXRes1-1.0.7-3.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140745" comment="libXRes1-32bit-1.0.7-3.54 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75995" version="1" class="patch">
	<metadata>
		<title>libXcursor1-1.1.14-3.60 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-2003" ref_url="https://www.suse.com/security/cve/CVE-2013-2003/" source="CVE"/>
		<description>
These are all security issues fixed in the libXcursor1-1.1.14-3.60 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2003/">CVE-2013-2003</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140746" comment="libXcursor1-1.1.14-3.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140747" comment="libXcursor1-32bit-1.1.14-3.60 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75996" version="1" class="patch">
	<metadata>
		<title>libXext6-1.3.2-3.61 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-1982" ref_url="https://www.suse.com/security/cve/CVE-2013-1982/" source="CVE"/>
		<description>
These are all security issues fixed in the libXext6-1.3.2-3.61 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1982/">CVE-2013-1982</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140748" comment="libXext6-1.3.2-3.61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140749" comment="libXext6-32bit-1.3.2-3.61 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75997" version="1" class="patch">
	<metadata>
		<title>libXfixes3-32bit-5.0.1-3.53 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-1983" ref_url="https://www.suse.com/security/cve/CVE-2013-1983/" source="CVE"/>
		<description>
These are all security issues fixed in the libXfixes3-32bit-5.0.1-3.53 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1983/">CVE-2013-1983</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140750" comment="libXfixes3-5.0.1-3.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140751" comment="libXfixes3-32bit-5.0.1-3.53 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75998" version="1" class="patch">
	<metadata>
		<title>libXfont1-1.4.7-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<reference ref_id="CVE-2013-6462" ref_url="https://www.suse.com/security/cve/CVE-2013-6462/" source="CVE"/>
		<reference ref_id="CVE-2014-0209" ref_url="https://www.suse.com/security/cve/CVE-2014-0209/" source="CVE"/>
		<reference ref_id="CVE-2014-0210" ref_url="https://www.suse.com/security/cve/CVE-2014-0210/" source="CVE"/>
		<reference ref_id="CVE-2014-0211" ref_url="https://www.suse.com/security/cve/CVE-2014-0211/" source="CVE"/>
		<reference ref_id="CVE-2015-1802" ref_url="https://www.suse.com/security/cve/CVE-2015-1802/" source="CVE"/>
		<reference ref_id="CVE-2015-1803" ref_url="https://www.suse.com/security/cve/CVE-2015-1803/" source="CVE"/>
		<reference ref_id="CVE-2015-1804" ref_url="https://www.suse.com/security/cve/CVE-2015-1804/" source="CVE"/>
		<description>
These are all security issues fixed in the libXfont1-1.4.7-4.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6462/">CVE-2013-6462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0209/">CVE-2014-0209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0210/">CVE-2014-0210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0211/">CVE-2014-0211</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1802/">CVE-2015-1802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1803/">CVE-2015-1803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1804/">CVE-2015-1804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108654" comment="libXfont1-1.4.7-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75999" version="1" class="patch">
	<metadata>
		<title>libXi6-1.7.4-9.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-1984" ref_url="https://www.suse.com/security/cve/CVE-2013-1984/" source="CVE"/>
		<reference ref_id="CVE-2013-1995" ref_url="https://www.suse.com/security/cve/CVE-2013-1995/" source="CVE"/>
		<reference ref_id="CVE-2013-1998" ref_url="https://www.suse.com/security/cve/CVE-2013-1998/" source="CVE"/>
		<description>
These are all security issues fixed in the libXi6-1.7.4-9.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1984/">CVE-2013-1984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1995/">CVE-2013-1995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1998/">CVE-2013-1998</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140753" comment="libXi6-1.7.4-9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140754" comment="libXi6-32bit-1.7.4-9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76000" version="1" class="patch">
	<metadata>
		<title>libXinerama1-1.1.3-3.55 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-1985" ref_url="https://www.suse.com/security/cve/CVE-2013-1985/" source="CVE"/>
		<description>
These are all security issues fixed in the libXinerama1-1.1.3-3.55 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1985/">CVE-2013-1985</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140755" comment="libXinerama1-1.1.3-3.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140756" comment="libXinerama1-32bit-1.1.3-3.55 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76001" version="1" class="patch">
	<metadata>
		<title>libXp6-1.0.2-3.58 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-2062" ref_url="https://www.suse.com/security/cve/CVE-2013-2062/" source="CVE"/>
		<description>
These are all security issues fixed in the libXp6-1.0.2-3.58 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2062/">CVE-2013-2062</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140757" comment="libXp6-1.0.2-3.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140758" comment="libXp6-32bit-1.0.2-3.58 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76002" version="1" class="patch">
	<metadata>
		<title>libXrandr2-1.4.2-3.56 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-1986" ref_url="https://www.suse.com/security/cve/CVE-2013-1986/" source="CVE"/>
		<description>
These are all security issues fixed in the libXrandr2-1.4.2-3.56 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1986/">CVE-2013-1986</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141440" comment="libXrandr2-1.4.2-3.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141441" comment="libXrandr2-32bit-1.4.2-3.56 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76003" version="1" class="patch">
	<metadata>
		<title>libXrender1-0.9.8-3.56 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-1987" ref_url="https://www.suse.com/security/cve/CVE-2013-1987/" source="CVE"/>
		<description>
These are all security issues fixed in the libXrender1-0.9.8-3.56 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1987/">CVE-2013-1987</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140761" comment="libXrender1-0.9.8-3.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140762" comment="libXrender1-32bit-0.9.8-3.56 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76004" version="1" class="patch">
	<metadata>
		<title>libXt6-1.1.4-3.59 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-2002" ref_url="https://www.suse.com/security/cve/CVE-2013-2002/" source="CVE"/>
		<reference ref_id="CVE-2013-2005" ref_url="https://www.suse.com/security/cve/CVE-2013-2005/" source="CVE"/>
		<description>
These are all security issues fixed in the libXt6-1.1.4-3.59 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2002/">CVE-2013-2002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2005/">CVE-2013-2005</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140763" comment="libXt6-1.1.4-3.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140764" comment="libXt6-32bit-1.1.4-3.59 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76005" version="1" class="patch">
	<metadata>
		<title>libXtst6-1.2.2-3.60 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-2063" ref_url="https://www.suse.com/security/cve/CVE-2013-2063/" source="CVE"/>
		<description>
These are all security issues fixed in the libXtst6-1.2.2-3.60 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2063/">CVE-2013-2063</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140765" comment="libXtst6-1.2.2-3.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140766" comment="libXtst6-32bit-1.2.2-3.60 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76006" version="1" class="patch">
	<metadata>
		<title>libXv1-1.0.10-3.57 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-1989" ref_url="https://www.suse.com/security/cve/CVE-2013-1989/" source="CVE"/>
		<reference ref_id="CVE-2013-2066" ref_url="https://www.suse.com/security/cve/CVE-2013-2066/" source="CVE"/>
		<description>
These are all security issues fixed in the libXv1-1.0.10-3.57 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1989/">CVE-2013-1989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2066/">CVE-2013-2066</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140767" comment="libXv1-1.0.10-3.57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140768" comment="libXv1-32bit-1.0.10-3.57 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76007" version="1" class="patch">
	<metadata>
		<title>libXvMC1-1.0.8-3.57 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-1990" ref_url="https://www.suse.com/security/cve/CVE-2013-1990/" source="CVE"/>
		<reference ref_id="CVE-2013-1999" ref_url="https://www.suse.com/security/cve/CVE-2013-1999/" source="CVE"/>
		<description>
These are all security issues fixed in the libXvMC1-1.0.8-3.57 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1990/">CVE-2013-1990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1999/">CVE-2013-1999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140769" comment="libXvMC1-1.0.8-3.57 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76008" version="1" class="patch">
	<metadata>
		<title>libXxf86dga1-1.1.4-3.59 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-1991" ref_url="https://www.suse.com/security/cve/CVE-2013-1991/" source="CVE"/>
		<reference ref_id="CVE-2013-2000" ref_url="https://www.suse.com/security/cve/CVE-2013-2000/" source="CVE"/>
		<description>
These are all security issues fixed in the libXxf86dga1-1.1.4-3.59 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1991/">CVE-2013-1991</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2000/">CVE-2013-2000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140773" comment="libXxf86dga1-1.1.4-3.59 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76009" version="1" class="patch">
	<metadata>
		<title>libXxf86vm1-1.1.3-3.54 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-2001" ref_url="https://www.suse.com/security/cve/CVE-2013-2001/" source="CVE"/>
		<description>
These are all security issues fixed in the libXxf86vm1-1.1.3-3.54 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2001/">CVE-2013-2001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140774" comment="libXxf86vm1-1.1.3-3.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140775" comment="libXxf86vm1-32bit-1.1.3-3.54 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76010" version="1" class="patch">
	<metadata>
		<title>libarchive13-3.1.2-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-0211" ref_url="https://www.suse.com/security/cve/CVE-2013-0211/" source="CVE"/>
		<reference ref_id="CVE-2015-2304" ref_url="https://www.suse.com/security/cve/CVE-2015-2304/" source="CVE"/>
		<description>
These are all security issues fixed in the libarchive13-3.1.2-9.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0211/">CVE-2013-0211</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2304/">CVE-2015-2304</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108423" comment="libarchive13-3.1.2-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76011" version="1" class="patch">
	<metadata>
		<title>libaugeas0-1.2.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2012-0786" ref_url="https://www.suse.com/security/cve/CVE-2012-0786/" source="CVE"/>
		<reference ref_id="CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119/" source="CVE"/>
		<description>
These are all security issues fixed in the libaugeas0-1.2.0-3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0786/">CVE-2012-0786</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111372" comment="libaugeas0-1.2.0-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76012" version="1" class="patch">
	<metadata>
		<title>libblkid1-2.25-30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-0157" ref_url="https://www.suse.com/security/cve/CVE-2013-0157/" source="CVE"/>
		<reference ref_id="CVE-2014-9114" ref_url="https://www.suse.com/security/cve/CVE-2014-9114/" source="CVE"/>
		<reference ref_id="CVE-2015-5218" ref_url="https://www.suse.com/security/cve/CVE-2015-5218/" source="CVE"/>
		<description>
These are all security issues fixed in the libblkid1-2.25-30.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0157/">CVE-2013-0157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9114/">CVE-2014-9114</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5218/">CVE-2015-5218</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141904" comment="libblkid1-2.25-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141905" comment="libblkid1-32bit-2.25-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141906" comment="libmount1-2.25-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141907" comment="libmount1-32bit-2.25-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141908" comment="libsmartcols1-2.25-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141909" comment="libuuid-devel-2.25-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141910" comment="libuuid1-2.25-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141911" comment="libuuid1-32bit-2.25-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141912" comment="python-libmount-2.25-30.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141913" comment="util-linux-2.25-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141914" comment="util-linux-lang-2.25-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141915" comment="util-linux-systemd-2.25-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141916" comment="uuidd-2.25-30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76013" version="1" class="patch">
	<metadata>
		<title>libcgroup1-0.41.rc1-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-1006" ref_url="https://www.suse.com/security/cve/CVE-2011-1006/" source="CVE"/>
		<reference ref_id="CVE-2011-1022" ref_url="https://www.suse.com/security/cve/CVE-2011-1022/" source="CVE"/>
		<description>
These are all security issues fixed in the libcgroup1-0.41.rc1-4.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1006/">CVE-2011-1006</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1022/">CVE-2011-1022</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140793" comment="libcgroup1-0.41.rc1-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76014" version="1" class="patch">
	<metadata>
		<title>libdcerpc-binding0-32bit-4.2.4-4.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2010-0926" ref_url="https://www.suse.com/security/cve/CVE-2010-0926/" source="CVE"/>
		<reference ref_id="CVE-2010-1635" ref_url="https://www.suse.com/security/cve/CVE-2010-1635/" source="CVE"/>
		<reference ref_id="CVE-2010-1642" ref_url="https://www.suse.com/security/cve/CVE-2010-1642/" source="CVE"/>
		<reference ref_id="CVE-2010-2063" ref_url="https://www.suse.com/security/cve/CVE-2010-2063/" source="CVE"/>
		<reference ref_id="CVE-2010-3069" ref_url="https://www.suse.com/security/cve/CVE-2010-3069/" source="CVE"/>
		<reference ref_id="CVE-2011-0719" ref_url="https://www.suse.com/security/cve/CVE-2011-0719/" source="CVE"/>
		<reference ref_id="CVE-2011-2522" ref_url="https://www.suse.com/security/cve/CVE-2011-2522/" source="CVE"/>
		<reference ref_id="CVE-2011-2694" ref_url="https://www.suse.com/security/cve/CVE-2011-2694/" source="CVE"/>
		<reference ref_id="CVE-2012-0817" ref_url="https://www.suse.com/security/cve/CVE-2012-0817/" source="CVE"/>
		<reference ref_id="CVE-2012-0870" ref_url="https://www.suse.com/security/cve/CVE-2012-0870/" source="CVE"/>
		<reference ref_id="CVE-2012-1182" ref_url="https://www.suse.com/security/cve/CVE-2012-1182/" source="CVE"/>
		<reference ref_id="CVE-2012-2111" ref_url="https://www.suse.com/security/cve/CVE-2012-2111/" source="CVE"/>
		<reference ref_id="CVE-2012-6150" ref_url="https://www.suse.com/security/cve/CVE-2012-6150/" source="CVE"/>
		<reference ref_id="CVE-2013-0172" ref_url="https://www.suse.com/security/cve/CVE-2013-0172/" source="CVE"/>
		<reference ref_id="CVE-2013-0213" ref_url="https://www.suse.com/security/cve/CVE-2013-0213/" source="CVE"/>
		<reference ref_id="CVE-2013-0214" ref_url="https://www.suse.com/security/cve/CVE-2013-0214/" source="CVE"/>
		<reference ref_id="CVE-2013-0454" ref_url="https://www.suse.com/security/cve/CVE-2013-0454/" source="CVE"/>
		<reference ref_id="CVE-2013-1863" ref_url="https://www.suse.com/security/cve/CVE-2013-1863/" source="CVE"/>
		<reference ref_id="CVE-2013-4124" ref_url="https://www.suse.com/security/cve/CVE-2013-4124/" source="CVE"/>
		<reference ref_id="CVE-2013-4408" ref_url="https://www.suse.com/security/cve/CVE-2013-4408/" source="CVE"/>
		<reference ref_id="CVE-2013-4475" ref_url="https://www.suse.com/security/cve/CVE-2013-4475/" source="CVE"/>
		<reference ref_id="CVE-2013-4476" ref_url="https://www.suse.com/security/cve/CVE-2013-4476/" source="CVE"/>
		<reference ref_id="CVE-2013-4496" ref_url="https://www.suse.com/security/cve/CVE-2013-4496/" source="CVE"/>
		<reference ref_id="CVE-2013-6442" ref_url="https://www.suse.com/security/cve/CVE-2013-6442/" source="CVE"/>
		<reference ref_id="CVE-2014-0178" ref_url="https://www.suse.com/security/cve/CVE-2014-0178/" source="CVE"/>
		<reference ref_id="CVE-2014-0239" ref_url="https://www.suse.com/security/cve/CVE-2014-0239/" source="CVE"/>
		<reference ref_id="CVE-2014-0244" ref_url="https://www.suse.com/security/cve/CVE-2014-0244/" source="CVE"/>
		<reference ref_id="CVE-2014-3493" ref_url="https://www.suse.com/security/cve/CVE-2014-3493/" source="CVE"/>
		<reference ref_id="CVE-2014-3560" ref_url="https://www.suse.com/security/cve/CVE-2014-3560/" source="CVE"/>
		<reference ref_id="CVE-2014-8143" ref_url="https://www.suse.com/security/cve/CVE-2014-8143/" source="CVE"/>
		<reference ref_id="CVE-2015-0240" ref_url="https://www.suse.com/security/cve/CVE-2015-0240/" source="CVE"/>
		<description>
These are all security issues fixed in the libdcerpc-binding0-32bit-4.2.4-4.19 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0926/">CVE-2010-0926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1635/">CVE-2010-1635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1642/">CVE-2010-1642</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2063/">CVE-2010-2063</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3069/">CVE-2010-3069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0719/">CVE-2011-0719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2522/">CVE-2011-2522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2694/">CVE-2011-2694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0817/">CVE-2012-0817</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0870/">CVE-2012-0870</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1182/">CVE-2012-1182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2111/">CVE-2012-2111</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-6150/">CVE-2012-6150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0172/">CVE-2013-0172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0213/">CVE-2013-0213</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0214/">CVE-2013-0214</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0454/">CVE-2013-0454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1863/">CVE-2013-1863</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4124/">CVE-2013-4124</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4408/">CVE-2013-4408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4475/">CVE-2013-4475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4476/">CVE-2013-4476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4496/">CVE-2013-4496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6442/">CVE-2013-6442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0178/">CVE-2014-0178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0239/">CVE-2014-0239</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0244/">CVE-2014-0244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3493/">CVE-2014-3493</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3560/">CVE-2014-3560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8143/">CVE-2014-8143</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0240/">CVE-2015-0240</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141917" comment="libdcerpc-binding0-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141918" comment="libdcerpc-binding0-32bit-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141919" comment="libdcerpc0-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141920" comment="libdcerpc0-32bit-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141921" comment="libgensec0-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141922" comment="libgensec0-32bit-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141923" comment="libndr-krb5pac0-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141924" comment="libndr-krb5pac0-32bit-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141925" comment="libndr-nbt0-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141926" comment="libndr-nbt0-32bit-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141927" comment="libndr-standard0-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141928" comment="libndr-standard0-32bit-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141929" comment="libndr0-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141930" comment="libndr0-32bit-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141931" comment="libnetapi0-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141932" comment="libnetapi0-32bit-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141933" comment="libregistry0-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141934" comment="libsamba-credentials0-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141935" comment="libsamba-credentials0-32bit-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141936" comment="libsamba-hostconfig0-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141937" comment="libsamba-hostconfig0-32bit-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141938" comment="libsamba-passdb0-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141939" comment="libsamba-passdb0-32bit-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141940" comment="libsamba-util0-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141941" comment="libsamba-util0-32bit-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141942" comment="libsamdb0-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141943" comment="libsamdb0-32bit-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141944" comment="libsmbclient-raw0-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141945" comment="libsmbclient-raw0-32bit-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141946" comment="libsmbclient0-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141947" comment="libsmbclient0-32bit-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141948" comment="libsmbconf0-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141949" comment="libsmbconf0-32bit-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141950" comment="libsmbldap0-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141951" comment="libsmbldap0-32bit-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141952" comment="libtevent-util0-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141953" comment="libtevent-util0-32bit-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141954" comment="libwbclient0-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141955" comment="libwbclient0-32bit-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141956" comment="samba-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141957" comment="samba-32bit-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141958" comment="samba-client-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141959" comment="samba-client-32bit-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141960" comment="samba-doc-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141961" comment="samba-libs-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141962" comment="samba-libs-32bit-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141963" comment="samba-winbind-4.2.4-4.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141964" comment="samba-winbind-32bit-4.2.4-4.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76015" version="1" class="patch">
	<metadata>
		<title>libdmx1-1.1.3-3.52 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-1992" ref_url="https://www.suse.com/security/cve/CVE-2013-1992/" source="CVE"/>
		<description>
These are all security issues fixed in the libdmx1-1.1.3-3.52 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1992/">CVE-2013-1992</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140838" comment="libdmx1-1.1.3-3.52 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76016" version="1" class="patch">
	<metadata>
		<title>libecpg6-9.4.5-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-6600" ref_url="https://www.suse.com/security/cve/CVE-2007-6600/" source="CVE"/>
		<reference ref_id="CVE-2009-4034" ref_url="https://www.suse.com/security/cve/CVE-2009-4034/" source="CVE"/>
		<reference ref_id="CVE-2009-4136" ref_url="https://www.suse.com/security/cve/CVE-2009-4136/" source="CVE"/>
		<reference ref_id="CVE-2010-1169" ref_url="https://www.suse.com/security/cve/CVE-2010-1169/" source="CVE"/>
		<reference ref_id="CVE-2010-1170" ref_url="https://www.suse.com/security/cve/CVE-2010-1170/" source="CVE"/>
		<reference ref_id="CVE-2010-3433" ref_url="https://www.suse.com/security/cve/CVE-2010-3433/" source="CVE"/>
		<reference ref_id="CVE-2012-0866" ref_url="https://www.suse.com/security/cve/CVE-2012-0866/" source="CVE"/>
		<reference ref_id="CVE-2012-0867" ref_url="https://www.suse.com/security/cve/CVE-2012-0867/" source="CVE"/>
		<reference ref_id="CVE-2012-0868" ref_url="https://www.suse.com/security/cve/CVE-2012-0868/" source="CVE"/>
		<reference ref_id="CVE-2012-2143" ref_url="https://www.suse.com/security/cve/CVE-2012-2143/" source="CVE"/>
		<reference ref_id="CVE-2012-2655" ref_url="https://www.suse.com/security/cve/CVE-2012-2655/" source="CVE"/>
		<reference ref_id="CVE-2012-3488" ref_url="https://www.suse.com/security/cve/CVE-2012-3488/" source="CVE"/>
		<reference ref_id="CVE-2012-3489" ref_url="https://www.suse.com/security/cve/CVE-2012-3489/" source="CVE"/>
		<reference ref_id="CVE-2013-0255" ref_url="https://www.suse.com/security/cve/CVE-2013-0255/" source="CVE"/>
		<reference ref_id="CVE-2013-1899" ref_url="https://www.suse.com/security/cve/CVE-2013-1899/" source="CVE"/>
		<reference ref_id="CVE-2013-1900" ref_url="https://www.suse.com/security/cve/CVE-2013-1900/" source="CVE"/>
		<reference ref_id="CVE-2013-1901" ref_url="https://www.suse.com/security/cve/CVE-2013-1901/" source="CVE"/>
		<reference ref_id="CVE-2014-0060" ref_url="https://www.suse.com/security/cve/CVE-2014-0060/" source="CVE"/>
		<reference ref_id="CVE-2014-0061" ref_url="https://www.suse.com/security/cve/CVE-2014-0061/" source="CVE"/>
		<reference ref_id="CVE-2014-0062" ref_url="https://www.suse.com/security/cve/CVE-2014-0062/" source="CVE"/>
		<reference ref_id="CVE-2014-0063" ref_url="https://www.suse.com/security/cve/CVE-2014-0063/" source="CVE"/>
		<reference ref_id="CVE-2014-0064" ref_url="https://www.suse.com/security/cve/CVE-2014-0064/" source="CVE"/>
		<reference ref_id="CVE-2014-0065" ref_url="https://www.suse.com/security/cve/CVE-2014-0065/" source="CVE"/>
		<reference ref_id="CVE-2014-0066" ref_url="https://www.suse.com/security/cve/CVE-2014-0066/" source="CVE"/>
		<reference ref_id="CVE-2014-0067" ref_url="https://www.suse.com/security/cve/CVE-2014-0067/" source="CVE"/>
		<reference ref_id="CVE-2015-3165" ref_url="https://www.suse.com/security/cve/CVE-2015-3165/" source="CVE"/>
		<reference ref_id="CVE-2015-3166" ref_url="https://www.suse.com/security/cve/CVE-2015-3166/" source="CVE"/>
		<reference ref_id="CVE-2015-3167" ref_url="https://www.suse.com/security/cve/CVE-2015-3167/" source="CVE"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289/" source="CVE"/>
		<description>
These are all security issues fixed in the libecpg6-9.4.5-4.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6600/">CVE-2007-6600</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4034/">CVE-2009-4034</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4136/">CVE-2009-4136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1169/">CVE-2010-1169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1170/">CVE-2010-1170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3433/">CVE-2010-3433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0866/">CVE-2012-0866</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0867/">CVE-2012-0867</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0868/">CVE-2012-0868</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2143/">CVE-2012-2143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2655/">CVE-2012-2655</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3488/">CVE-2012-3488</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3489/">CVE-2012-3489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0255/">CVE-2013-0255</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1899/">CVE-2013-1899</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1900/">CVE-2013-1900</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1901/">CVE-2013-1901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0060/">CVE-2014-0060</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0061/">CVE-2014-0061</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0062/">CVE-2014-0062</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0063/">CVE-2014-0063</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0064/">CVE-2014-0064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0065/">CVE-2014-0065</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0066/">CVE-2014-0066</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0067/">CVE-2014-0067</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3165/">CVE-2015-3165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3166/">CVE-2015-3166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3167/">CVE-2015-3167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141965" comment="libecpg6-9.4.5-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141966" comment="libpq5-9.4.5-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141967" comment="libpq5-32bit-9.4.5-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141968" comment="postgresql94-9.4.5-4.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76017" version="1" class="patch">
	<metadata>
		<title>libevent-2_0-5-2.0.21-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-6272" ref_url="https://www.suse.com/security/cve/CVE-2014-6272/" source="CVE"/>
		<description>
These are all security issues fixed in the libevent-2_0-5-2.0.21-4.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6272/">CVE-2014-6272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140839" comment="libevent-2_0-5-2.0.21-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76018" version="1" class="patch">
	<metadata>
		<title>libexif12-0.6.21-6.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2012-2812" ref_url="https://www.suse.com/security/cve/CVE-2012-2812/" source="CVE"/>
		<reference ref_id="CVE-2012-2813" ref_url="https://www.suse.com/security/cve/CVE-2012-2813/" source="CVE"/>
		<reference ref_id="CVE-2012-2814" ref_url="https://www.suse.com/security/cve/CVE-2012-2814/" source="CVE"/>
		<reference ref_id="CVE-2012-2836" ref_url="https://www.suse.com/security/cve/CVE-2012-2836/" source="CVE"/>
		<reference ref_id="CVE-2012-2837" ref_url="https://www.suse.com/security/cve/CVE-2012-2837/" source="CVE"/>
		<reference ref_id="CVE-2012-2840" ref_url="https://www.suse.com/security/cve/CVE-2012-2840/" source="CVE"/>
		<reference ref_id="CVE-2012-2841" ref_url="https://www.suse.com/security/cve/CVE-2012-2841/" source="CVE"/>
		<description>
These are all security issues fixed in the libexif12-0.6.21-6.4 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2812/">CVE-2012-2812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2813/">CVE-2012-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2814/">CVE-2012-2814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2836/">CVE-2012-2836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2837/">CVE-2012-2837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2840/">CVE-2012-2840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2841/">CVE-2012-2841</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140840" comment="libexif12-0.6.21-6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140841" comment="libexif12-32bit-0.6.21-6.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76019" version="1" class="patch">
	<metadata>
		<title>libfbembed2_5-2.5.2.26539-13.42 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-2492" ref_url="https://www.suse.com/security/cve/CVE-2013-2492/" source="CVE"/>
		<description>
These are all security issues fixed in the libfbembed2_5-2.5.2.26539-13.42 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2492/">CVE-2013-2492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141509" comment="libfbembed2_5-2.5.2.26539-13.42 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76020" version="1" class="patch">
	<metadata>
		<title>libfreebl3-3.19.2.1-29.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-3640" ref_url="https://www.suse.com/security/cve/CVE-2011-3640/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<reference ref_id="CVE-2013-0791" ref_url="https://www.suse.com/security/cve/CVE-2013-0791/" source="CVE"/>
		<reference ref_id="CVE-2013-1620" ref_url="https://www.suse.com/security/cve/CVE-2013-1620/" source="CVE"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<reference ref_id="CVE-2013-1740" ref_url="https://www.suse.com/security/cve/CVE-2013-1740/" source="CVE"/>
		<reference ref_id="CVE-2013-5605" ref_url="https://www.suse.com/security/cve/CVE-2013-5605/" source="CVE"/>
		<reference ref_id="CVE-2014-1492" ref_url="https://www.suse.com/security/cve/CVE-2014-1492/" source="CVE"/>
		<reference ref_id="CVE-2014-1568" ref_url="https://www.suse.com/security/cve/CVE-2014-1568/" source="CVE"/>
		<reference ref_id="CVE-2014-1569" ref_url="https://www.suse.com/security/cve/CVE-2014-1569/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<description>
These are all security issues fixed in the libfreebl3-3.19.2.1-29.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3640/">CVE-2011-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0791/">CVE-2013-0791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1620/">CVE-2013-1620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1740/">CVE-2013-1740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5605/">CVE-2013-5605</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1492/">CVE-2014-1492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1568/">CVE-2014-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1569/">CVE-2014-1569</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116018" comment="libfreebl3-3.19.2.1-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009116019" comment="libfreebl3-32bit-3.19.2.1-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009116022" comment="libsoftokn3-3.19.2.1-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009116023" comment="libsoftokn3-32bit-3.19.2.1-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009116026" comment="mozilla-nss-3.19.2.1-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009116027" comment="mozilla-nss-32bit-3.19.2.1-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009116029" comment="mozilla-nss-certs-3.19.2.1-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009116030" comment="mozilla-nss-certs-32bit-3.19.2.1-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009116032" comment="mozilla-nss-sysinit-3.19.2.1-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009116033" comment="mozilla-nss-sysinit-32bit-3.19.2.1-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009116034" comment="mozilla-nss-tools-3.19.2.1-29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76021" version="1" class="patch">
	<metadata>
		<title>libfreetype6-2.5.5-7.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0946" ref_url="https://www.suse.com/security/cve/CVE-2009-0946/" source="CVE"/>
		<reference ref_id="CVE-2010-2497" ref_url="https://www.suse.com/security/cve/CVE-2010-2497/" source="CVE"/>
		<reference ref_id="CVE-2010-2805" ref_url="https://www.suse.com/security/cve/CVE-2010-2805/" source="CVE"/>
		<reference ref_id="CVE-2010-3053" ref_url="https://www.suse.com/security/cve/CVE-2010-3053/" source="CVE"/>
		<reference ref_id="CVE-2010-3054" ref_url="https://www.suse.com/security/cve/CVE-2010-3054/" source="CVE"/>
		<reference ref_id="CVE-2010-3311" ref_url="https://www.suse.com/security/cve/CVE-2010-3311/" source="CVE"/>
		<reference ref_id="CVE-2010-3814" ref_url="https://www.suse.com/security/cve/CVE-2010-3814/" source="CVE"/>
		<reference ref_id="CVE-2010-3855" ref_url="https://www.suse.com/security/cve/CVE-2010-3855/" source="CVE"/>
		<reference ref_id="CVE-2011-0226" ref_url="https://www.suse.com/security/cve/CVE-2011-0226/" source="CVE"/>
		<reference ref_id="CVE-2011-3256" ref_url="https://www.suse.com/security/cve/CVE-2011-3256/" source="CVE"/>
		<reference ref_id="CVE-2011-3439" ref_url="https://www.suse.com/security/cve/CVE-2011-3439/" source="CVE"/>
		<reference ref_id="CVE-2012-1126" ref_url="https://www.suse.com/security/cve/CVE-2012-1126/" source="CVE"/>
		<reference ref_id="CVE-2012-1127" ref_url="https://www.suse.com/security/cve/CVE-2012-1127/" source="CVE"/>
		<reference ref_id="CVE-2012-1128" ref_url="https://www.suse.com/security/cve/CVE-2012-1128/" source="CVE"/>
		<reference ref_id="CVE-2012-1129" ref_url="https://www.suse.com/security/cve/CVE-2012-1129/" source="CVE"/>
		<reference ref_id="CVE-2012-1130" ref_url="https://www.suse.com/security/cve/CVE-2012-1130/" source="CVE"/>
		<reference ref_id="CVE-2012-1131" ref_url="https://www.suse.com/security/cve/CVE-2012-1131/" source="CVE"/>
		<reference ref_id="CVE-2012-1132" ref_url="https://www.suse.com/security/cve/CVE-2012-1132/" source="CVE"/>
		<reference ref_id="CVE-2012-1133" ref_url="https://www.suse.com/security/cve/CVE-2012-1133/" source="CVE"/>
		<reference ref_id="CVE-2012-1134" ref_url="https://www.suse.com/security/cve/CVE-2012-1134/" source="CVE"/>
		<reference ref_id="CVE-2012-1135" ref_url="https://www.suse.com/security/cve/CVE-2012-1135/" source="CVE"/>
		<reference ref_id="CVE-2012-1136" ref_url="https://www.suse.com/security/cve/CVE-2012-1136/" source="CVE"/>
		<reference ref_id="CVE-2012-1137" ref_url="https://www.suse.com/security/cve/CVE-2012-1137/" source="CVE"/>
		<reference ref_id="CVE-2012-1138" ref_url="https://www.suse.com/security/cve/CVE-2012-1138/" source="CVE"/>
		<reference ref_id="CVE-2012-1139" ref_url="https://www.suse.com/security/cve/CVE-2012-1139/" source="CVE"/>
		<reference ref_id="CVE-2012-1140" ref_url="https://www.suse.com/security/cve/CVE-2012-1140/" source="CVE"/>
		<reference ref_id="CVE-2012-1141" ref_url="https://www.suse.com/security/cve/CVE-2012-1141/" source="CVE"/>
		<reference ref_id="CVE-2012-1142" ref_url="https://www.suse.com/security/cve/CVE-2012-1142/" source="CVE"/>
		<reference ref_id="CVE-2012-1143" ref_url="https://www.suse.com/security/cve/CVE-2012-1143/" source="CVE"/>
		<reference ref_id="CVE-2012-1144" ref_url="https://www.suse.com/security/cve/CVE-2012-1144/" source="CVE"/>
		<reference ref_id="CVE-2012-5668" ref_url="https://www.suse.com/security/cve/CVE-2012-5668/" source="CVE"/>
		<reference ref_id="CVE-2012-5669" ref_url="https://www.suse.com/security/cve/CVE-2012-5669/" source="CVE"/>
		<reference ref_id="CVE-2012-5670" ref_url="https://www.suse.com/security/cve/CVE-2012-5670/" source="CVE"/>
		<reference ref_id="CVE-2014-2240" ref_url="https://www.suse.com/security/cve/CVE-2014-2240/" source="CVE"/>
		<reference ref_id="CVE-2014-2241" ref_url="https://www.suse.com/security/cve/CVE-2014-2241/" source="CVE"/>
		<reference ref_id="CVE-2014-9656" ref_url="https://www.suse.com/security/cve/CVE-2014-9656/" source="CVE"/>
		<reference ref_id="CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657/" source="CVE"/>
		<reference ref_id="CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658/" source="CVE"/>
		<reference ref_id="CVE-2014-9659" ref_url="https://www.suse.com/security/cve/CVE-2014-9659/" source="CVE"/>
		<reference ref_id="CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660/" source="CVE"/>
		<reference ref_id="CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661/" source="CVE"/>
		<reference ref_id="CVE-2014-9662" ref_url="https://www.suse.com/security/cve/CVE-2014-9662/" source="CVE"/>
		<reference ref_id="CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663/" source="CVE"/>
		<reference ref_id="CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664/" source="CVE"/>
		<reference ref_id="CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665/" source="CVE"/>
		<reference ref_id="CVE-2014-9666" ref_url="https://www.suse.com/security/cve/CVE-2014-9666/" source="CVE"/>
		<reference ref_id="CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667/" source="CVE"/>
		<reference ref_id="CVE-2014-9668" ref_url="https://www.suse.com/security/cve/CVE-2014-9668/" source="CVE"/>
		<reference ref_id="CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669/" source="CVE"/>
		<reference ref_id="CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670/" source="CVE"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<reference ref_id="CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672/" source="CVE"/>
		<reference ref_id="CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673/" source="CVE"/>
		<reference ref_id="CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674/" source="CVE"/>
		<reference ref_id="CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675/" source="CVE"/>
		<description>
These are all security issues fixed in the libfreetype6-2.5.5-7.5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0946/">CVE-2009-0946</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2497/">CVE-2010-2497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2805/">CVE-2010-2805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3053/">CVE-2010-3053</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3054/">CVE-2010-3054</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3311/">CVE-2010-3311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3814/">CVE-2010-3814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3855/">CVE-2010-3855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0226/">CVE-2011-0226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3256/">CVE-2011-3256</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3439/">CVE-2011-3439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1126/">CVE-2012-1126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1127/">CVE-2012-1127</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1128/">CVE-2012-1128</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1129/">CVE-2012-1129</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1130/">CVE-2012-1130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1131/">CVE-2012-1131</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1132/">CVE-2012-1132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1133/">CVE-2012-1133</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1134/">CVE-2012-1134</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1135/">CVE-2012-1135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1136/">CVE-2012-1136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1137/">CVE-2012-1137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1138/">CVE-2012-1138</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1139/">CVE-2012-1139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1140/">CVE-2012-1140</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1141/">CVE-2012-1141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1142/">CVE-2012-1142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1143/">CVE-2012-1143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1144/">CVE-2012-1144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5668/">CVE-2012-5668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5669/">CVE-2012-5669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5670/">CVE-2012-5670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2240/">CVE-2014-2240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2241/">CVE-2014-2241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9656/">CVE-2014-9656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9659/">CVE-2014-9659</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9662/">CVE-2014-9662</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9666/">CVE-2014-9666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9668/">CVE-2014-9668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141969" comment="libfreetype6-2.5.5-7.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141970" comment="libfreetype6-32bit-2.5.5-7.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76022" version="1" class="patch">
	<metadata>
		<title>libgadu3-1.11.4-1.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-6487" ref_url="https://www.suse.com/security/cve/CVE-2013-6487/" source="CVE"/>
		<reference ref_id="CVE-2014-3775" ref_url="https://www.suse.com/security/cve/CVE-2014-3775/" source="CVE"/>
		<description>
These are all security issues fixed in the libgadu3-1.11.4-1.12 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6487/">CVE-2013-6487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3775/">CVE-2014-3775</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141521" comment="libgadu3-1.11.4-1.12 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76023" version="1" class="patch">
	<metadata>
		<title>libgc1-7.2d-3.77 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2012-2673" ref_url="https://www.suse.com/security/cve/CVE-2012-2673/" source="CVE"/>
		<description>
These are all security issues fixed in the libgc1-7.2d-3.77 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2673/">CVE-2012-2673</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140590" comment="libgc1-7.2d-3.77 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76024" version="1" class="patch">
	<metadata>
		<title>libgcrypt20-1.6.1-16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-4242" ref_url="https://www.suse.com/security/cve/CVE-2013-4242/" source="CVE"/>
		<reference ref_id="CVE-2014-3591" ref_url="https://www.suse.com/security/cve/CVE-2014-3591/" source="CVE"/>
		<reference ref_id="CVE-2015-0837" ref_url="https://www.suse.com/security/cve/CVE-2015-0837/" source="CVE"/>
		<description>
These are all security issues fixed in the libgcrypt20-1.6.1-16.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4242/">CVE-2013-4242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3591/">CVE-2014-3591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0837/">CVE-2015-0837</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009114243" comment="libgcrypt20-1.6.1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114244" comment="libgcrypt20-32bit-1.6.1-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76025" version="1" class="patch">
	<metadata>
		<title>libgnomesu-1.0.0-352.84 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-1946" ref_url="https://www.suse.com/security/cve/CVE-2011-1946/" source="CVE"/>
		<description>
These are all security issues fixed in the libgnomesu-1.0.0-352.84 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1946/">CVE-2011-1946</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141524" comment="libgnomesu-1.0.0-352.84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141525" comment="libgnomesu-lang-1.0.0-352.84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141526" comment="libgnomesu0-1.0.0-352.84 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76026" version="1" class="patch">
	<metadata>
		<title>libgssglue1-0.4-3.83 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-2709" ref_url="https://www.suse.com/security/cve/CVE-2011-2709/" source="CVE"/>
		<description>
These are all security issues fixed in the libgssglue1-0.4-3.83 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2709/">CVE-2011-2709</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140845" comment="libgssglue1-0.4-3.83 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140846" comment="libgssglue1-32bit-0.4-3.83 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76027" version="1" class="patch">
	<metadata>
		<title>libgudev-1_0-0-210-83.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2012-1174" ref_url="https://www.suse.com/security/cve/CVE-2012-1174/" source="CVE"/>
		<reference ref_id="CVE-2013-4288" ref_url="https://www.suse.com/security/cve/CVE-2013-4288/" source="CVE"/>
		<description>
These are all security issues fixed in the libgudev-1_0-0-210-83.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1174/">CVE-2012-1174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4288/">CVE-2013-4288</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141971" comment="libgudev-1_0-0-210-83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141972" comment="libgudev-1_0-0-32bit-210-83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141973" comment="libudev1-210-83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141974" comment="libudev1-32bit-210-83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141975" comment="systemd-210-83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141976" comment="systemd-32bit-210-83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141977" comment="systemd-bash-completion-210-83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141978" comment="systemd-sysvinit-210-83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141979" comment="udev-210-83.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76028" version="1" class="patch">
	<metadata>
		<title>libid3tag0-0.15.1b-182.58 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-2109" ref_url="https://www.suse.com/security/cve/CVE-2008-2109/" source="CVE"/>
		<description>
These are all security issues fixed in the libid3tag0-0.15.1b-182.58 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2109/">CVE-2008-2109</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141536" comment="libid3tag0-0.15.1b-182.58 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76029" version="1" class="patch">
	<metadata>
		<title>libipa_hbac0-1.11.5.1-14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-4341" ref_url="https://www.suse.com/security/cve/CVE-2010-4341/" source="CVE"/>
		<reference ref_id="CVE-2011-1758" ref_url="https://www.suse.com/security/cve/CVE-2011-1758/" source="CVE"/>
		<reference ref_id="CVE-2013-0219" ref_url="https://www.suse.com/security/cve/CVE-2013-0219/" source="CVE"/>
		<reference ref_id="CVE-2013-0220" ref_url="https://www.suse.com/security/cve/CVE-2013-0220/" source="CVE"/>
		<reference ref_id="CVE-2013-0287" ref_url="https://www.suse.com/security/cve/CVE-2013-0287/" source="CVE"/>
		<description>
These are all security issues fixed in the libipa_hbac0-1.11.5.1-14.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4341/">CVE-2010-4341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1758/">CVE-2011-1758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0219/">CVE-2013-0219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0220/">CVE-2013-0220</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0287/">CVE-2013-0287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141980" comment="libipa_hbac0-1.11.5.1-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141981" comment="libsss_idmap0-1.11.5.1-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141982" comment="libsss_sudo-1.11.5.1-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141983" comment="python-sssd-config-1.11.5.1-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141984" comment="sssd-1.11.5.1-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141985" comment="sssd-32bit-1.11.5.1-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141986" comment="sssd-ad-1.11.5.1-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141987" comment="sssd-ipa-1.11.5.1-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141988" comment="sssd-krb5-1.11.5.1-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141989" comment="sssd-krb5-common-1.11.5.1-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141990" comment="sssd-ldap-1.11.5.1-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141991" comment="sssd-proxy-1.11.5.1-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141992" comment="sssd-tools-1.11.5.1-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76030" version="1" class="patch">
	<metadata>
		<title>libjasper1-1.900.1-170.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-8137" ref_url="https://www.suse.com/security/cve/CVE-2014-8137/" source="CVE"/>
		<reference ref_id="CVE-2014-8138" ref_url="https://www.suse.com/security/cve/CVE-2014-8138/" source="CVE"/>
		<reference ref_id="CVE-2014-8157" ref_url="https://www.suse.com/security/cve/CVE-2014-8157/" source="CVE"/>
		<reference ref_id="CVE-2014-8158" ref_url="https://www.suse.com/security/cve/CVE-2014-8158/" source="CVE"/>
		<reference ref_id="CVE-2014-9029" ref_url="https://www.suse.com/security/cve/CVE-2014-9029/" source="CVE"/>
		<description>
These are all security issues fixed in the libjasper1-1.900.1-170.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8137/">CVE-2014-8137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8138/">CVE-2014-8138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8157/">CVE-2014-8157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8158/">CVE-2014-8158</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9029/">CVE-2014-9029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106110" comment="libjasper1-1.900.1-170.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106111" comment="libjasper1-32bit-1.900.1-170.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76031" version="1" class="patch">
	<metadata>
		<title>libjavascriptcoregtk-1_0-0-2.4.8-16.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2012-5112" ref_url="https://www.suse.com/security/cve/CVE-2012-5112/" source="CVE"/>
		<reference ref_id="CVE-2012-5133" ref_url="https://www.suse.com/security/cve/CVE-2012-5133/" source="CVE"/>
		<reference ref_id="CVE-2014-1344" ref_url="https://www.suse.com/security/cve/CVE-2014-1344/" source="CVE"/>
		<reference ref_id="CVE-2014-1384" ref_url="https://www.suse.com/security/cve/CVE-2014-1384/" source="CVE"/>
		<reference ref_id="CVE-2014-1385" ref_url="https://www.suse.com/security/cve/CVE-2014-1385/" source="CVE"/>
		<reference ref_id="CVE-2014-1386" ref_url="https://www.suse.com/security/cve/CVE-2014-1386/" source="CVE"/>
		<reference ref_id="CVE-2014-1387" ref_url="https://www.suse.com/security/cve/CVE-2014-1387/" source="CVE"/>
		<reference ref_id="CVE-2014-1388" ref_url="https://www.suse.com/security/cve/CVE-2014-1388/" source="CVE"/>
		<reference ref_id="CVE-2014-1389" ref_url="https://www.suse.com/security/cve/CVE-2014-1389/" source="CVE"/>
		<reference ref_id="CVE-2014-1390" ref_url="https://www.suse.com/security/cve/CVE-2014-1390/" source="CVE"/>
		<reference ref_id="CVE-2015-2330" ref_url="https://www.suse.com/security/cve/CVE-2015-2330/" source="CVE"/>
		<description>
These are all security issues fixed in the libjavascriptcoregtk-1_0-0-2.4.8-16.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5112/">CVE-2012-5112</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5133/">CVE-2012-5133</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1344/">CVE-2014-1344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1384/">CVE-2014-1384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1385/">CVE-2014-1385</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1386/">CVE-2014-1386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1387/">CVE-2014-1387</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1388/">CVE-2014-1388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1389/">CVE-2014-1389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1390/">CVE-2014-1390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2330/">CVE-2015-2330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009108618" comment="libjavascriptcoregtk-1_0-0-2.4.8-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108619" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108628" comment="libjavascriptcoregtk-3_0-0-2.4.8-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108630" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108620" comment="libwebkitgtk-1_0-0-2.4.8-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108621" comment="libwebkitgtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108631" comment="libwebkitgtk-3_0-0-2.4.8-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108623" comment="libwebkitgtk2-lang-2.4.8-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108634" comment="libwebkitgtk3-lang-2.4.8-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108635" comment="typelib-1_0-JavaScriptCore-3_0-2.4.8-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108636" comment="typelib-1_0-WebKit-3_0-2.4.8-16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76032" version="1" class="patch">
	<metadata>
		<title>libjbig2-2.0-12.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-6369" ref_url="https://www.suse.com/security/cve/CVE-2013-6369/" source="CVE"/>
		<description>
These are all security issues fixed in the libjbig2-2.0-12.13 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6369/">CVE-2013-6369</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141560" comment="libjbig2-2.0-12.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140690" comment="libjbig2-32bit-2.0-12.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76033" version="1" class="patch">
	<metadata>
		<title>libjpeg-turbo-1.3.1-30.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-9092" ref_url="https://www.suse.com/security/cve/CVE-2014-9092/" source="CVE"/>
		<description>
These are all security issues fixed in the libjpeg-turbo-1.3.1-30.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9092/">CVE-2014-9092</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105080" comment="libjpeg-turbo-1.3.1-30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105088" comment="libjpeg62-62.1.0-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105087" comment="libjpeg62-32bit-62.1.0-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105091" comment="libjpeg62-turbo-1.3.1-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105082" comment="libjpeg8-8.0.2-30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105081" comment="libjpeg8-32bit-8.0.2-30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105086" comment="libturbojpeg0-8.0.2-30.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76034" version="1" class="patch">
	<metadata>
		<title>libjson-c2-0.11-2.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-6370" ref_url="https://www.suse.com/security/cve/CVE-2013-6370/" source="CVE"/>
		<reference ref_id="CVE-2013-6371" ref_url="https://www.suse.com/security/cve/CVE-2013-6371/" source="CVE"/>
		<description>
These are all security issues fixed in the libjson-c2-0.11-2.22 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6370/">CVE-2013-6370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6371/">CVE-2013-6371</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140691" comment="libjson-c2-0.11-2.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140692" comment="libjson-c2-32bit-0.11-2.22 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76035" version="1" class="patch">
	<metadata>
		<title>libksba8-1.3.0-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-9087" ref_url="https://www.suse.com/security/cve/CVE-2014-9087/" source="CVE"/>
		<description>
These are all security issues fixed in the libksba8-1.3.0-9.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9087/">CVE-2014-9087</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105094" comment="libksba8-1.3.0-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76036" version="1" class="patch">
	<metadata>
		<title>libltdl7-2.4.2-14.60 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-3736" ref_url="https://www.suse.com/security/cve/CVE-2009-3736/" source="CVE"/>
		<description>
These are all security issues fixed in the libltdl7-2.4.2-14.60 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3736/">CVE-2009-3736</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140875" comment="libltdl7-2.4.2-14.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140876" comment="libltdl7-32bit-2.4.2-14.60 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76037" version="1" class="patch">
	<metadata>
		<title>liblua5_2-5.2.2-4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-5461" ref_url="https://www.suse.com/security/cve/CVE-2014-5461/" source="CVE"/>
		<description>
These are all security issues fixed in the liblua5_2-5.2.2-4.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5461/">CVE-2014-5461</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140879" comment="liblua5_2-5.2.2-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140881" comment="lua-5.2.2-4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76038" version="1" class="patch">
	<metadata>
		<title>liblzo2-2-2.08-1.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607/" source="CVE"/>
		<description>
These are all security issues fixed in the liblzo2-2-2.08-1.13 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141561" comment="liblzo2-2-2.08-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140883" comment="liblzo2-2-32bit-2.08-1.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76039" version="1" class="patch">
	<metadata>
		<title>libmikmod3-3.2.0-4.59 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-6720" ref_url="https://www.suse.com/security/cve/CVE-2007-6720/" source="CVE"/>
		<reference ref_id="CVE-2009-0179" ref_url="https://www.suse.com/security/cve/CVE-2009-0179/" source="CVE"/>
		<reference ref_id="CVE-2009-3995" ref_url="https://www.suse.com/security/cve/CVE-2009-3995/" source="CVE"/>
		<reference ref_id="CVE-2009-3996" ref_url="https://www.suse.com/security/cve/CVE-2009-3996/" source="CVE"/>
		<reference ref_id="CVE-2010-2546" ref_url="https://www.suse.com/security/cve/CVE-2010-2546/" source="CVE"/>
		<description>
These are all security issues fixed in the libmikmod3-3.2.0-4.59 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2007-6720/">CVE-2007-6720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0179/">CVE-2009-0179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3995/">CVE-2009-3995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3996/">CVE-2009-3996</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2546/">CVE-2010-2546</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141562" comment="libmikmod3-3.2.0-4.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141563" comment="libmikmod3-32bit-3.2.0-4.59 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76040" version="1" class="patch">
	<metadata>
		<title>libmms0-0.6.2-15.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-2892" ref_url="https://www.suse.com/security/cve/CVE-2014-2892/" source="CVE"/>
		<description>
These are all security issues fixed in the libmms0-0.6.2-15.8 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-2892/">CVE-2014-2892</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140884" comment="libmms0-0.6.2-15.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76041" version="1" class="patch">
	<metadata>
		<title>libmodplug1-0.8.8.4-13.69 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-1761" ref_url="https://www.suse.com/security/cve/CVE-2011-1761/" source="CVE"/>
		<reference ref_id="CVE-2013-4233" ref_url="https://www.suse.com/security/cve/CVE-2013-4233/" source="CVE"/>
		<reference ref_id="CVE-2013-4234" ref_url="https://www.suse.com/security/cve/CVE-2013-4234/" source="CVE"/>
		<description>
These are all security issues fixed in the libmodplug1-0.8.8.4-13.69 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1761/">CVE-2011-1761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4233/">CVE-2013-4233</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4234/">CVE-2013-4234</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140885" comment="libmodplug1-0.8.8.4-13.69 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76042" version="1" class="patch">
	<metadata>
		<title>libmpfr4-3.1.2-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-9474" ref_url="https://www.suse.com/security/cve/CVE-2014-9474/" source="CVE"/>
		<description>
These are all security issues fixed in the libmpfr4-3.1.2-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9474/">CVE-2014-9474</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105814" comment="libmpfr4-3.1.2-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76043" version="1" class="patch">
	<metadata>
		<title>libmspack0-0.4-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-2800" ref_url="https://www.suse.com/security/cve/CVE-2010-2800/" source="CVE"/>
		<reference ref_id="CVE-2010-2801" ref_url="https://www.suse.com/security/cve/CVE-2010-2801/" source="CVE"/>
		<reference ref_id="CVE-2014-9556" ref_url="https://www.suse.com/security/cve/CVE-2014-9556/" source="CVE"/>
		<description>
These are all security issues fixed in the libmspack0-0.4-10.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2800/">CVE-2010-2800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2801/">CVE-2010-2801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9556/">CVE-2014-9556</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107709" comment="libmspack0-0.4-10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76044" version="1" class="patch">
	<metadata>
		<title>libmusicbrainz4-2.1.5-27.86 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-4197" ref_url="https://www.suse.com/security/cve/CVE-2006-4197/" source="CVE"/>
		<description>
These are all security issues fixed in the libmusicbrainz4-2.1.5-27.86 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4197/">CVE-2006-4197</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140886" comment="libmusicbrainz4-2.1.5-27.86 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76045" version="1" class="patch">
	<metadata>
		<title>libmysqlclient18-10.0.21-1.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-5970" ref_url="https://www.suse.com/security/cve/CVE-2007-5970/" source="CVE"/>
		<reference ref_id="CVE-2008-7247" ref_url="https://www.suse.com/security/cve/CVE-2008-7247/" source="CVE"/>
		<reference ref_id="CVE-2009-4019" ref_url="https://www.suse.com/security/cve/CVE-2009-4019/" source="CVE"/>
		<reference ref_id="CVE-2009-4028" ref_url="https://www.suse.com/security/cve/CVE-2009-4028/" source="CVE"/>
		<reference ref_id="CVE-2009-4030" ref_url="https://www.suse.com/security/cve/CVE-2009-4030/" source="CVE"/>
		<reference ref_id="CVE-2010-5298" ref_url="https://www.suse.com/security/cve/CVE-2010-5298/" source="CVE"/>
		<reference ref_id="CVE-2012-5615" ref_url="https://www.suse.com/security/cve/CVE-2012-5615/" source="CVE"/>
		<reference ref_id="CVE-2013-1976" ref_url="https://www.suse.com/security/cve/CVE-2013-1976/" source="CVE"/>
		<reference ref_id="CVE-2014-0195" ref_url="https://www.suse.com/security/cve/CVE-2014-0195/" source="CVE"/>
		<reference ref_id="CVE-2014-0198" ref_url="https://www.suse.com/security/cve/CVE-2014-0198/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-2494" ref_url="https://www.suse.com/security/cve/CVE-2014-2494/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-4207" ref_url="https://www.suse.com/security/cve/CVE-2014-4207/" source="CVE"/>
		<reference ref_id="CVE-2014-4258" ref_url="https://www.suse.com/security/cve/CVE-2014-4258/" source="CVE"/>
		<reference ref_id="CVE-2014-4260" ref_url="https://www.suse.com/security/cve/CVE-2014-4260/" source="CVE"/>
		<reference ref_id="CVE-2014-4274" ref_url="https://www.suse.com/security/cve/CVE-2014-4274/" source="CVE"/>
		<reference ref_id="CVE-2014-4287" ref_url="https://www.suse.com/security/cve/CVE-2014-4287/" source="CVE"/>
		<reference ref_id="CVE-2014-6463" ref_url="https://www.suse.com/security/cve/CVE-2014-6463/" source="CVE"/>
		<reference ref_id="CVE-2014-6464" ref_url="https://www.suse.com/security/cve/CVE-2014-6464/" source="CVE"/>
		<reference ref_id="CVE-2014-6469" ref_url="https://www.suse.com/security/cve/CVE-2014-6469/" source="CVE"/>
		<reference ref_id="CVE-2014-6474" ref_url="https://www.suse.com/security/cve/CVE-2014-6474/" source="CVE"/>
		<reference ref_id="CVE-2014-6478" ref_url="https://www.suse.com/security/cve/CVE-2014-6478/" source="CVE"/>
		<reference ref_id="CVE-2014-6484" ref_url="https://www.suse.com/security/cve/CVE-2014-6484/" source="CVE"/>
		<reference ref_id="CVE-2014-6489" ref_url="https://www.suse.com/security/cve/CVE-2014-6489/" source="CVE"/>
		<reference ref_id="CVE-2014-6491" ref_url="https://www.suse.com/security/cve/CVE-2014-6491/" source="CVE"/>
		<reference ref_id="CVE-2014-6494" ref_url="https://www.suse.com/security/cve/CVE-2014-6494/" source="CVE"/>
		<reference ref_id="CVE-2014-6495" ref_url="https://www.suse.com/security/cve/CVE-2014-6495/" source="CVE"/>
		<reference ref_id="CVE-2014-6496" ref_url="https://www.suse.com/security/cve/CVE-2014-6496/" source="CVE"/>
		<reference ref_id="CVE-2014-6500" ref_url="https://www.suse.com/security/cve/CVE-2014-6500/" source="CVE"/>
		<reference ref_id="CVE-2014-6505" ref_url="https://www.suse.com/security/cve/CVE-2014-6505/" source="CVE"/>
		<reference ref_id="CVE-2014-6507" ref_url="https://www.suse.com/security/cve/CVE-2014-6507/" source="CVE"/>
		<reference ref_id="CVE-2014-6520" ref_url="https://www.suse.com/security/cve/CVE-2014-6520/" source="CVE"/>
		<reference ref_id="CVE-2014-6530" ref_url="https://www.suse.com/security/cve/CVE-2014-6530/" source="CVE"/>
		<reference ref_id="CVE-2014-6551" ref_url="https://www.suse.com/security/cve/CVE-2014-6551/" source="CVE"/>
		<reference ref_id="CVE-2014-6555" ref_url="https://www.suse.com/security/cve/CVE-2014-6555/" source="CVE"/>
		<reference ref_id="CVE-2014-6559" ref_url="https://www.suse.com/security/cve/CVE-2014-6559/" source="CVE"/>
		<reference ref_id="CVE-2014-6564" ref_url="https://www.suse.com/security/cve/CVE-2014-6564/" source="CVE"/>
		<reference ref_id="CVE-2014-6568" ref_url="https://www.suse.com/security/cve/CVE-2014-6568/" source="CVE"/>
		<reference ref_id="CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964/" source="CVE"/>
		<reference ref_id="CVE-2015-0374" ref_url="https://www.suse.com/security/cve/CVE-2015-0374/" source="CVE"/>
		<reference ref_id="CVE-2015-0381" ref_url="https://www.suse.com/security/cve/CVE-2015-0381/" source="CVE"/>
		<reference ref_id="CVE-2015-0382" ref_url="https://www.suse.com/security/cve/CVE-2015-0382/" source="CVE"/>
		<reference ref_id="CVE-2015-0391" ref_url="https://www.suse.com/security/cve/CVE-2015-0391/" source="CVE"/>
		<reference ref_id="CVE-2015-0411" ref_url="https://www.suse.com/security/cve/CVE-2015-0411/" source="CVE"/>
		<reference ref_id="CVE-2015-0432" ref_url="https://www.suse.com/security/cve/CVE-2015-0432/" source="CVE"/>
		<reference ref_id="CVE-2015-0433" ref_url="https://www.suse.com/security/cve/CVE-2015-0433/" source="CVE"/>
		<reference ref_id="CVE-2015-0441" ref_url="https://www.suse.com/security/cve/CVE-2015-0441/" source="CVE"/>
		<reference ref_id="CVE-2015-0499" ref_url="https://www.suse.com/security/cve/CVE-2015-0499/" source="CVE"/>
		<reference ref_id="CVE-2015-0501" ref_url="https://www.suse.com/security/cve/CVE-2015-0501/" source="CVE"/>
		<reference ref_id="CVE-2015-0505" ref_url="https://www.suse.com/security/cve/CVE-2015-0505/" source="CVE"/>
		<reference ref_id="CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325/" source="CVE"/>
		<reference ref_id="CVE-2015-2326" ref_url="https://www.suse.com/security/cve/CVE-2015-2326/" source="CVE"/>
		<reference ref_id="CVE-2015-2568" ref_url="https://www.suse.com/security/cve/CVE-2015-2568/" source="CVE"/>
		<reference ref_id="CVE-2015-2571" ref_url="https://www.suse.com/security/cve/CVE-2015-2571/" source="CVE"/>
		<reference ref_id="CVE-2015-2573" ref_url="https://www.suse.com/security/cve/CVE-2015-2573/" source="CVE"/>
		<reference ref_id="CVE-2015-3152" ref_url="https://www.suse.com/security/cve/CVE-2015-3152/" source="CVE"/>
		<description>
These are all security issues fixed in the libmysqlclient18-10.0.21-1.17 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5970/">CVE-2007-5970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-7247/">CVE-2008-7247</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4019/">CVE-2009-4019</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4028/">CVE-2009-4028</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4030/">CVE-2009-4030</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5298/">CVE-2010-5298</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5615/">CVE-2012-5615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1976/">CVE-2013-1976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0195/">CVE-2014-0195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0198/">CVE-2014-0198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2494/">CVE-2014-2494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4207/">CVE-2014-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4258/">CVE-2014-4258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4260/">CVE-2014-4260</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4274/">CVE-2014-4274</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4287/">CVE-2014-4287</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6463/">CVE-2014-6463</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6464/">CVE-2014-6464</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6469/">CVE-2014-6469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6474/">CVE-2014-6474</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6478/">CVE-2014-6478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6484/">CVE-2014-6484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6489/">CVE-2014-6489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6491/">CVE-2014-6491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6494/">CVE-2014-6494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6495/">CVE-2014-6495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6496/">CVE-2014-6496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6500/">CVE-2014-6500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6505/">CVE-2014-6505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6507/">CVE-2014-6507</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6520/">CVE-2014-6520</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6530/">CVE-2014-6530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6551/">CVE-2014-6551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6555/">CVE-2014-6555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6559/">CVE-2014-6559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6564/">CVE-2014-6564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6568/">CVE-2014-6568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0374/">CVE-2015-0374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0381/">CVE-2015-0381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0382/">CVE-2015-0382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0391/">CVE-2015-0391</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0411/">CVE-2015-0411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0432/">CVE-2015-0432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0433/">CVE-2015-0433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0441/">CVE-2015-0441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0499/">CVE-2015-0499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0501/">CVE-2015-0501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0505/">CVE-2015-0505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2326/">CVE-2015-2326</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2568/">CVE-2015-2568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2571/">CVE-2015-2571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2573/">CVE-2015-2573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3152/">CVE-2015-3152</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141993" comment="libmysqlclient18-10.0.21-1.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141994" comment="libmysqlclient18-32bit-10.0.21-1.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141995" comment="libmysqlclient_r18-10.0.21-1.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141996" comment="libmysqlclient_r18-32bit-10.0.21-1.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141997" comment="mariadb-10.0.21-1.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141998" comment="mariadb-client-10.0.21-1.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141999" comment="mariadb-errormessages-10.0.21-1.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76046" version="1" class="patch">
	<metadata>
		<title>libneon27-0.30.0-3.65 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-2473" ref_url="https://www.suse.com/security/cve/CVE-2009-2473/" source="CVE"/>
		<reference ref_id="CVE-2009-2474" ref_url="https://www.suse.com/security/cve/CVE-2009-2474/" source="CVE"/>
		<description>
These are all security issues fixed in the libneon27-0.30.0-3.65 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2473/">CVE-2009-2473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2474/">CVE-2009-2474</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140887" comment="libneon27-0.30.0-3.65 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76047" version="1" class="patch">
	<metadata>
		<title>libopenssl0_9_8-0.9.8j-81.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-7250" ref_url="https://www.suse.com/security/cve/CVE-2006-7250/" source="CVE"/>
		<reference ref_id="CVE-2009-0590" ref_url="https://www.suse.com/security/cve/CVE-2009-0590/" source="CVE"/>
		<reference ref_id="CVE-2009-0591" ref_url="https://www.suse.com/security/cve/CVE-2009-0591/" source="CVE"/>
		<reference ref_id="CVE-2009-0789" ref_url="https://www.suse.com/security/cve/CVE-2009-0789/" source="CVE"/>
		<reference ref_id="CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377/" source="CVE"/>
		<reference ref_id="CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378/" source="CVE"/>
		<reference ref_id="CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379/" source="CVE"/>
		<reference ref_id="CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386/" source="CVE"/>
		<reference ref_id="CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387/" source="CVE"/>
		<reference ref_id="CVE-2009-3245" ref_url="https://www.suse.com/security/cve/CVE-2009-3245/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-4355" ref_url="https://www.suse.com/security/cve/CVE-2009-4355/" source="CVE"/>
		<reference ref_id="CVE-2009-5146" ref_url="https://www.suse.com/security/cve/CVE-2009-5146/" source="CVE"/>
		<reference ref_id="CVE-2010-0740" ref_url="https://www.suse.com/security/cve/CVE-2010-0740/" source="CVE"/>
		<reference ref_id="CVE-2010-2939" ref_url="https://www.suse.com/security/cve/CVE-2010-2939/" source="CVE"/>
		<reference ref_id="CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864/" source="CVE"/>
		<reference ref_id="CVE-2010-4180" ref_url="https://www.suse.com/security/cve/CVE-2010-4180/" source="CVE"/>
		<reference ref_id="CVE-2010-4252" ref_url="https://www.suse.com/security/cve/CVE-2010-4252/" source="CVE"/>
		<reference ref_id="CVE-2011-0014" ref_url="https://www.suse.com/security/cve/CVE-2011-0014/" source="CVE"/>
		<reference ref_id="CVE-2011-3210" ref_url="https://www.suse.com/security/cve/CVE-2011-3210/" source="CVE"/>
		<reference ref_id="CVE-2011-4108" ref_url="https://www.suse.com/security/cve/CVE-2011-4108/" source="CVE"/>
		<reference ref_id="CVE-2011-4109" ref_url="https://www.suse.com/security/cve/CVE-2011-4109/" source="CVE"/>
		<reference ref_id="CVE-2011-4354" ref_url="https://www.suse.com/security/cve/CVE-2011-4354/" source="CVE"/>
		<reference ref_id="CVE-2011-4576" ref_url="https://www.suse.com/security/cve/CVE-2011-4576/" source="CVE"/>
		<reference ref_id="CVE-2011-4577" ref_url="https://www.suse.com/security/cve/CVE-2011-4577/" source="CVE"/>
		<reference ref_id="CVE-2011-4619" ref_url="https://www.suse.com/security/cve/CVE-2011-4619/" source="CVE"/>
		<reference ref_id="CVE-2011-5095" ref_url="https://www.suse.com/security/cve/CVE-2011-5095/" source="CVE"/>
		<reference ref_id="CVE-2012-0050" ref_url="https://www.suse.com/security/cve/CVE-2012-0050/" source="CVE"/>
		<reference ref_id="CVE-2012-0884" ref_url="https://www.suse.com/security/cve/CVE-2012-0884/" source="CVE"/>
		<reference ref_id="CVE-2012-1165" ref_url="https://www.suse.com/security/cve/CVE-2012-1165/" source="CVE"/>
		<reference ref_id="CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110/" source="CVE"/>
		<reference ref_id="CVE-2012-2131" ref_url="https://www.suse.com/security/cve/CVE-2012-2131/" source="CVE"/>
		<reference ref_id="CVE-2012-2333" ref_url="https://www.suse.com/security/cve/CVE-2012-2333/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2014-0076" ref_url="https://www.suse.com/security/cve/CVE-2014-0076/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-3505" ref_url="https://www.suse.com/security/cve/CVE-2014-3505/" source="CVE"/>
		<reference ref_id="CVE-2014-3506" ref_url="https://www.suse.com/security/cve/CVE-2014-3506/" source="CVE"/>
		<reference ref_id="CVE-2014-3507" ref_url="https://www.suse.com/security/cve/CVE-2014-3507/" source="CVE"/>
		<reference ref_id="CVE-2014-3508" ref_url="https://www.suse.com/security/cve/CVE-2014-3508/" source="CVE"/>
		<reference ref_id="CVE-2014-3510" ref_url="https://www.suse.com/security/cve/CVE-2014-3510/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0292" ref_url="https://www.suse.com/security/cve/CVE-2015-0292/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791/" source="CVE"/>
		<reference ref_id="CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792/" source="CVE"/>
		<reference ref_id="CVE-2015-3216" ref_url="https://www.suse.com/security/cve/CVE-2015-3216/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl0_9_8-0.9.8j-81.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7250/">CVE-2006-7250</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0590/">CVE-2009-0590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0591/">CVE-2009-0591</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0789/">CVE-2009-0789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3245/">CVE-2009-3245</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4355/">CVE-2009-4355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5146/">CVE-2009-5146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0740/">CVE-2010-0740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2939/">CVE-2010-2939</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4180/">CVE-2010-4180</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4252/">CVE-2010-4252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0014/">CVE-2011-0014</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3210/">CVE-2011-3210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4108/">CVE-2011-4108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4109/">CVE-2011-4109</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4354/">CVE-2011-4354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4576/">CVE-2011-4576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4577/">CVE-2011-4577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4619/">CVE-2011-4619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5095/">CVE-2011-5095</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0050/">CVE-2012-0050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0884/">CVE-2012-0884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1165/">CVE-2012-1165</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2131/">CVE-2012-2131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2333/">CVE-2012-2333</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0076/">CVE-2014-0076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3505/">CVE-2014-3505</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3506/">CVE-2014-3506</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3507/">CVE-2014-3507</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3508/">CVE-2014-3508</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3510/">CVE-2014-3510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0292/">CVE-2015-0292</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3216/">CVE-2015-3216</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142000" comment="libopenssl0_9_8-0.9.8j-81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142001" comment="libopenssl0_9_8-32bit-0.9.8j-81.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76048" version="1" class="patch">
	<metadata>
		<title>libopenssl1_0_0-1.0.1i-34.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-7250" ref_url="https://www.suse.com/security/cve/CVE-2006-7250/" source="CVE"/>
		<reference ref_id="CVE-2008-5077" ref_url="https://www.suse.com/security/cve/CVE-2008-5077/" source="CVE"/>
		<reference ref_id="CVE-2009-0590" ref_url="https://www.suse.com/security/cve/CVE-2009-0590/" source="CVE"/>
		<reference ref_id="CVE-2009-0591" ref_url="https://www.suse.com/security/cve/CVE-2009-0591/" source="CVE"/>
		<reference ref_id="CVE-2009-0789" ref_url="https://www.suse.com/security/cve/CVE-2009-0789/" source="CVE"/>
		<reference ref_id="CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377/" source="CVE"/>
		<reference ref_id="CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378/" source="CVE"/>
		<reference ref_id="CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379/" source="CVE"/>
		<reference ref_id="CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386/" source="CVE"/>
		<reference ref_id="CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387/" source="CVE"/>
		<reference ref_id="CVE-2010-0740" ref_url="https://www.suse.com/security/cve/CVE-2010-0740/" source="CVE"/>
		<reference ref_id="CVE-2010-0742" ref_url="https://www.suse.com/security/cve/CVE-2010-0742/" source="CVE"/>
		<reference ref_id="CVE-2010-1633" ref_url="https://www.suse.com/security/cve/CVE-2010-1633/" source="CVE"/>
		<reference ref_id="CVE-2010-2939" ref_url="https://www.suse.com/security/cve/CVE-2010-2939/" source="CVE"/>
		<reference ref_id="CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864/" source="CVE"/>
		<reference ref_id="CVE-2010-5298" ref_url="https://www.suse.com/security/cve/CVE-2010-5298/" source="CVE"/>
		<reference ref_id="CVE-2011-0014" ref_url="https://www.suse.com/security/cve/CVE-2011-0014/" source="CVE"/>
		<reference ref_id="CVE-2011-3207" ref_url="https://www.suse.com/security/cve/CVE-2011-3207/" source="CVE"/>
		<reference ref_id="CVE-2011-3210" ref_url="https://www.suse.com/security/cve/CVE-2011-3210/" source="CVE"/>
		<reference ref_id="CVE-2011-4108" ref_url="https://www.suse.com/security/cve/CVE-2011-4108/" source="CVE"/>
		<reference ref_id="CVE-2011-4576" ref_url="https://www.suse.com/security/cve/CVE-2011-4576/" source="CVE"/>
		<reference ref_id="CVE-2011-4577" ref_url="https://www.suse.com/security/cve/CVE-2011-4577/" source="CVE"/>
		<reference ref_id="CVE-2011-4619" ref_url="https://www.suse.com/security/cve/CVE-2011-4619/" source="CVE"/>
		<reference ref_id="CVE-2012-0027" ref_url="https://www.suse.com/security/cve/CVE-2012-0027/" source="CVE"/>
		<reference ref_id="CVE-2012-0050" ref_url="https://www.suse.com/security/cve/CVE-2012-0050/" source="CVE"/>
		<reference ref_id="CVE-2012-0884" ref_url="https://www.suse.com/security/cve/CVE-2012-0884/" source="CVE"/>
		<reference ref_id="CVE-2012-1165" ref_url="https://www.suse.com/security/cve/CVE-2012-1165/" source="CVE"/>
		<reference ref_id="CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110/" source="CVE"/>
		<reference ref_id="CVE-2012-2686" ref_url="https://www.suse.com/security/cve/CVE-2012-2686/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2013-4353" ref_url="https://www.suse.com/security/cve/CVE-2013-4353/" source="CVE"/>
		<reference ref_id="CVE-2013-6449" ref_url="https://www.suse.com/security/cve/CVE-2013-6449/" source="CVE"/>
		<reference ref_id="CVE-2013-6450" ref_url="https://www.suse.com/security/cve/CVE-2013-6450/" source="CVE"/>
		<reference ref_id="CVE-2014-0076" ref_url="https://www.suse.com/security/cve/CVE-2014-0076/" source="CVE"/>
		<reference ref_id="CVE-2014-0160" ref_url="https://www.suse.com/security/cve/CVE-2014-0160/" source="CVE"/>
		<reference ref_id="CVE-2014-0195" ref_url="https://www.suse.com/security/cve/CVE-2014-0195/" source="CVE"/>
		<reference ref_id="CVE-2014-0198" ref_url="https://www.suse.com/security/cve/CVE-2014-0198/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-3505" ref_url="https://www.suse.com/security/cve/CVE-2014-3505/" source="CVE"/>
		<reference ref_id="CVE-2014-3506" ref_url="https://www.suse.com/security/cve/CVE-2014-3506/" source="CVE"/>
		<reference ref_id="CVE-2014-3507" ref_url="https://www.suse.com/security/cve/CVE-2014-3507/" source="CVE"/>
		<reference ref_id="CVE-2014-3508" ref_url="https://www.suse.com/security/cve/CVE-2014-3508/" source="CVE"/>
		<reference ref_id="CVE-2014-3509" ref_url="https://www.suse.com/security/cve/CVE-2014-3509/" source="CVE"/>
		<reference ref_id="CVE-2014-3510" ref_url="https://www.suse.com/security/cve/CVE-2014-3510/" source="CVE"/>
		<reference ref_id="CVE-2014-3511" ref_url="https://www.suse.com/security/cve/CVE-2014-3511/" source="CVE"/>
		<reference ref_id="CVE-2014-3512" ref_url="https://www.suse.com/security/cve/CVE-2014-3512/" source="CVE"/>
		<reference ref_id="CVE-2014-3513" ref_url="https://www.suse.com/security/cve/CVE-2014-3513/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-5139" ref_url="https://www.suse.com/security/cve/CVE-2014-5139/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0206" ref_url="https://www.suse.com/security/cve/CVE-2015-0206/" source="CVE"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791/" source="CVE"/>
		<reference ref_id="CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792/" source="CVE"/>
		<reference ref_id="CVE-2015-3216" ref_url="https://www.suse.com/security/cve/CVE-2015-3216/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl1_0_0-1.0.1i-34.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7250/">CVE-2006-7250</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5077/">CVE-2008-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0590/">CVE-2009-0590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0591/">CVE-2009-0591</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0789/">CVE-2009-0789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0740/">CVE-2010-0740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0742/">CVE-2010-0742</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-1633/">CVE-2010-1633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2939/">CVE-2010-2939</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5298/">CVE-2010-5298</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0014/">CVE-2011-0014</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3207/">CVE-2011-3207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3210/">CVE-2011-3210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4108/">CVE-2011-4108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4576/">CVE-2011-4576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4577/">CVE-2011-4577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4619/">CVE-2011-4619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0027/">CVE-2012-0027</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0050/">CVE-2012-0050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0884/">CVE-2012-0884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1165/">CVE-2012-1165</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2686/">CVE-2012-2686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4353/">CVE-2013-4353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6449/">CVE-2013-6449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6450/">CVE-2013-6450</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0076/">CVE-2014-0076</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0160/">CVE-2014-0160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0195/">CVE-2014-0195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0198/">CVE-2014-0198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3505/">CVE-2014-3505</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3506/">CVE-2014-3506</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3507/">CVE-2014-3507</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3508/">CVE-2014-3508</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3509/">CVE-2014-3509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3510/">CVE-2014-3510</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3511/">CVE-2014-3511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3512/">CVE-2014-3512</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-3513/">CVE-2014-3513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-5139/">CVE-2014-5139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0206/">CVE-2015-0206</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3216/">CVE-2015-3216</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142002" comment="libopenssl1_0_0-1.0.1i-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142003" comment="libopenssl1_0_0-32bit-1.0.1i-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142004" comment="openssl-1.0.1i-34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76049" version="1" class="patch">
	<metadata>
		<title>libpango-1_0-0-1.36.3-4.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-0020" ref_url="https://www.suse.com/security/cve/CVE-2011-0020/" source="CVE"/>
		<reference ref_id="CVE-2011-0064" ref_url="https://www.suse.com/security/cve/CVE-2011-0064/" source="CVE"/>
		<description>
These are all security issues fixed in the libpango-1_0-0-1.36.3-4.14 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0020/">CVE-2011-0020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0064/">CVE-2011-0064</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141577" comment="libpango-1_0-0-1.36.3-4.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141578" comment="libpango-1_0-0-32bit-1.36.3-4.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141579" comment="pango-modules-1.36.3-4.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141580" comment="pango-modules-32bit-1.36.3-4.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141581" comment="typelib-1_0-Pango-1_0-1.36.3-4.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76050" version="1" class="patch">
	<metadata>
		<title>libpcsclite1-1.8.10-3.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-0407" ref_url="https://www.suse.com/security/cve/CVE-2010-0407/" source="CVE"/>
		<reference ref_id="CVE-2010-4531" ref_url="https://www.suse.com/security/cve/CVE-2010-4531/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcsclite1-1.8.10-3.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0407/">CVE-2010-0407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4531/">CVE-2010-4531</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140900" comment="libpcsclite1-1.8.10-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141582" comment="libpcsclite1-32bit-1.8.10-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140901" comment="pcsc-lite-1.8.10-3.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76051" version="1" class="patch">
	<metadata>
		<title>libpng12-0-1.2.50-8.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3045" ref_url="https://www.suse.com/security/cve/CVE-2011-3045/" source="CVE"/>
		<reference ref_id="CVE-2011-3048" ref_url="https://www.suse.com/security/cve/CVE-2011-3048/" source="CVE"/>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<reference ref_id="CVE-2013-7353" ref_url="https://www.suse.com/security/cve/CVE-2013-7353/" source="CVE"/>
		<reference ref_id="CVE-2013-7354" ref_url="https://www.suse.com/security/cve/CVE-2013-7354/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng12-0-1.2.50-8.21 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3045/">CVE-2011-3045</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3048/">CVE-2011-3048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7353/">CVE-2013-7353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7354/">CVE-2013-7354</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141583" comment="libpng12-0-1.2.50-8.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141584" comment="libpng12-0-32bit-1.2.50-8.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76052" version="1" class="patch">
	<metadata>
		<title>libpng15-15-1.5.22-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501/" source="CVE"/>
		<reference ref_id="CVE-2011-2690" ref_url="https://www.suse.com/security/cve/CVE-2011-2690/" source="CVE"/>
		<reference ref_id="CVE-2011-2691" ref_url="https://www.suse.com/security/cve/CVE-2011-2691/" source="CVE"/>
		<reference ref_id="CVE-2011-2692" ref_url="https://www.suse.com/security/cve/CVE-2011-2692/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3048" ref_url="https://www.suse.com/security/cve/CVE-2011-3048/" source="CVE"/>
		<reference ref_id="CVE-2011-3328" ref_url="https://www.suse.com/security/cve/CVE-2011-3328/" source="CVE"/>
		<reference ref_id="CVE-2011-3464" ref_url="https://www.suse.com/security/cve/CVE-2011-3464/" source="CVE"/>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng15-15-1.5.22-2.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2690/">CVE-2011-2690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2691/">CVE-2011-2691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2692/">CVE-2011-2692</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3048/">CVE-2011-3048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3328/">CVE-2011-3328</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3464/">CVE-2011-3464</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142005" comment="libpng15-15-1.5.22-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76053" version="1" class="patch">
	<metadata>
		<title>libpng16-16-1.6.8-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501/" source="CVE"/>
		<reference ref_id="CVE-2011-2690" ref_url="https://www.suse.com/security/cve/CVE-2011-2690/" source="CVE"/>
		<reference ref_id="CVE-2011-2691" ref_url="https://www.suse.com/security/cve/CVE-2011-2691/" source="CVE"/>
		<reference ref_id="CVE-2011-2692" ref_url="https://www.suse.com/security/cve/CVE-2011-2692/" source="CVE"/>
		<reference ref_id="CVE-2011-3328" ref_url="https://www.suse.com/security/cve/CVE-2011-3328/" source="CVE"/>
		<reference ref_id="CVE-2013-6954" ref_url="https://www.suse.com/security/cve/CVE-2013-6954/" source="CVE"/>
		<reference ref_id="CVE-2014-0333" ref_url="https://www.suse.com/security/cve/CVE-2014-0333/" source="CVE"/>
		<reference ref_id="CVE-2014-9495" ref_url="https://www.suse.com/security/cve/CVE-2014-9495/" source="CVE"/>
		<reference ref_id="CVE-2015-0973" ref_url="https://www.suse.com/security/cve/CVE-2015-0973/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng16-16-1.6.8-5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2690/">CVE-2011-2690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2691/">CVE-2011-2691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2692/">CVE-2011-2692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3328/">CVE-2011-3328</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6954/">CVE-2013-6954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0333/">CVE-2014-0333</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9495/">CVE-2014-9495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0973/">CVE-2015-0973</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105438" comment="libpng16-16-1.6.8-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105439" comment="libpng16-16-32bit-1.6.8-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76054" version="1" class="patch">
	<metadata>
		<title>libpolkit0-0.113-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-0750" ref_url="https://www.suse.com/security/cve/CVE-2010-0750/" source="CVE"/>
		<reference ref_id="CVE-2011-1485" ref_url="https://www.suse.com/security/cve/CVE-2011-1485/" source="CVE"/>
		<reference ref_id="CVE-2013-4288" ref_url="https://www.suse.com/security/cve/CVE-2013-4288/" source="CVE"/>
		<reference ref_id="CVE-2015-3218" ref_url="https://www.suse.com/security/cve/CVE-2015-3218/" source="CVE"/>
		<reference ref_id="CVE-2015-3255" ref_url="https://www.suse.com/security/cve/CVE-2015-3255/" source="CVE"/>
		<reference ref_id="CVE-2015-3256" ref_url="https://www.suse.com/security/cve/CVE-2015-3256/" source="CVE"/>
		<reference ref_id="CVE-2015-4625" ref_url="https://www.suse.com/security/cve/CVE-2015-4625/" source="CVE"/>
		<description>
These are all security issues fixed in the libpolkit0-0.113-4.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0750/">CVE-2010-0750</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1485/">CVE-2011-1485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4288/">CVE-2013-4288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3218/">CVE-2015-3218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3255/">CVE-2015-3255</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3256/">CVE-2015-3256</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4625/">CVE-2015-4625</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009115371" comment="libpolkit0-0.113-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115372" comment="libpolkit0-32bit-0.113-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115373" comment="polkit-0.113-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115376" comment="typelib-1_0-Polkit-1_0-0.113-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76055" version="1" class="patch">
	<metadata>
		<title>libpoppler-glib8-0.24.4-3.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0799" ref_url="https://www.suse.com/security/cve/CVE-2009-0799/" source="CVE"/>
		<reference ref_id="CVE-2009-0800" ref_url="https://www.suse.com/security/cve/CVE-2009-0800/" source="CVE"/>
		<reference ref_id="CVE-2009-1179" ref_url="https://www.suse.com/security/cve/CVE-2009-1179/" source="CVE"/>
		<reference ref_id="CVE-2009-1180" ref_url="https://www.suse.com/security/cve/CVE-2009-1180/" source="CVE"/>
		<reference ref_id="CVE-2009-1181" ref_url="https://www.suse.com/security/cve/CVE-2009-1181/" source="CVE"/>
		<reference ref_id="CVE-2009-1182" ref_url="https://www.suse.com/security/cve/CVE-2009-1182/" source="CVE"/>
		<reference ref_id="CVE-2009-1183" ref_url="https://www.suse.com/security/cve/CVE-2009-1183/" source="CVE"/>
		<reference ref_id="CVE-2009-1187" ref_url="https://www.suse.com/security/cve/CVE-2009-1187/" source="CVE"/>
		<reference ref_id="CVE-2009-1188" ref_url="https://www.suse.com/security/cve/CVE-2009-1188/" source="CVE"/>
		<reference ref_id="CVE-2009-3607" ref_url="https://www.suse.com/security/cve/CVE-2009-3607/" source="CVE"/>
		<reference ref_id="CVE-2009-3608" ref_url="https://www.suse.com/security/cve/CVE-2009-3608/" source="CVE"/>
		<reference ref_id="CVE-2013-1788" ref_url="https://www.suse.com/security/cve/CVE-2013-1788/" source="CVE"/>
		<reference ref_id="CVE-2013-1789" ref_url="https://www.suse.com/security/cve/CVE-2013-1789/" source="CVE"/>
		<reference ref_id="CVE-2013-1790" ref_url="https://www.suse.com/security/cve/CVE-2013-1790/" source="CVE"/>
		<reference ref_id="CVE-2013-4473" ref_url="https://www.suse.com/security/cve/CVE-2013-4473/" source="CVE"/>
		<reference ref_id="CVE-2013-4474" ref_url="https://www.suse.com/security/cve/CVE-2013-4474/" source="CVE"/>
		<description>
These are all security issues fixed in the libpoppler-glib8-0.24.4-3.14 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0799/">CVE-2009-0799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0800/">CVE-2009-0800</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1179/">CVE-2009-1179</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1180/">CVE-2009-1180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1181/">CVE-2009-1181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1182/">CVE-2009-1182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1183/">CVE-2009-1183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1187/">CVE-2009-1187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1188/">CVE-2009-1188</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3607/">CVE-2009-3607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3608/">CVE-2009-3608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1788/">CVE-2013-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1789/">CVE-2013-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1790/">CVE-2013-1790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4473/">CVE-2013-4473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4474/">CVE-2013-4474</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141591" comment="libpoppler-glib8-0.24.4-3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141592" comment="libpoppler-qt4-4-0.24.4-3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141593" comment="libpoppler44-0.24.4-3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141594" comment="poppler-tools-0.24.4-3.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76056" version="1" class="patch">
	<metadata>
		<title>libproxy1-0.4.11-11.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2012-4504" ref_url="https://www.suse.com/security/cve/CVE-2012-4504/" source="CVE"/>
		<description>
These are all security issues fixed in the libproxy1-0.4.11-11.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4504/">CVE-2012-4504</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141595" comment="libproxy1-0.4.11-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141596" comment="libproxy1-32bit-0.4.11-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141597" comment="libproxy1-config-gnome3-0.4.11-11.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141598" comment="libproxy1-config-gnome3-32bit-0.4.11-11.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141599" comment="libproxy1-networkmanager-0.4.11-11.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141600" comment="libproxy1-networkmanager-32bit-0.4.11-11.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76057" version="1" class="patch">
	<metadata>
		<title>libpulse-mainloop-glib0-32bit-5.0-2.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-3970" ref_url="https://www.suse.com/security/cve/CVE-2014-3970/" source="CVE"/>
		<description>
These are all security issues fixed in the libpulse-mainloop-glib0-32bit-5.0-2.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3970/">CVE-2014-3970</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140915" comment="libpulse-mainloop-glib0-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140916" comment="libpulse-mainloop-glib0-32bit-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140917" comment="libpulse0-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140918" comment="libpulse0-32bit-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140919" comment="pulseaudio-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140920" comment="pulseaudio-esound-compat-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140921" comment="pulseaudio-gdm-hooks-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140922" comment="pulseaudio-lang-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141601" comment="pulseaudio-module-bluetooth-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141602" comment="pulseaudio-module-gconf-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141603" comment="pulseaudio-module-jack-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141604" comment="pulseaudio-module-lirc-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140923" comment="pulseaudio-module-x11-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140924" comment="pulseaudio-module-zeroconf-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140925" comment="pulseaudio-utils-5.0-2.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76058" version="1" class="patch">
	<metadata>
		<title>libpython2_7-1_0-2.7.9-20.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-1521" ref_url="https://www.suse.com/security/cve/CVE-2011-1521/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-1753" ref_url="https://www.suse.com/security/cve/CVE-2013-1753/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-1912" ref_url="https://www.suse.com/security/cve/CVE-2014-1912/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2014-7185" ref_url="https://www.suse.com/security/cve/CVE-2014-7185/" source="CVE"/>
		<description>
These are all security issues fixed in the libpython2_7-1_0-2.7.9-20.6 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1521/">CVE-2011-1521</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1753/">CVE-2013-1753</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1912/">CVE-2014-1912</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7185/">CVE-2014-7185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142006" comment="libpython2_7-1_0-2.7.9-20.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142007" comment="libpython2_7-1_0-32bit-2.7.9-20.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142008" comment="python-base-2.7.9-20.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142009" comment="python-devel-2.7.9-20.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142010" comment="python-xml-2.7.9-20.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76059" version="1" class="patch">
	<metadata>
		<title>libpython3_4m1_0-3.4.1-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-2667" ref_url="https://www.suse.com/security/cve/CVE-2014-2667/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<description>
These are all security issues fixed in the libpython3_4m1_0-3.4.1-12.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-2667/">CVE-2014-2667</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140926" comment="libpython3_4m1_0-3.4.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140927" comment="python3-base-3.4.1-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76060" version="1" class="patch">
	<metadata>
		<title>libqt4-32bit-4.8.6-4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0945" ref_url="https://www.suse.com/security/cve/CVE-2009-0945/" source="CVE"/>
		<reference ref_id="CVE-2011-3193" ref_url="https://www.suse.com/security/cve/CVE-2011-3193/" source="CVE"/>
		<reference ref_id="CVE-2011-3922" ref_url="https://www.suse.com/security/cve/CVE-2011-3922/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2012-6093" ref_url="https://www.suse.com/security/cve/CVE-2012-6093/" source="CVE"/>
		<reference ref_id="CVE-2013-0254" ref_url="https://www.suse.com/security/cve/CVE-2013-0254/" source="CVE"/>
		<reference ref_id="CVE-2013-4549" ref_url="https://www.suse.com/security/cve/CVE-2013-4549/" source="CVE"/>
		<reference ref_id="CVE-2014-0190" ref_url="https://www.suse.com/security/cve/CVE-2014-0190/" source="CVE"/>
		<reference ref_id="CVE-2015-0295" ref_url="https://www.suse.com/security/cve/CVE-2015-0295/" source="CVE"/>
		<reference ref_id="CVE-2015-1858" ref_url="https://www.suse.com/security/cve/CVE-2015-1858/" source="CVE"/>
		<reference ref_id="CVE-2015-1859" ref_url="https://www.suse.com/security/cve/CVE-2015-1859/" source="CVE"/>
		<reference ref_id="CVE-2015-1860" ref_url="https://www.suse.com/security/cve/CVE-2015-1860/" source="CVE"/>
		<description>
These are all security issues fixed in the libqt4-32bit-4.8.6-4.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0945/">CVE-2009-0945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3193/">CVE-2011-3193</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3922/">CVE-2011-3922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6093/">CVE-2012-6093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0254/">CVE-2013-0254</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4549/">CVE-2013-4549</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0190/">CVE-2014-0190</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0295/">CVE-2015-0295</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1858/">CVE-2015-1858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1859/">CVE-2015-1859</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1860/">CVE-2015-1860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009113431" comment="libqt4-4.8.6-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113430" comment="libqt4-32bit-4.8.6-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113436" comment="libqt4-qt3support-4.8.6-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113435" comment="libqt4-qt3support-32bit-4.8.6-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113438" comment="libqt4-sql-4.8.6-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113437" comment="libqt4-sql-32bit-4.8.6-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113424" comment="libqt4-sql-mysql-4.8.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113423" comment="libqt4-sql-mysql-32bit-4.8.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113427" comment="libqt4-sql-postgresql-4.8.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113426" comment="libqt4-sql-postgresql-32bit-4.8.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113440" comment="libqt4-sql-sqlite-4.8.6-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113439" comment="libqt4-sql-sqlite-32bit-4.8.6-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113429" comment="libqt4-sql-unixODBC-4.8.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113428" comment="libqt4-sql-unixODBC-32bit-4.8.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113442" comment="libqt4-x11-4.8.6-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113441" comment="libqt4-x11-32bit-4.8.6-4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76061" version="1" class="patch">
	<metadata>
		<title>libraptor2-0-2.0.10-3.67 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2012-0037" ref_url="https://www.suse.com/security/cve/CVE-2012-0037/" source="CVE"/>
		<description>
These are all security issues fixed in the libraptor2-0-2.0.10-3.67 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0037/">CVE-2012-0037</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140928" comment="libraptor2-0-2.0.10-3.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141628" comment="raptor-2.0.10-3.67 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76062" version="1" class="patch">
	<metadata>
		<title>libraw9-0.15.4-3.88 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-2126" ref_url="https://www.suse.com/security/cve/CVE-2013-2126/" source="CVE"/>
		<reference ref_id="CVE-2013-2127" ref_url="https://www.suse.com/security/cve/CVE-2013-2127/" source="CVE"/>
		<description>
These are all security issues fixed in the libraw9-0.15.4-3.88 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2126/">CVE-2013-2126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2127/">CVE-2013-2127</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141629" comment="libraw9-0.15.4-3.88 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76063" version="1" class="patch">
	<metadata>
		<title>libreoffice-5.0.2.2-13.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-2935" ref_url="https://www.suse.com/security/cve/CVE-2010-2935/" source="CVE"/>
		<reference ref_id="CVE-2010-2936" ref_url="https://www.suse.com/security/cve/CVE-2010-2936/" source="CVE"/>
		<reference ref_id="CVE-2014-0247" ref_url="https://www.suse.com/security/cve/CVE-2014-0247/" source="CVE"/>
		<reference ref_id="CVE-2014-3524" ref_url="https://www.suse.com/security/cve/CVE-2014-3524/" source="CVE"/>
		<reference ref_id="CVE-2014-3575" ref_url="https://www.suse.com/security/cve/CVE-2014-3575/" source="CVE"/>
		<reference ref_id="CVE-2014-3693" ref_url="https://www.suse.com/security/cve/CVE-2014-3693/" source="CVE"/>
		<reference ref_id="CVE-2014-8146" ref_url="https://www.suse.com/security/cve/CVE-2014-8146/" source="CVE"/>
		<reference ref_id="CVE-2014-8147" ref_url="https://www.suse.com/security/cve/CVE-2014-8147/" source="CVE"/>
		<reference ref_id="CVE-2014-9093" ref_url="https://www.suse.com/security/cve/CVE-2014-9093/" source="CVE"/>
		<reference ref_id="CVE-2015-4551" ref_url="https://www.suse.com/security/cve/CVE-2015-4551/" source="CVE"/>
		<reference ref_id="CVE-2015-5212" ref_url="https://www.suse.com/security/cve/CVE-2015-5212/" source="CVE"/>
		<reference ref_id="CVE-2015-5213" ref_url="https://www.suse.com/security/cve/CVE-2015-5213/" source="CVE"/>
		<reference ref_id="CVE-2015-5214" ref_url="https://www.suse.com/security/cve/CVE-2015-5214/" source="CVE"/>
		<description>
These are all security issues fixed in the libreoffice-5.0.2.2-13.14 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2935/">CVE-2010-2935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2936/">CVE-2010-2936</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0247/">CVE-2014-0247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3524/">CVE-2014-3524</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3575/">CVE-2014-3575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3693/">CVE-2014-3693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8146/">CVE-2014-8146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8147/">CVE-2014-8147</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9093/">CVE-2014-9093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4551/">CVE-2015-4551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5212/">CVE-2015-5212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5213/">CVE-2015-5213</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5214/">CVE-2015-5214</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009115661" comment="libreoffice-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115662" comment="libreoffice-base-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115663" comment="libreoffice-base-drivers-mysql-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115664" comment="libreoffice-base-drivers-postgresql-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115666" comment="libreoffice-calc-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115667" comment="libreoffice-calc-extensions-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115668" comment="libreoffice-draw-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115669" comment="libreoffice-filters-optional-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115670" comment="libreoffice-gnome-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115677" comment="libreoffice-icon-theme-tango-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115678" comment="libreoffice-impress-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115680" comment="libreoffice-l10n-af-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115681" comment="libreoffice-l10n-ar-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115686" comment="libreoffice-l10n-ca-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115687" comment="libreoffice-l10n-cs-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115689" comment="libreoffice-l10n-da-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115690" comment="libreoffice-l10n-de-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115693" comment="libreoffice-l10n-en-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115694" comment="libreoffice-l10n-es-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115698" comment="libreoffice-l10n-fi-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115699" comment="libreoffice-l10n-fr-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115702" comment="libreoffice-l10n-gu-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115704" comment="libreoffice-l10n-hi-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115706" comment="libreoffice-l10n-hu-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115707" comment="libreoffice-l10n-it-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115708" comment="libreoffice-l10n-ja-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115711" comment="libreoffice-l10n-ko-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115717" comment="libreoffice-l10n-nb-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115718" comment="libreoffice-l10n-nl-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115719" comment="libreoffice-l10n-nn-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115724" comment="libreoffice-l10n-pl-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115725" comment="libreoffice-l10n-pt-BR-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115726" comment="libreoffice-l10n-pt-PT-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115728" comment="libreoffice-l10n-ru-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115730" comment="libreoffice-l10n-sk-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115735" comment="libreoffice-l10n-sv-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115744" comment="libreoffice-l10n-xh-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115745" comment="libreoffice-l10n-zh-Hans-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115746" comment="libreoffice-l10n-zh-Hant-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115747" comment="libreoffice-l10n-zu-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115748" comment="libreoffice-mailmerge-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115749" comment="libreoffice-math-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115750" comment="libreoffice-officebean-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115751" comment="libreoffice-pyuno-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115754" comment="libreoffice-writer-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115755" comment="libreoffice-writer-extensions-5.0.2.2-13.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76064" version="1" class="patch">
	<metadata>
		<title>librpcsecgss3-0.19-16.56 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<description>
These are all security issues fixed in the librpcsecgss3-0.19-16.56 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141676" comment="librpcsecgss3-0.19-16.56 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76065" version="1" class="patch">
	<metadata>
		<title>libruby2_1-2_1-2.1.2-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-8080" ref_url="https://www.suse.com/security/cve/CVE-2014-8080/" source="CVE"/>
		<reference ref_id="CVE-2014-8090" ref_url="https://www.suse.com/security/cve/CVE-2014-8090/" source="CVE"/>
		<description>
These are all security issues fixed in the libruby2_1-2_1-2.1.2-9.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8080/">CVE-2014-8080</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8090/">CVE-2014-8090</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105408" comment="libruby2_1-2_1-2.1.2-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105409" comment="ruby2.1-2.1.2-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105414" comment="ruby2.1-stdlib-2.1.2-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76066" version="1" class="patch">
	<metadata>
		<title>libsilc-1_1-2-1.1.10-24.128 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-1227" ref_url="https://www.suse.com/security/cve/CVE-2008-1227/" source="CVE"/>
		<description>
These are all security issues fixed in the libsilc-1_1-2-1.1.10-24.128 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1227/">CVE-2008-1227</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141677" comment="libsilc-1_1-2-1.1.10-24.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141678" comment="libsilcclient-1_1-3-1.1.10-24.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141679" comment="silc-toolkit-1.1.10-24.128 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76067" version="1" class="patch">
	<metadata>
		<title>libsmi-0.4.8-18.63 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-2891" ref_url="https://www.suse.com/security/cve/CVE-2010-2891/" source="CVE"/>
		<description>
These are all security issues fixed in the libsmi-0.4.8-18.63 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2891/">CVE-2010-2891</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140932" comment="libsmi-0.4.8-18.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140933" comment="libsmi2-0.4.8-18.63 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76068" version="1" class="patch">
	<metadata>
		<title>libsndfile1-1.0.25-21.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0186" ref_url="https://www.suse.com/security/cve/CVE-2009-0186/" source="CVE"/>
		<reference ref_id="CVE-2011-2696" ref_url="https://www.suse.com/security/cve/CVE-2011-2696/" source="CVE"/>
		<reference ref_id="CVE-2014-9496" ref_url="https://www.suse.com/security/cve/CVE-2014-9496/" source="CVE"/>
		<description>
These are all security issues fixed in the libsndfile1-1.0.25-21.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0186/">CVE-2009-0186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2696/">CVE-2011-2696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9496/">CVE-2014-9496</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105600" comment="libsndfile1-1.0.25-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105601" comment="libsndfile1-32bit-1.0.25-21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76069" version="1" class="patch">
	<metadata>
		<title>libsnmp30-32bit-5.7.3-4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2012-2141" ref_url="https://www.suse.com/security/cve/CVE-2012-2141/" source="CVE"/>
		<reference ref_id="CVE-2014-2284" ref_url="https://www.suse.com/security/cve/CVE-2014-2284/" source="CVE"/>
		<reference ref_id="CVE-2014-2285" ref_url="https://www.suse.com/security/cve/CVE-2014-2285/" source="CVE"/>
		<reference ref_id="CVE-2014-3565" ref_url="https://www.suse.com/security/cve/CVE-2014-3565/" source="CVE"/>
		<reference ref_id="CVE-2015-5621" ref_url="https://www.suse.com/security/cve/CVE-2015-5621/" source="CVE"/>
		<description>
These are all security issues fixed in the libsnmp30-32bit-5.7.3-4.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2141/">CVE-2012-2141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2284/">CVE-2014-2284</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2285/">CVE-2014-2285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3565/">CVE-2014-3565</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5621/">CVE-2015-5621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140934" comment="libsnmp30-5.7.3-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140935" comment="libsnmp30-32bit-5.7.3-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140936" comment="net-snmp-5.7.3-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140937" comment="perl-SNMP-5.7.3-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140938" comment="snmp-mibs-5.7.3-4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76070" version="1" class="patch">
	<metadata>
		<title>libsoup-2_4-1-2.44.2-1.46 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-2054" ref_url="https://www.suse.com/security/cve/CVE-2011-2054/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-2_4-1-2.44.2-1.46 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2054/">CVE-2011-2054</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141687" comment="libsoup-2_4-1-2.44.2-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141688" comment="libsoup-2_4-1-32bit-2.44.2-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141689" comment="libsoup-lang-2.44.2-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141690" comment="typelib-1_0-Soup-2_4-2.44.2-1.46 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76071" version="1" class="patch">
	<metadata>
		<title>libspice-client-glib-2_0-8-0.29-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2012-4425" ref_url="https://www.suse.com/security/cve/CVE-2012-4425/" source="CVE"/>
		<description>
These are all security issues fixed in the libspice-client-glib-2_0-8-0.29-1.4 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4425/">CVE-2012-4425</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142011" comment="libspice-client-glib-2_0-8-0.29-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142012" comment="libspice-client-gtk-2_0-4-0.29-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142013" comment="libspice-client-gtk-3_0-4-0.29-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142014" comment="libspice-controller0-0.29-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142015" comment="typelib-1_0-SpiceClientGlib-2_0-0.29-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142016" comment="typelib-1_0-SpiceClientGtk-3_0-0.29-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76072" version="1" class="patch">
	<metadata>
		<title>libspice-server1-0.12.5-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-4282" ref_url="https://www.suse.com/security/cve/CVE-2013-4282/" source="CVE"/>
		<reference ref_id="CVE-2015-3247" ref_url="https://www.suse.com/security/cve/CVE-2015-3247/" source="CVE"/>
		<description>
These are all security issues fixed in the libspice-server1-0.12.5-2.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2013-4282/">CVE-2013-4282</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3247/">CVE-2015-3247</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142017" comment="libspice-server1-0.12.5-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76073" version="1" class="patch">
	<metadata>
		<title>libssh2-1-1.4.3-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2015-1782" ref_url="https://www.suse.com/security/cve/CVE-2015-1782/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh2-1-1.4.3-11.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1782/">CVE-2015-1782</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009108425" comment="libssh2-1-1.4.3-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108426" comment="libssh2-1-32bit-1.4.3-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76074" version="1" class="patch">
	<metadata>
		<title>libssh4-0.6.3-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2012-4559" ref_url="https://www.suse.com/security/cve/CVE-2012-4559/" source="CVE"/>
		<reference ref_id="CVE-2012-4560" ref_url="https://www.suse.com/security/cve/CVE-2012-4560/" source="CVE"/>
		<reference ref_id="CVE-2012-4561" ref_url="https://www.suse.com/security/cve/CVE-2012-4561/" source="CVE"/>
		<reference ref_id="CVE-2013-0176" ref_url="https://www.suse.com/security/cve/CVE-2013-0176/" source="CVE"/>
		<reference ref_id="CVE-2014-0017" ref_url="https://www.suse.com/security/cve/CVE-2014-0017/" source="CVE"/>
		<reference ref_id="CVE-2014-8132" ref_url="https://www.suse.com/security/cve/CVE-2014-8132/" source="CVE"/>
		<reference ref_id="CVE-2015-3146" ref_url="https://www.suse.com/security/cve/CVE-2015-3146/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh4-0.6.3-8.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4559/">CVE-2012-4559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4560/">CVE-2012-4560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4561/">CVE-2012-4561</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0176/">CVE-2013-0176</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0017/">CVE-2014-0017</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8132/">CVE-2014-8132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3146/">CVE-2015-3146</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114957" comment="libssh4-0.6.3-8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76075" version="1" class="patch">
	<metadata>
		<title>libtag1-1.9.1-1.265 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2012-2396" ref_url="https://www.suse.com/security/cve/CVE-2012-2396/" source="CVE"/>
		<description>
These are all security issues fixed in the libtag1-1.9.1-1.265 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2396/">CVE-2012-2396</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140963" comment="libtag1-1.9.1-1.265 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141698" comment="libtag1-32bit-1.9.1-1.265 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140964" comment="libtag_c0-1.9.1-1.265 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141699" comment="libtag_c0-32bit-1.9.1-1.265 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140965" comment="taglib-1.9.1-1.265 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76076" version="1" class="patch">
	<metadata>
		<title>libtasn1-3.7-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-3467" ref_url="https://www.suse.com/security/cve/CVE-2014-3467/" source="CVE"/>
		<reference ref_id="CVE-2014-3468" ref_url="https://www.suse.com/security/cve/CVE-2014-3468/" source="CVE"/>
		<reference ref_id="CVE-2014-3469" ref_url="https://www.suse.com/security/cve/CVE-2014-3469/" source="CVE"/>
		<reference ref_id="CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806/" source="CVE"/>
		<description>
These are all security issues fixed in the libtasn1-3.7-4.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3467/">CVE-2014-3467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3468/">CVE-2014-3468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3469/">CVE-2014-3469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109692" comment="libtasn1-3.7-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109693" comment="libtasn1-6-3.7-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109694" comment="libtasn1-6-32bit-3.7-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76077" version="1" class="patch">
	<metadata>
		<title>libtiff5-32bit-4.0.4-12.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-2285" ref_url="https://www.suse.com/security/cve/CVE-2009-2285/" source="CVE"/>
		<reference ref_id="CVE-2009-2347" ref_url="https://www.suse.com/security/cve/CVE-2009-2347/" source="CVE"/>
		<reference ref_id="CVE-2010-2065" ref_url="https://www.suse.com/security/cve/CVE-2010-2065/" source="CVE"/>
		<reference ref_id="CVE-2010-2067" ref_url="https://www.suse.com/security/cve/CVE-2010-2067/" source="CVE"/>
		<reference ref_id="CVE-2010-2233" ref_url="https://www.suse.com/security/cve/CVE-2010-2233/" source="CVE"/>
		<reference ref_id="CVE-2010-4665" ref_url="https://www.suse.com/security/cve/CVE-2010-4665/" source="CVE"/>
		<reference ref_id="CVE-2011-0192" ref_url="https://www.suse.com/security/cve/CVE-2011-0192/" source="CVE"/>
		<reference ref_id="CVE-2011-1167" ref_url="https://www.suse.com/security/cve/CVE-2011-1167/" source="CVE"/>
		<reference ref_id="CVE-2012-1173" ref_url="https://www.suse.com/security/cve/CVE-2012-1173/" source="CVE"/>
		<reference ref_id="CVE-2012-2113" ref_url="https://www.suse.com/security/cve/CVE-2012-2113/" source="CVE"/>
		<reference ref_id="CVE-2012-3401" ref_url="https://www.suse.com/security/cve/CVE-2012-3401/" source="CVE"/>
		<reference ref_id="CVE-2012-4564" ref_url="https://www.suse.com/security/cve/CVE-2012-4564/" source="CVE"/>
		<reference ref_id="CVE-2013-1960" ref_url="https://www.suse.com/security/cve/CVE-2013-1960/" source="CVE"/>
		<reference ref_id="CVE-2013-1961" ref_url="https://www.suse.com/security/cve/CVE-2013-1961/" source="CVE"/>
		<reference ref_id="CVE-2013-4231" ref_url="https://www.suse.com/security/cve/CVE-2013-4231/" source="CVE"/>
		<reference ref_id="CVE-2013-4232" ref_url="https://www.suse.com/security/cve/CVE-2013-4232/" source="CVE"/>
		<reference ref_id="CVE-2013-4243" ref_url="https://www.suse.com/security/cve/CVE-2013-4243/" source="CVE"/>
		<reference ref_id="CVE-2013-4244" ref_url="https://www.suse.com/security/cve/CVE-2013-4244/" source="CVE"/>
		<reference ref_id="CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127/" source="CVE"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2014-8129" ref_url="https://www.suse.com/security/cve/CVE-2014-8129/" source="CVE"/>
		<reference ref_id="CVE-2014-8130" ref_url="https://www.suse.com/security/cve/CVE-2014-8130/" source="CVE"/>
		<reference ref_id="CVE-2014-9655" ref_url="https://www.suse.com/security/cve/CVE-2014-9655/" source="CVE"/>
		<reference ref_id="CVE-2015-1547" ref_url="https://www.suse.com/security/cve/CVE-2015-1547/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff5-32bit-4.0.4-12.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2285/">CVE-2009-2285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2347/">CVE-2009-2347</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2065/">CVE-2010-2065</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2067/">CVE-2010-2067</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2233/">CVE-2010-2233</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4665/">CVE-2010-4665</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0192/">CVE-2011-0192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1167/">CVE-2011-1167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1173/">CVE-2012-1173</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2113/">CVE-2012-2113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3401/">CVE-2012-3401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4564/">CVE-2012-4564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1960/">CVE-2013-1960</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1961/">CVE-2013-1961</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4231/">CVE-2013-4231</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4232/">CVE-2013-4232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4243/">CVE-2013-4243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4244/">CVE-2013-4244</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8129/">CVE-2014-8129</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8130/">CVE-2014-8130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9655/">CVE-2014-9655</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1547/">CVE-2015-1547</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009114060" comment="libtiff5-4.0.4-12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114059" comment="libtiff5-32bit-4.0.4-12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76078" version="1" class="patch">
	<metadata>
		<title>libudisks2-0-2.1.3-1.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-0004" ref_url="https://www.suse.com/security/cve/CVE-2014-0004/" source="CVE"/>
		<description>
These are all security issues fixed in the libudisks2-0-2.1.3-1.14 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0004/">CVE-2014-0004</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140969" comment="libudisks2-0-2.1.3-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140970" comment="udisks2-2.1.3-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140971" comment="udisks2-lang-2.1.3-1.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76079" version="1" class="patch">
	<metadata>
		<title>libvdpau1-0.8-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2015-5198" ref_url="https://www.suse.com/security/cve/CVE-2015-5198/" source="CVE"/>
		<reference ref_id="CVE-2015-5199" ref_url="https://www.suse.com/security/cve/CVE-2015-5199/" source="CVE"/>
		<reference ref_id="CVE-2015-5200" ref_url="https://www.suse.com/security/cve/CVE-2015-5200/" source="CVE"/>
		<description>
These are all security issues fixed in the libvdpau1-0.8-3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5198/">CVE-2015-5198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5199/">CVE-2015-5199</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5200/">CVE-2015-5200</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009115565" comment="libvdpau1-0.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115566" comment="libvdpau1-32bit-0.8-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76080" version="1" class="patch">
	<metadata>
		<title>libvirt-1.2.18.1-4.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-2242" ref_url="https://www.suse.com/security/cve/CVE-2010-2242/" source="CVE"/>
		<reference ref_id="CVE-2011-1146" ref_url="https://www.suse.com/security/cve/CVE-2011-1146/" source="CVE"/>
		<reference ref_id="CVE-2011-2511" ref_url="https://www.suse.com/security/cve/CVE-2011-2511/" source="CVE"/>
		<reference ref_id="CVE-2011-4600" ref_url="https://www.suse.com/security/cve/CVE-2011-4600/" source="CVE"/>
		<reference ref_id="CVE-2012-3445" ref_url="https://www.suse.com/security/cve/CVE-2012-3445/" source="CVE"/>
		<reference ref_id="CVE-2013-0170" ref_url="https://www.suse.com/security/cve/CVE-2013-0170/" source="CVE"/>
		<reference ref_id="CVE-2013-1962" ref_url="https://www.suse.com/security/cve/CVE-2013-1962/" source="CVE"/>
		<reference ref_id="CVE-2013-2218" ref_url="https://www.suse.com/security/cve/CVE-2013-2218/" source="CVE"/>
		<reference ref_id="CVE-2013-2230" ref_url="https://www.suse.com/security/cve/CVE-2013-2230/" source="CVE"/>
		<reference ref_id="CVE-2013-4153" ref_url="https://www.suse.com/security/cve/CVE-2013-4153/" source="CVE"/>
		<reference ref_id="CVE-2013-4154" ref_url="https://www.suse.com/security/cve/CVE-2013-4154/" source="CVE"/>
		<reference ref_id="CVE-2013-4239" ref_url="https://www.suse.com/security/cve/CVE-2013-4239/" source="CVE"/>
		<reference ref_id="CVE-2013-4296" ref_url="https://www.suse.com/security/cve/CVE-2013-4296/" source="CVE"/>
		<reference ref_id="CVE-2013-4297" ref_url="https://www.suse.com/security/cve/CVE-2013-4297/" source="CVE"/>
		<reference ref_id="CVE-2013-4311" ref_url="https://www.suse.com/security/cve/CVE-2013-4311/" source="CVE"/>
		<reference ref_id="CVE-2013-4399" ref_url="https://www.suse.com/security/cve/CVE-2013-4399/" source="CVE"/>
		<reference ref_id="CVE-2013-4400" ref_url="https://www.suse.com/security/cve/CVE-2013-4400/" source="CVE"/>
		<reference ref_id="CVE-2013-4401" ref_url="https://www.suse.com/security/cve/CVE-2013-4401/" source="CVE"/>
		<reference ref_id="CVE-2013-6436" ref_url="https://www.suse.com/security/cve/CVE-2013-6436/" source="CVE"/>
		<reference ref_id="CVE-2013-6457" ref_url="https://www.suse.com/security/cve/CVE-2013-6457/" source="CVE"/>
		<reference ref_id="CVE-2013-6458" ref_url="https://www.suse.com/security/cve/CVE-2013-6458/" source="CVE"/>
		<reference ref_id="CVE-2014-0028" ref_url="https://www.suse.com/security/cve/CVE-2014-0028/" source="CVE"/>
		<reference ref_id="CVE-2014-0179" ref_url="https://www.suse.com/security/cve/CVE-2014-0179/" source="CVE"/>
		<reference ref_id="CVE-2014-1447" ref_url="https://www.suse.com/security/cve/CVE-2014-1447/" source="CVE"/>
		<reference ref_id="CVE-2014-3633" ref_url="https://www.suse.com/security/cve/CVE-2014-3633/" source="CVE"/>
		<reference ref_id="CVE-2014-3657" ref_url="https://www.suse.com/security/cve/CVE-2014-3657/" source="CVE"/>
		<reference ref_id="CVE-2014-7823" ref_url="https://www.suse.com/security/cve/CVE-2014-7823/" source="CVE"/>
		<reference ref_id="CVE-2014-8136" ref_url="https://www.suse.com/security/cve/CVE-2014-8136/" source="CVE"/>
		<reference ref_id="CVE-2015-0236" ref_url="https://www.suse.com/security/cve/CVE-2015-0236/" source="CVE"/>
		<reference ref_id="CVE-2015-5247" ref_url="https://www.suse.com/security/cve/CVE-2015-5247/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirt-1.2.18.1-4.22 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2242/">CVE-2010-2242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1146/">CVE-2011-1146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2511/">CVE-2011-2511</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-4600/">CVE-2011-4600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3445/">CVE-2012-3445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0170/">CVE-2013-0170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1962/">CVE-2013-1962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2218/">CVE-2013-2218</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2230/">CVE-2013-2230</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4153/">CVE-2013-4153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4154/">CVE-2013-4154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4239/">CVE-2013-4239</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4296/">CVE-2013-4296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4297/">CVE-2013-4297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4311/">CVE-2013-4311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4399/">CVE-2013-4399</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4400/">CVE-2013-4400</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4401/">CVE-2013-4401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6436/">CVE-2013-6436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6457/">CVE-2013-6457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6458/">CVE-2013-6458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0028/">CVE-2014-0028</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0179/">CVE-2014-0179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1447/">CVE-2014-1447</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3633/">CVE-2014-3633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3657/">CVE-2014-3657</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7823/">CVE-2014-7823</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8136/">CVE-2014-8136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0236/">CVE-2015-0236</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5247/">CVE-2015-5247</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142018" comment="libvirt-1.2.18.1-4.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142019" comment="libvirt-client-1.2.18.1-4.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142020" comment="libvirt-client-32bit-1.2.18.1-4.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142021" comment="libvirt-daemon-1.2.18.1-4.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142022" comment="libvirt-daemon-config-network-1.2.18.1-4.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142023" comment="libvirt-daemon-config-nwfilter-1.2.18.1-4.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142024" comment="libvirt-daemon-driver-interface-1.2.18.1-4.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142025" comment="libvirt-daemon-driver-libxl-1.2.18.1-4.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142026" comment="libvirt-daemon-driver-lxc-1.2.18.1-4.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142027" comment="libvirt-daemon-driver-network-1.2.18.1-4.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142028" comment="libvirt-daemon-driver-nodedev-1.2.18.1-4.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142029" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-4.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142030" comment="libvirt-daemon-driver-qemu-1.2.18.1-4.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142031" comment="libvirt-daemon-driver-secret-1.2.18.1-4.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142032" comment="libvirt-daemon-driver-storage-1.2.18.1-4.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142033" comment="libvirt-daemon-lxc-1.2.18.1-4.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142034" comment="libvirt-daemon-qemu-1.2.18.1-4.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142035" comment="libvirt-daemon-xen-1.2.18.1-4.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142036" comment="libvirt-doc-1.2.18.1-4.22 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76081" version="1" class="patch">
	<metadata>
		<title>libvorbis0-1.3.3-8.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-1420" ref_url="https://www.suse.com/security/cve/CVE-2008-1420/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<description>
These are all security issues fixed in the libvorbis0-1.3.3-8.23 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1420/">CVE-2008-1420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141724" comment="libvorbis0-1.3.3-8.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140999" comment="libvorbis0-32bit-1.3.3-8.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141725" comment="libvorbisenc2-1.3.3-8.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141001" comment="libvorbisenc2-32bit-1.3.3-8.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141726" comment="libvorbisfile3-1.3.3-8.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141003" comment="libvorbisfile3-32bit-1.3.3-8.23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76082" version="1" class="patch">
	<metadata>
		<title>libvte9-0.28.2-17.83 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2012-2738" ref_url="https://www.suse.com/security/cve/CVE-2012-2738/" source="CVE"/>
		<description>
These are all security issues fixed in the libvte9-0.28.2-17.83 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2738/">CVE-2012-2738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141727" comment="libvte9-0.28.2-17.83 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76083" version="1" class="patch">
	<metadata>
		<title>libwmf-0_2-7-0.2.8.4-242.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2015-0848" ref_url="https://www.suse.com/security/cve/CVE-2015-0848/" source="CVE"/>
		<reference ref_id="CVE-2015-4588" ref_url="https://www.suse.com/security/cve/CVE-2015-4588/" source="CVE"/>
		<reference ref_id="CVE-2015-4695" ref_url="https://www.suse.com/security/cve/CVE-2015-4695/" source="CVE"/>
		<reference ref_id="CVE-2015-4696" ref_url="https://www.suse.com/security/cve/CVE-2015-4696/" source="CVE"/>
		<description>
These are all security issues fixed in the libwmf-0_2-7-0.2.8.4-242.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0848/">CVE-2015-0848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4588/">CVE-2015-4588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4695/">CVE-2015-4695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4696/">CVE-2015-4696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114120" comment="libwmf-0_2-7-0.2.8.4-242.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76084" version="1" class="patch">
	<metadata>
		<title>libxcb-dri2-0-1.10-1.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-2064" ref_url="https://www.suse.com/security/cve/CVE-2013-2064/" source="CVE"/>
		<description>
These are all security issues fixed in the libxcb-dri2-0-1.10-1.21 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2064/">CVE-2013-2064</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141728" comment="libxcb-dri2-0-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141729" comment="libxcb-dri2-0-32bit-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141730" comment="libxcb-glx0-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141731" comment="libxcb-glx0-32bit-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141732" comment="libxcb-randr0-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141733" comment="libxcb-render0-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141734" comment="libxcb-render0-32bit-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141735" comment="libxcb-shape0-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141736" comment="libxcb-shm0-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141737" comment="libxcb-shm0-32bit-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141738" comment="libxcb-sync1-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141739" comment="libxcb-xf86dri0-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141740" comment="libxcb-xfixes0-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141741" comment="libxcb-xfixes0-32bit-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141742" comment="libxcb-xkb1-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141743" comment="libxcb-xkb1-32bit-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141744" comment="libxcb-xv0-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141745" comment="libxcb1-1.10-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141746" comment="libxcb1-32bit-1.10-1.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76085" version="1" class="patch">
	<metadata>
		<title>libxerces-c-3_1-3.1.1-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-1885" ref_url="https://www.suse.com/security/cve/CVE-2009-1885/" source="CVE"/>
		<reference ref_id="CVE-2015-0252" ref_url="https://www.suse.com/security/cve/CVE-2015-0252/" source="CVE"/>
		<description>
These are all security issues fixed in the libxerces-c-3_1-3.1.1-4.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1885/">CVE-2009-1885</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0252/">CVE-2015-0252</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009108092" comment="libxerces-c-3_1-3.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108093" comment="libxerces-c-3_1-32bit-3.1.1-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76086" version="1" class="patch">
	<metadata>
		<title>libxml2-2-2.9.1-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-4225" ref_url="https://www.suse.com/security/cve/CVE-2008-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-4226" ref_url="https://www.suse.com/security/cve/CVE-2008-4226/" source="CVE"/>
		<reference ref_id="CVE-2008-4409" ref_url="https://www.suse.com/security/cve/CVE-2008-4409/" source="CVE"/>
		<reference ref_id="CVE-2010-4494" ref_url="https://www.suse.com/security/cve/CVE-2010-4494/" source="CVE"/>
		<reference ref_id="CVE-2011-1944" ref_url="https://www.suse.com/security/cve/CVE-2011-1944/" source="CVE"/>
		<reference ref_id="CVE-2012-5134" ref_url="https://www.suse.com/security/cve/CVE-2012-5134/" source="CVE"/>
		<reference ref_id="CVE-2013-0338" ref_url="https://www.suse.com/security/cve/CVE-2013-0338/" source="CVE"/>
		<reference ref_id="CVE-2013-1969" ref_url="https://www.suse.com/security/cve/CVE-2013-1969/" source="CVE"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2014-3660" ref_url="https://www.suse.com/security/cve/CVE-2014-3660/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2-2.9.1-10.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4225/">CVE-2008-4225</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4226/">CVE-2008-4226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4409/">CVE-2008-4409</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4494/">CVE-2010-4494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1944/">CVE-2011-1944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5134/">CVE-2012-5134</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0338/">CVE-2013-0338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1969/">CVE-2013-1969</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3660/">CVE-2014-3660</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009103731" comment="libxml2-2-2.9.1-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009103732" comment="libxml2-2-32bit-2.9.1-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009103737" comment="libxml2-tools-2.9.1-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76087" version="1" class="patch">
	<metadata>
		<title>libyaml-0-2-0.1.6-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-6393" ref_url="https://www.suse.com/security/cve/CVE-2013-6393/" source="CVE"/>
		<reference ref_id="CVE-2014-2525" ref_url="https://www.suse.com/security/cve/CVE-2014-2525/" source="CVE"/>
		<reference ref_id="CVE-2014-9130" ref_url="https://www.suse.com/security/cve/CVE-2014-9130/" source="CVE"/>
		<description>
These are all security issues fixed in the libyaml-0-2-0.1.6-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6393/">CVE-2013-6393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2525/">CVE-2014-2525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9130/">CVE-2014-9130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141036" comment="libyaml-0-2-0.1.6-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76088" version="1" class="patch">
	<metadata>
		<title>libzip2-0.11.1-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<reference ref_id="CVE-2012-1162" ref_url="https://www.suse.com/security/cve/CVE-2012-1162/" source="CVE"/>
		<reference ref_id="CVE-2012-1163" ref_url="https://www.suse.com/security/cve/CVE-2012-1163/" source="CVE"/>
		<reference ref_id="CVE-2015-2331" ref_url="https://www.suse.com/security/cve/CVE-2015-2331/" source="CVE"/>
		<description>
These are all security issues fixed in the libzip2-0.11.1-9.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1162/">CVE-2012-1162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1163/">CVE-2012-1163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2331/">CVE-2015-2331</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142037" comment="libzip2-0.11.1-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76089" version="1" class="patch">
	<metadata>
		<title>libzmq3-4.0.4-13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-7202" ref_url="https://www.suse.com/security/cve/CVE-2014-7202/" source="CVE"/>
		<reference ref_id="CVE-2014-7203" ref_url="https://www.suse.com/security/cve/CVE-2014-7203/" source="CVE"/>
		<reference ref_id="CVE-2014-9721" ref_url="https://www.suse.com/security/cve/CVE-2014-9721/" source="CVE"/>
		<description>
These are all security issues fixed in the libzmq3-4.0.4-13.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7202/">CVE-2014-7202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7203/">CVE-2014-7203</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-9721/">CVE-2014-9721</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114236" comment="libzmq3-4.0.4-13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76090" version="1" class="patch">
	<metadata>
		<title>logrotate-3.8.7-3.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-1098" ref_url="https://www.suse.com/security/cve/CVE-2011-1098/" source="CVE"/>
		<reference ref_id="CVE-2011-1154" ref_url="https://www.suse.com/security/cve/CVE-2011-1154/" source="CVE"/>
		<reference ref_id="CVE-2011-1155" ref_url="https://www.suse.com/security/cve/CVE-2011-1155/" source="CVE"/>
		<description>
These are all security issues fixed in the logrotate-3.8.7-3.21 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1098/">CVE-2011-1098</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1154/">CVE-2011-1154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1155/">CVE-2011-1155</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141038" comment="logrotate-3.8.7-3.21 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76091" version="1" class="patch">
	<metadata>
		<title>m4-1.4.16-15.74 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-4029" ref_url="https://www.suse.com/security/cve/CVE-2009-4029/" source="CVE"/>
		<description>
These are all security issues fixed in the m4-1.4.16-15.74 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4029/">CVE-2009-4029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140466" comment="m4-1.4.16-15.74 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76092" version="1" class="patch">
	<metadata>
		<title>mailx-12.5-25.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2004-2771" ref_url="https://www.suse.com/security/cve/CVE-2004-2771/" source="CVE"/>
		<reference ref_id="CVE-2014-7844" ref_url="https://www.suse.com/security/cve/CVE-2014-7844/" source="CVE"/>
		<description>
These are all security issues fixed in the mailx-12.5-25.15 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2004-2771/">CVE-2004-2771</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-7844/">CVE-2014-7844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142038" comment="mailx-12.5-25.15 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76093" version="1" class="patch">
	<metadata>
		<title>mipv6d-2.0.2.umip.0.4-19.77 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-2522" ref_url="https://www.suse.com/security/cve/CVE-2010-2522/" source="CVE"/>
		<reference ref_id="CVE-2010-2523" ref_url="https://www.suse.com/security/cve/CVE-2010-2523/" source="CVE"/>
		<description>
These are all security issues fixed in the mipv6d-2.0.2.umip.0.4-19.77 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2522/">CVE-2010-2522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2523/">CVE-2010-2523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141042" comment="mipv6d-2.0.2.umip.0.4-19.77 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76094" version="1" class="patch">
	<metadata>
		<title>mozilla-nspr-32bit-4.10.10-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<description>
These are all security issues fixed in the mozilla-nspr-32bit-4.10.10-9.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009116016" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009116015" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76095" version="1" class="patch">
	<metadata>
		<title>mutt-1.5.21-49.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-0467" ref_url="https://www.suse.com/security/cve/CVE-2014-0467/" source="CVE"/>
		<reference ref_id="CVE-2014-9116" ref_url="https://www.suse.com/security/cve/CVE-2014-9116/" source="CVE"/>
		<description>
These are all security issues fixed in the mutt-1.5.21-49.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0467/">CVE-2014-0467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9116/">CVE-2014-9116</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105068" comment="mutt-1.5.21-49.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76096" version="1" class="patch">
	<metadata>
		<title>ntp-4.2.8p4-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0159" ref_url="https://www.suse.com/security/cve/CVE-2009-0159/" source="CVE"/>
		<reference ref_id="CVE-2009-1252" ref_url="https://www.suse.com/security/cve/CVE-2009-1252/" source="CVE"/>
		<reference ref_id="CVE-2013-5211" ref_url="https://www.suse.com/security/cve/CVE-2013-5211/" source="CVE"/>
		<reference ref_id="CVE-2014-9293" ref_url="https://www.suse.com/security/cve/CVE-2014-9293/" source="CVE"/>
		<reference ref_id="CVE-2014-9294" ref_url="https://www.suse.com/security/cve/CVE-2014-9294/" source="CVE"/>
		<reference ref_id="CVE-2014-9295" ref_url="https://www.suse.com/security/cve/CVE-2014-9295/" source="CVE"/>
		<reference ref_id="CVE-2014-9296" ref_url="https://www.suse.com/security/cve/CVE-2014-9296/" source="CVE"/>
		<reference ref_id="CVE-2014-9297" ref_url="https://www.suse.com/security/cve/CVE-2014-9297/" source="CVE"/>
		<reference ref_id="CVE-2014-9298" ref_url="https://www.suse.com/security/cve/CVE-2014-9298/" source="CVE"/>
		<reference ref_id="CVE-2015-1798" ref_url="https://www.suse.com/security/cve/CVE-2015-1798/" source="CVE"/>
		<reference ref_id="CVE-2015-1799" ref_url="https://www.suse.com/security/cve/CVE-2015-1799/" source="CVE"/>
		<reference ref_id="CVE-2015-3405" ref_url="https://www.suse.com/security/cve/CVE-2015-3405/" source="CVE"/>
		<reference ref_id="CVE-2015-7691" ref_url="https://www.suse.com/security/cve/CVE-2015-7691/" source="CVE"/>
		<reference ref_id="CVE-2015-7692" ref_url="https://www.suse.com/security/cve/CVE-2015-7692/" source="CVE"/>
		<reference ref_id="CVE-2015-7701" ref_url="https://www.suse.com/security/cve/CVE-2015-7701/" source="CVE"/>
		<reference ref_id="CVE-2015-7702" ref_url="https://www.suse.com/security/cve/CVE-2015-7702/" source="CVE"/>
		<reference ref_id="CVE-2015-7703" ref_url="https://www.suse.com/security/cve/CVE-2015-7703/" source="CVE"/>
		<reference ref_id="CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704/" source="CVE"/>
		<reference ref_id="CVE-2015-7705" ref_url="https://www.suse.com/security/cve/CVE-2015-7705/" source="CVE"/>
		<reference ref_id="CVE-2015-7848" ref_url="https://www.suse.com/security/cve/CVE-2015-7848/" source="CVE"/>
		<reference ref_id="CVE-2015-7849" ref_url="https://www.suse.com/security/cve/CVE-2015-7849/" source="CVE"/>
		<reference ref_id="CVE-2015-7850" ref_url="https://www.suse.com/security/cve/CVE-2015-7850/" source="CVE"/>
		<reference ref_id="CVE-2015-7851" ref_url="https://www.suse.com/security/cve/CVE-2015-7851/" source="CVE"/>
		<reference ref_id="CVE-2015-7852" ref_url="https://www.suse.com/security/cve/CVE-2015-7852/" source="CVE"/>
		<reference ref_id="CVE-2015-7853" ref_url="https://www.suse.com/security/cve/CVE-2015-7853/" source="CVE"/>
		<reference ref_id="CVE-2015-7854" ref_url="https://www.suse.com/security/cve/CVE-2015-7854/" source="CVE"/>
		<reference ref_id="CVE-2015-7855" ref_url="https://www.suse.com/security/cve/CVE-2015-7855/" source="CVE"/>
		<reference ref_id="CVE-2015-7871" ref_url="https://www.suse.com/security/cve/CVE-2015-7871/" source="CVE"/>
		<description>
These are all security issues fixed in the ntp-4.2.8p4-1.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0159/">CVE-2009-0159</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1252/">CVE-2009-1252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5211/">CVE-2013-5211</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9293/">CVE-2014-9293</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9294/">CVE-2014-9294</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9295/">CVE-2014-9295</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9296/">CVE-2014-9296</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9297/">CVE-2014-9297</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9298/">CVE-2014-9298</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1798/">CVE-2015-1798</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1799/">CVE-2015-1799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3405/">CVE-2015-3405</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7691/">CVE-2015-7691</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7692/">CVE-2015-7692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7701/">CVE-2015-7701</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7702/">CVE-2015-7702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7703/">CVE-2015-7703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7705/">CVE-2015-7705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7848/">CVE-2015-7848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7849/">CVE-2015-7849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7850/">CVE-2015-7850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7851/">CVE-2015-7851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7852/">CVE-2015-7852</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7853/">CVE-2015-7853</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7854/">CVE-2015-7854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7855/">CVE-2015-7855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7871/">CVE-2015-7871</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142039" comment="ntp-4.2.8p4-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142040" comment="ntp-doc-4.2.8p4-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76097" version="1" class="patch">
	<metadata>
		<title>opensc-0.13.0-1.122 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0368" ref_url="https://www.suse.com/security/cve/CVE-2009-0368/" source="CVE"/>
		<reference ref_id="CVE-2010-4523" ref_url="https://www.suse.com/security/cve/CVE-2010-4523/" source="CVE"/>
		<description>
These are all security issues fixed in the opensc-0.13.0-1.122 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0368/">CVE-2009-0368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4523/">CVE-2010-4523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141044" comment="opensc-0.13.0-1.122 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76098" version="1" class="patch">
	<metadata>
		<title>openslp-2.0.0-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-3609" ref_url="https://www.suse.com/security/cve/CVE-2010-3609/" source="CVE"/>
		<description>
These are all security issues fixed in the openslp-2.0.0-5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3609/">CVE-2010-3609</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142041" comment="openslp-2.0.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142042" comment="openslp-32bit-2.0.0-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76099" version="1" class="patch">
	<metadata>
		<title>openssh-6.6p1-29.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-2653" ref_url="https://www.suse.com/security/cve/CVE-2014-2653/" source="CVE"/>
		<reference ref_id="CVE-2015-5352" ref_url="https://www.suse.com/security/cve/CVE-2015-5352/" source="CVE"/>
		<reference ref_id="CVE-2015-5600" ref_url="https://www.suse.com/security/cve/CVE-2015-5600/" source="CVE"/>
		<reference ref_id="CVE-2015-6563" ref_url="https://www.suse.com/security/cve/CVE-2015-6563/" source="CVE"/>
		<reference ref_id="CVE-2015-6564" ref_url="https://www.suse.com/security/cve/CVE-2015-6564/" source="CVE"/>
		<description>
These are all security issues fixed in the openssh-6.6p1-29.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2653/">CVE-2014-2653</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5352/">CVE-2015-5352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5600/">CVE-2015-5600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6563/">CVE-2015-6563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6564/">CVE-2015-6564</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009114322" comment="openssh-6.6p1-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114325" comment="openssh-helpers-6.6p1-29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76100" version="1" class="patch">
	<metadata>
		<title>openvpn-2.3.8-16.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-8104" ref_url="https://www.suse.com/security/cve/CVE-2014-8104/" source="CVE"/>
		<description>
These are all security issues fixed in the openvpn-2.3.8-16.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8104/">CVE-2014-8104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142043" comment="openvpn-2.3.8-16.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76101" version="1" class="patch">
	<metadata>
		<title>p7zip-9.20.1-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2015-1038" ref_url="https://www.suse.com/security/cve/CVE-2015-1038/" source="CVE"/>
		<description>
These are all security issues fixed in the p7zip-9.20.1-3.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1038/">CVE-2015-1038</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113958" comment="p7zip-9.20.1-3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76102" version="1" class="patch">
	<metadata>
		<title>pam-1.1.8-14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-3430" ref_url="https://www.suse.com/security/cve/CVE-2010-3430/" source="CVE"/>
		<reference ref_id="CVE-2010-3431" ref_url="https://www.suse.com/security/cve/CVE-2010-3431/" source="CVE"/>
		<reference ref_id="CVE-2010-3853" ref_url="https://www.suse.com/security/cve/CVE-2010-3853/" source="CVE"/>
		<reference ref_id="CVE-2011-3148" ref_url="https://www.suse.com/security/cve/CVE-2011-3148/" source="CVE"/>
		<reference ref_id="CVE-2011-3149" ref_url="https://www.suse.com/security/cve/CVE-2011-3149/" source="CVE"/>
		<reference ref_id="CVE-2014-2583" ref_url="https://www.suse.com/security/cve/CVE-2014-2583/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-1.1.8-14.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3430/">CVE-2010-3430</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3431/">CVE-2010-3431</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3853/">CVE-2010-3853</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3148/">CVE-2011-3148</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3149/">CVE-2011-3149</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2583/">CVE-2014-2583</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141056" comment="pam-1.1.8-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141057" comment="pam-32bit-1.1.8-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141058" comment="pam-doc-1.1.8-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76103" version="1" class="patch">
	<metadata>
		<title>pam-modules-12.1-23.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-3172" ref_url="https://www.suse.com/security/cve/CVE-2011-3172/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-modules-12.1-23.12 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3172/">CVE-2011-3172</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141767" comment="pam-modules-12.1-23.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141060" comment="pam-modules-32bit-12.1-23.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76104" version="1" class="patch">
	<metadata>
		<title>pam_krb5-2.4.4-4.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-3825" ref_url="https://www.suse.com/security/cve/CVE-2008-3825/" source="CVE"/>
		<reference ref_id="CVE-2009-1384" ref_url="https://www.suse.com/security/cve/CVE-2009-1384/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_krb5-2.4.4-4.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3825/">CVE-2008-3825</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1384/">CVE-2009-1384</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141061" comment="pam_krb5-2.4.4-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141062" comment="pam_krb5-32bit-2.4.4-4.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76105" version="1" class="patch">
	<metadata>
		<title>pam_ssh-2.0-1.40 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-1273" ref_url="https://www.suse.com/security/cve/CVE-2009-1273/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_ssh-2.0-1.40 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1273/">CVE-2009-1273</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141063" comment="pam_ssh-2.0-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141064" comment="pam_ssh-32bit-2.0-1.40 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76106" version="1" class="patch">
	<metadata>
		<title>patch-2.7.5-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-4651" ref_url="https://www.suse.com/security/cve/CVE-2010-4651/" source="CVE"/>
		<reference ref_id="CVE-2015-1196" ref_url="https://www.suse.com/security/cve/CVE-2015-1196/" source="CVE"/>
		<reference ref_id="CVE-2015-1395" ref_url="https://www.suse.com/security/cve/CVE-2015-1395/" source="CVE"/>
		<reference ref_id="CVE-2015-1396" ref_url="https://www.suse.com/security/cve/CVE-2015-1396/" source="CVE"/>
		<description>
These are all security issues fixed in the patch-2.7.5-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4651/">CVE-2010-4651</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1196/">CVE-2015-1196</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1395/">CVE-2015-1395</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1396/">CVE-2015-1396</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110205" comment="patch-2.7.5-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76107" version="1" class="patch">
	<metadata>
		<title>pcsc-ccid-1.4.14-1.45 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-4530" ref_url="https://www.suse.com/security/cve/CVE-2010-4530/" source="CVE"/>
		<description>
These are all security issues fixed in the pcsc-ccid-1.4.14-1.45 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4530/">CVE-2010-4530</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141065" comment="pcsc-ccid-1.4.14-1.45 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76108" version="1" class="patch">
	<metadata>
		<title>perl-32bit-5.18.2-3.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-2761" ref_url="https://www.suse.com/security/cve/CVE-2010-2761/" source="CVE"/>
		<reference ref_id="CVE-2010-4410" ref_url="https://www.suse.com/security/cve/CVE-2010-4410/" source="CVE"/>
		<reference ref_id="CVE-2010-4411" ref_url="https://www.suse.com/security/cve/CVE-2010-4411/" source="CVE"/>
		<reference ref_id="CVE-2010-4777" ref_url="https://www.suse.com/security/cve/CVE-2010-4777/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-32bit-5.18.2-3.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2761/">CVE-2010-2761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4410/">CVE-2010-4410</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4411/">CVE-2010-4411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4777/">CVE-2010-4777</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141769" comment="perl-5.18.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141770" comment="perl-32bit-5.18.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141771" comment="perl-base-5.18.2-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141772" comment="perl-doc-5.18.2-3.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76109" version="1" class="patch">
	<metadata>
		<title>perl-Config-IniFiles-2.82-3.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2012-2451" ref_url="https://www.suse.com/security/cve/CVE-2012-2451/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Config-IniFiles-2.82-3.14 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2451/">CVE-2012-2451</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141066" comment="perl-Config-IniFiles-2.82-3.14 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76110" version="1" class="patch">
	<metadata>
		<title>perl-HTML-Parser-3.71-1.178 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-3627" ref_url="https://www.suse.com/security/cve/CVE-2009-3627/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-HTML-Parser-3.71-1.178 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3627/">CVE-2009-3627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141067" comment="perl-HTML-Parser-3.71-1.178 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76111" version="1" class="patch">
	<metadata>
		<title>perl-LWP-Protocol-https-6.04-5.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-3230" ref_url="https://www.suse.com/security/cve/CVE-2014-3230/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-LWP-Protocol-https-6.04-5.4 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3230/">CVE-2014-3230</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141068" comment="perl-LWP-Protocol-https-6.04-5.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76112" version="1" class="patch">
	<metadata>
		<title>perl-Tk-804.031-3.82 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-4484" ref_url="https://www.suse.com/security/cve/CVE-2006-4484/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Tk-804.031-3.82 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4484/">CVE-2006-4484</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141069" comment="perl-Tk-804.031-3.82 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76113" version="1" class="patch">
	<metadata>
		<title>perl-XML-LibXML-2.0019-5.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2015-3451" ref_url="https://www.suse.com/security/cve/CVE-2015-3451/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-XML-LibXML-2.0019-5.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3451/">CVE-2015-3451</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113959" comment="perl-XML-LibXML-2.0019-5.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76114" version="1" class="patch">
	<metadata>
		<title>perl-YAML-LibYAML-0.38-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2012-1152" ref_url="https://www.suse.com/security/cve/CVE-2012-1152/" source="CVE"/>
		<reference ref_id="CVE-2013-6393" ref_url="https://www.suse.com/security/cve/CVE-2013-6393/" source="CVE"/>
		<reference ref_id="CVE-2014-2525" ref_url="https://www.suse.com/security/cve/CVE-2014-2525/" source="CVE"/>
		<reference ref_id="CVE-2014-9130" ref_url="https://www.suse.com/security/cve/CVE-2014-9130/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-YAML-LibYAML-0.38-10.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1152/">CVE-2012-1152</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6393/">CVE-2013-6393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2525/">CVE-2014-2525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9130/">CVE-2014-9130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109959" comment="perl-YAML-LibYAML-0.38-10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76115" version="1" class="patch">
	<metadata>
		<title>pidgin-otr-4.0.0-6.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2012-2369" ref_url="https://www.suse.com/security/cve/CVE-2012-2369/" source="CVE"/>
		<description>
These are all security issues fixed in the pidgin-otr-4.0.0-6.18 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2369/">CVE-2012-2369</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141774" comment="pidgin-otr-4.0.0-6.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76116" version="1" class="patch">
	<metadata>
		<title>pigz-2.3-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2015-1191" ref_url="https://www.suse.com/security/cve/CVE-2015-1191/" source="CVE"/>
		<description>
These are all security issues fixed in the pigz-2.3-5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1191/">CVE-2015-1191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108432" comment="pigz-2.3-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76117" version="1" class="patch">
	<metadata>
		<title>ppp-2.4.7-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-3158" ref_url="https://www.suse.com/security/cve/CVE-2014-3158/" source="CVE"/>
		<description>
These are all security issues fixed in the ppp-2.4.7-1.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3158/">CVE-2014-3158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141072" comment="ppp-2.4.7-1.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76118" version="1" class="patch">
	<metadata>
		<title>procmail-3.22-267.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-3618" ref_url="https://www.suse.com/security/cve/CVE-2014-3618/" source="CVE"/>
		<description>
These are all security issues fixed in the procmail-3.22-267.12 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3618/">CVE-2014-3618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141775" comment="procmail-3.22-267.12 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76119" version="1" class="patch">
	<metadata>
		<title>puppet-3.6.2-3.62 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-3848" ref_url="https://www.suse.com/security/cve/CVE-2011-3848/" source="CVE"/>
		<reference ref_id="CVE-2011-3872" ref_url="https://www.suse.com/security/cve/CVE-2011-3872/" source="CVE"/>
		<reference ref_id="CVE-2012-3864" ref_url="https://www.suse.com/security/cve/CVE-2012-3864/" source="CVE"/>
		<reference ref_id="CVE-2012-3865" ref_url="https://www.suse.com/security/cve/CVE-2012-3865/" source="CVE"/>
		<reference ref_id="CVE-2012-3866" ref_url="https://www.suse.com/security/cve/CVE-2012-3866/" source="CVE"/>
		<reference ref_id="CVE-2012-3867" ref_url="https://www.suse.com/security/cve/CVE-2012-3867/" source="CVE"/>
		<reference ref_id="CVE-2013-3567" ref_url="https://www.suse.com/security/cve/CVE-2013-3567/" source="CVE"/>
		<reference ref_id="CVE-2013-4761" ref_url="https://www.suse.com/security/cve/CVE-2013-4761/" source="CVE"/>
		<reference ref_id="CVE-2013-4956" ref_url="https://www.suse.com/security/cve/CVE-2013-4956/" source="CVE"/>
		<reference ref_id="CVE-2014-3248" ref_url="https://www.suse.com/security/cve/CVE-2014-3248/" source="CVE"/>
		<reference ref_id="CVE-2014-3253" ref_url="https://www.suse.com/security/cve/CVE-2014-3253/" source="CVE"/>
		<description>
These are all security issues fixed in the puppet-3.6.2-3.62 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3848/">CVE-2011-3848</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3872/">CVE-2011-3872</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3864/">CVE-2012-3864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3865/">CVE-2012-3865</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3866/">CVE-2012-3866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3867/">CVE-2012-3867</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3567/">CVE-2013-3567</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4761/">CVE-2013-4761</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4956/">CVE-2013-4956</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3248/">CVE-2014-3248</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3253/">CVE-2014-3253</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141776" comment="puppet-3.6.2-3.62 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76120" version="1" class="patch">
	<metadata>
		<title>python-2.7.9-20.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<description>
These are all security issues fixed in the python-2.7.9-20.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142044" comment="python-2.7.9-20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142045" comment="python-curses-2.7.9-20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142046" comment="python-tk-2.7.9-20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141074" comment="python3-3.4.1-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76121" version="1" class="patch">
	<metadata>
		<title>python-cupshelpers-1.4.5-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-4405" ref_url="https://www.suse.com/security/cve/CVE-2011-4405/" source="CVE"/>
		<description>
These are all security issues fixed in the python-cupshelpers-1.4.5-1.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4405/">CVE-2011-4405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141781" comment="python-cupshelpers-1.4.5-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141782" comment="system-config-printer-1.4.5-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141783" comment="system-config-printer-common-1.4.5-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141784" comment="system-config-printer-common-lang-1.4.5-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141785" comment="system-config-printer-dbus-service-1.4.5-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141786" comment="udev-configure-printer-1.4.5-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76122" version="1" class="patch">
	<metadata>
		<title>python-imaging-1.1.7-21.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-1932" ref_url="https://www.suse.com/security/cve/CVE-2014-1932/" source="CVE"/>
		<description>
These are all security issues fixed in the python-imaging-1.1.7-21.15 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1932/">CVE-2014-1932</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141787" comment="python-imaging-1.1.7-21.15 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76123" version="1" class="patch">
	<metadata>
		<title>python-libxml2-2.9.1-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-4225" ref_url="https://www.suse.com/security/cve/CVE-2008-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-4226" ref_url="https://www.suse.com/security/cve/CVE-2008-4226/" source="CVE"/>
		<reference ref_id="CVE-2008-4409" ref_url="https://www.suse.com/security/cve/CVE-2008-4409/" source="CVE"/>
		<reference ref_id="CVE-2012-5134" ref_url="https://www.suse.com/security/cve/CVE-2012-5134/" source="CVE"/>
		<description>
These are all security issues fixed in the python-libxml2-2.9.1-10.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4225/">CVE-2008-4225</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4226/">CVE-2008-4226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4409/">CVE-2008-4409</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5134/">CVE-2012-5134</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009103738" comment="python-libxml2-2.9.1-10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76124" version="1" class="patch">
	<metadata>
		<title>python-pyOpenSSL-0.14-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-4314" ref_url="https://www.suse.com/security/cve/CVE-2013-4314/" source="CVE"/>
		<description>
These are all security issues fixed in the python-pyOpenSSL-0.14-1.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4314/">CVE-2013-4314</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141789" comment="python-pyOpenSSL-0.14-1.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76125" version="1" class="patch">
	<metadata>
		<title>python-pywbem-0.7.0-4.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-6418" ref_url="https://www.suse.com/security/cve/CVE-2013-6418/" source="CVE"/>
		<description>
These are all security issues fixed in the python-pywbem-0.7.0-4.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6418/">CVE-2013-6418</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141085" comment="python-pywbem-0.7.0-4.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76126" version="1" class="patch">
	<metadata>
		<title>python-requests-2.3.0-6.5.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-1829" ref_url="https://www.suse.com/security/cve/CVE-2014-1829/" source="CVE"/>
		<reference ref_id="CVE-2014-1830" ref_url="https://www.suse.com/security/cve/CVE-2014-1830/" source="CVE"/>
		<description>
These are all security issues fixed in the python-requests-2.3.0-6.5.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-1829/">CVE-2014-1829</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-1830/">CVE-2014-1830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142047" comment="python-requests-2.3.0-6.5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76127" version="1" class="patch">
	<metadata>
		<title>qemu-2.3.1-5.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-0928" ref_url="https://www.suse.com/security/cve/CVE-2008-0928/" source="CVE"/>
		<reference ref_id="CVE-2008-1945" ref_url="https://www.suse.com/security/cve/CVE-2008-1945/" source="CVE"/>
		<reference ref_id="CVE-2008-2382" ref_url="https://www.suse.com/security/cve/CVE-2008-2382/" source="CVE"/>
		<reference ref_id="CVE-2008-4539" ref_url="https://www.suse.com/security/cve/CVE-2008-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515/" source="CVE"/>
		<reference ref_id="CVE-2013-4148" ref_url="https://www.suse.com/security/cve/CVE-2013-4148/" source="CVE"/>
		<reference ref_id="CVE-2013-4149" ref_url="https://www.suse.com/security/cve/CVE-2013-4149/" source="CVE"/>
		<reference ref_id="CVE-2013-4150" ref_url="https://www.suse.com/security/cve/CVE-2013-4150/" source="CVE"/>
		<reference ref_id="CVE-2013-4151" ref_url="https://www.suse.com/security/cve/CVE-2013-4151/" source="CVE"/>
		<reference ref_id="CVE-2013-4526" ref_url="https://www.suse.com/security/cve/CVE-2013-4526/" source="CVE"/>
		<reference ref_id="CVE-2013-4527" ref_url="https://www.suse.com/security/cve/CVE-2013-4527/" source="CVE"/>
		<reference ref_id="CVE-2013-4529" ref_url="https://www.suse.com/security/cve/CVE-2013-4529/" source="CVE"/>
		<reference ref_id="CVE-2013-4530" ref_url="https://www.suse.com/security/cve/CVE-2013-4530/" source="CVE"/>
		<reference ref_id="CVE-2013-4531" ref_url="https://www.suse.com/security/cve/CVE-2013-4531/" source="CVE"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4535" ref_url="https://www.suse.com/security/cve/CVE-2013-4535/" source="CVE"/>
		<reference ref_id="CVE-2013-4536" ref_url="https://www.suse.com/security/cve/CVE-2013-4536/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540/" source="CVE"/>
		<reference ref_id="CVE-2013-4541" ref_url="https://www.suse.com/security/cve/CVE-2013-4541/" source="CVE"/>
		<reference ref_id="CVE-2013-4542" ref_url="https://www.suse.com/security/cve/CVE-2013-4542/" source="CVE"/>
		<reference ref_id="CVE-2013-4544" ref_url="https://www.suse.com/security/cve/CVE-2013-4544/" source="CVE"/>
		<reference ref_id="CVE-2013-6399" ref_url="https://www.suse.com/security/cve/CVE-2013-6399/" source="CVE"/>
		<reference ref_id="CVE-2014-0142" ref_url="https://www.suse.com/security/cve/CVE-2014-0142/" source="CVE"/>
		<reference ref_id="CVE-2014-0143" ref_url="https://www.suse.com/security/cve/CVE-2014-0143/" source="CVE"/>
		<reference ref_id="CVE-2014-0144" ref_url="https://www.suse.com/security/cve/CVE-2014-0144/" source="CVE"/>
		<reference ref_id="CVE-2014-0145" ref_url="https://www.suse.com/security/cve/CVE-2014-0145/" source="CVE"/>
		<reference ref_id="CVE-2014-0146" ref_url="https://www.suse.com/security/cve/CVE-2014-0146/" source="CVE"/>
		<reference ref_id="CVE-2014-0147" ref_url="https://www.suse.com/security/cve/CVE-2014-0147/" source="CVE"/>
		<reference ref_id="CVE-2014-0150" ref_url="https://www.suse.com/security/cve/CVE-2014-0150/" source="CVE"/>
		<reference ref_id="CVE-2014-0182" ref_url="https://www.suse.com/security/cve/CVE-2014-0182/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-0223" ref_url="https://www.suse.com/security/cve/CVE-2014-0223/" source="CVE"/>
		<reference ref_id="CVE-2014-3461" ref_url="https://www.suse.com/security/cve/CVE-2014-3461/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-7840" ref_url="https://www.suse.com/security/cve/CVE-2014-7840/" source="CVE"/>
		<reference ref_id="CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5225" ref_url="https://www.suse.com/security/cve/CVE-2015-5225/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-5279" ref_url="https://www.suse.com/security/cve/CVE-2015-5279/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7295" ref_url="https://www.suse.com/security/cve/CVE-2015-7295/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-2.3.1-5.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0928/">CVE-2008-0928</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1945/">CVE-2008-1945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2382/">CVE-2008-2382</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4539/">CVE-2008-4539</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4148/">CVE-2013-4148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4149/">CVE-2013-4149</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4150/">CVE-2013-4150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4151/">CVE-2013-4151</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4526/">CVE-2013-4526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4527/">CVE-2013-4527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4529/">CVE-2013-4529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4530/">CVE-2013-4530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4531/">CVE-2013-4531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4535/">CVE-2013-4535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4536/">CVE-2013-4536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4541/">CVE-2013-4541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4542/">CVE-2013-4542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4544/">CVE-2013-4544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6399/">CVE-2013-6399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0142/">CVE-2014-0142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0143/">CVE-2014-0143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0144/">CVE-2014-0144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0145/">CVE-2014-0145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0146/">CVE-2014-0146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0147/">CVE-2014-0147</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0150/">CVE-2014-0150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0182/">CVE-2014-0182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0223/">CVE-2014-0223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3461/">CVE-2014-3461</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7840/">CVE-2014-7840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5225/">CVE-2015-5225</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5279/">CVE-2015-5279</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7295/">CVE-2015-7295</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142048" comment="qemu-2.3.1-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142049" comment="qemu-block-curl-2.3.1-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142050" comment="qemu-ipxe-1.0.0-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142051" comment="qemu-kvm-2.3.1-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142052" comment="qemu-seabios-1.8.1-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142053" comment="qemu-sgabios-8-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142054" comment="qemu-tools-2.3.1-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142055" comment="qemu-vgabios-1.8.1-5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142056" comment="qemu-x86-2.3.1-5.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76128" version="1" class="patch">
	<metadata>
		<title>radvd-1.9.7-2.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-3602" ref_url="https://www.suse.com/security/cve/CVE-2011-3602/" source="CVE"/>
		<description>
These are all security issues fixed in the radvd-1.9.7-2.17 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3602/">CVE-2011-3602</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141103" comment="radvd-1.9.7-2.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76129" version="1" class="patch">
	<metadata>
		<title>rhythmbox-3.0.2-1.92 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2012-3355" ref_url="https://www.suse.com/security/cve/CVE-2012-3355/" source="CVE"/>
		<description>
These are all security issues fixed in the rhythmbox-3.0.2-1.92 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3355/">CVE-2012-3355</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141799" comment="rhythmbox-3.0.2-1.92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141800" comment="rhythmbox-lang-3.0.2-1.92 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76130" version="1" class="patch">
	<metadata>
		<title>rpcbind-0.2.1_rc4-16.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2015-7236" ref_url="https://www.suse.com/security/cve/CVE-2015-7236/" source="CVE"/>
		<description>
These are all security issues fixed in the rpcbind-0.2.1_rc4-16.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7236/">CVE-2015-7236</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142057" comment="rpcbind-0.2.1_rc4-16.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76131" version="1" class="patch">
	<metadata>
		<title>rpm-32bit-4.11.2-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-6435" ref_url="https://www.suse.com/security/cve/CVE-2013-6435/" source="CVE"/>
		<reference ref_id="CVE-2014-8118" ref_url="https://www.suse.com/security/cve/CVE-2014-8118/" source="CVE"/>
		<description>
These are all security issues fixed in the rpm-32bit-4.11.2-10.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6435/">CVE-2013-6435</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8118/">CVE-2014-8118</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105405" comment="rpm-4.11.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105404" comment="rpm-32bit-4.11.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105406" comment="rpm-build-4.11.2-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76132" version="1" class="patch">
	<metadata>
		<title>rsync-3.1.0-2.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-1097" ref_url="https://www.suse.com/security/cve/CVE-2011-1097/" source="CVE"/>
		<reference ref_id="CVE-2014-2855" ref_url="https://www.suse.com/security/cve/CVE-2014-2855/" source="CVE"/>
		<description>
These are all security issues fixed in the rsync-3.1.0-2.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1097/">CVE-2011-1097</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2855/">CVE-2014-2855</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141801" comment="rsync-3.1.0-2.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76133" version="1" class="patch">
	<metadata>
		<title>rsyslog-8.4.0-8.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-3200" ref_url="https://www.suse.com/security/cve/CVE-2011-3200/" source="CVE"/>
		<reference ref_id="CVE-2013-4758" ref_url="https://www.suse.com/security/cve/CVE-2013-4758/" source="CVE"/>
		<reference ref_id="CVE-2013-6370" ref_url="https://www.suse.com/security/cve/CVE-2013-6370/" source="CVE"/>
		<reference ref_id="CVE-2013-6371" ref_url="https://www.suse.com/security/cve/CVE-2013-6371/" source="CVE"/>
		<reference ref_id="CVE-2014-3634" ref_url="https://www.suse.com/security/cve/CVE-2014-3634/" source="CVE"/>
		<reference ref_id="CVE-2014-3683" ref_url="https://www.suse.com/security/cve/CVE-2014-3683/" source="CVE"/>
		<description>
These are all security issues fixed in the rsyslog-8.4.0-8.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3200/">CVE-2011-3200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4758/">CVE-2013-4758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6370/">CVE-2013-6370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6371/">CVE-2013-6371</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3634/">CVE-2014-3634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3683/">CVE-2014-3683</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142058" comment="rsyslog-8.4.0-8.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76134" version="1" class="patch">
	<metadata>
		<title>rtkit-0.11_git201205151338-8.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-4326" ref_url="https://www.suse.com/security/cve/CVE-2013-4326/" source="CVE"/>
		<description>
These are all security issues fixed in the rtkit-0.11_git201205151338-8.17 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4326/">CVE-2013-4326</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141122" comment="rtkit-0.11_git201205151338-8.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76135" version="1" class="patch">
	<metadata>
		<title>ruby-2.1-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-4492" ref_url="https://www.suse.com/security/cve/CVE-2009-4492/" source="CVE"/>
		<reference ref_id="CVE-2010-0541" ref_url="https://www.suse.com/security/cve/CVE-2010-0541/" source="CVE"/>
		<reference ref_id="CVE-2011-1004" ref_url="https://www.suse.com/security/cve/CVE-2011-1004/" source="CVE"/>
		<reference ref_id="CVE-2011-1005" ref_url="https://www.suse.com/security/cve/CVE-2011-1005/" source="CVE"/>
		<reference ref_id="CVE-2011-4815" ref_url="https://www.suse.com/security/cve/CVE-2011-4815/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby-2.1-1.6 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4492/">CVE-2009-4492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0541/">CVE-2010-0541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1004/">CVE-2011-1004</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1005/">CVE-2011-1005</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4815/">CVE-2011-4815</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141123" comment="ruby-2.1-1.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76136" version="1" class="patch">
	<metadata>
		<title>sblim-sfcb-1.4.8-8.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2015-5185" ref_url="https://www.suse.com/security/cve/CVE-2015-5185/" source="CVE"/>
		<description>
These are all security issues fixed in the sblim-sfcb-1.4.8-8.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5185/">CVE-2015-5185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141124" comment="sblim-sfcb-1.4.8-8.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76137" version="1" class="patch">
	<metadata>
		<title>shim-0.9-2.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-3675" ref_url="https://www.suse.com/security/cve/CVE-2014-3675/" source="CVE"/>
		<reference ref_id="CVE-2014-3676" ref_url="https://www.suse.com/security/cve/CVE-2014-3676/" source="CVE"/>
		<reference ref_id="CVE-2014-3677" ref_url="https://www.suse.com/security/cve/CVE-2014-3677/" source="CVE"/>
		<description>
These are all security issues fixed in the shim-0.9-2.14 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3675/">CVE-2014-3675</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3676/">CVE-2014-3676</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3677/">CVE-2014-3677</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142059" comment="shim-0.9-2.14 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76138" version="1" class="patch">
	<metadata>
		<title>socat-1.7.2.4-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-3571" ref_url="https://www.suse.com/security/cve/CVE-2013-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-0019" ref_url="https://www.suse.com/security/cve/CVE-2014-0019/" source="CVE"/>
		<description>
These are all security issues fixed in the socat-1.7.2.4-1.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3571/">CVE-2013-3571</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0019/">CVE-2014-0019</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141804" comment="socat-1.7.2.4-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76139" version="1" class="patch">
	<metadata>
		<title>squashfs-4.3-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2012-4024" ref_url="https://www.suse.com/security/cve/CVE-2012-4024/" source="CVE"/>
		<reference ref_id="CVE-2012-4025" ref_url="https://www.suse.com/security/cve/CVE-2012-4025/" source="CVE"/>
		<description>
These are all security issues fixed in the squashfs-4.3-1.15 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4024/">CVE-2012-4024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4025/">CVE-2012-4025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141805" comment="squashfs-4.3-1.15 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76140" version="1" class="patch">
	<metadata>
		<title>strongswan-5.1.3-18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0790" ref_url="https://www.suse.com/security/cve/CVE-2009-0790/" source="CVE"/>
		<reference ref_id="CVE-2012-2388" ref_url="https://www.suse.com/security/cve/CVE-2012-2388/" source="CVE"/>
		<reference ref_id="CVE-2013-2944" ref_url="https://www.suse.com/security/cve/CVE-2013-2944/" source="CVE"/>
		<reference ref_id="CVE-2013-5018" ref_url="https://www.suse.com/security/cve/CVE-2013-5018/" source="CVE"/>
		<reference ref_id="CVE-2013-6075" ref_url="https://www.suse.com/security/cve/CVE-2013-6075/" source="CVE"/>
		<reference ref_id="CVE-2013-6076" ref_url="https://www.suse.com/security/cve/CVE-2013-6076/" source="CVE"/>
		<reference ref_id="CVE-2014-2338" ref_url="https://www.suse.com/security/cve/CVE-2014-2338/" source="CVE"/>
		<reference ref_id="CVE-2014-9221" ref_url="https://www.suse.com/security/cve/CVE-2014-9221/" source="CVE"/>
		<reference ref_id="CVE-2015-4171" ref_url="https://www.suse.com/security/cve/CVE-2015-4171/" source="CVE"/>
		<description>
These are all security issues fixed in the strongswan-5.1.3-18.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0790/">CVE-2009-0790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2388/">CVE-2012-2388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2944/">CVE-2013-2944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5018/">CVE-2013-5018</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6075/">CVE-2013-6075</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6076/">CVE-2013-6076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2338/">CVE-2014-2338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9221/">CVE-2014-9221</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4171/">CVE-2015-4171</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110995" comment="strongswan-5.1.3-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110997" comment="strongswan-doc-5.1.3-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110999" comment="strongswan-ipsec-5.1.3-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111000" comment="strongswan-libs0-5.1.3-18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76141" version="1" class="patch">
	<metadata>
		<title>sudo-1.8.10p3-1.62 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-1163" ref_url="https://www.suse.com/security/cve/CVE-2010-1163/" source="CVE"/>
		<reference ref_id="CVE-2010-1646" ref_url="https://www.suse.com/security/cve/CVE-2010-1646/" source="CVE"/>
		<reference ref_id="CVE-2011-0010" ref_url="https://www.suse.com/security/cve/CVE-2011-0010/" source="CVE"/>
		<reference ref_id="CVE-2012-2337" ref_url="https://www.suse.com/security/cve/CVE-2012-2337/" source="CVE"/>
		<reference ref_id="CVE-2013-1775" ref_url="https://www.suse.com/security/cve/CVE-2013-1775/" source="CVE"/>
		<reference ref_id="CVE-2013-1776" ref_url="https://www.suse.com/security/cve/CVE-2013-1776/" source="CVE"/>
		<description>
These are all security issues fixed in the sudo-1.8.10p3-1.62 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1163/">CVE-2010-1163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1646/">CVE-2010-1646</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0010/">CVE-2011-0010</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2337/">CVE-2012-2337</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1775/">CVE-2013-1775</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-1776/">CVE-2013-1776</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141810" comment="sudo-1.8.10p3-1.62 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76142" version="1" class="patch">
	<metadata>
		<title>sysconfig-0.83.8-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-4182" ref_url="https://www.suse.com/security/cve/CVE-2011-4182/" source="CVE"/>
		<description>
These are all security issues fixed in the sysconfig-0.83.8-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4182/">CVE-2011-4182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142060" comment="sysconfig-0.83.8-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142061" comment="sysconfig-netconfig-0.83.8-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76143" version="1" class="patch">
	<metadata>
		<title>syslog-service-2.0-778.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-3634" ref_url="https://www.suse.com/security/cve/CVE-2014-3634/" source="CVE"/>
		<description>
These are all security issues fixed in the syslog-service-2.0-778.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3634/">CVE-2014-3634</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141134" comment="syslog-service-2.0-778.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76144" version="1" class="patch">
	<metadata>
		<title>sysvinit-tools-2.88+-94.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<description>
These are all security issues fixed in the sysvinit-tools-2.88+-94.13 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141813" comment="sysvinit-tools-2.88+-94.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141139" comment="whois-5.1.1-1.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76145" version="1" class="patch">
	<metadata>
		<title>tar-1.27.1-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-0624" ref_url="https://www.suse.com/security/cve/CVE-2010-0624/" source="CVE"/>
		<description>
These are all security issues fixed in the tar-1.27.1-4.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0624/">CVE-2010-0624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009139103" comment="tar-1.27.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009139104" comment="tar-lang-1.27.1-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76146" version="1" class="patch">
	<metadata>
		<title>tcpdump-4.5.1-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-8767" ref_url="https://www.suse.com/security/cve/CVE-2014-8767/" source="CVE"/>
		<reference ref_id="CVE-2014-8768" ref_url="https://www.suse.com/security/cve/CVE-2014-8768/" source="CVE"/>
		<reference ref_id="CVE-2014-8769" ref_url="https://www.suse.com/security/cve/CVE-2014-8769/" source="CVE"/>
		<reference ref_id="CVE-2014-9140" ref_url="https://www.suse.com/security/cve/CVE-2014-9140/" source="CVE"/>
		<reference ref_id="CVE-2015-0261" ref_url="https://www.suse.com/security/cve/CVE-2015-0261/" source="CVE"/>
		<reference ref_id="CVE-2015-2153" ref_url="https://www.suse.com/security/cve/CVE-2015-2153/" source="CVE"/>
		<reference ref_id="CVE-2015-2154" ref_url="https://www.suse.com/security/cve/CVE-2015-2154/" source="CVE"/>
		<reference ref_id="CVE-2015-2155" ref_url="https://www.suse.com/security/cve/CVE-2015-2155/" source="CVE"/>
		<description>
These are all security issues fixed in the tcpdump-4.5.1-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8767/">CVE-2014-8767</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8768/">CVE-2014-8768</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8769/">CVE-2014-8769</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9140/">CVE-2014-9140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0261/">CVE-2015-0261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2153/">CVE-2015-2153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2154/">CVE-2015-2154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2155/">CVE-2015-2155</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108642" comment="tcpdump-4.5.1-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76147" version="1" class="patch">
	<metadata>
		<title>telepathy-gabble-0.18.1-3.268 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-1000" ref_url="https://www.suse.com/security/cve/CVE-2011-1000/" source="CVE"/>
		<reference ref_id="CVE-2013-1431" ref_url="https://www.suse.com/security/cve/CVE-2013-1431/" source="CVE"/>
		<description>
These are all security issues fixed in the telepathy-gabble-0.18.1-3.268 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1000/">CVE-2011-1000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1431/">CVE-2013-1431</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141814" comment="telepathy-gabble-0.18.1-3.268 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76148" version="1" class="patch">
	<metadata>
		<title>telepathy-idle-0.2.0-1.62 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-6746" ref_url="https://www.suse.com/security/cve/CVE-2007-6746/" source="CVE"/>
		<description>
These are all security issues fixed in the telepathy-idle-0.2.0-1.62 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6746/">CVE-2007-6746</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141815" comment="telepathy-idle-0.2.0-1.62 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76149" version="1" class="patch">
	<metadata>
		<title>tftp-5.2-10.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-2199" ref_url="https://www.suse.com/security/cve/CVE-2011-2199/" source="CVE"/>
		<description>
These are all security issues fixed in the tftp-5.2-10.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2199/">CVE-2011-2199</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141141" comment="tftp-5.2-10.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76150" version="1" class="patch">
	<metadata>
		<title>tigervnc-1.4.3-7.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-0011" ref_url="https://www.suse.com/security/cve/CVE-2014-0011/" source="CVE"/>
		<reference ref_id="CVE-2014-8240" ref_url="https://www.suse.com/security/cve/CVE-2014-8240/" source="CVE"/>
		<reference ref_id="CVE-2015-0255" ref_url="https://www.suse.com/security/cve/CVE-2015-0255/" source="CVE"/>
		<description>
These are all security issues fixed in the tigervnc-1.4.3-7.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0011/">CVE-2014-0011</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8240/">CVE-2014-8240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0255/">CVE-2015-0255</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142062" comment="tigervnc-1.4.3-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142063" comment="xorg-x11-Xvnc-1.4.3-7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76151" version="1" class="patch">
	<metadata>
		<title>unixODBC-2.3.1-4.95 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-1145" ref_url="https://www.suse.com/security/cve/CVE-2011-1145/" source="CVE"/>
		<description>
These are all security issues fixed in the unixODBC-2.3.1-4.95 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1145/">CVE-2011-1145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141819" comment="unixODBC-2.3.1-4.95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141820" comment="unixODBC-32bit-2.3.1-4.95 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76152" version="1" class="patch">
	<metadata>
		<title>unzip-6.00-32.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-8139" ref_url="https://www.suse.com/security/cve/CVE-2014-8139/" source="CVE"/>
		<reference ref_id="CVE-2014-8140" ref_url="https://www.suse.com/security/cve/CVE-2014-8140/" source="CVE"/>
		<reference ref_id="CVE-2014-8141" ref_url="https://www.suse.com/security/cve/CVE-2014-8141/" source="CVE"/>
		<reference ref_id="CVE-2014-9636" ref_url="https://www.suse.com/security/cve/CVE-2014-9636/" source="CVE"/>
		<description>
These are all security issues fixed in the unzip-6.00-32.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8139/">CVE-2014-8139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8140/">CVE-2014-8140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8141/">CVE-2014-8141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9636/">CVE-2014-9636</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106381" comment="unzip-6.00-32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76153" version="1" class="patch">
	<metadata>
		<title>vino-3.10.1-1.86 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-0904" ref_url="https://www.suse.com/security/cve/CVE-2011-0904/" source="CVE"/>
		<reference ref_id="CVE-2011-0905" ref_url="https://www.suse.com/security/cve/CVE-2011-0905/" source="CVE"/>
		<reference ref_id="CVE-2011-1164" ref_url="https://www.suse.com/security/cve/CVE-2011-1164/" source="CVE"/>
		<description>
These are all security issues fixed in the vino-3.10.1-1.86 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0904/">CVE-2011-0904</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-0905/">CVE-2011-0905</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1164/">CVE-2011-1164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141821" comment="vino-3.10.1-1.86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141822" comment="vino-lang-3.10.1-1.86 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76154" version="1" class="patch">
	<metadata>
		<title>vorbis-tools-1.4.0-26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-1686" ref_url="https://www.suse.com/security/cve/CVE-2008-1686/" source="CVE"/>
		<reference ref_id="CVE-2014-9638" ref_url="https://www.suse.com/security/cve/CVE-2014-9638/" source="CVE"/>
		<reference ref_id="CVE-2014-9639" ref_url="https://www.suse.com/security/cve/CVE-2014-9639/" source="CVE"/>
		<reference ref_id="CVE-2014-9640" ref_url="https://www.suse.com/security/cve/CVE-2014-9640/" source="CVE"/>
		<reference ref_id="CVE-2015-6749" ref_url="https://www.suse.com/security/cve/CVE-2015-6749/" source="CVE"/>
		<description>
These are all security issues fixed in the vorbis-tools-1.4.0-26.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1686/">CVE-2008-1686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9638/">CVE-2014-9638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9639/">CVE-2014-9639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9640/">CVE-2014-9640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6749/">CVE-2015-6749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009115051" comment="vorbis-tools-1.4.0-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115052" comment="vorbis-tools-lang-1.4.0-26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76155" version="1" class="patch">
	<metadata>
		<title>w3m-0.5.3-153.145 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-2074" ref_url="https://www.suse.com/security/cve/CVE-2010-2074/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<description>
These are all security issues fixed in the w3m-0.5.3-153.145 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2074/">CVE-2010-2074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141825" comment="w3m-0.5.3-153.145 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76156" version="1" class="patch">
	<metadata>
		<title>wdiff-1.2.1-3.64 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<description>
These are all security issues fixed in the wdiff-1.2.1-3.64 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140672" comment="wdiff-1.2.1-3.64 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76157" version="1" class="patch">
	<metadata>
		<title>wget-1.14-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-2252" ref_url="https://www.suse.com/security/cve/CVE-2010-2252/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2014-4877" ref_url="https://www.suse.com/security/cve/CVE-2014-4877/" source="CVE"/>
		<description>
These are all security issues fixed in the wget-1.14-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2252/">CVE-2010-2252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4877/">CVE-2014-4877</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102008" comment="wget-1.14-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76158" version="1" class="patch">
	<metadata>
		<title>wireshark-1.12.7-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-1210" ref_url="https://www.suse.com/security/cve/CVE-2009-1210/" source="CVE"/>
		<reference ref_id="CVE-2009-1267" ref_url="https://www.suse.com/security/cve/CVE-2009-1267/" source="CVE"/>
		<reference ref_id="CVE-2009-1268" ref_url="https://www.suse.com/security/cve/CVE-2009-1268/" source="CVE"/>
		<reference ref_id="CVE-2009-1269" ref_url="https://www.suse.com/security/cve/CVE-2009-1269/" source="CVE"/>
		<reference ref_id="CVE-2009-3241" ref_url="https://www.suse.com/security/cve/CVE-2009-3241/" source="CVE"/>
		<reference ref_id="CVE-2009-3242" ref_url="https://www.suse.com/security/cve/CVE-2009-3242/" source="CVE"/>
		<reference ref_id="CVE-2009-3243" ref_url="https://www.suse.com/security/cve/CVE-2009-3243/" source="CVE"/>
		<reference ref_id="CVE-2010-1455" ref_url="https://www.suse.com/security/cve/CVE-2010-1455/" source="CVE"/>
		<reference ref_id="CVE-2010-2993" ref_url="https://www.suse.com/security/cve/CVE-2010-2993/" source="CVE"/>
		<reference ref_id="CVE-2010-3445" ref_url="https://www.suse.com/security/cve/CVE-2010-3445/" source="CVE"/>
		<reference ref_id="CVE-2010-4300" ref_url="https://www.suse.com/security/cve/CVE-2010-4300/" source="CVE"/>
		<reference ref_id="CVE-2010-4301" ref_url="https://www.suse.com/security/cve/CVE-2010-4301/" source="CVE"/>
		<reference ref_id="CVE-2010-4538" ref_url="https://www.suse.com/security/cve/CVE-2010-4538/" source="CVE"/>
		<reference ref_id="CVE-2011-0024" ref_url="https://www.suse.com/security/cve/CVE-2011-0024/" source="CVE"/>
		<reference ref_id="CVE-2011-0538" ref_url="https://www.suse.com/security/cve/CVE-2011-0538/" source="CVE"/>
		<reference ref_id="CVE-2011-0713" ref_url="https://www.suse.com/security/cve/CVE-2011-0713/" source="CVE"/>
		<reference ref_id="CVE-2011-1138" ref_url="https://www.suse.com/security/cve/CVE-2011-1138/" source="CVE"/>
		<reference ref_id="CVE-2011-1139" ref_url="https://www.suse.com/security/cve/CVE-2011-1139/" source="CVE"/>
		<reference ref_id="CVE-2011-1140" ref_url="https://www.suse.com/security/cve/CVE-2011-1140/" source="CVE"/>
		<reference ref_id="CVE-2011-1143" ref_url="https://www.suse.com/security/cve/CVE-2011-1143/" source="CVE"/>
		<reference ref_id="CVE-2011-1590" ref_url="https://www.suse.com/security/cve/CVE-2011-1590/" source="CVE"/>
		<reference ref_id="CVE-2011-1591" ref_url="https://www.suse.com/security/cve/CVE-2011-1591/" source="CVE"/>
		<reference ref_id="CVE-2011-1592" ref_url="https://www.suse.com/security/cve/CVE-2011-1592/" source="CVE"/>
		<reference ref_id="CVE-2011-1957" ref_url="https://www.suse.com/security/cve/CVE-2011-1957/" source="CVE"/>
		<reference ref_id="CVE-2011-1958" ref_url="https://www.suse.com/security/cve/CVE-2011-1958/" source="CVE"/>
		<reference ref_id="CVE-2011-1959" ref_url="https://www.suse.com/security/cve/CVE-2011-1959/" source="CVE"/>
		<reference ref_id="CVE-2011-2174" ref_url="https://www.suse.com/security/cve/CVE-2011-2174/" source="CVE"/>
		<reference ref_id="CVE-2011-2175" ref_url="https://www.suse.com/security/cve/CVE-2011-2175/" source="CVE"/>
		<reference ref_id="CVE-2011-2597" ref_url="https://www.suse.com/security/cve/CVE-2011-2597/" source="CVE"/>
		<reference ref_id="CVE-2011-2698" ref_url="https://www.suse.com/security/cve/CVE-2011-2698/" source="CVE"/>
		<reference ref_id="CVE-2011-3266" ref_url="https://www.suse.com/security/cve/CVE-2011-3266/" source="CVE"/>
		<reference ref_id="CVE-2011-3360" ref_url="https://www.suse.com/security/cve/CVE-2011-3360/" source="CVE"/>
		<reference ref_id="CVE-2011-3483" ref_url="https://www.suse.com/security/cve/CVE-2011-3483/" source="CVE"/>
		<reference ref_id="CVE-2012-2392" ref_url="https://www.suse.com/security/cve/CVE-2012-2392/" source="CVE"/>
		<reference ref_id="CVE-2012-2393" ref_url="https://www.suse.com/security/cve/CVE-2012-2393/" source="CVE"/>
		<reference ref_id="CVE-2012-2394" ref_url="https://www.suse.com/security/cve/CVE-2012-2394/" source="CVE"/>
		<reference ref_id="CVE-2012-3548" ref_url="https://www.suse.com/security/cve/CVE-2012-3548/" source="CVE"/>
		<reference ref_id="CVE-2012-4048" ref_url="https://www.suse.com/security/cve/CVE-2012-4048/" source="CVE"/>
		<reference ref_id="CVE-2012-4049" ref_url="https://www.suse.com/security/cve/CVE-2012-4049/" source="CVE"/>
		<reference ref_id="CVE-2012-4285" ref_url="https://www.suse.com/security/cve/CVE-2012-4285/" source="CVE"/>
		<reference ref_id="CVE-2012-4286" ref_url="https://www.suse.com/security/cve/CVE-2012-4286/" source="CVE"/>
		<reference ref_id="CVE-2012-4287" ref_url="https://www.suse.com/security/cve/CVE-2012-4287/" source="CVE"/>
		<reference ref_id="CVE-2012-4288" ref_url="https://www.suse.com/security/cve/CVE-2012-4288/" source="CVE"/>
		<reference ref_id="CVE-2012-4289" ref_url="https://www.suse.com/security/cve/CVE-2012-4289/" source="CVE"/>
		<reference ref_id="CVE-2012-4290" ref_url="https://www.suse.com/security/cve/CVE-2012-4290/" source="CVE"/>
		<reference ref_id="CVE-2012-4291" ref_url="https://www.suse.com/security/cve/CVE-2012-4291/" source="CVE"/>
		<reference ref_id="CVE-2012-4292" ref_url="https://www.suse.com/security/cve/CVE-2012-4292/" source="CVE"/>
		<reference ref_id="CVE-2012-4293" ref_url="https://www.suse.com/security/cve/CVE-2012-4293/" source="CVE"/>
		<reference ref_id="CVE-2012-4294" ref_url="https://www.suse.com/security/cve/CVE-2012-4294/" source="CVE"/>
		<reference ref_id="CVE-2012-4295" ref_url="https://www.suse.com/security/cve/CVE-2012-4295/" source="CVE"/>
		<reference ref_id="CVE-2012-4296" ref_url="https://www.suse.com/security/cve/CVE-2012-4296/" source="CVE"/>
		<reference ref_id="CVE-2012-4297" ref_url="https://www.suse.com/security/cve/CVE-2012-4297/" source="CVE"/>
		<reference ref_id="CVE-2012-4298" ref_url="https://www.suse.com/security/cve/CVE-2012-4298/" source="CVE"/>
		<reference ref_id="CVE-2012-5237" ref_url="https://www.suse.com/security/cve/CVE-2012-5237/" source="CVE"/>
		<reference ref_id="CVE-2012-5238" ref_url="https://www.suse.com/security/cve/CVE-2012-5238/" source="CVE"/>
		<reference ref_id="CVE-2012-5239" ref_url="https://www.suse.com/security/cve/CVE-2012-5239/" source="CVE"/>
		<reference ref_id="CVE-2012-5240" ref_url="https://www.suse.com/security/cve/CVE-2012-5240/" source="CVE"/>
		<reference ref_id="CVE-2012-5592" ref_url="https://www.suse.com/security/cve/CVE-2012-5592/" source="CVE"/>
		<reference ref_id="CVE-2012-5593" ref_url="https://www.suse.com/security/cve/CVE-2012-5593/" source="CVE"/>
		<reference ref_id="CVE-2012-5594" ref_url="https://www.suse.com/security/cve/CVE-2012-5594/" source="CVE"/>
		<reference ref_id="CVE-2012-5595" ref_url="https://www.suse.com/security/cve/CVE-2012-5595/" source="CVE"/>
		<reference ref_id="CVE-2012-5596" ref_url="https://www.suse.com/security/cve/CVE-2012-5596/" source="CVE"/>
		<reference ref_id="CVE-2012-5597" ref_url="https://www.suse.com/security/cve/CVE-2012-5597/" source="CVE"/>
		<reference ref_id="CVE-2012-5598" ref_url="https://www.suse.com/security/cve/CVE-2012-5598/" source="CVE"/>
		<reference ref_id="CVE-2012-5599" ref_url="https://www.suse.com/security/cve/CVE-2012-5599/" source="CVE"/>
		<reference ref_id="CVE-2012-5600" ref_url="https://www.suse.com/security/cve/CVE-2012-5600/" source="CVE"/>
		<reference ref_id="CVE-2012-5601" ref_url="https://www.suse.com/security/cve/CVE-2012-5601/" source="CVE"/>
		<reference ref_id="CVE-2012-5602" ref_url="https://www.suse.com/security/cve/CVE-2012-5602/" source="CVE"/>
		<reference ref_id="CVE-2013-1572" ref_url="https://www.suse.com/security/cve/CVE-2013-1572/" source="CVE"/>
		<reference ref_id="CVE-2013-1573" ref_url="https://www.suse.com/security/cve/CVE-2013-1573/" source="CVE"/>
		<reference ref_id="CVE-2013-1574" ref_url="https://www.suse.com/security/cve/CVE-2013-1574/" source="CVE"/>
		<reference ref_id="CVE-2013-1575" ref_url="https://www.suse.com/security/cve/CVE-2013-1575/" source="CVE"/>
		<reference ref_id="CVE-2013-1576" ref_url="https://www.suse.com/security/cve/CVE-2013-1576/" source="CVE"/>
		<reference ref_id="CVE-2013-1577" ref_url="https://www.suse.com/security/cve/CVE-2013-1577/" source="CVE"/>
		<reference ref_id="CVE-2013-1578" ref_url="https://www.suse.com/security/cve/CVE-2013-1578/" source="CVE"/>
		<reference ref_id="CVE-2013-1579" ref_url="https://www.suse.com/security/cve/CVE-2013-1579/" source="CVE"/>
		<reference ref_id="CVE-2013-1580" ref_url="https://www.suse.com/security/cve/CVE-2013-1580/" source="CVE"/>
		<reference ref_id="CVE-2013-1581" ref_url="https://www.suse.com/security/cve/CVE-2013-1581/" source="CVE"/>
		<reference ref_id="CVE-2013-1582" ref_url="https://www.suse.com/security/cve/CVE-2013-1582/" source="CVE"/>
		<reference ref_id="CVE-2013-1583" ref_url="https://www.suse.com/security/cve/CVE-2013-1583/" source="CVE"/>
		<reference ref_id="CVE-2013-1584" ref_url="https://www.suse.com/security/cve/CVE-2013-1584/" source="CVE"/>
		<reference ref_id="CVE-2013-1585" ref_url="https://www.suse.com/security/cve/CVE-2013-1585/" source="CVE"/>
		<reference ref_id="CVE-2013-1586" ref_url="https://www.suse.com/security/cve/CVE-2013-1586/" source="CVE"/>
		<reference ref_id="CVE-2013-1587" ref_url="https://www.suse.com/security/cve/CVE-2013-1587/" source="CVE"/>
		<reference ref_id="CVE-2013-1588" ref_url="https://www.suse.com/security/cve/CVE-2013-1588/" source="CVE"/>
		<reference ref_id="CVE-2013-1589" ref_url="https://www.suse.com/security/cve/CVE-2013-1589/" source="CVE"/>
		<reference ref_id="CVE-2013-1590" ref_url="https://www.suse.com/security/cve/CVE-2013-1590/" source="CVE"/>
		<reference ref_id="CVE-2013-2475" ref_url="https://www.suse.com/security/cve/CVE-2013-2475/" source="CVE"/>
		<reference ref_id="CVE-2013-2476" ref_url="https://www.suse.com/security/cve/CVE-2013-2476/" source="CVE"/>
		<reference ref_id="CVE-2013-2477" ref_url="https://www.suse.com/security/cve/CVE-2013-2477/" source="CVE"/>
		<reference ref_id="CVE-2013-2478" ref_url="https://www.suse.com/security/cve/CVE-2013-2478/" source="CVE"/>
		<reference ref_id="CVE-2013-2479" ref_url="https://www.suse.com/security/cve/CVE-2013-2479/" source="CVE"/>
		<reference ref_id="CVE-2013-2480" ref_url="https://www.suse.com/security/cve/CVE-2013-2480/" source="CVE"/>
		<reference ref_id="CVE-2013-2481" ref_url="https://www.suse.com/security/cve/CVE-2013-2481/" source="CVE"/>
		<reference ref_id="CVE-2013-2482" ref_url="https://www.suse.com/security/cve/CVE-2013-2482/" source="CVE"/>
		<reference ref_id="CVE-2013-2483" ref_url="https://www.suse.com/security/cve/CVE-2013-2483/" source="CVE"/>
		<reference ref_id="CVE-2013-2484" ref_url="https://www.suse.com/security/cve/CVE-2013-2484/" source="CVE"/>
		<reference ref_id="CVE-2013-2485" ref_url="https://www.suse.com/security/cve/CVE-2013-2485/" source="CVE"/>
		<reference ref_id="CVE-2013-2486" ref_url="https://www.suse.com/security/cve/CVE-2013-2486/" source="CVE"/>
		<reference ref_id="CVE-2013-2487" ref_url="https://www.suse.com/security/cve/CVE-2013-2487/" source="CVE"/>
		<reference ref_id="CVE-2013-2488" ref_url="https://www.suse.com/security/cve/CVE-2013-2488/" source="CVE"/>
		<reference ref_id="CVE-2013-3555" ref_url="https://www.suse.com/security/cve/CVE-2013-3555/" source="CVE"/>
		<reference ref_id="CVE-2013-3556" ref_url="https://www.suse.com/security/cve/CVE-2013-3556/" source="CVE"/>
		<reference ref_id="CVE-2013-3557" ref_url="https://www.suse.com/security/cve/CVE-2013-3557/" source="CVE"/>
		<reference ref_id="CVE-2013-3558" ref_url="https://www.suse.com/security/cve/CVE-2013-3558/" source="CVE"/>
		<reference ref_id="CVE-2013-3559" ref_url="https://www.suse.com/security/cve/CVE-2013-3559/" source="CVE"/>
		<reference ref_id="CVE-2013-3560" ref_url="https://www.suse.com/security/cve/CVE-2013-3560/" source="CVE"/>
		<reference ref_id="CVE-2013-3561" ref_url="https://www.suse.com/security/cve/CVE-2013-3561/" source="CVE"/>
		<reference ref_id="CVE-2013-3562" ref_url="https://www.suse.com/security/cve/CVE-2013-3562/" source="CVE"/>
		<reference ref_id="CVE-2013-4083" ref_url="https://www.suse.com/security/cve/CVE-2013-4083/" source="CVE"/>
		<reference ref_id="CVE-2013-4920" ref_url="https://www.suse.com/security/cve/CVE-2013-4920/" source="CVE"/>
		<reference ref_id="CVE-2013-4921" ref_url="https://www.suse.com/security/cve/CVE-2013-4921/" source="CVE"/>
		<reference ref_id="CVE-2013-4922" ref_url="https://www.suse.com/security/cve/CVE-2013-4922/" source="CVE"/>
		<reference ref_id="CVE-2013-4923" ref_url="https://www.suse.com/security/cve/CVE-2013-4923/" source="CVE"/>
		<reference ref_id="CVE-2013-4924" ref_url="https://www.suse.com/security/cve/CVE-2013-4924/" source="CVE"/>
		<reference ref_id="CVE-2013-4925" ref_url="https://www.suse.com/security/cve/CVE-2013-4925/" source="CVE"/>
		<reference ref_id="CVE-2013-4926" ref_url="https://www.suse.com/security/cve/CVE-2013-4926/" source="CVE"/>
		<reference ref_id="CVE-2013-4927" ref_url="https://www.suse.com/security/cve/CVE-2013-4927/" source="CVE"/>
		<reference ref_id="CVE-2013-4928" ref_url="https://www.suse.com/security/cve/CVE-2013-4928/" source="CVE"/>
		<reference ref_id="CVE-2013-4929" ref_url="https://www.suse.com/security/cve/CVE-2013-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-4930" ref_url="https://www.suse.com/security/cve/CVE-2013-4930/" source="CVE"/>
		<reference ref_id="CVE-2013-4931" ref_url="https://www.suse.com/security/cve/CVE-2013-4931/" source="CVE"/>
		<reference ref_id="CVE-2013-4932" ref_url="https://www.suse.com/security/cve/CVE-2013-4932/" source="CVE"/>
		<reference ref_id="CVE-2013-4933" ref_url="https://www.suse.com/security/cve/CVE-2013-4933/" source="CVE"/>
		<reference ref_id="CVE-2013-4934" ref_url="https://www.suse.com/security/cve/CVE-2013-4934/" source="CVE"/>
		<reference ref_id="CVE-2013-4935" ref_url="https://www.suse.com/security/cve/CVE-2013-4935/" source="CVE"/>
		<reference ref_id="CVE-2013-4936" ref_url="https://www.suse.com/security/cve/CVE-2013-4936/" source="CVE"/>
		<reference ref_id="CVE-2013-5717" ref_url="https://www.suse.com/security/cve/CVE-2013-5717/" source="CVE"/>
		<reference ref_id="CVE-2013-5718" ref_url="https://www.suse.com/security/cve/CVE-2013-5718/" source="CVE"/>
		<reference ref_id="CVE-2013-5719" ref_url="https://www.suse.com/security/cve/CVE-2013-5719/" source="CVE"/>
		<reference ref_id="CVE-2013-5720" ref_url="https://www.suse.com/security/cve/CVE-2013-5720/" source="CVE"/>
		<reference ref_id="CVE-2013-5721" ref_url="https://www.suse.com/security/cve/CVE-2013-5721/" source="CVE"/>
		<reference ref_id="CVE-2013-5722" ref_url="https://www.suse.com/security/cve/CVE-2013-5722/" source="CVE"/>
		<reference ref_id="CVE-2013-6336" ref_url="https://www.suse.com/security/cve/CVE-2013-6336/" source="CVE"/>
		<reference ref_id="CVE-2013-6337" ref_url="https://www.suse.com/security/cve/CVE-2013-6337/" source="CVE"/>
		<reference ref_id="CVE-2013-6338" ref_url="https://www.suse.com/security/cve/CVE-2013-6338/" source="CVE"/>
		<reference ref_id="CVE-2013-6339" ref_url="https://www.suse.com/security/cve/CVE-2013-6339/" source="CVE"/>
		<reference ref_id="CVE-2013-6340" ref_url="https://www.suse.com/security/cve/CVE-2013-6340/" source="CVE"/>
		<reference ref_id="CVE-2013-7112" ref_url="https://www.suse.com/security/cve/CVE-2013-7112/" source="CVE"/>
		<reference ref_id="CVE-2013-7113" ref_url="https://www.suse.com/security/cve/CVE-2013-7113/" source="CVE"/>
		<reference ref_id="CVE-2013-7114" ref_url="https://www.suse.com/security/cve/CVE-2013-7114/" source="CVE"/>
		<reference ref_id="CVE-2014-2281" ref_url="https://www.suse.com/security/cve/CVE-2014-2281/" source="CVE"/>
		<reference ref_id="CVE-2014-2282" ref_url="https://www.suse.com/security/cve/CVE-2014-2282/" source="CVE"/>
		<reference ref_id="CVE-2014-2283" ref_url="https://www.suse.com/security/cve/CVE-2014-2283/" source="CVE"/>
		<reference ref_id="CVE-2014-2299" ref_url="https://www.suse.com/security/cve/CVE-2014-2299/" source="CVE"/>
		<reference ref_id="CVE-2014-2907" ref_url="https://www.suse.com/security/cve/CVE-2014-2907/" source="CVE"/>
		<reference ref_id="CVE-2014-4020" ref_url="https://www.suse.com/security/cve/CVE-2014-4020/" source="CVE"/>
		<reference ref_id="CVE-2014-5161" ref_url="https://www.suse.com/security/cve/CVE-2014-5161/" source="CVE"/>
		<reference ref_id="CVE-2014-5162" ref_url="https://www.suse.com/security/cve/CVE-2014-5162/" source="CVE"/>
		<reference ref_id="CVE-2014-5163" ref_url="https://www.suse.com/security/cve/CVE-2014-5163/" source="CVE"/>
		<reference ref_id="CVE-2014-5164" ref_url="https://www.suse.com/security/cve/CVE-2014-5164/" source="CVE"/>
		<reference ref_id="CVE-2014-5165" ref_url="https://www.suse.com/security/cve/CVE-2014-5165/" source="CVE"/>
		<reference ref_id="CVE-2015-0559" ref_url="https://www.suse.com/security/cve/CVE-2015-0559/" source="CVE"/>
		<reference ref_id="CVE-2015-0560" ref_url="https://www.suse.com/security/cve/CVE-2015-0560/" source="CVE"/>
		<reference ref_id="CVE-2015-0561" ref_url="https://www.suse.com/security/cve/CVE-2015-0561/" source="CVE"/>
		<reference ref_id="CVE-2015-0562" ref_url="https://www.suse.com/security/cve/CVE-2015-0562/" source="CVE"/>
		<reference ref_id="CVE-2015-0563" ref_url="https://www.suse.com/security/cve/CVE-2015-0563/" source="CVE"/>
		<reference ref_id="CVE-2015-0564" ref_url="https://www.suse.com/security/cve/CVE-2015-0564/" source="CVE"/>
		<reference ref_id="CVE-2015-2188" ref_url="https://www.suse.com/security/cve/CVE-2015-2188/" source="CVE"/>
		<reference ref_id="CVE-2015-2189" ref_url="https://www.suse.com/security/cve/CVE-2015-2189/" source="CVE"/>
		<reference ref_id="CVE-2015-2191" ref_url="https://www.suse.com/security/cve/CVE-2015-2191/" source="CVE"/>
		<reference ref_id="CVE-2015-3811" ref_url="https://www.suse.com/security/cve/CVE-2015-3811/" source="CVE"/>
		<reference ref_id="CVE-2015-3812" ref_url="https://www.suse.com/security/cve/CVE-2015-3812/" source="CVE"/>
		<reference ref_id="CVE-2015-3813" ref_url="https://www.suse.com/security/cve/CVE-2015-3813/" source="CVE"/>
		<reference ref_id="CVE-2015-3814" ref_url="https://www.suse.com/security/cve/CVE-2015-3814/" source="CVE"/>
		<description>
These are all security issues fixed in the wireshark-1.12.7-15.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1210/">CVE-2009-1210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1267/">CVE-2009-1267</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1268/">CVE-2009-1268</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1269/">CVE-2009-1269</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3241/">CVE-2009-3241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3242/">CVE-2009-3242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3243/">CVE-2009-3243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1455/">CVE-2010-1455</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2993/">CVE-2010-2993</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3445/">CVE-2010-3445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4300/">CVE-2010-4300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4301/">CVE-2010-4301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4538/">CVE-2010-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0024/">CVE-2011-0024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0538/">CVE-2011-0538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0713/">CVE-2011-0713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1138/">CVE-2011-1138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1139/">CVE-2011-1139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1140/">CVE-2011-1140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1143/">CVE-2011-1143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1590/">CVE-2011-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1591/">CVE-2011-1591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1592/">CVE-2011-1592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1957/">CVE-2011-1957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1958/">CVE-2011-1958</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1959/">CVE-2011-1959</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2174/">CVE-2011-2174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2175/">CVE-2011-2175</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2597/">CVE-2011-2597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2698/">CVE-2011-2698</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3266/">CVE-2011-3266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3360/">CVE-2011-3360</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3483/">CVE-2011-3483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2392/">CVE-2012-2392</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2393/">CVE-2012-2393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2394/">CVE-2012-2394</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3548/">CVE-2012-3548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4048/">CVE-2012-4048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4049/">CVE-2012-4049</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4285/">CVE-2012-4285</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-4286/">CVE-2012-4286</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4287/">CVE-2012-4287</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4288/">CVE-2012-4288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4289/">CVE-2012-4289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4290/">CVE-2012-4290</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4291/">CVE-2012-4291</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4292/">CVE-2012-4292</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4293/">CVE-2012-4293</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4294/">CVE-2012-4294</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4295/">CVE-2012-4295</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4296/">CVE-2012-4296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4297/">CVE-2012-4297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4298/">CVE-2012-4298</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5237/">CVE-2012-5237</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5238/">CVE-2012-5238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5239/">CVE-2012-5239</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5240/">CVE-2012-5240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5592/">CVE-2012-5592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5593/">CVE-2012-5593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5594/">CVE-2012-5594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5595/">CVE-2012-5595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5596/">CVE-2012-5596</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5597/">CVE-2012-5597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5598/">CVE-2012-5598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5599/">CVE-2012-5599</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5600/">CVE-2012-5600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5601/">CVE-2012-5601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5602/">CVE-2012-5602</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1572/">CVE-2013-1572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1573/">CVE-2013-1573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1574/">CVE-2013-1574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1575/">CVE-2013-1575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1576/">CVE-2013-1576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1577/">CVE-2013-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1578/">CVE-2013-1578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1579/">CVE-2013-1579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1580/">CVE-2013-1580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1581/">CVE-2013-1581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1582/">CVE-2013-1582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1583/">CVE-2013-1583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1584/">CVE-2013-1584</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1585/">CVE-2013-1585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1586/">CVE-2013-1586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1587/">CVE-2013-1587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1588/">CVE-2013-1588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1589/">CVE-2013-1589</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1590/">CVE-2013-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2475/">CVE-2013-2475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2476/">CVE-2013-2476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2477/">CVE-2013-2477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2478/">CVE-2013-2478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2479/">CVE-2013-2479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2480/">CVE-2013-2480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2481/">CVE-2013-2481</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2482/">CVE-2013-2482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2483/">CVE-2013-2483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2484/">CVE-2013-2484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2485/">CVE-2013-2485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2486/">CVE-2013-2486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2487/">CVE-2013-2487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2488/">CVE-2013-2488</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3555/">CVE-2013-3555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3556/">CVE-2013-3556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3557/">CVE-2013-3557</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3558/">CVE-2013-3558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3559/">CVE-2013-3559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3560/">CVE-2013-3560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3561/">CVE-2013-3561</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3562/">CVE-2013-3562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4083/">CVE-2013-4083</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4920/">CVE-2013-4920</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4921/">CVE-2013-4921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4922/">CVE-2013-4922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4923/">CVE-2013-4923</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4924/">CVE-2013-4924</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4925/">CVE-2013-4925</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4926/">CVE-2013-4926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4927/">CVE-2013-4927</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4928/">CVE-2013-4928</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4929/">CVE-2013-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4930/">CVE-2013-4930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4931/">CVE-2013-4931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4932/">CVE-2013-4932</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4933/">CVE-2013-4933</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4934/">CVE-2013-4934</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4935/">CVE-2013-4935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4936/">CVE-2013-4936</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5717/">CVE-2013-5717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5718/">CVE-2013-5718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5719/">CVE-2013-5719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5720/">CVE-2013-5720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5721/">CVE-2013-5721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5722/">CVE-2013-5722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6336/">CVE-2013-6336</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6337/">CVE-2013-6337</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6338/">CVE-2013-6338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6339/">CVE-2013-6339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6340/">CVE-2013-6340</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7112/">CVE-2013-7112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7113/">CVE-2013-7113</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7114/">CVE-2013-7114</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2281/">CVE-2014-2281</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2282/">CVE-2014-2282</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2283/">CVE-2014-2283</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2299/">CVE-2014-2299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2907/">CVE-2014-2907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4020/">CVE-2014-4020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5161/">CVE-2014-5161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5162/">CVE-2014-5162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5163/">CVE-2014-5163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5164/">CVE-2014-5164</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5165/">CVE-2014-5165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0559/">CVE-2015-0559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0560/">CVE-2015-0560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0561/">CVE-2015-0561</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0562/">CVE-2015-0562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0563/">CVE-2015-0563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0564/">CVE-2015-0564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2188/">CVE-2015-2188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2189/">CVE-2015-2189</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2191/">CVE-2015-2191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3811/">CVE-2015-3811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3812/">CVE-2015-3812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3813/">CVE-2015-3813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3814/">CVE-2015-3814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114951" comment="wireshark-1.12.7-15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76159" version="1" class="patch">
	<metadata>
		<title>wpa_supplicant-2.2-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-3686" ref_url="https://www.suse.com/security/cve/CVE-2014-3686/" source="CVE"/>
		<reference ref_id="CVE-2015-0210" ref_url="https://www.suse.com/security/cve/CVE-2015-0210/" source="CVE"/>
		<reference ref_id="CVE-2015-1863" ref_url="https://www.suse.com/security/cve/CVE-2015-1863/" source="CVE"/>
		<description>
These are all security issues fixed in the wpa_supplicant-2.2-8.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3686/">CVE-2014-3686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0210/">CVE-2015-0210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1863/">CVE-2015-1863</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110201" comment="wpa_supplicant-2.2-8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76160" version="1" class="patch">
	<metadata>
		<title>xalan-j2-2.7.0-264.133 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-0107" ref_url="https://www.suse.com/security/cve/CVE-2014-0107/" source="CVE"/>
		<description>
These are all security issues fixed in the xalan-j2-2.7.0-264.133 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0107/">CVE-2014-0107</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141828" comment="xalan-j2-2.7.0-264.133 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76161" version="1" class="patch">
	<metadata>
		<title>xdg-utils-20140630-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-9622" ref_url="https://www.suse.com/security/cve/CVE-2014-9622/" source="CVE"/>
		<description>
These are all security issues fixed in the xdg-utils-20140630-5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9622/">CVE-2014-9622</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106065" comment="xdg-utils-20140630-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76162" version="1" class="patch">
	<metadata>
		<title>xen-4.5.1_12-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-1898" ref_url="https://www.suse.com/security/cve/CVE-2011-1898/" source="CVE"/>
		<reference ref_id="CVE-2012-0029" ref_url="https://www.suse.com/security/cve/CVE-2012-0029/" source="CVE"/>
		<reference ref_id="CVE-2012-0217" ref_url="https://www.suse.com/security/cve/CVE-2012-0217/" source="CVE"/>
		<reference ref_id="CVE-2012-2625" ref_url="https://www.suse.com/security/cve/CVE-2012-2625/" source="CVE"/>
		<reference ref_id="CVE-2012-3432" ref_url="https://www.suse.com/security/cve/CVE-2012-3432/" source="CVE"/>
		<reference ref_id="CVE-2012-3433" ref_url="https://www.suse.com/security/cve/CVE-2012-3433/" source="CVE"/>
		<reference ref_id="CVE-2012-4411" ref_url="https://www.suse.com/security/cve/CVE-2012-4411/" source="CVE"/>
		<reference ref_id="CVE-2012-4535" ref_url="https://www.suse.com/security/cve/CVE-2012-4535/" source="CVE"/>
		<reference ref_id="CVE-2012-4536" ref_url="https://www.suse.com/security/cve/CVE-2012-4536/" source="CVE"/>
		<reference ref_id="CVE-2012-4537" ref_url="https://www.suse.com/security/cve/CVE-2012-4537/" source="CVE"/>
		<reference ref_id="CVE-2012-4538" ref_url="https://www.suse.com/security/cve/CVE-2012-4538/" source="CVE"/>
		<reference ref_id="CVE-2012-4539" ref_url="https://www.suse.com/security/cve/CVE-2012-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-4544" ref_url="https://www.suse.com/security/cve/CVE-2012-4544/" source="CVE"/>
		<reference ref_id="CVE-2012-5510" ref_url="https://www.suse.com/security/cve/CVE-2012-5510/" source="CVE"/>
		<reference ref_id="CVE-2012-5511" ref_url="https://www.suse.com/security/cve/CVE-2012-5511/" source="CVE"/>
		<reference ref_id="CVE-2012-5513" ref_url="https://www.suse.com/security/cve/CVE-2012-5513/" source="CVE"/>
		<reference ref_id="CVE-2012-5514" ref_url="https://www.suse.com/security/cve/CVE-2012-5514/" source="CVE"/>
		<reference ref_id="CVE-2012-5515" ref_url="https://www.suse.com/security/cve/CVE-2012-5515/" source="CVE"/>
		<reference ref_id="CVE-2012-5525" ref_url="https://www.suse.com/security/cve/CVE-2012-5525/" source="CVE"/>
		<reference ref_id="CVE-2012-5634" ref_url="https://www.suse.com/security/cve/CVE-2012-5634/" source="CVE"/>
		<reference ref_id="CVE-2012-6075" ref_url="https://www.suse.com/security/cve/CVE-2012-6075/" source="CVE"/>
		<reference ref_id="CVE-2013-0151" ref_url="https://www.suse.com/security/cve/CVE-2013-0151/" source="CVE"/>
		<reference ref_id="CVE-2013-0152" ref_url="https://www.suse.com/security/cve/CVE-2013-0152/" source="CVE"/>
		<reference ref_id="CVE-2013-0153" ref_url="https://www.suse.com/security/cve/CVE-2013-0153/" source="CVE"/>
		<reference ref_id="CVE-2013-1442" ref_url="https://www.suse.com/security/cve/CVE-2013-1442/" source="CVE"/>
		<reference ref_id="CVE-2013-1917" ref_url="https://www.suse.com/security/cve/CVE-2013-1917/" source="CVE"/>
		<reference ref_id="CVE-2013-1918" ref_url="https://www.suse.com/security/cve/CVE-2013-1918/" source="CVE"/>
		<reference ref_id="CVE-2013-1919" ref_url="https://www.suse.com/security/cve/CVE-2013-1919/" source="CVE"/>
		<reference ref_id="CVE-2013-1922" ref_url="https://www.suse.com/security/cve/CVE-2013-1922/" source="CVE"/>
		<reference ref_id="CVE-2013-1952" ref_url="https://www.suse.com/security/cve/CVE-2013-1952/" source="CVE"/>
		<reference ref_id="CVE-2013-2007" ref_url="https://www.suse.com/security/cve/CVE-2013-2007/" source="CVE"/>
		<reference ref_id="CVE-2013-3495" ref_url="https://www.suse.com/security/cve/CVE-2013-3495/" source="CVE"/>
		<reference ref_id="CVE-2013-4355" ref_url="https://www.suse.com/security/cve/CVE-2013-4355/" source="CVE"/>
		<reference ref_id="CVE-2013-4356" ref_url="https://www.suse.com/security/cve/CVE-2013-4356/" source="CVE"/>
		<reference ref_id="CVE-2013-4361" ref_url="https://www.suse.com/security/cve/CVE-2013-4361/" source="CVE"/>
		<reference ref_id="CVE-2013-4375" ref_url="https://www.suse.com/security/cve/CVE-2013-4375/" source="CVE"/>
		<reference ref_id="CVE-2013-4416" ref_url="https://www.suse.com/security/cve/CVE-2013-4416/" source="CVE"/>
		<reference ref_id="CVE-2013-4494" ref_url="https://www.suse.com/security/cve/CVE-2013-4494/" source="CVE"/>
		<reference ref_id="CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540/" source="CVE"/>
		<reference ref_id="CVE-2013-4551" ref_url="https://www.suse.com/security/cve/CVE-2013-4551/" source="CVE"/>
		<reference ref_id="CVE-2013-4553" ref_url="https://www.suse.com/security/cve/CVE-2013-4553/" source="CVE"/>
		<reference ref_id="CVE-2013-4554" ref_url="https://www.suse.com/security/cve/CVE-2013-4554/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-3124" ref_url="https://www.suse.com/security/cve/CVE-2014-3124/" source="CVE"/>
		<reference ref_id="CVE-2014-3615" ref_url="https://www.suse.com/security/cve/CVE-2014-3615/" source="CVE"/>
		<reference ref_id="CVE-2014-5146" ref_url="https://www.suse.com/security/cve/CVE-2014-5146/" source="CVE"/>
		<reference ref_id="CVE-2014-5149" ref_url="https://www.suse.com/security/cve/CVE-2014-5149/" source="CVE"/>
		<reference ref_id="CVE-2014-6268" ref_url="https://www.suse.com/security/cve/CVE-2014-6268/" source="CVE"/>
		<reference ref_id="CVE-2014-7154" ref_url="https://www.suse.com/security/cve/CVE-2014-7154/" source="CVE"/>
		<reference ref_id="CVE-2014-7155" ref_url="https://www.suse.com/security/cve/CVE-2014-7155/" source="CVE"/>
		<reference ref_id="CVE-2014-7156" ref_url="https://www.suse.com/security/cve/CVE-2014-7156/" source="CVE"/>
		<reference ref_id="CVE-2014-7188" ref_url="https://www.suse.com/security/cve/CVE-2014-7188/" source="CVE"/>
		<reference ref_id="CVE-2014-8594" ref_url="https://www.suse.com/security/cve/CVE-2014-8594/" source="CVE"/>
		<reference ref_id="CVE-2014-8595" ref_url="https://www.suse.com/security/cve/CVE-2014-8595/" source="CVE"/>
		<reference ref_id="CVE-2014-8866" ref_url="https://www.suse.com/security/cve/CVE-2014-8866/" source="CVE"/>
		<reference ref_id="CVE-2014-8867" ref_url="https://www.suse.com/security/cve/CVE-2014-8867/" source="CVE"/>
		<reference ref_id="CVE-2014-9030" ref_url="https://www.suse.com/security/cve/CVE-2014-9030/" source="CVE"/>
		<reference ref_id="CVE-2014-9065" ref_url="https://www.suse.com/security/cve/CVE-2014-9065/" source="CVE"/>
		<reference ref_id="CVE-2014-9066" ref_url="https://www.suse.com/security/cve/CVE-2014-9066/" source="CVE"/>
		<reference ref_id="CVE-2015-0361" ref_url="https://www.suse.com/security/cve/CVE-2015-0361/" source="CVE"/>
		<reference ref_id="CVE-2015-2044" ref_url="https://www.suse.com/security/cve/CVE-2015-2044/" source="CVE"/>
		<reference ref_id="CVE-2015-2045" ref_url="https://www.suse.com/security/cve/CVE-2015-2045/" source="CVE"/>
		<reference ref_id="CVE-2015-2151" ref_url="https://www.suse.com/security/cve/CVE-2015-2151/" source="CVE"/>
		<reference ref_id="CVE-2015-2152" ref_url="https://www.suse.com/security/cve/CVE-2015-2152/" source="CVE"/>
		<reference ref_id="CVE-2015-2751" ref_url="https://www.suse.com/security/cve/CVE-2015-2751/" source="CVE"/>
		<reference ref_id="CVE-2015-2752" ref_url="https://www.suse.com/security/cve/CVE-2015-2752/" source="CVE"/>
		<reference ref_id="CVE-2015-2756" ref_url="https://www.suse.com/security/cve/CVE-2015-2756/" source="CVE"/>
		<reference ref_id="CVE-2015-3259" ref_url="https://www.suse.com/security/cve/CVE-2015-3259/" source="CVE"/>
		<reference ref_id="CVE-2015-3340" ref_url="https://www.suse.com/security/cve/CVE-2015-3340/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-4103" ref_url="https://www.suse.com/security/cve/CVE-2015-4103/" source="CVE"/>
		<reference ref_id="CVE-2015-4104" ref_url="https://www.suse.com/security/cve/CVE-2015-4104/" source="CVE"/>
		<reference ref_id="CVE-2015-4105" ref_url="https://www.suse.com/security/cve/CVE-2015-4105/" source="CVE"/>
		<reference ref_id="CVE-2015-4106" ref_url="https://www.suse.com/security/cve/CVE-2015-4106/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.5.1_12-2.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1898/">CVE-2011-1898</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0029/">CVE-2012-0029</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0217/">CVE-2012-0217</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2625/">CVE-2012-2625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3432/">CVE-2012-3432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3433/">CVE-2012-3433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4411/">CVE-2012-4411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4535/">CVE-2012-4535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4536/">CVE-2012-4536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4537/">CVE-2012-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4538/">CVE-2012-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4539/">CVE-2012-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4544/">CVE-2012-4544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5510/">CVE-2012-5510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5511/">CVE-2012-5511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5513/">CVE-2012-5513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5514/">CVE-2012-5514</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5515/">CVE-2012-5515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5525/">CVE-2012-5525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5634/">CVE-2012-5634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6075/">CVE-2012-6075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0151/">CVE-2013-0151</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0152/">CVE-2013-0152</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0153/">CVE-2013-0153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1442/">CVE-2013-1442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1917/">CVE-2013-1917</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1918/">CVE-2013-1918</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1919/">CVE-2013-1919</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1922/">CVE-2013-1922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1952/">CVE-2013-1952</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2007/">CVE-2013-2007</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3495/">CVE-2013-3495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4355/">CVE-2013-4355</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4356/">CVE-2013-4356</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4361/">CVE-2013-4361</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4375/">CVE-2013-4375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4416/">CVE-2013-4416</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4494/">CVE-2013-4494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4551/">CVE-2013-4551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4553/">CVE-2013-4553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4554/">CVE-2013-4554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3124/">CVE-2014-3124</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3615/">CVE-2014-3615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5146/">CVE-2014-5146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5149/">CVE-2014-5149</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6268/">CVE-2014-6268</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7154/">CVE-2014-7154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7155/">CVE-2014-7155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7156/">CVE-2014-7156</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7188/">CVE-2014-7188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8594/">CVE-2014-8594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8595/">CVE-2014-8595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8866/">CVE-2014-8866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8867/">CVE-2014-8867</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9030/">CVE-2014-9030</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9065/">CVE-2014-9065</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9066/">CVE-2014-9066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0361/">CVE-2015-0361</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2044/">CVE-2015-2044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2045/">CVE-2015-2045</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2151/">CVE-2015-2151</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2152/">CVE-2015-2152</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2751/">CVE-2015-2751</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2752/">CVE-2015-2752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2756/">CVE-2015-2756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3259/">CVE-2015-3259</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3340/">CVE-2015-3340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4103/">CVE-2015-4103</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4104/">CVE-2015-4104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4105/">CVE-2015-4105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4106/">CVE-2015-4106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142064" comment="xen-4.5.1_12-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142065" comment="xen-kmp-default-4.5.1_12_k3.12.49_11-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142066" comment="xen-libs-4.5.1_12-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142067" comment="xen-libs-32bit-4.5.1_12-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76163" version="1" class="patch">
	<metadata>
		<title>xf86-video-intel-2.99.914-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2014-4910" ref_url="https://www.suse.com/security/cve/CVE-2014-4910/" source="CVE"/>
		<description>
These are all security issues fixed in the xf86-video-intel-2.99.914-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4910/">CVE-2014-4910</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142068" comment="xf86-video-intel-2.99.914-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76164" version="1" class="patch">
	<metadata>
		<title>xinetd-2.3.15-7.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2012-0862" ref_url="https://www.suse.com/security/cve/CVE-2012-0862/" source="CVE"/>
		<reference ref_id="CVE-2013-4342" ref_url="https://www.suse.com/security/cve/CVE-2013-4342/" source="CVE"/>
		<description>
These are all security issues fixed in the xinetd-2.3.15-7.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0862/">CVE-2012-0862</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4342/">CVE-2013-4342</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141167" comment="xinetd-2.3.15-7.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76165" version="1" class="patch">
	<metadata>
		<title>xlockmore-5.43-5.33 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2013-4143" ref_url="https://www.suse.com/security/cve/CVE-2013-4143/" source="CVE"/>
		<description>
These are all security issues fixed in the xlockmore-5.43-5.33 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4143/">CVE-2013-4143</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141168" comment="xlockmore-5.43-5.33 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76166" version="1" class="patch">
	<metadata>
		<title>xorg-x11-7.6_1-14.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-0465" ref_url="https://www.suse.com/security/cve/CVE-2011-0465/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-7.6_1-14.17 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0465/">CVE-2011-0465</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141834" comment="xorg-x11-7.6_1-14.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141835" comment="xorg-x11-essentials-7.6_1-14.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141171" comment="xrdb-1.1.0-3.58 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76167" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libs-7.6-45.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libs-7.6-45.14 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141836" comment="xorg-x11-libs-7.6-45.14 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76168" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-7.6_1.15.2-36.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-2240" ref_url="https://www.suse.com/security/cve/CVE-2010-2240/" source="CVE"/>
		<reference ref_id="CVE-2013-1940" ref_url="https://www.suse.com/security/cve/CVE-2013-1940/" source="CVE"/>
		<reference ref_id="CVE-2013-4396" ref_url="https://www.suse.com/security/cve/CVE-2013-4396/" source="CVE"/>
		<reference ref_id="CVE-2013-6424" ref_url="https://www.suse.com/security/cve/CVE-2013-6424/" source="CVE"/>
		<reference ref_id="CVE-2014-8091" ref_url="https://www.suse.com/security/cve/CVE-2014-8091/" source="CVE"/>
		<reference ref_id="CVE-2014-8092" ref_url="https://www.suse.com/security/cve/CVE-2014-8092/" source="CVE"/>
		<reference ref_id="CVE-2014-8093" ref_url="https://www.suse.com/security/cve/CVE-2014-8093/" source="CVE"/>
		<reference ref_id="CVE-2014-8094" ref_url="https://www.suse.com/security/cve/CVE-2014-8094/" source="CVE"/>
		<reference ref_id="CVE-2014-8095" ref_url="https://www.suse.com/security/cve/CVE-2014-8095/" source="CVE"/>
		<reference ref_id="CVE-2014-8096" ref_url="https://www.suse.com/security/cve/CVE-2014-8096/" source="CVE"/>
		<reference ref_id="CVE-2014-8097" ref_url="https://www.suse.com/security/cve/CVE-2014-8097/" source="CVE"/>
		<reference ref_id="CVE-2014-8098" ref_url="https://www.suse.com/security/cve/CVE-2014-8098/" source="CVE"/>
		<reference ref_id="CVE-2014-8099" ref_url="https://www.suse.com/security/cve/CVE-2014-8099/" source="CVE"/>
		<reference ref_id="CVE-2014-8100" ref_url="https://www.suse.com/security/cve/CVE-2014-8100/" source="CVE"/>
		<reference ref_id="CVE-2014-8101" ref_url="https://www.suse.com/security/cve/CVE-2014-8101/" source="CVE"/>
		<reference ref_id="CVE-2014-8102" ref_url="https://www.suse.com/security/cve/CVE-2014-8102/" source="CVE"/>
		<reference ref_id="CVE-2014-8103" ref_url="https://www.suse.com/security/cve/CVE-2014-8103/" source="CVE"/>
		<reference ref_id="CVE-2015-0255" ref_url="https://www.suse.com/security/cve/CVE-2015-0255/" source="CVE"/>
		<reference ref_id="CVE-2015-3418" ref_url="https://www.suse.com/security/cve/CVE-2015-3418/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-7.6_1.15.2-36.21 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2240/">CVE-2010-2240</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-1940/">CVE-2013-1940</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4396/">CVE-2013-4396</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6424/">CVE-2013-6424</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8091/">CVE-2014-8091</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2014-8092/">CVE-2014-8092</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8093/">CVE-2014-8093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8094/">CVE-2014-8094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8095/">CVE-2014-8095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8096/">CVE-2014-8096</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8097/">CVE-2014-8097</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8098/">CVE-2014-8098</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8099/">CVE-2014-8099</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8100/">CVE-2014-8100</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8101/">CVE-2014-8101</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8102/">CVE-2014-8102</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8103/">CVE-2014-8103</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0255/">CVE-2015-0255</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3418/">CVE-2015-3418</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142069" comment="xorg-x11-server-7.6_1.15.2-36.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142070" comment="xorg-x11-server-extra-7.6_1.15.2-36.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76169" version="1" class="patch">
	<metadata>
		<title>yast2-3.1.155-1.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-3177" ref_url="https://www.suse.com/security/cve/CVE-2011-3177/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-3.1.155-1.13 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3177/">CVE-2011-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142071" comment="yast2-3.1.155-1.13 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76170" version="1" class="patch">
	<metadata>
		<title>yast2-core-3.1.18-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<reference ref_id="CVE-2011-3177" ref_url="https://www.suse.com/security/cve/CVE-2011-3177/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-core-3.1.18-1.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3177/">CVE-2011-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142072" comment="yast2-core-3.1.18-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76171" version="1" class="patch">
	<metadata>
		<title>zoo-2.10-1020.62 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-0855" ref_url="https://www.suse.com/security/cve/CVE-2006-0855/" source="CVE"/>
		<reference ref_id="CVE-2007-1669" ref_url="https://www.suse.com/security/cve/CVE-2007-1669/" source="CVE"/>
		<description>
These are all security issues fixed in the zoo-2.10-1020.62 package on the GA media of SUSE Linux Enterprise Desktop 12 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-0855/">CVE-2006-0855</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1669/">CVE-2007-1669</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512004" comment="zoo-2.10-1020.62 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76172" version="1" class="patch">
	<metadata>
		<title>DirectFB-1.7.1-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-2977" ref_url="https://www.suse.com/security/cve/CVE-2014-2977/" source="CVE"/>
		<reference ref_id="CVE-2014-2978" ref_url="https://www.suse.com/security/cve/CVE-2014-2978/" source="CVE"/>
		<description>
These are all security issues fixed in the DirectFB-1.7.1-6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-2977/">CVE-2014-2977</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-2978/">CVE-2014-2978</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140428" comment="DirectFB-1.7.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140429" comment="lib++dfb-1_7-1-1.7.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140430" comment="libdirectfb-1_7-1-1.7.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142073" comment="libdirectfb-1_7-1-32bit-1.7.1-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76173" version="1" class="patch">
	<metadata>
		<title>ImageMagick-6.8.8.1-33.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-0247" ref_url="https://www.suse.com/security/cve/CVE-2012-0247/" source="CVE"/>
		<reference ref_id="CVE-2012-0248" ref_url="https://www.suse.com/security/cve/CVE-2012-0248/" source="CVE"/>
		<reference ref_id="CVE-2012-1185" ref_url="https://www.suse.com/security/cve/CVE-2012-1185/" source="CVE"/>
		<reference ref_id="CVE-2012-1186" ref_url="https://www.suse.com/security/cve/CVE-2012-1186/" source="CVE"/>
		<reference ref_id="CVE-2014-8354" ref_url="https://www.suse.com/security/cve/CVE-2014-8354/" source="CVE"/>
		<reference ref_id="CVE-2014-8355" ref_url="https://www.suse.com/security/cve/CVE-2014-8355/" source="CVE"/>
		<reference ref_id="CVE-2014-8562" ref_url="https://www.suse.com/security/cve/CVE-2014-8562/" source="CVE"/>
		<reference ref_id="CVE-2014-8716" ref_url="https://www.suse.com/security/cve/CVE-2014-8716/" source="CVE"/>
		<reference ref_id="CVE-2014-9805" ref_url="https://www.suse.com/security/cve/CVE-2014-9805/" source="CVE"/>
		<reference ref_id="CVE-2014-9806" ref_url="https://www.suse.com/security/cve/CVE-2014-9806/" source="CVE"/>
		<reference ref_id="CVE-2014-9807" ref_url="https://www.suse.com/security/cve/CVE-2014-9807/" source="CVE"/>
		<reference ref_id="CVE-2014-9808" ref_url="https://www.suse.com/security/cve/CVE-2014-9808/" source="CVE"/>
		<reference ref_id="CVE-2014-9809" ref_url="https://www.suse.com/security/cve/CVE-2014-9809/" source="CVE"/>
		<reference ref_id="CVE-2014-9810" ref_url="https://www.suse.com/security/cve/CVE-2014-9810/" source="CVE"/>
		<reference ref_id="CVE-2014-9811" ref_url="https://www.suse.com/security/cve/CVE-2014-9811/" source="CVE"/>
		<reference ref_id="CVE-2014-9812" ref_url="https://www.suse.com/security/cve/CVE-2014-9812/" source="CVE"/>
		<reference ref_id="CVE-2014-9813" ref_url="https://www.suse.com/security/cve/CVE-2014-9813/" source="CVE"/>
		<reference ref_id="CVE-2014-9814" ref_url="https://www.suse.com/security/cve/CVE-2014-9814/" source="CVE"/>
		<reference ref_id="CVE-2014-9815" ref_url="https://www.suse.com/security/cve/CVE-2014-9815/" source="CVE"/>
		<reference ref_id="CVE-2014-9816" ref_url="https://www.suse.com/security/cve/CVE-2014-9816/" source="CVE"/>
		<reference ref_id="CVE-2014-9817" ref_url="https://www.suse.com/security/cve/CVE-2014-9817/" source="CVE"/>
		<reference ref_id="CVE-2014-9818" ref_url="https://www.suse.com/security/cve/CVE-2014-9818/" source="CVE"/>
		<reference ref_id="CVE-2014-9819" ref_url="https://www.suse.com/security/cve/CVE-2014-9819/" source="CVE"/>
		<reference ref_id="CVE-2014-9820" ref_url="https://www.suse.com/security/cve/CVE-2014-9820/" source="CVE"/>
		<reference ref_id="CVE-2014-9821" ref_url="https://www.suse.com/security/cve/CVE-2014-9821/" source="CVE"/>
		<reference ref_id="CVE-2014-9822" ref_url="https://www.suse.com/security/cve/CVE-2014-9822/" source="CVE"/>
		<reference ref_id="CVE-2014-9823" ref_url="https://www.suse.com/security/cve/CVE-2014-9823/" source="CVE"/>
		<reference ref_id="CVE-2014-9824" ref_url="https://www.suse.com/security/cve/CVE-2014-9824/" source="CVE"/>
		<reference ref_id="CVE-2014-9825" ref_url="https://www.suse.com/security/cve/CVE-2014-9825/" source="CVE"/>
		<reference ref_id="CVE-2014-9826" ref_url="https://www.suse.com/security/cve/CVE-2014-9826/" source="CVE"/>
		<reference ref_id="CVE-2014-9828" ref_url="https://www.suse.com/security/cve/CVE-2014-9828/" source="CVE"/>
		<reference ref_id="CVE-2014-9829" ref_url="https://www.suse.com/security/cve/CVE-2014-9829/" source="CVE"/>
		<reference ref_id="CVE-2014-9830" ref_url="https://www.suse.com/security/cve/CVE-2014-9830/" source="CVE"/>
		<reference ref_id="CVE-2014-9831" ref_url="https://www.suse.com/security/cve/CVE-2014-9831/" source="CVE"/>
		<reference ref_id="CVE-2014-9832" ref_url="https://www.suse.com/security/cve/CVE-2014-9832/" source="CVE"/>
		<reference ref_id="CVE-2014-9833" ref_url="https://www.suse.com/security/cve/CVE-2014-9833/" source="CVE"/>
		<reference ref_id="CVE-2014-9834" ref_url="https://www.suse.com/security/cve/CVE-2014-9834/" source="CVE"/>
		<reference ref_id="CVE-2014-9835" ref_url="https://www.suse.com/security/cve/CVE-2014-9835/" source="CVE"/>
		<reference ref_id="CVE-2014-9836" ref_url="https://www.suse.com/security/cve/CVE-2014-9836/" source="CVE"/>
		<reference ref_id="CVE-2014-9837" ref_url="https://www.suse.com/security/cve/CVE-2014-9837/" source="CVE"/>
		<reference ref_id="CVE-2014-9838" ref_url="https://www.suse.com/security/cve/CVE-2014-9838/" source="CVE"/>
		<reference ref_id="CVE-2014-9839" ref_url="https://www.suse.com/security/cve/CVE-2014-9839/" source="CVE"/>
		<reference ref_id="CVE-2014-9840" ref_url="https://www.suse.com/security/cve/CVE-2014-9840/" source="CVE"/>
		<reference ref_id="CVE-2014-9841" ref_url="https://www.suse.com/security/cve/CVE-2014-9841/" source="CVE"/>
		<reference ref_id="CVE-2014-9842" ref_url="https://www.suse.com/security/cve/CVE-2014-9842/" source="CVE"/>
		<reference ref_id="CVE-2014-9843" ref_url="https://www.suse.com/security/cve/CVE-2014-9843/" source="CVE"/>
		<reference ref_id="CVE-2014-9844" ref_url="https://www.suse.com/security/cve/CVE-2014-9844/" source="CVE"/>
		<reference ref_id="CVE-2014-9845" ref_url="https://www.suse.com/security/cve/CVE-2014-9845/" source="CVE"/>
		<reference ref_id="CVE-2014-9846" ref_url="https://www.suse.com/security/cve/CVE-2014-9846/" source="CVE"/>
		<reference ref_id="CVE-2014-9847" ref_url="https://www.suse.com/security/cve/CVE-2014-9847/" source="CVE"/>
		<reference ref_id="CVE-2014-9848" ref_url="https://www.suse.com/security/cve/CVE-2014-9848/" source="CVE"/>
		<reference ref_id="CVE-2014-9849" ref_url="https://www.suse.com/security/cve/CVE-2014-9849/" source="CVE"/>
		<reference ref_id="CVE-2014-9850" ref_url="https://www.suse.com/security/cve/CVE-2014-9850/" source="CVE"/>
		<reference ref_id="CVE-2014-9851" ref_url="https://www.suse.com/security/cve/CVE-2014-9851/" source="CVE"/>
		<reference ref_id="CVE-2014-9852" ref_url="https://www.suse.com/security/cve/CVE-2014-9852/" source="CVE"/>
		<reference ref_id="CVE-2014-9853" ref_url="https://www.suse.com/security/cve/CVE-2014-9853/" source="CVE"/>
		<reference ref_id="CVE-2014-9854" ref_url="https://www.suse.com/security/cve/CVE-2014-9854/" source="CVE"/>
		<reference ref_id="CVE-2015-8894" ref_url="https://www.suse.com/security/cve/CVE-2015-8894/" source="CVE"/>
		<reference ref_id="CVE-2015-8895" ref_url="https://www.suse.com/security/cve/CVE-2015-8895/" source="CVE"/>
		<reference ref_id="CVE-2015-8896" ref_url="https://www.suse.com/security/cve/CVE-2015-8896/" source="CVE"/>
		<reference ref_id="CVE-2015-8897" ref_url="https://www.suse.com/security/cve/CVE-2015-8897/" source="CVE"/>
		<reference ref_id="CVE-2015-8898" ref_url="https://www.suse.com/security/cve/CVE-2015-8898/" source="CVE"/>
		<reference ref_id="CVE-2015-8900" ref_url="https://www.suse.com/security/cve/CVE-2015-8900/" source="CVE"/>
		<reference ref_id="CVE-2015-8901" ref_url="https://www.suse.com/security/cve/CVE-2015-8901/" source="CVE"/>
		<reference ref_id="CVE-2015-8902" ref_url="https://www.suse.com/security/cve/CVE-2015-8902/" source="CVE"/>
		<reference ref_id="CVE-2015-8903" ref_url="https://www.suse.com/security/cve/CVE-2015-8903/" source="CVE"/>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<reference ref_id="CVE-2016-3715" ref_url="https://www.suse.com/security/cve/CVE-2016-3715/" source="CVE"/>
		<reference ref_id="CVE-2016-3716" ref_url="https://www.suse.com/security/cve/CVE-2016-3716/" source="CVE"/>
		<reference ref_id="CVE-2016-3717" ref_url="https://www.suse.com/security/cve/CVE-2016-3717/" source="CVE"/>
		<reference ref_id="CVE-2016-3718" ref_url="https://www.suse.com/security/cve/CVE-2016-3718/" source="CVE"/>
		<reference ref_id="CVE-2016-4562" ref_url="https://www.suse.com/security/cve/CVE-2016-4562/" source="CVE"/>
		<reference ref_id="CVE-2016-4563" ref_url="https://www.suse.com/security/cve/CVE-2016-4563/" source="CVE"/>
		<reference ref_id="CVE-2016-4564" ref_url="https://www.suse.com/security/cve/CVE-2016-4564/" source="CVE"/>
		<reference ref_id="CVE-2016-5010" ref_url="https://www.suse.com/security/cve/CVE-2016-5010/" source="CVE"/>
		<reference ref_id="CVE-2016-5118" ref_url="https://www.suse.com/security/cve/CVE-2016-5118/" source="CVE"/>
		<reference ref_id="CVE-2016-5687" ref_url="https://www.suse.com/security/cve/CVE-2016-5687/" source="CVE"/>
		<reference ref_id="CVE-2016-5688" ref_url="https://www.suse.com/security/cve/CVE-2016-5688/" source="CVE"/>
		<reference ref_id="CVE-2016-5689" ref_url="https://www.suse.com/security/cve/CVE-2016-5689/" source="CVE"/>
		<reference ref_id="CVE-2016-5690" ref_url="https://www.suse.com/security/cve/CVE-2016-5690/" source="CVE"/>
		<reference ref_id="CVE-2016-5691" ref_url="https://www.suse.com/security/cve/CVE-2016-5691/" source="CVE"/>
		<reference ref_id="CVE-2016-5841" ref_url="https://www.suse.com/security/cve/CVE-2016-5841/" source="CVE"/>
		<reference ref_id="CVE-2016-5842" ref_url="https://www.suse.com/security/cve/CVE-2016-5842/" source="CVE"/>
		<reference ref_id="CVE-2016-6491" ref_url="https://www.suse.com/security/cve/CVE-2016-6491/" source="CVE"/>
		<reference ref_id="CVE-2016-6520" ref_url="https://www.suse.com/security/cve/CVE-2016-6520/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-6.8.8.1-33.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0247/">CVE-2012-0247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0248/">CVE-2012-0248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1185/">CVE-2012-1185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1186/">CVE-2012-1186</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8354/">CVE-2014-8354</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8355/">CVE-2014-8355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8562/">CVE-2014-8562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8716/">CVE-2014-8716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9805/">CVE-2014-9805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9806/">CVE-2014-9806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9807/">CVE-2014-9807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9808/">CVE-2014-9808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9809/">CVE-2014-9809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9810/">CVE-2014-9810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9811/">CVE-2014-9811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9812/">CVE-2014-9812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9813/">CVE-2014-9813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9814/">CVE-2014-9814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9815/">CVE-2014-9815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9816/">CVE-2014-9816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9817/">CVE-2014-9817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9818/">CVE-2014-9818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9819/">CVE-2014-9819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9820/">CVE-2014-9820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9821/">CVE-2014-9821</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9822/">CVE-2014-9822</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9823/">CVE-2014-9823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9824/">CVE-2014-9824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9825/">CVE-2014-9825</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9826/">CVE-2014-9826</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9828/">CVE-2014-9828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9829/">CVE-2014-9829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9830/">CVE-2014-9830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9831/">CVE-2014-9831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9832/">CVE-2014-9832</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9833/">CVE-2014-9833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9834/">CVE-2014-9834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9835/">CVE-2014-9835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9836/">CVE-2014-9836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9837/">CVE-2014-9837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9838/">CVE-2014-9838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9839/">CVE-2014-9839</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9840/">CVE-2014-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9841/">CVE-2014-9841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9842/">CVE-2014-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9843/">CVE-2014-9843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9844/">CVE-2014-9844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9845/">CVE-2014-9845</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9846/">CVE-2014-9846</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9847/">CVE-2014-9847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9848/">CVE-2014-9848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9849/">CVE-2014-9849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9850/">CVE-2014-9850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9851/">CVE-2014-9851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9852/">CVE-2014-9852</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9853/">CVE-2014-9853</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9854/">CVE-2014-9854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8894/">CVE-2015-8894</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8895/">CVE-2015-8895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8896/">CVE-2015-8896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8897/">CVE-2015-8897</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8898/">CVE-2015-8898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8900/">CVE-2015-8900</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8901/">CVE-2015-8901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8902/">CVE-2015-8902</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8903/">CVE-2015-8903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3715/">CVE-2016-3715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3716/">CVE-2016-3716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3717/">CVE-2016-3717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3718/">CVE-2016-3718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4562/">CVE-2016-4562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4563/">CVE-2016-4563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4564/">CVE-2016-4564</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5010/">CVE-2016-5010</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5118/">CVE-2016-5118</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5687/">CVE-2016-5687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5688/">CVE-2016-5688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5689/">CVE-2016-5689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5690/">CVE-2016-5690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5691/">CVE-2016-5691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5841/">CVE-2016-5841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5842/">CVE-2016-5842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6491/">CVE-2016-6491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6520/">CVE-2016-6520</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130983" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130984" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130986" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76174" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-45.4.0esr-81.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-5913" ref_url="https://www.suse.com/security/cve/CVE-2008-5913/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-0652" ref_url="https://www.suse.com/security/cve/CVE-2009-0652/" source="CVE"/>
		<reference ref_id="CVE-2009-0771" ref_url="https://www.suse.com/security/cve/CVE-2009-0771/" source="CVE"/>
		<reference ref_id="CVE-2009-0772" ref_url="https://www.suse.com/security/cve/CVE-2009-0772/" source="CVE"/>
		<reference ref_id="CVE-2009-0773" ref_url="https://www.suse.com/security/cve/CVE-2009-0773/" source="CVE"/>
		<reference ref_id="CVE-2009-0774" ref_url="https://www.suse.com/security/cve/CVE-2009-0774/" source="CVE"/>
		<reference ref_id="CVE-2009-0775" ref_url="https://www.suse.com/security/cve/CVE-2009-0775/" source="CVE"/>
		<reference ref_id="CVE-2009-0776" ref_url="https://www.suse.com/security/cve/CVE-2009-0776/" source="CVE"/>
		<reference ref_id="CVE-2009-0777" ref_url="https://www.suse.com/security/cve/CVE-2009-0777/" source="CVE"/>
		<reference ref_id="CVE-2009-1044" ref_url="https://www.suse.com/security/cve/CVE-2009-1044/" source="CVE"/>
		<reference ref_id="CVE-2009-1169" ref_url="https://www.suse.com/security/cve/CVE-2009-1169/" source="CVE"/>
		<reference ref_id="CVE-2009-1302" ref_url="https://www.suse.com/security/cve/CVE-2009-1302/" source="CVE"/>
		<reference ref_id="CVE-2009-1303" ref_url="https://www.suse.com/security/cve/CVE-2009-1303/" source="CVE"/>
		<reference ref_id="CVE-2009-1304" ref_url="https://www.suse.com/security/cve/CVE-2009-1304/" source="CVE"/>
		<reference ref_id="CVE-2009-1305" ref_url="https://www.suse.com/security/cve/CVE-2009-1305/" source="CVE"/>
		<reference ref_id="CVE-2009-1306" ref_url="https://www.suse.com/security/cve/CVE-2009-1306/" source="CVE"/>
		<reference ref_id="CVE-2009-1307" ref_url="https://www.suse.com/security/cve/CVE-2009-1307/" source="CVE"/>
		<reference ref_id="CVE-2009-1308" ref_url="https://www.suse.com/security/cve/CVE-2009-1308/" source="CVE"/>
		<reference ref_id="CVE-2009-1309" ref_url="https://www.suse.com/security/cve/CVE-2009-1309/" source="CVE"/>
		<reference ref_id="CVE-2009-1310" ref_url="https://www.suse.com/security/cve/CVE-2009-1310/" source="CVE"/>
		<reference ref_id="CVE-2009-1311" ref_url="https://www.suse.com/security/cve/CVE-2009-1311/" source="CVE"/>
		<reference ref_id="CVE-2009-1312" ref_url="https://www.suse.com/security/cve/CVE-2009-1312/" source="CVE"/>
		<reference ref_id="CVE-2009-1313" ref_url="https://www.suse.com/security/cve/CVE-2009-1313/" source="CVE"/>
		<reference ref_id="CVE-2009-1563" ref_url="https://www.suse.com/security/cve/CVE-2009-1563/" source="CVE"/>
		<reference ref_id="CVE-2009-2470" ref_url="https://www.suse.com/security/cve/CVE-2009-2470/" source="CVE"/>
		<reference ref_id="CVE-2009-2654" ref_url="https://www.suse.com/security/cve/CVE-2009-2654/" source="CVE"/>
		<reference ref_id="CVE-2009-3069" ref_url="https://www.suse.com/security/cve/CVE-2009-3069/" source="CVE"/>
		<reference ref_id="CVE-2009-3070" ref_url="https://www.suse.com/security/cve/CVE-2009-3070/" source="CVE"/>
		<reference ref_id="CVE-2009-3071" ref_url="https://www.suse.com/security/cve/CVE-2009-3071/" source="CVE"/>
		<reference ref_id="CVE-2009-3072" ref_url="https://www.suse.com/security/cve/CVE-2009-3072/" source="CVE"/>
		<reference ref_id="CVE-2009-3073" ref_url="https://www.suse.com/security/cve/CVE-2009-3073/" source="CVE"/>
		<reference ref_id="CVE-2009-3074" ref_url="https://www.suse.com/security/cve/CVE-2009-3074/" source="CVE"/>
		<reference ref_id="CVE-2009-3075" ref_url="https://www.suse.com/security/cve/CVE-2009-3075/" source="CVE"/>
		<reference ref_id="CVE-2009-3077" ref_url="https://www.suse.com/security/cve/CVE-2009-3077/" source="CVE"/>
		<reference ref_id="CVE-2009-3078" ref_url="https://www.suse.com/security/cve/CVE-2009-3078/" source="CVE"/>
		<reference ref_id="CVE-2009-3079" ref_url="https://www.suse.com/security/cve/CVE-2009-3079/" source="CVE"/>
		<reference ref_id="CVE-2009-3274" ref_url="https://www.suse.com/security/cve/CVE-2009-3274/" source="CVE"/>
		<reference ref_id="CVE-2009-3370" ref_url="https://www.suse.com/security/cve/CVE-2009-3370/" source="CVE"/>
		<reference ref_id="CVE-2009-3371" ref_url="https://www.suse.com/security/cve/CVE-2009-3371/" source="CVE"/>
		<reference ref_id="CVE-2009-3372" ref_url="https://www.suse.com/security/cve/CVE-2009-3372/" source="CVE"/>
		<reference ref_id="CVE-2009-3373" ref_url="https://www.suse.com/security/cve/CVE-2009-3373/" source="CVE"/>
		<reference ref_id="CVE-2009-3374" ref_url="https://www.suse.com/security/cve/CVE-2009-3374/" source="CVE"/>
		<reference ref_id="CVE-2009-3375" ref_url="https://www.suse.com/security/cve/CVE-2009-3375/" source="CVE"/>
		<reference ref_id="CVE-2009-3376" ref_url="https://www.suse.com/security/cve/CVE-2009-3376/" source="CVE"/>
		<reference ref_id="CVE-2009-3377" ref_url="https://www.suse.com/security/cve/CVE-2009-3377/" source="CVE"/>
		<reference ref_id="CVE-2009-3378" ref_url="https://www.suse.com/security/cve/CVE-2009-3378/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2009-3380" ref_url="https://www.suse.com/security/cve/CVE-2009-3380/" source="CVE"/>
		<reference ref_id="CVE-2009-3381" ref_url="https://www.suse.com/security/cve/CVE-2009-3381/" source="CVE"/>
		<reference ref_id="CVE-2009-3383" ref_url="https://www.suse.com/security/cve/CVE-2009-3383/" source="CVE"/>
		<reference ref_id="CVE-2009-3388" ref_url="https://www.suse.com/security/cve/CVE-2009-3388/" source="CVE"/>
		<reference ref_id="CVE-2009-3389" ref_url="https://www.suse.com/security/cve/CVE-2009-3389/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-3979" ref_url="https://www.suse.com/security/cve/CVE-2009-3979/" source="CVE"/>
		<reference ref_id="CVE-2009-3980" ref_url="https://www.suse.com/security/cve/CVE-2009-3980/" source="CVE"/>
		<reference ref_id="CVE-2009-3982" ref_url="https://www.suse.com/security/cve/CVE-2009-3982/" source="CVE"/>
		<reference ref_id="CVE-2009-3983" ref_url="https://www.suse.com/security/cve/CVE-2009-3983/" source="CVE"/>
		<reference ref_id="CVE-2009-3984" ref_url="https://www.suse.com/security/cve/CVE-2009-3984/" source="CVE"/>
		<reference ref_id="CVE-2009-3985" ref_url="https://www.suse.com/security/cve/CVE-2009-3985/" source="CVE"/>
		<reference ref_id="CVE-2010-0164" ref_url="https://www.suse.com/security/cve/CVE-2010-0164/" source="CVE"/>
		<reference ref_id="CVE-2010-0165" ref_url="https://www.suse.com/security/cve/CVE-2010-0165/" source="CVE"/>
		<reference ref_id="CVE-2010-0166" ref_url="https://www.suse.com/security/cve/CVE-2010-0166/" source="CVE"/>
		<reference ref_id="CVE-2010-0167" ref_url="https://www.suse.com/security/cve/CVE-2010-0167/" source="CVE"/>
		<reference ref_id="CVE-2010-0168" ref_url="https://www.suse.com/security/cve/CVE-2010-0168/" source="CVE"/>
		<reference ref_id="CVE-2010-0169" ref_url="https://www.suse.com/security/cve/CVE-2010-0169/" source="CVE"/>
		<reference ref_id="CVE-2010-0170" ref_url="https://www.suse.com/security/cve/CVE-2010-0170/" source="CVE"/>
		<reference ref_id="CVE-2010-0171" ref_url="https://www.suse.com/security/cve/CVE-2010-0171/" source="CVE"/>
		<reference ref_id="CVE-2010-0172" ref_url="https://www.suse.com/security/cve/CVE-2010-0172/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181/" source="CVE"/>
		<reference ref_id="CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182/" source="CVE"/>
		<reference ref_id="CVE-2010-0654" ref_url="https://www.suse.com/security/cve/CVE-2010-0654/" source="CVE"/>
		<reference ref_id="CVE-2010-1028" ref_url="https://www.suse.com/security/cve/CVE-2010-1028/" source="CVE"/>
		<reference ref_id="CVE-2010-1121" ref_url="https://www.suse.com/security/cve/CVE-2010-1121/" source="CVE"/>
		<reference ref_id="CVE-2010-1125" ref_url="https://www.suse.com/security/cve/CVE-2010-1125/" source="CVE"/>
		<reference ref_id="CVE-2010-1196" ref_url="https://www.suse.com/security/cve/CVE-2010-1196/" source="CVE"/>
		<reference ref_id="CVE-2010-1197" ref_url="https://www.suse.com/security/cve/CVE-2010-1197/" source="CVE"/>
		<reference ref_id="CVE-2010-1198" ref_url="https://www.suse.com/security/cve/CVE-2010-1198/" source="CVE"/>
		<reference ref_id="CVE-2010-1199" ref_url="https://www.suse.com/security/cve/CVE-2010-1199/" source="CVE"/>
		<reference ref_id="CVE-2010-1200" ref_url="https://www.suse.com/security/cve/CVE-2010-1200/" source="CVE"/>
		<reference ref_id="CVE-2010-1201" ref_url="https://www.suse.com/security/cve/CVE-2010-1201/" source="CVE"/>
		<reference ref_id="CVE-2010-1202" ref_url="https://www.suse.com/security/cve/CVE-2010-1202/" source="CVE"/>
		<reference ref_id="CVE-2010-1203" ref_url="https://www.suse.com/security/cve/CVE-2010-1203/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-1206" ref_url="https://www.suse.com/security/cve/CVE-2010-1206/" source="CVE"/>
		<reference ref_id="CVE-2010-1207" ref_url="https://www.suse.com/security/cve/CVE-2010-1207/" source="CVE"/>
		<reference ref_id="CVE-2010-1208" ref_url="https://www.suse.com/security/cve/CVE-2010-1208/" source="CVE"/>
		<reference ref_id="CVE-2010-1209" ref_url="https://www.suse.com/security/cve/CVE-2010-1209/" source="CVE"/>
		<reference ref_id="CVE-2010-1210" ref_url="https://www.suse.com/security/cve/CVE-2010-1210/" source="CVE"/>
		<reference ref_id="CVE-2010-1211" ref_url="https://www.suse.com/security/cve/CVE-2010-1211/" source="CVE"/>
		<reference ref_id="CVE-2010-1212" ref_url="https://www.suse.com/security/cve/CVE-2010-1212/" source="CVE"/>
		<reference ref_id="CVE-2010-1213" ref_url="https://www.suse.com/security/cve/CVE-2010-1213/" source="CVE"/>
		<reference ref_id="CVE-2010-1214" ref_url="https://www.suse.com/security/cve/CVE-2010-1214/" source="CVE"/>
		<reference ref_id="CVE-2010-1215" ref_url="https://www.suse.com/security/cve/CVE-2010-1215/" source="CVE"/>
		<reference ref_id="CVE-2010-2751" ref_url="https://www.suse.com/security/cve/CVE-2010-2751/" source="CVE"/>
		<reference ref_id="CVE-2010-2752" ref_url="https://www.suse.com/security/cve/CVE-2010-2752/" source="CVE"/>
		<reference ref_id="CVE-2010-2753" ref_url="https://www.suse.com/security/cve/CVE-2010-2753/" source="CVE"/>
		<reference ref_id="CVE-2010-2754" ref_url="https://www.suse.com/security/cve/CVE-2010-2754/" source="CVE"/>
		<reference ref_id="CVE-2010-2755" ref_url="https://www.suse.com/security/cve/CVE-2010-2755/" source="CVE"/>
		<reference ref_id="CVE-2010-2760" ref_url="https://www.suse.com/security/cve/CVE-2010-2760/" source="CVE"/>
		<reference ref_id="CVE-2010-2762" ref_url="https://www.suse.com/security/cve/CVE-2010-2762/" source="CVE"/>
		<reference ref_id="CVE-2010-2764" ref_url="https://www.suse.com/security/cve/CVE-2010-2764/" source="CVE"/>
		<reference ref_id="CVE-2010-2765" ref_url="https://www.suse.com/security/cve/CVE-2010-2765/" source="CVE"/>
		<reference ref_id="CVE-2010-2766" ref_url="https://www.suse.com/security/cve/CVE-2010-2766/" source="CVE"/>
		<reference ref_id="CVE-2010-2767" ref_url="https://www.suse.com/security/cve/CVE-2010-2767/" source="CVE"/>
		<reference ref_id="CVE-2010-2768" ref_url="https://www.suse.com/security/cve/CVE-2010-2768/" source="CVE"/>
		<reference ref_id="CVE-2010-2769" ref_url="https://www.suse.com/security/cve/CVE-2010-2769/" source="CVE"/>
		<reference ref_id="CVE-2010-3166" ref_url="https://www.suse.com/security/cve/CVE-2010-3166/" source="CVE"/>
		<reference ref_id="CVE-2010-3167" ref_url="https://www.suse.com/security/cve/CVE-2010-3167/" source="CVE"/>
		<reference ref_id="CVE-2010-3168" ref_url="https://www.suse.com/security/cve/CVE-2010-3168/" source="CVE"/>
		<reference ref_id="CVE-2010-3169" ref_url="https://www.suse.com/security/cve/CVE-2010-3169/" source="CVE"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2010-3173" ref_url="https://www.suse.com/security/cve/CVE-2010-3173/" source="CVE"/>
		<reference ref_id="CVE-2010-3174" ref_url="https://www.suse.com/security/cve/CVE-2010-3174/" source="CVE"/>
		<reference ref_id="CVE-2010-3175" ref_url="https://www.suse.com/security/cve/CVE-2010-3175/" source="CVE"/>
		<reference ref_id="CVE-2010-3176" ref_url="https://www.suse.com/security/cve/CVE-2010-3176/" source="CVE"/>
		<reference ref_id="CVE-2010-3177" ref_url="https://www.suse.com/security/cve/CVE-2010-3177/" source="CVE"/>
		<reference ref_id="CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178/" source="CVE"/>
		<reference ref_id="CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179/" source="CVE"/>
		<reference ref_id="CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180/" source="CVE"/>
		<reference ref_id="CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182/" source="CVE"/>
		<reference ref_id="CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183/" source="CVE"/>
		<reference ref_id="CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765/" source="CVE"/>
		<reference ref_id="CVE-2011-0068" ref_url="https://www.suse.com/security/cve/CVE-2011-0068/" source="CVE"/>
		<reference ref_id="CVE-2011-0069" ref_url="https://www.suse.com/security/cve/CVE-2011-0069/" source="CVE"/>
		<reference ref_id="CVE-2011-0070" ref_url="https://www.suse.com/security/cve/CVE-2011-0070/" source="CVE"/>
		<reference ref_id="CVE-2011-0079" ref_url="https://www.suse.com/security/cve/CVE-2011-0079/" source="CVE"/>
		<reference ref_id="CVE-2011-0080" ref_url="https://www.suse.com/security/cve/CVE-2011-0080/" source="CVE"/>
		<reference ref_id="CVE-2011-0081" ref_url="https://www.suse.com/security/cve/CVE-2011-0081/" source="CVE"/>
		<reference ref_id="CVE-2011-0084" ref_url="https://www.suse.com/security/cve/CVE-2011-0084/" source="CVE"/>
		<reference ref_id="CVE-2011-1187" ref_url="https://www.suse.com/security/cve/CVE-2011-1187/" source="CVE"/>
		<reference ref_id="CVE-2011-1202" ref_url="https://www.suse.com/security/cve/CVE-2011-1202/" source="CVE"/>
		<reference ref_id="CVE-2011-2366" ref_url="https://www.suse.com/security/cve/CVE-2011-2366/" source="CVE"/>
		<reference ref_id="CVE-2011-2367" ref_url="https://www.suse.com/security/cve/CVE-2011-2367/" source="CVE"/>
		<reference ref_id="CVE-2011-2368" ref_url="https://www.suse.com/security/cve/CVE-2011-2368/" source="CVE"/>
		<reference ref_id="CVE-2011-2369" ref_url="https://www.suse.com/security/cve/CVE-2011-2369/" source="CVE"/>
		<reference ref_id="CVE-2011-2370" ref_url="https://www.suse.com/security/cve/CVE-2011-2370/" source="CVE"/>
		<reference ref_id="CVE-2011-2371" ref_url="https://www.suse.com/security/cve/CVE-2011-2371/" source="CVE"/>
		<reference ref_id="CVE-2011-2372" ref_url="https://www.suse.com/security/cve/CVE-2011-2372/" source="CVE"/>
		<reference ref_id="CVE-2011-2373" ref_url="https://www.suse.com/security/cve/CVE-2011-2373/" source="CVE"/>
		<reference ref_id="CVE-2011-2374" ref_url="https://www.suse.com/security/cve/CVE-2011-2374/" source="CVE"/>
		<reference ref_id="CVE-2011-2375" ref_url="https://www.suse.com/security/cve/CVE-2011-2375/" source="CVE"/>
		<reference ref_id="CVE-2011-2377" ref_url="https://www.suse.com/security/cve/CVE-2011-2377/" source="CVE"/>
		<reference ref_id="CVE-2011-2985" ref_url="https://www.suse.com/security/cve/CVE-2011-2985/" source="CVE"/>
		<reference ref_id="CVE-2011-2986" ref_url="https://www.suse.com/security/cve/CVE-2011-2986/" source="CVE"/>
		<reference ref_id="CVE-2011-2988" ref_url="https://www.suse.com/security/cve/CVE-2011-2988/" source="CVE"/>
		<reference ref_id="CVE-2011-2989" ref_url="https://www.suse.com/security/cve/CVE-2011-2989/" source="CVE"/>
		<reference ref_id="CVE-2011-2990" ref_url="https://www.suse.com/security/cve/CVE-2011-2990/" source="CVE"/>
		<reference ref_id="CVE-2011-2991" ref_url="https://www.suse.com/security/cve/CVE-2011-2991/" source="CVE"/>
		<reference ref_id="CVE-2011-2992" ref_url="https://www.suse.com/security/cve/CVE-2011-2992/" source="CVE"/>
		<reference ref_id="CVE-2011-2993" ref_url="https://www.suse.com/security/cve/CVE-2011-2993/" source="CVE"/>
		<reference ref_id="CVE-2011-2995" ref_url="https://www.suse.com/security/cve/CVE-2011-2995/" source="CVE"/>
		<reference ref_id="CVE-2011-2996" ref_url="https://www.suse.com/security/cve/CVE-2011-2996/" source="CVE"/>
		<reference ref_id="CVE-2011-2997" ref_url="https://www.suse.com/security/cve/CVE-2011-2997/" source="CVE"/>
		<reference ref_id="CVE-2011-3000" ref_url="https://www.suse.com/security/cve/CVE-2011-3000/" source="CVE"/>
		<reference ref_id="CVE-2011-3001" ref_url="https://www.suse.com/security/cve/CVE-2011-3001/" source="CVE"/>
		<reference ref_id="CVE-2011-3002" ref_url="https://www.suse.com/security/cve/CVE-2011-3002/" source="CVE"/>
		<reference ref_id="CVE-2011-3003" ref_url="https://www.suse.com/security/cve/CVE-2011-3003/" source="CVE"/>
		<reference ref_id="CVE-2011-3004" ref_url="https://www.suse.com/security/cve/CVE-2011-3004/" source="CVE"/>
		<reference ref_id="CVE-2011-3005" ref_url="https://www.suse.com/security/cve/CVE-2011-3005/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3062" ref_url="https://www.suse.com/security/cve/CVE-2011-3062/" source="CVE"/>
		<reference ref_id="CVE-2011-3101" ref_url="https://www.suse.com/security/cve/CVE-2011-3101/" source="CVE"/>
		<reference ref_id="CVE-2011-3232" ref_url="https://www.suse.com/security/cve/CVE-2011-3232/" source="CVE"/>
		<reference ref_id="CVE-2011-3648" ref_url="https://www.suse.com/security/cve/CVE-2011-3648/" source="CVE"/>
		<reference ref_id="CVE-2011-3650" ref_url="https://www.suse.com/security/cve/CVE-2011-3650/" source="CVE"/>
		<reference ref_id="CVE-2011-3651" ref_url="https://www.suse.com/security/cve/CVE-2011-3651/" source="CVE"/>
		<reference ref_id="CVE-2011-3652" ref_url="https://www.suse.com/security/cve/CVE-2011-3652/" source="CVE"/>
		<reference ref_id="CVE-2011-3654" ref_url="https://www.suse.com/security/cve/CVE-2011-3654/" source="CVE"/>
		<reference ref_id="CVE-2011-3655" ref_url="https://www.suse.com/security/cve/CVE-2011-3655/" source="CVE"/>
		<reference ref_id="CVE-2011-3658" ref_url="https://www.suse.com/security/cve/CVE-2011-3658/" source="CVE"/>
		<reference ref_id="CVE-2011-3659" ref_url="https://www.suse.com/security/cve/CVE-2011-3659/" source="CVE"/>
		<reference ref_id="CVE-2011-3660" ref_url="https://www.suse.com/security/cve/CVE-2011-3660/" source="CVE"/>
		<reference ref_id="CVE-2011-3661" ref_url="https://www.suse.com/security/cve/CVE-2011-3661/" source="CVE"/>
		<reference ref_id="CVE-2011-3663" ref_url="https://www.suse.com/security/cve/CVE-2011-3663/" source="CVE"/>
		<reference ref_id="CVE-2012-0441" ref_url="https://www.suse.com/security/cve/CVE-2012-0441/" source="CVE"/>
		<reference ref_id="CVE-2012-0442" ref_url="https://www.suse.com/security/cve/CVE-2012-0442/" source="CVE"/>
		<reference ref_id="CVE-2012-0443" ref_url="https://www.suse.com/security/cve/CVE-2012-0443/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<reference ref_id="CVE-2012-0445" ref_url="https://www.suse.com/security/cve/CVE-2012-0445/" source="CVE"/>
		<reference ref_id="CVE-2012-0446" ref_url="https://www.suse.com/security/cve/CVE-2012-0446/" source="CVE"/>
		<reference ref_id="CVE-2012-0447" ref_url="https://www.suse.com/security/cve/CVE-2012-0447/" source="CVE"/>
		<reference ref_id="CVE-2012-0449" ref_url="https://www.suse.com/security/cve/CVE-2012-0449/" source="CVE"/>
		<reference ref_id="CVE-2012-0451" ref_url="https://www.suse.com/security/cve/CVE-2012-0451/" source="CVE"/>
		<reference ref_id="CVE-2012-0452" ref_url="https://www.suse.com/security/cve/CVE-2012-0452/" source="CVE"/>
		<reference ref_id="CVE-2012-0455" ref_url="https://www.suse.com/security/cve/CVE-2012-0455/" source="CVE"/>
		<reference ref_id="CVE-2012-0456" ref_url="https://www.suse.com/security/cve/CVE-2012-0456/" source="CVE"/>
		<reference ref_id="CVE-2012-0457" ref_url="https://www.suse.com/security/cve/CVE-2012-0457/" source="CVE"/>
		<reference ref_id="CVE-2012-0458" ref_url="https://www.suse.com/security/cve/CVE-2012-0458/" source="CVE"/>
		<reference ref_id="CVE-2012-0459" ref_url="https://www.suse.com/security/cve/CVE-2012-0459/" source="CVE"/>
		<reference ref_id="CVE-2012-0460" ref_url="https://www.suse.com/security/cve/CVE-2012-0460/" source="CVE"/>
		<reference ref_id="CVE-2012-0461" ref_url="https://www.suse.com/security/cve/CVE-2012-0461/" source="CVE"/>
		<reference ref_id="CVE-2012-0462" ref_url="https://www.suse.com/security/cve/CVE-2012-0462/" source="CVE"/>
		<reference ref_id="CVE-2012-0463" ref_url="https://www.suse.com/security/cve/CVE-2012-0463/" source="CVE"/>
		<reference ref_id="CVE-2012-0464" ref_url="https://www.suse.com/security/cve/CVE-2012-0464/" source="CVE"/>
		<reference ref_id="CVE-2012-0467" ref_url="https://www.suse.com/security/cve/CVE-2012-0467/" source="CVE"/>
		<reference ref_id="CVE-2012-0468" ref_url="https://www.suse.com/security/cve/CVE-2012-0468/" source="CVE"/>
		<reference ref_id="CVE-2012-0469" ref_url="https://www.suse.com/security/cve/CVE-2012-0469/" source="CVE"/>
		<reference ref_id="CVE-2012-0470" ref_url="https://www.suse.com/security/cve/CVE-2012-0470/" source="CVE"/>
		<reference ref_id="CVE-2012-0471" ref_url="https://www.suse.com/security/cve/CVE-2012-0471/" source="CVE"/>
		<reference ref_id="CVE-2012-0472" ref_url="https://www.suse.com/security/cve/CVE-2012-0472/" source="CVE"/>
		<reference ref_id="CVE-2012-0473" ref_url="https://www.suse.com/security/cve/CVE-2012-0473/" source="CVE"/>
		<reference ref_id="CVE-2012-0474" ref_url="https://www.suse.com/security/cve/CVE-2012-0474/" source="CVE"/>
		<reference ref_id="CVE-2012-0475" ref_url="https://www.suse.com/security/cve/CVE-2012-0475/" source="CVE"/>
		<reference ref_id="CVE-2012-0477" ref_url="https://www.suse.com/security/cve/CVE-2012-0477/" source="CVE"/>
		<reference ref_id="CVE-2012-0478" ref_url="https://www.suse.com/security/cve/CVE-2012-0478/" source="CVE"/>
		<reference ref_id="CVE-2012-0479" ref_url="https://www.suse.com/security/cve/CVE-2012-0479/" source="CVE"/>
		<reference ref_id="CVE-2012-0759" ref_url="https://www.suse.com/security/cve/CVE-2012-0759/" source="CVE"/>
		<reference ref_id="CVE-2012-1937" ref_url="https://www.suse.com/security/cve/CVE-2012-1937/" source="CVE"/>
		<reference ref_id="CVE-2012-1938" ref_url="https://www.suse.com/security/cve/CVE-2012-1938/" source="CVE"/>
		<reference ref_id="CVE-2012-1940" ref_url="https://www.suse.com/security/cve/CVE-2012-1940/" source="CVE"/>
		<reference ref_id="CVE-2012-1941" ref_url="https://www.suse.com/security/cve/CVE-2012-1941/" source="CVE"/>
		<reference ref_id="CVE-2012-1944" ref_url="https://www.suse.com/security/cve/CVE-2012-1944/" source="CVE"/>
		<reference ref_id="CVE-2012-1945" ref_url="https://www.suse.com/security/cve/CVE-2012-1945/" source="CVE"/>
		<reference ref_id="CVE-2012-1946" ref_url="https://www.suse.com/security/cve/CVE-2012-1946/" source="CVE"/>
		<reference ref_id="CVE-2012-1947" ref_url="https://www.suse.com/security/cve/CVE-2012-1947/" source="CVE"/>
		<reference ref_id="CVE-2012-1948" ref_url="https://www.suse.com/security/cve/CVE-2012-1948/" source="CVE"/>
		<reference ref_id="CVE-2012-1949" ref_url="https://www.suse.com/security/cve/CVE-2012-1949/" source="CVE"/>
		<reference ref_id="CVE-2012-1950" ref_url="https://www.suse.com/security/cve/CVE-2012-1950/" source="CVE"/>
		<reference ref_id="CVE-2012-1951" ref_url="https://www.suse.com/security/cve/CVE-2012-1951/" source="CVE"/>
		<reference ref_id="CVE-2012-1952" ref_url="https://www.suse.com/security/cve/CVE-2012-1952/" source="CVE"/>
		<reference ref_id="CVE-2012-1953" ref_url="https://www.suse.com/security/cve/CVE-2012-1953/" source="CVE"/>
		<reference ref_id="CVE-2012-1954" ref_url="https://www.suse.com/security/cve/CVE-2012-1954/" source="CVE"/>
		<reference ref_id="CVE-2012-1955" ref_url="https://www.suse.com/security/cve/CVE-2012-1955/" source="CVE"/>
		<reference ref_id="CVE-2012-1956" ref_url="https://www.suse.com/security/cve/CVE-2012-1956/" source="CVE"/>
		<reference ref_id="CVE-2012-1957" ref_url="https://www.suse.com/security/cve/CVE-2012-1957/" source="CVE"/>
		<reference ref_id="CVE-2012-1958" ref_url="https://www.suse.com/security/cve/CVE-2012-1958/" source="CVE"/>
		<reference ref_id="CVE-2012-1959" ref_url="https://www.suse.com/security/cve/CVE-2012-1959/" source="CVE"/>
		<reference ref_id="CVE-2012-1960" ref_url="https://www.suse.com/security/cve/CVE-2012-1960/" source="CVE"/>
		<reference ref_id="CVE-2012-1961" ref_url="https://www.suse.com/security/cve/CVE-2012-1961/" source="CVE"/>
		<reference ref_id="CVE-2012-1962" ref_url="https://www.suse.com/security/cve/CVE-2012-1962/" source="CVE"/>
		<reference ref_id="CVE-2012-1963" ref_url="https://www.suse.com/security/cve/CVE-2012-1963/" source="CVE"/>
		<reference ref_id="CVE-2012-1965" ref_url="https://www.suse.com/security/cve/CVE-2012-1965/" source="CVE"/>
		<reference ref_id="CVE-2012-1966" ref_url="https://www.suse.com/security/cve/CVE-2012-1966/" source="CVE"/>
		<reference ref_id="CVE-2012-1967" ref_url="https://www.suse.com/security/cve/CVE-2012-1967/" source="CVE"/>
		<reference ref_id="CVE-2012-1970" ref_url="https://www.suse.com/security/cve/CVE-2012-1970/" source="CVE"/>
		<reference ref_id="CVE-2012-1972" ref_url="https://www.suse.com/security/cve/CVE-2012-1972/" source="CVE"/>
		<reference ref_id="CVE-2012-1973" ref_url="https://www.suse.com/security/cve/CVE-2012-1973/" source="CVE"/>
		<reference ref_id="CVE-2012-1974" ref_url="https://www.suse.com/security/cve/CVE-2012-1974/" source="CVE"/>
		<reference ref_id="CVE-2012-1975" ref_url="https://www.suse.com/security/cve/CVE-2012-1975/" source="CVE"/>
		<reference ref_id="CVE-2012-1976" ref_url="https://www.suse.com/security/cve/CVE-2012-1976/" source="CVE"/>
		<reference ref_id="CVE-2012-3956" ref_url="https://www.suse.com/security/cve/CVE-2012-3956/" source="CVE"/>
		<reference ref_id="CVE-2012-3957" ref_url="https://www.suse.com/security/cve/CVE-2012-3957/" source="CVE"/>
		<reference ref_id="CVE-2012-3958" ref_url="https://www.suse.com/security/cve/CVE-2012-3958/" source="CVE"/>
		<reference ref_id="CVE-2012-3959" ref_url="https://www.suse.com/security/cve/CVE-2012-3959/" source="CVE"/>
		<reference ref_id="CVE-2012-3960" ref_url="https://www.suse.com/security/cve/CVE-2012-3960/" source="CVE"/>
		<reference ref_id="CVE-2012-3961" ref_url="https://www.suse.com/security/cve/CVE-2012-3961/" source="CVE"/>
		<reference ref_id="CVE-2012-3962" ref_url="https://www.suse.com/security/cve/CVE-2012-3962/" source="CVE"/>
		<reference ref_id="CVE-2012-3963" ref_url="https://www.suse.com/security/cve/CVE-2012-3963/" source="CVE"/>
		<reference ref_id="CVE-2012-3964" ref_url="https://www.suse.com/security/cve/CVE-2012-3964/" source="CVE"/>
		<reference ref_id="CVE-2012-3965" ref_url="https://www.suse.com/security/cve/CVE-2012-3965/" source="CVE"/>
		<reference ref_id="CVE-2012-3966" ref_url="https://www.suse.com/security/cve/CVE-2012-3966/" source="CVE"/>
		<reference ref_id="CVE-2012-3967" ref_url="https://www.suse.com/security/cve/CVE-2012-3967/" source="CVE"/>
		<reference ref_id="CVE-2012-3968" ref_url="https://www.suse.com/security/cve/CVE-2012-3968/" source="CVE"/>
		<reference ref_id="CVE-2012-3969" ref_url="https://www.suse.com/security/cve/CVE-2012-3969/" source="CVE"/>
		<reference ref_id="CVE-2012-3970" ref_url="https://www.suse.com/security/cve/CVE-2012-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-3971" ref_url="https://www.suse.com/security/cve/CVE-2012-3971/" source="CVE"/>
		<reference ref_id="CVE-2012-3972" ref_url="https://www.suse.com/security/cve/CVE-2012-3972/" source="CVE"/>
		<reference ref_id="CVE-2012-3973" ref_url="https://www.suse.com/security/cve/CVE-2012-3973/" source="CVE"/>
		<reference ref_id="CVE-2012-3975" ref_url="https://www.suse.com/security/cve/CVE-2012-3975/" source="CVE"/>
		<reference ref_id="CVE-2012-3976" ref_url="https://www.suse.com/security/cve/CVE-2012-3976/" source="CVE"/>
		<reference ref_id="CVE-2012-3978" ref_url="https://www.suse.com/security/cve/CVE-2012-3978/" source="CVE"/>
		<reference ref_id="CVE-2012-3980" ref_url="https://www.suse.com/security/cve/CVE-2012-3980/" source="CVE"/>
		<reference ref_id="CVE-2012-3982" ref_url="https://www.suse.com/security/cve/CVE-2012-3982/" source="CVE"/>
		<reference ref_id="CVE-2012-3983" ref_url="https://www.suse.com/security/cve/CVE-2012-3983/" source="CVE"/>
		<reference ref_id="CVE-2012-3984" ref_url="https://www.suse.com/security/cve/CVE-2012-3984/" source="CVE"/>
		<reference ref_id="CVE-2012-3985" ref_url="https://www.suse.com/security/cve/CVE-2012-3985/" source="CVE"/>
		<reference ref_id="CVE-2012-3986" ref_url="https://www.suse.com/security/cve/CVE-2012-3986/" source="CVE"/>
		<reference ref_id="CVE-2012-3988" ref_url="https://www.suse.com/security/cve/CVE-2012-3988/" source="CVE"/>
		<reference ref_id="CVE-2012-3989" ref_url="https://www.suse.com/security/cve/CVE-2012-3989/" source="CVE"/>
		<reference ref_id="CVE-2012-3990" ref_url="https://www.suse.com/security/cve/CVE-2012-3990/" source="CVE"/>
		<reference ref_id="CVE-2012-3991" ref_url="https://www.suse.com/security/cve/CVE-2012-3991/" source="CVE"/>
		<reference ref_id="CVE-2012-3992" ref_url="https://www.suse.com/security/cve/CVE-2012-3992/" source="CVE"/>
		<reference ref_id="CVE-2012-3993" ref_url="https://www.suse.com/security/cve/CVE-2012-3993/" source="CVE"/>
		<reference ref_id="CVE-2012-3994" ref_url="https://www.suse.com/security/cve/CVE-2012-3994/" source="CVE"/>
		<reference ref_id="CVE-2012-3995" ref_url="https://www.suse.com/security/cve/CVE-2012-3995/" source="CVE"/>
		<reference ref_id="CVE-2012-4179" ref_url="https://www.suse.com/security/cve/CVE-2012-4179/" source="CVE"/>
		<reference ref_id="CVE-2012-4180" ref_url="https://www.suse.com/security/cve/CVE-2012-4180/" source="CVE"/>
		<reference ref_id="CVE-2012-4181" ref_url="https://www.suse.com/security/cve/CVE-2012-4181/" source="CVE"/>
		<reference ref_id="CVE-2012-4182" ref_url="https://www.suse.com/security/cve/CVE-2012-4182/" source="CVE"/>
		<reference ref_id="CVE-2012-4183" ref_url="https://www.suse.com/security/cve/CVE-2012-4183/" source="CVE"/>
		<reference ref_id="CVE-2012-4184" ref_url="https://www.suse.com/security/cve/CVE-2012-4184/" source="CVE"/>
		<reference ref_id="CVE-2012-4185" ref_url="https://www.suse.com/security/cve/CVE-2012-4185/" source="CVE"/>
		<reference ref_id="CVE-2012-4186" ref_url="https://www.suse.com/security/cve/CVE-2012-4186/" source="CVE"/>
		<reference ref_id="CVE-2012-4187" ref_url="https://www.suse.com/security/cve/CVE-2012-4187/" source="CVE"/>
		<reference ref_id="CVE-2012-4188" ref_url="https://www.suse.com/security/cve/CVE-2012-4188/" source="CVE"/>
		<reference ref_id="CVE-2012-4191" ref_url="https://www.suse.com/security/cve/CVE-2012-4191/" source="CVE"/>
		<reference ref_id="CVE-2012-4192" ref_url="https://www.suse.com/security/cve/CVE-2012-4192/" source="CVE"/>
		<reference ref_id="CVE-2012-4193" ref_url="https://www.suse.com/security/cve/CVE-2012-4193/" source="CVE"/>
		<reference ref_id="CVE-2012-4194" ref_url="https://www.suse.com/security/cve/CVE-2012-4194/" source="CVE"/>
		<reference ref_id="CVE-2012-4195" ref_url="https://www.suse.com/security/cve/CVE-2012-4195/" source="CVE"/>
		<reference ref_id="CVE-2012-4196" ref_url="https://www.suse.com/security/cve/CVE-2012-4196/" source="CVE"/>
		<reference ref_id="CVE-2012-4201" ref_url="https://www.suse.com/security/cve/CVE-2012-4201/" source="CVE"/>
		<reference ref_id="CVE-2012-4202" ref_url="https://www.suse.com/security/cve/CVE-2012-4202/" source="CVE"/>
		<reference ref_id="CVE-2012-4203" ref_url="https://www.suse.com/security/cve/CVE-2012-4203/" source="CVE"/>
		<reference ref_id="CVE-2012-4204" ref_url="https://www.suse.com/security/cve/CVE-2012-4204/" source="CVE"/>
		<reference ref_id="CVE-2012-4205" ref_url="https://www.suse.com/security/cve/CVE-2012-4205/" source="CVE"/>
		<reference ref_id="CVE-2012-4207" ref_url="https://www.suse.com/security/cve/CVE-2012-4207/" source="CVE"/>
		<reference ref_id="CVE-2012-4208" ref_url="https://www.suse.com/security/cve/CVE-2012-4208/" source="CVE"/>
		<reference ref_id="CVE-2012-4209" ref_url="https://www.suse.com/security/cve/CVE-2012-4209/" source="CVE"/>
		<reference ref_id="CVE-2012-4210" ref_url="https://www.suse.com/security/cve/CVE-2012-4210/" source="CVE"/>
		<reference ref_id="CVE-2012-4212" ref_url="https://www.suse.com/security/cve/CVE-2012-4212/" source="CVE"/>
		<reference ref_id="CVE-2012-4213" ref_url="https://www.suse.com/security/cve/CVE-2012-4213/" source="CVE"/>
		<reference ref_id="CVE-2012-4214" ref_url="https://www.suse.com/security/cve/CVE-2012-4214/" source="CVE"/>
		<reference ref_id="CVE-2012-4215" ref_url="https://www.suse.com/security/cve/CVE-2012-4215/" source="CVE"/>
		<reference ref_id="CVE-2012-4216" ref_url="https://www.suse.com/security/cve/CVE-2012-4216/" source="CVE"/>
		<reference ref_id="CVE-2012-4217" ref_url="https://www.suse.com/security/cve/CVE-2012-4217/" source="CVE"/>
		<reference ref_id="CVE-2012-4218" ref_url="https://www.suse.com/security/cve/CVE-2012-4218/" source="CVE"/>
		<reference ref_id="CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829/" source="CVE"/>
		<reference ref_id="CVE-2012-5830" ref_url="https://www.suse.com/security/cve/CVE-2012-5830/" source="CVE"/>
		<reference ref_id="CVE-2012-5833" ref_url="https://www.suse.com/security/cve/CVE-2012-5833/" source="CVE"/>
		<reference ref_id="CVE-2012-5835" ref_url="https://www.suse.com/security/cve/CVE-2012-5835/" source="CVE"/>
		<reference ref_id="CVE-2012-5836" ref_url="https://www.suse.com/security/cve/CVE-2012-5836/" source="CVE"/>
		<reference ref_id="CVE-2012-5837" ref_url="https://www.suse.com/security/cve/CVE-2012-5837/" source="CVE"/>
		<reference ref_id="CVE-2012-5838" ref_url="https://www.suse.com/security/cve/CVE-2012-5838/" source="CVE"/>
		<reference ref_id="CVE-2012-5839" ref_url="https://www.suse.com/security/cve/CVE-2012-5839/" source="CVE"/>
		<reference ref_id="CVE-2012-5840" ref_url="https://www.suse.com/security/cve/CVE-2012-5840/" source="CVE"/>
		<reference ref_id="CVE-2012-5841" ref_url="https://www.suse.com/security/cve/CVE-2012-5841/" source="CVE"/>
		<reference ref_id="CVE-2012-5842" ref_url="https://www.suse.com/security/cve/CVE-2012-5842/" source="CVE"/>
		<reference ref_id="CVE-2012-5843" ref_url="https://www.suse.com/security/cve/CVE-2012-5843/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<reference ref_id="CVE-2013-0744" ref_url="https://www.suse.com/security/cve/CVE-2013-0744/" source="CVE"/>
		<reference ref_id="CVE-2013-0745" ref_url="https://www.suse.com/security/cve/CVE-2013-0745/" source="CVE"/>
		<reference ref_id="CVE-2013-0746" ref_url="https://www.suse.com/security/cve/CVE-2013-0746/" source="CVE"/>
		<reference ref_id="CVE-2013-0747" ref_url="https://www.suse.com/security/cve/CVE-2013-0747/" source="CVE"/>
		<reference ref_id="CVE-2013-0748" ref_url="https://www.suse.com/security/cve/CVE-2013-0748/" source="CVE"/>
		<reference ref_id="CVE-2013-0749" ref_url="https://www.suse.com/security/cve/CVE-2013-0749/" source="CVE"/>
		<reference ref_id="CVE-2013-0750" ref_url="https://www.suse.com/security/cve/CVE-2013-0750/" source="CVE"/>
		<reference ref_id="CVE-2013-0751" ref_url="https://www.suse.com/security/cve/CVE-2013-0751/" source="CVE"/>
		<reference ref_id="CVE-2013-0752" ref_url="https://www.suse.com/security/cve/CVE-2013-0752/" source="CVE"/>
		<reference ref_id="CVE-2013-0753" ref_url="https://www.suse.com/security/cve/CVE-2013-0753/" source="CVE"/>
		<reference ref_id="CVE-2013-0754" ref_url="https://www.suse.com/security/cve/CVE-2013-0754/" source="CVE"/>
		<reference ref_id="CVE-2013-0755" ref_url="https://www.suse.com/security/cve/CVE-2013-0755/" source="CVE"/>
		<reference ref_id="CVE-2013-0756" ref_url="https://www.suse.com/security/cve/CVE-2013-0756/" source="CVE"/>
		<reference ref_id="CVE-2013-0757" ref_url="https://www.suse.com/security/cve/CVE-2013-0757/" source="CVE"/>
		<reference ref_id="CVE-2013-0758" ref_url="https://www.suse.com/security/cve/CVE-2013-0758/" source="CVE"/>
		<reference ref_id="CVE-2013-0760" ref_url="https://www.suse.com/security/cve/CVE-2013-0760/" source="CVE"/>
		<reference ref_id="CVE-2013-0761" ref_url="https://www.suse.com/security/cve/CVE-2013-0761/" source="CVE"/>
		<reference ref_id="CVE-2013-0762" ref_url="https://www.suse.com/security/cve/CVE-2013-0762/" source="CVE"/>
		<reference ref_id="CVE-2013-0763" ref_url="https://www.suse.com/security/cve/CVE-2013-0763/" source="CVE"/>
		<reference ref_id="CVE-2013-0764" ref_url="https://www.suse.com/security/cve/CVE-2013-0764/" source="CVE"/>
		<reference ref_id="CVE-2013-0765" ref_url="https://www.suse.com/security/cve/CVE-2013-0765/" source="CVE"/>
		<reference ref_id="CVE-2013-0766" ref_url="https://www.suse.com/security/cve/CVE-2013-0766/" source="CVE"/>
		<reference ref_id="CVE-2013-0767" ref_url="https://www.suse.com/security/cve/CVE-2013-0767/" source="CVE"/>
		<reference ref_id="CVE-2013-0768" ref_url="https://www.suse.com/security/cve/CVE-2013-0768/" source="CVE"/>
		<reference ref_id="CVE-2013-0769" ref_url="https://www.suse.com/security/cve/CVE-2013-0769/" source="CVE"/>
		<reference ref_id="CVE-2013-0770" ref_url="https://www.suse.com/security/cve/CVE-2013-0770/" source="CVE"/>
		<reference ref_id="CVE-2013-0771" ref_url="https://www.suse.com/security/cve/CVE-2013-0771/" source="CVE"/>
		<reference ref_id="CVE-2013-0772" ref_url="https://www.suse.com/security/cve/CVE-2013-0772/" source="CVE"/>
		<reference ref_id="CVE-2013-0773" ref_url="https://www.suse.com/security/cve/CVE-2013-0773/" source="CVE"/>
		<reference ref_id="CVE-2013-0774" ref_url="https://www.suse.com/security/cve/CVE-2013-0774/" source="CVE"/>
		<reference ref_id="CVE-2013-0775" ref_url="https://www.suse.com/security/cve/CVE-2013-0775/" source="CVE"/>
		<reference ref_id="CVE-2013-0776" ref_url="https://www.suse.com/security/cve/CVE-2013-0776/" source="CVE"/>
		<reference ref_id="CVE-2013-0777" ref_url="https://www.suse.com/security/cve/CVE-2013-0777/" source="CVE"/>
		<reference ref_id="CVE-2013-0778" ref_url="https://www.suse.com/security/cve/CVE-2013-0778/" source="CVE"/>
		<reference ref_id="CVE-2013-0779" ref_url="https://www.suse.com/security/cve/CVE-2013-0779/" source="CVE"/>
		<reference ref_id="CVE-2013-0780" ref_url="https://www.suse.com/security/cve/CVE-2013-0780/" source="CVE"/>
		<reference ref_id="CVE-2013-0781" ref_url="https://www.suse.com/security/cve/CVE-2013-0781/" source="CVE"/>
		<reference ref_id="CVE-2013-0782" ref_url="https://www.suse.com/security/cve/CVE-2013-0782/" source="CVE"/>
		<reference ref_id="CVE-2013-0783" ref_url="https://www.suse.com/security/cve/CVE-2013-0783/" source="CVE"/>
		<reference ref_id="CVE-2013-0787" ref_url="https://www.suse.com/security/cve/CVE-2013-0787/" source="CVE"/>
		<reference ref_id="CVE-2013-0788" ref_url="https://www.suse.com/security/cve/CVE-2013-0788/" source="CVE"/>
		<reference ref_id="CVE-2013-0789" ref_url="https://www.suse.com/security/cve/CVE-2013-0789/" source="CVE"/>
		<reference ref_id="CVE-2013-0792" ref_url="https://www.suse.com/security/cve/CVE-2013-0792/" source="CVE"/>
		<reference ref_id="CVE-2013-0793" ref_url="https://www.suse.com/security/cve/CVE-2013-0793/" source="CVE"/>
		<reference ref_id="CVE-2013-0794" ref_url="https://www.suse.com/security/cve/CVE-2013-0794/" source="CVE"/>
		<reference ref_id="CVE-2013-0795" ref_url="https://www.suse.com/security/cve/CVE-2013-0795/" source="CVE"/>
		<reference ref_id="CVE-2013-0796" ref_url="https://www.suse.com/security/cve/CVE-2013-0796/" source="CVE"/>
		<reference ref_id="CVE-2013-0800" ref_url="https://www.suse.com/security/cve/CVE-2013-0800/" source="CVE"/>
		<reference ref_id="CVE-2013-0801" ref_url="https://www.suse.com/security/cve/CVE-2013-0801/" source="CVE"/>
		<reference ref_id="CVE-2013-1669" ref_url="https://www.suse.com/security/cve/CVE-2013-1669/" source="CVE"/>
		<reference ref_id="CVE-2013-1670" ref_url="https://www.suse.com/security/cve/CVE-2013-1670/" source="CVE"/>
		<reference ref_id="CVE-2013-1671" ref_url="https://www.suse.com/security/cve/CVE-2013-1671/" source="CVE"/>
		<reference ref_id="CVE-2013-1674" ref_url="https://www.suse.com/security/cve/CVE-2013-1674/" source="CVE"/>
		<reference ref_id="CVE-2013-1675" ref_url="https://www.suse.com/security/cve/CVE-2013-1675/" source="CVE"/>
		<reference ref_id="CVE-2013-1676" ref_url="https://www.suse.com/security/cve/CVE-2013-1676/" source="CVE"/>
		<reference ref_id="CVE-2013-1677" ref_url="https://www.suse.com/security/cve/CVE-2013-1677/" source="CVE"/>
		<reference ref_id="CVE-2013-1678" ref_url="https://www.suse.com/security/cve/CVE-2013-1678/" source="CVE"/>
		<reference ref_id="CVE-2013-1679" ref_url="https://www.suse.com/security/cve/CVE-2013-1679/" source="CVE"/>
		<reference ref_id="CVE-2013-1680" ref_url="https://www.suse.com/security/cve/CVE-2013-1680/" source="CVE"/>
		<reference ref_id="CVE-2013-1681" ref_url="https://www.suse.com/security/cve/CVE-2013-1681/" source="CVE"/>
		<reference ref_id="CVE-2013-1682" ref_url="https://www.suse.com/security/cve/CVE-2013-1682/" source="CVE"/>
		<reference ref_id="CVE-2013-1683" ref_url="https://www.suse.com/security/cve/CVE-2013-1683/" source="CVE"/>
		<reference ref_id="CVE-2013-1684" ref_url="https://www.suse.com/security/cve/CVE-2013-1684/" source="CVE"/>
		<reference ref_id="CVE-2013-1685" ref_url="https://www.suse.com/security/cve/CVE-2013-1685/" source="CVE"/>
		<reference ref_id="CVE-2013-1686" ref_url="https://www.suse.com/security/cve/CVE-2013-1686/" source="CVE"/>
		<reference ref_id="CVE-2013-1687" ref_url="https://www.suse.com/security/cve/CVE-2013-1687/" source="CVE"/>
		<reference ref_id="CVE-2013-1688" ref_url="https://www.suse.com/security/cve/CVE-2013-1688/" source="CVE"/>
		<reference ref_id="CVE-2013-1690" ref_url="https://www.suse.com/security/cve/CVE-2013-1690/" source="CVE"/>
		<reference ref_id="CVE-2013-1692" ref_url="https://www.suse.com/security/cve/CVE-2013-1692/" source="CVE"/>
		<reference ref_id="CVE-2013-1693" ref_url="https://www.suse.com/security/cve/CVE-2013-1693/" source="CVE"/>
		<reference ref_id="CVE-2013-1694" ref_url="https://www.suse.com/security/cve/CVE-2013-1694/" source="CVE"/>
		<reference ref_id="CVE-2013-1695" ref_url="https://www.suse.com/security/cve/CVE-2013-1695/" source="CVE"/>
		<reference ref_id="CVE-2013-1696" ref_url="https://www.suse.com/security/cve/CVE-2013-1696/" source="CVE"/>
		<reference ref_id="CVE-2013-1697" ref_url="https://www.suse.com/security/cve/CVE-2013-1697/" source="CVE"/>
		<reference ref_id="CVE-2013-1698" ref_url="https://www.suse.com/security/cve/CVE-2013-1698/" source="CVE"/>
		<reference ref_id="CVE-2013-1699" ref_url="https://www.suse.com/security/cve/CVE-2013-1699/" source="CVE"/>
		<reference ref_id="CVE-2013-1701" ref_url="https://www.suse.com/security/cve/CVE-2013-1701/" source="CVE"/>
		<reference ref_id="CVE-2013-1702" ref_url="https://www.suse.com/security/cve/CVE-2013-1702/" source="CVE"/>
		<reference ref_id="CVE-2013-1704" ref_url="https://www.suse.com/security/cve/CVE-2013-1704/" source="CVE"/>
		<reference ref_id="CVE-2013-1705" ref_url="https://www.suse.com/security/cve/CVE-2013-1705/" source="CVE"/>
		<reference ref_id="CVE-2013-1708" ref_url="https://www.suse.com/security/cve/CVE-2013-1708/" source="CVE"/>
		<reference ref_id="CVE-2013-1709" ref_url="https://www.suse.com/security/cve/CVE-2013-1709/" source="CVE"/>
		<reference ref_id="CVE-2013-1710" ref_url="https://www.suse.com/security/cve/CVE-2013-1710/" source="CVE"/>
		<reference ref_id="CVE-2013-1711" ref_url="https://www.suse.com/security/cve/CVE-2013-1711/" source="CVE"/>
		<reference ref_id="CVE-2013-1713" ref_url="https://www.suse.com/security/cve/CVE-2013-1713/" source="CVE"/>
		<reference ref_id="CVE-2013-1714" ref_url="https://www.suse.com/security/cve/CVE-2013-1714/" source="CVE"/>
		<reference ref_id="CVE-2013-1717" ref_url="https://www.suse.com/security/cve/CVE-2013-1717/" source="CVE"/>
		<reference ref_id="CVE-2013-1718" ref_url="https://www.suse.com/security/cve/CVE-2013-1718/" source="CVE"/>
		<reference ref_id="CVE-2013-1719" ref_url="https://www.suse.com/security/cve/CVE-2013-1719/" source="CVE"/>
		<reference ref_id="CVE-2013-1720" ref_url="https://www.suse.com/security/cve/CVE-2013-1720/" source="CVE"/>
		<reference ref_id="CVE-2013-1721" ref_url="https://www.suse.com/security/cve/CVE-2013-1721/" source="CVE"/>
		<reference ref_id="CVE-2013-1722" ref_url="https://www.suse.com/security/cve/CVE-2013-1722/" source="CVE"/>
		<reference ref_id="CVE-2013-1723" ref_url="https://www.suse.com/security/cve/CVE-2013-1723/" source="CVE"/>
		<reference ref_id="CVE-2013-1724" ref_url="https://www.suse.com/security/cve/CVE-2013-1724/" source="CVE"/>
		<reference ref_id="CVE-2013-1725" ref_url="https://www.suse.com/security/cve/CVE-2013-1725/" source="CVE"/>
		<reference ref_id="CVE-2013-1728" ref_url="https://www.suse.com/security/cve/CVE-2013-1728/" source="CVE"/>
		<reference ref_id="CVE-2013-1730" ref_url="https://www.suse.com/security/cve/CVE-2013-1730/" source="CVE"/>
		<reference ref_id="CVE-2013-1732" ref_url="https://www.suse.com/security/cve/CVE-2013-1732/" source="CVE"/>
		<reference ref_id="CVE-2013-1735" ref_url="https://www.suse.com/security/cve/CVE-2013-1735/" source="CVE"/>
		<reference ref_id="CVE-2013-1736" ref_url="https://www.suse.com/security/cve/CVE-2013-1736/" source="CVE"/>
		<reference ref_id="CVE-2013-1737" ref_url="https://www.suse.com/security/cve/CVE-2013-1737/" source="CVE"/>
		<reference ref_id="CVE-2013-1738" ref_url="https://www.suse.com/security/cve/CVE-2013-1738/" source="CVE"/>
		<reference ref_id="CVE-2013-5590" ref_url="https://www.suse.com/security/cve/CVE-2013-5590/" source="CVE"/>
		<reference ref_id="CVE-2013-5591" ref_url="https://www.suse.com/security/cve/CVE-2013-5591/" source="CVE"/>
		<reference ref_id="CVE-2013-5592" ref_url="https://www.suse.com/security/cve/CVE-2013-5592/" source="CVE"/>
		<reference ref_id="CVE-2013-5593" ref_url="https://www.suse.com/security/cve/CVE-2013-5593/" source="CVE"/>
		<reference ref_id="CVE-2013-5595" ref_url="https://www.suse.com/security/cve/CVE-2013-5595/" source="CVE"/>
		<reference ref_id="CVE-2013-5596" ref_url="https://www.suse.com/security/cve/CVE-2013-5596/" source="CVE"/>
		<reference ref_id="CVE-2013-5597" ref_url="https://www.suse.com/security/cve/CVE-2013-5597/" source="CVE"/>
		<reference ref_id="CVE-2013-5598" ref_url="https://www.suse.com/security/cve/CVE-2013-5598/" source="CVE"/>
		<reference ref_id="CVE-2013-5599" ref_url="https://www.suse.com/security/cve/CVE-2013-5599/" source="CVE"/>
		<reference ref_id="CVE-2013-5600" ref_url="https://www.suse.com/security/cve/CVE-2013-5600/" source="CVE"/>
		<reference ref_id="CVE-2013-5601" ref_url="https://www.suse.com/security/cve/CVE-2013-5601/" source="CVE"/>
		<reference ref_id="CVE-2013-5602" ref_url="https://www.suse.com/security/cve/CVE-2013-5602/" source="CVE"/>
		<reference ref_id="CVE-2013-5603" ref_url="https://www.suse.com/security/cve/CVE-2013-5603/" source="CVE"/>
		<reference ref_id="CVE-2013-5604" ref_url="https://www.suse.com/security/cve/CVE-2013-5604/" source="CVE"/>
		<reference ref_id="CVE-2013-5609" ref_url="https://www.suse.com/security/cve/CVE-2013-5609/" source="CVE"/>
		<reference ref_id="CVE-2013-5610" ref_url="https://www.suse.com/security/cve/CVE-2013-5610/" source="CVE"/>
		<reference ref_id="CVE-2013-5611" ref_url="https://www.suse.com/security/cve/CVE-2013-5611/" source="CVE"/>
		<reference ref_id="CVE-2013-5612" ref_url="https://www.suse.com/security/cve/CVE-2013-5612/" source="CVE"/>
		<reference ref_id="CVE-2013-5613" ref_url="https://www.suse.com/security/cve/CVE-2013-5613/" source="CVE"/>
		<reference ref_id="CVE-2013-5614" ref_url="https://www.suse.com/security/cve/CVE-2013-5614/" source="CVE"/>
		<reference ref_id="CVE-2013-5615" ref_url="https://www.suse.com/security/cve/CVE-2013-5615/" source="CVE"/>
		<reference ref_id="CVE-2013-5616" ref_url="https://www.suse.com/security/cve/CVE-2013-5616/" source="CVE"/>
		<reference ref_id="CVE-2013-5618" ref_url="https://www.suse.com/security/cve/CVE-2013-5618/" source="CVE"/>
		<reference ref_id="CVE-2013-5619" ref_url="https://www.suse.com/security/cve/CVE-2013-5619/" source="CVE"/>
		<reference ref_id="CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629/" source="CVE"/>
		<reference ref_id="CVE-2013-6630" ref_url="https://www.suse.com/security/cve/CVE-2013-6630/" source="CVE"/>
		<reference ref_id="CVE-2013-6671" ref_url="https://www.suse.com/security/cve/CVE-2013-6671/" source="CVE"/>
		<reference ref_id="CVE-2013-6672" ref_url="https://www.suse.com/security/cve/CVE-2013-6672/" source="CVE"/>
		<reference ref_id="CVE-2013-6673" ref_url="https://www.suse.com/security/cve/CVE-2013-6673/" source="CVE"/>
		<reference ref_id="CVE-2014-1477" ref_url="https://www.suse.com/security/cve/CVE-2014-1477/" source="CVE"/>
		<reference ref_id="CVE-2014-1478" ref_url="https://www.suse.com/security/cve/CVE-2014-1478/" source="CVE"/>
		<reference ref_id="CVE-2014-1479" ref_url="https://www.suse.com/security/cve/CVE-2014-1479/" source="CVE"/>
		<reference ref_id="CVE-2014-1480" ref_url="https://www.suse.com/security/cve/CVE-2014-1480/" source="CVE"/>
		<reference ref_id="CVE-2014-1481" ref_url="https://www.suse.com/security/cve/CVE-2014-1481/" source="CVE"/>
		<reference ref_id="CVE-2014-1482" ref_url="https://www.suse.com/security/cve/CVE-2014-1482/" source="CVE"/>
		<reference ref_id="CVE-2014-1483" ref_url="https://www.suse.com/security/cve/CVE-2014-1483/" source="CVE"/>
		<reference ref_id="CVE-2014-1484" ref_url="https://www.suse.com/security/cve/CVE-2014-1484/" source="CVE"/>
		<reference ref_id="CVE-2014-1485" ref_url="https://www.suse.com/security/cve/CVE-2014-1485/" source="CVE"/>
		<reference ref_id="CVE-2014-1486" ref_url="https://www.suse.com/security/cve/CVE-2014-1486/" source="CVE"/>
		<reference ref_id="CVE-2014-1487" ref_url="https://www.suse.com/security/cve/CVE-2014-1487/" source="CVE"/>
		<reference ref_id="CVE-2014-1488" ref_url="https://www.suse.com/security/cve/CVE-2014-1488/" source="CVE"/>
		<reference ref_id="CVE-2014-1489" ref_url="https://www.suse.com/security/cve/CVE-2014-1489/" source="CVE"/>
		<reference ref_id="CVE-2014-1490" ref_url="https://www.suse.com/security/cve/CVE-2014-1490/" source="CVE"/>
		<reference ref_id="CVE-2014-1491" ref_url="https://www.suse.com/security/cve/CVE-2014-1491/" source="CVE"/>
		<reference ref_id="CVE-2014-1544" ref_url="https://www.suse.com/security/cve/CVE-2014-1544/" source="CVE"/>
		<reference ref_id="CVE-2014-1547" ref_url="https://www.suse.com/security/cve/CVE-2014-1547/" source="CVE"/>
		<reference ref_id="CVE-2014-1548" ref_url="https://www.suse.com/security/cve/CVE-2014-1548/" source="CVE"/>
		<reference ref_id="CVE-2014-1553" ref_url="https://www.suse.com/security/cve/CVE-2014-1553/" source="CVE"/>
		<reference ref_id="CVE-2014-1554" ref_url="https://www.suse.com/security/cve/CVE-2014-1554/" source="CVE"/>
		<reference ref_id="CVE-2014-1555" ref_url="https://www.suse.com/security/cve/CVE-2014-1555/" source="CVE"/>
		<reference ref_id="CVE-2014-1556" ref_url="https://www.suse.com/security/cve/CVE-2014-1556/" source="CVE"/>
		<reference ref_id="CVE-2014-1557" ref_url="https://www.suse.com/security/cve/CVE-2014-1557/" source="CVE"/>
		<reference ref_id="CVE-2014-1562" ref_url="https://www.suse.com/security/cve/CVE-2014-1562/" source="CVE"/>
		<reference ref_id="CVE-2014-1563" ref_url="https://www.suse.com/security/cve/CVE-2014-1563/" source="CVE"/>
		<reference ref_id="CVE-2014-1564" ref_url="https://www.suse.com/security/cve/CVE-2014-1564/" source="CVE"/>
		<reference ref_id="CVE-2014-1565" ref_url="https://www.suse.com/security/cve/CVE-2014-1565/" source="CVE"/>
		<reference ref_id="CVE-2014-1567" ref_url="https://www.suse.com/security/cve/CVE-2014-1567/" source="CVE"/>
		<reference ref_id="CVE-2014-1574" ref_url="https://www.suse.com/security/cve/CVE-2014-1574/" source="CVE"/>
		<reference ref_id="CVE-2014-1575" ref_url="https://www.suse.com/security/cve/CVE-2014-1575/" source="CVE"/>
		<reference ref_id="CVE-2014-1576" ref_url="https://www.suse.com/security/cve/CVE-2014-1576/" source="CVE"/>
		<reference ref_id="CVE-2014-1577" ref_url="https://www.suse.com/security/cve/CVE-2014-1577/" source="CVE"/>
		<reference ref_id="CVE-2014-1578" ref_url="https://www.suse.com/security/cve/CVE-2014-1578/" source="CVE"/>
		<reference ref_id="CVE-2014-1581" ref_url="https://www.suse.com/security/cve/CVE-2014-1581/" source="CVE"/>
		<reference ref_id="CVE-2014-1583" ref_url="https://www.suse.com/security/cve/CVE-2014-1583/" source="CVE"/>
		<reference ref_id="CVE-2014-1585" ref_url="https://www.suse.com/security/cve/CVE-2014-1585/" source="CVE"/>
		<reference ref_id="CVE-2014-1586" ref_url="https://www.suse.com/security/cve/CVE-2014-1586/" source="CVE"/>
		<reference ref_id="CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587/" source="CVE"/>
		<reference ref_id="CVE-2014-1588" ref_url="https://www.suse.com/security/cve/CVE-2014-1588/" source="CVE"/>
		<reference ref_id="CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590/" source="CVE"/>
		<reference ref_id="CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592/" source="CVE"/>
		<reference ref_id="CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593/" source="CVE"/>
		<reference ref_id="CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594/" source="CVE"/>
		<reference ref_id="CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634/" source="CVE"/>
		<reference ref_id="CVE-2014-8635" ref_url="https://www.suse.com/security/cve/CVE-2014-8635/" source="CVE"/>
		<reference ref_id="CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638/" source="CVE"/>
		<reference ref_id="CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639/" source="CVE"/>
		<reference ref_id="CVE-2014-8641" ref_url="https://www.suse.com/security/cve/CVE-2014-8641/" source="CVE"/>
		<reference ref_id="CVE-2015-0797" ref_url="https://www.suse.com/security/cve/CVE-2015-0797/" source="CVE"/>
		<reference ref_id="CVE-2015-0801" ref_url="https://www.suse.com/security/cve/CVE-2015-0801/" source="CVE"/>
		<reference ref_id="CVE-2015-0807" ref_url="https://www.suse.com/security/cve/CVE-2015-0807/" source="CVE"/>
		<reference ref_id="CVE-2015-0813" ref_url="https://www.suse.com/security/cve/CVE-2015-0813/" source="CVE"/>
		<reference ref_id="CVE-2015-0814" ref_url="https://www.suse.com/security/cve/CVE-2015-0814/" source="CVE"/>
		<reference ref_id="CVE-2015-0815" ref_url="https://www.suse.com/security/cve/CVE-2015-0815/" source="CVE"/>
		<reference ref_id="CVE-2015-0816" ref_url="https://www.suse.com/security/cve/CVE-2015-0816/" source="CVE"/>
		<reference ref_id="CVE-2015-0817" ref_url="https://www.suse.com/security/cve/CVE-2015-0817/" source="CVE"/>
		<reference ref_id="CVE-2015-0818" ref_url="https://www.suse.com/security/cve/CVE-2015-0818/" source="CVE"/>
		<reference ref_id="CVE-2015-0822" ref_url="https://www.suse.com/security/cve/CVE-2015-0822/" source="CVE"/>
		<reference ref_id="CVE-2015-0827" ref_url="https://www.suse.com/security/cve/CVE-2015-0827/" source="CVE"/>
		<reference ref_id="CVE-2015-0831" ref_url="https://www.suse.com/security/cve/CVE-2015-0831/" source="CVE"/>
		<reference ref_id="CVE-2015-0835" ref_url="https://www.suse.com/security/cve/CVE-2015-0835/" source="CVE"/>
		<reference ref_id="CVE-2015-0836" ref_url="https://www.suse.com/security/cve/CVE-2015-0836/" source="CVE"/>
		<reference ref_id="CVE-2015-2708" ref_url="https://www.suse.com/security/cve/CVE-2015-2708/" source="CVE"/>
		<reference ref_id="CVE-2015-2709" ref_url="https://www.suse.com/security/cve/CVE-2015-2709/" source="CVE"/>
		<reference ref_id="CVE-2015-2710" ref_url="https://www.suse.com/security/cve/CVE-2015-2710/" source="CVE"/>
		<reference ref_id="CVE-2015-2713" ref_url="https://www.suse.com/security/cve/CVE-2015-2713/" source="CVE"/>
		<reference ref_id="CVE-2015-2716" ref_url="https://www.suse.com/security/cve/CVE-2015-2716/" source="CVE"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722/" source="CVE"/>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725/" source="CVE"/>
		<reference ref_id="CVE-2015-2726" ref_url="https://www.suse.com/security/cve/CVE-2015-2726/" source="CVE"/>
		<reference ref_id="CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728/" source="CVE"/>
		<reference ref_id="CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730/" source="CVE"/>
		<reference ref_id="CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735/" source="CVE"/>
		<reference ref_id="CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736/" source="CVE"/>
		<reference ref_id="CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739/" source="CVE"/>
		<reference ref_id="CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740/" source="CVE"/>
		<reference ref_id="CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473/" source="CVE"/>
		<reference ref_id="CVE-2015-4474" ref_url="https://www.suse.com/security/cve/CVE-2015-4474/" source="CVE"/>
		<reference ref_id="CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475/" source="CVE"/>
		<reference ref_id="CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478/" source="CVE"/>
		<reference ref_id="CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479/" source="CVE"/>
		<reference ref_id="CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484/" source="CVE"/>
		<reference ref_id="CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485/" source="CVE"/>
		<reference ref_id="CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486/" source="CVE"/>
		<reference ref_id="CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487/" source="CVE"/>
		<reference ref_id="CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488/" source="CVE"/>
		<reference ref_id="CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492/" source="CVE"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="CVE-2015-4497" ref_url="https://www.suse.com/security/cve/CVE-2015-4497/" source="CVE"/>
		<reference ref_id="CVE-2015-4498" ref_url="https://www.suse.com/security/cve/CVE-2015-4498/" source="CVE"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<reference ref_id="CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188/" source="CVE"/>
		<reference ref_id="CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193/" source="CVE"/>
		<reference ref_id="CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194/" source="CVE"/>
		<reference ref_id="CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196/" source="CVE"/>
		<reference ref_id="CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197/" source="CVE"/>
		<reference ref_id="CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198/" source="CVE"/>
		<reference ref_id="CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199/" source="CVE"/>
		<reference ref_id="CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200/" source="CVE"/>
		<reference ref_id="CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201/" source="CVE"/>
		<reference ref_id="CVE-2015-7202" ref_url="https://www.suse.com/security/cve/CVE-2015-7202/" source="CVE"/>
		<reference ref_id="CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205/" source="CVE"/>
		<reference ref_id="CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210/" source="CVE"/>
		<reference ref_id="CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212/" source="CVE"/>
		<reference ref_id="CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213/" source="CVE"/>
		<reference ref_id="CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214/" source="CVE"/>
		<reference ref_id="CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222/" source="CVE"/>
		<reference ref_id="CVE-2016-1523" ref_url="https://www.suse.com/security/cve/CVE-2016-1523/" source="CVE"/>
		<reference ref_id="CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930/" source="CVE"/>
		<reference ref_id="CVE-2016-1931" ref_url="https://www.suse.com/security/cve/CVE-2016-1931/" source="CVE"/>
		<reference ref_id="CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935/" source="CVE"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1952" ref_url="https://www.suse.com/security/cve/CVE-2016-1952/" source="CVE"/>
		<reference ref_id="CVE-2016-1953" ref_url="https://www.suse.com/security/cve/CVE-2016-1953/" source="CVE"/>
		<reference ref_id="CVE-2016-1954" ref_url="https://www.suse.com/security/cve/CVE-2016-1954/" source="CVE"/>
		<reference ref_id="CVE-2016-1957" ref_url="https://www.suse.com/security/cve/CVE-2016-1957/" source="CVE"/>
		<reference ref_id="CVE-2016-1958" ref_url="https://www.suse.com/security/cve/CVE-2016-1958/" source="CVE"/>
		<reference ref_id="CVE-2016-1960" ref_url="https://www.suse.com/security/cve/CVE-2016-1960/" source="CVE"/>
		<reference ref_id="CVE-2016-1961" ref_url="https://www.suse.com/security/cve/CVE-2016-1961/" source="CVE"/>
		<reference ref_id="CVE-2016-1962" ref_url="https://www.suse.com/security/cve/CVE-2016-1962/" source="CVE"/>
		<reference ref_id="CVE-2016-1964" ref_url="https://www.suse.com/security/cve/CVE-2016-1964/" source="CVE"/>
		<reference ref_id="CVE-2016-1965" ref_url="https://www.suse.com/security/cve/CVE-2016-1965/" source="CVE"/>
		<reference ref_id="CVE-2016-1966" ref_url="https://www.suse.com/security/cve/CVE-2016-1966/" source="CVE"/>
		<reference ref_id="CVE-2016-1974" ref_url="https://www.suse.com/security/cve/CVE-2016-1974/" source="CVE"/>
		<reference ref_id="CVE-2016-1977" ref_url="https://www.suse.com/security/cve/CVE-2016-1977/" source="CVE"/>
		<reference ref_id="CVE-2016-2790" ref_url="https://www.suse.com/security/cve/CVE-2016-2790/" source="CVE"/>
		<reference ref_id="CVE-2016-2791" ref_url="https://www.suse.com/security/cve/CVE-2016-2791/" source="CVE"/>
		<reference ref_id="CVE-2016-2792" ref_url="https://www.suse.com/security/cve/CVE-2016-2792/" source="CVE"/>
		<reference ref_id="CVE-2016-2793" ref_url="https://www.suse.com/security/cve/CVE-2016-2793/" source="CVE"/>
		<reference ref_id="CVE-2016-2794" ref_url="https://www.suse.com/security/cve/CVE-2016-2794/" source="CVE"/>
		<reference ref_id="CVE-2016-2795" ref_url="https://www.suse.com/security/cve/CVE-2016-2795/" source="CVE"/>
		<reference ref_id="CVE-2016-2796" ref_url="https://www.suse.com/security/cve/CVE-2016-2796/" source="CVE"/>
		<reference ref_id="CVE-2016-2797" ref_url="https://www.suse.com/security/cve/CVE-2016-2797/" source="CVE"/>
		<reference ref_id="CVE-2016-2798" ref_url="https://www.suse.com/security/cve/CVE-2016-2798/" source="CVE"/>
		<reference ref_id="CVE-2016-2799" ref_url="https://www.suse.com/security/cve/CVE-2016-2799/" source="CVE"/>
		<reference ref_id="CVE-2016-2800" ref_url="https://www.suse.com/security/cve/CVE-2016-2800/" source="CVE"/>
		<reference ref_id="CVE-2016-2801" ref_url="https://www.suse.com/security/cve/CVE-2016-2801/" source="CVE"/>
		<reference ref_id="CVE-2016-2802" ref_url="https://www.suse.com/security/cve/CVE-2016-2802/" source="CVE"/>
		<reference ref_id="CVE-2016-2805" ref_url="https://www.suse.com/security/cve/CVE-2016-2805/" source="CVE"/>
		<reference ref_id="CVE-2016-2807" ref_url="https://www.suse.com/security/cve/CVE-2016-2807/" source="CVE"/>
		<reference ref_id="CVE-2016-2808" ref_url="https://www.suse.com/security/cve/CVE-2016-2808/" source="CVE"/>
		<reference ref_id="CVE-2016-2814" ref_url="https://www.suse.com/security/cve/CVE-2016-2814/" source="CVE"/>
		<reference ref_id="CVE-2016-2815" ref_url="https://www.suse.com/security/cve/CVE-2016-2815/" source="CVE"/>
		<reference ref_id="CVE-2016-2818" ref_url="https://www.suse.com/security/cve/CVE-2016-2818/" source="CVE"/>
		<reference ref_id="CVE-2016-2819" ref_url="https://www.suse.com/security/cve/CVE-2016-2819/" source="CVE"/>
		<reference ref_id="CVE-2016-2821" ref_url="https://www.suse.com/security/cve/CVE-2016-2821/" source="CVE"/>
		<reference ref_id="CVE-2016-2822" ref_url="https://www.suse.com/security/cve/CVE-2016-2822/" source="CVE"/>
		<reference ref_id="CVE-2016-2824" ref_url="https://www.suse.com/security/cve/CVE-2016-2824/" source="CVE"/>
		<reference ref_id="CVE-2016-2828" ref_url="https://www.suse.com/security/cve/CVE-2016-2828/" source="CVE"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-2831" ref_url="https://www.suse.com/security/cve/CVE-2016-2831/" source="CVE"/>
		<reference ref_id="CVE-2016-2835" ref_url="https://www.suse.com/security/cve/CVE-2016-2835/" source="CVE"/>
		<reference ref_id="CVE-2016-2836" ref_url="https://www.suse.com/security/cve/CVE-2016-2836/" source="CVE"/>
		<reference ref_id="CVE-2016-2837" ref_url="https://www.suse.com/security/cve/CVE-2016-2837/" source="CVE"/>
		<reference ref_id="CVE-2016-2838" ref_url="https://www.suse.com/security/cve/CVE-2016-2838/" source="CVE"/>
		<reference ref_id="CVE-2016-2839" ref_url="https://www.suse.com/security/cve/CVE-2016-2839/" source="CVE"/>
		<reference ref_id="CVE-2016-5250" ref_url="https://www.suse.com/security/cve/CVE-2016-5250/" source="CVE"/>
		<reference ref_id="CVE-2016-5252" ref_url="https://www.suse.com/security/cve/CVE-2016-5252/" source="CVE"/>
		<reference ref_id="CVE-2016-5254" ref_url="https://www.suse.com/security/cve/CVE-2016-5254/" source="CVE"/>
		<reference ref_id="CVE-2016-5257" ref_url="https://www.suse.com/security/cve/CVE-2016-5257/" source="CVE"/>
		<reference ref_id="CVE-2016-5258" ref_url="https://www.suse.com/security/cve/CVE-2016-5258/" source="CVE"/>
		<reference ref_id="CVE-2016-5259" ref_url="https://www.suse.com/security/cve/CVE-2016-5259/" source="CVE"/>
		<reference ref_id="CVE-2016-5261" ref_url="https://www.suse.com/security/cve/CVE-2016-5261/" source="CVE"/>
		<reference ref_id="CVE-2016-5262" ref_url="https://www.suse.com/security/cve/CVE-2016-5262/" source="CVE"/>
		<reference ref_id="CVE-2016-5263" ref_url="https://www.suse.com/security/cve/CVE-2016-5263/" source="CVE"/>
		<reference ref_id="CVE-2016-5264" ref_url="https://www.suse.com/security/cve/CVE-2016-5264/" source="CVE"/>
		<reference ref_id="CVE-2016-5265" ref_url="https://www.suse.com/security/cve/CVE-2016-5265/" source="CVE"/>
		<reference ref_id="CVE-2016-5270" ref_url="https://www.suse.com/security/cve/CVE-2016-5270/" source="CVE"/>
		<reference ref_id="CVE-2016-5272" ref_url="https://www.suse.com/security/cve/CVE-2016-5272/" source="CVE"/>
		<reference ref_id="CVE-2016-5274" ref_url="https://www.suse.com/security/cve/CVE-2016-5274/" source="CVE"/>
		<reference ref_id="CVE-2016-5276" ref_url="https://www.suse.com/security/cve/CVE-2016-5276/" source="CVE"/>
		<reference ref_id="CVE-2016-5277" ref_url="https://www.suse.com/security/cve/CVE-2016-5277/" source="CVE"/>
		<reference ref_id="CVE-2016-5278" ref_url="https://www.suse.com/security/cve/CVE-2016-5278/" source="CVE"/>
		<reference ref_id="CVE-2016-5280" ref_url="https://www.suse.com/security/cve/CVE-2016-5280/" source="CVE"/>
		<reference ref_id="CVE-2016-5281" ref_url="https://www.suse.com/security/cve/CVE-2016-5281/" source="CVE"/>
		<reference ref_id="CVE-2016-5284" ref_url="https://www.suse.com/security/cve/CVE-2016-5284/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-45.4.0esr-81.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-5913/">CVE-2008-5913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0652/">CVE-2009-0652</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0771/">CVE-2009-0771</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0772/">CVE-2009-0772</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0773/">CVE-2009-0773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0774/">CVE-2009-0774</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0775/">CVE-2009-0775</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0776/">CVE-2009-0776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0777/">CVE-2009-0777</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1044/">CVE-2009-1044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1169/">CVE-2009-1169</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1302/">CVE-2009-1302</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1303/">CVE-2009-1303</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1304/">CVE-2009-1304</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1305/">CVE-2009-1305</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1306/">CVE-2009-1306</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1307/">CVE-2009-1307</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1308/">CVE-2009-1308</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1309/">CVE-2009-1309</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1310/">CVE-2009-1310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1311/">CVE-2009-1311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1312/">CVE-2009-1312</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1313/">CVE-2009-1313</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1563/">CVE-2009-1563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2470/">CVE-2009-2470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2654/">CVE-2009-2654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3069/">CVE-2009-3069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3070/">CVE-2009-3070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3071/">CVE-2009-3071</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3072/">CVE-2009-3072</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3073/">CVE-2009-3073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3074/">CVE-2009-3074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3075/">CVE-2009-3075</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3077/">CVE-2009-3077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3078/">CVE-2009-3078</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3079/">CVE-2009-3079</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3274/">CVE-2009-3274</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3370/">CVE-2009-3370</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3371/">CVE-2009-3371</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3372/">CVE-2009-3372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3373/">CVE-2009-3373</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3374/">CVE-2009-3374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3375/">CVE-2009-3375</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3376/">CVE-2009-3376</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3377/">CVE-2009-3377</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3378/">CVE-2009-3378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3380/">CVE-2009-3380</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3381/">CVE-2009-3381</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3383/">CVE-2009-3383</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3388/">CVE-2009-3388</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3389/">CVE-2009-3389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3979/">CVE-2009-3979</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3980/">CVE-2009-3980</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3982/">CVE-2009-3982</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3983/">CVE-2009-3983</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3984/">CVE-2009-3984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3985/">CVE-2009-3985</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0164/">CVE-2010-0164</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0165/">CVE-2010-0165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0166/">CVE-2010-0166</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0167/">CVE-2010-0167</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0168/">CVE-2010-0168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0169/">CVE-2010-0169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0170/">CVE-2010-0170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0171/">CVE-2010-0171</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0172/">CVE-2010-0172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0654/">CVE-2010-0654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1028/">CVE-2010-1028</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1121/">CVE-2010-1121</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1125/">CVE-2010-1125</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1196/">CVE-2010-1196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1197/">CVE-2010-1197</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1198/">CVE-2010-1198</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1199/">CVE-2010-1199</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1200/">CVE-2010-1200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1201/">CVE-2010-1201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1202/">CVE-2010-1202</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1203/">CVE-2010-1203</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1206/">CVE-2010-1206</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1207/">CVE-2010-1207</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1208/">CVE-2010-1208</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1209/">CVE-2010-1209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1210/">CVE-2010-1210</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1211/">CVE-2010-1211</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1212/">CVE-2010-1212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1213/">CVE-2010-1213</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1214/">CVE-2010-1214</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1215/">CVE-2010-1215</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2751/">CVE-2010-2751</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2752/">CVE-2010-2752</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2753/">CVE-2010-2753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2754/">CVE-2010-2754</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2755/">CVE-2010-2755</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2760/">CVE-2010-2760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2762/">CVE-2010-2762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2764/">CVE-2010-2764</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2765/">CVE-2010-2765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2766/">CVE-2010-2766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2767/">CVE-2010-2767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2768/">CVE-2010-2768</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2769/">CVE-2010-2769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3166/">CVE-2010-3166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3167/">CVE-2010-3167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3168/">CVE-2010-3168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3169/">CVE-2010-3169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3173/">CVE-2010-3173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3174/">CVE-2010-3174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3175/">CVE-2010-3175</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3176/">CVE-2010-3176</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3177/">CVE-2010-3177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-0068/">CVE-2011-0068</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0069/">CVE-2011-0069</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0070/">CVE-2011-0070</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0079/">CVE-2011-0079</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0080/">CVE-2011-0080</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0081/">CVE-2011-0081</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0084/">CVE-2011-0084</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1187/">CVE-2011-1187</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1202/">CVE-2011-1202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2366/">CVE-2011-2366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2367/">CVE-2011-2367</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2368/">CVE-2011-2368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2369/">CVE-2011-2369</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2370/">CVE-2011-2370</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2371/">CVE-2011-2371</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2372/">CVE-2011-2372</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2373/">CVE-2011-2373</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2374/">CVE-2011-2374</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2375/">CVE-2011-2375</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2377/">CVE-2011-2377</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2985/">CVE-2011-2985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2986/">CVE-2011-2986</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2988/">CVE-2011-2988</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2989/">CVE-2011-2989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2990/">CVE-2011-2990</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2991/">CVE-2011-2991</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2992/">CVE-2011-2992</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2993/">CVE-2011-2993</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2995/">CVE-2011-2995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2996/">CVE-2011-2996</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2997/">CVE-2011-2997</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3000/">CVE-2011-3000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3001/">CVE-2011-3001</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3002/">CVE-2011-3002</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3003/">CVE-2011-3003</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3004/">CVE-2011-3004</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3005/">CVE-2011-3005</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3062/">CVE-2011-3062</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3101/">CVE-2011-3101</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3232/">CVE-2011-3232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3648/">CVE-2011-3648</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3650/">CVE-2011-3650</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3651/">CVE-2011-3651</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3652/">CVE-2011-3652</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3654/">CVE-2011-3654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3655/">CVE-2011-3655</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3658/">CVE-2011-3658</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3659/">CVE-2011-3659</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3660/">CVE-2011-3660</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3661/">CVE-2011-3661</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3663/">CVE-2011-3663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0441/">CVE-2012-0441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0442/">CVE-2012-0442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0443/">CVE-2012-0443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0445/">CVE-2012-0445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0446/">CVE-2012-0446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0447/">CVE-2012-0447</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0449/">CVE-2012-0449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0451/">CVE-2012-0451</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0452/">CVE-2012-0452</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0455/">CVE-2012-0455</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0456/">CVE-2012-0456</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0457/">CVE-2012-0457</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0458/">CVE-2012-0458</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0459/">CVE-2012-0459</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0460/">CVE-2012-0460</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0461/">CVE-2012-0461</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0462/">CVE-2012-0462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0463/">CVE-2012-0463</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0464/">CVE-2012-0464</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0467/">CVE-2012-0467</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0468/">CVE-2012-0468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0469/">CVE-2012-0469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0470/">CVE-2012-0470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0471/">CVE-2012-0471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0472/">CVE-2012-0472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0473/">CVE-2012-0473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0474/">CVE-2012-0474</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0475/">CVE-2012-0475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0477/">CVE-2012-0477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0478/">CVE-2012-0478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0479/">CVE-2012-0479</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0759/">CVE-2012-0759</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1937/">CVE-2012-1937</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1938/">CVE-2012-1938</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1940/">CVE-2012-1940</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1941/">CVE-2012-1941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1944/">CVE-2012-1944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1945/">CVE-2012-1945</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1946/">CVE-2012-1946</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1947/">CVE-2012-1947</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1948/">CVE-2012-1948</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1949/">CVE-2012-1949</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1950/">CVE-2012-1950</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1951/">CVE-2012-1951</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1952/">CVE-2012-1952</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1953/">CVE-2012-1953</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1954/">CVE-2012-1954</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1955/">CVE-2012-1955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1956/">CVE-2012-1956</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1957/">CVE-2012-1957</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1958/">CVE-2012-1958</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1959/">CVE-2012-1959</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1960/">CVE-2012-1960</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1961/">CVE-2012-1961</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1962/">CVE-2012-1962</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1963/">CVE-2012-1963</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1965/">CVE-2012-1965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1966/">CVE-2012-1966</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1967/">CVE-2012-1967</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1970/">CVE-2012-1970</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1972/">CVE-2012-1972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1973/">CVE-2012-1973</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1974/">CVE-2012-1974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1975/">CVE-2012-1975</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1976/">CVE-2012-1976</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3956/">CVE-2012-3956</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3957/">CVE-2012-3957</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3958/">CVE-2012-3958</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3959/">CVE-2012-3959</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3960/">CVE-2012-3960</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3961/">CVE-2012-3961</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3962/">CVE-2012-3962</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3963/">CVE-2012-3963</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3964/">CVE-2012-3964</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3965/">CVE-2012-3965</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3966/">CVE-2012-3966</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3967/">CVE-2012-3967</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3968/">CVE-2012-3968</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3969/">CVE-2012-3969</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3970/">CVE-2012-3970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3971/">CVE-2012-3971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3972/">CVE-2012-3972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3973/">CVE-2012-3973</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3975/">CVE-2012-3975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3976/">CVE-2012-3976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3978/">CVE-2012-3978</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3980/">CVE-2012-3980</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3982/">CVE-2012-3982</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3983/">CVE-2012-3983</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3984/">CVE-2012-3984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3985/">CVE-2012-3985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3986/">CVE-2012-3986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3988/">CVE-2012-3988</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3989/">CVE-2012-3989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3990/">CVE-2012-3990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3991/">CVE-2012-3991</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3992/">CVE-2012-3992</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3993/">CVE-2012-3993</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3994/">CVE-2012-3994</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3995/">CVE-2012-3995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4179/">CVE-2012-4179</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4180/">CVE-2012-4180</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4181/">CVE-2012-4181</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4182/">CVE-2012-4182</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4183/">CVE-2012-4183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4184/">CVE-2012-4184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4185/">CVE-2012-4185</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4186/">CVE-2012-4186</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4187/">CVE-2012-4187</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4188/">CVE-2012-4188</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4191/">CVE-2012-4191</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4192/">CVE-2012-4192</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4193/">CVE-2012-4193</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4194/">CVE-2012-4194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4195/">CVE-2012-4195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4196/">CVE-2012-4196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4201/">CVE-2012-4201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4202/">CVE-2012-4202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4203/">CVE-2012-4203</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4204/">CVE-2012-4204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4205/">CVE-2012-4205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4207/">CVE-2012-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4208/">CVE-2012-4208</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4209/">CVE-2012-4209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4210/">CVE-2012-4210</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4212/">CVE-2012-4212</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4213/">CVE-2012-4213</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4214/">CVE-2012-4214</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4215/">CVE-2012-4215</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4216/">CVE-2012-4216</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4217/">CVE-2012-4217</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4218/">CVE-2012-4218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5830/">CVE-2012-5830</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5833/">CVE-2012-5833</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5835/">CVE-2012-5835</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5836/">CVE-2012-5836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5837/">CVE-2012-5837</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5838/">CVE-2012-5838</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5839/">CVE-2012-5839</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5840/">CVE-2012-5840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5841/">CVE-2012-5841</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5842/">CVE-2012-5842</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5843/">CVE-2012-5843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0744/">CVE-2013-0744</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0745/">CVE-2013-0745</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0746/">CVE-2013-0746</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0747/">CVE-2013-0747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0748/">CVE-2013-0748</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0749/">CVE-2013-0749</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0750/">CVE-2013-0750</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0751/">CVE-2013-0751</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0752/">CVE-2013-0752</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0753/">CVE-2013-0753</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0754/">CVE-2013-0754</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0755/">CVE-2013-0755</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0756/">CVE-2013-0756</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0757/">CVE-2013-0757</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0758/">CVE-2013-0758</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0760/">CVE-2013-0760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0761/">CVE-2013-0761</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0762/">CVE-2013-0762</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0763/">CVE-2013-0763</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0764/">CVE-2013-0764</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0765/">CVE-2013-0765</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0766/">CVE-2013-0766</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0767/">CVE-2013-0767</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0768/">CVE-2013-0768</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0769/">CVE-2013-0769</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0770/">CVE-2013-0770</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0771/">CVE-2013-0771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0772/">CVE-2013-0772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0773/">CVE-2013-0773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0774/">CVE-2013-0774</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0775/">CVE-2013-0775</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0776/">CVE-2013-0776</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0777/">CVE-2013-0777</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0778/">CVE-2013-0778</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0779/">CVE-2013-0779</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0780/">CVE-2013-0780</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0781/">CVE-2013-0781</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0782/">CVE-2013-0782</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0783/">CVE-2013-0783</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0787/">CVE-2013-0787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0788/">CVE-2013-0788</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0789/">CVE-2013-0789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0792/">CVE-2013-0792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0793/">CVE-2013-0793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0794/">CVE-2013-0794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0795/">CVE-2013-0795</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0796/">CVE-2013-0796</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0800/">CVE-2013-0800</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0801/">CVE-2013-0801</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1669/">CVE-2013-1669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1670/">CVE-2013-1670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1671/">CVE-2013-1671</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1674/">CVE-2013-1674</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1675/">CVE-2013-1675</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1676/">CVE-2013-1676</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1677/">CVE-2013-1677</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1678/">CVE-2013-1678</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1679/">CVE-2013-1679</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1680/">CVE-2013-1680</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1681/">CVE-2013-1681</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1682/">CVE-2013-1682</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1683/">CVE-2013-1683</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1684/">CVE-2013-1684</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1685/">CVE-2013-1685</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1686/">CVE-2013-1686</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1687/">CVE-2013-1687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1688/">CVE-2013-1688</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1690/">CVE-2013-1690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1692/">CVE-2013-1692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1693/">CVE-2013-1693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1694/">CVE-2013-1694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1695/">CVE-2013-1695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1696/">CVE-2013-1696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1697/">CVE-2013-1697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1698/">CVE-2013-1698</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1699/">CVE-2013-1699</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1701/">CVE-2013-1701</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1702/">CVE-2013-1702</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1704/">CVE-2013-1704</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1705/">CVE-2013-1705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1708/">CVE-2013-1708</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1709/">CVE-2013-1709</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1710/">CVE-2013-1710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1711/">CVE-2013-1711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1713/">CVE-2013-1713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1714/">CVE-2013-1714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1717/">CVE-2013-1717</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1718/">CVE-2013-1718</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1719/">CVE-2013-1719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1720/">CVE-2013-1720</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1721/">CVE-2013-1721</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1722/">CVE-2013-1722</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1723/">CVE-2013-1723</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1724/">CVE-2013-1724</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1725/">CVE-2013-1725</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1728/">CVE-2013-1728</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1730/">CVE-2013-1730</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1732/">CVE-2013-1732</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1735/">CVE-2013-1735</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1736/">CVE-2013-1736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1737/">CVE-2013-1737</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1738/">CVE-2013-1738</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5590/">CVE-2013-5590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5591/">CVE-2013-5591</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5592/">CVE-2013-5592</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5593/">CVE-2013-5593</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5595/">CVE-2013-5595</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5596/">CVE-2013-5596</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5597/">CVE-2013-5597</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5598/">CVE-2013-5598</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5599/">CVE-2013-5599</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5600/">CVE-2013-5600</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5601/">CVE-2013-5601</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5602/">CVE-2013-5602</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5603/">CVE-2013-5603</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5604/">CVE-2013-5604</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5609/">CVE-2013-5609</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5610/">CVE-2013-5610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5611/">CVE-2013-5611</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5612/">CVE-2013-5612</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5613/">CVE-2013-5613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5614/">CVE-2013-5614</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5615/">CVE-2013-5615</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5616/">CVE-2013-5616</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5618/">CVE-2013-5618</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5619/">CVE-2013-5619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6630/">CVE-2013-6630</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-6671/">CVE-2013-6671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6672/">CVE-2013-6672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6673/">CVE-2013-6673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1477/">CVE-2014-1477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1478/">CVE-2014-1478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1479/">CVE-2014-1479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1480/">CVE-2014-1480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1481/">CVE-2014-1481</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1482/">CVE-2014-1482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1483/">CVE-2014-1483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1484/">CVE-2014-1484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1485/">CVE-2014-1485</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1486/">CVE-2014-1486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1487/">CVE-2014-1487</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1488/">CVE-2014-1488</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1489/">CVE-2014-1489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1490/">CVE-2014-1490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1491/">CVE-2014-1491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1544/">CVE-2014-1544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1547/">CVE-2014-1547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1548/">CVE-2014-1548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1553/">CVE-2014-1553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1554/">CVE-2014-1554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1555/">CVE-2014-1555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1556/">CVE-2014-1556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1557/">CVE-2014-1557</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1562/">CVE-2014-1562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1563/">CVE-2014-1563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1564/">CVE-2014-1564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1565/">CVE-2014-1565</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1567/">CVE-2014-1567</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1574/">CVE-2014-1574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1575/">CVE-2014-1575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1576/">CVE-2014-1576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1577/">CVE-2014-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1578/">CVE-2014-1578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1581/">CVE-2014-1581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1583/">CVE-2014-1583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1585/">CVE-2014-1585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1586/">CVE-2014-1586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1588/">CVE-2014-1588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8635/">CVE-2014-8635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8641/">CVE-2014-8641</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0797/">CVE-2015-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0801/">CVE-2015-0801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0807/">CVE-2015-0807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0813/">CVE-2015-0813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0814/">CVE-2015-0814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0815/">CVE-2015-0815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0816/">CVE-2015-0816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0817/">CVE-2015-0817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0818/">CVE-2015-0818</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0822/">CVE-2015-0822</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0827/">CVE-2015-0827</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0831/">CVE-2015-0831</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0835/">CVE-2015-0835</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0836/">CVE-2015-0836</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2708/">CVE-2015-2708</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2709/">CVE-2015-2709</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2710/">CVE-2015-2710</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2713/">CVE-2015-2713</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2716/">CVE-2015-2716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2726/">CVE-2015-2726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4474/">CVE-2015-4474</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4497/">CVE-2015-4497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4498/">CVE-2015-4498</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7202/">CVE-2015-7202</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1523/">CVE-2016-1523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1931/">CVE-2016-1931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1952/">CVE-2016-1952</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1953/">CVE-2016-1953</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1954/">CVE-2016-1954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1957/">CVE-2016-1957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1958/">CVE-2016-1958</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1960/">CVE-2016-1960</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1961/">CVE-2016-1961</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1962/">CVE-2016-1962</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1964/">CVE-2016-1964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1965/">CVE-2016-1965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1966/">CVE-2016-1966</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1974/">CVE-2016-1974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1977/">CVE-2016-1977</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2790/">CVE-2016-2790</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2791/">CVE-2016-2791</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2792/">CVE-2016-2792</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2793/">CVE-2016-2793</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2794/">CVE-2016-2794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2795/">CVE-2016-2795</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2796/">CVE-2016-2796</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2797/">CVE-2016-2797</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2798/">CVE-2016-2798</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2799/">CVE-2016-2799</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2800/">CVE-2016-2800</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2801/">CVE-2016-2801</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2802/">CVE-2016-2802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2805/">CVE-2016-2805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2807/">CVE-2016-2807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2808/">CVE-2016-2808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2814/">CVE-2016-2814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2815/">CVE-2016-2815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2818/">CVE-2016-2818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2819/">CVE-2016-2819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2821/">CVE-2016-2821</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2822/">CVE-2016-2822</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2824/">CVE-2016-2824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2828/">CVE-2016-2828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2831/">CVE-2016-2831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2835/">CVE-2016-2835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2836/">CVE-2016-2836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2837/">CVE-2016-2837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2838/">CVE-2016-2838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2839/">CVE-2016-2839</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5250/">CVE-2016-5250</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5252/">CVE-2016-5252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5254/">CVE-2016-5254</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5257/">CVE-2016-5257</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5258/">CVE-2016-5258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5259/">CVE-2016-5259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5261/">CVE-2016-5261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5262/">CVE-2016-5262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5263/">CVE-2016-5263</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5264/">CVE-2016-5264</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5265/">CVE-2016-5265</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5270/">CVE-2016-5270</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5272/">CVE-2016-5272</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5274/">CVE-2016-5274</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5276/">CVE-2016-5276</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5277/">CVE-2016-5277</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5278/">CVE-2016-5278</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5280/">CVE-2016-5280</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5281/">CVE-2016-5281</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5284/">CVE-2016-5284</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76175" version="1" class="patch">
	<metadata>
		<title>NetworkManager-1.0.12-8.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-2924" ref_url="https://www.suse.com/security/cve/CVE-2015-2924/" source="CVE"/>
		<reference ref_id="CVE-2016-0764" ref_url="https://www.suse.com/security/cve/CVE-2016-0764/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-1.0.12-8.6 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2924/">CVE-2015-2924</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0764/">CVE-2016-0764</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142074" comment="NetworkManager-1.0.12-8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142075" comment="NetworkManager-lang-1.0.12-8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140431" comment="libnm-glib-vpn1-1.0.12-8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140432" comment="libnm-glib4-1.0.12-8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140433" comment="libnm-util2-1.0.12-8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140434" comment="libnm0-1.0.12-8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142076" comment="typelib-1_0-NM-1_0-1.0.12-8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140435" comment="typelib-1_0-NMClient-1_0-1.0.12-8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140436" comment="typelib-1_0-NetworkManager-1_0-1.0.12-8.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76176" version="1" class="patch">
	<metadata>
		<title>aaa_base-13.2+git20140911.61c1681-28.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-0461" ref_url="https://www.suse.com/security/cve/CVE-2011-0461/" source="CVE"/>
		<description>
These are all security issues fixed in the aaa_base-13.2+git20140911.61c1681-28.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0461/">CVE-2011-0461</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140437" comment="aaa_base-13.2+git20140911.61c1681-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140438" comment="aaa_base-extras-13.2+git20140911.61c1681-28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76177" version="1" class="patch">
	<metadata>
		<title>accountsservice-0.6.42-14.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-2737" ref_url="https://www.suse.com/security/cve/CVE-2012-2737/" source="CVE"/>
		<description>
These are all security issues fixed in the accountsservice-0.6.42-14.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2737/">CVE-2012-2737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140439" comment="accountsservice-0.6.42-14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140440" comment="accountsservice-lang-0.6.42-14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140441" comment="libaccountsservice0-0.6.42-14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140442" comment="typelib-1_0-AccountsService-1_0-0.6.42-14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76178" version="1" class="patch">
	<metadata>
		<title>alsa-1.0.27.2-11.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0035" ref_url="https://www.suse.com/security/cve/CVE-2009-0035/" source="CVE"/>
		<description>
These are all security issues fixed in the alsa-1.0.27.2-11.10 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0035/">CVE-2009-0035</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141209" comment="alsa-1.0.27.2-11.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141210" comment="libasound2-1.0.27.2-11.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140446" comment="libasound2-32bit-1.0.27.2-11.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76179" version="1" class="patch">
	<metadata>
		<title>argyllcms-1.6.3-3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-1616" ref_url="https://www.suse.com/security/cve/CVE-2012-1616/" source="CVE"/>
		<description>
These are all security issues fixed in the argyllcms-1.6.3-3.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1616/">CVE-2012-1616</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142077" comment="argyllcms-1.6.3-3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76180" version="1" class="patch">
	<metadata>
		<title>at-3.1.14-7.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<description>
These are all security issues fixed in the at-3.1.14-7.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131107" comment="at-3.1.14-7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131109" comment="libQtWebKit4-4.8.6+2.3.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131110" comment="libQtWebKit4-32bit-4.8.6+2.3.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131111" comment="libbonobo-2.32.1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131112" comment="libbonobo-32bit-2.32.1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131113" comment="libbonobo-lang-2.32.1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131114" comment="libkde4-4.12.0-7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131115" comment="libkde4-32bit-4.12.0-7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131116" comment="libkdecore4-4.12.0-7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131117" comment="libkdecore4-32bit-4.12.0-7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131118" comment="libksuseinstall1-4.12.0-7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131119" comment="libksuseinstall1-32bit-4.12.0-7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131120" comment="libnetpbm11-10.66.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131121" comment="libnetpbm11-32bit-10.66.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131122" comment="netpbm-10.66.3-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76181" version="1" class="patch">
	<metadata>
		<title>augeas-1.2.0-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-0786" ref_url="https://www.suse.com/security/cve/CVE-2012-0786/" source="CVE"/>
		<reference ref_id="CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119/" source="CVE"/>
		<description>
These are all security issues fixed in the augeas-1.2.0-10.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0786/">CVE-2012-0786</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140461" comment="augeas-1.2.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140462" comment="augeas-lenses-1.2.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140463" comment="libaugeas0-1.2.0-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76182" version="1" class="patch">
	<metadata>
		<title>autofs-5.0.9-21.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-8169" ref_url="https://www.suse.com/security/cve/CVE-2014-8169/" source="CVE"/>
		<description>
These are all security issues fixed in the autofs-5.0.9-21.6 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8169/">CVE-2014-8169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140464" comment="autofs-5.0.9-21.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76183" version="1" class="patch">
	<metadata>
		<title>avahi-0.6.32-30.36 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0758" ref_url="https://www.suse.com/security/cve/CVE-2009-0758/" source="CVE"/>
		<reference ref_id="CVE-2010-2244" ref_url="https://www.suse.com/security/cve/CVE-2010-2244/" source="CVE"/>
		<reference ref_id="CVE-2011-1002" ref_url="https://www.suse.com/security/cve/CVE-2011-1002/" source="CVE"/>
		<description>
These are all security issues fixed in the avahi-0.6.32-30.36 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0758/">CVE-2009-0758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2244/">CVE-2010-2244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1002/">CVE-2011-1002</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140467" comment="avahi-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140468" comment="avahi-lang-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140470" comment="libavahi-client3-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140471" comment="libavahi-client3-32bit-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140472" comment="libavahi-common3-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140473" comment="libavahi-common3-32bit-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140474" comment="libavahi-core7-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140475" comment="libdns_sd-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140476" comment="libdns_sd-32bit-0.6.32-30.36 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76184" version="1" class="patch">
	<metadata>
		<title>bash-4.3-78.39 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-2524" ref_url="https://www.suse.com/security/cve/CVE-2014-2524/" source="CVE"/>
		<reference ref_id="CVE-2014-6271" ref_url="https://www.suse.com/security/cve/CVE-2014-6271/" source="CVE"/>
		<reference ref_id="CVE-2014-6277" ref_url="https://www.suse.com/security/cve/CVE-2014-6277/" source="CVE"/>
		<reference ref_id="CVE-2014-6278" ref_url="https://www.suse.com/security/cve/CVE-2014-6278/" source="CVE"/>
		<reference ref_id="CVE-2014-7169" ref_url="https://www.suse.com/security/cve/CVE-2014-7169/" source="CVE"/>
		<reference ref_id="CVE-2014-7186" ref_url="https://www.suse.com/security/cve/CVE-2014-7186/" source="CVE"/>
		<reference ref_id="CVE-2014-7187" ref_url="https://www.suse.com/security/cve/CVE-2014-7187/" source="CVE"/>
		<description>
These are all security issues fixed in the bash-4.3-78.39 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2524/">CVE-2014-2524</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6271/">CVE-2014-6271</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6277/">CVE-2014-6277</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6278/">CVE-2014-6278</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7169/">CVE-2014-7169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7186/">CVE-2014-7186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7187/">CVE-2014-7187</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140477" comment="bash-4.3-78.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140478" comment="bash-doc-4.3-78.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142078" comment="bash-lang-4.3-78.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140479" comment="libreadline6-6.3-78.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140480" comment="libreadline6-32bit-6.3-78.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140481" comment="readline-doc-6.3-78.39 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76185" version="1" class="patch">
	<metadata>
		<title>bind-libs-32bit-9.9.9P1-46.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0696" ref_url="https://www.suse.com/security/cve/CVE-2009-0696/" source="CVE"/>
		<reference ref_id="CVE-2009-4022" ref_url="https://www.suse.com/security/cve/CVE-2009-4022/" source="CVE"/>
		<reference ref_id="CVE-2010-3613" ref_url="https://www.suse.com/security/cve/CVE-2010-3613/" source="CVE"/>
		<reference ref_id="CVE-2010-3614" ref_url="https://www.suse.com/security/cve/CVE-2010-3614/" source="CVE"/>
		<reference ref_id="CVE-2010-3615" ref_url="https://www.suse.com/security/cve/CVE-2010-3615/" source="CVE"/>
		<reference ref_id="CVE-2011-0414" ref_url="https://www.suse.com/security/cve/CVE-2011-0414/" source="CVE"/>
		<reference ref_id="CVE-2011-1907" ref_url="https://www.suse.com/security/cve/CVE-2011-1907/" source="CVE"/>
		<reference ref_id="CVE-2011-1910" ref_url="https://www.suse.com/security/cve/CVE-2011-1910/" source="CVE"/>
		<reference ref_id="CVE-2011-2464" ref_url="https://www.suse.com/security/cve/CVE-2011-2464/" source="CVE"/>
		<reference ref_id="CVE-2011-4313" ref_url="https://www.suse.com/security/cve/CVE-2011-4313/" source="CVE"/>
		<reference ref_id="CVE-2012-1667" ref_url="https://www.suse.com/security/cve/CVE-2012-1667/" source="CVE"/>
		<reference ref_id="CVE-2012-3817" ref_url="https://www.suse.com/security/cve/CVE-2012-3817/" source="CVE"/>
		<reference ref_id="CVE-2012-3868" ref_url="https://www.suse.com/security/cve/CVE-2012-3868/" source="CVE"/>
		<reference ref_id="CVE-2012-4244" ref_url="https://www.suse.com/security/cve/CVE-2012-4244/" source="CVE"/>
		<reference ref_id="CVE-2012-5166" ref_url="https://www.suse.com/security/cve/CVE-2012-5166/" source="CVE"/>
		<reference ref_id="CVE-2012-5688" ref_url="https://www.suse.com/security/cve/CVE-2012-5688/" source="CVE"/>
		<reference ref_id="CVE-2012-5689" ref_url="https://www.suse.com/security/cve/CVE-2012-5689/" source="CVE"/>
		<reference ref_id="CVE-2013-2266" ref_url="https://www.suse.com/security/cve/CVE-2013-2266/" source="CVE"/>
		<reference ref_id="CVE-2013-4854" ref_url="https://www.suse.com/security/cve/CVE-2013-4854/" source="CVE"/>
		<reference ref_id="CVE-2014-0591" ref_url="https://www.suse.com/security/cve/CVE-2014-0591/" source="CVE"/>
		<reference ref_id="CVE-2014-8500" ref_url="https://www.suse.com/security/cve/CVE-2014-8500/" source="CVE"/>
		<reference ref_id="CVE-2015-1349" ref_url="https://www.suse.com/security/cve/CVE-2015-1349/" source="CVE"/>
		<reference ref_id="CVE-2015-4620" ref_url="https://www.suse.com/security/cve/CVE-2015-4620/" source="CVE"/>
		<reference ref_id="CVE-2015-5477" ref_url="https://www.suse.com/security/cve/CVE-2015-5477/" source="CVE"/>
		<reference ref_id="CVE-2015-5722" ref_url="https://www.suse.com/security/cve/CVE-2015-5722/" source="CVE"/>
		<reference ref_id="CVE-2015-8000" ref_url="https://www.suse.com/security/cve/CVE-2015-8000/" source="CVE"/>
		<reference ref_id="CVE-2015-8704" ref_url="https://www.suse.com/security/cve/CVE-2015-8704/" source="CVE"/>
		<reference ref_id="CVE-2016-1285" ref_url="https://www.suse.com/security/cve/CVE-2016-1285/" source="CVE"/>
		<reference ref_id="CVE-2016-1286" ref_url="https://www.suse.com/security/cve/CVE-2016-1286/" source="CVE"/>
		<reference ref_id="CVE-2016-2776" ref_url="https://www.suse.com/security/cve/CVE-2016-2776/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-libs-32bit-9.9.9P1-46.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0696/">CVE-2009-0696</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4022/">CVE-2009-4022</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3613/">CVE-2010-3613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3614/">CVE-2010-3614</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3615/">CVE-2010-3615</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0414/">CVE-2011-0414</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1907/">CVE-2011-1907</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1910/">CVE-2011-1910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2464/">CVE-2011-2464</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4313/">CVE-2011-4313</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1667/">CVE-2012-1667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3817/">CVE-2012-3817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3868/">CVE-2012-3868</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4244/">CVE-2012-4244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5166/">CVE-2012-5166</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5688/">CVE-2012-5688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5689/">CVE-2012-5689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2266/">CVE-2013-2266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4854/">CVE-2013-4854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0591/">CVE-2014-0591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8500/">CVE-2014-8500</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1349/">CVE-2015-1349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4620/">CVE-2015-4620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5477/">CVE-2015-5477</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5722/">CVE-2015-5722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8000/">CVE-2015-8000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8704/">CVE-2015-8704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1285/">CVE-2016-1285</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1286/">CVE-2016-1286</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2776/">CVE-2016-2776</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76186" version="1" class="patch">
	<metadata>
		<title>binutils-2.26.1-9.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-8484" ref_url="https://www.suse.com/security/cve/CVE-2014-8484/" source="CVE"/>
		<reference ref_id="CVE-2014-8485" ref_url="https://www.suse.com/security/cve/CVE-2014-8485/" source="CVE"/>
		<reference ref_id="CVE-2014-8501" ref_url="https://www.suse.com/security/cve/CVE-2014-8501/" source="CVE"/>
		<reference ref_id="CVE-2014-8502" ref_url="https://www.suse.com/security/cve/CVE-2014-8502/" source="CVE"/>
		<reference ref_id="CVE-2014-8503" ref_url="https://www.suse.com/security/cve/CVE-2014-8503/" source="CVE"/>
		<reference ref_id="CVE-2014-8504" ref_url="https://www.suse.com/security/cve/CVE-2014-8504/" source="CVE"/>
		<reference ref_id="CVE-2014-8737" ref_url="https://www.suse.com/security/cve/CVE-2014-8737/" source="CVE"/>
		<reference ref_id="CVE-2014-8738" ref_url="https://www.suse.com/security/cve/CVE-2014-8738/" source="CVE"/>
		<description>
These are all security issues fixed in the binutils-2.26.1-9.12.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8484/">CVE-2014-8484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8485/">CVE-2014-8485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8501/">CVE-2014-8501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8502/">CVE-2014-8502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8503/">CVE-2014-8503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8504/">CVE-2014-8504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8737/">CVE-2014-8737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8738/">CVE-2014-8738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140482" comment="binutils-2.26.1-9.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76187" version="1" class="patch">
	<metadata>
		<title>bogofilter-1.2.4-5.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2494" ref_url="https://www.suse.com/security/cve/CVE-2010-2494/" source="CVE"/>
		<reference ref_id="CVE-2012-5468" ref_url="https://www.suse.com/security/cve/CVE-2012-5468/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<description>
These are all security issues fixed in the bogofilter-1.2.4-5.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2494/">CVE-2010-2494</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5468/">CVE-2012-5468</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131108" comment="bogofilter-1.2.4-5.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76188" version="1" class="patch">
	<metadata>
		<title>busybox-1.21.1-3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-9645" ref_url="https://www.suse.com/security/cve/CVE-2014-9645/" source="CVE"/>
		<description>
These are all security issues fixed in the busybox-1.21.1-3.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9645/">CVE-2014-9645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113975" comment="busybox-1.21.1-3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76189" version="1" class="patch">
	<metadata>
		<title>bzip2-1.0.6-29.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<description>
These are all security issues fixed in the bzip2-1.0.6-29.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140483" comment="bzip2-1.0.6-29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140485" comment="libbz2-1-1.0.6-29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140486" comment="libbz2-1-32bit-1.0.6-29.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76190" version="1" class="patch">
	<metadata>
		<title>cifs-utils-6.5-8.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2012-1586" ref_url="https://www.suse.com/security/cve/CVE-2012-1586/" source="CVE"/>
		<description>
These are all security issues fixed in the cifs-utils-6.5-8.9 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1586/">CVE-2012-1586</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140488" comment="cifs-utils-6.5-8.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76191" version="1" class="patch">
	<metadata>
		<title>clamav-0.99.2-25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<reference ref_id="CVE-2011-2721" ref_url="https://www.suse.com/security/cve/CVE-2011-2721/" source="CVE"/>
		<reference ref_id="CVE-2011-3627" ref_url="https://www.suse.com/security/cve/CVE-2011-3627/" source="CVE"/>
		<reference ref_id="CVE-2012-1457" ref_url="https://www.suse.com/security/cve/CVE-2012-1457/" source="CVE"/>
		<reference ref_id="CVE-2012-1458" ref_url="https://www.suse.com/security/cve/CVE-2012-1458/" source="CVE"/>
		<reference ref_id="CVE-2012-1459" ref_url="https://www.suse.com/security/cve/CVE-2012-1459/" source="CVE"/>
		<reference ref_id="CVE-2013-6497" ref_url="https://www.suse.com/security/cve/CVE-2013-6497/" source="CVE"/>
		<reference ref_id="CVE-2014-9050" ref_url="https://www.suse.com/security/cve/CVE-2014-9050/" source="CVE"/>
		<reference ref_id="CVE-2014-9328" ref_url="https://www.suse.com/security/cve/CVE-2014-9328/" source="CVE"/>
		<reference ref_id="CVE-2015-1461" ref_url="https://www.suse.com/security/cve/CVE-2015-1461/" source="CVE"/>
		<reference ref_id="CVE-2015-1462" ref_url="https://www.suse.com/security/cve/CVE-2015-1462/" source="CVE"/>
		<reference ref_id="CVE-2015-1463" ref_url="https://www.suse.com/security/cve/CVE-2015-1463/" source="CVE"/>
		<reference ref_id="CVE-2015-2170" ref_url="https://www.suse.com/security/cve/CVE-2015-2170/" source="CVE"/>
		<reference ref_id="CVE-2015-2221" ref_url="https://www.suse.com/security/cve/CVE-2015-2221/" source="CVE"/>
		<reference ref_id="CVE-2015-2222" ref_url="https://www.suse.com/security/cve/CVE-2015-2222/" source="CVE"/>
		<reference ref_id="CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305/" source="CVE"/>
		<reference ref_id="CVE-2015-2668" ref_url="https://www.suse.com/security/cve/CVE-2015-2668/" source="CVE"/>
		<description>
These are all security issues fixed in the clamav-0.99.2-25.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2721/">CVE-2011-2721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3627/">CVE-2011-3627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1457/">CVE-2012-1457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1458/">CVE-2012-1458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1459/">CVE-2012-1459</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6497/">CVE-2013-6497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9050/">CVE-2014-9050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9328/">CVE-2014-9328</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1461/">CVE-2015-1461</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1462/">CVE-2015-1462</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1463/">CVE-2015-1463</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2170/">CVE-2015-2170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2221/">CVE-2015-2221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2222/">CVE-2015-2222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2668/">CVE-2015-2668</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76192" version="1" class="patch">
	<metadata>
		<title>colord-1.3.3-10.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-4349" ref_url="https://www.suse.com/security/cve/CVE-2011-4349/" source="CVE"/>
		<description>
These are all security issues fixed in the colord-1.3.3-10.14 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4349/">CVE-2011-4349</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142079" comment="colord-1.3.3-10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140490" comment="colord-gtk-lang-0.1.26-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142080" comment="colord-lang-1.3.3-10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140491" comment="libcolord-gtk1-0.1.26-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140492" comment="libcolord2-1.3.3-10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140493" comment="libcolord2-32bit-1.3.3-10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140494" comment="libcolorhug2-1.3.3-10.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76193" version="1" class="patch">
	<metadata>
		<title>coolkey-1.1.0-147.71 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-4129" ref_url="https://www.suse.com/security/cve/CVE-2007-4129/" source="CVE"/>
		<description>
These are all security issues fixed in the coolkey-1.1.0-147.71 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4129/">CVE-2007-4129</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140495" comment="coolkey-1.1.0-147.71 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76194" version="1" class="patch">
	<metadata>
		<title>coreutils-8.25-12.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-0221" ref_url="https://www.suse.com/security/cve/CVE-2013-0221/" source="CVE"/>
		<reference ref_id="CVE-2013-0222" ref_url="https://www.suse.com/security/cve/CVE-2013-0222/" source="CVE"/>
		<reference ref_id="CVE-2013-0223" ref_url="https://www.suse.com/security/cve/CVE-2013-0223/" source="CVE"/>
		<reference ref_id="CVE-2015-4041" ref_url="https://www.suse.com/security/cve/CVE-2015-4041/" source="CVE"/>
		<reference ref_id="CVE-2015-4042" ref_url="https://www.suse.com/security/cve/CVE-2015-4042/" source="CVE"/>
		<description>
These are all security issues fixed in the coreutils-8.25-12.8 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0221/">CVE-2013-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0222/">CVE-2013-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0223/">CVE-2013-0223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4041/">CVE-2015-4041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4042/">CVE-2015-4042</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140496" comment="coreutils-8.25-12.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140497" comment="coreutils-lang-8.25-12.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76195" version="1" class="patch">
	<metadata>
		<title>cpio-2.11-29.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-0624" ref_url="https://www.suse.com/security/cve/CVE-2010-0624/" source="CVE"/>
		<reference ref_id="CVE-2014-9112" ref_url="https://www.suse.com/security/cve/CVE-2014-9112/" source="CVE"/>
		<description>
These are all security issues fixed in the cpio-2.11-29.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0624/">CVE-2010-0624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9112/">CVE-2014-9112</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009102938" comment="cpio-2.11-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102939" comment="cpio-lang-2.11-29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76196" version="1" class="patch">
	<metadata>
		<title>cpp48-4.8.5-30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-5044" ref_url="https://www.suse.com/security/cve/CVE-2014-5044/" source="CVE"/>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<description>
These are all security issues fixed in the cpp48-4.8.5-30.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5044/">CVE-2014-5044</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140498" comment="cpp48-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140499" comment="gcc48-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140500" comment="gcc48-32bit-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140501" comment="gcc48-c++-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142081" comment="gcc48-gij-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142082" comment="gcc48-gij-32bit-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140502" comment="gcc48-info-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140504" comment="libasan0-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140505" comment="libasan0-32bit-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142083" comment="libgcj48-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142084" comment="libgcj48-32bit-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142085" comment="libgcj48-jar-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142086" comment="libgcj_bc1-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140506" comment="libstdc++48-devel-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140507" comment="libstdc++48-devel-32bit-4.8.5-30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76197" version="1" class="patch">
	<metadata>
		<title>cracklib-2.9.0-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2016-6318" ref_url="https://www.suse.com/security/cve/CVE-2016-6318/" source="CVE"/>
		<description>
These are all security issues fixed in the cracklib-2.9.0-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6318/">CVE-2016-6318</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130930" comment="cracklib-2.9.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131013" comment="libcrack2-2.9.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131014" comment="libcrack2-32bit-2.9.0-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76198" version="1" class="patch">
	<metadata>
		<title>cron-4.2-58.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-2607" ref_url="https://www.suse.com/security/cve/CVE-2006-2607/" source="CVE"/>
		<reference ref_id="CVE-2010-0424" ref_url="https://www.suse.com/security/cve/CVE-2010-0424/" source="CVE"/>
		<description>
These are all security issues fixed in the cron-4.2-58.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2607/">CVE-2006-2607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0424/">CVE-2010-0424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140508" comment="cron-4.2-58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140509" comment="cronie-1.4.11-58.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76199" version="1" class="patch">
	<metadata>
		<title>ctags-5.8-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-7204" ref_url="https://www.suse.com/security/cve/CVE-2014-7204/" source="CVE"/>
		<description>
These are all security issues fixed in the ctags-5.8-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7204/">CVE-2014-7204</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130995" comment="ctags-5.8-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76200" version="1" class="patch">
	<metadata>
		<title>cups-1.7.5-12.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0163" ref_url="https://www.suse.com/security/cve/CVE-2009-0163/" source="CVE"/>
		<reference ref_id="CVE-2009-2820" ref_url="https://www.suse.com/security/cve/CVE-2009-2820/" source="CVE"/>
		<reference ref_id="CVE-2009-3553" ref_url="https://www.suse.com/security/cve/CVE-2009-3553/" source="CVE"/>
		<reference ref_id="CVE-2010-0393" ref_url="https://www.suse.com/security/cve/CVE-2010-0393/" source="CVE"/>
		<reference ref_id="CVE-2010-0540" ref_url="https://www.suse.com/security/cve/CVE-2010-0540/" source="CVE"/>
		<reference ref_id="CVE-2010-0542" ref_url="https://www.suse.com/security/cve/CVE-2010-0542/" source="CVE"/>
		<reference ref_id="CVE-2010-1748" ref_url="https://www.suse.com/security/cve/CVE-2010-1748/" source="CVE"/>
		<reference ref_id="CVE-2010-2941" ref_url="https://www.suse.com/security/cve/CVE-2010-2941/" source="CVE"/>
		<reference ref_id="CVE-2012-5519" ref_url="https://www.suse.com/security/cve/CVE-2012-5519/" source="CVE"/>
		<reference ref_id="CVE-2012-6094" ref_url="https://www.suse.com/security/cve/CVE-2012-6094/" source="CVE"/>
		<reference ref_id="CVE-2014-2856" ref_url="https://www.suse.com/security/cve/CVE-2014-2856/" source="CVE"/>
		<reference ref_id="CVE-2014-3537" ref_url="https://www.suse.com/security/cve/CVE-2014-3537/" source="CVE"/>
		<reference ref_id="CVE-2014-5029" ref_url="https://www.suse.com/security/cve/CVE-2014-5029/" source="CVE"/>
		<reference ref_id="CVE-2014-5030" ref_url="https://www.suse.com/security/cve/CVE-2014-5030/" source="CVE"/>
		<reference ref_id="CVE-2014-5031" ref_url="https://www.suse.com/security/cve/CVE-2014-5031/" source="CVE"/>
		<reference ref_id="CVE-2014-9679" ref_url="https://www.suse.com/security/cve/CVE-2014-9679/" source="CVE"/>
		<reference ref_id="CVE-2015-1158" ref_url="https://www.suse.com/security/cve/CVE-2015-1158/" source="CVE"/>
		<reference ref_id="CVE-2015-1159" ref_url="https://www.suse.com/security/cve/CVE-2015-1159/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-1.7.5-12.4 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0163/">CVE-2009-0163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2820/">CVE-2009-2820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3553/">CVE-2009-3553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0393/">CVE-2010-0393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0540/">CVE-2010-0540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0542/">CVE-2010-0542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1748/">CVE-2010-1748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2941/">CVE-2010-2941</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5519/">CVE-2012-5519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6094/">CVE-2012-6094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2856/">CVE-2014-2856</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3537/">CVE-2014-3537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5029/">CVE-2014-5029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5030/">CVE-2014-5030</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5031/">CVE-2014-5031</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9679/">CVE-2014-9679</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1158/">CVE-2015-1158</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1159/">CVE-2015-1159</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76201" version="1" class="patch">
	<metadata>
		<title>cups-filters-1.0.58-13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-6473" ref_url="https://www.suse.com/security/cve/CVE-2013-6473/" source="CVE"/>
		<reference ref_id="CVE-2013-6474" ref_url="https://www.suse.com/security/cve/CVE-2013-6474/" source="CVE"/>
		<reference ref_id="CVE-2013-6475" ref_url="https://www.suse.com/security/cve/CVE-2013-6475/" source="CVE"/>
		<reference ref_id="CVE-2013-6476" ref_url="https://www.suse.com/security/cve/CVE-2013-6476/" source="CVE"/>
		<reference ref_id="CVE-2014-2707" ref_url="https://www.suse.com/security/cve/CVE-2014-2707/" source="CVE"/>
		<reference ref_id="CVE-2014-4336" ref_url="https://www.suse.com/security/cve/CVE-2014-4336/" source="CVE"/>
		<reference ref_id="CVE-2014-4337" ref_url="https://www.suse.com/security/cve/CVE-2014-4337/" source="CVE"/>
		<reference ref_id="CVE-2014-4338" ref_url="https://www.suse.com/security/cve/CVE-2014-4338/" source="CVE"/>
		<reference ref_id="CVE-2015-2265" ref_url="https://www.suse.com/security/cve/CVE-2015-2265/" source="CVE"/>
		<reference ref_id="CVE-2015-3258" ref_url="https://www.suse.com/security/cve/CVE-2015-3258/" source="CVE"/>
		<reference ref_id="CVE-2015-3279" ref_url="https://www.suse.com/security/cve/CVE-2015-3279/" source="CVE"/>
		<reference ref_id="CVE-2015-8327" ref_url="https://www.suse.com/security/cve/CVE-2015-8327/" source="CVE"/>
		<reference ref_id="CVE-2015-8560" ref_url="https://www.suse.com/security/cve/CVE-2015-8560/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-filters-1.0.58-13.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6473/">CVE-2013-6473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6474/">CVE-2013-6474</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6475/">CVE-2013-6475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6476/">CVE-2013-6476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2707/">CVE-2014-2707</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4336/">CVE-2014-4336</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4337/">CVE-2014-4337</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4338/">CVE-2014-4338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2265/">CVE-2015-2265</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3258/">CVE-2015-3258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3279/">CVE-2015-3279</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8327/">CVE-2015-8327</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8560/">CVE-2015-8560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009119506" comment="cups-filters-1.0.58-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009119507" comment="cups-filters-cups-browsed-1.0.58-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009119508" comment="cups-filters-foomatic-rip-1.0.58-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009119509" comment="cups-filters-ghostscript-1.0.58-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76202" version="1" class="patch">
	<metadata>
		<title>cups-pk-helper-0.2.5-3.75 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-4510" ref_url="https://www.suse.com/security/cve/CVE-2012-4510/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-pk-helper-0.2.5-3.75 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4510/">CVE-2012-4510</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140514" comment="cups-pk-helper-0.2.5-3.75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140515" comment="cups-pk-helper-lang-0.2.5-3.75 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76203" version="1" class="patch">
	<metadata>
		<title>curl-7.37.0-28.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0037" ref_url="https://www.suse.com/security/cve/CVE-2009-0037/" source="CVE"/>
		<reference ref_id="CVE-2009-2417" ref_url="https://www.suse.com/security/cve/CVE-2009-2417/" source="CVE"/>
		<reference ref_id="CVE-2013-0249" ref_url="https://www.suse.com/security/cve/CVE-2013-0249/" source="CVE"/>
		<reference ref_id="CVE-2013-1944" ref_url="https://www.suse.com/security/cve/CVE-2013-1944/" source="CVE"/>
		<reference ref_id="CVE-2013-2174" ref_url="https://www.suse.com/security/cve/CVE-2013-2174/" source="CVE"/>
		<reference ref_id="CVE-2013-4545" ref_url="https://www.suse.com/security/cve/CVE-2013-4545/" source="CVE"/>
		<reference ref_id="CVE-2014-0015" ref_url="https://www.suse.com/security/cve/CVE-2014-0015/" source="CVE"/>
		<reference ref_id="CVE-2014-0138" ref_url="https://www.suse.com/security/cve/CVE-2014-0138/" source="CVE"/>
		<reference ref_id="CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139/" source="CVE"/>
		<reference ref_id="CVE-2014-3613" ref_url="https://www.suse.com/security/cve/CVE-2014-3613/" source="CVE"/>
		<reference ref_id="CVE-2014-3620" ref_url="https://www.suse.com/security/cve/CVE-2014-3620/" source="CVE"/>
		<reference ref_id="CVE-2014-3707" ref_url="https://www.suse.com/security/cve/CVE-2014-3707/" source="CVE"/>
		<reference ref_id="CVE-2014-8150" ref_url="https://www.suse.com/security/cve/CVE-2014-8150/" source="CVE"/>
		<reference ref_id="CVE-2015-3143" ref_url="https://www.suse.com/security/cve/CVE-2015-3143/" source="CVE"/>
		<reference ref_id="CVE-2015-3144" ref_url="https://www.suse.com/security/cve/CVE-2015-3144/" source="CVE"/>
		<reference ref_id="CVE-2015-3145" ref_url="https://www.suse.com/security/cve/CVE-2015-3145/" source="CVE"/>
		<reference ref_id="CVE-2015-3148" ref_url="https://www.suse.com/security/cve/CVE-2015-3148/" source="CVE"/>
		<reference ref_id="CVE-2015-3153" ref_url="https://www.suse.com/security/cve/CVE-2015-3153/" source="CVE"/>
		<reference ref_id="CVE-2016-0755" ref_url="https://www.suse.com/security/cve/CVE-2016-0755/" source="CVE"/>
		<reference ref_id="CVE-2016-5419" ref_url="https://www.suse.com/security/cve/CVE-2016-5419/" source="CVE"/>
		<reference ref_id="CVE-2016-5420" ref_url="https://www.suse.com/security/cve/CVE-2016-5420/" source="CVE"/>
		<reference ref_id="CVE-2016-5421" ref_url="https://www.suse.com/security/cve/CVE-2016-5421/" source="CVE"/>
		<reference ref_id="CVE-2016-7141" ref_url="https://www.suse.com/security/cve/CVE-2016-7141/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-7.37.0-28.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0037/">CVE-2009-0037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2417/">CVE-2009-2417</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0249/">CVE-2013-0249</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1944/">CVE-2013-1944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2174/">CVE-2013-2174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4545/">CVE-2013-4545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0015/">CVE-2014-0015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0138/">CVE-2014-0138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3613/">CVE-2014-3613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3620/">CVE-2014-3620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3707/">CVE-2014-3707</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8150/">CVE-2014-8150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3143/">CVE-2015-3143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3144/">CVE-2015-3144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3145/">CVE-2015-3145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3148/">CVE-2015-3148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3153/">CVE-2015-3153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0755/">CVE-2016-0755</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5419/">CVE-2016-5419</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5420/">CVE-2016-5420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5421/">CVE-2016-5421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7141/">CVE-2016-7141</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76204" version="1" class="patch">
	<metadata>
		<title>cvs-1.12.12-181.63 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-0804" ref_url="https://www.suse.com/security/cve/CVE-2012-0804/" source="CVE"/>
		<description>
These are all security issues fixed in the cvs-1.12.12-181.63 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0804/">CVE-2012-0804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140516" comment="cvs-1.12.12-181.63 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76205" version="1" class="patch">
	<metadata>
		<title>cyrus-sasl-2.1.26-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0688" ref_url="https://www.suse.com/security/cve/CVE-2009-0688/" source="CVE"/>
		<description>
These are all security issues fixed in the cyrus-sasl-2.1.26-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0688/">CVE-2009-0688</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140518" comment="cyrus-sasl-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140519" comment="cyrus-sasl-32bit-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140520" comment="cyrus-sasl-crammd5-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140521" comment="cyrus-sasl-crammd5-32bit-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140522" comment="cyrus-sasl-digestmd5-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141292" comment="cyrus-sasl-digestmd5-32bit-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140523" comment="cyrus-sasl-gssapi-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140524" comment="cyrus-sasl-gssapi-32bit-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140527" comment="cyrus-sasl-plain-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140528" comment="cyrus-sasl-plain-32bit-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140529" comment="cyrus-sasl-saslauthd-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140532" comment="libsasl2-3-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140533" comment="libsasl2-3-32bit-2.1.26-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76206" version="1" class="patch">
	<metadata>
		<title>dbus-1-1.8.16-19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-4352" ref_url="https://www.suse.com/security/cve/CVE-2010-4352/" source="CVE"/>
		<reference ref_id="CVE-2012-3524" ref_url="https://www.suse.com/security/cve/CVE-2012-3524/" source="CVE"/>
		<reference ref_id="CVE-2013-2168" ref_url="https://www.suse.com/security/cve/CVE-2013-2168/" source="CVE"/>
		<reference ref_id="CVE-2014-3477" ref_url="https://www.suse.com/security/cve/CVE-2014-3477/" source="CVE"/>
		<reference ref_id="CVE-2014-3532" ref_url="https://www.suse.com/security/cve/CVE-2014-3532/" source="CVE"/>
		<reference ref_id="CVE-2014-3533" ref_url="https://www.suse.com/security/cve/CVE-2014-3533/" source="CVE"/>
		<reference ref_id="CVE-2014-3635" ref_url="https://www.suse.com/security/cve/CVE-2014-3635/" source="CVE"/>
		<reference ref_id="CVE-2014-3636" ref_url="https://www.suse.com/security/cve/CVE-2014-3636/" source="CVE"/>
		<reference ref_id="CVE-2014-3637" ref_url="https://www.suse.com/security/cve/CVE-2014-3637/" source="CVE"/>
		<reference ref_id="CVE-2014-3638" ref_url="https://www.suse.com/security/cve/CVE-2014-3638/" source="CVE"/>
		<reference ref_id="CVE-2014-3639" ref_url="https://www.suse.com/security/cve/CVE-2014-3639/" source="CVE"/>
		<reference ref_id="CVE-2014-7824" ref_url="https://www.suse.com/security/cve/CVE-2014-7824/" source="CVE"/>
		<reference ref_id="CVE-2014-8148" ref_url="https://www.suse.com/security/cve/CVE-2014-8148/" source="CVE"/>
		<reference ref_id="CVE-2015-0245" ref_url="https://www.suse.com/security/cve/CVE-2015-0245/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-1.8.16-19.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4352/">CVE-2010-4352</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3524/">CVE-2012-3524</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2168/">CVE-2013-2168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3477/">CVE-2014-3477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3532/">CVE-2014-3532</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3533/">CVE-2014-3533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3635/">CVE-2014-3635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3636/">CVE-2014-3636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3637/">CVE-2014-3637</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3638/">CVE-2014-3638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3639/">CVE-2014-3639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7824/">CVE-2014-7824</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8148/">CVE-2014-8148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0245/">CVE-2015-0245</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140535" comment="dbus-1-1.8.16-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140536" comment="dbus-1-x11-1.8.16-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140537" comment="libdbus-1-3-1.8.16-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140538" comment="libdbus-1-3-32bit-1.8.16-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76207" version="1" class="patch">
	<metadata>
		<title>dbus-1-glib-0.100.2-3.58 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-1172" ref_url="https://www.suse.com/security/cve/CVE-2010-1172/" source="CVE"/>
		<reference ref_id="CVE-2013-0292" ref_url="https://www.suse.com/security/cve/CVE-2013-0292/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-glib-0.100.2-3.58 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1172/">CVE-2010-1172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0292/">CVE-2013-0292</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140539" comment="dbus-1-glib-0.100.2-3.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140540" comment="dbus-1-glib-32bit-0.100.2-3.58 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76208" version="1" class="patch">
	<metadata>
		<title>dhcp-4.3.3-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-1892" ref_url="https://www.suse.com/security/cve/CVE-2009-1892/" source="CVE"/>
		<reference ref_id="CVE-2010-2156" ref_url="https://www.suse.com/security/cve/CVE-2010-2156/" source="CVE"/>
		<reference ref_id="CVE-2010-3611" ref_url="https://www.suse.com/security/cve/CVE-2010-3611/" source="CVE"/>
		<reference ref_id="CVE-2010-3616" ref_url="https://www.suse.com/security/cve/CVE-2010-3616/" source="CVE"/>
		<reference ref_id="CVE-2011-0413" ref_url="https://www.suse.com/security/cve/CVE-2011-0413/" source="CVE"/>
		<reference ref_id="CVE-2011-0997" ref_url="https://www.suse.com/security/cve/CVE-2011-0997/" source="CVE"/>
		<reference ref_id="CVE-2011-2748" ref_url="https://www.suse.com/security/cve/CVE-2011-2748/" source="CVE"/>
		<reference ref_id="CVE-2011-2749" ref_url="https://www.suse.com/security/cve/CVE-2011-2749/" source="CVE"/>
		<reference ref_id="CVE-2011-4539" ref_url="https://www.suse.com/security/cve/CVE-2011-4539/" source="CVE"/>
		<reference ref_id="CVE-2011-4868" ref_url="https://www.suse.com/security/cve/CVE-2011-4868/" source="CVE"/>
		<reference ref_id="CVE-2012-3570" ref_url="https://www.suse.com/security/cve/CVE-2012-3570/" source="CVE"/>
		<reference ref_id="CVE-2012-3571" ref_url="https://www.suse.com/security/cve/CVE-2012-3571/" source="CVE"/>
		<reference ref_id="CVE-2012-3954" ref_url="https://www.suse.com/security/cve/CVE-2012-3954/" source="CVE"/>
		<reference ref_id="CVE-2012-3955" ref_url="https://www.suse.com/security/cve/CVE-2012-3955/" source="CVE"/>
		<reference ref_id="CVE-2013-2266" ref_url="https://www.suse.com/security/cve/CVE-2013-2266/" source="CVE"/>
		<reference ref_id="CVE-2015-8605" ref_url="https://www.suse.com/security/cve/CVE-2015-8605/" source="CVE"/>
		<description>
These are all security issues fixed in the dhcp-4.3.3-9.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1892/">CVE-2009-1892</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2156/">CVE-2010-2156</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3611/">CVE-2010-3611</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3616/">CVE-2010-3616</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0413/">CVE-2011-0413</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0997/">CVE-2011-0997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2748/">CVE-2011-2748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2749/">CVE-2011-2749</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4539/">CVE-2011-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4868/">CVE-2011-4868</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3570/">CVE-2012-3570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3571/">CVE-2012-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3954/">CVE-2012-3954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3955/">CVE-2012-3955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2266/">CVE-2013-2266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8605/">CVE-2015-8605</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76209" version="1" class="patch">
	<metadata>
		<title>dia-0.97.3-15.63 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-5984" ref_url="https://www.suse.com/security/cve/CVE-2008-5984/" source="CVE"/>
		<description>
These are all security issues fixed in the dia-0.97.3-15.63 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5984/">CVE-2008-5984</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142087" comment="dia-0.97.3-15.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142088" comment="dia-lang-0.97.3-15.63 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76210" version="1" class="patch">
	<metadata>
		<title>dnsmasq-2.71-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-3294" ref_url="https://www.suse.com/security/cve/CVE-2015-3294/" source="CVE"/>
		<description>
These are all security issues fixed in the dnsmasq-2.71-10.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3294/">CVE-2015-3294</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140541" comment="dnsmasq-2.71-10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76211" version="1" class="patch">
	<metadata>
		<title>dosfstools-3.0.26-6.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-8872" ref_url="https://www.suse.com/security/cve/CVE-2015-8872/" source="CVE"/>
		<reference ref_id="CVE-2016-4804" ref_url="https://www.suse.com/security/cve/CVE-2016-4804/" source="CVE"/>
		<description>
These are all security issues fixed in the dosfstools-3.0.26-6.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8872/">CVE-2015-8872</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4804/">CVE-2016-4804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131020" comment="dosfstools-3.0.26-6.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76212" version="1" class="patch">
	<metadata>
		<title>dracut-044-87.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-4453" ref_url="https://www.suse.com/security/cve/CVE-2012-4453/" source="CVE"/>
		<description>
These are all security issues fixed in the dracut-044-87.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4453/">CVE-2012-4453</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140546" comment="dracut-044-87.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76213" version="1" class="patch">
	<metadata>
		<title>e2fsprogs-1.42.11-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-0247" ref_url="https://www.suse.com/security/cve/CVE-2015-0247/" source="CVE"/>
		<reference ref_id="CVE-2015-1572" ref_url="https://www.suse.com/security/cve/CVE-2015-1572/" source="CVE"/>
		<description>
These are all security issues fixed in the e2fsprogs-1.42.11-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-0247/">CVE-2015-0247</cve>
	<cve impact="low" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-1572/">CVE-2015-1572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009113256" comment="e2fsprogs-1.42.11-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113260" comment="libcom_err2-1.42.11-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113261" comment="libcom_err2-32bit-1.42.11-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113264" comment="libext2fs2-1.42.11-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76214" version="1" class="patch">
	<metadata>
		<title>ecryptfs-utils-103-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1831" ref_url="https://www.suse.com/security/cve/CVE-2011-1831/" source="CVE"/>
		<reference ref_id="CVE-2011-1832" ref_url="https://www.suse.com/security/cve/CVE-2011-1832/" source="CVE"/>
		<reference ref_id="CVE-2011-1833" ref_url="https://www.suse.com/security/cve/CVE-2011-1833/" source="CVE"/>
		<reference ref_id="CVE-2011-1834" ref_url="https://www.suse.com/security/cve/CVE-2011-1834/" source="CVE"/>
		<reference ref_id="CVE-2011-1835" ref_url="https://www.suse.com/security/cve/CVE-2011-1835/" source="CVE"/>
		<reference ref_id="CVE-2011-1836" ref_url="https://www.suse.com/security/cve/CVE-2011-1836/" source="CVE"/>
		<reference ref_id="CVE-2011-1837" ref_url="https://www.suse.com/security/cve/CVE-2011-1837/" source="CVE"/>
		<reference ref_id="CVE-2014-9687" ref_url="https://www.suse.com/security/cve/CVE-2014-9687/" source="CVE"/>
		<reference ref_id="CVE-2016-1572" ref_url="https://www.suse.com/security/cve/CVE-2016-1572/" source="CVE"/>
		<description>
These are all security issues fixed in the ecryptfs-utils-103-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1831/">CVE-2011-1831</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1832/">CVE-2011-1832</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1833/">CVE-2011-1833</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1834/">CVE-2011-1834</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1835/">CVE-2011-1835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1836/">CVE-2011-1836</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1837/">CVE-2011-1837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9687/">CVE-2014-9687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1572/">CVE-2016-1572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009121566" comment="ecryptfs-utils-103-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121567" comment="ecryptfs-utils-32bit-103-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76215" version="1" class="patch">
	<metadata>
		<title>elfutils-0.158-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-0172" ref_url="https://www.suse.com/security/cve/CVE-2014-0172/" source="CVE"/>
		<reference ref_id="CVE-2014-9447" ref_url="https://www.suse.com/security/cve/CVE-2014-9447/" source="CVE"/>
		<description>
These are all security issues fixed in the elfutils-0.158-6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0172/">CVE-2014-0172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9447/">CVE-2014-9447</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106094" comment="elfutils-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106096" comment="libasm1-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106099" comment="libdw1-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106100" comment="libdw1-32bit-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106102" comment="libebl1-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106103" comment="libebl1-32bit-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106106" comment="libelf1-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106107" comment="libelf1-32bit-0.158-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76216" version="1" class="patch">
	<metadata>
		<title>emacs-24.3-16.32 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-0035" ref_url="https://www.suse.com/security/cve/CVE-2012-0035/" source="CVE"/>
		<reference ref_id="CVE-2014-3421" ref_url="https://www.suse.com/security/cve/CVE-2014-3421/" source="CVE"/>
		<reference ref_id="CVE-2014-3422" ref_url="https://www.suse.com/security/cve/CVE-2014-3422/" source="CVE"/>
		<reference ref_id="CVE-2014-3423" ref_url="https://www.suse.com/security/cve/CVE-2014-3423/" source="CVE"/>
		<reference ref_id="CVE-2014-3424" ref_url="https://www.suse.com/security/cve/CVE-2014-3424/" source="CVE"/>
		<description>
These are all security issues fixed in the emacs-24.3-16.32 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0035/">CVE-2012-0035</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3421/">CVE-2014-3421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3422/">CVE-2014-3422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3423/">CVE-2014-3423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3424/">CVE-2014-3424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140549" comment="emacs-24.3-16.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140551" comment="emacs-info-24.3-16.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140553" comment="emacs-x11-24.3-16.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140554" comment="etags-24.3-16.32 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76217" version="1" class="patch">
	<metadata>
		<title>empathy-3.12.12-5.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-3635" ref_url="https://www.suse.com/security/cve/CVE-2011-3635/" source="CVE"/>
		<description>
These are all security issues fixed in the empathy-3.12.12-5.12 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3635/">CVE-2011-3635</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142089" comment="empathy-3.12.12-5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142090" comment="empathy-lang-3.12.12-5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142091" comment="telepathy-mission-control-plugin-goa-3.12.12-5.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76218" version="1" class="patch">
	<metadata>
		<title>eog-3.20.4-7.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-7447" ref_url="https://www.suse.com/security/cve/CVE-2013-7447/" source="CVE"/>
		<reference ref_id="CVE-2016-6855" ref_url="https://www.suse.com/security/cve/CVE-2016-6855/" source="CVE"/>
		<description>
These are all security issues fixed in the eog-3.20.4-7.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7447/">CVE-2013-7447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6855/">CVE-2016-6855</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140555" comment="eog-3.20.4-7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140556" comment="eog-lang-3.20.4-7.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76219" version="1" class="patch">
	<metadata>
		<title>evince-3.20.1-5.66 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2640" ref_url="https://www.suse.com/security/cve/CVE-2010-2640/" source="CVE"/>
		<reference ref_id="CVE-2010-2641" ref_url="https://www.suse.com/security/cve/CVE-2010-2641/" source="CVE"/>
		<reference ref_id="CVE-2010-2642" ref_url="https://www.suse.com/security/cve/CVE-2010-2642/" source="CVE"/>
		<reference ref_id="CVE-2010-2643" ref_url="https://www.suse.com/security/cve/CVE-2010-2643/" source="CVE"/>
		<description>
These are all security issues fixed in the evince-3.20.1-5.66 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2640/">CVE-2010-2640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2641/">CVE-2010-2641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2642/">CVE-2010-2642</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2643/">CVE-2010-2643</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140557" comment="evince-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140558" comment="evince-browser-plugin-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140559" comment="evince-lang-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140560" comment="evince-plugin-djvudocument-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140561" comment="evince-plugin-dvidocument-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140562" comment="evince-plugin-pdfdocument-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140563" comment="evince-plugin-psdocument-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140564" comment="evince-plugin-tiffdocument-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140565" comment="evince-plugin-xpsdocument-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140566" comment="libevdocument3-4-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140567" comment="libevview3-3-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140568" comment="nautilus-evince-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142092" comment="typelib-1_0-EvinceDocument-3_0-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142093" comment="typelib-1_0-EvinceView-3_0-3.20.1-5.66 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76220" version="1" class="patch">
	<metadata>
		<title>expat-2.1.0-17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-2625" ref_url="https://www.suse.com/security/cve/CVE-2009-2625/" source="CVE"/>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<reference ref_id="CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876/" source="CVE"/>
		<reference ref_id="CVE-2012-1147" ref_url="https://www.suse.com/security/cve/CVE-2012-1147/" source="CVE"/>
		<reference ref_id="CVE-2012-1148" ref_url="https://www.suse.com/security/cve/CVE-2012-1148/" source="CVE"/>
		<reference ref_id="CVE-2015-1283" ref_url="https://www.suse.com/security/cve/CVE-2015-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.1.0-17.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2625/">CVE-2009-2625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1147/">CVE-2012-1147</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1148/">CVE-2012-1148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1283/">CVE-2015-1283</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128464" comment="expat-2.1.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128465" comment="libexpat1-2.1.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128466" comment="libexpat1-32bit-2.1.0-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76221" version="1" class="patch">
	<metadata>
		<title>facter-2.0.2-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-3248" ref_url="https://www.suse.com/security/cve/CVE-2014-3248/" source="CVE"/>
		<description>
These are all security issues fixed in the facter-2.0.2-6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3248/">CVE-2014-3248</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141860" comment="facter-2.0.2-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76222" version="1" class="patch">
	<metadata>
		<title>fetchmail-6.3.26-12.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-2666" ref_url="https://www.suse.com/security/cve/CVE-2009-2666/" source="CVE"/>
		<reference ref_id="CVE-2010-1167" ref_url="https://www.suse.com/security/cve/CVE-2010-1167/" source="CVE"/>
		<reference ref_id="CVE-2011-1947" ref_url="https://www.suse.com/security/cve/CVE-2011-1947/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2012-3482" ref_url="https://www.suse.com/security/cve/CVE-2012-3482/" source="CVE"/>
		<description>
These are all security issues fixed in the fetchmail-6.3.26-12.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2666/">CVE-2009-2666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1167/">CVE-2010-1167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1947/">CVE-2011-1947</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3482/">CVE-2012-3482</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140569" comment="fetchmail-6.3.26-12.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76223" version="1" class="patch">
	<metadata>
		<title>file-5.19-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-1571" ref_url="https://www.suse.com/security/cve/CVE-2012-1571/" source="CVE"/>
		<reference ref_id="CVE-2014-3710" ref_url="https://www.suse.com/security/cve/CVE-2014-3710/" source="CVE"/>
		<reference ref_id="CVE-2014-8116" ref_url="https://www.suse.com/security/cve/CVE-2014-8116/" source="CVE"/>
		<reference ref_id="CVE-2014-8117" ref_url="https://www.suse.com/security/cve/CVE-2014-8117/" source="CVE"/>
		<description>
These are all security issues fixed in the file-5.19-9.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1571/">CVE-2012-1571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3710/">CVE-2014-3710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8116/">CVE-2014-8116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8117/">CVE-2014-8117</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009103557" comment="file-5.19-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009103559" comment="file-magic-5.19-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009103561" comment="libmagic1-5.19-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009103560" comment="libmagic1-32bit-5.19-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76224" version="1" class="patch">
	<metadata>
		<title>finch-2.11.0-12.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-2694" ref_url="https://www.suse.com/security/cve/CVE-2009-2694/" source="CVE"/>
		<reference ref_id="CVE-2009-2703" ref_url="https://www.suse.com/security/cve/CVE-2009-2703/" source="CVE"/>
		<reference ref_id="CVE-2009-3026" ref_url="https://www.suse.com/security/cve/CVE-2009-3026/" source="CVE"/>
		<reference ref_id="CVE-2009-3083" ref_url="https://www.suse.com/security/cve/CVE-2009-3083/" source="CVE"/>
		<reference ref_id="CVE-2009-3084" ref_url="https://www.suse.com/security/cve/CVE-2009-3084/" source="CVE"/>
		<reference ref_id="CVE-2009-3085" ref_url="https://www.suse.com/security/cve/CVE-2009-3085/" source="CVE"/>
		<reference ref_id="CVE-2009-3615" ref_url="https://www.suse.com/security/cve/CVE-2009-3615/" source="CVE"/>
		<reference ref_id="CVE-2010-0013" ref_url="https://www.suse.com/security/cve/CVE-2010-0013/" source="CVE"/>
		<reference ref_id="CVE-2010-0277" ref_url="https://www.suse.com/security/cve/CVE-2010-0277/" source="CVE"/>
		<reference ref_id="CVE-2010-0420" ref_url="https://www.suse.com/security/cve/CVE-2010-0420/" source="CVE"/>
		<reference ref_id="CVE-2010-0423" ref_url="https://www.suse.com/security/cve/CVE-2010-0423/" source="CVE"/>
		<reference ref_id="CVE-2010-1624" ref_url="https://www.suse.com/security/cve/CVE-2010-1624/" source="CVE"/>
		<reference ref_id="CVE-2010-2528" ref_url="https://www.suse.com/security/cve/CVE-2010-2528/" source="CVE"/>
		<reference ref_id="CVE-2010-3711" ref_url="https://www.suse.com/security/cve/CVE-2010-3711/" source="CVE"/>
		<reference ref_id="CVE-2011-1091" ref_url="https://www.suse.com/security/cve/CVE-2011-1091/" source="CVE"/>
		<reference ref_id="CVE-2011-3594" ref_url="https://www.suse.com/security/cve/CVE-2011-3594/" source="CVE"/>
		<reference ref_id="CVE-2012-2214" ref_url="https://www.suse.com/security/cve/CVE-2012-2214/" source="CVE"/>
		<reference ref_id="CVE-2012-3374" ref_url="https://www.suse.com/security/cve/CVE-2012-3374/" source="CVE"/>
		<reference ref_id="CVE-2012-6152" ref_url="https://www.suse.com/security/cve/CVE-2012-6152/" source="CVE"/>
		<reference ref_id="CVE-2013-0271" ref_url="https://www.suse.com/security/cve/CVE-2013-0271/" source="CVE"/>
		<reference ref_id="CVE-2013-0272" ref_url="https://www.suse.com/security/cve/CVE-2013-0272/" source="CVE"/>
		<reference ref_id="CVE-2013-0273" ref_url="https://www.suse.com/security/cve/CVE-2013-0273/" source="CVE"/>
		<reference ref_id="CVE-2013-0274" ref_url="https://www.suse.com/security/cve/CVE-2013-0274/" source="CVE"/>
		<reference ref_id="CVE-2013-6477" ref_url="https://www.suse.com/security/cve/CVE-2013-6477/" source="CVE"/>
		<reference ref_id="CVE-2013-6478" ref_url="https://www.suse.com/security/cve/CVE-2013-6478/" source="CVE"/>
		<reference ref_id="CVE-2013-6479" ref_url="https://www.suse.com/security/cve/CVE-2013-6479/" source="CVE"/>
		<reference ref_id="CVE-2013-6481" ref_url="https://www.suse.com/security/cve/CVE-2013-6481/" source="CVE"/>
		<reference ref_id="CVE-2013-6482" ref_url="https://www.suse.com/security/cve/CVE-2013-6482/" source="CVE"/>
		<reference ref_id="CVE-2013-6483" ref_url="https://www.suse.com/security/cve/CVE-2013-6483/" source="CVE"/>
		<reference ref_id="CVE-2013-6484" ref_url="https://www.suse.com/security/cve/CVE-2013-6484/" source="CVE"/>
		<reference ref_id="CVE-2013-6485" ref_url="https://www.suse.com/security/cve/CVE-2013-6485/" source="CVE"/>
		<reference ref_id="CVE-2013-6486" ref_url="https://www.suse.com/security/cve/CVE-2013-6486/" source="CVE"/>
		<reference ref_id="CVE-2013-6487" ref_url="https://www.suse.com/security/cve/CVE-2013-6487/" source="CVE"/>
		<reference ref_id="CVE-2014-0020" ref_url="https://www.suse.com/security/cve/CVE-2014-0020/" source="CVE"/>
		<reference ref_id="CVE-2014-3694" ref_url="https://www.suse.com/security/cve/CVE-2014-3694/" source="CVE"/>
		<reference ref_id="CVE-2014-3695" ref_url="https://www.suse.com/security/cve/CVE-2014-3695/" source="CVE"/>
		<reference ref_id="CVE-2014-3696" ref_url="https://www.suse.com/security/cve/CVE-2014-3696/" source="CVE"/>
		<reference ref_id="CVE-2014-3697" ref_url="https://www.suse.com/security/cve/CVE-2014-3697/" source="CVE"/>
		<reference ref_id="CVE-2014-3698" ref_url="https://www.suse.com/security/cve/CVE-2014-3698/" source="CVE"/>
		<description>
These are all security issues fixed in the finch-2.11.0-12.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2694/">CVE-2009-2694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2703/">CVE-2009-2703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3026/">CVE-2009-3026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3083/">CVE-2009-3083</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3084/">CVE-2009-3084</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3085/">CVE-2009-3085</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3615/">CVE-2009-3615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0013/">CVE-2010-0013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0277/">CVE-2010-0277</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0420/">CVE-2010-0420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0423/">CVE-2010-0423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1624/">CVE-2010-1624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2528/">CVE-2010-2528</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3711/">CVE-2010-3711</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1091/">CVE-2011-1091</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3594/">CVE-2011-3594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2214/">CVE-2012-2214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3374/">CVE-2012-3374</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6152/">CVE-2012-6152</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0271/">CVE-2013-0271</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0272/">CVE-2013-0272</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0273/">CVE-2013-0273</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0274/">CVE-2013-0274</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6477/">CVE-2013-6477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6478/">CVE-2013-6478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6479/">CVE-2013-6479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6481/">CVE-2013-6481</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6482/">CVE-2013-6482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6483/">CVE-2013-6483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6484/">CVE-2013-6484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6485/">CVE-2013-6485</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-6486/">CVE-2013-6486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6487/">CVE-2013-6487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0020/">CVE-2014-0020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3694/">CVE-2014-3694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3695/">CVE-2014-3695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3696/">CVE-2014-3696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3697/">CVE-2014-3697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3698/">CVE-2014-3698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142094" comment="finch-2.11.0-12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142095" comment="libpurple-2.11.0-12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142096" comment="libpurple-lang-2.11.0-12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142097" comment="libpurple-meanwhile-2.11.0-12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142098" comment="libpurple-tcl-2.11.0-12.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142099" comment="pidgin-2.11.0-12.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76225" version="1" class="patch">
	<metadata>
		<title>fontconfig-2.11.1-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2016-5384" ref_url="https://www.suse.com/security/cve/CVE-2016-5384/" source="CVE"/>
		<description>
These are all security issues fixed in the fontconfig-2.11.1-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5384/">CVE-2016-5384</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140574" comment="fontconfig-2.11.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140575" comment="fontconfig-32bit-2.11.1-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76226" version="1" class="patch">
	<metadata>
		<title>freerdp-2.0.0~git.1463131968.4e66df7-11.69 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-0250" ref_url="https://www.suse.com/security/cve/CVE-2014-0250/" source="CVE"/>
		<reference ref_id="CVE-2014-0791" ref_url="https://www.suse.com/security/cve/CVE-2014-0791/" source="CVE"/>
		<description>
These are all security issues fixed in the freerdp-2.0.0~git.1463131968.4e66df7-11.69 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0250/">CVE-2014-0250</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0791/">CVE-2014-0791</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142100" comment="freerdp-2.0.0~git.1463131968.4e66df7-11.69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142101" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-11.69 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76227" version="1" class="patch">
	<metadata>
		<title>ft2demos-2.6.3-7.8.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0946" ref_url="https://www.suse.com/security/cve/CVE-2009-0946/" source="CVE"/>
		<reference ref_id="CVE-2010-2497" ref_url="https://www.suse.com/security/cve/CVE-2010-2497/" source="CVE"/>
		<reference ref_id="CVE-2010-2805" ref_url="https://www.suse.com/security/cve/CVE-2010-2805/" source="CVE"/>
		<reference ref_id="CVE-2010-3053" ref_url="https://www.suse.com/security/cve/CVE-2010-3053/" source="CVE"/>
		<reference ref_id="CVE-2010-3054" ref_url="https://www.suse.com/security/cve/CVE-2010-3054/" source="CVE"/>
		<reference ref_id="CVE-2010-3311" ref_url="https://www.suse.com/security/cve/CVE-2010-3311/" source="CVE"/>
		<reference ref_id="CVE-2010-3814" ref_url="https://www.suse.com/security/cve/CVE-2010-3814/" source="CVE"/>
		<reference ref_id="CVE-2011-0226" ref_url="https://www.suse.com/security/cve/CVE-2011-0226/" source="CVE"/>
		<reference ref_id="CVE-2012-5668" ref_url="https://www.suse.com/security/cve/CVE-2012-5668/" source="CVE"/>
		<reference ref_id="CVE-2012-5669" ref_url="https://www.suse.com/security/cve/CVE-2012-5669/" source="CVE"/>
		<reference ref_id="CVE-2012-5670" ref_url="https://www.suse.com/security/cve/CVE-2012-5670/" source="CVE"/>
		<reference ref_id="CVE-2014-2240" ref_url="https://www.suse.com/security/cve/CVE-2014-2240/" source="CVE"/>
		<reference ref_id="CVE-2014-9656" ref_url="https://www.suse.com/security/cve/CVE-2014-9656/" source="CVE"/>
		<reference ref_id="CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657/" source="CVE"/>
		<reference ref_id="CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658/" source="CVE"/>
		<reference ref_id="CVE-2014-9659" ref_url="https://www.suse.com/security/cve/CVE-2014-9659/" source="CVE"/>
		<reference ref_id="CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660/" source="CVE"/>
		<reference ref_id="CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661/" source="CVE"/>
		<reference ref_id="CVE-2014-9662" ref_url="https://www.suse.com/security/cve/CVE-2014-9662/" source="CVE"/>
		<reference ref_id="CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663/" source="CVE"/>
		<reference ref_id="CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664/" source="CVE"/>
		<reference ref_id="CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665/" source="CVE"/>
		<reference ref_id="CVE-2014-9666" ref_url="https://www.suse.com/security/cve/CVE-2014-9666/" source="CVE"/>
		<reference ref_id="CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667/" source="CVE"/>
		<reference ref_id="CVE-2014-9668" ref_url="https://www.suse.com/security/cve/CVE-2014-9668/" source="CVE"/>
		<reference ref_id="CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669/" source="CVE"/>
		<reference ref_id="CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670/" source="CVE"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<reference ref_id="CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672/" source="CVE"/>
		<reference ref_id="CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673/" source="CVE"/>
		<reference ref_id="CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674/" source="CVE"/>
		<reference ref_id="CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675/" source="CVE"/>
		<description>
These are all security issues fixed in the ft2demos-2.6.3-7.8.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0946/">CVE-2009-0946</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2497/">CVE-2010-2497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2805/">CVE-2010-2805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3053/">CVE-2010-3053</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3054/">CVE-2010-3054</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3311/">CVE-2010-3311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3814/">CVE-2010-3814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0226/">CVE-2011-0226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5668/">CVE-2012-5668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5669/">CVE-2012-5669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5670/">CVE-2012-5670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2240/">CVE-2014-2240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9656/">CVE-2014-9656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9659/">CVE-2014-9659</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9662/">CVE-2014-9662</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9666/">CVE-2014-9666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9668/">CVE-2014-9668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76228" version="1" class="patch">
	<metadata>
		<title>fuse-2.9.3-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-3297" ref_url="https://www.suse.com/security/cve/CVE-2009-3297/" source="CVE"/>
		<reference ref_id="CVE-2011-0541" ref_url="https://www.suse.com/security/cve/CVE-2011-0541/" source="CVE"/>
		<reference ref_id="CVE-2015-3202" ref_url="https://www.suse.com/security/cve/CVE-2015-3202/" source="CVE"/>
		<description>
These are all security issues fixed in the fuse-2.9.3-5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3297/">CVE-2009-3297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0541/">CVE-2011-0541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3202/">CVE-2015-3202</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110488" comment="fuse-2.9.3-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110491" comment="libfuse2-2.9.3-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76229" version="1" class="patch">
	<metadata>
		<title>gd-2.1.0-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-2497" ref_url="https://www.suse.com/security/cve/CVE-2014-2497/" source="CVE"/>
		<reference ref_id="CVE-2014-9709" ref_url="https://www.suse.com/security/cve/CVE-2014-9709/" source="CVE"/>
		<reference ref_id="CVE-2016-5116" ref_url="https://www.suse.com/security/cve/CVE-2016-5116/" source="CVE"/>
		<reference ref_id="CVE-2016-6128" ref_url="https://www.suse.com/security/cve/CVE-2016-6128/" source="CVE"/>
		<reference ref_id="CVE-2016-6132" ref_url="https://www.suse.com/security/cve/CVE-2016-6132/" source="CVE"/>
		<reference ref_id="CVE-2016-6161" ref_url="https://www.suse.com/security/cve/CVE-2016-6161/" source="CVE"/>
		<reference ref_id="CVE-2016-6207" ref_url="https://www.suse.com/security/cve/CVE-2016-6207/" source="CVE"/>
		<reference ref_id="CVE-2016-6214" ref_url="https://www.suse.com/security/cve/CVE-2016-6214/" source="CVE"/>
		<reference ref_id="CVE-2016-6905" ref_url="https://www.suse.com/security/cve/CVE-2016-6905/" source="CVE"/>
		<description>
These are all security issues fixed in the gd-2.1.0-12.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2497/">CVE-2014-2497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9709/">CVE-2014-9709</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5116/">CVE-2016-5116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6128/">CVE-2016-6128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6132/">CVE-2016-6132</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6161/">CVE-2016-6161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6207/">CVE-2016-6207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6214/">CVE-2016-6214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6905/">CVE-2016-6905</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131048" comment="gd-2.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131049" comment="gd-32bit-2.1.0-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76230" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-lang-2.34.0-16.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-2485" ref_url="https://www.suse.com/security/cve/CVE-2011-2485/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-7552" ref_url="https://www.suse.com/security/cve/CVE-2015-7552/" source="CVE"/>
		<reference ref_id="CVE-2015-7673" ref_url="https://www.suse.com/security/cve/CVE-2015-7673/" source="CVE"/>
		<reference ref_id="CVE-2015-7674" ref_url="https://www.suse.com/security/cve/CVE-2015-7674/" source="CVE"/>
		<reference ref_id="CVE-2016-6352" ref_url="https://www.suse.com/security/cve/CVE-2016-6352/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-lang-2.34.0-16.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2485/">CVE-2011-2485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7552/">CVE-2015-7552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7673/">CVE-2015-7673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7674/">CVE-2015-7674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6352/">CVE-2016-6352</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140591" comment="gdk-pixbuf-lang-2.34.0-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140592" comment="gdk-pixbuf-query-loaders-2.34.0-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140593" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140594" comment="libgdk_pixbuf-2_0-0-2.34.0-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140595" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140596" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76231" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-loader-rsvg-2.40.15-4.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-3146" ref_url="https://www.suse.com/security/cve/CVE-2011-3146/" source="CVE"/>
		<reference ref_id="CVE-2013-1881" ref_url="https://www.suse.com/security/cve/CVE-2013-1881/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-loader-rsvg-2.40.15-4.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3146/">CVE-2011-3146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1881/">CVE-2013-1881</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140597" comment="gdk-pixbuf-loader-rsvg-2.40.15-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140598" comment="librsvg-2-2-2.40.15-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140599" comment="librsvg-2-2-32bit-2.40.15-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140600" comment="rsvg-view-2.40.15-4.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76232" version="1" class="patch">
	<metadata>
		<title>gdm-3.10.0.1-52.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1709" ref_url="https://www.suse.com/security/cve/CVE-2011-1709/" source="CVE"/>
		<description>
These are all security issues fixed in the gdm-3.10.0.1-52.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1709/">CVE-2011-1709</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140601" comment="gdm-3.10.0.1-52.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140602" comment="gdm-lang-3.10.0.1-52.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140603" comment="gdmflexiserver-3.10.0.1-52.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140604" comment="libgdm1-3.10.0.1-52.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140605" comment="typelib-1_0-Gdm-1_0-3.10.0.1-52.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76233" version="1" class="patch">
	<metadata>
		<title>ghostscript-9.15-6.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-3228" ref_url="https://www.suse.com/security/cve/CVE-2015-3228/" source="CVE"/>
		<description>
These are all security issues fixed in the ghostscript-9.15-6.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3228/">CVE-2015-3228</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009125321" comment="ghostscript-9.15-6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125322" comment="ghostscript-x11-9.15-6.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76234" version="1" class="patch">
	<metadata>
		<title>gimp-2.8.18-4.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-4540" ref_url="https://www.suse.com/security/cve/CVE-2010-4540/" source="CVE"/>
		<reference ref_id="CVE-2010-4541" ref_url="https://www.suse.com/security/cve/CVE-2010-4541/" source="CVE"/>
		<reference ref_id="CVE-2010-4542" ref_url="https://www.suse.com/security/cve/CVE-2010-4542/" source="CVE"/>
		<reference ref_id="CVE-2010-4543" ref_url="https://www.suse.com/security/cve/CVE-2010-4543/" source="CVE"/>
		<reference ref_id="CVE-2011-2896" ref_url="https://www.suse.com/security/cve/CVE-2011-2896/" source="CVE"/>
		<reference ref_id="CVE-2012-3236" ref_url="https://www.suse.com/security/cve/CVE-2012-3236/" source="CVE"/>
		<reference ref_id="CVE-2012-5576" ref_url="https://www.suse.com/security/cve/CVE-2012-5576/" source="CVE"/>
		<reference ref_id="CVE-2016-4994" ref_url="https://www.suse.com/security/cve/CVE-2016-4994/" source="CVE"/>
		<description>
These are all security issues fixed in the gimp-2.8.18-4.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4540/">CVE-2010-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4541/">CVE-2010-4541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4542/">CVE-2010-4542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4543/">CVE-2010-4543</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2896/">CVE-2011-2896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3236/">CVE-2012-3236</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5576/">CVE-2012-5576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4994/">CVE-2016-4994</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142102" comment="gimp-2.8.18-4.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142103" comment="gimp-lang-2.8.18-4.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142104" comment="gimp-plugins-python-2.8.18-4.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142105" comment="libgimp-2_0-0-2.8.18-4.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142106" comment="libgimpui-2_0-0-2.8.18-4.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76235" version="1" class="patch">
	<metadata>
		<title>glib2-lang-2.48.2-10.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-4316" ref_url="https://www.suse.com/security/cve/CVE-2008-4316/" source="CVE"/>
		<reference ref_id="CVE-2012-3524" ref_url="https://www.suse.com/security/cve/CVE-2012-3524/" source="CVE"/>
		<description>
These are all security issues fixed in the glib2-lang-2.48.2-10.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4316/">CVE-2008-4316</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3524/">CVE-2012-3524</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140606" comment="glib2-lang-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140607" comment="glib2-tools-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140608" comment="libgio-2_0-0-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140609" comment="libgio-2_0-0-32bit-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142107" comment="libgio-fam-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140610" comment="libglib-2_0-0-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140611" comment="libglib-2_0-0-32bit-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140612" comment="libgmodule-2_0-0-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140613" comment="libgmodule-2_0-0-32bit-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140614" comment="libgobject-2_0-0-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140615" comment="libgobject-2_0-0-32bit-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140616" comment="libgthread-2_0-0-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140617" comment="libgthread-2_0-0-32bit-2.48.2-10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76236" version="1" class="patch">
	<metadata>
		<title>glibc-2.22-49.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-5029" ref_url="https://www.suse.com/security/cve/CVE-2009-5029/" source="CVE"/>
		<reference ref_id="CVE-2012-3406" ref_url="https://www.suse.com/security/cve/CVE-2012-3406/" source="CVE"/>
		<reference ref_id="CVE-2012-4412" ref_url="https://www.suse.com/security/cve/CVE-2012-4412/" source="CVE"/>
		<reference ref_id="CVE-2013-0242" ref_url="https://www.suse.com/security/cve/CVE-2013-0242/" source="CVE"/>
		<reference ref_id="CVE-2013-1914" ref_url="https://www.suse.com/security/cve/CVE-2013-1914/" source="CVE"/>
		<reference ref_id="CVE-2013-2207" ref_url="https://www.suse.com/security/cve/CVE-2013-2207/" source="CVE"/>
		<reference ref_id="CVE-2013-4237" ref_url="https://www.suse.com/security/cve/CVE-2013-4237/" source="CVE"/>
		<reference ref_id="CVE-2013-4332" ref_url="https://www.suse.com/security/cve/CVE-2013-4332/" source="CVE"/>
		<reference ref_id="CVE-2013-4458" ref_url="https://www.suse.com/security/cve/CVE-2013-4458/" source="CVE"/>
		<reference ref_id="CVE-2013-7423" ref_url="https://www.suse.com/security/cve/CVE-2013-7423/" source="CVE"/>
		<reference ref_id="CVE-2014-0475" ref_url="https://www.suse.com/security/cve/CVE-2014-0475/" source="CVE"/>
		<reference ref_id="CVE-2014-4043" ref_url="https://www.suse.com/security/cve/CVE-2014-4043/" source="CVE"/>
		<reference ref_id="CVE-2014-5119" ref_url="https://www.suse.com/security/cve/CVE-2014-5119/" source="CVE"/>
		<reference ref_id="CVE-2014-6040" ref_url="https://www.suse.com/security/cve/CVE-2014-6040/" source="CVE"/>
		<reference ref_id="CVE-2014-7817" ref_url="https://www.suse.com/security/cve/CVE-2014-7817/" source="CVE"/>
		<reference ref_id="CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121/" source="CVE"/>
		<reference ref_id="CVE-2014-9402" ref_url="https://www.suse.com/security/cve/CVE-2014-9402/" source="CVE"/>
		<reference ref_id="CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761/" source="CVE"/>
		<reference ref_id="CVE-2015-1472" ref_url="https://www.suse.com/security/cve/CVE-2015-1472/" source="CVE"/>
		<reference ref_id="CVE-2015-1473" ref_url="https://www.suse.com/security/cve/CVE-2015-1473/" source="CVE"/>
		<reference ref_id="CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781/" source="CVE"/>
		<reference ref_id="CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547/" source="CVE"/>
		<reference ref_id="CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776/" source="CVE"/>
		<reference ref_id="CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777/" source="CVE"/>
		<reference ref_id="CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778/" source="CVE"/>
		<reference ref_id="CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779/" source="CVE"/>
		<reference ref_id="CVE-2016-1234" ref_url="https://www.suse.com/security/cve/CVE-2016-1234/" source="CVE"/>
		<reference ref_id="CVE-2016-3075" ref_url="https://www.suse.com/security/cve/CVE-2016-3075/" source="CVE"/>
		<reference ref_id="CVE-2016-3706" ref_url="https://www.suse.com/security/cve/CVE-2016-3706/" source="CVE"/>
		<reference ref_id="CVE-2016-4429" ref_url="https://www.suse.com/security/cve/CVE-2016-4429/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-2.22-49.16 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5029/">CVE-2009-5029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3406/">CVE-2012-3406</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4412/">CVE-2012-4412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0242/">CVE-2013-0242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1914/">CVE-2013-1914</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2207/">CVE-2013-2207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4237/">CVE-2013-4237</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4332/">CVE-2013-4332</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4458/">CVE-2013-4458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7423/">CVE-2013-7423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0475/">CVE-2014-0475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4043/">CVE-2014-4043</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5119/">CVE-2014-5119</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6040/">CVE-2014-6040</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7817/">CVE-2014-7817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9402/">CVE-2014-9402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1472/">CVE-2015-1472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1473/">CVE-2015-1473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1234/">CVE-2016-1234</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3075/">CVE-2016-3075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3706/">CVE-2016-3706</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4429/">CVE-2016-4429</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76237" version="1" class="patch">
	<metadata>
		<title>gnome-keyring-3.20.0-27.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-3466" ref_url="https://www.suse.com/security/cve/CVE-2012-3466/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-keyring-3.20.0-27.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3466/">CVE-2012-3466</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140630" comment="gnome-keyring-3.20.0-27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140631" comment="gnome-keyring-32bit-3.20.0-27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140632" comment="gnome-keyring-lang-3.20.0-27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140633" comment="gnome-keyring-pam-3.20.0-27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140634" comment="gnome-keyring-pam-32bit-3.20.0-27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140635" comment="libgck-modules-gnome-keyring-3.20.0-27.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76238" version="1" class="patch">
	<metadata>
		<title>gnome-online-accounts-3.20.4-7.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-0240" ref_url="https://www.suse.com/security/cve/CVE-2013-0240/" source="CVE"/>
		<reference ref_id="CVE-2013-1799" ref_url="https://www.suse.com/security/cve/CVE-2013-1799/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-online-accounts-3.20.4-7.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0240/">CVE-2013-0240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1799/">CVE-2013-1799</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142108" comment="gnome-online-accounts-3.20.4-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142109" comment="gnome-online-accounts-lang-3.20.4-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140636" comment="libgoa-1_0-0-3.20.4-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142110" comment="libgoa-1_0-0-32bit-3.20.4-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140637" comment="libgoa-backend-1_0-1-3.20.4-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142111" comment="typelib-1_0-Goa-1_0-3.20.4-7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76239" version="1" class="patch">
	<metadata>
		<title>gnome-settings-daemon-3.20.1-40.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-7300" ref_url="https://www.suse.com/security/cve/CVE-2014-7300/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-settings-daemon-3.20.1-40.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7300/">CVE-2014-7300</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140638" comment="gnome-settings-daemon-3.20.1-40.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140639" comment="gnome-settings-daemon-lang-3.20.1-40.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76240" version="1" class="patch">
	<metadata>
		<title>gnome-shell-3.20.4-70.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-4000" ref_url="https://www.suse.com/security/cve/CVE-2010-4000/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-shell-3.20.4-70.4 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4000/">CVE-2010-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140640" comment="gnome-shell-3.20.4-70.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140641" comment="gnome-shell-browser-plugin-3.20.4-70.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142112" comment="gnome-shell-calendar-3.20.4-70.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140642" comment="gnome-shell-lang-3.20.4-70.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76241" version="1" class="patch">
	<metadata>
		<title>gnutls-3.2.15-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-4989" ref_url="https://www.suse.com/security/cve/CVE-2008-4989/" source="CVE"/>
		<reference ref_id="CVE-2011-4128" ref_url="https://www.suse.com/security/cve/CVE-2011-4128/" source="CVE"/>
		<reference ref_id="CVE-2012-0390" ref_url="https://www.suse.com/security/cve/CVE-2012-0390/" source="CVE"/>
		<reference ref_id="CVE-2012-1569" ref_url="https://www.suse.com/security/cve/CVE-2012-1569/" source="CVE"/>
		<reference ref_id="CVE-2012-1573" ref_url="https://www.suse.com/security/cve/CVE-2012-1573/" source="CVE"/>
		<reference ref_id="CVE-2014-0092" ref_url="https://www.suse.com/security/cve/CVE-2014-0092/" source="CVE"/>
		<reference ref_id="CVE-2014-1959" ref_url="https://www.suse.com/security/cve/CVE-2014-1959/" source="CVE"/>
		<reference ref_id="CVE-2014-3466" ref_url="https://www.suse.com/security/cve/CVE-2014-3466/" source="CVE"/>
		<reference ref_id="CVE-2014-8564" ref_url="https://www.suse.com/security/cve/CVE-2014-8564/" source="CVE"/>
		<reference ref_id="CVE-2015-0294" ref_url="https://www.suse.com/security/cve/CVE-2015-0294/" source="CVE"/>
		<reference ref_id="CVE-2015-3622" ref_url="https://www.suse.com/security/cve/CVE-2015-3622/" source="CVE"/>
		<reference ref_id="CVE-2015-6251" ref_url="https://www.suse.com/security/cve/CVE-2015-6251/" source="CVE"/>
		<description>
These are all security issues fixed in the gnutls-3.2.15-11.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4989/">CVE-2008-4989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4128/">CVE-2011-4128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0390/">CVE-2012-0390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1569/">CVE-2012-1569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1573/">CVE-2012-1573</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0092/">CVE-2014-0092</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1959/">CVE-2014-1959</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3466/">CVE-2014-3466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8564/">CVE-2014-8564</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0294/">CVE-2015-0294</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3622/">CVE-2015-3622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6251/">CVE-2015-6251</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009114253" comment="gnutls-3.2.15-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114258" comment="libgnutls28-3.2.15-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114259" comment="libgnutls28-32bit-3.2.15-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76242" version="1" class="patch">
	<metadata>
		<title>gpg2-2.0.24-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2547" ref_url="https://www.suse.com/security/cve/CVE-2010-2547/" source="CVE"/>
		<reference ref_id="CVE-2013-4351" ref_url="https://www.suse.com/security/cve/CVE-2013-4351/" source="CVE"/>
		<reference ref_id="CVE-2013-4402" ref_url="https://www.suse.com/security/cve/CVE-2013-4402/" source="CVE"/>
		<reference ref_id="CVE-2014-4617" ref_url="https://www.suse.com/security/cve/CVE-2014-4617/" source="CVE"/>
		<reference ref_id="CVE-2015-1606" ref_url="https://www.suse.com/security/cve/CVE-2015-1606/" source="CVE"/>
		<reference ref_id="CVE-2015-1607" ref_url="https://www.suse.com/security/cve/CVE-2015-1607/" source="CVE"/>
		<description>
These are all security issues fixed in the gpg2-2.0.24-3.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2547/">CVE-2010-2547</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4351/">CVE-2013-4351</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4402/">CVE-2013-4402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4617/">CVE-2014-4617</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1606/">CVE-2015-1606</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1607/">CVE-2015-1607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009119616" comment="gpg2-2.0.24-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009119617" comment="gpg2-lang-2.0.24-3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76243" version="1" class="patch">
	<metadata>
		<title>gpgme-1.5.1-1.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-3564" ref_url="https://www.suse.com/security/cve/CVE-2014-3564/" source="CVE"/>
		<description>
These are all security issues fixed in the gpgme-1.5.1-1.12 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3564/">CVE-2014-3564</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140643" comment="gpgme-1.5.1-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140644" comment="libgpgme11-1.5.1-1.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76244" version="1" class="patch">
	<metadata>
		<title>groff-1.22.2-5.429 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-5044" ref_url="https://www.suse.com/security/cve/CVE-2009-5044/" source="CVE"/>
		<reference ref_id="CVE-2009-5080" ref_url="https://www.suse.com/security/cve/CVE-2009-5080/" source="CVE"/>
		<reference ref_id="CVE-2009-5081" ref_url="https://www.suse.com/security/cve/CVE-2009-5081/" source="CVE"/>
		<description>
These are all security issues fixed in the groff-1.22.2-5.429 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5044/">CVE-2009-5044</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-5080/">CVE-2009-5080</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-5081/">CVE-2009-5081</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140645" comment="groff-1.22.2-5.429 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76245" version="1" class="patch">
	<metadata>
		<title>grub2-2.02~beta2-104.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-8370" ref_url="https://www.suse.com/security/cve/CVE-2015-8370/" source="CVE"/>
		<description>
These are all security issues fixed in the grub2-2.02~beta2-104.16 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8370/">CVE-2015-8370</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140648" comment="grub2-2.02~beta2-104.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140650" comment="grub2-i386-pc-2.02~beta2-104.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140653" comment="grub2-snapper-plugin-2.02~beta2-104.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140654" comment="grub2-systemd-sleep-plugin-2.02~beta2-104.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140655" comment="grub2-x86_64-efi-2.02~beta2-104.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140656" comment="grub2-x86_64-xen-2.02~beta2-104.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76246" version="1" class="patch">
	<metadata>
		<title>gstreamer-0_10-plugins-bad-0.10.23-20.51 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-0797" ref_url="https://www.suse.com/security/cve/CVE-2015-0797/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-0_10-plugins-bad-0.10.23-20.51 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0797/">CVE-2015-0797</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142113" comment="gstreamer-0_10-plugins-bad-0.10.23-20.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142114" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-20.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142115" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-20.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142116" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-20.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142117" comment="libgstbasevideo-0_10-23-0.10.23-20.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142118" comment="libgstbasevideo-0_10-23-32bit-0.10.23-20.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142119" comment="libgstcodecparsers-0_10-23-0.10.23-20.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142120" comment="libgstphotography-0_10-23-0.10.23-20.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142121" comment="libgstphotography-0_10-23-32bit-0.10.23-20.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142122" comment="libgstsignalprocessor-0_10-23-0.10.23-20.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142123" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-20.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142124" comment="libgstvdp-0_10-23-0.10.23-20.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142125" comment="libgstvdp-0_10-23-32bit-0.10.23-20.51 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76247" version="1" class="patch">
	<metadata>
		<title>gtk2-data-2.24.31-7.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-7447" ref_url="https://www.suse.com/security/cve/CVE-2013-7447/" source="CVE"/>
		<description>
These are all security issues fixed in the gtk2-data-2.24.31-7.11 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7447/">CVE-2013-7447</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140657" comment="gtk2-data-2.24.31-7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140658" comment="gtk2-lang-2.24.31-7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140659" comment="gtk2-tools-2.24.31-7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140660" comment="gtk2-tools-32bit-2.24.31-7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140661" comment="libgtk-2_0-0-2.24.31-7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140662" comment="libgtk-2_0-0-32bit-2.24.31-7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142126" comment="typelib-1_0-Gtk-2_0-2.24.31-7.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76248" version="1" class="patch">
	<metadata>
		<title>gvim-7.4.326-2.62 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0316" ref_url="https://www.suse.com/security/cve/CVE-2009-0316/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-7.4.326-2.62 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0316/">CVE-2009-0316</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140673" comment="gvim-7.4.326-2.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140674" comment="vim-7.4.326-2.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140675" comment="vim-data-7.4.326-2.62 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76249" version="1" class="patch">
	<metadata>
		<title>gzip-1.6-7.392 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-2624" ref_url="https://www.suse.com/security/cve/CVE-2009-2624/" source="CVE"/>
		<reference ref_id="CVE-2010-0001" ref_url="https://www.suse.com/security/cve/CVE-2010-0001/" source="CVE"/>
		<description>
These are all security issues fixed in the gzip-1.6-7.392 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2624/">CVE-2009-2624</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0001/">CVE-2010-0001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140677" comment="gzip-1.6-7.392 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76250" version="1" class="patch">
	<metadata>
		<title>hardlink-1.0-6.45 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-3630" ref_url="https://www.suse.com/security/cve/CVE-2011-3630/" source="CVE"/>
		<reference ref_id="CVE-2011-3631" ref_url="https://www.suse.com/security/cve/CVE-2011-3631/" source="CVE"/>
		<reference ref_id="CVE-2011-3632" ref_url="https://www.suse.com/security/cve/CVE-2011-3632/" source="CVE"/>
		<description>
These are all security issues fixed in the hardlink-1.0-6.45 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3630/">CVE-2011-3630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3631/">CVE-2011-3631</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3632/">CVE-2011-3632</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140678" comment="hardlink-1.0-6.45 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76251" version="1" class="patch">
	<metadata>
		<title>hplip-3.14.6-3.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2004-0801" ref_url="https://www.suse.com/security/cve/CVE-2004-0801/" source="CVE"/>
		<reference ref_id="CVE-2010-4267" ref_url="https://www.suse.com/security/cve/CVE-2010-4267/" source="CVE"/>
		<reference ref_id="CVE-2011-2697" ref_url="https://www.suse.com/security/cve/CVE-2011-2697/" source="CVE"/>
		<reference ref_id="CVE-2011-2722" ref_url="https://www.suse.com/security/cve/CVE-2011-2722/" source="CVE"/>
		<reference ref_id="CVE-2013-4325" ref_url="https://www.suse.com/security/cve/CVE-2013-4325/" source="CVE"/>
		<reference ref_id="CVE-2013-6402" ref_url="https://www.suse.com/security/cve/CVE-2013-6402/" source="CVE"/>
		<reference ref_id="CVE-2013-6427" ref_url="https://www.suse.com/security/cve/CVE-2013-6427/" source="CVE"/>
		<description>
These are all security issues fixed in the hplip-3.14.6-3.14 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2004-0801/">CVE-2004-0801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4267/">CVE-2010-4267</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2697/">CVE-2011-2697</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-2722/">CVE-2011-2722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4325/">CVE-2013-4325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6402/">CVE-2013-6402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6427/">CVE-2013-6427</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141414" comment="hplip-3.14.6-3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141415" comment="hplip-hpijs-3.14.6-3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141416" comment="hplip-sane-3.14.6-3.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76252" version="1" class="patch">
	<metadata>
		<title>hyper-v-7-13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-2669" ref_url="https://www.suse.com/security/cve/CVE-2012-2669/" source="CVE"/>
		<reference ref_id="CVE-2012-5532" ref_url="https://www.suse.com/security/cve/CVE-2012-5532/" source="CVE"/>
		<description>
These are all security issues fixed in the hyper-v-7-13.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2669/">CVE-2012-2669</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-5532/">CVE-2012-5532</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140682" comment="hyper-v-7-13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76253" version="1" class="patch">
	<metadata>
		<title>ibus-chewing-1.4.14-4.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-4509" ref_url="https://www.suse.com/security/cve/CVE-2013-4509/" source="CVE"/>
		<description>
These are all security issues fixed in the ibus-chewing-1.4.14-4.11 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4509/">CVE-2013-4509</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140683" comment="ibus-chewing-1.4.14-4.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140684" comment="ibus-pinyin-1.5.0-7.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76254" version="1" class="patch">
	<metadata>
		<title>icu-52.1-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-9654" ref_url="https://www.suse.com/security/cve/CVE-2014-9654/" source="CVE"/>
		<description>
These are all security issues fixed in the icu-52.1-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9654/">CVE-2014-9654</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107566" comment="icu-52.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107572" comment="libicu52_1-52.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107571" comment="libicu52_1-32bit-52.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107573" comment="libicu52_1-data-52.1-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76255" version="1" class="patch">
	<metadata>
		<title>imobiledevice-tools-1.2.0-7.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-2142" ref_url="https://www.suse.com/security/cve/CVE-2013-2142/" source="CVE"/>
		<reference ref_id="CVE-2016-5104" ref_url="https://www.suse.com/security/cve/CVE-2016-5104/" source="CVE"/>
		<description>
These are all security issues fixed in the imobiledevice-tools-1.2.0-7.31 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2142/">CVE-2013-2142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5104/">CVE-2016-5104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142127" comment="imobiledevice-tools-1.2.0-7.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140847" comment="libimobiledevice6-1.2.0-7.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76256" version="1" class="patch">
	<metadata>
		<title>iputils-s20121221-2.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2529" ref_url="https://www.suse.com/security/cve/CVE-2010-2529/" source="CVE"/>
		<description>
These are all security issues fixed in the iputils-s20121221-2.19 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2529/">CVE-2010-2529</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140686" comment="iputils-s20121221-2.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76257" version="1" class="patch">
	<metadata>
		<title>java-1_7_0-openjdk-1.7.0.111-33.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-3563" ref_url="https://www.suse.com/security/cve/CVE-2011-3563/" source="CVE"/>
		<reference ref_id="CVE-2011-3571" ref_url="https://www.suse.com/security/cve/CVE-2011-3571/" source="CVE"/>
		<reference ref_id="CVE-2011-5035" ref_url="https://www.suse.com/security/cve/CVE-2011-5035/" source="CVE"/>
		<reference ref_id="CVE-2012-0497" ref_url="https://www.suse.com/security/cve/CVE-2012-0497/" source="CVE"/>
		<reference ref_id="CVE-2012-0501" ref_url="https://www.suse.com/security/cve/CVE-2012-0501/" source="CVE"/>
		<reference ref_id="CVE-2012-0502" ref_url="https://www.suse.com/security/cve/CVE-2012-0502/" source="CVE"/>
		<reference ref_id="CVE-2012-0503" ref_url="https://www.suse.com/security/cve/CVE-2012-0503/" source="CVE"/>
		<reference ref_id="CVE-2012-0505" ref_url="https://www.suse.com/security/cve/CVE-2012-0505/" source="CVE"/>
		<reference ref_id="CVE-2012-0506" ref_url="https://www.suse.com/security/cve/CVE-2012-0506/" source="CVE"/>
		<reference ref_id="CVE-2012-0547" ref_url="https://www.suse.com/security/cve/CVE-2012-0547/" source="CVE"/>
		<reference ref_id="CVE-2012-1682" ref_url="https://www.suse.com/security/cve/CVE-2012-1682/" source="CVE"/>
		<reference ref_id="CVE-2012-1711" ref_url="https://www.suse.com/security/cve/CVE-2012-1711/" source="CVE"/>
		<reference ref_id="CVE-2012-1713" ref_url="https://www.suse.com/security/cve/CVE-2012-1713/" source="CVE"/>
		<reference ref_id="CVE-2012-1716" ref_url="https://www.suse.com/security/cve/CVE-2012-1716/" source="CVE"/>
		<reference ref_id="CVE-2012-1717" ref_url="https://www.suse.com/security/cve/CVE-2012-1717/" source="CVE"/>
		<reference ref_id="CVE-2012-1718" ref_url="https://www.suse.com/security/cve/CVE-2012-1718/" source="CVE"/>
		<reference ref_id="CVE-2012-1719" ref_url="https://www.suse.com/security/cve/CVE-2012-1719/" source="CVE"/>
		<reference ref_id="CVE-2012-1723" ref_url="https://www.suse.com/security/cve/CVE-2012-1723/" source="CVE"/>
		<reference ref_id="CVE-2012-1724" ref_url="https://www.suse.com/security/cve/CVE-2012-1724/" source="CVE"/>
		<reference ref_id="CVE-2012-1725" ref_url="https://www.suse.com/security/cve/CVE-2012-1725/" source="CVE"/>
		<reference ref_id="CVE-2012-1726" ref_url="https://www.suse.com/security/cve/CVE-2012-1726/" source="CVE"/>
		<reference ref_id="CVE-2012-3136" ref_url="https://www.suse.com/security/cve/CVE-2012-3136/" source="CVE"/>
		<reference ref_id="CVE-2012-3174" ref_url="https://www.suse.com/security/cve/CVE-2012-3174/" source="CVE"/>
		<reference ref_id="CVE-2012-3216" ref_url="https://www.suse.com/security/cve/CVE-2012-3216/" source="CVE"/>
		<reference ref_id="CVE-2012-4416" ref_url="https://www.suse.com/security/cve/CVE-2012-4416/" source="CVE"/>
		<reference ref_id="CVE-2012-4681" ref_url="https://www.suse.com/security/cve/CVE-2012-4681/" source="CVE"/>
		<reference ref_id="CVE-2012-5068" ref_url="https://www.suse.com/security/cve/CVE-2012-5068/" source="CVE"/>
		<reference ref_id="CVE-2012-5069" ref_url="https://www.suse.com/security/cve/CVE-2012-5069/" source="CVE"/>
		<reference ref_id="CVE-2012-5070" ref_url="https://www.suse.com/security/cve/CVE-2012-5070/" source="CVE"/>
		<reference ref_id="CVE-2012-5071" ref_url="https://www.suse.com/security/cve/CVE-2012-5071/" source="CVE"/>
		<reference ref_id="CVE-2012-5072" ref_url="https://www.suse.com/security/cve/CVE-2012-5072/" source="CVE"/>
		<reference ref_id="CVE-2012-5073" ref_url="https://www.suse.com/security/cve/CVE-2012-5073/" source="CVE"/>
		<reference ref_id="CVE-2012-5074" ref_url="https://www.suse.com/security/cve/CVE-2012-5074/" source="CVE"/>
		<reference ref_id="CVE-2012-5075" ref_url="https://www.suse.com/security/cve/CVE-2012-5075/" source="CVE"/>
		<reference ref_id="CVE-2012-5076" ref_url="https://www.suse.com/security/cve/CVE-2012-5076/" source="CVE"/>
		<reference ref_id="CVE-2012-5077" ref_url="https://www.suse.com/security/cve/CVE-2012-5077/" source="CVE"/>
		<reference ref_id="CVE-2012-5079" ref_url="https://www.suse.com/security/cve/CVE-2012-5079/" source="CVE"/>
		<reference ref_id="CVE-2012-5081" ref_url="https://www.suse.com/security/cve/CVE-2012-5081/" source="CVE"/>
		<reference ref_id="CVE-2012-5084" ref_url="https://www.suse.com/security/cve/CVE-2012-5084/" source="CVE"/>
		<reference ref_id="CVE-2012-5085" ref_url="https://www.suse.com/security/cve/CVE-2012-5085/" source="CVE"/>
		<reference ref_id="CVE-2012-5086" ref_url="https://www.suse.com/security/cve/CVE-2012-5086/" source="CVE"/>
		<reference ref_id="CVE-2012-5087" ref_url="https://www.suse.com/security/cve/CVE-2012-5087/" source="CVE"/>
		<reference ref_id="CVE-2012-5088" ref_url="https://www.suse.com/security/cve/CVE-2012-5088/" source="CVE"/>
		<reference ref_id="CVE-2012-5089" ref_url="https://www.suse.com/security/cve/CVE-2012-5089/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2013-0401" ref_url="https://www.suse.com/security/cve/CVE-2013-0401/" source="CVE"/>
		<reference ref_id="CVE-2013-0422" ref_url="https://www.suse.com/security/cve/CVE-2013-0422/" source="CVE"/>
		<reference ref_id="CVE-2013-0424" ref_url="https://www.suse.com/security/cve/CVE-2013-0424/" source="CVE"/>
		<reference ref_id="CVE-2013-0425" ref_url="https://www.suse.com/security/cve/CVE-2013-0425/" source="CVE"/>
		<reference ref_id="CVE-2013-0426" ref_url="https://www.suse.com/security/cve/CVE-2013-0426/" source="CVE"/>
		<reference ref_id="CVE-2013-0427" ref_url="https://www.suse.com/security/cve/CVE-2013-0427/" source="CVE"/>
		<reference ref_id="CVE-2013-0428" ref_url="https://www.suse.com/security/cve/CVE-2013-0428/" source="CVE"/>
		<reference ref_id="CVE-2013-0429" ref_url="https://www.suse.com/security/cve/CVE-2013-0429/" source="CVE"/>
		<reference ref_id="CVE-2013-0431" ref_url="https://www.suse.com/security/cve/CVE-2013-0431/" source="CVE"/>
		<reference ref_id="CVE-2013-0432" ref_url="https://www.suse.com/security/cve/CVE-2013-0432/" source="CVE"/>
		<reference ref_id="CVE-2013-0433" ref_url="https://www.suse.com/security/cve/CVE-2013-0433/" source="CVE"/>
		<reference ref_id="CVE-2013-0434" ref_url="https://www.suse.com/security/cve/CVE-2013-0434/" source="CVE"/>
		<reference ref_id="CVE-2013-0435" ref_url="https://www.suse.com/security/cve/CVE-2013-0435/" source="CVE"/>
		<reference ref_id="CVE-2013-0440" ref_url="https://www.suse.com/security/cve/CVE-2013-0440/" source="CVE"/>
		<reference ref_id="CVE-2013-0441" ref_url="https://www.suse.com/security/cve/CVE-2013-0441/" source="CVE"/>
		<reference ref_id="CVE-2013-0442" ref_url="https://www.suse.com/security/cve/CVE-2013-0442/" source="CVE"/>
		<reference ref_id="CVE-2013-0443" ref_url="https://www.suse.com/security/cve/CVE-2013-0443/" source="CVE"/>
		<reference ref_id="CVE-2013-0444" ref_url="https://www.suse.com/security/cve/CVE-2013-0444/" source="CVE"/>
		<reference ref_id="CVE-2013-0450" ref_url="https://www.suse.com/security/cve/CVE-2013-0450/" source="CVE"/>
		<reference ref_id="CVE-2013-0809" ref_url="https://www.suse.com/security/cve/CVE-2013-0809/" source="CVE"/>
		<reference ref_id="CVE-2013-1475" ref_url="https://www.suse.com/security/cve/CVE-2013-1475/" source="CVE"/>
		<reference ref_id="CVE-2013-1476" ref_url="https://www.suse.com/security/cve/CVE-2013-1476/" source="CVE"/>
		<reference ref_id="CVE-2013-1478" ref_url="https://www.suse.com/security/cve/CVE-2013-1478/" source="CVE"/>
		<reference ref_id="CVE-2013-1480" ref_url="https://www.suse.com/security/cve/CVE-2013-1480/" source="CVE"/>
		<reference ref_id="CVE-2013-1484" ref_url="https://www.suse.com/security/cve/CVE-2013-1484/" source="CVE"/>
		<reference ref_id="CVE-2013-1485" ref_url="https://www.suse.com/security/cve/CVE-2013-1485/" source="CVE"/>
		<reference ref_id="CVE-2013-1486" ref_url="https://www.suse.com/security/cve/CVE-2013-1486/" source="CVE"/>
		<reference ref_id="CVE-2013-1488" ref_url="https://www.suse.com/security/cve/CVE-2013-1488/" source="CVE"/>
		<reference ref_id="CVE-2013-1493" ref_url="https://www.suse.com/security/cve/CVE-2013-1493/" source="CVE"/>
		<reference ref_id="CVE-2013-1500" ref_url="https://www.suse.com/security/cve/CVE-2013-1500/" source="CVE"/>
		<reference ref_id="CVE-2013-1518" ref_url="https://www.suse.com/security/cve/CVE-2013-1518/" source="CVE"/>
		<reference ref_id="CVE-2013-1537" ref_url="https://www.suse.com/security/cve/CVE-2013-1537/" source="CVE"/>
		<reference ref_id="CVE-2013-1557" ref_url="https://www.suse.com/security/cve/CVE-2013-1557/" source="CVE"/>
		<reference ref_id="CVE-2013-1569" ref_url="https://www.suse.com/security/cve/CVE-2013-1569/" source="CVE"/>
		<reference ref_id="CVE-2013-1571" ref_url="https://www.suse.com/security/cve/CVE-2013-1571/" source="CVE"/>
		<reference ref_id="CVE-2013-2383" ref_url="https://www.suse.com/security/cve/CVE-2013-2383/" source="CVE"/>
		<reference ref_id="CVE-2013-2384" ref_url="https://www.suse.com/security/cve/CVE-2013-2384/" source="CVE"/>
		<reference ref_id="CVE-2013-2407" ref_url="https://www.suse.com/security/cve/CVE-2013-2407/" source="CVE"/>
		<reference ref_id="CVE-2013-2412" ref_url="https://www.suse.com/security/cve/CVE-2013-2412/" source="CVE"/>
		<reference ref_id="CVE-2013-2415" ref_url="https://www.suse.com/security/cve/CVE-2013-2415/" source="CVE"/>
		<reference ref_id="CVE-2013-2417" ref_url="https://www.suse.com/security/cve/CVE-2013-2417/" source="CVE"/>
		<reference ref_id="CVE-2013-2419" ref_url="https://www.suse.com/security/cve/CVE-2013-2419/" source="CVE"/>
		<reference ref_id="CVE-2013-2420" ref_url="https://www.suse.com/security/cve/CVE-2013-2420/" source="CVE"/>
		<reference ref_id="CVE-2013-2421" ref_url="https://www.suse.com/security/cve/CVE-2013-2421/" source="CVE"/>
		<reference ref_id="CVE-2013-2422" ref_url="https://www.suse.com/security/cve/CVE-2013-2422/" source="CVE"/>
		<reference ref_id="CVE-2013-2423" ref_url="https://www.suse.com/security/cve/CVE-2013-2423/" source="CVE"/>
		<reference ref_id="CVE-2013-2424" ref_url="https://www.suse.com/security/cve/CVE-2013-2424/" source="CVE"/>
		<reference ref_id="CVE-2013-2426" ref_url="https://www.suse.com/security/cve/CVE-2013-2426/" source="CVE"/>
		<reference ref_id="CVE-2013-2429" ref_url="https://www.suse.com/security/cve/CVE-2013-2429/" source="CVE"/>
		<reference ref_id="CVE-2013-2430" ref_url="https://www.suse.com/security/cve/CVE-2013-2430/" source="CVE"/>
		<reference ref_id="CVE-2013-2431" ref_url="https://www.suse.com/security/cve/CVE-2013-2431/" source="CVE"/>
		<reference ref_id="CVE-2013-2436" ref_url="https://www.suse.com/security/cve/CVE-2013-2436/" source="CVE"/>
		<reference ref_id="CVE-2013-2443" ref_url="https://www.suse.com/security/cve/CVE-2013-2443/" source="CVE"/>
		<reference ref_id="CVE-2013-2444" ref_url="https://www.suse.com/security/cve/CVE-2013-2444/" source="CVE"/>
		<reference ref_id="CVE-2013-2445" ref_url="https://www.suse.com/security/cve/CVE-2013-2445/" source="CVE"/>
		<reference ref_id="CVE-2013-2446" ref_url="https://www.suse.com/security/cve/CVE-2013-2446/" source="CVE"/>
		<reference ref_id="CVE-2013-2447" ref_url="https://www.suse.com/security/cve/CVE-2013-2447/" source="CVE"/>
		<reference ref_id="CVE-2013-2448" ref_url="https://www.suse.com/security/cve/CVE-2013-2448/" source="CVE"/>
		<reference ref_id="CVE-2013-2449" ref_url="https://www.suse.com/security/cve/CVE-2013-2449/" source="CVE"/>
		<reference ref_id="CVE-2013-2450" ref_url="https://www.suse.com/security/cve/CVE-2013-2450/" source="CVE"/>
		<reference ref_id="CVE-2013-2451" ref_url="https://www.suse.com/security/cve/CVE-2013-2451/" source="CVE"/>
		<reference ref_id="CVE-2013-2452" ref_url="https://www.suse.com/security/cve/CVE-2013-2452/" source="CVE"/>
		<reference ref_id="CVE-2013-2453" ref_url="https://www.suse.com/security/cve/CVE-2013-2453/" source="CVE"/>
		<reference ref_id="CVE-2013-2454" ref_url="https://www.suse.com/security/cve/CVE-2013-2454/" source="CVE"/>
		<reference ref_id="CVE-2013-2455" ref_url="https://www.suse.com/security/cve/CVE-2013-2455/" source="CVE"/>
		<reference ref_id="CVE-2013-2456" ref_url="https://www.suse.com/security/cve/CVE-2013-2456/" source="CVE"/>
		<reference ref_id="CVE-2013-2457" ref_url="https://www.suse.com/security/cve/CVE-2013-2457/" source="CVE"/>
		<reference ref_id="CVE-2013-2458" ref_url="https://www.suse.com/security/cve/CVE-2013-2458/" source="CVE"/>
		<reference ref_id="CVE-2013-2459" ref_url="https://www.suse.com/security/cve/CVE-2013-2459/" source="CVE"/>
		<reference ref_id="CVE-2013-2460" ref_url="https://www.suse.com/security/cve/CVE-2013-2460/" source="CVE"/>
		<reference ref_id="CVE-2013-2461" ref_url="https://www.suse.com/security/cve/CVE-2013-2461/" source="CVE"/>
		<reference ref_id="CVE-2013-2463" ref_url="https://www.suse.com/security/cve/CVE-2013-2463/" source="CVE"/>
		<reference ref_id="CVE-2013-2465" ref_url="https://www.suse.com/security/cve/CVE-2013-2465/" source="CVE"/>
		<reference ref_id="CVE-2013-2469" ref_url="https://www.suse.com/security/cve/CVE-2013-2469/" source="CVE"/>
		<reference ref_id="CVE-2013-2470" ref_url="https://www.suse.com/security/cve/CVE-2013-2470/" source="CVE"/>
		<reference ref_id="CVE-2013-2471" ref_url="https://www.suse.com/security/cve/CVE-2013-2471/" source="CVE"/>
		<reference ref_id="CVE-2013-2472" ref_url="https://www.suse.com/security/cve/CVE-2013-2472/" source="CVE"/>
		<reference ref_id="CVE-2013-2473" ref_url="https://www.suse.com/security/cve/CVE-2013-2473/" source="CVE"/>
		<reference ref_id="CVE-2013-3829" ref_url="https://www.suse.com/security/cve/CVE-2013-3829/" source="CVE"/>
		<reference ref_id="CVE-2013-4002" ref_url="https://www.suse.com/security/cve/CVE-2013-4002/" source="CVE"/>
		<reference ref_id="CVE-2013-5772" ref_url="https://www.suse.com/security/cve/CVE-2013-5772/" source="CVE"/>
		<reference ref_id="CVE-2013-5774" ref_url="https://www.suse.com/security/cve/CVE-2013-5774/" source="CVE"/>
		<reference ref_id="CVE-2013-5778" ref_url="https://www.suse.com/security/cve/CVE-2013-5778/" source="CVE"/>
		<reference ref_id="CVE-2013-5780" ref_url="https://www.suse.com/security/cve/CVE-2013-5780/" source="CVE"/>
		<reference ref_id="CVE-2013-5782" ref_url="https://www.suse.com/security/cve/CVE-2013-5782/" source="CVE"/>
		<reference ref_id="CVE-2013-5783" ref_url="https://www.suse.com/security/cve/CVE-2013-5783/" source="CVE"/>
		<reference ref_id="CVE-2013-5784" ref_url="https://www.suse.com/security/cve/CVE-2013-5784/" source="CVE"/>
		<reference ref_id="CVE-2013-5790" ref_url="https://www.suse.com/security/cve/CVE-2013-5790/" source="CVE"/>
		<reference ref_id="CVE-2013-5797" ref_url="https://www.suse.com/security/cve/CVE-2013-5797/" source="CVE"/>
		<reference ref_id="CVE-2013-5800" ref_url="https://www.suse.com/security/cve/CVE-2013-5800/" source="CVE"/>
		<reference ref_id="CVE-2013-5802" ref_url="https://www.suse.com/security/cve/CVE-2013-5802/" source="CVE"/>
		<reference ref_id="CVE-2013-5803" ref_url="https://www.suse.com/security/cve/CVE-2013-5803/" source="CVE"/>
		<reference ref_id="CVE-2013-5804" ref_url="https://www.suse.com/security/cve/CVE-2013-5804/" source="CVE"/>
		<reference ref_id="CVE-2013-5805" ref_url="https://www.suse.com/security/cve/CVE-2013-5805/" source="CVE"/>
		<reference ref_id="CVE-2013-5806" ref_url="https://www.suse.com/security/cve/CVE-2013-5806/" source="CVE"/>
		<reference ref_id="CVE-2013-5809" ref_url="https://www.suse.com/security/cve/CVE-2013-5809/" source="CVE"/>
		<reference ref_id="CVE-2013-5814" ref_url="https://www.suse.com/security/cve/CVE-2013-5814/" source="CVE"/>
		<reference ref_id="CVE-2013-5817" ref_url="https://www.suse.com/security/cve/CVE-2013-5817/" source="CVE"/>
		<reference ref_id="CVE-2013-5820" ref_url="https://www.suse.com/security/cve/CVE-2013-5820/" source="CVE"/>
		<reference ref_id="CVE-2013-5823" ref_url="https://www.suse.com/security/cve/CVE-2013-5823/" source="CVE"/>
		<reference ref_id="CVE-2013-5825" ref_url="https://www.suse.com/security/cve/CVE-2013-5825/" source="CVE"/>
		<reference ref_id="CVE-2013-5829" ref_url="https://www.suse.com/security/cve/CVE-2013-5829/" source="CVE"/>
		<reference ref_id="CVE-2013-5830" ref_url="https://www.suse.com/security/cve/CVE-2013-5830/" source="CVE"/>
		<reference ref_id="CVE-2013-5840" ref_url="https://www.suse.com/security/cve/CVE-2013-5840/" source="CVE"/>
		<reference ref_id="CVE-2013-5842" ref_url="https://www.suse.com/security/cve/CVE-2013-5842/" source="CVE"/>
		<reference ref_id="CVE-2013-5849" ref_url="https://www.suse.com/security/cve/CVE-2013-5849/" source="CVE"/>
		<reference ref_id="CVE-2013-5850" ref_url="https://www.suse.com/security/cve/CVE-2013-5850/" source="CVE"/>
		<reference ref_id="CVE-2013-5851" ref_url="https://www.suse.com/security/cve/CVE-2013-5851/" source="CVE"/>
		<reference ref_id="CVE-2013-5878" ref_url="https://www.suse.com/security/cve/CVE-2013-5878/" source="CVE"/>
		<reference ref_id="CVE-2013-5884" ref_url="https://www.suse.com/security/cve/CVE-2013-5884/" source="CVE"/>
		<reference ref_id="CVE-2013-5893" ref_url="https://www.suse.com/security/cve/CVE-2013-5893/" source="CVE"/>
		<reference ref_id="CVE-2013-5896" ref_url="https://www.suse.com/security/cve/CVE-2013-5896/" source="CVE"/>
		<reference ref_id="CVE-2013-5907" ref_url="https://www.suse.com/security/cve/CVE-2013-5907/" source="CVE"/>
		<reference ref_id="CVE-2013-5910" ref_url="https://www.suse.com/security/cve/CVE-2013-5910/" source="CVE"/>
		<reference ref_id="CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629/" source="CVE"/>
		<reference ref_id="CVE-2013-6954" ref_url="https://www.suse.com/security/cve/CVE-2013-6954/" source="CVE"/>
		<reference ref_id="CVE-2014-0368" ref_url="https://www.suse.com/security/cve/CVE-2014-0368/" source="CVE"/>
		<reference ref_id="CVE-2014-0373" ref_url="https://www.suse.com/security/cve/CVE-2014-0373/" source="CVE"/>
		<reference ref_id="CVE-2014-0376" ref_url="https://www.suse.com/security/cve/CVE-2014-0376/" source="CVE"/>
		<reference ref_id="CVE-2014-0408" ref_url="https://www.suse.com/security/cve/CVE-2014-0408/" source="CVE"/>
		<reference ref_id="CVE-2014-0411" ref_url="https://www.suse.com/security/cve/CVE-2014-0411/" source="CVE"/>
		<reference ref_id="CVE-2014-0416" ref_url="https://www.suse.com/security/cve/CVE-2014-0416/" source="CVE"/>
		<reference ref_id="CVE-2014-0422" ref_url="https://www.suse.com/security/cve/CVE-2014-0422/" source="CVE"/>
		<reference ref_id="CVE-2014-0423" ref_url="https://www.suse.com/security/cve/CVE-2014-0423/" source="CVE"/>
		<reference ref_id="CVE-2014-0428" ref_url="https://www.suse.com/security/cve/CVE-2014-0428/" source="CVE"/>
		<reference ref_id="CVE-2014-0429" ref_url="https://www.suse.com/security/cve/CVE-2014-0429/" source="CVE"/>
		<reference ref_id="CVE-2014-0446" ref_url="https://www.suse.com/security/cve/CVE-2014-0446/" source="CVE"/>
		<reference ref_id="CVE-2014-0451" ref_url="https://www.suse.com/security/cve/CVE-2014-0451/" source="CVE"/>
		<reference ref_id="CVE-2014-0452" ref_url="https://www.suse.com/security/cve/CVE-2014-0452/" source="CVE"/>
		<reference ref_id="CVE-2014-0453" ref_url="https://www.suse.com/security/cve/CVE-2014-0453/" source="CVE"/>
		<reference ref_id="CVE-2014-0454" ref_url="https://www.suse.com/security/cve/CVE-2014-0454/" source="CVE"/>
		<reference ref_id="CVE-2014-0455" ref_url="https://www.suse.com/security/cve/CVE-2014-0455/" source="CVE"/>
		<reference ref_id="CVE-2014-0456" ref_url="https://www.suse.com/security/cve/CVE-2014-0456/" source="CVE"/>
		<reference ref_id="CVE-2014-0457" ref_url="https://www.suse.com/security/cve/CVE-2014-0457/" source="CVE"/>
		<reference ref_id="CVE-2014-0458" ref_url="https://www.suse.com/security/cve/CVE-2014-0458/" source="CVE"/>
		<reference ref_id="CVE-2014-0459" ref_url="https://www.suse.com/security/cve/CVE-2014-0459/" source="CVE"/>
		<reference ref_id="CVE-2014-0460" ref_url="https://www.suse.com/security/cve/CVE-2014-0460/" source="CVE"/>
		<reference ref_id="CVE-2014-0461" ref_url="https://www.suse.com/security/cve/CVE-2014-0461/" source="CVE"/>
		<reference ref_id="CVE-2014-1876" ref_url="https://www.suse.com/security/cve/CVE-2014-1876/" source="CVE"/>
		<reference ref_id="CVE-2014-2397" ref_url="https://www.suse.com/security/cve/CVE-2014-2397/" source="CVE"/>
		<reference ref_id="CVE-2014-2398" ref_url="https://www.suse.com/security/cve/CVE-2014-2398/" source="CVE"/>
		<reference ref_id="CVE-2014-2402" ref_url="https://www.suse.com/security/cve/CVE-2014-2402/" source="CVE"/>
		<reference ref_id="CVE-2014-2403" ref_url="https://www.suse.com/security/cve/CVE-2014-2403/" source="CVE"/>
		<reference ref_id="CVE-2014-2412" ref_url="https://www.suse.com/security/cve/CVE-2014-2412/" source="CVE"/>
		<reference ref_id="CVE-2014-2413" ref_url="https://www.suse.com/security/cve/CVE-2014-2413/" source="CVE"/>
		<reference ref_id="CVE-2014-2414" ref_url="https://www.suse.com/security/cve/CVE-2014-2414/" source="CVE"/>
		<reference ref_id="CVE-2014-2421" ref_url="https://www.suse.com/security/cve/CVE-2014-2421/" source="CVE"/>
		<reference ref_id="CVE-2014-2423" ref_url="https://www.suse.com/security/cve/CVE-2014-2423/" source="CVE"/>
		<reference ref_id="CVE-2014-2427" ref_url="https://www.suse.com/security/cve/CVE-2014-2427/" source="CVE"/>
		<reference ref_id="CVE-2014-2483" ref_url="https://www.suse.com/security/cve/CVE-2014-2483/" source="CVE"/>
		<reference ref_id="CVE-2014-2490" ref_url="https://www.suse.com/security/cve/CVE-2014-2490/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-4209" ref_url="https://www.suse.com/security/cve/CVE-2014-4209/" source="CVE"/>
		<reference ref_id="CVE-2014-4216" ref_url="https://www.suse.com/security/cve/CVE-2014-4216/" source="CVE"/>
		<reference ref_id="CVE-2014-4218" ref_url="https://www.suse.com/security/cve/CVE-2014-4218/" source="CVE"/>
		<reference ref_id="CVE-2014-4219" ref_url="https://www.suse.com/security/cve/CVE-2014-4219/" source="CVE"/>
		<reference ref_id="CVE-2014-4221" ref_url="https://www.suse.com/security/cve/CVE-2014-4221/" source="CVE"/>
		<reference ref_id="CVE-2014-4223" ref_url="https://www.suse.com/security/cve/CVE-2014-4223/" source="CVE"/>
		<reference ref_id="CVE-2014-4244" ref_url="https://www.suse.com/security/cve/CVE-2014-4244/" source="CVE"/>
		<reference ref_id="CVE-2014-4252" ref_url="https://www.suse.com/security/cve/CVE-2014-4252/" source="CVE"/>
		<reference ref_id="CVE-2014-4262" ref_url="https://www.suse.com/security/cve/CVE-2014-4262/" source="CVE"/>
		<reference ref_id="CVE-2014-4263" ref_url="https://www.suse.com/security/cve/CVE-2014-4263/" source="CVE"/>
		<reference ref_id="CVE-2014-4264" ref_url="https://www.suse.com/security/cve/CVE-2014-4264/" source="CVE"/>
		<reference ref_id="CVE-2014-4266" ref_url="https://www.suse.com/security/cve/CVE-2014-4266/" source="CVE"/>
		<reference ref_id="CVE-2014-4268" ref_url="https://www.suse.com/security/cve/CVE-2014-4268/" source="CVE"/>
		<reference ref_id="CVE-2014-6457" ref_url="https://www.suse.com/security/cve/CVE-2014-6457/" source="CVE"/>
		<reference ref_id="CVE-2014-6502" ref_url="https://www.suse.com/security/cve/CVE-2014-6502/" source="CVE"/>
		<reference ref_id="CVE-2014-6504" ref_url="https://www.suse.com/security/cve/CVE-2014-6504/" source="CVE"/>
		<reference ref_id="CVE-2014-6506" ref_url="https://www.suse.com/security/cve/CVE-2014-6506/" source="CVE"/>
		<reference ref_id="CVE-2014-6511" ref_url="https://www.suse.com/security/cve/CVE-2014-6511/" source="CVE"/>
		<reference ref_id="CVE-2014-6512" ref_url="https://www.suse.com/security/cve/CVE-2014-6512/" source="CVE"/>
		<reference ref_id="CVE-2014-6513" ref_url="https://www.suse.com/security/cve/CVE-2014-6513/" source="CVE"/>
		<reference ref_id="CVE-2014-6517" ref_url="https://www.suse.com/security/cve/CVE-2014-6517/" source="CVE"/>
		<reference ref_id="CVE-2014-6519" ref_url="https://www.suse.com/security/cve/CVE-2014-6519/" source="CVE"/>
		<reference ref_id="CVE-2014-6531" ref_url="https://www.suse.com/security/cve/CVE-2014-6531/" source="CVE"/>
		<reference ref_id="CVE-2014-6558" ref_url="https://www.suse.com/security/cve/CVE-2014-6558/" source="CVE"/>
		<reference ref_id="CVE-2014-6585" ref_url="https://www.suse.com/security/cve/CVE-2014-6585/" source="CVE"/>
		<reference ref_id="CVE-2014-6587" ref_url="https://www.suse.com/security/cve/CVE-2014-6587/" source="CVE"/>
		<reference ref_id="CVE-2014-6591" ref_url="https://www.suse.com/security/cve/CVE-2014-6591/" source="CVE"/>
		<reference ref_id="CVE-2014-6593" ref_url="https://www.suse.com/security/cve/CVE-2014-6593/" source="CVE"/>
		<reference ref_id="CVE-2014-6601" ref_url="https://www.suse.com/security/cve/CVE-2014-6601/" source="CVE"/>
		<reference ref_id="CVE-2015-0383" ref_url="https://www.suse.com/security/cve/CVE-2015-0383/" source="CVE"/>
		<reference ref_id="CVE-2015-0395" ref_url="https://www.suse.com/security/cve/CVE-2015-0395/" source="CVE"/>
		<reference ref_id="CVE-2015-0400" ref_url="https://www.suse.com/security/cve/CVE-2015-0400/" source="CVE"/>
		<reference ref_id="CVE-2015-0407" ref_url="https://www.suse.com/security/cve/CVE-2015-0407/" source="CVE"/>
		<reference ref_id="CVE-2015-0408" ref_url="https://www.suse.com/security/cve/CVE-2015-0408/" source="CVE"/>
		<reference ref_id="CVE-2015-0410" ref_url="https://www.suse.com/security/cve/CVE-2015-0410/" source="CVE"/>
		<reference ref_id="CVE-2015-0412" ref_url="https://www.suse.com/security/cve/CVE-2015-0412/" source="CVE"/>
		<reference ref_id="CVE-2015-0460" ref_url="https://www.suse.com/security/cve/CVE-2015-0460/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2628" ref_url="https://www.suse.com/security/cve/CVE-2015-2628/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4881" ref_url="https://www.suse.com/security/cve/CVE-2015-4881/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="CVE-2016-0636" ref_url="https://www.suse.com/security/cve/CVE-2016-0636/" source="CVE"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-0695" ref_url="https://www.suse.com/security/cve/CVE-2016-0695/" source="CVE"/>
		<reference ref_id="CVE-2016-3425" ref_url="https://www.suse.com/security/cve/CVE-2016-3425/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="CVE-2016-3458" ref_url="https://www.suse.com/security/cve/CVE-2016-3458/" source="CVE"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<reference ref_id="CVE-2016-3498" ref_url="https://www.suse.com/security/cve/CVE-2016-3498/" source="CVE"/>
		<reference ref_id="CVE-2016-3500" ref_url="https://www.suse.com/security/cve/CVE-2016-3500/" source="CVE"/>
		<reference ref_id="CVE-2016-3503" ref_url="https://www.suse.com/security/cve/CVE-2016-3503/" source="CVE"/>
		<reference ref_id="CVE-2016-3508" ref_url="https://www.suse.com/security/cve/CVE-2016-3508/" source="CVE"/>
		<reference ref_id="CVE-2016-3511" ref_url="https://www.suse.com/security/cve/CVE-2016-3511/" source="CVE"/>
		<reference ref_id="CVE-2016-3550" ref_url="https://www.suse.com/security/cve/CVE-2016-3550/" source="CVE"/>
		<reference ref_id="CVE-2016-3598" ref_url="https://www.suse.com/security/cve/CVE-2016-3598/" source="CVE"/>
		<reference ref_id="CVE-2016-3606" ref_url="https://www.suse.com/security/cve/CVE-2016-3606/" source="CVE"/>
		<reference ref_id="CVE-2016-3610" ref_url="https://www.suse.com/security/cve/CVE-2016-3610/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_7_0-openjdk-1.7.0.111-33.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3563/">CVE-2011-3563</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3571/">CVE-2011-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5035/">CVE-2011-5035</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0497/">CVE-2012-0497</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0501/">CVE-2012-0501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0502/">CVE-2012-0502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0503/">CVE-2012-0503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0505/">CVE-2012-0505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0506/">CVE-2012-0506</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0547/">CVE-2012-0547</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1682/">CVE-2012-1682</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1711/">CVE-2012-1711</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1713/">CVE-2012-1713</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1716/">CVE-2012-1716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1717/">CVE-2012-1717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1718/">CVE-2012-1718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1719/">CVE-2012-1719</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1723/">CVE-2012-1723</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1724/">CVE-2012-1724</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1725/">CVE-2012-1725</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1726/">CVE-2012-1726</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3136/">CVE-2012-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3174/">CVE-2012-3174</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3216/">CVE-2012-3216</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4416/">CVE-2012-4416</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4681/">CVE-2012-4681</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5068/">CVE-2012-5068</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5069/">CVE-2012-5069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5070/">CVE-2012-5070</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5071/">CVE-2012-5071</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5072/">CVE-2012-5072</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5073/">CVE-2012-5073</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5074/">CVE-2012-5074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5075/">CVE-2012-5075</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5076/">CVE-2012-5076</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-5077/">CVE-2012-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5079/">CVE-2012-5079</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5081/">CVE-2012-5081</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5084/">CVE-2012-5084</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-5085/">CVE-2012-5085</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5086/">CVE-2012-5086</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5087/">CVE-2012-5087</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5088/">CVE-2012-5088</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5089/">CVE-2012-5089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0401/">CVE-2013-0401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0422/">CVE-2013-0422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0424/">CVE-2013-0424</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0425/">CVE-2013-0425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0426/">CVE-2013-0426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0427/">CVE-2013-0427</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0428/">CVE-2013-0428</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0429/">CVE-2013-0429</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0431/">CVE-2013-0431</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0432/">CVE-2013-0432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0433/">CVE-2013-0433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0434/">CVE-2013-0434</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0435/">CVE-2013-0435</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0440/">CVE-2013-0440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0441/">CVE-2013-0441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0442/">CVE-2013-0442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0443/">CVE-2013-0443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0444/">CVE-2013-0444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0450/">CVE-2013-0450</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0809/">CVE-2013-0809</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1475/">CVE-2013-1475</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1476/">CVE-2013-1476</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1478/">CVE-2013-1478</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1480/">CVE-2013-1480</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1484/">CVE-2013-1484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1485/">CVE-2013-1485</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1486/">CVE-2013-1486</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1488/">CVE-2013-1488</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1493/">CVE-2013-1493</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1500/">CVE-2013-1500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1518/">CVE-2013-1518</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1537/">CVE-2013-1537</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1557/">CVE-2013-1557</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1569/">CVE-2013-1569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1571/">CVE-2013-1571</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2383/">CVE-2013-2383</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2384/">CVE-2013-2384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2407/">CVE-2013-2407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2412/">CVE-2013-2412</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2415/">CVE-2013-2415</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2417/">CVE-2013-2417</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2419/">CVE-2013-2419</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2420/">CVE-2013-2420</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2421/">CVE-2013-2421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2422/">CVE-2013-2422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2423/">CVE-2013-2423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2424/">CVE-2013-2424</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2426/">CVE-2013-2426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2429/">CVE-2013-2429</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2430/">CVE-2013-2430</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2431/">CVE-2013-2431</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2436/">CVE-2013-2436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2443/">CVE-2013-2443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2444/">CVE-2013-2444</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2445/">CVE-2013-2445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2446/">CVE-2013-2446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2447/">CVE-2013-2447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2448/">CVE-2013-2448</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2449/">CVE-2013-2449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2450/">CVE-2013-2450</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2451/">CVE-2013-2451</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2452/">CVE-2013-2452</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2453/">CVE-2013-2453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2454/">CVE-2013-2454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2455/">CVE-2013-2455</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2456/">CVE-2013-2456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2457/">CVE-2013-2457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2458/">CVE-2013-2458</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2459/">CVE-2013-2459</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2460/">CVE-2013-2460</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2461/">CVE-2013-2461</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2463/">CVE-2013-2463</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2465/">CVE-2013-2465</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2469/">CVE-2013-2469</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2470/">CVE-2013-2470</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2471/">CVE-2013-2471</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2472/">CVE-2013-2472</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2473/">CVE-2013-2473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3829/">CVE-2013-3829</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4002/">CVE-2013-4002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5772/">CVE-2013-5772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5774/">CVE-2013-5774</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5778/">CVE-2013-5778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5780/">CVE-2013-5780</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5782/">CVE-2013-5782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5783/">CVE-2013-5783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5784/">CVE-2013-5784</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5790/">CVE-2013-5790</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-5797/">CVE-2013-5797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5800/">CVE-2013-5800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5802/">CVE-2013-5802</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5803/">CVE-2013-5803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5804/">CVE-2013-5804</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5805/">CVE-2013-5805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5806/">CVE-2013-5806</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5809/">CVE-2013-5809</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5814/">CVE-2013-5814</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5817/">CVE-2013-5817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5820/">CVE-2013-5820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5823/">CVE-2013-5823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5825/">CVE-2013-5825</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5829/">CVE-2013-5829</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5830/">CVE-2013-5830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5840/">CVE-2013-5840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5842/">CVE-2013-5842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5849/">CVE-2013-5849</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5850/">CVE-2013-5850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5851/">CVE-2013-5851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5878/">CVE-2013-5878</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5884/">CVE-2013-5884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5893/">CVE-2013-5893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5896/">CVE-2013-5896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5907/">CVE-2013-5907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5910/">CVE-2013-5910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6954/">CVE-2013-6954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0368/">CVE-2014-0368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0373/">CVE-2014-0373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0376/">CVE-2014-0376</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0408/">CVE-2014-0408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0411/">CVE-2014-0411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0416/">CVE-2014-0416</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0422/">CVE-2014-0422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0423/">CVE-2014-0423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0428/">CVE-2014-0428</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0429/">CVE-2014-0429</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0446/">CVE-2014-0446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0451/">CVE-2014-0451</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0452/">CVE-2014-0452</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0453/">CVE-2014-0453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0454/">CVE-2014-0454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0455/">CVE-2014-0455</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0456/">CVE-2014-0456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0457/">CVE-2014-0457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0458/">CVE-2014-0458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0459/">CVE-2014-0459</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0460/">CVE-2014-0460</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0461/">CVE-2014-0461</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1876/">CVE-2014-1876</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2397/">CVE-2014-2397</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2398/">CVE-2014-2398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2402/">CVE-2014-2402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2403/">CVE-2014-2403</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2412/">CVE-2014-2412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2413/">CVE-2014-2413</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2414/">CVE-2014-2414</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2421/">CVE-2014-2421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2423/">CVE-2014-2423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2427/">CVE-2014-2427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2483/">CVE-2014-2483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2490/">CVE-2014-2490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4209/">CVE-2014-4209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4216/">CVE-2014-4216</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4218/">CVE-2014-4218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4219/">CVE-2014-4219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4221/">CVE-2014-4221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4223/">CVE-2014-4223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4244/">CVE-2014-4244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4252/">CVE-2014-4252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4262/">CVE-2014-4262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4263/">CVE-2014-4263</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4264/">CVE-2014-4264</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4266/">CVE-2014-4266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4268/">CVE-2014-4268</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6457/">CVE-2014-6457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6502/">CVE-2014-6502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6504/">CVE-2014-6504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6506/">CVE-2014-6506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6511/">CVE-2014-6511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6512/">CVE-2014-6512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6513/">CVE-2014-6513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6517/">CVE-2014-6517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6519/">CVE-2014-6519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6531/">CVE-2014-6531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6558/">CVE-2014-6558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6585/">CVE-2014-6585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6587/">CVE-2014-6587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6591/">CVE-2014-6591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6593/">CVE-2014-6593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6601/">CVE-2014-6601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0383/">CVE-2015-0383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0395/">CVE-2015-0395</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0400/">CVE-2015-0400</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0407/">CVE-2015-0407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0408/">CVE-2015-0408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0410/">CVE-2015-0410</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0412/">CVE-2015-0412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0460/">CVE-2015-0460</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2628/">CVE-2015-2628</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4881/">CVE-2015-4881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0636/">CVE-2016-0636</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0695/">CVE-2016-0695</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3425/">CVE-2016-3425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3458/">CVE-2016-3458</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3498/">CVE-2016-3498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3500/">CVE-2016-3500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3503/">CVE-2016-3503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3508/">CVE-2016-3508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3511/">CVE-2016-3511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3550/">CVE-2016-3550</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3598/">CVE-2016-3598</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-3606/">CVE-2016-3606</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3610/">CVE-2016-3610</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76258" version="1" class="patch">
	<metadata>
		<title>java-1_7_0-openjdk-plugin-1.6.1-2.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-2513" ref_url="https://www.suse.com/security/cve/CVE-2011-2513/" source="CVE"/>
		<reference ref_id="CVE-2011-2514" ref_url="https://www.suse.com/security/cve/CVE-2011-2514/" source="CVE"/>
		<reference ref_id="CVE-2011-3377" ref_url="https://www.suse.com/security/cve/CVE-2011-3377/" source="CVE"/>
		<reference ref_id="CVE-2012-3422" ref_url="https://www.suse.com/security/cve/CVE-2012-3422/" source="CVE"/>
		<reference ref_id="CVE-2012-3423" ref_url="https://www.suse.com/security/cve/CVE-2012-3423/" source="CVE"/>
		<reference ref_id="CVE-2012-4540" ref_url="https://www.suse.com/security/cve/CVE-2012-4540/" source="CVE"/>
		<reference ref_id="CVE-2013-1926" ref_url="https://www.suse.com/security/cve/CVE-2013-1926/" source="CVE"/>
		<reference ref_id="CVE-2013-1927" ref_url="https://www.suse.com/security/cve/CVE-2013-1927/" source="CVE"/>
		<reference ref_id="CVE-2013-4349" ref_url="https://www.suse.com/security/cve/CVE-2013-4349/" source="CVE"/>
		<reference ref_id="CVE-2015-5234" ref_url="https://www.suse.com/security/cve/CVE-2015-5234/" source="CVE"/>
		<reference ref_id="CVE-2015-5235" ref_url="https://www.suse.com/security/cve/CVE-2015-5235/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_7_0-openjdk-plugin-1.6.1-2.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2513/">CVE-2011-2513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2514/">CVE-2011-2514</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3377/">CVE-2011-3377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3422/">CVE-2012-3422</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3423/">CVE-2012-3423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4540/">CVE-2012-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1926/">CVE-2013-1926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1927/">CVE-2013-1927</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4349/">CVE-2013-4349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5234/">CVE-2015-5234</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5235/">CVE-2015-5235</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009114769" comment="java-1_7_0-openjdk-plugin-1.6.1-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141887" comment="java-1_8_0-openjdk-plugin-1.6.1-2.4.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76259" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openjdk-1.8.0.101-14.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2597" ref_url="https://www.suse.com/security/cve/CVE-2015-2597/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2619" ref_url="https://www.suse.com/security/cve/CVE-2015-2619/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2627" ref_url="https://www.suse.com/security/cve/CVE-2015-2627/" source="CVE"/>
		<reference ref_id="CVE-2015-2628" ref_url="https://www.suse.com/security/cve/CVE-2015-2628/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2659" ref_url="https://www.suse.com/security/cve/CVE-2015-2659/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4729" ref_url="https://www.suse.com/security/cve/CVE-2015-4729/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4736" ref_url="https://www.suse.com/security/cve/CVE-2015-4736/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4810" ref_url="https://www.suse.com/security/cve/CVE-2015-4810/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4868" ref_url="https://www.suse.com/security/cve/CVE-2015-4868/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4881" ref_url="https://www.suse.com/security/cve/CVE-2015-4881/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4901" ref_url="https://www.suse.com/security/cve/CVE-2015-4901/" source="CVE"/>
		<reference ref_id="CVE-2015-4902" ref_url="https://www.suse.com/security/cve/CVE-2015-4902/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4906" ref_url="https://www.suse.com/security/cve/CVE-2015-4906/" source="CVE"/>
		<reference ref_id="CVE-2015-4908" ref_url="https://www.suse.com/security/cve/CVE-2015-4908/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-4916" ref_url="https://www.suse.com/security/cve/CVE-2015-4916/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0475" ref_url="https://www.suse.com/security/cve/CVE-2016-0475/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="CVE-2016-0636" ref_url="https://www.suse.com/security/cve/CVE-2016-0636/" source="CVE"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-0695" ref_url="https://www.suse.com/security/cve/CVE-2016-0695/" source="CVE"/>
		<reference ref_id="CVE-2016-3425" ref_url="https://www.suse.com/security/cve/CVE-2016-3425/" source="CVE"/>
		<reference ref_id="CVE-2016-3426" ref_url="https://www.suse.com/security/cve/CVE-2016-3426/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="CVE-2016-3458" ref_url="https://www.suse.com/security/cve/CVE-2016-3458/" source="CVE"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<reference ref_id="CVE-2016-3498" ref_url="https://www.suse.com/security/cve/CVE-2016-3498/" source="CVE"/>
		<reference ref_id="CVE-2016-3500" ref_url="https://www.suse.com/security/cve/CVE-2016-3500/" source="CVE"/>
		<reference ref_id="CVE-2016-3503" ref_url="https://www.suse.com/security/cve/CVE-2016-3503/" source="CVE"/>
		<reference ref_id="CVE-2016-3508" ref_url="https://www.suse.com/security/cve/CVE-2016-3508/" source="CVE"/>
		<reference ref_id="CVE-2016-3511" ref_url="https://www.suse.com/security/cve/CVE-2016-3511/" source="CVE"/>
		<reference ref_id="CVE-2016-3550" ref_url="https://www.suse.com/security/cve/CVE-2016-3550/" source="CVE"/>
		<reference ref_id="CVE-2016-3552" ref_url="https://www.suse.com/security/cve/CVE-2016-3552/" source="CVE"/>
		<reference ref_id="CVE-2016-3587" ref_url="https://www.suse.com/security/cve/CVE-2016-3587/" source="CVE"/>
		<reference ref_id="CVE-2016-3598" ref_url="https://www.suse.com/security/cve/CVE-2016-3598/" source="CVE"/>
		<reference ref_id="CVE-2016-3606" ref_url="https://www.suse.com/security/cve/CVE-2016-3606/" source="CVE"/>
		<reference ref_id="CVE-2016-3610" ref_url="https://www.suse.com/security/cve/CVE-2016-3610/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.101-14.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2597/">CVE-2015-2597</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2619/">CVE-2015-2619</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2627/">CVE-2015-2627</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2628/">CVE-2015-2628</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2659/">CVE-2015-2659</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4729/">CVE-2015-4729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4736/">CVE-2015-4736</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4810/">CVE-2015-4810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4868/">CVE-2015-4868</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4881/">CVE-2015-4881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4901/">CVE-2015-4901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4902/">CVE-2015-4902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4906/">CVE-2015-4906</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4908/">CVE-2015-4908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4916/">CVE-2015-4916</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0475/">CVE-2016-0475</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0636/">CVE-2016-0636</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0695/">CVE-2016-0695</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3425/">CVE-2016-3425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3426/">CVE-2016-3426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3458/">CVE-2016-3458</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3498/">CVE-2016-3498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3500/">CVE-2016-3500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3503/">CVE-2016-3503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3508/">CVE-2016-3508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3511/">CVE-2016-3511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3550/">CVE-2016-3550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3552/">CVE-2016-3552</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3587/">CVE-2016-3587</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3598/">CVE-2016-3598</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-3606/">CVE-2016-3606</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3610/">CVE-2016-3610</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76260" version="1" class="patch">
	<metadata>
		<title>kbd-1.15.5-8.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-0460" ref_url="https://www.suse.com/security/cve/CVE-2011-0460/" source="CVE"/>
		<description>
These are all security issues fixed in the kbd-1.15.5-8.7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0460/">CVE-2011-0460</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140693" comment="kbd-1.15.5-8.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76261" version="1" class="patch">
	<metadata>
		<title>kdump-0.8.15-28.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2016-5759" ref_url="https://www.suse.com/security/cve/CVE-2016-5759/" source="CVE"/>
		<description>
These are all security issues fixed in the kdump-0.8.15-28.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5759/">CVE-2016-5759</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140694" comment="kdump-0.8.15-28.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76262" version="1" class="patch">
	<metadata>
		<title>kernel-default-4.4.21-69.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-3939" ref_url="https://www.suse.com/security/cve/CVE-2009-3939/" source="CVE"/>
		<reference ref_id="CVE-2009-4026" ref_url="https://www.suse.com/security/cve/CVE-2009-4026/" source="CVE"/>
		<reference ref_id="CVE-2009-4027" ref_url="https://www.suse.com/security/cve/CVE-2009-4027/" source="CVE"/>
		<reference ref_id="CVE-2009-4131" ref_url="https://www.suse.com/security/cve/CVE-2009-4131/" source="CVE"/>
		<reference ref_id="CVE-2009-4138" ref_url="https://www.suse.com/security/cve/CVE-2009-4138/" source="CVE"/>
		<reference ref_id="CVE-2009-4536" ref_url="https://www.suse.com/security/cve/CVE-2009-4536/" source="CVE"/>
		<reference ref_id="CVE-2009-4538" ref_url="https://www.suse.com/security/cve/CVE-2009-4538/" source="CVE"/>
		<reference ref_id="CVE-2010-1146" ref_url="https://www.suse.com/security/cve/CVE-2010-1146/" source="CVE"/>
		<reference ref_id="CVE-2010-1436" ref_url="https://www.suse.com/security/cve/CVE-2010-1436/" source="CVE"/>
		<reference ref_id="CVE-2010-1641" ref_url="https://www.suse.com/security/cve/CVE-2010-1641/" source="CVE"/>
		<reference ref_id="CVE-2010-2066" ref_url="https://www.suse.com/security/cve/CVE-2010-2066/" source="CVE"/>
		<reference ref_id="CVE-2010-2942" ref_url="https://www.suse.com/security/cve/CVE-2010-2942/" source="CVE"/>
		<reference ref_id="CVE-2010-2954" ref_url="https://www.suse.com/security/cve/CVE-2010-2954/" source="CVE"/>
		<reference ref_id="CVE-2010-2955" ref_url="https://www.suse.com/security/cve/CVE-2010-2955/" source="CVE"/>
		<reference ref_id="CVE-2010-3081" ref_url="https://www.suse.com/security/cve/CVE-2010-3081/" source="CVE"/>
		<reference ref_id="CVE-2010-3296" ref_url="https://www.suse.com/security/cve/CVE-2010-3296/" source="CVE"/>
		<reference ref_id="CVE-2010-3297" ref_url="https://www.suse.com/security/cve/CVE-2010-3297/" source="CVE"/>
		<reference ref_id="CVE-2010-3298" ref_url="https://www.suse.com/security/cve/CVE-2010-3298/" source="CVE"/>
		<reference ref_id="CVE-2010-3301" ref_url="https://www.suse.com/security/cve/CVE-2010-3301/" source="CVE"/>
		<reference ref_id="CVE-2010-3310" ref_url="https://www.suse.com/security/cve/CVE-2010-3310/" source="CVE"/>
		<reference ref_id="CVE-2011-0712" ref_url="https://www.suse.com/security/cve/CVE-2011-0712/" source="CVE"/>
		<reference ref_id="CVE-2011-1020" ref_url="https://www.suse.com/security/cve/CVE-2011-1020/" source="CVE"/>
		<reference ref_id="CVE-2011-1577" ref_url="https://www.suse.com/security/cve/CVE-2011-1577/" source="CVE"/>
		<reference ref_id="CVE-2011-2203" ref_url="https://www.suse.com/security/cve/CVE-2011-2203/" source="CVE"/>
		<reference ref_id="CVE-2012-0056" ref_url="https://www.suse.com/security/cve/CVE-2012-0056/" source="CVE"/>
		<reference ref_id="CVE-2013-0160" ref_url="https://www.suse.com/security/cve/CVE-2013-0160/" source="CVE"/>
		<reference ref_id="CVE-2013-0231" ref_url="https://www.suse.com/security/cve/CVE-2013-0231/" source="CVE"/>
		<reference ref_id="CVE-2013-0913" ref_url="https://www.suse.com/security/cve/CVE-2013-0913/" source="CVE"/>
		<reference ref_id="CVE-2013-2850" ref_url="https://www.suse.com/security/cve/CVE-2013-2850/" source="CVE"/>
		<reference ref_id="CVE-2013-4312" ref_url="https://www.suse.com/security/cve/CVE-2013-4312/" source="CVE"/>
		<reference ref_id="CVE-2014-0038" ref_url="https://www.suse.com/security/cve/CVE-2014-0038/" source="CVE"/>
		<reference ref_id="CVE-2014-0196" ref_url="https://www.suse.com/security/cve/CVE-2014-0196/" source="CVE"/>
		<reference ref_id="CVE-2014-0691" ref_url="https://www.suse.com/security/cve/CVE-2014-0691/" source="CVE"/>
		<reference ref_id="CVE-2015-7833" ref_url="https://www.suse.com/security/cve/CVE-2015-7833/" source="CVE"/>
		<reference ref_id="CVE-2015-7884" ref_url="https://www.suse.com/security/cve/CVE-2015-7884/" source="CVE"/>
		<reference ref_id="CVE-2015-7885" ref_url="https://www.suse.com/security/cve/CVE-2015-7885/" source="CVE"/>
		<reference ref_id="CVE-2015-8709" ref_url="https://www.suse.com/security/cve/CVE-2015-8709/" source="CVE"/>
		<reference ref_id="CVE-2015-8812" ref_url="https://www.suse.com/security/cve/CVE-2015-8812/" source="CVE"/>
		<reference ref_id="CVE-2016-0617" ref_url="https://www.suse.com/security/cve/CVE-2016-0617/" source="CVE"/>
		<reference ref_id="CVE-2016-0723" ref_url="https://www.suse.com/security/cve/CVE-2016-0723/" source="CVE"/>
		<reference ref_id="CVE-2016-0728" ref_url="https://www.suse.com/security/cve/CVE-2016-0728/" source="CVE"/>
		<reference ref_id="CVE-2016-0758" ref_url="https://www.suse.com/security/cve/CVE-2016-0758/" source="CVE"/>
		<reference ref_id="CVE-2016-1237" ref_url="https://www.suse.com/security/cve/CVE-2016-1237/" source="CVE"/>
		<reference ref_id="CVE-2016-1583" ref_url="https://www.suse.com/security/cve/CVE-2016-1583/" source="CVE"/>
		<reference ref_id="CVE-2016-2143" ref_url="https://www.suse.com/security/cve/CVE-2016-2143/" source="CVE"/>
		<reference ref_id="CVE-2016-2184" ref_url="https://www.suse.com/security/cve/CVE-2016-2184/" source="CVE"/>
		<reference ref_id="CVE-2016-2185" ref_url="https://www.suse.com/security/cve/CVE-2016-2185/" source="CVE"/>
		<reference ref_id="CVE-2016-2186" ref_url="https://www.suse.com/security/cve/CVE-2016-2186/" source="CVE"/>
		<reference ref_id="CVE-2016-2188" ref_url="https://www.suse.com/security/cve/CVE-2016-2188/" source="CVE"/>
		<reference ref_id="CVE-2016-2383" ref_url="https://www.suse.com/security/cve/CVE-2016-2383/" source="CVE"/>
		<reference ref_id="CVE-2016-2384" ref_url="https://www.suse.com/security/cve/CVE-2016-2384/" source="CVE"/>
		<reference ref_id="CVE-2016-2847" ref_url="https://www.suse.com/security/cve/CVE-2016-2847/" source="CVE"/>
		<reference ref_id="CVE-2016-3134" ref_url="https://www.suse.com/security/cve/CVE-2016-3134/" source="CVE"/>
		<reference ref_id="CVE-2016-3135" ref_url="https://www.suse.com/security/cve/CVE-2016-3135/" source="CVE"/>
		<reference ref_id="CVE-2016-3136" ref_url="https://www.suse.com/security/cve/CVE-2016-3136/" source="CVE"/>
		<reference ref_id="CVE-2016-3137" ref_url="https://www.suse.com/security/cve/CVE-2016-3137/" source="CVE"/>
		<reference ref_id="CVE-2016-3138" ref_url="https://www.suse.com/security/cve/CVE-2016-3138/" source="CVE"/>
		<reference ref_id="CVE-2016-3140" ref_url="https://www.suse.com/security/cve/CVE-2016-3140/" source="CVE"/>
		<reference ref_id="CVE-2016-3156" ref_url="https://www.suse.com/security/cve/CVE-2016-3156/" source="CVE"/>
		<reference ref_id="CVE-2016-3672" ref_url="https://www.suse.com/security/cve/CVE-2016-3672/" source="CVE"/>
		<reference ref_id="CVE-2016-3689" ref_url="https://www.suse.com/security/cve/CVE-2016-3689/" source="CVE"/>
		<reference ref_id="CVE-2016-3713" ref_url="https://www.suse.com/security/cve/CVE-2016-3713/" source="CVE"/>
		<reference ref_id="CVE-2016-3951" ref_url="https://www.suse.com/security/cve/CVE-2016-3951/" source="CVE"/>
		<reference ref_id="CVE-2016-4470" ref_url="https://www.suse.com/security/cve/CVE-2016-4470/" source="CVE"/>
		<reference ref_id="CVE-2016-4482" ref_url="https://www.suse.com/security/cve/CVE-2016-4482/" source="CVE"/>
		<reference ref_id="CVE-2016-4486" ref_url="https://www.suse.com/security/cve/CVE-2016-4486/" source="CVE"/>
		<reference ref_id="CVE-2016-4557" ref_url="https://www.suse.com/security/cve/CVE-2016-4557/" source="CVE"/>
		<reference ref_id="CVE-2016-4558" ref_url="https://www.suse.com/security/cve/CVE-2016-4558/" source="CVE"/>
		<reference ref_id="CVE-2016-4569" ref_url="https://www.suse.com/security/cve/CVE-2016-4569/" source="CVE"/>
		<reference ref_id="CVE-2016-4578" ref_url="https://www.suse.com/security/cve/CVE-2016-4578/" source="CVE"/>
		<reference ref_id="CVE-2016-4794" ref_url="https://www.suse.com/security/cve/CVE-2016-4794/" source="CVE"/>
		<reference ref_id="CVE-2016-4805" ref_url="https://www.suse.com/security/cve/CVE-2016-4805/" source="CVE"/>
		<reference ref_id="CVE-2016-4951" ref_url="https://www.suse.com/security/cve/CVE-2016-4951/" source="CVE"/>
		<reference ref_id="CVE-2016-4997" ref_url="https://www.suse.com/security/cve/CVE-2016-4997/" source="CVE"/>
		<reference ref_id="CVE-2016-4998" ref_url="https://www.suse.com/security/cve/CVE-2016-4998/" source="CVE"/>
		<reference ref_id="CVE-2016-5195" ref_url="https://www.suse.com/security/cve/CVE-2016-5195/" source="CVE"/>
		<reference ref_id="CVE-2016-5244" ref_url="https://www.suse.com/security/cve/CVE-2016-5244/" source="CVE"/>
		<reference ref_id="CVE-2016-5412" ref_url="https://www.suse.com/security/cve/CVE-2016-5412/" source="CVE"/>
		<reference ref_id="CVE-2016-5696" ref_url="https://www.suse.com/security/cve/CVE-2016-5696/" source="CVE"/>
		<reference ref_id="CVE-2016-5828" ref_url="https://www.suse.com/security/cve/CVE-2016-5828/" source="CVE"/>
		<reference ref_id="CVE-2016-5829" ref_url="https://www.suse.com/security/cve/CVE-2016-5829/" source="CVE"/>
		<reference ref_id="CVE-2016-6197" ref_url="https://www.suse.com/security/cve/CVE-2016-6197/" source="CVE"/>
		<reference ref_id="CVE-2016-6480" ref_url="https://www.suse.com/security/cve/CVE-2016-6480/" source="CVE"/>
		<reference ref_id="CVE-2016-6828" ref_url="https://www.suse.com/security/cve/CVE-2016-6828/" source="CVE"/>
		<reference ref_id="CVE-2016-7039" ref_url="https://www.suse.com/security/cve/CVE-2016-7039/" source="CVE"/>
		<reference ref_id="CVE-2016-7097" ref_url="https://www.suse.com/security/cve/CVE-2016-7097/" source="CVE"/>
		<reference ref_id="CVE-2016-8658" ref_url="https://www.suse.com/security/cve/CVE-2016-8658/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-default-4.4.21-69.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3939/">CVE-2009-3939</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4026/">CVE-2009-4026</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4027/">CVE-2009-4027</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4131/">CVE-2009-4131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4138/">CVE-2009-4138</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4536/">CVE-2009-4536</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4538/">CVE-2009-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1146/">CVE-2010-1146</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1436/">CVE-2010-1436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1641/">CVE-2010-1641</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-2066/">CVE-2010-2066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2942/">CVE-2010-2942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2954/">CVE-2010-2954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2955/">CVE-2010-2955</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3081/">CVE-2010-3081</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3296/">CVE-2010-3296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3297/">CVE-2010-3297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3298/">CVE-2010-3298</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3301/">CVE-2010-3301</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3310/">CVE-2010-3310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0712/">CVE-2011-0712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1020/">CVE-2011-1020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1577/">CVE-2011-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2203/">CVE-2011-2203</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0056/">CVE-2012-0056</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0160/">CVE-2013-0160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0231/">CVE-2013-0231</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0913/">CVE-2013-0913</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2850/">CVE-2013-2850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4312/">CVE-2013-4312</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0038/">CVE-2014-0038</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0196/">CVE-2014-0196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0691/">CVE-2014-0691</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-7833/">CVE-2015-7833</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7884/">CVE-2015-7884</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7885/">CVE-2015-7885</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8709/">CVE-2015-8709</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8812/">CVE-2015-8812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0617/">CVE-2016-0617</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0723/">CVE-2016-0723</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0728/">CVE-2016-0728</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0758/">CVE-2016-0758</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1237/">CVE-2016-1237</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1583/">CVE-2016-1583</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2143/">CVE-2016-2143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2184/">CVE-2016-2184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2185/">CVE-2016-2185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2186/">CVE-2016-2186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2188/">CVE-2016-2188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2383/">CVE-2016-2383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2384/">CVE-2016-2384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2847/">CVE-2016-2847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3134/">CVE-2016-3134</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3135/">CVE-2016-3135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3136/">CVE-2016-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3137/">CVE-2016-3137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3138/">CVE-2016-3138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3140/">CVE-2016-3140</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3156/">CVE-2016-3156</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3672/">CVE-2016-3672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3689/">CVE-2016-3689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3713/">CVE-2016-3713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3951/">CVE-2016-3951</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4470/">CVE-2016-4470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4482/">CVE-2016-4482</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4486/">CVE-2016-4486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4557/">CVE-2016-4557</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4558/">CVE-2016-4558</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4569/">CVE-2016-4569</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4578/">CVE-2016-4578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4794/">CVE-2016-4794</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4805/">CVE-2016-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4951/">CVE-2016-4951</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4997/">CVE-2016-4997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4998/">CVE-2016-4998</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5195/">CVE-2016-5195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5244/">CVE-2016-5244</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5412/">CVE-2016-5412</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5696/">CVE-2016-5696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5828/">CVE-2016-5828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5829/">CVE-2016-5829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6197/">CVE-2016-6197</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6480/">CVE-2016-6480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6828/">CVE-2016-6828</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7039/">CVE-2016-7039</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7097/">CVE-2016-7097</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8658/">CVE-2016-8658</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142128" comment="kernel-default-extra-4.4.21-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76263" version="1" class="patch">
	<metadata>
		<title>krb5-1.12.5-39.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2002-2443" ref_url="https://www.suse.com/security/cve/CVE-2002-2443/" source="CVE"/>
		<reference ref_id="CVE-2009-0844" ref_url="https://www.suse.com/security/cve/CVE-2009-0844/" source="CVE"/>
		<reference ref_id="CVE-2009-0845" ref_url="https://www.suse.com/security/cve/CVE-2009-0845/" source="CVE"/>
		<reference ref_id="CVE-2009-0846" ref_url="https://www.suse.com/security/cve/CVE-2009-0846/" source="CVE"/>
		<reference ref_id="CVE-2009-0847" ref_url="https://www.suse.com/security/cve/CVE-2009-0847/" source="CVE"/>
		<reference ref_id="CVE-2009-3295" ref_url="https://www.suse.com/security/cve/CVE-2009-3295/" source="CVE"/>
		<reference ref_id="CVE-2009-4212" ref_url="https://www.suse.com/security/cve/CVE-2009-4212/" source="CVE"/>
		<reference ref_id="CVE-2010-0283" ref_url="https://www.suse.com/security/cve/CVE-2010-0283/" source="CVE"/>
		<reference ref_id="CVE-2010-0628" ref_url="https://www.suse.com/security/cve/CVE-2010-0628/" source="CVE"/>
		<reference ref_id="CVE-2010-1320" ref_url="https://www.suse.com/security/cve/CVE-2010-1320/" source="CVE"/>
		<reference ref_id="CVE-2010-1321" ref_url="https://www.suse.com/security/cve/CVE-2010-1321/" source="CVE"/>
		<reference ref_id="CVE-2010-1322" ref_url="https://www.suse.com/security/cve/CVE-2010-1322/" source="CVE"/>
		<reference ref_id="CVE-2010-1323" ref_url="https://www.suse.com/security/cve/CVE-2010-1323/" source="CVE"/>
		<reference ref_id="CVE-2010-1324" ref_url="https://www.suse.com/security/cve/CVE-2010-1324/" source="CVE"/>
		<reference ref_id="CVE-2010-4020" ref_url="https://www.suse.com/security/cve/CVE-2010-4020/" source="CVE"/>
		<reference ref_id="CVE-2010-4021" ref_url="https://www.suse.com/security/cve/CVE-2010-4021/" source="CVE"/>
		<reference ref_id="CVE-2010-4022" ref_url="https://www.suse.com/security/cve/CVE-2010-4022/" source="CVE"/>
		<reference ref_id="CVE-2011-0281" ref_url="https://www.suse.com/security/cve/CVE-2011-0281/" source="CVE"/>
		<reference ref_id="CVE-2011-0282" ref_url="https://www.suse.com/security/cve/CVE-2011-0282/" source="CVE"/>
		<reference ref_id="CVE-2011-0284" ref_url="https://www.suse.com/security/cve/CVE-2011-0284/" source="CVE"/>
		<reference ref_id="CVE-2011-0285" ref_url="https://www.suse.com/security/cve/CVE-2011-0285/" source="CVE"/>
		<reference ref_id="CVE-2011-1527" ref_url="https://www.suse.com/security/cve/CVE-2011-1527/" source="CVE"/>
		<reference ref_id="CVE-2011-1528" ref_url="https://www.suse.com/security/cve/CVE-2011-1528/" source="CVE"/>
		<reference ref_id="CVE-2011-1529" ref_url="https://www.suse.com/security/cve/CVE-2011-1529/" source="CVE"/>
		<reference ref_id="CVE-2011-1530" ref_url="https://www.suse.com/security/cve/CVE-2011-1530/" source="CVE"/>
		<reference ref_id="CVE-2012-1012" ref_url="https://www.suse.com/security/cve/CVE-2012-1012/" source="CVE"/>
		<reference ref_id="CVE-2012-1013" ref_url="https://www.suse.com/security/cve/CVE-2012-1013/" source="CVE"/>
		<reference ref_id="CVE-2012-1016" ref_url="https://www.suse.com/security/cve/CVE-2012-1016/" source="CVE"/>
		<reference ref_id="CVE-2013-1415" ref_url="https://www.suse.com/security/cve/CVE-2013-1415/" source="CVE"/>
		<reference ref_id="CVE-2013-1417" ref_url="https://www.suse.com/security/cve/CVE-2013-1417/" source="CVE"/>
		<reference ref_id="CVE-2013-1418" ref_url="https://www.suse.com/security/cve/CVE-2013-1418/" source="CVE"/>
		<reference ref_id="CVE-2014-4341" ref_url="https://www.suse.com/security/cve/CVE-2014-4341/" source="CVE"/>
		<reference ref_id="CVE-2014-4342" ref_url="https://www.suse.com/security/cve/CVE-2014-4342/" source="CVE"/>
		<reference ref_id="CVE-2014-4343" ref_url="https://www.suse.com/security/cve/CVE-2014-4343/" source="CVE"/>
		<reference ref_id="CVE-2014-4344" ref_url="https://www.suse.com/security/cve/CVE-2014-4344/" source="CVE"/>
		<reference ref_id="CVE-2014-4345" ref_url="https://www.suse.com/security/cve/CVE-2014-4345/" source="CVE"/>
		<reference ref_id="CVE-2014-5351" ref_url="https://www.suse.com/security/cve/CVE-2014-5351/" source="CVE"/>
		<reference ref_id="CVE-2014-5352" ref_url="https://www.suse.com/security/cve/CVE-2014-5352/" source="CVE"/>
		<reference ref_id="CVE-2014-5353" ref_url="https://www.suse.com/security/cve/CVE-2014-5353/" source="CVE"/>
		<reference ref_id="CVE-2014-5354" ref_url="https://www.suse.com/security/cve/CVE-2014-5354/" source="CVE"/>
		<reference ref_id="CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355/" source="CVE"/>
		<reference ref_id="CVE-2014-9421" ref_url="https://www.suse.com/security/cve/CVE-2014-9421/" source="CVE"/>
		<reference ref_id="CVE-2014-9422" ref_url="https://www.suse.com/security/cve/CVE-2014-9422/" source="CVE"/>
		<reference ref_id="CVE-2014-9423" ref_url="https://www.suse.com/security/cve/CVE-2014-9423/" source="CVE"/>
		<reference ref_id="CVE-2015-2694" ref_url="https://www.suse.com/security/cve/CVE-2015-2694/" source="CVE"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="CVE-2015-2696" ref_url="https://www.suse.com/security/cve/CVE-2015-2696/" source="CVE"/>
		<reference ref_id="CVE-2015-2697" ref_url="https://www.suse.com/security/cve/CVE-2015-2697/" source="CVE"/>
		<reference ref_id="CVE-2015-2698" ref_url="https://www.suse.com/security/cve/CVE-2015-2698/" source="CVE"/>
		<reference ref_id="CVE-2015-8629" ref_url="https://www.suse.com/security/cve/CVE-2015-8629/" source="CVE"/>
		<reference ref_id="CVE-2015-8630" ref_url="https://www.suse.com/security/cve/CVE-2015-8630/" source="CVE"/>
		<reference ref_id="CVE-2015-8631" ref_url="https://www.suse.com/security/cve/CVE-2015-8631/" source="CVE"/>
		<reference ref_id="CVE-2016-3119" ref_url="https://www.suse.com/security/cve/CVE-2016-3119/" source="CVE"/>
		<reference ref_id="CVE-2016-3120" ref_url="https://www.suse.com/security/cve/CVE-2016-3120/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-1.12.5-39.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2002-2443/">CVE-2002-2443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0844/">CVE-2009-0844</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0845/">CVE-2009-0845</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0846/">CVE-2009-0846</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0847/">CVE-2009-0847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3295/">CVE-2009-3295</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-4212/">CVE-2009-4212</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0283/">CVE-2010-0283</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0628/">CVE-2010-0628</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1320/">CVE-2010-1320</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1321/">CVE-2010-1321</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1322/">CVE-2010-1322</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1323/">CVE-2010-1323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1324/">CVE-2010-1324</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4020/">CVE-2010-4020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4021/">CVE-2010-4021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4022/">CVE-2010-4022</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0281/">CVE-2011-0281</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0282/">CVE-2011-0282</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0284/">CVE-2011-0284</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0285/">CVE-2011-0285</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1527/">CVE-2011-1527</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1528/">CVE-2011-1528</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1529/">CVE-2011-1529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1530/">CVE-2011-1530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1012/">CVE-2012-1012</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1013/">CVE-2012-1013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1016/">CVE-2012-1016</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1415/">CVE-2013-1415</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1417/">CVE-2013-1417</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1418/">CVE-2013-1418</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4341/">CVE-2014-4341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4342/">CVE-2014-4342</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4343/">CVE-2014-4343</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4344/">CVE-2014-4344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4345/">CVE-2014-4345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5351/">CVE-2014-5351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5352/">CVE-2014-5352</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5353/">CVE-2014-5353</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5354/">CVE-2014-5354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9421/">CVE-2014-9421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9422/">CVE-2014-9422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9423/">CVE-2014-9423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2694/">CVE-2015-2694</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2696/">CVE-2015-2696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2697/">CVE-2015-2697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2698/">CVE-2015-2698</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8629/">CVE-2015-8629</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8630/">CVE-2015-8630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8631/">CVE-2015-8631</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3119/">CVE-2016-3119</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3120/">CVE-2016-3120</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76264" version="1" class="patch">
	<metadata>
		<title>krb5-appl-clients-1.0.3-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1526" ref_url="https://www.suse.com/security/cve/CVE-2011-1526/" source="CVE"/>
		<reference ref_id="CVE-2011-4862" ref_url="https://www.suse.com/security/cve/CVE-2011-4862/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-appl-clients-1.0.3-1.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1526/">CVE-2011-1526</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4862/">CVE-2011-4862</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140711" comment="krb5-appl-clients-1.0.3-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76265" version="1" class="patch">
	<metadata>
		<title>lcms-1.19-17.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0793" ref_url="https://www.suse.com/security/cve/CVE-2009-0793/" source="CVE"/>
		<reference ref_id="CVE-2013-4276" ref_url="https://www.suse.com/security/cve/CVE-2013-4276/" source="CVE"/>
		<description>
These are all security issues fixed in the lcms-1.19-17.31 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0793/">CVE-2009-0793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4276/">CVE-2013-4276</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141435" comment="lcms-1.19-17.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140713" comment="liblcms1-1.19-17.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140714" comment="liblcms1-32bit-1.19-17.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76266" version="1" class="patch">
	<metadata>
		<title>lhasa-0.2.0-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2016-2347" ref_url="https://www.suse.com/security/cve/CVE-2016-2347/" source="CVE"/>
		<description>
These are all security issues fixed in the lhasa-0.2.0-5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2347/">CVE-2016-2347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009126431" comment="lhasa-0.2.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009126432" comment="liblhasa0-0.2.0-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76267" version="1" class="patch">
	<metadata>
		<title>libFLAC++6-1.3.0-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-8962" ref_url="https://www.suse.com/security/cve/CVE-2014-8962/" source="CVE"/>
		<reference ref_id="CVE-2014-9028" ref_url="https://www.suse.com/security/cve/CVE-2014-9028/" source="CVE"/>
		<description>
These are all security issues fixed in the libFLAC++6-1.3.0-11.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8962/">CVE-2014-8962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9028/">CVE-2014-9028</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140571" comment="libFLAC++6-1.3.0-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142129" comment="libFLAC++6-32bit-1.3.0-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140572" comment="libFLAC8-1.3.0-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140573" comment="libFLAC8-32bit-1.3.0-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76268" version="1" class="patch">
	<metadata>
		<title>libHX28-3.18-1.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2947" ref_url="https://www.suse.com/security/cve/CVE-2010-2947/" source="CVE"/>
		<description>
These are all security issues fixed in the libHX28-3.18-1.19 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2947/">CVE-2010-2947</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140717" comment="libHX28-3.18-1.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140718" comment="libHX28-32bit-3.18-1.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76269" version="1" class="patch">
	<metadata>
		<title>libIlmImf-Imf_2_1-21-2.1.0-4.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-1720" ref_url="https://www.suse.com/security/cve/CVE-2009-1720/" source="CVE"/>
		<reference ref_id="CVE-2009-1721" ref_url="https://www.suse.com/security/cve/CVE-2009-1721/" source="CVE"/>
		<description>
These are all security issues fixed in the libIlmImf-Imf_2_1-21-2.1.0-4.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1720/">CVE-2009-1720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1721/">CVE-2009-1721</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140719" comment="libIlmImf-Imf_2_1-21-2.1.0-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141436" comment="libIlmImf-Imf_2_1-21-32bit-2.1.0-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140720" comment="openexr-2.1.0-4.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76270" version="1" class="patch">
	<metadata>
		<title>libQt5Concurrent5-5.6.1-11.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-0295" ref_url="https://www.suse.com/security/cve/CVE-2015-0295/" source="CVE"/>
		<reference ref_id="CVE-2015-1858" ref_url="https://www.suse.com/security/cve/CVE-2015-1858/" source="CVE"/>
		<reference ref_id="CVE-2015-1859" ref_url="https://www.suse.com/security/cve/CVE-2015-1859/" source="CVE"/>
		<reference ref_id="CVE-2015-1860" ref_url="https://www.suse.com/security/cve/CVE-2015-1860/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Concurrent5-5.6.1-11.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0295/">CVE-2015-0295</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1858/">CVE-2015-1858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1859/">CVE-2015-1859</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1860/">CVE-2015-1860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140721" comment="libQt5Concurrent5-5.6.1-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140722" comment="libQt5Core5-5.6.1-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140723" comment="libQt5DBus5-5.6.1-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140724" comment="libQt5Gui5-5.6.1-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140725" comment="libQt5Network5-5.6.1-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140726" comment="libQt5OpenGL5-5.6.1-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140727" comment="libQt5PrintSupport5-5.6.1-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140728" comment="libQt5Sql5-5.6.1-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140729" comment="libQt5Sql5-mysql-5.6.1-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140730" comment="libQt5Sql5-postgresql-5.6.1-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140731" comment="libQt5Sql5-sqlite-5.6.1-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140732" comment="libQt5Sql5-unixODBC-5.6.1-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140733" comment="libQt5Test5-5.6.1-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140734" comment="libQt5Widgets5-5.6.1-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140735" comment="libQt5Xml5-5.6.1-11.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76271" version="1" class="patch">
	<metadata>
		<title>libQt5WebKit5-5.6.1-9.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-8079" ref_url="https://www.suse.com/security/cve/CVE-2015-8079/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5WebKit5-5.6.1-9.4 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8079/">CVE-2015-8079</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140736" comment="libQt5WebKit5-5.6.1-9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140737" comment="libQt5WebKit5-imports-5.6.1-9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140738" comment="libQt5WebKitWidgets5-5.6.1-9.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76272" version="1" class="patch">
	<metadata>
		<title>libX11-6-1.6.2-4.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-1981" ref_url="https://www.suse.com/security/cve/CVE-2013-1981/" source="CVE"/>
		<reference ref_id="CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997/" source="CVE"/>
		<reference ref_id="CVE-2013-2004" ref_url="https://www.suse.com/security/cve/CVE-2013-2004/" source="CVE"/>
		<description>
These are all security issues fixed in the libX11-6-1.6.2-4.12 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1981/">CVE-2013-1981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2004/">CVE-2013-2004</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140739" comment="libX11-6-1.6.2-4.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140740" comment="libX11-6-32bit-1.6.2-4.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140741" comment="libX11-data-1.6.2-4.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140742" comment="libX11-xcb1-1.6.2-4.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140743" comment="libX11-xcb1-32bit-1.6.2-4.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76273" version="1" class="patch">
	<metadata>
		<title>libXRes1-1.0.7-3.54 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-1988" ref_url="https://www.suse.com/security/cve/CVE-2013-1988/" source="CVE"/>
		<description>
These are all security issues fixed in the libXRes1-1.0.7-3.54 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1988/">CVE-2013-1988</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140744" comment="libXRes1-1.0.7-3.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140745" comment="libXRes1-32bit-1.0.7-3.54 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76274" version="1" class="patch">
	<metadata>
		<title>libXcursor1-1.1.14-3.60 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-2003" ref_url="https://www.suse.com/security/cve/CVE-2013-2003/" source="CVE"/>
		<description>
These are all security issues fixed in the libXcursor1-1.1.14-3.60 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2003/">CVE-2013-2003</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140746" comment="libXcursor1-1.1.14-3.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140747" comment="libXcursor1-32bit-1.1.14-3.60 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76275" version="1" class="patch">
	<metadata>
		<title>libXext6-1.3.2-3.61 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-1982" ref_url="https://www.suse.com/security/cve/CVE-2013-1982/" source="CVE"/>
		<description>
These are all security issues fixed in the libXext6-1.3.2-3.61 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1982/">CVE-2013-1982</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140748" comment="libXext6-1.3.2-3.61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140749" comment="libXext6-32bit-1.3.2-3.61 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76276" version="1" class="patch">
	<metadata>
		<title>libXfixes3-32bit-5.0.1-3.53 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-1983" ref_url="https://www.suse.com/security/cve/CVE-2013-1983/" source="CVE"/>
		<description>
These are all security issues fixed in the libXfixes3-32bit-5.0.1-3.53 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1983/">CVE-2013-1983</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140750" comment="libXfixes3-5.0.1-3.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140751" comment="libXfixes3-32bit-5.0.1-3.53 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76277" version="1" class="patch">
	<metadata>
		<title>libXfont1-1.5.1-10.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<reference ref_id="CVE-2013-6462" ref_url="https://www.suse.com/security/cve/CVE-2013-6462/" source="CVE"/>
		<reference ref_id="CVE-2014-0209" ref_url="https://www.suse.com/security/cve/CVE-2014-0209/" source="CVE"/>
		<reference ref_id="CVE-2014-0210" ref_url="https://www.suse.com/security/cve/CVE-2014-0210/" source="CVE"/>
		<reference ref_id="CVE-2014-0211" ref_url="https://www.suse.com/security/cve/CVE-2014-0211/" source="CVE"/>
		<reference ref_id="CVE-2015-1802" ref_url="https://www.suse.com/security/cve/CVE-2015-1802/" source="CVE"/>
		<reference ref_id="CVE-2015-1803" ref_url="https://www.suse.com/security/cve/CVE-2015-1803/" source="CVE"/>
		<reference ref_id="CVE-2015-1804" ref_url="https://www.suse.com/security/cve/CVE-2015-1804/" source="CVE"/>
		<description>
These are all security issues fixed in the libXfont1-1.5.1-10.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6462/">CVE-2013-6462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0209/">CVE-2014-0209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0210/">CVE-2014-0210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0211/">CVE-2014-0211</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1802/">CVE-2015-1802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1803/">CVE-2015-1803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1804/">CVE-2015-1804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140752" comment="libXfont1-1.5.1-10.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76278" version="1" class="patch">
	<metadata>
		<title>libXi6-1.7.4-9.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-1984" ref_url="https://www.suse.com/security/cve/CVE-2013-1984/" source="CVE"/>
		<reference ref_id="CVE-2013-1995" ref_url="https://www.suse.com/security/cve/CVE-2013-1995/" source="CVE"/>
		<reference ref_id="CVE-2013-1998" ref_url="https://www.suse.com/security/cve/CVE-2013-1998/" source="CVE"/>
		<description>
These are all security issues fixed in the libXi6-1.7.4-9.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1984/">CVE-2013-1984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1995/">CVE-2013-1995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1998/">CVE-2013-1998</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140753" comment="libXi6-1.7.4-9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140754" comment="libXi6-32bit-1.7.4-9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76279" version="1" class="patch">
	<metadata>
		<title>libXinerama1-1.1.3-3.55 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-1985" ref_url="https://www.suse.com/security/cve/CVE-2013-1985/" source="CVE"/>
		<description>
These are all security issues fixed in the libXinerama1-1.1.3-3.55 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1985/">CVE-2013-1985</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140755" comment="libXinerama1-1.1.3-3.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140756" comment="libXinerama1-32bit-1.1.3-3.55 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76280" version="1" class="patch">
	<metadata>
		<title>libXp6-1.0.2-3.58 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-2062" ref_url="https://www.suse.com/security/cve/CVE-2013-2062/" source="CVE"/>
		<description>
These are all security issues fixed in the libXp6-1.0.2-3.58 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2062/">CVE-2013-2062</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140757" comment="libXp6-1.0.2-3.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140758" comment="libXp6-32bit-1.0.2-3.58 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76281" version="1" class="patch">
	<metadata>
		<title>libXrandr2-1.5.0-6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-1986" ref_url="https://www.suse.com/security/cve/CVE-2013-1986/" source="CVE"/>
		<reference ref_id="CVE-2016-7947" ref_url="https://www.suse.com/security/cve/CVE-2016-7947/" source="CVE"/>
		<reference ref_id="CVE-2016-7948" ref_url="https://www.suse.com/security/cve/CVE-2016-7948/" source="CVE"/>
		<description>
These are all security issues fixed in the libXrandr2-1.5.0-6.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1986/">CVE-2013-1986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7947/">CVE-2016-7947</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7948/">CVE-2016-7948</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140759" comment="libXrandr2-1.5.0-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140760" comment="libXrandr2-32bit-1.5.0-6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76282" version="1" class="patch">
	<metadata>
		<title>libXrender1-0.9.8-3.56 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-1987" ref_url="https://www.suse.com/security/cve/CVE-2013-1987/" source="CVE"/>
		<description>
These are all security issues fixed in the libXrender1-0.9.8-3.56 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1987/">CVE-2013-1987</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140761" comment="libXrender1-0.9.8-3.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140762" comment="libXrender1-32bit-0.9.8-3.56 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76283" version="1" class="patch">
	<metadata>
		<title>libXt6-1.1.4-3.59 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-2002" ref_url="https://www.suse.com/security/cve/CVE-2013-2002/" source="CVE"/>
		<reference ref_id="CVE-2013-2005" ref_url="https://www.suse.com/security/cve/CVE-2013-2005/" source="CVE"/>
		<description>
These are all security issues fixed in the libXt6-1.1.4-3.59 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2002/">CVE-2013-2002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2005/">CVE-2013-2005</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140763" comment="libXt6-1.1.4-3.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140764" comment="libXt6-32bit-1.1.4-3.59 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76284" version="1" class="patch">
	<metadata>
		<title>libXtst6-1.2.2-3.60 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-2063" ref_url="https://www.suse.com/security/cve/CVE-2013-2063/" source="CVE"/>
		<description>
These are all security issues fixed in the libXtst6-1.2.2-3.60 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2063/">CVE-2013-2063</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140765" comment="libXtst6-1.2.2-3.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140766" comment="libXtst6-32bit-1.2.2-3.60 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76285" version="1" class="patch">
	<metadata>
		<title>libXv1-1.0.10-3.57 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-1989" ref_url="https://www.suse.com/security/cve/CVE-2013-1989/" source="CVE"/>
		<reference ref_id="CVE-2013-2066" ref_url="https://www.suse.com/security/cve/CVE-2013-2066/" source="CVE"/>
		<description>
These are all security issues fixed in the libXv1-1.0.10-3.57 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1989/">CVE-2013-1989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2066/">CVE-2013-2066</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140767" comment="libXv1-1.0.10-3.57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140768" comment="libXv1-32bit-1.0.10-3.57 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76286" version="1" class="patch">
	<metadata>
		<title>libXvMC1-1.0.8-3.57 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-1990" ref_url="https://www.suse.com/security/cve/CVE-2013-1990/" source="CVE"/>
		<reference ref_id="CVE-2013-1999" ref_url="https://www.suse.com/security/cve/CVE-2013-1999/" source="CVE"/>
		<description>
These are all security issues fixed in the libXvMC1-1.0.8-3.57 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1990/">CVE-2013-1990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1999/">CVE-2013-1999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140769" comment="libXvMC1-1.0.8-3.57 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76287" version="1" class="patch">
	<metadata>
		<title>libXvnc1-1.6.0-12.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-0011" ref_url="https://www.suse.com/security/cve/CVE-2014-0011/" source="CVE"/>
		<reference ref_id="CVE-2014-8240" ref_url="https://www.suse.com/security/cve/CVE-2014-8240/" source="CVE"/>
		<reference ref_id="CVE-2015-0255" ref_url="https://www.suse.com/security/cve/CVE-2015-0255/" source="CVE"/>
		<description>
These are all security issues fixed in the libXvnc1-1.6.0-12.6 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0011/">CVE-2014-0011</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8240/">CVE-2014-8240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0255/">CVE-2015-0255</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140770" comment="libXvnc1-1.6.0-12.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140771" comment="tigervnc-1.6.0-12.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140772" comment="xorg-x11-Xvnc-1.6.0-12.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76288" version="1" class="patch">
	<metadata>
		<title>libXxf86dga1-1.1.4-3.59 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-1991" ref_url="https://www.suse.com/security/cve/CVE-2013-1991/" source="CVE"/>
		<reference ref_id="CVE-2013-2000" ref_url="https://www.suse.com/security/cve/CVE-2013-2000/" source="CVE"/>
		<description>
These are all security issues fixed in the libXxf86dga1-1.1.4-3.59 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1991/">CVE-2013-1991</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2000/">CVE-2013-2000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140773" comment="libXxf86dga1-1.1.4-3.59 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76289" version="1" class="patch">
	<metadata>
		<title>libXxf86vm1-1.1.3-3.54 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-2001" ref_url="https://www.suse.com/security/cve/CVE-2013-2001/" source="CVE"/>
		<description>
These are all security issues fixed in the libXxf86vm1-1.1.3-3.54 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2001/">CVE-2013-2001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140774" comment="libXxf86vm1-1.1.3-3.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140775" comment="libXxf86vm1-32bit-1.1.3-3.54 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76290" version="1" class="patch">
	<metadata>
		<title>libarchive13-3.1.2-22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-0211" ref_url="https://www.suse.com/security/cve/CVE-2013-0211/" source="CVE"/>
		<reference ref_id="CVE-2015-2304" ref_url="https://www.suse.com/security/cve/CVE-2015-2304/" source="CVE"/>
		<reference ref_id="CVE-2015-8918" ref_url="https://www.suse.com/security/cve/CVE-2015-8918/" source="CVE"/>
		<reference ref_id="CVE-2015-8919" ref_url="https://www.suse.com/security/cve/CVE-2015-8919/" source="CVE"/>
		<reference ref_id="CVE-2015-8920" ref_url="https://www.suse.com/security/cve/CVE-2015-8920/" source="CVE"/>
		<reference ref_id="CVE-2015-8921" ref_url="https://www.suse.com/security/cve/CVE-2015-8921/" source="CVE"/>
		<reference ref_id="CVE-2015-8922" ref_url="https://www.suse.com/security/cve/CVE-2015-8922/" source="CVE"/>
		<reference ref_id="CVE-2015-8923" ref_url="https://www.suse.com/security/cve/CVE-2015-8923/" source="CVE"/>
		<reference ref_id="CVE-2015-8924" ref_url="https://www.suse.com/security/cve/CVE-2015-8924/" source="CVE"/>
		<reference ref_id="CVE-2015-8925" ref_url="https://www.suse.com/security/cve/CVE-2015-8925/" source="CVE"/>
		<reference ref_id="CVE-2015-8926" ref_url="https://www.suse.com/security/cve/CVE-2015-8926/" source="CVE"/>
		<reference ref_id="CVE-2015-8928" ref_url="https://www.suse.com/security/cve/CVE-2015-8928/" source="CVE"/>
		<reference ref_id="CVE-2015-8929" ref_url="https://www.suse.com/security/cve/CVE-2015-8929/" source="CVE"/>
		<reference ref_id="CVE-2015-8930" ref_url="https://www.suse.com/security/cve/CVE-2015-8930/" source="CVE"/>
		<reference ref_id="CVE-2015-8931" ref_url="https://www.suse.com/security/cve/CVE-2015-8931/" source="CVE"/>
		<reference ref_id="CVE-2015-8932" ref_url="https://www.suse.com/security/cve/CVE-2015-8932/" source="CVE"/>
		<reference ref_id="CVE-2015-8933" ref_url="https://www.suse.com/security/cve/CVE-2015-8933/" source="CVE"/>
		<reference ref_id="CVE-2015-8934" ref_url="https://www.suse.com/security/cve/CVE-2015-8934/" source="CVE"/>
		<reference ref_id="CVE-2016-1541" ref_url="https://www.suse.com/security/cve/CVE-2016-1541/" source="CVE"/>
		<reference ref_id="CVE-2016-4300" ref_url="https://www.suse.com/security/cve/CVE-2016-4300/" source="CVE"/>
		<reference ref_id="CVE-2016-4301" ref_url="https://www.suse.com/security/cve/CVE-2016-4301/" source="CVE"/>
		<reference ref_id="CVE-2016-4302" ref_url="https://www.suse.com/security/cve/CVE-2016-4302/" source="CVE"/>
		<reference ref_id="CVE-2016-4809" ref_url="https://www.suse.com/security/cve/CVE-2016-4809/" source="CVE"/>
		<description>
These are all security issues fixed in the libarchive13-3.1.2-22.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0211/">CVE-2013-0211</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2304/">CVE-2015-2304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8918/">CVE-2015-8918</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8919/">CVE-2015-8919</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8920/">CVE-2015-8920</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8921/">CVE-2015-8921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8922/">CVE-2015-8922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8923/">CVE-2015-8923</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8924/">CVE-2015-8924</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8925/">CVE-2015-8925</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8926/">CVE-2015-8926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8928/">CVE-2015-8928</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8929/">CVE-2015-8929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8930/">CVE-2015-8930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8931/">CVE-2015-8931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8932/">CVE-2015-8932</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8933/">CVE-2015-8933</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8934/">CVE-2015-8934</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1541/">CVE-2016-1541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4300/">CVE-2016-4300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4301/">CVE-2016-4301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4302/">CVE-2016-4302</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4809/">CVE-2016-4809</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76291" version="1" class="patch">
	<metadata>
		<title>libasan2-32bit-5.3.1+r233831-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<description>
These are all security issues fixed in the libasan2-32bit-5.3.1+r233831-9.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009125716" comment="libasan2-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125717" comment="libasan2-32bit-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125723" comment="libffi4-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125724" comment="libffi4-32bit-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125734" comment="libmpx0-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125735" comment="libmpx0-32bit-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125736" comment="libmpxwrappers0-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125737" comment="libmpxwrappers0-32bit-5.3.1+r233831-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76292" version="1" class="patch">
	<metadata>
		<title>libblkid1-2.28-40.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-0157" ref_url="https://www.suse.com/security/cve/CVE-2013-0157/" source="CVE"/>
		<reference ref_id="CVE-2014-9114" ref_url="https://www.suse.com/security/cve/CVE-2014-9114/" source="CVE"/>
		<reference ref_id="CVE-2015-5218" ref_url="https://www.suse.com/security/cve/CVE-2015-5218/" source="CVE"/>
		<reference ref_id="CVE-2016-5011" ref_url="https://www.suse.com/security/cve/CVE-2016-5011/" source="CVE"/>
		<description>
These are all security issues fixed in the libblkid1-2.28-40.28 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0157/">CVE-2013-0157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9114/">CVE-2014-9114</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5218/">CVE-2015-5218</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5011/">CVE-2016-5011</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140779" comment="libblkid1-2.28-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140780" comment="libblkid1-32bit-2.28-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140781" comment="libfdisk1-2.28-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140782" comment="libmount1-2.28-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140783" comment="libmount1-32bit-2.28-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140784" comment="libsmartcols1-2.28-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142130" comment="libuuid-devel-2.28-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140785" comment="libuuid1-2.28-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140786" comment="libuuid1-32bit-2.28-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140787" comment="python-libmount-2.28-40.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140788" comment="util-linux-2.28-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140789" comment="util-linux-lang-2.28-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140790" comment="util-linux-systemd-2.28-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140791" comment="uuidd-2.28-40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76293" version="1" class="patch">
	<metadata>
		<title>libcgroup1-0.41.rc1-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1006" ref_url="https://www.suse.com/security/cve/CVE-2011-1006/" source="CVE"/>
		<reference ref_id="CVE-2011-1022" ref_url="https://www.suse.com/security/cve/CVE-2011-1022/" source="CVE"/>
		<description>
These are all security issues fixed in the libcgroup1-0.41.rc1-4.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1006/">CVE-2011-1006</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1022/">CVE-2011-1022</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140793" comment="libcgroup1-0.41.rc1-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76294" version="1" class="patch">
	<metadata>
		<title>libdcerpc-atsvc0-4.2.4-26.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2010-0926" ref_url="https://www.suse.com/security/cve/CVE-2010-0926/" source="CVE"/>
		<reference ref_id="CVE-2010-1635" ref_url="https://www.suse.com/security/cve/CVE-2010-1635/" source="CVE"/>
		<reference ref_id="CVE-2010-1642" ref_url="https://www.suse.com/security/cve/CVE-2010-1642/" source="CVE"/>
		<reference ref_id="CVE-2010-2063" ref_url="https://www.suse.com/security/cve/CVE-2010-2063/" source="CVE"/>
		<reference ref_id="CVE-2010-3069" ref_url="https://www.suse.com/security/cve/CVE-2010-3069/" source="CVE"/>
		<reference ref_id="CVE-2011-0719" ref_url="https://www.suse.com/security/cve/CVE-2011-0719/" source="CVE"/>
		<reference ref_id="CVE-2011-2522" ref_url="https://www.suse.com/security/cve/CVE-2011-2522/" source="CVE"/>
		<reference ref_id="CVE-2011-2694" ref_url="https://www.suse.com/security/cve/CVE-2011-2694/" source="CVE"/>
		<reference ref_id="CVE-2012-0817" ref_url="https://www.suse.com/security/cve/CVE-2012-0817/" source="CVE"/>
		<reference ref_id="CVE-2012-0870" ref_url="https://www.suse.com/security/cve/CVE-2012-0870/" source="CVE"/>
		<reference ref_id="CVE-2012-1182" ref_url="https://www.suse.com/security/cve/CVE-2012-1182/" source="CVE"/>
		<reference ref_id="CVE-2012-2111" ref_url="https://www.suse.com/security/cve/CVE-2012-2111/" source="CVE"/>
		<reference ref_id="CVE-2012-6150" ref_url="https://www.suse.com/security/cve/CVE-2012-6150/" source="CVE"/>
		<reference ref_id="CVE-2013-0172" ref_url="https://www.suse.com/security/cve/CVE-2013-0172/" source="CVE"/>
		<reference ref_id="CVE-2013-0213" ref_url="https://www.suse.com/security/cve/CVE-2013-0213/" source="CVE"/>
		<reference ref_id="CVE-2013-0214" ref_url="https://www.suse.com/security/cve/CVE-2013-0214/" source="CVE"/>
		<reference ref_id="CVE-2013-0454" ref_url="https://www.suse.com/security/cve/CVE-2013-0454/" source="CVE"/>
		<reference ref_id="CVE-2013-1863" ref_url="https://www.suse.com/security/cve/CVE-2013-1863/" source="CVE"/>
		<reference ref_id="CVE-2013-4124" ref_url="https://www.suse.com/security/cve/CVE-2013-4124/" source="CVE"/>
		<reference ref_id="CVE-2013-4408" ref_url="https://www.suse.com/security/cve/CVE-2013-4408/" source="CVE"/>
		<reference ref_id="CVE-2013-4475" ref_url="https://www.suse.com/security/cve/CVE-2013-4475/" source="CVE"/>
		<reference ref_id="CVE-2013-4476" ref_url="https://www.suse.com/security/cve/CVE-2013-4476/" source="CVE"/>
		<reference ref_id="CVE-2013-4496" ref_url="https://www.suse.com/security/cve/CVE-2013-4496/" source="CVE"/>
		<reference ref_id="CVE-2013-6442" ref_url="https://www.suse.com/security/cve/CVE-2013-6442/" source="CVE"/>
		<reference ref_id="CVE-2014-0178" ref_url="https://www.suse.com/security/cve/CVE-2014-0178/" source="CVE"/>
		<reference ref_id="CVE-2014-0239" ref_url="https://www.suse.com/security/cve/CVE-2014-0239/" source="CVE"/>
		<reference ref_id="CVE-2014-0244" ref_url="https://www.suse.com/security/cve/CVE-2014-0244/" source="CVE"/>
		<reference ref_id="CVE-2014-3493" ref_url="https://www.suse.com/security/cve/CVE-2014-3493/" source="CVE"/>
		<reference ref_id="CVE-2014-3560" ref_url="https://www.suse.com/security/cve/CVE-2014-3560/" source="CVE"/>
		<reference ref_id="CVE-2014-8143" ref_url="https://www.suse.com/security/cve/CVE-2014-8143/" source="CVE"/>
		<reference ref_id="CVE-2015-0240" ref_url="https://www.suse.com/security/cve/CVE-2015-0240/" source="CVE"/>
		<reference ref_id="CVE-2015-3223" ref_url="https://www.suse.com/security/cve/CVE-2015-3223/" source="CVE"/>
		<reference ref_id="CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252/" source="CVE"/>
		<reference ref_id="CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296/" source="CVE"/>
		<reference ref_id="CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<reference ref_id="CVE-2015-5370" ref_url="https://www.suse.com/security/cve/CVE-2015-5370/" source="CVE"/>
		<reference ref_id="CVE-2015-7560" ref_url="https://www.suse.com/security/cve/CVE-2015-7560/" source="CVE"/>
		<reference ref_id="CVE-2015-8467" ref_url="https://www.suse.com/security/cve/CVE-2015-8467/" source="CVE"/>
		<reference ref_id="CVE-2016-2110" ref_url="https://www.suse.com/security/cve/CVE-2016-2110/" source="CVE"/>
		<reference ref_id="CVE-2016-2111" ref_url="https://www.suse.com/security/cve/CVE-2016-2111/" source="CVE"/>
		<reference ref_id="CVE-2016-2112" ref_url="https://www.suse.com/security/cve/CVE-2016-2112/" source="CVE"/>
		<reference ref_id="CVE-2016-2113" ref_url="https://www.suse.com/security/cve/CVE-2016-2113/" source="CVE"/>
		<reference ref_id="CVE-2016-2115" ref_url="https://www.suse.com/security/cve/CVE-2016-2115/" source="CVE"/>
		<reference ref_id="CVE-2016-2118" ref_url="https://www.suse.com/security/cve/CVE-2016-2118/" source="CVE"/>
		<reference ref_id="CVE-2016-2119" ref_url="https://www.suse.com/security/cve/CVE-2016-2119/" source="CVE"/>
		<description>
These are all security issues fixed in the libdcerpc-atsvc0-4.2.4-26.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0926/">CVE-2010-0926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1635/">CVE-2010-1635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1642/">CVE-2010-1642</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2063/">CVE-2010-2063</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3069/">CVE-2010-3069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0719/">CVE-2011-0719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2522/">CVE-2011-2522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2694/">CVE-2011-2694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0817/">CVE-2012-0817</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0870/">CVE-2012-0870</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1182/">CVE-2012-1182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2111/">CVE-2012-2111</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-6150/">CVE-2012-6150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0172/">CVE-2013-0172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0213/">CVE-2013-0213</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0214/">CVE-2013-0214</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0454/">CVE-2013-0454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1863/">CVE-2013-1863</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4124/">CVE-2013-4124</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4408/">CVE-2013-4408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4475/">CVE-2013-4475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4476/">CVE-2013-4476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4496/">CVE-2013-4496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6442/">CVE-2013-6442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0178/">CVE-2014-0178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0239/">CVE-2014-0239</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0244/">CVE-2014-0244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3493/">CVE-2014-3493</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3560/">CVE-2014-3560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8143/">CVE-2014-8143</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0240/">CVE-2015-0240</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3223/">CVE-2015-3223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5370/">CVE-2015-5370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7560/">CVE-2015-7560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8467/">CVE-2015-8467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2110/">CVE-2016-2110</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2111/">CVE-2016-2111</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2112/">CVE-2016-2112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2113/">CVE-2016-2113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2115/">CVE-2016-2115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2118/">CVE-2016-2118</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2119/">CVE-2016-2119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76295" version="1" class="patch">
	<metadata>
		<title>libdcerpc-binding0-32bit-4.4.2-29.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2010-0926" ref_url="https://www.suse.com/security/cve/CVE-2010-0926/" source="CVE"/>
		<reference ref_id="CVE-2010-1635" ref_url="https://www.suse.com/security/cve/CVE-2010-1635/" source="CVE"/>
		<reference ref_id="CVE-2010-1642" ref_url="https://www.suse.com/security/cve/CVE-2010-1642/" source="CVE"/>
		<reference ref_id="CVE-2010-2063" ref_url="https://www.suse.com/security/cve/CVE-2010-2063/" source="CVE"/>
		<reference ref_id="CVE-2010-3069" ref_url="https://www.suse.com/security/cve/CVE-2010-3069/" source="CVE"/>
		<reference ref_id="CVE-2011-0719" ref_url="https://www.suse.com/security/cve/CVE-2011-0719/" source="CVE"/>
		<reference ref_id="CVE-2011-2522" ref_url="https://www.suse.com/security/cve/CVE-2011-2522/" source="CVE"/>
		<reference ref_id="CVE-2011-2694" ref_url="https://www.suse.com/security/cve/CVE-2011-2694/" source="CVE"/>
		<reference ref_id="CVE-2012-0817" ref_url="https://www.suse.com/security/cve/CVE-2012-0817/" source="CVE"/>
		<reference ref_id="CVE-2012-0870" ref_url="https://www.suse.com/security/cve/CVE-2012-0870/" source="CVE"/>
		<reference ref_id="CVE-2012-1182" ref_url="https://www.suse.com/security/cve/CVE-2012-1182/" source="CVE"/>
		<reference ref_id="CVE-2012-2111" ref_url="https://www.suse.com/security/cve/CVE-2012-2111/" source="CVE"/>
		<reference ref_id="CVE-2012-6150" ref_url="https://www.suse.com/security/cve/CVE-2012-6150/" source="CVE"/>
		<reference ref_id="CVE-2013-0172" ref_url="https://www.suse.com/security/cve/CVE-2013-0172/" source="CVE"/>
		<reference ref_id="CVE-2013-0213" ref_url="https://www.suse.com/security/cve/CVE-2013-0213/" source="CVE"/>
		<reference ref_id="CVE-2013-0214" ref_url="https://www.suse.com/security/cve/CVE-2013-0214/" source="CVE"/>
		<reference ref_id="CVE-2013-0454" ref_url="https://www.suse.com/security/cve/CVE-2013-0454/" source="CVE"/>
		<reference ref_id="CVE-2013-1863" ref_url="https://www.suse.com/security/cve/CVE-2013-1863/" source="CVE"/>
		<reference ref_id="CVE-2013-4124" ref_url="https://www.suse.com/security/cve/CVE-2013-4124/" source="CVE"/>
		<reference ref_id="CVE-2013-4408" ref_url="https://www.suse.com/security/cve/CVE-2013-4408/" source="CVE"/>
		<reference ref_id="CVE-2013-4475" ref_url="https://www.suse.com/security/cve/CVE-2013-4475/" source="CVE"/>
		<reference ref_id="CVE-2013-4476" ref_url="https://www.suse.com/security/cve/CVE-2013-4476/" source="CVE"/>
		<reference ref_id="CVE-2013-4496" ref_url="https://www.suse.com/security/cve/CVE-2013-4496/" source="CVE"/>
		<reference ref_id="CVE-2013-6442" ref_url="https://www.suse.com/security/cve/CVE-2013-6442/" source="CVE"/>
		<reference ref_id="CVE-2014-0178" ref_url="https://www.suse.com/security/cve/CVE-2014-0178/" source="CVE"/>
		<reference ref_id="CVE-2014-0239" ref_url="https://www.suse.com/security/cve/CVE-2014-0239/" source="CVE"/>
		<reference ref_id="CVE-2014-0244" ref_url="https://www.suse.com/security/cve/CVE-2014-0244/" source="CVE"/>
		<reference ref_id="CVE-2014-3493" ref_url="https://www.suse.com/security/cve/CVE-2014-3493/" source="CVE"/>
		<reference ref_id="CVE-2014-3560" ref_url="https://www.suse.com/security/cve/CVE-2014-3560/" source="CVE"/>
		<reference ref_id="CVE-2014-8143" ref_url="https://www.suse.com/security/cve/CVE-2014-8143/" source="CVE"/>
		<reference ref_id="CVE-2015-0240" ref_url="https://www.suse.com/security/cve/CVE-2015-0240/" source="CVE"/>
		<reference ref_id="CVE-2015-3223" ref_url="https://www.suse.com/security/cve/CVE-2015-3223/" source="CVE"/>
		<reference ref_id="CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252/" source="CVE"/>
		<reference ref_id="CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296/" source="CVE"/>
		<reference ref_id="CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<reference ref_id="CVE-2015-5370" ref_url="https://www.suse.com/security/cve/CVE-2015-5370/" source="CVE"/>
		<reference ref_id="CVE-2015-7560" ref_url="https://www.suse.com/security/cve/CVE-2015-7560/" source="CVE"/>
		<reference ref_id="CVE-2015-8467" ref_url="https://www.suse.com/security/cve/CVE-2015-8467/" source="CVE"/>
		<reference ref_id="CVE-2015-8543" ref_url="https://www.suse.com/security/cve/CVE-2015-8543/" source="CVE"/>
		<reference ref_id="CVE-2016-0771" ref_url="https://www.suse.com/security/cve/CVE-2016-0771/" source="CVE"/>
		<reference ref_id="CVE-2016-2110" ref_url="https://www.suse.com/security/cve/CVE-2016-2110/" source="CVE"/>
		<reference ref_id="CVE-2016-2111" ref_url="https://www.suse.com/security/cve/CVE-2016-2111/" source="CVE"/>
		<reference ref_id="CVE-2016-2112" ref_url="https://www.suse.com/security/cve/CVE-2016-2112/" source="CVE"/>
		<reference ref_id="CVE-2016-2113" ref_url="https://www.suse.com/security/cve/CVE-2016-2113/" source="CVE"/>
		<reference ref_id="CVE-2016-2115" ref_url="https://www.suse.com/security/cve/CVE-2016-2115/" source="CVE"/>
		<reference ref_id="CVE-2016-2118" ref_url="https://www.suse.com/security/cve/CVE-2016-2118/" source="CVE"/>
		<reference ref_id="CVE-2016-2119" ref_url="https://www.suse.com/security/cve/CVE-2016-2119/" source="CVE"/>
		<description>
These are all security issues fixed in the libdcerpc-binding0-32bit-4.4.2-29.4 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0926/">CVE-2010-0926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1635/">CVE-2010-1635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1642/">CVE-2010-1642</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2063/">CVE-2010-2063</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3069/">CVE-2010-3069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0719/">CVE-2011-0719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2522/">CVE-2011-2522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2694/">CVE-2011-2694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0817/">CVE-2012-0817</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0870/">CVE-2012-0870</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1182/">CVE-2012-1182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2111/">CVE-2012-2111</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-6150/">CVE-2012-6150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0172/">CVE-2013-0172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0213/">CVE-2013-0213</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0214/">CVE-2013-0214</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0454/">CVE-2013-0454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1863/">CVE-2013-1863</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4124/">CVE-2013-4124</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4408/">CVE-2013-4408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4475/">CVE-2013-4475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4476/">CVE-2013-4476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4496/">CVE-2013-4496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6442/">CVE-2013-6442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0178/">CVE-2014-0178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0239/">CVE-2014-0239</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0244/">CVE-2014-0244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3493/">CVE-2014-3493</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3560/">CVE-2014-3560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8143/">CVE-2014-8143</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0240/">CVE-2015-0240</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3223/">CVE-2015-3223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5370/">CVE-2015-5370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7560/">CVE-2015-7560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8467/">CVE-2015-8467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8543/">CVE-2015-8543</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0771/">CVE-2016-0771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2110/">CVE-2016-2110</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2111/">CVE-2016-2111</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2112/">CVE-2016-2112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2113/">CVE-2016-2113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2115/">CVE-2016-2115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2118/">CVE-2016-2118</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2119/">CVE-2016-2119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76296" version="1" class="patch">
	<metadata>
		<title>libdmx1-1.1.3-3.52 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-1992" ref_url="https://www.suse.com/security/cve/CVE-2013-1992/" source="CVE"/>
		<description>
These are all security issues fixed in the libdmx1-1.1.3-3.52 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1992/">CVE-2013-1992</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140838" comment="libdmx1-1.1.3-3.52 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76297" version="1" class="patch">
	<metadata>
		<title>libecpg6-9.4.9-14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2007-6600" ref_url="https://www.suse.com/security/cve/CVE-2007-6600/" source="CVE"/>
		<reference ref_id="CVE-2009-4034" ref_url="https://www.suse.com/security/cve/CVE-2009-4034/" source="CVE"/>
		<reference ref_id="CVE-2009-4136" ref_url="https://www.suse.com/security/cve/CVE-2009-4136/" source="CVE"/>
		<reference ref_id="CVE-2010-1169" ref_url="https://www.suse.com/security/cve/CVE-2010-1169/" source="CVE"/>
		<reference ref_id="CVE-2010-1170" ref_url="https://www.suse.com/security/cve/CVE-2010-1170/" source="CVE"/>
		<reference ref_id="CVE-2010-3433" ref_url="https://www.suse.com/security/cve/CVE-2010-3433/" source="CVE"/>
		<reference ref_id="CVE-2012-0866" ref_url="https://www.suse.com/security/cve/CVE-2012-0866/" source="CVE"/>
		<reference ref_id="CVE-2012-0867" ref_url="https://www.suse.com/security/cve/CVE-2012-0867/" source="CVE"/>
		<reference ref_id="CVE-2012-0868" ref_url="https://www.suse.com/security/cve/CVE-2012-0868/" source="CVE"/>
		<reference ref_id="CVE-2012-2143" ref_url="https://www.suse.com/security/cve/CVE-2012-2143/" source="CVE"/>
		<reference ref_id="CVE-2012-2655" ref_url="https://www.suse.com/security/cve/CVE-2012-2655/" source="CVE"/>
		<reference ref_id="CVE-2012-3488" ref_url="https://www.suse.com/security/cve/CVE-2012-3488/" source="CVE"/>
		<reference ref_id="CVE-2012-3489" ref_url="https://www.suse.com/security/cve/CVE-2012-3489/" source="CVE"/>
		<reference ref_id="CVE-2013-0255" ref_url="https://www.suse.com/security/cve/CVE-2013-0255/" source="CVE"/>
		<reference ref_id="CVE-2013-1899" ref_url="https://www.suse.com/security/cve/CVE-2013-1899/" source="CVE"/>
		<reference ref_id="CVE-2013-1900" ref_url="https://www.suse.com/security/cve/CVE-2013-1900/" source="CVE"/>
		<reference ref_id="CVE-2013-1901" ref_url="https://www.suse.com/security/cve/CVE-2013-1901/" source="CVE"/>
		<reference ref_id="CVE-2014-0060" ref_url="https://www.suse.com/security/cve/CVE-2014-0060/" source="CVE"/>
		<reference ref_id="CVE-2014-0061" ref_url="https://www.suse.com/security/cve/CVE-2014-0061/" source="CVE"/>
		<reference ref_id="CVE-2014-0062" ref_url="https://www.suse.com/security/cve/CVE-2014-0062/" source="CVE"/>
		<reference ref_id="CVE-2014-0063" ref_url="https://www.suse.com/security/cve/CVE-2014-0063/" source="CVE"/>
		<reference ref_id="CVE-2014-0064" ref_url="https://www.suse.com/security/cve/CVE-2014-0064/" source="CVE"/>
		<reference ref_id="CVE-2014-0065" ref_url="https://www.suse.com/security/cve/CVE-2014-0065/" source="CVE"/>
		<reference ref_id="CVE-2014-0066" ref_url="https://www.suse.com/security/cve/CVE-2014-0066/" source="CVE"/>
		<reference ref_id="CVE-2014-0067" ref_url="https://www.suse.com/security/cve/CVE-2014-0067/" source="CVE"/>
		<reference ref_id="CVE-2015-3165" ref_url="https://www.suse.com/security/cve/CVE-2015-3165/" source="CVE"/>
		<reference ref_id="CVE-2015-3166" ref_url="https://www.suse.com/security/cve/CVE-2015-3166/" source="CVE"/>
		<reference ref_id="CVE-2015-3167" ref_url="https://www.suse.com/security/cve/CVE-2015-3167/" source="CVE"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-0766" ref_url="https://www.suse.com/security/cve/CVE-2016-0766/" source="CVE"/>
		<reference ref_id="CVE-2016-0773" ref_url="https://www.suse.com/security/cve/CVE-2016-0773/" source="CVE"/>
		<reference ref_id="CVE-2016-5423" ref_url="https://www.suse.com/security/cve/CVE-2016-5423/" source="CVE"/>
		<reference ref_id="CVE-2016-5424" ref_url="https://www.suse.com/security/cve/CVE-2016-5424/" source="CVE"/>
		<description>
These are all security issues fixed in the libecpg6-9.4.9-14.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6600/">CVE-2007-6600</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4034/">CVE-2009-4034</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4136/">CVE-2009-4136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1169/">CVE-2010-1169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1170/">CVE-2010-1170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3433/">CVE-2010-3433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0866/">CVE-2012-0866</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0867/">CVE-2012-0867</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0868/">CVE-2012-0868</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2143/">CVE-2012-2143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2655/">CVE-2012-2655</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3488/">CVE-2012-3488</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3489/">CVE-2012-3489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0255/">CVE-2013-0255</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1899/">CVE-2013-1899</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1900/">CVE-2013-1900</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1901/">CVE-2013-1901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0060/">CVE-2014-0060</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0061/">CVE-2014-0061</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0062/">CVE-2014-0062</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0063/">CVE-2014-0063</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0064/">CVE-2014-0064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0065/">CVE-2014-0065</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0066/">CVE-2014-0066</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0067/">CVE-2014-0067</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3165/">CVE-2015-3165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3166/">CVE-2015-3166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3167/">CVE-2015-3167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0766/">CVE-2016-0766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0773/">CVE-2016-0773</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5423/">CVE-2016-5423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5424/">CVE-2016-5424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76298" version="1" class="patch">
	<metadata>
		<title>libevent-2_0-5-2.0.21-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-6272" ref_url="https://www.suse.com/security/cve/CVE-2014-6272/" source="CVE"/>
		<description>
These are all security issues fixed in the libevent-2_0-5-2.0.21-4.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6272/">CVE-2014-6272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140839" comment="libevent-2_0-5-2.0.21-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76299" version="1" class="patch">
	<metadata>
		<title>libexif12-0.6.21-6.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-2812" ref_url="https://www.suse.com/security/cve/CVE-2012-2812/" source="CVE"/>
		<reference ref_id="CVE-2012-2813" ref_url="https://www.suse.com/security/cve/CVE-2012-2813/" source="CVE"/>
		<reference ref_id="CVE-2012-2814" ref_url="https://www.suse.com/security/cve/CVE-2012-2814/" source="CVE"/>
		<reference ref_id="CVE-2012-2836" ref_url="https://www.suse.com/security/cve/CVE-2012-2836/" source="CVE"/>
		<reference ref_id="CVE-2012-2837" ref_url="https://www.suse.com/security/cve/CVE-2012-2837/" source="CVE"/>
		<reference ref_id="CVE-2012-2840" ref_url="https://www.suse.com/security/cve/CVE-2012-2840/" source="CVE"/>
		<reference ref_id="CVE-2012-2841" ref_url="https://www.suse.com/security/cve/CVE-2012-2841/" source="CVE"/>
		<description>
These are all security issues fixed in the libexif12-0.6.21-6.4 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2812/">CVE-2012-2812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2813/">CVE-2012-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2814/">CVE-2012-2814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2836/">CVE-2012-2836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2837/">CVE-2012-2837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2840/">CVE-2012-2840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2841/">CVE-2012-2841</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140840" comment="libexif12-0.6.21-6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140841" comment="libexif12-32bit-0.6.21-6.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76300" version="1" class="patch">
	<metadata>
		<title>libfbembed2_5-2.5.2.26539-13.42 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-2492" ref_url="https://www.suse.com/security/cve/CVE-2013-2492/" source="CVE"/>
		<description>
These are all security issues fixed in the libfbembed2_5-2.5.2.26539-13.42 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2492/">CVE-2013-2492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141509" comment="libfbembed2_5-2.5.2.26539-13.42 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76301" version="1" class="patch">
	<metadata>
		<title>libfreebl3-3.21.1-46.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-3640" ref_url="https://www.suse.com/security/cve/CVE-2011-3640/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<reference ref_id="CVE-2013-0791" ref_url="https://www.suse.com/security/cve/CVE-2013-0791/" source="CVE"/>
		<reference ref_id="CVE-2013-1620" ref_url="https://www.suse.com/security/cve/CVE-2013-1620/" source="CVE"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<reference ref_id="CVE-2013-1740" ref_url="https://www.suse.com/security/cve/CVE-2013-1740/" source="CVE"/>
		<reference ref_id="CVE-2013-5605" ref_url="https://www.suse.com/security/cve/CVE-2013-5605/" source="CVE"/>
		<reference ref_id="CVE-2014-1492" ref_url="https://www.suse.com/security/cve/CVE-2014-1492/" source="CVE"/>
		<reference ref_id="CVE-2014-1568" ref_url="https://www.suse.com/security/cve/CVE-2014-1568/" source="CVE"/>
		<reference ref_id="CVE-2014-1569" ref_url="https://www.suse.com/security/cve/CVE-2014-1569/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2016-1938" ref_url="https://www.suse.com/security/cve/CVE-2016-1938/" source="CVE"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1978" ref_url="https://www.suse.com/security/cve/CVE-2016-1978/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<description>
These are all security issues fixed in the libfreebl3-3.21.1-46.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3640/">CVE-2011-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0791/">CVE-2013-0791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1620/">CVE-2013-1620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1740/">CVE-2013-1740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5605/">CVE-2013-5605</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1492/">CVE-2014-1492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1568/">CVE-2014-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1569/">CVE-2014-1569</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1938/">CVE-2016-1938</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1978/">CVE-2016-1978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76302" version="1" class="patch">
	<metadata>
		<title>libfreetype6-2.6.3-7.8.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0946" ref_url="https://www.suse.com/security/cve/CVE-2009-0946/" source="CVE"/>
		<reference ref_id="CVE-2010-2497" ref_url="https://www.suse.com/security/cve/CVE-2010-2497/" source="CVE"/>
		<reference ref_id="CVE-2010-2805" ref_url="https://www.suse.com/security/cve/CVE-2010-2805/" source="CVE"/>
		<reference ref_id="CVE-2010-3053" ref_url="https://www.suse.com/security/cve/CVE-2010-3053/" source="CVE"/>
		<reference ref_id="CVE-2010-3054" ref_url="https://www.suse.com/security/cve/CVE-2010-3054/" source="CVE"/>
		<reference ref_id="CVE-2010-3311" ref_url="https://www.suse.com/security/cve/CVE-2010-3311/" source="CVE"/>
		<reference ref_id="CVE-2010-3814" ref_url="https://www.suse.com/security/cve/CVE-2010-3814/" source="CVE"/>
		<reference ref_id="CVE-2010-3855" ref_url="https://www.suse.com/security/cve/CVE-2010-3855/" source="CVE"/>
		<reference ref_id="CVE-2011-0226" ref_url="https://www.suse.com/security/cve/CVE-2011-0226/" source="CVE"/>
		<reference ref_id="CVE-2011-3256" ref_url="https://www.suse.com/security/cve/CVE-2011-3256/" source="CVE"/>
		<reference ref_id="CVE-2011-3439" ref_url="https://www.suse.com/security/cve/CVE-2011-3439/" source="CVE"/>
		<reference ref_id="CVE-2012-1126" ref_url="https://www.suse.com/security/cve/CVE-2012-1126/" source="CVE"/>
		<reference ref_id="CVE-2012-1127" ref_url="https://www.suse.com/security/cve/CVE-2012-1127/" source="CVE"/>
		<reference ref_id="CVE-2012-1128" ref_url="https://www.suse.com/security/cve/CVE-2012-1128/" source="CVE"/>
		<reference ref_id="CVE-2012-1129" ref_url="https://www.suse.com/security/cve/CVE-2012-1129/" source="CVE"/>
		<reference ref_id="CVE-2012-1130" ref_url="https://www.suse.com/security/cve/CVE-2012-1130/" source="CVE"/>
		<reference ref_id="CVE-2012-1131" ref_url="https://www.suse.com/security/cve/CVE-2012-1131/" source="CVE"/>
		<reference ref_id="CVE-2012-1132" ref_url="https://www.suse.com/security/cve/CVE-2012-1132/" source="CVE"/>
		<reference ref_id="CVE-2012-1133" ref_url="https://www.suse.com/security/cve/CVE-2012-1133/" source="CVE"/>
		<reference ref_id="CVE-2012-1134" ref_url="https://www.suse.com/security/cve/CVE-2012-1134/" source="CVE"/>
		<reference ref_id="CVE-2012-1135" ref_url="https://www.suse.com/security/cve/CVE-2012-1135/" source="CVE"/>
		<reference ref_id="CVE-2012-1136" ref_url="https://www.suse.com/security/cve/CVE-2012-1136/" source="CVE"/>
		<reference ref_id="CVE-2012-1137" ref_url="https://www.suse.com/security/cve/CVE-2012-1137/" source="CVE"/>
		<reference ref_id="CVE-2012-1138" ref_url="https://www.suse.com/security/cve/CVE-2012-1138/" source="CVE"/>
		<reference ref_id="CVE-2012-1139" ref_url="https://www.suse.com/security/cve/CVE-2012-1139/" source="CVE"/>
		<reference ref_id="CVE-2012-1140" ref_url="https://www.suse.com/security/cve/CVE-2012-1140/" source="CVE"/>
		<reference ref_id="CVE-2012-1141" ref_url="https://www.suse.com/security/cve/CVE-2012-1141/" source="CVE"/>
		<reference ref_id="CVE-2012-1142" ref_url="https://www.suse.com/security/cve/CVE-2012-1142/" source="CVE"/>
		<reference ref_id="CVE-2012-1143" ref_url="https://www.suse.com/security/cve/CVE-2012-1143/" source="CVE"/>
		<reference ref_id="CVE-2012-1144" ref_url="https://www.suse.com/security/cve/CVE-2012-1144/" source="CVE"/>
		<reference ref_id="CVE-2012-5668" ref_url="https://www.suse.com/security/cve/CVE-2012-5668/" source="CVE"/>
		<reference ref_id="CVE-2012-5669" ref_url="https://www.suse.com/security/cve/CVE-2012-5669/" source="CVE"/>
		<reference ref_id="CVE-2012-5670" ref_url="https://www.suse.com/security/cve/CVE-2012-5670/" source="CVE"/>
		<reference ref_id="CVE-2014-2240" ref_url="https://www.suse.com/security/cve/CVE-2014-2240/" source="CVE"/>
		<reference ref_id="CVE-2014-2241" ref_url="https://www.suse.com/security/cve/CVE-2014-2241/" source="CVE"/>
		<reference ref_id="CVE-2014-9656" ref_url="https://www.suse.com/security/cve/CVE-2014-9656/" source="CVE"/>
		<reference ref_id="CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657/" source="CVE"/>
		<reference ref_id="CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658/" source="CVE"/>
		<reference ref_id="CVE-2014-9659" ref_url="https://www.suse.com/security/cve/CVE-2014-9659/" source="CVE"/>
		<reference ref_id="CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660/" source="CVE"/>
		<reference ref_id="CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661/" source="CVE"/>
		<reference ref_id="CVE-2014-9662" ref_url="https://www.suse.com/security/cve/CVE-2014-9662/" source="CVE"/>
		<reference ref_id="CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663/" source="CVE"/>
		<reference ref_id="CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664/" source="CVE"/>
		<reference ref_id="CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665/" source="CVE"/>
		<reference ref_id="CVE-2014-9666" ref_url="https://www.suse.com/security/cve/CVE-2014-9666/" source="CVE"/>
		<reference ref_id="CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667/" source="CVE"/>
		<reference ref_id="CVE-2014-9668" ref_url="https://www.suse.com/security/cve/CVE-2014-9668/" source="CVE"/>
		<reference ref_id="CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669/" source="CVE"/>
		<reference ref_id="CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670/" source="CVE"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<reference ref_id="CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672/" source="CVE"/>
		<reference ref_id="CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673/" source="CVE"/>
		<reference ref_id="CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674/" source="CVE"/>
		<reference ref_id="CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675/" source="CVE"/>
		<description>
These are all security issues fixed in the libfreetype6-2.6.3-7.8.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0946/">CVE-2009-0946</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2497/">CVE-2010-2497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2805/">CVE-2010-2805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3053/">CVE-2010-3053</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3054/">CVE-2010-3054</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3311/">CVE-2010-3311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3814/">CVE-2010-3814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3855/">CVE-2010-3855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0226/">CVE-2011-0226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3256/">CVE-2011-3256</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3439/">CVE-2011-3439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1126/">CVE-2012-1126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1127/">CVE-2012-1127</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1128/">CVE-2012-1128</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1129/">CVE-2012-1129</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1130/">CVE-2012-1130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1131/">CVE-2012-1131</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1132/">CVE-2012-1132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1133/">CVE-2012-1133</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1134/">CVE-2012-1134</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1135/">CVE-2012-1135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1136/">CVE-2012-1136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1137/">CVE-2012-1137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1138/">CVE-2012-1138</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1139/">CVE-2012-1139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1140/">CVE-2012-1140</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1141/">CVE-2012-1141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1142/">CVE-2012-1142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1143/">CVE-2012-1143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1144/">CVE-2012-1144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5668/">CVE-2012-5668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5669/">CVE-2012-5669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5670/">CVE-2012-5670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2240/">CVE-2014-2240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2241/">CVE-2014-2241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9656/">CVE-2014-9656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9659/">CVE-2014-9659</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9662/">CVE-2014-9662</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9666/">CVE-2014-9666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9668/">CVE-2014-9668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76303" version="1" class="patch">
	<metadata>
		<title>libgadu3-1.11.4-1.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-6487" ref_url="https://www.suse.com/security/cve/CVE-2013-6487/" source="CVE"/>
		<reference ref_id="CVE-2014-3775" ref_url="https://www.suse.com/security/cve/CVE-2014-3775/" source="CVE"/>
		<description>
These are all security issues fixed in the libgadu3-1.11.4-1.12 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6487/">CVE-2013-6487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3775/">CVE-2014-3775</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141521" comment="libgadu3-1.11.4-1.12 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76304" version="1" class="patch">
	<metadata>
		<title>libgc1-7.2d-3.77 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-2673" ref_url="https://www.suse.com/security/cve/CVE-2012-2673/" source="CVE"/>
		<description>
These are all security issues fixed in the libgc1-7.2d-3.77 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2673/">CVE-2012-2673</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140590" comment="libgc1-7.2d-3.77 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76305" version="1" class="patch">
	<metadata>
		<title>libgcrypt20-1.6.1-16.33.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-4242" ref_url="https://www.suse.com/security/cve/CVE-2013-4242/" source="CVE"/>
		<reference ref_id="CVE-2014-3591" ref_url="https://www.suse.com/security/cve/CVE-2014-3591/" source="CVE"/>
		<reference ref_id="CVE-2015-0837" ref_url="https://www.suse.com/security/cve/CVE-2015-0837/" source="CVE"/>
		<reference ref_id="CVE-2015-7511" ref_url="https://www.suse.com/security/cve/CVE-2015-7511/" source="CVE"/>
		<reference ref_id="CVE-2016-6313" ref_url="https://www.suse.com/security/cve/CVE-2016-6313/" source="CVE"/>
		<description>
These are all security issues fixed in the libgcrypt20-1.6.1-16.33.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4242/">CVE-2013-4242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3591/">CVE-2014-3591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0837/">CVE-2015-0837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7511/">CVE-2015-7511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6313/">CVE-2016-6313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131105" comment="libgcrypt20-1.6.1-16.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131106" comment="libgcrypt20-32bit-1.6.1-16.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76306" version="1" class="patch">
	<metadata>
		<title>libgif6-32bit-5.0.5-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-7555" ref_url="https://www.suse.com/security/cve/CVE-2015-7555/" source="CVE"/>
		<reference ref_id="CVE-2016-3977" ref_url="https://www.suse.com/security/cve/CVE-2016-3977/" source="CVE"/>
		<description>
These are all security issues fixed in the libgif6-32bit-5.0.5-12.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7555/">CVE-2015-7555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3977/">CVE-2016-3977</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009126709" comment="libgif6-5.0.5-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009126710" comment="libgif6-32bit-5.0.5-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76307" version="1" class="patch">
	<metadata>
		<title>libgnomesu-2.0.0-353.6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1946" ref_url="https://www.suse.com/security/cve/CVE-2011-1946/" source="CVE"/>
		<description>
These are all security issues fixed in the libgnomesu-2.0.0-353.6.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1946/">CVE-2011-1946</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140842" comment="libgnomesu-2.0.0-353.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140843" comment="libgnomesu-lang-2.0.0-353.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140844" comment="libgnomesu0-2.0.0-353.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76308" version="1" class="patch">
	<metadata>
		<title>libgraphite2-3-1.3.1-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2016-1521" ref_url="https://www.suse.com/security/cve/CVE-2016-1521/" source="CVE"/>
		<reference ref_id="CVE-2016-1523" ref_url="https://www.suse.com/security/cve/CVE-2016-1523/" source="CVE"/>
		<reference ref_id="CVE-2016-1526" ref_url="https://www.suse.com/security/cve/CVE-2016-1526/" source="CVE"/>
		<description>
These are all security issues fixed in the libgraphite2-3-1.3.1-6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1521/">CVE-2016-1521</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1523/">CVE-2016-1523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1526/">CVE-2016-1526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009124729" comment="libgraphite2-3-1.3.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124730" comment="libgraphite2-3-32bit-1.3.1-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76309" version="1" class="patch">
	<metadata>
		<title>libgssglue1-0.4-3.83 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-2709" ref_url="https://www.suse.com/security/cve/CVE-2011-2709/" source="CVE"/>
		<description>
These are all security issues fixed in the libgssglue1-0.4-3.83 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2709/">CVE-2011-2709</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140845" comment="libgssglue1-0.4-3.83 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140846" comment="libgssglue1-32bit-0.4-3.83 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76310" version="1" class="patch">
	<metadata>
		<title>libgypsy0-0.9-6.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-0523" ref_url="https://www.suse.com/security/cve/CVE-2011-0523/" source="CVE"/>
		<reference ref_id="CVE-2011-0524" ref_url="https://www.suse.com/security/cve/CVE-2011-0524/" source="CVE"/>
		<description>
These are all security issues fixed in the libgypsy0-0.9-6.24 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0523/">CVE-2011-0523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0524/">CVE-2011-0524</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140676" comment="libgypsy0-0.9-6.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76311" version="1" class="patch">
	<metadata>
		<title>libhogweed2-2.7.1-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-8803" ref_url="https://www.suse.com/security/cve/CVE-2015-8803/" source="CVE"/>
		<reference ref_id="CVE-2015-8804" ref_url="https://www.suse.com/security/cve/CVE-2015-8804/" source="CVE"/>
		<reference ref_id="CVE-2015-8805" ref_url="https://www.suse.com/security/cve/CVE-2015-8805/" source="CVE"/>
		<description>
These are all security issues fixed in the libhogweed2-2.7.1-9.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8803/">CVE-2015-8803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8804/">CVE-2015-8804</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8805/">CVE-2015-8805</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009123011" comment="libhogweed2-2.7.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009123012" comment="libhogweed2-32bit-2.7.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009123014" comment="libnettle4-2.7.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009123015" comment="libnettle4-32bit-2.7.1-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76312" version="1" class="patch">
	<metadata>
		<title>libid3tag0-0.15.1b-182.58 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-2109" ref_url="https://www.suse.com/security/cve/CVE-2008-2109/" source="CVE"/>
		<description>
These are all security issues fixed in the libid3tag0-0.15.1b-182.58 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2109/">CVE-2008-2109</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141536" comment="libid3tag0-0.15.1b-182.58 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76313" version="1" class="patch">
	<metadata>
		<title>libidn11-1.28-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-2059" ref_url="https://www.suse.com/security/cve/CVE-2015-2059/" source="CVE"/>
		<reference ref_id="CVE-2015-8948" ref_url="https://www.suse.com/security/cve/CVE-2015-8948/" source="CVE"/>
		<reference ref_id="CVE-2016-6261" ref_url="https://www.suse.com/security/cve/CVE-2016-6261/" source="CVE"/>
		<reference ref_id="CVE-2016-6262" ref_url="https://www.suse.com/security/cve/CVE-2016-6262/" source="CVE"/>
		<reference ref_id="CVE-2016-6263" ref_url="https://www.suse.com/security/cve/CVE-2016-6263/" source="CVE"/>
		<description>
These are all security issues fixed in the libidn11-1.28-4.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2059/">CVE-2015-2059</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8948/">CVE-2015-8948</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6261/">CVE-2016-6261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6262/">CVE-2016-6262</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6263/">CVE-2016-6263</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130989" comment="libidn11-1.28-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130990" comment="libidn11-32bit-1.28-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76314" version="1" class="patch">
	<metadata>
		<title>libipa_hbac0-1.13.4-18.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-4341" ref_url="https://www.suse.com/security/cve/CVE-2010-4341/" source="CVE"/>
		<reference ref_id="CVE-2011-1758" ref_url="https://www.suse.com/security/cve/CVE-2011-1758/" source="CVE"/>
		<reference ref_id="CVE-2013-0219" ref_url="https://www.suse.com/security/cve/CVE-2013-0219/" source="CVE"/>
		<reference ref_id="CVE-2013-0220" ref_url="https://www.suse.com/security/cve/CVE-2013-0220/" source="CVE"/>
		<reference ref_id="CVE-2013-0287" ref_url="https://www.suse.com/security/cve/CVE-2013-0287/" source="CVE"/>
		<description>
These are all security issues fixed in the libipa_hbac0-1.13.4-18.10 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4341/">CVE-2010-4341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1758/">CVE-2011-1758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0219/">CVE-2013-0219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0220/">CVE-2013-0220</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0287/">CVE-2013-0287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140848" comment="libipa_hbac0-1.13.4-18.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140849" comment="libsss_idmap0-1.13.4-18.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140850" comment="libsss_sudo-1.13.4-18.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140851" comment="python-sssd-config-1.13.4-18.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140852" comment="sssd-1.13.4-18.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140853" comment="sssd-32bit-1.13.4-18.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140854" comment="sssd-ad-1.13.4-18.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140855" comment="sssd-ipa-1.13.4-18.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140856" comment="sssd-krb5-1.13.4-18.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140857" comment="sssd-krb5-common-1.13.4-18.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140858" comment="sssd-ldap-1.13.4-18.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140859" comment="sssd-proxy-1.13.4-18.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140860" comment="sssd-tools-1.13.4-18.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76315" version="1" class="patch">
	<metadata>
		<title>libjasper1-1.900.1-170.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-8137" ref_url="https://www.suse.com/security/cve/CVE-2014-8137/" source="CVE"/>
		<reference ref_id="CVE-2014-8138" ref_url="https://www.suse.com/security/cve/CVE-2014-8138/" source="CVE"/>
		<reference ref_id="CVE-2014-8157" ref_url="https://www.suse.com/security/cve/CVE-2014-8157/" source="CVE"/>
		<reference ref_id="CVE-2014-8158" ref_url="https://www.suse.com/security/cve/CVE-2014-8158/" source="CVE"/>
		<reference ref_id="CVE-2014-9029" ref_url="https://www.suse.com/security/cve/CVE-2014-9029/" source="CVE"/>
		<description>
These are all security issues fixed in the libjasper1-1.900.1-170.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8137/">CVE-2014-8137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8138/">CVE-2014-8138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8157/">CVE-2014-8157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8158/">CVE-2014-8158</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9029/">CVE-2014-9029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106110" comment="libjasper1-1.900.1-170.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106111" comment="libjasper1-32bit-1.900.1-170.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76316" version="1" class="patch">
	<metadata>
		<title>libjavascriptcoregtk-1_0-0-2.4.11-23.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-5112" ref_url="https://www.suse.com/security/cve/CVE-2012-5112/" source="CVE"/>
		<reference ref_id="CVE-2012-5133" ref_url="https://www.suse.com/security/cve/CVE-2012-5133/" source="CVE"/>
		<reference ref_id="CVE-2014-1344" ref_url="https://www.suse.com/security/cve/CVE-2014-1344/" source="CVE"/>
		<reference ref_id="CVE-2014-1384" ref_url="https://www.suse.com/security/cve/CVE-2014-1384/" source="CVE"/>
		<reference ref_id="CVE-2014-1385" ref_url="https://www.suse.com/security/cve/CVE-2014-1385/" source="CVE"/>
		<reference ref_id="CVE-2014-1386" ref_url="https://www.suse.com/security/cve/CVE-2014-1386/" source="CVE"/>
		<reference ref_id="CVE-2014-1387" ref_url="https://www.suse.com/security/cve/CVE-2014-1387/" source="CVE"/>
		<reference ref_id="CVE-2014-1388" ref_url="https://www.suse.com/security/cve/CVE-2014-1388/" source="CVE"/>
		<reference ref_id="CVE-2014-1389" ref_url="https://www.suse.com/security/cve/CVE-2014-1389/" source="CVE"/>
		<reference ref_id="CVE-2014-1390" ref_url="https://www.suse.com/security/cve/CVE-2014-1390/" source="CVE"/>
		<reference ref_id="CVE-2014-1748" ref_url="https://www.suse.com/security/cve/CVE-2014-1748/" source="CVE"/>
		<reference ref_id="CVE-2015-1071" ref_url="https://www.suse.com/security/cve/CVE-2015-1071/" source="CVE"/>
		<reference ref_id="CVE-2015-1076" ref_url="https://www.suse.com/security/cve/CVE-2015-1076/" source="CVE"/>
		<reference ref_id="CVE-2015-1081" ref_url="https://www.suse.com/security/cve/CVE-2015-1081/" source="CVE"/>
		<reference ref_id="CVE-2015-1083" ref_url="https://www.suse.com/security/cve/CVE-2015-1083/" source="CVE"/>
		<reference ref_id="CVE-2015-1120" ref_url="https://www.suse.com/security/cve/CVE-2015-1120/" source="CVE"/>
		<reference ref_id="CVE-2015-1122" ref_url="https://www.suse.com/security/cve/CVE-2015-1122/" source="CVE"/>
		<reference ref_id="CVE-2015-1127" ref_url="https://www.suse.com/security/cve/CVE-2015-1127/" source="CVE"/>
		<reference ref_id="CVE-2015-1153" ref_url="https://www.suse.com/security/cve/CVE-2015-1153/" source="CVE"/>
		<reference ref_id="CVE-2015-1155" ref_url="https://www.suse.com/security/cve/CVE-2015-1155/" source="CVE"/>
		<reference ref_id="CVE-2015-2330" ref_url="https://www.suse.com/security/cve/CVE-2015-2330/" source="CVE"/>
		<reference ref_id="CVE-2015-3658" ref_url="https://www.suse.com/security/cve/CVE-2015-3658/" source="CVE"/>
		<reference ref_id="CVE-2015-3659" ref_url="https://www.suse.com/security/cve/CVE-2015-3659/" source="CVE"/>
		<reference ref_id="CVE-2015-3727" ref_url="https://www.suse.com/security/cve/CVE-2015-3727/" source="CVE"/>
		<reference ref_id="CVE-2015-3731" ref_url="https://www.suse.com/security/cve/CVE-2015-3731/" source="CVE"/>
		<reference ref_id="CVE-2015-3741" ref_url="https://www.suse.com/security/cve/CVE-2015-3741/" source="CVE"/>
		<reference ref_id="CVE-2015-3743" ref_url="https://www.suse.com/security/cve/CVE-2015-3743/" source="CVE"/>
		<reference ref_id="CVE-2015-3745" ref_url="https://www.suse.com/security/cve/CVE-2015-3745/" source="CVE"/>
		<reference ref_id="CVE-2015-3747" ref_url="https://www.suse.com/security/cve/CVE-2015-3747/" source="CVE"/>
		<reference ref_id="CVE-2015-3748" ref_url="https://www.suse.com/security/cve/CVE-2015-3748/" source="CVE"/>
		<reference ref_id="CVE-2015-3749" ref_url="https://www.suse.com/security/cve/CVE-2015-3749/" source="CVE"/>
		<reference ref_id="CVE-2015-3752" ref_url="https://www.suse.com/security/cve/CVE-2015-3752/" source="CVE"/>
		<reference ref_id="CVE-2015-5788" ref_url="https://www.suse.com/security/cve/CVE-2015-5788/" source="CVE"/>
		<reference ref_id="CVE-2015-5794" ref_url="https://www.suse.com/security/cve/CVE-2015-5794/" source="CVE"/>
		<reference ref_id="CVE-2015-5801" ref_url="https://www.suse.com/security/cve/CVE-2015-5801/" source="CVE"/>
		<reference ref_id="CVE-2015-5809" ref_url="https://www.suse.com/security/cve/CVE-2015-5809/" source="CVE"/>
		<reference ref_id="CVE-2015-5822" ref_url="https://www.suse.com/security/cve/CVE-2015-5822/" source="CVE"/>
		<reference ref_id="CVE-2015-5928" ref_url="https://www.suse.com/security/cve/CVE-2015-5928/" source="CVE"/>
		<description>
These are all security issues fixed in the libjavascriptcoregtk-1_0-0-2.4.11-23.20 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5112/">CVE-2012-5112</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5133/">CVE-2012-5133</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1344/">CVE-2014-1344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1384/">CVE-2014-1384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1385/">CVE-2014-1385</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1386/">CVE-2014-1386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1387/">CVE-2014-1387</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1388/">CVE-2014-1388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1389/">CVE-2014-1389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1390/">CVE-2014-1390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1748/">CVE-2014-1748</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1071/">CVE-2015-1071</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1076/">CVE-2015-1076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1081/">CVE-2015-1081</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1083/">CVE-2015-1083</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-1120/">CVE-2015-1120</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-1122/">CVE-2015-1122</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-1127/">CVE-2015-1127</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1153/">CVE-2015-1153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1155/">CVE-2015-1155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2330/">CVE-2015-2330</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3658/">CVE-2015-3658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3659/">CVE-2015-3659</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3727/">CVE-2015-3727</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3731/">CVE-2015-3731</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3741/">CVE-2015-3741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3743/">CVE-2015-3743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3745/">CVE-2015-3745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3747/">CVE-2015-3747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3748/">CVE-2015-3748</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3749/">CVE-2015-3749</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3752/">CVE-2015-3752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5788/">CVE-2015-5788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5794/">CVE-2015-5794</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5801/">CVE-2015-5801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5809/">CVE-2015-5809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5822/">CVE-2015-5822</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5928/">CVE-2015-5928</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76317" version="1" class="patch">
	<metadata>
		<title>libjavascriptcoregtk-4_0-18-2.12.5-1.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2016-1856" ref_url="https://www.suse.com/security/cve/CVE-2016-1856/" source="CVE"/>
		<reference ref_id="CVE-2016-1857" ref_url="https://www.suse.com/security/cve/CVE-2016-1857/" source="CVE"/>
		<reference ref_id="CVE-2016-4590" ref_url="https://www.suse.com/security/cve/CVE-2016-4590/" source="CVE"/>
		<reference ref_id="CVE-2016-4591" ref_url="https://www.suse.com/security/cve/CVE-2016-4591/" source="CVE"/>
		<reference ref_id="CVE-2016-4622" ref_url="https://www.suse.com/security/cve/CVE-2016-4622/" source="CVE"/>
		<reference ref_id="CVE-2016-4624" ref_url="https://www.suse.com/security/cve/CVE-2016-4624/" source="CVE"/>
		<description>
These are all security issues fixed in the libjavascriptcoregtk-4_0-18-2.12.5-1.12 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1856/">CVE-2016-1856</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1857/">CVE-2016-1857</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4590/">CVE-2016-4590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4591/">CVE-2016-4591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4622/">CVE-2016-4622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4624/">CVE-2016-4624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140865" comment="libjavascriptcoregtk-4_0-18-2.12.5-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140866" comment="libwebkit2gtk-4_0-37-2.12.5-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142138" comment="libwebkit2gtk3-lang-2.12.5-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140867" comment="typelib-1_0-JavaScriptCore-4_0-2.12.5-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140868" comment="typelib-1_0-WebKit2-4_0-2.12.5-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140869" comment="webkit2gtk-4_0-injected-bundles-2.12.5-1.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76318" version="1" class="patch">
	<metadata>
		<title>libjbig2-2.0-12.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-6369" ref_url="https://www.suse.com/security/cve/CVE-2013-6369/" source="CVE"/>
		<description>
These are all security issues fixed in the libjbig2-2.0-12.13 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6369/">CVE-2013-6369</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141560" comment="libjbig2-2.0-12.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140690" comment="libjbig2-32bit-2.0-12.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76319" version="1" class="patch">
	<metadata>
		<title>libjpeg-turbo-1.3.1-30.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-9092" ref_url="https://www.suse.com/security/cve/CVE-2014-9092/" source="CVE"/>
		<description>
These are all security issues fixed in the libjpeg-turbo-1.3.1-30.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9092/">CVE-2014-9092</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105080" comment="libjpeg-turbo-1.3.1-30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105088" comment="libjpeg62-62.1.0-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105087" comment="libjpeg62-32bit-62.1.0-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105091" comment="libjpeg62-turbo-1.3.1-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105082" comment="libjpeg8-8.0.2-30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105081" comment="libjpeg8-32bit-8.0.2-30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105086" comment="libturbojpeg0-8.0.2-30.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76320" version="1" class="patch">
	<metadata>
		<title>libjson-c2-0.11-2.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-6370" ref_url="https://www.suse.com/security/cve/CVE-2013-6370/" source="CVE"/>
		<reference ref_id="CVE-2013-6371" ref_url="https://www.suse.com/security/cve/CVE-2013-6371/" source="CVE"/>
		<description>
These are all security issues fixed in the libjson-c2-0.11-2.22 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6370/">CVE-2013-6370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6371/">CVE-2013-6371</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140691" comment="libjson-c2-0.11-2.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140692" comment="libjson-c2-32bit-0.11-2.22 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76321" version="1" class="patch">
	<metadata>
		<title>libksba8-1.3.0-23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-9087" ref_url="https://www.suse.com/security/cve/CVE-2014-9087/" source="CVE"/>
		<reference ref_id="CVE-2016-4574" ref_url="https://www.suse.com/security/cve/CVE-2016-4574/" source="CVE"/>
		<reference ref_id="CVE-2016-4579" ref_url="https://www.suse.com/security/cve/CVE-2016-4579/" source="CVE"/>
		<description>
These are all security issues fixed in the libksba8-1.3.0-23.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9087/">CVE-2014-9087</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4574/">CVE-2016-4574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4579/">CVE-2016-4579</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128468" comment="libksba8-1.3.0-23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76322" version="1" class="patch">
	<metadata>
		<title>libldap-2_4-2-2.4.41-18.25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-1545" ref_url="https://www.suse.com/security/cve/CVE-2015-1545/" source="CVE"/>
		<reference ref_id="CVE-2015-1546" ref_url="https://www.suse.com/security/cve/CVE-2015-1546/" source="CVE"/>
		<reference ref_id="CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908/" source="CVE"/>
		<description>
These are all security issues fixed in the libldap-2_4-2-2.4.41-18.25.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1545/">CVE-2015-1545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1546/">CVE-2015-1546</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140870" comment="libldap-2_4-2-2.4.41-18.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140871" comment="libldap-2_4-2-32bit-2.4.41-18.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140874" comment="openldap2-client-2.4.41-18.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76323" version="1" class="patch">
	<metadata>
		<title>libldb1-1.1.26-10.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-3223" ref_url="https://www.suse.com/security/cve/CVE-2015-3223/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<description>
These are all security issues fixed in the libldb1-1.1.26-10.4 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3223/">CVE-2015-3223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140715" comment="libldb1-1.1.26-10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140716" comment="libldb1-32bit-1.1.26-10.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76324" version="1" class="patch">
	<metadata>
		<title>libltdl7-2.4.2-14.60 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-3736" ref_url="https://www.suse.com/security/cve/CVE-2009-3736/" source="CVE"/>
		<description>
These are all security issues fixed in the libltdl7-2.4.2-14.60 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3736/">CVE-2009-3736</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140875" comment="libltdl7-2.4.2-14.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140876" comment="libltdl7-32bit-2.4.2-14.60 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76325" version="1" class="patch">
	<metadata>
		<title>liblua5_2-5.2.2-4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-5461" ref_url="https://www.suse.com/security/cve/CVE-2014-5461/" source="CVE"/>
		<description>
These are all security issues fixed in the liblua5_2-5.2.2-4.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5461/">CVE-2014-5461</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140879" comment="liblua5_2-5.2.2-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140881" comment="lua-5.2.2-4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76326" version="1" class="patch">
	<metadata>
		<title>liblzo2-2-2.08-1.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607/" source="CVE"/>
		<description>
These are all security issues fixed in the liblzo2-2-2.08-1.13 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141561" comment="liblzo2-2-2.08-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140883" comment="liblzo2-2-32bit-2.08-1.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76327" version="1" class="patch">
	<metadata>
		<title>libmikmod3-3.2.0-4.59 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-6720" ref_url="https://www.suse.com/security/cve/CVE-2007-6720/" source="CVE"/>
		<reference ref_id="CVE-2009-0179" ref_url="https://www.suse.com/security/cve/CVE-2009-0179/" source="CVE"/>
		<reference ref_id="CVE-2009-3995" ref_url="https://www.suse.com/security/cve/CVE-2009-3995/" source="CVE"/>
		<reference ref_id="CVE-2009-3996" ref_url="https://www.suse.com/security/cve/CVE-2009-3996/" source="CVE"/>
		<reference ref_id="CVE-2010-2546" ref_url="https://www.suse.com/security/cve/CVE-2010-2546/" source="CVE"/>
		<description>
These are all security issues fixed in the libmikmod3-3.2.0-4.59 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2007-6720/">CVE-2007-6720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0179/">CVE-2009-0179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3995/">CVE-2009-3995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3996/">CVE-2009-3996</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2546/">CVE-2010-2546</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141562" comment="libmikmod3-3.2.0-4.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141563" comment="libmikmod3-32bit-3.2.0-4.59 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76328" version="1" class="patch">
	<metadata>
		<title>libmms0-0.6.2-15.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-2892" ref_url="https://www.suse.com/security/cve/CVE-2014-2892/" source="CVE"/>
		<description>
These are all security issues fixed in the libmms0-0.6.2-15.8 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-2892/">CVE-2014-2892</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140884" comment="libmms0-0.6.2-15.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76329" version="1" class="patch">
	<metadata>
		<title>libmodplug1-0.8.8.4-13.69 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1761" ref_url="https://www.suse.com/security/cve/CVE-2011-1761/" source="CVE"/>
		<reference ref_id="CVE-2013-4233" ref_url="https://www.suse.com/security/cve/CVE-2013-4233/" source="CVE"/>
		<reference ref_id="CVE-2013-4234" ref_url="https://www.suse.com/security/cve/CVE-2013-4234/" source="CVE"/>
		<description>
These are all security issues fixed in the libmodplug1-0.8.8.4-13.69 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1761/">CVE-2011-1761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4233/">CVE-2013-4233</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4234/">CVE-2013-4234</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140885" comment="libmodplug1-0.8.8.4-13.69 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76330" version="1" class="patch">
	<metadata>
		<title>libmpfr4-3.1.2-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-9474" ref_url="https://www.suse.com/security/cve/CVE-2014-9474/" source="CVE"/>
		<description>
These are all security issues fixed in the libmpfr4-3.1.2-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9474/">CVE-2014-9474</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105814" comment="libmpfr4-3.1.2-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76331" version="1" class="patch">
	<metadata>
		<title>libmspack0-0.4-14.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2800" ref_url="https://www.suse.com/security/cve/CVE-2010-2800/" source="CVE"/>
		<reference ref_id="CVE-2010-2801" ref_url="https://www.suse.com/security/cve/CVE-2010-2801/" source="CVE"/>
		<reference ref_id="CVE-2014-9556" ref_url="https://www.suse.com/security/cve/CVE-2014-9556/" source="CVE"/>
		<reference ref_id="CVE-2014-9732" ref_url="https://www.suse.com/security/cve/CVE-2014-9732/" source="CVE"/>
		<reference ref_id="CVE-2015-4467" ref_url="https://www.suse.com/security/cve/CVE-2015-4467/" source="CVE"/>
		<reference ref_id="CVE-2015-4468" ref_url="https://www.suse.com/security/cve/CVE-2015-4468/" source="CVE"/>
		<reference ref_id="CVE-2015-4469" ref_url="https://www.suse.com/security/cve/CVE-2015-4469/" source="CVE"/>
		<reference ref_id="CVE-2015-4470" ref_url="https://www.suse.com/security/cve/CVE-2015-4470/" source="CVE"/>
		<reference ref_id="CVE-2015-4471" ref_url="https://www.suse.com/security/cve/CVE-2015-4471/" source="CVE"/>
		<reference ref_id="CVE-2015-4472" ref_url="https://www.suse.com/security/cve/CVE-2015-4472/" source="CVE"/>
		<description>
These are all security issues fixed in the libmspack0-0.4-14.4 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2800/">CVE-2010-2800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2801/">CVE-2010-2801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9556/">CVE-2014-9556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9732/">CVE-2014-9732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4467/">CVE-2015-4467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4468/">CVE-2015-4468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4469/">CVE-2015-4469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4470/">CVE-2015-4470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4471/">CVE-2015-4471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4472/">CVE-2015-4472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009118765" comment="libmspack0-0.4-14.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76332" version="1" class="patch">
	<metadata>
		<title>libmusicbrainz4-2.1.5-27.86 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-4197" ref_url="https://www.suse.com/security/cve/CVE-2006-4197/" source="CVE"/>
		<description>
These are all security issues fixed in the libmusicbrainz4-2.1.5-27.86 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4197/">CVE-2006-4197</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140886" comment="libmusicbrainz4-2.1.5-27.86 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76333" version="1" class="patch">
	<metadata>
		<title>libmysqlclient18-10.0.27-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-5970" ref_url="https://www.suse.com/security/cve/CVE-2007-5970/" source="CVE"/>
		<reference ref_id="CVE-2008-7247" ref_url="https://www.suse.com/security/cve/CVE-2008-7247/" source="CVE"/>
		<reference ref_id="CVE-2009-4019" ref_url="https://www.suse.com/security/cve/CVE-2009-4019/" source="CVE"/>
		<reference ref_id="CVE-2009-4028" ref_url="https://www.suse.com/security/cve/CVE-2009-4028/" source="CVE"/>
		<reference ref_id="CVE-2009-4030" ref_url="https://www.suse.com/security/cve/CVE-2009-4030/" source="CVE"/>
		<reference ref_id="CVE-2010-5298" ref_url="https://www.suse.com/security/cve/CVE-2010-5298/" source="CVE"/>
		<reference ref_id="CVE-2012-5615" ref_url="https://www.suse.com/security/cve/CVE-2012-5615/" source="CVE"/>
		<reference ref_id="CVE-2013-1976" ref_url="https://www.suse.com/security/cve/CVE-2013-1976/" source="CVE"/>
		<reference ref_id="CVE-2014-0195" ref_url="https://www.suse.com/security/cve/CVE-2014-0195/" source="CVE"/>
		<reference ref_id="CVE-2014-0198" ref_url="https://www.suse.com/security/cve/CVE-2014-0198/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-2494" ref_url="https://www.suse.com/security/cve/CVE-2014-2494/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-4207" ref_url="https://www.suse.com/security/cve/CVE-2014-4207/" source="CVE"/>
		<reference ref_id="CVE-2014-4258" ref_url="https://www.suse.com/security/cve/CVE-2014-4258/" source="CVE"/>
		<reference ref_id="CVE-2014-4260" ref_url="https://www.suse.com/security/cve/CVE-2014-4260/" source="CVE"/>
		<reference ref_id="CVE-2014-4274" ref_url="https://www.suse.com/security/cve/CVE-2014-4274/" source="CVE"/>
		<reference ref_id="CVE-2014-4287" ref_url="https://www.suse.com/security/cve/CVE-2014-4287/" source="CVE"/>
		<reference ref_id="CVE-2014-6463" ref_url="https://www.suse.com/security/cve/CVE-2014-6463/" source="CVE"/>
		<reference ref_id="CVE-2014-6464" ref_url="https://www.suse.com/security/cve/CVE-2014-6464/" source="CVE"/>
		<reference ref_id="CVE-2014-6469" ref_url="https://www.suse.com/security/cve/CVE-2014-6469/" source="CVE"/>
		<reference ref_id="CVE-2014-6474" ref_url="https://www.suse.com/security/cve/CVE-2014-6474/" source="CVE"/>
		<reference ref_id="CVE-2014-6478" ref_url="https://www.suse.com/security/cve/CVE-2014-6478/" source="CVE"/>
		<reference ref_id="CVE-2014-6484" ref_url="https://www.suse.com/security/cve/CVE-2014-6484/" source="CVE"/>
		<reference ref_id="CVE-2014-6489" ref_url="https://www.suse.com/security/cve/CVE-2014-6489/" source="CVE"/>
		<reference ref_id="CVE-2014-6491" ref_url="https://www.suse.com/security/cve/CVE-2014-6491/" source="CVE"/>
		<reference ref_id="CVE-2014-6494" ref_url="https://www.suse.com/security/cve/CVE-2014-6494/" source="CVE"/>
		<reference ref_id="CVE-2014-6495" ref_url="https://www.suse.com/security/cve/CVE-2014-6495/" source="CVE"/>
		<reference ref_id="CVE-2014-6496" ref_url="https://www.suse.com/security/cve/CVE-2014-6496/" source="CVE"/>
		<reference ref_id="CVE-2014-6500" ref_url="https://www.suse.com/security/cve/CVE-2014-6500/" source="CVE"/>
		<reference ref_id="CVE-2014-6505" ref_url="https://www.suse.com/security/cve/CVE-2014-6505/" source="CVE"/>
		<reference ref_id="CVE-2014-6507" ref_url="https://www.suse.com/security/cve/CVE-2014-6507/" source="CVE"/>
		<reference ref_id="CVE-2014-6520" ref_url="https://www.suse.com/security/cve/CVE-2014-6520/" source="CVE"/>
		<reference ref_id="CVE-2014-6530" ref_url="https://www.suse.com/security/cve/CVE-2014-6530/" source="CVE"/>
		<reference ref_id="CVE-2014-6551" ref_url="https://www.suse.com/security/cve/CVE-2014-6551/" source="CVE"/>
		<reference ref_id="CVE-2014-6555" ref_url="https://www.suse.com/security/cve/CVE-2014-6555/" source="CVE"/>
		<reference ref_id="CVE-2014-6559" ref_url="https://www.suse.com/security/cve/CVE-2014-6559/" source="CVE"/>
		<reference ref_id="CVE-2014-6564" ref_url="https://www.suse.com/security/cve/CVE-2014-6564/" source="CVE"/>
		<reference ref_id="CVE-2014-6568" ref_url="https://www.suse.com/security/cve/CVE-2014-6568/" source="CVE"/>
		<reference ref_id="CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964/" source="CVE"/>
		<reference ref_id="CVE-2015-0374" ref_url="https://www.suse.com/security/cve/CVE-2015-0374/" source="CVE"/>
		<reference ref_id="CVE-2015-0381" ref_url="https://www.suse.com/security/cve/CVE-2015-0381/" source="CVE"/>
		<reference ref_id="CVE-2015-0382" ref_url="https://www.suse.com/security/cve/CVE-2015-0382/" source="CVE"/>
		<reference ref_id="CVE-2015-0391" ref_url="https://www.suse.com/security/cve/CVE-2015-0391/" source="CVE"/>
		<reference ref_id="CVE-2015-0411" ref_url="https://www.suse.com/security/cve/CVE-2015-0411/" source="CVE"/>
		<reference ref_id="CVE-2015-0432" ref_url="https://www.suse.com/security/cve/CVE-2015-0432/" source="CVE"/>
		<reference ref_id="CVE-2015-0433" ref_url="https://www.suse.com/security/cve/CVE-2015-0433/" source="CVE"/>
		<reference ref_id="CVE-2015-0441" ref_url="https://www.suse.com/security/cve/CVE-2015-0441/" source="CVE"/>
		<reference ref_id="CVE-2015-0499" ref_url="https://www.suse.com/security/cve/CVE-2015-0499/" source="CVE"/>
		<reference ref_id="CVE-2015-0501" ref_url="https://www.suse.com/security/cve/CVE-2015-0501/" source="CVE"/>
		<reference ref_id="CVE-2015-0505" ref_url="https://www.suse.com/security/cve/CVE-2015-0505/" source="CVE"/>
		<reference ref_id="CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325/" source="CVE"/>
		<reference ref_id="CVE-2015-2326" ref_url="https://www.suse.com/security/cve/CVE-2015-2326/" source="CVE"/>
		<reference ref_id="CVE-2015-2568" ref_url="https://www.suse.com/security/cve/CVE-2015-2568/" source="CVE"/>
		<reference ref_id="CVE-2015-2571" ref_url="https://www.suse.com/security/cve/CVE-2015-2571/" source="CVE"/>
		<reference ref_id="CVE-2015-2573" ref_url="https://www.suse.com/security/cve/CVE-2015-2573/" source="CVE"/>
		<reference ref_id="CVE-2015-3152" ref_url="https://www.suse.com/security/cve/CVE-2015-3152/" source="CVE"/>
		<reference ref_id="CVE-2015-4792" ref_url="https://www.suse.com/security/cve/CVE-2015-4792/" source="CVE"/>
		<reference ref_id="CVE-2015-4802" ref_url="https://www.suse.com/security/cve/CVE-2015-4802/" source="CVE"/>
		<reference ref_id="CVE-2015-4807" ref_url="https://www.suse.com/security/cve/CVE-2015-4807/" source="CVE"/>
		<reference ref_id="CVE-2015-4815" ref_url="https://www.suse.com/security/cve/CVE-2015-4815/" source="CVE"/>
		<reference ref_id="CVE-2015-4826" ref_url="https://www.suse.com/security/cve/CVE-2015-4826/" source="CVE"/>
		<reference ref_id="CVE-2015-4830" ref_url="https://www.suse.com/security/cve/CVE-2015-4830/" source="CVE"/>
		<reference ref_id="CVE-2015-4836" ref_url="https://www.suse.com/security/cve/CVE-2015-4836/" source="CVE"/>
		<reference ref_id="CVE-2015-4858" ref_url="https://www.suse.com/security/cve/CVE-2015-4858/" source="CVE"/>
		<reference ref_id="CVE-2015-4861" ref_url="https://www.suse.com/security/cve/CVE-2015-4861/" source="CVE"/>
		<reference ref_id="CVE-2015-4870" ref_url="https://www.suse.com/security/cve/CVE-2015-4870/" source="CVE"/>
		<reference ref_id="CVE-2015-4913" ref_url="https://www.suse.com/security/cve/CVE-2015-4913/" source="CVE"/>
		<reference ref_id="CVE-2015-5969" ref_url="https://www.suse.com/security/cve/CVE-2015-5969/" source="CVE"/>
		<reference ref_id="CVE-2016-0505" ref_url="https://www.suse.com/security/cve/CVE-2016-0505/" source="CVE"/>
		<reference ref_id="CVE-2016-0546" ref_url="https://www.suse.com/security/cve/CVE-2016-0546/" source="CVE"/>
		<reference ref_id="CVE-2016-0596" ref_url="https://www.suse.com/security/cve/CVE-2016-0596/" source="CVE"/>
		<reference ref_id="CVE-2016-0597" ref_url="https://www.suse.com/security/cve/CVE-2016-0597/" source="CVE"/>
		<reference ref_id="CVE-2016-0598" ref_url="https://www.suse.com/security/cve/CVE-2016-0598/" source="CVE"/>
		<reference ref_id="CVE-2016-0600" ref_url="https://www.suse.com/security/cve/CVE-2016-0600/" source="CVE"/>
		<reference ref_id="CVE-2016-0606" ref_url="https://www.suse.com/security/cve/CVE-2016-0606/" source="CVE"/>
		<reference ref_id="CVE-2016-0608" ref_url="https://www.suse.com/security/cve/CVE-2016-0608/" source="CVE"/>
		<reference ref_id="CVE-2016-0609" ref_url="https://www.suse.com/security/cve/CVE-2016-0609/" source="CVE"/>
		<reference ref_id="CVE-2016-0616" ref_url="https://www.suse.com/security/cve/CVE-2016-0616/" source="CVE"/>
		<reference ref_id="CVE-2016-0640" ref_url="https://www.suse.com/security/cve/CVE-2016-0640/" source="CVE"/>
		<reference ref_id="CVE-2016-0641" ref_url="https://www.suse.com/security/cve/CVE-2016-0641/" source="CVE"/>
		<reference ref_id="CVE-2016-0642" ref_url="https://www.suse.com/security/cve/CVE-2016-0642/" source="CVE"/>
		<reference ref_id="CVE-2016-0643" ref_url="https://www.suse.com/security/cve/CVE-2016-0643/" source="CVE"/>
		<reference ref_id="CVE-2016-0644" ref_url="https://www.suse.com/security/cve/CVE-2016-0644/" source="CVE"/>
		<reference ref_id="CVE-2016-0646" ref_url="https://www.suse.com/security/cve/CVE-2016-0646/" source="CVE"/>
		<reference ref_id="CVE-2016-0647" ref_url="https://www.suse.com/security/cve/CVE-2016-0647/" source="CVE"/>
		<reference ref_id="CVE-2016-0648" ref_url="https://www.suse.com/security/cve/CVE-2016-0648/" source="CVE"/>
		<reference ref_id="CVE-2016-0649" ref_url="https://www.suse.com/security/cve/CVE-2016-0649/" source="CVE"/>
		<reference ref_id="CVE-2016-0650" ref_url="https://www.suse.com/security/cve/CVE-2016-0650/" source="CVE"/>
		<reference ref_id="CVE-2016-0651" ref_url="https://www.suse.com/security/cve/CVE-2016-0651/" source="CVE"/>
		<reference ref_id="CVE-2016-0655" ref_url="https://www.suse.com/security/cve/CVE-2016-0655/" source="CVE"/>
		<reference ref_id="CVE-2016-0666" ref_url="https://www.suse.com/security/cve/CVE-2016-0666/" source="CVE"/>
		<reference ref_id="CVE-2016-0668" ref_url="https://www.suse.com/security/cve/CVE-2016-0668/" source="CVE"/>
		<reference ref_id="CVE-2016-2047" ref_url="https://www.suse.com/security/cve/CVE-2016-2047/" source="CVE"/>
		<reference ref_id="CVE-2016-3477" ref_url="https://www.suse.com/security/cve/CVE-2016-3477/" source="CVE"/>
		<reference ref_id="CVE-2016-3521" ref_url="https://www.suse.com/security/cve/CVE-2016-3521/" source="CVE"/>
		<reference ref_id="CVE-2016-3615" ref_url="https://www.suse.com/security/cve/CVE-2016-3615/" source="CVE"/>
		<reference ref_id="CVE-2016-5440" ref_url="https://www.suse.com/security/cve/CVE-2016-5440/" source="CVE"/>
		<reference ref_id="CVE-2016-6662" ref_url="https://www.suse.com/security/cve/CVE-2016-6662/" source="CVE"/>
		<description>
These are all security issues fixed in the libmysqlclient18-10.0.27-12.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5970/">CVE-2007-5970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-7247/">CVE-2008-7247</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4019/">CVE-2009-4019</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4028/">CVE-2009-4028</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4030/">CVE-2009-4030</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5298/">CVE-2010-5298</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5615/">CVE-2012-5615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1976/">CVE-2013-1976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0195/">CVE-2014-0195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0198/">CVE-2014-0198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2494/">CVE-2014-2494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4207/">CVE-2014-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4258/">CVE-2014-4258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4260/">CVE-2014-4260</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4274/">CVE-2014-4274</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4287/">CVE-2014-4287</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6463/">CVE-2014-6463</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6464/">CVE-2014-6464</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6469/">CVE-2014-6469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6474/">CVE-2014-6474</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6478/">CVE-2014-6478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6484/">CVE-2014-6484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6489/">CVE-2014-6489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6491/">CVE-2014-6491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6494/">CVE-2014-6494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6495/">CVE-2014-6495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6496/">CVE-2014-6496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6500/">CVE-2014-6500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6505/">CVE-2014-6505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6507/">CVE-2014-6507</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6520/">CVE-2014-6520</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6530/">CVE-2014-6530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6551/">CVE-2014-6551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6555/">CVE-2014-6555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6559/">CVE-2014-6559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6564/">CVE-2014-6564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6568/">CVE-2014-6568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0374/">CVE-2015-0374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0381/">CVE-2015-0381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0382/">CVE-2015-0382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0391/">CVE-2015-0391</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0411/">CVE-2015-0411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0432/">CVE-2015-0432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0433/">CVE-2015-0433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0441/">CVE-2015-0441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0499/">CVE-2015-0499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0501/">CVE-2015-0501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0505/">CVE-2015-0505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2326/">CVE-2015-2326</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2568/">CVE-2015-2568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2571/">CVE-2015-2571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2573/">CVE-2015-2573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3152/">CVE-2015-3152</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4792/">CVE-2015-4792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4802/">CVE-2015-4802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4807/">CVE-2015-4807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4815/">CVE-2015-4815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4826/">CVE-2015-4826</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4830/">CVE-2015-4830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4836/">CVE-2015-4836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4858/">CVE-2015-4858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4861/">CVE-2015-4861</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4870/">CVE-2015-4870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4913/">CVE-2015-4913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5969/">CVE-2015-5969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0505/">CVE-2016-0505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0546/">CVE-2016-0546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0596/">CVE-2016-0596</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0597/">CVE-2016-0597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0598/">CVE-2016-0598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0600/">CVE-2016-0600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0606/">CVE-2016-0606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0608/">CVE-2016-0608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0609/">CVE-2016-0609</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0616/">CVE-2016-0616</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0640/">CVE-2016-0640</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0641/">CVE-2016-0641</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0642/">CVE-2016-0642</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0643/">CVE-2016-0643</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0644/">CVE-2016-0644</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0646/">CVE-2016-0646</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0647/">CVE-2016-0647</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0648/">CVE-2016-0648</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0649/">CVE-2016-0649</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0650/">CVE-2016-0650</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0651/">CVE-2016-0651</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0655/">CVE-2016-0655</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0666/">CVE-2016-0666</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0668/">CVE-2016-0668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2047/">CVE-2016-2047</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3477/">CVE-2016-3477</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3521/">CVE-2016-3521</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3615/">CVE-2016-3615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5440/">CVE-2016-5440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6662/">CVE-2016-6662</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76334" version="1" class="patch">
	<metadata>
		<title>libndp0-1.6-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2016-3698" ref_url="https://www.suse.com/security/cve/CVE-2016-3698/" source="CVE"/>
		<description>
These are all security issues fixed in the libndp0-1.6-2.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3698/">CVE-2016-3698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142139" comment="libndp0-1.6-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76335" version="1" class="patch">
	<metadata>
		<title>libneon27-0.30.0-3.65 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-2473" ref_url="https://www.suse.com/security/cve/CVE-2009-2473/" source="CVE"/>
		<reference ref_id="CVE-2009-2474" ref_url="https://www.suse.com/security/cve/CVE-2009-2474/" source="CVE"/>
		<description>
These are all security issues fixed in the libneon27-0.30.0-3.65 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2473/">CVE-2009-2473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2474/">CVE-2009-2474</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140887" comment="libneon27-0.30.0-3.65 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76336" version="1" class="patch">
	<metadata>
		<title>libnewt0_52-0.52.16-1.83 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-2905" ref_url="https://www.suse.com/security/cve/CVE-2009-2905/" source="CVE"/>
		<description>
These are all security issues fixed in the libnewt0_52-0.52.16-1.83 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2905/">CVE-2009-2905</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142140" comment="libnewt0_52-0.52.16-1.83 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76337" version="1" class="patch">
	<metadata>
		<title>libopenssl-devel-1.0.2j-55.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-7250" ref_url="https://www.suse.com/security/cve/CVE-2006-7250/" source="CVE"/>
		<reference ref_id="CVE-2008-5077" ref_url="https://www.suse.com/security/cve/CVE-2008-5077/" source="CVE"/>
		<reference ref_id="CVE-2009-0590" ref_url="https://www.suse.com/security/cve/CVE-2009-0590/" source="CVE"/>
		<reference ref_id="CVE-2009-0591" ref_url="https://www.suse.com/security/cve/CVE-2009-0591/" source="CVE"/>
		<reference ref_id="CVE-2009-0789" ref_url="https://www.suse.com/security/cve/CVE-2009-0789/" source="CVE"/>
		<reference ref_id="CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377/" source="CVE"/>
		<reference ref_id="CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378/" source="CVE"/>
		<reference ref_id="CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379/" source="CVE"/>
		<reference ref_id="CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386/" source="CVE"/>
		<reference ref_id="CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387/" source="CVE"/>
		<reference ref_id="CVE-2010-0740" ref_url="https://www.suse.com/security/cve/CVE-2010-0740/" source="CVE"/>
		<reference ref_id="CVE-2010-0742" ref_url="https://www.suse.com/security/cve/CVE-2010-0742/" source="CVE"/>
		<reference ref_id="CVE-2010-1633" ref_url="https://www.suse.com/security/cve/CVE-2010-1633/" source="CVE"/>
		<reference ref_id="CVE-2010-2939" ref_url="https://www.suse.com/security/cve/CVE-2010-2939/" source="CVE"/>
		<reference ref_id="CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864/" source="CVE"/>
		<reference ref_id="CVE-2010-5298" ref_url="https://www.suse.com/security/cve/CVE-2010-5298/" source="CVE"/>
		<reference ref_id="CVE-2011-0014" ref_url="https://www.suse.com/security/cve/CVE-2011-0014/" source="CVE"/>
		<reference ref_id="CVE-2011-3207" ref_url="https://www.suse.com/security/cve/CVE-2011-3207/" source="CVE"/>
		<reference ref_id="CVE-2011-3210" ref_url="https://www.suse.com/security/cve/CVE-2011-3210/" source="CVE"/>
		<reference ref_id="CVE-2011-4108" ref_url="https://www.suse.com/security/cve/CVE-2011-4108/" source="CVE"/>
		<reference ref_id="CVE-2011-4576" ref_url="https://www.suse.com/security/cve/CVE-2011-4576/" source="CVE"/>
		<reference ref_id="CVE-2011-4577" ref_url="https://www.suse.com/security/cve/CVE-2011-4577/" source="CVE"/>
		<reference ref_id="CVE-2011-4619" ref_url="https://www.suse.com/security/cve/CVE-2011-4619/" source="CVE"/>
		<reference ref_id="CVE-2012-0027" ref_url="https://www.suse.com/security/cve/CVE-2012-0027/" source="CVE"/>
		<reference ref_id="CVE-2012-0050" ref_url="https://www.suse.com/security/cve/CVE-2012-0050/" source="CVE"/>
		<reference ref_id="CVE-2012-0884" ref_url="https://www.suse.com/security/cve/CVE-2012-0884/" source="CVE"/>
		<reference ref_id="CVE-2012-1165" ref_url="https://www.suse.com/security/cve/CVE-2012-1165/" source="CVE"/>
		<reference ref_id="CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110/" source="CVE"/>
		<reference ref_id="CVE-2012-2686" ref_url="https://www.suse.com/security/cve/CVE-2012-2686/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2013-4353" ref_url="https://www.suse.com/security/cve/CVE-2013-4353/" source="CVE"/>
		<reference ref_id="CVE-2013-6449" ref_url="https://www.suse.com/security/cve/CVE-2013-6449/" source="CVE"/>
		<reference ref_id="CVE-2013-6450" ref_url="https://www.suse.com/security/cve/CVE-2013-6450/" source="CVE"/>
		<reference ref_id="CVE-2014-0076" ref_url="https://www.suse.com/security/cve/CVE-2014-0076/" source="CVE"/>
		<reference ref_id="CVE-2014-0160" ref_url="https://www.suse.com/security/cve/CVE-2014-0160/" source="CVE"/>
		<reference ref_id="CVE-2014-0195" ref_url="https://www.suse.com/security/cve/CVE-2014-0195/" source="CVE"/>
		<reference ref_id="CVE-2014-0198" ref_url="https://www.suse.com/security/cve/CVE-2014-0198/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-3505" ref_url="https://www.suse.com/security/cve/CVE-2014-3505/" source="CVE"/>
		<reference ref_id="CVE-2014-3506" ref_url="https://www.suse.com/security/cve/CVE-2014-3506/" source="CVE"/>
		<reference ref_id="CVE-2014-3507" ref_url="https://www.suse.com/security/cve/CVE-2014-3507/" source="CVE"/>
		<reference ref_id="CVE-2014-3508" ref_url="https://www.suse.com/security/cve/CVE-2014-3508/" source="CVE"/>
		<reference ref_id="CVE-2014-3509" ref_url="https://www.suse.com/security/cve/CVE-2014-3509/" source="CVE"/>
		<reference ref_id="CVE-2014-3510" ref_url="https://www.suse.com/security/cve/CVE-2014-3510/" source="CVE"/>
		<reference ref_id="CVE-2014-3511" ref_url="https://www.suse.com/security/cve/CVE-2014-3511/" source="CVE"/>
		<reference ref_id="CVE-2014-3512" ref_url="https://www.suse.com/security/cve/CVE-2014-3512/" source="CVE"/>
		<reference ref_id="CVE-2014-3513" ref_url="https://www.suse.com/security/cve/CVE-2014-3513/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-5139" ref_url="https://www.suse.com/security/cve/CVE-2014-5139/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0206" ref_url="https://www.suse.com/security/cve/CVE-2015-0206/" source="CVE"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791/" source="CVE"/>
		<reference ref_id="CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792/" source="CVE"/>
		<reference ref_id="CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194/" source="CVE"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="CVE-2015-3196" ref_url="https://www.suse.com/security/cve/CVE-2015-3196/" source="CVE"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2015-3216" ref_url="https://www.suse.com/security/cve/CVE-2015-3216/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0798" ref_url="https://www.suse.com/security/cve/CVE-2016-0798/" source="CVE"/>
		<reference ref_id="CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2107" ref_url="https://www.suse.com/security/cve/CVE-2016-2107/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="CVE-2016-2176" ref_url="https://www.suse.com/security/cve/CVE-2016-2176/" source="CVE"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2180" ref_url="https://www.suse.com/security/cve/CVE-2016-2180/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="CVE-2016-7052" ref_url="https://www.suse.com/security/cve/CVE-2016-7052/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-devel-1.0.2j-55.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7250/">CVE-2006-7250</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5077/">CVE-2008-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0590/">CVE-2009-0590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0591/">CVE-2009-0591</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0789/">CVE-2009-0789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0740/">CVE-2010-0740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0742/">CVE-2010-0742</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-1633/">CVE-2010-1633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2939/">CVE-2010-2939</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5298/">CVE-2010-5298</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0014/">CVE-2011-0014</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3207/">CVE-2011-3207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3210/">CVE-2011-3210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4108/">CVE-2011-4108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4576/">CVE-2011-4576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4577/">CVE-2011-4577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4619/">CVE-2011-4619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0027/">CVE-2012-0027</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0050/">CVE-2012-0050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0884/">CVE-2012-0884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1165/">CVE-2012-1165</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2686/">CVE-2012-2686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4353/">CVE-2013-4353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6449/">CVE-2013-6449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6450/">CVE-2013-6450</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0076/">CVE-2014-0076</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0160/">CVE-2014-0160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0195/">CVE-2014-0195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0198/">CVE-2014-0198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3505/">CVE-2014-3505</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3506/">CVE-2014-3506</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3507/">CVE-2014-3507</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3508/">CVE-2014-3508</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3509/">CVE-2014-3509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3510/">CVE-2014-3510</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3511/">CVE-2014-3511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3512/">CVE-2014-3512</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-3513/">CVE-2014-3513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-5139/">CVE-2014-5139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0206/">CVE-2015-0206</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3196/">CVE-2015-3196</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3216/">CVE-2015-3216</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0798/">CVE-2016-0798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2107/">CVE-2016-2107</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2176/">CVE-2016-2176</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2180/">CVE-2016-2180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7052/">CVE-2016-7052</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76338" version="1" class="patch">
	<metadata>
		<title>libopenssl0_9_8-0.9.8j-102.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-7250" ref_url="https://www.suse.com/security/cve/CVE-2006-7250/" source="CVE"/>
		<reference ref_id="CVE-2009-0590" ref_url="https://www.suse.com/security/cve/CVE-2009-0590/" source="CVE"/>
		<reference ref_id="CVE-2009-0591" ref_url="https://www.suse.com/security/cve/CVE-2009-0591/" source="CVE"/>
		<reference ref_id="CVE-2009-0789" ref_url="https://www.suse.com/security/cve/CVE-2009-0789/" source="CVE"/>
		<reference ref_id="CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377/" source="CVE"/>
		<reference ref_id="CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378/" source="CVE"/>
		<reference ref_id="CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379/" source="CVE"/>
		<reference ref_id="CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386/" source="CVE"/>
		<reference ref_id="CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387/" source="CVE"/>
		<reference ref_id="CVE-2009-3245" ref_url="https://www.suse.com/security/cve/CVE-2009-3245/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-4355" ref_url="https://www.suse.com/security/cve/CVE-2009-4355/" source="CVE"/>
		<reference ref_id="CVE-2009-5146" ref_url="https://www.suse.com/security/cve/CVE-2009-5146/" source="CVE"/>
		<reference ref_id="CVE-2010-0740" ref_url="https://www.suse.com/security/cve/CVE-2010-0740/" source="CVE"/>
		<reference ref_id="CVE-2010-2939" ref_url="https://www.suse.com/security/cve/CVE-2010-2939/" source="CVE"/>
		<reference ref_id="CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864/" source="CVE"/>
		<reference ref_id="CVE-2010-4180" ref_url="https://www.suse.com/security/cve/CVE-2010-4180/" source="CVE"/>
		<reference ref_id="CVE-2010-4252" ref_url="https://www.suse.com/security/cve/CVE-2010-4252/" source="CVE"/>
		<reference ref_id="CVE-2011-0014" ref_url="https://www.suse.com/security/cve/CVE-2011-0014/" source="CVE"/>
		<reference ref_id="CVE-2011-3210" ref_url="https://www.suse.com/security/cve/CVE-2011-3210/" source="CVE"/>
		<reference ref_id="CVE-2011-4108" ref_url="https://www.suse.com/security/cve/CVE-2011-4108/" source="CVE"/>
		<reference ref_id="CVE-2011-4109" ref_url="https://www.suse.com/security/cve/CVE-2011-4109/" source="CVE"/>
		<reference ref_id="CVE-2011-4354" ref_url="https://www.suse.com/security/cve/CVE-2011-4354/" source="CVE"/>
		<reference ref_id="CVE-2011-4576" ref_url="https://www.suse.com/security/cve/CVE-2011-4576/" source="CVE"/>
		<reference ref_id="CVE-2011-4577" ref_url="https://www.suse.com/security/cve/CVE-2011-4577/" source="CVE"/>
		<reference ref_id="CVE-2011-4619" ref_url="https://www.suse.com/security/cve/CVE-2011-4619/" source="CVE"/>
		<reference ref_id="CVE-2011-5095" ref_url="https://www.suse.com/security/cve/CVE-2011-5095/" source="CVE"/>
		<reference ref_id="CVE-2012-0050" ref_url="https://www.suse.com/security/cve/CVE-2012-0050/" source="CVE"/>
		<reference ref_id="CVE-2012-0884" ref_url="https://www.suse.com/security/cve/CVE-2012-0884/" source="CVE"/>
		<reference ref_id="CVE-2012-1165" ref_url="https://www.suse.com/security/cve/CVE-2012-1165/" source="CVE"/>
		<reference ref_id="CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110/" source="CVE"/>
		<reference ref_id="CVE-2012-2131" ref_url="https://www.suse.com/security/cve/CVE-2012-2131/" source="CVE"/>
		<reference ref_id="CVE-2012-2333" ref_url="https://www.suse.com/security/cve/CVE-2012-2333/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2014-0076" ref_url="https://www.suse.com/security/cve/CVE-2014-0076/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-3505" ref_url="https://www.suse.com/security/cve/CVE-2014-3505/" source="CVE"/>
		<reference ref_id="CVE-2014-3506" ref_url="https://www.suse.com/security/cve/CVE-2014-3506/" source="CVE"/>
		<reference ref_id="CVE-2014-3507" ref_url="https://www.suse.com/security/cve/CVE-2014-3507/" source="CVE"/>
		<reference ref_id="CVE-2014-3508" ref_url="https://www.suse.com/security/cve/CVE-2014-3508/" source="CVE"/>
		<reference ref_id="CVE-2014-3510" ref_url="https://www.suse.com/security/cve/CVE-2014-3510/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0292" ref_url="https://www.suse.com/security/cve/CVE-2015-0292/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791/" source="CVE"/>
		<reference ref_id="CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792/" source="CVE"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2015-3216" ref_url="https://www.suse.com/security/cve/CVE-2015-3216/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl0_9_8-0.9.8j-102.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7250/">CVE-2006-7250</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0590/">CVE-2009-0590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0591/">CVE-2009-0591</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0789/">CVE-2009-0789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3245/">CVE-2009-3245</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4355/">CVE-2009-4355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5146/">CVE-2009-5146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0740/">CVE-2010-0740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2939/">CVE-2010-2939</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4180/">CVE-2010-4180</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4252/">CVE-2010-4252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0014/">CVE-2011-0014</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3210/">CVE-2011-3210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4108/">CVE-2011-4108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4109/">CVE-2011-4109</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4354/">CVE-2011-4354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4576/">CVE-2011-4576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4577/">CVE-2011-4577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4619/">CVE-2011-4619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5095/">CVE-2011-5095</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0050/">CVE-2012-0050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0884/">CVE-2012-0884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1165/">CVE-2012-1165</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2131/">CVE-2012-2131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2333/">CVE-2012-2333</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0076/">CVE-2014-0076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3505/">CVE-2014-3505</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3506/">CVE-2014-3506</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3507/">CVE-2014-3507</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3508/">CVE-2014-3508</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3510/">CVE-2014-3510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0292/">CVE-2015-0292</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3216/">CVE-2015-3216</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131148" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131149" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76339" version="1" class="patch">
	<metadata>
		<title>libotr5-4.0.0-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2016-2851" ref_url="https://www.suse.com/security/cve/CVE-2016-2851/" source="CVE"/>
		<description>
These are all security issues fixed in the libotr5-4.0.0-9.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2851/">CVE-2016-2851</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124478" comment="libotr5-4.0.0-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76340" version="1" class="patch">
	<metadata>
		<title>libpango-1_0-0-1.40.1-9.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-0020" ref_url="https://www.suse.com/security/cve/CVE-2011-0020/" source="CVE"/>
		<reference ref_id="CVE-2011-0064" ref_url="https://www.suse.com/security/cve/CVE-2011-0064/" source="CVE"/>
		<description>
These are all security issues fixed in the libpango-1_0-0-1.40.1-9.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0020/">CVE-2011-0020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0064/">CVE-2011-0064</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140897" comment="libpango-1_0-0-1.40.1-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140898" comment="libpango-1_0-0-32bit-1.40.1-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140899" comment="typelib-1_0-Pango-1_0-1.40.1-9.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76341" version="1" class="patch">
	<metadata>
		<title>libpcsclite1-1.8.10-3.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-0407" ref_url="https://www.suse.com/security/cve/CVE-2010-0407/" source="CVE"/>
		<reference ref_id="CVE-2010-4531" ref_url="https://www.suse.com/security/cve/CVE-2010-4531/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcsclite1-1.8.10-3.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0407/">CVE-2010-0407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4531/">CVE-2010-4531</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140900" comment="libpcsclite1-1.8.10-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141582" comment="libpcsclite1-32bit-1.8.10-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140901" comment="pcsc-lite-1.8.10-3.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76342" version="1" class="patch">
	<metadata>
		<title>libpng12-0-1.2.50-13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3045" ref_url="https://www.suse.com/security/cve/CVE-2011-3045/" source="CVE"/>
		<reference ref_id="CVE-2011-3048" ref_url="https://www.suse.com/security/cve/CVE-2011-3048/" source="CVE"/>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<reference ref_id="CVE-2013-7353" ref_url="https://www.suse.com/security/cve/CVE-2013-7353/" source="CVE"/>
		<reference ref_id="CVE-2013-7354" ref_url="https://www.suse.com/security/cve/CVE-2013-7354/" source="CVE"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng12-0-1.2.50-13.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3045/">CVE-2011-3045</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3048/">CVE-2011-3048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7353/">CVE-2013-7353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7354/">CVE-2013-7354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009119221" comment="libpng12-0-1.2.50-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009119222" comment="libpng12-0-32bit-1.2.50-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76343" version="1" class="patch">
	<metadata>
		<title>libpng15-15-1.5.22-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501/" source="CVE"/>
		<reference ref_id="CVE-2011-2690" ref_url="https://www.suse.com/security/cve/CVE-2011-2690/" source="CVE"/>
		<reference ref_id="CVE-2011-2691" ref_url="https://www.suse.com/security/cve/CVE-2011-2691/" source="CVE"/>
		<reference ref_id="CVE-2011-2692" ref_url="https://www.suse.com/security/cve/CVE-2011-2692/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3048" ref_url="https://www.suse.com/security/cve/CVE-2011-3048/" source="CVE"/>
		<reference ref_id="CVE-2011-3328" ref_url="https://www.suse.com/security/cve/CVE-2011-3328/" source="CVE"/>
		<reference ref_id="CVE-2011-3464" ref_url="https://www.suse.com/security/cve/CVE-2011-3464/" source="CVE"/>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng15-15-1.5.22-4.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2690/">CVE-2011-2690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2691/">CVE-2011-2691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2692/">CVE-2011-2692</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3048/">CVE-2011-3048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3328/">CVE-2011-3328</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3464/">CVE-2011-3464</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009119233" comment="libpng15-15-1.5.22-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76344" version="1" class="patch">
	<metadata>
		<title>libpng16-16-1.6.8-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501/" source="CVE"/>
		<reference ref_id="CVE-2011-2690" ref_url="https://www.suse.com/security/cve/CVE-2011-2690/" source="CVE"/>
		<reference ref_id="CVE-2011-2691" ref_url="https://www.suse.com/security/cve/CVE-2011-2691/" source="CVE"/>
		<reference ref_id="CVE-2011-2692" ref_url="https://www.suse.com/security/cve/CVE-2011-2692/" source="CVE"/>
		<reference ref_id="CVE-2011-3328" ref_url="https://www.suse.com/security/cve/CVE-2011-3328/" source="CVE"/>
		<reference ref_id="CVE-2013-6954" ref_url="https://www.suse.com/security/cve/CVE-2013-6954/" source="CVE"/>
		<reference ref_id="CVE-2014-0333" ref_url="https://www.suse.com/security/cve/CVE-2014-0333/" source="CVE"/>
		<reference ref_id="CVE-2014-9495" ref_url="https://www.suse.com/security/cve/CVE-2014-9495/" source="CVE"/>
		<reference ref_id="CVE-2015-0973" ref_url="https://www.suse.com/security/cve/CVE-2015-0973/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng16-16-1.6.8-11.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2690/">CVE-2011-2690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2691/">CVE-2011-2691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2692/">CVE-2011-2692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3328/">CVE-2011-3328</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6954/">CVE-2013-6954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0333/">CVE-2014-0333</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9495/">CVE-2014-9495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0973/">CVE-2015-0973</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009119224" comment="libpng16-16-1.6.8-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009119225" comment="libpng16-16-32bit-1.6.8-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76345" version="1" class="patch">
	<metadata>
		<title>libpolkit0-0.113-5.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-0750" ref_url="https://www.suse.com/security/cve/CVE-2010-0750/" source="CVE"/>
		<reference ref_id="CVE-2011-1485" ref_url="https://www.suse.com/security/cve/CVE-2011-1485/" source="CVE"/>
		<reference ref_id="CVE-2013-4288" ref_url="https://www.suse.com/security/cve/CVE-2013-4288/" source="CVE"/>
		<reference ref_id="CVE-2015-3218" ref_url="https://www.suse.com/security/cve/CVE-2015-3218/" source="CVE"/>
		<reference ref_id="CVE-2015-3255" ref_url="https://www.suse.com/security/cve/CVE-2015-3255/" source="CVE"/>
		<reference ref_id="CVE-2015-3256" ref_url="https://www.suse.com/security/cve/CVE-2015-3256/" source="CVE"/>
		<reference ref_id="CVE-2015-4625" ref_url="https://www.suse.com/security/cve/CVE-2015-4625/" source="CVE"/>
		<description>
These are all security issues fixed in the libpolkit0-0.113-5.6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0750/">CVE-2010-0750</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1485/">CVE-2011-1485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4288/">CVE-2013-4288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3218/">CVE-2015-3218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3255/">CVE-2015-3255</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3256/">CVE-2015-3256</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4625/">CVE-2015-4625</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140902" comment="libpolkit0-0.113-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142141" comment="libpolkit0-32bit-0.113-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140903" comment="polkit-0.113-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140904" comment="typelib-1_0-Polkit-1_0-0.113-5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76346" version="1" class="patch">
	<metadata>
		<title>libpoppler-glib8-0.43.0-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0799" ref_url="https://www.suse.com/security/cve/CVE-2009-0799/" source="CVE"/>
		<reference ref_id="CVE-2009-0800" ref_url="https://www.suse.com/security/cve/CVE-2009-0800/" source="CVE"/>
		<reference ref_id="CVE-2009-1179" ref_url="https://www.suse.com/security/cve/CVE-2009-1179/" source="CVE"/>
		<reference ref_id="CVE-2009-1180" ref_url="https://www.suse.com/security/cve/CVE-2009-1180/" source="CVE"/>
		<reference ref_id="CVE-2009-1181" ref_url="https://www.suse.com/security/cve/CVE-2009-1181/" source="CVE"/>
		<reference ref_id="CVE-2009-1182" ref_url="https://www.suse.com/security/cve/CVE-2009-1182/" source="CVE"/>
		<reference ref_id="CVE-2009-1183" ref_url="https://www.suse.com/security/cve/CVE-2009-1183/" source="CVE"/>
		<reference ref_id="CVE-2009-1187" ref_url="https://www.suse.com/security/cve/CVE-2009-1187/" source="CVE"/>
		<reference ref_id="CVE-2009-1188" ref_url="https://www.suse.com/security/cve/CVE-2009-1188/" source="CVE"/>
		<reference ref_id="CVE-2009-3607" ref_url="https://www.suse.com/security/cve/CVE-2009-3607/" source="CVE"/>
		<reference ref_id="CVE-2009-3608" ref_url="https://www.suse.com/security/cve/CVE-2009-3608/" source="CVE"/>
		<reference ref_id="CVE-2013-1788" ref_url="https://www.suse.com/security/cve/CVE-2013-1788/" source="CVE"/>
		<reference ref_id="CVE-2013-1789" ref_url="https://www.suse.com/security/cve/CVE-2013-1789/" source="CVE"/>
		<reference ref_id="CVE-2013-1790" ref_url="https://www.suse.com/security/cve/CVE-2013-1790/" source="CVE"/>
		<reference ref_id="CVE-2013-4473" ref_url="https://www.suse.com/security/cve/CVE-2013-4473/" source="CVE"/>
		<reference ref_id="CVE-2013-4474" ref_url="https://www.suse.com/security/cve/CVE-2013-4474/" source="CVE"/>
		<description>
These are all security issues fixed in the libpoppler-glib8-0.43.0-15.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0799/">CVE-2009-0799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0800/">CVE-2009-0800</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1179/">CVE-2009-1179</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1180/">CVE-2009-1180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1181/">CVE-2009-1181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1182/">CVE-2009-1182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1183/">CVE-2009-1183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1187/">CVE-2009-1187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1188/">CVE-2009-1188</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3607/">CVE-2009-3607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3608/">CVE-2009-3608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1788/">CVE-2013-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1789/">CVE-2013-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1790/">CVE-2013-1790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4473/">CVE-2013-4473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4474/">CVE-2013-4474</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76347" version="1" class="patch">
	<metadata>
		<title>libpoppler44-0.24.4-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0799" ref_url="https://www.suse.com/security/cve/CVE-2009-0799/" source="CVE"/>
		<reference ref_id="CVE-2009-0800" ref_url="https://www.suse.com/security/cve/CVE-2009-0800/" source="CVE"/>
		<reference ref_id="CVE-2009-1179" ref_url="https://www.suse.com/security/cve/CVE-2009-1179/" source="CVE"/>
		<reference ref_id="CVE-2009-1180" ref_url="https://www.suse.com/security/cve/CVE-2009-1180/" source="CVE"/>
		<reference ref_id="CVE-2009-1181" ref_url="https://www.suse.com/security/cve/CVE-2009-1181/" source="CVE"/>
		<reference ref_id="CVE-2009-1182" ref_url="https://www.suse.com/security/cve/CVE-2009-1182/" source="CVE"/>
		<reference ref_id="CVE-2009-1183" ref_url="https://www.suse.com/security/cve/CVE-2009-1183/" source="CVE"/>
		<reference ref_id="CVE-2009-1187" ref_url="https://www.suse.com/security/cve/CVE-2009-1187/" source="CVE"/>
		<reference ref_id="CVE-2009-1188" ref_url="https://www.suse.com/security/cve/CVE-2009-1188/" source="CVE"/>
		<reference ref_id="CVE-2009-3607" ref_url="https://www.suse.com/security/cve/CVE-2009-3607/" source="CVE"/>
		<reference ref_id="CVE-2009-3608" ref_url="https://www.suse.com/security/cve/CVE-2009-3608/" source="CVE"/>
		<reference ref_id="CVE-2013-1788" ref_url="https://www.suse.com/security/cve/CVE-2013-1788/" source="CVE"/>
		<reference ref_id="CVE-2013-1789" ref_url="https://www.suse.com/security/cve/CVE-2013-1789/" source="CVE"/>
		<reference ref_id="CVE-2013-1790" ref_url="https://www.suse.com/security/cve/CVE-2013-1790/" source="CVE"/>
		<reference ref_id="CVE-2013-4473" ref_url="https://www.suse.com/security/cve/CVE-2013-4473/" source="CVE"/>
		<reference ref_id="CVE-2013-4474" ref_url="https://www.suse.com/security/cve/CVE-2013-4474/" source="CVE"/>
		<reference ref_id="CVE-2015-8868" ref_url="https://www.suse.com/security/cve/CVE-2015-8868/" source="CVE"/>
		<description>
These are all security issues fixed in the libpoppler44-0.24.4-12.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0799/">CVE-2009-0799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0800/">CVE-2009-0800</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1179/">CVE-2009-1179</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1180/">CVE-2009-1180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1181/">CVE-2009-1181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1182/">CVE-2009-1182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1183/">CVE-2009-1183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1187/">CVE-2009-1187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1188/">CVE-2009-1188</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3607/">CVE-2009-3607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3608/">CVE-2009-3608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1788/">CVE-2013-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1789/">CVE-2013-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1790/">CVE-2013-1790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4473/">CVE-2013-4473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4474/">CVE-2013-4474</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8868/">CVE-2015-8868</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76348" version="1" class="patch">
	<metadata>
		<title>libproxy1-0.4.13-16.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-4504" ref_url="https://www.suse.com/security/cve/CVE-2012-4504/" source="CVE"/>
		<description>
These are all security issues fixed in the libproxy1-0.4.13-16.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4504/">CVE-2012-4504</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140909" comment="libproxy1-0.4.13-16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140910" comment="libproxy1-32bit-0.4.13-16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140911" comment="libproxy1-config-gnome3-0.4.13-16.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140912" comment="libproxy1-config-gnome3-32bit-0.4.13-16.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140913" comment="libproxy1-networkmanager-0.4.13-16.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142142" comment="libproxy1-networkmanager-32bit-0.4.13-16.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140914" comment="libproxy1-pacrunner-webkit-0.4.13-16.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76349" version="1" class="patch">
	<metadata>
		<title>libpulse-mainloop-glib0-32bit-5.0-2.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-3970" ref_url="https://www.suse.com/security/cve/CVE-2014-3970/" source="CVE"/>
		<description>
These are all security issues fixed in the libpulse-mainloop-glib0-32bit-5.0-2.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3970/">CVE-2014-3970</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140915" comment="libpulse-mainloop-glib0-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140916" comment="libpulse-mainloop-glib0-32bit-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140917" comment="libpulse0-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140918" comment="libpulse0-32bit-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140919" comment="pulseaudio-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140920" comment="pulseaudio-esound-compat-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140921" comment="pulseaudio-gdm-hooks-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140922" comment="pulseaudio-lang-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141601" comment="pulseaudio-module-bluetooth-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141602" comment="pulseaudio-module-gconf-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141603" comment="pulseaudio-module-jack-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141604" comment="pulseaudio-module-lirc-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140923" comment="pulseaudio-module-x11-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140924" comment="pulseaudio-module-zeroconf-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140925" comment="pulseaudio-utils-5.0-2.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76350" version="1" class="patch">
	<metadata>
		<title>libpython2_7-1_0-2.7.9-24.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1521" ref_url="https://www.suse.com/security/cve/CVE-2011-1521/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-1753" ref_url="https://www.suse.com/security/cve/CVE-2013-1753/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-1912" ref_url="https://www.suse.com/security/cve/CVE-2014-1912/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2014-7185" ref_url="https://www.suse.com/security/cve/CVE-2014-7185/" source="CVE"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<description>
These are all security issues fixed in the libpython2_7-1_0-2.7.9-24.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1521/">CVE-2011-1521</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1753/">CVE-2013-1753</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1912/">CVE-2014-1912</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7185/">CVE-2014-7185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130996" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130997" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130999" comment="python-base-2.7.9-24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131001" comment="python-devel-2.7.9-24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131003" comment="python-xml-2.7.9-24.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76351" version="1" class="patch">
	<metadata>
		<title>libpython3_4m1_0-3.4.1-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-2667" ref_url="https://www.suse.com/security/cve/CVE-2014-2667/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<description>
These are all security issues fixed in the libpython3_4m1_0-3.4.1-12.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-2667/">CVE-2014-2667</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140926" comment="libpython3_4m1_0-3.4.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140927" comment="python3-base-3.4.1-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76352" version="1" class="patch">
	<metadata>
		<title>libqt4-32bit-4.8.6-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0945" ref_url="https://www.suse.com/security/cve/CVE-2009-0945/" source="CVE"/>
		<reference ref_id="CVE-2011-3193" ref_url="https://www.suse.com/security/cve/CVE-2011-3193/" source="CVE"/>
		<reference ref_id="CVE-2011-3922" ref_url="https://www.suse.com/security/cve/CVE-2011-3922/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2012-6093" ref_url="https://www.suse.com/security/cve/CVE-2012-6093/" source="CVE"/>
		<reference ref_id="CVE-2013-0254" ref_url="https://www.suse.com/security/cve/CVE-2013-0254/" source="CVE"/>
		<reference ref_id="CVE-2013-4549" ref_url="https://www.suse.com/security/cve/CVE-2013-4549/" source="CVE"/>
		<reference ref_id="CVE-2014-0190" ref_url="https://www.suse.com/security/cve/CVE-2014-0190/" source="CVE"/>
		<reference ref_id="CVE-2015-0295" ref_url="https://www.suse.com/security/cve/CVE-2015-0295/" source="CVE"/>
		<reference ref_id="CVE-2015-1858" ref_url="https://www.suse.com/security/cve/CVE-2015-1858/" source="CVE"/>
		<reference ref_id="CVE-2015-1859" ref_url="https://www.suse.com/security/cve/CVE-2015-1859/" source="CVE"/>
		<reference ref_id="CVE-2015-1860" ref_url="https://www.suse.com/security/cve/CVE-2015-1860/" source="CVE"/>
		<description>
These are all security issues fixed in the libqt4-32bit-4.8.6-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0945/">CVE-2009-0945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3193/">CVE-2011-3193</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3922/">CVE-2011-3922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6093/">CVE-2012-6093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0254/">CVE-2013-0254</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4549/">CVE-2013-4549</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0190/">CVE-2014-0190</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0295/">CVE-2015-0295</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1858/">CVE-2015-1858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1859/">CVE-2015-1859</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1860/">CVE-2015-1860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125275" comment="libqt4-sql-mysql-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125277" comment="libqt4-sql-postgresql-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125278" comment="libqt4-sql-postgresql-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125280" comment="libqt4-sql-sqlite-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125281" comment="libqt4-sql-unixODBC-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125282" comment="libqt4-sql-unixODBC-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76353" version="1" class="patch">
	<metadata>
		<title>libraptor2-0-2.0.10-3.67 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-0037" ref_url="https://www.suse.com/security/cve/CVE-2012-0037/" source="CVE"/>
		<description>
These are all security issues fixed in the libraptor2-0-2.0.10-3.67 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0037/">CVE-2012-0037</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140928" comment="libraptor2-0-2.0.10-3.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141628" comment="raptor-2.0.10-3.67 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76354" version="1" class="patch">
	<metadata>
		<title>libraw9-0.15.4-3.88 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-2126" ref_url="https://www.suse.com/security/cve/CVE-2013-2126/" source="CVE"/>
		<reference ref_id="CVE-2013-2127" ref_url="https://www.suse.com/security/cve/CVE-2013-2127/" source="CVE"/>
		<description>
These are all security issues fixed in the libraw9-0.15.4-3.88 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2126/">CVE-2013-2126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2127/">CVE-2013-2127</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141629" comment="libraw9-0.15.4-3.88 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76355" version="1" class="patch">
	<metadata>
		<title>libreoffice-5.1.5.2-29.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2935" ref_url="https://www.suse.com/security/cve/CVE-2010-2935/" source="CVE"/>
		<reference ref_id="CVE-2010-2936" ref_url="https://www.suse.com/security/cve/CVE-2010-2936/" source="CVE"/>
		<reference ref_id="CVE-2014-0247" ref_url="https://www.suse.com/security/cve/CVE-2014-0247/" source="CVE"/>
		<reference ref_id="CVE-2014-3524" ref_url="https://www.suse.com/security/cve/CVE-2014-3524/" source="CVE"/>
		<reference ref_id="CVE-2014-3575" ref_url="https://www.suse.com/security/cve/CVE-2014-3575/" source="CVE"/>
		<reference ref_id="CVE-2014-3693" ref_url="https://www.suse.com/security/cve/CVE-2014-3693/" source="CVE"/>
		<reference ref_id="CVE-2014-8146" ref_url="https://www.suse.com/security/cve/CVE-2014-8146/" source="CVE"/>
		<reference ref_id="CVE-2014-8147" ref_url="https://www.suse.com/security/cve/CVE-2014-8147/" source="CVE"/>
		<reference ref_id="CVE-2014-9093" ref_url="https://www.suse.com/security/cve/CVE-2014-9093/" source="CVE"/>
		<reference ref_id="CVE-2015-4551" ref_url="https://www.suse.com/security/cve/CVE-2015-4551/" source="CVE"/>
		<reference ref_id="CVE-2015-5212" ref_url="https://www.suse.com/security/cve/CVE-2015-5212/" source="CVE"/>
		<reference ref_id="CVE-2015-5213" ref_url="https://www.suse.com/security/cve/CVE-2015-5213/" source="CVE"/>
		<reference ref_id="CVE-2015-5214" ref_url="https://www.suse.com/security/cve/CVE-2015-5214/" source="CVE"/>
		<reference ref_id="CVE-2016-0794" ref_url="https://www.suse.com/security/cve/CVE-2016-0794/" source="CVE"/>
		<reference ref_id="CVE-2016-0795" ref_url="https://www.suse.com/security/cve/CVE-2016-0795/" source="CVE"/>
		<reference ref_id="CVE-2016-4324" ref_url="https://www.suse.com/security/cve/CVE-2016-4324/" source="CVE"/>
		<description>
These are all security issues fixed in the libreoffice-5.1.5.2-29.4 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2935/">CVE-2010-2935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2936/">CVE-2010-2936</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0247/">CVE-2014-0247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3524/">CVE-2014-3524</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3575/">CVE-2014-3575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3693/">CVE-2014-3693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8146/">CVE-2014-8146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8147/">CVE-2014-8147</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9093/">CVE-2014-9093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4551/">CVE-2015-4551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5212/">CVE-2015-5212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5213/">CVE-2015-5213</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5214/">CVE-2015-5214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0794/">CVE-2016-0794</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0795/">CVE-2016-0795</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4324/">CVE-2016-4324</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130948" comment="libreoffice-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131150" comment="libreoffice-base-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131151" comment="libreoffice-base-drivers-mysql-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131152" comment="libreoffice-base-drivers-postgresql-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131153" comment="libreoffice-calc-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131154" comment="libreoffice-calc-extensions-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131155" comment="libreoffice-draw-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131156" comment="libreoffice-filters-optional-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131157" comment="libreoffice-gnome-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131158" comment="libreoffice-icon-theme-galaxy-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131159" comment="libreoffice-icon-theme-tango-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131160" comment="libreoffice-impress-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131161" comment="libreoffice-l10n-af-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131162" comment="libreoffice-l10n-ar-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131163" comment="libreoffice-l10n-ca-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131164" comment="libreoffice-l10n-cs-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131165" comment="libreoffice-l10n-da-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131166" comment="libreoffice-l10n-de-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131167" comment="libreoffice-l10n-en-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131168" comment="libreoffice-l10n-es-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131169" comment="libreoffice-l10n-fi-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131170" comment="libreoffice-l10n-fr-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131171" comment="libreoffice-l10n-gu-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131172" comment="libreoffice-l10n-hi-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131173" comment="libreoffice-l10n-hu-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131174" comment="libreoffice-l10n-it-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131175" comment="libreoffice-l10n-ja-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131176" comment="libreoffice-l10n-ko-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131177" comment="libreoffice-l10n-nb-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131178" comment="libreoffice-l10n-nl-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131179" comment="libreoffice-l10n-nn-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131180" comment="libreoffice-l10n-pl-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131181" comment="libreoffice-l10n-pt-BR-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131182" comment="libreoffice-l10n-pt-PT-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142143" comment="libreoffice-l10n-ro-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131183" comment="libreoffice-l10n-ru-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131184" comment="libreoffice-l10n-sk-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131185" comment="libreoffice-l10n-sv-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131186" comment="libreoffice-l10n-xh-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131187" comment="libreoffice-l10n-zh-Hans-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131188" comment="libreoffice-l10n-zh-Hant-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131189" comment="libreoffice-l10n-zu-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131190" comment="libreoffice-mailmerge-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131191" comment="libreoffice-math-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131192" comment="libreoffice-officebean-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131193" comment="libreoffice-pyuno-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131194" comment="libreoffice-writer-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131195" comment="libreoffice-writer-extensions-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142144" comment="libreofficekit-5.1.5.2-29.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76356" version="1" class="patch">
	<metadata>
		<title>libruby2_1-2_1-2.1.2-12.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-8080" ref_url="https://www.suse.com/security/cve/CVE-2014-8080/" source="CVE"/>
		<reference ref_id="CVE-2014-8090" ref_url="https://www.suse.com/security/cve/CVE-2014-8090/" source="CVE"/>
		<description>
These are all security issues fixed in the libruby2_1-2_1-2.1.2-12.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8080/">CVE-2014-8080</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8090/">CVE-2014-8090</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140929" comment="libruby2_1-2_1-2.1.2-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140930" comment="ruby2.1-2.1.2-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140931" comment="ruby2.1-stdlib-2.1.2-12.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76357" version="1" class="patch">
	<metadata>
		<title>libsilc-1_1-2-1.1.10-24.128 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-1227" ref_url="https://www.suse.com/security/cve/CVE-2008-1227/" source="CVE"/>
		<description>
These are all security issues fixed in the libsilc-1_1-2-1.1.10-24.128 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1227/">CVE-2008-1227</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141677" comment="libsilc-1_1-2-1.1.10-24.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141678" comment="libsilcclient-1_1-3-1.1.10-24.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141679" comment="silc-toolkit-1.1.10-24.128 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76358" version="1" class="patch">
	<metadata>
		<title>libsmi-0.4.8-18.63 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2891" ref_url="https://www.suse.com/security/cve/CVE-2010-2891/" source="CVE"/>
		<description>
These are all security issues fixed in the libsmi-0.4.8-18.63 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2891/">CVE-2010-2891</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140932" comment="libsmi-0.4.8-18.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140933" comment="libsmi2-0.4.8-18.63 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76359" version="1" class="patch">
	<metadata>
		<title>libsndfile1-1.0.25-25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0186" ref_url="https://www.suse.com/security/cve/CVE-2009-0186/" source="CVE"/>
		<reference ref_id="CVE-2011-2696" ref_url="https://www.suse.com/security/cve/CVE-2011-2696/" source="CVE"/>
		<reference ref_id="CVE-2014-9496" ref_url="https://www.suse.com/security/cve/CVE-2014-9496/" source="CVE"/>
		<reference ref_id="CVE-2014-9756" ref_url="https://www.suse.com/security/cve/CVE-2014-9756/" source="CVE"/>
		<reference ref_id="CVE-2015-7805" ref_url="https://www.suse.com/security/cve/CVE-2015-7805/" source="CVE"/>
		<reference ref_id="CVE-2015-8075" ref_url="https://www.suse.com/security/cve/CVE-2015-8075/" source="CVE"/>
		<description>
These are all security issues fixed in the libsndfile1-1.0.25-25.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0186/">CVE-2009-0186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2696/">CVE-2011-2696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9496/">CVE-2014-9496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9756/">CVE-2014-9756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7805/">CVE-2015-7805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8075/">CVE-2015-8075</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009119271" comment="libsndfile1-1.0.25-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009119272" comment="libsndfile1-32bit-1.0.25-25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76360" version="1" class="patch">
	<metadata>
		<title>libsnmp30-32bit-5.7.3-4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-2141" ref_url="https://www.suse.com/security/cve/CVE-2012-2141/" source="CVE"/>
		<reference ref_id="CVE-2014-2284" ref_url="https://www.suse.com/security/cve/CVE-2014-2284/" source="CVE"/>
		<reference ref_id="CVE-2014-2285" ref_url="https://www.suse.com/security/cve/CVE-2014-2285/" source="CVE"/>
		<reference ref_id="CVE-2014-3565" ref_url="https://www.suse.com/security/cve/CVE-2014-3565/" source="CVE"/>
		<reference ref_id="CVE-2015-5621" ref_url="https://www.suse.com/security/cve/CVE-2015-5621/" source="CVE"/>
		<description>
These are all security issues fixed in the libsnmp30-32bit-5.7.3-4.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2141/">CVE-2012-2141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2284/">CVE-2014-2284</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2285/">CVE-2014-2285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3565/">CVE-2014-3565</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5621/">CVE-2015-5621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140934" comment="libsnmp30-5.7.3-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140935" comment="libsnmp30-32bit-5.7.3-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140936" comment="net-snmp-5.7.3-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140937" comment="perl-SNMP-5.7.3-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140938" comment="snmp-mibs-5.7.3-4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76361" version="1" class="patch">
	<metadata>
		<title>libsoup-2_4-1-2.54.1-4.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-2054" ref_url="https://www.suse.com/security/cve/CVE-2011-2054/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-2_4-1-2.54.1-4.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2054/">CVE-2011-2054</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140939" comment="libsoup-2_4-1-2.54.1-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140940" comment="libsoup-2_4-1-32bit-2.54.1-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140941" comment="libsoup-lang-2.54.1-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140942" comment="typelib-1_0-Soup-2_4-2.54.1-4.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76362" version="1" class="patch">
	<metadata>
		<title>libspice-client-glib-2_0-8-0.31-7.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-4425" ref_url="https://www.suse.com/security/cve/CVE-2012-4425/" source="CVE"/>
		<description>
These are all security issues fixed in the libspice-client-glib-2_0-8-0.31-7.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4425/">CVE-2012-4425</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140943" comment="libspice-client-glib-2_0-8-0.31-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140944" comment="libspice-client-glib-helper-0.31-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140945" comment="libspice-client-gtk-2_0-4-0.31-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140946" comment="libspice-client-gtk-3_0-4-0.31-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140947" comment="libspice-controller0-0.31-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140948" comment="typelib-1_0-SpiceClientGlib-2_0-0.31-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140949" comment="typelib-1_0-SpiceClientGtk-3_0-0.31-7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76363" version="1" class="patch">
	<metadata>
		<title>libspice-server1-0.12.7-6.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-4282" ref_url="https://www.suse.com/security/cve/CVE-2013-4282/" source="CVE"/>
		<reference ref_id="CVE-2015-3247" ref_url="https://www.suse.com/security/cve/CVE-2015-3247/" source="CVE"/>
		<reference ref_id="CVE-2015-5260" ref_url="https://www.suse.com/security/cve/CVE-2015-5260/" source="CVE"/>
		<reference ref_id="CVE-2015-5261" ref_url="https://www.suse.com/security/cve/CVE-2015-5261/" source="CVE"/>
		<reference ref_id="CVE-2016-0749" ref_url="https://www.suse.com/security/cve/CVE-2016-0749/" source="CVE"/>
		<reference ref_id="CVE-2016-2150" ref_url="https://www.suse.com/security/cve/CVE-2016-2150/" source="CVE"/>
		<description>
These are all security issues fixed in the libspice-server1-0.12.7-6.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2013-4282/">CVE-2013-4282</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3247/">CVE-2015-3247</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5260/">CVE-2015-5260</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2015-5261/">CVE-2015-5261</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-0749/">CVE-2016-0749</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2150/">CVE-2016-2150</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140950" comment="libspice-server1-0.12.7-6.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76364" version="1" class="patch">
	<metadata>
		<title>libsqlite3-0-3.8.10.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2016-6153" ref_url="https://www.suse.com/security/cve/CVE-2016-6153/" source="CVE"/>
		<description>
These are all security issues fixed in the libsqlite3-0-3.8.10.2-3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6153/">CVE-2016-6153</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130774" comment="libsqlite3-0-3.8.10.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130775" comment="libsqlite3-0-32bit-3.8.10.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130776" comment="sqlite3-3.8.10.2-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76365" version="1" class="patch">
	<metadata>
		<title>libsrtp1-1.5.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-2139" ref_url="https://www.suse.com/security/cve/CVE-2013-2139/" source="CVE"/>
		<description>
These are all security issues fixed in the libsrtp1-1.5.2-2.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2139/">CVE-2013-2139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140951" comment="libsrtp1-1.5.2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76366" version="1" class="patch">
	<metadata>
		<title>libssh2-1-1.4.3-19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-1782" ref_url="https://www.suse.com/security/cve/CVE-2015-1782/" source="CVE"/>
		<reference ref_id="CVE-2016-0787" ref_url="https://www.suse.com/security/cve/CVE-2016-0787/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh2-1-1.4.3-19.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1782/">CVE-2015-1782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0787/">CVE-2016-0787</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140952" comment="libssh2-1-1.4.3-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140953" comment="libssh2-1-32bit-1.4.3-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76367" version="1" class="patch">
	<metadata>
		<title>libssh4-0.6.3-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-4559" ref_url="https://www.suse.com/security/cve/CVE-2012-4559/" source="CVE"/>
		<reference ref_id="CVE-2012-4560" ref_url="https://www.suse.com/security/cve/CVE-2012-4560/" source="CVE"/>
		<reference ref_id="CVE-2012-4561" ref_url="https://www.suse.com/security/cve/CVE-2012-4561/" source="CVE"/>
		<reference ref_id="CVE-2013-0176" ref_url="https://www.suse.com/security/cve/CVE-2013-0176/" source="CVE"/>
		<reference ref_id="CVE-2014-0017" ref_url="https://www.suse.com/security/cve/CVE-2014-0017/" source="CVE"/>
		<reference ref_id="CVE-2014-8132" ref_url="https://www.suse.com/security/cve/CVE-2014-8132/" source="CVE"/>
		<reference ref_id="CVE-2015-3146" ref_url="https://www.suse.com/security/cve/CVE-2015-3146/" source="CVE"/>
		<reference ref_id="CVE-2016-0739" ref_url="https://www.suse.com/security/cve/CVE-2016-0739/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh4-0.6.3-11.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4559/">CVE-2012-4559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4560/">CVE-2012-4560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4561/">CVE-2012-4561</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0176/">CVE-2013-0176</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0017/">CVE-2014-0017</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8132/">CVE-2014-8132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3146/">CVE-2015-3146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0739/">CVE-2016-0739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009123868" comment="libssh4-0.6.3-11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76368" version="1" class="patch">
	<metadata>
		<title>libsystemd0-228-117.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-1174" ref_url="https://www.suse.com/security/cve/CVE-2012-1174/" source="CVE"/>
		<reference ref_id="CVE-2013-4288" ref_url="https://www.suse.com/security/cve/CVE-2013-4288/" source="CVE"/>
		<reference ref_id="CVE-2016-7795" ref_url="https://www.suse.com/security/cve/CVE-2016-7795/" source="CVE"/>
		<description>
These are all security issues fixed in the libsystemd0-228-117.12 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1174/">CVE-2012-1174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4288/">CVE-2013-4288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7795/">CVE-2016-7795</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140954" comment="libsystemd0-228-117.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140955" comment="libsystemd0-32bit-228-117.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140956" comment="libudev1-228-117.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140957" comment="libudev1-32bit-228-117.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140958" comment="systemd-228-117.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140959" comment="systemd-32bit-228-117.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140960" comment="systemd-bash-completion-228-117.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140961" comment="systemd-sysvinit-228-117.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140962" comment="udev-228-117.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76369" version="1" class="patch">
	<metadata>
		<title>libtag1-1.9.1-1.265 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-2396" ref_url="https://www.suse.com/security/cve/CVE-2012-2396/" source="CVE"/>
		<description>
These are all security issues fixed in the libtag1-1.9.1-1.265 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2396/">CVE-2012-2396</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140963" comment="libtag1-1.9.1-1.265 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141698" comment="libtag1-32bit-1.9.1-1.265 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140964" comment="libtag_c0-1.9.1-1.265 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141699" comment="libtag_c0-32bit-1.9.1-1.265 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140965" comment="taglib-1.9.1-1.265 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76370" version="1" class="patch">
	<metadata>
		<title>libtasn1-3.7-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-3467" ref_url="https://www.suse.com/security/cve/CVE-2014-3467/" source="CVE"/>
		<reference ref_id="CVE-2014-3468" ref_url="https://www.suse.com/security/cve/CVE-2014-3468/" source="CVE"/>
		<reference ref_id="CVE-2014-3469" ref_url="https://www.suse.com/security/cve/CVE-2014-3469/" source="CVE"/>
		<reference ref_id="CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806/" source="CVE"/>
		<reference ref_id="CVE-2015-3622" ref_url="https://www.suse.com/security/cve/CVE-2015-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-4008" ref_url="https://www.suse.com/security/cve/CVE-2016-4008/" source="CVE"/>
		<description>
These are all security issues fixed in the libtasn1-3.7-11.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3467/">CVE-2014-3467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3468/">CVE-2014-3468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3469/">CVE-2014-3469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3622/">CVE-2015-3622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4008/">CVE-2016-4008</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128901" comment="libtasn1-3.7-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128902" comment="libtasn1-6-3.7-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128903" comment="libtasn1-6-32bit-3.7-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76371" version="1" class="patch">
	<metadata>
		<title>libthai-data-0.1.25-4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-4012" ref_url="https://www.suse.com/security/cve/CVE-2009-4012/" source="CVE"/>
		<description>
These are all security issues fixed in the libthai-data-0.1.25-4.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4012/">CVE-2009-4012</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140966" comment="libthai-data-0.1.25-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140967" comment="libthai0-0.1.25-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140968" comment="libthai0-32bit-0.1.25-4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76372" version="1" class="patch">
	<metadata>
		<title>libtiff5-32bit-4.0.6-26.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-2285" ref_url="https://www.suse.com/security/cve/CVE-2009-2285/" source="CVE"/>
		<reference ref_id="CVE-2009-2347" ref_url="https://www.suse.com/security/cve/CVE-2009-2347/" source="CVE"/>
		<reference ref_id="CVE-2010-2065" ref_url="https://www.suse.com/security/cve/CVE-2010-2065/" source="CVE"/>
		<reference ref_id="CVE-2010-2067" ref_url="https://www.suse.com/security/cve/CVE-2010-2067/" source="CVE"/>
		<reference ref_id="CVE-2010-2233" ref_url="https://www.suse.com/security/cve/CVE-2010-2233/" source="CVE"/>
		<reference ref_id="CVE-2010-4665" ref_url="https://www.suse.com/security/cve/CVE-2010-4665/" source="CVE"/>
		<reference ref_id="CVE-2011-0192" ref_url="https://www.suse.com/security/cve/CVE-2011-0192/" source="CVE"/>
		<reference ref_id="CVE-2011-1167" ref_url="https://www.suse.com/security/cve/CVE-2011-1167/" source="CVE"/>
		<reference ref_id="CVE-2012-1173" ref_url="https://www.suse.com/security/cve/CVE-2012-1173/" source="CVE"/>
		<reference ref_id="CVE-2012-2113" ref_url="https://www.suse.com/security/cve/CVE-2012-2113/" source="CVE"/>
		<reference ref_id="CVE-2012-3401" ref_url="https://www.suse.com/security/cve/CVE-2012-3401/" source="CVE"/>
		<reference ref_id="CVE-2012-4564" ref_url="https://www.suse.com/security/cve/CVE-2012-4564/" source="CVE"/>
		<reference ref_id="CVE-2013-1960" ref_url="https://www.suse.com/security/cve/CVE-2013-1960/" source="CVE"/>
		<reference ref_id="CVE-2013-1961" ref_url="https://www.suse.com/security/cve/CVE-2013-1961/" source="CVE"/>
		<reference ref_id="CVE-2013-4231" ref_url="https://www.suse.com/security/cve/CVE-2013-4231/" source="CVE"/>
		<reference ref_id="CVE-2013-4232" ref_url="https://www.suse.com/security/cve/CVE-2013-4232/" source="CVE"/>
		<reference ref_id="CVE-2013-4243" ref_url="https://www.suse.com/security/cve/CVE-2013-4243/" source="CVE"/>
		<reference ref_id="CVE-2013-4244" ref_url="https://www.suse.com/security/cve/CVE-2013-4244/" source="CVE"/>
		<reference ref_id="CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127/" source="CVE"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2014-8129" ref_url="https://www.suse.com/security/cve/CVE-2014-8129/" source="CVE"/>
		<reference ref_id="CVE-2014-8130" ref_url="https://www.suse.com/security/cve/CVE-2014-8130/" source="CVE"/>
		<reference ref_id="CVE-2014-9655" ref_url="https://www.suse.com/security/cve/CVE-2014-9655/" source="CVE"/>
		<reference ref_id="CVE-2015-1547" ref_url="https://www.suse.com/security/cve/CVE-2015-1547/" source="CVE"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2015-8781" ref_url="https://www.suse.com/security/cve/CVE-2015-8781/" source="CVE"/>
		<reference ref_id="CVE-2015-8782" ref_url="https://www.suse.com/security/cve/CVE-2015-8782/" source="CVE"/>
		<reference ref_id="CVE-2015-8783" ref_url="https://www.suse.com/security/cve/CVE-2015-8783/" source="CVE"/>
		<reference ref_id="CVE-2016-3186" ref_url="https://www.suse.com/security/cve/CVE-2016-3186/" source="CVE"/>
		<reference ref_id="CVE-2016-5314" ref_url="https://www.suse.com/security/cve/CVE-2016-5314/" source="CVE"/>
		<reference ref_id="CVE-2016-5316" ref_url="https://www.suse.com/security/cve/CVE-2016-5316/" source="CVE"/>
		<reference ref_id="CVE-2016-5317" ref_url="https://www.suse.com/security/cve/CVE-2016-5317/" source="CVE"/>
		<reference ref_id="CVE-2016-5320" ref_url="https://www.suse.com/security/cve/CVE-2016-5320/" source="CVE"/>
		<reference ref_id="CVE-2016-5875" ref_url="https://www.suse.com/security/cve/CVE-2016-5875/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff5-32bit-4.0.6-26.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2285/">CVE-2009-2285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2347/">CVE-2009-2347</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2065/">CVE-2010-2065</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2067/">CVE-2010-2067</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2233/">CVE-2010-2233</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4665/">CVE-2010-4665</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0192/">CVE-2011-0192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1167/">CVE-2011-1167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1173/">CVE-2012-1173</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2113/">CVE-2012-2113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3401/">CVE-2012-3401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4564/">CVE-2012-4564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1960/">CVE-2013-1960</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1961/">CVE-2013-1961</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4231/">CVE-2013-4231</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4232/">CVE-2013-4232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4243/">CVE-2013-4243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4244/">CVE-2013-4244</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8129/">CVE-2014-8129</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8130/">CVE-2014-8130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9655/">CVE-2014-9655</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1547/">CVE-2015-1547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8781/">CVE-2015-8781</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8782/">CVE-2015-8782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8783/">CVE-2015-8783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3186/">CVE-2016-3186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5314/">CVE-2016-5314</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5316/">CVE-2016-5316</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5317/">CVE-2016-5317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5320/">CVE-2016-5320</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5875/">CVE-2016-5875</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76373" version="1" class="patch">
	<metadata>
		<title>libudisks2-0-2.1.3-1.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-0004" ref_url="https://www.suse.com/security/cve/CVE-2014-0004/" source="CVE"/>
		<description>
These are all security issues fixed in the libudisks2-0-2.1.3-1.14 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0004/">CVE-2014-0004</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140969" comment="libudisks2-0-2.1.3-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140970" comment="udisks2-2.1.3-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140971" comment="udisks2-lang-2.1.3-1.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76374" version="1" class="patch">
	<metadata>
		<title>libusbmuxd4-1.0.10-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2016-5104" ref_url="https://www.suse.com/security/cve/CVE-2016-5104/" source="CVE"/>
		<description>
These are all security issues fixed in the libusbmuxd4-1.0.10-2.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5104/">CVE-2016-5104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140975" comment="libusbmuxd4-1.0.10-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76375" version="1" class="patch">
	<metadata>
		<title>libvdpau1-1.1.1-6.73 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-5198" ref_url="https://www.suse.com/security/cve/CVE-2015-5198/" source="CVE"/>
		<reference ref_id="CVE-2015-5199" ref_url="https://www.suse.com/security/cve/CVE-2015-5199/" source="CVE"/>
		<reference ref_id="CVE-2015-5200" ref_url="https://www.suse.com/security/cve/CVE-2015-5200/" source="CVE"/>
		<description>
These are all security issues fixed in the libvdpau1-1.1.1-6.73 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5198/">CVE-2015-5198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5199/">CVE-2015-5199</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5200/">CVE-2015-5200</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140976" comment="libvdpau1-1.1.1-6.73 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142145" comment="libvdpau1-32bit-1.1.1-6.73 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76376" version="1" class="patch">
	<metadata>
		<title>libvirt-2.0.0-26.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2242" ref_url="https://www.suse.com/security/cve/CVE-2010-2242/" source="CVE"/>
		<reference ref_id="CVE-2011-1146" ref_url="https://www.suse.com/security/cve/CVE-2011-1146/" source="CVE"/>
		<reference ref_id="CVE-2011-2511" ref_url="https://www.suse.com/security/cve/CVE-2011-2511/" source="CVE"/>
		<reference ref_id="CVE-2011-4600" ref_url="https://www.suse.com/security/cve/CVE-2011-4600/" source="CVE"/>
		<reference ref_id="CVE-2012-3445" ref_url="https://www.suse.com/security/cve/CVE-2012-3445/" source="CVE"/>
		<reference ref_id="CVE-2013-0170" ref_url="https://www.suse.com/security/cve/CVE-2013-0170/" source="CVE"/>
		<reference ref_id="CVE-2013-1962" ref_url="https://www.suse.com/security/cve/CVE-2013-1962/" source="CVE"/>
		<reference ref_id="CVE-2013-2218" ref_url="https://www.suse.com/security/cve/CVE-2013-2218/" source="CVE"/>
		<reference ref_id="CVE-2013-2230" ref_url="https://www.suse.com/security/cve/CVE-2013-2230/" source="CVE"/>
		<reference ref_id="CVE-2013-4153" ref_url="https://www.suse.com/security/cve/CVE-2013-4153/" source="CVE"/>
		<reference ref_id="CVE-2013-4154" ref_url="https://www.suse.com/security/cve/CVE-2013-4154/" source="CVE"/>
		<reference ref_id="CVE-2013-4239" ref_url="https://www.suse.com/security/cve/CVE-2013-4239/" source="CVE"/>
		<reference ref_id="CVE-2013-4296" ref_url="https://www.suse.com/security/cve/CVE-2013-4296/" source="CVE"/>
		<reference ref_id="CVE-2013-4297" ref_url="https://www.suse.com/security/cve/CVE-2013-4297/" source="CVE"/>
		<reference ref_id="CVE-2013-4311" ref_url="https://www.suse.com/security/cve/CVE-2013-4311/" source="CVE"/>
		<reference ref_id="CVE-2013-4399" ref_url="https://www.suse.com/security/cve/CVE-2013-4399/" source="CVE"/>
		<reference ref_id="CVE-2013-4400" ref_url="https://www.suse.com/security/cve/CVE-2013-4400/" source="CVE"/>
		<reference ref_id="CVE-2013-4401" ref_url="https://www.suse.com/security/cve/CVE-2013-4401/" source="CVE"/>
		<reference ref_id="CVE-2013-6436" ref_url="https://www.suse.com/security/cve/CVE-2013-6436/" source="CVE"/>
		<reference ref_id="CVE-2013-6457" ref_url="https://www.suse.com/security/cve/CVE-2013-6457/" source="CVE"/>
		<reference ref_id="CVE-2013-6458" ref_url="https://www.suse.com/security/cve/CVE-2013-6458/" source="CVE"/>
		<reference ref_id="CVE-2014-0028" ref_url="https://www.suse.com/security/cve/CVE-2014-0028/" source="CVE"/>
		<reference ref_id="CVE-2014-0179" ref_url="https://www.suse.com/security/cve/CVE-2014-0179/" source="CVE"/>
		<reference ref_id="CVE-2014-1447" ref_url="https://www.suse.com/security/cve/CVE-2014-1447/" source="CVE"/>
		<reference ref_id="CVE-2014-3633" ref_url="https://www.suse.com/security/cve/CVE-2014-3633/" source="CVE"/>
		<reference ref_id="CVE-2014-3657" ref_url="https://www.suse.com/security/cve/CVE-2014-3657/" source="CVE"/>
		<reference ref_id="CVE-2014-7823" ref_url="https://www.suse.com/security/cve/CVE-2014-7823/" source="CVE"/>
		<reference ref_id="CVE-2014-8136" ref_url="https://www.suse.com/security/cve/CVE-2014-8136/" source="CVE"/>
		<reference ref_id="CVE-2015-0236" ref_url="https://www.suse.com/security/cve/CVE-2015-0236/" source="CVE"/>
		<reference ref_id="CVE-2015-5247" ref_url="https://www.suse.com/security/cve/CVE-2015-5247/" source="CVE"/>
		<reference ref_id="CVE-2015-5313" ref_url="https://www.suse.com/security/cve/CVE-2015-5313/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirt-2.0.0-26.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2242/">CVE-2010-2242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1146/">CVE-2011-1146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2511/">CVE-2011-2511</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-4600/">CVE-2011-4600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3445/">CVE-2012-3445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0170/">CVE-2013-0170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1962/">CVE-2013-1962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2218/">CVE-2013-2218</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2230/">CVE-2013-2230</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4153/">CVE-2013-4153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4154/">CVE-2013-4154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4239/">CVE-2013-4239</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4296/">CVE-2013-4296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4297/">CVE-2013-4297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4311/">CVE-2013-4311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4399/">CVE-2013-4399</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4400/">CVE-2013-4400</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4401/">CVE-2013-4401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6436/">CVE-2013-6436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6457/">CVE-2013-6457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6458/">CVE-2013-6458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0028/">CVE-2014-0028</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0179/">CVE-2014-0179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1447/">CVE-2014-1447</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3633/">CVE-2014-3633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3657/">CVE-2014-3657</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7823/">CVE-2014-7823</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8136/">CVE-2014-8136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0236/">CVE-2015-0236</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5247/">CVE-2015-5247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5313/">CVE-2015-5313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142146" comment="libvirt-client-32bit-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76377" version="1" class="patch">
	<metadata>
		<title>libvorbis0-1.3.3-8.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-1420" ref_url="https://www.suse.com/security/cve/CVE-2008-1420/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<description>
These are all security issues fixed in the libvorbis0-1.3.3-8.23 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1420/">CVE-2008-1420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141724" comment="libvorbis0-1.3.3-8.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140999" comment="libvorbis0-32bit-1.3.3-8.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141725" comment="libvorbisenc2-1.3.3-8.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141001" comment="libvorbisenc2-32bit-1.3.3-8.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141726" comment="libvorbisfile3-1.3.3-8.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141003" comment="libvorbisfile3-32bit-1.3.3-8.23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76378" version="1" class="patch">
	<metadata>
		<title>libvte9-0.28.2-19.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-2738" ref_url="https://www.suse.com/security/cve/CVE-2012-2738/" source="CVE"/>
		<description>
These are all security issues fixed in the libvte9-0.28.2-19.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2738/">CVE-2012-2738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141004" comment="libvte9-0.28.2-19.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76379" version="1" class="patch">
	<metadata>
		<title>libwebkit2gtk-3_0-25-2.4.8-16.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-5112" ref_url="https://www.suse.com/security/cve/CVE-2012-5112/" source="CVE"/>
		<reference ref_id="CVE-2012-5133" ref_url="https://www.suse.com/security/cve/CVE-2012-5133/" source="CVE"/>
		<reference ref_id="CVE-2014-1344" ref_url="https://www.suse.com/security/cve/CVE-2014-1344/" source="CVE"/>
		<reference ref_id="CVE-2014-1384" ref_url="https://www.suse.com/security/cve/CVE-2014-1384/" source="CVE"/>
		<reference ref_id="CVE-2014-1385" ref_url="https://www.suse.com/security/cve/CVE-2014-1385/" source="CVE"/>
		<reference ref_id="CVE-2014-1386" ref_url="https://www.suse.com/security/cve/CVE-2014-1386/" source="CVE"/>
		<reference ref_id="CVE-2014-1387" ref_url="https://www.suse.com/security/cve/CVE-2014-1387/" source="CVE"/>
		<reference ref_id="CVE-2014-1388" ref_url="https://www.suse.com/security/cve/CVE-2014-1388/" source="CVE"/>
		<reference ref_id="CVE-2014-1389" ref_url="https://www.suse.com/security/cve/CVE-2014-1389/" source="CVE"/>
		<reference ref_id="CVE-2014-1390" ref_url="https://www.suse.com/security/cve/CVE-2014-1390/" source="CVE"/>
		<reference ref_id="CVE-2015-2330" ref_url="https://www.suse.com/security/cve/CVE-2015-2330/" source="CVE"/>
		<description>
These are all security issues fixed in the libwebkit2gtk-3_0-25-2.4.8-16.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5112/">CVE-2012-5112</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5133/">CVE-2012-5133</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1344/">CVE-2014-1344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1384/">CVE-2014-1384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1385/">CVE-2014-1385</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1386/">CVE-2014-1386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1387/">CVE-2014-1387</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1388/">CVE-2014-1388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1389/">CVE-2014-1389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1390/">CVE-2014-1390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2330/">CVE-2015-2330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108630" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76380" version="1" class="patch">
	<metadata>
		<title>libwmf-0_2-7-0.2.8.4-242.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-0848" ref_url="https://www.suse.com/security/cve/CVE-2015-0848/" source="CVE"/>
		<reference ref_id="CVE-2015-4588" ref_url="https://www.suse.com/security/cve/CVE-2015-4588/" source="CVE"/>
		<reference ref_id="CVE-2015-4695" ref_url="https://www.suse.com/security/cve/CVE-2015-4695/" source="CVE"/>
		<reference ref_id="CVE-2015-4696" ref_url="https://www.suse.com/security/cve/CVE-2015-4696/" source="CVE"/>
		<description>
These are all security issues fixed in the libwmf-0_2-7-0.2.8.4-242.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0848/">CVE-2015-0848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4588/">CVE-2015-4588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4695/">CVE-2015-4695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4696/">CVE-2015-4696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114120" comment="libwmf-0_2-7-0.2.8.4-242.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76381" version="1" class="patch">
	<metadata>
		<title>libxcb-dri2-0-1.10-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-2064" ref_url="https://www.suse.com/security/cve/CVE-2013-2064/" source="CVE"/>
		<description>
These are all security issues fixed in the libxcb-dri2-0-1.10-3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2064/">CVE-2013-2064</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141007" comment="libxcb-dri2-0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141008" comment="libxcb-dri2-0-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141009" comment="libxcb-dri3-0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141010" comment="libxcb-dri3-0-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141011" comment="libxcb-glx0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141012" comment="libxcb-glx0-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141013" comment="libxcb-present0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141014" comment="libxcb-present0-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141015" comment="libxcb-randr0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141016" comment="libxcb-render0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141017" comment="libxcb-render0-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141018" comment="libxcb-shape0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141019" comment="libxcb-shm0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141020" comment="libxcb-shm0-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141021" comment="libxcb-sync1-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141022" comment="libxcb-sync1-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141023" comment="libxcb-xf86dri0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141024" comment="libxcb-xfixes0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141025" comment="libxcb-xfixes0-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141026" comment="libxcb-xinerama0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141027" comment="libxcb-xkb1-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141028" comment="libxcb-xkb1-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141029" comment="libxcb-xv0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141030" comment="libxcb1-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141031" comment="libxcb1-32bit-1.10-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76382" version="1" class="patch">
	<metadata>
		<title>libxerces-c-3_1-3.1.1-12.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-1885" ref_url="https://www.suse.com/security/cve/CVE-2009-1885/" source="CVE"/>
		<reference ref_id="CVE-2015-0252" ref_url="https://www.suse.com/security/cve/CVE-2015-0252/" source="CVE"/>
		<reference ref_id="CVE-2016-0729" ref_url="https://www.suse.com/security/cve/CVE-2016-0729/" source="CVE"/>
		<reference ref_id="CVE-2016-2099" ref_url="https://www.suse.com/security/cve/CVE-2016-2099/" source="CVE"/>
		<reference ref_id="CVE-2016-4463" ref_url="https://www.suse.com/security/cve/CVE-2016-4463/" source="CVE"/>
		<description>
These are all security issues fixed in the libxerces-c-3_1-3.1.1-12.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1885/">CVE-2009-1885</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0252/">CVE-2015-0252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0729/">CVE-2016-0729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2099/">CVE-2016-2099</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4463/">CVE-2016-4463</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131022" comment="libxerces-c-3_1-3.1.1-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131023" comment="libxerces-c-3_1-32bit-3.1.1-12.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76383" version="1" class="patch">
	<metadata>
		<title>libxml2-2-2.9.4-27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-4225" ref_url="https://www.suse.com/security/cve/CVE-2008-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-4226" ref_url="https://www.suse.com/security/cve/CVE-2008-4226/" source="CVE"/>
		<reference ref_id="CVE-2008-4409" ref_url="https://www.suse.com/security/cve/CVE-2008-4409/" source="CVE"/>
		<reference ref_id="CVE-2010-4494" ref_url="https://www.suse.com/security/cve/CVE-2010-4494/" source="CVE"/>
		<reference ref_id="CVE-2011-1944" ref_url="https://www.suse.com/security/cve/CVE-2011-1944/" source="CVE"/>
		<reference ref_id="CVE-2012-5134" ref_url="https://www.suse.com/security/cve/CVE-2012-5134/" source="CVE"/>
		<reference ref_id="CVE-2013-0338" ref_url="https://www.suse.com/security/cve/CVE-2013-0338/" source="CVE"/>
		<reference ref_id="CVE-2013-1969" ref_url="https://www.suse.com/security/cve/CVE-2013-1969/" source="CVE"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2014-3660" ref_url="https://www.suse.com/security/cve/CVE-2014-3660/" source="CVE"/>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-8035" ref_url="https://www.suse.com/security/cve/CVE-2015-8035/" source="CVE"/>
		<reference ref_id="CVE-2015-8241" ref_url="https://www.suse.com/security/cve/CVE-2015-8241/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2015-8317" ref_url="https://www.suse.com/security/cve/CVE-2015-8317/" source="CVE"/>
		<reference ref_id="CVE-2015-8710" ref_url="https://www.suse.com/security/cve/CVE-2015-8710/" source="CVE"/>
		<reference ref_id="CVE-2016-1762" ref_url="https://www.suse.com/security/cve/CVE-2016-1762/" source="CVE"/>
		<reference ref_id="CVE-2016-1833" ref_url="https://www.suse.com/security/cve/CVE-2016-1833/" source="CVE"/>
		<reference ref_id="CVE-2016-1834" ref_url="https://www.suse.com/security/cve/CVE-2016-1834/" source="CVE"/>
		<reference ref_id="CVE-2016-1835" ref_url="https://www.suse.com/security/cve/CVE-2016-1835/" source="CVE"/>
		<reference ref_id="CVE-2016-1836" ref_url="https://www.suse.com/security/cve/CVE-2016-1836/" source="CVE"/>
		<reference ref_id="CVE-2016-1837" ref_url="https://www.suse.com/security/cve/CVE-2016-1837/" source="CVE"/>
		<reference ref_id="CVE-2016-1838" ref_url="https://www.suse.com/security/cve/CVE-2016-1838/" source="CVE"/>
		<reference ref_id="CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839/" source="CVE"/>
		<reference ref_id="CVE-2016-1840" ref_url="https://www.suse.com/security/cve/CVE-2016-1840/" source="CVE"/>
		<reference ref_id="CVE-2016-3627" ref_url="https://www.suse.com/security/cve/CVE-2016-3627/" source="CVE"/>
		<reference ref_id="CVE-2016-3705" ref_url="https://www.suse.com/security/cve/CVE-2016-3705/" source="CVE"/>
		<reference ref_id="CVE-2016-4483" ref_url="https://www.suse.com/security/cve/CVE-2016-4483/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2-2.9.4-27.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4225/">CVE-2008-4225</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4226/">CVE-2008-4226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4409/">CVE-2008-4409</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4494/">CVE-2010-4494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1944/">CVE-2011-1944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5134/">CVE-2012-5134</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0338/">CVE-2013-0338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1969/">CVE-2013-1969</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3660/">CVE-2014-3660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8035/">CVE-2015-8035</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8241/">CVE-2015-8241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8317/">CVE-2015-8317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8710/">CVE-2015-8710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1762/">CVE-2016-1762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1833/">CVE-2016-1833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1834/">CVE-2016-1834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1835/">CVE-2016-1835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1836/">CVE-2016-1836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1837/">CVE-2016-1837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1838/">CVE-2016-1838</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1840/">CVE-2016-1840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3627/">CVE-2016-3627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3705/">CVE-2016-3705</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4483/">CVE-2016-4483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76384" version="1" class="patch">
	<metadata>
		<title>libyaml-0-2-0.1.6-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-6393" ref_url="https://www.suse.com/security/cve/CVE-2013-6393/" source="CVE"/>
		<reference ref_id="CVE-2014-2525" ref_url="https://www.suse.com/security/cve/CVE-2014-2525/" source="CVE"/>
		<reference ref_id="CVE-2014-9130" ref_url="https://www.suse.com/security/cve/CVE-2014-9130/" source="CVE"/>
		<description>
These are all security issues fixed in the libyaml-0-2-0.1.6-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6393/">CVE-2013-6393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2525/">CVE-2014-2525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9130/">CVE-2014-9130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141036" comment="libyaml-0-2-0.1.6-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76385" version="1" class="patch">
	<metadata>
		<title>libzip2-0.11.1-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<reference ref_id="CVE-2012-1162" ref_url="https://www.suse.com/security/cve/CVE-2012-1162/" source="CVE"/>
		<reference ref_id="CVE-2012-1163" ref_url="https://www.suse.com/security/cve/CVE-2012-1163/" source="CVE"/>
		<reference ref_id="CVE-2015-2331" ref_url="https://www.suse.com/security/cve/CVE-2015-2331/" source="CVE"/>
		<description>
These are all security issues fixed in the libzip2-0.11.1-12.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1162/">CVE-2012-1162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1163/">CVE-2012-1163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2331/">CVE-2015-2331</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141037" comment="libzip2-0.11.1-12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76386" version="1" class="patch">
	<metadata>
		<title>libzmq3-4.0.4-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-7202" ref_url="https://www.suse.com/security/cve/CVE-2014-7202/" source="CVE"/>
		<reference ref_id="CVE-2014-7203" ref_url="https://www.suse.com/security/cve/CVE-2014-7203/" source="CVE"/>
		<reference ref_id="CVE-2014-9721" ref_url="https://www.suse.com/security/cve/CVE-2014-9721/" source="CVE"/>
		<description>
These are all security issues fixed in the libzmq3-4.0.4-6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7202/">CVE-2014-7202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7203/">CVE-2014-7203</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-9721/">CVE-2014-9721</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142147" comment="libzmq3-4.0.4-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76387" version="1" class="patch">
	<metadata>
		<title>logrotate-3.8.7-3.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1098" ref_url="https://www.suse.com/security/cve/CVE-2011-1098/" source="CVE"/>
		<reference ref_id="CVE-2011-1154" ref_url="https://www.suse.com/security/cve/CVE-2011-1154/" source="CVE"/>
		<reference ref_id="CVE-2011-1155" ref_url="https://www.suse.com/security/cve/CVE-2011-1155/" source="CVE"/>
		<description>
These are all security issues fixed in the logrotate-3.8.7-3.21 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1098/">CVE-2011-1098</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1154/">CVE-2011-1154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1155/">CVE-2011-1155</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141038" comment="logrotate-3.8.7-3.21 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76388" version="1" class="patch">
	<metadata>
		<title>m4-1.4.16-15.74 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-4029" ref_url="https://www.suse.com/security/cve/CVE-2009-4029/" source="CVE"/>
		<description>
These are all security issues fixed in the m4-1.4.16-15.74 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4029/">CVE-2009-4029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140466" comment="m4-1.4.16-15.74 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76389" version="1" class="patch">
	<metadata>
		<title>mailx-12.5-28.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2004-2771" ref_url="https://www.suse.com/security/cve/CVE-2004-2771/" source="CVE"/>
		<reference ref_id="CVE-2014-7844" ref_url="https://www.suse.com/security/cve/CVE-2014-7844/" source="CVE"/>
		<description>
These are all security issues fixed in the mailx-12.5-28.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2004-2771/">CVE-2004-2771</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-7844/">CVE-2014-7844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141041" comment="mailx-12.5-28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76390" version="1" class="patch">
	<metadata>
		<title>mipv6d-2.0.2.umip.0.4-19.77 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2522" ref_url="https://www.suse.com/security/cve/CVE-2010-2522/" source="CVE"/>
		<reference ref_id="CVE-2010-2523" ref_url="https://www.suse.com/security/cve/CVE-2010-2523/" source="CVE"/>
		<description>
These are all security issues fixed in the mipv6d-2.0.2.umip.0.4-19.77 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2522/">CVE-2010-2522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2523/">CVE-2010-2523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141042" comment="mipv6d-2.0.2.umip.0.4-19.77 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76391" version="1" class="patch">
	<metadata>
		<title>mozilla-nspr-32bit-4.12-15.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<description>
These are all security issues fixed in the mozilla-nspr-32bit-4.12-15.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009129286" comment="mozilla-nspr-4.12-15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009129287" comment="mozilla-nspr-32bit-4.12-15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76392" version="1" class="patch">
	<metadata>
		<title>mutt-1.6.0-54.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-0467" ref_url="https://www.suse.com/security/cve/CVE-2014-0467/" source="CVE"/>
		<reference ref_id="CVE-2014-9116" ref_url="https://www.suse.com/security/cve/CVE-2014-9116/" source="CVE"/>
		<description>
These are all security issues fixed in the mutt-1.6.0-54.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0467/">CVE-2014-0467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9116/">CVE-2014-9116</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141043" comment="mutt-1.6.0-54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76393" version="1" class="patch">
	<metadata>
		<title>ntp-4.2.8p8-14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0159" ref_url="https://www.suse.com/security/cve/CVE-2009-0159/" source="CVE"/>
		<reference ref_id="CVE-2009-1252" ref_url="https://www.suse.com/security/cve/CVE-2009-1252/" source="CVE"/>
		<reference ref_id="CVE-2013-5211" ref_url="https://www.suse.com/security/cve/CVE-2013-5211/" source="CVE"/>
		<reference ref_id="CVE-2014-9293" ref_url="https://www.suse.com/security/cve/CVE-2014-9293/" source="CVE"/>
		<reference ref_id="CVE-2014-9294" ref_url="https://www.suse.com/security/cve/CVE-2014-9294/" source="CVE"/>
		<reference ref_id="CVE-2014-9295" ref_url="https://www.suse.com/security/cve/CVE-2014-9295/" source="CVE"/>
		<reference ref_id="CVE-2014-9296" ref_url="https://www.suse.com/security/cve/CVE-2014-9296/" source="CVE"/>
		<reference ref_id="CVE-2014-9297" ref_url="https://www.suse.com/security/cve/CVE-2014-9297/" source="CVE"/>
		<reference ref_id="CVE-2014-9298" ref_url="https://www.suse.com/security/cve/CVE-2014-9298/" source="CVE"/>
		<reference ref_id="CVE-2015-1798" ref_url="https://www.suse.com/security/cve/CVE-2015-1798/" source="CVE"/>
		<reference ref_id="CVE-2015-1799" ref_url="https://www.suse.com/security/cve/CVE-2015-1799/" source="CVE"/>
		<reference ref_id="CVE-2015-3405" ref_url="https://www.suse.com/security/cve/CVE-2015-3405/" source="CVE"/>
		<reference ref_id="CVE-2015-5300" ref_url="https://www.suse.com/security/cve/CVE-2015-5300/" source="CVE"/>
		<reference ref_id="CVE-2015-7691" ref_url="https://www.suse.com/security/cve/CVE-2015-7691/" source="CVE"/>
		<reference ref_id="CVE-2015-7692" ref_url="https://www.suse.com/security/cve/CVE-2015-7692/" source="CVE"/>
		<reference ref_id="CVE-2015-7701" ref_url="https://www.suse.com/security/cve/CVE-2015-7701/" source="CVE"/>
		<reference ref_id="CVE-2015-7702" ref_url="https://www.suse.com/security/cve/CVE-2015-7702/" source="CVE"/>
		<reference ref_id="CVE-2015-7703" ref_url="https://www.suse.com/security/cve/CVE-2015-7703/" source="CVE"/>
		<reference ref_id="CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704/" source="CVE"/>
		<reference ref_id="CVE-2015-7705" ref_url="https://www.suse.com/security/cve/CVE-2015-7705/" source="CVE"/>
		<reference ref_id="CVE-2015-7848" ref_url="https://www.suse.com/security/cve/CVE-2015-7848/" source="CVE"/>
		<reference ref_id="CVE-2015-7849" ref_url="https://www.suse.com/security/cve/CVE-2015-7849/" source="CVE"/>
		<reference ref_id="CVE-2015-7850" ref_url="https://www.suse.com/security/cve/CVE-2015-7850/" source="CVE"/>
		<reference ref_id="CVE-2015-7851" ref_url="https://www.suse.com/security/cve/CVE-2015-7851/" source="CVE"/>
		<reference ref_id="CVE-2015-7852" ref_url="https://www.suse.com/security/cve/CVE-2015-7852/" source="CVE"/>
		<reference ref_id="CVE-2015-7853" ref_url="https://www.suse.com/security/cve/CVE-2015-7853/" source="CVE"/>
		<reference ref_id="CVE-2015-7854" ref_url="https://www.suse.com/security/cve/CVE-2015-7854/" source="CVE"/>
		<reference ref_id="CVE-2015-7855" ref_url="https://www.suse.com/security/cve/CVE-2015-7855/" source="CVE"/>
		<reference ref_id="CVE-2015-7871" ref_url="https://www.suse.com/security/cve/CVE-2015-7871/" source="CVE"/>
		<reference ref_id="CVE-2015-7973" ref_url="https://www.suse.com/security/cve/CVE-2015-7973/" source="CVE"/>
		<reference ref_id="CVE-2015-7974" ref_url="https://www.suse.com/security/cve/CVE-2015-7974/" source="CVE"/>
		<reference ref_id="CVE-2015-7975" ref_url="https://www.suse.com/security/cve/CVE-2015-7975/" source="CVE"/>
		<reference ref_id="CVE-2015-7976" ref_url="https://www.suse.com/security/cve/CVE-2015-7976/" source="CVE"/>
		<reference ref_id="CVE-2015-7977" ref_url="https://www.suse.com/security/cve/CVE-2015-7977/" source="CVE"/>
		<reference ref_id="CVE-2015-7978" ref_url="https://www.suse.com/security/cve/CVE-2015-7978/" source="CVE"/>
		<reference ref_id="CVE-2015-7979" ref_url="https://www.suse.com/security/cve/CVE-2015-7979/" source="CVE"/>
		<reference ref_id="CVE-2015-8138" ref_url="https://www.suse.com/security/cve/CVE-2015-8138/" source="CVE"/>
		<reference ref_id="CVE-2015-8139" ref_url="https://www.suse.com/security/cve/CVE-2015-8139/" source="CVE"/>
		<reference ref_id="CVE-2015-8140" ref_url="https://www.suse.com/security/cve/CVE-2015-8140/" source="CVE"/>
		<reference ref_id="CVE-2015-8158" ref_url="https://www.suse.com/security/cve/CVE-2015-8158/" source="CVE"/>
		<reference ref_id="CVE-2016-1547" ref_url="https://www.suse.com/security/cve/CVE-2016-1547/" source="CVE"/>
		<reference ref_id="CVE-2016-1548" ref_url="https://www.suse.com/security/cve/CVE-2016-1548/" source="CVE"/>
		<reference ref_id="CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549/" source="CVE"/>
		<reference ref_id="CVE-2016-1550" ref_url="https://www.suse.com/security/cve/CVE-2016-1550/" source="CVE"/>
		<reference ref_id="CVE-2016-1551" ref_url="https://www.suse.com/security/cve/CVE-2016-1551/" source="CVE"/>
		<reference ref_id="CVE-2016-2516" ref_url="https://www.suse.com/security/cve/CVE-2016-2516/" source="CVE"/>
		<reference ref_id="CVE-2016-2517" ref_url="https://www.suse.com/security/cve/CVE-2016-2517/" source="CVE"/>
		<reference ref_id="CVE-2016-2518" ref_url="https://www.suse.com/security/cve/CVE-2016-2518/" source="CVE"/>
		<reference ref_id="CVE-2016-2519" ref_url="https://www.suse.com/security/cve/CVE-2016-2519/" source="CVE"/>
		<reference ref_id="CVE-2016-4953" ref_url="https://www.suse.com/security/cve/CVE-2016-4953/" source="CVE"/>
		<reference ref_id="CVE-2016-4954" ref_url="https://www.suse.com/security/cve/CVE-2016-4954/" source="CVE"/>
		<reference ref_id="CVE-2016-4955" ref_url="https://www.suse.com/security/cve/CVE-2016-4955/" source="CVE"/>
		<reference ref_id="CVE-2016-4956" ref_url="https://www.suse.com/security/cve/CVE-2016-4956/" source="CVE"/>
		<reference ref_id="CVE-2016-4957" ref_url="https://www.suse.com/security/cve/CVE-2016-4957/" source="CVE"/>
		<description>
These are all security issues fixed in the ntp-4.2.8p8-14.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0159/">CVE-2009-0159</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1252/">CVE-2009-1252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5211/">CVE-2013-5211</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9293/">CVE-2014-9293</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9294/">CVE-2014-9294</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9295/">CVE-2014-9295</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9296/">CVE-2014-9296</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9297/">CVE-2014-9297</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9298/">CVE-2014-9298</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1798/">CVE-2015-1798</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1799/">CVE-2015-1799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3405/">CVE-2015-3405</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5300/">CVE-2015-5300</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7691/">CVE-2015-7691</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7692/">CVE-2015-7692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7701/">CVE-2015-7701</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7702/">CVE-2015-7702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7703/">CVE-2015-7703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7705/">CVE-2015-7705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7848/">CVE-2015-7848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7849/">CVE-2015-7849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7850/">CVE-2015-7850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7851/">CVE-2015-7851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7852/">CVE-2015-7852</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7853/">CVE-2015-7853</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7854/">CVE-2015-7854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7855/">CVE-2015-7855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7871/">CVE-2015-7871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7973/">CVE-2015-7973</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7974/">CVE-2015-7974</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7975/">CVE-2015-7975</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7976/">CVE-2015-7976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7977/">CVE-2015-7977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7978/">CVE-2015-7978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7979/">CVE-2015-7979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8138/">CVE-2015-8138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8139/">CVE-2015-8139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8140/">CVE-2015-8140</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8158/">CVE-2015-8158</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1547/">CVE-2016-1547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1548/">CVE-2016-1548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1550/">CVE-2016-1550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1551/">CVE-2016-1551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2516/">CVE-2016-2516</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2517/">CVE-2016-2517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2518/">CVE-2016-2518</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2519/">CVE-2016-2519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4953/">CVE-2016-4953</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4954/">CVE-2016-4954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4955/">CVE-2016-4955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4956/">CVE-2016-4956</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4957/">CVE-2016-4957</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76394" version="1" class="patch">
	<metadata>
		<title>opensc-0.13.0-1.122 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0368" ref_url="https://www.suse.com/security/cve/CVE-2009-0368/" source="CVE"/>
		<reference ref_id="CVE-2010-4523" ref_url="https://www.suse.com/security/cve/CVE-2010-4523/" source="CVE"/>
		<description>
These are all security issues fixed in the opensc-0.13.0-1.122 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0368/">CVE-2009-0368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4523/">CVE-2010-4523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141044" comment="opensc-0.13.0-1.122 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76395" version="1" class="patch">
	<metadata>
		<title>openslp-2.0.0-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-3609" ref_url="https://www.suse.com/security/cve/CVE-2010-3609/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<description>
These are all security issues fixed in the openslp-2.0.0-11.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3609/">CVE-2010-3609</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131123" comment="openslp-2.0.0-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131124" comment="openslp-32bit-2.0.0-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76396" version="1" class="patch">
	<metadata>
		<title>openssh-7.2p2-55.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-2653" ref_url="https://www.suse.com/security/cve/CVE-2014-2653/" source="CVE"/>
		<reference ref_id="CVE-2015-5352" ref_url="https://www.suse.com/security/cve/CVE-2015-5352/" source="CVE"/>
		<reference ref_id="CVE-2015-5600" ref_url="https://www.suse.com/security/cve/CVE-2015-5600/" source="CVE"/>
		<reference ref_id="CVE-2015-6563" ref_url="https://www.suse.com/security/cve/CVE-2015-6563/" source="CVE"/>
		<reference ref_id="CVE-2015-6564" ref_url="https://www.suse.com/security/cve/CVE-2015-6564/" source="CVE"/>
		<reference ref_id="CVE-2015-8325" ref_url="https://www.suse.com/security/cve/CVE-2015-8325/" source="CVE"/>
		<reference ref_id="CVE-2016-0777" ref_url="https://www.suse.com/security/cve/CVE-2016-0777/" source="CVE"/>
		<reference ref_id="CVE-2016-0778" ref_url="https://www.suse.com/security/cve/CVE-2016-0778/" source="CVE"/>
		<reference ref_id="CVE-2016-1908" ref_url="https://www.suse.com/security/cve/CVE-2016-1908/" source="CVE"/>
		<reference ref_id="CVE-2016-3115" ref_url="https://www.suse.com/security/cve/CVE-2016-3115/" source="CVE"/>
		<reference ref_id="CVE-2016-6210" ref_url="https://www.suse.com/security/cve/CVE-2016-6210/" source="CVE"/>
		<reference ref_id="CVE-2016-6515" ref_url="https://www.suse.com/security/cve/CVE-2016-6515/" source="CVE"/>
		<description>
These are all security issues fixed in the openssh-7.2p2-55.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2653/">CVE-2014-2653</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5352/">CVE-2015-5352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5600/">CVE-2015-5600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6563/">CVE-2015-6563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6564/">CVE-2015-6564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8325/">CVE-2015-8325</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0777/">CVE-2016-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0778/">CVE-2016-0778</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1908/">CVE-2016-1908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3115/">CVE-2016-3115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6210/">CVE-2016-6210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6515/">CVE-2016-6515</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141045" comment="openssh-7.2p2-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141047" comment="openssh-helpers-7.2p2-55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76397" version="1" class="patch">
	<metadata>
		<title>openvpn-2.3.8-16.6.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-8104" ref_url="https://www.suse.com/security/cve/CVE-2014-8104/" source="CVE"/>
		<description>
These are all security issues fixed in the openvpn-2.3.8-16.6.4 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8104/">CVE-2014-8104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141048" comment="openvpn-2.3.8-16.6.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76398" version="1" class="patch">
	<metadata>
		<title>p7zip-9.20.1-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-1038" ref_url="https://www.suse.com/security/cve/CVE-2015-1038/" source="CVE"/>
		<reference ref_id="CVE-2016-2335" ref_url="https://www.suse.com/security/cve/CVE-2016-2335/" source="CVE"/>
		<description>
These are all security issues fixed in the p7zip-9.20.1-6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1038/">CVE-2015-1038</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2335/">CVE-2016-2335</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128891" comment="p7zip-9.20.1-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76399" version="1" class="patch">
	<metadata>
		<title>pam-1.1.8-14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-3430" ref_url="https://www.suse.com/security/cve/CVE-2010-3430/" source="CVE"/>
		<reference ref_id="CVE-2010-3431" ref_url="https://www.suse.com/security/cve/CVE-2010-3431/" source="CVE"/>
		<reference ref_id="CVE-2010-3853" ref_url="https://www.suse.com/security/cve/CVE-2010-3853/" source="CVE"/>
		<reference ref_id="CVE-2011-3148" ref_url="https://www.suse.com/security/cve/CVE-2011-3148/" source="CVE"/>
		<reference ref_id="CVE-2011-3149" ref_url="https://www.suse.com/security/cve/CVE-2011-3149/" source="CVE"/>
		<reference ref_id="CVE-2014-2583" ref_url="https://www.suse.com/security/cve/CVE-2014-2583/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-1.1.8-14.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3430/">CVE-2010-3430</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3431/">CVE-2010-3431</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3853/">CVE-2010-3853</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3148/">CVE-2011-3148</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3149/">CVE-2011-3149</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2583/">CVE-2014-2583</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141056" comment="pam-1.1.8-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141057" comment="pam-32bit-1.1.8-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141058" comment="pam-doc-1.1.8-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76400" version="1" class="patch">
	<metadata>
		<title>pam-modules-12.1-23.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-3172" ref_url="https://www.suse.com/security/cve/CVE-2011-3172/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-modules-12.1-23.12 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3172/">CVE-2011-3172</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141767" comment="pam-modules-12.1-23.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141060" comment="pam-modules-32bit-12.1-23.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76401" version="1" class="patch">
	<metadata>
		<title>pam_krb5-2.4.4-4.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-3825" ref_url="https://www.suse.com/security/cve/CVE-2008-3825/" source="CVE"/>
		<reference ref_id="CVE-2009-1384" ref_url="https://www.suse.com/security/cve/CVE-2009-1384/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_krb5-2.4.4-4.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3825/">CVE-2008-3825</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1384/">CVE-2009-1384</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141061" comment="pam_krb5-2.4.4-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141062" comment="pam_krb5-32bit-2.4.4-4.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76402" version="1" class="patch">
	<metadata>
		<title>pam_ssh-2.0-1.40 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-1273" ref_url="https://www.suse.com/security/cve/CVE-2009-1273/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_ssh-2.0-1.40 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1273/">CVE-2009-1273</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141063" comment="pam_ssh-2.0-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141064" comment="pam_ssh-32bit-2.0-1.40 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76403" version="1" class="patch">
	<metadata>
		<title>patch-2.7.5-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-4651" ref_url="https://www.suse.com/security/cve/CVE-2010-4651/" source="CVE"/>
		<reference ref_id="CVE-2015-1196" ref_url="https://www.suse.com/security/cve/CVE-2015-1196/" source="CVE"/>
		<reference ref_id="CVE-2015-1395" ref_url="https://www.suse.com/security/cve/CVE-2015-1395/" source="CVE"/>
		<reference ref_id="CVE-2015-1396" ref_url="https://www.suse.com/security/cve/CVE-2015-1396/" source="CVE"/>
		<description>
These are all security issues fixed in the patch-2.7.5-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4651/">CVE-2010-4651</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1196/">CVE-2015-1196</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1395/">CVE-2015-1395</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1396/">CVE-2015-1396</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110205" comment="patch-2.7.5-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76404" version="1" class="patch">
	<metadata>
		<title>pcsc-ccid-1.4.14-1.45 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-4530" ref_url="https://www.suse.com/security/cve/CVE-2010-4530/" source="CVE"/>
		<description>
These are all security issues fixed in the pcsc-ccid-1.4.14-1.45 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4530/">CVE-2010-4530</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141065" comment="pcsc-ccid-1.4.14-1.45 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76405" version="1" class="patch">
	<metadata>
		<title>perl-32bit-5.18.2-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2761" ref_url="https://www.suse.com/security/cve/CVE-2010-2761/" source="CVE"/>
		<reference ref_id="CVE-2010-4410" ref_url="https://www.suse.com/security/cve/CVE-2010-4410/" source="CVE"/>
		<reference ref_id="CVE-2010-4411" ref_url="https://www.suse.com/security/cve/CVE-2010-4411/" source="CVE"/>
		<reference ref_id="CVE-2010-4777" ref_url="https://www.suse.com/security/cve/CVE-2010-4777/" source="CVE"/>
		<reference ref_id="CVE-2015-8853" ref_url="https://www.suse.com/security/cve/CVE-2015-8853/" source="CVE"/>
		<reference ref_id="CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238/" source="CVE"/>
		<reference ref_id="CVE-2016-2381" ref_url="https://www.suse.com/security/cve/CVE-2016-2381/" source="CVE"/>
		<reference ref_id="CVE-2016-6185" ref_url="https://www.suse.com/security/cve/CVE-2016-6185/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-32bit-5.18.2-11.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2761/">CVE-2010-2761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4410/">CVE-2010-4410</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4411/">CVE-2010-4411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4777/">CVE-2010-4777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8853/">CVE-2015-8853</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2381/">CVE-2016-2381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6185/">CVE-2016-6185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131038" comment="perl-5.18.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131039" comment="perl-32bit-5.18.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131040" comment="perl-base-5.18.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131041" comment="perl-doc-5.18.2-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76406" version="1" class="patch">
	<metadata>
		<title>perl-Config-IniFiles-2.82-3.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-2451" ref_url="https://www.suse.com/security/cve/CVE-2012-2451/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Config-IniFiles-2.82-3.14 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2451/">CVE-2012-2451</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141066" comment="perl-Config-IniFiles-2.82-3.14 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76407" version="1" class="patch">
	<metadata>
		<title>perl-HTML-Parser-3.71-1.178 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-3627" ref_url="https://www.suse.com/security/cve/CVE-2009-3627/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-HTML-Parser-3.71-1.178 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3627/">CVE-2009-3627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141067" comment="perl-HTML-Parser-3.71-1.178 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76408" version="1" class="patch">
	<metadata>
		<title>perl-LWP-Protocol-https-6.04-5.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-3230" ref_url="https://www.suse.com/security/cve/CVE-2014-3230/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-LWP-Protocol-https-6.04-5.4 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3230/">CVE-2014-3230</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141068" comment="perl-LWP-Protocol-https-6.04-5.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76409" version="1" class="patch">
	<metadata>
		<title>perl-Tk-804.031-3.82 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-4484" ref_url="https://www.suse.com/security/cve/CVE-2006-4484/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Tk-804.031-3.82 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4484/">CVE-2006-4484</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141069" comment="perl-Tk-804.031-3.82 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76410" version="1" class="patch">
	<metadata>
		<title>perl-XML-LibXML-2.0019-5.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-3451" ref_url="https://www.suse.com/security/cve/CVE-2015-3451/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-XML-LibXML-2.0019-5.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3451/">CVE-2015-3451</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113959" comment="perl-XML-LibXML-2.0019-5.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76411" version="1" class="patch">
	<metadata>
		<title>perl-YAML-LibYAML-0.38-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-1152" ref_url="https://www.suse.com/security/cve/CVE-2012-1152/" source="CVE"/>
		<reference ref_id="CVE-2013-6393" ref_url="https://www.suse.com/security/cve/CVE-2013-6393/" source="CVE"/>
		<reference ref_id="CVE-2014-2525" ref_url="https://www.suse.com/security/cve/CVE-2014-2525/" source="CVE"/>
		<reference ref_id="CVE-2014-9130" ref_url="https://www.suse.com/security/cve/CVE-2014-9130/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-YAML-LibYAML-0.38-10.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1152/">CVE-2012-1152</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6393/">CVE-2013-6393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2525/">CVE-2014-2525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9130/">CVE-2014-9130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109959" comment="perl-YAML-LibYAML-0.38-10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76412" version="1" class="patch">
	<metadata>
		<title>pidgin-otr-4.0.0-11.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-2369" ref_url="https://www.suse.com/security/cve/CVE-2012-2369/" source="CVE"/>
		<reference ref_id="CVE-2015-8833" ref_url="https://www.suse.com/security/cve/CVE-2015-8833/" source="CVE"/>
		<description>
These are all security issues fixed in the pidgin-otr-4.0.0-11.6 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2369/">CVE-2012-2369</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8833/">CVE-2015-8833</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142148" comment="pidgin-otr-4.0.0-11.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76413" version="1" class="patch">
	<metadata>
		<title>pigz-2.3-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-1191" ref_url="https://www.suse.com/security/cve/CVE-2015-1191/" source="CVE"/>
		<description>
These are all security issues fixed in the pigz-2.3-5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1191/">CVE-2015-1191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108432" comment="pigz-2.3-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76414" version="1" class="patch">
	<metadata>
		<title>ppp-2.4.7-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-3158" ref_url="https://www.suse.com/security/cve/CVE-2014-3158/" source="CVE"/>
		<description>
These are all security issues fixed in the ppp-2.4.7-1.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3158/">CVE-2014-3158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141072" comment="ppp-2.4.7-1.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76415" version="1" class="patch">
	<metadata>
		<title>procmail-3.22-267.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-3618" ref_url="https://www.suse.com/security/cve/CVE-2014-3618/" source="CVE"/>
		<description>
These are all security issues fixed in the procmail-3.22-267.12 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3618/">CVE-2014-3618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141775" comment="procmail-3.22-267.12 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76416" version="1" class="patch">
	<metadata>
		<title>puppet-3.8.5-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-3848" ref_url="https://www.suse.com/security/cve/CVE-2011-3848/" source="CVE"/>
		<reference ref_id="CVE-2011-3872" ref_url="https://www.suse.com/security/cve/CVE-2011-3872/" source="CVE"/>
		<reference ref_id="CVE-2012-3864" ref_url="https://www.suse.com/security/cve/CVE-2012-3864/" source="CVE"/>
		<reference ref_id="CVE-2012-3865" ref_url="https://www.suse.com/security/cve/CVE-2012-3865/" source="CVE"/>
		<reference ref_id="CVE-2012-3866" ref_url="https://www.suse.com/security/cve/CVE-2012-3866/" source="CVE"/>
		<reference ref_id="CVE-2012-3867" ref_url="https://www.suse.com/security/cve/CVE-2012-3867/" source="CVE"/>
		<reference ref_id="CVE-2013-3567" ref_url="https://www.suse.com/security/cve/CVE-2013-3567/" source="CVE"/>
		<reference ref_id="CVE-2013-4761" ref_url="https://www.suse.com/security/cve/CVE-2013-4761/" source="CVE"/>
		<reference ref_id="CVE-2013-4956" ref_url="https://www.suse.com/security/cve/CVE-2013-4956/" source="CVE"/>
		<reference ref_id="CVE-2014-3248" ref_url="https://www.suse.com/security/cve/CVE-2014-3248/" source="CVE"/>
		<reference ref_id="CVE-2014-3253" ref_url="https://www.suse.com/security/cve/CVE-2014-3253/" source="CVE"/>
		<description>
These are all security issues fixed in the puppet-3.8.5-5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3848/">CVE-2011-3848</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3872/">CVE-2011-3872</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3864/">CVE-2012-3864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3865/">CVE-2012-3865</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3866/">CVE-2012-3866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3867/">CVE-2012-3867</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3567/">CVE-2013-3567</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4761/">CVE-2013-4761</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4956/">CVE-2013-4956</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3248/">CVE-2014-3248</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3253/">CVE-2014-3253</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142149" comment="puppet-3.8.5-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76417" version="1" class="patch">
	<metadata>
		<title>python-2.7.9-24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<description>
These are all security issues fixed in the python-2.7.9-24.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130998" comment="python-2.7.9-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131000" comment="python-curses-2.7.9-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131002" comment="python-tk-2.7.9-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141074" comment="python3-3.4.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141075" comment="python3-curses-3.4.1-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76418" version="1" class="patch">
	<metadata>
		<title>python-cupshelpers-1.5.7-7.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-4405" ref_url="https://www.suse.com/security/cve/CVE-2011-4405/" source="CVE"/>
		<description>
These are all security issues fixed in the python-cupshelpers-1.5.7-7.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4405/">CVE-2011-4405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141076" comment="python-cupshelpers-1.5.7-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141077" comment="system-config-printer-1.5.7-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141078" comment="system-config-printer-common-1.5.7-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141079" comment="system-config-printer-common-lang-1.5.7-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141080" comment="system-config-printer-dbus-service-1.5.7-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141081" comment="udev-configure-printer-1.5.7-7.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76419" version="1" class="patch">
	<metadata>
		<title>python-imaging-1.1.7-21.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-1932" ref_url="https://www.suse.com/security/cve/CVE-2014-1932/" source="CVE"/>
		<description>
These are all security issues fixed in the python-imaging-1.1.7-21.15 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1932/">CVE-2014-1932</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141787" comment="python-imaging-1.1.7-21.15 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76420" version="1" class="patch">
	<metadata>
		<title>python-libxml2-2.9.4-27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-4225" ref_url="https://www.suse.com/security/cve/CVE-2008-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-4226" ref_url="https://www.suse.com/security/cve/CVE-2008-4226/" source="CVE"/>
		<reference ref_id="CVE-2008-4409" ref_url="https://www.suse.com/security/cve/CVE-2008-4409/" source="CVE"/>
		<reference ref_id="CVE-2012-5134" ref_url="https://www.suse.com/security/cve/CVE-2012-5134/" source="CVE"/>
		<reference ref_id="CVE-2016-1762" ref_url="https://www.suse.com/security/cve/CVE-2016-1762/" source="CVE"/>
		<reference ref_id="CVE-2016-1833" ref_url="https://www.suse.com/security/cve/CVE-2016-1833/" source="CVE"/>
		<reference ref_id="CVE-2016-1834" ref_url="https://www.suse.com/security/cve/CVE-2016-1834/" source="CVE"/>
		<reference ref_id="CVE-2016-1835" ref_url="https://www.suse.com/security/cve/CVE-2016-1835/" source="CVE"/>
		<reference ref_id="CVE-2016-1836" ref_url="https://www.suse.com/security/cve/CVE-2016-1836/" source="CVE"/>
		<reference ref_id="CVE-2016-1837" ref_url="https://www.suse.com/security/cve/CVE-2016-1837/" source="CVE"/>
		<reference ref_id="CVE-2016-1838" ref_url="https://www.suse.com/security/cve/CVE-2016-1838/" source="CVE"/>
		<reference ref_id="CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839/" source="CVE"/>
		<reference ref_id="CVE-2016-1840" ref_url="https://www.suse.com/security/cve/CVE-2016-1840/" source="CVE"/>
		<reference ref_id="CVE-2016-3627" ref_url="https://www.suse.com/security/cve/CVE-2016-3627/" source="CVE"/>
		<reference ref_id="CVE-2016-3705" ref_url="https://www.suse.com/security/cve/CVE-2016-3705/" source="CVE"/>
		<reference ref_id="CVE-2016-4483" ref_url="https://www.suse.com/security/cve/CVE-2016-4483/" source="CVE"/>
		<description>
These are all security issues fixed in the python-libxml2-2.9.4-27.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4225/">CVE-2008-4225</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4226/">CVE-2008-4226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4409/">CVE-2008-4409</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5134/">CVE-2012-5134</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1762/">CVE-2016-1762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1833/">CVE-2016-1833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1834/">CVE-2016-1834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1835/">CVE-2016-1835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1836/">CVE-2016-1836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1837/">CVE-2016-1837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1838/">CVE-2016-1838</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1840/">CVE-2016-1840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3627/">CVE-2016-3627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3705/">CVE-2016-3705</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4483/">CVE-2016-4483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141083" comment="python-libxml2-2.9.4-27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76421" version="1" class="patch">
	<metadata>
		<title>python-pyOpenSSL-16.0.0-2.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-4314" ref_url="https://www.suse.com/security/cve/CVE-2013-4314/" source="CVE"/>
		<description>
These are all security issues fixed in the python-pyOpenSSL-16.0.0-2.3.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4314/">CVE-2013-4314</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141084" comment="python-pyOpenSSL-16.0.0-2.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76422" version="1" class="patch">
	<metadata>
		<title>python-pywbem-0.7.0-4.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-6418" ref_url="https://www.suse.com/security/cve/CVE-2013-6418/" source="CVE"/>
		<description>
These are all security issues fixed in the python-pywbem-0.7.0-4.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6418/">CVE-2013-6418</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141085" comment="python-pywbem-0.7.0-4.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76423" version="1" class="patch">
	<metadata>
		<title>python-requests-2.8.1-6.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-1829" ref_url="https://www.suse.com/security/cve/CVE-2014-1829/" source="CVE"/>
		<reference ref_id="CVE-2014-1830" ref_url="https://www.suse.com/security/cve/CVE-2014-1830/" source="CVE"/>
		<reference ref_id="CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296/" source="CVE"/>
		<description>
These are all security issues fixed in the python-requests-2.8.1-6.11.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-1829/">CVE-2014-1829</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-1830/">CVE-2014-1830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141086" comment="python-requests-2.8.1-6.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76424" version="1" class="patch">
	<metadata>
		<title>qemu-2.6.1-27.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-0928" ref_url="https://www.suse.com/security/cve/CVE-2008-0928/" source="CVE"/>
		<reference ref_id="CVE-2008-1945" ref_url="https://www.suse.com/security/cve/CVE-2008-1945/" source="CVE"/>
		<reference ref_id="CVE-2008-2382" ref_url="https://www.suse.com/security/cve/CVE-2008-2382/" source="CVE"/>
		<reference ref_id="CVE-2008-4539" ref_url="https://www.suse.com/security/cve/CVE-2008-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515/" source="CVE"/>
		<reference ref_id="CVE-2013-4148" ref_url="https://www.suse.com/security/cve/CVE-2013-4148/" source="CVE"/>
		<reference ref_id="CVE-2013-4149" ref_url="https://www.suse.com/security/cve/CVE-2013-4149/" source="CVE"/>
		<reference ref_id="CVE-2013-4150" ref_url="https://www.suse.com/security/cve/CVE-2013-4150/" source="CVE"/>
		<reference ref_id="CVE-2013-4151" ref_url="https://www.suse.com/security/cve/CVE-2013-4151/" source="CVE"/>
		<reference ref_id="CVE-2013-4526" ref_url="https://www.suse.com/security/cve/CVE-2013-4526/" source="CVE"/>
		<reference ref_id="CVE-2013-4527" ref_url="https://www.suse.com/security/cve/CVE-2013-4527/" source="CVE"/>
		<reference ref_id="CVE-2013-4529" ref_url="https://www.suse.com/security/cve/CVE-2013-4529/" source="CVE"/>
		<reference ref_id="CVE-2013-4530" ref_url="https://www.suse.com/security/cve/CVE-2013-4530/" source="CVE"/>
		<reference ref_id="CVE-2013-4531" ref_url="https://www.suse.com/security/cve/CVE-2013-4531/" source="CVE"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4535" ref_url="https://www.suse.com/security/cve/CVE-2013-4535/" source="CVE"/>
		<reference ref_id="CVE-2013-4536" ref_url="https://www.suse.com/security/cve/CVE-2013-4536/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540/" source="CVE"/>
		<reference ref_id="CVE-2013-4541" ref_url="https://www.suse.com/security/cve/CVE-2013-4541/" source="CVE"/>
		<reference ref_id="CVE-2013-4542" ref_url="https://www.suse.com/security/cve/CVE-2013-4542/" source="CVE"/>
		<reference ref_id="CVE-2013-4544" ref_url="https://www.suse.com/security/cve/CVE-2013-4544/" source="CVE"/>
		<reference ref_id="CVE-2013-6399" ref_url="https://www.suse.com/security/cve/CVE-2013-6399/" source="CVE"/>
		<reference ref_id="CVE-2014-0142" ref_url="https://www.suse.com/security/cve/CVE-2014-0142/" source="CVE"/>
		<reference ref_id="CVE-2014-0143" ref_url="https://www.suse.com/security/cve/CVE-2014-0143/" source="CVE"/>
		<reference ref_id="CVE-2014-0144" ref_url="https://www.suse.com/security/cve/CVE-2014-0144/" source="CVE"/>
		<reference ref_id="CVE-2014-0145" ref_url="https://www.suse.com/security/cve/CVE-2014-0145/" source="CVE"/>
		<reference ref_id="CVE-2014-0146" ref_url="https://www.suse.com/security/cve/CVE-2014-0146/" source="CVE"/>
		<reference ref_id="CVE-2014-0147" ref_url="https://www.suse.com/security/cve/CVE-2014-0147/" source="CVE"/>
		<reference ref_id="CVE-2014-0150" ref_url="https://www.suse.com/security/cve/CVE-2014-0150/" source="CVE"/>
		<reference ref_id="CVE-2014-0182" ref_url="https://www.suse.com/security/cve/CVE-2014-0182/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-0223" ref_url="https://www.suse.com/security/cve/CVE-2014-0223/" source="CVE"/>
		<reference ref_id="CVE-2014-3461" ref_url="https://www.suse.com/security/cve/CVE-2014-3461/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-7840" ref_url="https://www.suse.com/security/cve/CVE-2014-7840/" source="CVE"/>
		<reference ref_id="CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5225" ref_url="https://www.suse.com/security/cve/CVE-2015-5225/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-5279" ref_url="https://www.suse.com/security/cve/CVE-2015-5279/" source="CVE"/>
		<reference ref_id="CVE-2015-5745" ref_url="https://www.suse.com/security/cve/CVE-2015-5745/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7295" ref_url="https://www.suse.com/security/cve/CVE-2015-7295/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567/" source="CVE"/>
		<reference ref_id="CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710/" source="CVE"/>
		<reference ref_id="CVE-2016-3712" ref_url="https://www.suse.com/security/cve/CVE-2016-3712/" source="CVE"/>
		<reference ref_id="CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002/" source="CVE"/>
		<reference ref_id="CVE-2016-4020" ref_url="https://www.suse.com/security/cve/CVE-2016-4020/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-4453" ref_url="https://www.suse.com/security/cve/CVE-2016-4453/" source="CVE"/>
		<reference ref_id="CVE-2016-4454" ref_url="https://www.suse.com/security/cve/CVE-2016-4454/" source="CVE"/>
		<reference ref_id="CVE-2016-4952" ref_url="https://www.suse.com/security/cve/CVE-2016-4952/" source="CVE"/>
		<reference ref_id="CVE-2016-4964" ref_url="https://www.suse.com/security/cve/CVE-2016-4964/" source="CVE"/>
		<reference ref_id="CVE-2016-5105" ref_url="https://www.suse.com/security/cve/CVE-2016-5105/" source="CVE"/>
		<reference ref_id="CVE-2016-5106" ref_url="https://www.suse.com/security/cve/CVE-2016-5106/" source="CVE"/>
		<reference ref_id="CVE-2016-5107" ref_url="https://www.suse.com/security/cve/CVE-2016-5107/" source="CVE"/>
		<reference ref_id="CVE-2016-5126" ref_url="https://www.suse.com/security/cve/CVE-2016-5126/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5337" ref_url="https://www.suse.com/security/cve/CVE-2016-5337/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-5403" ref_url="https://www.suse.com/security/cve/CVE-2016-5403/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="CVE-2016-6490" ref_url="https://www.suse.com/security/cve/CVE-2016-6490/" source="CVE"/>
		<reference ref_id="CVE-2016-6833" ref_url="https://www.suse.com/security/cve/CVE-2016-6833/" source="CVE"/>
		<reference ref_id="CVE-2016-6836" ref_url="https://www.suse.com/security/cve/CVE-2016-6836/" source="CVE"/>
		<reference ref_id="CVE-2016-6888" ref_url="https://www.suse.com/security/cve/CVE-2016-6888/" source="CVE"/>
		<reference ref_id="CVE-2016-7116" ref_url="https://www.suse.com/security/cve/CVE-2016-7116/" source="CVE"/>
		<reference ref_id="CVE-2016-7155" ref_url="https://www.suse.com/security/cve/CVE-2016-7155/" source="CVE"/>
		<reference ref_id="CVE-2016-7156" ref_url="https://www.suse.com/security/cve/CVE-2016-7156/" source="CVE"/>
		<reference ref_id="CVE-2016-7157" ref_url="https://www.suse.com/security/cve/CVE-2016-7157/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-2.6.1-27.15 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0928/">CVE-2008-0928</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1945/">CVE-2008-1945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2382/">CVE-2008-2382</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4539/">CVE-2008-4539</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4148/">CVE-2013-4148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4149/">CVE-2013-4149</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4150/">CVE-2013-4150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4151/">CVE-2013-4151</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4526/">CVE-2013-4526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4527/">CVE-2013-4527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4529/">CVE-2013-4529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4530/">CVE-2013-4530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4531/">CVE-2013-4531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4535/">CVE-2013-4535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4536/">CVE-2013-4536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4541/">CVE-2013-4541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4542/">CVE-2013-4542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4544/">CVE-2013-4544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6399/">CVE-2013-6399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0142/">CVE-2014-0142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0143/">CVE-2014-0143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0144/">CVE-2014-0144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0145/">CVE-2014-0145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0146/">CVE-2014-0146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0147/">CVE-2014-0147</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0150/">CVE-2014-0150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0182/">CVE-2014-0182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0223/">CVE-2014-0223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3461/">CVE-2014-3461</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7840/">CVE-2014-7840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5225/">CVE-2015-5225</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5279/">CVE-2015-5279</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5745/">CVE-2015-5745</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7295/">CVE-2015-7295</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3712/">CVE-2016-3712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4020/">CVE-2016-4020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4453/">CVE-2016-4453</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4454/">CVE-2016-4454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4952/">CVE-2016-4952</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4964/">CVE-2016-4964</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5105/">CVE-2016-5105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5106/">CVE-2016-5106</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5107/">CVE-2016-5107</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5126/">CVE-2016-5126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5337/">CVE-2016-5337</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5403/">CVE-2016-5403</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6490/">CVE-2016-6490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6833/">CVE-2016-6833</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6836/">CVE-2016-6836</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6888/">CVE-2016-6888</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7116/">CVE-2016-7116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7155/">CVE-2016-7155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7156/">CVE-2016-7156</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7157/">CVE-2016-7157</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76425" version="1" class="patch">
	<metadata>
		<title>radvd-1.9.7-2.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-3602" ref_url="https://www.suse.com/security/cve/CVE-2011-3602/" source="CVE"/>
		<description>
These are all security issues fixed in the radvd-1.9.7-2.17 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3602/">CVE-2011-3602</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141103" comment="radvd-1.9.7-2.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76426" version="1" class="patch">
	<metadata>
		<title>rhythmbox-3.4-6.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-3355" ref_url="https://www.suse.com/security/cve/CVE-2012-3355/" source="CVE"/>
		<description>
These are all security issues fixed in the rhythmbox-3.4-6.14 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3355/">CVE-2012-3355</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142150" comment="rhythmbox-3.4-6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142151" comment="rhythmbox-lang-3.4-6.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76427" version="1" class="patch">
	<metadata>
		<title>rpcbind-0.2.3-21.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-7236" ref_url="https://www.suse.com/security/cve/CVE-2015-7236/" source="CVE"/>
		<description>
These are all security issues fixed in the rpcbind-0.2.3-21.4 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7236/">CVE-2015-7236</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141107" comment="rpcbind-0.2.3-21.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76428" version="1" class="patch">
	<metadata>
		<title>rpm-32bit-4.11.2-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-6435" ref_url="https://www.suse.com/security/cve/CVE-2013-6435/" source="CVE"/>
		<reference ref_id="CVE-2014-8118" ref_url="https://www.suse.com/security/cve/CVE-2014-8118/" source="CVE"/>
		<description>
These are all security issues fixed in the rpm-32bit-4.11.2-15.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6435/">CVE-2013-6435</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8118/">CVE-2014-8118</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141108" comment="rpm-4.11.2-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141109" comment="rpm-32bit-4.11.2-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141110" comment="rpm-build-4.11.2-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76429" version="1" class="patch">
	<metadata>
		<title>rsync-3.1.0-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1097" ref_url="https://www.suse.com/security/cve/CVE-2011-1097/" source="CVE"/>
		<reference ref_id="CVE-2014-2855" ref_url="https://www.suse.com/security/cve/CVE-2014-2855/" source="CVE"/>
		<reference ref_id="CVE-2014-8242" ref_url="https://www.suse.com/security/cve/CVE-2014-8242/" source="CVE"/>
		<reference ref_id="CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512/" source="CVE"/>
		<description>
These are all security issues fixed in the rsync-3.1.0-12.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1097/">CVE-2011-1097</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2855/">CVE-2014-2855</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8242/">CVE-2014-8242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141111" comment="rsync-3.1.0-12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76430" version="1" class="patch">
	<metadata>
		<title>rsyslog-8.4.0-14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-3200" ref_url="https://www.suse.com/security/cve/CVE-2011-3200/" source="CVE"/>
		<reference ref_id="CVE-2013-4758" ref_url="https://www.suse.com/security/cve/CVE-2013-4758/" source="CVE"/>
		<reference ref_id="CVE-2013-6370" ref_url="https://www.suse.com/security/cve/CVE-2013-6370/" source="CVE"/>
		<reference ref_id="CVE-2013-6371" ref_url="https://www.suse.com/security/cve/CVE-2013-6371/" source="CVE"/>
		<reference ref_id="CVE-2014-3634" ref_url="https://www.suse.com/security/cve/CVE-2014-3634/" source="CVE"/>
		<reference ref_id="CVE-2014-3683" ref_url="https://www.suse.com/security/cve/CVE-2014-3683/" source="CVE"/>
		<description>
These are all security issues fixed in the rsyslog-8.4.0-14.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3200/">CVE-2011-3200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4758/">CVE-2013-4758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6370/">CVE-2013-6370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6371/">CVE-2013-6371</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3634/">CVE-2014-3634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3683/">CVE-2014-3683</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141112" comment="rsyslog-8.4.0-14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76431" version="1" class="patch">
	<metadata>
		<title>rtkit-0.11_git201205151338-8.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-4326" ref_url="https://www.suse.com/security/cve/CVE-2013-4326/" source="CVE"/>
		<description>
These are all security issues fixed in the rtkit-0.11_git201205151338-8.17 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4326/">CVE-2013-4326</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141122" comment="rtkit-0.11_git201205151338-8.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76432" version="1" class="patch">
	<metadata>
		<title>ruby-2.1-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-4492" ref_url="https://www.suse.com/security/cve/CVE-2009-4492/" source="CVE"/>
		<reference ref_id="CVE-2010-0541" ref_url="https://www.suse.com/security/cve/CVE-2010-0541/" source="CVE"/>
		<reference ref_id="CVE-2011-1004" ref_url="https://www.suse.com/security/cve/CVE-2011-1004/" source="CVE"/>
		<reference ref_id="CVE-2011-1005" ref_url="https://www.suse.com/security/cve/CVE-2011-1005/" source="CVE"/>
		<reference ref_id="CVE-2011-4815" ref_url="https://www.suse.com/security/cve/CVE-2011-4815/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby-2.1-1.6 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4492/">CVE-2009-4492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0541/">CVE-2010-0541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1004/">CVE-2011-1004</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1005/">CVE-2011-1005</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4815/">CVE-2011-4815</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141123" comment="ruby-2.1-1.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76433" version="1" class="patch">
	<metadata>
		<title>sblim-sfcb-1.4.8-8.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-5185" ref_url="https://www.suse.com/security/cve/CVE-2015-5185/" source="CVE"/>
		<description>
These are all security issues fixed in the sblim-sfcb-1.4.8-8.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5185/">CVE-2015-5185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141124" comment="sblim-sfcb-1.4.8-8.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76434" version="1" class="patch">
	<metadata>
		<title>shim-0.9-20.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-3675" ref_url="https://www.suse.com/security/cve/CVE-2014-3675/" source="CVE"/>
		<reference ref_id="CVE-2014-3676" ref_url="https://www.suse.com/security/cve/CVE-2014-3676/" source="CVE"/>
		<reference ref_id="CVE-2014-3677" ref_url="https://www.suse.com/security/cve/CVE-2014-3677/" source="CVE"/>
		<description>
These are all security issues fixed in the shim-0.9-20.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3675/">CVE-2014-3675</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3676/">CVE-2014-3676</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3677/">CVE-2014-3677</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141125" comment="shim-0.9-20.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76435" version="1" class="patch">
	<metadata>
		<title>socat-1.7.2.4-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-3571" ref_url="https://www.suse.com/security/cve/CVE-2013-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-0019" ref_url="https://www.suse.com/security/cve/CVE-2014-0019/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<description>
These are all security issues fixed in the socat-1.7.2.4-3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3571/">CVE-2013-3571</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0019/">CVE-2014-0019</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009122758" comment="socat-1.7.2.4-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76436" version="1" class="patch">
	<metadata>
		<title>squashfs-4.3-6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-4024" ref_url="https://www.suse.com/security/cve/CVE-2012-4024/" source="CVE"/>
		<reference ref_id="CVE-2012-4025" ref_url="https://www.suse.com/security/cve/CVE-2012-4025/" source="CVE"/>
		<description>
These are all security issues fixed in the squashfs-4.3-6.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4024/">CVE-2012-4024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4025/">CVE-2012-4025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141126" comment="squashfs-4.3-6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76437" version="1" class="patch">
	<metadata>
		<title>strongswan-5.1.3-22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0790" ref_url="https://www.suse.com/security/cve/CVE-2009-0790/" source="CVE"/>
		<reference ref_id="CVE-2012-2388" ref_url="https://www.suse.com/security/cve/CVE-2012-2388/" source="CVE"/>
		<reference ref_id="CVE-2013-2944" ref_url="https://www.suse.com/security/cve/CVE-2013-2944/" source="CVE"/>
		<reference ref_id="CVE-2013-5018" ref_url="https://www.suse.com/security/cve/CVE-2013-5018/" source="CVE"/>
		<reference ref_id="CVE-2013-6075" ref_url="https://www.suse.com/security/cve/CVE-2013-6075/" source="CVE"/>
		<reference ref_id="CVE-2013-6076" ref_url="https://www.suse.com/security/cve/CVE-2013-6076/" source="CVE"/>
		<reference ref_id="CVE-2014-2338" ref_url="https://www.suse.com/security/cve/CVE-2014-2338/" source="CVE"/>
		<reference ref_id="CVE-2014-9221" ref_url="https://www.suse.com/security/cve/CVE-2014-9221/" source="CVE"/>
		<reference ref_id="CVE-2015-4171" ref_url="https://www.suse.com/security/cve/CVE-2015-4171/" source="CVE"/>
		<reference ref_id="CVE-2015-8023" ref_url="https://www.suse.com/security/cve/CVE-2015-8023/" source="CVE"/>
		<description>
These are all security issues fixed in the strongswan-5.1.3-22.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0790/">CVE-2009-0790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2388/">CVE-2012-2388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2944/">CVE-2013-2944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5018/">CVE-2013-5018</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6075/">CVE-2013-6075</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6076/">CVE-2013-6076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2338/">CVE-2014-2338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9221/">CVE-2014-9221</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4171/">CVE-2015-4171</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8023/">CVE-2015-8023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009119278" comment="strongswan-5.1.3-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009119279" comment="strongswan-doc-5.1.3-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009119280" comment="strongswan-ipsec-5.1.3-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009119281" comment="strongswan-libs0-5.1.3-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76438" version="1" class="patch">
	<metadata>
		<title>sudo-1.8.10p3-6.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-1163" ref_url="https://www.suse.com/security/cve/CVE-2010-1163/" source="CVE"/>
		<reference ref_id="CVE-2010-1646" ref_url="https://www.suse.com/security/cve/CVE-2010-1646/" source="CVE"/>
		<reference ref_id="CVE-2011-0010" ref_url="https://www.suse.com/security/cve/CVE-2011-0010/" source="CVE"/>
		<reference ref_id="CVE-2012-2337" ref_url="https://www.suse.com/security/cve/CVE-2012-2337/" source="CVE"/>
		<reference ref_id="CVE-2013-1775" ref_url="https://www.suse.com/security/cve/CVE-2013-1775/" source="CVE"/>
		<reference ref_id="CVE-2013-1776" ref_url="https://www.suse.com/security/cve/CVE-2013-1776/" source="CVE"/>
		<reference ref_id="CVE-2014-9680" ref_url="https://www.suse.com/security/cve/CVE-2014-9680/" source="CVE"/>
		<description>
These are all security issues fixed in the sudo-1.8.10p3-6.16 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1163/">CVE-2010-1163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1646/">CVE-2010-1646</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0010/">CVE-2011-0010</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2337/">CVE-2012-2337</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1775/">CVE-2013-1775</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-1776/">CVE-2013-1776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9680/">CVE-2014-9680</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141130" comment="sudo-1.8.10p3-6.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76439" version="1" class="patch">
	<metadata>
		<title>supportutils-3.0-85.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2016-1602" ref_url="https://www.suse.com/security/cve/CVE-2016-1602/" source="CVE"/>
		<description>
These are all security issues fixed in the supportutils-3.0-85.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1602/">CVE-2016-1602</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141131" comment="supportutils-3.0-85.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76440" version="1" class="patch">
	<metadata>
		<title>sysconfig-0.84.0-13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-4182" ref_url="https://www.suse.com/security/cve/CVE-2011-4182/" source="CVE"/>
		<description>
These are all security issues fixed in the sysconfig-0.84.0-13.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4182/">CVE-2011-4182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141132" comment="sysconfig-0.84.0-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141133" comment="sysconfig-netconfig-0.84.0-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76441" version="1" class="patch">
	<metadata>
		<title>syslog-service-2.0-778.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-3634" ref_url="https://www.suse.com/security/cve/CVE-2014-3634/" source="CVE"/>
		<description>
These are all security issues fixed in the syslog-service-2.0-778.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3634/">CVE-2014-3634</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141134" comment="syslog-service-2.0-778.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76442" version="1" class="patch">
	<metadata>
		<title>sysvinit-tools-2.88+-96.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<description>
These are all security issues fixed in the sysvinit-tools-2.88+-96.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141138" comment="sysvinit-tools-2.88+-96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141139" comment="whois-5.1.1-1.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76443" version="1" class="patch">
	<metadata>
		<title>tar-1.27.1-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-0624" ref_url="https://www.suse.com/security/cve/CVE-2010-0624/" source="CVE"/>
		<description>
These are all security issues fixed in the tar-1.27.1-8.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0624/">CVE-2010-0624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009136443" comment="tar-1.27.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009136445" comment="tar-lang-1.27.1-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76444" version="1" class="patch">
	<metadata>
		<title>tcpdump-4.5.1-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-8767" ref_url="https://www.suse.com/security/cve/CVE-2014-8767/" source="CVE"/>
		<reference ref_id="CVE-2014-8768" ref_url="https://www.suse.com/security/cve/CVE-2014-8768/" source="CVE"/>
		<reference ref_id="CVE-2014-8769" ref_url="https://www.suse.com/security/cve/CVE-2014-8769/" source="CVE"/>
		<reference ref_id="CVE-2014-9140" ref_url="https://www.suse.com/security/cve/CVE-2014-9140/" source="CVE"/>
		<reference ref_id="CVE-2015-0261" ref_url="https://www.suse.com/security/cve/CVE-2015-0261/" source="CVE"/>
		<reference ref_id="CVE-2015-2153" ref_url="https://www.suse.com/security/cve/CVE-2015-2153/" source="CVE"/>
		<reference ref_id="CVE-2015-2154" ref_url="https://www.suse.com/security/cve/CVE-2015-2154/" source="CVE"/>
		<reference ref_id="CVE-2015-2155" ref_url="https://www.suse.com/security/cve/CVE-2015-2155/" source="CVE"/>
		<description>
These are all security issues fixed in the tcpdump-4.5.1-10.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8767/">CVE-2014-8767</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8768/">CVE-2014-8768</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8769/">CVE-2014-8769</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9140/">CVE-2014-9140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0261/">CVE-2015-0261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2153/">CVE-2015-2153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2154/">CVE-2015-2154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2155/">CVE-2015-2155</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141140" comment="tcpdump-4.5.1-10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76445" version="1" class="patch">
	<metadata>
		<title>telepathy-gabble-0.18.3-5.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1000" ref_url="https://www.suse.com/security/cve/CVE-2011-1000/" source="CVE"/>
		<reference ref_id="CVE-2013-1431" ref_url="https://www.suse.com/security/cve/CVE-2013-1431/" source="CVE"/>
		<description>
These are all security issues fixed in the telepathy-gabble-0.18.3-5.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1000/">CVE-2011-1000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1431/">CVE-2013-1431</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142152" comment="telepathy-gabble-0.18.3-5.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76446" version="1" class="patch">
	<metadata>
		<title>telepathy-idle-0.2.0-1.62 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-6746" ref_url="https://www.suse.com/security/cve/CVE-2007-6746/" source="CVE"/>
		<description>
These are all security issues fixed in the telepathy-idle-0.2.0-1.62 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6746/">CVE-2007-6746</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141815" comment="telepathy-idle-0.2.0-1.62 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76447" version="1" class="patch">
	<metadata>
		<title>tftp-5.2-10.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-2199" ref_url="https://www.suse.com/security/cve/CVE-2011-2199/" source="CVE"/>
		<description>
These are all security issues fixed in the tftp-5.2-10.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2199/">CVE-2011-2199</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141141" comment="tftp-5.2-10.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76448" version="1" class="patch">
	<metadata>
		<title>unixODBC-2.3.4-6.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1145" ref_url="https://www.suse.com/security/cve/CVE-2011-1145/" source="CVE"/>
		<description>
These are all security issues fixed in the unixODBC-2.3.4-6.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1145/">CVE-2011-1145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141151" comment="unixODBC-2.3.4-6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141152" comment="unixODBC-32bit-2.3.4-6.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76449" version="1" class="patch">
	<metadata>
		<title>unzip-6.00-32.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-8139" ref_url="https://www.suse.com/security/cve/CVE-2014-8139/" source="CVE"/>
		<reference ref_id="CVE-2014-8140" ref_url="https://www.suse.com/security/cve/CVE-2014-8140/" source="CVE"/>
		<reference ref_id="CVE-2014-8141" ref_url="https://www.suse.com/security/cve/CVE-2014-8141/" source="CVE"/>
		<reference ref_id="CVE-2014-9636" ref_url="https://www.suse.com/security/cve/CVE-2014-9636/" source="CVE"/>
		<description>
These are all security issues fixed in the unzip-6.00-32.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8139/">CVE-2014-8139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8140/">CVE-2014-8140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8141/">CVE-2014-8141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9636/">CVE-2014-9636</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106381" comment="unzip-6.00-32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76450" version="1" class="patch">
	<metadata>
		<title>update-alternatives-1.18.4-14.216 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-0840" ref_url="https://www.suse.com/security/cve/CVE-2015-0840/" source="CVE"/>
		<description>
These are all security issues fixed in the update-alternatives-1.18.4-14.216 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0840/">CVE-2015-0840</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141153" comment="update-alternatives-1.18.4-14.216 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76451" version="1" class="patch">
	<metadata>
		<title>vino-3.20.2-5.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-0904" ref_url="https://www.suse.com/security/cve/CVE-2011-0904/" source="CVE"/>
		<reference ref_id="CVE-2011-0905" ref_url="https://www.suse.com/security/cve/CVE-2011-0905/" source="CVE"/>
		<reference ref_id="CVE-2011-1164" ref_url="https://www.suse.com/security/cve/CVE-2011-1164/" source="CVE"/>
		<description>
These are all security issues fixed in the vino-3.20.2-5.8 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0904/">CVE-2011-0904</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-0905/">CVE-2011-0905</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1164/">CVE-2011-1164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141154" comment="vino-3.20.2-5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141155" comment="vino-lang-3.20.2-5.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76452" version="1" class="patch">
	<metadata>
		<title>vorbis-tools-1.4.0-26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-1686" ref_url="https://www.suse.com/security/cve/CVE-2008-1686/" source="CVE"/>
		<reference ref_id="CVE-2014-9638" ref_url="https://www.suse.com/security/cve/CVE-2014-9638/" source="CVE"/>
		<reference ref_id="CVE-2014-9639" ref_url="https://www.suse.com/security/cve/CVE-2014-9639/" source="CVE"/>
		<reference ref_id="CVE-2014-9640" ref_url="https://www.suse.com/security/cve/CVE-2014-9640/" source="CVE"/>
		<reference ref_id="CVE-2015-6749" ref_url="https://www.suse.com/security/cve/CVE-2015-6749/" source="CVE"/>
		<description>
These are all security issues fixed in the vorbis-tools-1.4.0-26.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1686/">CVE-2008-1686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9638/">CVE-2014-9638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9639/">CVE-2014-9639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9640/">CVE-2014-9640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6749/">CVE-2015-6749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009115051" comment="vorbis-tools-1.4.0-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115052" comment="vorbis-tools-lang-1.4.0-26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76453" version="1" class="patch">
	<metadata>
		<title>w3m-0.5.3-157.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2074" ref_url="https://www.suse.com/security/cve/CVE-2010-2074/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<description>
These are all security issues fixed in the w3m-0.5.3-157.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2074/">CVE-2010-2074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141157" comment="w3m-0.5.3-157.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76454" version="1" class="patch">
	<metadata>
		<title>wdiff-1.2.1-3.64 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<description>
These are all security issues fixed in the wdiff-1.2.1-3.64 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140672" comment="wdiff-1.2.1-3.64 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76455" version="1" class="patch">
	<metadata>
		<title>wget-1.14-10.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2252" ref_url="https://www.suse.com/security/cve/CVE-2010-2252/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2014-4877" ref_url="https://www.suse.com/security/cve/CVE-2014-4877/" source="CVE"/>
		<reference ref_id="CVE-2015-2059" ref_url="https://www.suse.com/security/cve/CVE-2015-2059/" source="CVE"/>
		<reference ref_id="CVE-2016-4971" ref_url="https://www.suse.com/security/cve/CVE-2016-4971/" source="CVE"/>
		<description>
These are all security issues fixed in the wget-1.14-10.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2252/">CVE-2010-2252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4877/">CVE-2014-4877</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2059/">CVE-2015-2059</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4971/">CVE-2016-4971</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131037" comment="wget-1.14-10.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76456" version="1" class="patch">
	<metadata>
		<title>wireshark-1.12.13-31.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-1210" ref_url="https://www.suse.com/security/cve/CVE-2009-1210/" source="CVE"/>
		<reference ref_id="CVE-2009-1267" ref_url="https://www.suse.com/security/cve/CVE-2009-1267/" source="CVE"/>
		<reference ref_id="CVE-2009-1268" ref_url="https://www.suse.com/security/cve/CVE-2009-1268/" source="CVE"/>
		<reference ref_id="CVE-2009-1269" ref_url="https://www.suse.com/security/cve/CVE-2009-1269/" source="CVE"/>
		<reference ref_id="CVE-2009-3241" ref_url="https://www.suse.com/security/cve/CVE-2009-3241/" source="CVE"/>
		<reference ref_id="CVE-2009-3242" ref_url="https://www.suse.com/security/cve/CVE-2009-3242/" source="CVE"/>
		<reference ref_id="CVE-2009-3243" ref_url="https://www.suse.com/security/cve/CVE-2009-3243/" source="CVE"/>
		<reference ref_id="CVE-2010-1455" ref_url="https://www.suse.com/security/cve/CVE-2010-1455/" source="CVE"/>
		<reference ref_id="CVE-2010-2993" ref_url="https://www.suse.com/security/cve/CVE-2010-2993/" source="CVE"/>
		<reference ref_id="CVE-2010-3445" ref_url="https://www.suse.com/security/cve/CVE-2010-3445/" source="CVE"/>
		<reference ref_id="CVE-2010-4300" ref_url="https://www.suse.com/security/cve/CVE-2010-4300/" source="CVE"/>
		<reference ref_id="CVE-2010-4301" ref_url="https://www.suse.com/security/cve/CVE-2010-4301/" source="CVE"/>
		<reference ref_id="CVE-2010-4538" ref_url="https://www.suse.com/security/cve/CVE-2010-4538/" source="CVE"/>
		<reference ref_id="CVE-2011-0024" ref_url="https://www.suse.com/security/cve/CVE-2011-0024/" source="CVE"/>
		<reference ref_id="CVE-2011-0538" ref_url="https://www.suse.com/security/cve/CVE-2011-0538/" source="CVE"/>
		<reference ref_id="CVE-2011-0713" ref_url="https://www.suse.com/security/cve/CVE-2011-0713/" source="CVE"/>
		<reference ref_id="CVE-2011-1138" ref_url="https://www.suse.com/security/cve/CVE-2011-1138/" source="CVE"/>
		<reference ref_id="CVE-2011-1139" ref_url="https://www.suse.com/security/cve/CVE-2011-1139/" source="CVE"/>
		<reference ref_id="CVE-2011-1140" ref_url="https://www.suse.com/security/cve/CVE-2011-1140/" source="CVE"/>
		<reference ref_id="CVE-2011-1143" ref_url="https://www.suse.com/security/cve/CVE-2011-1143/" source="CVE"/>
		<reference ref_id="CVE-2011-1590" ref_url="https://www.suse.com/security/cve/CVE-2011-1590/" source="CVE"/>
		<reference ref_id="CVE-2011-1591" ref_url="https://www.suse.com/security/cve/CVE-2011-1591/" source="CVE"/>
		<reference ref_id="CVE-2011-1592" ref_url="https://www.suse.com/security/cve/CVE-2011-1592/" source="CVE"/>
		<reference ref_id="CVE-2011-1957" ref_url="https://www.suse.com/security/cve/CVE-2011-1957/" source="CVE"/>
		<reference ref_id="CVE-2011-1958" ref_url="https://www.suse.com/security/cve/CVE-2011-1958/" source="CVE"/>
		<reference ref_id="CVE-2011-1959" ref_url="https://www.suse.com/security/cve/CVE-2011-1959/" source="CVE"/>
		<reference ref_id="CVE-2011-2174" ref_url="https://www.suse.com/security/cve/CVE-2011-2174/" source="CVE"/>
		<reference ref_id="CVE-2011-2175" ref_url="https://www.suse.com/security/cve/CVE-2011-2175/" source="CVE"/>
		<reference ref_id="CVE-2011-2597" ref_url="https://www.suse.com/security/cve/CVE-2011-2597/" source="CVE"/>
		<reference ref_id="CVE-2011-2698" ref_url="https://www.suse.com/security/cve/CVE-2011-2698/" source="CVE"/>
		<reference ref_id="CVE-2011-3266" ref_url="https://www.suse.com/security/cve/CVE-2011-3266/" source="CVE"/>
		<reference ref_id="CVE-2011-3360" ref_url="https://www.suse.com/security/cve/CVE-2011-3360/" source="CVE"/>
		<reference ref_id="CVE-2011-3483" ref_url="https://www.suse.com/security/cve/CVE-2011-3483/" source="CVE"/>
		<reference ref_id="CVE-2012-2392" ref_url="https://www.suse.com/security/cve/CVE-2012-2392/" source="CVE"/>
		<reference ref_id="CVE-2012-2393" ref_url="https://www.suse.com/security/cve/CVE-2012-2393/" source="CVE"/>
		<reference ref_id="CVE-2012-2394" ref_url="https://www.suse.com/security/cve/CVE-2012-2394/" source="CVE"/>
		<reference ref_id="CVE-2012-3548" ref_url="https://www.suse.com/security/cve/CVE-2012-3548/" source="CVE"/>
		<reference ref_id="CVE-2012-4048" ref_url="https://www.suse.com/security/cve/CVE-2012-4048/" source="CVE"/>
		<reference ref_id="CVE-2012-4049" ref_url="https://www.suse.com/security/cve/CVE-2012-4049/" source="CVE"/>
		<reference ref_id="CVE-2012-4285" ref_url="https://www.suse.com/security/cve/CVE-2012-4285/" source="CVE"/>
		<reference ref_id="CVE-2012-4286" ref_url="https://www.suse.com/security/cve/CVE-2012-4286/" source="CVE"/>
		<reference ref_id="CVE-2012-4287" ref_url="https://www.suse.com/security/cve/CVE-2012-4287/" source="CVE"/>
		<reference ref_id="CVE-2012-4288" ref_url="https://www.suse.com/security/cve/CVE-2012-4288/" source="CVE"/>
		<reference ref_id="CVE-2012-4289" ref_url="https://www.suse.com/security/cve/CVE-2012-4289/" source="CVE"/>
		<reference ref_id="CVE-2012-4290" ref_url="https://www.suse.com/security/cve/CVE-2012-4290/" source="CVE"/>
		<reference ref_id="CVE-2012-4291" ref_url="https://www.suse.com/security/cve/CVE-2012-4291/" source="CVE"/>
		<reference ref_id="CVE-2012-4292" ref_url="https://www.suse.com/security/cve/CVE-2012-4292/" source="CVE"/>
		<reference ref_id="CVE-2012-4293" ref_url="https://www.suse.com/security/cve/CVE-2012-4293/" source="CVE"/>
		<reference ref_id="CVE-2012-4294" ref_url="https://www.suse.com/security/cve/CVE-2012-4294/" source="CVE"/>
		<reference ref_id="CVE-2012-4295" ref_url="https://www.suse.com/security/cve/CVE-2012-4295/" source="CVE"/>
		<reference ref_id="CVE-2012-4296" ref_url="https://www.suse.com/security/cve/CVE-2012-4296/" source="CVE"/>
		<reference ref_id="CVE-2012-4297" ref_url="https://www.suse.com/security/cve/CVE-2012-4297/" source="CVE"/>
		<reference ref_id="CVE-2012-4298" ref_url="https://www.suse.com/security/cve/CVE-2012-4298/" source="CVE"/>
		<reference ref_id="CVE-2012-5237" ref_url="https://www.suse.com/security/cve/CVE-2012-5237/" source="CVE"/>
		<reference ref_id="CVE-2012-5238" ref_url="https://www.suse.com/security/cve/CVE-2012-5238/" source="CVE"/>
		<reference ref_id="CVE-2012-5239" ref_url="https://www.suse.com/security/cve/CVE-2012-5239/" source="CVE"/>
		<reference ref_id="CVE-2012-5240" ref_url="https://www.suse.com/security/cve/CVE-2012-5240/" source="CVE"/>
		<reference ref_id="CVE-2012-5592" ref_url="https://www.suse.com/security/cve/CVE-2012-5592/" source="CVE"/>
		<reference ref_id="CVE-2012-5593" ref_url="https://www.suse.com/security/cve/CVE-2012-5593/" source="CVE"/>
		<reference ref_id="CVE-2012-5594" ref_url="https://www.suse.com/security/cve/CVE-2012-5594/" source="CVE"/>
		<reference ref_id="CVE-2012-5595" ref_url="https://www.suse.com/security/cve/CVE-2012-5595/" source="CVE"/>
		<reference ref_id="CVE-2012-5596" ref_url="https://www.suse.com/security/cve/CVE-2012-5596/" source="CVE"/>
		<reference ref_id="CVE-2012-5597" ref_url="https://www.suse.com/security/cve/CVE-2012-5597/" source="CVE"/>
		<reference ref_id="CVE-2012-5598" ref_url="https://www.suse.com/security/cve/CVE-2012-5598/" source="CVE"/>
		<reference ref_id="CVE-2012-5599" ref_url="https://www.suse.com/security/cve/CVE-2012-5599/" source="CVE"/>
		<reference ref_id="CVE-2012-5600" ref_url="https://www.suse.com/security/cve/CVE-2012-5600/" source="CVE"/>
		<reference ref_id="CVE-2012-5601" ref_url="https://www.suse.com/security/cve/CVE-2012-5601/" source="CVE"/>
		<reference ref_id="CVE-2012-5602" ref_url="https://www.suse.com/security/cve/CVE-2012-5602/" source="CVE"/>
		<reference ref_id="CVE-2013-1572" ref_url="https://www.suse.com/security/cve/CVE-2013-1572/" source="CVE"/>
		<reference ref_id="CVE-2013-1573" ref_url="https://www.suse.com/security/cve/CVE-2013-1573/" source="CVE"/>
		<reference ref_id="CVE-2013-1574" ref_url="https://www.suse.com/security/cve/CVE-2013-1574/" source="CVE"/>
		<reference ref_id="CVE-2013-1575" ref_url="https://www.suse.com/security/cve/CVE-2013-1575/" source="CVE"/>
		<reference ref_id="CVE-2013-1576" ref_url="https://www.suse.com/security/cve/CVE-2013-1576/" source="CVE"/>
		<reference ref_id="CVE-2013-1577" ref_url="https://www.suse.com/security/cve/CVE-2013-1577/" source="CVE"/>
		<reference ref_id="CVE-2013-1578" ref_url="https://www.suse.com/security/cve/CVE-2013-1578/" source="CVE"/>
		<reference ref_id="CVE-2013-1579" ref_url="https://www.suse.com/security/cve/CVE-2013-1579/" source="CVE"/>
		<reference ref_id="CVE-2013-1580" ref_url="https://www.suse.com/security/cve/CVE-2013-1580/" source="CVE"/>
		<reference ref_id="CVE-2013-1581" ref_url="https://www.suse.com/security/cve/CVE-2013-1581/" source="CVE"/>
		<reference ref_id="CVE-2013-1582" ref_url="https://www.suse.com/security/cve/CVE-2013-1582/" source="CVE"/>
		<reference ref_id="CVE-2013-1583" ref_url="https://www.suse.com/security/cve/CVE-2013-1583/" source="CVE"/>
		<reference ref_id="CVE-2013-1584" ref_url="https://www.suse.com/security/cve/CVE-2013-1584/" source="CVE"/>
		<reference ref_id="CVE-2013-1585" ref_url="https://www.suse.com/security/cve/CVE-2013-1585/" source="CVE"/>
		<reference ref_id="CVE-2013-1586" ref_url="https://www.suse.com/security/cve/CVE-2013-1586/" source="CVE"/>
		<reference ref_id="CVE-2013-1587" ref_url="https://www.suse.com/security/cve/CVE-2013-1587/" source="CVE"/>
		<reference ref_id="CVE-2013-1588" ref_url="https://www.suse.com/security/cve/CVE-2013-1588/" source="CVE"/>
		<reference ref_id="CVE-2013-1589" ref_url="https://www.suse.com/security/cve/CVE-2013-1589/" source="CVE"/>
		<reference ref_id="CVE-2013-1590" ref_url="https://www.suse.com/security/cve/CVE-2013-1590/" source="CVE"/>
		<reference ref_id="CVE-2013-2475" ref_url="https://www.suse.com/security/cve/CVE-2013-2475/" source="CVE"/>
		<reference ref_id="CVE-2013-2476" ref_url="https://www.suse.com/security/cve/CVE-2013-2476/" source="CVE"/>
		<reference ref_id="CVE-2013-2477" ref_url="https://www.suse.com/security/cve/CVE-2013-2477/" source="CVE"/>
		<reference ref_id="CVE-2013-2478" ref_url="https://www.suse.com/security/cve/CVE-2013-2478/" source="CVE"/>
		<reference ref_id="CVE-2013-2479" ref_url="https://www.suse.com/security/cve/CVE-2013-2479/" source="CVE"/>
		<reference ref_id="CVE-2013-2480" ref_url="https://www.suse.com/security/cve/CVE-2013-2480/" source="CVE"/>
		<reference ref_id="CVE-2013-2481" ref_url="https://www.suse.com/security/cve/CVE-2013-2481/" source="CVE"/>
		<reference ref_id="CVE-2013-2482" ref_url="https://www.suse.com/security/cve/CVE-2013-2482/" source="CVE"/>
		<reference ref_id="CVE-2013-2483" ref_url="https://www.suse.com/security/cve/CVE-2013-2483/" source="CVE"/>
		<reference ref_id="CVE-2013-2484" ref_url="https://www.suse.com/security/cve/CVE-2013-2484/" source="CVE"/>
		<reference ref_id="CVE-2013-2485" ref_url="https://www.suse.com/security/cve/CVE-2013-2485/" source="CVE"/>
		<reference ref_id="CVE-2013-2486" ref_url="https://www.suse.com/security/cve/CVE-2013-2486/" source="CVE"/>
		<reference ref_id="CVE-2013-2487" ref_url="https://www.suse.com/security/cve/CVE-2013-2487/" source="CVE"/>
		<reference ref_id="CVE-2013-2488" ref_url="https://www.suse.com/security/cve/CVE-2013-2488/" source="CVE"/>
		<reference ref_id="CVE-2013-3555" ref_url="https://www.suse.com/security/cve/CVE-2013-3555/" source="CVE"/>
		<reference ref_id="CVE-2013-3556" ref_url="https://www.suse.com/security/cve/CVE-2013-3556/" source="CVE"/>
		<reference ref_id="CVE-2013-3557" ref_url="https://www.suse.com/security/cve/CVE-2013-3557/" source="CVE"/>
		<reference ref_id="CVE-2013-3558" ref_url="https://www.suse.com/security/cve/CVE-2013-3558/" source="CVE"/>
		<reference ref_id="CVE-2013-3559" ref_url="https://www.suse.com/security/cve/CVE-2013-3559/" source="CVE"/>
		<reference ref_id="CVE-2013-3560" ref_url="https://www.suse.com/security/cve/CVE-2013-3560/" source="CVE"/>
		<reference ref_id="CVE-2013-3561" ref_url="https://www.suse.com/security/cve/CVE-2013-3561/" source="CVE"/>
		<reference ref_id="CVE-2013-3562" ref_url="https://www.suse.com/security/cve/CVE-2013-3562/" source="CVE"/>
		<reference ref_id="CVE-2013-4083" ref_url="https://www.suse.com/security/cve/CVE-2013-4083/" source="CVE"/>
		<reference ref_id="CVE-2013-4920" ref_url="https://www.suse.com/security/cve/CVE-2013-4920/" source="CVE"/>
		<reference ref_id="CVE-2013-4921" ref_url="https://www.suse.com/security/cve/CVE-2013-4921/" source="CVE"/>
		<reference ref_id="CVE-2013-4922" ref_url="https://www.suse.com/security/cve/CVE-2013-4922/" source="CVE"/>
		<reference ref_id="CVE-2013-4923" ref_url="https://www.suse.com/security/cve/CVE-2013-4923/" source="CVE"/>
		<reference ref_id="CVE-2013-4924" ref_url="https://www.suse.com/security/cve/CVE-2013-4924/" source="CVE"/>
		<reference ref_id="CVE-2013-4925" ref_url="https://www.suse.com/security/cve/CVE-2013-4925/" source="CVE"/>
		<reference ref_id="CVE-2013-4926" ref_url="https://www.suse.com/security/cve/CVE-2013-4926/" source="CVE"/>
		<reference ref_id="CVE-2013-4927" ref_url="https://www.suse.com/security/cve/CVE-2013-4927/" source="CVE"/>
		<reference ref_id="CVE-2013-4928" ref_url="https://www.suse.com/security/cve/CVE-2013-4928/" source="CVE"/>
		<reference ref_id="CVE-2013-4929" ref_url="https://www.suse.com/security/cve/CVE-2013-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-4930" ref_url="https://www.suse.com/security/cve/CVE-2013-4930/" source="CVE"/>
		<reference ref_id="CVE-2013-4931" ref_url="https://www.suse.com/security/cve/CVE-2013-4931/" source="CVE"/>
		<reference ref_id="CVE-2013-4932" ref_url="https://www.suse.com/security/cve/CVE-2013-4932/" source="CVE"/>
		<reference ref_id="CVE-2013-4933" ref_url="https://www.suse.com/security/cve/CVE-2013-4933/" source="CVE"/>
		<reference ref_id="CVE-2013-4934" ref_url="https://www.suse.com/security/cve/CVE-2013-4934/" source="CVE"/>
		<reference ref_id="CVE-2013-4935" ref_url="https://www.suse.com/security/cve/CVE-2013-4935/" source="CVE"/>
		<reference ref_id="CVE-2013-4936" ref_url="https://www.suse.com/security/cve/CVE-2013-4936/" source="CVE"/>
		<reference ref_id="CVE-2013-5717" ref_url="https://www.suse.com/security/cve/CVE-2013-5717/" source="CVE"/>
		<reference ref_id="CVE-2013-5718" ref_url="https://www.suse.com/security/cve/CVE-2013-5718/" source="CVE"/>
		<reference ref_id="CVE-2013-5719" ref_url="https://www.suse.com/security/cve/CVE-2013-5719/" source="CVE"/>
		<reference ref_id="CVE-2013-5720" ref_url="https://www.suse.com/security/cve/CVE-2013-5720/" source="CVE"/>
		<reference ref_id="CVE-2013-5721" ref_url="https://www.suse.com/security/cve/CVE-2013-5721/" source="CVE"/>
		<reference ref_id="CVE-2013-5722" ref_url="https://www.suse.com/security/cve/CVE-2013-5722/" source="CVE"/>
		<reference ref_id="CVE-2013-6336" ref_url="https://www.suse.com/security/cve/CVE-2013-6336/" source="CVE"/>
		<reference ref_id="CVE-2013-6337" ref_url="https://www.suse.com/security/cve/CVE-2013-6337/" source="CVE"/>
		<reference ref_id="CVE-2013-6338" ref_url="https://www.suse.com/security/cve/CVE-2013-6338/" source="CVE"/>
		<reference ref_id="CVE-2013-6339" ref_url="https://www.suse.com/security/cve/CVE-2013-6339/" source="CVE"/>
		<reference ref_id="CVE-2013-6340" ref_url="https://www.suse.com/security/cve/CVE-2013-6340/" source="CVE"/>
		<reference ref_id="CVE-2013-7112" ref_url="https://www.suse.com/security/cve/CVE-2013-7112/" source="CVE"/>
		<reference ref_id="CVE-2013-7113" ref_url="https://www.suse.com/security/cve/CVE-2013-7113/" source="CVE"/>
		<reference ref_id="CVE-2013-7114" ref_url="https://www.suse.com/security/cve/CVE-2013-7114/" source="CVE"/>
		<reference ref_id="CVE-2014-2281" ref_url="https://www.suse.com/security/cve/CVE-2014-2281/" source="CVE"/>
		<reference ref_id="CVE-2014-2282" ref_url="https://www.suse.com/security/cve/CVE-2014-2282/" source="CVE"/>
		<reference ref_id="CVE-2014-2283" ref_url="https://www.suse.com/security/cve/CVE-2014-2283/" source="CVE"/>
		<reference ref_id="CVE-2014-2299" ref_url="https://www.suse.com/security/cve/CVE-2014-2299/" source="CVE"/>
		<reference ref_id="CVE-2014-2907" ref_url="https://www.suse.com/security/cve/CVE-2014-2907/" source="CVE"/>
		<reference ref_id="CVE-2014-4020" ref_url="https://www.suse.com/security/cve/CVE-2014-4020/" source="CVE"/>
		<reference ref_id="CVE-2014-5161" ref_url="https://www.suse.com/security/cve/CVE-2014-5161/" source="CVE"/>
		<reference ref_id="CVE-2014-5162" ref_url="https://www.suse.com/security/cve/CVE-2014-5162/" source="CVE"/>
		<reference ref_id="CVE-2014-5163" ref_url="https://www.suse.com/security/cve/CVE-2014-5163/" source="CVE"/>
		<reference ref_id="CVE-2014-5164" ref_url="https://www.suse.com/security/cve/CVE-2014-5164/" source="CVE"/>
		<reference ref_id="CVE-2014-5165" ref_url="https://www.suse.com/security/cve/CVE-2014-5165/" source="CVE"/>
		<reference ref_id="CVE-2015-0559" ref_url="https://www.suse.com/security/cve/CVE-2015-0559/" source="CVE"/>
		<reference ref_id="CVE-2015-0560" ref_url="https://www.suse.com/security/cve/CVE-2015-0560/" source="CVE"/>
		<reference ref_id="CVE-2015-0561" ref_url="https://www.suse.com/security/cve/CVE-2015-0561/" source="CVE"/>
		<reference ref_id="CVE-2015-0562" ref_url="https://www.suse.com/security/cve/CVE-2015-0562/" source="CVE"/>
		<reference ref_id="CVE-2015-0563" ref_url="https://www.suse.com/security/cve/CVE-2015-0563/" source="CVE"/>
		<reference ref_id="CVE-2015-0564" ref_url="https://www.suse.com/security/cve/CVE-2015-0564/" source="CVE"/>
		<reference ref_id="CVE-2015-2188" ref_url="https://www.suse.com/security/cve/CVE-2015-2188/" source="CVE"/>
		<reference ref_id="CVE-2015-2189" ref_url="https://www.suse.com/security/cve/CVE-2015-2189/" source="CVE"/>
		<reference ref_id="CVE-2015-2191" ref_url="https://www.suse.com/security/cve/CVE-2015-2191/" source="CVE"/>
		<reference ref_id="CVE-2015-3811" ref_url="https://www.suse.com/security/cve/CVE-2015-3811/" source="CVE"/>
		<reference ref_id="CVE-2015-3812" ref_url="https://www.suse.com/security/cve/CVE-2015-3812/" source="CVE"/>
		<reference ref_id="CVE-2015-3813" ref_url="https://www.suse.com/security/cve/CVE-2015-3813/" source="CVE"/>
		<reference ref_id="CVE-2015-3814" ref_url="https://www.suse.com/security/cve/CVE-2015-3814/" source="CVE"/>
		<reference ref_id="CVE-2015-7830" ref_url="https://www.suse.com/security/cve/CVE-2015-7830/" source="CVE"/>
		<reference ref_id="CVE-2015-8711" ref_url="https://www.suse.com/security/cve/CVE-2015-8711/" source="CVE"/>
		<reference ref_id="CVE-2015-8712" ref_url="https://www.suse.com/security/cve/CVE-2015-8712/" source="CVE"/>
		<reference ref_id="CVE-2015-8713" ref_url="https://www.suse.com/security/cve/CVE-2015-8713/" source="CVE"/>
		<reference ref_id="CVE-2015-8714" ref_url="https://www.suse.com/security/cve/CVE-2015-8714/" source="CVE"/>
		<reference ref_id="CVE-2015-8715" ref_url="https://www.suse.com/security/cve/CVE-2015-8715/" source="CVE"/>
		<reference ref_id="CVE-2015-8716" ref_url="https://www.suse.com/security/cve/CVE-2015-8716/" source="CVE"/>
		<reference ref_id="CVE-2015-8717" ref_url="https://www.suse.com/security/cve/CVE-2015-8717/" source="CVE"/>
		<reference ref_id="CVE-2015-8718" ref_url="https://www.suse.com/security/cve/CVE-2015-8718/" source="CVE"/>
		<reference ref_id="CVE-2015-8719" ref_url="https://www.suse.com/security/cve/CVE-2015-8719/" source="CVE"/>
		<reference ref_id="CVE-2015-8720" ref_url="https://www.suse.com/security/cve/CVE-2015-8720/" source="CVE"/>
		<reference ref_id="CVE-2015-8721" ref_url="https://www.suse.com/security/cve/CVE-2015-8721/" source="CVE"/>
		<reference ref_id="CVE-2015-8722" ref_url="https://www.suse.com/security/cve/CVE-2015-8722/" source="CVE"/>
		<reference ref_id="CVE-2015-8723" ref_url="https://www.suse.com/security/cve/CVE-2015-8723/" source="CVE"/>
		<reference ref_id="CVE-2015-8724" ref_url="https://www.suse.com/security/cve/CVE-2015-8724/" source="CVE"/>
		<reference ref_id="CVE-2015-8725" ref_url="https://www.suse.com/security/cve/CVE-2015-8725/" source="CVE"/>
		<reference ref_id="CVE-2015-8726" ref_url="https://www.suse.com/security/cve/CVE-2015-8726/" source="CVE"/>
		<reference ref_id="CVE-2015-8727" ref_url="https://www.suse.com/security/cve/CVE-2015-8727/" source="CVE"/>
		<reference ref_id="CVE-2015-8728" ref_url="https://www.suse.com/security/cve/CVE-2015-8728/" source="CVE"/>
		<reference ref_id="CVE-2015-8729" ref_url="https://www.suse.com/security/cve/CVE-2015-8729/" source="CVE"/>
		<reference ref_id="CVE-2015-8730" ref_url="https://www.suse.com/security/cve/CVE-2015-8730/" source="CVE"/>
		<reference ref_id="CVE-2015-8731" ref_url="https://www.suse.com/security/cve/CVE-2015-8731/" source="CVE"/>
		<reference ref_id="CVE-2015-8732" ref_url="https://www.suse.com/security/cve/CVE-2015-8732/" source="CVE"/>
		<reference ref_id="CVE-2015-8733" ref_url="https://www.suse.com/security/cve/CVE-2015-8733/" source="CVE"/>
		<reference ref_id="CVE-2016-2523" ref_url="https://www.suse.com/security/cve/CVE-2016-2523/" source="CVE"/>
		<reference ref_id="CVE-2016-2530" ref_url="https://www.suse.com/security/cve/CVE-2016-2530/" source="CVE"/>
		<reference ref_id="CVE-2016-2531" ref_url="https://www.suse.com/security/cve/CVE-2016-2531/" source="CVE"/>
		<reference ref_id="CVE-2016-2532" ref_url="https://www.suse.com/security/cve/CVE-2016-2532/" source="CVE"/>
		<reference ref_id="CVE-2016-5350" ref_url="https://www.suse.com/security/cve/CVE-2016-5350/" source="CVE"/>
		<reference ref_id="CVE-2016-5351" ref_url="https://www.suse.com/security/cve/CVE-2016-5351/" source="CVE"/>
		<reference ref_id="CVE-2016-5352" ref_url="https://www.suse.com/security/cve/CVE-2016-5352/" source="CVE"/>
		<reference ref_id="CVE-2016-5353" ref_url="https://www.suse.com/security/cve/CVE-2016-5353/" source="CVE"/>
		<reference ref_id="CVE-2016-5354" ref_url="https://www.suse.com/security/cve/CVE-2016-5354/" source="CVE"/>
		<reference ref_id="CVE-2016-5355" ref_url="https://www.suse.com/security/cve/CVE-2016-5355/" source="CVE"/>
		<reference ref_id="CVE-2016-5356" ref_url="https://www.suse.com/security/cve/CVE-2016-5356/" source="CVE"/>
		<reference ref_id="CVE-2016-5357" ref_url="https://www.suse.com/security/cve/CVE-2016-5357/" source="CVE"/>
		<reference ref_id="CVE-2016-5358" ref_url="https://www.suse.com/security/cve/CVE-2016-5358/" source="CVE"/>
		<reference ref_id="CVE-2016-5359" ref_url="https://www.suse.com/security/cve/CVE-2016-5359/" source="CVE"/>
		<reference ref_id="CVE-2016-6504" ref_url="https://www.suse.com/security/cve/CVE-2016-6504/" source="CVE"/>
		<reference ref_id="CVE-2016-6505" ref_url="https://www.suse.com/security/cve/CVE-2016-6505/" source="CVE"/>
		<reference ref_id="CVE-2016-6506" ref_url="https://www.suse.com/security/cve/CVE-2016-6506/" source="CVE"/>
		<reference ref_id="CVE-2016-6507" ref_url="https://www.suse.com/security/cve/CVE-2016-6507/" source="CVE"/>
		<reference ref_id="CVE-2016-6508" ref_url="https://www.suse.com/security/cve/CVE-2016-6508/" source="CVE"/>
		<reference ref_id="CVE-2016-6509" ref_url="https://www.suse.com/security/cve/CVE-2016-6509/" source="CVE"/>
		<reference ref_id="CVE-2016-6510" ref_url="https://www.suse.com/security/cve/CVE-2016-6510/" source="CVE"/>
		<reference ref_id="CVE-2016-6511" ref_url="https://www.suse.com/security/cve/CVE-2016-6511/" source="CVE"/>
		<description>
These are all security issues fixed in the wireshark-1.12.13-31.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1210/">CVE-2009-1210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1267/">CVE-2009-1267</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1268/">CVE-2009-1268</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1269/">CVE-2009-1269</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3241/">CVE-2009-3241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3242/">CVE-2009-3242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3243/">CVE-2009-3243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1455/">CVE-2010-1455</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2993/">CVE-2010-2993</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3445/">CVE-2010-3445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4300/">CVE-2010-4300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4301/">CVE-2010-4301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4538/">CVE-2010-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0024/">CVE-2011-0024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0538/">CVE-2011-0538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0713/">CVE-2011-0713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1138/">CVE-2011-1138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1139/">CVE-2011-1139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1140/">CVE-2011-1140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1143/">CVE-2011-1143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1590/">CVE-2011-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1591/">CVE-2011-1591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1592/">CVE-2011-1592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1957/">CVE-2011-1957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1958/">CVE-2011-1958</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1959/">CVE-2011-1959</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2174/">CVE-2011-2174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2175/">CVE-2011-2175</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2597/">CVE-2011-2597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2698/">CVE-2011-2698</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3266/">CVE-2011-3266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3360/">CVE-2011-3360</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3483/">CVE-2011-3483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2392/">CVE-2012-2392</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2393/">CVE-2012-2393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2394/">CVE-2012-2394</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3548/">CVE-2012-3548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4048/">CVE-2012-4048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4049/">CVE-2012-4049</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4285/">CVE-2012-4285</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-4286/">CVE-2012-4286</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4287/">CVE-2012-4287</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4288/">CVE-2012-4288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4289/">CVE-2012-4289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4290/">CVE-2012-4290</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4291/">CVE-2012-4291</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4292/">CVE-2012-4292</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4293/">CVE-2012-4293</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4294/">CVE-2012-4294</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4295/">CVE-2012-4295</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4296/">CVE-2012-4296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4297/">CVE-2012-4297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4298/">CVE-2012-4298</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5237/">CVE-2012-5237</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5238/">CVE-2012-5238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5239/">CVE-2012-5239</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5240/">CVE-2012-5240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5592/">CVE-2012-5592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5593/">CVE-2012-5593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5594/">CVE-2012-5594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5595/">CVE-2012-5595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5596/">CVE-2012-5596</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5597/">CVE-2012-5597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5598/">CVE-2012-5598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5599/">CVE-2012-5599</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5600/">CVE-2012-5600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5601/">CVE-2012-5601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5602/">CVE-2012-5602</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1572/">CVE-2013-1572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1573/">CVE-2013-1573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1574/">CVE-2013-1574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1575/">CVE-2013-1575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1576/">CVE-2013-1576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1577/">CVE-2013-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1578/">CVE-2013-1578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1579/">CVE-2013-1579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1580/">CVE-2013-1580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1581/">CVE-2013-1581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1582/">CVE-2013-1582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1583/">CVE-2013-1583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1584/">CVE-2013-1584</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1585/">CVE-2013-1585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1586/">CVE-2013-1586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1587/">CVE-2013-1587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1588/">CVE-2013-1588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1589/">CVE-2013-1589</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1590/">CVE-2013-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2475/">CVE-2013-2475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2476/">CVE-2013-2476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2477/">CVE-2013-2477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2478/">CVE-2013-2478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2479/">CVE-2013-2479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2480/">CVE-2013-2480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2481/">CVE-2013-2481</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2482/">CVE-2013-2482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2483/">CVE-2013-2483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2484/">CVE-2013-2484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2485/">CVE-2013-2485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2486/">CVE-2013-2486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2487/">CVE-2013-2487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2488/">CVE-2013-2488</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3555/">CVE-2013-3555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3556/">CVE-2013-3556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3557/">CVE-2013-3557</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3558/">CVE-2013-3558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3559/">CVE-2013-3559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3560/">CVE-2013-3560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3561/">CVE-2013-3561</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3562/">CVE-2013-3562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4083/">CVE-2013-4083</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4920/">CVE-2013-4920</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4921/">CVE-2013-4921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4922/">CVE-2013-4922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4923/">CVE-2013-4923</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4924/">CVE-2013-4924</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4925/">CVE-2013-4925</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4926/">CVE-2013-4926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4927/">CVE-2013-4927</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4928/">CVE-2013-4928</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4929/">CVE-2013-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4930/">CVE-2013-4930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4931/">CVE-2013-4931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4932/">CVE-2013-4932</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4933/">CVE-2013-4933</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4934/">CVE-2013-4934</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4935/">CVE-2013-4935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4936/">CVE-2013-4936</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5717/">CVE-2013-5717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5718/">CVE-2013-5718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5719/">CVE-2013-5719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5720/">CVE-2013-5720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5721/">CVE-2013-5721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5722/">CVE-2013-5722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6336/">CVE-2013-6336</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6337/">CVE-2013-6337</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6338/">CVE-2013-6338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6339/">CVE-2013-6339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6340/">CVE-2013-6340</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7112/">CVE-2013-7112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7113/">CVE-2013-7113</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7114/">CVE-2013-7114</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2281/">CVE-2014-2281</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2282/">CVE-2014-2282</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2283/">CVE-2014-2283</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2299/">CVE-2014-2299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2907/">CVE-2014-2907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4020/">CVE-2014-4020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5161/">CVE-2014-5161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5162/">CVE-2014-5162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5163/">CVE-2014-5163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5164/">CVE-2014-5164</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5165/">CVE-2014-5165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0559/">CVE-2015-0559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0560/">CVE-2015-0560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0561/">CVE-2015-0561</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0562/">CVE-2015-0562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0563/">CVE-2015-0563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0564/">CVE-2015-0564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2188/">CVE-2015-2188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2189/">CVE-2015-2189</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2191/">CVE-2015-2191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3811/">CVE-2015-3811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3812/">CVE-2015-3812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3813/">CVE-2015-3813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3814/">CVE-2015-3814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7830/">CVE-2015-7830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8711/">CVE-2015-8711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8712/">CVE-2015-8712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8713/">CVE-2015-8713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8714/">CVE-2015-8714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8715/">CVE-2015-8715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8716/">CVE-2015-8716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8717/">CVE-2015-8717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8718/">CVE-2015-8718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8719/">CVE-2015-8719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8720/">CVE-2015-8720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8721/">CVE-2015-8721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8722/">CVE-2015-8722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8723/">CVE-2015-8723</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8724/">CVE-2015-8724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8725/">CVE-2015-8725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8726/">CVE-2015-8726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8727/">CVE-2015-8727</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8728/">CVE-2015-8728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8729/">CVE-2015-8729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8730/">CVE-2015-8730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8731/">CVE-2015-8731</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8732/">CVE-2015-8732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8733/">CVE-2015-8733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2523/">CVE-2016-2523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2530/">CVE-2016-2530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2531/">CVE-2016-2531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2532/">CVE-2016-2532</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5350/">CVE-2016-5350</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5351/">CVE-2016-5351</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5352/">CVE-2016-5352</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5353/">CVE-2016-5353</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5354/">CVE-2016-5354</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5355/">CVE-2016-5355</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5356/">CVE-2016-5356</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5357/">CVE-2016-5357</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5358/">CVE-2016-5358</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5359/">CVE-2016-5359</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6504/">CVE-2016-6504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6505/">CVE-2016-6505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6506/">CVE-2016-6506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6507/">CVE-2016-6507</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6508/">CVE-2016-6508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6509/">CVE-2016-6509</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6510/">CVE-2016-6510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6511/">CVE-2016-6511</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76457" version="1" class="patch">
	<metadata>
		<title>wpa_supplicant-2.2-14.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-3686" ref_url="https://www.suse.com/security/cve/CVE-2014-3686/" source="CVE"/>
		<reference ref_id="CVE-2015-0210" ref_url="https://www.suse.com/security/cve/CVE-2015-0210/" source="CVE"/>
		<reference ref_id="CVE-2015-1863" ref_url="https://www.suse.com/security/cve/CVE-2015-1863/" source="CVE"/>
		<reference ref_id="CVE-2015-4141" ref_url="https://www.suse.com/security/cve/CVE-2015-4141/" source="CVE"/>
		<reference ref_id="CVE-2015-4142" ref_url="https://www.suse.com/security/cve/CVE-2015-4142/" source="CVE"/>
		<reference ref_id="CVE-2015-4143" ref_url="https://www.suse.com/security/cve/CVE-2015-4143/" source="CVE"/>
		<reference ref_id="CVE-2015-5130" ref_url="https://www.suse.com/security/cve/CVE-2015-5130/" source="CVE"/>
		<reference ref_id="CVE-2015-5310" ref_url="https://www.suse.com/security/cve/CVE-2015-5310/" source="CVE"/>
		<reference ref_id="CVE-2015-8041" ref_url="https://www.suse.com/security/cve/CVE-2015-8041/" source="CVE"/>
		<description>
These are all security issues fixed in the wpa_supplicant-2.2-14.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3686/">CVE-2014-3686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0210/">CVE-2015-0210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1863/">CVE-2015-1863</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4141/">CVE-2015-4141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4142/">CVE-2015-4142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4143/">CVE-2015-4143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5130/">CVE-2015-5130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5310/">CVE-2015-5310</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8041/">CVE-2015-8041</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131098" comment="wpa_supplicant-2.2-14.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76458" version="1" class="patch">
	<metadata>
		<title>xalan-j2-2.7.0-264.133 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-0107" ref_url="https://www.suse.com/security/cve/CVE-2014-0107/" source="CVE"/>
		<description>
These are all security issues fixed in the xalan-j2-2.7.0-264.133 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0107/">CVE-2014-0107</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141828" comment="xalan-j2-2.7.0-264.133 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76459" version="1" class="patch">
	<metadata>
		<title>xdg-utils-20140630-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-9622" ref_url="https://www.suse.com/security/cve/CVE-2014-9622/" source="CVE"/>
		<description>
These are all security issues fixed in the xdg-utils-20140630-5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9622/">CVE-2014-9622</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106065" comment="xdg-utils-20140630-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76460" version="1" class="patch">
	<metadata>
		<title>xen-4.7.0_12-23.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1898" ref_url="https://www.suse.com/security/cve/CVE-2011-1898/" source="CVE"/>
		<reference ref_id="CVE-2012-0029" ref_url="https://www.suse.com/security/cve/CVE-2012-0029/" source="CVE"/>
		<reference ref_id="CVE-2012-0217" ref_url="https://www.suse.com/security/cve/CVE-2012-0217/" source="CVE"/>
		<reference ref_id="CVE-2012-2625" ref_url="https://www.suse.com/security/cve/CVE-2012-2625/" source="CVE"/>
		<reference ref_id="CVE-2012-3432" ref_url="https://www.suse.com/security/cve/CVE-2012-3432/" source="CVE"/>
		<reference ref_id="CVE-2012-3433" ref_url="https://www.suse.com/security/cve/CVE-2012-3433/" source="CVE"/>
		<reference ref_id="CVE-2012-4411" ref_url="https://www.suse.com/security/cve/CVE-2012-4411/" source="CVE"/>
		<reference ref_id="CVE-2012-4535" ref_url="https://www.suse.com/security/cve/CVE-2012-4535/" source="CVE"/>
		<reference ref_id="CVE-2012-4536" ref_url="https://www.suse.com/security/cve/CVE-2012-4536/" source="CVE"/>
		<reference ref_id="CVE-2012-4537" ref_url="https://www.suse.com/security/cve/CVE-2012-4537/" source="CVE"/>
		<reference ref_id="CVE-2012-4538" ref_url="https://www.suse.com/security/cve/CVE-2012-4538/" source="CVE"/>
		<reference ref_id="CVE-2012-4539" ref_url="https://www.suse.com/security/cve/CVE-2012-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-4544" ref_url="https://www.suse.com/security/cve/CVE-2012-4544/" source="CVE"/>
		<reference ref_id="CVE-2012-5510" ref_url="https://www.suse.com/security/cve/CVE-2012-5510/" source="CVE"/>
		<reference ref_id="CVE-2012-5511" ref_url="https://www.suse.com/security/cve/CVE-2012-5511/" source="CVE"/>
		<reference ref_id="CVE-2012-5513" ref_url="https://www.suse.com/security/cve/CVE-2012-5513/" source="CVE"/>
		<reference ref_id="CVE-2012-5514" ref_url="https://www.suse.com/security/cve/CVE-2012-5514/" source="CVE"/>
		<reference ref_id="CVE-2012-5515" ref_url="https://www.suse.com/security/cve/CVE-2012-5515/" source="CVE"/>
		<reference ref_id="CVE-2012-5525" ref_url="https://www.suse.com/security/cve/CVE-2012-5525/" source="CVE"/>
		<reference ref_id="CVE-2012-5634" ref_url="https://www.suse.com/security/cve/CVE-2012-5634/" source="CVE"/>
		<reference ref_id="CVE-2012-6075" ref_url="https://www.suse.com/security/cve/CVE-2012-6075/" source="CVE"/>
		<reference ref_id="CVE-2013-0151" ref_url="https://www.suse.com/security/cve/CVE-2013-0151/" source="CVE"/>
		<reference ref_id="CVE-2013-0152" ref_url="https://www.suse.com/security/cve/CVE-2013-0152/" source="CVE"/>
		<reference ref_id="CVE-2013-0153" ref_url="https://www.suse.com/security/cve/CVE-2013-0153/" source="CVE"/>
		<reference ref_id="CVE-2013-1442" ref_url="https://www.suse.com/security/cve/CVE-2013-1442/" source="CVE"/>
		<reference ref_id="CVE-2013-1917" ref_url="https://www.suse.com/security/cve/CVE-2013-1917/" source="CVE"/>
		<reference ref_id="CVE-2013-1918" ref_url="https://www.suse.com/security/cve/CVE-2013-1918/" source="CVE"/>
		<reference ref_id="CVE-2013-1919" ref_url="https://www.suse.com/security/cve/CVE-2013-1919/" source="CVE"/>
		<reference ref_id="CVE-2013-1922" ref_url="https://www.suse.com/security/cve/CVE-2013-1922/" source="CVE"/>
		<reference ref_id="CVE-2013-1952" ref_url="https://www.suse.com/security/cve/CVE-2013-1952/" source="CVE"/>
		<reference ref_id="CVE-2013-2007" ref_url="https://www.suse.com/security/cve/CVE-2013-2007/" source="CVE"/>
		<reference ref_id="CVE-2013-3495" ref_url="https://www.suse.com/security/cve/CVE-2013-3495/" source="CVE"/>
		<reference ref_id="CVE-2013-4355" ref_url="https://www.suse.com/security/cve/CVE-2013-4355/" source="CVE"/>
		<reference ref_id="CVE-2013-4356" ref_url="https://www.suse.com/security/cve/CVE-2013-4356/" source="CVE"/>
		<reference ref_id="CVE-2013-4361" ref_url="https://www.suse.com/security/cve/CVE-2013-4361/" source="CVE"/>
		<reference ref_id="CVE-2013-4375" ref_url="https://www.suse.com/security/cve/CVE-2013-4375/" source="CVE"/>
		<reference ref_id="CVE-2013-4416" ref_url="https://www.suse.com/security/cve/CVE-2013-4416/" source="CVE"/>
		<reference ref_id="CVE-2013-4494" ref_url="https://www.suse.com/security/cve/CVE-2013-4494/" source="CVE"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540/" source="CVE"/>
		<reference ref_id="CVE-2013-4551" ref_url="https://www.suse.com/security/cve/CVE-2013-4551/" source="CVE"/>
		<reference ref_id="CVE-2013-4553" ref_url="https://www.suse.com/security/cve/CVE-2013-4553/" source="CVE"/>
		<reference ref_id="CVE-2013-4554" ref_url="https://www.suse.com/security/cve/CVE-2013-4554/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-3124" ref_url="https://www.suse.com/security/cve/CVE-2014-3124/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-3672" ref_url="https://www.suse.com/security/cve/CVE-2014-3672/" source="CVE"/>
		<reference ref_id="CVE-2014-5146" ref_url="https://www.suse.com/security/cve/CVE-2014-5146/" source="CVE"/>
		<reference ref_id="CVE-2014-5149" ref_url="https://www.suse.com/security/cve/CVE-2014-5149/" source="CVE"/>
		<reference ref_id="CVE-2014-6268" ref_url="https://www.suse.com/security/cve/CVE-2014-6268/" source="CVE"/>
		<reference ref_id="CVE-2014-7154" ref_url="https://www.suse.com/security/cve/CVE-2014-7154/" source="CVE"/>
		<reference ref_id="CVE-2014-7155" ref_url="https://www.suse.com/security/cve/CVE-2014-7155/" source="CVE"/>
		<reference ref_id="CVE-2014-7156" ref_url="https://www.suse.com/security/cve/CVE-2014-7156/" source="CVE"/>
		<reference ref_id="CVE-2014-7188" ref_url="https://www.suse.com/security/cve/CVE-2014-7188/" source="CVE"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-3259" ref_url="https://www.suse.com/security/cve/CVE-2015-3259/" source="CVE"/>
		<reference ref_id="CVE-2015-3340" ref_url="https://www.suse.com/security/cve/CVE-2015-3340/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-4103" ref_url="https://www.suse.com/security/cve/CVE-2015-4103/" source="CVE"/>
		<reference ref_id="CVE-2015-4104" ref_url="https://www.suse.com/security/cve/CVE-2015-4104/" source="CVE"/>
		<reference ref_id="CVE-2015-4105" ref_url="https://www.suse.com/security/cve/CVE-2015-4105/" source="CVE"/>
		<reference ref_id="CVE-2015-4106" ref_url="https://www.suse.com/security/cve/CVE-2015-4106/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339/" source="CVE"/>
		<reference ref_id="CVE-2015-8340" ref_url="https://www.suse.com/security/cve/CVE-2015-8340/" source="CVE"/>
		<reference ref_id="CVE-2015-8341" ref_url="https://www.suse.com/security/cve/CVE-2015-8341/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8554" ref_url="https://www.suse.com/security/cve/CVE-2015-8554/" source="CVE"/>
		<reference ref_id="CVE-2015-8555" ref_url="https://www.suse.com/security/cve/CVE-2015-8555/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567/" source="CVE"/>
		<reference ref_id="CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8615" ref_url="https://www.suse.com/security/cve/CVE-2015-8615/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1570" ref_url="https://www.suse.com/security/cve/CVE-2016-1570/" source="CVE"/>
		<reference ref_id="CVE-2016-1571" ref_url="https://www.suse.com/security/cve/CVE-2016-1571/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-2270" ref_url="https://www.suse.com/security/cve/CVE-2016-2270/" source="CVE"/>
		<reference ref_id="CVE-2016-2271" ref_url="https://www.suse.com/security/cve/CVE-2016-2271/" source="CVE"/>
		<reference ref_id="CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391/" source="CVE"/>
		<reference ref_id="CVE-2016-2392" ref_url="https://www.suse.com/security/cve/CVE-2016-2392/" source="CVE"/>
		<reference ref_id="CVE-2016-2538" ref_url="https://www.suse.com/security/cve/CVE-2016-2538/" source="CVE"/>
		<reference ref_id="CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-6258" ref_url="https://www.suse.com/security/cve/CVE-2016-6258/" source="CVE"/>
		<reference ref_id="CVE-2016-6259" ref_url="https://www.suse.com/security/cve/CVE-2016-6259/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="CVE-2016-7092" ref_url="https://www.suse.com/security/cve/CVE-2016-7092/" source="CVE"/>
		<reference ref_id="CVE-2016-7093" ref_url="https://www.suse.com/security/cve/CVE-2016-7093/" source="CVE"/>
		<reference ref_id="CVE-2016-7094" ref_url="https://www.suse.com/security/cve/CVE-2016-7094/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.7.0_12-23.4 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1898/">CVE-2011-1898</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0029/">CVE-2012-0029</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0217/">CVE-2012-0217</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2625/">CVE-2012-2625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3432/">CVE-2012-3432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3433/">CVE-2012-3433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4411/">CVE-2012-4411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4535/">CVE-2012-4535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4536/">CVE-2012-4536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4537/">CVE-2012-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4538/">CVE-2012-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4539/">CVE-2012-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4544/">CVE-2012-4544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5510/">CVE-2012-5510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5511/">CVE-2012-5511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5513/">CVE-2012-5513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5514/">CVE-2012-5514</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5515/">CVE-2012-5515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5525/">CVE-2012-5525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5634/">CVE-2012-5634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6075/">CVE-2012-6075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0151/">CVE-2013-0151</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0152/">CVE-2013-0152</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0153/">CVE-2013-0153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1442/">CVE-2013-1442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1917/">CVE-2013-1917</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1918/">CVE-2013-1918</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1919/">CVE-2013-1919</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1922/">CVE-2013-1922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1952/">CVE-2013-1952</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2007/">CVE-2013-2007</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3495/">CVE-2013-3495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4355/">CVE-2013-4355</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4356/">CVE-2013-4356</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4361/">CVE-2013-4361</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4375/">CVE-2013-4375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4416/">CVE-2013-4416</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4494/">CVE-2013-4494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4551/">CVE-2013-4551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4553/">CVE-2013-4553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4554/">CVE-2013-4554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3124/">CVE-2014-3124</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3672/">CVE-2014-3672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5146/">CVE-2014-5146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5149/">CVE-2014-5149</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6268/">CVE-2014-6268</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7154/">CVE-2014-7154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7155/">CVE-2014-7155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7156/">CVE-2014-7156</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7188/">CVE-2014-7188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3259/">CVE-2015-3259</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3340/">CVE-2015-3340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4103/">CVE-2015-4103</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4104/">CVE-2015-4104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4105/">CVE-2015-4105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4106/">CVE-2015-4106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8340/">CVE-2015-8340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8341/">CVE-2015-8341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8554/">CVE-2015-8554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8555/">CVE-2015-8555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8615/">CVE-2015-8615</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1570/">CVE-2016-1570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1571/">CVE-2016-1571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2270/">CVE-2016-2270</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2271/">CVE-2016-2271</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2392/">CVE-2016-2392</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2538/">CVE-2016-2538</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6258/">CVE-2016-6258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6259/">CVE-2016-6259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7092/">CVE-2016-7092</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7093/">CVE-2016-7093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7094/">CVE-2016-7094</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76461" version="1" class="patch">
	<metadata>
		<title>xf86-video-intel-2.99.917.641_ge4ef6e9-12.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-4910" ref_url="https://www.suse.com/security/cve/CVE-2014-4910/" source="CVE"/>
		<description>
These are all security issues fixed in the xf86-video-intel-2.99.917.641_ge4ef6e9-12.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4910/">CVE-2014-4910</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141165" comment="xf86-video-intel-2.99.917.641_ge4ef6e9-12.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76462" version="1" class="patch">
	<metadata>
		<title>xfsprogs-4.3.0-8.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-2150" ref_url="https://www.suse.com/security/cve/CVE-2012-2150/" source="CVE"/>
		<description>
These are all security issues fixed in the xfsprogs-4.3.0-8.8 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2150/">CVE-2012-2150</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141166" comment="xfsprogs-4.3.0-8.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76463" version="1" class="patch">
	<metadata>
		<title>xinetd-2.3.15-7.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-0862" ref_url="https://www.suse.com/security/cve/CVE-2012-0862/" source="CVE"/>
		<reference ref_id="CVE-2013-4342" ref_url="https://www.suse.com/security/cve/CVE-2013-4342/" source="CVE"/>
		<description>
These are all security issues fixed in the xinetd-2.3.15-7.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0862/">CVE-2012-0862</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4342/">CVE-2013-4342</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141167" comment="xinetd-2.3.15-7.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76464" version="1" class="patch">
	<metadata>
		<title>xlockmore-5.43-5.33 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-4143" ref_url="https://www.suse.com/security/cve/CVE-2013-4143/" source="CVE"/>
		<description>
These are all security issues fixed in the xlockmore-5.43-5.33 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4143/">CVE-2013-4143</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141168" comment="xlockmore-5.43-5.33 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76465" version="1" class="patch">
	<metadata>
		<title>xorg-x11-7.6_1-14.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-0465" ref_url="https://www.suse.com/security/cve/CVE-2011-0465/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-7.6_1-14.17 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0465/">CVE-2011-0465</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141834" comment="xorg-x11-7.6_1-14.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141835" comment="xorg-x11-essentials-7.6_1-14.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141171" comment="xrdb-1.1.0-3.58 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76466" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libs-7.6-45.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libs-7.6-45.14 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141836" comment="xorg-x11-libs-7.6-45.14 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76467" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-7.6_1.18.3-57.34 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2240" ref_url="https://www.suse.com/security/cve/CVE-2010-2240/" source="CVE"/>
		<reference ref_id="CVE-2013-1940" ref_url="https://www.suse.com/security/cve/CVE-2013-1940/" source="CVE"/>
		<reference ref_id="CVE-2013-4396" ref_url="https://www.suse.com/security/cve/CVE-2013-4396/" source="CVE"/>
		<reference ref_id="CVE-2013-6424" ref_url="https://www.suse.com/security/cve/CVE-2013-6424/" source="CVE"/>
		<reference ref_id="CVE-2014-8091" ref_url="https://www.suse.com/security/cve/CVE-2014-8091/" source="CVE"/>
		<reference ref_id="CVE-2014-8092" ref_url="https://www.suse.com/security/cve/CVE-2014-8092/" source="CVE"/>
		<reference ref_id="CVE-2014-8093" ref_url="https://www.suse.com/security/cve/CVE-2014-8093/" source="CVE"/>
		<reference ref_id="CVE-2014-8094" ref_url="https://www.suse.com/security/cve/CVE-2014-8094/" source="CVE"/>
		<reference ref_id="CVE-2014-8095" ref_url="https://www.suse.com/security/cve/CVE-2014-8095/" source="CVE"/>
		<reference ref_id="CVE-2014-8096" ref_url="https://www.suse.com/security/cve/CVE-2014-8096/" source="CVE"/>
		<reference ref_id="CVE-2014-8097" ref_url="https://www.suse.com/security/cve/CVE-2014-8097/" source="CVE"/>
		<reference ref_id="CVE-2014-8098" ref_url="https://www.suse.com/security/cve/CVE-2014-8098/" source="CVE"/>
		<reference ref_id="CVE-2014-8099" ref_url="https://www.suse.com/security/cve/CVE-2014-8099/" source="CVE"/>
		<reference ref_id="CVE-2014-8100" ref_url="https://www.suse.com/security/cve/CVE-2014-8100/" source="CVE"/>
		<reference ref_id="CVE-2014-8101" ref_url="https://www.suse.com/security/cve/CVE-2014-8101/" source="CVE"/>
		<reference ref_id="CVE-2014-8102" ref_url="https://www.suse.com/security/cve/CVE-2014-8102/" source="CVE"/>
		<reference ref_id="CVE-2014-8103" ref_url="https://www.suse.com/security/cve/CVE-2014-8103/" source="CVE"/>
		<reference ref_id="CVE-2015-0255" ref_url="https://www.suse.com/security/cve/CVE-2015-0255/" source="CVE"/>
		<reference ref_id="CVE-2015-3164" ref_url="https://www.suse.com/security/cve/CVE-2015-3164/" source="CVE"/>
		<reference ref_id="CVE-2015-3418" ref_url="https://www.suse.com/security/cve/CVE-2015-3418/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-7.6_1.18.3-57.34 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2240/">CVE-2010-2240</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-1940/">CVE-2013-1940</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4396/">CVE-2013-4396</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6424/">CVE-2013-6424</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8091/">CVE-2014-8091</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2014-8092/">CVE-2014-8092</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8093/">CVE-2014-8093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8094/">CVE-2014-8094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8095/">CVE-2014-8095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8096/">CVE-2014-8096</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8097/">CVE-2014-8097</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8098/">CVE-2014-8098</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8099/">CVE-2014-8099</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8100/">CVE-2014-8100</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8101/">CVE-2014-8101</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8102/">CVE-2014-8102</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8103/">CVE-2014-8103</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0255/">CVE-2015-0255</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3164/">CVE-2015-3164</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3418/">CVE-2015-3418</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76468" version="1" class="patch">
	<metadata>
		<title>xscreensaver-5.22-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-8025" ref_url="https://www.suse.com/security/cve/CVE-2015-8025/" source="CVE"/>
		<description>
These are all security issues fixed in the xscreensaver-5.22-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8025/">CVE-2015-8025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009119273" comment="xscreensaver-5.22-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009119274" comment="xscreensaver-data-5.22-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76469" version="1" class="patch">
	<metadata>
		<title>yast2-3.1.206-37.1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-3177" ref_url="https://www.suse.com/security/cve/CVE-2011-3177/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-3.1.206-37.1.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3177/">CVE-2011-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141175" comment="yast2-3.1.206-37.1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76470" version="1" class="patch">
	<metadata>
		<title>yast2-core-3.1.23-6.38 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<reference ref_id="CVE-2011-3177" ref_url="https://www.suse.com/security/cve/CVE-2011-3177/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-core-3.1.23-6.38 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3177/">CVE-2011-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141176" comment="yast2-core-3.1.23-6.38 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76471" version="1" class="patch">
	<metadata>
		<title>yast2-users-3.1.57-16.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2016-1601" ref_url="https://www.suse.com/security/cve/CVE-2016-1601/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-users-3.1.57-16.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1601/">CVE-2016-1601</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141177" comment="yast2-users-3.1.57-16.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76472" version="1" class="patch">
	<metadata>
		<title>zoo-2.10-1020.62 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-0855" ref_url="https://www.suse.com/security/cve/CVE-2006-0855/" source="CVE"/>
		<reference ref_id="CVE-2007-1669" ref_url="https://www.suse.com/security/cve/CVE-2007-1669/" source="CVE"/>
		<description>
These are all security issues fixed in the zoo-2.10-1020.62 package on the GA media of SUSE Linux Enterprise Desktop 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-0855/">CVE-2006-0855</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1669/">CVE-2007-1669</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512004" comment="zoo-2.10-1020.62 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76473" version="1" class="patch">
	<metadata>
		<title>DirectFB-1.7.1-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-2977" ref_url="https://www.suse.com/security/cve/CVE-2014-2977/" source="CVE"/>
		<reference ref_id="CVE-2014-2978" ref_url="https://www.suse.com/security/cve/CVE-2014-2978/" source="CVE"/>
		<description>
These are all security issues fixed in the DirectFB-1.7.1-6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-2977/">CVE-2014-2977</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-2978/">CVE-2014-2978</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140428" comment="DirectFB-1.7.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140429" comment="lib++dfb-1_7-1-1.7.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140430" comment="libdirectfb-1_7-1-1.7.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142073" comment="libdirectfb-1_7-1-32bit-1.7.1-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76474" version="1" class="patch">
	<metadata>
		<title>ImageMagick-6.8.8.1-70.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-0247" ref_url="https://www.suse.com/security/cve/CVE-2012-0247/" source="CVE"/>
		<reference ref_id="CVE-2012-0248" ref_url="https://www.suse.com/security/cve/CVE-2012-0248/" source="CVE"/>
		<reference ref_id="CVE-2012-1185" ref_url="https://www.suse.com/security/cve/CVE-2012-1185/" source="CVE"/>
		<reference ref_id="CVE-2012-1186" ref_url="https://www.suse.com/security/cve/CVE-2012-1186/" source="CVE"/>
		<reference ref_id="CVE-2014-8354" ref_url="https://www.suse.com/security/cve/CVE-2014-8354/" source="CVE"/>
		<reference ref_id="CVE-2014-8355" ref_url="https://www.suse.com/security/cve/CVE-2014-8355/" source="CVE"/>
		<reference ref_id="CVE-2014-8562" ref_url="https://www.suse.com/security/cve/CVE-2014-8562/" source="CVE"/>
		<reference ref_id="CVE-2014-8716" ref_url="https://www.suse.com/security/cve/CVE-2014-8716/" source="CVE"/>
		<reference ref_id="CVE-2014-9805" ref_url="https://www.suse.com/security/cve/CVE-2014-9805/" source="CVE"/>
		<reference ref_id="CVE-2014-9806" ref_url="https://www.suse.com/security/cve/CVE-2014-9806/" source="CVE"/>
		<reference ref_id="CVE-2014-9807" ref_url="https://www.suse.com/security/cve/CVE-2014-9807/" source="CVE"/>
		<reference ref_id="CVE-2014-9808" ref_url="https://www.suse.com/security/cve/CVE-2014-9808/" source="CVE"/>
		<reference ref_id="CVE-2014-9809" ref_url="https://www.suse.com/security/cve/CVE-2014-9809/" source="CVE"/>
		<reference ref_id="CVE-2014-9810" ref_url="https://www.suse.com/security/cve/CVE-2014-9810/" source="CVE"/>
		<reference ref_id="CVE-2014-9811" ref_url="https://www.suse.com/security/cve/CVE-2014-9811/" source="CVE"/>
		<reference ref_id="CVE-2014-9812" ref_url="https://www.suse.com/security/cve/CVE-2014-9812/" source="CVE"/>
		<reference ref_id="CVE-2014-9813" ref_url="https://www.suse.com/security/cve/CVE-2014-9813/" source="CVE"/>
		<reference ref_id="CVE-2014-9814" ref_url="https://www.suse.com/security/cve/CVE-2014-9814/" source="CVE"/>
		<reference ref_id="CVE-2014-9815" ref_url="https://www.suse.com/security/cve/CVE-2014-9815/" source="CVE"/>
		<reference ref_id="CVE-2014-9816" ref_url="https://www.suse.com/security/cve/CVE-2014-9816/" source="CVE"/>
		<reference ref_id="CVE-2014-9817" ref_url="https://www.suse.com/security/cve/CVE-2014-9817/" source="CVE"/>
		<reference ref_id="CVE-2014-9818" ref_url="https://www.suse.com/security/cve/CVE-2014-9818/" source="CVE"/>
		<reference ref_id="CVE-2014-9819" ref_url="https://www.suse.com/security/cve/CVE-2014-9819/" source="CVE"/>
		<reference ref_id="CVE-2014-9820" ref_url="https://www.suse.com/security/cve/CVE-2014-9820/" source="CVE"/>
		<reference ref_id="CVE-2014-9821" ref_url="https://www.suse.com/security/cve/CVE-2014-9821/" source="CVE"/>
		<reference ref_id="CVE-2014-9822" ref_url="https://www.suse.com/security/cve/CVE-2014-9822/" source="CVE"/>
		<reference ref_id="CVE-2014-9823" ref_url="https://www.suse.com/security/cve/CVE-2014-9823/" source="CVE"/>
		<reference ref_id="CVE-2014-9824" ref_url="https://www.suse.com/security/cve/CVE-2014-9824/" source="CVE"/>
		<reference ref_id="CVE-2014-9825" ref_url="https://www.suse.com/security/cve/CVE-2014-9825/" source="CVE"/>
		<reference ref_id="CVE-2014-9826" ref_url="https://www.suse.com/security/cve/CVE-2014-9826/" source="CVE"/>
		<reference ref_id="CVE-2014-9828" ref_url="https://www.suse.com/security/cve/CVE-2014-9828/" source="CVE"/>
		<reference ref_id="CVE-2014-9829" ref_url="https://www.suse.com/security/cve/CVE-2014-9829/" source="CVE"/>
		<reference ref_id="CVE-2014-9830" ref_url="https://www.suse.com/security/cve/CVE-2014-9830/" source="CVE"/>
		<reference ref_id="CVE-2014-9831" ref_url="https://www.suse.com/security/cve/CVE-2014-9831/" source="CVE"/>
		<reference ref_id="CVE-2014-9832" ref_url="https://www.suse.com/security/cve/CVE-2014-9832/" source="CVE"/>
		<reference ref_id="CVE-2014-9833" ref_url="https://www.suse.com/security/cve/CVE-2014-9833/" source="CVE"/>
		<reference ref_id="CVE-2014-9834" ref_url="https://www.suse.com/security/cve/CVE-2014-9834/" source="CVE"/>
		<reference ref_id="CVE-2014-9835" ref_url="https://www.suse.com/security/cve/CVE-2014-9835/" source="CVE"/>
		<reference ref_id="CVE-2014-9836" ref_url="https://www.suse.com/security/cve/CVE-2014-9836/" source="CVE"/>
		<reference ref_id="CVE-2014-9837" ref_url="https://www.suse.com/security/cve/CVE-2014-9837/" source="CVE"/>
		<reference ref_id="CVE-2014-9838" ref_url="https://www.suse.com/security/cve/CVE-2014-9838/" source="CVE"/>
		<reference ref_id="CVE-2014-9839" ref_url="https://www.suse.com/security/cve/CVE-2014-9839/" source="CVE"/>
		<reference ref_id="CVE-2014-9840" ref_url="https://www.suse.com/security/cve/CVE-2014-9840/" source="CVE"/>
		<reference ref_id="CVE-2014-9841" ref_url="https://www.suse.com/security/cve/CVE-2014-9841/" source="CVE"/>
		<reference ref_id="CVE-2014-9842" ref_url="https://www.suse.com/security/cve/CVE-2014-9842/" source="CVE"/>
		<reference ref_id="CVE-2014-9843" ref_url="https://www.suse.com/security/cve/CVE-2014-9843/" source="CVE"/>
		<reference ref_id="CVE-2014-9844" ref_url="https://www.suse.com/security/cve/CVE-2014-9844/" source="CVE"/>
		<reference ref_id="CVE-2014-9845" ref_url="https://www.suse.com/security/cve/CVE-2014-9845/" source="CVE"/>
		<reference ref_id="CVE-2014-9846" ref_url="https://www.suse.com/security/cve/CVE-2014-9846/" source="CVE"/>
		<reference ref_id="CVE-2014-9847" ref_url="https://www.suse.com/security/cve/CVE-2014-9847/" source="CVE"/>
		<reference ref_id="CVE-2014-9848" ref_url="https://www.suse.com/security/cve/CVE-2014-9848/" source="CVE"/>
		<reference ref_id="CVE-2014-9849" ref_url="https://www.suse.com/security/cve/CVE-2014-9849/" source="CVE"/>
		<reference ref_id="CVE-2014-9850" ref_url="https://www.suse.com/security/cve/CVE-2014-9850/" source="CVE"/>
		<reference ref_id="CVE-2014-9851" ref_url="https://www.suse.com/security/cve/CVE-2014-9851/" source="CVE"/>
		<reference ref_id="CVE-2014-9852" ref_url="https://www.suse.com/security/cve/CVE-2014-9852/" source="CVE"/>
		<reference ref_id="CVE-2014-9853" ref_url="https://www.suse.com/security/cve/CVE-2014-9853/" source="CVE"/>
		<reference ref_id="CVE-2014-9854" ref_url="https://www.suse.com/security/cve/CVE-2014-9854/" source="CVE"/>
		<reference ref_id="CVE-2014-9907" ref_url="https://www.suse.com/security/cve/CVE-2014-9907/" source="CVE"/>
		<reference ref_id="CVE-2015-8894" ref_url="https://www.suse.com/security/cve/CVE-2015-8894/" source="CVE"/>
		<reference ref_id="CVE-2015-8895" ref_url="https://www.suse.com/security/cve/CVE-2015-8895/" source="CVE"/>
		<reference ref_id="CVE-2015-8896" ref_url="https://www.suse.com/security/cve/CVE-2015-8896/" source="CVE"/>
		<reference ref_id="CVE-2015-8897" ref_url="https://www.suse.com/security/cve/CVE-2015-8897/" source="CVE"/>
		<reference ref_id="CVE-2015-8898" ref_url="https://www.suse.com/security/cve/CVE-2015-8898/" source="CVE"/>
		<reference ref_id="CVE-2015-8900" ref_url="https://www.suse.com/security/cve/CVE-2015-8900/" source="CVE"/>
		<reference ref_id="CVE-2015-8901" ref_url="https://www.suse.com/security/cve/CVE-2015-8901/" source="CVE"/>
		<reference ref_id="CVE-2015-8902" ref_url="https://www.suse.com/security/cve/CVE-2015-8902/" source="CVE"/>
		<reference ref_id="CVE-2015-8903" ref_url="https://www.suse.com/security/cve/CVE-2015-8903/" source="CVE"/>
		<reference ref_id="CVE-2015-8957" ref_url="https://www.suse.com/security/cve/CVE-2015-8957/" source="CVE"/>
		<reference ref_id="CVE-2015-8958" ref_url="https://www.suse.com/security/cve/CVE-2015-8958/" source="CVE"/>
		<reference ref_id="CVE-2015-8959" ref_url="https://www.suse.com/security/cve/CVE-2015-8959/" source="CVE"/>
		<reference ref_id="CVE-2016-10046" ref_url="https://www.suse.com/security/cve/CVE-2016-10046/" source="CVE"/>
		<reference ref_id="CVE-2016-10048" ref_url="https://www.suse.com/security/cve/CVE-2016-10048/" source="CVE"/>
		<reference ref_id="CVE-2016-10049" ref_url="https://www.suse.com/security/cve/CVE-2016-10049/" source="CVE"/>
		<reference ref_id="CVE-2016-10050" ref_url="https://www.suse.com/security/cve/CVE-2016-10050/" source="CVE"/>
		<reference ref_id="CVE-2016-10051" ref_url="https://www.suse.com/security/cve/CVE-2016-10051/" source="CVE"/>
		<reference ref_id="CVE-2016-10052" ref_url="https://www.suse.com/security/cve/CVE-2016-10052/" source="CVE"/>
		<reference ref_id="CVE-2016-10059" ref_url="https://www.suse.com/security/cve/CVE-2016-10059/" source="CVE"/>
		<reference ref_id="CVE-2016-10060" ref_url="https://www.suse.com/security/cve/CVE-2016-10060/" source="CVE"/>
		<reference ref_id="CVE-2016-10061" ref_url="https://www.suse.com/security/cve/CVE-2016-10061/" source="CVE"/>
		<reference ref_id="CVE-2016-10062" ref_url="https://www.suse.com/security/cve/CVE-2016-10062/" source="CVE"/>
		<reference ref_id="CVE-2016-10063" ref_url="https://www.suse.com/security/cve/CVE-2016-10063/" source="CVE"/>
		<reference ref_id="CVE-2016-10064" ref_url="https://www.suse.com/security/cve/CVE-2016-10064/" source="CVE"/>
		<reference ref_id="CVE-2016-10065" ref_url="https://www.suse.com/security/cve/CVE-2016-10065/" source="CVE"/>
		<reference ref_id="CVE-2016-10068" ref_url="https://www.suse.com/security/cve/CVE-2016-10068/" source="CVE"/>
		<reference ref_id="CVE-2016-10069" ref_url="https://www.suse.com/security/cve/CVE-2016-10069/" source="CVE"/>
		<reference ref_id="CVE-2016-10070" ref_url="https://www.suse.com/security/cve/CVE-2016-10070/" source="CVE"/>
		<reference ref_id="CVE-2016-10071" ref_url="https://www.suse.com/security/cve/CVE-2016-10071/" source="CVE"/>
		<reference ref_id="CVE-2016-10144" ref_url="https://www.suse.com/security/cve/CVE-2016-10144/" source="CVE"/>
		<reference ref_id="CVE-2016-10145" ref_url="https://www.suse.com/security/cve/CVE-2016-10145/" source="CVE"/>
		<reference ref_id="CVE-2016-10146" ref_url="https://www.suse.com/security/cve/CVE-2016-10146/" source="CVE"/>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<reference ref_id="CVE-2016-3715" ref_url="https://www.suse.com/security/cve/CVE-2016-3715/" source="CVE"/>
		<reference ref_id="CVE-2016-3716" ref_url="https://www.suse.com/security/cve/CVE-2016-3716/" source="CVE"/>
		<reference ref_id="CVE-2016-3717" ref_url="https://www.suse.com/security/cve/CVE-2016-3717/" source="CVE"/>
		<reference ref_id="CVE-2016-3718" ref_url="https://www.suse.com/security/cve/CVE-2016-3718/" source="CVE"/>
		<reference ref_id="CVE-2016-4562" ref_url="https://www.suse.com/security/cve/CVE-2016-4562/" source="CVE"/>
		<reference ref_id="CVE-2016-4563" ref_url="https://www.suse.com/security/cve/CVE-2016-4563/" source="CVE"/>
		<reference ref_id="CVE-2016-4564" ref_url="https://www.suse.com/security/cve/CVE-2016-4564/" source="CVE"/>
		<reference ref_id="CVE-2016-5010" ref_url="https://www.suse.com/security/cve/CVE-2016-5010/" source="CVE"/>
		<reference ref_id="CVE-2016-5118" ref_url="https://www.suse.com/security/cve/CVE-2016-5118/" source="CVE"/>
		<reference ref_id="CVE-2016-5687" ref_url="https://www.suse.com/security/cve/CVE-2016-5687/" source="CVE"/>
		<reference ref_id="CVE-2016-5688" ref_url="https://www.suse.com/security/cve/CVE-2016-5688/" source="CVE"/>
		<reference ref_id="CVE-2016-5689" ref_url="https://www.suse.com/security/cve/CVE-2016-5689/" source="CVE"/>
		<reference ref_id="CVE-2016-5690" ref_url="https://www.suse.com/security/cve/CVE-2016-5690/" source="CVE"/>
		<reference ref_id="CVE-2016-5691" ref_url="https://www.suse.com/security/cve/CVE-2016-5691/" source="CVE"/>
		<reference ref_id="CVE-2016-5841" ref_url="https://www.suse.com/security/cve/CVE-2016-5841/" source="CVE"/>
		<reference ref_id="CVE-2016-5842" ref_url="https://www.suse.com/security/cve/CVE-2016-5842/" source="CVE"/>
		<reference ref_id="CVE-2016-6491" ref_url="https://www.suse.com/security/cve/CVE-2016-6491/" source="CVE"/>
		<reference ref_id="CVE-2016-6520" ref_url="https://www.suse.com/security/cve/CVE-2016-6520/" source="CVE"/>
		<reference ref_id="CVE-2016-6823" ref_url="https://www.suse.com/security/cve/CVE-2016-6823/" source="CVE"/>
		<reference ref_id="CVE-2016-7101" ref_url="https://www.suse.com/security/cve/CVE-2016-7101/" source="CVE"/>
		<reference ref_id="CVE-2016-7513" ref_url="https://www.suse.com/security/cve/CVE-2016-7513/" source="CVE"/>
		<reference ref_id="CVE-2016-7514" ref_url="https://www.suse.com/security/cve/CVE-2016-7514/" source="CVE"/>
		<reference ref_id="CVE-2016-7515" ref_url="https://www.suse.com/security/cve/CVE-2016-7515/" source="CVE"/>
		<reference ref_id="CVE-2016-7516" ref_url="https://www.suse.com/security/cve/CVE-2016-7516/" source="CVE"/>
		<reference ref_id="CVE-2016-7517" ref_url="https://www.suse.com/security/cve/CVE-2016-7517/" source="CVE"/>
		<reference ref_id="CVE-2016-7518" ref_url="https://www.suse.com/security/cve/CVE-2016-7518/" source="CVE"/>
		<reference ref_id="CVE-2016-7519" ref_url="https://www.suse.com/security/cve/CVE-2016-7519/" source="CVE"/>
		<reference ref_id="CVE-2016-7520" ref_url="https://www.suse.com/security/cve/CVE-2016-7520/" source="CVE"/>
		<reference ref_id="CVE-2016-7521" ref_url="https://www.suse.com/security/cve/CVE-2016-7521/" source="CVE"/>
		<reference ref_id="CVE-2016-7522" ref_url="https://www.suse.com/security/cve/CVE-2016-7522/" source="CVE"/>
		<reference ref_id="CVE-2016-7523" ref_url="https://www.suse.com/security/cve/CVE-2016-7523/" source="CVE"/>
		<reference ref_id="CVE-2016-7524" ref_url="https://www.suse.com/security/cve/CVE-2016-7524/" source="CVE"/>
		<reference ref_id="CVE-2016-7525" ref_url="https://www.suse.com/security/cve/CVE-2016-7525/" source="CVE"/>
		<reference ref_id="CVE-2016-7526" ref_url="https://www.suse.com/security/cve/CVE-2016-7526/" source="CVE"/>
		<reference ref_id="CVE-2016-7527" ref_url="https://www.suse.com/security/cve/CVE-2016-7527/" source="CVE"/>
		<reference ref_id="CVE-2016-7528" ref_url="https://www.suse.com/security/cve/CVE-2016-7528/" source="CVE"/>
		<reference ref_id="CVE-2016-7529" ref_url="https://www.suse.com/security/cve/CVE-2016-7529/" source="CVE"/>
		<reference ref_id="CVE-2016-7530" ref_url="https://www.suse.com/security/cve/CVE-2016-7530/" source="CVE"/>
		<reference ref_id="CVE-2016-7531" ref_url="https://www.suse.com/security/cve/CVE-2016-7531/" source="CVE"/>
		<reference ref_id="CVE-2016-7532" ref_url="https://www.suse.com/security/cve/CVE-2016-7532/" source="CVE"/>
		<reference ref_id="CVE-2016-7533" ref_url="https://www.suse.com/security/cve/CVE-2016-7533/" source="CVE"/>
		<reference ref_id="CVE-2016-7534" ref_url="https://www.suse.com/security/cve/CVE-2016-7534/" source="CVE"/>
		<reference ref_id="CVE-2016-7535" ref_url="https://www.suse.com/security/cve/CVE-2016-7535/" source="CVE"/>
		<reference ref_id="CVE-2016-7537" ref_url="https://www.suse.com/security/cve/CVE-2016-7537/" source="CVE"/>
		<reference ref_id="CVE-2016-7538" ref_url="https://www.suse.com/security/cve/CVE-2016-7538/" source="CVE"/>
		<reference ref_id="CVE-2016-7539" ref_url="https://www.suse.com/security/cve/CVE-2016-7539/" source="CVE"/>
		<reference ref_id="CVE-2016-7540" ref_url="https://www.suse.com/security/cve/CVE-2016-7540/" source="CVE"/>
		<reference ref_id="CVE-2016-7799" ref_url="https://www.suse.com/security/cve/CVE-2016-7799/" source="CVE"/>
		<reference ref_id="CVE-2016-7800" ref_url="https://www.suse.com/security/cve/CVE-2016-7800/" source="CVE"/>
		<reference ref_id="CVE-2016-7996" ref_url="https://www.suse.com/security/cve/CVE-2016-7996/" source="CVE"/>
		<reference ref_id="CVE-2016-7997" ref_url="https://www.suse.com/security/cve/CVE-2016-7997/" source="CVE"/>
		<reference ref_id="CVE-2016-8677" ref_url="https://www.suse.com/security/cve/CVE-2016-8677/" source="CVE"/>
		<reference ref_id="CVE-2016-8682" ref_url="https://www.suse.com/security/cve/CVE-2016-8682/" source="CVE"/>
		<reference ref_id="CVE-2016-8683" ref_url="https://www.suse.com/security/cve/CVE-2016-8683/" source="CVE"/>
		<reference ref_id="CVE-2016-8684" ref_url="https://www.suse.com/security/cve/CVE-2016-8684/" source="CVE"/>
		<reference ref_id="CVE-2016-8707" ref_url="https://www.suse.com/security/cve/CVE-2016-8707/" source="CVE"/>
		<reference ref_id="CVE-2016-8862" ref_url="https://www.suse.com/security/cve/CVE-2016-8862/" source="CVE"/>
		<reference ref_id="CVE-2016-8866" ref_url="https://www.suse.com/security/cve/CVE-2016-8866/" source="CVE"/>
		<reference ref_id="CVE-2016-9556" ref_url="https://www.suse.com/security/cve/CVE-2016-9556/" source="CVE"/>
		<reference ref_id="CVE-2016-9559" ref_url="https://www.suse.com/security/cve/CVE-2016-9559/" source="CVE"/>
		<reference ref_id="CVE-2016-9773" ref_url="https://www.suse.com/security/cve/CVE-2016-9773/" source="CVE"/>
		<reference ref_id="CVE-2017-5506" ref_url="https://www.suse.com/security/cve/CVE-2017-5506/" source="CVE"/>
		<reference ref_id="CVE-2017-5507" ref_url="https://www.suse.com/security/cve/CVE-2017-5507/" source="CVE"/>
		<reference ref_id="CVE-2017-5508" ref_url="https://www.suse.com/security/cve/CVE-2017-5508/" source="CVE"/>
		<reference ref_id="CVE-2017-5510" ref_url="https://www.suse.com/security/cve/CVE-2017-5510/" source="CVE"/>
		<reference ref_id="CVE-2017-5511" ref_url="https://www.suse.com/security/cve/CVE-2017-5511/" source="CVE"/>
		<reference ref_id="CVE-2017-6502" ref_url="https://www.suse.com/security/cve/CVE-2017-6502/" source="CVE"/>
		<reference ref_id="CVE-2017-7606" ref_url="https://www.suse.com/security/cve/CVE-2017-7606/" source="CVE"/>
		<reference ref_id="CVE-2017-7941" ref_url="https://www.suse.com/security/cve/CVE-2017-7941/" source="CVE"/>
		<reference ref_id="CVE-2017-7942" ref_url="https://www.suse.com/security/cve/CVE-2017-7942/" source="CVE"/>
		<reference ref_id="CVE-2017-7943" ref_url="https://www.suse.com/security/cve/CVE-2017-7943/" source="CVE"/>
		<reference ref_id="CVE-2017-8343" ref_url="https://www.suse.com/security/cve/CVE-2017-8343/" source="CVE"/>
		<reference ref_id="CVE-2017-8344" ref_url="https://www.suse.com/security/cve/CVE-2017-8344/" source="CVE"/>
		<reference ref_id="CVE-2017-8345" ref_url="https://www.suse.com/security/cve/CVE-2017-8345/" source="CVE"/>
		<reference ref_id="CVE-2017-8346" ref_url="https://www.suse.com/security/cve/CVE-2017-8346/" source="CVE"/>
		<reference ref_id="CVE-2017-8347" ref_url="https://www.suse.com/security/cve/CVE-2017-8347/" source="CVE"/>
		<reference ref_id="CVE-2017-8348" ref_url="https://www.suse.com/security/cve/CVE-2017-8348/" source="CVE"/>
		<reference ref_id="CVE-2017-8349" ref_url="https://www.suse.com/security/cve/CVE-2017-8349/" source="CVE"/>
		<reference ref_id="CVE-2017-8350" ref_url="https://www.suse.com/security/cve/CVE-2017-8350/" source="CVE"/>
		<reference ref_id="CVE-2017-8351" ref_url="https://www.suse.com/security/cve/CVE-2017-8351/" source="CVE"/>
		<reference ref_id="CVE-2017-8352" ref_url="https://www.suse.com/security/cve/CVE-2017-8352/" source="CVE"/>
		<reference ref_id="CVE-2017-8353" ref_url="https://www.suse.com/security/cve/CVE-2017-8353/" source="CVE"/>
		<reference ref_id="CVE-2017-8354" ref_url="https://www.suse.com/security/cve/CVE-2017-8354/" source="CVE"/>
		<reference ref_id="CVE-2017-8355" ref_url="https://www.suse.com/security/cve/CVE-2017-8355/" source="CVE"/>
		<reference ref_id="CVE-2017-8356" ref_url="https://www.suse.com/security/cve/CVE-2017-8356/" source="CVE"/>
		<reference ref_id="CVE-2017-8357" ref_url="https://www.suse.com/security/cve/CVE-2017-8357/" source="CVE"/>
		<reference ref_id="CVE-2017-8765" ref_url="https://www.suse.com/security/cve/CVE-2017-8765/" source="CVE"/>
		<reference ref_id="CVE-2017-8830" ref_url="https://www.suse.com/security/cve/CVE-2017-8830/" source="CVE"/>
		<reference ref_id="CVE-2017-9098" ref_url="https://www.suse.com/security/cve/CVE-2017-9098/" source="CVE"/>
		<reference ref_id="CVE-2017-9141" ref_url="https://www.suse.com/security/cve/CVE-2017-9141/" source="CVE"/>
		<reference ref_id="CVE-2017-9142" ref_url="https://www.suse.com/security/cve/CVE-2017-9142/" source="CVE"/>
		<reference ref_id="CVE-2017-9143" ref_url="https://www.suse.com/security/cve/CVE-2017-9143/" source="CVE"/>
		<reference ref_id="CVE-2017-9144" ref_url="https://www.suse.com/security/cve/CVE-2017-9144/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-6.8.8.1-70.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0247/">CVE-2012-0247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0248/">CVE-2012-0248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1185/">CVE-2012-1185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1186/">CVE-2012-1186</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8354/">CVE-2014-8354</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8355/">CVE-2014-8355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8562/">CVE-2014-8562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8716/">CVE-2014-8716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9805/">CVE-2014-9805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9806/">CVE-2014-9806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9807/">CVE-2014-9807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9808/">CVE-2014-9808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9809/">CVE-2014-9809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9810/">CVE-2014-9810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9811/">CVE-2014-9811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9812/">CVE-2014-9812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9813/">CVE-2014-9813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9814/">CVE-2014-9814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9815/">CVE-2014-9815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9816/">CVE-2014-9816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9817/">CVE-2014-9817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9818/">CVE-2014-9818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9819/">CVE-2014-9819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9820/">CVE-2014-9820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9821/">CVE-2014-9821</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9822/">CVE-2014-9822</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9823/">CVE-2014-9823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9824/">CVE-2014-9824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9825/">CVE-2014-9825</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9826/">CVE-2014-9826</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9828/">CVE-2014-9828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9829/">CVE-2014-9829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9830/">CVE-2014-9830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9831/">CVE-2014-9831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9832/">CVE-2014-9832</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9833/">CVE-2014-9833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9834/">CVE-2014-9834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9835/">CVE-2014-9835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9836/">CVE-2014-9836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9837/">CVE-2014-9837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9838/">CVE-2014-9838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9839/">CVE-2014-9839</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9840/">CVE-2014-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9841/">CVE-2014-9841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9842/">CVE-2014-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9843/">CVE-2014-9843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9844/">CVE-2014-9844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9845/">CVE-2014-9845</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9846/">CVE-2014-9846</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9847/">CVE-2014-9847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9848/">CVE-2014-9848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9849/">CVE-2014-9849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9850/">CVE-2014-9850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9851/">CVE-2014-9851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9852/">CVE-2014-9852</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9853/">CVE-2014-9853</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9854/">CVE-2014-9854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9907/">CVE-2014-9907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8894/">CVE-2015-8894</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8895/">CVE-2015-8895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8896/">CVE-2015-8896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8897/">CVE-2015-8897</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8898/">CVE-2015-8898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8900/">CVE-2015-8900</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8901/">CVE-2015-8901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8902/">CVE-2015-8902</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8903/">CVE-2015-8903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8957/">CVE-2015-8957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8958/">CVE-2015-8958</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8959/">CVE-2015-8959</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10046/">CVE-2016-10046</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10048/">CVE-2016-10048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10049/">CVE-2016-10049</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10050/">CVE-2016-10050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10051/">CVE-2016-10051</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10052/">CVE-2016-10052</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10059/">CVE-2016-10059</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10060/">CVE-2016-10060</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10061/">CVE-2016-10061</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10062/">CVE-2016-10062</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10063/">CVE-2016-10063</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10064/">CVE-2016-10064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10065/">CVE-2016-10065</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10068/">CVE-2016-10068</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10069/">CVE-2016-10069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10070/">CVE-2016-10070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10071/">CVE-2016-10071</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10144/">CVE-2016-10144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10145/">CVE-2016-10145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10146/">CVE-2016-10146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3715/">CVE-2016-3715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3716/">CVE-2016-3716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3717/">CVE-2016-3717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3718/">CVE-2016-3718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4562/">CVE-2016-4562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4563/">CVE-2016-4563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4564/">CVE-2016-4564</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5010/">CVE-2016-5010</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5118/">CVE-2016-5118</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5687/">CVE-2016-5687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5688/">CVE-2016-5688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5689/">CVE-2016-5689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5690/">CVE-2016-5690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5691/">CVE-2016-5691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5841/">CVE-2016-5841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5842/">CVE-2016-5842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6491/">CVE-2016-6491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6520/">CVE-2016-6520</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6823/">CVE-2016-6823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7101/">CVE-2016-7101</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7513/">CVE-2016-7513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7514/">CVE-2016-7514</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7515/">CVE-2016-7515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7516/">CVE-2016-7516</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7517/">CVE-2016-7517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7518/">CVE-2016-7518</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7519/">CVE-2016-7519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7520/">CVE-2016-7520</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7521/">CVE-2016-7521</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7522/">CVE-2016-7522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7523/">CVE-2016-7523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7524/">CVE-2016-7524</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7525/">CVE-2016-7525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7526/">CVE-2016-7526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7527/">CVE-2016-7527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7528/">CVE-2016-7528</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7529/">CVE-2016-7529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7530/">CVE-2016-7530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7531/">CVE-2016-7531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7532/">CVE-2016-7532</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7533/">CVE-2016-7533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7534/">CVE-2016-7534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7535/">CVE-2016-7535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7537/">CVE-2016-7537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7538/">CVE-2016-7538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7539/">CVE-2016-7539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7540/">CVE-2016-7540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7799/">CVE-2016-7799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7800/">CVE-2016-7800</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7996/">CVE-2016-7996</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7997/">CVE-2016-7997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8677/">CVE-2016-8677</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8682/">CVE-2016-8682</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8683/">CVE-2016-8683</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8684/">CVE-2016-8684</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8707/">CVE-2016-8707</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8862/">CVE-2016-8862</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8866/">CVE-2016-8866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9556/">CVE-2016-9556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9559/">CVE-2016-9559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9773/">CVE-2016-9773</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5506/">CVE-2017-5506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5507/">CVE-2017-5507</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5508/">CVE-2017-5508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5510/">CVE-2017-5510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5511/">CVE-2017-5511</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6502/">CVE-2017-6502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7606/">CVE-2017-7606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7941/">CVE-2017-7941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7942/">CVE-2017-7942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7943/">CVE-2017-7943</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8343/">CVE-2017-8343</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8344/">CVE-2017-8344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8345/">CVE-2017-8345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8346/">CVE-2017-8346</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8347/">CVE-2017-8347</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8348/">CVE-2017-8348</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8349/">CVE-2017-8349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8350/">CVE-2017-8350</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8351/">CVE-2017-8351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8352/">CVE-2017-8352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8353/">CVE-2017-8353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8354/">CVE-2017-8354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8355/">CVE-2017-8355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8356/">CVE-2017-8356</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8357/">CVE-2017-8357</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8765/">CVE-2017-8765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8830/">CVE-2017-8830</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9098/">CVE-2017-9098</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9141/">CVE-2017-9141</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9142/">CVE-2017-9142</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9143/">CVE-2017-9143</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9144/">CVE-2017-9144</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156374" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156375" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156377" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76475" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-52.2.0esr-108.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-5913" ref_url="https://www.suse.com/security/cve/CVE-2008-5913/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-0652" ref_url="https://www.suse.com/security/cve/CVE-2009-0652/" source="CVE"/>
		<reference ref_id="CVE-2009-0771" ref_url="https://www.suse.com/security/cve/CVE-2009-0771/" source="CVE"/>
		<reference ref_id="CVE-2009-0772" ref_url="https://www.suse.com/security/cve/CVE-2009-0772/" source="CVE"/>
		<reference ref_id="CVE-2009-0773" ref_url="https://www.suse.com/security/cve/CVE-2009-0773/" source="CVE"/>
		<reference ref_id="CVE-2009-0774" ref_url="https://www.suse.com/security/cve/CVE-2009-0774/" source="CVE"/>
		<reference ref_id="CVE-2009-0775" ref_url="https://www.suse.com/security/cve/CVE-2009-0775/" source="CVE"/>
		<reference ref_id="CVE-2009-0776" ref_url="https://www.suse.com/security/cve/CVE-2009-0776/" source="CVE"/>
		<reference ref_id="CVE-2009-0777" ref_url="https://www.suse.com/security/cve/CVE-2009-0777/" source="CVE"/>
		<reference ref_id="CVE-2009-1044" ref_url="https://www.suse.com/security/cve/CVE-2009-1044/" source="CVE"/>
		<reference ref_id="CVE-2009-1169" ref_url="https://www.suse.com/security/cve/CVE-2009-1169/" source="CVE"/>
		<reference ref_id="CVE-2009-1302" ref_url="https://www.suse.com/security/cve/CVE-2009-1302/" source="CVE"/>
		<reference ref_id="CVE-2009-1303" ref_url="https://www.suse.com/security/cve/CVE-2009-1303/" source="CVE"/>
		<reference ref_id="CVE-2009-1304" ref_url="https://www.suse.com/security/cve/CVE-2009-1304/" source="CVE"/>
		<reference ref_id="CVE-2009-1305" ref_url="https://www.suse.com/security/cve/CVE-2009-1305/" source="CVE"/>
		<reference ref_id="CVE-2009-1306" ref_url="https://www.suse.com/security/cve/CVE-2009-1306/" source="CVE"/>
		<reference ref_id="CVE-2009-1307" ref_url="https://www.suse.com/security/cve/CVE-2009-1307/" source="CVE"/>
		<reference ref_id="CVE-2009-1308" ref_url="https://www.suse.com/security/cve/CVE-2009-1308/" source="CVE"/>
		<reference ref_id="CVE-2009-1309" ref_url="https://www.suse.com/security/cve/CVE-2009-1309/" source="CVE"/>
		<reference ref_id="CVE-2009-1310" ref_url="https://www.suse.com/security/cve/CVE-2009-1310/" source="CVE"/>
		<reference ref_id="CVE-2009-1311" ref_url="https://www.suse.com/security/cve/CVE-2009-1311/" source="CVE"/>
		<reference ref_id="CVE-2009-1312" ref_url="https://www.suse.com/security/cve/CVE-2009-1312/" source="CVE"/>
		<reference ref_id="CVE-2009-1313" ref_url="https://www.suse.com/security/cve/CVE-2009-1313/" source="CVE"/>
		<reference ref_id="CVE-2009-1563" ref_url="https://www.suse.com/security/cve/CVE-2009-1563/" source="CVE"/>
		<reference ref_id="CVE-2009-2470" ref_url="https://www.suse.com/security/cve/CVE-2009-2470/" source="CVE"/>
		<reference ref_id="CVE-2009-2654" ref_url="https://www.suse.com/security/cve/CVE-2009-2654/" source="CVE"/>
		<reference ref_id="CVE-2009-3069" ref_url="https://www.suse.com/security/cve/CVE-2009-3069/" source="CVE"/>
		<reference ref_id="CVE-2009-3070" ref_url="https://www.suse.com/security/cve/CVE-2009-3070/" source="CVE"/>
		<reference ref_id="CVE-2009-3071" ref_url="https://www.suse.com/security/cve/CVE-2009-3071/" source="CVE"/>
		<reference ref_id="CVE-2009-3072" ref_url="https://www.suse.com/security/cve/CVE-2009-3072/" source="CVE"/>
		<reference ref_id="CVE-2009-3073" ref_url="https://www.suse.com/security/cve/CVE-2009-3073/" source="CVE"/>
		<reference ref_id="CVE-2009-3074" ref_url="https://www.suse.com/security/cve/CVE-2009-3074/" source="CVE"/>
		<reference ref_id="CVE-2009-3075" ref_url="https://www.suse.com/security/cve/CVE-2009-3075/" source="CVE"/>
		<reference ref_id="CVE-2009-3077" ref_url="https://www.suse.com/security/cve/CVE-2009-3077/" source="CVE"/>
		<reference ref_id="CVE-2009-3078" ref_url="https://www.suse.com/security/cve/CVE-2009-3078/" source="CVE"/>
		<reference ref_id="CVE-2009-3079" ref_url="https://www.suse.com/security/cve/CVE-2009-3079/" source="CVE"/>
		<reference ref_id="CVE-2009-3274" ref_url="https://www.suse.com/security/cve/CVE-2009-3274/" source="CVE"/>
		<reference ref_id="CVE-2009-3370" ref_url="https://www.suse.com/security/cve/CVE-2009-3370/" source="CVE"/>
		<reference ref_id="CVE-2009-3371" ref_url="https://www.suse.com/security/cve/CVE-2009-3371/" source="CVE"/>
		<reference ref_id="CVE-2009-3372" ref_url="https://www.suse.com/security/cve/CVE-2009-3372/" source="CVE"/>
		<reference ref_id="CVE-2009-3373" ref_url="https://www.suse.com/security/cve/CVE-2009-3373/" source="CVE"/>
		<reference ref_id="CVE-2009-3374" ref_url="https://www.suse.com/security/cve/CVE-2009-3374/" source="CVE"/>
		<reference ref_id="CVE-2009-3375" ref_url="https://www.suse.com/security/cve/CVE-2009-3375/" source="CVE"/>
		<reference ref_id="CVE-2009-3376" ref_url="https://www.suse.com/security/cve/CVE-2009-3376/" source="CVE"/>
		<reference ref_id="CVE-2009-3377" ref_url="https://www.suse.com/security/cve/CVE-2009-3377/" source="CVE"/>
		<reference ref_id="CVE-2009-3378" ref_url="https://www.suse.com/security/cve/CVE-2009-3378/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2009-3380" ref_url="https://www.suse.com/security/cve/CVE-2009-3380/" source="CVE"/>
		<reference ref_id="CVE-2009-3381" ref_url="https://www.suse.com/security/cve/CVE-2009-3381/" source="CVE"/>
		<reference ref_id="CVE-2009-3383" ref_url="https://www.suse.com/security/cve/CVE-2009-3383/" source="CVE"/>
		<reference ref_id="CVE-2009-3388" ref_url="https://www.suse.com/security/cve/CVE-2009-3388/" source="CVE"/>
		<reference ref_id="CVE-2009-3389" ref_url="https://www.suse.com/security/cve/CVE-2009-3389/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-3979" ref_url="https://www.suse.com/security/cve/CVE-2009-3979/" source="CVE"/>
		<reference ref_id="CVE-2009-3980" ref_url="https://www.suse.com/security/cve/CVE-2009-3980/" source="CVE"/>
		<reference ref_id="CVE-2009-3982" ref_url="https://www.suse.com/security/cve/CVE-2009-3982/" source="CVE"/>
		<reference ref_id="CVE-2009-3983" ref_url="https://www.suse.com/security/cve/CVE-2009-3983/" source="CVE"/>
		<reference ref_id="CVE-2009-3984" ref_url="https://www.suse.com/security/cve/CVE-2009-3984/" source="CVE"/>
		<reference ref_id="CVE-2009-3985" ref_url="https://www.suse.com/security/cve/CVE-2009-3985/" source="CVE"/>
		<reference ref_id="CVE-2010-0164" ref_url="https://www.suse.com/security/cve/CVE-2010-0164/" source="CVE"/>
		<reference ref_id="CVE-2010-0165" ref_url="https://www.suse.com/security/cve/CVE-2010-0165/" source="CVE"/>
		<reference ref_id="CVE-2010-0166" ref_url="https://www.suse.com/security/cve/CVE-2010-0166/" source="CVE"/>
		<reference ref_id="CVE-2010-0167" ref_url="https://www.suse.com/security/cve/CVE-2010-0167/" source="CVE"/>
		<reference ref_id="CVE-2010-0168" ref_url="https://www.suse.com/security/cve/CVE-2010-0168/" source="CVE"/>
		<reference ref_id="CVE-2010-0169" ref_url="https://www.suse.com/security/cve/CVE-2010-0169/" source="CVE"/>
		<reference ref_id="CVE-2010-0170" ref_url="https://www.suse.com/security/cve/CVE-2010-0170/" source="CVE"/>
		<reference ref_id="CVE-2010-0171" ref_url="https://www.suse.com/security/cve/CVE-2010-0171/" source="CVE"/>
		<reference ref_id="CVE-2010-0172" ref_url="https://www.suse.com/security/cve/CVE-2010-0172/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181/" source="CVE"/>
		<reference ref_id="CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182/" source="CVE"/>
		<reference ref_id="CVE-2010-0654" ref_url="https://www.suse.com/security/cve/CVE-2010-0654/" source="CVE"/>
		<reference ref_id="CVE-2010-1028" ref_url="https://www.suse.com/security/cve/CVE-2010-1028/" source="CVE"/>
		<reference ref_id="CVE-2010-1121" ref_url="https://www.suse.com/security/cve/CVE-2010-1121/" source="CVE"/>
		<reference ref_id="CVE-2010-1125" ref_url="https://www.suse.com/security/cve/CVE-2010-1125/" source="CVE"/>
		<reference ref_id="CVE-2010-1196" ref_url="https://www.suse.com/security/cve/CVE-2010-1196/" source="CVE"/>
		<reference ref_id="CVE-2010-1197" ref_url="https://www.suse.com/security/cve/CVE-2010-1197/" source="CVE"/>
		<reference ref_id="CVE-2010-1198" ref_url="https://www.suse.com/security/cve/CVE-2010-1198/" source="CVE"/>
		<reference ref_id="CVE-2010-1199" ref_url="https://www.suse.com/security/cve/CVE-2010-1199/" source="CVE"/>
		<reference ref_id="CVE-2010-1200" ref_url="https://www.suse.com/security/cve/CVE-2010-1200/" source="CVE"/>
		<reference ref_id="CVE-2010-1201" ref_url="https://www.suse.com/security/cve/CVE-2010-1201/" source="CVE"/>
		<reference ref_id="CVE-2010-1202" ref_url="https://www.suse.com/security/cve/CVE-2010-1202/" source="CVE"/>
		<reference ref_id="CVE-2010-1203" ref_url="https://www.suse.com/security/cve/CVE-2010-1203/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-1206" ref_url="https://www.suse.com/security/cve/CVE-2010-1206/" source="CVE"/>
		<reference ref_id="CVE-2010-1207" ref_url="https://www.suse.com/security/cve/CVE-2010-1207/" source="CVE"/>
		<reference ref_id="CVE-2010-1208" ref_url="https://www.suse.com/security/cve/CVE-2010-1208/" source="CVE"/>
		<reference ref_id="CVE-2010-1209" ref_url="https://www.suse.com/security/cve/CVE-2010-1209/" source="CVE"/>
		<reference ref_id="CVE-2010-1210" ref_url="https://www.suse.com/security/cve/CVE-2010-1210/" source="CVE"/>
		<reference ref_id="CVE-2010-1211" ref_url="https://www.suse.com/security/cve/CVE-2010-1211/" source="CVE"/>
		<reference ref_id="CVE-2010-1212" ref_url="https://www.suse.com/security/cve/CVE-2010-1212/" source="CVE"/>
		<reference ref_id="CVE-2010-1213" ref_url="https://www.suse.com/security/cve/CVE-2010-1213/" source="CVE"/>
		<reference ref_id="CVE-2010-1214" ref_url="https://www.suse.com/security/cve/CVE-2010-1214/" source="CVE"/>
		<reference ref_id="CVE-2010-1215" ref_url="https://www.suse.com/security/cve/CVE-2010-1215/" source="CVE"/>
		<reference ref_id="CVE-2010-2751" ref_url="https://www.suse.com/security/cve/CVE-2010-2751/" source="CVE"/>
		<reference ref_id="CVE-2010-2752" ref_url="https://www.suse.com/security/cve/CVE-2010-2752/" source="CVE"/>
		<reference ref_id="CVE-2010-2753" ref_url="https://www.suse.com/security/cve/CVE-2010-2753/" source="CVE"/>
		<reference ref_id="CVE-2010-2754" ref_url="https://www.suse.com/security/cve/CVE-2010-2754/" source="CVE"/>
		<reference ref_id="CVE-2010-2755" ref_url="https://www.suse.com/security/cve/CVE-2010-2755/" source="CVE"/>
		<reference ref_id="CVE-2010-2760" ref_url="https://www.suse.com/security/cve/CVE-2010-2760/" source="CVE"/>
		<reference ref_id="CVE-2010-2762" ref_url="https://www.suse.com/security/cve/CVE-2010-2762/" source="CVE"/>
		<reference ref_id="CVE-2010-2764" ref_url="https://www.suse.com/security/cve/CVE-2010-2764/" source="CVE"/>
		<reference ref_id="CVE-2010-2765" ref_url="https://www.suse.com/security/cve/CVE-2010-2765/" source="CVE"/>
		<reference ref_id="CVE-2010-2766" ref_url="https://www.suse.com/security/cve/CVE-2010-2766/" source="CVE"/>
		<reference ref_id="CVE-2010-2767" ref_url="https://www.suse.com/security/cve/CVE-2010-2767/" source="CVE"/>
		<reference ref_id="CVE-2010-2768" ref_url="https://www.suse.com/security/cve/CVE-2010-2768/" source="CVE"/>
		<reference ref_id="CVE-2010-2769" ref_url="https://www.suse.com/security/cve/CVE-2010-2769/" source="CVE"/>
		<reference ref_id="CVE-2010-3166" ref_url="https://www.suse.com/security/cve/CVE-2010-3166/" source="CVE"/>
		<reference ref_id="CVE-2010-3167" ref_url="https://www.suse.com/security/cve/CVE-2010-3167/" source="CVE"/>
		<reference ref_id="CVE-2010-3168" ref_url="https://www.suse.com/security/cve/CVE-2010-3168/" source="CVE"/>
		<reference ref_id="CVE-2010-3169" ref_url="https://www.suse.com/security/cve/CVE-2010-3169/" source="CVE"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2010-3173" ref_url="https://www.suse.com/security/cve/CVE-2010-3173/" source="CVE"/>
		<reference ref_id="CVE-2010-3174" ref_url="https://www.suse.com/security/cve/CVE-2010-3174/" source="CVE"/>
		<reference ref_id="CVE-2010-3175" ref_url="https://www.suse.com/security/cve/CVE-2010-3175/" source="CVE"/>
		<reference ref_id="CVE-2010-3176" ref_url="https://www.suse.com/security/cve/CVE-2010-3176/" source="CVE"/>
		<reference ref_id="CVE-2010-3177" ref_url="https://www.suse.com/security/cve/CVE-2010-3177/" source="CVE"/>
		<reference ref_id="CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178/" source="CVE"/>
		<reference ref_id="CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179/" source="CVE"/>
		<reference ref_id="CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180/" source="CVE"/>
		<reference ref_id="CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182/" source="CVE"/>
		<reference ref_id="CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183/" source="CVE"/>
		<reference ref_id="CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765/" source="CVE"/>
		<reference ref_id="CVE-2011-0068" ref_url="https://www.suse.com/security/cve/CVE-2011-0068/" source="CVE"/>
		<reference ref_id="CVE-2011-0069" ref_url="https://www.suse.com/security/cve/CVE-2011-0069/" source="CVE"/>
		<reference ref_id="CVE-2011-0070" ref_url="https://www.suse.com/security/cve/CVE-2011-0070/" source="CVE"/>
		<reference ref_id="CVE-2011-0079" ref_url="https://www.suse.com/security/cve/CVE-2011-0079/" source="CVE"/>
		<reference ref_id="CVE-2011-0080" ref_url="https://www.suse.com/security/cve/CVE-2011-0080/" source="CVE"/>
		<reference ref_id="CVE-2011-0081" ref_url="https://www.suse.com/security/cve/CVE-2011-0081/" source="CVE"/>
		<reference ref_id="CVE-2011-0084" ref_url="https://www.suse.com/security/cve/CVE-2011-0084/" source="CVE"/>
		<reference ref_id="CVE-2011-1187" ref_url="https://www.suse.com/security/cve/CVE-2011-1187/" source="CVE"/>
		<reference ref_id="CVE-2011-1202" ref_url="https://www.suse.com/security/cve/CVE-2011-1202/" source="CVE"/>
		<reference ref_id="CVE-2011-2366" ref_url="https://www.suse.com/security/cve/CVE-2011-2366/" source="CVE"/>
		<reference ref_id="CVE-2011-2367" ref_url="https://www.suse.com/security/cve/CVE-2011-2367/" source="CVE"/>
		<reference ref_id="CVE-2011-2368" ref_url="https://www.suse.com/security/cve/CVE-2011-2368/" source="CVE"/>
		<reference ref_id="CVE-2011-2369" ref_url="https://www.suse.com/security/cve/CVE-2011-2369/" source="CVE"/>
		<reference ref_id="CVE-2011-2370" ref_url="https://www.suse.com/security/cve/CVE-2011-2370/" source="CVE"/>
		<reference ref_id="CVE-2011-2371" ref_url="https://www.suse.com/security/cve/CVE-2011-2371/" source="CVE"/>
		<reference ref_id="CVE-2011-2372" ref_url="https://www.suse.com/security/cve/CVE-2011-2372/" source="CVE"/>
		<reference ref_id="CVE-2011-2373" ref_url="https://www.suse.com/security/cve/CVE-2011-2373/" source="CVE"/>
		<reference ref_id="CVE-2011-2374" ref_url="https://www.suse.com/security/cve/CVE-2011-2374/" source="CVE"/>
		<reference ref_id="CVE-2011-2375" ref_url="https://www.suse.com/security/cve/CVE-2011-2375/" source="CVE"/>
		<reference ref_id="CVE-2011-2377" ref_url="https://www.suse.com/security/cve/CVE-2011-2377/" source="CVE"/>
		<reference ref_id="CVE-2011-2985" ref_url="https://www.suse.com/security/cve/CVE-2011-2985/" source="CVE"/>
		<reference ref_id="CVE-2011-2986" ref_url="https://www.suse.com/security/cve/CVE-2011-2986/" source="CVE"/>
		<reference ref_id="CVE-2011-2988" ref_url="https://www.suse.com/security/cve/CVE-2011-2988/" source="CVE"/>
		<reference ref_id="CVE-2011-2989" ref_url="https://www.suse.com/security/cve/CVE-2011-2989/" source="CVE"/>
		<reference ref_id="CVE-2011-2990" ref_url="https://www.suse.com/security/cve/CVE-2011-2990/" source="CVE"/>
		<reference ref_id="CVE-2011-2991" ref_url="https://www.suse.com/security/cve/CVE-2011-2991/" source="CVE"/>
		<reference ref_id="CVE-2011-2992" ref_url="https://www.suse.com/security/cve/CVE-2011-2992/" source="CVE"/>
		<reference ref_id="CVE-2011-2993" ref_url="https://www.suse.com/security/cve/CVE-2011-2993/" source="CVE"/>
		<reference ref_id="CVE-2011-2995" ref_url="https://www.suse.com/security/cve/CVE-2011-2995/" source="CVE"/>
		<reference ref_id="CVE-2011-2996" ref_url="https://www.suse.com/security/cve/CVE-2011-2996/" source="CVE"/>
		<reference ref_id="CVE-2011-2997" ref_url="https://www.suse.com/security/cve/CVE-2011-2997/" source="CVE"/>
		<reference ref_id="CVE-2011-3000" ref_url="https://www.suse.com/security/cve/CVE-2011-3000/" source="CVE"/>
		<reference ref_id="CVE-2011-3001" ref_url="https://www.suse.com/security/cve/CVE-2011-3001/" source="CVE"/>
		<reference ref_id="CVE-2011-3002" ref_url="https://www.suse.com/security/cve/CVE-2011-3002/" source="CVE"/>
		<reference ref_id="CVE-2011-3003" ref_url="https://www.suse.com/security/cve/CVE-2011-3003/" source="CVE"/>
		<reference ref_id="CVE-2011-3004" ref_url="https://www.suse.com/security/cve/CVE-2011-3004/" source="CVE"/>
		<reference ref_id="CVE-2011-3005" ref_url="https://www.suse.com/security/cve/CVE-2011-3005/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3062" ref_url="https://www.suse.com/security/cve/CVE-2011-3062/" source="CVE"/>
		<reference ref_id="CVE-2011-3101" ref_url="https://www.suse.com/security/cve/CVE-2011-3101/" source="CVE"/>
		<reference ref_id="CVE-2011-3232" ref_url="https://www.suse.com/security/cve/CVE-2011-3232/" source="CVE"/>
		<reference ref_id="CVE-2011-3648" ref_url="https://www.suse.com/security/cve/CVE-2011-3648/" source="CVE"/>
		<reference ref_id="CVE-2011-3650" ref_url="https://www.suse.com/security/cve/CVE-2011-3650/" source="CVE"/>
		<reference ref_id="CVE-2011-3651" ref_url="https://www.suse.com/security/cve/CVE-2011-3651/" source="CVE"/>
		<reference ref_id="CVE-2011-3652" ref_url="https://www.suse.com/security/cve/CVE-2011-3652/" source="CVE"/>
		<reference ref_id="CVE-2011-3654" ref_url="https://www.suse.com/security/cve/CVE-2011-3654/" source="CVE"/>
		<reference ref_id="CVE-2011-3655" ref_url="https://www.suse.com/security/cve/CVE-2011-3655/" source="CVE"/>
		<reference ref_id="CVE-2011-3658" ref_url="https://www.suse.com/security/cve/CVE-2011-3658/" source="CVE"/>
		<reference ref_id="CVE-2011-3659" ref_url="https://www.suse.com/security/cve/CVE-2011-3659/" source="CVE"/>
		<reference ref_id="CVE-2011-3660" ref_url="https://www.suse.com/security/cve/CVE-2011-3660/" source="CVE"/>
		<reference ref_id="CVE-2011-3661" ref_url="https://www.suse.com/security/cve/CVE-2011-3661/" source="CVE"/>
		<reference ref_id="CVE-2011-3663" ref_url="https://www.suse.com/security/cve/CVE-2011-3663/" source="CVE"/>
		<reference ref_id="CVE-2012-0441" ref_url="https://www.suse.com/security/cve/CVE-2012-0441/" source="CVE"/>
		<reference ref_id="CVE-2012-0442" ref_url="https://www.suse.com/security/cve/CVE-2012-0442/" source="CVE"/>
		<reference ref_id="CVE-2012-0443" ref_url="https://www.suse.com/security/cve/CVE-2012-0443/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<reference ref_id="CVE-2012-0445" ref_url="https://www.suse.com/security/cve/CVE-2012-0445/" source="CVE"/>
		<reference ref_id="CVE-2012-0446" ref_url="https://www.suse.com/security/cve/CVE-2012-0446/" source="CVE"/>
		<reference ref_id="CVE-2012-0447" ref_url="https://www.suse.com/security/cve/CVE-2012-0447/" source="CVE"/>
		<reference ref_id="CVE-2012-0449" ref_url="https://www.suse.com/security/cve/CVE-2012-0449/" source="CVE"/>
		<reference ref_id="CVE-2012-0451" ref_url="https://www.suse.com/security/cve/CVE-2012-0451/" source="CVE"/>
		<reference ref_id="CVE-2012-0452" ref_url="https://www.suse.com/security/cve/CVE-2012-0452/" source="CVE"/>
		<reference ref_id="CVE-2012-0455" ref_url="https://www.suse.com/security/cve/CVE-2012-0455/" source="CVE"/>
		<reference ref_id="CVE-2012-0456" ref_url="https://www.suse.com/security/cve/CVE-2012-0456/" source="CVE"/>
		<reference ref_id="CVE-2012-0457" ref_url="https://www.suse.com/security/cve/CVE-2012-0457/" source="CVE"/>
		<reference ref_id="CVE-2012-0458" ref_url="https://www.suse.com/security/cve/CVE-2012-0458/" source="CVE"/>
		<reference ref_id="CVE-2012-0459" ref_url="https://www.suse.com/security/cve/CVE-2012-0459/" source="CVE"/>
		<reference ref_id="CVE-2012-0460" ref_url="https://www.suse.com/security/cve/CVE-2012-0460/" source="CVE"/>
		<reference ref_id="CVE-2012-0461" ref_url="https://www.suse.com/security/cve/CVE-2012-0461/" source="CVE"/>
		<reference ref_id="CVE-2012-0462" ref_url="https://www.suse.com/security/cve/CVE-2012-0462/" source="CVE"/>
		<reference ref_id="CVE-2012-0463" ref_url="https://www.suse.com/security/cve/CVE-2012-0463/" source="CVE"/>
		<reference ref_id="CVE-2012-0464" ref_url="https://www.suse.com/security/cve/CVE-2012-0464/" source="CVE"/>
		<reference ref_id="CVE-2012-0467" ref_url="https://www.suse.com/security/cve/CVE-2012-0467/" source="CVE"/>
		<reference ref_id="CVE-2012-0468" ref_url="https://www.suse.com/security/cve/CVE-2012-0468/" source="CVE"/>
		<reference ref_id="CVE-2012-0469" ref_url="https://www.suse.com/security/cve/CVE-2012-0469/" source="CVE"/>
		<reference ref_id="CVE-2012-0470" ref_url="https://www.suse.com/security/cve/CVE-2012-0470/" source="CVE"/>
		<reference ref_id="CVE-2012-0471" ref_url="https://www.suse.com/security/cve/CVE-2012-0471/" source="CVE"/>
		<reference ref_id="CVE-2012-0472" ref_url="https://www.suse.com/security/cve/CVE-2012-0472/" source="CVE"/>
		<reference ref_id="CVE-2012-0473" ref_url="https://www.suse.com/security/cve/CVE-2012-0473/" source="CVE"/>
		<reference ref_id="CVE-2012-0474" ref_url="https://www.suse.com/security/cve/CVE-2012-0474/" source="CVE"/>
		<reference ref_id="CVE-2012-0475" ref_url="https://www.suse.com/security/cve/CVE-2012-0475/" source="CVE"/>
		<reference ref_id="CVE-2012-0477" ref_url="https://www.suse.com/security/cve/CVE-2012-0477/" source="CVE"/>
		<reference ref_id="CVE-2012-0478" ref_url="https://www.suse.com/security/cve/CVE-2012-0478/" source="CVE"/>
		<reference ref_id="CVE-2012-0479" ref_url="https://www.suse.com/security/cve/CVE-2012-0479/" source="CVE"/>
		<reference ref_id="CVE-2012-0759" ref_url="https://www.suse.com/security/cve/CVE-2012-0759/" source="CVE"/>
		<reference ref_id="CVE-2012-1937" ref_url="https://www.suse.com/security/cve/CVE-2012-1937/" source="CVE"/>
		<reference ref_id="CVE-2012-1938" ref_url="https://www.suse.com/security/cve/CVE-2012-1938/" source="CVE"/>
		<reference ref_id="CVE-2012-1940" ref_url="https://www.suse.com/security/cve/CVE-2012-1940/" source="CVE"/>
		<reference ref_id="CVE-2012-1941" ref_url="https://www.suse.com/security/cve/CVE-2012-1941/" source="CVE"/>
		<reference ref_id="CVE-2012-1944" ref_url="https://www.suse.com/security/cve/CVE-2012-1944/" source="CVE"/>
		<reference ref_id="CVE-2012-1945" ref_url="https://www.suse.com/security/cve/CVE-2012-1945/" source="CVE"/>
		<reference ref_id="CVE-2012-1946" ref_url="https://www.suse.com/security/cve/CVE-2012-1946/" source="CVE"/>
		<reference ref_id="CVE-2012-1947" ref_url="https://www.suse.com/security/cve/CVE-2012-1947/" source="CVE"/>
		<reference ref_id="CVE-2012-1948" ref_url="https://www.suse.com/security/cve/CVE-2012-1948/" source="CVE"/>
		<reference ref_id="CVE-2012-1949" ref_url="https://www.suse.com/security/cve/CVE-2012-1949/" source="CVE"/>
		<reference ref_id="CVE-2012-1950" ref_url="https://www.suse.com/security/cve/CVE-2012-1950/" source="CVE"/>
		<reference ref_id="CVE-2012-1951" ref_url="https://www.suse.com/security/cve/CVE-2012-1951/" source="CVE"/>
		<reference ref_id="CVE-2012-1952" ref_url="https://www.suse.com/security/cve/CVE-2012-1952/" source="CVE"/>
		<reference ref_id="CVE-2012-1953" ref_url="https://www.suse.com/security/cve/CVE-2012-1953/" source="CVE"/>
		<reference ref_id="CVE-2012-1954" ref_url="https://www.suse.com/security/cve/CVE-2012-1954/" source="CVE"/>
		<reference ref_id="CVE-2012-1955" ref_url="https://www.suse.com/security/cve/CVE-2012-1955/" source="CVE"/>
		<reference ref_id="CVE-2012-1956" ref_url="https://www.suse.com/security/cve/CVE-2012-1956/" source="CVE"/>
		<reference ref_id="CVE-2012-1957" ref_url="https://www.suse.com/security/cve/CVE-2012-1957/" source="CVE"/>
		<reference ref_id="CVE-2012-1958" ref_url="https://www.suse.com/security/cve/CVE-2012-1958/" source="CVE"/>
		<reference ref_id="CVE-2012-1959" ref_url="https://www.suse.com/security/cve/CVE-2012-1959/" source="CVE"/>
		<reference ref_id="CVE-2012-1960" ref_url="https://www.suse.com/security/cve/CVE-2012-1960/" source="CVE"/>
		<reference ref_id="CVE-2012-1961" ref_url="https://www.suse.com/security/cve/CVE-2012-1961/" source="CVE"/>
		<reference ref_id="CVE-2012-1962" ref_url="https://www.suse.com/security/cve/CVE-2012-1962/" source="CVE"/>
		<reference ref_id="CVE-2012-1963" ref_url="https://www.suse.com/security/cve/CVE-2012-1963/" source="CVE"/>
		<reference ref_id="CVE-2012-1965" ref_url="https://www.suse.com/security/cve/CVE-2012-1965/" source="CVE"/>
		<reference ref_id="CVE-2012-1966" ref_url="https://www.suse.com/security/cve/CVE-2012-1966/" source="CVE"/>
		<reference ref_id="CVE-2012-1967" ref_url="https://www.suse.com/security/cve/CVE-2012-1967/" source="CVE"/>
		<reference ref_id="CVE-2012-1970" ref_url="https://www.suse.com/security/cve/CVE-2012-1970/" source="CVE"/>
		<reference ref_id="CVE-2012-1972" ref_url="https://www.suse.com/security/cve/CVE-2012-1972/" source="CVE"/>
		<reference ref_id="CVE-2012-1973" ref_url="https://www.suse.com/security/cve/CVE-2012-1973/" source="CVE"/>
		<reference ref_id="CVE-2012-1974" ref_url="https://www.suse.com/security/cve/CVE-2012-1974/" source="CVE"/>
		<reference ref_id="CVE-2012-1975" ref_url="https://www.suse.com/security/cve/CVE-2012-1975/" source="CVE"/>
		<reference ref_id="CVE-2012-1976" ref_url="https://www.suse.com/security/cve/CVE-2012-1976/" source="CVE"/>
		<reference ref_id="CVE-2012-3956" ref_url="https://www.suse.com/security/cve/CVE-2012-3956/" source="CVE"/>
		<reference ref_id="CVE-2012-3957" ref_url="https://www.suse.com/security/cve/CVE-2012-3957/" source="CVE"/>
		<reference ref_id="CVE-2012-3958" ref_url="https://www.suse.com/security/cve/CVE-2012-3958/" source="CVE"/>
		<reference ref_id="CVE-2012-3959" ref_url="https://www.suse.com/security/cve/CVE-2012-3959/" source="CVE"/>
		<reference ref_id="CVE-2012-3960" ref_url="https://www.suse.com/security/cve/CVE-2012-3960/" source="CVE"/>
		<reference ref_id="CVE-2012-3961" ref_url="https://www.suse.com/security/cve/CVE-2012-3961/" source="CVE"/>
		<reference ref_id="CVE-2012-3962" ref_url="https://www.suse.com/security/cve/CVE-2012-3962/" source="CVE"/>
		<reference ref_id="CVE-2012-3963" ref_url="https://www.suse.com/security/cve/CVE-2012-3963/" source="CVE"/>
		<reference ref_id="CVE-2012-3964" ref_url="https://www.suse.com/security/cve/CVE-2012-3964/" source="CVE"/>
		<reference ref_id="CVE-2012-3965" ref_url="https://www.suse.com/security/cve/CVE-2012-3965/" source="CVE"/>
		<reference ref_id="CVE-2012-3966" ref_url="https://www.suse.com/security/cve/CVE-2012-3966/" source="CVE"/>
		<reference ref_id="CVE-2012-3967" ref_url="https://www.suse.com/security/cve/CVE-2012-3967/" source="CVE"/>
		<reference ref_id="CVE-2012-3968" ref_url="https://www.suse.com/security/cve/CVE-2012-3968/" source="CVE"/>
		<reference ref_id="CVE-2012-3969" ref_url="https://www.suse.com/security/cve/CVE-2012-3969/" source="CVE"/>
		<reference ref_id="CVE-2012-3970" ref_url="https://www.suse.com/security/cve/CVE-2012-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-3971" ref_url="https://www.suse.com/security/cve/CVE-2012-3971/" source="CVE"/>
		<reference ref_id="CVE-2012-3972" ref_url="https://www.suse.com/security/cve/CVE-2012-3972/" source="CVE"/>
		<reference ref_id="CVE-2012-3973" ref_url="https://www.suse.com/security/cve/CVE-2012-3973/" source="CVE"/>
		<reference ref_id="CVE-2012-3975" ref_url="https://www.suse.com/security/cve/CVE-2012-3975/" source="CVE"/>
		<reference ref_id="CVE-2012-3976" ref_url="https://www.suse.com/security/cve/CVE-2012-3976/" source="CVE"/>
		<reference ref_id="CVE-2012-3978" ref_url="https://www.suse.com/security/cve/CVE-2012-3978/" source="CVE"/>
		<reference ref_id="CVE-2012-3980" ref_url="https://www.suse.com/security/cve/CVE-2012-3980/" source="CVE"/>
		<reference ref_id="CVE-2012-3982" ref_url="https://www.suse.com/security/cve/CVE-2012-3982/" source="CVE"/>
		<reference ref_id="CVE-2012-3983" ref_url="https://www.suse.com/security/cve/CVE-2012-3983/" source="CVE"/>
		<reference ref_id="CVE-2012-3984" ref_url="https://www.suse.com/security/cve/CVE-2012-3984/" source="CVE"/>
		<reference ref_id="CVE-2012-3985" ref_url="https://www.suse.com/security/cve/CVE-2012-3985/" source="CVE"/>
		<reference ref_id="CVE-2012-3986" ref_url="https://www.suse.com/security/cve/CVE-2012-3986/" source="CVE"/>
		<reference ref_id="CVE-2012-3988" ref_url="https://www.suse.com/security/cve/CVE-2012-3988/" source="CVE"/>
		<reference ref_id="CVE-2012-3989" ref_url="https://www.suse.com/security/cve/CVE-2012-3989/" source="CVE"/>
		<reference ref_id="CVE-2012-3990" ref_url="https://www.suse.com/security/cve/CVE-2012-3990/" source="CVE"/>
		<reference ref_id="CVE-2012-3991" ref_url="https://www.suse.com/security/cve/CVE-2012-3991/" source="CVE"/>
		<reference ref_id="CVE-2012-3992" ref_url="https://www.suse.com/security/cve/CVE-2012-3992/" source="CVE"/>
		<reference ref_id="CVE-2012-3993" ref_url="https://www.suse.com/security/cve/CVE-2012-3993/" source="CVE"/>
		<reference ref_id="CVE-2012-3994" ref_url="https://www.suse.com/security/cve/CVE-2012-3994/" source="CVE"/>
		<reference ref_id="CVE-2012-3995" ref_url="https://www.suse.com/security/cve/CVE-2012-3995/" source="CVE"/>
		<reference ref_id="CVE-2012-4179" ref_url="https://www.suse.com/security/cve/CVE-2012-4179/" source="CVE"/>
		<reference ref_id="CVE-2012-4180" ref_url="https://www.suse.com/security/cve/CVE-2012-4180/" source="CVE"/>
		<reference ref_id="CVE-2012-4181" ref_url="https://www.suse.com/security/cve/CVE-2012-4181/" source="CVE"/>
		<reference ref_id="CVE-2012-4182" ref_url="https://www.suse.com/security/cve/CVE-2012-4182/" source="CVE"/>
		<reference ref_id="CVE-2012-4183" ref_url="https://www.suse.com/security/cve/CVE-2012-4183/" source="CVE"/>
		<reference ref_id="CVE-2012-4184" ref_url="https://www.suse.com/security/cve/CVE-2012-4184/" source="CVE"/>
		<reference ref_id="CVE-2012-4185" ref_url="https://www.suse.com/security/cve/CVE-2012-4185/" source="CVE"/>
		<reference ref_id="CVE-2012-4186" ref_url="https://www.suse.com/security/cve/CVE-2012-4186/" source="CVE"/>
		<reference ref_id="CVE-2012-4187" ref_url="https://www.suse.com/security/cve/CVE-2012-4187/" source="CVE"/>
		<reference ref_id="CVE-2012-4188" ref_url="https://www.suse.com/security/cve/CVE-2012-4188/" source="CVE"/>
		<reference ref_id="CVE-2012-4191" ref_url="https://www.suse.com/security/cve/CVE-2012-4191/" source="CVE"/>
		<reference ref_id="CVE-2012-4192" ref_url="https://www.suse.com/security/cve/CVE-2012-4192/" source="CVE"/>
		<reference ref_id="CVE-2012-4193" ref_url="https://www.suse.com/security/cve/CVE-2012-4193/" source="CVE"/>
		<reference ref_id="CVE-2012-4194" ref_url="https://www.suse.com/security/cve/CVE-2012-4194/" source="CVE"/>
		<reference ref_id="CVE-2012-4195" ref_url="https://www.suse.com/security/cve/CVE-2012-4195/" source="CVE"/>
		<reference ref_id="CVE-2012-4196" ref_url="https://www.suse.com/security/cve/CVE-2012-4196/" source="CVE"/>
		<reference ref_id="CVE-2012-4201" ref_url="https://www.suse.com/security/cve/CVE-2012-4201/" source="CVE"/>
		<reference ref_id="CVE-2012-4202" ref_url="https://www.suse.com/security/cve/CVE-2012-4202/" source="CVE"/>
		<reference ref_id="CVE-2012-4203" ref_url="https://www.suse.com/security/cve/CVE-2012-4203/" source="CVE"/>
		<reference ref_id="CVE-2012-4204" ref_url="https://www.suse.com/security/cve/CVE-2012-4204/" source="CVE"/>
		<reference ref_id="CVE-2012-4205" ref_url="https://www.suse.com/security/cve/CVE-2012-4205/" source="CVE"/>
		<reference ref_id="CVE-2012-4207" ref_url="https://www.suse.com/security/cve/CVE-2012-4207/" source="CVE"/>
		<reference ref_id="CVE-2012-4208" ref_url="https://www.suse.com/security/cve/CVE-2012-4208/" source="CVE"/>
		<reference ref_id="CVE-2012-4209" ref_url="https://www.suse.com/security/cve/CVE-2012-4209/" source="CVE"/>
		<reference ref_id="CVE-2012-4210" ref_url="https://www.suse.com/security/cve/CVE-2012-4210/" source="CVE"/>
		<reference ref_id="CVE-2012-4212" ref_url="https://www.suse.com/security/cve/CVE-2012-4212/" source="CVE"/>
		<reference ref_id="CVE-2012-4213" ref_url="https://www.suse.com/security/cve/CVE-2012-4213/" source="CVE"/>
		<reference ref_id="CVE-2012-4214" ref_url="https://www.suse.com/security/cve/CVE-2012-4214/" source="CVE"/>
		<reference ref_id="CVE-2012-4215" ref_url="https://www.suse.com/security/cve/CVE-2012-4215/" source="CVE"/>
		<reference ref_id="CVE-2012-4216" ref_url="https://www.suse.com/security/cve/CVE-2012-4216/" source="CVE"/>
		<reference ref_id="CVE-2012-4217" ref_url="https://www.suse.com/security/cve/CVE-2012-4217/" source="CVE"/>
		<reference ref_id="CVE-2012-4218" ref_url="https://www.suse.com/security/cve/CVE-2012-4218/" source="CVE"/>
		<reference ref_id="CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829/" source="CVE"/>
		<reference ref_id="CVE-2012-5830" ref_url="https://www.suse.com/security/cve/CVE-2012-5830/" source="CVE"/>
		<reference ref_id="CVE-2012-5833" ref_url="https://www.suse.com/security/cve/CVE-2012-5833/" source="CVE"/>
		<reference ref_id="CVE-2012-5835" ref_url="https://www.suse.com/security/cve/CVE-2012-5835/" source="CVE"/>
		<reference ref_id="CVE-2012-5836" ref_url="https://www.suse.com/security/cve/CVE-2012-5836/" source="CVE"/>
		<reference ref_id="CVE-2012-5837" ref_url="https://www.suse.com/security/cve/CVE-2012-5837/" source="CVE"/>
		<reference ref_id="CVE-2012-5838" ref_url="https://www.suse.com/security/cve/CVE-2012-5838/" source="CVE"/>
		<reference ref_id="CVE-2012-5839" ref_url="https://www.suse.com/security/cve/CVE-2012-5839/" source="CVE"/>
		<reference ref_id="CVE-2012-5840" ref_url="https://www.suse.com/security/cve/CVE-2012-5840/" source="CVE"/>
		<reference ref_id="CVE-2012-5841" ref_url="https://www.suse.com/security/cve/CVE-2012-5841/" source="CVE"/>
		<reference ref_id="CVE-2012-5842" ref_url="https://www.suse.com/security/cve/CVE-2012-5842/" source="CVE"/>
		<reference ref_id="CVE-2012-5843" ref_url="https://www.suse.com/security/cve/CVE-2012-5843/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<reference ref_id="CVE-2013-0744" ref_url="https://www.suse.com/security/cve/CVE-2013-0744/" source="CVE"/>
		<reference ref_id="CVE-2013-0745" ref_url="https://www.suse.com/security/cve/CVE-2013-0745/" source="CVE"/>
		<reference ref_id="CVE-2013-0746" ref_url="https://www.suse.com/security/cve/CVE-2013-0746/" source="CVE"/>
		<reference ref_id="CVE-2013-0747" ref_url="https://www.suse.com/security/cve/CVE-2013-0747/" source="CVE"/>
		<reference ref_id="CVE-2013-0748" ref_url="https://www.suse.com/security/cve/CVE-2013-0748/" source="CVE"/>
		<reference ref_id="CVE-2013-0749" ref_url="https://www.suse.com/security/cve/CVE-2013-0749/" source="CVE"/>
		<reference ref_id="CVE-2013-0750" ref_url="https://www.suse.com/security/cve/CVE-2013-0750/" source="CVE"/>
		<reference ref_id="CVE-2013-0751" ref_url="https://www.suse.com/security/cve/CVE-2013-0751/" source="CVE"/>
		<reference ref_id="CVE-2013-0752" ref_url="https://www.suse.com/security/cve/CVE-2013-0752/" source="CVE"/>
		<reference ref_id="CVE-2013-0753" ref_url="https://www.suse.com/security/cve/CVE-2013-0753/" source="CVE"/>
		<reference ref_id="CVE-2013-0754" ref_url="https://www.suse.com/security/cve/CVE-2013-0754/" source="CVE"/>
		<reference ref_id="CVE-2013-0755" ref_url="https://www.suse.com/security/cve/CVE-2013-0755/" source="CVE"/>
		<reference ref_id="CVE-2013-0756" ref_url="https://www.suse.com/security/cve/CVE-2013-0756/" source="CVE"/>
		<reference ref_id="CVE-2013-0757" ref_url="https://www.suse.com/security/cve/CVE-2013-0757/" source="CVE"/>
		<reference ref_id="CVE-2013-0758" ref_url="https://www.suse.com/security/cve/CVE-2013-0758/" source="CVE"/>
		<reference ref_id="CVE-2013-0760" ref_url="https://www.suse.com/security/cve/CVE-2013-0760/" source="CVE"/>
		<reference ref_id="CVE-2013-0761" ref_url="https://www.suse.com/security/cve/CVE-2013-0761/" source="CVE"/>
		<reference ref_id="CVE-2013-0762" ref_url="https://www.suse.com/security/cve/CVE-2013-0762/" source="CVE"/>
		<reference ref_id="CVE-2013-0763" ref_url="https://www.suse.com/security/cve/CVE-2013-0763/" source="CVE"/>
		<reference ref_id="CVE-2013-0764" ref_url="https://www.suse.com/security/cve/CVE-2013-0764/" source="CVE"/>
		<reference ref_id="CVE-2013-0765" ref_url="https://www.suse.com/security/cve/CVE-2013-0765/" source="CVE"/>
		<reference ref_id="CVE-2013-0766" ref_url="https://www.suse.com/security/cve/CVE-2013-0766/" source="CVE"/>
		<reference ref_id="CVE-2013-0767" ref_url="https://www.suse.com/security/cve/CVE-2013-0767/" source="CVE"/>
		<reference ref_id="CVE-2013-0768" ref_url="https://www.suse.com/security/cve/CVE-2013-0768/" source="CVE"/>
		<reference ref_id="CVE-2013-0769" ref_url="https://www.suse.com/security/cve/CVE-2013-0769/" source="CVE"/>
		<reference ref_id="CVE-2013-0770" ref_url="https://www.suse.com/security/cve/CVE-2013-0770/" source="CVE"/>
		<reference ref_id="CVE-2013-0771" ref_url="https://www.suse.com/security/cve/CVE-2013-0771/" source="CVE"/>
		<reference ref_id="CVE-2013-0772" ref_url="https://www.suse.com/security/cve/CVE-2013-0772/" source="CVE"/>
		<reference ref_id="CVE-2013-0773" ref_url="https://www.suse.com/security/cve/CVE-2013-0773/" source="CVE"/>
		<reference ref_id="CVE-2013-0774" ref_url="https://www.suse.com/security/cve/CVE-2013-0774/" source="CVE"/>
		<reference ref_id="CVE-2013-0775" ref_url="https://www.suse.com/security/cve/CVE-2013-0775/" source="CVE"/>
		<reference ref_id="CVE-2013-0776" ref_url="https://www.suse.com/security/cve/CVE-2013-0776/" source="CVE"/>
		<reference ref_id="CVE-2013-0777" ref_url="https://www.suse.com/security/cve/CVE-2013-0777/" source="CVE"/>
		<reference ref_id="CVE-2013-0778" ref_url="https://www.suse.com/security/cve/CVE-2013-0778/" source="CVE"/>
		<reference ref_id="CVE-2013-0779" ref_url="https://www.suse.com/security/cve/CVE-2013-0779/" source="CVE"/>
		<reference ref_id="CVE-2013-0780" ref_url="https://www.suse.com/security/cve/CVE-2013-0780/" source="CVE"/>
		<reference ref_id="CVE-2013-0781" ref_url="https://www.suse.com/security/cve/CVE-2013-0781/" source="CVE"/>
		<reference ref_id="CVE-2013-0782" ref_url="https://www.suse.com/security/cve/CVE-2013-0782/" source="CVE"/>
		<reference ref_id="CVE-2013-0783" ref_url="https://www.suse.com/security/cve/CVE-2013-0783/" source="CVE"/>
		<reference ref_id="CVE-2013-0787" ref_url="https://www.suse.com/security/cve/CVE-2013-0787/" source="CVE"/>
		<reference ref_id="CVE-2013-0788" ref_url="https://www.suse.com/security/cve/CVE-2013-0788/" source="CVE"/>
		<reference ref_id="CVE-2013-0789" ref_url="https://www.suse.com/security/cve/CVE-2013-0789/" source="CVE"/>
		<reference ref_id="CVE-2013-0792" ref_url="https://www.suse.com/security/cve/CVE-2013-0792/" source="CVE"/>
		<reference ref_id="CVE-2013-0793" ref_url="https://www.suse.com/security/cve/CVE-2013-0793/" source="CVE"/>
		<reference ref_id="CVE-2013-0794" ref_url="https://www.suse.com/security/cve/CVE-2013-0794/" source="CVE"/>
		<reference ref_id="CVE-2013-0795" ref_url="https://www.suse.com/security/cve/CVE-2013-0795/" source="CVE"/>
		<reference ref_id="CVE-2013-0796" ref_url="https://www.suse.com/security/cve/CVE-2013-0796/" source="CVE"/>
		<reference ref_id="CVE-2013-0800" ref_url="https://www.suse.com/security/cve/CVE-2013-0800/" source="CVE"/>
		<reference ref_id="CVE-2013-0801" ref_url="https://www.suse.com/security/cve/CVE-2013-0801/" source="CVE"/>
		<reference ref_id="CVE-2013-1669" ref_url="https://www.suse.com/security/cve/CVE-2013-1669/" source="CVE"/>
		<reference ref_id="CVE-2013-1670" ref_url="https://www.suse.com/security/cve/CVE-2013-1670/" source="CVE"/>
		<reference ref_id="CVE-2013-1671" ref_url="https://www.suse.com/security/cve/CVE-2013-1671/" source="CVE"/>
		<reference ref_id="CVE-2013-1674" ref_url="https://www.suse.com/security/cve/CVE-2013-1674/" source="CVE"/>
		<reference ref_id="CVE-2013-1675" ref_url="https://www.suse.com/security/cve/CVE-2013-1675/" source="CVE"/>
		<reference ref_id="CVE-2013-1676" ref_url="https://www.suse.com/security/cve/CVE-2013-1676/" source="CVE"/>
		<reference ref_id="CVE-2013-1677" ref_url="https://www.suse.com/security/cve/CVE-2013-1677/" source="CVE"/>
		<reference ref_id="CVE-2013-1678" ref_url="https://www.suse.com/security/cve/CVE-2013-1678/" source="CVE"/>
		<reference ref_id="CVE-2013-1679" ref_url="https://www.suse.com/security/cve/CVE-2013-1679/" source="CVE"/>
		<reference ref_id="CVE-2013-1680" ref_url="https://www.suse.com/security/cve/CVE-2013-1680/" source="CVE"/>
		<reference ref_id="CVE-2013-1681" ref_url="https://www.suse.com/security/cve/CVE-2013-1681/" source="CVE"/>
		<reference ref_id="CVE-2013-1682" ref_url="https://www.suse.com/security/cve/CVE-2013-1682/" source="CVE"/>
		<reference ref_id="CVE-2013-1683" ref_url="https://www.suse.com/security/cve/CVE-2013-1683/" source="CVE"/>
		<reference ref_id="CVE-2013-1684" ref_url="https://www.suse.com/security/cve/CVE-2013-1684/" source="CVE"/>
		<reference ref_id="CVE-2013-1685" ref_url="https://www.suse.com/security/cve/CVE-2013-1685/" source="CVE"/>
		<reference ref_id="CVE-2013-1686" ref_url="https://www.suse.com/security/cve/CVE-2013-1686/" source="CVE"/>
		<reference ref_id="CVE-2013-1687" ref_url="https://www.suse.com/security/cve/CVE-2013-1687/" source="CVE"/>
		<reference ref_id="CVE-2013-1688" ref_url="https://www.suse.com/security/cve/CVE-2013-1688/" source="CVE"/>
		<reference ref_id="CVE-2013-1690" ref_url="https://www.suse.com/security/cve/CVE-2013-1690/" source="CVE"/>
		<reference ref_id="CVE-2013-1692" ref_url="https://www.suse.com/security/cve/CVE-2013-1692/" source="CVE"/>
		<reference ref_id="CVE-2013-1693" ref_url="https://www.suse.com/security/cve/CVE-2013-1693/" source="CVE"/>
		<reference ref_id="CVE-2013-1694" ref_url="https://www.suse.com/security/cve/CVE-2013-1694/" source="CVE"/>
		<reference ref_id="CVE-2013-1695" ref_url="https://www.suse.com/security/cve/CVE-2013-1695/" source="CVE"/>
		<reference ref_id="CVE-2013-1696" ref_url="https://www.suse.com/security/cve/CVE-2013-1696/" source="CVE"/>
		<reference ref_id="CVE-2013-1697" ref_url="https://www.suse.com/security/cve/CVE-2013-1697/" source="CVE"/>
		<reference ref_id="CVE-2013-1698" ref_url="https://www.suse.com/security/cve/CVE-2013-1698/" source="CVE"/>
		<reference ref_id="CVE-2013-1699" ref_url="https://www.suse.com/security/cve/CVE-2013-1699/" source="CVE"/>
		<reference ref_id="CVE-2013-1701" ref_url="https://www.suse.com/security/cve/CVE-2013-1701/" source="CVE"/>
		<reference ref_id="CVE-2013-1702" ref_url="https://www.suse.com/security/cve/CVE-2013-1702/" source="CVE"/>
		<reference ref_id="CVE-2013-1704" ref_url="https://www.suse.com/security/cve/CVE-2013-1704/" source="CVE"/>
		<reference ref_id="CVE-2013-1705" ref_url="https://www.suse.com/security/cve/CVE-2013-1705/" source="CVE"/>
		<reference ref_id="CVE-2013-1708" ref_url="https://www.suse.com/security/cve/CVE-2013-1708/" source="CVE"/>
		<reference ref_id="CVE-2013-1709" ref_url="https://www.suse.com/security/cve/CVE-2013-1709/" source="CVE"/>
		<reference ref_id="CVE-2013-1710" ref_url="https://www.suse.com/security/cve/CVE-2013-1710/" source="CVE"/>
		<reference ref_id="CVE-2013-1711" ref_url="https://www.suse.com/security/cve/CVE-2013-1711/" source="CVE"/>
		<reference ref_id="CVE-2013-1713" ref_url="https://www.suse.com/security/cve/CVE-2013-1713/" source="CVE"/>
		<reference ref_id="CVE-2013-1714" ref_url="https://www.suse.com/security/cve/CVE-2013-1714/" source="CVE"/>
		<reference ref_id="CVE-2013-1717" ref_url="https://www.suse.com/security/cve/CVE-2013-1717/" source="CVE"/>
		<reference ref_id="CVE-2013-1718" ref_url="https://www.suse.com/security/cve/CVE-2013-1718/" source="CVE"/>
		<reference ref_id="CVE-2013-1719" ref_url="https://www.suse.com/security/cve/CVE-2013-1719/" source="CVE"/>
		<reference ref_id="CVE-2013-1720" ref_url="https://www.suse.com/security/cve/CVE-2013-1720/" source="CVE"/>
		<reference ref_id="CVE-2013-1721" ref_url="https://www.suse.com/security/cve/CVE-2013-1721/" source="CVE"/>
		<reference ref_id="CVE-2013-1722" ref_url="https://www.suse.com/security/cve/CVE-2013-1722/" source="CVE"/>
		<reference ref_id="CVE-2013-1723" ref_url="https://www.suse.com/security/cve/CVE-2013-1723/" source="CVE"/>
		<reference ref_id="CVE-2013-1724" ref_url="https://www.suse.com/security/cve/CVE-2013-1724/" source="CVE"/>
		<reference ref_id="CVE-2013-1725" ref_url="https://www.suse.com/security/cve/CVE-2013-1725/" source="CVE"/>
		<reference ref_id="CVE-2013-1728" ref_url="https://www.suse.com/security/cve/CVE-2013-1728/" source="CVE"/>
		<reference ref_id="CVE-2013-1730" ref_url="https://www.suse.com/security/cve/CVE-2013-1730/" source="CVE"/>
		<reference ref_id="CVE-2013-1732" ref_url="https://www.suse.com/security/cve/CVE-2013-1732/" source="CVE"/>
		<reference ref_id="CVE-2013-1735" ref_url="https://www.suse.com/security/cve/CVE-2013-1735/" source="CVE"/>
		<reference ref_id="CVE-2013-1736" ref_url="https://www.suse.com/security/cve/CVE-2013-1736/" source="CVE"/>
		<reference ref_id="CVE-2013-1737" ref_url="https://www.suse.com/security/cve/CVE-2013-1737/" source="CVE"/>
		<reference ref_id="CVE-2013-1738" ref_url="https://www.suse.com/security/cve/CVE-2013-1738/" source="CVE"/>
		<reference ref_id="CVE-2013-5590" ref_url="https://www.suse.com/security/cve/CVE-2013-5590/" source="CVE"/>
		<reference ref_id="CVE-2013-5591" ref_url="https://www.suse.com/security/cve/CVE-2013-5591/" source="CVE"/>
		<reference ref_id="CVE-2013-5592" ref_url="https://www.suse.com/security/cve/CVE-2013-5592/" source="CVE"/>
		<reference ref_id="CVE-2013-5593" ref_url="https://www.suse.com/security/cve/CVE-2013-5593/" source="CVE"/>
		<reference ref_id="CVE-2013-5595" ref_url="https://www.suse.com/security/cve/CVE-2013-5595/" source="CVE"/>
		<reference ref_id="CVE-2013-5596" ref_url="https://www.suse.com/security/cve/CVE-2013-5596/" source="CVE"/>
		<reference ref_id="CVE-2013-5597" ref_url="https://www.suse.com/security/cve/CVE-2013-5597/" source="CVE"/>
		<reference ref_id="CVE-2013-5598" ref_url="https://www.suse.com/security/cve/CVE-2013-5598/" source="CVE"/>
		<reference ref_id="CVE-2013-5599" ref_url="https://www.suse.com/security/cve/CVE-2013-5599/" source="CVE"/>
		<reference ref_id="CVE-2013-5600" ref_url="https://www.suse.com/security/cve/CVE-2013-5600/" source="CVE"/>
		<reference ref_id="CVE-2013-5601" ref_url="https://www.suse.com/security/cve/CVE-2013-5601/" source="CVE"/>
		<reference ref_id="CVE-2013-5602" ref_url="https://www.suse.com/security/cve/CVE-2013-5602/" source="CVE"/>
		<reference ref_id="CVE-2013-5603" ref_url="https://www.suse.com/security/cve/CVE-2013-5603/" source="CVE"/>
		<reference ref_id="CVE-2013-5604" ref_url="https://www.suse.com/security/cve/CVE-2013-5604/" source="CVE"/>
		<reference ref_id="CVE-2013-5609" ref_url="https://www.suse.com/security/cve/CVE-2013-5609/" source="CVE"/>
		<reference ref_id="CVE-2013-5610" ref_url="https://www.suse.com/security/cve/CVE-2013-5610/" source="CVE"/>
		<reference ref_id="CVE-2013-5611" ref_url="https://www.suse.com/security/cve/CVE-2013-5611/" source="CVE"/>
		<reference ref_id="CVE-2013-5612" ref_url="https://www.suse.com/security/cve/CVE-2013-5612/" source="CVE"/>
		<reference ref_id="CVE-2013-5613" ref_url="https://www.suse.com/security/cve/CVE-2013-5613/" source="CVE"/>
		<reference ref_id="CVE-2013-5614" ref_url="https://www.suse.com/security/cve/CVE-2013-5614/" source="CVE"/>
		<reference ref_id="CVE-2013-5615" ref_url="https://www.suse.com/security/cve/CVE-2013-5615/" source="CVE"/>
		<reference ref_id="CVE-2013-5616" ref_url="https://www.suse.com/security/cve/CVE-2013-5616/" source="CVE"/>
		<reference ref_id="CVE-2013-5618" ref_url="https://www.suse.com/security/cve/CVE-2013-5618/" source="CVE"/>
		<reference ref_id="CVE-2013-5619" ref_url="https://www.suse.com/security/cve/CVE-2013-5619/" source="CVE"/>
		<reference ref_id="CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629/" source="CVE"/>
		<reference ref_id="CVE-2013-6630" ref_url="https://www.suse.com/security/cve/CVE-2013-6630/" source="CVE"/>
		<reference ref_id="CVE-2013-6671" ref_url="https://www.suse.com/security/cve/CVE-2013-6671/" source="CVE"/>
		<reference ref_id="CVE-2013-6672" ref_url="https://www.suse.com/security/cve/CVE-2013-6672/" source="CVE"/>
		<reference ref_id="CVE-2013-6673" ref_url="https://www.suse.com/security/cve/CVE-2013-6673/" source="CVE"/>
		<reference ref_id="CVE-2014-1477" ref_url="https://www.suse.com/security/cve/CVE-2014-1477/" source="CVE"/>
		<reference ref_id="CVE-2014-1478" ref_url="https://www.suse.com/security/cve/CVE-2014-1478/" source="CVE"/>
		<reference ref_id="CVE-2014-1479" ref_url="https://www.suse.com/security/cve/CVE-2014-1479/" source="CVE"/>
		<reference ref_id="CVE-2014-1480" ref_url="https://www.suse.com/security/cve/CVE-2014-1480/" source="CVE"/>
		<reference ref_id="CVE-2014-1481" ref_url="https://www.suse.com/security/cve/CVE-2014-1481/" source="CVE"/>
		<reference ref_id="CVE-2014-1482" ref_url="https://www.suse.com/security/cve/CVE-2014-1482/" source="CVE"/>
		<reference ref_id="CVE-2014-1483" ref_url="https://www.suse.com/security/cve/CVE-2014-1483/" source="CVE"/>
		<reference ref_id="CVE-2014-1484" ref_url="https://www.suse.com/security/cve/CVE-2014-1484/" source="CVE"/>
		<reference ref_id="CVE-2014-1485" ref_url="https://www.suse.com/security/cve/CVE-2014-1485/" source="CVE"/>
		<reference ref_id="CVE-2014-1486" ref_url="https://www.suse.com/security/cve/CVE-2014-1486/" source="CVE"/>
		<reference ref_id="CVE-2014-1487" ref_url="https://www.suse.com/security/cve/CVE-2014-1487/" source="CVE"/>
		<reference ref_id="CVE-2014-1488" ref_url="https://www.suse.com/security/cve/CVE-2014-1488/" source="CVE"/>
		<reference ref_id="CVE-2014-1489" ref_url="https://www.suse.com/security/cve/CVE-2014-1489/" source="CVE"/>
		<reference ref_id="CVE-2014-1490" ref_url="https://www.suse.com/security/cve/CVE-2014-1490/" source="CVE"/>
		<reference ref_id="CVE-2014-1491" ref_url="https://www.suse.com/security/cve/CVE-2014-1491/" source="CVE"/>
		<reference ref_id="CVE-2014-1544" ref_url="https://www.suse.com/security/cve/CVE-2014-1544/" source="CVE"/>
		<reference ref_id="CVE-2014-1547" ref_url="https://www.suse.com/security/cve/CVE-2014-1547/" source="CVE"/>
		<reference ref_id="CVE-2014-1548" ref_url="https://www.suse.com/security/cve/CVE-2014-1548/" source="CVE"/>
		<reference ref_id="CVE-2014-1553" ref_url="https://www.suse.com/security/cve/CVE-2014-1553/" source="CVE"/>
		<reference ref_id="CVE-2014-1554" ref_url="https://www.suse.com/security/cve/CVE-2014-1554/" source="CVE"/>
		<reference ref_id="CVE-2014-1555" ref_url="https://www.suse.com/security/cve/CVE-2014-1555/" source="CVE"/>
		<reference ref_id="CVE-2014-1556" ref_url="https://www.suse.com/security/cve/CVE-2014-1556/" source="CVE"/>
		<reference ref_id="CVE-2014-1557" ref_url="https://www.suse.com/security/cve/CVE-2014-1557/" source="CVE"/>
		<reference ref_id="CVE-2014-1562" ref_url="https://www.suse.com/security/cve/CVE-2014-1562/" source="CVE"/>
		<reference ref_id="CVE-2014-1563" ref_url="https://www.suse.com/security/cve/CVE-2014-1563/" source="CVE"/>
		<reference ref_id="CVE-2014-1564" ref_url="https://www.suse.com/security/cve/CVE-2014-1564/" source="CVE"/>
		<reference ref_id="CVE-2014-1565" ref_url="https://www.suse.com/security/cve/CVE-2014-1565/" source="CVE"/>
		<reference ref_id="CVE-2014-1567" ref_url="https://www.suse.com/security/cve/CVE-2014-1567/" source="CVE"/>
		<reference ref_id="CVE-2014-1574" ref_url="https://www.suse.com/security/cve/CVE-2014-1574/" source="CVE"/>
		<reference ref_id="CVE-2014-1575" ref_url="https://www.suse.com/security/cve/CVE-2014-1575/" source="CVE"/>
		<reference ref_id="CVE-2014-1576" ref_url="https://www.suse.com/security/cve/CVE-2014-1576/" source="CVE"/>
		<reference ref_id="CVE-2014-1577" ref_url="https://www.suse.com/security/cve/CVE-2014-1577/" source="CVE"/>
		<reference ref_id="CVE-2014-1578" ref_url="https://www.suse.com/security/cve/CVE-2014-1578/" source="CVE"/>
		<reference ref_id="CVE-2014-1581" ref_url="https://www.suse.com/security/cve/CVE-2014-1581/" source="CVE"/>
		<reference ref_id="CVE-2014-1583" ref_url="https://www.suse.com/security/cve/CVE-2014-1583/" source="CVE"/>
		<reference ref_id="CVE-2014-1585" ref_url="https://www.suse.com/security/cve/CVE-2014-1585/" source="CVE"/>
		<reference ref_id="CVE-2014-1586" ref_url="https://www.suse.com/security/cve/CVE-2014-1586/" source="CVE"/>
		<reference ref_id="CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587/" source="CVE"/>
		<reference ref_id="CVE-2014-1588" ref_url="https://www.suse.com/security/cve/CVE-2014-1588/" source="CVE"/>
		<reference ref_id="CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590/" source="CVE"/>
		<reference ref_id="CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592/" source="CVE"/>
		<reference ref_id="CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593/" source="CVE"/>
		<reference ref_id="CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594/" source="CVE"/>
		<reference ref_id="CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634/" source="CVE"/>
		<reference ref_id="CVE-2014-8635" ref_url="https://www.suse.com/security/cve/CVE-2014-8635/" source="CVE"/>
		<reference ref_id="CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638/" source="CVE"/>
		<reference ref_id="CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639/" source="CVE"/>
		<reference ref_id="CVE-2014-8641" ref_url="https://www.suse.com/security/cve/CVE-2014-8641/" source="CVE"/>
		<reference ref_id="CVE-2015-0797" ref_url="https://www.suse.com/security/cve/CVE-2015-0797/" source="CVE"/>
		<reference ref_id="CVE-2015-0801" ref_url="https://www.suse.com/security/cve/CVE-2015-0801/" source="CVE"/>
		<reference ref_id="CVE-2015-0807" ref_url="https://www.suse.com/security/cve/CVE-2015-0807/" source="CVE"/>
		<reference ref_id="CVE-2015-0813" ref_url="https://www.suse.com/security/cve/CVE-2015-0813/" source="CVE"/>
		<reference ref_id="CVE-2015-0814" ref_url="https://www.suse.com/security/cve/CVE-2015-0814/" source="CVE"/>
		<reference ref_id="CVE-2015-0815" ref_url="https://www.suse.com/security/cve/CVE-2015-0815/" source="CVE"/>
		<reference ref_id="CVE-2015-0816" ref_url="https://www.suse.com/security/cve/CVE-2015-0816/" source="CVE"/>
		<reference ref_id="CVE-2015-0817" ref_url="https://www.suse.com/security/cve/CVE-2015-0817/" source="CVE"/>
		<reference ref_id="CVE-2015-0818" ref_url="https://www.suse.com/security/cve/CVE-2015-0818/" source="CVE"/>
		<reference ref_id="CVE-2015-0822" ref_url="https://www.suse.com/security/cve/CVE-2015-0822/" source="CVE"/>
		<reference ref_id="CVE-2015-0827" ref_url="https://www.suse.com/security/cve/CVE-2015-0827/" source="CVE"/>
		<reference ref_id="CVE-2015-0831" ref_url="https://www.suse.com/security/cve/CVE-2015-0831/" source="CVE"/>
		<reference ref_id="CVE-2015-0835" ref_url="https://www.suse.com/security/cve/CVE-2015-0835/" source="CVE"/>
		<reference ref_id="CVE-2015-0836" ref_url="https://www.suse.com/security/cve/CVE-2015-0836/" source="CVE"/>
		<reference ref_id="CVE-2015-2708" ref_url="https://www.suse.com/security/cve/CVE-2015-2708/" source="CVE"/>
		<reference ref_id="CVE-2015-2709" ref_url="https://www.suse.com/security/cve/CVE-2015-2709/" source="CVE"/>
		<reference ref_id="CVE-2015-2710" ref_url="https://www.suse.com/security/cve/CVE-2015-2710/" source="CVE"/>
		<reference ref_id="CVE-2015-2713" ref_url="https://www.suse.com/security/cve/CVE-2015-2713/" source="CVE"/>
		<reference ref_id="CVE-2015-2716" ref_url="https://www.suse.com/security/cve/CVE-2015-2716/" source="CVE"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722/" source="CVE"/>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725/" source="CVE"/>
		<reference ref_id="CVE-2015-2726" ref_url="https://www.suse.com/security/cve/CVE-2015-2726/" source="CVE"/>
		<reference ref_id="CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728/" source="CVE"/>
		<reference ref_id="CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730/" source="CVE"/>
		<reference ref_id="CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735/" source="CVE"/>
		<reference ref_id="CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736/" source="CVE"/>
		<reference ref_id="CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739/" source="CVE"/>
		<reference ref_id="CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740/" source="CVE"/>
		<reference ref_id="CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473/" source="CVE"/>
		<reference ref_id="CVE-2015-4474" ref_url="https://www.suse.com/security/cve/CVE-2015-4474/" source="CVE"/>
		<reference ref_id="CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475/" source="CVE"/>
		<reference ref_id="CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478/" source="CVE"/>
		<reference ref_id="CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479/" source="CVE"/>
		<reference ref_id="CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484/" source="CVE"/>
		<reference ref_id="CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485/" source="CVE"/>
		<reference ref_id="CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486/" source="CVE"/>
		<reference ref_id="CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487/" source="CVE"/>
		<reference ref_id="CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488/" source="CVE"/>
		<reference ref_id="CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492/" source="CVE"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="CVE-2015-4497" ref_url="https://www.suse.com/security/cve/CVE-2015-4497/" source="CVE"/>
		<reference ref_id="CVE-2015-4498" ref_url="https://www.suse.com/security/cve/CVE-2015-4498/" source="CVE"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<reference ref_id="CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188/" source="CVE"/>
		<reference ref_id="CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193/" source="CVE"/>
		<reference ref_id="CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194/" source="CVE"/>
		<reference ref_id="CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196/" source="CVE"/>
		<reference ref_id="CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197/" source="CVE"/>
		<reference ref_id="CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198/" source="CVE"/>
		<reference ref_id="CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199/" source="CVE"/>
		<reference ref_id="CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200/" source="CVE"/>
		<reference ref_id="CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201/" source="CVE"/>
		<reference ref_id="CVE-2015-7202" ref_url="https://www.suse.com/security/cve/CVE-2015-7202/" source="CVE"/>
		<reference ref_id="CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205/" source="CVE"/>
		<reference ref_id="CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210/" source="CVE"/>
		<reference ref_id="CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212/" source="CVE"/>
		<reference ref_id="CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213/" source="CVE"/>
		<reference ref_id="CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214/" source="CVE"/>
		<reference ref_id="CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222/" source="CVE"/>
		<reference ref_id="CVE-2016-10196" ref_url="https://www.suse.com/security/cve/CVE-2016-10196/" source="CVE"/>
		<reference ref_id="CVE-2016-1523" ref_url="https://www.suse.com/security/cve/CVE-2016-1523/" source="CVE"/>
		<reference ref_id="CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930/" source="CVE"/>
		<reference ref_id="CVE-2016-1931" ref_url="https://www.suse.com/security/cve/CVE-2016-1931/" source="CVE"/>
		<reference ref_id="CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935/" source="CVE"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1952" ref_url="https://www.suse.com/security/cve/CVE-2016-1952/" source="CVE"/>
		<reference ref_id="CVE-2016-1953" ref_url="https://www.suse.com/security/cve/CVE-2016-1953/" source="CVE"/>
		<reference ref_id="CVE-2016-1954" ref_url="https://www.suse.com/security/cve/CVE-2016-1954/" source="CVE"/>
		<reference ref_id="CVE-2016-1957" ref_url="https://www.suse.com/security/cve/CVE-2016-1957/" source="CVE"/>
		<reference ref_id="CVE-2016-1958" ref_url="https://www.suse.com/security/cve/CVE-2016-1958/" source="CVE"/>
		<reference ref_id="CVE-2016-1960" ref_url="https://www.suse.com/security/cve/CVE-2016-1960/" source="CVE"/>
		<reference ref_id="CVE-2016-1961" ref_url="https://www.suse.com/security/cve/CVE-2016-1961/" source="CVE"/>
		<reference ref_id="CVE-2016-1962" ref_url="https://www.suse.com/security/cve/CVE-2016-1962/" source="CVE"/>
		<reference ref_id="CVE-2016-1964" ref_url="https://www.suse.com/security/cve/CVE-2016-1964/" source="CVE"/>
		<reference ref_id="CVE-2016-1965" ref_url="https://www.suse.com/security/cve/CVE-2016-1965/" source="CVE"/>
		<reference ref_id="CVE-2016-1966" ref_url="https://www.suse.com/security/cve/CVE-2016-1966/" source="CVE"/>
		<reference ref_id="CVE-2016-1974" ref_url="https://www.suse.com/security/cve/CVE-2016-1974/" source="CVE"/>
		<reference ref_id="CVE-2016-1977" ref_url="https://www.suse.com/security/cve/CVE-2016-1977/" source="CVE"/>
		<reference ref_id="CVE-2016-2790" ref_url="https://www.suse.com/security/cve/CVE-2016-2790/" source="CVE"/>
		<reference ref_id="CVE-2016-2791" ref_url="https://www.suse.com/security/cve/CVE-2016-2791/" source="CVE"/>
		<reference ref_id="CVE-2016-2792" ref_url="https://www.suse.com/security/cve/CVE-2016-2792/" source="CVE"/>
		<reference ref_id="CVE-2016-2793" ref_url="https://www.suse.com/security/cve/CVE-2016-2793/" source="CVE"/>
		<reference ref_id="CVE-2016-2794" ref_url="https://www.suse.com/security/cve/CVE-2016-2794/" source="CVE"/>
		<reference ref_id="CVE-2016-2795" ref_url="https://www.suse.com/security/cve/CVE-2016-2795/" source="CVE"/>
		<reference ref_id="CVE-2016-2796" ref_url="https://www.suse.com/security/cve/CVE-2016-2796/" source="CVE"/>
		<reference ref_id="CVE-2016-2797" ref_url="https://www.suse.com/security/cve/CVE-2016-2797/" source="CVE"/>
		<reference ref_id="CVE-2016-2798" ref_url="https://www.suse.com/security/cve/CVE-2016-2798/" source="CVE"/>
		<reference ref_id="CVE-2016-2799" ref_url="https://www.suse.com/security/cve/CVE-2016-2799/" source="CVE"/>
		<reference ref_id="CVE-2016-2800" ref_url="https://www.suse.com/security/cve/CVE-2016-2800/" source="CVE"/>
		<reference ref_id="CVE-2016-2801" ref_url="https://www.suse.com/security/cve/CVE-2016-2801/" source="CVE"/>
		<reference ref_id="CVE-2016-2802" ref_url="https://www.suse.com/security/cve/CVE-2016-2802/" source="CVE"/>
		<reference ref_id="CVE-2016-2805" ref_url="https://www.suse.com/security/cve/CVE-2016-2805/" source="CVE"/>
		<reference ref_id="CVE-2016-2807" ref_url="https://www.suse.com/security/cve/CVE-2016-2807/" source="CVE"/>
		<reference ref_id="CVE-2016-2808" ref_url="https://www.suse.com/security/cve/CVE-2016-2808/" source="CVE"/>
		<reference ref_id="CVE-2016-2814" ref_url="https://www.suse.com/security/cve/CVE-2016-2814/" source="CVE"/>
		<reference ref_id="CVE-2016-2815" ref_url="https://www.suse.com/security/cve/CVE-2016-2815/" source="CVE"/>
		<reference ref_id="CVE-2016-2818" ref_url="https://www.suse.com/security/cve/CVE-2016-2818/" source="CVE"/>
		<reference ref_id="CVE-2016-2819" ref_url="https://www.suse.com/security/cve/CVE-2016-2819/" source="CVE"/>
		<reference ref_id="CVE-2016-2821" ref_url="https://www.suse.com/security/cve/CVE-2016-2821/" source="CVE"/>
		<reference ref_id="CVE-2016-2822" ref_url="https://www.suse.com/security/cve/CVE-2016-2822/" source="CVE"/>
		<reference ref_id="CVE-2016-2824" ref_url="https://www.suse.com/security/cve/CVE-2016-2824/" source="CVE"/>
		<reference ref_id="CVE-2016-2828" ref_url="https://www.suse.com/security/cve/CVE-2016-2828/" source="CVE"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-2831" ref_url="https://www.suse.com/security/cve/CVE-2016-2831/" source="CVE"/>
		<reference ref_id="CVE-2016-2835" ref_url="https://www.suse.com/security/cve/CVE-2016-2835/" source="CVE"/>
		<reference ref_id="CVE-2016-2836" ref_url="https://www.suse.com/security/cve/CVE-2016-2836/" source="CVE"/>
		<reference ref_id="CVE-2016-2837" ref_url="https://www.suse.com/security/cve/CVE-2016-2837/" source="CVE"/>
		<reference ref_id="CVE-2016-2838" ref_url="https://www.suse.com/security/cve/CVE-2016-2838/" source="CVE"/>
		<reference ref_id="CVE-2016-2839" ref_url="https://www.suse.com/security/cve/CVE-2016-2839/" source="CVE"/>
		<reference ref_id="CVE-2016-5250" ref_url="https://www.suse.com/security/cve/CVE-2016-5250/" source="CVE"/>
		<reference ref_id="CVE-2016-5252" ref_url="https://www.suse.com/security/cve/CVE-2016-5252/" source="CVE"/>
		<reference ref_id="CVE-2016-5254" ref_url="https://www.suse.com/security/cve/CVE-2016-5254/" source="CVE"/>
		<reference ref_id="CVE-2016-5257" ref_url="https://www.suse.com/security/cve/CVE-2016-5257/" source="CVE"/>
		<reference ref_id="CVE-2016-5258" ref_url="https://www.suse.com/security/cve/CVE-2016-5258/" source="CVE"/>
		<reference ref_id="CVE-2016-5259" ref_url="https://www.suse.com/security/cve/CVE-2016-5259/" source="CVE"/>
		<reference ref_id="CVE-2016-5261" ref_url="https://www.suse.com/security/cve/CVE-2016-5261/" source="CVE"/>
		<reference ref_id="CVE-2016-5262" ref_url="https://www.suse.com/security/cve/CVE-2016-5262/" source="CVE"/>
		<reference ref_id="CVE-2016-5263" ref_url="https://www.suse.com/security/cve/CVE-2016-5263/" source="CVE"/>
		<reference ref_id="CVE-2016-5264" ref_url="https://www.suse.com/security/cve/CVE-2016-5264/" source="CVE"/>
		<reference ref_id="CVE-2016-5265" ref_url="https://www.suse.com/security/cve/CVE-2016-5265/" source="CVE"/>
		<reference ref_id="CVE-2016-5270" ref_url="https://www.suse.com/security/cve/CVE-2016-5270/" source="CVE"/>
		<reference ref_id="CVE-2016-5272" ref_url="https://www.suse.com/security/cve/CVE-2016-5272/" source="CVE"/>
		<reference ref_id="CVE-2016-5274" ref_url="https://www.suse.com/security/cve/CVE-2016-5274/" source="CVE"/>
		<reference ref_id="CVE-2016-5276" ref_url="https://www.suse.com/security/cve/CVE-2016-5276/" source="CVE"/>
		<reference ref_id="CVE-2016-5277" ref_url="https://www.suse.com/security/cve/CVE-2016-5277/" source="CVE"/>
		<reference ref_id="CVE-2016-5278" ref_url="https://www.suse.com/security/cve/CVE-2016-5278/" source="CVE"/>
		<reference ref_id="CVE-2016-5280" ref_url="https://www.suse.com/security/cve/CVE-2016-5280/" source="CVE"/>
		<reference ref_id="CVE-2016-5281" ref_url="https://www.suse.com/security/cve/CVE-2016-5281/" source="CVE"/>
		<reference ref_id="CVE-2016-5284" ref_url="https://www.suse.com/security/cve/CVE-2016-5284/" source="CVE"/>
		<reference ref_id="CVE-2016-5290" ref_url="https://www.suse.com/security/cve/CVE-2016-5290/" source="CVE"/>
		<reference ref_id="CVE-2016-5291" ref_url="https://www.suse.com/security/cve/CVE-2016-5291/" source="CVE"/>
		<reference ref_id="CVE-2016-5296" ref_url="https://www.suse.com/security/cve/CVE-2016-5296/" source="CVE"/>
		<reference ref_id="CVE-2016-5297" ref_url="https://www.suse.com/security/cve/CVE-2016-5297/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="CVE-2016-9064" ref_url="https://www.suse.com/security/cve/CVE-2016-9064/" source="CVE"/>
		<reference ref_id="CVE-2016-9066" ref_url="https://www.suse.com/security/cve/CVE-2016-9066/" source="CVE"/>
		<reference ref_id="CVE-2016-9079" ref_url="https://www.suse.com/security/cve/CVE-2016-9079/" source="CVE"/>
		<reference ref_id="CVE-2016-9893" ref_url="https://www.suse.com/security/cve/CVE-2016-9893/" source="CVE"/>
		<reference ref_id="CVE-2016-9895" ref_url="https://www.suse.com/security/cve/CVE-2016-9895/" source="CVE"/>
		<reference ref_id="CVE-2016-9897" ref_url="https://www.suse.com/security/cve/CVE-2016-9897/" source="CVE"/>
		<reference ref_id="CVE-2016-9898" ref_url="https://www.suse.com/security/cve/CVE-2016-9898/" source="CVE"/>
		<reference ref_id="CVE-2016-9899" ref_url="https://www.suse.com/security/cve/CVE-2016-9899/" source="CVE"/>
		<reference ref_id="CVE-2016-9900" ref_url="https://www.suse.com/security/cve/CVE-2016-9900/" source="CVE"/>
		<reference ref_id="CVE-2016-9901" ref_url="https://www.suse.com/security/cve/CVE-2016-9901/" source="CVE"/>
		<reference ref_id="CVE-2016-9902" ref_url="https://www.suse.com/security/cve/CVE-2016-9902/" source="CVE"/>
		<reference ref_id="CVE-2016-9904" ref_url="https://www.suse.com/security/cve/CVE-2016-9904/" source="CVE"/>
		<reference ref_id="CVE-2016-9905" ref_url="https://www.suse.com/security/cve/CVE-2016-9905/" source="CVE"/>
		<reference ref_id="CVE-2017-5373" ref_url="https://www.suse.com/security/cve/CVE-2017-5373/" source="CVE"/>
		<reference ref_id="CVE-2017-5375" ref_url="https://www.suse.com/security/cve/CVE-2017-5375/" source="CVE"/>
		<reference ref_id="CVE-2017-5376" ref_url="https://www.suse.com/security/cve/CVE-2017-5376/" source="CVE"/>
		<reference ref_id="CVE-2017-5378" ref_url="https://www.suse.com/security/cve/CVE-2017-5378/" source="CVE"/>
		<reference ref_id="CVE-2017-5380" ref_url="https://www.suse.com/security/cve/CVE-2017-5380/" source="CVE"/>
		<reference ref_id="CVE-2017-5383" ref_url="https://www.suse.com/security/cve/CVE-2017-5383/" source="CVE"/>
		<reference ref_id="CVE-2017-5386" ref_url="https://www.suse.com/security/cve/CVE-2017-5386/" source="CVE"/>
		<reference ref_id="CVE-2017-5390" ref_url="https://www.suse.com/security/cve/CVE-2017-5390/" source="CVE"/>
		<reference ref_id="CVE-2017-5396" ref_url="https://www.suse.com/security/cve/CVE-2017-5396/" source="CVE"/>
		<reference ref_id="CVE-2017-5398" ref_url="https://www.suse.com/security/cve/CVE-2017-5398/" source="CVE"/>
		<reference ref_id="CVE-2017-5400" ref_url="https://www.suse.com/security/cve/CVE-2017-5400/" source="CVE"/>
		<reference ref_id="CVE-2017-5401" ref_url="https://www.suse.com/security/cve/CVE-2017-5401/" source="CVE"/>
		<reference ref_id="CVE-2017-5402" ref_url="https://www.suse.com/security/cve/CVE-2017-5402/" source="CVE"/>
		<reference ref_id="CVE-2017-5404" ref_url="https://www.suse.com/security/cve/CVE-2017-5404/" source="CVE"/>
		<reference ref_id="CVE-2017-5405" ref_url="https://www.suse.com/security/cve/CVE-2017-5405/" source="CVE"/>
		<reference ref_id="CVE-2017-5407" ref_url="https://www.suse.com/security/cve/CVE-2017-5407/" source="CVE"/>
		<reference ref_id="CVE-2017-5408" ref_url="https://www.suse.com/security/cve/CVE-2017-5408/" source="CVE"/>
		<reference ref_id="CVE-2017-5409" ref_url="https://www.suse.com/security/cve/CVE-2017-5409/" source="CVE"/>
		<reference ref_id="CVE-2017-5410" ref_url="https://www.suse.com/security/cve/CVE-2017-5410/" source="CVE"/>
		<reference ref_id="CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429/" source="CVE"/>
		<reference ref_id="CVE-2017-5430" ref_url="https://www.suse.com/security/cve/CVE-2017-5430/" source="CVE"/>
		<reference ref_id="CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432/" source="CVE"/>
		<reference ref_id="CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433/" source="CVE"/>
		<reference ref_id="CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434/" source="CVE"/>
		<reference ref_id="CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2017-5437" ref_url="https://www.suse.com/security/cve/CVE-2017-5437/" source="CVE"/>
		<reference ref_id="CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438/" source="CVE"/>
		<reference ref_id="CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439/" source="CVE"/>
		<reference ref_id="CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440/" source="CVE"/>
		<reference ref_id="CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441/" source="CVE"/>
		<reference ref_id="CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442/" source="CVE"/>
		<reference ref_id="CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443/" source="CVE"/>
		<reference ref_id="CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444/" source="CVE"/>
		<reference ref_id="CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445/" source="CVE"/>
		<reference ref_id="CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446/" source="CVE"/>
		<reference ref_id="CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447/" source="CVE"/>
		<reference ref_id="CVE-2017-5448" ref_url="https://www.suse.com/security/cve/CVE-2017-5448/" source="CVE"/>
		<reference ref_id="CVE-2017-5449" ref_url="https://www.suse.com/security/cve/CVE-2017-5449/" source="CVE"/>
		<reference ref_id="CVE-2017-5451" ref_url="https://www.suse.com/security/cve/CVE-2017-5451/" source="CVE"/>
		<reference ref_id="CVE-2017-5454" ref_url="https://www.suse.com/security/cve/CVE-2017-5454/" source="CVE"/>
		<reference ref_id="CVE-2017-5455" ref_url="https://www.suse.com/security/cve/CVE-2017-5455/" source="CVE"/>
		<reference ref_id="CVE-2017-5456" ref_url="https://www.suse.com/security/cve/CVE-2017-5456/" source="CVE"/>
		<reference ref_id="CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459/" source="CVE"/>
		<reference ref_id="CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460/" source="CVE"/>
		<reference ref_id="CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461/" source="CVE"/>
		<reference ref_id="CVE-2017-5462" ref_url="https://www.suse.com/security/cve/CVE-2017-5462/" source="CVE"/>
		<reference ref_id="CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464/" source="CVE"/>
		<reference ref_id="CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465/" source="CVE"/>
		<reference ref_id="CVE-2017-5466" ref_url="https://www.suse.com/security/cve/CVE-2017-5466/" source="CVE"/>
		<reference ref_id="CVE-2017-5467" ref_url="https://www.suse.com/security/cve/CVE-2017-5467/" source="CVE"/>
		<reference ref_id="CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469/" source="CVE"/>
		<reference ref_id="CVE-2017-5470" ref_url="https://www.suse.com/security/cve/CVE-2017-5470/" source="CVE"/>
		<reference ref_id="CVE-2017-5472" ref_url="https://www.suse.com/security/cve/CVE-2017-5472/" source="CVE"/>
		<reference ref_id="CVE-2017-7749" ref_url="https://www.suse.com/security/cve/CVE-2017-7749/" source="CVE"/>
		<reference ref_id="CVE-2017-7750" ref_url="https://www.suse.com/security/cve/CVE-2017-7750/" source="CVE"/>
		<reference ref_id="CVE-2017-7751" ref_url="https://www.suse.com/security/cve/CVE-2017-7751/" source="CVE"/>
		<reference ref_id="CVE-2017-7752" ref_url="https://www.suse.com/security/cve/CVE-2017-7752/" source="CVE"/>
		<reference ref_id="CVE-2017-7754" ref_url="https://www.suse.com/security/cve/CVE-2017-7754/" source="CVE"/>
		<reference ref_id="CVE-2017-7755" ref_url="https://www.suse.com/security/cve/CVE-2017-7755/" source="CVE"/>
		<reference ref_id="CVE-2017-7756" ref_url="https://www.suse.com/security/cve/CVE-2017-7756/" source="CVE"/>
		<reference ref_id="CVE-2017-7757" ref_url="https://www.suse.com/security/cve/CVE-2017-7757/" source="CVE"/>
		<reference ref_id="CVE-2017-7758" ref_url="https://www.suse.com/security/cve/CVE-2017-7758/" source="CVE"/>
		<reference ref_id="CVE-2017-7761" ref_url="https://www.suse.com/security/cve/CVE-2017-7761/" source="CVE"/>
		<reference ref_id="CVE-2017-7763" ref_url="https://www.suse.com/security/cve/CVE-2017-7763/" source="CVE"/>
		<reference ref_id="CVE-2017-7764" ref_url="https://www.suse.com/security/cve/CVE-2017-7764/" source="CVE"/>
		<reference ref_id="CVE-2017-7765" ref_url="https://www.suse.com/security/cve/CVE-2017-7765/" source="CVE"/>
		<reference ref_id="CVE-2017-7768" ref_url="https://www.suse.com/security/cve/CVE-2017-7768/" source="CVE"/>
		<reference ref_id="CVE-2017-7778" ref_url="https://www.suse.com/security/cve/CVE-2017-7778/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-52.2.0esr-108.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-5913/">CVE-2008-5913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0652/">CVE-2009-0652</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0771/">CVE-2009-0771</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0772/">CVE-2009-0772</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0773/">CVE-2009-0773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0774/">CVE-2009-0774</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0775/">CVE-2009-0775</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0776/">CVE-2009-0776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0777/">CVE-2009-0777</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1044/">CVE-2009-1044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1169/">CVE-2009-1169</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1302/">CVE-2009-1302</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1303/">CVE-2009-1303</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1304/">CVE-2009-1304</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1305/">CVE-2009-1305</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1306/">CVE-2009-1306</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1307/">CVE-2009-1307</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1308/">CVE-2009-1308</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1309/">CVE-2009-1309</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1310/">CVE-2009-1310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1311/">CVE-2009-1311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1312/">CVE-2009-1312</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1313/">CVE-2009-1313</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1563/">CVE-2009-1563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2470/">CVE-2009-2470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2654/">CVE-2009-2654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3069/">CVE-2009-3069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3070/">CVE-2009-3070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3071/">CVE-2009-3071</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3072/">CVE-2009-3072</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3073/">CVE-2009-3073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3074/">CVE-2009-3074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3075/">CVE-2009-3075</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3077/">CVE-2009-3077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3078/">CVE-2009-3078</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3079/">CVE-2009-3079</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3274/">CVE-2009-3274</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3370/">CVE-2009-3370</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3371/">CVE-2009-3371</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3372/">CVE-2009-3372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3373/">CVE-2009-3373</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3374/">CVE-2009-3374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3375/">CVE-2009-3375</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3376/">CVE-2009-3376</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3377/">CVE-2009-3377</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3378/">CVE-2009-3378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3380/">CVE-2009-3380</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3381/">CVE-2009-3381</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3383/">CVE-2009-3383</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3388/">CVE-2009-3388</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3389/">CVE-2009-3389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3979/">CVE-2009-3979</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3980/">CVE-2009-3980</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3982/">CVE-2009-3982</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3983/">CVE-2009-3983</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3984/">CVE-2009-3984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3985/">CVE-2009-3985</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0164/">CVE-2010-0164</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0165/">CVE-2010-0165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0166/">CVE-2010-0166</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0167/">CVE-2010-0167</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0168/">CVE-2010-0168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0169/">CVE-2010-0169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0170/">CVE-2010-0170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0171/">CVE-2010-0171</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0172/">CVE-2010-0172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0654/">CVE-2010-0654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1028/">CVE-2010-1028</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1121/">CVE-2010-1121</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1125/">CVE-2010-1125</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1196/">CVE-2010-1196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1197/">CVE-2010-1197</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1198/">CVE-2010-1198</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1199/">CVE-2010-1199</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1200/">CVE-2010-1200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1201/">CVE-2010-1201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1202/">CVE-2010-1202</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1203/">CVE-2010-1203</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1206/">CVE-2010-1206</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1207/">CVE-2010-1207</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1208/">CVE-2010-1208</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1209/">CVE-2010-1209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1210/">CVE-2010-1210</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1211/">CVE-2010-1211</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1212/">CVE-2010-1212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1213/">CVE-2010-1213</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1214/">CVE-2010-1214</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1215/">CVE-2010-1215</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2751/">CVE-2010-2751</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2752/">CVE-2010-2752</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2753/">CVE-2010-2753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2754/">CVE-2010-2754</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2755/">CVE-2010-2755</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2760/">CVE-2010-2760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2762/">CVE-2010-2762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2764/">CVE-2010-2764</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2765/">CVE-2010-2765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2766/">CVE-2010-2766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2767/">CVE-2010-2767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2768/">CVE-2010-2768</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2769/">CVE-2010-2769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3166/">CVE-2010-3166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3167/">CVE-2010-3167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3168/">CVE-2010-3168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3169/">CVE-2010-3169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3173/">CVE-2010-3173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3174/">CVE-2010-3174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3175/">CVE-2010-3175</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3176/">CVE-2010-3176</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3177/">CVE-2010-3177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-0068/">CVE-2011-0068</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0069/">CVE-2011-0069</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0070/">CVE-2011-0070</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0079/">CVE-2011-0079</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0080/">CVE-2011-0080</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0081/">CVE-2011-0081</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0084/">CVE-2011-0084</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1187/">CVE-2011-1187</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1202/">CVE-2011-1202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2366/">CVE-2011-2366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2367/">CVE-2011-2367</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2368/">CVE-2011-2368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2369/">CVE-2011-2369</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2370/">CVE-2011-2370</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2371/">CVE-2011-2371</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2372/">CVE-2011-2372</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2373/">CVE-2011-2373</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2374/">CVE-2011-2374</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2375/">CVE-2011-2375</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2377/">CVE-2011-2377</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2985/">CVE-2011-2985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2986/">CVE-2011-2986</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2988/">CVE-2011-2988</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2989/">CVE-2011-2989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2990/">CVE-2011-2990</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2991/">CVE-2011-2991</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2992/">CVE-2011-2992</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2993/">CVE-2011-2993</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2995/">CVE-2011-2995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2996/">CVE-2011-2996</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2997/">CVE-2011-2997</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3000/">CVE-2011-3000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3001/">CVE-2011-3001</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3002/">CVE-2011-3002</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3003/">CVE-2011-3003</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3004/">CVE-2011-3004</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3005/">CVE-2011-3005</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3062/">CVE-2011-3062</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3101/">CVE-2011-3101</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3232/">CVE-2011-3232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3648/">CVE-2011-3648</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3650/">CVE-2011-3650</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3651/">CVE-2011-3651</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3652/">CVE-2011-3652</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3654/">CVE-2011-3654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3655/">CVE-2011-3655</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3658/">CVE-2011-3658</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3659/">CVE-2011-3659</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3660/">CVE-2011-3660</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3661/">CVE-2011-3661</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3663/">CVE-2011-3663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0441/">CVE-2012-0441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0442/">CVE-2012-0442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0443/">CVE-2012-0443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0445/">CVE-2012-0445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0446/">CVE-2012-0446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0447/">CVE-2012-0447</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0449/">CVE-2012-0449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0451/">CVE-2012-0451</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0452/">CVE-2012-0452</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0455/">CVE-2012-0455</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0456/">CVE-2012-0456</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0457/">CVE-2012-0457</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0458/">CVE-2012-0458</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0459/">CVE-2012-0459</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0460/">CVE-2012-0460</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0461/">CVE-2012-0461</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0462/">CVE-2012-0462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0463/">CVE-2012-0463</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0464/">CVE-2012-0464</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0467/">CVE-2012-0467</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0468/">CVE-2012-0468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0469/">CVE-2012-0469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0470/">CVE-2012-0470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0471/">CVE-2012-0471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0472/">CVE-2012-0472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0473/">CVE-2012-0473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0474/">CVE-2012-0474</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0475/">CVE-2012-0475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0477/">CVE-2012-0477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0478/">CVE-2012-0478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0479/">CVE-2012-0479</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0759/">CVE-2012-0759</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1937/">CVE-2012-1937</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1938/">CVE-2012-1938</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1940/">CVE-2012-1940</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1941/">CVE-2012-1941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1944/">CVE-2012-1944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1945/">CVE-2012-1945</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1946/">CVE-2012-1946</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1947/">CVE-2012-1947</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1948/">CVE-2012-1948</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1949/">CVE-2012-1949</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1950/">CVE-2012-1950</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1951/">CVE-2012-1951</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1952/">CVE-2012-1952</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1953/">CVE-2012-1953</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1954/">CVE-2012-1954</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1955/">CVE-2012-1955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1956/">CVE-2012-1956</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1957/">CVE-2012-1957</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1958/">CVE-2012-1958</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1959/">CVE-2012-1959</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1960/">CVE-2012-1960</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1961/">CVE-2012-1961</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1962/">CVE-2012-1962</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1963/">CVE-2012-1963</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1965/">CVE-2012-1965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1966/">CVE-2012-1966</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1967/">CVE-2012-1967</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1970/">CVE-2012-1970</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1972/">CVE-2012-1972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1973/">CVE-2012-1973</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1974/">CVE-2012-1974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1975/">CVE-2012-1975</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1976/">CVE-2012-1976</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3956/">CVE-2012-3956</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3957/">CVE-2012-3957</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3958/">CVE-2012-3958</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3959/">CVE-2012-3959</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3960/">CVE-2012-3960</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3961/">CVE-2012-3961</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3962/">CVE-2012-3962</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3963/">CVE-2012-3963</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3964/">CVE-2012-3964</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3965/">CVE-2012-3965</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3966/">CVE-2012-3966</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3967/">CVE-2012-3967</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3968/">CVE-2012-3968</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3969/">CVE-2012-3969</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3970/">CVE-2012-3970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3971/">CVE-2012-3971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3972/">CVE-2012-3972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3973/">CVE-2012-3973</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3975/">CVE-2012-3975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3976/">CVE-2012-3976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3978/">CVE-2012-3978</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3980/">CVE-2012-3980</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3982/">CVE-2012-3982</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3983/">CVE-2012-3983</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3984/">CVE-2012-3984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3985/">CVE-2012-3985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3986/">CVE-2012-3986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3988/">CVE-2012-3988</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3989/">CVE-2012-3989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3990/">CVE-2012-3990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3991/">CVE-2012-3991</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3992/">CVE-2012-3992</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3993/">CVE-2012-3993</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3994/">CVE-2012-3994</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3995/">CVE-2012-3995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4179/">CVE-2012-4179</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4180/">CVE-2012-4180</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4181/">CVE-2012-4181</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4182/">CVE-2012-4182</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4183/">CVE-2012-4183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4184/">CVE-2012-4184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4185/">CVE-2012-4185</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4186/">CVE-2012-4186</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4187/">CVE-2012-4187</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4188/">CVE-2012-4188</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4191/">CVE-2012-4191</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4192/">CVE-2012-4192</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4193/">CVE-2012-4193</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4194/">CVE-2012-4194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4195/">CVE-2012-4195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4196/">CVE-2012-4196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4201/">CVE-2012-4201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4202/">CVE-2012-4202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4203/">CVE-2012-4203</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4204/">CVE-2012-4204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4205/">CVE-2012-4205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4207/">CVE-2012-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4208/">CVE-2012-4208</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4209/">CVE-2012-4209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4210/">CVE-2012-4210</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4212/">CVE-2012-4212</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4213/">CVE-2012-4213</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4214/">CVE-2012-4214</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4215/">CVE-2012-4215</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4216/">CVE-2012-4216</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4217/">CVE-2012-4217</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4218/">CVE-2012-4218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5830/">CVE-2012-5830</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5833/">CVE-2012-5833</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5835/">CVE-2012-5835</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5836/">CVE-2012-5836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5837/">CVE-2012-5837</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5838/">CVE-2012-5838</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5839/">CVE-2012-5839</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5840/">CVE-2012-5840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5841/">CVE-2012-5841</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5842/">CVE-2012-5842</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5843/">CVE-2012-5843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0744/">CVE-2013-0744</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0745/">CVE-2013-0745</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0746/">CVE-2013-0746</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0747/">CVE-2013-0747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0748/">CVE-2013-0748</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0749/">CVE-2013-0749</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0750/">CVE-2013-0750</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0751/">CVE-2013-0751</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0752/">CVE-2013-0752</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0753/">CVE-2013-0753</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0754/">CVE-2013-0754</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0755/">CVE-2013-0755</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0756/">CVE-2013-0756</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0757/">CVE-2013-0757</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0758/">CVE-2013-0758</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0760/">CVE-2013-0760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0761/">CVE-2013-0761</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0762/">CVE-2013-0762</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0763/">CVE-2013-0763</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0764/">CVE-2013-0764</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0765/">CVE-2013-0765</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0766/">CVE-2013-0766</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0767/">CVE-2013-0767</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0768/">CVE-2013-0768</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0769/">CVE-2013-0769</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0770/">CVE-2013-0770</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0771/">CVE-2013-0771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0772/">CVE-2013-0772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0773/">CVE-2013-0773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0774/">CVE-2013-0774</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0775/">CVE-2013-0775</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0776/">CVE-2013-0776</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0777/">CVE-2013-0777</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0778/">CVE-2013-0778</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0779/">CVE-2013-0779</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0780/">CVE-2013-0780</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0781/">CVE-2013-0781</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0782/">CVE-2013-0782</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0783/">CVE-2013-0783</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0787/">CVE-2013-0787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0788/">CVE-2013-0788</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0789/">CVE-2013-0789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0792/">CVE-2013-0792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0793/">CVE-2013-0793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0794/">CVE-2013-0794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0795/">CVE-2013-0795</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0796/">CVE-2013-0796</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0800/">CVE-2013-0800</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0801/">CVE-2013-0801</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1669/">CVE-2013-1669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1670/">CVE-2013-1670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1671/">CVE-2013-1671</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1674/">CVE-2013-1674</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1675/">CVE-2013-1675</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1676/">CVE-2013-1676</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1677/">CVE-2013-1677</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1678/">CVE-2013-1678</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1679/">CVE-2013-1679</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1680/">CVE-2013-1680</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1681/">CVE-2013-1681</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1682/">CVE-2013-1682</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1683/">CVE-2013-1683</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1684/">CVE-2013-1684</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1685/">CVE-2013-1685</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1686/">CVE-2013-1686</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1687/">CVE-2013-1687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1688/">CVE-2013-1688</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1690/">CVE-2013-1690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1692/">CVE-2013-1692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1693/">CVE-2013-1693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1694/">CVE-2013-1694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1695/">CVE-2013-1695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1696/">CVE-2013-1696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1697/">CVE-2013-1697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1698/">CVE-2013-1698</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1699/">CVE-2013-1699</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1701/">CVE-2013-1701</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1702/">CVE-2013-1702</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1704/">CVE-2013-1704</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1705/">CVE-2013-1705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1708/">CVE-2013-1708</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1709/">CVE-2013-1709</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1710/">CVE-2013-1710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1711/">CVE-2013-1711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1713/">CVE-2013-1713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1714/">CVE-2013-1714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1717/">CVE-2013-1717</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1718/">CVE-2013-1718</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1719/">CVE-2013-1719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1720/">CVE-2013-1720</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1721/">CVE-2013-1721</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1722/">CVE-2013-1722</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1723/">CVE-2013-1723</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1724/">CVE-2013-1724</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1725/">CVE-2013-1725</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1728/">CVE-2013-1728</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1730/">CVE-2013-1730</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1732/">CVE-2013-1732</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1735/">CVE-2013-1735</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1736/">CVE-2013-1736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1737/">CVE-2013-1737</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1738/">CVE-2013-1738</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5590/">CVE-2013-5590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5591/">CVE-2013-5591</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5592/">CVE-2013-5592</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5593/">CVE-2013-5593</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5595/">CVE-2013-5595</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5596/">CVE-2013-5596</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5597/">CVE-2013-5597</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5598/">CVE-2013-5598</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5599/">CVE-2013-5599</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5600/">CVE-2013-5600</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5601/">CVE-2013-5601</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5602/">CVE-2013-5602</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5603/">CVE-2013-5603</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5604/">CVE-2013-5604</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5609/">CVE-2013-5609</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5610/">CVE-2013-5610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5611/">CVE-2013-5611</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5612/">CVE-2013-5612</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5613/">CVE-2013-5613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5614/">CVE-2013-5614</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5615/">CVE-2013-5615</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5616/">CVE-2013-5616</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5618/">CVE-2013-5618</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5619/">CVE-2013-5619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6630/">CVE-2013-6630</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-6671/">CVE-2013-6671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6672/">CVE-2013-6672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6673/">CVE-2013-6673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1477/">CVE-2014-1477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1478/">CVE-2014-1478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1479/">CVE-2014-1479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1480/">CVE-2014-1480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1481/">CVE-2014-1481</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1482/">CVE-2014-1482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1483/">CVE-2014-1483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1484/">CVE-2014-1484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1485/">CVE-2014-1485</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1486/">CVE-2014-1486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1487/">CVE-2014-1487</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1488/">CVE-2014-1488</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1489/">CVE-2014-1489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1490/">CVE-2014-1490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1491/">CVE-2014-1491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1544/">CVE-2014-1544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1547/">CVE-2014-1547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1548/">CVE-2014-1548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1553/">CVE-2014-1553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1554/">CVE-2014-1554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1555/">CVE-2014-1555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1556/">CVE-2014-1556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1557/">CVE-2014-1557</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1562/">CVE-2014-1562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1563/">CVE-2014-1563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1564/">CVE-2014-1564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1565/">CVE-2014-1565</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1567/">CVE-2014-1567</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1574/">CVE-2014-1574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1575/">CVE-2014-1575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1576/">CVE-2014-1576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1577/">CVE-2014-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1578/">CVE-2014-1578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1581/">CVE-2014-1581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1583/">CVE-2014-1583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1585/">CVE-2014-1585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1586/">CVE-2014-1586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1588/">CVE-2014-1588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8635/">CVE-2014-8635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8641/">CVE-2014-8641</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0797/">CVE-2015-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0801/">CVE-2015-0801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0807/">CVE-2015-0807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0813/">CVE-2015-0813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0814/">CVE-2015-0814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0815/">CVE-2015-0815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0816/">CVE-2015-0816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0817/">CVE-2015-0817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0818/">CVE-2015-0818</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0822/">CVE-2015-0822</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0827/">CVE-2015-0827</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0831/">CVE-2015-0831</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0835/">CVE-2015-0835</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0836/">CVE-2015-0836</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2708/">CVE-2015-2708</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2709/">CVE-2015-2709</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2710/">CVE-2015-2710</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2713/">CVE-2015-2713</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2716/">CVE-2015-2716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2726/">CVE-2015-2726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4474/">CVE-2015-4474</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4497/">CVE-2015-4497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4498/">CVE-2015-4498</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7202/">CVE-2015-7202</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10196/">CVE-2016-10196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1523/">CVE-2016-1523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1931/">CVE-2016-1931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1952/">CVE-2016-1952</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1953/">CVE-2016-1953</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1954/">CVE-2016-1954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1957/">CVE-2016-1957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1958/">CVE-2016-1958</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1960/">CVE-2016-1960</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1961/">CVE-2016-1961</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1962/">CVE-2016-1962</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1964/">CVE-2016-1964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1965/">CVE-2016-1965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1966/">CVE-2016-1966</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1974/">CVE-2016-1974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1977/">CVE-2016-1977</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2790/">CVE-2016-2790</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2791/">CVE-2016-2791</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2792/">CVE-2016-2792</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2793/">CVE-2016-2793</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2794/">CVE-2016-2794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2795/">CVE-2016-2795</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2796/">CVE-2016-2796</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2797/">CVE-2016-2797</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2798/">CVE-2016-2798</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2799/">CVE-2016-2799</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2800/">CVE-2016-2800</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2801/">CVE-2016-2801</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2802/">CVE-2016-2802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2805/">CVE-2016-2805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2807/">CVE-2016-2807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2808/">CVE-2016-2808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2814/">CVE-2016-2814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2815/">CVE-2016-2815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2818/">CVE-2016-2818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2819/">CVE-2016-2819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2821/">CVE-2016-2821</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2822/">CVE-2016-2822</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2824/">CVE-2016-2824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2828/">CVE-2016-2828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2831/">CVE-2016-2831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2835/">CVE-2016-2835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2836/">CVE-2016-2836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2837/">CVE-2016-2837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2838/">CVE-2016-2838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2839/">CVE-2016-2839</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5250/">CVE-2016-5250</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5252/">CVE-2016-5252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5254/">CVE-2016-5254</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5257/">CVE-2016-5257</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5258/">CVE-2016-5258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5259/">CVE-2016-5259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5261/">CVE-2016-5261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5262/">CVE-2016-5262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5263/">CVE-2016-5263</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5264/">CVE-2016-5264</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5265/">CVE-2016-5265</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5270/">CVE-2016-5270</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5272/">CVE-2016-5272</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5274/">CVE-2016-5274</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5276/">CVE-2016-5276</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5277/">CVE-2016-5277</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5278/">CVE-2016-5278</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5280/">CVE-2016-5280</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5281/">CVE-2016-5281</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5284/">CVE-2016-5284</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5290/">CVE-2016-5290</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5291/">CVE-2016-5291</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5296/">CVE-2016-5296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5297/">CVE-2016-5297</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9064/">CVE-2016-9064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9066/">CVE-2016-9066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9079/">CVE-2016-9079</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9893/">CVE-2016-9893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9895/">CVE-2016-9895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9897/">CVE-2016-9897</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9898/">CVE-2016-9898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9899/">CVE-2016-9899</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9900/">CVE-2016-9900</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9901/">CVE-2016-9901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9902/">CVE-2016-9902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9904/">CVE-2016-9904</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9905/">CVE-2016-9905</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5373/">CVE-2017-5373</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5375/">CVE-2017-5375</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5376/">CVE-2017-5376</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5378/">CVE-2017-5378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5380/">CVE-2017-5380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5383/">CVE-2017-5383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5386/">CVE-2017-5386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5390/">CVE-2017-5390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5396/">CVE-2017-5396</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5398/">CVE-2017-5398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5400/">CVE-2017-5400</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5401/">CVE-2017-5401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5402/">CVE-2017-5402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5404/">CVE-2017-5404</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5405/">CVE-2017-5405</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5407/">CVE-2017-5407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5408/">CVE-2017-5408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5409/">CVE-2017-5409</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5410/">CVE-2017-5410</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5430/">CVE-2017-5430</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5437/">CVE-2017-5437</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5448/">CVE-2017-5448</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5449/">CVE-2017-5449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5451/">CVE-2017-5451</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5454/">CVE-2017-5454</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5455/">CVE-2017-5455</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5456/">CVE-2017-5456</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5462/">CVE-2017-5462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5466/">CVE-2017-5466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5467/">CVE-2017-5467</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5470/">CVE-2017-5470</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5472/">CVE-2017-5472</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7749/">CVE-2017-7749</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7750/">CVE-2017-7750</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7751/">CVE-2017-7751</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7752/">CVE-2017-7752</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7754/">CVE-2017-7754</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7755/">CVE-2017-7755</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7756/">CVE-2017-7756</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7757/">CVE-2017-7757</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7758/">CVE-2017-7758</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7761/">CVE-2017-7761</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7763/">CVE-2017-7763</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7764/">CVE-2017-7764</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7765/">CVE-2017-7765</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7768/">CVE-2017-7768</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7778/">CVE-2017-7778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76476" version="1" class="patch">
	<metadata>
		<title>NetworkManager-1.0.12-12.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-2924" ref_url="https://www.suse.com/security/cve/CVE-2015-2924/" source="CVE"/>
		<reference ref_id="CVE-2016-0764" ref_url="https://www.suse.com/security/cve/CVE-2016-0764/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-1.0.12-12.4 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2924/">CVE-2015-2924</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0764/">CVE-2016-0764</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159624" comment="NetworkManager-1.0.12-12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159625" comment="NetworkManager-lang-1.0.12-12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159169" comment="libnm-glib-vpn1-1.0.12-12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159170" comment="libnm-glib4-1.0.12-12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159171" comment="libnm-util2-1.0.12-12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159172" comment="libnm0-1.0.12-12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159626" comment="typelib-1_0-NM-1_0-1.0.12-12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159173" comment="typelib-1_0-NMClient-1_0-1.0.12-12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159174" comment="typelib-1_0-NetworkManager-1_0-1.0.12-12.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76477" version="1" class="patch">
	<metadata>
		<title>aaa_base-13.2+git20140911.61c1681-36.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-0461" ref_url="https://www.suse.com/security/cve/CVE-2011-0461/" source="CVE"/>
		<description>
These are all security issues fixed in the aaa_base-13.2+git20140911.61c1681-36.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0461/">CVE-2011-0461</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009158923" comment="aaa_base-13.2+git20140911.61c1681-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158924" comment="aaa_base-extras-13.2+git20140911.61c1681-36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76478" version="1" class="patch">
	<metadata>
		<title>accountsservice-0.6.42-14.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-2737" ref_url="https://www.suse.com/security/cve/CVE-2012-2737/" source="CVE"/>
		<description>
These are all security issues fixed in the accountsservice-0.6.42-14.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2737/">CVE-2012-2737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140439" comment="accountsservice-0.6.42-14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140440" comment="accountsservice-lang-0.6.42-14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140441" comment="libaccountsservice0-0.6.42-14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140442" comment="typelib-1_0-AccountsService-1_0-0.6.42-14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76479" version="1" class="patch">
	<metadata>
		<title>alsa-1.0.27.2-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0035" ref_url="https://www.suse.com/security/cve/CVE-2009-0035/" source="CVE"/>
		<description>
These are all security issues fixed in the alsa-1.0.27.2-15.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0035/">CVE-2009-0035</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009158925" comment="alsa-1.0.27.2-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158927" comment="libasound2-1.0.27.2-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158928" comment="libasound2-32bit-1.0.27.2-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76480" version="1" class="patch">
	<metadata>
		<title>apparmor-docs-2.8.2-49.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2017-6507" ref_url="https://www.suse.com/security/cve/CVE-2017-6507/" source="CVE"/>
		<description>
These are all security issues fixed in the apparmor-docs-2.8.2-49.21 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6507/">CVE-2017-6507</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009158932" comment="apparmor-docs-2.8.2-49.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158933" comment="apparmor-parser-2.8.2-49.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158934" comment="apparmor-profiles-2.8.2-49.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158935" comment="apparmor-utils-2.8.2-49.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158936" comment="libapparmor1-2.8.2-49.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158937" comment="libapparmor1-32bit-2.8.2-49.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158938" comment="pam_apparmor-2.8.2-49.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158939" comment="pam_apparmor-32bit-2.8.2-49.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158940" comment="perl-apparmor-2.8.2-49.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76481" version="1" class="patch">
	<metadata>
		<title>argyllcms-1.6.3-3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-1616" ref_url="https://www.suse.com/security/cve/CVE-2012-1616/" source="CVE"/>
		<description>
These are all security issues fixed in the argyllcms-1.6.3-3.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1616/">CVE-2012-1616</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142077" comment="argyllcms-1.6.3-3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76482" version="1" class="patch">
	<metadata>
		<title>at-3.1.14-7.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<description>
These are all security issues fixed in the at-3.1.14-7.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131107" comment="at-3.1.14-7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131109" comment="libQtWebKit4-4.8.6+2.3.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131110" comment="libQtWebKit4-32bit-4.8.6+2.3.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131111" comment="libbonobo-2.32.1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131112" comment="libbonobo-32bit-2.32.1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131113" comment="libbonobo-lang-2.32.1-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76483" version="1" class="patch">
	<metadata>
		<title>audiofile-0.3.6-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-7747" ref_url="https://www.suse.com/security/cve/CVE-2015-7747/" source="CVE"/>
		<reference ref_id="CVE-2017-6827" ref_url="https://www.suse.com/security/cve/CVE-2017-6827/" source="CVE"/>
		<reference ref_id="CVE-2017-6828" ref_url="https://www.suse.com/security/cve/CVE-2017-6828/" source="CVE"/>
		<reference ref_id="CVE-2017-6829" ref_url="https://www.suse.com/security/cve/CVE-2017-6829/" source="CVE"/>
		<reference ref_id="CVE-2017-6830" ref_url="https://www.suse.com/security/cve/CVE-2017-6830/" source="CVE"/>
		<reference ref_id="CVE-2017-6831" ref_url="https://www.suse.com/security/cve/CVE-2017-6831/" source="CVE"/>
		<reference ref_id="CVE-2017-6832" ref_url="https://www.suse.com/security/cve/CVE-2017-6832/" source="CVE"/>
		<reference ref_id="CVE-2017-6833" ref_url="https://www.suse.com/security/cve/CVE-2017-6833/" source="CVE"/>
		<reference ref_id="CVE-2017-6834" ref_url="https://www.suse.com/security/cve/CVE-2017-6834/" source="CVE"/>
		<reference ref_id="CVE-2017-6835" ref_url="https://www.suse.com/security/cve/CVE-2017-6835/" source="CVE"/>
		<reference ref_id="CVE-2017-6836" ref_url="https://www.suse.com/security/cve/CVE-2017-6836/" source="CVE"/>
		<reference ref_id="CVE-2017-6837" ref_url="https://www.suse.com/security/cve/CVE-2017-6837/" source="CVE"/>
		<reference ref_id="CVE-2017-6838" ref_url="https://www.suse.com/security/cve/CVE-2017-6838/" source="CVE"/>
		<reference ref_id="CVE-2017-6839" ref_url="https://www.suse.com/security/cve/CVE-2017-6839/" source="CVE"/>
		<description>
These are all security issues fixed in the audiofile-0.3.6-10.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7747/">CVE-2015-7747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6827/">CVE-2017-6827</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6828/">CVE-2017-6828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6829/">CVE-2017-6829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6830/">CVE-2017-6830</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6831/">CVE-2017-6831</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6832/">CVE-2017-6832</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6833/">CVE-2017-6833</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6834/">CVE-2017-6834</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6835/">CVE-2017-6835</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6836/">CVE-2017-6836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6837/">CVE-2017-6837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6838/">CVE-2017-6838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6839/">CVE-2017-6839</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009150578" comment="audiofile-0.3.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150579" comment="libaudiofile1-0.3.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150580" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76484" version="1" class="patch">
	<metadata>
		<title>augeas-1.2.0-15.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-0786" ref_url="https://www.suse.com/security/cve/CVE-2012-0786/" source="CVE"/>
		<reference ref_id="CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119/" source="CVE"/>
		<description>
These are all security issues fixed in the augeas-1.2.0-15.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0786/">CVE-2012-0786</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009158941" comment="augeas-1.2.0-15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158942" comment="augeas-lenses-1.2.0-15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158943" comment="libaugeas0-1.2.0-15.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76485" version="1" class="patch">
	<metadata>
		<title>autofs-5.0.9-27.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-8169" ref_url="https://www.suse.com/security/cve/CVE-2014-8169/" source="CVE"/>
		<description>
These are all security issues fixed in the autofs-5.0.9-27.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8169/">CVE-2014-8169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158944" comment="autofs-5.0.9-27.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76486" version="1" class="patch">
	<metadata>
		<title>avahi-0.6.32-30.36 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0758" ref_url="https://www.suse.com/security/cve/CVE-2009-0758/" source="CVE"/>
		<reference ref_id="CVE-2010-2244" ref_url="https://www.suse.com/security/cve/CVE-2010-2244/" source="CVE"/>
		<reference ref_id="CVE-2011-1002" ref_url="https://www.suse.com/security/cve/CVE-2011-1002/" source="CVE"/>
		<description>
These are all security issues fixed in the avahi-0.6.32-30.36 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0758/">CVE-2009-0758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2244/">CVE-2010-2244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1002/">CVE-2011-1002</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140467" comment="avahi-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140468" comment="avahi-lang-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140470" comment="libavahi-client3-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140471" comment="libavahi-client3-32bit-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140472" comment="libavahi-common3-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140473" comment="libavahi-common3-32bit-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140474" comment="libavahi-core7-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140475" comment="libdns_sd-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140476" comment="libdns_sd-32bit-0.6.32-30.36 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76487" version="1" class="patch">
	<metadata>
		<title>bash-4.3-82.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-2524" ref_url="https://www.suse.com/security/cve/CVE-2014-2524/" source="CVE"/>
		<reference ref_id="CVE-2014-6271" ref_url="https://www.suse.com/security/cve/CVE-2014-6271/" source="CVE"/>
		<reference ref_id="CVE-2014-6277" ref_url="https://www.suse.com/security/cve/CVE-2014-6277/" source="CVE"/>
		<reference ref_id="CVE-2014-6278" ref_url="https://www.suse.com/security/cve/CVE-2014-6278/" source="CVE"/>
		<reference ref_id="CVE-2014-7169" ref_url="https://www.suse.com/security/cve/CVE-2014-7169/" source="CVE"/>
		<reference ref_id="CVE-2014-7186" ref_url="https://www.suse.com/security/cve/CVE-2014-7186/" source="CVE"/>
		<reference ref_id="CVE-2014-7187" ref_url="https://www.suse.com/security/cve/CVE-2014-7187/" source="CVE"/>
		<description>
These are all security issues fixed in the bash-4.3-82.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2524/">CVE-2014-2524</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6271/">CVE-2014-6271</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6277/">CVE-2014-6277</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6278/">CVE-2014-6278</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7169/">CVE-2014-7169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7186/">CVE-2014-7186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7187/">CVE-2014-7187</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009155546" comment="bash-4.3-82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155547" comment="bash-doc-4.3-82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155548" comment="bash-lang-4.3-82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155549" comment="libreadline6-6.3-82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155550" comment="libreadline6-32bit-6.3-82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155551" comment="readline-doc-6.3-82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76488" version="1" class="patch">
	<metadata>
		<title>bind-libs-32bit-9.9.9P1-62.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0696" ref_url="https://www.suse.com/security/cve/CVE-2009-0696/" source="CVE"/>
		<reference ref_id="CVE-2009-4022" ref_url="https://www.suse.com/security/cve/CVE-2009-4022/" source="CVE"/>
		<reference ref_id="CVE-2010-3613" ref_url="https://www.suse.com/security/cve/CVE-2010-3613/" source="CVE"/>
		<reference ref_id="CVE-2010-3614" ref_url="https://www.suse.com/security/cve/CVE-2010-3614/" source="CVE"/>
		<reference ref_id="CVE-2010-3615" ref_url="https://www.suse.com/security/cve/CVE-2010-3615/" source="CVE"/>
		<reference ref_id="CVE-2011-0414" ref_url="https://www.suse.com/security/cve/CVE-2011-0414/" source="CVE"/>
		<reference ref_id="CVE-2011-1907" ref_url="https://www.suse.com/security/cve/CVE-2011-1907/" source="CVE"/>
		<reference ref_id="CVE-2011-1910" ref_url="https://www.suse.com/security/cve/CVE-2011-1910/" source="CVE"/>
		<reference ref_id="CVE-2011-2464" ref_url="https://www.suse.com/security/cve/CVE-2011-2464/" source="CVE"/>
		<reference ref_id="CVE-2011-4313" ref_url="https://www.suse.com/security/cve/CVE-2011-4313/" source="CVE"/>
		<reference ref_id="CVE-2012-1667" ref_url="https://www.suse.com/security/cve/CVE-2012-1667/" source="CVE"/>
		<reference ref_id="CVE-2012-3817" ref_url="https://www.suse.com/security/cve/CVE-2012-3817/" source="CVE"/>
		<reference ref_id="CVE-2012-3868" ref_url="https://www.suse.com/security/cve/CVE-2012-3868/" source="CVE"/>
		<reference ref_id="CVE-2012-4244" ref_url="https://www.suse.com/security/cve/CVE-2012-4244/" source="CVE"/>
		<reference ref_id="CVE-2012-5166" ref_url="https://www.suse.com/security/cve/CVE-2012-5166/" source="CVE"/>
		<reference ref_id="CVE-2012-5688" ref_url="https://www.suse.com/security/cve/CVE-2012-5688/" source="CVE"/>
		<reference ref_id="CVE-2012-5689" ref_url="https://www.suse.com/security/cve/CVE-2012-5689/" source="CVE"/>
		<reference ref_id="CVE-2013-2266" ref_url="https://www.suse.com/security/cve/CVE-2013-2266/" source="CVE"/>
		<reference ref_id="CVE-2013-4854" ref_url="https://www.suse.com/security/cve/CVE-2013-4854/" source="CVE"/>
		<reference ref_id="CVE-2014-0591" ref_url="https://www.suse.com/security/cve/CVE-2014-0591/" source="CVE"/>
		<reference ref_id="CVE-2014-8500" ref_url="https://www.suse.com/security/cve/CVE-2014-8500/" source="CVE"/>
		<reference ref_id="CVE-2015-1349" ref_url="https://www.suse.com/security/cve/CVE-2015-1349/" source="CVE"/>
		<reference ref_id="CVE-2015-4620" ref_url="https://www.suse.com/security/cve/CVE-2015-4620/" source="CVE"/>
		<reference ref_id="CVE-2015-5477" ref_url="https://www.suse.com/security/cve/CVE-2015-5477/" source="CVE"/>
		<reference ref_id="CVE-2015-5722" ref_url="https://www.suse.com/security/cve/CVE-2015-5722/" source="CVE"/>
		<reference ref_id="CVE-2015-8000" ref_url="https://www.suse.com/security/cve/CVE-2015-8000/" source="CVE"/>
		<reference ref_id="CVE-2015-8704" ref_url="https://www.suse.com/security/cve/CVE-2015-8704/" source="CVE"/>
		<reference ref_id="CVE-2016-1285" ref_url="https://www.suse.com/security/cve/CVE-2016-1285/" source="CVE"/>
		<reference ref_id="CVE-2016-1286" ref_url="https://www.suse.com/security/cve/CVE-2016-1286/" source="CVE"/>
		<reference ref_id="CVE-2016-2775" ref_url="https://www.suse.com/security/cve/CVE-2016-2775/" source="CVE"/>
		<reference ref_id="CVE-2016-2776" ref_url="https://www.suse.com/security/cve/CVE-2016-2776/" source="CVE"/>
		<reference ref_id="CVE-2016-6170" ref_url="https://www.suse.com/security/cve/CVE-2016-6170/" source="CVE"/>
		<reference ref_id="CVE-2016-8864" ref_url="https://www.suse.com/security/cve/CVE-2016-8864/" source="CVE"/>
		<reference ref_id="CVE-2016-9131" ref_url="https://www.suse.com/security/cve/CVE-2016-9131/" source="CVE"/>
		<reference ref_id="CVE-2016-9147" ref_url="https://www.suse.com/security/cve/CVE-2016-9147/" source="CVE"/>
		<reference ref_id="CVE-2016-9444" ref_url="https://www.suse.com/security/cve/CVE-2016-9444/" source="CVE"/>
		<reference ref_id="CVE-2017-3135" ref_url="https://www.suse.com/security/cve/CVE-2017-3135/" source="CVE"/>
		<reference ref_id="CVE-2017-3136" ref_url="https://www.suse.com/security/cve/CVE-2017-3136/" source="CVE"/>
		<reference ref_id="CVE-2017-3137" ref_url="https://www.suse.com/security/cve/CVE-2017-3137/" source="CVE"/>
		<reference ref_id="CVE-2017-3138" ref_url="https://www.suse.com/security/cve/CVE-2017-3138/" source="CVE"/>
		<reference ref_id="CVE-2017-3142" ref_url="https://www.suse.com/security/cve/CVE-2017-3142/" source="CVE"/>
		<reference ref_id="CVE-2017-3143" ref_url="https://www.suse.com/security/cve/CVE-2017-3143/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-libs-32bit-9.9.9P1-62.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0696/">CVE-2009-0696</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4022/">CVE-2009-4022</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3613/">CVE-2010-3613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3614/">CVE-2010-3614</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3615/">CVE-2010-3615</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0414/">CVE-2011-0414</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1907/">CVE-2011-1907</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1910/">CVE-2011-1910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2464/">CVE-2011-2464</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4313/">CVE-2011-4313</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1667/">CVE-2012-1667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3817/">CVE-2012-3817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3868/">CVE-2012-3868</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4244/">CVE-2012-4244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5166/">CVE-2012-5166</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5688/">CVE-2012-5688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5689/">CVE-2012-5689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2266/">CVE-2013-2266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4854/">CVE-2013-4854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0591/">CVE-2014-0591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8500/">CVE-2014-8500</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1349/">CVE-2015-1349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4620/">CVE-2015-4620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5477/">CVE-2015-5477</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5722/">CVE-2015-5722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8000/">CVE-2015-8000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8704/">CVE-2015-8704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1285/">CVE-2016-1285</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1286/">CVE-2016-1286</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2775/">CVE-2016-2775</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2776/">CVE-2016-2776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6170/">CVE-2016-6170</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8864/">CVE-2016-8864</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9131/">CVE-2016-9131</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9147/">CVE-2016-9147</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9444/">CVE-2016-9444</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3135/">CVE-2017-3135</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3136/">CVE-2017-3136</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3137/">CVE-2017-3137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3138/">CVE-2017-3138</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3142/">CVE-2017-3142</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3143/">CVE-2017-3143</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76489" version="1" class="patch">
	<metadata>
		<title>binutils-2.26.1-9.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-8484" ref_url="https://www.suse.com/security/cve/CVE-2014-8484/" source="CVE"/>
		<reference ref_id="CVE-2014-8485" ref_url="https://www.suse.com/security/cve/CVE-2014-8485/" source="CVE"/>
		<reference ref_id="CVE-2014-8501" ref_url="https://www.suse.com/security/cve/CVE-2014-8501/" source="CVE"/>
		<reference ref_id="CVE-2014-8502" ref_url="https://www.suse.com/security/cve/CVE-2014-8502/" source="CVE"/>
		<reference ref_id="CVE-2014-8503" ref_url="https://www.suse.com/security/cve/CVE-2014-8503/" source="CVE"/>
		<reference ref_id="CVE-2014-8504" ref_url="https://www.suse.com/security/cve/CVE-2014-8504/" source="CVE"/>
		<reference ref_id="CVE-2014-8737" ref_url="https://www.suse.com/security/cve/CVE-2014-8737/" source="CVE"/>
		<reference ref_id="CVE-2014-8738" ref_url="https://www.suse.com/security/cve/CVE-2014-8738/" source="CVE"/>
		<description>
These are all security issues fixed in the binutils-2.26.1-9.12.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8484/">CVE-2014-8484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8485/">CVE-2014-8485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8501/">CVE-2014-8501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8502/">CVE-2014-8502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8503/">CVE-2014-8503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8504/">CVE-2014-8504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8737/">CVE-2014-8737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8738/">CVE-2014-8738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140482" comment="binutils-2.26.1-9.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76490" version="1" class="patch">
	<metadata>
		<title>bogofilter-1.2.4-5.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2494" ref_url="https://www.suse.com/security/cve/CVE-2010-2494/" source="CVE"/>
		<reference ref_id="CVE-2012-5468" ref_url="https://www.suse.com/security/cve/CVE-2012-5468/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<description>
These are all security issues fixed in the bogofilter-1.2.4-5.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2494/">CVE-2010-2494</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5468/">CVE-2012-5468</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131108" comment="bogofilter-1.2.4-5.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76491" version="1" class="patch">
	<metadata>
		<title>busybox-1.21.1-3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-9645" ref_url="https://www.suse.com/security/cve/CVE-2014-9645/" source="CVE"/>
		<description>
These are all security issues fixed in the busybox-1.21.1-3.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9645/">CVE-2014-9645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113975" comment="busybox-1.21.1-3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76492" version="1" class="patch">
	<metadata>
		<title>bzip2-1.0.6-29.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<description>
These are all security issues fixed in the bzip2-1.0.6-29.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140483" comment="bzip2-1.0.6-29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140485" comment="libbz2-1-1.0.6-29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140486" comment="libbz2-1-32bit-1.0.6-29.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76493" version="1" class="patch">
	<metadata>
		<title>cifs-utils-6.5-8.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2012-1586" ref_url="https://www.suse.com/security/cve/CVE-2012-1586/" source="CVE"/>
		<description>
These are all security issues fixed in the cifs-utils-6.5-8.9 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1586/">CVE-2012-1586</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140488" comment="cifs-utils-6.5-8.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76494" version="1" class="patch">
	<metadata>
		<title>clamav-0.99.2-32.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<reference ref_id="CVE-2011-2721" ref_url="https://www.suse.com/security/cve/CVE-2011-2721/" source="CVE"/>
		<reference ref_id="CVE-2011-3627" ref_url="https://www.suse.com/security/cve/CVE-2011-3627/" source="CVE"/>
		<reference ref_id="CVE-2012-1457" ref_url="https://www.suse.com/security/cve/CVE-2012-1457/" source="CVE"/>
		<reference ref_id="CVE-2012-1458" ref_url="https://www.suse.com/security/cve/CVE-2012-1458/" source="CVE"/>
		<reference ref_id="CVE-2012-1459" ref_url="https://www.suse.com/security/cve/CVE-2012-1459/" source="CVE"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="CVE-2013-6497" ref_url="https://www.suse.com/security/cve/CVE-2013-6497/" source="CVE"/>
		<reference ref_id="CVE-2014-9050" ref_url="https://www.suse.com/security/cve/CVE-2014-9050/" source="CVE"/>
		<reference ref_id="CVE-2014-9328" ref_url="https://www.suse.com/security/cve/CVE-2014-9328/" source="CVE"/>
		<reference ref_id="CVE-2015-1461" ref_url="https://www.suse.com/security/cve/CVE-2015-1461/" source="CVE"/>
		<reference ref_id="CVE-2015-1462" ref_url="https://www.suse.com/security/cve/CVE-2015-1462/" source="CVE"/>
		<reference ref_id="CVE-2015-1463" ref_url="https://www.suse.com/security/cve/CVE-2015-1463/" source="CVE"/>
		<reference ref_id="CVE-2015-2170" ref_url="https://www.suse.com/security/cve/CVE-2015-2170/" source="CVE"/>
		<reference ref_id="CVE-2015-2221" ref_url="https://www.suse.com/security/cve/CVE-2015-2221/" source="CVE"/>
		<reference ref_id="CVE-2015-2222" ref_url="https://www.suse.com/security/cve/CVE-2015-2222/" source="CVE"/>
		<reference ref_id="CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305/" source="CVE"/>
		<reference ref_id="CVE-2015-2668" ref_url="https://www.suse.com/security/cve/CVE-2015-2668/" source="CVE"/>
		<description>
These are all security issues fixed in the clamav-0.99.2-32.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2721/">CVE-2011-2721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3627/">CVE-2011-3627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1457/">CVE-2012-1457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1458/">CVE-2012-1458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1459/">CVE-2012-1459</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6497/">CVE-2013-6497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9050/">CVE-2014-9050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9328/">CVE-2014-9328</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1461/">CVE-2015-1461</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1462/">CVE-2015-1462</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1463/">CVE-2015-1463</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2170/">CVE-2015-2170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2221/">CVE-2015-2221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2222/">CVE-2015-2222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2668/">CVE-2015-2668</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157660" comment="clamav-0.99.2-32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76495" version="1" class="patch">
	<metadata>
		<title>colord-1.3.3-12.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-4349" ref_url="https://www.suse.com/security/cve/CVE-2011-4349/" source="CVE"/>
		<description>
These are all security issues fixed in the colord-1.3.3-12.13 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4349/">CVE-2011-4349</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159627" comment="colord-1.3.3-12.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140490" comment="colord-gtk-lang-0.1.26-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159628" comment="colord-lang-1.3.3-12.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140491" comment="libcolord-gtk1-0.1.26-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158945" comment="libcolord2-1.3.3-12.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158946" comment="libcolord2-32bit-1.3.3-12.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158947" comment="libcolorhug2-1.3.3-12.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76496" version="1" class="patch">
	<metadata>
		<title>coolkey-1.1.0-147.71 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-4129" ref_url="https://www.suse.com/security/cve/CVE-2007-4129/" source="CVE"/>
		<description>
These are all security issues fixed in the coolkey-1.1.0-147.71 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4129/">CVE-2007-4129</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140495" comment="coolkey-1.1.0-147.71 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76497" version="1" class="patch">
	<metadata>
		<title>coreutils-8.25-12.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-0221" ref_url="https://www.suse.com/security/cve/CVE-2013-0221/" source="CVE"/>
		<reference ref_id="CVE-2013-0222" ref_url="https://www.suse.com/security/cve/CVE-2013-0222/" source="CVE"/>
		<reference ref_id="CVE-2013-0223" ref_url="https://www.suse.com/security/cve/CVE-2013-0223/" source="CVE"/>
		<reference ref_id="CVE-2015-4041" ref_url="https://www.suse.com/security/cve/CVE-2015-4041/" source="CVE"/>
		<reference ref_id="CVE-2015-4042" ref_url="https://www.suse.com/security/cve/CVE-2015-4042/" source="CVE"/>
		<description>
These are all security issues fixed in the coreutils-8.25-12.8 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0221/">CVE-2013-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0222/">CVE-2013-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0223/">CVE-2013-0223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4041/">CVE-2015-4041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4042/">CVE-2015-4042</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140496" comment="coreutils-8.25-12.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140497" comment="coreutils-lang-8.25-12.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76498" version="1" class="patch">
	<metadata>
		<title>cpio-2.11-35.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-0624" ref_url="https://www.suse.com/security/cve/CVE-2010-0624/" source="CVE"/>
		<reference ref_id="CVE-2014-9112" ref_url="https://www.suse.com/security/cve/CVE-2014-9112/" source="CVE"/>
		<reference ref_id="CVE-2016-2037" ref_url="https://www.suse.com/security/cve/CVE-2016-2037/" source="CVE"/>
		<description>
These are all security issues fixed in the cpio-2.11-35.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0624/">CVE-2010-0624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9112/">CVE-2014-9112</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-2037/">CVE-2016-2037</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009158948" comment="cpio-2.11-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158949" comment="cpio-lang-2.11-35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76499" version="1" class="patch">
	<metadata>
		<title>cpp48-4.8.5-30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-5044" ref_url="https://www.suse.com/security/cve/CVE-2014-5044/" source="CVE"/>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<description>
These are all security issues fixed in the cpp48-4.8.5-30.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5044/">CVE-2014-5044</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140498" comment="cpp48-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140499" comment="gcc48-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140500" comment="gcc48-32bit-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140501" comment="gcc48-c++-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142081" comment="gcc48-gij-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142082" comment="gcc48-gij-32bit-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140502" comment="gcc48-info-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140504" comment="libasan0-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140505" comment="libasan0-32bit-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142083" comment="libgcj48-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142084" comment="libgcj48-32bit-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142085" comment="libgcj48-jar-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142086" comment="libgcj_bc1-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140506" comment="libstdc++48-devel-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140507" comment="libstdc++48-devel-32bit-4.8.5-30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76500" version="1" class="patch">
	<metadata>
		<title>cracklib-2.9.0-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-6318" ref_url="https://www.suse.com/security/cve/CVE-2016-6318/" source="CVE"/>
		<description>
These are all security issues fixed in the cracklib-2.9.0-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6318/">CVE-2016-6318</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130930" comment="cracklib-2.9.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131013" comment="libcrack2-2.9.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131014" comment="libcrack2-32bit-2.9.0-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76501" version="1" class="patch">
	<metadata>
		<title>cron-4.2-58.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-2607" ref_url="https://www.suse.com/security/cve/CVE-2006-2607/" source="CVE"/>
		<reference ref_id="CVE-2010-0424" ref_url="https://www.suse.com/security/cve/CVE-2010-0424/" source="CVE"/>
		<description>
These are all security issues fixed in the cron-4.2-58.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2607/">CVE-2006-2607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0424/">CVE-2010-0424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140508" comment="cron-4.2-58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140509" comment="cronie-1.4.11-58.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76502" version="1" class="patch">
	<metadata>
		<title>ctags-5.8-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-7204" ref_url="https://www.suse.com/security/cve/CVE-2014-7204/" source="CVE"/>
		<description>
These are all security issues fixed in the ctags-5.8-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7204/">CVE-2014-7204</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130995" comment="ctags-5.8-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76503" version="1" class="patch">
	<metadata>
		<title>cups-1.7.5-19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0163" ref_url="https://www.suse.com/security/cve/CVE-2009-0163/" source="CVE"/>
		<reference ref_id="CVE-2009-2820" ref_url="https://www.suse.com/security/cve/CVE-2009-2820/" source="CVE"/>
		<reference ref_id="CVE-2009-3553" ref_url="https://www.suse.com/security/cve/CVE-2009-3553/" source="CVE"/>
		<reference ref_id="CVE-2010-0393" ref_url="https://www.suse.com/security/cve/CVE-2010-0393/" source="CVE"/>
		<reference ref_id="CVE-2010-0540" ref_url="https://www.suse.com/security/cve/CVE-2010-0540/" source="CVE"/>
		<reference ref_id="CVE-2010-0542" ref_url="https://www.suse.com/security/cve/CVE-2010-0542/" source="CVE"/>
		<reference ref_id="CVE-2010-1748" ref_url="https://www.suse.com/security/cve/CVE-2010-1748/" source="CVE"/>
		<reference ref_id="CVE-2010-2941" ref_url="https://www.suse.com/security/cve/CVE-2010-2941/" source="CVE"/>
		<reference ref_id="CVE-2012-5519" ref_url="https://www.suse.com/security/cve/CVE-2012-5519/" source="CVE"/>
		<reference ref_id="CVE-2012-6094" ref_url="https://www.suse.com/security/cve/CVE-2012-6094/" source="CVE"/>
		<reference ref_id="CVE-2014-2856" ref_url="https://www.suse.com/security/cve/CVE-2014-2856/" source="CVE"/>
		<reference ref_id="CVE-2014-3537" ref_url="https://www.suse.com/security/cve/CVE-2014-3537/" source="CVE"/>
		<reference ref_id="CVE-2014-5029" ref_url="https://www.suse.com/security/cve/CVE-2014-5029/" source="CVE"/>
		<reference ref_id="CVE-2014-5030" ref_url="https://www.suse.com/security/cve/CVE-2014-5030/" source="CVE"/>
		<reference ref_id="CVE-2014-5031" ref_url="https://www.suse.com/security/cve/CVE-2014-5031/" source="CVE"/>
		<reference ref_id="CVE-2014-9679" ref_url="https://www.suse.com/security/cve/CVE-2014-9679/" source="CVE"/>
		<reference ref_id="CVE-2015-1158" ref_url="https://www.suse.com/security/cve/CVE-2015-1158/" source="CVE"/>
		<reference ref_id="CVE-2015-1159" ref_url="https://www.suse.com/security/cve/CVE-2015-1159/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-1.7.5-19.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0163/">CVE-2009-0163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2820/">CVE-2009-2820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3553/">CVE-2009-3553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0393/">CVE-2010-0393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0540/">CVE-2010-0540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0542/">CVE-2010-0542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1748/">CVE-2010-1748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2941/">CVE-2010-2941</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5519/">CVE-2012-5519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6094/">CVE-2012-6094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2856/">CVE-2014-2856</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3537/">CVE-2014-3537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5029/">CVE-2014-5029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5030/">CVE-2014-5030</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5031/">CVE-2014-5031</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9679/">CVE-2014-9679</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1158/">CVE-2015-1158</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1159/">CVE-2015-1159</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009158952" comment="cups-1.7.5-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158953" comment="cups-client-1.7.5-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158954" comment="cups-libs-1.7.5-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158955" comment="cups-libs-32bit-1.7.5-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76504" version="1" class="patch">
	<metadata>
		<title>cups-filters-1.0.58-17.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-6473" ref_url="https://www.suse.com/security/cve/CVE-2013-6473/" source="CVE"/>
		<reference ref_id="CVE-2013-6474" ref_url="https://www.suse.com/security/cve/CVE-2013-6474/" source="CVE"/>
		<reference ref_id="CVE-2013-6475" ref_url="https://www.suse.com/security/cve/CVE-2013-6475/" source="CVE"/>
		<reference ref_id="CVE-2013-6476" ref_url="https://www.suse.com/security/cve/CVE-2013-6476/" source="CVE"/>
		<reference ref_id="CVE-2014-2707" ref_url="https://www.suse.com/security/cve/CVE-2014-2707/" source="CVE"/>
		<reference ref_id="CVE-2014-4336" ref_url="https://www.suse.com/security/cve/CVE-2014-4336/" source="CVE"/>
		<reference ref_id="CVE-2014-4337" ref_url="https://www.suse.com/security/cve/CVE-2014-4337/" source="CVE"/>
		<reference ref_id="CVE-2014-4338" ref_url="https://www.suse.com/security/cve/CVE-2014-4338/" source="CVE"/>
		<reference ref_id="CVE-2015-2265" ref_url="https://www.suse.com/security/cve/CVE-2015-2265/" source="CVE"/>
		<reference ref_id="CVE-2015-3258" ref_url="https://www.suse.com/security/cve/CVE-2015-3258/" source="CVE"/>
		<reference ref_id="CVE-2015-3279" ref_url="https://www.suse.com/security/cve/CVE-2015-3279/" source="CVE"/>
		<reference ref_id="CVE-2015-8327" ref_url="https://www.suse.com/security/cve/CVE-2015-8327/" source="CVE"/>
		<reference ref_id="CVE-2015-8560" ref_url="https://www.suse.com/security/cve/CVE-2015-8560/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-filters-1.0.58-17.11 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6473/">CVE-2013-6473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6474/">CVE-2013-6474</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6475/">CVE-2013-6475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6476/">CVE-2013-6476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2707/">CVE-2014-2707</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4336/">CVE-2014-4336</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4337/">CVE-2014-4337</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4338/">CVE-2014-4338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2265/">CVE-2015-2265</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3258/">CVE-2015-3258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3279/">CVE-2015-3279</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8327/">CVE-2015-8327</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8560/">CVE-2015-8560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009158956" comment="cups-filters-1.0.58-17.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158957" comment="cups-filters-cups-browsed-1.0.58-17.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158958" comment="cups-filters-foomatic-rip-1.0.58-17.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158959" comment="cups-filters-ghostscript-1.0.58-17.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76505" version="1" class="patch">
	<metadata>
		<title>cups-pk-helper-0.2.5-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-4510" ref_url="https://www.suse.com/security/cve/CVE-2012-4510/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-pk-helper-0.2.5-5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4510/">CVE-2012-4510</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009138209" comment="cups-pk-helper-0.2.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009138210" comment="cups-pk-helper-lang-0.2.5-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76506" version="1" class="patch">
	<metadata>
		<title>curl-7.37.0-36.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0037" ref_url="https://www.suse.com/security/cve/CVE-2009-0037/" source="CVE"/>
		<reference ref_id="CVE-2009-2417" ref_url="https://www.suse.com/security/cve/CVE-2009-2417/" source="CVE"/>
		<reference ref_id="CVE-2013-0249" ref_url="https://www.suse.com/security/cve/CVE-2013-0249/" source="CVE"/>
		<reference ref_id="CVE-2013-1944" ref_url="https://www.suse.com/security/cve/CVE-2013-1944/" source="CVE"/>
		<reference ref_id="CVE-2013-2174" ref_url="https://www.suse.com/security/cve/CVE-2013-2174/" source="CVE"/>
		<reference ref_id="CVE-2013-4545" ref_url="https://www.suse.com/security/cve/CVE-2013-4545/" source="CVE"/>
		<reference ref_id="CVE-2014-0015" ref_url="https://www.suse.com/security/cve/CVE-2014-0015/" source="CVE"/>
		<reference ref_id="CVE-2014-0138" ref_url="https://www.suse.com/security/cve/CVE-2014-0138/" source="CVE"/>
		<reference ref_id="CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139/" source="CVE"/>
		<reference ref_id="CVE-2014-3613" ref_url="https://www.suse.com/security/cve/CVE-2014-3613/" source="CVE"/>
		<reference ref_id="CVE-2014-3620" ref_url="https://www.suse.com/security/cve/CVE-2014-3620/" source="CVE"/>
		<reference ref_id="CVE-2014-3707" ref_url="https://www.suse.com/security/cve/CVE-2014-3707/" source="CVE"/>
		<reference ref_id="CVE-2014-8150" ref_url="https://www.suse.com/security/cve/CVE-2014-8150/" source="CVE"/>
		<reference ref_id="CVE-2015-3143" ref_url="https://www.suse.com/security/cve/CVE-2015-3143/" source="CVE"/>
		<reference ref_id="CVE-2015-3144" ref_url="https://www.suse.com/security/cve/CVE-2015-3144/" source="CVE"/>
		<reference ref_id="CVE-2015-3145" ref_url="https://www.suse.com/security/cve/CVE-2015-3145/" source="CVE"/>
		<reference ref_id="CVE-2015-3148" ref_url="https://www.suse.com/security/cve/CVE-2015-3148/" source="CVE"/>
		<reference ref_id="CVE-2015-3153" ref_url="https://www.suse.com/security/cve/CVE-2015-3153/" source="CVE"/>
		<reference ref_id="CVE-2016-0755" ref_url="https://www.suse.com/security/cve/CVE-2016-0755/" source="CVE"/>
		<reference ref_id="CVE-2016-5419" ref_url="https://www.suse.com/security/cve/CVE-2016-5419/" source="CVE"/>
		<reference ref_id="CVE-2016-5420" ref_url="https://www.suse.com/security/cve/CVE-2016-5420/" source="CVE"/>
		<reference ref_id="CVE-2016-5421" ref_url="https://www.suse.com/security/cve/CVE-2016-5421/" source="CVE"/>
		<reference ref_id="CVE-2016-7141" ref_url="https://www.suse.com/security/cve/CVE-2016-7141/" source="CVE"/>
		<reference ref_id="CVE-2016-7167" ref_url="https://www.suse.com/security/cve/CVE-2016-7167/" source="CVE"/>
		<reference ref_id="CVE-2016-8615" ref_url="https://www.suse.com/security/cve/CVE-2016-8615/" source="CVE"/>
		<reference ref_id="CVE-2016-8616" ref_url="https://www.suse.com/security/cve/CVE-2016-8616/" source="CVE"/>
		<reference ref_id="CVE-2016-8617" ref_url="https://www.suse.com/security/cve/CVE-2016-8617/" source="CVE"/>
		<reference ref_id="CVE-2016-8618" ref_url="https://www.suse.com/security/cve/CVE-2016-8618/" source="CVE"/>
		<reference ref_id="CVE-2016-8619" ref_url="https://www.suse.com/security/cve/CVE-2016-8619/" source="CVE"/>
		<reference ref_id="CVE-2016-8620" ref_url="https://www.suse.com/security/cve/CVE-2016-8620/" source="CVE"/>
		<reference ref_id="CVE-2016-8621" ref_url="https://www.suse.com/security/cve/CVE-2016-8621/" source="CVE"/>
		<reference ref_id="CVE-2016-8622" ref_url="https://www.suse.com/security/cve/CVE-2016-8622/" source="CVE"/>
		<reference ref_id="CVE-2016-8623" ref_url="https://www.suse.com/security/cve/CVE-2016-8623/" source="CVE"/>
		<reference ref_id="CVE-2016-8624" ref_url="https://www.suse.com/security/cve/CVE-2016-8624/" source="CVE"/>
		<reference ref_id="CVE-2016-9586" ref_url="https://www.suse.com/security/cve/CVE-2016-9586/" source="CVE"/>
		<reference ref_id="CVE-2017-7407" ref_url="https://www.suse.com/security/cve/CVE-2017-7407/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-7.37.0-36.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0037/">CVE-2009-0037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2417/">CVE-2009-2417</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0249/">CVE-2013-0249</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1944/">CVE-2013-1944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2174/">CVE-2013-2174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4545/">CVE-2013-4545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0015/">CVE-2014-0015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0138/">CVE-2014-0138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3613/">CVE-2014-3613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3620/">CVE-2014-3620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3707/">CVE-2014-3707</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8150/">CVE-2014-8150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3143/">CVE-2015-3143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3144/">CVE-2015-3144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3145/">CVE-2015-3145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3148/">CVE-2015-3148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3153/">CVE-2015-3153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0755/">CVE-2016-0755</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5419/">CVE-2016-5419</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5420/">CVE-2016-5420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5421/">CVE-2016-5421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7141/">CVE-2016-7141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7167/">CVE-2016-7167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8615/">CVE-2016-8615</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8616/">CVE-2016-8616</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8617/">CVE-2016-8617</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-8618/">CVE-2016-8618</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8619/">CVE-2016-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8620/">CVE-2016-8620</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-8621/">CVE-2016-8621</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8622/">CVE-2016-8622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8623/">CVE-2016-8623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8624/">CVE-2016-8624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9586/">CVE-2016-9586</cve>
	<cve impact="moderate" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7407/">CVE-2017-7407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76507" version="1" class="patch">
	<metadata>
		<title>cvs-1.12.12-181.63 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-0804" ref_url="https://www.suse.com/security/cve/CVE-2012-0804/" source="CVE"/>
		<description>
These are all security issues fixed in the cvs-1.12.12-181.63 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0804/">CVE-2012-0804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140516" comment="cvs-1.12.12-181.63 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76508" version="1" class="patch">
	<metadata>
		<title>cyrus-sasl-2.1.26-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0688" ref_url="https://www.suse.com/security/cve/CVE-2009-0688/" source="CVE"/>
		<description>
These are all security issues fixed in the cyrus-sasl-2.1.26-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0688/">CVE-2009-0688</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140518" comment="cyrus-sasl-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140519" comment="cyrus-sasl-32bit-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140520" comment="cyrus-sasl-crammd5-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140521" comment="cyrus-sasl-crammd5-32bit-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140522" comment="cyrus-sasl-digestmd5-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141292" comment="cyrus-sasl-digestmd5-32bit-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140523" comment="cyrus-sasl-gssapi-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140524" comment="cyrus-sasl-gssapi-32bit-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140527" comment="cyrus-sasl-plain-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140528" comment="cyrus-sasl-plain-32bit-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140529" comment="cyrus-sasl-saslauthd-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140532" comment="libsasl2-3-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140533" comment="libsasl2-3-32bit-2.1.26-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76509" version="1" class="patch">
	<metadata>
		<title>dbus-1-1.8.22-28.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-4352" ref_url="https://www.suse.com/security/cve/CVE-2010-4352/" source="CVE"/>
		<reference ref_id="CVE-2012-3524" ref_url="https://www.suse.com/security/cve/CVE-2012-3524/" source="CVE"/>
		<reference ref_id="CVE-2013-2168" ref_url="https://www.suse.com/security/cve/CVE-2013-2168/" source="CVE"/>
		<reference ref_id="CVE-2014-3477" ref_url="https://www.suse.com/security/cve/CVE-2014-3477/" source="CVE"/>
		<reference ref_id="CVE-2014-3532" ref_url="https://www.suse.com/security/cve/CVE-2014-3532/" source="CVE"/>
		<reference ref_id="CVE-2014-3533" ref_url="https://www.suse.com/security/cve/CVE-2014-3533/" source="CVE"/>
		<reference ref_id="CVE-2014-3635" ref_url="https://www.suse.com/security/cve/CVE-2014-3635/" source="CVE"/>
		<reference ref_id="CVE-2014-3636" ref_url="https://www.suse.com/security/cve/CVE-2014-3636/" source="CVE"/>
		<reference ref_id="CVE-2014-3637" ref_url="https://www.suse.com/security/cve/CVE-2014-3637/" source="CVE"/>
		<reference ref_id="CVE-2014-3638" ref_url="https://www.suse.com/security/cve/CVE-2014-3638/" source="CVE"/>
		<reference ref_id="CVE-2014-3639" ref_url="https://www.suse.com/security/cve/CVE-2014-3639/" source="CVE"/>
		<reference ref_id="CVE-2014-7824" ref_url="https://www.suse.com/security/cve/CVE-2014-7824/" source="CVE"/>
		<reference ref_id="CVE-2014-8148" ref_url="https://www.suse.com/security/cve/CVE-2014-8148/" source="CVE"/>
		<reference ref_id="CVE-2015-0245" ref_url="https://www.suse.com/security/cve/CVE-2015-0245/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-1.8.22-28.19 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4352/">CVE-2010-4352</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3524/">CVE-2012-3524</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2168/">CVE-2013-2168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3477/">CVE-2014-3477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3532/">CVE-2014-3532</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3533/">CVE-2014-3533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3635/">CVE-2014-3635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3636/">CVE-2014-3636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3637/">CVE-2014-3637</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3638/">CVE-2014-3638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3639/">CVE-2014-3639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7824/">CVE-2014-7824</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8148/">CVE-2014-8148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0245/">CVE-2015-0245</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009158960" comment="dbus-1-1.8.22-28.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158961" comment="dbus-1-x11-1.8.22-28.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158962" comment="libdbus-1-3-1.8.22-28.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158963" comment="libdbus-1-3-32bit-1.8.22-28.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76510" version="1" class="patch">
	<metadata>
		<title>dbus-1-glib-0.100.2-3.58 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-1172" ref_url="https://www.suse.com/security/cve/CVE-2010-1172/" source="CVE"/>
		<reference ref_id="CVE-2013-0292" ref_url="https://www.suse.com/security/cve/CVE-2013-0292/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-glib-0.100.2-3.58 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1172/">CVE-2010-1172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0292/">CVE-2013-0292</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140539" comment="dbus-1-glib-0.100.2-3.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140540" comment="dbus-1-glib-32bit-0.100.2-3.58 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76511" version="1" class="patch">
	<metadata>
		<title>dhcp-4.3.3-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-1892" ref_url="https://www.suse.com/security/cve/CVE-2009-1892/" source="CVE"/>
		<reference ref_id="CVE-2010-2156" ref_url="https://www.suse.com/security/cve/CVE-2010-2156/" source="CVE"/>
		<reference ref_id="CVE-2010-3611" ref_url="https://www.suse.com/security/cve/CVE-2010-3611/" source="CVE"/>
		<reference ref_id="CVE-2010-3616" ref_url="https://www.suse.com/security/cve/CVE-2010-3616/" source="CVE"/>
		<reference ref_id="CVE-2011-0413" ref_url="https://www.suse.com/security/cve/CVE-2011-0413/" source="CVE"/>
		<reference ref_id="CVE-2011-0997" ref_url="https://www.suse.com/security/cve/CVE-2011-0997/" source="CVE"/>
		<reference ref_id="CVE-2011-2748" ref_url="https://www.suse.com/security/cve/CVE-2011-2748/" source="CVE"/>
		<reference ref_id="CVE-2011-2749" ref_url="https://www.suse.com/security/cve/CVE-2011-2749/" source="CVE"/>
		<reference ref_id="CVE-2011-4539" ref_url="https://www.suse.com/security/cve/CVE-2011-4539/" source="CVE"/>
		<reference ref_id="CVE-2011-4868" ref_url="https://www.suse.com/security/cve/CVE-2011-4868/" source="CVE"/>
		<reference ref_id="CVE-2012-3570" ref_url="https://www.suse.com/security/cve/CVE-2012-3570/" source="CVE"/>
		<reference ref_id="CVE-2012-3571" ref_url="https://www.suse.com/security/cve/CVE-2012-3571/" source="CVE"/>
		<reference ref_id="CVE-2012-3954" ref_url="https://www.suse.com/security/cve/CVE-2012-3954/" source="CVE"/>
		<reference ref_id="CVE-2012-3955" ref_url="https://www.suse.com/security/cve/CVE-2012-3955/" source="CVE"/>
		<reference ref_id="CVE-2013-2266" ref_url="https://www.suse.com/security/cve/CVE-2013-2266/" source="CVE"/>
		<reference ref_id="CVE-2015-8605" ref_url="https://www.suse.com/security/cve/CVE-2015-8605/" source="CVE"/>
		<description>
These are all security issues fixed in the dhcp-4.3.3-9.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1892/">CVE-2009-1892</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2156/">CVE-2010-2156</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3611/">CVE-2010-3611</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3616/">CVE-2010-3616</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0413/">CVE-2011-0413</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0997/">CVE-2011-0997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2748/">CVE-2011-2748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2749/">CVE-2011-2749</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4539/">CVE-2011-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4868/">CVE-2011-4868</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3570/">CVE-2012-3570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3571/">CVE-2012-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3954/">CVE-2012-3954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3955/">CVE-2012-3955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2266/">CVE-2013-2266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8605/">CVE-2015-8605</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76512" version="1" class="patch">
	<metadata>
		<title>dia-0.97.3-15.63 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-5984" ref_url="https://www.suse.com/security/cve/CVE-2008-5984/" source="CVE"/>
		<description>
These are all security issues fixed in the dia-0.97.3-15.63 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5984/">CVE-2008-5984</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142087" comment="dia-0.97.3-15.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142088" comment="dia-lang-0.97.3-15.63 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76513" version="1" class="patch">
	<metadata>
		<title>dnsmasq-2.76-17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-3294" ref_url="https://www.suse.com/security/cve/CVE-2015-3294/" source="CVE"/>
		<reference ref_id="CVE-2015-8899" ref_url="https://www.suse.com/security/cve/CVE-2015-8899/" source="CVE"/>
		<description>
These are all security issues fixed in the dnsmasq-2.76-17.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3294/">CVE-2015-3294</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8899/">CVE-2015-8899</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158964" comment="dnsmasq-2.76-17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76514" version="1" class="patch">
	<metadata>
		<title>dosfstools-3.0.26-6.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-8872" ref_url="https://www.suse.com/security/cve/CVE-2015-8872/" source="CVE"/>
		<reference ref_id="CVE-2016-4804" ref_url="https://www.suse.com/security/cve/CVE-2016-4804/" source="CVE"/>
		<description>
These are all security issues fixed in the dosfstools-3.0.26-6.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8872/">CVE-2015-8872</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4804/">CVE-2016-4804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131020" comment="dosfstools-3.0.26-6.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76515" version="1" class="patch">
	<metadata>
		<title>dracut-044-113.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-4453" ref_url="https://www.suse.com/security/cve/CVE-2012-4453/" source="CVE"/>
		<reference ref_id="CVE-2016-8637" ref_url="https://www.suse.com/security/cve/CVE-2016-8637/" source="CVE"/>
		<description>
These are all security issues fixed in the dracut-044-113.10 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4453/">CVE-2012-4453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8637/">CVE-2016-8637</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158969" comment="dracut-044-113.10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76516" version="1" class="patch">
	<metadata>
		<title>drm-kmp-default-4.9.33_k4.4.73_5-2.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2017-7261" ref_url="https://www.suse.com/security/cve/CVE-2017-7261/" source="CVE"/>
		<reference ref_id="CVE-2017-7294" ref_url="https://www.suse.com/security/cve/CVE-2017-7294/" source="CVE"/>
		<reference ref_id="CVE-2017-7346" ref_url="https://www.suse.com/security/cve/CVE-2017-7346/" source="CVE"/>
		<description>
These are all security issues fixed in the drm-kmp-default-4.9.33_k4.4.73_5-2.4 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7261/">CVE-2017-7261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7294/">CVE-2017-7294</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7346/">CVE-2017-7346</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159629" comment="drm-kmp-default-4.9.33_k4.4.73_5-2.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76517" version="1" class="patch">
	<metadata>
		<title>e2fsprogs-1.42.11-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-0247" ref_url="https://www.suse.com/security/cve/CVE-2015-0247/" source="CVE"/>
		<reference ref_id="CVE-2015-1572" ref_url="https://www.suse.com/security/cve/CVE-2015-1572/" source="CVE"/>
		<description>
These are all security issues fixed in the e2fsprogs-1.42.11-15.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-0247/">CVE-2015-0247</cve>
	<cve impact="low" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-1572/">CVE-2015-1572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009158971" comment="e2fsprogs-1.42.11-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158972" comment="libcom_err2-1.42.11-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158973" comment="libcom_err2-32bit-1.42.11-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158974" comment="libext2fs2-1.42.11-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76518" version="1" class="patch">
	<metadata>
		<title>ecryptfs-utils-103-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1831" ref_url="https://www.suse.com/security/cve/CVE-2011-1831/" source="CVE"/>
		<reference ref_id="CVE-2011-1832" ref_url="https://www.suse.com/security/cve/CVE-2011-1832/" source="CVE"/>
		<reference ref_id="CVE-2011-1833" ref_url="https://www.suse.com/security/cve/CVE-2011-1833/" source="CVE"/>
		<reference ref_id="CVE-2011-1834" ref_url="https://www.suse.com/security/cve/CVE-2011-1834/" source="CVE"/>
		<reference ref_id="CVE-2011-1835" ref_url="https://www.suse.com/security/cve/CVE-2011-1835/" source="CVE"/>
		<reference ref_id="CVE-2011-1836" ref_url="https://www.suse.com/security/cve/CVE-2011-1836/" source="CVE"/>
		<reference ref_id="CVE-2011-1837" ref_url="https://www.suse.com/security/cve/CVE-2011-1837/" source="CVE"/>
		<reference ref_id="CVE-2014-9687" ref_url="https://www.suse.com/security/cve/CVE-2014-9687/" source="CVE"/>
		<reference ref_id="CVE-2016-1572" ref_url="https://www.suse.com/security/cve/CVE-2016-1572/" source="CVE"/>
		<description>
These are all security issues fixed in the ecryptfs-utils-103-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1831/">CVE-2011-1831</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1832/">CVE-2011-1832</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1833/">CVE-2011-1833</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1834/">CVE-2011-1834</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1835/">CVE-2011-1835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1836/">CVE-2011-1836</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1837/">CVE-2011-1837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9687/">CVE-2014-9687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1572/">CVE-2016-1572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009121566" comment="ecryptfs-utils-103-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121567" comment="ecryptfs-utils-32bit-103-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76519" version="1" class="patch">
	<metadata>
		<title>elfutils-0.158-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-0172" ref_url="https://www.suse.com/security/cve/CVE-2014-0172/" source="CVE"/>
		<reference ref_id="CVE-2014-9447" ref_url="https://www.suse.com/security/cve/CVE-2014-9447/" source="CVE"/>
		<description>
These are all security issues fixed in the elfutils-0.158-6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0172/">CVE-2014-0172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9447/">CVE-2014-9447</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106094" comment="elfutils-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106096" comment="libasm1-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106099" comment="libdw1-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106100" comment="libdw1-32bit-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106102" comment="libebl1-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106103" comment="libebl1-32bit-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106106" comment="libelf1-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106107" comment="libelf1-32bit-0.158-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76520" version="1" class="patch">
	<metadata>
		<title>emacs-24.3-19.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-0035" ref_url="https://www.suse.com/security/cve/CVE-2012-0035/" source="CVE"/>
		<reference ref_id="CVE-2014-3421" ref_url="https://www.suse.com/security/cve/CVE-2014-3421/" source="CVE"/>
		<reference ref_id="CVE-2014-3422" ref_url="https://www.suse.com/security/cve/CVE-2014-3422/" source="CVE"/>
		<reference ref_id="CVE-2014-3423" ref_url="https://www.suse.com/security/cve/CVE-2014-3423/" source="CVE"/>
		<reference ref_id="CVE-2014-3424" ref_url="https://www.suse.com/security/cve/CVE-2014-3424/" source="CVE"/>
		<description>
These are all security issues fixed in the emacs-24.3-19.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0035/">CVE-2012-0035</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3421/">CVE-2014-3421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3422/">CVE-2014-3422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3423/">CVE-2014-3423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3424/">CVE-2014-3424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009158975" comment="emacs-24.3-19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158977" comment="emacs-info-24.3-19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158979" comment="emacs-x11-24.3-19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158980" comment="etags-24.3-19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76521" version="1" class="patch">
	<metadata>
		<title>empathy-3.12.12-7.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-3635" ref_url="https://www.suse.com/security/cve/CVE-2011-3635/" source="CVE"/>
		<description>
These are all security issues fixed in the empathy-3.12.12-7.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3635/">CVE-2011-3635</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159630" comment="empathy-3.12.12-7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159631" comment="empathy-lang-3.12.12-7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159632" comment="telepathy-mission-control-plugin-goa-3.12.12-7.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76522" version="1" class="patch">
	<metadata>
		<title>eog-3.20.4-7.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-7447" ref_url="https://www.suse.com/security/cve/CVE-2013-7447/" source="CVE"/>
		<reference ref_id="CVE-2016-6855" ref_url="https://www.suse.com/security/cve/CVE-2016-6855/" source="CVE"/>
		<description>
These are all security issues fixed in the eog-3.20.4-7.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7447/">CVE-2013-7447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6855/">CVE-2016-6855</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140555" comment="eog-3.20.4-7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140556" comment="eog-lang-3.20.4-7.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76523" version="1" class="patch">
	<metadata>
		<title>evince-3.20.1-5.66 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2640" ref_url="https://www.suse.com/security/cve/CVE-2010-2640/" source="CVE"/>
		<reference ref_id="CVE-2010-2641" ref_url="https://www.suse.com/security/cve/CVE-2010-2641/" source="CVE"/>
		<reference ref_id="CVE-2010-2642" ref_url="https://www.suse.com/security/cve/CVE-2010-2642/" source="CVE"/>
		<reference ref_id="CVE-2010-2643" ref_url="https://www.suse.com/security/cve/CVE-2010-2643/" source="CVE"/>
		<description>
These are all security issues fixed in the evince-3.20.1-5.66 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2640/">CVE-2010-2640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2641/">CVE-2010-2641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2642/">CVE-2010-2642</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2643/">CVE-2010-2643</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140557" comment="evince-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140558" comment="evince-browser-plugin-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140559" comment="evince-lang-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140560" comment="evince-plugin-djvudocument-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140561" comment="evince-plugin-dvidocument-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140562" comment="evince-plugin-pdfdocument-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140563" comment="evince-plugin-psdocument-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140564" comment="evince-plugin-tiffdocument-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140565" comment="evince-plugin-xpsdocument-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140566" comment="libevdocument3-4-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140567" comment="libevview3-3-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140568" comment="nautilus-evince-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142092" comment="typelib-1_0-EvinceDocument-3_0-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142093" comment="typelib-1_0-EvinceView-3_0-3.20.1-5.66 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76524" version="1" class="patch">
	<metadata>
		<title>expat-2.1.0-20.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-2625" ref_url="https://www.suse.com/security/cve/CVE-2009-2625/" source="CVE"/>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<reference ref_id="CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876/" source="CVE"/>
		<reference ref_id="CVE-2012-1147" ref_url="https://www.suse.com/security/cve/CVE-2012-1147/" source="CVE"/>
		<reference ref_id="CVE-2012-1148" ref_url="https://www.suse.com/security/cve/CVE-2012-1148/" source="CVE"/>
		<reference ref_id="CVE-2012-6702" ref_url="https://www.suse.com/security/cve/CVE-2012-6702/" source="CVE"/>
		<reference ref_id="CVE-2015-1283" ref_url="https://www.suse.com/security/cve/CVE-2015-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<reference ref_id="CVE-2016-5300" ref_url="https://www.suse.com/security/cve/CVE-2016-5300/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.1.0-20.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2625/">CVE-2009-2625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1147/">CVE-2012-1147</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1148/">CVE-2012-1148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6702/">CVE-2012-6702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1283/">CVE-2015-1283</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5300/">CVE-2016-5300</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009148243" comment="expat-2.1.0-20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009148244" comment="libexpat1-2.1.0-20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009148245" comment="libexpat1-32bit-2.1.0-20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76525" version="1" class="patch">
	<metadata>
		<title>facter-2.4.6-11.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-3248" ref_url="https://www.suse.com/security/cve/CVE-2014-3248/" source="CVE"/>
		<description>
These are all security issues fixed in the facter-2.4.6-11.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3248/">CVE-2014-3248</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159633" comment="facter-2.4.6-11.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76526" version="1" class="patch">
	<metadata>
		<title>fetchmail-6.3.26-12.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-2666" ref_url="https://www.suse.com/security/cve/CVE-2009-2666/" source="CVE"/>
		<reference ref_id="CVE-2010-1167" ref_url="https://www.suse.com/security/cve/CVE-2010-1167/" source="CVE"/>
		<reference ref_id="CVE-2011-1947" ref_url="https://www.suse.com/security/cve/CVE-2011-1947/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2012-3482" ref_url="https://www.suse.com/security/cve/CVE-2012-3482/" source="CVE"/>
		<description>
These are all security issues fixed in the fetchmail-6.3.26-12.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2666/">CVE-2009-2666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1167/">CVE-2010-1167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1947/">CVE-2011-1947</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3482/">CVE-2012-3482</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140569" comment="fetchmail-6.3.26-12.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76527" version="1" class="patch">
	<metadata>
		<title>file-5.19-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-1571" ref_url="https://www.suse.com/security/cve/CVE-2012-1571/" source="CVE"/>
		<reference ref_id="CVE-2014-3710" ref_url="https://www.suse.com/security/cve/CVE-2014-3710/" source="CVE"/>
		<reference ref_id="CVE-2014-8116" ref_url="https://www.suse.com/security/cve/CVE-2014-8116/" source="CVE"/>
		<reference ref_id="CVE-2014-8117" ref_url="https://www.suse.com/security/cve/CVE-2014-8117/" source="CVE"/>
		<description>
These are all security issues fixed in the file-5.19-9.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1571/">CVE-2012-1571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3710/">CVE-2014-3710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8116/">CVE-2014-8116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8117/">CVE-2014-8117</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009103557" comment="file-5.19-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009103559" comment="file-magic-5.19-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009103561" comment="libmagic1-5.19-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009103560" comment="libmagic1-32bit-5.19-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76528" version="1" class="patch">
	<metadata>
		<title>finch-2.12.0-1.33 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-2694" ref_url="https://www.suse.com/security/cve/CVE-2009-2694/" source="CVE"/>
		<reference ref_id="CVE-2009-2703" ref_url="https://www.suse.com/security/cve/CVE-2009-2703/" source="CVE"/>
		<reference ref_id="CVE-2009-3026" ref_url="https://www.suse.com/security/cve/CVE-2009-3026/" source="CVE"/>
		<reference ref_id="CVE-2009-3083" ref_url="https://www.suse.com/security/cve/CVE-2009-3083/" source="CVE"/>
		<reference ref_id="CVE-2009-3084" ref_url="https://www.suse.com/security/cve/CVE-2009-3084/" source="CVE"/>
		<reference ref_id="CVE-2009-3085" ref_url="https://www.suse.com/security/cve/CVE-2009-3085/" source="CVE"/>
		<reference ref_id="CVE-2009-3615" ref_url="https://www.suse.com/security/cve/CVE-2009-3615/" source="CVE"/>
		<reference ref_id="CVE-2010-0013" ref_url="https://www.suse.com/security/cve/CVE-2010-0013/" source="CVE"/>
		<reference ref_id="CVE-2010-0277" ref_url="https://www.suse.com/security/cve/CVE-2010-0277/" source="CVE"/>
		<reference ref_id="CVE-2010-0420" ref_url="https://www.suse.com/security/cve/CVE-2010-0420/" source="CVE"/>
		<reference ref_id="CVE-2010-0423" ref_url="https://www.suse.com/security/cve/CVE-2010-0423/" source="CVE"/>
		<reference ref_id="CVE-2010-1624" ref_url="https://www.suse.com/security/cve/CVE-2010-1624/" source="CVE"/>
		<reference ref_id="CVE-2010-2528" ref_url="https://www.suse.com/security/cve/CVE-2010-2528/" source="CVE"/>
		<reference ref_id="CVE-2010-3711" ref_url="https://www.suse.com/security/cve/CVE-2010-3711/" source="CVE"/>
		<reference ref_id="CVE-2011-1091" ref_url="https://www.suse.com/security/cve/CVE-2011-1091/" source="CVE"/>
		<reference ref_id="CVE-2011-3594" ref_url="https://www.suse.com/security/cve/CVE-2011-3594/" source="CVE"/>
		<reference ref_id="CVE-2012-2214" ref_url="https://www.suse.com/security/cve/CVE-2012-2214/" source="CVE"/>
		<reference ref_id="CVE-2012-3374" ref_url="https://www.suse.com/security/cve/CVE-2012-3374/" source="CVE"/>
		<reference ref_id="CVE-2012-6152" ref_url="https://www.suse.com/security/cve/CVE-2012-6152/" source="CVE"/>
		<reference ref_id="CVE-2013-0271" ref_url="https://www.suse.com/security/cve/CVE-2013-0271/" source="CVE"/>
		<reference ref_id="CVE-2013-0272" ref_url="https://www.suse.com/security/cve/CVE-2013-0272/" source="CVE"/>
		<reference ref_id="CVE-2013-0273" ref_url="https://www.suse.com/security/cve/CVE-2013-0273/" source="CVE"/>
		<reference ref_id="CVE-2013-0274" ref_url="https://www.suse.com/security/cve/CVE-2013-0274/" source="CVE"/>
		<reference ref_id="CVE-2013-6477" ref_url="https://www.suse.com/security/cve/CVE-2013-6477/" source="CVE"/>
		<reference ref_id="CVE-2013-6478" ref_url="https://www.suse.com/security/cve/CVE-2013-6478/" source="CVE"/>
		<reference ref_id="CVE-2013-6479" ref_url="https://www.suse.com/security/cve/CVE-2013-6479/" source="CVE"/>
		<reference ref_id="CVE-2013-6481" ref_url="https://www.suse.com/security/cve/CVE-2013-6481/" source="CVE"/>
		<reference ref_id="CVE-2013-6482" ref_url="https://www.suse.com/security/cve/CVE-2013-6482/" source="CVE"/>
		<reference ref_id="CVE-2013-6483" ref_url="https://www.suse.com/security/cve/CVE-2013-6483/" source="CVE"/>
		<reference ref_id="CVE-2013-6484" ref_url="https://www.suse.com/security/cve/CVE-2013-6484/" source="CVE"/>
		<reference ref_id="CVE-2013-6485" ref_url="https://www.suse.com/security/cve/CVE-2013-6485/" source="CVE"/>
		<reference ref_id="CVE-2013-6486" ref_url="https://www.suse.com/security/cve/CVE-2013-6486/" source="CVE"/>
		<reference ref_id="CVE-2013-6487" ref_url="https://www.suse.com/security/cve/CVE-2013-6487/" source="CVE"/>
		<reference ref_id="CVE-2014-0020" ref_url="https://www.suse.com/security/cve/CVE-2014-0020/" source="CVE"/>
		<reference ref_id="CVE-2014-3694" ref_url="https://www.suse.com/security/cve/CVE-2014-3694/" source="CVE"/>
		<reference ref_id="CVE-2014-3695" ref_url="https://www.suse.com/security/cve/CVE-2014-3695/" source="CVE"/>
		<reference ref_id="CVE-2014-3696" ref_url="https://www.suse.com/security/cve/CVE-2014-3696/" source="CVE"/>
		<reference ref_id="CVE-2014-3697" ref_url="https://www.suse.com/security/cve/CVE-2014-3697/" source="CVE"/>
		<reference ref_id="CVE-2014-3698" ref_url="https://www.suse.com/security/cve/CVE-2014-3698/" source="CVE"/>
		<reference ref_id="CVE-2017-2640" ref_url="https://www.suse.com/security/cve/CVE-2017-2640/" source="CVE"/>
		<description>
These are all security issues fixed in the finch-2.12.0-1.33 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2694/">CVE-2009-2694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2703/">CVE-2009-2703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3026/">CVE-2009-3026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3083/">CVE-2009-3083</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3084/">CVE-2009-3084</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3085/">CVE-2009-3085</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3615/">CVE-2009-3615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0013/">CVE-2010-0013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0277/">CVE-2010-0277</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0420/">CVE-2010-0420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0423/">CVE-2010-0423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1624/">CVE-2010-1624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2528/">CVE-2010-2528</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3711/">CVE-2010-3711</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1091/">CVE-2011-1091</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3594/">CVE-2011-3594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2214/">CVE-2012-2214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3374/">CVE-2012-3374</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6152/">CVE-2012-6152</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0271/">CVE-2013-0271</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0272/">CVE-2013-0272</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0273/">CVE-2013-0273</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0274/">CVE-2013-0274</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6477/">CVE-2013-6477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6478/">CVE-2013-6478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6479/">CVE-2013-6479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6481/">CVE-2013-6481</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6482/">CVE-2013-6482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6483/">CVE-2013-6483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6484/">CVE-2013-6484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6485/">CVE-2013-6485</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-6486/">CVE-2013-6486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6487/">CVE-2013-6487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0020/">CVE-2014-0020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3694/">CVE-2014-3694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3695/">CVE-2014-3695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3696/">CVE-2014-3696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3697/">CVE-2014-3697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3698/">CVE-2014-3698</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2640/">CVE-2017-2640</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159634" comment="finch-2.12.0-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159635" comment="libpurple-2.12.0-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159636" comment="libpurple-branding-upstream-2.12.0-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159637" comment="libpurple-lang-2.12.0-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159638" comment="libpurple-plugin-sametime-2.12.0-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159639" comment="libpurple-tcl-2.12.0-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159640" comment="pidgin-2.12.0-1.33 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76529" version="1" class="patch">
	<metadata>
		<title>fontconfig-2.11.1-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-5384" ref_url="https://www.suse.com/security/cve/CVE-2016-5384/" source="CVE"/>
		<description>
These are all security issues fixed in the fontconfig-2.11.1-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5384/">CVE-2016-5384</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140574" comment="fontconfig-2.11.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140575" comment="fontconfig-32bit-2.11.1-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76530" version="1" class="patch">
	<metadata>
		<title>freerdp-2.0.0~git.1463131968.4e66df7-11.69 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-0250" ref_url="https://www.suse.com/security/cve/CVE-2014-0250/" source="CVE"/>
		<reference ref_id="CVE-2014-0791" ref_url="https://www.suse.com/security/cve/CVE-2014-0791/" source="CVE"/>
		<description>
These are all security issues fixed in the freerdp-2.0.0~git.1463131968.4e66df7-11.69 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0250/">CVE-2014-0250</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0791/">CVE-2014-0791</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142100" comment="freerdp-2.0.0~git.1463131968.4e66df7-11.69 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142101" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-11.69 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76531" version="1" class="patch">
	<metadata>
		<title>ft2demos-2.6.3-7.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0946" ref_url="https://www.suse.com/security/cve/CVE-2009-0946/" source="CVE"/>
		<reference ref_id="CVE-2010-2497" ref_url="https://www.suse.com/security/cve/CVE-2010-2497/" source="CVE"/>
		<reference ref_id="CVE-2010-2805" ref_url="https://www.suse.com/security/cve/CVE-2010-2805/" source="CVE"/>
		<reference ref_id="CVE-2010-3053" ref_url="https://www.suse.com/security/cve/CVE-2010-3053/" source="CVE"/>
		<reference ref_id="CVE-2010-3054" ref_url="https://www.suse.com/security/cve/CVE-2010-3054/" source="CVE"/>
		<reference ref_id="CVE-2010-3311" ref_url="https://www.suse.com/security/cve/CVE-2010-3311/" source="CVE"/>
		<reference ref_id="CVE-2010-3814" ref_url="https://www.suse.com/security/cve/CVE-2010-3814/" source="CVE"/>
		<reference ref_id="CVE-2011-0226" ref_url="https://www.suse.com/security/cve/CVE-2011-0226/" source="CVE"/>
		<reference ref_id="CVE-2012-5668" ref_url="https://www.suse.com/security/cve/CVE-2012-5668/" source="CVE"/>
		<reference ref_id="CVE-2012-5669" ref_url="https://www.suse.com/security/cve/CVE-2012-5669/" source="CVE"/>
		<reference ref_id="CVE-2012-5670" ref_url="https://www.suse.com/security/cve/CVE-2012-5670/" source="CVE"/>
		<reference ref_id="CVE-2014-2240" ref_url="https://www.suse.com/security/cve/CVE-2014-2240/" source="CVE"/>
		<reference ref_id="CVE-2014-9656" ref_url="https://www.suse.com/security/cve/CVE-2014-9656/" source="CVE"/>
		<reference ref_id="CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657/" source="CVE"/>
		<reference ref_id="CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658/" source="CVE"/>
		<reference ref_id="CVE-2014-9659" ref_url="https://www.suse.com/security/cve/CVE-2014-9659/" source="CVE"/>
		<reference ref_id="CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660/" source="CVE"/>
		<reference ref_id="CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661/" source="CVE"/>
		<reference ref_id="CVE-2014-9662" ref_url="https://www.suse.com/security/cve/CVE-2014-9662/" source="CVE"/>
		<reference ref_id="CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663/" source="CVE"/>
		<reference ref_id="CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664/" source="CVE"/>
		<reference ref_id="CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665/" source="CVE"/>
		<reference ref_id="CVE-2014-9666" ref_url="https://www.suse.com/security/cve/CVE-2014-9666/" source="CVE"/>
		<reference ref_id="CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667/" source="CVE"/>
		<reference ref_id="CVE-2014-9668" ref_url="https://www.suse.com/security/cve/CVE-2014-9668/" source="CVE"/>
		<reference ref_id="CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669/" source="CVE"/>
		<reference ref_id="CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670/" source="CVE"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<reference ref_id="CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672/" source="CVE"/>
		<reference ref_id="CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673/" source="CVE"/>
		<reference ref_id="CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674/" source="CVE"/>
		<reference ref_id="CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675/" source="CVE"/>
		<description>
These are all security issues fixed in the ft2demos-2.6.3-7.10.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0946/">CVE-2009-0946</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2497/">CVE-2010-2497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2805/">CVE-2010-2805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3053/">CVE-2010-3053</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3054/">CVE-2010-3054</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3311/">CVE-2010-3311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3814/">CVE-2010-3814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0226/">CVE-2011-0226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5668/">CVE-2012-5668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5669/">CVE-2012-5669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5670/">CVE-2012-5670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2240/">CVE-2014-2240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9656/">CVE-2014-9656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9659/">CVE-2014-9659</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9662/">CVE-2014-9662</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9666/">CVE-2014-9666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9668/">CVE-2014-9668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76532" version="1" class="patch">
	<metadata>
		<title>fuse-2.9.3-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-3297" ref_url="https://www.suse.com/security/cve/CVE-2009-3297/" source="CVE"/>
		<reference ref_id="CVE-2011-0541" ref_url="https://www.suse.com/security/cve/CVE-2011-0541/" source="CVE"/>
		<reference ref_id="CVE-2015-3202" ref_url="https://www.suse.com/security/cve/CVE-2015-3202/" source="CVE"/>
		<description>
These are all security issues fixed in the fuse-2.9.3-5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3297/">CVE-2009-3297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0541/">CVE-2011-0541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3202/">CVE-2015-3202</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110488" comment="fuse-2.9.3-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110491" comment="libfuse2-2.9.3-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76533" version="1" class="patch">
	<metadata>
		<title>gd-2.1.0-23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-2497" ref_url="https://www.suse.com/security/cve/CVE-2014-2497/" source="CVE"/>
		<reference ref_id="CVE-2014-9709" ref_url="https://www.suse.com/security/cve/CVE-2014-9709/" source="CVE"/>
		<reference ref_id="CVE-2016-10166" ref_url="https://www.suse.com/security/cve/CVE-2016-10166/" source="CVE"/>
		<reference ref_id="CVE-2016-10167" ref_url="https://www.suse.com/security/cve/CVE-2016-10167/" source="CVE"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<reference ref_id="CVE-2016-5116" ref_url="https://www.suse.com/security/cve/CVE-2016-5116/" source="CVE"/>
		<reference ref_id="CVE-2016-6128" ref_url="https://www.suse.com/security/cve/CVE-2016-6128/" source="CVE"/>
		<reference ref_id="CVE-2016-6132" ref_url="https://www.suse.com/security/cve/CVE-2016-6132/" source="CVE"/>
		<reference ref_id="CVE-2016-6161" ref_url="https://www.suse.com/security/cve/CVE-2016-6161/" source="CVE"/>
		<reference ref_id="CVE-2016-6207" ref_url="https://www.suse.com/security/cve/CVE-2016-6207/" source="CVE"/>
		<reference ref_id="CVE-2016-6214" ref_url="https://www.suse.com/security/cve/CVE-2016-6214/" source="CVE"/>
		<reference ref_id="CVE-2016-6905" ref_url="https://www.suse.com/security/cve/CVE-2016-6905/" source="CVE"/>
		<reference ref_id="CVE-2016-6906" ref_url="https://www.suse.com/security/cve/CVE-2016-6906/" source="CVE"/>
		<reference ref_id="CVE-2016-6911" ref_url="https://www.suse.com/security/cve/CVE-2016-6911/" source="CVE"/>
		<reference ref_id="CVE-2016-6912" ref_url="https://www.suse.com/security/cve/CVE-2016-6912/" source="CVE"/>
		<reference ref_id="CVE-2016-7568" ref_url="https://www.suse.com/security/cve/CVE-2016-7568/" source="CVE"/>
		<reference ref_id="CVE-2016-8670" ref_url="https://www.suse.com/security/cve/CVE-2016-8670/" source="CVE"/>
		<reference ref_id="CVE-2016-9317" ref_url="https://www.suse.com/security/cve/CVE-2016-9317/" source="CVE"/>
		<reference ref_id="CVE-2016-9933" ref_url="https://www.suse.com/security/cve/CVE-2016-9933/" source="CVE"/>
		<description>
These are all security issues fixed in the gd-2.1.0-23.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2497/">CVE-2014-2497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9709/">CVE-2014-9709</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10166/">CVE-2016-10166</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10167/">CVE-2016-10167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5116/">CVE-2016-5116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6128/">CVE-2016-6128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6132/">CVE-2016-6132</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6161/">CVE-2016-6161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6207/">CVE-2016-6207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6214/">CVE-2016-6214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6905/">CVE-2016-6905</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6906/">CVE-2016-6906</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6911/">CVE-2016-6911</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6912/">CVE-2016-6912</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7568/">CVE-2016-7568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8670/">CVE-2016-8670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9317/">CVE-2016-9317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9933/">CVE-2016-9933</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009148438" comment="gd-2.1.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009148439" comment="gd-32bit-2.1.0-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76534" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-lang-2.34.0-18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-2485" ref_url="https://www.suse.com/security/cve/CVE-2011-2485/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-7552" ref_url="https://www.suse.com/security/cve/CVE-2015-7552/" source="CVE"/>
		<reference ref_id="CVE-2015-7673" ref_url="https://www.suse.com/security/cve/CVE-2015-7673/" source="CVE"/>
		<reference ref_id="CVE-2015-7674" ref_url="https://www.suse.com/security/cve/CVE-2015-7674/" source="CVE"/>
		<reference ref_id="CVE-2016-6352" ref_url="https://www.suse.com/security/cve/CVE-2016-6352/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-lang-2.34.0-18.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2485/">CVE-2011-2485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7552/">CVE-2015-7552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7673/">CVE-2015-7673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7674/">CVE-2015-7674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6352/">CVE-2016-6352</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009158993" comment="gdk-pixbuf-lang-2.34.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158994" comment="gdk-pixbuf-query-loaders-2.34.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158995" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158996" comment="libgdk_pixbuf-2_0-0-2.34.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158997" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158998" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76535" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-loader-rsvg-2.40.15-4.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-3146" ref_url="https://www.suse.com/security/cve/CVE-2011-3146/" source="CVE"/>
		<reference ref_id="CVE-2013-1881" ref_url="https://www.suse.com/security/cve/CVE-2013-1881/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-loader-rsvg-2.40.15-4.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3146/">CVE-2011-3146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1881/">CVE-2013-1881</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140597" comment="gdk-pixbuf-loader-rsvg-2.40.15-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140598" comment="librsvg-2-2-2.40.15-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140599" comment="librsvg-2-2-32bit-2.40.15-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140600" comment="rsvg-view-2.40.15-4.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76536" version="1" class="patch">
	<metadata>
		<title>gdm-3.10.0.1-52.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1709" ref_url="https://www.suse.com/security/cve/CVE-2011-1709/" source="CVE"/>
		<description>
These are all security issues fixed in the gdm-3.10.0.1-52.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1709/">CVE-2011-1709</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140601" comment="gdm-3.10.0.1-52.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140602" comment="gdm-lang-3.10.0.1-52.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140603" comment="gdmflexiserver-3.10.0.1-52.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140604" comment="libgdm1-3.10.0.1-52.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140605" comment="typelib-1_0-Gdm-1_0-3.10.0.1-52.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76537" version="1" class="patch">
	<metadata>
		<title>gegl-0_2-0.2.0-14.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-4433" ref_url="https://www.suse.com/security/cve/CVE-2012-4433/" source="CVE"/>
		<description>
These are all security issues fixed in the gegl-0_2-0.2.0-14.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4433/">CVE-2012-4433</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009149576" comment="gegl-0_2-0.2.0-14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009149577" comment="gegl-0_2-lang-0.2.0-14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009149578" comment="libgegl-0_2-0-0.2.0-14.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76538" version="1" class="patch">
	<metadata>
		<title>ghostscript-9.15-22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-5653" ref_url="https://www.suse.com/security/cve/CVE-2013-5653/" source="CVE"/>
		<reference ref_id="CVE-2015-3228" ref_url="https://www.suse.com/security/cve/CVE-2015-3228/" source="CVE"/>
		<reference ref_id="CVE-2016-10220" ref_url="https://www.suse.com/security/cve/CVE-2016-10220/" source="CVE"/>
		<reference ref_id="CVE-2016-7978" ref_url="https://www.suse.com/security/cve/CVE-2016-7978/" source="CVE"/>
		<reference ref_id="CVE-2016-7979" ref_url="https://www.suse.com/security/cve/CVE-2016-7979/" source="CVE"/>
		<reference ref_id="CVE-2016-8602" ref_url="https://www.suse.com/security/cve/CVE-2016-8602/" source="CVE"/>
		<reference ref_id="CVE-2016-9601" ref_url="https://www.suse.com/security/cve/CVE-2016-9601/" source="CVE"/>
		<reference ref_id="CVE-2017-5951" ref_url="https://www.suse.com/security/cve/CVE-2017-5951/" source="CVE"/>
		<reference ref_id="CVE-2017-7207" ref_url="https://www.suse.com/security/cve/CVE-2017-7207/" source="CVE"/>
		<reference ref_id="CVE-2017-8291" ref_url="https://www.suse.com/security/cve/CVE-2017-8291/" source="CVE"/>
		<description>
These are all security issues fixed in the ghostscript-9.15-22.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5653/">CVE-2013-5653</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3228/">CVE-2015-3228</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10220/">CVE-2016-10220</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7978/">CVE-2016-7978</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7979/">CVE-2016-7979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8602/">CVE-2016-8602</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9601/">CVE-2016-9601</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5951/">CVE-2017-5951</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-7207/">CVE-2017-7207</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-8291/">CVE-2017-8291</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009155975" comment="ghostscript-9.15-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155976" comment="ghostscript-x11-9.15-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76539" version="1" class="patch">
	<metadata>
		<title>gimp-2.8.18-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-3126" ref_url="https://www.suse.com/security/cve/CVE-2007-3126/" source="CVE"/>
		<reference ref_id="CVE-2010-4540" ref_url="https://www.suse.com/security/cve/CVE-2010-4540/" source="CVE"/>
		<reference ref_id="CVE-2010-4541" ref_url="https://www.suse.com/security/cve/CVE-2010-4541/" source="CVE"/>
		<reference ref_id="CVE-2010-4542" ref_url="https://www.suse.com/security/cve/CVE-2010-4542/" source="CVE"/>
		<reference ref_id="CVE-2010-4543" ref_url="https://www.suse.com/security/cve/CVE-2010-4543/" source="CVE"/>
		<reference ref_id="CVE-2011-2896" ref_url="https://www.suse.com/security/cve/CVE-2011-2896/" source="CVE"/>
		<reference ref_id="CVE-2012-3236" ref_url="https://www.suse.com/security/cve/CVE-2012-3236/" source="CVE"/>
		<reference ref_id="CVE-2012-5576" ref_url="https://www.suse.com/security/cve/CVE-2012-5576/" source="CVE"/>
		<reference ref_id="CVE-2016-4994" ref_url="https://www.suse.com/security/cve/CVE-2016-4994/" source="CVE"/>
		<description>
These are all security issues fixed in the gimp-2.8.18-8.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2007-3126/">CVE-2007-3126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4540/">CVE-2010-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4541/">CVE-2010-4541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4542/">CVE-2010-4542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4543/">CVE-2010-4543</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2896/">CVE-2011-2896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3236/">CVE-2012-3236</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5576/">CVE-2012-5576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4994/">CVE-2016-4994</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009150803" comment="gimp-2.8.18-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150804" comment="gimp-lang-2.8.18-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150805" comment="gimp-plugins-python-2.8.18-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150806" comment="libgimp-2_0-0-2.8.18-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150807" comment="libgimpui-2_0-0-2.8.18-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76540" version="1" class="patch">
	<metadata>
		<title>glib2-lang-2.48.2-10.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-4316" ref_url="https://www.suse.com/security/cve/CVE-2008-4316/" source="CVE"/>
		<reference ref_id="CVE-2012-3524" ref_url="https://www.suse.com/security/cve/CVE-2012-3524/" source="CVE"/>
		<description>
These are all security issues fixed in the glib2-lang-2.48.2-10.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4316/">CVE-2008-4316</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3524/">CVE-2012-3524</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140606" comment="glib2-lang-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140607" comment="glib2-tools-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140608" comment="libgio-2_0-0-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140609" comment="libgio-2_0-0-32bit-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142107" comment="libgio-fam-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140610" comment="libglib-2_0-0-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140611" comment="libglib-2_0-0-32bit-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140612" comment="libgmodule-2_0-0-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140613" comment="libgmodule-2_0-0-32bit-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140614" comment="libgobject-2_0-0-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140615" comment="libgobject-2_0-0-32bit-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140616" comment="libgthread-2_0-0-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140617" comment="libgthread-2_0-0-32bit-2.48.2-10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76541" version="1" class="patch">
	<metadata>
		<title>glibc-2.22-61.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-5029" ref_url="https://www.suse.com/security/cve/CVE-2009-5029/" source="CVE"/>
		<reference ref_id="CVE-2012-3406" ref_url="https://www.suse.com/security/cve/CVE-2012-3406/" source="CVE"/>
		<reference ref_id="CVE-2012-4412" ref_url="https://www.suse.com/security/cve/CVE-2012-4412/" source="CVE"/>
		<reference ref_id="CVE-2013-0242" ref_url="https://www.suse.com/security/cve/CVE-2013-0242/" source="CVE"/>
		<reference ref_id="CVE-2013-1914" ref_url="https://www.suse.com/security/cve/CVE-2013-1914/" source="CVE"/>
		<reference ref_id="CVE-2013-2207" ref_url="https://www.suse.com/security/cve/CVE-2013-2207/" source="CVE"/>
		<reference ref_id="CVE-2013-4237" ref_url="https://www.suse.com/security/cve/CVE-2013-4237/" source="CVE"/>
		<reference ref_id="CVE-2013-4332" ref_url="https://www.suse.com/security/cve/CVE-2013-4332/" source="CVE"/>
		<reference ref_id="CVE-2013-4458" ref_url="https://www.suse.com/security/cve/CVE-2013-4458/" source="CVE"/>
		<reference ref_id="CVE-2013-7423" ref_url="https://www.suse.com/security/cve/CVE-2013-7423/" source="CVE"/>
		<reference ref_id="CVE-2014-0475" ref_url="https://www.suse.com/security/cve/CVE-2014-0475/" source="CVE"/>
		<reference ref_id="CVE-2014-4043" ref_url="https://www.suse.com/security/cve/CVE-2014-4043/" source="CVE"/>
		<reference ref_id="CVE-2014-5119" ref_url="https://www.suse.com/security/cve/CVE-2014-5119/" source="CVE"/>
		<reference ref_id="CVE-2014-6040" ref_url="https://www.suse.com/security/cve/CVE-2014-6040/" source="CVE"/>
		<reference ref_id="CVE-2014-7817" ref_url="https://www.suse.com/security/cve/CVE-2014-7817/" source="CVE"/>
		<reference ref_id="CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121/" source="CVE"/>
		<reference ref_id="CVE-2014-9402" ref_url="https://www.suse.com/security/cve/CVE-2014-9402/" source="CVE"/>
		<reference ref_id="CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761/" source="CVE"/>
		<reference ref_id="CVE-2015-1472" ref_url="https://www.suse.com/security/cve/CVE-2015-1472/" source="CVE"/>
		<reference ref_id="CVE-2015-1473" ref_url="https://www.suse.com/security/cve/CVE-2015-1473/" source="CVE"/>
		<reference ref_id="CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781/" source="CVE"/>
		<reference ref_id="CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547/" source="CVE"/>
		<reference ref_id="CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776/" source="CVE"/>
		<reference ref_id="CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777/" source="CVE"/>
		<reference ref_id="CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778/" source="CVE"/>
		<reference ref_id="CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779/" source="CVE"/>
		<reference ref_id="CVE-2016-1234" ref_url="https://www.suse.com/security/cve/CVE-2016-1234/" source="CVE"/>
		<reference ref_id="CVE-2016-3075" ref_url="https://www.suse.com/security/cve/CVE-2016-3075/" source="CVE"/>
		<reference ref_id="CVE-2016-3706" ref_url="https://www.suse.com/security/cve/CVE-2016-3706/" source="CVE"/>
		<reference ref_id="CVE-2016-4429" ref_url="https://www.suse.com/security/cve/CVE-2016-4429/" source="CVE"/>
		<reference ref_id="CVE-2017-1000366" ref_url="https://www.suse.com/security/cve/CVE-2017-1000366/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-2.22-61.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5029/">CVE-2009-5029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3406/">CVE-2012-3406</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4412/">CVE-2012-4412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0242/">CVE-2013-0242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1914/">CVE-2013-1914</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2207/">CVE-2013-2207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4237/">CVE-2013-4237</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4332/">CVE-2013-4332</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4458/">CVE-2013-4458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7423/">CVE-2013-7423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0475/">CVE-2014-0475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4043/">CVE-2014-4043</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5119/">CVE-2014-5119</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6040/">CVE-2014-6040</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7817/">CVE-2014-7817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9402/">CVE-2014-9402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1472/">CVE-2015-1472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1473/">CVE-2015-1473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1234/">CVE-2016-1234</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3075/">CVE-2016-3075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3706/">CVE-2016-3706</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4429/">CVE-2016-4429</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000366/">CVE-2017-1000366</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76542" version="1" class="patch">
	<metadata>
		<title>gnome-keyring-3.20.0-27.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-3466" ref_url="https://www.suse.com/security/cve/CVE-2012-3466/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-keyring-3.20.0-27.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3466/">CVE-2012-3466</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140630" comment="gnome-keyring-3.20.0-27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140631" comment="gnome-keyring-32bit-3.20.0-27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140632" comment="gnome-keyring-lang-3.20.0-27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140633" comment="gnome-keyring-pam-3.20.0-27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140634" comment="gnome-keyring-pam-32bit-3.20.0-27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140635" comment="libgck-modules-gnome-keyring-3.20.0-27.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76543" version="1" class="patch">
	<metadata>
		<title>gnome-online-accounts-3.20.5-9.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-0240" ref_url="https://www.suse.com/security/cve/CVE-2013-0240/" source="CVE"/>
		<reference ref_id="CVE-2013-1799" ref_url="https://www.suse.com/security/cve/CVE-2013-1799/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-online-accounts-3.20.5-9.6 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0240/">CVE-2013-0240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1799/">CVE-2013-1799</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159641" comment="gnome-online-accounts-3.20.5-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159642" comment="gnome-online-accounts-lang-3.20.5-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159138" comment="libgoa-1_0-0-3.20.5-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159643" comment="libgoa-1_0-0-32bit-3.20.5-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159139" comment="libgoa-backend-1_0-1-3.20.5-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159644" comment="typelib-1_0-Goa-1_0-3.20.5-9.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76544" version="1" class="patch">
	<metadata>
		<title>gnome-settings-daemon-3.20.1-49.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-7300" ref_url="https://www.suse.com/security/cve/CVE-2014-7300/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-settings-daemon-3.20.1-49.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7300/">CVE-2014-7300</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009158999" comment="gnome-settings-daemon-3.20.1-49.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159000" comment="gnome-settings-daemon-lang-3.20.1-49.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76545" version="1" class="patch">
	<metadata>
		<title>gnome-shell-3.20.4-76.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-4000" ref_url="https://www.suse.com/security/cve/CVE-2010-4000/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-shell-3.20.4-76.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4000/">CVE-2010-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159001" comment="gnome-shell-3.20.4-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159002" comment="gnome-shell-browser-plugin-3.20.4-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159645" comment="gnome-shell-calendar-3.20.4-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159003" comment="gnome-shell-lang-3.20.4-76.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76546" version="1" class="patch">
	<metadata>
		<title>gnutls-3.3.27-1.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-4989" ref_url="https://www.suse.com/security/cve/CVE-2008-4989/" source="CVE"/>
		<reference ref_id="CVE-2011-4128" ref_url="https://www.suse.com/security/cve/CVE-2011-4128/" source="CVE"/>
		<reference ref_id="CVE-2012-0390" ref_url="https://www.suse.com/security/cve/CVE-2012-0390/" source="CVE"/>
		<reference ref_id="CVE-2012-1569" ref_url="https://www.suse.com/security/cve/CVE-2012-1569/" source="CVE"/>
		<reference ref_id="CVE-2012-1573" ref_url="https://www.suse.com/security/cve/CVE-2012-1573/" source="CVE"/>
		<reference ref_id="CVE-2014-0092" ref_url="https://www.suse.com/security/cve/CVE-2014-0092/" source="CVE"/>
		<reference ref_id="CVE-2014-1959" ref_url="https://www.suse.com/security/cve/CVE-2014-1959/" source="CVE"/>
		<reference ref_id="CVE-2014-3466" ref_url="https://www.suse.com/security/cve/CVE-2014-3466/" source="CVE"/>
		<reference ref_id="CVE-2014-8564" ref_url="https://www.suse.com/security/cve/CVE-2014-8564/" source="CVE"/>
		<reference ref_id="CVE-2015-0294" ref_url="https://www.suse.com/security/cve/CVE-2015-0294/" source="CVE"/>
		<reference ref_id="CVE-2015-3622" ref_url="https://www.suse.com/security/cve/CVE-2015-3622/" source="CVE"/>
		<reference ref_id="CVE-2015-6251" ref_url="https://www.suse.com/security/cve/CVE-2015-6251/" source="CVE"/>
		<reference ref_id="CVE-2016-7444" ref_url="https://www.suse.com/security/cve/CVE-2016-7444/" source="CVE"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2017-5335" ref_url="https://www.suse.com/security/cve/CVE-2017-5335/" source="CVE"/>
		<reference ref_id="CVE-2017-5336" ref_url="https://www.suse.com/security/cve/CVE-2017-5336/" source="CVE"/>
		<reference ref_id="CVE-2017-5337" ref_url="https://www.suse.com/security/cve/CVE-2017-5337/" source="CVE"/>
		<description>
These are all security issues fixed in the gnutls-3.3.27-1.10 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4989/">CVE-2008-4989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4128/">CVE-2011-4128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0390/">CVE-2012-0390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1569/">CVE-2012-1569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1573/">CVE-2012-1573</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0092/">CVE-2014-0092</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1959/">CVE-2014-1959</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3466/">CVE-2014-3466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8564/">CVE-2014-8564</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0294/">CVE-2015-0294</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3622/">CVE-2015-3622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6251/">CVE-2015-6251</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7444/">CVE-2016-7444</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5335/">CVE-2017-5335</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5336/">CVE-2017-5336</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5337/">CVE-2017-5337</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159004" comment="gnutls-3.3.27-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159006" comment="libgnutls28-3.3.27-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159007" comment="libgnutls28-32bit-3.3.27-1.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76547" version="1" class="patch">
	<metadata>
		<title>gpg2-2.0.24-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2547" ref_url="https://www.suse.com/security/cve/CVE-2010-2547/" source="CVE"/>
		<reference ref_id="CVE-2013-4351" ref_url="https://www.suse.com/security/cve/CVE-2013-4351/" source="CVE"/>
		<reference ref_id="CVE-2013-4402" ref_url="https://www.suse.com/security/cve/CVE-2013-4402/" source="CVE"/>
		<reference ref_id="CVE-2014-4617" ref_url="https://www.suse.com/security/cve/CVE-2014-4617/" source="CVE"/>
		<reference ref_id="CVE-2015-1606" ref_url="https://www.suse.com/security/cve/CVE-2015-1606/" source="CVE"/>
		<reference ref_id="CVE-2015-1607" ref_url="https://www.suse.com/security/cve/CVE-2015-1607/" source="CVE"/>
		<description>
These are all security issues fixed in the gpg2-2.0.24-8.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2547/">CVE-2010-2547</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4351/">CVE-2013-4351</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4402/">CVE-2013-4402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4617/">CVE-2014-4617</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1606/">CVE-2015-1606</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1607/">CVE-2015-1607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159008" comment="gpg2-2.0.24-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159009" comment="gpg2-lang-2.0.24-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76548" version="1" class="patch">
	<metadata>
		<title>gpgme-1.5.1-1.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-3564" ref_url="https://www.suse.com/security/cve/CVE-2014-3564/" source="CVE"/>
		<description>
These are all security issues fixed in the gpgme-1.5.1-1.12 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3564/">CVE-2014-3564</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140643" comment="gpgme-1.5.1-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140644" comment="libgpgme11-1.5.1-1.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76549" version="1" class="patch">
	<metadata>
		<title>groff-1.22.2-5.429 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-5044" ref_url="https://www.suse.com/security/cve/CVE-2009-5044/" source="CVE"/>
		<reference ref_id="CVE-2009-5080" ref_url="https://www.suse.com/security/cve/CVE-2009-5080/" source="CVE"/>
		<reference ref_id="CVE-2009-5081" ref_url="https://www.suse.com/security/cve/CVE-2009-5081/" source="CVE"/>
		<description>
These are all security issues fixed in the groff-1.22.2-5.429 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5044/">CVE-2009-5044</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-5080/">CVE-2009-5080</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-5081/">CVE-2009-5081</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140645" comment="groff-1.22.2-5.429 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76550" version="1" class="patch">
	<metadata>
		<title>grub2-2.02-2.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-8370" ref_url="https://www.suse.com/security/cve/CVE-2015-8370/" source="CVE"/>
		<description>
These are all security issues fixed in the grub2-2.02-2.12 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8370/">CVE-2015-8370</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159010" comment="grub2-2.02-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159012" comment="grub2-i386-pc-2.02-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159015" comment="grub2-snapper-plugin-2.02-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159016" comment="grub2-systemd-sleep-plugin-2.02-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159017" comment="grub2-x86_64-efi-2.02-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159018" comment="grub2-x86_64-xen-2.02-2.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76551" version="1" class="patch">
	<metadata>
		<title>gstreamer-0_10-plugins-bad-0.10.23-25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-0797" ref_url="https://www.suse.com/security/cve/CVE-2015-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-9445" ref_url="https://www.suse.com/security/cve/CVE-2016-9445/" source="CVE"/>
		<reference ref_id="CVE-2016-9446" ref_url="https://www.suse.com/security/cve/CVE-2016-9446/" source="CVE"/>
		<reference ref_id="CVE-2016-9447" ref_url="https://www.suse.com/security/cve/CVE-2016-9447/" source="CVE"/>
		<reference ref_id="CVE-2016-9809" ref_url="https://www.suse.com/security/cve/CVE-2016-9809/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-0_10-plugins-bad-0.10.23-25.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0797/">CVE-2015-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9445/">CVE-2016-9445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9446/">CVE-2016-9446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9447/">CVE-2016-9447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9809/">CVE-2016-9809</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009147825" comment="gstreamer-0_10-plugins-bad-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009147829" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009147830" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009147831" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009147832" comment="libgstbasevideo-0_10-23-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009147833" comment="libgstbasevideo-0_10-23-32bit-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009147834" comment="libgstcodecparsers-0_10-23-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009147836" comment="libgstphotography-0_10-23-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009147837" comment="libgstphotography-0_10-23-32bit-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009147838" comment="libgstsignalprocessor-0_10-23-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009147839" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009147840" comment="libgstvdp-0_10-23-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009147841" comment="libgstvdp-0_10-23-32bit-0.10.23-25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76552" version="1" class="patch">
	<metadata>
		<title>gstreamer-0_10-plugins-base-0.10.36-17.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-9811" ref_url="https://www.suse.com/security/cve/CVE-2016-9811/" source="CVE"/>
		<reference ref_id="CVE-2017-5837" ref_url="https://www.suse.com/security/cve/CVE-2017-5837/" source="CVE"/>
		<reference ref_id="CVE-2017-5844" ref_url="https://www.suse.com/security/cve/CVE-2017-5844/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-0_10-plugins-base-0.10.36-17.13 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9811/">CVE-2016-9811</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5837/">CVE-2017-5837</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5844/">CVE-2017-5844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154327" comment="gstreamer-0_10-plugins-base-0.10.36-17.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154328" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-17.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154329" comment="gstreamer-0_10-plugins-base-lang-0.10.36-17.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154330" comment="libgstapp-0_10-0-0.10.36-17.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154331" comment="libgstapp-0_10-0-32bit-0.10.36-17.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154332" comment="libgstinterfaces-0_10-0-0.10.36-17.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154333" comment="libgstinterfaces-0_10-0-32bit-0.10.36-17.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76553" version="1" class="patch">
	<metadata>
		<title>gstreamer-0_10-plugins-good-0.10.31-16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-9634" ref_url="https://www.suse.com/security/cve/CVE-2016-9634/" source="CVE"/>
		<reference ref_id="CVE-2016-9635" ref_url="https://www.suse.com/security/cve/CVE-2016-9635/" source="CVE"/>
		<reference ref_id="CVE-2016-9636" ref_url="https://www.suse.com/security/cve/CVE-2016-9636/" source="CVE"/>
		<reference ref_id="CVE-2016-9807" ref_url="https://www.suse.com/security/cve/CVE-2016-9807/" source="CVE"/>
		<reference ref_id="CVE-2016-9808" ref_url="https://www.suse.com/security/cve/CVE-2016-9808/" source="CVE"/>
		<reference ref_id="CVE-2016-9810" ref_url="https://www.suse.com/security/cve/CVE-2016-9810/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-0_10-plugins-good-0.10.31-16.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9634/">CVE-2016-9634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9635/">CVE-2016-9635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9636/">CVE-2016-9636</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9807/">CVE-2016-9807</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9808/">CVE-2016-9808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9810/">CVE-2016-9810</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009147371" comment="gstreamer-0_10-plugins-good-0.10.31-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009147372" comment="gstreamer-0_10-plugins-good-lang-0.10.31-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76554" version="1" class="patch">
	<metadata>
		<title>gstreamer-1.8.3-9.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2017-5838" ref_url="https://www.suse.com/security/cve/CVE-2017-5838/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-1.8.3-9.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5838/">CVE-2017-5838</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009150843" comment="gstreamer-1.8.3-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150844" comment="gstreamer-lang-1.8.3-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150845" comment="gstreamer-utils-1.8.3-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150846" comment="libgstreamer-1_0-0-1.8.3-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150847" comment="libgstreamer-1_0-0-32bit-1.8.3-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150848" comment="typelib-1_0-Gst-1_0-1.8.3-9.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76555" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-bad-1.8.3-17.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-9445" ref_url="https://www.suse.com/security/cve/CVE-2016-9445/" source="CVE"/>
		<reference ref_id="CVE-2016-9446" ref_url="https://www.suse.com/security/cve/CVE-2016-9446/" source="CVE"/>
		<reference ref_id="CVE-2016-9809" ref_url="https://www.suse.com/security/cve/CVE-2016-9809/" source="CVE"/>
		<reference ref_id="CVE-2016-9812" ref_url="https://www.suse.com/security/cve/CVE-2016-9812/" source="CVE"/>
		<reference ref_id="CVE-2016-9813" ref_url="https://www.suse.com/security/cve/CVE-2016-9813/" source="CVE"/>
		<reference ref_id="CVE-2017-5843" ref_url="https://www.suse.com/security/cve/CVE-2017-5843/" source="CVE"/>
		<reference ref_id="CVE-2017-5848" ref_url="https://www.suse.com/security/cve/CVE-2017-5848/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-bad-1.8.3-17.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9445/">CVE-2016-9445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9446/">CVE-2016-9446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9809/">CVE-2016-9809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9812/">CVE-2016-9812</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9813/">CVE-2016-9813</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5843/">CVE-2017-5843</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5848/">CVE-2017-5848</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009150831" comment="gstreamer-plugins-bad-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150832" comment="gstreamer-plugins-bad-lang-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150833" comment="libgstadaptivedemux-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150834" comment="libgstbadaudio-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150835" comment="libgstbadbase-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150836" comment="libgstbadvideo-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150837" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150838" comment="libgstcodecparsers-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150839" comment="libgstgl-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150840" comment="libgstmpegts-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150841" comment="libgstphotography-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150842" comment="libgsturidownloader-1_0-0-1.8.3-17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76556" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-base-1.8.3-12.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-9811" ref_url="https://www.suse.com/security/cve/CVE-2016-9811/" source="CVE"/>
		<reference ref_id="CVE-2017-5837" ref_url="https://www.suse.com/security/cve/CVE-2017-5837/" source="CVE"/>
		<reference ref_id="CVE-2017-5839" ref_url="https://www.suse.com/security/cve/CVE-2017-5839/" source="CVE"/>
		<reference ref_id="CVE-2017-5842" ref_url="https://www.suse.com/security/cve/CVE-2017-5842/" source="CVE"/>
		<reference ref_id="CVE-2017-5844" ref_url="https://www.suse.com/security/cve/CVE-2017-5844/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-base-1.8.3-12.11 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9811/">CVE-2016-9811</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5837/">CVE-2017-5837</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5839/">CVE-2017-5839</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5842/">CVE-2017-5842</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5844/">CVE-2017-5844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154408" comment="gstreamer-plugins-base-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154409" comment="gstreamer-plugins-base-lang-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154410" comment="libgstallocators-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154411" comment="libgstapp-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154412" comment="libgstapp-1_0-0-32bit-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154413" comment="libgstaudio-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154414" comment="libgstaudio-1_0-0-32bit-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154415" comment="libgstfft-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154416" comment="libgstfft-1_0-0-32bit-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154417" comment="libgstpbutils-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154418" comment="libgstpbutils-1_0-0-32bit-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154419" comment="libgstriff-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154420" comment="libgstrtp-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154421" comment="libgstrtsp-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154422" comment="libgstsdp-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154423" comment="libgsttag-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154424" comment="libgsttag-1_0-0-32bit-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154425" comment="libgstvideo-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154426" comment="libgstvideo-1_0-0-32bit-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154427" comment="typelib-1_0-GstAudio-1_0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154428" comment="typelib-1_0-GstPbutils-1_0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154429" comment="typelib-1_0-GstTag-1_0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154430" comment="typelib-1_0-GstVideo-1_0-1.8.3-12.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76557" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-good-1.8.3-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-10198" ref_url="https://www.suse.com/security/cve/CVE-2016-10198/" source="CVE"/>
		<reference ref_id="CVE-2016-10199" ref_url="https://www.suse.com/security/cve/CVE-2016-10199/" source="CVE"/>
		<reference ref_id="CVE-2016-9634" ref_url="https://www.suse.com/security/cve/CVE-2016-9634/" source="CVE"/>
		<reference ref_id="CVE-2016-9635" ref_url="https://www.suse.com/security/cve/CVE-2016-9635/" source="CVE"/>
		<reference ref_id="CVE-2016-9636" ref_url="https://www.suse.com/security/cve/CVE-2016-9636/" source="CVE"/>
		<reference ref_id="CVE-2016-9807" ref_url="https://www.suse.com/security/cve/CVE-2016-9807/" source="CVE"/>
		<reference ref_id="CVE-2016-9808" ref_url="https://www.suse.com/security/cve/CVE-2016-9808/" source="CVE"/>
		<reference ref_id="CVE-2016-9810" ref_url="https://www.suse.com/security/cve/CVE-2016-9810/" source="CVE"/>
		<reference ref_id="CVE-2017-5840" ref_url="https://www.suse.com/security/cve/CVE-2017-5840/" source="CVE"/>
		<reference ref_id="CVE-2017-5841" ref_url="https://www.suse.com/security/cve/CVE-2017-5841/" source="CVE"/>
		<reference ref_id="CVE-2017-5845" ref_url="https://www.suse.com/security/cve/CVE-2017-5845/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-good-1.8.3-15.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10198/">CVE-2016-10198</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10199/">CVE-2016-10199</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9634/">CVE-2016-9634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9635/">CVE-2016-9635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9636/">CVE-2016-9636</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9807/">CVE-2016-9807</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9808/">CVE-2016-9808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9810/">CVE-2016-9810</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5840/">CVE-2017-5840</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5841/">CVE-2017-5841</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5845/">CVE-2017-5845</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159019" comment="gstreamer-plugins-good-1.8.3-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159020" comment="gstreamer-plugins-good-lang-1.8.3-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76558" version="1" class="patch">
	<metadata>
		<title>gtk2-data-2.24.31-7.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-7447" ref_url="https://www.suse.com/security/cve/CVE-2013-7447/" source="CVE"/>
		<description>
These are all security issues fixed in the gtk2-data-2.24.31-7.11 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7447/">CVE-2013-7447</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140657" comment="gtk2-data-2.24.31-7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140658" comment="gtk2-lang-2.24.31-7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140659" comment="gtk2-tools-2.24.31-7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140660" comment="gtk2-tools-32bit-2.24.31-7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140661" comment="libgtk-2_0-0-2.24.31-7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140662" comment="libgtk-2_0-0-32bit-2.24.31-7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142126" comment="typelib-1_0-Gtk-2_0-2.24.31-7.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76559" version="1" class="patch">
	<metadata>
		<title>guile-2.0.9-8.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-8605" ref_url="https://www.suse.com/security/cve/CVE-2016-8605/" source="CVE"/>
		<description>
These are all security issues fixed in the guile-2.0.9-8.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8605/">CVE-2016-8605</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009148134" comment="guile-2.0.9-8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009148135" comment="guile-modules-2_0-2.0.9-8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009148136" comment="libguile-2_0-22-2.0.9-8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76560" version="1" class="patch">
	<metadata>
		<title>gvim-7.4.326-16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0316" ref_url="https://www.suse.com/security/cve/CVE-2009-0316/" source="CVE"/>
		<reference ref_id="CVE-2016-1248" ref_url="https://www.suse.com/security/cve/CVE-2016-1248/" source="CVE"/>
		<reference ref_id="CVE-2017-5953" ref_url="https://www.suse.com/security/cve/CVE-2017-5953/" source="CVE"/>
		<reference ref_id="CVE-2017-6349" ref_url="https://www.suse.com/security/cve/CVE-2017-6349/" source="CVE"/>
		<reference ref_id="CVE-2017-6350" ref_url="https://www.suse.com/security/cve/CVE-2017-6350/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-7.4.326-16.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0316/">CVE-2009-0316</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1248/">CVE-2016-1248</cve>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5953/">CVE-2017-5953</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6349/">CVE-2017-6349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6350/">CVE-2017-6350</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009157587" comment="gvim-7.4.326-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157588" comment="vim-7.4.326-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157589" comment="vim-data-7.4.326-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76561" version="1" class="patch">
	<metadata>
		<title>gzip-1.6-7.392 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-2624" ref_url="https://www.suse.com/security/cve/CVE-2009-2624/" source="CVE"/>
		<reference ref_id="CVE-2010-0001" ref_url="https://www.suse.com/security/cve/CVE-2010-0001/" source="CVE"/>
		<description>
These are all security issues fixed in the gzip-1.6-7.392 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2624/">CVE-2009-2624</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0001/">CVE-2010-0001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140677" comment="gzip-1.6-7.392 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76562" version="1" class="patch">
	<metadata>
		<title>hardlink-1.0-6.45 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-3630" ref_url="https://www.suse.com/security/cve/CVE-2011-3630/" source="CVE"/>
		<reference ref_id="CVE-2011-3631" ref_url="https://www.suse.com/security/cve/CVE-2011-3631/" source="CVE"/>
		<reference ref_id="CVE-2011-3632" ref_url="https://www.suse.com/security/cve/CVE-2011-3632/" source="CVE"/>
		<description>
These are all security issues fixed in the hardlink-1.0-6.45 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3630/">CVE-2011-3630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3631/">CVE-2011-3631</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3632/">CVE-2011-3632</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140678" comment="hardlink-1.0-6.45 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76563" version="1" class="patch">
	<metadata>
		<title>hplip-3.16.11-1.33 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2004-0801" ref_url="https://www.suse.com/security/cve/CVE-2004-0801/" source="CVE"/>
		<reference ref_id="CVE-2010-4267" ref_url="https://www.suse.com/security/cve/CVE-2010-4267/" source="CVE"/>
		<reference ref_id="CVE-2011-2697" ref_url="https://www.suse.com/security/cve/CVE-2011-2697/" source="CVE"/>
		<reference ref_id="CVE-2011-2722" ref_url="https://www.suse.com/security/cve/CVE-2011-2722/" source="CVE"/>
		<reference ref_id="CVE-2013-4325" ref_url="https://www.suse.com/security/cve/CVE-2013-4325/" source="CVE"/>
		<reference ref_id="CVE-2013-6402" ref_url="https://www.suse.com/security/cve/CVE-2013-6402/" source="CVE"/>
		<reference ref_id="CVE-2013-6427" ref_url="https://www.suse.com/security/cve/CVE-2013-6427/" source="CVE"/>
		<reference ref_id="CVE-2015-0839" ref_url="https://www.suse.com/security/cve/CVE-2015-0839/" source="CVE"/>
		<description>
These are all security issues fixed in the hplip-3.16.11-1.33 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2004-0801/">CVE-2004-0801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4267/">CVE-2010-4267</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2697/">CVE-2011-2697</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-2722/">CVE-2011-2722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4325/">CVE-2013-4325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6402/">CVE-2013-6402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6427/">CVE-2013-6427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0839/">CVE-2015-0839</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159029" comment="hplip-3.16.11-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159030" comment="hplip-hpijs-3.16.11-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159031" comment="hplip-sane-3.16.11-1.33 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76564" version="1" class="patch">
	<metadata>
		<title>hyper-v-7-13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-2669" ref_url="https://www.suse.com/security/cve/CVE-2012-2669/" source="CVE"/>
		<reference ref_id="CVE-2012-5532" ref_url="https://www.suse.com/security/cve/CVE-2012-5532/" source="CVE"/>
		<description>
These are all security issues fixed in the hyper-v-7-13.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2669/">CVE-2012-2669</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-5532/">CVE-2012-5532</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140682" comment="hyper-v-7-13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76565" version="1" class="patch">
	<metadata>
		<title>ibus-chewing-1.4.14-4.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-4509" ref_url="https://www.suse.com/security/cve/CVE-2013-4509/" source="CVE"/>
		<description>
These are all security issues fixed in the ibus-chewing-1.4.14-4.11 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4509/">CVE-2013-4509</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140683" comment="ibus-chewing-1.4.14-4.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159032" comment="ibus-pinyin-1.5.0-11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76566" version="1" class="patch">
	<metadata>
		<title>icu-52.1-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-9654" ref_url="https://www.suse.com/security/cve/CVE-2014-9654/" source="CVE"/>
		<description>
These are all security issues fixed in the icu-52.1-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9654/">CVE-2014-9654</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107566" comment="icu-52.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107572" comment="libicu52_1-52.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107571" comment="libicu52_1-32bit-52.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107573" comment="libicu52_1-data-52.1-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76567" version="1" class="patch">
	<metadata>
		<title>imobiledevice-tools-1.2.0-7.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-2142" ref_url="https://www.suse.com/security/cve/CVE-2013-2142/" source="CVE"/>
		<reference ref_id="CVE-2016-5104" ref_url="https://www.suse.com/security/cve/CVE-2016-5104/" source="CVE"/>
		<description>
These are all security issues fixed in the imobiledevice-tools-1.2.0-7.31 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2142/">CVE-2013-2142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5104/">CVE-2016-5104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142127" comment="imobiledevice-tools-1.2.0-7.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140847" comment="libimobiledevice6-1.2.0-7.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76568" version="1" class="patch">
	<metadata>
		<title>iputils-s20121221-2.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2529" ref_url="https://www.suse.com/security/cve/CVE-2010-2529/" source="CVE"/>
		<description>
These are all security issues fixed in the iputils-s20121221-2.19 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2529/">CVE-2010-2529</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140686" comment="iputils-s20121221-2.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76569" version="1" class="patch">
	<metadata>
		<title>java-1_7_0-openjdk-1.7.0.141-42.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-3563" ref_url="https://www.suse.com/security/cve/CVE-2011-3563/" source="CVE"/>
		<reference ref_id="CVE-2011-3571" ref_url="https://www.suse.com/security/cve/CVE-2011-3571/" source="CVE"/>
		<reference ref_id="CVE-2011-5035" ref_url="https://www.suse.com/security/cve/CVE-2011-5035/" source="CVE"/>
		<reference ref_id="CVE-2012-0497" ref_url="https://www.suse.com/security/cve/CVE-2012-0497/" source="CVE"/>
		<reference ref_id="CVE-2012-0501" ref_url="https://www.suse.com/security/cve/CVE-2012-0501/" source="CVE"/>
		<reference ref_id="CVE-2012-0502" ref_url="https://www.suse.com/security/cve/CVE-2012-0502/" source="CVE"/>
		<reference ref_id="CVE-2012-0503" ref_url="https://www.suse.com/security/cve/CVE-2012-0503/" source="CVE"/>
		<reference ref_id="CVE-2012-0505" ref_url="https://www.suse.com/security/cve/CVE-2012-0505/" source="CVE"/>
		<reference ref_id="CVE-2012-0506" ref_url="https://www.suse.com/security/cve/CVE-2012-0506/" source="CVE"/>
		<reference ref_id="CVE-2012-0547" ref_url="https://www.suse.com/security/cve/CVE-2012-0547/" source="CVE"/>
		<reference ref_id="CVE-2012-1682" ref_url="https://www.suse.com/security/cve/CVE-2012-1682/" source="CVE"/>
		<reference ref_id="CVE-2012-1711" ref_url="https://www.suse.com/security/cve/CVE-2012-1711/" source="CVE"/>
		<reference ref_id="CVE-2012-1713" ref_url="https://www.suse.com/security/cve/CVE-2012-1713/" source="CVE"/>
		<reference ref_id="CVE-2012-1716" ref_url="https://www.suse.com/security/cve/CVE-2012-1716/" source="CVE"/>
		<reference ref_id="CVE-2012-1717" ref_url="https://www.suse.com/security/cve/CVE-2012-1717/" source="CVE"/>
		<reference ref_id="CVE-2012-1718" ref_url="https://www.suse.com/security/cve/CVE-2012-1718/" source="CVE"/>
		<reference ref_id="CVE-2012-1719" ref_url="https://www.suse.com/security/cve/CVE-2012-1719/" source="CVE"/>
		<reference ref_id="CVE-2012-1723" ref_url="https://www.suse.com/security/cve/CVE-2012-1723/" source="CVE"/>
		<reference ref_id="CVE-2012-1724" ref_url="https://www.suse.com/security/cve/CVE-2012-1724/" source="CVE"/>
		<reference ref_id="CVE-2012-1725" ref_url="https://www.suse.com/security/cve/CVE-2012-1725/" source="CVE"/>
		<reference ref_id="CVE-2012-1726" ref_url="https://www.suse.com/security/cve/CVE-2012-1726/" source="CVE"/>
		<reference ref_id="CVE-2012-3136" ref_url="https://www.suse.com/security/cve/CVE-2012-3136/" source="CVE"/>
		<reference ref_id="CVE-2012-3174" ref_url="https://www.suse.com/security/cve/CVE-2012-3174/" source="CVE"/>
		<reference ref_id="CVE-2012-3216" ref_url="https://www.suse.com/security/cve/CVE-2012-3216/" source="CVE"/>
		<reference ref_id="CVE-2012-4416" ref_url="https://www.suse.com/security/cve/CVE-2012-4416/" source="CVE"/>
		<reference ref_id="CVE-2012-4681" ref_url="https://www.suse.com/security/cve/CVE-2012-4681/" source="CVE"/>
		<reference ref_id="CVE-2012-5068" ref_url="https://www.suse.com/security/cve/CVE-2012-5068/" source="CVE"/>
		<reference ref_id="CVE-2012-5069" ref_url="https://www.suse.com/security/cve/CVE-2012-5069/" source="CVE"/>
		<reference ref_id="CVE-2012-5070" ref_url="https://www.suse.com/security/cve/CVE-2012-5070/" source="CVE"/>
		<reference ref_id="CVE-2012-5071" ref_url="https://www.suse.com/security/cve/CVE-2012-5071/" source="CVE"/>
		<reference ref_id="CVE-2012-5072" ref_url="https://www.suse.com/security/cve/CVE-2012-5072/" source="CVE"/>
		<reference ref_id="CVE-2012-5073" ref_url="https://www.suse.com/security/cve/CVE-2012-5073/" source="CVE"/>
		<reference ref_id="CVE-2012-5074" ref_url="https://www.suse.com/security/cve/CVE-2012-5074/" source="CVE"/>
		<reference ref_id="CVE-2012-5075" ref_url="https://www.suse.com/security/cve/CVE-2012-5075/" source="CVE"/>
		<reference ref_id="CVE-2012-5076" ref_url="https://www.suse.com/security/cve/CVE-2012-5076/" source="CVE"/>
		<reference ref_id="CVE-2012-5077" ref_url="https://www.suse.com/security/cve/CVE-2012-5077/" source="CVE"/>
		<reference ref_id="CVE-2012-5079" ref_url="https://www.suse.com/security/cve/CVE-2012-5079/" source="CVE"/>
		<reference ref_id="CVE-2012-5081" ref_url="https://www.suse.com/security/cve/CVE-2012-5081/" source="CVE"/>
		<reference ref_id="CVE-2012-5084" ref_url="https://www.suse.com/security/cve/CVE-2012-5084/" source="CVE"/>
		<reference ref_id="CVE-2012-5085" ref_url="https://www.suse.com/security/cve/CVE-2012-5085/" source="CVE"/>
		<reference ref_id="CVE-2012-5086" ref_url="https://www.suse.com/security/cve/CVE-2012-5086/" source="CVE"/>
		<reference ref_id="CVE-2012-5087" ref_url="https://www.suse.com/security/cve/CVE-2012-5087/" source="CVE"/>
		<reference ref_id="CVE-2012-5088" ref_url="https://www.suse.com/security/cve/CVE-2012-5088/" source="CVE"/>
		<reference ref_id="CVE-2012-5089" ref_url="https://www.suse.com/security/cve/CVE-2012-5089/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2013-0401" ref_url="https://www.suse.com/security/cve/CVE-2013-0401/" source="CVE"/>
		<reference ref_id="CVE-2013-0422" ref_url="https://www.suse.com/security/cve/CVE-2013-0422/" source="CVE"/>
		<reference ref_id="CVE-2013-0424" ref_url="https://www.suse.com/security/cve/CVE-2013-0424/" source="CVE"/>
		<reference ref_id="CVE-2013-0425" ref_url="https://www.suse.com/security/cve/CVE-2013-0425/" source="CVE"/>
		<reference ref_id="CVE-2013-0426" ref_url="https://www.suse.com/security/cve/CVE-2013-0426/" source="CVE"/>
		<reference ref_id="CVE-2013-0427" ref_url="https://www.suse.com/security/cve/CVE-2013-0427/" source="CVE"/>
		<reference ref_id="CVE-2013-0428" ref_url="https://www.suse.com/security/cve/CVE-2013-0428/" source="CVE"/>
		<reference ref_id="CVE-2013-0429" ref_url="https://www.suse.com/security/cve/CVE-2013-0429/" source="CVE"/>
		<reference ref_id="CVE-2013-0431" ref_url="https://www.suse.com/security/cve/CVE-2013-0431/" source="CVE"/>
		<reference ref_id="CVE-2013-0432" ref_url="https://www.suse.com/security/cve/CVE-2013-0432/" source="CVE"/>
		<reference ref_id="CVE-2013-0433" ref_url="https://www.suse.com/security/cve/CVE-2013-0433/" source="CVE"/>
		<reference ref_id="CVE-2013-0434" ref_url="https://www.suse.com/security/cve/CVE-2013-0434/" source="CVE"/>
		<reference ref_id="CVE-2013-0435" ref_url="https://www.suse.com/security/cve/CVE-2013-0435/" source="CVE"/>
		<reference ref_id="CVE-2013-0440" ref_url="https://www.suse.com/security/cve/CVE-2013-0440/" source="CVE"/>
		<reference ref_id="CVE-2013-0441" ref_url="https://www.suse.com/security/cve/CVE-2013-0441/" source="CVE"/>
		<reference ref_id="CVE-2013-0442" ref_url="https://www.suse.com/security/cve/CVE-2013-0442/" source="CVE"/>
		<reference ref_id="CVE-2013-0443" ref_url="https://www.suse.com/security/cve/CVE-2013-0443/" source="CVE"/>
		<reference ref_id="CVE-2013-0444" ref_url="https://www.suse.com/security/cve/CVE-2013-0444/" source="CVE"/>
		<reference ref_id="CVE-2013-0450" ref_url="https://www.suse.com/security/cve/CVE-2013-0450/" source="CVE"/>
		<reference ref_id="CVE-2013-0809" ref_url="https://www.suse.com/security/cve/CVE-2013-0809/" source="CVE"/>
		<reference ref_id="CVE-2013-1475" ref_url="https://www.suse.com/security/cve/CVE-2013-1475/" source="CVE"/>
		<reference ref_id="CVE-2013-1476" ref_url="https://www.suse.com/security/cve/CVE-2013-1476/" source="CVE"/>
		<reference ref_id="CVE-2013-1478" ref_url="https://www.suse.com/security/cve/CVE-2013-1478/" source="CVE"/>
		<reference ref_id="CVE-2013-1480" ref_url="https://www.suse.com/security/cve/CVE-2013-1480/" source="CVE"/>
		<reference ref_id="CVE-2013-1484" ref_url="https://www.suse.com/security/cve/CVE-2013-1484/" source="CVE"/>
		<reference ref_id="CVE-2013-1485" ref_url="https://www.suse.com/security/cve/CVE-2013-1485/" source="CVE"/>
		<reference ref_id="CVE-2013-1486" ref_url="https://www.suse.com/security/cve/CVE-2013-1486/" source="CVE"/>
		<reference ref_id="CVE-2013-1488" ref_url="https://www.suse.com/security/cve/CVE-2013-1488/" source="CVE"/>
		<reference ref_id="CVE-2013-1493" ref_url="https://www.suse.com/security/cve/CVE-2013-1493/" source="CVE"/>
		<reference ref_id="CVE-2013-1500" ref_url="https://www.suse.com/security/cve/CVE-2013-1500/" source="CVE"/>
		<reference ref_id="CVE-2013-1518" ref_url="https://www.suse.com/security/cve/CVE-2013-1518/" source="CVE"/>
		<reference ref_id="CVE-2013-1537" ref_url="https://www.suse.com/security/cve/CVE-2013-1537/" source="CVE"/>
		<reference ref_id="CVE-2013-1557" ref_url="https://www.suse.com/security/cve/CVE-2013-1557/" source="CVE"/>
		<reference ref_id="CVE-2013-1569" ref_url="https://www.suse.com/security/cve/CVE-2013-1569/" source="CVE"/>
		<reference ref_id="CVE-2013-1571" ref_url="https://www.suse.com/security/cve/CVE-2013-1571/" source="CVE"/>
		<reference ref_id="CVE-2013-2383" ref_url="https://www.suse.com/security/cve/CVE-2013-2383/" source="CVE"/>
		<reference ref_id="CVE-2013-2384" ref_url="https://www.suse.com/security/cve/CVE-2013-2384/" source="CVE"/>
		<reference ref_id="CVE-2013-2407" ref_url="https://www.suse.com/security/cve/CVE-2013-2407/" source="CVE"/>
		<reference ref_id="CVE-2013-2412" ref_url="https://www.suse.com/security/cve/CVE-2013-2412/" source="CVE"/>
		<reference ref_id="CVE-2013-2415" ref_url="https://www.suse.com/security/cve/CVE-2013-2415/" source="CVE"/>
		<reference ref_id="CVE-2013-2417" ref_url="https://www.suse.com/security/cve/CVE-2013-2417/" source="CVE"/>
		<reference ref_id="CVE-2013-2419" ref_url="https://www.suse.com/security/cve/CVE-2013-2419/" source="CVE"/>
		<reference ref_id="CVE-2013-2420" ref_url="https://www.suse.com/security/cve/CVE-2013-2420/" source="CVE"/>
		<reference ref_id="CVE-2013-2421" ref_url="https://www.suse.com/security/cve/CVE-2013-2421/" source="CVE"/>
		<reference ref_id="CVE-2013-2422" ref_url="https://www.suse.com/security/cve/CVE-2013-2422/" source="CVE"/>
		<reference ref_id="CVE-2013-2423" ref_url="https://www.suse.com/security/cve/CVE-2013-2423/" source="CVE"/>
		<reference ref_id="CVE-2013-2424" ref_url="https://www.suse.com/security/cve/CVE-2013-2424/" source="CVE"/>
		<reference ref_id="CVE-2013-2426" ref_url="https://www.suse.com/security/cve/CVE-2013-2426/" source="CVE"/>
		<reference ref_id="CVE-2013-2429" ref_url="https://www.suse.com/security/cve/CVE-2013-2429/" source="CVE"/>
		<reference ref_id="CVE-2013-2430" ref_url="https://www.suse.com/security/cve/CVE-2013-2430/" source="CVE"/>
		<reference ref_id="CVE-2013-2431" ref_url="https://www.suse.com/security/cve/CVE-2013-2431/" source="CVE"/>
		<reference ref_id="CVE-2013-2436" ref_url="https://www.suse.com/security/cve/CVE-2013-2436/" source="CVE"/>
		<reference ref_id="CVE-2013-2443" ref_url="https://www.suse.com/security/cve/CVE-2013-2443/" source="CVE"/>
		<reference ref_id="CVE-2013-2444" ref_url="https://www.suse.com/security/cve/CVE-2013-2444/" source="CVE"/>
		<reference ref_id="CVE-2013-2445" ref_url="https://www.suse.com/security/cve/CVE-2013-2445/" source="CVE"/>
		<reference ref_id="CVE-2013-2446" ref_url="https://www.suse.com/security/cve/CVE-2013-2446/" source="CVE"/>
		<reference ref_id="CVE-2013-2447" ref_url="https://www.suse.com/security/cve/CVE-2013-2447/" source="CVE"/>
		<reference ref_id="CVE-2013-2448" ref_url="https://www.suse.com/security/cve/CVE-2013-2448/" source="CVE"/>
		<reference ref_id="CVE-2013-2449" ref_url="https://www.suse.com/security/cve/CVE-2013-2449/" source="CVE"/>
		<reference ref_id="CVE-2013-2450" ref_url="https://www.suse.com/security/cve/CVE-2013-2450/" source="CVE"/>
		<reference ref_id="CVE-2013-2451" ref_url="https://www.suse.com/security/cve/CVE-2013-2451/" source="CVE"/>
		<reference ref_id="CVE-2013-2452" ref_url="https://www.suse.com/security/cve/CVE-2013-2452/" source="CVE"/>
		<reference ref_id="CVE-2013-2453" ref_url="https://www.suse.com/security/cve/CVE-2013-2453/" source="CVE"/>
		<reference ref_id="CVE-2013-2454" ref_url="https://www.suse.com/security/cve/CVE-2013-2454/" source="CVE"/>
		<reference ref_id="CVE-2013-2455" ref_url="https://www.suse.com/security/cve/CVE-2013-2455/" source="CVE"/>
		<reference ref_id="CVE-2013-2456" ref_url="https://www.suse.com/security/cve/CVE-2013-2456/" source="CVE"/>
		<reference ref_id="CVE-2013-2457" ref_url="https://www.suse.com/security/cve/CVE-2013-2457/" source="CVE"/>
		<reference ref_id="CVE-2013-2458" ref_url="https://www.suse.com/security/cve/CVE-2013-2458/" source="CVE"/>
		<reference ref_id="CVE-2013-2459" ref_url="https://www.suse.com/security/cve/CVE-2013-2459/" source="CVE"/>
		<reference ref_id="CVE-2013-2460" ref_url="https://www.suse.com/security/cve/CVE-2013-2460/" source="CVE"/>
		<reference ref_id="CVE-2013-2461" ref_url="https://www.suse.com/security/cve/CVE-2013-2461/" source="CVE"/>
		<reference ref_id="CVE-2013-2463" ref_url="https://www.suse.com/security/cve/CVE-2013-2463/" source="CVE"/>
		<reference ref_id="CVE-2013-2465" ref_url="https://www.suse.com/security/cve/CVE-2013-2465/" source="CVE"/>
		<reference ref_id="CVE-2013-2469" ref_url="https://www.suse.com/security/cve/CVE-2013-2469/" source="CVE"/>
		<reference ref_id="CVE-2013-2470" ref_url="https://www.suse.com/security/cve/CVE-2013-2470/" source="CVE"/>
		<reference ref_id="CVE-2013-2471" ref_url="https://www.suse.com/security/cve/CVE-2013-2471/" source="CVE"/>
		<reference ref_id="CVE-2013-2472" ref_url="https://www.suse.com/security/cve/CVE-2013-2472/" source="CVE"/>
		<reference ref_id="CVE-2013-2473" ref_url="https://www.suse.com/security/cve/CVE-2013-2473/" source="CVE"/>
		<reference ref_id="CVE-2013-3829" ref_url="https://www.suse.com/security/cve/CVE-2013-3829/" source="CVE"/>
		<reference ref_id="CVE-2013-4002" ref_url="https://www.suse.com/security/cve/CVE-2013-4002/" source="CVE"/>
		<reference ref_id="CVE-2013-5772" ref_url="https://www.suse.com/security/cve/CVE-2013-5772/" source="CVE"/>
		<reference ref_id="CVE-2013-5774" ref_url="https://www.suse.com/security/cve/CVE-2013-5774/" source="CVE"/>
		<reference ref_id="CVE-2013-5778" ref_url="https://www.suse.com/security/cve/CVE-2013-5778/" source="CVE"/>
		<reference ref_id="CVE-2013-5780" ref_url="https://www.suse.com/security/cve/CVE-2013-5780/" source="CVE"/>
		<reference ref_id="CVE-2013-5782" ref_url="https://www.suse.com/security/cve/CVE-2013-5782/" source="CVE"/>
		<reference ref_id="CVE-2013-5783" ref_url="https://www.suse.com/security/cve/CVE-2013-5783/" source="CVE"/>
		<reference ref_id="CVE-2013-5784" ref_url="https://www.suse.com/security/cve/CVE-2013-5784/" source="CVE"/>
		<reference ref_id="CVE-2013-5790" ref_url="https://www.suse.com/security/cve/CVE-2013-5790/" source="CVE"/>
		<reference ref_id="CVE-2013-5797" ref_url="https://www.suse.com/security/cve/CVE-2013-5797/" source="CVE"/>
		<reference ref_id="CVE-2013-5800" ref_url="https://www.suse.com/security/cve/CVE-2013-5800/" source="CVE"/>
		<reference ref_id="CVE-2013-5802" ref_url="https://www.suse.com/security/cve/CVE-2013-5802/" source="CVE"/>
		<reference ref_id="CVE-2013-5803" ref_url="https://www.suse.com/security/cve/CVE-2013-5803/" source="CVE"/>
		<reference ref_id="CVE-2013-5804" ref_url="https://www.suse.com/security/cve/CVE-2013-5804/" source="CVE"/>
		<reference ref_id="CVE-2013-5805" ref_url="https://www.suse.com/security/cve/CVE-2013-5805/" source="CVE"/>
		<reference ref_id="CVE-2013-5806" ref_url="https://www.suse.com/security/cve/CVE-2013-5806/" source="CVE"/>
		<reference ref_id="CVE-2013-5809" ref_url="https://www.suse.com/security/cve/CVE-2013-5809/" source="CVE"/>
		<reference ref_id="CVE-2013-5814" ref_url="https://www.suse.com/security/cve/CVE-2013-5814/" source="CVE"/>
		<reference ref_id="CVE-2013-5817" ref_url="https://www.suse.com/security/cve/CVE-2013-5817/" source="CVE"/>
		<reference ref_id="CVE-2013-5820" ref_url="https://www.suse.com/security/cve/CVE-2013-5820/" source="CVE"/>
		<reference ref_id="CVE-2013-5823" ref_url="https://www.suse.com/security/cve/CVE-2013-5823/" source="CVE"/>
		<reference ref_id="CVE-2013-5825" ref_url="https://www.suse.com/security/cve/CVE-2013-5825/" source="CVE"/>
		<reference ref_id="CVE-2013-5829" ref_url="https://www.suse.com/security/cve/CVE-2013-5829/" source="CVE"/>
		<reference ref_id="CVE-2013-5830" ref_url="https://www.suse.com/security/cve/CVE-2013-5830/" source="CVE"/>
		<reference ref_id="CVE-2013-5840" ref_url="https://www.suse.com/security/cve/CVE-2013-5840/" source="CVE"/>
		<reference ref_id="CVE-2013-5842" ref_url="https://www.suse.com/security/cve/CVE-2013-5842/" source="CVE"/>
		<reference ref_id="CVE-2013-5849" ref_url="https://www.suse.com/security/cve/CVE-2013-5849/" source="CVE"/>
		<reference ref_id="CVE-2013-5850" ref_url="https://www.suse.com/security/cve/CVE-2013-5850/" source="CVE"/>
		<reference ref_id="CVE-2013-5851" ref_url="https://www.suse.com/security/cve/CVE-2013-5851/" source="CVE"/>
		<reference ref_id="CVE-2013-5878" ref_url="https://www.suse.com/security/cve/CVE-2013-5878/" source="CVE"/>
		<reference ref_id="CVE-2013-5884" ref_url="https://www.suse.com/security/cve/CVE-2013-5884/" source="CVE"/>
		<reference ref_id="CVE-2013-5893" ref_url="https://www.suse.com/security/cve/CVE-2013-5893/" source="CVE"/>
		<reference ref_id="CVE-2013-5896" ref_url="https://www.suse.com/security/cve/CVE-2013-5896/" source="CVE"/>
		<reference ref_id="CVE-2013-5907" ref_url="https://www.suse.com/security/cve/CVE-2013-5907/" source="CVE"/>
		<reference ref_id="CVE-2013-5910" ref_url="https://www.suse.com/security/cve/CVE-2013-5910/" source="CVE"/>
		<reference ref_id="CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629/" source="CVE"/>
		<reference ref_id="CVE-2013-6954" ref_url="https://www.suse.com/security/cve/CVE-2013-6954/" source="CVE"/>
		<reference ref_id="CVE-2014-0368" ref_url="https://www.suse.com/security/cve/CVE-2014-0368/" source="CVE"/>
		<reference ref_id="CVE-2014-0373" ref_url="https://www.suse.com/security/cve/CVE-2014-0373/" source="CVE"/>
		<reference ref_id="CVE-2014-0376" ref_url="https://www.suse.com/security/cve/CVE-2014-0376/" source="CVE"/>
		<reference ref_id="CVE-2014-0408" ref_url="https://www.suse.com/security/cve/CVE-2014-0408/" source="CVE"/>
		<reference ref_id="CVE-2014-0411" ref_url="https://www.suse.com/security/cve/CVE-2014-0411/" source="CVE"/>
		<reference ref_id="CVE-2014-0416" ref_url="https://www.suse.com/security/cve/CVE-2014-0416/" source="CVE"/>
		<reference ref_id="CVE-2014-0422" ref_url="https://www.suse.com/security/cve/CVE-2014-0422/" source="CVE"/>
		<reference ref_id="CVE-2014-0423" ref_url="https://www.suse.com/security/cve/CVE-2014-0423/" source="CVE"/>
		<reference ref_id="CVE-2014-0428" ref_url="https://www.suse.com/security/cve/CVE-2014-0428/" source="CVE"/>
		<reference ref_id="CVE-2014-0429" ref_url="https://www.suse.com/security/cve/CVE-2014-0429/" source="CVE"/>
		<reference ref_id="CVE-2014-0446" ref_url="https://www.suse.com/security/cve/CVE-2014-0446/" source="CVE"/>
		<reference ref_id="CVE-2014-0451" ref_url="https://www.suse.com/security/cve/CVE-2014-0451/" source="CVE"/>
		<reference ref_id="CVE-2014-0452" ref_url="https://www.suse.com/security/cve/CVE-2014-0452/" source="CVE"/>
		<reference ref_id="CVE-2014-0453" ref_url="https://www.suse.com/security/cve/CVE-2014-0453/" source="CVE"/>
		<reference ref_id="CVE-2014-0454" ref_url="https://www.suse.com/security/cve/CVE-2014-0454/" source="CVE"/>
		<reference ref_id="CVE-2014-0455" ref_url="https://www.suse.com/security/cve/CVE-2014-0455/" source="CVE"/>
		<reference ref_id="CVE-2014-0456" ref_url="https://www.suse.com/security/cve/CVE-2014-0456/" source="CVE"/>
		<reference ref_id="CVE-2014-0457" ref_url="https://www.suse.com/security/cve/CVE-2014-0457/" source="CVE"/>
		<reference ref_id="CVE-2014-0458" ref_url="https://www.suse.com/security/cve/CVE-2014-0458/" source="CVE"/>
		<reference ref_id="CVE-2014-0459" ref_url="https://www.suse.com/security/cve/CVE-2014-0459/" source="CVE"/>
		<reference ref_id="CVE-2014-0460" ref_url="https://www.suse.com/security/cve/CVE-2014-0460/" source="CVE"/>
		<reference ref_id="CVE-2014-0461" ref_url="https://www.suse.com/security/cve/CVE-2014-0461/" source="CVE"/>
		<reference ref_id="CVE-2014-1876" ref_url="https://www.suse.com/security/cve/CVE-2014-1876/" source="CVE"/>
		<reference ref_id="CVE-2014-2397" ref_url="https://www.suse.com/security/cve/CVE-2014-2397/" source="CVE"/>
		<reference ref_id="CVE-2014-2398" ref_url="https://www.suse.com/security/cve/CVE-2014-2398/" source="CVE"/>
		<reference ref_id="CVE-2014-2402" ref_url="https://www.suse.com/security/cve/CVE-2014-2402/" source="CVE"/>
		<reference ref_id="CVE-2014-2403" ref_url="https://www.suse.com/security/cve/CVE-2014-2403/" source="CVE"/>
		<reference ref_id="CVE-2014-2412" ref_url="https://www.suse.com/security/cve/CVE-2014-2412/" source="CVE"/>
		<reference ref_id="CVE-2014-2413" ref_url="https://www.suse.com/security/cve/CVE-2014-2413/" source="CVE"/>
		<reference ref_id="CVE-2014-2414" ref_url="https://www.suse.com/security/cve/CVE-2014-2414/" source="CVE"/>
		<reference ref_id="CVE-2014-2421" ref_url="https://www.suse.com/security/cve/CVE-2014-2421/" source="CVE"/>
		<reference ref_id="CVE-2014-2423" ref_url="https://www.suse.com/security/cve/CVE-2014-2423/" source="CVE"/>
		<reference ref_id="CVE-2014-2427" ref_url="https://www.suse.com/security/cve/CVE-2014-2427/" source="CVE"/>
		<reference ref_id="CVE-2014-2483" ref_url="https://www.suse.com/security/cve/CVE-2014-2483/" source="CVE"/>
		<reference ref_id="CVE-2014-2490" ref_url="https://www.suse.com/security/cve/CVE-2014-2490/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-4209" ref_url="https://www.suse.com/security/cve/CVE-2014-4209/" source="CVE"/>
		<reference ref_id="CVE-2014-4216" ref_url="https://www.suse.com/security/cve/CVE-2014-4216/" source="CVE"/>
		<reference ref_id="CVE-2014-4218" ref_url="https://www.suse.com/security/cve/CVE-2014-4218/" source="CVE"/>
		<reference ref_id="CVE-2014-4219" ref_url="https://www.suse.com/security/cve/CVE-2014-4219/" source="CVE"/>
		<reference ref_id="CVE-2014-4221" ref_url="https://www.suse.com/security/cve/CVE-2014-4221/" source="CVE"/>
		<reference ref_id="CVE-2014-4223" ref_url="https://www.suse.com/security/cve/CVE-2014-4223/" source="CVE"/>
		<reference ref_id="CVE-2014-4244" ref_url="https://www.suse.com/security/cve/CVE-2014-4244/" source="CVE"/>
		<reference ref_id="CVE-2014-4252" ref_url="https://www.suse.com/security/cve/CVE-2014-4252/" source="CVE"/>
		<reference ref_id="CVE-2014-4262" ref_url="https://www.suse.com/security/cve/CVE-2014-4262/" source="CVE"/>
		<reference ref_id="CVE-2014-4263" ref_url="https://www.suse.com/security/cve/CVE-2014-4263/" source="CVE"/>
		<reference ref_id="CVE-2014-4264" ref_url="https://www.suse.com/security/cve/CVE-2014-4264/" source="CVE"/>
		<reference ref_id="CVE-2014-4266" ref_url="https://www.suse.com/security/cve/CVE-2014-4266/" source="CVE"/>
		<reference ref_id="CVE-2014-4268" ref_url="https://www.suse.com/security/cve/CVE-2014-4268/" source="CVE"/>
		<reference ref_id="CVE-2014-6457" ref_url="https://www.suse.com/security/cve/CVE-2014-6457/" source="CVE"/>
		<reference ref_id="CVE-2014-6502" ref_url="https://www.suse.com/security/cve/CVE-2014-6502/" source="CVE"/>
		<reference ref_id="CVE-2014-6504" ref_url="https://www.suse.com/security/cve/CVE-2014-6504/" source="CVE"/>
		<reference ref_id="CVE-2014-6506" ref_url="https://www.suse.com/security/cve/CVE-2014-6506/" source="CVE"/>
		<reference ref_id="CVE-2014-6511" ref_url="https://www.suse.com/security/cve/CVE-2014-6511/" source="CVE"/>
		<reference ref_id="CVE-2014-6512" ref_url="https://www.suse.com/security/cve/CVE-2014-6512/" source="CVE"/>
		<reference ref_id="CVE-2014-6513" ref_url="https://www.suse.com/security/cve/CVE-2014-6513/" source="CVE"/>
		<reference ref_id="CVE-2014-6517" ref_url="https://www.suse.com/security/cve/CVE-2014-6517/" source="CVE"/>
		<reference ref_id="CVE-2014-6519" ref_url="https://www.suse.com/security/cve/CVE-2014-6519/" source="CVE"/>
		<reference ref_id="CVE-2014-6531" ref_url="https://www.suse.com/security/cve/CVE-2014-6531/" source="CVE"/>
		<reference ref_id="CVE-2014-6558" ref_url="https://www.suse.com/security/cve/CVE-2014-6558/" source="CVE"/>
		<reference ref_id="CVE-2014-6585" ref_url="https://www.suse.com/security/cve/CVE-2014-6585/" source="CVE"/>
		<reference ref_id="CVE-2014-6587" ref_url="https://www.suse.com/security/cve/CVE-2014-6587/" source="CVE"/>
		<reference ref_id="CVE-2014-6591" ref_url="https://www.suse.com/security/cve/CVE-2014-6591/" source="CVE"/>
		<reference ref_id="CVE-2014-6593" ref_url="https://www.suse.com/security/cve/CVE-2014-6593/" source="CVE"/>
		<reference ref_id="CVE-2014-6601" ref_url="https://www.suse.com/security/cve/CVE-2014-6601/" source="CVE"/>
		<reference ref_id="CVE-2015-0383" ref_url="https://www.suse.com/security/cve/CVE-2015-0383/" source="CVE"/>
		<reference ref_id="CVE-2015-0395" ref_url="https://www.suse.com/security/cve/CVE-2015-0395/" source="CVE"/>
		<reference ref_id="CVE-2015-0400" ref_url="https://www.suse.com/security/cve/CVE-2015-0400/" source="CVE"/>
		<reference ref_id="CVE-2015-0407" ref_url="https://www.suse.com/security/cve/CVE-2015-0407/" source="CVE"/>
		<reference ref_id="CVE-2015-0408" ref_url="https://www.suse.com/security/cve/CVE-2015-0408/" source="CVE"/>
		<reference ref_id="CVE-2015-0410" ref_url="https://www.suse.com/security/cve/CVE-2015-0410/" source="CVE"/>
		<reference ref_id="CVE-2015-0412" ref_url="https://www.suse.com/security/cve/CVE-2015-0412/" source="CVE"/>
		<reference ref_id="CVE-2015-0460" ref_url="https://www.suse.com/security/cve/CVE-2015-0460/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2628" ref_url="https://www.suse.com/security/cve/CVE-2015-2628/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4881" ref_url="https://www.suse.com/security/cve/CVE-2015-4881/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="CVE-2016-0636" ref_url="https://www.suse.com/security/cve/CVE-2016-0636/" source="CVE"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-0695" ref_url="https://www.suse.com/security/cve/CVE-2016-0695/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-3425" ref_url="https://www.suse.com/security/cve/CVE-2016-3425/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="CVE-2016-3458" ref_url="https://www.suse.com/security/cve/CVE-2016-3458/" source="CVE"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<reference ref_id="CVE-2016-3498" ref_url="https://www.suse.com/security/cve/CVE-2016-3498/" source="CVE"/>
		<reference ref_id="CVE-2016-3500" ref_url="https://www.suse.com/security/cve/CVE-2016-3500/" source="CVE"/>
		<reference ref_id="CVE-2016-3503" ref_url="https://www.suse.com/security/cve/CVE-2016-3503/" source="CVE"/>
		<reference ref_id="CVE-2016-3508" ref_url="https://www.suse.com/security/cve/CVE-2016-3508/" source="CVE"/>
		<reference ref_id="CVE-2016-3511" ref_url="https://www.suse.com/security/cve/CVE-2016-3511/" source="CVE"/>
		<reference ref_id="CVE-2016-3550" ref_url="https://www.suse.com/security/cve/CVE-2016-3550/" source="CVE"/>
		<reference ref_id="CVE-2016-3598" ref_url="https://www.suse.com/security/cve/CVE-2016-3598/" source="CVE"/>
		<reference ref_id="CVE-2016-3606" ref_url="https://www.suse.com/security/cve/CVE-2016-3606/" source="CVE"/>
		<reference ref_id="CVE-2016-3610" ref_url="https://www.suse.com/security/cve/CVE-2016-3610/" source="CVE"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5546" ref_url="https://www.suse.com/security/cve/CVE-2016-5546/" source="CVE"/>
		<reference ref_id="CVE-2016-5547" ref_url="https://www.suse.com/security/cve/CVE-2016-5547/" source="CVE"/>
		<reference ref_id="CVE-2016-5548" ref_url="https://www.suse.com/security/cve/CVE-2016-5548/" source="CVE"/>
		<reference ref_id="CVE-2016-5549" ref_url="https://www.suse.com/security/cve/CVE-2016-5549/" source="CVE"/>
		<reference ref_id="CVE-2016-5552" ref_url="https://www.suse.com/security/cve/CVE-2016-5552/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5582" ref_url="https://www.suse.com/security/cve/CVE-2016-5582/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<reference ref_id="CVE-2017-3231" ref_url="https://www.suse.com/security/cve/CVE-2017-3231/" source="CVE"/>
		<reference ref_id="CVE-2017-3241" ref_url="https://www.suse.com/security/cve/CVE-2017-3241/" source="CVE"/>
		<reference ref_id="CVE-2017-3252" ref_url="https://www.suse.com/security/cve/CVE-2017-3252/" source="CVE"/>
		<reference ref_id="CVE-2017-3253" ref_url="https://www.suse.com/security/cve/CVE-2017-3253/" source="CVE"/>
		<reference ref_id="CVE-2017-3260" ref_url="https://www.suse.com/security/cve/CVE-2017-3260/" source="CVE"/>
		<reference ref_id="CVE-2017-3261" ref_url="https://www.suse.com/security/cve/CVE-2017-3261/" source="CVE"/>
		<reference ref_id="CVE-2017-3272" ref_url="https://www.suse.com/security/cve/CVE-2017-3272/" source="CVE"/>
		<reference ref_id="CVE-2017-3289" ref_url="https://www.suse.com/security/cve/CVE-2017-3289/" source="CVE"/>
		<reference ref_id="CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509/" source="CVE"/>
		<reference ref_id="CVE-2017-3511" ref_url="https://www.suse.com/security/cve/CVE-2017-3511/" source="CVE"/>
		<reference ref_id="CVE-2017-3512" ref_url="https://www.suse.com/security/cve/CVE-2017-3512/" source="CVE"/>
		<reference ref_id="CVE-2017-3514" ref_url="https://www.suse.com/security/cve/CVE-2017-3514/" source="CVE"/>
		<reference ref_id="CVE-2017-3526" ref_url="https://www.suse.com/security/cve/CVE-2017-3526/" source="CVE"/>
		<reference ref_id="CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533/" source="CVE"/>
		<reference ref_id="CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539/" source="CVE"/>
		<reference ref_id="CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_7_0-openjdk-1.7.0.141-42.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3563/">CVE-2011-3563</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3571/">CVE-2011-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5035/">CVE-2011-5035</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0497/">CVE-2012-0497</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0501/">CVE-2012-0501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0502/">CVE-2012-0502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0503/">CVE-2012-0503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0505/">CVE-2012-0505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0506/">CVE-2012-0506</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0547/">CVE-2012-0547</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1682/">CVE-2012-1682</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1711/">CVE-2012-1711</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1713/">CVE-2012-1713</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1716/">CVE-2012-1716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1717/">CVE-2012-1717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1718/">CVE-2012-1718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1719/">CVE-2012-1719</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1723/">CVE-2012-1723</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1724/">CVE-2012-1724</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1725/">CVE-2012-1725</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1726/">CVE-2012-1726</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3136/">CVE-2012-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3174/">CVE-2012-3174</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3216/">CVE-2012-3216</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4416/">CVE-2012-4416</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4681/">CVE-2012-4681</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5068/">CVE-2012-5068</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5069/">CVE-2012-5069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5070/">CVE-2012-5070</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5071/">CVE-2012-5071</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5072/">CVE-2012-5072</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5073/">CVE-2012-5073</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5074/">CVE-2012-5074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5075/">CVE-2012-5075</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5076/">CVE-2012-5076</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-5077/">CVE-2012-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5079/">CVE-2012-5079</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5081/">CVE-2012-5081</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5084/">CVE-2012-5084</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-5085/">CVE-2012-5085</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5086/">CVE-2012-5086</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5087/">CVE-2012-5087</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5088/">CVE-2012-5088</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5089/">CVE-2012-5089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0401/">CVE-2013-0401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0422/">CVE-2013-0422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0424/">CVE-2013-0424</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0425/">CVE-2013-0425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0426/">CVE-2013-0426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0427/">CVE-2013-0427</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0428/">CVE-2013-0428</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0429/">CVE-2013-0429</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0431/">CVE-2013-0431</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0432/">CVE-2013-0432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0433/">CVE-2013-0433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0434/">CVE-2013-0434</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0435/">CVE-2013-0435</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0440/">CVE-2013-0440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0441/">CVE-2013-0441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0442/">CVE-2013-0442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0443/">CVE-2013-0443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0444/">CVE-2013-0444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0450/">CVE-2013-0450</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0809/">CVE-2013-0809</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1475/">CVE-2013-1475</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1476/">CVE-2013-1476</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1478/">CVE-2013-1478</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1480/">CVE-2013-1480</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1484/">CVE-2013-1484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1485/">CVE-2013-1485</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1486/">CVE-2013-1486</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1488/">CVE-2013-1488</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1493/">CVE-2013-1493</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1500/">CVE-2013-1500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1518/">CVE-2013-1518</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1537/">CVE-2013-1537</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1557/">CVE-2013-1557</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1569/">CVE-2013-1569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1571/">CVE-2013-1571</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2383/">CVE-2013-2383</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2384/">CVE-2013-2384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2407/">CVE-2013-2407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2412/">CVE-2013-2412</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2415/">CVE-2013-2415</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2417/">CVE-2013-2417</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2419/">CVE-2013-2419</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2420/">CVE-2013-2420</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2421/">CVE-2013-2421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2422/">CVE-2013-2422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2423/">CVE-2013-2423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2424/">CVE-2013-2424</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2426/">CVE-2013-2426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2429/">CVE-2013-2429</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2430/">CVE-2013-2430</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2431/">CVE-2013-2431</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2436/">CVE-2013-2436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2443/">CVE-2013-2443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2444/">CVE-2013-2444</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2445/">CVE-2013-2445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2446/">CVE-2013-2446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2447/">CVE-2013-2447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2448/">CVE-2013-2448</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2449/">CVE-2013-2449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2450/">CVE-2013-2450</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2451/">CVE-2013-2451</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2452/">CVE-2013-2452</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2453/">CVE-2013-2453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2454/">CVE-2013-2454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2455/">CVE-2013-2455</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2456/">CVE-2013-2456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2457/">CVE-2013-2457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2458/">CVE-2013-2458</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2459/">CVE-2013-2459</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2460/">CVE-2013-2460</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2461/">CVE-2013-2461</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2463/">CVE-2013-2463</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2465/">CVE-2013-2465</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2469/">CVE-2013-2469</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2470/">CVE-2013-2470</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2471/">CVE-2013-2471</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2472/">CVE-2013-2472</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2473/">CVE-2013-2473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3829/">CVE-2013-3829</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4002/">CVE-2013-4002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5772/">CVE-2013-5772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5774/">CVE-2013-5774</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5778/">CVE-2013-5778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5780/">CVE-2013-5780</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5782/">CVE-2013-5782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5783/">CVE-2013-5783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5784/">CVE-2013-5784</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5790/">CVE-2013-5790</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-5797/">CVE-2013-5797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5800/">CVE-2013-5800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5802/">CVE-2013-5802</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5803/">CVE-2013-5803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5804/">CVE-2013-5804</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5805/">CVE-2013-5805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5806/">CVE-2013-5806</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5809/">CVE-2013-5809</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5814/">CVE-2013-5814</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5817/">CVE-2013-5817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5820/">CVE-2013-5820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5823/">CVE-2013-5823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5825/">CVE-2013-5825</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5829/">CVE-2013-5829</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5830/">CVE-2013-5830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5840/">CVE-2013-5840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5842/">CVE-2013-5842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5849/">CVE-2013-5849</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5850/">CVE-2013-5850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5851/">CVE-2013-5851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5878/">CVE-2013-5878</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5884/">CVE-2013-5884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5893/">CVE-2013-5893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5896/">CVE-2013-5896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5907/">CVE-2013-5907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5910/">CVE-2013-5910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6954/">CVE-2013-6954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0368/">CVE-2014-0368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0373/">CVE-2014-0373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0376/">CVE-2014-0376</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0408/">CVE-2014-0408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0411/">CVE-2014-0411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0416/">CVE-2014-0416</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0422/">CVE-2014-0422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0423/">CVE-2014-0423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0428/">CVE-2014-0428</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0429/">CVE-2014-0429</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0446/">CVE-2014-0446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0451/">CVE-2014-0451</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0452/">CVE-2014-0452</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0453/">CVE-2014-0453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0454/">CVE-2014-0454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0455/">CVE-2014-0455</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0456/">CVE-2014-0456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0457/">CVE-2014-0457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0458/">CVE-2014-0458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0459/">CVE-2014-0459</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0460/">CVE-2014-0460</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0461/">CVE-2014-0461</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1876/">CVE-2014-1876</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2397/">CVE-2014-2397</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2398/">CVE-2014-2398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2402/">CVE-2014-2402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2403/">CVE-2014-2403</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2412/">CVE-2014-2412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2413/">CVE-2014-2413</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2414/">CVE-2014-2414</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2421/">CVE-2014-2421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2423/">CVE-2014-2423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2427/">CVE-2014-2427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2483/">CVE-2014-2483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2490/">CVE-2014-2490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4209/">CVE-2014-4209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4216/">CVE-2014-4216</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4218/">CVE-2014-4218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4219/">CVE-2014-4219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4221/">CVE-2014-4221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4223/">CVE-2014-4223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4244/">CVE-2014-4244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4252/">CVE-2014-4252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4262/">CVE-2014-4262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4263/">CVE-2014-4263</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4264/">CVE-2014-4264</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4266/">CVE-2014-4266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4268/">CVE-2014-4268</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6457/">CVE-2014-6457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6502/">CVE-2014-6502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6504/">CVE-2014-6504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6506/">CVE-2014-6506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6511/">CVE-2014-6511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6512/">CVE-2014-6512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6513/">CVE-2014-6513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6517/">CVE-2014-6517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6519/">CVE-2014-6519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6531/">CVE-2014-6531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6558/">CVE-2014-6558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6585/">CVE-2014-6585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6587/">CVE-2014-6587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6591/">CVE-2014-6591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6593/">CVE-2014-6593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6601/">CVE-2014-6601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0383/">CVE-2015-0383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0395/">CVE-2015-0395</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0400/">CVE-2015-0400</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0407/">CVE-2015-0407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0408/">CVE-2015-0408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0410/">CVE-2015-0410</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0412/">CVE-2015-0412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0460/">CVE-2015-0460</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2628/">CVE-2015-2628</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4881/">CVE-2015-4881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0636/">CVE-2016-0636</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0695/">CVE-2016-0695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3425/">CVE-2016-3425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3458/">CVE-2016-3458</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3498/">CVE-2016-3498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3500/">CVE-2016-3500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3503/">CVE-2016-3503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3508/">CVE-2016-3508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3511/">CVE-2016-3511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3550/">CVE-2016-3550</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3598/">CVE-2016-3598</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-3606/">CVE-2016-3606</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3610/">CVE-2016-3610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5546/">CVE-2016-5546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5547/">CVE-2016-5547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5548/">CVE-2016-5548</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5549/">CVE-2016-5549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5552/">CVE-2016-5552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5582/">CVE-2016-5582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3231/">CVE-2017-3231</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3241/">CVE-2017-3241</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3252/">CVE-2017-3252</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3253/">CVE-2017-3253</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3260/">CVE-2017-3260</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3261/">CVE-2017-3261</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3272/">CVE-2017-3272</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3289/">CVE-2017-3289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3511/">CVE-2017-3511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3512/">CVE-2017-3512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3514/">CVE-2017-3514</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3526/">CVE-2017-3526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76570" version="1" class="patch">
	<metadata>
		<title>java-1_7_0-openjdk-plugin-1.6.2-2.8.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-2513" ref_url="https://www.suse.com/security/cve/CVE-2011-2513/" source="CVE"/>
		<reference ref_id="CVE-2011-2514" ref_url="https://www.suse.com/security/cve/CVE-2011-2514/" source="CVE"/>
		<reference ref_id="CVE-2011-3377" ref_url="https://www.suse.com/security/cve/CVE-2011-3377/" source="CVE"/>
		<reference ref_id="CVE-2012-3422" ref_url="https://www.suse.com/security/cve/CVE-2012-3422/" source="CVE"/>
		<reference ref_id="CVE-2012-3423" ref_url="https://www.suse.com/security/cve/CVE-2012-3423/" source="CVE"/>
		<reference ref_id="CVE-2012-4540" ref_url="https://www.suse.com/security/cve/CVE-2012-4540/" source="CVE"/>
		<reference ref_id="CVE-2013-1926" ref_url="https://www.suse.com/security/cve/CVE-2013-1926/" source="CVE"/>
		<reference ref_id="CVE-2013-1927" ref_url="https://www.suse.com/security/cve/CVE-2013-1927/" source="CVE"/>
		<reference ref_id="CVE-2013-4349" ref_url="https://www.suse.com/security/cve/CVE-2013-4349/" source="CVE"/>
		<reference ref_id="CVE-2015-5234" ref_url="https://www.suse.com/security/cve/CVE-2015-5234/" source="CVE"/>
		<reference ref_id="CVE-2015-5235" ref_url="https://www.suse.com/security/cve/CVE-2015-5235/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_7_0-openjdk-plugin-1.6.2-2.8.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2513/">CVE-2011-2513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2514/">CVE-2011-2514</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3377/">CVE-2011-3377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3422/">CVE-2012-3422</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3423/">CVE-2012-3423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4540/">CVE-2012-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1926/">CVE-2013-1926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1927/">CVE-2013-1927</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4349/">CVE-2013-4349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5234/">CVE-2015-5234</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5235/">CVE-2015-5235</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159646" comment="java-1_7_0-openjdk-plugin-1.6.2-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159647" comment="java-1_8_0-openjdk-plugin-1.6.2-2.10.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76571" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openjdk-1.8.0.131-26.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2597" ref_url="https://www.suse.com/security/cve/CVE-2015-2597/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2619" ref_url="https://www.suse.com/security/cve/CVE-2015-2619/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2627" ref_url="https://www.suse.com/security/cve/CVE-2015-2627/" source="CVE"/>
		<reference ref_id="CVE-2015-2628" ref_url="https://www.suse.com/security/cve/CVE-2015-2628/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2659" ref_url="https://www.suse.com/security/cve/CVE-2015-2659/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4729" ref_url="https://www.suse.com/security/cve/CVE-2015-4729/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4736" ref_url="https://www.suse.com/security/cve/CVE-2015-4736/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4810" ref_url="https://www.suse.com/security/cve/CVE-2015-4810/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4868" ref_url="https://www.suse.com/security/cve/CVE-2015-4868/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4881" ref_url="https://www.suse.com/security/cve/CVE-2015-4881/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4901" ref_url="https://www.suse.com/security/cve/CVE-2015-4901/" source="CVE"/>
		<reference ref_id="CVE-2015-4902" ref_url="https://www.suse.com/security/cve/CVE-2015-4902/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4906" ref_url="https://www.suse.com/security/cve/CVE-2015-4906/" source="CVE"/>
		<reference ref_id="CVE-2015-4908" ref_url="https://www.suse.com/security/cve/CVE-2015-4908/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-4916" ref_url="https://www.suse.com/security/cve/CVE-2015-4916/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0475" ref_url="https://www.suse.com/security/cve/CVE-2016-0475/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="CVE-2016-0636" ref_url="https://www.suse.com/security/cve/CVE-2016-0636/" source="CVE"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-0695" ref_url="https://www.suse.com/security/cve/CVE-2016-0695/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-3425" ref_url="https://www.suse.com/security/cve/CVE-2016-3425/" source="CVE"/>
		<reference ref_id="CVE-2016-3426" ref_url="https://www.suse.com/security/cve/CVE-2016-3426/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="CVE-2016-3458" ref_url="https://www.suse.com/security/cve/CVE-2016-3458/" source="CVE"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<reference ref_id="CVE-2016-3498" ref_url="https://www.suse.com/security/cve/CVE-2016-3498/" source="CVE"/>
		<reference ref_id="CVE-2016-3500" ref_url="https://www.suse.com/security/cve/CVE-2016-3500/" source="CVE"/>
		<reference ref_id="CVE-2016-3503" ref_url="https://www.suse.com/security/cve/CVE-2016-3503/" source="CVE"/>
		<reference ref_id="CVE-2016-3508" ref_url="https://www.suse.com/security/cve/CVE-2016-3508/" source="CVE"/>
		<reference ref_id="CVE-2016-3511" ref_url="https://www.suse.com/security/cve/CVE-2016-3511/" source="CVE"/>
		<reference ref_id="CVE-2016-3550" ref_url="https://www.suse.com/security/cve/CVE-2016-3550/" source="CVE"/>
		<reference ref_id="CVE-2016-3552" ref_url="https://www.suse.com/security/cve/CVE-2016-3552/" source="CVE"/>
		<reference ref_id="CVE-2016-3587" ref_url="https://www.suse.com/security/cve/CVE-2016-3587/" source="CVE"/>
		<reference ref_id="CVE-2016-3598" ref_url="https://www.suse.com/security/cve/CVE-2016-3598/" source="CVE"/>
		<reference ref_id="CVE-2016-3606" ref_url="https://www.suse.com/security/cve/CVE-2016-3606/" source="CVE"/>
		<reference ref_id="CVE-2016-3610" ref_url="https://www.suse.com/security/cve/CVE-2016-3610/" source="CVE"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5546" ref_url="https://www.suse.com/security/cve/CVE-2016-5546/" source="CVE"/>
		<reference ref_id="CVE-2016-5547" ref_url="https://www.suse.com/security/cve/CVE-2016-5547/" source="CVE"/>
		<reference ref_id="CVE-2016-5548" ref_url="https://www.suse.com/security/cve/CVE-2016-5548/" source="CVE"/>
		<reference ref_id="CVE-2016-5549" ref_url="https://www.suse.com/security/cve/CVE-2016-5549/" source="CVE"/>
		<reference ref_id="CVE-2016-5552" ref_url="https://www.suse.com/security/cve/CVE-2016-5552/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5582" ref_url="https://www.suse.com/security/cve/CVE-2016-5582/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<reference ref_id="CVE-2017-3231" ref_url="https://www.suse.com/security/cve/CVE-2017-3231/" source="CVE"/>
		<reference ref_id="CVE-2017-3241" ref_url="https://www.suse.com/security/cve/CVE-2017-3241/" source="CVE"/>
		<reference ref_id="CVE-2017-3252" ref_url="https://www.suse.com/security/cve/CVE-2017-3252/" source="CVE"/>
		<reference ref_id="CVE-2017-3253" ref_url="https://www.suse.com/security/cve/CVE-2017-3253/" source="CVE"/>
		<reference ref_id="CVE-2017-3260" ref_url="https://www.suse.com/security/cve/CVE-2017-3260/" source="CVE"/>
		<reference ref_id="CVE-2017-3261" ref_url="https://www.suse.com/security/cve/CVE-2017-3261/" source="CVE"/>
		<reference ref_id="CVE-2017-3272" ref_url="https://www.suse.com/security/cve/CVE-2017-3272/" source="CVE"/>
		<reference ref_id="CVE-2017-3289" ref_url="https://www.suse.com/security/cve/CVE-2017-3289/" source="CVE"/>
		<reference ref_id="CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509/" source="CVE"/>
		<reference ref_id="CVE-2017-3511" ref_url="https://www.suse.com/security/cve/CVE-2017-3511/" source="CVE"/>
		<reference ref_id="CVE-2017-3512" ref_url="https://www.suse.com/security/cve/CVE-2017-3512/" source="CVE"/>
		<reference ref_id="CVE-2017-3514" ref_url="https://www.suse.com/security/cve/CVE-2017-3514/" source="CVE"/>
		<reference ref_id="CVE-2017-3526" ref_url="https://www.suse.com/security/cve/CVE-2017-3526/" source="CVE"/>
		<reference ref_id="CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533/" source="CVE"/>
		<reference ref_id="CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539/" source="CVE"/>
		<reference ref_id="CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.131-26.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2597/">CVE-2015-2597</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2619/">CVE-2015-2619</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2627/">CVE-2015-2627</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2628/">CVE-2015-2628</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2659/">CVE-2015-2659</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4729/">CVE-2015-4729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4736/">CVE-2015-4736</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4810/">CVE-2015-4810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4868/">CVE-2015-4868</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4881/">CVE-2015-4881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4901/">CVE-2015-4901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4902/">CVE-2015-4902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4906/">CVE-2015-4906</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4908/">CVE-2015-4908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4916/">CVE-2015-4916</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0475/">CVE-2016-0475</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0636/">CVE-2016-0636</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0695/">CVE-2016-0695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3425/">CVE-2016-3425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3426/">CVE-2016-3426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3458/">CVE-2016-3458</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3498/">CVE-2016-3498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3500/">CVE-2016-3500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3503/">CVE-2016-3503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3508/">CVE-2016-3508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3511/">CVE-2016-3511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3550/">CVE-2016-3550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3552/">CVE-2016-3552</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3587/">CVE-2016-3587</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3598/">CVE-2016-3598</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-3606/">CVE-2016-3606</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3610/">CVE-2016-3610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5546/">CVE-2016-5546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5547/">CVE-2016-5547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5548/">CVE-2016-5548</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5549/">CVE-2016-5549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5552/">CVE-2016-5552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5582/">CVE-2016-5582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3231/">CVE-2017-3231</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3241/">CVE-2017-3241</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3252/">CVE-2017-3252</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3253/">CVE-2017-3253</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3260/">CVE-2017-3260</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3261/">CVE-2017-3261</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3272/">CVE-2017-3272</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3289/">CVE-2017-3289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3511/">CVE-2017-3511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3512/">CVE-2017-3512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3514/">CVE-2017-3514</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3526/">CVE-2017-3526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76572" version="1" class="patch">
	<metadata>
		<title>kbd-1.15.5-8.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-0460" ref_url="https://www.suse.com/security/cve/CVE-2011-0460/" source="CVE"/>
		<description>
These are all security issues fixed in the kbd-1.15.5-8.7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0460/">CVE-2011-0460</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140693" comment="kbd-1.15.5-8.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76573" version="1" class="patch">
	<metadata>
		<title>kdump-0.8.16-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-5759" ref_url="https://www.suse.com/security/cve/CVE-2016-5759/" source="CVE"/>
		<description>
These are all security issues fixed in the kdump-0.8.16-5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5759/">CVE-2016-5759</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159034" comment="kdump-0.8.16-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76574" version="1" class="patch">
	<metadata>
		<title>kernel-default-4.4.73-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-3939" ref_url="https://www.suse.com/security/cve/CVE-2009-3939/" source="CVE"/>
		<reference ref_id="CVE-2009-4026" ref_url="https://www.suse.com/security/cve/CVE-2009-4026/" source="CVE"/>
		<reference ref_id="CVE-2009-4027" ref_url="https://www.suse.com/security/cve/CVE-2009-4027/" source="CVE"/>
		<reference ref_id="CVE-2009-4131" ref_url="https://www.suse.com/security/cve/CVE-2009-4131/" source="CVE"/>
		<reference ref_id="CVE-2009-4138" ref_url="https://www.suse.com/security/cve/CVE-2009-4138/" source="CVE"/>
		<reference ref_id="CVE-2009-4536" ref_url="https://www.suse.com/security/cve/CVE-2009-4536/" source="CVE"/>
		<reference ref_id="CVE-2009-4538" ref_url="https://www.suse.com/security/cve/CVE-2009-4538/" source="CVE"/>
		<reference ref_id="CVE-2010-1146" ref_url="https://www.suse.com/security/cve/CVE-2010-1146/" source="CVE"/>
		<reference ref_id="CVE-2010-1436" ref_url="https://www.suse.com/security/cve/CVE-2010-1436/" source="CVE"/>
		<reference ref_id="CVE-2010-1641" ref_url="https://www.suse.com/security/cve/CVE-2010-1641/" source="CVE"/>
		<reference ref_id="CVE-2010-2066" ref_url="https://www.suse.com/security/cve/CVE-2010-2066/" source="CVE"/>
		<reference ref_id="CVE-2010-2942" ref_url="https://www.suse.com/security/cve/CVE-2010-2942/" source="CVE"/>
		<reference ref_id="CVE-2010-2954" ref_url="https://www.suse.com/security/cve/CVE-2010-2954/" source="CVE"/>
		<reference ref_id="CVE-2010-2955" ref_url="https://www.suse.com/security/cve/CVE-2010-2955/" source="CVE"/>
		<reference ref_id="CVE-2010-3081" ref_url="https://www.suse.com/security/cve/CVE-2010-3081/" source="CVE"/>
		<reference ref_id="CVE-2010-3296" ref_url="https://www.suse.com/security/cve/CVE-2010-3296/" source="CVE"/>
		<reference ref_id="CVE-2010-3297" ref_url="https://www.suse.com/security/cve/CVE-2010-3297/" source="CVE"/>
		<reference ref_id="CVE-2010-3298" ref_url="https://www.suse.com/security/cve/CVE-2010-3298/" source="CVE"/>
		<reference ref_id="CVE-2010-3301" ref_url="https://www.suse.com/security/cve/CVE-2010-3301/" source="CVE"/>
		<reference ref_id="CVE-2010-3310" ref_url="https://www.suse.com/security/cve/CVE-2010-3310/" source="CVE"/>
		<reference ref_id="CVE-2011-0712" ref_url="https://www.suse.com/security/cve/CVE-2011-0712/" source="CVE"/>
		<reference ref_id="CVE-2011-1020" ref_url="https://www.suse.com/security/cve/CVE-2011-1020/" source="CVE"/>
		<reference ref_id="CVE-2011-1577" ref_url="https://www.suse.com/security/cve/CVE-2011-1577/" source="CVE"/>
		<reference ref_id="CVE-2011-2203" ref_url="https://www.suse.com/security/cve/CVE-2011-2203/" source="CVE"/>
		<reference ref_id="CVE-2012-0056" ref_url="https://www.suse.com/security/cve/CVE-2012-0056/" source="CVE"/>
		<reference ref_id="CVE-2013-0160" ref_url="https://www.suse.com/security/cve/CVE-2013-0160/" source="CVE"/>
		<reference ref_id="CVE-2013-0231" ref_url="https://www.suse.com/security/cve/CVE-2013-0231/" source="CVE"/>
		<reference ref_id="CVE-2013-0913" ref_url="https://www.suse.com/security/cve/CVE-2013-0913/" source="CVE"/>
		<reference ref_id="CVE-2013-2850" ref_url="https://www.suse.com/security/cve/CVE-2013-2850/" source="CVE"/>
		<reference ref_id="CVE-2013-4312" ref_url="https://www.suse.com/security/cve/CVE-2013-4312/" source="CVE"/>
		<reference ref_id="CVE-2014-0038" ref_url="https://www.suse.com/security/cve/CVE-2014-0038/" source="CVE"/>
		<reference ref_id="CVE-2014-0196" ref_url="https://www.suse.com/security/cve/CVE-2014-0196/" source="CVE"/>
		<reference ref_id="CVE-2014-0691" ref_url="https://www.suse.com/security/cve/CVE-2014-0691/" source="CVE"/>
		<reference ref_id="CVE-2015-1350" ref_url="https://www.suse.com/security/cve/CVE-2015-1350/" source="CVE"/>
		<reference ref_id="CVE-2015-7833" ref_url="https://www.suse.com/security/cve/CVE-2015-7833/" source="CVE"/>
		<reference ref_id="CVE-2015-7884" ref_url="https://www.suse.com/security/cve/CVE-2015-7884/" source="CVE"/>
		<reference ref_id="CVE-2015-7885" ref_url="https://www.suse.com/security/cve/CVE-2015-7885/" source="CVE"/>
		<reference ref_id="CVE-2015-8709" ref_url="https://www.suse.com/security/cve/CVE-2015-8709/" source="CVE"/>
		<reference ref_id="CVE-2015-8812" ref_url="https://www.suse.com/security/cve/CVE-2015-8812/" source="CVE"/>
		<reference ref_id="CVE-2015-8964" ref_url="https://www.suse.com/security/cve/CVE-2015-8964/" source="CVE"/>
		<reference ref_id="CVE-2016-0617" ref_url="https://www.suse.com/security/cve/CVE-2016-0617/" source="CVE"/>
		<reference ref_id="CVE-2016-0723" ref_url="https://www.suse.com/security/cve/CVE-2016-0723/" source="CVE"/>
		<reference ref_id="CVE-2016-0728" ref_url="https://www.suse.com/security/cve/CVE-2016-0728/" source="CVE"/>
		<reference ref_id="CVE-2016-0758" ref_url="https://www.suse.com/security/cve/CVE-2016-0758/" source="CVE"/>
		<reference ref_id="CVE-2016-10200" ref_url="https://www.suse.com/security/cve/CVE-2016-10200/" source="CVE"/>
		<reference ref_id="CVE-2016-1237" ref_url="https://www.suse.com/security/cve/CVE-2016-1237/" source="CVE"/>
		<reference ref_id="CVE-2016-1583" ref_url="https://www.suse.com/security/cve/CVE-2016-1583/" source="CVE"/>
		<reference ref_id="CVE-2016-2117" ref_url="https://www.suse.com/security/cve/CVE-2016-2117/" source="CVE"/>
		<reference ref_id="CVE-2016-2143" ref_url="https://www.suse.com/security/cve/CVE-2016-2143/" source="CVE"/>
		<reference ref_id="CVE-2016-2184" ref_url="https://www.suse.com/security/cve/CVE-2016-2184/" source="CVE"/>
		<reference ref_id="CVE-2016-2185" ref_url="https://www.suse.com/security/cve/CVE-2016-2185/" source="CVE"/>
		<reference ref_id="CVE-2016-2186" ref_url="https://www.suse.com/security/cve/CVE-2016-2186/" source="CVE"/>
		<reference ref_id="CVE-2016-2188" ref_url="https://www.suse.com/security/cve/CVE-2016-2188/" source="CVE"/>
		<reference ref_id="CVE-2016-2383" ref_url="https://www.suse.com/security/cve/CVE-2016-2383/" source="CVE"/>
		<reference ref_id="CVE-2016-2384" ref_url="https://www.suse.com/security/cve/CVE-2016-2384/" source="CVE"/>
		<reference ref_id="CVE-2016-2847" ref_url="https://www.suse.com/security/cve/CVE-2016-2847/" source="CVE"/>
		<reference ref_id="CVE-2016-3134" ref_url="https://www.suse.com/security/cve/CVE-2016-3134/" source="CVE"/>
		<reference ref_id="CVE-2016-3135" ref_url="https://www.suse.com/security/cve/CVE-2016-3135/" source="CVE"/>
		<reference ref_id="CVE-2016-3136" ref_url="https://www.suse.com/security/cve/CVE-2016-3136/" source="CVE"/>
		<reference ref_id="CVE-2016-3137" ref_url="https://www.suse.com/security/cve/CVE-2016-3137/" source="CVE"/>
		<reference ref_id="CVE-2016-3138" ref_url="https://www.suse.com/security/cve/CVE-2016-3138/" source="CVE"/>
		<reference ref_id="CVE-2016-3140" ref_url="https://www.suse.com/security/cve/CVE-2016-3140/" source="CVE"/>
		<reference ref_id="CVE-2016-3156" ref_url="https://www.suse.com/security/cve/CVE-2016-3156/" source="CVE"/>
		<reference ref_id="CVE-2016-3672" ref_url="https://www.suse.com/security/cve/CVE-2016-3672/" source="CVE"/>
		<reference ref_id="CVE-2016-3689" ref_url="https://www.suse.com/security/cve/CVE-2016-3689/" source="CVE"/>
		<reference ref_id="CVE-2016-3713" ref_url="https://www.suse.com/security/cve/CVE-2016-3713/" source="CVE"/>
		<reference ref_id="CVE-2016-3951" ref_url="https://www.suse.com/security/cve/CVE-2016-3951/" source="CVE"/>
		<reference ref_id="CVE-2016-4470" ref_url="https://www.suse.com/security/cve/CVE-2016-4470/" source="CVE"/>
		<reference ref_id="CVE-2016-4482" ref_url="https://www.suse.com/security/cve/CVE-2016-4482/" source="CVE"/>
		<reference ref_id="CVE-2016-4486" ref_url="https://www.suse.com/security/cve/CVE-2016-4486/" source="CVE"/>
		<reference ref_id="CVE-2016-4557" ref_url="https://www.suse.com/security/cve/CVE-2016-4557/" source="CVE"/>
		<reference ref_id="CVE-2016-4558" ref_url="https://www.suse.com/security/cve/CVE-2016-4558/" source="CVE"/>
		<reference ref_id="CVE-2016-4569" ref_url="https://www.suse.com/security/cve/CVE-2016-4569/" source="CVE"/>
		<reference ref_id="CVE-2016-4578" ref_url="https://www.suse.com/security/cve/CVE-2016-4578/" source="CVE"/>
		<reference ref_id="CVE-2016-4794" ref_url="https://www.suse.com/security/cve/CVE-2016-4794/" source="CVE"/>
		<reference ref_id="CVE-2016-4805" ref_url="https://www.suse.com/security/cve/CVE-2016-4805/" source="CVE"/>
		<reference ref_id="CVE-2016-4951" ref_url="https://www.suse.com/security/cve/CVE-2016-4951/" source="CVE"/>
		<reference ref_id="CVE-2016-4997" ref_url="https://www.suse.com/security/cve/CVE-2016-4997/" source="CVE"/>
		<reference ref_id="CVE-2016-4998" ref_url="https://www.suse.com/security/cve/CVE-2016-4998/" source="CVE"/>
		<reference ref_id="CVE-2016-5195" ref_url="https://www.suse.com/security/cve/CVE-2016-5195/" source="CVE"/>
		<reference ref_id="CVE-2016-5244" ref_url="https://www.suse.com/security/cve/CVE-2016-5244/" source="CVE"/>
		<reference ref_id="CVE-2016-5412" ref_url="https://www.suse.com/security/cve/CVE-2016-5412/" source="CVE"/>
		<reference ref_id="CVE-2016-5696" ref_url="https://www.suse.com/security/cve/CVE-2016-5696/" source="CVE"/>
		<reference ref_id="CVE-2016-5828" ref_url="https://www.suse.com/security/cve/CVE-2016-5828/" source="CVE"/>
		<reference ref_id="CVE-2016-5829" ref_url="https://www.suse.com/security/cve/CVE-2016-5829/" source="CVE"/>
		<reference ref_id="CVE-2016-6197" ref_url="https://www.suse.com/security/cve/CVE-2016-6197/" source="CVE"/>
		<reference ref_id="CVE-2016-6480" ref_url="https://www.suse.com/security/cve/CVE-2016-6480/" source="CVE"/>
		<reference ref_id="CVE-2016-6828" ref_url="https://www.suse.com/security/cve/CVE-2016-6828/" source="CVE"/>
		<reference ref_id="CVE-2016-7039" ref_url="https://www.suse.com/security/cve/CVE-2016-7039/" source="CVE"/>
		<reference ref_id="CVE-2016-7042" ref_url="https://www.suse.com/security/cve/CVE-2016-7042/" source="CVE"/>
		<reference ref_id="CVE-2016-7097" ref_url="https://www.suse.com/security/cve/CVE-2016-7097/" source="CVE"/>
		<reference ref_id="CVE-2016-7117" ref_url="https://www.suse.com/security/cve/CVE-2016-7117/" source="CVE"/>
		<reference ref_id="CVE-2016-7425" ref_url="https://www.suse.com/security/cve/CVE-2016-7425/" source="CVE"/>
		<reference ref_id="CVE-2016-7913" ref_url="https://www.suse.com/security/cve/CVE-2016-7913/" source="CVE"/>
		<reference ref_id="CVE-2016-7917" ref_url="https://www.suse.com/security/cve/CVE-2016-7917/" source="CVE"/>
		<reference ref_id="CVE-2016-8632" ref_url="https://www.suse.com/security/cve/CVE-2016-8632/" source="CVE"/>
		<reference ref_id="CVE-2016-8636" ref_url="https://www.suse.com/security/cve/CVE-2016-8636/" source="CVE"/>
		<reference ref_id="CVE-2016-8645" ref_url="https://www.suse.com/security/cve/CVE-2016-8645/" source="CVE"/>
		<reference ref_id="CVE-2016-8655" ref_url="https://www.suse.com/security/cve/CVE-2016-8655/" source="CVE"/>
		<reference ref_id="CVE-2016-8658" ref_url="https://www.suse.com/security/cve/CVE-2016-8658/" source="CVE"/>
		<reference ref_id="CVE-2016-8666" ref_url="https://www.suse.com/security/cve/CVE-2016-8666/" source="CVE"/>
		<reference ref_id="CVE-2016-9083" ref_url="https://www.suse.com/security/cve/CVE-2016-9083/" source="CVE"/>
		<reference ref_id="CVE-2016-9084" ref_url="https://www.suse.com/security/cve/CVE-2016-9084/" source="CVE"/>
		<reference ref_id="CVE-2016-9191" ref_url="https://www.suse.com/security/cve/CVE-2016-9191/" source="CVE"/>
		<reference ref_id="CVE-2016-9555" ref_url="https://www.suse.com/security/cve/CVE-2016-9555/" source="CVE"/>
		<reference ref_id="CVE-2016-9576" ref_url="https://www.suse.com/security/cve/CVE-2016-9576/" source="CVE"/>
		<reference ref_id="CVE-2016-9793" ref_url="https://www.suse.com/security/cve/CVE-2016-9793/" source="CVE"/>
		<reference ref_id="CVE-2016-9794" ref_url="https://www.suse.com/security/cve/CVE-2016-9794/" source="CVE"/>
		<reference ref_id="CVE-2016-9806" ref_url="https://www.suse.com/security/cve/CVE-2016-9806/" source="CVE"/>
		<reference ref_id="CVE-2016-9919" ref_url="https://www.suse.com/security/cve/CVE-2016-9919/" source="CVE"/>
		<reference ref_id="CVE-2017-1000364" ref_url="https://www.suse.com/security/cve/CVE-2017-1000364/" source="CVE"/>
		<reference ref_id="CVE-2017-1000365" ref_url="https://www.suse.com/security/cve/CVE-2017-1000365/" source="CVE"/>
		<reference ref_id="CVE-2017-1000380" ref_url="https://www.suse.com/security/cve/CVE-2017-1000380/" source="CVE"/>
		<reference ref_id="CVE-2017-2583" ref_url="https://www.suse.com/security/cve/CVE-2017-2583/" source="CVE"/>
		<reference ref_id="CVE-2017-2584" ref_url="https://www.suse.com/security/cve/CVE-2017-2584/" source="CVE"/>
		<reference ref_id="CVE-2017-2596" ref_url="https://www.suse.com/security/cve/CVE-2017-2596/" source="CVE"/>
		<reference ref_id="CVE-2017-2636" ref_url="https://www.suse.com/security/cve/CVE-2017-2636/" source="CVE"/>
		<reference ref_id="CVE-2017-2671" ref_url="https://www.suse.com/security/cve/CVE-2017-2671/" source="CVE"/>
		<reference ref_id="CVE-2017-5551" ref_url="https://www.suse.com/security/cve/CVE-2017-5551/" source="CVE"/>
		<reference ref_id="CVE-2017-5576" ref_url="https://www.suse.com/security/cve/CVE-2017-5576/" source="CVE"/>
		<reference ref_id="CVE-2017-5577" ref_url="https://www.suse.com/security/cve/CVE-2017-5577/" source="CVE"/>
		<reference ref_id="CVE-2017-5897" ref_url="https://www.suse.com/security/cve/CVE-2017-5897/" source="CVE"/>
		<reference ref_id="CVE-2017-5970" ref_url="https://www.suse.com/security/cve/CVE-2017-5970/" source="CVE"/>
		<reference ref_id="CVE-2017-5986" ref_url="https://www.suse.com/security/cve/CVE-2017-5986/" source="CVE"/>
		<reference ref_id="CVE-2017-6074" ref_url="https://www.suse.com/security/cve/CVE-2017-6074/" source="CVE"/>
		<reference ref_id="CVE-2017-6214" ref_url="https://www.suse.com/security/cve/CVE-2017-6214/" source="CVE"/>
		<reference ref_id="CVE-2017-6345" ref_url="https://www.suse.com/security/cve/CVE-2017-6345/" source="CVE"/>
		<reference ref_id="CVE-2017-6346" ref_url="https://www.suse.com/security/cve/CVE-2017-6346/" source="CVE"/>
		<reference ref_id="CVE-2017-6347" ref_url="https://www.suse.com/security/cve/CVE-2017-6347/" source="CVE"/>
		<reference ref_id="CVE-2017-6353" ref_url="https://www.suse.com/security/cve/CVE-2017-6353/" source="CVE"/>
		<reference ref_id="CVE-2017-7184" ref_url="https://www.suse.com/security/cve/CVE-2017-7184/" source="CVE"/>
		<reference ref_id="CVE-2017-7187" ref_url="https://www.suse.com/security/cve/CVE-2017-7187/" source="CVE"/>
		<reference ref_id="CVE-2017-7261" ref_url="https://www.suse.com/security/cve/CVE-2017-7261/" source="CVE"/>
		<reference ref_id="CVE-2017-7294" ref_url="https://www.suse.com/security/cve/CVE-2017-7294/" source="CVE"/>
		<reference ref_id="CVE-2017-7308" ref_url="https://www.suse.com/security/cve/CVE-2017-7308/" source="CVE"/>
		<reference ref_id="CVE-2017-7346" ref_url="https://www.suse.com/security/cve/CVE-2017-7346/" source="CVE"/>
		<reference ref_id="CVE-2017-7374" ref_url="https://www.suse.com/security/cve/CVE-2017-7374/" source="CVE"/>
		<reference ref_id="CVE-2017-7487" ref_url="https://www.suse.com/security/cve/CVE-2017-7487/" source="CVE"/>
		<reference ref_id="CVE-2017-7518" ref_url="https://www.suse.com/security/cve/CVE-2017-7518/" source="CVE"/>
		<reference ref_id="CVE-2017-7616" ref_url="https://www.suse.com/security/cve/CVE-2017-7616/" source="CVE"/>
		<reference ref_id="CVE-2017-7618" ref_url="https://www.suse.com/security/cve/CVE-2017-7618/" source="CVE"/>
		<reference ref_id="CVE-2017-8890" ref_url="https://www.suse.com/security/cve/CVE-2017-8890/" source="CVE"/>
		<reference ref_id="CVE-2017-9074" ref_url="https://www.suse.com/security/cve/CVE-2017-9074/" source="CVE"/>
		<reference ref_id="CVE-2017-9075" ref_url="https://www.suse.com/security/cve/CVE-2017-9075/" source="CVE"/>
		<reference ref_id="CVE-2017-9076" ref_url="https://www.suse.com/security/cve/CVE-2017-9076/" source="CVE"/>
		<reference ref_id="CVE-2017-9077" ref_url="https://www.suse.com/security/cve/CVE-2017-9077/" source="CVE"/>
		<reference ref_id="CVE-2017-9150" ref_url="https://www.suse.com/security/cve/CVE-2017-9150/" source="CVE"/>
		<reference ref_id="CVE-2017-9242" ref_url="https://www.suse.com/security/cve/CVE-2017-9242/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-default-4.4.73-5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3939/">CVE-2009-3939</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4026/">CVE-2009-4026</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4027/">CVE-2009-4027</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4131/">CVE-2009-4131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4138/">CVE-2009-4138</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4536/">CVE-2009-4536</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4538/">CVE-2009-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1146/">CVE-2010-1146</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1436/">CVE-2010-1436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1641/">CVE-2010-1641</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-2066/">CVE-2010-2066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2942/">CVE-2010-2942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2954/">CVE-2010-2954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2955/">CVE-2010-2955</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3081/">CVE-2010-3081</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3296/">CVE-2010-3296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3297/">CVE-2010-3297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3298/">CVE-2010-3298</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3301/">CVE-2010-3301</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3310/">CVE-2010-3310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0712/">CVE-2011-0712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1020/">CVE-2011-1020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1577/">CVE-2011-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2203/">CVE-2011-2203</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0056/">CVE-2012-0056</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0160/">CVE-2013-0160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0231/">CVE-2013-0231</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0913/">CVE-2013-0913</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2850/">CVE-2013-2850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4312/">CVE-2013-4312</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0038/">CVE-2014-0038</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0196/">CVE-2014-0196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0691/">CVE-2014-0691</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1350/">CVE-2015-1350</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-7833/">CVE-2015-7833</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7884/">CVE-2015-7884</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7885/">CVE-2015-7885</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8709/">CVE-2015-8709</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8812/">CVE-2015-8812</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-8964/">CVE-2015-8964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0617/">CVE-2016-0617</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0723/">CVE-2016-0723</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0728/">CVE-2016-0728</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0758/">CVE-2016-0758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10200/">CVE-2016-10200</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1237/">CVE-2016-1237</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1583/">CVE-2016-1583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2117/">CVE-2016-2117</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2143/">CVE-2016-2143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2184/">CVE-2016-2184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2185/">CVE-2016-2185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2186/">CVE-2016-2186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2188/">CVE-2016-2188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2383/">CVE-2016-2383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2384/">CVE-2016-2384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2847/">CVE-2016-2847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3134/">CVE-2016-3134</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3135/">CVE-2016-3135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3136/">CVE-2016-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3137/">CVE-2016-3137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3138/">CVE-2016-3138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3140/">CVE-2016-3140</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3156/">CVE-2016-3156</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3672/">CVE-2016-3672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3689/">CVE-2016-3689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3713/">CVE-2016-3713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3951/">CVE-2016-3951</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4470/">CVE-2016-4470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4482/">CVE-2016-4482</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4486/">CVE-2016-4486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4557/">CVE-2016-4557</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4558/">CVE-2016-4558</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4569/">CVE-2016-4569</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4578/">CVE-2016-4578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4794/">CVE-2016-4794</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4805/">CVE-2016-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4951/">CVE-2016-4951</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4997/">CVE-2016-4997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4998/">CVE-2016-4998</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5195/">CVE-2016-5195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5244/">CVE-2016-5244</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5412/">CVE-2016-5412</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5696/">CVE-2016-5696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5828/">CVE-2016-5828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5829/">CVE-2016-5829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6197/">CVE-2016-6197</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6480/">CVE-2016-6480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6828/">CVE-2016-6828</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7039/">CVE-2016-7039</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7042/">CVE-2016-7042</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7097/">CVE-2016-7097</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7117/">CVE-2016-7117</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7425/">CVE-2016-7425</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7913/">CVE-2016-7913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7917/">CVE-2016-7917</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8632/">CVE-2016-8632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8636/">CVE-2016-8636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8645/">CVE-2016-8645</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8655/">CVE-2016-8655</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8658/">CVE-2016-8658</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-8666/">CVE-2016-8666</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9083/">CVE-2016-9083</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9084/">CVE-2016-9084</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9191/">CVE-2016-9191</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9555/">CVE-2016-9555</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9576/">CVE-2016-9576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9793/">CVE-2016-9793</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9794/">CVE-2016-9794</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9806/">CVE-2016-9806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9919/">CVE-2016-9919</cve>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000364/">CVE-2017-1000364</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000365/">CVE-2017-1000365</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000380/">CVE-2017-1000380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2583/">CVE-2017-2583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2584/">CVE-2017-2584</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-2596/">CVE-2017-2596</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2636/">CVE-2017-2636</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2671/">CVE-2017-2671</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5551/">CVE-2017-5551</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5576/">CVE-2017-5576</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5577/">CVE-2017-5577</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5897/">CVE-2017-5897</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5970/">CVE-2017-5970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5986/">CVE-2017-5986</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6074/">CVE-2017-6074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6214/">CVE-2017-6214</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6345/">CVE-2017-6345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6346/">CVE-2017-6346</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6347/">CVE-2017-6347</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6353/">CVE-2017-6353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7184/">CVE-2017-7184</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7187/">CVE-2017-7187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7261/">CVE-2017-7261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7294/">CVE-2017-7294</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7308/">CVE-2017-7308</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7346/">CVE-2017-7346</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7374/">CVE-2017-7374</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7487/">CVE-2017-7487</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7518/">CVE-2017-7518</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7616/">CVE-2017-7616</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7618/">CVE-2017-7618</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8890/">CVE-2017-8890</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9074/">CVE-2017-9074</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9075/">CVE-2017-9075</cve>
	<cve impact="important" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9076/">CVE-2017-9076</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9077/">CVE-2017-9077</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9150/">CVE-2017-9150</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9242/">CVE-2017-9242</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159648" comment="kernel-default-extra-4.4.73-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76575" version="1" class="patch">
	<metadata>
		<title>krb5-1.12.5-39.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2002-2443" ref_url="https://www.suse.com/security/cve/CVE-2002-2443/" source="CVE"/>
		<reference ref_id="CVE-2009-0844" ref_url="https://www.suse.com/security/cve/CVE-2009-0844/" source="CVE"/>
		<reference ref_id="CVE-2009-0845" ref_url="https://www.suse.com/security/cve/CVE-2009-0845/" source="CVE"/>
		<reference ref_id="CVE-2009-0846" ref_url="https://www.suse.com/security/cve/CVE-2009-0846/" source="CVE"/>
		<reference ref_id="CVE-2009-0847" ref_url="https://www.suse.com/security/cve/CVE-2009-0847/" source="CVE"/>
		<reference ref_id="CVE-2009-3295" ref_url="https://www.suse.com/security/cve/CVE-2009-3295/" source="CVE"/>
		<reference ref_id="CVE-2009-4212" ref_url="https://www.suse.com/security/cve/CVE-2009-4212/" source="CVE"/>
		<reference ref_id="CVE-2010-0283" ref_url="https://www.suse.com/security/cve/CVE-2010-0283/" source="CVE"/>
		<reference ref_id="CVE-2010-0628" ref_url="https://www.suse.com/security/cve/CVE-2010-0628/" source="CVE"/>
		<reference ref_id="CVE-2010-1320" ref_url="https://www.suse.com/security/cve/CVE-2010-1320/" source="CVE"/>
		<reference ref_id="CVE-2010-1321" ref_url="https://www.suse.com/security/cve/CVE-2010-1321/" source="CVE"/>
		<reference ref_id="CVE-2010-1322" ref_url="https://www.suse.com/security/cve/CVE-2010-1322/" source="CVE"/>
		<reference ref_id="CVE-2010-1323" ref_url="https://www.suse.com/security/cve/CVE-2010-1323/" source="CVE"/>
		<reference ref_id="CVE-2010-1324" ref_url="https://www.suse.com/security/cve/CVE-2010-1324/" source="CVE"/>
		<reference ref_id="CVE-2010-4020" ref_url="https://www.suse.com/security/cve/CVE-2010-4020/" source="CVE"/>
		<reference ref_id="CVE-2010-4021" ref_url="https://www.suse.com/security/cve/CVE-2010-4021/" source="CVE"/>
		<reference ref_id="CVE-2010-4022" ref_url="https://www.suse.com/security/cve/CVE-2010-4022/" source="CVE"/>
		<reference ref_id="CVE-2011-0281" ref_url="https://www.suse.com/security/cve/CVE-2011-0281/" source="CVE"/>
		<reference ref_id="CVE-2011-0282" ref_url="https://www.suse.com/security/cve/CVE-2011-0282/" source="CVE"/>
		<reference ref_id="CVE-2011-0284" ref_url="https://www.suse.com/security/cve/CVE-2011-0284/" source="CVE"/>
		<reference ref_id="CVE-2011-0285" ref_url="https://www.suse.com/security/cve/CVE-2011-0285/" source="CVE"/>
		<reference ref_id="CVE-2011-1527" ref_url="https://www.suse.com/security/cve/CVE-2011-1527/" source="CVE"/>
		<reference ref_id="CVE-2011-1528" ref_url="https://www.suse.com/security/cve/CVE-2011-1528/" source="CVE"/>
		<reference ref_id="CVE-2011-1529" ref_url="https://www.suse.com/security/cve/CVE-2011-1529/" source="CVE"/>
		<reference ref_id="CVE-2011-1530" ref_url="https://www.suse.com/security/cve/CVE-2011-1530/" source="CVE"/>
		<reference ref_id="CVE-2012-1012" ref_url="https://www.suse.com/security/cve/CVE-2012-1012/" source="CVE"/>
		<reference ref_id="CVE-2012-1013" ref_url="https://www.suse.com/security/cve/CVE-2012-1013/" source="CVE"/>
		<reference ref_id="CVE-2012-1016" ref_url="https://www.suse.com/security/cve/CVE-2012-1016/" source="CVE"/>
		<reference ref_id="CVE-2013-1415" ref_url="https://www.suse.com/security/cve/CVE-2013-1415/" source="CVE"/>
		<reference ref_id="CVE-2013-1417" ref_url="https://www.suse.com/security/cve/CVE-2013-1417/" source="CVE"/>
		<reference ref_id="CVE-2013-1418" ref_url="https://www.suse.com/security/cve/CVE-2013-1418/" source="CVE"/>
		<reference ref_id="CVE-2014-4341" ref_url="https://www.suse.com/security/cve/CVE-2014-4341/" source="CVE"/>
		<reference ref_id="CVE-2014-4342" ref_url="https://www.suse.com/security/cve/CVE-2014-4342/" source="CVE"/>
		<reference ref_id="CVE-2014-4343" ref_url="https://www.suse.com/security/cve/CVE-2014-4343/" source="CVE"/>
		<reference ref_id="CVE-2014-4344" ref_url="https://www.suse.com/security/cve/CVE-2014-4344/" source="CVE"/>
		<reference ref_id="CVE-2014-4345" ref_url="https://www.suse.com/security/cve/CVE-2014-4345/" source="CVE"/>
		<reference ref_id="CVE-2014-5351" ref_url="https://www.suse.com/security/cve/CVE-2014-5351/" source="CVE"/>
		<reference ref_id="CVE-2014-5352" ref_url="https://www.suse.com/security/cve/CVE-2014-5352/" source="CVE"/>
		<reference ref_id="CVE-2014-5353" ref_url="https://www.suse.com/security/cve/CVE-2014-5353/" source="CVE"/>
		<reference ref_id="CVE-2014-5354" ref_url="https://www.suse.com/security/cve/CVE-2014-5354/" source="CVE"/>
		<reference ref_id="CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355/" source="CVE"/>
		<reference ref_id="CVE-2014-9421" ref_url="https://www.suse.com/security/cve/CVE-2014-9421/" source="CVE"/>
		<reference ref_id="CVE-2014-9422" ref_url="https://www.suse.com/security/cve/CVE-2014-9422/" source="CVE"/>
		<reference ref_id="CVE-2014-9423" ref_url="https://www.suse.com/security/cve/CVE-2014-9423/" source="CVE"/>
		<reference ref_id="CVE-2015-2694" ref_url="https://www.suse.com/security/cve/CVE-2015-2694/" source="CVE"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="CVE-2015-2696" ref_url="https://www.suse.com/security/cve/CVE-2015-2696/" source="CVE"/>
		<reference ref_id="CVE-2015-2697" ref_url="https://www.suse.com/security/cve/CVE-2015-2697/" source="CVE"/>
		<reference ref_id="CVE-2015-2698" ref_url="https://www.suse.com/security/cve/CVE-2015-2698/" source="CVE"/>
		<reference ref_id="CVE-2015-8629" ref_url="https://www.suse.com/security/cve/CVE-2015-8629/" source="CVE"/>
		<reference ref_id="CVE-2015-8630" ref_url="https://www.suse.com/security/cve/CVE-2015-8630/" source="CVE"/>
		<reference ref_id="CVE-2015-8631" ref_url="https://www.suse.com/security/cve/CVE-2015-8631/" source="CVE"/>
		<reference ref_id="CVE-2016-3119" ref_url="https://www.suse.com/security/cve/CVE-2016-3119/" source="CVE"/>
		<reference ref_id="CVE-2016-3120" ref_url="https://www.suse.com/security/cve/CVE-2016-3120/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-1.12.5-39.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2002-2443/">CVE-2002-2443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0844/">CVE-2009-0844</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0845/">CVE-2009-0845</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0846/">CVE-2009-0846</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0847/">CVE-2009-0847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3295/">CVE-2009-3295</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-4212/">CVE-2009-4212</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0283/">CVE-2010-0283</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0628/">CVE-2010-0628</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1320/">CVE-2010-1320</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1321/">CVE-2010-1321</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1322/">CVE-2010-1322</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1323/">CVE-2010-1323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1324/">CVE-2010-1324</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4020/">CVE-2010-4020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4021/">CVE-2010-4021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4022/">CVE-2010-4022</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0281/">CVE-2011-0281</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0282/">CVE-2011-0282</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0284/">CVE-2011-0284</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0285/">CVE-2011-0285</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1527/">CVE-2011-1527</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1528/">CVE-2011-1528</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1529/">CVE-2011-1529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1530/">CVE-2011-1530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1012/">CVE-2012-1012</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1013/">CVE-2012-1013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1016/">CVE-2012-1016</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1415/">CVE-2013-1415</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1417/">CVE-2013-1417</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1418/">CVE-2013-1418</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4341/">CVE-2014-4341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4342/">CVE-2014-4342</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4343/">CVE-2014-4343</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4344/">CVE-2014-4344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4345/">CVE-2014-4345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5351/">CVE-2014-5351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5352/">CVE-2014-5352</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5353/">CVE-2014-5353</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5354/">CVE-2014-5354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9421/">CVE-2014-9421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9422/">CVE-2014-9422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9423/">CVE-2014-9423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2694/">CVE-2015-2694</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2696/">CVE-2015-2696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2697/">CVE-2015-2697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2698/">CVE-2015-2698</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8629/">CVE-2015-8629</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8630/">CVE-2015-8630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8631/">CVE-2015-8631</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3119/">CVE-2016-3119</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3120/">CVE-2016-3120</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76576" version="1" class="patch">
	<metadata>
		<title>krb5-appl-clients-1.0.3-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1526" ref_url="https://www.suse.com/security/cve/CVE-2011-1526/" source="CVE"/>
		<reference ref_id="CVE-2011-4862" ref_url="https://www.suse.com/security/cve/CVE-2011-4862/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-appl-clients-1.0.3-1.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1526/">CVE-2011-1526</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4862/">CVE-2011-4862</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140711" comment="krb5-appl-clients-1.0.3-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76577" version="1" class="patch">
	<metadata>
		<title>lcms-1.19-17.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0793" ref_url="https://www.suse.com/security/cve/CVE-2009-0793/" source="CVE"/>
		<reference ref_id="CVE-2013-4276" ref_url="https://www.suse.com/security/cve/CVE-2013-4276/" source="CVE"/>
		<description>
These are all security issues fixed in the lcms-1.19-17.31 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0793/">CVE-2009-0793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4276/">CVE-2013-4276</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141435" comment="lcms-1.19-17.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140713" comment="liblcms1-1.19-17.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140714" comment="liblcms1-32bit-1.19-17.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76578" version="1" class="patch">
	<metadata>
		<title>lftp-4.7.4-1.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139/" source="CVE"/>
		<description>
These are all security issues fixed in the lftp-4.7.4-1.13 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159043" comment="lftp-4.7.4-1.13 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76579" version="1" class="patch">
	<metadata>
		<title>lhasa-0.2.0-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-2347" ref_url="https://www.suse.com/security/cve/CVE-2016-2347/" source="CVE"/>
		<description>
These are all security issues fixed in the lhasa-0.2.0-5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2347/">CVE-2016-2347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009126431" comment="lhasa-0.2.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009126432" comment="liblhasa0-0.2.0-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76580" version="1" class="patch">
	<metadata>
		<title>libFLAC++6-1.3.0-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-8962" ref_url="https://www.suse.com/security/cve/CVE-2014-8962/" source="CVE"/>
		<reference ref_id="CVE-2014-9028" ref_url="https://www.suse.com/security/cve/CVE-2014-9028/" source="CVE"/>
		<description>
These are all security issues fixed in the libFLAC++6-1.3.0-11.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8962/">CVE-2014-8962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9028/">CVE-2014-9028</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140571" comment="libFLAC++6-1.3.0-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142129" comment="libFLAC++6-32bit-1.3.0-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140572" comment="libFLAC8-1.3.0-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140573" comment="libFLAC8-32bit-1.3.0-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76581" version="1" class="patch">
	<metadata>
		<title>libHX28-3.18-1.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2947" ref_url="https://www.suse.com/security/cve/CVE-2010-2947/" source="CVE"/>
		<description>
These are all security issues fixed in the libHX28-3.18-1.19 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2947/">CVE-2010-2947</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140717" comment="libHX28-3.18-1.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140718" comment="libHX28-32bit-3.18-1.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76582" version="1" class="patch">
	<metadata>
		<title>libIlmImf-Imf_2_1-21-2.1.0-4.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-1720" ref_url="https://www.suse.com/security/cve/CVE-2009-1720/" source="CVE"/>
		<reference ref_id="CVE-2009-1721" ref_url="https://www.suse.com/security/cve/CVE-2009-1721/" source="CVE"/>
		<description>
These are all security issues fixed in the libIlmImf-Imf_2_1-21-2.1.0-4.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1720/">CVE-2009-1720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1721/">CVE-2009-1721</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140719" comment="libIlmImf-Imf_2_1-21-2.1.0-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141436" comment="libIlmImf-Imf_2_1-21-32bit-2.1.0-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140720" comment="openexr-2.1.0-4.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76583" version="1" class="patch">
	<metadata>
		<title>libQt5Concurrent5-5.6.2-5.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-0295" ref_url="https://www.suse.com/security/cve/CVE-2015-0295/" source="CVE"/>
		<reference ref_id="CVE-2015-1858" ref_url="https://www.suse.com/security/cve/CVE-2015-1858/" source="CVE"/>
		<reference ref_id="CVE-2015-1859" ref_url="https://www.suse.com/security/cve/CVE-2015-1859/" source="CVE"/>
		<reference ref_id="CVE-2015-1860" ref_url="https://www.suse.com/security/cve/CVE-2015-1860/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Concurrent5-5.6.2-5.9 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0295/">CVE-2015-0295</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1858/">CVE-2015-1858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1859/">CVE-2015-1859</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1860/">CVE-2015-1860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159044" comment="libQt5Concurrent5-5.6.2-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159045" comment="libQt5Core5-5.6.2-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159046" comment="libQt5DBus5-5.6.2-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159047" comment="libQt5Gui5-5.6.2-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159048" comment="libQt5Network5-5.6.2-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159049" comment="libQt5OpenGL5-5.6.2-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159050" comment="libQt5PrintSupport5-5.6.2-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159051" comment="libQt5Sql5-5.6.2-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159052" comment="libQt5Sql5-mysql-5.6.2-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159053" comment="libQt5Sql5-postgresql-5.6.2-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159054" comment="libQt5Sql5-sqlite-5.6.2-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159055" comment="libQt5Sql5-unixODBC-5.6.2-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159056" comment="libQt5Test5-5.6.2-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159057" comment="libQt5Widgets5-5.6.2-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159058" comment="libQt5Xml5-5.6.2-5.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76584" version="1" class="patch">
	<metadata>
		<title>libQt5WebKit5-5.6.2-1.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-8079" ref_url="https://www.suse.com/security/cve/CVE-2015-8079/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5WebKit5-5.6.2-1.31 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8079/">CVE-2015-8079</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159059" comment="libQt5WebKit5-5.6.2-1.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159060" comment="libQt5WebKit5-imports-5.6.2-1.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159061" comment="libQt5WebKitWidgets5-5.6.2-1.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76585" version="1" class="patch">
	<metadata>
		<title>libX11-6-1.6.2-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1981" ref_url="https://www.suse.com/security/cve/CVE-2013-1981/" source="CVE"/>
		<reference ref_id="CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997/" source="CVE"/>
		<reference ref_id="CVE-2013-2004" ref_url="https://www.suse.com/security/cve/CVE-2013-2004/" source="CVE"/>
		<reference ref_id="CVE-2016-7942" ref_url="https://www.suse.com/security/cve/CVE-2016-7942/" source="CVE"/>
		<description>
These are all security issues fixed in the libX11-6-1.6.2-11.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1981/">CVE-2013-1981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2004/">CVE-2013-2004</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7942/">CVE-2016-7942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009136381" comment="libX11-6-1.6.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009136382" comment="libX11-6-32bit-1.6.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009136383" comment="libX11-data-1.6.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009136384" comment="libX11-xcb1-1.6.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009136385" comment="libX11-xcb1-32bit-1.6.2-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76586" version="1" class="patch">
	<metadata>
		<title>libXRes1-1.0.7-3.54 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1988" ref_url="https://www.suse.com/security/cve/CVE-2013-1988/" source="CVE"/>
		<description>
These are all security issues fixed in the libXRes1-1.0.7-3.54 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1988/">CVE-2013-1988</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140744" comment="libXRes1-1.0.7-3.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140745" comment="libXRes1-32bit-1.0.7-3.54 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76587" version="1" class="patch">
	<metadata>
		<title>libXcursor1-1.1.14-3.60 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-2003" ref_url="https://www.suse.com/security/cve/CVE-2013-2003/" source="CVE"/>
		<description>
These are all security issues fixed in the libXcursor1-1.1.14-3.60 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2003/">CVE-2013-2003</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140746" comment="libXcursor1-1.1.14-3.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140747" comment="libXcursor1-32bit-1.1.14-3.60 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76588" version="1" class="patch">
	<metadata>
		<title>libXext6-1.3.2-3.61 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1982" ref_url="https://www.suse.com/security/cve/CVE-2013-1982/" source="CVE"/>
		<description>
These are all security issues fixed in the libXext6-1.3.2-3.61 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1982/">CVE-2013-1982</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140748" comment="libXext6-1.3.2-3.61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140749" comment="libXext6-32bit-1.3.2-3.61 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76589" version="1" class="patch">
	<metadata>
		<title>libXfixes3-32bit-5.0.1-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1983" ref_url="https://www.suse.com/security/cve/CVE-2013-1983/" source="CVE"/>
		<reference ref_id="CVE-2016-7944" ref_url="https://www.suse.com/security/cve/CVE-2016-7944/" source="CVE"/>
		<description>
These are all security issues fixed in the libXfixes3-32bit-5.0.1-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1983/">CVE-2013-1983</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7944/">CVE-2016-7944</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009135061" comment="libXfixes3-5.0.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009135062" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76590" version="1" class="patch">
	<metadata>
		<title>libXfont1-1.5.1-10.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<reference ref_id="CVE-2013-6462" ref_url="https://www.suse.com/security/cve/CVE-2013-6462/" source="CVE"/>
		<reference ref_id="CVE-2014-0209" ref_url="https://www.suse.com/security/cve/CVE-2014-0209/" source="CVE"/>
		<reference ref_id="CVE-2014-0210" ref_url="https://www.suse.com/security/cve/CVE-2014-0210/" source="CVE"/>
		<reference ref_id="CVE-2014-0211" ref_url="https://www.suse.com/security/cve/CVE-2014-0211/" source="CVE"/>
		<reference ref_id="CVE-2015-1802" ref_url="https://www.suse.com/security/cve/CVE-2015-1802/" source="CVE"/>
		<reference ref_id="CVE-2015-1803" ref_url="https://www.suse.com/security/cve/CVE-2015-1803/" source="CVE"/>
		<reference ref_id="CVE-2015-1804" ref_url="https://www.suse.com/security/cve/CVE-2015-1804/" source="CVE"/>
		<description>
These are all security issues fixed in the libXfont1-1.5.1-10.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6462/">CVE-2013-6462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0209/">CVE-2014-0209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0210/">CVE-2014-0210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0211/">CVE-2014-0211</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1802/">CVE-2015-1802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1803/">CVE-2015-1803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1804/">CVE-2015-1804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140752" comment="libXfont1-1.5.1-10.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76591" version="1" class="patch">
	<metadata>
		<title>libXi6-1.7.4-17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1984" ref_url="https://www.suse.com/security/cve/CVE-2013-1984/" source="CVE"/>
		<reference ref_id="CVE-2013-1995" ref_url="https://www.suse.com/security/cve/CVE-2013-1995/" source="CVE"/>
		<reference ref_id="CVE-2013-1998" ref_url="https://www.suse.com/security/cve/CVE-2013-1998/" source="CVE"/>
		<reference ref_id="CVE-2016-7945" ref_url="https://www.suse.com/security/cve/CVE-2016-7945/" source="CVE"/>
		<reference ref_id="CVE-2016-7946" ref_url="https://www.suse.com/security/cve/CVE-2016-7946/" source="CVE"/>
		<description>
These are all security issues fixed in the libXi6-1.7.4-17.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1984/">CVE-2013-1984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1995/">CVE-2013-1995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1998/">CVE-2013-1998</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7945/">CVE-2016-7945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7946/">CVE-2016-7946</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009136640" comment="libXi6-1.7.4-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009136641" comment="libXi6-32bit-1.7.4-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76592" version="1" class="patch">
	<metadata>
		<title>libXinerama1-1.1.3-3.55 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1985" ref_url="https://www.suse.com/security/cve/CVE-2013-1985/" source="CVE"/>
		<description>
These are all security issues fixed in the libXinerama1-1.1.3-3.55 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1985/">CVE-2013-1985</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140755" comment="libXinerama1-1.1.3-3.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140756" comment="libXinerama1-32bit-1.1.3-3.55 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76593" version="1" class="patch">
	<metadata>
		<title>libXp6-1.0.2-3.58 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-2062" ref_url="https://www.suse.com/security/cve/CVE-2013-2062/" source="CVE"/>
		<description>
These are all security issues fixed in the libXp6-1.0.2-3.58 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2062/">CVE-2013-2062</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140757" comment="libXp6-1.0.2-3.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140758" comment="libXp6-32bit-1.0.2-3.58 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76594" version="1" class="patch">
	<metadata>
		<title>libXpm4-3.5.11-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-10164" ref_url="https://www.suse.com/security/cve/CVE-2016-10164/" source="CVE"/>
		<description>
These are all security issues fixed in the libXpm4-3.5.11-5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10164/">CVE-2016-10164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009148436" comment="libXpm4-3.5.11-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009148437" comment="libXpm4-32bit-3.5.11-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76595" version="1" class="patch">
	<metadata>
		<title>libXrandr2-1.5.0-6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1986" ref_url="https://www.suse.com/security/cve/CVE-2013-1986/" source="CVE"/>
		<reference ref_id="CVE-2016-7947" ref_url="https://www.suse.com/security/cve/CVE-2016-7947/" source="CVE"/>
		<reference ref_id="CVE-2016-7948" ref_url="https://www.suse.com/security/cve/CVE-2016-7948/" source="CVE"/>
		<description>
These are all security issues fixed in the libXrandr2-1.5.0-6.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1986/">CVE-2013-1986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7947/">CVE-2016-7947</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7948/">CVE-2016-7948</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140759" comment="libXrandr2-1.5.0-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140760" comment="libXrandr2-32bit-1.5.0-6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76596" version="1" class="patch">
	<metadata>
		<title>libXrender1-0.9.8-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1987" ref_url="https://www.suse.com/security/cve/CVE-2013-1987/" source="CVE"/>
		<reference ref_id="CVE-2016-7949" ref_url="https://www.suse.com/security/cve/CVE-2016-7949/" source="CVE"/>
		<reference ref_id="CVE-2016-7950" ref_url="https://www.suse.com/security/cve/CVE-2016-7950/" source="CVE"/>
		<description>
These are all security issues fixed in the libXrender1-0.9.8-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1987/">CVE-2013-1987</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7949/">CVE-2016-7949</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7950/">CVE-2016-7950</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009135553" comment="libXrender1-0.9.8-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009135554" comment="libXrender1-32bit-0.9.8-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76597" version="1" class="patch">
	<metadata>
		<title>libXt6-1.1.4-3.59 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-2002" ref_url="https://www.suse.com/security/cve/CVE-2013-2002/" source="CVE"/>
		<reference ref_id="CVE-2013-2005" ref_url="https://www.suse.com/security/cve/CVE-2013-2005/" source="CVE"/>
		<description>
These are all security issues fixed in the libXt6-1.1.4-3.59 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2002/">CVE-2013-2002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2005/">CVE-2013-2005</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140763" comment="libXt6-1.1.4-3.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140764" comment="libXt6-32bit-1.1.4-3.59 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76598" version="1" class="patch">
	<metadata>
		<title>libXtst6-1.2.2-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-2063" ref_url="https://www.suse.com/security/cve/CVE-2013-2063/" source="CVE"/>
		<reference ref_id="CVE-2016-7951" ref_url="https://www.suse.com/security/cve/CVE-2016-7951/" source="CVE"/>
		<reference ref_id="CVE-2016-7952" ref_url="https://www.suse.com/security/cve/CVE-2016-7952/" source="CVE"/>
		<description>
These are all security issues fixed in the libXtst6-1.2.2-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2063/">CVE-2013-2063</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7951/">CVE-2016-7951</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7952/">CVE-2016-7952</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009135081" comment="libXtst6-1.2.2-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009135082" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76599" version="1" class="patch">
	<metadata>
		<title>libXv1-1.0.10-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1989" ref_url="https://www.suse.com/security/cve/CVE-2013-1989/" source="CVE"/>
		<reference ref_id="CVE-2013-2066" ref_url="https://www.suse.com/security/cve/CVE-2013-2066/" source="CVE"/>
		<reference ref_id="CVE-2016-5407" ref_url="https://www.suse.com/security/cve/CVE-2016-5407/" source="CVE"/>
		<description>
These are all security issues fixed in the libXv1-1.0.10-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1989/">CVE-2013-1989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2066/">CVE-2013-2066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5407/">CVE-2016-5407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009135086" comment="libXv1-1.0.10-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009135087" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76600" version="1" class="patch">
	<metadata>
		<title>libXvMC1-1.0.8-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1990" ref_url="https://www.suse.com/security/cve/CVE-2013-1990/" source="CVE"/>
		<reference ref_id="CVE-2013-1999" ref_url="https://www.suse.com/security/cve/CVE-2013-1999/" source="CVE"/>
		<reference ref_id="CVE-2016-7953" ref_url="https://www.suse.com/security/cve/CVE-2016-7953/" source="CVE"/>
		<description>
These are all security issues fixed in the libXvMC1-1.0.8-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1990/">CVE-2013-1990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1999/">CVE-2013-1999</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7953/">CVE-2016-7953</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009135556" comment="libXvMC1-1.0.8-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76601" version="1" class="patch">
	<metadata>
		<title>libXvnc1-1.6.0-18.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-0011" ref_url="https://www.suse.com/security/cve/CVE-2014-0011/" source="CVE"/>
		<reference ref_id="CVE-2014-8240" ref_url="https://www.suse.com/security/cve/CVE-2014-8240/" source="CVE"/>
		<reference ref_id="CVE-2015-0255" ref_url="https://www.suse.com/security/cve/CVE-2015-0255/" source="CVE"/>
		<description>
These are all security issues fixed in the libXvnc1-1.6.0-18.11.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0011/">CVE-2014-0011</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8240/">CVE-2014-8240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0255/">CVE-2015-0255</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154696" comment="libXvnc1-1.6.0-18.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154697" comment="tigervnc-1.6.0-18.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154698" comment="xorg-x11-Xvnc-1.6.0-18.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76602" version="1" class="patch">
	<metadata>
		<title>libXxf86dga1-1.1.4-3.59 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1991" ref_url="https://www.suse.com/security/cve/CVE-2013-1991/" source="CVE"/>
		<reference ref_id="CVE-2013-2000" ref_url="https://www.suse.com/security/cve/CVE-2013-2000/" source="CVE"/>
		<description>
These are all security issues fixed in the libXxf86dga1-1.1.4-3.59 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1991/">CVE-2013-1991</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2000/">CVE-2013-2000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140773" comment="libXxf86dga1-1.1.4-3.59 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76603" version="1" class="patch">
	<metadata>
		<title>libXxf86vm1-1.1.3-3.54 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-2001" ref_url="https://www.suse.com/security/cve/CVE-2013-2001/" source="CVE"/>
		<description>
These are all security issues fixed in the libXxf86vm1-1.1.3-3.54 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2001/">CVE-2013-2001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140774" comment="libXxf86vm1-1.1.3-3.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140775" comment="libXxf86vm1-32bit-1.1.3-3.54 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76604" version="1" class="patch">
	<metadata>
		<title>libarchive13-3.1.2-25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-0211" ref_url="https://www.suse.com/security/cve/CVE-2013-0211/" source="CVE"/>
		<reference ref_id="CVE-2015-2304" ref_url="https://www.suse.com/security/cve/CVE-2015-2304/" source="CVE"/>
		<reference ref_id="CVE-2015-8915" ref_url="https://www.suse.com/security/cve/CVE-2015-8915/" source="CVE"/>
		<reference ref_id="CVE-2015-8916" ref_url="https://www.suse.com/security/cve/CVE-2015-8916/" source="CVE"/>
		<reference ref_id="CVE-2015-8918" ref_url="https://www.suse.com/security/cve/CVE-2015-8918/" source="CVE"/>
		<reference ref_id="CVE-2015-8919" ref_url="https://www.suse.com/security/cve/CVE-2015-8919/" source="CVE"/>
		<reference ref_id="CVE-2015-8920" ref_url="https://www.suse.com/security/cve/CVE-2015-8920/" source="CVE"/>
		<reference ref_id="CVE-2015-8921" ref_url="https://www.suse.com/security/cve/CVE-2015-8921/" source="CVE"/>
		<reference ref_id="CVE-2015-8922" ref_url="https://www.suse.com/security/cve/CVE-2015-8922/" source="CVE"/>
		<reference ref_id="CVE-2015-8923" ref_url="https://www.suse.com/security/cve/CVE-2015-8923/" source="CVE"/>
		<reference ref_id="CVE-2015-8924" ref_url="https://www.suse.com/security/cve/CVE-2015-8924/" source="CVE"/>
		<reference ref_id="CVE-2015-8925" ref_url="https://www.suse.com/security/cve/CVE-2015-8925/" source="CVE"/>
		<reference ref_id="CVE-2015-8926" ref_url="https://www.suse.com/security/cve/CVE-2015-8926/" source="CVE"/>
		<reference ref_id="CVE-2015-8928" ref_url="https://www.suse.com/security/cve/CVE-2015-8928/" source="CVE"/>
		<reference ref_id="CVE-2015-8929" ref_url="https://www.suse.com/security/cve/CVE-2015-8929/" source="CVE"/>
		<reference ref_id="CVE-2015-8930" ref_url="https://www.suse.com/security/cve/CVE-2015-8930/" source="CVE"/>
		<reference ref_id="CVE-2015-8931" ref_url="https://www.suse.com/security/cve/CVE-2015-8931/" source="CVE"/>
		<reference ref_id="CVE-2015-8932" ref_url="https://www.suse.com/security/cve/CVE-2015-8932/" source="CVE"/>
		<reference ref_id="CVE-2015-8933" ref_url="https://www.suse.com/security/cve/CVE-2015-8933/" source="CVE"/>
		<reference ref_id="CVE-2015-8934" ref_url="https://www.suse.com/security/cve/CVE-2015-8934/" source="CVE"/>
		<reference ref_id="CVE-2016-1541" ref_url="https://www.suse.com/security/cve/CVE-2016-1541/" source="CVE"/>
		<reference ref_id="CVE-2016-4300" ref_url="https://www.suse.com/security/cve/CVE-2016-4300/" source="CVE"/>
		<reference ref_id="CVE-2016-4301" ref_url="https://www.suse.com/security/cve/CVE-2016-4301/" source="CVE"/>
		<reference ref_id="CVE-2016-4302" ref_url="https://www.suse.com/security/cve/CVE-2016-4302/" source="CVE"/>
		<reference ref_id="CVE-2016-4809" ref_url="https://www.suse.com/security/cve/CVE-2016-4809/" source="CVE"/>
		<reference ref_id="CVE-2016-5418" ref_url="https://www.suse.com/security/cve/CVE-2016-5418/" source="CVE"/>
		<reference ref_id="CVE-2016-5844" ref_url="https://www.suse.com/security/cve/CVE-2016-5844/" source="CVE"/>
		<reference ref_id="CVE-2016-6250" ref_url="https://www.suse.com/security/cve/CVE-2016-6250/" source="CVE"/>
		<reference ref_id="CVE-2016-8687" ref_url="https://www.suse.com/security/cve/CVE-2016-8687/" source="CVE"/>
		<reference ref_id="CVE-2016-8688" ref_url="https://www.suse.com/security/cve/CVE-2016-8688/" source="CVE"/>
		<reference ref_id="CVE-2016-8689" ref_url="https://www.suse.com/security/cve/CVE-2016-8689/" source="CVE"/>
		<description>
These are all security issues fixed in the libarchive13-3.1.2-25.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0211/">CVE-2013-0211</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2304/">CVE-2015-2304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8915/">CVE-2015-8915</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8916/">CVE-2015-8916</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8918/">CVE-2015-8918</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8919/">CVE-2015-8919</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8920/">CVE-2015-8920</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8921/">CVE-2015-8921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8922/">CVE-2015-8922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8923/">CVE-2015-8923</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8924/">CVE-2015-8924</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8925/">CVE-2015-8925</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8926/">CVE-2015-8926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8928/">CVE-2015-8928</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8929/">CVE-2015-8929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8930/">CVE-2015-8930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8931/">CVE-2015-8931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8932/">CVE-2015-8932</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8933/">CVE-2015-8933</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8934/">CVE-2015-8934</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1541/">CVE-2016-1541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4300/">CVE-2016-4300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4301/">CVE-2016-4301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4302/">CVE-2016-4302</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4809/">CVE-2016-4809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5418/">CVE-2016-5418</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5844/">CVE-2016-5844</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6250/">CVE-2016-6250</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8687/">CVE-2016-8687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8688/">CVE-2016-8688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8689/">CVE-2016-8689</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76605" version="1" class="patch">
	<metadata>
		<title>libasan2-32bit-5.3.1+r233831-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<description>
These are all security issues fixed in the libasan2-32bit-5.3.1+r233831-12.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159062" comment="libasan2-5.3.1+r233831-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159063" comment="libasan2-32bit-5.3.1+r233831-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159064" comment="libffi4-5.3.1+r233831-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159065" comment="libffi4-32bit-5.3.1+r233831-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159066" comment="libmpx0-5.3.1+r233831-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159067" comment="libmpx0-32bit-5.3.1+r233831-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159068" comment="libmpxwrappers0-5.3.1+r233831-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159069" comment="libmpxwrappers0-32bit-5.3.1+r233831-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76606" version="1" class="patch">
	<metadata>
		<title>libass5-0.10.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-7969" ref_url="https://www.suse.com/security/cve/CVE-2016-7969/" source="CVE"/>
		<reference ref_id="CVE-2016-7972" ref_url="https://www.suse.com/security/cve/CVE-2016-7972/" source="CVE"/>
		<description>
These are all security issues fixed in the libass5-0.10.2-3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7969/">CVE-2016-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7972/">CVE-2016-7972</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142721" comment="libass5-0.10.2-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76607" version="1" class="patch">
	<metadata>
		<title>libblkid1-2.29.2-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-0157" ref_url="https://www.suse.com/security/cve/CVE-2013-0157/" source="CVE"/>
		<reference ref_id="CVE-2014-9114" ref_url="https://www.suse.com/security/cve/CVE-2014-9114/" source="CVE"/>
		<reference ref_id="CVE-2015-5218" ref_url="https://www.suse.com/security/cve/CVE-2015-5218/" source="CVE"/>
		<reference ref_id="CVE-2016-5011" ref_url="https://www.suse.com/security/cve/CVE-2016-5011/" source="CVE"/>
		<reference ref_id="CVE-2017-2616" ref_url="https://www.suse.com/security/cve/CVE-2017-2616/" source="CVE"/>
		<description>
These are all security issues fixed in the libblkid1-2.29.2-2.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0157/">CVE-2013-0157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9114/">CVE-2014-9114</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5218/">CVE-2015-5218</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5011/">CVE-2016-5011</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2616/">CVE-2017-2616</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159070" comment="libblkid1-2.29.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159071" comment="libblkid1-32bit-2.29.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159072" comment="libfdisk1-2.29.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159073" comment="libmount1-2.29.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159074" comment="libmount1-32bit-2.29.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159075" comment="libsmartcols1-2.29.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159649" comment="libuuid-devel-2.29.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159076" comment="libuuid1-2.29.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159077" comment="libuuid1-32bit-2.29.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159078" comment="python-libmount-2.29.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159079" comment="util-linux-2.29.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159080" comment="util-linux-lang-2.29.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159081" comment="util-linux-systemd-2.29.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159082" comment="uuidd-2.29.2-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76608" version="1" class="patch">
	<metadata>
		<title>libcairo-gobject2-1.15.2-24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-9082" ref_url="https://www.suse.com/security/cve/CVE-2016-9082/" source="CVE"/>
		<reference ref_id="CVE-2017-7475" ref_url="https://www.suse.com/security/cve/CVE-2017-7475/" source="CVE"/>
		<description>
These are all security issues fixed in the libcairo-gobject2-1.15.2-24.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9082/">CVE-2016-9082</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7475/">CVE-2017-7475</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009157339" comment="libcairo-gobject2-1.15.2-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157340" comment="libcairo-gobject2-32bit-1.15.2-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157341" comment="libcairo-script-interpreter2-1.15.2-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157342" comment="libcairo2-1.15.2-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157343" comment="libcairo2-32bit-1.15.2-24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76609" version="1" class="patch">
	<metadata>
		<title>libcares2-1.9.1-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-5180" ref_url="https://www.suse.com/security/cve/CVE-2016-5180/" source="CVE"/>
		<description>
These are all security issues fixed in the libcares2-1.9.1-5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5180/">CVE-2016-5180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009146003" comment="libcares2-1.9.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009146004" comment="libcares2-32bit-1.9.1-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76610" version="1" class="patch">
	<metadata>
		<title>libcgroup1-0.41.rc1-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1006" ref_url="https://www.suse.com/security/cve/CVE-2011-1006/" source="CVE"/>
		<reference ref_id="CVE-2011-1022" ref_url="https://www.suse.com/security/cve/CVE-2011-1022/" source="CVE"/>
		<description>
These are all security issues fixed in the libcgroup1-0.41.rc1-9.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1006/">CVE-2011-1006</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1022/">CVE-2011-1022</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159084" comment="libcgroup1-0.41.rc1-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76611" version="1" class="patch">
	<metadata>
		<title>libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2010-0926" ref_url="https://www.suse.com/security/cve/CVE-2010-0926/" source="CVE"/>
		<reference ref_id="CVE-2010-1635" ref_url="https://www.suse.com/security/cve/CVE-2010-1635/" source="CVE"/>
		<reference ref_id="CVE-2010-1642" ref_url="https://www.suse.com/security/cve/CVE-2010-1642/" source="CVE"/>
		<reference ref_id="CVE-2010-2063" ref_url="https://www.suse.com/security/cve/CVE-2010-2063/" source="CVE"/>
		<reference ref_id="CVE-2010-3069" ref_url="https://www.suse.com/security/cve/CVE-2010-3069/" source="CVE"/>
		<reference ref_id="CVE-2011-0719" ref_url="https://www.suse.com/security/cve/CVE-2011-0719/" source="CVE"/>
		<reference ref_id="CVE-2011-2522" ref_url="https://www.suse.com/security/cve/CVE-2011-2522/" source="CVE"/>
		<reference ref_id="CVE-2011-2694" ref_url="https://www.suse.com/security/cve/CVE-2011-2694/" source="CVE"/>
		<reference ref_id="CVE-2012-0817" ref_url="https://www.suse.com/security/cve/CVE-2012-0817/" source="CVE"/>
		<reference ref_id="CVE-2012-0870" ref_url="https://www.suse.com/security/cve/CVE-2012-0870/" source="CVE"/>
		<reference ref_id="CVE-2012-1182" ref_url="https://www.suse.com/security/cve/CVE-2012-1182/" source="CVE"/>
		<reference ref_id="CVE-2012-2111" ref_url="https://www.suse.com/security/cve/CVE-2012-2111/" source="CVE"/>
		<reference ref_id="CVE-2012-6150" ref_url="https://www.suse.com/security/cve/CVE-2012-6150/" source="CVE"/>
		<reference ref_id="CVE-2013-0172" ref_url="https://www.suse.com/security/cve/CVE-2013-0172/" source="CVE"/>
		<reference ref_id="CVE-2013-0213" ref_url="https://www.suse.com/security/cve/CVE-2013-0213/" source="CVE"/>
		<reference ref_id="CVE-2013-0214" ref_url="https://www.suse.com/security/cve/CVE-2013-0214/" source="CVE"/>
		<reference ref_id="CVE-2013-0454" ref_url="https://www.suse.com/security/cve/CVE-2013-0454/" source="CVE"/>
		<reference ref_id="CVE-2013-1863" ref_url="https://www.suse.com/security/cve/CVE-2013-1863/" source="CVE"/>
		<reference ref_id="CVE-2013-4124" ref_url="https://www.suse.com/security/cve/CVE-2013-4124/" source="CVE"/>
		<reference ref_id="CVE-2013-4408" ref_url="https://www.suse.com/security/cve/CVE-2013-4408/" source="CVE"/>
		<reference ref_id="CVE-2013-4475" ref_url="https://www.suse.com/security/cve/CVE-2013-4475/" source="CVE"/>
		<reference ref_id="CVE-2013-4476" ref_url="https://www.suse.com/security/cve/CVE-2013-4476/" source="CVE"/>
		<reference ref_id="CVE-2013-4496" ref_url="https://www.suse.com/security/cve/CVE-2013-4496/" source="CVE"/>
		<reference ref_id="CVE-2013-6442" ref_url="https://www.suse.com/security/cve/CVE-2013-6442/" source="CVE"/>
		<reference ref_id="CVE-2014-0178" ref_url="https://www.suse.com/security/cve/CVE-2014-0178/" source="CVE"/>
		<reference ref_id="CVE-2014-0239" ref_url="https://www.suse.com/security/cve/CVE-2014-0239/" source="CVE"/>
		<reference ref_id="CVE-2014-0244" ref_url="https://www.suse.com/security/cve/CVE-2014-0244/" source="CVE"/>
		<reference ref_id="CVE-2014-3493" ref_url="https://www.suse.com/security/cve/CVE-2014-3493/" source="CVE"/>
		<reference ref_id="CVE-2014-3560" ref_url="https://www.suse.com/security/cve/CVE-2014-3560/" source="CVE"/>
		<reference ref_id="CVE-2014-8143" ref_url="https://www.suse.com/security/cve/CVE-2014-8143/" source="CVE"/>
		<reference ref_id="CVE-2015-0240" ref_url="https://www.suse.com/security/cve/CVE-2015-0240/" source="CVE"/>
		<reference ref_id="CVE-2015-3223" ref_url="https://www.suse.com/security/cve/CVE-2015-3223/" source="CVE"/>
		<reference ref_id="CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252/" source="CVE"/>
		<reference ref_id="CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296/" source="CVE"/>
		<reference ref_id="CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<reference ref_id="CVE-2015-5370" ref_url="https://www.suse.com/security/cve/CVE-2015-5370/" source="CVE"/>
		<reference ref_id="CVE-2015-7560" ref_url="https://www.suse.com/security/cve/CVE-2015-7560/" source="CVE"/>
		<reference ref_id="CVE-2015-8467" ref_url="https://www.suse.com/security/cve/CVE-2015-8467/" source="CVE"/>
		<reference ref_id="CVE-2015-8543" ref_url="https://www.suse.com/security/cve/CVE-2015-8543/" source="CVE"/>
		<reference ref_id="CVE-2016-0771" ref_url="https://www.suse.com/security/cve/CVE-2016-0771/" source="CVE"/>
		<reference ref_id="CVE-2016-2110" ref_url="https://www.suse.com/security/cve/CVE-2016-2110/" source="CVE"/>
		<reference ref_id="CVE-2016-2111" ref_url="https://www.suse.com/security/cve/CVE-2016-2111/" source="CVE"/>
		<reference ref_id="CVE-2016-2112" ref_url="https://www.suse.com/security/cve/CVE-2016-2112/" source="CVE"/>
		<reference ref_id="CVE-2016-2113" ref_url="https://www.suse.com/security/cve/CVE-2016-2113/" source="CVE"/>
		<reference ref_id="CVE-2016-2115" ref_url="https://www.suse.com/security/cve/CVE-2016-2115/" source="CVE"/>
		<reference ref_id="CVE-2016-2118" ref_url="https://www.suse.com/security/cve/CVE-2016-2118/" source="CVE"/>
		<reference ref_id="CVE-2016-2119" ref_url="https://www.suse.com/security/cve/CVE-2016-2119/" source="CVE"/>
		<reference ref_id="CVE-2016-2123" ref_url="https://www.suse.com/security/cve/CVE-2016-2123/" source="CVE"/>
		<reference ref_id="CVE-2016-2125" ref_url="https://www.suse.com/security/cve/CVE-2016-2125/" source="CVE"/>
		<reference ref_id="CVE-2016-2126" ref_url="https://www.suse.com/security/cve/CVE-2016-2126/" source="CVE"/>
		<reference ref_id="CVE-2017-2619" ref_url="https://www.suse.com/security/cve/CVE-2017-2619/" source="CVE"/>
		<reference ref_id="CVE-2017-7494" ref_url="https://www.suse.com/security/cve/CVE-2017-7494/" source="CVE"/>
		<description>
These are all security issues fixed in the libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0926/">CVE-2010-0926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1635/">CVE-2010-1635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1642/">CVE-2010-1642</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2063/">CVE-2010-2063</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3069/">CVE-2010-3069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0719/">CVE-2011-0719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2522/">CVE-2011-2522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2694/">CVE-2011-2694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0817/">CVE-2012-0817</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0870/">CVE-2012-0870</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1182/">CVE-2012-1182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2111/">CVE-2012-2111</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-6150/">CVE-2012-6150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0172/">CVE-2013-0172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0213/">CVE-2013-0213</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0214/">CVE-2013-0214</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0454/">CVE-2013-0454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1863/">CVE-2013-1863</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4124/">CVE-2013-4124</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4408/">CVE-2013-4408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4475/">CVE-2013-4475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4476/">CVE-2013-4476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4496/">CVE-2013-4496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6442/">CVE-2013-6442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0178/">CVE-2014-0178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0239/">CVE-2014-0239</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0244/">CVE-2014-0244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3493/">CVE-2014-3493</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3560/">CVE-2014-3560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8143/">CVE-2014-8143</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0240/">CVE-2015-0240</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3223/">CVE-2015-3223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5370/">CVE-2015-5370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7560/">CVE-2015-7560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8467/">CVE-2015-8467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8543/">CVE-2015-8543</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0771/">CVE-2016-0771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2110/">CVE-2016-2110</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2111/">CVE-2016-2111</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2112/">CVE-2016-2112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2113/">CVE-2016-2113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2115/">CVE-2016-2115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2118/">CVE-2016-2118</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2119/">CVE-2016-2119</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2123/">CVE-2016-2123</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2125/">CVE-2016-2125</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2126/">CVE-2016-2126</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2619/">CVE-2017-2619</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7494/">CVE-2017-7494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76612" version="1" class="patch">
	<metadata>
		<title>libdmx1-1.1.3-3.52 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1992" ref_url="https://www.suse.com/security/cve/CVE-2013-1992/" source="CVE"/>
		<description>
These are all security issues fixed in the libdmx1-1.1.3-3.52 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1992/">CVE-2013-1992</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140838" comment="libdmx1-1.1.3-3.52 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76613" version="1" class="patch">
	<metadata>
		<title>libecpg6-9.6.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2007-6600" ref_url="https://www.suse.com/security/cve/CVE-2007-6600/" source="CVE"/>
		<reference ref_id="CVE-2009-4034" ref_url="https://www.suse.com/security/cve/CVE-2009-4034/" source="CVE"/>
		<reference ref_id="CVE-2009-4136" ref_url="https://www.suse.com/security/cve/CVE-2009-4136/" source="CVE"/>
		<reference ref_id="CVE-2010-1169" ref_url="https://www.suse.com/security/cve/CVE-2010-1169/" source="CVE"/>
		<reference ref_id="CVE-2010-1170" ref_url="https://www.suse.com/security/cve/CVE-2010-1170/" source="CVE"/>
		<reference ref_id="CVE-2010-3433" ref_url="https://www.suse.com/security/cve/CVE-2010-3433/" source="CVE"/>
		<reference ref_id="CVE-2012-0866" ref_url="https://www.suse.com/security/cve/CVE-2012-0866/" source="CVE"/>
		<reference ref_id="CVE-2012-0867" ref_url="https://www.suse.com/security/cve/CVE-2012-0867/" source="CVE"/>
		<reference ref_id="CVE-2012-0868" ref_url="https://www.suse.com/security/cve/CVE-2012-0868/" source="CVE"/>
		<reference ref_id="CVE-2012-2143" ref_url="https://www.suse.com/security/cve/CVE-2012-2143/" source="CVE"/>
		<reference ref_id="CVE-2012-2655" ref_url="https://www.suse.com/security/cve/CVE-2012-2655/" source="CVE"/>
		<reference ref_id="CVE-2012-3488" ref_url="https://www.suse.com/security/cve/CVE-2012-3488/" source="CVE"/>
		<reference ref_id="CVE-2012-3489" ref_url="https://www.suse.com/security/cve/CVE-2012-3489/" source="CVE"/>
		<reference ref_id="CVE-2013-0255" ref_url="https://www.suse.com/security/cve/CVE-2013-0255/" source="CVE"/>
		<reference ref_id="CVE-2013-1899" ref_url="https://www.suse.com/security/cve/CVE-2013-1899/" source="CVE"/>
		<reference ref_id="CVE-2013-1900" ref_url="https://www.suse.com/security/cve/CVE-2013-1900/" source="CVE"/>
		<reference ref_id="CVE-2013-1901" ref_url="https://www.suse.com/security/cve/CVE-2013-1901/" source="CVE"/>
		<reference ref_id="CVE-2014-0060" ref_url="https://www.suse.com/security/cve/CVE-2014-0060/" source="CVE"/>
		<reference ref_id="CVE-2014-0061" ref_url="https://www.suse.com/security/cve/CVE-2014-0061/" source="CVE"/>
		<reference ref_id="CVE-2014-0062" ref_url="https://www.suse.com/security/cve/CVE-2014-0062/" source="CVE"/>
		<reference ref_id="CVE-2014-0063" ref_url="https://www.suse.com/security/cve/CVE-2014-0063/" source="CVE"/>
		<reference ref_id="CVE-2014-0064" ref_url="https://www.suse.com/security/cve/CVE-2014-0064/" source="CVE"/>
		<reference ref_id="CVE-2014-0065" ref_url="https://www.suse.com/security/cve/CVE-2014-0065/" source="CVE"/>
		<reference ref_id="CVE-2014-0066" ref_url="https://www.suse.com/security/cve/CVE-2014-0066/" source="CVE"/>
		<reference ref_id="CVE-2014-0067" ref_url="https://www.suse.com/security/cve/CVE-2014-0067/" source="CVE"/>
		<reference ref_id="CVE-2015-3165" ref_url="https://www.suse.com/security/cve/CVE-2015-3165/" source="CVE"/>
		<reference ref_id="CVE-2015-3166" ref_url="https://www.suse.com/security/cve/CVE-2015-3166/" source="CVE"/>
		<reference ref_id="CVE-2015-3167" ref_url="https://www.suse.com/security/cve/CVE-2015-3167/" source="CVE"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-0766" ref_url="https://www.suse.com/security/cve/CVE-2016-0766/" source="CVE"/>
		<reference ref_id="CVE-2016-0773" ref_url="https://www.suse.com/security/cve/CVE-2016-0773/" source="CVE"/>
		<reference ref_id="CVE-2016-2193" ref_url="https://www.suse.com/security/cve/CVE-2016-2193/" source="CVE"/>
		<reference ref_id="CVE-2016-3065" ref_url="https://www.suse.com/security/cve/CVE-2016-3065/" source="CVE"/>
		<reference ref_id="CVE-2017-7484" ref_url="https://www.suse.com/security/cve/CVE-2017-7484/" source="CVE"/>
		<reference ref_id="CVE-2017-7485" ref_url="https://www.suse.com/security/cve/CVE-2017-7485/" source="CVE"/>
		<reference ref_id="CVE-2017-7486" ref_url="https://www.suse.com/security/cve/CVE-2017-7486/" source="CVE"/>
		<description>
These are all security issues fixed in the libecpg6-9.6.3-2.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6600/">CVE-2007-6600</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4034/">CVE-2009-4034</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4136/">CVE-2009-4136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1169/">CVE-2010-1169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1170/">CVE-2010-1170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3433/">CVE-2010-3433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0866/">CVE-2012-0866</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0867/">CVE-2012-0867</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0868/">CVE-2012-0868</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2143/">CVE-2012-2143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2655/">CVE-2012-2655</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3488/">CVE-2012-3488</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3489/">CVE-2012-3489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0255/">CVE-2013-0255</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1899/">CVE-2013-1899</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1900/">CVE-2013-1900</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1901/">CVE-2013-1901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0060/">CVE-2014-0060</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0061/">CVE-2014-0061</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0062/">CVE-2014-0062</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0063/">CVE-2014-0063</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0064/">CVE-2014-0064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0065/">CVE-2014-0065</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0066/">CVE-2014-0066</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0067/">CVE-2014-0067</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3165/">CVE-2015-3165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3166/">CVE-2015-3166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3167/">CVE-2015-3167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0766/">CVE-2016-0766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0773/">CVE-2016-0773</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2193/">CVE-2016-2193</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3065/">CVE-2016-3065</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7484/">CVE-2017-7484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7485/">CVE-2017-7485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7486/">CVE-2017-7486</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76614" version="1" class="patch">
	<metadata>
		<title>libevent-2_0-5-2.0.21-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-6272" ref_url="https://www.suse.com/security/cve/CVE-2014-6272/" source="CVE"/>
		<description>
These are all security issues fixed in the libevent-2_0-5-2.0.21-4.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6272/">CVE-2014-6272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140839" comment="libevent-2_0-5-2.0.21-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76615" version="1" class="patch">
	<metadata>
		<title>libexif12-0.6.21-6.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-2812" ref_url="https://www.suse.com/security/cve/CVE-2012-2812/" source="CVE"/>
		<reference ref_id="CVE-2012-2813" ref_url="https://www.suse.com/security/cve/CVE-2012-2813/" source="CVE"/>
		<reference ref_id="CVE-2012-2814" ref_url="https://www.suse.com/security/cve/CVE-2012-2814/" source="CVE"/>
		<reference ref_id="CVE-2012-2836" ref_url="https://www.suse.com/security/cve/CVE-2012-2836/" source="CVE"/>
		<reference ref_id="CVE-2012-2837" ref_url="https://www.suse.com/security/cve/CVE-2012-2837/" source="CVE"/>
		<reference ref_id="CVE-2012-2840" ref_url="https://www.suse.com/security/cve/CVE-2012-2840/" source="CVE"/>
		<reference ref_id="CVE-2012-2841" ref_url="https://www.suse.com/security/cve/CVE-2012-2841/" source="CVE"/>
		<description>
These are all security issues fixed in the libexif12-0.6.21-6.4 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2812/">CVE-2012-2812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2813/">CVE-2012-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2814/">CVE-2012-2814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2836/">CVE-2012-2836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2837/">CVE-2012-2837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2840/">CVE-2012-2840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2841/">CVE-2012-2841</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140840" comment="libexif12-0.6.21-6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140841" comment="libexif12-32bit-0.6.21-6.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76616" version="1" class="patch">
	<metadata>
		<title>libfbembed2_5-2.5.2.26539-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-2492" ref_url="https://www.suse.com/security/cve/CVE-2013-2492/" source="CVE"/>
		<reference ref_id="CVE-2017-6369" ref_url="https://www.suse.com/security/cve/CVE-2017-6369/" source="CVE"/>
		<description>
These are all security issues fixed in the libfbembed2_5-2.5.2.26539-15.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2492/">CVE-2013-2492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6369/">CVE-2017-6369</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154924" comment="libfbembed2_5-2.5.2.26539-15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76617" version="1" class="patch">
	<metadata>
		<title>libfreebl3-3.29.5-57.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-3640" ref_url="https://www.suse.com/security/cve/CVE-2011-3640/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<reference ref_id="CVE-2013-0791" ref_url="https://www.suse.com/security/cve/CVE-2013-0791/" source="CVE"/>
		<reference ref_id="CVE-2013-1620" ref_url="https://www.suse.com/security/cve/CVE-2013-1620/" source="CVE"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<reference ref_id="CVE-2013-1740" ref_url="https://www.suse.com/security/cve/CVE-2013-1740/" source="CVE"/>
		<reference ref_id="CVE-2013-5605" ref_url="https://www.suse.com/security/cve/CVE-2013-5605/" source="CVE"/>
		<reference ref_id="CVE-2014-1492" ref_url="https://www.suse.com/security/cve/CVE-2014-1492/" source="CVE"/>
		<reference ref_id="CVE-2014-1568" ref_url="https://www.suse.com/security/cve/CVE-2014-1568/" source="CVE"/>
		<reference ref_id="CVE-2014-1569" ref_url="https://www.suse.com/security/cve/CVE-2014-1569/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2016-1938" ref_url="https://www.suse.com/security/cve/CVE-2016-1938/" source="CVE"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1978" ref_url="https://www.suse.com/security/cve/CVE-2016-1978/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="CVE-2016-5285" ref_url="https://www.suse.com/security/cve/CVE-2016-5285/" source="CVE"/>
		<reference ref_id="CVE-2016-8635" ref_url="https://www.suse.com/security/cve/CVE-2016-8635/" source="CVE"/>
		<reference ref_id="CVE-2016-9074" ref_url="https://www.suse.com/security/cve/CVE-2016-9074/" source="CVE"/>
		<reference ref_id="CVE-2016-9574" ref_url="https://www.suse.com/security/cve/CVE-2016-9574/" source="CVE"/>
		<description>
These are all security issues fixed in the libfreebl3-3.29.5-57.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3640/">CVE-2011-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0791/">CVE-2013-0791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1620/">CVE-2013-1620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1740/">CVE-2013-1740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5605/">CVE-2013-5605</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1492/">CVE-2014-1492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1568/">CVE-2014-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1569/">CVE-2014-1569</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1938/">CVE-2016-1938</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1978/">CVE-2016-1978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5285/">CVE-2016-5285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8635/">CVE-2016-8635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9074/">CVE-2016-9074</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9574/">CVE-2016-9574</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009155316" comment="libfreebl3-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155317" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155318" comment="libsoftokn3-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155319" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155322" comment="mozilla-nss-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155323" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155324" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155325" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155326" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155327" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155328" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76618" version="1" class="patch">
	<metadata>
		<title>libfreetype6-2.6.3-7.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0946" ref_url="https://www.suse.com/security/cve/CVE-2009-0946/" source="CVE"/>
		<reference ref_id="CVE-2010-2497" ref_url="https://www.suse.com/security/cve/CVE-2010-2497/" source="CVE"/>
		<reference ref_id="CVE-2010-2805" ref_url="https://www.suse.com/security/cve/CVE-2010-2805/" source="CVE"/>
		<reference ref_id="CVE-2010-3053" ref_url="https://www.suse.com/security/cve/CVE-2010-3053/" source="CVE"/>
		<reference ref_id="CVE-2010-3054" ref_url="https://www.suse.com/security/cve/CVE-2010-3054/" source="CVE"/>
		<reference ref_id="CVE-2010-3311" ref_url="https://www.suse.com/security/cve/CVE-2010-3311/" source="CVE"/>
		<reference ref_id="CVE-2010-3814" ref_url="https://www.suse.com/security/cve/CVE-2010-3814/" source="CVE"/>
		<reference ref_id="CVE-2010-3855" ref_url="https://www.suse.com/security/cve/CVE-2010-3855/" source="CVE"/>
		<reference ref_id="CVE-2011-0226" ref_url="https://www.suse.com/security/cve/CVE-2011-0226/" source="CVE"/>
		<reference ref_id="CVE-2011-3256" ref_url="https://www.suse.com/security/cve/CVE-2011-3256/" source="CVE"/>
		<reference ref_id="CVE-2011-3439" ref_url="https://www.suse.com/security/cve/CVE-2011-3439/" source="CVE"/>
		<reference ref_id="CVE-2012-1126" ref_url="https://www.suse.com/security/cve/CVE-2012-1126/" source="CVE"/>
		<reference ref_id="CVE-2012-1127" ref_url="https://www.suse.com/security/cve/CVE-2012-1127/" source="CVE"/>
		<reference ref_id="CVE-2012-1128" ref_url="https://www.suse.com/security/cve/CVE-2012-1128/" source="CVE"/>
		<reference ref_id="CVE-2012-1129" ref_url="https://www.suse.com/security/cve/CVE-2012-1129/" source="CVE"/>
		<reference ref_id="CVE-2012-1130" ref_url="https://www.suse.com/security/cve/CVE-2012-1130/" source="CVE"/>
		<reference ref_id="CVE-2012-1131" ref_url="https://www.suse.com/security/cve/CVE-2012-1131/" source="CVE"/>
		<reference ref_id="CVE-2012-1132" ref_url="https://www.suse.com/security/cve/CVE-2012-1132/" source="CVE"/>
		<reference ref_id="CVE-2012-1133" ref_url="https://www.suse.com/security/cve/CVE-2012-1133/" source="CVE"/>
		<reference ref_id="CVE-2012-1134" ref_url="https://www.suse.com/security/cve/CVE-2012-1134/" source="CVE"/>
		<reference ref_id="CVE-2012-1135" ref_url="https://www.suse.com/security/cve/CVE-2012-1135/" source="CVE"/>
		<reference ref_id="CVE-2012-1136" ref_url="https://www.suse.com/security/cve/CVE-2012-1136/" source="CVE"/>
		<reference ref_id="CVE-2012-1137" ref_url="https://www.suse.com/security/cve/CVE-2012-1137/" source="CVE"/>
		<reference ref_id="CVE-2012-1138" ref_url="https://www.suse.com/security/cve/CVE-2012-1138/" source="CVE"/>
		<reference ref_id="CVE-2012-1139" ref_url="https://www.suse.com/security/cve/CVE-2012-1139/" source="CVE"/>
		<reference ref_id="CVE-2012-1140" ref_url="https://www.suse.com/security/cve/CVE-2012-1140/" source="CVE"/>
		<reference ref_id="CVE-2012-1141" ref_url="https://www.suse.com/security/cve/CVE-2012-1141/" source="CVE"/>
		<reference ref_id="CVE-2012-1142" ref_url="https://www.suse.com/security/cve/CVE-2012-1142/" source="CVE"/>
		<reference ref_id="CVE-2012-1143" ref_url="https://www.suse.com/security/cve/CVE-2012-1143/" source="CVE"/>
		<reference ref_id="CVE-2012-1144" ref_url="https://www.suse.com/security/cve/CVE-2012-1144/" source="CVE"/>
		<reference ref_id="CVE-2012-5668" ref_url="https://www.suse.com/security/cve/CVE-2012-5668/" source="CVE"/>
		<reference ref_id="CVE-2012-5669" ref_url="https://www.suse.com/security/cve/CVE-2012-5669/" source="CVE"/>
		<reference ref_id="CVE-2012-5670" ref_url="https://www.suse.com/security/cve/CVE-2012-5670/" source="CVE"/>
		<reference ref_id="CVE-2014-2240" ref_url="https://www.suse.com/security/cve/CVE-2014-2240/" source="CVE"/>
		<reference ref_id="CVE-2014-2241" ref_url="https://www.suse.com/security/cve/CVE-2014-2241/" source="CVE"/>
		<reference ref_id="CVE-2014-9656" ref_url="https://www.suse.com/security/cve/CVE-2014-9656/" source="CVE"/>
		<reference ref_id="CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657/" source="CVE"/>
		<reference ref_id="CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658/" source="CVE"/>
		<reference ref_id="CVE-2014-9659" ref_url="https://www.suse.com/security/cve/CVE-2014-9659/" source="CVE"/>
		<reference ref_id="CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660/" source="CVE"/>
		<reference ref_id="CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661/" source="CVE"/>
		<reference ref_id="CVE-2014-9662" ref_url="https://www.suse.com/security/cve/CVE-2014-9662/" source="CVE"/>
		<reference ref_id="CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663/" source="CVE"/>
		<reference ref_id="CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664/" source="CVE"/>
		<reference ref_id="CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665/" source="CVE"/>
		<reference ref_id="CVE-2014-9666" ref_url="https://www.suse.com/security/cve/CVE-2014-9666/" source="CVE"/>
		<reference ref_id="CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667/" source="CVE"/>
		<reference ref_id="CVE-2014-9668" ref_url="https://www.suse.com/security/cve/CVE-2014-9668/" source="CVE"/>
		<reference ref_id="CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669/" source="CVE"/>
		<reference ref_id="CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670/" source="CVE"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<reference ref_id="CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672/" source="CVE"/>
		<reference ref_id="CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673/" source="CVE"/>
		<reference ref_id="CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674/" source="CVE"/>
		<reference ref_id="CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675/" source="CVE"/>
		<description>
These are all security issues fixed in the libfreetype6-2.6.3-7.10.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0946/">CVE-2009-0946</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2497/">CVE-2010-2497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2805/">CVE-2010-2805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3053/">CVE-2010-3053</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3054/">CVE-2010-3054</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3311/">CVE-2010-3311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3814/">CVE-2010-3814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3855/">CVE-2010-3855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0226/">CVE-2011-0226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3256/">CVE-2011-3256</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3439/">CVE-2011-3439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1126/">CVE-2012-1126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1127/">CVE-2012-1127</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1128/">CVE-2012-1128</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1129/">CVE-2012-1129</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1130/">CVE-2012-1130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1131/">CVE-2012-1131</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1132/">CVE-2012-1132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1133/">CVE-2012-1133</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1134/">CVE-2012-1134</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1135/">CVE-2012-1135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1136/">CVE-2012-1136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1137/">CVE-2012-1137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1138/">CVE-2012-1138</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1139/">CVE-2012-1139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1140/">CVE-2012-1140</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1141/">CVE-2012-1141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1142/">CVE-2012-1142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1143/">CVE-2012-1143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1144/">CVE-2012-1144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5668/">CVE-2012-5668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5669/">CVE-2012-5669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5670/">CVE-2012-5670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2240/">CVE-2014-2240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2241/">CVE-2014-2241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9656/">CVE-2014-9656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9659/">CVE-2014-9659</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9662/">CVE-2014-9662</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9666/">CVE-2014-9666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9668/">CVE-2014-9668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76619" version="1" class="patch">
	<metadata>
		<title>libgadu3-1.11.4-1.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-6487" ref_url="https://www.suse.com/security/cve/CVE-2013-6487/" source="CVE"/>
		<reference ref_id="CVE-2014-3775" ref_url="https://www.suse.com/security/cve/CVE-2014-3775/" source="CVE"/>
		<description>
These are all security issues fixed in the libgadu3-1.11.4-1.12 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6487/">CVE-2013-6487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3775/">CVE-2014-3775</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141521" comment="libgadu3-1.11.4-1.12 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76620" version="1" class="patch">
	<metadata>
		<title>libgc1-7.2d-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-2673" ref_url="https://www.suse.com/security/cve/CVE-2012-2673/" source="CVE"/>
		<reference ref_id="CVE-2016-9427" ref_url="https://www.suse.com/security/cve/CVE-2016-9427/" source="CVE"/>
		<description>
These are all security issues fixed in the libgc1-7.2d-5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2673/">CVE-2012-2673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9427/">CVE-2016-9427</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009136646" comment="libgc1-7.2d-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76621" version="1" class="patch">
	<metadata>
		<title>libgcrypt20-1.6.1-16.39.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-4242" ref_url="https://www.suse.com/security/cve/CVE-2013-4242/" source="CVE"/>
		<reference ref_id="CVE-2014-3591" ref_url="https://www.suse.com/security/cve/CVE-2014-3591/" source="CVE"/>
		<reference ref_id="CVE-2015-0837" ref_url="https://www.suse.com/security/cve/CVE-2015-0837/" source="CVE"/>
		<reference ref_id="CVE-2015-7511" ref_url="https://www.suse.com/security/cve/CVE-2015-7511/" source="CVE"/>
		<reference ref_id="CVE-2016-6313" ref_url="https://www.suse.com/security/cve/CVE-2016-6313/" source="CVE"/>
		<description>
These are all security issues fixed in the libgcrypt20-1.6.1-16.39.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4242/">CVE-2013-4242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3591/">CVE-2014-3591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0837/">CVE-2015-0837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7511/">CVE-2015-7511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6313/">CVE-2016-6313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156955" comment="libgcrypt20-1.6.1-16.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156956" comment="libgcrypt20-32bit-1.6.1-16.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76622" version="1" class="patch">
	<metadata>
		<title>libgif6-32bit-5.0.5-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-7555" ref_url="https://www.suse.com/security/cve/CVE-2015-7555/" source="CVE"/>
		<reference ref_id="CVE-2016-3977" ref_url="https://www.suse.com/security/cve/CVE-2016-3977/" source="CVE"/>
		<description>
These are all security issues fixed in the libgif6-32bit-5.0.5-12.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7555/">CVE-2015-7555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3977/">CVE-2016-3977</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009126709" comment="libgif6-5.0.5-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009126710" comment="libgif6-32bit-5.0.5-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76623" version="1" class="patch">
	<metadata>
		<title>libgme0-0.6.0-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-9957" ref_url="https://www.suse.com/security/cve/CVE-2016-9957/" source="CVE"/>
		<reference ref_id="CVE-2016-9958" ref_url="https://www.suse.com/security/cve/CVE-2016-9958/" source="CVE"/>
		<reference ref_id="CVE-2016-9959" ref_url="https://www.suse.com/security/cve/CVE-2016-9959/" source="CVE"/>
		<reference ref_id="CVE-2016-9960" ref_url="https://www.suse.com/security/cve/CVE-2016-9960/" source="CVE"/>
		<reference ref_id="CVE-2016-9961" ref_url="https://www.suse.com/security/cve/CVE-2016-9961/" source="CVE"/>
		<description>
These are all security issues fixed in the libgme0-0.6.0-5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9957/">CVE-2016-9957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9958/">CVE-2016-9958</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9959/">CVE-2016-9959</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9960/">CVE-2016-9960</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9961/">CVE-2016-9961</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145377" comment="libgme0-0.6.0-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76624" version="1" class="patch">
	<metadata>
		<title>libgnomesu-2.0.0-353.6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1946" ref_url="https://www.suse.com/security/cve/CVE-2011-1946/" source="CVE"/>
		<description>
These are all security issues fixed in the libgnomesu-2.0.0-353.6.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1946/">CVE-2011-1946</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140842" comment="libgnomesu-2.0.0-353.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140843" comment="libgnomesu-lang-2.0.0-353.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140844" comment="libgnomesu0-2.0.0-353.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76625" version="1" class="patch">
	<metadata>
		<title>libgraphite2-3-1.3.1-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-1521" ref_url="https://www.suse.com/security/cve/CVE-2016-1521/" source="CVE"/>
		<reference ref_id="CVE-2016-1523" ref_url="https://www.suse.com/security/cve/CVE-2016-1523/" source="CVE"/>
		<reference ref_id="CVE-2016-1526" ref_url="https://www.suse.com/security/cve/CVE-2016-1526/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<description>
These are all security issues fixed in the libgraphite2-3-1.3.1-9.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1521/">CVE-2016-1521</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1523/">CVE-2016-1523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1526/">CVE-2016-1526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154911" comment="libgraphite2-3-1.3.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154912" comment="libgraphite2-3-32bit-1.3.1-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76626" version="1" class="patch">
	<metadata>
		<title>libgssglue1-0.4-3.83 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-2709" ref_url="https://www.suse.com/security/cve/CVE-2011-2709/" source="CVE"/>
		<description>
These are all security issues fixed in the libgssglue1-0.4-3.83 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2709/">CVE-2011-2709</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140845" comment="libgssglue1-0.4-3.83 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140846" comment="libgssglue1-32bit-0.4-3.83 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76627" version="1" class="patch">
	<metadata>
		<title>libgypsy0-0.9-6.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-0523" ref_url="https://www.suse.com/security/cve/CVE-2011-0523/" source="CVE"/>
		<reference ref_id="CVE-2011-0524" ref_url="https://www.suse.com/security/cve/CVE-2011-0524/" source="CVE"/>
		<description>
These are all security issues fixed in the libgypsy0-0.9-6.24 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0523/">CVE-2011-0523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0524/">CVE-2011-0524</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140676" comment="libgypsy0-0.9-6.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76628" version="1" class="patch">
	<metadata>
		<title>libhogweed2-2.7.1-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-8803" ref_url="https://www.suse.com/security/cve/CVE-2015-8803/" source="CVE"/>
		<reference ref_id="CVE-2015-8804" ref_url="https://www.suse.com/security/cve/CVE-2015-8804/" source="CVE"/>
		<reference ref_id="CVE-2015-8805" ref_url="https://www.suse.com/security/cve/CVE-2015-8805/" source="CVE"/>
		<reference ref_id="CVE-2016-6489" ref_url="https://www.suse.com/security/cve/CVE-2016-6489/" source="CVE"/>
		<description>
These are all security issues fixed in the libhogweed2-2.7.1-12.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8803/">CVE-2015-8803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8804/">CVE-2015-8804</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8805/">CVE-2015-8805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6489/">CVE-2016-6489</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156348" comment="libhogweed2-2.7.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156349" comment="libhogweed2-32bit-2.7.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156351" comment="libnettle4-2.7.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156352" comment="libnettle4-32bit-2.7.1-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76629" version="1" class="patch">
	<metadata>
		<title>libid3tag0-0.15.1b-182.58 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-2109" ref_url="https://www.suse.com/security/cve/CVE-2008-2109/" source="CVE"/>
		<description>
These are all security issues fixed in the libid3tag0-0.15.1b-182.58 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2109/">CVE-2008-2109</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141536" comment="libid3tag0-0.15.1b-182.58 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76630" version="1" class="patch">
	<metadata>
		<title>libidn11-1.28-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-2059" ref_url="https://www.suse.com/security/cve/CVE-2015-2059/" source="CVE"/>
		<reference ref_id="CVE-2015-8948" ref_url="https://www.suse.com/security/cve/CVE-2015-8948/" source="CVE"/>
		<reference ref_id="CVE-2016-6261" ref_url="https://www.suse.com/security/cve/CVE-2016-6261/" source="CVE"/>
		<reference ref_id="CVE-2016-6262" ref_url="https://www.suse.com/security/cve/CVE-2016-6262/" source="CVE"/>
		<reference ref_id="CVE-2016-6263" ref_url="https://www.suse.com/security/cve/CVE-2016-6263/" source="CVE"/>
		<description>
These are all security issues fixed in the libidn11-1.28-4.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2059/">CVE-2015-2059</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8948/">CVE-2015-8948</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6261/">CVE-2016-6261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6262/">CVE-2016-6262</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6263/">CVE-2016-6263</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130989" comment="libidn11-1.28-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130990" comment="libidn11-32bit-1.28-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76631" version="1" class="patch">
	<metadata>
		<title>libipa_hbac0-1.13.4-33.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-4341" ref_url="https://www.suse.com/security/cve/CVE-2010-4341/" source="CVE"/>
		<reference ref_id="CVE-2011-1758" ref_url="https://www.suse.com/security/cve/CVE-2011-1758/" source="CVE"/>
		<reference ref_id="CVE-2013-0219" ref_url="https://www.suse.com/security/cve/CVE-2013-0219/" source="CVE"/>
		<reference ref_id="CVE-2013-0220" ref_url="https://www.suse.com/security/cve/CVE-2013-0220/" source="CVE"/>
		<reference ref_id="CVE-2013-0287" ref_url="https://www.suse.com/security/cve/CVE-2013-0287/" source="CVE"/>
		<description>
These are all security issues fixed in the libipa_hbac0-1.13.4-33.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4341/">CVE-2010-4341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1758/">CVE-2011-1758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0219/">CVE-2013-0219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0220/">CVE-2013-0220</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0287/">CVE-2013-0287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159140" comment="libipa_hbac0-1.13.4-33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159141" comment="libsss_idmap0-1.13.4-33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159142" comment="libsss_nss_idmap0-1.13.4-33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159143" comment="libsss_sudo-1.13.4-33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159144" comment="python-sssd-config-1.13.4-33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159145" comment="sssd-1.13.4-33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159146" comment="sssd-32bit-1.13.4-33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159147" comment="sssd-ad-1.13.4-33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159148" comment="sssd-ipa-1.13.4-33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159149" comment="sssd-krb5-1.13.4-33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159150" comment="sssd-krb5-common-1.13.4-33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159151" comment="sssd-ldap-1.13.4-33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159152" comment="sssd-proxy-1.13.4-33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159153" comment="sssd-tools-1.13.4-33.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76632" version="1" class="patch">
	<metadata>
		<title>libjasper1-1.900.14-194.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-3522" ref_url="https://www.suse.com/security/cve/CVE-2008-3522/" source="CVE"/>
		<reference ref_id="CVE-2011-4516" ref_url="https://www.suse.com/security/cve/CVE-2011-4516/" source="CVE"/>
		<reference ref_id="CVE-2011-4517" ref_url="https://www.suse.com/security/cve/CVE-2011-4517/" source="CVE"/>
		<reference ref_id="CVE-2014-8137" ref_url="https://www.suse.com/security/cve/CVE-2014-8137/" source="CVE"/>
		<reference ref_id="CVE-2014-8138" ref_url="https://www.suse.com/security/cve/CVE-2014-8138/" source="CVE"/>
		<reference ref_id="CVE-2014-8157" ref_url="https://www.suse.com/security/cve/CVE-2014-8157/" source="CVE"/>
		<reference ref_id="CVE-2014-8158" ref_url="https://www.suse.com/security/cve/CVE-2014-8158/" source="CVE"/>
		<reference ref_id="CVE-2014-9029" ref_url="https://www.suse.com/security/cve/CVE-2014-9029/" source="CVE"/>
		<reference ref_id="CVE-2015-5203" ref_url="https://www.suse.com/security/cve/CVE-2015-5203/" source="CVE"/>
		<reference ref_id="CVE-2015-5221" ref_url="https://www.suse.com/security/cve/CVE-2015-5221/" source="CVE"/>
		<reference ref_id="CVE-2016-10251" ref_url="https://www.suse.com/security/cve/CVE-2016-10251/" source="CVE"/>
		<reference ref_id="CVE-2016-1577" ref_url="https://www.suse.com/security/cve/CVE-2016-1577/" source="CVE"/>
		<reference ref_id="CVE-2016-1867" ref_url="https://www.suse.com/security/cve/CVE-2016-1867/" source="CVE"/>
		<reference ref_id="CVE-2016-2089" ref_url="https://www.suse.com/security/cve/CVE-2016-2089/" source="CVE"/>
		<reference ref_id="CVE-2016-2116" ref_url="https://www.suse.com/security/cve/CVE-2016-2116/" source="CVE"/>
		<reference ref_id="CVE-2016-8654" ref_url="https://www.suse.com/security/cve/CVE-2016-8654/" source="CVE"/>
		<reference ref_id="CVE-2016-8690" ref_url="https://www.suse.com/security/cve/CVE-2016-8690/" source="CVE"/>
		<reference ref_id="CVE-2016-8691" ref_url="https://www.suse.com/security/cve/CVE-2016-8691/" source="CVE"/>
		<reference ref_id="CVE-2016-8692" ref_url="https://www.suse.com/security/cve/CVE-2016-8692/" source="CVE"/>
		<reference ref_id="CVE-2016-8693" ref_url="https://www.suse.com/security/cve/CVE-2016-8693/" source="CVE"/>
		<reference ref_id="CVE-2016-8880" ref_url="https://www.suse.com/security/cve/CVE-2016-8880/" source="CVE"/>
		<reference ref_id="CVE-2016-8881" ref_url="https://www.suse.com/security/cve/CVE-2016-8881/" source="CVE"/>
		<reference ref_id="CVE-2016-8882" ref_url="https://www.suse.com/security/cve/CVE-2016-8882/" source="CVE"/>
		<reference ref_id="CVE-2016-8883" ref_url="https://www.suse.com/security/cve/CVE-2016-8883/" source="CVE"/>
		<reference ref_id="CVE-2016-8884" ref_url="https://www.suse.com/security/cve/CVE-2016-8884/" source="CVE"/>
		<reference ref_id="CVE-2016-8885" ref_url="https://www.suse.com/security/cve/CVE-2016-8885/" source="CVE"/>
		<reference ref_id="CVE-2016-8886" ref_url="https://www.suse.com/security/cve/CVE-2016-8886/" source="CVE"/>
		<reference ref_id="CVE-2016-8887" ref_url="https://www.suse.com/security/cve/CVE-2016-8887/" source="CVE"/>
		<reference ref_id="CVE-2016-9395" ref_url="https://www.suse.com/security/cve/CVE-2016-9395/" source="CVE"/>
		<reference ref_id="CVE-2016-9398" ref_url="https://www.suse.com/security/cve/CVE-2016-9398/" source="CVE"/>
		<reference ref_id="CVE-2016-9560" ref_url="https://www.suse.com/security/cve/CVE-2016-9560/" source="CVE"/>
		<reference ref_id="CVE-2016-9583" ref_url="https://www.suse.com/security/cve/CVE-2016-9583/" source="CVE"/>
		<reference ref_id="CVE-2016-9591" ref_url="https://www.suse.com/security/cve/CVE-2016-9591/" source="CVE"/>
		<reference ref_id="CVE-2016-9600" ref_url="https://www.suse.com/security/cve/CVE-2016-9600/" source="CVE"/>
		<reference ref_id="CVE-2017-5498" ref_url="https://www.suse.com/security/cve/CVE-2017-5498/" source="CVE"/>
		<reference ref_id="CVE-2017-6850" ref_url="https://www.suse.com/security/cve/CVE-2017-6850/" source="CVE"/>
		<description>
These are all security issues fixed in the libjasper1-1.900.14-194.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3522/">CVE-2008-3522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4516/">CVE-2011-4516</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4517/">CVE-2011-4517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8137/">CVE-2014-8137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8138/">CVE-2014-8138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8157/">CVE-2014-8157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8158/">CVE-2014-8158</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9029/">CVE-2014-9029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5203/">CVE-2015-5203</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5221/">CVE-2015-5221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10251/">CVE-2016-10251</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1577/">CVE-2016-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1867/">CVE-2016-1867</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2089/">CVE-2016-2089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2116/">CVE-2016-2116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8654/">CVE-2016-8654</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8690/">CVE-2016-8690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8691/">CVE-2016-8691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8692/">CVE-2016-8692</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-8693/">CVE-2016-8693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8880/">CVE-2016-8880</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8881/">CVE-2016-8881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8882/">CVE-2016-8882</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8883/">CVE-2016-8883</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8884/">CVE-2016-8884</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8885/">CVE-2016-8885</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8886/">CVE-2016-8886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8887/">CVE-2016-8887</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9395/">CVE-2016-9395</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9398/">CVE-2016-9398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9560/">CVE-2016-9560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9583/">CVE-2016-9583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9591/">CVE-2016-9591</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9600/">CVE-2016-9600</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5498/">CVE-2017-5498</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6850/">CVE-2017-6850</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76633" version="1" class="patch">
	<metadata>
		<title>libjavascriptcoregtk-1_0-0-2.4.11-23.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-5112" ref_url="https://www.suse.com/security/cve/CVE-2012-5112/" source="CVE"/>
		<reference ref_id="CVE-2012-5133" ref_url="https://www.suse.com/security/cve/CVE-2012-5133/" source="CVE"/>
		<reference ref_id="CVE-2014-1344" ref_url="https://www.suse.com/security/cve/CVE-2014-1344/" source="CVE"/>
		<reference ref_id="CVE-2014-1384" ref_url="https://www.suse.com/security/cve/CVE-2014-1384/" source="CVE"/>
		<reference ref_id="CVE-2014-1385" ref_url="https://www.suse.com/security/cve/CVE-2014-1385/" source="CVE"/>
		<reference ref_id="CVE-2014-1386" ref_url="https://www.suse.com/security/cve/CVE-2014-1386/" source="CVE"/>
		<reference ref_id="CVE-2014-1387" ref_url="https://www.suse.com/security/cve/CVE-2014-1387/" source="CVE"/>
		<reference ref_id="CVE-2014-1388" ref_url="https://www.suse.com/security/cve/CVE-2014-1388/" source="CVE"/>
		<reference ref_id="CVE-2014-1389" ref_url="https://www.suse.com/security/cve/CVE-2014-1389/" source="CVE"/>
		<reference ref_id="CVE-2014-1390" ref_url="https://www.suse.com/security/cve/CVE-2014-1390/" source="CVE"/>
		<reference ref_id="CVE-2014-1748" ref_url="https://www.suse.com/security/cve/CVE-2014-1748/" source="CVE"/>
		<reference ref_id="CVE-2015-1071" ref_url="https://www.suse.com/security/cve/CVE-2015-1071/" source="CVE"/>
		<reference ref_id="CVE-2015-1076" ref_url="https://www.suse.com/security/cve/CVE-2015-1076/" source="CVE"/>
		<reference ref_id="CVE-2015-1081" ref_url="https://www.suse.com/security/cve/CVE-2015-1081/" source="CVE"/>
		<reference ref_id="CVE-2015-1083" ref_url="https://www.suse.com/security/cve/CVE-2015-1083/" source="CVE"/>
		<reference ref_id="CVE-2015-1120" ref_url="https://www.suse.com/security/cve/CVE-2015-1120/" source="CVE"/>
		<reference ref_id="CVE-2015-1122" ref_url="https://www.suse.com/security/cve/CVE-2015-1122/" source="CVE"/>
		<reference ref_id="CVE-2015-1127" ref_url="https://www.suse.com/security/cve/CVE-2015-1127/" source="CVE"/>
		<reference ref_id="CVE-2015-1153" ref_url="https://www.suse.com/security/cve/CVE-2015-1153/" source="CVE"/>
		<reference ref_id="CVE-2015-1155" ref_url="https://www.suse.com/security/cve/CVE-2015-1155/" source="CVE"/>
		<reference ref_id="CVE-2015-2330" ref_url="https://www.suse.com/security/cve/CVE-2015-2330/" source="CVE"/>
		<reference ref_id="CVE-2015-3658" ref_url="https://www.suse.com/security/cve/CVE-2015-3658/" source="CVE"/>
		<reference ref_id="CVE-2015-3659" ref_url="https://www.suse.com/security/cve/CVE-2015-3659/" source="CVE"/>
		<reference ref_id="CVE-2015-3727" ref_url="https://www.suse.com/security/cve/CVE-2015-3727/" source="CVE"/>
		<reference ref_id="CVE-2015-3731" ref_url="https://www.suse.com/security/cve/CVE-2015-3731/" source="CVE"/>
		<reference ref_id="CVE-2015-3741" ref_url="https://www.suse.com/security/cve/CVE-2015-3741/" source="CVE"/>
		<reference ref_id="CVE-2015-3743" ref_url="https://www.suse.com/security/cve/CVE-2015-3743/" source="CVE"/>
		<reference ref_id="CVE-2015-3745" ref_url="https://www.suse.com/security/cve/CVE-2015-3745/" source="CVE"/>
		<reference ref_id="CVE-2015-3747" ref_url="https://www.suse.com/security/cve/CVE-2015-3747/" source="CVE"/>
		<reference ref_id="CVE-2015-3748" ref_url="https://www.suse.com/security/cve/CVE-2015-3748/" source="CVE"/>
		<reference ref_id="CVE-2015-3749" ref_url="https://www.suse.com/security/cve/CVE-2015-3749/" source="CVE"/>
		<reference ref_id="CVE-2015-3752" ref_url="https://www.suse.com/security/cve/CVE-2015-3752/" source="CVE"/>
		<reference ref_id="CVE-2015-5788" ref_url="https://www.suse.com/security/cve/CVE-2015-5788/" source="CVE"/>
		<reference ref_id="CVE-2015-5794" ref_url="https://www.suse.com/security/cve/CVE-2015-5794/" source="CVE"/>
		<reference ref_id="CVE-2015-5801" ref_url="https://www.suse.com/security/cve/CVE-2015-5801/" source="CVE"/>
		<reference ref_id="CVE-2015-5809" ref_url="https://www.suse.com/security/cve/CVE-2015-5809/" source="CVE"/>
		<reference ref_id="CVE-2015-5822" ref_url="https://www.suse.com/security/cve/CVE-2015-5822/" source="CVE"/>
		<reference ref_id="CVE-2015-5928" ref_url="https://www.suse.com/security/cve/CVE-2015-5928/" source="CVE"/>
		<description>
These are all security issues fixed in the libjavascriptcoregtk-1_0-0-2.4.11-23.20 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5112/">CVE-2012-5112</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5133/">CVE-2012-5133</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1344/">CVE-2014-1344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1384/">CVE-2014-1384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1385/">CVE-2014-1385</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1386/">CVE-2014-1386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1387/">CVE-2014-1387</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1388/">CVE-2014-1388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1389/">CVE-2014-1389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1390/">CVE-2014-1390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1748/">CVE-2014-1748</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1071/">CVE-2015-1071</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1076/">CVE-2015-1076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1081/">CVE-2015-1081</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1083/">CVE-2015-1083</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-1120/">CVE-2015-1120</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-1122/">CVE-2015-1122</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-1127/">CVE-2015-1127</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1153/">CVE-2015-1153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1155/">CVE-2015-1155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2330/">CVE-2015-2330</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3658/">CVE-2015-3658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3659/">CVE-2015-3659</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3727/">CVE-2015-3727</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3731/">CVE-2015-3731</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3741/">CVE-2015-3741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3743/">CVE-2015-3743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3745/">CVE-2015-3745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3747/">CVE-2015-3747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3748/">CVE-2015-3748</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3749/">CVE-2015-3749</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3752/">CVE-2015-3752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5788/">CVE-2015-5788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5794/">CVE-2015-5794</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5801/">CVE-2015-5801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5809/">CVE-2015-5809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5822/">CVE-2015-5822</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5928/">CVE-2015-5928</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76634" version="1" class="patch">
	<metadata>
		<title>libjavascriptcoregtk-4_0-18-2.12.5-1.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-1856" ref_url="https://www.suse.com/security/cve/CVE-2016-1856/" source="CVE"/>
		<reference ref_id="CVE-2016-1857" ref_url="https://www.suse.com/security/cve/CVE-2016-1857/" source="CVE"/>
		<reference ref_id="CVE-2016-4590" ref_url="https://www.suse.com/security/cve/CVE-2016-4590/" source="CVE"/>
		<reference ref_id="CVE-2016-4591" ref_url="https://www.suse.com/security/cve/CVE-2016-4591/" source="CVE"/>
		<reference ref_id="CVE-2016-4622" ref_url="https://www.suse.com/security/cve/CVE-2016-4622/" source="CVE"/>
		<reference ref_id="CVE-2016-4624" ref_url="https://www.suse.com/security/cve/CVE-2016-4624/" source="CVE"/>
		<description>
These are all security issues fixed in the libjavascriptcoregtk-4_0-18-2.12.5-1.12 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1856/">CVE-2016-1856</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1857/">CVE-2016-1857</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4590/">CVE-2016-4590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4591/">CVE-2016-4591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4622/">CVE-2016-4622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4624/">CVE-2016-4624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140865" comment="libjavascriptcoregtk-4_0-18-2.12.5-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140866" comment="libwebkit2gtk-4_0-37-2.12.5-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142138" comment="libwebkit2gtk3-lang-2.12.5-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140867" comment="typelib-1_0-JavaScriptCore-4_0-2.12.5-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140868" comment="typelib-1_0-WebKit2-4_0-2.12.5-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140869" comment="webkit2gtk-4_0-injected-bundles-2.12.5-1.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76635" version="1" class="patch">
	<metadata>
		<title>libjbig2-2.0-12.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-6369" ref_url="https://www.suse.com/security/cve/CVE-2013-6369/" source="CVE"/>
		<description>
These are all security issues fixed in the libjbig2-2.0-12.13 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6369/">CVE-2013-6369</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141560" comment="libjbig2-2.0-12.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140690" comment="libjbig2-32bit-2.0-12.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76636" version="1" class="patch">
	<metadata>
		<title>libjpeg-turbo-1.3.1-30.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-9092" ref_url="https://www.suse.com/security/cve/CVE-2014-9092/" source="CVE"/>
		<description>
These are all security issues fixed in the libjpeg-turbo-1.3.1-30.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9092/">CVE-2014-9092</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105080" comment="libjpeg-turbo-1.3.1-30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105088" comment="libjpeg62-62.1.0-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105087" comment="libjpeg62-32bit-62.1.0-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105091" comment="libjpeg62-turbo-1.3.1-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105082" comment="libjpeg8-8.0.2-30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105081" comment="libjpeg8-32bit-8.0.2-30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105086" comment="libturbojpeg0-8.0.2-30.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76637" version="1" class="patch">
	<metadata>
		<title>libjson-c2-0.11-2.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-6370" ref_url="https://www.suse.com/security/cve/CVE-2013-6370/" source="CVE"/>
		<reference ref_id="CVE-2013-6371" ref_url="https://www.suse.com/security/cve/CVE-2013-6371/" source="CVE"/>
		<description>
These are all security issues fixed in the libjson-c2-0.11-2.22 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6370/">CVE-2013-6370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6371/">CVE-2013-6371</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140691" comment="libjson-c2-0.11-2.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140692" comment="libjson-c2-32bit-0.11-2.22 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76638" version="1" class="patch">
	<metadata>
		<title>libkde4-32bit-4.12.0-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="CVE-2017-8422" ref_url="https://www.suse.com/security/cve/CVE-2017-8422/" source="CVE"/>
		<description>
These are all security issues fixed in the libkde4-32bit-4.12.0-10.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-8422/">CVE-2017-8422</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009155614" comment="libkde4-4.12.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155615" comment="libkde4-32bit-4.12.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155616" comment="libkdecore4-4.12.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155617" comment="libkdecore4-32bit-4.12.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155618" comment="libksuseinstall1-4.12.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155619" comment="libksuseinstall1-32bit-4.12.0-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76639" version="1" class="patch">
	<metadata>
		<title>libksba8-1.3.0-23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-9087" ref_url="https://www.suse.com/security/cve/CVE-2014-9087/" source="CVE"/>
		<reference ref_id="CVE-2016-4574" ref_url="https://www.suse.com/security/cve/CVE-2016-4574/" source="CVE"/>
		<reference ref_id="CVE-2016-4579" ref_url="https://www.suse.com/security/cve/CVE-2016-4579/" source="CVE"/>
		<description>
These are all security issues fixed in the libksba8-1.3.0-23.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9087/">CVE-2014-9087</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4574/">CVE-2016-4574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4579/">CVE-2016-4579</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128468" comment="libksba8-1.3.0-23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76640" version="1" class="patch">
	<metadata>
		<title>libldap-2_4-2-2.4.41-18.29.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-1545" ref_url="https://www.suse.com/security/cve/CVE-2015-1545/" source="CVE"/>
		<reference ref_id="CVE-2015-1546" ref_url="https://www.suse.com/security/cve/CVE-2015-1546/" source="CVE"/>
		<reference ref_id="CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908/" source="CVE"/>
		<reference ref_id="CVE-2017-9287" ref_url="https://www.suse.com/security/cve/CVE-2017-9287/" source="CVE"/>
		<description>
These are all security issues fixed in the libldap-2_4-2-2.4.41-18.29.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1545/">CVE-2015-1545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1546/">CVE-2015-1546</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9287/">CVE-2017-9287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156765" comment="libldap-2_4-2-2.4.41-18.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156766" comment="libldap-2_4-2-32bit-2.4.41-18.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156768" comment="openldap2-client-2.4.41-18.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76641" version="1" class="patch">
	<metadata>
		<title>libldb1-1.1.29-1.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-3223" ref_url="https://www.suse.com/security/cve/CVE-2015-3223/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<description>
These are all security issues fixed in the libldb1-1.1.29-1.13 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3223/">CVE-2015-3223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159154" comment="libldb1-1.1.29-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159155" comment="libldb1-32bit-1.1.29-1.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76642" version="1" class="patch">
	<metadata>
		<title>libltdl7-2.4.2-16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-3736" ref_url="https://www.suse.com/security/cve/CVE-2009-3736/" source="CVE"/>
		<description>
These are all security issues fixed in the libltdl7-2.4.2-16.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3736/">CVE-2009-3736</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159156" comment="libltdl7-2.4.2-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159157" comment="libltdl7-32bit-2.4.2-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76643" version="1" class="patch">
	<metadata>
		<title>liblua5_2-5.2.4-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-5461" ref_url="https://www.suse.com/security/cve/CVE-2014-5461/" source="CVE"/>
		<description>
These are all security issues fixed in the liblua5_2-5.2.4-6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5461/">CVE-2014-5461</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159160" comment="liblua5_2-5.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159162" comment="lua-5.2.4-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76644" version="1" class="patch">
	<metadata>
		<title>liblzo2-2-2.08-1.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607/" source="CVE"/>
		<description>
These are all security issues fixed in the liblzo2-2-2.08-1.13 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141561" comment="liblzo2-2-2.08-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140883" comment="liblzo2-2-32bit-2.08-1.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76645" version="1" class="patch">
	<metadata>
		<title>libmikmod3-3.2.0-4.59 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-6720" ref_url="https://www.suse.com/security/cve/CVE-2007-6720/" source="CVE"/>
		<reference ref_id="CVE-2009-0179" ref_url="https://www.suse.com/security/cve/CVE-2009-0179/" source="CVE"/>
		<reference ref_id="CVE-2009-3995" ref_url="https://www.suse.com/security/cve/CVE-2009-3995/" source="CVE"/>
		<reference ref_id="CVE-2009-3996" ref_url="https://www.suse.com/security/cve/CVE-2009-3996/" source="CVE"/>
		<reference ref_id="CVE-2010-2546" ref_url="https://www.suse.com/security/cve/CVE-2010-2546/" source="CVE"/>
		<description>
These are all security issues fixed in the libmikmod3-3.2.0-4.59 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2007-6720/">CVE-2007-6720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0179/">CVE-2009-0179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3995/">CVE-2009-3995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3996/">CVE-2009-3996</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2546/">CVE-2010-2546</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141562" comment="libmikmod3-3.2.0-4.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141563" comment="libmikmod3-32bit-3.2.0-4.59 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76646" version="1" class="patch">
	<metadata>
		<title>libmms0-0.6.2-15.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-2892" ref_url="https://www.suse.com/security/cve/CVE-2014-2892/" source="CVE"/>
		<description>
These are all security issues fixed in the libmms0-0.6.2-15.8 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-2892/">CVE-2014-2892</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140884" comment="libmms0-0.6.2-15.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76647" version="1" class="patch">
	<metadata>
		<title>libmodplug1-0.8.8.4-13.69 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1761" ref_url="https://www.suse.com/security/cve/CVE-2011-1761/" source="CVE"/>
		<reference ref_id="CVE-2013-4233" ref_url="https://www.suse.com/security/cve/CVE-2013-4233/" source="CVE"/>
		<reference ref_id="CVE-2013-4234" ref_url="https://www.suse.com/security/cve/CVE-2013-4234/" source="CVE"/>
		<description>
These are all security issues fixed in the libmodplug1-0.8.8.4-13.69 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1761/">CVE-2011-1761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4233/">CVE-2013-4233</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4234/">CVE-2013-4234</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140885" comment="libmodplug1-0.8.8.4-13.69 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76648" version="1" class="patch">
	<metadata>
		<title>libmpfr4-3.1.2-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-9474" ref_url="https://www.suse.com/security/cve/CVE-2014-9474/" source="CVE"/>
		<description>
These are all security issues fixed in the libmpfr4-3.1.2-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9474/">CVE-2014-9474</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105814" comment="libmpfr4-3.1.2-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76649" version="1" class="patch">
	<metadata>
		<title>libmspack0-0.4-14.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2800" ref_url="https://www.suse.com/security/cve/CVE-2010-2800/" source="CVE"/>
		<reference ref_id="CVE-2010-2801" ref_url="https://www.suse.com/security/cve/CVE-2010-2801/" source="CVE"/>
		<reference ref_id="CVE-2014-9556" ref_url="https://www.suse.com/security/cve/CVE-2014-9556/" source="CVE"/>
		<reference ref_id="CVE-2014-9732" ref_url="https://www.suse.com/security/cve/CVE-2014-9732/" source="CVE"/>
		<reference ref_id="CVE-2015-4467" ref_url="https://www.suse.com/security/cve/CVE-2015-4467/" source="CVE"/>
		<reference ref_id="CVE-2015-4468" ref_url="https://www.suse.com/security/cve/CVE-2015-4468/" source="CVE"/>
		<reference ref_id="CVE-2015-4469" ref_url="https://www.suse.com/security/cve/CVE-2015-4469/" source="CVE"/>
		<reference ref_id="CVE-2015-4470" ref_url="https://www.suse.com/security/cve/CVE-2015-4470/" source="CVE"/>
		<reference ref_id="CVE-2015-4471" ref_url="https://www.suse.com/security/cve/CVE-2015-4471/" source="CVE"/>
		<reference ref_id="CVE-2015-4472" ref_url="https://www.suse.com/security/cve/CVE-2015-4472/" source="CVE"/>
		<description>
These are all security issues fixed in the libmspack0-0.4-14.4 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2800/">CVE-2010-2800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2801/">CVE-2010-2801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9556/">CVE-2014-9556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9732/">CVE-2014-9732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4467/">CVE-2015-4467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4468/">CVE-2015-4468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4469/">CVE-2015-4469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4470/">CVE-2015-4470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4471/">CVE-2015-4471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4472/">CVE-2015-4472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009118765" comment="libmspack0-0.4-14.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76650" version="1" class="patch">
	<metadata>
		<title>libmusicbrainz4-2.1.5-27.86 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-4197" ref_url="https://www.suse.com/security/cve/CVE-2006-4197/" source="CVE"/>
		<description>
These are all security issues fixed in the libmusicbrainz4-2.1.5-27.86 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4197/">CVE-2006-4197</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140886" comment="libmusicbrainz4-2.1.5-27.86 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76651" version="1" class="patch">
	<metadata>
		<title>libmysqlclient18-10.0.30-28.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-5970" ref_url="https://www.suse.com/security/cve/CVE-2007-5970/" source="CVE"/>
		<reference ref_id="CVE-2008-7247" ref_url="https://www.suse.com/security/cve/CVE-2008-7247/" source="CVE"/>
		<reference ref_id="CVE-2009-4019" ref_url="https://www.suse.com/security/cve/CVE-2009-4019/" source="CVE"/>
		<reference ref_id="CVE-2009-4028" ref_url="https://www.suse.com/security/cve/CVE-2009-4028/" source="CVE"/>
		<reference ref_id="CVE-2009-4030" ref_url="https://www.suse.com/security/cve/CVE-2009-4030/" source="CVE"/>
		<reference ref_id="CVE-2010-5298" ref_url="https://www.suse.com/security/cve/CVE-2010-5298/" source="CVE"/>
		<reference ref_id="CVE-2012-5615" ref_url="https://www.suse.com/security/cve/CVE-2012-5615/" source="CVE"/>
		<reference ref_id="CVE-2013-1976" ref_url="https://www.suse.com/security/cve/CVE-2013-1976/" source="CVE"/>
		<reference ref_id="CVE-2014-0195" ref_url="https://www.suse.com/security/cve/CVE-2014-0195/" source="CVE"/>
		<reference ref_id="CVE-2014-0198" ref_url="https://www.suse.com/security/cve/CVE-2014-0198/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-2494" ref_url="https://www.suse.com/security/cve/CVE-2014-2494/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-4207" ref_url="https://www.suse.com/security/cve/CVE-2014-4207/" source="CVE"/>
		<reference ref_id="CVE-2014-4258" ref_url="https://www.suse.com/security/cve/CVE-2014-4258/" source="CVE"/>
		<reference ref_id="CVE-2014-4260" ref_url="https://www.suse.com/security/cve/CVE-2014-4260/" source="CVE"/>
		<reference ref_id="CVE-2014-4274" ref_url="https://www.suse.com/security/cve/CVE-2014-4274/" source="CVE"/>
		<reference ref_id="CVE-2014-4287" ref_url="https://www.suse.com/security/cve/CVE-2014-4287/" source="CVE"/>
		<reference ref_id="CVE-2014-6463" ref_url="https://www.suse.com/security/cve/CVE-2014-6463/" source="CVE"/>
		<reference ref_id="CVE-2014-6464" ref_url="https://www.suse.com/security/cve/CVE-2014-6464/" source="CVE"/>
		<reference ref_id="CVE-2014-6469" ref_url="https://www.suse.com/security/cve/CVE-2014-6469/" source="CVE"/>
		<reference ref_id="CVE-2014-6474" ref_url="https://www.suse.com/security/cve/CVE-2014-6474/" source="CVE"/>
		<reference ref_id="CVE-2014-6478" ref_url="https://www.suse.com/security/cve/CVE-2014-6478/" source="CVE"/>
		<reference ref_id="CVE-2014-6484" ref_url="https://www.suse.com/security/cve/CVE-2014-6484/" source="CVE"/>
		<reference ref_id="CVE-2014-6489" ref_url="https://www.suse.com/security/cve/CVE-2014-6489/" source="CVE"/>
		<reference ref_id="CVE-2014-6491" ref_url="https://www.suse.com/security/cve/CVE-2014-6491/" source="CVE"/>
		<reference ref_id="CVE-2014-6494" ref_url="https://www.suse.com/security/cve/CVE-2014-6494/" source="CVE"/>
		<reference ref_id="CVE-2014-6495" ref_url="https://www.suse.com/security/cve/CVE-2014-6495/" source="CVE"/>
		<reference ref_id="CVE-2014-6496" ref_url="https://www.suse.com/security/cve/CVE-2014-6496/" source="CVE"/>
		<reference ref_id="CVE-2014-6500" ref_url="https://www.suse.com/security/cve/CVE-2014-6500/" source="CVE"/>
		<reference ref_id="CVE-2014-6505" ref_url="https://www.suse.com/security/cve/CVE-2014-6505/" source="CVE"/>
		<reference ref_id="CVE-2014-6507" ref_url="https://www.suse.com/security/cve/CVE-2014-6507/" source="CVE"/>
		<reference ref_id="CVE-2014-6520" ref_url="https://www.suse.com/security/cve/CVE-2014-6520/" source="CVE"/>
		<reference ref_id="CVE-2014-6530" ref_url="https://www.suse.com/security/cve/CVE-2014-6530/" source="CVE"/>
		<reference ref_id="CVE-2014-6551" ref_url="https://www.suse.com/security/cve/CVE-2014-6551/" source="CVE"/>
		<reference ref_id="CVE-2014-6555" ref_url="https://www.suse.com/security/cve/CVE-2014-6555/" source="CVE"/>
		<reference ref_id="CVE-2014-6559" ref_url="https://www.suse.com/security/cve/CVE-2014-6559/" source="CVE"/>
		<reference ref_id="CVE-2014-6564" ref_url="https://www.suse.com/security/cve/CVE-2014-6564/" source="CVE"/>
		<reference ref_id="CVE-2014-6568" ref_url="https://www.suse.com/security/cve/CVE-2014-6568/" source="CVE"/>
		<reference ref_id="CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964/" source="CVE"/>
		<reference ref_id="CVE-2015-0374" ref_url="https://www.suse.com/security/cve/CVE-2015-0374/" source="CVE"/>
		<reference ref_id="CVE-2015-0381" ref_url="https://www.suse.com/security/cve/CVE-2015-0381/" source="CVE"/>
		<reference ref_id="CVE-2015-0382" ref_url="https://www.suse.com/security/cve/CVE-2015-0382/" source="CVE"/>
		<reference ref_id="CVE-2015-0391" ref_url="https://www.suse.com/security/cve/CVE-2015-0391/" source="CVE"/>
		<reference ref_id="CVE-2015-0411" ref_url="https://www.suse.com/security/cve/CVE-2015-0411/" source="CVE"/>
		<reference ref_id="CVE-2015-0432" ref_url="https://www.suse.com/security/cve/CVE-2015-0432/" source="CVE"/>
		<reference ref_id="CVE-2015-0433" ref_url="https://www.suse.com/security/cve/CVE-2015-0433/" source="CVE"/>
		<reference ref_id="CVE-2015-0441" ref_url="https://www.suse.com/security/cve/CVE-2015-0441/" source="CVE"/>
		<reference ref_id="CVE-2015-0499" ref_url="https://www.suse.com/security/cve/CVE-2015-0499/" source="CVE"/>
		<reference ref_id="CVE-2015-0501" ref_url="https://www.suse.com/security/cve/CVE-2015-0501/" source="CVE"/>
		<reference ref_id="CVE-2015-0505" ref_url="https://www.suse.com/security/cve/CVE-2015-0505/" source="CVE"/>
		<reference ref_id="CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325/" source="CVE"/>
		<reference ref_id="CVE-2015-2326" ref_url="https://www.suse.com/security/cve/CVE-2015-2326/" source="CVE"/>
		<reference ref_id="CVE-2015-2568" ref_url="https://www.suse.com/security/cve/CVE-2015-2568/" source="CVE"/>
		<reference ref_id="CVE-2015-2571" ref_url="https://www.suse.com/security/cve/CVE-2015-2571/" source="CVE"/>
		<reference ref_id="CVE-2015-2573" ref_url="https://www.suse.com/security/cve/CVE-2015-2573/" source="CVE"/>
		<reference ref_id="CVE-2015-3152" ref_url="https://www.suse.com/security/cve/CVE-2015-3152/" source="CVE"/>
		<reference ref_id="CVE-2015-4792" ref_url="https://www.suse.com/security/cve/CVE-2015-4792/" source="CVE"/>
		<reference ref_id="CVE-2015-4802" ref_url="https://www.suse.com/security/cve/CVE-2015-4802/" source="CVE"/>
		<reference ref_id="CVE-2015-4807" ref_url="https://www.suse.com/security/cve/CVE-2015-4807/" source="CVE"/>
		<reference ref_id="CVE-2015-4815" ref_url="https://www.suse.com/security/cve/CVE-2015-4815/" source="CVE"/>
		<reference ref_id="CVE-2015-4826" ref_url="https://www.suse.com/security/cve/CVE-2015-4826/" source="CVE"/>
		<reference ref_id="CVE-2015-4830" ref_url="https://www.suse.com/security/cve/CVE-2015-4830/" source="CVE"/>
		<reference ref_id="CVE-2015-4836" ref_url="https://www.suse.com/security/cve/CVE-2015-4836/" source="CVE"/>
		<reference ref_id="CVE-2015-4858" ref_url="https://www.suse.com/security/cve/CVE-2015-4858/" source="CVE"/>
		<reference ref_id="CVE-2015-4861" ref_url="https://www.suse.com/security/cve/CVE-2015-4861/" source="CVE"/>
		<reference ref_id="CVE-2015-4870" ref_url="https://www.suse.com/security/cve/CVE-2015-4870/" source="CVE"/>
		<reference ref_id="CVE-2015-4913" ref_url="https://www.suse.com/security/cve/CVE-2015-4913/" source="CVE"/>
		<reference ref_id="CVE-2015-5969" ref_url="https://www.suse.com/security/cve/CVE-2015-5969/" source="CVE"/>
		<reference ref_id="CVE-2016-0505" ref_url="https://www.suse.com/security/cve/CVE-2016-0505/" source="CVE"/>
		<reference ref_id="CVE-2016-0546" ref_url="https://www.suse.com/security/cve/CVE-2016-0546/" source="CVE"/>
		<reference ref_id="CVE-2016-0596" ref_url="https://www.suse.com/security/cve/CVE-2016-0596/" source="CVE"/>
		<reference ref_id="CVE-2016-0597" ref_url="https://www.suse.com/security/cve/CVE-2016-0597/" source="CVE"/>
		<reference ref_id="CVE-2016-0598" ref_url="https://www.suse.com/security/cve/CVE-2016-0598/" source="CVE"/>
		<reference ref_id="CVE-2016-0600" ref_url="https://www.suse.com/security/cve/CVE-2016-0600/" source="CVE"/>
		<reference ref_id="CVE-2016-0606" ref_url="https://www.suse.com/security/cve/CVE-2016-0606/" source="CVE"/>
		<reference ref_id="CVE-2016-0608" ref_url="https://www.suse.com/security/cve/CVE-2016-0608/" source="CVE"/>
		<reference ref_id="CVE-2016-0609" ref_url="https://www.suse.com/security/cve/CVE-2016-0609/" source="CVE"/>
		<reference ref_id="CVE-2016-0616" ref_url="https://www.suse.com/security/cve/CVE-2016-0616/" source="CVE"/>
		<reference ref_id="CVE-2016-0640" ref_url="https://www.suse.com/security/cve/CVE-2016-0640/" source="CVE"/>
		<reference ref_id="CVE-2016-0641" ref_url="https://www.suse.com/security/cve/CVE-2016-0641/" source="CVE"/>
		<reference ref_id="CVE-2016-0642" ref_url="https://www.suse.com/security/cve/CVE-2016-0642/" source="CVE"/>
		<reference ref_id="CVE-2016-0643" ref_url="https://www.suse.com/security/cve/CVE-2016-0643/" source="CVE"/>
		<reference ref_id="CVE-2016-0644" ref_url="https://www.suse.com/security/cve/CVE-2016-0644/" source="CVE"/>
		<reference ref_id="CVE-2016-0646" ref_url="https://www.suse.com/security/cve/CVE-2016-0646/" source="CVE"/>
		<reference ref_id="CVE-2016-0647" ref_url="https://www.suse.com/security/cve/CVE-2016-0647/" source="CVE"/>
		<reference ref_id="CVE-2016-0648" ref_url="https://www.suse.com/security/cve/CVE-2016-0648/" source="CVE"/>
		<reference ref_id="CVE-2016-0649" ref_url="https://www.suse.com/security/cve/CVE-2016-0649/" source="CVE"/>
		<reference ref_id="CVE-2016-0650" ref_url="https://www.suse.com/security/cve/CVE-2016-0650/" source="CVE"/>
		<reference ref_id="CVE-2016-0651" ref_url="https://www.suse.com/security/cve/CVE-2016-0651/" source="CVE"/>
		<reference ref_id="CVE-2016-0655" ref_url="https://www.suse.com/security/cve/CVE-2016-0655/" source="CVE"/>
		<reference ref_id="CVE-2016-0666" ref_url="https://www.suse.com/security/cve/CVE-2016-0666/" source="CVE"/>
		<reference ref_id="CVE-2016-0668" ref_url="https://www.suse.com/security/cve/CVE-2016-0668/" source="CVE"/>
		<reference ref_id="CVE-2016-2047" ref_url="https://www.suse.com/security/cve/CVE-2016-2047/" source="CVE"/>
		<reference ref_id="CVE-2016-3477" ref_url="https://www.suse.com/security/cve/CVE-2016-3477/" source="CVE"/>
		<reference ref_id="CVE-2016-3492" ref_url="https://www.suse.com/security/cve/CVE-2016-3492/" source="CVE"/>
		<reference ref_id="CVE-2016-3521" ref_url="https://www.suse.com/security/cve/CVE-2016-3521/" source="CVE"/>
		<reference ref_id="CVE-2016-3615" ref_url="https://www.suse.com/security/cve/CVE-2016-3615/" source="CVE"/>
		<reference ref_id="CVE-2016-5440" ref_url="https://www.suse.com/security/cve/CVE-2016-5440/" source="CVE"/>
		<reference ref_id="CVE-2016-5584" ref_url="https://www.suse.com/security/cve/CVE-2016-5584/" source="CVE"/>
		<reference ref_id="CVE-2016-5624" ref_url="https://www.suse.com/security/cve/CVE-2016-5624/" source="CVE"/>
		<reference ref_id="CVE-2016-5626" ref_url="https://www.suse.com/security/cve/CVE-2016-5626/" source="CVE"/>
		<reference ref_id="CVE-2016-5629" ref_url="https://www.suse.com/security/cve/CVE-2016-5629/" source="CVE"/>
		<reference ref_id="CVE-2016-6662" ref_url="https://www.suse.com/security/cve/CVE-2016-6662/" source="CVE"/>
		<reference ref_id="CVE-2016-6663" ref_url="https://www.suse.com/security/cve/CVE-2016-6663/" source="CVE"/>
		<reference ref_id="CVE-2016-6664" ref_url="https://www.suse.com/security/cve/CVE-2016-6664/" source="CVE"/>
		<reference ref_id="CVE-2016-7440" ref_url="https://www.suse.com/security/cve/CVE-2016-7440/" source="CVE"/>
		<reference ref_id="CVE-2016-8283" ref_url="https://www.suse.com/security/cve/CVE-2016-8283/" source="CVE"/>
		<reference ref_id="CVE-2017-3238" ref_url="https://www.suse.com/security/cve/CVE-2017-3238/" source="CVE"/>
		<reference ref_id="CVE-2017-3243" ref_url="https://www.suse.com/security/cve/CVE-2017-3243/" source="CVE"/>
		<reference ref_id="CVE-2017-3244" ref_url="https://www.suse.com/security/cve/CVE-2017-3244/" source="CVE"/>
		<reference ref_id="CVE-2017-3257" ref_url="https://www.suse.com/security/cve/CVE-2017-3257/" source="CVE"/>
		<reference ref_id="CVE-2017-3258" ref_url="https://www.suse.com/security/cve/CVE-2017-3258/" source="CVE"/>
		<reference ref_id="CVE-2017-3265" ref_url="https://www.suse.com/security/cve/CVE-2017-3265/" source="CVE"/>
		<reference ref_id="CVE-2017-3291" ref_url="https://www.suse.com/security/cve/CVE-2017-3291/" source="CVE"/>
		<reference ref_id="CVE-2017-3302" ref_url="https://www.suse.com/security/cve/CVE-2017-3302/" source="CVE"/>
		<reference ref_id="CVE-2017-3312" ref_url="https://www.suse.com/security/cve/CVE-2017-3312/" source="CVE"/>
		<reference ref_id="CVE-2017-3313" ref_url="https://www.suse.com/security/cve/CVE-2017-3313/" source="CVE"/>
		<reference ref_id="CVE-2017-3317" ref_url="https://www.suse.com/security/cve/CVE-2017-3317/" source="CVE"/>
		<reference ref_id="CVE-2017-3318" ref_url="https://www.suse.com/security/cve/CVE-2017-3318/" source="CVE"/>
		<description>
These are all security issues fixed in the libmysqlclient18-10.0.30-28.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5970/">CVE-2007-5970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-7247/">CVE-2008-7247</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4019/">CVE-2009-4019</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4028/">CVE-2009-4028</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4030/">CVE-2009-4030</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5298/">CVE-2010-5298</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5615/">CVE-2012-5615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1976/">CVE-2013-1976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0195/">CVE-2014-0195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0198/">CVE-2014-0198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2494/">CVE-2014-2494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4207/">CVE-2014-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4258/">CVE-2014-4258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4260/">CVE-2014-4260</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4274/">CVE-2014-4274</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4287/">CVE-2014-4287</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6463/">CVE-2014-6463</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6464/">CVE-2014-6464</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6469/">CVE-2014-6469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6474/">CVE-2014-6474</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6478/">CVE-2014-6478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6484/">CVE-2014-6484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6489/">CVE-2014-6489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6491/">CVE-2014-6491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6494/">CVE-2014-6494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6495/">CVE-2014-6495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6496/">CVE-2014-6496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6500/">CVE-2014-6500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6505/">CVE-2014-6505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6507/">CVE-2014-6507</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6520/">CVE-2014-6520</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6530/">CVE-2014-6530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6551/">CVE-2014-6551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6555/">CVE-2014-6555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6559/">CVE-2014-6559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6564/">CVE-2014-6564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6568/">CVE-2014-6568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0374/">CVE-2015-0374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0381/">CVE-2015-0381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0382/">CVE-2015-0382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0391/">CVE-2015-0391</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0411/">CVE-2015-0411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0432/">CVE-2015-0432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0433/">CVE-2015-0433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0441/">CVE-2015-0441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0499/">CVE-2015-0499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0501/">CVE-2015-0501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0505/">CVE-2015-0505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2326/">CVE-2015-2326</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2568/">CVE-2015-2568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2571/">CVE-2015-2571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2573/">CVE-2015-2573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3152/">CVE-2015-3152</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4792/">CVE-2015-4792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4802/">CVE-2015-4802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4807/">CVE-2015-4807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4815/">CVE-2015-4815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4826/">CVE-2015-4826</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4830/">CVE-2015-4830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4836/">CVE-2015-4836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4858/">CVE-2015-4858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4861/">CVE-2015-4861</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4870/">CVE-2015-4870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4913/">CVE-2015-4913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5969/">CVE-2015-5969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0505/">CVE-2016-0505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0546/">CVE-2016-0546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0596/">CVE-2016-0596</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0597/">CVE-2016-0597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0598/">CVE-2016-0598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0600/">CVE-2016-0600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0606/">CVE-2016-0606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0608/">CVE-2016-0608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0609/">CVE-2016-0609</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0616/">CVE-2016-0616</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0640/">CVE-2016-0640</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0641/">CVE-2016-0641</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0642/">CVE-2016-0642</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0643/">CVE-2016-0643</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0644/">CVE-2016-0644</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0646/">CVE-2016-0646</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0647/">CVE-2016-0647</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0648/">CVE-2016-0648</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0649/">CVE-2016-0649</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0650/">CVE-2016-0650</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0651/">CVE-2016-0651</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0655/">CVE-2016-0655</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0666/">CVE-2016-0666</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0668/">CVE-2016-0668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2047/">CVE-2016-2047</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3477/">CVE-2016-3477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3492/">CVE-2016-3492</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3521/">CVE-2016-3521</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3615/">CVE-2016-3615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5440/">CVE-2016-5440</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5584/">CVE-2016-5584</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5624/">CVE-2016-5624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5626/">CVE-2016-5626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5629/">CVE-2016-5629</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6662/">CVE-2016-6662</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6663/">CVE-2016-6663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6664/">CVE-2016-6664</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7440/">CVE-2016-7440</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8283/">CVE-2016-8283</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3238/">CVE-2017-3238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3243/">CVE-2017-3243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3244/">CVE-2017-3244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3257/">CVE-2017-3257</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3258/">CVE-2017-3258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3265/">CVE-2017-3265</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3291/">CVE-2017-3291</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3302/">CVE-2017-3302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3312/">CVE-2017-3312</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3313/">CVE-2017-3313</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3317/">CVE-2017-3317</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3318/">CVE-2017-3318</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159650" comment="libmysqlclient_r18-10.0.30-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159651" comment="libmysqlclient_r18-32bit-10.0.30-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76652" version="1" class="patch">
	<metadata>
		<title>libndp0-1.6-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-3698" ref_url="https://www.suse.com/security/cve/CVE-2016-3698/" source="CVE"/>
		<description>
These are all security issues fixed in the libndp0-1.6-2.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3698/">CVE-2016-3698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142139" comment="libndp0-1.6-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76653" version="1" class="patch">
	<metadata>
		<title>libneon27-0.30.0-3.65 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-2473" ref_url="https://www.suse.com/security/cve/CVE-2009-2473/" source="CVE"/>
		<reference ref_id="CVE-2009-2474" ref_url="https://www.suse.com/security/cve/CVE-2009-2474/" source="CVE"/>
		<description>
These are all security issues fixed in the libneon27-0.30.0-3.65 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2473/">CVE-2009-2473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2474/">CVE-2009-2474</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140887" comment="libneon27-0.30.0-3.65 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76654" version="1" class="patch">
	<metadata>
		<title>libnetpbm11-10.66.3-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="CVE-2017-2581" ref_url="https://www.suse.com/security/cve/CVE-2017-2581/" source="CVE"/>
		<reference ref_id="CVE-2017-2586" ref_url="https://www.suse.com/security/cve/CVE-2017-2586/" source="CVE"/>
		<reference ref_id="CVE-2017-2587" ref_url="https://www.suse.com/security/cve/CVE-2017-2587/" source="CVE"/>
		<description>
These are all security issues fixed in the libnetpbm11-10.66.3-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2581/">CVE-2017-2581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2586/">CVE-2017-2586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2587/">CVE-2017-2587</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009139268" comment="libnetpbm11-10.66.3-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156953" comment="libnetpbm11-32bit-10.66.3-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009139269" comment="netpbm-10.66.3-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76655" version="1" class="patch">
	<metadata>
		<title>libnewt0_52-0.52.16-1.83 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-2905" ref_url="https://www.suse.com/security/cve/CVE-2009-2905/" source="CVE"/>
		<description>
These are all security issues fixed in the libnewt0_52-0.52.16-1.83 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2905/">CVE-2009-2905</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142140" comment="libnewt0_52-0.52.16-1.83 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76656" version="1" class="patch">
	<metadata>
		<title>libopenjp2-7-2.1.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-7445" ref_url="https://www.suse.com/security/cve/CVE-2016-7445/" source="CVE"/>
		<reference ref_id="CVE-2016-8332" ref_url="https://www.suse.com/security/cve/CVE-2016-8332/" source="CVE"/>
		<reference ref_id="CVE-2016-9112" ref_url="https://www.suse.com/security/cve/CVE-2016-9112/" source="CVE"/>
		<reference ref_id="CVE-2016-9113" ref_url="https://www.suse.com/security/cve/CVE-2016-9113/" source="CVE"/>
		<reference ref_id="CVE-2016-9114" ref_url="https://www.suse.com/security/cve/CVE-2016-9114/" source="CVE"/>
		<reference ref_id="CVE-2016-9115" ref_url="https://www.suse.com/security/cve/CVE-2016-9115/" source="CVE"/>
		<reference ref_id="CVE-2016-9116" ref_url="https://www.suse.com/security/cve/CVE-2016-9116/" source="CVE"/>
		<reference ref_id="CVE-2016-9117" ref_url="https://www.suse.com/security/cve/CVE-2016-9117/" source="CVE"/>
		<reference ref_id="CVE-2016-9118" ref_url="https://www.suse.com/security/cve/CVE-2016-9118/" source="CVE"/>
		<reference ref_id="CVE-2016-9572" ref_url="https://www.suse.com/security/cve/CVE-2016-9572/" source="CVE"/>
		<reference ref_id="CVE-2016-9573" ref_url="https://www.suse.com/security/cve/CVE-2016-9573/" source="CVE"/>
		<reference ref_id="CVE-2016-9580" ref_url="https://www.suse.com/security/cve/CVE-2016-9580/" source="CVE"/>
		<reference ref_id="CVE-2016-9581" ref_url="https://www.suse.com/security/cve/CVE-2016-9581/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenjp2-7-2.1.0-3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7445/">CVE-2016-7445</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-8332/">CVE-2016-8332</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9112/">CVE-2016-9112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9113/">CVE-2016-9113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9114/">CVE-2016-9114</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9115/">CVE-2016-9115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9116/">CVE-2016-9116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9117/">CVE-2016-9117</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9118/">CVE-2016-9118</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9572/">CVE-2016-9572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9573/">CVE-2016-9573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9580/">CVE-2016-9580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9581/">CVE-2016-9581</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145907" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76657" version="1" class="patch">
	<metadata>
		<title>libopenssl-devel-1.0.2j-59.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-7250" ref_url="https://www.suse.com/security/cve/CVE-2006-7250/" source="CVE"/>
		<reference ref_id="CVE-2008-5077" ref_url="https://www.suse.com/security/cve/CVE-2008-5077/" source="CVE"/>
		<reference ref_id="CVE-2009-0590" ref_url="https://www.suse.com/security/cve/CVE-2009-0590/" source="CVE"/>
		<reference ref_id="CVE-2009-0591" ref_url="https://www.suse.com/security/cve/CVE-2009-0591/" source="CVE"/>
		<reference ref_id="CVE-2009-0789" ref_url="https://www.suse.com/security/cve/CVE-2009-0789/" source="CVE"/>
		<reference ref_id="CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377/" source="CVE"/>
		<reference ref_id="CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378/" source="CVE"/>
		<reference ref_id="CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379/" source="CVE"/>
		<reference ref_id="CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386/" source="CVE"/>
		<reference ref_id="CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387/" source="CVE"/>
		<reference ref_id="CVE-2010-0740" ref_url="https://www.suse.com/security/cve/CVE-2010-0740/" source="CVE"/>
		<reference ref_id="CVE-2010-0742" ref_url="https://www.suse.com/security/cve/CVE-2010-0742/" source="CVE"/>
		<reference ref_id="CVE-2010-1633" ref_url="https://www.suse.com/security/cve/CVE-2010-1633/" source="CVE"/>
		<reference ref_id="CVE-2010-2939" ref_url="https://www.suse.com/security/cve/CVE-2010-2939/" source="CVE"/>
		<reference ref_id="CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864/" source="CVE"/>
		<reference ref_id="CVE-2010-5298" ref_url="https://www.suse.com/security/cve/CVE-2010-5298/" source="CVE"/>
		<reference ref_id="CVE-2011-0014" ref_url="https://www.suse.com/security/cve/CVE-2011-0014/" source="CVE"/>
		<reference ref_id="CVE-2011-3207" ref_url="https://www.suse.com/security/cve/CVE-2011-3207/" source="CVE"/>
		<reference ref_id="CVE-2011-3210" ref_url="https://www.suse.com/security/cve/CVE-2011-3210/" source="CVE"/>
		<reference ref_id="CVE-2011-4108" ref_url="https://www.suse.com/security/cve/CVE-2011-4108/" source="CVE"/>
		<reference ref_id="CVE-2011-4576" ref_url="https://www.suse.com/security/cve/CVE-2011-4576/" source="CVE"/>
		<reference ref_id="CVE-2011-4577" ref_url="https://www.suse.com/security/cve/CVE-2011-4577/" source="CVE"/>
		<reference ref_id="CVE-2011-4619" ref_url="https://www.suse.com/security/cve/CVE-2011-4619/" source="CVE"/>
		<reference ref_id="CVE-2012-0027" ref_url="https://www.suse.com/security/cve/CVE-2012-0027/" source="CVE"/>
		<reference ref_id="CVE-2012-0050" ref_url="https://www.suse.com/security/cve/CVE-2012-0050/" source="CVE"/>
		<reference ref_id="CVE-2012-0884" ref_url="https://www.suse.com/security/cve/CVE-2012-0884/" source="CVE"/>
		<reference ref_id="CVE-2012-1165" ref_url="https://www.suse.com/security/cve/CVE-2012-1165/" source="CVE"/>
		<reference ref_id="CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110/" source="CVE"/>
		<reference ref_id="CVE-2012-2686" ref_url="https://www.suse.com/security/cve/CVE-2012-2686/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2013-4353" ref_url="https://www.suse.com/security/cve/CVE-2013-4353/" source="CVE"/>
		<reference ref_id="CVE-2013-6449" ref_url="https://www.suse.com/security/cve/CVE-2013-6449/" source="CVE"/>
		<reference ref_id="CVE-2013-6450" ref_url="https://www.suse.com/security/cve/CVE-2013-6450/" source="CVE"/>
		<reference ref_id="CVE-2014-0076" ref_url="https://www.suse.com/security/cve/CVE-2014-0076/" source="CVE"/>
		<reference ref_id="CVE-2014-0160" ref_url="https://www.suse.com/security/cve/CVE-2014-0160/" source="CVE"/>
		<reference ref_id="CVE-2014-0195" ref_url="https://www.suse.com/security/cve/CVE-2014-0195/" source="CVE"/>
		<reference ref_id="CVE-2014-0198" ref_url="https://www.suse.com/security/cve/CVE-2014-0198/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-3505" ref_url="https://www.suse.com/security/cve/CVE-2014-3505/" source="CVE"/>
		<reference ref_id="CVE-2014-3506" ref_url="https://www.suse.com/security/cve/CVE-2014-3506/" source="CVE"/>
		<reference ref_id="CVE-2014-3507" ref_url="https://www.suse.com/security/cve/CVE-2014-3507/" source="CVE"/>
		<reference ref_id="CVE-2014-3508" ref_url="https://www.suse.com/security/cve/CVE-2014-3508/" source="CVE"/>
		<reference ref_id="CVE-2014-3509" ref_url="https://www.suse.com/security/cve/CVE-2014-3509/" source="CVE"/>
		<reference ref_id="CVE-2014-3510" ref_url="https://www.suse.com/security/cve/CVE-2014-3510/" source="CVE"/>
		<reference ref_id="CVE-2014-3511" ref_url="https://www.suse.com/security/cve/CVE-2014-3511/" source="CVE"/>
		<reference ref_id="CVE-2014-3512" ref_url="https://www.suse.com/security/cve/CVE-2014-3512/" source="CVE"/>
		<reference ref_id="CVE-2014-3513" ref_url="https://www.suse.com/security/cve/CVE-2014-3513/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-5139" ref_url="https://www.suse.com/security/cve/CVE-2014-5139/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0206" ref_url="https://www.suse.com/security/cve/CVE-2015-0206/" source="CVE"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791/" source="CVE"/>
		<reference ref_id="CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792/" source="CVE"/>
		<reference ref_id="CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194/" source="CVE"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="CVE-2015-3196" ref_url="https://www.suse.com/security/cve/CVE-2015-3196/" source="CVE"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2015-3216" ref_url="https://www.suse.com/security/cve/CVE-2015-3216/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0798" ref_url="https://www.suse.com/security/cve/CVE-2016-0798/" source="CVE"/>
		<reference ref_id="CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2107" ref_url="https://www.suse.com/security/cve/CVE-2016-2107/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="CVE-2016-2176" ref_url="https://www.suse.com/security/cve/CVE-2016-2176/" source="CVE"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2180" ref_url="https://www.suse.com/security/cve/CVE-2016-2180/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="CVE-2016-7052" ref_url="https://www.suse.com/security/cve/CVE-2016-7052/" source="CVE"/>
		<reference ref_id="CVE-2016-7055" ref_url="https://www.suse.com/security/cve/CVE-2016-7055/" source="CVE"/>
		<reference ref_id="CVE-2017-3731" ref_url="https://www.suse.com/security/cve/CVE-2017-3731/" source="CVE"/>
		<reference ref_id="CVE-2017-3732" ref_url="https://www.suse.com/security/cve/CVE-2017-3732/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-devel-1.0.2j-59.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7250/">CVE-2006-7250</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5077/">CVE-2008-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0590/">CVE-2009-0590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0591/">CVE-2009-0591</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0789/">CVE-2009-0789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0740/">CVE-2010-0740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0742/">CVE-2010-0742</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-1633/">CVE-2010-1633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2939/">CVE-2010-2939</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5298/">CVE-2010-5298</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0014/">CVE-2011-0014</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3207/">CVE-2011-3207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3210/">CVE-2011-3210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4108/">CVE-2011-4108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4576/">CVE-2011-4576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4577/">CVE-2011-4577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4619/">CVE-2011-4619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0027/">CVE-2012-0027</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0050/">CVE-2012-0050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0884/">CVE-2012-0884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1165/">CVE-2012-1165</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2686/">CVE-2012-2686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4353/">CVE-2013-4353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6449/">CVE-2013-6449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6450/">CVE-2013-6450</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0076/">CVE-2014-0076</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0160/">CVE-2014-0160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0195/">CVE-2014-0195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0198/">CVE-2014-0198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3505/">CVE-2014-3505</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3506/">CVE-2014-3506</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3507/">CVE-2014-3507</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3508/">CVE-2014-3508</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3509/">CVE-2014-3509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3510/">CVE-2014-3510</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3511/">CVE-2014-3511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3512/">CVE-2014-3512</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-3513/">CVE-2014-3513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-5139/">CVE-2014-5139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0206/">CVE-2015-0206</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3196/">CVE-2015-3196</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3216/">CVE-2015-3216</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0798/">CVE-2016-0798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2107/">CVE-2016-2107</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2176/">CVE-2016-2176</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2180/">CVE-2016-2180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7052/">CVE-2016-7052</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7055/">CVE-2016-7055</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3731/">CVE-2017-3731</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3732/">CVE-2017-3732</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76658" version="1" class="patch">
	<metadata>
		<title>libopenssl0_9_8-0.9.8j-105.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-7250" ref_url="https://www.suse.com/security/cve/CVE-2006-7250/" source="CVE"/>
		<reference ref_id="CVE-2009-0590" ref_url="https://www.suse.com/security/cve/CVE-2009-0590/" source="CVE"/>
		<reference ref_id="CVE-2009-0591" ref_url="https://www.suse.com/security/cve/CVE-2009-0591/" source="CVE"/>
		<reference ref_id="CVE-2009-0789" ref_url="https://www.suse.com/security/cve/CVE-2009-0789/" source="CVE"/>
		<reference ref_id="CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377/" source="CVE"/>
		<reference ref_id="CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378/" source="CVE"/>
		<reference ref_id="CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379/" source="CVE"/>
		<reference ref_id="CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386/" source="CVE"/>
		<reference ref_id="CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387/" source="CVE"/>
		<reference ref_id="CVE-2009-3245" ref_url="https://www.suse.com/security/cve/CVE-2009-3245/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-4355" ref_url="https://www.suse.com/security/cve/CVE-2009-4355/" source="CVE"/>
		<reference ref_id="CVE-2009-5146" ref_url="https://www.suse.com/security/cve/CVE-2009-5146/" source="CVE"/>
		<reference ref_id="CVE-2010-0740" ref_url="https://www.suse.com/security/cve/CVE-2010-0740/" source="CVE"/>
		<reference ref_id="CVE-2010-2939" ref_url="https://www.suse.com/security/cve/CVE-2010-2939/" source="CVE"/>
		<reference ref_id="CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864/" source="CVE"/>
		<reference ref_id="CVE-2010-4180" ref_url="https://www.suse.com/security/cve/CVE-2010-4180/" source="CVE"/>
		<reference ref_id="CVE-2010-4252" ref_url="https://www.suse.com/security/cve/CVE-2010-4252/" source="CVE"/>
		<reference ref_id="CVE-2011-0014" ref_url="https://www.suse.com/security/cve/CVE-2011-0014/" source="CVE"/>
		<reference ref_id="CVE-2011-3210" ref_url="https://www.suse.com/security/cve/CVE-2011-3210/" source="CVE"/>
		<reference ref_id="CVE-2011-4108" ref_url="https://www.suse.com/security/cve/CVE-2011-4108/" source="CVE"/>
		<reference ref_id="CVE-2011-4109" ref_url="https://www.suse.com/security/cve/CVE-2011-4109/" source="CVE"/>
		<reference ref_id="CVE-2011-4354" ref_url="https://www.suse.com/security/cve/CVE-2011-4354/" source="CVE"/>
		<reference ref_id="CVE-2011-4576" ref_url="https://www.suse.com/security/cve/CVE-2011-4576/" source="CVE"/>
		<reference ref_id="CVE-2011-4577" ref_url="https://www.suse.com/security/cve/CVE-2011-4577/" source="CVE"/>
		<reference ref_id="CVE-2011-4619" ref_url="https://www.suse.com/security/cve/CVE-2011-4619/" source="CVE"/>
		<reference ref_id="CVE-2011-5095" ref_url="https://www.suse.com/security/cve/CVE-2011-5095/" source="CVE"/>
		<reference ref_id="CVE-2012-0050" ref_url="https://www.suse.com/security/cve/CVE-2012-0050/" source="CVE"/>
		<reference ref_id="CVE-2012-0884" ref_url="https://www.suse.com/security/cve/CVE-2012-0884/" source="CVE"/>
		<reference ref_id="CVE-2012-1165" ref_url="https://www.suse.com/security/cve/CVE-2012-1165/" source="CVE"/>
		<reference ref_id="CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110/" source="CVE"/>
		<reference ref_id="CVE-2012-2131" ref_url="https://www.suse.com/security/cve/CVE-2012-2131/" source="CVE"/>
		<reference ref_id="CVE-2012-2333" ref_url="https://www.suse.com/security/cve/CVE-2012-2333/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2014-0076" ref_url="https://www.suse.com/security/cve/CVE-2014-0076/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-3505" ref_url="https://www.suse.com/security/cve/CVE-2014-3505/" source="CVE"/>
		<reference ref_id="CVE-2014-3506" ref_url="https://www.suse.com/security/cve/CVE-2014-3506/" source="CVE"/>
		<reference ref_id="CVE-2014-3507" ref_url="https://www.suse.com/security/cve/CVE-2014-3507/" source="CVE"/>
		<reference ref_id="CVE-2014-3508" ref_url="https://www.suse.com/security/cve/CVE-2014-3508/" source="CVE"/>
		<reference ref_id="CVE-2014-3510" ref_url="https://www.suse.com/security/cve/CVE-2014-3510/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0292" ref_url="https://www.suse.com/security/cve/CVE-2015-0292/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791/" source="CVE"/>
		<reference ref_id="CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792/" source="CVE"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2015-3216" ref_url="https://www.suse.com/security/cve/CVE-2015-3216/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056/" source="CVE"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl0_9_8-0.9.8j-105.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7250/">CVE-2006-7250</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0590/">CVE-2009-0590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0591/">CVE-2009-0591</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0789/">CVE-2009-0789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3245/">CVE-2009-3245</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4355/">CVE-2009-4355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5146/">CVE-2009-5146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0740/">CVE-2010-0740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2939/">CVE-2010-2939</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4180/">CVE-2010-4180</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4252/">CVE-2010-4252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0014/">CVE-2011-0014</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3210/">CVE-2011-3210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4108/">CVE-2011-4108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4109/">CVE-2011-4109</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4354/">CVE-2011-4354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4576/">CVE-2011-4576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4577/">CVE-2011-4577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4619/">CVE-2011-4619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5095/">CVE-2011-5095</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0050/">CVE-2012-0050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0884/">CVE-2012-0884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1165/">CVE-2012-1165</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2131/">CVE-2012-2131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2333/">CVE-2012-2333</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0076/">CVE-2014-0076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3505/">CVE-2014-3505</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3506/">CVE-2014-3506</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3507/">CVE-2014-3507</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3508/">CVE-2014-3508</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3510/">CVE-2014-3510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0292/">CVE-2015-0292</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3216/">CVE-2015-3216</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009149123" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009149124" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76659" version="1" class="patch">
	<metadata>
		<title>libopus0-1.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2017-0381" ref_url="https://www.suse.com/security/cve/CVE-2017-0381/" source="CVE"/>
		<description>
These are all security issues fixed in the libopus0-1.1-3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-0381/">CVE-2017-0381</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009148261" comment="libopus0-1.1-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76660" version="1" class="patch">
	<metadata>
		<title>libosip2-3.5.0-20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-10324" ref_url="https://www.suse.com/security/cve/CVE-2016-10324/" source="CVE"/>
		<reference ref_id="CVE-2016-10325" ref_url="https://www.suse.com/security/cve/CVE-2016-10325/" source="CVE"/>
		<reference ref_id="CVE-2016-10326" ref_url="https://www.suse.com/security/cve/CVE-2016-10326/" source="CVE"/>
		<reference ref_id="CVE-2017-7853" ref_url="https://www.suse.com/security/cve/CVE-2017-7853/" source="CVE"/>
		<description>
These are all security issues fixed in the libosip2-3.5.0-20.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10324/">CVE-2016-10324</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10325/">CVE-2016-10325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10326/">CVE-2016-10326</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7853/">CVE-2017-7853</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155050" comment="libosip2-3.5.0-20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76661" version="1" class="patch">
	<metadata>
		<title>libotr5-4.0.0-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-2851" ref_url="https://www.suse.com/security/cve/CVE-2016-2851/" source="CVE"/>
		<description>
These are all security issues fixed in the libotr5-4.0.0-9.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2851/">CVE-2016-2851</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124478" comment="libotr5-4.0.0-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76662" version="1" class="patch">
	<metadata>
		<title>libpango-1_0-0-1.40.1-9.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-0020" ref_url="https://www.suse.com/security/cve/CVE-2011-0020/" source="CVE"/>
		<reference ref_id="CVE-2011-0064" ref_url="https://www.suse.com/security/cve/CVE-2011-0064/" source="CVE"/>
		<description>
These are all security issues fixed in the libpango-1_0-0-1.40.1-9.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0020/">CVE-2011-0020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0064/">CVE-2011-0064</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140897" comment="libpango-1_0-0-1.40.1-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140898" comment="libpango-1_0-0-32bit-1.40.1-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140899" comment="typelib-1_0-Pango-1_0-1.40.1-9.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76663" version="1" class="patch">
	<metadata>
		<title>libpcre1-32bit-8.39-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964/" source="CVE"/>
		<reference ref_id="CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325/" source="CVE"/>
		<reference ref_id="CVE-2015-2327" ref_url="https://www.suse.com/security/cve/CVE-2015-2327/" source="CVE"/>
		<reference ref_id="CVE-2015-2328" ref_url="https://www.suse.com/security/cve/CVE-2015-2328/" source="CVE"/>
		<reference ref_id="CVE-2015-3210" ref_url="https://www.suse.com/security/cve/CVE-2015-3210/" source="CVE"/>
		<reference ref_id="CVE-2015-3217" ref_url="https://www.suse.com/security/cve/CVE-2015-3217/" source="CVE"/>
		<reference ref_id="CVE-2015-5073" ref_url="https://www.suse.com/security/cve/CVE-2015-5073/" source="CVE"/>
		<reference ref_id="CVE-2015-8380" ref_url="https://www.suse.com/security/cve/CVE-2015-8380/" source="CVE"/>
		<reference ref_id="CVE-2016-1283" ref_url="https://www.suse.com/security/cve/CVE-2016-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-3191" ref_url="https://www.suse.com/security/cve/CVE-2016-3191/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcre1-32bit-8.39-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2327/">CVE-2015-2327</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2328/">CVE-2015-2328</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3210/">CVE-2015-3210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3217/">CVE-2015-3217</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5073/">CVE-2015-5073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8380/">CVE-2015-8380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1283/">CVE-2016-1283</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3191/">CVE-2016-3191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143034" comment="libpcre1-8.39-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143035" comment="libpcre1-32bit-8.39-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143036" comment="libpcre16-0-8.39-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143037" comment="libpcrecpp0-8.39-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143038" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76664" version="1" class="patch">
	<metadata>
		<title>libpcsclite1-1.8.10-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-0407" ref_url="https://www.suse.com/security/cve/CVE-2010-0407/" source="CVE"/>
		<reference ref_id="CVE-2010-4531" ref_url="https://www.suse.com/security/cve/CVE-2010-4531/" source="CVE"/>
		<reference ref_id="CVE-2016-10109" ref_url="https://www.suse.com/security/cve/CVE-2016-10109/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcsclite1-1.8.10-6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0407/">CVE-2010-0407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4531/">CVE-2010-4531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10109/">CVE-2016-10109</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009147770" comment="libpcsclite1-1.8.10-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009147771" comment="libpcsclite1-32bit-1.8.10-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009147772" comment="pcsc-lite-1.8.10-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76665" version="1" class="patch">
	<metadata>
		<title>libplist++3-1.12-19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2017-5209" ref_url="https://www.suse.com/security/cve/CVE-2017-5209/" source="CVE"/>
		<reference ref_id="CVE-2017-5545" ref_url="https://www.suse.com/security/cve/CVE-2017-5545/" source="CVE"/>
		<reference ref_id="CVE-2017-5834" ref_url="https://www.suse.com/security/cve/CVE-2017-5834/" source="CVE"/>
		<reference ref_id="CVE-2017-5835" ref_url="https://www.suse.com/security/cve/CVE-2017-5835/" source="CVE"/>
		<reference ref_id="CVE-2017-5836" ref_url="https://www.suse.com/security/cve/CVE-2017-5836/" source="CVE"/>
		<reference ref_id="CVE-2017-6440" ref_url="https://www.suse.com/security/cve/CVE-2017-6440/" source="CVE"/>
		<reference ref_id="CVE-2017-7982" ref_url="https://www.suse.com/security/cve/CVE-2017-7982/" source="CVE"/>
		<description>
These are all security issues fixed in the libplist++3-1.12-19.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5209/">CVE-2017-5209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5545/">CVE-2017-5545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5834/">CVE-2017-5834</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5835/">CVE-2017-5835</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5836/">CVE-2017-5836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6440/">CVE-2017-6440</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7982/">CVE-2017-7982</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009155695" comment="libplist++3-1.12-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155696" comment="libplist3-1.12-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76666" version="1" class="patch">
	<metadata>
		<title>libpng12-0-1.2.50-19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3045" ref_url="https://www.suse.com/security/cve/CVE-2011-3045/" source="CVE"/>
		<reference ref_id="CVE-2011-3048" ref_url="https://www.suse.com/security/cve/CVE-2011-3048/" source="CVE"/>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<reference ref_id="CVE-2013-7353" ref_url="https://www.suse.com/security/cve/CVE-2013-7353/" source="CVE"/>
		<reference ref_id="CVE-2013-7354" ref_url="https://www.suse.com/security/cve/CVE-2013-7354/" source="CVE"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng12-0-1.2.50-19.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3045/">CVE-2011-3045</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3048/">CVE-2011-3048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7353/">CVE-2013-7353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7354/">CVE-2013-7354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009149999" comment="libpng12-0-1.2.50-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150000" comment="libpng12-0-32bit-1.2.50-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76667" version="1" class="patch">
	<metadata>
		<title>libpng15-15-1.5.22-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501/" source="CVE"/>
		<reference ref_id="CVE-2011-2690" ref_url="https://www.suse.com/security/cve/CVE-2011-2690/" source="CVE"/>
		<reference ref_id="CVE-2011-2691" ref_url="https://www.suse.com/security/cve/CVE-2011-2691/" source="CVE"/>
		<reference ref_id="CVE-2011-2692" ref_url="https://www.suse.com/security/cve/CVE-2011-2692/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3048" ref_url="https://www.suse.com/security/cve/CVE-2011-3048/" source="CVE"/>
		<reference ref_id="CVE-2011-3328" ref_url="https://www.suse.com/security/cve/CVE-2011-3328/" source="CVE"/>
		<reference ref_id="CVE-2011-3464" ref_url="https://www.suse.com/security/cve/CVE-2011-3464/" source="CVE"/>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng15-15-1.5.22-9.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2690/">CVE-2011-2690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2691/">CVE-2011-2691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2692/">CVE-2011-2692</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3048/">CVE-2011-3048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3328/">CVE-2011-3328</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3464/">CVE-2011-3464</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150810" comment="libpng15-15-1.5.22-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76668" version="1" class="patch">
	<metadata>
		<title>libpng16-16-1.6.8-14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501/" source="CVE"/>
		<reference ref_id="CVE-2011-2690" ref_url="https://www.suse.com/security/cve/CVE-2011-2690/" source="CVE"/>
		<reference ref_id="CVE-2011-2691" ref_url="https://www.suse.com/security/cve/CVE-2011-2691/" source="CVE"/>
		<reference ref_id="CVE-2011-2692" ref_url="https://www.suse.com/security/cve/CVE-2011-2692/" source="CVE"/>
		<reference ref_id="CVE-2011-3328" ref_url="https://www.suse.com/security/cve/CVE-2011-3328/" source="CVE"/>
		<reference ref_id="CVE-2013-6954" ref_url="https://www.suse.com/security/cve/CVE-2013-6954/" source="CVE"/>
		<reference ref_id="CVE-2014-0333" ref_url="https://www.suse.com/security/cve/CVE-2014-0333/" source="CVE"/>
		<reference ref_id="CVE-2014-9495" ref_url="https://www.suse.com/security/cve/CVE-2014-9495/" source="CVE"/>
		<reference ref_id="CVE-2015-0973" ref_url="https://www.suse.com/security/cve/CVE-2015-0973/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng16-16-1.6.8-14.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2690/">CVE-2011-2690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2691/">CVE-2011-2691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2692/">CVE-2011-2692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3328/">CVE-2011-3328</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6954/">CVE-2013-6954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0333/">CVE-2014-0333</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9495/">CVE-2014-9495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0973/">CVE-2015-0973</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009149948" comment="libpng16-16-1.6.8-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009149949" comment="libpng16-16-32bit-1.6.8-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76669" version="1" class="patch">
	<metadata>
		<title>libpolkit0-0.113-5.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-0750" ref_url="https://www.suse.com/security/cve/CVE-2010-0750/" source="CVE"/>
		<reference ref_id="CVE-2011-1485" ref_url="https://www.suse.com/security/cve/CVE-2011-1485/" source="CVE"/>
		<reference ref_id="CVE-2013-4288" ref_url="https://www.suse.com/security/cve/CVE-2013-4288/" source="CVE"/>
		<reference ref_id="CVE-2015-3218" ref_url="https://www.suse.com/security/cve/CVE-2015-3218/" source="CVE"/>
		<reference ref_id="CVE-2015-3255" ref_url="https://www.suse.com/security/cve/CVE-2015-3255/" source="CVE"/>
		<reference ref_id="CVE-2015-3256" ref_url="https://www.suse.com/security/cve/CVE-2015-3256/" source="CVE"/>
		<reference ref_id="CVE-2015-4625" ref_url="https://www.suse.com/security/cve/CVE-2015-4625/" source="CVE"/>
		<description>
These are all security issues fixed in the libpolkit0-0.113-5.6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0750/">CVE-2010-0750</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1485/">CVE-2011-1485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4288/">CVE-2013-4288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3218/">CVE-2015-3218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3255/">CVE-2015-3255</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3256/">CVE-2015-3256</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4625/">CVE-2015-4625</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140902" comment="libpolkit0-0.113-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142141" comment="libpolkit0-32bit-0.113-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140903" comment="polkit-0.113-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140904" comment="typelib-1_0-Polkit-1_0-0.113-5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76670" version="1" class="patch">
	<metadata>
		<title>libpoppler-glib8-0.43.0-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0799" ref_url="https://www.suse.com/security/cve/CVE-2009-0799/" source="CVE"/>
		<reference ref_id="CVE-2009-0800" ref_url="https://www.suse.com/security/cve/CVE-2009-0800/" source="CVE"/>
		<reference ref_id="CVE-2009-1179" ref_url="https://www.suse.com/security/cve/CVE-2009-1179/" source="CVE"/>
		<reference ref_id="CVE-2009-1180" ref_url="https://www.suse.com/security/cve/CVE-2009-1180/" source="CVE"/>
		<reference ref_id="CVE-2009-1181" ref_url="https://www.suse.com/security/cve/CVE-2009-1181/" source="CVE"/>
		<reference ref_id="CVE-2009-1182" ref_url="https://www.suse.com/security/cve/CVE-2009-1182/" source="CVE"/>
		<reference ref_id="CVE-2009-1183" ref_url="https://www.suse.com/security/cve/CVE-2009-1183/" source="CVE"/>
		<reference ref_id="CVE-2009-1187" ref_url="https://www.suse.com/security/cve/CVE-2009-1187/" source="CVE"/>
		<reference ref_id="CVE-2009-1188" ref_url="https://www.suse.com/security/cve/CVE-2009-1188/" source="CVE"/>
		<reference ref_id="CVE-2009-3607" ref_url="https://www.suse.com/security/cve/CVE-2009-3607/" source="CVE"/>
		<reference ref_id="CVE-2009-3608" ref_url="https://www.suse.com/security/cve/CVE-2009-3608/" source="CVE"/>
		<reference ref_id="CVE-2013-1788" ref_url="https://www.suse.com/security/cve/CVE-2013-1788/" source="CVE"/>
		<reference ref_id="CVE-2013-1789" ref_url="https://www.suse.com/security/cve/CVE-2013-1789/" source="CVE"/>
		<reference ref_id="CVE-2013-1790" ref_url="https://www.suse.com/security/cve/CVE-2013-1790/" source="CVE"/>
		<reference ref_id="CVE-2013-4473" ref_url="https://www.suse.com/security/cve/CVE-2013-4473/" source="CVE"/>
		<reference ref_id="CVE-2013-4474" ref_url="https://www.suse.com/security/cve/CVE-2013-4474/" source="CVE"/>
		<description>
These are all security issues fixed in the libpoppler-glib8-0.43.0-15.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0799/">CVE-2009-0799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0800/">CVE-2009-0800</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1179/">CVE-2009-1179</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1180/">CVE-2009-1180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1181/">CVE-2009-1181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1182/">CVE-2009-1182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1183/">CVE-2009-1183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1187/">CVE-2009-1187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1188/">CVE-2009-1188</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3607/">CVE-2009-3607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3608/">CVE-2009-3608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1788/">CVE-2013-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1789/">CVE-2013-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1790/">CVE-2013-1790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4473/">CVE-2013-4473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4474/">CVE-2013-4474</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76671" version="1" class="patch">
	<metadata>
		<title>libproxy1-0.4.13-16.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-4504" ref_url="https://www.suse.com/security/cve/CVE-2012-4504/" source="CVE"/>
		<description>
These are all security issues fixed in the libproxy1-0.4.13-16.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4504/">CVE-2012-4504</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140909" comment="libproxy1-0.4.13-16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140910" comment="libproxy1-32bit-0.4.13-16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140911" comment="libproxy1-config-gnome3-0.4.13-16.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140912" comment="libproxy1-config-gnome3-32bit-0.4.13-16.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140913" comment="libproxy1-networkmanager-0.4.13-16.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142142" comment="libproxy1-networkmanager-32bit-0.4.13-16.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140914" comment="libproxy1-pacrunner-webkit-0.4.13-16.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76672" version="1" class="patch">
	<metadata>
		<title>libpulse-mainloop-glib0-32bit-5.0-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-3970" ref_url="https://www.suse.com/security/cve/CVE-2014-3970/" source="CVE"/>
		<description>
These are all security issues fixed in the libpulse-mainloop-glib0-32bit-5.0-4.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3970/">CVE-2014-3970</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159175" comment="libpulse-mainloop-glib0-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159176" comment="libpulse-mainloop-glib0-32bit-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159177" comment="libpulse0-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159178" comment="libpulse0-32bit-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159179" comment="pulseaudio-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159180" comment="pulseaudio-esound-compat-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159181" comment="pulseaudio-gdm-hooks-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159182" comment="pulseaudio-lang-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159652" comment="pulseaudio-module-bluetooth-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159653" comment="pulseaudio-module-gconf-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159654" comment="pulseaudio-module-jack-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159655" comment="pulseaudio-module-lirc-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159183" comment="pulseaudio-module-x11-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159184" comment="pulseaudio-module-zeroconf-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159185" comment="pulseaudio-utils-5.0-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76673" version="1" class="patch">
	<metadata>
		<title>libpython2_7-1_0-2.7.13-27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1521" ref_url="https://www.suse.com/security/cve/CVE-2011-1521/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-1753" ref_url="https://www.suse.com/security/cve/CVE-2013-1753/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-1912" ref_url="https://www.suse.com/security/cve/CVE-2014-1912/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2014-7185" ref_url="https://www.suse.com/security/cve/CVE-2014-7185/" source="CVE"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<description>
These are all security issues fixed in the libpython2_7-1_0-2.7.13-27.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1521/">CVE-2011-1521</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1753/">CVE-2013-1753</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1912/">CVE-2014-1912</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7185/">CVE-2014-7185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159186" comment="libpython2_7-1_0-2.7.13-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159187" comment="libpython2_7-1_0-32bit-2.7.13-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159188" comment="python-base-2.7.13-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159656" comment="python-devel-2.7.13-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159190" comment="python-xml-2.7.13-27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76674" version="1" class="patch">
	<metadata>
		<title>libpython3_4m1_0-3.4.6-24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-2667" ref_url="https://www.suse.com/security/cve/CVE-2014-2667/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<description>
These are all security issues fixed in the libpython3_4m1_0-3.4.6-24.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-2667/">CVE-2014-2667</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159191" comment="libpython3_4m1_0-3.4.6-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159192" comment="python3-base-3.4.6-24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76675" version="1" class="patch">
	<metadata>
		<title>libqt4-32bit-4.8.6-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0945" ref_url="https://www.suse.com/security/cve/CVE-2009-0945/" source="CVE"/>
		<reference ref_id="CVE-2011-3193" ref_url="https://www.suse.com/security/cve/CVE-2011-3193/" source="CVE"/>
		<reference ref_id="CVE-2011-3922" ref_url="https://www.suse.com/security/cve/CVE-2011-3922/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2012-6093" ref_url="https://www.suse.com/security/cve/CVE-2012-6093/" source="CVE"/>
		<reference ref_id="CVE-2013-0254" ref_url="https://www.suse.com/security/cve/CVE-2013-0254/" source="CVE"/>
		<reference ref_id="CVE-2013-4549" ref_url="https://www.suse.com/security/cve/CVE-2013-4549/" source="CVE"/>
		<reference ref_id="CVE-2014-0190" ref_url="https://www.suse.com/security/cve/CVE-2014-0190/" source="CVE"/>
		<reference ref_id="CVE-2015-0295" ref_url="https://www.suse.com/security/cve/CVE-2015-0295/" source="CVE"/>
		<reference ref_id="CVE-2015-1858" ref_url="https://www.suse.com/security/cve/CVE-2015-1858/" source="CVE"/>
		<reference ref_id="CVE-2015-1859" ref_url="https://www.suse.com/security/cve/CVE-2015-1859/" source="CVE"/>
		<reference ref_id="CVE-2015-1860" ref_url="https://www.suse.com/security/cve/CVE-2015-1860/" source="CVE"/>
		<description>
These are all security issues fixed in the libqt4-32bit-4.8.6-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0945/">CVE-2009-0945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3193/">CVE-2011-3193</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3922/">CVE-2011-3922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6093/">CVE-2012-6093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0254/">CVE-2013-0254</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4549/">CVE-2013-4549</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0190/">CVE-2014-0190</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0295/">CVE-2015-0295</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1858/">CVE-2015-1858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1859/">CVE-2015-1859</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1860/">CVE-2015-1860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125275" comment="libqt4-sql-mysql-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125277" comment="libqt4-sql-postgresql-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125278" comment="libqt4-sql-postgresql-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125280" comment="libqt4-sql-sqlite-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125281" comment="libqt4-sql-unixODBC-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125282" comment="libqt4-sql-unixODBC-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76676" version="1" class="patch">
	<metadata>
		<title>libquicktime0-1.2.4-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-2399" ref_url="https://www.suse.com/security/cve/CVE-2016-2399/" source="CVE"/>
		<description>
These are all security issues fixed in the libquicktime0-1.2.4-10.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2399/">CVE-2016-2399</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009149137" comment="libquicktime0-1.2.4-10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76677" version="1" class="patch">
	<metadata>
		<title>libraptor2-0-2.0.10-3.67 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-0037" ref_url="https://www.suse.com/security/cve/CVE-2012-0037/" source="CVE"/>
		<description>
These are all security issues fixed in the libraptor2-0-2.0.10-3.67 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0037/">CVE-2012-0037</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140928" comment="libraptor2-0-2.0.10-3.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141628" comment="raptor-2.0.10-3.67 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76678" version="1" class="patch">
	<metadata>
		<title>libraw9-0.15.4-3.88 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-2126" ref_url="https://www.suse.com/security/cve/CVE-2013-2126/" source="CVE"/>
		<reference ref_id="CVE-2013-2127" ref_url="https://www.suse.com/security/cve/CVE-2013-2127/" source="CVE"/>
		<description>
These are all security issues fixed in the libraw9-0.15.4-3.88 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2126/">CVE-2013-2126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2127/">CVE-2013-2127</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141629" comment="libraw9-0.15.4-3.88 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76679" version="1" class="patch">
	<metadata>
		<title>libreoffice-5.2.5.1-42.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2935" ref_url="https://www.suse.com/security/cve/CVE-2010-2935/" source="CVE"/>
		<reference ref_id="CVE-2010-2936" ref_url="https://www.suse.com/security/cve/CVE-2010-2936/" source="CVE"/>
		<reference ref_id="CVE-2014-0247" ref_url="https://www.suse.com/security/cve/CVE-2014-0247/" source="CVE"/>
		<reference ref_id="CVE-2014-3524" ref_url="https://www.suse.com/security/cve/CVE-2014-3524/" source="CVE"/>
		<reference ref_id="CVE-2014-3575" ref_url="https://www.suse.com/security/cve/CVE-2014-3575/" source="CVE"/>
		<reference ref_id="CVE-2014-3693" ref_url="https://www.suse.com/security/cve/CVE-2014-3693/" source="CVE"/>
		<reference ref_id="CVE-2014-8146" ref_url="https://www.suse.com/security/cve/CVE-2014-8146/" source="CVE"/>
		<reference ref_id="CVE-2014-8147" ref_url="https://www.suse.com/security/cve/CVE-2014-8147/" source="CVE"/>
		<reference ref_id="CVE-2014-9093" ref_url="https://www.suse.com/security/cve/CVE-2014-9093/" source="CVE"/>
		<reference ref_id="CVE-2015-4551" ref_url="https://www.suse.com/security/cve/CVE-2015-4551/" source="CVE"/>
		<reference ref_id="CVE-2015-5212" ref_url="https://www.suse.com/security/cve/CVE-2015-5212/" source="CVE"/>
		<reference ref_id="CVE-2015-5213" ref_url="https://www.suse.com/security/cve/CVE-2015-5213/" source="CVE"/>
		<reference ref_id="CVE-2015-5214" ref_url="https://www.suse.com/security/cve/CVE-2015-5214/" source="CVE"/>
		<reference ref_id="CVE-2016-0794" ref_url="https://www.suse.com/security/cve/CVE-2016-0794/" source="CVE"/>
		<reference ref_id="CVE-2016-0795" ref_url="https://www.suse.com/security/cve/CVE-2016-0795/" source="CVE"/>
		<reference ref_id="CVE-2016-4324" ref_url="https://www.suse.com/security/cve/CVE-2016-4324/" source="CVE"/>
		<description>
These are all security issues fixed in the libreoffice-5.2.5.1-42.13 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2935/">CVE-2010-2935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2936/">CVE-2010-2936</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0247/">CVE-2014-0247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3524/">CVE-2014-3524</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3575/">CVE-2014-3575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3693/">CVE-2014-3693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8146/">CVE-2014-8146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8147/">CVE-2014-8147</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9093/">CVE-2014-9093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4551/">CVE-2015-4551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5212/">CVE-2015-5212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5213/">CVE-2015-5213</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5214/">CVE-2015-5214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0794/">CVE-2016-0794</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0795/">CVE-2016-0795</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4324/">CVE-2016-4324</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159657" comment="libreoffice-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159658" comment="libreoffice-base-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159659" comment="libreoffice-base-drivers-mysql-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159660" comment="libreoffice-base-drivers-postgresql-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159661" comment="libreoffice-calc-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159662" comment="libreoffice-calc-extensions-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159663" comment="libreoffice-draw-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159664" comment="libreoffice-filters-optional-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159665" comment="libreoffice-gnome-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159666" comment="libreoffice-icon-theme-galaxy-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159667" comment="libreoffice-icon-theme-tango-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159668" comment="libreoffice-impress-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159669" comment="libreoffice-l10n-af-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159670" comment="libreoffice-l10n-ar-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159671" comment="libreoffice-l10n-ca-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159672" comment="libreoffice-l10n-cs-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159673" comment="libreoffice-l10n-da-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159674" comment="libreoffice-l10n-de-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159675" comment="libreoffice-l10n-en-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159676" comment="libreoffice-l10n-es-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159677" comment="libreoffice-l10n-fi-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159678" comment="libreoffice-l10n-fr-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159679" comment="libreoffice-l10n-gu-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159680" comment="libreoffice-l10n-hi-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159681" comment="libreoffice-l10n-hu-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159682" comment="libreoffice-l10n-it-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159683" comment="libreoffice-l10n-ja-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159684" comment="libreoffice-l10n-ko-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159685" comment="libreoffice-l10n-nb-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159686" comment="libreoffice-l10n-nl-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159687" comment="libreoffice-l10n-nn-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159688" comment="libreoffice-l10n-pl-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159689" comment="libreoffice-l10n-pt_BR-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159690" comment="libreoffice-l10n-pt_PT-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159691" comment="libreoffice-l10n-ro-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159692" comment="libreoffice-l10n-ru-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159693" comment="libreoffice-l10n-sk-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159694" comment="libreoffice-l10n-sv-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159695" comment="libreoffice-l10n-xh-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159696" comment="libreoffice-l10n-zh_CN-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159697" comment="libreoffice-l10n-zh_TW-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159698" comment="libreoffice-l10n-zu-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159699" comment="libreoffice-mailmerge-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159700" comment="libreoffice-math-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159701" comment="libreoffice-officebean-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159702" comment="libreoffice-pyuno-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159703" comment="libreoffice-writer-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159704" comment="libreoffice-writer-extensions-5.2.5.1-42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159705" comment="libreofficekit-5.2.5.1-42.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76680" version="1" class="patch">
	<metadata>
		<title>libruby2_1-2_1-2.1.9-18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-4975" ref_url="https://www.suse.com/security/cve/CVE-2014-4975/" source="CVE"/>
		<reference ref_id="CVE-2014-8080" ref_url="https://www.suse.com/security/cve/CVE-2014-8080/" source="CVE"/>
		<reference ref_id="CVE-2014-8090" ref_url="https://www.suse.com/security/cve/CVE-2014-8090/" source="CVE"/>
		<reference ref_id="CVE-2015-1855" ref_url="https://www.suse.com/security/cve/CVE-2015-1855/" source="CVE"/>
		<reference ref_id="CVE-2015-3900" ref_url="https://www.suse.com/security/cve/CVE-2015-3900/" source="CVE"/>
		<reference ref_id="CVE-2015-7551" ref_url="https://www.suse.com/security/cve/CVE-2015-7551/" source="CVE"/>
		<reference ref_id="CVE-2016-2339" ref_url="https://www.suse.com/security/cve/CVE-2016-2339/" source="CVE"/>
		<description>
These are all security issues fixed in the libruby2_1-2_1-2.1.9-18.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-4975/">CVE-2014-4975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8080/">CVE-2014-8080</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8090/">CVE-2014-8090</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1855/">CVE-2015-1855</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3900/">CVE-2015-3900</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7551/">CVE-2015-7551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2339/">CVE-2016-2339</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159193" comment="libruby2_1-2_1-2.1.9-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159194" comment="ruby2.1-2.1.9-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159195" comment="ruby2.1-stdlib-2.1.9-18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76681" version="1" class="patch">
	<metadata>
		<title>libsilc-1_1-2-1.1.10-24.128 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-1227" ref_url="https://www.suse.com/security/cve/CVE-2008-1227/" source="CVE"/>
		<description>
These are all security issues fixed in the libsilc-1_1-2-1.1.10-24.128 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1227/">CVE-2008-1227</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141677" comment="libsilc-1_1-2-1.1.10-24.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141678" comment="libsilcclient-1_1-3-1.1.10-24.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141679" comment="silc-toolkit-1.1.10-24.128 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76682" version="1" class="patch">
	<metadata>
		<title>libsmi-0.4.8-18.63 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2891" ref_url="https://www.suse.com/security/cve/CVE-2010-2891/" source="CVE"/>
		<description>
These are all security issues fixed in the libsmi-0.4.8-18.63 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2891/">CVE-2010-2891</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140932" comment="libsmi-0.4.8-18.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140933" comment="libsmi2-0.4.8-18.63 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76683" version="1" class="patch">
	<metadata>
		<title>libsndfile1-1.0.25-35.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0186" ref_url="https://www.suse.com/security/cve/CVE-2009-0186/" source="CVE"/>
		<reference ref_id="CVE-2011-2696" ref_url="https://www.suse.com/security/cve/CVE-2011-2696/" source="CVE"/>
		<reference ref_id="CVE-2014-9496" ref_url="https://www.suse.com/security/cve/CVE-2014-9496/" source="CVE"/>
		<reference ref_id="CVE-2014-9756" ref_url="https://www.suse.com/security/cve/CVE-2014-9756/" source="CVE"/>
		<reference ref_id="CVE-2015-7805" ref_url="https://www.suse.com/security/cve/CVE-2015-7805/" source="CVE"/>
		<reference ref_id="CVE-2015-8075" ref_url="https://www.suse.com/security/cve/CVE-2015-8075/" source="CVE"/>
		<reference ref_id="CVE-2017-7585" ref_url="https://www.suse.com/security/cve/CVE-2017-7585/" source="CVE"/>
		<reference ref_id="CVE-2017-7586" ref_url="https://www.suse.com/security/cve/CVE-2017-7586/" source="CVE"/>
		<reference ref_id="CVE-2017-7741" ref_url="https://www.suse.com/security/cve/CVE-2017-7741/" source="CVE"/>
		<reference ref_id="CVE-2017-7742" ref_url="https://www.suse.com/security/cve/CVE-2017-7742/" source="CVE"/>
		<reference ref_id="CVE-2017-8361" ref_url="https://www.suse.com/security/cve/CVE-2017-8361/" source="CVE"/>
		<reference ref_id="CVE-2017-8362" ref_url="https://www.suse.com/security/cve/CVE-2017-8362/" source="CVE"/>
		<reference ref_id="CVE-2017-8363" ref_url="https://www.suse.com/security/cve/CVE-2017-8363/" source="CVE"/>
		<reference ref_id="CVE-2017-8365" ref_url="https://www.suse.com/security/cve/CVE-2017-8365/" source="CVE"/>
		<description>
These are all security issues fixed in the libsndfile1-1.0.25-35.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0186/">CVE-2009-0186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2696/">CVE-2011-2696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9496/">CVE-2014-9496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9756/">CVE-2014-9756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7805/">CVE-2015-7805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8075/">CVE-2015-8075</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7585/">CVE-2017-7585</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7586/">CVE-2017-7586</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7741/">CVE-2017-7741</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7742/">CVE-2017-7742</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8361/">CVE-2017-8361</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8362/">CVE-2017-8362</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8363/">CVE-2017-8363</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8365/">CVE-2017-8365</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009155684" comment="libsndfile1-1.0.25-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155685" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76684" version="1" class="patch">
	<metadata>
		<title>libsnmp30-32bit-5.7.3-4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-2141" ref_url="https://www.suse.com/security/cve/CVE-2012-2141/" source="CVE"/>
		<reference ref_id="CVE-2014-2284" ref_url="https://www.suse.com/security/cve/CVE-2014-2284/" source="CVE"/>
		<reference ref_id="CVE-2014-2285" ref_url="https://www.suse.com/security/cve/CVE-2014-2285/" source="CVE"/>
		<reference ref_id="CVE-2014-3565" ref_url="https://www.suse.com/security/cve/CVE-2014-3565/" source="CVE"/>
		<reference ref_id="CVE-2015-5621" ref_url="https://www.suse.com/security/cve/CVE-2015-5621/" source="CVE"/>
		<description>
These are all security issues fixed in the libsnmp30-32bit-5.7.3-4.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2141/">CVE-2012-2141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2284/">CVE-2014-2284</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2285/">CVE-2014-2285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3565/">CVE-2014-3565</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5621/">CVE-2015-5621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140934" comment="libsnmp30-5.7.3-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140935" comment="libsnmp30-32bit-5.7.3-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140936" comment="net-snmp-5.7.3-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140937" comment="perl-SNMP-5.7.3-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140938" comment="snmp-mibs-5.7.3-4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76685" version="1" class="patch">
	<metadata>
		<title>libsoup-2_4-1-2.54.1-4.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-2054" ref_url="https://www.suse.com/security/cve/CVE-2011-2054/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-2_4-1-2.54.1-4.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2054/">CVE-2011-2054</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140939" comment="libsoup-2_4-1-2.54.1-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140940" comment="libsoup-2_4-1-32bit-2.54.1-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140941" comment="libsoup-lang-2.54.1-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140942" comment="typelib-1_0-Soup-2_4-2.54.1-4.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76686" version="1" class="patch">
	<metadata>
		<title>libspice-client-glib-2_0-8-0.33-1.33 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-4425" ref_url="https://www.suse.com/security/cve/CVE-2012-4425/" source="CVE"/>
		<description>
These are all security issues fixed in the libspice-client-glib-2_0-8-0.33-1.33 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4425/">CVE-2012-4425</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159196" comment="libspice-client-glib-2_0-8-0.33-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159197" comment="libspice-client-glib-helper-0.33-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159198" comment="libspice-client-gtk-3_0-5-0.33-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159199" comment="libspice-controller0-0.33-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159200" comment="typelib-1_0-SpiceClientGlib-2_0-0.33-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159201" comment="typelib-1_0-SpiceClientGtk-3_0-0.33-1.33 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76687" version="1" class="patch">
	<metadata>
		<title>libspice-server1-0.12.8-1.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-4282" ref_url="https://www.suse.com/security/cve/CVE-2013-4282/" source="CVE"/>
		<reference ref_id="CVE-2015-3247" ref_url="https://www.suse.com/security/cve/CVE-2015-3247/" source="CVE"/>
		<reference ref_id="CVE-2015-5260" ref_url="https://www.suse.com/security/cve/CVE-2015-5260/" source="CVE"/>
		<reference ref_id="CVE-2015-5261" ref_url="https://www.suse.com/security/cve/CVE-2015-5261/" source="CVE"/>
		<reference ref_id="CVE-2016-0749" ref_url="https://www.suse.com/security/cve/CVE-2016-0749/" source="CVE"/>
		<reference ref_id="CVE-2016-2150" ref_url="https://www.suse.com/security/cve/CVE-2016-2150/" source="CVE"/>
		<reference ref_id="CVE-2016-9577" ref_url="https://www.suse.com/security/cve/CVE-2016-9577/" source="CVE"/>
		<reference ref_id="CVE-2016-9578" ref_url="https://www.suse.com/security/cve/CVE-2016-9578/" source="CVE"/>
		<description>
These are all security issues fixed in the libspice-server1-0.12.8-1.17 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2013-4282/">CVE-2013-4282</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3247/">CVE-2015-3247</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5260/">CVE-2015-5260</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2015-5261/">CVE-2015-5261</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-0749/">CVE-2016-0749</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2150/">CVE-2016-2150</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9577/">CVE-2016-9577</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9578/">CVE-2016-9578</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159202" comment="libspice-server1-0.12.8-1.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76688" version="1" class="patch">
	<metadata>
		<title>libsqlite3-0-3.8.10.2-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-6153" ref_url="https://www.suse.com/security/cve/CVE-2016-6153/" source="CVE"/>
		<description>
These are all security issues fixed in the libsqlite3-0-3.8.10.2-8.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6153/">CVE-2016-6153</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159203" comment="libsqlite3-0-3.8.10.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159204" comment="libsqlite3-0-32bit-3.8.10.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159205" comment="sqlite3-3.8.10.2-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76689" version="1" class="patch">
	<metadata>
		<title>libsrtp1-1.5.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-2139" ref_url="https://www.suse.com/security/cve/CVE-2013-2139/" source="CVE"/>
		<description>
These are all security issues fixed in the libsrtp1-1.5.2-2.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2139/">CVE-2013-2139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140951" comment="libsrtp1-1.5.2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76690" version="1" class="patch">
	<metadata>
		<title>libssh2-1-1.4.3-19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-1782" ref_url="https://www.suse.com/security/cve/CVE-2015-1782/" source="CVE"/>
		<reference ref_id="CVE-2016-0787" ref_url="https://www.suse.com/security/cve/CVE-2016-0787/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh2-1-1.4.3-19.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1782/">CVE-2015-1782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0787/">CVE-2016-0787</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140952" comment="libssh2-1-1.4.3-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140953" comment="libssh2-1-32bit-1.4.3-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76691" version="1" class="patch">
	<metadata>
		<title>libssh4-0.6.3-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-4559" ref_url="https://www.suse.com/security/cve/CVE-2012-4559/" source="CVE"/>
		<reference ref_id="CVE-2012-4560" ref_url="https://www.suse.com/security/cve/CVE-2012-4560/" source="CVE"/>
		<reference ref_id="CVE-2012-4561" ref_url="https://www.suse.com/security/cve/CVE-2012-4561/" source="CVE"/>
		<reference ref_id="CVE-2013-0176" ref_url="https://www.suse.com/security/cve/CVE-2013-0176/" source="CVE"/>
		<reference ref_id="CVE-2014-0017" ref_url="https://www.suse.com/security/cve/CVE-2014-0017/" source="CVE"/>
		<reference ref_id="CVE-2014-8132" ref_url="https://www.suse.com/security/cve/CVE-2014-8132/" source="CVE"/>
		<reference ref_id="CVE-2015-3146" ref_url="https://www.suse.com/security/cve/CVE-2015-3146/" source="CVE"/>
		<reference ref_id="CVE-2016-0739" ref_url="https://www.suse.com/security/cve/CVE-2016-0739/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh4-0.6.3-11.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4559/">CVE-2012-4559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4560/">CVE-2012-4560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4561/">CVE-2012-4561</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0176/">CVE-2013-0176</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0017/">CVE-2014-0017</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8132/">CVE-2014-8132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3146/">CVE-2015-3146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0739/">CVE-2016-0739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009123868" comment="libssh4-0.6.3-11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76692" version="1" class="patch">
	<metadata>
		<title>libsystemd0-228-142.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-1174" ref_url="https://www.suse.com/security/cve/CVE-2012-1174/" source="CVE"/>
		<reference ref_id="CVE-2013-4288" ref_url="https://www.suse.com/security/cve/CVE-2013-4288/" source="CVE"/>
		<reference ref_id="CVE-2016-10156" ref_url="https://www.suse.com/security/cve/CVE-2016-10156/" source="CVE"/>
		<reference ref_id="CVE-2016-7795" ref_url="https://www.suse.com/security/cve/CVE-2016-7795/" source="CVE"/>
		<description>
These are all security issues fixed in the libsystemd0-228-142.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1174/">CVE-2012-1174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4288/">CVE-2013-4288</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10156/">CVE-2016-10156</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7795/">CVE-2016-7795</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159206" comment="libsystemd0-228-142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159207" comment="libsystemd0-32bit-228-142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159208" comment="libudev1-228-142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159209" comment="libudev1-32bit-228-142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159210" comment="systemd-228-142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159211" comment="systemd-32bit-228-142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159212" comment="systemd-bash-completion-228-142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159213" comment="systemd-sysvinit-228-142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159214" comment="udev-228-142.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76693" version="1" class="patch">
	<metadata>
		<title>libtag1-1.9.1-1.265 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-2396" ref_url="https://www.suse.com/security/cve/CVE-2012-2396/" source="CVE"/>
		<description>
These are all security issues fixed in the libtag1-1.9.1-1.265 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2396/">CVE-2012-2396</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140963" comment="libtag1-1.9.1-1.265 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141698" comment="libtag1-32bit-1.9.1-1.265 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140964" comment="libtag_c0-1.9.1-1.265 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141699" comment="libtag_c0-32bit-1.9.1-1.265 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140965" comment="taglib-1.9.1-1.265 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76694" version="1" class="patch">
	<metadata>
		<title>libtasn1-4.9-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-3467" ref_url="https://www.suse.com/security/cve/CVE-2014-3467/" source="CVE"/>
		<reference ref_id="CVE-2014-3468" ref_url="https://www.suse.com/security/cve/CVE-2014-3468/" source="CVE"/>
		<reference ref_id="CVE-2014-3469" ref_url="https://www.suse.com/security/cve/CVE-2014-3469/" source="CVE"/>
		<reference ref_id="CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806/" source="CVE"/>
		<reference ref_id="CVE-2015-3622" ref_url="https://www.suse.com/security/cve/CVE-2015-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-4008" ref_url="https://www.suse.com/security/cve/CVE-2016-4008/" source="CVE"/>
		<description>
These are all security issues fixed in the libtasn1-4.9-1.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3467/">CVE-2014-3467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3468/">CVE-2014-3468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3469/">CVE-2014-3469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3622/">CVE-2015-3622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4008/">CVE-2016-4008</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159215" comment="libtasn1-4.9-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159216" comment="libtasn1-6-4.9-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159217" comment="libtasn1-6-32bit-4.9-1.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76695" version="1" class="patch">
	<metadata>
		<title>libthai-data-0.1.25-4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-4012" ref_url="https://www.suse.com/security/cve/CVE-2009-4012/" source="CVE"/>
		<description>
These are all security issues fixed in the libthai-data-0.1.25-4.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4012/">CVE-2009-4012</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140966" comment="libthai-data-0.1.25-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140967" comment="libthai0-0.1.25-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140968" comment="libthai0-32bit-0.1.25-4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76696" version="1" class="patch">
	<metadata>
		<title>libtiff5-32bit-4.0.7-43.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-2285" ref_url="https://www.suse.com/security/cve/CVE-2009-2285/" source="CVE"/>
		<reference ref_id="CVE-2009-2347" ref_url="https://www.suse.com/security/cve/CVE-2009-2347/" source="CVE"/>
		<reference ref_id="CVE-2010-2065" ref_url="https://www.suse.com/security/cve/CVE-2010-2065/" source="CVE"/>
		<reference ref_id="CVE-2010-2067" ref_url="https://www.suse.com/security/cve/CVE-2010-2067/" source="CVE"/>
		<reference ref_id="CVE-2010-2233" ref_url="https://www.suse.com/security/cve/CVE-2010-2233/" source="CVE"/>
		<reference ref_id="CVE-2010-4665" ref_url="https://www.suse.com/security/cve/CVE-2010-4665/" source="CVE"/>
		<reference ref_id="CVE-2011-0192" ref_url="https://www.suse.com/security/cve/CVE-2011-0192/" source="CVE"/>
		<reference ref_id="CVE-2011-1167" ref_url="https://www.suse.com/security/cve/CVE-2011-1167/" source="CVE"/>
		<reference ref_id="CVE-2012-1173" ref_url="https://www.suse.com/security/cve/CVE-2012-1173/" source="CVE"/>
		<reference ref_id="CVE-2012-2113" ref_url="https://www.suse.com/security/cve/CVE-2012-2113/" source="CVE"/>
		<reference ref_id="CVE-2012-3401" ref_url="https://www.suse.com/security/cve/CVE-2012-3401/" source="CVE"/>
		<reference ref_id="CVE-2012-4564" ref_url="https://www.suse.com/security/cve/CVE-2012-4564/" source="CVE"/>
		<reference ref_id="CVE-2013-1960" ref_url="https://www.suse.com/security/cve/CVE-2013-1960/" source="CVE"/>
		<reference ref_id="CVE-2013-1961" ref_url="https://www.suse.com/security/cve/CVE-2013-1961/" source="CVE"/>
		<reference ref_id="CVE-2013-4231" ref_url="https://www.suse.com/security/cve/CVE-2013-4231/" source="CVE"/>
		<reference ref_id="CVE-2013-4232" ref_url="https://www.suse.com/security/cve/CVE-2013-4232/" source="CVE"/>
		<reference ref_id="CVE-2013-4243" ref_url="https://www.suse.com/security/cve/CVE-2013-4243/" source="CVE"/>
		<reference ref_id="CVE-2013-4244" ref_url="https://www.suse.com/security/cve/CVE-2013-4244/" source="CVE"/>
		<reference ref_id="CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127/" source="CVE"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2014-8129" ref_url="https://www.suse.com/security/cve/CVE-2014-8129/" source="CVE"/>
		<reference ref_id="CVE-2014-8130" ref_url="https://www.suse.com/security/cve/CVE-2014-8130/" source="CVE"/>
		<reference ref_id="CVE-2014-9655" ref_url="https://www.suse.com/security/cve/CVE-2014-9655/" source="CVE"/>
		<reference ref_id="CVE-2015-1547" ref_url="https://www.suse.com/security/cve/CVE-2015-1547/" source="CVE"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2015-8665" ref_url="https://www.suse.com/security/cve/CVE-2015-8665/" source="CVE"/>
		<reference ref_id="CVE-2015-8683" ref_url="https://www.suse.com/security/cve/CVE-2015-8683/" source="CVE"/>
		<reference ref_id="CVE-2015-8781" ref_url="https://www.suse.com/security/cve/CVE-2015-8781/" source="CVE"/>
		<reference ref_id="CVE-2015-8782" ref_url="https://www.suse.com/security/cve/CVE-2015-8782/" source="CVE"/>
		<reference ref_id="CVE-2015-8783" ref_url="https://www.suse.com/security/cve/CVE-2015-8783/" source="CVE"/>
		<reference ref_id="CVE-2016-10266" ref_url="https://www.suse.com/security/cve/CVE-2016-10266/" source="CVE"/>
		<reference ref_id="CVE-2016-10267" ref_url="https://www.suse.com/security/cve/CVE-2016-10267/" source="CVE"/>
		<reference ref_id="CVE-2016-10268" ref_url="https://www.suse.com/security/cve/CVE-2016-10268/" source="CVE"/>
		<reference ref_id="CVE-2016-10269" ref_url="https://www.suse.com/security/cve/CVE-2016-10269/" source="CVE"/>
		<reference ref_id="CVE-2016-10270" ref_url="https://www.suse.com/security/cve/CVE-2016-10270/" source="CVE"/>
		<reference ref_id="CVE-2016-10271" ref_url="https://www.suse.com/security/cve/CVE-2016-10271/" source="CVE"/>
		<reference ref_id="CVE-2016-10272" ref_url="https://www.suse.com/security/cve/CVE-2016-10272/" source="CVE"/>
		<reference ref_id="CVE-2016-3186" ref_url="https://www.suse.com/security/cve/CVE-2016-3186/" source="CVE"/>
		<reference ref_id="CVE-2016-3622" ref_url="https://www.suse.com/security/cve/CVE-2016-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-3623" ref_url="https://www.suse.com/security/cve/CVE-2016-3623/" source="CVE"/>
		<reference ref_id="CVE-2016-3658" ref_url="https://www.suse.com/security/cve/CVE-2016-3658/" source="CVE"/>
		<reference ref_id="CVE-2016-3945" ref_url="https://www.suse.com/security/cve/CVE-2016-3945/" source="CVE"/>
		<reference ref_id="CVE-2016-3990" ref_url="https://www.suse.com/security/cve/CVE-2016-3990/" source="CVE"/>
		<reference ref_id="CVE-2016-3991" ref_url="https://www.suse.com/security/cve/CVE-2016-3991/" source="CVE"/>
		<reference ref_id="CVE-2016-5314" ref_url="https://www.suse.com/security/cve/CVE-2016-5314/" source="CVE"/>
		<reference ref_id="CVE-2016-5316" ref_url="https://www.suse.com/security/cve/CVE-2016-5316/" source="CVE"/>
		<reference ref_id="CVE-2016-5317" ref_url="https://www.suse.com/security/cve/CVE-2016-5317/" source="CVE"/>
		<reference ref_id="CVE-2016-5320" ref_url="https://www.suse.com/security/cve/CVE-2016-5320/" source="CVE"/>
		<reference ref_id="CVE-2016-5321" ref_url="https://www.suse.com/security/cve/CVE-2016-5321/" source="CVE"/>
		<reference ref_id="CVE-2016-5323" ref_url="https://www.suse.com/security/cve/CVE-2016-5323/" source="CVE"/>
		<reference ref_id="CVE-2016-5652" ref_url="https://www.suse.com/security/cve/CVE-2016-5652/" source="CVE"/>
		<reference ref_id="CVE-2016-5875" ref_url="https://www.suse.com/security/cve/CVE-2016-5875/" source="CVE"/>
		<reference ref_id="CVE-2016-9273" ref_url="https://www.suse.com/security/cve/CVE-2016-9273/" source="CVE"/>
		<reference ref_id="CVE-2016-9297" ref_url="https://www.suse.com/security/cve/CVE-2016-9297/" source="CVE"/>
		<reference ref_id="CVE-2016-9448" ref_url="https://www.suse.com/security/cve/CVE-2016-9448/" source="CVE"/>
		<reference ref_id="CVE-2016-9453" ref_url="https://www.suse.com/security/cve/CVE-2016-9453/" source="CVE"/>
		<reference ref_id="CVE-2017-5225" ref_url="https://www.suse.com/security/cve/CVE-2017-5225/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff5-32bit-4.0.7-43.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2285/">CVE-2009-2285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2347/">CVE-2009-2347</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2065/">CVE-2010-2065</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2067/">CVE-2010-2067</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2233/">CVE-2010-2233</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4665/">CVE-2010-4665</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0192/">CVE-2011-0192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1167/">CVE-2011-1167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1173/">CVE-2012-1173</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2113/">CVE-2012-2113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3401/">CVE-2012-3401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4564/">CVE-2012-4564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1960/">CVE-2013-1960</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1961/">CVE-2013-1961</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4231/">CVE-2013-4231</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4232/">CVE-2013-4232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4243/">CVE-2013-4243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4244/">CVE-2013-4244</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8129/">CVE-2014-8129</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8130/">CVE-2014-8130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9655/">CVE-2014-9655</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1547/">CVE-2015-1547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8665/">CVE-2015-8665</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8683/">CVE-2015-8683</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8781/">CVE-2015-8781</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8782/">CVE-2015-8782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8783/">CVE-2015-8783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10266/">CVE-2016-10266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10267/">CVE-2016-10267</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10268/">CVE-2016-10268</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10269/">CVE-2016-10269</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10270/">CVE-2016-10270</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10271/">CVE-2016-10271</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10272/">CVE-2016-10272</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3186/">CVE-2016-3186</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3622/">CVE-2016-3622</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3623/">CVE-2016-3623</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3658/">CVE-2016-3658</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3945/">CVE-2016-3945</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3990/">CVE-2016-3990</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3991/">CVE-2016-3991</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5314/">CVE-2016-5314</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5316/">CVE-2016-5316</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5317/">CVE-2016-5317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5320/">CVE-2016-5320</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5321/">CVE-2016-5321</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5323/">CVE-2016-5323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5652/">CVE-2016-5652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5875/">CVE-2016-5875</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9273/">CVE-2016-9273</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9297/">CVE-2016-9297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9448/">CVE-2016-9448</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9453/">CVE-2016-9453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5225/">CVE-2017-5225</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76697" version="1" class="patch">
	<metadata>
		<title>libtirpc-netconfig-1.0.1-16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2017-8779" ref_url="https://www.suse.com/security/cve/CVE-2017-8779/" source="CVE"/>
		<description>
These are all security issues fixed in the libtirpc-netconfig-1.0.1-16.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8779/">CVE-2017-8779</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009155553" comment="libtirpc-netconfig-1.0.1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155554" comment="libtirpc3-1.0.1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155555" comment="libtirpc3-32bit-1.0.1-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76698" version="1" class="patch">
	<metadata>
		<title>libudisks2-0-2.1.3-1.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-0004" ref_url="https://www.suse.com/security/cve/CVE-2014-0004/" source="CVE"/>
		<description>
These are all security issues fixed in the libudisks2-0-2.1.3-1.14 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0004/">CVE-2014-0004</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140969" comment="libudisks2-0-2.1.3-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140970" comment="udisks2-2.1.3-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140971" comment="udisks2-lang-2.1.3-1.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76699" version="1" class="patch">
	<metadata>
		<title>libusbmuxd4-1.0.10-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-5104" ref_url="https://www.suse.com/security/cve/CVE-2016-5104/" source="CVE"/>
		<description>
These are all security issues fixed in the libusbmuxd4-1.0.10-2.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5104/">CVE-2016-5104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140975" comment="libusbmuxd4-1.0.10-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76700" version="1" class="patch">
	<metadata>
		<title>libvdpau1-1.1.1-6.73 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-5198" ref_url="https://www.suse.com/security/cve/CVE-2015-5198/" source="CVE"/>
		<reference ref_id="CVE-2015-5199" ref_url="https://www.suse.com/security/cve/CVE-2015-5199/" source="CVE"/>
		<reference ref_id="CVE-2015-5200" ref_url="https://www.suse.com/security/cve/CVE-2015-5200/" source="CVE"/>
		<description>
These are all security issues fixed in the libvdpau1-1.1.1-6.73 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5198/">CVE-2015-5198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5199/">CVE-2015-5199</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5200/">CVE-2015-5200</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140976" comment="libvdpau1-1.1.1-6.73 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142145" comment="libvdpau1-32bit-1.1.1-6.73 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76701" version="1" class="patch">
	<metadata>
		<title>libvirglrenderer0-0.5.0-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-10163" ref_url="https://www.suse.com/security/cve/CVE-2016-10163/" source="CVE"/>
		<reference ref_id="CVE-2016-10214" ref_url="https://www.suse.com/security/cve/CVE-2016-10214/" source="CVE"/>
		<reference ref_id="CVE-2017-5580" ref_url="https://www.suse.com/security/cve/CVE-2017-5580/" source="CVE"/>
		<reference ref_id="CVE-2017-5937" ref_url="https://www.suse.com/security/cve/CVE-2017-5937/" source="CVE"/>
		<reference ref_id="CVE-2017-5956" ref_url="https://www.suse.com/security/cve/CVE-2017-5956/" source="CVE"/>
		<reference ref_id="CVE-2017-5957" ref_url="https://www.suse.com/security/cve/CVE-2017-5957/" source="CVE"/>
		<reference ref_id="CVE-2017-5993" ref_url="https://www.suse.com/security/cve/CVE-2017-5993/" source="CVE"/>
		<reference ref_id="CVE-2017-5994" ref_url="https://www.suse.com/security/cve/CVE-2017-5994/" source="CVE"/>
		<reference ref_id="CVE-2017-6209" ref_url="https://www.suse.com/security/cve/CVE-2017-6209/" source="CVE"/>
		<reference ref_id="CVE-2017-6210" ref_url="https://www.suse.com/security/cve/CVE-2017-6210/" source="CVE"/>
		<reference ref_id="CVE-2017-6317" ref_url="https://www.suse.com/security/cve/CVE-2017-6317/" source="CVE"/>
		<reference ref_id="CVE-2017-6355" ref_url="https://www.suse.com/security/cve/CVE-2017-6355/" source="CVE"/>
		<reference ref_id="CVE-2017-6386" ref_url="https://www.suse.com/security/cve/CVE-2017-6386/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirglrenderer0-0.5.0-11.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10163/">CVE-2016-10163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10214/">CVE-2016-10214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5580/">CVE-2017-5580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5937/">CVE-2017-5937</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5956/">CVE-2017-5956</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5957/">CVE-2017-5957</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5993/">CVE-2017-5993</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5994/">CVE-2017-5994</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6209/">CVE-2017-6209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6210/">CVE-2017-6210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6317/">CVE-2017-6317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6355/">CVE-2017-6355</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6386/">CVE-2017-6386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009149816" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76702" version="1" class="patch">
	<metadata>
		<title>libvirt-3.3.0-4.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2242" ref_url="https://www.suse.com/security/cve/CVE-2010-2242/" source="CVE"/>
		<reference ref_id="CVE-2011-1146" ref_url="https://www.suse.com/security/cve/CVE-2011-1146/" source="CVE"/>
		<reference ref_id="CVE-2011-2511" ref_url="https://www.suse.com/security/cve/CVE-2011-2511/" source="CVE"/>
		<reference ref_id="CVE-2011-4600" ref_url="https://www.suse.com/security/cve/CVE-2011-4600/" source="CVE"/>
		<reference ref_id="CVE-2012-3445" ref_url="https://www.suse.com/security/cve/CVE-2012-3445/" source="CVE"/>
		<reference ref_id="CVE-2013-0170" ref_url="https://www.suse.com/security/cve/CVE-2013-0170/" source="CVE"/>
		<reference ref_id="CVE-2013-1962" ref_url="https://www.suse.com/security/cve/CVE-2013-1962/" source="CVE"/>
		<reference ref_id="CVE-2013-2218" ref_url="https://www.suse.com/security/cve/CVE-2013-2218/" source="CVE"/>
		<reference ref_id="CVE-2013-2230" ref_url="https://www.suse.com/security/cve/CVE-2013-2230/" source="CVE"/>
		<reference ref_id="CVE-2013-4153" ref_url="https://www.suse.com/security/cve/CVE-2013-4153/" source="CVE"/>
		<reference ref_id="CVE-2013-4154" ref_url="https://www.suse.com/security/cve/CVE-2013-4154/" source="CVE"/>
		<reference ref_id="CVE-2013-4239" ref_url="https://www.suse.com/security/cve/CVE-2013-4239/" source="CVE"/>
		<reference ref_id="CVE-2013-4296" ref_url="https://www.suse.com/security/cve/CVE-2013-4296/" source="CVE"/>
		<reference ref_id="CVE-2013-4297" ref_url="https://www.suse.com/security/cve/CVE-2013-4297/" source="CVE"/>
		<reference ref_id="CVE-2013-4311" ref_url="https://www.suse.com/security/cve/CVE-2013-4311/" source="CVE"/>
		<reference ref_id="CVE-2013-4399" ref_url="https://www.suse.com/security/cve/CVE-2013-4399/" source="CVE"/>
		<reference ref_id="CVE-2013-4400" ref_url="https://www.suse.com/security/cve/CVE-2013-4400/" source="CVE"/>
		<reference ref_id="CVE-2013-4401" ref_url="https://www.suse.com/security/cve/CVE-2013-4401/" source="CVE"/>
		<reference ref_id="CVE-2013-6436" ref_url="https://www.suse.com/security/cve/CVE-2013-6436/" source="CVE"/>
		<reference ref_id="CVE-2013-6456" ref_url="https://www.suse.com/security/cve/CVE-2013-6456/" source="CVE"/>
		<reference ref_id="CVE-2013-6457" ref_url="https://www.suse.com/security/cve/CVE-2013-6457/" source="CVE"/>
		<reference ref_id="CVE-2013-6458" ref_url="https://www.suse.com/security/cve/CVE-2013-6458/" source="CVE"/>
		<reference ref_id="CVE-2014-0028" ref_url="https://www.suse.com/security/cve/CVE-2014-0028/" source="CVE"/>
		<reference ref_id="CVE-2014-0179" ref_url="https://www.suse.com/security/cve/CVE-2014-0179/" source="CVE"/>
		<reference ref_id="CVE-2014-1447" ref_url="https://www.suse.com/security/cve/CVE-2014-1447/" source="CVE"/>
		<reference ref_id="CVE-2014-3633" ref_url="https://www.suse.com/security/cve/CVE-2014-3633/" source="CVE"/>
		<reference ref_id="CVE-2014-3657" ref_url="https://www.suse.com/security/cve/CVE-2014-3657/" source="CVE"/>
		<reference ref_id="CVE-2014-7823" ref_url="https://www.suse.com/security/cve/CVE-2014-7823/" source="CVE"/>
		<reference ref_id="CVE-2014-8131" ref_url="https://www.suse.com/security/cve/CVE-2014-8131/" source="CVE"/>
		<reference ref_id="CVE-2015-0236" ref_url="https://www.suse.com/security/cve/CVE-2015-0236/" source="CVE"/>
		<reference ref_id="CVE-2015-5247" ref_url="https://www.suse.com/security/cve/CVE-2015-5247/" source="CVE"/>
		<reference ref_id="CVE-2015-5313" ref_url="https://www.suse.com/security/cve/CVE-2015-5313/" source="CVE"/>
		<reference ref_id="CVE-2017-2635" ref_url="https://www.suse.com/security/cve/CVE-2017-2635/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirt-3.3.0-4.28 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2242/">CVE-2010-2242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1146/">CVE-2011-1146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2511/">CVE-2011-2511</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-4600/">CVE-2011-4600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3445/">CVE-2012-3445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0170/">CVE-2013-0170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1962/">CVE-2013-1962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2218/">CVE-2013-2218</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2230/">CVE-2013-2230</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4153/">CVE-2013-4153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4154/">CVE-2013-4154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4239/">CVE-2013-4239</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4296/">CVE-2013-4296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4297/">CVE-2013-4297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4311/">CVE-2013-4311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4399/">CVE-2013-4399</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4400/">CVE-2013-4400</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4401/">CVE-2013-4401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6436/">CVE-2013-6436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6456/">CVE-2013-6456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6457/">CVE-2013-6457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6458/">CVE-2013-6458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0028/">CVE-2014-0028</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0179/">CVE-2014-0179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1447/">CVE-2014-1447</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3633/">CVE-2014-3633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3657/">CVE-2014-3657</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7823/">CVE-2014-7823</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8131/">CVE-2014-8131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0236/">CVE-2015-0236</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5247/">CVE-2015-5247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5313/">CVE-2015-5313</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-2635/">CVE-2017-2635</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76703" version="1" class="patch">
	<metadata>
		<title>libvmtools0-10.1.5-2.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-5191" ref_url="https://www.suse.com/security/cve/CVE-2015-5191/" source="CVE"/>
		<description>
These are all security issues fixed in the libvmtools0-10.1.5-2.17 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5191/">CVE-2015-5191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159247" comment="libvmtools0-10.1.5-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159248" comment="open-vm-tools-10.1.5-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159249" comment="open-vm-tools-desktop-10.1.5-2.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76704" version="1" class="patch">
	<metadata>
		<title>libvorbis0-1.3.3-8.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-1420" ref_url="https://www.suse.com/security/cve/CVE-2008-1420/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<description>
These are all security issues fixed in the libvorbis0-1.3.3-8.23 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1420/">CVE-2008-1420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141724" comment="libvorbis0-1.3.3-8.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140999" comment="libvorbis0-32bit-1.3.3-8.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141725" comment="libvorbisenc2-1.3.3-8.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141001" comment="libvorbisenc2-32bit-1.3.3-8.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141726" comment="libvorbisfile3-1.3.3-8.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141003" comment="libvorbisfile3-32bit-1.3.3-8.23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76705" version="1" class="patch">
	<metadata>
		<title>libvte9-0.28.2-19.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-2738" ref_url="https://www.suse.com/security/cve/CVE-2012-2738/" source="CVE"/>
		<description>
These are all security issues fixed in the libvte9-0.28.2-19.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2738/">CVE-2012-2738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141004" comment="libvte9-0.28.2-19.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76706" version="1" class="patch">
	<metadata>
		<title>libwireshark8-2.2.7-47.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-1210" ref_url="https://www.suse.com/security/cve/CVE-2009-1210/" source="CVE"/>
		<reference ref_id="CVE-2009-1267" ref_url="https://www.suse.com/security/cve/CVE-2009-1267/" source="CVE"/>
		<reference ref_id="CVE-2009-1268" ref_url="https://www.suse.com/security/cve/CVE-2009-1268/" source="CVE"/>
		<reference ref_id="CVE-2009-1269" ref_url="https://www.suse.com/security/cve/CVE-2009-1269/" source="CVE"/>
		<reference ref_id="CVE-2009-3241" ref_url="https://www.suse.com/security/cve/CVE-2009-3241/" source="CVE"/>
		<reference ref_id="CVE-2009-3242" ref_url="https://www.suse.com/security/cve/CVE-2009-3242/" source="CVE"/>
		<reference ref_id="CVE-2009-3243" ref_url="https://www.suse.com/security/cve/CVE-2009-3243/" source="CVE"/>
		<reference ref_id="CVE-2010-1455" ref_url="https://www.suse.com/security/cve/CVE-2010-1455/" source="CVE"/>
		<reference ref_id="CVE-2010-2993" ref_url="https://www.suse.com/security/cve/CVE-2010-2993/" source="CVE"/>
		<reference ref_id="CVE-2010-3445" ref_url="https://www.suse.com/security/cve/CVE-2010-3445/" source="CVE"/>
		<reference ref_id="CVE-2010-4300" ref_url="https://www.suse.com/security/cve/CVE-2010-4300/" source="CVE"/>
		<reference ref_id="CVE-2010-4301" ref_url="https://www.suse.com/security/cve/CVE-2010-4301/" source="CVE"/>
		<reference ref_id="CVE-2010-4538" ref_url="https://www.suse.com/security/cve/CVE-2010-4538/" source="CVE"/>
		<reference ref_id="CVE-2011-0024" ref_url="https://www.suse.com/security/cve/CVE-2011-0024/" source="CVE"/>
		<reference ref_id="CVE-2011-0538" ref_url="https://www.suse.com/security/cve/CVE-2011-0538/" source="CVE"/>
		<reference ref_id="CVE-2011-0713" ref_url="https://www.suse.com/security/cve/CVE-2011-0713/" source="CVE"/>
		<reference ref_id="CVE-2011-1138" ref_url="https://www.suse.com/security/cve/CVE-2011-1138/" source="CVE"/>
		<reference ref_id="CVE-2011-1139" ref_url="https://www.suse.com/security/cve/CVE-2011-1139/" source="CVE"/>
		<reference ref_id="CVE-2011-1140" ref_url="https://www.suse.com/security/cve/CVE-2011-1140/" source="CVE"/>
		<reference ref_id="CVE-2011-1143" ref_url="https://www.suse.com/security/cve/CVE-2011-1143/" source="CVE"/>
		<reference ref_id="CVE-2011-1590" ref_url="https://www.suse.com/security/cve/CVE-2011-1590/" source="CVE"/>
		<reference ref_id="CVE-2011-1591" ref_url="https://www.suse.com/security/cve/CVE-2011-1591/" source="CVE"/>
		<reference ref_id="CVE-2011-1592" ref_url="https://www.suse.com/security/cve/CVE-2011-1592/" source="CVE"/>
		<reference ref_id="CVE-2011-1957" ref_url="https://www.suse.com/security/cve/CVE-2011-1957/" source="CVE"/>
		<reference ref_id="CVE-2011-1958" ref_url="https://www.suse.com/security/cve/CVE-2011-1958/" source="CVE"/>
		<reference ref_id="CVE-2011-1959" ref_url="https://www.suse.com/security/cve/CVE-2011-1959/" source="CVE"/>
		<reference ref_id="CVE-2011-2174" ref_url="https://www.suse.com/security/cve/CVE-2011-2174/" source="CVE"/>
		<reference ref_id="CVE-2011-2175" ref_url="https://www.suse.com/security/cve/CVE-2011-2175/" source="CVE"/>
		<reference ref_id="CVE-2011-2597" ref_url="https://www.suse.com/security/cve/CVE-2011-2597/" source="CVE"/>
		<reference ref_id="CVE-2011-2698" ref_url="https://www.suse.com/security/cve/CVE-2011-2698/" source="CVE"/>
		<reference ref_id="CVE-2011-3266" ref_url="https://www.suse.com/security/cve/CVE-2011-3266/" source="CVE"/>
		<reference ref_id="CVE-2011-3360" ref_url="https://www.suse.com/security/cve/CVE-2011-3360/" source="CVE"/>
		<reference ref_id="CVE-2011-3483" ref_url="https://www.suse.com/security/cve/CVE-2011-3483/" source="CVE"/>
		<reference ref_id="CVE-2012-2392" ref_url="https://www.suse.com/security/cve/CVE-2012-2392/" source="CVE"/>
		<reference ref_id="CVE-2012-2393" ref_url="https://www.suse.com/security/cve/CVE-2012-2393/" source="CVE"/>
		<reference ref_id="CVE-2012-2394" ref_url="https://www.suse.com/security/cve/CVE-2012-2394/" source="CVE"/>
		<reference ref_id="CVE-2012-3548" ref_url="https://www.suse.com/security/cve/CVE-2012-3548/" source="CVE"/>
		<reference ref_id="CVE-2012-4048" ref_url="https://www.suse.com/security/cve/CVE-2012-4048/" source="CVE"/>
		<reference ref_id="CVE-2012-4049" ref_url="https://www.suse.com/security/cve/CVE-2012-4049/" source="CVE"/>
		<reference ref_id="CVE-2012-4285" ref_url="https://www.suse.com/security/cve/CVE-2012-4285/" source="CVE"/>
		<reference ref_id="CVE-2012-4286" ref_url="https://www.suse.com/security/cve/CVE-2012-4286/" source="CVE"/>
		<reference ref_id="CVE-2012-4287" ref_url="https://www.suse.com/security/cve/CVE-2012-4287/" source="CVE"/>
		<reference ref_id="CVE-2012-4288" ref_url="https://www.suse.com/security/cve/CVE-2012-4288/" source="CVE"/>
		<reference ref_id="CVE-2012-4289" ref_url="https://www.suse.com/security/cve/CVE-2012-4289/" source="CVE"/>
		<reference ref_id="CVE-2012-4290" ref_url="https://www.suse.com/security/cve/CVE-2012-4290/" source="CVE"/>
		<reference ref_id="CVE-2012-4291" ref_url="https://www.suse.com/security/cve/CVE-2012-4291/" source="CVE"/>
		<reference ref_id="CVE-2012-4292" ref_url="https://www.suse.com/security/cve/CVE-2012-4292/" source="CVE"/>
		<reference ref_id="CVE-2012-4293" ref_url="https://www.suse.com/security/cve/CVE-2012-4293/" source="CVE"/>
		<reference ref_id="CVE-2012-4294" ref_url="https://www.suse.com/security/cve/CVE-2012-4294/" source="CVE"/>
		<reference ref_id="CVE-2012-4295" ref_url="https://www.suse.com/security/cve/CVE-2012-4295/" source="CVE"/>
		<reference ref_id="CVE-2012-4296" ref_url="https://www.suse.com/security/cve/CVE-2012-4296/" source="CVE"/>
		<reference ref_id="CVE-2012-4297" ref_url="https://www.suse.com/security/cve/CVE-2012-4297/" source="CVE"/>
		<reference ref_id="CVE-2012-4298" ref_url="https://www.suse.com/security/cve/CVE-2012-4298/" source="CVE"/>
		<reference ref_id="CVE-2012-5237" ref_url="https://www.suse.com/security/cve/CVE-2012-5237/" source="CVE"/>
		<reference ref_id="CVE-2012-5238" ref_url="https://www.suse.com/security/cve/CVE-2012-5238/" source="CVE"/>
		<reference ref_id="CVE-2012-5239" ref_url="https://www.suse.com/security/cve/CVE-2012-5239/" source="CVE"/>
		<reference ref_id="CVE-2012-5240" ref_url="https://www.suse.com/security/cve/CVE-2012-5240/" source="CVE"/>
		<reference ref_id="CVE-2012-5592" ref_url="https://www.suse.com/security/cve/CVE-2012-5592/" source="CVE"/>
		<reference ref_id="CVE-2012-5593" ref_url="https://www.suse.com/security/cve/CVE-2012-5593/" source="CVE"/>
		<reference ref_id="CVE-2012-5594" ref_url="https://www.suse.com/security/cve/CVE-2012-5594/" source="CVE"/>
		<reference ref_id="CVE-2012-5595" ref_url="https://www.suse.com/security/cve/CVE-2012-5595/" source="CVE"/>
		<reference ref_id="CVE-2012-5596" ref_url="https://www.suse.com/security/cve/CVE-2012-5596/" source="CVE"/>
		<reference ref_id="CVE-2012-5597" ref_url="https://www.suse.com/security/cve/CVE-2012-5597/" source="CVE"/>
		<reference ref_id="CVE-2012-5598" ref_url="https://www.suse.com/security/cve/CVE-2012-5598/" source="CVE"/>
		<reference ref_id="CVE-2012-5599" ref_url="https://www.suse.com/security/cve/CVE-2012-5599/" source="CVE"/>
		<reference ref_id="CVE-2012-5600" ref_url="https://www.suse.com/security/cve/CVE-2012-5600/" source="CVE"/>
		<reference ref_id="CVE-2012-5601" ref_url="https://www.suse.com/security/cve/CVE-2012-5601/" source="CVE"/>
		<reference ref_id="CVE-2012-5602" ref_url="https://www.suse.com/security/cve/CVE-2012-5602/" source="CVE"/>
		<reference ref_id="CVE-2013-1572" ref_url="https://www.suse.com/security/cve/CVE-2013-1572/" source="CVE"/>
		<reference ref_id="CVE-2013-1573" ref_url="https://www.suse.com/security/cve/CVE-2013-1573/" source="CVE"/>
		<reference ref_id="CVE-2013-1574" ref_url="https://www.suse.com/security/cve/CVE-2013-1574/" source="CVE"/>
		<reference ref_id="CVE-2013-1575" ref_url="https://www.suse.com/security/cve/CVE-2013-1575/" source="CVE"/>
		<reference ref_id="CVE-2013-1576" ref_url="https://www.suse.com/security/cve/CVE-2013-1576/" source="CVE"/>
		<reference ref_id="CVE-2013-1577" ref_url="https://www.suse.com/security/cve/CVE-2013-1577/" source="CVE"/>
		<reference ref_id="CVE-2013-1578" ref_url="https://www.suse.com/security/cve/CVE-2013-1578/" source="CVE"/>
		<reference ref_id="CVE-2013-1579" ref_url="https://www.suse.com/security/cve/CVE-2013-1579/" source="CVE"/>
		<reference ref_id="CVE-2013-1580" ref_url="https://www.suse.com/security/cve/CVE-2013-1580/" source="CVE"/>
		<reference ref_id="CVE-2013-1581" ref_url="https://www.suse.com/security/cve/CVE-2013-1581/" source="CVE"/>
		<reference ref_id="CVE-2013-1582" ref_url="https://www.suse.com/security/cve/CVE-2013-1582/" source="CVE"/>
		<reference ref_id="CVE-2013-1583" ref_url="https://www.suse.com/security/cve/CVE-2013-1583/" source="CVE"/>
		<reference ref_id="CVE-2013-1584" ref_url="https://www.suse.com/security/cve/CVE-2013-1584/" source="CVE"/>
		<reference ref_id="CVE-2013-1585" ref_url="https://www.suse.com/security/cve/CVE-2013-1585/" source="CVE"/>
		<reference ref_id="CVE-2013-1586" ref_url="https://www.suse.com/security/cve/CVE-2013-1586/" source="CVE"/>
		<reference ref_id="CVE-2013-1587" ref_url="https://www.suse.com/security/cve/CVE-2013-1587/" source="CVE"/>
		<reference ref_id="CVE-2013-1588" ref_url="https://www.suse.com/security/cve/CVE-2013-1588/" source="CVE"/>
		<reference ref_id="CVE-2013-1589" ref_url="https://www.suse.com/security/cve/CVE-2013-1589/" source="CVE"/>
		<reference ref_id="CVE-2013-1590" ref_url="https://www.suse.com/security/cve/CVE-2013-1590/" source="CVE"/>
		<reference ref_id="CVE-2013-2475" ref_url="https://www.suse.com/security/cve/CVE-2013-2475/" source="CVE"/>
		<reference ref_id="CVE-2013-2476" ref_url="https://www.suse.com/security/cve/CVE-2013-2476/" source="CVE"/>
		<reference ref_id="CVE-2013-2477" ref_url="https://www.suse.com/security/cve/CVE-2013-2477/" source="CVE"/>
		<reference ref_id="CVE-2013-2478" ref_url="https://www.suse.com/security/cve/CVE-2013-2478/" source="CVE"/>
		<reference ref_id="CVE-2013-2479" ref_url="https://www.suse.com/security/cve/CVE-2013-2479/" source="CVE"/>
		<reference ref_id="CVE-2013-2480" ref_url="https://www.suse.com/security/cve/CVE-2013-2480/" source="CVE"/>
		<reference ref_id="CVE-2013-2481" ref_url="https://www.suse.com/security/cve/CVE-2013-2481/" source="CVE"/>
		<reference ref_id="CVE-2013-2482" ref_url="https://www.suse.com/security/cve/CVE-2013-2482/" source="CVE"/>
		<reference ref_id="CVE-2013-2483" ref_url="https://www.suse.com/security/cve/CVE-2013-2483/" source="CVE"/>
		<reference ref_id="CVE-2013-2484" ref_url="https://www.suse.com/security/cve/CVE-2013-2484/" source="CVE"/>
		<reference ref_id="CVE-2013-2485" ref_url="https://www.suse.com/security/cve/CVE-2013-2485/" source="CVE"/>
		<reference ref_id="CVE-2013-2486" ref_url="https://www.suse.com/security/cve/CVE-2013-2486/" source="CVE"/>
		<reference ref_id="CVE-2013-2487" ref_url="https://www.suse.com/security/cve/CVE-2013-2487/" source="CVE"/>
		<reference ref_id="CVE-2013-2488" ref_url="https://www.suse.com/security/cve/CVE-2013-2488/" source="CVE"/>
		<reference ref_id="CVE-2013-3555" ref_url="https://www.suse.com/security/cve/CVE-2013-3555/" source="CVE"/>
		<reference ref_id="CVE-2013-3556" ref_url="https://www.suse.com/security/cve/CVE-2013-3556/" source="CVE"/>
		<reference ref_id="CVE-2013-3557" ref_url="https://www.suse.com/security/cve/CVE-2013-3557/" source="CVE"/>
		<reference ref_id="CVE-2013-3558" ref_url="https://www.suse.com/security/cve/CVE-2013-3558/" source="CVE"/>
		<reference ref_id="CVE-2013-3559" ref_url="https://www.suse.com/security/cve/CVE-2013-3559/" source="CVE"/>
		<reference ref_id="CVE-2013-3560" ref_url="https://www.suse.com/security/cve/CVE-2013-3560/" source="CVE"/>
		<reference ref_id="CVE-2013-3561" ref_url="https://www.suse.com/security/cve/CVE-2013-3561/" source="CVE"/>
		<reference ref_id="CVE-2013-3562" ref_url="https://www.suse.com/security/cve/CVE-2013-3562/" source="CVE"/>
		<reference ref_id="CVE-2013-4083" ref_url="https://www.suse.com/security/cve/CVE-2013-4083/" source="CVE"/>
		<reference ref_id="CVE-2013-4920" ref_url="https://www.suse.com/security/cve/CVE-2013-4920/" source="CVE"/>
		<reference ref_id="CVE-2013-4921" ref_url="https://www.suse.com/security/cve/CVE-2013-4921/" source="CVE"/>
		<reference ref_id="CVE-2013-4922" ref_url="https://www.suse.com/security/cve/CVE-2013-4922/" source="CVE"/>
		<reference ref_id="CVE-2013-4923" ref_url="https://www.suse.com/security/cve/CVE-2013-4923/" source="CVE"/>
		<reference ref_id="CVE-2013-4924" ref_url="https://www.suse.com/security/cve/CVE-2013-4924/" source="CVE"/>
		<reference ref_id="CVE-2013-4925" ref_url="https://www.suse.com/security/cve/CVE-2013-4925/" source="CVE"/>
		<reference ref_id="CVE-2013-4926" ref_url="https://www.suse.com/security/cve/CVE-2013-4926/" source="CVE"/>
		<reference ref_id="CVE-2013-4927" ref_url="https://www.suse.com/security/cve/CVE-2013-4927/" source="CVE"/>
		<reference ref_id="CVE-2013-4928" ref_url="https://www.suse.com/security/cve/CVE-2013-4928/" source="CVE"/>
		<reference ref_id="CVE-2013-4929" ref_url="https://www.suse.com/security/cve/CVE-2013-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-4930" ref_url="https://www.suse.com/security/cve/CVE-2013-4930/" source="CVE"/>
		<reference ref_id="CVE-2013-4931" ref_url="https://www.suse.com/security/cve/CVE-2013-4931/" source="CVE"/>
		<reference ref_id="CVE-2013-4932" ref_url="https://www.suse.com/security/cve/CVE-2013-4932/" source="CVE"/>
		<reference ref_id="CVE-2013-4933" ref_url="https://www.suse.com/security/cve/CVE-2013-4933/" source="CVE"/>
		<reference ref_id="CVE-2013-4934" ref_url="https://www.suse.com/security/cve/CVE-2013-4934/" source="CVE"/>
		<reference ref_id="CVE-2013-4935" ref_url="https://www.suse.com/security/cve/CVE-2013-4935/" source="CVE"/>
		<reference ref_id="CVE-2013-4936" ref_url="https://www.suse.com/security/cve/CVE-2013-4936/" source="CVE"/>
		<reference ref_id="CVE-2013-5717" ref_url="https://www.suse.com/security/cve/CVE-2013-5717/" source="CVE"/>
		<reference ref_id="CVE-2013-5718" ref_url="https://www.suse.com/security/cve/CVE-2013-5718/" source="CVE"/>
		<reference ref_id="CVE-2013-5719" ref_url="https://www.suse.com/security/cve/CVE-2013-5719/" source="CVE"/>
		<reference ref_id="CVE-2013-5720" ref_url="https://www.suse.com/security/cve/CVE-2013-5720/" source="CVE"/>
		<reference ref_id="CVE-2013-5721" ref_url="https://www.suse.com/security/cve/CVE-2013-5721/" source="CVE"/>
		<reference ref_id="CVE-2013-5722" ref_url="https://www.suse.com/security/cve/CVE-2013-5722/" source="CVE"/>
		<reference ref_id="CVE-2013-6336" ref_url="https://www.suse.com/security/cve/CVE-2013-6336/" source="CVE"/>
		<reference ref_id="CVE-2013-6337" ref_url="https://www.suse.com/security/cve/CVE-2013-6337/" source="CVE"/>
		<reference ref_id="CVE-2013-6338" ref_url="https://www.suse.com/security/cve/CVE-2013-6338/" source="CVE"/>
		<reference ref_id="CVE-2013-6339" ref_url="https://www.suse.com/security/cve/CVE-2013-6339/" source="CVE"/>
		<reference ref_id="CVE-2013-6340" ref_url="https://www.suse.com/security/cve/CVE-2013-6340/" source="CVE"/>
		<reference ref_id="CVE-2013-7112" ref_url="https://www.suse.com/security/cve/CVE-2013-7112/" source="CVE"/>
		<reference ref_id="CVE-2013-7113" ref_url="https://www.suse.com/security/cve/CVE-2013-7113/" source="CVE"/>
		<reference ref_id="CVE-2013-7114" ref_url="https://www.suse.com/security/cve/CVE-2013-7114/" source="CVE"/>
		<reference ref_id="CVE-2014-2281" ref_url="https://www.suse.com/security/cve/CVE-2014-2281/" source="CVE"/>
		<reference ref_id="CVE-2014-2282" ref_url="https://www.suse.com/security/cve/CVE-2014-2282/" source="CVE"/>
		<reference ref_id="CVE-2014-2283" ref_url="https://www.suse.com/security/cve/CVE-2014-2283/" source="CVE"/>
		<reference ref_id="CVE-2014-2299" ref_url="https://www.suse.com/security/cve/CVE-2014-2299/" source="CVE"/>
		<reference ref_id="CVE-2014-2907" ref_url="https://www.suse.com/security/cve/CVE-2014-2907/" source="CVE"/>
		<reference ref_id="CVE-2014-4020" ref_url="https://www.suse.com/security/cve/CVE-2014-4020/" source="CVE"/>
		<reference ref_id="CVE-2014-5161" ref_url="https://www.suse.com/security/cve/CVE-2014-5161/" source="CVE"/>
		<reference ref_id="CVE-2014-5162" ref_url="https://www.suse.com/security/cve/CVE-2014-5162/" source="CVE"/>
		<reference ref_id="CVE-2014-5163" ref_url="https://www.suse.com/security/cve/CVE-2014-5163/" source="CVE"/>
		<reference ref_id="CVE-2014-5164" ref_url="https://www.suse.com/security/cve/CVE-2014-5164/" source="CVE"/>
		<reference ref_id="CVE-2014-5165" ref_url="https://www.suse.com/security/cve/CVE-2014-5165/" source="CVE"/>
		<reference ref_id="CVE-2015-0559" ref_url="https://www.suse.com/security/cve/CVE-2015-0559/" source="CVE"/>
		<reference ref_id="CVE-2015-0560" ref_url="https://www.suse.com/security/cve/CVE-2015-0560/" source="CVE"/>
		<reference ref_id="CVE-2015-0561" ref_url="https://www.suse.com/security/cve/CVE-2015-0561/" source="CVE"/>
		<reference ref_id="CVE-2015-0562" ref_url="https://www.suse.com/security/cve/CVE-2015-0562/" source="CVE"/>
		<reference ref_id="CVE-2015-0563" ref_url="https://www.suse.com/security/cve/CVE-2015-0563/" source="CVE"/>
		<reference ref_id="CVE-2015-0564" ref_url="https://www.suse.com/security/cve/CVE-2015-0564/" source="CVE"/>
		<reference ref_id="CVE-2015-2188" ref_url="https://www.suse.com/security/cve/CVE-2015-2188/" source="CVE"/>
		<reference ref_id="CVE-2015-2189" ref_url="https://www.suse.com/security/cve/CVE-2015-2189/" source="CVE"/>
		<reference ref_id="CVE-2015-2191" ref_url="https://www.suse.com/security/cve/CVE-2015-2191/" source="CVE"/>
		<reference ref_id="CVE-2015-3811" ref_url="https://www.suse.com/security/cve/CVE-2015-3811/" source="CVE"/>
		<reference ref_id="CVE-2015-3812" ref_url="https://www.suse.com/security/cve/CVE-2015-3812/" source="CVE"/>
		<reference ref_id="CVE-2015-3813" ref_url="https://www.suse.com/security/cve/CVE-2015-3813/" source="CVE"/>
		<reference ref_id="CVE-2015-3814" ref_url="https://www.suse.com/security/cve/CVE-2015-3814/" source="CVE"/>
		<reference ref_id="CVE-2015-7830" ref_url="https://www.suse.com/security/cve/CVE-2015-7830/" source="CVE"/>
		<reference ref_id="CVE-2015-8711" ref_url="https://www.suse.com/security/cve/CVE-2015-8711/" source="CVE"/>
		<reference ref_id="CVE-2015-8712" ref_url="https://www.suse.com/security/cve/CVE-2015-8712/" source="CVE"/>
		<reference ref_id="CVE-2015-8713" ref_url="https://www.suse.com/security/cve/CVE-2015-8713/" source="CVE"/>
		<reference ref_id="CVE-2015-8714" ref_url="https://www.suse.com/security/cve/CVE-2015-8714/" source="CVE"/>
		<reference ref_id="CVE-2015-8715" ref_url="https://www.suse.com/security/cve/CVE-2015-8715/" source="CVE"/>
		<reference ref_id="CVE-2015-8716" ref_url="https://www.suse.com/security/cve/CVE-2015-8716/" source="CVE"/>
		<reference ref_id="CVE-2015-8717" ref_url="https://www.suse.com/security/cve/CVE-2015-8717/" source="CVE"/>
		<reference ref_id="CVE-2015-8718" ref_url="https://www.suse.com/security/cve/CVE-2015-8718/" source="CVE"/>
		<reference ref_id="CVE-2015-8719" ref_url="https://www.suse.com/security/cve/CVE-2015-8719/" source="CVE"/>
		<reference ref_id="CVE-2015-8720" ref_url="https://www.suse.com/security/cve/CVE-2015-8720/" source="CVE"/>
		<reference ref_id="CVE-2015-8721" ref_url="https://www.suse.com/security/cve/CVE-2015-8721/" source="CVE"/>
		<reference ref_id="CVE-2015-8722" ref_url="https://www.suse.com/security/cve/CVE-2015-8722/" source="CVE"/>
		<reference ref_id="CVE-2015-8723" ref_url="https://www.suse.com/security/cve/CVE-2015-8723/" source="CVE"/>
		<reference ref_id="CVE-2015-8724" ref_url="https://www.suse.com/security/cve/CVE-2015-8724/" source="CVE"/>
		<reference ref_id="CVE-2015-8725" ref_url="https://www.suse.com/security/cve/CVE-2015-8725/" source="CVE"/>
		<reference ref_id="CVE-2015-8726" ref_url="https://www.suse.com/security/cve/CVE-2015-8726/" source="CVE"/>
		<reference ref_id="CVE-2015-8727" ref_url="https://www.suse.com/security/cve/CVE-2015-8727/" source="CVE"/>
		<reference ref_id="CVE-2015-8728" ref_url="https://www.suse.com/security/cve/CVE-2015-8728/" source="CVE"/>
		<reference ref_id="CVE-2015-8729" ref_url="https://www.suse.com/security/cve/CVE-2015-8729/" source="CVE"/>
		<reference ref_id="CVE-2015-8730" ref_url="https://www.suse.com/security/cve/CVE-2015-8730/" source="CVE"/>
		<reference ref_id="CVE-2015-8731" ref_url="https://www.suse.com/security/cve/CVE-2015-8731/" source="CVE"/>
		<reference ref_id="CVE-2015-8732" ref_url="https://www.suse.com/security/cve/CVE-2015-8732/" source="CVE"/>
		<reference ref_id="CVE-2015-8733" ref_url="https://www.suse.com/security/cve/CVE-2015-8733/" source="CVE"/>
		<reference ref_id="CVE-2016-2523" ref_url="https://www.suse.com/security/cve/CVE-2016-2523/" source="CVE"/>
		<reference ref_id="CVE-2016-2530" ref_url="https://www.suse.com/security/cve/CVE-2016-2530/" source="CVE"/>
		<reference ref_id="CVE-2016-2531" ref_url="https://www.suse.com/security/cve/CVE-2016-2531/" source="CVE"/>
		<reference ref_id="CVE-2016-2532" ref_url="https://www.suse.com/security/cve/CVE-2016-2532/" source="CVE"/>
		<reference ref_id="CVE-2016-5350" ref_url="https://www.suse.com/security/cve/CVE-2016-5350/" source="CVE"/>
		<reference ref_id="CVE-2016-5351" ref_url="https://www.suse.com/security/cve/CVE-2016-5351/" source="CVE"/>
		<reference ref_id="CVE-2016-5352" ref_url="https://www.suse.com/security/cve/CVE-2016-5352/" source="CVE"/>
		<reference ref_id="CVE-2016-5353" ref_url="https://www.suse.com/security/cve/CVE-2016-5353/" source="CVE"/>
		<reference ref_id="CVE-2016-5354" ref_url="https://www.suse.com/security/cve/CVE-2016-5354/" source="CVE"/>
		<reference ref_id="CVE-2016-5355" ref_url="https://www.suse.com/security/cve/CVE-2016-5355/" source="CVE"/>
		<reference ref_id="CVE-2016-5356" ref_url="https://www.suse.com/security/cve/CVE-2016-5356/" source="CVE"/>
		<reference ref_id="CVE-2016-5357" ref_url="https://www.suse.com/security/cve/CVE-2016-5357/" source="CVE"/>
		<reference ref_id="CVE-2016-5358" ref_url="https://www.suse.com/security/cve/CVE-2016-5358/" source="CVE"/>
		<reference ref_id="CVE-2016-5359" ref_url="https://www.suse.com/security/cve/CVE-2016-5359/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="CVE-2016-6504" ref_url="https://www.suse.com/security/cve/CVE-2016-6504/" source="CVE"/>
		<reference ref_id="CVE-2016-6505" ref_url="https://www.suse.com/security/cve/CVE-2016-6505/" source="CVE"/>
		<reference ref_id="CVE-2016-6506" ref_url="https://www.suse.com/security/cve/CVE-2016-6506/" source="CVE"/>
		<reference ref_id="CVE-2016-6507" ref_url="https://www.suse.com/security/cve/CVE-2016-6507/" source="CVE"/>
		<reference ref_id="CVE-2016-6508" ref_url="https://www.suse.com/security/cve/CVE-2016-6508/" source="CVE"/>
		<reference ref_id="CVE-2016-6509" ref_url="https://www.suse.com/security/cve/CVE-2016-6509/" source="CVE"/>
		<reference ref_id="CVE-2016-6510" ref_url="https://www.suse.com/security/cve/CVE-2016-6510/" source="CVE"/>
		<reference ref_id="CVE-2016-6511" ref_url="https://www.suse.com/security/cve/CVE-2016-6511/" source="CVE"/>
		<reference ref_id="CVE-2016-7175" ref_url="https://www.suse.com/security/cve/CVE-2016-7175/" source="CVE"/>
		<reference ref_id="CVE-2016-7176" ref_url="https://www.suse.com/security/cve/CVE-2016-7176/" source="CVE"/>
		<reference ref_id="CVE-2016-7177" ref_url="https://www.suse.com/security/cve/CVE-2016-7177/" source="CVE"/>
		<reference ref_id="CVE-2016-7178" ref_url="https://www.suse.com/security/cve/CVE-2016-7178/" source="CVE"/>
		<reference ref_id="CVE-2016-7179" ref_url="https://www.suse.com/security/cve/CVE-2016-7179/" source="CVE"/>
		<reference ref_id="CVE-2016-7180" ref_url="https://www.suse.com/security/cve/CVE-2016-7180/" source="CVE"/>
		<reference ref_id="CVE-2016-9373" ref_url="https://www.suse.com/security/cve/CVE-2016-9373/" source="CVE"/>
		<reference ref_id="CVE-2016-9374" ref_url="https://www.suse.com/security/cve/CVE-2016-9374/" source="CVE"/>
		<reference ref_id="CVE-2016-9375" ref_url="https://www.suse.com/security/cve/CVE-2016-9375/" source="CVE"/>
		<reference ref_id="CVE-2016-9376" ref_url="https://www.suse.com/security/cve/CVE-2016-9376/" source="CVE"/>
		<reference ref_id="CVE-2017-5596" ref_url="https://www.suse.com/security/cve/CVE-2017-5596/" source="CVE"/>
		<reference ref_id="CVE-2017-5597" ref_url="https://www.suse.com/security/cve/CVE-2017-5597/" source="CVE"/>
		<reference ref_id="CVE-2017-6014" ref_url="https://www.suse.com/security/cve/CVE-2017-6014/" source="CVE"/>
		<reference ref_id="CVE-2017-7700" ref_url="https://www.suse.com/security/cve/CVE-2017-7700/" source="CVE"/>
		<reference ref_id="CVE-2017-7701" ref_url="https://www.suse.com/security/cve/CVE-2017-7701/" source="CVE"/>
		<reference ref_id="CVE-2017-7702" ref_url="https://www.suse.com/security/cve/CVE-2017-7702/" source="CVE"/>
		<reference ref_id="CVE-2017-7703" ref_url="https://www.suse.com/security/cve/CVE-2017-7703/" source="CVE"/>
		<reference ref_id="CVE-2017-7704" ref_url="https://www.suse.com/security/cve/CVE-2017-7704/" source="CVE"/>
		<reference ref_id="CVE-2017-7705" ref_url="https://www.suse.com/security/cve/CVE-2017-7705/" source="CVE"/>
		<reference ref_id="CVE-2017-7745" ref_url="https://www.suse.com/security/cve/CVE-2017-7745/" source="CVE"/>
		<reference ref_id="CVE-2017-7746" ref_url="https://www.suse.com/security/cve/CVE-2017-7746/" source="CVE"/>
		<reference ref_id="CVE-2017-7747" ref_url="https://www.suse.com/security/cve/CVE-2017-7747/" source="CVE"/>
		<reference ref_id="CVE-2017-7748" ref_url="https://www.suse.com/security/cve/CVE-2017-7748/" source="CVE"/>
		<reference ref_id="CVE-2017-9343" ref_url="https://www.suse.com/security/cve/CVE-2017-9343/" source="CVE"/>
		<reference ref_id="CVE-2017-9344" ref_url="https://www.suse.com/security/cve/CVE-2017-9344/" source="CVE"/>
		<reference ref_id="CVE-2017-9345" ref_url="https://www.suse.com/security/cve/CVE-2017-9345/" source="CVE"/>
		<reference ref_id="CVE-2017-9346" ref_url="https://www.suse.com/security/cve/CVE-2017-9346/" source="CVE"/>
		<reference ref_id="CVE-2017-9347" ref_url="https://www.suse.com/security/cve/CVE-2017-9347/" source="CVE"/>
		<reference ref_id="CVE-2017-9348" ref_url="https://www.suse.com/security/cve/CVE-2017-9348/" source="CVE"/>
		<reference ref_id="CVE-2017-9349" ref_url="https://www.suse.com/security/cve/CVE-2017-9349/" source="CVE"/>
		<reference ref_id="CVE-2017-9350" ref_url="https://www.suse.com/security/cve/CVE-2017-9350/" source="CVE"/>
		<reference ref_id="CVE-2017-9351" ref_url="https://www.suse.com/security/cve/CVE-2017-9351/" source="CVE"/>
		<reference ref_id="CVE-2017-9352" ref_url="https://www.suse.com/security/cve/CVE-2017-9352/" source="CVE"/>
		<reference ref_id="CVE-2017-9353" ref_url="https://www.suse.com/security/cve/CVE-2017-9353/" source="CVE"/>
		<reference ref_id="CVE-2017-9354" ref_url="https://www.suse.com/security/cve/CVE-2017-9354/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark8-2.2.7-47.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1210/">CVE-2009-1210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1267/">CVE-2009-1267</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1268/">CVE-2009-1268</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1269/">CVE-2009-1269</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3241/">CVE-2009-3241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3242/">CVE-2009-3242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3243/">CVE-2009-3243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1455/">CVE-2010-1455</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2993/">CVE-2010-2993</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3445/">CVE-2010-3445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4300/">CVE-2010-4300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4301/">CVE-2010-4301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4538/">CVE-2010-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0024/">CVE-2011-0024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0538/">CVE-2011-0538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0713/">CVE-2011-0713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1138/">CVE-2011-1138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1139/">CVE-2011-1139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1140/">CVE-2011-1140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1143/">CVE-2011-1143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1590/">CVE-2011-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1591/">CVE-2011-1591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1592/">CVE-2011-1592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1957/">CVE-2011-1957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1958/">CVE-2011-1958</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1959/">CVE-2011-1959</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2174/">CVE-2011-2174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2175/">CVE-2011-2175</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2597/">CVE-2011-2597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2698/">CVE-2011-2698</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3266/">CVE-2011-3266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3360/">CVE-2011-3360</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3483/">CVE-2011-3483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2392/">CVE-2012-2392</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2393/">CVE-2012-2393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2394/">CVE-2012-2394</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3548/">CVE-2012-3548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4048/">CVE-2012-4048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4049/">CVE-2012-4049</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4285/">CVE-2012-4285</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-4286/">CVE-2012-4286</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4287/">CVE-2012-4287</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4288/">CVE-2012-4288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4289/">CVE-2012-4289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4290/">CVE-2012-4290</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4291/">CVE-2012-4291</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4292/">CVE-2012-4292</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4293/">CVE-2012-4293</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4294/">CVE-2012-4294</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4295/">CVE-2012-4295</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4296/">CVE-2012-4296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4297/">CVE-2012-4297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4298/">CVE-2012-4298</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5237/">CVE-2012-5237</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5238/">CVE-2012-5238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5239/">CVE-2012-5239</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5240/">CVE-2012-5240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5592/">CVE-2012-5592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5593/">CVE-2012-5593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5594/">CVE-2012-5594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5595/">CVE-2012-5595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5596/">CVE-2012-5596</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5597/">CVE-2012-5597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5598/">CVE-2012-5598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5599/">CVE-2012-5599</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5600/">CVE-2012-5600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5601/">CVE-2012-5601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5602/">CVE-2012-5602</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1572/">CVE-2013-1572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1573/">CVE-2013-1573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1574/">CVE-2013-1574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1575/">CVE-2013-1575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1576/">CVE-2013-1576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1577/">CVE-2013-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1578/">CVE-2013-1578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1579/">CVE-2013-1579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1580/">CVE-2013-1580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1581/">CVE-2013-1581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1582/">CVE-2013-1582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1583/">CVE-2013-1583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1584/">CVE-2013-1584</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1585/">CVE-2013-1585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1586/">CVE-2013-1586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1587/">CVE-2013-1587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1588/">CVE-2013-1588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1589/">CVE-2013-1589</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1590/">CVE-2013-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2475/">CVE-2013-2475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2476/">CVE-2013-2476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2477/">CVE-2013-2477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2478/">CVE-2013-2478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2479/">CVE-2013-2479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2480/">CVE-2013-2480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2481/">CVE-2013-2481</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2482/">CVE-2013-2482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2483/">CVE-2013-2483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2484/">CVE-2013-2484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2485/">CVE-2013-2485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2486/">CVE-2013-2486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2487/">CVE-2013-2487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2488/">CVE-2013-2488</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3555/">CVE-2013-3555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3556/">CVE-2013-3556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3557/">CVE-2013-3557</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3558/">CVE-2013-3558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3559/">CVE-2013-3559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3560/">CVE-2013-3560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3561/">CVE-2013-3561</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3562/">CVE-2013-3562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4083/">CVE-2013-4083</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4920/">CVE-2013-4920</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4921/">CVE-2013-4921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4922/">CVE-2013-4922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4923/">CVE-2013-4923</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4924/">CVE-2013-4924</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4925/">CVE-2013-4925</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4926/">CVE-2013-4926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4927/">CVE-2013-4927</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4928/">CVE-2013-4928</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4929/">CVE-2013-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4930/">CVE-2013-4930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4931/">CVE-2013-4931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4932/">CVE-2013-4932</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4933/">CVE-2013-4933</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4934/">CVE-2013-4934</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4935/">CVE-2013-4935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4936/">CVE-2013-4936</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5717/">CVE-2013-5717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5718/">CVE-2013-5718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5719/">CVE-2013-5719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5720/">CVE-2013-5720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5721/">CVE-2013-5721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5722/">CVE-2013-5722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6336/">CVE-2013-6336</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6337/">CVE-2013-6337</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6338/">CVE-2013-6338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6339/">CVE-2013-6339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6340/">CVE-2013-6340</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7112/">CVE-2013-7112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7113/">CVE-2013-7113</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7114/">CVE-2013-7114</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2281/">CVE-2014-2281</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2282/">CVE-2014-2282</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2283/">CVE-2014-2283</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2299/">CVE-2014-2299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2907/">CVE-2014-2907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4020/">CVE-2014-4020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5161/">CVE-2014-5161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5162/">CVE-2014-5162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5163/">CVE-2014-5163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5164/">CVE-2014-5164</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5165/">CVE-2014-5165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0559/">CVE-2015-0559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0560/">CVE-2015-0560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0561/">CVE-2015-0561</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0562/">CVE-2015-0562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0563/">CVE-2015-0563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0564/">CVE-2015-0564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2188/">CVE-2015-2188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2189/">CVE-2015-2189</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2191/">CVE-2015-2191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3811/">CVE-2015-3811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3812/">CVE-2015-3812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3813/">CVE-2015-3813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3814/">CVE-2015-3814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7830/">CVE-2015-7830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8711/">CVE-2015-8711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8712/">CVE-2015-8712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8713/">CVE-2015-8713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8714/">CVE-2015-8714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8715/">CVE-2015-8715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8716/">CVE-2015-8716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8717/">CVE-2015-8717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8718/">CVE-2015-8718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8719/">CVE-2015-8719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8720/">CVE-2015-8720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8721/">CVE-2015-8721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8722/">CVE-2015-8722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8723/">CVE-2015-8723</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8724/">CVE-2015-8724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8725/">CVE-2015-8725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8726/">CVE-2015-8726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8727/">CVE-2015-8727</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8728/">CVE-2015-8728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8729/">CVE-2015-8729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8730/">CVE-2015-8730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8731/">CVE-2015-8731</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8732/">CVE-2015-8732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8733/">CVE-2015-8733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2523/">CVE-2016-2523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2530/">CVE-2016-2530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2531/">CVE-2016-2531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2532/">CVE-2016-2532</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5350/">CVE-2016-5350</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5351/">CVE-2016-5351</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5352/">CVE-2016-5352</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5353/">CVE-2016-5353</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5354/">CVE-2016-5354</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5355/">CVE-2016-5355</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5356/">CVE-2016-5356</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5357/">CVE-2016-5357</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5358/">CVE-2016-5358</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5359/">CVE-2016-5359</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6504/">CVE-2016-6504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6505/">CVE-2016-6505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6506/">CVE-2016-6506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6507/">CVE-2016-6507</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6508/">CVE-2016-6508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6509/">CVE-2016-6509</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6510/">CVE-2016-6510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6511/">CVE-2016-6511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7175/">CVE-2016-7175</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7176/">CVE-2016-7176</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7177/">CVE-2016-7177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7178/">CVE-2016-7178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7179/">CVE-2016-7179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7180/">CVE-2016-7180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9373/">CVE-2016-9373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9374/">CVE-2016-9374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9375/">CVE-2016-9375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9376/">CVE-2016-9376</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5596/">CVE-2017-5596</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5597/">CVE-2017-5597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6014/">CVE-2017-6014</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7700/">CVE-2017-7700</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7701/">CVE-2017-7701</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7702/">CVE-2017-7702</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7703/">CVE-2017-7703</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7704/">CVE-2017-7704</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7705/">CVE-2017-7705</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7745/">CVE-2017-7745</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7746/">CVE-2017-7746</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7747/">CVE-2017-7747</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7748/">CVE-2017-7748</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9343/">CVE-2017-9343</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9344/">CVE-2017-9344</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9345/">CVE-2017-9345</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9346/">CVE-2017-9346</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9347/">CVE-2017-9347</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9348/">CVE-2017-9348</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9349/">CVE-2017-9349</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9350/">CVE-2017-9350</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9351/">CVE-2017-9351</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9352/">CVE-2017-9352</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9353/">CVE-2017-9353</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9354/">CVE-2017-9354</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76707" version="1" class="patch">
	<metadata>
		<title>libwmf-0_2-7-0.2.8.4-242.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-0848" ref_url="https://www.suse.com/security/cve/CVE-2015-0848/" source="CVE"/>
		<reference ref_id="CVE-2015-4588" ref_url="https://www.suse.com/security/cve/CVE-2015-4588/" source="CVE"/>
		<reference ref_id="CVE-2015-4695" ref_url="https://www.suse.com/security/cve/CVE-2015-4695/" source="CVE"/>
		<reference ref_id="CVE-2015-4696" ref_url="https://www.suse.com/security/cve/CVE-2015-4696/" source="CVE"/>
		<description>
These are all security issues fixed in the libwmf-0_2-7-0.2.8.4-242.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0848/">CVE-2015-0848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4588/">CVE-2015-4588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4695/">CVE-2015-4695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4696/">CVE-2015-4696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114120" comment="libwmf-0_2-7-0.2.8.4-242.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76708" version="1" class="patch">
	<metadata>
		<title>libxcb-dri2-0-1.10-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-2064" ref_url="https://www.suse.com/security/cve/CVE-2013-2064/" source="CVE"/>
		<description>
These are all security issues fixed in the libxcb-dri2-0-1.10-3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2064/">CVE-2013-2064</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141007" comment="libxcb-dri2-0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141008" comment="libxcb-dri2-0-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141009" comment="libxcb-dri3-0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141010" comment="libxcb-dri3-0-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141011" comment="libxcb-glx0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141012" comment="libxcb-glx0-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141013" comment="libxcb-present0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141014" comment="libxcb-present0-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141015" comment="libxcb-randr0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141016" comment="libxcb-render0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141017" comment="libxcb-render0-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141018" comment="libxcb-shape0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141019" comment="libxcb-shm0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141020" comment="libxcb-shm0-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141021" comment="libxcb-sync1-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141022" comment="libxcb-sync1-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141023" comment="libxcb-xf86dri0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141024" comment="libxcb-xfixes0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141025" comment="libxcb-xfixes0-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141026" comment="libxcb-xinerama0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141027" comment="libxcb-xkb1-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141028" comment="libxcb-xkb1-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141029" comment="libxcb-xv0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141030" comment="libxcb1-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141031" comment="libxcb1-32bit-1.10-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76709" version="1" class="patch">
	<metadata>
		<title>libxerces-c-3_1-3.1.1-12.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-1885" ref_url="https://www.suse.com/security/cve/CVE-2009-1885/" source="CVE"/>
		<reference ref_id="CVE-2015-0252" ref_url="https://www.suse.com/security/cve/CVE-2015-0252/" source="CVE"/>
		<reference ref_id="CVE-2016-0729" ref_url="https://www.suse.com/security/cve/CVE-2016-0729/" source="CVE"/>
		<reference ref_id="CVE-2016-2099" ref_url="https://www.suse.com/security/cve/CVE-2016-2099/" source="CVE"/>
		<reference ref_id="CVE-2016-4463" ref_url="https://www.suse.com/security/cve/CVE-2016-4463/" source="CVE"/>
		<description>
These are all security issues fixed in the libxerces-c-3_1-3.1.1-12.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1885/">CVE-2009-1885</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0252/">CVE-2015-0252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0729/">CVE-2016-0729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2099/">CVE-2016-2099</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4463/">CVE-2016-4463</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131022" comment="libxerces-c-3_1-3.1.1-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131023" comment="libxerces-c-3_1-32bit-3.1.1-12.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76710" version="1" class="patch">
	<metadata>
		<title>libxml2-2-2.9.4-45.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-4225" ref_url="https://www.suse.com/security/cve/CVE-2008-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-4226" ref_url="https://www.suse.com/security/cve/CVE-2008-4226/" source="CVE"/>
		<reference ref_id="CVE-2008-4409" ref_url="https://www.suse.com/security/cve/CVE-2008-4409/" source="CVE"/>
		<reference ref_id="CVE-2010-4494" ref_url="https://www.suse.com/security/cve/CVE-2010-4494/" source="CVE"/>
		<reference ref_id="CVE-2011-1944" ref_url="https://www.suse.com/security/cve/CVE-2011-1944/" source="CVE"/>
		<reference ref_id="CVE-2012-5134" ref_url="https://www.suse.com/security/cve/CVE-2012-5134/" source="CVE"/>
		<reference ref_id="CVE-2013-0338" ref_url="https://www.suse.com/security/cve/CVE-2013-0338/" source="CVE"/>
		<reference ref_id="CVE-2013-1969" ref_url="https://www.suse.com/security/cve/CVE-2013-1969/" source="CVE"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2014-3660" ref_url="https://www.suse.com/security/cve/CVE-2014-3660/" source="CVE"/>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-8035" ref_url="https://www.suse.com/security/cve/CVE-2015-8035/" source="CVE"/>
		<reference ref_id="CVE-2015-8241" ref_url="https://www.suse.com/security/cve/CVE-2015-8241/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2015-8317" ref_url="https://www.suse.com/security/cve/CVE-2015-8317/" source="CVE"/>
		<reference ref_id="CVE-2015-8710" ref_url="https://www.suse.com/security/cve/CVE-2015-8710/" source="CVE"/>
		<reference ref_id="CVE-2016-1762" ref_url="https://www.suse.com/security/cve/CVE-2016-1762/" source="CVE"/>
		<reference ref_id="CVE-2016-1833" ref_url="https://www.suse.com/security/cve/CVE-2016-1833/" source="CVE"/>
		<reference ref_id="CVE-2016-1834" ref_url="https://www.suse.com/security/cve/CVE-2016-1834/" source="CVE"/>
		<reference ref_id="CVE-2016-1835" ref_url="https://www.suse.com/security/cve/CVE-2016-1835/" source="CVE"/>
		<reference ref_id="CVE-2016-1836" ref_url="https://www.suse.com/security/cve/CVE-2016-1836/" source="CVE"/>
		<reference ref_id="CVE-2016-1837" ref_url="https://www.suse.com/security/cve/CVE-2016-1837/" source="CVE"/>
		<reference ref_id="CVE-2016-1838" ref_url="https://www.suse.com/security/cve/CVE-2016-1838/" source="CVE"/>
		<reference ref_id="CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839/" source="CVE"/>
		<reference ref_id="CVE-2016-1840" ref_url="https://www.suse.com/security/cve/CVE-2016-1840/" source="CVE"/>
		<reference ref_id="CVE-2016-3627" ref_url="https://www.suse.com/security/cve/CVE-2016-3627/" source="CVE"/>
		<reference ref_id="CVE-2016-3705" ref_url="https://www.suse.com/security/cve/CVE-2016-3705/" source="CVE"/>
		<reference ref_id="CVE-2016-4483" ref_url="https://www.suse.com/security/cve/CVE-2016-4483/" source="CVE"/>
		<reference ref_id="CVE-2016-4658" ref_url="https://www.suse.com/security/cve/CVE-2016-4658/" source="CVE"/>
		<reference ref_id="CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318/" source="CVE"/>
		<reference ref_id="CVE-2016-9597" ref_url="https://www.suse.com/security/cve/CVE-2016-9597/" source="CVE"/>
		<reference ref_id="CVE-2017-0663" ref_url="https://www.suse.com/security/cve/CVE-2017-0663/" source="CVE"/>
		<reference ref_id="CVE-2017-5969" ref_url="https://www.suse.com/security/cve/CVE-2017-5969/" source="CVE"/>
		<reference ref_id="CVE-2017-7375" ref_url="https://www.suse.com/security/cve/CVE-2017-7375/" source="CVE"/>
		<reference ref_id="CVE-2017-7376" ref_url="https://www.suse.com/security/cve/CVE-2017-7376/" source="CVE"/>
		<reference ref_id="CVE-2017-9047" ref_url="https://www.suse.com/security/cve/CVE-2017-9047/" source="CVE"/>
		<reference ref_id="CVE-2017-9048" ref_url="https://www.suse.com/security/cve/CVE-2017-9048/" source="CVE"/>
		<reference ref_id="CVE-2017-9049" ref_url="https://www.suse.com/security/cve/CVE-2017-9049/" source="CVE"/>
		<reference ref_id="CVE-2017-9050" ref_url="https://www.suse.com/security/cve/CVE-2017-9050/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2-2.9.4-45.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4225/">CVE-2008-4225</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4226/">CVE-2008-4226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4409/">CVE-2008-4409</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4494/">CVE-2010-4494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1944/">CVE-2011-1944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5134/">CVE-2012-5134</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0338/">CVE-2013-0338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1969/">CVE-2013-1969</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3660/">CVE-2014-3660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8035/">CVE-2015-8035</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8241/">CVE-2015-8241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8317/">CVE-2015-8317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8710/">CVE-2015-8710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1762/">CVE-2016-1762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1833/">CVE-2016-1833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1834/">CVE-2016-1834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1835/">CVE-2016-1835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1836/">CVE-2016-1836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1837/">CVE-2016-1837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1838/">CVE-2016-1838</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1840/">CVE-2016-1840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3627/">CVE-2016-3627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3705/">CVE-2016-3705</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4483/">CVE-2016-4483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4658/">CVE-2016-4658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9597/">CVE-2016-9597</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0663/">CVE-2017-0663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5969/">CVE-2017-5969</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7375/">CVE-2017-7375</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7376/">CVE-2017-7376</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9047/">CVE-2017-9047</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9048/">CVE-2017-9048</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9049/">CVE-2017-9049</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9050/">CVE-2017-9050</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76711" version="1" class="patch">
	<metadata>
		<title>libxslt-tools-1.1.28-16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-7995" ref_url="https://www.suse.com/security/cve/CVE-2015-7995/" source="CVE"/>
		<reference ref_id="CVE-2015-9019" ref_url="https://www.suse.com/security/cve/CVE-2015-9019/" source="CVE"/>
		<reference ref_id="CVE-2016-4738" ref_url="https://www.suse.com/security/cve/CVE-2016-4738/" source="CVE"/>
		<reference ref_id="CVE-2017-5029" ref_url="https://www.suse.com/security/cve/CVE-2017-5029/" source="CVE"/>
		<description>
These are all security issues fixed in the libxslt-tools-1.1.28-16.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7995/">CVE-2015-7995</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-9019/">CVE-2015-9019</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4738/">CVE-2016-4738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5029/">CVE-2017-5029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009155536" comment="libxslt-tools-1.1.28-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155537" comment="libxslt1-1.1.28-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155538" comment="libxslt1-32bit-1.1.28-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76712" version="1" class="patch">
	<metadata>
		<title>libyaml-0-2-0.1.6-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-6393" ref_url="https://www.suse.com/security/cve/CVE-2013-6393/" source="CVE"/>
		<reference ref_id="CVE-2014-2525" ref_url="https://www.suse.com/security/cve/CVE-2014-2525/" source="CVE"/>
		<reference ref_id="CVE-2014-9130" ref_url="https://www.suse.com/security/cve/CVE-2014-9130/" source="CVE"/>
		<description>
These are all security issues fixed in the libyaml-0-2-0.1.6-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6393/">CVE-2013-6393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2525/">CVE-2014-2525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9130/">CVE-2014-9130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141036" comment="libyaml-0-2-0.1.6-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76713" version="1" class="patch">
	<metadata>
		<title>libz1-1.2.8-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<description>
These are all security issues fixed in the libz1-1.2.8-11.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009146180" comment="libz1-1.2.8-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009146181" comment="libz1-32bit-1.2.8-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512005" comment="zlib-devel-1.2.8-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76714" version="1" class="patch">
	<metadata>
		<title>libzip2-0.11.1-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<reference ref_id="CVE-2012-1162" ref_url="https://www.suse.com/security/cve/CVE-2012-1162/" source="CVE"/>
		<reference ref_id="CVE-2012-1163" ref_url="https://www.suse.com/security/cve/CVE-2012-1163/" source="CVE"/>
		<reference ref_id="CVE-2015-2331" ref_url="https://www.suse.com/security/cve/CVE-2015-2331/" source="CVE"/>
		<description>
These are all security issues fixed in the libzip2-0.11.1-12.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1162/">CVE-2012-1162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1163/">CVE-2012-1163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2331/">CVE-2015-2331</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141037" comment="libzip2-0.11.1-12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76715" version="1" class="patch">
	<metadata>
		<title>libzmq3-4.0.4-14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-7202" ref_url="https://www.suse.com/security/cve/CVE-2014-7202/" source="CVE"/>
		<reference ref_id="CVE-2014-7203" ref_url="https://www.suse.com/security/cve/CVE-2014-7203/" source="CVE"/>
		<reference ref_id="CVE-2014-9721" ref_url="https://www.suse.com/security/cve/CVE-2014-9721/" source="CVE"/>
		<description>
These are all security issues fixed in the libzmq3-4.0.4-14.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7202/">CVE-2014-7202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7203/">CVE-2014-7203</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-9721/">CVE-2014-9721</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159706" comment="libzmq3-4.0.4-14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76716" version="1" class="patch">
	<metadata>
		<title>libzzip-0-13-0.13.62-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2017-5974" ref_url="https://www.suse.com/security/cve/CVE-2017-5974/" source="CVE"/>
		<reference ref_id="CVE-2017-5975" ref_url="https://www.suse.com/security/cve/CVE-2017-5975/" source="CVE"/>
		<reference ref_id="CVE-2017-5976" ref_url="https://www.suse.com/security/cve/CVE-2017-5976/" source="CVE"/>
		<reference ref_id="CVE-2017-5977" ref_url="https://www.suse.com/security/cve/CVE-2017-5977/" source="CVE"/>
		<reference ref_id="CVE-2017-5978" ref_url="https://www.suse.com/security/cve/CVE-2017-5978/" source="CVE"/>
		<reference ref_id="CVE-2017-5979" ref_url="https://www.suse.com/security/cve/CVE-2017-5979/" source="CVE"/>
		<reference ref_id="CVE-2017-5980" ref_url="https://www.suse.com/security/cve/CVE-2017-5980/" source="CVE"/>
		<reference ref_id="CVE-2017-5981" ref_url="https://www.suse.com/security/cve/CVE-2017-5981/" source="CVE"/>
		<description>
These are all security issues fixed in the libzzip-0-13-0.13.62-9.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5974/">CVE-2017-5974</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5975/">CVE-2017-5975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5976/">CVE-2017-5976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5977/">CVE-2017-5977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5978/">CVE-2017-5978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5979/">CVE-2017-5979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5980/">CVE-2017-5980</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5981/">CVE-2017-5981</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154700" comment="libzzip-0-13-0.13.62-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76717" version="1" class="patch">
	<metadata>
		<title>logrotate-3.11.0-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1098" ref_url="https://www.suse.com/security/cve/CVE-2011-1098/" source="CVE"/>
		<reference ref_id="CVE-2011-1154" ref_url="https://www.suse.com/security/cve/CVE-2011-1154/" source="CVE"/>
		<reference ref_id="CVE-2011-1155" ref_url="https://www.suse.com/security/cve/CVE-2011-1155/" source="CVE"/>
		<description>
These are all security issues fixed in the logrotate-3.11.0-1.15 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1098/">CVE-2011-1098</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1154/">CVE-2011-1154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1155/">CVE-2011-1155</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159250" comment="logrotate-3.11.0-1.15 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76718" version="1" class="patch">
	<metadata>
		<title>m4-1.4.16-15.74 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-4029" ref_url="https://www.suse.com/security/cve/CVE-2009-4029/" source="CVE"/>
		<description>
These are all security issues fixed in the m4-1.4.16-15.74 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4029/">CVE-2009-4029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140466" comment="m4-1.4.16-15.74 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76719" version="1" class="patch">
	<metadata>
		<title>mailx-12.5-28.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2004-2771" ref_url="https://www.suse.com/security/cve/CVE-2004-2771/" source="CVE"/>
		<reference ref_id="CVE-2014-7844" ref_url="https://www.suse.com/security/cve/CVE-2014-7844/" source="CVE"/>
		<description>
These are all security issues fixed in the mailx-12.5-28.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2004-2771/">CVE-2004-2771</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-7844/">CVE-2014-7844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141041" comment="mailx-12.5-28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76720" version="1" class="patch">
	<metadata>
		<title>minicom-2.7-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2017-7467" ref_url="https://www.suse.com/security/cve/CVE-2017-7467/" source="CVE"/>
		<description>
These are all security issues fixed in the minicom-2.7-3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7467/">CVE-2017-7467</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154609" comment="minicom-2.7-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76721" version="1" class="patch">
	<metadata>
		<title>mipv6d-2.0.2.umip.0.4-19.77 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2522" ref_url="https://www.suse.com/security/cve/CVE-2010-2522/" source="CVE"/>
		<reference ref_id="CVE-2010-2523" ref_url="https://www.suse.com/security/cve/CVE-2010-2523/" source="CVE"/>
		<description>
These are all security issues fixed in the mipv6d-2.0.2.umip.0.4-19.77 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2522/">CVE-2010-2522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2523/">CVE-2010-2523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141042" comment="mipv6d-2.0.2.umip.0.4-19.77 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76722" version="1" class="patch">
	<metadata>
		<title>mozilla-nspr-32bit-4.13.1-18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<description>
These are all security issues fixed in the mozilla-nspr-32bit-4.13.1-18.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009155320" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155321" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76723" version="1" class="patch">
	<metadata>
		<title>mutt-1.6.0-54.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-0467" ref_url="https://www.suse.com/security/cve/CVE-2014-0467/" source="CVE"/>
		<reference ref_id="CVE-2014-9116" ref_url="https://www.suse.com/security/cve/CVE-2014-9116/" source="CVE"/>
		<description>
These are all security issues fixed in the mutt-1.6.0-54.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0467/">CVE-2014-0467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9116/">CVE-2014-9116</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141043" comment="mutt-1.6.0-54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76724" version="1" class="patch">
	<metadata>
		<title>ntp-4.2.8p10-63.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0159" ref_url="https://www.suse.com/security/cve/CVE-2009-0159/" source="CVE"/>
		<reference ref_id="CVE-2009-1252" ref_url="https://www.suse.com/security/cve/CVE-2009-1252/" source="CVE"/>
		<reference ref_id="CVE-2013-5211" ref_url="https://www.suse.com/security/cve/CVE-2013-5211/" source="CVE"/>
		<reference ref_id="CVE-2014-9293" ref_url="https://www.suse.com/security/cve/CVE-2014-9293/" source="CVE"/>
		<reference ref_id="CVE-2014-9294" ref_url="https://www.suse.com/security/cve/CVE-2014-9294/" source="CVE"/>
		<reference ref_id="CVE-2014-9295" ref_url="https://www.suse.com/security/cve/CVE-2014-9295/" source="CVE"/>
		<reference ref_id="CVE-2014-9296" ref_url="https://www.suse.com/security/cve/CVE-2014-9296/" source="CVE"/>
		<reference ref_id="CVE-2014-9297" ref_url="https://www.suse.com/security/cve/CVE-2014-9297/" source="CVE"/>
		<reference ref_id="CVE-2014-9298" ref_url="https://www.suse.com/security/cve/CVE-2014-9298/" source="CVE"/>
		<reference ref_id="CVE-2015-1798" ref_url="https://www.suse.com/security/cve/CVE-2015-1798/" source="CVE"/>
		<reference ref_id="CVE-2015-1799" ref_url="https://www.suse.com/security/cve/CVE-2015-1799/" source="CVE"/>
		<reference ref_id="CVE-2015-3405" ref_url="https://www.suse.com/security/cve/CVE-2015-3405/" source="CVE"/>
		<reference ref_id="CVE-2015-5219" ref_url="https://www.suse.com/security/cve/CVE-2015-5219/" source="CVE"/>
		<reference ref_id="CVE-2015-5300" ref_url="https://www.suse.com/security/cve/CVE-2015-5300/" source="CVE"/>
		<reference ref_id="CVE-2015-7691" ref_url="https://www.suse.com/security/cve/CVE-2015-7691/" source="CVE"/>
		<reference ref_id="CVE-2015-7692" ref_url="https://www.suse.com/security/cve/CVE-2015-7692/" source="CVE"/>
		<reference ref_id="CVE-2015-7701" ref_url="https://www.suse.com/security/cve/CVE-2015-7701/" source="CVE"/>
		<reference ref_id="CVE-2015-7702" ref_url="https://www.suse.com/security/cve/CVE-2015-7702/" source="CVE"/>
		<reference ref_id="CVE-2015-7703" ref_url="https://www.suse.com/security/cve/CVE-2015-7703/" source="CVE"/>
		<reference ref_id="CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704/" source="CVE"/>
		<reference ref_id="CVE-2015-7705" ref_url="https://www.suse.com/security/cve/CVE-2015-7705/" source="CVE"/>
		<reference ref_id="CVE-2015-7848" ref_url="https://www.suse.com/security/cve/CVE-2015-7848/" source="CVE"/>
		<reference ref_id="CVE-2015-7849" ref_url="https://www.suse.com/security/cve/CVE-2015-7849/" source="CVE"/>
		<reference ref_id="CVE-2015-7850" ref_url="https://www.suse.com/security/cve/CVE-2015-7850/" source="CVE"/>
		<reference ref_id="CVE-2015-7851" ref_url="https://www.suse.com/security/cve/CVE-2015-7851/" source="CVE"/>
		<reference ref_id="CVE-2015-7852" ref_url="https://www.suse.com/security/cve/CVE-2015-7852/" source="CVE"/>
		<reference ref_id="CVE-2015-7853" ref_url="https://www.suse.com/security/cve/CVE-2015-7853/" source="CVE"/>
		<reference ref_id="CVE-2015-7854" ref_url="https://www.suse.com/security/cve/CVE-2015-7854/" source="CVE"/>
		<reference ref_id="CVE-2015-7855" ref_url="https://www.suse.com/security/cve/CVE-2015-7855/" source="CVE"/>
		<reference ref_id="CVE-2015-7871" ref_url="https://www.suse.com/security/cve/CVE-2015-7871/" source="CVE"/>
		<reference ref_id="CVE-2015-7973" ref_url="https://www.suse.com/security/cve/CVE-2015-7973/" source="CVE"/>
		<reference ref_id="CVE-2015-7974" ref_url="https://www.suse.com/security/cve/CVE-2015-7974/" source="CVE"/>
		<reference ref_id="CVE-2015-7975" ref_url="https://www.suse.com/security/cve/CVE-2015-7975/" source="CVE"/>
		<reference ref_id="CVE-2015-7976" ref_url="https://www.suse.com/security/cve/CVE-2015-7976/" source="CVE"/>
		<reference ref_id="CVE-2015-7977" ref_url="https://www.suse.com/security/cve/CVE-2015-7977/" source="CVE"/>
		<reference ref_id="CVE-2015-7978" ref_url="https://www.suse.com/security/cve/CVE-2015-7978/" source="CVE"/>
		<reference ref_id="CVE-2015-7979" ref_url="https://www.suse.com/security/cve/CVE-2015-7979/" source="CVE"/>
		<reference ref_id="CVE-2015-8138" ref_url="https://www.suse.com/security/cve/CVE-2015-8138/" source="CVE"/>
		<reference ref_id="CVE-2015-8139" ref_url="https://www.suse.com/security/cve/CVE-2015-8139/" source="CVE"/>
		<reference ref_id="CVE-2015-8140" ref_url="https://www.suse.com/security/cve/CVE-2015-8140/" source="CVE"/>
		<reference ref_id="CVE-2015-8158" ref_url="https://www.suse.com/security/cve/CVE-2015-8158/" source="CVE"/>
		<reference ref_id="CVE-2016-1547" ref_url="https://www.suse.com/security/cve/CVE-2016-1547/" source="CVE"/>
		<reference ref_id="CVE-2016-1548" ref_url="https://www.suse.com/security/cve/CVE-2016-1548/" source="CVE"/>
		<reference ref_id="CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549/" source="CVE"/>
		<reference ref_id="CVE-2016-1550" ref_url="https://www.suse.com/security/cve/CVE-2016-1550/" source="CVE"/>
		<reference ref_id="CVE-2016-1551" ref_url="https://www.suse.com/security/cve/CVE-2016-1551/" source="CVE"/>
		<reference ref_id="CVE-2016-2516" ref_url="https://www.suse.com/security/cve/CVE-2016-2516/" source="CVE"/>
		<reference ref_id="CVE-2016-2517" ref_url="https://www.suse.com/security/cve/CVE-2016-2517/" source="CVE"/>
		<reference ref_id="CVE-2016-2518" ref_url="https://www.suse.com/security/cve/CVE-2016-2518/" source="CVE"/>
		<reference ref_id="CVE-2016-2519" ref_url="https://www.suse.com/security/cve/CVE-2016-2519/" source="CVE"/>
		<reference ref_id="CVE-2016-4953" ref_url="https://www.suse.com/security/cve/CVE-2016-4953/" source="CVE"/>
		<reference ref_id="CVE-2016-4954" ref_url="https://www.suse.com/security/cve/CVE-2016-4954/" source="CVE"/>
		<reference ref_id="CVE-2016-4955" ref_url="https://www.suse.com/security/cve/CVE-2016-4955/" source="CVE"/>
		<reference ref_id="CVE-2016-4956" ref_url="https://www.suse.com/security/cve/CVE-2016-4956/" source="CVE"/>
		<reference ref_id="CVE-2016-4957" ref_url="https://www.suse.com/security/cve/CVE-2016-4957/" source="CVE"/>
		<reference ref_id="CVE-2016-7426" ref_url="https://www.suse.com/security/cve/CVE-2016-7426/" source="CVE"/>
		<reference ref_id="CVE-2016-7427" ref_url="https://www.suse.com/security/cve/CVE-2016-7427/" source="CVE"/>
		<reference ref_id="CVE-2016-7428" ref_url="https://www.suse.com/security/cve/CVE-2016-7428/" source="CVE"/>
		<reference ref_id="CVE-2016-7429" ref_url="https://www.suse.com/security/cve/CVE-2016-7429/" source="CVE"/>
		<reference ref_id="CVE-2016-7431" ref_url="https://www.suse.com/security/cve/CVE-2016-7431/" source="CVE"/>
		<reference ref_id="CVE-2016-7433" ref_url="https://www.suse.com/security/cve/CVE-2016-7433/" source="CVE"/>
		<reference ref_id="CVE-2016-7434" ref_url="https://www.suse.com/security/cve/CVE-2016-7434/" source="CVE"/>
		<reference ref_id="CVE-2016-9042" ref_url="https://www.suse.com/security/cve/CVE-2016-9042/" source="CVE"/>
		<reference ref_id="CVE-2016-9310" ref_url="https://www.suse.com/security/cve/CVE-2016-9310/" source="CVE"/>
		<reference ref_id="CVE-2016-9311" ref_url="https://www.suse.com/security/cve/CVE-2016-9311/" source="CVE"/>
		<reference ref_id="CVE-2017-6451" ref_url="https://www.suse.com/security/cve/CVE-2017-6451/" source="CVE"/>
		<reference ref_id="CVE-2017-6458" ref_url="https://www.suse.com/security/cve/CVE-2017-6458/" source="CVE"/>
		<reference ref_id="CVE-2017-6460" ref_url="https://www.suse.com/security/cve/CVE-2017-6460/" source="CVE"/>
		<reference ref_id="CVE-2017-6462" ref_url="https://www.suse.com/security/cve/CVE-2017-6462/" source="CVE"/>
		<reference ref_id="CVE-2017-6463" ref_url="https://www.suse.com/security/cve/CVE-2017-6463/" source="CVE"/>
		<reference ref_id="CVE-2017-6464" ref_url="https://www.suse.com/security/cve/CVE-2017-6464/" source="CVE"/>
		<description>
These are all security issues fixed in the ntp-4.2.8p10-63.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0159/">CVE-2009-0159</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1252/">CVE-2009-1252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5211/">CVE-2013-5211</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9293/">CVE-2014-9293</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9294/">CVE-2014-9294</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9295/">CVE-2014-9295</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9296/">CVE-2014-9296</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9297/">CVE-2014-9297</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9298/">CVE-2014-9298</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1798/">CVE-2015-1798</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1799/">CVE-2015-1799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3405/">CVE-2015-3405</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5219/">CVE-2015-5219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5300/">CVE-2015-5300</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7691/">CVE-2015-7691</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7692/">CVE-2015-7692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7701/">CVE-2015-7701</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7702/">CVE-2015-7702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7703/">CVE-2015-7703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7705/">CVE-2015-7705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7848/">CVE-2015-7848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7849/">CVE-2015-7849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7850/">CVE-2015-7850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7851/">CVE-2015-7851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7852/">CVE-2015-7852</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7853/">CVE-2015-7853</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7854/">CVE-2015-7854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7855/">CVE-2015-7855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7871/">CVE-2015-7871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7973/">CVE-2015-7973</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7974/">CVE-2015-7974</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7975/">CVE-2015-7975</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7976/">CVE-2015-7976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7977/">CVE-2015-7977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7978/">CVE-2015-7978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7979/">CVE-2015-7979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8138/">CVE-2015-8138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8139/">CVE-2015-8139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8140/">CVE-2015-8140</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8158/">CVE-2015-8158</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1547/">CVE-2016-1547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1548/">CVE-2016-1548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1550/">CVE-2016-1550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1551/">CVE-2016-1551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2516/">CVE-2016-2516</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2517/">CVE-2016-2517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2518/">CVE-2016-2518</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2519/">CVE-2016-2519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4953/">CVE-2016-4953</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4954/">CVE-2016-4954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4955/">CVE-2016-4955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4956/">CVE-2016-4956</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4957/">CVE-2016-4957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7426/">CVE-2016-7426</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7427/">CVE-2016-7427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7428/">CVE-2016-7428</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7429/">CVE-2016-7429</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7431/">CVE-2016-7431</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7433/">CVE-2016-7433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7434/">CVE-2016-7434</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9042/">CVE-2016-9042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9310/">CVE-2016-9310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9311/">CVE-2016-9311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6451/">CVE-2017-6451</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6458/">CVE-2017-6458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6460/">CVE-2017-6460</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6462/">CVE-2017-6462</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6463/">CVE-2017-6463</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6464/">CVE-2017-6464</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76725" version="1" class="patch">
	<metadata>
		<title>opensc-0.13.0-1.122 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0368" ref_url="https://www.suse.com/security/cve/CVE-2009-0368/" source="CVE"/>
		<reference ref_id="CVE-2010-4523" ref_url="https://www.suse.com/security/cve/CVE-2010-4523/" source="CVE"/>
		<description>
These are all security issues fixed in the opensc-0.13.0-1.122 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0368/">CVE-2009-0368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4523/">CVE-2010-4523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141044" comment="opensc-0.13.0-1.122 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76726" version="1" class="patch">
	<metadata>
		<title>openslp-2.0.0-17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-3609" ref_url="https://www.suse.com/security/cve/CVE-2010-3609/" source="CVE"/>
		<reference ref_id="CVE-2016-4912" ref_url="https://www.suse.com/security/cve/CVE-2016-4912/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="CVE-2016-7567" ref_url="https://www.suse.com/security/cve/CVE-2016-7567/" source="CVE"/>
		<description>
These are all security issues fixed in the openslp-2.0.0-17.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3609/">CVE-2010-3609</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4912/">CVE-2016-4912</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7567/">CVE-2016-7567</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131298" comment="openslp-2.0.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131299" comment="openslp-32bit-2.0.0-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76727" version="1" class="patch">
	<metadata>
		<title>openssh-7.2p2-69.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-2653" ref_url="https://www.suse.com/security/cve/CVE-2014-2653/" source="CVE"/>
		<reference ref_id="CVE-2015-5352" ref_url="https://www.suse.com/security/cve/CVE-2015-5352/" source="CVE"/>
		<reference ref_id="CVE-2015-5600" ref_url="https://www.suse.com/security/cve/CVE-2015-5600/" source="CVE"/>
		<reference ref_id="CVE-2015-6563" ref_url="https://www.suse.com/security/cve/CVE-2015-6563/" source="CVE"/>
		<reference ref_id="CVE-2015-6564" ref_url="https://www.suse.com/security/cve/CVE-2015-6564/" source="CVE"/>
		<reference ref_id="CVE-2015-8325" ref_url="https://www.suse.com/security/cve/CVE-2015-8325/" source="CVE"/>
		<reference ref_id="CVE-2016-0777" ref_url="https://www.suse.com/security/cve/CVE-2016-0777/" source="CVE"/>
		<reference ref_id="CVE-2016-0778" ref_url="https://www.suse.com/security/cve/CVE-2016-0778/" source="CVE"/>
		<reference ref_id="CVE-2016-10009" ref_url="https://www.suse.com/security/cve/CVE-2016-10009/" source="CVE"/>
		<reference ref_id="CVE-2016-10010" ref_url="https://www.suse.com/security/cve/CVE-2016-10010/" source="CVE"/>
		<reference ref_id="CVE-2016-10011" ref_url="https://www.suse.com/security/cve/CVE-2016-10011/" source="CVE"/>
		<reference ref_id="CVE-2016-10012" ref_url="https://www.suse.com/security/cve/CVE-2016-10012/" source="CVE"/>
		<reference ref_id="CVE-2016-1908" ref_url="https://www.suse.com/security/cve/CVE-2016-1908/" source="CVE"/>
		<reference ref_id="CVE-2016-3115" ref_url="https://www.suse.com/security/cve/CVE-2016-3115/" source="CVE"/>
		<reference ref_id="CVE-2016-6210" ref_url="https://www.suse.com/security/cve/CVE-2016-6210/" source="CVE"/>
		<reference ref_id="CVE-2016-6515" ref_url="https://www.suse.com/security/cve/CVE-2016-6515/" source="CVE"/>
		<reference ref_id="CVE-2016-8858" ref_url="https://www.suse.com/security/cve/CVE-2016-8858/" source="CVE"/>
		<description>
These are all security issues fixed in the openssh-7.2p2-69.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2653/">CVE-2014-2653</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5352/">CVE-2015-5352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5600/">CVE-2015-5600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6563/">CVE-2015-6563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6564/">CVE-2015-6564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8325/">CVE-2015-8325</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0777/">CVE-2016-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0778/">CVE-2016-0778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10009/">CVE-2016-10009</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10010/">CVE-2016-10010</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10011/">CVE-2016-10011</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10012/">CVE-2016-10012</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1908/">CVE-2016-1908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3115/">CVE-2016-3115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6210/">CVE-2016-6210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6515/">CVE-2016-6515</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8858/">CVE-2016-8858</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159254" comment="openssh-7.2p2-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159256" comment="openssh-helpers-7.2p2-69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76728" version="1" class="patch">
	<metadata>
		<title>openvpn-2.3.8-16.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-8104" ref_url="https://www.suse.com/security/cve/CVE-2014-8104/" source="CVE"/>
		<reference ref_id="CVE-2016-6329" ref_url="https://www.suse.com/security/cve/CVE-2016-6329/" source="CVE"/>
		<reference ref_id="CVE-2017-7478" ref_url="https://www.suse.com/security/cve/CVE-2017-7478/" source="CVE"/>
		<reference ref_id="CVE-2017-7479" ref_url="https://www.suse.com/security/cve/CVE-2017-7479/" source="CVE"/>
		<reference ref_id="CVE-2017-7508" ref_url="https://www.suse.com/security/cve/CVE-2017-7508/" source="CVE"/>
		<reference ref_id="CVE-2017-7520" ref_url="https://www.suse.com/security/cve/CVE-2017-7520/" source="CVE"/>
		<reference ref_id="CVE-2017-7521" ref_url="https://www.suse.com/security/cve/CVE-2017-7521/" source="CVE"/>
		<description>
These are all security issues fixed in the openvpn-2.3.8-16.17.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8104/">CVE-2014-8104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6329/">CVE-2016-6329</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7478/">CVE-2017-7478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7479/">CVE-2017-7479</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7508/">CVE-2017-7508</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7520/">CVE-2017-7520</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7521/">CVE-2017-7521</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157217" comment="openvpn-2.3.8-16.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76729" version="1" class="patch">
	<metadata>
		<title>p7zip-9.20.1-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-1038" ref_url="https://www.suse.com/security/cve/CVE-2015-1038/" source="CVE"/>
		<reference ref_id="CVE-2016-2335" ref_url="https://www.suse.com/security/cve/CVE-2016-2335/" source="CVE"/>
		<description>
These are all security issues fixed in the p7zip-9.20.1-6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1038/">CVE-2015-1038</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2335/">CVE-2016-2335</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128891" comment="p7zip-9.20.1-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76730" version="1" class="patch">
	<metadata>
		<title>pam-1.1.8-23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-3430" ref_url="https://www.suse.com/security/cve/CVE-2010-3430/" source="CVE"/>
		<reference ref_id="CVE-2010-3431" ref_url="https://www.suse.com/security/cve/CVE-2010-3431/" source="CVE"/>
		<reference ref_id="CVE-2010-3853" ref_url="https://www.suse.com/security/cve/CVE-2010-3853/" source="CVE"/>
		<reference ref_id="CVE-2011-3148" ref_url="https://www.suse.com/security/cve/CVE-2011-3148/" source="CVE"/>
		<reference ref_id="CVE-2011-3149" ref_url="https://www.suse.com/security/cve/CVE-2011-3149/" source="CVE"/>
		<reference ref_id="CVE-2014-2583" ref_url="https://www.suse.com/security/cve/CVE-2014-2583/" source="CVE"/>
		<reference ref_id="CVE-2015-3238" ref_url="https://www.suse.com/security/cve/CVE-2015-3238/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-1.1.8-23.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3430/">CVE-2010-3430</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3431/">CVE-2010-3431</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3853/">CVE-2010-3853</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3148/">CVE-2011-3148</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3149/">CVE-2011-3149</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2583/">CVE-2014-2583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3238/">CVE-2015-3238</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009155972" comment="pam-1.1.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155973" comment="pam-32bit-1.1.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155974" comment="pam-doc-1.1.8-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76731" version="1" class="patch">
	<metadata>
		<title>pam-modules-12.1-23.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-3172" ref_url="https://www.suse.com/security/cve/CVE-2011-3172/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-modules-12.1-23.12 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3172/">CVE-2011-3172</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141767" comment="pam-modules-12.1-23.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141060" comment="pam-modules-32bit-12.1-23.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76732" version="1" class="patch">
	<metadata>
		<title>pam_krb5-2.4.4-4.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-3825" ref_url="https://www.suse.com/security/cve/CVE-2008-3825/" source="CVE"/>
		<reference ref_id="CVE-2009-1384" ref_url="https://www.suse.com/security/cve/CVE-2009-1384/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_krb5-2.4.4-4.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3825/">CVE-2008-3825</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1384/">CVE-2009-1384</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141061" comment="pam_krb5-2.4.4-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141062" comment="pam_krb5-32bit-2.4.4-4.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76733" version="1" class="patch">
	<metadata>
		<title>pam_ssh-2.0-1.40 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-1273" ref_url="https://www.suse.com/security/cve/CVE-2009-1273/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_ssh-2.0-1.40 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1273/">CVE-2009-1273</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141063" comment="pam_ssh-2.0-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141064" comment="pam_ssh-32bit-2.0-1.40 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76734" version="1" class="patch">
	<metadata>
		<title>patch-2.7.5-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-4651" ref_url="https://www.suse.com/security/cve/CVE-2010-4651/" source="CVE"/>
		<reference ref_id="CVE-2015-1196" ref_url="https://www.suse.com/security/cve/CVE-2015-1196/" source="CVE"/>
		<reference ref_id="CVE-2015-1395" ref_url="https://www.suse.com/security/cve/CVE-2015-1395/" source="CVE"/>
		<reference ref_id="CVE-2015-1396" ref_url="https://www.suse.com/security/cve/CVE-2015-1396/" source="CVE"/>
		<description>
These are all security issues fixed in the patch-2.7.5-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4651/">CVE-2010-4651</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1196/">CVE-2015-1196</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1395/">CVE-2015-1395</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1396/">CVE-2015-1396</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110205" comment="patch-2.7.5-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76735" version="1" class="patch">
	<metadata>
		<title>pcsc-ccid-1.4.25-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-4530" ref_url="https://www.suse.com/security/cve/CVE-2010-4530/" source="CVE"/>
		<description>
These are all security issues fixed in the pcsc-ccid-1.4.25-4.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4530/">CVE-2010-4530</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159258" comment="pcsc-ccid-1.4.25-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76736" version="1" class="patch">
	<metadata>
		<title>perl-32bit-5.18.2-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2761" ref_url="https://www.suse.com/security/cve/CVE-2010-2761/" source="CVE"/>
		<reference ref_id="CVE-2010-4410" ref_url="https://www.suse.com/security/cve/CVE-2010-4410/" source="CVE"/>
		<reference ref_id="CVE-2010-4411" ref_url="https://www.suse.com/security/cve/CVE-2010-4411/" source="CVE"/>
		<reference ref_id="CVE-2010-4777" ref_url="https://www.suse.com/security/cve/CVE-2010-4777/" source="CVE"/>
		<reference ref_id="CVE-2015-8853" ref_url="https://www.suse.com/security/cve/CVE-2015-8853/" source="CVE"/>
		<reference ref_id="CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238/" source="CVE"/>
		<reference ref_id="CVE-2016-2381" ref_url="https://www.suse.com/security/cve/CVE-2016-2381/" source="CVE"/>
		<reference ref_id="CVE-2016-6185" ref_url="https://www.suse.com/security/cve/CVE-2016-6185/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-32bit-5.18.2-11.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2761/">CVE-2010-2761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4410/">CVE-2010-4410</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4411/">CVE-2010-4411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4777/">CVE-2010-4777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8853/">CVE-2015-8853</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2381/">CVE-2016-2381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6185/">CVE-2016-6185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131038" comment="perl-5.18.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131039" comment="perl-32bit-5.18.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131040" comment="perl-base-5.18.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131041" comment="perl-doc-5.18.2-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76737" version="1" class="patch">
	<metadata>
		<title>perl-Config-IniFiles-2.82-3.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-2451" ref_url="https://www.suse.com/security/cve/CVE-2012-2451/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Config-IniFiles-2.82-3.14 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2451/">CVE-2012-2451</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141066" comment="perl-Config-IniFiles-2.82-3.14 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76738" version="1" class="patch">
	<metadata>
		<title>perl-HTML-Parser-3.71-1.178 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-3627" ref_url="https://www.suse.com/security/cve/CVE-2009-3627/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-HTML-Parser-3.71-1.178 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3627/">CVE-2009-3627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141067" comment="perl-HTML-Parser-3.71-1.178 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76739" version="1" class="patch">
	<metadata>
		<title>perl-LWP-Protocol-https-6.04-5.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-3230" ref_url="https://www.suse.com/security/cve/CVE-2014-3230/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-LWP-Protocol-https-6.04-5.4 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3230/">CVE-2014-3230</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141068" comment="perl-LWP-Protocol-https-6.04-5.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76740" version="1" class="patch">
	<metadata>
		<title>perl-Tk-804.031-3.82 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-4484" ref_url="https://www.suse.com/security/cve/CVE-2006-4484/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Tk-804.031-3.82 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4484/">CVE-2006-4484</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141069" comment="perl-Tk-804.031-3.82 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76741" version="1" class="patch">
	<metadata>
		<title>perl-XML-LibXML-2.0019-5.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-3451" ref_url="https://www.suse.com/security/cve/CVE-2015-3451/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-XML-LibXML-2.0019-5.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3451/">CVE-2015-3451</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113959" comment="perl-XML-LibXML-2.0019-5.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76742" version="1" class="patch">
	<metadata>
		<title>perl-YAML-LibYAML-0.38-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-1152" ref_url="https://www.suse.com/security/cve/CVE-2012-1152/" source="CVE"/>
		<reference ref_id="CVE-2013-6393" ref_url="https://www.suse.com/security/cve/CVE-2013-6393/" source="CVE"/>
		<reference ref_id="CVE-2014-2525" ref_url="https://www.suse.com/security/cve/CVE-2014-2525/" source="CVE"/>
		<reference ref_id="CVE-2014-9130" ref_url="https://www.suse.com/security/cve/CVE-2014-9130/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-YAML-LibYAML-0.38-10.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1152/">CVE-2012-1152</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6393/">CVE-2013-6393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2525/">CVE-2014-2525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9130/">CVE-2014-9130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109959" comment="perl-YAML-LibYAML-0.38-10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76743" version="1" class="patch">
	<metadata>
		<title>pidgin-plugin-otr-4.0.2-1.29 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-2369" ref_url="https://www.suse.com/security/cve/CVE-2012-2369/" source="CVE"/>
		<reference ref_id="CVE-2015-8833" ref_url="https://www.suse.com/security/cve/CVE-2015-8833/" source="CVE"/>
		<description>
These are all security issues fixed in the pidgin-plugin-otr-4.0.2-1.29 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2369/">CVE-2012-2369</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8833/">CVE-2015-8833</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159707" comment="pidgin-plugin-otr-4.0.2-1.29 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76744" version="1" class="patch">
	<metadata>
		<title>pigz-2.3-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-1191" ref_url="https://www.suse.com/security/cve/CVE-2015-1191/" source="CVE"/>
		<description>
These are all security issues fixed in the pigz-2.3-5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1191/">CVE-2015-1191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108432" comment="pigz-2.3-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76745" version="1" class="patch">
	<metadata>
		<title>ppp-2.4.7-3.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-3158" ref_url="https://www.suse.com/security/cve/CVE-2014-3158/" source="CVE"/>
		<reference ref_id="CVE-2015-3310" ref_url="https://www.suse.com/security/cve/CVE-2015-3310/" source="CVE"/>
		<description>
These are all security issues fixed in the ppp-2.4.7-3.4 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3158/">CVE-2014-3158</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3310/">CVE-2015-3310</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009148440" comment="ppp-2.4.7-3.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76746" version="1" class="patch">
	<metadata>
		<title>procmail-3.22-267.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-3618" ref_url="https://www.suse.com/security/cve/CVE-2014-3618/" source="CVE"/>
		<description>
These are all security issues fixed in the procmail-3.22-267.12 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3618/">CVE-2014-3618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141775" comment="procmail-3.22-267.12 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76747" version="1" class="patch">
	<metadata>
		<title>puppet-3.8.5-14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-3848" ref_url="https://www.suse.com/security/cve/CVE-2011-3848/" source="CVE"/>
		<reference ref_id="CVE-2011-3872" ref_url="https://www.suse.com/security/cve/CVE-2011-3872/" source="CVE"/>
		<reference ref_id="CVE-2012-3864" ref_url="https://www.suse.com/security/cve/CVE-2012-3864/" source="CVE"/>
		<reference ref_id="CVE-2012-3865" ref_url="https://www.suse.com/security/cve/CVE-2012-3865/" source="CVE"/>
		<reference ref_id="CVE-2012-3866" ref_url="https://www.suse.com/security/cve/CVE-2012-3866/" source="CVE"/>
		<reference ref_id="CVE-2012-3867" ref_url="https://www.suse.com/security/cve/CVE-2012-3867/" source="CVE"/>
		<reference ref_id="CVE-2013-3567" ref_url="https://www.suse.com/security/cve/CVE-2013-3567/" source="CVE"/>
		<reference ref_id="CVE-2013-4761" ref_url="https://www.suse.com/security/cve/CVE-2013-4761/" source="CVE"/>
		<reference ref_id="CVE-2013-4956" ref_url="https://www.suse.com/security/cve/CVE-2013-4956/" source="CVE"/>
		<reference ref_id="CVE-2014-3248" ref_url="https://www.suse.com/security/cve/CVE-2014-3248/" source="CVE"/>
		<reference ref_id="CVE-2014-3253" ref_url="https://www.suse.com/security/cve/CVE-2014-3253/" source="CVE"/>
		<description>
These are all security issues fixed in the puppet-3.8.5-14.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3848/">CVE-2011-3848</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3872/">CVE-2011-3872</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3864/">CVE-2012-3864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3865/">CVE-2012-3865</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3866/">CVE-2012-3866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3867/">CVE-2012-3867</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3567/">CVE-2013-3567</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4761/">CVE-2013-4761</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4956/">CVE-2013-4956</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3248/">CVE-2014-3248</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3253/">CVE-2014-3253</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159708" comment="puppet-3.8.5-14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76748" version="1" class="patch">
	<metadata>
		<title>python-2.7.13-27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<description>
These are all security issues fixed in the python-2.7.13-27.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159263" comment="python-2.7.13-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159265" comment="python-curses-2.7.13-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159269" comment="python-tk-2.7.13-27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76749" version="1" class="patch">
	<metadata>
		<title>python-cupshelpers-1.5.7-7.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-4405" ref_url="https://www.suse.com/security/cve/CVE-2011-4405/" source="CVE"/>
		<description>
These are all security issues fixed in the python-cupshelpers-1.5.7-7.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4405/">CVE-2011-4405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141076" comment="python-cupshelpers-1.5.7-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141077" comment="system-config-printer-1.5.7-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141078" comment="system-config-printer-common-1.5.7-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141079" comment="system-config-printer-common-lang-1.5.7-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141080" comment="system-config-printer-dbus-service-1.5.7-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141081" comment="udev-configure-printer-1.5.7-7.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76750" version="1" class="patch">
	<metadata>
		<title>python-imaging-1.1.7-21.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-1932" ref_url="https://www.suse.com/security/cve/CVE-2014-1932/" source="CVE"/>
		<description>
These are all security issues fixed in the python-imaging-1.1.7-21.15 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1932/">CVE-2014-1932</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141787" comment="python-imaging-1.1.7-21.15 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76751" version="1" class="patch">
	<metadata>
		<title>python-libxml2-2.9.4-45.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-4225" ref_url="https://www.suse.com/security/cve/CVE-2008-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-4226" ref_url="https://www.suse.com/security/cve/CVE-2008-4226/" source="CVE"/>
		<reference ref_id="CVE-2008-4409" ref_url="https://www.suse.com/security/cve/CVE-2008-4409/" source="CVE"/>
		<reference ref_id="CVE-2012-5134" ref_url="https://www.suse.com/security/cve/CVE-2012-5134/" source="CVE"/>
		<reference ref_id="CVE-2016-1762" ref_url="https://www.suse.com/security/cve/CVE-2016-1762/" source="CVE"/>
		<reference ref_id="CVE-2016-1833" ref_url="https://www.suse.com/security/cve/CVE-2016-1833/" source="CVE"/>
		<reference ref_id="CVE-2016-1834" ref_url="https://www.suse.com/security/cve/CVE-2016-1834/" source="CVE"/>
		<reference ref_id="CVE-2016-1835" ref_url="https://www.suse.com/security/cve/CVE-2016-1835/" source="CVE"/>
		<reference ref_id="CVE-2016-1836" ref_url="https://www.suse.com/security/cve/CVE-2016-1836/" source="CVE"/>
		<reference ref_id="CVE-2016-1837" ref_url="https://www.suse.com/security/cve/CVE-2016-1837/" source="CVE"/>
		<reference ref_id="CVE-2016-1838" ref_url="https://www.suse.com/security/cve/CVE-2016-1838/" source="CVE"/>
		<reference ref_id="CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839/" source="CVE"/>
		<reference ref_id="CVE-2016-1840" ref_url="https://www.suse.com/security/cve/CVE-2016-1840/" source="CVE"/>
		<reference ref_id="CVE-2016-3627" ref_url="https://www.suse.com/security/cve/CVE-2016-3627/" source="CVE"/>
		<reference ref_id="CVE-2016-3705" ref_url="https://www.suse.com/security/cve/CVE-2016-3705/" source="CVE"/>
		<reference ref_id="CVE-2016-4483" ref_url="https://www.suse.com/security/cve/CVE-2016-4483/" source="CVE"/>
		<description>
These are all security issues fixed in the python-libxml2-2.9.4-45.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4225/">CVE-2008-4225</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4226/">CVE-2008-4226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4409/">CVE-2008-4409</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5134/">CVE-2012-5134</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1762/">CVE-2016-1762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1833/">CVE-2016-1833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1834/">CVE-2016-1834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1835/">CVE-2016-1835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1836/">CVE-2016-1836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1837/">CVE-2016-1837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1838/">CVE-2016-1838</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1840/">CVE-2016-1840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3627/">CVE-2016-3627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3705/">CVE-2016-3705</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4483/">CVE-2016-4483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157771" comment="python-libxml2-2.9.4-45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76752" version="1" class="patch">
	<metadata>
		<title>python-pyOpenSSL-16.0.0-2.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-4314" ref_url="https://www.suse.com/security/cve/CVE-2013-4314/" source="CVE"/>
		<description>
These are all security issues fixed in the python-pyOpenSSL-16.0.0-2.3.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4314/">CVE-2013-4314</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141084" comment="python-pyOpenSSL-16.0.0-2.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76753" version="1" class="patch">
	<metadata>
		<title>python-pywbem-0.7.0-4.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-6418" ref_url="https://www.suse.com/security/cve/CVE-2013-6418/" source="CVE"/>
		<description>
These are all security issues fixed in the python-pywbem-0.7.0-4.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6418/">CVE-2013-6418</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141085" comment="python-pywbem-0.7.0-4.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76754" version="1" class="patch">
	<metadata>
		<title>python-requests-2.8.1-6.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-1829" ref_url="https://www.suse.com/security/cve/CVE-2014-1829/" source="CVE"/>
		<reference ref_id="CVE-2014-1830" ref_url="https://www.suse.com/security/cve/CVE-2014-1830/" source="CVE"/>
		<reference ref_id="CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296/" source="CVE"/>
		<description>
These are all security issues fixed in the python-requests-2.8.1-6.16.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-1829/">CVE-2014-1829</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-1830/">CVE-2014-1830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159273" comment="python-requests-2.8.1-6.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76755" version="1" class="patch">
	<metadata>
		<title>python3-3.4.6-24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-3.4.6-24.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159274" comment="python3-3.4.6-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159275" comment="python3-curses-3.4.6-24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76756" version="1" class="patch">
	<metadata>
		<title>qemu-2.9.0-5.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-0928" ref_url="https://www.suse.com/security/cve/CVE-2008-0928/" source="CVE"/>
		<reference ref_id="CVE-2008-1945" ref_url="https://www.suse.com/security/cve/CVE-2008-1945/" source="CVE"/>
		<reference ref_id="CVE-2008-2382" ref_url="https://www.suse.com/security/cve/CVE-2008-2382/" source="CVE"/>
		<reference ref_id="CVE-2008-4539" ref_url="https://www.suse.com/security/cve/CVE-2008-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515/" source="CVE"/>
		<reference ref_id="CVE-2013-4148" ref_url="https://www.suse.com/security/cve/CVE-2013-4148/" source="CVE"/>
		<reference ref_id="CVE-2013-4149" ref_url="https://www.suse.com/security/cve/CVE-2013-4149/" source="CVE"/>
		<reference ref_id="CVE-2013-4150" ref_url="https://www.suse.com/security/cve/CVE-2013-4150/" source="CVE"/>
		<reference ref_id="CVE-2013-4151" ref_url="https://www.suse.com/security/cve/CVE-2013-4151/" source="CVE"/>
		<reference ref_id="CVE-2013-4526" ref_url="https://www.suse.com/security/cve/CVE-2013-4526/" source="CVE"/>
		<reference ref_id="CVE-2013-4527" ref_url="https://www.suse.com/security/cve/CVE-2013-4527/" source="CVE"/>
		<reference ref_id="CVE-2013-4529" ref_url="https://www.suse.com/security/cve/CVE-2013-4529/" source="CVE"/>
		<reference ref_id="CVE-2013-4530" ref_url="https://www.suse.com/security/cve/CVE-2013-4530/" source="CVE"/>
		<reference ref_id="CVE-2013-4531" ref_url="https://www.suse.com/security/cve/CVE-2013-4531/" source="CVE"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4535" ref_url="https://www.suse.com/security/cve/CVE-2013-4535/" source="CVE"/>
		<reference ref_id="CVE-2013-4536" ref_url="https://www.suse.com/security/cve/CVE-2013-4536/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540/" source="CVE"/>
		<reference ref_id="CVE-2013-4541" ref_url="https://www.suse.com/security/cve/CVE-2013-4541/" source="CVE"/>
		<reference ref_id="CVE-2013-4542" ref_url="https://www.suse.com/security/cve/CVE-2013-4542/" source="CVE"/>
		<reference ref_id="CVE-2013-4544" ref_url="https://www.suse.com/security/cve/CVE-2013-4544/" source="CVE"/>
		<reference ref_id="CVE-2013-6399" ref_url="https://www.suse.com/security/cve/CVE-2013-6399/" source="CVE"/>
		<reference ref_id="CVE-2014-0142" ref_url="https://www.suse.com/security/cve/CVE-2014-0142/" source="CVE"/>
		<reference ref_id="CVE-2014-0143" ref_url="https://www.suse.com/security/cve/CVE-2014-0143/" source="CVE"/>
		<reference ref_id="CVE-2014-0144" ref_url="https://www.suse.com/security/cve/CVE-2014-0144/" source="CVE"/>
		<reference ref_id="CVE-2014-0145" ref_url="https://www.suse.com/security/cve/CVE-2014-0145/" source="CVE"/>
		<reference ref_id="CVE-2014-0146" ref_url="https://www.suse.com/security/cve/CVE-2014-0146/" source="CVE"/>
		<reference ref_id="CVE-2014-0147" ref_url="https://www.suse.com/security/cve/CVE-2014-0147/" source="CVE"/>
		<reference ref_id="CVE-2014-0150" ref_url="https://www.suse.com/security/cve/CVE-2014-0150/" source="CVE"/>
		<reference ref_id="CVE-2014-0182" ref_url="https://www.suse.com/security/cve/CVE-2014-0182/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-0223" ref_url="https://www.suse.com/security/cve/CVE-2014-0223/" source="CVE"/>
		<reference ref_id="CVE-2014-3461" ref_url="https://www.suse.com/security/cve/CVE-2014-3461/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-7840" ref_url="https://www.suse.com/security/cve/CVE-2014-7840/" source="CVE"/>
		<reference ref_id="CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5225" ref_url="https://www.suse.com/security/cve/CVE-2015-5225/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-5279" ref_url="https://www.suse.com/security/cve/CVE-2015-5279/" source="CVE"/>
		<reference ref_id="CVE-2015-5745" ref_url="https://www.suse.com/security/cve/CVE-2015-5745/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7295" ref_url="https://www.suse.com/security/cve/CVE-2015-7295/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567/" source="CVE"/>
		<reference ref_id="CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2016-10028" ref_url="https://www.suse.com/security/cve/CVE-2016-10028/" source="CVE"/>
		<reference ref_id="CVE-2016-10155" ref_url="https://www.suse.com/security/cve/CVE-2016-10155/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710/" source="CVE"/>
		<reference ref_id="CVE-2016-3712" ref_url="https://www.suse.com/security/cve/CVE-2016-3712/" source="CVE"/>
		<reference ref_id="CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002/" source="CVE"/>
		<reference ref_id="CVE-2016-4020" ref_url="https://www.suse.com/security/cve/CVE-2016-4020/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-4453" ref_url="https://www.suse.com/security/cve/CVE-2016-4453/" source="CVE"/>
		<reference ref_id="CVE-2016-4454" ref_url="https://www.suse.com/security/cve/CVE-2016-4454/" source="CVE"/>
		<reference ref_id="CVE-2016-4952" ref_url="https://www.suse.com/security/cve/CVE-2016-4952/" source="CVE"/>
		<reference ref_id="CVE-2016-4964" ref_url="https://www.suse.com/security/cve/CVE-2016-4964/" source="CVE"/>
		<reference ref_id="CVE-2016-5105" ref_url="https://www.suse.com/security/cve/CVE-2016-5105/" source="CVE"/>
		<reference ref_id="CVE-2016-5106" ref_url="https://www.suse.com/security/cve/CVE-2016-5106/" source="CVE"/>
		<reference ref_id="CVE-2016-5107" ref_url="https://www.suse.com/security/cve/CVE-2016-5107/" source="CVE"/>
		<reference ref_id="CVE-2016-5126" ref_url="https://www.suse.com/security/cve/CVE-2016-5126/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5337" ref_url="https://www.suse.com/security/cve/CVE-2016-5337/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-5403" ref_url="https://www.suse.com/security/cve/CVE-2016-5403/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="CVE-2016-6490" ref_url="https://www.suse.com/security/cve/CVE-2016-6490/" source="CVE"/>
		<reference ref_id="CVE-2016-6833" ref_url="https://www.suse.com/security/cve/CVE-2016-6833/" source="CVE"/>
		<reference ref_id="CVE-2016-6836" ref_url="https://www.suse.com/security/cve/CVE-2016-6836/" source="CVE"/>
		<reference ref_id="CVE-2016-6888" ref_url="https://www.suse.com/security/cve/CVE-2016-6888/" source="CVE"/>
		<reference ref_id="CVE-2016-7116" ref_url="https://www.suse.com/security/cve/CVE-2016-7116/" source="CVE"/>
		<reference ref_id="CVE-2016-7155" ref_url="https://www.suse.com/security/cve/CVE-2016-7155/" source="CVE"/>
		<reference ref_id="CVE-2016-7156" ref_url="https://www.suse.com/security/cve/CVE-2016-7156/" source="CVE"/>
		<reference ref_id="CVE-2016-7157" ref_url="https://www.suse.com/security/cve/CVE-2016-7157/" source="CVE"/>
		<reference ref_id="CVE-2016-7161" ref_url="https://www.suse.com/security/cve/CVE-2016-7161/" source="CVE"/>
		<reference ref_id="CVE-2016-7170" ref_url="https://www.suse.com/security/cve/CVE-2016-7170/" source="CVE"/>
		<reference ref_id="CVE-2016-7421" ref_url="https://www.suse.com/security/cve/CVE-2016-7421/" source="CVE"/>
		<reference ref_id="CVE-2016-7422" ref_url="https://www.suse.com/security/cve/CVE-2016-7422/" source="CVE"/>
		<reference ref_id="CVE-2016-7423" ref_url="https://www.suse.com/security/cve/CVE-2016-7423/" source="CVE"/>
		<reference ref_id="CVE-2016-7466" ref_url="https://www.suse.com/security/cve/CVE-2016-7466/" source="CVE"/>
		<reference ref_id="CVE-2016-7907" ref_url="https://www.suse.com/security/cve/CVE-2016-7907/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-7994" ref_url="https://www.suse.com/security/cve/CVE-2016-7994/" source="CVE"/>
		<reference ref_id="CVE-2016-7995" ref_url="https://www.suse.com/security/cve/CVE-2016-7995/" source="CVE"/>
		<reference ref_id="CVE-2016-8576" ref_url="https://www.suse.com/security/cve/CVE-2016-8576/" source="CVE"/>
		<reference ref_id="CVE-2016-8577" ref_url="https://www.suse.com/security/cve/CVE-2016-8577/" source="CVE"/>
		<reference ref_id="CVE-2016-8578" ref_url="https://www.suse.com/security/cve/CVE-2016-8578/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8668" ref_url="https://www.suse.com/security/cve/CVE-2016-8668/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8909" ref_url="https://www.suse.com/security/cve/CVE-2016-8909/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9101" ref_url="https://www.suse.com/security/cve/CVE-2016-9101/" source="CVE"/>
		<reference ref_id="CVE-2016-9102" ref_url="https://www.suse.com/security/cve/CVE-2016-9102/" source="CVE"/>
		<reference ref_id="CVE-2016-9103" ref_url="https://www.suse.com/security/cve/CVE-2016-9103/" source="CVE"/>
		<reference ref_id="CVE-2016-9104" ref_url="https://www.suse.com/security/cve/CVE-2016-9104/" source="CVE"/>
		<reference ref_id="CVE-2016-9105" ref_url="https://www.suse.com/security/cve/CVE-2016-9105/" source="CVE"/>
		<reference ref_id="CVE-2016-9106" ref_url="https://www.suse.com/security/cve/CVE-2016-9106/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9602" ref_url="https://www.suse.com/security/cve/CVE-2016-9602/" source="CVE"/>
		<reference ref_id="CVE-2016-9776" ref_url="https://www.suse.com/security/cve/CVE-2016-9776/" source="CVE"/>
		<reference ref_id="CVE-2016-9845" ref_url="https://www.suse.com/security/cve/CVE-2016-9845/" source="CVE"/>
		<reference ref_id="CVE-2016-9846" ref_url="https://www.suse.com/security/cve/CVE-2016-9846/" source="CVE"/>
		<reference ref_id="CVE-2016-9907" ref_url="https://www.suse.com/security/cve/CVE-2016-9907/" source="CVE"/>
		<reference ref_id="CVE-2016-9908" ref_url="https://www.suse.com/security/cve/CVE-2016-9908/" source="CVE"/>
		<reference ref_id="CVE-2016-9911" ref_url="https://www.suse.com/security/cve/CVE-2016-9911/" source="CVE"/>
		<reference ref_id="CVE-2016-9912" ref_url="https://www.suse.com/security/cve/CVE-2016-9912/" source="CVE"/>
		<reference ref_id="CVE-2016-9913" ref_url="https://www.suse.com/security/cve/CVE-2016-9913/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2016-9923" ref_url="https://www.suse.com/security/cve/CVE-2016-9923/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="CVE-2017-2630" ref_url="https://www.suse.com/security/cve/CVE-2017-2630/" source="CVE"/>
		<reference ref_id="CVE-2017-2633" ref_url="https://www.suse.com/security/cve/CVE-2017-2633/" source="CVE"/>
		<reference ref_id="CVE-2017-5525" ref_url="https://www.suse.com/security/cve/CVE-2017-5525/" source="CVE"/>
		<reference ref_id="CVE-2017-5526" ref_url="https://www.suse.com/security/cve/CVE-2017-5526/" source="CVE"/>
		<reference ref_id="CVE-2017-5552" ref_url="https://www.suse.com/security/cve/CVE-2017-5552/" source="CVE"/>
		<reference ref_id="CVE-2017-5578" ref_url="https://www.suse.com/security/cve/CVE-2017-5578/" source="CVE"/>
		<reference ref_id="CVE-2017-5579" ref_url="https://www.suse.com/security/cve/CVE-2017-5579/" source="CVE"/>
		<reference ref_id="CVE-2017-5667" ref_url="https://www.suse.com/security/cve/CVE-2017-5667/" source="CVE"/>
		<reference ref_id="CVE-2017-5856" ref_url="https://www.suse.com/security/cve/CVE-2017-5856/" source="CVE"/>
		<reference ref_id="CVE-2017-5857" ref_url="https://www.suse.com/security/cve/CVE-2017-5857/" source="CVE"/>
		<reference ref_id="CVE-2017-5898" ref_url="https://www.suse.com/security/cve/CVE-2017-5898/" source="CVE"/>
		<reference ref_id="CVE-2017-5931" ref_url="https://www.suse.com/security/cve/CVE-2017-5931/" source="CVE"/>
		<reference ref_id="CVE-2017-5973" ref_url="https://www.suse.com/security/cve/CVE-2017-5973/" source="CVE"/>
		<reference ref_id="CVE-2017-5987" ref_url="https://www.suse.com/security/cve/CVE-2017-5987/" source="CVE"/>
		<reference ref_id="CVE-2017-6058" ref_url="https://www.suse.com/security/cve/CVE-2017-6058/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-7471" ref_url="https://www.suse.com/security/cve/CVE-2017-7471/" source="CVE"/>
		<reference ref_id="CVE-2017-7493" ref_url="https://www.suse.com/security/cve/CVE-2017-7493/" source="CVE"/>
		<reference ref_id="CVE-2017-8112" ref_url="https://www.suse.com/security/cve/CVE-2017-8112/" source="CVE"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-8379" ref_url="https://www.suse.com/security/cve/CVE-2017-8379/" source="CVE"/>
		<reference ref_id="CVE-2017-8380" ref_url="https://www.suse.com/security/cve/CVE-2017-8380/" source="CVE"/>
		<reference ref_id="CVE-2017-9503" ref_url="https://www.suse.com/security/cve/CVE-2017-9503/" source="CVE"/>
		<reference ref_id="CVE-2017-9524" ref_url="https://www.suse.com/security/cve/CVE-2017-9524/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-2.9.0-5.10 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0928/">CVE-2008-0928</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1945/">CVE-2008-1945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2382/">CVE-2008-2382</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4539/">CVE-2008-4539</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4148/">CVE-2013-4148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4149/">CVE-2013-4149</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4150/">CVE-2013-4150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4151/">CVE-2013-4151</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4526/">CVE-2013-4526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4527/">CVE-2013-4527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4529/">CVE-2013-4529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4530/">CVE-2013-4530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4531/">CVE-2013-4531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4535/">CVE-2013-4535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4536/">CVE-2013-4536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4541/">CVE-2013-4541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4542/">CVE-2013-4542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4544/">CVE-2013-4544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6399/">CVE-2013-6399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0142/">CVE-2014-0142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0143/">CVE-2014-0143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0144/">CVE-2014-0144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0145/">CVE-2014-0145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0146/">CVE-2014-0146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0147/">CVE-2014-0147</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0150/">CVE-2014-0150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0182/">CVE-2014-0182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0223/">CVE-2014-0223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3461/">CVE-2014-3461</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7840/">CVE-2014-7840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5225/">CVE-2015-5225</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5279/">CVE-2015-5279</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5745/">CVE-2015-5745</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7295/">CVE-2015-7295</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10028/">CVE-2016-10028</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10155/">CVE-2016-10155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3712/">CVE-2016-3712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4020/">CVE-2016-4020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4453/">CVE-2016-4453</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4454/">CVE-2016-4454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4952/">CVE-2016-4952</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4964/">CVE-2016-4964</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5105/">CVE-2016-5105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5106/">CVE-2016-5106</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5107/">CVE-2016-5107</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5126/">CVE-2016-5126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5337/">CVE-2016-5337</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5403/">CVE-2016-5403</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6490/">CVE-2016-6490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6833/">CVE-2016-6833</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6836/">CVE-2016-6836</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6888/">CVE-2016-6888</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7116/">CVE-2016-7116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7155/">CVE-2016-7155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7156/">CVE-2016-7156</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7157/">CVE-2016-7157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7161/">CVE-2016-7161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7170/">CVE-2016-7170</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7421/">CVE-2016-7421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7422/">CVE-2016-7422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7423/">CVE-2016-7423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7466/">CVE-2016-7466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7907/">CVE-2016-7907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7994/">CVE-2016-7994</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7995/">CVE-2016-7995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8576/">CVE-2016-8576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8577/">CVE-2016-8577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8578/">CVE-2016-8578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8668/">CVE-2016-8668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8909/">CVE-2016-8909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9101/">CVE-2016-9101</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9102/">CVE-2016-9102</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9103/">CVE-2016-9103</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9104/">CVE-2016-9104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9105/">CVE-2016-9105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9106/">CVE-2016-9106</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9602/">CVE-2016-9602</cve>
	<cve impact="moderate" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9776/">CVE-2016-9776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9845/">CVE-2016-9845</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9846/">CVE-2016-9846</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9907/">CVE-2016-9907</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9908/">CVE-2016-9908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9911/">CVE-2016-9911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9912/">CVE-2016-9912</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9913/">CVE-2016-9913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9923/">CVE-2016-9923</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2630/">CVE-2017-2630</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-2633/">CVE-2017-2633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5525/">CVE-2017-5525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5526/">CVE-2017-5526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5552/">CVE-2017-5552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5578/">CVE-2017-5578</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5579/">CVE-2017-5579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5667/">CVE-2017-5667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5856/">CVE-2017-5856</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5857/">CVE-2017-5857</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5898/">CVE-2017-5898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5931/">CVE-2017-5931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5973/">CVE-2017-5973</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5987/">CVE-2017-5987</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6058/">CVE-2017-6058</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7471/">CVE-2017-7471</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7493/">CVE-2017-7493</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8112/">CVE-2017-8112</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8379/">CVE-2017-8379</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8380/">CVE-2017-8380</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9503/">CVE-2017-9503</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9524/">CVE-2017-9524</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76757" version="1" class="patch">
	<metadata>
		<title>radvd-1.9.7-2.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-3602" ref_url="https://www.suse.com/security/cve/CVE-2011-3602/" source="CVE"/>
		<description>
These are all security issues fixed in the radvd-1.9.7-2.17 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3602/">CVE-2011-3602</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141103" comment="radvd-1.9.7-2.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76758" version="1" class="patch">
	<metadata>
		<title>rhythmbox-3.4-6.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-3355" ref_url="https://www.suse.com/security/cve/CVE-2012-3355/" source="CVE"/>
		<description>
These are all security issues fixed in the rhythmbox-3.4-6.14 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3355/">CVE-2012-3355</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142150" comment="rhythmbox-3.4-6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142151" comment="rhythmbox-lang-3.4-6.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76759" version="1" class="patch">
	<metadata>
		<title>rpcbind-0.2.3-23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-7236" ref_url="https://www.suse.com/security/cve/CVE-2015-7236/" source="CVE"/>
		<reference ref_id="CVE-2017-8779" ref_url="https://www.suse.com/security/cve/CVE-2017-8779/" source="CVE"/>
		<description>
These are all security issues fixed in the rpcbind-0.2.3-23.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7236/">CVE-2015-7236</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8779/">CVE-2017-8779</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155620" comment="rpcbind-0.2.3-23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76760" version="1" class="patch">
	<metadata>
		<title>rpm-32bit-4.11.2-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-6435" ref_url="https://www.suse.com/security/cve/CVE-2013-6435/" source="CVE"/>
		<reference ref_id="CVE-2014-8118" ref_url="https://www.suse.com/security/cve/CVE-2014-8118/" source="CVE"/>
		<description>
These are all security issues fixed in the rpm-32bit-4.11.2-15.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6435/">CVE-2013-6435</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8118/">CVE-2014-8118</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141108" comment="rpm-4.11.2-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141109" comment="rpm-32bit-4.11.2-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141110" comment="rpm-build-4.11.2-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76761" version="1" class="patch">
	<metadata>
		<title>rrdtool-1.4.7-20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-2131" ref_url="https://www.suse.com/security/cve/CVE-2013-2131/" source="CVE"/>
		<description>
These are all security issues fixed in the rrdtool-1.4.7-20.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2131/">CVE-2013-2131</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009146857" comment="rrdtool-1.4.7-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009146858" comment="rrdtool-cached-1.4.7-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76762" version="1" class="patch">
	<metadata>
		<title>rsync-3.1.0-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1097" ref_url="https://www.suse.com/security/cve/CVE-2011-1097/" source="CVE"/>
		<reference ref_id="CVE-2014-2855" ref_url="https://www.suse.com/security/cve/CVE-2014-2855/" source="CVE"/>
		<reference ref_id="CVE-2014-8242" ref_url="https://www.suse.com/security/cve/CVE-2014-8242/" source="CVE"/>
		<reference ref_id="CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512/" source="CVE"/>
		<description>
These are all security issues fixed in the rsync-3.1.0-12.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1097/">CVE-2011-1097</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2855/">CVE-2014-2855</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8242/">CVE-2014-8242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141111" comment="rsync-3.1.0-12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76763" version="1" class="patch">
	<metadata>
		<title>rsyslog-8.24.0-1.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-3200" ref_url="https://www.suse.com/security/cve/CVE-2011-3200/" source="CVE"/>
		<reference ref_id="CVE-2013-4758" ref_url="https://www.suse.com/security/cve/CVE-2013-4758/" source="CVE"/>
		<reference ref_id="CVE-2013-6370" ref_url="https://www.suse.com/security/cve/CVE-2013-6370/" source="CVE"/>
		<reference ref_id="CVE-2013-6371" ref_url="https://www.suse.com/security/cve/CVE-2013-6371/" source="CVE"/>
		<reference ref_id="CVE-2014-3634" ref_url="https://www.suse.com/security/cve/CVE-2014-3634/" source="CVE"/>
		<reference ref_id="CVE-2014-3683" ref_url="https://www.suse.com/security/cve/CVE-2014-3683/" source="CVE"/>
		<description>
These are all security issues fixed in the rsyslog-8.24.0-1.20 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3200/">CVE-2011-3200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4758/">CVE-2013-4758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6370/">CVE-2013-6370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6371/">CVE-2013-6371</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3634/">CVE-2014-3634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3683/">CVE-2014-3683</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159295" comment="rsyslog-8.24.0-1.20 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76764" version="1" class="patch">
	<metadata>
		<title>rtkit-0.11_git201205151338-8.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-4326" ref_url="https://www.suse.com/security/cve/CVE-2013-4326/" source="CVE"/>
		<description>
These are all security issues fixed in the rtkit-0.11_git201205151338-8.17 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4326/">CVE-2013-4326</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141122" comment="rtkit-0.11_git201205151338-8.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76765" version="1" class="patch">
	<metadata>
		<title>ruby-2.1-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-4492" ref_url="https://www.suse.com/security/cve/CVE-2009-4492/" source="CVE"/>
		<reference ref_id="CVE-2010-0541" ref_url="https://www.suse.com/security/cve/CVE-2010-0541/" source="CVE"/>
		<reference ref_id="CVE-2011-1004" ref_url="https://www.suse.com/security/cve/CVE-2011-1004/" source="CVE"/>
		<reference ref_id="CVE-2011-1005" ref_url="https://www.suse.com/security/cve/CVE-2011-1005/" source="CVE"/>
		<reference ref_id="CVE-2011-4815" ref_url="https://www.suse.com/security/cve/CVE-2011-4815/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby-2.1-1.6 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4492/">CVE-2009-4492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0541/">CVE-2010-0541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1004/">CVE-2011-1004</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1005/">CVE-2011-1005</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4815/">CVE-2011-4815</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141123" comment="ruby-2.1-1.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76766" version="1" class="patch">
	<metadata>
		<title>sane-backends-1.0.24-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2017-6318" ref_url="https://www.suse.com/security/cve/CVE-2017-6318/" source="CVE"/>
		<description>
These are all security issues fixed in the sane-backends-1.0.24-3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6318/">CVE-2017-6318</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009149621" comment="sane-backends-1.0.24-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009149622" comment="sane-backends-32bit-1.0.24-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009149623" comment="sane-backends-autoconfig-1.0.24-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76767" version="1" class="patch">
	<metadata>
		<title>sblim-sfcb-1.4.8-16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-5185" ref_url="https://www.suse.com/security/cve/CVE-2015-5185/" source="CVE"/>
		<description>
These are all security issues fixed in the sblim-sfcb-1.4.8-16.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5185/">CVE-2015-5185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159305" comment="sblim-sfcb-1.4.8-16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76768" version="1" class="patch">
	<metadata>
		<title>shim-0.9-23.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-3675" ref_url="https://www.suse.com/security/cve/CVE-2014-3675/" source="CVE"/>
		<reference ref_id="CVE-2014-3676" ref_url="https://www.suse.com/security/cve/CVE-2014-3676/" source="CVE"/>
		<reference ref_id="CVE-2014-3677" ref_url="https://www.suse.com/security/cve/CVE-2014-3677/" source="CVE"/>
		<description>
These are all security issues fixed in the shim-0.9-23.14 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3675/">CVE-2014-3675</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3676/">CVE-2014-3676</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3677/">CVE-2014-3677</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159306" comment="shim-0.9-23.14 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76769" version="1" class="patch">
	<metadata>
		<title>socat-1.7.2.4-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-3571" ref_url="https://www.suse.com/security/cve/CVE-2013-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-0019" ref_url="https://www.suse.com/security/cve/CVE-2014-0019/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<description>
These are all security issues fixed in the socat-1.7.2.4-3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3571/">CVE-2013-3571</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0019/">CVE-2014-0019</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009122758" comment="socat-1.7.2.4-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76770" version="1" class="patch">
	<metadata>
		<title>squashfs-4.3-6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-4024" ref_url="https://www.suse.com/security/cve/CVE-2012-4024/" source="CVE"/>
		<reference ref_id="CVE-2012-4025" ref_url="https://www.suse.com/security/cve/CVE-2012-4025/" source="CVE"/>
		<description>
These are all security issues fixed in the squashfs-4.3-6.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4024/">CVE-2012-4024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4025/">CVE-2012-4025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141126" comment="squashfs-4.3-6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76771" version="1" class="patch">
	<metadata>
		<title>strongswan-5.1.3-25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0790" ref_url="https://www.suse.com/security/cve/CVE-2009-0790/" source="CVE"/>
		<reference ref_id="CVE-2012-2388" ref_url="https://www.suse.com/security/cve/CVE-2012-2388/" source="CVE"/>
		<reference ref_id="CVE-2013-2944" ref_url="https://www.suse.com/security/cve/CVE-2013-2944/" source="CVE"/>
		<reference ref_id="CVE-2013-5018" ref_url="https://www.suse.com/security/cve/CVE-2013-5018/" source="CVE"/>
		<reference ref_id="CVE-2013-6075" ref_url="https://www.suse.com/security/cve/CVE-2013-6075/" source="CVE"/>
		<reference ref_id="CVE-2013-6076" ref_url="https://www.suse.com/security/cve/CVE-2013-6076/" source="CVE"/>
		<reference ref_id="CVE-2014-2338" ref_url="https://www.suse.com/security/cve/CVE-2014-2338/" source="CVE"/>
		<reference ref_id="CVE-2014-9221" ref_url="https://www.suse.com/security/cve/CVE-2014-9221/" source="CVE"/>
		<reference ref_id="CVE-2015-4171" ref_url="https://www.suse.com/security/cve/CVE-2015-4171/" source="CVE"/>
		<reference ref_id="CVE-2015-8023" ref_url="https://www.suse.com/security/cve/CVE-2015-8023/" source="CVE"/>
		<reference ref_id="CVE-2017-9022" ref_url="https://www.suse.com/security/cve/CVE-2017-9022/" source="CVE"/>
		<reference ref_id="CVE-2017-9023" ref_url="https://www.suse.com/security/cve/CVE-2017-9023/" source="CVE"/>
		<description>
These are all security issues fixed in the strongswan-5.1.3-25.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0790/">CVE-2009-0790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2388/">CVE-2012-2388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2944/">CVE-2013-2944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5018/">CVE-2013-5018</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6075/">CVE-2013-6075</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6076/">CVE-2013-6076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2338/">CVE-2014-2338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9221/">CVE-2014-9221</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4171/">CVE-2015-4171</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8023/">CVE-2015-8023</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9022/">CVE-2017-9022</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9023/">CVE-2017-9023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156341" comment="strongswan-5.1.3-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156342" comment="strongswan-doc-5.1.3-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156343" comment="strongswan-ipsec-5.1.3-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156344" comment="strongswan-libs0-5.1.3-25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76772" version="1" class="patch">
	<metadata>
		<title>sudo-1.8.20p2-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-1163" ref_url="https://www.suse.com/security/cve/CVE-2010-1163/" source="CVE"/>
		<reference ref_id="CVE-2010-1646" ref_url="https://www.suse.com/security/cve/CVE-2010-1646/" source="CVE"/>
		<reference ref_id="CVE-2011-0010" ref_url="https://www.suse.com/security/cve/CVE-2011-0010/" source="CVE"/>
		<reference ref_id="CVE-2012-2337" ref_url="https://www.suse.com/security/cve/CVE-2012-2337/" source="CVE"/>
		<reference ref_id="CVE-2013-1775" ref_url="https://www.suse.com/security/cve/CVE-2013-1775/" source="CVE"/>
		<reference ref_id="CVE-2013-1776" ref_url="https://www.suse.com/security/cve/CVE-2013-1776/" source="CVE"/>
		<reference ref_id="CVE-2014-9680" ref_url="https://www.suse.com/security/cve/CVE-2014-9680/" source="CVE"/>
		<reference ref_id="CVE-2016-7032" ref_url="https://www.suse.com/security/cve/CVE-2016-7032/" source="CVE"/>
		<reference ref_id="CVE-2016-7076" ref_url="https://www.suse.com/security/cve/CVE-2016-7076/" source="CVE"/>
		<reference ref_id="CVE-2017-1000367" ref_url="https://www.suse.com/security/cve/CVE-2017-1000367/" source="CVE"/>
		<reference ref_id="CVE-2017-1000368" ref_url="https://www.suse.com/security/cve/CVE-2017-1000368/" source="CVE"/>
		<description>
These are all security issues fixed in the sudo-1.8.20p2-1.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1163/">CVE-2010-1163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1646/">CVE-2010-1646</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0010/">CVE-2011-0010</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2337/">CVE-2012-2337</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1775/">CVE-2013-1775</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-1776/">CVE-2013-1776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9680/">CVE-2014-9680</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7032/">CVE-2016-7032</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7076/">CVE-2016-7076</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000367/">CVE-2017-1000367</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000368/">CVE-2017-1000368</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159307" comment="sudo-1.8.20p2-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76773" version="1" class="patch">
	<metadata>
		<title>supportutils-3.0-94.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-1602" ref_url="https://www.suse.com/security/cve/CVE-2016-1602/" source="CVE"/>
		<description>
These are all security issues fixed in the supportutils-3.0-94.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1602/">CVE-2016-1602</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159308" comment="supportutils-3.0-94.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76774" version="1" class="patch">
	<metadata>
		<title>sysconfig-0.84.0-13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-4182" ref_url="https://www.suse.com/security/cve/CVE-2011-4182/" source="CVE"/>
		<description>
These are all security issues fixed in the sysconfig-0.84.0-13.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4182/">CVE-2011-4182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141132" comment="sysconfig-0.84.0-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141133" comment="sysconfig-netconfig-0.84.0-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76775" version="1" class="patch">
	<metadata>
		<title>syslog-service-2.0-778.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-3634" ref_url="https://www.suse.com/security/cve/CVE-2014-3634/" source="CVE"/>
		<description>
These are all security issues fixed in the syslog-service-2.0-778.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3634/">CVE-2014-3634</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141134" comment="syslog-service-2.0-778.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76776" version="1" class="patch">
	<metadata>
		<title>sysvinit-tools-2.88+-99.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<description>
These are all security issues fixed in the sysvinit-tools-2.88+-99.15 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159312" comment="sysvinit-tools-2.88+-99.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141139" comment="whois-5.1.1-1.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76777" version="1" class="patch">
	<metadata>
		<title>tar-1.27.1-14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-0624" ref_url="https://www.suse.com/security/cve/CVE-2010-0624/" source="CVE"/>
		<reference ref_id="CVE-2016-6321" ref_url="https://www.suse.com/security/cve/CVE-2016-6321/" source="CVE"/>
		<description>
These are all security issues fixed in the tar-1.27.1-14.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0624/">CVE-2010-0624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6321/">CVE-2016-6321</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159313" comment="tar-1.27.1-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159314" comment="tar-lang-1.27.1-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76778" version="1" class="patch">
	<metadata>
		<title>tcpdump-4.9.0-13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-8767" ref_url="https://www.suse.com/security/cve/CVE-2014-8767/" source="CVE"/>
		<reference ref_id="CVE-2014-8768" ref_url="https://www.suse.com/security/cve/CVE-2014-8768/" source="CVE"/>
		<reference ref_id="CVE-2014-8769" ref_url="https://www.suse.com/security/cve/CVE-2014-8769/" source="CVE"/>
		<reference ref_id="CVE-2014-9140" ref_url="https://www.suse.com/security/cve/CVE-2014-9140/" source="CVE"/>
		<reference ref_id="CVE-2015-0261" ref_url="https://www.suse.com/security/cve/CVE-2015-0261/" source="CVE"/>
		<reference ref_id="CVE-2015-2153" ref_url="https://www.suse.com/security/cve/CVE-2015-2153/" source="CVE"/>
		<reference ref_id="CVE-2015-2154" ref_url="https://www.suse.com/security/cve/CVE-2015-2154/" source="CVE"/>
		<reference ref_id="CVE-2015-2155" ref_url="https://www.suse.com/security/cve/CVE-2015-2155/" source="CVE"/>
		<reference ref_id="CVE-2015-3138" ref_url="https://www.suse.com/security/cve/CVE-2015-3138/" source="CVE"/>
		<reference ref_id="CVE-2016-7922" ref_url="https://www.suse.com/security/cve/CVE-2016-7922/" source="CVE"/>
		<reference ref_id="CVE-2016-7923" ref_url="https://www.suse.com/security/cve/CVE-2016-7923/" source="CVE"/>
		<reference ref_id="CVE-2016-7924" ref_url="https://www.suse.com/security/cve/CVE-2016-7924/" source="CVE"/>
		<reference ref_id="CVE-2016-7925" ref_url="https://www.suse.com/security/cve/CVE-2016-7925/" source="CVE"/>
		<reference ref_id="CVE-2016-7926" ref_url="https://www.suse.com/security/cve/CVE-2016-7926/" source="CVE"/>
		<reference ref_id="CVE-2016-7927" ref_url="https://www.suse.com/security/cve/CVE-2016-7927/" source="CVE"/>
		<reference ref_id="CVE-2016-7928" ref_url="https://www.suse.com/security/cve/CVE-2016-7928/" source="CVE"/>
		<reference ref_id="CVE-2016-7929" ref_url="https://www.suse.com/security/cve/CVE-2016-7929/" source="CVE"/>
		<reference ref_id="CVE-2016-7930" ref_url="https://www.suse.com/security/cve/CVE-2016-7930/" source="CVE"/>
		<reference ref_id="CVE-2016-7931" ref_url="https://www.suse.com/security/cve/CVE-2016-7931/" source="CVE"/>
		<reference ref_id="CVE-2016-7932" ref_url="https://www.suse.com/security/cve/CVE-2016-7932/" source="CVE"/>
		<reference ref_id="CVE-2016-7933" ref_url="https://www.suse.com/security/cve/CVE-2016-7933/" source="CVE"/>
		<reference ref_id="CVE-2016-7934" ref_url="https://www.suse.com/security/cve/CVE-2016-7934/" source="CVE"/>
		<reference ref_id="CVE-2016-7935" ref_url="https://www.suse.com/security/cve/CVE-2016-7935/" source="CVE"/>
		<reference ref_id="CVE-2016-7936" ref_url="https://www.suse.com/security/cve/CVE-2016-7936/" source="CVE"/>
		<reference ref_id="CVE-2016-7937" ref_url="https://www.suse.com/security/cve/CVE-2016-7937/" source="CVE"/>
		<reference ref_id="CVE-2016-7938" ref_url="https://www.suse.com/security/cve/CVE-2016-7938/" source="CVE"/>
		<reference ref_id="CVE-2016-7939" ref_url="https://www.suse.com/security/cve/CVE-2016-7939/" source="CVE"/>
		<reference ref_id="CVE-2016-7940" ref_url="https://www.suse.com/security/cve/CVE-2016-7940/" source="CVE"/>
		<reference ref_id="CVE-2016-7973" ref_url="https://www.suse.com/security/cve/CVE-2016-7973/" source="CVE"/>
		<reference ref_id="CVE-2016-7974" ref_url="https://www.suse.com/security/cve/CVE-2016-7974/" source="CVE"/>
		<reference ref_id="CVE-2016-7975" ref_url="https://www.suse.com/security/cve/CVE-2016-7975/" source="CVE"/>
		<reference ref_id="CVE-2016-7983" ref_url="https://www.suse.com/security/cve/CVE-2016-7983/" source="CVE"/>
		<reference ref_id="CVE-2016-7984" ref_url="https://www.suse.com/security/cve/CVE-2016-7984/" source="CVE"/>
		<reference ref_id="CVE-2016-7985" ref_url="https://www.suse.com/security/cve/CVE-2016-7985/" source="CVE"/>
		<reference ref_id="CVE-2016-7986" ref_url="https://www.suse.com/security/cve/CVE-2016-7986/" source="CVE"/>
		<reference ref_id="CVE-2016-7992" ref_url="https://www.suse.com/security/cve/CVE-2016-7992/" source="CVE"/>
		<reference ref_id="CVE-2016-7993" ref_url="https://www.suse.com/security/cve/CVE-2016-7993/" source="CVE"/>
		<reference ref_id="CVE-2016-8574" ref_url="https://www.suse.com/security/cve/CVE-2016-8574/" source="CVE"/>
		<reference ref_id="CVE-2016-8575" ref_url="https://www.suse.com/security/cve/CVE-2016-8575/" source="CVE"/>
		<reference ref_id="CVE-2017-5202" ref_url="https://www.suse.com/security/cve/CVE-2017-5202/" source="CVE"/>
		<reference ref_id="CVE-2017-5203" ref_url="https://www.suse.com/security/cve/CVE-2017-5203/" source="CVE"/>
		<reference ref_id="CVE-2017-5204" ref_url="https://www.suse.com/security/cve/CVE-2017-5204/" source="CVE"/>
		<reference ref_id="CVE-2017-5205" ref_url="https://www.suse.com/security/cve/CVE-2017-5205/" source="CVE"/>
		<reference ref_id="CVE-2017-5341" ref_url="https://www.suse.com/security/cve/CVE-2017-5341/" source="CVE"/>
		<reference ref_id="CVE-2017-5342" ref_url="https://www.suse.com/security/cve/CVE-2017-5342/" source="CVE"/>
		<reference ref_id="CVE-2017-5482" ref_url="https://www.suse.com/security/cve/CVE-2017-5482/" source="CVE"/>
		<reference ref_id="CVE-2017-5483" ref_url="https://www.suse.com/security/cve/CVE-2017-5483/" source="CVE"/>
		<reference ref_id="CVE-2017-5484" ref_url="https://www.suse.com/security/cve/CVE-2017-5484/" source="CVE"/>
		<reference ref_id="CVE-2017-5485" ref_url="https://www.suse.com/security/cve/CVE-2017-5485/" source="CVE"/>
		<reference ref_id="CVE-2017-5486" ref_url="https://www.suse.com/security/cve/CVE-2017-5486/" source="CVE"/>
		<description>
These are all security issues fixed in the tcpdump-4.9.0-13.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8767/">CVE-2014-8767</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8768/">CVE-2014-8768</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8769/">CVE-2014-8769</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9140/">CVE-2014-9140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0261/">CVE-2015-0261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2153/">CVE-2015-2153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2154/">CVE-2015-2154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2155/">CVE-2015-2155</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3138/">CVE-2015-3138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7922/">CVE-2016-7922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7923/">CVE-2016-7923</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7924/">CVE-2016-7924</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7925/">CVE-2016-7925</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7926/">CVE-2016-7926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7927/">CVE-2016-7927</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7928/">CVE-2016-7928</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7929/">CVE-2016-7929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7930/">CVE-2016-7930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7931/">CVE-2016-7931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7932/">CVE-2016-7932</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7933/">CVE-2016-7933</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7934/">CVE-2016-7934</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7935/">CVE-2016-7935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7936/">CVE-2016-7936</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7937/">CVE-2016-7937</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7938/">CVE-2016-7938</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7939/">CVE-2016-7939</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7940/">CVE-2016-7940</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7973/">CVE-2016-7973</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7974/">CVE-2016-7974</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7975/">CVE-2016-7975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7983/">CVE-2016-7983</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7984/">CVE-2016-7984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7985/">CVE-2016-7985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7986/">CVE-2016-7986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7992/">CVE-2016-7992</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7993/">CVE-2016-7993</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8574/">CVE-2016-8574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8575/">CVE-2016-8575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5202/">CVE-2017-5202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5203/">CVE-2017-5203</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5204/">CVE-2017-5204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5205/">CVE-2017-5205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5341/">CVE-2017-5341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5342/">CVE-2017-5342</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5482/">CVE-2017-5482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5483/">CVE-2017-5483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5484/">CVE-2017-5484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5485/">CVE-2017-5485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5486/">CVE-2017-5486</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76779" version="1" class="patch">
	<metadata>
		<title>telepathy-gabble-0.18.3-5.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1000" ref_url="https://www.suse.com/security/cve/CVE-2011-1000/" source="CVE"/>
		<reference ref_id="CVE-2013-1431" ref_url="https://www.suse.com/security/cve/CVE-2013-1431/" source="CVE"/>
		<description>
These are all security issues fixed in the telepathy-gabble-0.18.3-5.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1000/">CVE-2011-1000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1431/">CVE-2013-1431</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142152" comment="telepathy-gabble-0.18.3-5.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76780" version="1" class="patch">
	<metadata>
		<title>telepathy-idle-0.2.0-1.62 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-6746" ref_url="https://www.suse.com/security/cve/CVE-2007-6746/" source="CVE"/>
		<description>
These are all security issues fixed in the telepathy-idle-0.2.0-1.62 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6746/">CVE-2007-6746</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141815" comment="telepathy-idle-0.2.0-1.62 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76781" version="1" class="patch">
	<metadata>
		<title>tftp-5.2-10.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-2199" ref_url="https://www.suse.com/security/cve/CVE-2011-2199/" source="CVE"/>
		<description>
These are all security issues fixed in the tftp-5.2-10.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2199/">CVE-2011-2199</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141141" comment="tftp-5.2-10.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76782" version="1" class="patch">
	<metadata>
		<title>unixODBC-2.3.4-6.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1145" ref_url="https://www.suse.com/security/cve/CVE-2011-1145/" source="CVE"/>
		<description>
These are all security issues fixed in the unixODBC-2.3.4-6.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1145/">CVE-2011-1145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141151" comment="unixODBC-2.3.4-6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141152" comment="unixODBC-32bit-2.3.4-6.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76783" version="1" class="patch">
	<metadata>
		<title>unrar-5.0.14-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<description>
These are all security issues fixed in the unrar-5.0.14-3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157766" comment="unrar-5.0.14-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76784" version="1" class="patch">
	<metadata>
		<title>unzip-6.00-32.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-8139" ref_url="https://www.suse.com/security/cve/CVE-2014-8139/" source="CVE"/>
		<reference ref_id="CVE-2014-8140" ref_url="https://www.suse.com/security/cve/CVE-2014-8140/" source="CVE"/>
		<reference ref_id="CVE-2014-8141" ref_url="https://www.suse.com/security/cve/CVE-2014-8141/" source="CVE"/>
		<reference ref_id="CVE-2014-9636" ref_url="https://www.suse.com/security/cve/CVE-2014-9636/" source="CVE"/>
		<description>
These are all security issues fixed in the unzip-6.00-32.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8139/">CVE-2014-8139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8140/">CVE-2014-8140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8141/">CVE-2014-8141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9636/">CVE-2014-9636</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106381" comment="unzip-6.00-32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76785" version="1" class="patch">
	<metadata>
		<title>update-alternatives-1.18.4-14.216 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-0840" ref_url="https://www.suse.com/security/cve/CVE-2015-0840/" source="CVE"/>
		<description>
These are all security issues fixed in the update-alternatives-1.18.4-14.216 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0840/">CVE-2015-0840</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141153" comment="update-alternatives-1.18.4-14.216 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76786" version="1" class="patch">
	<metadata>
		<title>vino-3.20.2-5.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-0904" ref_url="https://www.suse.com/security/cve/CVE-2011-0904/" source="CVE"/>
		<reference ref_id="CVE-2011-0905" ref_url="https://www.suse.com/security/cve/CVE-2011-0905/" source="CVE"/>
		<reference ref_id="CVE-2011-1164" ref_url="https://www.suse.com/security/cve/CVE-2011-1164/" source="CVE"/>
		<description>
These are all security issues fixed in the vino-3.20.2-5.8 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0904/">CVE-2011-0904</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-0905/">CVE-2011-0905</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1164/">CVE-2011-1164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141154" comment="vino-3.20.2-5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141155" comment="vino-lang-3.20.2-5.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76787" version="1" class="patch">
	<metadata>
		<title>vorbis-tools-1.4.0-26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-1686" ref_url="https://www.suse.com/security/cve/CVE-2008-1686/" source="CVE"/>
		<reference ref_id="CVE-2014-9638" ref_url="https://www.suse.com/security/cve/CVE-2014-9638/" source="CVE"/>
		<reference ref_id="CVE-2014-9639" ref_url="https://www.suse.com/security/cve/CVE-2014-9639/" source="CVE"/>
		<reference ref_id="CVE-2014-9640" ref_url="https://www.suse.com/security/cve/CVE-2014-9640/" source="CVE"/>
		<reference ref_id="CVE-2015-6749" ref_url="https://www.suse.com/security/cve/CVE-2015-6749/" source="CVE"/>
		<description>
These are all security issues fixed in the vorbis-tools-1.4.0-26.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1686/">CVE-2008-1686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9638/">CVE-2014-9638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9639/">CVE-2014-9639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9640/">CVE-2014-9640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6749/">CVE-2015-6749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009115051" comment="vorbis-tools-1.4.0-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115052" comment="vorbis-tools-lang-1.4.0-26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76788" version="1" class="patch">
	<metadata>
		<title>w3m-0.5.3.git20161120-160.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2074" ref_url="https://www.suse.com/security/cve/CVE-2010-2074/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2016-9434" ref_url="https://www.suse.com/security/cve/CVE-2016-9434/" source="CVE"/>
		<reference ref_id="CVE-2016-9435" ref_url="https://www.suse.com/security/cve/CVE-2016-9435/" source="CVE"/>
		<reference ref_id="CVE-2016-9436" ref_url="https://www.suse.com/security/cve/CVE-2016-9436/" source="CVE"/>
		<reference ref_id="CVE-2016-9437" ref_url="https://www.suse.com/security/cve/CVE-2016-9437/" source="CVE"/>
		<reference ref_id="CVE-2016-9438" ref_url="https://www.suse.com/security/cve/CVE-2016-9438/" source="CVE"/>
		<reference ref_id="CVE-2016-9439" ref_url="https://www.suse.com/security/cve/CVE-2016-9439/" source="CVE"/>
		<reference ref_id="CVE-2016-9440" ref_url="https://www.suse.com/security/cve/CVE-2016-9440/" source="CVE"/>
		<reference ref_id="CVE-2016-9441" ref_url="https://www.suse.com/security/cve/CVE-2016-9441/" source="CVE"/>
		<reference ref_id="CVE-2016-9442" ref_url="https://www.suse.com/security/cve/CVE-2016-9442/" source="CVE"/>
		<reference ref_id="CVE-2016-9443" ref_url="https://www.suse.com/security/cve/CVE-2016-9443/" source="CVE"/>
		<reference ref_id="CVE-2016-9621" ref_url="https://www.suse.com/security/cve/CVE-2016-9621/" source="CVE"/>
		<reference ref_id="CVE-2016-9622" ref_url="https://www.suse.com/security/cve/CVE-2016-9622/" source="CVE"/>
		<reference ref_id="CVE-2016-9623" ref_url="https://www.suse.com/security/cve/CVE-2016-9623/" source="CVE"/>
		<reference ref_id="CVE-2016-9624" ref_url="https://www.suse.com/security/cve/CVE-2016-9624/" source="CVE"/>
		<reference ref_id="CVE-2016-9625" ref_url="https://www.suse.com/security/cve/CVE-2016-9625/" source="CVE"/>
		<reference ref_id="CVE-2016-9626" ref_url="https://www.suse.com/security/cve/CVE-2016-9626/" source="CVE"/>
		<reference ref_id="CVE-2016-9627" ref_url="https://www.suse.com/security/cve/CVE-2016-9627/" source="CVE"/>
		<reference ref_id="CVE-2016-9628" ref_url="https://www.suse.com/security/cve/CVE-2016-9628/" source="CVE"/>
		<reference ref_id="CVE-2016-9629" ref_url="https://www.suse.com/security/cve/CVE-2016-9629/" source="CVE"/>
		<reference ref_id="CVE-2016-9630" ref_url="https://www.suse.com/security/cve/CVE-2016-9630/" source="CVE"/>
		<reference ref_id="CVE-2016-9631" ref_url="https://www.suse.com/security/cve/CVE-2016-9631/" source="CVE"/>
		<reference ref_id="CVE-2016-9632" ref_url="https://www.suse.com/security/cve/CVE-2016-9632/" source="CVE"/>
		<reference ref_id="CVE-2016-9633" ref_url="https://www.suse.com/security/cve/CVE-2016-9633/" source="CVE"/>
		<description>
These are all security issues fixed in the w3m-0.5.3.git20161120-160.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2074/">CVE-2010-2074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9434/">CVE-2016-9434</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9435/">CVE-2016-9435</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9436/">CVE-2016-9436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9437/">CVE-2016-9437</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9438/">CVE-2016-9438</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9439/">CVE-2016-9439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9440/">CVE-2016-9440</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9441/">CVE-2016-9441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9442/">CVE-2016-9442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9443/">CVE-2016-9443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9621/">CVE-2016-9621</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9622/">CVE-2016-9622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9623/">CVE-2016-9623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9624/">CVE-2016-9624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9625/">CVE-2016-9625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9626/">CVE-2016-9626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9627/">CVE-2016-9627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9628/">CVE-2016-9628</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9629/">CVE-2016-9629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9630/">CVE-2016-9630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9631/">CVE-2016-9631</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9632/">CVE-2016-9632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9633/">CVE-2016-9633</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009136644" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76789" version="1" class="patch">
	<metadata>
		<title>wdiff-1.2.1-3.64 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<description>
These are all security issues fixed in the wdiff-1.2.1-3.64 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140672" comment="wdiff-1.2.1-3.64 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76790" version="1" class="patch">
	<metadata>
		<title>wget-1.14-20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2252" ref_url="https://www.suse.com/security/cve/CVE-2010-2252/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2014-4877" ref_url="https://www.suse.com/security/cve/CVE-2014-4877/" source="CVE"/>
		<reference ref_id="CVE-2015-2059" ref_url="https://www.suse.com/security/cve/CVE-2015-2059/" source="CVE"/>
		<reference ref_id="CVE-2016-4971" ref_url="https://www.suse.com/security/cve/CVE-2016-4971/" source="CVE"/>
		<reference ref_id="CVE-2016-7098" ref_url="https://www.suse.com/security/cve/CVE-2016-7098/" source="CVE"/>
		<reference ref_id="CVE-2017-6508" ref_url="https://www.suse.com/security/cve/CVE-2017-6508/" source="CVE"/>
		<description>
These are all security issues fixed in the wget-1.14-20.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2252/">CVE-2010-2252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4877/">CVE-2014-4877</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2059/">CVE-2015-2059</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4971/">CVE-2016-4971</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7098/">CVE-2016-7098</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6508/">CVE-2017-6508</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009149815" comment="wget-1.14-20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76791" version="1" class="patch">
	<metadata>
		<title>wpa_supplicant-2.2-14.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-3686" ref_url="https://www.suse.com/security/cve/CVE-2014-3686/" source="CVE"/>
		<reference ref_id="CVE-2015-0210" ref_url="https://www.suse.com/security/cve/CVE-2015-0210/" source="CVE"/>
		<reference ref_id="CVE-2015-1863" ref_url="https://www.suse.com/security/cve/CVE-2015-1863/" source="CVE"/>
		<reference ref_id="CVE-2015-4141" ref_url="https://www.suse.com/security/cve/CVE-2015-4141/" source="CVE"/>
		<reference ref_id="CVE-2015-4142" ref_url="https://www.suse.com/security/cve/CVE-2015-4142/" source="CVE"/>
		<reference ref_id="CVE-2015-4143" ref_url="https://www.suse.com/security/cve/CVE-2015-4143/" source="CVE"/>
		<reference ref_id="CVE-2015-5130" ref_url="https://www.suse.com/security/cve/CVE-2015-5130/" source="CVE"/>
		<reference ref_id="CVE-2015-5310" ref_url="https://www.suse.com/security/cve/CVE-2015-5310/" source="CVE"/>
		<reference ref_id="CVE-2015-8041" ref_url="https://www.suse.com/security/cve/CVE-2015-8041/" source="CVE"/>
		<description>
These are all security issues fixed in the wpa_supplicant-2.2-14.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3686/">CVE-2014-3686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0210/">CVE-2015-0210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1863/">CVE-2015-1863</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4141/">CVE-2015-4141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4142/">CVE-2015-4142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4143/">CVE-2015-4143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5130/">CVE-2015-5130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5310/">CVE-2015-5310</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8041/">CVE-2015-8041</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131098" comment="wpa_supplicant-2.2-14.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76792" version="1" class="patch">
	<metadata>
		<title>xalan-j2-2.7.0-264.133 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-0107" ref_url="https://www.suse.com/security/cve/CVE-2014-0107/" source="CVE"/>
		<description>
These are all security issues fixed in the xalan-j2-2.7.0-264.133 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0107/">CVE-2014-0107</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141828" comment="xalan-j2-2.7.0-264.133 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76793" version="1" class="patch">
	<metadata>
		<title>xdg-utils-20140630-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-9622" ref_url="https://www.suse.com/security/cve/CVE-2014-9622/" source="CVE"/>
		<description>
These are all security issues fixed in the xdg-utils-20140630-5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9622/">CVE-2014-9622</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106065" comment="xdg-utils-20140630-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76794" version="1" class="patch">
	<metadata>
		<title>xen-4.9.0_08-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1898" ref_url="https://www.suse.com/security/cve/CVE-2011-1898/" source="CVE"/>
		<reference ref_id="CVE-2012-0029" ref_url="https://www.suse.com/security/cve/CVE-2012-0029/" source="CVE"/>
		<reference ref_id="CVE-2012-0217" ref_url="https://www.suse.com/security/cve/CVE-2012-0217/" source="CVE"/>
		<reference ref_id="CVE-2012-2625" ref_url="https://www.suse.com/security/cve/CVE-2012-2625/" source="CVE"/>
		<reference ref_id="CVE-2012-3432" ref_url="https://www.suse.com/security/cve/CVE-2012-3432/" source="CVE"/>
		<reference ref_id="CVE-2012-3433" ref_url="https://www.suse.com/security/cve/CVE-2012-3433/" source="CVE"/>
		<reference ref_id="CVE-2012-4411" ref_url="https://www.suse.com/security/cve/CVE-2012-4411/" source="CVE"/>
		<reference ref_id="CVE-2012-4535" ref_url="https://www.suse.com/security/cve/CVE-2012-4535/" source="CVE"/>
		<reference ref_id="CVE-2012-4536" ref_url="https://www.suse.com/security/cve/CVE-2012-4536/" source="CVE"/>
		<reference ref_id="CVE-2012-4537" ref_url="https://www.suse.com/security/cve/CVE-2012-4537/" source="CVE"/>
		<reference ref_id="CVE-2012-4538" ref_url="https://www.suse.com/security/cve/CVE-2012-4538/" source="CVE"/>
		<reference ref_id="CVE-2012-4539" ref_url="https://www.suse.com/security/cve/CVE-2012-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-4544" ref_url="https://www.suse.com/security/cve/CVE-2012-4544/" source="CVE"/>
		<reference ref_id="CVE-2012-5510" ref_url="https://www.suse.com/security/cve/CVE-2012-5510/" source="CVE"/>
		<reference ref_id="CVE-2012-5511" ref_url="https://www.suse.com/security/cve/CVE-2012-5511/" source="CVE"/>
		<reference ref_id="CVE-2012-5513" ref_url="https://www.suse.com/security/cve/CVE-2012-5513/" source="CVE"/>
		<reference ref_id="CVE-2012-5514" ref_url="https://www.suse.com/security/cve/CVE-2012-5514/" source="CVE"/>
		<reference ref_id="CVE-2012-5515" ref_url="https://www.suse.com/security/cve/CVE-2012-5515/" source="CVE"/>
		<reference ref_id="CVE-2012-5525" ref_url="https://www.suse.com/security/cve/CVE-2012-5525/" source="CVE"/>
		<reference ref_id="CVE-2012-5634" ref_url="https://www.suse.com/security/cve/CVE-2012-5634/" source="CVE"/>
		<reference ref_id="CVE-2012-6075" ref_url="https://www.suse.com/security/cve/CVE-2012-6075/" source="CVE"/>
		<reference ref_id="CVE-2013-0151" ref_url="https://www.suse.com/security/cve/CVE-2013-0151/" source="CVE"/>
		<reference ref_id="CVE-2013-0152" ref_url="https://www.suse.com/security/cve/CVE-2013-0152/" source="CVE"/>
		<reference ref_id="CVE-2013-0153" ref_url="https://www.suse.com/security/cve/CVE-2013-0153/" source="CVE"/>
		<reference ref_id="CVE-2013-1442" ref_url="https://www.suse.com/security/cve/CVE-2013-1442/" source="CVE"/>
		<reference ref_id="CVE-2013-1917" ref_url="https://www.suse.com/security/cve/CVE-2013-1917/" source="CVE"/>
		<reference ref_id="CVE-2013-1918" ref_url="https://www.suse.com/security/cve/CVE-2013-1918/" source="CVE"/>
		<reference ref_id="CVE-2013-1919" ref_url="https://www.suse.com/security/cve/CVE-2013-1919/" source="CVE"/>
		<reference ref_id="CVE-2013-1922" ref_url="https://www.suse.com/security/cve/CVE-2013-1922/" source="CVE"/>
		<reference ref_id="CVE-2013-1952" ref_url="https://www.suse.com/security/cve/CVE-2013-1952/" source="CVE"/>
		<reference ref_id="CVE-2013-2007" ref_url="https://www.suse.com/security/cve/CVE-2013-2007/" source="CVE"/>
		<reference ref_id="CVE-2013-3495" ref_url="https://www.suse.com/security/cve/CVE-2013-3495/" source="CVE"/>
		<reference ref_id="CVE-2013-4355" ref_url="https://www.suse.com/security/cve/CVE-2013-4355/" source="CVE"/>
		<reference ref_id="CVE-2013-4356" ref_url="https://www.suse.com/security/cve/CVE-2013-4356/" source="CVE"/>
		<reference ref_id="CVE-2013-4361" ref_url="https://www.suse.com/security/cve/CVE-2013-4361/" source="CVE"/>
		<reference ref_id="CVE-2013-4375" ref_url="https://www.suse.com/security/cve/CVE-2013-4375/" source="CVE"/>
		<reference ref_id="CVE-2013-4416" ref_url="https://www.suse.com/security/cve/CVE-2013-4416/" source="CVE"/>
		<reference ref_id="CVE-2013-4494" ref_url="https://www.suse.com/security/cve/CVE-2013-4494/" source="CVE"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540/" source="CVE"/>
		<reference ref_id="CVE-2013-4551" ref_url="https://www.suse.com/security/cve/CVE-2013-4551/" source="CVE"/>
		<reference ref_id="CVE-2013-4553" ref_url="https://www.suse.com/security/cve/CVE-2013-4553/" source="CVE"/>
		<reference ref_id="CVE-2013-4554" ref_url="https://www.suse.com/security/cve/CVE-2013-4554/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-3124" ref_url="https://www.suse.com/security/cve/CVE-2014-3124/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-3672" ref_url="https://www.suse.com/security/cve/CVE-2014-3672/" source="CVE"/>
		<reference ref_id="CVE-2014-5146" ref_url="https://www.suse.com/security/cve/CVE-2014-5146/" source="CVE"/>
		<reference ref_id="CVE-2014-5149" ref_url="https://www.suse.com/security/cve/CVE-2014-5149/" source="CVE"/>
		<reference ref_id="CVE-2014-6268" ref_url="https://www.suse.com/security/cve/CVE-2014-6268/" source="CVE"/>
		<reference ref_id="CVE-2014-7154" ref_url="https://www.suse.com/security/cve/CVE-2014-7154/" source="CVE"/>
		<reference ref_id="CVE-2014-7155" ref_url="https://www.suse.com/security/cve/CVE-2014-7155/" source="CVE"/>
		<reference ref_id="CVE-2014-7156" ref_url="https://www.suse.com/security/cve/CVE-2014-7156/" source="CVE"/>
		<reference ref_id="CVE-2014-7188" ref_url="https://www.suse.com/security/cve/CVE-2014-7188/" source="CVE"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-3259" ref_url="https://www.suse.com/security/cve/CVE-2015-3259/" source="CVE"/>
		<reference ref_id="CVE-2015-3340" ref_url="https://www.suse.com/security/cve/CVE-2015-3340/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-4103" ref_url="https://www.suse.com/security/cve/CVE-2015-4103/" source="CVE"/>
		<reference ref_id="CVE-2015-4104" ref_url="https://www.suse.com/security/cve/CVE-2015-4104/" source="CVE"/>
		<reference ref_id="CVE-2015-4105" ref_url="https://www.suse.com/security/cve/CVE-2015-4105/" source="CVE"/>
		<reference ref_id="CVE-2015-4106" ref_url="https://www.suse.com/security/cve/CVE-2015-4106/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339/" source="CVE"/>
		<reference ref_id="CVE-2015-8340" ref_url="https://www.suse.com/security/cve/CVE-2015-8340/" source="CVE"/>
		<reference ref_id="CVE-2015-8341" ref_url="https://www.suse.com/security/cve/CVE-2015-8341/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8554" ref_url="https://www.suse.com/security/cve/CVE-2015-8554/" source="CVE"/>
		<reference ref_id="CVE-2015-8555" ref_url="https://www.suse.com/security/cve/CVE-2015-8555/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567/" source="CVE"/>
		<reference ref_id="CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8615" ref_url="https://www.suse.com/security/cve/CVE-2015-8615/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2016-10013" ref_url="https://www.suse.com/security/cve/CVE-2016-10013/" source="CVE"/>
		<reference ref_id="CVE-2016-10024" ref_url="https://www.suse.com/security/cve/CVE-2016-10024/" source="CVE"/>
		<reference ref_id="CVE-2016-10025" ref_url="https://www.suse.com/security/cve/CVE-2016-10025/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1570" ref_url="https://www.suse.com/security/cve/CVE-2016-1570/" source="CVE"/>
		<reference ref_id="CVE-2016-1571" ref_url="https://www.suse.com/security/cve/CVE-2016-1571/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-2270" ref_url="https://www.suse.com/security/cve/CVE-2016-2270/" source="CVE"/>
		<reference ref_id="CVE-2016-2271" ref_url="https://www.suse.com/security/cve/CVE-2016-2271/" source="CVE"/>
		<reference ref_id="CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391/" source="CVE"/>
		<reference ref_id="CVE-2016-2392" ref_url="https://www.suse.com/security/cve/CVE-2016-2392/" source="CVE"/>
		<reference ref_id="CVE-2016-2538" ref_url="https://www.suse.com/security/cve/CVE-2016-2538/" source="CVE"/>
		<reference ref_id="CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-6258" ref_url="https://www.suse.com/security/cve/CVE-2016-6258/" source="CVE"/>
		<reference ref_id="CVE-2016-6259" ref_url="https://www.suse.com/security/cve/CVE-2016-6259/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="CVE-2016-7092" ref_url="https://www.suse.com/security/cve/CVE-2016-7092/" source="CVE"/>
		<reference ref_id="CVE-2016-7093" ref_url="https://www.suse.com/security/cve/CVE-2016-7093/" source="CVE"/>
		<reference ref_id="CVE-2016-7094" ref_url="https://www.suse.com/security/cve/CVE-2016-7094/" source="CVE"/>
		<reference ref_id="CVE-2016-7777" ref_url="https://www.suse.com/security/cve/CVE-2016-7777/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9377" ref_url="https://www.suse.com/security/cve/CVE-2016-9377/" source="CVE"/>
		<reference ref_id="CVE-2016-9378" ref_url="https://www.suse.com/security/cve/CVE-2016-9378/" source="CVE"/>
		<reference ref_id="CVE-2016-9379" ref_url="https://www.suse.com/security/cve/CVE-2016-9379/" source="CVE"/>
		<reference ref_id="CVE-2016-9380" ref_url="https://www.suse.com/security/cve/CVE-2016-9380/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9382" ref_url="https://www.suse.com/security/cve/CVE-2016-9382/" source="CVE"/>
		<reference ref_id="CVE-2016-9383" ref_url="https://www.suse.com/security/cve/CVE-2016-9383/" source="CVE"/>
		<reference ref_id="CVE-2016-9384" ref_url="https://www.suse.com/security/cve/CVE-2016-9384/" source="CVE"/>
		<reference ref_id="CVE-2016-9385" ref_url="https://www.suse.com/security/cve/CVE-2016-9385/" source="CVE"/>
		<reference ref_id="CVE-2016-9386" ref_url="https://www.suse.com/security/cve/CVE-2016-9386/" source="CVE"/>
		<reference ref_id="CVE-2016-9637" ref_url="https://www.suse.com/security/cve/CVE-2016-9637/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2016-9932" ref_url="https://www.suse.com/security/cve/CVE-2016-9932/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-9330" ref_url="https://www.suse.com/security/cve/CVE-2017-9330/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.9.0_08-2.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1898/">CVE-2011-1898</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0029/">CVE-2012-0029</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0217/">CVE-2012-0217</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2625/">CVE-2012-2625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3432/">CVE-2012-3432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3433/">CVE-2012-3433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4411/">CVE-2012-4411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4535/">CVE-2012-4535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4536/">CVE-2012-4536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4537/">CVE-2012-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4538/">CVE-2012-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4539/">CVE-2012-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4544/">CVE-2012-4544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5510/">CVE-2012-5510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5511/">CVE-2012-5511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5513/">CVE-2012-5513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5514/">CVE-2012-5514</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5515/">CVE-2012-5515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5525/">CVE-2012-5525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5634/">CVE-2012-5634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6075/">CVE-2012-6075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0151/">CVE-2013-0151</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0152/">CVE-2013-0152</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0153/">CVE-2013-0153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1442/">CVE-2013-1442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1917/">CVE-2013-1917</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1918/">CVE-2013-1918</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1919/">CVE-2013-1919</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1922/">CVE-2013-1922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1952/">CVE-2013-1952</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2007/">CVE-2013-2007</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3495/">CVE-2013-3495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4355/">CVE-2013-4355</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4356/">CVE-2013-4356</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4361/">CVE-2013-4361</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4375/">CVE-2013-4375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4416/">CVE-2013-4416</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4494/">CVE-2013-4494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4551/">CVE-2013-4551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4553/">CVE-2013-4553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4554/">CVE-2013-4554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3124/">CVE-2014-3124</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3672/">CVE-2014-3672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5146/">CVE-2014-5146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5149/">CVE-2014-5149</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6268/">CVE-2014-6268</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7154/">CVE-2014-7154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7155/">CVE-2014-7155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7156/">CVE-2014-7156</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7188/">CVE-2014-7188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3259/">CVE-2015-3259</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3340/">CVE-2015-3340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4103/">CVE-2015-4103</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4104/">CVE-2015-4104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4105/">CVE-2015-4105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4106/">CVE-2015-4106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8340/">CVE-2015-8340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8341/">CVE-2015-8341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8554/">CVE-2015-8554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8555/">CVE-2015-8555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8615/">CVE-2015-8615</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10013/">CVE-2016-10013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10024/">CVE-2016-10024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10025/">CVE-2016-10025</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1570/">CVE-2016-1570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1571/">CVE-2016-1571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2270/">CVE-2016-2270</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2271/">CVE-2016-2271</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2392/">CVE-2016-2392</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2538/">CVE-2016-2538</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6258/">CVE-2016-6258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6259/">CVE-2016-6259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7092/">CVE-2016-7092</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7093/">CVE-2016-7093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7094/">CVE-2016-7094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7777/">CVE-2016-7777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9377/">CVE-2016-9377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9378/">CVE-2016-9378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9379/">CVE-2016-9379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9380/">CVE-2016-9380</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9382/">CVE-2016-9382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9383/">CVE-2016-9383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9384/">CVE-2016-9384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9385/">CVE-2016-9385</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9386/">CVE-2016-9386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9637/">CVE-2016-9637</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9932/">CVE-2016-9932</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9330/">CVE-2017-9330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76795" version="1" class="patch">
	<metadata>
		<title>xf86-video-intel-2.99.917.770_gcb6ba2da-1.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-4910" ref_url="https://www.suse.com/security/cve/CVE-2014-4910/" source="CVE"/>
		<description>
These are all security issues fixed in the xf86-video-intel-2.99.917.770_gcb6ba2da-1.23 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4910/">CVE-2014-4910</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159323" comment="xf86-video-intel-2.99.917.770_gcb6ba2da-1.23 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76796" version="1" class="patch">
	<metadata>
		<title>xfsprogs-4.3.0-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-2150" ref_url="https://www.suse.com/security/cve/CVE-2012-2150/" source="CVE"/>
		<description>
These are all security issues fixed in the xfsprogs-4.3.0-12.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2150/">CVE-2012-2150</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159324" comment="xfsprogs-4.3.0-12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76797" version="1" class="patch">
	<metadata>
		<title>xinetd-2.3.15-7.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-0862" ref_url="https://www.suse.com/security/cve/CVE-2012-0862/" source="CVE"/>
		<reference ref_id="CVE-2013-4342" ref_url="https://www.suse.com/security/cve/CVE-2013-4342/" source="CVE"/>
		<description>
These are all security issues fixed in the xinetd-2.3.15-7.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0862/">CVE-2012-0862</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4342/">CVE-2013-4342</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141167" comment="xinetd-2.3.15-7.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76798" version="1" class="patch">
	<metadata>
		<title>xlockmore-5.43-5.33 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-4143" ref_url="https://www.suse.com/security/cve/CVE-2013-4143/" source="CVE"/>
		<description>
These are all security issues fixed in the xlockmore-5.43-5.33 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4143/">CVE-2013-4143</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141168" comment="xlockmore-5.43-5.33 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76799" version="1" class="patch">
	<metadata>
		<title>xorg-x11-7.6_1-14.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-0465" ref_url="https://www.suse.com/security/cve/CVE-2011-0465/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-7.6_1-14.17 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0465/">CVE-2011-0465</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141834" comment="xorg-x11-7.6_1-14.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141835" comment="xorg-x11-essentials-7.6_1-14.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141171" comment="xrdb-1.1.0-3.58 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76800" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libs-7.6-45.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libs-7.6-45.14 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141836" comment="xorg-x11-libs-7.6-45.14 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76801" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-7.6_1.18.3-71.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2240" ref_url="https://www.suse.com/security/cve/CVE-2010-2240/" source="CVE"/>
		<reference ref_id="CVE-2013-1940" ref_url="https://www.suse.com/security/cve/CVE-2013-1940/" source="CVE"/>
		<reference ref_id="CVE-2013-4396" ref_url="https://www.suse.com/security/cve/CVE-2013-4396/" source="CVE"/>
		<reference ref_id="CVE-2013-6424" ref_url="https://www.suse.com/security/cve/CVE-2013-6424/" source="CVE"/>
		<reference ref_id="CVE-2014-8091" ref_url="https://www.suse.com/security/cve/CVE-2014-8091/" source="CVE"/>
		<reference ref_id="CVE-2014-8092" ref_url="https://www.suse.com/security/cve/CVE-2014-8092/" source="CVE"/>
		<reference ref_id="CVE-2014-8093" ref_url="https://www.suse.com/security/cve/CVE-2014-8093/" source="CVE"/>
		<reference ref_id="CVE-2014-8094" ref_url="https://www.suse.com/security/cve/CVE-2014-8094/" source="CVE"/>
		<reference ref_id="CVE-2014-8095" ref_url="https://www.suse.com/security/cve/CVE-2014-8095/" source="CVE"/>
		<reference ref_id="CVE-2014-8096" ref_url="https://www.suse.com/security/cve/CVE-2014-8096/" source="CVE"/>
		<reference ref_id="CVE-2014-8097" ref_url="https://www.suse.com/security/cve/CVE-2014-8097/" source="CVE"/>
		<reference ref_id="CVE-2014-8098" ref_url="https://www.suse.com/security/cve/CVE-2014-8098/" source="CVE"/>
		<reference ref_id="CVE-2014-8099" ref_url="https://www.suse.com/security/cve/CVE-2014-8099/" source="CVE"/>
		<reference ref_id="CVE-2014-8100" ref_url="https://www.suse.com/security/cve/CVE-2014-8100/" source="CVE"/>
		<reference ref_id="CVE-2014-8101" ref_url="https://www.suse.com/security/cve/CVE-2014-8101/" source="CVE"/>
		<reference ref_id="CVE-2014-8102" ref_url="https://www.suse.com/security/cve/CVE-2014-8102/" source="CVE"/>
		<reference ref_id="CVE-2014-8103" ref_url="https://www.suse.com/security/cve/CVE-2014-8103/" source="CVE"/>
		<reference ref_id="CVE-2015-0255" ref_url="https://www.suse.com/security/cve/CVE-2015-0255/" source="CVE"/>
		<reference ref_id="CVE-2015-3164" ref_url="https://www.suse.com/security/cve/CVE-2015-3164/" source="CVE"/>
		<reference ref_id="CVE-2015-3418" ref_url="https://www.suse.com/security/cve/CVE-2015-3418/" source="CVE"/>
		<reference ref_id="CVE-2017-2624" ref_url="https://www.suse.com/security/cve/CVE-2017-2624/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-7.6_1.18.3-71.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2240/">CVE-2010-2240</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-1940/">CVE-2013-1940</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4396/">CVE-2013-4396</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6424/">CVE-2013-6424</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8091/">CVE-2014-8091</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2014-8092/">CVE-2014-8092</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8093/">CVE-2014-8093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8094/">CVE-2014-8094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8095/">CVE-2014-8095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8096/">CVE-2014-8096</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8097/">CVE-2014-8097</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8098/">CVE-2014-8098</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8099/">CVE-2014-8099</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8100/">CVE-2014-8100</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8101/">CVE-2014-8101</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8102/">CVE-2014-8102</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8103/">CVE-2014-8103</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0255/">CVE-2015-0255</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3164/">CVE-2015-3164</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3418/">CVE-2015-3418</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-2624/">CVE-2017-2624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009157352" comment="xorg-x11-server-7.6_1.18.3-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157353" comment="xorg-x11-server-extra-7.6_1.18.3-71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76802" version="1" class="patch">
	<metadata>
		<title>xscreensaver-5.22-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-8025" ref_url="https://www.suse.com/security/cve/CVE-2015-8025/" source="CVE"/>
		<description>
These are all security issues fixed in the xscreensaver-5.22-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8025/">CVE-2015-8025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009119273" comment="xscreensaver-5.22-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009119274" comment="xscreensaver-data-5.22-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76803" version="1" class="patch">
	<metadata>
		<title>yast2-3.2.36-1.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-3177" ref_url="https://www.suse.com/security/cve/CVE-2011-3177/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-3.2.36-1.11 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3177/">CVE-2011-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159325" comment="yast2-3.2.36-1.11 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76804" version="1" class="patch">
	<metadata>
		<title>yast2-core-3.2.2-1.29 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<reference ref_id="CVE-2011-3177" ref_url="https://www.suse.com/security/cve/CVE-2011-3177/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-core-3.2.2-1.29 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3177/">CVE-2011-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159326" comment="yast2-core-3.2.2-1.29 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76805" version="1" class="patch">
	<metadata>
		<title>yast2-users-3.2.11-1.47 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-1601" ref_url="https://www.suse.com/security/cve/CVE-2016-1601/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-users-3.2.11-1.47 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1601/">CVE-2016-1601</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159327" comment="yast2-users-3.2.11-1.47 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76806" version="1" class="patch">
	<metadata>
		<title>zoo-2.10-1020.62 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-0855" ref_url="https://www.suse.com/security/cve/CVE-2006-0855/" source="CVE"/>
		<reference ref_id="CVE-2007-1669" ref_url="https://www.suse.com/security/cve/CVE-2007-1669/" source="CVE"/>
		<description>
These are all security issues fixed in the zoo-2.10-1020.62 package on the GA media of SUSE Linux Enterprise Desktop 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-0855/">CVE-2006-0855</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1669/">CVE-2007-1669</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512004" comment="zoo-2.10-1020.62 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76807" version="1" class="patch">
	<metadata>
		<title>DirectFB-1.7.1-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-2977" ref_url="https://www.suse.com/security/cve/CVE-2014-2977/" source="CVE"/>
		<reference ref_id="CVE-2014-2978" ref_url="https://www.suse.com/security/cve/CVE-2014-2978/" source="CVE"/>
		<description>
These are all security issues fixed in the DirectFB-1.7.1-6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-2977/">CVE-2014-2977</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-2978/">CVE-2014-2978</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140428" comment="DirectFB-1.7.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140429" comment="lib++dfb-1_7-1-1.7.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140430" comment="libdirectfb-1_7-1-1.7.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142073" comment="libdirectfb-1_7-1-32bit-1.7.1-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76808" version="1" class="patch">
	<metadata>
		<title>ImageMagick-6.8.8.1-71.85.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-0247" ref_url="https://www.suse.com/security/cve/CVE-2012-0247/" source="CVE"/>
		<reference ref_id="CVE-2012-0248" ref_url="https://www.suse.com/security/cve/CVE-2012-0248/" source="CVE"/>
		<reference ref_id="CVE-2012-1185" ref_url="https://www.suse.com/security/cve/CVE-2012-1185/" source="CVE"/>
		<reference ref_id="CVE-2012-1186" ref_url="https://www.suse.com/security/cve/CVE-2012-1186/" source="CVE"/>
		<reference ref_id="CVE-2014-8354" ref_url="https://www.suse.com/security/cve/CVE-2014-8354/" source="CVE"/>
		<reference ref_id="CVE-2014-8355" ref_url="https://www.suse.com/security/cve/CVE-2014-8355/" source="CVE"/>
		<reference ref_id="CVE-2014-8562" ref_url="https://www.suse.com/security/cve/CVE-2014-8562/" source="CVE"/>
		<reference ref_id="CVE-2014-8716" ref_url="https://www.suse.com/security/cve/CVE-2014-8716/" source="CVE"/>
		<reference ref_id="CVE-2014-9805" ref_url="https://www.suse.com/security/cve/CVE-2014-9805/" source="CVE"/>
		<reference ref_id="CVE-2014-9806" ref_url="https://www.suse.com/security/cve/CVE-2014-9806/" source="CVE"/>
		<reference ref_id="CVE-2014-9807" ref_url="https://www.suse.com/security/cve/CVE-2014-9807/" source="CVE"/>
		<reference ref_id="CVE-2014-9808" ref_url="https://www.suse.com/security/cve/CVE-2014-9808/" source="CVE"/>
		<reference ref_id="CVE-2014-9809" ref_url="https://www.suse.com/security/cve/CVE-2014-9809/" source="CVE"/>
		<reference ref_id="CVE-2014-9810" ref_url="https://www.suse.com/security/cve/CVE-2014-9810/" source="CVE"/>
		<reference ref_id="CVE-2014-9811" ref_url="https://www.suse.com/security/cve/CVE-2014-9811/" source="CVE"/>
		<reference ref_id="CVE-2014-9812" ref_url="https://www.suse.com/security/cve/CVE-2014-9812/" source="CVE"/>
		<reference ref_id="CVE-2014-9813" ref_url="https://www.suse.com/security/cve/CVE-2014-9813/" source="CVE"/>
		<reference ref_id="CVE-2014-9814" ref_url="https://www.suse.com/security/cve/CVE-2014-9814/" source="CVE"/>
		<reference ref_id="CVE-2014-9815" ref_url="https://www.suse.com/security/cve/CVE-2014-9815/" source="CVE"/>
		<reference ref_id="CVE-2014-9816" ref_url="https://www.suse.com/security/cve/CVE-2014-9816/" source="CVE"/>
		<reference ref_id="CVE-2014-9817" ref_url="https://www.suse.com/security/cve/CVE-2014-9817/" source="CVE"/>
		<reference ref_id="CVE-2014-9818" ref_url="https://www.suse.com/security/cve/CVE-2014-9818/" source="CVE"/>
		<reference ref_id="CVE-2014-9819" ref_url="https://www.suse.com/security/cve/CVE-2014-9819/" source="CVE"/>
		<reference ref_id="CVE-2014-9820" ref_url="https://www.suse.com/security/cve/CVE-2014-9820/" source="CVE"/>
		<reference ref_id="CVE-2014-9821" ref_url="https://www.suse.com/security/cve/CVE-2014-9821/" source="CVE"/>
		<reference ref_id="CVE-2014-9822" ref_url="https://www.suse.com/security/cve/CVE-2014-9822/" source="CVE"/>
		<reference ref_id="CVE-2014-9823" ref_url="https://www.suse.com/security/cve/CVE-2014-9823/" source="CVE"/>
		<reference ref_id="CVE-2014-9824" ref_url="https://www.suse.com/security/cve/CVE-2014-9824/" source="CVE"/>
		<reference ref_id="CVE-2014-9825" ref_url="https://www.suse.com/security/cve/CVE-2014-9825/" source="CVE"/>
		<reference ref_id="CVE-2014-9826" ref_url="https://www.suse.com/security/cve/CVE-2014-9826/" source="CVE"/>
		<reference ref_id="CVE-2014-9828" ref_url="https://www.suse.com/security/cve/CVE-2014-9828/" source="CVE"/>
		<reference ref_id="CVE-2014-9829" ref_url="https://www.suse.com/security/cve/CVE-2014-9829/" source="CVE"/>
		<reference ref_id="CVE-2014-9830" ref_url="https://www.suse.com/security/cve/CVE-2014-9830/" source="CVE"/>
		<reference ref_id="CVE-2014-9831" ref_url="https://www.suse.com/security/cve/CVE-2014-9831/" source="CVE"/>
		<reference ref_id="CVE-2014-9832" ref_url="https://www.suse.com/security/cve/CVE-2014-9832/" source="CVE"/>
		<reference ref_id="CVE-2014-9833" ref_url="https://www.suse.com/security/cve/CVE-2014-9833/" source="CVE"/>
		<reference ref_id="CVE-2014-9834" ref_url="https://www.suse.com/security/cve/CVE-2014-9834/" source="CVE"/>
		<reference ref_id="CVE-2014-9835" ref_url="https://www.suse.com/security/cve/CVE-2014-9835/" source="CVE"/>
		<reference ref_id="CVE-2014-9836" ref_url="https://www.suse.com/security/cve/CVE-2014-9836/" source="CVE"/>
		<reference ref_id="CVE-2014-9837" ref_url="https://www.suse.com/security/cve/CVE-2014-9837/" source="CVE"/>
		<reference ref_id="CVE-2014-9838" ref_url="https://www.suse.com/security/cve/CVE-2014-9838/" source="CVE"/>
		<reference ref_id="CVE-2014-9839" ref_url="https://www.suse.com/security/cve/CVE-2014-9839/" source="CVE"/>
		<reference ref_id="CVE-2014-9840" ref_url="https://www.suse.com/security/cve/CVE-2014-9840/" source="CVE"/>
		<reference ref_id="CVE-2014-9841" ref_url="https://www.suse.com/security/cve/CVE-2014-9841/" source="CVE"/>
		<reference ref_id="CVE-2014-9842" ref_url="https://www.suse.com/security/cve/CVE-2014-9842/" source="CVE"/>
		<reference ref_id="CVE-2014-9843" ref_url="https://www.suse.com/security/cve/CVE-2014-9843/" source="CVE"/>
		<reference ref_id="CVE-2014-9844" ref_url="https://www.suse.com/security/cve/CVE-2014-9844/" source="CVE"/>
		<reference ref_id="CVE-2014-9845" ref_url="https://www.suse.com/security/cve/CVE-2014-9845/" source="CVE"/>
		<reference ref_id="CVE-2014-9846" ref_url="https://www.suse.com/security/cve/CVE-2014-9846/" source="CVE"/>
		<reference ref_id="CVE-2014-9847" ref_url="https://www.suse.com/security/cve/CVE-2014-9847/" source="CVE"/>
		<reference ref_id="CVE-2014-9848" ref_url="https://www.suse.com/security/cve/CVE-2014-9848/" source="CVE"/>
		<reference ref_id="CVE-2014-9849" ref_url="https://www.suse.com/security/cve/CVE-2014-9849/" source="CVE"/>
		<reference ref_id="CVE-2014-9850" ref_url="https://www.suse.com/security/cve/CVE-2014-9850/" source="CVE"/>
		<reference ref_id="CVE-2014-9851" ref_url="https://www.suse.com/security/cve/CVE-2014-9851/" source="CVE"/>
		<reference ref_id="CVE-2014-9852" ref_url="https://www.suse.com/security/cve/CVE-2014-9852/" source="CVE"/>
		<reference ref_id="CVE-2014-9853" ref_url="https://www.suse.com/security/cve/CVE-2014-9853/" source="CVE"/>
		<reference ref_id="CVE-2014-9854" ref_url="https://www.suse.com/security/cve/CVE-2014-9854/" source="CVE"/>
		<reference ref_id="CVE-2014-9907" ref_url="https://www.suse.com/security/cve/CVE-2014-9907/" source="CVE"/>
		<reference ref_id="CVE-2015-8894" ref_url="https://www.suse.com/security/cve/CVE-2015-8894/" source="CVE"/>
		<reference ref_id="CVE-2015-8895" ref_url="https://www.suse.com/security/cve/CVE-2015-8895/" source="CVE"/>
		<reference ref_id="CVE-2015-8896" ref_url="https://www.suse.com/security/cve/CVE-2015-8896/" source="CVE"/>
		<reference ref_id="CVE-2015-8897" ref_url="https://www.suse.com/security/cve/CVE-2015-8897/" source="CVE"/>
		<reference ref_id="CVE-2015-8898" ref_url="https://www.suse.com/security/cve/CVE-2015-8898/" source="CVE"/>
		<reference ref_id="CVE-2015-8900" ref_url="https://www.suse.com/security/cve/CVE-2015-8900/" source="CVE"/>
		<reference ref_id="CVE-2015-8901" ref_url="https://www.suse.com/security/cve/CVE-2015-8901/" source="CVE"/>
		<reference ref_id="CVE-2015-8902" ref_url="https://www.suse.com/security/cve/CVE-2015-8902/" source="CVE"/>
		<reference ref_id="CVE-2015-8903" ref_url="https://www.suse.com/security/cve/CVE-2015-8903/" source="CVE"/>
		<reference ref_id="CVE-2015-8957" ref_url="https://www.suse.com/security/cve/CVE-2015-8957/" source="CVE"/>
		<reference ref_id="CVE-2015-8958" ref_url="https://www.suse.com/security/cve/CVE-2015-8958/" source="CVE"/>
		<reference ref_id="CVE-2015-8959" ref_url="https://www.suse.com/security/cve/CVE-2015-8959/" source="CVE"/>
		<reference ref_id="CVE-2016-10046" ref_url="https://www.suse.com/security/cve/CVE-2016-10046/" source="CVE"/>
		<reference ref_id="CVE-2016-10048" ref_url="https://www.suse.com/security/cve/CVE-2016-10048/" source="CVE"/>
		<reference ref_id="CVE-2016-10049" ref_url="https://www.suse.com/security/cve/CVE-2016-10049/" source="CVE"/>
		<reference ref_id="CVE-2016-10050" ref_url="https://www.suse.com/security/cve/CVE-2016-10050/" source="CVE"/>
		<reference ref_id="CVE-2016-10051" ref_url="https://www.suse.com/security/cve/CVE-2016-10051/" source="CVE"/>
		<reference ref_id="CVE-2016-10052" ref_url="https://www.suse.com/security/cve/CVE-2016-10052/" source="CVE"/>
		<reference ref_id="CVE-2016-10059" ref_url="https://www.suse.com/security/cve/CVE-2016-10059/" source="CVE"/>
		<reference ref_id="CVE-2016-10060" ref_url="https://www.suse.com/security/cve/CVE-2016-10060/" source="CVE"/>
		<reference ref_id="CVE-2016-10061" ref_url="https://www.suse.com/security/cve/CVE-2016-10061/" source="CVE"/>
		<reference ref_id="CVE-2016-10062" ref_url="https://www.suse.com/security/cve/CVE-2016-10062/" source="CVE"/>
		<reference ref_id="CVE-2016-10063" ref_url="https://www.suse.com/security/cve/CVE-2016-10063/" source="CVE"/>
		<reference ref_id="CVE-2016-10064" ref_url="https://www.suse.com/security/cve/CVE-2016-10064/" source="CVE"/>
		<reference ref_id="CVE-2016-10065" ref_url="https://www.suse.com/security/cve/CVE-2016-10065/" source="CVE"/>
		<reference ref_id="CVE-2016-10068" ref_url="https://www.suse.com/security/cve/CVE-2016-10068/" source="CVE"/>
		<reference ref_id="CVE-2016-10069" ref_url="https://www.suse.com/security/cve/CVE-2016-10069/" source="CVE"/>
		<reference ref_id="CVE-2016-10070" ref_url="https://www.suse.com/security/cve/CVE-2016-10070/" source="CVE"/>
		<reference ref_id="CVE-2016-10071" ref_url="https://www.suse.com/security/cve/CVE-2016-10071/" source="CVE"/>
		<reference ref_id="CVE-2016-10144" ref_url="https://www.suse.com/security/cve/CVE-2016-10144/" source="CVE"/>
		<reference ref_id="CVE-2016-10145" ref_url="https://www.suse.com/security/cve/CVE-2016-10145/" source="CVE"/>
		<reference ref_id="CVE-2016-10146" ref_url="https://www.suse.com/security/cve/CVE-2016-10146/" source="CVE"/>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<reference ref_id="CVE-2016-3715" ref_url="https://www.suse.com/security/cve/CVE-2016-3715/" source="CVE"/>
		<reference ref_id="CVE-2016-3716" ref_url="https://www.suse.com/security/cve/CVE-2016-3716/" source="CVE"/>
		<reference ref_id="CVE-2016-3717" ref_url="https://www.suse.com/security/cve/CVE-2016-3717/" source="CVE"/>
		<reference ref_id="CVE-2016-3718" ref_url="https://www.suse.com/security/cve/CVE-2016-3718/" source="CVE"/>
		<reference ref_id="CVE-2016-4562" ref_url="https://www.suse.com/security/cve/CVE-2016-4562/" source="CVE"/>
		<reference ref_id="CVE-2016-4563" ref_url="https://www.suse.com/security/cve/CVE-2016-4563/" source="CVE"/>
		<reference ref_id="CVE-2016-4564" ref_url="https://www.suse.com/security/cve/CVE-2016-4564/" source="CVE"/>
		<reference ref_id="CVE-2016-5010" ref_url="https://www.suse.com/security/cve/CVE-2016-5010/" source="CVE"/>
		<reference ref_id="CVE-2016-5118" ref_url="https://www.suse.com/security/cve/CVE-2016-5118/" source="CVE"/>
		<reference ref_id="CVE-2016-5687" ref_url="https://www.suse.com/security/cve/CVE-2016-5687/" source="CVE"/>
		<reference ref_id="CVE-2016-5688" ref_url="https://www.suse.com/security/cve/CVE-2016-5688/" source="CVE"/>
		<reference ref_id="CVE-2016-5689" ref_url="https://www.suse.com/security/cve/CVE-2016-5689/" source="CVE"/>
		<reference ref_id="CVE-2016-5690" ref_url="https://www.suse.com/security/cve/CVE-2016-5690/" source="CVE"/>
		<reference ref_id="CVE-2016-5691" ref_url="https://www.suse.com/security/cve/CVE-2016-5691/" source="CVE"/>
		<reference ref_id="CVE-2016-5841" ref_url="https://www.suse.com/security/cve/CVE-2016-5841/" source="CVE"/>
		<reference ref_id="CVE-2016-5842" ref_url="https://www.suse.com/security/cve/CVE-2016-5842/" source="CVE"/>
		<reference ref_id="CVE-2016-6491" ref_url="https://www.suse.com/security/cve/CVE-2016-6491/" source="CVE"/>
		<reference ref_id="CVE-2016-6520" ref_url="https://www.suse.com/security/cve/CVE-2016-6520/" source="CVE"/>
		<reference ref_id="CVE-2016-6823" ref_url="https://www.suse.com/security/cve/CVE-2016-6823/" source="CVE"/>
		<reference ref_id="CVE-2016-7101" ref_url="https://www.suse.com/security/cve/CVE-2016-7101/" source="CVE"/>
		<reference ref_id="CVE-2016-7513" ref_url="https://www.suse.com/security/cve/CVE-2016-7513/" source="CVE"/>
		<reference ref_id="CVE-2016-7514" ref_url="https://www.suse.com/security/cve/CVE-2016-7514/" source="CVE"/>
		<reference ref_id="CVE-2016-7515" ref_url="https://www.suse.com/security/cve/CVE-2016-7515/" source="CVE"/>
		<reference ref_id="CVE-2016-7516" ref_url="https://www.suse.com/security/cve/CVE-2016-7516/" source="CVE"/>
		<reference ref_id="CVE-2016-7517" ref_url="https://www.suse.com/security/cve/CVE-2016-7517/" source="CVE"/>
		<reference ref_id="CVE-2016-7518" ref_url="https://www.suse.com/security/cve/CVE-2016-7518/" source="CVE"/>
		<reference ref_id="CVE-2016-7519" ref_url="https://www.suse.com/security/cve/CVE-2016-7519/" source="CVE"/>
		<reference ref_id="CVE-2016-7520" ref_url="https://www.suse.com/security/cve/CVE-2016-7520/" source="CVE"/>
		<reference ref_id="CVE-2016-7521" ref_url="https://www.suse.com/security/cve/CVE-2016-7521/" source="CVE"/>
		<reference ref_id="CVE-2016-7522" ref_url="https://www.suse.com/security/cve/CVE-2016-7522/" source="CVE"/>
		<reference ref_id="CVE-2016-7523" ref_url="https://www.suse.com/security/cve/CVE-2016-7523/" source="CVE"/>
		<reference ref_id="CVE-2016-7524" ref_url="https://www.suse.com/security/cve/CVE-2016-7524/" source="CVE"/>
		<reference ref_id="CVE-2016-7525" ref_url="https://www.suse.com/security/cve/CVE-2016-7525/" source="CVE"/>
		<reference ref_id="CVE-2016-7526" ref_url="https://www.suse.com/security/cve/CVE-2016-7526/" source="CVE"/>
		<reference ref_id="CVE-2016-7527" ref_url="https://www.suse.com/security/cve/CVE-2016-7527/" source="CVE"/>
		<reference ref_id="CVE-2016-7528" ref_url="https://www.suse.com/security/cve/CVE-2016-7528/" source="CVE"/>
		<reference ref_id="CVE-2016-7529" ref_url="https://www.suse.com/security/cve/CVE-2016-7529/" source="CVE"/>
		<reference ref_id="CVE-2016-7530" ref_url="https://www.suse.com/security/cve/CVE-2016-7530/" source="CVE"/>
		<reference ref_id="CVE-2016-7531" ref_url="https://www.suse.com/security/cve/CVE-2016-7531/" source="CVE"/>
		<reference ref_id="CVE-2016-7532" ref_url="https://www.suse.com/security/cve/CVE-2016-7532/" source="CVE"/>
		<reference ref_id="CVE-2016-7533" ref_url="https://www.suse.com/security/cve/CVE-2016-7533/" source="CVE"/>
		<reference ref_id="CVE-2016-7534" ref_url="https://www.suse.com/security/cve/CVE-2016-7534/" source="CVE"/>
		<reference ref_id="CVE-2016-7535" ref_url="https://www.suse.com/security/cve/CVE-2016-7535/" source="CVE"/>
		<reference ref_id="CVE-2016-7537" ref_url="https://www.suse.com/security/cve/CVE-2016-7537/" source="CVE"/>
		<reference ref_id="CVE-2016-7538" ref_url="https://www.suse.com/security/cve/CVE-2016-7538/" source="CVE"/>
		<reference ref_id="CVE-2016-7539" ref_url="https://www.suse.com/security/cve/CVE-2016-7539/" source="CVE"/>
		<reference ref_id="CVE-2016-7540" ref_url="https://www.suse.com/security/cve/CVE-2016-7540/" source="CVE"/>
		<reference ref_id="CVE-2016-7799" ref_url="https://www.suse.com/security/cve/CVE-2016-7799/" source="CVE"/>
		<reference ref_id="CVE-2016-7800" ref_url="https://www.suse.com/security/cve/CVE-2016-7800/" source="CVE"/>
		<reference ref_id="CVE-2016-7996" ref_url="https://www.suse.com/security/cve/CVE-2016-7996/" source="CVE"/>
		<reference ref_id="CVE-2016-7997" ref_url="https://www.suse.com/security/cve/CVE-2016-7997/" source="CVE"/>
		<reference ref_id="CVE-2016-8677" ref_url="https://www.suse.com/security/cve/CVE-2016-8677/" source="CVE"/>
		<reference ref_id="CVE-2016-8682" ref_url="https://www.suse.com/security/cve/CVE-2016-8682/" source="CVE"/>
		<reference ref_id="CVE-2016-8683" ref_url="https://www.suse.com/security/cve/CVE-2016-8683/" source="CVE"/>
		<reference ref_id="CVE-2016-8684" ref_url="https://www.suse.com/security/cve/CVE-2016-8684/" source="CVE"/>
		<reference ref_id="CVE-2016-8707" ref_url="https://www.suse.com/security/cve/CVE-2016-8707/" source="CVE"/>
		<reference ref_id="CVE-2016-8862" ref_url="https://www.suse.com/security/cve/CVE-2016-8862/" source="CVE"/>
		<reference ref_id="CVE-2016-8866" ref_url="https://www.suse.com/security/cve/CVE-2016-8866/" source="CVE"/>
		<reference ref_id="CVE-2016-9556" ref_url="https://www.suse.com/security/cve/CVE-2016-9556/" source="CVE"/>
		<reference ref_id="CVE-2016-9559" ref_url="https://www.suse.com/security/cve/CVE-2016-9559/" source="CVE"/>
		<reference ref_id="CVE-2016-9773" ref_url="https://www.suse.com/security/cve/CVE-2016-9773/" source="CVE"/>
		<reference ref_id="CVE-2017-1000445" ref_url="https://www.suse.com/security/cve/CVE-2017-1000445/" source="CVE"/>
		<reference ref_id="CVE-2017-1000476" ref_url="https://www.suse.com/security/cve/CVE-2017-1000476/" source="CVE"/>
		<reference ref_id="CVE-2017-10800" ref_url="https://www.suse.com/security/cve/CVE-2017-10800/" source="CVE"/>
		<reference ref_id="CVE-2017-10928" ref_url="https://www.suse.com/security/cve/CVE-2017-10928/" source="CVE"/>
		<reference ref_id="CVE-2017-10995" ref_url="https://www.suse.com/security/cve/CVE-2017-10995/" source="CVE"/>
		<reference ref_id="CVE-2017-11141" ref_url="https://www.suse.com/security/cve/CVE-2017-11141/" source="CVE"/>
		<reference ref_id="CVE-2017-11166" ref_url="https://www.suse.com/security/cve/CVE-2017-11166/" source="CVE"/>
		<reference ref_id="CVE-2017-11170" ref_url="https://www.suse.com/security/cve/CVE-2017-11170/" source="CVE"/>
		<reference ref_id="CVE-2017-11188" ref_url="https://www.suse.com/security/cve/CVE-2017-11188/" source="CVE"/>
		<reference ref_id="CVE-2017-11403" ref_url="https://www.suse.com/security/cve/CVE-2017-11403/" source="CVE"/>
		<reference ref_id="CVE-2017-11446" ref_url="https://www.suse.com/security/cve/CVE-2017-11446/" source="CVE"/>
		<reference ref_id="CVE-2017-11448" ref_url="https://www.suse.com/security/cve/CVE-2017-11448/" source="CVE"/>
		<reference ref_id="CVE-2017-11449" ref_url="https://www.suse.com/security/cve/CVE-2017-11449/" source="CVE"/>
		<reference ref_id="CVE-2017-11450" ref_url="https://www.suse.com/security/cve/CVE-2017-11450/" source="CVE"/>
		<reference ref_id="CVE-2017-11478" ref_url="https://www.suse.com/security/cve/CVE-2017-11478/" source="CVE"/>
		<reference ref_id="CVE-2017-11505" ref_url="https://www.suse.com/security/cve/CVE-2017-11505/" source="CVE"/>
		<reference ref_id="CVE-2017-11523" ref_url="https://www.suse.com/security/cve/CVE-2017-11523/" source="CVE"/>
		<reference ref_id="CVE-2017-11524" ref_url="https://www.suse.com/security/cve/CVE-2017-11524/" source="CVE"/>
		<reference ref_id="CVE-2017-11525" ref_url="https://www.suse.com/security/cve/CVE-2017-11525/" source="CVE"/>
		<reference ref_id="CVE-2017-11526" ref_url="https://www.suse.com/security/cve/CVE-2017-11526/" source="CVE"/>
		<reference ref_id="CVE-2017-11527" ref_url="https://www.suse.com/security/cve/CVE-2017-11527/" source="CVE"/>
		<reference ref_id="CVE-2017-11528" ref_url="https://www.suse.com/security/cve/CVE-2017-11528/" source="CVE"/>
		<reference ref_id="CVE-2017-11529" ref_url="https://www.suse.com/security/cve/CVE-2017-11529/" source="CVE"/>
		<reference ref_id="CVE-2017-11530" ref_url="https://www.suse.com/security/cve/CVE-2017-11530/" source="CVE"/>
		<reference ref_id="CVE-2017-11531" ref_url="https://www.suse.com/security/cve/CVE-2017-11531/" source="CVE"/>
		<reference ref_id="CVE-2017-11532" ref_url="https://www.suse.com/security/cve/CVE-2017-11532/" source="CVE"/>
		<reference ref_id="CVE-2017-11533" ref_url="https://www.suse.com/security/cve/CVE-2017-11533/" source="CVE"/>
		<reference ref_id="CVE-2017-11534" ref_url="https://www.suse.com/security/cve/CVE-2017-11534/" source="CVE"/>
		<reference ref_id="CVE-2017-11535" ref_url="https://www.suse.com/security/cve/CVE-2017-11535/" source="CVE"/>
		<reference ref_id="CVE-2017-11537" ref_url="https://www.suse.com/security/cve/CVE-2017-11537/" source="CVE"/>
		<reference ref_id="CVE-2017-11539" ref_url="https://www.suse.com/security/cve/CVE-2017-11539/" source="CVE"/>
		<reference ref_id="CVE-2017-11638" ref_url="https://www.suse.com/security/cve/CVE-2017-11638/" source="CVE"/>
		<reference ref_id="CVE-2017-11639" ref_url="https://www.suse.com/security/cve/CVE-2017-11639/" source="CVE"/>
		<reference ref_id="CVE-2017-11640" ref_url="https://www.suse.com/security/cve/CVE-2017-11640/" source="CVE"/>
		<reference ref_id="CVE-2017-11642" ref_url="https://www.suse.com/security/cve/CVE-2017-11642/" source="CVE"/>
		<reference ref_id="CVE-2017-11644" ref_url="https://www.suse.com/security/cve/CVE-2017-11644/" source="CVE"/>
		<reference ref_id="CVE-2017-11724" ref_url="https://www.suse.com/security/cve/CVE-2017-11724/" source="CVE"/>
		<reference ref_id="CVE-2017-11750" ref_url="https://www.suse.com/security/cve/CVE-2017-11750/" source="CVE"/>
		<reference ref_id="CVE-2017-11751" ref_url="https://www.suse.com/security/cve/CVE-2017-11751/" source="CVE"/>
		<reference ref_id="CVE-2017-11752" ref_url="https://www.suse.com/security/cve/CVE-2017-11752/" source="CVE"/>
		<reference ref_id="CVE-2017-12140" ref_url="https://www.suse.com/security/cve/CVE-2017-12140/" source="CVE"/>
		<reference ref_id="CVE-2017-12418" ref_url="https://www.suse.com/security/cve/CVE-2017-12418/" source="CVE"/>
		<reference ref_id="CVE-2017-12427" ref_url="https://www.suse.com/security/cve/CVE-2017-12427/" source="CVE"/>
		<reference ref_id="CVE-2017-12428" ref_url="https://www.suse.com/security/cve/CVE-2017-12428/" source="CVE"/>
		<reference ref_id="CVE-2017-12429" ref_url="https://www.suse.com/security/cve/CVE-2017-12429/" source="CVE"/>
		<reference ref_id="CVE-2017-12430" ref_url="https://www.suse.com/security/cve/CVE-2017-12430/" source="CVE"/>
		<reference ref_id="CVE-2017-12431" ref_url="https://www.suse.com/security/cve/CVE-2017-12431/" source="CVE"/>
		<reference ref_id="CVE-2017-12432" ref_url="https://www.suse.com/security/cve/CVE-2017-12432/" source="CVE"/>
		<reference ref_id="CVE-2017-12433" ref_url="https://www.suse.com/security/cve/CVE-2017-12433/" source="CVE"/>
		<reference ref_id="CVE-2017-12434" ref_url="https://www.suse.com/security/cve/CVE-2017-12434/" source="CVE"/>
		<reference ref_id="CVE-2017-12435" ref_url="https://www.suse.com/security/cve/CVE-2017-12435/" source="CVE"/>
		<reference ref_id="CVE-2017-12563" ref_url="https://www.suse.com/security/cve/CVE-2017-12563/" source="CVE"/>
		<reference ref_id="CVE-2017-12564" ref_url="https://www.suse.com/security/cve/CVE-2017-12564/" source="CVE"/>
		<reference ref_id="CVE-2017-12565" ref_url="https://www.suse.com/security/cve/CVE-2017-12565/" source="CVE"/>
		<reference ref_id="CVE-2017-12566" ref_url="https://www.suse.com/security/cve/CVE-2017-12566/" source="CVE"/>
		<reference ref_id="CVE-2017-12587" ref_url="https://www.suse.com/security/cve/CVE-2017-12587/" source="CVE"/>
		<reference ref_id="CVE-2017-12640" ref_url="https://www.suse.com/security/cve/CVE-2017-12640/" source="CVE"/>
		<reference ref_id="CVE-2017-12641" ref_url="https://www.suse.com/security/cve/CVE-2017-12641/" source="CVE"/>
		<reference ref_id="CVE-2017-12642" ref_url="https://www.suse.com/security/cve/CVE-2017-12642/" source="CVE"/>
		<reference ref_id="CVE-2017-12643" ref_url="https://www.suse.com/security/cve/CVE-2017-12643/" source="CVE"/>
		<reference ref_id="CVE-2017-12644" ref_url="https://www.suse.com/security/cve/CVE-2017-12644/" source="CVE"/>
		<reference ref_id="CVE-2017-12654" ref_url="https://www.suse.com/security/cve/CVE-2017-12654/" source="CVE"/>
		<reference ref_id="CVE-2017-12662" ref_url="https://www.suse.com/security/cve/CVE-2017-12662/" source="CVE"/>
		<reference ref_id="CVE-2017-12663" ref_url="https://www.suse.com/security/cve/CVE-2017-12663/" source="CVE"/>
		<reference ref_id="CVE-2017-12664" ref_url="https://www.suse.com/security/cve/CVE-2017-12664/" source="CVE"/>
		<reference ref_id="CVE-2017-12665" ref_url="https://www.suse.com/security/cve/CVE-2017-12665/" source="CVE"/>
		<reference ref_id="CVE-2017-12667" ref_url="https://www.suse.com/security/cve/CVE-2017-12667/" source="CVE"/>
		<reference ref_id="CVE-2017-12668" ref_url="https://www.suse.com/security/cve/CVE-2017-12668/" source="CVE"/>
		<reference ref_id="CVE-2017-12669" ref_url="https://www.suse.com/security/cve/CVE-2017-12669/" source="CVE"/>
		<reference ref_id="CVE-2017-12670" ref_url="https://www.suse.com/security/cve/CVE-2017-12670/" source="CVE"/>
		<reference ref_id="CVE-2017-12671" ref_url="https://www.suse.com/security/cve/CVE-2017-12671/" source="CVE"/>
		<reference ref_id="CVE-2017-12672" ref_url="https://www.suse.com/security/cve/CVE-2017-12672/" source="CVE"/>
		<reference ref_id="CVE-2017-12673" ref_url="https://www.suse.com/security/cve/CVE-2017-12673/" source="CVE"/>
		<reference ref_id="CVE-2017-12674" ref_url="https://www.suse.com/security/cve/CVE-2017-12674/" source="CVE"/>
		<reference ref_id="CVE-2017-12675" ref_url="https://www.suse.com/security/cve/CVE-2017-12675/" source="CVE"/>
		<reference ref_id="CVE-2017-12676" ref_url="https://www.suse.com/security/cve/CVE-2017-12676/" source="CVE"/>
		<reference ref_id="CVE-2017-12691" ref_url="https://www.suse.com/security/cve/CVE-2017-12691/" source="CVE"/>
		<reference ref_id="CVE-2017-12692" ref_url="https://www.suse.com/security/cve/CVE-2017-12692/" source="CVE"/>
		<reference ref_id="CVE-2017-12693" ref_url="https://www.suse.com/security/cve/CVE-2017-12693/" source="CVE"/>
		<reference ref_id="CVE-2017-12935" ref_url="https://www.suse.com/security/cve/CVE-2017-12935/" source="CVE"/>
		<reference ref_id="CVE-2017-12983" ref_url="https://www.suse.com/security/cve/CVE-2017-12983/" source="CVE"/>
		<reference ref_id="CVE-2017-13058" ref_url="https://www.suse.com/security/cve/CVE-2017-13058/" source="CVE"/>
		<reference ref_id="CVE-2017-13059" ref_url="https://www.suse.com/security/cve/CVE-2017-13059/" source="CVE"/>
		<reference ref_id="CVE-2017-13060" ref_url="https://www.suse.com/security/cve/CVE-2017-13060/" source="CVE"/>
		<reference ref_id="CVE-2017-13061" ref_url="https://www.suse.com/security/cve/CVE-2017-13061/" source="CVE"/>
		<reference ref_id="CVE-2017-13062" ref_url="https://www.suse.com/security/cve/CVE-2017-13062/" source="CVE"/>
		<reference ref_id="CVE-2017-13131" ref_url="https://www.suse.com/security/cve/CVE-2017-13131/" source="CVE"/>
		<reference ref_id="CVE-2017-13133" ref_url="https://www.suse.com/security/cve/CVE-2017-13133/" source="CVE"/>
		<reference ref_id="CVE-2017-13134" ref_url="https://www.suse.com/security/cve/CVE-2017-13134/" source="CVE"/>
		<reference ref_id="CVE-2017-13139" ref_url="https://www.suse.com/security/cve/CVE-2017-13139/" source="CVE"/>
		<reference ref_id="CVE-2017-13141" ref_url="https://www.suse.com/security/cve/CVE-2017-13141/" source="CVE"/>
		<reference ref_id="CVE-2017-13142" ref_url="https://www.suse.com/security/cve/CVE-2017-13142/" source="CVE"/>
		<reference ref_id="CVE-2017-13146" ref_url="https://www.suse.com/security/cve/CVE-2017-13146/" source="CVE"/>
		<reference ref_id="CVE-2017-13147" ref_url="https://www.suse.com/security/cve/CVE-2017-13147/" source="CVE"/>
		<reference ref_id="CVE-2017-13648" ref_url="https://www.suse.com/security/cve/CVE-2017-13648/" source="CVE"/>
		<reference ref_id="CVE-2017-13658" ref_url="https://www.suse.com/security/cve/CVE-2017-13658/" source="CVE"/>
		<reference ref_id="CVE-2017-13758" ref_url="https://www.suse.com/security/cve/CVE-2017-13758/" source="CVE"/>
		<reference ref_id="CVE-2017-13768" ref_url="https://www.suse.com/security/cve/CVE-2017-13768/" source="CVE"/>
		<reference ref_id="CVE-2017-13769" ref_url="https://www.suse.com/security/cve/CVE-2017-13769/" source="CVE"/>
		<reference ref_id="CVE-2017-14042" ref_url="https://www.suse.com/security/cve/CVE-2017-14042/" source="CVE"/>
		<reference ref_id="CVE-2017-14060" ref_url="https://www.suse.com/security/cve/CVE-2017-14060/" source="CVE"/>
		<reference ref_id="CVE-2017-14103" ref_url="https://www.suse.com/security/cve/CVE-2017-14103/" source="CVE"/>
		<reference ref_id="CVE-2017-14138" ref_url="https://www.suse.com/security/cve/CVE-2017-14138/" source="CVE"/>
		<reference ref_id="CVE-2017-14139" ref_url="https://www.suse.com/security/cve/CVE-2017-14139/" source="CVE"/>
		<reference ref_id="CVE-2017-14172" ref_url="https://www.suse.com/security/cve/CVE-2017-14172/" source="CVE"/>
		<reference ref_id="CVE-2017-14173" ref_url="https://www.suse.com/security/cve/CVE-2017-14173/" source="CVE"/>
		<reference ref_id="CVE-2017-14174" ref_url="https://www.suse.com/security/cve/CVE-2017-14174/" source="CVE"/>
		<reference ref_id="CVE-2017-14175" ref_url="https://www.suse.com/security/cve/CVE-2017-14175/" source="CVE"/>
		<reference ref_id="CVE-2017-14224" ref_url="https://www.suse.com/security/cve/CVE-2017-14224/" source="CVE"/>
		<reference ref_id="CVE-2017-14249" ref_url="https://www.suse.com/security/cve/CVE-2017-14249/" source="CVE"/>
		<reference ref_id="CVE-2017-14314" ref_url="https://www.suse.com/security/cve/CVE-2017-14314/" source="CVE"/>
		<reference ref_id="CVE-2017-14325" ref_url="https://www.suse.com/security/cve/CVE-2017-14325/" source="CVE"/>
		<reference ref_id="CVE-2017-14326" ref_url="https://www.suse.com/security/cve/CVE-2017-14326/" source="CVE"/>
		<reference ref_id="CVE-2017-14341" ref_url="https://www.suse.com/security/cve/CVE-2017-14341/" source="CVE"/>
		<reference ref_id="CVE-2017-14342" ref_url="https://www.suse.com/security/cve/CVE-2017-14342/" source="CVE"/>
		<reference ref_id="CVE-2017-14343" ref_url="https://www.suse.com/security/cve/CVE-2017-14343/" source="CVE"/>
		<reference ref_id="CVE-2017-14505" ref_url="https://www.suse.com/security/cve/CVE-2017-14505/" source="CVE"/>
		<reference ref_id="CVE-2017-14531" ref_url="https://www.suse.com/security/cve/CVE-2017-14531/" source="CVE"/>
		<reference ref_id="CVE-2017-14533" ref_url="https://www.suse.com/security/cve/CVE-2017-14533/" source="CVE"/>
		<reference ref_id="CVE-2017-14607" ref_url="https://www.suse.com/security/cve/CVE-2017-14607/" source="CVE"/>
		<reference ref_id="CVE-2017-14649" ref_url="https://www.suse.com/security/cve/CVE-2017-14649/" source="CVE"/>
		<reference ref_id="CVE-2017-14682" ref_url="https://www.suse.com/security/cve/CVE-2017-14682/" source="CVE"/>
		<reference ref_id="CVE-2017-14733" ref_url="https://www.suse.com/security/cve/CVE-2017-14733/" source="CVE"/>
		<reference ref_id="CVE-2017-14739" ref_url="https://www.suse.com/security/cve/CVE-2017-14739/" source="CVE"/>
		<reference ref_id="CVE-2017-14989" ref_url="https://www.suse.com/security/cve/CVE-2017-14989/" source="CVE"/>
		<reference ref_id="CVE-2017-14997" ref_url="https://www.suse.com/security/cve/CVE-2017-14997/" source="CVE"/>
		<reference ref_id="CVE-2017-15016" ref_url="https://www.suse.com/security/cve/CVE-2017-15016/" source="CVE"/>
		<reference ref_id="CVE-2017-15017" ref_url="https://www.suse.com/security/cve/CVE-2017-15017/" source="CVE"/>
		<reference ref_id="CVE-2017-15033" ref_url="https://www.suse.com/security/cve/CVE-2017-15033/" source="CVE"/>
		<reference ref_id="CVE-2017-15217" ref_url="https://www.suse.com/security/cve/CVE-2017-15217/" source="CVE"/>
		<reference ref_id="CVE-2017-15218" ref_url="https://www.suse.com/security/cve/CVE-2017-15218/" source="CVE"/>
		<reference ref_id="CVE-2017-15277" ref_url="https://www.suse.com/security/cve/CVE-2017-15277/" source="CVE"/>
		<reference ref_id="CVE-2017-15281" ref_url="https://www.suse.com/security/cve/CVE-2017-15281/" source="CVE"/>
		<reference ref_id="CVE-2017-15930" ref_url="https://www.suse.com/security/cve/CVE-2017-15930/" source="CVE"/>
		<reference ref_id="CVE-2017-16352" ref_url="https://www.suse.com/security/cve/CVE-2017-16352/" source="CVE"/>
		<reference ref_id="CVE-2017-16353" ref_url="https://www.suse.com/security/cve/CVE-2017-16353/" source="CVE"/>
		<reference ref_id="CVE-2017-16545" ref_url="https://www.suse.com/security/cve/CVE-2017-16545/" source="CVE"/>
		<reference ref_id="CVE-2017-16546" ref_url="https://www.suse.com/security/cve/CVE-2017-16546/" source="CVE"/>
		<reference ref_id="CVE-2017-16669" ref_url="https://www.suse.com/security/cve/CVE-2017-16669/" source="CVE"/>
		<reference ref_id="CVE-2017-17504" ref_url="https://www.suse.com/security/cve/CVE-2017-17504/" source="CVE"/>
		<reference ref_id="CVE-2017-17680" ref_url="https://www.suse.com/security/cve/CVE-2017-17680/" source="CVE"/>
		<reference ref_id="CVE-2017-17681" ref_url="https://www.suse.com/security/cve/CVE-2017-17681/" source="CVE"/>
		<reference ref_id="CVE-2017-17682" ref_url="https://www.suse.com/security/cve/CVE-2017-17682/" source="CVE"/>
		<reference ref_id="CVE-2017-17879" ref_url="https://www.suse.com/security/cve/CVE-2017-17879/" source="CVE"/>
		<reference ref_id="CVE-2017-17881" ref_url="https://www.suse.com/security/cve/CVE-2017-17881/" source="CVE"/>
		<reference ref_id="CVE-2017-17882" ref_url="https://www.suse.com/security/cve/CVE-2017-17882/" source="CVE"/>
		<reference ref_id="CVE-2017-17884" ref_url="https://www.suse.com/security/cve/CVE-2017-17884/" source="CVE"/>
		<reference ref_id="CVE-2017-17885" ref_url="https://www.suse.com/security/cve/CVE-2017-17885/" source="CVE"/>
		<reference ref_id="CVE-2017-17887" ref_url="https://www.suse.com/security/cve/CVE-2017-17887/" source="CVE"/>
		<reference ref_id="CVE-2017-17914" ref_url="https://www.suse.com/security/cve/CVE-2017-17914/" source="CVE"/>
		<reference ref_id="CVE-2017-17934" ref_url="https://www.suse.com/security/cve/CVE-2017-17934/" source="CVE"/>
		<reference ref_id="CVE-2017-18008" ref_url="https://www.suse.com/security/cve/CVE-2017-18008/" source="CVE"/>
		<reference ref_id="CVE-2017-18022" ref_url="https://www.suse.com/security/cve/CVE-2017-18022/" source="CVE"/>
		<reference ref_id="CVE-2017-18027" ref_url="https://www.suse.com/security/cve/CVE-2017-18027/" source="CVE"/>
		<reference ref_id="CVE-2017-18028" ref_url="https://www.suse.com/security/cve/CVE-2017-18028/" source="CVE"/>
		<reference ref_id="CVE-2017-18029" ref_url="https://www.suse.com/security/cve/CVE-2017-18029/" source="CVE"/>
		<reference ref_id="CVE-2017-18209" ref_url="https://www.suse.com/security/cve/CVE-2017-18209/" source="CVE"/>
		<reference ref_id="CVE-2017-18211" ref_url="https://www.suse.com/security/cve/CVE-2017-18211/" source="CVE"/>
		<reference ref_id="CVE-2017-18250" ref_url="https://www.suse.com/security/cve/CVE-2017-18250/" source="CVE"/>
		<reference ref_id="CVE-2017-18251" ref_url="https://www.suse.com/security/cve/CVE-2017-18251/" source="CVE"/>
		<reference ref_id="CVE-2017-18252" ref_url="https://www.suse.com/security/cve/CVE-2017-18252/" source="CVE"/>
		<reference ref_id="CVE-2017-18254" ref_url="https://www.suse.com/security/cve/CVE-2017-18254/" source="CVE"/>
		<reference ref_id="CVE-2017-18271" ref_url="https://www.suse.com/security/cve/CVE-2017-18271/" source="CVE"/>
		<reference ref_id="CVE-2017-5506" ref_url="https://www.suse.com/security/cve/CVE-2017-5506/" source="CVE"/>
		<reference ref_id="CVE-2017-5507" ref_url="https://www.suse.com/security/cve/CVE-2017-5507/" source="CVE"/>
		<reference ref_id="CVE-2017-5508" ref_url="https://www.suse.com/security/cve/CVE-2017-5508/" source="CVE"/>
		<reference ref_id="CVE-2017-5510" ref_url="https://www.suse.com/security/cve/CVE-2017-5510/" source="CVE"/>
		<reference ref_id="CVE-2017-5511" ref_url="https://www.suse.com/security/cve/CVE-2017-5511/" source="CVE"/>
		<reference ref_id="CVE-2017-6502" ref_url="https://www.suse.com/security/cve/CVE-2017-6502/" source="CVE"/>
		<reference ref_id="CVE-2017-7606" ref_url="https://www.suse.com/security/cve/CVE-2017-7606/" source="CVE"/>
		<reference ref_id="CVE-2017-7941" ref_url="https://www.suse.com/security/cve/CVE-2017-7941/" source="CVE"/>
		<reference ref_id="CVE-2017-7942" ref_url="https://www.suse.com/security/cve/CVE-2017-7942/" source="CVE"/>
		<reference ref_id="CVE-2017-7943" ref_url="https://www.suse.com/security/cve/CVE-2017-7943/" source="CVE"/>
		<reference ref_id="CVE-2017-8343" ref_url="https://www.suse.com/security/cve/CVE-2017-8343/" source="CVE"/>
		<reference ref_id="CVE-2017-8344" ref_url="https://www.suse.com/security/cve/CVE-2017-8344/" source="CVE"/>
		<reference ref_id="CVE-2017-8345" ref_url="https://www.suse.com/security/cve/CVE-2017-8345/" source="CVE"/>
		<reference ref_id="CVE-2017-8346" ref_url="https://www.suse.com/security/cve/CVE-2017-8346/" source="CVE"/>
		<reference ref_id="CVE-2017-8347" ref_url="https://www.suse.com/security/cve/CVE-2017-8347/" source="CVE"/>
		<reference ref_id="CVE-2017-8348" ref_url="https://www.suse.com/security/cve/CVE-2017-8348/" source="CVE"/>
		<reference ref_id="CVE-2017-8349" ref_url="https://www.suse.com/security/cve/CVE-2017-8349/" source="CVE"/>
		<reference ref_id="CVE-2017-8350" ref_url="https://www.suse.com/security/cve/CVE-2017-8350/" source="CVE"/>
		<reference ref_id="CVE-2017-8351" ref_url="https://www.suse.com/security/cve/CVE-2017-8351/" source="CVE"/>
		<reference ref_id="CVE-2017-8352" ref_url="https://www.suse.com/security/cve/CVE-2017-8352/" source="CVE"/>
		<reference ref_id="CVE-2017-8353" ref_url="https://www.suse.com/security/cve/CVE-2017-8353/" source="CVE"/>
		<reference ref_id="CVE-2017-8354" ref_url="https://www.suse.com/security/cve/CVE-2017-8354/" source="CVE"/>
		<reference ref_id="CVE-2017-8355" ref_url="https://www.suse.com/security/cve/CVE-2017-8355/" source="CVE"/>
		<reference ref_id="CVE-2017-8356" ref_url="https://www.suse.com/security/cve/CVE-2017-8356/" source="CVE"/>
		<reference ref_id="CVE-2017-8357" ref_url="https://www.suse.com/security/cve/CVE-2017-8357/" source="CVE"/>
		<reference ref_id="CVE-2017-8765" ref_url="https://www.suse.com/security/cve/CVE-2017-8765/" source="CVE"/>
		<reference ref_id="CVE-2017-8830" ref_url="https://www.suse.com/security/cve/CVE-2017-8830/" source="CVE"/>
		<reference ref_id="CVE-2017-9098" ref_url="https://www.suse.com/security/cve/CVE-2017-9098/" source="CVE"/>
		<reference ref_id="CVE-2017-9141" ref_url="https://www.suse.com/security/cve/CVE-2017-9141/" source="CVE"/>
		<reference ref_id="CVE-2017-9142" ref_url="https://www.suse.com/security/cve/CVE-2017-9142/" source="CVE"/>
		<reference ref_id="CVE-2017-9143" ref_url="https://www.suse.com/security/cve/CVE-2017-9143/" source="CVE"/>
		<reference ref_id="CVE-2017-9144" ref_url="https://www.suse.com/security/cve/CVE-2017-9144/" source="CVE"/>
		<reference ref_id="CVE-2017-9261" ref_url="https://www.suse.com/security/cve/CVE-2017-9261/" source="CVE"/>
		<reference ref_id="CVE-2017-9262" ref_url="https://www.suse.com/security/cve/CVE-2017-9262/" source="CVE"/>
		<reference ref_id="CVE-2017-9405" ref_url="https://www.suse.com/security/cve/CVE-2017-9405/" source="CVE"/>
		<reference ref_id="CVE-2017-9407" ref_url="https://www.suse.com/security/cve/CVE-2017-9407/" source="CVE"/>
		<reference ref_id="CVE-2017-9409" ref_url="https://www.suse.com/security/cve/CVE-2017-9409/" source="CVE"/>
		<reference ref_id="CVE-2017-9439" ref_url="https://www.suse.com/security/cve/CVE-2017-9439/" source="CVE"/>
		<reference ref_id="CVE-2017-9440" ref_url="https://www.suse.com/security/cve/CVE-2017-9440/" source="CVE"/>
		<reference ref_id="CVE-2017-9500" ref_url="https://www.suse.com/security/cve/CVE-2017-9500/" source="CVE"/>
		<reference ref_id="CVE-2017-9501" ref_url="https://www.suse.com/security/cve/CVE-2017-9501/" source="CVE"/>
		<reference ref_id="CVE-2018-10177" ref_url="https://www.suse.com/security/cve/CVE-2018-10177/" source="CVE"/>
		<reference ref_id="CVE-2018-10804" ref_url="https://www.suse.com/security/cve/CVE-2018-10804/" source="CVE"/>
		<reference ref_id="CVE-2018-10805" ref_url="https://www.suse.com/security/cve/CVE-2018-10805/" source="CVE"/>
		<reference ref_id="CVE-2018-11251" ref_url="https://www.suse.com/security/cve/CVE-2018-11251/" source="CVE"/>
		<reference ref_id="CVE-2018-11655" ref_url="https://www.suse.com/security/cve/CVE-2018-11655/" source="CVE"/>
		<reference ref_id="CVE-2018-11656" ref_url="https://www.suse.com/security/cve/CVE-2018-11656/" source="CVE"/>
		<reference ref_id="CVE-2018-12599" ref_url="https://www.suse.com/security/cve/CVE-2018-12599/" source="CVE"/>
		<reference ref_id="CVE-2018-12600" ref_url="https://www.suse.com/security/cve/CVE-2018-12600/" source="CVE"/>
		<reference ref_id="CVE-2018-14434" ref_url="https://www.suse.com/security/cve/CVE-2018-14434/" source="CVE"/>
		<reference ref_id="CVE-2018-14435" ref_url="https://www.suse.com/security/cve/CVE-2018-14435/" source="CVE"/>
		<reference ref_id="CVE-2018-14436" ref_url="https://www.suse.com/security/cve/CVE-2018-14436/" source="CVE"/>
		<reference ref_id="CVE-2018-14437" ref_url="https://www.suse.com/security/cve/CVE-2018-14437/" source="CVE"/>
		<reference ref_id="CVE-2018-16323" ref_url="https://www.suse.com/security/cve/CVE-2018-16323/" source="CVE"/>
		<reference ref_id="CVE-2018-16329" ref_url="https://www.suse.com/security/cve/CVE-2018-16329/" source="CVE"/>
		<reference ref_id="CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413/" source="CVE"/>
		<reference ref_id="CVE-2018-16640" ref_url="https://www.suse.com/security/cve/CVE-2018-16640/" source="CVE"/>
		<reference ref_id="CVE-2018-16642" ref_url="https://www.suse.com/security/cve/CVE-2018-16642/" source="CVE"/>
		<reference ref_id="CVE-2018-16643" ref_url="https://www.suse.com/security/cve/CVE-2018-16643/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<reference ref_id="CVE-2018-16645" ref_url="https://www.suse.com/security/cve/CVE-2018-16645/" source="CVE"/>
		<reference ref_id="CVE-2018-16749" ref_url="https://www.suse.com/security/cve/CVE-2018-16749/" source="CVE"/>
		<reference ref_id="CVE-2018-16750" ref_url="https://www.suse.com/security/cve/CVE-2018-16750/" source="CVE"/>
		<reference ref_id="CVE-2018-17965" ref_url="https://www.suse.com/security/cve/CVE-2018-17965/" source="CVE"/>
		<reference ref_id="CVE-2018-17966" ref_url="https://www.suse.com/security/cve/CVE-2018-17966/" source="CVE"/>
		<reference ref_id="CVE-2018-18016" ref_url="https://www.suse.com/security/cve/CVE-2018-18016/" source="CVE"/>
		<reference ref_id="CVE-2018-18024" ref_url="https://www.suse.com/security/cve/CVE-2018-18024/" source="CVE"/>
		<reference ref_id="CVE-2018-5246" ref_url="https://www.suse.com/security/cve/CVE-2018-5246/" source="CVE"/>
		<reference ref_id="CVE-2018-5247" ref_url="https://www.suse.com/security/cve/CVE-2018-5247/" source="CVE"/>
		<reference ref_id="CVE-2018-5357" ref_url="https://www.suse.com/security/cve/CVE-2018-5357/" source="CVE"/>
		<reference ref_id="CVE-2018-5685" ref_url="https://www.suse.com/security/cve/CVE-2018-5685/" source="CVE"/>
		<reference ref_id="CVE-2018-6405" ref_url="https://www.suse.com/security/cve/CVE-2018-6405/" source="CVE"/>
		<reference ref_id="CVE-2018-7443" ref_url="https://www.suse.com/security/cve/CVE-2018-7443/" source="CVE"/>
		<reference ref_id="CVE-2018-7470" ref_url="https://www.suse.com/security/cve/CVE-2018-7470/" source="CVE"/>
		<reference ref_id="CVE-2018-8804" ref_url="https://www.suse.com/security/cve/CVE-2018-8804/" source="CVE"/>
		<reference ref_id="CVE-2018-8960" ref_url="https://www.suse.com/security/cve/CVE-2018-8960/" source="CVE"/>
		<reference ref_id="CVE-2018-9018" ref_url="https://www.suse.com/security/cve/CVE-2018-9018/" source="CVE"/>
		<reference ref_id="CVE-2018-9133" ref_url="https://www.suse.com/security/cve/CVE-2018-9133/" source="CVE"/>
		<reference ref_id="CVE-2018-9135" ref_url="https://www.suse.com/security/cve/CVE-2018-9135/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-6.8.8.1-71.85.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0247/">CVE-2012-0247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0248/">CVE-2012-0248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1185/">CVE-2012-1185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1186/">CVE-2012-1186</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8354/">CVE-2014-8354</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8355/">CVE-2014-8355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8562/">CVE-2014-8562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8716/">CVE-2014-8716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9805/">CVE-2014-9805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9806/">CVE-2014-9806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9807/">CVE-2014-9807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9808/">CVE-2014-9808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9809/">CVE-2014-9809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9810/">CVE-2014-9810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9811/">CVE-2014-9811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9812/">CVE-2014-9812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9813/">CVE-2014-9813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9814/">CVE-2014-9814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9815/">CVE-2014-9815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9816/">CVE-2014-9816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9817/">CVE-2014-9817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9818/">CVE-2014-9818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9819/">CVE-2014-9819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9820/">CVE-2014-9820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9821/">CVE-2014-9821</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9822/">CVE-2014-9822</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9823/">CVE-2014-9823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9824/">CVE-2014-9824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9825/">CVE-2014-9825</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9826/">CVE-2014-9826</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9828/">CVE-2014-9828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9829/">CVE-2014-9829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9830/">CVE-2014-9830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9831/">CVE-2014-9831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9832/">CVE-2014-9832</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9833/">CVE-2014-9833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9834/">CVE-2014-9834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9835/">CVE-2014-9835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9836/">CVE-2014-9836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9837/">CVE-2014-9837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9838/">CVE-2014-9838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9839/">CVE-2014-9839</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9840/">CVE-2014-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9841/">CVE-2014-9841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9842/">CVE-2014-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9843/">CVE-2014-9843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9844/">CVE-2014-9844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9845/">CVE-2014-9845</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9846/">CVE-2014-9846</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9847/">CVE-2014-9847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9848/">CVE-2014-9848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9849/">CVE-2014-9849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9850/">CVE-2014-9850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9851/">CVE-2014-9851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9852/">CVE-2014-9852</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9853/">CVE-2014-9853</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9854/">CVE-2014-9854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9907/">CVE-2014-9907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8894/">CVE-2015-8894</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8895/">CVE-2015-8895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8896/">CVE-2015-8896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8897/">CVE-2015-8897</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8898/">CVE-2015-8898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8900/">CVE-2015-8900</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8901/">CVE-2015-8901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8902/">CVE-2015-8902</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8903/">CVE-2015-8903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8957/">CVE-2015-8957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8958/">CVE-2015-8958</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8959/">CVE-2015-8959</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10046/">CVE-2016-10046</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10048/">CVE-2016-10048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10049/">CVE-2016-10049</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10050/">CVE-2016-10050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10051/">CVE-2016-10051</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10052/">CVE-2016-10052</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10059/">CVE-2016-10059</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10060/">CVE-2016-10060</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10061/">CVE-2016-10061</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10062/">CVE-2016-10062</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10063/">CVE-2016-10063</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10064/">CVE-2016-10064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10065/">CVE-2016-10065</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10068/">CVE-2016-10068</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10069/">CVE-2016-10069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10070/">CVE-2016-10070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10071/">CVE-2016-10071</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10144/">CVE-2016-10144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10145/">CVE-2016-10145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10146/">CVE-2016-10146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3715/">CVE-2016-3715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3716/">CVE-2016-3716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3717/">CVE-2016-3717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3718/">CVE-2016-3718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4562/">CVE-2016-4562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4563/">CVE-2016-4563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4564/">CVE-2016-4564</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5010/">CVE-2016-5010</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5118/">CVE-2016-5118</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5687/">CVE-2016-5687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5688/">CVE-2016-5688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5689/">CVE-2016-5689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5690/">CVE-2016-5690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5691/">CVE-2016-5691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5841/">CVE-2016-5841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5842/">CVE-2016-5842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6491/">CVE-2016-6491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6520/">CVE-2016-6520</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6823/">CVE-2016-6823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7101/">CVE-2016-7101</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7513/">CVE-2016-7513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7514/">CVE-2016-7514</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7515/">CVE-2016-7515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7516/">CVE-2016-7516</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7517/">CVE-2016-7517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7518/">CVE-2016-7518</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7519/">CVE-2016-7519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7520/">CVE-2016-7520</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7521/">CVE-2016-7521</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7522/">CVE-2016-7522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7523/">CVE-2016-7523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7524/">CVE-2016-7524</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7525/">CVE-2016-7525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7526/">CVE-2016-7526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7527/">CVE-2016-7527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7528/">CVE-2016-7528</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7529/">CVE-2016-7529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7530/">CVE-2016-7530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7531/">CVE-2016-7531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7532/">CVE-2016-7532</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7533/">CVE-2016-7533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7534/">CVE-2016-7534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7535/">CVE-2016-7535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7537/">CVE-2016-7537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7538/">CVE-2016-7538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7539/">CVE-2016-7539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7540/">CVE-2016-7540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7799/">CVE-2016-7799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7800/">CVE-2016-7800</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7996/">CVE-2016-7996</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7997/">CVE-2016-7997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8677/">CVE-2016-8677</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8682/">CVE-2016-8682</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8683/">CVE-2016-8683</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8684/">CVE-2016-8684</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8707/">CVE-2016-8707</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8862/">CVE-2016-8862</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8866/">CVE-2016-8866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9556/">CVE-2016-9556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9559/">CVE-2016-9559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9773/">CVE-2016-9773</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000445/">CVE-2017-1000445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000476/">CVE-2017-1000476</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10800/">CVE-2017-10800</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10928/">CVE-2017-10928</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10995/">CVE-2017-10995</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11141/">CVE-2017-11141</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11166/">CVE-2017-11166</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11170/">CVE-2017-11170</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11188/">CVE-2017-11188</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11403/">CVE-2017-11403</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11446/">CVE-2017-11446</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-11448/">CVE-2017-11448</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11449/">CVE-2017-11449</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11450/">CVE-2017-11450</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11478/">CVE-2017-11478</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11505/">CVE-2017-11505</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11523/">CVE-2017-11523</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11524/">CVE-2017-11524</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11525/">CVE-2017-11525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11526/">CVE-2017-11526</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11527/">CVE-2017-11527</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11528/">CVE-2017-11528</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11529/">CVE-2017-11529</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11530/">CVE-2017-11530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11531/">CVE-2017-11531</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11532/">CVE-2017-11532</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11533/">CVE-2017-11533</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11534/">CVE-2017-11534</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11535/">CVE-2017-11535</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11537/">CVE-2017-11537</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11539/">CVE-2017-11539</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11638/">CVE-2017-11638</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11639/">CVE-2017-11639</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11640/">CVE-2017-11640</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11642/">CVE-2017-11642</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11644/">CVE-2017-11644</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11724/">CVE-2017-11724</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11750/">CVE-2017-11750</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11751/">CVE-2017-11751</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11752/">CVE-2017-11752</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12140/">CVE-2017-12140</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12418/">CVE-2017-12418</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12427/">CVE-2017-12427</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12428/">CVE-2017-12428</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12429/">CVE-2017-12429</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12430/">CVE-2017-12430</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-12431/">CVE-2017-12431</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12432/">CVE-2017-12432</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12433/">CVE-2017-12433</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12434/">CVE-2017-12434</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12435/">CVE-2017-12435</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12563/">CVE-2017-12563</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12564/">CVE-2017-12564</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12565/">CVE-2017-12565</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12566/">CVE-2017-12566</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12587/">CVE-2017-12587</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12640/">CVE-2017-12640</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12641/">CVE-2017-12641</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12642/">CVE-2017-12642</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12643/">CVE-2017-12643</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12644/">CVE-2017-12644</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12654/">CVE-2017-12654</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12662/">CVE-2017-12662</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12663/">CVE-2017-12663</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12664/">CVE-2017-12664</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12665/">CVE-2017-12665</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12667/">CVE-2017-12667</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12668/">CVE-2017-12668</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12669/">CVE-2017-12669</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12670/">CVE-2017-12670</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12671/">CVE-2017-12671</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12672/">CVE-2017-12672</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12673/">CVE-2017-12673</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12674/">CVE-2017-12674</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12675/">CVE-2017-12675</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12676/">CVE-2017-12676</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12691/">CVE-2017-12691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12692/">CVE-2017-12692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12693/">CVE-2017-12693</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12935/">CVE-2017-12935</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12983/">CVE-2017-12983</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13058/">CVE-2017-13058</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13059/">CVE-2017-13059</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13060/">CVE-2017-13060</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13061/">CVE-2017-13061</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13062/">CVE-2017-13062</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13131/">CVE-2017-13131</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13133/">CVE-2017-13133</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13134/">CVE-2017-13134</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13139/">CVE-2017-13139</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13141/">CVE-2017-13141</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13142/">CVE-2017-13142</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13146/">CVE-2017-13146</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13147/">CVE-2017-13147</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13648/">CVE-2017-13648</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13658/">CVE-2017-13658</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13758/">CVE-2017-13758</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13768/">CVE-2017-13768</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13769/">CVE-2017-13769</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14042/">CVE-2017-14042</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14060/">CVE-2017-14060</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14103/">CVE-2017-14103</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14138/">CVE-2017-14138</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14139/">CVE-2017-14139</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14172/">CVE-2017-14172</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14173/">CVE-2017-14173</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14174/">CVE-2017-14174</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14175/">CVE-2017-14175</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14224/">CVE-2017-14224</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14249/">CVE-2017-14249</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14314/">CVE-2017-14314</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14325/">CVE-2017-14325</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14326/">CVE-2017-14326</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14341/">CVE-2017-14341</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14342/">CVE-2017-14342</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14343/">CVE-2017-14343</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14505/">CVE-2017-14505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14531/">CVE-2017-14531</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14533/">CVE-2017-14533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14607/">CVE-2017-14607</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14649/">CVE-2017-14649</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14682/">CVE-2017-14682</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14733/">CVE-2017-14733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14739/">CVE-2017-14739</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14989/">CVE-2017-14989</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14997/">CVE-2017-14997</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15016/">CVE-2017-15016</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15017/">CVE-2017-15017</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15033/">CVE-2017-15033</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15217/">CVE-2017-15217</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15218/">CVE-2017-15218</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15277/">CVE-2017-15277</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15281/">CVE-2017-15281</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15930/">CVE-2017-15930</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-16352/">CVE-2017-16352</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16353/">CVE-2017-16353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16545/">CVE-2017-16545</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16546/">CVE-2017-16546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16669/">CVE-2017-16669</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17504/">CVE-2017-17504</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17680/">CVE-2017-17680</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17681/">CVE-2017-17681</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17682/">CVE-2017-17682</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-17879/">CVE-2017-17879</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17881/">CVE-2017-17881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17882/">CVE-2017-17882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17884/">CVE-2017-17884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17885/">CVE-2017-17885</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17887/">CVE-2017-17887</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17914/">CVE-2017-17914</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17934/">CVE-2017-17934</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18008/">CVE-2017-18008</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18022/">CVE-2017-18022</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18027/">CVE-2017-18027</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-18028/">CVE-2017-18028</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18029/">CVE-2017-18029</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18209/">CVE-2017-18209</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18211/">CVE-2017-18211</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18250/">CVE-2017-18250</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18251/">CVE-2017-18251</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18252/">CVE-2017-18252</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18254/">CVE-2017-18254</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18271/">CVE-2017-18271</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5506/">CVE-2017-5506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5507/">CVE-2017-5507</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5508/">CVE-2017-5508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5510/">CVE-2017-5510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5511/">CVE-2017-5511</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6502/">CVE-2017-6502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7606/">CVE-2017-7606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7941/">CVE-2017-7941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7942/">CVE-2017-7942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7943/">CVE-2017-7943</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8343/">CVE-2017-8343</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8344/">CVE-2017-8344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8345/">CVE-2017-8345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8346/">CVE-2017-8346</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8347/">CVE-2017-8347</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8348/">CVE-2017-8348</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8349/">CVE-2017-8349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8350/">CVE-2017-8350</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8351/">CVE-2017-8351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8352/">CVE-2017-8352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8353/">CVE-2017-8353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8354/">CVE-2017-8354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8355/">CVE-2017-8355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8356/">CVE-2017-8356</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8357/">CVE-2017-8357</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8765/">CVE-2017-8765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8830/">CVE-2017-8830</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9098/">CVE-2017-9098</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9141/">CVE-2017-9141</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9142/">CVE-2017-9142</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9143/">CVE-2017-9143</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9144/">CVE-2017-9144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9261/">CVE-2017-9261</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9262/">CVE-2017-9262</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9405/">CVE-2017-9405</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9407/">CVE-2017-9407</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9409/">CVE-2017-9409</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9439/">CVE-2017-9439</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9440/">CVE-2017-9440</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9500/">CVE-2017-9500</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9501/">CVE-2017-9501</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10177/">CVE-2018-10177</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10804/">CVE-2018-10804</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10805/">CVE-2018-10805</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11251/">CVE-2018-11251</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11655/">CVE-2018-11655</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11656/">CVE-2018-11656</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12599/">CVE-2018-12599</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12600/">CVE-2018-12600</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14434/">CVE-2018-14434</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14435/">CVE-2018-14435</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14436/">CVE-2018-14436</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14437/">CVE-2018-14437</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16323/">CVE-2018-16323</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16329/">CVE-2018-16329</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16640/">CVE-2018-16640</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16642/">CVE-2018-16642</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16643/">CVE-2018-16643</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16645/">CVE-2018-16645</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16749/">CVE-2018-16749</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16750/">CVE-2018-16750</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17965/">CVE-2018-17965</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17966/">CVE-2018-17966</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18016/">CVE-2018-18016</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18024/">CVE-2018-18024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5246/">CVE-2018-5246</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5247/">CVE-2018-5247</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5357/">CVE-2018-5357</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5685/">CVE-2018-5685</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6405/">CVE-2018-6405</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7443/">CVE-2018-7443</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7470/">CVE-2018-7470</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8804/">CVE-2018-8804</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8960/">CVE-2018-8960</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9018/">CVE-2018-9018</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-9133/">CVE-2018-9133</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-9135/">CVE-2018-9135</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512006" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512007" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512008" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512009" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512010" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76809" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-52.9.0esr-109.38.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-5913" ref_url="https://www.suse.com/security/cve/CVE-2008-5913/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-0652" ref_url="https://www.suse.com/security/cve/CVE-2009-0652/" source="CVE"/>
		<reference ref_id="CVE-2009-0771" ref_url="https://www.suse.com/security/cve/CVE-2009-0771/" source="CVE"/>
		<reference ref_id="CVE-2009-0772" ref_url="https://www.suse.com/security/cve/CVE-2009-0772/" source="CVE"/>
		<reference ref_id="CVE-2009-0773" ref_url="https://www.suse.com/security/cve/CVE-2009-0773/" source="CVE"/>
		<reference ref_id="CVE-2009-0774" ref_url="https://www.suse.com/security/cve/CVE-2009-0774/" source="CVE"/>
		<reference ref_id="CVE-2009-0775" ref_url="https://www.suse.com/security/cve/CVE-2009-0775/" source="CVE"/>
		<reference ref_id="CVE-2009-0776" ref_url="https://www.suse.com/security/cve/CVE-2009-0776/" source="CVE"/>
		<reference ref_id="CVE-2009-0777" ref_url="https://www.suse.com/security/cve/CVE-2009-0777/" source="CVE"/>
		<reference ref_id="CVE-2009-1044" ref_url="https://www.suse.com/security/cve/CVE-2009-1044/" source="CVE"/>
		<reference ref_id="CVE-2009-1169" ref_url="https://www.suse.com/security/cve/CVE-2009-1169/" source="CVE"/>
		<reference ref_id="CVE-2009-1302" ref_url="https://www.suse.com/security/cve/CVE-2009-1302/" source="CVE"/>
		<reference ref_id="CVE-2009-1303" ref_url="https://www.suse.com/security/cve/CVE-2009-1303/" source="CVE"/>
		<reference ref_id="CVE-2009-1304" ref_url="https://www.suse.com/security/cve/CVE-2009-1304/" source="CVE"/>
		<reference ref_id="CVE-2009-1305" ref_url="https://www.suse.com/security/cve/CVE-2009-1305/" source="CVE"/>
		<reference ref_id="CVE-2009-1306" ref_url="https://www.suse.com/security/cve/CVE-2009-1306/" source="CVE"/>
		<reference ref_id="CVE-2009-1307" ref_url="https://www.suse.com/security/cve/CVE-2009-1307/" source="CVE"/>
		<reference ref_id="CVE-2009-1308" ref_url="https://www.suse.com/security/cve/CVE-2009-1308/" source="CVE"/>
		<reference ref_id="CVE-2009-1309" ref_url="https://www.suse.com/security/cve/CVE-2009-1309/" source="CVE"/>
		<reference ref_id="CVE-2009-1310" ref_url="https://www.suse.com/security/cve/CVE-2009-1310/" source="CVE"/>
		<reference ref_id="CVE-2009-1311" ref_url="https://www.suse.com/security/cve/CVE-2009-1311/" source="CVE"/>
		<reference ref_id="CVE-2009-1312" ref_url="https://www.suse.com/security/cve/CVE-2009-1312/" source="CVE"/>
		<reference ref_id="CVE-2009-1313" ref_url="https://www.suse.com/security/cve/CVE-2009-1313/" source="CVE"/>
		<reference ref_id="CVE-2009-1563" ref_url="https://www.suse.com/security/cve/CVE-2009-1563/" source="CVE"/>
		<reference ref_id="CVE-2009-2470" ref_url="https://www.suse.com/security/cve/CVE-2009-2470/" source="CVE"/>
		<reference ref_id="CVE-2009-2654" ref_url="https://www.suse.com/security/cve/CVE-2009-2654/" source="CVE"/>
		<reference ref_id="CVE-2009-3069" ref_url="https://www.suse.com/security/cve/CVE-2009-3069/" source="CVE"/>
		<reference ref_id="CVE-2009-3070" ref_url="https://www.suse.com/security/cve/CVE-2009-3070/" source="CVE"/>
		<reference ref_id="CVE-2009-3071" ref_url="https://www.suse.com/security/cve/CVE-2009-3071/" source="CVE"/>
		<reference ref_id="CVE-2009-3072" ref_url="https://www.suse.com/security/cve/CVE-2009-3072/" source="CVE"/>
		<reference ref_id="CVE-2009-3073" ref_url="https://www.suse.com/security/cve/CVE-2009-3073/" source="CVE"/>
		<reference ref_id="CVE-2009-3074" ref_url="https://www.suse.com/security/cve/CVE-2009-3074/" source="CVE"/>
		<reference ref_id="CVE-2009-3075" ref_url="https://www.suse.com/security/cve/CVE-2009-3075/" source="CVE"/>
		<reference ref_id="CVE-2009-3077" ref_url="https://www.suse.com/security/cve/CVE-2009-3077/" source="CVE"/>
		<reference ref_id="CVE-2009-3078" ref_url="https://www.suse.com/security/cve/CVE-2009-3078/" source="CVE"/>
		<reference ref_id="CVE-2009-3079" ref_url="https://www.suse.com/security/cve/CVE-2009-3079/" source="CVE"/>
		<reference ref_id="CVE-2009-3274" ref_url="https://www.suse.com/security/cve/CVE-2009-3274/" source="CVE"/>
		<reference ref_id="CVE-2009-3370" ref_url="https://www.suse.com/security/cve/CVE-2009-3370/" source="CVE"/>
		<reference ref_id="CVE-2009-3371" ref_url="https://www.suse.com/security/cve/CVE-2009-3371/" source="CVE"/>
		<reference ref_id="CVE-2009-3372" ref_url="https://www.suse.com/security/cve/CVE-2009-3372/" source="CVE"/>
		<reference ref_id="CVE-2009-3373" ref_url="https://www.suse.com/security/cve/CVE-2009-3373/" source="CVE"/>
		<reference ref_id="CVE-2009-3374" ref_url="https://www.suse.com/security/cve/CVE-2009-3374/" source="CVE"/>
		<reference ref_id="CVE-2009-3375" ref_url="https://www.suse.com/security/cve/CVE-2009-3375/" source="CVE"/>
		<reference ref_id="CVE-2009-3376" ref_url="https://www.suse.com/security/cve/CVE-2009-3376/" source="CVE"/>
		<reference ref_id="CVE-2009-3377" ref_url="https://www.suse.com/security/cve/CVE-2009-3377/" source="CVE"/>
		<reference ref_id="CVE-2009-3378" ref_url="https://www.suse.com/security/cve/CVE-2009-3378/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2009-3380" ref_url="https://www.suse.com/security/cve/CVE-2009-3380/" source="CVE"/>
		<reference ref_id="CVE-2009-3381" ref_url="https://www.suse.com/security/cve/CVE-2009-3381/" source="CVE"/>
		<reference ref_id="CVE-2009-3383" ref_url="https://www.suse.com/security/cve/CVE-2009-3383/" source="CVE"/>
		<reference ref_id="CVE-2009-3388" ref_url="https://www.suse.com/security/cve/CVE-2009-3388/" source="CVE"/>
		<reference ref_id="CVE-2009-3389" ref_url="https://www.suse.com/security/cve/CVE-2009-3389/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-3979" ref_url="https://www.suse.com/security/cve/CVE-2009-3979/" source="CVE"/>
		<reference ref_id="CVE-2009-3980" ref_url="https://www.suse.com/security/cve/CVE-2009-3980/" source="CVE"/>
		<reference ref_id="CVE-2009-3982" ref_url="https://www.suse.com/security/cve/CVE-2009-3982/" source="CVE"/>
		<reference ref_id="CVE-2009-3983" ref_url="https://www.suse.com/security/cve/CVE-2009-3983/" source="CVE"/>
		<reference ref_id="CVE-2009-3984" ref_url="https://www.suse.com/security/cve/CVE-2009-3984/" source="CVE"/>
		<reference ref_id="CVE-2009-3985" ref_url="https://www.suse.com/security/cve/CVE-2009-3985/" source="CVE"/>
		<reference ref_id="CVE-2010-0164" ref_url="https://www.suse.com/security/cve/CVE-2010-0164/" source="CVE"/>
		<reference ref_id="CVE-2010-0165" ref_url="https://www.suse.com/security/cve/CVE-2010-0165/" source="CVE"/>
		<reference ref_id="CVE-2010-0166" ref_url="https://www.suse.com/security/cve/CVE-2010-0166/" source="CVE"/>
		<reference ref_id="CVE-2010-0167" ref_url="https://www.suse.com/security/cve/CVE-2010-0167/" source="CVE"/>
		<reference ref_id="CVE-2010-0168" ref_url="https://www.suse.com/security/cve/CVE-2010-0168/" source="CVE"/>
		<reference ref_id="CVE-2010-0169" ref_url="https://www.suse.com/security/cve/CVE-2010-0169/" source="CVE"/>
		<reference ref_id="CVE-2010-0170" ref_url="https://www.suse.com/security/cve/CVE-2010-0170/" source="CVE"/>
		<reference ref_id="CVE-2010-0171" ref_url="https://www.suse.com/security/cve/CVE-2010-0171/" source="CVE"/>
		<reference ref_id="CVE-2010-0172" ref_url="https://www.suse.com/security/cve/CVE-2010-0172/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181/" source="CVE"/>
		<reference ref_id="CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182/" source="CVE"/>
		<reference ref_id="CVE-2010-0654" ref_url="https://www.suse.com/security/cve/CVE-2010-0654/" source="CVE"/>
		<reference ref_id="CVE-2010-1028" ref_url="https://www.suse.com/security/cve/CVE-2010-1028/" source="CVE"/>
		<reference ref_id="CVE-2010-1121" ref_url="https://www.suse.com/security/cve/CVE-2010-1121/" source="CVE"/>
		<reference ref_id="CVE-2010-1125" ref_url="https://www.suse.com/security/cve/CVE-2010-1125/" source="CVE"/>
		<reference ref_id="CVE-2010-1196" ref_url="https://www.suse.com/security/cve/CVE-2010-1196/" source="CVE"/>
		<reference ref_id="CVE-2010-1197" ref_url="https://www.suse.com/security/cve/CVE-2010-1197/" source="CVE"/>
		<reference ref_id="CVE-2010-1198" ref_url="https://www.suse.com/security/cve/CVE-2010-1198/" source="CVE"/>
		<reference ref_id="CVE-2010-1199" ref_url="https://www.suse.com/security/cve/CVE-2010-1199/" source="CVE"/>
		<reference ref_id="CVE-2010-1200" ref_url="https://www.suse.com/security/cve/CVE-2010-1200/" source="CVE"/>
		<reference ref_id="CVE-2010-1201" ref_url="https://www.suse.com/security/cve/CVE-2010-1201/" source="CVE"/>
		<reference ref_id="CVE-2010-1202" ref_url="https://www.suse.com/security/cve/CVE-2010-1202/" source="CVE"/>
		<reference ref_id="CVE-2010-1203" ref_url="https://www.suse.com/security/cve/CVE-2010-1203/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-1206" ref_url="https://www.suse.com/security/cve/CVE-2010-1206/" source="CVE"/>
		<reference ref_id="CVE-2010-1207" ref_url="https://www.suse.com/security/cve/CVE-2010-1207/" source="CVE"/>
		<reference ref_id="CVE-2010-1208" ref_url="https://www.suse.com/security/cve/CVE-2010-1208/" source="CVE"/>
		<reference ref_id="CVE-2010-1209" ref_url="https://www.suse.com/security/cve/CVE-2010-1209/" source="CVE"/>
		<reference ref_id="CVE-2010-1210" ref_url="https://www.suse.com/security/cve/CVE-2010-1210/" source="CVE"/>
		<reference ref_id="CVE-2010-1211" ref_url="https://www.suse.com/security/cve/CVE-2010-1211/" source="CVE"/>
		<reference ref_id="CVE-2010-1212" ref_url="https://www.suse.com/security/cve/CVE-2010-1212/" source="CVE"/>
		<reference ref_id="CVE-2010-1213" ref_url="https://www.suse.com/security/cve/CVE-2010-1213/" source="CVE"/>
		<reference ref_id="CVE-2010-1214" ref_url="https://www.suse.com/security/cve/CVE-2010-1214/" source="CVE"/>
		<reference ref_id="CVE-2010-1215" ref_url="https://www.suse.com/security/cve/CVE-2010-1215/" source="CVE"/>
		<reference ref_id="CVE-2010-2751" ref_url="https://www.suse.com/security/cve/CVE-2010-2751/" source="CVE"/>
		<reference ref_id="CVE-2010-2752" ref_url="https://www.suse.com/security/cve/CVE-2010-2752/" source="CVE"/>
		<reference ref_id="CVE-2010-2753" ref_url="https://www.suse.com/security/cve/CVE-2010-2753/" source="CVE"/>
		<reference ref_id="CVE-2010-2754" ref_url="https://www.suse.com/security/cve/CVE-2010-2754/" source="CVE"/>
		<reference ref_id="CVE-2010-2755" ref_url="https://www.suse.com/security/cve/CVE-2010-2755/" source="CVE"/>
		<reference ref_id="CVE-2010-2760" ref_url="https://www.suse.com/security/cve/CVE-2010-2760/" source="CVE"/>
		<reference ref_id="CVE-2010-2762" ref_url="https://www.suse.com/security/cve/CVE-2010-2762/" source="CVE"/>
		<reference ref_id="CVE-2010-2764" ref_url="https://www.suse.com/security/cve/CVE-2010-2764/" source="CVE"/>
		<reference ref_id="CVE-2010-2765" ref_url="https://www.suse.com/security/cve/CVE-2010-2765/" source="CVE"/>
		<reference ref_id="CVE-2010-2766" ref_url="https://www.suse.com/security/cve/CVE-2010-2766/" source="CVE"/>
		<reference ref_id="CVE-2010-2767" ref_url="https://www.suse.com/security/cve/CVE-2010-2767/" source="CVE"/>
		<reference ref_id="CVE-2010-2768" ref_url="https://www.suse.com/security/cve/CVE-2010-2768/" source="CVE"/>
		<reference ref_id="CVE-2010-2769" ref_url="https://www.suse.com/security/cve/CVE-2010-2769/" source="CVE"/>
		<reference ref_id="CVE-2010-3166" ref_url="https://www.suse.com/security/cve/CVE-2010-3166/" source="CVE"/>
		<reference ref_id="CVE-2010-3167" ref_url="https://www.suse.com/security/cve/CVE-2010-3167/" source="CVE"/>
		<reference ref_id="CVE-2010-3168" ref_url="https://www.suse.com/security/cve/CVE-2010-3168/" source="CVE"/>
		<reference ref_id="CVE-2010-3169" ref_url="https://www.suse.com/security/cve/CVE-2010-3169/" source="CVE"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2010-3173" ref_url="https://www.suse.com/security/cve/CVE-2010-3173/" source="CVE"/>
		<reference ref_id="CVE-2010-3174" ref_url="https://www.suse.com/security/cve/CVE-2010-3174/" source="CVE"/>
		<reference ref_id="CVE-2010-3175" ref_url="https://www.suse.com/security/cve/CVE-2010-3175/" source="CVE"/>
		<reference ref_id="CVE-2010-3176" ref_url="https://www.suse.com/security/cve/CVE-2010-3176/" source="CVE"/>
		<reference ref_id="CVE-2010-3177" ref_url="https://www.suse.com/security/cve/CVE-2010-3177/" source="CVE"/>
		<reference ref_id="CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178/" source="CVE"/>
		<reference ref_id="CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179/" source="CVE"/>
		<reference ref_id="CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180/" source="CVE"/>
		<reference ref_id="CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182/" source="CVE"/>
		<reference ref_id="CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183/" source="CVE"/>
		<reference ref_id="CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765/" source="CVE"/>
		<reference ref_id="CVE-2011-0068" ref_url="https://www.suse.com/security/cve/CVE-2011-0068/" source="CVE"/>
		<reference ref_id="CVE-2011-0069" ref_url="https://www.suse.com/security/cve/CVE-2011-0069/" source="CVE"/>
		<reference ref_id="CVE-2011-0070" ref_url="https://www.suse.com/security/cve/CVE-2011-0070/" source="CVE"/>
		<reference ref_id="CVE-2011-0079" ref_url="https://www.suse.com/security/cve/CVE-2011-0079/" source="CVE"/>
		<reference ref_id="CVE-2011-0080" ref_url="https://www.suse.com/security/cve/CVE-2011-0080/" source="CVE"/>
		<reference ref_id="CVE-2011-0081" ref_url="https://www.suse.com/security/cve/CVE-2011-0081/" source="CVE"/>
		<reference ref_id="CVE-2011-0084" ref_url="https://www.suse.com/security/cve/CVE-2011-0084/" source="CVE"/>
		<reference ref_id="CVE-2011-1187" ref_url="https://www.suse.com/security/cve/CVE-2011-1187/" source="CVE"/>
		<reference ref_id="CVE-2011-1202" ref_url="https://www.suse.com/security/cve/CVE-2011-1202/" source="CVE"/>
		<reference ref_id="CVE-2011-2366" ref_url="https://www.suse.com/security/cve/CVE-2011-2366/" source="CVE"/>
		<reference ref_id="CVE-2011-2367" ref_url="https://www.suse.com/security/cve/CVE-2011-2367/" source="CVE"/>
		<reference ref_id="CVE-2011-2368" ref_url="https://www.suse.com/security/cve/CVE-2011-2368/" source="CVE"/>
		<reference ref_id="CVE-2011-2369" ref_url="https://www.suse.com/security/cve/CVE-2011-2369/" source="CVE"/>
		<reference ref_id="CVE-2011-2370" ref_url="https://www.suse.com/security/cve/CVE-2011-2370/" source="CVE"/>
		<reference ref_id="CVE-2011-2371" ref_url="https://www.suse.com/security/cve/CVE-2011-2371/" source="CVE"/>
		<reference ref_id="CVE-2011-2372" ref_url="https://www.suse.com/security/cve/CVE-2011-2372/" source="CVE"/>
		<reference ref_id="CVE-2011-2373" ref_url="https://www.suse.com/security/cve/CVE-2011-2373/" source="CVE"/>
		<reference ref_id="CVE-2011-2374" ref_url="https://www.suse.com/security/cve/CVE-2011-2374/" source="CVE"/>
		<reference ref_id="CVE-2011-2375" ref_url="https://www.suse.com/security/cve/CVE-2011-2375/" source="CVE"/>
		<reference ref_id="CVE-2011-2377" ref_url="https://www.suse.com/security/cve/CVE-2011-2377/" source="CVE"/>
		<reference ref_id="CVE-2011-2985" ref_url="https://www.suse.com/security/cve/CVE-2011-2985/" source="CVE"/>
		<reference ref_id="CVE-2011-2986" ref_url="https://www.suse.com/security/cve/CVE-2011-2986/" source="CVE"/>
		<reference ref_id="CVE-2011-2988" ref_url="https://www.suse.com/security/cve/CVE-2011-2988/" source="CVE"/>
		<reference ref_id="CVE-2011-2989" ref_url="https://www.suse.com/security/cve/CVE-2011-2989/" source="CVE"/>
		<reference ref_id="CVE-2011-2990" ref_url="https://www.suse.com/security/cve/CVE-2011-2990/" source="CVE"/>
		<reference ref_id="CVE-2011-2991" ref_url="https://www.suse.com/security/cve/CVE-2011-2991/" source="CVE"/>
		<reference ref_id="CVE-2011-2992" ref_url="https://www.suse.com/security/cve/CVE-2011-2992/" source="CVE"/>
		<reference ref_id="CVE-2011-2993" ref_url="https://www.suse.com/security/cve/CVE-2011-2993/" source="CVE"/>
		<reference ref_id="CVE-2011-2995" ref_url="https://www.suse.com/security/cve/CVE-2011-2995/" source="CVE"/>
		<reference ref_id="CVE-2011-2996" ref_url="https://www.suse.com/security/cve/CVE-2011-2996/" source="CVE"/>
		<reference ref_id="CVE-2011-2997" ref_url="https://www.suse.com/security/cve/CVE-2011-2997/" source="CVE"/>
		<reference ref_id="CVE-2011-3000" ref_url="https://www.suse.com/security/cve/CVE-2011-3000/" source="CVE"/>
		<reference ref_id="CVE-2011-3001" ref_url="https://www.suse.com/security/cve/CVE-2011-3001/" source="CVE"/>
		<reference ref_id="CVE-2011-3002" ref_url="https://www.suse.com/security/cve/CVE-2011-3002/" source="CVE"/>
		<reference ref_id="CVE-2011-3003" ref_url="https://www.suse.com/security/cve/CVE-2011-3003/" source="CVE"/>
		<reference ref_id="CVE-2011-3004" ref_url="https://www.suse.com/security/cve/CVE-2011-3004/" source="CVE"/>
		<reference ref_id="CVE-2011-3005" ref_url="https://www.suse.com/security/cve/CVE-2011-3005/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3062" ref_url="https://www.suse.com/security/cve/CVE-2011-3062/" source="CVE"/>
		<reference ref_id="CVE-2011-3101" ref_url="https://www.suse.com/security/cve/CVE-2011-3101/" source="CVE"/>
		<reference ref_id="CVE-2011-3232" ref_url="https://www.suse.com/security/cve/CVE-2011-3232/" source="CVE"/>
		<reference ref_id="CVE-2011-3648" ref_url="https://www.suse.com/security/cve/CVE-2011-3648/" source="CVE"/>
		<reference ref_id="CVE-2011-3650" ref_url="https://www.suse.com/security/cve/CVE-2011-3650/" source="CVE"/>
		<reference ref_id="CVE-2011-3651" ref_url="https://www.suse.com/security/cve/CVE-2011-3651/" source="CVE"/>
		<reference ref_id="CVE-2011-3652" ref_url="https://www.suse.com/security/cve/CVE-2011-3652/" source="CVE"/>
		<reference ref_id="CVE-2011-3654" ref_url="https://www.suse.com/security/cve/CVE-2011-3654/" source="CVE"/>
		<reference ref_id="CVE-2011-3655" ref_url="https://www.suse.com/security/cve/CVE-2011-3655/" source="CVE"/>
		<reference ref_id="CVE-2011-3658" ref_url="https://www.suse.com/security/cve/CVE-2011-3658/" source="CVE"/>
		<reference ref_id="CVE-2011-3659" ref_url="https://www.suse.com/security/cve/CVE-2011-3659/" source="CVE"/>
		<reference ref_id="CVE-2011-3660" ref_url="https://www.suse.com/security/cve/CVE-2011-3660/" source="CVE"/>
		<reference ref_id="CVE-2011-3661" ref_url="https://www.suse.com/security/cve/CVE-2011-3661/" source="CVE"/>
		<reference ref_id="CVE-2011-3663" ref_url="https://www.suse.com/security/cve/CVE-2011-3663/" source="CVE"/>
		<reference ref_id="CVE-2012-0441" ref_url="https://www.suse.com/security/cve/CVE-2012-0441/" source="CVE"/>
		<reference ref_id="CVE-2012-0442" ref_url="https://www.suse.com/security/cve/CVE-2012-0442/" source="CVE"/>
		<reference ref_id="CVE-2012-0443" ref_url="https://www.suse.com/security/cve/CVE-2012-0443/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<reference ref_id="CVE-2012-0445" ref_url="https://www.suse.com/security/cve/CVE-2012-0445/" source="CVE"/>
		<reference ref_id="CVE-2012-0446" ref_url="https://www.suse.com/security/cve/CVE-2012-0446/" source="CVE"/>
		<reference ref_id="CVE-2012-0447" ref_url="https://www.suse.com/security/cve/CVE-2012-0447/" source="CVE"/>
		<reference ref_id="CVE-2012-0449" ref_url="https://www.suse.com/security/cve/CVE-2012-0449/" source="CVE"/>
		<reference ref_id="CVE-2012-0451" ref_url="https://www.suse.com/security/cve/CVE-2012-0451/" source="CVE"/>
		<reference ref_id="CVE-2012-0452" ref_url="https://www.suse.com/security/cve/CVE-2012-0452/" source="CVE"/>
		<reference ref_id="CVE-2012-0455" ref_url="https://www.suse.com/security/cve/CVE-2012-0455/" source="CVE"/>
		<reference ref_id="CVE-2012-0456" ref_url="https://www.suse.com/security/cve/CVE-2012-0456/" source="CVE"/>
		<reference ref_id="CVE-2012-0457" ref_url="https://www.suse.com/security/cve/CVE-2012-0457/" source="CVE"/>
		<reference ref_id="CVE-2012-0458" ref_url="https://www.suse.com/security/cve/CVE-2012-0458/" source="CVE"/>
		<reference ref_id="CVE-2012-0459" ref_url="https://www.suse.com/security/cve/CVE-2012-0459/" source="CVE"/>
		<reference ref_id="CVE-2012-0460" ref_url="https://www.suse.com/security/cve/CVE-2012-0460/" source="CVE"/>
		<reference ref_id="CVE-2012-0461" ref_url="https://www.suse.com/security/cve/CVE-2012-0461/" source="CVE"/>
		<reference ref_id="CVE-2012-0462" ref_url="https://www.suse.com/security/cve/CVE-2012-0462/" source="CVE"/>
		<reference ref_id="CVE-2012-0463" ref_url="https://www.suse.com/security/cve/CVE-2012-0463/" source="CVE"/>
		<reference ref_id="CVE-2012-0464" ref_url="https://www.suse.com/security/cve/CVE-2012-0464/" source="CVE"/>
		<reference ref_id="CVE-2012-0467" ref_url="https://www.suse.com/security/cve/CVE-2012-0467/" source="CVE"/>
		<reference ref_id="CVE-2012-0468" ref_url="https://www.suse.com/security/cve/CVE-2012-0468/" source="CVE"/>
		<reference ref_id="CVE-2012-0469" ref_url="https://www.suse.com/security/cve/CVE-2012-0469/" source="CVE"/>
		<reference ref_id="CVE-2012-0470" ref_url="https://www.suse.com/security/cve/CVE-2012-0470/" source="CVE"/>
		<reference ref_id="CVE-2012-0471" ref_url="https://www.suse.com/security/cve/CVE-2012-0471/" source="CVE"/>
		<reference ref_id="CVE-2012-0472" ref_url="https://www.suse.com/security/cve/CVE-2012-0472/" source="CVE"/>
		<reference ref_id="CVE-2012-0473" ref_url="https://www.suse.com/security/cve/CVE-2012-0473/" source="CVE"/>
		<reference ref_id="CVE-2012-0474" ref_url="https://www.suse.com/security/cve/CVE-2012-0474/" source="CVE"/>
		<reference ref_id="CVE-2012-0475" ref_url="https://www.suse.com/security/cve/CVE-2012-0475/" source="CVE"/>
		<reference ref_id="CVE-2012-0477" ref_url="https://www.suse.com/security/cve/CVE-2012-0477/" source="CVE"/>
		<reference ref_id="CVE-2012-0478" ref_url="https://www.suse.com/security/cve/CVE-2012-0478/" source="CVE"/>
		<reference ref_id="CVE-2012-0479" ref_url="https://www.suse.com/security/cve/CVE-2012-0479/" source="CVE"/>
		<reference ref_id="CVE-2012-0759" ref_url="https://www.suse.com/security/cve/CVE-2012-0759/" source="CVE"/>
		<reference ref_id="CVE-2012-1937" ref_url="https://www.suse.com/security/cve/CVE-2012-1937/" source="CVE"/>
		<reference ref_id="CVE-2012-1938" ref_url="https://www.suse.com/security/cve/CVE-2012-1938/" source="CVE"/>
		<reference ref_id="CVE-2012-1940" ref_url="https://www.suse.com/security/cve/CVE-2012-1940/" source="CVE"/>
		<reference ref_id="CVE-2012-1941" ref_url="https://www.suse.com/security/cve/CVE-2012-1941/" source="CVE"/>
		<reference ref_id="CVE-2012-1944" ref_url="https://www.suse.com/security/cve/CVE-2012-1944/" source="CVE"/>
		<reference ref_id="CVE-2012-1945" ref_url="https://www.suse.com/security/cve/CVE-2012-1945/" source="CVE"/>
		<reference ref_id="CVE-2012-1946" ref_url="https://www.suse.com/security/cve/CVE-2012-1946/" source="CVE"/>
		<reference ref_id="CVE-2012-1947" ref_url="https://www.suse.com/security/cve/CVE-2012-1947/" source="CVE"/>
		<reference ref_id="CVE-2012-1948" ref_url="https://www.suse.com/security/cve/CVE-2012-1948/" source="CVE"/>
		<reference ref_id="CVE-2012-1949" ref_url="https://www.suse.com/security/cve/CVE-2012-1949/" source="CVE"/>
		<reference ref_id="CVE-2012-1950" ref_url="https://www.suse.com/security/cve/CVE-2012-1950/" source="CVE"/>
		<reference ref_id="CVE-2012-1951" ref_url="https://www.suse.com/security/cve/CVE-2012-1951/" source="CVE"/>
		<reference ref_id="CVE-2012-1952" ref_url="https://www.suse.com/security/cve/CVE-2012-1952/" source="CVE"/>
		<reference ref_id="CVE-2012-1953" ref_url="https://www.suse.com/security/cve/CVE-2012-1953/" source="CVE"/>
		<reference ref_id="CVE-2012-1954" ref_url="https://www.suse.com/security/cve/CVE-2012-1954/" source="CVE"/>
		<reference ref_id="CVE-2012-1955" ref_url="https://www.suse.com/security/cve/CVE-2012-1955/" source="CVE"/>
		<reference ref_id="CVE-2012-1956" ref_url="https://www.suse.com/security/cve/CVE-2012-1956/" source="CVE"/>
		<reference ref_id="CVE-2012-1957" ref_url="https://www.suse.com/security/cve/CVE-2012-1957/" source="CVE"/>
		<reference ref_id="CVE-2012-1958" ref_url="https://www.suse.com/security/cve/CVE-2012-1958/" source="CVE"/>
		<reference ref_id="CVE-2012-1959" ref_url="https://www.suse.com/security/cve/CVE-2012-1959/" source="CVE"/>
		<reference ref_id="CVE-2012-1960" ref_url="https://www.suse.com/security/cve/CVE-2012-1960/" source="CVE"/>
		<reference ref_id="CVE-2012-1961" ref_url="https://www.suse.com/security/cve/CVE-2012-1961/" source="CVE"/>
		<reference ref_id="CVE-2012-1962" ref_url="https://www.suse.com/security/cve/CVE-2012-1962/" source="CVE"/>
		<reference ref_id="CVE-2012-1963" ref_url="https://www.suse.com/security/cve/CVE-2012-1963/" source="CVE"/>
		<reference ref_id="CVE-2012-1965" ref_url="https://www.suse.com/security/cve/CVE-2012-1965/" source="CVE"/>
		<reference ref_id="CVE-2012-1966" ref_url="https://www.suse.com/security/cve/CVE-2012-1966/" source="CVE"/>
		<reference ref_id="CVE-2012-1967" ref_url="https://www.suse.com/security/cve/CVE-2012-1967/" source="CVE"/>
		<reference ref_id="CVE-2012-1970" ref_url="https://www.suse.com/security/cve/CVE-2012-1970/" source="CVE"/>
		<reference ref_id="CVE-2012-1972" ref_url="https://www.suse.com/security/cve/CVE-2012-1972/" source="CVE"/>
		<reference ref_id="CVE-2012-1973" ref_url="https://www.suse.com/security/cve/CVE-2012-1973/" source="CVE"/>
		<reference ref_id="CVE-2012-1974" ref_url="https://www.suse.com/security/cve/CVE-2012-1974/" source="CVE"/>
		<reference ref_id="CVE-2012-1975" ref_url="https://www.suse.com/security/cve/CVE-2012-1975/" source="CVE"/>
		<reference ref_id="CVE-2012-1976" ref_url="https://www.suse.com/security/cve/CVE-2012-1976/" source="CVE"/>
		<reference ref_id="CVE-2012-3956" ref_url="https://www.suse.com/security/cve/CVE-2012-3956/" source="CVE"/>
		<reference ref_id="CVE-2012-3957" ref_url="https://www.suse.com/security/cve/CVE-2012-3957/" source="CVE"/>
		<reference ref_id="CVE-2012-3958" ref_url="https://www.suse.com/security/cve/CVE-2012-3958/" source="CVE"/>
		<reference ref_id="CVE-2012-3959" ref_url="https://www.suse.com/security/cve/CVE-2012-3959/" source="CVE"/>
		<reference ref_id="CVE-2012-3960" ref_url="https://www.suse.com/security/cve/CVE-2012-3960/" source="CVE"/>
		<reference ref_id="CVE-2012-3961" ref_url="https://www.suse.com/security/cve/CVE-2012-3961/" source="CVE"/>
		<reference ref_id="CVE-2012-3962" ref_url="https://www.suse.com/security/cve/CVE-2012-3962/" source="CVE"/>
		<reference ref_id="CVE-2012-3963" ref_url="https://www.suse.com/security/cve/CVE-2012-3963/" source="CVE"/>
		<reference ref_id="CVE-2012-3964" ref_url="https://www.suse.com/security/cve/CVE-2012-3964/" source="CVE"/>
		<reference ref_id="CVE-2012-3965" ref_url="https://www.suse.com/security/cve/CVE-2012-3965/" source="CVE"/>
		<reference ref_id="CVE-2012-3966" ref_url="https://www.suse.com/security/cve/CVE-2012-3966/" source="CVE"/>
		<reference ref_id="CVE-2012-3967" ref_url="https://www.suse.com/security/cve/CVE-2012-3967/" source="CVE"/>
		<reference ref_id="CVE-2012-3968" ref_url="https://www.suse.com/security/cve/CVE-2012-3968/" source="CVE"/>
		<reference ref_id="CVE-2012-3969" ref_url="https://www.suse.com/security/cve/CVE-2012-3969/" source="CVE"/>
		<reference ref_id="CVE-2012-3970" ref_url="https://www.suse.com/security/cve/CVE-2012-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-3971" ref_url="https://www.suse.com/security/cve/CVE-2012-3971/" source="CVE"/>
		<reference ref_id="CVE-2012-3972" ref_url="https://www.suse.com/security/cve/CVE-2012-3972/" source="CVE"/>
		<reference ref_id="CVE-2012-3973" ref_url="https://www.suse.com/security/cve/CVE-2012-3973/" source="CVE"/>
		<reference ref_id="CVE-2012-3975" ref_url="https://www.suse.com/security/cve/CVE-2012-3975/" source="CVE"/>
		<reference ref_id="CVE-2012-3976" ref_url="https://www.suse.com/security/cve/CVE-2012-3976/" source="CVE"/>
		<reference ref_id="CVE-2012-3978" ref_url="https://www.suse.com/security/cve/CVE-2012-3978/" source="CVE"/>
		<reference ref_id="CVE-2012-3980" ref_url="https://www.suse.com/security/cve/CVE-2012-3980/" source="CVE"/>
		<reference ref_id="CVE-2012-3982" ref_url="https://www.suse.com/security/cve/CVE-2012-3982/" source="CVE"/>
		<reference ref_id="CVE-2012-3983" ref_url="https://www.suse.com/security/cve/CVE-2012-3983/" source="CVE"/>
		<reference ref_id="CVE-2012-3984" ref_url="https://www.suse.com/security/cve/CVE-2012-3984/" source="CVE"/>
		<reference ref_id="CVE-2012-3985" ref_url="https://www.suse.com/security/cve/CVE-2012-3985/" source="CVE"/>
		<reference ref_id="CVE-2012-3986" ref_url="https://www.suse.com/security/cve/CVE-2012-3986/" source="CVE"/>
		<reference ref_id="CVE-2012-3988" ref_url="https://www.suse.com/security/cve/CVE-2012-3988/" source="CVE"/>
		<reference ref_id="CVE-2012-3989" ref_url="https://www.suse.com/security/cve/CVE-2012-3989/" source="CVE"/>
		<reference ref_id="CVE-2012-3990" ref_url="https://www.suse.com/security/cve/CVE-2012-3990/" source="CVE"/>
		<reference ref_id="CVE-2012-3991" ref_url="https://www.suse.com/security/cve/CVE-2012-3991/" source="CVE"/>
		<reference ref_id="CVE-2012-3992" ref_url="https://www.suse.com/security/cve/CVE-2012-3992/" source="CVE"/>
		<reference ref_id="CVE-2012-3993" ref_url="https://www.suse.com/security/cve/CVE-2012-3993/" source="CVE"/>
		<reference ref_id="CVE-2012-3994" ref_url="https://www.suse.com/security/cve/CVE-2012-3994/" source="CVE"/>
		<reference ref_id="CVE-2012-3995" ref_url="https://www.suse.com/security/cve/CVE-2012-3995/" source="CVE"/>
		<reference ref_id="CVE-2012-4179" ref_url="https://www.suse.com/security/cve/CVE-2012-4179/" source="CVE"/>
		<reference ref_id="CVE-2012-4180" ref_url="https://www.suse.com/security/cve/CVE-2012-4180/" source="CVE"/>
		<reference ref_id="CVE-2012-4181" ref_url="https://www.suse.com/security/cve/CVE-2012-4181/" source="CVE"/>
		<reference ref_id="CVE-2012-4182" ref_url="https://www.suse.com/security/cve/CVE-2012-4182/" source="CVE"/>
		<reference ref_id="CVE-2012-4183" ref_url="https://www.suse.com/security/cve/CVE-2012-4183/" source="CVE"/>
		<reference ref_id="CVE-2012-4184" ref_url="https://www.suse.com/security/cve/CVE-2012-4184/" source="CVE"/>
		<reference ref_id="CVE-2012-4185" ref_url="https://www.suse.com/security/cve/CVE-2012-4185/" source="CVE"/>
		<reference ref_id="CVE-2012-4186" ref_url="https://www.suse.com/security/cve/CVE-2012-4186/" source="CVE"/>
		<reference ref_id="CVE-2012-4187" ref_url="https://www.suse.com/security/cve/CVE-2012-4187/" source="CVE"/>
		<reference ref_id="CVE-2012-4188" ref_url="https://www.suse.com/security/cve/CVE-2012-4188/" source="CVE"/>
		<reference ref_id="CVE-2012-4191" ref_url="https://www.suse.com/security/cve/CVE-2012-4191/" source="CVE"/>
		<reference ref_id="CVE-2012-4192" ref_url="https://www.suse.com/security/cve/CVE-2012-4192/" source="CVE"/>
		<reference ref_id="CVE-2012-4193" ref_url="https://www.suse.com/security/cve/CVE-2012-4193/" source="CVE"/>
		<reference ref_id="CVE-2012-4194" ref_url="https://www.suse.com/security/cve/CVE-2012-4194/" source="CVE"/>
		<reference ref_id="CVE-2012-4195" ref_url="https://www.suse.com/security/cve/CVE-2012-4195/" source="CVE"/>
		<reference ref_id="CVE-2012-4196" ref_url="https://www.suse.com/security/cve/CVE-2012-4196/" source="CVE"/>
		<reference ref_id="CVE-2012-4201" ref_url="https://www.suse.com/security/cve/CVE-2012-4201/" source="CVE"/>
		<reference ref_id="CVE-2012-4202" ref_url="https://www.suse.com/security/cve/CVE-2012-4202/" source="CVE"/>
		<reference ref_id="CVE-2012-4203" ref_url="https://www.suse.com/security/cve/CVE-2012-4203/" source="CVE"/>
		<reference ref_id="CVE-2012-4204" ref_url="https://www.suse.com/security/cve/CVE-2012-4204/" source="CVE"/>
		<reference ref_id="CVE-2012-4205" ref_url="https://www.suse.com/security/cve/CVE-2012-4205/" source="CVE"/>
		<reference ref_id="CVE-2012-4207" ref_url="https://www.suse.com/security/cve/CVE-2012-4207/" source="CVE"/>
		<reference ref_id="CVE-2012-4208" ref_url="https://www.suse.com/security/cve/CVE-2012-4208/" source="CVE"/>
		<reference ref_id="CVE-2012-4209" ref_url="https://www.suse.com/security/cve/CVE-2012-4209/" source="CVE"/>
		<reference ref_id="CVE-2012-4210" ref_url="https://www.suse.com/security/cve/CVE-2012-4210/" source="CVE"/>
		<reference ref_id="CVE-2012-4212" ref_url="https://www.suse.com/security/cve/CVE-2012-4212/" source="CVE"/>
		<reference ref_id="CVE-2012-4213" ref_url="https://www.suse.com/security/cve/CVE-2012-4213/" source="CVE"/>
		<reference ref_id="CVE-2012-4214" ref_url="https://www.suse.com/security/cve/CVE-2012-4214/" source="CVE"/>
		<reference ref_id="CVE-2012-4215" ref_url="https://www.suse.com/security/cve/CVE-2012-4215/" source="CVE"/>
		<reference ref_id="CVE-2012-4216" ref_url="https://www.suse.com/security/cve/CVE-2012-4216/" source="CVE"/>
		<reference ref_id="CVE-2012-4217" ref_url="https://www.suse.com/security/cve/CVE-2012-4217/" source="CVE"/>
		<reference ref_id="CVE-2012-4218" ref_url="https://www.suse.com/security/cve/CVE-2012-4218/" source="CVE"/>
		<reference ref_id="CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829/" source="CVE"/>
		<reference ref_id="CVE-2012-5830" ref_url="https://www.suse.com/security/cve/CVE-2012-5830/" source="CVE"/>
		<reference ref_id="CVE-2012-5833" ref_url="https://www.suse.com/security/cve/CVE-2012-5833/" source="CVE"/>
		<reference ref_id="CVE-2012-5835" ref_url="https://www.suse.com/security/cve/CVE-2012-5835/" source="CVE"/>
		<reference ref_id="CVE-2012-5836" ref_url="https://www.suse.com/security/cve/CVE-2012-5836/" source="CVE"/>
		<reference ref_id="CVE-2012-5837" ref_url="https://www.suse.com/security/cve/CVE-2012-5837/" source="CVE"/>
		<reference ref_id="CVE-2012-5838" ref_url="https://www.suse.com/security/cve/CVE-2012-5838/" source="CVE"/>
		<reference ref_id="CVE-2012-5839" ref_url="https://www.suse.com/security/cve/CVE-2012-5839/" source="CVE"/>
		<reference ref_id="CVE-2012-5840" ref_url="https://www.suse.com/security/cve/CVE-2012-5840/" source="CVE"/>
		<reference ref_id="CVE-2012-5841" ref_url="https://www.suse.com/security/cve/CVE-2012-5841/" source="CVE"/>
		<reference ref_id="CVE-2012-5842" ref_url="https://www.suse.com/security/cve/CVE-2012-5842/" source="CVE"/>
		<reference ref_id="CVE-2012-5843" ref_url="https://www.suse.com/security/cve/CVE-2012-5843/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<reference ref_id="CVE-2013-0744" ref_url="https://www.suse.com/security/cve/CVE-2013-0744/" source="CVE"/>
		<reference ref_id="CVE-2013-0745" ref_url="https://www.suse.com/security/cve/CVE-2013-0745/" source="CVE"/>
		<reference ref_id="CVE-2013-0746" ref_url="https://www.suse.com/security/cve/CVE-2013-0746/" source="CVE"/>
		<reference ref_id="CVE-2013-0747" ref_url="https://www.suse.com/security/cve/CVE-2013-0747/" source="CVE"/>
		<reference ref_id="CVE-2013-0748" ref_url="https://www.suse.com/security/cve/CVE-2013-0748/" source="CVE"/>
		<reference ref_id="CVE-2013-0749" ref_url="https://www.suse.com/security/cve/CVE-2013-0749/" source="CVE"/>
		<reference ref_id="CVE-2013-0750" ref_url="https://www.suse.com/security/cve/CVE-2013-0750/" source="CVE"/>
		<reference ref_id="CVE-2013-0751" ref_url="https://www.suse.com/security/cve/CVE-2013-0751/" source="CVE"/>
		<reference ref_id="CVE-2013-0752" ref_url="https://www.suse.com/security/cve/CVE-2013-0752/" source="CVE"/>
		<reference ref_id="CVE-2013-0753" ref_url="https://www.suse.com/security/cve/CVE-2013-0753/" source="CVE"/>
		<reference ref_id="CVE-2013-0754" ref_url="https://www.suse.com/security/cve/CVE-2013-0754/" source="CVE"/>
		<reference ref_id="CVE-2013-0755" ref_url="https://www.suse.com/security/cve/CVE-2013-0755/" source="CVE"/>
		<reference ref_id="CVE-2013-0756" ref_url="https://www.suse.com/security/cve/CVE-2013-0756/" source="CVE"/>
		<reference ref_id="CVE-2013-0757" ref_url="https://www.suse.com/security/cve/CVE-2013-0757/" source="CVE"/>
		<reference ref_id="CVE-2013-0758" ref_url="https://www.suse.com/security/cve/CVE-2013-0758/" source="CVE"/>
		<reference ref_id="CVE-2013-0760" ref_url="https://www.suse.com/security/cve/CVE-2013-0760/" source="CVE"/>
		<reference ref_id="CVE-2013-0761" ref_url="https://www.suse.com/security/cve/CVE-2013-0761/" source="CVE"/>
		<reference ref_id="CVE-2013-0762" ref_url="https://www.suse.com/security/cve/CVE-2013-0762/" source="CVE"/>
		<reference ref_id="CVE-2013-0763" ref_url="https://www.suse.com/security/cve/CVE-2013-0763/" source="CVE"/>
		<reference ref_id="CVE-2013-0764" ref_url="https://www.suse.com/security/cve/CVE-2013-0764/" source="CVE"/>
		<reference ref_id="CVE-2013-0765" ref_url="https://www.suse.com/security/cve/CVE-2013-0765/" source="CVE"/>
		<reference ref_id="CVE-2013-0766" ref_url="https://www.suse.com/security/cve/CVE-2013-0766/" source="CVE"/>
		<reference ref_id="CVE-2013-0767" ref_url="https://www.suse.com/security/cve/CVE-2013-0767/" source="CVE"/>
		<reference ref_id="CVE-2013-0768" ref_url="https://www.suse.com/security/cve/CVE-2013-0768/" source="CVE"/>
		<reference ref_id="CVE-2013-0769" ref_url="https://www.suse.com/security/cve/CVE-2013-0769/" source="CVE"/>
		<reference ref_id="CVE-2013-0770" ref_url="https://www.suse.com/security/cve/CVE-2013-0770/" source="CVE"/>
		<reference ref_id="CVE-2013-0771" ref_url="https://www.suse.com/security/cve/CVE-2013-0771/" source="CVE"/>
		<reference ref_id="CVE-2013-0772" ref_url="https://www.suse.com/security/cve/CVE-2013-0772/" source="CVE"/>
		<reference ref_id="CVE-2013-0773" ref_url="https://www.suse.com/security/cve/CVE-2013-0773/" source="CVE"/>
		<reference ref_id="CVE-2013-0774" ref_url="https://www.suse.com/security/cve/CVE-2013-0774/" source="CVE"/>
		<reference ref_id="CVE-2013-0775" ref_url="https://www.suse.com/security/cve/CVE-2013-0775/" source="CVE"/>
		<reference ref_id="CVE-2013-0776" ref_url="https://www.suse.com/security/cve/CVE-2013-0776/" source="CVE"/>
		<reference ref_id="CVE-2013-0777" ref_url="https://www.suse.com/security/cve/CVE-2013-0777/" source="CVE"/>
		<reference ref_id="CVE-2013-0778" ref_url="https://www.suse.com/security/cve/CVE-2013-0778/" source="CVE"/>
		<reference ref_id="CVE-2013-0779" ref_url="https://www.suse.com/security/cve/CVE-2013-0779/" source="CVE"/>
		<reference ref_id="CVE-2013-0780" ref_url="https://www.suse.com/security/cve/CVE-2013-0780/" source="CVE"/>
		<reference ref_id="CVE-2013-0781" ref_url="https://www.suse.com/security/cve/CVE-2013-0781/" source="CVE"/>
		<reference ref_id="CVE-2013-0782" ref_url="https://www.suse.com/security/cve/CVE-2013-0782/" source="CVE"/>
		<reference ref_id="CVE-2013-0783" ref_url="https://www.suse.com/security/cve/CVE-2013-0783/" source="CVE"/>
		<reference ref_id="CVE-2013-0787" ref_url="https://www.suse.com/security/cve/CVE-2013-0787/" source="CVE"/>
		<reference ref_id="CVE-2013-0788" ref_url="https://www.suse.com/security/cve/CVE-2013-0788/" source="CVE"/>
		<reference ref_id="CVE-2013-0789" ref_url="https://www.suse.com/security/cve/CVE-2013-0789/" source="CVE"/>
		<reference ref_id="CVE-2013-0792" ref_url="https://www.suse.com/security/cve/CVE-2013-0792/" source="CVE"/>
		<reference ref_id="CVE-2013-0793" ref_url="https://www.suse.com/security/cve/CVE-2013-0793/" source="CVE"/>
		<reference ref_id="CVE-2013-0794" ref_url="https://www.suse.com/security/cve/CVE-2013-0794/" source="CVE"/>
		<reference ref_id="CVE-2013-0795" ref_url="https://www.suse.com/security/cve/CVE-2013-0795/" source="CVE"/>
		<reference ref_id="CVE-2013-0796" ref_url="https://www.suse.com/security/cve/CVE-2013-0796/" source="CVE"/>
		<reference ref_id="CVE-2013-0800" ref_url="https://www.suse.com/security/cve/CVE-2013-0800/" source="CVE"/>
		<reference ref_id="CVE-2013-0801" ref_url="https://www.suse.com/security/cve/CVE-2013-0801/" source="CVE"/>
		<reference ref_id="CVE-2013-1669" ref_url="https://www.suse.com/security/cve/CVE-2013-1669/" source="CVE"/>
		<reference ref_id="CVE-2013-1670" ref_url="https://www.suse.com/security/cve/CVE-2013-1670/" source="CVE"/>
		<reference ref_id="CVE-2013-1671" ref_url="https://www.suse.com/security/cve/CVE-2013-1671/" source="CVE"/>
		<reference ref_id="CVE-2013-1674" ref_url="https://www.suse.com/security/cve/CVE-2013-1674/" source="CVE"/>
		<reference ref_id="CVE-2013-1675" ref_url="https://www.suse.com/security/cve/CVE-2013-1675/" source="CVE"/>
		<reference ref_id="CVE-2013-1676" ref_url="https://www.suse.com/security/cve/CVE-2013-1676/" source="CVE"/>
		<reference ref_id="CVE-2013-1677" ref_url="https://www.suse.com/security/cve/CVE-2013-1677/" source="CVE"/>
		<reference ref_id="CVE-2013-1678" ref_url="https://www.suse.com/security/cve/CVE-2013-1678/" source="CVE"/>
		<reference ref_id="CVE-2013-1679" ref_url="https://www.suse.com/security/cve/CVE-2013-1679/" source="CVE"/>
		<reference ref_id="CVE-2013-1680" ref_url="https://www.suse.com/security/cve/CVE-2013-1680/" source="CVE"/>
		<reference ref_id="CVE-2013-1681" ref_url="https://www.suse.com/security/cve/CVE-2013-1681/" source="CVE"/>
		<reference ref_id="CVE-2013-1682" ref_url="https://www.suse.com/security/cve/CVE-2013-1682/" source="CVE"/>
		<reference ref_id="CVE-2013-1683" ref_url="https://www.suse.com/security/cve/CVE-2013-1683/" source="CVE"/>
		<reference ref_id="CVE-2013-1684" ref_url="https://www.suse.com/security/cve/CVE-2013-1684/" source="CVE"/>
		<reference ref_id="CVE-2013-1685" ref_url="https://www.suse.com/security/cve/CVE-2013-1685/" source="CVE"/>
		<reference ref_id="CVE-2013-1686" ref_url="https://www.suse.com/security/cve/CVE-2013-1686/" source="CVE"/>
		<reference ref_id="CVE-2013-1687" ref_url="https://www.suse.com/security/cve/CVE-2013-1687/" source="CVE"/>
		<reference ref_id="CVE-2013-1688" ref_url="https://www.suse.com/security/cve/CVE-2013-1688/" source="CVE"/>
		<reference ref_id="CVE-2013-1690" ref_url="https://www.suse.com/security/cve/CVE-2013-1690/" source="CVE"/>
		<reference ref_id="CVE-2013-1692" ref_url="https://www.suse.com/security/cve/CVE-2013-1692/" source="CVE"/>
		<reference ref_id="CVE-2013-1693" ref_url="https://www.suse.com/security/cve/CVE-2013-1693/" source="CVE"/>
		<reference ref_id="CVE-2013-1694" ref_url="https://www.suse.com/security/cve/CVE-2013-1694/" source="CVE"/>
		<reference ref_id="CVE-2013-1695" ref_url="https://www.suse.com/security/cve/CVE-2013-1695/" source="CVE"/>
		<reference ref_id="CVE-2013-1696" ref_url="https://www.suse.com/security/cve/CVE-2013-1696/" source="CVE"/>
		<reference ref_id="CVE-2013-1697" ref_url="https://www.suse.com/security/cve/CVE-2013-1697/" source="CVE"/>
		<reference ref_id="CVE-2013-1698" ref_url="https://www.suse.com/security/cve/CVE-2013-1698/" source="CVE"/>
		<reference ref_id="CVE-2013-1699" ref_url="https://www.suse.com/security/cve/CVE-2013-1699/" source="CVE"/>
		<reference ref_id="CVE-2013-1701" ref_url="https://www.suse.com/security/cve/CVE-2013-1701/" source="CVE"/>
		<reference ref_id="CVE-2013-1702" ref_url="https://www.suse.com/security/cve/CVE-2013-1702/" source="CVE"/>
		<reference ref_id="CVE-2013-1704" ref_url="https://www.suse.com/security/cve/CVE-2013-1704/" source="CVE"/>
		<reference ref_id="CVE-2013-1705" ref_url="https://www.suse.com/security/cve/CVE-2013-1705/" source="CVE"/>
		<reference ref_id="CVE-2013-1708" ref_url="https://www.suse.com/security/cve/CVE-2013-1708/" source="CVE"/>
		<reference ref_id="CVE-2013-1709" ref_url="https://www.suse.com/security/cve/CVE-2013-1709/" source="CVE"/>
		<reference ref_id="CVE-2013-1710" ref_url="https://www.suse.com/security/cve/CVE-2013-1710/" source="CVE"/>
		<reference ref_id="CVE-2013-1711" ref_url="https://www.suse.com/security/cve/CVE-2013-1711/" source="CVE"/>
		<reference ref_id="CVE-2013-1713" ref_url="https://www.suse.com/security/cve/CVE-2013-1713/" source="CVE"/>
		<reference ref_id="CVE-2013-1714" ref_url="https://www.suse.com/security/cve/CVE-2013-1714/" source="CVE"/>
		<reference ref_id="CVE-2013-1717" ref_url="https://www.suse.com/security/cve/CVE-2013-1717/" source="CVE"/>
		<reference ref_id="CVE-2013-1718" ref_url="https://www.suse.com/security/cve/CVE-2013-1718/" source="CVE"/>
		<reference ref_id="CVE-2013-1719" ref_url="https://www.suse.com/security/cve/CVE-2013-1719/" source="CVE"/>
		<reference ref_id="CVE-2013-1720" ref_url="https://www.suse.com/security/cve/CVE-2013-1720/" source="CVE"/>
		<reference ref_id="CVE-2013-1721" ref_url="https://www.suse.com/security/cve/CVE-2013-1721/" source="CVE"/>
		<reference ref_id="CVE-2013-1722" ref_url="https://www.suse.com/security/cve/CVE-2013-1722/" source="CVE"/>
		<reference ref_id="CVE-2013-1723" ref_url="https://www.suse.com/security/cve/CVE-2013-1723/" source="CVE"/>
		<reference ref_id="CVE-2013-1724" ref_url="https://www.suse.com/security/cve/CVE-2013-1724/" source="CVE"/>
		<reference ref_id="CVE-2013-1725" ref_url="https://www.suse.com/security/cve/CVE-2013-1725/" source="CVE"/>
		<reference ref_id="CVE-2013-1728" ref_url="https://www.suse.com/security/cve/CVE-2013-1728/" source="CVE"/>
		<reference ref_id="CVE-2013-1730" ref_url="https://www.suse.com/security/cve/CVE-2013-1730/" source="CVE"/>
		<reference ref_id="CVE-2013-1732" ref_url="https://www.suse.com/security/cve/CVE-2013-1732/" source="CVE"/>
		<reference ref_id="CVE-2013-1735" ref_url="https://www.suse.com/security/cve/CVE-2013-1735/" source="CVE"/>
		<reference ref_id="CVE-2013-1736" ref_url="https://www.suse.com/security/cve/CVE-2013-1736/" source="CVE"/>
		<reference ref_id="CVE-2013-1737" ref_url="https://www.suse.com/security/cve/CVE-2013-1737/" source="CVE"/>
		<reference ref_id="CVE-2013-1738" ref_url="https://www.suse.com/security/cve/CVE-2013-1738/" source="CVE"/>
		<reference ref_id="CVE-2013-5590" ref_url="https://www.suse.com/security/cve/CVE-2013-5590/" source="CVE"/>
		<reference ref_id="CVE-2013-5591" ref_url="https://www.suse.com/security/cve/CVE-2013-5591/" source="CVE"/>
		<reference ref_id="CVE-2013-5592" ref_url="https://www.suse.com/security/cve/CVE-2013-5592/" source="CVE"/>
		<reference ref_id="CVE-2013-5593" ref_url="https://www.suse.com/security/cve/CVE-2013-5593/" source="CVE"/>
		<reference ref_id="CVE-2013-5595" ref_url="https://www.suse.com/security/cve/CVE-2013-5595/" source="CVE"/>
		<reference ref_id="CVE-2013-5596" ref_url="https://www.suse.com/security/cve/CVE-2013-5596/" source="CVE"/>
		<reference ref_id="CVE-2013-5597" ref_url="https://www.suse.com/security/cve/CVE-2013-5597/" source="CVE"/>
		<reference ref_id="CVE-2013-5598" ref_url="https://www.suse.com/security/cve/CVE-2013-5598/" source="CVE"/>
		<reference ref_id="CVE-2013-5599" ref_url="https://www.suse.com/security/cve/CVE-2013-5599/" source="CVE"/>
		<reference ref_id="CVE-2013-5600" ref_url="https://www.suse.com/security/cve/CVE-2013-5600/" source="CVE"/>
		<reference ref_id="CVE-2013-5601" ref_url="https://www.suse.com/security/cve/CVE-2013-5601/" source="CVE"/>
		<reference ref_id="CVE-2013-5602" ref_url="https://www.suse.com/security/cve/CVE-2013-5602/" source="CVE"/>
		<reference ref_id="CVE-2013-5603" ref_url="https://www.suse.com/security/cve/CVE-2013-5603/" source="CVE"/>
		<reference ref_id="CVE-2013-5604" ref_url="https://www.suse.com/security/cve/CVE-2013-5604/" source="CVE"/>
		<reference ref_id="CVE-2013-5609" ref_url="https://www.suse.com/security/cve/CVE-2013-5609/" source="CVE"/>
		<reference ref_id="CVE-2013-5610" ref_url="https://www.suse.com/security/cve/CVE-2013-5610/" source="CVE"/>
		<reference ref_id="CVE-2013-5611" ref_url="https://www.suse.com/security/cve/CVE-2013-5611/" source="CVE"/>
		<reference ref_id="CVE-2013-5612" ref_url="https://www.suse.com/security/cve/CVE-2013-5612/" source="CVE"/>
		<reference ref_id="CVE-2013-5613" ref_url="https://www.suse.com/security/cve/CVE-2013-5613/" source="CVE"/>
		<reference ref_id="CVE-2013-5614" ref_url="https://www.suse.com/security/cve/CVE-2013-5614/" source="CVE"/>
		<reference ref_id="CVE-2013-5615" ref_url="https://www.suse.com/security/cve/CVE-2013-5615/" source="CVE"/>
		<reference ref_id="CVE-2013-5616" ref_url="https://www.suse.com/security/cve/CVE-2013-5616/" source="CVE"/>
		<reference ref_id="CVE-2013-5618" ref_url="https://www.suse.com/security/cve/CVE-2013-5618/" source="CVE"/>
		<reference ref_id="CVE-2013-5619" ref_url="https://www.suse.com/security/cve/CVE-2013-5619/" source="CVE"/>
		<reference ref_id="CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629/" source="CVE"/>
		<reference ref_id="CVE-2013-6630" ref_url="https://www.suse.com/security/cve/CVE-2013-6630/" source="CVE"/>
		<reference ref_id="CVE-2013-6671" ref_url="https://www.suse.com/security/cve/CVE-2013-6671/" source="CVE"/>
		<reference ref_id="CVE-2013-6672" ref_url="https://www.suse.com/security/cve/CVE-2013-6672/" source="CVE"/>
		<reference ref_id="CVE-2013-6673" ref_url="https://www.suse.com/security/cve/CVE-2013-6673/" source="CVE"/>
		<reference ref_id="CVE-2014-1477" ref_url="https://www.suse.com/security/cve/CVE-2014-1477/" source="CVE"/>
		<reference ref_id="CVE-2014-1478" ref_url="https://www.suse.com/security/cve/CVE-2014-1478/" source="CVE"/>
		<reference ref_id="CVE-2014-1479" ref_url="https://www.suse.com/security/cve/CVE-2014-1479/" source="CVE"/>
		<reference ref_id="CVE-2014-1480" ref_url="https://www.suse.com/security/cve/CVE-2014-1480/" source="CVE"/>
		<reference ref_id="CVE-2014-1481" ref_url="https://www.suse.com/security/cve/CVE-2014-1481/" source="CVE"/>
		<reference ref_id="CVE-2014-1482" ref_url="https://www.suse.com/security/cve/CVE-2014-1482/" source="CVE"/>
		<reference ref_id="CVE-2014-1483" ref_url="https://www.suse.com/security/cve/CVE-2014-1483/" source="CVE"/>
		<reference ref_id="CVE-2014-1484" ref_url="https://www.suse.com/security/cve/CVE-2014-1484/" source="CVE"/>
		<reference ref_id="CVE-2014-1485" ref_url="https://www.suse.com/security/cve/CVE-2014-1485/" source="CVE"/>
		<reference ref_id="CVE-2014-1486" ref_url="https://www.suse.com/security/cve/CVE-2014-1486/" source="CVE"/>
		<reference ref_id="CVE-2014-1487" ref_url="https://www.suse.com/security/cve/CVE-2014-1487/" source="CVE"/>
		<reference ref_id="CVE-2014-1488" ref_url="https://www.suse.com/security/cve/CVE-2014-1488/" source="CVE"/>
		<reference ref_id="CVE-2014-1489" ref_url="https://www.suse.com/security/cve/CVE-2014-1489/" source="CVE"/>
		<reference ref_id="CVE-2014-1490" ref_url="https://www.suse.com/security/cve/CVE-2014-1490/" source="CVE"/>
		<reference ref_id="CVE-2014-1491" ref_url="https://www.suse.com/security/cve/CVE-2014-1491/" source="CVE"/>
		<reference ref_id="CVE-2014-1544" ref_url="https://www.suse.com/security/cve/CVE-2014-1544/" source="CVE"/>
		<reference ref_id="CVE-2014-1547" ref_url="https://www.suse.com/security/cve/CVE-2014-1547/" source="CVE"/>
		<reference ref_id="CVE-2014-1548" ref_url="https://www.suse.com/security/cve/CVE-2014-1548/" source="CVE"/>
		<reference ref_id="CVE-2014-1553" ref_url="https://www.suse.com/security/cve/CVE-2014-1553/" source="CVE"/>
		<reference ref_id="CVE-2014-1554" ref_url="https://www.suse.com/security/cve/CVE-2014-1554/" source="CVE"/>
		<reference ref_id="CVE-2014-1555" ref_url="https://www.suse.com/security/cve/CVE-2014-1555/" source="CVE"/>
		<reference ref_id="CVE-2014-1556" ref_url="https://www.suse.com/security/cve/CVE-2014-1556/" source="CVE"/>
		<reference ref_id="CVE-2014-1557" ref_url="https://www.suse.com/security/cve/CVE-2014-1557/" source="CVE"/>
		<reference ref_id="CVE-2014-1562" ref_url="https://www.suse.com/security/cve/CVE-2014-1562/" source="CVE"/>
		<reference ref_id="CVE-2014-1563" ref_url="https://www.suse.com/security/cve/CVE-2014-1563/" source="CVE"/>
		<reference ref_id="CVE-2014-1564" ref_url="https://www.suse.com/security/cve/CVE-2014-1564/" source="CVE"/>
		<reference ref_id="CVE-2014-1565" ref_url="https://www.suse.com/security/cve/CVE-2014-1565/" source="CVE"/>
		<reference ref_id="CVE-2014-1567" ref_url="https://www.suse.com/security/cve/CVE-2014-1567/" source="CVE"/>
		<reference ref_id="CVE-2014-1574" ref_url="https://www.suse.com/security/cve/CVE-2014-1574/" source="CVE"/>
		<reference ref_id="CVE-2014-1575" ref_url="https://www.suse.com/security/cve/CVE-2014-1575/" source="CVE"/>
		<reference ref_id="CVE-2014-1576" ref_url="https://www.suse.com/security/cve/CVE-2014-1576/" source="CVE"/>
		<reference ref_id="CVE-2014-1577" ref_url="https://www.suse.com/security/cve/CVE-2014-1577/" source="CVE"/>
		<reference ref_id="CVE-2014-1578" ref_url="https://www.suse.com/security/cve/CVE-2014-1578/" source="CVE"/>
		<reference ref_id="CVE-2014-1581" ref_url="https://www.suse.com/security/cve/CVE-2014-1581/" source="CVE"/>
		<reference ref_id="CVE-2014-1583" ref_url="https://www.suse.com/security/cve/CVE-2014-1583/" source="CVE"/>
		<reference ref_id="CVE-2014-1585" ref_url="https://www.suse.com/security/cve/CVE-2014-1585/" source="CVE"/>
		<reference ref_id="CVE-2014-1586" ref_url="https://www.suse.com/security/cve/CVE-2014-1586/" source="CVE"/>
		<reference ref_id="CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587/" source="CVE"/>
		<reference ref_id="CVE-2014-1588" ref_url="https://www.suse.com/security/cve/CVE-2014-1588/" source="CVE"/>
		<reference ref_id="CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590/" source="CVE"/>
		<reference ref_id="CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592/" source="CVE"/>
		<reference ref_id="CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593/" source="CVE"/>
		<reference ref_id="CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594/" source="CVE"/>
		<reference ref_id="CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634/" source="CVE"/>
		<reference ref_id="CVE-2014-8635" ref_url="https://www.suse.com/security/cve/CVE-2014-8635/" source="CVE"/>
		<reference ref_id="CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638/" source="CVE"/>
		<reference ref_id="CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639/" source="CVE"/>
		<reference ref_id="CVE-2014-8641" ref_url="https://www.suse.com/security/cve/CVE-2014-8641/" source="CVE"/>
		<reference ref_id="CVE-2015-0797" ref_url="https://www.suse.com/security/cve/CVE-2015-0797/" source="CVE"/>
		<reference ref_id="CVE-2015-0801" ref_url="https://www.suse.com/security/cve/CVE-2015-0801/" source="CVE"/>
		<reference ref_id="CVE-2015-0807" ref_url="https://www.suse.com/security/cve/CVE-2015-0807/" source="CVE"/>
		<reference ref_id="CVE-2015-0813" ref_url="https://www.suse.com/security/cve/CVE-2015-0813/" source="CVE"/>
		<reference ref_id="CVE-2015-0814" ref_url="https://www.suse.com/security/cve/CVE-2015-0814/" source="CVE"/>
		<reference ref_id="CVE-2015-0815" ref_url="https://www.suse.com/security/cve/CVE-2015-0815/" source="CVE"/>
		<reference ref_id="CVE-2015-0816" ref_url="https://www.suse.com/security/cve/CVE-2015-0816/" source="CVE"/>
		<reference ref_id="CVE-2015-0817" ref_url="https://www.suse.com/security/cve/CVE-2015-0817/" source="CVE"/>
		<reference ref_id="CVE-2015-0818" ref_url="https://www.suse.com/security/cve/CVE-2015-0818/" source="CVE"/>
		<reference ref_id="CVE-2015-0822" ref_url="https://www.suse.com/security/cve/CVE-2015-0822/" source="CVE"/>
		<reference ref_id="CVE-2015-0827" ref_url="https://www.suse.com/security/cve/CVE-2015-0827/" source="CVE"/>
		<reference ref_id="CVE-2015-0831" ref_url="https://www.suse.com/security/cve/CVE-2015-0831/" source="CVE"/>
		<reference ref_id="CVE-2015-0835" ref_url="https://www.suse.com/security/cve/CVE-2015-0835/" source="CVE"/>
		<reference ref_id="CVE-2015-0836" ref_url="https://www.suse.com/security/cve/CVE-2015-0836/" source="CVE"/>
		<reference ref_id="CVE-2015-2708" ref_url="https://www.suse.com/security/cve/CVE-2015-2708/" source="CVE"/>
		<reference ref_id="CVE-2015-2709" ref_url="https://www.suse.com/security/cve/CVE-2015-2709/" source="CVE"/>
		<reference ref_id="CVE-2015-2710" ref_url="https://www.suse.com/security/cve/CVE-2015-2710/" source="CVE"/>
		<reference ref_id="CVE-2015-2713" ref_url="https://www.suse.com/security/cve/CVE-2015-2713/" source="CVE"/>
		<reference ref_id="CVE-2015-2716" ref_url="https://www.suse.com/security/cve/CVE-2015-2716/" source="CVE"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722/" source="CVE"/>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725/" source="CVE"/>
		<reference ref_id="CVE-2015-2726" ref_url="https://www.suse.com/security/cve/CVE-2015-2726/" source="CVE"/>
		<reference ref_id="CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728/" source="CVE"/>
		<reference ref_id="CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730/" source="CVE"/>
		<reference ref_id="CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735/" source="CVE"/>
		<reference ref_id="CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736/" source="CVE"/>
		<reference ref_id="CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739/" source="CVE"/>
		<reference ref_id="CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740/" source="CVE"/>
		<reference ref_id="CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473/" source="CVE"/>
		<reference ref_id="CVE-2015-4474" ref_url="https://www.suse.com/security/cve/CVE-2015-4474/" source="CVE"/>
		<reference ref_id="CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475/" source="CVE"/>
		<reference ref_id="CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478/" source="CVE"/>
		<reference ref_id="CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479/" source="CVE"/>
		<reference ref_id="CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484/" source="CVE"/>
		<reference ref_id="CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485/" source="CVE"/>
		<reference ref_id="CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486/" source="CVE"/>
		<reference ref_id="CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487/" source="CVE"/>
		<reference ref_id="CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488/" source="CVE"/>
		<reference ref_id="CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492/" source="CVE"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="CVE-2015-4497" ref_url="https://www.suse.com/security/cve/CVE-2015-4497/" source="CVE"/>
		<reference ref_id="CVE-2015-4498" ref_url="https://www.suse.com/security/cve/CVE-2015-4498/" source="CVE"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<reference ref_id="CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188/" source="CVE"/>
		<reference ref_id="CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193/" source="CVE"/>
		<reference ref_id="CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194/" source="CVE"/>
		<reference ref_id="CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196/" source="CVE"/>
		<reference ref_id="CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197/" source="CVE"/>
		<reference ref_id="CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198/" source="CVE"/>
		<reference ref_id="CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199/" source="CVE"/>
		<reference ref_id="CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200/" source="CVE"/>
		<reference ref_id="CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201/" source="CVE"/>
		<reference ref_id="CVE-2015-7202" ref_url="https://www.suse.com/security/cve/CVE-2015-7202/" source="CVE"/>
		<reference ref_id="CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205/" source="CVE"/>
		<reference ref_id="CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210/" source="CVE"/>
		<reference ref_id="CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212/" source="CVE"/>
		<reference ref_id="CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213/" source="CVE"/>
		<reference ref_id="CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214/" source="CVE"/>
		<reference ref_id="CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222/" source="CVE"/>
		<reference ref_id="CVE-2016-10196" ref_url="https://www.suse.com/security/cve/CVE-2016-10196/" source="CVE"/>
		<reference ref_id="CVE-2016-1523" ref_url="https://www.suse.com/security/cve/CVE-2016-1523/" source="CVE"/>
		<reference ref_id="CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930/" source="CVE"/>
		<reference ref_id="CVE-2016-1931" ref_url="https://www.suse.com/security/cve/CVE-2016-1931/" source="CVE"/>
		<reference ref_id="CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935/" source="CVE"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1952" ref_url="https://www.suse.com/security/cve/CVE-2016-1952/" source="CVE"/>
		<reference ref_id="CVE-2016-1953" ref_url="https://www.suse.com/security/cve/CVE-2016-1953/" source="CVE"/>
		<reference ref_id="CVE-2016-1954" ref_url="https://www.suse.com/security/cve/CVE-2016-1954/" source="CVE"/>
		<reference ref_id="CVE-2016-1957" ref_url="https://www.suse.com/security/cve/CVE-2016-1957/" source="CVE"/>
		<reference ref_id="CVE-2016-1958" ref_url="https://www.suse.com/security/cve/CVE-2016-1958/" source="CVE"/>
		<reference ref_id="CVE-2016-1960" ref_url="https://www.suse.com/security/cve/CVE-2016-1960/" source="CVE"/>
		<reference ref_id="CVE-2016-1961" ref_url="https://www.suse.com/security/cve/CVE-2016-1961/" source="CVE"/>
		<reference ref_id="CVE-2016-1962" ref_url="https://www.suse.com/security/cve/CVE-2016-1962/" source="CVE"/>
		<reference ref_id="CVE-2016-1964" ref_url="https://www.suse.com/security/cve/CVE-2016-1964/" source="CVE"/>
		<reference ref_id="CVE-2016-1965" ref_url="https://www.suse.com/security/cve/CVE-2016-1965/" source="CVE"/>
		<reference ref_id="CVE-2016-1966" ref_url="https://www.suse.com/security/cve/CVE-2016-1966/" source="CVE"/>
		<reference ref_id="CVE-2016-1974" ref_url="https://www.suse.com/security/cve/CVE-2016-1974/" source="CVE"/>
		<reference ref_id="CVE-2016-1977" ref_url="https://www.suse.com/security/cve/CVE-2016-1977/" source="CVE"/>
		<reference ref_id="CVE-2016-2790" ref_url="https://www.suse.com/security/cve/CVE-2016-2790/" source="CVE"/>
		<reference ref_id="CVE-2016-2791" ref_url="https://www.suse.com/security/cve/CVE-2016-2791/" source="CVE"/>
		<reference ref_id="CVE-2016-2792" ref_url="https://www.suse.com/security/cve/CVE-2016-2792/" source="CVE"/>
		<reference ref_id="CVE-2016-2793" ref_url="https://www.suse.com/security/cve/CVE-2016-2793/" source="CVE"/>
		<reference ref_id="CVE-2016-2794" ref_url="https://www.suse.com/security/cve/CVE-2016-2794/" source="CVE"/>
		<reference ref_id="CVE-2016-2795" ref_url="https://www.suse.com/security/cve/CVE-2016-2795/" source="CVE"/>
		<reference ref_id="CVE-2016-2796" ref_url="https://www.suse.com/security/cve/CVE-2016-2796/" source="CVE"/>
		<reference ref_id="CVE-2016-2797" ref_url="https://www.suse.com/security/cve/CVE-2016-2797/" source="CVE"/>
		<reference ref_id="CVE-2016-2798" ref_url="https://www.suse.com/security/cve/CVE-2016-2798/" source="CVE"/>
		<reference ref_id="CVE-2016-2799" ref_url="https://www.suse.com/security/cve/CVE-2016-2799/" source="CVE"/>
		<reference ref_id="CVE-2016-2800" ref_url="https://www.suse.com/security/cve/CVE-2016-2800/" source="CVE"/>
		<reference ref_id="CVE-2016-2801" ref_url="https://www.suse.com/security/cve/CVE-2016-2801/" source="CVE"/>
		<reference ref_id="CVE-2016-2802" ref_url="https://www.suse.com/security/cve/CVE-2016-2802/" source="CVE"/>
		<reference ref_id="CVE-2016-2805" ref_url="https://www.suse.com/security/cve/CVE-2016-2805/" source="CVE"/>
		<reference ref_id="CVE-2016-2807" ref_url="https://www.suse.com/security/cve/CVE-2016-2807/" source="CVE"/>
		<reference ref_id="CVE-2016-2808" ref_url="https://www.suse.com/security/cve/CVE-2016-2808/" source="CVE"/>
		<reference ref_id="CVE-2016-2814" ref_url="https://www.suse.com/security/cve/CVE-2016-2814/" source="CVE"/>
		<reference ref_id="CVE-2016-2815" ref_url="https://www.suse.com/security/cve/CVE-2016-2815/" source="CVE"/>
		<reference ref_id="CVE-2016-2818" ref_url="https://www.suse.com/security/cve/CVE-2016-2818/" source="CVE"/>
		<reference ref_id="CVE-2016-2819" ref_url="https://www.suse.com/security/cve/CVE-2016-2819/" source="CVE"/>
		<reference ref_id="CVE-2016-2821" ref_url="https://www.suse.com/security/cve/CVE-2016-2821/" source="CVE"/>
		<reference ref_id="CVE-2016-2822" ref_url="https://www.suse.com/security/cve/CVE-2016-2822/" source="CVE"/>
		<reference ref_id="CVE-2016-2824" ref_url="https://www.suse.com/security/cve/CVE-2016-2824/" source="CVE"/>
		<reference ref_id="CVE-2016-2828" ref_url="https://www.suse.com/security/cve/CVE-2016-2828/" source="CVE"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-2831" ref_url="https://www.suse.com/security/cve/CVE-2016-2831/" source="CVE"/>
		<reference ref_id="CVE-2016-2835" ref_url="https://www.suse.com/security/cve/CVE-2016-2835/" source="CVE"/>
		<reference ref_id="CVE-2016-2836" ref_url="https://www.suse.com/security/cve/CVE-2016-2836/" source="CVE"/>
		<reference ref_id="CVE-2016-2837" ref_url="https://www.suse.com/security/cve/CVE-2016-2837/" source="CVE"/>
		<reference ref_id="CVE-2016-2838" ref_url="https://www.suse.com/security/cve/CVE-2016-2838/" source="CVE"/>
		<reference ref_id="CVE-2016-2839" ref_url="https://www.suse.com/security/cve/CVE-2016-2839/" source="CVE"/>
		<reference ref_id="CVE-2016-5250" ref_url="https://www.suse.com/security/cve/CVE-2016-5250/" source="CVE"/>
		<reference ref_id="CVE-2016-5252" ref_url="https://www.suse.com/security/cve/CVE-2016-5252/" source="CVE"/>
		<reference ref_id="CVE-2016-5254" ref_url="https://www.suse.com/security/cve/CVE-2016-5254/" source="CVE"/>
		<reference ref_id="CVE-2016-5257" ref_url="https://www.suse.com/security/cve/CVE-2016-5257/" source="CVE"/>
		<reference ref_id="CVE-2016-5258" ref_url="https://www.suse.com/security/cve/CVE-2016-5258/" source="CVE"/>
		<reference ref_id="CVE-2016-5259" ref_url="https://www.suse.com/security/cve/CVE-2016-5259/" source="CVE"/>
		<reference ref_id="CVE-2016-5261" ref_url="https://www.suse.com/security/cve/CVE-2016-5261/" source="CVE"/>
		<reference ref_id="CVE-2016-5262" ref_url="https://www.suse.com/security/cve/CVE-2016-5262/" source="CVE"/>
		<reference ref_id="CVE-2016-5263" ref_url="https://www.suse.com/security/cve/CVE-2016-5263/" source="CVE"/>
		<reference ref_id="CVE-2016-5264" ref_url="https://www.suse.com/security/cve/CVE-2016-5264/" source="CVE"/>
		<reference ref_id="CVE-2016-5265" ref_url="https://www.suse.com/security/cve/CVE-2016-5265/" source="CVE"/>
		<reference ref_id="CVE-2016-5270" ref_url="https://www.suse.com/security/cve/CVE-2016-5270/" source="CVE"/>
		<reference ref_id="CVE-2016-5272" ref_url="https://www.suse.com/security/cve/CVE-2016-5272/" source="CVE"/>
		<reference ref_id="CVE-2016-5274" ref_url="https://www.suse.com/security/cve/CVE-2016-5274/" source="CVE"/>
		<reference ref_id="CVE-2016-5276" ref_url="https://www.suse.com/security/cve/CVE-2016-5276/" source="CVE"/>
		<reference ref_id="CVE-2016-5277" ref_url="https://www.suse.com/security/cve/CVE-2016-5277/" source="CVE"/>
		<reference ref_id="CVE-2016-5278" ref_url="https://www.suse.com/security/cve/CVE-2016-5278/" source="CVE"/>
		<reference ref_id="CVE-2016-5280" ref_url="https://www.suse.com/security/cve/CVE-2016-5280/" source="CVE"/>
		<reference ref_id="CVE-2016-5281" ref_url="https://www.suse.com/security/cve/CVE-2016-5281/" source="CVE"/>
		<reference ref_id="CVE-2016-5284" ref_url="https://www.suse.com/security/cve/CVE-2016-5284/" source="CVE"/>
		<reference ref_id="CVE-2016-5290" ref_url="https://www.suse.com/security/cve/CVE-2016-5290/" source="CVE"/>
		<reference ref_id="CVE-2016-5291" ref_url="https://www.suse.com/security/cve/CVE-2016-5291/" source="CVE"/>
		<reference ref_id="CVE-2016-5296" ref_url="https://www.suse.com/security/cve/CVE-2016-5296/" source="CVE"/>
		<reference ref_id="CVE-2016-5297" ref_url="https://www.suse.com/security/cve/CVE-2016-5297/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="CVE-2016-9064" ref_url="https://www.suse.com/security/cve/CVE-2016-9064/" source="CVE"/>
		<reference ref_id="CVE-2016-9066" ref_url="https://www.suse.com/security/cve/CVE-2016-9066/" source="CVE"/>
		<reference ref_id="CVE-2016-9079" ref_url="https://www.suse.com/security/cve/CVE-2016-9079/" source="CVE"/>
		<reference ref_id="CVE-2016-9893" ref_url="https://www.suse.com/security/cve/CVE-2016-9893/" source="CVE"/>
		<reference ref_id="CVE-2016-9895" ref_url="https://www.suse.com/security/cve/CVE-2016-9895/" source="CVE"/>
		<reference ref_id="CVE-2016-9897" ref_url="https://www.suse.com/security/cve/CVE-2016-9897/" source="CVE"/>
		<reference ref_id="CVE-2016-9898" ref_url="https://www.suse.com/security/cve/CVE-2016-9898/" source="CVE"/>
		<reference ref_id="CVE-2016-9899" ref_url="https://www.suse.com/security/cve/CVE-2016-9899/" source="CVE"/>
		<reference ref_id="CVE-2016-9900" ref_url="https://www.suse.com/security/cve/CVE-2016-9900/" source="CVE"/>
		<reference ref_id="CVE-2016-9901" ref_url="https://www.suse.com/security/cve/CVE-2016-9901/" source="CVE"/>
		<reference ref_id="CVE-2016-9902" ref_url="https://www.suse.com/security/cve/CVE-2016-9902/" source="CVE"/>
		<reference ref_id="CVE-2016-9904" ref_url="https://www.suse.com/security/cve/CVE-2016-9904/" source="CVE"/>
		<reference ref_id="CVE-2016-9905" ref_url="https://www.suse.com/security/cve/CVE-2016-9905/" source="CVE"/>
		<reference ref_id="CVE-2017-5373" ref_url="https://www.suse.com/security/cve/CVE-2017-5373/" source="CVE"/>
		<reference ref_id="CVE-2017-5375" ref_url="https://www.suse.com/security/cve/CVE-2017-5375/" source="CVE"/>
		<reference ref_id="CVE-2017-5376" ref_url="https://www.suse.com/security/cve/CVE-2017-5376/" source="CVE"/>
		<reference ref_id="CVE-2017-5378" ref_url="https://www.suse.com/security/cve/CVE-2017-5378/" source="CVE"/>
		<reference ref_id="CVE-2017-5380" ref_url="https://www.suse.com/security/cve/CVE-2017-5380/" source="CVE"/>
		<reference ref_id="CVE-2017-5383" ref_url="https://www.suse.com/security/cve/CVE-2017-5383/" source="CVE"/>
		<reference ref_id="CVE-2017-5386" ref_url="https://www.suse.com/security/cve/CVE-2017-5386/" source="CVE"/>
		<reference ref_id="CVE-2017-5390" ref_url="https://www.suse.com/security/cve/CVE-2017-5390/" source="CVE"/>
		<reference ref_id="CVE-2017-5396" ref_url="https://www.suse.com/security/cve/CVE-2017-5396/" source="CVE"/>
		<reference ref_id="CVE-2017-5398" ref_url="https://www.suse.com/security/cve/CVE-2017-5398/" source="CVE"/>
		<reference ref_id="CVE-2017-5400" ref_url="https://www.suse.com/security/cve/CVE-2017-5400/" source="CVE"/>
		<reference ref_id="CVE-2017-5401" ref_url="https://www.suse.com/security/cve/CVE-2017-5401/" source="CVE"/>
		<reference ref_id="CVE-2017-5402" ref_url="https://www.suse.com/security/cve/CVE-2017-5402/" source="CVE"/>
		<reference ref_id="CVE-2017-5404" ref_url="https://www.suse.com/security/cve/CVE-2017-5404/" source="CVE"/>
		<reference ref_id="CVE-2017-5405" ref_url="https://www.suse.com/security/cve/CVE-2017-5405/" source="CVE"/>
		<reference ref_id="CVE-2017-5407" ref_url="https://www.suse.com/security/cve/CVE-2017-5407/" source="CVE"/>
		<reference ref_id="CVE-2017-5408" ref_url="https://www.suse.com/security/cve/CVE-2017-5408/" source="CVE"/>
		<reference ref_id="CVE-2017-5409" ref_url="https://www.suse.com/security/cve/CVE-2017-5409/" source="CVE"/>
		<reference ref_id="CVE-2017-5410" ref_url="https://www.suse.com/security/cve/CVE-2017-5410/" source="CVE"/>
		<reference ref_id="CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429/" source="CVE"/>
		<reference ref_id="CVE-2017-5430" ref_url="https://www.suse.com/security/cve/CVE-2017-5430/" source="CVE"/>
		<reference ref_id="CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432/" source="CVE"/>
		<reference ref_id="CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433/" source="CVE"/>
		<reference ref_id="CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434/" source="CVE"/>
		<reference ref_id="CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2017-5437" ref_url="https://www.suse.com/security/cve/CVE-2017-5437/" source="CVE"/>
		<reference ref_id="CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438/" source="CVE"/>
		<reference ref_id="CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439/" source="CVE"/>
		<reference ref_id="CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440/" source="CVE"/>
		<reference ref_id="CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441/" source="CVE"/>
		<reference ref_id="CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442/" source="CVE"/>
		<reference ref_id="CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443/" source="CVE"/>
		<reference ref_id="CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444/" source="CVE"/>
		<reference ref_id="CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445/" source="CVE"/>
		<reference ref_id="CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446/" source="CVE"/>
		<reference ref_id="CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447/" source="CVE"/>
		<reference ref_id="CVE-2017-5448" ref_url="https://www.suse.com/security/cve/CVE-2017-5448/" source="CVE"/>
		<reference ref_id="CVE-2017-5449" ref_url="https://www.suse.com/security/cve/CVE-2017-5449/" source="CVE"/>
		<reference ref_id="CVE-2017-5451" ref_url="https://www.suse.com/security/cve/CVE-2017-5451/" source="CVE"/>
		<reference ref_id="CVE-2017-5454" ref_url="https://www.suse.com/security/cve/CVE-2017-5454/" source="CVE"/>
		<reference ref_id="CVE-2017-5455" ref_url="https://www.suse.com/security/cve/CVE-2017-5455/" source="CVE"/>
		<reference ref_id="CVE-2017-5456" ref_url="https://www.suse.com/security/cve/CVE-2017-5456/" source="CVE"/>
		<reference ref_id="CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459/" source="CVE"/>
		<reference ref_id="CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460/" source="CVE"/>
		<reference ref_id="CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461/" source="CVE"/>
		<reference ref_id="CVE-2017-5462" ref_url="https://www.suse.com/security/cve/CVE-2017-5462/" source="CVE"/>
		<reference ref_id="CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464/" source="CVE"/>
		<reference ref_id="CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465/" source="CVE"/>
		<reference ref_id="CVE-2017-5466" ref_url="https://www.suse.com/security/cve/CVE-2017-5466/" source="CVE"/>
		<reference ref_id="CVE-2017-5467" ref_url="https://www.suse.com/security/cve/CVE-2017-5467/" source="CVE"/>
		<reference ref_id="CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469/" source="CVE"/>
		<reference ref_id="CVE-2017-5470" ref_url="https://www.suse.com/security/cve/CVE-2017-5470/" source="CVE"/>
		<reference ref_id="CVE-2017-5472" ref_url="https://www.suse.com/security/cve/CVE-2017-5472/" source="CVE"/>
		<reference ref_id="CVE-2017-7749" ref_url="https://www.suse.com/security/cve/CVE-2017-7749/" source="CVE"/>
		<reference ref_id="CVE-2017-7750" ref_url="https://www.suse.com/security/cve/CVE-2017-7750/" source="CVE"/>
		<reference ref_id="CVE-2017-7751" ref_url="https://www.suse.com/security/cve/CVE-2017-7751/" source="CVE"/>
		<reference ref_id="CVE-2017-7752" ref_url="https://www.suse.com/security/cve/CVE-2017-7752/" source="CVE"/>
		<reference ref_id="CVE-2017-7753" ref_url="https://www.suse.com/security/cve/CVE-2017-7753/" source="CVE"/>
		<reference ref_id="CVE-2017-7754" ref_url="https://www.suse.com/security/cve/CVE-2017-7754/" source="CVE"/>
		<reference ref_id="CVE-2017-7755" ref_url="https://www.suse.com/security/cve/CVE-2017-7755/" source="CVE"/>
		<reference ref_id="CVE-2017-7756" ref_url="https://www.suse.com/security/cve/CVE-2017-7756/" source="CVE"/>
		<reference ref_id="CVE-2017-7757" ref_url="https://www.suse.com/security/cve/CVE-2017-7757/" source="CVE"/>
		<reference ref_id="CVE-2017-7758" ref_url="https://www.suse.com/security/cve/CVE-2017-7758/" source="CVE"/>
		<reference ref_id="CVE-2017-7761" ref_url="https://www.suse.com/security/cve/CVE-2017-7761/" source="CVE"/>
		<reference ref_id="CVE-2017-7763" ref_url="https://www.suse.com/security/cve/CVE-2017-7763/" source="CVE"/>
		<reference ref_id="CVE-2017-7764" ref_url="https://www.suse.com/security/cve/CVE-2017-7764/" source="CVE"/>
		<reference ref_id="CVE-2017-7765" ref_url="https://www.suse.com/security/cve/CVE-2017-7765/" source="CVE"/>
		<reference ref_id="CVE-2017-7768" ref_url="https://www.suse.com/security/cve/CVE-2017-7768/" source="CVE"/>
		<reference ref_id="CVE-2017-7778" ref_url="https://www.suse.com/security/cve/CVE-2017-7778/" source="CVE"/>
		<reference ref_id="CVE-2017-7779" ref_url="https://www.suse.com/security/cve/CVE-2017-7779/" source="CVE"/>
		<reference ref_id="CVE-2017-7782" ref_url="https://www.suse.com/security/cve/CVE-2017-7782/" source="CVE"/>
		<reference ref_id="CVE-2017-7784" ref_url="https://www.suse.com/security/cve/CVE-2017-7784/" source="CVE"/>
		<reference ref_id="CVE-2017-7785" ref_url="https://www.suse.com/security/cve/CVE-2017-7785/" source="CVE"/>
		<reference ref_id="CVE-2017-7786" ref_url="https://www.suse.com/security/cve/CVE-2017-7786/" source="CVE"/>
		<reference ref_id="CVE-2017-7787" ref_url="https://www.suse.com/security/cve/CVE-2017-7787/" source="CVE"/>
		<reference ref_id="CVE-2017-7791" ref_url="https://www.suse.com/security/cve/CVE-2017-7791/" source="CVE"/>
		<reference ref_id="CVE-2017-7792" ref_url="https://www.suse.com/security/cve/CVE-2017-7792/" source="CVE"/>
		<reference ref_id="CVE-2017-7793" ref_url="https://www.suse.com/security/cve/CVE-2017-7793/" source="CVE"/>
		<reference ref_id="CVE-2017-7798" ref_url="https://www.suse.com/security/cve/CVE-2017-7798/" source="CVE"/>
		<reference ref_id="CVE-2017-7800" ref_url="https://www.suse.com/security/cve/CVE-2017-7800/" source="CVE"/>
		<reference ref_id="CVE-2017-7801" ref_url="https://www.suse.com/security/cve/CVE-2017-7801/" source="CVE"/>
		<reference ref_id="CVE-2017-7802" ref_url="https://www.suse.com/security/cve/CVE-2017-7802/" source="CVE"/>
		<reference ref_id="CVE-2017-7803" ref_url="https://www.suse.com/security/cve/CVE-2017-7803/" source="CVE"/>
		<reference ref_id="CVE-2017-7804" ref_url="https://www.suse.com/security/cve/CVE-2017-7804/" source="CVE"/>
		<reference ref_id="CVE-2017-7805" ref_url="https://www.suse.com/security/cve/CVE-2017-7805/" source="CVE"/>
		<reference ref_id="CVE-2017-7807" ref_url="https://www.suse.com/security/cve/CVE-2017-7807/" source="CVE"/>
		<reference ref_id="CVE-2017-7810" ref_url="https://www.suse.com/security/cve/CVE-2017-7810/" source="CVE"/>
		<reference ref_id="CVE-2017-7814" ref_url="https://www.suse.com/security/cve/CVE-2017-7814/" source="CVE"/>
		<reference ref_id="CVE-2017-7818" ref_url="https://www.suse.com/security/cve/CVE-2017-7818/" source="CVE"/>
		<reference ref_id="CVE-2017-7819" ref_url="https://www.suse.com/security/cve/CVE-2017-7819/" source="CVE"/>
		<reference ref_id="CVE-2017-7823" ref_url="https://www.suse.com/security/cve/CVE-2017-7823/" source="CVE"/>
		<reference ref_id="CVE-2017-7824" ref_url="https://www.suse.com/security/cve/CVE-2017-7824/" source="CVE"/>
		<reference ref_id="CVE-2017-7825" ref_url="https://www.suse.com/security/cve/CVE-2017-7825/" source="CVE"/>
		<reference ref_id="CVE-2017-7826" ref_url="https://www.suse.com/security/cve/CVE-2017-7826/" source="CVE"/>
		<reference ref_id="CVE-2017-7828" ref_url="https://www.suse.com/security/cve/CVE-2017-7828/" source="CVE"/>
		<reference ref_id="CVE-2017-7830" ref_url="https://www.suse.com/security/cve/CVE-2017-7830/" source="CVE"/>
		<reference ref_id="CVE-2018-12359" ref_url="https://www.suse.com/security/cve/CVE-2018-12359/" source="CVE"/>
		<reference ref_id="CVE-2018-12360" ref_url="https://www.suse.com/security/cve/CVE-2018-12360/" source="CVE"/>
		<reference ref_id="CVE-2018-12362" ref_url="https://www.suse.com/security/cve/CVE-2018-12362/" source="CVE"/>
		<reference ref_id="CVE-2018-12363" ref_url="https://www.suse.com/security/cve/CVE-2018-12363/" source="CVE"/>
		<reference ref_id="CVE-2018-12364" ref_url="https://www.suse.com/security/cve/CVE-2018-12364/" source="CVE"/>
		<reference ref_id="CVE-2018-12365" ref_url="https://www.suse.com/security/cve/CVE-2018-12365/" source="CVE"/>
		<reference ref_id="CVE-2018-12366" ref_url="https://www.suse.com/security/cve/CVE-2018-12366/" source="CVE"/>
		<reference ref_id="CVE-2018-12368" ref_url="https://www.suse.com/security/cve/CVE-2018-12368/" source="CVE"/>
		<reference ref_id="CVE-2018-5089" ref_url="https://www.suse.com/security/cve/CVE-2018-5089/" source="CVE"/>
		<reference ref_id="CVE-2018-5091" ref_url="https://www.suse.com/security/cve/CVE-2018-5091/" source="CVE"/>
		<reference ref_id="CVE-2018-5095" ref_url="https://www.suse.com/security/cve/CVE-2018-5095/" source="CVE"/>
		<reference ref_id="CVE-2018-5096" ref_url="https://www.suse.com/security/cve/CVE-2018-5096/" source="CVE"/>
		<reference ref_id="CVE-2018-5097" ref_url="https://www.suse.com/security/cve/CVE-2018-5097/" source="CVE"/>
		<reference ref_id="CVE-2018-5098" ref_url="https://www.suse.com/security/cve/CVE-2018-5098/" source="CVE"/>
		<reference ref_id="CVE-2018-5099" ref_url="https://www.suse.com/security/cve/CVE-2018-5099/" source="CVE"/>
		<reference ref_id="CVE-2018-5102" ref_url="https://www.suse.com/security/cve/CVE-2018-5102/" source="CVE"/>
		<reference ref_id="CVE-2018-5103" ref_url="https://www.suse.com/security/cve/CVE-2018-5103/" source="CVE"/>
		<reference ref_id="CVE-2018-5104" ref_url="https://www.suse.com/security/cve/CVE-2018-5104/" source="CVE"/>
		<reference ref_id="CVE-2018-5117" ref_url="https://www.suse.com/security/cve/CVE-2018-5117/" source="CVE"/>
		<reference ref_id="CVE-2018-5125" ref_url="https://www.suse.com/security/cve/CVE-2018-5125/" source="CVE"/>
		<reference ref_id="CVE-2018-5127" ref_url="https://www.suse.com/security/cve/CVE-2018-5127/" source="CVE"/>
		<reference ref_id="CVE-2018-5129" ref_url="https://www.suse.com/security/cve/CVE-2018-5129/" source="CVE"/>
		<reference ref_id="CVE-2018-5130" ref_url="https://www.suse.com/security/cve/CVE-2018-5130/" source="CVE"/>
		<reference ref_id="CVE-2018-5131" ref_url="https://www.suse.com/security/cve/CVE-2018-5131/" source="CVE"/>
		<reference ref_id="CVE-2018-5144" ref_url="https://www.suse.com/security/cve/CVE-2018-5144/" source="CVE"/>
		<reference ref_id="CVE-2018-5145" ref_url="https://www.suse.com/security/cve/CVE-2018-5145/" source="CVE"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<reference ref_id="CVE-2018-5147" ref_url="https://www.suse.com/security/cve/CVE-2018-5147/" source="CVE"/>
		<reference ref_id="CVE-2018-5148" ref_url="https://www.suse.com/security/cve/CVE-2018-5148/" source="CVE"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5156" ref_url="https://www.suse.com/security/cve/CVE-2018-5156/" source="CVE"/>
		<reference ref_id="CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157/" source="CVE"/>
		<reference ref_id="CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<reference ref_id="CVE-2018-5188" ref_url="https://www.suse.com/security/cve/CVE-2018-5188/" source="CVE"/>
		<reference ref_id="CVE-2018-6126" ref_url="https://www.suse.com/security/cve/CVE-2018-6126/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-52.9.0esr-109.38.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-5913/">CVE-2008-5913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0652/">CVE-2009-0652</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0771/">CVE-2009-0771</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0772/">CVE-2009-0772</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0773/">CVE-2009-0773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0774/">CVE-2009-0774</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0775/">CVE-2009-0775</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0776/">CVE-2009-0776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0777/">CVE-2009-0777</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1044/">CVE-2009-1044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1169/">CVE-2009-1169</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1302/">CVE-2009-1302</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1303/">CVE-2009-1303</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1304/">CVE-2009-1304</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1305/">CVE-2009-1305</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1306/">CVE-2009-1306</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1307/">CVE-2009-1307</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1308/">CVE-2009-1308</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1309/">CVE-2009-1309</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1310/">CVE-2009-1310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1311/">CVE-2009-1311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1312/">CVE-2009-1312</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1313/">CVE-2009-1313</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1563/">CVE-2009-1563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2470/">CVE-2009-2470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2654/">CVE-2009-2654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3069/">CVE-2009-3069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3070/">CVE-2009-3070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3071/">CVE-2009-3071</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3072/">CVE-2009-3072</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3073/">CVE-2009-3073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3074/">CVE-2009-3074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3075/">CVE-2009-3075</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3077/">CVE-2009-3077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3078/">CVE-2009-3078</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3079/">CVE-2009-3079</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3274/">CVE-2009-3274</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3370/">CVE-2009-3370</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3371/">CVE-2009-3371</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3372/">CVE-2009-3372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3373/">CVE-2009-3373</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3374/">CVE-2009-3374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3375/">CVE-2009-3375</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3376/">CVE-2009-3376</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3377/">CVE-2009-3377</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3378/">CVE-2009-3378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3380/">CVE-2009-3380</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3381/">CVE-2009-3381</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3383/">CVE-2009-3383</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3388/">CVE-2009-3388</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3389/">CVE-2009-3389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3979/">CVE-2009-3979</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3980/">CVE-2009-3980</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3982/">CVE-2009-3982</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3983/">CVE-2009-3983</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3984/">CVE-2009-3984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3985/">CVE-2009-3985</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0164/">CVE-2010-0164</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0165/">CVE-2010-0165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0166/">CVE-2010-0166</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0167/">CVE-2010-0167</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0168/">CVE-2010-0168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0169/">CVE-2010-0169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0170/">CVE-2010-0170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0171/">CVE-2010-0171</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0172/">CVE-2010-0172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0654/">CVE-2010-0654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1028/">CVE-2010-1028</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1121/">CVE-2010-1121</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1125/">CVE-2010-1125</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1196/">CVE-2010-1196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1197/">CVE-2010-1197</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1198/">CVE-2010-1198</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1199/">CVE-2010-1199</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1200/">CVE-2010-1200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1201/">CVE-2010-1201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1202/">CVE-2010-1202</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1203/">CVE-2010-1203</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1206/">CVE-2010-1206</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1207/">CVE-2010-1207</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1208/">CVE-2010-1208</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1209/">CVE-2010-1209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1210/">CVE-2010-1210</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1211/">CVE-2010-1211</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1212/">CVE-2010-1212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1213/">CVE-2010-1213</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1214/">CVE-2010-1214</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1215/">CVE-2010-1215</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2751/">CVE-2010-2751</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2752/">CVE-2010-2752</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2753/">CVE-2010-2753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2754/">CVE-2010-2754</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2755/">CVE-2010-2755</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2760/">CVE-2010-2760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2762/">CVE-2010-2762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2764/">CVE-2010-2764</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2765/">CVE-2010-2765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2766/">CVE-2010-2766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2767/">CVE-2010-2767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2768/">CVE-2010-2768</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2769/">CVE-2010-2769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3166/">CVE-2010-3166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3167/">CVE-2010-3167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3168/">CVE-2010-3168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3169/">CVE-2010-3169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3173/">CVE-2010-3173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3174/">CVE-2010-3174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3175/">CVE-2010-3175</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3176/">CVE-2010-3176</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3177/">CVE-2010-3177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-0068/">CVE-2011-0068</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0069/">CVE-2011-0069</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0070/">CVE-2011-0070</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0079/">CVE-2011-0079</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0080/">CVE-2011-0080</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0081/">CVE-2011-0081</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0084/">CVE-2011-0084</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1187/">CVE-2011-1187</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1202/">CVE-2011-1202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2366/">CVE-2011-2366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2367/">CVE-2011-2367</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2368/">CVE-2011-2368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2369/">CVE-2011-2369</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2370/">CVE-2011-2370</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2371/">CVE-2011-2371</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2372/">CVE-2011-2372</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2373/">CVE-2011-2373</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2374/">CVE-2011-2374</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2375/">CVE-2011-2375</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2377/">CVE-2011-2377</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2985/">CVE-2011-2985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2986/">CVE-2011-2986</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2988/">CVE-2011-2988</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2989/">CVE-2011-2989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2990/">CVE-2011-2990</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2991/">CVE-2011-2991</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2992/">CVE-2011-2992</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2993/">CVE-2011-2993</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2995/">CVE-2011-2995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2996/">CVE-2011-2996</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2997/">CVE-2011-2997</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3000/">CVE-2011-3000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3001/">CVE-2011-3001</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3002/">CVE-2011-3002</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3003/">CVE-2011-3003</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3004/">CVE-2011-3004</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3005/">CVE-2011-3005</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3062/">CVE-2011-3062</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3101/">CVE-2011-3101</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3232/">CVE-2011-3232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3648/">CVE-2011-3648</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3650/">CVE-2011-3650</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3651/">CVE-2011-3651</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3652/">CVE-2011-3652</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3654/">CVE-2011-3654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3655/">CVE-2011-3655</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3658/">CVE-2011-3658</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3659/">CVE-2011-3659</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3660/">CVE-2011-3660</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3661/">CVE-2011-3661</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3663/">CVE-2011-3663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0441/">CVE-2012-0441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0442/">CVE-2012-0442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0443/">CVE-2012-0443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0445/">CVE-2012-0445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0446/">CVE-2012-0446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0447/">CVE-2012-0447</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0449/">CVE-2012-0449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0451/">CVE-2012-0451</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0452/">CVE-2012-0452</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0455/">CVE-2012-0455</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0456/">CVE-2012-0456</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0457/">CVE-2012-0457</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0458/">CVE-2012-0458</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0459/">CVE-2012-0459</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0460/">CVE-2012-0460</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0461/">CVE-2012-0461</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0462/">CVE-2012-0462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0463/">CVE-2012-0463</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0464/">CVE-2012-0464</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0467/">CVE-2012-0467</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0468/">CVE-2012-0468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0469/">CVE-2012-0469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0470/">CVE-2012-0470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0471/">CVE-2012-0471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0472/">CVE-2012-0472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0473/">CVE-2012-0473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0474/">CVE-2012-0474</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0475/">CVE-2012-0475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0477/">CVE-2012-0477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0478/">CVE-2012-0478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0479/">CVE-2012-0479</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0759/">CVE-2012-0759</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1937/">CVE-2012-1937</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1938/">CVE-2012-1938</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1940/">CVE-2012-1940</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1941/">CVE-2012-1941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1944/">CVE-2012-1944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1945/">CVE-2012-1945</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1946/">CVE-2012-1946</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1947/">CVE-2012-1947</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1948/">CVE-2012-1948</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1949/">CVE-2012-1949</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1950/">CVE-2012-1950</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1951/">CVE-2012-1951</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1952/">CVE-2012-1952</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1953/">CVE-2012-1953</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1954/">CVE-2012-1954</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1955/">CVE-2012-1955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1956/">CVE-2012-1956</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1957/">CVE-2012-1957</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1958/">CVE-2012-1958</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1959/">CVE-2012-1959</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1960/">CVE-2012-1960</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1961/">CVE-2012-1961</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1962/">CVE-2012-1962</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1963/">CVE-2012-1963</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1965/">CVE-2012-1965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1966/">CVE-2012-1966</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1967/">CVE-2012-1967</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1970/">CVE-2012-1970</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1972/">CVE-2012-1972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1973/">CVE-2012-1973</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1974/">CVE-2012-1974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1975/">CVE-2012-1975</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1976/">CVE-2012-1976</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3956/">CVE-2012-3956</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3957/">CVE-2012-3957</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3958/">CVE-2012-3958</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3959/">CVE-2012-3959</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3960/">CVE-2012-3960</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3961/">CVE-2012-3961</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3962/">CVE-2012-3962</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3963/">CVE-2012-3963</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3964/">CVE-2012-3964</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3965/">CVE-2012-3965</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3966/">CVE-2012-3966</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3967/">CVE-2012-3967</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3968/">CVE-2012-3968</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3969/">CVE-2012-3969</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3970/">CVE-2012-3970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3971/">CVE-2012-3971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3972/">CVE-2012-3972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3973/">CVE-2012-3973</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3975/">CVE-2012-3975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3976/">CVE-2012-3976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3978/">CVE-2012-3978</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3980/">CVE-2012-3980</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3982/">CVE-2012-3982</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3983/">CVE-2012-3983</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3984/">CVE-2012-3984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3985/">CVE-2012-3985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3986/">CVE-2012-3986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3988/">CVE-2012-3988</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3989/">CVE-2012-3989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3990/">CVE-2012-3990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3991/">CVE-2012-3991</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3992/">CVE-2012-3992</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3993/">CVE-2012-3993</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3994/">CVE-2012-3994</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3995/">CVE-2012-3995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4179/">CVE-2012-4179</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4180/">CVE-2012-4180</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4181/">CVE-2012-4181</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4182/">CVE-2012-4182</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4183/">CVE-2012-4183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4184/">CVE-2012-4184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4185/">CVE-2012-4185</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4186/">CVE-2012-4186</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4187/">CVE-2012-4187</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4188/">CVE-2012-4188</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4191/">CVE-2012-4191</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4192/">CVE-2012-4192</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4193/">CVE-2012-4193</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4194/">CVE-2012-4194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4195/">CVE-2012-4195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4196/">CVE-2012-4196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4201/">CVE-2012-4201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4202/">CVE-2012-4202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4203/">CVE-2012-4203</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4204/">CVE-2012-4204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4205/">CVE-2012-4205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4207/">CVE-2012-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4208/">CVE-2012-4208</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4209/">CVE-2012-4209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4210/">CVE-2012-4210</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4212/">CVE-2012-4212</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4213/">CVE-2012-4213</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4214/">CVE-2012-4214</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4215/">CVE-2012-4215</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4216/">CVE-2012-4216</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4217/">CVE-2012-4217</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4218/">CVE-2012-4218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5830/">CVE-2012-5830</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5833/">CVE-2012-5833</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5835/">CVE-2012-5835</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5836/">CVE-2012-5836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5837/">CVE-2012-5837</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5838/">CVE-2012-5838</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5839/">CVE-2012-5839</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5840/">CVE-2012-5840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5841/">CVE-2012-5841</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5842/">CVE-2012-5842</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5843/">CVE-2012-5843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0744/">CVE-2013-0744</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0745/">CVE-2013-0745</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0746/">CVE-2013-0746</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0747/">CVE-2013-0747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0748/">CVE-2013-0748</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0749/">CVE-2013-0749</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0750/">CVE-2013-0750</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0751/">CVE-2013-0751</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0752/">CVE-2013-0752</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0753/">CVE-2013-0753</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0754/">CVE-2013-0754</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0755/">CVE-2013-0755</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0756/">CVE-2013-0756</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0757/">CVE-2013-0757</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0758/">CVE-2013-0758</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0760/">CVE-2013-0760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0761/">CVE-2013-0761</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0762/">CVE-2013-0762</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0763/">CVE-2013-0763</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0764/">CVE-2013-0764</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0765/">CVE-2013-0765</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0766/">CVE-2013-0766</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0767/">CVE-2013-0767</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0768/">CVE-2013-0768</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0769/">CVE-2013-0769</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0770/">CVE-2013-0770</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0771/">CVE-2013-0771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0772/">CVE-2013-0772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0773/">CVE-2013-0773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0774/">CVE-2013-0774</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0775/">CVE-2013-0775</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0776/">CVE-2013-0776</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0777/">CVE-2013-0777</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0778/">CVE-2013-0778</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0779/">CVE-2013-0779</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0780/">CVE-2013-0780</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0781/">CVE-2013-0781</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0782/">CVE-2013-0782</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0783/">CVE-2013-0783</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0787/">CVE-2013-0787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0788/">CVE-2013-0788</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0789/">CVE-2013-0789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0792/">CVE-2013-0792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0793/">CVE-2013-0793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0794/">CVE-2013-0794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0795/">CVE-2013-0795</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0796/">CVE-2013-0796</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0800/">CVE-2013-0800</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0801/">CVE-2013-0801</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1669/">CVE-2013-1669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1670/">CVE-2013-1670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1671/">CVE-2013-1671</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1674/">CVE-2013-1674</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1675/">CVE-2013-1675</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1676/">CVE-2013-1676</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1677/">CVE-2013-1677</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1678/">CVE-2013-1678</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1679/">CVE-2013-1679</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1680/">CVE-2013-1680</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1681/">CVE-2013-1681</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1682/">CVE-2013-1682</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1683/">CVE-2013-1683</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1684/">CVE-2013-1684</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1685/">CVE-2013-1685</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1686/">CVE-2013-1686</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1687/">CVE-2013-1687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1688/">CVE-2013-1688</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1690/">CVE-2013-1690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1692/">CVE-2013-1692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1693/">CVE-2013-1693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1694/">CVE-2013-1694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1695/">CVE-2013-1695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1696/">CVE-2013-1696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1697/">CVE-2013-1697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1698/">CVE-2013-1698</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1699/">CVE-2013-1699</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1701/">CVE-2013-1701</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1702/">CVE-2013-1702</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1704/">CVE-2013-1704</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1705/">CVE-2013-1705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1708/">CVE-2013-1708</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1709/">CVE-2013-1709</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1710/">CVE-2013-1710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1711/">CVE-2013-1711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1713/">CVE-2013-1713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1714/">CVE-2013-1714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1717/">CVE-2013-1717</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1718/">CVE-2013-1718</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1719/">CVE-2013-1719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1720/">CVE-2013-1720</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1721/">CVE-2013-1721</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1722/">CVE-2013-1722</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1723/">CVE-2013-1723</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1724/">CVE-2013-1724</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1725/">CVE-2013-1725</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1728/">CVE-2013-1728</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1730/">CVE-2013-1730</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1732/">CVE-2013-1732</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1735/">CVE-2013-1735</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1736/">CVE-2013-1736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1737/">CVE-2013-1737</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1738/">CVE-2013-1738</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5590/">CVE-2013-5590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5591/">CVE-2013-5591</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5592/">CVE-2013-5592</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5593/">CVE-2013-5593</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5595/">CVE-2013-5595</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5596/">CVE-2013-5596</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5597/">CVE-2013-5597</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5598/">CVE-2013-5598</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5599/">CVE-2013-5599</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5600/">CVE-2013-5600</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5601/">CVE-2013-5601</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5602/">CVE-2013-5602</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5603/">CVE-2013-5603</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5604/">CVE-2013-5604</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5609/">CVE-2013-5609</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5610/">CVE-2013-5610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5611/">CVE-2013-5611</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5612/">CVE-2013-5612</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5613/">CVE-2013-5613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5614/">CVE-2013-5614</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5615/">CVE-2013-5615</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5616/">CVE-2013-5616</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5618/">CVE-2013-5618</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5619/">CVE-2013-5619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6630/">CVE-2013-6630</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-6671/">CVE-2013-6671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6672/">CVE-2013-6672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6673/">CVE-2013-6673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1477/">CVE-2014-1477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1478/">CVE-2014-1478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1479/">CVE-2014-1479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1480/">CVE-2014-1480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1481/">CVE-2014-1481</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1482/">CVE-2014-1482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1483/">CVE-2014-1483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1484/">CVE-2014-1484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1485/">CVE-2014-1485</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1486/">CVE-2014-1486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1487/">CVE-2014-1487</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1488/">CVE-2014-1488</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1489/">CVE-2014-1489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1490/">CVE-2014-1490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1491/">CVE-2014-1491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1544/">CVE-2014-1544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1547/">CVE-2014-1547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1548/">CVE-2014-1548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1553/">CVE-2014-1553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1554/">CVE-2014-1554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1555/">CVE-2014-1555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1556/">CVE-2014-1556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1557/">CVE-2014-1557</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1562/">CVE-2014-1562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1563/">CVE-2014-1563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1564/">CVE-2014-1564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1565/">CVE-2014-1565</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1567/">CVE-2014-1567</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1574/">CVE-2014-1574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1575/">CVE-2014-1575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1576/">CVE-2014-1576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1577/">CVE-2014-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1578/">CVE-2014-1578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1581/">CVE-2014-1581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1583/">CVE-2014-1583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1585/">CVE-2014-1585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1586/">CVE-2014-1586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1588/">CVE-2014-1588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8635/">CVE-2014-8635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8641/">CVE-2014-8641</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0797/">CVE-2015-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0801/">CVE-2015-0801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0807/">CVE-2015-0807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0813/">CVE-2015-0813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0814/">CVE-2015-0814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0815/">CVE-2015-0815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0816/">CVE-2015-0816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0817/">CVE-2015-0817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0818/">CVE-2015-0818</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0822/">CVE-2015-0822</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0827/">CVE-2015-0827</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0831/">CVE-2015-0831</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0835/">CVE-2015-0835</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0836/">CVE-2015-0836</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2708/">CVE-2015-2708</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2709/">CVE-2015-2709</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2710/">CVE-2015-2710</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2713/">CVE-2015-2713</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2716/">CVE-2015-2716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2726/">CVE-2015-2726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4474/">CVE-2015-4474</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4497/">CVE-2015-4497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4498/">CVE-2015-4498</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7202/">CVE-2015-7202</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10196/">CVE-2016-10196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1523/">CVE-2016-1523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1931/">CVE-2016-1931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1952/">CVE-2016-1952</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1953/">CVE-2016-1953</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1954/">CVE-2016-1954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1957/">CVE-2016-1957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1958/">CVE-2016-1958</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1960/">CVE-2016-1960</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1961/">CVE-2016-1961</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1962/">CVE-2016-1962</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1964/">CVE-2016-1964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1965/">CVE-2016-1965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1966/">CVE-2016-1966</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1974/">CVE-2016-1974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1977/">CVE-2016-1977</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2790/">CVE-2016-2790</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2791/">CVE-2016-2791</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2792/">CVE-2016-2792</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2793/">CVE-2016-2793</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2794/">CVE-2016-2794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2795/">CVE-2016-2795</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2796/">CVE-2016-2796</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2797/">CVE-2016-2797</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2798/">CVE-2016-2798</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2799/">CVE-2016-2799</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2800/">CVE-2016-2800</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2801/">CVE-2016-2801</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2802/">CVE-2016-2802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2805/">CVE-2016-2805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2807/">CVE-2016-2807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2808/">CVE-2016-2808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2814/">CVE-2016-2814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2815/">CVE-2016-2815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2818/">CVE-2016-2818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2819/">CVE-2016-2819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2821/">CVE-2016-2821</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2822/">CVE-2016-2822</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2824/">CVE-2016-2824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2828/">CVE-2016-2828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2831/">CVE-2016-2831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2835/">CVE-2016-2835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2836/">CVE-2016-2836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2837/">CVE-2016-2837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2838/">CVE-2016-2838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2839/">CVE-2016-2839</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5250/">CVE-2016-5250</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5252/">CVE-2016-5252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5254/">CVE-2016-5254</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5257/">CVE-2016-5257</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5258/">CVE-2016-5258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5259/">CVE-2016-5259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5261/">CVE-2016-5261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5262/">CVE-2016-5262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5263/">CVE-2016-5263</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5264/">CVE-2016-5264</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5265/">CVE-2016-5265</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5270/">CVE-2016-5270</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5272/">CVE-2016-5272</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5274/">CVE-2016-5274</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5276/">CVE-2016-5276</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5277/">CVE-2016-5277</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5278/">CVE-2016-5278</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5280/">CVE-2016-5280</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5281/">CVE-2016-5281</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5284/">CVE-2016-5284</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5290/">CVE-2016-5290</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5291/">CVE-2016-5291</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5296/">CVE-2016-5296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5297/">CVE-2016-5297</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9064/">CVE-2016-9064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9066/">CVE-2016-9066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9079/">CVE-2016-9079</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9893/">CVE-2016-9893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9895/">CVE-2016-9895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9897/">CVE-2016-9897</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9898/">CVE-2016-9898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9899/">CVE-2016-9899</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9900/">CVE-2016-9900</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9901/">CVE-2016-9901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9902/">CVE-2016-9902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9904/">CVE-2016-9904</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9905/">CVE-2016-9905</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5373/">CVE-2017-5373</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5375/">CVE-2017-5375</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5376/">CVE-2017-5376</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5378/">CVE-2017-5378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5380/">CVE-2017-5380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5383/">CVE-2017-5383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5386/">CVE-2017-5386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5390/">CVE-2017-5390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5396/">CVE-2017-5396</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5398/">CVE-2017-5398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5400/">CVE-2017-5400</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5401/">CVE-2017-5401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5402/">CVE-2017-5402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5404/">CVE-2017-5404</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5405/">CVE-2017-5405</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5407/">CVE-2017-5407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5408/">CVE-2017-5408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5409/">CVE-2017-5409</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5410/">CVE-2017-5410</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5430/">CVE-2017-5430</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5437/">CVE-2017-5437</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5448/">CVE-2017-5448</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5449/">CVE-2017-5449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5451/">CVE-2017-5451</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5454/">CVE-2017-5454</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5455/">CVE-2017-5455</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5456/">CVE-2017-5456</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5462/">CVE-2017-5462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5466/">CVE-2017-5466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5467/">CVE-2017-5467</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5470/">CVE-2017-5470</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5472/">CVE-2017-5472</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7749/">CVE-2017-7749</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7750/">CVE-2017-7750</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7751/">CVE-2017-7751</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7752/">CVE-2017-7752</cve>
	<cve impact="important" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7753/">CVE-2017-7753</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7754/">CVE-2017-7754</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7755/">CVE-2017-7755</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7756/">CVE-2017-7756</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7757/">CVE-2017-7757</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7758/">CVE-2017-7758</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7761/">CVE-2017-7761</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7763/">CVE-2017-7763</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7764/">CVE-2017-7764</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7765/">CVE-2017-7765</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7768/">CVE-2017-7768</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7778/">CVE-2017-7778</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7779/">CVE-2017-7779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7782/">CVE-2017-7782</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7784/">CVE-2017-7784</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7785/">CVE-2017-7785</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7786/">CVE-2017-7786</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7787/">CVE-2017-7787</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7791/">CVE-2017-7791</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7792/">CVE-2017-7792</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7793/">CVE-2017-7793</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7798/">CVE-2017-7798</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7800/">CVE-2017-7800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7801/">CVE-2017-7801</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7802/">CVE-2017-7802</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7803/">CVE-2017-7803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7804/">CVE-2017-7804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7805/">CVE-2017-7805</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7807/">CVE-2017-7807</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7810/">CVE-2017-7810</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7814/">CVE-2017-7814</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7818/">CVE-2017-7818</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7819/">CVE-2017-7819</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7823/">CVE-2017-7823</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7824/">CVE-2017-7824</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7825/">CVE-2017-7825</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7826/">CVE-2017-7826</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7828/">CVE-2017-7828</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7830/">CVE-2017-7830</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12359/">CVE-2018-12359</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12360/">CVE-2018-12360</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12362/">CVE-2018-12362</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12363/">CVE-2018-12363</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12364/">CVE-2018-12364</cve>
	<cve impact="important" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12365/">CVE-2018-12365</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12366/">CVE-2018-12366</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12368/">CVE-2018-12368</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5089/">CVE-2018-5089</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5091/">CVE-2018-5091</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5095/">CVE-2018-5095</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5096/">CVE-2018-5096</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5097/">CVE-2018-5097</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5098/">CVE-2018-5098</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5099/">CVE-2018-5099</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5102/">CVE-2018-5102</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5103/">CVE-2018-5103</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5104/">CVE-2018-5104</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5117/">CVE-2018-5117</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5125/">CVE-2018-5125</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5127/">CVE-2018-5127</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5129/">CVE-2018-5129</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5130/">CVE-2018-5130</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5131/">CVE-2018-5131</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5144/">CVE-2018-5144</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5145/">CVE-2018-5145</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5147/">CVE-2018-5147</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5148/">CVE-2018-5148</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5156/">CVE-2018-5156</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5188/">CVE-2018-5188</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6126/">CVE-2018-6126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512011" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512012" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76810" version="1" class="patch">
	<metadata>
		<title>NetworkManager-1.0.12-13.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-2924" ref_url="https://www.suse.com/security/cve/CVE-2015-2924/" source="CVE"/>
		<reference ref_id="CVE-2016-0764" ref_url="https://www.suse.com/security/cve/CVE-2016-0764/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-1.0.12-13.6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2924/">CVE-2015-2924</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0764/">CVE-2016-0764</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512013" comment="NetworkManager-1.0.12-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512014" comment="NetworkManager-lang-1.0.12-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512015" comment="libnm-glib-vpn1-1.0.12-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512016" comment="libnm-glib4-1.0.12-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512017" comment="libnm-util2-1.0.12-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512018" comment="libnm0-1.0.12-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512019" comment="typelib-1_0-NM-1_0-1.0.12-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512020" comment="typelib-1_0-NMClient-1_0-1.0.12-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512021" comment="typelib-1_0-NetworkManager-1_0-1.0.12-13.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76811" version="1" class="patch">
	<metadata>
		<title>SuSEfirewall2-3.6.312.333-3.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-15638" ref_url="https://www.suse.com/security/cve/CVE-2017-15638/" source="CVE"/>
		<description>
These are all security issues fixed in the SuSEfirewall2-3.6.312.333-3.13.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15638/">CVE-2017-15638</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512022" comment="SuSEfirewall2-3.6.312.333-3.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76812" version="1" class="patch">
	<metadata>
		<title>aaa_base-13.2+git20140911.61c1681-38.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-0461" ref_url="https://www.suse.com/security/cve/CVE-2011-0461/" source="CVE"/>
		<description>
These are all security issues fixed in the aaa_base-13.2+git20140911.61c1681-38.8.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0461/">CVE-2011-0461</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512023" comment="aaa_base-13.2+git20140911.61c1681-38.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512024" comment="aaa_base-extras-13.2+git20140911.61c1681-38.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76813" version="1" class="patch">
	<metadata>
		<title>accountsservice-0.6.42-16.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-2737" ref_url="https://www.suse.com/security/cve/CVE-2012-2737/" source="CVE"/>
		<description>
These are all security issues fixed in the accountsservice-0.6.42-16.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2737/">CVE-2012-2737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512025" comment="accountsservice-0.6.42-16.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512026" comment="accountsservice-lang-0.6.42-16.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512027" comment="libaccountsservice0-0.6.42-16.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512028" comment="typelib-1_0-AccountsService-1_0-0.6.42-16.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76814" version="1" class="patch">
	<metadata>
		<title>alsa-1.0.27.2-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0035" ref_url="https://www.suse.com/security/cve/CVE-2009-0035/" source="CVE"/>
		<description>
These are all security issues fixed in the alsa-1.0.27.2-15.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0035/">CVE-2009-0035</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009158925" comment="alsa-1.0.27.2-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158927" comment="libasound2-1.0.27.2-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158928" comment="libasound2-32bit-1.0.27.2-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76815" version="1" class="patch">
	<metadata>
		<title>apparmor-docs-2.8.2-49.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-6507" ref_url="https://www.suse.com/security/cve/CVE-2017-6507/" source="CVE"/>
		<description>
These are all security issues fixed in the apparmor-docs-2.8.2-49.21 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6507/">CVE-2017-6507</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009158932" comment="apparmor-docs-2.8.2-49.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158933" comment="apparmor-parser-2.8.2-49.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158934" comment="apparmor-profiles-2.8.2-49.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158935" comment="apparmor-utils-2.8.2-49.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158936" comment="libapparmor1-2.8.2-49.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158937" comment="libapparmor1-32bit-2.8.2-49.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158938" comment="pam_apparmor-2.8.2-49.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158939" comment="pam_apparmor-32bit-2.8.2-49.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158940" comment="perl-apparmor-2.8.2-49.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76816" version="1" class="patch">
	<metadata>
		<title>argyllcms-1.6.3-3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-1616" ref_url="https://www.suse.com/security/cve/CVE-2012-1616/" source="CVE"/>
		<description>
These are all security issues fixed in the argyllcms-1.6.3-3.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1616/">CVE-2012-1616</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142077" comment="argyllcms-1.6.3-3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76817" version="1" class="patch">
	<metadata>
		<title>at-3.1.14-8.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<description>
These are all security issues fixed in the at-3.1.14-8.6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512029" comment="at-3.1.14-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512030" comment="libQtWebKit4-4.8.7+2.3.4-4.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512031" comment="libQtWebKit4-32bit-4.8.7+2.3.4-4.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131111" comment="libbonobo-2.32.1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131112" comment="libbonobo-32bit-2.32.1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131113" comment="libbonobo-lang-2.32.1-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76818" version="1" class="patch">
	<metadata>
		<title>audiofile-0.3.6-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-7747" ref_url="https://www.suse.com/security/cve/CVE-2015-7747/" source="CVE"/>
		<reference ref_id="CVE-2017-6827" ref_url="https://www.suse.com/security/cve/CVE-2017-6827/" source="CVE"/>
		<reference ref_id="CVE-2017-6828" ref_url="https://www.suse.com/security/cve/CVE-2017-6828/" source="CVE"/>
		<reference ref_id="CVE-2017-6829" ref_url="https://www.suse.com/security/cve/CVE-2017-6829/" source="CVE"/>
		<reference ref_id="CVE-2017-6830" ref_url="https://www.suse.com/security/cve/CVE-2017-6830/" source="CVE"/>
		<reference ref_id="CVE-2017-6831" ref_url="https://www.suse.com/security/cve/CVE-2017-6831/" source="CVE"/>
		<reference ref_id="CVE-2017-6832" ref_url="https://www.suse.com/security/cve/CVE-2017-6832/" source="CVE"/>
		<reference ref_id="CVE-2017-6833" ref_url="https://www.suse.com/security/cve/CVE-2017-6833/" source="CVE"/>
		<reference ref_id="CVE-2017-6834" ref_url="https://www.suse.com/security/cve/CVE-2017-6834/" source="CVE"/>
		<reference ref_id="CVE-2017-6835" ref_url="https://www.suse.com/security/cve/CVE-2017-6835/" source="CVE"/>
		<reference ref_id="CVE-2017-6836" ref_url="https://www.suse.com/security/cve/CVE-2017-6836/" source="CVE"/>
		<reference ref_id="CVE-2017-6837" ref_url="https://www.suse.com/security/cve/CVE-2017-6837/" source="CVE"/>
		<reference ref_id="CVE-2017-6838" ref_url="https://www.suse.com/security/cve/CVE-2017-6838/" source="CVE"/>
		<reference ref_id="CVE-2017-6839" ref_url="https://www.suse.com/security/cve/CVE-2017-6839/" source="CVE"/>
		<description>
These are all security issues fixed in the audiofile-0.3.6-10.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7747/">CVE-2015-7747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6827/">CVE-2017-6827</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6828/">CVE-2017-6828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6829/">CVE-2017-6829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6830/">CVE-2017-6830</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6831/">CVE-2017-6831</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6832/">CVE-2017-6832</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6833/">CVE-2017-6833</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6834/">CVE-2017-6834</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6835/">CVE-2017-6835</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6836/">CVE-2017-6836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6837/">CVE-2017-6837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6838/">CVE-2017-6838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6839/">CVE-2017-6839</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009150578" comment="audiofile-0.3.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150579" comment="libaudiofile1-0.3.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150580" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76819" version="1" class="patch">
	<metadata>
		<title>augeas-1.2.0-17.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-0786" ref_url="https://www.suse.com/security/cve/CVE-2012-0786/" source="CVE"/>
		<reference ref_id="CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119/" source="CVE"/>
		<reference ref_id="CVE-2017-7555" ref_url="https://www.suse.com/security/cve/CVE-2017-7555/" source="CVE"/>
		<description>
These are all security issues fixed in the augeas-1.2.0-17.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0786/">CVE-2012-0786</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7555/">CVE-2017-7555</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009172798" comment="augeas-1.2.0-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009172799" comment="augeas-lenses-1.2.0-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009172800" comment="libaugeas0-1.2.0-17.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76820" version="1" class="patch">
	<metadata>
		<title>autofs-5.0.9-28.3.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-8169" ref_url="https://www.suse.com/security/cve/CVE-2014-8169/" source="CVE"/>
		<description>
These are all security issues fixed in the autofs-5.0.9-28.3.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8169/">CVE-2014-8169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512032" comment="autofs-5.0.9-28.3.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76821" version="1" class="patch">
	<metadata>
		<title>avahi-0.6.32-30.36 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0758" ref_url="https://www.suse.com/security/cve/CVE-2009-0758/" source="CVE"/>
		<reference ref_id="CVE-2010-2244" ref_url="https://www.suse.com/security/cve/CVE-2010-2244/" source="CVE"/>
		<reference ref_id="CVE-2011-1002" ref_url="https://www.suse.com/security/cve/CVE-2011-1002/" source="CVE"/>
		<description>
These are all security issues fixed in the avahi-0.6.32-30.36 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0758/">CVE-2009-0758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2244/">CVE-2010-2244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1002/">CVE-2011-1002</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140467" comment="avahi-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140468" comment="avahi-lang-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140470" comment="libavahi-client3-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140471" comment="libavahi-client3-32bit-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140472" comment="libavahi-common3-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140473" comment="libavahi-common3-32bit-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140474" comment="libavahi-core7-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140475" comment="libdns_sd-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140476" comment="libdns_sd-32bit-0.6.32-30.36 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76822" version="1" class="patch">
	<metadata>
		<title>bash-4.3-83.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-2524" ref_url="https://www.suse.com/security/cve/CVE-2014-2524/" source="CVE"/>
		<reference ref_id="CVE-2014-6271" ref_url="https://www.suse.com/security/cve/CVE-2014-6271/" source="CVE"/>
		<reference ref_id="CVE-2014-6277" ref_url="https://www.suse.com/security/cve/CVE-2014-6277/" source="CVE"/>
		<reference ref_id="CVE-2014-6278" ref_url="https://www.suse.com/security/cve/CVE-2014-6278/" source="CVE"/>
		<reference ref_id="CVE-2014-7169" ref_url="https://www.suse.com/security/cve/CVE-2014-7169/" source="CVE"/>
		<reference ref_id="CVE-2014-7186" ref_url="https://www.suse.com/security/cve/CVE-2014-7186/" source="CVE"/>
		<reference ref_id="CVE-2014-7187" ref_url="https://www.suse.com/security/cve/CVE-2014-7187/" source="CVE"/>
		<reference ref_id="CVE-2016-0634" ref_url="https://www.suse.com/security/cve/CVE-2016-0634/" source="CVE"/>
		<reference ref_id="CVE-2016-7543" ref_url="https://www.suse.com/security/cve/CVE-2016-7543/" source="CVE"/>
		<description>
These are all security issues fixed in the bash-4.3-83.15.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2524/">CVE-2014-2524</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6271/">CVE-2014-6271</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6277/">CVE-2014-6277</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6278/">CVE-2014-6278</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7169/">CVE-2014-7169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7186/">CVE-2014-7186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7187/">CVE-2014-7187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0634/">CVE-2016-0634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7543/">CVE-2016-7543</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512033" comment="bash-4.3-83.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512034" comment="bash-doc-4.3-83.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512035" comment="bash-lang-4.3-83.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512036" comment="libreadline6-6.3-83.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512037" comment="libreadline6-32bit-6.3-83.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512038" comment="readline-doc-6.3-83.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76823" version="1" class="patch">
	<metadata>
		<title>bind-utils-9.11.2-1.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0696" ref_url="https://www.suse.com/security/cve/CVE-2009-0696/" source="CVE"/>
		<reference ref_id="CVE-2009-4022" ref_url="https://www.suse.com/security/cve/CVE-2009-4022/" source="CVE"/>
		<reference ref_id="CVE-2010-3613" ref_url="https://www.suse.com/security/cve/CVE-2010-3613/" source="CVE"/>
		<reference ref_id="CVE-2010-3614" ref_url="https://www.suse.com/security/cve/CVE-2010-3614/" source="CVE"/>
		<reference ref_id="CVE-2010-3615" ref_url="https://www.suse.com/security/cve/CVE-2010-3615/" source="CVE"/>
		<reference ref_id="CVE-2011-0414" ref_url="https://www.suse.com/security/cve/CVE-2011-0414/" source="CVE"/>
		<reference ref_id="CVE-2011-1907" ref_url="https://www.suse.com/security/cve/CVE-2011-1907/" source="CVE"/>
		<reference ref_id="CVE-2011-1910" ref_url="https://www.suse.com/security/cve/CVE-2011-1910/" source="CVE"/>
		<reference ref_id="CVE-2011-2464" ref_url="https://www.suse.com/security/cve/CVE-2011-2464/" source="CVE"/>
		<reference ref_id="CVE-2011-4313" ref_url="https://www.suse.com/security/cve/CVE-2011-4313/" source="CVE"/>
		<reference ref_id="CVE-2012-1667" ref_url="https://www.suse.com/security/cve/CVE-2012-1667/" source="CVE"/>
		<reference ref_id="CVE-2012-3817" ref_url="https://www.suse.com/security/cve/CVE-2012-3817/" source="CVE"/>
		<reference ref_id="CVE-2012-3868" ref_url="https://www.suse.com/security/cve/CVE-2012-3868/" source="CVE"/>
		<reference ref_id="CVE-2012-4244" ref_url="https://www.suse.com/security/cve/CVE-2012-4244/" source="CVE"/>
		<reference ref_id="CVE-2012-5166" ref_url="https://www.suse.com/security/cve/CVE-2012-5166/" source="CVE"/>
		<reference ref_id="CVE-2012-5688" ref_url="https://www.suse.com/security/cve/CVE-2012-5688/" source="CVE"/>
		<reference ref_id="CVE-2012-5689" ref_url="https://www.suse.com/security/cve/CVE-2012-5689/" source="CVE"/>
		<reference ref_id="CVE-2013-2266" ref_url="https://www.suse.com/security/cve/CVE-2013-2266/" source="CVE"/>
		<reference ref_id="CVE-2013-4854" ref_url="https://www.suse.com/security/cve/CVE-2013-4854/" source="CVE"/>
		<reference ref_id="CVE-2014-0591" ref_url="https://www.suse.com/security/cve/CVE-2014-0591/" source="CVE"/>
		<reference ref_id="CVE-2014-8500" ref_url="https://www.suse.com/security/cve/CVE-2014-8500/" source="CVE"/>
		<reference ref_id="CVE-2015-1349" ref_url="https://www.suse.com/security/cve/CVE-2015-1349/" source="CVE"/>
		<reference ref_id="CVE-2015-4620" ref_url="https://www.suse.com/security/cve/CVE-2015-4620/" source="CVE"/>
		<reference ref_id="CVE-2015-5477" ref_url="https://www.suse.com/security/cve/CVE-2015-5477/" source="CVE"/>
		<reference ref_id="CVE-2015-5722" ref_url="https://www.suse.com/security/cve/CVE-2015-5722/" source="CVE"/>
		<reference ref_id="CVE-2015-8000" ref_url="https://www.suse.com/security/cve/CVE-2015-8000/" source="CVE"/>
		<reference ref_id="CVE-2015-8704" ref_url="https://www.suse.com/security/cve/CVE-2015-8704/" source="CVE"/>
		<reference ref_id="CVE-2016-1285" ref_url="https://www.suse.com/security/cve/CVE-2016-1285/" source="CVE"/>
		<reference ref_id="CVE-2016-1286" ref_url="https://www.suse.com/security/cve/CVE-2016-1286/" source="CVE"/>
		<reference ref_id="CVE-2016-2775" ref_url="https://www.suse.com/security/cve/CVE-2016-2775/" source="CVE"/>
		<reference ref_id="CVE-2016-2776" ref_url="https://www.suse.com/security/cve/CVE-2016-2776/" source="CVE"/>
		<reference ref_id="CVE-2016-6170" ref_url="https://www.suse.com/security/cve/CVE-2016-6170/" source="CVE"/>
		<reference ref_id="CVE-2016-8864" ref_url="https://www.suse.com/security/cve/CVE-2016-8864/" source="CVE"/>
		<reference ref_id="CVE-2016-9131" ref_url="https://www.suse.com/security/cve/CVE-2016-9131/" source="CVE"/>
		<reference ref_id="CVE-2016-9147" ref_url="https://www.suse.com/security/cve/CVE-2016-9147/" source="CVE"/>
		<reference ref_id="CVE-2016-9444" ref_url="https://www.suse.com/security/cve/CVE-2016-9444/" source="CVE"/>
		<reference ref_id="CVE-2017-3135" ref_url="https://www.suse.com/security/cve/CVE-2017-3135/" source="CVE"/>
		<reference ref_id="CVE-2017-3136" ref_url="https://www.suse.com/security/cve/CVE-2017-3136/" source="CVE"/>
		<reference ref_id="CVE-2017-3137" ref_url="https://www.suse.com/security/cve/CVE-2017-3137/" source="CVE"/>
		<reference ref_id="CVE-2017-3138" ref_url="https://www.suse.com/security/cve/CVE-2017-3138/" source="CVE"/>
		<reference ref_id="CVE-2017-3142" ref_url="https://www.suse.com/security/cve/CVE-2017-3142/" source="CVE"/>
		<reference ref_id="CVE-2017-3143" ref_url="https://www.suse.com/security/cve/CVE-2017-3143/" source="CVE"/>
		<reference ref_id="CVE-2017-3145" ref_url="https://www.suse.com/security/cve/CVE-2017-3145/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-utils-9.11.2-1.24 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0696/">CVE-2009-0696</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4022/">CVE-2009-4022</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3613/">CVE-2010-3613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3614/">CVE-2010-3614</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3615/">CVE-2010-3615</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0414/">CVE-2011-0414</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1907/">CVE-2011-1907</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1910/">CVE-2011-1910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2464/">CVE-2011-2464</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4313/">CVE-2011-4313</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1667/">CVE-2012-1667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3817/">CVE-2012-3817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3868/">CVE-2012-3868</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4244/">CVE-2012-4244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5166/">CVE-2012-5166</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5688/">CVE-2012-5688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5689/">CVE-2012-5689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2266/">CVE-2013-2266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4854/">CVE-2013-4854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0591/">CVE-2014-0591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8500/">CVE-2014-8500</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1349/">CVE-2015-1349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4620/">CVE-2015-4620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5477/">CVE-2015-5477</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5722/">CVE-2015-5722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8000/">CVE-2015-8000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8704/">CVE-2015-8704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1285/">CVE-2016-1285</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1286/">CVE-2016-1286</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2775/">CVE-2016-2775</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2776/">CVE-2016-2776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6170/">CVE-2016-6170</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8864/">CVE-2016-8864</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9131/">CVE-2016-9131</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9147/">CVE-2016-9147</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9444/">CVE-2016-9444</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3135/">CVE-2017-3135</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3136/">CVE-2017-3136</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3137/">CVE-2017-3137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3138/">CVE-2017-3138</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3142/">CVE-2017-3142</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3143/">CVE-2017-3143</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3145/">CVE-2017-3145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512039" comment="bind-utils-9.11.2-1.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512040" comment="libbind9-160-9.11.2-1.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512041" comment="libdns169-9.11.2-1.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512042" comment="libirs160-9.11.2-1.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512043" comment="libisc166-9.11.2-1.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512044" comment="libisc166-32bit-9.11.2-1.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512045" comment="libisccc160-9.11.2-1.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512046" comment="libisccfg160-9.11.2-1.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512047" comment="liblwres160-9.11.2-1.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512048" comment="python-bind-9.11.2-1.24 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76824" version="1" class="patch">
	<metadata>
		<title>binutils-2.31-9.26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-9939" ref_url="https://www.suse.com/security/cve/CVE-2014-9939/" source="CVE"/>
		<reference ref_id="CVE-2017-12448" ref_url="https://www.suse.com/security/cve/CVE-2017-12448/" source="CVE"/>
		<reference ref_id="CVE-2017-12450" ref_url="https://www.suse.com/security/cve/CVE-2017-12450/" source="CVE"/>
		<reference ref_id="CVE-2017-12452" ref_url="https://www.suse.com/security/cve/CVE-2017-12452/" source="CVE"/>
		<reference ref_id="CVE-2017-12453" ref_url="https://www.suse.com/security/cve/CVE-2017-12453/" source="CVE"/>
		<reference ref_id="CVE-2017-12454" ref_url="https://www.suse.com/security/cve/CVE-2017-12454/" source="CVE"/>
		<reference ref_id="CVE-2017-12456" ref_url="https://www.suse.com/security/cve/CVE-2017-12456/" source="CVE"/>
		<reference ref_id="CVE-2017-12799" ref_url="https://www.suse.com/security/cve/CVE-2017-12799/" source="CVE"/>
		<reference ref_id="CVE-2017-13757" ref_url="https://www.suse.com/security/cve/CVE-2017-13757/" source="CVE"/>
		<reference ref_id="CVE-2017-14128" ref_url="https://www.suse.com/security/cve/CVE-2017-14128/" source="CVE"/>
		<reference ref_id="CVE-2017-14129" ref_url="https://www.suse.com/security/cve/CVE-2017-14129/" source="CVE"/>
		<reference ref_id="CVE-2017-14130" ref_url="https://www.suse.com/security/cve/CVE-2017-14130/" source="CVE"/>
		<reference ref_id="CVE-2017-14333" ref_url="https://www.suse.com/security/cve/CVE-2017-14333/" source="CVE"/>
		<reference ref_id="CVE-2017-14529" ref_url="https://www.suse.com/security/cve/CVE-2017-14529/" source="CVE"/>
		<reference ref_id="CVE-2017-14729" ref_url="https://www.suse.com/security/cve/CVE-2017-14729/" source="CVE"/>
		<reference ref_id="CVE-2017-14745" ref_url="https://www.suse.com/security/cve/CVE-2017-14745/" source="CVE"/>
		<reference ref_id="CVE-2017-14974" ref_url="https://www.suse.com/security/cve/CVE-2017-14974/" source="CVE"/>
		<reference ref_id="CVE-2017-15938" ref_url="https://www.suse.com/security/cve/CVE-2017-15938/" source="CVE"/>
		<reference ref_id="CVE-2017-15939" ref_url="https://www.suse.com/security/cve/CVE-2017-15939/" source="CVE"/>
		<reference ref_id="CVE-2017-15996" ref_url="https://www.suse.com/security/cve/CVE-2017-15996/" source="CVE"/>
		<reference ref_id="CVE-2017-16826" ref_url="https://www.suse.com/security/cve/CVE-2017-16826/" source="CVE"/>
		<reference ref_id="CVE-2017-16827" ref_url="https://www.suse.com/security/cve/CVE-2017-16827/" source="CVE"/>
		<reference ref_id="CVE-2017-16828" ref_url="https://www.suse.com/security/cve/CVE-2017-16828/" source="CVE"/>
		<reference ref_id="CVE-2017-16829" ref_url="https://www.suse.com/security/cve/CVE-2017-16829/" source="CVE"/>
		<reference ref_id="CVE-2017-16830" ref_url="https://www.suse.com/security/cve/CVE-2017-16830/" source="CVE"/>
		<reference ref_id="CVE-2017-16831" ref_url="https://www.suse.com/security/cve/CVE-2017-16831/" source="CVE"/>
		<reference ref_id="CVE-2017-16832" ref_url="https://www.suse.com/security/cve/CVE-2017-16832/" source="CVE"/>
		<reference ref_id="CVE-2017-6965" ref_url="https://www.suse.com/security/cve/CVE-2017-6965/" source="CVE"/>
		<reference ref_id="CVE-2017-6966" ref_url="https://www.suse.com/security/cve/CVE-2017-6966/" source="CVE"/>
		<reference ref_id="CVE-2017-6969" ref_url="https://www.suse.com/security/cve/CVE-2017-6969/" source="CVE"/>
		<reference ref_id="CVE-2017-7209" ref_url="https://www.suse.com/security/cve/CVE-2017-7209/" source="CVE"/>
		<reference ref_id="CVE-2017-7210" ref_url="https://www.suse.com/security/cve/CVE-2017-7210/" source="CVE"/>
		<reference ref_id="CVE-2017-7223" ref_url="https://www.suse.com/security/cve/CVE-2017-7223/" source="CVE"/>
		<reference ref_id="CVE-2017-7224" ref_url="https://www.suse.com/security/cve/CVE-2017-7224/" source="CVE"/>
		<reference ref_id="CVE-2017-7225" ref_url="https://www.suse.com/security/cve/CVE-2017-7225/" source="CVE"/>
		<reference ref_id="CVE-2017-7226" ref_url="https://www.suse.com/security/cve/CVE-2017-7226/" source="CVE"/>
		<reference ref_id="CVE-2017-7299" ref_url="https://www.suse.com/security/cve/CVE-2017-7299/" source="CVE"/>
		<reference ref_id="CVE-2017-7300" ref_url="https://www.suse.com/security/cve/CVE-2017-7300/" source="CVE"/>
		<reference ref_id="CVE-2017-7301" ref_url="https://www.suse.com/security/cve/CVE-2017-7301/" source="CVE"/>
		<reference ref_id="CVE-2017-7302" ref_url="https://www.suse.com/security/cve/CVE-2017-7302/" source="CVE"/>
		<reference ref_id="CVE-2017-7303" ref_url="https://www.suse.com/security/cve/CVE-2017-7303/" source="CVE"/>
		<reference ref_id="CVE-2017-7304" ref_url="https://www.suse.com/security/cve/CVE-2017-7304/" source="CVE"/>
		<reference ref_id="CVE-2017-8392" ref_url="https://www.suse.com/security/cve/CVE-2017-8392/" source="CVE"/>
		<reference ref_id="CVE-2017-8393" ref_url="https://www.suse.com/security/cve/CVE-2017-8393/" source="CVE"/>
		<reference ref_id="CVE-2017-8394" ref_url="https://www.suse.com/security/cve/CVE-2017-8394/" source="CVE"/>
		<reference ref_id="CVE-2017-8396" ref_url="https://www.suse.com/security/cve/CVE-2017-8396/" source="CVE"/>
		<reference ref_id="CVE-2017-8421" ref_url="https://www.suse.com/security/cve/CVE-2017-8421/" source="CVE"/>
		<reference ref_id="CVE-2017-9746" ref_url="https://www.suse.com/security/cve/CVE-2017-9746/" source="CVE"/>
		<reference ref_id="CVE-2017-9747" ref_url="https://www.suse.com/security/cve/CVE-2017-9747/" source="CVE"/>
		<reference ref_id="CVE-2017-9748" ref_url="https://www.suse.com/security/cve/CVE-2017-9748/" source="CVE"/>
		<reference ref_id="CVE-2017-9750" ref_url="https://www.suse.com/security/cve/CVE-2017-9750/" source="CVE"/>
		<reference ref_id="CVE-2017-9755" ref_url="https://www.suse.com/security/cve/CVE-2017-9755/" source="CVE"/>
		<reference ref_id="CVE-2017-9756" ref_url="https://www.suse.com/security/cve/CVE-2017-9756/" source="CVE"/>
		<reference ref_id="CVE-2018-10372" ref_url="https://www.suse.com/security/cve/CVE-2018-10372/" source="CVE"/>
		<reference ref_id="CVE-2018-10373" ref_url="https://www.suse.com/security/cve/CVE-2018-10373/" source="CVE"/>
		<reference ref_id="CVE-2018-10534" ref_url="https://www.suse.com/security/cve/CVE-2018-10534/" source="CVE"/>
		<reference ref_id="CVE-2018-10535" ref_url="https://www.suse.com/security/cve/CVE-2018-10535/" source="CVE"/>
		<reference ref_id="CVE-2018-6323" ref_url="https://www.suse.com/security/cve/CVE-2018-6323/" source="CVE"/>
		<reference ref_id="CVE-2018-6543" ref_url="https://www.suse.com/security/cve/CVE-2018-6543/" source="CVE"/>
		<reference ref_id="CVE-2018-6759" ref_url="https://www.suse.com/security/cve/CVE-2018-6759/" source="CVE"/>
		<reference ref_id="CVE-2018-6872" ref_url="https://www.suse.com/security/cve/CVE-2018-6872/" source="CVE"/>
		<reference ref_id="CVE-2018-7208" ref_url="https://www.suse.com/security/cve/CVE-2018-7208/" source="CVE"/>
		<reference ref_id="CVE-2018-7568" ref_url="https://www.suse.com/security/cve/CVE-2018-7568/" source="CVE"/>
		<reference ref_id="CVE-2018-7569" ref_url="https://www.suse.com/security/cve/CVE-2018-7569/" source="CVE"/>
		<reference ref_id="CVE-2018-7570" ref_url="https://www.suse.com/security/cve/CVE-2018-7570/" source="CVE"/>
		<reference ref_id="CVE-2018-7642" ref_url="https://www.suse.com/security/cve/CVE-2018-7642/" source="CVE"/>
		<reference ref_id="CVE-2018-7643" ref_url="https://www.suse.com/security/cve/CVE-2018-7643/" source="CVE"/>
		<reference ref_id="CVE-2018-8945" ref_url="https://www.suse.com/security/cve/CVE-2018-8945/" source="CVE"/>
		<description>
These are all security issues fixed in the binutils-2.31-9.26.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9939/">CVE-2014-9939</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12448/">CVE-2017-12448</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12450/">CVE-2017-12450</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12452/">CVE-2017-12452</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12453/">CVE-2017-12453</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12454/">CVE-2017-12454</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12456/">CVE-2017-12456</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12799/">CVE-2017-12799</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13757/">CVE-2017-13757</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14128/">CVE-2017-14128</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14129/">CVE-2017-14129</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14130/">CVE-2017-14130</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14333/">CVE-2017-14333</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14529/">CVE-2017-14529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14729/">CVE-2017-14729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14745/">CVE-2017-14745</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14974/">CVE-2017-14974</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15938/">CVE-2017-15938</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15939/">CVE-2017-15939</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15996/">CVE-2017-15996</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16826/">CVE-2017-16826</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16827/">CVE-2017-16827</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16828/">CVE-2017-16828</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16829/">CVE-2017-16829</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-16830/">CVE-2017-16830</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16831/">CVE-2017-16831</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16832/">CVE-2017-16832</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6965/">CVE-2017-6965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-6966/">CVE-2017-6966</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6969/">CVE-2017-6969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7209/">CVE-2017-7209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7210/">CVE-2017-7210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7223/">CVE-2017-7223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7224/">CVE-2017-7224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7225/">CVE-2017-7225</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7226/">CVE-2017-7226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7299/">CVE-2017-7299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7300/">CVE-2017-7300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7301/">CVE-2017-7301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7302/">CVE-2017-7302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7303/">CVE-2017-7303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7304/">CVE-2017-7304</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8392/">CVE-2017-8392</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8393/">CVE-2017-8393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8394/">CVE-2017-8394</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8396/">CVE-2017-8396</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8421/">CVE-2017-8421</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9746/">CVE-2017-9746</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9747/">CVE-2017-9747</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9748/">CVE-2017-9748</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9750/">CVE-2017-9750</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9755/">CVE-2017-9755</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9756/">CVE-2017-9756</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10372/">CVE-2018-10372</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10373/">CVE-2018-10373</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10534/">CVE-2018-10534</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10535/">CVE-2018-10535</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6323/">CVE-2018-6323</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6543/">CVE-2018-6543</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6759/">CVE-2018-6759</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6872/">CVE-2018-6872</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7208/">CVE-2018-7208</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7568/">CVE-2018-7568</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7569/">CVE-2018-7569</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7570/">CVE-2018-7570</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7642/">CVE-2018-7642</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7643/">CVE-2018-7643</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8945/">CVE-2018-8945</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512049" comment="binutils-2.31-9.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76825" version="1" class="patch">
	<metadata>
		<title>bluez-5.13-5.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-7837" ref_url="https://www.suse.com/security/cve/CVE-2016-7837/" source="CVE"/>
		<reference ref_id="CVE-2016-9800" ref_url="https://www.suse.com/security/cve/CVE-2016-9800/" source="CVE"/>
		<reference ref_id="CVE-2016-9804" ref_url="https://www.suse.com/security/cve/CVE-2016-9804/" source="CVE"/>
		<reference ref_id="CVE-2017-1000250" ref_url="https://www.suse.com/security/cve/CVE-2017-1000250/" source="CVE"/>
		<description>
These are all security issues fixed in the bluez-5.13-5.4.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7837/">CVE-2016-7837</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9800/">CVE-2016-9800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9804/">CVE-2016-9804</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000250/">CVE-2017-1000250</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512050" comment="bluez-5.13-5.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512051" comment="bluez-cups-5.13-5.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512052" comment="libbluetooth3-5.13-5.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76826" version="1" class="patch">
	<metadata>
		<title>bogofilter-1.2.4-5.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-2494" ref_url="https://www.suse.com/security/cve/CVE-2010-2494/" source="CVE"/>
		<reference ref_id="CVE-2012-5468" ref_url="https://www.suse.com/security/cve/CVE-2012-5468/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<description>
These are all security issues fixed in the bogofilter-1.2.4-5.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2494/">CVE-2010-2494</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5468/">CVE-2012-5468</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131108" comment="bogofilter-1.2.4-5.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76827" version="1" class="patch">
	<metadata>
		<title>busybox-1.21.1-3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-9645" ref_url="https://www.suse.com/security/cve/CVE-2014-9645/" source="CVE"/>
		<description>
These are all security issues fixed in the busybox-1.21.1-3.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9645/">CVE-2014-9645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113975" comment="busybox-1.21.1-3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76828" version="1" class="patch">
	<metadata>
		<title>bzip2-1.0.6-29.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<description>
These are all security issues fixed in the bzip2-1.0.6-29.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140483" comment="bzip2-1.0.6-29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140485" comment="libbz2-1-1.0.6-29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140486" comment="libbz2-1-32bit-1.0.6-29.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76829" version="1" class="patch">
	<metadata>
		<title>ceph-common-12.2.8+git.1536505967.080f2248ff-2.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-16818" ref_url="https://www.suse.com/security/cve/CVE-2017-16818/" source="CVE"/>
		<reference ref_id="CVE-2018-10861" ref_url="https://www.suse.com/security/cve/CVE-2018-10861/" source="CVE"/>
		<reference ref_id="CVE-2018-1128" ref_url="https://www.suse.com/security/cve/CVE-2018-1128/" source="CVE"/>
		<reference ref_id="CVE-2018-1129" ref_url="https://www.suse.com/security/cve/CVE-2018-1129/" source="CVE"/>
		<reference ref_id="CVE-2018-7262" ref_url="https://www.suse.com/security/cve/CVE-2018-7262/" source="CVE"/>
		<description>
These are all security issues fixed in the ceph-common-12.2.8+git.1536505967.080f2248ff-2.15.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16818/">CVE-2017-16818</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10861/">CVE-2018-10861</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-1128/">CVE-2018-1128</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1129/">CVE-2018-1129</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-7262/">CVE-2018-7262</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512053" comment="ceph-common-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512054" comment="libcephfs2-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512055" comment="librados2-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512056" comment="libradosstriper1-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512057" comment="librbd1-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512058" comment="librgw2-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512059" comment="python-cephfs-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512060" comment="python-rados-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512061" comment="python-rbd-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512062" comment="python-rgw-12.2.8+git.1536505967.080f2248ff-2.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76830" version="1" class="patch">
	<metadata>
		<title>cifs-utils-6.5-9.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2012-1586" ref_url="https://www.suse.com/security/cve/CVE-2012-1586/" source="CVE"/>
		<description>
These are all security issues fixed in the cifs-utils-6.5-9.3.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1586/">CVE-2012-1586</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512063" comment="cifs-utils-6.5-9.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76831" version="1" class="patch">
	<metadata>
		<title>clamav-0.100.2-33.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<reference ref_id="CVE-2011-2721" ref_url="https://www.suse.com/security/cve/CVE-2011-2721/" source="CVE"/>
		<reference ref_id="CVE-2011-3627" ref_url="https://www.suse.com/security/cve/CVE-2011-3627/" source="CVE"/>
		<reference ref_id="CVE-2012-1457" ref_url="https://www.suse.com/security/cve/CVE-2012-1457/" source="CVE"/>
		<reference ref_id="CVE-2012-1458" ref_url="https://www.suse.com/security/cve/CVE-2012-1458/" source="CVE"/>
		<reference ref_id="CVE-2012-1459" ref_url="https://www.suse.com/security/cve/CVE-2012-1459/" source="CVE"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="CVE-2013-6497" ref_url="https://www.suse.com/security/cve/CVE-2013-6497/" source="CVE"/>
		<reference ref_id="CVE-2014-9050" ref_url="https://www.suse.com/security/cve/CVE-2014-9050/" source="CVE"/>
		<reference ref_id="CVE-2014-9328" ref_url="https://www.suse.com/security/cve/CVE-2014-9328/" source="CVE"/>
		<reference ref_id="CVE-2015-1461" ref_url="https://www.suse.com/security/cve/CVE-2015-1461/" source="CVE"/>
		<reference ref_id="CVE-2015-1462" ref_url="https://www.suse.com/security/cve/CVE-2015-1462/" source="CVE"/>
		<reference ref_id="CVE-2015-1463" ref_url="https://www.suse.com/security/cve/CVE-2015-1463/" source="CVE"/>
		<reference ref_id="CVE-2015-2170" ref_url="https://www.suse.com/security/cve/CVE-2015-2170/" source="CVE"/>
		<reference ref_id="CVE-2015-2221" ref_url="https://www.suse.com/security/cve/CVE-2015-2221/" source="CVE"/>
		<reference ref_id="CVE-2015-2222" ref_url="https://www.suse.com/security/cve/CVE-2015-2222/" source="CVE"/>
		<reference ref_id="CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305/" source="CVE"/>
		<reference ref_id="CVE-2015-2668" ref_url="https://www.suse.com/security/cve/CVE-2015-2668/" source="CVE"/>
		<reference ref_id="CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423/" source="CVE"/>
		<reference ref_id="CVE-2017-12374" ref_url="https://www.suse.com/security/cve/CVE-2017-12374/" source="CVE"/>
		<reference ref_id="CVE-2017-12375" ref_url="https://www.suse.com/security/cve/CVE-2017-12375/" source="CVE"/>
		<reference ref_id="CVE-2017-12376" ref_url="https://www.suse.com/security/cve/CVE-2017-12376/" source="CVE"/>
		<reference ref_id="CVE-2017-12377" ref_url="https://www.suse.com/security/cve/CVE-2017-12377/" source="CVE"/>
		<reference ref_id="CVE-2017-12378" ref_url="https://www.suse.com/security/cve/CVE-2017-12378/" source="CVE"/>
		<reference ref_id="CVE-2017-12379" ref_url="https://www.suse.com/security/cve/CVE-2017-12379/" source="CVE"/>
		<reference ref_id="CVE-2017-12380" ref_url="https://www.suse.com/security/cve/CVE-2017-12380/" source="CVE"/>
		<reference ref_id="CVE-2017-6418" ref_url="https://www.suse.com/security/cve/CVE-2017-6418/" source="CVE"/>
		<reference ref_id="CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419/" source="CVE"/>
		<reference ref_id="CVE-2017-6420" ref_url="https://www.suse.com/security/cve/CVE-2017-6420/" source="CVE"/>
		<reference ref_id="CVE-2018-0202" ref_url="https://www.suse.com/security/cve/CVE-2018-0202/" source="CVE"/>
		<reference ref_id="CVE-2018-0360" ref_url="https://www.suse.com/security/cve/CVE-2018-0360/" source="CVE"/>
		<reference ref_id="CVE-2018-0361" ref_url="https://www.suse.com/security/cve/CVE-2018-0361/" source="CVE"/>
		<reference ref_id="CVE-2018-1000085" ref_url="https://www.suse.com/security/cve/CVE-2018-1000085/" source="CVE"/>
		<reference ref_id="CVE-2018-14680" ref_url="https://www.suse.com/security/cve/CVE-2018-14680/" source="CVE"/>
		<reference ref_id="CVE-2018-14681" ref_url="https://www.suse.com/security/cve/CVE-2018-14681/" source="CVE"/>
		<reference ref_id="CVE-2018-14682" ref_url="https://www.suse.com/security/cve/CVE-2018-14682/" source="CVE"/>
		<reference ref_id="CVE-2018-15378" ref_url="https://www.suse.com/security/cve/CVE-2018-15378/" source="CVE"/>
		<description>
These are all security issues fixed in the clamav-0.100.2-33.18.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2721/">CVE-2011-2721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3627/">CVE-2011-3627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1457/">CVE-2012-1457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1458/">CVE-2012-1458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1459/">CVE-2012-1459</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6497/">CVE-2013-6497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9050/">CVE-2014-9050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9328/">CVE-2014-9328</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1461/">CVE-2015-1461</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1462/">CVE-2015-1462</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1463/">CVE-2015-1463</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2170/">CVE-2015-2170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2221/">CVE-2015-2221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2222/">CVE-2015-2222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2668/">CVE-2015-2668</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12374/">CVE-2017-12374</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12375/">CVE-2017-12375</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12376/">CVE-2017-12376</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12377/">CVE-2017-12377</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12378/">CVE-2017-12378</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12379/">CVE-2017-12379</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12380/">CVE-2017-12380</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6418/">CVE-2017-6418</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6420/">CVE-2017-6420</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0202/">CVE-2018-0202</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0360/">CVE-2018-0360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0361/">CVE-2018-0361</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000085/">CVE-2018-1000085</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14680/">CVE-2018-14680</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14681/">CVE-2018-14681</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14682/">CVE-2018-14682</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15378/">CVE-2018-15378</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512064" comment="clamav-0.100.2-33.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76832" version="1" class="patch">
	<metadata>
		<title>colord-1.3.3-12.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-4349" ref_url="https://www.suse.com/security/cve/CVE-2011-4349/" source="CVE"/>
		<description>
These are all security issues fixed in the colord-1.3.3-12.13 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4349/">CVE-2011-4349</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159627" comment="colord-1.3.3-12.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140490" comment="colord-gtk-lang-0.1.26-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159628" comment="colord-lang-1.3.3-12.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140491" comment="libcolord-gtk1-0.1.26-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158945" comment="libcolord2-1.3.3-12.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158946" comment="libcolord2-32bit-1.3.3-12.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158947" comment="libcolorhug2-1.3.3-12.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76833" version="1" class="patch">
	<metadata>
		<title>coolkey-1.1.0-148.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-4129" ref_url="https://www.suse.com/security/cve/CVE-2007-4129/" source="CVE"/>
		<description>
These are all security issues fixed in the coolkey-1.1.0-148.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4129/">CVE-2007-4129</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512065" comment="coolkey-1.1.0-148.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76834" version="1" class="patch">
	<metadata>
		<title>coreutils-8.25-13.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-0221" ref_url="https://www.suse.com/security/cve/CVE-2013-0221/" source="CVE"/>
		<reference ref_id="CVE-2013-0222" ref_url="https://www.suse.com/security/cve/CVE-2013-0222/" source="CVE"/>
		<reference ref_id="CVE-2013-0223" ref_url="https://www.suse.com/security/cve/CVE-2013-0223/" source="CVE"/>
		<reference ref_id="CVE-2015-4041" ref_url="https://www.suse.com/security/cve/CVE-2015-4041/" source="CVE"/>
		<reference ref_id="CVE-2015-4042" ref_url="https://www.suse.com/security/cve/CVE-2015-4042/" source="CVE"/>
		<description>
These are all security issues fixed in the coreutils-8.25-13.7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0221/">CVE-2013-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0222/">CVE-2013-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0223/">CVE-2013-0223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4041/">CVE-2015-4041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4042/">CVE-2015-4042</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512066" comment="coreutils-8.25-13.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512067" comment="coreutils-lang-8.25-13.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76835" version="1" class="patch">
	<metadata>
		<title>cpio-2.11-36.3.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-0624" ref_url="https://www.suse.com/security/cve/CVE-2010-0624/" source="CVE"/>
		<reference ref_id="CVE-2014-9112" ref_url="https://www.suse.com/security/cve/CVE-2014-9112/" source="CVE"/>
		<reference ref_id="CVE-2016-2037" ref_url="https://www.suse.com/security/cve/CVE-2016-2037/" source="CVE"/>
		<description>
These are all security issues fixed in the cpio-2.11-36.3.4 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0624/">CVE-2010-0624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9112/">CVE-2014-9112</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-2037/">CVE-2016-2037</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512068" comment="cpio-2.11-36.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512069" comment="cpio-lang-2.11-36.3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76836" version="1" class="patch">
	<metadata>
		<title>cpp48-4.8.5-31.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-5044" ref_url="https://www.suse.com/security/cve/CVE-2014-5044/" source="CVE"/>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<reference ref_id="CVE-2017-11671" ref_url="https://www.suse.com/security/cve/CVE-2017-11671/" source="CVE"/>
		<description>
These are all security issues fixed in the cpp48-4.8.5-31.17.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5044/">CVE-2014-5044</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-11671/">CVE-2017-11671</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512070" comment="cpp48-4.8.5-31.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512071" comment="gcc48-4.8.5-31.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512072" comment="gcc48-32bit-4.8.5-31.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512073" comment="gcc48-c++-4.8.5-31.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512074" comment="gcc48-gij-4.8.5-31.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512075" comment="gcc48-gij-32bit-4.8.5-31.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512076" comment="gcc48-info-4.8.5-31.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512077" comment="libasan0-4.8.5-31.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512078" comment="libasan0-32bit-4.8.5-31.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512079" comment="libgcj48-4.8.5-31.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512080" comment="libgcj48-32bit-4.8.5-31.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512081" comment="libgcj48-jar-4.8.5-31.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512082" comment="libgcj_bc1-4.8.5-31.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512083" comment="libstdc++48-devel-4.8.5-31.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512084" comment="libstdc++48-devel-32bit-4.8.5-31.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76837" version="1" class="patch">
	<metadata>
		<title>cracklib-2.9.0-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-6318" ref_url="https://www.suse.com/security/cve/CVE-2016-6318/" source="CVE"/>
		<description>
These are all security issues fixed in the cracklib-2.9.0-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6318/">CVE-2016-6318</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130930" comment="cracklib-2.9.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131013" comment="libcrack2-2.9.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131014" comment="libcrack2-32bit-2.9.0-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76838" version="1" class="patch">
	<metadata>
		<title>cron-4.2-58.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-2607" ref_url="https://www.suse.com/security/cve/CVE-2006-2607/" source="CVE"/>
		<reference ref_id="CVE-2010-0424" ref_url="https://www.suse.com/security/cve/CVE-2010-0424/" source="CVE"/>
		<description>
These are all security issues fixed in the cron-4.2-58.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2607/">CVE-2006-2607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0424/">CVE-2010-0424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140508" comment="cron-4.2-58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140509" comment="cronie-1.4.11-58.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76839" version="1" class="patch">
	<metadata>
		<title>ctags-5.8-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-7204" ref_url="https://www.suse.com/security/cve/CVE-2014-7204/" source="CVE"/>
		<description>
These are all security issues fixed in the ctags-5.8-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7204/">CVE-2014-7204</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130995" comment="ctags-5.8-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76840" version="1" class="patch">
	<metadata>
		<title>cups-1.7.5-20.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0163" ref_url="https://www.suse.com/security/cve/CVE-2009-0163/" source="CVE"/>
		<reference ref_id="CVE-2009-2820" ref_url="https://www.suse.com/security/cve/CVE-2009-2820/" source="CVE"/>
		<reference ref_id="CVE-2009-3553" ref_url="https://www.suse.com/security/cve/CVE-2009-3553/" source="CVE"/>
		<reference ref_id="CVE-2010-0393" ref_url="https://www.suse.com/security/cve/CVE-2010-0393/" source="CVE"/>
		<reference ref_id="CVE-2010-0540" ref_url="https://www.suse.com/security/cve/CVE-2010-0540/" source="CVE"/>
		<reference ref_id="CVE-2010-0542" ref_url="https://www.suse.com/security/cve/CVE-2010-0542/" source="CVE"/>
		<reference ref_id="CVE-2010-1748" ref_url="https://www.suse.com/security/cve/CVE-2010-1748/" source="CVE"/>
		<reference ref_id="CVE-2010-2941" ref_url="https://www.suse.com/security/cve/CVE-2010-2941/" source="CVE"/>
		<reference ref_id="CVE-2012-5519" ref_url="https://www.suse.com/security/cve/CVE-2012-5519/" source="CVE"/>
		<reference ref_id="CVE-2012-6094" ref_url="https://www.suse.com/security/cve/CVE-2012-6094/" source="CVE"/>
		<reference ref_id="CVE-2014-2856" ref_url="https://www.suse.com/security/cve/CVE-2014-2856/" source="CVE"/>
		<reference ref_id="CVE-2014-3537" ref_url="https://www.suse.com/security/cve/CVE-2014-3537/" source="CVE"/>
		<reference ref_id="CVE-2014-5029" ref_url="https://www.suse.com/security/cve/CVE-2014-5029/" source="CVE"/>
		<reference ref_id="CVE-2014-5030" ref_url="https://www.suse.com/security/cve/CVE-2014-5030/" source="CVE"/>
		<reference ref_id="CVE-2014-5031" ref_url="https://www.suse.com/security/cve/CVE-2014-5031/" source="CVE"/>
		<reference ref_id="CVE-2014-9679" ref_url="https://www.suse.com/security/cve/CVE-2014-9679/" source="CVE"/>
		<reference ref_id="CVE-2015-1158" ref_url="https://www.suse.com/security/cve/CVE-2015-1158/" source="CVE"/>
		<reference ref_id="CVE-2015-1159" ref_url="https://www.suse.com/security/cve/CVE-2015-1159/" source="CVE"/>
		<reference ref_id="CVE-2017-18190" ref_url="https://www.suse.com/security/cve/CVE-2017-18190/" source="CVE"/>
		<reference ref_id="CVE-2017-18248" ref_url="https://www.suse.com/security/cve/CVE-2017-18248/" source="CVE"/>
		<reference ref_id="CVE-2018-4180" ref_url="https://www.suse.com/security/cve/CVE-2018-4180/" source="CVE"/>
		<reference ref_id="CVE-2018-4181" ref_url="https://www.suse.com/security/cve/CVE-2018-4181/" source="CVE"/>
		<reference ref_id="CVE-2018-4182" ref_url="https://www.suse.com/security/cve/CVE-2018-4182/" source="CVE"/>
		<reference ref_id="CVE-2018-4183" ref_url="https://www.suse.com/security/cve/CVE-2018-4183/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-1.7.5-20.17.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0163/">CVE-2009-0163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2820/">CVE-2009-2820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3553/">CVE-2009-3553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0393/">CVE-2010-0393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0540/">CVE-2010-0540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0542/">CVE-2010-0542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1748/">CVE-2010-1748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2941/">CVE-2010-2941</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5519/">CVE-2012-5519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6094/">CVE-2012-6094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2856/">CVE-2014-2856</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3537/">CVE-2014-3537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5029/">CVE-2014-5029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5030/">CVE-2014-5030</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5031/">CVE-2014-5031</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9679/">CVE-2014-9679</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1158/">CVE-2015-1158</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1159/">CVE-2015-1159</cve>
	<cve impact="important" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18190/">CVE-2017-18190</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18248/">CVE-2017-18248</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4180/">CVE-2018-4180</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4181/">CVE-2018-4181</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4182/">CVE-2018-4182</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4183/">CVE-2018-4183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512085" comment="cups-1.7.5-20.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512086" comment="cups-client-1.7.5-20.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512087" comment="cups-libs-1.7.5-20.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512088" comment="cups-libs-32bit-1.7.5-20.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76841" version="1" class="patch">
	<metadata>
		<title>cups-filters-1.0.58-19.2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-6473" ref_url="https://www.suse.com/security/cve/CVE-2013-6473/" source="CVE"/>
		<reference ref_id="CVE-2013-6474" ref_url="https://www.suse.com/security/cve/CVE-2013-6474/" source="CVE"/>
		<reference ref_id="CVE-2013-6475" ref_url="https://www.suse.com/security/cve/CVE-2013-6475/" source="CVE"/>
		<reference ref_id="CVE-2013-6476" ref_url="https://www.suse.com/security/cve/CVE-2013-6476/" source="CVE"/>
		<reference ref_id="CVE-2014-2707" ref_url="https://www.suse.com/security/cve/CVE-2014-2707/" source="CVE"/>
		<reference ref_id="CVE-2014-4336" ref_url="https://www.suse.com/security/cve/CVE-2014-4336/" source="CVE"/>
		<reference ref_id="CVE-2014-4337" ref_url="https://www.suse.com/security/cve/CVE-2014-4337/" source="CVE"/>
		<reference ref_id="CVE-2014-4338" ref_url="https://www.suse.com/security/cve/CVE-2014-4338/" source="CVE"/>
		<reference ref_id="CVE-2015-2265" ref_url="https://www.suse.com/security/cve/CVE-2015-2265/" source="CVE"/>
		<reference ref_id="CVE-2015-3258" ref_url="https://www.suse.com/security/cve/CVE-2015-3258/" source="CVE"/>
		<reference ref_id="CVE-2015-3279" ref_url="https://www.suse.com/security/cve/CVE-2015-3279/" source="CVE"/>
		<reference ref_id="CVE-2015-8327" ref_url="https://www.suse.com/security/cve/CVE-2015-8327/" source="CVE"/>
		<reference ref_id="CVE-2015-8560" ref_url="https://www.suse.com/security/cve/CVE-2015-8560/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-filters-1.0.58-19.2.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6473/">CVE-2013-6473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6474/">CVE-2013-6474</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6475/">CVE-2013-6475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6476/">CVE-2013-6476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2707/">CVE-2014-2707</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4336/">CVE-2014-4336</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4337/">CVE-2014-4337</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4338/">CVE-2014-4338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2265/">CVE-2015-2265</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3258/">CVE-2015-3258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3279/">CVE-2015-3279</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8327/">CVE-2015-8327</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8560/">CVE-2015-8560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512089" comment="cups-filters-1.0.58-19.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512090" comment="cups-filters-cups-browsed-1.0.58-19.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512091" comment="cups-filters-foomatic-rip-1.0.58-19.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512092" comment="cups-filters-ghostscript-1.0.58-19.2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76842" version="1" class="patch">
	<metadata>
		<title>cups-pk-helper-0.2.5-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-4510" ref_url="https://www.suse.com/security/cve/CVE-2012-4510/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-pk-helper-0.2.5-5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4510/">CVE-2012-4510</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009138209" comment="cups-pk-helper-0.2.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009138210" comment="cups-pk-helper-lang-0.2.5-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76843" version="1" class="patch">
	<metadata>
		<title>curl-7.60.0-2.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0037" ref_url="https://www.suse.com/security/cve/CVE-2009-0037/" source="CVE"/>
		<reference ref_id="CVE-2009-2417" ref_url="https://www.suse.com/security/cve/CVE-2009-2417/" source="CVE"/>
		<reference ref_id="CVE-2013-0249" ref_url="https://www.suse.com/security/cve/CVE-2013-0249/" source="CVE"/>
		<reference ref_id="CVE-2013-1944" ref_url="https://www.suse.com/security/cve/CVE-2013-1944/" source="CVE"/>
		<reference ref_id="CVE-2013-2174" ref_url="https://www.suse.com/security/cve/CVE-2013-2174/" source="CVE"/>
		<reference ref_id="CVE-2013-4545" ref_url="https://www.suse.com/security/cve/CVE-2013-4545/" source="CVE"/>
		<reference ref_id="CVE-2014-0015" ref_url="https://www.suse.com/security/cve/CVE-2014-0015/" source="CVE"/>
		<reference ref_id="CVE-2014-0138" ref_url="https://www.suse.com/security/cve/CVE-2014-0138/" source="CVE"/>
		<reference ref_id="CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139/" source="CVE"/>
		<reference ref_id="CVE-2014-3613" ref_url="https://www.suse.com/security/cve/CVE-2014-3613/" source="CVE"/>
		<reference ref_id="CVE-2014-3620" ref_url="https://www.suse.com/security/cve/CVE-2014-3620/" source="CVE"/>
		<reference ref_id="CVE-2014-3707" ref_url="https://www.suse.com/security/cve/CVE-2014-3707/" source="CVE"/>
		<reference ref_id="CVE-2014-8150" ref_url="https://www.suse.com/security/cve/CVE-2014-8150/" source="CVE"/>
		<reference ref_id="CVE-2015-3143" ref_url="https://www.suse.com/security/cve/CVE-2015-3143/" source="CVE"/>
		<reference ref_id="CVE-2015-3144" ref_url="https://www.suse.com/security/cve/CVE-2015-3144/" source="CVE"/>
		<reference ref_id="CVE-2015-3145" ref_url="https://www.suse.com/security/cve/CVE-2015-3145/" source="CVE"/>
		<reference ref_id="CVE-2015-3148" ref_url="https://www.suse.com/security/cve/CVE-2015-3148/" source="CVE"/>
		<reference ref_id="CVE-2015-3153" ref_url="https://www.suse.com/security/cve/CVE-2015-3153/" source="CVE"/>
		<reference ref_id="CVE-2015-3236" ref_url="https://www.suse.com/security/cve/CVE-2015-3236/" source="CVE"/>
		<reference ref_id="CVE-2015-3237" ref_url="https://www.suse.com/security/cve/CVE-2015-3237/" source="CVE"/>
		<reference ref_id="CVE-2016-0755" ref_url="https://www.suse.com/security/cve/CVE-2016-0755/" source="CVE"/>
		<reference ref_id="CVE-2016-5419" ref_url="https://www.suse.com/security/cve/CVE-2016-5419/" source="CVE"/>
		<reference ref_id="CVE-2016-5420" ref_url="https://www.suse.com/security/cve/CVE-2016-5420/" source="CVE"/>
		<reference ref_id="CVE-2016-5421" ref_url="https://www.suse.com/security/cve/CVE-2016-5421/" source="CVE"/>
		<reference ref_id="CVE-2016-7141" ref_url="https://www.suse.com/security/cve/CVE-2016-7141/" source="CVE"/>
		<reference ref_id="CVE-2016-7167" ref_url="https://www.suse.com/security/cve/CVE-2016-7167/" source="CVE"/>
		<reference ref_id="CVE-2016-8615" ref_url="https://www.suse.com/security/cve/CVE-2016-8615/" source="CVE"/>
		<reference ref_id="CVE-2016-8616" ref_url="https://www.suse.com/security/cve/CVE-2016-8616/" source="CVE"/>
		<reference ref_id="CVE-2016-8617" ref_url="https://www.suse.com/security/cve/CVE-2016-8617/" source="CVE"/>
		<reference ref_id="CVE-2016-8618" ref_url="https://www.suse.com/security/cve/CVE-2016-8618/" source="CVE"/>
		<reference ref_id="CVE-2016-8619" ref_url="https://www.suse.com/security/cve/CVE-2016-8619/" source="CVE"/>
		<reference ref_id="CVE-2016-8620" ref_url="https://www.suse.com/security/cve/CVE-2016-8620/" source="CVE"/>
		<reference ref_id="CVE-2016-8621" ref_url="https://www.suse.com/security/cve/CVE-2016-8621/" source="CVE"/>
		<reference ref_id="CVE-2016-8622" ref_url="https://www.suse.com/security/cve/CVE-2016-8622/" source="CVE"/>
		<reference ref_id="CVE-2016-8623" ref_url="https://www.suse.com/security/cve/CVE-2016-8623/" source="CVE"/>
		<reference ref_id="CVE-2016-8624" ref_url="https://www.suse.com/security/cve/CVE-2016-8624/" source="CVE"/>
		<reference ref_id="CVE-2016-8625" ref_url="https://www.suse.com/security/cve/CVE-2016-8625/" source="CVE"/>
		<reference ref_id="CVE-2016-9586" ref_url="https://www.suse.com/security/cve/CVE-2016-9586/" source="CVE"/>
		<reference ref_id="CVE-2016-9594" ref_url="https://www.suse.com/security/cve/CVE-2016-9594/" source="CVE"/>
		<reference ref_id="CVE-2017-1000099" ref_url="https://www.suse.com/security/cve/CVE-2017-1000099/" source="CVE"/>
		<reference ref_id="CVE-2017-1000100" ref_url="https://www.suse.com/security/cve/CVE-2017-1000100/" source="CVE"/>
		<reference ref_id="CVE-2017-1000101" ref_url="https://www.suse.com/security/cve/CVE-2017-1000101/" source="CVE"/>
		<reference ref_id="CVE-2017-1000254" ref_url="https://www.suse.com/security/cve/CVE-2017-1000254/" source="CVE"/>
		<reference ref_id="CVE-2017-1000257" ref_url="https://www.suse.com/security/cve/CVE-2017-1000257/" source="CVE"/>
		<reference ref_id="CVE-2017-2629" ref_url="https://www.suse.com/security/cve/CVE-2017-2629/" source="CVE"/>
		<reference ref_id="CVE-2017-7407" ref_url="https://www.suse.com/security/cve/CVE-2017-7407/" source="CVE"/>
		<reference ref_id="CVE-2017-7468" ref_url="https://www.suse.com/security/cve/CVE-2017-7468/" source="CVE"/>
		<reference ref_id="CVE-2017-8816" ref_url="https://www.suse.com/security/cve/CVE-2017-8816/" source="CVE"/>
		<reference ref_id="CVE-2017-8817" ref_url="https://www.suse.com/security/cve/CVE-2017-8817/" source="CVE"/>
		<reference ref_id="CVE-2017-8818" ref_url="https://www.suse.com/security/cve/CVE-2017-8818/" source="CVE"/>
		<reference ref_id="CVE-2017-9502" ref_url="https://www.suse.com/security/cve/CVE-2017-9502/" source="CVE"/>
		<reference ref_id="CVE-2018-0500" ref_url="https://www.suse.com/security/cve/CVE-2018-0500/" source="CVE"/>
		<reference ref_id="CVE-2018-1000005" ref_url="https://www.suse.com/security/cve/CVE-2018-1000005/" source="CVE"/>
		<reference ref_id="CVE-2018-1000007" ref_url="https://www.suse.com/security/cve/CVE-2018-1000007/" source="CVE"/>
		<reference ref_id="CVE-2018-1000120" ref_url="https://www.suse.com/security/cve/CVE-2018-1000120/" source="CVE"/>
		<reference ref_id="CVE-2018-1000121" ref_url="https://www.suse.com/security/cve/CVE-2018-1000121/" source="CVE"/>
		<reference ref_id="CVE-2018-1000122" ref_url="https://www.suse.com/security/cve/CVE-2018-1000122/" source="CVE"/>
		<reference ref_id="CVE-2018-1000300" ref_url="https://www.suse.com/security/cve/CVE-2018-1000300/" source="CVE"/>
		<reference ref_id="CVE-2018-1000301" ref_url="https://www.suse.com/security/cve/CVE-2018-1000301/" source="CVE"/>
		<reference ref_id="CVE-2018-14618" ref_url="https://www.suse.com/security/cve/CVE-2018-14618/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-7.60.0-2.11 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0037/">CVE-2009-0037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2417/">CVE-2009-2417</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0249/">CVE-2013-0249</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1944/">CVE-2013-1944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2174/">CVE-2013-2174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4545/">CVE-2013-4545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0015/">CVE-2014-0015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0138/">CVE-2014-0138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3613/">CVE-2014-3613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3620/">CVE-2014-3620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3707/">CVE-2014-3707</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8150/">CVE-2014-8150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3143/">CVE-2015-3143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3144/">CVE-2015-3144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3145/">CVE-2015-3145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3148/">CVE-2015-3148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3153/">CVE-2015-3153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3236/">CVE-2015-3236</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3237/">CVE-2015-3237</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0755/">CVE-2016-0755</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5419/">CVE-2016-5419</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5420/">CVE-2016-5420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5421/">CVE-2016-5421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7141/">CVE-2016-7141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7167/">CVE-2016-7167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8615/">CVE-2016-8615</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8616/">CVE-2016-8616</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8617/">CVE-2016-8617</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-8618/">CVE-2016-8618</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8619/">CVE-2016-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8620/">CVE-2016-8620</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-8621/">CVE-2016-8621</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8622/">CVE-2016-8622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8623/">CVE-2016-8623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8624/">CVE-2016-8624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8625/">CVE-2016-8625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9586/">CVE-2016-9586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9594/">CVE-2016-9594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000099/">CVE-2017-1000099</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000100/">CVE-2017-1000100</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000101/">CVE-2017-1000101</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000254/">CVE-2017-1000254</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000257/">CVE-2017-1000257</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2629/">CVE-2017-2629</cve>
	<cve impact="moderate" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7407/">CVE-2017-7407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7468/">CVE-2017-7468</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8816/">CVE-2017-8816</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-8817/">CVE-2017-8817</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-8818/">CVE-2017-8818</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-9502/">CVE-2017-9502</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-0500/">CVE-2018-0500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000005/">CVE-2018-1000005</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000007/">CVE-2018-1000007</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000120/">CVE-2018-1000120</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000121/">CVE-2018-1000121</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000122/">CVE-2018-1000122</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1000300/">CVE-2018-1000300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000301/">CVE-2018-1000301</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14618/">CVE-2018-14618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512093" comment="curl-7.60.0-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512094" comment="libcurl4-7.60.0-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512095" comment="libcurl4-32bit-7.60.0-2.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76844" version="1" class="patch">
	<metadata>
		<title>cvs-1.12.12-182.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-0804" ref_url="https://www.suse.com/security/cve/CVE-2012-0804/" source="CVE"/>
		<reference ref_id="CVE-2017-12836" ref_url="https://www.suse.com/security/cve/CVE-2017-12836/" source="CVE"/>
		<description>
These are all security issues fixed in the cvs-1.12.12-182.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0804/">CVE-2012-0804</cve>
	<cve impact="important" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12836/">CVE-2017-12836</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009163575" comment="cvs-1.12.12-182.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76845" version="1" class="patch">
	<metadata>
		<title>cyrus-sasl-2.1.26-8.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0688" ref_url="https://www.suse.com/security/cve/CVE-2009-0688/" source="CVE"/>
		<description>
These are all security issues fixed in the cyrus-sasl-2.1.26-8.7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0688/">CVE-2009-0688</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512096" comment="cyrus-sasl-2.1.26-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512097" comment="cyrus-sasl-32bit-2.1.26-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512098" comment="cyrus-sasl-crammd5-2.1.26-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512099" comment="cyrus-sasl-crammd5-32bit-2.1.26-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512100" comment="cyrus-sasl-digestmd5-2.1.26-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512101" comment="cyrus-sasl-digestmd5-32bit-2.1.26-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512102" comment="cyrus-sasl-gssapi-2.1.26-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512103" comment="cyrus-sasl-gssapi-32bit-2.1.26-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512104" comment="cyrus-sasl-plain-2.1.26-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512105" comment="cyrus-sasl-plain-32bit-2.1.26-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512106" comment="cyrus-sasl-saslauthd-2.1.26-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512107" comment="libsasl2-3-2.1.26-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512108" comment="libsasl2-3-32bit-2.1.26-8.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76846" version="1" class="patch">
	<metadata>
		<title>dbus-1-1.8.22-29.10.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-4352" ref_url="https://www.suse.com/security/cve/CVE-2010-4352/" source="CVE"/>
		<reference ref_id="CVE-2012-3524" ref_url="https://www.suse.com/security/cve/CVE-2012-3524/" source="CVE"/>
		<reference ref_id="CVE-2013-2168" ref_url="https://www.suse.com/security/cve/CVE-2013-2168/" source="CVE"/>
		<reference ref_id="CVE-2014-3477" ref_url="https://www.suse.com/security/cve/CVE-2014-3477/" source="CVE"/>
		<reference ref_id="CVE-2014-3532" ref_url="https://www.suse.com/security/cve/CVE-2014-3532/" source="CVE"/>
		<reference ref_id="CVE-2014-3533" ref_url="https://www.suse.com/security/cve/CVE-2014-3533/" source="CVE"/>
		<reference ref_id="CVE-2014-3635" ref_url="https://www.suse.com/security/cve/CVE-2014-3635/" source="CVE"/>
		<reference ref_id="CVE-2014-3636" ref_url="https://www.suse.com/security/cve/CVE-2014-3636/" source="CVE"/>
		<reference ref_id="CVE-2014-3637" ref_url="https://www.suse.com/security/cve/CVE-2014-3637/" source="CVE"/>
		<reference ref_id="CVE-2014-3638" ref_url="https://www.suse.com/security/cve/CVE-2014-3638/" source="CVE"/>
		<reference ref_id="CVE-2014-3639" ref_url="https://www.suse.com/security/cve/CVE-2014-3639/" source="CVE"/>
		<reference ref_id="CVE-2014-7824" ref_url="https://www.suse.com/security/cve/CVE-2014-7824/" source="CVE"/>
		<reference ref_id="CVE-2014-8148" ref_url="https://www.suse.com/security/cve/CVE-2014-8148/" source="CVE"/>
		<reference ref_id="CVE-2015-0245" ref_url="https://www.suse.com/security/cve/CVE-2015-0245/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-1.8.22-29.10.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4352/">CVE-2010-4352</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3524/">CVE-2012-3524</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2168/">CVE-2013-2168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3477/">CVE-2014-3477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3532/">CVE-2014-3532</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3533/">CVE-2014-3533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3635/">CVE-2014-3635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3636/">CVE-2014-3636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3637/">CVE-2014-3637</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3638/">CVE-2014-3638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3639/">CVE-2014-3639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7824/">CVE-2014-7824</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8148/">CVE-2014-8148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0245/">CVE-2015-0245</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512109" comment="dbus-1-1.8.22-29.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512110" comment="dbus-1-x11-1.8.22-29.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512111" comment="libdbus-1-3-1.8.22-29.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512112" comment="libdbus-1-3-32bit-1.8.22-29.10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76847" version="1" class="patch">
	<metadata>
		<title>dbus-1-glib-0.100.2-3.58 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-1172" ref_url="https://www.suse.com/security/cve/CVE-2010-1172/" source="CVE"/>
		<reference ref_id="CVE-2013-0292" ref_url="https://www.suse.com/security/cve/CVE-2013-0292/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-glib-0.100.2-3.58 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1172/">CVE-2010-1172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0292/">CVE-2013-0292</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140539" comment="dbus-1-glib-0.100.2-3.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140540" comment="dbus-1-glib-32bit-0.100.2-3.58 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76848" version="1" class="patch">
	<metadata>
		<title>dhcp-4.3.3-10.14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-1892" ref_url="https://www.suse.com/security/cve/CVE-2009-1892/" source="CVE"/>
		<reference ref_id="CVE-2010-2156" ref_url="https://www.suse.com/security/cve/CVE-2010-2156/" source="CVE"/>
		<reference ref_id="CVE-2010-3611" ref_url="https://www.suse.com/security/cve/CVE-2010-3611/" source="CVE"/>
		<reference ref_id="CVE-2010-3616" ref_url="https://www.suse.com/security/cve/CVE-2010-3616/" source="CVE"/>
		<reference ref_id="CVE-2011-0413" ref_url="https://www.suse.com/security/cve/CVE-2011-0413/" source="CVE"/>
		<reference ref_id="CVE-2011-0997" ref_url="https://www.suse.com/security/cve/CVE-2011-0997/" source="CVE"/>
		<reference ref_id="CVE-2011-2748" ref_url="https://www.suse.com/security/cve/CVE-2011-2748/" source="CVE"/>
		<reference ref_id="CVE-2011-2749" ref_url="https://www.suse.com/security/cve/CVE-2011-2749/" source="CVE"/>
		<reference ref_id="CVE-2011-4539" ref_url="https://www.suse.com/security/cve/CVE-2011-4539/" source="CVE"/>
		<reference ref_id="CVE-2011-4868" ref_url="https://www.suse.com/security/cve/CVE-2011-4868/" source="CVE"/>
		<reference ref_id="CVE-2012-3570" ref_url="https://www.suse.com/security/cve/CVE-2012-3570/" source="CVE"/>
		<reference ref_id="CVE-2012-3571" ref_url="https://www.suse.com/security/cve/CVE-2012-3571/" source="CVE"/>
		<reference ref_id="CVE-2012-3954" ref_url="https://www.suse.com/security/cve/CVE-2012-3954/" source="CVE"/>
		<reference ref_id="CVE-2012-3955" ref_url="https://www.suse.com/security/cve/CVE-2012-3955/" source="CVE"/>
		<reference ref_id="CVE-2013-2266" ref_url="https://www.suse.com/security/cve/CVE-2013-2266/" source="CVE"/>
		<reference ref_id="CVE-2015-8605" ref_url="https://www.suse.com/security/cve/CVE-2015-8605/" source="CVE"/>
		<reference ref_id="CVE-2017-3144" ref_url="https://www.suse.com/security/cve/CVE-2017-3144/" source="CVE"/>
		<reference ref_id="CVE-2018-5732" ref_url="https://www.suse.com/security/cve/CVE-2018-5732/" source="CVE"/>
		<reference ref_id="CVE-2018-5733" ref_url="https://www.suse.com/security/cve/CVE-2018-5733/" source="CVE"/>
		<description>
These are all security issues fixed in the dhcp-4.3.3-10.14.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1892/">CVE-2009-1892</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2156/">CVE-2010-2156</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3611/">CVE-2010-3611</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3616/">CVE-2010-3616</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0413/">CVE-2011-0413</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0997/">CVE-2011-0997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2748/">CVE-2011-2748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2749/">CVE-2011-2749</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4539/">CVE-2011-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4868/">CVE-2011-4868</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3570/">CVE-2012-3570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3571/">CVE-2012-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3954/">CVE-2012-3954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3955/">CVE-2012-3955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2266/">CVE-2013-2266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8605/">CVE-2015-8605</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3144/">CVE-2017-3144</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5732/">CVE-2018-5732</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5733/">CVE-2018-5733</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009173784" comment="dhcp-4.3.3-10.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009173785" comment="dhcp-client-4.3.3-10.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76849" version="1" class="patch">
	<metadata>
		<title>dia-0.97.3-15.63 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-5984" ref_url="https://www.suse.com/security/cve/CVE-2008-5984/" source="CVE"/>
		<description>
These are all security issues fixed in the dia-0.97.3-15.63 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5984/">CVE-2008-5984</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142087" comment="dia-0.97.3-15.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142088" comment="dia-lang-0.97.3-15.63 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76850" version="1" class="patch">
	<metadata>
		<title>dnsmasq-2.78-18.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-3294" ref_url="https://www.suse.com/security/cve/CVE-2015-3294/" source="CVE"/>
		<reference ref_id="CVE-2015-8899" ref_url="https://www.suse.com/security/cve/CVE-2015-8899/" source="CVE"/>
		<reference ref_id="CVE-2017-14491" ref_url="https://www.suse.com/security/cve/CVE-2017-14491/" source="CVE"/>
		<reference ref_id="CVE-2017-14492" ref_url="https://www.suse.com/security/cve/CVE-2017-14492/" source="CVE"/>
		<reference ref_id="CVE-2017-14493" ref_url="https://www.suse.com/security/cve/CVE-2017-14493/" source="CVE"/>
		<reference ref_id="CVE-2017-14494" ref_url="https://www.suse.com/security/cve/CVE-2017-14494/" source="CVE"/>
		<reference ref_id="CVE-2017-14495" ref_url="https://www.suse.com/security/cve/CVE-2017-14495/" source="CVE"/>
		<reference ref_id="CVE-2017-14496" ref_url="https://www.suse.com/security/cve/CVE-2017-14496/" source="CVE"/>
		<description>
These are all security issues fixed in the dnsmasq-2.78-18.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3294/">CVE-2015-3294</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8899/">CVE-2015-8899</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14491/">CVE-2017-14491</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14492/">CVE-2017-14492</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14493/">CVE-2017-14493</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14494/">CVE-2017-14494</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14495/">CVE-2017-14495</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-14496/">CVE-2017-14496</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009164846" comment="dnsmasq-2.78-18.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76851" version="1" class="patch">
	<metadata>
		<title>dosfstools-3.0.26-6.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-8872" ref_url="https://www.suse.com/security/cve/CVE-2015-8872/" source="CVE"/>
		<reference ref_id="CVE-2016-4804" ref_url="https://www.suse.com/security/cve/CVE-2016-4804/" source="CVE"/>
		<description>
These are all security issues fixed in the dosfstools-3.0.26-6.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8872/">CVE-2015-8872</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4804/">CVE-2016-4804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131020" comment="dosfstools-3.0.26-6.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76852" version="1" class="patch">
	<metadata>
		<title>dracut-044.1-9.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-4453" ref_url="https://www.suse.com/security/cve/CVE-2012-4453/" source="CVE"/>
		<reference ref_id="CVE-2016-8637" ref_url="https://www.suse.com/security/cve/CVE-2016-8637/" source="CVE"/>
		<description>
These are all security issues fixed in the dracut-044.1-9.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4453/">CVE-2012-4453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8637/">CVE-2016-8637</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512113" comment="dracut-044.1-9.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76853" version="1" class="patch">
	<metadata>
		<title>e2fsprogs-1.43.8-1.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-0247" ref_url="https://www.suse.com/security/cve/CVE-2015-0247/" source="CVE"/>
		<reference ref_id="CVE-2015-1572" ref_url="https://www.suse.com/security/cve/CVE-2015-1572/" source="CVE"/>
		<description>
These are all security issues fixed in the e2fsprogs-1.43.8-1.19 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-0247/">CVE-2015-0247</cve>
	<cve impact="low" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-1572/">CVE-2015-1572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512114" comment="e2fsprogs-1.43.8-1.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512115" comment="libcom_err2-1.43.8-1.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512116" comment="libcom_err2-32bit-1.43.8-1.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512117" comment="libext2fs2-1.43.8-1.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76854" version="1" class="patch">
	<metadata>
		<title>ecryptfs-utils-103-8.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-1831" ref_url="https://www.suse.com/security/cve/CVE-2011-1831/" source="CVE"/>
		<reference ref_id="CVE-2011-1832" ref_url="https://www.suse.com/security/cve/CVE-2011-1832/" source="CVE"/>
		<reference ref_id="CVE-2011-1833" ref_url="https://www.suse.com/security/cve/CVE-2011-1833/" source="CVE"/>
		<reference ref_id="CVE-2011-1834" ref_url="https://www.suse.com/security/cve/CVE-2011-1834/" source="CVE"/>
		<reference ref_id="CVE-2011-1835" ref_url="https://www.suse.com/security/cve/CVE-2011-1835/" source="CVE"/>
		<reference ref_id="CVE-2011-1836" ref_url="https://www.suse.com/security/cve/CVE-2011-1836/" source="CVE"/>
		<reference ref_id="CVE-2011-1837" ref_url="https://www.suse.com/security/cve/CVE-2011-1837/" source="CVE"/>
		<reference ref_id="CVE-2014-9687" ref_url="https://www.suse.com/security/cve/CVE-2014-9687/" source="CVE"/>
		<reference ref_id="CVE-2015-8946" ref_url="https://www.suse.com/security/cve/CVE-2015-8946/" source="CVE"/>
		<reference ref_id="CVE-2016-1572" ref_url="https://www.suse.com/security/cve/CVE-2016-1572/" source="CVE"/>
		<reference ref_id="CVE-2016-6224" ref_url="https://www.suse.com/security/cve/CVE-2016-6224/" source="CVE"/>
		<description>
These are all security issues fixed in the ecryptfs-utils-103-8.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1831/">CVE-2011-1831</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1832/">CVE-2011-1832</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1833/">CVE-2011-1833</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1834/">CVE-2011-1834</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1835/">CVE-2011-1835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1836/">CVE-2011-1836</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1837/">CVE-2011-1837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9687/">CVE-2014-9687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8946/">CVE-2015-8946</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1572/">CVE-2016-1572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6224/">CVE-2016-6224</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009170839" comment="ecryptfs-utils-103-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009170840" comment="ecryptfs-utils-32bit-103-8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76855" version="1" class="patch">
	<metadata>
		<title>elfutils-0.158-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-0172" ref_url="https://www.suse.com/security/cve/CVE-2014-0172/" source="CVE"/>
		<reference ref_id="CVE-2014-9447" ref_url="https://www.suse.com/security/cve/CVE-2014-9447/" source="CVE"/>
		<description>
These are all security issues fixed in the elfutils-0.158-6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0172/">CVE-2014-0172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9447/">CVE-2014-9447</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106094" comment="elfutils-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106096" comment="libasm1-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106099" comment="libdw1-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106100" comment="libdw1-32bit-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106102" comment="libebl1-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106103" comment="libebl1-32bit-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106104" comment="libelf-devel-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106106" comment="libelf1-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106107" comment="libelf1-32bit-0.158-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76856" version="1" class="patch">
	<metadata>
		<title>emacs-24.3-25.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-0035" ref_url="https://www.suse.com/security/cve/CVE-2012-0035/" source="CVE"/>
		<reference ref_id="CVE-2014-3421" ref_url="https://www.suse.com/security/cve/CVE-2014-3421/" source="CVE"/>
		<reference ref_id="CVE-2014-3422" ref_url="https://www.suse.com/security/cve/CVE-2014-3422/" source="CVE"/>
		<reference ref_id="CVE-2014-3423" ref_url="https://www.suse.com/security/cve/CVE-2014-3423/" source="CVE"/>
		<reference ref_id="CVE-2014-3424" ref_url="https://www.suse.com/security/cve/CVE-2014-3424/" source="CVE"/>
		<description>
These are all security issues fixed in the emacs-24.3-25.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0035/">CVE-2012-0035</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3421/">CVE-2014-3421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3422/">CVE-2014-3422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3423/">CVE-2014-3423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3424/">CVE-2014-3424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009164489" comment="emacs-24.3-25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009164490" comment="emacs-info-24.3-25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009164491" comment="emacs-x11-24.3-25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009164492" comment="etags-24.3-25.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76857" version="1" class="patch">
	<metadata>
		<title>empathy-3.12.13-8.3.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-3635" ref_url="https://www.suse.com/security/cve/CVE-2011-3635/" source="CVE"/>
		<description>
These are all security issues fixed in the empathy-3.12.13-8.3.28 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3635/">CVE-2011-3635</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512118" comment="empathy-3.12.13-8.3.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512119" comment="empathy-lang-3.12.13-8.3.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512120" comment="telepathy-mission-control-plugin-goa-3.12.13-8.3.28 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76858" version="1" class="patch">
	<metadata>
		<title>eog-3.20.4-7.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-7447" ref_url="https://www.suse.com/security/cve/CVE-2013-7447/" source="CVE"/>
		<reference ref_id="CVE-2016-6855" ref_url="https://www.suse.com/security/cve/CVE-2016-6855/" source="CVE"/>
		<description>
These are all security issues fixed in the eog-3.20.4-7.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7447/">CVE-2013-7447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6855/">CVE-2016-6855</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140555" comment="eog-3.20.4-7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140556" comment="eog-lang-3.20.4-7.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76859" version="1" class="patch">
	<metadata>
		<title>evince-3.20.2-6.22.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-2640" ref_url="https://www.suse.com/security/cve/CVE-2010-2640/" source="CVE"/>
		<reference ref_id="CVE-2010-2641" ref_url="https://www.suse.com/security/cve/CVE-2010-2641/" source="CVE"/>
		<reference ref_id="CVE-2010-2642" ref_url="https://www.suse.com/security/cve/CVE-2010-2642/" source="CVE"/>
		<reference ref_id="CVE-2010-2643" ref_url="https://www.suse.com/security/cve/CVE-2010-2643/" source="CVE"/>
		<reference ref_id="CVE-2017-1000083" ref_url="https://www.suse.com/security/cve/CVE-2017-1000083/" source="CVE"/>
		<description>
These are all security issues fixed in the evince-3.20.2-6.22.9 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2640/">CVE-2010-2640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2641/">CVE-2010-2641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2642/">CVE-2010-2642</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2643/">CVE-2010-2643</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000083/">CVE-2017-1000083</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009174438" comment="evince-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009174439" comment="evince-browser-plugin-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009174440" comment="evince-lang-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009174441" comment="evince-plugin-djvudocument-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009174442" comment="evince-plugin-dvidocument-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009174443" comment="evince-plugin-pdfdocument-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009174444" comment="evince-plugin-psdocument-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009174445" comment="evince-plugin-tiffdocument-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009174446" comment="evince-plugin-xpsdocument-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009174447" comment="libevdocument3-4-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009174448" comment="libevview3-3-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009174449" comment="nautilus-evince-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009174450" comment="typelib-1_0-EvinceDocument-3_0-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009174451" comment="typelib-1_0-EvinceView-3_0-3.20.2-6.22.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76860" version="1" class="patch">
	<metadata>
		<title>expat-2.1.0-21.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-2625" ref_url="https://www.suse.com/security/cve/CVE-2009-2625/" source="CVE"/>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<reference ref_id="CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876/" source="CVE"/>
		<reference ref_id="CVE-2012-1147" ref_url="https://www.suse.com/security/cve/CVE-2012-1147/" source="CVE"/>
		<reference ref_id="CVE-2012-1148" ref_url="https://www.suse.com/security/cve/CVE-2012-1148/" source="CVE"/>
		<reference ref_id="CVE-2012-6702" ref_url="https://www.suse.com/security/cve/CVE-2012-6702/" source="CVE"/>
		<reference ref_id="CVE-2015-1283" ref_url="https://www.suse.com/security/cve/CVE-2015-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<reference ref_id="CVE-2016-5300" ref_url="https://www.suse.com/security/cve/CVE-2016-5300/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2017-9233" ref_url="https://www.suse.com/security/cve/CVE-2017-9233/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.1.0-21.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2625/">CVE-2009-2625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1147/">CVE-2012-1147</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1148/">CVE-2012-1148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6702/">CVE-2012-6702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1283/">CVE-2015-1283</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5300/">CVE-2016-5300</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9233/">CVE-2017-9233</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009162480" comment="expat-2.1.0-21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009162481" comment="libexpat1-2.1.0-21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009162482" comment="libexpat1-32bit-2.1.0-21.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76861" version="1" class="patch">
	<metadata>
		<title>facter-2.4.6-12.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3248" ref_url="https://www.suse.com/security/cve/CVE-2014-3248/" source="CVE"/>
		<description>
These are all security issues fixed in the facter-2.4.6-12.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3248/">CVE-2014-3248</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512121" comment="facter-2.4.6-12.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76862" version="1" class="patch">
	<metadata>
		<title>fetchmail-6.3.26-12.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-2666" ref_url="https://www.suse.com/security/cve/CVE-2009-2666/" source="CVE"/>
		<reference ref_id="CVE-2010-1167" ref_url="https://www.suse.com/security/cve/CVE-2010-1167/" source="CVE"/>
		<reference ref_id="CVE-2011-1947" ref_url="https://www.suse.com/security/cve/CVE-2011-1947/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2012-3482" ref_url="https://www.suse.com/security/cve/CVE-2012-3482/" source="CVE"/>
		<description>
These are all security issues fixed in the fetchmail-6.3.26-12.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2666/">CVE-2009-2666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1167/">CVE-2010-1167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1947/">CVE-2011-1947</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3482/">CVE-2012-3482</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140569" comment="fetchmail-6.3.26-12.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76863" version="1" class="patch">
	<metadata>
		<title>file-5.22-10.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-1571" ref_url="https://www.suse.com/security/cve/CVE-2012-1571/" source="CVE"/>
		<reference ref_id="CVE-2014-3710" ref_url="https://www.suse.com/security/cve/CVE-2014-3710/" source="CVE"/>
		<reference ref_id="CVE-2014-8116" ref_url="https://www.suse.com/security/cve/CVE-2014-8116/" source="CVE"/>
		<reference ref_id="CVE-2014-8117" ref_url="https://www.suse.com/security/cve/CVE-2014-8117/" source="CVE"/>
		<reference ref_id="CVE-2014-9620" ref_url="https://www.suse.com/security/cve/CVE-2014-9620/" source="CVE"/>
		<reference ref_id="CVE-2014-9621" ref_url="https://www.suse.com/security/cve/CVE-2014-9621/" source="CVE"/>
		<reference ref_id="CVE-2014-9653" ref_url="https://www.suse.com/security/cve/CVE-2014-9653/" source="CVE"/>
		<description>
These are all security issues fixed in the file-5.22-10.6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1571/">CVE-2012-1571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3710/">CVE-2014-3710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8116/">CVE-2014-8116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8117/">CVE-2014-8117</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9620/">CVE-2014-9620</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9621/">CVE-2014-9621</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9653/">CVE-2014-9653</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512122" comment="file-5.22-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512123" comment="file-magic-5.22-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512124" comment="libmagic1-5.22-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512125" comment="libmagic1-32bit-5.22-10.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76864" version="1" class="patch">
	<metadata>
		<title>finch-2.12.0-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-2694" ref_url="https://www.suse.com/security/cve/CVE-2009-2694/" source="CVE"/>
		<reference ref_id="CVE-2009-2703" ref_url="https://www.suse.com/security/cve/CVE-2009-2703/" source="CVE"/>
		<reference ref_id="CVE-2009-3026" ref_url="https://www.suse.com/security/cve/CVE-2009-3026/" source="CVE"/>
		<reference ref_id="CVE-2009-3083" ref_url="https://www.suse.com/security/cve/CVE-2009-3083/" source="CVE"/>
		<reference ref_id="CVE-2009-3084" ref_url="https://www.suse.com/security/cve/CVE-2009-3084/" source="CVE"/>
		<reference ref_id="CVE-2009-3085" ref_url="https://www.suse.com/security/cve/CVE-2009-3085/" source="CVE"/>
		<reference ref_id="CVE-2009-3615" ref_url="https://www.suse.com/security/cve/CVE-2009-3615/" source="CVE"/>
		<reference ref_id="CVE-2010-0013" ref_url="https://www.suse.com/security/cve/CVE-2010-0013/" source="CVE"/>
		<reference ref_id="CVE-2010-0277" ref_url="https://www.suse.com/security/cve/CVE-2010-0277/" source="CVE"/>
		<reference ref_id="CVE-2010-0420" ref_url="https://www.suse.com/security/cve/CVE-2010-0420/" source="CVE"/>
		<reference ref_id="CVE-2010-0423" ref_url="https://www.suse.com/security/cve/CVE-2010-0423/" source="CVE"/>
		<reference ref_id="CVE-2010-1624" ref_url="https://www.suse.com/security/cve/CVE-2010-1624/" source="CVE"/>
		<reference ref_id="CVE-2010-2528" ref_url="https://www.suse.com/security/cve/CVE-2010-2528/" source="CVE"/>
		<reference ref_id="CVE-2010-3711" ref_url="https://www.suse.com/security/cve/CVE-2010-3711/" source="CVE"/>
		<reference ref_id="CVE-2011-1091" ref_url="https://www.suse.com/security/cve/CVE-2011-1091/" source="CVE"/>
		<reference ref_id="CVE-2011-3594" ref_url="https://www.suse.com/security/cve/CVE-2011-3594/" source="CVE"/>
		<reference ref_id="CVE-2012-2214" ref_url="https://www.suse.com/security/cve/CVE-2012-2214/" source="CVE"/>
		<reference ref_id="CVE-2012-3374" ref_url="https://www.suse.com/security/cve/CVE-2012-3374/" source="CVE"/>
		<reference ref_id="CVE-2012-6152" ref_url="https://www.suse.com/security/cve/CVE-2012-6152/" source="CVE"/>
		<reference ref_id="CVE-2013-0271" ref_url="https://www.suse.com/security/cve/CVE-2013-0271/" source="CVE"/>
		<reference ref_id="CVE-2013-0272" ref_url="https://www.suse.com/security/cve/CVE-2013-0272/" source="CVE"/>
		<reference ref_id="CVE-2013-0273" ref_url="https://www.suse.com/security/cve/CVE-2013-0273/" source="CVE"/>
		<reference ref_id="CVE-2013-0274" ref_url="https://www.suse.com/security/cve/CVE-2013-0274/" source="CVE"/>
		<reference ref_id="CVE-2013-6477" ref_url="https://www.suse.com/security/cve/CVE-2013-6477/" source="CVE"/>
		<reference ref_id="CVE-2013-6478" ref_url="https://www.suse.com/security/cve/CVE-2013-6478/" source="CVE"/>
		<reference ref_id="CVE-2013-6479" ref_url="https://www.suse.com/security/cve/CVE-2013-6479/" source="CVE"/>
		<reference ref_id="CVE-2013-6481" ref_url="https://www.suse.com/security/cve/CVE-2013-6481/" source="CVE"/>
		<reference ref_id="CVE-2013-6482" ref_url="https://www.suse.com/security/cve/CVE-2013-6482/" source="CVE"/>
		<reference ref_id="CVE-2013-6483" ref_url="https://www.suse.com/security/cve/CVE-2013-6483/" source="CVE"/>
		<reference ref_id="CVE-2013-6484" ref_url="https://www.suse.com/security/cve/CVE-2013-6484/" source="CVE"/>
		<reference ref_id="CVE-2013-6485" ref_url="https://www.suse.com/security/cve/CVE-2013-6485/" source="CVE"/>
		<reference ref_id="CVE-2013-6486" ref_url="https://www.suse.com/security/cve/CVE-2013-6486/" source="CVE"/>
		<reference ref_id="CVE-2013-6487" ref_url="https://www.suse.com/security/cve/CVE-2013-6487/" source="CVE"/>
		<reference ref_id="CVE-2014-0020" ref_url="https://www.suse.com/security/cve/CVE-2014-0020/" source="CVE"/>
		<reference ref_id="CVE-2014-3694" ref_url="https://www.suse.com/security/cve/CVE-2014-3694/" source="CVE"/>
		<reference ref_id="CVE-2014-3695" ref_url="https://www.suse.com/security/cve/CVE-2014-3695/" source="CVE"/>
		<reference ref_id="CVE-2014-3696" ref_url="https://www.suse.com/security/cve/CVE-2014-3696/" source="CVE"/>
		<reference ref_id="CVE-2014-3697" ref_url="https://www.suse.com/security/cve/CVE-2014-3697/" source="CVE"/>
		<reference ref_id="CVE-2014-3698" ref_url="https://www.suse.com/security/cve/CVE-2014-3698/" source="CVE"/>
		<reference ref_id="CVE-2017-2640" ref_url="https://www.suse.com/security/cve/CVE-2017-2640/" source="CVE"/>
		<description>
These are all security issues fixed in the finch-2.12.0-3.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2694/">CVE-2009-2694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2703/">CVE-2009-2703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3026/">CVE-2009-3026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3083/">CVE-2009-3083</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3084/">CVE-2009-3084</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3085/">CVE-2009-3085</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3615/">CVE-2009-3615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0013/">CVE-2010-0013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0277/">CVE-2010-0277</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0420/">CVE-2010-0420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0423/">CVE-2010-0423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1624/">CVE-2010-1624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2528/">CVE-2010-2528</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3711/">CVE-2010-3711</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1091/">CVE-2011-1091</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3594/">CVE-2011-3594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2214/">CVE-2012-2214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3374/">CVE-2012-3374</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6152/">CVE-2012-6152</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0271/">CVE-2013-0271</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0272/">CVE-2013-0272</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0273/">CVE-2013-0273</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0274/">CVE-2013-0274</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6477/">CVE-2013-6477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6478/">CVE-2013-6478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6479/">CVE-2013-6479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6481/">CVE-2013-6481</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6482/">CVE-2013-6482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6483/">CVE-2013-6483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6484/">CVE-2013-6484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6485/">CVE-2013-6485</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-6486/">CVE-2013-6486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6487/">CVE-2013-6487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0020/">CVE-2014-0020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3694/">CVE-2014-3694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3695/">CVE-2014-3695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3696/">CVE-2014-3696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3697/">CVE-2014-3697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3698/">CVE-2014-3698</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2640/">CVE-2017-2640</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512126" comment="finch-2.12.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512127" comment="libpurple-2.12.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512128" comment="libpurple-branding-upstream-2.12.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512129" comment="libpurple-lang-2.12.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512130" comment="libpurple-plugin-sametime-2.12.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512131" comment="libpurple-tcl-2.12.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512132" comment="pidgin-2.12.0-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76865" version="1" class="patch">
	<metadata>
		<title>fontconfig-2.11.1-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-5384" ref_url="https://www.suse.com/security/cve/CVE-2016-5384/" source="CVE"/>
		<description>
These are all security issues fixed in the fontconfig-2.11.1-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5384/">CVE-2016-5384</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140574" comment="fontconfig-2.11.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140575" comment="fontconfig-32bit-2.11.1-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76866" version="1" class="patch">
	<metadata>
		<title>freerdp-2.0.0~git.1463131968.4e66df7-12.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-0250" ref_url="https://www.suse.com/security/cve/CVE-2014-0250/" source="CVE"/>
		<reference ref_id="CVE-2014-0791" ref_url="https://www.suse.com/security/cve/CVE-2014-0791/" source="CVE"/>
		<reference ref_id="CVE-2017-2834" ref_url="https://www.suse.com/security/cve/CVE-2017-2834/" source="CVE"/>
		<reference ref_id="CVE-2017-2835" ref_url="https://www.suse.com/security/cve/CVE-2017-2835/" source="CVE"/>
		<reference ref_id="CVE-2017-2836" ref_url="https://www.suse.com/security/cve/CVE-2017-2836/" source="CVE"/>
		<reference ref_id="CVE-2017-2837" ref_url="https://www.suse.com/security/cve/CVE-2017-2837/" source="CVE"/>
		<reference ref_id="CVE-2017-2838" ref_url="https://www.suse.com/security/cve/CVE-2017-2838/" source="CVE"/>
		<reference ref_id="CVE-2017-2839" ref_url="https://www.suse.com/security/cve/CVE-2017-2839/" source="CVE"/>
		<description>
These are all security issues fixed in the freerdp-2.0.0~git.1463131968.4e66df7-12.3.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0250/">CVE-2014-0250</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0791/">CVE-2014-0791</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2834/">CVE-2017-2834</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2835/">CVE-2017-2835</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2836/">CVE-2017-2836</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2837/">CVE-2017-2837</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2838/">CVE-2017-2838</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2839/">CVE-2017-2839</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009162218" comment="freerdp-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009162219" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76867" version="1" class="patch">
	<metadata>
		<title>ft2demos-2.6.3-7.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0946" ref_url="https://www.suse.com/security/cve/CVE-2009-0946/" source="CVE"/>
		<reference ref_id="CVE-2010-2497" ref_url="https://www.suse.com/security/cve/CVE-2010-2497/" source="CVE"/>
		<reference ref_id="CVE-2010-2805" ref_url="https://www.suse.com/security/cve/CVE-2010-2805/" source="CVE"/>
		<reference ref_id="CVE-2010-3053" ref_url="https://www.suse.com/security/cve/CVE-2010-3053/" source="CVE"/>
		<reference ref_id="CVE-2010-3054" ref_url="https://www.suse.com/security/cve/CVE-2010-3054/" source="CVE"/>
		<reference ref_id="CVE-2010-3311" ref_url="https://www.suse.com/security/cve/CVE-2010-3311/" source="CVE"/>
		<reference ref_id="CVE-2010-3814" ref_url="https://www.suse.com/security/cve/CVE-2010-3814/" source="CVE"/>
		<reference ref_id="CVE-2011-0226" ref_url="https://www.suse.com/security/cve/CVE-2011-0226/" source="CVE"/>
		<reference ref_id="CVE-2012-5668" ref_url="https://www.suse.com/security/cve/CVE-2012-5668/" source="CVE"/>
		<reference ref_id="CVE-2012-5669" ref_url="https://www.suse.com/security/cve/CVE-2012-5669/" source="CVE"/>
		<reference ref_id="CVE-2012-5670" ref_url="https://www.suse.com/security/cve/CVE-2012-5670/" source="CVE"/>
		<reference ref_id="CVE-2014-2240" ref_url="https://www.suse.com/security/cve/CVE-2014-2240/" source="CVE"/>
		<reference ref_id="CVE-2014-9656" ref_url="https://www.suse.com/security/cve/CVE-2014-9656/" source="CVE"/>
		<reference ref_id="CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657/" source="CVE"/>
		<reference ref_id="CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658/" source="CVE"/>
		<reference ref_id="CVE-2014-9659" ref_url="https://www.suse.com/security/cve/CVE-2014-9659/" source="CVE"/>
		<reference ref_id="CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660/" source="CVE"/>
		<reference ref_id="CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661/" source="CVE"/>
		<reference ref_id="CVE-2014-9662" ref_url="https://www.suse.com/security/cve/CVE-2014-9662/" source="CVE"/>
		<reference ref_id="CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663/" source="CVE"/>
		<reference ref_id="CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664/" source="CVE"/>
		<reference ref_id="CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665/" source="CVE"/>
		<reference ref_id="CVE-2014-9666" ref_url="https://www.suse.com/security/cve/CVE-2014-9666/" source="CVE"/>
		<reference ref_id="CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667/" source="CVE"/>
		<reference ref_id="CVE-2014-9668" ref_url="https://www.suse.com/security/cve/CVE-2014-9668/" source="CVE"/>
		<reference ref_id="CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669/" source="CVE"/>
		<reference ref_id="CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670/" source="CVE"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<reference ref_id="CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672/" source="CVE"/>
		<reference ref_id="CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673/" source="CVE"/>
		<reference ref_id="CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674/" source="CVE"/>
		<reference ref_id="CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675/" source="CVE"/>
		<description>
These are all security issues fixed in the ft2demos-2.6.3-7.15.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0946/">CVE-2009-0946</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2497/">CVE-2010-2497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2805/">CVE-2010-2805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3053/">CVE-2010-3053</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3054/">CVE-2010-3054</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3311/">CVE-2010-3311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3814/">CVE-2010-3814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0226/">CVE-2011-0226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5668/">CVE-2012-5668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5669/">CVE-2012-5669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5670/">CVE-2012-5670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2240/">CVE-2014-2240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9656/">CVE-2014-9656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9659/">CVE-2014-9659</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9662/">CVE-2014-9662</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9666/">CVE-2014-9666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9668/">CVE-2014-9668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009171102" comment="ft2demos-2.6.3-7.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76868" version="1" class="patch">
	<metadata>
		<title>fuse-2.9.3-6.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-3297" ref_url="https://www.suse.com/security/cve/CVE-2009-3297/" source="CVE"/>
		<reference ref_id="CVE-2011-0541" ref_url="https://www.suse.com/security/cve/CVE-2011-0541/" source="CVE"/>
		<reference ref_id="CVE-2015-3202" ref_url="https://www.suse.com/security/cve/CVE-2015-3202/" source="CVE"/>
		<reference ref_id="CVE-2018-10906" ref_url="https://www.suse.com/security/cve/CVE-2018-10906/" source="CVE"/>
		<description>
These are all security issues fixed in the fuse-2.9.3-6.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3297/">CVE-2009-3297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0541/">CVE-2011-0541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3202/">CVE-2015-3202</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10906/">CVE-2018-10906</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512133" comment="fuse-2.9.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512134" comment="libfuse2-2.9.3-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76869" version="1" class="patch">
	<metadata>
		<title>g3utils-1.1.36-58.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2018-16741" ref_url="https://www.suse.com/security/cve/CVE-2018-16741/" source="CVE"/>
		<reference ref_id="CVE-2018-16742" ref_url="https://www.suse.com/security/cve/CVE-2018-16742/" source="CVE"/>
		<reference ref_id="CVE-2018-16743" ref_url="https://www.suse.com/security/cve/CVE-2018-16743/" source="CVE"/>
		<reference ref_id="CVE-2018-16744" ref_url="https://www.suse.com/security/cve/CVE-2018-16744/" source="CVE"/>
		<reference ref_id="CVE-2018-16745" ref_url="https://www.suse.com/security/cve/CVE-2018-16745/" source="CVE"/>
		<description>
These are all security issues fixed in the g3utils-1.1.36-58.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16741/">CVE-2018-16741</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16742/">CVE-2018-16742</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16743/">CVE-2018-16743</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16744/">CVE-2018-16744</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16745/">CVE-2018-16745</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512135" comment="g3utils-1.1.36-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512136" comment="mgetty-1.1.36-58.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76870" version="1" class="patch">
	<metadata>
		<title>gd-2.1.0-24.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-2497" ref_url="https://www.suse.com/security/cve/CVE-2014-2497/" source="CVE"/>
		<reference ref_id="CVE-2014-9709" ref_url="https://www.suse.com/security/cve/CVE-2014-9709/" source="CVE"/>
		<reference ref_id="CVE-2016-10166" ref_url="https://www.suse.com/security/cve/CVE-2016-10166/" source="CVE"/>
		<reference ref_id="CVE-2016-10167" ref_url="https://www.suse.com/security/cve/CVE-2016-10167/" source="CVE"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<reference ref_id="CVE-2016-5116" ref_url="https://www.suse.com/security/cve/CVE-2016-5116/" source="CVE"/>
		<reference ref_id="CVE-2016-6128" ref_url="https://www.suse.com/security/cve/CVE-2016-6128/" source="CVE"/>
		<reference ref_id="CVE-2016-6132" ref_url="https://www.suse.com/security/cve/CVE-2016-6132/" source="CVE"/>
		<reference ref_id="CVE-2016-6161" ref_url="https://www.suse.com/security/cve/CVE-2016-6161/" source="CVE"/>
		<reference ref_id="CVE-2016-6207" ref_url="https://www.suse.com/security/cve/CVE-2016-6207/" source="CVE"/>
		<reference ref_id="CVE-2016-6214" ref_url="https://www.suse.com/security/cve/CVE-2016-6214/" source="CVE"/>
		<reference ref_id="CVE-2016-6905" ref_url="https://www.suse.com/security/cve/CVE-2016-6905/" source="CVE"/>
		<reference ref_id="CVE-2016-6906" ref_url="https://www.suse.com/security/cve/CVE-2016-6906/" source="CVE"/>
		<reference ref_id="CVE-2016-6911" ref_url="https://www.suse.com/security/cve/CVE-2016-6911/" source="CVE"/>
		<reference ref_id="CVE-2016-6912" ref_url="https://www.suse.com/security/cve/CVE-2016-6912/" source="CVE"/>
		<reference ref_id="CVE-2016-7568" ref_url="https://www.suse.com/security/cve/CVE-2016-7568/" source="CVE"/>
		<reference ref_id="CVE-2016-8670" ref_url="https://www.suse.com/security/cve/CVE-2016-8670/" source="CVE"/>
		<reference ref_id="CVE-2016-9317" ref_url="https://www.suse.com/security/cve/CVE-2016-9317/" source="CVE"/>
		<reference ref_id="CVE-2016-9933" ref_url="https://www.suse.com/security/cve/CVE-2016-9933/" source="CVE"/>
		<reference ref_id="CVE-2017-6362" ref_url="https://www.suse.com/security/cve/CVE-2017-6362/" source="CVE"/>
		<reference ref_id="CVE-2018-1000222" ref_url="https://www.suse.com/security/cve/CVE-2018-1000222/" source="CVE"/>
		<reference ref_id="CVE-2018-5711" ref_url="https://www.suse.com/security/cve/CVE-2018-5711/" source="CVE"/>
		<description>
These are all security issues fixed in the gd-2.1.0-24.9.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2497/">CVE-2014-2497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9709/">CVE-2014-9709</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10166/">CVE-2016-10166</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10167/">CVE-2016-10167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5116/">CVE-2016-5116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6128/">CVE-2016-6128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6132/">CVE-2016-6132</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6161/">CVE-2016-6161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6207/">CVE-2016-6207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6214/">CVE-2016-6214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6905/">CVE-2016-6905</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6906/">CVE-2016-6906</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6911/">CVE-2016-6911</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6912/">CVE-2016-6912</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7568/">CVE-2016-7568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8670/">CVE-2016-8670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9317/">CVE-2016-9317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9933/">CVE-2016-9933</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6362/">CVE-2017-6362</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000222/">CVE-2018-1000222</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5711/">CVE-2018-5711</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512137" comment="gd-2.1.0-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512138" comment="gd-32bit-2.1.0-24.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76871" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-lang-2.34.0-19.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-2485" ref_url="https://www.suse.com/security/cve/CVE-2011-2485/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-7552" ref_url="https://www.suse.com/security/cve/CVE-2015-7552/" source="CVE"/>
		<reference ref_id="CVE-2015-7673" ref_url="https://www.suse.com/security/cve/CVE-2015-7673/" source="CVE"/>
		<reference ref_id="CVE-2015-7674" ref_url="https://www.suse.com/security/cve/CVE-2015-7674/" source="CVE"/>
		<reference ref_id="CVE-2016-6352" ref_url="https://www.suse.com/security/cve/CVE-2016-6352/" source="CVE"/>
		<reference ref_id="CVE-2017-1000422" ref_url="https://www.suse.com/security/cve/CVE-2017-1000422/" source="CVE"/>
		<reference ref_id="CVE-2017-2862" ref_url="https://www.suse.com/security/cve/CVE-2017-2862/" source="CVE"/>
		<reference ref_id="CVE-2017-2870" ref_url="https://www.suse.com/security/cve/CVE-2017-2870/" source="CVE"/>
		<reference ref_id="CVE-2017-6312" ref_url="https://www.suse.com/security/cve/CVE-2017-6312/" source="CVE"/>
		<reference ref_id="CVE-2017-6313" ref_url="https://www.suse.com/security/cve/CVE-2017-6313/" source="CVE"/>
		<reference ref_id="CVE-2017-6314" ref_url="https://www.suse.com/security/cve/CVE-2017-6314/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-lang-2.34.0-19.17.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2485/">CVE-2011-2485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7552/">CVE-2015-7552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7673/">CVE-2015-7673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7674/">CVE-2015-7674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6352/">CVE-2016-6352</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000422/">CVE-2017-1000422</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2862/">CVE-2017-2862</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-2870/">CVE-2017-2870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6312/">CVE-2017-6312</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6313/">CVE-2017-6313</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6314/">CVE-2017-6314</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512139" comment="gdk-pixbuf-lang-2.34.0-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512140" comment="gdk-pixbuf-query-loaders-2.34.0-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512141" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512142" comment="libgdk_pixbuf-2_0-0-2.34.0-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512143" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512144" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76872" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-loader-rsvg-2.40.20-5.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-3146" ref_url="https://www.suse.com/security/cve/CVE-2011-3146/" source="CVE"/>
		<reference ref_id="CVE-2013-1881" ref_url="https://www.suse.com/security/cve/CVE-2013-1881/" source="CVE"/>
		<reference ref_id="CVE-2017-11464" ref_url="https://www.suse.com/security/cve/CVE-2017-11464/" source="CVE"/>
		<reference ref_id="CVE-2018-1000041" ref_url="https://www.suse.com/security/cve/CVE-2018-1000041/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-loader-rsvg-2.40.20-5.6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3146/">CVE-2011-3146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1881/">CVE-2013-1881</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11464/">CVE-2017-11464</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000041/">CVE-2018-1000041</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175785" comment="gdk-pixbuf-loader-rsvg-2.40.20-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009175787" comment="librsvg-2-2-2.40.20-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009175788" comment="librsvg-2-2-32bit-2.40.20-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009175789" comment="rsvg-view-2.40.20-5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76873" version="1" class="patch">
	<metadata>
		<title>gdm-3.10.0.1-54.6.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-1709" ref_url="https://www.suse.com/security/cve/CVE-2011-1709/" source="CVE"/>
		<reference ref_id="CVE-2018-14424" ref_url="https://www.suse.com/security/cve/CVE-2018-14424/" source="CVE"/>
		<description>
These are all security issues fixed in the gdm-3.10.0.1-54.6.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1709/">CVE-2011-1709</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14424/">CVE-2018-14424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512145" comment="gdm-3.10.0.1-54.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512146" comment="gdm-lang-3.10.0.1-54.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512147" comment="gdmflexiserver-3.10.0.1-54.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512148" comment="libgdm1-3.10.0.1-54.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512149" comment="typelib-1_0-Gdm-1_0-3.10.0.1-54.6.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76874" version="1" class="patch">
	<metadata>
		<title>gegl-0_2-0.2.0-14.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-4433" ref_url="https://www.suse.com/security/cve/CVE-2012-4433/" source="CVE"/>
		<description>
These are all security issues fixed in the gegl-0_2-0.2.0-14.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4433/">CVE-2012-4433</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009149576" comment="gegl-0_2-0.2.0-14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009149577" comment="gegl-0_2-lang-0.2.0-14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009149578" comment="libgegl-0_2-0-0.2.0-14.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76875" version="1" class="patch">
	<metadata>
		<title>ghostscript-9.25-23.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-5653" ref_url="https://www.suse.com/security/cve/CVE-2013-5653/" source="CVE"/>
		<reference ref_id="CVE-2015-3228" ref_url="https://www.suse.com/security/cve/CVE-2015-3228/" source="CVE"/>
		<reference ref_id="CVE-2016-10217" ref_url="https://www.suse.com/security/cve/CVE-2016-10217/" source="CVE"/>
		<reference ref_id="CVE-2016-10218" ref_url="https://www.suse.com/security/cve/CVE-2016-10218/" source="CVE"/>
		<reference ref_id="CVE-2016-10219" ref_url="https://www.suse.com/security/cve/CVE-2016-10219/" source="CVE"/>
		<reference ref_id="CVE-2016-10220" ref_url="https://www.suse.com/security/cve/CVE-2016-10220/" source="CVE"/>
		<reference ref_id="CVE-2016-10317" ref_url="https://www.suse.com/security/cve/CVE-2016-10317/" source="CVE"/>
		<reference ref_id="CVE-2016-7976" ref_url="https://www.suse.com/security/cve/CVE-2016-7976/" source="CVE"/>
		<reference ref_id="CVE-2016-7977" ref_url="https://www.suse.com/security/cve/CVE-2016-7977/" source="CVE"/>
		<reference ref_id="CVE-2016-7978" ref_url="https://www.suse.com/security/cve/CVE-2016-7978/" source="CVE"/>
		<reference ref_id="CVE-2016-7979" ref_url="https://www.suse.com/security/cve/CVE-2016-7979/" source="CVE"/>
		<reference ref_id="CVE-2016-8602" ref_url="https://www.suse.com/security/cve/CVE-2016-8602/" source="CVE"/>
		<reference ref_id="CVE-2016-9601" ref_url="https://www.suse.com/security/cve/CVE-2016-9601/" source="CVE"/>
		<reference ref_id="CVE-2017-11714" ref_url="https://www.suse.com/security/cve/CVE-2017-11714/" source="CVE"/>
		<reference ref_id="CVE-2017-5951" ref_url="https://www.suse.com/security/cve/CVE-2017-5951/" source="CVE"/>
		<reference ref_id="CVE-2017-7207" ref_url="https://www.suse.com/security/cve/CVE-2017-7207/" source="CVE"/>
		<reference ref_id="CVE-2017-8291" ref_url="https://www.suse.com/security/cve/CVE-2017-8291/" source="CVE"/>
		<reference ref_id="CVE-2017-9216" ref_url="https://www.suse.com/security/cve/CVE-2017-9216/" source="CVE"/>
		<reference ref_id="CVE-2017-9612" ref_url="https://www.suse.com/security/cve/CVE-2017-9612/" source="CVE"/>
		<reference ref_id="CVE-2017-9726" ref_url="https://www.suse.com/security/cve/CVE-2017-9726/" source="CVE"/>
		<reference ref_id="CVE-2017-9727" ref_url="https://www.suse.com/security/cve/CVE-2017-9727/" source="CVE"/>
		<reference ref_id="CVE-2017-9739" ref_url="https://www.suse.com/security/cve/CVE-2017-9739/" source="CVE"/>
		<reference ref_id="CVE-2017-9835" ref_url="https://www.suse.com/security/cve/CVE-2017-9835/" source="CVE"/>
		<reference ref_id="CVE-2018-10194" ref_url="https://www.suse.com/security/cve/CVE-2018-10194/" source="CVE"/>
		<reference ref_id="CVE-2018-15908" ref_url="https://www.suse.com/security/cve/CVE-2018-15908/" source="CVE"/>
		<reference ref_id="CVE-2018-15909" ref_url="https://www.suse.com/security/cve/CVE-2018-15909/" source="CVE"/>
		<reference ref_id="CVE-2018-15910" ref_url="https://www.suse.com/security/cve/CVE-2018-15910/" source="CVE"/>
		<reference ref_id="CVE-2018-15911" ref_url="https://www.suse.com/security/cve/CVE-2018-15911/" source="CVE"/>
		<reference ref_id="CVE-2018-16509" ref_url="https://www.suse.com/security/cve/CVE-2018-16509/" source="CVE"/>
		<reference ref_id="CVE-2018-16510" ref_url="https://www.suse.com/security/cve/CVE-2018-16510/" source="CVE"/>
		<reference ref_id="CVE-2018-16511" ref_url="https://www.suse.com/security/cve/CVE-2018-16511/" source="CVE"/>
		<reference ref_id="CVE-2018-16513" ref_url="https://www.suse.com/security/cve/CVE-2018-16513/" source="CVE"/>
		<reference ref_id="CVE-2018-16539" ref_url="https://www.suse.com/security/cve/CVE-2018-16539/" source="CVE"/>
		<reference ref_id="CVE-2018-16540" ref_url="https://www.suse.com/security/cve/CVE-2018-16540/" source="CVE"/>
		<reference ref_id="CVE-2018-16541" ref_url="https://www.suse.com/security/cve/CVE-2018-16541/" source="CVE"/>
		<reference ref_id="CVE-2018-16542" ref_url="https://www.suse.com/security/cve/CVE-2018-16542/" source="CVE"/>
		<reference ref_id="CVE-2018-16543" ref_url="https://www.suse.com/security/cve/CVE-2018-16543/" source="CVE"/>
		<reference ref_id="CVE-2018-16585" ref_url="https://www.suse.com/security/cve/CVE-2018-16585/" source="CVE"/>
		<reference ref_id="CVE-2018-16802" ref_url="https://www.suse.com/security/cve/CVE-2018-16802/" source="CVE"/>
		<description>
These are all security issues fixed in the ghostscript-9.25-23.13.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5653/">CVE-2013-5653</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3228/">CVE-2015-3228</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10217/">CVE-2016-10217</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10218/">CVE-2016-10218</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10219/">CVE-2016-10219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10220/">CVE-2016-10220</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10317/">CVE-2016-10317</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7976/">CVE-2016-7976</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7977/">CVE-2016-7977</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7978/">CVE-2016-7978</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7979/">CVE-2016-7979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8602/">CVE-2016-8602</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9601/">CVE-2016-9601</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11714/">CVE-2017-11714</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5951/">CVE-2017-5951</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-7207/">CVE-2017-7207</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-8291/">CVE-2017-8291</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9216/">CVE-2017-9216</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9612/">CVE-2017-9612</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9726/">CVE-2017-9726</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9727/">CVE-2017-9727</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9739/">CVE-2017-9739</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9835/">CVE-2017-9835</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10194/">CVE-2018-10194</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15908/">CVE-2018-15908</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15909/">CVE-2018-15909</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15910/">CVE-2018-15910</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15911/">CVE-2018-15911</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16509/">CVE-2018-16509</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16510/">CVE-2018-16510</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16511/">CVE-2018-16511</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16513/">CVE-2018-16513</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16539/">CVE-2018-16539</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16540/">CVE-2018-16540</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16541/">CVE-2018-16541</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16542/">CVE-2018-16542</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16543/">CVE-2018-16543</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16585/">CVE-2018-16585</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16802/">CVE-2018-16802</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512150" comment="ghostscript-9.25-23.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512151" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76876" version="1" class="patch">
	<metadata>
		<title>gimp-2.8.18-9.3.26 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-3126" ref_url="https://www.suse.com/security/cve/CVE-2007-3126/" source="CVE"/>
		<reference ref_id="CVE-2010-4540" ref_url="https://www.suse.com/security/cve/CVE-2010-4540/" source="CVE"/>
		<reference ref_id="CVE-2010-4541" ref_url="https://www.suse.com/security/cve/CVE-2010-4541/" source="CVE"/>
		<reference ref_id="CVE-2010-4542" ref_url="https://www.suse.com/security/cve/CVE-2010-4542/" source="CVE"/>
		<reference ref_id="CVE-2010-4543" ref_url="https://www.suse.com/security/cve/CVE-2010-4543/" source="CVE"/>
		<reference ref_id="CVE-2011-2896" ref_url="https://www.suse.com/security/cve/CVE-2011-2896/" source="CVE"/>
		<reference ref_id="CVE-2012-3236" ref_url="https://www.suse.com/security/cve/CVE-2012-3236/" source="CVE"/>
		<reference ref_id="CVE-2012-5576" ref_url="https://www.suse.com/security/cve/CVE-2012-5576/" source="CVE"/>
		<reference ref_id="CVE-2016-4994" ref_url="https://www.suse.com/security/cve/CVE-2016-4994/" source="CVE"/>
		<description>
These are all security issues fixed in the gimp-2.8.18-9.3.26 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2007-3126/">CVE-2007-3126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4540/">CVE-2010-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4541/">CVE-2010-4541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4542/">CVE-2010-4542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4543/">CVE-2010-4543</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2896/">CVE-2011-2896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3236/">CVE-2012-3236</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5576/">CVE-2012-5576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4994/">CVE-2016-4994</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009167012" comment="gimp-2.8.18-9.3.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009167013" comment="gimp-lang-2.8.18-9.3.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009167014" comment="gimp-plugins-python-2.8.18-9.3.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009167015" comment="libgimp-2_0-0-2.8.18-9.3.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009167016" comment="libgimpui-2_0-0-2.8.18-9.3.26 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76877" version="1" class="patch">
	<metadata>
		<title>glib2-lang-2.48.2-10.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-4316" ref_url="https://www.suse.com/security/cve/CVE-2008-4316/" source="CVE"/>
		<reference ref_id="CVE-2012-3524" ref_url="https://www.suse.com/security/cve/CVE-2012-3524/" source="CVE"/>
		<description>
These are all security issues fixed in the glib2-lang-2.48.2-10.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4316/">CVE-2008-4316</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3524/">CVE-2012-3524</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140606" comment="glib2-lang-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140607" comment="glib2-tools-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140608" comment="libgio-2_0-0-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140609" comment="libgio-2_0-0-32bit-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142107" comment="libgio-fam-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140610" comment="libglib-2_0-0-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140611" comment="libglib-2_0-0-32bit-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140612" comment="libgmodule-2_0-0-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140613" comment="libgmodule-2_0-0-32bit-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140614" comment="libgobject-2_0-0-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140615" comment="libgobject-2_0-0-32bit-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140616" comment="libgthread-2_0-0-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140617" comment="libgthread-2_0-0-32bit-2.48.2-10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76878" version="1" class="patch">
	<metadata>
		<title>glibc-2.22-15.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-5029" ref_url="https://www.suse.com/security/cve/CVE-2009-5029/" source="CVE"/>
		<reference ref_id="CVE-2012-3406" ref_url="https://www.suse.com/security/cve/CVE-2012-3406/" source="CVE"/>
		<reference ref_id="CVE-2012-4412" ref_url="https://www.suse.com/security/cve/CVE-2012-4412/" source="CVE"/>
		<reference ref_id="CVE-2013-0242" ref_url="https://www.suse.com/security/cve/CVE-2013-0242/" source="CVE"/>
		<reference ref_id="CVE-2013-1914" ref_url="https://www.suse.com/security/cve/CVE-2013-1914/" source="CVE"/>
		<reference ref_id="CVE-2013-2207" ref_url="https://www.suse.com/security/cve/CVE-2013-2207/" source="CVE"/>
		<reference ref_id="CVE-2013-4237" ref_url="https://www.suse.com/security/cve/CVE-2013-4237/" source="CVE"/>
		<reference ref_id="CVE-2013-4332" ref_url="https://www.suse.com/security/cve/CVE-2013-4332/" source="CVE"/>
		<reference ref_id="CVE-2013-4458" ref_url="https://www.suse.com/security/cve/CVE-2013-4458/" source="CVE"/>
		<reference ref_id="CVE-2013-7423" ref_url="https://www.suse.com/security/cve/CVE-2013-7423/" source="CVE"/>
		<reference ref_id="CVE-2014-0475" ref_url="https://www.suse.com/security/cve/CVE-2014-0475/" source="CVE"/>
		<reference ref_id="CVE-2014-4043" ref_url="https://www.suse.com/security/cve/CVE-2014-4043/" source="CVE"/>
		<reference ref_id="CVE-2014-5119" ref_url="https://www.suse.com/security/cve/CVE-2014-5119/" source="CVE"/>
		<reference ref_id="CVE-2014-6040" ref_url="https://www.suse.com/security/cve/CVE-2014-6040/" source="CVE"/>
		<reference ref_id="CVE-2014-7817" ref_url="https://www.suse.com/security/cve/CVE-2014-7817/" source="CVE"/>
		<reference ref_id="CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121/" source="CVE"/>
		<reference ref_id="CVE-2014-9402" ref_url="https://www.suse.com/security/cve/CVE-2014-9402/" source="CVE"/>
		<reference ref_id="CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761/" source="CVE"/>
		<reference ref_id="CVE-2015-1472" ref_url="https://www.suse.com/security/cve/CVE-2015-1472/" source="CVE"/>
		<reference ref_id="CVE-2015-1473" ref_url="https://www.suse.com/security/cve/CVE-2015-1473/" source="CVE"/>
		<reference ref_id="CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781/" source="CVE"/>
		<reference ref_id="CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547/" source="CVE"/>
		<reference ref_id="CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776/" source="CVE"/>
		<reference ref_id="CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777/" source="CVE"/>
		<reference ref_id="CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778/" source="CVE"/>
		<reference ref_id="CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779/" source="CVE"/>
		<reference ref_id="CVE-2016-1234" ref_url="https://www.suse.com/security/cve/CVE-2016-1234/" source="CVE"/>
		<reference ref_id="CVE-2016-3075" ref_url="https://www.suse.com/security/cve/CVE-2016-3075/" source="CVE"/>
		<reference ref_id="CVE-2016-3706" ref_url="https://www.suse.com/security/cve/CVE-2016-3706/" source="CVE"/>
		<reference ref_id="CVE-2016-4429" ref_url="https://www.suse.com/security/cve/CVE-2016-4429/" source="CVE"/>
		<reference ref_id="CVE-2017-1000366" ref_url="https://www.suse.com/security/cve/CVE-2017-1000366/" source="CVE"/>
		<reference ref_id="CVE-2017-1000408" ref_url="https://www.suse.com/security/cve/CVE-2017-1000408/" source="CVE"/>
		<reference ref_id="CVE-2017-1000409" ref_url="https://www.suse.com/security/cve/CVE-2017-1000409/" source="CVE"/>
		<reference ref_id="CVE-2017-12132" ref_url="https://www.suse.com/security/cve/CVE-2017-12132/" source="CVE"/>
		<reference ref_id="CVE-2017-12133" ref_url="https://www.suse.com/security/cve/CVE-2017-12133/" source="CVE"/>
		<reference ref_id="CVE-2017-15670" ref_url="https://www.suse.com/security/cve/CVE-2017-15670/" source="CVE"/>
		<reference ref_id="CVE-2017-15671" ref_url="https://www.suse.com/security/cve/CVE-2017-15671/" source="CVE"/>
		<reference ref_id="CVE-2017-15804" ref_url="https://www.suse.com/security/cve/CVE-2017-15804/" source="CVE"/>
		<reference ref_id="CVE-2017-16997" ref_url="https://www.suse.com/security/cve/CVE-2017-16997/" source="CVE"/>
		<reference ref_id="CVE-2017-18269" ref_url="https://www.suse.com/security/cve/CVE-2017-18269/" source="CVE"/>
		<reference ref_id="CVE-2017-8804" ref_url="https://www.suse.com/security/cve/CVE-2017-8804/" source="CVE"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="CVE-2018-11236" ref_url="https://www.suse.com/security/cve/CVE-2018-11236/" source="CVE"/>
		<reference ref_id="CVE-2018-11237" ref_url="https://www.suse.com/security/cve/CVE-2018-11237/" source="CVE"/>
		<reference ref_id="CVE-2018-6485" ref_url="https://www.suse.com/security/cve/CVE-2018-6485/" source="CVE"/>
		<reference ref_id="CVE-2018-6551" ref_url="https://www.suse.com/security/cve/CVE-2018-6551/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-2.22-15.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5029/">CVE-2009-5029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3406/">CVE-2012-3406</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4412/">CVE-2012-4412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0242/">CVE-2013-0242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1914/">CVE-2013-1914</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2207/">CVE-2013-2207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4237/">CVE-2013-4237</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4332/">CVE-2013-4332</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4458/">CVE-2013-4458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7423/">CVE-2013-7423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0475/">CVE-2014-0475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4043/">CVE-2014-4043</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5119/">CVE-2014-5119</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6040/">CVE-2014-6040</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7817/">CVE-2014-7817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9402/">CVE-2014-9402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1472/">CVE-2015-1472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1473/">CVE-2015-1473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1234/">CVE-2016-1234</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3075/">CVE-2016-3075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3706/">CVE-2016-3706</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4429/">CVE-2016-4429</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000366/">CVE-2017-1000366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000408/">CVE-2017-1000408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000409/">CVE-2017-1000409</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-12132/">CVE-2017-12132</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12133/">CVE-2017-12133</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15670/">CVE-2017-15670</cve>
	<cve impact="important" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15671/">CVE-2017-15671</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15804/">CVE-2017-15804</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16997/">CVE-2017-16997</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18269/">CVE-2017-18269</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8804/">CVE-2017-8804</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11236/">CVE-2018-11236</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11237/">CVE-2018-11237</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6485/">CVE-2018-6485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6551/">CVE-2018-6551</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512152" comment="glibc-2.22-15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512153" comment="glibc-32bit-2.22-15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512154" comment="glibc-devel-2.22-15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512155" comment="glibc-devel-32bit-2.22-15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512156" comment="glibc-i18ndata-2.22-15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512157" comment="glibc-locale-2.22-15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512158" comment="glibc-locale-32bit-2.22-15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512159" comment="nscd-2.22-15.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76879" version="1" class="patch">
	<metadata>
		<title>gnome-keyring-3.20.0-28.3.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-3466" ref_url="https://www.suse.com/security/cve/CVE-2012-3466/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-keyring-3.20.0-28.3.18 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3466/">CVE-2012-3466</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512160" comment="gnome-keyring-3.20.0-28.3.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512161" comment="gnome-keyring-32bit-3.20.0-28.3.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512162" comment="gnome-keyring-lang-3.20.0-28.3.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512163" comment="gnome-keyring-pam-3.20.0-28.3.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512164" comment="gnome-keyring-pam-32bit-3.20.0-28.3.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512165" comment="libgck-modules-gnome-keyring-3.20.0-28.3.18 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76880" version="1" class="patch">
	<metadata>
		<title>gnome-online-accounts-3.20.5-9.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-0240" ref_url="https://www.suse.com/security/cve/CVE-2013-0240/" source="CVE"/>
		<reference ref_id="CVE-2013-1799" ref_url="https://www.suse.com/security/cve/CVE-2013-1799/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-online-accounts-3.20.5-9.6 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0240/">CVE-2013-0240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1799/">CVE-2013-1799</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159641" comment="gnome-online-accounts-3.20.5-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159642" comment="gnome-online-accounts-lang-3.20.5-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159138" comment="libgoa-1_0-0-3.20.5-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159643" comment="libgoa-1_0-0-32bit-3.20.5-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159139" comment="libgoa-backend-1_0-1-3.20.5-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159644" comment="typelib-1_0-Goa-1_0-3.20.5-9.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76881" version="1" class="patch">
	<metadata>
		<title>gnome-settings-daemon-3.20.1-50.5.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-7300" ref_url="https://www.suse.com/security/cve/CVE-2014-7300/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-settings-daemon-3.20.1-50.5.8 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7300/">CVE-2014-7300</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512166" comment="gnome-settings-daemon-3.20.1-50.5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512167" comment="gnome-settings-daemon-lang-3.20.1-50.5.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76882" version="1" class="patch">
	<metadata>
		<title>gnome-shell-3.20.4-77.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-4000" ref_url="https://www.suse.com/security/cve/CVE-2010-4000/" source="CVE"/>
		<reference ref_id="CVE-2017-8288" ref_url="https://www.suse.com/security/cve/CVE-2017-8288/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-shell-3.20.4-77.17.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4000/">CVE-2010-4000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8288/">CVE-2017-8288</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512168" comment="gnome-shell-3.20.4-77.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512169" comment="gnome-shell-browser-plugin-3.20.4-77.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512170" comment="gnome-shell-calendar-3.20.4-77.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512171" comment="gnome-shell-lang-3.20.4-77.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76883" version="1" class="patch">
	<metadata>
		<title>gnome-shell-search-provider-nautilus-3.20.3-23.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-14604" ref_url="https://www.suse.com/security/cve/CVE-2017-14604/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-shell-search-provider-nautilus-3.20.3-23.6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14604/">CVE-2017-14604</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512172" comment="gnome-shell-search-provider-nautilus-3.20.3-23.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512173" comment="libnautilus-extension1-3.20.3-23.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512174" comment="libnautilus-extension1-32bit-3.20.3-23.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512175" comment="nautilus-3.20.3-23.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512176" comment="nautilus-lang-3.20.3-23.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76884" version="1" class="patch">
	<metadata>
		<title>gnutls-3.3.27-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-4989" ref_url="https://www.suse.com/security/cve/CVE-2008-4989/" source="CVE"/>
		<reference ref_id="CVE-2011-4128" ref_url="https://www.suse.com/security/cve/CVE-2011-4128/" source="CVE"/>
		<reference ref_id="CVE-2012-0390" ref_url="https://www.suse.com/security/cve/CVE-2012-0390/" source="CVE"/>
		<reference ref_id="CVE-2012-1569" ref_url="https://www.suse.com/security/cve/CVE-2012-1569/" source="CVE"/>
		<reference ref_id="CVE-2012-1573" ref_url="https://www.suse.com/security/cve/CVE-2012-1573/" source="CVE"/>
		<reference ref_id="CVE-2014-0092" ref_url="https://www.suse.com/security/cve/CVE-2014-0092/" source="CVE"/>
		<reference ref_id="CVE-2014-1959" ref_url="https://www.suse.com/security/cve/CVE-2014-1959/" source="CVE"/>
		<reference ref_id="CVE-2014-3466" ref_url="https://www.suse.com/security/cve/CVE-2014-3466/" source="CVE"/>
		<reference ref_id="CVE-2014-8564" ref_url="https://www.suse.com/security/cve/CVE-2014-8564/" source="CVE"/>
		<reference ref_id="CVE-2015-0294" ref_url="https://www.suse.com/security/cve/CVE-2015-0294/" source="CVE"/>
		<reference ref_id="CVE-2015-3622" ref_url="https://www.suse.com/security/cve/CVE-2015-3622/" source="CVE"/>
		<reference ref_id="CVE-2015-6251" ref_url="https://www.suse.com/security/cve/CVE-2015-6251/" source="CVE"/>
		<reference ref_id="CVE-2016-7444" ref_url="https://www.suse.com/security/cve/CVE-2016-7444/" source="CVE"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2017-10790" ref_url="https://www.suse.com/security/cve/CVE-2017-10790/" source="CVE"/>
		<reference ref_id="CVE-2017-5335" ref_url="https://www.suse.com/security/cve/CVE-2017-5335/" source="CVE"/>
		<reference ref_id="CVE-2017-5336" ref_url="https://www.suse.com/security/cve/CVE-2017-5336/" source="CVE"/>
		<reference ref_id="CVE-2017-5337" ref_url="https://www.suse.com/security/cve/CVE-2017-5337/" source="CVE"/>
		<reference ref_id="CVE-2018-10844" ref_url="https://www.suse.com/security/cve/CVE-2018-10844/" source="CVE"/>
		<reference ref_id="CVE-2018-10845" ref_url="https://www.suse.com/security/cve/CVE-2018-10845/" source="CVE"/>
		<reference ref_id="CVE-2018-10846" ref_url="https://www.suse.com/security/cve/CVE-2018-10846/" source="CVE"/>
		<description>
These are all security issues fixed in the gnutls-3.3.27-3.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4989/">CVE-2008-4989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4128/">CVE-2011-4128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0390/">CVE-2012-0390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1569/">CVE-2012-1569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1573/">CVE-2012-1573</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0092/">CVE-2014-0092</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1959/">CVE-2014-1959</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3466/">CVE-2014-3466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8564/">CVE-2014-8564</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0294/">CVE-2015-0294</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3622/">CVE-2015-3622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6251/">CVE-2015-6251</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7444/">CVE-2016-7444</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10790/">CVE-2017-10790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5335/">CVE-2017-5335</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5336/">CVE-2017-5336</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5337/">CVE-2017-5337</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10844/">CVE-2018-10844</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10845/">CVE-2018-10845</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10846/">CVE-2018-10846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512177" comment="gnutls-3.3.27-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512178" comment="libgnutls28-3.3.27-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512179" comment="libgnutls28-32bit-3.3.27-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76885" version="1" class="patch">
	<metadata>
		<title>gpg2-2.0.24-9.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-2547" ref_url="https://www.suse.com/security/cve/CVE-2010-2547/" source="CVE"/>
		<reference ref_id="CVE-2013-4351" ref_url="https://www.suse.com/security/cve/CVE-2013-4351/" source="CVE"/>
		<reference ref_id="CVE-2013-4402" ref_url="https://www.suse.com/security/cve/CVE-2013-4402/" source="CVE"/>
		<reference ref_id="CVE-2014-4617" ref_url="https://www.suse.com/security/cve/CVE-2014-4617/" source="CVE"/>
		<reference ref_id="CVE-2015-1606" ref_url="https://www.suse.com/security/cve/CVE-2015-1606/" source="CVE"/>
		<reference ref_id="CVE-2015-1607" ref_url="https://www.suse.com/security/cve/CVE-2015-1607/" source="CVE"/>
		<reference ref_id="CVE-2018-12020" ref_url="https://www.suse.com/security/cve/CVE-2018-12020/" source="CVE"/>
		<description>
These are all security issues fixed in the gpg2-2.0.24-9.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2547/">CVE-2010-2547</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4351/">CVE-2013-4351</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4402/">CVE-2013-4402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4617/">CVE-2014-4617</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1606/">CVE-2015-1606</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1607/">CVE-2015-1607</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12020/">CVE-2018-12020</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512180" comment="gpg2-2.0.24-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512181" comment="gpg2-lang-2.0.24-9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76886" version="1" class="patch">
	<metadata>
		<title>gpgme-1.5.1-1.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3564" ref_url="https://www.suse.com/security/cve/CVE-2014-3564/" source="CVE"/>
		<description>
These are all security issues fixed in the gpgme-1.5.1-1.12 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3564/">CVE-2014-3564</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140643" comment="gpgme-1.5.1-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140644" comment="libgpgme11-1.5.1-1.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76887" version="1" class="patch">
	<metadata>
		<title>groff-1.22.2-5.429 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-5044" ref_url="https://www.suse.com/security/cve/CVE-2009-5044/" source="CVE"/>
		<reference ref_id="CVE-2009-5080" ref_url="https://www.suse.com/security/cve/CVE-2009-5080/" source="CVE"/>
		<reference ref_id="CVE-2009-5081" ref_url="https://www.suse.com/security/cve/CVE-2009-5081/" source="CVE"/>
		<description>
These are all security issues fixed in the groff-1.22.2-5.429 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5044/">CVE-2009-5044</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-5080/">CVE-2009-5080</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-5081/">CVE-2009-5081</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140645" comment="groff-1.22.2-5.429 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76888" version="1" class="patch">
	<metadata>
		<title>grub2-2.02-11.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-8370" ref_url="https://www.suse.com/security/cve/CVE-2015-8370/" source="CVE"/>
		<description>
These are all security issues fixed in the grub2-2.02-11.8 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8370/">CVE-2015-8370</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512182" comment="grub2-2.02-11.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512183" comment="grub2-i386-pc-2.02-11.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512184" comment="grub2-snapper-plugin-2.02-11.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512185" comment="grub2-systemd-sleep-plugin-2.02-11.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512186" comment="grub2-x86_64-efi-2.02-11.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512187" comment="grub2-x86_64-xen-2.02-11.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76889" version="1" class="patch">
	<metadata>
		<title>gstreamer-0_10-plugins-bad-0.10.23-25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-0797" ref_url="https://www.suse.com/security/cve/CVE-2015-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-9445" ref_url="https://www.suse.com/security/cve/CVE-2016-9445/" source="CVE"/>
		<reference ref_id="CVE-2016-9446" ref_url="https://www.suse.com/security/cve/CVE-2016-9446/" source="CVE"/>
		<reference ref_id="CVE-2016-9447" ref_url="https://www.suse.com/security/cve/CVE-2016-9447/" source="CVE"/>
		<reference ref_id="CVE-2016-9809" ref_url="https://www.suse.com/security/cve/CVE-2016-9809/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-0_10-plugins-bad-0.10.23-25.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0797/">CVE-2015-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9445/">CVE-2016-9445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9446/">CVE-2016-9446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9447/">CVE-2016-9447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9809/">CVE-2016-9809</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009147825" comment="gstreamer-0_10-plugins-bad-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009147829" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009147830" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009147831" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009147832" comment="libgstbasevideo-0_10-23-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009147833" comment="libgstbasevideo-0_10-23-32bit-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009147834" comment="libgstcodecparsers-0_10-23-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009147836" comment="libgstphotography-0_10-23-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009147837" comment="libgstphotography-0_10-23-32bit-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009147838" comment="libgstsignalprocessor-0_10-23-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009147839" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009147840" comment="libgstvdp-0_10-23-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009147841" comment="libgstvdp-0_10-23-32bit-0.10.23-25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76890" version="1" class="patch">
	<metadata>
		<title>gstreamer-0_10-plugins-base-0.10.36-17.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-9811" ref_url="https://www.suse.com/security/cve/CVE-2016-9811/" source="CVE"/>
		<reference ref_id="CVE-2017-5837" ref_url="https://www.suse.com/security/cve/CVE-2017-5837/" source="CVE"/>
		<reference ref_id="CVE-2017-5844" ref_url="https://www.suse.com/security/cve/CVE-2017-5844/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-0_10-plugins-base-0.10.36-17.13 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9811/">CVE-2016-9811</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5837/">CVE-2017-5837</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5844/">CVE-2017-5844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154327" comment="gstreamer-0_10-plugins-base-0.10.36-17.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154328" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-17.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154329" comment="gstreamer-0_10-plugins-base-lang-0.10.36-17.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154330" comment="libgstapp-0_10-0-0.10.36-17.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154331" comment="libgstapp-0_10-0-32bit-0.10.36-17.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154332" comment="libgstinterfaces-0_10-0-0.10.36-17.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154333" comment="libgstinterfaces-0_10-0-32bit-0.10.36-17.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76891" version="1" class="patch">
	<metadata>
		<title>gstreamer-0_10-plugins-good-0.10.31-16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-9634" ref_url="https://www.suse.com/security/cve/CVE-2016-9634/" source="CVE"/>
		<reference ref_id="CVE-2016-9635" ref_url="https://www.suse.com/security/cve/CVE-2016-9635/" source="CVE"/>
		<reference ref_id="CVE-2016-9636" ref_url="https://www.suse.com/security/cve/CVE-2016-9636/" source="CVE"/>
		<reference ref_id="CVE-2016-9807" ref_url="https://www.suse.com/security/cve/CVE-2016-9807/" source="CVE"/>
		<reference ref_id="CVE-2016-9808" ref_url="https://www.suse.com/security/cve/CVE-2016-9808/" source="CVE"/>
		<reference ref_id="CVE-2016-9810" ref_url="https://www.suse.com/security/cve/CVE-2016-9810/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-0_10-plugins-good-0.10.31-16.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9634/">CVE-2016-9634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9635/">CVE-2016-9635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9636/">CVE-2016-9636</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9807/">CVE-2016-9807</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9808/">CVE-2016-9808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9810/">CVE-2016-9810</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009147371" comment="gstreamer-0_10-plugins-good-0.10.31-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009147372" comment="gstreamer-0_10-plugins-good-lang-0.10.31-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76892" version="1" class="patch">
	<metadata>
		<title>gstreamer-1.8.3-9.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-5838" ref_url="https://www.suse.com/security/cve/CVE-2017-5838/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-1.8.3-9.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5838/">CVE-2017-5838</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009150843" comment="gstreamer-1.8.3-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150844" comment="gstreamer-lang-1.8.3-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150845" comment="gstreamer-utils-1.8.3-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150846" comment="libgstreamer-1_0-0-1.8.3-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150847" comment="libgstreamer-1_0-0-32bit-1.8.3-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150848" comment="typelib-1_0-Gst-1_0-1.8.3-9.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76893" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-bad-1.8.3-17.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-9445" ref_url="https://www.suse.com/security/cve/CVE-2016-9445/" source="CVE"/>
		<reference ref_id="CVE-2016-9446" ref_url="https://www.suse.com/security/cve/CVE-2016-9446/" source="CVE"/>
		<reference ref_id="CVE-2016-9809" ref_url="https://www.suse.com/security/cve/CVE-2016-9809/" source="CVE"/>
		<reference ref_id="CVE-2016-9812" ref_url="https://www.suse.com/security/cve/CVE-2016-9812/" source="CVE"/>
		<reference ref_id="CVE-2016-9813" ref_url="https://www.suse.com/security/cve/CVE-2016-9813/" source="CVE"/>
		<reference ref_id="CVE-2017-5843" ref_url="https://www.suse.com/security/cve/CVE-2017-5843/" source="CVE"/>
		<reference ref_id="CVE-2017-5848" ref_url="https://www.suse.com/security/cve/CVE-2017-5848/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-bad-1.8.3-17.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9445/">CVE-2016-9445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9446/">CVE-2016-9446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9809/">CVE-2016-9809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9812/">CVE-2016-9812</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9813/">CVE-2016-9813</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5843/">CVE-2017-5843</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5848/">CVE-2017-5848</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009150831" comment="gstreamer-plugins-bad-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150832" comment="gstreamer-plugins-bad-lang-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150833" comment="libgstadaptivedemux-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150834" comment="libgstbadaudio-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150835" comment="libgstbadbase-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150836" comment="libgstbadvideo-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150837" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150838" comment="libgstcodecparsers-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150839" comment="libgstgl-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150840" comment="libgstmpegts-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150841" comment="libgstphotography-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150842" comment="libgsturidownloader-1_0-0-1.8.3-17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76894" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-base-1.8.3-12.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-9811" ref_url="https://www.suse.com/security/cve/CVE-2016-9811/" source="CVE"/>
		<reference ref_id="CVE-2017-5837" ref_url="https://www.suse.com/security/cve/CVE-2017-5837/" source="CVE"/>
		<reference ref_id="CVE-2017-5839" ref_url="https://www.suse.com/security/cve/CVE-2017-5839/" source="CVE"/>
		<reference ref_id="CVE-2017-5842" ref_url="https://www.suse.com/security/cve/CVE-2017-5842/" source="CVE"/>
		<reference ref_id="CVE-2017-5844" ref_url="https://www.suse.com/security/cve/CVE-2017-5844/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-base-1.8.3-12.11 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9811/">CVE-2016-9811</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5837/">CVE-2017-5837</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5839/">CVE-2017-5839</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5842/">CVE-2017-5842</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5844/">CVE-2017-5844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154408" comment="gstreamer-plugins-base-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154409" comment="gstreamer-plugins-base-lang-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154410" comment="libgstallocators-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154411" comment="libgstapp-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154412" comment="libgstapp-1_0-0-32bit-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154413" comment="libgstaudio-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154414" comment="libgstaudio-1_0-0-32bit-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154415" comment="libgstfft-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154416" comment="libgstfft-1_0-0-32bit-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154417" comment="libgstpbutils-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154418" comment="libgstpbutils-1_0-0-32bit-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154419" comment="libgstriff-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154420" comment="libgstrtp-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154421" comment="libgstrtsp-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154422" comment="libgstsdp-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154423" comment="libgsttag-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154424" comment="libgsttag-1_0-0-32bit-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154425" comment="libgstvideo-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154426" comment="libgstvideo-1_0-0-32bit-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154427" comment="typelib-1_0-GstAudio-1_0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154428" comment="typelib-1_0-GstPbutils-1_0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154429" comment="typelib-1_0-GstTag-1_0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154430" comment="typelib-1_0-GstVideo-1_0-1.8.3-12.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76895" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-good-1.8.3-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-10198" ref_url="https://www.suse.com/security/cve/CVE-2016-10198/" source="CVE"/>
		<reference ref_id="CVE-2016-10199" ref_url="https://www.suse.com/security/cve/CVE-2016-10199/" source="CVE"/>
		<reference ref_id="CVE-2016-9634" ref_url="https://www.suse.com/security/cve/CVE-2016-9634/" source="CVE"/>
		<reference ref_id="CVE-2016-9635" ref_url="https://www.suse.com/security/cve/CVE-2016-9635/" source="CVE"/>
		<reference ref_id="CVE-2016-9636" ref_url="https://www.suse.com/security/cve/CVE-2016-9636/" source="CVE"/>
		<reference ref_id="CVE-2016-9807" ref_url="https://www.suse.com/security/cve/CVE-2016-9807/" source="CVE"/>
		<reference ref_id="CVE-2016-9808" ref_url="https://www.suse.com/security/cve/CVE-2016-9808/" source="CVE"/>
		<reference ref_id="CVE-2016-9810" ref_url="https://www.suse.com/security/cve/CVE-2016-9810/" source="CVE"/>
		<reference ref_id="CVE-2017-5840" ref_url="https://www.suse.com/security/cve/CVE-2017-5840/" source="CVE"/>
		<reference ref_id="CVE-2017-5841" ref_url="https://www.suse.com/security/cve/CVE-2017-5841/" source="CVE"/>
		<reference ref_id="CVE-2017-5845" ref_url="https://www.suse.com/security/cve/CVE-2017-5845/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-good-1.8.3-15.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10198/">CVE-2016-10198</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10199/">CVE-2016-10199</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9634/">CVE-2016-9634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9635/">CVE-2016-9635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9636/">CVE-2016-9636</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9807/">CVE-2016-9807</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9808/">CVE-2016-9808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9810/">CVE-2016-9810</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5840/">CVE-2017-5840</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5841/">CVE-2017-5841</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5845/">CVE-2017-5845</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159019" comment="gstreamer-plugins-good-1.8.3-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159020" comment="gstreamer-plugins-good-lang-1.8.3-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76896" version="1" class="patch">
	<metadata>
		<title>gtk2-data-2.24.31-7.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-7447" ref_url="https://www.suse.com/security/cve/CVE-2013-7447/" source="CVE"/>
		<description>
These are all security issues fixed in the gtk2-data-2.24.31-7.11 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7447/">CVE-2013-7447</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140657" comment="gtk2-data-2.24.31-7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140658" comment="gtk2-lang-2.24.31-7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140659" comment="gtk2-tools-2.24.31-7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140660" comment="gtk2-tools-32bit-2.24.31-7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140661" comment="libgtk-2_0-0-2.24.31-7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140662" comment="libgtk-2_0-0-32bit-2.24.31-7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142126" comment="typelib-1_0-Gtk-2_0-2.24.31-7.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76897" version="1" class="patch">
	<metadata>
		<title>guile-2.0.9-8.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-8605" ref_url="https://www.suse.com/security/cve/CVE-2016-8605/" source="CVE"/>
		<description>
These are all security issues fixed in the guile-2.0.9-8.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8605/">CVE-2016-8605</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009148134" comment="guile-2.0.9-8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009148135" comment="guile-modules-2_0-2.0.9-8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009148136" comment="libguile-2_0-22-2.0.9-8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76898" version="1" class="patch">
	<metadata>
		<title>gvim-7.4.326-16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0316" ref_url="https://www.suse.com/security/cve/CVE-2009-0316/" source="CVE"/>
		<reference ref_id="CVE-2016-1248" ref_url="https://www.suse.com/security/cve/CVE-2016-1248/" source="CVE"/>
		<reference ref_id="CVE-2017-5953" ref_url="https://www.suse.com/security/cve/CVE-2017-5953/" source="CVE"/>
		<reference ref_id="CVE-2017-6349" ref_url="https://www.suse.com/security/cve/CVE-2017-6349/" source="CVE"/>
		<reference ref_id="CVE-2017-6350" ref_url="https://www.suse.com/security/cve/CVE-2017-6350/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-7.4.326-16.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0316/">CVE-2009-0316</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1248/">CVE-2016-1248</cve>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5953/">CVE-2017-5953</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6349/">CVE-2017-6349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6350/">CVE-2017-6350</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009157587" comment="gvim-7.4.326-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157588" comment="vim-7.4.326-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157589" comment="vim-data-7.4.326-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76899" version="1" class="patch">
	<metadata>
		<title>gwenhywfar-lang-4.9.0beta-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-7542" ref_url="https://www.suse.com/security/cve/CVE-2015-7542/" source="CVE"/>
		<description>
These are all security issues fixed in the gwenhywfar-lang-4.9.0beta-3.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7542/">CVE-2015-7542</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009169499" comment="gwenhywfar-lang-4.9.0beta-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009169500" comment="gwenhywfar-tools-4.9.0beta-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009169501" comment="libgwengui-gtk2-0-4.9.0beta-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009169502" comment="libgwenhywfar60-4.9.0beta-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009169503" comment="libgwenhywfar60-plugins-4.9.0beta-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76900" version="1" class="patch">
	<metadata>
		<title>gzip-1.6-9.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-2624" ref_url="https://www.suse.com/security/cve/CVE-2009-2624/" source="CVE"/>
		<reference ref_id="CVE-2010-0001" ref_url="https://www.suse.com/security/cve/CVE-2010-0001/" source="CVE"/>
		<description>
These are all security issues fixed in the gzip-1.6-9.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2624/">CVE-2009-2624</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0001/">CVE-2010-0001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512188" comment="gzip-1.6-9.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76901" version="1" class="patch">
	<metadata>
		<title>hardlink-1.0-6.45 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-3630" ref_url="https://www.suse.com/security/cve/CVE-2011-3630/" source="CVE"/>
		<reference ref_id="CVE-2011-3631" ref_url="https://www.suse.com/security/cve/CVE-2011-3631/" source="CVE"/>
		<reference ref_id="CVE-2011-3632" ref_url="https://www.suse.com/security/cve/CVE-2011-3632/" source="CVE"/>
		<description>
These are all security issues fixed in the hardlink-1.0-6.45 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3630/">CVE-2011-3630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3631/">CVE-2011-3631</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3632/">CVE-2011-3632</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140678" comment="hardlink-1.0-6.45 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76902" version="1" class="patch">
	<metadata>
		<title>hplip-3.16.11-1.33 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2004-0801" ref_url="https://www.suse.com/security/cve/CVE-2004-0801/" source="CVE"/>
		<reference ref_id="CVE-2010-4267" ref_url="https://www.suse.com/security/cve/CVE-2010-4267/" source="CVE"/>
		<reference ref_id="CVE-2011-2697" ref_url="https://www.suse.com/security/cve/CVE-2011-2697/" source="CVE"/>
		<reference ref_id="CVE-2011-2722" ref_url="https://www.suse.com/security/cve/CVE-2011-2722/" source="CVE"/>
		<reference ref_id="CVE-2013-4325" ref_url="https://www.suse.com/security/cve/CVE-2013-4325/" source="CVE"/>
		<reference ref_id="CVE-2013-6402" ref_url="https://www.suse.com/security/cve/CVE-2013-6402/" source="CVE"/>
		<reference ref_id="CVE-2013-6427" ref_url="https://www.suse.com/security/cve/CVE-2013-6427/" source="CVE"/>
		<reference ref_id="CVE-2015-0839" ref_url="https://www.suse.com/security/cve/CVE-2015-0839/" source="CVE"/>
		<description>
These are all security issues fixed in the hplip-3.16.11-1.33 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2004-0801/">CVE-2004-0801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4267/">CVE-2010-4267</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2697/">CVE-2011-2697</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-2722/">CVE-2011-2722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4325/">CVE-2013-4325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6402/">CVE-2013-6402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6427/">CVE-2013-6427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0839/">CVE-2015-0839</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159029" comment="hplip-3.16.11-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159030" comment="hplip-hpijs-3.16.11-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159031" comment="hplip-sane-3.16.11-1.33 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76903" version="1" class="patch">
	<metadata>
		<title>hyper-v-7-7.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-2669" ref_url="https://www.suse.com/security/cve/CVE-2012-2669/" source="CVE"/>
		<reference ref_id="CVE-2012-5532" ref_url="https://www.suse.com/security/cve/CVE-2012-5532/" source="CVE"/>
		<description>
These are all security issues fixed in the hyper-v-7-7.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2669/">CVE-2012-2669</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-5532/">CVE-2012-5532</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512189" comment="hyper-v-7-7.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76904" version="1" class="patch">
	<metadata>
		<title>ibus-chewing-1.4.14-4.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-4509" ref_url="https://www.suse.com/security/cve/CVE-2013-4509/" source="CVE"/>
		<description>
These are all security issues fixed in the ibus-chewing-1.4.14-4.11 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4509/">CVE-2013-4509</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140683" comment="ibus-chewing-1.4.14-4.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159032" comment="ibus-pinyin-1.5.0-11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76905" version="1" class="patch">
	<metadata>
		<title>icu-52.1-8.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-8146" ref_url="https://www.suse.com/security/cve/CVE-2014-8146/" source="CVE"/>
		<reference ref_id="CVE-2014-8147" ref_url="https://www.suse.com/security/cve/CVE-2014-8147/" source="CVE"/>
		<reference ref_id="CVE-2014-9654" ref_url="https://www.suse.com/security/cve/CVE-2014-9654/" source="CVE"/>
		<reference ref_id="CVE-2016-6293" ref_url="https://www.suse.com/security/cve/CVE-2016-6293/" source="CVE"/>
		<reference ref_id="CVE-2017-14952" ref_url="https://www.suse.com/security/cve/CVE-2017-14952/" source="CVE"/>
		<reference ref_id="CVE-2017-15422" ref_url="https://www.suse.com/security/cve/CVE-2017-15422/" source="CVE"/>
		<reference ref_id="CVE-2017-17484" ref_url="https://www.suse.com/security/cve/CVE-2017-17484/" source="CVE"/>
		<reference ref_id="CVE-2017-7867" ref_url="https://www.suse.com/security/cve/CVE-2017-7867/" source="CVE"/>
		<reference ref_id="CVE-2017-7868" ref_url="https://www.suse.com/security/cve/CVE-2017-7868/" source="CVE"/>
		<description>
These are all security issues fixed in the icu-52.1-8.7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8146/">CVE-2014-8146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8147/">CVE-2014-8147</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9654/">CVE-2014-9654</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6293/">CVE-2016-6293</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14952/">CVE-2017-14952</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15422/">CVE-2017-15422</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17484/">CVE-2017-17484</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7867/">CVE-2017-7867</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7868/">CVE-2017-7868</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009177510" comment="icu-52.1-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009177511" comment="libicu52_1-52.1-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009177512" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009177513" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76906" version="1" class="patch">
	<metadata>
		<title>imobiledevice-tools-1.2.0-7.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-2142" ref_url="https://www.suse.com/security/cve/CVE-2013-2142/" source="CVE"/>
		<reference ref_id="CVE-2016-5104" ref_url="https://www.suse.com/security/cve/CVE-2016-5104/" source="CVE"/>
		<description>
These are all security issues fixed in the imobiledevice-tools-1.2.0-7.31 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2142/">CVE-2013-2142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5104/">CVE-2016-5104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142127" comment="imobiledevice-tools-1.2.0-7.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140847" comment="libimobiledevice6-1.2.0-7.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76907" version="1" class="patch">
	<metadata>
		<title>iputils-s20121221-2.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-2529" ref_url="https://www.suse.com/security/cve/CVE-2010-2529/" source="CVE"/>
		<description>
These are all security issues fixed in the iputils-s20121221-2.19 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2529/">CVE-2010-2529</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140686" comment="iputils-s20121221-2.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76908" version="1" class="patch">
	<metadata>
		<title>java-1_7_0-openjdk-1.7.0.181-43.15.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-3563" ref_url="https://www.suse.com/security/cve/CVE-2011-3563/" source="CVE"/>
		<reference ref_id="CVE-2011-3571" ref_url="https://www.suse.com/security/cve/CVE-2011-3571/" source="CVE"/>
		<reference ref_id="CVE-2011-5035" ref_url="https://www.suse.com/security/cve/CVE-2011-5035/" source="CVE"/>
		<reference ref_id="CVE-2012-0497" ref_url="https://www.suse.com/security/cve/CVE-2012-0497/" source="CVE"/>
		<reference ref_id="CVE-2012-0501" ref_url="https://www.suse.com/security/cve/CVE-2012-0501/" source="CVE"/>
		<reference ref_id="CVE-2012-0502" ref_url="https://www.suse.com/security/cve/CVE-2012-0502/" source="CVE"/>
		<reference ref_id="CVE-2012-0503" ref_url="https://www.suse.com/security/cve/CVE-2012-0503/" source="CVE"/>
		<reference ref_id="CVE-2012-0505" ref_url="https://www.suse.com/security/cve/CVE-2012-0505/" source="CVE"/>
		<reference ref_id="CVE-2012-0506" ref_url="https://www.suse.com/security/cve/CVE-2012-0506/" source="CVE"/>
		<reference ref_id="CVE-2012-0547" ref_url="https://www.suse.com/security/cve/CVE-2012-0547/" source="CVE"/>
		<reference ref_id="CVE-2012-1682" ref_url="https://www.suse.com/security/cve/CVE-2012-1682/" source="CVE"/>
		<reference ref_id="CVE-2012-1711" ref_url="https://www.suse.com/security/cve/CVE-2012-1711/" source="CVE"/>
		<reference ref_id="CVE-2012-1713" ref_url="https://www.suse.com/security/cve/CVE-2012-1713/" source="CVE"/>
		<reference ref_id="CVE-2012-1716" ref_url="https://www.suse.com/security/cve/CVE-2012-1716/" source="CVE"/>
		<reference ref_id="CVE-2012-1717" ref_url="https://www.suse.com/security/cve/CVE-2012-1717/" source="CVE"/>
		<reference ref_id="CVE-2012-1718" ref_url="https://www.suse.com/security/cve/CVE-2012-1718/" source="CVE"/>
		<reference ref_id="CVE-2012-1719" ref_url="https://www.suse.com/security/cve/CVE-2012-1719/" source="CVE"/>
		<reference ref_id="CVE-2012-1723" ref_url="https://www.suse.com/security/cve/CVE-2012-1723/" source="CVE"/>
		<reference ref_id="CVE-2012-1724" ref_url="https://www.suse.com/security/cve/CVE-2012-1724/" source="CVE"/>
		<reference ref_id="CVE-2012-1725" ref_url="https://www.suse.com/security/cve/CVE-2012-1725/" source="CVE"/>
		<reference ref_id="CVE-2012-1726" ref_url="https://www.suse.com/security/cve/CVE-2012-1726/" source="CVE"/>
		<reference ref_id="CVE-2012-3136" ref_url="https://www.suse.com/security/cve/CVE-2012-3136/" source="CVE"/>
		<reference ref_id="CVE-2012-3174" ref_url="https://www.suse.com/security/cve/CVE-2012-3174/" source="CVE"/>
		<reference ref_id="CVE-2012-3216" ref_url="https://www.suse.com/security/cve/CVE-2012-3216/" source="CVE"/>
		<reference ref_id="CVE-2012-4416" ref_url="https://www.suse.com/security/cve/CVE-2012-4416/" source="CVE"/>
		<reference ref_id="CVE-2012-4681" ref_url="https://www.suse.com/security/cve/CVE-2012-4681/" source="CVE"/>
		<reference ref_id="CVE-2012-5068" ref_url="https://www.suse.com/security/cve/CVE-2012-5068/" source="CVE"/>
		<reference ref_id="CVE-2012-5069" ref_url="https://www.suse.com/security/cve/CVE-2012-5069/" source="CVE"/>
		<reference ref_id="CVE-2012-5070" ref_url="https://www.suse.com/security/cve/CVE-2012-5070/" source="CVE"/>
		<reference ref_id="CVE-2012-5071" ref_url="https://www.suse.com/security/cve/CVE-2012-5071/" source="CVE"/>
		<reference ref_id="CVE-2012-5072" ref_url="https://www.suse.com/security/cve/CVE-2012-5072/" source="CVE"/>
		<reference ref_id="CVE-2012-5073" ref_url="https://www.suse.com/security/cve/CVE-2012-5073/" source="CVE"/>
		<reference ref_id="CVE-2012-5074" ref_url="https://www.suse.com/security/cve/CVE-2012-5074/" source="CVE"/>
		<reference ref_id="CVE-2012-5075" ref_url="https://www.suse.com/security/cve/CVE-2012-5075/" source="CVE"/>
		<reference ref_id="CVE-2012-5076" ref_url="https://www.suse.com/security/cve/CVE-2012-5076/" source="CVE"/>
		<reference ref_id="CVE-2012-5077" ref_url="https://www.suse.com/security/cve/CVE-2012-5077/" source="CVE"/>
		<reference ref_id="CVE-2012-5079" ref_url="https://www.suse.com/security/cve/CVE-2012-5079/" source="CVE"/>
		<reference ref_id="CVE-2012-5081" ref_url="https://www.suse.com/security/cve/CVE-2012-5081/" source="CVE"/>
		<reference ref_id="CVE-2012-5084" ref_url="https://www.suse.com/security/cve/CVE-2012-5084/" source="CVE"/>
		<reference ref_id="CVE-2012-5085" ref_url="https://www.suse.com/security/cve/CVE-2012-5085/" source="CVE"/>
		<reference ref_id="CVE-2012-5086" ref_url="https://www.suse.com/security/cve/CVE-2012-5086/" source="CVE"/>
		<reference ref_id="CVE-2012-5087" ref_url="https://www.suse.com/security/cve/CVE-2012-5087/" source="CVE"/>
		<reference ref_id="CVE-2012-5088" ref_url="https://www.suse.com/security/cve/CVE-2012-5088/" source="CVE"/>
		<reference ref_id="CVE-2012-5089" ref_url="https://www.suse.com/security/cve/CVE-2012-5089/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2013-0401" ref_url="https://www.suse.com/security/cve/CVE-2013-0401/" source="CVE"/>
		<reference ref_id="CVE-2013-0422" ref_url="https://www.suse.com/security/cve/CVE-2013-0422/" source="CVE"/>
		<reference ref_id="CVE-2013-0424" ref_url="https://www.suse.com/security/cve/CVE-2013-0424/" source="CVE"/>
		<reference ref_id="CVE-2013-0425" ref_url="https://www.suse.com/security/cve/CVE-2013-0425/" source="CVE"/>
		<reference ref_id="CVE-2013-0426" ref_url="https://www.suse.com/security/cve/CVE-2013-0426/" source="CVE"/>
		<reference ref_id="CVE-2013-0427" ref_url="https://www.suse.com/security/cve/CVE-2013-0427/" source="CVE"/>
		<reference ref_id="CVE-2013-0428" ref_url="https://www.suse.com/security/cve/CVE-2013-0428/" source="CVE"/>
		<reference ref_id="CVE-2013-0429" ref_url="https://www.suse.com/security/cve/CVE-2013-0429/" source="CVE"/>
		<reference ref_id="CVE-2013-0431" ref_url="https://www.suse.com/security/cve/CVE-2013-0431/" source="CVE"/>
		<reference ref_id="CVE-2013-0432" ref_url="https://www.suse.com/security/cve/CVE-2013-0432/" source="CVE"/>
		<reference ref_id="CVE-2013-0433" ref_url="https://www.suse.com/security/cve/CVE-2013-0433/" source="CVE"/>
		<reference ref_id="CVE-2013-0434" ref_url="https://www.suse.com/security/cve/CVE-2013-0434/" source="CVE"/>
		<reference ref_id="CVE-2013-0435" ref_url="https://www.suse.com/security/cve/CVE-2013-0435/" source="CVE"/>
		<reference ref_id="CVE-2013-0440" ref_url="https://www.suse.com/security/cve/CVE-2013-0440/" source="CVE"/>
		<reference ref_id="CVE-2013-0441" ref_url="https://www.suse.com/security/cve/CVE-2013-0441/" source="CVE"/>
		<reference ref_id="CVE-2013-0442" ref_url="https://www.suse.com/security/cve/CVE-2013-0442/" source="CVE"/>
		<reference ref_id="CVE-2013-0443" ref_url="https://www.suse.com/security/cve/CVE-2013-0443/" source="CVE"/>
		<reference ref_id="CVE-2013-0444" ref_url="https://www.suse.com/security/cve/CVE-2013-0444/" source="CVE"/>
		<reference ref_id="CVE-2013-0450" ref_url="https://www.suse.com/security/cve/CVE-2013-0450/" source="CVE"/>
		<reference ref_id="CVE-2013-0809" ref_url="https://www.suse.com/security/cve/CVE-2013-0809/" source="CVE"/>
		<reference ref_id="CVE-2013-1475" ref_url="https://www.suse.com/security/cve/CVE-2013-1475/" source="CVE"/>
		<reference ref_id="CVE-2013-1476" ref_url="https://www.suse.com/security/cve/CVE-2013-1476/" source="CVE"/>
		<reference ref_id="CVE-2013-1478" ref_url="https://www.suse.com/security/cve/CVE-2013-1478/" source="CVE"/>
		<reference ref_id="CVE-2013-1480" ref_url="https://www.suse.com/security/cve/CVE-2013-1480/" source="CVE"/>
		<reference ref_id="CVE-2013-1484" ref_url="https://www.suse.com/security/cve/CVE-2013-1484/" source="CVE"/>
		<reference ref_id="CVE-2013-1485" ref_url="https://www.suse.com/security/cve/CVE-2013-1485/" source="CVE"/>
		<reference ref_id="CVE-2013-1486" ref_url="https://www.suse.com/security/cve/CVE-2013-1486/" source="CVE"/>
		<reference ref_id="CVE-2013-1488" ref_url="https://www.suse.com/security/cve/CVE-2013-1488/" source="CVE"/>
		<reference ref_id="CVE-2013-1493" ref_url="https://www.suse.com/security/cve/CVE-2013-1493/" source="CVE"/>
		<reference ref_id="CVE-2013-1500" ref_url="https://www.suse.com/security/cve/CVE-2013-1500/" source="CVE"/>
		<reference ref_id="CVE-2013-1518" ref_url="https://www.suse.com/security/cve/CVE-2013-1518/" source="CVE"/>
		<reference ref_id="CVE-2013-1537" ref_url="https://www.suse.com/security/cve/CVE-2013-1537/" source="CVE"/>
		<reference ref_id="CVE-2013-1557" ref_url="https://www.suse.com/security/cve/CVE-2013-1557/" source="CVE"/>
		<reference ref_id="CVE-2013-1569" ref_url="https://www.suse.com/security/cve/CVE-2013-1569/" source="CVE"/>
		<reference ref_id="CVE-2013-1571" ref_url="https://www.suse.com/security/cve/CVE-2013-1571/" source="CVE"/>
		<reference ref_id="CVE-2013-2383" ref_url="https://www.suse.com/security/cve/CVE-2013-2383/" source="CVE"/>
		<reference ref_id="CVE-2013-2384" ref_url="https://www.suse.com/security/cve/CVE-2013-2384/" source="CVE"/>
		<reference ref_id="CVE-2013-2407" ref_url="https://www.suse.com/security/cve/CVE-2013-2407/" source="CVE"/>
		<reference ref_id="CVE-2013-2412" ref_url="https://www.suse.com/security/cve/CVE-2013-2412/" source="CVE"/>
		<reference ref_id="CVE-2013-2415" ref_url="https://www.suse.com/security/cve/CVE-2013-2415/" source="CVE"/>
		<reference ref_id="CVE-2013-2417" ref_url="https://www.suse.com/security/cve/CVE-2013-2417/" source="CVE"/>
		<reference ref_id="CVE-2013-2419" ref_url="https://www.suse.com/security/cve/CVE-2013-2419/" source="CVE"/>
		<reference ref_id="CVE-2013-2420" ref_url="https://www.suse.com/security/cve/CVE-2013-2420/" source="CVE"/>
		<reference ref_id="CVE-2013-2421" ref_url="https://www.suse.com/security/cve/CVE-2013-2421/" source="CVE"/>
		<reference ref_id="CVE-2013-2422" ref_url="https://www.suse.com/security/cve/CVE-2013-2422/" source="CVE"/>
		<reference ref_id="CVE-2013-2423" ref_url="https://www.suse.com/security/cve/CVE-2013-2423/" source="CVE"/>
		<reference ref_id="CVE-2013-2424" ref_url="https://www.suse.com/security/cve/CVE-2013-2424/" source="CVE"/>
		<reference ref_id="CVE-2013-2426" ref_url="https://www.suse.com/security/cve/CVE-2013-2426/" source="CVE"/>
		<reference ref_id="CVE-2013-2429" ref_url="https://www.suse.com/security/cve/CVE-2013-2429/" source="CVE"/>
		<reference ref_id="CVE-2013-2430" ref_url="https://www.suse.com/security/cve/CVE-2013-2430/" source="CVE"/>
		<reference ref_id="CVE-2013-2431" ref_url="https://www.suse.com/security/cve/CVE-2013-2431/" source="CVE"/>
		<reference ref_id="CVE-2013-2436" ref_url="https://www.suse.com/security/cve/CVE-2013-2436/" source="CVE"/>
		<reference ref_id="CVE-2013-2443" ref_url="https://www.suse.com/security/cve/CVE-2013-2443/" source="CVE"/>
		<reference ref_id="CVE-2013-2444" ref_url="https://www.suse.com/security/cve/CVE-2013-2444/" source="CVE"/>
		<reference ref_id="CVE-2013-2445" ref_url="https://www.suse.com/security/cve/CVE-2013-2445/" source="CVE"/>
		<reference ref_id="CVE-2013-2446" ref_url="https://www.suse.com/security/cve/CVE-2013-2446/" source="CVE"/>
		<reference ref_id="CVE-2013-2447" ref_url="https://www.suse.com/security/cve/CVE-2013-2447/" source="CVE"/>
		<reference ref_id="CVE-2013-2448" ref_url="https://www.suse.com/security/cve/CVE-2013-2448/" source="CVE"/>
		<reference ref_id="CVE-2013-2449" ref_url="https://www.suse.com/security/cve/CVE-2013-2449/" source="CVE"/>
		<reference ref_id="CVE-2013-2450" ref_url="https://www.suse.com/security/cve/CVE-2013-2450/" source="CVE"/>
		<reference ref_id="CVE-2013-2451" ref_url="https://www.suse.com/security/cve/CVE-2013-2451/" source="CVE"/>
		<reference ref_id="CVE-2013-2452" ref_url="https://www.suse.com/security/cve/CVE-2013-2452/" source="CVE"/>
		<reference ref_id="CVE-2013-2453" ref_url="https://www.suse.com/security/cve/CVE-2013-2453/" source="CVE"/>
		<reference ref_id="CVE-2013-2454" ref_url="https://www.suse.com/security/cve/CVE-2013-2454/" source="CVE"/>
		<reference ref_id="CVE-2013-2455" ref_url="https://www.suse.com/security/cve/CVE-2013-2455/" source="CVE"/>
		<reference ref_id="CVE-2013-2456" ref_url="https://www.suse.com/security/cve/CVE-2013-2456/" source="CVE"/>
		<reference ref_id="CVE-2013-2457" ref_url="https://www.suse.com/security/cve/CVE-2013-2457/" source="CVE"/>
		<reference ref_id="CVE-2013-2458" ref_url="https://www.suse.com/security/cve/CVE-2013-2458/" source="CVE"/>
		<reference ref_id="CVE-2013-2459" ref_url="https://www.suse.com/security/cve/CVE-2013-2459/" source="CVE"/>
		<reference ref_id="CVE-2013-2460" ref_url="https://www.suse.com/security/cve/CVE-2013-2460/" source="CVE"/>
		<reference ref_id="CVE-2013-2461" ref_url="https://www.suse.com/security/cve/CVE-2013-2461/" source="CVE"/>
		<reference ref_id="CVE-2013-2463" ref_url="https://www.suse.com/security/cve/CVE-2013-2463/" source="CVE"/>
		<reference ref_id="CVE-2013-2465" ref_url="https://www.suse.com/security/cve/CVE-2013-2465/" source="CVE"/>
		<reference ref_id="CVE-2013-2469" ref_url="https://www.suse.com/security/cve/CVE-2013-2469/" source="CVE"/>
		<reference ref_id="CVE-2013-2470" ref_url="https://www.suse.com/security/cve/CVE-2013-2470/" source="CVE"/>
		<reference ref_id="CVE-2013-2471" ref_url="https://www.suse.com/security/cve/CVE-2013-2471/" source="CVE"/>
		<reference ref_id="CVE-2013-2472" ref_url="https://www.suse.com/security/cve/CVE-2013-2472/" source="CVE"/>
		<reference ref_id="CVE-2013-2473" ref_url="https://www.suse.com/security/cve/CVE-2013-2473/" source="CVE"/>
		<reference ref_id="CVE-2013-3829" ref_url="https://www.suse.com/security/cve/CVE-2013-3829/" source="CVE"/>
		<reference ref_id="CVE-2013-4002" ref_url="https://www.suse.com/security/cve/CVE-2013-4002/" source="CVE"/>
		<reference ref_id="CVE-2013-5772" ref_url="https://www.suse.com/security/cve/CVE-2013-5772/" source="CVE"/>
		<reference ref_id="CVE-2013-5774" ref_url="https://www.suse.com/security/cve/CVE-2013-5774/" source="CVE"/>
		<reference ref_id="CVE-2013-5778" ref_url="https://www.suse.com/security/cve/CVE-2013-5778/" source="CVE"/>
		<reference ref_id="CVE-2013-5780" ref_url="https://www.suse.com/security/cve/CVE-2013-5780/" source="CVE"/>
		<reference ref_id="CVE-2013-5782" ref_url="https://www.suse.com/security/cve/CVE-2013-5782/" source="CVE"/>
		<reference ref_id="CVE-2013-5783" ref_url="https://www.suse.com/security/cve/CVE-2013-5783/" source="CVE"/>
		<reference ref_id="CVE-2013-5784" ref_url="https://www.suse.com/security/cve/CVE-2013-5784/" source="CVE"/>
		<reference ref_id="CVE-2013-5790" ref_url="https://www.suse.com/security/cve/CVE-2013-5790/" source="CVE"/>
		<reference ref_id="CVE-2013-5797" ref_url="https://www.suse.com/security/cve/CVE-2013-5797/" source="CVE"/>
		<reference ref_id="CVE-2013-5800" ref_url="https://www.suse.com/security/cve/CVE-2013-5800/" source="CVE"/>
		<reference ref_id="CVE-2013-5802" ref_url="https://www.suse.com/security/cve/CVE-2013-5802/" source="CVE"/>
		<reference ref_id="CVE-2013-5803" ref_url="https://www.suse.com/security/cve/CVE-2013-5803/" source="CVE"/>
		<reference ref_id="CVE-2013-5804" ref_url="https://www.suse.com/security/cve/CVE-2013-5804/" source="CVE"/>
		<reference ref_id="CVE-2013-5805" ref_url="https://www.suse.com/security/cve/CVE-2013-5805/" source="CVE"/>
		<reference ref_id="CVE-2013-5806" ref_url="https://www.suse.com/security/cve/CVE-2013-5806/" source="CVE"/>
		<reference ref_id="CVE-2013-5809" ref_url="https://www.suse.com/security/cve/CVE-2013-5809/" source="CVE"/>
		<reference ref_id="CVE-2013-5814" ref_url="https://www.suse.com/security/cve/CVE-2013-5814/" source="CVE"/>
		<reference ref_id="CVE-2013-5817" ref_url="https://www.suse.com/security/cve/CVE-2013-5817/" source="CVE"/>
		<reference ref_id="CVE-2013-5820" ref_url="https://www.suse.com/security/cve/CVE-2013-5820/" source="CVE"/>
		<reference ref_id="CVE-2013-5823" ref_url="https://www.suse.com/security/cve/CVE-2013-5823/" source="CVE"/>
		<reference ref_id="CVE-2013-5825" ref_url="https://www.suse.com/security/cve/CVE-2013-5825/" source="CVE"/>
		<reference ref_id="CVE-2013-5829" ref_url="https://www.suse.com/security/cve/CVE-2013-5829/" source="CVE"/>
		<reference ref_id="CVE-2013-5830" ref_url="https://www.suse.com/security/cve/CVE-2013-5830/" source="CVE"/>
		<reference ref_id="CVE-2013-5840" ref_url="https://www.suse.com/security/cve/CVE-2013-5840/" source="CVE"/>
		<reference ref_id="CVE-2013-5842" ref_url="https://www.suse.com/security/cve/CVE-2013-5842/" source="CVE"/>
		<reference ref_id="CVE-2013-5849" ref_url="https://www.suse.com/security/cve/CVE-2013-5849/" source="CVE"/>
		<reference ref_id="CVE-2013-5850" ref_url="https://www.suse.com/security/cve/CVE-2013-5850/" source="CVE"/>
		<reference ref_id="CVE-2013-5851" ref_url="https://www.suse.com/security/cve/CVE-2013-5851/" source="CVE"/>
		<reference ref_id="CVE-2013-5878" ref_url="https://www.suse.com/security/cve/CVE-2013-5878/" source="CVE"/>
		<reference ref_id="CVE-2013-5884" ref_url="https://www.suse.com/security/cve/CVE-2013-5884/" source="CVE"/>
		<reference ref_id="CVE-2013-5893" ref_url="https://www.suse.com/security/cve/CVE-2013-5893/" source="CVE"/>
		<reference ref_id="CVE-2013-5896" ref_url="https://www.suse.com/security/cve/CVE-2013-5896/" source="CVE"/>
		<reference ref_id="CVE-2013-5907" ref_url="https://www.suse.com/security/cve/CVE-2013-5907/" source="CVE"/>
		<reference ref_id="CVE-2013-5910" ref_url="https://www.suse.com/security/cve/CVE-2013-5910/" source="CVE"/>
		<reference ref_id="CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629/" source="CVE"/>
		<reference ref_id="CVE-2013-6954" ref_url="https://www.suse.com/security/cve/CVE-2013-6954/" source="CVE"/>
		<reference ref_id="CVE-2014-0368" ref_url="https://www.suse.com/security/cve/CVE-2014-0368/" source="CVE"/>
		<reference ref_id="CVE-2014-0373" ref_url="https://www.suse.com/security/cve/CVE-2014-0373/" source="CVE"/>
		<reference ref_id="CVE-2014-0376" ref_url="https://www.suse.com/security/cve/CVE-2014-0376/" source="CVE"/>
		<reference ref_id="CVE-2014-0408" ref_url="https://www.suse.com/security/cve/CVE-2014-0408/" source="CVE"/>
		<reference ref_id="CVE-2014-0411" ref_url="https://www.suse.com/security/cve/CVE-2014-0411/" source="CVE"/>
		<reference ref_id="CVE-2014-0416" ref_url="https://www.suse.com/security/cve/CVE-2014-0416/" source="CVE"/>
		<reference ref_id="CVE-2014-0422" ref_url="https://www.suse.com/security/cve/CVE-2014-0422/" source="CVE"/>
		<reference ref_id="CVE-2014-0423" ref_url="https://www.suse.com/security/cve/CVE-2014-0423/" source="CVE"/>
		<reference ref_id="CVE-2014-0428" ref_url="https://www.suse.com/security/cve/CVE-2014-0428/" source="CVE"/>
		<reference ref_id="CVE-2014-0429" ref_url="https://www.suse.com/security/cve/CVE-2014-0429/" source="CVE"/>
		<reference ref_id="CVE-2014-0446" ref_url="https://www.suse.com/security/cve/CVE-2014-0446/" source="CVE"/>
		<reference ref_id="CVE-2014-0451" ref_url="https://www.suse.com/security/cve/CVE-2014-0451/" source="CVE"/>
		<reference ref_id="CVE-2014-0452" ref_url="https://www.suse.com/security/cve/CVE-2014-0452/" source="CVE"/>
		<reference ref_id="CVE-2014-0453" ref_url="https://www.suse.com/security/cve/CVE-2014-0453/" source="CVE"/>
		<reference ref_id="CVE-2014-0454" ref_url="https://www.suse.com/security/cve/CVE-2014-0454/" source="CVE"/>
		<reference ref_id="CVE-2014-0455" ref_url="https://www.suse.com/security/cve/CVE-2014-0455/" source="CVE"/>
		<reference ref_id="CVE-2014-0456" ref_url="https://www.suse.com/security/cve/CVE-2014-0456/" source="CVE"/>
		<reference ref_id="CVE-2014-0457" ref_url="https://www.suse.com/security/cve/CVE-2014-0457/" source="CVE"/>
		<reference ref_id="CVE-2014-0458" ref_url="https://www.suse.com/security/cve/CVE-2014-0458/" source="CVE"/>
		<reference ref_id="CVE-2014-0459" ref_url="https://www.suse.com/security/cve/CVE-2014-0459/" source="CVE"/>
		<reference ref_id="CVE-2014-0460" ref_url="https://www.suse.com/security/cve/CVE-2014-0460/" source="CVE"/>
		<reference ref_id="CVE-2014-0461" ref_url="https://www.suse.com/security/cve/CVE-2014-0461/" source="CVE"/>
		<reference ref_id="CVE-2014-1876" ref_url="https://www.suse.com/security/cve/CVE-2014-1876/" source="CVE"/>
		<reference ref_id="CVE-2014-2397" ref_url="https://www.suse.com/security/cve/CVE-2014-2397/" source="CVE"/>
		<reference ref_id="CVE-2014-2398" ref_url="https://www.suse.com/security/cve/CVE-2014-2398/" source="CVE"/>
		<reference ref_id="CVE-2014-2402" ref_url="https://www.suse.com/security/cve/CVE-2014-2402/" source="CVE"/>
		<reference ref_id="CVE-2014-2403" ref_url="https://www.suse.com/security/cve/CVE-2014-2403/" source="CVE"/>
		<reference ref_id="CVE-2014-2412" ref_url="https://www.suse.com/security/cve/CVE-2014-2412/" source="CVE"/>
		<reference ref_id="CVE-2014-2413" ref_url="https://www.suse.com/security/cve/CVE-2014-2413/" source="CVE"/>
		<reference ref_id="CVE-2014-2414" ref_url="https://www.suse.com/security/cve/CVE-2014-2414/" source="CVE"/>
		<reference ref_id="CVE-2014-2421" ref_url="https://www.suse.com/security/cve/CVE-2014-2421/" source="CVE"/>
		<reference ref_id="CVE-2014-2423" ref_url="https://www.suse.com/security/cve/CVE-2014-2423/" source="CVE"/>
		<reference ref_id="CVE-2014-2427" ref_url="https://www.suse.com/security/cve/CVE-2014-2427/" source="CVE"/>
		<reference ref_id="CVE-2014-2483" ref_url="https://www.suse.com/security/cve/CVE-2014-2483/" source="CVE"/>
		<reference ref_id="CVE-2014-2490" ref_url="https://www.suse.com/security/cve/CVE-2014-2490/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-4209" ref_url="https://www.suse.com/security/cve/CVE-2014-4209/" source="CVE"/>
		<reference ref_id="CVE-2014-4216" ref_url="https://www.suse.com/security/cve/CVE-2014-4216/" source="CVE"/>
		<reference ref_id="CVE-2014-4218" ref_url="https://www.suse.com/security/cve/CVE-2014-4218/" source="CVE"/>
		<reference ref_id="CVE-2014-4219" ref_url="https://www.suse.com/security/cve/CVE-2014-4219/" source="CVE"/>
		<reference ref_id="CVE-2014-4221" ref_url="https://www.suse.com/security/cve/CVE-2014-4221/" source="CVE"/>
		<reference ref_id="CVE-2014-4223" ref_url="https://www.suse.com/security/cve/CVE-2014-4223/" source="CVE"/>
		<reference ref_id="CVE-2014-4244" ref_url="https://www.suse.com/security/cve/CVE-2014-4244/" source="CVE"/>
		<reference ref_id="CVE-2014-4252" ref_url="https://www.suse.com/security/cve/CVE-2014-4252/" source="CVE"/>
		<reference ref_id="CVE-2014-4262" ref_url="https://www.suse.com/security/cve/CVE-2014-4262/" source="CVE"/>
		<reference ref_id="CVE-2014-4263" ref_url="https://www.suse.com/security/cve/CVE-2014-4263/" source="CVE"/>
		<reference ref_id="CVE-2014-4264" ref_url="https://www.suse.com/security/cve/CVE-2014-4264/" source="CVE"/>
		<reference ref_id="CVE-2014-4266" ref_url="https://www.suse.com/security/cve/CVE-2014-4266/" source="CVE"/>
		<reference ref_id="CVE-2014-4268" ref_url="https://www.suse.com/security/cve/CVE-2014-4268/" source="CVE"/>
		<reference ref_id="CVE-2014-6457" ref_url="https://www.suse.com/security/cve/CVE-2014-6457/" source="CVE"/>
		<reference ref_id="CVE-2014-6502" ref_url="https://www.suse.com/security/cve/CVE-2014-6502/" source="CVE"/>
		<reference ref_id="CVE-2014-6504" ref_url="https://www.suse.com/security/cve/CVE-2014-6504/" source="CVE"/>
		<reference ref_id="CVE-2014-6506" ref_url="https://www.suse.com/security/cve/CVE-2014-6506/" source="CVE"/>
		<reference ref_id="CVE-2014-6511" ref_url="https://www.suse.com/security/cve/CVE-2014-6511/" source="CVE"/>
		<reference ref_id="CVE-2014-6512" ref_url="https://www.suse.com/security/cve/CVE-2014-6512/" source="CVE"/>
		<reference ref_id="CVE-2014-6513" ref_url="https://www.suse.com/security/cve/CVE-2014-6513/" source="CVE"/>
		<reference ref_id="CVE-2014-6517" ref_url="https://www.suse.com/security/cve/CVE-2014-6517/" source="CVE"/>
		<reference ref_id="CVE-2014-6519" ref_url="https://www.suse.com/security/cve/CVE-2014-6519/" source="CVE"/>
		<reference ref_id="CVE-2014-6531" ref_url="https://www.suse.com/security/cve/CVE-2014-6531/" source="CVE"/>
		<reference ref_id="CVE-2014-6558" ref_url="https://www.suse.com/security/cve/CVE-2014-6558/" source="CVE"/>
		<reference ref_id="CVE-2014-6585" ref_url="https://www.suse.com/security/cve/CVE-2014-6585/" source="CVE"/>
		<reference ref_id="CVE-2014-6587" ref_url="https://www.suse.com/security/cve/CVE-2014-6587/" source="CVE"/>
		<reference ref_id="CVE-2014-6591" ref_url="https://www.suse.com/security/cve/CVE-2014-6591/" source="CVE"/>
		<reference ref_id="CVE-2014-6593" ref_url="https://www.suse.com/security/cve/CVE-2014-6593/" source="CVE"/>
		<reference ref_id="CVE-2014-6601" ref_url="https://www.suse.com/security/cve/CVE-2014-6601/" source="CVE"/>
		<reference ref_id="CVE-2015-0383" ref_url="https://www.suse.com/security/cve/CVE-2015-0383/" source="CVE"/>
		<reference ref_id="CVE-2015-0395" ref_url="https://www.suse.com/security/cve/CVE-2015-0395/" source="CVE"/>
		<reference ref_id="CVE-2015-0400" ref_url="https://www.suse.com/security/cve/CVE-2015-0400/" source="CVE"/>
		<reference ref_id="CVE-2015-0407" ref_url="https://www.suse.com/security/cve/CVE-2015-0407/" source="CVE"/>
		<reference ref_id="CVE-2015-0408" ref_url="https://www.suse.com/security/cve/CVE-2015-0408/" source="CVE"/>
		<reference ref_id="CVE-2015-0410" ref_url="https://www.suse.com/security/cve/CVE-2015-0410/" source="CVE"/>
		<reference ref_id="CVE-2015-0412" ref_url="https://www.suse.com/security/cve/CVE-2015-0412/" source="CVE"/>
		<reference ref_id="CVE-2015-0460" ref_url="https://www.suse.com/security/cve/CVE-2015-0460/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2628" ref_url="https://www.suse.com/security/cve/CVE-2015-2628/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4881" ref_url="https://www.suse.com/security/cve/CVE-2015-4881/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="CVE-2016-0636" ref_url="https://www.suse.com/security/cve/CVE-2016-0636/" source="CVE"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-0695" ref_url="https://www.suse.com/security/cve/CVE-2016-0695/" source="CVE"/>
		<reference ref_id="CVE-2016-10165" ref_url="https://www.suse.com/security/cve/CVE-2016-10165/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-3425" ref_url="https://www.suse.com/security/cve/CVE-2016-3425/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="CVE-2016-3458" ref_url="https://www.suse.com/security/cve/CVE-2016-3458/" source="CVE"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<reference ref_id="CVE-2016-3498" ref_url="https://www.suse.com/security/cve/CVE-2016-3498/" source="CVE"/>
		<reference ref_id="CVE-2016-3500" ref_url="https://www.suse.com/security/cve/CVE-2016-3500/" source="CVE"/>
		<reference ref_id="CVE-2016-3503" ref_url="https://www.suse.com/security/cve/CVE-2016-3503/" source="CVE"/>
		<reference ref_id="CVE-2016-3508" ref_url="https://www.suse.com/security/cve/CVE-2016-3508/" source="CVE"/>
		<reference ref_id="CVE-2016-3511" ref_url="https://www.suse.com/security/cve/CVE-2016-3511/" source="CVE"/>
		<reference ref_id="CVE-2016-3550" ref_url="https://www.suse.com/security/cve/CVE-2016-3550/" source="CVE"/>
		<reference ref_id="CVE-2016-3598" ref_url="https://www.suse.com/security/cve/CVE-2016-3598/" source="CVE"/>
		<reference ref_id="CVE-2016-3606" ref_url="https://www.suse.com/security/cve/CVE-2016-3606/" source="CVE"/>
		<reference ref_id="CVE-2016-3610" ref_url="https://www.suse.com/security/cve/CVE-2016-3610/" source="CVE"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5546" ref_url="https://www.suse.com/security/cve/CVE-2016-5546/" source="CVE"/>
		<reference ref_id="CVE-2016-5547" ref_url="https://www.suse.com/security/cve/CVE-2016-5547/" source="CVE"/>
		<reference ref_id="CVE-2016-5548" ref_url="https://www.suse.com/security/cve/CVE-2016-5548/" source="CVE"/>
		<reference ref_id="CVE-2016-5549" ref_url="https://www.suse.com/security/cve/CVE-2016-5549/" source="CVE"/>
		<reference ref_id="CVE-2016-5552" ref_url="https://www.suse.com/security/cve/CVE-2016-5552/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5582" ref_url="https://www.suse.com/security/cve/CVE-2016-5582/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-10053" ref_url="https://www.suse.com/security/cve/CVE-2017-10053/" source="CVE"/>
		<reference ref_id="CVE-2017-10067" ref_url="https://www.suse.com/security/cve/CVE-2017-10067/" source="CVE"/>
		<reference ref_id="CVE-2017-10074" ref_url="https://www.suse.com/security/cve/CVE-2017-10074/" source="CVE"/>
		<reference ref_id="CVE-2017-10081" ref_url="https://www.suse.com/security/cve/CVE-2017-10081/" source="CVE"/>
		<reference ref_id="CVE-2017-10086" ref_url="https://www.suse.com/security/cve/CVE-2017-10086/" source="CVE"/>
		<reference ref_id="CVE-2017-10087" ref_url="https://www.suse.com/security/cve/CVE-2017-10087/" source="CVE"/>
		<reference ref_id="CVE-2017-10089" ref_url="https://www.suse.com/security/cve/CVE-2017-10089/" source="CVE"/>
		<reference ref_id="CVE-2017-10090" ref_url="https://www.suse.com/security/cve/CVE-2017-10090/" source="CVE"/>
		<reference ref_id="CVE-2017-10096" ref_url="https://www.suse.com/security/cve/CVE-2017-10096/" source="CVE"/>
		<reference ref_id="CVE-2017-10101" ref_url="https://www.suse.com/security/cve/CVE-2017-10101/" source="CVE"/>
		<reference ref_id="CVE-2017-10102" ref_url="https://www.suse.com/security/cve/CVE-2017-10102/" source="CVE"/>
		<reference ref_id="CVE-2017-10105" ref_url="https://www.suse.com/security/cve/CVE-2017-10105/" source="CVE"/>
		<reference ref_id="CVE-2017-10107" ref_url="https://www.suse.com/security/cve/CVE-2017-10107/" source="CVE"/>
		<reference ref_id="CVE-2017-10108" ref_url="https://www.suse.com/security/cve/CVE-2017-10108/" source="CVE"/>
		<reference ref_id="CVE-2017-10109" ref_url="https://www.suse.com/security/cve/CVE-2017-10109/" source="CVE"/>
		<reference ref_id="CVE-2017-10110" ref_url="https://www.suse.com/security/cve/CVE-2017-10110/" source="CVE"/>
		<reference ref_id="CVE-2017-10111" ref_url="https://www.suse.com/security/cve/CVE-2017-10111/" source="CVE"/>
		<reference ref_id="CVE-2017-10114" ref_url="https://www.suse.com/security/cve/CVE-2017-10114/" source="CVE"/>
		<reference ref_id="CVE-2017-10115" ref_url="https://www.suse.com/security/cve/CVE-2017-10115/" source="CVE"/>
		<reference ref_id="CVE-2017-10116" ref_url="https://www.suse.com/security/cve/CVE-2017-10116/" source="CVE"/>
		<reference ref_id="CVE-2017-10118" ref_url="https://www.suse.com/security/cve/CVE-2017-10118/" source="CVE"/>
		<reference ref_id="CVE-2017-10125" ref_url="https://www.suse.com/security/cve/CVE-2017-10125/" source="CVE"/>
		<reference ref_id="CVE-2017-10135" ref_url="https://www.suse.com/security/cve/CVE-2017-10135/" source="CVE"/>
		<reference ref_id="CVE-2017-10176" ref_url="https://www.suse.com/security/cve/CVE-2017-10176/" source="CVE"/>
		<reference ref_id="CVE-2017-10193" ref_url="https://www.suse.com/security/cve/CVE-2017-10193/" source="CVE"/>
		<reference ref_id="CVE-2017-10198" ref_url="https://www.suse.com/security/cve/CVE-2017-10198/" source="CVE"/>
		<reference ref_id="CVE-2017-10243" ref_url="https://www.suse.com/security/cve/CVE-2017-10243/" source="CVE"/>
		<reference ref_id="CVE-2017-10274" ref_url="https://www.suse.com/security/cve/CVE-2017-10274/" source="CVE"/>
		<reference ref_id="CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281/" source="CVE"/>
		<reference ref_id="CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285/" source="CVE"/>
		<reference ref_id="CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295/" source="CVE"/>
		<reference ref_id="CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345/" source="CVE"/>
		<reference ref_id="CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346/" source="CVE"/>
		<reference ref_id="CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347/" source="CVE"/>
		<reference ref_id="CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348/" source="CVE"/>
		<reference ref_id="CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349/" source="CVE"/>
		<reference ref_id="CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355/" source="CVE"/>
		<reference ref_id="CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356/" source="CVE"/>
		<reference ref_id="CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357/" source="CVE"/>
		<reference ref_id="CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388/" source="CVE"/>
		<reference ref_id="CVE-2017-3231" ref_url="https://www.suse.com/security/cve/CVE-2017-3231/" source="CVE"/>
		<reference ref_id="CVE-2017-3241" ref_url="https://www.suse.com/security/cve/CVE-2017-3241/" source="CVE"/>
		<reference ref_id="CVE-2017-3252" ref_url="https://www.suse.com/security/cve/CVE-2017-3252/" source="CVE"/>
		<reference ref_id="CVE-2017-3253" ref_url="https://www.suse.com/security/cve/CVE-2017-3253/" source="CVE"/>
		<reference ref_id="CVE-2017-3260" ref_url="https://www.suse.com/security/cve/CVE-2017-3260/" source="CVE"/>
		<reference ref_id="CVE-2017-3261" ref_url="https://www.suse.com/security/cve/CVE-2017-3261/" source="CVE"/>
		<reference ref_id="CVE-2017-3272" ref_url="https://www.suse.com/security/cve/CVE-2017-3272/" source="CVE"/>
		<reference ref_id="CVE-2017-3289" ref_url="https://www.suse.com/security/cve/CVE-2017-3289/" source="CVE"/>
		<reference ref_id="CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509/" source="CVE"/>
		<reference ref_id="CVE-2017-3511" ref_url="https://www.suse.com/security/cve/CVE-2017-3511/" source="CVE"/>
		<reference ref_id="CVE-2017-3512" ref_url="https://www.suse.com/security/cve/CVE-2017-3512/" source="CVE"/>
		<reference ref_id="CVE-2017-3514" ref_url="https://www.suse.com/security/cve/CVE-2017-3514/" source="CVE"/>
		<reference ref_id="CVE-2017-3526" ref_url="https://www.suse.com/security/cve/CVE-2017-3526/" source="CVE"/>
		<reference ref_id="CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533/" source="CVE"/>
		<reference ref_id="CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539/" source="CVE"/>
		<reference ref_id="CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544/" source="CVE"/>
		<reference ref_id="CVE-2018-2579" ref_url="https://www.suse.com/security/cve/CVE-2018-2579/" source="CVE"/>
		<reference ref_id="CVE-2018-2588" ref_url="https://www.suse.com/security/cve/CVE-2018-2588/" source="CVE"/>
		<reference ref_id="CVE-2018-2599" ref_url="https://www.suse.com/security/cve/CVE-2018-2599/" source="CVE"/>
		<reference ref_id="CVE-2018-2602" ref_url="https://www.suse.com/security/cve/CVE-2018-2602/" source="CVE"/>
		<reference ref_id="CVE-2018-2603" ref_url="https://www.suse.com/security/cve/CVE-2018-2603/" source="CVE"/>
		<reference ref_id="CVE-2018-2618" ref_url="https://www.suse.com/security/cve/CVE-2018-2618/" source="CVE"/>
		<reference ref_id="CVE-2018-2629" ref_url="https://www.suse.com/security/cve/CVE-2018-2629/" source="CVE"/>
		<reference ref_id="CVE-2018-2633" ref_url="https://www.suse.com/security/cve/CVE-2018-2633/" source="CVE"/>
		<reference ref_id="CVE-2018-2634" ref_url="https://www.suse.com/security/cve/CVE-2018-2634/" source="CVE"/>
		<reference ref_id="CVE-2018-2637" ref_url="https://www.suse.com/security/cve/CVE-2018-2637/" source="CVE"/>
		<reference ref_id="CVE-2018-2641" ref_url="https://www.suse.com/security/cve/CVE-2018-2641/" source="CVE"/>
		<reference ref_id="CVE-2018-2663" ref_url="https://www.suse.com/security/cve/CVE-2018-2663/" source="CVE"/>
		<reference ref_id="CVE-2018-2677" ref_url="https://www.suse.com/security/cve/CVE-2018-2677/" source="CVE"/>
		<reference ref_id="CVE-2018-2678" ref_url="https://www.suse.com/security/cve/CVE-2018-2678/" source="CVE"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="CVE-2018-2815" ref_url="https://www.suse.com/security/cve/CVE-2018-2815/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_7_0-openjdk-1.7.0.181-43.15.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3563/">CVE-2011-3563</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3571/">CVE-2011-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5035/">CVE-2011-5035</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0497/">CVE-2012-0497</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0501/">CVE-2012-0501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0502/">CVE-2012-0502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0503/">CVE-2012-0503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0505/">CVE-2012-0505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0506/">CVE-2012-0506</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0547/">CVE-2012-0547</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1682/">CVE-2012-1682</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1711/">CVE-2012-1711</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1713/">CVE-2012-1713</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1716/">CVE-2012-1716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1717/">CVE-2012-1717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1718/">CVE-2012-1718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1719/">CVE-2012-1719</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1723/">CVE-2012-1723</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1724/">CVE-2012-1724</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1725/">CVE-2012-1725</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1726/">CVE-2012-1726</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3136/">CVE-2012-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3174/">CVE-2012-3174</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3216/">CVE-2012-3216</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4416/">CVE-2012-4416</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4681/">CVE-2012-4681</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5068/">CVE-2012-5068</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5069/">CVE-2012-5069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5070/">CVE-2012-5070</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5071/">CVE-2012-5071</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5072/">CVE-2012-5072</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5073/">CVE-2012-5073</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5074/">CVE-2012-5074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5075/">CVE-2012-5075</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5076/">CVE-2012-5076</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-5077/">CVE-2012-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5079/">CVE-2012-5079</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5081/">CVE-2012-5081</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5084/">CVE-2012-5084</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-5085/">CVE-2012-5085</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5086/">CVE-2012-5086</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5087/">CVE-2012-5087</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5088/">CVE-2012-5088</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5089/">CVE-2012-5089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0401/">CVE-2013-0401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0422/">CVE-2013-0422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0424/">CVE-2013-0424</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0425/">CVE-2013-0425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0426/">CVE-2013-0426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0427/">CVE-2013-0427</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0428/">CVE-2013-0428</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0429/">CVE-2013-0429</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0431/">CVE-2013-0431</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0432/">CVE-2013-0432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0433/">CVE-2013-0433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0434/">CVE-2013-0434</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0435/">CVE-2013-0435</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0440/">CVE-2013-0440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0441/">CVE-2013-0441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0442/">CVE-2013-0442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0443/">CVE-2013-0443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0444/">CVE-2013-0444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0450/">CVE-2013-0450</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0809/">CVE-2013-0809</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1475/">CVE-2013-1475</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1476/">CVE-2013-1476</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1478/">CVE-2013-1478</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1480/">CVE-2013-1480</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1484/">CVE-2013-1484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1485/">CVE-2013-1485</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1486/">CVE-2013-1486</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1488/">CVE-2013-1488</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1493/">CVE-2013-1493</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1500/">CVE-2013-1500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1518/">CVE-2013-1518</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1537/">CVE-2013-1537</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1557/">CVE-2013-1557</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1569/">CVE-2013-1569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1571/">CVE-2013-1571</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2383/">CVE-2013-2383</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2384/">CVE-2013-2384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2407/">CVE-2013-2407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2412/">CVE-2013-2412</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2415/">CVE-2013-2415</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2417/">CVE-2013-2417</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2419/">CVE-2013-2419</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2420/">CVE-2013-2420</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2421/">CVE-2013-2421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2422/">CVE-2013-2422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2423/">CVE-2013-2423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2424/">CVE-2013-2424</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2426/">CVE-2013-2426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2429/">CVE-2013-2429</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2430/">CVE-2013-2430</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2431/">CVE-2013-2431</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2436/">CVE-2013-2436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2443/">CVE-2013-2443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2444/">CVE-2013-2444</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2445/">CVE-2013-2445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2446/">CVE-2013-2446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2447/">CVE-2013-2447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2448/">CVE-2013-2448</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2449/">CVE-2013-2449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2450/">CVE-2013-2450</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2451/">CVE-2013-2451</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2452/">CVE-2013-2452</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2453/">CVE-2013-2453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2454/">CVE-2013-2454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2455/">CVE-2013-2455</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2456/">CVE-2013-2456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2457/">CVE-2013-2457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2458/">CVE-2013-2458</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2459/">CVE-2013-2459</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2460/">CVE-2013-2460</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2461/">CVE-2013-2461</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2463/">CVE-2013-2463</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2465/">CVE-2013-2465</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2469/">CVE-2013-2469</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2470/">CVE-2013-2470</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2471/">CVE-2013-2471</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2472/">CVE-2013-2472</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2473/">CVE-2013-2473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3829/">CVE-2013-3829</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4002/">CVE-2013-4002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5772/">CVE-2013-5772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5774/">CVE-2013-5774</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5778/">CVE-2013-5778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5780/">CVE-2013-5780</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5782/">CVE-2013-5782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5783/">CVE-2013-5783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5784/">CVE-2013-5784</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5790/">CVE-2013-5790</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-5797/">CVE-2013-5797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5800/">CVE-2013-5800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5802/">CVE-2013-5802</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5803/">CVE-2013-5803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5804/">CVE-2013-5804</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5805/">CVE-2013-5805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5806/">CVE-2013-5806</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5809/">CVE-2013-5809</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5814/">CVE-2013-5814</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5817/">CVE-2013-5817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5820/">CVE-2013-5820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5823/">CVE-2013-5823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5825/">CVE-2013-5825</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5829/">CVE-2013-5829</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5830/">CVE-2013-5830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5840/">CVE-2013-5840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5842/">CVE-2013-5842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5849/">CVE-2013-5849</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5850/">CVE-2013-5850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5851/">CVE-2013-5851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5878/">CVE-2013-5878</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5884/">CVE-2013-5884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5893/">CVE-2013-5893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5896/">CVE-2013-5896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5907/">CVE-2013-5907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5910/">CVE-2013-5910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6954/">CVE-2013-6954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0368/">CVE-2014-0368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0373/">CVE-2014-0373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0376/">CVE-2014-0376</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0408/">CVE-2014-0408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0411/">CVE-2014-0411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0416/">CVE-2014-0416</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0422/">CVE-2014-0422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0423/">CVE-2014-0423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0428/">CVE-2014-0428</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0429/">CVE-2014-0429</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0446/">CVE-2014-0446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0451/">CVE-2014-0451</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0452/">CVE-2014-0452</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0453/">CVE-2014-0453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0454/">CVE-2014-0454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0455/">CVE-2014-0455</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0456/">CVE-2014-0456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0457/">CVE-2014-0457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0458/">CVE-2014-0458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0459/">CVE-2014-0459</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0460/">CVE-2014-0460</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0461/">CVE-2014-0461</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1876/">CVE-2014-1876</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2397/">CVE-2014-2397</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2398/">CVE-2014-2398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2402/">CVE-2014-2402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2403/">CVE-2014-2403</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2412/">CVE-2014-2412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2413/">CVE-2014-2413</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2414/">CVE-2014-2414</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2421/">CVE-2014-2421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2423/">CVE-2014-2423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2427/">CVE-2014-2427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2483/">CVE-2014-2483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2490/">CVE-2014-2490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4209/">CVE-2014-4209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4216/">CVE-2014-4216</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4218/">CVE-2014-4218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4219/">CVE-2014-4219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4221/">CVE-2014-4221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4223/">CVE-2014-4223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4244/">CVE-2014-4244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4252/">CVE-2014-4252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4262/">CVE-2014-4262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4263/">CVE-2014-4263</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4264/">CVE-2014-4264</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4266/">CVE-2014-4266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4268/">CVE-2014-4268</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6457/">CVE-2014-6457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6502/">CVE-2014-6502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6504/">CVE-2014-6504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6506/">CVE-2014-6506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6511/">CVE-2014-6511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6512/">CVE-2014-6512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6513/">CVE-2014-6513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6517/">CVE-2014-6517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6519/">CVE-2014-6519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6531/">CVE-2014-6531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6558/">CVE-2014-6558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6585/">CVE-2014-6585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6587/">CVE-2014-6587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6591/">CVE-2014-6591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6593/">CVE-2014-6593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6601/">CVE-2014-6601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0383/">CVE-2015-0383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0395/">CVE-2015-0395</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0400/">CVE-2015-0400</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0407/">CVE-2015-0407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0408/">CVE-2015-0408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0410/">CVE-2015-0410</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0412/">CVE-2015-0412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0460/">CVE-2015-0460</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2628/">CVE-2015-2628</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4881/">CVE-2015-4881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0636/">CVE-2016-0636</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0695/">CVE-2016-0695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10165/">CVE-2016-10165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3425/">CVE-2016-3425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3458/">CVE-2016-3458</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3498/">CVE-2016-3498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3500/">CVE-2016-3500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3503/">CVE-2016-3503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3508/">CVE-2016-3508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3511/">CVE-2016-3511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3550/">CVE-2016-3550</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3598/">CVE-2016-3598</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-3606/">CVE-2016-3606</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3610/">CVE-2016-3610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5546/">CVE-2016-5546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5547/">CVE-2016-5547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5548/">CVE-2016-5548</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5549/">CVE-2016-5549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5552/">CVE-2016-5552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5582/">CVE-2016-5582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10053/">CVE-2017-10053</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10067/">CVE-2017-10067</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10074/">CVE-2017-10074</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10081/">CVE-2017-10081</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10086/">CVE-2017-10086</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10087/">CVE-2017-10087</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10089/">CVE-2017-10089</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10090/">CVE-2017-10090</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10096/">CVE-2017-10096</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10101/">CVE-2017-10101</cve>
	<cve impact="important" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10102/">CVE-2017-10102</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10105/">CVE-2017-10105</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10107/">CVE-2017-10107</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10108/">CVE-2017-10108</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10109/">CVE-2017-10109</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10110/">CVE-2017-10110</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10111/">CVE-2017-10111</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10114/">CVE-2017-10114</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-10115/">CVE-2017-10115</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10116/">CVE-2017-10116</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10118/">CVE-2017-10118</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10125/">CVE-2017-10125</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10135/">CVE-2017-10135</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10176/">CVE-2017-10176</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10193/">CVE-2017-10193</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10198/">CVE-2017-10198</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10243/">CVE-2017-10243</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10274/">CVE-2017-10274</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3231/">CVE-2017-3231</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3241/">CVE-2017-3241</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3252/">CVE-2017-3252</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3253/">CVE-2017-3253</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3260/">CVE-2017-3260</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3261/">CVE-2017-3261</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3272/">CVE-2017-3272</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3289/">CVE-2017-3289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3511/">CVE-2017-3511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3512/">CVE-2017-3512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3514/">CVE-2017-3514</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3526/">CVE-2017-3526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2579/">CVE-2018-2579</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2588/">CVE-2018-2588</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2599/">CVE-2018-2599</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2602/">CVE-2018-2602</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2603/">CVE-2018-2603</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2618/">CVE-2018-2618</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2629/">CVE-2018-2629</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2633/">CVE-2018-2633</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2634/">CVE-2018-2634</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2637/">CVE-2018-2637</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2641/">CVE-2018-2641</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2663/">CVE-2018-2663</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2677/">CVE-2018-2677</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2678/">CVE-2018-2678</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2815/">CVE-2018-2815</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512190" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512191" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76909" version="1" class="patch">
	<metadata>
		<title>java-1_7_0-openjdk-plugin-1.6.2-2.8.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-2513" ref_url="https://www.suse.com/security/cve/CVE-2011-2513/" source="CVE"/>
		<reference ref_id="CVE-2011-2514" ref_url="https://www.suse.com/security/cve/CVE-2011-2514/" source="CVE"/>
		<reference ref_id="CVE-2011-3377" ref_url="https://www.suse.com/security/cve/CVE-2011-3377/" source="CVE"/>
		<reference ref_id="CVE-2012-3422" ref_url="https://www.suse.com/security/cve/CVE-2012-3422/" source="CVE"/>
		<reference ref_id="CVE-2012-3423" ref_url="https://www.suse.com/security/cve/CVE-2012-3423/" source="CVE"/>
		<reference ref_id="CVE-2012-4540" ref_url="https://www.suse.com/security/cve/CVE-2012-4540/" source="CVE"/>
		<reference ref_id="CVE-2013-1926" ref_url="https://www.suse.com/security/cve/CVE-2013-1926/" source="CVE"/>
		<reference ref_id="CVE-2013-1927" ref_url="https://www.suse.com/security/cve/CVE-2013-1927/" source="CVE"/>
		<reference ref_id="CVE-2013-4349" ref_url="https://www.suse.com/security/cve/CVE-2013-4349/" source="CVE"/>
		<reference ref_id="CVE-2015-5234" ref_url="https://www.suse.com/security/cve/CVE-2015-5234/" source="CVE"/>
		<reference ref_id="CVE-2015-5235" ref_url="https://www.suse.com/security/cve/CVE-2015-5235/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_7_0-openjdk-plugin-1.6.2-2.8.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2513/">CVE-2011-2513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2514/">CVE-2011-2514</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3377/">CVE-2011-3377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3422/">CVE-2012-3422</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3423/">CVE-2012-3423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4540/">CVE-2012-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1926/">CVE-2013-1926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1927/">CVE-2013-1927</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4349/">CVE-2013-4349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5234/">CVE-2015-5234</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5235/">CVE-2015-5235</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159646" comment="java-1_7_0-openjdk-plugin-1.6.2-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159647" comment="java-1_8_0-openjdk-plugin-1.6.2-2.10.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76910" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openjdk-1.8.0.181-27.26.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2597" ref_url="https://www.suse.com/security/cve/CVE-2015-2597/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2619" ref_url="https://www.suse.com/security/cve/CVE-2015-2619/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2627" ref_url="https://www.suse.com/security/cve/CVE-2015-2627/" source="CVE"/>
		<reference ref_id="CVE-2015-2628" ref_url="https://www.suse.com/security/cve/CVE-2015-2628/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2659" ref_url="https://www.suse.com/security/cve/CVE-2015-2659/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4729" ref_url="https://www.suse.com/security/cve/CVE-2015-4729/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4736" ref_url="https://www.suse.com/security/cve/CVE-2015-4736/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4810" ref_url="https://www.suse.com/security/cve/CVE-2015-4810/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4868" ref_url="https://www.suse.com/security/cve/CVE-2015-4868/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4881" ref_url="https://www.suse.com/security/cve/CVE-2015-4881/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4901" ref_url="https://www.suse.com/security/cve/CVE-2015-4901/" source="CVE"/>
		<reference ref_id="CVE-2015-4902" ref_url="https://www.suse.com/security/cve/CVE-2015-4902/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4906" ref_url="https://www.suse.com/security/cve/CVE-2015-4906/" source="CVE"/>
		<reference ref_id="CVE-2015-4908" ref_url="https://www.suse.com/security/cve/CVE-2015-4908/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-4916" ref_url="https://www.suse.com/security/cve/CVE-2015-4916/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0475" ref_url="https://www.suse.com/security/cve/CVE-2016-0475/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="CVE-2016-0636" ref_url="https://www.suse.com/security/cve/CVE-2016-0636/" source="CVE"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-0695" ref_url="https://www.suse.com/security/cve/CVE-2016-0695/" source="CVE"/>
		<reference ref_id="CVE-2016-10165" ref_url="https://www.suse.com/security/cve/CVE-2016-10165/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-3425" ref_url="https://www.suse.com/security/cve/CVE-2016-3425/" source="CVE"/>
		<reference ref_id="CVE-2016-3426" ref_url="https://www.suse.com/security/cve/CVE-2016-3426/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="CVE-2016-3458" ref_url="https://www.suse.com/security/cve/CVE-2016-3458/" source="CVE"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<reference ref_id="CVE-2016-3498" ref_url="https://www.suse.com/security/cve/CVE-2016-3498/" source="CVE"/>
		<reference ref_id="CVE-2016-3500" ref_url="https://www.suse.com/security/cve/CVE-2016-3500/" source="CVE"/>
		<reference ref_id="CVE-2016-3503" ref_url="https://www.suse.com/security/cve/CVE-2016-3503/" source="CVE"/>
		<reference ref_id="CVE-2016-3508" ref_url="https://www.suse.com/security/cve/CVE-2016-3508/" source="CVE"/>
		<reference ref_id="CVE-2016-3511" ref_url="https://www.suse.com/security/cve/CVE-2016-3511/" source="CVE"/>
		<reference ref_id="CVE-2016-3550" ref_url="https://www.suse.com/security/cve/CVE-2016-3550/" source="CVE"/>
		<reference ref_id="CVE-2016-3552" ref_url="https://www.suse.com/security/cve/CVE-2016-3552/" source="CVE"/>
		<reference ref_id="CVE-2016-3587" ref_url="https://www.suse.com/security/cve/CVE-2016-3587/" source="CVE"/>
		<reference ref_id="CVE-2016-3598" ref_url="https://www.suse.com/security/cve/CVE-2016-3598/" source="CVE"/>
		<reference ref_id="CVE-2016-3606" ref_url="https://www.suse.com/security/cve/CVE-2016-3606/" source="CVE"/>
		<reference ref_id="CVE-2016-3610" ref_url="https://www.suse.com/security/cve/CVE-2016-3610/" source="CVE"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5546" ref_url="https://www.suse.com/security/cve/CVE-2016-5546/" source="CVE"/>
		<reference ref_id="CVE-2016-5547" ref_url="https://www.suse.com/security/cve/CVE-2016-5547/" source="CVE"/>
		<reference ref_id="CVE-2016-5548" ref_url="https://www.suse.com/security/cve/CVE-2016-5548/" source="CVE"/>
		<reference ref_id="CVE-2016-5549" ref_url="https://www.suse.com/security/cve/CVE-2016-5549/" source="CVE"/>
		<reference ref_id="CVE-2016-5552" ref_url="https://www.suse.com/security/cve/CVE-2016-5552/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5582" ref_url="https://www.suse.com/security/cve/CVE-2016-5582/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-10053" ref_url="https://www.suse.com/security/cve/CVE-2017-10053/" source="CVE"/>
		<reference ref_id="CVE-2017-10067" ref_url="https://www.suse.com/security/cve/CVE-2017-10067/" source="CVE"/>
		<reference ref_id="CVE-2017-10074" ref_url="https://www.suse.com/security/cve/CVE-2017-10074/" source="CVE"/>
		<reference ref_id="CVE-2017-10078" ref_url="https://www.suse.com/security/cve/CVE-2017-10078/" source="CVE"/>
		<reference ref_id="CVE-2017-10081" ref_url="https://www.suse.com/security/cve/CVE-2017-10081/" source="CVE"/>
		<reference ref_id="CVE-2017-10086" ref_url="https://www.suse.com/security/cve/CVE-2017-10086/" source="CVE"/>
		<reference ref_id="CVE-2017-10087" ref_url="https://www.suse.com/security/cve/CVE-2017-10087/" source="CVE"/>
		<reference ref_id="CVE-2017-10089" ref_url="https://www.suse.com/security/cve/CVE-2017-10089/" source="CVE"/>
		<reference ref_id="CVE-2017-10090" ref_url="https://www.suse.com/security/cve/CVE-2017-10090/" source="CVE"/>
		<reference ref_id="CVE-2017-10096" ref_url="https://www.suse.com/security/cve/CVE-2017-10096/" source="CVE"/>
		<reference ref_id="CVE-2017-10101" ref_url="https://www.suse.com/security/cve/CVE-2017-10101/" source="CVE"/>
		<reference ref_id="CVE-2017-10102" ref_url="https://www.suse.com/security/cve/CVE-2017-10102/" source="CVE"/>
		<reference ref_id="CVE-2017-10105" ref_url="https://www.suse.com/security/cve/CVE-2017-10105/" source="CVE"/>
		<reference ref_id="CVE-2017-10107" ref_url="https://www.suse.com/security/cve/CVE-2017-10107/" source="CVE"/>
		<reference ref_id="CVE-2017-10108" ref_url="https://www.suse.com/security/cve/CVE-2017-10108/" source="CVE"/>
		<reference ref_id="CVE-2017-10109" ref_url="https://www.suse.com/security/cve/CVE-2017-10109/" source="CVE"/>
		<reference ref_id="CVE-2017-10110" ref_url="https://www.suse.com/security/cve/CVE-2017-10110/" source="CVE"/>
		<reference ref_id="CVE-2017-10111" ref_url="https://www.suse.com/security/cve/CVE-2017-10111/" source="CVE"/>
		<reference ref_id="CVE-2017-10114" ref_url="https://www.suse.com/security/cve/CVE-2017-10114/" source="CVE"/>
		<reference ref_id="CVE-2017-10115" ref_url="https://www.suse.com/security/cve/CVE-2017-10115/" source="CVE"/>
		<reference ref_id="CVE-2017-10116" ref_url="https://www.suse.com/security/cve/CVE-2017-10116/" source="CVE"/>
		<reference ref_id="CVE-2017-10118" ref_url="https://www.suse.com/security/cve/CVE-2017-10118/" source="CVE"/>
		<reference ref_id="CVE-2017-10125" ref_url="https://www.suse.com/security/cve/CVE-2017-10125/" source="CVE"/>
		<reference ref_id="CVE-2017-10135" ref_url="https://www.suse.com/security/cve/CVE-2017-10135/" source="CVE"/>
		<reference ref_id="CVE-2017-10176" ref_url="https://www.suse.com/security/cve/CVE-2017-10176/" source="CVE"/>
		<reference ref_id="CVE-2017-10193" ref_url="https://www.suse.com/security/cve/CVE-2017-10193/" source="CVE"/>
		<reference ref_id="CVE-2017-10198" ref_url="https://www.suse.com/security/cve/CVE-2017-10198/" source="CVE"/>
		<reference ref_id="CVE-2017-10243" ref_url="https://www.suse.com/security/cve/CVE-2017-10243/" source="CVE"/>
		<reference ref_id="CVE-2017-10274" ref_url="https://www.suse.com/security/cve/CVE-2017-10274/" source="CVE"/>
		<reference ref_id="CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281/" source="CVE"/>
		<reference ref_id="CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285/" source="CVE"/>
		<reference ref_id="CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295/" source="CVE"/>
		<reference ref_id="CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345/" source="CVE"/>
		<reference ref_id="CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346/" source="CVE"/>
		<reference ref_id="CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347/" source="CVE"/>
		<reference ref_id="CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348/" source="CVE"/>
		<reference ref_id="CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349/" source="CVE"/>
		<reference ref_id="CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355/" source="CVE"/>
		<reference ref_id="CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356/" source="CVE"/>
		<reference ref_id="CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357/" source="CVE"/>
		<reference ref_id="CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388/" source="CVE"/>
		<reference ref_id="CVE-2017-3231" ref_url="https://www.suse.com/security/cve/CVE-2017-3231/" source="CVE"/>
		<reference ref_id="CVE-2017-3241" ref_url="https://www.suse.com/security/cve/CVE-2017-3241/" source="CVE"/>
		<reference ref_id="CVE-2017-3252" ref_url="https://www.suse.com/security/cve/CVE-2017-3252/" source="CVE"/>
		<reference ref_id="CVE-2017-3253" ref_url="https://www.suse.com/security/cve/CVE-2017-3253/" source="CVE"/>
		<reference ref_id="CVE-2017-3260" ref_url="https://www.suse.com/security/cve/CVE-2017-3260/" source="CVE"/>
		<reference ref_id="CVE-2017-3261" ref_url="https://www.suse.com/security/cve/CVE-2017-3261/" source="CVE"/>
		<reference ref_id="CVE-2017-3272" ref_url="https://www.suse.com/security/cve/CVE-2017-3272/" source="CVE"/>
		<reference ref_id="CVE-2017-3289" ref_url="https://www.suse.com/security/cve/CVE-2017-3289/" source="CVE"/>
		<reference ref_id="CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509/" source="CVE"/>
		<reference ref_id="CVE-2017-3511" ref_url="https://www.suse.com/security/cve/CVE-2017-3511/" source="CVE"/>
		<reference ref_id="CVE-2017-3512" ref_url="https://www.suse.com/security/cve/CVE-2017-3512/" source="CVE"/>
		<reference ref_id="CVE-2017-3514" ref_url="https://www.suse.com/security/cve/CVE-2017-3514/" source="CVE"/>
		<reference ref_id="CVE-2017-3526" ref_url="https://www.suse.com/security/cve/CVE-2017-3526/" source="CVE"/>
		<reference ref_id="CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533/" source="CVE"/>
		<reference ref_id="CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539/" source="CVE"/>
		<reference ref_id="CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544/" source="CVE"/>
		<reference ref_id="CVE-2018-2579" ref_url="https://www.suse.com/security/cve/CVE-2018-2579/" source="CVE"/>
		<reference ref_id="CVE-2018-2582" ref_url="https://www.suse.com/security/cve/CVE-2018-2582/" source="CVE"/>
		<reference ref_id="CVE-2018-2588" ref_url="https://www.suse.com/security/cve/CVE-2018-2588/" source="CVE"/>
		<reference ref_id="CVE-2018-2599" ref_url="https://www.suse.com/security/cve/CVE-2018-2599/" source="CVE"/>
		<reference ref_id="CVE-2018-2602" ref_url="https://www.suse.com/security/cve/CVE-2018-2602/" source="CVE"/>
		<reference ref_id="CVE-2018-2603" ref_url="https://www.suse.com/security/cve/CVE-2018-2603/" source="CVE"/>
		<reference ref_id="CVE-2018-2618" ref_url="https://www.suse.com/security/cve/CVE-2018-2618/" source="CVE"/>
		<reference ref_id="CVE-2018-2629" ref_url="https://www.suse.com/security/cve/CVE-2018-2629/" source="CVE"/>
		<reference ref_id="CVE-2018-2633" ref_url="https://www.suse.com/security/cve/CVE-2018-2633/" source="CVE"/>
		<reference ref_id="CVE-2018-2634" ref_url="https://www.suse.com/security/cve/CVE-2018-2634/" source="CVE"/>
		<reference ref_id="CVE-2018-2637" ref_url="https://www.suse.com/security/cve/CVE-2018-2637/" source="CVE"/>
		<reference ref_id="CVE-2018-2641" ref_url="https://www.suse.com/security/cve/CVE-2018-2641/" source="CVE"/>
		<reference ref_id="CVE-2018-2663" ref_url="https://www.suse.com/security/cve/CVE-2018-2663/" source="CVE"/>
		<reference ref_id="CVE-2018-2677" ref_url="https://www.suse.com/security/cve/CVE-2018-2677/" source="CVE"/>
		<reference ref_id="CVE-2018-2678" ref_url="https://www.suse.com/security/cve/CVE-2018-2678/" source="CVE"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="CVE-2018-2815" ref_url="https://www.suse.com/security/cve/CVE-2018-2815/" source="CVE"/>
		<reference ref_id="CVE-2018-2938" ref_url="https://www.suse.com/security/cve/CVE-2018-2938/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.181-27.26.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2597/">CVE-2015-2597</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2619/">CVE-2015-2619</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2627/">CVE-2015-2627</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2628/">CVE-2015-2628</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2659/">CVE-2015-2659</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4729/">CVE-2015-4729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4736/">CVE-2015-4736</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4810/">CVE-2015-4810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4868/">CVE-2015-4868</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4881/">CVE-2015-4881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4901/">CVE-2015-4901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4902/">CVE-2015-4902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4906/">CVE-2015-4906</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4908/">CVE-2015-4908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4916/">CVE-2015-4916</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0475/">CVE-2016-0475</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0636/">CVE-2016-0636</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0695/">CVE-2016-0695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10165/">CVE-2016-10165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3425/">CVE-2016-3425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3426/">CVE-2016-3426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3458/">CVE-2016-3458</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3498/">CVE-2016-3498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3500/">CVE-2016-3500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3503/">CVE-2016-3503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3508/">CVE-2016-3508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3511/">CVE-2016-3511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3550/">CVE-2016-3550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3552/">CVE-2016-3552</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3587/">CVE-2016-3587</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3598/">CVE-2016-3598</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-3606/">CVE-2016-3606</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3610/">CVE-2016-3610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5546/">CVE-2016-5546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5547/">CVE-2016-5547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5548/">CVE-2016-5548</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5549/">CVE-2016-5549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5552/">CVE-2016-5552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5582/">CVE-2016-5582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10053/">CVE-2017-10053</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10067/">CVE-2017-10067</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10074/">CVE-2017-10074</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10078/">CVE-2017-10078</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10081/">CVE-2017-10081</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10086/">CVE-2017-10086</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10087/">CVE-2017-10087</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10089/">CVE-2017-10089</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10090/">CVE-2017-10090</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10096/">CVE-2017-10096</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10101/">CVE-2017-10101</cve>
	<cve impact="important" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10102/">CVE-2017-10102</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10105/">CVE-2017-10105</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10107/">CVE-2017-10107</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10108/">CVE-2017-10108</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10109/">CVE-2017-10109</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10110/">CVE-2017-10110</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10111/">CVE-2017-10111</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10114/">CVE-2017-10114</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-10115/">CVE-2017-10115</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10116/">CVE-2017-10116</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10118/">CVE-2017-10118</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10125/">CVE-2017-10125</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10135/">CVE-2017-10135</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10176/">CVE-2017-10176</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10193/">CVE-2017-10193</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10198/">CVE-2017-10198</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10243/">CVE-2017-10243</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10274/">CVE-2017-10274</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3231/">CVE-2017-3231</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3241/">CVE-2017-3241</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3252/">CVE-2017-3252</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3253/">CVE-2017-3253</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3260/">CVE-2017-3260</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3261/">CVE-2017-3261</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3272/">CVE-2017-3272</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3289/">CVE-2017-3289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3511/">CVE-2017-3511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3512/">CVE-2017-3512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3514/">CVE-2017-3514</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3526/">CVE-2017-3526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2579/">CVE-2018-2579</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2582/">CVE-2018-2582</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2588/">CVE-2018-2588</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2599/">CVE-2018-2599</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2602/">CVE-2018-2602</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2603/">CVE-2018-2603</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2618/">CVE-2018-2618</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2629/">CVE-2018-2629</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2633/">CVE-2018-2633</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2634/">CVE-2018-2634</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2637/">CVE-2018-2637</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2641/">CVE-2018-2641</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2663/">CVE-2018-2663</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2677/">CVE-2018-2677</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2678/">CVE-2018-2678</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2815/">CVE-2018-2815</cve>
	<cve impact="low" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2938/">CVE-2018-2938</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512192" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512193" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76911" version="1" class="patch">
	<metadata>
		<title>kbd-2.0.4-8.10.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-0460" ref_url="https://www.suse.com/security/cve/CVE-2011-0460/" source="CVE"/>
		<description>
These are all security issues fixed in the kbd-2.0.4-8.10.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0460/">CVE-2011-0460</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512194" comment="kbd-2.0.4-8.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512195" comment="kbd-legacy-2.0.4-8.10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76912" version="1" class="patch">
	<metadata>
		<title>kdump-0.8.16-9.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-5759" ref_url="https://www.suse.com/security/cve/CVE-2016-5759/" source="CVE"/>
		<description>
These are all security issues fixed in the kdump-0.8.16-9.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5759/">CVE-2016-5759</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512196" comment="kdump-0.8.16-9.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76913" version="1" class="patch">
	<metadata>
		<title>kernel-default-4.12.14-94.41.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-3939" ref_url="https://www.suse.com/security/cve/CVE-2009-3939/" source="CVE"/>
		<reference ref_id="CVE-2009-4026" ref_url="https://www.suse.com/security/cve/CVE-2009-4026/" source="CVE"/>
		<reference ref_id="CVE-2009-4027" ref_url="https://www.suse.com/security/cve/CVE-2009-4027/" source="CVE"/>
		<reference ref_id="CVE-2009-4131" ref_url="https://www.suse.com/security/cve/CVE-2009-4131/" source="CVE"/>
		<reference ref_id="CVE-2009-4138" ref_url="https://www.suse.com/security/cve/CVE-2009-4138/" source="CVE"/>
		<reference ref_id="CVE-2009-4536" ref_url="https://www.suse.com/security/cve/CVE-2009-4536/" source="CVE"/>
		<reference ref_id="CVE-2009-4538" ref_url="https://www.suse.com/security/cve/CVE-2009-4538/" source="CVE"/>
		<reference ref_id="CVE-2010-1146" ref_url="https://www.suse.com/security/cve/CVE-2010-1146/" source="CVE"/>
		<reference ref_id="CVE-2010-1436" ref_url="https://www.suse.com/security/cve/CVE-2010-1436/" source="CVE"/>
		<reference ref_id="CVE-2010-1641" ref_url="https://www.suse.com/security/cve/CVE-2010-1641/" source="CVE"/>
		<reference ref_id="CVE-2010-2066" ref_url="https://www.suse.com/security/cve/CVE-2010-2066/" source="CVE"/>
		<reference ref_id="CVE-2010-2942" ref_url="https://www.suse.com/security/cve/CVE-2010-2942/" source="CVE"/>
		<reference ref_id="CVE-2010-2954" ref_url="https://www.suse.com/security/cve/CVE-2010-2954/" source="CVE"/>
		<reference ref_id="CVE-2010-2955" ref_url="https://www.suse.com/security/cve/CVE-2010-2955/" source="CVE"/>
		<reference ref_id="CVE-2010-3081" ref_url="https://www.suse.com/security/cve/CVE-2010-3081/" source="CVE"/>
		<reference ref_id="CVE-2010-3296" ref_url="https://www.suse.com/security/cve/CVE-2010-3296/" source="CVE"/>
		<reference ref_id="CVE-2010-3297" ref_url="https://www.suse.com/security/cve/CVE-2010-3297/" source="CVE"/>
		<reference ref_id="CVE-2010-3298" ref_url="https://www.suse.com/security/cve/CVE-2010-3298/" source="CVE"/>
		<reference ref_id="CVE-2010-3301" ref_url="https://www.suse.com/security/cve/CVE-2010-3301/" source="CVE"/>
		<reference ref_id="CVE-2010-3310" ref_url="https://www.suse.com/security/cve/CVE-2010-3310/" source="CVE"/>
		<reference ref_id="CVE-2011-0711" ref_url="https://www.suse.com/security/cve/CVE-2011-0711/" source="CVE"/>
		<reference ref_id="CVE-2011-0712" ref_url="https://www.suse.com/security/cve/CVE-2011-0712/" source="CVE"/>
		<reference ref_id="CVE-2011-1020" ref_url="https://www.suse.com/security/cve/CVE-2011-1020/" source="CVE"/>
		<reference ref_id="CVE-2011-1180" ref_url="https://www.suse.com/security/cve/CVE-2011-1180/" source="CVE"/>
		<reference ref_id="CVE-2011-1577" ref_url="https://www.suse.com/security/cve/CVE-2011-1577/" source="CVE"/>
		<reference ref_id="CVE-2011-1581" ref_url="https://www.suse.com/security/cve/CVE-2011-1581/" source="CVE"/>
		<reference ref_id="CVE-2011-2203" ref_url="https://www.suse.com/security/cve/CVE-2011-2203/" source="CVE"/>
		<reference ref_id="CVE-2011-4604" ref_url="https://www.suse.com/security/cve/CVE-2011-4604/" source="CVE"/>
		<reference ref_id="CVE-2012-0056" ref_url="https://www.suse.com/security/cve/CVE-2012-0056/" source="CVE"/>
		<reference ref_id="CVE-2012-3412" ref_url="https://www.suse.com/security/cve/CVE-2012-3412/" source="CVE"/>
		<reference ref_id="CVE-2012-3520" ref_url="https://www.suse.com/security/cve/CVE-2012-3520/" source="CVE"/>
		<reference ref_id="CVE-2013-0160" ref_url="https://www.suse.com/security/cve/CVE-2013-0160/" source="CVE"/>
		<reference ref_id="CVE-2013-0231" ref_url="https://www.suse.com/security/cve/CVE-2013-0231/" source="CVE"/>
		<reference ref_id="CVE-2013-0913" ref_url="https://www.suse.com/security/cve/CVE-2013-0913/" source="CVE"/>
		<reference ref_id="CVE-2013-2850" ref_url="https://www.suse.com/security/cve/CVE-2013-2850/" source="CVE"/>
		<reference ref_id="CVE-2014-0038" ref_url="https://www.suse.com/security/cve/CVE-2014-0038/" source="CVE"/>
		<reference ref_id="CVE-2014-0196" ref_url="https://www.suse.com/security/cve/CVE-2014-0196/" source="CVE"/>
		<reference ref_id="CVE-2014-0691" ref_url="https://www.suse.com/security/cve/CVE-2014-0691/" source="CVE"/>
		<reference ref_id="CVE-2014-8133" ref_url="https://www.suse.com/security/cve/CVE-2014-8133/" source="CVE"/>
		<reference ref_id="CVE-2015-1333" ref_url="https://www.suse.com/security/cve/CVE-2015-1333/" source="CVE"/>
		<reference ref_id="CVE-2015-7550" ref_url="https://www.suse.com/security/cve/CVE-2015-7550/" source="CVE"/>
		<reference ref_id="CVE-2015-7884" ref_url="https://www.suse.com/security/cve/CVE-2015-7884/" source="CVE"/>
		<reference ref_id="CVE-2015-7885" ref_url="https://www.suse.com/security/cve/CVE-2015-7885/" source="CVE"/>
		<reference ref_id="CVE-2015-8539" ref_url="https://www.suse.com/security/cve/CVE-2015-8539/" source="CVE"/>
		<reference ref_id="CVE-2015-8660" ref_url="https://www.suse.com/security/cve/CVE-2015-8660/" source="CVE"/>
		<reference ref_id="CVE-2016-0723" ref_url="https://www.suse.com/security/cve/CVE-2016-0723/" source="CVE"/>
		<reference ref_id="CVE-2016-0728" ref_url="https://www.suse.com/security/cve/CVE-2016-0728/" source="CVE"/>
		<reference ref_id="CVE-2016-1237" ref_url="https://www.suse.com/security/cve/CVE-2016-1237/" source="CVE"/>
		<reference ref_id="CVE-2016-1583" ref_url="https://www.suse.com/security/cve/CVE-2016-1583/" source="CVE"/>
		<reference ref_id="CVE-2016-2184" ref_url="https://www.suse.com/security/cve/CVE-2016-2184/" source="CVE"/>
		<reference ref_id="CVE-2016-2185" ref_url="https://www.suse.com/security/cve/CVE-2016-2185/" source="CVE"/>
		<reference ref_id="CVE-2016-2186" ref_url="https://www.suse.com/security/cve/CVE-2016-2186/" source="CVE"/>
		<reference ref_id="CVE-2016-2384" ref_url="https://www.suse.com/security/cve/CVE-2016-2384/" source="CVE"/>
		<reference ref_id="CVE-2016-3134" ref_url="https://www.suse.com/security/cve/CVE-2016-3134/" source="CVE"/>
		<reference ref_id="CVE-2016-3135" ref_url="https://www.suse.com/security/cve/CVE-2016-3135/" source="CVE"/>
		<reference ref_id="CVE-2016-3136" ref_url="https://www.suse.com/security/cve/CVE-2016-3136/" source="CVE"/>
		<reference ref_id="CVE-2016-3140" ref_url="https://www.suse.com/security/cve/CVE-2016-3140/" source="CVE"/>
		<reference ref_id="CVE-2016-3689" ref_url="https://www.suse.com/security/cve/CVE-2016-3689/" source="CVE"/>
		<reference ref_id="CVE-2016-3713" ref_url="https://www.suse.com/security/cve/CVE-2016-3713/" source="CVE"/>
		<reference ref_id="CVE-2016-4470" ref_url="https://www.suse.com/security/cve/CVE-2016-4470/" source="CVE"/>
		<reference ref_id="CVE-2016-4485" ref_url="https://www.suse.com/security/cve/CVE-2016-4485/" source="CVE"/>
		<reference ref_id="CVE-2016-4486" ref_url="https://www.suse.com/security/cve/CVE-2016-4486/" source="CVE"/>
		<reference ref_id="CVE-2016-4557" ref_url="https://www.suse.com/security/cve/CVE-2016-4557/" source="CVE"/>
		<reference ref_id="CVE-2016-4558" ref_url="https://www.suse.com/security/cve/CVE-2016-4558/" source="CVE"/>
		<reference ref_id="CVE-2016-4569" ref_url="https://www.suse.com/security/cve/CVE-2016-4569/" source="CVE"/>
		<reference ref_id="CVE-2016-4578" ref_url="https://www.suse.com/security/cve/CVE-2016-4578/" source="CVE"/>
		<reference ref_id="CVE-2016-4951" ref_url="https://www.suse.com/security/cve/CVE-2016-4951/" source="CVE"/>
		<reference ref_id="CVE-2016-4997" ref_url="https://www.suse.com/security/cve/CVE-2016-4997/" source="CVE"/>
		<reference ref_id="CVE-2016-4998" ref_url="https://www.suse.com/security/cve/CVE-2016-4998/" source="CVE"/>
		<reference ref_id="CVE-2016-5195" ref_url="https://www.suse.com/security/cve/CVE-2016-5195/" source="CVE"/>
		<reference ref_id="CVE-2016-5244" ref_url="https://www.suse.com/security/cve/CVE-2016-5244/" source="CVE"/>
		<reference ref_id="CVE-2016-5829" ref_url="https://www.suse.com/security/cve/CVE-2016-5829/" source="CVE"/>
		<reference ref_id="CVE-2016-6187" ref_url="https://www.suse.com/security/cve/CVE-2016-6187/" source="CVE"/>
		<reference ref_id="CVE-2016-6480" ref_url="https://www.suse.com/security/cve/CVE-2016-6480/" source="CVE"/>
		<reference ref_id="CVE-2016-6516" ref_url="https://www.suse.com/security/cve/CVE-2016-6516/" source="CVE"/>
		<reference ref_id="CVE-2016-6828" ref_url="https://www.suse.com/security/cve/CVE-2016-6828/" source="CVE"/>
		<reference ref_id="CVE-2016-7039" ref_url="https://www.suse.com/security/cve/CVE-2016-7039/" source="CVE"/>
		<reference ref_id="CVE-2016-7042" ref_url="https://www.suse.com/security/cve/CVE-2016-7042/" source="CVE"/>
		<reference ref_id="CVE-2016-7425" ref_url="https://www.suse.com/security/cve/CVE-2016-7425/" source="CVE"/>
		<reference ref_id="CVE-2016-7913" ref_url="https://www.suse.com/security/cve/CVE-2016-7913/" source="CVE"/>
		<reference ref_id="CVE-2016-8655" ref_url="https://www.suse.com/security/cve/CVE-2016-8655/" source="CVE"/>
		<reference ref_id="CVE-2016-9555" ref_url="https://www.suse.com/security/cve/CVE-2016-9555/" source="CVE"/>
		<reference ref_id="CVE-2016-9576" ref_url="https://www.suse.com/security/cve/CVE-2016-9576/" source="CVE"/>
		<reference ref_id="CVE-2017-1000251" ref_url="https://www.suse.com/security/cve/CVE-2017-1000251/" source="CVE"/>
		<reference ref_id="CVE-2017-1000252" ref_url="https://www.suse.com/security/cve/CVE-2017-1000252/" source="CVE"/>
		<reference ref_id="CVE-2017-1000255" ref_url="https://www.suse.com/security/cve/CVE-2017-1000255/" source="CVE"/>
		<reference ref_id="CVE-2017-1000380" ref_url="https://www.suse.com/security/cve/CVE-2017-1000380/" source="CVE"/>
		<reference ref_id="CVE-2017-1000410" ref_url="https://www.suse.com/security/cve/CVE-2017-1000410/" source="CVE"/>
		<reference ref_id="CVE-2017-11473" ref_url="https://www.suse.com/security/cve/CVE-2017-11473/" source="CVE"/>
		<reference ref_id="CVE-2017-11600" ref_url="https://www.suse.com/security/cve/CVE-2017-11600/" source="CVE"/>
		<reference ref_id="CVE-2017-12153" ref_url="https://www.suse.com/security/cve/CVE-2017-12153/" source="CVE"/>
		<reference ref_id="CVE-2017-12154" ref_url="https://www.suse.com/security/cve/CVE-2017-12154/" source="CVE"/>
		<reference ref_id="CVE-2017-12190" ref_url="https://www.suse.com/security/cve/CVE-2017-12190/" source="CVE"/>
		<reference ref_id="CVE-2017-12193" ref_url="https://www.suse.com/security/cve/CVE-2017-12193/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2017-14051" ref_url="https://www.suse.com/security/cve/CVE-2017-14051/" source="CVE"/>
		<reference ref_id="CVE-2017-14489" ref_url="https://www.suse.com/security/cve/CVE-2017-14489/" source="CVE"/>
		<reference ref_id="CVE-2017-15115" ref_url="https://www.suse.com/security/cve/CVE-2017-15115/" source="CVE"/>
		<reference ref_id="CVE-2017-15127" ref_url="https://www.suse.com/security/cve/CVE-2017-15127/" source="CVE"/>
		<reference ref_id="CVE-2017-15128" ref_url="https://www.suse.com/security/cve/CVE-2017-15128/" source="CVE"/>
		<reference ref_id="CVE-2017-15129" ref_url="https://www.suse.com/security/cve/CVE-2017-15129/" source="CVE"/>
		<reference ref_id="CVE-2017-15265" ref_url="https://www.suse.com/security/cve/CVE-2017-15265/" source="CVE"/>
		<reference ref_id="CVE-2017-15537" ref_url="https://www.suse.com/security/cve/CVE-2017-15537/" source="CVE"/>
		<reference ref_id="CVE-2017-15649" ref_url="https://www.suse.com/security/cve/CVE-2017-15649/" source="CVE"/>
		<reference ref_id="CVE-2017-15951" ref_url="https://www.suse.com/security/cve/CVE-2017-15951/" source="CVE"/>
		<reference ref_id="CVE-2017-16525" ref_url="https://www.suse.com/security/cve/CVE-2017-16525/" source="CVE"/>
		<reference ref_id="CVE-2017-16527" ref_url="https://www.suse.com/security/cve/CVE-2017-16527/" source="CVE"/>
		<reference ref_id="CVE-2017-16528" ref_url="https://www.suse.com/security/cve/CVE-2017-16528/" source="CVE"/>
		<reference ref_id="CVE-2017-16529" ref_url="https://www.suse.com/security/cve/CVE-2017-16529/" source="CVE"/>
		<reference ref_id="CVE-2017-16531" ref_url="https://www.suse.com/security/cve/CVE-2017-16531/" source="CVE"/>
		<reference ref_id="CVE-2017-16534" ref_url="https://www.suse.com/security/cve/CVE-2017-16534/" source="CVE"/>
		<reference ref_id="CVE-2017-16535" ref_url="https://www.suse.com/security/cve/CVE-2017-16535/" source="CVE"/>
		<reference ref_id="CVE-2017-16536" ref_url="https://www.suse.com/security/cve/CVE-2017-16536/" source="CVE"/>
		<reference ref_id="CVE-2017-16537" ref_url="https://www.suse.com/security/cve/CVE-2017-16537/" source="CVE"/>
		<reference ref_id="CVE-2017-16538" ref_url="https://www.suse.com/security/cve/CVE-2017-16538/" source="CVE"/>
		<reference ref_id="CVE-2017-16644" ref_url="https://www.suse.com/security/cve/CVE-2017-16644/" source="CVE"/>
		<reference ref_id="CVE-2017-16645" ref_url="https://www.suse.com/security/cve/CVE-2017-16645/" source="CVE"/>
		<reference ref_id="CVE-2017-16646" ref_url="https://www.suse.com/security/cve/CVE-2017-16646/" source="CVE"/>
		<reference ref_id="CVE-2017-16647" ref_url="https://www.suse.com/security/cve/CVE-2017-16647/" source="CVE"/>
		<reference ref_id="CVE-2017-16649" ref_url="https://www.suse.com/security/cve/CVE-2017-16649/" source="CVE"/>
		<reference ref_id="CVE-2017-16650" ref_url="https://www.suse.com/security/cve/CVE-2017-16650/" source="CVE"/>
		<reference ref_id="CVE-2017-16911" ref_url="https://www.suse.com/security/cve/CVE-2017-16911/" source="CVE"/>
		<reference ref_id="CVE-2017-16912" ref_url="https://www.suse.com/security/cve/CVE-2017-16912/" source="CVE"/>
		<reference ref_id="CVE-2017-16913" ref_url="https://www.suse.com/security/cve/CVE-2017-16913/" source="CVE"/>
		<reference ref_id="CVE-2017-16914" ref_url="https://www.suse.com/security/cve/CVE-2017-16914/" source="CVE"/>
		<reference ref_id="CVE-2017-16939" ref_url="https://www.suse.com/security/cve/CVE-2017-16939/" source="CVE"/>
		<reference ref_id="CVE-2017-16994" ref_url="https://www.suse.com/security/cve/CVE-2017-16994/" source="CVE"/>
		<reference ref_id="CVE-2017-16995" ref_url="https://www.suse.com/security/cve/CVE-2017-16995/" source="CVE"/>
		<reference ref_id="CVE-2017-16996" ref_url="https://www.suse.com/security/cve/CVE-2017-16996/" source="CVE"/>
		<reference ref_id="CVE-2017-17052" ref_url="https://www.suse.com/security/cve/CVE-2017-17052/" source="CVE"/>
		<reference ref_id="CVE-2017-17448" ref_url="https://www.suse.com/security/cve/CVE-2017-17448/" source="CVE"/>
		<reference ref_id="CVE-2017-17449" ref_url="https://www.suse.com/security/cve/CVE-2017-17449/" source="CVE"/>
		<reference ref_id="CVE-2017-17450" ref_url="https://www.suse.com/security/cve/CVE-2017-17450/" source="CVE"/>
		<reference ref_id="CVE-2017-17558" ref_url="https://www.suse.com/security/cve/CVE-2017-17558/" source="CVE"/>
		<reference ref_id="CVE-2017-17712" ref_url="https://www.suse.com/security/cve/CVE-2017-17712/" source="CVE"/>
		<reference ref_id="CVE-2017-17741" ref_url="https://www.suse.com/security/cve/CVE-2017-17741/" source="CVE"/>
		<reference ref_id="CVE-2017-17805" ref_url="https://www.suse.com/security/cve/CVE-2017-17805/" source="CVE"/>
		<reference ref_id="CVE-2017-17806" ref_url="https://www.suse.com/security/cve/CVE-2017-17806/" source="CVE"/>
		<reference ref_id="CVE-2017-17852" ref_url="https://www.suse.com/security/cve/CVE-2017-17852/" source="CVE"/>
		<reference ref_id="CVE-2017-17853" ref_url="https://www.suse.com/security/cve/CVE-2017-17853/" source="CVE"/>
		<reference ref_id="CVE-2017-17854" ref_url="https://www.suse.com/security/cve/CVE-2017-17854/" source="CVE"/>
		<reference ref_id="CVE-2017-17855" ref_url="https://www.suse.com/security/cve/CVE-2017-17855/" source="CVE"/>
		<reference ref_id="CVE-2017-17856" ref_url="https://www.suse.com/security/cve/CVE-2017-17856/" source="CVE"/>
		<reference ref_id="CVE-2017-17857" ref_url="https://www.suse.com/security/cve/CVE-2017-17857/" source="CVE"/>
		<reference ref_id="CVE-2017-17862" ref_url="https://www.suse.com/security/cve/CVE-2017-17862/" source="CVE"/>
		<reference ref_id="CVE-2017-17864" ref_url="https://www.suse.com/security/cve/CVE-2017-17864/" source="CVE"/>
		<reference ref_id="CVE-2017-17975" ref_url="https://www.suse.com/security/cve/CVE-2017-17975/" source="CVE"/>
		<reference ref_id="CVE-2017-18075" ref_url="https://www.suse.com/security/cve/CVE-2017-18075/" source="CVE"/>
		<reference ref_id="CVE-2017-18202" ref_url="https://www.suse.com/security/cve/CVE-2017-18202/" source="CVE"/>
		<reference ref_id="CVE-2017-18203" ref_url="https://www.suse.com/security/cve/CVE-2017-18203/" source="CVE"/>
		<reference ref_id="CVE-2017-18204" ref_url="https://www.suse.com/security/cve/CVE-2017-18204/" source="CVE"/>
		<reference ref_id="CVE-2017-18208" ref_url="https://www.suse.com/security/cve/CVE-2017-18208/" source="CVE"/>
		<reference ref_id="CVE-2017-18344" ref_url="https://www.suse.com/security/cve/CVE-2017-18344/" source="CVE"/>
		<reference ref_id="CVE-2017-2636" ref_url="https://www.suse.com/security/cve/CVE-2017-2636/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2017-5897" ref_url="https://www.suse.com/security/cve/CVE-2017-5897/" source="CVE"/>
		<reference ref_id="CVE-2017-5970" ref_url="https://www.suse.com/security/cve/CVE-2017-5970/" source="CVE"/>
		<reference ref_id="CVE-2017-5986" ref_url="https://www.suse.com/security/cve/CVE-2017-5986/" source="CVE"/>
		<reference ref_id="CVE-2017-6347" ref_url="https://www.suse.com/security/cve/CVE-2017-6347/" source="CVE"/>
		<reference ref_id="CVE-2017-6353" ref_url="https://www.suse.com/security/cve/CVE-2017-6353/" source="CVE"/>
		<reference ref_id="CVE-2017-7184" ref_url="https://www.suse.com/security/cve/CVE-2017-7184/" source="CVE"/>
		<reference ref_id="CVE-2017-7187" ref_url="https://www.suse.com/security/cve/CVE-2017-7187/" source="CVE"/>
		<reference ref_id="CVE-2017-7261" ref_url="https://www.suse.com/security/cve/CVE-2017-7261/" source="CVE"/>
		<reference ref_id="CVE-2017-7277" ref_url="https://www.suse.com/security/cve/CVE-2017-7277/" source="CVE"/>
		<reference ref_id="CVE-2017-7294" ref_url="https://www.suse.com/security/cve/CVE-2017-7294/" source="CVE"/>
		<reference ref_id="CVE-2017-7308" ref_url="https://www.suse.com/security/cve/CVE-2017-7308/" source="CVE"/>
		<reference ref_id="CVE-2017-7346" ref_url="https://www.suse.com/security/cve/CVE-2017-7346/" source="CVE"/>
		<reference ref_id="CVE-2017-7477" ref_url="https://www.suse.com/security/cve/CVE-2017-7477/" source="CVE"/>
		<reference ref_id="CVE-2017-7487" ref_url="https://www.suse.com/security/cve/CVE-2017-7487/" source="CVE"/>
		<reference ref_id="CVE-2017-7541" ref_url="https://www.suse.com/security/cve/CVE-2017-7541/" source="CVE"/>
		<reference ref_id="CVE-2017-7542" ref_url="https://www.suse.com/security/cve/CVE-2017-7542/" source="CVE"/>
		<reference ref_id="CVE-2017-8824" ref_url="https://www.suse.com/security/cve/CVE-2017-8824/" source="CVE"/>
		<reference ref_id="CVE-2017-8831" ref_url="https://www.suse.com/security/cve/CVE-2017-8831/" source="CVE"/>
		<reference ref_id="CVE-2017-8890" ref_url="https://www.suse.com/security/cve/CVE-2017-8890/" source="CVE"/>
		<reference ref_id="CVE-2017-9059" ref_url="https://www.suse.com/security/cve/CVE-2017-9059/" source="CVE"/>
		<reference ref_id="CVE-2017-9074" ref_url="https://www.suse.com/security/cve/CVE-2017-9074/" source="CVE"/>
		<reference ref_id="CVE-2017-9075" ref_url="https://www.suse.com/security/cve/CVE-2017-9075/" source="CVE"/>
		<reference ref_id="CVE-2017-9076" ref_url="https://www.suse.com/security/cve/CVE-2017-9076/" source="CVE"/>
		<reference ref_id="CVE-2017-9077" ref_url="https://www.suse.com/security/cve/CVE-2017-9077/" source="CVE"/>
		<reference ref_id="CVE-2017-9211" ref_url="https://www.suse.com/security/cve/CVE-2017-9211/" source="CVE"/>
		<reference ref_id="CVE-2017-9242" ref_url="https://www.suse.com/security/cve/CVE-2017-9242/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<reference ref_id="CVE-2018-1000028" ref_url="https://www.suse.com/security/cve/CVE-2018-1000028/" source="CVE"/>
		<reference ref_id="CVE-2018-1000200" ref_url="https://www.suse.com/security/cve/CVE-2018-1000200/" source="CVE"/>
		<reference ref_id="CVE-2018-1000204" ref_url="https://www.suse.com/security/cve/CVE-2018-1000204/" source="CVE"/>
		<reference ref_id="CVE-2018-10087" ref_url="https://www.suse.com/security/cve/CVE-2018-10087/" source="CVE"/>
		<reference ref_id="CVE-2018-10124" ref_url="https://www.suse.com/security/cve/CVE-2018-10124/" source="CVE"/>
		<reference ref_id="CVE-2018-10323" ref_url="https://www.suse.com/security/cve/CVE-2018-10323/" source="CVE"/>
		<reference ref_id="CVE-2018-1065" ref_url="https://www.suse.com/security/cve/CVE-2018-1065/" source="CVE"/>
		<reference ref_id="CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068/" source="CVE"/>
		<reference ref_id="CVE-2018-10853" ref_url="https://www.suse.com/security/cve/CVE-2018-10853/" source="CVE"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-1091" ref_url="https://www.suse.com/security/cve/CVE-2018-1091/" source="CVE"/>
		<reference ref_id="CVE-2018-10938" ref_url="https://www.suse.com/security/cve/CVE-2018-10938/" source="CVE"/>
		<reference ref_id="CVE-2018-1094" ref_url="https://www.suse.com/security/cve/CVE-2018-1094/" source="CVE"/>
		<reference ref_id="CVE-2018-10940" ref_url="https://www.suse.com/security/cve/CVE-2018-10940/" source="CVE"/>
		<reference ref_id="CVE-2018-1108" ref_url="https://www.suse.com/security/cve/CVE-2018-1108/" source="CVE"/>
		<reference ref_id="CVE-2018-1118" ref_url="https://www.suse.com/security/cve/CVE-2018-1118/" source="CVE"/>
		<reference ref_id="CVE-2018-1120" ref_url="https://www.suse.com/security/cve/CVE-2018-1120/" source="CVE"/>
		<reference ref_id="CVE-2018-1128" ref_url="https://www.suse.com/security/cve/CVE-2018-1128/" source="CVE"/>
		<reference ref_id="CVE-2018-1129" ref_url="https://www.suse.com/security/cve/CVE-2018-1129/" source="CVE"/>
		<reference ref_id="CVE-2018-1130" ref_url="https://www.suse.com/security/cve/CVE-2018-1130/" source="CVE"/>
		<reference ref_id="CVE-2018-12233" ref_url="https://www.suse.com/security/cve/CVE-2018-12233/" source="CVE"/>
		<reference ref_id="CVE-2018-12896" ref_url="https://www.suse.com/security/cve/CVE-2018-12896/" source="CVE"/>
		<reference ref_id="CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053/" source="CVE"/>
		<reference ref_id="CVE-2018-13093" ref_url="https://www.suse.com/security/cve/CVE-2018-13093/" source="CVE"/>
		<reference ref_id="CVE-2018-13094" ref_url="https://www.suse.com/security/cve/CVE-2018-13094/" source="CVE"/>
		<reference ref_id="CVE-2018-13095" ref_url="https://www.suse.com/security/cve/CVE-2018-13095/" source="CVE"/>
		<reference ref_id="CVE-2018-13405" ref_url="https://www.suse.com/security/cve/CVE-2018-13405/" source="CVE"/>
		<reference ref_id="CVE-2018-13406" ref_url="https://www.suse.com/security/cve/CVE-2018-13406/" source="CVE"/>
		<reference ref_id="CVE-2018-14613" ref_url="https://www.suse.com/security/cve/CVE-2018-14613/" source="CVE"/>
		<reference ref_id="CVE-2018-14617" ref_url="https://www.suse.com/security/cve/CVE-2018-14617/" source="CVE"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-15572" ref_url="https://www.suse.com/security/cve/CVE-2018-15572/" source="CVE"/>
		<reference ref_id="CVE-2018-16658" ref_url="https://www.suse.com/security/cve/CVE-2018-16658/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<reference ref_id="CVE-2018-3620" ref_url="https://www.suse.com/security/cve/CVE-2018-3620/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-5332" ref_url="https://www.suse.com/security/cve/CVE-2018-5332/" source="CVE"/>
		<reference ref_id="CVE-2018-5333" ref_url="https://www.suse.com/security/cve/CVE-2018-5333/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<reference ref_id="CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391/" source="CVE"/>
		<reference ref_id="CVE-2018-5803" ref_url="https://www.suse.com/security/cve/CVE-2018-5803/" source="CVE"/>
		<reference ref_id="CVE-2018-5848" ref_url="https://www.suse.com/security/cve/CVE-2018-5848/" source="CVE"/>
		<reference ref_id="CVE-2018-6554" ref_url="https://www.suse.com/security/cve/CVE-2018-6554/" source="CVE"/>
		<reference ref_id="CVE-2018-6555" ref_url="https://www.suse.com/security/cve/CVE-2018-6555/" source="CVE"/>
		<reference ref_id="CVE-2018-6927" ref_url="https://www.suse.com/security/cve/CVE-2018-6927/" source="CVE"/>
		<reference ref_id="CVE-2018-7492" ref_url="https://www.suse.com/security/cve/CVE-2018-7492/" source="CVE"/>
		<reference ref_id="CVE-2018-7566" ref_url="https://www.suse.com/security/cve/CVE-2018-7566/" source="CVE"/>
		<reference ref_id="CVE-2018-7740" ref_url="https://www.suse.com/security/cve/CVE-2018-7740/" source="CVE"/>
		<reference ref_id="CVE-2018-8043" ref_url="https://www.suse.com/security/cve/CVE-2018-8043/" source="CVE"/>
		<reference ref_id="CVE-2018-8087" ref_url="https://www.suse.com/security/cve/CVE-2018-8087/" source="CVE"/>
		<reference ref_id="CVE-2018-8781" ref_url="https://www.suse.com/security/cve/CVE-2018-8781/" source="CVE"/>
		<reference ref_id="CVE-2018-8822" ref_url="https://www.suse.com/security/cve/CVE-2018-8822/" source="CVE"/>
		<reference ref_id="CVE-2018-9363" ref_url="https://www.suse.com/security/cve/CVE-2018-9363/" source="CVE"/>
		<reference ref_id="CVE-2018-9385" ref_url="https://www.suse.com/security/cve/CVE-2018-9385/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-default-4.12.14-94.41.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3939/">CVE-2009-3939</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4026/">CVE-2009-4026</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4027/">CVE-2009-4027</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4131/">CVE-2009-4131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4138/">CVE-2009-4138</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4536/">CVE-2009-4536</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4538/">CVE-2009-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1146/">CVE-2010-1146</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1436/">CVE-2010-1436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1641/">CVE-2010-1641</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-2066/">CVE-2010-2066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2942/">CVE-2010-2942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2954/">CVE-2010-2954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2955/">CVE-2010-2955</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3081/">CVE-2010-3081</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3296/">CVE-2010-3296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3297/">CVE-2010-3297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3298/">CVE-2010-3298</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3301/">CVE-2010-3301</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3310/">CVE-2010-3310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0711/">CVE-2011-0711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0712/">CVE-2011-0712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1020/">CVE-2011-1020</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1180/">CVE-2011-1180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1577/">CVE-2011-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1581/">CVE-2011-1581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2203/">CVE-2011-2203</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4604/">CVE-2011-4604</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0056/">CVE-2012-0056</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3412/">CVE-2012-3412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3520/">CVE-2012-3520</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0160/">CVE-2013-0160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0231/">CVE-2013-0231</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0913/">CVE-2013-0913</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2850/">CVE-2013-2850</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0038/">CVE-2014-0038</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0196/">CVE-2014-0196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0691/">CVE-2014-0691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8133/">CVE-2014-8133</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1333/">CVE-2015-1333</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7550/">CVE-2015-7550</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7884/">CVE-2015-7884</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7885/">CVE-2015-7885</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8539/">CVE-2015-8539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8660/">CVE-2015-8660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0723/">CVE-2016-0723</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0728/">CVE-2016-0728</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1237/">CVE-2016-1237</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1583/">CVE-2016-1583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2184/">CVE-2016-2184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2185/">CVE-2016-2185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2186/">CVE-2016-2186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2384/">CVE-2016-2384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3134/">CVE-2016-3134</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3135/">CVE-2016-3135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3136/">CVE-2016-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3140/">CVE-2016-3140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3689/">CVE-2016-3689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3713/">CVE-2016-3713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4470/">CVE-2016-4470</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4485/">CVE-2016-4485</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4486/">CVE-2016-4486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4557/">CVE-2016-4557</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4558/">CVE-2016-4558</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4569/">CVE-2016-4569</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4578/">CVE-2016-4578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4951/">CVE-2016-4951</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4997/">CVE-2016-4997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4998/">CVE-2016-4998</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5195/">CVE-2016-5195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5244/">CVE-2016-5244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5829/">CVE-2016-5829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6187/">CVE-2016-6187</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6480/">CVE-2016-6480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6516/">CVE-2016-6516</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6828/">CVE-2016-6828</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7039/">CVE-2016-7039</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7042/">CVE-2016-7042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7425/">CVE-2016-7425</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7913/">CVE-2016-7913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8655/">CVE-2016-8655</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9555/">CVE-2016-9555</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9576/">CVE-2016-9576</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000251/">CVE-2017-1000251</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000252/">CVE-2017-1000252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000255/">CVE-2017-1000255</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000380/">CVE-2017-1000380</cve>
	<cve impact="moderate" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000410/">CVE-2017-1000410</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11473/">CVE-2017-11473</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11600/">CVE-2017-11600</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12153/">CVE-2017-12153</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12154/">CVE-2017-12154</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12190/">CVE-2017-12190</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12193/">CVE-2017-12193</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14051/">CVE-2017-14051</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14489/">CVE-2017-14489</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15115/">CVE-2017-15115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15127/">CVE-2017-15127</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15128/">CVE-2017-15128</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-15129/">CVE-2017-15129</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15265/">CVE-2017-15265</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15537/">CVE-2017-15537</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15649/">CVE-2017-15649</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15951/">CVE-2017-15951</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16525/">CVE-2017-16525</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16527/">CVE-2017-16527</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16528/">CVE-2017-16528</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16529/">CVE-2017-16529</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16531/">CVE-2017-16531</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16534/">CVE-2017-16534</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16535/">CVE-2017-16535</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16536/">CVE-2017-16536</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16537/">CVE-2017-16537</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16538/">CVE-2017-16538</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16644/">CVE-2017-16644</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16645/">CVE-2017-16645</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16646/">CVE-2017-16646</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16647/">CVE-2017-16647</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16649/">CVE-2017-16649</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16650/">CVE-2017-16650</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16911/">CVE-2017-16911</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16912/">CVE-2017-16912</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16913/">CVE-2017-16913</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16914/">CVE-2017-16914</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16939/">CVE-2017-16939</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16994/">CVE-2017-16994</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16995/">CVE-2017-16995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16996/">CVE-2017-16996</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17052/">CVE-2017-17052</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17448/">CVE-2017-17448</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17449/">CVE-2017-17449</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17450/">CVE-2017-17450</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17558/">CVE-2017-17558</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17712/">CVE-2017-17712</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17741/">CVE-2017-17741</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17805/">CVE-2017-17805</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17806/">CVE-2017-17806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17852/">CVE-2017-17852</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17853/">CVE-2017-17853</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17854/">CVE-2017-17854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17855/">CVE-2017-17855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17856/">CVE-2017-17856</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17857/">CVE-2017-17857</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17862/">CVE-2017-17862</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17864/">CVE-2017-17864</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17975/">CVE-2017-17975</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18075/">CVE-2017-18075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18202/">CVE-2017-18202</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18203/">CVE-2017-18203</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18204/">CVE-2017-18204</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18208/">CVE-2017-18208</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-18344/">CVE-2017-18344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2636/">CVE-2017-2636</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5897/">CVE-2017-5897</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5970/">CVE-2017-5970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5986/">CVE-2017-5986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6347/">CVE-2017-6347</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6353/">CVE-2017-6353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7184/">CVE-2017-7184</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7187/">CVE-2017-7187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7261/">CVE-2017-7261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7277/">CVE-2017-7277</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7294/">CVE-2017-7294</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7308/">CVE-2017-7308</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7346/">CVE-2017-7346</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7477/">CVE-2017-7477</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7487/">CVE-2017-7487</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7541/">CVE-2017-7541</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7542/">CVE-2017-7542</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8824/">CVE-2017-8824</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8831/">CVE-2017-8831</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8890/">CVE-2017-8890</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9059/">CVE-2017-9059</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9074/">CVE-2017-9074</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9075/">CVE-2017-9075</cve>
	<cve impact="important" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9076/">CVE-2017-9076</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9077/">CVE-2017-9077</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9211/">CVE-2017-9211</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9242/">CVE-2017-9242</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000028/">CVE-2018-1000028</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000200/">CVE-2018-1000200</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000204/">CVE-2018-1000204</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10087/">CVE-2018-10087</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10124/">CVE-2018-10124</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10323/">CVE-2018-10323</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1065/">CVE-2018-1065</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10853/">CVE-2018-10853</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1091/">CVE-2018-1091</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10938/">CVE-2018-10938</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1094/">CVE-2018-1094</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10940/">CVE-2018-10940</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1108/">CVE-2018-1108</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1118/">CVE-2018-1118</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1120/">CVE-2018-1120</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-1128/">CVE-2018-1128</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1129/">CVE-2018-1129</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1130/">CVE-2018-1130</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12233/">CVE-2018-12233</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12896/">CVE-2018-12896</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-13093/">CVE-2018-13093</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13094/">CVE-2018-13094</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-13095/">CVE-2018-13095</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13405/">CVE-2018-13405</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13406/">CVE-2018-13406</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14613/">CVE-2018-14613</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14617/">CVE-2018-14617</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15572/">CVE-2018-15572</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16658/">CVE-2018-16658</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3620/">CVE-2018-3620</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5332/">CVE-2018-5332</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5333/">CVE-2018-5333</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5803/">CVE-2018-5803</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5848/">CVE-2018-5848</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6554/">CVE-2018-6554</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6555/">CVE-2018-6555</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6927/">CVE-2018-6927</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7492/">CVE-2018-7492</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7566/">CVE-2018-7566</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7740/">CVE-2018-7740</cve>
	<cve impact="low" cvss3="0/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-8043/">CVE-2018-8043</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8087/">CVE-2018-8087</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8781/">CVE-2018-8781</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8822/">CVE-2018-8822</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9363/">CVE-2018-9363</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9385/">CVE-2018-9385</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512197" comment="kernel-default-4.12.14-94.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512198" comment="kernel-default-devel-4.12.14-94.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512199" comment="kernel-default-extra-4.12.14-94.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512200" comment="kernel-devel-4.12.14-94.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512201" comment="kernel-macros-4.12.14-94.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512202" comment="kernel-source-4.12.14-94.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512203" comment="kernel-syms-4.12.14-94.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76914" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-20180525-3.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-20180525-3.11 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512204" comment="kernel-firmware-20180525-3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512205" comment="ucode-amd-20180525-3.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76915" version="1" class="patch">
	<metadata>
		<title>krb5-1.12.5-40.28.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2002-2443" ref_url="https://www.suse.com/security/cve/CVE-2002-2443/" source="CVE"/>
		<reference ref_id="CVE-2009-0844" ref_url="https://www.suse.com/security/cve/CVE-2009-0844/" source="CVE"/>
		<reference ref_id="CVE-2009-0845" ref_url="https://www.suse.com/security/cve/CVE-2009-0845/" source="CVE"/>
		<reference ref_id="CVE-2009-0846" ref_url="https://www.suse.com/security/cve/CVE-2009-0846/" source="CVE"/>
		<reference ref_id="CVE-2009-0847" ref_url="https://www.suse.com/security/cve/CVE-2009-0847/" source="CVE"/>
		<reference ref_id="CVE-2009-3295" ref_url="https://www.suse.com/security/cve/CVE-2009-3295/" source="CVE"/>
		<reference ref_id="CVE-2009-4212" ref_url="https://www.suse.com/security/cve/CVE-2009-4212/" source="CVE"/>
		<reference ref_id="CVE-2010-0283" ref_url="https://www.suse.com/security/cve/CVE-2010-0283/" source="CVE"/>
		<reference ref_id="CVE-2010-0628" ref_url="https://www.suse.com/security/cve/CVE-2010-0628/" source="CVE"/>
		<reference ref_id="CVE-2010-1320" ref_url="https://www.suse.com/security/cve/CVE-2010-1320/" source="CVE"/>
		<reference ref_id="CVE-2010-1321" ref_url="https://www.suse.com/security/cve/CVE-2010-1321/" source="CVE"/>
		<reference ref_id="CVE-2010-1322" ref_url="https://www.suse.com/security/cve/CVE-2010-1322/" source="CVE"/>
		<reference ref_id="CVE-2010-1323" ref_url="https://www.suse.com/security/cve/CVE-2010-1323/" source="CVE"/>
		<reference ref_id="CVE-2010-1324" ref_url="https://www.suse.com/security/cve/CVE-2010-1324/" source="CVE"/>
		<reference ref_id="CVE-2010-4020" ref_url="https://www.suse.com/security/cve/CVE-2010-4020/" source="CVE"/>
		<reference ref_id="CVE-2010-4021" ref_url="https://www.suse.com/security/cve/CVE-2010-4021/" source="CVE"/>
		<reference ref_id="CVE-2010-4022" ref_url="https://www.suse.com/security/cve/CVE-2010-4022/" source="CVE"/>
		<reference ref_id="CVE-2011-0281" ref_url="https://www.suse.com/security/cve/CVE-2011-0281/" source="CVE"/>
		<reference ref_id="CVE-2011-0282" ref_url="https://www.suse.com/security/cve/CVE-2011-0282/" source="CVE"/>
		<reference ref_id="CVE-2011-0284" ref_url="https://www.suse.com/security/cve/CVE-2011-0284/" source="CVE"/>
		<reference ref_id="CVE-2011-0285" ref_url="https://www.suse.com/security/cve/CVE-2011-0285/" source="CVE"/>
		<reference ref_id="CVE-2011-1527" ref_url="https://www.suse.com/security/cve/CVE-2011-1527/" source="CVE"/>
		<reference ref_id="CVE-2011-1528" ref_url="https://www.suse.com/security/cve/CVE-2011-1528/" source="CVE"/>
		<reference ref_id="CVE-2011-1529" ref_url="https://www.suse.com/security/cve/CVE-2011-1529/" source="CVE"/>
		<reference ref_id="CVE-2011-1530" ref_url="https://www.suse.com/security/cve/CVE-2011-1530/" source="CVE"/>
		<reference ref_id="CVE-2012-1012" ref_url="https://www.suse.com/security/cve/CVE-2012-1012/" source="CVE"/>
		<reference ref_id="CVE-2012-1013" ref_url="https://www.suse.com/security/cve/CVE-2012-1013/" source="CVE"/>
		<reference ref_id="CVE-2012-1016" ref_url="https://www.suse.com/security/cve/CVE-2012-1016/" source="CVE"/>
		<reference ref_id="CVE-2013-1415" ref_url="https://www.suse.com/security/cve/CVE-2013-1415/" source="CVE"/>
		<reference ref_id="CVE-2013-1417" ref_url="https://www.suse.com/security/cve/CVE-2013-1417/" source="CVE"/>
		<reference ref_id="CVE-2013-1418" ref_url="https://www.suse.com/security/cve/CVE-2013-1418/" source="CVE"/>
		<reference ref_id="CVE-2014-4341" ref_url="https://www.suse.com/security/cve/CVE-2014-4341/" source="CVE"/>
		<reference ref_id="CVE-2014-4342" ref_url="https://www.suse.com/security/cve/CVE-2014-4342/" source="CVE"/>
		<reference ref_id="CVE-2014-4343" ref_url="https://www.suse.com/security/cve/CVE-2014-4343/" source="CVE"/>
		<reference ref_id="CVE-2014-4344" ref_url="https://www.suse.com/security/cve/CVE-2014-4344/" source="CVE"/>
		<reference ref_id="CVE-2014-4345" ref_url="https://www.suse.com/security/cve/CVE-2014-4345/" source="CVE"/>
		<reference ref_id="CVE-2014-5351" ref_url="https://www.suse.com/security/cve/CVE-2014-5351/" source="CVE"/>
		<reference ref_id="CVE-2014-5352" ref_url="https://www.suse.com/security/cve/CVE-2014-5352/" source="CVE"/>
		<reference ref_id="CVE-2014-5353" ref_url="https://www.suse.com/security/cve/CVE-2014-5353/" source="CVE"/>
		<reference ref_id="CVE-2014-5354" ref_url="https://www.suse.com/security/cve/CVE-2014-5354/" source="CVE"/>
		<reference ref_id="CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355/" source="CVE"/>
		<reference ref_id="CVE-2014-9421" ref_url="https://www.suse.com/security/cve/CVE-2014-9421/" source="CVE"/>
		<reference ref_id="CVE-2014-9422" ref_url="https://www.suse.com/security/cve/CVE-2014-9422/" source="CVE"/>
		<reference ref_id="CVE-2014-9423" ref_url="https://www.suse.com/security/cve/CVE-2014-9423/" source="CVE"/>
		<reference ref_id="CVE-2015-2694" ref_url="https://www.suse.com/security/cve/CVE-2015-2694/" source="CVE"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="CVE-2015-2696" ref_url="https://www.suse.com/security/cve/CVE-2015-2696/" source="CVE"/>
		<reference ref_id="CVE-2015-2697" ref_url="https://www.suse.com/security/cve/CVE-2015-2697/" source="CVE"/>
		<reference ref_id="CVE-2015-2698" ref_url="https://www.suse.com/security/cve/CVE-2015-2698/" source="CVE"/>
		<reference ref_id="CVE-2015-8629" ref_url="https://www.suse.com/security/cve/CVE-2015-8629/" source="CVE"/>
		<reference ref_id="CVE-2015-8630" ref_url="https://www.suse.com/security/cve/CVE-2015-8630/" source="CVE"/>
		<reference ref_id="CVE-2015-8631" ref_url="https://www.suse.com/security/cve/CVE-2015-8631/" source="CVE"/>
		<reference ref_id="CVE-2016-3119" ref_url="https://www.suse.com/security/cve/CVE-2016-3119/" source="CVE"/>
		<reference ref_id="CVE-2016-3120" ref_url="https://www.suse.com/security/cve/CVE-2016-3120/" source="CVE"/>
		<reference ref_id="CVE-2017-11462" ref_url="https://www.suse.com/security/cve/CVE-2017-11462/" source="CVE"/>
		<reference ref_id="CVE-2017-15088" ref_url="https://www.suse.com/security/cve/CVE-2017-15088/" source="CVE"/>
		<reference ref_id="CVE-2018-5729" ref_url="https://www.suse.com/security/cve/CVE-2018-5729/" source="CVE"/>
		<reference ref_id="CVE-2018-5730" ref_url="https://www.suse.com/security/cve/CVE-2018-5730/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-1.12.5-40.28.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2002-2443/">CVE-2002-2443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0844/">CVE-2009-0844</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0845/">CVE-2009-0845</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0846/">CVE-2009-0846</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0847/">CVE-2009-0847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3295/">CVE-2009-3295</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-4212/">CVE-2009-4212</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0283/">CVE-2010-0283</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0628/">CVE-2010-0628</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1320/">CVE-2010-1320</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1321/">CVE-2010-1321</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1322/">CVE-2010-1322</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1323/">CVE-2010-1323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1324/">CVE-2010-1324</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4020/">CVE-2010-4020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4021/">CVE-2010-4021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4022/">CVE-2010-4022</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0281/">CVE-2011-0281</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0282/">CVE-2011-0282</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0284/">CVE-2011-0284</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0285/">CVE-2011-0285</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1527/">CVE-2011-1527</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1528/">CVE-2011-1528</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1529/">CVE-2011-1529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1530/">CVE-2011-1530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1012/">CVE-2012-1012</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1013/">CVE-2012-1013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1016/">CVE-2012-1016</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1415/">CVE-2013-1415</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1417/">CVE-2013-1417</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1418/">CVE-2013-1418</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4341/">CVE-2014-4341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4342/">CVE-2014-4342</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4343/">CVE-2014-4343</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4344/">CVE-2014-4344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4345/">CVE-2014-4345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5351/">CVE-2014-5351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5352/">CVE-2014-5352</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5353/">CVE-2014-5353</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5354/">CVE-2014-5354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9421/">CVE-2014-9421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9422/">CVE-2014-9422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9423/">CVE-2014-9423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2694/">CVE-2015-2694</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2696/">CVE-2015-2696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2697/">CVE-2015-2697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2698/">CVE-2015-2698</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8629/">CVE-2015-8629</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8630/">CVE-2015-8630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8631/">CVE-2015-8631</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3119/">CVE-2016-3119</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3120/">CVE-2016-3120</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11462/">CVE-2017-11462</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15088/">CVE-2017-15088</cve>
	<cve impact="moderate" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5729/">CVE-2018-5729</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5730/">CVE-2018-5730</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512206" comment="krb5-1.12.5-40.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512207" comment="krb5-32bit-1.12.5-40.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512208" comment="krb5-client-1.12.5-40.28.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76916" version="1" class="patch">
	<metadata>
		<title>krb5-appl-clients-1.0.3-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-1526" ref_url="https://www.suse.com/security/cve/CVE-2011-1526/" source="CVE"/>
		<reference ref_id="CVE-2011-4862" ref_url="https://www.suse.com/security/cve/CVE-2011-4862/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-appl-clients-1.0.3-1.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1526/">CVE-2011-1526</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4862/">CVE-2011-4862</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140711" comment="krb5-appl-clients-1.0.3-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76917" version="1" class="patch">
	<metadata>
		<title>lcms-1.19-17.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0793" ref_url="https://www.suse.com/security/cve/CVE-2009-0793/" source="CVE"/>
		<reference ref_id="CVE-2013-4276" ref_url="https://www.suse.com/security/cve/CVE-2013-4276/" source="CVE"/>
		<description>
These are all security issues fixed in the lcms-1.19-17.31 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0793/">CVE-2009-0793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4276/">CVE-2013-4276</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141435" comment="lcms-1.19-17.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140713" comment="liblcms1-1.19-17.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140714" comment="liblcms1-32bit-1.19-17.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76918" version="1" class="patch">
	<metadata>
		<title>lcms2-2.7-9.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-10165" ref_url="https://www.suse.com/security/cve/CVE-2016-10165/" source="CVE"/>
		<reference ref_id="CVE-2018-16435" ref_url="https://www.suse.com/security/cve/CVE-2018-16435/" source="CVE"/>
		<description>
These are all security issues fixed in the lcms2-2.7-9.7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10165/">CVE-2016-10165</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16435/">CVE-2018-16435</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512209" comment="lcms2-2.7-9.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512210" comment="liblcms2-2-2.7-9.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512211" comment="liblcms2-2-32bit-2.7-9.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76919" version="1" class="patch">
	<metadata>
		<title>lftp-4.7.4-3.3.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139/" source="CVE"/>
		<description>
These are all security issues fixed in the lftp-4.7.4-3.3.20 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512212" comment="lftp-4.7.4-3.3.20 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76920" version="1" class="patch">
	<metadata>
		<title>lhasa-0.2.0-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-2347" ref_url="https://www.suse.com/security/cve/CVE-2016-2347/" source="CVE"/>
		<description>
These are all security issues fixed in the lhasa-0.2.0-5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2347/">CVE-2016-2347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009126431" comment="lhasa-0.2.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009126432" comment="liblhasa0-0.2.0-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76921" version="1" class="patch">
	<metadata>
		<title>libFLAC++6-1.3.0-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-8962" ref_url="https://www.suse.com/security/cve/CVE-2014-8962/" source="CVE"/>
		<reference ref_id="CVE-2014-9028" ref_url="https://www.suse.com/security/cve/CVE-2014-9028/" source="CVE"/>
		<description>
These are all security issues fixed in the libFLAC++6-1.3.0-11.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8962/">CVE-2014-8962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9028/">CVE-2014-9028</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140571" comment="libFLAC++6-1.3.0-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142129" comment="libFLAC++6-32bit-1.3.0-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140572" comment="libFLAC8-1.3.0-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140573" comment="libFLAC8-32bit-1.3.0-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76922" version="1" class="patch">
	<metadata>
		<title>libHX28-3.18-1.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-2947" ref_url="https://www.suse.com/security/cve/CVE-2010-2947/" source="CVE"/>
		<description>
These are all security issues fixed in the libHX28-3.18-1.19 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2947/">CVE-2010-2947</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140717" comment="libHX28-3.18-1.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140718" comment="libHX28-32bit-3.18-1.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76923" version="1" class="patch">
	<metadata>
		<title>libICE6-1.0.8-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-2626" ref_url="https://www.suse.com/security/cve/CVE-2017-2626/" source="CVE"/>
		<description>
These are all security issues fixed in the libICE6-1.0.8-12.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-2626/">CVE-2017-2626</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009170845" comment="libICE6-1.0.8-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009170846" comment="libICE6-32bit-1.0.8-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76924" version="1" class="patch">
	<metadata>
		<title>libIlmImf-Imf_2_1-21-2.1.0-6.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-1720" ref_url="https://www.suse.com/security/cve/CVE-2009-1720/" source="CVE"/>
		<reference ref_id="CVE-2009-1721" ref_url="https://www.suse.com/security/cve/CVE-2009-1721/" source="CVE"/>
		<reference ref_id="CVE-2017-12596" ref_url="https://www.suse.com/security/cve/CVE-2017-12596/" source="CVE"/>
		<reference ref_id="CVE-2017-9110" ref_url="https://www.suse.com/security/cve/CVE-2017-9110/" source="CVE"/>
		<reference ref_id="CVE-2017-9114" ref_url="https://www.suse.com/security/cve/CVE-2017-9114/" source="CVE"/>
		<description>
These are all security issues fixed in the libIlmImf-Imf_2_1-21-2.1.0-6.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1720/">CVE-2009-1720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1721/">CVE-2009-1721</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12596/">CVE-2017-12596</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9110/">CVE-2017-9110</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9114/">CVE-2017-9114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009172641" comment="libIlmImf-Imf_2_1-21-2.1.0-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009172642" comment="libIlmImf-Imf_2_1-21-32bit-2.1.0-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009172643" comment="openexr-2.1.0-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76925" version="1" class="patch">
	<metadata>
		<title>libQt5Concurrent5-5.6.2-6.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-0295" ref_url="https://www.suse.com/security/cve/CVE-2015-0295/" source="CVE"/>
		<reference ref_id="CVE-2015-1858" ref_url="https://www.suse.com/security/cve/CVE-2015-1858/" source="CVE"/>
		<reference ref_id="CVE-2015-1859" ref_url="https://www.suse.com/security/cve/CVE-2015-1859/" source="CVE"/>
		<reference ref_id="CVE-2015-1860" ref_url="https://www.suse.com/security/cve/CVE-2015-1860/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Concurrent5-5.6.2-6.12.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0295/">CVE-2015-0295</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1858/">CVE-2015-1858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1859/">CVE-2015-1859</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1860/">CVE-2015-1860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512213" comment="libQt5Concurrent5-5.6.2-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512214" comment="libQt5Core5-5.6.2-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512215" comment="libQt5DBus5-5.6.2-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512216" comment="libQt5Gui5-5.6.2-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512217" comment="libQt5Network5-5.6.2-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512218" comment="libQt5OpenGL5-5.6.2-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512219" comment="libQt5PrintSupport5-5.6.2-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512220" comment="libQt5Sql5-5.6.2-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512221" comment="libQt5Sql5-mysql-5.6.2-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512222" comment="libQt5Sql5-postgresql-5.6.2-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512223" comment="libQt5Sql5-sqlite-5.6.2-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512224" comment="libQt5Sql5-unixODBC-5.6.2-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512225" comment="libQt5Test5-5.6.2-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512226" comment="libQt5Widgets5-5.6.2-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512227" comment="libQt5Xml5-5.6.2-6.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76926" version="1" class="patch">
	<metadata>
		<title>libQt5WebKit5-5.6.2-1.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-8079" ref_url="https://www.suse.com/security/cve/CVE-2015-8079/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5WebKit5-5.6.2-1.31 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8079/">CVE-2015-8079</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159059" comment="libQt5WebKit5-5.6.2-1.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159060" comment="libQt5WebKit5-imports-5.6.2-1.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159061" comment="libQt5WebKitWidgets5-5.6.2-1.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76927" version="1" class="patch">
	<metadata>
		<title>libSoundTouch0-1.7.1-5.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2018-1000223" ref_url="https://www.suse.com/security/cve/CVE-2018-1000223/" source="CVE"/>
		<description>
These are all security issues fixed in the libSoundTouch0-1.7.1-5.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000223/">CVE-2018-1000223</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512228" comment="libSoundTouch0-1.7.1-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512229" comment="libSoundTouch0-32bit-1.7.1-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512230" comment="soundtouch-1.7.1-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76928" version="1" class="patch">
	<metadata>
		<title>libX11-6-1.6.2-12.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1981" ref_url="https://www.suse.com/security/cve/CVE-2013-1981/" source="CVE"/>
		<reference ref_id="CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997/" source="CVE"/>
		<reference ref_id="CVE-2013-2004" ref_url="https://www.suse.com/security/cve/CVE-2013-2004/" source="CVE"/>
		<reference ref_id="CVE-2016-7942" ref_url="https://www.suse.com/security/cve/CVE-2016-7942/" source="CVE"/>
		<reference ref_id="CVE-2018-14598" ref_url="https://www.suse.com/security/cve/CVE-2018-14598/" source="CVE"/>
		<reference ref_id="CVE-2018-14599" ref_url="https://www.suse.com/security/cve/CVE-2018-14599/" source="CVE"/>
		<reference ref_id="CVE-2018-14600" ref_url="https://www.suse.com/security/cve/CVE-2018-14600/" source="CVE"/>
		<description>
These are all security issues fixed in the libX11-6-1.6.2-12.5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1981/">CVE-2013-1981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2004/">CVE-2013-2004</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7942/">CVE-2016-7942</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14598/">CVE-2018-14598</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14599/">CVE-2018-14599</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14600/">CVE-2018-14600</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512231" comment="libX11-6-1.6.2-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512232" comment="libX11-6-32bit-1.6.2-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512233" comment="libX11-data-1.6.2-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512234" comment="libX11-xcb1-1.6.2-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512235" comment="libX11-xcb1-32bit-1.6.2-12.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76929" version="1" class="patch">
	<metadata>
		<title>libXRes1-1.0.7-3.54 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1988" ref_url="https://www.suse.com/security/cve/CVE-2013-1988/" source="CVE"/>
		<description>
These are all security issues fixed in the libXRes1-1.0.7-3.54 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1988/">CVE-2013-1988</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140744" comment="libXRes1-1.0.7-3.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140745" comment="libXRes1-32bit-1.0.7-3.54 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76930" version="1" class="patch">
	<metadata>
		<title>libXcursor1-1.1.14-4.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-2003" ref_url="https://www.suse.com/security/cve/CVE-2013-2003/" source="CVE"/>
		<reference ref_id="CVE-2015-9262" ref_url="https://www.suse.com/security/cve/CVE-2015-9262/" source="CVE"/>
		<reference ref_id="CVE-2017-16612" ref_url="https://www.suse.com/security/cve/CVE-2017-16612/" source="CVE"/>
		<description>
These are all security issues fixed in the libXcursor1-1.1.14-4.6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2003/">CVE-2013-2003</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-9262/">CVE-2015-9262</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16612/">CVE-2017-16612</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512236" comment="libXcursor1-1.1.14-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512237" comment="libXcursor1-32bit-1.1.14-4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76931" version="1" class="patch">
	<metadata>
		<title>libXdmcp6-1.1.1-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-2625" ref_url="https://www.suse.com/security/cve/CVE-2017-2625/" source="CVE"/>
		<description>
These are all security issues fixed in the libXdmcp6-1.1.1-12.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2625/">CVE-2017-2625</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009170842" comment="libXdmcp6-1.1.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009170843" comment="libXdmcp6-32bit-1.1.1-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76932" version="1" class="patch">
	<metadata>
		<title>libXext6-1.3.2-4.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1982" ref_url="https://www.suse.com/security/cve/CVE-2013-1982/" source="CVE"/>
		<description>
These are all security issues fixed in the libXext6-1.3.2-4.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1982/">CVE-2013-1982</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512238" comment="libXext6-1.3.2-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512239" comment="libXext6-32bit-1.3.2-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76933" version="1" class="patch">
	<metadata>
		<title>libXfixes3-32bit-5.0.1-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1983" ref_url="https://www.suse.com/security/cve/CVE-2013-1983/" source="CVE"/>
		<reference ref_id="CVE-2016-7944" ref_url="https://www.suse.com/security/cve/CVE-2016-7944/" source="CVE"/>
		<description>
These are all security issues fixed in the libXfixes3-32bit-5.0.1-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1983/">CVE-2013-1983</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7944/">CVE-2016-7944</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009135061" comment="libXfixes3-5.0.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009135062" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76934" version="1" class="patch">
	<metadata>
		<title>libXfont1-1.5.1-11.3.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<reference ref_id="CVE-2013-6462" ref_url="https://www.suse.com/security/cve/CVE-2013-6462/" source="CVE"/>
		<reference ref_id="CVE-2014-0209" ref_url="https://www.suse.com/security/cve/CVE-2014-0209/" source="CVE"/>
		<reference ref_id="CVE-2014-0210" ref_url="https://www.suse.com/security/cve/CVE-2014-0210/" source="CVE"/>
		<reference ref_id="CVE-2014-0211" ref_url="https://www.suse.com/security/cve/CVE-2014-0211/" source="CVE"/>
		<reference ref_id="CVE-2015-1802" ref_url="https://www.suse.com/security/cve/CVE-2015-1802/" source="CVE"/>
		<reference ref_id="CVE-2015-1803" ref_url="https://www.suse.com/security/cve/CVE-2015-1803/" source="CVE"/>
		<reference ref_id="CVE-2015-1804" ref_url="https://www.suse.com/security/cve/CVE-2015-1804/" source="CVE"/>
		<reference ref_id="CVE-2017-13720" ref_url="https://www.suse.com/security/cve/CVE-2017-13720/" source="CVE"/>
		<reference ref_id="CVE-2017-13722" ref_url="https://www.suse.com/security/cve/CVE-2017-13722/" source="CVE"/>
		<description>
These are all security issues fixed in the libXfont1-1.5.1-11.3.12 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6462/">CVE-2013-6462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0209/">CVE-2014-0209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0210/">CVE-2014-0210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0211/">CVE-2014-0211</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1802/">CVE-2015-1802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1803/">CVE-2015-1803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1804/">CVE-2015-1804</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-13720/">CVE-2017-13720</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13722/">CVE-2017-13722</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009170838" comment="libXfont1-1.5.1-11.3.12 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76935" version="1" class="patch">
	<metadata>
		<title>libXfont2-2-2.0.3-1.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-16611" ref_url="https://www.suse.com/security/cve/CVE-2017-16611/" source="CVE"/>
		<description>
These are all security issues fixed in the libXfont2-2-2.0.3-1.19 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16611/">CVE-2017-16611</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512240" comment="libXfont2-2-2.0.3-1.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76936" version="1" class="patch">
	<metadata>
		<title>libXi6-1.7.4-17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1984" ref_url="https://www.suse.com/security/cve/CVE-2013-1984/" source="CVE"/>
		<reference ref_id="CVE-2013-1995" ref_url="https://www.suse.com/security/cve/CVE-2013-1995/" source="CVE"/>
		<reference ref_id="CVE-2013-1998" ref_url="https://www.suse.com/security/cve/CVE-2013-1998/" source="CVE"/>
		<reference ref_id="CVE-2016-7945" ref_url="https://www.suse.com/security/cve/CVE-2016-7945/" source="CVE"/>
		<reference ref_id="CVE-2016-7946" ref_url="https://www.suse.com/security/cve/CVE-2016-7946/" source="CVE"/>
		<description>
These are all security issues fixed in the libXi6-1.7.4-17.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1984/">CVE-2013-1984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1995/">CVE-2013-1995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1998/">CVE-2013-1998</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7945/">CVE-2016-7945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7946/">CVE-2016-7946</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009136640" comment="libXi6-1.7.4-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009136641" comment="libXi6-32bit-1.7.4-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76937" version="1" class="patch">
	<metadata>
		<title>libXinerama1-1.1.3-3.55 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1985" ref_url="https://www.suse.com/security/cve/CVE-2013-1985/" source="CVE"/>
		<description>
These are all security issues fixed in the libXinerama1-1.1.3-3.55 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1985/">CVE-2013-1985</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140755" comment="libXinerama1-1.1.3-3.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140756" comment="libXinerama1-32bit-1.1.3-3.55 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76938" version="1" class="patch">
	<metadata>
		<title>libXp6-1.0.2-3.58 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-2062" ref_url="https://www.suse.com/security/cve/CVE-2013-2062/" source="CVE"/>
		<description>
These are all security issues fixed in the libXp6-1.0.2-3.58 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2062/">CVE-2013-2062</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140757" comment="libXp6-1.0.2-3.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140758" comment="libXp6-32bit-1.0.2-3.58 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76939" version="1" class="patch">
	<metadata>
		<title>libXpm4-3.5.11-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-10164" ref_url="https://www.suse.com/security/cve/CVE-2016-10164/" source="CVE"/>
		<description>
These are all security issues fixed in the libXpm4-3.5.11-5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10164/">CVE-2016-10164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009148436" comment="libXpm4-3.5.11-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009148437" comment="libXpm4-32bit-3.5.11-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76940" version="1" class="patch">
	<metadata>
		<title>libXrandr2-1.5.0-6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1986" ref_url="https://www.suse.com/security/cve/CVE-2013-1986/" source="CVE"/>
		<reference ref_id="CVE-2016-7947" ref_url="https://www.suse.com/security/cve/CVE-2016-7947/" source="CVE"/>
		<reference ref_id="CVE-2016-7948" ref_url="https://www.suse.com/security/cve/CVE-2016-7948/" source="CVE"/>
		<description>
These are all security issues fixed in the libXrandr2-1.5.0-6.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1986/">CVE-2013-1986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7947/">CVE-2016-7947</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7948/">CVE-2016-7948</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140759" comment="libXrandr2-1.5.0-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140760" comment="libXrandr2-32bit-1.5.0-6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76941" version="1" class="patch">
	<metadata>
		<title>libXrender1-0.9.8-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1987" ref_url="https://www.suse.com/security/cve/CVE-2013-1987/" source="CVE"/>
		<reference ref_id="CVE-2016-7949" ref_url="https://www.suse.com/security/cve/CVE-2016-7949/" source="CVE"/>
		<reference ref_id="CVE-2016-7950" ref_url="https://www.suse.com/security/cve/CVE-2016-7950/" source="CVE"/>
		<description>
These are all security issues fixed in the libXrender1-0.9.8-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1987/">CVE-2013-1987</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7949/">CVE-2016-7949</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7950/">CVE-2016-7950</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009135553" comment="libXrender1-0.9.8-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009135554" comment="libXrender1-32bit-0.9.8-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76942" version="1" class="patch">
	<metadata>
		<title>libXt6-1.1.4-3.59 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-2002" ref_url="https://www.suse.com/security/cve/CVE-2013-2002/" source="CVE"/>
		<reference ref_id="CVE-2013-2005" ref_url="https://www.suse.com/security/cve/CVE-2013-2005/" source="CVE"/>
		<description>
These are all security issues fixed in the libXt6-1.1.4-3.59 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2002/">CVE-2013-2002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2005/">CVE-2013-2005</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140763" comment="libXt6-1.1.4-3.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140764" comment="libXt6-32bit-1.1.4-3.59 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76943" version="1" class="patch">
	<metadata>
		<title>libXtst6-1.2.2-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-2063" ref_url="https://www.suse.com/security/cve/CVE-2013-2063/" source="CVE"/>
		<reference ref_id="CVE-2016-7951" ref_url="https://www.suse.com/security/cve/CVE-2016-7951/" source="CVE"/>
		<reference ref_id="CVE-2016-7952" ref_url="https://www.suse.com/security/cve/CVE-2016-7952/" source="CVE"/>
		<description>
These are all security issues fixed in the libXtst6-1.2.2-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2063/">CVE-2013-2063</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7951/">CVE-2016-7951</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7952/">CVE-2016-7952</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009135081" comment="libXtst6-1.2.2-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009135082" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76944" version="1" class="patch">
	<metadata>
		<title>libXv1-1.0.10-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1989" ref_url="https://www.suse.com/security/cve/CVE-2013-1989/" source="CVE"/>
		<reference ref_id="CVE-2013-2066" ref_url="https://www.suse.com/security/cve/CVE-2013-2066/" source="CVE"/>
		<reference ref_id="CVE-2016-5407" ref_url="https://www.suse.com/security/cve/CVE-2016-5407/" source="CVE"/>
		<description>
These are all security issues fixed in the libXv1-1.0.10-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1989/">CVE-2013-1989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2066/">CVE-2013-2066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5407/">CVE-2016-5407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009135086" comment="libXv1-1.0.10-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009135087" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76945" version="1" class="patch">
	<metadata>
		<title>libXvMC1-1.0.8-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1990" ref_url="https://www.suse.com/security/cve/CVE-2013-1990/" source="CVE"/>
		<reference ref_id="CVE-2013-1999" ref_url="https://www.suse.com/security/cve/CVE-2013-1999/" source="CVE"/>
		<reference ref_id="CVE-2016-7953" ref_url="https://www.suse.com/security/cve/CVE-2016-7953/" source="CVE"/>
		<description>
These are all security issues fixed in the libXvMC1-1.0.8-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1990/">CVE-2013-1990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1999/">CVE-2013-1999</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7953/">CVE-2016-7953</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009135556" comment="libXvMC1-1.0.8-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76946" version="1" class="patch">
	<metadata>
		<title>libXvnc1-1.6.0-18.23.72 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-0011" ref_url="https://www.suse.com/security/cve/CVE-2014-0011/" source="CVE"/>
		<reference ref_id="CVE-2014-8240" ref_url="https://www.suse.com/security/cve/CVE-2014-8240/" source="CVE"/>
		<reference ref_id="CVE-2015-0255" ref_url="https://www.suse.com/security/cve/CVE-2015-0255/" source="CVE"/>
		<description>
These are all security issues fixed in the libXvnc1-1.6.0-18.23.72 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0011/">CVE-2014-0011</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8240/">CVE-2014-8240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0255/">CVE-2015-0255</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512241" comment="libXvnc1-1.6.0-18.23.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512242" comment="tigervnc-1.6.0-18.23.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512243" comment="xorg-x11-Xvnc-1.6.0-18.23.72 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76947" version="1" class="patch">
	<metadata>
		<title>libXxf86dga1-1.1.4-3.59 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1991" ref_url="https://www.suse.com/security/cve/CVE-2013-1991/" source="CVE"/>
		<reference ref_id="CVE-2013-2000" ref_url="https://www.suse.com/security/cve/CVE-2013-2000/" source="CVE"/>
		<description>
These are all security issues fixed in the libXxf86dga1-1.1.4-3.59 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1991/">CVE-2013-1991</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2000/">CVE-2013-2000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140773" comment="libXxf86dga1-1.1.4-3.59 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76948" version="1" class="patch">
	<metadata>
		<title>libXxf86vm1-1.1.3-3.54 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-2001" ref_url="https://www.suse.com/security/cve/CVE-2013-2001/" source="CVE"/>
		<description>
These are all security issues fixed in the libXxf86vm1-1.1.3-3.54 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2001/">CVE-2013-2001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140774" comment="libXxf86vm1-1.1.3-3.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140775" comment="libXxf86vm1-32bit-1.1.3-3.54 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76949" version="1" class="patch">
	<metadata>
		<title>libarchive13-3.1.2-25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-0211" ref_url="https://www.suse.com/security/cve/CVE-2013-0211/" source="CVE"/>
		<reference ref_id="CVE-2015-2304" ref_url="https://www.suse.com/security/cve/CVE-2015-2304/" source="CVE"/>
		<reference ref_id="CVE-2015-8915" ref_url="https://www.suse.com/security/cve/CVE-2015-8915/" source="CVE"/>
		<reference ref_id="CVE-2015-8916" ref_url="https://www.suse.com/security/cve/CVE-2015-8916/" source="CVE"/>
		<reference ref_id="CVE-2015-8918" ref_url="https://www.suse.com/security/cve/CVE-2015-8918/" source="CVE"/>
		<reference ref_id="CVE-2015-8919" ref_url="https://www.suse.com/security/cve/CVE-2015-8919/" source="CVE"/>
		<reference ref_id="CVE-2015-8920" ref_url="https://www.suse.com/security/cve/CVE-2015-8920/" source="CVE"/>
		<reference ref_id="CVE-2015-8921" ref_url="https://www.suse.com/security/cve/CVE-2015-8921/" source="CVE"/>
		<reference ref_id="CVE-2015-8922" ref_url="https://www.suse.com/security/cve/CVE-2015-8922/" source="CVE"/>
		<reference ref_id="CVE-2015-8923" ref_url="https://www.suse.com/security/cve/CVE-2015-8923/" source="CVE"/>
		<reference ref_id="CVE-2015-8924" ref_url="https://www.suse.com/security/cve/CVE-2015-8924/" source="CVE"/>
		<reference ref_id="CVE-2015-8925" ref_url="https://www.suse.com/security/cve/CVE-2015-8925/" source="CVE"/>
		<reference ref_id="CVE-2015-8926" ref_url="https://www.suse.com/security/cve/CVE-2015-8926/" source="CVE"/>
		<reference ref_id="CVE-2015-8928" ref_url="https://www.suse.com/security/cve/CVE-2015-8928/" source="CVE"/>
		<reference ref_id="CVE-2015-8929" ref_url="https://www.suse.com/security/cve/CVE-2015-8929/" source="CVE"/>
		<reference ref_id="CVE-2015-8930" ref_url="https://www.suse.com/security/cve/CVE-2015-8930/" source="CVE"/>
		<reference ref_id="CVE-2015-8931" ref_url="https://www.suse.com/security/cve/CVE-2015-8931/" source="CVE"/>
		<reference ref_id="CVE-2015-8932" ref_url="https://www.suse.com/security/cve/CVE-2015-8932/" source="CVE"/>
		<reference ref_id="CVE-2015-8933" ref_url="https://www.suse.com/security/cve/CVE-2015-8933/" source="CVE"/>
		<reference ref_id="CVE-2015-8934" ref_url="https://www.suse.com/security/cve/CVE-2015-8934/" source="CVE"/>
		<reference ref_id="CVE-2016-1541" ref_url="https://www.suse.com/security/cve/CVE-2016-1541/" source="CVE"/>
		<reference ref_id="CVE-2016-4300" ref_url="https://www.suse.com/security/cve/CVE-2016-4300/" source="CVE"/>
		<reference ref_id="CVE-2016-4301" ref_url="https://www.suse.com/security/cve/CVE-2016-4301/" source="CVE"/>
		<reference ref_id="CVE-2016-4302" ref_url="https://www.suse.com/security/cve/CVE-2016-4302/" source="CVE"/>
		<reference ref_id="CVE-2016-4809" ref_url="https://www.suse.com/security/cve/CVE-2016-4809/" source="CVE"/>
		<reference ref_id="CVE-2016-5418" ref_url="https://www.suse.com/security/cve/CVE-2016-5418/" source="CVE"/>
		<reference ref_id="CVE-2016-5844" ref_url="https://www.suse.com/security/cve/CVE-2016-5844/" source="CVE"/>
		<reference ref_id="CVE-2016-6250" ref_url="https://www.suse.com/security/cve/CVE-2016-6250/" source="CVE"/>
		<reference ref_id="CVE-2016-8687" ref_url="https://www.suse.com/security/cve/CVE-2016-8687/" source="CVE"/>
		<reference ref_id="CVE-2016-8688" ref_url="https://www.suse.com/security/cve/CVE-2016-8688/" source="CVE"/>
		<reference ref_id="CVE-2016-8689" ref_url="https://www.suse.com/security/cve/CVE-2016-8689/" source="CVE"/>
		<description>
These are all security issues fixed in the libarchive13-3.1.2-25.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0211/">CVE-2013-0211</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2304/">CVE-2015-2304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8915/">CVE-2015-8915</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8916/">CVE-2015-8916</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8918/">CVE-2015-8918</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8919/">CVE-2015-8919</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8920/">CVE-2015-8920</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8921/">CVE-2015-8921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8922/">CVE-2015-8922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8923/">CVE-2015-8923</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8924/">CVE-2015-8924</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8925/">CVE-2015-8925</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8926/">CVE-2015-8926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8928/">CVE-2015-8928</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8929/">CVE-2015-8929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8930/">CVE-2015-8930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8931/">CVE-2015-8931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8932/">CVE-2015-8932</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8933/">CVE-2015-8933</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8934/">CVE-2015-8934</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1541/">CVE-2016-1541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4300/">CVE-2016-4300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4301/">CVE-2016-4301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4302/">CVE-2016-4302</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4809/">CVE-2016-4809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5418/">CVE-2016-5418</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5844/">CVE-2016-5844</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6250/">CVE-2016-6250</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8687/">CVE-2016-8687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8688/">CVE-2016-8688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8689/">CVE-2016-8689</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76950" version="1" class="patch">
	<metadata>
		<title>libasan2-32bit-5.3.1+r233831-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<description>
These are all security issues fixed in the libasan2-32bit-5.3.1+r233831-12.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159062" comment="libasan2-5.3.1+r233831-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159063" comment="libasan2-32bit-5.3.1+r233831-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159064" comment="libffi4-5.3.1+r233831-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159065" comment="libffi4-32bit-5.3.1+r233831-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159066" comment="libmpx0-5.3.1+r233831-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159067" comment="libmpx0-32bit-5.3.1+r233831-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159068" comment="libmpxwrappers0-5.3.1+r233831-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159069" comment="libmpxwrappers0-32bit-5.3.1+r233831-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76951" version="1" class="patch">
	<metadata>
		<title>libass5-0.10.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-7969" ref_url="https://www.suse.com/security/cve/CVE-2016-7969/" source="CVE"/>
		<reference ref_id="CVE-2016-7972" ref_url="https://www.suse.com/security/cve/CVE-2016-7972/" source="CVE"/>
		<description>
These are all security issues fixed in the libass5-0.10.2-3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7969/">CVE-2016-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7972/">CVE-2016-7972</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142721" comment="libass5-0.10.2-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76952" version="1" class="patch">
	<metadata>
		<title>libblkid1-2.29.2-7.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-0157" ref_url="https://www.suse.com/security/cve/CVE-2013-0157/" source="CVE"/>
		<reference ref_id="CVE-2014-9114" ref_url="https://www.suse.com/security/cve/CVE-2014-9114/" source="CVE"/>
		<reference ref_id="CVE-2015-5218" ref_url="https://www.suse.com/security/cve/CVE-2015-5218/" source="CVE"/>
		<reference ref_id="CVE-2016-2779" ref_url="https://www.suse.com/security/cve/CVE-2016-2779/" source="CVE"/>
		<reference ref_id="CVE-2016-5011" ref_url="https://www.suse.com/security/cve/CVE-2016-5011/" source="CVE"/>
		<reference ref_id="CVE-2017-2616" ref_url="https://www.suse.com/security/cve/CVE-2017-2616/" source="CVE"/>
		<reference ref_id="CVE-2018-7738" ref_url="https://www.suse.com/security/cve/CVE-2018-7738/" source="CVE"/>
		<description>
These are all security issues fixed in the libblkid1-2.29.2-7.14 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0157/">CVE-2013-0157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9114/">CVE-2014-9114</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5218/">CVE-2015-5218</cve>
	<cve impact="moderate" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2779/">CVE-2016-2779</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5011/">CVE-2016-5011</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2616/">CVE-2017-2616</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7738/">CVE-2018-7738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512244" comment="libblkid1-2.29.2-7.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512245" comment="libblkid1-32bit-2.29.2-7.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512246" comment="libfdisk1-2.29.2-7.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512247" comment="libmount1-2.29.2-7.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512248" comment="libmount1-32bit-2.29.2-7.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512249" comment="libsmartcols1-2.29.2-7.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512250" comment="libuuid-devel-2.29.2-7.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512251" comment="libuuid1-2.29.2-7.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512252" comment="libuuid1-32bit-2.29.2-7.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512253" comment="python-libmount-2.29.2-7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512254" comment="util-linux-2.29.2-7.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512255" comment="util-linux-lang-2.29.2-7.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512256" comment="util-linux-systemd-2.29.2-7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512257" comment="uuidd-2.29.2-7.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76953" version="1" class="patch">
	<metadata>
		<title>libcairo-gobject2-1.15.2-25.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-9082" ref_url="https://www.suse.com/security/cve/CVE-2016-9082/" source="CVE"/>
		<reference ref_id="CVE-2017-7475" ref_url="https://www.suse.com/security/cve/CVE-2017-7475/" source="CVE"/>
		<reference ref_id="CVE-2017-9814" ref_url="https://www.suse.com/security/cve/CVE-2017-9814/" source="CVE"/>
		<description>
These are all security issues fixed in the libcairo-gobject2-1.15.2-25.3.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9082/">CVE-2016-9082</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7475/">CVE-2017-7475</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9814/">CVE-2017-9814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009175342" comment="libcairo-gobject2-1.15.2-25.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009175343" comment="libcairo-gobject2-32bit-1.15.2-25.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009175344" comment="libcairo-script-interpreter2-1.15.2-25.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009175345" comment="libcairo2-1.15.2-25.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009175346" comment="libcairo2-32bit-1.15.2-25.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76954" version="1" class="patch">
	<metadata>
		<title>libcares2-1.9.1-9.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-5180" ref_url="https://www.suse.com/security/cve/CVE-2016-5180/" source="CVE"/>
		<reference ref_id="CVE-2017-1000381" ref_url="https://www.suse.com/security/cve/CVE-2017-1000381/" source="CVE"/>
		<description>
These are all security issues fixed in the libcares2-1.9.1-9.4.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5180/">CVE-2016-5180</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000381/">CVE-2017-1000381</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512258" comment="libcares2-1.9.1-9.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512259" comment="libcares2-32bit-1.9.1-9.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76955" version="1" class="patch">
	<metadata>
		<title>libcdio14-0.90-6.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-18201" ref_url="https://www.suse.com/security/cve/CVE-2017-18201/" source="CVE"/>
		<description>
These are all security issues fixed in the libcdio14-0.90-6.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18201/">CVE-2017-18201</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009173007" comment="libcdio14-0.90-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009173008" comment="libcdio14-32bit-0.90-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009173009" comment="libiso9660-8-0.90-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76956" version="1" class="patch">
	<metadata>
		<title>libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2010-0926" ref_url="https://www.suse.com/security/cve/CVE-2010-0926/" source="CVE"/>
		<reference ref_id="CVE-2010-1635" ref_url="https://www.suse.com/security/cve/CVE-2010-1635/" source="CVE"/>
		<reference ref_id="CVE-2010-1642" ref_url="https://www.suse.com/security/cve/CVE-2010-1642/" source="CVE"/>
		<reference ref_id="CVE-2010-2063" ref_url="https://www.suse.com/security/cve/CVE-2010-2063/" source="CVE"/>
		<reference ref_id="CVE-2010-3069" ref_url="https://www.suse.com/security/cve/CVE-2010-3069/" source="CVE"/>
		<reference ref_id="CVE-2011-0719" ref_url="https://www.suse.com/security/cve/CVE-2011-0719/" source="CVE"/>
		<reference ref_id="CVE-2011-2522" ref_url="https://www.suse.com/security/cve/CVE-2011-2522/" source="CVE"/>
		<reference ref_id="CVE-2011-2694" ref_url="https://www.suse.com/security/cve/CVE-2011-2694/" source="CVE"/>
		<reference ref_id="CVE-2012-0817" ref_url="https://www.suse.com/security/cve/CVE-2012-0817/" source="CVE"/>
		<reference ref_id="CVE-2012-0870" ref_url="https://www.suse.com/security/cve/CVE-2012-0870/" source="CVE"/>
		<reference ref_id="CVE-2012-1182" ref_url="https://www.suse.com/security/cve/CVE-2012-1182/" source="CVE"/>
		<reference ref_id="CVE-2012-2111" ref_url="https://www.suse.com/security/cve/CVE-2012-2111/" source="CVE"/>
		<reference ref_id="CVE-2012-6150" ref_url="https://www.suse.com/security/cve/CVE-2012-6150/" source="CVE"/>
		<reference ref_id="CVE-2013-0172" ref_url="https://www.suse.com/security/cve/CVE-2013-0172/" source="CVE"/>
		<reference ref_id="CVE-2013-0213" ref_url="https://www.suse.com/security/cve/CVE-2013-0213/" source="CVE"/>
		<reference ref_id="CVE-2013-0214" ref_url="https://www.suse.com/security/cve/CVE-2013-0214/" source="CVE"/>
		<reference ref_id="CVE-2013-0454" ref_url="https://www.suse.com/security/cve/CVE-2013-0454/" source="CVE"/>
		<reference ref_id="CVE-2013-1863" ref_url="https://www.suse.com/security/cve/CVE-2013-1863/" source="CVE"/>
		<reference ref_id="CVE-2013-4124" ref_url="https://www.suse.com/security/cve/CVE-2013-4124/" source="CVE"/>
		<reference ref_id="CVE-2013-4408" ref_url="https://www.suse.com/security/cve/CVE-2013-4408/" source="CVE"/>
		<reference ref_id="CVE-2013-4475" ref_url="https://www.suse.com/security/cve/CVE-2013-4475/" source="CVE"/>
		<reference ref_id="CVE-2013-4476" ref_url="https://www.suse.com/security/cve/CVE-2013-4476/" source="CVE"/>
		<reference ref_id="CVE-2013-4496" ref_url="https://www.suse.com/security/cve/CVE-2013-4496/" source="CVE"/>
		<reference ref_id="CVE-2013-6442" ref_url="https://www.suse.com/security/cve/CVE-2013-6442/" source="CVE"/>
		<reference ref_id="CVE-2014-0178" ref_url="https://www.suse.com/security/cve/CVE-2014-0178/" source="CVE"/>
		<reference ref_id="CVE-2014-0239" ref_url="https://www.suse.com/security/cve/CVE-2014-0239/" source="CVE"/>
		<reference ref_id="CVE-2014-0244" ref_url="https://www.suse.com/security/cve/CVE-2014-0244/" source="CVE"/>
		<reference ref_id="CVE-2014-3493" ref_url="https://www.suse.com/security/cve/CVE-2014-3493/" source="CVE"/>
		<reference ref_id="CVE-2014-3560" ref_url="https://www.suse.com/security/cve/CVE-2014-3560/" source="CVE"/>
		<reference ref_id="CVE-2014-8143" ref_url="https://www.suse.com/security/cve/CVE-2014-8143/" source="CVE"/>
		<reference ref_id="CVE-2015-0240" ref_url="https://www.suse.com/security/cve/CVE-2015-0240/" source="CVE"/>
		<reference ref_id="CVE-2015-3223" ref_url="https://www.suse.com/security/cve/CVE-2015-3223/" source="CVE"/>
		<reference ref_id="CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252/" source="CVE"/>
		<reference ref_id="CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296/" source="CVE"/>
		<reference ref_id="CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<reference ref_id="CVE-2015-5370" ref_url="https://www.suse.com/security/cve/CVE-2015-5370/" source="CVE"/>
		<reference ref_id="CVE-2015-7560" ref_url="https://www.suse.com/security/cve/CVE-2015-7560/" source="CVE"/>
		<reference ref_id="CVE-2015-8467" ref_url="https://www.suse.com/security/cve/CVE-2015-8467/" source="CVE"/>
		<reference ref_id="CVE-2015-8543" ref_url="https://www.suse.com/security/cve/CVE-2015-8543/" source="CVE"/>
		<reference ref_id="CVE-2016-0771" ref_url="https://www.suse.com/security/cve/CVE-2016-0771/" source="CVE"/>
		<reference ref_id="CVE-2016-2110" ref_url="https://www.suse.com/security/cve/CVE-2016-2110/" source="CVE"/>
		<reference ref_id="CVE-2016-2111" ref_url="https://www.suse.com/security/cve/CVE-2016-2111/" source="CVE"/>
		<reference ref_id="CVE-2016-2112" ref_url="https://www.suse.com/security/cve/CVE-2016-2112/" source="CVE"/>
		<reference ref_id="CVE-2016-2113" ref_url="https://www.suse.com/security/cve/CVE-2016-2113/" source="CVE"/>
		<reference ref_id="CVE-2016-2115" ref_url="https://www.suse.com/security/cve/CVE-2016-2115/" source="CVE"/>
		<reference ref_id="CVE-2016-2118" ref_url="https://www.suse.com/security/cve/CVE-2016-2118/" source="CVE"/>
		<reference ref_id="CVE-2016-2119" ref_url="https://www.suse.com/security/cve/CVE-2016-2119/" source="CVE"/>
		<reference ref_id="CVE-2016-2123" ref_url="https://www.suse.com/security/cve/CVE-2016-2123/" source="CVE"/>
		<reference ref_id="CVE-2016-2125" ref_url="https://www.suse.com/security/cve/CVE-2016-2125/" source="CVE"/>
		<reference ref_id="CVE-2016-2126" ref_url="https://www.suse.com/security/cve/CVE-2016-2126/" source="CVE"/>
		<reference ref_id="CVE-2017-11103" ref_url="https://www.suse.com/security/cve/CVE-2017-11103/" source="CVE"/>
		<reference ref_id="CVE-2017-12150" ref_url="https://www.suse.com/security/cve/CVE-2017-12150/" source="CVE"/>
		<reference ref_id="CVE-2017-12151" ref_url="https://www.suse.com/security/cve/CVE-2017-12151/" source="CVE"/>
		<reference ref_id="CVE-2017-12163" ref_url="https://www.suse.com/security/cve/CVE-2017-12163/" source="CVE"/>
		<reference ref_id="CVE-2017-14746" ref_url="https://www.suse.com/security/cve/CVE-2017-14746/" source="CVE"/>
		<reference ref_id="CVE-2017-15275" ref_url="https://www.suse.com/security/cve/CVE-2017-15275/" source="CVE"/>
		<reference ref_id="CVE-2017-2619" ref_url="https://www.suse.com/security/cve/CVE-2017-2619/" source="CVE"/>
		<reference ref_id="CVE-2017-7494" ref_url="https://www.suse.com/security/cve/CVE-2017-7494/" source="CVE"/>
		<reference ref_id="CVE-2018-1050" ref_url="https://www.suse.com/security/cve/CVE-2018-1050/" source="CVE"/>
		<reference ref_id="CVE-2018-1057" ref_url="https://www.suse.com/security/cve/CVE-2018-1057/" source="CVE"/>
		<reference ref_id="CVE-2018-10858" ref_url="https://www.suse.com/security/cve/CVE-2018-10858/" source="CVE"/>
		<reference ref_id="CVE-2018-10919" ref_url="https://www.suse.com/security/cve/CVE-2018-10919/" source="CVE"/>
		<description>
These are all security issues fixed in the libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0926/">CVE-2010-0926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1635/">CVE-2010-1635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1642/">CVE-2010-1642</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2063/">CVE-2010-2063</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3069/">CVE-2010-3069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0719/">CVE-2011-0719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2522/">CVE-2011-2522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2694/">CVE-2011-2694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0817/">CVE-2012-0817</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0870/">CVE-2012-0870</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1182/">CVE-2012-1182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2111/">CVE-2012-2111</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-6150/">CVE-2012-6150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0172/">CVE-2013-0172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0213/">CVE-2013-0213</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0214/">CVE-2013-0214</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0454/">CVE-2013-0454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1863/">CVE-2013-1863</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4124/">CVE-2013-4124</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4408/">CVE-2013-4408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4475/">CVE-2013-4475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4476/">CVE-2013-4476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4496/">CVE-2013-4496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6442/">CVE-2013-6442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0178/">CVE-2014-0178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0239/">CVE-2014-0239</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0244/">CVE-2014-0244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3493/">CVE-2014-3493</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3560/">CVE-2014-3560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8143/">CVE-2014-8143</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0240/">CVE-2015-0240</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3223/">CVE-2015-3223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5370/">CVE-2015-5370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7560/">CVE-2015-7560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8467/">CVE-2015-8467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8543/">CVE-2015-8543</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0771/">CVE-2016-0771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2110/">CVE-2016-2110</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2111/">CVE-2016-2111</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2112/">CVE-2016-2112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2113/">CVE-2016-2113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2115/">CVE-2016-2115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2118/">CVE-2016-2118</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2119/">CVE-2016-2119</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2123/">CVE-2016-2123</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2125/">CVE-2016-2125</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2126/">CVE-2016-2126</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-11103/">CVE-2017-11103</cve>
	<cve impact="moderate" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12150/">CVE-2017-12150</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12151/">CVE-2017-12151</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12163/">CVE-2017-12163</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14746/">CVE-2017-14746</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15275/">CVE-2017-15275</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2619/">CVE-2017-2619</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7494/">CVE-2017-7494</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1050/">CVE-2018-1050</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1057/">CVE-2018-1057</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10858/">CVE-2018-10858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10919/">CVE-2018-10919</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512260" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512261" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512262" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512263" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512264" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512265" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512266" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512267" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512268" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512269" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512270" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512271" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512272" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512273" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512274" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512275" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512276" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512277" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512278" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512279" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512280" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512281" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512282" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512283" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512284" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512285" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512286" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512287" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512288" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512289" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512290" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512291" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512292" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512293" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512294" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512295" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512296" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512297" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512298" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512299" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512300" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512301" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512302" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512303" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76957" version="1" class="patch">
	<metadata>
		<title>libdmx1-1.1.3-3.52 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1992" ref_url="https://www.suse.com/security/cve/CVE-2013-1992/" source="CVE"/>
		<description>
These are all security issues fixed in the libdmx1-1.1.3-3.52 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1992/">CVE-2013-1992</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140838" comment="libdmx1-1.1.3-3.52 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76958" version="1" class="patch">
	<metadata>
		<title>libecpg6-10.5-1.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2007-6600" ref_url="https://www.suse.com/security/cve/CVE-2007-6600/" source="CVE"/>
		<reference ref_id="CVE-2009-4034" ref_url="https://www.suse.com/security/cve/CVE-2009-4034/" source="CVE"/>
		<reference ref_id="CVE-2009-4136" ref_url="https://www.suse.com/security/cve/CVE-2009-4136/" source="CVE"/>
		<reference ref_id="CVE-2010-1169" ref_url="https://www.suse.com/security/cve/CVE-2010-1169/" source="CVE"/>
		<reference ref_id="CVE-2010-1170" ref_url="https://www.suse.com/security/cve/CVE-2010-1170/" source="CVE"/>
		<reference ref_id="CVE-2010-3433" ref_url="https://www.suse.com/security/cve/CVE-2010-3433/" source="CVE"/>
		<reference ref_id="CVE-2012-0866" ref_url="https://www.suse.com/security/cve/CVE-2012-0866/" source="CVE"/>
		<reference ref_id="CVE-2012-0867" ref_url="https://www.suse.com/security/cve/CVE-2012-0867/" source="CVE"/>
		<reference ref_id="CVE-2012-0868" ref_url="https://www.suse.com/security/cve/CVE-2012-0868/" source="CVE"/>
		<reference ref_id="CVE-2012-2143" ref_url="https://www.suse.com/security/cve/CVE-2012-2143/" source="CVE"/>
		<reference ref_id="CVE-2012-2655" ref_url="https://www.suse.com/security/cve/CVE-2012-2655/" source="CVE"/>
		<reference ref_id="CVE-2012-3488" ref_url="https://www.suse.com/security/cve/CVE-2012-3488/" source="CVE"/>
		<reference ref_id="CVE-2012-3489" ref_url="https://www.suse.com/security/cve/CVE-2012-3489/" source="CVE"/>
		<reference ref_id="CVE-2013-0255" ref_url="https://www.suse.com/security/cve/CVE-2013-0255/" source="CVE"/>
		<reference ref_id="CVE-2013-1899" ref_url="https://www.suse.com/security/cve/CVE-2013-1899/" source="CVE"/>
		<reference ref_id="CVE-2013-1900" ref_url="https://www.suse.com/security/cve/CVE-2013-1900/" source="CVE"/>
		<reference ref_id="CVE-2013-1901" ref_url="https://www.suse.com/security/cve/CVE-2013-1901/" source="CVE"/>
		<reference ref_id="CVE-2014-0060" ref_url="https://www.suse.com/security/cve/CVE-2014-0060/" source="CVE"/>
		<reference ref_id="CVE-2014-0061" ref_url="https://www.suse.com/security/cve/CVE-2014-0061/" source="CVE"/>
		<reference ref_id="CVE-2014-0062" ref_url="https://www.suse.com/security/cve/CVE-2014-0062/" source="CVE"/>
		<reference ref_id="CVE-2014-0063" ref_url="https://www.suse.com/security/cve/CVE-2014-0063/" source="CVE"/>
		<reference ref_id="CVE-2014-0064" ref_url="https://www.suse.com/security/cve/CVE-2014-0064/" source="CVE"/>
		<reference ref_id="CVE-2014-0065" ref_url="https://www.suse.com/security/cve/CVE-2014-0065/" source="CVE"/>
		<reference ref_id="CVE-2014-0066" ref_url="https://www.suse.com/security/cve/CVE-2014-0066/" source="CVE"/>
		<reference ref_id="CVE-2014-0067" ref_url="https://www.suse.com/security/cve/CVE-2014-0067/" source="CVE"/>
		<reference ref_id="CVE-2015-3165" ref_url="https://www.suse.com/security/cve/CVE-2015-3165/" source="CVE"/>
		<reference ref_id="CVE-2015-3166" ref_url="https://www.suse.com/security/cve/CVE-2015-3166/" source="CVE"/>
		<reference ref_id="CVE-2015-3167" ref_url="https://www.suse.com/security/cve/CVE-2015-3167/" source="CVE"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-0766" ref_url="https://www.suse.com/security/cve/CVE-2016-0766/" source="CVE"/>
		<reference ref_id="CVE-2016-0773" ref_url="https://www.suse.com/security/cve/CVE-2016-0773/" source="CVE"/>
		<reference ref_id="CVE-2016-2193" ref_url="https://www.suse.com/security/cve/CVE-2016-2193/" source="CVE"/>
		<reference ref_id="CVE-2016-3065" ref_url="https://www.suse.com/security/cve/CVE-2016-3065/" source="CVE"/>
		<reference ref_id="CVE-2017-15098" ref_url="https://www.suse.com/security/cve/CVE-2017-15098/" source="CVE"/>
		<reference ref_id="CVE-2017-15099" ref_url="https://www.suse.com/security/cve/CVE-2017-15099/" source="CVE"/>
		<reference ref_id="CVE-2017-7484" ref_url="https://www.suse.com/security/cve/CVE-2017-7484/" source="CVE"/>
		<reference ref_id="CVE-2017-7485" ref_url="https://www.suse.com/security/cve/CVE-2017-7485/" source="CVE"/>
		<reference ref_id="CVE-2017-7486" ref_url="https://www.suse.com/security/cve/CVE-2017-7486/" source="CVE"/>
		<reference ref_id="CVE-2017-7546" ref_url="https://www.suse.com/security/cve/CVE-2017-7546/" source="CVE"/>
		<reference ref_id="CVE-2017-7547" ref_url="https://www.suse.com/security/cve/CVE-2017-7547/" source="CVE"/>
		<reference ref_id="CVE-2017-7548" ref_url="https://www.suse.com/security/cve/CVE-2017-7548/" source="CVE"/>
		<reference ref_id="CVE-2018-1053" ref_url="https://www.suse.com/security/cve/CVE-2018-1053/" source="CVE"/>
		<reference ref_id="CVE-2018-1058" ref_url="https://www.suse.com/security/cve/CVE-2018-1058/" source="CVE"/>
		<reference ref_id="CVE-2018-10915" ref_url="https://www.suse.com/security/cve/CVE-2018-10915/" source="CVE"/>
		<reference ref_id="CVE-2018-10925" ref_url="https://www.suse.com/security/cve/CVE-2018-10925/" source="CVE"/>
		<reference ref_id="CVE-2018-1115" ref_url="https://www.suse.com/security/cve/CVE-2018-1115/" source="CVE"/>
		<description>
These are all security issues fixed in the libecpg6-10.5-1.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6600/">CVE-2007-6600</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4034/">CVE-2009-4034</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4136/">CVE-2009-4136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1169/">CVE-2010-1169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1170/">CVE-2010-1170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3433/">CVE-2010-3433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0866/">CVE-2012-0866</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0867/">CVE-2012-0867</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0868/">CVE-2012-0868</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2143/">CVE-2012-2143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2655/">CVE-2012-2655</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3488/">CVE-2012-3488</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3489/">CVE-2012-3489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0255/">CVE-2013-0255</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1899/">CVE-2013-1899</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1900/">CVE-2013-1900</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1901/">CVE-2013-1901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0060/">CVE-2014-0060</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0061/">CVE-2014-0061</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0062/">CVE-2014-0062</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0063/">CVE-2014-0063</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0064/">CVE-2014-0064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0065/">CVE-2014-0065</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0066/">CVE-2014-0066</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0067/">CVE-2014-0067</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3165/">CVE-2015-3165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3166/">CVE-2015-3166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3167/">CVE-2015-3167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0766/">CVE-2016-0766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0773/">CVE-2016-0773</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2193/">CVE-2016-2193</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3065/">CVE-2016-3065</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15098/">CVE-2017-15098</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15099/">CVE-2017-15099</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7484/">CVE-2017-7484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7485/">CVE-2017-7485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7486/">CVE-2017-7486</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7546/">CVE-2017-7546</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7547/">CVE-2017-7547</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7548/">CVE-2017-7548</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1053/">CVE-2018-1053</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1058/">CVE-2018-1058</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10915/">CVE-2018-10915</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10925/">CVE-2018-10925</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1115/">CVE-2018-1115</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512304" comment="libecpg6-10.5-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512305" comment="libpq5-10.5-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512306" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512307" comment="postgresql10-10.5-1.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76959" version="1" class="patch">
	<metadata>
		<title>libevent-2_0-5-2.0.21-6.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-6272" ref_url="https://www.suse.com/security/cve/CVE-2014-6272/" source="CVE"/>
		<reference ref_id="CVE-2016-10195" ref_url="https://www.suse.com/security/cve/CVE-2016-10195/" source="CVE"/>
		<reference ref_id="CVE-2016-10196" ref_url="https://www.suse.com/security/cve/CVE-2016-10196/" source="CVE"/>
		<reference ref_id="CVE-2016-10197" ref_url="https://www.suse.com/security/cve/CVE-2016-10197/" source="CVE"/>
		<description>
These are all security issues fixed in the libevent-2_0-5-2.0.21-6.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6272/">CVE-2014-6272</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10195/">CVE-2016-10195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10196/">CVE-2016-10196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10197/">CVE-2016-10197</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009170043" comment="libevent-2_0-5-2.0.21-6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76960" version="1" class="patch">
	<metadata>
		<title>libexempi3-2.2.1-5.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-18233" ref_url="https://www.suse.com/security/cve/CVE-2017-18233/" source="CVE"/>
		<reference ref_id="CVE-2017-18234" ref_url="https://www.suse.com/security/cve/CVE-2017-18234/" source="CVE"/>
		<reference ref_id="CVE-2017-18236" ref_url="https://www.suse.com/security/cve/CVE-2017-18236/" source="CVE"/>
		<reference ref_id="CVE-2017-18238" ref_url="https://www.suse.com/security/cve/CVE-2017-18238/" source="CVE"/>
		<reference ref_id="CVE-2018-7728" ref_url="https://www.suse.com/security/cve/CVE-2018-7728/" source="CVE"/>
		<reference ref_id="CVE-2018-7730" ref_url="https://www.suse.com/security/cve/CVE-2018-7730/" source="CVE"/>
		<description>
These are all security issues fixed in the libexempi3-2.2.1-5.7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18233/">CVE-2017-18233</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18234/">CVE-2017-18234</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18236/">CVE-2017-18236</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18238/">CVE-2017-18238</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7728/">CVE-2018-7728</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7730/">CVE-2018-7730</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512308" comment="libexempi3-2.2.1-5.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76961" version="1" class="patch">
	<metadata>
		<title>libexif12-0.6.21-8.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-2812" ref_url="https://www.suse.com/security/cve/CVE-2012-2812/" source="CVE"/>
		<reference ref_id="CVE-2012-2813" ref_url="https://www.suse.com/security/cve/CVE-2012-2813/" source="CVE"/>
		<reference ref_id="CVE-2012-2814" ref_url="https://www.suse.com/security/cve/CVE-2012-2814/" source="CVE"/>
		<reference ref_id="CVE-2012-2836" ref_url="https://www.suse.com/security/cve/CVE-2012-2836/" source="CVE"/>
		<reference ref_id="CVE-2012-2837" ref_url="https://www.suse.com/security/cve/CVE-2012-2837/" source="CVE"/>
		<reference ref_id="CVE-2012-2840" ref_url="https://www.suse.com/security/cve/CVE-2012-2840/" source="CVE"/>
		<reference ref_id="CVE-2012-2841" ref_url="https://www.suse.com/security/cve/CVE-2012-2841/" source="CVE"/>
		<reference ref_id="CVE-2016-6328" ref_url="https://www.suse.com/security/cve/CVE-2016-6328/" source="CVE"/>
		<reference ref_id="CVE-2017-7544" ref_url="https://www.suse.com/security/cve/CVE-2017-7544/" source="CVE"/>
		<description>
These are all security issues fixed in the libexif12-0.6.21-8.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2812/">CVE-2012-2812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2813/">CVE-2012-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2814/">CVE-2012-2814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2836/">CVE-2012-2836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2837/">CVE-2012-2837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2840/">CVE-2012-2840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2841/">CVE-2012-2841</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-6328/">CVE-2016-6328</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7544/">CVE-2017-7544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009170040" comment="libexif12-0.6.21-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009170041" comment="libexif12-32bit-0.6.21-8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76962" version="1" class="patch">
	<metadata>
		<title>libfbembed2_5-2.5.2.26539-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-2492" ref_url="https://www.suse.com/security/cve/CVE-2013-2492/" source="CVE"/>
		<reference ref_id="CVE-2017-6369" ref_url="https://www.suse.com/security/cve/CVE-2017-6369/" source="CVE"/>
		<description>
These are all security issues fixed in the libfbembed2_5-2.5.2.26539-15.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2492/">CVE-2013-2492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6369/">CVE-2017-6369</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154924" comment="libfbembed2_5-2.5.2.26539-15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76963" version="1" class="patch">
	<metadata>
		<title>libfreebl3-3.29.5-58.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-3640" ref_url="https://www.suse.com/security/cve/CVE-2011-3640/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<reference ref_id="CVE-2013-0791" ref_url="https://www.suse.com/security/cve/CVE-2013-0791/" source="CVE"/>
		<reference ref_id="CVE-2013-1620" ref_url="https://www.suse.com/security/cve/CVE-2013-1620/" source="CVE"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<reference ref_id="CVE-2013-1740" ref_url="https://www.suse.com/security/cve/CVE-2013-1740/" source="CVE"/>
		<reference ref_id="CVE-2013-5605" ref_url="https://www.suse.com/security/cve/CVE-2013-5605/" source="CVE"/>
		<reference ref_id="CVE-2014-1492" ref_url="https://www.suse.com/security/cve/CVE-2014-1492/" source="CVE"/>
		<reference ref_id="CVE-2014-1568" ref_url="https://www.suse.com/security/cve/CVE-2014-1568/" source="CVE"/>
		<reference ref_id="CVE-2014-1569" ref_url="https://www.suse.com/security/cve/CVE-2014-1569/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2016-1938" ref_url="https://www.suse.com/security/cve/CVE-2016-1938/" source="CVE"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1978" ref_url="https://www.suse.com/security/cve/CVE-2016-1978/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="CVE-2016-5285" ref_url="https://www.suse.com/security/cve/CVE-2016-5285/" source="CVE"/>
		<reference ref_id="CVE-2016-8635" ref_url="https://www.suse.com/security/cve/CVE-2016-8635/" source="CVE"/>
		<reference ref_id="CVE-2016-9074" ref_url="https://www.suse.com/security/cve/CVE-2016-9074/" source="CVE"/>
		<reference ref_id="CVE-2016-9574" ref_url="https://www.suse.com/security/cve/CVE-2016-9574/" source="CVE"/>
		<reference ref_id="CVE-2017-7805" ref_url="https://www.suse.com/security/cve/CVE-2017-7805/" source="CVE"/>
		<description>
These are all security issues fixed in the libfreebl3-3.29.5-58.12.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3640/">CVE-2011-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0791/">CVE-2013-0791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1620/">CVE-2013-1620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1740/">CVE-2013-1740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5605/">CVE-2013-5605</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1492/">CVE-2014-1492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1568/">CVE-2014-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1569/">CVE-2014-1569</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1938/">CVE-2016-1938</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1978/">CVE-2016-1978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5285/">CVE-2016-5285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8635/">CVE-2016-8635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9074/">CVE-2016-9074</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9574/">CVE-2016-9574</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7805/">CVE-2017-7805</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512309" comment="libfreebl3-3.29.5-58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512310" comment="libfreebl3-32bit-3.29.5-58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512311" comment="libsoftokn3-3.29.5-58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512312" comment="libsoftokn3-32bit-3.29.5-58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512313" comment="mozilla-nss-3.29.5-58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512314" comment="mozilla-nss-32bit-3.29.5-58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512315" comment="mozilla-nss-certs-3.29.5-58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512316" comment="mozilla-nss-certs-32bit-3.29.5-58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512317" comment="mozilla-nss-sysinit-3.29.5-58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512318" comment="mozilla-nss-sysinit-32bit-3.29.5-58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512319" comment="mozilla-nss-tools-3.29.5-58.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76964" version="1" class="patch">
	<metadata>
		<title>libfreetype6-2.6.3-7.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0946" ref_url="https://www.suse.com/security/cve/CVE-2009-0946/" source="CVE"/>
		<reference ref_id="CVE-2010-2497" ref_url="https://www.suse.com/security/cve/CVE-2010-2497/" source="CVE"/>
		<reference ref_id="CVE-2010-2805" ref_url="https://www.suse.com/security/cve/CVE-2010-2805/" source="CVE"/>
		<reference ref_id="CVE-2010-3053" ref_url="https://www.suse.com/security/cve/CVE-2010-3053/" source="CVE"/>
		<reference ref_id="CVE-2010-3054" ref_url="https://www.suse.com/security/cve/CVE-2010-3054/" source="CVE"/>
		<reference ref_id="CVE-2010-3311" ref_url="https://www.suse.com/security/cve/CVE-2010-3311/" source="CVE"/>
		<reference ref_id="CVE-2010-3814" ref_url="https://www.suse.com/security/cve/CVE-2010-3814/" source="CVE"/>
		<reference ref_id="CVE-2010-3855" ref_url="https://www.suse.com/security/cve/CVE-2010-3855/" source="CVE"/>
		<reference ref_id="CVE-2011-0226" ref_url="https://www.suse.com/security/cve/CVE-2011-0226/" source="CVE"/>
		<reference ref_id="CVE-2011-3256" ref_url="https://www.suse.com/security/cve/CVE-2011-3256/" source="CVE"/>
		<reference ref_id="CVE-2011-3439" ref_url="https://www.suse.com/security/cve/CVE-2011-3439/" source="CVE"/>
		<reference ref_id="CVE-2012-1126" ref_url="https://www.suse.com/security/cve/CVE-2012-1126/" source="CVE"/>
		<reference ref_id="CVE-2012-1127" ref_url="https://www.suse.com/security/cve/CVE-2012-1127/" source="CVE"/>
		<reference ref_id="CVE-2012-1128" ref_url="https://www.suse.com/security/cve/CVE-2012-1128/" source="CVE"/>
		<reference ref_id="CVE-2012-1129" ref_url="https://www.suse.com/security/cve/CVE-2012-1129/" source="CVE"/>
		<reference ref_id="CVE-2012-1130" ref_url="https://www.suse.com/security/cve/CVE-2012-1130/" source="CVE"/>
		<reference ref_id="CVE-2012-1131" ref_url="https://www.suse.com/security/cve/CVE-2012-1131/" source="CVE"/>
		<reference ref_id="CVE-2012-1132" ref_url="https://www.suse.com/security/cve/CVE-2012-1132/" source="CVE"/>
		<reference ref_id="CVE-2012-1133" ref_url="https://www.suse.com/security/cve/CVE-2012-1133/" source="CVE"/>
		<reference ref_id="CVE-2012-1134" ref_url="https://www.suse.com/security/cve/CVE-2012-1134/" source="CVE"/>
		<reference ref_id="CVE-2012-1135" ref_url="https://www.suse.com/security/cve/CVE-2012-1135/" source="CVE"/>
		<reference ref_id="CVE-2012-1136" ref_url="https://www.suse.com/security/cve/CVE-2012-1136/" source="CVE"/>
		<reference ref_id="CVE-2012-1137" ref_url="https://www.suse.com/security/cve/CVE-2012-1137/" source="CVE"/>
		<reference ref_id="CVE-2012-1138" ref_url="https://www.suse.com/security/cve/CVE-2012-1138/" source="CVE"/>
		<reference ref_id="CVE-2012-1139" ref_url="https://www.suse.com/security/cve/CVE-2012-1139/" source="CVE"/>
		<reference ref_id="CVE-2012-1140" ref_url="https://www.suse.com/security/cve/CVE-2012-1140/" source="CVE"/>
		<reference ref_id="CVE-2012-1141" ref_url="https://www.suse.com/security/cve/CVE-2012-1141/" source="CVE"/>
		<reference ref_id="CVE-2012-1142" ref_url="https://www.suse.com/security/cve/CVE-2012-1142/" source="CVE"/>
		<reference ref_id="CVE-2012-1143" ref_url="https://www.suse.com/security/cve/CVE-2012-1143/" source="CVE"/>
		<reference ref_id="CVE-2012-1144" ref_url="https://www.suse.com/security/cve/CVE-2012-1144/" source="CVE"/>
		<reference ref_id="CVE-2012-5668" ref_url="https://www.suse.com/security/cve/CVE-2012-5668/" source="CVE"/>
		<reference ref_id="CVE-2012-5669" ref_url="https://www.suse.com/security/cve/CVE-2012-5669/" source="CVE"/>
		<reference ref_id="CVE-2012-5670" ref_url="https://www.suse.com/security/cve/CVE-2012-5670/" source="CVE"/>
		<reference ref_id="CVE-2014-2240" ref_url="https://www.suse.com/security/cve/CVE-2014-2240/" source="CVE"/>
		<reference ref_id="CVE-2014-2241" ref_url="https://www.suse.com/security/cve/CVE-2014-2241/" source="CVE"/>
		<reference ref_id="CVE-2014-9656" ref_url="https://www.suse.com/security/cve/CVE-2014-9656/" source="CVE"/>
		<reference ref_id="CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657/" source="CVE"/>
		<reference ref_id="CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658/" source="CVE"/>
		<reference ref_id="CVE-2014-9659" ref_url="https://www.suse.com/security/cve/CVE-2014-9659/" source="CVE"/>
		<reference ref_id="CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660/" source="CVE"/>
		<reference ref_id="CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661/" source="CVE"/>
		<reference ref_id="CVE-2014-9662" ref_url="https://www.suse.com/security/cve/CVE-2014-9662/" source="CVE"/>
		<reference ref_id="CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663/" source="CVE"/>
		<reference ref_id="CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664/" source="CVE"/>
		<reference ref_id="CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665/" source="CVE"/>
		<reference ref_id="CVE-2014-9666" ref_url="https://www.suse.com/security/cve/CVE-2014-9666/" source="CVE"/>
		<reference ref_id="CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667/" source="CVE"/>
		<reference ref_id="CVE-2014-9668" ref_url="https://www.suse.com/security/cve/CVE-2014-9668/" source="CVE"/>
		<reference ref_id="CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669/" source="CVE"/>
		<reference ref_id="CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670/" source="CVE"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<reference ref_id="CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672/" source="CVE"/>
		<reference ref_id="CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673/" source="CVE"/>
		<reference ref_id="CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674/" source="CVE"/>
		<reference ref_id="CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675/" source="CVE"/>
		<reference ref_id="CVE-2016-10244" ref_url="https://www.suse.com/security/cve/CVE-2016-10244/" source="CVE"/>
		<reference ref_id="CVE-2017-8105" ref_url="https://www.suse.com/security/cve/CVE-2017-8105/" source="CVE"/>
		<reference ref_id="CVE-2017-8287" ref_url="https://www.suse.com/security/cve/CVE-2017-8287/" source="CVE"/>
		<description>
These are all security issues fixed in the libfreetype6-2.6.3-7.15.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0946/">CVE-2009-0946</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2497/">CVE-2010-2497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2805/">CVE-2010-2805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3053/">CVE-2010-3053</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3054/">CVE-2010-3054</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3311/">CVE-2010-3311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3814/">CVE-2010-3814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3855/">CVE-2010-3855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0226/">CVE-2011-0226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3256/">CVE-2011-3256</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3439/">CVE-2011-3439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1126/">CVE-2012-1126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1127/">CVE-2012-1127</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1128/">CVE-2012-1128</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1129/">CVE-2012-1129</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1130/">CVE-2012-1130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1131/">CVE-2012-1131</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1132/">CVE-2012-1132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1133/">CVE-2012-1133</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1134/">CVE-2012-1134</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1135/">CVE-2012-1135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1136/">CVE-2012-1136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1137/">CVE-2012-1137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1138/">CVE-2012-1138</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1139/">CVE-2012-1139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1140/">CVE-2012-1140</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1141/">CVE-2012-1141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1142/">CVE-2012-1142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1143/">CVE-2012-1143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1144/">CVE-2012-1144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5668/">CVE-2012-5668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5669/">CVE-2012-5669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5670/">CVE-2012-5670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2240/">CVE-2014-2240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2241/">CVE-2014-2241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9656/">CVE-2014-9656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9659/">CVE-2014-9659</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9662/">CVE-2014-9662</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9666/">CVE-2014-9666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9668/">CVE-2014-9668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10244/">CVE-2016-10244</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8105/">CVE-2017-8105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8287/">CVE-2017-8287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009171103" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009171104" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76965" version="1" class="patch">
	<metadata>
		<title>libgadu3-1.11.4-1.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-6487" ref_url="https://www.suse.com/security/cve/CVE-2013-6487/" source="CVE"/>
		<reference ref_id="CVE-2014-3775" ref_url="https://www.suse.com/security/cve/CVE-2014-3775/" source="CVE"/>
		<description>
These are all security issues fixed in the libgadu3-1.11.4-1.12 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6487/">CVE-2013-6487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3775/">CVE-2014-3775</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141521" comment="libgadu3-1.11.4-1.12 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76966" version="1" class="patch">
	<metadata>
		<title>libgc1-7.2d-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-2673" ref_url="https://www.suse.com/security/cve/CVE-2012-2673/" source="CVE"/>
		<reference ref_id="CVE-2016-9427" ref_url="https://www.suse.com/security/cve/CVE-2016-9427/" source="CVE"/>
		<description>
These are all security issues fixed in the libgc1-7.2d-5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2673/">CVE-2012-2673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9427/">CVE-2016-9427</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009136646" comment="libgc1-7.2d-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76967" version="1" class="patch">
	<metadata>
		<title>libgcrypt20-1.6.1-16.61.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-4242" ref_url="https://www.suse.com/security/cve/CVE-2013-4242/" source="CVE"/>
		<reference ref_id="CVE-2014-3591" ref_url="https://www.suse.com/security/cve/CVE-2014-3591/" source="CVE"/>
		<reference ref_id="CVE-2015-0837" ref_url="https://www.suse.com/security/cve/CVE-2015-0837/" source="CVE"/>
		<reference ref_id="CVE-2015-7511" ref_url="https://www.suse.com/security/cve/CVE-2015-7511/" source="CVE"/>
		<reference ref_id="CVE-2016-6313" ref_url="https://www.suse.com/security/cve/CVE-2016-6313/" source="CVE"/>
		<reference ref_id="CVE-2017-7526" ref_url="https://www.suse.com/security/cve/CVE-2017-7526/" source="CVE"/>
		<reference ref_id="CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495/" source="CVE"/>
		<description>
These are all security issues fixed in the libgcrypt20-1.6.1-16.61.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4242/">CVE-2013-4242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3591/">CVE-2014-3591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0837/">CVE-2015-0837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7511/">CVE-2015-7511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6313/">CVE-2016-6313</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7526/">CVE-2017-7526</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512320" comment="libgcrypt20-1.6.1-16.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512321" comment="libgcrypt20-32bit-1.6.1-16.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76968" version="1" class="patch">
	<metadata>
		<title>libgif6-32bit-5.0.5-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-7555" ref_url="https://www.suse.com/security/cve/CVE-2015-7555/" source="CVE"/>
		<reference ref_id="CVE-2016-3977" ref_url="https://www.suse.com/security/cve/CVE-2016-3977/" source="CVE"/>
		<description>
These are all security issues fixed in the libgif6-32bit-5.0.5-12.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7555/">CVE-2015-7555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3977/">CVE-2016-3977</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009126709" comment="libgif6-5.0.5-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009126710" comment="libgif6-32bit-5.0.5-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76969" version="1" class="patch">
	<metadata>
		<title>libgme0-0.6.0-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-9957" ref_url="https://www.suse.com/security/cve/CVE-2016-9957/" source="CVE"/>
		<reference ref_id="CVE-2016-9958" ref_url="https://www.suse.com/security/cve/CVE-2016-9958/" source="CVE"/>
		<reference ref_id="CVE-2016-9959" ref_url="https://www.suse.com/security/cve/CVE-2016-9959/" source="CVE"/>
		<reference ref_id="CVE-2016-9960" ref_url="https://www.suse.com/security/cve/CVE-2016-9960/" source="CVE"/>
		<reference ref_id="CVE-2016-9961" ref_url="https://www.suse.com/security/cve/CVE-2016-9961/" source="CVE"/>
		<description>
These are all security issues fixed in the libgme0-0.6.0-5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9957/">CVE-2016-9957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9958/">CVE-2016-9958</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9959/">CVE-2016-9959</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9960/">CVE-2016-9960</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9961/">CVE-2016-9961</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145377" comment="libgme0-0.6.0-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76970" version="1" class="patch">
	<metadata>
		<title>libgnomesu-2.0.0-353.6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-1946" ref_url="https://www.suse.com/security/cve/CVE-2011-1946/" source="CVE"/>
		<description>
These are all security issues fixed in the libgnomesu-2.0.0-353.6.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1946/">CVE-2011-1946</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140842" comment="libgnomesu-2.0.0-353.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140843" comment="libgnomesu-lang-2.0.0-353.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140844" comment="libgnomesu0-2.0.0-353.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76971" version="1" class="patch">
	<metadata>
		<title>libgraphite2-3-1.3.1-10.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-1521" ref_url="https://www.suse.com/security/cve/CVE-2016-1521/" source="CVE"/>
		<reference ref_id="CVE-2016-1523" ref_url="https://www.suse.com/security/cve/CVE-2016-1523/" source="CVE"/>
		<reference ref_id="CVE-2016-1526" ref_url="https://www.suse.com/security/cve/CVE-2016-1526/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2018-7999" ref_url="https://www.suse.com/security/cve/CVE-2018-7999/" source="CVE"/>
		<description>
These are all security issues fixed in the libgraphite2-3-1.3.1-10.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1521/">CVE-2016-1521</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1523/">CVE-2016-1523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1526/">CVE-2016-1526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7999/">CVE-2018-7999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009174098" comment="libgraphite2-3-1.3.1-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009174099" comment="libgraphite2-3-32bit-1.3.1-10.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76972" version="1" class="patch">
	<metadata>
		<title>libgssglue1-0.4-3.83 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-2709" ref_url="https://www.suse.com/security/cve/CVE-2011-2709/" source="CVE"/>
		<description>
These are all security issues fixed in the libgssglue1-0.4-3.83 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2709/">CVE-2011-2709</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140845" comment="libgssglue1-0.4-3.83 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140846" comment="libgssglue1-32bit-0.4-3.83 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76973" version="1" class="patch">
	<metadata>
		<title>libgypsy0-0.9-6.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-0523" ref_url="https://www.suse.com/security/cve/CVE-2011-0523/" source="CVE"/>
		<reference ref_id="CVE-2011-0524" ref_url="https://www.suse.com/security/cve/CVE-2011-0524/" source="CVE"/>
		<description>
These are all security issues fixed in the libgypsy0-0.9-6.24 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0523/">CVE-2011-0523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0524/">CVE-2011-0524</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140676" comment="libgypsy0-0.9-6.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76974" version="1" class="patch">
	<metadata>
		<title>libhogweed2-2.7.1-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-8803" ref_url="https://www.suse.com/security/cve/CVE-2015-8803/" source="CVE"/>
		<reference ref_id="CVE-2015-8804" ref_url="https://www.suse.com/security/cve/CVE-2015-8804/" source="CVE"/>
		<reference ref_id="CVE-2015-8805" ref_url="https://www.suse.com/security/cve/CVE-2015-8805/" source="CVE"/>
		<reference ref_id="CVE-2016-6489" ref_url="https://www.suse.com/security/cve/CVE-2016-6489/" source="CVE"/>
		<description>
These are all security issues fixed in the libhogweed2-2.7.1-12.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8803/">CVE-2015-8803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8804/">CVE-2015-8804</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8805/">CVE-2015-8805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6489/">CVE-2016-6489</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156348" comment="libhogweed2-2.7.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156349" comment="libhogweed2-32bit-2.7.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156351" comment="libnettle4-2.7.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156352" comment="libnettle4-32bit-2.7.1-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76975" version="1" class="patch">
	<metadata>
		<title>libical1-1.0.1-16.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-5824" ref_url="https://www.suse.com/security/cve/CVE-2016-5824/" source="CVE"/>
		<reference ref_id="CVE-2016-5827" ref_url="https://www.suse.com/security/cve/CVE-2016-5827/" source="CVE"/>
		<reference ref_id="CVE-2016-9584" ref_url="https://www.suse.com/security/cve/CVE-2016-9584/" source="CVE"/>
		<description>
These are all security issues fixed in the libical1-1.0.1-16.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5824/">CVE-2016-5824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5827/">CVE-2016-5827</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9584/">CVE-2016-9584</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159508" comment="libical1-1.0.1-16.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159509" comment="libical1-32bit-1.0.1-16.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76976" version="1" class="patch">
	<metadata>
		<title>libid3tag0-0.15.1b-184.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2004-2779" ref_url="https://www.suse.com/security/cve/CVE-2004-2779/" source="CVE"/>
		<reference ref_id="CVE-2008-2109" ref_url="https://www.suse.com/security/cve/CVE-2008-2109/" source="CVE"/>
		<reference ref_id="CVE-2017-11550" ref_url="https://www.suse.com/security/cve/CVE-2017-11550/" source="CVE"/>
		<reference ref_id="CVE-2017-11551" ref_url="https://www.suse.com/security/cve/CVE-2017-11551/" source="CVE"/>
		<description>
These are all security issues fixed in the libid3tag0-0.15.1b-184.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2004-2779/">CVE-2004-2779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2109/">CVE-2008-2109</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11550/">CVE-2017-11550</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11551/">CVE-2017-11551</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009173108" comment="libid3tag0-0.15.1b-184.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76977" version="1" class="patch">
	<metadata>
		<title>libidn11-1.28-5.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-2059" ref_url="https://www.suse.com/security/cve/CVE-2015-2059/" source="CVE"/>
		<reference ref_id="CVE-2015-8948" ref_url="https://www.suse.com/security/cve/CVE-2015-8948/" source="CVE"/>
		<reference ref_id="CVE-2016-6261" ref_url="https://www.suse.com/security/cve/CVE-2016-6261/" source="CVE"/>
		<reference ref_id="CVE-2016-6262" ref_url="https://www.suse.com/security/cve/CVE-2016-6262/" source="CVE"/>
		<reference ref_id="CVE-2016-6263" ref_url="https://www.suse.com/security/cve/CVE-2016-6263/" source="CVE"/>
		<reference ref_id="CVE-2017-14062" ref_url="https://www.suse.com/security/cve/CVE-2017-14062/" source="CVE"/>
		<description>
These are all security issues fixed in the libidn11-1.28-5.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2059/">CVE-2015-2059</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8948/">CVE-2015-8948</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6261/">CVE-2016-6261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6262/">CVE-2016-6262</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6263/">CVE-2016-6263</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14062/">CVE-2017-14062</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009174162" comment="libidn11-1.28-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009174163" comment="libidn11-32bit-1.28-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76978" version="1" class="patch">
	<metadata>
		<title>libipa_hbac0-1.16.1-2.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-4341" ref_url="https://www.suse.com/security/cve/CVE-2010-4341/" source="CVE"/>
		<reference ref_id="CVE-2011-1758" ref_url="https://www.suse.com/security/cve/CVE-2011-1758/" source="CVE"/>
		<reference ref_id="CVE-2013-0219" ref_url="https://www.suse.com/security/cve/CVE-2013-0219/" source="CVE"/>
		<reference ref_id="CVE-2013-0220" ref_url="https://www.suse.com/security/cve/CVE-2013-0220/" source="CVE"/>
		<reference ref_id="CVE-2013-0287" ref_url="https://www.suse.com/security/cve/CVE-2013-0287/" source="CVE"/>
		<reference ref_id="CVE-2017-12173" ref_url="https://www.suse.com/security/cve/CVE-2017-12173/" source="CVE"/>
		<description>
These are all security issues fixed in the libipa_hbac0-1.16.1-2.8 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4341/">CVE-2010-4341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1758/">CVE-2011-1758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0219/">CVE-2013-0219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0220/">CVE-2013-0220</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0287/">CVE-2013-0287</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12173/">CVE-2017-12173</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512322" comment="libipa_hbac0-1.16.1-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512323" comment="libsss_certmap0-1.16.1-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512324" comment="libsss_idmap0-1.16.1-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512325" comment="libsss_nss_idmap0-1.16.1-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512326" comment="libsss_simpleifp0-1.16.1-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009166514" comment="libsss_sudo-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512327" comment="python-sssd-config-1.16.1-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512328" comment="sssd-1.16.1-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512329" comment="sssd-32bit-1.16.1-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512330" comment="sssd-ad-1.16.1-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512331" comment="sssd-ipa-1.16.1-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512332" comment="sssd-krb5-1.16.1-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512333" comment="sssd-krb5-common-1.16.1-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512334" comment="sssd-ldap-1.16.1-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512335" comment="sssd-proxy-1.16.1-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512336" comment="sssd-tools-1.16.1-2.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76979" version="1" class="patch">
	<metadata>
		<title>libjasper1-1.900.14-195.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-3522" ref_url="https://www.suse.com/security/cve/CVE-2008-3522/" source="CVE"/>
		<reference ref_id="CVE-2011-4516" ref_url="https://www.suse.com/security/cve/CVE-2011-4516/" source="CVE"/>
		<reference ref_id="CVE-2011-4517" ref_url="https://www.suse.com/security/cve/CVE-2011-4517/" source="CVE"/>
		<reference ref_id="CVE-2014-8137" ref_url="https://www.suse.com/security/cve/CVE-2014-8137/" source="CVE"/>
		<reference ref_id="CVE-2014-8138" ref_url="https://www.suse.com/security/cve/CVE-2014-8138/" source="CVE"/>
		<reference ref_id="CVE-2014-8157" ref_url="https://www.suse.com/security/cve/CVE-2014-8157/" source="CVE"/>
		<reference ref_id="CVE-2014-8158" ref_url="https://www.suse.com/security/cve/CVE-2014-8158/" source="CVE"/>
		<reference ref_id="CVE-2014-9029" ref_url="https://www.suse.com/security/cve/CVE-2014-9029/" source="CVE"/>
		<reference ref_id="CVE-2015-5203" ref_url="https://www.suse.com/security/cve/CVE-2015-5203/" source="CVE"/>
		<reference ref_id="CVE-2015-5221" ref_url="https://www.suse.com/security/cve/CVE-2015-5221/" source="CVE"/>
		<reference ref_id="CVE-2016-10251" ref_url="https://www.suse.com/security/cve/CVE-2016-10251/" source="CVE"/>
		<reference ref_id="CVE-2016-1577" ref_url="https://www.suse.com/security/cve/CVE-2016-1577/" source="CVE"/>
		<reference ref_id="CVE-2016-1867" ref_url="https://www.suse.com/security/cve/CVE-2016-1867/" source="CVE"/>
		<reference ref_id="CVE-2016-2089" ref_url="https://www.suse.com/security/cve/CVE-2016-2089/" source="CVE"/>
		<reference ref_id="CVE-2016-2116" ref_url="https://www.suse.com/security/cve/CVE-2016-2116/" source="CVE"/>
		<reference ref_id="CVE-2016-8654" ref_url="https://www.suse.com/security/cve/CVE-2016-8654/" source="CVE"/>
		<reference ref_id="CVE-2016-8690" ref_url="https://www.suse.com/security/cve/CVE-2016-8690/" source="CVE"/>
		<reference ref_id="CVE-2016-8691" ref_url="https://www.suse.com/security/cve/CVE-2016-8691/" source="CVE"/>
		<reference ref_id="CVE-2016-8692" ref_url="https://www.suse.com/security/cve/CVE-2016-8692/" source="CVE"/>
		<reference ref_id="CVE-2016-8693" ref_url="https://www.suse.com/security/cve/CVE-2016-8693/" source="CVE"/>
		<reference ref_id="CVE-2016-8880" ref_url="https://www.suse.com/security/cve/CVE-2016-8880/" source="CVE"/>
		<reference ref_id="CVE-2016-8881" ref_url="https://www.suse.com/security/cve/CVE-2016-8881/" source="CVE"/>
		<reference ref_id="CVE-2016-8882" ref_url="https://www.suse.com/security/cve/CVE-2016-8882/" source="CVE"/>
		<reference ref_id="CVE-2016-8883" ref_url="https://www.suse.com/security/cve/CVE-2016-8883/" source="CVE"/>
		<reference ref_id="CVE-2016-8884" ref_url="https://www.suse.com/security/cve/CVE-2016-8884/" source="CVE"/>
		<reference ref_id="CVE-2016-8885" ref_url="https://www.suse.com/security/cve/CVE-2016-8885/" source="CVE"/>
		<reference ref_id="CVE-2016-8886" ref_url="https://www.suse.com/security/cve/CVE-2016-8886/" source="CVE"/>
		<reference ref_id="CVE-2016-8887" ref_url="https://www.suse.com/security/cve/CVE-2016-8887/" source="CVE"/>
		<reference ref_id="CVE-2016-9262" ref_url="https://www.suse.com/security/cve/CVE-2016-9262/" source="CVE"/>
		<reference ref_id="CVE-2016-9388" ref_url="https://www.suse.com/security/cve/CVE-2016-9388/" source="CVE"/>
		<reference ref_id="CVE-2016-9389" ref_url="https://www.suse.com/security/cve/CVE-2016-9389/" source="CVE"/>
		<reference ref_id="CVE-2016-9390" ref_url="https://www.suse.com/security/cve/CVE-2016-9390/" source="CVE"/>
		<reference ref_id="CVE-2016-9391" ref_url="https://www.suse.com/security/cve/CVE-2016-9391/" source="CVE"/>
		<reference ref_id="CVE-2016-9392" ref_url="https://www.suse.com/security/cve/CVE-2016-9392/" source="CVE"/>
		<reference ref_id="CVE-2016-9393" ref_url="https://www.suse.com/security/cve/CVE-2016-9393/" source="CVE"/>
		<reference ref_id="CVE-2016-9394" ref_url="https://www.suse.com/security/cve/CVE-2016-9394/" source="CVE"/>
		<reference ref_id="CVE-2016-9395" ref_url="https://www.suse.com/security/cve/CVE-2016-9395/" source="CVE"/>
		<reference ref_id="CVE-2016-9398" ref_url="https://www.suse.com/security/cve/CVE-2016-9398/" source="CVE"/>
		<reference ref_id="CVE-2016-9560" ref_url="https://www.suse.com/security/cve/CVE-2016-9560/" source="CVE"/>
		<reference ref_id="CVE-2016-9583" ref_url="https://www.suse.com/security/cve/CVE-2016-9583/" source="CVE"/>
		<reference ref_id="CVE-2016-9591" ref_url="https://www.suse.com/security/cve/CVE-2016-9591/" source="CVE"/>
		<reference ref_id="CVE-2016-9600" ref_url="https://www.suse.com/security/cve/CVE-2016-9600/" source="CVE"/>
		<reference ref_id="CVE-2017-1000050" ref_url="https://www.suse.com/security/cve/CVE-2017-1000050/" source="CVE"/>
		<reference ref_id="CVE-2017-5498" ref_url="https://www.suse.com/security/cve/CVE-2017-5498/" source="CVE"/>
		<reference ref_id="CVE-2017-6850" ref_url="https://www.suse.com/security/cve/CVE-2017-6850/" source="CVE"/>
		<reference ref_id="CVE-2018-9055" ref_url="https://www.suse.com/security/cve/CVE-2018-9055/" source="CVE"/>
		<description>
These are all security issues fixed in the libjasper1-1.900.14-195.8.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3522/">CVE-2008-3522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4516/">CVE-2011-4516</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4517/">CVE-2011-4517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8137/">CVE-2014-8137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8138/">CVE-2014-8138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8157/">CVE-2014-8157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8158/">CVE-2014-8158</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9029/">CVE-2014-9029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5203/">CVE-2015-5203</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5221/">CVE-2015-5221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10251/">CVE-2016-10251</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1577/">CVE-2016-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1867/">CVE-2016-1867</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2089/">CVE-2016-2089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2116/">CVE-2016-2116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8654/">CVE-2016-8654</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8690/">CVE-2016-8690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8691/">CVE-2016-8691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8692/">CVE-2016-8692</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-8693/">CVE-2016-8693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8880/">CVE-2016-8880</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8881/">CVE-2016-8881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8882/">CVE-2016-8882</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8883/">CVE-2016-8883</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8884/">CVE-2016-8884</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8885/">CVE-2016-8885</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8886/">CVE-2016-8886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8887/">CVE-2016-8887</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9262/">CVE-2016-9262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9388/">CVE-2016-9388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9389/">CVE-2016-9389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9390/">CVE-2016-9390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9391/">CVE-2016-9391</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9392/">CVE-2016-9392</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9393/">CVE-2016-9393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9394/">CVE-2016-9394</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9395/">CVE-2016-9395</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9398/">CVE-2016-9398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9560/">CVE-2016-9560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9583/">CVE-2016-9583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9591/">CVE-2016-9591</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9600/">CVE-2016-9600</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000050/">CVE-2017-1000050</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5498/">CVE-2017-5498</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6850/">CVE-2017-6850</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9055/">CVE-2018-9055</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009177649" comment="libjasper1-1.900.14-195.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009177650" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76980" version="1" class="patch">
	<metadata>
		<title>libjavascriptcoregtk-1_0-0-2.4.11-23.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-5112" ref_url="https://www.suse.com/security/cve/CVE-2012-5112/" source="CVE"/>
		<reference ref_id="CVE-2012-5133" ref_url="https://www.suse.com/security/cve/CVE-2012-5133/" source="CVE"/>
		<reference ref_id="CVE-2014-1344" ref_url="https://www.suse.com/security/cve/CVE-2014-1344/" source="CVE"/>
		<reference ref_id="CVE-2014-1384" ref_url="https://www.suse.com/security/cve/CVE-2014-1384/" source="CVE"/>
		<reference ref_id="CVE-2014-1385" ref_url="https://www.suse.com/security/cve/CVE-2014-1385/" source="CVE"/>
		<reference ref_id="CVE-2014-1386" ref_url="https://www.suse.com/security/cve/CVE-2014-1386/" source="CVE"/>
		<reference ref_id="CVE-2014-1387" ref_url="https://www.suse.com/security/cve/CVE-2014-1387/" source="CVE"/>
		<reference ref_id="CVE-2014-1388" ref_url="https://www.suse.com/security/cve/CVE-2014-1388/" source="CVE"/>
		<reference ref_id="CVE-2014-1389" ref_url="https://www.suse.com/security/cve/CVE-2014-1389/" source="CVE"/>
		<reference ref_id="CVE-2014-1390" ref_url="https://www.suse.com/security/cve/CVE-2014-1390/" source="CVE"/>
		<reference ref_id="CVE-2014-1748" ref_url="https://www.suse.com/security/cve/CVE-2014-1748/" source="CVE"/>
		<reference ref_id="CVE-2015-1071" ref_url="https://www.suse.com/security/cve/CVE-2015-1071/" source="CVE"/>
		<reference ref_id="CVE-2015-1076" ref_url="https://www.suse.com/security/cve/CVE-2015-1076/" source="CVE"/>
		<reference ref_id="CVE-2015-1081" ref_url="https://www.suse.com/security/cve/CVE-2015-1081/" source="CVE"/>
		<reference ref_id="CVE-2015-1083" ref_url="https://www.suse.com/security/cve/CVE-2015-1083/" source="CVE"/>
		<reference ref_id="CVE-2015-1120" ref_url="https://www.suse.com/security/cve/CVE-2015-1120/" source="CVE"/>
		<reference ref_id="CVE-2015-1122" ref_url="https://www.suse.com/security/cve/CVE-2015-1122/" source="CVE"/>
		<reference ref_id="CVE-2015-1127" ref_url="https://www.suse.com/security/cve/CVE-2015-1127/" source="CVE"/>
		<reference ref_id="CVE-2015-1153" ref_url="https://www.suse.com/security/cve/CVE-2015-1153/" source="CVE"/>
		<reference ref_id="CVE-2015-1155" ref_url="https://www.suse.com/security/cve/CVE-2015-1155/" source="CVE"/>
		<reference ref_id="CVE-2015-2330" ref_url="https://www.suse.com/security/cve/CVE-2015-2330/" source="CVE"/>
		<reference ref_id="CVE-2015-3658" ref_url="https://www.suse.com/security/cve/CVE-2015-3658/" source="CVE"/>
		<reference ref_id="CVE-2015-3659" ref_url="https://www.suse.com/security/cve/CVE-2015-3659/" source="CVE"/>
		<reference ref_id="CVE-2015-3727" ref_url="https://www.suse.com/security/cve/CVE-2015-3727/" source="CVE"/>
		<reference ref_id="CVE-2015-3731" ref_url="https://www.suse.com/security/cve/CVE-2015-3731/" source="CVE"/>
		<reference ref_id="CVE-2015-3741" ref_url="https://www.suse.com/security/cve/CVE-2015-3741/" source="CVE"/>
		<reference ref_id="CVE-2015-3743" ref_url="https://www.suse.com/security/cve/CVE-2015-3743/" source="CVE"/>
		<reference ref_id="CVE-2015-3745" ref_url="https://www.suse.com/security/cve/CVE-2015-3745/" source="CVE"/>
		<reference ref_id="CVE-2015-3747" ref_url="https://www.suse.com/security/cve/CVE-2015-3747/" source="CVE"/>
		<reference ref_id="CVE-2015-3748" ref_url="https://www.suse.com/security/cve/CVE-2015-3748/" source="CVE"/>
		<reference ref_id="CVE-2015-3749" ref_url="https://www.suse.com/security/cve/CVE-2015-3749/" source="CVE"/>
		<reference ref_id="CVE-2015-3752" ref_url="https://www.suse.com/security/cve/CVE-2015-3752/" source="CVE"/>
		<reference ref_id="CVE-2015-5788" ref_url="https://www.suse.com/security/cve/CVE-2015-5788/" source="CVE"/>
		<reference ref_id="CVE-2015-5794" ref_url="https://www.suse.com/security/cve/CVE-2015-5794/" source="CVE"/>
		<reference ref_id="CVE-2015-5801" ref_url="https://www.suse.com/security/cve/CVE-2015-5801/" source="CVE"/>
		<reference ref_id="CVE-2015-5809" ref_url="https://www.suse.com/security/cve/CVE-2015-5809/" source="CVE"/>
		<reference ref_id="CVE-2015-5822" ref_url="https://www.suse.com/security/cve/CVE-2015-5822/" source="CVE"/>
		<reference ref_id="CVE-2015-5928" ref_url="https://www.suse.com/security/cve/CVE-2015-5928/" source="CVE"/>
		<description>
These are all security issues fixed in the libjavascriptcoregtk-1_0-0-2.4.11-23.20 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5112/">CVE-2012-5112</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5133/">CVE-2012-5133</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1344/">CVE-2014-1344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1384/">CVE-2014-1384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1385/">CVE-2014-1385</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1386/">CVE-2014-1386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1387/">CVE-2014-1387</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1388/">CVE-2014-1388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1389/">CVE-2014-1389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1390/">CVE-2014-1390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1748/">CVE-2014-1748</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1071/">CVE-2015-1071</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1076/">CVE-2015-1076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1081/">CVE-2015-1081</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1083/">CVE-2015-1083</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-1120/">CVE-2015-1120</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-1122/">CVE-2015-1122</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-1127/">CVE-2015-1127</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1153/">CVE-2015-1153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1155/">CVE-2015-1155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2330/">CVE-2015-2330</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3658/">CVE-2015-3658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3659/">CVE-2015-3659</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3727/">CVE-2015-3727</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3731/">CVE-2015-3731</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3741/">CVE-2015-3741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3743/">CVE-2015-3743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3745/">CVE-2015-3745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3747/">CVE-2015-3747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3748/">CVE-2015-3748</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3749/">CVE-2015-3749</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3752/">CVE-2015-3752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5788/">CVE-2015-5788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5794/">CVE-2015-5794</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5801/">CVE-2015-5801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5809/">CVE-2015-5809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5822/">CVE-2015-5822</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5928/">CVE-2015-5928</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142131" comment="libjavascriptcoregtk-1_0-0-2.4.11-23.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142132" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142133" comment="libwebkitgtk-1_0-0-2.4.11-23.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142134" comment="libwebkitgtk-1_0-0-32bit-2.4.11-23.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142135" comment="libwebkitgtk2-lang-2.4.11-23.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142136" comment="typelib-1_0-JavaScriptCore-3_0-2.4.11-23.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142137" comment="typelib-1_0-WebKit-3_0-2.4.11-23.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76981" version="1" class="patch">
	<metadata>
		<title>libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-1856" ref_url="https://www.suse.com/security/cve/CVE-2016-1856/" source="CVE"/>
		<reference ref_id="CVE-2016-1857" ref_url="https://www.suse.com/security/cve/CVE-2016-1857/" source="CVE"/>
		<reference ref_id="CVE-2016-4590" ref_url="https://www.suse.com/security/cve/CVE-2016-4590/" source="CVE"/>
		<reference ref_id="CVE-2016-4591" ref_url="https://www.suse.com/security/cve/CVE-2016-4591/" source="CVE"/>
		<reference ref_id="CVE-2016-4622" ref_url="https://www.suse.com/security/cve/CVE-2016-4622/" source="CVE"/>
		<reference ref_id="CVE-2016-4624" ref_url="https://www.suse.com/security/cve/CVE-2016-4624/" source="CVE"/>
		<reference ref_id="CVE-2016-4692" ref_url="https://www.suse.com/security/cve/CVE-2016-4692/" source="CVE"/>
		<reference ref_id="CVE-2016-4743" ref_url="https://www.suse.com/security/cve/CVE-2016-4743/" source="CVE"/>
		<reference ref_id="CVE-2016-7586" ref_url="https://www.suse.com/security/cve/CVE-2016-7586/" source="CVE"/>
		<reference ref_id="CVE-2016-7587" ref_url="https://www.suse.com/security/cve/CVE-2016-7587/" source="CVE"/>
		<reference ref_id="CVE-2016-7589" ref_url="https://www.suse.com/security/cve/CVE-2016-7589/" source="CVE"/>
		<reference ref_id="CVE-2016-7592" ref_url="https://www.suse.com/security/cve/CVE-2016-7592/" source="CVE"/>
		<reference ref_id="CVE-2016-7598" ref_url="https://www.suse.com/security/cve/CVE-2016-7598/" source="CVE"/>
		<reference ref_id="CVE-2016-7599" ref_url="https://www.suse.com/security/cve/CVE-2016-7599/" source="CVE"/>
		<reference ref_id="CVE-2016-7610" ref_url="https://www.suse.com/security/cve/CVE-2016-7610/" source="CVE"/>
		<reference ref_id="CVE-2016-7623" ref_url="https://www.suse.com/security/cve/CVE-2016-7623/" source="CVE"/>
		<reference ref_id="CVE-2016-7632" ref_url="https://www.suse.com/security/cve/CVE-2016-7632/" source="CVE"/>
		<reference ref_id="CVE-2016-7635" ref_url="https://www.suse.com/security/cve/CVE-2016-7635/" source="CVE"/>
		<reference ref_id="CVE-2016-7639" ref_url="https://www.suse.com/security/cve/CVE-2016-7639/" source="CVE"/>
		<reference ref_id="CVE-2016-7641" ref_url="https://www.suse.com/security/cve/CVE-2016-7641/" source="CVE"/>
		<reference ref_id="CVE-2016-7645" ref_url="https://www.suse.com/security/cve/CVE-2016-7645/" source="CVE"/>
		<reference ref_id="CVE-2016-7652" ref_url="https://www.suse.com/security/cve/CVE-2016-7652/" source="CVE"/>
		<reference ref_id="CVE-2016-7654" ref_url="https://www.suse.com/security/cve/CVE-2016-7654/" source="CVE"/>
		<reference ref_id="CVE-2016-7656" ref_url="https://www.suse.com/security/cve/CVE-2016-7656/" source="CVE"/>
		<reference ref_id="CVE-2017-1000121" ref_url="https://www.suse.com/security/cve/CVE-2017-1000121/" source="CVE"/>
		<reference ref_id="CVE-2017-1000122" ref_url="https://www.suse.com/security/cve/CVE-2017-1000122/" source="CVE"/>
		<reference ref_id="CVE-2017-13788" ref_url="https://www.suse.com/security/cve/CVE-2017-13788/" source="CVE"/>
		<reference ref_id="CVE-2017-13798" ref_url="https://www.suse.com/security/cve/CVE-2017-13798/" source="CVE"/>
		<reference ref_id="CVE-2017-13803" ref_url="https://www.suse.com/security/cve/CVE-2017-13803/" source="CVE"/>
		<reference ref_id="CVE-2017-13856" ref_url="https://www.suse.com/security/cve/CVE-2017-13856/" source="CVE"/>
		<reference ref_id="CVE-2017-13866" ref_url="https://www.suse.com/security/cve/CVE-2017-13866/" source="CVE"/>
		<reference ref_id="CVE-2017-13870" ref_url="https://www.suse.com/security/cve/CVE-2017-13870/" source="CVE"/>
		<reference ref_id="CVE-2017-13884" ref_url="https://www.suse.com/security/cve/CVE-2017-13884/" source="CVE"/>
		<reference ref_id="CVE-2017-13885" ref_url="https://www.suse.com/security/cve/CVE-2017-13885/" source="CVE"/>
		<reference ref_id="CVE-2017-2350" ref_url="https://www.suse.com/security/cve/CVE-2017-2350/" source="CVE"/>
		<reference ref_id="CVE-2017-2354" ref_url="https://www.suse.com/security/cve/CVE-2017-2354/" source="CVE"/>
		<reference ref_id="CVE-2017-2355" ref_url="https://www.suse.com/security/cve/CVE-2017-2355/" source="CVE"/>
		<reference ref_id="CVE-2017-2356" ref_url="https://www.suse.com/security/cve/CVE-2017-2356/" source="CVE"/>
		<reference ref_id="CVE-2017-2362" ref_url="https://www.suse.com/security/cve/CVE-2017-2362/" source="CVE"/>
		<reference ref_id="CVE-2017-2363" ref_url="https://www.suse.com/security/cve/CVE-2017-2363/" source="CVE"/>
		<reference ref_id="CVE-2017-2364" ref_url="https://www.suse.com/security/cve/CVE-2017-2364/" source="CVE"/>
		<reference ref_id="CVE-2017-2365" ref_url="https://www.suse.com/security/cve/CVE-2017-2365/" source="CVE"/>
		<reference ref_id="CVE-2017-2366" ref_url="https://www.suse.com/security/cve/CVE-2017-2366/" source="CVE"/>
		<reference ref_id="CVE-2017-2369" ref_url="https://www.suse.com/security/cve/CVE-2017-2369/" source="CVE"/>
		<reference ref_id="CVE-2017-2371" ref_url="https://www.suse.com/security/cve/CVE-2017-2371/" source="CVE"/>
		<reference ref_id="CVE-2017-2373" ref_url="https://www.suse.com/security/cve/CVE-2017-2373/" source="CVE"/>
		<reference ref_id="CVE-2017-2496" ref_url="https://www.suse.com/security/cve/CVE-2017-2496/" source="CVE"/>
		<reference ref_id="CVE-2017-2510" ref_url="https://www.suse.com/security/cve/CVE-2017-2510/" source="CVE"/>
		<reference ref_id="CVE-2017-2538" ref_url="https://www.suse.com/security/cve/CVE-2017-2538/" source="CVE"/>
		<reference ref_id="CVE-2017-2539" ref_url="https://www.suse.com/security/cve/CVE-2017-2539/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-7006" ref_url="https://www.suse.com/security/cve/CVE-2017-7006/" source="CVE"/>
		<reference ref_id="CVE-2017-7011" ref_url="https://www.suse.com/security/cve/CVE-2017-7011/" source="CVE"/>
		<reference ref_id="CVE-2017-7012" ref_url="https://www.suse.com/security/cve/CVE-2017-7012/" source="CVE"/>
		<reference ref_id="CVE-2017-7018" ref_url="https://www.suse.com/security/cve/CVE-2017-7018/" source="CVE"/>
		<reference ref_id="CVE-2017-7019" ref_url="https://www.suse.com/security/cve/CVE-2017-7019/" source="CVE"/>
		<reference ref_id="CVE-2017-7020" ref_url="https://www.suse.com/security/cve/CVE-2017-7020/" source="CVE"/>
		<reference ref_id="CVE-2017-7030" ref_url="https://www.suse.com/security/cve/CVE-2017-7030/" source="CVE"/>
		<reference ref_id="CVE-2017-7034" ref_url="https://www.suse.com/security/cve/CVE-2017-7034/" source="CVE"/>
		<reference ref_id="CVE-2017-7037" ref_url="https://www.suse.com/security/cve/CVE-2017-7037/" source="CVE"/>
		<reference ref_id="CVE-2017-7038" ref_url="https://www.suse.com/security/cve/CVE-2017-7038/" source="CVE"/>
		<reference ref_id="CVE-2017-7039" ref_url="https://www.suse.com/security/cve/CVE-2017-7039/" source="CVE"/>
		<reference ref_id="CVE-2017-7040" ref_url="https://www.suse.com/security/cve/CVE-2017-7040/" source="CVE"/>
		<reference ref_id="CVE-2017-7041" ref_url="https://www.suse.com/security/cve/CVE-2017-7041/" source="CVE"/>
		<reference ref_id="CVE-2017-7042" ref_url="https://www.suse.com/security/cve/CVE-2017-7042/" source="CVE"/>
		<reference ref_id="CVE-2017-7043" ref_url="https://www.suse.com/security/cve/CVE-2017-7043/" source="CVE"/>
		<reference ref_id="CVE-2017-7046" ref_url="https://www.suse.com/security/cve/CVE-2017-7046/" source="CVE"/>
		<reference ref_id="CVE-2017-7048" ref_url="https://www.suse.com/security/cve/CVE-2017-7048/" source="CVE"/>
		<reference ref_id="CVE-2017-7049" ref_url="https://www.suse.com/security/cve/CVE-2017-7049/" source="CVE"/>
		<reference ref_id="CVE-2017-7052" ref_url="https://www.suse.com/security/cve/CVE-2017-7052/" source="CVE"/>
		<reference ref_id="CVE-2017-7055" ref_url="https://www.suse.com/security/cve/CVE-2017-7055/" source="CVE"/>
		<reference ref_id="CVE-2017-7056" ref_url="https://www.suse.com/security/cve/CVE-2017-7056/" source="CVE"/>
		<reference ref_id="CVE-2017-7059" ref_url="https://www.suse.com/security/cve/CVE-2017-7059/" source="CVE"/>
		<reference ref_id="CVE-2017-7061" ref_url="https://www.suse.com/security/cve/CVE-2017-7061/" source="CVE"/>
		<reference ref_id="CVE-2017-7064" ref_url="https://www.suse.com/security/cve/CVE-2017-7064/" source="CVE"/>
		<reference ref_id="CVE-2017-7081" ref_url="https://www.suse.com/security/cve/CVE-2017-7081/" source="CVE"/>
		<reference ref_id="CVE-2017-7087" ref_url="https://www.suse.com/security/cve/CVE-2017-7087/" source="CVE"/>
		<reference ref_id="CVE-2017-7089" ref_url="https://www.suse.com/security/cve/CVE-2017-7089/" source="CVE"/>
		<reference ref_id="CVE-2017-7090" ref_url="https://www.suse.com/security/cve/CVE-2017-7090/" source="CVE"/>
		<reference ref_id="CVE-2017-7091" ref_url="https://www.suse.com/security/cve/CVE-2017-7091/" source="CVE"/>
		<reference ref_id="CVE-2017-7092" ref_url="https://www.suse.com/security/cve/CVE-2017-7092/" source="CVE"/>
		<reference ref_id="CVE-2017-7093" ref_url="https://www.suse.com/security/cve/CVE-2017-7093/" source="CVE"/>
		<reference ref_id="CVE-2017-7094" ref_url="https://www.suse.com/security/cve/CVE-2017-7094/" source="CVE"/>
		<reference ref_id="CVE-2017-7095" ref_url="https://www.suse.com/security/cve/CVE-2017-7095/" source="CVE"/>
		<reference ref_id="CVE-2017-7096" ref_url="https://www.suse.com/security/cve/CVE-2017-7096/" source="CVE"/>
		<reference ref_id="CVE-2017-7098" ref_url="https://www.suse.com/security/cve/CVE-2017-7098/" source="CVE"/>
		<reference ref_id="CVE-2017-7099" ref_url="https://www.suse.com/security/cve/CVE-2017-7099/" source="CVE"/>
		<reference ref_id="CVE-2017-7100" ref_url="https://www.suse.com/security/cve/CVE-2017-7100/" source="CVE"/>
		<reference ref_id="CVE-2017-7102" ref_url="https://www.suse.com/security/cve/CVE-2017-7102/" source="CVE"/>
		<reference ref_id="CVE-2017-7104" ref_url="https://www.suse.com/security/cve/CVE-2017-7104/" source="CVE"/>
		<reference ref_id="CVE-2017-7107" ref_url="https://www.suse.com/security/cve/CVE-2017-7107/" source="CVE"/>
		<reference ref_id="CVE-2017-7109" ref_url="https://www.suse.com/security/cve/CVE-2017-7109/" source="CVE"/>
		<reference ref_id="CVE-2017-7111" ref_url="https://www.suse.com/security/cve/CVE-2017-7111/" source="CVE"/>
		<reference ref_id="CVE-2017-7117" ref_url="https://www.suse.com/security/cve/CVE-2017-7117/" source="CVE"/>
		<reference ref_id="CVE-2017-7120" ref_url="https://www.suse.com/security/cve/CVE-2017-7120/" source="CVE"/>
		<reference ref_id="CVE-2017-7142" ref_url="https://www.suse.com/security/cve/CVE-2017-7142/" source="CVE"/>
		<reference ref_id="CVE-2017-7153" ref_url="https://www.suse.com/security/cve/CVE-2017-7153/" source="CVE"/>
		<reference ref_id="CVE-2017-7156" ref_url="https://www.suse.com/security/cve/CVE-2017-7156/" source="CVE"/>
		<reference ref_id="CVE-2017-7157" ref_url="https://www.suse.com/security/cve/CVE-2017-7157/" source="CVE"/>
		<reference ref_id="CVE-2017-7160" ref_url="https://www.suse.com/security/cve/CVE-2017-7160/" source="CVE"/>
		<reference ref_id="CVE-2017-7161" ref_url="https://www.suse.com/security/cve/CVE-2017-7161/" source="CVE"/>
		<reference ref_id="CVE-2017-7165" ref_url="https://www.suse.com/security/cve/CVE-2017-7165/" source="CVE"/>
		<reference ref_id="CVE-2018-11646" ref_url="https://www.suse.com/security/cve/CVE-2018-11646/" source="CVE"/>
		<reference ref_id="CVE-2018-11712" ref_url="https://www.suse.com/security/cve/CVE-2018-11712/" source="CVE"/>
		<reference ref_id="CVE-2018-11713" ref_url="https://www.suse.com/security/cve/CVE-2018-11713/" source="CVE"/>
		<reference ref_id="CVE-2018-12911" ref_url="https://www.suse.com/security/cve/CVE-2018-12911/" source="CVE"/>
		<reference ref_id="CVE-2018-4088" ref_url="https://www.suse.com/security/cve/CVE-2018-4088/" source="CVE"/>
		<reference ref_id="CVE-2018-4096" ref_url="https://www.suse.com/security/cve/CVE-2018-4096/" source="CVE"/>
		<reference ref_id="CVE-2018-4101" ref_url="https://www.suse.com/security/cve/CVE-2018-4101/" source="CVE"/>
		<reference ref_id="CVE-2018-4113" ref_url="https://www.suse.com/security/cve/CVE-2018-4113/" source="CVE"/>
		<reference ref_id="CVE-2018-4114" ref_url="https://www.suse.com/security/cve/CVE-2018-4114/" source="CVE"/>
		<reference ref_id="CVE-2018-4117" ref_url="https://www.suse.com/security/cve/CVE-2018-4117/" source="CVE"/>
		<reference ref_id="CVE-2018-4118" ref_url="https://www.suse.com/security/cve/CVE-2018-4118/" source="CVE"/>
		<reference ref_id="CVE-2018-4119" ref_url="https://www.suse.com/security/cve/CVE-2018-4119/" source="CVE"/>
		<reference ref_id="CVE-2018-4120" ref_url="https://www.suse.com/security/cve/CVE-2018-4120/" source="CVE"/>
		<reference ref_id="CVE-2018-4121" ref_url="https://www.suse.com/security/cve/CVE-2018-4121/" source="CVE"/>
		<reference ref_id="CVE-2018-4122" ref_url="https://www.suse.com/security/cve/CVE-2018-4122/" source="CVE"/>
		<reference ref_id="CVE-2018-4125" ref_url="https://www.suse.com/security/cve/CVE-2018-4125/" source="CVE"/>
		<reference ref_id="CVE-2018-4127" ref_url="https://www.suse.com/security/cve/CVE-2018-4127/" source="CVE"/>
		<reference ref_id="CVE-2018-4128" ref_url="https://www.suse.com/security/cve/CVE-2018-4128/" source="CVE"/>
		<reference ref_id="CVE-2018-4129" ref_url="https://www.suse.com/security/cve/CVE-2018-4129/" source="CVE"/>
		<reference ref_id="CVE-2018-4133" ref_url="https://www.suse.com/security/cve/CVE-2018-4133/" source="CVE"/>
		<reference ref_id="CVE-2018-4146" ref_url="https://www.suse.com/security/cve/CVE-2018-4146/" source="CVE"/>
		<reference ref_id="CVE-2018-4161" ref_url="https://www.suse.com/security/cve/CVE-2018-4161/" source="CVE"/>
		<reference ref_id="CVE-2018-4162" ref_url="https://www.suse.com/security/cve/CVE-2018-4162/" source="CVE"/>
		<reference ref_id="CVE-2018-4163" ref_url="https://www.suse.com/security/cve/CVE-2018-4163/" source="CVE"/>
		<reference ref_id="CVE-2018-4165" ref_url="https://www.suse.com/security/cve/CVE-2018-4165/" source="CVE"/>
		<reference ref_id="CVE-2018-4190" ref_url="https://www.suse.com/security/cve/CVE-2018-4190/" source="CVE"/>
		<reference ref_id="CVE-2018-4199" ref_url="https://www.suse.com/security/cve/CVE-2018-4199/" source="CVE"/>
		<reference ref_id="CVE-2018-4200" ref_url="https://www.suse.com/security/cve/CVE-2018-4200/" source="CVE"/>
		<reference ref_id="CVE-2018-4204" ref_url="https://www.suse.com/security/cve/CVE-2018-4204/" source="CVE"/>
		<reference ref_id="CVE-2018-4218" ref_url="https://www.suse.com/security/cve/CVE-2018-4218/" source="CVE"/>
		<reference ref_id="CVE-2018-4222" ref_url="https://www.suse.com/security/cve/CVE-2018-4222/" source="CVE"/>
		<reference ref_id="CVE-2018-4232" ref_url="https://www.suse.com/security/cve/CVE-2018-4232/" source="CVE"/>
		<reference ref_id="CVE-2018-4233" ref_url="https://www.suse.com/security/cve/CVE-2018-4233/" source="CVE"/>
		<reference ref_id="CVE-2018-4246" ref_url="https://www.suse.com/security/cve/CVE-2018-4246/" source="CVE"/>
		<description>
These are all security issues fixed in the libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1856/">CVE-2016-1856</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1857/">CVE-2016-1857</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4590/">CVE-2016-4590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4591/">CVE-2016-4591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4622/">CVE-2016-4622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4624/">CVE-2016-4624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4692/">CVE-2016-4692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4743/">CVE-2016-4743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7586/">CVE-2016-7586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7587/">CVE-2016-7587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7589/">CVE-2016-7589</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7592/">CVE-2016-7592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7598/">CVE-2016-7598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7599/">CVE-2016-7599</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7610/">CVE-2016-7610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7623/">CVE-2016-7623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7632/">CVE-2016-7632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7635/">CVE-2016-7635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7639/">CVE-2016-7639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7641/">CVE-2016-7641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7645/">CVE-2016-7645</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7652/">CVE-2016-7652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7654/">CVE-2016-7654</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7656/">CVE-2016-7656</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-1000121/">CVE-2017-1000121</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000122/">CVE-2017-1000122</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13788/">CVE-2017-13788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13798/">CVE-2017-13798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13803/">CVE-2017-13803</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13856/">CVE-2017-13856</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13866/">CVE-2017-13866</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13870/">CVE-2017-13870</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13884/">CVE-2017-13884</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13885/">CVE-2017-13885</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2350/">CVE-2017-2350</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2354/">CVE-2017-2354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2355/">CVE-2017-2355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2356/">CVE-2017-2356</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2362/">CVE-2017-2362</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2363/">CVE-2017-2363</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2364/">CVE-2017-2364</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2365/">CVE-2017-2365</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2366/">CVE-2017-2366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2369/">CVE-2017-2369</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2371/">CVE-2017-2371</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2373/">CVE-2017-2373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2496/">CVE-2017-2496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2510/">CVE-2017-2510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2538/">CVE-2017-2538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2539/">CVE-2017-2539</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7006/">CVE-2017-7006</cve>
	<cve impact="critical" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7011/">CVE-2017-7011</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7012/">CVE-2017-7012</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7018/">CVE-2017-7018</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7019/">CVE-2017-7019</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7020/">CVE-2017-7020</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7030/">CVE-2017-7030</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7034/">CVE-2017-7034</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7037/">CVE-2017-7037</cve>
	<cve impact="critical" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7038/">CVE-2017-7038</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7039/">CVE-2017-7039</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7040/">CVE-2017-7040</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7041/">CVE-2017-7041</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7042/">CVE-2017-7042</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7043/">CVE-2017-7043</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7046/">CVE-2017-7046</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7048/">CVE-2017-7048</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7049/">CVE-2017-7049</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7052/">CVE-2017-7052</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7055/">CVE-2017-7055</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7056/">CVE-2017-7056</cve>
	<cve impact="critical" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7059/">CVE-2017-7059</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7061/">CVE-2017-7061</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7064/">CVE-2017-7064</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7081/">CVE-2017-7081</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7087/">CVE-2017-7087</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7089/">CVE-2017-7089</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7090/">CVE-2017-7090</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7091/">CVE-2017-7091</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7092/">CVE-2017-7092</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7093/">CVE-2017-7093</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7094/">CVE-2017-7094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7095/">CVE-2017-7095</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7096/">CVE-2017-7096</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7098/">CVE-2017-7098</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7099/">CVE-2017-7099</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7100/">CVE-2017-7100</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7102/">CVE-2017-7102</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7104/">CVE-2017-7104</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7107/">CVE-2017-7107</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7109/">CVE-2017-7109</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7111/">CVE-2017-7111</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7117/">CVE-2017-7117</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7120/">CVE-2017-7120</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7142/">CVE-2017-7142</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7153/">CVE-2017-7153</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7156/">CVE-2017-7156</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7157/">CVE-2017-7157</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7160/">CVE-2017-7160</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7161/">CVE-2017-7161</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7165/">CVE-2017-7165</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-11646/">CVE-2018-11646</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11712/">CVE-2018-11712</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11713/">CVE-2018-11713</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12911/">CVE-2018-12911</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4088/">CVE-2018-4088</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4096/">CVE-2018-4096</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4101/">CVE-2018-4101</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-4113/">CVE-2018-4113</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4114/">CVE-2018-4114</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4117/">CVE-2018-4117</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4118/">CVE-2018-4118</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4119/">CVE-2018-4119</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4120/">CVE-2018-4120</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4121/">CVE-2018-4121</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4122/">CVE-2018-4122</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4125/">CVE-2018-4125</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4127/">CVE-2018-4127</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4128/">CVE-2018-4128</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4129/">CVE-2018-4129</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4133/">CVE-2018-4133</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-4146/">CVE-2018-4146</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4161/">CVE-2018-4161</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4162/">CVE-2018-4162</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4163/">CVE-2018-4163</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4165/">CVE-2018-4165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4190/">CVE-2018-4190</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4199/">CVE-2018-4199</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4200/">CVE-2018-4200</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4204/">CVE-2018-4204</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4218/">CVE-2018-4218</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4222/">CVE-2018-4222</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4232/">CVE-2018-4232</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4233/">CVE-2018-4233</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4246/">CVE-2018-4246</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512337" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512338" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512339" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512340" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512341" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512342" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76982" version="1" class="patch">
	<metadata>
		<title>libjbig2-2.0-12.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-6369" ref_url="https://www.suse.com/security/cve/CVE-2013-6369/" source="CVE"/>
		<description>
These are all security issues fixed in the libjbig2-2.0-12.13 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6369/">CVE-2013-6369</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141560" comment="libjbig2-2.0-12.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140690" comment="libjbig2-32bit-2.0-12.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76983" version="1" class="patch">
	<metadata>
		<title>libjpeg-turbo-1.5.3-31.7.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-9092" ref_url="https://www.suse.com/security/cve/CVE-2014-9092/" source="CVE"/>
		<reference ref_id="CVE-2017-15232" ref_url="https://www.suse.com/security/cve/CVE-2017-15232/" source="CVE"/>
		<description>
These are all security issues fixed in the libjpeg-turbo-1.5.3-31.7.4 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9092/">CVE-2014-9092</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15232/">CVE-2017-15232</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009170911" comment="libjpeg-turbo-1.5.3-31.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009170912" comment="libjpeg62-62.2.0-31.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009170913" comment="libjpeg62-32bit-62.2.0-31.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009170914" comment="libjpeg62-turbo-1.5.3-31.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009170915" comment="libjpeg8-8.1.2-31.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009170916" comment="libjpeg8-32bit-8.1.2-31.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009170917" comment="libturbojpeg0-8.1.2-31.7.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76984" version="1" class="patch">
	<metadata>
		<title>libjson-c2-0.11-2.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-6370" ref_url="https://www.suse.com/security/cve/CVE-2013-6370/" source="CVE"/>
		<reference ref_id="CVE-2013-6371" ref_url="https://www.suse.com/security/cve/CVE-2013-6371/" source="CVE"/>
		<description>
These are all security issues fixed in the libjson-c2-0.11-2.22 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6370/">CVE-2013-6370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6371/">CVE-2013-6371</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140691" comment="libjson-c2-0.11-2.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140692" comment="libjson-c2-32bit-0.11-2.22 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76985" version="1" class="patch">
	<metadata>
		<title>libkde4-32bit-4.12.0-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="CVE-2017-8422" ref_url="https://www.suse.com/security/cve/CVE-2017-8422/" source="CVE"/>
		<description>
These are all security issues fixed in the libkde4-32bit-4.12.0-10.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-8422/">CVE-2017-8422</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009155614" comment="libkde4-4.12.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155615" comment="libkde4-32bit-4.12.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155616" comment="libkdecore4-4.12.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155617" comment="libkdecore4-32bit-4.12.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155618" comment="libksuseinstall1-4.12.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155619" comment="libksuseinstall1-32bit-4.12.0-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76986" version="1" class="patch">
	<metadata>
		<title>libkpathsea6-6.2.0dev-22.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2018-17407" ref_url="https://www.suse.com/security/cve/CVE-2018-17407/" source="CVE"/>
		<description>
These are all security issues fixed in the libkpathsea6-6.2.0dev-22.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17407/">CVE-2018-17407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512343" comment="libkpathsea6-6.2.0dev-22.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76987" version="1" class="patch">
	<metadata>
		<title>libksba8-1.3.0-23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-9087" ref_url="https://www.suse.com/security/cve/CVE-2014-9087/" source="CVE"/>
		<reference ref_id="CVE-2016-4574" ref_url="https://www.suse.com/security/cve/CVE-2016-4574/" source="CVE"/>
		<reference ref_id="CVE-2016-4579" ref_url="https://www.suse.com/security/cve/CVE-2016-4579/" source="CVE"/>
		<description>
These are all security issues fixed in the libksba8-1.3.0-23.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9087/">CVE-2014-9087</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4574/">CVE-2016-4574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4579/">CVE-2016-4579</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128468" comment="libksba8-1.3.0-23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76988" version="1" class="patch">
	<metadata>
		<title>libldap-2_4-2-2.4.41-18.40.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-1545" ref_url="https://www.suse.com/security/cve/CVE-2015-1545/" source="CVE"/>
		<reference ref_id="CVE-2015-1546" ref_url="https://www.suse.com/security/cve/CVE-2015-1546/" source="CVE"/>
		<reference ref_id="CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908/" source="CVE"/>
		<reference ref_id="CVE-2017-9287" ref_url="https://www.suse.com/security/cve/CVE-2017-9287/" source="CVE"/>
		<description>
These are all security issues fixed in the libldap-2_4-2-2.4.41-18.40.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1545/">CVE-2015-1545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1546/">CVE-2015-1546</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9287/">CVE-2017-9287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512344" comment="libldap-2_4-2-2.4.41-18.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512345" comment="libldap-2_4-2-32bit-2.4.41-18.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512346" comment="openldap2-client-2.4.41-18.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76989" version="1" class="patch">
	<metadata>
		<title>libldb1-1.1.29-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-3223" ref_url="https://www.suse.com/security/cve/CVE-2015-3223/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<description>
These are all security issues fixed in the libldb1-1.1.29-3.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3223/">CVE-2015-3223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512347" comment="libldb1-1.1.29-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512348" comment="libldb1-32bit-1.1.29-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76990" version="1" class="patch">
	<metadata>
		<title>liblouis-data-2.6.4-6.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-13738" ref_url="https://www.suse.com/security/cve/CVE-2017-13738/" source="CVE"/>
		<reference ref_id="CVE-2017-13739" ref_url="https://www.suse.com/security/cve/CVE-2017-13739/" source="CVE"/>
		<reference ref_id="CVE-2017-13740" ref_url="https://www.suse.com/security/cve/CVE-2017-13740/" source="CVE"/>
		<reference ref_id="CVE-2017-13741" ref_url="https://www.suse.com/security/cve/CVE-2017-13741/" source="CVE"/>
		<reference ref_id="CVE-2017-13743" ref_url="https://www.suse.com/security/cve/CVE-2017-13743/" source="CVE"/>
		<reference ref_id="CVE-2017-13744" ref_url="https://www.suse.com/security/cve/CVE-2017-13744/" source="CVE"/>
		<reference ref_id="CVE-2018-11440" ref_url="https://www.suse.com/security/cve/CVE-2018-11440/" source="CVE"/>
		<reference ref_id="CVE-2018-11577" ref_url="https://www.suse.com/security/cve/CVE-2018-11577/" source="CVE"/>
		<reference ref_id="CVE-2018-11683" ref_url="https://www.suse.com/security/cve/CVE-2018-11683/" source="CVE"/>
		<reference ref_id="CVE-2018-11684" ref_url="https://www.suse.com/security/cve/CVE-2018-11684/" source="CVE"/>
		<reference ref_id="CVE-2018-11685" ref_url="https://www.suse.com/security/cve/CVE-2018-11685/" source="CVE"/>
		<reference ref_id="CVE-2018-12085" ref_url="https://www.suse.com/security/cve/CVE-2018-12085/" source="CVE"/>
		<description>
These are all security issues fixed in the liblouis-data-2.6.4-6.6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13738/">CVE-2017-13738</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13739/">CVE-2017-13739</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13740/">CVE-2017-13740</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13741/">CVE-2017-13741</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13743/">CVE-2017-13743</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13744/">CVE-2017-13744</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11440/">CVE-2018-11440</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11577/">CVE-2018-11577</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11683/">CVE-2018-11683</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11684/">CVE-2018-11684</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11685/">CVE-2018-11685</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12085/">CVE-2018-12085</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512349" comment="liblouis-data-2.6.4-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512350" comment="liblouis9-2.6.4-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512351" comment="python3-louis-2.6.4-6.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76991" version="1" class="patch">
	<metadata>
		<title>libltdl7-2.4.2-17.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-3736" ref_url="https://www.suse.com/security/cve/CVE-2009-3736/" source="CVE"/>
		<description>
These are all security issues fixed in the libltdl7-2.4.2-17.4.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3736/">CVE-2009-3736</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512352" comment="libltdl7-2.4.2-17.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512353" comment="libltdl7-32bit-2.4.2-17.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76992" version="1" class="patch">
	<metadata>
		<title>liblua5_2-5.2.4-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-5461" ref_url="https://www.suse.com/security/cve/CVE-2014-5461/" source="CVE"/>
		<description>
These are all security issues fixed in the liblua5_2-5.2.4-6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5461/">CVE-2014-5461</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159160" comment="liblua5_2-5.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159162" comment="lua-5.2.4-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76993" version="1" class="patch">
	<metadata>
		<title>liblzo2-2-2.08-1.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607/" source="CVE"/>
		<description>
These are all security issues fixed in the liblzo2-2-2.08-1.13 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141561" comment="liblzo2-2-2.08-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140883" comment="liblzo2-2-32bit-2.08-1.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76994" version="1" class="patch">
	<metadata>
		<title>libmikmod3-3.2.0-4.59 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-6720" ref_url="https://www.suse.com/security/cve/CVE-2007-6720/" source="CVE"/>
		<reference ref_id="CVE-2009-0179" ref_url="https://www.suse.com/security/cve/CVE-2009-0179/" source="CVE"/>
		<reference ref_id="CVE-2009-3995" ref_url="https://www.suse.com/security/cve/CVE-2009-3995/" source="CVE"/>
		<reference ref_id="CVE-2009-3996" ref_url="https://www.suse.com/security/cve/CVE-2009-3996/" source="CVE"/>
		<reference ref_id="CVE-2010-2546" ref_url="https://www.suse.com/security/cve/CVE-2010-2546/" source="CVE"/>
		<description>
These are all security issues fixed in the libmikmod3-3.2.0-4.59 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2007-6720/">CVE-2007-6720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0179/">CVE-2009-0179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3995/">CVE-2009-3995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3996/">CVE-2009-3996</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2546/">CVE-2010-2546</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141562" comment="libmikmod3-3.2.0-4.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141563" comment="libmikmod3-32bit-3.2.0-4.59 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76995" version="1" class="patch">
	<metadata>
		<title>libmms0-0.6.2-15.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-2892" ref_url="https://www.suse.com/security/cve/CVE-2014-2892/" source="CVE"/>
		<description>
These are all security issues fixed in the libmms0-0.6.2-15.8 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-2892/">CVE-2014-2892</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140884" comment="libmms0-0.6.2-15.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76996" version="1" class="patch">
	<metadata>
		<title>libmodplug1-0.8.9.0+git20170610.f6dd59a-15.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-1761" ref_url="https://www.suse.com/security/cve/CVE-2011-1761/" source="CVE"/>
		<reference ref_id="CVE-2013-4233" ref_url="https://www.suse.com/security/cve/CVE-2013-4233/" source="CVE"/>
		<reference ref_id="CVE-2013-4234" ref_url="https://www.suse.com/security/cve/CVE-2013-4234/" source="CVE"/>
		<description>
These are all security issues fixed in the libmodplug1-0.8.9.0+git20170610.f6dd59a-15.4.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1761/">CVE-2011-1761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4233/">CVE-2013-4233</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4234/">CVE-2013-4234</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009177725" comment="libmodplug1-0.8.9.0+git20170610.f6dd59a-15.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76997" version="1" class="patch">
	<metadata>
		<title>libmpfr4-3.1.2-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-9474" ref_url="https://www.suse.com/security/cve/CVE-2014-9474/" source="CVE"/>
		<description>
These are all security issues fixed in the libmpfr4-3.1.2-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9474/">CVE-2014-9474</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105814" comment="libmpfr4-3.1.2-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76998" version="1" class="patch">
	<metadata>
		<title>libmspack0-0.4-14.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-2800" ref_url="https://www.suse.com/security/cve/CVE-2010-2800/" source="CVE"/>
		<reference ref_id="CVE-2010-2801" ref_url="https://www.suse.com/security/cve/CVE-2010-2801/" source="CVE"/>
		<reference ref_id="CVE-2014-9556" ref_url="https://www.suse.com/security/cve/CVE-2014-9556/" source="CVE"/>
		<reference ref_id="CVE-2014-9732" ref_url="https://www.suse.com/security/cve/CVE-2014-9732/" source="CVE"/>
		<reference ref_id="CVE-2015-4467" ref_url="https://www.suse.com/security/cve/CVE-2015-4467/" source="CVE"/>
		<reference ref_id="CVE-2015-4468" ref_url="https://www.suse.com/security/cve/CVE-2015-4468/" source="CVE"/>
		<reference ref_id="CVE-2015-4469" ref_url="https://www.suse.com/security/cve/CVE-2015-4469/" source="CVE"/>
		<reference ref_id="CVE-2015-4470" ref_url="https://www.suse.com/security/cve/CVE-2015-4470/" source="CVE"/>
		<reference ref_id="CVE-2015-4471" ref_url="https://www.suse.com/security/cve/CVE-2015-4471/" source="CVE"/>
		<reference ref_id="CVE-2015-4472" ref_url="https://www.suse.com/security/cve/CVE-2015-4472/" source="CVE"/>
		<description>
These are all security issues fixed in the libmspack0-0.4-14.4 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2800/">CVE-2010-2800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2801/">CVE-2010-2801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9556/">CVE-2014-9556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9732/">CVE-2014-9732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4467/">CVE-2015-4467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4468/">CVE-2015-4468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4469/">CVE-2015-4469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4470/">CVE-2015-4470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4471/">CVE-2015-4471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4472/">CVE-2015-4472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009118765" comment="libmspack0-0.4-14.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76999" version="1" class="patch">
	<metadata>
		<title>libmusicbrainz4-2.1.5-27.86 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-4197" ref_url="https://www.suse.com/security/cve/CVE-2006-4197/" source="CVE"/>
		<description>
These are all security issues fixed in the libmusicbrainz4-2.1.5-27.86 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4197/">CVE-2006-4197</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140886" comment="libmusicbrainz4-2.1.5-27.86 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77000" version="1" class="patch">
	<metadata>
		<title>libmwaw-0_3-3-0.3.13-7.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-9433" ref_url="https://www.suse.com/security/cve/CVE-2017-9433/" source="CVE"/>
		<description>
These are all security issues fixed in the libmwaw-0_3-3-0.3.13-7.9.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9433/">CVE-2017-9433</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009174905" comment="libmwaw-0_3-3-0.3.13-7.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77001" version="1" class="patch">
	<metadata>
		<title>libmysqlclient18-10.0.35-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-5970" ref_url="https://www.suse.com/security/cve/CVE-2007-5970/" source="CVE"/>
		<reference ref_id="CVE-2008-7247" ref_url="https://www.suse.com/security/cve/CVE-2008-7247/" source="CVE"/>
		<reference ref_id="CVE-2009-4019" ref_url="https://www.suse.com/security/cve/CVE-2009-4019/" source="CVE"/>
		<reference ref_id="CVE-2009-4028" ref_url="https://www.suse.com/security/cve/CVE-2009-4028/" source="CVE"/>
		<reference ref_id="CVE-2009-4030" ref_url="https://www.suse.com/security/cve/CVE-2009-4030/" source="CVE"/>
		<reference ref_id="CVE-2010-5298" ref_url="https://www.suse.com/security/cve/CVE-2010-5298/" source="CVE"/>
		<reference ref_id="CVE-2012-5615" ref_url="https://www.suse.com/security/cve/CVE-2012-5615/" source="CVE"/>
		<reference ref_id="CVE-2013-1976" ref_url="https://www.suse.com/security/cve/CVE-2013-1976/" source="CVE"/>
		<reference ref_id="CVE-2014-0195" ref_url="https://www.suse.com/security/cve/CVE-2014-0195/" source="CVE"/>
		<reference ref_id="CVE-2014-0198" ref_url="https://www.suse.com/security/cve/CVE-2014-0198/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-2494" ref_url="https://www.suse.com/security/cve/CVE-2014-2494/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-4207" ref_url="https://www.suse.com/security/cve/CVE-2014-4207/" source="CVE"/>
		<reference ref_id="CVE-2014-4258" ref_url="https://www.suse.com/security/cve/CVE-2014-4258/" source="CVE"/>
		<reference ref_id="CVE-2014-4260" ref_url="https://www.suse.com/security/cve/CVE-2014-4260/" source="CVE"/>
		<reference ref_id="CVE-2014-4274" ref_url="https://www.suse.com/security/cve/CVE-2014-4274/" source="CVE"/>
		<reference ref_id="CVE-2014-4287" ref_url="https://www.suse.com/security/cve/CVE-2014-4287/" source="CVE"/>
		<reference ref_id="CVE-2014-6463" ref_url="https://www.suse.com/security/cve/CVE-2014-6463/" source="CVE"/>
		<reference ref_id="CVE-2014-6464" ref_url="https://www.suse.com/security/cve/CVE-2014-6464/" source="CVE"/>
		<reference ref_id="CVE-2014-6469" ref_url="https://www.suse.com/security/cve/CVE-2014-6469/" source="CVE"/>
		<reference ref_id="CVE-2014-6474" ref_url="https://www.suse.com/security/cve/CVE-2014-6474/" source="CVE"/>
		<reference ref_id="CVE-2014-6478" ref_url="https://www.suse.com/security/cve/CVE-2014-6478/" source="CVE"/>
		<reference ref_id="CVE-2014-6484" ref_url="https://www.suse.com/security/cve/CVE-2014-6484/" source="CVE"/>
		<reference ref_id="CVE-2014-6489" ref_url="https://www.suse.com/security/cve/CVE-2014-6489/" source="CVE"/>
		<reference ref_id="CVE-2014-6491" ref_url="https://www.suse.com/security/cve/CVE-2014-6491/" source="CVE"/>
		<reference ref_id="CVE-2014-6494" ref_url="https://www.suse.com/security/cve/CVE-2014-6494/" source="CVE"/>
		<reference ref_id="CVE-2014-6495" ref_url="https://www.suse.com/security/cve/CVE-2014-6495/" source="CVE"/>
		<reference ref_id="CVE-2014-6496" ref_url="https://www.suse.com/security/cve/CVE-2014-6496/" source="CVE"/>
		<reference ref_id="CVE-2014-6500" ref_url="https://www.suse.com/security/cve/CVE-2014-6500/" source="CVE"/>
		<reference ref_id="CVE-2014-6505" ref_url="https://www.suse.com/security/cve/CVE-2014-6505/" source="CVE"/>
		<reference ref_id="CVE-2014-6507" ref_url="https://www.suse.com/security/cve/CVE-2014-6507/" source="CVE"/>
		<reference ref_id="CVE-2014-6520" ref_url="https://www.suse.com/security/cve/CVE-2014-6520/" source="CVE"/>
		<reference ref_id="CVE-2014-6530" ref_url="https://www.suse.com/security/cve/CVE-2014-6530/" source="CVE"/>
		<reference ref_id="CVE-2014-6551" ref_url="https://www.suse.com/security/cve/CVE-2014-6551/" source="CVE"/>
		<reference ref_id="CVE-2014-6555" ref_url="https://www.suse.com/security/cve/CVE-2014-6555/" source="CVE"/>
		<reference ref_id="CVE-2014-6559" ref_url="https://www.suse.com/security/cve/CVE-2014-6559/" source="CVE"/>
		<reference ref_id="CVE-2014-6564" ref_url="https://www.suse.com/security/cve/CVE-2014-6564/" source="CVE"/>
		<reference ref_id="CVE-2014-6568" ref_url="https://www.suse.com/security/cve/CVE-2014-6568/" source="CVE"/>
		<reference ref_id="CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964/" source="CVE"/>
		<reference ref_id="CVE-2015-0374" ref_url="https://www.suse.com/security/cve/CVE-2015-0374/" source="CVE"/>
		<reference ref_id="CVE-2015-0381" ref_url="https://www.suse.com/security/cve/CVE-2015-0381/" source="CVE"/>
		<reference ref_id="CVE-2015-0382" ref_url="https://www.suse.com/security/cve/CVE-2015-0382/" source="CVE"/>
		<reference ref_id="CVE-2015-0391" ref_url="https://www.suse.com/security/cve/CVE-2015-0391/" source="CVE"/>
		<reference ref_id="CVE-2015-0411" ref_url="https://www.suse.com/security/cve/CVE-2015-0411/" source="CVE"/>
		<reference ref_id="CVE-2015-0432" ref_url="https://www.suse.com/security/cve/CVE-2015-0432/" source="CVE"/>
		<reference ref_id="CVE-2015-0433" ref_url="https://www.suse.com/security/cve/CVE-2015-0433/" source="CVE"/>
		<reference ref_id="CVE-2015-0441" ref_url="https://www.suse.com/security/cve/CVE-2015-0441/" source="CVE"/>
		<reference ref_id="CVE-2015-0499" ref_url="https://www.suse.com/security/cve/CVE-2015-0499/" source="CVE"/>
		<reference ref_id="CVE-2015-0501" ref_url="https://www.suse.com/security/cve/CVE-2015-0501/" source="CVE"/>
		<reference ref_id="CVE-2015-0505" ref_url="https://www.suse.com/security/cve/CVE-2015-0505/" source="CVE"/>
		<reference ref_id="CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325/" source="CVE"/>
		<reference ref_id="CVE-2015-2326" ref_url="https://www.suse.com/security/cve/CVE-2015-2326/" source="CVE"/>
		<reference ref_id="CVE-2015-2568" ref_url="https://www.suse.com/security/cve/CVE-2015-2568/" source="CVE"/>
		<reference ref_id="CVE-2015-2571" ref_url="https://www.suse.com/security/cve/CVE-2015-2571/" source="CVE"/>
		<reference ref_id="CVE-2015-2573" ref_url="https://www.suse.com/security/cve/CVE-2015-2573/" source="CVE"/>
		<reference ref_id="CVE-2015-3152" ref_url="https://www.suse.com/security/cve/CVE-2015-3152/" source="CVE"/>
		<reference ref_id="CVE-2015-4792" ref_url="https://www.suse.com/security/cve/CVE-2015-4792/" source="CVE"/>
		<reference ref_id="CVE-2015-4802" ref_url="https://www.suse.com/security/cve/CVE-2015-4802/" source="CVE"/>
		<reference ref_id="CVE-2015-4807" ref_url="https://www.suse.com/security/cve/CVE-2015-4807/" source="CVE"/>
		<reference ref_id="CVE-2015-4815" ref_url="https://www.suse.com/security/cve/CVE-2015-4815/" source="CVE"/>
		<reference ref_id="CVE-2015-4826" ref_url="https://www.suse.com/security/cve/CVE-2015-4826/" source="CVE"/>
		<reference ref_id="CVE-2015-4830" ref_url="https://www.suse.com/security/cve/CVE-2015-4830/" source="CVE"/>
		<reference ref_id="CVE-2015-4836" ref_url="https://www.suse.com/security/cve/CVE-2015-4836/" source="CVE"/>
		<reference ref_id="CVE-2015-4858" ref_url="https://www.suse.com/security/cve/CVE-2015-4858/" source="CVE"/>
		<reference ref_id="CVE-2015-4861" ref_url="https://www.suse.com/security/cve/CVE-2015-4861/" source="CVE"/>
		<reference ref_id="CVE-2015-4870" ref_url="https://www.suse.com/security/cve/CVE-2015-4870/" source="CVE"/>
		<reference ref_id="CVE-2015-4913" ref_url="https://www.suse.com/security/cve/CVE-2015-4913/" source="CVE"/>
		<reference ref_id="CVE-2015-5969" ref_url="https://www.suse.com/security/cve/CVE-2015-5969/" source="CVE"/>
		<reference ref_id="CVE-2016-0505" ref_url="https://www.suse.com/security/cve/CVE-2016-0505/" source="CVE"/>
		<reference ref_id="CVE-2016-0546" ref_url="https://www.suse.com/security/cve/CVE-2016-0546/" source="CVE"/>
		<reference ref_id="CVE-2016-0596" ref_url="https://www.suse.com/security/cve/CVE-2016-0596/" source="CVE"/>
		<reference ref_id="CVE-2016-0597" ref_url="https://www.suse.com/security/cve/CVE-2016-0597/" source="CVE"/>
		<reference ref_id="CVE-2016-0598" ref_url="https://www.suse.com/security/cve/CVE-2016-0598/" source="CVE"/>
		<reference ref_id="CVE-2016-0600" ref_url="https://www.suse.com/security/cve/CVE-2016-0600/" source="CVE"/>
		<reference ref_id="CVE-2016-0606" ref_url="https://www.suse.com/security/cve/CVE-2016-0606/" source="CVE"/>
		<reference ref_id="CVE-2016-0608" ref_url="https://www.suse.com/security/cve/CVE-2016-0608/" source="CVE"/>
		<reference ref_id="CVE-2016-0609" ref_url="https://www.suse.com/security/cve/CVE-2016-0609/" source="CVE"/>
		<reference ref_id="CVE-2016-0616" ref_url="https://www.suse.com/security/cve/CVE-2016-0616/" source="CVE"/>
		<reference ref_id="CVE-2016-0640" ref_url="https://www.suse.com/security/cve/CVE-2016-0640/" source="CVE"/>
		<reference ref_id="CVE-2016-0641" ref_url="https://www.suse.com/security/cve/CVE-2016-0641/" source="CVE"/>
		<reference ref_id="CVE-2016-0642" ref_url="https://www.suse.com/security/cve/CVE-2016-0642/" source="CVE"/>
		<reference ref_id="CVE-2016-0643" ref_url="https://www.suse.com/security/cve/CVE-2016-0643/" source="CVE"/>
		<reference ref_id="CVE-2016-0644" ref_url="https://www.suse.com/security/cve/CVE-2016-0644/" source="CVE"/>
		<reference ref_id="CVE-2016-0646" ref_url="https://www.suse.com/security/cve/CVE-2016-0646/" source="CVE"/>
		<reference ref_id="CVE-2016-0647" ref_url="https://www.suse.com/security/cve/CVE-2016-0647/" source="CVE"/>
		<reference ref_id="CVE-2016-0648" ref_url="https://www.suse.com/security/cve/CVE-2016-0648/" source="CVE"/>
		<reference ref_id="CVE-2016-0649" ref_url="https://www.suse.com/security/cve/CVE-2016-0649/" source="CVE"/>
		<reference ref_id="CVE-2016-0650" ref_url="https://www.suse.com/security/cve/CVE-2016-0650/" source="CVE"/>
		<reference ref_id="CVE-2016-0651" ref_url="https://www.suse.com/security/cve/CVE-2016-0651/" source="CVE"/>
		<reference ref_id="CVE-2016-0655" ref_url="https://www.suse.com/security/cve/CVE-2016-0655/" source="CVE"/>
		<reference ref_id="CVE-2016-0666" ref_url="https://www.suse.com/security/cve/CVE-2016-0666/" source="CVE"/>
		<reference ref_id="CVE-2016-0668" ref_url="https://www.suse.com/security/cve/CVE-2016-0668/" source="CVE"/>
		<reference ref_id="CVE-2016-2047" ref_url="https://www.suse.com/security/cve/CVE-2016-2047/" source="CVE"/>
		<reference ref_id="CVE-2016-3477" ref_url="https://www.suse.com/security/cve/CVE-2016-3477/" source="CVE"/>
		<reference ref_id="CVE-2016-3492" ref_url="https://www.suse.com/security/cve/CVE-2016-3492/" source="CVE"/>
		<reference ref_id="CVE-2016-3521" ref_url="https://www.suse.com/security/cve/CVE-2016-3521/" source="CVE"/>
		<reference ref_id="CVE-2016-3615" ref_url="https://www.suse.com/security/cve/CVE-2016-3615/" source="CVE"/>
		<reference ref_id="CVE-2016-5440" ref_url="https://www.suse.com/security/cve/CVE-2016-5440/" source="CVE"/>
		<reference ref_id="CVE-2016-5584" ref_url="https://www.suse.com/security/cve/CVE-2016-5584/" source="CVE"/>
		<reference ref_id="CVE-2016-5624" ref_url="https://www.suse.com/security/cve/CVE-2016-5624/" source="CVE"/>
		<reference ref_id="CVE-2016-5626" ref_url="https://www.suse.com/security/cve/CVE-2016-5626/" source="CVE"/>
		<reference ref_id="CVE-2016-5629" ref_url="https://www.suse.com/security/cve/CVE-2016-5629/" source="CVE"/>
		<reference ref_id="CVE-2016-6662" ref_url="https://www.suse.com/security/cve/CVE-2016-6662/" source="CVE"/>
		<reference ref_id="CVE-2016-6663" ref_url="https://www.suse.com/security/cve/CVE-2016-6663/" source="CVE"/>
		<reference ref_id="CVE-2016-6664" ref_url="https://www.suse.com/security/cve/CVE-2016-6664/" source="CVE"/>
		<reference ref_id="CVE-2016-7440" ref_url="https://www.suse.com/security/cve/CVE-2016-7440/" source="CVE"/>
		<reference ref_id="CVE-2016-8283" ref_url="https://www.suse.com/security/cve/CVE-2016-8283/" source="CVE"/>
		<reference ref_id="CVE-2017-10268" ref_url="https://www.suse.com/security/cve/CVE-2017-10268/" source="CVE"/>
		<reference ref_id="CVE-2017-10378" ref_url="https://www.suse.com/security/cve/CVE-2017-10378/" source="CVE"/>
		<reference ref_id="CVE-2017-3238" ref_url="https://www.suse.com/security/cve/CVE-2017-3238/" source="CVE"/>
		<reference ref_id="CVE-2017-3243" ref_url="https://www.suse.com/security/cve/CVE-2017-3243/" source="CVE"/>
		<reference ref_id="CVE-2017-3244" ref_url="https://www.suse.com/security/cve/CVE-2017-3244/" source="CVE"/>
		<reference ref_id="CVE-2017-3257" ref_url="https://www.suse.com/security/cve/CVE-2017-3257/" source="CVE"/>
		<reference ref_id="CVE-2017-3258" ref_url="https://www.suse.com/security/cve/CVE-2017-3258/" source="CVE"/>
		<reference ref_id="CVE-2017-3265" ref_url="https://www.suse.com/security/cve/CVE-2017-3265/" source="CVE"/>
		<reference ref_id="CVE-2017-3291" ref_url="https://www.suse.com/security/cve/CVE-2017-3291/" source="CVE"/>
		<reference ref_id="CVE-2017-3302" ref_url="https://www.suse.com/security/cve/CVE-2017-3302/" source="CVE"/>
		<reference ref_id="CVE-2017-3308" ref_url="https://www.suse.com/security/cve/CVE-2017-3308/" source="CVE"/>
		<reference ref_id="CVE-2017-3309" ref_url="https://www.suse.com/security/cve/CVE-2017-3309/" source="CVE"/>
		<reference ref_id="CVE-2017-3312" ref_url="https://www.suse.com/security/cve/CVE-2017-3312/" source="CVE"/>
		<reference ref_id="CVE-2017-3313" ref_url="https://www.suse.com/security/cve/CVE-2017-3313/" source="CVE"/>
		<reference ref_id="CVE-2017-3317" ref_url="https://www.suse.com/security/cve/CVE-2017-3317/" source="CVE"/>
		<reference ref_id="CVE-2017-3318" ref_url="https://www.suse.com/security/cve/CVE-2017-3318/" source="CVE"/>
		<reference ref_id="CVE-2017-3453" ref_url="https://www.suse.com/security/cve/CVE-2017-3453/" source="CVE"/>
		<reference ref_id="CVE-2017-3456" ref_url="https://www.suse.com/security/cve/CVE-2017-3456/" source="CVE"/>
		<reference ref_id="CVE-2017-3464" ref_url="https://www.suse.com/security/cve/CVE-2017-3464/" source="CVE"/>
		<reference ref_id="CVE-2017-3636" ref_url="https://www.suse.com/security/cve/CVE-2017-3636/" source="CVE"/>
		<reference ref_id="CVE-2017-3641" ref_url="https://www.suse.com/security/cve/CVE-2017-3641/" source="CVE"/>
		<reference ref_id="CVE-2017-3653" ref_url="https://www.suse.com/security/cve/CVE-2017-3653/" source="CVE"/>
		<reference ref_id="CVE-2018-2562" ref_url="https://www.suse.com/security/cve/CVE-2018-2562/" source="CVE"/>
		<reference ref_id="CVE-2018-2612" ref_url="https://www.suse.com/security/cve/CVE-2018-2612/" source="CVE"/>
		<reference ref_id="CVE-2018-2622" ref_url="https://www.suse.com/security/cve/CVE-2018-2622/" source="CVE"/>
		<reference ref_id="CVE-2018-2640" ref_url="https://www.suse.com/security/cve/CVE-2018-2640/" source="CVE"/>
		<reference ref_id="CVE-2018-2665" ref_url="https://www.suse.com/security/cve/CVE-2018-2665/" source="CVE"/>
		<reference ref_id="CVE-2018-2668" ref_url="https://www.suse.com/security/cve/CVE-2018-2668/" source="CVE"/>
		<reference ref_id="CVE-2018-2755" ref_url="https://www.suse.com/security/cve/CVE-2018-2755/" source="CVE"/>
		<reference ref_id="CVE-2018-2761" ref_url="https://www.suse.com/security/cve/CVE-2018-2761/" source="CVE"/>
		<reference ref_id="CVE-2018-2766" ref_url="https://www.suse.com/security/cve/CVE-2018-2766/" source="CVE"/>
		<reference ref_id="CVE-2018-2767" ref_url="https://www.suse.com/security/cve/CVE-2018-2767/" source="CVE"/>
		<reference ref_id="CVE-2018-2771" ref_url="https://www.suse.com/security/cve/CVE-2018-2771/" source="CVE"/>
		<reference ref_id="CVE-2018-2781" ref_url="https://www.suse.com/security/cve/CVE-2018-2781/" source="CVE"/>
		<reference ref_id="CVE-2018-2782" ref_url="https://www.suse.com/security/cve/CVE-2018-2782/" source="CVE"/>
		<reference ref_id="CVE-2018-2784" ref_url="https://www.suse.com/security/cve/CVE-2018-2784/" source="CVE"/>
		<reference ref_id="CVE-2018-2787" ref_url="https://www.suse.com/security/cve/CVE-2018-2787/" source="CVE"/>
		<reference ref_id="CVE-2018-2813" ref_url="https://www.suse.com/security/cve/CVE-2018-2813/" source="CVE"/>
		<reference ref_id="CVE-2018-2817" ref_url="https://www.suse.com/security/cve/CVE-2018-2817/" source="CVE"/>
		<reference ref_id="CVE-2018-2819" ref_url="https://www.suse.com/security/cve/CVE-2018-2819/" source="CVE"/>
		<description>
These are all security issues fixed in the libmysqlclient18-10.0.35-1.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5970/">CVE-2007-5970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-7247/">CVE-2008-7247</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4019/">CVE-2009-4019</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4028/">CVE-2009-4028</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4030/">CVE-2009-4030</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5298/">CVE-2010-5298</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5615/">CVE-2012-5615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1976/">CVE-2013-1976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0195/">CVE-2014-0195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0198/">CVE-2014-0198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2494/">CVE-2014-2494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4207/">CVE-2014-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4258/">CVE-2014-4258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4260/">CVE-2014-4260</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4274/">CVE-2014-4274</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4287/">CVE-2014-4287</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6463/">CVE-2014-6463</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6464/">CVE-2014-6464</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6469/">CVE-2014-6469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6474/">CVE-2014-6474</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6478/">CVE-2014-6478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6484/">CVE-2014-6484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6489/">CVE-2014-6489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6491/">CVE-2014-6491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6494/">CVE-2014-6494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6495/">CVE-2014-6495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6496/">CVE-2014-6496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6500/">CVE-2014-6500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6505/">CVE-2014-6505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6507/">CVE-2014-6507</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6520/">CVE-2014-6520</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6530/">CVE-2014-6530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6551/">CVE-2014-6551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6555/">CVE-2014-6555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6559/">CVE-2014-6559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6564/">CVE-2014-6564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6568/">CVE-2014-6568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0374/">CVE-2015-0374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0381/">CVE-2015-0381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0382/">CVE-2015-0382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0391/">CVE-2015-0391</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0411/">CVE-2015-0411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0432/">CVE-2015-0432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0433/">CVE-2015-0433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0441/">CVE-2015-0441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0499/">CVE-2015-0499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0501/">CVE-2015-0501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0505/">CVE-2015-0505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2326/">CVE-2015-2326</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2568/">CVE-2015-2568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2571/">CVE-2015-2571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2573/">CVE-2015-2573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3152/">CVE-2015-3152</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4792/">CVE-2015-4792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4802/">CVE-2015-4802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4807/">CVE-2015-4807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4815/">CVE-2015-4815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4826/">CVE-2015-4826</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4830/">CVE-2015-4830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4836/">CVE-2015-4836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4858/">CVE-2015-4858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4861/">CVE-2015-4861</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4870/">CVE-2015-4870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4913/">CVE-2015-4913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5969/">CVE-2015-5969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0505/">CVE-2016-0505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0546/">CVE-2016-0546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0596/">CVE-2016-0596</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0597/">CVE-2016-0597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0598/">CVE-2016-0598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0600/">CVE-2016-0600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0606/">CVE-2016-0606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0608/">CVE-2016-0608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0609/">CVE-2016-0609</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0616/">CVE-2016-0616</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0640/">CVE-2016-0640</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0641/">CVE-2016-0641</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0642/">CVE-2016-0642</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0643/">CVE-2016-0643</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0644/">CVE-2016-0644</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0646/">CVE-2016-0646</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0647/">CVE-2016-0647</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0648/">CVE-2016-0648</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0649/">CVE-2016-0649</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0650/">CVE-2016-0650</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0651/">CVE-2016-0651</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0655/">CVE-2016-0655</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0666/">CVE-2016-0666</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0668/">CVE-2016-0668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2047/">CVE-2016-2047</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3477/">CVE-2016-3477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3492/">CVE-2016-3492</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3521/">CVE-2016-3521</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3615/">CVE-2016-3615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5440/">CVE-2016-5440</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5584/">CVE-2016-5584</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5624/">CVE-2016-5624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5626/">CVE-2016-5626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5629/">CVE-2016-5629</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6662/">CVE-2016-6662</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6663/">CVE-2016-6663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6664/">CVE-2016-6664</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7440/">CVE-2016-7440</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8283/">CVE-2016-8283</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10268/">CVE-2017-10268</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10378/">CVE-2017-10378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3238/">CVE-2017-3238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3243/">CVE-2017-3243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3244/">CVE-2017-3244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3257/">CVE-2017-3257</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3258/">CVE-2017-3258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3265/">CVE-2017-3265</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3291/">CVE-2017-3291</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3302/">CVE-2017-3302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3308/">CVE-2017-3308</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3309/">CVE-2017-3309</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3312/">CVE-2017-3312</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3313/">CVE-2017-3313</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3317/">CVE-2017-3317</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3318/">CVE-2017-3318</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3453/">CVE-2017-3453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3456/">CVE-2017-3456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3464/">CVE-2017-3464</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-3636/">CVE-2017-3636</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3641/">CVE-2017-3641</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3653/">CVE-2017-3653</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-2562/">CVE-2018-2562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2612/">CVE-2018-2612</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2622/">CVE-2018-2622</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2640/">CVE-2018-2640</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2665/">CVE-2018-2665</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2668/">CVE-2018-2668</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2755/">CVE-2018-2755</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2761/">CVE-2018-2761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2766/">CVE-2018-2766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2767/">CVE-2018-2767</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2771/">CVE-2018-2771</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2781/">CVE-2018-2781</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2782/">CVE-2018-2782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2784/">CVE-2018-2784</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2787/">CVE-2018-2787</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2813/">CVE-2018-2813</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2817/">CVE-2018-2817</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2819/">CVE-2018-2819</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512354" comment="libmysqlclient18-10.0.35-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512355" comment="libmysqlclient18-32bit-10.0.35-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512356" comment="libmysqlclient_r18-10.0.35-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512357" comment="libmysqlclient_r18-32bit-10.0.35-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512358" comment="mariadb-100-errormessages-10.0.35-1.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77002" version="1" class="patch">
	<metadata>
		<title>libncurses5-32bit-5.9-58.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-10684" ref_url="https://www.suse.com/security/cve/CVE-2017-10684/" source="CVE"/>
		<reference ref_id="CVE-2017-10685" ref_url="https://www.suse.com/security/cve/CVE-2017-10685/" source="CVE"/>
		<reference ref_id="CVE-2017-11112" ref_url="https://www.suse.com/security/cve/CVE-2017-11112/" source="CVE"/>
		<reference ref_id="CVE-2017-11113" ref_url="https://www.suse.com/security/cve/CVE-2017-11113/" source="CVE"/>
		<reference ref_id="CVE-2017-13728" ref_url="https://www.suse.com/security/cve/CVE-2017-13728/" source="CVE"/>
		<reference ref_id="CVE-2017-13729" ref_url="https://www.suse.com/security/cve/CVE-2017-13729/" source="CVE"/>
		<reference ref_id="CVE-2017-13730" ref_url="https://www.suse.com/security/cve/CVE-2017-13730/" source="CVE"/>
		<reference ref_id="CVE-2017-13731" ref_url="https://www.suse.com/security/cve/CVE-2017-13731/" source="CVE"/>
		<reference ref_id="CVE-2017-13732" ref_url="https://www.suse.com/security/cve/CVE-2017-13732/" source="CVE"/>
		<reference ref_id="CVE-2017-13733" ref_url="https://www.suse.com/security/cve/CVE-2017-13733/" source="CVE"/>
		<reference ref_id="CVE-2017-13734" ref_url="https://www.suse.com/security/cve/CVE-2017-13734/" source="CVE"/>
		<description>
These are all security issues fixed in the libncurses5-32bit-5.9-58.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10684/">CVE-2017-10684</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10685/">CVE-2017-10685</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11112/">CVE-2017-11112</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11113/">CVE-2017-11113</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13728/">CVE-2017-13728</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13729/">CVE-2017-13729</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13730/">CVE-2017-13730</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13731/">CVE-2017-13731</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13732/">CVE-2017-13732</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13733/">CVE-2017-13733</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13734/">CVE-2017-13734</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009170445" comment="libncurses5-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009170446" comment="libncurses5-32bit-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009170447" comment="libncurses6-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009170448" comment="libncurses6-32bit-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009170450" comment="ncurses-devel-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009170451" comment="ncurses-utils-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009170452" comment="tack-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009170453" comment="terminfo-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009170454" comment="terminfo-base-5.9-58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77003" version="1" class="patch">
	<metadata>
		<title>libndp0-1.6-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-3698" ref_url="https://www.suse.com/security/cve/CVE-2016-3698/" source="CVE"/>
		<description>
These are all security issues fixed in the libndp0-1.6-2.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3698/">CVE-2016-3698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142139" comment="libndp0-1.6-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77004" version="1" class="patch">
	<metadata>
		<title>libneon27-0.30.0-3.65 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-2473" ref_url="https://www.suse.com/security/cve/CVE-2009-2473/" source="CVE"/>
		<reference ref_id="CVE-2009-2474" ref_url="https://www.suse.com/security/cve/CVE-2009-2474/" source="CVE"/>
		<description>
These are all security issues fixed in the libneon27-0.30.0-3.65 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2473/">CVE-2009-2473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2474/">CVE-2009-2474</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140887" comment="libneon27-0.30.0-3.65 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77005" version="1" class="patch">
	<metadata>
		<title>libnetpbm11-10.66.3-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="CVE-2017-2581" ref_url="https://www.suse.com/security/cve/CVE-2017-2581/" source="CVE"/>
		<reference ref_id="CVE-2017-2586" ref_url="https://www.suse.com/security/cve/CVE-2017-2586/" source="CVE"/>
		<reference ref_id="CVE-2017-2587" ref_url="https://www.suse.com/security/cve/CVE-2017-2587/" source="CVE"/>
		<description>
These are all security issues fixed in the libnetpbm11-10.66.3-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2581/">CVE-2017-2581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2586/">CVE-2017-2586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2587/">CVE-2017-2587</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009139268" comment="libnetpbm11-10.66.3-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156953" comment="libnetpbm11-32bit-10.66.3-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009139269" comment="netpbm-10.66.3-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77006" version="1" class="patch">
	<metadata>
		<title>libnewt0_52-0.52.16-1.83 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-2905" ref_url="https://www.suse.com/security/cve/CVE-2009-2905/" source="CVE"/>
		<description>
These are all security issues fixed in the libnewt0_52-0.52.16-1.83 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2905/">CVE-2009-2905</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142140" comment="libnewt0_52-0.52.16-1.83 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77007" version="1" class="patch">
	<metadata>
		<title>libnghttp2-14-1.7.1-1.84 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-1544" ref_url="https://www.suse.com/security/cve/CVE-2016-1544/" source="CVE"/>
		<description>
These are all security issues fixed in the libnghttp2-14-1.7.1-1.84 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-1544/">CVE-2016-1544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140889" comment="libnghttp2-14-1.7.1-1.84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512359" comment="libnghttp2-14-32bit-1.7.1-1.84 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77008" version="1" class="patch">
	<metadata>
		<title>libofx-0.9.9-3.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-14731" ref_url="https://www.suse.com/security/cve/CVE-2017-14731/" source="CVE"/>
		<reference ref_id="CVE-2017-2816" ref_url="https://www.suse.com/security/cve/CVE-2017-2816/" source="CVE"/>
		<reference ref_id="CVE-2017-2920" ref_url="https://www.suse.com/security/cve/CVE-2017-2920/" source="CVE"/>
		<description>
These are all security issues fixed in the libofx-0.9.9-3.7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14731/">CVE-2017-14731</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-2816/">CVE-2017-2816</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-2920/">CVE-2017-2920</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512360" comment="libofx-0.9.9-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512361" comment="libofx6-0.9.9-3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77009" version="1" class="patch">
	<metadata>
		<title>libopenjp2-7-2.1.0-4.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-1239" ref_url="https://www.suse.com/security/cve/CVE-2015-1239/" source="CVE"/>
		<reference ref_id="CVE-2015-8871" ref_url="https://www.suse.com/security/cve/CVE-2015-8871/" source="CVE"/>
		<reference ref_id="CVE-2016-10507" ref_url="https://www.suse.com/security/cve/CVE-2016-10507/" source="CVE"/>
		<reference ref_id="CVE-2016-7163" ref_url="https://www.suse.com/security/cve/CVE-2016-7163/" source="CVE"/>
		<reference ref_id="CVE-2016-7445" ref_url="https://www.suse.com/security/cve/CVE-2016-7445/" source="CVE"/>
		<reference ref_id="CVE-2016-8332" ref_url="https://www.suse.com/security/cve/CVE-2016-8332/" source="CVE"/>
		<reference ref_id="CVE-2016-9112" ref_url="https://www.suse.com/security/cve/CVE-2016-9112/" source="CVE"/>
		<reference ref_id="CVE-2016-9113" ref_url="https://www.suse.com/security/cve/CVE-2016-9113/" source="CVE"/>
		<reference ref_id="CVE-2016-9114" ref_url="https://www.suse.com/security/cve/CVE-2016-9114/" source="CVE"/>
		<reference ref_id="CVE-2016-9115" ref_url="https://www.suse.com/security/cve/CVE-2016-9115/" source="CVE"/>
		<reference ref_id="CVE-2016-9116" ref_url="https://www.suse.com/security/cve/CVE-2016-9116/" source="CVE"/>
		<reference ref_id="CVE-2016-9117" ref_url="https://www.suse.com/security/cve/CVE-2016-9117/" source="CVE"/>
		<reference ref_id="CVE-2016-9118" ref_url="https://www.suse.com/security/cve/CVE-2016-9118/" source="CVE"/>
		<reference ref_id="CVE-2016-9572" ref_url="https://www.suse.com/security/cve/CVE-2016-9572/" source="CVE"/>
		<reference ref_id="CVE-2016-9573" ref_url="https://www.suse.com/security/cve/CVE-2016-9573/" source="CVE"/>
		<reference ref_id="CVE-2016-9580" ref_url="https://www.suse.com/security/cve/CVE-2016-9580/" source="CVE"/>
		<reference ref_id="CVE-2016-9581" ref_url="https://www.suse.com/security/cve/CVE-2016-9581/" source="CVE"/>
		<reference ref_id="CVE-2017-14039" ref_url="https://www.suse.com/security/cve/CVE-2017-14039/" source="CVE"/>
		<reference ref_id="CVE-2017-14040" ref_url="https://www.suse.com/security/cve/CVE-2017-14040/" source="CVE"/>
		<reference ref_id="CVE-2017-14041" ref_url="https://www.suse.com/security/cve/CVE-2017-14041/" source="CVE"/>
		<reference ref_id="CVE-2017-14164" ref_url="https://www.suse.com/security/cve/CVE-2017-14164/" source="CVE"/>
		<reference ref_id="CVE-2017-171479" ref_url="https://www.suse.com/security/cve/CVE-2017-171479/" source="CVE"/>
		<reference ref_id="CVE-2017-17479" ref_url="https://www.suse.com/security/cve/CVE-2017-17479/" source="CVE"/>
		<reference ref_id="CVE-2017-17480" ref_url="https://www.suse.com/security/cve/CVE-2017-17480/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenjp2-7-2.1.0-4.9.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-1239/">CVE-2015-1239</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-8871/">CVE-2015-8871</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10507/">CVE-2016-10507</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7163/">CVE-2016-7163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7445/">CVE-2016-7445</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-8332/">CVE-2016-8332</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9112/">CVE-2016-9112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9113/">CVE-2016-9113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9114/">CVE-2016-9114</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9115/">CVE-2016-9115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9116/">CVE-2016-9116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9117/">CVE-2016-9117</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9118/">CVE-2016-9118</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9572/">CVE-2016-9572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9573/">CVE-2016-9573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9580/">CVE-2016-9580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9581/">CVE-2016-9581</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14039/">CVE-2017-14039</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14040/">CVE-2017-14040</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14041/">CVE-2017-14041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14164/">CVE-2017-14164</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-171479/">CVE-2017-171479</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17479/">CVE-2017-17479</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17480/">CVE-2017-17480</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009177330" comment="libopenjp2-7-2.1.0-4.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77010" version="1" class="patch">
	<metadata>
		<title>libopenssl-1_0_0-devel-1.0.2p-2.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-7250" ref_url="https://www.suse.com/security/cve/CVE-2006-7250/" source="CVE"/>
		<reference ref_id="CVE-2008-5077" ref_url="https://www.suse.com/security/cve/CVE-2008-5077/" source="CVE"/>
		<reference ref_id="CVE-2009-0590" ref_url="https://www.suse.com/security/cve/CVE-2009-0590/" source="CVE"/>
		<reference ref_id="CVE-2009-0591" ref_url="https://www.suse.com/security/cve/CVE-2009-0591/" source="CVE"/>
		<reference ref_id="CVE-2009-0789" ref_url="https://www.suse.com/security/cve/CVE-2009-0789/" source="CVE"/>
		<reference ref_id="CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377/" source="CVE"/>
		<reference ref_id="CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378/" source="CVE"/>
		<reference ref_id="CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379/" source="CVE"/>
		<reference ref_id="CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386/" source="CVE"/>
		<reference ref_id="CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387/" source="CVE"/>
		<reference ref_id="CVE-2010-0740" ref_url="https://www.suse.com/security/cve/CVE-2010-0740/" source="CVE"/>
		<reference ref_id="CVE-2010-0742" ref_url="https://www.suse.com/security/cve/CVE-2010-0742/" source="CVE"/>
		<reference ref_id="CVE-2010-1633" ref_url="https://www.suse.com/security/cve/CVE-2010-1633/" source="CVE"/>
		<reference ref_id="CVE-2010-2939" ref_url="https://www.suse.com/security/cve/CVE-2010-2939/" source="CVE"/>
		<reference ref_id="CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864/" source="CVE"/>
		<reference ref_id="CVE-2010-5298" ref_url="https://www.suse.com/security/cve/CVE-2010-5298/" source="CVE"/>
		<reference ref_id="CVE-2011-0014" ref_url="https://www.suse.com/security/cve/CVE-2011-0014/" source="CVE"/>
		<reference ref_id="CVE-2011-3207" ref_url="https://www.suse.com/security/cve/CVE-2011-3207/" source="CVE"/>
		<reference ref_id="CVE-2011-3210" ref_url="https://www.suse.com/security/cve/CVE-2011-3210/" source="CVE"/>
		<reference ref_id="CVE-2011-4108" ref_url="https://www.suse.com/security/cve/CVE-2011-4108/" source="CVE"/>
		<reference ref_id="CVE-2011-4576" ref_url="https://www.suse.com/security/cve/CVE-2011-4576/" source="CVE"/>
		<reference ref_id="CVE-2011-4577" ref_url="https://www.suse.com/security/cve/CVE-2011-4577/" source="CVE"/>
		<reference ref_id="CVE-2011-4619" ref_url="https://www.suse.com/security/cve/CVE-2011-4619/" source="CVE"/>
		<reference ref_id="CVE-2012-0027" ref_url="https://www.suse.com/security/cve/CVE-2012-0027/" source="CVE"/>
		<reference ref_id="CVE-2012-0050" ref_url="https://www.suse.com/security/cve/CVE-2012-0050/" source="CVE"/>
		<reference ref_id="CVE-2012-0884" ref_url="https://www.suse.com/security/cve/CVE-2012-0884/" source="CVE"/>
		<reference ref_id="CVE-2012-1165" ref_url="https://www.suse.com/security/cve/CVE-2012-1165/" source="CVE"/>
		<reference ref_id="CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110/" source="CVE"/>
		<reference ref_id="CVE-2012-2686" ref_url="https://www.suse.com/security/cve/CVE-2012-2686/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2013-4353" ref_url="https://www.suse.com/security/cve/CVE-2013-4353/" source="CVE"/>
		<reference ref_id="CVE-2013-6449" ref_url="https://www.suse.com/security/cve/CVE-2013-6449/" source="CVE"/>
		<reference ref_id="CVE-2013-6450" ref_url="https://www.suse.com/security/cve/CVE-2013-6450/" source="CVE"/>
		<reference ref_id="CVE-2014-0076" ref_url="https://www.suse.com/security/cve/CVE-2014-0076/" source="CVE"/>
		<reference ref_id="CVE-2014-0160" ref_url="https://www.suse.com/security/cve/CVE-2014-0160/" source="CVE"/>
		<reference ref_id="CVE-2014-0195" ref_url="https://www.suse.com/security/cve/CVE-2014-0195/" source="CVE"/>
		<reference ref_id="CVE-2014-0198" ref_url="https://www.suse.com/security/cve/CVE-2014-0198/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-3505" ref_url="https://www.suse.com/security/cve/CVE-2014-3505/" source="CVE"/>
		<reference ref_id="CVE-2014-3506" ref_url="https://www.suse.com/security/cve/CVE-2014-3506/" source="CVE"/>
		<reference ref_id="CVE-2014-3507" ref_url="https://www.suse.com/security/cve/CVE-2014-3507/" source="CVE"/>
		<reference ref_id="CVE-2014-3508" ref_url="https://www.suse.com/security/cve/CVE-2014-3508/" source="CVE"/>
		<reference ref_id="CVE-2014-3509" ref_url="https://www.suse.com/security/cve/CVE-2014-3509/" source="CVE"/>
		<reference ref_id="CVE-2014-3510" ref_url="https://www.suse.com/security/cve/CVE-2014-3510/" source="CVE"/>
		<reference ref_id="CVE-2014-3511" ref_url="https://www.suse.com/security/cve/CVE-2014-3511/" source="CVE"/>
		<reference ref_id="CVE-2014-3512" ref_url="https://www.suse.com/security/cve/CVE-2014-3512/" source="CVE"/>
		<reference ref_id="CVE-2014-3513" ref_url="https://www.suse.com/security/cve/CVE-2014-3513/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-5139" ref_url="https://www.suse.com/security/cve/CVE-2014-5139/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0206" ref_url="https://www.suse.com/security/cve/CVE-2015-0206/" source="CVE"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791/" source="CVE"/>
		<reference ref_id="CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792/" source="CVE"/>
		<reference ref_id="CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194/" source="CVE"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="CVE-2015-3196" ref_url="https://www.suse.com/security/cve/CVE-2015-3196/" source="CVE"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2015-3216" ref_url="https://www.suse.com/security/cve/CVE-2015-3216/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0798" ref_url="https://www.suse.com/security/cve/CVE-2016-0798/" source="CVE"/>
		<reference ref_id="CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2107" ref_url="https://www.suse.com/security/cve/CVE-2016-2107/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="CVE-2016-2176" ref_url="https://www.suse.com/security/cve/CVE-2016-2176/" source="CVE"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2180" ref_url="https://www.suse.com/security/cve/CVE-2016-2180/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="CVE-2016-7052" ref_url="https://www.suse.com/security/cve/CVE-2016-7052/" source="CVE"/>
		<reference ref_id="CVE-2016-7055" ref_url="https://www.suse.com/security/cve/CVE-2016-7055/" source="CVE"/>
		<reference ref_id="CVE-2017-3731" ref_url="https://www.suse.com/security/cve/CVE-2017-3731/" source="CVE"/>
		<reference ref_id="CVE-2017-3732" ref_url="https://www.suse.com/security/cve/CVE-2017-3732/" source="CVE"/>
		<reference ref_id="CVE-2017-3735" ref_url="https://www.suse.com/security/cve/CVE-2017-3735/" source="CVE"/>
		<reference ref_id="CVE-2017-3736" ref_url="https://www.suse.com/security/cve/CVE-2017-3736/" source="CVE"/>
		<reference ref_id="CVE-2017-3737" ref_url="https://www.suse.com/security/cve/CVE-2017-3737/" source="CVE"/>
		<reference ref_id="CVE-2017-3738" ref_url="https://www.suse.com/security/cve/CVE-2017-3738/" source="CVE"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737/" source="CVE"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-1_0_0-devel-1.0.2p-2.11 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7250/">CVE-2006-7250</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5077/">CVE-2008-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0590/">CVE-2009-0590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0591/">CVE-2009-0591</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0789/">CVE-2009-0789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0740/">CVE-2010-0740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0742/">CVE-2010-0742</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-1633/">CVE-2010-1633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2939/">CVE-2010-2939</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5298/">CVE-2010-5298</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0014/">CVE-2011-0014</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3207/">CVE-2011-3207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3210/">CVE-2011-3210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4108/">CVE-2011-4108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4576/">CVE-2011-4576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4577/">CVE-2011-4577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4619/">CVE-2011-4619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0027/">CVE-2012-0027</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0050/">CVE-2012-0050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0884/">CVE-2012-0884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1165/">CVE-2012-1165</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2686/">CVE-2012-2686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4353/">CVE-2013-4353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6449/">CVE-2013-6449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6450/">CVE-2013-6450</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0076/">CVE-2014-0076</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0160/">CVE-2014-0160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0195/">CVE-2014-0195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0198/">CVE-2014-0198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3505/">CVE-2014-3505</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3506/">CVE-2014-3506</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3507/">CVE-2014-3507</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3508/">CVE-2014-3508</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3509/">CVE-2014-3509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3510/">CVE-2014-3510</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3511/">CVE-2014-3511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3512/">CVE-2014-3512</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-3513/">CVE-2014-3513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-5139/">CVE-2014-5139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0206/">CVE-2015-0206</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3196/">CVE-2015-3196</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3216/">CVE-2015-3216</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0798/">CVE-2016-0798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2107/">CVE-2016-2107</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2176/">CVE-2016-2176</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2180/">CVE-2016-2180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7052/">CVE-2016-7052</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7055/">CVE-2016-7055</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3731/">CVE-2017-3731</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3732/">CVE-2017-3732</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3735/">CVE-2017-3735</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3736/">CVE-2017-3736</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3737/">CVE-2017-3737</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3738/">CVE-2017-3738</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512362" comment="libopenssl-1_0_0-devel-1.0.2p-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512363" comment="libopenssl1_0_0-1.0.2p-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512364" comment="libopenssl1_0_0-32bit-1.0.2p-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512365" comment="openssl-1_0_0-1.0.2p-2.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77011" version="1" class="patch">
	<metadata>
		<title>libopenssl-devel-1.0.2p-1.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-7250" ref_url="https://www.suse.com/security/cve/CVE-2006-7250/" source="CVE"/>
		<reference ref_id="CVE-2008-5077" ref_url="https://www.suse.com/security/cve/CVE-2008-5077/" source="CVE"/>
		<reference ref_id="CVE-2009-0590" ref_url="https://www.suse.com/security/cve/CVE-2009-0590/" source="CVE"/>
		<reference ref_id="CVE-2009-0591" ref_url="https://www.suse.com/security/cve/CVE-2009-0591/" source="CVE"/>
		<reference ref_id="CVE-2009-0789" ref_url="https://www.suse.com/security/cve/CVE-2009-0789/" source="CVE"/>
		<reference ref_id="CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377/" source="CVE"/>
		<reference ref_id="CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378/" source="CVE"/>
		<reference ref_id="CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379/" source="CVE"/>
		<reference ref_id="CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386/" source="CVE"/>
		<reference ref_id="CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387/" source="CVE"/>
		<reference ref_id="CVE-2010-0740" ref_url="https://www.suse.com/security/cve/CVE-2010-0740/" source="CVE"/>
		<reference ref_id="CVE-2010-0742" ref_url="https://www.suse.com/security/cve/CVE-2010-0742/" source="CVE"/>
		<reference ref_id="CVE-2010-1633" ref_url="https://www.suse.com/security/cve/CVE-2010-1633/" source="CVE"/>
		<reference ref_id="CVE-2010-2939" ref_url="https://www.suse.com/security/cve/CVE-2010-2939/" source="CVE"/>
		<reference ref_id="CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864/" source="CVE"/>
		<reference ref_id="CVE-2010-5298" ref_url="https://www.suse.com/security/cve/CVE-2010-5298/" source="CVE"/>
		<reference ref_id="CVE-2011-0014" ref_url="https://www.suse.com/security/cve/CVE-2011-0014/" source="CVE"/>
		<reference ref_id="CVE-2011-3207" ref_url="https://www.suse.com/security/cve/CVE-2011-3207/" source="CVE"/>
		<reference ref_id="CVE-2011-3210" ref_url="https://www.suse.com/security/cve/CVE-2011-3210/" source="CVE"/>
		<reference ref_id="CVE-2011-4108" ref_url="https://www.suse.com/security/cve/CVE-2011-4108/" source="CVE"/>
		<reference ref_id="CVE-2011-4576" ref_url="https://www.suse.com/security/cve/CVE-2011-4576/" source="CVE"/>
		<reference ref_id="CVE-2011-4577" ref_url="https://www.suse.com/security/cve/CVE-2011-4577/" source="CVE"/>
		<reference ref_id="CVE-2011-4619" ref_url="https://www.suse.com/security/cve/CVE-2011-4619/" source="CVE"/>
		<reference ref_id="CVE-2012-0027" ref_url="https://www.suse.com/security/cve/CVE-2012-0027/" source="CVE"/>
		<reference ref_id="CVE-2012-0050" ref_url="https://www.suse.com/security/cve/CVE-2012-0050/" source="CVE"/>
		<reference ref_id="CVE-2012-0884" ref_url="https://www.suse.com/security/cve/CVE-2012-0884/" source="CVE"/>
		<reference ref_id="CVE-2012-1165" ref_url="https://www.suse.com/security/cve/CVE-2012-1165/" source="CVE"/>
		<reference ref_id="CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110/" source="CVE"/>
		<reference ref_id="CVE-2012-2686" ref_url="https://www.suse.com/security/cve/CVE-2012-2686/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2013-4353" ref_url="https://www.suse.com/security/cve/CVE-2013-4353/" source="CVE"/>
		<reference ref_id="CVE-2013-6449" ref_url="https://www.suse.com/security/cve/CVE-2013-6449/" source="CVE"/>
		<reference ref_id="CVE-2013-6450" ref_url="https://www.suse.com/security/cve/CVE-2013-6450/" source="CVE"/>
		<reference ref_id="CVE-2014-0076" ref_url="https://www.suse.com/security/cve/CVE-2014-0076/" source="CVE"/>
		<reference ref_id="CVE-2014-0160" ref_url="https://www.suse.com/security/cve/CVE-2014-0160/" source="CVE"/>
		<reference ref_id="CVE-2014-0195" ref_url="https://www.suse.com/security/cve/CVE-2014-0195/" source="CVE"/>
		<reference ref_id="CVE-2014-0198" ref_url="https://www.suse.com/security/cve/CVE-2014-0198/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-3505" ref_url="https://www.suse.com/security/cve/CVE-2014-3505/" source="CVE"/>
		<reference ref_id="CVE-2014-3506" ref_url="https://www.suse.com/security/cve/CVE-2014-3506/" source="CVE"/>
		<reference ref_id="CVE-2014-3507" ref_url="https://www.suse.com/security/cve/CVE-2014-3507/" source="CVE"/>
		<reference ref_id="CVE-2014-3508" ref_url="https://www.suse.com/security/cve/CVE-2014-3508/" source="CVE"/>
		<reference ref_id="CVE-2014-3509" ref_url="https://www.suse.com/security/cve/CVE-2014-3509/" source="CVE"/>
		<reference ref_id="CVE-2014-3510" ref_url="https://www.suse.com/security/cve/CVE-2014-3510/" source="CVE"/>
		<reference ref_id="CVE-2014-3511" ref_url="https://www.suse.com/security/cve/CVE-2014-3511/" source="CVE"/>
		<reference ref_id="CVE-2014-3512" ref_url="https://www.suse.com/security/cve/CVE-2014-3512/" source="CVE"/>
		<reference ref_id="CVE-2014-3513" ref_url="https://www.suse.com/security/cve/CVE-2014-3513/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="CVE-2014-3569" ref_url="https://www.suse.com/security/cve/CVE-2014-3569/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-5139" ref_url="https://www.suse.com/security/cve/CVE-2014-5139/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0206" ref_url="https://www.suse.com/security/cve/CVE-2015-0206/" source="CVE"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791/" source="CVE"/>
		<reference ref_id="CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792/" source="CVE"/>
		<reference ref_id="CVE-2015-1793" ref_url="https://www.suse.com/security/cve/CVE-2015-1793/" source="CVE"/>
		<reference ref_id="CVE-2015-1794" ref_url="https://www.suse.com/security/cve/CVE-2015-1794/" source="CVE"/>
		<reference ref_id="CVE-2015-3193" ref_url="https://www.suse.com/security/cve/CVE-2015-3193/" source="CVE"/>
		<reference ref_id="CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194/" source="CVE"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="CVE-2015-3196" ref_url="https://www.suse.com/security/cve/CVE-2015-3196/" source="CVE"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0701" ref_url="https://www.suse.com/security/cve/CVE-2016-0701/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0798" ref_url="https://www.suse.com/security/cve/CVE-2016-0798/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2107" ref_url="https://www.suse.com/security/cve/CVE-2016-2107/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="CVE-2016-2176" ref_url="https://www.suse.com/security/cve/CVE-2016-2176/" source="CVE"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2180" ref_url="https://www.suse.com/security/cve/CVE-2016-2180/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="CVE-2016-7052" ref_url="https://www.suse.com/security/cve/CVE-2016-7052/" source="CVE"/>
		<reference ref_id="CVE-2016-7055" ref_url="https://www.suse.com/security/cve/CVE-2016-7055/" source="CVE"/>
		<reference ref_id="CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056/" source="CVE"/>
		<reference ref_id="CVE-2017-3731" ref_url="https://www.suse.com/security/cve/CVE-2017-3731/" source="CVE"/>
		<reference ref_id="CVE-2017-3732" ref_url="https://www.suse.com/security/cve/CVE-2017-3732/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-devel-1.0.2p-1.13 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7250/">CVE-2006-7250</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5077/">CVE-2008-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0590/">CVE-2009-0590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0591/">CVE-2009-0591</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0789/">CVE-2009-0789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0740/">CVE-2010-0740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0742/">CVE-2010-0742</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-1633/">CVE-2010-1633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2939/">CVE-2010-2939</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5298/">CVE-2010-5298</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0014/">CVE-2011-0014</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3207/">CVE-2011-3207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3210/">CVE-2011-3210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4108/">CVE-2011-4108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4576/">CVE-2011-4576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4577/">CVE-2011-4577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4619/">CVE-2011-4619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0027/">CVE-2012-0027</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0050/">CVE-2012-0050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0884/">CVE-2012-0884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1165/">CVE-2012-1165</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2686/">CVE-2012-2686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4353/">CVE-2013-4353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6449/">CVE-2013-6449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6450/">CVE-2013-6450</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0076/">CVE-2014-0076</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0160/">CVE-2014-0160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0195/">CVE-2014-0195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0198/">CVE-2014-0198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3505/">CVE-2014-3505</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3506/">CVE-2014-3506</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3507/">CVE-2014-3507</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3508/">CVE-2014-3508</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3509/">CVE-2014-3509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3510/">CVE-2014-3510</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3511/">CVE-2014-3511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3512/">CVE-2014-3512</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-3513/">CVE-2014-3513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3569/">CVE-2014-3569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-5139/">CVE-2014-5139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0206/">CVE-2015-0206</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1793/">CVE-2015-1793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1794/">CVE-2015-1794</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3193/">CVE-2015-3193</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3196/">CVE-2015-3196</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0701/">CVE-2016-0701</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0798/">CVE-2016-0798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2107/">CVE-2016-2107</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2176/">CVE-2016-2176</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2180/">CVE-2016-2180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7052/">CVE-2016-7052</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7055/">CVE-2016-7055</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3731/">CVE-2017-3731</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3732/">CVE-2017-3732</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512366" comment="libopenssl-devel-1.0.2p-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512367" comment="openssl-1.0.2p-1.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77012" version="1" class="patch">
	<metadata>
		<title>libopenssl0_9_8-0.9.8j-106.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-7250" ref_url="https://www.suse.com/security/cve/CVE-2006-7250/" source="CVE"/>
		<reference ref_id="CVE-2009-0590" ref_url="https://www.suse.com/security/cve/CVE-2009-0590/" source="CVE"/>
		<reference ref_id="CVE-2009-0591" ref_url="https://www.suse.com/security/cve/CVE-2009-0591/" source="CVE"/>
		<reference ref_id="CVE-2009-0789" ref_url="https://www.suse.com/security/cve/CVE-2009-0789/" source="CVE"/>
		<reference ref_id="CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377/" source="CVE"/>
		<reference ref_id="CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378/" source="CVE"/>
		<reference ref_id="CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379/" source="CVE"/>
		<reference ref_id="CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386/" source="CVE"/>
		<reference ref_id="CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387/" source="CVE"/>
		<reference ref_id="CVE-2009-3245" ref_url="https://www.suse.com/security/cve/CVE-2009-3245/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-4355" ref_url="https://www.suse.com/security/cve/CVE-2009-4355/" source="CVE"/>
		<reference ref_id="CVE-2009-5146" ref_url="https://www.suse.com/security/cve/CVE-2009-5146/" source="CVE"/>
		<reference ref_id="CVE-2010-0740" ref_url="https://www.suse.com/security/cve/CVE-2010-0740/" source="CVE"/>
		<reference ref_id="CVE-2010-2939" ref_url="https://www.suse.com/security/cve/CVE-2010-2939/" source="CVE"/>
		<reference ref_id="CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864/" source="CVE"/>
		<reference ref_id="CVE-2010-4180" ref_url="https://www.suse.com/security/cve/CVE-2010-4180/" source="CVE"/>
		<reference ref_id="CVE-2010-4252" ref_url="https://www.suse.com/security/cve/CVE-2010-4252/" source="CVE"/>
		<reference ref_id="CVE-2011-0014" ref_url="https://www.suse.com/security/cve/CVE-2011-0014/" source="CVE"/>
		<reference ref_id="CVE-2011-3210" ref_url="https://www.suse.com/security/cve/CVE-2011-3210/" source="CVE"/>
		<reference ref_id="CVE-2011-4108" ref_url="https://www.suse.com/security/cve/CVE-2011-4108/" source="CVE"/>
		<reference ref_id="CVE-2011-4109" ref_url="https://www.suse.com/security/cve/CVE-2011-4109/" source="CVE"/>
		<reference ref_id="CVE-2011-4354" ref_url="https://www.suse.com/security/cve/CVE-2011-4354/" source="CVE"/>
		<reference ref_id="CVE-2011-4576" ref_url="https://www.suse.com/security/cve/CVE-2011-4576/" source="CVE"/>
		<reference ref_id="CVE-2011-4577" ref_url="https://www.suse.com/security/cve/CVE-2011-4577/" source="CVE"/>
		<reference ref_id="CVE-2011-4619" ref_url="https://www.suse.com/security/cve/CVE-2011-4619/" source="CVE"/>
		<reference ref_id="CVE-2011-5095" ref_url="https://www.suse.com/security/cve/CVE-2011-5095/" source="CVE"/>
		<reference ref_id="CVE-2012-0050" ref_url="https://www.suse.com/security/cve/CVE-2012-0050/" source="CVE"/>
		<reference ref_id="CVE-2012-0884" ref_url="https://www.suse.com/security/cve/CVE-2012-0884/" source="CVE"/>
		<reference ref_id="CVE-2012-1165" ref_url="https://www.suse.com/security/cve/CVE-2012-1165/" source="CVE"/>
		<reference ref_id="CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110/" source="CVE"/>
		<reference ref_id="CVE-2012-2131" ref_url="https://www.suse.com/security/cve/CVE-2012-2131/" source="CVE"/>
		<reference ref_id="CVE-2012-2333" ref_url="https://www.suse.com/security/cve/CVE-2012-2333/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2014-0076" ref_url="https://www.suse.com/security/cve/CVE-2014-0076/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-3505" ref_url="https://www.suse.com/security/cve/CVE-2014-3505/" source="CVE"/>
		<reference ref_id="CVE-2014-3506" ref_url="https://www.suse.com/security/cve/CVE-2014-3506/" source="CVE"/>
		<reference ref_id="CVE-2014-3507" ref_url="https://www.suse.com/security/cve/CVE-2014-3507/" source="CVE"/>
		<reference ref_id="CVE-2014-3508" ref_url="https://www.suse.com/security/cve/CVE-2014-3508/" source="CVE"/>
		<reference ref_id="CVE-2014-3510" ref_url="https://www.suse.com/security/cve/CVE-2014-3510/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0292" ref_url="https://www.suse.com/security/cve/CVE-2015-0292/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791/" source="CVE"/>
		<reference ref_id="CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792/" source="CVE"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2015-3216" ref_url="https://www.suse.com/security/cve/CVE-2015-3216/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056/" source="CVE"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737/" source="CVE"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl0_9_8-0.9.8j-106.6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7250/">CVE-2006-7250</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0590/">CVE-2009-0590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0591/">CVE-2009-0591</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0789/">CVE-2009-0789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3245/">CVE-2009-3245</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4355/">CVE-2009-4355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5146/">CVE-2009-5146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0740/">CVE-2010-0740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2939/">CVE-2010-2939</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4180/">CVE-2010-4180</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4252/">CVE-2010-4252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0014/">CVE-2011-0014</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3210/">CVE-2011-3210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4108/">CVE-2011-4108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4109/">CVE-2011-4109</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4354/">CVE-2011-4354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4576/">CVE-2011-4576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4577/">CVE-2011-4577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4619/">CVE-2011-4619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5095/">CVE-2011-5095</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0050/">CVE-2012-0050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0884/">CVE-2012-0884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1165/">CVE-2012-1165</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2131/">CVE-2012-2131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2333/">CVE-2012-2333</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0076/">CVE-2014-0076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3505/">CVE-2014-3505</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3506/">CVE-2014-3506</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3507/">CVE-2014-3507</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3508/">CVE-2014-3508</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3510/">CVE-2014-3510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0292/">CVE-2015-0292</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3216/">CVE-2015-3216</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512368" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512369" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77013" version="1" class="patch">
	<metadata>
		<title>libopenssl1_1-1.1.1-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-7250" ref_url="https://www.suse.com/security/cve/CVE-2006-7250/" source="CVE"/>
		<reference ref_id="CVE-2008-5077" ref_url="https://www.suse.com/security/cve/CVE-2008-5077/" source="CVE"/>
		<reference ref_id="CVE-2009-0590" ref_url="https://www.suse.com/security/cve/CVE-2009-0590/" source="CVE"/>
		<reference ref_id="CVE-2009-0591" ref_url="https://www.suse.com/security/cve/CVE-2009-0591/" source="CVE"/>
		<reference ref_id="CVE-2009-0789" ref_url="https://www.suse.com/security/cve/CVE-2009-0789/" source="CVE"/>
		<reference ref_id="CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377/" source="CVE"/>
		<reference ref_id="CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378/" source="CVE"/>
		<reference ref_id="CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379/" source="CVE"/>
		<reference ref_id="CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386/" source="CVE"/>
		<reference ref_id="CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387/" source="CVE"/>
		<reference ref_id="CVE-2010-0740" ref_url="https://www.suse.com/security/cve/CVE-2010-0740/" source="CVE"/>
		<reference ref_id="CVE-2010-0742" ref_url="https://www.suse.com/security/cve/CVE-2010-0742/" source="CVE"/>
		<reference ref_id="CVE-2010-1633" ref_url="https://www.suse.com/security/cve/CVE-2010-1633/" source="CVE"/>
		<reference ref_id="CVE-2010-2939" ref_url="https://www.suse.com/security/cve/CVE-2010-2939/" source="CVE"/>
		<reference ref_id="CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864/" source="CVE"/>
		<reference ref_id="CVE-2010-5298" ref_url="https://www.suse.com/security/cve/CVE-2010-5298/" source="CVE"/>
		<reference ref_id="CVE-2011-0014" ref_url="https://www.suse.com/security/cve/CVE-2011-0014/" source="CVE"/>
		<reference ref_id="CVE-2011-3207" ref_url="https://www.suse.com/security/cve/CVE-2011-3207/" source="CVE"/>
		<reference ref_id="CVE-2011-3210" ref_url="https://www.suse.com/security/cve/CVE-2011-3210/" source="CVE"/>
		<reference ref_id="CVE-2011-4108" ref_url="https://www.suse.com/security/cve/CVE-2011-4108/" source="CVE"/>
		<reference ref_id="CVE-2011-4576" ref_url="https://www.suse.com/security/cve/CVE-2011-4576/" source="CVE"/>
		<reference ref_id="CVE-2011-4577" ref_url="https://www.suse.com/security/cve/CVE-2011-4577/" source="CVE"/>
		<reference ref_id="CVE-2011-4619" ref_url="https://www.suse.com/security/cve/CVE-2011-4619/" source="CVE"/>
		<reference ref_id="CVE-2012-0027" ref_url="https://www.suse.com/security/cve/CVE-2012-0027/" source="CVE"/>
		<reference ref_id="CVE-2012-0050" ref_url="https://www.suse.com/security/cve/CVE-2012-0050/" source="CVE"/>
		<reference ref_id="CVE-2012-0884" ref_url="https://www.suse.com/security/cve/CVE-2012-0884/" source="CVE"/>
		<reference ref_id="CVE-2012-1165" ref_url="https://www.suse.com/security/cve/CVE-2012-1165/" source="CVE"/>
		<reference ref_id="CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110/" source="CVE"/>
		<reference ref_id="CVE-2012-2686" ref_url="https://www.suse.com/security/cve/CVE-2012-2686/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2013-4353" ref_url="https://www.suse.com/security/cve/CVE-2013-4353/" source="CVE"/>
		<reference ref_id="CVE-2013-6449" ref_url="https://www.suse.com/security/cve/CVE-2013-6449/" source="CVE"/>
		<reference ref_id="CVE-2013-6450" ref_url="https://www.suse.com/security/cve/CVE-2013-6450/" source="CVE"/>
		<reference ref_id="CVE-2014-0076" ref_url="https://www.suse.com/security/cve/CVE-2014-0076/" source="CVE"/>
		<reference ref_id="CVE-2014-0160" ref_url="https://www.suse.com/security/cve/CVE-2014-0160/" source="CVE"/>
		<reference ref_id="CVE-2014-0195" ref_url="https://www.suse.com/security/cve/CVE-2014-0195/" source="CVE"/>
		<reference ref_id="CVE-2014-0198" ref_url="https://www.suse.com/security/cve/CVE-2014-0198/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-3505" ref_url="https://www.suse.com/security/cve/CVE-2014-3505/" source="CVE"/>
		<reference ref_id="CVE-2014-3506" ref_url="https://www.suse.com/security/cve/CVE-2014-3506/" source="CVE"/>
		<reference ref_id="CVE-2014-3507" ref_url="https://www.suse.com/security/cve/CVE-2014-3507/" source="CVE"/>
		<reference ref_id="CVE-2014-3508" ref_url="https://www.suse.com/security/cve/CVE-2014-3508/" source="CVE"/>
		<reference ref_id="CVE-2014-3509" ref_url="https://www.suse.com/security/cve/CVE-2014-3509/" source="CVE"/>
		<reference ref_id="CVE-2014-3510" ref_url="https://www.suse.com/security/cve/CVE-2014-3510/" source="CVE"/>
		<reference ref_id="CVE-2014-3511" ref_url="https://www.suse.com/security/cve/CVE-2014-3511/" source="CVE"/>
		<reference ref_id="CVE-2014-3512" ref_url="https://www.suse.com/security/cve/CVE-2014-3512/" source="CVE"/>
		<reference ref_id="CVE-2014-3513" ref_url="https://www.suse.com/security/cve/CVE-2014-3513/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="CVE-2014-3569" ref_url="https://www.suse.com/security/cve/CVE-2014-3569/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-5139" ref_url="https://www.suse.com/security/cve/CVE-2014-5139/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0206" ref_url="https://www.suse.com/security/cve/CVE-2015-0206/" source="CVE"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791/" source="CVE"/>
		<reference ref_id="CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792/" source="CVE"/>
		<reference ref_id="CVE-2015-1793" ref_url="https://www.suse.com/security/cve/CVE-2015-1793/" source="CVE"/>
		<reference ref_id="CVE-2015-1794" ref_url="https://www.suse.com/security/cve/CVE-2015-1794/" source="CVE"/>
		<reference ref_id="CVE-2015-3193" ref_url="https://www.suse.com/security/cve/CVE-2015-3193/" source="CVE"/>
		<reference ref_id="CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194/" source="CVE"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="CVE-2015-3196" ref_url="https://www.suse.com/security/cve/CVE-2015-3196/" source="CVE"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0701" ref_url="https://www.suse.com/security/cve/CVE-2016-0701/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0798" ref_url="https://www.suse.com/security/cve/CVE-2016-0798/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2107" ref_url="https://www.suse.com/security/cve/CVE-2016-2107/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="CVE-2016-2176" ref_url="https://www.suse.com/security/cve/CVE-2016-2176/" source="CVE"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2180" ref_url="https://www.suse.com/security/cve/CVE-2016-2180/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="CVE-2016-7052" ref_url="https://www.suse.com/security/cve/CVE-2016-7052/" source="CVE"/>
		<reference ref_id="CVE-2016-7055" ref_url="https://www.suse.com/security/cve/CVE-2016-7055/" source="CVE"/>
		<reference ref_id="CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056/" source="CVE"/>
		<reference ref_id="CVE-2017-3731" ref_url="https://www.suse.com/security/cve/CVE-2017-3731/" source="CVE"/>
		<reference ref_id="CVE-2017-3732" ref_url="https://www.suse.com/security/cve/CVE-2017-3732/" source="CVE"/>
		<reference ref_id="CVE-2017-3735" ref_url="https://www.suse.com/security/cve/CVE-2017-3735/" source="CVE"/>
		<reference ref_id="CVE-2017-3736" ref_url="https://www.suse.com/security/cve/CVE-2017-3736/" source="CVE"/>
		<reference ref_id="CVE-2017-3738" ref_url="https://www.suse.com/security/cve/CVE-2017-3738/" source="CVE"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737/" source="CVE"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl1_1-1.1.1-1.9 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7250/">CVE-2006-7250</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5077/">CVE-2008-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0590/">CVE-2009-0590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0591/">CVE-2009-0591</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0789/">CVE-2009-0789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0740/">CVE-2010-0740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0742/">CVE-2010-0742</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-1633/">CVE-2010-1633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2939/">CVE-2010-2939</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5298/">CVE-2010-5298</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0014/">CVE-2011-0014</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3207/">CVE-2011-3207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3210/">CVE-2011-3210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4108/">CVE-2011-4108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4576/">CVE-2011-4576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4577/">CVE-2011-4577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4619/">CVE-2011-4619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0027/">CVE-2012-0027</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0050/">CVE-2012-0050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0884/">CVE-2012-0884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1165/">CVE-2012-1165</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2686/">CVE-2012-2686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4353/">CVE-2013-4353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6449/">CVE-2013-6449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6450/">CVE-2013-6450</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0076/">CVE-2014-0076</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0160/">CVE-2014-0160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0195/">CVE-2014-0195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0198/">CVE-2014-0198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3505/">CVE-2014-3505</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3506/">CVE-2014-3506</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3507/">CVE-2014-3507</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3508/">CVE-2014-3508</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3509/">CVE-2014-3509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3510/">CVE-2014-3510</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3511/">CVE-2014-3511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3512/">CVE-2014-3512</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-3513/">CVE-2014-3513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3569/">CVE-2014-3569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-5139/">CVE-2014-5139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0206/">CVE-2015-0206</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1793/">CVE-2015-1793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1794/">CVE-2015-1794</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3193/">CVE-2015-3193</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3196/">CVE-2015-3196</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0701/">CVE-2016-0701</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0798/">CVE-2016-0798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2107/">CVE-2016-2107</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2176/">CVE-2016-2176</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2180/">CVE-2016-2180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7052/">CVE-2016-7052</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7055/">CVE-2016-7055</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3731/">CVE-2017-3731</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3732/">CVE-2017-3732</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3735/">CVE-2017-3735</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3736/">CVE-2017-3736</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3738/">CVE-2017-3738</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512370" comment="libopenssl1_1-1.1.1-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512371" comment="libopenssl1_1-32bit-1.1.1-1.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77014" version="1" class="patch">
	<metadata>
		<title>libopus0-1.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-0381" ref_url="https://www.suse.com/security/cve/CVE-2017-0381/" source="CVE"/>
		<description>
These are all security issues fixed in the libopus0-1.1-3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-0381/">CVE-2017-0381</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009148261" comment="libopus0-1.1-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77015" version="1" class="patch">
	<metadata>
		<title>libosip2-3.5.0-20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-10324" ref_url="https://www.suse.com/security/cve/CVE-2016-10324/" source="CVE"/>
		<reference ref_id="CVE-2016-10325" ref_url="https://www.suse.com/security/cve/CVE-2016-10325/" source="CVE"/>
		<reference ref_id="CVE-2016-10326" ref_url="https://www.suse.com/security/cve/CVE-2016-10326/" source="CVE"/>
		<reference ref_id="CVE-2017-7853" ref_url="https://www.suse.com/security/cve/CVE-2017-7853/" source="CVE"/>
		<description>
These are all security issues fixed in the libosip2-3.5.0-20.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10324/">CVE-2016-10324</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10325/">CVE-2016-10325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10326/">CVE-2016-10326</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7853/">CVE-2017-7853</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155050" comment="libosip2-3.5.0-20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77016" version="1" class="patch">
	<metadata>
		<title>libotr5-4.0.0-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-2851" ref_url="https://www.suse.com/security/cve/CVE-2016-2851/" source="CVE"/>
		<description>
These are all security issues fixed in the libotr5-4.0.0-9.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2851/">CVE-2016-2851</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124478" comment="libotr5-4.0.0-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77017" version="1" class="patch">
	<metadata>
		<title>libpango-1_0-0-1.40.1-9.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-0020" ref_url="https://www.suse.com/security/cve/CVE-2011-0020/" source="CVE"/>
		<reference ref_id="CVE-2011-0064" ref_url="https://www.suse.com/security/cve/CVE-2011-0064/" source="CVE"/>
		<description>
These are all security issues fixed in the libpango-1_0-0-1.40.1-9.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0020/">CVE-2011-0020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0064/">CVE-2011-0064</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140897" comment="libpango-1_0-0-1.40.1-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140898" comment="libpango-1_0-0-32bit-1.40.1-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140899" comment="typelib-1_0-Pango-1_0-1.40.1-9.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77018" version="1" class="patch">
	<metadata>
		<title>libpcre1-32bit-8.39-8.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964/" source="CVE"/>
		<reference ref_id="CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325/" source="CVE"/>
		<reference ref_id="CVE-2015-2327" ref_url="https://www.suse.com/security/cve/CVE-2015-2327/" source="CVE"/>
		<reference ref_id="CVE-2015-2328" ref_url="https://www.suse.com/security/cve/CVE-2015-2328/" source="CVE"/>
		<reference ref_id="CVE-2015-3210" ref_url="https://www.suse.com/security/cve/CVE-2015-3210/" source="CVE"/>
		<reference ref_id="CVE-2015-3217" ref_url="https://www.suse.com/security/cve/CVE-2015-3217/" source="CVE"/>
		<reference ref_id="CVE-2015-5073" ref_url="https://www.suse.com/security/cve/CVE-2015-5073/" source="CVE"/>
		<reference ref_id="CVE-2015-8380" ref_url="https://www.suse.com/security/cve/CVE-2015-8380/" source="CVE"/>
		<reference ref_id="CVE-2016-1283" ref_url="https://www.suse.com/security/cve/CVE-2016-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-3191" ref_url="https://www.suse.com/security/cve/CVE-2016-3191/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcre1-32bit-8.39-8.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2327/">CVE-2015-2327</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2328/">CVE-2015-2328</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3210/">CVE-2015-3210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3217/">CVE-2015-3217</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5073/">CVE-2015-5073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8380/">CVE-2015-8380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1283/">CVE-2016-1283</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3191/">CVE-2016-3191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512372" comment="libpcre1-8.39-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512373" comment="libpcre1-32bit-8.39-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512374" comment="libpcre16-0-8.39-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512375" comment="libpcrecpp0-8.39-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512376" comment="libpcrecpp0-32bit-8.39-8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77019" version="1" class="patch">
	<metadata>
		<title>libpcsclite1-1.8.10-7.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-0407" ref_url="https://www.suse.com/security/cve/CVE-2010-0407/" source="CVE"/>
		<reference ref_id="CVE-2010-4531" ref_url="https://www.suse.com/security/cve/CVE-2010-4531/" source="CVE"/>
		<reference ref_id="CVE-2016-10109" ref_url="https://www.suse.com/security/cve/CVE-2016-10109/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcsclite1-1.8.10-7.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0407/">CVE-2010-0407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4531/">CVE-2010-4531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10109/">CVE-2016-10109</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512377" comment="libpcsclite1-1.8.10-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512378" comment="libpcsclite1-32bit-1.8.10-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512379" comment="pcsc-lite-1.8.10-7.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77020" version="1" class="patch">
	<metadata>
		<title>libplist++3-1.12-20.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-5209" ref_url="https://www.suse.com/security/cve/CVE-2017-5209/" source="CVE"/>
		<reference ref_id="CVE-2017-5545" ref_url="https://www.suse.com/security/cve/CVE-2017-5545/" source="CVE"/>
		<reference ref_id="CVE-2017-5834" ref_url="https://www.suse.com/security/cve/CVE-2017-5834/" source="CVE"/>
		<reference ref_id="CVE-2017-5835" ref_url="https://www.suse.com/security/cve/CVE-2017-5835/" source="CVE"/>
		<reference ref_id="CVE-2017-5836" ref_url="https://www.suse.com/security/cve/CVE-2017-5836/" source="CVE"/>
		<reference ref_id="CVE-2017-6435" ref_url="https://www.suse.com/security/cve/CVE-2017-6435/" source="CVE"/>
		<reference ref_id="CVE-2017-6436" ref_url="https://www.suse.com/security/cve/CVE-2017-6436/" source="CVE"/>
		<reference ref_id="CVE-2017-6437" ref_url="https://www.suse.com/security/cve/CVE-2017-6437/" source="CVE"/>
		<reference ref_id="CVE-2017-6438" ref_url="https://www.suse.com/security/cve/CVE-2017-6438/" source="CVE"/>
		<reference ref_id="CVE-2017-6439" ref_url="https://www.suse.com/security/cve/CVE-2017-6439/" source="CVE"/>
		<reference ref_id="CVE-2017-6440" ref_url="https://www.suse.com/security/cve/CVE-2017-6440/" source="CVE"/>
		<reference ref_id="CVE-2017-7982" ref_url="https://www.suse.com/security/cve/CVE-2017-7982/" source="CVE"/>
		<description>
These are all security issues fixed in the libplist++3-1.12-20.3.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5209/">CVE-2017-5209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5545/">CVE-2017-5545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5834/">CVE-2017-5834</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5835/">CVE-2017-5835</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5836/">CVE-2017-5836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6435/">CVE-2017-6435</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6436/">CVE-2017-6436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6437/">CVE-2017-6437</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6438/">CVE-2017-6438</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6439/">CVE-2017-6439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6440/">CVE-2017-6440</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7982/">CVE-2017-7982</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009162112" comment="libplist++3-1.12-20.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009162113" comment="libplist3-1.12-20.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77021" version="1" class="patch">
	<metadata>
		<title>libpng12-0-1.2.50-19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3045" ref_url="https://www.suse.com/security/cve/CVE-2011-3045/" source="CVE"/>
		<reference ref_id="CVE-2011-3048" ref_url="https://www.suse.com/security/cve/CVE-2011-3048/" source="CVE"/>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<reference ref_id="CVE-2013-7353" ref_url="https://www.suse.com/security/cve/CVE-2013-7353/" source="CVE"/>
		<reference ref_id="CVE-2013-7354" ref_url="https://www.suse.com/security/cve/CVE-2013-7354/" source="CVE"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng12-0-1.2.50-19.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3045/">CVE-2011-3045</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3048/">CVE-2011-3048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7353/">CVE-2013-7353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7354/">CVE-2013-7354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009149999" comment="libpng12-0-1.2.50-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150000" comment="libpng12-0-32bit-1.2.50-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77022" version="1" class="patch">
	<metadata>
		<title>libpng15-15-1.5.22-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501/" source="CVE"/>
		<reference ref_id="CVE-2011-2690" ref_url="https://www.suse.com/security/cve/CVE-2011-2690/" source="CVE"/>
		<reference ref_id="CVE-2011-2691" ref_url="https://www.suse.com/security/cve/CVE-2011-2691/" source="CVE"/>
		<reference ref_id="CVE-2011-2692" ref_url="https://www.suse.com/security/cve/CVE-2011-2692/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3048" ref_url="https://www.suse.com/security/cve/CVE-2011-3048/" source="CVE"/>
		<reference ref_id="CVE-2011-3328" ref_url="https://www.suse.com/security/cve/CVE-2011-3328/" source="CVE"/>
		<reference ref_id="CVE-2011-3464" ref_url="https://www.suse.com/security/cve/CVE-2011-3464/" source="CVE"/>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng15-15-1.5.22-9.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2690/">CVE-2011-2690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2691/">CVE-2011-2691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2692/">CVE-2011-2692</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3048/">CVE-2011-3048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3328/">CVE-2011-3328</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3464/">CVE-2011-3464</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150810" comment="libpng15-15-1.5.22-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77023" version="1" class="patch">
	<metadata>
		<title>libpng16-16-1.6.8-14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501/" source="CVE"/>
		<reference ref_id="CVE-2011-2690" ref_url="https://www.suse.com/security/cve/CVE-2011-2690/" source="CVE"/>
		<reference ref_id="CVE-2011-2691" ref_url="https://www.suse.com/security/cve/CVE-2011-2691/" source="CVE"/>
		<reference ref_id="CVE-2011-2692" ref_url="https://www.suse.com/security/cve/CVE-2011-2692/" source="CVE"/>
		<reference ref_id="CVE-2011-3328" ref_url="https://www.suse.com/security/cve/CVE-2011-3328/" source="CVE"/>
		<reference ref_id="CVE-2013-6954" ref_url="https://www.suse.com/security/cve/CVE-2013-6954/" source="CVE"/>
		<reference ref_id="CVE-2014-0333" ref_url="https://www.suse.com/security/cve/CVE-2014-0333/" source="CVE"/>
		<reference ref_id="CVE-2014-9495" ref_url="https://www.suse.com/security/cve/CVE-2014-9495/" source="CVE"/>
		<reference ref_id="CVE-2015-0973" ref_url="https://www.suse.com/security/cve/CVE-2015-0973/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng16-16-1.6.8-14.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2690/">CVE-2011-2690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2691/">CVE-2011-2691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2692/">CVE-2011-2692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3328/">CVE-2011-3328</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6954/">CVE-2013-6954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0333/">CVE-2014-0333</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9495/">CVE-2014-9495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0973/">CVE-2015-0973</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009149948" comment="libpng16-16-1.6.8-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009149949" comment="libpng16-16-32bit-1.6.8-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77024" version="1" class="patch">
	<metadata>
		<title>libpodofo0_9_2-0.9.2-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-5852" ref_url="https://www.suse.com/security/cve/CVE-2017-5852/" source="CVE"/>
		<reference ref_id="CVE-2017-5853" ref_url="https://www.suse.com/security/cve/CVE-2017-5853/" source="CVE"/>
		<reference ref_id="CVE-2017-5854" ref_url="https://www.suse.com/security/cve/CVE-2017-5854/" source="CVE"/>
		<reference ref_id="CVE-2017-5855" ref_url="https://www.suse.com/security/cve/CVE-2017-5855/" source="CVE"/>
		<reference ref_id="CVE-2017-5886" ref_url="https://www.suse.com/security/cve/CVE-2017-5886/" source="CVE"/>
		<reference ref_id="CVE-2017-6840" ref_url="https://www.suse.com/security/cve/CVE-2017-6840/" source="CVE"/>
		<reference ref_id="CVE-2017-6844" ref_url="https://www.suse.com/security/cve/CVE-2017-6844/" source="CVE"/>
		<reference ref_id="CVE-2017-6847" ref_url="https://www.suse.com/security/cve/CVE-2017-6847/" source="CVE"/>
		<reference ref_id="CVE-2017-7378" ref_url="https://www.suse.com/security/cve/CVE-2017-7378/" source="CVE"/>
		<reference ref_id="CVE-2017-7379" ref_url="https://www.suse.com/security/cve/CVE-2017-7379/" source="CVE"/>
		<reference ref_id="CVE-2017-7380" ref_url="https://www.suse.com/security/cve/CVE-2017-7380/" source="CVE"/>
		<reference ref_id="CVE-2017-7994" ref_url="https://www.suse.com/security/cve/CVE-2017-7994/" source="CVE"/>
		<reference ref_id="CVE-2017-8054" ref_url="https://www.suse.com/security/cve/CVE-2017-8054/" source="CVE"/>
		<reference ref_id="CVE-2017-8787" ref_url="https://www.suse.com/security/cve/CVE-2017-8787/" source="CVE"/>
		<reference ref_id="CVE-2018-5308" ref_url="https://www.suse.com/security/cve/CVE-2018-5308/" source="CVE"/>
		<reference ref_id="CVE-2018-8001" ref_url="https://www.suse.com/security/cve/CVE-2018-8001/" source="CVE"/>
		<description>
These are all security issues fixed in the libpodofo0_9_2-0.9.2-3.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5852/">CVE-2017-5852</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5853/">CVE-2017-5853</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5854/">CVE-2017-5854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5855/">CVE-2017-5855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5886/">CVE-2017-5886</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6840/">CVE-2017-6840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6844/">CVE-2017-6844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6847/">CVE-2017-6847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7378/">CVE-2017-7378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7379/">CVE-2017-7379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7380/">CVE-2017-7380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7994/">CVE-2017-7994</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8054/">CVE-2017-8054</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8787/">CVE-2017-8787</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5308/">CVE-2018-5308</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-8001/">CVE-2018-8001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512380" comment="libpodofo0_9_2-0.9.2-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77025" version="1" class="patch">
	<metadata>
		<title>libpolkit0-0.113-5.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-0750" ref_url="https://www.suse.com/security/cve/CVE-2010-0750/" source="CVE"/>
		<reference ref_id="CVE-2011-1485" ref_url="https://www.suse.com/security/cve/CVE-2011-1485/" source="CVE"/>
		<reference ref_id="CVE-2013-4288" ref_url="https://www.suse.com/security/cve/CVE-2013-4288/" source="CVE"/>
		<reference ref_id="CVE-2015-3218" ref_url="https://www.suse.com/security/cve/CVE-2015-3218/" source="CVE"/>
		<reference ref_id="CVE-2015-3255" ref_url="https://www.suse.com/security/cve/CVE-2015-3255/" source="CVE"/>
		<reference ref_id="CVE-2015-3256" ref_url="https://www.suse.com/security/cve/CVE-2015-3256/" source="CVE"/>
		<reference ref_id="CVE-2015-4625" ref_url="https://www.suse.com/security/cve/CVE-2015-4625/" source="CVE"/>
		<reference ref_id="CVE-2018-1116" ref_url="https://www.suse.com/security/cve/CVE-2018-1116/" source="CVE"/>
		<description>
These are all security issues fixed in the libpolkit0-0.113-5.12.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0750/">CVE-2010-0750</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1485/">CVE-2011-1485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4288/">CVE-2013-4288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3218/">CVE-2015-3218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3255/">CVE-2015-3255</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3256/">CVE-2015-3256</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4625/">CVE-2015-4625</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1116/">CVE-2018-1116</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512381" comment="libpolkit0-0.113-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512382" comment="libpolkit0-32bit-0.113-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512383" comment="polkit-0.113-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512384" comment="typelib-1_0-Polkit-1_0-0.113-5.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77026" version="1" class="patch">
	<metadata>
		<title>libpoppler-glib8-0.43.0-16.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0799" ref_url="https://www.suse.com/security/cve/CVE-2009-0799/" source="CVE"/>
		<reference ref_id="CVE-2009-0800" ref_url="https://www.suse.com/security/cve/CVE-2009-0800/" source="CVE"/>
		<reference ref_id="CVE-2009-1179" ref_url="https://www.suse.com/security/cve/CVE-2009-1179/" source="CVE"/>
		<reference ref_id="CVE-2009-1180" ref_url="https://www.suse.com/security/cve/CVE-2009-1180/" source="CVE"/>
		<reference ref_id="CVE-2009-1181" ref_url="https://www.suse.com/security/cve/CVE-2009-1181/" source="CVE"/>
		<reference ref_id="CVE-2009-1182" ref_url="https://www.suse.com/security/cve/CVE-2009-1182/" source="CVE"/>
		<reference ref_id="CVE-2009-1183" ref_url="https://www.suse.com/security/cve/CVE-2009-1183/" source="CVE"/>
		<reference ref_id="CVE-2009-1187" ref_url="https://www.suse.com/security/cve/CVE-2009-1187/" source="CVE"/>
		<reference ref_id="CVE-2009-1188" ref_url="https://www.suse.com/security/cve/CVE-2009-1188/" source="CVE"/>
		<reference ref_id="CVE-2009-3607" ref_url="https://www.suse.com/security/cve/CVE-2009-3607/" source="CVE"/>
		<reference ref_id="CVE-2009-3608" ref_url="https://www.suse.com/security/cve/CVE-2009-3608/" source="CVE"/>
		<reference ref_id="CVE-2013-1788" ref_url="https://www.suse.com/security/cve/CVE-2013-1788/" source="CVE"/>
		<reference ref_id="CVE-2013-1789" ref_url="https://www.suse.com/security/cve/CVE-2013-1789/" source="CVE"/>
		<reference ref_id="CVE-2013-1790" ref_url="https://www.suse.com/security/cve/CVE-2013-1790/" source="CVE"/>
		<reference ref_id="CVE-2013-4473" ref_url="https://www.suse.com/security/cve/CVE-2013-4473/" source="CVE"/>
		<reference ref_id="CVE-2013-4474" ref_url="https://www.suse.com/security/cve/CVE-2013-4474/" source="CVE"/>
		<reference ref_id="CVE-2017-1000456" ref_url="https://www.suse.com/security/cve/CVE-2017-1000456/" source="CVE"/>
		<reference ref_id="CVE-2017-14517" ref_url="https://www.suse.com/security/cve/CVE-2017-14517/" source="CVE"/>
		<reference ref_id="CVE-2017-14518" ref_url="https://www.suse.com/security/cve/CVE-2017-14518/" source="CVE"/>
		<reference ref_id="CVE-2017-14520" ref_url="https://www.suse.com/security/cve/CVE-2017-14520/" source="CVE"/>
		<reference ref_id="CVE-2017-14617" ref_url="https://www.suse.com/security/cve/CVE-2017-14617/" source="CVE"/>
		<reference ref_id="CVE-2017-14928" ref_url="https://www.suse.com/security/cve/CVE-2017-14928/" source="CVE"/>
		<reference ref_id="CVE-2017-14975" ref_url="https://www.suse.com/security/cve/CVE-2017-14975/" source="CVE"/>
		<reference ref_id="CVE-2017-14976" ref_url="https://www.suse.com/security/cve/CVE-2017-14976/" source="CVE"/>
		<reference ref_id="CVE-2017-14977" ref_url="https://www.suse.com/security/cve/CVE-2017-14977/" source="CVE"/>
		<reference ref_id="CVE-2017-15565" ref_url="https://www.suse.com/security/cve/CVE-2017-15565/" source="CVE"/>
		<reference ref_id="CVE-2017-7511" ref_url="https://www.suse.com/security/cve/CVE-2017-7511/" source="CVE"/>
		<reference ref_id="CVE-2017-7515" ref_url="https://www.suse.com/security/cve/CVE-2017-7515/" source="CVE"/>
		<reference ref_id="CVE-2017-9406" ref_url="https://www.suse.com/security/cve/CVE-2017-9406/" source="CVE"/>
		<reference ref_id="CVE-2017-9408" ref_url="https://www.suse.com/security/cve/CVE-2017-9408/" source="CVE"/>
		<reference ref_id="CVE-2017-9775" ref_url="https://www.suse.com/security/cve/CVE-2017-9775/" source="CVE"/>
		<reference ref_id="CVE-2017-9776" ref_url="https://www.suse.com/security/cve/CVE-2017-9776/" source="CVE"/>
		<reference ref_id="CVE-2017-9865" ref_url="https://www.suse.com/security/cve/CVE-2017-9865/" source="CVE"/>
		<description>
These are all security issues fixed in the libpoppler-glib8-0.43.0-16.15.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0799/">CVE-2009-0799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0800/">CVE-2009-0800</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1179/">CVE-2009-1179</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1180/">CVE-2009-1180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1181/">CVE-2009-1181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1182/">CVE-2009-1182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1183/">CVE-2009-1183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1187/">CVE-2009-1187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1188/">CVE-2009-1188</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3607/">CVE-2009-3607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3608/">CVE-2009-3608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1788/">CVE-2013-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1789/">CVE-2013-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1790/">CVE-2013-1790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4473/">CVE-2013-4473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4474/">CVE-2013-4474</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000456/">CVE-2017-1000456</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14517/">CVE-2017-14517</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14518/">CVE-2017-14518</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14520/">CVE-2017-14520</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14617/">CVE-2017-14617</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14928/">CVE-2017-14928</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14975/">CVE-2017-14975</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14976/">CVE-2017-14976</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14977/">CVE-2017-14977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15565/">CVE-2017-15565</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7511/">CVE-2017-7511</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7515/">CVE-2017-7515</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9406/">CVE-2017-9406</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9408/">CVE-2017-9408</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9775/">CVE-2017-9775</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9776/">CVE-2017-9776</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9865/">CVE-2017-9865</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512385" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512386" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512387" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512388" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77027" version="1" class="patch">
	<metadata>
		<title>libprocps3-3.3.9-11.14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2018-1122" ref_url="https://www.suse.com/security/cve/CVE-2018-1122/" source="CVE"/>
		<reference ref_id="CVE-2018-1123" ref_url="https://www.suse.com/security/cve/CVE-2018-1123/" source="CVE"/>
		<reference ref_id="CVE-2018-1124" ref_url="https://www.suse.com/security/cve/CVE-2018-1124/" source="CVE"/>
		<reference ref_id="CVE-2018-1125" ref_url="https://www.suse.com/security/cve/CVE-2018-1125/" source="CVE"/>
		<reference ref_id="CVE-2018-1126" ref_url="https://www.suse.com/security/cve/CVE-2018-1126/" source="CVE"/>
		<description>
These are all security issues fixed in the libprocps3-3.3.9-11.14.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1122/">CVE-2018-1122</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1123/">CVE-2018-1123</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1124/">CVE-2018-1124</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1125/">CVE-2018-1125</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1126/">CVE-2018-1126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512389" comment="libprocps3-3.3.9-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512390" comment="procps-3.3.9-11.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77028" version="1" class="patch">
	<metadata>
		<title>libproxy1-0.4.13-16.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-4504" ref_url="https://www.suse.com/security/cve/CVE-2012-4504/" source="CVE"/>
		<description>
These are all security issues fixed in the libproxy1-0.4.13-16.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4504/">CVE-2012-4504</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140909" comment="libproxy1-0.4.13-16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140910" comment="libproxy1-32bit-0.4.13-16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140911" comment="libproxy1-config-gnome3-0.4.13-16.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140912" comment="libproxy1-config-gnome3-32bit-0.4.13-16.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140913" comment="libproxy1-networkmanager-0.4.13-16.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142142" comment="libproxy1-networkmanager-32bit-0.4.13-16.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140914" comment="libproxy1-pacrunner-webkit-0.4.13-16.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77029" version="1" class="patch">
	<metadata>
		<title>libpulse-mainloop-glib0-32bit-5.0-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3970" ref_url="https://www.suse.com/security/cve/CVE-2014-3970/" source="CVE"/>
		<description>
These are all security issues fixed in the libpulse-mainloop-glib0-32bit-5.0-4.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3970/">CVE-2014-3970</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159175" comment="libpulse-mainloop-glib0-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159176" comment="libpulse-mainloop-glib0-32bit-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159177" comment="libpulse0-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159178" comment="libpulse0-32bit-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159179" comment="pulseaudio-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159180" comment="pulseaudio-esound-compat-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159181" comment="pulseaudio-gdm-hooks-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159182" comment="pulseaudio-lang-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159652" comment="pulseaudio-module-bluetooth-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159653" comment="pulseaudio-module-gconf-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159654" comment="pulseaudio-module-jack-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159655" comment="pulseaudio-module-lirc-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159183" comment="pulseaudio-module-x11-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159184" comment="pulseaudio-module-zeroconf-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159185" comment="pulseaudio-utils-5.0-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77030" version="1" class="patch">
	<metadata>
		<title>libpython2_7-1_0-2.7.13-28.11.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-1521" ref_url="https://www.suse.com/security/cve/CVE-2011-1521/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-1753" ref_url="https://www.suse.com/security/cve/CVE-2013-1753/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-1912" ref_url="https://www.suse.com/security/cve/CVE-2014-1912/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2014-7185" ref_url="https://www.suse.com/security/cve/CVE-2014-7185/" source="CVE"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<reference ref_id="CVE-2017-1000158" ref_url="https://www.suse.com/security/cve/CVE-2017-1000158/" source="CVE"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<reference ref_id="CVE-2018-1000030" ref_url="https://www.suse.com/security/cve/CVE-2018-1000030/" source="CVE"/>
		<description>
These are all security issues fixed in the libpython2_7-1_0-2.7.13-28.11.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1521/">CVE-2011-1521</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1753/">CVE-2013-1753</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1912/">CVE-2014-1912</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7185/">CVE-2014-7185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000158/">CVE-2017-1000158</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000030/">CVE-2018-1000030</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512391" comment="libpython2_7-1_0-2.7.13-28.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512392" comment="libpython2_7-1_0-32bit-2.7.13-28.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512393" comment="python-base-2.7.13-28.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512394" comment="python-devel-2.7.13-28.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512395" comment="python-xml-2.7.13-28.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77031" version="1" class="patch">
	<metadata>
		<title>libpython3_4m1_0-3.4.6-25.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-2667" ref_url="https://www.suse.com/security/cve/CVE-2014-2667/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<reference ref_id="CVE-2018-1060" ref_url="https://www.suse.com/security/cve/CVE-2018-1060/" source="CVE"/>
		<reference ref_id="CVE-2018-1061" ref_url="https://www.suse.com/security/cve/CVE-2018-1061/" source="CVE"/>
		<description>
These are all security issues fixed in the libpython3_4m1_0-3.4.6-25.16.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-2667/">CVE-2014-2667</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1060/">CVE-2018-1060</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1061/">CVE-2018-1061</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512396" comment="libpython3_4m1_0-3.4.6-25.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512397" comment="python3-base-3.4.6-25.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77032" version="1" class="patch">
	<metadata>
		<title>libqpdf18-7.1.1-3.3.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-11624" ref_url="https://www.suse.com/security/cve/CVE-2017-11624/" source="CVE"/>
		<reference ref_id="CVE-2017-11625" ref_url="https://www.suse.com/security/cve/CVE-2017-11625/" source="CVE"/>
		<reference ref_id="CVE-2017-11626" ref_url="https://www.suse.com/security/cve/CVE-2017-11626/" source="CVE"/>
		<reference ref_id="CVE-2017-11627" ref_url="https://www.suse.com/security/cve/CVE-2017-11627/" source="CVE"/>
		<reference ref_id="CVE-2017-12595" ref_url="https://www.suse.com/security/cve/CVE-2017-12595/" source="CVE"/>
		<reference ref_id="CVE-2017-9208" ref_url="https://www.suse.com/security/cve/CVE-2017-9208/" source="CVE"/>
		<reference ref_id="CVE-2017-9209" ref_url="https://www.suse.com/security/cve/CVE-2017-9209/" source="CVE"/>
		<reference ref_id="CVE-2017-9210" ref_url="https://www.suse.com/security/cve/CVE-2017-9210/" source="CVE"/>
		<description>
These are all security issues fixed in the libqpdf18-7.1.1-3.3.4 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11624/">CVE-2017-11624</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11625/">CVE-2017-11625</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11626/">CVE-2017-11626</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11627/">CVE-2017-11627</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12595/">CVE-2017-12595</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9208/">CVE-2017-9208</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9209/">CVE-2017-9209</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9210/">CVE-2017-9210</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512398" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77033" version="1" class="patch">
	<metadata>
		<title>libqt4-32bit-4.8.7-8.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0945" ref_url="https://www.suse.com/security/cve/CVE-2009-0945/" source="CVE"/>
		<reference ref_id="CVE-2011-3193" ref_url="https://www.suse.com/security/cve/CVE-2011-3193/" source="CVE"/>
		<reference ref_id="CVE-2011-3922" ref_url="https://www.suse.com/security/cve/CVE-2011-3922/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2012-6093" ref_url="https://www.suse.com/security/cve/CVE-2012-6093/" source="CVE"/>
		<reference ref_id="CVE-2013-0254" ref_url="https://www.suse.com/security/cve/CVE-2013-0254/" source="CVE"/>
		<reference ref_id="CVE-2013-4549" ref_url="https://www.suse.com/security/cve/CVE-2013-4549/" source="CVE"/>
		<reference ref_id="CVE-2014-0190" ref_url="https://www.suse.com/security/cve/CVE-2014-0190/" source="CVE"/>
		<reference ref_id="CVE-2015-0295" ref_url="https://www.suse.com/security/cve/CVE-2015-0295/" source="CVE"/>
		<reference ref_id="CVE-2015-1858" ref_url="https://www.suse.com/security/cve/CVE-2015-1858/" source="CVE"/>
		<reference ref_id="CVE-2015-1859" ref_url="https://www.suse.com/security/cve/CVE-2015-1859/" source="CVE"/>
		<reference ref_id="CVE-2015-1860" ref_url="https://www.suse.com/security/cve/CVE-2015-1860/" source="CVE"/>
		<reference ref_id="CVE-2016-10040" ref_url="https://www.suse.com/security/cve/CVE-2016-10040/" source="CVE"/>
		<description>
These are all security issues fixed in the libqt4-32bit-4.8.7-8.8.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0945/">CVE-2009-0945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3193/">CVE-2011-3193</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3922/">CVE-2011-3922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6093/">CVE-2012-6093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0254/">CVE-2013-0254</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4549/">CVE-2013-4549</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0190/">CVE-2014-0190</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0295/">CVE-2015-0295</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1858/">CVE-2015-1858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1859/">CVE-2015-1859</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1860/">CVE-2015-1860</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10040/">CVE-2016-10040</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512399" comment="libqt4-4.8.7-8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512400" comment="libqt4-32bit-4.8.7-8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512401" comment="libqt4-qt3support-4.8.7-8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512402" comment="libqt4-qt3support-32bit-4.8.7-8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512403" comment="libqt4-sql-4.8.7-8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512404" comment="libqt4-sql-32bit-4.8.7-8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512405" comment="libqt4-sql-mysql-4.8.7-8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512406" comment="libqt4-sql-mysql-32bit-4.8.7-8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512407" comment="libqt4-sql-postgresql-4.8.7-8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512408" comment="libqt4-sql-postgresql-32bit-4.8.7-8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512409" comment="libqt4-sql-sqlite-4.8.7-8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512410" comment="libqt4-sql-sqlite-32bit-4.8.7-8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512411" comment="libqt4-sql-unixODBC-4.8.7-8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512412" comment="libqt4-sql-unixODBC-32bit-4.8.7-8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512413" comment="libqt4-x11-4.8.7-8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512414" comment="libqt4-x11-32bit-4.8.7-8.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77034" version="1" class="patch">
	<metadata>
		<title>libquicktime0-1.2.4-14.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-2399" ref_url="https://www.suse.com/security/cve/CVE-2016-2399/" source="CVE"/>
		<reference ref_id="CVE-2017-9122" ref_url="https://www.suse.com/security/cve/CVE-2017-9122/" source="CVE"/>
		<reference ref_id="CVE-2017-9123" ref_url="https://www.suse.com/security/cve/CVE-2017-9123/" source="CVE"/>
		<reference ref_id="CVE-2017-9124" ref_url="https://www.suse.com/security/cve/CVE-2017-9124/" source="CVE"/>
		<reference ref_id="CVE-2017-9125" ref_url="https://www.suse.com/security/cve/CVE-2017-9125/" source="CVE"/>
		<reference ref_id="CVE-2017-9126" ref_url="https://www.suse.com/security/cve/CVE-2017-9126/" source="CVE"/>
		<reference ref_id="CVE-2017-9127" ref_url="https://www.suse.com/security/cve/CVE-2017-9127/" source="CVE"/>
		<reference ref_id="CVE-2017-9128" ref_url="https://www.suse.com/security/cve/CVE-2017-9128/" source="CVE"/>
		<description>
These are all security issues fixed in the libquicktime0-1.2.4-14.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2399/">CVE-2016-2399</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9122/">CVE-2017-9122</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9123/">CVE-2017-9123</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9124/">CVE-2017-9124</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9125/">CVE-2017-9125</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9126/">CVE-2017-9126</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9127/">CVE-2017-9127</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9128/">CVE-2017-9128</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159506" comment="libquicktime0-1.2.4-14.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77035" version="1" class="patch">
	<metadata>
		<title>libraptor2-0-2.0.10-3.67 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-0037" ref_url="https://www.suse.com/security/cve/CVE-2012-0037/" source="CVE"/>
		<description>
These are all security issues fixed in the libraptor2-0-2.0.10-3.67 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0037/">CVE-2012-0037</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140928" comment="libraptor2-0-2.0.10-3.67 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141628" comment="raptor-2.0.10-3.67 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77036" version="1" class="patch">
	<metadata>
		<title>libraw9-0.15.4-21.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-2126" ref_url="https://www.suse.com/security/cve/CVE-2013-2126/" source="CVE"/>
		<reference ref_id="CVE-2013-2127" ref_url="https://www.suse.com/security/cve/CVE-2013-2127/" source="CVE"/>
		<reference ref_id="CVE-2015-3885" ref_url="https://www.suse.com/security/cve/CVE-2015-3885/" source="CVE"/>
		<reference ref_id="CVE-2015-8367" ref_url="https://www.suse.com/security/cve/CVE-2015-8367/" source="CVE"/>
		<reference ref_id="CVE-2017-13735" ref_url="https://www.suse.com/security/cve/CVE-2017-13735/" source="CVE"/>
		<reference ref_id="CVE-2017-14608" ref_url="https://www.suse.com/security/cve/CVE-2017-14608/" source="CVE"/>
		<reference ref_id="CVE-2017-16909" ref_url="https://www.suse.com/security/cve/CVE-2017-16909/" source="CVE"/>
		<reference ref_id="CVE-2017-6886" ref_url="https://www.suse.com/security/cve/CVE-2017-6886/" source="CVE"/>
		<reference ref_id="CVE-2017-6887" ref_url="https://www.suse.com/security/cve/CVE-2017-6887/" source="CVE"/>
		<reference ref_id="CVE-2017-6890" ref_url="https://www.suse.com/security/cve/CVE-2017-6890/" source="CVE"/>
		<reference ref_id="CVE-2017-6899" ref_url="https://www.suse.com/security/cve/CVE-2017-6899/" source="CVE"/>
		<reference ref_id="CVE-2018-5800" ref_url="https://www.suse.com/security/cve/CVE-2018-5800/" source="CVE"/>
		<reference ref_id="CVE-2018-5801" ref_url="https://www.suse.com/security/cve/CVE-2018-5801/" source="CVE"/>
		<reference ref_id="CVE-2018-5802" ref_url="https://www.suse.com/security/cve/CVE-2018-5802/" source="CVE"/>
		<reference ref_id="CVE-2018-5810" ref_url="https://www.suse.com/security/cve/CVE-2018-5810/" source="CVE"/>
		<reference ref_id="CVE-2018-5813" ref_url="https://www.suse.com/security/cve/CVE-2018-5813/" source="CVE"/>
		<description>
These are all security issues fixed in the libraw9-0.15.4-21.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2126/">CVE-2013-2126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2127/">CVE-2013-2127</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3885/">CVE-2015-3885</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8367/">CVE-2015-8367</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13735/">CVE-2017-13735</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14608/">CVE-2017-14608</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-16909/">CVE-2017-16909</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6886/">CVE-2017-6886</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6887/">CVE-2017-6887</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6890/">CVE-2017-6890</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6899/">CVE-2017-6899</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5800/">CVE-2018-5800</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5801/">CVE-2018-5801</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5802/">CVE-2018-5802</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5810/">CVE-2018-5810</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5813/">CVE-2018-5813</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512415" comment="libraw9-0.15.4-21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77037" version="1" class="patch">
	<metadata>
		<title>libreoffice-6.0.5.2-43.38.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-2935" ref_url="https://www.suse.com/security/cve/CVE-2010-2935/" source="CVE"/>
		<reference ref_id="CVE-2010-2936" ref_url="https://www.suse.com/security/cve/CVE-2010-2936/" source="CVE"/>
		<reference ref_id="CVE-2014-0247" ref_url="https://www.suse.com/security/cve/CVE-2014-0247/" source="CVE"/>
		<reference ref_id="CVE-2014-3524" ref_url="https://www.suse.com/security/cve/CVE-2014-3524/" source="CVE"/>
		<reference ref_id="CVE-2014-3575" ref_url="https://www.suse.com/security/cve/CVE-2014-3575/" source="CVE"/>
		<reference ref_id="CVE-2014-3693" ref_url="https://www.suse.com/security/cve/CVE-2014-3693/" source="CVE"/>
		<reference ref_id="CVE-2014-8146" ref_url="https://www.suse.com/security/cve/CVE-2014-8146/" source="CVE"/>
		<reference ref_id="CVE-2014-8147" ref_url="https://www.suse.com/security/cve/CVE-2014-8147/" source="CVE"/>
		<reference ref_id="CVE-2014-9093" ref_url="https://www.suse.com/security/cve/CVE-2014-9093/" source="CVE"/>
		<reference ref_id="CVE-2015-4551" ref_url="https://www.suse.com/security/cve/CVE-2015-4551/" source="CVE"/>
		<reference ref_id="CVE-2015-5212" ref_url="https://www.suse.com/security/cve/CVE-2015-5212/" source="CVE"/>
		<reference ref_id="CVE-2015-5213" ref_url="https://www.suse.com/security/cve/CVE-2015-5213/" source="CVE"/>
		<reference ref_id="CVE-2015-5214" ref_url="https://www.suse.com/security/cve/CVE-2015-5214/" source="CVE"/>
		<reference ref_id="CVE-2016-0794" ref_url="https://www.suse.com/security/cve/CVE-2016-0794/" source="CVE"/>
		<reference ref_id="CVE-2016-0795" ref_url="https://www.suse.com/security/cve/CVE-2016-0795/" source="CVE"/>
		<reference ref_id="CVE-2016-10327" ref_url="https://www.suse.com/security/cve/CVE-2016-10327/" source="CVE"/>
		<reference ref_id="CVE-2016-4324" ref_url="https://www.suse.com/security/cve/CVE-2016-4324/" source="CVE"/>
		<reference ref_id="CVE-2017-3157" ref_url="https://www.suse.com/security/cve/CVE-2017-3157/" source="CVE"/>
		<reference ref_id="CVE-2017-7870" ref_url="https://www.suse.com/security/cve/CVE-2017-7870/" source="CVE"/>
		<reference ref_id="CVE-2017-7882" ref_url="https://www.suse.com/security/cve/CVE-2017-7882/" source="CVE"/>
		<reference ref_id="CVE-2017-8358" ref_url="https://www.suse.com/security/cve/CVE-2017-8358/" source="CVE"/>
		<reference ref_id="CVE-2018-10119" ref_url="https://www.suse.com/security/cve/CVE-2018-10119/" source="CVE"/>
		<reference ref_id="CVE-2018-10120" ref_url="https://www.suse.com/security/cve/CVE-2018-10120/" source="CVE"/>
		<reference ref_id="CVE-2018-1055" ref_url="https://www.suse.com/security/cve/CVE-2018-1055/" source="CVE"/>
		<reference ref_id="CVE-2018-10583" ref_url="https://www.suse.com/security/cve/CVE-2018-10583/" source="CVE"/>
		<reference ref_id="CVE-2018-6871" ref_url="https://www.suse.com/security/cve/CVE-2018-6871/" source="CVE"/>
		<description>
These are all security issues fixed in the libreoffice-6.0.5.2-43.38.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2935/">CVE-2010-2935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2936/">CVE-2010-2936</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0247/">CVE-2014-0247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3524/">CVE-2014-3524</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3575/">CVE-2014-3575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3693/">CVE-2014-3693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8146/">CVE-2014-8146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8147/">CVE-2014-8147</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9093/">CVE-2014-9093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4551/">CVE-2015-4551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5212/">CVE-2015-5212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5213/">CVE-2015-5213</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5214/">CVE-2015-5214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0794/">CVE-2016-0794</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0795/">CVE-2016-0795</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10327/">CVE-2016-10327</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4324/">CVE-2016-4324</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3157/">CVE-2017-3157</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7870/">CVE-2017-7870</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7882/">CVE-2017-7882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8358/">CVE-2017-8358</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10119/">CVE-2018-10119</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10120/">CVE-2018-10120</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1055/">CVE-2018-1055</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10583/">CVE-2018-10583</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6871/">CVE-2018-6871</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512416" comment="libreoffice-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512417" comment="libreoffice-base-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512418" comment="libreoffice-base-drivers-mysql-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512419" comment="libreoffice-base-drivers-postgresql-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512420" comment="libreoffice-branding-upstream-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512421" comment="libreoffice-calc-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512422" comment="libreoffice-calc-extensions-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512423" comment="libreoffice-draw-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512424" comment="libreoffice-filters-optional-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512425" comment="libreoffice-gnome-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512426" comment="libreoffice-gtk2-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512427" comment="libreoffice-icon-themes-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512428" comment="libreoffice-impress-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512429" comment="libreoffice-l10n-af-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512430" comment="libreoffice-l10n-ar-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512431" comment="libreoffice-l10n-ca-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512432" comment="libreoffice-l10n-cs-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512433" comment="libreoffice-l10n-da-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512434" comment="libreoffice-l10n-de-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512435" comment="libreoffice-l10n-en-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512436" comment="libreoffice-l10n-es-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512437" comment="libreoffice-l10n-fi-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512438" comment="libreoffice-l10n-fr-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512439" comment="libreoffice-l10n-gu-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512440" comment="libreoffice-l10n-hi-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512441" comment="libreoffice-l10n-hu-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512442" comment="libreoffice-l10n-it-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512443" comment="libreoffice-l10n-ja-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512444" comment="libreoffice-l10n-ko-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512445" comment="libreoffice-l10n-nb-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512446" comment="libreoffice-l10n-nl-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512447" comment="libreoffice-l10n-nn-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512448" comment="libreoffice-l10n-pl-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512449" comment="libreoffice-l10n-pt_BR-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512450" comment="libreoffice-l10n-pt_PT-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512451" comment="libreoffice-l10n-ro-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512452" comment="libreoffice-l10n-ru-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512453" comment="libreoffice-l10n-sk-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512454" comment="libreoffice-l10n-sv-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512455" comment="libreoffice-l10n-xh-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512456" comment="libreoffice-l10n-zh_CN-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512457" comment="libreoffice-l10n-zh_TW-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512458" comment="libreoffice-l10n-zu-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512459" comment="libreoffice-mailmerge-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512460" comment="libreoffice-math-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512461" comment="libreoffice-officebean-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512462" comment="libreoffice-pyuno-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512463" comment="libreoffice-writer-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512464" comment="libreoffice-writer-extensions-6.0.5.2-43.38.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77038" version="1" class="patch">
	<metadata>
		<title>libruby2_1-2_1-2.1.9-18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-4975" ref_url="https://www.suse.com/security/cve/CVE-2014-4975/" source="CVE"/>
		<reference ref_id="CVE-2014-8080" ref_url="https://www.suse.com/security/cve/CVE-2014-8080/" source="CVE"/>
		<reference ref_id="CVE-2014-8090" ref_url="https://www.suse.com/security/cve/CVE-2014-8090/" source="CVE"/>
		<reference ref_id="CVE-2015-1855" ref_url="https://www.suse.com/security/cve/CVE-2015-1855/" source="CVE"/>
		<reference ref_id="CVE-2015-3900" ref_url="https://www.suse.com/security/cve/CVE-2015-3900/" source="CVE"/>
		<reference ref_id="CVE-2015-7551" ref_url="https://www.suse.com/security/cve/CVE-2015-7551/" source="CVE"/>
		<reference ref_id="CVE-2016-2339" ref_url="https://www.suse.com/security/cve/CVE-2016-2339/" source="CVE"/>
		<description>
These are all security issues fixed in the libruby2_1-2_1-2.1.9-18.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-4975/">CVE-2014-4975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8080/">CVE-2014-8080</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8090/">CVE-2014-8090</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1855/">CVE-2015-1855</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3900/">CVE-2015-3900</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7551/">CVE-2015-7551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2339/">CVE-2016-2339</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159193" comment="libruby2_1-2_1-2.1.9-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159194" comment="ruby2.1-2.1.9-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159195" comment="ruby2.1-stdlib-2.1.9-18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77039" version="1" class="patch">
	<metadata>
		<title>libsilc-1_1-2-1.1.10-24.128 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-1227" ref_url="https://www.suse.com/security/cve/CVE-2008-1227/" source="CVE"/>
		<description>
These are all security issues fixed in the libsilc-1_1-2-1.1.10-24.128 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1227/">CVE-2008-1227</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141677" comment="libsilc-1_1-2-1.1.10-24.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141678" comment="libsilcclient-1_1-3-1.1.10-24.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141679" comment="silc-toolkit-1.1.10-24.128 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77040" version="1" class="patch">
	<metadata>
		<title>libsmi-0.4.8-18.63 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-2891" ref_url="https://www.suse.com/security/cve/CVE-2010-2891/" source="CVE"/>
		<description>
These are all security issues fixed in the libsmi-0.4.8-18.63 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2891/">CVE-2010-2891</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140932" comment="libsmi-0.4.8-18.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140933" comment="libsmi2-0.4.8-18.63 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77041" version="1" class="patch">
	<metadata>
		<title>libsndfile1-1.0.25-36.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0186" ref_url="https://www.suse.com/security/cve/CVE-2009-0186/" source="CVE"/>
		<reference ref_id="CVE-2011-2696" ref_url="https://www.suse.com/security/cve/CVE-2011-2696/" source="CVE"/>
		<reference ref_id="CVE-2014-9496" ref_url="https://www.suse.com/security/cve/CVE-2014-9496/" source="CVE"/>
		<reference ref_id="CVE-2014-9756" ref_url="https://www.suse.com/security/cve/CVE-2014-9756/" source="CVE"/>
		<reference ref_id="CVE-2015-7805" ref_url="https://www.suse.com/security/cve/CVE-2015-7805/" source="CVE"/>
		<reference ref_id="CVE-2015-8075" ref_url="https://www.suse.com/security/cve/CVE-2015-8075/" source="CVE"/>
		<reference ref_id="CVE-2017-14245" ref_url="https://www.suse.com/security/cve/CVE-2017-14245/" source="CVE"/>
		<reference ref_id="CVE-2017-14246" ref_url="https://www.suse.com/security/cve/CVE-2017-14246/" source="CVE"/>
		<reference ref_id="CVE-2017-14634" ref_url="https://www.suse.com/security/cve/CVE-2017-14634/" source="CVE"/>
		<reference ref_id="CVE-2017-16942" ref_url="https://www.suse.com/security/cve/CVE-2017-16942/" source="CVE"/>
		<reference ref_id="CVE-2017-17456" ref_url="https://www.suse.com/security/cve/CVE-2017-17456/" source="CVE"/>
		<reference ref_id="CVE-2017-17457" ref_url="https://www.suse.com/security/cve/CVE-2017-17457/" source="CVE"/>
		<reference ref_id="CVE-2017-6892" ref_url="https://www.suse.com/security/cve/CVE-2017-6892/" source="CVE"/>
		<reference ref_id="CVE-2017-7585" ref_url="https://www.suse.com/security/cve/CVE-2017-7585/" source="CVE"/>
		<reference ref_id="CVE-2017-7586" ref_url="https://www.suse.com/security/cve/CVE-2017-7586/" source="CVE"/>
		<reference ref_id="CVE-2017-7741" ref_url="https://www.suse.com/security/cve/CVE-2017-7741/" source="CVE"/>
		<reference ref_id="CVE-2017-7742" ref_url="https://www.suse.com/security/cve/CVE-2017-7742/" source="CVE"/>
		<reference ref_id="CVE-2017-8361" ref_url="https://www.suse.com/security/cve/CVE-2017-8361/" source="CVE"/>
		<reference ref_id="CVE-2017-8362" ref_url="https://www.suse.com/security/cve/CVE-2017-8362/" source="CVE"/>
		<reference ref_id="CVE-2017-8363" ref_url="https://www.suse.com/security/cve/CVE-2017-8363/" source="CVE"/>
		<reference ref_id="CVE-2017-8365" ref_url="https://www.suse.com/security/cve/CVE-2017-8365/" source="CVE"/>
		<reference ref_id="CVE-2018-13139" ref_url="https://www.suse.com/security/cve/CVE-2018-13139/" source="CVE"/>
		<description>
These are all security issues fixed in the libsndfile1-1.0.25-36.16.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0186/">CVE-2009-0186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2696/">CVE-2011-2696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9496/">CVE-2014-9496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9756/">CVE-2014-9756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7805/">CVE-2015-7805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8075/">CVE-2015-8075</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14245/">CVE-2017-14245</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14246/">CVE-2017-14246</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14634/">CVE-2017-14634</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16942/">CVE-2017-16942</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17456/">CVE-2017-17456</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17457/">CVE-2017-17457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6892/">CVE-2017-6892</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7585/">CVE-2017-7585</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7586/">CVE-2017-7586</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7741/">CVE-2017-7741</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7742/">CVE-2017-7742</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8361/">CVE-2017-8361</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8362/">CVE-2017-8362</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8363/">CVE-2017-8363</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8365/">CVE-2017-8365</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13139/">CVE-2018-13139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512465" comment="libsndfile1-1.0.25-36.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512466" comment="libsndfile1-32bit-1.0.25-36.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77042" version="1" class="patch">
	<metadata>
		<title>libsnmp30-32bit-5.7.3-6.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-2141" ref_url="https://www.suse.com/security/cve/CVE-2012-2141/" source="CVE"/>
		<reference ref_id="CVE-2014-2284" ref_url="https://www.suse.com/security/cve/CVE-2014-2284/" source="CVE"/>
		<reference ref_id="CVE-2014-2285" ref_url="https://www.suse.com/security/cve/CVE-2014-2285/" source="CVE"/>
		<reference ref_id="CVE-2014-3565" ref_url="https://www.suse.com/security/cve/CVE-2014-3565/" source="CVE"/>
		<reference ref_id="CVE-2015-5621" ref_url="https://www.suse.com/security/cve/CVE-2015-5621/" source="CVE"/>
		<reference ref_id="CVE-2018-18065" ref_url="https://www.suse.com/security/cve/CVE-2018-18065/" source="CVE"/>
		<description>
These are all security issues fixed in the libsnmp30-32bit-5.7.3-6.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2141/">CVE-2012-2141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2284/">CVE-2014-2284</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2285/">CVE-2014-2285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3565/">CVE-2014-3565</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5621/">CVE-2015-5621</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18065/">CVE-2018-18065</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512467" comment="libsnmp30-5.7.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512468" comment="libsnmp30-32bit-5.7.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512469" comment="net-snmp-5.7.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512470" comment="perl-SNMP-5.7.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512471" comment="snmp-mibs-5.7.3-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77043" version="1" class="patch">
	<metadata>
		<title>libsoup-2_4-1-2.62.2-5.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-2054" ref_url="https://www.suse.com/security/cve/CVE-2011-2054/" source="CVE"/>
		<reference ref_id="CVE-2017-2885" ref_url="https://www.suse.com/security/cve/CVE-2017-2885/" source="CVE"/>
		<reference ref_id="CVE-2018-12910" ref_url="https://www.suse.com/security/cve/CVE-2018-12910/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-2_4-1-2.62.2-5.7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2054/">CVE-2011-2054</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2885/">CVE-2017-2885</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12910/">CVE-2018-12910</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512472" comment="libsoup-2_4-1-2.62.2-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512473" comment="libsoup-2_4-1-32bit-2.62.2-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512474" comment="libsoup-lang-2.62.2-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512475" comment="typelib-1_0-Soup-2_4-2.62.2-5.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77044" version="1" class="patch">
	<metadata>
		<title>libspice-client-glib-2_0-8-0.33-3.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-4425" ref_url="https://www.suse.com/security/cve/CVE-2012-4425/" source="CVE"/>
		<reference ref_id="CVE-2017-12194" ref_url="https://www.suse.com/security/cve/CVE-2017-12194/" source="CVE"/>
		<reference ref_id="CVE-2018-10873" ref_url="https://www.suse.com/security/cve/CVE-2018-10873/" source="CVE"/>
		<reference ref_id="CVE-2018-10893" ref_url="https://www.suse.com/security/cve/CVE-2018-10893/" source="CVE"/>
		<description>
These are all security issues fixed in the libspice-client-glib-2_0-8-0.33-3.6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4425/">CVE-2012-4425</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12194/">CVE-2017-12194</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10873/">CVE-2018-10873</cve>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-10893/">CVE-2018-10893</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512476" comment="libspice-client-glib-2_0-8-0.33-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512477" comment="libspice-client-glib-helper-0.33-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512478" comment="libspice-client-gtk-3_0-5-0.33-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512479" comment="libspice-controller0-0.33-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512480" comment="typelib-1_0-SpiceClientGlib-2_0-0.33-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512481" comment="typelib-1_0-SpiceClientGtk-3_0-0.33-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77045" version="1" class="patch">
	<metadata>
		<title>libspice-server1-0.12.8-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-4282" ref_url="https://www.suse.com/security/cve/CVE-2013-4282/" source="CVE"/>
		<reference ref_id="CVE-2015-3247" ref_url="https://www.suse.com/security/cve/CVE-2015-3247/" source="CVE"/>
		<reference ref_id="CVE-2015-5260" ref_url="https://www.suse.com/security/cve/CVE-2015-5260/" source="CVE"/>
		<reference ref_id="CVE-2015-5261" ref_url="https://www.suse.com/security/cve/CVE-2015-5261/" source="CVE"/>
		<reference ref_id="CVE-2016-0749" ref_url="https://www.suse.com/security/cve/CVE-2016-0749/" source="CVE"/>
		<reference ref_id="CVE-2016-2150" ref_url="https://www.suse.com/security/cve/CVE-2016-2150/" source="CVE"/>
		<reference ref_id="CVE-2016-9577" ref_url="https://www.suse.com/security/cve/CVE-2016-9577/" source="CVE"/>
		<reference ref_id="CVE-2016-9578" ref_url="https://www.suse.com/security/cve/CVE-2016-9578/" source="CVE"/>
		<reference ref_id="CVE-2017-7506" ref_url="https://www.suse.com/security/cve/CVE-2017-7506/" source="CVE"/>
		<reference ref_id="CVE-2018-10873" ref_url="https://www.suse.com/security/cve/CVE-2018-10873/" source="CVE"/>
		<reference ref_id="CVE-2018-10893" ref_url="https://www.suse.com/security/cve/CVE-2018-10893/" source="CVE"/>
		<description>
These are all security issues fixed in the libspice-server1-0.12.8-6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2013-4282/">CVE-2013-4282</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3247/">CVE-2015-3247</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5260/">CVE-2015-5260</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2015-5261/">CVE-2015-5261</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-0749/">CVE-2016-0749</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2150/">CVE-2016-2150</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9577/">CVE-2016-9577</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9578/">CVE-2016-9578</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7506/">CVE-2017-7506</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10873/">CVE-2018-10873</cve>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-10893/">CVE-2018-10893</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512482" comment="libspice-server1-0.12.8-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77046" version="1" class="patch">
	<metadata>
		<title>libsqlite3-0-3.8.10.2-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-6153" ref_url="https://www.suse.com/security/cve/CVE-2016-6153/" source="CVE"/>
		<description>
These are all security issues fixed in the libsqlite3-0-3.8.10.2-8.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6153/">CVE-2016-6153</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159203" comment="libsqlite3-0-3.8.10.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159204" comment="libsqlite3-0-32bit-3.8.10.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159205" comment="sqlite3-3.8.10.2-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77047" version="1" class="patch">
	<metadata>
		<title>libsrtp1-1.5.2-3.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-2139" ref_url="https://www.suse.com/security/cve/CVE-2013-2139/" source="CVE"/>
		<description>
These are all security issues fixed in the libsrtp1-1.5.2-3.2.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2139/">CVE-2013-2139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512483" comment="libsrtp1-1.5.2-3.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77048" version="1" class="patch">
	<metadata>
		<title>libssh2-1-1.4.3-19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-1782" ref_url="https://www.suse.com/security/cve/CVE-2015-1782/" source="CVE"/>
		<reference ref_id="CVE-2016-0787" ref_url="https://www.suse.com/security/cve/CVE-2016-0787/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh2-1-1.4.3-19.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1782/">CVE-2015-1782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0787/">CVE-2016-0787</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140952" comment="libssh2-1-1.4.3-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140953" comment="libssh2-1-32bit-1.4.3-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77049" version="1" class="patch">
	<metadata>
		<title>libssh4-0.6.3-12.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-4559" ref_url="https://www.suse.com/security/cve/CVE-2012-4559/" source="CVE"/>
		<reference ref_id="CVE-2012-4560" ref_url="https://www.suse.com/security/cve/CVE-2012-4560/" source="CVE"/>
		<reference ref_id="CVE-2012-4561" ref_url="https://www.suse.com/security/cve/CVE-2012-4561/" source="CVE"/>
		<reference ref_id="CVE-2013-0176" ref_url="https://www.suse.com/security/cve/CVE-2013-0176/" source="CVE"/>
		<reference ref_id="CVE-2014-0017" ref_url="https://www.suse.com/security/cve/CVE-2014-0017/" source="CVE"/>
		<reference ref_id="CVE-2014-8132" ref_url="https://www.suse.com/security/cve/CVE-2014-8132/" source="CVE"/>
		<reference ref_id="CVE-2015-3146" ref_url="https://www.suse.com/security/cve/CVE-2015-3146/" source="CVE"/>
		<reference ref_id="CVE-2016-0739" ref_url="https://www.suse.com/security/cve/CVE-2016-0739/" source="CVE"/>
		<reference ref_id="CVE-2018-10933" ref_url="https://www.suse.com/security/cve/CVE-2018-10933/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh4-0.6.3-12.6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4559/">CVE-2012-4559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4560/">CVE-2012-4560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4561/">CVE-2012-4561</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0176/">CVE-2013-0176</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0017/">CVE-2014-0017</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8132/">CVE-2014-8132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3146/">CVE-2015-3146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0739/">CVE-2016-0739</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10933/">CVE-2018-10933</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512484" comment="libssh4-0.6.3-12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512485" comment="libssh4-32bit-0.6.3-12.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77050" version="1" class="patch">
	<metadata>
		<title>libstaroffice-0_0-0-0.0.5-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-9432" ref_url="https://www.suse.com/security/cve/CVE-2017-9432/" source="CVE"/>
		<description>
These are all security issues fixed in the libstaroffice-0_0-0-0.0.5-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9432/">CVE-2017-9432</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009174959" comment="libstaroffice-0_0-0-0.0.5-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77051" version="1" class="patch">
	<metadata>
		<title>libsystemd0-228-150.49.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-1174" ref_url="https://www.suse.com/security/cve/CVE-2012-1174/" source="CVE"/>
		<reference ref_id="CVE-2013-4288" ref_url="https://www.suse.com/security/cve/CVE-2013-4288/" source="CVE"/>
		<reference ref_id="CVE-2016-10156" ref_url="https://www.suse.com/security/cve/CVE-2016-10156/" source="CVE"/>
		<reference ref_id="CVE-2016-7795" ref_url="https://www.suse.com/security/cve/CVE-2016-7795/" source="CVE"/>
		<reference ref_id="CVE-2017-15908" ref_url="https://www.suse.com/security/cve/CVE-2017-15908/" source="CVE"/>
		<reference ref_id="CVE-2017-18078" ref_url="https://www.suse.com/security/cve/CVE-2017-18078/" source="CVE"/>
		<reference ref_id="CVE-2017-9217" ref_url="https://www.suse.com/security/cve/CVE-2017-9217/" source="CVE"/>
		<reference ref_id="CVE-2017-9445" ref_url="https://www.suse.com/security/cve/CVE-2017-9445/" source="CVE"/>
		<reference ref_id="CVE-2018-1049" ref_url="https://www.suse.com/security/cve/CVE-2018-1049/" source="CVE"/>
		<description>
These are all security issues fixed in the libsystemd0-228-150.49.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1174/">CVE-2012-1174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4288/">CVE-2013-4288</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10156/">CVE-2016-10156</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7795/">CVE-2016-7795</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15908/">CVE-2017-15908</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18078/">CVE-2017-18078</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9217/">CVE-2017-9217</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9445/">CVE-2017-9445</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1049/">CVE-2018-1049</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512486" comment="libsystemd0-228-150.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512487" comment="libsystemd0-32bit-228-150.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512488" comment="libudev1-228-150.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512489" comment="libudev1-32bit-228-150.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512490" comment="systemd-228-150.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512491" comment="systemd-32bit-228-150.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512492" comment="systemd-bash-completion-228-150.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512493" comment="systemd-sysvinit-228-150.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512494" comment="udev-228-150.49.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77052" version="1" class="patch">
	<metadata>
		<title>libtag1-1.9.1-1.265 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-2396" ref_url="https://www.suse.com/security/cve/CVE-2012-2396/" source="CVE"/>
		<description>
These are all security issues fixed in the libtag1-1.9.1-1.265 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2396/">CVE-2012-2396</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140963" comment="libtag1-1.9.1-1.265 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141698" comment="libtag1-32bit-1.9.1-1.265 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140964" comment="libtag_c0-1.9.1-1.265 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141699" comment="libtag_c0-32bit-1.9.1-1.265 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140965" comment="taglib-1.9.1-1.265 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77053" version="1" class="patch">
	<metadata>
		<title>libtasn1-4.9-3.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3467" ref_url="https://www.suse.com/security/cve/CVE-2014-3467/" source="CVE"/>
		<reference ref_id="CVE-2014-3468" ref_url="https://www.suse.com/security/cve/CVE-2014-3468/" source="CVE"/>
		<reference ref_id="CVE-2014-3469" ref_url="https://www.suse.com/security/cve/CVE-2014-3469/" source="CVE"/>
		<reference ref_id="CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806/" source="CVE"/>
		<reference ref_id="CVE-2015-3622" ref_url="https://www.suse.com/security/cve/CVE-2015-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-4008" ref_url="https://www.suse.com/security/cve/CVE-2016-4008/" source="CVE"/>
		<reference ref_id="CVE-2018-6003" ref_url="https://www.suse.com/security/cve/CVE-2018-6003/" source="CVE"/>
		<description>
These are all security issues fixed in the libtasn1-4.9-3.5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3467/">CVE-2014-3467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3468/">CVE-2014-3468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3469/">CVE-2014-3469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3622/">CVE-2015-3622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4008/">CVE-2016-4008</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6003/">CVE-2018-6003</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009170495" comment="libtasn1-4.9-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009170496" comment="libtasn1-6-4.9-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009170497" comment="libtasn1-6-32bit-4.9-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77054" version="1" class="patch">
	<metadata>
		<title>libthai-data-0.1.25-4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-4012" ref_url="https://www.suse.com/security/cve/CVE-2009-4012/" source="CVE"/>
		<description>
These are all security issues fixed in the libthai-data-0.1.25-4.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4012/">CVE-2009-4012</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140966" comment="libthai-data-0.1.25-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140967" comment="libthai0-0.1.25-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140968" comment="libthai0-32bit-0.1.25-4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77055" version="1" class="patch">
	<metadata>
		<title>libtiff5-32bit-4.0.9-44.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-2285" ref_url="https://www.suse.com/security/cve/CVE-2009-2285/" source="CVE"/>
		<reference ref_id="CVE-2009-2347" ref_url="https://www.suse.com/security/cve/CVE-2009-2347/" source="CVE"/>
		<reference ref_id="CVE-2010-2065" ref_url="https://www.suse.com/security/cve/CVE-2010-2065/" source="CVE"/>
		<reference ref_id="CVE-2010-2067" ref_url="https://www.suse.com/security/cve/CVE-2010-2067/" source="CVE"/>
		<reference ref_id="CVE-2010-2233" ref_url="https://www.suse.com/security/cve/CVE-2010-2233/" source="CVE"/>
		<reference ref_id="CVE-2010-4665" ref_url="https://www.suse.com/security/cve/CVE-2010-4665/" source="CVE"/>
		<reference ref_id="CVE-2011-0192" ref_url="https://www.suse.com/security/cve/CVE-2011-0192/" source="CVE"/>
		<reference ref_id="CVE-2011-1167" ref_url="https://www.suse.com/security/cve/CVE-2011-1167/" source="CVE"/>
		<reference ref_id="CVE-2012-1173" ref_url="https://www.suse.com/security/cve/CVE-2012-1173/" source="CVE"/>
		<reference ref_id="CVE-2012-2113" ref_url="https://www.suse.com/security/cve/CVE-2012-2113/" source="CVE"/>
		<reference ref_id="CVE-2012-3401" ref_url="https://www.suse.com/security/cve/CVE-2012-3401/" source="CVE"/>
		<reference ref_id="CVE-2012-4564" ref_url="https://www.suse.com/security/cve/CVE-2012-4564/" source="CVE"/>
		<reference ref_id="CVE-2013-1960" ref_url="https://www.suse.com/security/cve/CVE-2013-1960/" source="CVE"/>
		<reference ref_id="CVE-2013-1961" ref_url="https://www.suse.com/security/cve/CVE-2013-1961/" source="CVE"/>
		<reference ref_id="CVE-2013-4231" ref_url="https://www.suse.com/security/cve/CVE-2013-4231/" source="CVE"/>
		<reference ref_id="CVE-2013-4232" ref_url="https://www.suse.com/security/cve/CVE-2013-4232/" source="CVE"/>
		<reference ref_id="CVE-2013-4243" ref_url="https://www.suse.com/security/cve/CVE-2013-4243/" source="CVE"/>
		<reference ref_id="CVE-2013-4244" ref_url="https://www.suse.com/security/cve/CVE-2013-4244/" source="CVE"/>
		<reference ref_id="CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127/" source="CVE"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2014-8129" ref_url="https://www.suse.com/security/cve/CVE-2014-8129/" source="CVE"/>
		<reference ref_id="CVE-2014-8130" ref_url="https://www.suse.com/security/cve/CVE-2014-8130/" source="CVE"/>
		<reference ref_id="CVE-2014-9655" ref_url="https://www.suse.com/security/cve/CVE-2014-9655/" source="CVE"/>
		<reference ref_id="CVE-2015-1547" ref_url="https://www.suse.com/security/cve/CVE-2015-1547/" source="CVE"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2015-8665" ref_url="https://www.suse.com/security/cve/CVE-2015-8665/" source="CVE"/>
		<reference ref_id="CVE-2015-8683" ref_url="https://www.suse.com/security/cve/CVE-2015-8683/" source="CVE"/>
		<reference ref_id="CVE-2015-8781" ref_url="https://www.suse.com/security/cve/CVE-2015-8781/" source="CVE"/>
		<reference ref_id="CVE-2015-8782" ref_url="https://www.suse.com/security/cve/CVE-2015-8782/" source="CVE"/>
		<reference ref_id="CVE-2015-8783" ref_url="https://www.suse.com/security/cve/CVE-2015-8783/" source="CVE"/>
		<reference ref_id="CVE-2016-10095" ref_url="https://www.suse.com/security/cve/CVE-2016-10095/" source="CVE"/>
		<reference ref_id="CVE-2016-10266" ref_url="https://www.suse.com/security/cve/CVE-2016-10266/" source="CVE"/>
		<reference ref_id="CVE-2016-10267" ref_url="https://www.suse.com/security/cve/CVE-2016-10267/" source="CVE"/>
		<reference ref_id="CVE-2016-10268" ref_url="https://www.suse.com/security/cve/CVE-2016-10268/" source="CVE"/>
		<reference ref_id="CVE-2016-10269" ref_url="https://www.suse.com/security/cve/CVE-2016-10269/" source="CVE"/>
		<reference ref_id="CVE-2016-10270" ref_url="https://www.suse.com/security/cve/CVE-2016-10270/" source="CVE"/>
		<reference ref_id="CVE-2016-10271" ref_url="https://www.suse.com/security/cve/CVE-2016-10271/" source="CVE"/>
		<reference ref_id="CVE-2016-10272" ref_url="https://www.suse.com/security/cve/CVE-2016-10272/" source="CVE"/>
		<reference ref_id="CVE-2016-10371" ref_url="https://www.suse.com/security/cve/CVE-2016-10371/" source="CVE"/>
		<reference ref_id="CVE-2016-3186" ref_url="https://www.suse.com/security/cve/CVE-2016-3186/" source="CVE"/>
		<reference ref_id="CVE-2016-3622" ref_url="https://www.suse.com/security/cve/CVE-2016-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-3623" ref_url="https://www.suse.com/security/cve/CVE-2016-3623/" source="CVE"/>
		<reference ref_id="CVE-2016-3632" ref_url="https://www.suse.com/security/cve/CVE-2016-3632/" source="CVE"/>
		<reference ref_id="CVE-2016-3658" ref_url="https://www.suse.com/security/cve/CVE-2016-3658/" source="CVE"/>
		<reference ref_id="CVE-2016-3945" ref_url="https://www.suse.com/security/cve/CVE-2016-3945/" source="CVE"/>
		<reference ref_id="CVE-2016-3990" ref_url="https://www.suse.com/security/cve/CVE-2016-3990/" source="CVE"/>
		<reference ref_id="CVE-2016-3991" ref_url="https://www.suse.com/security/cve/CVE-2016-3991/" source="CVE"/>
		<reference ref_id="CVE-2016-5314" ref_url="https://www.suse.com/security/cve/CVE-2016-5314/" source="CVE"/>
		<reference ref_id="CVE-2016-5316" ref_url="https://www.suse.com/security/cve/CVE-2016-5316/" source="CVE"/>
		<reference ref_id="CVE-2016-5317" ref_url="https://www.suse.com/security/cve/CVE-2016-5317/" source="CVE"/>
		<reference ref_id="CVE-2016-5318" ref_url="https://www.suse.com/security/cve/CVE-2016-5318/" source="CVE"/>
		<reference ref_id="CVE-2016-5319" ref_url="https://www.suse.com/security/cve/CVE-2016-5319/" source="CVE"/>
		<reference ref_id="CVE-2016-5320" ref_url="https://www.suse.com/security/cve/CVE-2016-5320/" source="CVE"/>
		<reference ref_id="CVE-2016-5321" ref_url="https://www.suse.com/security/cve/CVE-2016-5321/" source="CVE"/>
		<reference ref_id="CVE-2016-5323" ref_url="https://www.suse.com/security/cve/CVE-2016-5323/" source="CVE"/>
		<reference ref_id="CVE-2016-5652" ref_url="https://www.suse.com/security/cve/CVE-2016-5652/" source="CVE"/>
		<reference ref_id="CVE-2016-5875" ref_url="https://www.suse.com/security/cve/CVE-2016-5875/" source="CVE"/>
		<reference ref_id="CVE-2016-8331" ref_url="https://www.suse.com/security/cve/CVE-2016-8331/" source="CVE"/>
		<reference ref_id="CVE-2016-9273" ref_url="https://www.suse.com/security/cve/CVE-2016-9273/" source="CVE"/>
		<reference ref_id="CVE-2016-9297" ref_url="https://www.suse.com/security/cve/CVE-2016-9297/" source="CVE"/>
		<reference ref_id="CVE-2016-9448" ref_url="https://www.suse.com/security/cve/CVE-2016-9448/" source="CVE"/>
		<reference ref_id="CVE-2016-9453" ref_url="https://www.suse.com/security/cve/CVE-2016-9453/" source="CVE"/>
		<reference ref_id="CVE-2016-9538" ref_url="https://www.suse.com/security/cve/CVE-2016-9538/" source="CVE"/>
		<reference ref_id="CVE-2017-11613" ref_url="https://www.suse.com/security/cve/CVE-2017-11613/" source="CVE"/>
		<reference ref_id="CVE-2017-16232" ref_url="https://www.suse.com/security/cve/CVE-2017-16232/" source="CVE"/>
		<reference ref_id="CVE-2017-17942" ref_url="https://www.suse.com/security/cve/CVE-2017-17942/" source="CVE"/>
		<reference ref_id="CVE-2017-17973" ref_url="https://www.suse.com/security/cve/CVE-2017-17973/" source="CVE"/>
		<reference ref_id="CVE-2017-18013" ref_url="https://www.suse.com/security/cve/CVE-2017-18013/" source="CVE"/>
		<reference ref_id="CVE-2017-5225" ref_url="https://www.suse.com/security/cve/CVE-2017-5225/" source="CVE"/>
		<reference ref_id="CVE-2017-7592" ref_url="https://www.suse.com/security/cve/CVE-2017-7592/" source="CVE"/>
		<reference ref_id="CVE-2017-7593" ref_url="https://www.suse.com/security/cve/CVE-2017-7593/" source="CVE"/>
		<reference ref_id="CVE-2017-7594" ref_url="https://www.suse.com/security/cve/CVE-2017-7594/" source="CVE"/>
		<reference ref_id="CVE-2017-7595" ref_url="https://www.suse.com/security/cve/CVE-2017-7595/" source="CVE"/>
		<reference ref_id="CVE-2017-7596" ref_url="https://www.suse.com/security/cve/CVE-2017-7596/" source="CVE"/>
		<reference ref_id="CVE-2017-7597" ref_url="https://www.suse.com/security/cve/CVE-2017-7597/" source="CVE"/>
		<reference ref_id="CVE-2017-7598" ref_url="https://www.suse.com/security/cve/CVE-2017-7598/" source="CVE"/>
		<reference ref_id="CVE-2017-7599" ref_url="https://www.suse.com/security/cve/CVE-2017-7599/" source="CVE"/>
		<reference ref_id="CVE-2017-7600" ref_url="https://www.suse.com/security/cve/CVE-2017-7600/" source="CVE"/>
		<reference ref_id="CVE-2017-7601" ref_url="https://www.suse.com/security/cve/CVE-2017-7601/" source="CVE"/>
		<reference ref_id="CVE-2017-7602" ref_url="https://www.suse.com/security/cve/CVE-2017-7602/" source="CVE"/>
		<reference ref_id="CVE-2017-9403" ref_url="https://www.suse.com/security/cve/CVE-2017-9403/" source="CVE"/>
		<reference ref_id="CVE-2017-9404" ref_url="https://www.suse.com/security/cve/CVE-2017-9404/" source="CVE"/>
		<reference ref_id="CVE-2017-9935" ref_url="https://www.suse.com/security/cve/CVE-2017-9935/" source="CVE"/>
		<reference ref_id="CVE-2017-9936" ref_url="https://www.suse.com/security/cve/CVE-2017-9936/" source="CVE"/>
		<reference ref_id="CVE-2018-10779" ref_url="https://www.suse.com/security/cve/CVE-2018-10779/" source="CVE"/>
		<reference ref_id="CVE-2018-10963" ref_url="https://www.suse.com/security/cve/CVE-2018-10963/" source="CVE"/>
		<reference ref_id="CVE-2018-16335" ref_url="https://www.suse.com/security/cve/CVE-2018-16335/" source="CVE"/>
		<reference ref_id="CVE-2018-17100" ref_url="https://www.suse.com/security/cve/CVE-2018-17100/" source="CVE"/>
		<reference ref_id="CVE-2018-17101" ref_url="https://www.suse.com/security/cve/CVE-2018-17101/" source="CVE"/>
		<reference ref_id="CVE-2018-17795" ref_url="https://www.suse.com/security/cve/CVE-2018-17795/" source="CVE"/>
		<reference ref_id="CVE-2018-5784" ref_url="https://www.suse.com/security/cve/CVE-2018-5784/" source="CVE"/>
		<reference ref_id="CVE-2018-7456" ref_url="https://www.suse.com/security/cve/CVE-2018-7456/" source="CVE"/>
		<reference ref_id="CVE-2018-8905" ref_url="https://www.suse.com/security/cve/CVE-2018-8905/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff5-32bit-4.0.9-44.24.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2285/">CVE-2009-2285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2347/">CVE-2009-2347</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2065/">CVE-2010-2065</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2067/">CVE-2010-2067</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2233/">CVE-2010-2233</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4665/">CVE-2010-4665</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0192/">CVE-2011-0192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1167/">CVE-2011-1167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1173/">CVE-2012-1173</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2113/">CVE-2012-2113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3401/">CVE-2012-3401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4564/">CVE-2012-4564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1960/">CVE-2013-1960</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1961/">CVE-2013-1961</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4231/">CVE-2013-4231</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4232/">CVE-2013-4232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4243/">CVE-2013-4243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4244/">CVE-2013-4244</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8129/">CVE-2014-8129</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8130/">CVE-2014-8130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9655/">CVE-2014-9655</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1547/">CVE-2015-1547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8665/">CVE-2015-8665</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8683/">CVE-2015-8683</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8781/">CVE-2015-8781</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8782/">CVE-2015-8782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8783/">CVE-2015-8783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10095/">CVE-2016-10095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10266/">CVE-2016-10266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10267/">CVE-2016-10267</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10268/">CVE-2016-10268</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10269/">CVE-2016-10269</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10270/">CVE-2016-10270</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10271/">CVE-2016-10271</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10272/">CVE-2016-10272</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10371/">CVE-2016-10371</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3186/">CVE-2016-3186</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3622/">CVE-2016-3622</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3623/">CVE-2016-3623</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3632/">CVE-2016-3632</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3658/">CVE-2016-3658</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3945/">CVE-2016-3945</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3990/">CVE-2016-3990</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3991/">CVE-2016-3991</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5314/">CVE-2016-5314</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5316/">CVE-2016-5316</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5317/">CVE-2016-5317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5318/">CVE-2016-5318</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5319/">CVE-2016-5319</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5320/">CVE-2016-5320</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5321/">CVE-2016-5321</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5323/">CVE-2016-5323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5652/">CVE-2016-5652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5875/">CVE-2016-5875</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8331/">CVE-2016-8331</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9273/">CVE-2016-9273</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9297/">CVE-2016-9297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9448/">CVE-2016-9448</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9453/">CVE-2016-9453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9538/">CVE-2016-9538</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11613/">CVE-2017-11613</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16232/">CVE-2017-16232</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17942/">CVE-2017-17942</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17973/">CVE-2017-17973</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18013/">CVE-2017-18013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5225/">CVE-2017-5225</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7592/">CVE-2017-7592</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7593/">CVE-2017-7593</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7594/">CVE-2017-7594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7595/">CVE-2017-7595</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7596/">CVE-2017-7596</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7597/">CVE-2017-7597</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7598/">CVE-2017-7598</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7599/">CVE-2017-7599</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7600/">CVE-2017-7600</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7601/">CVE-2017-7601</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7602/">CVE-2017-7602</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9403/">CVE-2017-9403</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9404/">CVE-2017-9404</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9935/">CVE-2017-9935</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9936/">CVE-2017-9936</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10779/">CVE-2018-10779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10963/">CVE-2018-10963</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16335/">CVE-2018-16335</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17100/">CVE-2018-17100</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-17101/">CVE-2018-17101</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17795/">CVE-2018-17795</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5784/">CVE-2018-5784</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7456/">CVE-2018-7456</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-8905/">CVE-2018-8905</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512495" comment="libtiff5-4.0.9-44.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512496" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77056" version="1" class="patch">
	<metadata>
		<title>libtirpc-netconfig-1.0.1-17.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-8779" ref_url="https://www.suse.com/security/cve/CVE-2017-8779/" source="CVE"/>
		<description>
These are all security issues fixed in the libtirpc-netconfig-1.0.1-17.6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8779/">CVE-2017-8779</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512497" comment="libtirpc-netconfig-1.0.1-17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512498" comment="libtirpc3-1.0.1-17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512499" comment="libtirpc3-32bit-1.0.1-17.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77057" version="1" class="patch">
	<metadata>
		<title>libudisks2-0-2.1.3-1.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-0004" ref_url="https://www.suse.com/security/cve/CVE-2014-0004/" source="CVE"/>
		<description>
These are all security issues fixed in the libudisks2-0-2.1.3-1.14 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0004/">CVE-2014-0004</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140969" comment="libudisks2-0-2.1.3-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140970" comment="udisks2-2.1.3-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140971" comment="udisks2-lang-2.1.3-1.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77058" version="1" class="patch">
	<metadata>
		<title>libusbmuxd4-1.0.10-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-5104" ref_url="https://www.suse.com/security/cve/CVE-2016-5104/" source="CVE"/>
		<description>
These are all security issues fixed in the libusbmuxd4-1.0.10-2.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5104/">CVE-2016-5104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140975" comment="libusbmuxd4-1.0.10-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77059" version="1" class="patch">
	<metadata>
		<title>libvdpau1-1.1.1-6.73 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-5198" ref_url="https://www.suse.com/security/cve/CVE-2015-5198/" source="CVE"/>
		<reference ref_id="CVE-2015-5199" ref_url="https://www.suse.com/security/cve/CVE-2015-5199/" source="CVE"/>
		<reference ref_id="CVE-2015-5200" ref_url="https://www.suse.com/security/cve/CVE-2015-5200/" source="CVE"/>
		<description>
These are all security issues fixed in the libvdpau1-1.1.1-6.73 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5198/">CVE-2015-5198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5199/">CVE-2015-5199</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5200/">CVE-2015-5200</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140976" comment="libvdpau1-1.1.1-6.73 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142145" comment="libvdpau1-32bit-1.1.1-6.73 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77060" version="1" class="patch">
	<metadata>
		<title>libvirglrenderer0-0.5.0-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-10163" ref_url="https://www.suse.com/security/cve/CVE-2016-10163/" source="CVE"/>
		<reference ref_id="CVE-2016-10214" ref_url="https://www.suse.com/security/cve/CVE-2016-10214/" source="CVE"/>
		<reference ref_id="CVE-2017-5580" ref_url="https://www.suse.com/security/cve/CVE-2017-5580/" source="CVE"/>
		<reference ref_id="CVE-2017-5937" ref_url="https://www.suse.com/security/cve/CVE-2017-5937/" source="CVE"/>
		<reference ref_id="CVE-2017-5956" ref_url="https://www.suse.com/security/cve/CVE-2017-5956/" source="CVE"/>
		<reference ref_id="CVE-2017-5957" ref_url="https://www.suse.com/security/cve/CVE-2017-5957/" source="CVE"/>
		<reference ref_id="CVE-2017-5993" ref_url="https://www.suse.com/security/cve/CVE-2017-5993/" source="CVE"/>
		<reference ref_id="CVE-2017-5994" ref_url="https://www.suse.com/security/cve/CVE-2017-5994/" source="CVE"/>
		<reference ref_id="CVE-2017-6209" ref_url="https://www.suse.com/security/cve/CVE-2017-6209/" source="CVE"/>
		<reference ref_id="CVE-2017-6210" ref_url="https://www.suse.com/security/cve/CVE-2017-6210/" source="CVE"/>
		<reference ref_id="CVE-2017-6317" ref_url="https://www.suse.com/security/cve/CVE-2017-6317/" source="CVE"/>
		<reference ref_id="CVE-2017-6355" ref_url="https://www.suse.com/security/cve/CVE-2017-6355/" source="CVE"/>
		<reference ref_id="CVE-2017-6386" ref_url="https://www.suse.com/security/cve/CVE-2017-6386/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirglrenderer0-0.5.0-11.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10163/">CVE-2016-10163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10214/">CVE-2016-10214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5580/">CVE-2017-5580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5937/">CVE-2017-5937</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5956/">CVE-2017-5956</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5957/">CVE-2017-5957</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5993/">CVE-2017-5993</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5994/">CVE-2017-5994</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6209/">CVE-2017-6209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6210/">CVE-2017-6210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6317/">CVE-2017-6317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6355/">CVE-2017-6355</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6386/">CVE-2017-6386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009149816" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77061" version="1" class="patch">
	<metadata>
		<title>libvirt-4.0.0-6.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-2242" ref_url="https://www.suse.com/security/cve/CVE-2010-2242/" source="CVE"/>
		<reference ref_id="CVE-2011-1146" ref_url="https://www.suse.com/security/cve/CVE-2011-1146/" source="CVE"/>
		<reference ref_id="CVE-2011-2511" ref_url="https://www.suse.com/security/cve/CVE-2011-2511/" source="CVE"/>
		<reference ref_id="CVE-2011-4600" ref_url="https://www.suse.com/security/cve/CVE-2011-4600/" source="CVE"/>
		<reference ref_id="CVE-2012-3445" ref_url="https://www.suse.com/security/cve/CVE-2012-3445/" source="CVE"/>
		<reference ref_id="CVE-2013-0170" ref_url="https://www.suse.com/security/cve/CVE-2013-0170/" source="CVE"/>
		<reference ref_id="CVE-2013-1962" ref_url="https://www.suse.com/security/cve/CVE-2013-1962/" source="CVE"/>
		<reference ref_id="CVE-2013-2218" ref_url="https://www.suse.com/security/cve/CVE-2013-2218/" source="CVE"/>
		<reference ref_id="CVE-2013-2230" ref_url="https://www.suse.com/security/cve/CVE-2013-2230/" source="CVE"/>
		<reference ref_id="CVE-2013-4153" ref_url="https://www.suse.com/security/cve/CVE-2013-4153/" source="CVE"/>
		<reference ref_id="CVE-2013-4154" ref_url="https://www.suse.com/security/cve/CVE-2013-4154/" source="CVE"/>
		<reference ref_id="CVE-2013-4239" ref_url="https://www.suse.com/security/cve/CVE-2013-4239/" source="CVE"/>
		<reference ref_id="CVE-2013-4296" ref_url="https://www.suse.com/security/cve/CVE-2013-4296/" source="CVE"/>
		<reference ref_id="CVE-2013-4297" ref_url="https://www.suse.com/security/cve/CVE-2013-4297/" source="CVE"/>
		<reference ref_id="CVE-2013-4311" ref_url="https://www.suse.com/security/cve/CVE-2013-4311/" source="CVE"/>
		<reference ref_id="CVE-2013-4399" ref_url="https://www.suse.com/security/cve/CVE-2013-4399/" source="CVE"/>
		<reference ref_id="CVE-2013-4400" ref_url="https://www.suse.com/security/cve/CVE-2013-4400/" source="CVE"/>
		<reference ref_id="CVE-2013-4401" ref_url="https://www.suse.com/security/cve/CVE-2013-4401/" source="CVE"/>
		<reference ref_id="CVE-2013-6436" ref_url="https://www.suse.com/security/cve/CVE-2013-6436/" source="CVE"/>
		<reference ref_id="CVE-2013-6456" ref_url="https://www.suse.com/security/cve/CVE-2013-6456/" source="CVE"/>
		<reference ref_id="CVE-2013-6457" ref_url="https://www.suse.com/security/cve/CVE-2013-6457/" source="CVE"/>
		<reference ref_id="CVE-2013-6458" ref_url="https://www.suse.com/security/cve/CVE-2013-6458/" source="CVE"/>
		<reference ref_id="CVE-2014-0028" ref_url="https://www.suse.com/security/cve/CVE-2014-0028/" source="CVE"/>
		<reference ref_id="CVE-2014-0179" ref_url="https://www.suse.com/security/cve/CVE-2014-0179/" source="CVE"/>
		<reference ref_id="CVE-2014-1447" ref_url="https://www.suse.com/security/cve/CVE-2014-1447/" source="CVE"/>
		<reference ref_id="CVE-2014-3633" ref_url="https://www.suse.com/security/cve/CVE-2014-3633/" source="CVE"/>
		<reference ref_id="CVE-2014-3657" ref_url="https://www.suse.com/security/cve/CVE-2014-3657/" source="CVE"/>
		<reference ref_id="CVE-2014-7823" ref_url="https://www.suse.com/security/cve/CVE-2014-7823/" source="CVE"/>
		<reference ref_id="CVE-2014-8131" ref_url="https://www.suse.com/security/cve/CVE-2014-8131/" source="CVE"/>
		<reference ref_id="CVE-2015-0236" ref_url="https://www.suse.com/security/cve/CVE-2015-0236/" source="CVE"/>
		<reference ref_id="CVE-2015-5247" ref_url="https://www.suse.com/security/cve/CVE-2015-5247/" source="CVE"/>
		<reference ref_id="CVE-2015-5313" ref_url="https://www.suse.com/security/cve/CVE-2015-5313/" source="CVE"/>
		<reference ref_id="CVE-2017-1000256" ref_url="https://www.suse.com/security/cve/CVE-2017-1000256/" source="CVE"/>
		<reference ref_id="CVE-2017-2635" ref_url="https://www.suse.com/security/cve/CVE-2017-2635/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-1064" ref_url="https://www.suse.com/security/cve/CVE-2018-1064/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-5748" ref_url="https://www.suse.com/security/cve/CVE-2018-5748/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirt-4.0.0-6.13 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2242/">CVE-2010-2242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1146/">CVE-2011-1146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2511/">CVE-2011-2511</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-4600/">CVE-2011-4600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3445/">CVE-2012-3445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0170/">CVE-2013-0170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1962/">CVE-2013-1962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2218/">CVE-2013-2218</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2230/">CVE-2013-2230</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4153/">CVE-2013-4153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4154/">CVE-2013-4154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4239/">CVE-2013-4239</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4296/">CVE-2013-4296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4297/">CVE-2013-4297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4311/">CVE-2013-4311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4399/">CVE-2013-4399</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4400/">CVE-2013-4400</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4401/">CVE-2013-4401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6436/">CVE-2013-6436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6456/">CVE-2013-6456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6457/">CVE-2013-6457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6458/">CVE-2013-6458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0028/">CVE-2014-0028</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0179/">CVE-2014-0179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1447/">CVE-2014-1447</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3633/">CVE-2014-3633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3657/">CVE-2014-3657</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7823/">CVE-2014-7823</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8131/">CVE-2014-8131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0236/">CVE-2015-0236</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5247/">CVE-2015-5247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5313/">CVE-2015-5313</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000256/">CVE-2017-1000256</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-2635/">CVE-2017-2635</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1064/">CVE-2018-1064</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5748/">CVE-2018-5748</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512500" comment="libvirt-4.0.0-6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512501" comment="libvirt-admin-4.0.0-6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512502" comment="libvirt-client-4.0.0-6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512503" comment="libvirt-daemon-4.0.0-6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512504" comment="libvirt-daemon-config-network-4.0.0-6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512505" comment="libvirt-daemon-config-nwfilter-4.0.0-6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512506" comment="libvirt-daemon-driver-interface-4.0.0-6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512507" comment="libvirt-daemon-driver-libxl-4.0.0-6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512508" comment="libvirt-daemon-driver-lxc-4.0.0-6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512509" comment="libvirt-daemon-driver-network-4.0.0-6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512510" comment="libvirt-daemon-driver-nodedev-4.0.0-6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512511" comment="libvirt-daemon-driver-nwfilter-4.0.0-6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512512" comment="libvirt-daemon-driver-qemu-4.0.0-6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512513" comment="libvirt-daemon-driver-secret-4.0.0-6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512514" comment="libvirt-daemon-driver-storage-4.0.0-6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512515" comment="libvirt-daemon-driver-storage-core-4.0.0-6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512516" comment="libvirt-daemon-driver-storage-disk-4.0.0-6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512517" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512518" comment="libvirt-daemon-driver-storage-logical-4.0.0-6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512519" comment="libvirt-daemon-driver-storage-mpath-4.0.0-6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512520" comment="libvirt-daemon-driver-storage-rbd-4.0.0-6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512521" comment="libvirt-daemon-driver-storage-scsi-4.0.0-6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512522" comment="libvirt-daemon-lxc-4.0.0-6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512523" comment="libvirt-daemon-qemu-4.0.0-6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512524" comment="libvirt-daemon-xen-4.0.0-6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512525" comment="libvirt-doc-4.0.0-6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512526" comment="libvirt-libs-4.0.0-6.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77062" version="1" class="patch">
	<metadata>
		<title>libvmtools0-10.3.0-2.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-5191" ref_url="https://www.suse.com/security/cve/CVE-2015-5191/" source="CVE"/>
		<description>
These are all security issues fixed in the libvmtools0-10.3.0-2.6 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5191/">CVE-2015-5191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512527" comment="libvmtools0-10.3.0-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512528" comment="open-vm-tools-10.3.0-2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512529" comment="open-vm-tools-desktop-10.3.0-2.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77063" version="1" class="patch">
	<metadata>
		<title>libvorbis0-1.3.3-10.14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-1420" ref_url="https://www.suse.com/security/cve/CVE-2008-1420/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<reference ref_id="CVE-2017-14160" ref_url="https://www.suse.com/security/cve/CVE-2017-14160/" source="CVE"/>
		<reference ref_id="CVE-2017-14632" ref_url="https://www.suse.com/security/cve/CVE-2017-14632/" source="CVE"/>
		<reference ref_id="CVE-2017-14633" ref_url="https://www.suse.com/security/cve/CVE-2017-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-10392" ref_url="https://www.suse.com/security/cve/CVE-2018-10392/" source="CVE"/>
		<reference ref_id="CVE-2018-10393" ref_url="https://www.suse.com/security/cve/CVE-2018-10393/" source="CVE"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<description>
These are all security issues fixed in the libvorbis0-1.3.3-10.14.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1420/">CVE-2008-1420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14160/">CVE-2017-14160</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14632/">CVE-2017-14632</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14633/">CVE-2017-14633</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10392/">CVE-2018-10392</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10393/">CVE-2018-10393</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009178202" comment="libvorbis0-1.3.3-10.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009178203" comment="libvorbis0-32bit-1.3.3-10.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009178204" comment="libvorbisenc2-1.3.3-10.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009178205" comment="libvorbisenc2-32bit-1.3.3-10.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009178206" comment="libvorbisfile3-1.3.3-10.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009178207" comment="libvorbisfile3-32bit-1.3.3-10.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77064" version="1" class="patch">
	<metadata>
		<title>libvpx1-1.3.0-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-13194" ref_url="https://www.suse.com/security/cve/CVE-2017-13194/" source="CVE"/>
		<description>
These are all security issues fixed in the libvpx1-1.3.0-3.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13194/">CVE-2017-13194</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009169974" comment="libvpx1-1.3.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009169975" comment="libvpx1-32bit-1.3.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009169976" comment="vpx-tools-1.3.0-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77065" version="1" class="patch">
	<metadata>
		<title>libvte9-0.28.2-19.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-2738" ref_url="https://www.suse.com/security/cve/CVE-2012-2738/" source="CVE"/>
		<description>
These are all security issues fixed in the libvte9-0.28.2-19.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2738/">CVE-2012-2738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141004" comment="libvte9-0.28.2-19.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77066" version="1" class="patch">
	<metadata>
		<title>libwavpack1-4.60.99-5.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-10169" ref_url="https://www.suse.com/security/cve/CVE-2016-10169/" source="CVE"/>
		<reference ref_id="CVE-2016-10170" ref_url="https://www.suse.com/security/cve/CVE-2016-10170/" source="CVE"/>
		<reference ref_id="CVE-2016-10171" ref_url="https://www.suse.com/security/cve/CVE-2016-10171/" source="CVE"/>
		<reference ref_id="CVE-2016-10172" ref_url="https://www.suse.com/security/cve/CVE-2016-10172/" source="CVE"/>
		<description>
These are all security issues fixed in the libwavpack1-4.60.99-5.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10169/">CVE-2016-10169</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10170/">CVE-2016-10170</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10171/">CVE-2016-10171</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10172/">CVE-2016-10172</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009172685" comment="libwavpack1-4.60.99-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77067" version="1" class="patch">
	<metadata>
		<title>libwireshark9-2.4.9-48.29.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-1210" ref_url="https://www.suse.com/security/cve/CVE-2009-1210/" source="CVE"/>
		<reference ref_id="CVE-2009-1267" ref_url="https://www.suse.com/security/cve/CVE-2009-1267/" source="CVE"/>
		<reference ref_id="CVE-2009-1268" ref_url="https://www.suse.com/security/cve/CVE-2009-1268/" source="CVE"/>
		<reference ref_id="CVE-2009-1269" ref_url="https://www.suse.com/security/cve/CVE-2009-1269/" source="CVE"/>
		<reference ref_id="CVE-2009-3241" ref_url="https://www.suse.com/security/cve/CVE-2009-3241/" source="CVE"/>
		<reference ref_id="CVE-2009-3242" ref_url="https://www.suse.com/security/cve/CVE-2009-3242/" source="CVE"/>
		<reference ref_id="CVE-2009-3243" ref_url="https://www.suse.com/security/cve/CVE-2009-3243/" source="CVE"/>
		<reference ref_id="CVE-2010-1455" ref_url="https://www.suse.com/security/cve/CVE-2010-1455/" source="CVE"/>
		<reference ref_id="CVE-2010-2993" ref_url="https://www.suse.com/security/cve/CVE-2010-2993/" source="CVE"/>
		<reference ref_id="CVE-2010-3445" ref_url="https://www.suse.com/security/cve/CVE-2010-3445/" source="CVE"/>
		<reference ref_id="CVE-2010-4300" ref_url="https://www.suse.com/security/cve/CVE-2010-4300/" source="CVE"/>
		<reference ref_id="CVE-2010-4301" ref_url="https://www.suse.com/security/cve/CVE-2010-4301/" source="CVE"/>
		<reference ref_id="CVE-2010-4538" ref_url="https://www.suse.com/security/cve/CVE-2010-4538/" source="CVE"/>
		<reference ref_id="CVE-2011-0024" ref_url="https://www.suse.com/security/cve/CVE-2011-0024/" source="CVE"/>
		<reference ref_id="CVE-2011-0538" ref_url="https://www.suse.com/security/cve/CVE-2011-0538/" source="CVE"/>
		<reference ref_id="CVE-2011-0713" ref_url="https://www.suse.com/security/cve/CVE-2011-0713/" source="CVE"/>
		<reference ref_id="CVE-2011-1138" ref_url="https://www.suse.com/security/cve/CVE-2011-1138/" source="CVE"/>
		<reference ref_id="CVE-2011-1139" ref_url="https://www.suse.com/security/cve/CVE-2011-1139/" source="CVE"/>
		<reference ref_id="CVE-2011-1140" ref_url="https://www.suse.com/security/cve/CVE-2011-1140/" source="CVE"/>
		<reference ref_id="CVE-2011-1143" ref_url="https://www.suse.com/security/cve/CVE-2011-1143/" source="CVE"/>
		<reference ref_id="CVE-2011-1590" ref_url="https://www.suse.com/security/cve/CVE-2011-1590/" source="CVE"/>
		<reference ref_id="CVE-2011-1591" ref_url="https://www.suse.com/security/cve/CVE-2011-1591/" source="CVE"/>
		<reference ref_id="CVE-2011-1592" ref_url="https://www.suse.com/security/cve/CVE-2011-1592/" source="CVE"/>
		<reference ref_id="CVE-2011-1957" ref_url="https://www.suse.com/security/cve/CVE-2011-1957/" source="CVE"/>
		<reference ref_id="CVE-2011-1958" ref_url="https://www.suse.com/security/cve/CVE-2011-1958/" source="CVE"/>
		<reference ref_id="CVE-2011-1959" ref_url="https://www.suse.com/security/cve/CVE-2011-1959/" source="CVE"/>
		<reference ref_id="CVE-2011-2174" ref_url="https://www.suse.com/security/cve/CVE-2011-2174/" source="CVE"/>
		<reference ref_id="CVE-2011-2175" ref_url="https://www.suse.com/security/cve/CVE-2011-2175/" source="CVE"/>
		<reference ref_id="CVE-2011-2597" ref_url="https://www.suse.com/security/cve/CVE-2011-2597/" source="CVE"/>
		<reference ref_id="CVE-2011-2698" ref_url="https://www.suse.com/security/cve/CVE-2011-2698/" source="CVE"/>
		<reference ref_id="CVE-2011-3266" ref_url="https://www.suse.com/security/cve/CVE-2011-3266/" source="CVE"/>
		<reference ref_id="CVE-2011-3360" ref_url="https://www.suse.com/security/cve/CVE-2011-3360/" source="CVE"/>
		<reference ref_id="CVE-2011-3483" ref_url="https://www.suse.com/security/cve/CVE-2011-3483/" source="CVE"/>
		<reference ref_id="CVE-2012-2392" ref_url="https://www.suse.com/security/cve/CVE-2012-2392/" source="CVE"/>
		<reference ref_id="CVE-2012-2393" ref_url="https://www.suse.com/security/cve/CVE-2012-2393/" source="CVE"/>
		<reference ref_id="CVE-2012-2394" ref_url="https://www.suse.com/security/cve/CVE-2012-2394/" source="CVE"/>
		<reference ref_id="CVE-2012-3548" ref_url="https://www.suse.com/security/cve/CVE-2012-3548/" source="CVE"/>
		<reference ref_id="CVE-2012-4048" ref_url="https://www.suse.com/security/cve/CVE-2012-4048/" source="CVE"/>
		<reference ref_id="CVE-2012-4049" ref_url="https://www.suse.com/security/cve/CVE-2012-4049/" source="CVE"/>
		<reference ref_id="CVE-2012-4285" ref_url="https://www.suse.com/security/cve/CVE-2012-4285/" source="CVE"/>
		<reference ref_id="CVE-2012-4286" ref_url="https://www.suse.com/security/cve/CVE-2012-4286/" source="CVE"/>
		<reference ref_id="CVE-2012-4287" ref_url="https://www.suse.com/security/cve/CVE-2012-4287/" source="CVE"/>
		<reference ref_id="CVE-2012-4288" ref_url="https://www.suse.com/security/cve/CVE-2012-4288/" source="CVE"/>
		<reference ref_id="CVE-2012-4289" ref_url="https://www.suse.com/security/cve/CVE-2012-4289/" source="CVE"/>
		<reference ref_id="CVE-2012-4290" ref_url="https://www.suse.com/security/cve/CVE-2012-4290/" source="CVE"/>
		<reference ref_id="CVE-2012-4291" ref_url="https://www.suse.com/security/cve/CVE-2012-4291/" source="CVE"/>
		<reference ref_id="CVE-2012-4292" ref_url="https://www.suse.com/security/cve/CVE-2012-4292/" source="CVE"/>
		<reference ref_id="CVE-2012-4293" ref_url="https://www.suse.com/security/cve/CVE-2012-4293/" source="CVE"/>
		<reference ref_id="CVE-2012-4294" ref_url="https://www.suse.com/security/cve/CVE-2012-4294/" source="CVE"/>
		<reference ref_id="CVE-2012-4295" ref_url="https://www.suse.com/security/cve/CVE-2012-4295/" source="CVE"/>
		<reference ref_id="CVE-2012-4296" ref_url="https://www.suse.com/security/cve/CVE-2012-4296/" source="CVE"/>
		<reference ref_id="CVE-2012-4297" ref_url="https://www.suse.com/security/cve/CVE-2012-4297/" source="CVE"/>
		<reference ref_id="CVE-2012-4298" ref_url="https://www.suse.com/security/cve/CVE-2012-4298/" source="CVE"/>
		<reference ref_id="CVE-2012-5237" ref_url="https://www.suse.com/security/cve/CVE-2012-5237/" source="CVE"/>
		<reference ref_id="CVE-2012-5238" ref_url="https://www.suse.com/security/cve/CVE-2012-5238/" source="CVE"/>
		<reference ref_id="CVE-2012-5239" ref_url="https://www.suse.com/security/cve/CVE-2012-5239/" source="CVE"/>
		<reference ref_id="CVE-2012-5240" ref_url="https://www.suse.com/security/cve/CVE-2012-5240/" source="CVE"/>
		<reference ref_id="CVE-2012-5592" ref_url="https://www.suse.com/security/cve/CVE-2012-5592/" source="CVE"/>
		<reference ref_id="CVE-2012-5593" ref_url="https://www.suse.com/security/cve/CVE-2012-5593/" source="CVE"/>
		<reference ref_id="CVE-2012-5594" ref_url="https://www.suse.com/security/cve/CVE-2012-5594/" source="CVE"/>
		<reference ref_id="CVE-2012-5595" ref_url="https://www.suse.com/security/cve/CVE-2012-5595/" source="CVE"/>
		<reference ref_id="CVE-2012-5596" ref_url="https://www.suse.com/security/cve/CVE-2012-5596/" source="CVE"/>
		<reference ref_id="CVE-2012-5597" ref_url="https://www.suse.com/security/cve/CVE-2012-5597/" source="CVE"/>
		<reference ref_id="CVE-2012-5598" ref_url="https://www.suse.com/security/cve/CVE-2012-5598/" source="CVE"/>
		<reference ref_id="CVE-2012-5599" ref_url="https://www.suse.com/security/cve/CVE-2012-5599/" source="CVE"/>
		<reference ref_id="CVE-2012-5600" ref_url="https://www.suse.com/security/cve/CVE-2012-5600/" source="CVE"/>
		<reference ref_id="CVE-2012-5601" ref_url="https://www.suse.com/security/cve/CVE-2012-5601/" source="CVE"/>
		<reference ref_id="CVE-2012-5602" ref_url="https://www.suse.com/security/cve/CVE-2012-5602/" source="CVE"/>
		<reference ref_id="CVE-2013-1572" ref_url="https://www.suse.com/security/cve/CVE-2013-1572/" source="CVE"/>
		<reference ref_id="CVE-2013-1573" ref_url="https://www.suse.com/security/cve/CVE-2013-1573/" source="CVE"/>
		<reference ref_id="CVE-2013-1574" ref_url="https://www.suse.com/security/cve/CVE-2013-1574/" source="CVE"/>
		<reference ref_id="CVE-2013-1575" ref_url="https://www.suse.com/security/cve/CVE-2013-1575/" source="CVE"/>
		<reference ref_id="CVE-2013-1576" ref_url="https://www.suse.com/security/cve/CVE-2013-1576/" source="CVE"/>
		<reference ref_id="CVE-2013-1577" ref_url="https://www.suse.com/security/cve/CVE-2013-1577/" source="CVE"/>
		<reference ref_id="CVE-2013-1578" ref_url="https://www.suse.com/security/cve/CVE-2013-1578/" source="CVE"/>
		<reference ref_id="CVE-2013-1579" ref_url="https://www.suse.com/security/cve/CVE-2013-1579/" source="CVE"/>
		<reference ref_id="CVE-2013-1580" ref_url="https://www.suse.com/security/cve/CVE-2013-1580/" source="CVE"/>
		<reference ref_id="CVE-2013-1581" ref_url="https://www.suse.com/security/cve/CVE-2013-1581/" source="CVE"/>
		<reference ref_id="CVE-2013-1582" ref_url="https://www.suse.com/security/cve/CVE-2013-1582/" source="CVE"/>
		<reference ref_id="CVE-2013-1583" ref_url="https://www.suse.com/security/cve/CVE-2013-1583/" source="CVE"/>
		<reference ref_id="CVE-2013-1584" ref_url="https://www.suse.com/security/cve/CVE-2013-1584/" source="CVE"/>
		<reference ref_id="CVE-2013-1585" ref_url="https://www.suse.com/security/cve/CVE-2013-1585/" source="CVE"/>
		<reference ref_id="CVE-2013-1586" ref_url="https://www.suse.com/security/cve/CVE-2013-1586/" source="CVE"/>
		<reference ref_id="CVE-2013-1587" ref_url="https://www.suse.com/security/cve/CVE-2013-1587/" source="CVE"/>
		<reference ref_id="CVE-2013-1588" ref_url="https://www.suse.com/security/cve/CVE-2013-1588/" source="CVE"/>
		<reference ref_id="CVE-2013-1589" ref_url="https://www.suse.com/security/cve/CVE-2013-1589/" source="CVE"/>
		<reference ref_id="CVE-2013-1590" ref_url="https://www.suse.com/security/cve/CVE-2013-1590/" source="CVE"/>
		<reference ref_id="CVE-2013-2475" ref_url="https://www.suse.com/security/cve/CVE-2013-2475/" source="CVE"/>
		<reference ref_id="CVE-2013-2476" ref_url="https://www.suse.com/security/cve/CVE-2013-2476/" source="CVE"/>
		<reference ref_id="CVE-2013-2477" ref_url="https://www.suse.com/security/cve/CVE-2013-2477/" source="CVE"/>
		<reference ref_id="CVE-2013-2478" ref_url="https://www.suse.com/security/cve/CVE-2013-2478/" source="CVE"/>
		<reference ref_id="CVE-2013-2479" ref_url="https://www.suse.com/security/cve/CVE-2013-2479/" source="CVE"/>
		<reference ref_id="CVE-2013-2480" ref_url="https://www.suse.com/security/cve/CVE-2013-2480/" source="CVE"/>
		<reference ref_id="CVE-2013-2481" ref_url="https://www.suse.com/security/cve/CVE-2013-2481/" source="CVE"/>
		<reference ref_id="CVE-2013-2482" ref_url="https://www.suse.com/security/cve/CVE-2013-2482/" source="CVE"/>
		<reference ref_id="CVE-2013-2483" ref_url="https://www.suse.com/security/cve/CVE-2013-2483/" source="CVE"/>
		<reference ref_id="CVE-2013-2484" ref_url="https://www.suse.com/security/cve/CVE-2013-2484/" source="CVE"/>
		<reference ref_id="CVE-2013-2485" ref_url="https://www.suse.com/security/cve/CVE-2013-2485/" source="CVE"/>
		<reference ref_id="CVE-2013-2486" ref_url="https://www.suse.com/security/cve/CVE-2013-2486/" source="CVE"/>
		<reference ref_id="CVE-2013-2487" ref_url="https://www.suse.com/security/cve/CVE-2013-2487/" source="CVE"/>
		<reference ref_id="CVE-2013-2488" ref_url="https://www.suse.com/security/cve/CVE-2013-2488/" source="CVE"/>
		<reference ref_id="CVE-2013-3555" ref_url="https://www.suse.com/security/cve/CVE-2013-3555/" source="CVE"/>
		<reference ref_id="CVE-2013-3556" ref_url="https://www.suse.com/security/cve/CVE-2013-3556/" source="CVE"/>
		<reference ref_id="CVE-2013-3557" ref_url="https://www.suse.com/security/cve/CVE-2013-3557/" source="CVE"/>
		<reference ref_id="CVE-2013-3558" ref_url="https://www.suse.com/security/cve/CVE-2013-3558/" source="CVE"/>
		<reference ref_id="CVE-2013-3559" ref_url="https://www.suse.com/security/cve/CVE-2013-3559/" source="CVE"/>
		<reference ref_id="CVE-2013-3560" ref_url="https://www.suse.com/security/cve/CVE-2013-3560/" source="CVE"/>
		<reference ref_id="CVE-2013-3561" ref_url="https://www.suse.com/security/cve/CVE-2013-3561/" source="CVE"/>
		<reference ref_id="CVE-2013-3562" ref_url="https://www.suse.com/security/cve/CVE-2013-3562/" source="CVE"/>
		<reference ref_id="CVE-2013-4083" ref_url="https://www.suse.com/security/cve/CVE-2013-4083/" source="CVE"/>
		<reference ref_id="CVE-2013-4920" ref_url="https://www.suse.com/security/cve/CVE-2013-4920/" source="CVE"/>
		<reference ref_id="CVE-2013-4921" ref_url="https://www.suse.com/security/cve/CVE-2013-4921/" source="CVE"/>
		<reference ref_id="CVE-2013-4922" ref_url="https://www.suse.com/security/cve/CVE-2013-4922/" source="CVE"/>
		<reference ref_id="CVE-2013-4923" ref_url="https://www.suse.com/security/cve/CVE-2013-4923/" source="CVE"/>
		<reference ref_id="CVE-2013-4924" ref_url="https://www.suse.com/security/cve/CVE-2013-4924/" source="CVE"/>
		<reference ref_id="CVE-2013-4925" ref_url="https://www.suse.com/security/cve/CVE-2013-4925/" source="CVE"/>
		<reference ref_id="CVE-2013-4926" ref_url="https://www.suse.com/security/cve/CVE-2013-4926/" source="CVE"/>
		<reference ref_id="CVE-2013-4927" ref_url="https://www.suse.com/security/cve/CVE-2013-4927/" source="CVE"/>
		<reference ref_id="CVE-2013-4928" ref_url="https://www.suse.com/security/cve/CVE-2013-4928/" source="CVE"/>
		<reference ref_id="CVE-2013-4929" ref_url="https://www.suse.com/security/cve/CVE-2013-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-4930" ref_url="https://www.suse.com/security/cve/CVE-2013-4930/" source="CVE"/>
		<reference ref_id="CVE-2013-4931" ref_url="https://www.suse.com/security/cve/CVE-2013-4931/" source="CVE"/>
		<reference ref_id="CVE-2013-4932" ref_url="https://www.suse.com/security/cve/CVE-2013-4932/" source="CVE"/>
		<reference ref_id="CVE-2013-4933" ref_url="https://www.suse.com/security/cve/CVE-2013-4933/" source="CVE"/>
		<reference ref_id="CVE-2013-4934" ref_url="https://www.suse.com/security/cve/CVE-2013-4934/" source="CVE"/>
		<reference ref_id="CVE-2013-4935" ref_url="https://www.suse.com/security/cve/CVE-2013-4935/" source="CVE"/>
		<reference ref_id="CVE-2013-4936" ref_url="https://www.suse.com/security/cve/CVE-2013-4936/" source="CVE"/>
		<reference ref_id="CVE-2013-5717" ref_url="https://www.suse.com/security/cve/CVE-2013-5717/" source="CVE"/>
		<reference ref_id="CVE-2013-5718" ref_url="https://www.suse.com/security/cve/CVE-2013-5718/" source="CVE"/>
		<reference ref_id="CVE-2013-5719" ref_url="https://www.suse.com/security/cve/CVE-2013-5719/" source="CVE"/>
		<reference ref_id="CVE-2013-5720" ref_url="https://www.suse.com/security/cve/CVE-2013-5720/" source="CVE"/>
		<reference ref_id="CVE-2013-5721" ref_url="https://www.suse.com/security/cve/CVE-2013-5721/" source="CVE"/>
		<reference ref_id="CVE-2013-5722" ref_url="https://www.suse.com/security/cve/CVE-2013-5722/" source="CVE"/>
		<reference ref_id="CVE-2013-6336" ref_url="https://www.suse.com/security/cve/CVE-2013-6336/" source="CVE"/>
		<reference ref_id="CVE-2013-6337" ref_url="https://www.suse.com/security/cve/CVE-2013-6337/" source="CVE"/>
		<reference ref_id="CVE-2013-6338" ref_url="https://www.suse.com/security/cve/CVE-2013-6338/" source="CVE"/>
		<reference ref_id="CVE-2013-6339" ref_url="https://www.suse.com/security/cve/CVE-2013-6339/" source="CVE"/>
		<reference ref_id="CVE-2013-6340" ref_url="https://www.suse.com/security/cve/CVE-2013-6340/" source="CVE"/>
		<reference ref_id="CVE-2013-7112" ref_url="https://www.suse.com/security/cve/CVE-2013-7112/" source="CVE"/>
		<reference ref_id="CVE-2013-7113" ref_url="https://www.suse.com/security/cve/CVE-2013-7113/" source="CVE"/>
		<reference ref_id="CVE-2013-7114" ref_url="https://www.suse.com/security/cve/CVE-2013-7114/" source="CVE"/>
		<reference ref_id="CVE-2014-2281" ref_url="https://www.suse.com/security/cve/CVE-2014-2281/" source="CVE"/>
		<reference ref_id="CVE-2014-2282" ref_url="https://www.suse.com/security/cve/CVE-2014-2282/" source="CVE"/>
		<reference ref_id="CVE-2014-2283" ref_url="https://www.suse.com/security/cve/CVE-2014-2283/" source="CVE"/>
		<reference ref_id="CVE-2014-2299" ref_url="https://www.suse.com/security/cve/CVE-2014-2299/" source="CVE"/>
		<reference ref_id="CVE-2014-2907" ref_url="https://www.suse.com/security/cve/CVE-2014-2907/" source="CVE"/>
		<reference ref_id="CVE-2014-4020" ref_url="https://www.suse.com/security/cve/CVE-2014-4020/" source="CVE"/>
		<reference ref_id="CVE-2014-5161" ref_url="https://www.suse.com/security/cve/CVE-2014-5161/" source="CVE"/>
		<reference ref_id="CVE-2014-5162" ref_url="https://www.suse.com/security/cve/CVE-2014-5162/" source="CVE"/>
		<reference ref_id="CVE-2014-5163" ref_url="https://www.suse.com/security/cve/CVE-2014-5163/" source="CVE"/>
		<reference ref_id="CVE-2014-5164" ref_url="https://www.suse.com/security/cve/CVE-2014-5164/" source="CVE"/>
		<reference ref_id="CVE-2014-5165" ref_url="https://www.suse.com/security/cve/CVE-2014-5165/" source="CVE"/>
		<reference ref_id="CVE-2015-0559" ref_url="https://www.suse.com/security/cve/CVE-2015-0559/" source="CVE"/>
		<reference ref_id="CVE-2015-0560" ref_url="https://www.suse.com/security/cve/CVE-2015-0560/" source="CVE"/>
		<reference ref_id="CVE-2015-0561" ref_url="https://www.suse.com/security/cve/CVE-2015-0561/" source="CVE"/>
		<reference ref_id="CVE-2015-0562" ref_url="https://www.suse.com/security/cve/CVE-2015-0562/" source="CVE"/>
		<reference ref_id="CVE-2015-0563" ref_url="https://www.suse.com/security/cve/CVE-2015-0563/" source="CVE"/>
		<reference ref_id="CVE-2015-0564" ref_url="https://www.suse.com/security/cve/CVE-2015-0564/" source="CVE"/>
		<reference ref_id="CVE-2015-2188" ref_url="https://www.suse.com/security/cve/CVE-2015-2188/" source="CVE"/>
		<reference ref_id="CVE-2015-2189" ref_url="https://www.suse.com/security/cve/CVE-2015-2189/" source="CVE"/>
		<reference ref_id="CVE-2015-2191" ref_url="https://www.suse.com/security/cve/CVE-2015-2191/" source="CVE"/>
		<reference ref_id="CVE-2015-3811" ref_url="https://www.suse.com/security/cve/CVE-2015-3811/" source="CVE"/>
		<reference ref_id="CVE-2015-3812" ref_url="https://www.suse.com/security/cve/CVE-2015-3812/" source="CVE"/>
		<reference ref_id="CVE-2015-3813" ref_url="https://www.suse.com/security/cve/CVE-2015-3813/" source="CVE"/>
		<reference ref_id="CVE-2015-3814" ref_url="https://www.suse.com/security/cve/CVE-2015-3814/" source="CVE"/>
		<reference ref_id="CVE-2015-7830" ref_url="https://www.suse.com/security/cve/CVE-2015-7830/" source="CVE"/>
		<reference ref_id="CVE-2015-8711" ref_url="https://www.suse.com/security/cve/CVE-2015-8711/" source="CVE"/>
		<reference ref_id="CVE-2015-8712" ref_url="https://www.suse.com/security/cve/CVE-2015-8712/" source="CVE"/>
		<reference ref_id="CVE-2015-8713" ref_url="https://www.suse.com/security/cve/CVE-2015-8713/" source="CVE"/>
		<reference ref_id="CVE-2015-8714" ref_url="https://www.suse.com/security/cve/CVE-2015-8714/" source="CVE"/>
		<reference ref_id="CVE-2015-8715" ref_url="https://www.suse.com/security/cve/CVE-2015-8715/" source="CVE"/>
		<reference ref_id="CVE-2015-8716" ref_url="https://www.suse.com/security/cve/CVE-2015-8716/" source="CVE"/>
		<reference ref_id="CVE-2015-8717" ref_url="https://www.suse.com/security/cve/CVE-2015-8717/" source="CVE"/>
		<reference ref_id="CVE-2015-8718" ref_url="https://www.suse.com/security/cve/CVE-2015-8718/" source="CVE"/>
		<reference ref_id="CVE-2015-8719" ref_url="https://www.suse.com/security/cve/CVE-2015-8719/" source="CVE"/>
		<reference ref_id="CVE-2015-8720" ref_url="https://www.suse.com/security/cve/CVE-2015-8720/" source="CVE"/>
		<reference ref_id="CVE-2015-8721" ref_url="https://www.suse.com/security/cve/CVE-2015-8721/" source="CVE"/>
		<reference ref_id="CVE-2015-8722" ref_url="https://www.suse.com/security/cve/CVE-2015-8722/" source="CVE"/>
		<reference ref_id="CVE-2015-8723" ref_url="https://www.suse.com/security/cve/CVE-2015-8723/" source="CVE"/>
		<reference ref_id="CVE-2015-8724" ref_url="https://www.suse.com/security/cve/CVE-2015-8724/" source="CVE"/>
		<reference ref_id="CVE-2015-8725" ref_url="https://www.suse.com/security/cve/CVE-2015-8725/" source="CVE"/>
		<reference ref_id="CVE-2015-8726" ref_url="https://www.suse.com/security/cve/CVE-2015-8726/" source="CVE"/>
		<reference ref_id="CVE-2015-8727" ref_url="https://www.suse.com/security/cve/CVE-2015-8727/" source="CVE"/>
		<reference ref_id="CVE-2015-8728" ref_url="https://www.suse.com/security/cve/CVE-2015-8728/" source="CVE"/>
		<reference ref_id="CVE-2015-8729" ref_url="https://www.suse.com/security/cve/CVE-2015-8729/" source="CVE"/>
		<reference ref_id="CVE-2015-8730" ref_url="https://www.suse.com/security/cve/CVE-2015-8730/" source="CVE"/>
		<reference ref_id="CVE-2015-8731" ref_url="https://www.suse.com/security/cve/CVE-2015-8731/" source="CVE"/>
		<reference ref_id="CVE-2015-8732" ref_url="https://www.suse.com/security/cve/CVE-2015-8732/" source="CVE"/>
		<reference ref_id="CVE-2015-8733" ref_url="https://www.suse.com/security/cve/CVE-2015-8733/" source="CVE"/>
		<reference ref_id="CVE-2016-2523" ref_url="https://www.suse.com/security/cve/CVE-2016-2523/" source="CVE"/>
		<reference ref_id="CVE-2016-2530" ref_url="https://www.suse.com/security/cve/CVE-2016-2530/" source="CVE"/>
		<reference ref_id="CVE-2016-2531" ref_url="https://www.suse.com/security/cve/CVE-2016-2531/" source="CVE"/>
		<reference ref_id="CVE-2016-2532" ref_url="https://www.suse.com/security/cve/CVE-2016-2532/" source="CVE"/>
		<reference ref_id="CVE-2016-5350" ref_url="https://www.suse.com/security/cve/CVE-2016-5350/" source="CVE"/>
		<reference ref_id="CVE-2016-5351" ref_url="https://www.suse.com/security/cve/CVE-2016-5351/" source="CVE"/>
		<reference ref_id="CVE-2016-5352" ref_url="https://www.suse.com/security/cve/CVE-2016-5352/" source="CVE"/>
		<reference ref_id="CVE-2016-5353" ref_url="https://www.suse.com/security/cve/CVE-2016-5353/" source="CVE"/>
		<reference ref_id="CVE-2016-5354" ref_url="https://www.suse.com/security/cve/CVE-2016-5354/" source="CVE"/>
		<reference ref_id="CVE-2016-5355" ref_url="https://www.suse.com/security/cve/CVE-2016-5355/" source="CVE"/>
		<reference ref_id="CVE-2016-5356" ref_url="https://www.suse.com/security/cve/CVE-2016-5356/" source="CVE"/>
		<reference ref_id="CVE-2016-5357" ref_url="https://www.suse.com/security/cve/CVE-2016-5357/" source="CVE"/>
		<reference ref_id="CVE-2016-5358" ref_url="https://www.suse.com/security/cve/CVE-2016-5358/" source="CVE"/>
		<reference ref_id="CVE-2016-5359" ref_url="https://www.suse.com/security/cve/CVE-2016-5359/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="CVE-2016-6504" ref_url="https://www.suse.com/security/cve/CVE-2016-6504/" source="CVE"/>
		<reference ref_id="CVE-2016-6505" ref_url="https://www.suse.com/security/cve/CVE-2016-6505/" source="CVE"/>
		<reference ref_id="CVE-2016-6506" ref_url="https://www.suse.com/security/cve/CVE-2016-6506/" source="CVE"/>
		<reference ref_id="CVE-2016-6507" ref_url="https://www.suse.com/security/cve/CVE-2016-6507/" source="CVE"/>
		<reference ref_id="CVE-2016-6508" ref_url="https://www.suse.com/security/cve/CVE-2016-6508/" source="CVE"/>
		<reference ref_id="CVE-2016-6509" ref_url="https://www.suse.com/security/cve/CVE-2016-6509/" source="CVE"/>
		<reference ref_id="CVE-2016-6510" ref_url="https://www.suse.com/security/cve/CVE-2016-6510/" source="CVE"/>
		<reference ref_id="CVE-2016-6511" ref_url="https://www.suse.com/security/cve/CVE-2016-6511/" source="CVE"/>
		<reference ref_id="CVE-2016-7175" ref_url="https://www.suse.com/security/cve/CVE-2016-7175/" source="CVE"/>
		<reference ref_id="CVE-2016-7176" ref_url="https://www.suse.com/security/cve/CVE-2016-7176/" source="CVE"/>
		<reference ref_id="CVE-2016-7177" ref_url="https://www.suse.com/security/cve/CVE-2016-7177/" source="CVE"/>
		<reference ref_id="CVE-2016-7178" ref_url="https://www.suse.com/security/cve/CVE-2016-7178/" source="CVE"/>
		<reference ref_id="CVE-2016-7179" ref_url="https://www.suse.com/security/cve/CVE-2016-7179/" source="CVE"/>
		<reference ref_id="CVE-2016-7180" ref_url="https://www.suse.com/security/cve/CVE-2016-7180/" source="CVE"/>
		<reference ref_id="CVE-2016-9373" ref_url="https://www.suse.com/security/cve/CVE-2016-9373/" source="CVE"/>
		<reference ref_id="CVE-2016-9374" ref_url="https://www.suse.com/security/cve/CVE-2016-9374/" source="CVE"/>
		<reference ref_id="CVE-2016-9375" ref_url="https://www.suse.com/security/cve/CVE-2016-9375/" source="CVE"/>
		<reference ref_id="CVE-2016-9376" ref_url="https://www.suse.com/security/cve/CVE-2016-9376/" source="CVE"/>
		<reference ref_id="CVE-2017-11406" ref_url="https://www.suse.com/security/cve/CVE-2017-11406/" source="CVE"/>
		<reference ref_id="CVE-2017-11407" ref_url="https://www.suse.com/security/cve/CVE-2017-11407/" source="CVE"/>
		<reference ref_id="CVE-2017-11408" ref_url="https://www.suse.com/security/cve/CVE-2017-11408/" source="CVE"/>
		<reference ref_id="CVE-2017-11410" ref_url="https://www.suse.com/security/cve/CVE-2017-11410/" source="CVE"/>
		<reference ref_id="CVE-2017-11411" ref_url="https://www.suse.com/security/cve/CVE-2017-11411/" source="CVE"/>
		<reference ref_id="CVE-2017-13765" ref_url="https://www.suse.com/security/cve/CVE-2017-13765/" source="CVE"/>
		<reference ref_id="CVE-2017-13766" ref_url="https://www.suse.com/security/cve/CVE-2017-13766/" source="CVE"/>
		<reference ref_id="CVE-2017-13767" ref_url="https://www.suse.com/security/cve/CVE-2017-13767/" source="CVE"/>
		<reference ref_id="CVE-2017-15191" ref_url="https://www.suse.com/security/cve/CVE-2017-15191/" source="CVE"/>
		<reference ref_id="CVE-2017-15192" ref_url="https://www.suse.com/security/cve/CVE-2017-15192/" source="CVE"/>
		<reference ref_id="CVE-2017-15193" ref_url="https://www.suse.com/security/cve/CVE-2017-15193/" source="CVE"/>
		<reference ref_id="CVE-2017-17083" ref_url="https://www.suse.com/security/cve/CVE-2017-17083/" source="CVE"/>
		<reference ref_id="CVE-2017-17084" ref_url="https://www.suse.com/security/cve/CVE-2017-17084/" source="CVE"/>
		<reference ref_id="CVE-2017-17085" ref_url="https://www.suse.com/security/cve/CVE-2017-17085/" source="CVE"/>
		<reference ref_id="CVE-2017-17935" ref_url="https://www.suse.com/security/cve/CVE-2017-17935/" source="CVE"/>
		<reference ref_id="CVE-2017-17997" ref_url="https://www.suse.com/security/cve/CVE-2017-17997/" source="CVE"/>
		<reference ref_id="CVE-2017-5596" ref_url="https://www.suse.com/security/cve/CVE-2017-5596/" source="CVE"/>
		<reference ref_id="CVE-2017-5597" ref_url="https://www.suse.com/security/cve/CVE-2017-5597/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-6014" ref_url="https://www.suse.com/security/cve/CVE-2017-6014/" source="CVE"/>
		<reference ref_id="CVE-2017-7700" ref_url="https://www.suse.com/security/cve/CVE-2017-7700/" source="CVE"/>
		<reference ref_id="CVE-2017-7701" ref_url="https://www.suse.com/security/cve/CVE-2017-7701/" source="CVE"/>
		<reference ref_id="CVE-2017-7702" ref_url="https://www.suse.com/security/cve/CVE-2017-7702/" source="CVE"/>
		<reference ref_id="CVE-2017-7703" ref_url="https://www.suse.com/security/cve/CVE-2017-7703/" source="CVE"/>
		<reference ref_id="CVE-2017-7704" ref_url="https://www.suse.com/security/cve/CVE-2017-7704/" source="CVE"/>
		<reference ref_id="CVE-2017-7705" ref_url="https://www.suse.com/security/cve/CVE-2017-7705/" source="CVE"/>
		<reference ref_id="CVE-2017-7745" ref_url="https://www.suse.com/security/cve/CVE-2017-7745/" source="CVE"/>
		<reference ref_id="CVE-2017-7746" ref_url="https://www.suse.com/security/cve/CVE-2017-7746/" source="CVE"/>
		<reference ref_id="CVE-2017-7747" ref_url="https://www.suse.com/security/cve/CVE-2017-7747/" source="CVE"/>
		<reference ref_id="CVE-2017-7748" ref_url="https://www.suse.com/security/cve/CVE-2017-7748/" source="CVE"/>
		<reference ref_id="CVE-2017-9343" ref_url="https://www.suse.com/security/cve/CVE-2017-9343/" source="CVE"/>
		<reference ref_id="CVE-2017-9344" ref_url="https://www.suse.com/security/cve/CVE-2017-9344/" source="CVE"/>
		<reference ref_id="CVE-2017-9345" ref_url="https://www.suse.com/security/cve/CVE-2017-9345/" source="CVE"/>
		<reference ref_id="CVE-2017-9346" ref_url="https://www.suse.com/security/cve/CVE-2017-9346/" source="CVE"/>
		<reference ref_id="CVE-2017-9347" ref_url="https://www.suse.com/security/cve/CVE-2017-9347/" source="CVE"/>
		<reference ref_id="CVE-2017-9348" ref_url="https://www.suse.com/security/cve/CVE-2017-9348/" source="CVE"/>
		<reference ref_id="CVE-2017-9349" ref_url="https://www.suse.com/security/cve/CVE-2017-9349/" source="CVE"/>
		<reference ref_id="CVE-2017-9350" ref_url="https://www.suse.com/security/cve/CVE-2017-9350/" source="CVE"/>
		<reference ref_id="CVE-2017-9351" ref_url="https://www.suse.com/security/cve/CVE-2017-9351/" source="CVE"/>
		<reference ref_id="CVE-2017-9352" ref_url="https://www.suse.com/security/cve/CVE-2017-9352/" source="CVE"/>
		<reference ref_id="CVE-2017-9353" ref_url="https://www.suse.com/security/cve/CVE-2017-9353/" source="CVE"/>
		<reference ref_id="CVE-2017-9354" ref_url="https://www.suse.com/security/cve/CVE-2017-9354/" source="CVE"/>
		<reference ref_id="CVE-2017-9617" ref_url="https://www.suse.com/security/cve/CVE-2017-9617/" source="CVE"/>
		<reference ref_id="CVE-2017-9766" ref_url="https://www.suse.com/security/cve/CVE-2017-9766/" source="CVE"/>
		<reference ref_id="CVE-2018-11354" ref_url="https://www.suse.com/security/cve/CVE-2018-11354/" source="CVE"/>
		<reference ref_id="CVE-2018-11355" ref_url="https://www.suse.com/security/cve/CVE-2018-11355/" source="CVE"/>
		<reference ref_id="CVE-2018-11356" ref_url="https://www.suse.com/security/cve/CVE-2018-11356/" source="CVE"/>
		<reference ref_id="CVE-2018-11357" ref_url="https://www.suse.com/security/cve/CVE-2018-11357/" source="CVE"/>
		<reference ref_id="CVE-2018-11358" ref_url="https://www.suse.com/security/cve/CVE-2018-11358/" source="CVE"/>
		<reference ref_id="CVE-2018-11359" ref_url="https://www.suse.com/security/cve/CVE-2018-11359/" source="CVE"/>
		<reference ref_id="CVE-2018-11360" ref_url="https://www.suse.com/security/cve/CVE-2018-11360/" source="CVE"/>
		<reference ref_id="CVE-2018-11361" ref_url="https://www.suse.com/security/cve/CVE-2018-11361/" source="CVE"/>
		<reference ref_id="CVE-2018-11362" ref_url="https://www.suse.com/security/cve/CVE-2018-11362/" source="CVE"/>
		<reference ref_id="CVE-2018-14339" ref_url="https://www.suse.com/security/cve/CVE-2018-14339/" source="CVE"/>
		<reference ref_id="CVE-2018-14340" ref_url="https://www.suse.com/security/cve/CVE-2018-14340/" source="CVE"/>
		<reference ref_id="CVE-2018-14341" ref_url="https://www.suse.com/security/cve/CVE-2018-14341/" source="CVE"/>
		<reference ref_id="CVE-2018-14342" ref_url="https://www.suse.com/security/cve/CVE-2018-14342/" source="CVE"/>
		<reference ref_id="CVE-2018-14343" ref_url="https://www.suse.com/security/cve/CVE-2018-14343/" source="CVE"/>
		<reference ref_id="CVE-2018-14344" ref_url="https://www.suse.com/security/cve/CVE-2018-14344/" source="CVE"/>
		<reference ref_id="CVE-2018-14367" ref_url="https://www.suse.com/security/cve/CVE-2018-14367/" source="CVE"/>
		<reference ref_id="CVE-2018-14368" ref_url="https://www.suse.com/security/cve/CVE-2018-14368/" source="CVE"/>
		<reference ref_id="CVE-2018-14369" ref_url="https://www.suse.com/security/cve/CVE-2018-14369/" source="CVE"/>
		<reference ref_id="CVE-2018-14370" ref_url="https://www.suse.com/security/cve/CVE-2018-14370/" source="CVE"/>
		<reference ref_id="CVE-2018-16056" ref_url="https://www.suse.com/security/cve/CVE-2018-16056/" source="CVE"/>
		<reference ref_id="CVE-2018-16057" ref_url="https://www.suse.com/security/cve/CVE-2018-16057/" source="CVE"/>
		<reference ref_id="CVE-2018-16058" ref_url="https://www.suse.com/security/cve/CVE-2018-16058/" source="CVE"/>
		<reference ref_id="CVE-2018-5334" ref_url="https://www.suse.com/security/cve/CVE-2018-5334/" source="CVE"/>
		<reference ref_id="CVE-2018-5335" ref_url="https://www.suse.com/security/cve/CVE-2018-5335/" source="CVE"/>
		<reference ref_id="CVE-2018-5336" ref_url="https://www.suse.com/security/cve/CVE-2018-5336/" source="CVE"/>
		<reference ref_id="CVE-2018-7320" ref_url="https://www.suse.com/security/cve/CVE-2018-7320/" source="CVE"/>
		<reference ref_id="CVE-2018-7321" ref_url="https://www.suse.com/security/cve/CVE-2018-7321/" source="CVE"/>
		<reference ref_id="CVE-2018-7322" ref_url="https://www.suse.com/security/cve/CVE-2018-7322/" source="CVE"/>
		<reference ref_id="CVE-2018-7323" ref_url="https://www.suse.com/security/cve/CVE-2018-7323/" source="CVE"/>
		<reference ref_id="CVE-2018-7324" ref_url="https://www.suse.com/security/cve/CVE-2018-7324/" source="CVE"/>
		<reference ref_id="CVE-2018-7325" ref_url="https://www.suse.com/security/cve/CVE-2018-7325/" source="CVE"/>
		<reference ref_id="CVE-2018-7326" ref_url="https://www.suse.com/security/cve/CVE-2018-7326/" source="CVE"/>
		<reference ref_id="CVE-2018-7327" ref_url="https://www.suse.com/security/cve/CVE-2018-7327/" source="CVE"/>
		<reference ref_id="CVE-2018-7328" ref_url="https://www.suse.com/security/cve/CVE-2018-7328/" source="CVE"/>
		<reference ref_id="CVE-2018-7329" ref_url="https://www.suse.com/security/cve/CVE-2018-7329/" source="CVE"/>
		<reference ref_id="CVE-2018-7330" ref_url="https://www.suse.com/security/cve/CVE-2018-7330/" source="CVE"/>
		<reference ref_id="CVE-2018-7331" ref_url="https://www.suse.com/security/cve/CVE-2018-7331/" source="CVE"/>
		<reference ref_id="CVE-2018-7332" ref_url="https://www.suse.com/security/cve/CVE-2018-7332/" source="CVE"/>
		<reference ref_id="CVE-2018-7333" ref_url="https://www.suse.com/security/cve/CVE-2018-7333/" source="CVE"/>
		<reference ref_id="CVE-2018-7334" ref_url="https://www.suse.com/security/cve/CVE-2018-7334/" source="CVE"/>
		<reference ref_id="CVE-2018-7335" ref_url="https://www.suse.com/security/cve/CVE-2018-7335/" source="CVE"/>
		<reference ref_id="CVE-2018-7336" ref_url="https://www.suse.com/security/cve/CVE-2018-7336/" source="CVE"/>
		<reference ref_id="CVE-2018-7337" ref_url="https://www.suse.com/security/cve/CVE-2018-7337/" source="CVE"/>
		<reference ref_id="CVE-2018-7417" ref_url="https://www.suse.com/security/cve/CVE-2018-7417/" source="CVE"/>
		<reference ref_id="CVE-2018-7418" ref_url="https://www.suse.com/security/cve/CVE-2018-7418/" source="CVE"/>
		<reference ref_id="CVE-2018-7419" ref_url="https://www.suse.com/security/cve/CVE-2018-7419/" source="CVE"/>
		<reference ref_id="CVE-2018-7420" ref_url="https://www.suse.com/security/cve/CVE-2018-7420/" source="CVE"/>
		<reference ref_id="CVE-2018-7421" ref_url="https://www.suse.com/security/cve/CVE-2018-7421/" source="CVE"/>
		<reference ref_id="CVE-2018-9256" ref_url="https://www.suse.com/security/cve/CVE-2018-9256/" source="CVE"/>
		<reference ref_id="CVE-2018-9259" ref_url="https://www.suse.com/security/cve/CVE-2018-9259/" source="CVE"/>
		<reference ref_id="CVE-2018-9260" ref_url="https://www.suse.com/security/cve/CVE-2018-9260/" source="CVE"/>
		<reference ref_id="CVE-2018-9261" ref_url="https://www.suse.com/security/cve/CVE-2018-9261/" source="CVE"/>
		<reference ref_id="CVE-2018-9262" ref_url="https://www.suse.com/security/cve/CVE-2018-9262/" source="CVE"/>
		<reference ref_id="CVE-2018-9263" ref_url="https://www.suse.com/security/cve/CVE-2018-9263/" source="CVE"/>
		<reference ref_id="CVE-2018-9264" ref_url="https://www.suse.com/security/cve/CVE-2018-9264/" source="CVE"/>
		<reference ref_id="CVE-2018-9265" ref_url="https://www.suse.com/security/cve/CVE-2018-9265/" source="CVE"/>
		<reference ref_id="CVE-2018-9266" ref_url="https://www.suse.com/security/cve/CVE-2018-9266/" source="CVE"/>
		<reference ref_id="CVE-2018-9267" ref_url="https://www.suse.com/security/cve/CVE-2018-9267/" source="CVE"/>
		<reference ref_id="CVE-2018-9268" ref_url="https://www.suse.com/security/cve/CVE-2018-9268/" source="CVE"/>
		<reference ref_id="CVE-2018-9269" ref_url="https://www.suse.com/security/cve/CVE-2018-9269/" source="CVE"/>
		<reference ref_id="CVE-2018-9270" ref_url="https://www.suse.com/security/cve/CVE-2018-9270/" source="CVE"/>
		<reference ref_id="CVE-2018-9271" ref_url="https://www.suse.com/security/cve/CVE-2018-9271/" source="CVE"/>
		<reference ref_id="CVE-2018-9272" ref_url="https://www.suse.com/security/cve/CVE-2018-9272/" source="CVE"/>
		<reference ref_id="CVE-2018-9273" ref_url="https://www.suse.com/security/cve/CVE-2018-9273/" source="CVE"/>
		<reference ref_id="CVE-2018-9274" ref_url="https://www.suse.com/security/cve/CVE-2018-9274/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark9-2.4.9-48.29.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1210/">CVE-2009-1210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1267/">CVE-2009-1267</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1268/">CVE-2009-1268</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1269/">CVE-2009-1269</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3241/">CVE-2009-3241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3242/">CVE-2009-3242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3243/">CVE-2009-3243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1455/">CVE-2010-1455</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2993/">CVE-2010-2993</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3445/">CVE-2010-3445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4300/">CVE-2010-4300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4301/">CVE-2010-4301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4538/">CVE-2010-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0024/">CVE-2011-0024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0538/">CVE-2011-0538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0713/">CVE-2011-0713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1138/">CVE-2011-1138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1139/">CVE-2011-1139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1140/">CVE-2011-1140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1143/">CVE-2011-1143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1590/">CVE-2011-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1591/">CVE-2011-1591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1592/">CVE-2011-1592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1957/">CVE-2011-1957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1958/">CVE-2011-1958</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1959/">CVE-2011-1959</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2174/">CVE-2011-2174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2175/">CVE-2011-2175</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2597/">CVE-2011-2597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2698/">CVE-2011-2698</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3266/">CVE-2011-3266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3360/">CVE-2011-3360</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3483/">CVE-2011-3483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2392/">CVE-2012-2392</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2393/">CVE-2012-2393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2394/">CVE-2012-2394</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3548/">CVE-2012-3548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4048/">CVE-2012-4048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4049/">CVE-2012-4049</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4285/">CVE-2012-4285</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-4286/">CVE-2012-4286</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4287/">CVE-2012-4287</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4288/">CVE-2012-4288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4289/">CVE-2012-4289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4290/">CVE-2012-4290</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4291/">CVE-2012-4291</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4292/">CVE-2012-4292</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4293/">CVE-2012-4293</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4294/">CVE-2012-4294</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4295/">CVE-2012-4295</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4296/">CVE-2012-4296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4297/">CVE-2012-4297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4298/">CVE-2012-4298</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5237/">CVE-2012-5237</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5238/">CVE-2012-5238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5239/">CVE-2012-5239</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5240/">CVE-2012-5240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5592/">CVE-2012-5592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5593/">CVE-2012-5593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5594/">CVE-2012-5594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5595/">CVE-2012-5595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5596/">CVE-2012-5596</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5597/">CVE-2012-5597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5598/">CVE-2012-5598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5599/">CVE-2012-5599</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5600/">CVE-2012-5600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5601/">CVE-2012-5601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5602/">CVE-2012-5602</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1572/">CVE-2013-1572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1573/">CVE-2013-1573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1574/">CVE-2013-1574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1575/">CVE-2013-1575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1576/">CVE-2013-1576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1577/">CVE-2013-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1578/">CVE-2013-1578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1579/">CVE-2013-1579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1580/">CVE-2013-1580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1581/">CVE-2013-1581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1582/">CVE-2013-1582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1583/">CVE-2013-1583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1584/">CVE-2013-1584</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1585/">CVE-2013-1585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1586/">CVE-2013-1586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1587/">CVE-2013-1587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1588/">CVE-2013-1588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1589/">CVE-2013-1589</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1590/">CVE-2013-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2475/">CVE-2013-2475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2476/">CVE-2013-2476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2477/">CVE-2013-2477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2478/">CVE-2013-2478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2479/">CVE-2013-2479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2480/">CVE-2013-2480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2481/">CVE-2013-2481</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2482/">CVE-2013-2482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2483/">CVE-2013-2483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2484/">CVE-2013-2484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2485/">CVE-2013-2485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2486/">CVE-2013-2486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2487/">CVE-2013-2487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2488/">CVE-2013-2488</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3555/">CVE-2013-3555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3556/">CVE-2013-3556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3557/">CVE-2013-3557</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3558/">CVE-2013-3558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3559/">CVE-2013-3559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3560/">CVE-2013-3560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3561/">CVE-2013-3561</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3562/">CVE-2013-3562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4083/">CVE-2013-4083</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4920/">CVE-2013-4920</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4921/">CVE-2013-4921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4922/">CVE-2013-4922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4923/">CVE-2013-4923</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4924/">CVE-2013-4924</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4925/">CVE-2013-4925</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4926/">CVE-2013-4926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4927/">CVE-2013-4927</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4928/">CVE-2013-4928</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4929/">CVE-2013-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4930/">CVE-2013-4930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4931/">CVE-2013-4931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4932/">CVE-2013-4932</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4933/">CVE-2013-4933</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4934/">CVE-2013-4934</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4935/">CVE-2013-4935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4936/">CVE-2013-4936</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5717/">CVE-2013-5717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5718/">CVE-2013-5718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5719/">CVE-2013-5719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5720/">CVE-2013-5720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5721/">CVE-2013-5721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5722/">CVE-2013-5722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6336/">CVE-2013-6336</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6337/">CVE-2013-6337</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6338/">CVE-2013-6338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6339/">CVE-2013-6339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6340/">CVE-2013-6340</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7112/">CVE-2013-7112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7113/">CVE-2013-7113</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7114/">CVE-2013-7114</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2281/">CVE-2014-2281</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2282/">CVE-2014-2282</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2283/">CVE-2014-2283</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2299/">CVE-2014-2299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2907/">CVE-2014-2907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4020/">CVE-2014-4020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5161/">CVE-2014-5161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5162/">CVE-2014-5162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5163/">CVE-2014-5163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5164/">CVE-2014-5164</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5165/">CVE-2014-5165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0559/">CVE-2015-0559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0560/">CVE-2015-0560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0561/">CVE-2015-0561</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0562/">CVE-2015-0562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0563/">CVE-2015-0563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0564/">CVE-2015-0564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2188/">CVE-2015-2188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2189/">CVE-2015-2189</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2191/">CVE-2015-2191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3811/">CVE-2015-3811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3812/">CVE-2015-3812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3813/">CVE-2015-3813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3814/">CVE-2015-3814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7830/">CVE-2015-7830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8711/">CVE-2015-8711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8712/">CVE-2015-8712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8713/">CVE-2015-8713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8714/">CVE-2015-8714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8715/">CVE-2015-8715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8716/">CVE-2015-8716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8717/">CVE-2015-8717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8718/">CVE-2015-8718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8719/">CVE-2015-8719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8720/">CVE-2015-8720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8721/">CVE-2015-8721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8722/">CVE-2015-8722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8723/">CVE-2015-8723</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8724/">CVE-2015-8724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8725/">CVE-2015-8725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8726/">CVE-2015-8726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8727/">CVE-2015-8727</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8728/">CVE-2015-8728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8729/">CVE-2015-8729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8730/">CVE-2015-8730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8731/">CVE-2015-8731</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8732/">CVE-2015-8732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8733/">CVE-2015-8733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2523/">CVE-2016-2523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2530/">CVE-2016-2530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2531/">CVE-2016-2531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2532/">CVE-2016-2532</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5350/">CVE-2016-5350</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5351/">CVE-2016-5351</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5352/">CVE-2016-5352</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5353/">CVE-2016-5353</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5354/">CVE-2016-5354</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5355/">CVE-2016-5355</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5356/">CVE-2016-5356</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5357/">CVE-2016-5357</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5358/">CVE-2016-5358</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5359/">CVE-2016-5359</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6504/">CVE-2016-6504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6505/">CVE-2016-6505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6506/">CVE-2016-6506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6507/">CVE-2016-6507</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6508/">CVE-2016-6508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6509/">CVE-2016-6509</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6510/">CVE-2016-6510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6511/">CVE-2016-6511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7175/">CVE-2016-7175</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7176/">CVE-2016-7176</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7177/">CVE-2016-7177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7178/">CVE-2016-7178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7179/">CVE-2016-7179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7180/">CVE-2016-7180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9373/">CVE-2016-9373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9374/">CVE-2016-9374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9375/">CVE-2016-9375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9376/">CVE-2016-9376</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11406/">CVE-2017-11406</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11407/">CVE-2017-11407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11408/">CVE-2017-11408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11410/">CVE-2017-11410</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11411/">CVE-2017-11411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13765/">CVE-2017-13765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13766/">CVE-2017-13766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13767/">CVE-2017-13767</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15191/">CVE-2017-15191</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15192/">CVE-2017-15192</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15193/">CVE-2017-15193</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17083/">CVE-2017-17083</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17084/">CVE-2017-17084</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17085/">CVE-2017-17085</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17935/">CVE-2017-17935</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17997/">CVE-2017-17997</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5596/">CVE-2017-5596</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5597/">CVE-2017-5597</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6014/">CVE-2017-6014</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7700/">CVE-2017-7700</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7701/">CVE-2017-7701</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7702/">CVE-2017-7702</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7703/">CVE-2017-7703</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7704/">CVE-2017-7704</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7705/">CVE-2017-7705</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7745/">CVE-2017-7745</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7746/">CVE-2017-7746</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7747/">CVE-2017-7747</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7748/">CVE-2017-7748</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9343/">CVE-2017-9343</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9344/">CVE-2017-9344</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9345/">CVE-2017-9345</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9346/">CVE-2017-9346</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9347/">CVE-2017-9347</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9348/">CVE-2017-9348</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9349/">CVE-2017-9349</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9350/">CVE-2017-9350</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9351/">CVE-2017-9351</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9352/">CVE-2017-9352</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9353/">CVE-2017-9353</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9354/">CVE-2017-9354</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9617/">CVE-2017-9617</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9766/">CVE-2017-9766</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11354/">CVE-2018-11354</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11355/">CVE-2018-11355</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11356/">CVE-2018-11356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11357/">CVE-2018-11357</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11358/">CVE-2018-11358</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11359/">CVE-2018-11359</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11360/">CVE-2018-11360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11361/">CVE-2018-11361</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11362/">CVE-2018-11362</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14339/">CVE-2018-14339</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14340/">CVE-2018-14340</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14341/">CVE-2018-14341</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14342/">CVE-2018-14342</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14343/">CVE-2018-14343</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14344/">CVE-2018-14344</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14367/">CVE-2018-14367</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14368/">CVE-2018-14368</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14369/">CVE-2018-14369</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14370/">CVE-2018-14370</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16056/">CVE-2018-16056</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16057/">CVE-2018-16057</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16058/">CVE-2018-16058</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5334/">CVE-2018-5334</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5335/">CVE-2018-5335</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5336/">CVE-2018-5336</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7320/">CVE-2018-7320</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7321/">CVE-2018-7321</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7322/">CVE-2018-7322</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7323/">CVE-2018-7323</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7324/">CVE-2018-7324</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7325/">CVE-2018-7325</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7326/">CVE-2018-7326</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7327/">CVE-2018-7327</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7328/">CVE-2018-7328</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7329/">CVE-2018-7329</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7330/">CVE-2018-7330</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7331/">CVE-2018-7331</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7332/">CVE-2018-7332</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7333/">CVE-2018-7333</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7334/">CVE-2018-7334</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7335/">CVE-2018-7335</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7336/">CVE-2018-7336</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7337/">CVE-2018-7337</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7417/">CVE-2018-7417</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7418/">CVE-2018-7418</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7419/">CVE-2018-7419</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7420/">CVE-2018-7420</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7421/">CVE-2018-7421</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9256/">CVE-2018-9256</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9259/">CVE-2018-9259</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9260/">CVE-2018-9260</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9261/">CVE-2018-9261</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9262/">CVE-2018-9262</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9263/">CVE-2018-9263</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9264/">CVE-2018-9264</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9265/">CVE-2018-9265</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9266/">CVE-2018-9266</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9267/">CVE-2018-9267</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9268/">CVE-2018-9268</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9269/">CVE-2018-9269</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9270/">CVE-2018-9270</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9271/">CVE-2018-9271</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9272/">CVE-2018-9272</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9273/">CVE-2018-9273</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9274/">CVE-2018-9274</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512530" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512531" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512532" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512533" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512534" comment="wireshark-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512535" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77068" version="1" class="patch">
	<metadata>
		<title>libwmf-0_2-7-0.2.8.4-242.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-0848" ref_url="https://www.suse.com/security/cve/CVE-2015-0848/" source="CVE"/>
		<reference ref_id="CVE-2015-4588" ref_url="https://www.suse.com/security/cve/CVE-2015-4588/" source="CVE"/>
		<reference ref_id="CVE-2015-4695" ref_url="https://www.suse.com/security/cve/CVE-2015-4695/" source="CVE"/>
		<reference ref_id="CVE-2015-4696" ref_url="https://www.suse.com/security/cve/CVE-2015-4696/" source="CVE"/>
		<description>
These are all security issues fixed in the libwmf-0_2-7-0.2.8.4-242.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0848/">CVE-2015-0848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4588/">CVE-2015-4588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4695/">CVE-2015-4695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4696/">CVE-2015-4696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114120" comment="libwmf-0_2-7-0.2.8.4-242.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77069" version="1" class="patch">
	<metadata>
		<title>libwpd-0_10-10-0.10.2-2.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-14226" ref_url="https://www.suse.com/security/cve/CVE-2017-14226/" source="CVE"/>
		<description>
These are all security issues fixed in the libwpd-0_10-10-0.10.2-2.4.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14226/">CVE-2017-14226</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009166502" comment="libwpd-0_10-10-0.10.2-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77070" version="1" class="patch">
	<metadata>
		<title>libxcb-dri2-0-1.10-4.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-2064" ref_url="https://www.suse.com/security/cve/CVE-2013-2064/" source="CVE"/>
		<description>
These are all security issues fixed in the libxcb-dri2-0-1.10-4.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2064/">CVE-2013-2064</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512536" comment="libxcb-dri2-0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512537" comment="libxcb-dri2-0-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512538" comment="libxcb-dri3-0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512539" comment="libxcb-dri3-0-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512540" comment="libxcb-glx0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512541" comment="libxcb-glx0-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512542" comment="libxcb-present0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512543" comment="libxcb-present0-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512544" comment="libxcb-randr0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512545" comment="libxcb-render0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512546" comment="libxcb-render0-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512547" comment="libxcb-shape0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512548" comment="libxcb-shm0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512549" comment="libxcb-shm0-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512550" comment="libxcb-sync1-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512551" comment="libxcb-sync1-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512552" comment="libxcb-xf86dri0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512553" comment="libxcb-xfixes0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512554" comment="libxcb-xfixes0-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512555" comment="libxcb-xinerama0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512556" comment="libxcb-xkb1-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512557" comment="libxcb-xkb1-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512558" comment="libxcb-xv0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512559" comment="libxcb1-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512560" comment="libxcb1-32bit-1.10-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77071" version="1" class="patch">
	<metadata>
		<title>libxerces-c-3_1-3.1.1-12.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-1885" ref_url="https://www.suse.com/security/cve/CVE-2009-1885/" source="CVE"/>
		<reference ref_id="CVE-2015-0252" ref_url="https://www.suse.com/security/cve/CVE-2015-0252/" source="CVE"/>
		<reference ref_id="CVE-2016-0729" ref_url="https://www.suse.com/security/cve/CVE-2016-0729/" source="CVE"/>
		<reference ref_id="CVE-2016-2099" ref_url="https://www.suse.com/security/cve/CVE-2016-2099/" source="CVE"/>
		<reference ref_id="CVE-2016-4463" ref_url="https://www.suse.com/security/cve/CVE-2016-4463/" source="CVE"/>
		<description>
These are all security issues fixed in the libxerces-c-3_1-3.1.1-12.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1885/">CVE-2009-1885</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0252/">CVE-2015-0252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0729/">CVE-2016-0729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2099/">CVE-2016-2099</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4463/">CVE-2016-4463</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131022" comment="libxerces-c-3_1-3.1.1-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131023" comment="libxerces-c-3_1-32bit-3.1.1-12.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77072" version="1" class="patch">
	<metadata>
		<title>libxml2-2-2.9.4-46.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-4225" ref_url="https://www.suse.com/security/cve/CVE-2008-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-4226" ref_url="https://www.suse.com/security/cve/CVE-2008-4226/" source="CVE"/>
		<reference ref_id="CVE-2008-4409" ref_url="https://www.suse.com/security/cve/CVE-2008-4409/" source="CVE"/>
		<reference ref_id="CVE-2010-4494" ref_url="https://www.suse.com/security/cve/CVE-2010-4494/" source="CVE"/>
		<reference ref_id="CVE-2011-1944" ref_url="https://www.suse.com/security/cve/CVE-2011-1944/" source="CVE"/>
		<reference ref_id="CVE-2012-5134" ref_url="https://www.suse.com/security/cve/CVE-2012-5134/" source="CVE"/>
		<reference ref_id="CVE-2013-0338" ref_url="https://www.suse.com/security/cve/CVE-2013-0338/" source="CVE"/>
		<reference ref_id="CVE-2013-1969" ref_url="https://www.suse.com/security/cve/CVE-2013-1969/" source="CVE"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2014-3660" ref_url="https://www.suse.com/security/cve/CVE-2014-3660/" source="CVE"/>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-8035" ref_url="https://www.suse.com/security/cve/CVE-2015-8035/" source="CVE"/>
		<reference ref_id="CVE-2015-8241" ref_url="https://www.suse.com/security/cve/CVE-2015-8241/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2015-8317" ref_url="https://www.suse.com/security/cve/CVE-2015-8317/" source="CVE"/>
		<reference ref_id="CVE-2015-8710" ref_url="https://www.suse.com/security/cve/CVE-2015-8710/" source="CVE"/>
		<reference ref_id="CVE-2016-1762" ref_url="https://www.suse.com/security/cve/CVE-2016-1762/" source="CVE"/>
		<reference ref_id="CVE-2016-1833" ref_url="https://www.suse.com/security/cve/CVE-2016-1833/" source="CVE"/>
		<reference ref_id="CVE-2016-1834" ref_url="https://www.suse.com/security/cve/CVE-2016-1834/" source="CVE"/>
		<reference ref_id="CVE-2016-1835" ref_url="https://www.suse.com/security/cve/CVE-2016-1835/" source="CVE"/>
		<reference ref_id="CVE-2016-1836" ref_url="https://www.suse.com/security/cve/CVE-2016-1836/" source="CVE"/>
		<reference ref_id="CVE-2016-1837" ref_url="https://www.suse.com/security/cve/CVE-2016-1837/" source="CVE"/>
		<reference ref_id="CVE-2016-1838" ref_url="https://www.suse.com/security/cve/CVE-2016-1838/" source="CVE"/>
		<reference ref_id="CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839/" source="CVE"/>
		<reference ref_id="CVE-2016-1840" ref_url="https://www.suse.com/security/cve/CVE-2016-1840/" source="CVE"/>
		<reference ref_id="CVE-2016-3627" ref_url="https://www.suse.com/security/cve/CVE-2016-3627/" source="CVE"/>
		<reference ref_id="CVE-2016-3705" ref_url="https://www.suse.com/security/cve/CVE-2016-3705/" source="CVE"/>
		<reference ref_id="CVE-2016-4483" ref_url="https://www.suse.com/security/cve/CVE-2016-4483/" source="CVE"/>
		<reference ref_id="CVE-2016-4658" ref_url="https://www.suse.com/security/cve/CVE-2016-4658/" source="CVE"/>
		<reference ref_id="CVE-2016-5131" ref_url="https://www.suse.com/security/cve/CVE-2016-5131/" source="CVE"/>
		<reference ref_id="CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318/" source="CVE"/>
		<reference ref_id="CVE-2016-9597" ref_url="https://www.suse.com/security/cve/CVE-2016-9597/" source="CVE"/>
		<reference ref_id="CVE-2017-0663" ref_url="https://www.suse.com/security/cve/CVE-2017-0663/" source="CVE"/>
		<reference ref_id="CVE-2017-15412" ref_url="https://www.suse.com/security/cve/CVE-2017-15412/" source="CVE"/>
		<reference ref_id="CVE-2017-18258" ref_url="https://www.suse.com/security/cve/CVE-2017-18258/" source="CVE"/>
		<reference ref_id="CVE-2017-5130" ref_url="https://www.suse.com/security/cve/CVE-2017-5130/" source="CVE"/>
		<reference ref_id="CVE-2017-5969" ref_url="https://www.suse.com/security/cve/CVE-2017-5969/" source="CVE"/>
		<reference ref_id="CVE-2017-7375" ref_url="https://www.suse.com/security/cve/CVE-2017-7375/" source="CVE"/>
		<reference ref_id="CVE-2017-7376" ref_url="https://www.suse.com/security/cve/CVE-2017-7376/" source="CVE"/>
		<reference ref_id="CVE-2017-8872" ref_url="https://www.suse.com/security/cve/CVE-2017-8872/" source="CVE"/>
		<reference ref_id="CVE-2017-9047" ref_url="https://www.suse.com/security/cve/CVE-2017-9047/" source="CVE"/>
		<reference ref_id="CVE-2017-9048" ref_url="https://www.suse.com/security/cve/CVE-2017-9048/" source="CVE"/>
		<reference ref_id="CVE-2017-9049" ref_url="https://www.suse.com/security/cve/CVE-2017-9049/" source="CVE"/>
		<reference ref_id="CVE-2017-9050" ref_url="https://www.suse.com/security/cve/CVE-2017-9050/" source="CVE"/>
		<reference ref_id="CVE-2018-14404" ref_url="https://www.suse.com/security/cve/CVE-2018-14404/" source="CVE"/>
		<reference ref_id="CVE-2018-14567" ref_url="https://www.suse.com/security/cve/CVE-2018-14567/" source="CVE"/>
		<reference ref_id="CVE-2018-9251" ref_url="https://www.suse.com/security/cve/CVE-2018-9251/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2-2.9.4-46.15.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4225/">CVE-2008-4225</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4226/">CVE-2008-4226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4409/">CVE-2008-4409</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4494/">CVE-2010-4494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1944/">CVE-2011-1944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5134/">CVE-2012-5134</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0338/">CVE-2013-0338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1969/">CVE-2013-1969</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3660/">CVE-2014-3660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8035/">CVE-2015-8035</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8241/">CVE-2015-8241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8317/">CVE-2015-8317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8710/">CVE-2015-8710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1762/">CVE-2016-1762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1833/">CVE-2016-1833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1834/">CVE-2016-1834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1835/">CVE-2016-1835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1836/">CVE-2016-1836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1837/">CVE-2016-1837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1838/">CVE-2016-1838</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1840/">CVE-2016-1840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3627/">CVE-2016-3627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3705/">CVE-2016-3705</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4483/">CVE-2016-4483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4658/">CVE-2016-4658</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5131/">CVE-2016-5131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9597/">CVE-2016-9597</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0663/">CVE-2017-0663</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15412/">CVE-2017-15412</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18258/">CVE-2017-18258</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5130/">CVE-2017-5130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5969/">CVE-2017-5969</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7375/">CVE-2017-7375</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7376/">CVE-2017-7376</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8872/">CVE-2017-8872</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9047/">CVE-2017-9047</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9048/">CVE-2017-9048</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9049/">CVE-2017-9049</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9050/">CVE-2017-9050</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14404/">CVE-2018-14404</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14567/">CVE-2018-14567</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9251/">CVE-2018-9251</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512561" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512562" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512563" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77073" version="1" class="patch">
	<metadata>
		<title>libxslt-tools-1.1.28-16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-7995" ref_url="https://www.suse.com/security/cve/CVE-2015-7995/" source="CVE"/>
		<reference ref_id="CVE-2015-9019" ref_url="https://www.suse.com/security/cve/CVE-2015-9019/" source="CVE"/>
		<reference ref_id="CVE-2016-4738" ref_url="https://www.suse.com/security/cve/CVE-2016-4738/" source="CVE"/>
		<reference ref_id="CVE-2017-5029" ref_url="https://www.suse.com/security/cve/CVE-2017-5029/" source="CVE"/>
		<description>
These are all security issues fixed in the libxslt-tools-1.1.28-16.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7995/">CVE-2015-7995</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-9019/">CVE-2015-9019</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4738/">CVE-2016-4738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5029/">CVE-2017-5029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009155536" comment="libxslt-tools-1.1.28-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155537" comment="libxslt1-1.1.28-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155538" comment="libxslt1-32bit-1.1.28-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77074" version="1" class="patch">
	<metadata>
		<title>libyaml-0-2-0.1.6-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-6393" ref_url="https://www.suse.com/security/cve/CVE-2013-6393/" source="CVE"/>
		<reference ref_id="CVE-2014-2525" ref_url="https://www.suse.com/security/cve/CVE-2014-2525/" source="CVE"/>
		<reference ref_id="CVE-2014-9130" ref_url="https://www.suse.com/security/cve/CVE-2014-9130/" source="CVE"/>
		<description>
These are all security issues fixed in the libyaml-0-2-0.1.6-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6393/">CVE-2013-6393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2525/">CVE-2014-2525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9130/">CVE-2014-9130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141036" comment="libyaml-0-2-0.1.6-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77075" version="1" class="patch">
	<metadata>
		<title>libyaml-cpp0_5-0.5.3-3.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-5950" ref_url="https://www.suse.com/security/cve/CVE-2017-5950/" source="CVE"/>
		<description>
These are all security issues fixed in the libyaml-cpp0_5-0.5.3-3.3.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5950/">CVE-2017-5950</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009172757" comment="libyaml-cpp0_5-0.5.3-3.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77076" version="1" class="patch">
	<metadata>
		<title>libykcs11-1-1.5.0-3.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2018-14779" ref_url="https://www.suse.com/security/cve/CVE-2018-14779/" source="CVE"/>
		<reference ref_id="CVE-2018-14780" ref_url="https://www.suse.com/security/cve/CVE-2018-14780/" source="CVE"/>
		<description>
These are all security issues fixed in the libykcs11-1-1.5.0-3.16 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14779/">CVE-2018-14779</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-14780/">CVE-2018-14780</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512564" comment="libykcs11-1-1.5.0-3.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512565" comment="libykpiv1-1.5.0-3.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512566" comment="yubico-piv-tool-1.5.0-3.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77077" version="1" class="patch">
	<metadata>
		<title>libz1-1.2.11-1.27 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<description>
These are all security issues fixed in the libz1-1.2.11-1.27 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512567" comment="libz1-1.2.11-1.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512568" comment="libz1-32bit-1.2.11-1.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512569" comment="zlib-devel-1.2.11-1.27 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77078" version="1" class="patch">
	<metadata>
		<title>libzip2-0.11.1-13.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<reference ref_id="CVE-2012-1162" ref_url="https://www.suse.com/security/cve/CVE-2012-1162/" source="CVE"/>
		<reference ref_id="CVE-2012-1163" ref_url="https://www.suse.com/security/cve/CVE-2012-1163/" source="CVE"/>
		<reference ref_id="CVE-2015-2331" ref_url="https://www.suse.com/security/cve/CVE-2015-2331/" source="CVE"/>
		<reference ref_id="CVE-2017-14107" ref_url="https://www.suse.com/security/cve/CVE-2017-14107/" source="CVE"/>
		<description>
These are all security issues fixed in the libzip2-0.11.1-13.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1162/">CVE-2012-1162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1163/">CVE-2012-1163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2331/">CVE-2015-2331</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14107/">CVE-2017-14107</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009164531" comment="libzip2-0.11.1-13.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77079" version="1" class="patch">
	<metadata>
		<title>libzmq3-4.0.4-14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-7202" ref_url="https://www.suse.com/security/cve/CVE-2014-7202/" source="CVE"/>
		<reference ref_id="CVE-2014-7203" ref_url="https://www.suse.com/security/cve/CVE-2014-7203/" source="CVE"/>
		<reference ref_id="CVE-2014-9721" ref_url="https://www.suse.com/security/cve/CVE-2014-9721/" source="CVE"/>
		<description>
These are all security issues fixed in the libzmq3-4.0.4-14.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7202/">CVE-2014-7202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7203/">CVE-2014-7203</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-9721/">CVE-2014-9721</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159706" comment="libzmq3-4.0.4-14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77080" version="1" class="patch">
	<metadata>
		<title>libzypp-16.19.0-2.36.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-7435" ref_url="https://www.suse.com/security/cve/CVE-2017-7435/" source="CVE"/>
		<reference ref_id="CVE-2017-7436" ref_url="https://www.suse.com/security/cve/CVE-2017-7436/" source="CVE"/>
		<reference ref_id="CVE-2017-9269" ref_url="https://www.suse.com/security/cve/CVE-2017-9269/" source="CVE"/>
		<reference ref_id="CVE-2018-7685" ref_url="https://www.suse.com/security/cve/CVE-2018-7685/" source="CVE"/>
		<description>
These are all security issues fixed in the libzypp-16.19.0-2.36.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7435/">CVE-2017-7435</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7436/">CVE-2017-7436</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2017-9269/">CVE-2017-9269</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7685/">CVE-2018-7685</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512570" comment="libzypp-16.19.0-2.36.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77081" version="1" class="patch">
	<metadata>
		<title>libzzip-0-13-0.13.67-10.14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-5974" ref_url="https://www.suse.com/security/cve/CVE-2017-5974/" source="CVE"/>
		<reference ref_id="CVE-2017-5975" ref_url="https://www.suse.com/security/cve/CVE-2017-5975/" source="CVE"/>
		<reference ref_id="CVE-2017-5976" ref_url="https://www.suse.com/security/cve/CVE-2017-5976/" source="CVE"/>
		<reference ref_id="CVE-2017-5977" ref_url="https://www.suse.com/security/cve/CVE-2017-5977/" source="CVE"/>
		<reference ref_id="CVE-2017-5978" ref_url="https://www.suse.com/security/cve/CVE-2017-5978/" source="CVE"/>
		<reference ref_id="CVE-2017-5979" ref_url="https://www.suse.com/security/cve/CVE-2017-5979/" source="CVE"/>
		<reference ref_id="CVE-2017-5981" ref_url="https://www.suse.com/security/cve/CVE-2017-5981/" source="CVE"/>
		<reference ref_id="CVE-2018-17828" ref_url="https://www.suse.com/security/cve/CVE-2018-17828/" source="CVE"/>
		<reference ref_id="CVE-2018-6381" ref_url="https://www.suse.com/security/cve/CVE-2018-6381/" source="CVE"/>
		<reference ref_id="CVE-2018-6484" ref_url="https://www.suse.com/security/cve/CVE-2018-6484/" source="CVE"/>
		<reference ref_id="CVE-2018-6540" ref_url="https://www.suse.com/security/cve/CVE-2018-6540/" source="CVE"/>
		<reference ref_id="CVE-2018-6542" ref_url="https://www.suse.com/security/cve/CVE-2018-6542/" source="CVE"/>
		<reference ref_id="CVE-2018-7725" ref_url="https://www.suse.com/security/cve/CVE-2018-7725/" source="CVE"/>
		<reference ref_id="CVE-2018-7726" ref_url="https://www.suse.com/security/cve/CVE-2018-7726/" source="CVE"/>
		<description>
These are all security issues fixed in the libzzip-0-13-0.13.67-10.14.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5974/">CVE-2017-5974</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5975/">CVE-2017-5975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5976/">CVE-2017-5976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5977/">CVE-2017-5977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5978/">CVE-2017-5978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5979/">CVE-2017-5979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5981/">CVE-2017-5981</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-17828/">CVE-2018-17828</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6381/">CVE-2018-6381</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6484/">CVE-2018-6484</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6540/">CVE-2018-6540</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6542/">CVE-2018-6542</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7725/">CVE-2018-7725</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7726/">CVE-2018-7726</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512571" comment="libzzip-0-13-0.13.67-10.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77082" version="1" class="patch">
	<metadata>
		<title>logrotate-3.11.0-2.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-1098" ref_url="https://www.suse.com/security/cve/CVE-2011-1098/" source="CVE"/>
		<reference ref_id="CVE-2011-1154" ref_url="https://www.suse.com/security/cve/CVE-2011-1154/" source="CVE"/>
		<reference ref_id="CVE-2011-1155" ref_url="https://www.suse.com/security/cve/CVE-2011-1155/" source="CVE"/>
		<description>
These are all security issues fixed in the logrotate-3.11.0-2.11.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1098/">CVE-2011-1098</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1154/">CVE-2011-1154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1155/">CVE-2011-1155</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512572" comment="logrotate-3.11.0-2.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77083" version="1" class="patch">
	<metadata>
		<title>m4-1.4.16-15.74 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-4029" ref_url="https://www.suse.com/security/cve/CVE-2009-4029/" source="CVE"/>
		<description>
These are all security issues fixed in the m4-1.4.16-15.74 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4029/">CVE-2009-4029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140466" comment="m4-1.4.16-15.74 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77084" version="1" class="patch">
	<metadata>
		<title>mailx-12.5-28.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2004-2771" ref_url="https://www.suse.com/security/cve/CVE-2004-2771/" source="CVE"/>
		<reference ref_id="CVE-2014-7844" ref_url="https://www.suse.com/security/cve/CVE-2014-7844/" source="CVE"/>
		<description>
These are all security issues fixed in the mailx-12.5-28.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2004-2771/">CVE-2004-2771</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-7844/">CVE-2014-7844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141041" comment="mailx-12.5-28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77085" version="1" class="patch">
	<metadata>
		<title>mariadb-10.2.18-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-5970" ref_url="https://www.suse.com/security/cve/CVE-2007-5970/" source="CVE"/>
		<reference ref_id="CVE-2008-7247" ref_url="https://www.suse.com/security/cve/CVE-2008-7247/" source="CVE"/>
		<reference ref_id="CVE-2009-4019" ref_url="https://www.suse.com/security/cve/CVE-2009-4019/" source="CVE"/>
		<reference ref_id="CVE-2009-4028" ref_url="https://www.suse.com/security/cve/CVE-2009-4028/" source="CVE"/>
		<reference ref_id="CVE-2009-4030" ref_url="https://www.suse.com/security/cve/CVE-2009-4030/" source="CVE"/>
		<reference ref_id="CVE-2010-5298" ref_url="https://www.suse.com/security/cve/CVE-2010-5298/" source="CVE"/>
		<reference ref_id="CVE-2012-5615" ref_url="https://www.suse.com/security/cve/CVE-2012-5615/" source="CVE"/>
		<reference ref_id="CVE-2013-1976" ref_url="https://www.suse.com/security/cve/CVE-2013-1976/" source="CVE"/>
		<reference ref_id="CVE-2014-0195" ref_url="https://www.suse.com/security/cve/CVE-2014-0195/" source="CVE"/>
		<reference ref_id="CVE-2014-0198" ref_url="https://www.suse.com/security/cve/CVE-2014-0198/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-2494" ref_url="https://www.suse.com/security/cve/CVE-2014-2494/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-4207" ref_url="https://www.suse.com/security/cve/CVE-2014-4207/" source="CVE"/>
		<reference ref_id="CVE-2014-4258" ref_url="https://www.suse.com/security/cve/CVE-2014-4258/" source="CVE"/>
		<reference ref_id="CVE-2014-4260" ref_url="https://www.suse.com/security/cve/CVE-2014-4260/" source="CVE"/>
		<reference ref_id="CVE-2014-4274" ref_url="https://www.suse.com/security/cve/CVE-2014-4274/" source="CVE"/>
		<reference ref_id="CVE-2014-4287" ref_url="https://www.suse.com/security/cve/CVE-2014-4287/" source="CVE"/>
		<reference ref_id="CVE-2014-6463" ref_url="https://www.suse.com/security/cve/CVE-2014-6463/" source="CVE"/>
		<reference ref_id="CVE-2014-6464" ref_url="https://www.suse.com/security/cve/CVE-2014-6464/" source="CVE"/>
		<reference ref_id="CVE-2014-6469" ref_url="https://www.suse.com/security/cve/CVE-2014-6469/" source="CVE"/>
		<reference ref_id="CVE-2014-6474" ref_url="https://www.suse.com/security/cve/CVE-2014-6474/" source="CVE"/>
		<reference ref_id="CVE-2014-6478" ref_url="https://www.suse.com/security/cve/CVE-2014-6478/" source="CVE"/>
		<reference ref_id="CVE-2014-6484" ref_url="https://www.suse.com/security/cve/CVE-2014-6484/" source="CVE"/>
		<reference ref_id="CVE-2014-6489" ref_url="https://www.suse.com/security/cve/CVE-2014-6489/" source="CVE"/>
		<reference ref_id="CVE-2014-6491" ref_url="https://www.suse.com/security/cve/CVE-2014-6491/" source="CVE"/>
		<reference ref_id="CVE-2014-6494" ref_url="https://www.suse.com/security/cve/CVE-2014-6494/" source="CVE"/>
		<reference ref_id="CVE-2014-6495" ref_url="https://www.suse.com/security/cve/CVE-2014-6495/" source="CVE"/>
		<reference ref_id="CVE-2014-6496" ref_url="https://www.suse.com/security/cve/CVE-2014-6496/" source="CVE"/>
		<reference ref_id="CVE-2014-6500" ref_url="https://www.suse.com/security/cve/CVE-2014-6500/" source="CVE"/>
		<reference ref_id="CVE-2014-6505" ref_url="https://www.suse.com/security/cve/CVE-2014-6505/" source="CVE"/>
		<reference ref_id="CVE-2014-6507" ref_url="https://www.suse.com/security/cve/CVE-2014-6507/" source="CVE"/>
		<reference ref_id="CVE-2014-6520" ref_url="https://www.suse.com/security/cve/CVE-2014-6520/" source="CVE"/>
		<reference ref_id="CVE-2014-6530" ref_url="https://www.suse.com/security/cve/CVE-2014-6530/" source="CVE"/>
		<reference ref_id="CVE-2014-6551" ref_url="https://www.suse.com/security/cve/CVE-2014-6551/" source="CVE"/>
		<reference ref_id="CVE-2014-6555" ref_url="https://www.suse.com/security/cve/CVE-2014-6555/" source="CVE"/>
		<reference ref_id="CVE-2014-6559" ref_url="https://www.suse.com/security/cve/CVE-2014-6559/" source="CVE"/>
		<reference ref_id="CVE-2014-6564" ref_url="https://www.suse.com/security/cve/CVE-2014-6564/" source="CVE"/>
		<reference ref_id="CVE-2014-6568" ref_url="https://www.suse.com/security/cve/CVE-2014-6568/" source="CVE"/>
		<reference ref_id="CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964/" source="CVE"/>
		<reference ref_id="CVE-2015-0374" ref_url="https://www.suse.com/security/cve/CVE-2015-0374/" source="CVE"/>
		<reference ref_id="CVE-2015-0381" ref_url="https://www.suse.com/security/cve/CVE-2015-0381/" source="CVE"/>
		<reference ref_id="CVE-2015-0382" ref_url="https://www.suse.com/security/cve/CVE-2015-0382/" source="CVE"/>
		<reference ref_id="CVE-2015-0391" ref_url="https://www.suse.com/security/cve/CVE-2015-0391/" source="CVE"/>
		<reference ref_id="CVE-2015-0411" ref_url="https://www.suse.com/security/cve/CVE-2015-0411/" source="CVE"/>
		<reference ref_id="CVE-2015-0432" ref_url="https://www.suse.com/security/cve/CVE-2015-0432/" source="CVE"/>
		<reference ref_id="CVE-2015-0433" ref_url="https://www.suse.com/security/cve/CVE-2015-0433/" source="CVE"/>
		<reference ref_id="CVE-2015-0441" ref_url="https://www.suse.com/security/cve/CVE-2015-0441/" source="CVE"/>
		<reference ref_id="CVE-2015-0499" ref_url="https://www.suse.com/security/cve/CVE-2015-0499/" source="CVE"/>
		<reference ref_id="CVE-2015-0501" ref_url="https://www.suse.com/security/cve/CVE-2015-0501/" source="CVE"/>
		<reference ref_id="CVE-2015-0505" ref_url="https://www.suse.com/security/cve/CVE-2015-0505/" source="CVE"/>
		<reference ref_id="CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325/" source="CVE"/>
		<reference ref_id="CVE-2015-2326" ref_url="https://www.suse.com/security/cve/CVE-2015-2326/" source="CVE"/>
		<reference ref_id="CVE-2015-2568" ref_url="https://www.suse.com/security/cve/CVE-2015-2568/" source="CVE"/>
		<reference ref_id="CVE-2015-2571" ref_url="https://www.suse.com/security/cve/CVE-2015-2571/" source="CVE"/>
		<reference ref_id="CVE-2015-2573" ref_url="https://www.suse.com/security/cve/CVE-2015-2573/" source="CVE"/>
		<reference ref_id="CVE-2015-3152" ref_url="https://www.suse.com/security/cve/CVE-2015-3152/" source="CVE"/>
		<reference ref_id="CVE-2015-4792" ref_url="https://www.suse.com/security/cve/CVE-2015-4792/" source="CVE"/>
		<reference ref_id="CVE-2015-4802" ref_url="https://www.suse.com/security/cve/CVE-2015-4802/" source="CVE"/>
		<reference ref_id="CVE-2015-4807" ref_url="https://www.suse.com/security/cve/CVE-2015-4807/" source="CVE"/>
		<reference ref_id="CVE-2015-4815" ref_url="https://www.suse.com/security/cve/CVE-2015-4815/" source="CVE"/>
		<reference ref_id="CVE-2015-4826" ref_url="https://www.suse.com/security/cve/CVE-2015-4826/" source="CVE"/>
		<reference ref_id="CVE-2015-4830" ref_url="https://www.suse.com/security/cve/CVE-2015-4830/" source="CVE"/>
		<reference ref_id="CVE-2015-4836" ref_url="https://www.suse.com/security/cve/CVE-2015-4836/" source="CVE"/>
		<reference ref_id="CVE-2015-4858" ref_url="https://www.suse.com/security/cve/CVE-2015-4858/" source="CVE"/>
		<reference ref_id="CVE-2015-4861" ref_url="https://www.suse.com/security/cve/CVE-2015-4861/" source="CVE"/>
		<reference ref_id="CVE-2015-4870" ref_url="https://www.suse.com/security/cve/CVE-2015-4870/" source="CVE"/>
		<reference ref_id="CVE-2015-4913" ref_url="https://www.suse.com/security/cve/CVE-2015-4913/" source="CVE"/>
		<reference ref_id="CVE-2015-5969" ref_url="https://www.suse.com/security/cve/CVE-2015-5969/" source="CVE"/>
		<reference ref_id="CVE-2016-0505" ref_url="https://www.suse.com/security/cve/CVE-2016-0505/" source="CVE"/>
		<reference ref_id="CVE-2016-0546" ref_url="https://www.suse.com/security/cve/CVE-2016-0546/" source="CVE"/>
		<reference ref_id="CVE-2016-0596" ref_url="https://www.suse.com/security/cve/CVE-2016-0596/" source="CVE"/>
		<reference ref_id="CVE-2016-0597" ref_url="https://www.suse.com/security/cve/CVE-2016-0597/" source="CVE"/>
		<reference ref_id="CVE-2016-0598" ref_url="https://www.suse.com/security/cve/CVE-2016-0598/" source="CVE"/>
		<reference ref_id="CVE-2016-0600" ref_url="https://www.suse.com/security/cve/CVE-2016-0600/" source="CVE"/>
		<reference ref_id="CVE-2016-0606" ref_url="https://www.suse.com/security/cve/CVE-2016-0606/" source="CVE"/>
		<reference ref_id="CVE-2016-0608" ref_url="https://www.suse.com/security/cve/CVE-2016-0608/" source="CVE"/>
		<reference ref_id="CVE-2016-0609" ref_url="https://www.suse.com/security/cve/CVE-2016-0609/" source="CVE"/>
		<reference ref_id="CVE-2016-0616" ref_url="https://www.suse.com/security/cve/CVE-2016-0616/" source="CVE"/>
		<reference ref_id="CVE-2016-0640" ref_url="https://www.suse.com/security/cve/CVE-2016-0640/" source="CVE"/>
		<reference ref_id="CVE-2016-0641" ref_url="https://www.suse.com/security/cve/CVE-2016-0641/" source="CVE"/>
		<reference ref_id="CVE-2016-0642" ref_url="https://www.suse.com/security/cve/CVE-2016-0642/" source="CVE"/>
		<reference ref_id="CVE-2016-0643" ref_url="https://www.suse.com/security/cve/CVE-2016-0643/" source="CVE"/>
		<reference ref_id="CVE-2016-0644" ref_url="https://www.suse.com/security/cve/CVE-2016-0644/" source="CVE"/>
		<reference ref_id="CVE-2016-0646" ref_url="https://www.suse.com/security/cve/CVE-2016-0646/" source="CVE"/>
		<reference ref_id="CVE-2016-0647" ref_url="https://www.suse.com/security/cve/CVE-2016-0647/" source="CVE"/>
		<reference ref_id="CVE-2016-0648" ref_url="https://www.suse.com/security/cve/CVE-2016-0648/" source="CVE"/>
		<reference ref_id="CVE-2016-0649" ref_url="https://www.suse.com/security/cve/CVE-2016-0649/" source="CVE"/>
		<reference ref_id="CVE-2016-0650" ref_url="https://www.suse.com/security/cve/CVE-2016-0650/" source="CVE"/>
		<reference ref_id="CVE-2016-0651" ref_url="https://www.suse.com/security/cve/CVE-2016-0651/" source="CVE"/>
		<reference ref_id="CVE-2016-0655" ref_url="https://www.suse.com/security/cve/CVE-2016-0655/" source="CVE"/>
		<reference ref_id="CVE-2016-0666" ref_url="https://www.suse.com/security/cve/CVE-2016-0666/" source="CVE"/>
		<reference ref_id="CVE-2016-0668" ref_url="https://www.suse.com/security/cve/CVE-2016-0668/" source="CVE"/>
		<reference ref_id="CVE-2016-2047" ref_url="https://www.suse.com/security/cve/CVE-2016-2047/" source="CVE"/>
		<reference ref_id="CVE-2016-3477" ref_url="https://www.suse.com/security/cve/CVE-2016-3477/" source="CVE"/>
		<reference ref_id="CVE-2016-3492" ref_url="https://www.suse.com/security/cve/CVE-2016-3492/" source="CVE"/>
		<reference ref_id="CVE-2016-3521" ref_url="https://www.suse.com/security/cve/CVE-2016-3521/" source="CVE"/>
		<reference ref_id="CVE-2016-3615" ref_url="https://www.suse.com/security/cve/CVE-2016-3615/" source="CVE"/>
		<reference ref_id="CVE-2016-5440" ref_url="https://www.suse.com/security/cve/CVE-2016-5440/" source="CVE"/>
		<reference ref_id="CVE-2016-5584" ref_url="https://www.suse.com/security/cve/CVE-2016-5584/" source="CVE"/>
		<reference ref_id="CVE-2016-5624" ref_url="https://www.suse.com/security/cve/CVE-2016-5624/" source="CVE"/>
		<reference ref_id="CVE-2016-5626" ref_url="https://www.suse.com/security/cve/CVE-2016-5626/" source="CVE"/>
		<reference ref_id="CVE-2016-5629" ref_url="https://www.suse.com/security/cve/CVE-2016-5629/" source="CVE"/>
		<reference ref_id="CVE-2016-6662" ref_url="https://www.suse.com/security/cve/CVE-2016-6662/" source="CVE"/>
		<reference ref_id="CVE-2016-6663" ref_url="https://www.suse.com/security/cve/CVE-2016-6663/" source="CVE"/>
		<reference ref_id="CVE-2016-6664" ref_url="https://www.suse.com/security/cve/CVE-2016-6664/" source="CVE"/>
		<reference ref_id="CVE-2016-7440" ref_url="https://www.suse.com/security/cve/CVE-2016-7440/" source="CVE"/>
		<reference ref_id="CVE-2016-8283" ref_url="https://www.suse.com/security/cve/CVE-2016-8283/" source="CVE"/>
		<reference ref_id="CVE-2017-10268" ref_url="https://www.suse.com/security/cve/CVE-2017-10268/" source="CVE"/>
		<reference ref_id="CVE-2017-10320" ref_url="https://www.suse.com/security/cve/CVE-2017-10320/" source="CVE"/>
		<reference ref_id="CVE-2017-10365" ref_url="https://www.suse.com/security/cve/CVE-2017-10365/" source="CVE"/>
		<reference ref_id="CVE-2017-10378" ref_url="https://www.suse.com/security/cve/CVE-2017-10378/" source="CVE"/>
		<reference ref_id="CVE-2017-15365" ref_url="https://www.suse.com/security/cve/CVE-2017-15365/" source="CVE"/>
		<reference ref_id="CVE-2017-3238" ref_url="https://www.suse.com/security/cve/CVE-2017-3238/" source="CVE"/>
		<reference ref_id="CVE-2017-3243" ref_url="https://www.suse.com/security/cve/CVE-2017-3243/" source="CVE"/>
		<reference ref_id="CVE-2017-3244" ref_url="https://www.suse.com/security/cve/CVE-2017-3244/" source="CVE"/>
		<reference ref_id="CVE-2017-3257" ref_url="https://www.suse.com/security/cve/CVE-2017-3257/" source="CVE"/>
		<reference ref_id="CVE-2017-3258" ref_url="https://www.suse.com/security/cve/CVE-2017-3258/" source="CVE"/>
		<reference ref_id="CVE-2017-3265" ref_url="https://www.suse.com/security/cve/CVE-2017-3265/" source="CVE"/>
		<reference ref_id="CVE-2017-3291" ref_url="https://www.suse.com/security/cve/CVE-2017-3291/" source="CVE"/>
		<reference ref_id="CVE-2017-3302" ref_url="https://www.suse.com/security/cve/CVE-2017-3302/" source="CVE"/>
		<reference ref_id="CVE-2017-3308" ref_url="https://www.suse.com/security/cve/CVE-2017-3308/" source="CVE"/>
		<reference ref_id="CVE-2017-3309" ref_url="https://www.suse.com/security/cve/CVE-2017-3309/" source="CVE"/>
		<reference ref_id="CVE-2017-3312" ref_url="https://www.suse.com/security/cve/CVE-2017-3312/" source="CVE"/>
		<reference ref_id="CVE-2017-3313" ref_url="https://www.suse.com/security/cve/CVE-2017-3313/" source="CVE"/>
		<reference ref_id="CVE-2017-3317" ref_url="https://www.suse.com/security/cve/CVE-2017-3317/" source="CVE"/>
		<reference ref_id="CVE-2017-3318" ref_url="https://www.suse.com/security/cve/CVE-2017-3318/" source="CVE"/>
		<reference ref_id="CVE-2017-3453" ref_url="https://www.suse.com/security/cve/CVE-2017-3453/" source="CVE"/>
		<reference ref_id="CVE-2017-3456" ref_url="https://www.suse.com/security/cve/CVE-2017-3456/" source="CVE"/>
		<reference ref_id="CVE-2017-3464" ref_url="https://www.suse.com/security/cve/CVE-2017-3464/" source="CVE"/>
		<reference ref_id="CVE-2017-3636" ref_url="https://www.suse.com/security/cve/CVE-2017-3636/" source="CVE"/>
		<reference ref_id="CVE-2017-3641" ref_url="https://www.suse.com/security/cve/CVE-2017-3641/" source="CVE"/>
		<reference ref_id="CVE-2017-3653" ref_url="https://www.suse.com/security/cve/CVE-2017-3653/" source="CVE"/>
		<reference ref_id="CVE-2018-2562" ref_url="https://www.suse.com/security/cve/CVE-2018-2562/" source="CVE"/>
		<reference ref_id="CVE-2018-2612" ref_url="https://www.suse.com/security/cve/CVE-2018-2612/" source="CVE"/>
		<reference ref_id="CVE-2018-2622" ref_url="https://www.suse.com/security/cve/CVE-2018-2622/" source="CVE"/>
		<reference ref_id="CVE-2018-2640" ref_url="https://www.suse.com/security/cve/CVE-2018-2640/" source="CVE"/>
		<reference ref_id="CVE-2018-2665" ref_url="https://www.suse.com/security/cve/CVE-2018-2665/" source="CVE"/>
		<reference ref_id="CVE-2018-2668" ref_url="https://www.suse.com/security/cve/CVE-2018-2668/" source="CVE"/>
		<reference ref_id="CVE-2018-2755" ref_url="https://www.suse.com/security/cve/CVE-2018-2755/" source="CVE"/>
		<reference ref_id="CVE-2018-2759" ref_url="https://www.suse.com/security/cve/CVE-2018-2759/" source="CVE"/>
		<reference ref_id="CVE-2018-2761" ref_url="https://www.suse.com/security/cve/CVE-2018-2761/" source="CVE"/>
		<reference ref_id="CVE-2018-2766" ref_url="https://www.suse.com/security/cve/CVE-2018-2766/" source="CVE"/>
		<reference ref_id="CVE-2018-2767" ref_url="https://www.suse.com/security/cve/CVE-2018-2767/" source="CVE"/>
		<reference ref_id="CVE-2018-2771" ref_url="https://www.suse.com/security/cve/CVE-2018-2771/" source="CVE"/>
		<reference ref_id="CVE-2018-2777" ref_url="https://www.suse.com/security/cve/CVE-2018-2777/" source="CVE"/>
		<reference ref_id="CVE-2018-2781" ref_url="https://www.suse.com/security/cve/CVE-2018-2781/" source="CVE"/>
		<reference ref_id="CVE-2018-2782" ref_url="https://www.suse.com/security/cve/CVE-2018-2782/" source="CVE"/>
		<reference ref_id="CVE-2018-2784" ref_url="https://www.suse.com/security/cve/CVE-2018-2784/" source="CVE"/>
		<reference ref_id="CVE-2018-2786" ref_url="https://www.suse.com/security/cve/CVE-2018-2786/" source="CVE"/>
		<reference ref_id="CVE-2018-2787" ref_url="https://www.suse.com/security/cve/CVE-2018-2787/" source="CVE"/>
		<reference ref_id="CVE-2018-2810" ref_url="https://www.suse.com/security/cve/CVE-2018-2810/" source="CVE"/>
		<reference ref_id="CVE-2018-2813" ref_url="https://www.suse.com/security/cve/CVE-2018-2813/" source="CVE"/>
		<reference ref_id="CVE-2018-2817" ref_url="https://www.suse.com/security/cve/CVE-2018-2817/" source="CVE"/>
		<reference ref_id="CVE-2018-2819" ref_url="https://www.suse.com/security/cve/CVE-2018-2819/" source="CVE"/>
		<reference ref_id="CVE-2018-3058" ref_url="https://www.suse.com/security/cve/CVE-2018-3058/" source="CVE"/>
		<reference ref_id="CVE-2018-3060" ref_url="https://www.suse.com/security/cve/CVE-2018-3060/" source="CVE"/>
		<reference ref_id="CVE-2018-3063" ref_url="https://www.suse.com/security/cve/CVE-2018-3063/" source="CVE"/>
		<reference ref_id="CVE-2018-3064" ref_url="https://www.suse.com/security/cve/CVE-2018-3064/" source="CVE"/>
		<reference ref_id="CVE-2018-3066" ref_url="https://www.suse.com/security/cve/CVE-2018-3066/" source="CVE"/>
		<description>
These are all security issues fixed in the mariadb-10.2.18-1.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5970/">CVE-2007-5970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-7247/">CVE-2008-7247</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4019/">CVE-2009-4019</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4028/">CVE-2009-4028</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4030/">CVE-2009-4030</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5298/">CVE-2010-5298</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5615/">CVE-2012-5615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1976/">CVE-2013-1976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0195/">CVE-2014-0195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0198/">CVE-2014-0198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2494/">CVE-2014-2494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4207/">CVE-2014-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4258/">CVE-2014-4258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4260/">CVE-2014-4260</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4274/">CVE-2014-4274</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4287/">CVE-2014-4287</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6463/">CVE-2014-6463</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6464/">CVE-2014-6464</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6469/">CVE-2014-6469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6474/">CVE-2014-6474</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6478/">CVE-2014-6478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6484/">CVE-2014-6484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6489/">CVE-2014-6489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6491/">CVE-2014-6491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6494/">CVE-2014-6494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6495/">CVE-2014-6495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6496/">CVE-2014-6496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6500/">CVE-2014-6500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6505/">CVE-2014-6505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6507/">CVE-2014-6507</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6520/">CVE-2014-6520</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6530/">CVE-2014-6530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6551/">CVE-2014-6551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6555/">CVE-2014-6555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6559/">CVE-2014-6559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6564/">CVE-2014-6564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6568/">CVE-2014-6568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0374/">CVE-2015-0374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0381/">CVE-2015-0381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0382/">CVE-2015-0382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0391/">CVE-2015-0391</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0411/">CVE-2015-0411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0432/">CVE-2015-0432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0433/">CVE-2015-0433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0441/">CVE-2015-0441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0499/">CVE-2015-0499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0501/">CVE-2015-0501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0505/">CVE-2015-0505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2326/">CVE-2015-2326</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2568/">CVE-2015-2568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2571/">CVE-2015-2571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2573/">CVE-2015-2573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3152/">CVE-2015-3152</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4792/">CVE-2015-4792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4802/">CVE-2015-4802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4807/">CVE-2015-4807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4815/">CVE-2015-4815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4826/">CVE-2015-4826</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4830/">CVE-2015-4830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4836/">CVE-2015-4836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4858/">CVE-2015-4858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4861/">CVE-2015-4861</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4870/">CVE-2015-4870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4913/">CVE-2015-4913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5969/">CVE-2015-5969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0505/">CVE-2016-0505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0546/">CVE-2016-0546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0596/">CVE-2016-0596</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0597/">CVE-2016-0597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0598/">CVE-2016-0598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0600/">CVE-2016-0600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0606/">CVE-2016-0606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0608/">CVE-2016-0608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0609/">CVE-2016-0609</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0616/">CVE-2016-0616</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0640/">CVE-2016-0640</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0641/">CVE-2016-0641</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0642/">CVE-2016-0642</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0643/">CVE-2016-0643</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0644/">CVE-2016-0644</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0646/">CVE-2016-0646</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0647/">CVE-2016-0647</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0648/">CVE-2016-0648</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0649/">CVE-2016-0649</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0650/">CVE-2016-0650</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0651/">CVE-2016-0651</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0655/">CVE-2016-0655</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0666/">CVE-2016-0666</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0668/">CVE-2016-0668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2047/">CVE-2016-2047</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3477/">CVE-2016-3477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3492/">CVE-2016-3492</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3521/">CVE-2016-3521</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3615/">CVE-2016-3615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5440/">CVE-2016-5440</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5584/">CVE-2016-5584</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5624/">CVE-2016-5624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5626/">CVE-2016-5626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5629/">CVE-2016-5629</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6662/">CVE-2016-6662</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6663/">CVE-2016-6663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6664/">CVE-2016-6664</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7440/">CVE-2016-7440</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8283/">CVE-2016-8283</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10268/">CVE-2017-10268</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10320/">CVE-2017-10320</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10365/">CVE-2017-10365</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10378/">CVE-2017-10378</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15365/">CVE-2017-15365</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3238/">CVE-2017-3238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3243/">CVE-2017-3243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3244/">CVE-2017-3244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3257/">CVE-2017-3257</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3258/">CVE-2017-3258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3265/">CVE-2017-3265</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3291/">CVE-2017-3291</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3302/">CVE-2017-3302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3308/">CVE-2017-3308</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3309/">CVE-2017-3309</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3312/">CVE-2017-3312</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3313/">CVE-2017-3313</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3317/">CVE-2017-3317</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3318/">CVE-2017-3318</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3453/">CVE-2017-3453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3456/">CVE-2017-3456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3464/">CVE-2017-3464</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-3636/">CVE-2017-3636</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3641/">CVE-2017-3641</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3653/">CVE-2017-3653</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-2562/">CVE-2018-2562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2612/">CVE-2018-2612</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2622/">CVE-2018-2622</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2640/">CVE-2018-2640</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2665/">CVE-2018-2665</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2668/">CVE-2018-2668</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2755/">CVE-2018-2755</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2759/">CVE-2018-2759</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2761/">CVE-2018-2761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2766/">CVE-2018-2766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2767/">CVE-2018-2767</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2771/">CVE-2018-2771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2777/">CVE-2018-2777</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2781/">CVE-2018-2781</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2782/">CVE-2018-2782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2784/">CVE-2018-2784</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2786/">CVE-2018-2786</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2787/">CVE-2018-2787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2810/">CVE-2018-2810</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2813/">CVE-2018-2813</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2817/">CVE-2018-2817</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2819/">CVE-2018-2819</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3058/">CVE-2018-3058</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3060/">CVE-2018-3060</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3063/">CVE-2018-3063</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-3064/">CVE-2018-3064</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3066/">CVE-2018-3066</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512573" comment="mariadb-10.2.18-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512574" comment="mariadb-client-10.2.18-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512575" comment="mariadb-errormessages-10.2.18-1.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77086" version="1" class="patch">
	<metadata>
		<title>minicom-2.7-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-7467" ref_url="https://www.suse.com/security/cve/CVE-2017-7467/" source="CVE"/>
		<description>
These are all security issues fixed in the minicom-2.7-3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7467/">CVE-2017-7467</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154609" comment="minicom-2.7-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77087" version="1" class="patch">
	<metadata>
		<title>mipv6d-2.0.2.umip.0.4-19.77 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-2522" ref_url="https://www.suse.com/security/cve/CVE-2010-2522/" source="CVE"/>
		<reference ref_id="CVE-2010-2523" ref_url="https://www.suse.com/security/cve/CVE-2010-2523/" source="CVE"/>
		<description>
These are all security issues fixed in the mipv6d-2.0.2.umip.0.4-19.77 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2522/">CVE-2010-2522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2523/">CVE-2010-2523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141042" comment="mipv6d-2.0.2.umip.0.4-19.77 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77088" version="1" class="patch">
	<metadata>
		<title>mozilla-nspr-32bit-4.13.1-18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<description>
These are all security issues fixed in the mozilla-nspr-32bit-4.13.1-18.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009155320" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155321" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77089" version="1" class="patch">
	<metadata>
		<title>mutt-1.10.1-55.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-0467" ref_url="https://www.suse.com/security/cve/CVE-2014-0467/" source="CVE"/>
		<reference ref_id="CVE-2014-9116" ref_url="https://www.suse.com/security/cve/CVE-2014-9116/" source="CVE"/>
		<reference ref_id="CVE-2018-14349" ref_url="https://www.suse.com/security/cve/CVE-2018-14349/" source="CVE"/>
		<reference ref_id="CVE-2018-14350" ref_url="https://www.suse.com/security/cve/CVE-2018-14350/" source="CVE"/>
		<reference ref_id="CVE-2018-14351" ref_url="https://www.suse.com/security/cve/CVE-2018-14351/" source="CVE"/>
		<reference ref_id="CVE-2018-14352" ref_url="https://www.suse.com/security/cve/CVE-2018-14352/" source="CVE"/>
		<reference ref_id="CVE-2018-14353" ref_url="https://www.suse.com/security/cve/CVE-2018-14353/" source="CVE"/>
		<reference ref_id="CVE-2018-14354" ref_url="https://www.suse.com/security/cve/CVE-2018-14354/" source="CVE"/>
		<reference ref_id="CVE-2018-14355" ref_url="https://www.suse.com/security/cve/CVE-2018-14355/" source="CVE"/>
		<reference ref_id="CVE-2018-14356" ref_url="https://www.suse.com/security/cve/CVE-2018-14356/" source="CVE"/>
		<reference ref_id="CVE-2018-14357" ref_url="https://www.suse.com/security/cve/CVE-2018-14357/" source="CVE"/>
		<reference ref_id="CVE-2018-14358" ref_url="https://www.suse.com/security/cve/CVE-2018-14358/" source="CVE"/>
		<reference ref_id="CVE-2018-14359" ref_url="https://www.suse.com/security/cve/CVE-2018-14359/" source="CVE"/>
		<reference ref_id="CVE-2018-14360" ref_url="https://www.suse.com/security/cve/CVE-2018-14360/" source="CVE"/>
		<reference ref_id="CVE-2018-14361" ref_url="https://www.suse.com/security/cve/CVE-2018-14361/" source="CVE"/>
		<reference ref_id="CVE-2018-14362" ref_url="https://www.suse.com/security/cve/CVE-2018-14362/" source="CVE"/>
		<reference ref_id="CVE-2018-14363" ref_url="https://www.suse.com/security/cve/CVE-2018-14363/" source="CVE"/>
		<description>
These are all security issues fixed in the mutt-1.10.1-55.6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0467/">CVE-2014-0467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9116/">CVE-2014-9116</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14349/">CVE-2018-14349</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14350/">CVE-2018-14350</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14351/">CVE-2018-14351</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14352/">CVE-2018-14352</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14353/">CVE-2018-14353</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14354/">CVE-2018-14354</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14355/">CVE-2018-14355</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14356/">CVE-2018-14356</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14357/">CVE-2018-14357</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14358/">CVE-2018-14358</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14359/">CVE-2018-14359</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-14360/">CVE-2018-14360</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-14361/">CVE-2018-14361</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14362/">CVE-2018-14362</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-14363/">CVE-2018-14363</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512576" comment="mutt-1.10.1-55.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77090" version="1" class="patch">
	<metadata>
		<title>ntp-4.2.8p12-64.8.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0159" ref_url="https://www.suse.com/security/cve/CVE-2009-0159/" source="CVE"/>
		<reference ref_id="CVE-2009-1252" ref_url="https://www.suse.com/security/cve/CVE-2009-1252/" source="CVE"/>
		<reference ref_id="CVE-2013-5211" ref_url="https://www.suse.com/security/cve/CVE-2013-5211/" source="CVE"/>
		<reference ref_id="CVE-2014-9293" ref_url="https://www.suse.com/security/cve/CVE-2014-9293/" source="CVE"/>
		<reference ref_id="CVE-2014-9294" ref_url="https://www.suse.com/security/cve/CVE-2014-9294/" source="CVE"/>
		<reference ref_id="CVE-2014-9295" ref_url="https://www.suse.com/security/cve/CVE-2014-9295/" source="CVE"/>
		<reference ref_id="CVE-2014-9296" ref_url="https://www.suse.com/security/cve/CVE-2014-9296/" source="CVE"/>
		<reference ref_id="CVE-2014-9297" ref_url="https://www.suse.com/security/cve/CVE-2014-9297/" source="CVE"/>
		<reference ref_id="CVE-2014-9298" ref_url="https://www.suse.com/security/cve/CVE-2014-9298/" source="CVE"/>
		<reference ref_id="CVE-2015-1798" ref_url="https://www.suse.com/security/cve/CVE-2015-1798/" source="CVE"/>
		<reference ref_id="CVE-2015-1799" ref_url="https://www.suse.com/security/cve/CVE-2015-1799/" source="CVE"/>
		<reference ref_id="CVE-2015-3405" ref_url="https://www.suse.com/security/cve/CVE-2015-3405/" source="CVE"/>
		<reference ref_id="CVE-2015-5219" ref_url="https://www.suse.com/security/cve/CVE-2015-5219/" source="CVE"/>
		<reference ref_id="CVE-2015-5300" ref_url="https://www.suse.com/security/cve/CVE-2015-5300/" source="CVE"/>
		<reference ref_id="CVE-2015-7691" ref_url="https://www.suse.com/security/cve/CVE-2015-7691/" source="CVE"/>
		<reference ref_id="CVE-2015-7692" ref_url="https://www.suse.com/security/cve/CVE-2015-7692/" source="CVE"/>
		<reference ref_id="CVE-2015-7701" ref_url="https://www.suse.com/security/cve/CVE-2015-7701/" source="CVE"/>
		<reference ref_id="CVE-2015-7702" ref_url="https://www.suse.com/security/cve/CVE-2015-7702/" source="CVE"/>
		<reference ref_id="CVE-2015-7703" ref_url="https://www.suse.com/security/cve/CVE-2015-7703/" source="CVE"/>
		<reference ref_id="CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704/" source="CVE"/>
		<reference ref_id="CVE-2015-7705" ref_url="https://www.suse.com/security/cve/CVE-2015-7705/" source="CVE"/>
		<reference ref_id="CVE-2015-7848" ref_url="https://www.suse.com/security/cve/CVE-2015-7848/" source="CVE"/>
		<reference ref_id="CVE-2015-7849" ref_url="https://www.suse.com/security/cve/CVE-2015-7849/" source="CVE"/>
		<reference ref_id="CVE-2015-7850" ref_url="https://www.suse.com/security/cve/CVE-2015-7850/" source="CVE"/>
		<reference ref_id="CVE-2015-7851" ref_url="https://www.suse.com/security/cve/CVE-2015-7851/" source="CVE"/>
		<reference ref_id="CVE-2015-7852" ref_url="https://www.suse.com/security/cve/CVE-2015-7852/" source="CVE"/>
		<reference ref_id="CVE-2015-7853" ref_url="https://www.suse.com/security/cve/CVE-2015-7853/" source="CVE"/>
		<reference ref_id="CVE-2015-7854" ref_url="https://www.suse.com/security/cve/CVE-2015-7854/" source="CVE"/>
		<reference ref_id="CVE-2015-7855" ref_url="https://www.suse.com/security/cve/CVE-2015-7855/" source="CVE"/>
		<reference ref_id="CVE-2015-7871" ref_url="https://www.suse.com/security/cve/CVE-2015-7871/" source="CVE"/>
		<reference ref_id="CVE-2015-7973" ref_url="https://www.suse.com/security/cve/CVE-2015-7973/" source="CVE"/>
		<reference ref_id="CVE-2015-7974" ref_url="https://www.suse.com/security/cve/CVE-2015-7974/" source="CVE"/>
		<reference ref_id="CVE-2015-7975" ref_url="https://www.suse.com/security/cve/CVE-2015-7975/" source="CVE"/>
		<reference ref_id="CVE-2015-7976" ref_url="https://www.suse.com/security/cve/CVE-2015-7976/" source="CVE"/>
		<reference ref_id="CVE-2015-7977" ref_url="https://www.suse.com/security/cve/CVE-2015-7977/" source="CVE"/>
		<reference ref_id="CVE-2015-7978" ref_url="https://www.suse.com/security/cve/CVE-2015-7978/" source="CVE"/>
		<reference ref_id="CVE-2015-7979" ref_url="https://www.suse.com/security/cve/CVE-2015-7979/" source="CVE"/>
		<reference ref_id="CVE-2015-8138" ref_url="https://www.suse.com/security/cve/CVE-2015-8138/" source="CVE"/>
		<reference ref_id="CVE-2015-8139" ref_url="https://www.suse.com/security/cve/CVE-2015-8139/" source="CVE"/>
		<reference ref_id="CVE-2015-8140" ref_url="https://www.suse.com/security/cve/CVE-2015-8140/" source="CVE"/>
		<reference ref_id="CVE-2015-8158" ref_url="https://www.suse.com/security/cve/CVE-2015-8158/" source="CVE"/>
		<reference ref_id="CVE-2016-1547" ref_url="https://www.suse.com/security/cve/CVE-2016-1547/" source="CVE"/>
		<reference ref_id="CVE-2016-1548" ref_url="https://www.suse.com/security/cve/CVE-2016-1548/" source="CVE"/>
		<reference ref_id="CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549/" source="CVE"/>
		<reference ref_id="CVE-2016-1550" ref_url="https://www.suse.com/security/cve/CVE-2016-1550/" source="CVE"/>
		<reference ref_id="CVE-2016-1551" ref_url="https://www.suse.com/security/cve/CVE-2016-1551/" source="CVE"/>
		<reference ref_id="CVE-2016-2516" ref_url="https://www.suse.com/security/cve/CVE-2016-2516/" source="CVE"/>
		<reference ref_id="CVE-2016-2517" ref_url="https://www.suse.com/security/cve/CVE-2016-2517/" source="CVE"/>
		<reference ref_id="CVE-2016-2518" ref_url="https://www.suse.com/security/cve/CVE-2016-2518/" source="CVE"/>
		<reference ref_id="CVE-2016-2519" ref_url="https://www.suse.com/security/cve/CVE-2016-2519/" source="CVE"/>
		<reference ref_id="CVE-2016-4953" ref_url="https://www.suse.com/security/cve/CVE-2016-4953/" source="CVE"/>
		<reference ref_id="CVE-2016-4954" ref_url="https://www.suse.com/security/cve/CVE-2016-4954/" source="CVE"/>
		<reference ref_id="CVE-2016-4955" ref_url="https://www.suse.com/security/cve/CVE-2016-4955/" source="CVE"/>
		<reference ref_id="CVE-2016-4956" ref_url="https://www.suse.com/security/cve/CVE-2016-4956/" source="CVE"/>
		<reference ref_id="CVE-2016-4957" ref_url="https://www.suse.com/security/cve/CVE-2016-4957/" source="CVE"/>
		<reference ref_id="CVE-2016-7426" ref_url="https://www.suse.com/security/cve/CVE-2016-7426/" source="CVE"/>
		<reference ref_id="CVE-2016-7427" ref_url="https://www.suse.com/security/cve/CVE-2016-7427/" source="CVE"/>
		<reference ref_id="CVE-2016-7428" ref_url="https://www.suse.com/security/cve/CVE-2016-7428/" source="CVE"/>
		<reference ref_id="CVE-2016-7429" ref_url="https://www.suse.com/security/cve/CVE-2016-7429/" source="CVE"/>
		<reference ref_id="CVE-2016-7431" ref_url="https://www.suse.com/security/cve/CVE-2016-7431/" source="CVE"/>
		<reference ref_id="CVE-2016-7433" ref_url="https://www.suse.com/security/cve/CVE-2016-7433/" source="CVE"/>
		<reference ref_id="CVE-2016-7434" ref_url="https://www.suse.com/security/cve/CVE-2016-7434/" source="CVE"/>
		<reference ref_id="CVE-2016-9042" ref_url="https://www.suse.com/security/cve/CVE-2016-9042/" source="CVE"/>
		<reference ref_id="CVE-2016-9310" ref_url="https://www.suse.com/security/cve/CVE-2016-9310/" source="CVE"/>
		<reference ref_id="CVE-2016-9311" ref_url="https://www.suse.com/security/cve/CVE-2016-9311/" source="CVE"/>
		<reference ref_id="CVE-2017-6451" ref_url="https://www.suse.com/security/cve/CVE-2017-6451/" source="CVE"/>
		<reference ref_id="CVE-2017-6458" ref_url="https://www.suse.com/security/cve/CVE-2017-6458/" source="CVE"/>
		<reference ref_id="CVE-2017-6460" ref_url="https://www.suse.com/security/cve/CVE-2017-6460/" source="CVE"/>
		<reference ref_id="CVE-2017-6462" ref_url="https://www.suse.com/security/cve/CVE-2017-6462/" source="CVE"/>
		<reference ref_id="CVE-2017-6463" ref_url="https://www.suse.com/security/cve/CVE-2017-6463/" source="CVE"/>
		<reference ref_id="CVE-2017-6464" ref_url="https://www.suse.com/security/cve/CVE-2017-6464/" source="CVE"/>
		<reference ref_id="CVE-2018-12327" ref_url="https://www.suse.com/security/cve/CVE-2018-12327/" source="CVE"/>
		<reference ref_id="CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170/" source="CVE"/>
		<reference ref_id="CVE-2018-7182" ref_url="https://www.suse.com/security/cve/CVE-2018-7182/" source="CVE"/>
		<reference ref_id="CVE-2018-7183" ref_url="https://www.suse.com/security/cve/CVE-2018-7183/" source="CVE"/>
		<reference ref_id="CVE-2018-7184" ref_url="https://www.suse.com/security/cve/CVE-2018-7184/" source="CVE"/>
		<reference ref_id="CVE-2018-7185" ref_url="https://www.suse.com/security/cve/CVE-2018-7185/" source="CVE"/>
		<description>
These are all security issues fixed in the ntp-4.2.8p12-64.8.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0159/">CVE-2009-0159</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1252/">CVE-2009-1252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5211/">CVE-2013-5211</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9293/">CVE-2014-9293</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9294/">CVE-2014-9294</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9295/">CVE-2014-9295</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9296/">CVE-2014-9296</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9297/">CVE-2014-9297</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9298/">CVE-2014-9298</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1798/">CVE-2015-1798</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1799/">CVE-2015-1799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3405/">CVE-2015-3405</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5219/">CVE-2015-5219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5300/">CVE-2015-5300</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7691/">CVE-2015-7691</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7692/">CVE-2015-7692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7701/">CVE-2015-7701</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7702/">CVE-2015-7702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7703/">CVE-2015-7703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7705/">CVE-2015-7705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7848/">CVE-2015-7848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7849/">CVE-2015-7849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7850/">CVE-2015-7850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7851/">CVE-2015-7851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7852/">CVE-2015-7852</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7853/">CVE-2015-7853</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7854/">CVE-2015-7854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7855/">CVE-2015-7855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7871/">CVE-2015-7871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7973/">CVE-2015-7973</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7974/">CVE-2015-7974</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7975/">CVE-2015-7975</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7976/">CVE-2015-7976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7977/">CVE-2015-7977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7978/">CVE-2015-7978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7979/">CVE-2015-7979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8138/">CVE-2015-8138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8139/">CVE-2015-8139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8140/">CVE-2015-8140</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8158/">CVE-2015-8158</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1547/">CVE-2016-1547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1548/">CVE-2016-1548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1550/">CVE-2016-1550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1551/">CVE-2016-1551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2516/">CVE-2016-2516</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2517/">CVE-2016-2517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2518/">CVE-2016-2518</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2519/">CVE-2016-2519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4953/">CVE-2016-4953</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4954/">CVE-2016-4954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4955/">CVE-2016-4955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4956/">CVE-2016-4956</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4957/">CVE-2016-4957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7426/">CVE-2016-7426</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7427/">CVE-2016-7427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7428/">CVE-2016-7428</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7429/">CVE-2016-7429</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7431/">CVE-2016-7431</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7433/">CVE-2016-7433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7434/">CVE-2016-7434</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9042/">CVE-2016-9042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9310/">CVE-2016-9310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9311/">CVE-2016-9311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6451/">CVE-2017-6451</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6458/">CVE-2017-6458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6460/">CVE-2017-6460</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6462/">CVE-2017-6462</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6463/">CVE-2017-6463</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6464/">CVE-2017-6464</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12327/">CVE-2018-12327</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7182/">CVE-2018-7182</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-7183/">CVE-2018-7183</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7184/">CVE-2018-7184</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7185/">CVE-2018-7185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512577" comment="ntp-4.2.8p12-64.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512578" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77091" version="1" class="patch">
	<metadata>
		<title>openconnect-7.08-1.27 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-3291" ref_url="https://www.suse.com/security/cve/CVE-2012-3291/" source="CVE"/>
		<reference ref_id="CVE-2012-6128" ref_url="https://www.suse.com/security/cve/CVE-2012-6128/" source="CVE"/>
		<reference ref_id="CVE-2013-7098" ref_url="https://www.suse.com/security/cve/CVE-2013-7098/" source="CVE"/>
		<description>
These are all security issues fixed in the openconnect-7.08-1.27 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3291/">CVE-2012-3291</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6128/">CVE-2012-6128</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7098/">CVE-2013-7098</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512579" comment="openconnect-7.08-1.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512580" comment="openconnect-lang-7.08-1.27 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77092" version="1" class="patch">
	<metadata>
		<title>opensc-0.13.0-1.122 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0368" ref_url="https://www.suse.com/security/cve/CVE-2009-0368/" source="CVE"/>
		<reference ref_id="CVE-2010-4523" ref_url="https://www.suse.com/security/cve/CVE-2010-4523/" source="CVE"/>
		<description>
These are all security issues fixed in the opensc-0.13.0-1.122 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0368/">CVE-2009-0368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4523/">CVE-2010-4523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141044" comment="opensc-0.13.0-1.122 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77093" version="1" class="patch">
	<metadata>
		<title>openslp-2.0.0-18.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-3609" ref_url="https://www.suse.com/security/cve/CVE-2010-3609/" source="CVE"/>
		<reference ref_id="CVE-2016-4912" ref_url="https://www.suse.com/security/cve/CVE-2016-4912/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="CVE-2016-7567" ref_url="https://www.suse.com/security/cve/CVE-2016-7567/" source="CVE"/>
		<reference ref_id="CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833/" source="CVE"/>
		<description>
These are all security issues fixed in the openslp-2.0.0-18.17.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3609/">CVE-2010-3609</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4912/">CVE-2016-4912</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7567/">CVE-2016-7567</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512581" comment="openslp-2.0.0-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512582" comment="openslp-32bit-2.0.0-18.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77094" version="1" class="patch">
	<metadata>
		<title>openssh-7.2p2-74.25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-1483" ref_url="https://www.suse.com/security/cve/CVE-2008-1483/" source="CVE"/>
		<reference ref_id="CVE-2014-2653" ref_url="https://www.suse.com/security/cve/CVE-2014-2653/" source="CVE"/>
		<reference ref_id="CVE-2015-5352" ref_url="https://www.suse.com/security/cve/CVE-2015-5352/" source="CVE"/>
		<reference ref_id="CVE-2015-5600" ref_url="https://www.suse.com/security/cve/CVE-2015-5600/" source="CVE"/>
		<reference ref_id="CVE-2015-6563" ref_url="https://www.suse.com/security/cve/CVE-2015-6563/" source="CVE"/>
		<reference ref_id="CVE-2015-6564" ref_url="https://www.suse.com/security/cve/CVE-2015-6564/" source="CVE"/>
		<reference ref_id="CVE-2015-8325" ref_url="https://www.suse.com/security/cve/CVE-2015-8325/" source="CVE"/>
		<reference ref_id="CVE-2016-0777" ref_url="https://www.suse.com/security/cve/CVE-2016-0777/" source="CVE"/>
		<reference ref_id="CVE-2016-0778" ref_url="https://www.suse.com/security/cve/CVE-2016-0778/" source="CVE"/>
		<reference ref_id="CVE-2016-10009" ref_url="https://www.suse.com/security/cve/CVE-2016-10009/" source="CVE"/>
		<reference ref_id="CVE-2016-10010" ref_url="https://www.suse.com/security/cve/CVE-2016-10010/" source="CVE"/>
		<reference ref_id="CVE-2016-10011" ref_url="https://www.suse.com/security/cve/CVE-2016-10011/" source="CVE"/>
		<reference ref_id="CVE-2016-10012" ref_url="https://www.suse.com/security/cve/CVE-2016-10012/" source="CVE"/>
		<reference ref_id="CVE-2016-10708" ref_url="https://www.suse.com/security/cve/CVE-2016-10708/" source="CVE"/>
		<reference ref_id="CVE-2016-1908" ref_url="https://www.suse.com/security/cve/CVE-2016-1908/" source="CVE"/>
		<reference ref_id="CVE-2016-3115" ref_url="https://www.suse.com/security/cve/CVE-2016-3115/" source="CVE"/>
		<reference ref_id="CVE-2016-6210" ref_url="https://www.suse.com/security/cve/CVE-2016-6210/" source="CVE"/>
		<reference ref_id="CVE-2016-6515" ref_url="https://www.suse.com/security/cve/CVE-2016-6515/" source="CVE"/>
		<reference ref_id="CVE-2016-8858" ref_url="https://www.suse.com/security/cve/CVE-2016-8858/" source="CVE"/>
		<reference ref_id="CVE-2017-15906" ref_url="https://www.suse.com/security/cve/CVE-2017-15906/" source="CVE"/>
		<description>
These are all security issues fixed in the openssh-7.2p2-74.25.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2008-1483/">CVE-2008-1483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2653/">CVE-2014-2653</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5352/">CVE-2015-5352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5600/">CVE-2015-5600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6563/">CVE-2015-6563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6564/">CVE-2015-6564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8325/">CVE-2015-8325</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0777/">CVE-2016-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0778/">CVE-2016-0778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10009/">CVE-2016-10009</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10010/">CVE-2016-10010</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10011/">CVE-2016-10011</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10012/">CVE-2016-10012</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10708/">CVE-2016-10708</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1908/">CVE-2016-1908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3115/">CVE-2016-3115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6210/">CVE-2016-6210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6515/">CVE-2016-6515</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8858/">CVE-2016-8858</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15906/">CVE-2017-15906</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512583" comment="openssh-7.2p2-74.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512584" comment="openssh-helpers-7.2p2-74.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77095" version="1" class="patch">
	<metadata>
		<title>openvpn-2.3.8-16.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-8104" ref_url="https://www.suse.com/security/cve/CVE-2014-8104/" source="CVE"/>
		<reference ref_id="CVE-2016-6329" ref_url="https://www.suse.com/security/cve/CVE-2016-6329/" source="CVE"/>
		<reference ref_id="CVE-2017-12166" ref_url="https://www.suse.com/security/cve/CVE-2017-12166/" source="CVE"/>
		<reference ref_id="CVE-2017-7478" ref_url="https://www.suse.com/security/cve/CVE-2017-7478/" source="CVE"/>
		<reference ref_id="CVE-2017-7479" ref_url="https://www.suse.com/security/cve/CVE-2017-7479/" source="CVE"/>
		<reference ref_id="CVE-2017-7508" ref_url="https://www.suse.com/security/cve/CVE-2017-7508/" source="CVE"/>
		<reference ref_id="CVE-2017-7520" ref_url="https://www.suse.com/security/cve/CVE-2017-7520/" source="CVE"/>
		<reference ref_id="CVE-2017-7521" ref_url="https://www.suse.com/security/cve/CVE-2017-7521/" source="CVE"/>
		<description>
These are all security issues fixed in the openvpn-2.3.8-16.20.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8104/">CVE-2014-8104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6329/">CVE-2016-6329</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12166/">CVE-2017-12166</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7478/">CVE-2017-7478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7479/">CVE-2017-7479</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7508/">CVE-2017-7508</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7520/">CVE-2017-7520</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7521/">CVE-2017-7521</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009165998" comment="openvpn-2.3.8-16.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77096" version="1" class="patch">
	<metadata>
		<title>p7zip-9.20.1-7.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-1038" ref_url="https://www.suse.com/security/cve/CVE-2015-1038/" source="CVE"/>
		<reference ref_id="CVE-2016-1372" ref_url="https://www.suse.com/security/cve/CVE-2016-1372/" source="CVE"/>
		<reference ref_id="CVE-2016-2335" ref_url="https://www.suse.com/security/cve/CVE-2016-2335/" source="CVE"/>
		<reference ref_id="CVE-2017-17969" ref_url="https://www.suse.com/security/cve/CVE-2017-17969/" source="CVE"/>
		<description>
These are all security issues fixed in the p7zip-9.20.1-7.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1038/">CVE-2015-1038</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1372/">CVE-2016-1372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2335/">CVE-2016-2335</cve>
	<cve impact="important" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17969/">CVE-2017-17969</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009171463" comment="p7zip-9.20.1-7.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77097" version="1" class="patch">
	<metadata>
		<title>pam-1.1.8-24.14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-3430" ref_url="https://www.suse.com/security/cve/CVE-2010-3430/" source="CVE"/>
		<reference ref_id="CVE-2010-3431" ref_url="https://www.suse.com/security/cve/CVE-2010-3431/" source="CVE"/>
		<reference ref_id="CVE-2010-3853" ref_url="https://www.suse.com/security/cve/CVE-2010-3853/" source="CVE"/>
		<reference ref_id="CVE-2011-3148" ref_url="https://www.suse.com/security/cve/CVE-2011-3148/" source="CVE"/>
		<reference ref_id="CVE-2011-3149" ref_url="https://www.suse.com/security/cve/CVE-2011-3149/" source="CVE"/>
		<reference ref_id="CVE-2014-2583" ref_url="https://www.suse.com/security/cve/CVE-2014-2583/" source="CVE"/>
		<reference ref_id="CVE-2015-3238" ref_url="https://www.suse.com/security/cve/CVE-2015-3238/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-1.1.8-24.14.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3430/">CVE-2010-3430</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3431/">CVE-2010-3431</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3853/">CVE-2010-3853</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3148/">CVE-2011-3148</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3149/">CVE-2011-3149</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2583/">CVE-2014-2583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3238/">CVE-2015-3238</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512585" comment="pam-1.1.8-24.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512586" comment="pam-32bit-1.1.8-24.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512587" comment="pam-doc-1.1.8-24.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77098" version="1" class="patch">
	<metadata>
		<title>pam-modules-12.1-23.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-3172" ref_url="https://www.suse.com/security/cve/CVE-2011-3172/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-modules-12.1-23.12 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3172/">CVE-2011-3172</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141767" comment="pam-modules-12.1-23.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141060" comment="pam-modules-32bit-12.1-23.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77099" version="1" class="patch">
	<metadata>
		<title>pam_krb5-2.4.4-4.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-3825" ref_url="https://www.suse.com/security/cve/CVE-2008-3825/" source="CVE"/>
		<reference ref_id="CVE-2009-1384" ref_url="https://www.suse.com/security/cve/CVE-2009-1384/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_krb5-2.4.4-4.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3825/">CVE-2008-3825</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1384/">CVE-2009-1384</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141061" comment="pam_krb5-2.4.4-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141062" comment="pam_krb5-32bit-2.4.4-4.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77100" version="1" class="patch">
	<metadata>
		<title>pam_ssh-2.0-1.40 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-1273" ref_url="https://www.suse.com/security/cve/CVE-2009-1273/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_ssh-2.0-1.40 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1273/">CVE-2009-1273</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141063" comment="pam_ssh-2.0-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141064" comment="pam_ssh-32bit-2.0-1.40 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77101" version="1" class="patch">
	<metadata>
		<title>pam_yubico-2.26-1.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2018-9275" ref_url="https://www.suse.com/security/cve/CVE-2018-9275/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_yubico-2.26-1.25 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9275/">CVE-2018-9275</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512588" comment="pam_yubico-2.26-1.25 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77102" version="1" class="patch">
	<metadata>
		<title>patch-2.7.5-8.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-4651" ref_url="https://www.suse.com/security/cve/CVE-2010-4651/" source="CVE"/>
		<reference ref_id="CVE-2015-1196" ref_url="https://www.suse.com/security/cve/CVE-2015-1196/" source="CVE"/>
		<reference ref_id="CVE-2015-1395" ref_url="https://www.suse.com/security/cve/CVE-2015-1395/" source="CVE"/>
		<reference ref_id="CVE-2015-1396" ref_url="https://www.suse.com/security/cve/CVE-2015-1396/" source="CVE"/>
		<reference ref_id="CVE-2016-10713" ref_url="https://www.suse.com/security/cve/CVE-2016-10713/" source="CVE"/>
		<reference ref_id="CVE-2018-1000156" ref_url="https://www.suse.com/security/cve/CVE-2018-1000156/" source="CVE"/>
		<reference ref_id="CVE-2018-6951" ref_url="https://www.suse.com/security/cve/CVE-2018-6951/" source="CVE"/>
		<description>
These are all security issues fixed in the patch-2.7.5-8.5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4651/">CVE-2010-4651</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1196/">CVE-2015-1196</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1395/">CVE-2015-1395</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1396/">CVE-2015-1396</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10713/">CVE-2016-10713</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000156/">CVE-2018-1000156</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6951/">CVE-2018-6951</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009175223" comment="patch-2.7.5-8.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77103" version="1" class="patch">
	<metadata>
		<title>pcsc-ccid-1.4.25-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-4530" ref_url="https://www.suse.com/security/cve/CVE-2010-4530/" source="CVE"/>
		<description>
These are all security issues fixed in the pcsc-ccid-1.4.25-4.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4530/">CVE-2010-4530</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159258" comment="pcsc-ccid-1.4.25-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77104" version="1" class="patch">
	<metadata>
		<title>perl-32bit-5.18.2-12.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-2761" ref_url="https://www.suse.com/security/cve/CVE-2010-2761/" source="CVE"/>
		<reference ref_id="CVE-2010-4410" ref_url="https://www.suse.com/security/cve/CVE-2010-4410/" source="CVE"/>
		<reference ref_id="CVE-2010-4411" ref_url="https://www.suse.com/security/cve/CVE-2010-4411/" source="CVE"/>
		<reference ref_id="CVE-2010-4777" ref_url="https://www.suse.com/security/cve/CVE-2010-4777/" source="CVE"/>
		<reference ref_id="CVE-2015-8853" ref_url="https://www.suse.com/security/cve/CVE-2015-8853/" source="CVE"/>
		<reference ref_id="CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238/" source="CVE"/>
		<reference ref_id="CVE-2016-2381" ref_url="https://www.suse.com/security/cve/CVE-2016-2381/" source="CVE"/>
		<reference ref_id="CVE-2016-6185" ref_url="https://www.suse.com/security/cve/CVE-2016-6185/" source="CVE"/>
		<reference ref_id="CVE-2017-12837" ref_url="https://www.suse.com/security/cve/CVE-2017-12837/" source="CVE"/>
		<reference ref_id="CVE-2017-12883" ref_url="https://www.suse.com/security/cve/CVE-2017-12883/" source="CVE"/>
		<reference ref_id="CVE-2017-6512" ref_url="https://www.suse.com/security/cve/CVE-2017-6512/" source="CVE"/>
		<reference ref_id="CVE-2018-12015" ref_url="https://www.suse.com/security/cve/CVE-2018-12015/" source="CVE"/>
		<reference ref_id="CVE-2018-6797" ref_url="https://www.suse.com/security/cve/CVE-2018-6797/" source="CVE"/>
		<reference ref_id="CVE-2018-6798" ref_url="https://www.suse.com/security/cve/CVE-2018-6798/" source="CVE"/>
		<reference ref_id="CVE-2018-6913" ref_url="https://www.suse.com/security/cve/CVE-2018-6913/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-32bit-5.18.2-12.17.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2761/">CVE-2010-2761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4410/">CVE-2010-4410</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4411/">CVE-2010-4411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4777/">CVE-2010-4777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8853/">CVE-2015-8853</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2381/">CVE-2016-2381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6185/">CVE-2016-6185</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12837/">CVE-2017-12837</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12883/">CVE-2017-12883</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-6512/">CVE-2017-6512</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12015/">CVE-2018-12015</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6797/">CVE-2018-6797</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-6798/">CVE-2018-6798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6913/">CVE-2018-6913</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512589" comment="perl-5.18.2-12.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512590" comment="perl-32bit-5.18.2-12.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512591" comment="perl-base-5.18.2-12.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512592" comment="perl-doc-5.18.2-12.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77105" version="1" class="patch">
	<metadata>
		<title>perl-Archive-Zip-1.34-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2018-10860" ref_url="https://www.suse.com/security/cve/CVE-2018-10860/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Archive-Zip-1.34-3.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-10860/">CVE-2018-10860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512593" comment="perl-Archive-Zip-1.34-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77106" version="1" class="patch">
	<metadata>
		<title>perl-Config-IniFiles-2.82-3.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-2451" ref_url="https://www.suse.com/security/cve/CVE-2012-2451/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Config-IniFiles-2.82-3.14 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2451/">CVE-2012-2451</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141066" comment="perl-Config-IniFiles-2.82-3.14 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77107" version="1" class="patch">
	<metadata>
		<title>perl-HTML-Parser-3.71-1.178 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-3627" ref_url="https://www.suse.com/security/cve/CVE-2009-3627/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-HTML-Parser-3.71-1.178 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3627/">CVE-2009-3627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141067" comment="perl-HTML-Parser-3.71-1.178 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77108" version="1" class="patch">
	<metadata>
		<title>perl-LWP-Protocol-https-6.04-5.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3230" ref_url="https://www.suse.com/security/cve/CVE-2014-3230/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-LWP-Protocol-https-6.04-5.4 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3230/">CVE-2014-3230</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141068" comment="perl-LWP-Protocol-https-6.04-5.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77109" version="1" class="patch">
	<metadata>
		<title>perl-Tk-804.031-3.82 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-4484" ref_url="https://www.suse.com/security/cve/CVE-2006-4484/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Tk-804.031-3.82 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4484/">CVE-2006-4484</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141069" comment="perl-Tk-804.031-3.82 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77110" version="1" class="patch">
	<metadata>
		<title>perl-XML-LibXML-2.0019-6.3.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-3451" ref_url="https://www.suse.com/security/cve/CVE-2015-3451/" source="CVE"/>
		<reference ref_id="CVE-2017-10672" ref_url="https://www.suse.com/security/cve/CVE-2017-10672/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-XML-LibXML-2.0019-6.3.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3451/">CVE-2015-3451</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-10672/">CVE-2017-10672</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009169826" comment="perl-XML-LibXML-2.0019-6.3.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77111" version="1" class="patch">
	<metadata>
		<title>perl-YAML-LibYAML-0.38-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-1152" ref_url="https://www.suse.com/security/cve/CVE-2012-1152/" source="CVE"/>
		<reference ref_id="CVE-2013-6393" ref_url="https://www.suse.com/security/cve/CVE-2013-6393/" source="CVE"/>
		<reference ref_id="CVE-2014-2525" ref_url="https://www.suse.com/security/cve/CVE-2014-2525/" source="CVE"/>
		<reference ref_id="CVE-2014-9130" ref_url="https://www.suse.com/security/cve/CVE-2014-9130/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-YAML-LibYAML-0.38-10.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1152/">CVE-2012-1152</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6393/">CVE-2013-6393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2525/">CVE-2014-2525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9130/">CVE-2014-9130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109959" comment="perl-YAML-LibYAML-0.38-10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77112" version="1" class="patch">
	<metadata>
		<title>pidgin-plugin-otr-4.0.2-1.29 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-2369" ref_url="https://www.suse.com/security/cve/CVE-2012-2369/" source="CVE"/>
		<reference ref_id="CVE-2015-8833" ref_url="https://www.suse.com/security/cve/CVE-2015-8833/" source="CVE"/>
		<description>
These are all security issues fixed in the pidgin-plugin-otr-4.0.2-1.29 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2369/">CVE-2012-2369</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8833/">CVE-2015-8833</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159707" comment="pidgin-plugin-otr-4.0.2-1.29 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77113" version="1" class="patch">
	<metadata>
		<title>pigz-2.3-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-1191" ref_url="https://www.suse.com/security/cve/CVE-2015-1191/" source="CVE"/>
		<description>
These are all security issues fixed in the pigz-2.3-5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1191/">CVE-2015-1191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108432" comment="pigz-2.3-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77114" version="1" class="patch">
	<metadata>
		<title>ppp-2.4.7-3.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3158" ref_url="https://www.suse.com/security/cve/CVE-2014-3158/" source="CVE"/>
		<reference ref_id="CVE-2015-3310" ref_url="https://www.suse.com/security/cve/CVE-2015-3310/" source="CVE"/>
		<description>
These are all security issues fixed in the ppp-2.4.7-3.4 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3158/">CVE-2014-3158</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3310/">CVE-2015-3310</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009148440" comment="ppp-2.4.7-3.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77115" version="1" class="patch">
	<metadata>
		<title>procmail-3.22-269.3.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3618" ref_url="https://www.suse.com/security/cve/CVE-2014-3618/" source="CVE"/>
		<reference ref_id="CVE-2017-16844" ref_url="https://www.suse.com/security/cve/CVE-2017-16844/" source="CVE"/>
		<description>
These are all security issues fixed in the procmail-3.22-269.3.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3618/">CVE-2014-3618</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16844/">CVE-2017-16844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009169961" comment="procmail-3.22-269.3.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77116" version="1" class="patch">
	<metadata>
		<title>puppet-3.8.5-15.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-3848" ref_url="https://www.suse.com/security/cve/CVE-2011-3848/" source="CVE"/>
		<reference ref_id="CVE-2011-3872" ref_url="https://www.suse.com/security/cve/CVE-2011-3872/" source="CVE"/>
		<reference ref_id="CVE-2012-3864" ref_url="https://www.suse.com/security/cve/CVE-2012-3864/" source="CVE"/>
		<reference ref_id="CVE-2012-3865" ref_url="https://www.suse.com/security/cve/CVE-2012-3865/" source="CVE"/>
		<reference ref_id="CVE-2012-3866" ref_url="https://www.suse.com/security/cve/CVE-2012-3866/" source="CVE"/>
		<reference ref_id="CVE-2012-3867" ref_url="https://www.suse.com/security/cve/CVE-2012-3867/" source="CVE"/>
		<reference ref_id="CVE-2013-3567" ref_url="https://www.suse.com/security/cve/CVE-2013-3567/" source="CVE"/>
		<reference ref_id="CVE-2013-4761" ref_url="https://www.suse.com/security/cve/CVE-2013-4761/" source="CVE"/>
		<reference ref_id="CVE-2013-4956" ref_url="https://www.suse.com/security/cve/CVE-2013-4956/" source="CVE"/>
		<reference ref_id="CVE-2014-3248" ref_url="https://www.suse.com/security/cve/CVE-2014-3248/" source="CVE"/>
		<reference ref_id="CVE-2014-3253" ref_url="https://www.suse.com/security/cve/CVE-2014-3253/" source="CVE"/>
		<reference ref_id="CVE-2017-10689" ref_url="https://www.suse.com/security/cve/CVE-2017-10689/" source="CVE"/>
		<reference ref_id="CVE-2017-2295" ref_url="https://www.suse.com/security/cve/CVE-2017-2295/" source="CVE"/>
		<description>
These are all security issues fixed in the puppet-3.8.5-15.9.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3848/">CVE-2011-3848</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3872/">CVE-2011-3872</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3864/">CVE-2012-3864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3865/">CVE-2012-3865</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3866/">CVE-2012-3866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3867/">CVE-2012-3867</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3567/">CVE-2013-3567</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4761/">CVE-2013-4761</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4956/">CVE-2013-4956</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3248/">CVE-2014-3248</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3253/">CVE-2014-3253</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10689/">CVE-2017-10689</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2295/">CVE-2017-2295</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009172606" comment="puppet-3.8.5-15.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77117" version="1" class="patch">
	<metadata>
		<title>python-2.7.13-28.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<reference ref_id="CVE-2017-1000158" ref_url="https://www.suse.com/security/cve/CVE-2017-1000158/" source="CVE"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<reference ref_id="CVE-2018-1000030" ref_url="https://www.suse.com/security/cve/CVE-2018-1000030/" source="CVE"/>
		<description>
These are all security issues fixed in the python-2.7.13-28.11.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000158/">CVE-2017-1000158</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000030/">CVE-2018-1000030</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512594" comment="python-2.7.13-28.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512595" comment="python-curses-2.7.13-28.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512596" comment="python-tk-2.7.13-28.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77118" version="1" class="patch">
	<metadata>
		<title>python-cupshelpers-1.5.7-7.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-4405" ref_url="https://www.suse.com/security/cve/CVE-2011-4405/" source="CVE"/>
		<description>
These are all security issues fixed in the python-cupshelpers-1.5.7-7.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4405/">CVE-2011-4405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141076" comment="python-cupshelpers-1.5.7-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141077" comment="system-config-printer-1.5.7-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141078" comment="system-config-printer-common-1.5.7-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141079" comment="system-config-printer-common-lang-1.5.7-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141080" comment="system-config-printer-dbus-service-1.5.7-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141081" comment="udev-configure-printer-1.5.7-7.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77119" version="1" class="patch">
	<metadata>
		<title>python-imaging-1.1.7-21.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-1932" ref_url="https://www.suse.com/security/cve/CVE-2014-1932/" source="CVE"/>
		<description>
These are all security issues fixed in the python-imaging-1.1.7-21.15 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1932/">CVE-2014-1932</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141787" comment="python-imaging-1.1.7-21.15 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77120" version="1" class="patch">
	<metadata>
		<title>python-libxml2-2.9.4-46.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-4225" ref_url="https://www.suse.com/security/cve/CVE-2008-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-4226" ref_url="https://www.suse.com/security/cve/CVE-2008-4226/" source="CVE"/>
		<reference ref_id="CVE-2008-4409" ref_url="https://www.suse.com/security/cve/CVE-2008-4409/" source="CVE"/>
		<reference ref_id="CVE-2012-5134" ref_url="https://www.suse.com/security/cve/CVE-2012-5134/" source="CVE"/>
		<reference ref_id="CVE-2016-1762" ref_url="https://www.suse.com/security/cve/CVE-2016-1762/" source="CVE"/>
		<reference ref_id="CVE-2016-1833" ref_url="https://www.suse.com/security/cve/CVE-2016-1833/" source="CVE"/>
		<reference ref_id="CVE-2016-1834" ref_url="https://www.suse.com/security/cve/CVE-2016-1834/" source="CVE"/>
		<reference ref_id="CVE-2016-1835" ref_url="https://www.suse.com/security/cve/CVE-2016-1835/" source="CVE"/>
		<reference ref_id="CVE-2016-1836" ref_url="https://www.suse.com/security/cve/CVE-2016-1836/" source="CVE"/>
		<reference ref_id="CVE-2016-1837" ref_url="https://www.suse.com/security/cve/CVE-2016-1837/" source="CVE"/>
		<reference ref_id="CVE-2016-1838" ref_url="https://www.suse.com/security/cve/CVE-2016-1838/" source="CVE"/>
		<reference ref_id="CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839/" source="CVE"/>
		<reference ref_id="CVE-2016-1840" ref_url="https://www.suse.com/security/cve/CVE-2016-1840/" source="CVE"/>
		<reference ref_id="CVE-2016-3627" ref_url="https://www.suse.com/security/cve/CVE-2016-3627/" source="CVE"/>
		<reference ref_id="CVE-2016-3705" ref_url="https://www.suse.com/security/cve/CVE-2016-3705/" source="CVE"/>
		<reference ref_id="CVE-2016-4483" ref_url="https://www.suse.com/security/cve/CVE-2016-4483/" source="CVE"/>
		<description>
These are all security issues fixed in the python-libxml2-2.9.4-46.15.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4225/">CVE-2008-4225</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4226/">CVE-2008-4226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4409/">CVE-2008-4409</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5134/">CVE-2012-5134</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1762/">CVE-2016-1762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1833/">CVE-2016-1833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1834/">CVE-2016-1834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1835/">CVE-2016-1835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1836/">CVE-2016-1836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1837/">CVE-2016-1837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1838/">CVE-2016-1838</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1840/">CVE-2016-1840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3627/">CVE-2016-3627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3705/">CVE-2016-3705</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4483/">CVE-2016-4483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512597" comment="python-libxml2-2.9.4-46.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77121" version="1" class="patch">
	<metadata>
		<title>python-pyOpenSSL-16.0.0-4.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-4314" ref_url="https://www.suse.com/security/cve/CVE-2013-4314/" source="CVE"/>
		<description>
These are all security issues fixed in the python-pyOpenSSL-16.0.0-4.6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4314/">CVE-2013-4314</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512598" comment="python-pyOpenSSL-16.0.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512599" comment="python3-pyOpenSSL-16.0.0-4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77122" version="1" class="patch">
	<metadata>
		<title>python-pywbem-0.7.0-4.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-6418" ref_url="https://www.suse.com/security/cve/CVE-2013-6418/" source="CVE"/>
		<description>
These are all security issues fixed in the python-pywbem-0.7.0-4.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6418/">CVE-2013-6418</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141085" comment="python-pywbem-0.7.0-4.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77123" version="1" class="patch">
	<metadata>
		<title>python-requests-2.11.1-6.28.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-1829" ref_url="https://www.suse.com/security/cve/CVE-2014-1829/" source="CVE"/>
		<reference ref_id="CVE-2014-1830" ref_url="https://www.suse.com/security/cve/CVE-2014-1830/" source="CVE"/>
		<reference ref_id="CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296/" source="CVE"/>
		<description>
These are all security issues fixed in the python-requests-2.11.1-6.28.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-1829/">CVE-2014-1829</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-1830/">CVE-2014-1830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512600" comment="python-requests-2.11.1-6.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77124" version="1" class="patch">
	<metadata>
		<title>python3-3.4.6-25.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-3.4.6-25.16.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512601" comment="python3-3.4.6-25.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512602" comment="python3-curses-3.4.6-25.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77125" version="1" class="patch">
	<metadata>
		<title>python3-requests-2.7.0-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-1829" ref_url="https://www.suse.com/security/cve/CVE-2014-1829/" source="CVE"/>
		<reference ref_id="CVE-2014-1830" ref_url="https://www.suse.com/security/cve/CVE-2014-1830/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-requests-2.7.0-2.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-1829/">CVE-2014-1829</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-1830/">CVE-2014-1830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009139059" comment="python3-requests-2.7.0-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77126" version="1" class="patch">
	<metadata>
		<title>qemu-2.11.2-4.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-0928" ref_url="https://www.suse.com/security/cve/CVE-2008-0928/" source="CVE"/>
		<reference ref_id="CVE-2008-1945" ref_url="https://www.suse.com/security/cve/CVE-2008-1945/" source="CVE"/>
		<reference ref_id="CVE-2008-2382" ref_url="https://www.suse.com/security/cve/CVE-2008-2382/" source="CVE"/>
		<reference ref_id="CVE-2008-4539" ref_url="https://www.suse.com/security/cve/CVE-2008-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515/" source="CVE"/>
		<reference ref_id="CVE-2013-4148" ref_url="https://www.suse.com/security/cve/CVE-2013-4148/" source="CVE"/>
		<reference ref_id="CVE-2013-4149" ref_url="https://www.suse.com/security/cve/CVE-2013-4149/" source="CVE"/>
		<reference ref_id="CVE-2013-4150" ref_url="https://www.suse.com/security/cve/CVE-2013-4150/" source="CVE"/>
		<reference ref_id="CVE-2013-4151" ref_url="https://www.suse.com/security/cve/CVE-2013-4151/" source="CVE"/>
		<reference ref_id="CVE-2013-4526" ref_url="https://www.suse.com/security/cve/CVE-2013-4526/" source="CVE"/>
		<reference ref_id="CVE-2013-4527" ref_url="https://www.suse.com/security/cve/CVE-2013-4527/" source="CVE"/>
		<reference ref_id="CVE-2013-4529" ref_url="https://www.suse.com/security/cve/CVE-2013-4529/" source="CVE"/>
		<reference ref_id="CVE-2013-4530" ref_url="https://www.suse.com/security/cve/CVE-2013-4530/" source="CVE"/>
		<reference ref_id="CVE-2013-4531" ref_url="https://www.suse.com/security/cve/CVE-2013-4531/" source="CVE"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4535" ref_url="https://www.suse.com/security/cve/CVE-2013-4535/" source="CVE"/>
		<reference ref_id="CVE-2013-4536" ref_url="https://www.suse.com/security/cve/CVE-2013-4536/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540/" source="CVE"/>
		<reference ref_id="CVE-2013-4541" ref_url="https://www.suse.com/security/cve/CVE-2013-4541/" source="CVE"/>
		<reference ref_id="CVE-2013-4542" ref_url="https://www.suse.com/security/cve/CVE-2013-4542/" source="CVE"/>
		<reference ref_id="CVE-2013-4544" ref_url="https://www.suse.com/security/cve/CVE-2013-4544/" source="CVE"/>
		<reference ref_id="CVE-2013-6399" ref_url="https://www.suse.com/security/cve/CVE-2013-6399/" source="CVE"/>
		<reference ref_id="CVE-2014-0142" ref_url="https://www.suse.com/security/cve/CVE-2014-0142/" source="CVE"/>
		<reference ref_id="CVE-2014-0143" ref_url="https://www.suse.com/security/cve/CVE-2014-0143/" source="CVE"/>
		<reference ref_id="CVE-2014-0144" ref_url="https://www.suse.com/security/cve/CVE-2014-0144/" source="CVE"/>
		<reference ref_id="CVE-2014-0145" ref_url="https://www.suse.com/security/cve/CVE-2014-0145/" source="CVE"/>
		<reference ref_id="CVE-2014-0146" ref_url="https://www.suse.com/security/cve/CVE-2014-0146/" source="CVE"/>
		<reference ref_id="CVE-2014-0147" ref_url="https://www.suse.com/security/cve/CVE-2014-0147/" source="CVE"/>
		<reference ref_id="CVE-2014-0150" ref_url="https://www.suse.com/security/cve/CVE-2014-0150/" source="CVE"/>
		<reference ref_id="CVE-2014-0182" ref_url="https://www.suse.com/security/cve/CVE-2014-0182/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-0223" ref_url="https://www.suse.com/security/cve/CVE-2014-0223/" source="CVE"/>
		<reference ref_id="CVE-2014-3461" ref_url="https://www.suse.com/security/cve/CVE-2014-3461/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-7840" ref_url="https://www.suse.com/security/cve/CVE-2014-7840/" source="CVE"/>
		<reference ref_id="CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5225" ref_url="https://www.suse.com/security/cve/CVE-2015-5225/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-5279" ref_url="https://www.suse.com/security/cve/CVE-2015-5279/" source="CVE"/>
		<reference ref_id="CVE-2015-5745" ref_url="https://www.suse.com/security/cve/CVE-2015-5745/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7295" ref_url="https://www.suse.com/security/cve/CVE-2015-7295/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567/" source="CVE"/>
		<reference ref_id="CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2016-10028" ref_url="https://www.suse.com/security/cve/CVE-2016-10028/" source="CVE"/>
		<reference ref_id="CVE-2016-10155" ref_url="https://www.suse.com/security/cve/CVE-2016-10155/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710/" source="CVE"/>
		<reference ref_id="CVE-2016-3712" ref_url="https://www.suse.com/security/cve/CVE-2016-3712/" source="CVE"/>
		<reference ref_id="CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002/" source="CVE"/>
		<reference ref_id="CVE-2016-4020" ref_url="https://www.suse.com/security/cve/CVE-2016-4020/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-4453" ref_url="https://www.suse.com/security/cve/CVE-2016-4453/" source="CVE"/>
		<reference ref_id="CVE-2016-4454" ref_url="https://www.suse.com/security/cve/CVE-2016-4454/" source="CVE"/>
		<reference ref_id="CVE-2016-4952" ref_url="https://www.suse.com/security/cve/CVE-2016-4952/" source="CVE"/>
		<reference ref_id="CVE-2016-4964" ref_url="https://www.suse.com/security/cve/CVE-2016-4964/" source="CVE"/>
		<reference ref_id="CVE-2016-5105" ref_url="https://www.suse.com/security/cve/CVE-2016-5105/" source="CVE"/>
		<reference ref_id="CVE-2016-5106" ref_url="https://www.suse.com/security/cve/CVE-2016-5106/" source="CVE"/>
		<reference ref_id="CVE-2016-5107" ref_url="https://www.suse.com/security/cve/CVE-2016-5107/" source="CVE"/>
		<reference ref_id="CVE-2016-5126" ref_url="https://www.suse.com/security/cve/CVE-2016-5126/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5337" ref_url="https://www.suse.com/security/cve/CVE-2016-5337/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-5403" ref_url="https://www.suse.com/security/cve/CVE-2016-5403/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="CVE-2016-6490" ref_url="https://www.suse.com/security/cve/CVE-2016-6490/" source="CVE"/>
		<reference ref_id="CVE-2016-6833" ref_url="https://www.suse.com/security/cve/CVE-2016-6833/" source="CVE"/>
		<reference ref_id="CVE-2016-6836" ref_url="https://www.suse.com/security/cve/CVE-2016-6836/" source="CVE"/>
		<reference ref_id="CVE-2016-6888" ref_url="https://www.suse.com/security/cve/CVE-2016-6888/" source="CVE"/>
		<reference ref_id="CVE-2016-7116" ref_url="https://www.suse.com/security/cve/CVE-2016-7116/" source="CVE"/>
		<reference ref_id="CVE-2016-7155" ref_url="https://www.suse.com/security/cve/CVE-2016-7155/" source="CVE"/>
		<reference ref_id="CVE-2016-7156" ref_url="https://www.suse.com/security/cve/CVE-2016-7156/" source="CVE"/>
		<reference ref_id="CVE-2016-7157" ref_url="https://www.suse.com/security/cve/CVE-2016-7157/" source="CVE"/>
		<reference ref_id="CVE-2016-7161" ref_url="https://www.suse.com/security/cve/CVE-2016-7161/" source="CVE"/>
		<reference ref_id="CVE-2016-7170" ref_url="https://www.suse.com/security/cve/CVE-2016-7170/" source="CVE"/>
		<reference ref_id="CVE-2016-7421" ref_url="https://www.suse.com/security/cve/CVE-2016-7421/" source="CVE"/>
		<reference ref_id="CVE-2016-7422" ref_url="https://www.suse.com/security/cve/CVE-2016-7422/" source="CVE"/>
		<reference ref_id="CVE-2016-7423" ref_url="https://www.suse.com/security/cve/CVE-2016-7423/" source="CVE"/>
		<reference ref_id="CVE-2016-7466" ref_url="https://www.suse.com/security/cve/CVE-2016-7466/" source="CVE"/>
		<reference ref_id="CVE-2016-7907" ref_url="https://www.suse.com/security/cve/CVE-2016-7907/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-7994" ref_url="https://www.suse.com/security/cve/CVE-2016-7994/" source="CVE"/>
		<reference ref_id="CVE-2016-7995" ref_url="https://www.suse.com/security/cve/CVE-2016-7995/" source="CVE"/>
		<reference ref_id="CVE-2016-8576" ref_url="https://www.suse.com/security/cve/CVE-2016-8576/" source="CVE"/>
		<reference ref_id="CVE-2016-8577" ref_url="https://www.suse.com/security/cve/CVE-2016-8577/" source="CVE"/>
		<reference ref_id="CVE-2016-8578" ref_url="https://www.suse.com/security/cve/CVE-2016-8578/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8668" ref_url="https://www.suse.com/security/cve/CVE-2016-8668/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8909" ref_url="https://www.suse.com/security/cve/CVE-2016-8909/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9101" ref_url="https://www.suse.com/security/cve/CVE-2016-9101/" source="CVE"/>
		<reference ref_id="CVE-2016-9102" ref_url="https://www.suse.com/security/cve/CVE-2016-9102/" source="CVE"/>
		<reference ref_id="CVE-2016-9103" ref_url="https://www.suse.com/security/cve/CVE-2016-9103/" source="CVE"/>
		<reference ref_id="CVE-2016-9104" ref_url="https://www.suse.com/security/cve/CVE-2016-9104/" source="CVE"/>
		<reference ref_id="CVE-2016-9105" ref_url="https://www.suse.com/security/cve/CVE-2016-9105/" source="CVE"/>
		<reference ref_id="CVE-2016-9106" ref_url="https://www.suse.com/security/cve/CVE-2016-9106/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9602" ref_url="https://www.suse.com/security/cve/CVE-2016-9602/" source="CVE"/>
		<reference ref_id="CVE-2016-9776" ref_url="https://www.suse.com/security/cve/CVE-2016-9776/" source="CVE"/>
		<reference ref_id="CVE-2016-9845" ref_url="https://www.suse.com/security/cve/CVE-2016-9845/" source="CVE"/>
		<reference ref_id="CVE-2016-9846" ref_url="https://www.suse.com/security/cve/CVE-2016-9846/" source="CVE"/>
		<reference ref_id="CVE-2016-9907" ref_url="https://www.suse.com/security/cve/CVE-2016-9907/" source="CVE"/>
		<reference ref_id="CVE-2016-9908" ref_url="https://www.suse.com/security/cve/CVE-2016-9908/" source="CVE"/>
		<reference ref_id="CVE-2016-9911" ref_url="https://www.suse.com/security/cve/CVE-2016-9911/" source="CVE"/>
		<reference ref_id="CVE-2016-9912" ref_url="https://www.suse.com/security/cve/CVE-2016-9912/" source="CVE"/>
		<reference ref_id="CVE-2016-9913" ref_url="https://www.suse.com/security/cve/CVE-2016-9913/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2016-9923" ref_url="https://www.suse.com/security/cve/CVE-2016-9923/" source="CVE"/>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<reference ref_id="CVE-2017-10806" ref_url="https://www.suse.com/security/cve/CVE-2017-10806/" source="CVE"/>
		<reference ref_id="CVE-2017-10911" ref_url="https://www.suse.com/security/cve/CVE-2017-10911/" source="CVE"/>
		<reference ref_id="CVE-2017-11334" ref_url="https://www.suse.com/security/cve/CVE-2017-11334/" source="CVE"/>
		<reference ref_id="CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434/" source="CVE"/>
		<reference ref_id="CVE-2017-12809" ref_url="https://www.suse.com/security/cve/CVE-2017-12809/" source="CVE"/>
		<reference ref_id="CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672/" source="CVE"/>
		<reference ref_id="CVE-2017-13711" ref_url="https://www.suse.com/security/cve/CVE-2017-13711/" source="CVE"/>
		<reference ref_id="CVE-2017-14167" ref_url="https://www.suse.com/security/cve/CVE-2017-14167/" source="CVE"/>
		<reference ref_id="CVE-2017-15038" ref_url="https://www.suse.com/security/cve/CVE-2017-15038/" source="CVE"/>
		<reference ref_id="CVE-2017-15119" ref_url="https://www.suse.com/security/cve/CVE-2017-15119/" source="CVE"/>
		<reference ref_id="CVE-2017-15124" ref_url="https://www.suse.com/security/cve/CVE-2017-15124/" source="CVE"/>
		<reference ref_id="CVE-2017-15268" ref_url="https://www.suse.com/security/cve/CVE-2017-15268/" source="CVE"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<reference ref_id="CVE-2017-16845" ref_url="https://www.suse.com/security/cve/CVE-2017-16845/" source="CVE"/>
		<reference ref_id="CVE-2017-17381" ref_url="https://www.suse.com/security/cve/CVE-2017-17381/" source="CVE"/>
		<reference ref_id="CVE-2017-18043" ref_url="https://www.suse.com/security/cve/CVE-2017-18043/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="CVE-2017-2630" ref_url="https://www.suse.com/security/cve/CVE-2017-2630/" source="CVE"/>
		<reference ref_id="CVE-2017-2633" ref_url="https://www.suse.com/security/cve/CVE-2017-2633/" source="CVE"/>
		<reference ref_id="CVE-2017-5525" ref_url="https://www.suse.com/security/cve/CVE-2017-5525/" source="CVE"/>
		<reference ref_id="CVE-2017-5526" ref_url="https://www.suse.com/security/cve/CVE-2017-5526/" source="CVE"/>
		<reference ref_id="CVE-2017-5552" ref_url="https://www.suse.com/security/cve/CVE-2017-5552/" source="CVE"/>
		<reference ref_id="CVE-2017-5578" ref_url="https://www.suse.com/security/cve/CVE-2017-5578/" source="CVE"/>
		<reference ref_id="CVE-2017-5579" ref_url="https://www.suse.com/security/cve/CVE-2017-5579/" source="CVE"/>
		<reference ref_id="CVE-2017-5667" ref_url="https://www.suse.com/security/cve/CVE-2017-5667/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5856" ref_url="https://www.suse.com/security/cve/CVE-2017-5856/" source="CVE"/>
		<reference ref_id="CVE-2017-5857" ref_url="https://www.suse.com/security/cve/CVE-2017-5857/" source="CVE"/>
		<reference ref_id="CVE-2017-5898" ref_url="https://www.suse.com/security/cve/CVE-2017-5898/" source="CVE"/>
		<reference ref_id="CVE-2017-5931" ref_url="https://www.suse.com/security/cve/CVE-2017-5931/" source="CVE"/>
		<reference ref_id="CVE-2017-5973" ref_url="https://www.suse.com/security/cve/CVE-2017-5973/" source="CVE"/>
		<reference ref_id="CVE-2017-5987" ref_url="https://www.suse.com/security/cve/CVE-2017-5987/" source="CVE"/>
		<reference ref_id="CVE-2017-6058" ref_url="https://www.suse.com/security/cve/CVE-2017-6058/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-7471" ref_url="https://www.suse.com/security/cve/CVE-2017-7471/" source="CVE"/>
		<reference ref_id="CVE-2017-7493" ref_url="https://www.suse.com/security/cve/CVE-2017-7493/" source="CVE"/>
		<reference ref_id="CVE-2017-8112" ref_url="https://www.suse.com/security/cve/CVE-2017-8112/" source="CVE"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-8379" ref_url="https://www.suse.com/security/cve/CVE-2017-8379/" source="CVE"/>
		<reference ref_id="CVE-2017-8380" ref_url="https://www.suse.com/security/cve/CVE-2017-8380/" source="CVE"/>
		<reference ref_id="CVE-2017-9503" ref_url="https://www.suse.com/security/cve/CVE-2017-9503/" source="CVE"/>
		<reference ref_id="CVE-2017-9524" ref_url="https://www.suse.com/security/cve/CVE-2017-9524/" source="CVE"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12617" ref_url="https://www.suse.com/security/cve/CVE-2018-12617/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-5683" ref_url="https://www.suse.com/security/cve/CVE-2018-5683/" source="CVE"/>
		<reference ref_id="CVE-2018-7550" ref_url="https://www.suse.com/security/cve/CVE-2018-7550/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-2.11.2-4.14 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0928/">CVE-2008-0928</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1945/">CVE-2008-1945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2382/">CVE-2008-2382</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4539/">CVE-2008-4539</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4148/">CVE-2013-4148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4149/">CVE-2013-4149</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4150/">CVE-2013-4150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4151/">CVE-2013-4151</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4526/">CVE-2013-4526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4527/">CVE-2013-4527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4529/">CVE-2013-4529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4530/">CVE-2013-4530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4531/">CVE-2013-4531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4535/">CVE-2013-4535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4536/">CVE-2013-4536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4541/">CVE-2013-4541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4542/">CVE-2013-4542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4544/">CVE-2013-4544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6399/">CVE-2013-6399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0142/">CVE-2014-0142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0143/">CVE-2014-0143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0144/">CVE-2014-0144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0145/">CVE-2014-0145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0146/">CVE-2014-0146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0147/">CVE-2014-0147</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0150/">CVE-2014-0150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0182/">CVE-2014-0182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0223/">CVE-2014-0223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3461/">CVE-2014-3461</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7840/">CVE-2014-7840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5225/">CVE-2015-5225</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5279/">CVE-2015-5279</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5745/">CVE-2015-5745</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7295/">CVE-2015-7295</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10028/">CVE-2016-10028</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10155/">CVE-2016-10155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3712/">CVE-2016-3712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4020/">CVE-2016-4020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4453/">CVE-2016-4453</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4454/">CVE-2016-4454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4952/">CVE-2016-4952</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4964/">CVE-2016-4964</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5105/">CVE-2016-5105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5106/">CVE-2016-5106</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5107/">CVE-2016-5107</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5126/">CVE-2016-5126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5337/">CVE-2016-5337</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5403/">CVE-2016-5403</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6490/">CVE-2016-6490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6833/">CVE-2016-6833</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6836/">CVE-2016-6836</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6888/">CVE-2016-6888</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7116/">CVE-2016-7116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7155/">CVE-2016-7155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7156/">CVE-2016-7156</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7157/">CVE-2016-7157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7161/">CVE-2016-7161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7170/">CVE-2016-7170</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7421/">CVE-2016-7421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7422/">CVE-2016-7422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7423/">CVE-2016-7423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7466/">CVE-2016-7466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7907/">CVE-2016-7907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7994/">CVE-2016-7994</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7995/">CVE-2016-7995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8576/">CVE-2016-8576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8577/">CVE-2016-8577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8578/">CVE-2016-8578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8668/">CVE-2016-8668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8909/">CVE-2016-8909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9101/">CVE-2016-9101</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9102/">CVE-2016-9102</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9103/">CVE-2016-9103</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9104/">CVE-2016-9104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9105/">CVE-2016-9105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9106/">CVE-2016-9106</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9602/">CVE-2016-9602</cve>
	<cve impact="moderate" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9776/">CVE-2016-9776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9845/">CVE-2016-9845</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9846/">CVE-2016-9846</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9907/">CVE-2016-9907</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9908/">CVE-2016-9908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9911/">CVE-2016-9911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9912/">CVE-2016-9912</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9913/">CVE-2016-9913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9923/">CVE-2016-9923</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10806/">CVE-2017-10806</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10911/">CVE-2017-10911</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11334/">CVE-2017-11334</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12809/">CVE-2017-12809</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13711/">CVE-2017-13711</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14167/">CVE-2017-14167</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15038/">CVE-2017-15038</cve>
	<cve impact="low" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15119/">CVE-2017-15119</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15124/">CVE-2017-15124</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15268/">CVE-2017-15268</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16845/">CVE-2017-16845</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17381/">CVE-2017-17381</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18043/">CVE-2017-18043</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2630/">CVE-2017-2630</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-2633/">CVE-2017-2633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5525/">CVE-2017-5525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5526/">CVE-2017-5526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5552/">CVE-2017-5552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5578/">CVE-2017-5578</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5579/">CVE-2017-5579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5667/">CVE-2017-5667</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5856/">CVE-2017-5856</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5857/">CVE-2017-5857</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5898/">CVE-2017-5898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5931/">CVE-2017-5931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5973/">CVE-2017-5973</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5987/">CVE-2017-5987</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6058/">CVE-2017-6058</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7471/">CVE-2017-7471</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7493/">CVE-2017-7493</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8112/">CVE-2017-8112</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8379/">CVE-2017-8379</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8380/">CVE-2017-8380</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9503/">CVE-2017-9503</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9524/">CVE-2017-9524</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12617/">CVE-2018-12617</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5683/">CVE-2018-5683</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7550/">CVE-2018-7550</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512603" comment="qemu-2.11.2-4.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512604" comment="qemu-block-curl-2.11.2-4.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512605" comment="qemu-ipxe-1.0.0-4.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512606" comment="qemu-kvm-2.11.2-4.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512607" comment="qemu-seabios-1.11.0-4.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512608" comment="qemu-sgabios-8-4.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512609" comment="qemu-tools-2.11.2-4.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512610" comment="qemu-vgabios-1.11.0-4.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512611" comment="qemu-x86-2.11.2-4.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77127" version="1" class="patch">
	<metadata>
		<title>qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-2.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-2.18 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512612" comment="qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-2.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77128" version="1" class="patch">
	<metadata>
		<title>radvd-1.9.7-2.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-3602" ref_url="https://www.suse.com/security/cve/CVE-2011-3602/" source="CVE"/>
		<description>
These are all security issues fixed in the radvd-1.9.7-2.17 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3602/">CVE-2011-3602</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141103" comment="radvd-1.9.7-2.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77129" version="1" class="patch">
	<metadata>
		<title>rhythmbox-3.4-6.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-3355" ref_url="https://www.suse.com/security/cve/CVE-2012-3355/" source="CVE"/>
		<description>
These are all security issues fixed in the rhythmbox-3.4-6.14 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3355/">CVE-2012-3355</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009142150" comment="rhythmbox-3.4-6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142151" comment="rhythmbox-lang-3.4-6.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77130" version="1" class="patch">
	<metadata>
		<title>rpcbind-0.2.3-23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-7236" ref_url="https://www.suse.com/security/cve/CVE-2015-7236/" source="CVE"/>
		<reference ref_id="CVE-2017-8779" ref_url="https://www.suse.com/security/cve/CVE-2017-8779/" source="CVE"/>
		<description>
These are all security issues fixed in the rpcbind-0.2.3-23.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7236/">CVE-2015-7236</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8779/">CVE-2017-8779</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155620" comment="rpcbind-0.2.3-23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77131" version="1" class="patch">
	<metadata>
		<title>rpm-32bit-4.11.2-16.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-6435" ref_url="https://www.suse.com/security/cve/CVE-2013-6435/" source="CVE"/>
		<reference ref_id="CVE-2014-8118" ref_url="https://www.suse.com/security/cve/CVE-2014-8118/" source="CVE"/>
		<reference ref_id="CVE-2017-7500" ref_url="https://www.suse.com/security/cve/CVE-2017-7500/" source="CVE"/>
		<reference ref_id="CVE-2017-7501" ref_url="https://www.suse.com/security/cve/CVE-2017-7501/" source="CVE"/>
		<description>
These are all security issues fixed in the rpm-32bit-4.11.2-16.16.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6435/">CVE-2013-6435</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8118/">CVE-2014-8118</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7500/">CVE-2017-7500</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7501/">CVE-2017-7501</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512613" comment="rpm-4.11.2-16.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512614" comment="rpm-32bit-4.11.2-16.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512615" comment="rpm-build-4.11.2-16.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77132" version="1" class="patch">
	<metadata>
		<title>rrdtool-1.4.7-20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-2131" ref_url="https://www.suse.com/security/cve/CVE-2013-2131/" source="CVE"/>
		<description>
These are all security issues fixed in the rrdtool-1.4.7-20.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2131/">CVE-2013-2131</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009146857" comment="rrdtool-1.4.7-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009146858" comment="rrdtool-cached-1.4.7-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77133" version="1" class="patch">
	<metadata>
		<title>rsync-3.1.0-13.13.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-1097" ref_url="https://www.suse.com/security/cve/CVE-2011-1097/" source="CVE"/>
		<reference ref_id="CVE-2014-2855" ref_url="https://www.suse.com/security/cve/CVE-2014-2855/" source="CVE"/>
		<reference ref_id="CVE-2014-8242" ref_url="https://www.suse.com/security/cve/CVE-2014-8242/" source="CVE"/>
		<reference ref_id="CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512/" source="CVE"/>
		<reference ref_id="CVE-2017-16548" ref_url="https://www.suse.com/security/cve/CVE-2017-16548/" source="CVE"/>
		<reference ref_id="CVE-2017-17433" ref_url="https://www.suse.com/security/cve/CVE-2017-17433/" source="CVE"/>
		<reference ref_id="CVE-2017-17434" ref_url="https://www.suse.com/security/cve/CVE-2017-17434/" source="CVE"/>
		<reference ref_id="CVE-2018-5764" ref_url="https://www.suse.com/security/cve/CVE-2018-5764/" source="CVE"/>
		<description>
These are all security issues fixed in the rsync-3.1.0-13.13.3 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1097/">CVE-2011-1097</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2855/">CVE-2014-2855</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8242/">CVE-2014-8242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16548/">CVE-2017-16548</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17433/">CVE-2017-17433</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17434/">CVE-2017-17434</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5764/">CVE-2018-5764</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512616" comment="rsync-3.1.0-13.13.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77134" version="1" class="patch">
	<metadata>
		<title>rsyslog-8.24.0-3.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-3200" ref_url="https://www.suse.com/security/cve/CVE-2011-3200/" source="CVE"/>
		<reference ref_id="CVE-2013-4758" ref_url="https://www.suse.com/security/cve/CVE-2013-4758/" source="CVE"/>
		<reference ref_id="CVE-2013-6370" ref_url="https://www.suse.com/security/cve/CVE-2013-6370/" source="CVE"/>
		<reference ref_id="CVE-2013-6371" ref_url="https://www.suse.com/security/cve/CVE-2013-6371/" source="CVE"/>
		<reference ref_id="CVE-2014-3634" ref_url="https://www.suse.com/security/cve/CVE-2014-3634/" source="CVE"/>
		<reference ref_id="CVE-2014-3683" ref_url="https://www.suse.com/security/cve/CVE-2014-3683/" source="CVE"/>
		<reference ref_id="CVE-2015-3243" ref_url="https://www.suse.com/security/cve/CVE-2015-3243/" source="CVE"/>
		<description>
These are all security issues fixed in the rsyslog-8.24.0-3.16.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3200/">CVE-2011-3200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4758/">CVE-2013-4758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6370/">CVE-2013-6370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6371/">CVE-2013-6371</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3634/">CVE-2014-3634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3683/">CVE-2014-3683</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-3243/">CVE-2015-3243</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512617" comment="rsyslog-8.24.0-3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77135" version="1" class="patch">
	<metadata>
		<title>rtkit-0.11_git201205151338-8.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-4326" ref_url="https://www.suse.com/security/cve/CVE-2013-4326/" source="CVE"/>
		<description>
These are all security issues fixed in the rtkit-0.11_git201205151338-8.17 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4326/">CVE-2013-4326</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141122" comment="rtkit-0.11_git201205151338-8.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77136" version="1" class="patch">
	<metadata>
		<title>ruby-2.1-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-4492" ref_url="https://www.suse.com/security/cve/CVE-2009-4492/" source="CVE"/>
		<reference ref_id="CVE-2010-0541" ref_url="https://www.suse.com/security/cve/CVE-2010-0541/" source="CVE"/>
		<reference ref_id="CVE-2011-1004" ref_url="https://www.suse.com/security/cve/CVE-2011-1004/" source="CVE"/>
		<reference ref_id="CVE-2011-1005" ref_url="https://www.suse.com/security/cve/CVE-2011-1005/" source="CVE"/>
		<reference ref_id="CVE-2011-4815" ref_url="https://www.suse.com/security/cve/CVE-2011-4815/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby-2.1-1.6 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4492/">CVE-2009-4492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0541/">CVE-2010-0541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1004/">CVE-2011-1004</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1005/">CVE-2011-1005</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4815/">CVE-2011-4815</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141123" comment="ruby-2.1-1.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77137" version="1" class="patch">
	<metadata>
		<title>rzsz-0.12.21~rc-1001.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2018-10195" ref_url="https://www.suse.com/security/cve/CVE-2018-10195/" source="CVE"/>
		<description>
These are all security issues fixed in the rzsz-0.12.21~rc-1001.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10195/">CVE-2018-10195</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009174874" comment="rzsz-0.12.21~rc-1001.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77138" version="1" class="patch">
	<metadata>
		<title>sane-backends-1.0.24-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-6318" ref_url="https://www.suse.com/security/cve/CVE-2017-6318/" source="CVE"/>
		<description>
These are all security issues fixed in the sane-backends-1.0.24-3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6318/">CVE-2017-6318</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009149621" comment="sane-backends-1.0.24-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009149622" comment="sane-backends-32bit-1.0.24-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009149623" comment="sane-backends-autoconfig-1.0.24-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77139" version="1" class="patch">
	<metadata>
		<title>sblim-sfcb-1.4.8-17.3.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-5185" ref_url="https://www.suse.com/security/cve/CVE-2015-5185/" source="CVE"/>
		<description>
These are all security issues fixed in the sblim-sfcb-1.4.8-17.3.4 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5185/">CVE-2015-5185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512618" comment="sblim-sfcb-1.4.8-17.3.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77140" version="1" class="patch">
	<metadata>
		<title>shadow-4.2.1-27.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-6252" ref_url="https://www.suse.com/security/cve/CVE-2016-6252/" source="CVE"/>
		<reference ref_id="CVE-2017-12424" ref_url="https://www.suse.com/security/cve/CVE-2017-12424/" source="CVE"/>
		<reference ref_id="CVE-2018-7169" ref_url="https://www.suse.com/security/cve/CVE-2018-7169/" source="CVE"/>
		<description>
These are all security issues fixed in the shadow-4.2.1-27.19.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-6252/">CVE-2016-6252</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12424/">CVE-2017-12424</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7169/">CVE-2018-7169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512619" comment="shadow-4.2.1-27.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77141" version="1" class="patch">
	<metadata>
		<title>shim-0.9-23.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3675" ref_url="https://www.suse.com/security/cve/CVE-2014-3675/" source="CVE"/>
		<reference ref_id="CVE-2014-3676" ref_url="https://www.suse.com/security/cve/CVE-2014-3676/" source="CVE"/>
		<reference ref_id="CVE-2014-3677" ref_url="https://www.suse.com/security/cve/CVE-2014-3677/" source="CVE"/>
		<description>
These are all security issues fixed in the shim-0.9-23.14 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3675/">CVE-2014-3675</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3676/">CVE-2014-3676</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3677/">CVE-2014-3677</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159306" comment="shim-0.9-23.14 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77142" version="1" class="patch">
	<metadata>
		<title>shotwell-0.22.0+git.20160103-15.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-1000024" ref_url="https://www.suse.com/security/cve/CVE-2017-1000024/" source="CVE"/>
		<description>
These are all security issues fixed in the shotwell-0.22.0+git.20160103-15.6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000024/">CVE-2017-1000024</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009172771" comment="shotwell-0.22.0+git.20160103-15.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009172772" comment="shotwell-lang-0.22.0+git.20160103-15.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77143" version="1" class="patch">
	<metadata>
		<title>socat-1.7.2.4-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-3571" ref_url="https://www.suse.com/security/cve/CVE-2013-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-0019" ref_url="https://www.suse.com/security/cve/CVE-2014-0019/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<description>
These are all security issues fixed in the socat-1.7.2.4-3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3571/">CVE-2013-3571</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0019/">CVE-2014-0019</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009122758" comment="socat-1.7.2.4-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77144" version="1" class="patch">
	<metadata>
		<title>spice-vdagent-0.16.0-8.5.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-15108" ref_url="https://www.suse.com/security/cve/CVE-2017-15108/" source="CVE"/>
		<description>
These are all security issues fixed in the spice-vdagent-0.16.0-8.5.15 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15108/">CVE-2017-15108</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009170918" comment="spice-vdagent-0.16.0-8.5.15 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77145" version="1" class="patch">
	<metadata>
		<title>squashfs-4.3-6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-4024" ref_url="https://www.suse.com/security/cve/CVE-2012-4024/" source="CVE"/>
		<reference ref_id="CVE-2012-4025" ref_url="https://www.suse.com/security/cve/CVE-2012-4025/" source="CVE"/>
		<description>
These are all security issues fixed in the squashfs-4.3-6.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4024/">CVE-2012-4024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4025/">CVE-2012-4025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141126" comment="squashfs-4.3-6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77146" version="1" class="patch">
	<metadata>
		<title>strongswan-5.1.3-26.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0790" ref_url="https://www.suse.com/security/cve/CVE-2009-0790/" source="CVE"/>
		<reference ref_id="CVE-2012-2388" ref_url="https://www.suse.com/security/cve/CVE-2012-2388/" source="CVE"/>
		<reference ref_id="CVE-2013-2944" ref_url="https://www.suse.com/security/cve/CVE-2013-2944/" source="CVE"/>
		<reference ref_id="CVE-2013-5018" ref_url="https://www.suse.com/security/cve/CVE-2013-5018/" source="CVE"/>
		<reference ref_id="CVE-2013-6075" ref_url="https://www.suse.com/security/cve/CVE-2013-6075/" source="CVE"/>
		<reference ref_id="CVE-2013-6076" ref_url="https://www.suse.com/security/cve/CVE-2013-6076/" source="CVE"/>
		<reference ref_id="CVE-2014-2338" ref_url="https://www.suse.com/security/cve/CVE-2014-2338/" source="CVE"/>
		<reference ref_id="CVE-2014-9221" ref_url="https://www.suse.com/security/cve/CVE-2014-9221/" source="CVE"/>
		<reference ref_id="CVE-2015-4171" ref_url="https://www.suse.com/security/cve/CVE-2015-4171/" source="CVE"/>
		<reference ref_id="CVE-2015-8023" ref_url="https://www.suse.com/security/cve/CVE-2015-8023/" source="CVE"/>
		<reference ref_id="CVE-2017-11185" ref_url="https://www.suse.com/security/cve/CVE-2017-11185/" source="CVE"/>
		<reference ref_id="CVE-2017-9022" ref_url="https://www.suse.com/security/cve/CVE-2017-9022/" source="CVE"/>
		<reference ref_id="CVE-2017-9023" ref_url="https://www.suse.com/security/cve/CVE-2017-9023/" source="CVE"/>
		<description>
These are all security issues fixed in the strongswan-5.1.3-26.5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0790/">CVE-2009-0790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2388/">CVE-2012-2388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2944/">CVE-2013-2944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5018/">CVE-2013-5018</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6075/">CVE-2013-6075</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6076/">CVE-2013-6076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2338/">CVE-2014-2338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9221/">CVE-2014-9221</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4171/">CVE-2015-4171</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8023/">CVE-2015-8023</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11185/">CVE-2017-11185</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9022/">CVE-2017-9022</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9023/">CVE-2017-9023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009161786" comment="strongswan-5.1.3-26.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009161787" comment="strongswan-doc-5.1.3-26.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009161788" comment="strongswan-ipsec-5.1.3-26.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009161789" comment="strongswan-libs0-5.1.3-26.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77147" version="1" class="patch">
	<metadata>
		<title>sudo-1.8.20p2-3.7.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-1163" ref_url="https://www.suse.com/security/cve/CVE-2010-1163/" source="CVE"/>
		<reference ref_id="CVE-2010-1646" ref_url="https://www.suse.com/security/cve/CVE-2010-1646/" source="CVE"/>
		<reference ref_id="CVE-2011-0010" ref_url="https://www.suse.com/security/cve/CVE-2011-0010/" source="CVE"/>
		<reference ref_id="CVE-2012-2337" ref_url="https://www.suse.com/security/cve/CVE-2012-2337/" source="CVE"/>
		<reference ref_id="CVE-2013-1775" ref_url="https://www.suse.com/security/cve/CVE-2013-1775/" source="CVE"/>
		<reference ref_id="CVE-2013-1776" ref_url="https://www.suse.com/security/cve/CVE-2013-1776/" source="CVE"/>
		<reference ref_id="CVE-2014-9680" ref_url="https://www.suse.com/security/cve/CVE-2014-9680/" source="CVE"/>
		<reference ref_id="CVE-2016-7032" ref_url="https://www.suse.com/security/cve/CVE-2016-7032/" source="CVE"/>
		<reference ref_id="CVE-2016-7076" ref_url="https://www.suse.com/security/cve/CVE-2016-7076/" source="CVE"/>
		<reference ref_id="CVE-2017-1000367" ref_url="https://www.suse.com/security/cve/CVE-2017-1000367/" source="CVE"/>
		<reference ref_id="CVE-2017-1000368" ref_url="https://www.suse.com/security/cve/CVE-2017-1000368/" source="CVE"/>
		<description>
These are all security issues fixed in the sudo-1.8.20p2-3.7.10 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1163/">CVE-2010-1163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1646/">CVE-2010-1646</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0010/">CVE-2011-0010</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2337/">CVE-2012-2337</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1775/">CVE-2013-1775</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-1776/">CVE-2013-1776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9680/">CVE-2014-9680</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7032/">CVE-2016-7032</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7076/">CVE-2016-7076</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000367/">CVE-2017-1000367</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000368/">CVE-2017-1000368</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512620" comment="sudo-1.8.20p2-3.7.10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77148" version="1" class="patch">
	<metadata>
		<title>supportutils-3.0-95.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-1602" ref_url="https://www.suse.com/security/cve/CVE-2016-1602/" source="CVE"/>
		<description>
These are all security issues fixed in the supportutils-3.0-95.18.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1602/">CVE-2016-1602</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512621" comment="supportutils-3.0-95.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77149" version="1" class="patch">
	<metadata>
		<title>sysconfig-0.84.0-13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-4182" ref_url="https://www.suse.com/security/cve/CVE-2011-4182/" source="CVE"/>
		<description>
These are all security issues fixed in the sysconfig-0.84.0-13.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4182/">CVE-2011-4182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141132" comment="sysconfig-0.84.0-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141133" comment="sysconfig-netconfig-0.84.0-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77150" version="1" class="patch">
	<metadata>
		<title>syslog-service-2.0-778.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3634" ref_url="https://www.suse.com/security/cve/CVE-2014-3634/" source="CVE"/>
		<description>
These are all security issues fixed in the syslog-service-2.0-778.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3634/">CVE-2014-3634</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141134" comment="syslog-service-2.0-778.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77151" version="1" class="patch">
	<metadata>
		<title>sysvinit-tools-2.88+-99.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<description>
These are all security issues fixed in the sysvinit-tools-2.88+-99.15 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159312" comment="sysvinit-tools-2.88+-99.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141139" comment="whois-5.1.1-1.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77152" version="1" class="patch">
	<metadata>
		<title>tar-1.27.1-15.3.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-0624" ref_url="https://www.suse.com/security/cve/CVE-2010-0624/" source="CVE"/>
		<reference ref_id="CVE-2016-6321" ref_url="https://www.suse.com/security/cve/CVE-2016-6321/" source="CVE"/>
		<description>
These are all security issues fixed in the tar-1.27.1-15.3.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0624/">CVE-2010-0624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6321/">CVE-2016-6321</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512622" comment="tar-1.27.1-15.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512623" comment="tar-lang-1.27.1-15.3.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77153" version="1" class="patch">
	<metadata>
		<title>tcpdump-4.9.2-14.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-8767" ref_url="https://www.suse.com/security/cve/CVE-2014-8767/" source="CVE"/>
		<reference ref_id="CVE-2014-8768" ref_url="https://www.suse.com/security/cve/CVE-2014-8768/" source="CVE"/>
		<reference ref_id="CVE-2014-8769" ref_url="https://www.suse.com/security/cve/CVE-2014-8769/" source="CVE"/>
		<reference ref_id="CVE-2014-9140" ref_url="https://www.suse.com/security/cve/CVE-2014-9140/" source="CVE"/>
		<reference ref_id="CVE-2015-0261" ref_url="https://www.suse.com/security/cve/CVE-2015-0261/" source="CVE"/>
		<reference ref_id="CVE-2015-2153" ref_url="https://www.suse.com/security/cve/CVE-2015-2153/" source="CVE"/>
		<reference ref_id="CVE-2015-2154" ref_url="https://www.suse.com/security/cve/CVE-2015-2154/" source="CVE"/>
		<reference ref_id="CVE-2015-2155" ref_url="https://www.suse.com/security/cve/CVE-2015-2155/" source="CVE"/>
		<reference ref_id="CVE-2015-3138" ref_url="https://www.suse.com/security/cve/CVE-2015-3138/" source="CVE"/>
		<reference ref_id="CVE-2016-7922" ref_url="https://www.suse.com/security/cve/CVE-2016-7922/" source="CVE"/>
		<reference ref_id="CVE-2016-7923" ref_url="https://www.suse.com/security/cve/CVE-2016-7923/" source="CVE"/>
		<reference ref_id="CVE-2016-7924" ref_url="https://www.suse.com/security/cve/CVE-2016-7924/" source="CVE"/>
		<reference ref_id="CVE-2016-7925" ref_url="https://www.suse.com/security/cve/CVE-2016-7925/" source="CVE"/>
		<reference ref_id="CVE-2016-7926" ref_url="https://www.suse.com/security/cve/CVE-2016-7926/" source="CVE"/>
		<reference ref_id="CVE-2016-7927" ref_url="https://www.suse.com/security/cve/CVE-2016-7927/" source="CVE"/>
		<reference ref_id="CVE-2016-7928" ref_url="https://www.suse.com/security/cve/CVE-2016-7928/" source="CVE"/>
		<reference ref_id="CVE-2016-7929" ref_url="https://www.suse.com/security/cve/CVE-2016-7929/" source="CVE"/>
		<reference ref_id="CVE-2016-7930" ref_url="https://www.suse.com/security/cve/CVE-2016-7930/" source="CVE"/>
		<reference ref_id="CVE-2016-7931" ref_url="https://www.suse.com/security/cve/CVE-2016-7931/" source="CVE"/>
		<reference ref_id="CVE-2016-7932" ref_url="https://www.suse.com/security/cve/CVE-2016-7932/" source="CVE"/>
		<reference ref_id="CVE-2016-7933" ref_url="https://www.suse.com/security/cve/CVE-2016-7933/" source="CVE"/>
		<reference ref_id="CVE-2016-7934" ref_url="https://www.suse.com/security/cve/CVE-2016-7934/" source="CVE"/>
		<reference ref_id="CVE-2016-7935" ref_url="https://www.suse.com/security/cve/CVE-2016-7935/" source="CVE"/>
		<reference ref_id="CVE-2016-7936" ref_url="https://www.suse.com/security/cve/CVE-2016-7936/" source="CVE"/>
		<reference ref_id="CVE-2016-7937" ref_url="https://www.suse.com/security/cve/CVE-2016-7937/" source="CVE"/>
		<reference ref_id="CVE-2016-7938" ref_url="https://www.suse.com/security/cve/CVE-2016-7938/" source="CVE"/>
		<reference ref_id="CVE-2016-7939" ref_url="https://www.suse.com/security/cve/CVE-2016-7939/" source="CVE"/>
		<reference ref_id="CVE-2016-7940" ref_url="https://www.suse.com/security/cve/CVE-2016-7940/" source="CVE"/>
		<reference ref_id="CVE-2016-7973" ref_url="https://www.suse.com/security/cve/CVE-2016-7973/" source="CVE"/>
		<reference ref_id="CVE-2016-7974" ref_url="https://www.suse.com/security/cve/CVE-2016-7974/" source="CVE"/>
		<reference ref_id="CVE-2016-7975" ref_url="https://www.suse.com/security/cve/CVE-2016-7975/" source="CVE"/>
		<reference ref_id="CVE-2016-7983" ref_url="https://www.suse.com/security/cve/CVE-2016-7983/" source="CVE"/>
		<reference ref_id="CVE-2016-7984" ref_url="https://www.suse.com/security/cve/CVE-2016-7984/" source="CVE"/>
		<reference ref_id="CVE-2016-7985" ref_url="https://www.suse.com/security/cve/CVE-2016-7985/" source="CVE"/>
		<reference ref_id="CVE-2016-7986" ref_url="https://www.suse.com/security/cve/CVE-2016-7986/" source="CVE"/>
		<reference ref_id="CVE-2016-7992" ref_url="https://www.suse.com/security/cve/CVE-2016-7992/" source="CVE"/>
		<reference ref_id="CVE-2016-7993" ref_url="https://www.suse.com/security/cve/CVE-2016-7993/" source="CVE"/>
		<reference ref_id="CVE-2016-8574" ref_url="https://www.suse.com/security/cve/CVE-2016-8574/" source="CVE"/>
		<reference ref_id="CVE-2016-8575" ref_url="https://www.suse.com/security/cve/CVE-2016-8575/" source="CVE"/>
		<reference ref_id="CVE-2017-11108" ref_url="https://www.suse.com/security/cve/CVE-2017-11108/" source="CVE"/>
		<reference ref_id="CVE-2017-11541" ref_url="https://www.suse.com/security/cve/CVE-2017-11541/" source="CVE"/>
		<reference ref_id="CVE-2017-11542" ref_url="https://www.suse.com/security/cve/CVE-2017-11542/" source="CVE"/>
		<reference ref_id="CVE-2017-11543" ref_url="https://www.suse.com/security/cve/CVE-2017-11543/" source="CVE"/>
		<reference ref_id="CVE-2017-12893" ref_url="https://www.suse.com/security/cve/CVE-2017-12893/" source="CVE"/>
		<reference ref_id="CVE-2017-12894" ref_url="https://www.suse.com/security/cve/CVE-2017-12894/" source="CVE"/>
		<reference ref_id="CVE-2017-12895" ref_url="https://www.suse.com/security/cve/CVE-2017-12895/" source="CVE"/>
		<reference ref_id="CVE-2017-12896" ref_url="https://www.suse.com/security/cve/CVE-2017-12896/" source="CVE"/>
		<reference ref_id="CVE-2017-12897" ref_url="https://www.suse.com/security/cve/CVE-2017-12897/" source="CVE"/>
		<reference ref_id="CVE-2017-12898" ref_url="https://www.suse.com/security/cve/CVE-2017-12898/" source="CVE"/>
		<reference ref_id="CVE-2017-12899" ref_url="https://www.suse.com/security/cve/CVE-2017-12899/" source="CVE"/>
		<reference ref_id="CVE-2017-12900" ref_url="https://www.suse.com/security/cve/CVE-2017-12900/" source="CVE"/>
		<reference ref_id="CVE-2017-12901" ref_url="https://www.suse.com/security/cve/CVE-2017-12901/" source="CVE"/>
		<reference ref_id="CVE-2017-12902" ref_url="https://www.suse.com/security/cve/CVE-2017-12902/" source="CVE"/>
		<reference ref_id="CVE-2017-12985" ref_url="https://www.suse.com/security/cve/CVE-2017-12985/" source="CVE"/>
		<reference ref_id="CVE-2017-12986" ref_url="https://www.suse.com/security/cve/CVE-2017-12986/" source="CVE"/>
		<reference ref_id="CVE-2017-12987" ref_url="https://www.suse.com/security/cve/CVE-2017-12987/" source="CVE"/>
		<reference ref_id="CVE-2017-12988" ref_url="https://www.suse.com/security/cve/CVE-2017-12988/" source="CVE"/>
		<reference ref_id="CVE-2017-12989" ref_url="https://www.suse.com/security/cve/CVE-2017-12989/" source="CVE"/>
		<reference ref_id="CVE-2017-12990" ref_url="https://www.suse.com/security/cve/CVE-2017-12990/" source="CVE"/>
		<reference ref_id="CVE-2017-12991" ref_url="https://www.suse.com/security/cve/CVE-2017-12991/" source="CVE"/>
		<reference ref_id="CVE-2017-12992" ref_url="https://www.suse.com/security/cve/CVE-2017-12992/" source="CVE"/>
		<reference ref_id="CVE-2017-12993" ref_url="https://www.suse.com/security/cve/CVE-2017-12993/" source="CVE"/>
		<reference ref_id="CVE-2017-12994" ref_url="https://www.suse.com/security/cve/CVE-2017-12994/" source="CVE"/>
		<reference ref_id="CVE-2017-12995" ref_url="https://www.suse.com/security/cve/CVE-2017-12995/" source="CVE"/>
		<reference ref_id="CVE-2017-12996" ref_url="https://www.suse.com/security/cve/CVE-2017-12996/" source="CVE"/>
		<reference ref_id="CVE-2017-12997" ref_url="https://www.suse.com/security/cve/CVE-2017-12997/" source="CVE"/>
		<reference ref_id="CVE-2017-12998" ref_url="https://www.suse.com/security/cve/CVE-2017-12998/" source="CVE"/>
		<reference ref_id="CVE-2017-12999" ref_url="https://www.suse.com/security/cve/CVE-2017-12999/" source="CVE"/>
		<reference ref_id="CVE-2017-13000" ref_url="https://www.suse.com/security/cve/CVE-2017-13000/" source="CVE"/>
		<reference ref_id="CVE-2017-13001" ref_url="https://www.suse.com/security/cve/CVE-2017-13001/" source="CVE"/>
		<reference ref_id="CVE-2017-13002" ref_url="https://www.suse.com/security/cve/CVE-2017-13002/" source="CVE"/>
		<reference ref_id="CVE-2017-13003" ref_url="https://www.suse.com/security/cve/CVE-2017-13003/" source="CVE"/>
		<reference ref_id="CVE-2017-13004" ref_url="https://www.suse.com/security/cve/CVE-2017-13004/" source="CVE"/>
		<reference ref_id="CVE-2017-13005" ref_url="https://www.suse.com/security/cve/CVE-2017-13005/" source="CVE"/>
		<reference ref_id="CVE-2017-13006" ref_url="https://www.suse.com/security/cve/CVE-2017-13006/" source="CVE"/>
		<reference ref_id="CVE-2017-13007" ref_url="https://www.suse.com/security/cve/CVE-2017-13007/" source="CVE"/>
		<reference ref_id="CVE-2017-13008" ref_url="https://www.suse.com/security/cve/CVE-2017-13008/" source="CVE"/>
		<reference ref_id="CVE-2017-13009" ref_url="https://www.suse.com/security/cve/CVE-2017-13009/" source="CVE"/>
		<reference ref_id="CVE-2017-13010" ref_url="https://www.suse.com/security/cve/CVE-2017-13010/" source="CVE"/>
		<reference ref_id="CVE-2017-13011" ref_url="https://www.suse.com/security/cve/CVE-2017-13011/" source="CVE"/>
		<reference ref_id="CVE-2017-13012" ref_url="https://www.suse.com/security/cve/CVE-2017-13012/" source="CVE"/>
		<reference ref_id="CVE-2017-13013" ref_url="https://www.suse.com/security/cve/CVE-2017-13013/" source="CVE"/>
		<reference ref_id="CVE-2017-13014" ref_url="https://www.suse.com/security/cve/CVE-2017-13014/" source="CVE"/>
		<reference ref_id="CVE-2017-13015" ref_url="https://www.suse.com/security/cve/CVE-2017-13015/" source="CVE"/>
		<reference ref_id="CVE-2017-13016" ref_url="https://www.suse.com/security/cve/CVE-2017-13016/" source="CVE"/>
		<reference ref_id="CVE-2017-13017" ref_url="https://www.suse.com/security/cve/CVE-2017-13017/" source="CVE"/>
		<reference ref_id="CVE-2017-13018" ref_url="https://www.suse.com/security/cve/CVE-2017-13018/" source="CVE"/>
		<reference ref_id="CVE-2017-13019" ref_url="https://www.suse.com/security/cve/CVE-2017-13019/" source="CVE"/>
		<reference ref_id="CVE-2017-13020" ref_url="https://www.suse.com/security/cve/CVE-2017-13020/" source="CVE"/>
		<reference ref_id="CVE-2017-13021" ref_url="https://www.suse.com/security/cve/CVE-2017-13021/" source="CVE"/>
		<reference ref_id="CVE-2017-13022" ref_url="https://www.suse.com/security/cve/CVE-2017-13022/" source="CVE"/>
		<reference ref_id="CVE-2017-13023" ref_url="https://www.suse.com/security/cve/CVE-2017-13023/" source="CVE"/>
		<reference ref_id="CVE-2017-13024" ref_url="https://www.suse.com/security/cve/CVE-2017-13024/" source="CVE"/>
		<reference ref_id="CVE-2017-13025" ref_url="https://www.suse.com/security/cve/CVE-2017-13025/" source="CVE"/>
		<reference ref_id="CVE-2017-13026" ref_url="https://www.suse.com/security/cve/CVE-2017-13026/" source="CVE"/>
		<reference ref_id="CVE-2017-13027" ref_url="https://www.suse.com/security/cve/CVE-2017-13027/" source="CVE"/>
		<reference ref_id="CVE-2017-13028" ref_url="https://www.suse.com/security/cve/CVE-2017-13028/" source="CVE"/>
		<reference ref_id="CVE-2017-13029" ref_url="https://www.suse.com/security/cve/CVE-2017-13029/" source="CVE"/>
		<reference ref_id="CVE-2017-13030" ref_url="https://www.suse.com/security/cve/CVE-2017-13030/" source="CVE"/>
		<reference ref_id="CVE-2017-13031" ref_url="https://www.suse.com/security/cve/CVE-2017-13031/" source="CVE"/>
		<reference ref_id="CVE-2017-13032" ref_url="https://www.suse.com/security/cve/CVE-2017-13032/" source="CVE"/>
		<reference ref_id="CVE-2017-13033" ref_url="https://www.suse.com/security/cve/CVE-2017-13033/" source="CVE"/>
		<reference ref_id="CVE-2017-13034" ref_url="https://www.suse.com/security/cve/CVE-2017-13034/" source="CVE"/>
		<reference ref_id="CVE-2017-13035" ref_url="https://www.suse.com/security/cve/CVE-2017-13035/" source="CVE"/>
		<reference ref_id="CVE-2017-13036" ref_url="https://www.suse.com/security/cve/CVE-2017-13036/" source="CVE"/>
		<reference ref_id="CVE-2017-13037" ref_url="https://www.suse.com/security/cve/CVE-2017-13037/" source="CVE"/>
		<reference ref_id="CVE-2017-13038" ref_url="https://www.suse.com/security/cve/CVE-2017-13038/" source="CVE"/>
		<reference ref_id="CVE-2017-13039" ref_url="https://www.suse.com/security/cve/CVE-2017-13039/" source="CVE"/>
		<reference ref_id="CVE-2017-13040" ref_url="https://www.suse.com/security/cve/CVE-2017-13040/" source="CVE"/>
		<reference ref_id="CVE-2017-13041" ref_url="https://www.suse.com/security/cve/CVE-2017-13041/" source="CVE"/>
		<reference ref_id="CVE-2017-13042" ref_url="https://www.suse.com/security/cve/CVE-2017-13042/" source="CVE"/>
		<reference ref_id="CVE-2017-13043" ref_url="https://www.suse.com/security/cve/CVE-2017-13043/" source="CVE"/>
		<reference ref_id="CVE-2017-13044" ref_url="https://www.suse.com/security/cve/CVE-2017-13044/" source="CVE"/>
		<reference ref_id="CVE-2017-13045" ref_url="https://www.suse.com/security/cve/CVE-2017-13045/" source="CVE"/>
		<reference ref_id="CVE-2017-13046" ref_url="https://www.suse.com/security/cve/CVE-2017-13046/" source="CVE"/>
		<reference ref_id="CVE-2017-13047" ref_url="https://www.suse.com/security/cve/CVE-2017-13047/" source="CVE"/>
		<reference ref_id="CVE-2017-13048" ref_url="https://www.suse.com/security/cve/CVE-2017-13048/" source="CVE"/>
		<reference ref_id="CVE-2017-13049" ref_url="https://www.suse.com/security/cve/CVE-2017-13049/" source="CVE"/>
		<reference ref_id="CVE-2017-13050" ref_url="https://www.suse.com/security/cve/CVE-2017-13050/" source="CVE"/>
		<reference ref_id="CVE-2017-13051" ref_url="https://www.suse.com/security/cve/CVE-2017-13051/" source="CVE"/>
		<reference ref_id="CVE-2017-13052" ref_url="https://www.suse.com/security/cve/CVE-2017-13052/" source="CVE"/>
		<reference ref_id="CVE-2017-13053" ref_url="https://www.suse.com/security/cve/CVE-2017-13053/" source="CVE"/>
		<reference ref_id="CVE-2017-13054" ref_url="https://www.suse.com/security/cve/CVE-2017-13054/" source="CVE"/>
		<reference ref_id="CVE-2017-13055" ref_url="https://www.suse.com/security/cve/CVE-2017-13055/" source="CVE"/>
		<reference ref_id="CVE-2017-13687" ref_url="https://www.suse.com/security/cve/CVE-2017-13687/" source="CVE"/>
		<reference ref_id="CVE-2017-13688" ref_url="https://www.suse.com/security/cve/CVE-2017-13688/" source="CVE"/>
		<reference ref_id="CVE-2017-13689" ref_url="https://www.suse.com/security/cve/CVE-2017-13689/" source="CVE"/>
		<reference ref_id="CVE-2017-13690" ref_url="https://www.suse.com/security/cve/CVE-2017-13690/" source="CVE"/>
		<reference ref_id="CVE-2017-13725" ref_url="https://www.suse.com/security/cve/CVE-2017-13725/" source="CVE"/>
		<reference ref_id="CVE-2017-5202" ref_url="https://www.suse.com/security/cve/CVE-2017-5202/" source="CVE"/>
		<reference ref_id="CVE-2017-5203" ref_url="https://www.suse.com/security/cve/CVE-2017-5203/" source="CVE"/>
		<reference ref_id="CVE-2017-5204" ref_url="https://www.suse.com/security/cve/CVE-2017-5204/" source="CVE"/>
		<reference ref_id="CVE-2017-5205" ref_url="https://www.suse.com/security/cve/CVE-2017-5205/" source="CVE"/>
		<reference ref_id="CVE-2017-5341" ref_url="https://www.suse.com/security/cve/CVE-2017-5341/" source="CVE"/>
		<reference ref_id="CVE-2017-5342" ref_url="https://www.suse.com/security/cve/CVE-2017-5342/" source="CVE"/>
		<reference ref_id="CVE-2017-5482" ref_url="https://www.suse.com/security/cve/CVE-2017-5482/" source="CVE"/>
		<reference ref_id="CVE-2017-5483" ref_url="https://www.suse.com/security/cve/CVE-2017-5483/" source="CVE"/>
		<reference ref_id="CVE-2017-5484" ref_url="https://www.suse.com/security/cve/CVE-2017-5484/" source="CVE"/>
		<reference ref_id="CVE-2017-5485" ref_url="https://www.suse.com/security/cve/CVE-2017-5485/" source="CVE"/>
		<reference ref_id="CVE-2017-5486" ref_url="https://www.suse.com/security/cve/CVE-2017-5486/" source="CVE"/>
		<description>
These are all security issues fixed in the tcpdump-4.9.2-14.5.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8767/">CVE-2014-8767</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8768/">CVE-2014-8768</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8769/">CVE-2014-8769</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9140/">CVE-2014-9140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0261/">CVE-2015-0261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2153/">CVE-2015-2153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2154/">CVE-2015-2154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2155/">CVE-2015-2155</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3138/">CVE-2015-3138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7922/">CVE-2016-7922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7923/">CVE-2016-7923</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7924/">CVE-2016-7924</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7925/">CVE-2016-7925</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7926/">CVE-2016-7926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7927/">CVE-2016-7927</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7928/">CVE-2016-7928</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7929/">CVE-2016-7929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7930/">CVE-2016-7930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7931/">CVE-2016-7931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7932/">CVE-2016-7932</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7933/">CVE-2016-7933</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7934/">CVE-2016-7934</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7935/">CVE-2016-7935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7936/">CVE-2016-7936</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7937/">CVE-2016-7937</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7938/">CVE-2016-7938</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7939/">CVE-2016-7939</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7940/">CVE-2016-7940</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7973/">CVE-2016-7973</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7974/">CVE-2016-7974</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7975/">CVE-2016-7975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7983/">CVE-2016-7983</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7984/">CVE-2016-7984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7985/">CVE-2016-7985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7986/">CVE-2016-7986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7992/">CVE-2016-7992</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7993/">CVE-2016-7993</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8574/">CVE-2016-8574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8575/">CVE-2016-8575</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11108/">CVE-2017-11108</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11541/">CVE-2017-11541</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11542/">CVE-2017-11542</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11543/">CVE-2017-11543</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12893/">CVE-2017-12893</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12894/">CVE-2017-12894</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12895/">CVE-2017-12895</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12896/">CVE-2017-12896</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12897/">CVE-2017-12897</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12898/">CVE-2017-12898</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12899/">CVE-2017-12899</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12900/">CVE-2017-12900</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12901/">CVE-2017-12901</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12902/">CVE-2017-12902</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12985/">CVE-2017-12985</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12986/">CVE-2017-12986</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12987/">CVE-2017-12987</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12988/">CVE-2017-12988</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12989/">CVE-2017-12989</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12990/">CVE-2017-12990</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12991/">CVE-2017-12991</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12992/">CVE-2017-12992</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12993/">CVE-2017-12993</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12994/">CVE-2017-12994</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12995/">CVE-2017-12995</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12996/">CVE-2017-12996</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12997/">CVE-2017-12997</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12998/">CVE-2017-12998</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12999/">CVE-2017-12999</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13000/">CVE-2017-13000</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13001/">CVE-2017-13001</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13002/">CVE-2017-13002</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13003/">CVE-2017-13003</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13004/">CVE-2017-13004</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13005/">CVE-2017-13005</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13006/">CVE-2017-13006</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13007/">CVE-2017-13007</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13008/">CVE-2017-13008</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13009/">CVE-2017-13009</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13010/">CVE-2017-13010</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13011/">CVE-2017-13011</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13012/">CVE-2017-13012</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13013/">CVE-2017-13013</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13014/">CVE-2017-13014</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13015/">CVE-2017-13015</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13016/">CVE-2017-13016</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13017/">CVE-2017-13017</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13018/">CVE-2017-13018</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13019/">CVE-2017-13019</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13020/">CVE-2017-13020</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13021/">CVE-2017-13021</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13022/">CVE-2017-13022</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13023/">CVE-2017-13023</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13024/">CVE-2017-13024</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13025/">CVE-2017-13025</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13026/">CVE-2017-13026</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13027/">CVE-2017-13027</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13028/">CVE-2017-13028</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13029/">CVE-2017-13029</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13030/">CVE-2017-13030</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13031/">CVE-2017-13031</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13032/">CVE-2017-13032</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13033/">CVE-2017-13033</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13034/">CVE-2017-13034</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13035/">CVE-2017-13035</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13036/">CVE-2017-13036</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13037/">CVE-2017-13037</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13038/">CVE-2017-13038</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13039/">CVE-2017-13039</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13040/">CVE-2017-13040</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13041/">CVE-2017-13041</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13042/">CVE-2017-13042</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13043/">CVE-2017-13043</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13044/">CVE-2017-13044</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13045/">CVE-2017-13045</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13046/">CVE-2017-13046</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13047/">CVE-2017-13047</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13048/">CVE-2017-13048</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13049/">CVE-2017-13049</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13050/">CVE-2017-13050</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13051/">CVE-2017-13051</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13052/">CVE-2017-13052</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13053/">CVE-2017-13053</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13054/">CVE-2017-13054</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13055/">CVE-2017-13055</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13687/">CVE-2017-13687</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13688/">CVE-2017-13688</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13689/">CVE-2017-13689</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13690/">CVE-2017-13690</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13725/">CVE-2017-13725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5202/">CVE-2017-5202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5203/">CVE-2017-5203</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5204/">CVE-2017-5204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5205/">CVE-2017-5205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5341/">CVE-2017-5341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5342/">CVE-2017-5342</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5482/">CVE-2017-5482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5483/">CVE-2017-5483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5484/">CVE-2017-5484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5485/">CVE-2017-5485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5486/">CVE-2017-5486</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009166091" comment="tcpdump-4.9.2-14.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77154" version="1" class="patch">
	<metadata>
		<title>telepathy-gabble-0.18.3-5.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-1000" ref_url="https://www.suse.com/security/cve/CVE-2011-1000/" source="CVE"/>
		<reference ref_id="CVE-2013-1431" ref_url="https://www.suse.com/security/cve/CVE-2013-1431/" source="CVE"/>
		<description>
These are all security issues fixed in the telepathy-gabble-0.18.3-5.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1000/">CVE-2011-1000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1431/">CVE-2013-1431</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142152" comment="telepathy-gabble-0.18.3-5.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77155" version="1" class="patch">
	<metadata>
		<title>telepathy-idle-0.2.0-1.62 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-6746" ref_url="https://www.suse.com/security/cve/CVE-2007-6746/" source="CVE"/>
		<description>
These are all security issues fixed in the telepathy-idle-0.2.0-1.62 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6746/">CVE-2007-6746</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141815" comment="telepathy-idle-0.2.0-1.62 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77156" version="1" class="patch">
	<metadata>
		<title>tftp-5.2-11.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-2199" ref_url="https://www.suse.com/security/cve/CVE-2011-2199/" source="CVE"/>
		<description>
These are all security issues fixed in the tftp-5.2-11.6.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2199/">CVE-2011-2199</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512624" comment="tftp-5.2-11.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77157" version="1" class="patch">
	<metadata>
		<title>transfig-3.2.5e-2.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-16899" ref_url="https://www.suse.com/security/cve/CVE-2017-16899/" source="CVE"/>
		<description>
These are all security issues fixed in the transfig-3.2.5e-2.3.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16899/">CVE-2017-16899</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009170244" comment="transfig-3.2.5e-2.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77158" version="1" class="patch">
	<metadata>
		<title>ucode-intel-20180807a-13.35.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<description>
These are all security issues fixed in the ucode-intel-20180807a-13.35.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512625" comment="ucode-intel-20180807a-13.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77159" version="1" class="patch">
	<metadata>
		<title>unixODBC-2.3.6-7.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-1145" ref_url="https://www.suse.com/security/cve/CVE-2011-1145/" source="CVE"/>
		<reference ref_id="CVE-2018-7409" ref_url="https://www.suse.com/security/cve/CVE-2018-7409/" source="CVE"/>
		<reference ref_id="CVE-2018-7485" ref_url="https://www.suse.com/security/cve/CVE-2018-7485/" source="CVE"/>
		<description>
These are all security issues fixed in the unixODBC-2.3.6-7.9.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1145/">CVE-2011-1145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-7409/">CVE-2018-7409</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-7485/">CVE-2018-7485</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512626" comment="unixODBC-2.3.6-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512627" comment="unixODBC-32bit-2.3.6-7.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77160" version="1" class="patch">
	<metadata>
		<title>unrar-5.0.14-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<description>
These are all security issues fixed in the unrar-5.0.14-3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157766" comment="unrar-5.0.14-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77161" version="1" class="patch">
	<metadata>
		<title>unzip-6.00-33.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-8139" ref_url="https://www.suse.com/security/cve/CVE-2014-8139/" source="CVE"/>
		<reference ref_id="CVE-2014-8140" ref_url="https://www.suse.com/security/cve/CVE-2014-8140/" source="CVE"/>
		<reference ref_id="CVE-2014-8141" ref_url="https://www.suse.com/security/cve/CVE-2014-8141/" source="CVE"/>
		<reference ref_id="CVE-2014-9636" ref_url="https://www.suse.com/security/cve/CVE-2014-9636/" source="CVE"/>
		<reference ref_id="CVE-2014-9913" ref_url="https://www.suse.com/security/cve/CVE-2014-9913/" source="CVE"/>
		<reference ref_id="CVE-2015-7696" ref_url="https://www.suse.com/security/cve/CVE-2015-7696/" source="CVE"/>
		<reference ref_id="CVE-2015-7697" ref_url="https://www.suse.com/security/cve/CVE-2015-7697/" source="CVE"/>
		<reference ref_id="CVE-2016-9844" ref_url="https://www.suse.com/security/cve/CVE-2016-9844/" source="CVE"/>
		<reference ref_id="CVE-2018-1000035" ref_url="https://www.suse.com/security/cve/CVE-2018-1000035/" source="CVE"/>
		<description>
These are all security issues fixed in the unzip-6.00-33.8.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8139/">CVE-2014-8139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8140/">CVE-2014-8140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8141/">CVE-2014-8141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9636/">CVE-2014-9636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9913/">CVE-2014-9913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7696/">CVE-2015-7696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7697/">CVE-2015-7697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9844/">CVE-2016-9844</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000035/">CVE-2018-1000035</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512628" comment="unzip-6.00-33.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77162" version="1" class="patch">
	<metadata>
		<title>update-alternatives-1.18.4-14.216 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-0840" ref_url="https://www.suse.com/security/cve/CVE-2015-0840/" source="CVE"/>
		<description>
These are all security issues fixed in the update-alternatives-1.18.4-14.216 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0840/">CVE-2015-0840</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141153" comment="update-alternatives-1.18.4-14.216 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77163" version="1" class="patch">
	<metadata>
		<title>vino-3.20.2-5.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-0904" ref_url="https://www.suse.com/security/cve/CVE-2011-0904/" source="CVE"/>
		<reference ref_id="CVE-2011-0905" ref_url="https://www.suse.com/security/cve/CVE-2011-0905/" source="CVE"/>
		<reference ref_id="CVE-2011-1164" ref_url="https://www.suse.com/security/cve/CVE-2011-1164/" source="CVE"/>
		<description>
These are all security issues fixed in the vino-3.20.2-5.8 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0904/">CVE-2011-0904</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-0905/">CVE-2011-0905</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1164/">CVE-2011-1164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141154" comment="vino-3.20.2-5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141155" comment="vino-lang-3.20.2-5.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77164" version="1" class="patch">
	<metadata>
		<title>vorbis-tools-1.4.0-26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-1686" ref_url="https://www.suse.com/security/cve/CVE-2008-1686/" source="CVE"/>
		<reference ref_id="CVE-2014-9638" ref_url="https://www.suse.com/security/cve/CVE-2014-9638/" source="CVE"/>
		<reference ref_id="CVE-2014-9639" ref_url="https://www.suse.com/security/cve/CVE-2014-9639/" source="CVE"/>
		<reference ref_id="CVE-2014-9640" ref_url="https://www.suse.com/security/cve/CVE-2014-9640/" source="CVE"/>
		<reference ref_id="CVE-2015-6749" ref_url="https://www.suse.com/security/cve/CVE-2015-6749/" source="CVE"/>
		<description>
These are all security issues fixed in the vorbis-tools-1.4.0-26.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1686/">CVE-2008-1686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9638/">CVE-2014-9638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9639/">CVE-2014-9639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9640/">CVE-2014-9640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6749/">CVE-2015-6749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009115051" comment="vorbis-tools-1.4.0-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115052" comment="vorbis-tools-lang-1.4.0-26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77165" version="1" class="patch">
	<metadata>
		<title>w3m-0.5.3.git20161120-160.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-2074" ref_url="https://www.suse.com/security/cve/CVE-2010-2074/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2016-9434" ref_url="https://www.suse.com/security/cve/CVE-2016-9434/" source="CVE"/>
		<reference ref_id="CVE-2016-9435" ref_url="https://www.suse.com/security/cve/CVE-2016-9435/" source="CVE"/>
		<reference ref_id="CVE-2016-9436" ref_url="https://www.suse.com/security/cve/CVE-2016-9436/" source="CVE"/>
		<reference ref_id="CVE-2016-9437" ref_url="https://www.suse.com/security/cve/CVE-2016-9437/" source="CVE"/>
		<reference ref_id="CVE-2016-9438" ref_url="https://www.suse.com/security/cve/CVE-2016-9438/" source="CVE"/>
		<reference ref_id="CVE-2016-9439" ref_url="https://www.suse.com/security/cve/CVE-2016-9439/" source="CVE"/>
		<reference ref_id="CVE-2016-9440" ref_url="https://www.suse.com/security/cve/CVE-2016-9440/" source="CVE"/>
		<reference ref_id="CVE-2016-9441" ref_url="https://www.suse.com/security/cve/CVE-2016-9441/" source="CVE"/>
		<reference ref_id="CVE-2016-9442" ref_url="https://www.suse.com/security/cve/CVE-2016-9442/" source="CVE"/>
		<reference ref_id="CVE-2016-9443" ref_url="https://www.suse.com/security/cve/CVE-2016-9443/" source="CVE"/>
		<reference ref_id="CVE-2016-9621" ref_url="https://www.suse.com/security/cve/CVE-2016-9621/" source="CVE"/>
		<reference ref_id="CVE-2016-9622" ref_url="https://www.suse.com/security/cve/CVE-2016-9622/" source="CVE"/>
		<reference ref_id="CVE-2016-9623" ref_url="https://www.suse.com/security/cve/CVE-2016-9623/" source="CVE"/>
		<reference ref_id="CVE-2016-9624" ref_url="https://www.suse.com/security/cve/CVE-2016-9624/" source="CVE"/>
		<reference ref_id="CVE-2016-9625" ref_url="https://www.suse.com/security/cve/CVE-2016-9625/" source="CVE"/>
		<reference ref_id="CVE-2016-9626" ref_url="https://www.suse.com/security/cve/CVE-2016-9626/" source="CVE"/>
		<reference ref_id="CVE-2016-9627" ref_url="https://www.suse.com/security/cve/CVE-2016-9627/" source="CVE"/>
		<reference ref_id="CVE-2016-9628" ref_url="https://www.suse.com/security/cve/CVE-2016-9628/" source="CVE"/>
		<reference ref_id="CVE-2016-9629" ref_url="https://www.suse.com/security/cve/CVE-2016-9629/" source="CVE"/>
		<reference ref_id="CVE-2016-9630" ref_url="https://www.suse.com/security/cve/CVE-2016-9630/" source="CVE"/>
		<reference ref_id="CVE-2016-9631" ref_url="https://www.suse.com/security/cve/CVE-2016-9631/" source="CVE"/>
		<reference ref_id="CVE-2016-9632" ref_url="https://www.suse.com/security/cve/CVE-2016-9632/" source="CVE"/>
		<reference ref_id="CVE-2016-9633" ref_url="https://www.suse.com/security/cve/CVE-2016-9633/" source="CVE"/>
		<description>
These are all security issues fixed in the w3m-0.5.3.git20161120-160.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2074/">CVE-2010-2074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9434/">CVE-2016-9434</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9435/">CVE-2016-9435</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9436/">CVE-2016-9436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9437/">CVE-2016-9437</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9438/">CVE-2016-9438</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9439/">CVE-2016-9439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9440/">CVE-2016-9440</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9441/">CVE-2016-9441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9442/">CVE-2016-9442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9443/">CVE-2016-9443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9621/">CVE-2016-9621</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9622/">CVE-2016-9622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9623/">CVE-2016-9623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9624/">CVE-2016-9624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9625/">CVE-2016-9625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9626/">CVE-2016-9626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9627/">CVE-2016-9627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9628/">CVE-2016-9628</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9629/">CVE-2016-9629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9630/">CVE-2016-9630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9631/">CVE-2016-9631</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9632/">CVE-2016-9632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9633/">CVE-2016-9633</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009136644" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77166" version="1" class="patch">
	<metadata>
		<title>wdiff-1.2.1-3.64 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<description>
These are all security issues fixed in the wdiff-1.2.1-3.64 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140672" comment="wdiff-1.2.1-3.64 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77167" version="1" class="patch">
	<metadata>
		<title>wget-1.14-21.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-2252" ref_url="https://www.suse.com/security/cve/CVE-2010-2252/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2014-4877" ref_url="https://www.suse.com/security/cve/CVE-2014-4877/" source="CVE"/>
		<reference ref_id="CVE-2015-2059" ref_url="https://www.suse.com/security/cve/CVE-2015-2059/" source="CVE"/>
		<reference ref_id="CVE-2016-4971" ref_url="https://www.suse.com/security/cve/CVE-2016-4971/" source="CVE"/>
		<reference ref_id="CVE-2016-7098" ref_url="https://www.suse.com/security/cve/CVE-2016-7098/" source="CVE"/>
		<reference ref_id="CVE-2017-13089" ref_url="https://www.suse.com/security/cve/CVE-2017-13089/" source="CVE"/>
		<reference ref_id="CVE-2017-13090" ref_url="https://www.suse.com/security/cve/CVE-2017-13090/" source="CVE"/>
		<reference ref_id="CVE-2017-6508" ref_url="https://www.suse.com/security/cve/CVE-2017-6508/" source="CVE"/>
		<reference ref_id="CVE-2018-0494" ref_url="https://www.suse.com/security/cve/CVE-2018-0494/" source="CVE"/>
		<description>
These are all security issues fixed in the wget-1.14-21.7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2252/">CVE-2010-2252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4877/">CVE-2014-4877</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2059/">CVE-2015-2059</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4971/">CVE-2016-4971</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7098/">CVE-2016-7098</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13089/">CVE-2017-13089</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13090/">CVE-2017-13090</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6508/">CVE-2017-6508</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0494/">CVE-2018-0494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009177348" comment="wget-1.14-21.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77168" version="1" class="patch">
	<metadata>
		<title>wpa_supplicant-2.2-15.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3686" ref_url="https://www.suse.com/security/cve/CVE-2014-3686/" source="CVE"/>
		<reference ref_id="CVE-2015-0210" ref_url="https://www.suse.com/security/cve/CVE-2015-0210/" source="CVE"/>
		<reference ref_id="CVE-2015-1863" ref_url="https://www.suse.com/security/cve/CVE-2015-1863/" source="CVE"/>
		<reference ref_id="CVE-2015-4141" ref_url="https://www.suse.com/security/cve/CVE-2015-4141/" source="CVE"/>
		<reference ref_id="CVE-2015-4142" ref_url="https://www.suse.com/security/cve/CVE-2015-4142/" source="CVE"/>
		<reference ref_id="CVE-2015-4143" ref_url="https://www.suse.com/security/cve/CVE-2015-4143/" source="CVE"/>
		<reference ref_id="CVE-2015-5130" ref_url="https://www.suse.com/security/cve/CVE-2015-5130/" source="CVE"/>
		<reference ref_id="CVE-2015-5310" ref_url="https://www.suse.com/security/cve/CVE-2015-5310/" source="CVE"/>
		<reference ref_id="CVE-2015-8041" ref_url="https://www.suse.com/security/cve/CVE-2015-8041/" source="CVE"/>
		<reference ref_id="CVE-2017-13078" ref_url="https://www.suse.com/security/cve/CVE-2017-13078/" source="CVE"/>
		<reference ref_id="CVE-2017-13079" ref_url="https://www.suse.com/security/cve/CVE-2017-13079/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081/" source="CVE"/>
		<reference ref_id="CVE-2017-13087" ref_url="https://www.suse.com/security/cve/CVE-2017-13087/" source="CVE"/>
		<reference ref_id="CVE-2017-13088" ref_url="https://www.suse.com/security/cve/CVE-2017-13088/" source="CVE"/>
		<description>
These are all security issues fixed in the wpa_supplicant-2.2-15.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3686/">CVE-2014-3686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0210/">CVE-2015-0210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1863/">CVE-2015-1863</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4141/">CVE-2015-4141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4142/">CVE-2015-4142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4143/">CVE-2015-4143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5130/">CVE-2015-5130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5310/">CVE-2015-5310</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8041/">CVE-2015-8041</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13078/">CVE-2017-13078</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13079/">CVE-2017-13079</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13087/">CVE-2017-13087</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13088/">CVE-2017-13088</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009165686" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77169" version="1" class="patch">
	<metadata>
		<title>xalan-j2-2.7.0-264.133 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-0107" ref_url="https://www.suse.com/security/cve/CVE-2014-0107/" source="CVE"/>
		<description>
These are all security issues fixed in the xalan-j2-2.7.0-264.133 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0107/">CVE-2014-0107</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141828" comment="xalan-j2-2.7.0-264.133 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77170" version="1" class="patch">
	<metadata>
		<title>xdg-utils-20140630-6.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-9622" ref_url="https://www.suse.com/security/cve/CVE-2014-9622/" source="CVE"/>
		<reference ref_id="CVE-2017-18266" ref_url="https://www.suse.com/security/cve/CVE-2017-18266/" source="CVE"/>
		<description>
These are all security issues fixed in the xdg-utils-20140630-6.3.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9622/">CVE-2014-9622</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18266/">CVE-2017-18266</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009177962" comment="xdg-utils-20140630-6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77171" version="1" class="patch">
	<metadata>
		<title>xen-4.11.0_08-1.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-1898" ref_url="https://www.suse.com/security/cve/CVE-2011-1898/" source="CVE"/>
		<reference ref_id="CVE-2012-0029" ref_url="https://www.suse.com/security/cve/CVE-2012-0029/" source="CVE"/>
		<reference ref_id="CVE-2012-0217" ref_url="https://www.suse.com/security/cve/CVE-2012-0217/" source="CVE"/>
		<reference ref_id="CVE-2012-2625" ref_url="https://www.suse.com/security/cve/CVE-2012-2625/" source="CVE"/>
		<reference ref_id="CVE-2012-3432" ref_url="https://www.suse.com/security/cve/CVE-2012-3432/" source="CVE"/>
		<reference ref_id="CVE-2012-3433" ref_url="https://www.suse.com/security/cve/CVE-2012-3433/" source="CVE"/>
		<reference ref_id="CVE-2012-4411" ref_url="https://www.suse.com/security/cve/CVE-2012-4411/" source="CVE"/>
		<reference ref_id="CVE-2012-4535" ref_url="https://www.suse.com/security/cve/CVE-2012-4535/" source="CVE"/>
		<reference ref_id="CVE-2012-4536" ref_url="https://www.suse.com/security/cve/CVE-2012-4536/" source="CVE"/>
		<reference ref_id="CVE-2012-4537" ref_url="https://www.suse.com/security/cve/CVE-2012-4537/" source="CVE"/>
		<reference ref_id="CVE-2012-4538" ref_url="https://www.suse.com/security/cve/CVE-2012-4538/" source="CVE"/>
		<reference ref_id="CVE-2012-4539" ref_url="https://www.suse.com/security/cve/CVE-2012-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-4544" ref_url="https://www.suse.com/security/cve/CVE-2012-4544/" source="CVE"/>
		<reference ref_id="CVE-2012-5510" ref_url="https://www.suse.com/security/cve/CVE-2012-5510/" source="CVE"/>
		<reference ref_id="CVE-2012-5511" ref_url="https://www.suse.com/security/cve/CVE-2012-5511/" source="CVE"/>
		<reference ref_id="CVE-2012-5513" ref_url="https://www.suse.com/security/cve/CVE-2012-5513/" source="CVE"/>
		<reference ref_id="CVE-2012-5514" ref_url="https://www.suse.com/security/cve/CVE-2012-5514/" source="CVE"/>
		<reference ref_id="CVE-2012-5515" ref_url="https://www.suse.com/security/cve/CVE-2012-5515/" source="CVE"/>
		<reference ref_id="CVE-2012-5525" ref_url="https://www.suse.com/security/cve/CVE-2012-5525/" source="CVE"/>
		<reference ref_id="CVE-2012-5634" ref_url="https://www.suse.com/security/cve/CVE-2012-5634/" source="CVE"/>
		<reference ref_id="CVE-2012-6075" ref_url="https://www.suse.com/security/cve/CVE-2012-6075/" source="CVE"/>
		<reference ref_id="CVE-2013-0151" ref_url="https://www.suse.com/security/cve/CVE-2013-0151/" source="CVE"/>
		<reference ref_id="CVE-2013-0152" ref_url="https://www.suse.com/security/cve/CVE-2013-0152/" source="CVE"/>
		<reference ref_id="CVE-2013-0153" ref_url="https://www.suse.com/security/cve/CVE-2013-0153/" source="CVE"/>
		<reference ref_id="CVE-2013-1442" ref_url="https://www.suse.com/security/cve/CVE-2013-1442/" source="CVE"/>
		<reference ref_id="CVE-2013-1917" ref_url="https://www.suse.com/security/cve/CVE-2013-1917/" source="CVE"/>
		<reference ref_id="CVE-2013-1918" ref_url="https://www.suse.com/security/cve/CVE-2013-1918/" source="CVE"/>
		<reference ref_id="CVE-2013-1919" ref_url="https://www.suse.com/security/cve/CVE-2013-1919/" source="CVE"/>
		<reference ref_id="CVE-2013-1922" ref_url="https://www.suse.com/security/cve/CVE-2013-1922/" source="CVE"/>
		<reference ref_id="CVE-2013-1952" ref_url="https://www.suse.com/security/cve/CVE-2013-1952/" source="CVE"/>
		<reference ref_id="CVE-2013-2007" ref_url="https://www.suse.com/security/cve/CVE-2013-2007/" source="CVE"/>
		<reference ref_id="CVE-2013-3495" ref_url="https://www.suse.com/security/cve/CVE-2013-3495/" source="CVE"/>
		<reference ref_id="CVE-2013-4355" ref_url="https://www.suse.com/security/cve/CVE-2013-4355/" source="CVE"/>
		<reference ref_id="CVE-2013-4356" ref_url="https://www.suse.com/security/cve/CVE-2013-4356/" source="CVE"/>
		<reference ref_id="CVE-2013-4361" ref_url="https://www.suse.com/security/cve/CVE-2013-4361/" source="CVE"/>
		<reference ref_id="CVE-2013-4375" ref_url="https://www.suse.com/security/cve/CVE-2013-4375/" source="CVE"/>
		<reference ref_id="CVE-2013-4416" ref_url="https://www.suse.com/security/cve/CVE-2013-4416/" source="CVE"/>
		<reference ref_id="CVE-2013-4494" ref_url="https://www.suse.com/security/cve/CVE-2013-4494/" source="CVE"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540/" source="CVE"/>
		<reference ref_id="CVE-2013-4551" ref_url="https://www.suse.com/security/cve/CVE-2013-4551/" source="CVE"/>
		<reference ref_id="CVE-2013-4553" ref_url="https://www.suse.com/security/cve/CVE-2013-4553/" source="CVE"/>
		<reference ref_id="CVE-2013-4554" ref_url="https://www.suse.com/security/cve/CVE-2013-4554/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-3124" ref_url="https://www.suse.com/security/cve/CVE-2014-3124/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-3672" ref_url="https://www.suse.com/security/cve/CVE-2014-3672/" source="CVE"/>
		<reference ref_id="CVE-2014-5146" ref_url="https://www.suse.com/security/cve/CVE-2014-5146/" source="CVE"/>
		<reference ref_id="CVE-2014-5149" ref_url="https://www.suse.com/security/cve/CVE-2014-5149/" source="CVE"/>
		<reference ref_id="CVE-2014-6268" ref_url="https://www.suse.com/security/cve/CVE-2014-6268/" source="CVE"/>
		<reference ref_id="CVE-2014-7154" ref_url="https://www.suse.com/security/cve/CVE-2014-7154/" source="CVE"/>
		<reference ref_id="CVE-2014-7155" ref_url="https://www.suse.com/security/cve/CVE-2014-7155/" source="CVE"/>
		<reference ref_id="CVE-2014-7156" ref_url="https://www.suse.com/security/cve/CVE-2014-7156/" source="CVE"/>
		<reference ref_id="CVE-2014-7188" ref_url="https://www.suse.com/security/cve/CVE-2014-7188/" source="CVE"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-3259" ref_url="https://www.suse.com/security/cve/CVE-2015-3259/" source="CVE"/>
		<reference ref_id="CVE-2015-3340" ref_url="https://www.suse.com/security/cve/CVE-2015-3340/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-4103" ref_url="https://www.suse.com/security/cve/CVE-2015-4103/" source="CVE"/>
		<reference ref_id="CVE-2015-4104" ref_url="https://www.suse.com/security/cve/CVE-2015-4104/" source="CVE"/>
		<reference ref_id="CVE-2015-4105" ref_url="https://www.suse.com/security/cve/CVE-2015-4105/" source="CVE"/>
		<reference ref_id="CVE-2015-4106" ref_url="https://www.suse.com/security/cve/CVE-2015-4106/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339/" source="CVE"/>
		<reference ref_id="CVE-2015-8340" ref_url="https://www.suse.com/security/cve/CVE-2015-8340/" source="CVE"/>
		<reference ref_id="CVE-2015-8341" ref_url="https://www.suse.com/security/cve/CVE-2015-8341/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8554" ref_url="https://www.suse.com/security/cve/CVE-2015-8554/" source="CVE"/>
		<reference ref_id="CVE-2015-8555" ref_url="https://www.suse.com/security/cve/CVE-2015-8555/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567/" source="CVE"/>
		<reference ref_id="CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8615" ref_url="https://www.suse.com/security/cve/CVE-2015-8615/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2016-10013" ref_url="https://www.suse.com/security/cve/CVE-2016-10013/" source="CVE"/>
		<reference ref_id="CVE-2016-10024" ref_url="https://www.suse.com/security/cve/CVE-2016-10024/" source="CVE"/>
		<reference ref_id="CVE-2016-10025" ref_url="https://www.suse.com/security/cve/CVE-2016-10025/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1570" ref_url="https://www.suse.com/security/cve/CVE-2016-1570/" source="CVE"/>
		<reference ref_id="CVE-2016-1571" ref_url="https://www.suse.com/security/cve/CVE-2016-1571/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-2270" ref_url="https://www.suse.com/security/cve/CVE-2016-2270/" source="CVE"/>
		<reference ref_id="CVE-2016-2271" ref_url="https://www.suse.com/security/cve/CVE-2016-2271/" source="CVE"/>
		<reference ref_id="CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391/" source="CVE"/>
		<reference ref_id="CVE-2016-2392" ref_url="https://www.suse.com/security/cve/CVE-2016-2392/" source="CVE"/>
		<reference ref_id="CVE-2016-2538" ref_url="https://www.suse.com/security/cve/CVE-2016-2538/" source="CVE"/>
		<reference ref_id="CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-6258" ref_url="https://www.suse.com/security/cve/CVE-2016-6258/" source="CVE"/>
		<reference ref_id="CVE-2016-6259" ref_url="https://www.suse.com/security/cve/CVE-2016-6259/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="CVE-2016-7092" ref_url="https://www.suse.com/security/cve/CVE-2016-7092/" source="CVE"/>
		<reference ref_id="CVE-2016-7093" ref_url="https://www.suse.com/security/cve/CVE-2016-7093/" source="CVE"/>
		<reference ref_id="CVE-2016-7094" ref_url="https://www.suse.com/security/cve/CVE-2016-7094/" source="CVE"/>
		<reference ref_id="CVE-2016-7777" ref_url="https://www.suse.com/security/cve/CVE-2016-7777/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9377" ref_url="https://www.suse.com/security/cve/CVE-2016-9377/" source="CVE"/>
		<reference ref_id="CVE-2016-9378" ref_url="https://www.suse.com/security/cve/CVE-2016-9378/" source="CVE"/>
		<reference ref_id="CVE-2016-9379" ref_url="https://www.suse.com/security/cve/CVE-2016-9379/" source="CVE"/>
		<reference ref_id="CVE-2016-9380" ref_url="https://www.suse.com/security/cve/CVE-2016-9380/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9382" ref_url="https://www.suse.com/security/cve/CVE-2016-9382/" source="CVE"/>
		<reference ref_id="CVE-2016-9383" ref_url="https://www.suse.com/security/cve/CVE-2016-9383/" source="CVE"/>
		<reference ref_id="CVE-2016-9384" ref_url="https://www.suse.com/security/cve/CVE-2016-9384/" source="CVE"/>
		<reference ref_id="CVE-2016-9385" ref_url="https://www.suse.com/security/cve/CVE-2016-9385/" source="CVE"/>
		<reference ref_id="CVE-2016-9386" ref_url="https://www.suse.com/security/cve/CVE-2016-9386/" source="CVE"/>
		<reference ref_id="CVE-2016-9637" ref_url="https://www.suse.com/security/cve/CVE-2016-9637/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2016-9932" ref_url="https://www.suse.com/security/cve/CVE-2016-9932/" source="CVE"/>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<reference ref_id="CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434/" source="CVE"/>
		<reference ref_id="CVE-2017-12135" ref_url="https://www.suse.com/security/cve/CVE-2017-12135/" source="CVE"/>
		<reference ref_id="CVE-2017-12136" ref_url="https://www.suse.com/security/cve/CVE-2017-12136/" source="CVE"/>
		<reference ref_id="CVE-2017-12137" ref_url="https://www.suse.com/security/cve/CVE-2017-12137/" source="CVE"/>
		<reference ref_id="CVE-2017-12855" ref_url="https://www.suse.com/security/cve/CVE-2017-12855/" source="CVE"/>
		<reference ref_id="CVE-2017-14316" ref_url="https://www.suse.com/security/cve/CVE-2017-14316/" source="CVE"/>
		<reference ref_id="CVE-2017-14317" ref_url="https://www.suse.com/security/cve/CVE-2017-14317/" source="CVE"/>
		<reference ref_id="CVE-2017-14318" ref_url="https://www.suse.com/security/cve/CVE-2017-14318/" source="CVE"/>
		<reference ref_id="CVE-2017-14319" ref_url="https://www.suse.com/security/cve/CVE-2017-14319/" source="CVE"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<reference ref_id="CVE-2017-15588" ref_url="https://www.suse.com/security/cve/CVE-2017-15588/" source="CVE"/>
		<reference ref_id="CVE-2017-15589" ref_url="https://www.suse.com/security/cve/CVE-2017-15589/" source="CVE"/>
		<reference ref_id="CVE-2017-15590" ref_url="https://www.suse.com/security/cve/CVE-2017-15590/" source="CVE"/>
		<reference ref_id="CVE-2017-15591" ref_url="https://www.suse.com/security/cve/CVE-2017-15591/" source="CVE"/>
		<reference ref_id="CVE-2017-15592" ref_url="https://www.suse.com/security/cve/CVE-2017-15592/" source="CVE"/>
		<reference ref_id="CVE-2017-15593" ref_url="https://www.suse.com/security/cve/CVE-2017-15593/" source="CVE"/>
		<reference ref_id="CVE-2017-15594" ref_url="https://www.suse.com/security/cve/CVE-2017-15594/" source="CVE"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-15597" ref_url="https://www.suse.com/security/cve/CVE-2017-15597/" source="CVE"/>
		<reference ref_id="CVE-2017-17563" ref_url="https://www.suse.com/security/cve/CVE-2017-17563/" source="CVE"/>
		<reference ref_id="CVE-2017-17564" ref_url="https://www.suse.com/security/cve/CVE-2017-17564/" source="CVE"/>
		<reference ref_id="CVE-2017-17565" ref_url="https://www.suse.com/security/cve/CVE-2017-17565/" source="CVE"/>
		<reference ref_id="CVE-2017-17566" ref_url="https://www.suse.com/security/cve/CVE-2017-17566/" source="CVE"/>
		<reference ref_id="CVE-2017-18030" ref_url="https://www.suse.com/security/cve/CVE-2017-18030/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="CVE-2017-5526" ref_url="https://www.suse.com/security/cve/CVE-2017-5526/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-9330" ref_url="https://www.suse.com/security/cve/CVE-2017-9330/" source="CVE"/>
		<reference ref_id="CVE-2018-10471" ref_url="https://www.suse.com/security/cve/CVE-2018-10471/" source="CVE"/>
		<reference ref_id="CVE-2018-10472" ref_url="https://www.suse.com/security/cve/CVE-2018-10472/" source="CVE"/>
		<reference ref_id="CVE-2018-10981" ref_url="https://www.suse.com/security/cve/CVE-2018-10981/" source="CVE"/>
		<reference ref_id="CVE-2018-10982" ref_url="https://www.suse.com/security/cve/CVE-2018-10982/" source="CVE"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12891" ref_url="https://www.suse.com/security/cve/CVE-2018-12891/" source="CVE"/>
		<reference ref_id="CVE-2018-12892" ref_url="https://www.suse.com/security/cve/CVE-2018-12892/" source="CVE"/>
		<reference ref_id="CVE-2018-12893" ref_url="https://www.suse.com/security/cve/CVE-2018-12893/" source="CVE"/>
		<reference ref_id="CVE-2018-15469" ref_url="https://www.suse.com/security/cve/CVE-2018-15469/" source="CVE"/>
		<reference ref_id="CVE-2018-15470" ref_url="https://www.suse.com/security/cve/CVE-2018-15470/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="CVE-2018-5683" ref_url="https://www.suse.com/security/cve/CVE-2018-5683/" source="CVE"/>
		<reference ref_id="CVE-2018-7540" ref_url="https://www.suse.com/security/cve/CVE-2018-7540/" source="CVE"/>
		<reference ref_id="CVE-2018-7541" ref_url="https://www.suse.com/security/cve/CVE-2018-7541/" source="CVE"/>
		<reference ref_id="CVE-2018-7542" ref_url="https://www.suse.com/security/cve/CVE-2018-7542/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.11.0_08-1.11 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1898/">CVE-2011-1898</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0029/">CVE-2012-0029</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0217/">CVE-2012-0217</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2625/">CVE-2012-2625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3432/">CVE-2012-3432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3433/">CVE-2012-3433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4411/">CVE-2012-4411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4535/">CVE-2012-4535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4536/">CVE-2012-4536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4537/">CVE-2012-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4538/">CVE-2012-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4539/">CVE-2012-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4544/">CVE-2012-4544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5510/">CVE-2012-5510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5511/">CVE-2012-5511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5513/">CVE-2012-5513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5514/">CVE-2012-5514</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5515/">CVE-2012-5515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5525/">CVE-2012-5525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5634/">CVE-2012-5634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6075/">CVE-2012-6075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0151/">CVE-2013-0151</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0152/">CVE-2013-0152</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0153/">CVE-2013-0153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1442/">CVE-2013-1442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1917/">CVE-2013-1917</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1918/">CVE-2013-1918</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1919/">CVE-2013-1919</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1922/">CVE-2013-1922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1952/">CVE-2013-1952</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2007/">CVE-2013-2007</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3495/">CVE-2013-3495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4355/">CVE-2013-4355</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4356/">CVE-2013-4356</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4361/">CVE-2013-4361</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4375/">CVE-2013-4375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4416/">CVE-2013-4416</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4494/">CVE-2013-4494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4551/">CVE-2013-4551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4553/">CVE-2013-4553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4554/">CVE-2013-4554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3124/">CVE-2014-3124</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3672/">CVE-2014-3672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5146/">CVE-2014-5146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5149/">CVE-2014-5149</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6268/">CVE-2014-6268</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7154/">CVE-2014-7154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7155/">CVE-2014-7155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7156/">CVE-2014-7156</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7188/">CVE-2014-7188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3259/">CVE-2015-3259</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3340/">CVE-2015-3340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4103/">CVE-2015-4103</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4104/">CVE-2015-4104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4105/">CVE-2015-4105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4106/">CVE-2015-4106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8340/">CVE-2015-8340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8341/">CVE-2015-8341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8554/">CVE-2015-8554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8555/">CVE-2015-8555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8615/">CVE-2015-8615</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10013/">CVE-2016-10013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10024/">CVE-2016-10024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10025/">CVE-2016-10025</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1570/">CVE-2016-1570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1571/">CVE-2016-1571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2270/">CVE-2016-2270</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2271/">CVE-2016-2271</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2392/">CVE-2016-2392</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2538/">CVE-2016-2538</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6258/">CVE-2016-6258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6259/">CVE-2016-6259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7092/">CVE-2016-7092</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7093/">CVE-2016-7093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7094/">CVE-2016-7094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7777/">CVE-2016-7777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9377/">CVE-2016-9377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9378/">CVE-2016-9378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9379/">CVE-2016-9379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9380/">CVE-2016-9380</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9382/">CVE-2016-9382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9383/">CVE-2016-9383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9384/">CVE-2016-9384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9385/">CVE-2016-9385</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9386/">CVE-2016-9386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9637/">CVE-2016-9637</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9932/">CVE-2016-9932</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-12135/">CVE-2017-12135</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12136/">CVE-2017-12136</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12137/">CVE-2017-12137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12855/">CVE-2017-12855</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14316/">CVE-2017-14316</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14317/">CVE-2017-14317</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14318/">CVE-2017-14318</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14319/">CVE-2017-14319</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15588/">CVE-2017-15588</cve>
	<cve impact="moderate" cvss3="3.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15589/">CVE-2017-15589</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15590/">CVE-2017-15590</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15591/">CVE-2017-15591</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15592/">CVE-2017-15592</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15593/">CVE-2017-15593</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15594/">CVE-2017-15594</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15597/">CVE-2017-15597</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17563/">CVE-2017-17563</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17564/">CVE-2017-17564</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17565/">CVE-2017-17565</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17566/">CVE-2017-17566</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18030/">CVE-2017-18030</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5526/">CVE-2017-5526</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9330/">CVE-2017-9330</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10471/">CVE-2018-10471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10472/">CVE-2018-10472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10981/">CVE-2018-10981</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-10982/">CVE-2018-10982</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806</cve>
	<cve impact="important" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12891/">CVE-2018-12891</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-12892/">CVE-2018-12892</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12893/">CVE-2018-12893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-15469/">CVE-2018-15469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-15470/">CVE-2018-15470</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5683/">CVE-2018-5683</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7540/">CVE-2018-7540</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7541/">CVE-2018-7541</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7542/">CVE-2018-7542</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512629" comment="xen-4.11.0_08-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512630" comment="xen-libs-4.11.0_08-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512631" comment="xen-libs-32bit-4.11.0_08-1.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77172" version="1" class="patch">
	<metadata>
		<title>xf86-video-intel-2.99.917+git781.c8990575-1.27 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-4910" ref_url="https://www.suse.com/security/cve/CVE-2014-4910/" source="CVE"/>
		<description>
These are all security issues fixed in the xf86-video-intel-2.99.917+git781.c8990575-1.27 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4910/">CVE-2014-4910</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512632" comment="xf86-video-intel-2.99.917+git781.c8990575-1.27 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77173" version="1" class="patch">
	<metadata>
		<title>xfsprogs-4.15.0-1.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-2150" ref_url="https://www.suse.com/security/cve/CVE-2012-2150/" source="CVE"/>
		<description>
These are all security issues fixed in the xfsprogs-4.15.0-1.12 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2150/">CVE-2012-2150</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512633" comment="xfsprogs-4.15.0-1.12 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77174" version="1" class="patch">
	<metadata>
		<title>xinetd-2.3.15-8.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-0862" ref_url="https://www.suse.com/security/cve/CVE-2012-0862/" source="CVE"/>
		<reference ref_id="CVE-2013-4342" ref_url="https://www.suse.com/security/cve/CVE-2013-4342/" source="CVE"/>
		<description>
These are all security issues fixed in the xinetd-2.3.15-8.8.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0862/">CVE-2012-0862</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4342/">CVE-2013-4342</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512634" comment="xinetd-2.3.15-8.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77175" version="1" class="patch">
	<metadata>
		<title>xlockmore-5.43-5.33 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-4143" ref_url="https://www.suse.com/security/cve/CVE-2013-4143/" source="CVE"/>
		<description>
These are all security issues fixed in the xlockmore-5.43-5.33 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4143/">CVE-2013-4143</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141168" comment="xlockmore-5.43-5.33 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77176" version="1" class="patch">
	<metadata>
		<title>xorg-x11-7.6_1-14.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-0465" ref_url="https://www.suse.com/security/cve/CVE-2011-0465/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-7.6_1-14.17 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0465/">CVE-2011-0465</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141834" comment="xorg-x11-7.6_1-14.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141835" comment="xorg-x11-essentials-7.6_1-14.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141171" comment="xrdb-1.1.0-3.58 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77177" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libs-7.6-45.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libs-7.6-45.14 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141836" comment="xorg-x11-libs-7.6-45.14 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77178" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-1.19.6-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-2240" ref_url="https://www.suse.com/security/cve/CVE-2010-2240/" source="CVE"/>
		<reference ref_id="CVE-2013-1940" ref_url="https://www.suse.com/security/cve/CVE-2013-1940/" source="CVE"/>
		<reference ref_id="CVE-2013-4396" ref_url="https://www.suse.com/security/cve/CVE-2013-4396/" source="CVE"/>
		<reference ref_id="CVE-2013-6424" ref_url="https://www.suse.com/security/cve/CVE-2013-6424/" source="CVE"/>
		<reference ref_id="CVE-2014-8091" ref_url="https://www.suse.com/security/cve/CVE-2014-8091/" source="CVE"/>
		<reference ref_id="CVE-2014-8092" ref_url="https://www.suse.com/security/cve/CVE-2014-8092/" source="CVE"/>
		<reference ref_id="CVE-2014-8093" ref_url="https://www.suse.com/security/cve/CVE-2014-8093/" source="CVE"/>
		<reference ref_id="CVE-2014-8094" ref_url="https://www.suse.com/security/cve/CVE-2014-8094/" source="CVE"/>
		<reference ref_id="CVE-2014-8095" ref_url="https://www.suse.com/security/cve/CVE-2014-8095/" source="CVE"/>
		<reference ref_id="CVE-2014-8096" ref_url="https://www.suse.com/security/cve/CVE-2014-8096/" source="CVE"/>
		<reference ref_id="CVE-2014-8097" ref_url="https://www.suse.com/security/cve/CVE-2014-8097/" source="CVE"/>
		<reference ref_id="CVE-2014-8098" ref_url="https://www.suse.com/security/cve/CVE-2014-8098/" source="CVE"/>
		<reference ref_id="CVE-2014-8099" ref_url="https://www.suse.com/security/cve/CVE-2014-8099/" source="CVE"/>
		<reference ref_id="CVE-2014-8100" ref_url="https://www.suse.com/security/cve/CVE-2014-8100/" source="CVE"/>
		<reference ref_id="CVE-2014-8101" ref_url="https://www.suse.com/security/cve/CVE-2014-8101/" source="CVE"/>
		<reference ref_id="CVE-2014-8102" ref_url="https://www.suse.com/security/cve/CVE-2014-8102/" source="CVE"/>
		<reference ref_id="CVE-2014-8103" ref_url="https://www.suse.com/security/cve/CVE-2014-8103/" source="CVE"/>
		<reference ref_id="CVE-2015-0255" ref_url="https://www.suse.com/security/cve/CVE-2015-0255/" source="CVE"/>
		<reference ref_id="CVE-2015-3164" ref_url="https://www.suse.com/security/cve/CVE-2015-3164/" source="CVE"/>
		<reference ref_id="CVE-2015-3418" ref_url="https://www.suse.com/security/cve/CVE-2015-3418/" source="CVE"/>
		<reference ref_id="CVE-2017-12176" ref_url="https://www.suse.com/security/cve/CVE-2017-12176/" source="CVE"/>
		<reference ref_id="CVE-2017-12183" ref_url="https://www.suse.com/security/cve/CVE-2017-12183/" source="CVE"/>
		<reference ref_id="CVE-2017-12187" ref_url="https://www.suse.com/security/cve/CVE-2017-12187/" source="CVE"/>
		<reference ref_id="CVE-2017-13721" ref_url="https://www.suse.com/security/cve/CVE-2017-13721/" source="CVE"/>
		<reference ref_id="CVE-2017-13723" ref_url="https://www.suse.com/security/cve/CVE-2017-13723/" source="CVE"/>
		<reference ref_id="CVE-2017-2624" ref_url="https://www.suse.com/security/cve/CVE-2017-2624/" source="CVE"/>
		<reference ref_id="CVE-2018-14665" ref_url="https://www.suse.com/security/cve/CVE-2018-14665/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-1.19.6-2.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2240/">CVE-2010-2240</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-1940/">CVE-2013-1940</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4396/">CVE-2013-4396</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6424/">CVE-2013-6424</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8091/">CVE-2014-8091</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2014-8092/">CVE-2014-8092</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8093/">CVE-2014-8093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8094/">CVE-2014-8094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8095/">CVE-2014-8095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8096/">CVE-2014-8096</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8097/">CVE-2014-8097</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8098/">CVE-2014-8098</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8099/">CVE-2014-8099</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8100/">CVE-2014-8100</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8101/">CVE-2014-8101</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8102/">CVE-2014-8102</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8103/">CVE-2014-8103</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0255/">CVE-2015-0255</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3164/">CVE-2015-3164</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3418/">CVE-2015-3418</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12176/">CVE-2017-12176</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12183/">CVE-2017-12183</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12187/">CVE-2017-12187</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-13721/">CVE-2017-13721</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13723/">CVE-2017-13723</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-2624/">CVE-2017-2624</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14665/">CVE-2018-14665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512635" comment="xorg-x11-server-1.19.6-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512636" comment="xorg-x11-server-extra-1.19.6-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77179" version="1" class="patch">
	<metadata>
		<title>xscreensaver-5.22-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-8025" ref_url="https://www.suse.com/security/cve/CVE-2015-8025/" source="CVE"/>
		<description>
These are all security issues fixed in the xscreensaver-5.22-7.1 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8025/">CVE-2015-8025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009119273" comment="xscreensaver-5.22-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009119274" comment="xscreensaver-data-5.22-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77180" version="1" class="patch">
	<metadata>
		<title>yast2-3.2.48-3.29.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-3177" ref_url="https://www.suse.com/security/cve/CVE-2011-3177/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-3.2.48-3.29.20 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3177/">CVE-2011-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512637" comment="yast2-3.2.48-3.29.20 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77181" version="1" class="patch">
	<metadata>
		<title>yast2-core-3.3.1-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<reference ref_id="CVE-2011-3177" ref_url="https://www.suse.com/security/cve/CVE-2011-3177/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-core-3.3.1-1.7 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3177/">CVE-2011-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512638" comment="yast2-core-3.3.1-1.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77182" version="1" class="patch">
	<metadata>
		<title>yast2-users-3.2.17-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2016-1601" ref_url="https://www.suse.com/security/cve/CVE-2016-1601/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-users-3.2.17-1.5 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1601/">CVE-2016-1601</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512639" comment="yast2-users-3.2.17-1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77183" version="1" class="patch">
	<metadata>
		<title>yubikey-manager-0.6.0-1.27 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-15631" ref_url="https://www.suse.com/security/cve/CVE-2017-15631/" source="CVE"/>
		<description>
These are all security issues fixed in the yubikey-manager-0.6.0-1.27 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-15631/">CVE-2017-15631</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512640" comment="yubikey-manager-0.6.0-1.27 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77184" version="1" class="patch">
	<metadata>
		<title>zoo-2.10-1020.62 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-0855" ref_url="https://www.suse.com/security/cve/CVE-2006-0855/" source="CVE"/>
		<reference ref_id="CVE-2007-1669" ref_url="https://www.suse.com/security/cve/CVE-2007-1669/" source="CVE"/>
		<description>
These are all security issues fixed in the zoo-2.10-1020.62 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-0855/">CVE-2006-0855</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1669/">CVE-2007-1669</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512004" comment="zoo-2.10-1020.62 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77185" version="1" class="patch">
	<metadata>
		<title>zsh-5.0.5-6.7.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-10070" ref_url="https://www.suse.com/security/cve/CVE-2014-10070/" source="CVE"/>
		<reference ref_id="CVE-2014-10071" ref_url="https://www.suse.com/security/cve/CVE-2014-10071/" source="CVE"/>
		<reference ref_id="CVE-2014-10072" ref_url="https://www.suse.com/security/cve/CVE-2014-10072/" source="CVE"/>
		<reference ref_id="CVE-2016-10714" ref_url="https://www.suse.com/security/cve/CVE-2016-10714/" source="CVE"/>
		<reference ref_id="CVE-2017-18205" ref_url="https://www.suse.com/security/cve/CVE-2017-18205/" source="CVE"/>
		<reference ref_id="CVE-2018-1071" ref_url="https://www.suse.com/security/cve/CVE-2018-1071/" source="CVE"/>
		<reference ref_id="CVE-2018-1083" ref_url="https://www.suse.com/security/cve/CVE-2018-1083/" source="CVE"/>
		<reference ref_id="CVE-2018-7549" ref_url="https://www.suse.com/security/cve/CVE-2018-7549/" source="CVE"/>
		<description>
These are all security issues fixed in the zsh-5.0.5-6.7.2 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-10070/">CVE-2014-10070</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-10071/">CVE-2014-10071</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-10072/">CVE-2014-10072</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10714/">CVE-2016-10714</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18205/">CVE-2017-18205</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1071/">CVE-2018-1071</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1083/">CVE-2018-1083</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7549/">CVE-2018-7549</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512641" comment="zsh-5.0.5-6.7.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77186" version="1" class="patch">
	<metadata>
		<title>zypper-1.13.45-21.23.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="CVE-2017-7436" ref_url="https://www.suse.com/security/cve/CVE-2017-7436/" source="CVE"/>
		<reference ref_id="CVE-2017-9269" ref_url="https://www.suse.com/security/cve/CVE-2017-9269/" source="CVE"/>
		<description>
These are all security issues fixed in the zypper-1.13.45-21.23.4 package on the GA media of SUSE Linux Enterprise Desktop 12 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7436/">CVE-2017-7436</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2017-9269/">CVE-2017-9269</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009512642" comment="zypper-1.13.45-21.23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512643" comment="zypper-log-1.13.45-21.23.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77187" version="1" class="patch">
	<metadata>
		<title>Security update for tigervnc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="900896" ref_url="https://bugzilla.suse.com/900896" source="BUGZILLA"/>
		<reference ref_id="906922" ref_url="https://bugzilla.suse.com/906922" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8240" ref_url="https://www.suse.com/security/cve/CVE-2014-8240/" source="CVE"/>
		<description>
This update for tigervnc provides the following fixes:

- Fixed integer overflow flaw, leading to a heap-based buffer overflow in screen size handling. (CVE-2014-8240)
- Send correctly keys that don't type any characters, such as CTRL+Space. (bnc#906922)
		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-05"/>
	<updated date="2014-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/900896">SUSE bug 900896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906922">SUSE bug 906922</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8240/">CVE-2014-8240</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514361" comment="tigervnc-1.3.0-22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514362" comment="xorg-x11-Xvnc-1.3.0-22.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77188" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="903204" ref_url="https://bugzilla.suse.com/903204" source="BUGZILLA"/>
		<reference ref_id="903216" ref_url="https://bugzilla.suse.com/903216" source="BUGZILLA"/>
		<reference ref_id="903638" ref_url="https://bugzilla.suse.com/903638" source="BUGZILLA"/>
		<reference ref_id="905260" ref_url="https://bugzilla.suse.com/905260" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8354" ref_url="https://www.suse.com/security/cve/CVE-2014-8354/" source="CVE"/>
		<reference ref_id="CVE-2014-8355" ref_url="https://www.suse.com/security/cve/CVE-2014-8355/" source="CVE"/>
		<reference ref_id="CVE-2014-8562" ref_url="https://www.suse.com/security/cve/CVE-2014-8562/" source="CVE"/>
		<reference ref_id="CVE-2014-8716" ref_url="https://www.suse.com/security/cve/CVE-2014-8716/" source="CVE"/>
		<description>

ImageMagick was updated to fix four security issues.

These security issues were fixed:
- Crafted JPEG file could lead to DOS (CVE-2014-8716).
- Out-of-bounds memory access in PCX parser (CVE-2014-8355).
- Out-of-bounds memory access in resize code (CVE-2014-8354).
- Out-of-bounds memory error in DCM decode (CVE-2014-8562).
  		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-02"/>
	<updated date="2014-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/903204">SUSE bug 903204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903216">SUSE bug 903216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903638">SUSE bug 903638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905260">SUSE bug 905260</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8354/">CVE-2014-8354</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8355/">CVE-2014-8355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8562/">CVE-2014-8562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8716/">CVE-2014-8716</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514363" comment="ImageMagick-6.8.8.1-8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514364" comment="libMagick++-6_Q16-3-6.8.8.1-8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514365" comment="libMagickCore-6_Q16-1-6.8.8.1-8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514366" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514367" comment="libMagickWand-6_Q16-1-6.8.8.1-8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77189" version="1" class="patch">
	<metadata>
		<title>Security update for pidgin (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="902408" ref_url="https://bugzilla.suse.com/902408" source="BUGZILLA"/>
		<reference ref_id="902409" ref_url="https://bugzilla.suse.com/902409" source="BUGZILLA"/>
		<reference ref_id="902410" ref_url="https://bugzilla.suse.com/902410" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3695" ref_url="https://www.suse.com/security/cve/CVE-2014-3695/" source="CVE"/>
		<reference ref_id="CVE-2014-3696" ref_url="https://www.suse.com/security/cve/CVE-2014-3696/" source="CVE"/>
		<reference ref_id="CVE-2014-3698" ref_url="https://www.suse.com/security/cve/CVE-2014-3698/" source="CVE"/>
		<description>
This pidgin security update fixes the following issues:

- bnc#902408: remote information leak via crafted XMPP message. 
  (CVE-2014-3698)
- bnc#902410: denial of service parsing Groupwise server message. 
  (CVE-2014-3696)
- bnc#902409: crash in MXit protocol plug-in. (CVE-2014-3695)
		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-02"/>
	<updated date="2014-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/902408">SUSE bug 902408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902409">SUSE bug 902409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902410">SUSE bug 902410</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3695/">CVE-2014-3695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3696/">CVE-2014-3696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3698/">CVE-2014-3698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514368" comment="finch-2.10.9-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514369" comment="libpurple-2.10.9-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514370" comment="libpurple-lang-2.10.9-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514371" comment="libpurple-meanwhile-2.10.9-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514372" comment="libpurple-tcl-2.10.9-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514373" comment="pidgin-2.10.9-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77190" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="904603" ref_url="https://bugzilla.suse.com/904603" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8564" ref_url="https://www.suse.com/security/cve/CVE-2014-8564/" source="CVE"/>
		<description>
gnutls was updated to fix one security issue.
	  
- Fixed parsing problem in elliptic curve blobs over TLS that could lead to remote
  crashes (CVE-2014-8564).
		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-02"/>
	<updated date="2014-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/904603">SUSE bug 904603</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8564/">CVE-2014-8564</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514374" comment="gnutls-3.2.15-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514375" comment="libgnutls28-3.2.15-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514376" comment="libgnutls28-32bit-3.2.15-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77191" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="909219" ref_url="https://bugzilla.suse.com/909219" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0580" ref_url="https://www.suse.com/security/cve/CVE-2014-0580/" source="CVE"/>
		<reference ref_id="CVE-2014-0587" ref_url="https://www.suse.com/security/cve/CVE-2014-0587/" source="CVE"/>
		<reference ref_id="CVE-2014-8443" ref_url="https://www.suse.com/security/cve/CVE-2014-8443/" source="CVE"/>
		<reference ref_id="CVE-2014-9162" ref_url="https://www.suse.com/security/cve/CVE-2014-9162/" source="CVE"/>
		<reference ref_id="CVE-2014-9163" ref_url="https://www.suse.com/security/cve/CVE-2014-9163/" source="CVE"/>
		<reference ref_id="CVE-2014-9164" ref_url="https://www.suse.com/security/cve/CVE-2014-9164/" source="CVE"/>
		<description>
This flash-player security version update fixes the following issues:

- Security update to 11.2.202.425 (bsc#909219):
  * APSB14-27, CVE-2014-0580, CVE-2014-0587, CVE-2014-8443,
    CVE-2014-9162, CVE-2014-9163, CVE-2014-9164
		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-12"/>
	<updated date="2014-12-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/909219">SUSE bug 909219</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0580/">CVE-2014-0580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0587/">CVE-2014-0587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8443/">CVE-2014-8443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9162/">CVE-2014-9162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9163/">CVE-2014-9163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9164/">CVE-2014-9164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514377" comment="flash-player-11.2.202.425-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514378" comment="flash-player-gnome-11.2.202.425-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77192" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="658010" ref_url="https://bugzilla.suse.com/658010" source="BUGZILLA"/>
		<reference ref_id="907456" ref_url="https://bugzilla.suse.com/907456" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9112" ref_url="https://www.suse.com/security/cve/CVE-2014-9112/" source="CVE"/>
		<description>

This cpio security update fixes the following buffer overflow issue and
two non security issues:

- fix an OOB write with cpio -i (bnc#907456) (CVE-2014-9112)
- prevent cpio from extracting over a symlink (bnc#658010)
- fix a truncation check in mt
		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-02"/>
	<updated date="2014-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/658010">SUSE bug 658010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907456">SUSE bug 907456</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9112/">CVE-2014-9112</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514379" comment="cpio-2.11-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514380" comment="cpio-lang-2.11-29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77193" version="1" class="patch">
	<metadata>
		<title>Security update for mailx (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="909208" ref_url="https://bugzilla.suse.com/909208" source="BUGZILLA"/>
		<reference ref_id="CVE-2004-2771" ref_url="https://www.suse.com/security/cve/CVE-2004-2771/" source="CVE"/>
		<reference ref_id="CVE-2014-7844" ref_url="https://www.suse.com/security/cve/CVE-2014-7844/" source="CVE"/>
		<description>

This mailx update fixes the following security and non security issues:

- bsc#909208: shell command injection via crafted email addresses
  (CVE-2004-2771, CVE-2014-7844)
- Correct comment in spec file 		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-11"/>
	<updated date="2014-12-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/909208">SUSE bug 909208</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2004-2771/">CVE-2004-2771</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-7844/">CVE-2014-7844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514381" comment="mailx-12.5-22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77194" version="1" class="patch">
	<metadata>
		<title>Security update for flac (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="906831" ref_url="https://bugzilla.suse.com/906831" source="BUGZILLA"/>
		<reference ref_id="907016" ref_url="https://bugzilla.suse.com/907016" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8962" ref_url="https://www.suse.com/security/cve/CVE-2014-8962/" source="CVE"/>
		<reference ref_id="CVE-2014-9028" ref_url="https://www.suse.com/security/cve/CVE-2014-9028/" source="CVE"/>
		<description>
flac was updated to fix two security issues.

These security issues were fixed:
- Stack overflow may result in arbitrary code execution (CVE-2014-8962).
- Heap overflow via specially crafted .flac files (CVE-2014-9028).
  		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-01"/>
	<updated date="2014-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/906831">SUSE bug 906831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907016">SUSE bug 907016</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8962/">CVE-2014-8962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9028/">CVE-2014-9028</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514382" comment="libFLAC8-1.3.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514383" comment="libFLAC8-32bit-1.3.0-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77195" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="910764" ref_url="https://bugzilla.suse.com/910764" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9295" ref_url="https://www.suse.com/security/cve/CVE-2014-9295/" source="CVE"/>
		<reference ref_id="CVE-2014-9296" ref_url="https://www.suse.com/security/cve/CVE-2014-9296/" source="CVE"/>
		<description>

The network timeservice ntp was updated to fix critical security
issues (bnc#910764, CERT VU#852879)

* A potential remote code execution problem was found inside
  ntpd. The functions crypto_recv() (when using autokey
  authentication), ctl_putdata(), and configure() where updated
  to avoid buffer overflows that could be
  exploited. (CVE-2014-9295)
* Furthermore a problem inside the ntpd error handling was found
  that is missing a return statement. This could also lead to a
  potentially attack vector. (CVE-2014-9296)
		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-19"/>
	<updated date="2014-12-19"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/910764">SUSE bug 910764</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9295/">CVE-2014-9295</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9296/">CVE-2014-9296</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514384" comment="ntp-4.2.6p5-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514385" comment="ntp-doc-4.2.6p5-31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77196" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="907764" ref_url="https://bugzilla.suse.com/907764" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8104" ref_url="https://www.suse.com/security/cve/CVE-2014-8104/" source="CVE"/>
		<description>

A remote denial of service attack against openvpn was fixed, where
a authenticated client cloud stop the server by triggering
a server-side ASSERT (CVE-2014-8104),
		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-01"/>
	<updated date="2014-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/907764">SUSE bug 907764</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8104/">CVE-2014-8104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514386" comment="openvpn-2.3.2-11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77197" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="904017" ref_url="https://bugzilla.suse.com/904017" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3636" ref_url="https://www.suse.com/security/cve/CVE-2014-3636/" source="CVE"/>
		<reference ref_id="CVE-2014-7824" ref_url="https://www.suse.com/security/cve/CVE-2014-7824/" source="CVE"/>
		<description>
dbus-1 was updated to version 1.8.12 to fix one security issue.

This security issue was fixed:
- Increase dbus-daemons RLIMIT_NOFILE rlimit to 65536 to stop an attacker from
  exhausting the file descriptors of the system bus (CVE-2014-7824).

Note: This already includes the fix for the regression that was introduced by 
the first fix for CVE-2014-7824 in 1.8.10.

On fast systems where local users are considered particularly
hostile, administrators can return to the 5 second timeout
(or any other value in milliseconds) by saving this as
/etc/dbus-1/system-local.conf:
&lt;busconfig&gt;
&lt;limit name='auth_timeout'&gt;5000&lt;/limit&gt;
&lt;/busconfig&gt;
		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-23"/>
	<updated date="2014-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/904017">SUSE bug 904017</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3636/">CVE-2014-3636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7824/">CVE-2014-7824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514387" comment="dbus-1-1.8.12-6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514388" comment="dbus-1-x11-1.8.12-6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514389" comment="libdbus-1-3-1.8.12-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514390" comment="libdbus-1-3-32bit-1.8.12-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77198" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="905870" ref_url="https://bugzilla.suse.com/905870" source="BUGZILLA"/>
		<reference ref_id="905871" ref_url="https://bugzilla.suse.com/905871" source="BUGZILLA"/>
		<reference ref_id="905872" ref_url="https://bugzilla.suse.com/905872" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8767" ref_url="https://www.suse.com/security/cve/CVE-2014-8767/" source="CVE"/>
		<reference ref_id="CVE-2014-8768" ref_url="https://www.suse.com/security/cve/CVE-2014-8768/" source="CVE"/>
		<reference ref_id="CVE-2014-8769" ref_url="https://www.suse.com/security/cve/CVE-2014-8769/" source="CVE"/>
		<description>
This tcpdump update fixes the following security issues:

- fix CVE-2014-8767 (bnc#905870)
  * denial of service in verbose mode using malformed OLSR payload
- fix CVE-2014-8768 (bnc#905871)
  * denial of service in verbose mode using malformed Geonet payload
- fix CVE-2014-8769 (bnc#905872)
  * unreliable output using malformed AOVD payload
		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-15"/>
	<updated date="2014-12-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/905870">SUSE bug 905870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905871">SUSE bug 905871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905872">SUSE bug 905872</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8767/">CVE-2014-8767</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8768/">CVE-2014-8768</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8769/">CVE-2014-8769</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514391" comment="tcpdump-4.5.1-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77199" version="1" class="patch">
	<metadata>
		<title>Security update for libssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="910790" ref_url="https://bugzilla.suse.com/910790" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8132" ref_url="https://www.suse.com/security/cve/CVE-2014-8132/" source="CVE"/>
		<description>
This libssh update fixes the following security issue:

- bsc#910790: Double free on dangling pointers in initial key exchange
  packet (CVE-2014-8132).
		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-22"/>
	<updated date="2014-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/910790">SUSE bug 910790</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8132/">CVE-2014-8132</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514392" comment="libssh4-0.6.3-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77200" version="1" class="patch">
	<metadata>
		<title>Security update for libreoffice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="884942" ref_url="https://bugzilla.suse.com/884942" source="BUGZILLA"/>
		<reference ref_id="907636" ref_url="https://bugzilla.suse.com/907636" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9093" ref_url="https://www.suse.com/security/cve/CVE-2014-9093/" source="CVE"/>
		<description>
This libreoffice update fixes the following security and non security
issues:

- Version bump to 4.3.5 release:
  * Various small fixes
  * Fix for CVE-2014-9093 bnc#907636
- Remove dangling symlinks from previous versions bnc#884942
		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-19"/>
	<updated date="2014-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/884942">SUSE bug 884942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907636">SUSE bug 907636</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9093/">CVE-2014-9093</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514393" comment="libreoffice-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514394" comment="libreoffice-base-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514395" comment="libreoffice-base-drivers-mysql-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514396" comment="libreoffice-base-drivers-postgresql-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514397" comment="libreoffice-calc-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514398" comment="libreoffice-calc-extensions-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514399" comment="libreoffice-draw-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514400" comment="libreoffice-filters-optional-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514401" comment="libreoffice-gnome-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514402" comment="libreoffice-icon-theme-tango-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514403" comment="libreoffice-impress-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514404" comment="libreoffice-l10n-af-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514405" comment="libreoffice-l10n-ar-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514406" comment="libreoffice-l10n-ca-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514407" comment="libreoffice-l10n-cs-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514408" comment="libreoffice-l10n-da-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514409" comment="libreoffice-l10n-de-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514410" comment="libreoffice-l10n-en-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514411" comment="libreoffice-l10n-es-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514412" comment="libreoffice-l10n-fi-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514413" comment="libreoffice-l10n-fr-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514414" comment="libreoffice-l10n-gu-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514415" comment="libreoffice-l10n-hi-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514416" comment="libreoffice-l10n-hu-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514417" comment="libreoffice-l10n-it-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514418" comment="libreoffice-l10n-ja-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514419" comment="libreoffice-l10n-ko-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514420" comment="libreoffice-l10n-nb-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514421" comment="libreoffice-l10n-nl-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514422" comment="libreoffice-l10n-nn-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514423" comment="libreoffice-l10n-pl-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514424" comment="libreoffice-l10n-pt-BR-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514425" comment="libreoffice-l10n-pt-PT-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514426" comment="libreoffice-l10n-ru-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514427" comment="libreoffice-l10n-sk-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514428" comment="libreoffice-l10n-sv-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514429" comment="libreoffice-l10n-xh-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514430" comment="libreoffice-l10n-zh-Hans-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514431" comment="libreoffice-l10n-zh-Hant-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514432" comment="libreoffice-l10n-zu-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514433" comment="libreoffice-mailmerge-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514434" comment="libreoffice-math-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514435" comment="libreoffice-officebean-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514436" comment="libreoffice-pyuno-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514437" comment="libreoffice-writer-4.3.5.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514438" comment="libreoffice-writer-extensions-4.3.5.2-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77201" version="1" class="patch">
	<metadata>
		<title>Security update for file (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="910252" ref_url="https://bugzilla.suse.com/910252" source="BUGZILLA"/>
		<reference ref_id="910253" ref_url="https://bugzilla.suse.com/910253" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8116" ref_url="https://www.suse.com/security/cve/CVE-2014-8116/" source="CVE"/>
		<reference ref_id="CVE-2014-8117" ref_url="https://www.suse.com/security/cve/CVE-2014-8117/" source="CVE"/>
		<description>
This file update fixes the following security issues:

- bsc#910252: multiple denial of service issues (resource consumption)
              (CVE-2014-8116)
- bsc#910253: denial of service issue (resource consumption)
              (CVE-2014-8117)
		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-19"/>
	<updated date="2014-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/910252">SUSE bug 910252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910253">SUSE bug 910253</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8116/">CVE-2014-8116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8117/">CVE-2014-8117</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514439" comment="file-5.19-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514440" comment="file-magic-5.19-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514441" comment="libmagic1-5.19-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514442" comment="libmagic1-32bit-5.19-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77202" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="901334" ref_url="https://bugzilla.suse.com/901334" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0558" ref_url="https://www.suse.com/security/cve/CVE-2014-0558/" source="CVE"/>
		<reference ref_id="CVE-2014-0564" ref_url="https://www.suse.com/security/cve/CVE-2014-0564/" source="CVE"/>
		<reference ref_id="CVE-2014-0569" ref_url="https://www.suse.com/security/cve/CVE-2014-0569/" source="CVE"/>
		<description>

Adobe Flash Player was updated to 11.2.202.411, fixing security issues and bugs.

For more information please read:
	http://helpx.adobe.com/security/products/flash-player/apsb14-22.html
		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-04"/>
	<updated date="2014-11-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/901334">SUSE bug 901334</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0558/">CVE-2014-0558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0564/">CVE-2014-0564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0569/">CVE-2014-0569</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514443" comment="flash-player-11.2.202.411-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514444" comment="flash-player-gnome-11.2.202.411-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77203" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="901242" ref_url="https://bugzilla.suse.com/901242" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-6457" ref_url="https://www.suse.com/security/cve/CVE-2014-6457/" source="CVE"/>
		<reference ref_id="CVE-2014-6502" ref_url="https://www.suse.com/security/cve/CVE-2014-6502/" source="CVE"/>
		<reference ref_id="CVE-2014-6504" ref_url="https://www.suse.com/security/cve/CVE-2014-6504/" source="CVE"/>
		<reference ref_id="CVE-2014-6506" ref_url="https://www.suse.com/security/cve/CVE-2014-6506/" source="CVE"/>
		<reference ref_id="CVE-2014-6511" ref_url="https://www.suse.com/security/cve/CVE-2014-6511/" source="CVE"/>
		<reference ref_id="CVE-2014-6512" ref_url="https://www.suse.com/security/cve/CVE-2014-6512/" source="CVE"/>
		<reference ref_id="CVE-2014-6513" ref_url="https://www.suse.com/security/cve/CVE-2014-6513/" source="CVE"/>
		<reference ref_id="CVE-2014-6517" ref_url="https://www.suse.com/security/cve/CVE-2014-6517/" source="CVE"/>
		<reference ref_id="CVE-2014-6519" ref_url="https://www.suse.com/security/cve/CVE-2014-6519/" source="CVE"/>
		<reference ref_id="CVE-2014-6531" ref_url="https://www.suse.com/security/cve/CVE-2014-6531/" source="CVE"/>
		<reference ref_id="CVE-2014-6558" ref_url="https://www.suse.com/security/cve/CVE-2014-6558/" source="CVE"/>
		<description>

OpenJDK was updated to icedtea 2.5.3 (OpenJDK 7u71) fixing security issues and bugs.

* Security:
- S8015256: Better class accessibility
- S8022783, CVE-2014-6504: Optimize C2 optimizations
- S8035162: Service printing service
- S8035781: Improve equality for annotations
- S8036805: Correct linker method lookup.
- S8036810: Correct linker field lookup
- S8036936: Use local locales
- S8037066, CVE-2014-6457: Secure transport layer
- S8037846, CVE-2014-6558: Ensure streaming of input cipher streams
- S8038364: Use certificate exceptions correctly
- S8038899: Safer safepoints
- S8038903: More native monitor monitoring
- S8038908: Make Signature more robust
- S8038913: Bolster XML support
- S8039509, CVE-2014-6512: Wrap sockets more thoroughly
- S8039533, CVE-2014-6517: Higher resolution resolvers
- S8041540, CVE-2014-6511: Better use of pages in font processing
- S8041529: Better parameterization of parameter lists
- S8041545: Better validation of generated rasters
- S8041564, CVE-2014-6506: Improved management of logger resources
- S8041717, CVE-2014-6519: Issue with class file parser
- S8042609, CVE-2014-6513: Limit splashiness of splash images
- S8042797, CVE-2014-6502: Avoid strawberries in LogRecord
- S8044274, CVE-2014-6531: Proper property processing

* Backports:
- S4963723: Implement SHA-224
- S7044060: Need to support NSA Suite B Cryptography algorithms
- S7122142: (ann) Race condition between isAnnotationPresent
  and getAnnotations
- S7160837: DigestOutputStream does not turn off digest
  calculation when 'close()' is called
- S8006935: Need to take care of long secret keys in HMAC/PRF
  computation
- S8012637: Adjust CipherInputStream class to work in AEAD/GCM mode
- S8028192: Use of PKCS11-NSS provider in FIPS mode broken
- S8038000: java.awt.image.RasterFormatException: Incorrect scanline stride
- S8039396: NPE when writing a class descriptor object to a
  custom ObjectOutputStream
- S8042603: 'SafepointPollOffset' was not declared in static member
  function 'static bool Arguments::check_vm_args_consistency()'
- S8042850: Extra unused entries in ICU ScriptCodes enum
- S8052162: REGRESSION: sun/java2d/cmm/ColorConvertOp tests fail
  since 7u71 b01
- S8053963: (dc) Use DatagramChannel.receive() instead of read()
  in connect()
- S8055176: 7u71 l10n resource file translation update

* Bugfixes:
- PR1988: C++ Interpreter should no longer be used on ppc64
- PR1989: Make jdk_generic_profile.sh handle missing programs
  better and be more verbose
- PR1992, RH735336: Support retrieving proxy settings on GNOME 3.12.2
- PR2000: Synchronise HEAD tarball paths with release branch paths
- PR2002: Fix references to hotspot.map following PR2000
- PR2003: --disable-system-gtk option broken by refactoring in PR1736
- PR2009: Checksum of policy JAR files changes on every build
- PR2014: Use version from hotspot.map to create tarball filename
- PR2015: Update hotspot.map documentation in INSTALL
- PR2025: LCMS_CFLAGS and LCMS_LIBS should not be used unless
  SYSTEM_LCMS is enabled
- RH1015432: java-1.7.0-openjdk: Fails on PPC with StackOverflowError
  (revised comprehensive fix)

* CACAO
- PR2030, G453612, CA172: ARM hardfloat support for CACAO

* AArch64 port
- AArch64 C2 instruct for smull
- Add frame anchor fences.
- Add MacroAssembler::maybe_isb()
- Add missing instruction synchronization barriers and cache flushes.
- Add support for a few simple intrinsics
- Add support for builtin crc32 instructions
- Add support for Neon implementation of CRC32
- All address constants are 48 bits in size.
- array load must only read 32 bits
- Define uabs().  Use it everywhere an absolute value is wanted.
- Fast string comparison
- Fast String.equals()
- Fix register usage in generate_verify_oop().
- Fix thinko in Atomic::xchg_ptr.
- Fix typo in fsqrts
- Improve C1 performance improvements in ic_cache checks
- Performance improvement and ease of use changes pulled from upstream
- Remove obsolete C1 patching code.
- Replace hotspot jtreg test suite with tests from jdk7u
- S8024648: 7141246 breaks Zero port
- Save intermediate state before removing C1 patching code.
- Unwind native AArch64 frames.
- Use 2- and 3-instruction immediate form of movoop and mov_metadata
  in C2-generated code.
- Various concurrency fixes.
		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-04"/>
	<updated date="2014-11-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6457/">CVE-2014-6457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6502/">CVE-2014-6502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6504/">CVE-2014-6504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6506/">CVE-2014-6506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6511/">CVE-2014-6511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6512/">CVE-2014-6512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6513/">CVE-2014-6513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6517/">CVE-2014-6517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6519/">CVE-2014-6519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6531/">CVE-2014-6531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6558/">CVE-2014-6558</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514445" comment="java-1_7_0-openjdk-1.7.0.71-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514446" comment="java-1_7_0-openjdk-headless-1.7.0.71-6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77204" version="1" class="patch">
	<metadata>
		<title>update for rsyslog (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="890228" ref_url="https://bugzilla.suse.com/890228" source="BUGZILLA"/>
		<reference ref_id="899756" ref_url="https://bugzilla.suse.com/899756" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3634" ref_url="https://www.suse.com/security/cve/CVE-2014-3634/" source="CVE"/>
		<reference ref_id="CVE-2014-3683" ref_url="https://www.suse.com/security/cve/CVE-2014-3683/" source="CVE"/>
		<description>
This update for rsyslog provides the following fixes:

- Fixed remote PRI DoS vulnerability patch (CVE-2014-3683, bnc#899756)
- Removed broken, unsupported and dropped by upstream zpipe utility from rsyslog-diag-tools package (bnc#890228)
		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-28"/>
	<updated date="2014-10-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/890228">SUSE bug 890228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899756">SUSE bug 899756</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3634/">CVE-2014-3634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3683/">CVE-2014-3683</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514447" comment="rsyslog-8.4.0-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77205" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="902709" ref_url="https://bugzilla.suse.com/902709" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4877" ref_url="https://www.suse.com/security/cve/CVE-2014-4877/" source="CVE"/>
		<description>
wget was updated to fix one security issue.
	  
This security issue was fixed:
- FTP symlink arbitrary filesystem access (CVE-2014-4877).
		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-05"/>
	<updated date="2014-11-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/902709">SUSE bug 902709</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4877/">CVE-2014-4877</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514448" comment="wget-1.14-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77206" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="905032" ref_url="https://bugzilla.suse.com/905032" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0573" ref_url="https://www.suse.com/security/cve/CVE-2014-0573/" source="CVE"/>
		<reference ref_id="CVE-2014-0574" ref_url="https://www.suse.com/security/cve/CVE-2014-0574/" source="CVE"/>
		<reference ref_id="CVE-2014-0576" ref_url="https://www.suse.com/security/cve/CVE-2014-0576/" source="CVE"/>
		<reference ref_id="CVE-2014-0577" ref_url="https://www.suse.com/security/cve/CVE-2014-0577/" source="CVE"/>
		<reference ref_id="CVE-2014-0581" ref_url="https://www.suse.com/security/cve/CVE-2014-0581/" source="CVE"/>
		<reference ref_id="CVE-2014-0582" ref_url="https://www.suse.com/security/cve/CVE-2014-0582/" source="CVE"/>
		<reference ref_id="CVE-2014-0583" ref_url="https://www.suse.com/security/cve/CVE-2014-0583/" source="CVE"/>
		<reference ref_id="CVE-2014-0584" ref_url="https://www.suse.com/security/cve/CVE-2014-0584/" source="CVE"/>
		<reference ref_id="CVE-2014-0585" ref_url="https://www.suse.com/security/cve/CVE-2014-0585/" source="CVE"/>
		<reference ref_id="CVE-2014-0586" ref_url="https://www.suse.com/security/cve/CVE-2014-0586/" source="CVE"/>
		<reference ref_id="CVE-2014-0588" ref_url="https://www.suse.com/security/cve/CVE-2014-0588/" source="CVE"/>
		<reference ref_id="CVE-2014-0589" ref_url="https://www.suse.com/security/cve/CVE-2014-0589/" source="CVE"/>
		<reference ref_id="CVE-2014-0590" ref_url="https://www.suse.com/security/cve/CVE-2014-0590/" source="CVE"/>
		<reference ref_id="CVE-2014-8437" ref_url="https://www.suse.com/security/cve/CVE-2014-8437/" source="CVE"/>
		<reference ref_id="CVE-2014-8438" ref_url="https://www.suse.com/security/cve/CVE-2014-8438/" source="CVE"/>
		<reference ref_id="CVE-2014-8440" ref_url="https://www.suse.com/security/cve/CVE-2014-8440/" source="CVE"/>
		<reference ref_id="CVE-2014-8441" ref_url="https://www.suse.com/security/cve/CVE-2014-8441/" source="CVE"/>
		<reference ref_id="CVE-2014-8442" ref_url="https://www.suse.com/security/cve/CVE-2014-8442/" source="CVE"/>
		<description>
flash-player was updated to version 11.2.202.418 to fix 18 security issues.

These security issues were fixed:
- Memory corruption vulnerabilities that could lead to code execution (CVE-2014-0576, CVE-2014-0581, CVE-2014-8440, CVE-2014-8441).
- Use-after-free vulnerabilities that could lead to code execution (CVE-2014-0573, CVE-2014-0588, CVE-2014-8438).
- A double free vulnerability that could lead to code execution (CVE-2014-0574).
- Type confusion vulnerabilities that could lead to code execution (CVE-2014-0577, CVE-2014-0584, CVE-2014-0585, CVE-2014-0586, CVE-2014-0590).
- Heap buffer overflow vulnerabilities that could lead to code execution (CVE-2014-0582, CVE-2014-0589).
- An information disclosure vulnerability that could be exploited to disclose session tokens (CVE-2014-8437).
- A heap buffer overflow vulnerability that could be exploited to perform privilege escalation from low to medium integrity level (CVE-2014-0583).
- A permission issue that could be exploited to perform privilege escalation from low to medium integrity level (CVE-2014-8442).

More information can be found at
http://helpx.adobe.com/security/products/flash-player/apsb14-24.html
		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-19"/>
	<updated date="2014-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0573/">CVE-2014-0573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0574/">CVE-2014-0574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0576/">CVE-2014-0576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0577/">CVE-2014-0577</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0581/">CVE-2014-0581</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0582/">CVE-2014-0582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0583/">CVE-2014-0583</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0584/">CVE-2014-0584</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0585/">CVE-2014-0585</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0586/">CVE-2014-0586</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0588/">CVE-2014-0588</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0589/">CVE-2014-0589</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0590/">CVE-2014-0590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8437/">CVE-2014-8437</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8438/">CVE-2014-8438</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8440/">CVE-2014-8440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8441/">CVE-2014-8441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8442/">CVE-2014-8442</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514449" comment="flash-player-11.2.202.418-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514450" comment="flash-player-gnome-11.2.202.418-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77207" version="1" class="patch">
	<metadata>
		<title>Security update for libreoffice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="900214" ref_url="https://bugzilla.suse.com/900214" source="BUGZILLA"/>
		<reference ref_id="900218" ref_url="https://bugzilla.suse.com/900218" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3693" ref_url="https://www.suse.com/security/cve/CVE-2014-3693/" source="CVE"/>
		<description>
libreoffice was updated to version 4.3.3.2 to fix two security issues:

These security issues were fixed:
- 'Document as E-mail' vulnerability (bnc#900218).
- Impress remote control use-after-free vulnerability (CVE-2014-3693).

Various other fixes are included in the update.
		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-04"/>
	<updated date="2014-11-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/900214">SUSE bug 900214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900218">SUSE bug 900218</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3693/">CVE-2014-3693</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514451" comment="libreoffice-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514452" comment="libreoffice-base-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514453" comment="libreoffice-base-drivers-mysql-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514454" comment="libreoffice-base-drivers-postgresql-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514455" comment="libreoffice-calc-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514456" comment="libreoffice-calc-extensions-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514457" comment="libreoffice-draw-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514458" comment="libreoffice-filters-optional-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514459" comment="libreoffice-gnome-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514460" comment="libreoffice-icon-theme-tango-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514461" comment="libreoffice-impress-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514462" comment="libreoffice-l10n-af-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514463" comment="libreoffice-l10n-ar-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514464" comment="libreoffice-l10n-ca-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514465" comment="libreoffice-l10n-cs-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514466" comment="libreoffice-l10n-da-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514467" comment="libreoffice-l10n-de-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514468" comment="libreoffice-l10n-en-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514469" comment="libreoffice-l10n-es-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514470" comment="libreoffice-l10n-fi-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514471" comment="libreoffice-l10n-fr-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514472" comment="libreoffice-l10n-gu-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514473" comment="libreoffice-l10n-hi-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514474" comment="libreoffice-l10n-hu-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514475" comment="libreoffice-l10n-it-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514476" comment="libreoffice-l10n-ja-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514477" comment="libreoffice-l10n-ko-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514478" comment="libreoffice-l10n-nb-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514479" comment="libreoffice-l10n-nl-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514480" comment="libreoffice-l10n-nn-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514481" comment="libreoffice-l10n-pl-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514482" comment="libreoffice-l10n-pt-BR-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514483" comment="libreoffice-l10n-pt-PT-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514484" comment="libreoffice-l10n-ru-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514485" comment="libreoffice-l10n-sk-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514486" comment="libreoffice-l10n-sv-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514487" comment="libreoffice-l10n-xh-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514488" comment="libreoffice-l10n-zh-Hans-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514489" comment="libreoffice-l10n-zh-Hant-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514490" comment="libreoffice-l10n-zu-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514491" comment="libreoffice-mailmerge-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514492" comment="libreoffice-math-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514493" comment="libreoffice-officebean-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514494" comment="libreoffice-pyuno-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514495" comment="libreoffice-writer-4.3.3.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514496" comment="libreoffice-writer-extensions-4.3.3.2-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77208" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox and mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="897890" ref_url="https://bugzilla.suse.com/897890" source="BUGZILLA"/>
		<reference ref_id="900941" ref_url="https://bugzilla.suse.com/900941" source="BUGZILLA"/>
		<reference ref_id="908009" ref_url="https://bugzilla.suse.com/908009" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1568" ref_url="https://www.suse.com/security/cve/CVE-2014-1568/" source="CVE"/>
		<reference ref_id="CVE-2014-1574" ref_url="https://www.suse.com/security/cve/CVE-2014-1574/" source="CVE"/>
		<reference ref_id="CVE-2014-1575" ref_url="https://www.suse.com/security/cve/CVE-2014-1575/" source="CVE"/>
		<reference ref_id="CVE-2014-1576" ref_url="https://www.suse.com/security/cve/CVE-2014-1576/" source="CVE"/>
		<reference ref_id="CVE-2014-1577" ref_url="https://www.suse.com/security/cve/CVE-2014-1577/" source="CVE"/>
		<reference ref_id="CVE-2014-1578" ref_url="https://www.suse.com/security/cve/CVE-2014-1578/" source="CVE"/>
		<reference ref_id="CVE-2014-1581" ref_url="https://www.suse.com/security/cve/CVE-2014-1581/" source="CVE"/>
		<reference ref_id="CVE-2014-1583" ref_url="https://www.suse.com/security/cve/CVE-2014-1583/" source="CVE"/>
		<reference ref_id="CVE-2014-1585" ref_url="https://www.suse.com/security/cve/CVE-2014-1585/" source="CVE"/>
		<reference ref_id="CVE-2014-1586" ref_url="https://www.suse.com/security/cve/CVE-2014-1586/" source="CVE"/>
		<reference ref_id="CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587/" source="CVE"/>
		<reference ref_id="CVE-2014-1588" ref_url="https://www.suse.com/security/cve/CVE-2014-1588/" source="CVE"/>
		<reference ref_id="CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590/" source="CVE"/>
		<reference ref_id="CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592/" source="CVE"/>
		<reference ref_id="CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593/" source="CVE"/>
		<reference ref_id="CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594/" source="CVE"/>
		<reference ref_id="CVE-2014-1595" ref_url="https://www.suse.com/security/cve/CVE-2014-1595/" source="CVE"/>
		<description>

Mozilla Firefox was updated to 31.3.0 ESR (bnc#900941) (bnc#908009).

Security issues fixed:
MFSA 2014-83 / CVE-2014-1588 / CVE-2014-1587: Mozilla developers and
community identified and fixed several memory safety bugs in the browser
engine used in Firefox and other Mozilla-based products. Some of these
bugs showed evidence of memory corruption under certain circumstances,
and we presume that with enough effort at least some of these could be
exploited to run arbitrary code.

MFSA 2014-85 / CVE-2014-1590: Security researcher Joe Vennix from Rapid7
reported that passing a JavaScript object to XMLHttpRequest that mimics
an input stream will a crash. This crash is not exploitable and can only
be used for denial of service attacks.

MFSA 2014-87 / CVE-2014-1592: Security researcher Berend-Jan Wever
reported a use-after-free created by triggering the creation of a
second root element while parsing HTML written to a document created
with document.open(). This leads to a potentially exploitable crash.

MFSA 2014-88 / CVE-2014-1593: Security researcher Abhishek Arya (Inferno)
of the Google Chrome Security Team used the Address Sanitizer tool to
discover a buffer overflow during the parsing of media content. This
leads to a potentially exploitable crash.

MFSA 2014-89 / CVE-2014-1594: Security researchers Byoungyoung Lee,
Chengyu Song, and Taesoo Kim at the Georgia Tech Information Security
Center (GTISC) reported a bad casting from the BasicThebesLayer to
BasicContainerLayer, resulting in undefined behavior. This behavior is
potentially exploitable with some compilers but no clear mechanism to
trigger it through web content was identified.

MFSA 2014-90 / CVE-2014-1595: Security researcher Kent Howard reported an
Apple issue present in OS X 10.10 (Yosemite) where log files are created
by the CoreGraphics framework of OS X in the /tmp local directory. These
log files contain a record of all inputs into Mozilla programs during
their operation. In versions of OS X from versions 10.6 through 10.9,
the CoreGraphics had this logging ability but it was turned off by
default. In OS X 10.10, this logging was turned on by default for some
applications that use a custom memory allocator, such as jemalloc,
because of an initialization bug in the framework. This issue has been
addressed in Mozilla products by explicitly turning off the framework's
logging of input events. On vulnerable systems, this issue can result
in private data such as usernames, passwords, and other inputed data
being saved to a log file on the local system.

MFSA 2014-74 / CVE-2014-1574 / CVE-2014-1575:
Mozilla developers and community identified and fixed several memory
safety bugs in the browser engine used in Firefox and other Mozilla-based
products. Some of these bugs showed evidence of memory corruption under
certain circumstances, and we presume that with enough effort at least
some of these could be exploited to run arbitrary code.

Bobby Holley, Christian Holler, David Bolter, Byron Campen, and Jon
Coppeard reported memory safety problems and crashes that affect Firefox
ESR 31.1 and Firefox 32.

Carsten Book, Christian Holler, Martijn Wargers, Shih-Chiang Chien,
Terrence Cole, Eric Rahm , and Jeff Walden reported memory safety problems
and crashes that affect Firefox 32.

MFSA 2014-75 / CVE-2014-1576: Using the Address Sanitizer tool, security
researcher Atte Kettunen from OUSPG discovered a buffer overflow when
making capitalization style changes during CSS parsing. This can cause
a crash that is potentially exploitable.

MFSA 2014-76 / CVE-2014-1577: Security researcher Holger Fuhrmannek
used the used the Address Sanitizer tool to discover an out-of-bounds
read issue with Web Audio when interacting with custom waveforms with
invalid values. This results in a crash and could allow for the reading
of random memory which may contain sensitive data, or of memory addresses
that could be used in combination with another bug.

MFSA 2014-77 / CVE-2014-1578: Using the Address Sanitizer tool, security
researcher Abhishek Arya (Inferno) of the Google Chrome Security Team
found an out-of-bounds write when buffering WebM format video containing
frames with invalid tile sizes. This can lead to a potentially exploitable
crash during WebM video playback.

MFSA 2014-79 / CVE-2014-1581: Security researcher regenrecht reported,
via TippingPoint's Zero Day Initiative, a use-after-free during text
layout when interacting with text direction. This results in a crash
which can lead to arbitrary code execution.

MFSA 2014-81 / CVE-2014-1585 / CVE-2014-1586: Mozilla developers Eric
Shepherd and Jan-Ivar Bruaroey reported issues with privacy and video
sharing using WebRTC. Once video sharing has started within a WebRTC
session running within an &lt;iframe&gt;, video will continue to be shared even
if the user selects the 'Stop Sharing' button in the controls. The
camera will also remain on even if the user navigates to another site and
will begin streaming again if the user returns to the original site. This
is a privacy problem and can lead to inadvertent video streaming. This
does not affect implementations that are not within an &lt;iframe&gt;.

MFSA 2014-82 / CVE-2014-1583: Mozilla developer Boris Zbarsky reported
that a malicious app could use the AlarmAPI to read the values of
cross-origin references, such as an iframe's location object, as part of
an alarm's JSON data. This allows a malicious app to bypass same-origin
policy.

SSLv3 is disabled by default. See README.POODLE for more
detailed information.

Mozilla NSS was updated to 3.17.2 (bnc#900941)
Bugfix release
  * bmo#1049435 - Importing an RSA private key fails if p &lt; q
  * bmo#1057161 - NSS hangs with 100% CPU on invalid EC key
  * bmo#1078669 - certutil crashes when using the --certVersion
    parameter
- changes from earlier version of the 3.17 branch:
  update to 3.17.1 (bnc#897890)
  * MFSA 2014-73/CVE-2014-1568 (bmo#1064636, bmo#1069405)
    RSA Signature Forgery in NSS
  * Change library's signature algorithm default to SHA256
  * Add support for draft-ietf-tls-downgrade-scsv
  * Add clang-cl support to the NSS build system
  * Implement TLS 1.3:
    * Part 1. Negotiate TLS 1.3
    * Part 2. Remove deprecated cipher suites andcompression.
  * Add support for little-endian powerpc64
  update to 3.17
  * required for Firefox 33
  New functionality:
  * When using ECDHE, the TLS server code may be configured to
    generate a fresh ephemeral ECDH key for each handshake, by
    setting the SSL_REUSE_SERVER_ECDHE_KEY socket option to
    PR_FALSE. The SSL_REUSE_SERVER_ECDHE_KEY option defaults to
    PR_TRUE, which means the server's ephemeral ECDH key is reused
    for multiple handshakes.  This option does not affect the TLS
    client code, which always generates a fresh ephemeral ECDH key
    for each handshake.
  New Macros
  * SSL_REUSE_SERVER_ECDHE_KEY
  Notable Changes:
  * The manual pages for the certutil and pp tools have been
    updated to document the new parameters that had been added in
    NSS 3.16.2.
		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-06"/>
	<updated date="2014-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/897890">SUSE bug 897890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1568/">CVE-2014-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1574/">CVE-2014-1574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1575/">CVE-2014-1575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1576/">CVE-2014-1576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1577/">CVE-2014-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1578/">CVE-2014-1578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1581/">CVE-2014-1581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1583/">CVE-2014-1583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1585/">CVE-2014-1585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1586/">CVE-2014-1586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1588/">CVE-2014-1588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1595/">CVE-2014-1595</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514497" comment="MozillaFirefox-31.3.0esr-15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514498" comment="MozillaFirefox-branding-SLE-31.0-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514499" comment="MozillaFirefox-translations-31.3.0esr-15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514500" comment="libfreebl3-3.17.2-12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514501" comment="libfreebl3-32bit-3.17.2-12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514502" comment="libsoftokn3-3.17.2-12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514503" comment="libsoftokn3-32bit-3.17.2-12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514504" comment="mozilla-nss-3.17.2-12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514505" comment="mozilla-nss-32bit-3.17.2-12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514506" comment="mozilla-nss-certs-3.17.2-12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514507" comment="mozilla-nss-certs-32bit-3.17.2-12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514508" comment="mozilla-nss-tools-3.17.2-12.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77209" version="1" class="patch">
	<metadata>
		<title>Security update for python, python-base, python-doc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="898572" ref_url="https://bugzilla.suse.com/898572" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-7185" ref_url="https://www.suse.com/security/cve/CVE-2014-7185/" source="CVE"/>
		<description>
python, python-base, python-doc was updated to fix one security issue.
	  
This security issue was fixed:
- Fixed potential buffer overflow in buffer() (CVE-2014-7185).
		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-01"/>
	<updated date="2014-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/898572">SUSE bug 898572</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7185/">CVE-2014-7185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514509" comment="libpython2_7-1_0-2.7.7-9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514510" comment="libpython2_7-1_0-32bit-2.7.7-9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514511" comment="python-2.7.7-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514512" comment="python-base-2.7.7-9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514513" comment="python-curses-2.7.7-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514514" comment="python-devel-2.7.7-9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514515" comment="python-tk-2.7.7-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514516" comment="python-xml-2.7.7-9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77210" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl098 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="901223" ref_url="https://bugzilla.suse.com/901223" source="BUGZILLA"/>
		<reference ref_id="901277" ref_url="https://bugzilla.suse.com/901277" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<description>
compat-openssl098 was updated to fix three security issues.
	  
NOTE: this update alone DOESN'T FIX the POODLE SSL protocol vulnerability.
OpenSSL only adds downgrade detection support for client applications.
See https://www.suse.com/support/kb/doc.php?id=7015773 for mitigations.

These security issues were fixed:
- Session ticket memory leak (CVE-2014-3567).
- Fixed build option no-ssl3 (CVE-2014-3568).
- Added support for TLS_FALLBACK_SCSV (CVE-2014-3566).
		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-01"/>
	<updated date="2014-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/901223">SUSE bug 901223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514517" comment="libopenssl0_9_8-0.9.8j-66.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514518" comment="libopenssl0_9_8-32bit-0.9.8j-66.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77211" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="901223" ref_url="https://bugzilla.suse.com/901223" source="BUGZILLA"/>
		<reference ref_id="901277" ref_url="https://bugzilla.suse.com/901277" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3513" ref_url="https://www.suse.com/security/cve/CVE-2014-3513/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<description>
openssl was updated to fix four security issues.

These security issues were fixed:
- SRTP Memory Leak (CVE-2014-3513).
- Session Ticket Memory Leak (CVE-2014-3567).
- Fixed incomplete no-ssl3 build option (CVE-2014-3568).
- Add support for TLS_FALLBACK_SCSV (CVE-2014-3566).

NOTE: This update alone DOESN'T FIX the POODLE SSL protocol vulnerability.
OpenSSL only adds downgrade detection support for client applications.
See https://www.suse.com/support/kb/doc.php?id=7015773 for mitigations.
		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-01"/>
	<updated date="2014-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/901223">SUSE bug 901223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-3513/">CVE-2014-3513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514519" comment="libopenssl1_0_0-1.0.1i-9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514520" comment="libopenssl1_0_0-32bit-1.0.1i-9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514521" comment="openssl-1.0.1i-9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77212" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="907257" ref_url="https://bugzilla.suse.com/907257" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8439" ref_url="https://www.suse.com/security/cve/CVE-2014-8439/" source="CVE"/>
		<description>
flash-player was updated to fix one security issue.

This security issue was fixed:
- Hardening against a code execution flaw (CVE-2014-8439).
  		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-28"/>
	<updated date="2014-11-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/907257">SUSE bug 907257</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8439/">CVE-2014-8439</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514522" comment="flash-player-11.2.202.424-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514523" comment="flash-player-gnome-11.2.202.424-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77213" version="1" class="patch">
	<metadata>
		<title>Security update for file (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="888308" ref_url="https://bugzilla.suse.com/888308" source="BUGZILLA"/>
		<reference ref_id="902367" ref_url="https://bugzilla.suse.com/902367" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3710" ref_url="https://www.suse.com/security/cve/CVE-2014-3710/" source="CVE"/>
		<description>
file was updated to fix one security issue.

This security issue was fixed:
- Out-of-bounds read in elf note headers (CVE-2014-3710).

This non-security issues was fixed:
- Correctly identify GDBM files created by libgdbm4 (bnc#888308).
  		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-02"/>
	<updated date="2014-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/888308">SUSE bug 888308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902367">SUSE bug 902367</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3710/">CVE-2014-3710</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514524" comment="file-5.19-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514525" comment="file-magic-5.19-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514526" comment="libmagic1-5.19-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514527" comment="libmagic1-32bit-5.19-5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77214" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="901546" ref_url="https://bugzilla.suse.com/901546" source="BUGZILLA"/>
		<reference ref_id="908376" ref_url="https://bugzilla.suse.com/908376" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3660" ref_url="https://www.suse.com/security/cve/CVE-2014-3660/" source="CVE"/>
		<description>
This libxml2 update fixes the following security and non-security issues:

- Fix a denial of service via recursive entity expansion. (CVE-2014-3660, bnc#901546, bgo#738805)
- Fix a regression in xzlib compression support. (bnc#908376)
		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-23"/>
	<updated date="2014-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/901546">SUSE bug 901546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908376">SUSE bug 908376</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3660/">CVE-2014-3660</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514528" comment="libxml2-2-2.9.1-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514529" comment="libxml2-2-32bit-2.9.1-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514530" comment="libxml2-tools-2.9.1-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514531" comment="python-libxml2-2.9.1-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77215" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="947165" ref_url="https://bugzilla.suse.com/947165" source="BUGZILLA"/>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950704" ref_url="https://bugzilla.suse.com/950704" source="BUGZILLA"/>
		<reference ref_id="950705" ref_url="https://bugzilla.suse.com/950705" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="951845" ref_url="https://bugzilla.suse.com/951845" source="BUGZILLA"/>
		<reference ref_id="954018" ref_url="https://bugzilla.suse.com/954018" source="BUGZILLA"/>
		<reference ref_id="954405" ref_url="https://bugzilla.suse.com/954405" source="BUGZILLA"/>
		<reference ref_id="956408" ref_url="https://bugzilla.suse.com/956408" source="BUGZILLA"/>
		<reference ref_id="956409" ref_url="https://bugzilla.suse.com/956409" source="BUGZILLA"/>
		<reference ref_id="956411" ref_url="https://bugzilla.suse.com/956411" source="BUGZILLA"/>
		<reference ref_id="956592" ref_url="https://bugzilla.suse.com/956592" source="BUGZILLA"/>
		<reference ref_id="956832" ref_url="https://bugzilla.suse.com/956832" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339/" source="CVE"/>
		<reference ref_id="CVE-2015-8340" ref_url="https://www.suse.com/security/cve/CVE-2015-8340/" source="CVE"/>
		<reference ref_id="CVE-2015-8341" ref_url="https://www.suse.com/security/cve/CVE-2015-8341/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<description>


This update fixes the following security issues:

- bsc#956832 -  CVE-2015-8345: xen: qemu: net: eepro100:
  infinite loop in processing command block list

- bsc#956592 -  xen: virtual PMU is unsupported (XSA-163)

- bsc#956408 -  CVE-2015-8339, CVE-2015-8340: xen:
  XENMEM_exchange error handling issues (XSA-159)

- bsc#956409 -  CVE-2015-8341: xen: libxl leak of pv kernel
  and initrd on error (XSA-160)

- bsc#956411 -  CVE-2015-7504: xen: heap buffer overflow
  vulnerability in pcnet emulator (XSA-162)

- bsc#947165 -  CVE-2015-7311: xen: libxl fails to honour
  readonly flag on disks with qemu-xen (xsa-142)

- bsc#954405 -  CVE-2015-8104: Xen: guest to host DoS by
  triggering an infinite loop in microcode via #DB exception

- bsc#954018 -  CVE-2015-5307: xen: x86: CPU lockup during
  fault delivery (XSA-156)
  CVE-2015-5307-xsa156.patch

- bsc#950704 -  CVE-2015-7970: xen: x86: Long latency
  populate-on-demand operation is not preemptible (XSA-150)
  563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch

- bsc#951845 -  CVE-2015-7972: xen: x86: populate-on-demand
  balloon size inaccuracy can crash guests (XSA-153)
  xsa153-libxl.patch
  xend-xsa153.patch
- Drop 5604f239-x86-PV-properly-populate-descriptor-tables.patch

- bsc#950703 -  CVE-2015-7969: xen: leak of main per-domain
  vcpu pointer array (DoS) (XSA-149)
- bsc#950705 -  CVE-2015-7969: xen: x86: leak of per-domain
  profiling-related vcpu pointer array (DoS) (XSA-151)
- bsc#950706 -  CVE-2015-7971: xen: x86: some pmu and
  profiling hypercalls log without rate limiting (XSA-152)		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-19"/>
	<updated date="2015-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/947165">SUSE bug 947165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950704">SUSE bug 950704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951845">SUSE bug 951845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954018">SUSE bug 954018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954405">SUSE bug 954405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956408">SUSE bug 956408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956409">SUSE bug 956409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956411">SUSE bug 956411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956592">SUSE bug 956592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956832">SUSE bug 956832</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8340/">CVE-2015-8340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8341/">CVE-2015-8341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514532" comment="xen-4.4.3_06-22.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514533" comment="xen-kmp-default-4.4.3_06_k3.12.48_52.27-22.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514534" comment="xen-libs-4.4.3_06-22.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514535" comment="xen-libs-32bit-4.4.3_06-22.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77216" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="959277" ref_url="https://bugzilla.suse.com/959277" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201/" source="CVE"/>
		<reference ref_id="CVE-2015-7202" ref_url="https://www.suse.com/security/cve/CVE-2015-7202/" source="CVE"/>
		<reference ref_id="CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205/" source="CVE"/>
		<reference ref_id="CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210/" source="CVE"/>
		<reference ref_id="CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212/" source="CVE"/>
		<reference ref_id="CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213/" source="CVE"/>
		<reference ref_id="CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214/" source="CVE"/>
		<reference ref_id="CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to version 38.5.0 ESR to fix the following issues: 

* MFSA 2015-134/CVE-2015-7201/CVE-2015-7202
  Miscellaneous memory safety hazards (rv:43.0 / rv:38.5)
* MFSA 2015-138/CVE-2015-7210
  A use-after-free in WebRTC when datachannel is used after being
  destroyed
* MFSA 2015-139/CVE-2015-7212
  An integer overflow allocating extremely large textures
* MFSA 2015-145/CVE-2015-7205
  A underflow found through code inspection
* MFSA 2015-146/CVE-2015-7213
  A integer overflow in MP4 playback in 64-bit versions
* MFSA 2015-147/CVE-2015-7222
  Integer underflow and buffer overflow processing MP4 metadata
  in libstagefright
* MFSA 2015-149/CVE-2015-7214
  Cross-site reading attack through data and view-source URIs
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-21"/>
	<updated date="2015-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7202/">CVE-2015-7202</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514536" comment="MozillaFirefox-38.5.0esr-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514537" comment="MozillaFirefox-translations-38.5.0esr-54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77217" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="958861" ref_url="https://bugzilla.suse.com/958861" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8000" ref_url="https://www.suse.com/security/cve/CVE-2015-8000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2341-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00028.html" source="SUSE-SU"/>
		<description>

      This update fixes the following security issue:

      - CVE-2015-8000: Fix remote denial of service by misparsing incoming responses (bsc#958861).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-22"/>
	<updated date="2015-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/958861">SUSE bug 958861</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8000/">CVE-2015-8000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514538" comment="bind-libs-9.9.6P1-28.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514539" comment="bind-libs-32bit-9.9.6P1-28.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514540" comment="bind-utils-9.9.6P1-28.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77218" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl098 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="952099" ref_url="https://bugzilla.suse.com/952099" source="BUGZILLA"/>
		<reference ref_id="957812" ref_url="https://bugzilla.suse.com/957812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001758.html" source="SUSE-SU"/>
		<description>

This update for compat-openssl098 fixes the following issues: 

Security issue fixed:;
- CVE-2015-3195: When presented with a malformed X509_ATTRIBUTE structure
  OpenSSL would leak memory. This structure is used by the PKCS#7 and CMS
  routines so any application which reads PKCS#7 or CMS data from untrusted
  sources is affected. SSL/TLS is not affected. (bsc#957812)

Non security issue fixed:
- Prevent segfault in s_client with invalid options (bsc#952099)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-22"/>
	<updated date="2015-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952099">SUSE bug 952099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514541" comment="libopenssl0_9_8-0.9.8j-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514542" comment="libopenssl0_9_8-32bit-0.9.8j-87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77219" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="915810" ref_url="https://bugzilla.suse.com/915810" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0255" ref_url="https://www.suse.com/security/cve/CVE-2015-0255/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001259.html" source="SUSE-SU"/>
		<description>
xorg-x11-server was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-0255: Check string lenghts in XkbSetGeometry request (bnc#915810)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-10"/>
	<updated date="2015-02-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/915810">SUSE bug 915810</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0255/">CVE-2015-0255</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514543" comment="xorg-x11-server-7.6_1.15.2-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514544" comment="xorg-x11-server-extra-7.6_1.15.2-21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77220" version="1" class="patch">
	<metadata>
		<title>Security update for xfsprogs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="939367" ref_url="https://bugzilla.suse.com/939367" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2150" ref_url="https://www.suse.com/security/cve/CVE-2012-2150/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001765.html" source="SUSE-SU"/>
		<description>
xfsprogs was updated to fix one security vulnerability and several bugs.

- Handle unwanted data disclosure in xfs_metadump (bsc#939367, CVE-2012-2150)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-28"/>
	<updated date="2015-12-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/939367">SUSE bug 939367</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2150/">CVE-2012-2150</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514545" comment="xfsprogs-3.2.1-3.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77221" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="928131" ref_url="https://bugzilla.suse.com/928131" source="BUGZILLA"/>
		<reference ref_id="943380" ref_url="https://bugzilla.suse.com/943380" source="BUGZILLA"/>
		<reference ref_id="946148" ref_url="https://bugzilla.suse.com/946148" source="BUGZILLA"/>
		<reference ref_id="952539" ref_url="https://bugzilla.suse.com/952539" source="BUGZILLA"/>
		<reference ref_id="956631" ref_url="https://bugzilla.suse.com/956631" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8370" ref_url="https://www.suse.com/security/cve/CVE-2015-8370/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00044.html" source="SUSE-SU"/>
		<description>
This update for grub2 provides the following fixes and enhancements:

Security issue fixed:
- Fix buffer overflows when reading username and password. (bsc#956631, CVE-2015-8370)

Non security issues fixed:
- Expand list of grub.cfg search path in PV Xen guests for systems installed
  on btrfs snapshots. (bsc#946148, bsc#952539)
- Add --image switch to force zipl update to specific kernel. (bsc#928131)
- Do not use shim lock protocol for reading PE header as it won't be available
  when secure boot is disabled. (bsc#943380)
- Make firmware flaw condition be more precisely detected and add debug message
  for the case.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-30"/>
	<updated date="2015-12-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/928131">SUSE bug 928131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943380">SUSE bug 943380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946148">SUSE bug 946148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952539">SUSE bug 952539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956631">SUSE bug 956631</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8370/">CVE-2015-8370</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514546" comment="grub2-2.02~beta2-56.9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514547" comment="grub2-i386-pc-2.02~beta2-56.9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514548" comment="grub2-snapper-plugin-2.02~beta2-56.9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514549" comment="grub2-x86_64-efi-2.02~beta2-56.9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514550" comment="grub2-x86_64-xen-2.02~beta2-56.9.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77222" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="960317" ref_url="https://bugzilla.suse.com/960317" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8459" ref_url="https://www.suse.com/security/cve/CVE-2015-8459/" source="CVE"/>
		<reference ref_id="CVE-2015-8460" ref_url="https://www.suse.com/security/cve/CVE-2015-8460/" source="CVE"/>
		<reference ref_id="CVE-2015-8634" ref_url="https://www.suse.com/security/cve/CVE-2015-8634/" source="CVE"/>
		<reference ref_id="CVE-2015-8635" ref_url="https://www.suse.com/security/cve/CVE-2015-8635/" source="CVE"/>
		<reference ref_id="CVE-2015-8636" ref_url="https://www.suse.com/security/cve/CVE-2015-8636/" source="CVE"/>
		<reference ref_id="CVE-2015-8638" ref_url="https://www.suse.com/security/cve/CVE-2015-8638/" source="CVE"/>
		<reference ref_id="CVE-2015-8639" ref_url="https://www.suse.com/security/cve/CVE-2015-8639/" source="CVE"/>
		<reference ref_id="CVE-2015-8640" ref_url="https://www.suse.com/security/cve/CVE-2015-8640/" source="CVE"/>
		<reference ref_id="CVE-2015-8641" ref_url="https://www.suse.com/security/cve/CVE-2015-8641/" source="CVE"/>
		<reference ref_id="CVE-2015-8642" ref_url="https://www.suse.com/security/cve/CVE-2015-8642/" source="CVE"/>
		<reference ref_id="CVE-2015-8643" ref_url="https://www.suse.com/security/cve/CVE-2015-8643/" source="CVE"/>
		<reference ref_id="CVE-2015-8644" ref_url="https://www.suse.com/security/cve/CVE-2015-8644/" source="CVE"/>
		<reference ref_id="CVE-2015-8645" ref_url="https://www.suse.com/security/cve/CVE-2015-8645/" source="CVE"/>
		<reference ref_id="CVE-2015-8646" ref_url="https://www.suse.com/security/cve/CVE-2015-8646/" source="CVE"/>
		<reference ref_id="CVE-2015-8647" ref_url="https://www.suse.com/security/cve/CVE-2015-8647/" source="CVE"/>
		<reference ref_id="CVE-2015-8648" ref_url="https://www.suse.com/security/cve/CVE-2015-8648/" source="CVE"/>
		<reference ref_id="CVE-2015-8649" ref_url="https://www.suse.com/security/cve/CVE-2015-8649/" source="CVE"/>
		<reference ref_id="CVE-2015-8650" ref_url="https://www.suse.com/security/cve/CVE-2015-8650/" source="CVE"/>
		<reference ref_id="CVE-2015-8651" ref_url="https://www.suse.com/security/cve/CVE-2015-8651/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<description>

This update for flash-player fixes the following issues: 

   - CVE-2015-8644: Type confusion vulnerability that could lead to code execution .
   - CVE-2015-8651: Integer overflow vulnerability that could lead to code execution.
   - CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, CVE-2015-8650: Use-after-free vulnerabilities that could lead to code execution.
   - CVE-2015-8459, CVE-2015-8460, CVE-2015-8636, CVE-2015-8645: Memory corruption vulnerabilities that could lead to code execution.

		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-30"/>
	<updated date="2015-12-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8459/">CVE-2015-8459</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8460/">CVE-2015-8460</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8634/">CVE-2015-8634</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8635/">CVE-2015-8635</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8636/">CVE-2015-8636</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8638/">CVE-2015-8638</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8639/">CVE-2015-8639</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8640/">CVE-2015-8640</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8641/">CVE-2015-8641</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8642/">CVE-2015-8642</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8643/">CVE-2015-8643</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8644/">CVE-2015-8644</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8645/">CVE-2015-8645</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8646/">CVE-2015-8646</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8647/">CVE-2015-8647</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8648/">CVE-2015-8648</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8649/">CVE-2015-8649</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8650/">CVE-2015-8650</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8651/">CVE-2015-8651</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514551" comment="flash-player-11.2.202.559-117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514552" comment="flash-player-gnome-11.2.202.559-117.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77223" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="917597" ref_url="https://bugzilla.suse.com/917597" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0822" ref_url="https://www.suse.com/security/cve/CVE-2015-0822/" source="CVE"/>
		<reference ref_id="CVE-2015-0827" ref_url="https://www.suse.com/security/cve/CVE-2015-0827/" source="CVE"/>
		<reference ref_id="CVE-2015-0831" ref_url="https://www.suse.com/security/cve/CVE-2015-0831/" source="CVE"/>
		<reference ref_id="CVE-2015-0835" ref_url="https://www.suse.com/security/cve/CVE-2015-0835/" source="CVE"/>
		<reference ref_id="CVE-2015-0836" ref_url="https://www.suse.com/security/cve/CVE-2015-0836/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00001.html" source="SUSE-SU"/>
		<description>
MozillaFirefox was updated to version 31.5.0 ESR to fix five security issues.

These security issues were fixed:
- CVE-2015-0836: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.5 allowed remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors (bnc#917597).
- CVE-2015-0827: Heap-based buffer overflow in the mozilla::gfx::CopyRect function in Mozilla Firefox before 31.5 allowed remote attackers to obtain sensitive information from uninitialized process memory via a malformed SVG graphic (bnc#917597).
- CVE-2015-0835: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 36.0 allowed remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors (bnc#917597).
- CVE-2015-0831: Use-after-free vulnerability in the mozilla::dom::IndexedDB::IDBObjectStore::CreateIndex function in Mozilla Firefox before 31.5 allowed remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted content that is improperly handled during IndexedDB index creation (bnc#917597).
- CVE-2015-0822: The Form Autocompletion feature in Mozilla Firefox before 31.5 allowed remote attackers to read arbitrary files via crafted JavaScript code (bnc#917597).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-26"/>
	<updated date="2015-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/917597">SUSE bug 917597</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0822/">CVE-2015-0822</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0827/">CVE-2015-0827</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0831/">CVE-2015-0831</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0835/">CVE-2015-0835</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0836/">CVE-2015-0836</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514553" comment="MozillaFirefox-31.5.0esr-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514554" comment="MozillaFirefox-translations-31.5.0esr-24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77224" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="917129" ref_url="https://bugzilla.suse.com/917129" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9654" ref_url="https://www.suse.com/security/cve/CVE-2014-9654/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001276.html" source="SUSE-SU"/>
		<description>
icu was updated to fix one security issue.

This security issue was fixed:
- CVE-2014-9654: Insufficient size limit checks in regular expression compiler (bnc#917129).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-02"/>
	<updated date="2015-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/917129">SUSE bug 917129</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9654/">CVE-2014-9654</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514555" comment="icu-52.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514556" comment="libicu52_1-52.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514557" comment="libicu52_1-32bit-52.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514558" comment="libicu52_1-data-52.1-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77225" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="916847" ref_url="https://bugzilla.suse.com/916847" source="BUGZILLA"/>
		<reference ref_id="916856" ref_url="https://bugzilla.suse.com/916856" source="BUGZILLA"/>
		<reference ref_id="916857" ref_url="https://bugzilla.suse.com/916857" source="BUGZILLA"/>
		<reference ref_id="916858" ref_url="https://bugzilla.suse.com/916858" source="BUGZILLA"/>
		<reference ref_id="916859" ref_url="https://bugzilla.suse.com/916859" source="BUGZILLA"/>
		<reference ref_id="916860" ref_url="https://bugzilla.suse.com/916860" source="BUGZILLA"/>
		<reference ref_id="916861" ref_url="https://bugzilla.suse.com/916861" source="BUGZILLA"/>
		<reference ref_id="916862" ref_url="https://bugzilla.suse.com/916862" source="BUGZILLA"/>
		<reference ref_id="916863" ref_url="https://bugzilla.suse.com/916863" source="BUGZILLA"/>
		<reference ref_id="916864" ref_url="https://bugzilla.suse.com/916864" source="BUGZILLA"/>
		<reference ref_id="916865" ref_url="https://bugzilla.suse.com/916865" source="BUGZILLA"/>
		<reference ref_id="916867" ref_url="https://bugzilla.suse.com/916867" source="BUGZILLA"/>
		<reference ref_id="916868" ref_url="https://bugzilla.suse.com/916868" source="BUGZILLA"/>
		<reference ref_id="916870" ref_url="https://bugzilla.suse.com/916870" source="BUGZILLA"/>
		<reference ref_id="916871" ref_url="https://bugzilla.suse.com/916871" source="BUGZILLA"/>
		<reference ref_id="916872" ref_url="https://bugzilla.suse.com/916872" source="BUGZILLA"/>
		<reference ref_id="916873" ref_url="https://bugzilla.suse.com/916873" source="BUGZILLA"/>
		<reference ref_id="916874" ref_url="https://bugzilla.suse.com/916874" source="BUGZILLA"/>
		<reference ref_id="916879" ref_url="https://bugzilla.suse.com/916879" source="BUGZILLA"/>
		<reference ref_id="916881" ref_url="https://bugzilla.suse.com/916881" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2240" ref_url="https://www.suse.com/security/cve/CVE-2014-2240/" source="CVE"/>
		<reference ref_id="CVE-2014-9656" ref_url="https://www.suse.com/security/cve/CVE-2014-9656/" source="CVE"/>
		<reference ref_id="CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657/" source="CVE"/>
		<reference ref_id="CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658/" source="CVE"/>
		<reference ref_id="CVE-2014-9659" ref_url="https://www.suse.com/security/cve/CVE-2014-9659/" source="CVE"/>
		<reference ref_id="CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660/" source="CVE"/>
		<reference ref_id="CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661/" source="CVE"/>
		<reference ref_id="CVE-2014-9662" ref_url="https://www.suse.com/security/cve/CVE-2014-9662/" source="CVE"/>
		<reference ref_id="CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663/" source="CVE"/>
		<reference ref_id="CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664/" source="CVE"/>
		<reference ref_id="CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665/" source="CVE"/>
		<reference ref_id="CVE-2014-9666" ref_url="https://www.suse.com/security/cve/CVE-2014-9666/" source="CVE"/>
		<reference ref_id="CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667/" source="CVE"/>
		<reference ref_id="CVE-2014-9668" ref_url="https://www.suse.com/security/cve/CVE-2014-9668/" source="CVE"/>
		<reference ref_id="CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669/" source="CVE"/>
		<reference ref_id="CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670/" source="CVE"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<reference ref_id="CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672/" source="CVE"/>
		<reference ref_id="CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673/" source="CVE"/>
		<reference ref_id="CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674/" source="CVE"/>
		<reference ref_id="CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<description>
freetype2 was updated to fix 20 security issues.

These security issues were fixed:
- CVE-2014-9663: The tt_cmap4_validate function in sfnt/ttcmap.c in FreeType before 2.5.4 validates a certain length field before that field's value is completely calculated, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted cmap SFNT table (bnc#916865).
- CVE-2014-9662: cff/cf2ft.c in FreeType before 2.5.4 did not validate the return values of point-allocation functions, which allowed remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted OTF font (bnc#916860).
- CVE-2014-9661: type42/t42parse.c in FreeType before 2.5.4 did not consider that scanning can be incomplete without triggering an error, which allowed remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted Type42 font (bnc#916859).
- CVE-2014-9660: The _bdf_parse_glyphs function in bdf/bdflib.c in FreeType before 2.5.4 did not properly handle a missing ENDCHAR record, which allowed remote attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted BDF font (bnc#916858).
- CVE-2014-9667: sfnt/ttload.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting the values, which allowed remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted SFNT table (bnc#916861).
- CVE-2014-9666: The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4 proceeds with a count-to-size association without restricting the count value, which allowed remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted embedded bitmap (bnc#916862).
- CVE-2014-9665: The Load_SBit_Png function in sfnt/pngshim.c in FreeType before 2.5.4 did not restrict the rows and pitch values of PNG data, which allowed remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact by embedding a PNG file in a .ttf font file (bnc#916863).
- CVE-2014-9664: FreeType before 2.5.4 did not check for the end of the data during certain parsing actions, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted Type42 font, related to type42/t42parse.c and type1/t1load.c (bnc#916864).
- CVE-2014-9669: Multiple integer overflows in sfnt/ttcmap.c in FreeType before 2.5.4 allowed remote attackers to cause a denial of service (out-of-bounds read or memory corruption) or possibly have unspecified other impact via a crafted cmap SFNT table (bnc#916870).
- CVE-2014-9668: The woff_open_font function in sfnt/sfobjs.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting length values, which allowed remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Web Open Font Format (WOFF) file (bnc#916868).
- CVE-2014-9656: The tt_sbit_decoder_load_image function in sfnt/ttsbit.c in FreeType before 2.5.4 did not properly check for an integer overflow, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted OpenType font (bnc#916847).
- CVE-2014-9658: The tt_face_load_kern function in sfnt/ttkern.c in FreeType before 2.5.4 enforces an incorrect minimum table length, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font (bnc#916857).
- CVE-2014-9659: cff/cf2intrp.c in the CFF CharString interpreter in FreeType before 2.5.4 proceeds with additional hints after the hint mask has been computed, which allowed remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted OpenType font.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2240 (bnc#916867).
- CVE-2014-9674: The Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 proceeds with adding to length values without validating the original values, which allowed remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font (bnc#916879).
- CVE-2014-9675: bdf/bdflib.c in FreeType before 2.5.4 identifies property names by only verifying that an initial substring is present, which allowed remote attackers to discover heap pointer values and bypass the ASLR protection mechanism via a crafted BDF font (bnc#916881).
- CVE-2014-9657: The tt_face_load_hdmx function in truetype/ttpload.c in FreeType before 2.5.4 did not establish a minimum record size, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font (bnc#916856).
- CVE-2014-9670: Multiple integer signedness errors in the pcf_get_encodings function in pcf/pcfread.c in FreeType before 2.5.4 allowed remote attackers to cause a denial of service (integer overflow, NULL pointer dereference, and application crash) via a crafted PCF file that specifies negative values for the first column and first row (bnc#916871).
- CVE-2014-9671: Off-by-one error in the pcf_get_properties function in pcf/pcfread.c in FreeType before 2.5.4 allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PCF file with a 0xffffffff size value that is improperly incremented (bnc#916872).
- CVE-2014-9672: Array index error in the parse_fond function in base/ftmac.c in FreeType before 2.5.4 allowed remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information from process memory via a crafted FOND resource in a Mac font file (bnc#916873).
- CVE-2014-9673: Integer signedness error in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 allowed remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font (bnc#916874).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-02"/>
	<updated date="2015-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/916847">SUSE bug 916847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916856">SUSE bug 916856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916857">SUSE bug 916857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916858">SUSE bug 916858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916859">SUSE bug 916859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916860">SUSE bug 916860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916861">SUSE bug 916861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916862">SUSE bug 916862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916863">SUSE bug 916863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916864">SUSE bug 916864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916865">SUSE bug 916865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916867">SUSE bug 916867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916868">SUSE bug 916868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916870">SUSE bug 916870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916871">SUSE bug 916871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916872">SUSE bug 916872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916873">SUSE bug 916873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916874">SUSE bug 916874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916879">SUSE bug 916879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916881">SUSE bug 916881</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2240/">CVE-2014-2240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9656/">CVE-2014-9656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9659/">CVE-2014-9659</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9662/">CVE-2014-9662</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9666/">CVE-2014-9666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9668/">CVE-2014-9668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514559" comment="ft2demos-2.5.3-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514560" comment="libfreetype6-2.5.3-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514561" comment="libfreetype6-32bit-2.5.3-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77226" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="916343" ref_url="https://bugzilla.suse.com/916343" source="BUGZILLA"/>
		<reference ref_id="916785" ref_url="https://bugzilla.suse.com/916785" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0245" ref_url="https://www.suse.com/security/cve/CVE-2015-0245/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001275.html" source="SUSE-SU"/>
		<description>
dbus-1 was updated to version 1.8.16 to fix one security issue.

This update fixes the following security issue:

- CVE-2015-0245: Do not allow non-uid-0 processes to send forged
  ActivationFailure messages. On Linux systems with systemd
  activation, this would allow a local denial of service (bnc#916343).

These additional security hardenings are included:

- Do not allow calls to UpdateActivationEnvironment from uids
  other than the uid of the dbus-daemon. If a system service
  installs unsafe security policy rules that allow arbitrary
  method calls (such as CVE-2014-8148) then this prevents
  memory consumption and possible privilege escalation via
  UpdateActivationEnvironment.
- Do not allow calls to UpdateActivationEnvironment or the
  Stats interface on object paths other than
  /org/freedesktop/DBus. Some system services install unsafe
  security policy rules that allow arbitrary method calls to
  any destination, method and interface with a specified object
  path.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-04"/>
	<updated date="2015-03-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/916343">SUSE bug 916343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916785">SUSE bug 916785</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0245/">CVE-2015-0245</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514562" comment="dbus-1-1.8.16-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514563" comment="dbus-1-x11-1.8.16-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514564" comment="libdbus-1-3-1.8.16-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514565" comment="libdbus-1-3-32bit-1.8.16-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77227" version="1" class="patch">
	<metadata>
		<title>Security update for cups, cups154 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="917799" ref_url="https://bugzilla.suse.com/917799" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9679" ref_url="https://www.suse.com/security/cve/CVE-2014-9679/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001278.html" source="SUSE-SU"/>
		<description>
cups, cups154 was updated to fix one security issue.

This security issue was fixed:
- CVE-2014-9679: A malformed compressed raster file can trigger a buffer overflow in cupsRasterReadPixels (bnc#917799).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-24"/>
	<updated date="2015-02-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/917799">SUSE bug 917799</bugzilla>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9679/">CVE-2014-9679</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514566" comment="cups-1.7.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514567" comment="cups-client-1.7.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514568" comment="cups-libs-1.7.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514569" comment="cups-libs-32bit-1.7.5-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77228" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql93 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="888564" ref_url="https://bugzilla.suse.com/888564" source="BUGZILLA"/>
		<reference ref_id="916953" ref_url="https://bugzilla.suse.com/916953" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8161" ref_url="https://www.suse.com/security/cve/CVE-2014-8161/" source="CVE"/>
		<reference ref_id="CVE-2015-0241" ref_url="https://www.suse.com/security/cve/CVE-2015-0241/" source="CVE"/>
		<reference ref_id="CVE-2015-0243" ref_url="https://www.suse.com/security/cve/CVE-2015-0243/" source="CVE"/>
		<reference ref_id="CVE-2015-0244" ref_url="https://www.suse.com/security/cve/CVE-2015-0244/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001280.html" source="SUSE-SU"/>
		<description>
postgresql93 was updated to version 9.3.6 to fix four security issues.

These security issues were fixed:
- CVE-2015-0241: Fix buffer overruns in to_char() (bnc#916953).
- CVE-2015-0243: Fix buffer overruns in contrib/pgcrypto (bnc#916953).
- CVE-2015-0244: Fix possible loss of frontend/backend protocol synchronization after an error (bnc#916953).
- CVE-2014-8161: Fix information leak via constraint-violation error messages (bnc#916953).

This non-security issue was fixed:
- Move the server socket from /tmp to /var/run to avoid
  problems with clients that use PrivateTmp (bnc#888564).

More information is available at http://www.postgresql.org/docs/9.3/static/release-9-3-6.html
		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-23"/>
	<updated date="2015-02-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/888564">SUSE bug 888564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916953">SUSE bug 916953</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8161/">CVE-2014-8161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0241/">CVE-2015-0241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0243/">CVE-2015-0243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0244/">CVE-2015-0244</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514570" comment="libecpg6-9.3.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514571" comment="libpq5-9.3.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514572" comment="libpq5-32bit-9.3.6-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514573" comment="postgresql93-9.3.6-5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77229" version="1" class="patch">
	<metadata>
		<title>Security update for unzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="909214" ref_url="https://bugzilla.suse.com/909214" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8139" ref_url="https://www.suse.com/security/cve/CVE-2014-8139/" source="CVE"/>
		<reference ref_id="CVE-2014-8140" ref_url="https://www.suse.com/security/cve/CVE-2014-8140/" source="CVE"/>
		<reference ref_id="CVE-2014-8141" ref_url="https://www.suse.com/security/cve/CVE-2014-8141/" source="CVE"/>
		<description>

  This update fixes the following security issues:

- CVE-2014-8139: fix heap overflow condition in
  the CRC32 verification (fixes bnc#909214)
- CVE-2014-8140 and CVE-2014-8141: fix write error
  (*_8349_*) shows a problem in extract.c:test_compr_eb(), and:
  read errors (*_6430_*, *_3422_*) show problems in
  process.c:getZip64Data() (fixes bnc#909214)

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-07"/>
	<updated date="2015-01-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/909214">SUSE bug 909214</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8139/">CVE-2014-8139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8140/">CVE-2014-8140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8141/">CVE-2014-8141</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514574" comment="unzip-6.00-28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77230" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="922033" ref_url="https://bugzilla.suse.com/922033" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0332" ref_url="https://www.suse.com/security/cve/CVE-2015-0332/" source="CVE"/>
		<reference ref_id="CVE-2015-0333" ref_url="https://www.suse.com/security/cve/CVE-2015-0333/" source="CVE"/>
		<reference ref_id="CVE-2015-0334" ref_url="https://www.suse.com/security/cve/CVE-2015-0334/" source="CVE"/>
		<reference ref_id="CVE-2015-0335" ref_url="https://www.suse.com/security/cve/CVE-2015-0335/" source="CVE"/>
		<reference ref_id="CVE-2015-0336" ref_url="https://www.suse.com/security/cve/CVE-2015-0336/" source="CVE"/>
		<reference ref_id="CVE-2015-0337" ref_url="https://www.suse.com/security/cve/CVE-2015-0337/" source="CVE"/>
		<reference ref_id="CVE-2015-0338" ref_url="https://www.suse.com/security/cve/CVE-2015-0338/" source="CVE"/>
		<reference ref_id="CVE-2015-0339" ref_url="https://www.suse.com/security/cve/CVE-2015-0339/" source="CVE"/>
		<reference ref_id="CVE-2015-0340" ref_url="https://www.suse.com/security/cve/CVE-2015-0340/" source="CVE"/>
		<reference ref_id="CVE-2015-0341" ref_url="https://www.suse.com/security/cve/CVE-2015-0341/" source="CVE"/>
		<reference ref_id="CVE-2015-0342" ref_url="https://www.suse.com/security/cve/CVE-2015-0342/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html" source="SUSE-SU"/>
		<description>
Adobe Flash Player was updated to 11.2.202.451 (bsc#922033).

These security issues were fixed:
- Memory corruption vulnerabilities that could lead to code execution (CVE-2015-0332, CVE-2015-0333, CVE-2015-0335, CVE-2015-0339).
- Type confusion vulnerabilities that could lead to code execution (CVE-2015-0334, CVE-2015-0336).
- A vulnerability that could lead to a cross-domain policy bypass (CVE-2015-0337).
- A vulnerability that could lead to a file upload restriction bypass (CVE-2015-0340).
- An integer overflow vulnerability that could lead to code execution (CVE-2015-0338).
- Use-after-free vulnerabilities that could lead to code execution (CVE-2015-0341, CVE-2015-0342).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-16"/>
	<updated date="2015-03-16"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0332/">CVE-2015-0332</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0333/">CVE-2015-0333</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0334/">CVE-2015-0334</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0335/">CVE-2015-0335</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0336/">CVE-2015-0336</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0337/">CVE-2015-0337</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0338/">CVE-2015-0338</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0339/">CVE-2015-0339</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0340/">CVE-2015-0340</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0341/">CVE-2015-0341</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0342/">CVE-2015-0342</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514575" comment="flash-player-11.2.202.451-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514576" comment="flash-player-gnome-11.2.202.451-77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77231" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="901223" ref_url="https://bugzilla.suse.com/901223" source="BUGZILLA"/>
		<reference ref_id="914041" ref_url="https://bugzilla.suse.com/914041" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-6585" ref_url="https://www.suse.com/security/cve/CVE-2014-6585/" source="CVE"/>
		<reference ref_id="CVE-2014-6587" ref_url="https://www.suse.com/security/cve/CVE-2014-6587/" source="CVE"/>
		<reference ref_id="CVE-2014-6591" ref_url="https://www.suse.com/security/cve/CVE-2014-6591/" source="CVE"/>
		<reference ref_id="CVE-2014-6593" ref_url="https://www.suse.com/security/cve/CVE-2014-6593/" source="CVE"/>
		<reference ref_id="CVE-2014-6601" ref_url="https://www.suse.com/security/cve/CVE-2014-6601/" source="CVE"/>
		<reference ref_id="CVE-2015-0383" ref_url="https://www.suse.com/security/cve/CVE-2015-0383/" source="CVE"/>
		<reference ref_id="CVE-2015-0395" ref_url="https://www.suse.com/security/cve/CVE-2015-0395/" source="CVE"/>
		<reference ref_id="CVE-2015-0400" ref_url="https://www.suse.com/security/cve/CVE-2015-0400/" source="CVE"/>
		<reference ref_id="CVE-2015-0407" ref_url="https://www.suse.com/security/cve/CVE-2015-0407/" source="CVE"/>
		<reference ref_id="CVE-2015-0408" ref_url="https://www.suse.com/security/cve/CVE-2015-0408/" source="CVE"/>
		<reference ref_id="CVE-2015-0410" ref_url="https://www.suse.com/security/cve/CVE-2015-0410/" source="CVE"/>
		<reference ref_id="CVE-2015-0412" ref_url="https://www.suse.com/security/cve/CVE-2015-0412/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<description>
This update fixes 13 security issues.

These security issues were fixed:
- CVE-2015-0395: Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot (bnc#914041).
- CVE-2015-0400: Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allowed remote attackers to affect confidentiality via unknown vectors related to Libraries (bnc#914041).
- CVE-2015-0383: Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25; Java SE Embedded 7u71 and 8u6; and JRockit R27.8.4 and R28.3.4 allowed local users to affect integrity and availability via unknown vectors related to Hotspot (bnc#914041).
- CVE-2015-0412: Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS (bnc#914041).
- CVE-2015-0407: Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allowed remote attackers to affect confidentiality via unknown vectors related to Swing (bnc#914041).
- CVE-2015-0408: Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI (bnc#914041).
- CVE-2014-6585: Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allowed remote attackers to affect confidentiality via unknown vectors reelated to 2D, a different vulnerability than CVE-2014-6591 (bnc#914041).
- CVE-2014-6587: Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allowed local users to affect confidentiality, integrity, and availability via unknown vectors related to Libraries (bnc#914041).
- CVE-2014-6591: Unspecified vulnerability in the Java SE component in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allowed remote attackers to affect confidentiality via unknown vectors related to 2D, a different vulnerability than CVE-2014-6585 (bnc#914041).
- CVE-2014-6593: Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25; Java SE Embedded 7u71 and 8u6; and JRockit 27.8.4 and 28.3.4 allowed remote attackers to affect confidentiality and integrity via vectors related to JSSE (bnc#914041).
- CVE-2014-6601: Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot (bnc#914041).
- CVE-2015-0410: Unspecified vulnerability in the Java SE, Java SE Embedded, JRockit component in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25; Java SE Embedded 7u71 and 8u6; and JRockit R27.8.4 and R28.3.4 allowed remote attackers to affect availability via unknown vectors related to Security (bnc#914041).
- CVE-2014-3566: The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, used nondeterministic CBC padding, which made it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the 'POODLE' issue (bnc#901223).

These non-security issues were fixed:
- Update protocol support (S8046656).
- Fewer escapes from escape analysis (S8047130).
- Better GC validation (S8049253).
- TLAB stability (S8055479).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-09"/>
	<updated date="2015-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/901223">SUSE bug 901223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6585/">CVE-2014-6585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6587/">CVE-2014-6587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6591/">CVE-2014-6591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6593/">CVE-2014-6593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6601/">CVE-2014-6601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0383/">CVE-2015-0383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0395/">CVE-2015-0395</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0400/">CVE-2015-0400</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0407/">CVE-2015-0407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0408/">CVE-2015-0408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0410/">CVE-2015-0410</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0412/">CVE-2015-0412</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514577" comment="java-1_7_0-openjdk-1.7.0.75-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514578" comment="java-1_7_0-openjdk-headless-1.7.0.75-11.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77232" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="912214" ref_url="https://bugzilla.suse.com/912214" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9556" ref_url="https://www.suse.com/security/cve/CVE-2014-9556/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001289.html" source="SUSE-SU"/>
		<description>

libmspack was updated to fix one security issue.

This security issue was fixed:
- Possible DoS by infinite loop (bnc#912214, CVE-2014-9556)

The previous fix was not fully fixing this problem.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-02"/>
	<updated date="2015-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/912214">SUSE bug 912214</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9556/">CVE-2014-9556</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514579" comment="libmspack0-0.4-10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77233" version="1" class="patch">
	<metadata>
		<title>Security update for gnome-settings-daemon (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="900031" ref_url="https://bugzilla.suse.com/900031" source="BUGZILLA"/>
		<reference ref_id="905158" ref_url="https://bugzilla.suse.com/905158" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-7300" ref_url="https://www.suse.com/security/cve/CVE-2014-7300/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001293.html" source="SUSE-SU"/>
		<description>

gnome-settings-daemon was updated to fix a bug and a security issue:

Security issue fixed:
- CVE-2014-7300: The lockscreen can be bypassed with the Print Screen button.

Bug fixed:
- Do not hide the cursor while there was no mutter running (bsc#905158).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-12"/>
	<updated date="2015-02-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/900031">SUSE bug 900031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905158">SUSE bug 905158</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7300/">CVE-2014-7300</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514580" comment="gnome-settings-daemon-3.10.2-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514581" comment="gnome-settings-daemon-lang-3.10.2-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77234" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="864081" ref_url="https://bugzilla.suse.com/864081" source="BUGZILLA"/>
		<reference ref_id="905313" ref_url="https://bugzilla.suse.com/905313" source="BUGZILLA"/>
		<reference ref_id="906371" ref_url="https://bugzilla.suse.com/906371" source="BUGZILLA"/>
		<reference ref_id="909053" ref_url="https://bugzilla.suse.com/909053" source="BUGZILLA"/>
		<reference ref_id="910599" ref_url="https://bugzilla.suse.com/910599" source="BUGZILLA"/>
		<reference ref_id="915526" ref_url="https://bugzilla.suse.com/915526" source="BUGZILLA"/>
		<reference ref_id="915985" ref_url="https://bugzilla.suse.com/915985" source="BUGZILLA"/>
		<reference ref_id="916222" ref_url="https://bugzilla.suse.com/916222" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7423" ref_url="https://www.suse.com/security/cve/CVE-2013-7423/" source="CVE"/>
		<reference ref_id="CVE-2014-7817" ref_url="https://www.suse.com/security/cve/CVE-2014-7817/" source="CVE"/>
		<reference ref_id="CVE-2014-9402" ref_url="https://www.suse.com/security/cve/CVE-2014-9402/" source="CVE"/>
		<reference ref_id="CVE-2015-1472" ref_url="https://www.suse.com/security/cve/CVE-2015-1472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001295.html" source="SUSE-SU"/>
		<description>
glibc has been updated to fix four security issues.

These security issues were fixed:
- CVE-2014-7817: The wordexp function in GNU C Library (aka glibc) 2.21 did not enforce the WRDE_NOCMD flag, which allowed context-dependent attackers to execute arbitrary commands, as demonstrated by input containing '$((`...`))' (bnc#906371).
- CVE-2015-1472: Heap buffer overflow in glibc swscanf (bnc#916222).
- CVE-2014-9402: Denial of service in getnetbyname function (bnc#910599).
- CVE-2013-7423: Getaddrinfo() writes DNS queries to random file descriptors under high load (bnc#915526).

These non-security issues were fixed:
- Fix infinite loop in check_pf (bsc#909053)
- Restore warning about execution permission, it is still needed for noexec mounts (bsc#915985).
- Don't touch user-controlled stdio locks in forked child (bsc#864081)
- Don't use gcc extensions for non-gcc compilers (bsc#905313)
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-06"/>
	<updated date="2015-03-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/864081">SUSE bug 864081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905313">SUSE bug 905313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906371">SUSE bug 906371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909053">SUSE bug 909053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910599">SUSE bug 910599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915526">SUSE bug 915526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915985">SUSE bug 915985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916222">SUSE bug 916222</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7423/">CVE-2013-7423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7817/">CVE-2014-7817</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9402/">CVE-2014-9402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1472/">CVE-2015-1472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514582" comment="glibc-2.19-20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514583" comment="glibc-32bit-2.19-20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514584" comment="glibc-devel-2.19-20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514585" comment="glibc-devel-32bit-2.19-20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514586" comment="glibc-i18ndata-2.19-20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514587" comment="glibc-locale-2.19-20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514588" comment="glibc-locale-32bit-2.19-20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514589" comment="nscd-2.19-20.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77235" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="799216" ref_url="https://bugzilla.suse.com/799216" source="BUGZILLA"/>
		<reference ref_id="800255" ref_url="https://bugzilla.suse.com/800255" source="BUGZILLA"/>
		<reference ref_id="860346" ref_url="https://bugzilla.suse.com/860346" source="BUGZILLA"/>
		<reference ref_id="875220" ref_url="https://bugzilla.suse.com/875220" source="BUGZILLA"/>
		<reference ref_id="877456" ref_url="https://bugzilla.suse.com/877456" source="BUGZILLA"/>
		<reference ref_id="884407" ref_url="https://bugzilla.suse.com/884407" source="BUGZILLA"/>
		<reference ref_id="895805" ref_url="https://bugzilla.suse.com/895805" source="BUGZILLA"/>
		<reference ref_id="896484" ref_url="https://bugzilla.suse.com/896484" source="BUGZILLA"/>
		<reference ref_id="897736" ref_url="https://bugzilla.suse.com/897736" source="BUGZILLA"/>
		<reference ref_id="898687" ref_url="https://bugzilla.suse.com/898687" source="BUGZILLA"/>
		<reference ref_id="900270" ref_url="https://bugzilla.suse.com/900270" source="BUGZILLA"/>
		<reference ref_id="902286" ref_url="https://bugzilla.suse.com/902286" source="BUGZILLA"/>
		<reference ref_id="902346" ref_url="https://bugzilla.suse.com/902346" source="BUGZILLA"/>
		<reference ref_id="902349" ref_url="https://bugzilla.suse.com/902349" source="BUGZILLA"/>
		<reference ref_id="903640" ref_url="https://bugzilla.suse.com/903640" source="BUGZILLA"/>
		<reference ref_id="904177" ref_url="https://bugzilla.suse.com/904177" source="BUGZILLA"/>
		<reference ref_id="904883" ref_url="https://bugzilla.suse.com/904883" source="BUGZILLA"/>
		<reference ref_id="904899" ref_url="https://bugzilla.suse.com/904899" source="BUGZILLA"/>
		<reference ref_id="904901" ref_url="https://bugzilla.suse.com/904901" source="BUGZILLA"/>
		<reference ref_id="905100" ref_url="https://bugzilla.suse.com/905100" source="BUGZILLA"/>
		<reference ref_id="905304" ref_url="https://bugzilla.suse.com/905304" source="BUGZILLA"/>
		<reference ref_id="905329" ref_url="https://bugzilla.suse.com/905329" source="BUGZILLA"/>
		<reference ref_id="905482" ref_url="https://bugzilla.suse.com/905482" source="BUGZILLA"/>
		<reference ref_id="905783" ref_url="https://bugzilla.suse.com/905783" source="BUGZILLA"/>
		<reference ref_id="906196" ref_url="https://bugzilla.suse.com/906196" source="BUGZILLA"/>
		<reference ref_id="907069" ref_url="https://bugzilla.suse.com/907069" source="BUGZILLA"/>
		<reference ref_id="908069" ref_url="https://bugzilla.suse.com/908069" source="BUGZILLA"/>
		<reference ref_id="908322" ref_url="https://bugzilla.suse.com/908322" source="BUGZILLA"/>
		<reference ref_id="908825" ref_url="https://bugzilla.suse.com/908825" source="BUGZILLA"/>
		<reference ref_id="908904" ref_url="https://bugzilla.suse.com/908904" source="BUGZILLA"/>
		<reference ref_id="909829" ref_url="https://bugzilla.suse.com/909829" source="BUGZILLA"/>
		<reference ref_id="910322" ref_url="https://bugzilla.suse.com/910322" source="BUGZILLA"/>
		<reference ref_id="911326" ref_url="https://bugzilla.suse.com/911326" source="BUGZILLA"/>
		<reference ref_id="912202" ref_url="https://bugzilla.suse.com/912202" source="BUGZILLA"/>
		<reference ref_id="912654" ref_url="https://bugzilla.suse.com/912654" source="BUGZILLA"/>
		<reference ref_id="912705" ref_url="https://bugzilla.suse.com/912705" source="BUGZILLA"/>
		<reference ref_id="913059" ref_url="https://bugzilla.suse.com/913059" source="BUGZILLA"/>
		<reference ref_id="914112" ref_url="https://bugzilla.suse.com/914112" source="BUGZILLA"/>
		<reference ref_id="914126" ref_url="https://bugzilla.suse.com/914126" source="BUGZILLA"/>
		<reference ref_id="914254" ref_url="https://bugzilla.suse.com/914254" source="BUGZILLA"/>
		<reference ref_id="914291" ref_url="https://bugzilla.suse.com/914291" source="BUGZILLA"/>
		<reference ref_id="914294" ref_url="https://bugzilla.suse.com/914294" source="BUGZILLA"/>
		<reference ref_id="914300" ref_url="https://bugzilla.suse.com/914300" source="BUGZILLA"/>
		<reference ref_id="914457" ref_url="https://bugzilla.suse.com/914457" source="BUGZILLA"/>
		<reference ref_id="914464" ref_url="https://bugzilla.suse.com/914464" source="BUGZILLA"/>
		<reference ref_id="914726" ref_url="https://bugzilla.suse.com/914726" source="BUGZILLA"/>
		<reference ref_id="915188" ref_url="https://bugzilla.suse.com/915188" source="BUGZILLA"/>
		<reference ref_id="915322" ref_url="https://bugzilla.suse.com/915322" source="BUGZILLA"/>
		<reference ref_id="915335" ref_url="https://bugzilla.suse.com/915335" source="BUGZILLA"/>
		<reference ref_id="915425" ref_url="https://bugzilla.suse.com/915425" source="BUGZILLA"/>
		<reference ref_id="915454" ref_url="https://bugzilla.suse.com/915454" source="BUGZILLA"/>
		<reference ref_id="915456" ref_url="https://bugzilla.suse.com/915456" source="BUGZILLA"/>
		<reference ref_id="915550" ref_url="https://bugzilla.suse.com/915550" source="BUGZILLA"/>
		<reference ref_id="915660" ref_url="https://bugzilla.suse.com/915660" source="BUGZILLA"/>
		<reference ref_id="916107" ref_url="https://bugzilla.suse.com/916107" source="BUGZILLA"/>
		<reference ref_id="916513" ref_url="https://bugzilla.suse.com/916513" source="BUGZILLA"/>
		<reference ref_id="916646" ref_url="https://bugzilla.suse.com/916646" source="BUGZILLA"/>
		<reference ref_id="917089" ref_url="https://bugzilla.suse.com/917089" source="BUGZILLA"/>
		<reference ref_id="917128" ref_url="https://bugzilla.suse.com/917128" source="BUGZILLA"/>
		<reference ref_id="918161" ref_url="https://bugzilla.suse.com/918161" source="BUGZILLA"/>
		<reference ref_id="918255" ref_url="https://bugzilla.suse.com/918255" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3673" ref_url="https://www.suse.com/security/cve/CVE-2014-3673/" source="CVE"/>
		<reference ref_id="CVE-2014-3687" ref_url="https://www.suse.com/security/cve/CVE-2014-3687/" source="CVE"/>
		<reference ref_id="CVE-2014-7822" ref_url="https://www.suse.com/security/cve/CVE-2014-7822/" source="CVE"/>
		<reference ref_id="CVE-2014-7841" ref_url="https://www.suse.com/security/cve/CVE-2014-7841/" source="CVE"/>
		<reference ref_id="CVE-2014-8160" ref_url="https://www.suse.com/security/cve/CVE-2014-8160/" source="CVE"/>
		<reference ref_id="CVE-2014-8559" ref_url="https://www.suse.com/security/cve/CVE-2014-8559/" source="CVE"/>
		<reference ref_id="CVE-2014-9419" ref_url="https://www.suse.com/security/cve/CVE-2014-9419/" source="CVE"/>
		<reference ref_id="CVE-2014-9584" ref_url="https://www.suse.com/security/cve/CVE-2014-9584/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 kernel was updated to 3.12.38 to receive
various security and bugfixes.

This update contains the following feature enablements:
- The remote block device (rbd) and ceph drivers have been enabled and
  are now supported. (FATE#318350)
  These can be used e.g. for accessing the SUSE Enterprise Storage product
  services.

- Support for Intel Select Bay trail CPUs has been added. (FATE#316038)

Following security issues were fixed:
- CVE-2014-9419: The __switch_to function in arch/x86/kernel/process_64.c
  in the Linux kernel through 3.18.1 did not ensure that Thread Local
  Storage (TLS) descriptors were loaded before proceeding with other steps,
  which made it easier for local users to bypass the ASLR protection
  mechanism via a crafted application that reads a TLS base address
  (bnc#911326).

- CVE-2014-7822: A flaw was found in the way the Linux kernels splice()
  system call validated its parameters. On certain file systems, a local,
  unprivileged user could have used this flaw to write past the maximum
  file size, and thus crash the system.

- CVE-2014-8160: The connection tracking module could be bypassed if a specific
  protocol module was not loaded, e.g. allowing SCTP traffic while the firewall
  should have filtered it.

- CVE-2014-9584: The parse_rock_ridge_inode_internal function in
  fs/isofs/rock.c in the Linux kernel before 3.18.2 did not validate a
  length value in the Extensions Reference (ER) System Use Field, which
  allowed local users to obtain sensitive information from kernel memory
  via a crafted iso9660 image (bnc#912654).

The following non-security bugs were fixed:
- audit: Allow login in non-init namespaces (bnc#916107).
- btrfs: avoid unnecessary switch of path locks to blocking mode.
- btrfs: fix directory inconsistency after fsync log replay (bnc#915425).
- btrfs: fix fsync log replay for inodes with a mix of regular refs and
  extrefs (bnc#915425).
- btrfs: fix fsync race leading to ordered extent memory leaks (bnc#917128).
- btrfs: fix fsync when extend references are added to an inode (bnc#915425).
- btrfs: fix missing error handler if submiting re-read bio fails.
- btrfs: fix race between transaction commit and empty block group removal (bnc#915550).
- btrfs: fix scrub race leading to use-after-free (bnc#915456).
- btrfs: fix setup_leaf_for_split() to avoid leaf corruption (bnc#915454).
- btrfs: improve free space cache management and space allocation.
- btrfs: make btrfs_search_forward return with nodes unlocked.
- btrfs: scrub, fix sleep in atomic context (bnc#915456).
- btrfs: unlock nodes earlier when inserting items in a btree.
- drm/i915: On G45 enable cursor plane briefly after enabling the display plane (bnc#918161).
- Fix Module.supported handling for external modules (bnc#905304).
- keys: close race between key lookup and freeing (bnc#912202).
- msi: also reject resource with flags all clear.
- pci: Add ACS quirk for Emulex NICs (bug#917089).
- pci: Add ACS quirk for Intel 10G NICs (bug#917089).
- pci: Add ACS quirk for Solarflare SFC9120 &amp; SFC9140 (bug#917089).
- Refresh other Xen patches (bsc#909829).
- Update patches.suse/btrfs-8177-improve-free-space-cache-management-and-space-.patch (bnc#895805).
- be2net: avoid flashing SH-B0 UFI image on SH-P2 chip (bug#908322).
- be2net: refactor code that checks flash file compatibility (bug#908322).
- ceph: Add necessary clean up if invalid reply received in handle_reply() (bsc#918255).
- crush: CHOOSE_LEAF -&amp;gt; CHOOSELEAF throughout (bsc#918255).
- crush: add SET_CHOOSE_TRIES rule step (bsc#918255).
- crush: add note about r in recursive choose (bsc#918255).
- crush: add set_choose_local_[fallback_]tries steps (bsc#918255).
- crush: apply chooseleaf_tries to firstn mode too (bsc#918255).
- crush: attempts -&amp;gt; tries (bsc#918255).
- crush: clarify numrep vs endpos (bsc#918255).
- crush: eliminate CRUSH_MAX_SET result size limitation (bsc#918255).
- crush: factor out (trivial) crush_destroy_rule() (bsc#918255).
- crush: fix crush_choose_firstn comment (bsc#918255).
- crush: fix some comments (bsc#918255).
- crush: generalize descend_once (bsc#918255).
- crush: new SET_CHOOSE_LEAF_TRIES command (bsc#918255).
- crush: pass parent r value for indep call (bsc#918255).
- crush: pass weight vector size to map function (bsc#918255).
- crush: reduce scope of some local variables (bsc#918255).
- crush: return CRUSH_ITEM_UNDEF for failed placements with indep (bsc#918255).
- crush: strip firstn conditionals out of crush_choose, rename (bsc#918255).
- crush: use breadth-first search for indep mode (bsc#918255).
- crypto: drbg - panic on continuous self test error (bsc#905482).
- dasd: List corruption in error recovery (bnc#914291, LTC#120865).
- epoll: optimize setting task running after blocking (epoll-performance).
- fips: We need to activate gcm(aes) in FIPS mode, RFCs 4106 and 4543 (bsc#914126,bsc#914457).
- fips: __driver-gcm-aes-aesni needs to be listed explicitly inside the testmgr.c file (bsc#914457).
- flow_dissector: add tipc support (bnc#916513).
- hotplug, powerpc, x86: Remove cpu_hotplug_driver_lock() (bsc#907069).
- hyperv: Add support for vNIC hot removal.
- kernel: incorrect clock_gettime result (bnc#914291, LTC#121184).
- kvm: iommu: Add cond_resched to legacy device assignment code (bsc#898687).
- libceph: CEPH_OSD_FLAG_* enum update (bsc#918255).
- libceph: add ceph_kv{malloc,free}() and switch to them (bsc#918255).
- libceph: add ceph_pg_pool_by_id() (bsc#918255).
- libceph: all features fields must be u64 (bsc#918255).
- libceph: dout() is missing a newline (bsc#918255).
- libceph: factor out logic from ceph_osdc_start_request() (bsc#918255).
- libceph: fix error handling in ceph_osdc_init() (bsc#918255).
- libceph: follow redirect replies from osds (bsc#918255).
- libceph: follow {read,write}_tier fields on osd request submission (bsc#918255).
- libceph: introduce and start using oid abstraction (bsc#918255).
- libceph: rename MAX_OBJ_NAME_SIZE to CEPH_MAX_OID_NAME_LEN (bsc#918255).
- libceph: rename ceph_osd_request::r_{oloc,oid} to r_base_{oloc,oid} (bsc#918255).
- libceph: replace ceph_calc_ceph_pg() with ceph_oloc_oid_to_pg() (bsc#918255).
- libceph: start using oloc abstraction (bsc#918255).
- libceph: take map_sem for read in handle_reply() (bsc#918255).
- libceph: update ceph_features.h (bsc#918255).
- libceph: use CEPH_MON_PORT when the specified port is 0 (bsc#918255).
- locking/mutex: Explicitly mark task as running after wakeup (mutex scalability).
- locking/osq: No need for load/acquire when acquire-polling (mutex scalability).
- locking/rtmutex: Optimize setting task running after being blocked (mutex scalability).
- mm/compaction: fix wrong order check in compact_finished() (VM Performance, bnc#904177).
- mm/compaction: stop the isolation when we isolate enough freepage (VM Performance, bnc#904177).
- mm: fix negative nr_isolated counts (VM Performance).
- mutex-debug: Always clear owner field upon mutex_unlock() (mutex bugfix).
- net: 8021q/bluetooth/bridge/can/ceph: Remove extern from function prototypes (bsc#918255).
- net: allow macvlans to move to net namespace (bnc#915660).
- net:socket: set msg_namelen to 0 if msg_name is passed as NULL in msghdr struct from userland (bnc#900270).
- nfs_prime_dcache needs fh to be set (bnc#908069 bnc#896484).
- ocfs2: remove filesize checks for sync I/O journal commit (bnc#800255). Update references.
- powerpc/xmon: Fix another endiannes issue in RTAS call from xmon (bsc#915188).
- pvscsi: support suspend/resume (bsc#902286).
- random: account for entropy loss due to overwrites (bsc#904883,bsc#904901).
- random: allow fractional bits to be tracked (bsc#904883,bsc#904901).
- random: statically compute poolbitshift, poolbytes, poolbits (bsc#904883,bsc#904901).
- rbd: add '^A' sysfs rbd device attribute (bsc#918255).
- rbd: add support for single-major device number allocation scheme (bsc#918255).
- rbd: enable extended devt in single-major mode (bsc#918255).
- rbd: introduce rbd_dev_header_unwatch_sync() and switch to it (bsc#918255).
- rbd: rbd_device::dev_id is an int, format it as such (bsc#918255).
- rbd: refactor rbd_init() a bit (bsc#918255).
- rbd: switch to ida for rbd id assignments (bsc#918255).
- rbd: tear down watch request if rbd_dev_device_setup() fails (bsc#918255).
- rbd: tweak 'loaded' message and module description (bsc#918255).
- rbd: wire up is_visible() sysfs callback for rbd bus (bsc#918255).
- rpm/kernel-binary.spec.in: Own the modules directory in the devel package (bnc#910322)
- s390/dasd: fix infinite loop during format (bnc#914291, LTC#120608).
- s390/dasd: remove unused code (bnc#914291, LTC#120608).
- sched/Documentation: Remove unneeded word (mutex scalability).
- sched/completion: Add lock-free checking of the blocking case (scheduler scalability).
- scsifront: avoid acquiring same lock twice if ring is full.
- scsifront: do not use bitfields for indicators modified under different locks.
- swiotlb: Warn on allocation failure in swiotlb_alloc_coherent (bsc#905783).
- uas: Add NO_ATA_1X for VIA VL711 devices (bnc#914254).
- uas: Add US_FL_NO_ATA_1X for 2 more Seagate disk enclosures (bnc#914254).
- uas: Add US_FL_NO_ATA_1X for Seagate devices with usb-id 0bc2:a013 (bnc#914254).
- uas: Add US_FL_NO_ATA_1X quirk for 1 more Seagate model (bnc#914254).
- uas: Add US_FL_NO_ATA_1X quirk for 2 more Seagate models (bnc#914254).
- uas: Add US_FL_NO_ATA_1X quirk for Seagate (0bc2:ab20) drives (bnc#914254).
- uas: Add a quirk for rejecting ATA_12 and ATA_16 commands (bnc#914254).
- uas: Add missing le16_to_cpu calls to asm1051 / asm1053 usb-id check (bnc#914294).
- uas: Add no-report-opcodes quirk (bnc#914254).
- uas: Disable uas on ASM1051 devices (bnc#914294).
- uas: Do not blacklist ASM1153 disk enclosures (bnc#914294).
- uas: Use streams on upcoming 10Gbps / 3.1 USB (bnc#914464).
- uas: disable UAS on Apricorn SATA dongles (bnc#914300).
- usb-storage: support for more than 8 LUNs (bsc#906196).
- x86, crash: Allocate enough low-mem when crashkernel=high (bsc#905783).
- x86, crash: Allocate enough low-mem when crashkernel=high (bsc#905783).
- x86, swiotlb: Try coherent allocations with __GFP_NOWARN (bsc#905783).
- x86/hpet: Make boot_hpet_disable extern (bnc#916646).
- x86/intel: Add quirk to disable HPET for the Baytrail platform (bnc#916646).
- x86: irq: Check for valid irq descriptor incheck_irq_vectors_for_cpu_disable (bnc#914726).
- x86: irq: Check for valid irq descriptor in check_irq_vectors_for_cpu_disable (bnc#914726).
- xhci: Add broken-streams quirk for Fresco Logic FL1000G xhci controllers (bnc#914112).
- zcrypt: Number of supported ap domains is not retrievable (bnc#914291, LTC#120788).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-20"/>
	<updated date="2015-02-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/799216">SUSE bug 799216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800255">SUSE bug 800255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860346">SUSE bug 860346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875220">SUSE bug 875220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877456">SUSE bug 877456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884407">SUSE bug 884407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895805">SUSE bug 895805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896484">SUSE bug 896484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897736">SUSE bug 897736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898687">SUSE bug 898687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900270">SUSE bug 900270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902286">SUSE bug 902286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902346">SUSE bug 902346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902349">SUSE bug 902349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903640">SUSE bug 903640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904177">SUSE bug 904177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904883">SUSE bug 904883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904899">SUSE bug 904899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904901">SUSE bug 904901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905100">SUSE bug 905100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905304">SUSE bug 905304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905329">SUSE bug 905329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905482">SUSE bug 905482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905783">SUSE bug 905783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906196">SUSE bug 906196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907069">SUSE bug 907069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908069">SUSE bug 908069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908322">SUSE bug 908322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908825">SUSE bug 908825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908904">SUSE bug 908904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909829">SUSE bug 909829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910322">SUSE bug 910322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911326">SUSE bug 911326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912202">SUSE bug 912202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912654">SUSE bug 912654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912705">SUSE bug 912705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913059">SUSE bug 913059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914112">SUSE bug 914112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914126">SUSE bug 914126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914254">SUSE bug 914254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914291">SUSE bug 914291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914294">SUSE bug 914294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914300">SUSE bug 914300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914457">SUSE bug 914457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914464">SUSE bug 914464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914726">SUSE bug 914726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915188">SUSE bug 915188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915322">SUSE bug 915322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915335">SUSE bug 915335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915425">SUSE bug 915425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915454">SUSE bug 915454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915456">SUSE bug 915456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915550">SUSE bug 915550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915660">SUSE bug 915660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916107">SUSE bug 916107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916513">SUSE bug 916513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916646">SUSE bug 916646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917089">SUSE bug 917089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917128">SUSE bug 917128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918161">SUSE bug 918161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918255">SUSE bug 918255</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3673/">CVE-2014-3673</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3687/">CVE-2014-3687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7822/">CVE-2014-7822</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7841/">CVE-2014-7841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8160/">CVE-2014-8160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8559/">CVE-2014-8559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9419/">CVE-2014-9419</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9584/">CVE-2014-9584</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514590" comment="kernel-default-3.12.38-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514591" comment="kernel-default-devel-3.12.38-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514592" comment="kernel-default-extra-3.12.38-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514593" comment="kernel-devel-3.12.38-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514594" comment="kernel-macros-3.12.38-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514595" comment="kernel-source-3.12.38-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514596" comment="kernel-syms-3.12.38-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514597" comment="kernel-xen-3.12.38-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514598" comment="kernel-xen-devel-3.12.38-44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77236" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="919648" ref_url="https://bugzilla.suse.com/919648" source="BUGZILLA"/>
		<reference ref_id="920236" ref_url="https://bugzilla.suse.com/920236" source="BUGZILLA"/>
		<reference ref_id="922488" ref_url="https://bugzilla.suse.com/922488" source="BUGZILLA"/>
		<reference ref_id="922496" ref_url="https://bugzilla.suse.com/922496" source="BUGZILLA"/>
		<reference ref_id="922499" ref_url="https://bugzilla.suse.com/922499" source="BUGZILLA"/>
		<reference ref_id="922500" ref_url="https://bugzilla.suse.com/922500" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html" source="SUSE-SU"/>
		<description>

OpenSSL was updated to fix various security issues.

Following security issues were fixed:
- CVE-2015-0209: A Use After Free following d2i_ECPrivatekey error
  was fixed which could lead to crashes for attacker supplied Elliptic
  Curve keys. This could be exploited over SSL connections with client
  supplied keys.

- CVE-2015-0286: A segmentation fault in ASN1_TYPE_cmp was fixed that
  could be exploited by attackers when e.g. client authentication is
  used. This could be exploited over SSL connections.

- CVE-2015-0287: A ASN.1 structure reuse memory corruption was fixed. This
  problem can not be exploited over regular SSL connections, only if
  specific client programs use specific ASN.1 routines.

- CVE-2015-0288: A X509_to_X509_REQ NULL pointer dereference was fixed,
  which could lead to crashes. This function is not commonly used, and
  not reachable over SSL methods.

- CVE-2015-0289: Several PKCS7 NULL pointer dereferences were fixed,
  which could lead to crashes of programs using the PKCS7 APIs. The SSL
  apis do not use those by default.

- CVE-2015-0293: Denial of service via reachable assert in SSLv2 servers,
  could be used by remote attackers to terminate the server process. Note
  that this requires SSLv2 being allowed, which is not the default.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-18"/>
	<updated date="2015-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920236">SUSE bug 920236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922488">SUSE bug 922488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922496">SUSE bug 922496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922499">SUSE bug 922499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922500">SUSE bug 922500</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514599" comment="libopenssl1_0_0-1.0.1i-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514600" comment="libopenssl1_0_0-32bit-1.0.1i-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514601" comment="openssl-1.0.1i-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77237" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl098 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="915976" ref_url="https://bugzilla.suse.com/915976" source="BUGZILLA"/>
		<reference ref_id="919648" ref_url="https://bugzilla.suse.com/919648" source="BUGZILLA"/>
		<reference ref_id="920236" ref_url="https://bugzilla.suse.com/920236" source="BUGZILLA"/>
		<reference ref_id="922488" ref_url="https://bugzilla.suse.com/922488" source="BUGZILLA"/>
		<reference ref_id="922496" ref_url="https://bugzilla.suse.com/922496" source="BUGZILLA"/>
		<reference ref_id="922499" ref_url="https://bugzilla.suse.com/922499" source="BUGZILLA"/>
		<reference ref_id="922500" ref_url="https://bugzilla.suse.com/922500" source="BUGZILLA"/>
		<reference ref_id="922501" ref_url="https://bugzilla.suse.com/922501" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-5146" ref_url="https://www.suse.com/security/cve/CVE-2009-5146/" source="CVE"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0292" ref_url="https://www.suse.com/security/cve/CVE-2015-0292/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00024.html" source="SUSE-SU"/>
		<description>
OpenSSL was updated to fix various security issues.

Following security issues were fixed:
- CVE-2015-0209: A Use After Free following d2i_ECPrivatekey error
  was fixed which could lead to crashes for attacker supplied Elliptic
  Curve keys. This could be exploited over SSL connections with client
  supplied keys.

- CVE-2015-0286: A segmentation fault in ASN1_TYPE_cmp was fixed that
  could be exploited by attackers when e.g. client authentication is
  used. This could be exploited over SSL connections.

- CVE-2015-0287: A ASN.1 structure reuse memory corruption was fixed. This
  problem can not be exploited over regular SSL connections, only if
  specific client programs use specific ASN.1 routines.

- CVE-2015-0288: A X509_to_X509_REQ NULL pointer dereference was fixed,
  which could lead to crashes. This function is not commonly used, and
  not reachable over SSL methods.

- CVE-2015-0289: Several PKCS7 NULL pointer dereferences were fixed,
  which could lead to crashes of programs using the PKCS7 APIs. The SSL
  apis do not use those by default.

- CVE-2015-0292: Various issues in base64 decoding were fixed, which
  could lead to crashes with memory corruption, for instance by using
  attacker supplied PEM data.

- CVE-2015-0293: Denial of service via reachable assert in SSLv2 servers,
  could be used by remote attackers to terminate the server process. Note
  that this requires SSLv2 being allowed, which is not the default.

- CVE-2009-5146: A memory leak in the TLS hostname extension was fixed,
  which could be used by remote attackers to run SSL services out of memory.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-18"/>
	<updated date="2015-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/915976">SUSE bug 915976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920236">SUSE bug 920236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922488">SUSE bug 922488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922496">SUSE bug 922496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922499">SUSE bug 922499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922500">SUSE bug 922500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922501">SUSE bug 922501</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5146/">CVE-2009-5146</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0292/">CVE-2015-0292</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514602" comment="libopenssl0_9_8-0.9.8j-73.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514603" comment="libopenssl0_9_8-32bit-0.9.8j-73.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77238" version="1" class="patch">
	<metadata>
		<title>Security update for Xerces-C (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="920810" ref_url="https://bugzilla.suse.com/920810" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0252" ref_url="https://www.suse.com/security/cve/CVE-2015-0252/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001316.html" source="SUSE-SU"/>
		<description>

The Xerces-C XML parsing library was updated to fix mishandling certain kinds of malformed input documents,
that could have resulted in a segmentation faults during a parse operation, leading to denial of service
or potential code execution. (bnc#920810,CVE-2015-0252)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-09"/>
	<updated date="2015-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/920810">SUSE bug 920810</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0252/">CVE-2015-0252</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514604" comment="libxerces-c-3_1-3.1.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514605" comment="libxerces-c-3_1-32bit-3.1.1-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77239" version="1" class="patch">
	<metadata>
		<title>Security update for Xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="861318" ref_url="https://bugzilla.suse.com/861318" source="BUGZILLA"/>
		<reference ref_id="882089" ref_url="https://bugzilla.suse.com/882089" source="BUGZILLA"/>
		<reference ref_id="895528" ref_url="https://bugzilla.suse.com/895528" source="BUGZILLA"/>
		<reference ref_id="901488" ref_url="https://bugzilla.suse.com/901488" source="BUGZILLA"/>
		<reference ref_id="903680" ref_url="https://bugzilla.suse.com/903680" source="BUGZILLA"/>
		<reference ref_id="904255" ref_url="https://bugzilla.suse.com/904255" source="BUGZILLA"/>
		<reference ref_id="906996" ref_url="https://bugzilla.suse.com/906996" source="BUGZILLA"/>
		<reference ref_id="910254" ref_url="https://bugzilla.suse.com/910254" source="BUGZILLA"/>
		<reference ref_id="910681" ref_url="https://bugzilla.suse.com/910681" source="BUGZILLA"/>
		<reference ref_id="912011" ref_url="https://bugzilla.suse.com/912011" source="BUGZILLA"/>
		<reference ref_id="918995" ref_url="https://bugzilla.suse.com/918995" source="BUGZILLA"/>
		<reference ref_id="918998" ref_url="https://bugzilla.suse.com/918998" source="BUGZILLA"/>
		<reference ref_id="919098" ref_url="https://bugzilla.suse.com/919098" source="BUGZILLA"/>
		<reference ref_id="919464" ref_url="https://bugzilla.suse.com/919464" source="BUGZILLA"/>
		<reference ref_id="919663" ref_url="https://bugzilla.suse.com/919663" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3615" ref_url="https://www.suse.com/security/cve/CVE-2014-3615/" source="CVE"/>
		<reference ref_id="CVE-2014-9065" ref_url="https://www.suse.com/security/cve/CVE-2014-9065/" source="CVE"/>
		<reference ref_id="CVE-2014-9066" ref_url="https://www.suse.com/security/cve/CVE-2014-9066/" source="CVE"/>
		<reference ref_id="CVE-2015-0361" ref_url="https://www.suse.com/security/cve/CVE-2015-0361/" source="CVE"/>
		<reference ref_id="CVE-2015-2044" ref_url="https://www.suse.com/security/cve/CVE-2015-2044/" source="CVE"/>
		<reference ref_id="CVE-2015-2045" ref_url="https://www.suse.com/security/cve/CVE-2015-2045/" source="CVE"/>
		<reference ref_id="CVE-2015-2151" ref_url="https://www.suse.com/security/cve/CVE-2015-2151/" source="CVE"/>
		<reference ref_id="CVE-2015-2152" ref_url="https://www.suse.com/security/cve/CVE-2015-2152/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00031.html" source="SUSE-SU"/>
		<description>

The XEN hypervisor received updates to fix various security issues and bugs.

The following security issues were fixed:
- CVE-2015-2151: XSA-123: A hypervisor memory corruption due to x86 emulator flaw.
- CVE-2015-2045: XSA-122: Information leak through version information hypercall.
- CVE-2015-2044: XSA-121: Information leak via internal x86 system device emulation.
- CVE-2015-2152: XSA-119: HVM qemu was unexpectedly enabling emulated VGA graphics backends.
- CVE-2014-3615: Information leakage when guest sets high graphics resolution.
- CVE-2015-0361: XSA-116: A xen crash due to use after free on hvm guest teardown.
- CVE-2014-9065, CVE-2014-9066: XSA-114: xen: p2m lock starvation.

Also the following bugs were fixed:
- bnc#919098 - XEN blktap device intermittently fails to connect 
- bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus
- bnc#903680 - Problems with detecting free loop devices on Xen guest startup
- bnc#861318 - xentop reports 'Found interface vif101.0 but domain 101 does not exist.' 
- Update seabios to rel-1.7.3.1 which is the correct version for Xen 4.4
- Enhancement to virsh/libvirtd 'send-key' command The xen side small fix. (FATE#317240)
- bnc#901488 - Intel ixgbe driver assigns rx/tx queues per core
  resulting in irq problems on servers with a large amount of CPU
  cores
- bnc#910254 - SLES11 SP3 Xen VT-d igb NIC doesn't work
- Add domain_migrate_constraints_set API to Xend's http interface (FATE#317239)
- Restore missing fixes from block-dmmd script
- bnc#904255 - XEN boot hangs in early boot on UEFI system
- bsc#912011 - high ping latency after upgrade to latest SLES11SP3 on xen Dom0
- Fix missing banner by restoring the figlet program.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-09"/>
	<updated date="2015-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/861318">SUSE bug 861318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882089">SUSE bug 882089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895528">SUSE bug 895528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901488">SUSE bug 901488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903680">SUSE bug 903680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904255">SUSE bug 904255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906996">SUSE bug 906996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910254">SUSE bug 910254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910681">SUSE bug 910681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912011">SUSE bug 912011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918995">SUSE bug 918995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918998">SUSE bug 918998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919098">SUSE bug 919098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919464">SUSE bug 919464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919663">SUSE bug 919663</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3615/">CVE-2014-3615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9065/">CVE-2014-9065</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9066/">CVE-2014-9066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0361/">CVE-2015-0361</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2044/">CVE-2015-2044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2045/">CVE-2015-2045</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2151/">CVE-2015-2151</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2152/">CVE-2015-2152</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514606" comment="xen-4.4.1_10-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514607" comment="xen-kmp-default-4.4.1_10_k3.12.36_38-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514608" comment="xen-libs-4.4.1_10-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514609" comment="xen-libs-32bit-4.4.1_10-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77240" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="923534" ref_url="https://bugzilla.suse.com/923534" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0817" ref_url="https://www.suse.com/security/cve/CVE-2015-0817/" source="CVE"/>
		<reference ref_id="CVE-2015-0818" ref_url="https://www.suse.com/security/cve/CVE-2015-0818/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00035.html" source="SUSE-SU"/>
		<description>
MozillaFirefox was updated to the 31.5.3ESR release to fix two security vulnerabilities:

MFSA 2015-29 / CVE-2015-0817: Security researcher ilxu1a reported, through HP Zero Day Initiative's Pwn2Own contest, a flaw in Mozilla's implementation of typed array bounds checking in JavaScript just-in-time compilation (JIT) and its management of bounds checking for heap access. This flaw can be leveraged into the reading and writing of memory allowing for arbitary code execution on the local system.

MFSA 2015-28 / CVE-2015-0818:
Security researcher Mariusz Mlynski reported, through HP Zero Day Initiative's Pwn2Own contest, a method to run arbitrary scripts in a privileged context. This bypassed the same-origin policy protections by using a flaw in the processing of SVG format content navigation.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-24"/>
	<updated date="2015-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0817/">CVE-2015-0817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0818/">CVE-2015-0818</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514610" comment="MozillaFirefox-31.5.3esr-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514611" comment="MozillaFirefox-translations-31.5.3esr-27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77241" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo, libjpeg62-turbo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="906761" ref_url="https://bugzilla.suse.com/906761" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9092" ref_url="https://www.suse.com/security/cve/CVE-2014-9092/" source="CVE"/>
		<description>
libjpeg-turbo, libjpeg62-turbo were updated to fix one security issue.

This security issue was fixed:
- Passing special crafted jpeg file smashes stack (CVE-2014-9092).
  		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-04"/>
	<updated date="2014-12-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/906761">SUSE bug 906761</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9092/">CVE-2014-9092</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514612" comment="libjpeg-turbo-1.3.1-30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514613" comment="libjpeg62-62.1.0-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514614" comment="libjpeg62-turbo-1.3.1-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514615" comment="libjpeg8-8.0.2-30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514616" comment="libjpeg8-32bit-8.0.2-30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514617" comment="libturbojpeg0-8.0.2-30.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77242" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="920696" ref_url="https://bugzilla.suse.com/920696" source="BUGZILLA"/>
		<reference ref_id="920697" ref_url="https://bugzilla.suse.com/920697" source="BUGZILLA"/>
		<reference ref_id="920699" ref_url="https://bugzilla.suse.com/920699" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2188" ref_url="https://www.suse.com/security/cve/CVE-2015-2188/" source="CVE"/>
		<reference ref_id="CVE-2015-2189" ref_url="https://www.suse.com/security/cve/CVE-2015-2189/" source="CVE"/>
		<reference ref_id="CVE-2015-2191" ref_url="https://www.suse.com/security/cve/CVE-2015-2191/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0657-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001325.html" source="SUSE-SU"/>
		<description>
Wireshark was updated to 1.10.13 to fix bugs and security issues.

The following security issues were fixed:
* The WCP dissector could crash.
  wnpa-sec-2015-07 CVE-2015-2188 [bnc#920696]
* The pcapng file parser could crash.
  wnpa-sec-2015-08 CVE-2015-2189 [bnc#920697]
* The TNEF dissector could go into an infinite loop.
  wnpa-sec-2015-10 CVE-2015-2191 [bnc#920699]
- Further bug fixes and updated protocol support as listed in:
  https://www.wireshark.org/docs/relnotes/wireshark-1.10.13.html
		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-12"/>
	<updated date="2015-03-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/920696">SUSE bug 920696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920697">SUSE bug 920697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920699">SUSE bug 920699</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2188/">CVE-2015-2188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2189/">CVE-2015-2189</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2191/">CVE-2015-2191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514618" comment="wireshark-1.10.13-8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77243" version="1" class="patch">
	<metadata>
		<title>Security Update for Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="898675" ref_url="https://bugzilla.suse.com/898675" source="BUGZILLA"/>
		<reference ref_id="903997" ref_url="https://bugzilla.suse.com/903997" source="BUGZILLA"/>
		<reference ref_id="904242" ref_url="https://bugzilla.suse.com/904242" source="BUGZILLA"/>
		<reference ref_id="909309" ref_url="https://bugzilla.suse.com/909309" source="BUGZILLA"/>
		<reference ref_id="909477" ref_url="https://bugzilla.suse.com/909477" source="BUGZILLA"/>
		<reference ref_id="909684" ref_url="https://bugzilla.suse.com/909684" source="BUGZILLA"/>
		<reference ref_id="910517" ref_url="https://bugzilla.suse.com/910517" source="BUGZILLA"/>
		<reference ref_id="913080" ref_url="https://bugzilla.suse.com/913080" source="BUGZILLA"/>
		<reference ref_id="914818" ref_url="https://bugzilla.suse.com/914818" source="BUGZILLA"/>
		<reference ref_id="915200" ref_url="https://bugzilla.suse.com/915200" source="BUGZILLA"/>
		<reference ref_id="915660" ref_url="https://bugzilla.suse.com/915660" source="BUGZILLA"/>
		<reference ref_id="917830" ref_url="https://bugzilla.suse.com/917830" source="BUGZILLA"/>
		<reference ref_id="918584" ref_url="https://bugzilla.suse.com/918584" source="BUGZILLA"/>
		<reference ref_id="918615" ref_url="https://bugzilla.suse.com/918615" source="BUGZILLA"/>
		<reference ref_id="918620" ref_url="https://bugzilla.suse.com/918620" source="BUGZILLA"/>
		<reference ref_id="918644" ref_url="https://bugzilla.suse.com/918644" source="BUGZILLA"/>
		<reference ref_id="919463" ref_url="https://bugzilla.suse.com/919463" source="BUGZILLA"/>
		<reference ref_id="919719" ref_url="https://bugzilla.suse.com/919719" source="BUGZILLA"/>
		<reference ref_id="919939" ref_url="https://bugzilla.suse.com/919939" source="BUGZILLA"/>
		<reference ref_id="920615" ref_url="https://bugzilla.suse.com/920615" source="BUGZILLA"/>
		<reference ref_id="920805" ref_url="https://bugzilla.suse.com/920805" source="BUGZILLA"/>
		<reference ref_id="920839" ref_url="https://bugzilla.suse.com/920839" source="BUGZILLA"/>
		<reference ref_id="921313" ref_url="https://bugzilla.suse.com/921313" source="BUGZILLA"/>
		<reference ref_id="921527" ref_url="https://bugzilla.suse.com/921527" source="BUGZILLA"/>
		<reference ref_id="921990" ref_url="https://bugzilla.suse.com/921990" source="BUGZILLA"/>
		<reference ref_id="922272" ref_url="https://bugzilla.suse.com/922272" source="BUGZILLA"/>
		<reference ref_id="922275" ref_url="https://bugzilla.suse.com/922275" source="BUGZILLA"/>
		<reference ref_id="922278" ref_url="https://bugzilla.suse.com/922278" source="BUGZILLA"/>
		<reference ref_id="922284" ref_url="https://bugzilla.suse.com/922284" source="BUGZILLA"/>
		<reference ref_id="924460" ref_url="https://bugzilla.suse.com/924460" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0777" ref_url="https://www.suse.com/security/cve/CVE-2015-0777/" source="CVE"/>
		<reference ref_id="CVE-2015-2150" ref_url="https://www.suse.com/security/cve/CVE-2015-2150/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00001.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise Server 12 kernel was updated to 3.12.39 to
receive various security and bugfixes.

Following security bugs were fixed:
- CVE-2015-0777: The XEN usb backend could leak information to the guest
  system due to copying uninitialized memory.

- CVE-2015-2150: Xen and the Linux kernel did not properly restrict access
  to PCI command registers, which might have allowed local guest users to
  cause a denial of service (non-maskable interrupt and host crash) by
  disabling the (1) memory or (2) I/O decoding for a PCI Express device
  and then accessing the device, which triggers an Unsupported Request
  (UR) response.

The following non-security bugs were fixed:
- Added Little Endian support to vtpm module (bsc#918620).
- Add support for pnfs block layout. Patches not included by default yet
- ALSA: hda - Fix regression of HD-audio controller fallback modes (bsc#921313).
- btrfs: add missing blk_finish_plug in btrfs_sync_log() (bnc#922284).
- btrfs: cleanup orphans while looking up default subvolume (bsc#914818).
- btrfs: do not ignore errors from btrfs_lookup_xattr in do_setxattr (bnc#922272).
- btrfs: fix BUG_ON in btrfs_orphan_add() when delete unused block group (bnc#922278).
- btrfs: fix data loss in the fast fsync path (bnc#922275).
- btrfs: fix fsync data loss after adding hard link to inode (bnc#922275).
- cgroup: revert cgroup_mutex removal from idr_remove (bnc#918644).
- cifs: fix use-after-free bug in find_writable_file (bnc#909477).
- crypto: rng - RNGs must return 0 in success case (bsc#920805).
- crypto: testmgr - fix RNG return code enforcement (bsc#920805).
- exit: Always reap resource stats in __exit_signal() (Time scalability).
- fork: report pid reservation failure properly (bnc#909684).
- fsnotify: Fix handling of renames in audit (bnc#915200).
- HID: hyperv: match wait_for_completion_timeout return type.
- hv: address compiler warnings for hv_fcopy_daemon.c.
- hv: address compiler warnings for hv_kvp_daemon.c.
- hv: check vmbus_device_create() return value in vmbus_process_offer().
- hv: do not add redundant / in hv_start_fcopy().
- hv: hv_balloon: Do not post pressure status from interrupt context.
- hv: hv_balloon: Fix a locking bug in the balloon driver.
- hv: hv_balloon: Make adjustments in computing the floor.
- hv: hv_fcopy: drop the obsolete message on transfer failure.
- hv: kvp_daemon: make IPv6-only-injection work.
- hv: remove unused bytes_written from kvp_update_file().
- hv: rename sc_lock to the more generic lock.
- hv: vmbus: Fix a bug in vmbus_establish_gpadl().
- hv: vmbus: hv_process_timer_expiration() can be static.
- hv: vmbus: Implement a clockevent device.
- hv: vmbus: serialize Offer and Rescind offer.
- hv: vmbus: Support a vmbus API for efficiently sending page arrays.
- hv: vmbus: Use get_cpu() to get the current CPU.
- hyperv: fix sparse warnings.
- hyperv: Fix the error processing in netvsc_send().
- hyperv: match wait_for_completion_timeout return type.
- hyperv: netvsc.c: match wait_for_completion_timeout return type.
- iommu/vt-d: Fix dmar_domain leak in iommu_attach_device (bsc#924460).
- kabi, mm: prevent endless growth of anon_vma hierarchy (bnc#904242).
- kABI: protect linux/namei.h include in procfs.
- kABI: protect struct hif_scatter_req.
- kabi/severities: Stop maintaining the kgraft kabi
- kernel/sched/clock.c: add another clock for use with the soft lockup watchdog (bsc#919939).
- kgr: Allow patches to require an exact kernel version (bnc#920615).
- KVM: PPC: Book3S HV: ptes are big endian (bsc#920839).
- mm: convert the rest to new page table lock api (the suse-only cases) (fate#315482).
- mm: fix anon_vma-&amp;gt;degree underflow in anon_vma endless growing prevention (bnc#904242).
- mm: fix corner case in anon_vma endless growing prevention (bnc#904242).
- mm: prevent endless growth of anon_vma hierarchy (bnc#904242).
- mm: prevent endless growth of anon_vma hierarchy  mm: prevent endless growth of anon_vma hierarchy (bnc#904242).
- mm: vmscan: count only dirty pages as congested (VM Performance, bnc#910517).
- module: Clean up ro/nx after early module load failures (bsc#921990).
- module: set nx before marking module MODULE_STATE_COMING (bsc#921990).
- net: add sysfs helpers for netdev_adjacent logic (bnc#915660).
- net: correct error path in rtnl_newlink() (bnc#915660).
- net: fix creation adjacent device symlinks (bnc#915660).
- net: prevent of emerging cross-namespace symlinks (bnc#915660).
- net: rename sysfs symlinks on device name change (bnc#915660).
- nfs: cap request size to fit a kmalloced page array (bnc#898675).
- nfs: commit layouts in fdatasync (bnc#898675).
- NFSv4.1: Do not trust attributes if a pNFS LAYOUTCOMMIT is outstanding (bnc#898675).
- NFSv4.1: Ensure that the layout recall callback matches layout stateids (bnc#898675).
- NFSv4.1: Ensure that we free existing layout segments if we get a new layout (bnc#898675).
- NFSv4.1: Fix a race in nfs4_write_inode (bnc#898675).
- NFSv4.1: Fix wraparound issues in pnfs_seqid_is_newer() (bnc#898675).
- NFSv4.1: Minor optimisation in get_layout_by_fh_locked() (bnc#898675).
- NFSv4: Do not update the open stateid unless it is newer than the old one (bnc#898675).
- pnfs: add a common GETDEVICELIST implementation (bnc#898675).
- pnfs: add a nfs4_get_deviceid helper (bnc#898675).
- pnfs: add flag to force read-modify-write in -&amp;gt;write_begin (bnc#898675).
- pnfs: add return_range method (bnc#898675).
- pnfs: allow splicing pre-encoded pages into the layoutcommit args (bnc#898675).
- pnfs: avoid using stale stateids after layoutreturn (bnc#898675).
- pnfs/blocklayout: allocate separate pages for the layoutcommit payload (bnc#898675).
- pnfs/blocklayout: correctly decrement extent length (bnc#898675).
- pnfs/blocklayout: do not set pages uptodate (bnc#898675).
- pnfs/blocklayout: Fix a 64-bit division/remainder issue in bl_map_stripe (bnc#898675).
- pnfs/blocklayout: implement the return_range method (bnc#898675).
- pnfs/blocklayout: improve GETDEVICEINFO error reporting (bnc#898675).
- pnfs/blocklayout: include vmalloc.h for __vmalloc (bnc#898675).
- pnfs/blocklayout: in-kernel GETDEVICEINFO XDR parsing (bnc#898675).
- pnfs/blocklayout: move all rpc_pipefs related code into a single file (bnc#898675).
- pnfs/blocklayout: move extent processing to blocklayout.c (bnc#898675).
- pnfs/blocklayout: plug block queues (bnc#898675).
- pnfs/blocklayout: refactor extent processing (bnc#898675).
- pnfs/blocklayout: reject pnfs blocksize larger than page size (bnc#898675).
- pNFS/blocklayout: Remove a couple of unused variables (bnc#898675).
- pnfs/blocklayout: remove read-modify-write handling in bl_write_pagelist (bnc#898675).
- pnfs/blocklayout: remove some debugging (bnc#898675).
- pnfs/blocklayout: return layouts on setattr (bnc#898675).
- pnfs/blocklayout: rewrite extent tracking (bnc#898675).
- pnfs/blocklayout: use the device id cache (bnc#898675).
- pnfs: do not check sequence on new stateids in layoutget (bnc#898675).
- pnfs: do not pass uninitialized lsegs to -&amp;gt;free_lseg (bnc#898675).
- pnfs: enable CB_NOTIFY_DEVICEID support (bnc#898675).
- pnfs: factor GETDEVICEINFO implementations (bnc#898675).
- pnfs: force a layout commit when encountering busy segments during recall (bnc#898675).
- pnfs: remove GETDEVICELIST implementation (bnc#898675).
- pnfs: retry after a bad stateid error from layoutget (bnc#898675).
- powerpc: add running_clock for powerpc to prevent spurious softlockup warnings (bsc#919939).
- powerpc/pseries: Fix endian problems with LE migration (bsc#918584).
- remove cgroup_mutex around deactivate_super because it might be dangerous.
- rtmutex: Document pi chain walk (mutex scalability).
- rtmutex: No need to keep task ref for lock owner check (mutex scalability).
- rtmutex: Simplify rtmutex_slowtrylock() (mutex scalability).
- rtnetlink: fix a memory leak when -&amp;gt;newlink fails (bnc#915660).
- sched: Change thread_group_cputime() to use for_each_thread() (Time scalability).
- sched: replace INIT_COMPLETION with reinit_completion.
- sched, time: Atomically increment stime &amp; utime (Time scalability).
- scsi: storvsc: Always send on the selected outgoing channel.
- scsi: storvsc: Do not assume that the scatterlist is not chained.
- scsi: storvsc: Enable clustering.
- scsi: storvsc: Fix a bug in copy_from_bounce_buffer().
- scsi: storvsc: Increase the ring buffer size.
- scsi: storvsc: Retrieve information about the capability of the target.
- scsi: storvsc: Set the tablesize based on the information given by the host.
- scsi: storvsc: Size the queue depth based on the ringbuffer size.
- storvsc: fix a bug in storvsc limits.
- storvsc: force discovery of LUNs that may have been removed.
- storvsc: force SPC-3 compliance on win8 and win8 r2 hosts.
- storvsc: in responce to a scan event, scan the host.
- take read_seqbegin_or_lock() and friends to seqlock.h (Time scalability).
- tcp: prevent fetching dst twice in early demux code (bnc#903997 bnc#919719).
- time, signal: Protect resource use statistics with seqlock -kabi (Time scalability).
- time, signal: Protect resource use statistics with seqlock (Time scalability).
- udp: only allow UFO for packets from SOCK_DGRAM sockets (bnc#909309).
- Update Xen patches to 3.12.39.
- virtio: rng: add derating factor for use by hwrng core (bsc#918615).
- x86, AVX-512: AVX-512 Feature Detection (bsc#921527).
- x86, AVX-512: Enable AVX-512 States Context Switch (bsc#921527).
- xenbus: add proper handling of XS_ERROR from Xenbus for transactions.
- xfs: xfs_alloc_fix_minleft can underflow near ENOSPC (bnc#913080).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-26"/>
	<updated date="2015-03-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/898675">SUSE bug 898675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903997">SUSE bug 903997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904242">SUSE bug 904242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909309">SUSE bug 909309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909477">SUSE bug 909477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909684">SUSE bug 909684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910517">SUSE bug 910517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913080">SUSE bug 913080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914818">SUSE bug 914818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915200">SUSE bug 915200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915660">SUSE bug 915660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917830">SUSE bug 917830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918584">SUSE bug 918584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918615">SUSE bug 918615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918620">SUSE bug 918620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918644">SUSE bug 918644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919463">SUSE bug 919463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919719">SUSE bug 919719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919939">SUSE bug 919939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920615">SUSE bug 920615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920805">SUSE bug 920805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920839">SUSE bug 920839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921313">SUSE bug 921313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921527">SUSE bug 921527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921990">SUSE bug 921990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922272">SUSE bug 922272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922275">SUSE bug 922275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922278">SUSE bug 922278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922284">SUSE bug 922284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924460">SUSE bug 924460</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0777/">CVE-2015-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2150/">CVE-2015-2150</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514619" comment="kernel-default-3.12.39-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514620" comment="kernel-default-devel-3.12.39-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514621" comment="kernel-default-extra-3.12.39-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514622" comment="kernel-devel-3.12.39-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514623" comment="kernel-macros-3.12.39-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514624" comment="kernel-source-3.12.39-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514625" comment="kernel-syms-3.12.39-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514626" comment="kernel-xen-3.12.39-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514627" comment="kernel-xen-devel-3.12.39-47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77244" version="1" class="patch">
	<metadata>
		<title>Security update for libzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="923240" ref_url="https://bugzilla.suse.com/923240" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2331" ref_url="https://www.suse.com/security/cve/CVE-2015-2331/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001329.html" source="SUSE-SU"/>
		<description>
Libzip was updated to fix one security issue.

A zip file with an unusually large number of entries could have caused an integer overflow leading to a write past the heap boundary, crashing the application. (CVE-2015-2331 bnc#923240)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-20"/>
	<updated date="2015-03-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/923240">SUSE bug 923240</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2331/">CVE-2015-2331</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514628" comment="libzip2-0.11.1-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77245" version="1" class="patch">
	<metadata>
		<title>Security update for libarchive (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="800024" ref_url="https://bugzilla.suse.com/800024" source="BUGZILLA"/>
		<reference ref_id="920870" ref_url="https://bugzilla.suse.com/920870" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0211" ref_url="https://www.suse.com/security/cve/CVE-2013-0211/" source="CVE"/>
		<reference ref_id="CVE-2015-2304" ref_url="https://www.suse.com/security/cve/CVE-2015-2304/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001328.html" source="SUSE-SU"/>
		<description>

libarchive was updated to fix a directory traversal in the bsdcpio tool, which
allowed attackers supplying crafted archives to overwrite files. (CVE-2015-2304)

Also, a integer overflow was fixed that could also overflow buffers. (CVE-2013-0211)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-16"/>
	<updated date="2015-03-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/800024">SUSE bug 800024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920870">SUSE bug 920870</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0211/">CVE-2013-0211</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2304/">CVE-2015-2304</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514629" comment="libarchive13-3.1.2-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77246" version="1" class="patch">
	<metadata>
		<title>Security update for pigz (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="913627" ref_url="https://bugzilla.suse.com/913627" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1191" ref_url="https://www.suse.com/security/cve/CVE-2015-1191/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001331.html" source="SUSE-SU"/>
		<description>
Pigz, a multi-threaded implementation of gzip, was updated to fix one vulnerability.

The following vulnerability was fixed:

* A crafted file could have caused an unwanted directory traversal on extract (CVE-2015-1191)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-24"/>
	<updated date="2015-03-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/913627">SUSE bug 913627</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1191/">CVE-2015-1191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514630" comment="pigz-2.3-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77247" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="921070" ref_url="https://bugzilla.suse.com/921070" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1782" ref_url="https://www.suse.com/security/cve/CVE-2015-1782/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001330.html" source="SUSE-SU"/>
		<description>

The ssh client library libssh2_org was updated to fix a security issue.

CVE-2015-1782: A malicious server could send a crafted SSH_MSG_KEXINIT
packet, that could lead to a buffer overread and to a crash of the
libssh2_org using application.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-10"/>
	<updated date="2015-03-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/921070">SUSE bug 921070</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1782/">CVE-2015-1782</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514631" comment="libssh2-1-1.4.3-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514632" comment="libssh2-1-32bit-1.4.3-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77248" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="922220" ref_url="https://bugzilla.suse.com/922220" source="BUGZILLA"/>
		<reference ref_id="922221" ref_url="https://bugzilla.suse.com/922221" source="BUGZILLA"/>
		<reference ref_id="922222" ref_url="https://bugzilla.suse.com/922222" source="BUGZILLA"/>
		<reference ref_id="922223" ref_url="https://bugzilla.suse.com/922223" source="BUGZILLA"/>
		<reference ref_id="923142" ref_url="https://bugzilla.suse.com/923142" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9140" ref_url="https://www.suse.com/security/cve/CVE-2014-9140/" source="CVE"/>
		<reference ref_id="CVE-2015-0261" ref_url="https://www.suse.com/security/cve/CVE-2015-0261/" source="CVE"/>
		<reference ref_id="CVE-2015-2153" ref_url="https://www.suse.com/security/cve/CVE-2015-2153/" source="CVE"/>
		<reference ref_id="CVE-2015-2154" ref_url="https://www.suse.com/security/cve/CVE-2015-2154/" source="CVE"/>
		<reference ref_id="CVE-2015-2155" ref_url="https://www.suse.com/security/cve/CVE-2015-2155/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001335.html" source="SUSE-SU"/>
		<description>
tcpdump was updated to fix five vulnerabilities in protocol printers

When running tcpdump, a remote unauthenticated user could have crashed the application or, potentially, execute arbitrary code by injecting crafted packages into the network.

The following vulnerabilities were fixed:
 * IPv6 mobility printer remote DoS (CVE-2015-0261, bnc#922220)
 * PPP printer remote DoS (CVE-2014-9140, bnc#923142)
 * force printer remote DoS (CVE-2015-2155, bnc#922223)
 * ethernet printer remote DoS (CVE-2015-2154, bnc#922222)
 * tcp printer remote DoS (CVE-2015-2153, bnc#922221)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-20"/>
	<updated date="2015-03-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/922220">SUSE bug 922220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922221">SUSE bug 922221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922222">SUSE bug 922222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922223">SUSE bug 922223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923142">SUSE bug 923142</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9140/">CVE-2014-9140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0261/">CVE-2015-0261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2153/">CVE-2015-2153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2154/">CVE-2015-2154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2155/">CVE-2015-2155</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514633" comment="tcpdump-4.5.1-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77249" version="1" class="patch">
	<metadata>
		<title>Security update for libksba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="907074" ref_url="https://bugzilla.suse.com/907074" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9087" ref_url="https://www.suse.com/security/cve/CVE-2014-9087/" source="CVE"/>
		<description>
This libksba update fixes the following security issue:

- bnc#907074: buffer overflow in OID processing (CVE-2014-9087)
		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-11"/>
	<updated date="2014-12-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/907074">SUSE bug 907074</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9087/">CVE-2014-9087</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514634" comment="libksba8-1.3.0-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77250" version="1" class="patch">
	<metadata>
		<title>Security update for webkitgtk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="866728" ref_url="https://bugzilla.suse.com/866728" source="BUGZILLA"/>
		<reference ref_id="871792" ref_url="https://bugzilla.suse.com/871792" source="BUGZILLA"/>
		<reference ref_id="879607" ref_url="https://bugzilla.suse.com/879607" source="BUGZILLA"/>
		<reference ref_id="883026" ref_url="https://bugzilla.suse.com/883026" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1344" ref_url="https://www.suse.com/security/cve/CVE-2014-1344/" source="CVE"/>
		<reference ref_id="CVE-2014-1384" ref_url="https://www.suse.com/security/cve/CVE-2014-1384/" source="CVE"/>
		<reference ref_id="CVE-2014-1385" ref_url="https://www.suse.com/security/cve/CVE-2014-1385/" source="CVE"/>
		<reference ref_id="CVE-2014-1386" ref_url="https://www.suse.com/security/cve/CVE-2014-1386/" source="CVE"/>
		<reference ref_id="CVE-2014-1387" ref_url="https://www.suse.com/security/cve/CVE-2014-1387/" source="CVE"/>
		<reference ref_id="CVE-2014-1388" ref_url="https://www.suse.com/security/cve/CVE-2014-1388/" source="CVE"/>
		<reference ref_id="CVE-2014-1389" ref_url="https://www.suse.com/security/cve/CVE-2014-1389/" source="CVE"/>
		<reference ref_id="CVE-2014-1390" ref_url="https://www.suse.com/security/cve/CVE-2014-1390/" source="CVE"/>
		<reference ref_id="CVE-2015-2330" ref_url="https://www.suse.com/security/cve/CVE-2015-2330/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001336.html" source="SUSE-SU"/>
		<description>
This update fixes the following security issues:

- Fix SSL connection issues with some websites after the POODLE
  vulnerability fix.
- Fix a crash when loading flash plugins.
- Fix build on GNU Hurd - Fix build on OS X.
- Fix documentation of webkit_print_operation_get_page_setup().
- Security fixes: CVE-2014-1344, CVE-2014-1384, CVE-2014-1385,
    CVE-2014-1386, CVE-2014-1387, CVE-2014-1388, CVE-2014-1389,
    CVE-2014-1390, CVE-2015-2330. (bnc#879607, bnc#871792)
- Pass autoreconf and enable libtool BuildRequires: Needed for
  above patch since it touches the buildsystem.
- Bugs fixed: boo#871792, boo#879607 and boo#879607.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-27"/>
	<updated date="2015-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/866728">SUSE bug 866728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871792">SUSE bug 871792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879607">SUSE bug 879607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883026">SUSE bug 883026</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1344/">CVE-2014-1344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1384/">CVE-2014-1384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1385/">CVE-2014-1385</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1386/">CVE-2014-1386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1387/">CVE-2014-1387</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1388/">CVE-2014-1388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1389/">CVE-2014-1389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1390/">CVE-2014-1390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2330/">CVE-2015-2330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514635" comment="libjavascriptcoregtk-1_0-0-2.4.8-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514636" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514637" comment="libjavascriptcoregtk-3_0-0-2.4.8-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514638" comment="libwebkit2gtk-3_0-25-2.4.8-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514639" comment="libwebkitgtk-1_0-0-2.4.8-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514640" comment="libwebkitgtk-1_0-0-32bit-2.4.8-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514641" comment="libwebkitgtk-3_0-0-2.4.8-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514642" comment="libwebkitgtk2-lang-2.4.8-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514643" comment="libwebkitgtk3-lang-2.4.8-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514644" comment="typelib-1_0-JavaScriptCore-3_0-2.4.8-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514645" comment="typelib-1_0-WebKit-3_0-2.4.8-16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77251" version="1" class="patch">
	<metadata>
		<title>Security update for libXfont (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="921978" ref_url="https://bugzilla.suse.com/921978" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1802" ref_url="https://www.suse.com/security/cve/CVE-2015-1802/" source="CVE"/>
		<reference ref_id="CVE-2015-1803" ref_url="https://www.suse.com/security/cve/CVE-2015-1803/" source="CVE"/>
		<reference ref_id="CVE-2015-1804" ref_url="https://www.suse.com/security/cve/CVE-2015-1804/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0702-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00005.html" source="SUSE-SU"/>
		<description>

LibXFont was updated to fix security problems.

Following security issues were fixed:
- CVE-2015-1802: The bdf parser reads a count for the number of properties
  defined in a font from the font file, and allocates arrays with entries for each
  property based on that count. It never checked to see if that count
  was negative, or large enough to overflow when multiplied by the size
  of the structures being allocated, and could thus allocate the wrong
  buffer size, leading to out of bounds writes.

- CVE-2015-1803: If the bdf parser failed to parse the data for the bitmap for any
  character, it would proceed with an invalid pointer to the bitmap
  data and later crash when trying to read the bitmap from that pointer.

- CVE-2015-1804: The bdf parser read metrics values as 32-bit integers, but stored
  them into 16-bit integers. Overflows could occur in various operations
  leading to out-of-bounds memory access. 
		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-20"/>
	<updated date="2015-03-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/921978">SUSE bug 921978</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1802/">CVE-2015-1802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1803/">CVE-2015-1803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1804/">CVE-2015-1804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514646" comment="libXfont1-1.4.7-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77252" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="921842" ref_url="https://bugzilla.suse.com/921842" source="BUGZILLA"/>
		<reference ref_id="922705" ref_url="https://bugzilla.suse.com/922705" source="BUGZILLA"/>
		<reference ref_id="922706" ref_url="https://bugzilla.suse.com/922706" source="BUGZILLA"/>
		<reference ref_id="922709" ref_url="https://bugzilla.suse.com/922709" source="BUGZILLA"/>
		<reference ref_id="923758" ref_url="https://bugzilla.suse.com/923758" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2751" ref_url="https://www.suse.com/security/cve/CVE-2015-2751/" source="CVE"/>
		<reference ref_id="CVE-2015-2752" ref_url="https://www.suse.com/security/cve/CVE-2015-2752/" source="CVE"/>
		<reference ref_id="CVE-2015-2756" ref_url="https://www.suse.com/security/cve/CVE-2015-2756/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001342.html" source="SUSE-SU"/>
		<description>
Xen was updated 4.4.2_01 to address three security issues and functional bugs.

The following vulnerabilities were fixed:
- Long latency MMIO mapping operations are not preemptible (XSA-125, CVE-2015-2752, bnc#922705)
- Unmediated PCI command register access in qemu (XSA-126, CVE-2015-2756, bnc#922706)
- Certain domctl operations may be abused to lock up the host (XSA-127, CVE-2015-2751, bnc#922709)

The following non-security bugs were fixed:
- xen dmesg contains bogus output in early boot (bnc#923758)
- Xentop doesn't display disk statistics for VMs using qdisks (bnc#921842)

The following functionality was enabled:
- Enable spice support in qemu for x86_64
- Add Qxl vga support
		</description>
<advisory from="security@suse.de">
	<issued date="2015-04-01"/>
	<updated date="2015-04-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/921842">SUSE bug 921842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922705">SUSE bug 922705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922706">SUSE bug 922706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922709">SUSE bug 922709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923758">SUSE bug 923758</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2751/">CVE-2015-2751</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2752/">CVE-2015-2752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2756/">CVE-2015-2756</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514647" comment="xen-4.4.2_02-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514648" comment="xen-kmp-default-4.4.2_02_k3.12.38_44-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514649" comment="xen-libs-4.4.2_02-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514650" comment="xen-libs-32bit-4.4.2_02-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77253" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="925368" ref_url="https://bugzilla.suse.com/925368" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0801" ref_url="https://www.suse.com/security/cve/CVE-2015-0801/" source="CVE"/>
		<reference ref_id="CVE-2015-0807" ref_url="https://www.suse.com/security/cve/CVE-2015-0807/" source="CVE"/>
		<reference ref_id="CVE-2015-0813" ref_url="https://www.suse.com/security/cve/CVE-2015-0813/" source="CVE"/>
		<reference ref_id="CVE-2015-0814" ref_url="https://www.suse.com/security/cve/CVE-2015-0814/" source="CVE"/>
		<reference ref_id="CVE-2015-0815" ref_url="https://www.suse.com/security/cve/CVE-2015-0815/" source="CVE"/>
		<reference ref_id="CVE-2015-0816" ref_url="https://www.suse.com/security/cve/CVE-2015-0816/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0704-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00007.html" source="SUSE-SU"/>
		<description>
Mozilla Firefox was updated to 31.6.0 ESR to fix five security issues.

The following vulnerabilities were fixed:

* Miscellaneous memory safety hazards (MFSA 2015-30/CVE-2015-0814/CVE-2015-0815)
* Use-after-free when using the Fluendo MP3 GStreamer plugin (MFSA 2015-31/CVE-2015-0813)
* resource:// documents can load privileged pages (MFSA 2015-33/CVE-2015-0816)
* CORS requests should not follow 30x redirections after preflight (MFSA 2015-37/CVE-2015-0807)
* Same-origin bypass through anchor navigation (MFSA 2015-40/CVE-2015-0801)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-04-02"/>
	<updated date="2015-04-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0801/">CVE-2015-0801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0807/">CVE-2015-0807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0813/">CVE-2015-0813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0814/">CVE-2015-0814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0815/">CVE-2015-0815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0816/">CVE-2015-0816</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514651" comment="MozillaFirefox-31.6.0esr-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514652" comment="MozillaFirefox-translations-31.6.0esr-30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77254" version="1" class="patch">
	<metadata>
		<title>Security update for Adobe Flash Player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="927089" ref_url="https://bugzilla.suse.com/927089" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0346" ref_url="https://www.suse.com/security/cve/CVE-2015-0346/" source="CVE"/>
		<reference ref_id="CVE-2015-0347" ref_url="https://www.suse.com/security/cve/CVE-2015-0347/" source="CVE"/>
		<reference ref_id="CVE-2015-0348" ref_url="https://www.suse.com/security/cve/CVE-2015-0348/" source="CVE"/>
		<reference ref_id="CVE-2015-0349" ref_url="https://www.suse.com/security/cve/CVE-2015-0349/" source="CVE"/>
		<reference ref_id="CVE-2015-0350" ref_url="https://www.suse.com/security/cve/CVE-2015-0350/" source="CVE"/>
		<reference ref_id="CVE-2015-0351" ref_url="https://www.suse.com/security/cve/CVE-2015-0351/" source="CVE"/>
		<reference ref_id="CVE-2015-0352" ref_url="https://www.suse.com/security/cve/CVE-2015-0352/" source="CVE"/>
		<reference ref_id="CVE-2015-0353" ref_url="https://www.suse.com/security/cve/CVE-2015-0353/" source="CVE"/>
		<reference ref_id="CVE-2015-0354" ref_url="https://www.suse.com/security/cve/CVE-2015-0354/" source="CVE"/>
		<reference ref_id="CVE-2015-0355" ref_url="https://www.suse.com/security/cve/CVE-2015-0355/" source="CVE"/>
		<reference ref_id="CVE-2015-0356" ref_url="https://www.suse.com/security/cve/CVE-2015-0356/" source="CVE"/>
		<reference ref_id="CVE-2015-0357" ref_url="https://www.suse.com/security/cve/CVE-2015-0357/" source="CVE"/>
		<reference ref_id="CVE-2015-0358" ref_url="https://www.suse.com/security/cve/CVE-2015-0358/" source="CVE"/>
		<reference ref_id="CVE-2015-0359" ref_url="https://www.suse.com/security/cve/CVE-2015-0359/" source="CVE"/>
		<reference ref_id="CVE-2015-0360" ref_url="https://www.suse.com/security/cve/CVE-2015-0360/" source="CVE"/>
		<reference ref_id="CVE-2015-3038" ref_url="https://www.suse.com/security/cve/CVE-2015-3038/" source="CVE"/>
		<reference ref_id="CVE-2015-3039" ref_url="https://www.suse.com/security/cve/CVE-2015-3039/" source="CVE"/>
		<reference ref_id="CVE-2015-3040" ref_url="https://www.suse.com/security/cve/CVE-2015-3040/" source="CVE"/>
		<reference ref_id="CVE-2015-3041" ref_url="https://www.suse.com/security/cve/CVE-2015-3041/" source="CVE"/>
		<reference ref_id="CVE-2015-3042" ref_url="https://www.suse.com/security/cve/CVE-2015-3042/" source="CVE"/>
		<reference ref_id="CVE-2015-3043" ref_url="https://www.suse.com/security/cve/CVE-2015-3043/" source="CVE"/>
		<reference ref_id="CVE-2015-3044" ref_url="https://www.suse.com/security/cve/CVE-2015-3044/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<description>
Adobe Flash Player was updated to 11.2.202.457 to fix several security issues that could lead to remote code execution.

An exploit for CVE-2015-3043 was reported to exist in the wild.

The following vulnerabilities were fixed:

* Memory corruption vulnerabilities that could lead to code execution (CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, CVE-2015-3043).
* Type confusion vulnerability that could lead to code execution (CVE-2015-0356).
* Buffer overflow vulnerability that could lead to code execution (CVE-2015-0348).
* Use-after-free vulnerabilities that could lead to code execution (CVE-2015-0349, CVE-2015-0351, CVE-2015-0358, CVE-2015-3039).
* Double-free vulnerabilities that could lead to code execution (CVE-2015-0346, CVE-2015-0359).
* Memory leak vulnerabilities that could be used to bypass ASLR (CVE-2015-0357, CVE-2015-3040).
* Security bypass vulnerability that could lead to information disclosure (CVE-2015-3044).		</description>
<advisory from="security@suse.de">
	<issued date="2015-04-15"/>
	<updated date="2015-04-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0346/">CVE-2015-0346</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0347/">CVE-2015-0347</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0348/">CVE-2015-0348</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0349/">CVE-2015-0349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0350/">CVE-2015-0350</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0351/">CVE-2015-0351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0352/">CVE-2015-0352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0353/">CVE-2015-0353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0354/">CVE-2015-0354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0355/">CVE-2015-0355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0356/">CVE-2015-0356</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0357/">CVE-2015-0357</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0358/">CVE-2015-0358</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0359/">CVE-2015-0359</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0360/">CVE-2015-0360</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3038/">CVE-2015-3038</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3039/">CVE-2015-3039</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3040/">CVE-2015-3040</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3041/">CVE-2015-3041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3042/">CVE-2015-3042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3043/">CVE-2015-3043</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3044/">CVE-2015-3044</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514653" comment="flash-player-11.2.202.457-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514654" comment="flash-player-gnome-11.2.202.457-80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77255" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="919938" ref_url="https://bugzilla.suse.com/919938" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0294" ref_url="https://www.suse.com/security/cve/CVE-2015-0294/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001351.html" source="SUSE-SU"/>
		<description>

gnutls was updated to fix a certificate algorithm consistency checking issue. (CVE-2015-0294)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-23"/>
	<updated date="2015-03-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/919938">SUSE bug 919938</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0294/">CVE-2015-0294</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514655" comment="gnutls-3.2.15-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514656" comment="libgnutls28-3.2.15-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514657" comment="libgnutls28-32bit-3.2.15-7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77256" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="873351" ref_url="https://bugzilla.suse.com/873351" source="BUGZILLA"/>
		<reference ref_id="876282" ref_url="https://bugzilla.suse.com/876282" source="BUGZILLA"/>
		<reference ref_id="880891" ref_url="https://bugzilla.suse.com/880891" source="BUGZILLA"/>
		<reference ref_id="896400" ref_url="https://bugzilla.suse.com/896400" source="BUGZILLA"/>
		<reference ref_id="904627" ref_url="https://bugzilla.suse.com/904627" source="BUGZILLA"/>
		<reference ref_id="906117" ref_url="https://bugzilla.suse.com/906117" source="BUGZILLA"/>
		<reference ref_id="906194" ref_url="https://bugzilla.suse.com/906194" source="BUGZILLA"/>
		<reference ref_id="911442" ref_url="https://bugzilla.suse.com/911442" source="BUGZILLA"/>
		<reference ref_id="911556" ref_url="https://bugzilla.suse.com/911556" source="BUGZILLA"/>
		<reference ref_id="915911" ref_url="https://bugzilla.suse.com/915911" source="BUGZILLA"/>
		<reference ref_id="915912" ref_url="https://bugzilla.suse.com/915912" source="BUGZILLA"/>
		<reference ref_id="915913" ref_url="https://bugzilla.suse.com/915913" source="BUGZILLA"/>
		<reference ref_id="915914" ref_url="https://bugzilla.suse.com/915914" source="BUGZILLA"/>
		<reference ref_id="919229" ref_url="https://bugzilla.suse.com/919229" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-5298" ref_url="https://www.suse.com/security/cve/CVE-2010-5298/" source="CVE"/>
		<reference ref_id="CVE-2012-5615" ref_url="https://www.suse.com/security/cve/CVE-2012-5615/" source="CVE"/>
		<reference ref_id="CVE-2014-0195" ref_url="https://www.suse.com/security/cve/CVE-2014-0195/" source="CVE"/>
		<reference ref_id="CVE-2014-0198" ref_url="https://www.suse.com/security/cve/CVE-2014-0198/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-2494" ref_url="https://www.suse.com/security/cve/CVE-2014-2494/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-4207" ref_url="https://www.suse.com/security/cve/CVE-2014-4207/" source="CVE"/>
		<reference ref_id="CVE-2014-4258" ref_url="https://www.suse.com/security/cve/CVE-2014-4258/" source="CVE"/>
		<reference ref_id="CVE-2014-4260" ref_url="https://www.suse.com/security/cve/CVE-2014-4260/" source="CVE"/>
		<reference ref_id="CVE-2014-4274" ref_url="https://www.suse.com/security/cve/CVE-2014-4274/" source="CVE"/>
		<reference ref_id="CVE-2014-4287" ref_url="https://www.suse.com/security/cve/CVE-2014-4287/" source="CVE"/>
		<reference ref_id="CVE-2014-6463" ref_url="https://www.suse.com/security/cve/CVE-2014-6463/" source="CVE"/>
		<reference ref_id="CVE-2014-6464" ref_url="https://www.suse.com/security/cve/CVE-2014-6464/" source="CVE"/>
		<reference ref_id="CVE-2014-6469" ref_url="https://www.suse.com/security/cve/CVE-2014-6469/" source="CVE"/>
		<reference ref_id="CVE-2014-6474" ref_url="https://www.suse.com/security/cve/CVE-2014-6474/" source="CVE"/>
		<reference ref_id="CVE-2014-6478" ref_url="https://www.suse.com/security/cve/CVE-2014-6478/" source="CVE"/>
		<reference ref_id="CVE-2014-6484" ref_url="https://www.suse.com/security/cve/CVE-2014-6484/" source="CVE"/>
		<reference ref_id="CVE-2014-6489" ref_url="https://www.suse.com/security/cve/CVE-2014-6489/" source="CVE"/>
		<reference ref_id="CVE-2014-6491" ref_url="https://www.suse.com/security/cve/CVE-2014-6491/" source="CVE"/>
		<reference ref_id="CVE-2014-6494" ref_url="https://www.suse.com/security/cve/CVE-2014-6494/" source="CVE"/>
		<reference ref_id="CVE-2014-6495" ref_url="https://www.suse.com/security/cve/CVE-2014-6495/" source="CVE"/>
		<reference ref_id="CVE-2014-6496" ref_url="https://www.suse.com/security/cve/CVE-2014-6496/" source="CVE"/>
		<reference ref_id="CVE-2014-6500" ref_url="https://www.suse.com/security/cve/CVE-2014-6500/" source="CVE"/>
		<reference ref_id="CVE-2014-6505" ref_url="https://www.suse.com/security/cve/CVE-2014-6505/" source="CVE"/>
		<reference ref_id="CVE-2014-6507" ref_url="https://www.suse.com/security/cve/CVE-2014-6507/" source="CVE"/>
		<reference ref_id="CVE-2014-6520" ref_url="https://www.suse.com/security/cve/CVE-2014-6520/" source="CVE"/>
		<reference ref_id="CVE-2014-6530" ref_url="https://www.suse.com/security/cve/CVE-2014-6530/" source="CVE"/>
		<reference ref_id="CVE-2014-6551" ref_url="https://www.suse.com/security/cve/CVE-2014-6551/" source="CVE"/>
		<reference ref_id="CVE-2014-6555" ref_url="https://www.suse.com/security/cve/CVE-2014-6555/" source="CVE"/>
		<reference ref_id="CVE-2014-6559" ref_url="https://www.suse.com/security/cve/CVE-2014-6559/" source="CVE"/>
		<reference ref_id="CVE-2014-6564" ref_url="https://www.suse.com/security/cve/CVE-2014-6564/" source="CVE"/>
		<reference ref_id="CVE-2014-6568" ref_url="https://www.suse.com/security/cve/CVE-2014-6568/" source="CVE"/>
		<reference ref_id="CVE-2015-0374" ref_url="https://www.suse.com/security/cve/CVE-2015-0374/" source="CVE"/>
		<reference ref_id="CVE-2015-0381" ref_url="https://www.suse.com/security/cve/CVE-2015-0381/" source="CVE"/>
		<reference ref_id="CVE-2015-0382" ref_url="https://www.suse.com/security/cve/CVE-2015-0382/" source="CVE"/>
		<reference ref_id="CVE-2015-0391" ref_url="https://www.suse.com/security/cve/CVE-2015-0391/" source="CVE"/>
		<reference ref_id="CVE-2015-0411" ref_url="https://www.suse.com/security/cve/CVE-2015-0411/" source="CVE"/>
		<reference ref_id="CVE-2015-0432" ref_url="https://www.suse.com/security/cve/CVE-2015-0432/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<description>
mariadb was updated to version 10.0.16 to fix 40 security issues.

These security issues were fixed:
- CVE-2015-0411: Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Server : Security : Encryption (bnc#915911).
- CVE-2015-0382: Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allowed remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381 (bnc#915911).
- CVE-2015-0381: Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allowed remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0382 (bnc#915911).
- CVE-2015-0432: Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier allowed remote authenticated users to affect availability via vectors related to Server : InnoDB : DDL : Foreign Key (bnc#915911).
- CVE-2014-6568: Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allowed remote authenticated users to affect availability via vectors related to Server : InnoDB : DML (bnc#915911).
- CVE-2015-0374: Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allowed remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges : Foreign Key (bnc#915911).
- CVE-2014-6507: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allowed remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SERVER:DML (bnc#915912).
- CVE-2014-6491: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6500 (bnc#915912).
- CVE-2014-6500: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6491 (bnc#915912).
- CVE-2014-6469: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and eariler and 5.6.20 and earlier allowed remote authenticated users to affect availability via vectors related to SERVER:OPTIMIZER (bnc#915912).
- CVE-2014-6555: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allowed remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SERVER:DML (bnc#915912).
- CVE-2014-6559: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allowed remote attackers to affect confidentiality via vectors related to C API SSL CERTIFICATE HANDLING (bnc#915912).
- CVE-2014-6494: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allowed remote attackers to affect availability via vectors related to CLIENT:SSL:yaSSL, a different vulnerability than CVE-2014-6496 (bnc#915912).
- CVE-2014-6496: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allowed remote attackers to affect availability via vectors related to CLIENT:SSL:yaSSL, a different vulnerability than CVE-2014-6494 (bnc#915912).
- CVE-2014-6464: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allowed remote authenticated users to affect availability via vectors related to SERVER:INNODB DML FOREIGN KEYS (bnc#915912).
- CVE-2010-5298: Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allowed remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment (bnc#873351).
- CVE-2014-0195: The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h did not properly validate fragment lengths in DTLS ClientHello messages, which allowed remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment (bnc#880891).
- CVE-2014-0198: The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, did not properly manage a buffer pointer during certain recursive calls, which allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition (bnc#876282).
- CVE-2014-0221: The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allowed remote attackers to cause a denial of service (recursion and client crash) via a DTLS hello message in an invalid DTLS handshake (bnc#915913).
- CVE-2014-0224: OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h did not properly restrict processing of ChangeCipherSpec messages, which allowed man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the 'CCS Injection' vulnerability (bnc#915913).
- CVE-2014-3470: The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allowed remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value (bnc#915913).
- CVE-2014-6474: Unspecified vulnerability in Oracle MySQL Server 5.6.19 and earlier allowed remote authenticated users to affect availability via vectors related to SERVER:MEMCACHED (bnc#915913).
- CVE-2014-6489: Unspecified vulnerability in Oracle MySQL Server 5.6.19 and earlier allowed remote authenticated users to affect integrity and availability via vectors related to SERVER:SP (bnc#915913).
- CVE-2014-6564: Unspecified vulnerability in Oracle MySQL Server 5.6.19 and earlier allowed remote authenticated users to affect availability via vectors related to SERVER:INNODB FULLTEXT SEARCH DML (bnc#915913).
- CVE-2012-5615: Oracle MySQL 5.5.38 and earlier, 5.6.19 and earlier, and MariaDB 5.5.28a, 5.3.11, 5.2.13, 5.1.66, and possibly other versions, generates different error messages with different time delays depending on whether a user name exists, which allowed remote attackers to enumerate valid usernames (bnc#915913).
- CVE-2014-4274: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allowed local users to affect confidentiality, integrity, and availability via vectors related to SERVER:MyISAM (bnc#896400).
- CVE-2014-4287: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allowed remote authenticated users to affect availability via vectors related to SERVER:CHARACTER SETS (bnc#915913).
- CVE-2014-6463: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allowed remote authenticated users to affect availability via vectors related to SERVER:REPLICATION ROW FORMAT BINARY LOG DML (bnc#915913).
- CVE-2014-6478: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allowed remote attackers to affect integrity via vectors related to SERVER:SSL:yaSSL (bnc#915913).
- CVE-2014-6484: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allowed remote authenticated users to affect availability via vectors related to SERVER:DML (bnc#915913).
- CVE-2014-6495: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allowed remote attackers to affect availability via vectors related to SERVER:SSL:yaSSL (bnc#915913).
- CVE-2014-6505: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allowed remote authenticated users to affect availability via vectors related to SERVER:MEMORY STORAGE ENGINE (bnc#915913).
- CVE-2014-6520: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier allowed remote authenticated users to affect availability via vectors related to SERVER:DDL (bnc#915913).
- CVE-2014-6530: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allowed remote authenticated users to affect confidentiality, integrity, and availability via vectors related to CLIENT:MYSQLDUMP (bnc#915913).
- CVE-2014-6551: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allowed local users to affect confidentiality via vectors related to CLIENT:MYSQLADMIN (bnc#915913).
- CVE-2015-0391: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allowed remote authenticated users to affect availability via vectors related to DDL (bnc#915913).
- CVE-2014-4258: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier and 5.6.17 and earlier allowed remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SRINFOSC (bnc#915914).
- CVE-2014-4260: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier, and 5.6.17 and earlier, allowed remote authenticated users to affect integrity and availability via vectors related to SRCHAR (bnc#915914).
- CVE-2014-2494: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier allowed remote authenticated users to affect availability via vectors related to ENARC (bnc#915914).
- CVE-2014-4207: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier allowed remote authenticated users to affect availability via vectors related to SROPTZR (bnc#915914).

These non-security issues were fixed:
- Get query produced incorrect results in MariaDB 10.0.11 vs MySQL 5.5 - SLES12 (bnc#906194).
- After update to version 10.0.14 mariadb did not start - Job for mysql.service failed (bnc#911442).
- Fix crash when disk full situation is reached on alter table (bnc#904627).
- Allow md5 in FIPS mode (bnc#911556).
- Fixed a situation when bit and hex string literals unintentionally changed column names (bnc#919229).

Release notes: https://kb.askmonty.org/en/mariadb-10016-release-notes/
		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-03"/>
	<updated date="2015-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/873351">SUSE bug 873351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876282">SUSE bug 876282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896400">SUSE bug 896400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904627">SUSE bug 904627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906117">SUSE bug 906117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906194">SUSE bug 906194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911442">SUSE bug 911442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911556">SUSE bug 911556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915911">SUSE bug 915911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915914">SUSE bug 915914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919229">SUSE bug 919229</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5298/">CVE-2010-5298</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5615/">CVE-2012-5615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0195/">CVE-2014-0195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0198/">CVE-2014-0198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2494/">CVE-2014-2494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4207/">CVE-2014-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4258/">CVE-2014-4258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4260/">CVE-2014-4260</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4274/">CVE-2014-4274</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4287/">CVE-2014-4287</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6463/">CVE-2014-6463</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6464/">CVE-2014-6464</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6469/">CVE-2014-6469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6474/">CVE-2014-6474</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6478/">CVE-2014-6478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6484/">CVE-2014-6484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6489/">CVE-2014-6489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6491/">CVE-2014-6491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6494/">CVE-2014-6494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6495/">CVE-2014-6495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6496/">CVE-2014-6496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6500/">CVE-2014-6500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6505/">CVE-2014-6505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6507/">CVE-2014-6507</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6520/">CVE-2014-6520</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6530/">CVE-2014-6530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6551/">CVE-2014-6551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6555/">CVE-2014-6555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6559/">CVE-2014-6559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6564/">CVE-2014-6564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6568/">CVE-2014-6568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0374/">CVE-2015-0374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0381/">CVE-2015-0381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0382/">CVE-2015-0382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0391/">CVE-2015-0391</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0411/">CVE-2015-0411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0432/">CVE-2015-0432</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514658" comment="libmysqlclient18-10.0.16-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514659" comment="libmysqlclient18-32bit-10.0.16-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514660" comment="libmysqlclient_r18-10.0.16-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514661" comment="libmysqlclient_r18-32bit-10.0.16-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514662" comment="mariadb-10.0.16-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514663" comment="mariadb-client-10.0.16-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514664" comment="mariadb-errormessages-10.0.16-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77257" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk, java-1_7_0-openjdk-bootstrap (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="927591" ref_url="https://bugzilla.suse.com/927591" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0458" ref_url="https://www.suse.com/security/cve/CVE-2015-0458/" source="CVE"/>
		<reference ref_id="CVE-2015-0459" ref_url="https://www.suse.com/security/cve/CVE-2015-0459/" source="CVE"/>
		<reference ref_id="CVE-2015-0460" ref_url="https://www.suse.com/security/cve/CVE-2015-0460/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0484" ref_url="https://www.suse.com/security/cve/CVE-2015-0484/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-0491" ref_url="https://www.suse.com/security/cve/CVE-2015-0491/" source="CVE"/>
		<reference ref_id="CVE-2015-0492" ref_url="https://www.suse.com/security/cve/CVE-2015-0492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<description>
OpenJDK was updated to 2.5.5 - OpenJdk 7u79 to fix security issues and bugs:

The following vulnerabilities were fixed:

* CVE-2015-0458: Deployment: unauthenticated remote attackers could execute arbitrary code via multiple protocols.
* CVE-2015-0459: 2D: unauthenticated remote attackers could execute arbitrary code via multiple protocols.
* CVE-2015-0460: Hotspot: unauthenticated remote attackers could execute arbitrary code via multiple protocols.
* CVE-2015-0469: 2D: unauthenticated remote attackers could execute arbitrary code via multiple protocols.
* CVE-2015-0477: Beans: unauthenticated remote attackers could update, insert or delete some JAVA accessible data via multiple protocols
* CVE-2015-0478: JCE: unauthenticated remote attackers could read some JAVA accessible data via multiple protocols
* CVE-2015-0480: Tools: unauthenticated remote attackers could update, insert or delete some JAVA accessible data via multiple protocols and cause a partial denial of service (partial DOS)
* CVE-2015-0484: JavaFX: unauthenticated remote attackers could read, update, insert or delete access some Java accessible data via multiple protocols and cause a partial denial of service (partial DOS).
* CVE-2015-0488: JSSE: unauthenticated remote attackers could cause a partial denial of service (partial DOS).
* CVE-2015-0491: 2D: unauthenticated remote attackers could execute arbitrary code via multiple protocols.
* CVE-2015-0492: JavaFX: unauthenticated remote attackers could execute arbitrary code via multiple protocols.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-04-23"/>
	<updated date="2015-04-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0458/">CVE-2015-0458</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0459/">CVE-2015-0459</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0460/">CVE-2015-0460</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0484/">CVE-2015-0484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0491/">CVE-2015-0491</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0492/">CVE-2015-0492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514665" comment="java-1_7_0-openjdk-1.7.0.79-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514666" comment="java-1_7_0-openjdk-headless-1.7.0.79-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77258" version="1" class="patch">
	<metadata>
		<title>Security update for cups-filters (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="915545" ref_url="https://bugzilla.suse.com/915545" source="BUGZILLA"/>
		<reference ref_id="921753" ref_url="https://bugzilla.suse.com/921753" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2265" ref_url="https://www.suse.com/security/cve/CVE-2015-2265/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001367.html" source="SUSE-SU"/>
		<description>
cups-filters was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-2265: Remote command execution in remove_bad_chars() (bnc#921753).

This non-security issue was fixed:
- LSB compliance of foomatic-rip (bnc#915545).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-13"/>
	<updated date="2015-03-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/915545">SUSE bug 915545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921753">SUSE bug 921753</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2265/">CVE-2015-2265</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514667" comment="cups-filters-1.0.58-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514668" comment="cups-filters-cups-browsed-1.0.58-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514669" comment="cups-filters-foomatic-rip-1.0.58-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514670" comment="cups-filters-ghostscript-1.0.58-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77259" version="1" class="patch">
	<metadata>
		<title>Security update for gdm (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="900836" ref_url="https://bugzilla.suse.com/900836" source="BUGZILLA"/>
		<reference ref_id="919723" ref_url="https://bugzilla.suse.com/919723" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2015:0803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001366.html" source="SUSE-SU"/>
		<description>
The GNOME Display Manager was updated to fix several bugs:

Security issue fixed:
- Removed gdm-fingerprint and gdm-smartcard pamfiles that allowed unlocking the screen without password or fingerprint if fingerprint reader support was enabled. (boo#900836).

Bugs fixed:
- Fix support for DISPLAYMANAGER_STARTS_XSERVER from /etc/sysconfig/displaymanager (bsc#919723).
- Ensure ShowLocalGreeter configuration key is properly handled (bgo#743440).		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-11"/>
	<updated date="2015-03-11"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/900836">SUSE bug 900836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919723">SUSE bug 919723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514671" comment="gdm-3.10.0.1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514672" comment="gdm-branding-upstream-3.10.0.1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514673" comment="gdm-lang-3.10.0.1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514674" comment="gdmflexiserver-3.10.0.1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514675" comment="libgdm1-3.10.0.1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514676" comment="typelib-1_0-Gdm-1_0-3.10.0.1-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77260" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="907268" ref_url="https://bugzilla.suse.com/907268" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8091" ref_url="https://www.suse.com/security/cve/CVE-2014-8091/" source="CVE"/>
		<reference ref_id="CVE-2014-8092" ref_url="https://www.suse.com/security/cve/CVE-2014-8092/" source="CVE"/>
		<reference ref_id="CVE-2014-8093" ref_url="https://www.suse.com/security/cve/CVE-2014-8093/" source="CVE"/>
		<reference ref_id="CVE-2014-8094" ref_url="https://www.suse.com/security/cve/CVE-2014-8094/" source="CVE"/>
		<reference ref_id="CVE-2014-8095" ref_url="https://www.suse.com/security/cve/CVE-2014-8095/" source="CVE"/>
		<reference ref_id="CVE-2014-8096" ref_url="https://www.suse.com/security/cve/CVE-2014-8096/" source="CVE"/>
		<reference ref_id="CVE-2014-8097" ref_url="https://www.suse.com/security/cve/CVE-2014-8097/" source="CVE"/>
		<reference ref_id="CVE-2014-8098" ref_url="https://www.suse.com/security/cve/CVE-2014-8098/" source="CVE"/>
		<reference ref_id="CVE-2014-8099" ref_url="https://www.suse.com/security/cve/CVE-2014-8099/" source="CVE"/>
		<reference ref_id="CVE-2014-8100" ref_url="https://www.suse.com/security/cve/CVE-2014-8100/" source="CVE"/>
		<reference ref_id="CVE-2014-8101" ref_url="https://www.suse.com/security/cve/CVE-2014-8101/" source="CVE"/>
		<reference ref_id="CVE-2014-8102" ref_url="https://www.suse.com/security/cve/CVE-2014-8102/" source="CVE"/>
		<reference ref_id="CVE-2014-8103" ref_url="https://www.suse.com/security/cve/CVE-2014-8103/" source="CVE"/>
		<description>
This X.Org update fixes the following security issues:

- denial of service due to unchecked malloc in client authentication
  (CVE-2014-8091)
- integer overflows calculating memory needs for requests:
  CVE-2014-8092: X11 core protocol requests
  CVE-2014-8093: GLX extension
  CVE-2014-8094: DRI2 extension
- out of bounds access due to not validating length or offset values in
  requests:
  CVE-2014-8095: XInput extension
  CVE-2014-8096: XC-MISC extension
  CVE-2014-8097: DBE extension
  CVE-2014-8098: GLX extension
  CVE-2014-8099: XVideo extension
  CVE-2014-8100: Render extension
  CVE-2014-8101: RandR extension
  CVE-2014-8102: XFixes extension
  CVE-2014-8103: DRI3 and Present extensions		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-12"/>
	<updated date="2014-12-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8091/">CVE-2014-8091</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2014-8092/">CVE-2014-8092</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8093/">CVE-2014-8093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8094/">CVE-2014-8094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8095/">CVE-2014-8095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8096/">CVE-2014-8096</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8097/">CVE-2014-8097</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8098/">CVE-2014-8098</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8099/">CVE-2014-8099</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8100/">CVE-2014-8100</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8101/">CVE-2014-8101</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8102/">CVE-2014-8102</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8103/">CVE-2014-8103</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514677" comment="xorg-x11-server-7.6_1.15.2-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514678" comment="xorg-x11-server-extra-7.6_1.15.2-17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77261" version="1" class="patch">
	<metadata>
		<title>Security update for DirectFB (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="878345" ref_url="https://bugzilla.suse.com/878345" source="BUGZILLA"/>
		<reference ref_id="878349" ref_url="https://bugzilla.suse.com/878349" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2977" ref_url="https://www.suse.com/security/cve/CVE-2014-2977/" source="CVE"/>
		<reference ref_id="CVE-2014-2978" ref_url="https://www.suse.com/security/cve/CVE-2014-2978/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00003.html" source="SUSE-SU"/>
		<description>
DirectFB was updated to fix two security issues.

The following vulnerabilities were fixed:

* CVE-2014-2977: Multiple integer signedness errors could allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the Voodoo interface, which triggers a stack-based buffer overflow.
* CVE-2014-2978: Remote attackers could cause a denial of service (crash) and possibly execute arbitrary code via the Voodoo interface, which triggers an out-of-bounds write.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-04-23"/>
	<updated date="2015-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/878345">SUSE bug 878345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878349">SUSE bug 878349</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-2977/">CVE-2014-2977</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-2978/">CVE-2014-2978</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514679" comment="DirectFB-1.7.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514680" comment="lib++dfb-1_7-1-1.7.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514681" comment="libdirectfb-1_7-1-1.7.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514682" comment="libdirectfb-1_7-1-32bit-1.7.1-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77262" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="856386" ref_url="https://bugzilla.suse.com/856386" source="BUGZILLA"/>
		<reference ref_id="913057" ref_url="https://bugzilla.suse.com/913057" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0301" ref_url="https://www.suse.com/security/cve/CVE-2015-0301/" source="CVE"/>
		<reference ref_id="CVE-2015-0302" ref_url="https://www.suse.com/security/cve/CVE-2015-0302/" source="CVE"/>
		<reference ref_id="CVE-2015-0303" ref_url="https://www.suse.com/security/cve/CVE-2015-0303/" source="CVE"/>
		<reference ref_id="CVE-2015-0304" ref_url="https://www.suse.com/security/cve/CVE-2015-0304/" source="CVE"/>
		<reference ref_id="CVE-2015-0305" ref_url="https://www.suse.com/security/cve/CVE-2015-0305/" source="CVE"/>
		<reference ref_id="CVE-2015-0306" ref_url="https://www.suse.com/security/cve/CVE-2015-0306/" source="CVE"/>
		<reference ref_id="CVE-2015-0307" ref_url="https://www.suse.com/security/cve/CVE-2015-0307/" source="CVE"/>
		<reference ref_id="CVE-2015-0308" ref_url="https://www.suse.com/security/cve/CVE-2015-0308/" source="CVE"/>
		<reference ref_id="CVE-2015-0309" ref_url="https://www.suse.com/security/cve/CVE-2015-0309/" source="CVE"/>
		<description>

Adobe Flash Player was updated to 11.2.202.429 (bsc#913057):

* APSB15-01, CVE-2015-0301, CVE-2015-0302, CVE-2015-0303,
  CVE-2015-0304, CVE-2015-0305, CVE-2015-0306, CVE-2015-0307,
  CVE-2015-0308, CVE-2015-0309.
  More information can be found on
  http://helpx.adobe.com/security/products/flash-player/apsb15-01.html

- Disable flash player on machines without SSE2 (bnc#856386).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-15"/>
	<updated date="2015-01-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/856386">SUSE bug 856386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913057">SUSE bug 913057</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0301/">CVE-2015-0301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0302/">CVE-2015-0302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0303/">CVE-2015-0303</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0304/">CVE-2015-0304</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0305/">CVE-2015-0305</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0306/">CVE-2015-0306</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0307/">CVE-2015-0307</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0308/">CVE-2015-0308</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0309/">CVE-2015-0309</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514683" comment="flash-player-11.2.202.429-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514684" comment="flash-player-gnome-11.2.202.429-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77263" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="918342" ref_url="https://bugzilla.suse.com/918342" source="BUGZILLA"/>
		<reference ref_id="924202" ref_url="https://bugzilla.suse.com/924202" source="BUGZILLA"/>
		<reference ref_id="928321" ref_url="https://bugzilla.suse.com/928321" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1798" ref_url="https://www.suse.com/security/cve/CVE-2015-1798/" source="CVE"/>
		<reference ref_id="CVE-2015-1799" ref_url="https://www.suse.com/security/cve/CVE-2015-1799/" source="CVE"/>
		<reference ref_id="CVE-2015-3405" ref_url="https://www.suse.com/security/cve/CVE-2015-3405/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001378.html" source="SUSE-SU"/>
		<description>
ntp was updated to fix two security related flaws as well as 'slew' mode handling for leap seconds. 

The following vulnerabilities were fixe:

* ntpd could accept unauthenticated packets with symmetric key crypto. (CVE-2015-1798)
* ntpd authentication did not protect symmetric associations against DoS attacks (CVE-2015-1799)
* ntp-keygen may generate non-random symmetric keys on big-endian systems (bsc#928321, CVE-2015-3405).

The following non-security issues were fixed:

* Fix slew mode for leap seconds (bnc#918342).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-04-28"/>
	<updated date="2015-04-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/918342">SUSE bug 918342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924202">SUSE bug 924202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928321">SUSE bug 928321</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1798/">CVE-2015-1798</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1799/">CVE-2015-1799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3405/">CVE-2015-3405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514685" comment="ntp-4.2.6p5-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514686" comment="ntp-doc-4.2.6p5-44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77264" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="923945" ref_url="https://bugzilla.suse.com/923945" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9709" ref_url="https://www.suse.com/security/cve/CVE-2014-9709/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001379.html" source="SUSE-SU"/>
		<description>
The graphics drawing library gd was updated to fix one security issue.

The following vulnerability was fixed:
* possible buffer read overflow (CVE-2014-9709)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-24"/>
	<updated date="2015-03-24"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/923945">SUSE bug 923945</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9709/">CVE-2014-9709</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514687" comment="gd-2.1.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514688" comment="gd-32bit-2.1.0-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77265" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="930677" ref_url="https://bugzilla.suse.com/930677" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3044" ref_url="https://www.suse.com/security/cve/CVE-2015-3044/" source="CVE"/>
		<reference ref_id="CVE-2015-3077" ref_url="https://www.suse.com/security/cve/CVE-2015-3077/" source="CVE"/>
		<reference ref_id="CVE-2015-3078" ref_url="https://www.suse.com/security/cve/CVE-2015-3078/" source="CVE"/>
		<reference ref_id="CVE-2015-3079" ref_url="https://www.suse.com/security/cve/CVE-2015-3079/" source="CVE"/>
		<reference ref_id="CVE-2015-3080" ref_url="https://www.suse.com/security/cve/CVE-2015-3080/" source="CVE"/>
		<reference ref_id="CVE-2015-3081" ref_url="https://www.suse.com/security/cve/CVE-2015-3081/" source="CVE"/>
		<reference ref_id="CVE-2015-3082" ref_url="https://www.suse.com/security/cve/CVE-2015-3082/" source="CVE"/>
		<reference ref_id="CVE-2015-3083" ref_url="https://www.suse.com/security/cve/CVE-2015-3083/" source="CVE"/>
		<reference ref_id="CVE-2015-3084" ref_url="https://www.suse.com/security/cve/CVE-2015-3084/" source="CVE"/>
		<reference ref_id="CVE-2015-3085" ref_url="https://www.suse.com/security/cve/CVE-2015-3085/" source="CVE"/>
		<reference ref_id="CVE-2015-3086" ref_url="https://www.suse.com/security/cve/CVE-2015-3086/" source="CVE"/>
		<reference ref_id="CVE-2015-3087" ref_url="https://www.suse.com/security/cve/CVE-2015-3087/" source="CVE"/>
		<reference ref_id="CVE-2015-3088" ref_url="https://www.suse.com/security/cve/CVE-2015-3088/" source="CVE"/>
		<reference ref_id="CVE-2015-3089" ref_url="https://www.suse.com/security/cve/CVE-2015-3089/" source="CVE"/>
		<reference ref_id="CVE-2015-3090" ref_url="https://www.suse.com/security/cve/CVE-2015-3090/" source="CVE"/>
		<reference ref_id="CVE-2015-3091" ref_url="https://www.suse.com/security/cve/CVE-2015-3091/" source="CVE"/>
		<reference ref_id="CVE-2015-3092" ref_url="https://www.suse.com/security/cve/CVE-2015-3092/" source="CVE"/>
		<reference ref_id="CVE-2015-3093" ref_url="https://www.suse.com/security/cve/CVE-2015-3093/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<description>
The Adobe flash-player package was updated to version 11.2.202.460 to fix several security issues.

The following vulnerabilities were fixed (bsc#930677):
* APSB15-09, CVE-2015-3044, CVE-2015-3077, CVE-2015-3078,
CVE-2015-3079, CVE-2015-3080, CVE-2015-3081, CVE-2015-3082,
CVE-2015-3083, CVE-2015-3084, CVE-2015-3085, CVE-2015-3086,
CVE-2015-3087, CVE-2015-3088, CVE-2015-3089, CVE-2015-3090,
CVE-2015-3091, CVE-2015-3092, CVE-2015-3093

More information can be found at the Adobe Security Bulletin APSB15-09:
https://helpx.adobe.com/security/products/flash-player/apsb15-09.html		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-13"/>
	<updated date="2015-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3044/">CVE-2015-3044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3077/">CVE-2015-3077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3078/">CVE-2015-3078</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3079/">CVE-2015-3079</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3080/">CVE-2015-3080</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3081/">CVE-2015-3081</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3082/">CVE-2015-3082</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3083/">CVE-2015-3083</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3084/">CVE-2015-3084</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3085/">CVE-2015-3085</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3086/">CVE-2015-3086</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3087/">CVE-2015-3087</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3088/">CVE-2015-3088</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3089/">CVE-2015-3089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3090/">CVE-2015-3090</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3091/">CVE-2015-3091</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3092/">CVE-2015-3092</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3093/">CVE-2015-3093</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514689" comment="flash-player-11.2.202.460-83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514690" comment="flash-player-gnome-11.2.202.460-83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77266" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="929192" ref_url="https://bugzilla.suse.com/929192" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2170" ref_url="https://www.suse.com/security/cve/CVE-2015-2170/" source="CVE"/>
		<reference ref_id="CVE-2015-2221" ref_url="https://www.suse.com/security/cve/CVE-2015-2221/" source="CVE"/>
		<reference ref_id="CVE-2015-2222" ref_url="https://www.suse.com/security/cve/CVE-2015-2222/" source="CVE"/>
		<reference ref_id="CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305/" source="CVE"/>
		<reference ref_id="CVE-2015-2668" ref_url="https://www.suse.com/security/cve/CVE-2015-2668/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0882-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001386.html" source="SUSE-SU"/>
		<description>
The ClamAV antivirus engine was updated to version 0.98.7 to fix several security and non security issues.

The following vulnerabilities were fixed (bsc#929192):
* CVE-2015-2170: Fix crash in upx decoder with crafted file. Discovered and patch supplied by Sebastian Andrzej Siewior.
* CVE-2015-2221: Fix infinite loop condition on crafted y0da cryptor file. Identified and patch suggested by Sebastian Andrzej Siewior.
* CVE-2015-2222: Fix crash on crafted petite packed file. Reported and patch supplied by Sebastian Andrzej Siewior.
* CVE-2015-2668: Fix an infinite loop condition on a crafted 'xz' archive file. This was reported by Dimitri Kirchner and Goulven Guiheux.
* CVE-2015-2305: Apply upstream patch for possible heap overflow in Henry Spencer's regex library.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-11"/>
	<updated date="2015-05-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/929192">SUSE bug 929192</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2170/">CVE-2015-2170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2221/">CVE-2015-2221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2222/">CVE-2015-2222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2668/">CVE-2015-2668</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514691" comment="clamav-0.98.7-13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77267" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="848279" ref_url="https://bugzilla.suse.com/848279" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4282" ref_url="https://www.suse.com/security/cve/CVE-2013-4282/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0884-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00008.html" source="SUSE-SU"/>
		<description>
The remote desktop software SPICE was updated to address one security issue.

The following vulnerabilitiy was fixed:

* A stack-based buffer overflow in the password handling code allowed remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. (bsc#848279, CVE-2013-4282)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-04-02"/>
	<updated date="2015-04-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/848279">SUSE bug 848279</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2013-4282/">CVE-2013-4282</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514692" comment="libspice-server1-0.12.4-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77268" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="886378" ref_url="https://bugzilla.suse.com/886378" source="BUGZILLA"/>
		<reference ref_id="924018" ref_url="https://bugzilla.suse.com/924018" source="BUGZILLA"/>
		<reference ref_id="929339" ref_url="https://bugzilla.suse.com/929339" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00015.html" source="SUSE-SU"/>
		<description>

qemu / kvm was updated to fix a security issue and some bugs.

Security issue fixed:

* CVE-2015-3456: Fixed a buffer overflow in the floppy drive emulation, which could be used
  to denial of service attacks or potential code execution against the host.

* CVE-2015-1779: Fixed insufficient resource limiting in the VNC websockets decoder.


Bugs fixed:
- qemu truncates vhd images in virt-rescue (bsc#886378)

- Update kvm-supported.txt with the current rbd support status.

- enable rbd build on x86_64 (qemu-block-rbd package) (FATE#318349)		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-12"/>
	<updated date="2015-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/886378">SUSE bug 886378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924018">SUSE bug 924018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929339">SUSE bug 929339</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514693" comment="qemu-2.0.2-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514694" comment="qemu-block-curl-2.0.2-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514695" comment="qemu-ipxe-1.0.0-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514696" comment="qemu-kvm-2.0.2-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514697" comment="qemu-seabios-1.7.4-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514698" comment="qemu-sgabios-8-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514699" comment="qemu-tools-2.0.2-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514700" comment="qemu-vgabios-1.7.4-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514701" comment="qemu-x86-2.0.2-46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77269" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="924828" ref_url="https://bugzilla.suse.com/924828" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001394.html" source="SUSE-SU"/>
		<description>
The ASN.1 parsing library libtasn1 was updated to fix one memory handling issue.

The following vulnerability was fixed:

* CVE-2015-2806: A stack-based buffer overflow in libtasn1 allowed remote attackers to have unspecified impact via unknown vectors.		</description>
<advisory from="security@suse.de">
	<issued date="2015-04-27"/>
	<updated date="2015-04-27"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/924828">SUSE bug 924828</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514702" comment="libtasn1-3.7-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514703" comment="libtasn1-6-3.7-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514704" comment="libtasn1-6-32bit-3.7-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77270" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="922705" ref_url="https://bugzilla.suse.com/922705" source="BUGZILLA"/>
		<reference ref_id="922709" ref_url="https://bugzilla.suse.com/922709" source="BUGZILLA"/>
		<reference ref_id="927967" ref_url="https://bugzilla.suse.com/927967" source="BUGZILLA"/>
		<reference ref_id="929339" ref_url="https://bugzilla.suse.com/929339" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2751" ref_url="https://www.suse.com/security/cve/CVE-2015-2751/" source="CVE"/>
		<reference ref_id="CVE-2015-2752" ref_url="https://www.suse.com/security/cve/CVE-2015-2752/" source="CVE"/>
		<reference ref_id="CVE-2015-3340" ref_url="https://www.suse.com/security/cve/CVE-2015-3340/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00018.html" source="SUSE-SU"/>
		<description>

XEN was updated to fix two security issues and bugs.

Security issues fixed:
* CVE-2015-3340: Xen did not initialize certain fields, which allowed
  certain remote service domains to obtain sensitive information from
  memory via a (1) XEN_DOMCTL_gettscinfo or (2) XEN_SYSCTL_getdomaininfolist
  request.

* CVE-2015-2751: Xen, when using toolstack disaggregation, allowed remote
  domains with partial management control to cause a denial of service
  (host lock) via unspecified domctl operations.

* CVE-2015-2752: The XEN_DOMCTL_memory_mapping hypercall in Xen, when
  using a PCI passthrough device, was not preemptable, which allowed local
  x86 HVM domain users to cause a denial of service (host CPU consumption)
  via a crafted request to the device model (qemu-dm).

* CVE-2015-3456: Fixed a buffer overflow in the floppy drive emulation, which could be used
  to denial of service attacks or potential code execution against the host.

Bugs fixed:
- xentop: Fix memory leak on read failure 
		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-12"/>
	<updated date="2015-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/922705">SUSE bug 922705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922709">SUSE bug 922709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927967">SUSE bug 927967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929339">SUSE bug 929339</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2751/">CVE-2015-2751</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2752/">CVE-2015-2752</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3340/">CVE-2015-3340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514705" comment="xen-4.4.2_04-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514706" comment="xen-kmp-default-4.4.2_04_k3.12.39_47-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514707" comment="xen-libs-4.4.2_04-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514708" comment="xen-libs-32bit-4.4.2_04-18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77271" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="851603" ref_url="https://bugzilla.suse.com/851603" source="BUGZILLA"/>
		<reference ref_id="853040" ref_url="https://bugzilla.suse.com/853040" source="BUGZILLA"/>
		<reference ref_id="860441" ref_url="https://bugzilla.suse.com/860441" source="BUGZILLA"/>
		<reference ref_id="862957" ref_url="https://bugzilla.suse.com/862957" source="BUGZILLA"/>
		<reference ref_id="863526" ref_url="https://bugzilla.suse.com/863526" source="BUGZILLA"/>
		<reference ref_id="870498" ref_url="https://bugzilla.suse.com/870498" source="BUGZILLA"/>
		<reference ref_id="873228" ref_url="https://bugzilla.suse.com/873228" source="BUGZILLA"/>
		<reference ref_id="874025" ref_url="https://bugzilla.suse.com/874025" source="BUGZILLA"/>
		<reference ref_id="877622" ref_url="https://bugzilla.suse.com/877622" source="BUGZILLA"/>
		<reference ref_id="879255" ref_url="https://bugzilla.suse.com/879255" source="BUGZILLA"/>
		<reference ref_id="880767" ref_url="https://bugzilla.suse.com/880767" source="BUGZILLA"/>
		<reference ref_id="880892" ref_url="https://bugzilla.suse.com/880892" source="BUGZILLA"/>
		<reference ref_id="881085" ref_url="https://bugzilla.suse.com/881085" source="BUGZILLA"/>
		<reference ref_id="883139" ref_url="https://bugzilla.suse.com/883139" source="BUGZILLA"/>
		<reference ref_id="887046" ref_url="https://bugzilla.suse.com/887046" source="BUGZILLA"/>
		<reference ref_id="887382" ref_url="https://bugzilla.suse.com/887382" source="BUGZILLA"/>
		<reference ref_id="887418" ref_url="https://bugzilla.suse.com/887418" source="BUGZILLA"/>
		<reference ref_id="889295" ref_url="https://bugzilla.suse.com/889295" source="BUGZILLA"/>
		<reference ref_id="889297" ref_url="https://bugzilla.suse.com/889297" source="BUGZILLA"/>
		<reference ref_id="891259" ref_url="https://bugzilla.suse.com/891259" source="BUGZILLA"/>
		<reference ref_id="891619" ref_url="https://bugzilla.suse.com/891619" source="BUGZILLA"/>
		<reference ref_id="892254" ref_url="https://bugzilla.suse.com/892254" source="BUGZILLA"/>
		<reference ref_id="892612" ref_url="https://bugzilla.suse.com/892612" source="BUGZILLA"/>
		<reference ref_id="892650" ref_url="https://bugzilla.suse.com/892650" source="BUGZILLA"/>
		<reference ref_id="892860" ref_url="https://bugzilla.suse.com/892860" source="BUGZILLA"/>
		<reference ref_id="893454" ref_url="https://bugzilla.suse.com/893454" source="BUGZILLA"/>
		<reference ref_id="894057" ref_url="https://bugzilla.suse.com/894057" source="BUGZILLA"/>
		<reference ref_id="894863" ref_url="https://bugzilla.suse.com/894863" source="BUGZILLA"/>
		<reference ref_id="895221" ref_url="https://bugzilla.suse.com/895221" source="BUGZILLA"/>
		<reference ref_id="895387" ref_url="https://bugzilla.suse.com/895387" source="BUGZILLA"/>
		<reference ref_id="895468" ref_url="https://bugzilla.suse.com/895468" source="BUGZILLA"/>
		<reference ref_id="895680" ref_url="https://bugzilla.suse.com/895680" source="BUGZILLA"/>
		<reference ref_id="895983" ref_url="https://bugzilla.suse.com/895983" source="BUGZILLA"/>
		<reference ref_id="896391" ref_url="https://bugzilla.suse.com/896391" source="BUGZILLA"/>
		<reference ref_id="897101" ref_url="https://bugzilla.suse.com/897101" source="BUGZILLA"/>
		<reference ref_id="897736" ref_url="https://bugzilla.suse.com/897736" source="BUGZILLA"/>
		<reference ref_id="897770" ref_url="https://bugzilla.suse.com/897770" source="BUGZILLA"/>
		<reference ref_id="897912" ref_url="https://bugzilla.suse.com/897912" source="BUGZILLA"/>
		<reference ref_id="898234" ref_url="https://bugzilla.suse.com/898234" source="BUGZILLA"/>
		<reference ref_id="898297" ref_url="https://bugzilla.suse.com/898297" source="BUGZILLA"/>
		<reference ref_id="899192" ref_url="https://bugzilla.suse.com/899192" source="BUGZILLA"/>
		<reference ref_id="899489" ref_url="https://bugzilla.suse.com/899489" source="BUGZILLA"/>
		<reference ref_id="899551" ref_url="https://bugzilla.suse.com/899551" source="BUGZILLA"/>
		<reference ref_id="899785" ref_url="https://bugzilla.suse.com/899785" source="BUGZILLA"/>
		<reference ref_id="899787" ref_url="https://bugzilla.suse.com/899787" source="BUGZILLA"/>
		<reference ref_id="899908" ref_url="https://bugzilla.suse.com/899908" source="BUGZILLA"/>
		<reference ref_id="900126" ref_url="https://bugzilla.suse.com/900126" source="BUGZILLA"/>
		<reference ref_id="901090" ref_url="https://bugzilla.suse.com/901090" source="BUGZILLA"/>
		<reference ref_id="901774" ref_url="https://bugzilla.suse.com/901774" source="BUGZILLA"/>
		<reference ref_id="901809" ref_url="https://bugzilla.suse.com/901809" source="BUGZILLA"/>
		<reference ref_id="901925" ref_url="https://bugzilla.suse.com/901925" source="BUGZILLA"/>
		<reference ref_id="902010" ref_url="https://bugzilla.suse.com/902010" source="BUGZILLA"/>
		<reference ref_id="902016" ref_url="https://bugzilla.suse.com/902016" source="BUGZILLA"/>
		<reference ref_id="902346" ref_url="https://bugzilla.suse.com/902346" source="BUGZILLA"/>
		<reference ref_id="902893" ref_url="https://bugzilla.suse.com/902893" source="BUGZILLA"/>
		<reference ref_id="902898" ref_url="https://bugzilla.suse.com/902898" source="BUGZILLA"/>
		<reference ref_id="903279" ref_url="https://bugzilla.suse.com/903279" source="BUGZILLA"/>
		<reference ref_id="903307" ref_url="https://bugzilla.suse.com/903307" source="BUGZILLA"/>
		<reference ref_id="904013" ref_url="https://bugzilla.suse.com/904013" source="BUGZILLA"/>
		<reference ref_id="904077" ref_url="https://bugzilla.suse.com/904077" source="BUGZILLA"/>
		<reference ref_id="904115" ref_url="https://bugzilla.suse.com/904115" source="BUGZILLA"/>
		<reference ref_id="904354" ref_url="https://bugzilla.suse.com/904354" source="BUGZILLA"/>
		<reference ref_id="904871" ref_url="https://bugzilla.suse.com/904871" source="BUGZILLA"/>
		<reference ref_id="905087" ref_url="https://bugzilla.suse.com/905087" source="BUGZILLA"/>
		<reference ref_id="905100" ref_url="https://bugzilla.suse.com/905100" source="BUGZILLA"/>
		<reference ref_id="905296" ref_url="https://bugzilla.suse.com/905296" source="BUGZILLA"/>
		<reference ref_id="905758" ref_url="https://bugzilla.suse.com/905758" source="BUGZILLA"/>
		<reference ref_id="905772" ref_url="https://bugzilla.suse.com/905772" source="BUGZILLA"/>
		<reference ref_id="907818" ref_url="https://bugzilla.suse.com/907818" source="BUGZILLA"/>
		<reference ref_id="908184" ref_url="https://bugzilla.suse.com/908184" source="BUGZILLA"/>
		<reference ref_id="909077" ref_url="https://bugzilla.suse.com/909077" source="BUGZILLA"/>
		<reference ref_id="910251" ref_url="https://bugzilla.suse.com/910251" source="BUGZILLA"/>
		<reference ref_id="910697" ref_url="https://bugzilla.suse.com/910697" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6405" ref_url="https://www.suse.com/security/cve/CVE-2013-6405/" source="CVE"/>
		<reference ref_id="CVE-2014-3185" ref_url="https://www.suse.com/security/cve/CVE-2014-3185/" source="CVE"/>
		<reference ref_id="CVE-2014-3610" ref_url="https://www.suse.com/security/cve/CVE-2014-3610/" source="CVE"/>
		<reference ref_id="CVE-2014-3611" ref_url="https://www.suse.com/security/cve/CVE-2014-3611/" source="CVE"/>
		<reference ref_id="CVE-2014-3647" ref_url="https://www.suse.com/security/cve/CVE-2014-3647/" source="CVE"/>
		<reference ref_id="CVE-2014-3673" ref_url="https://www.suse.com/security/cve/CVE-2014-3673/" source="CVE"/>
		<reference ref_id="CVE-2014-7826" ref_url="https://www.suse.com/security/cve/CVE-2014-7826/" source="CVE"/>
		<reference ref_id="CVE-2014-7841" ref_url="https://www.suse.com/security/cve/CVE-2014-7841/" source="CVE"/>
		<reference ref_id="CVE-2014-8133" ref_url="https://www.suse.com/security/cve/CVE-2014-8133/" source="CVE"/>
		<reference ref_id="CVE-2014-9090" ref_url="https://www.suse.com/security/cve/CVE-2014-9090/" source="CVE"/>
		<reference ref_id="CVE-2014-9322" ref_url="https://www.suse.com/security/cve/CVE-2014-9322/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 12 kernel was updated to 3.12.31 to receive
various security and bugfixes.

Security issues fixed:
CVE-2014-9322: A local privilege escalation in the x86_64 32bit compatibility
signal handling was fixed, which could be used by local attackers to crash
the machine or execute code.

CVE-2014-9090: Various issues in LDT handling in 32bit compatibility mode on
the x86_64 platform were fixed, where local attackers could crash the machine.

CVE-2014-8133: Insufficient validation of TLS register usage could leak information
from the kernel stack to userspace.

CVE-2014-7826: kernel/trace/trace_syscalls.c in the Linux kernel did
not properly handle private syscall numbers during use of the ftrace
subsystem, which allowed local users to gain privileges or cause a denial
of service (invalid pointer dereference) via a crafted application.

CVE-2014-3647: Nadav Amit reported that the KVM (Kernel Virtual Machine) mishandled
noncanonical addresses when emulating instructions that change the rip
(Instruction Pointer). A guest user with access to I/O or the MMIO could use
this flaw to cause a denial of service (system crash) of the guest.

CVE-2014-3611: A race condition flaw was found in the way the Linux
kernel's KVM subsystem handled PIT (Programmable Interval Timer)
emulation. A guest user who has access to the PIT I/O ports could use
this flaw to crash the host.

CVE-2014-3610: If the guest writes a noncanonical value to certain MSR
registers, KVM will write that value to the MSR in the host context and
a #GP will be raised leading to kernel panic. A privileged guest user
could have used this flaw to crash the host.

CVE-2014-7841: A remote attacker could have used a flaw in SCTP to crash the
system by sending a maliciously prepared SCTP packet in order to trigger
a NULL pointer dereference on the server.

CVE-2014-3673: The SCTP implementation in the Linux kernel allowed
remote attackers to cause a denial of service (system crash) via
a malformed ASCONF chunk, related to net/sctp/sm_make_chunk.c and
net/sctp/sm_statefuns.c.

CVE-2014-3185: Multiple buffer overflows in the command_port_read_callback
function in drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial
Driver in the Linux kernel allowed physically proximate attackers to
execute arbitrary code or cause a denial of service (memory corruption
and system crash) via a crafted device that provides a large amount of
(1) EHCI or (2) XHCI data associated with a bulk response.



Bugs fixed:
BTRFS:
- btrfs: fix race that makes btrfs_lookup_extent_info miss skinny
  extent items (bnc#904077).
- btrfs: fix invalid leaf slot access in btrfs_lookup_extent()
  (bnc#904077).
- btrfs: avoid returning -ENOMEM in convert_extent_bit() too early
  (bnc#902016).
- btrfs: make find_first_extent_bit be able to cache any state
  (bnc#902016).
- btrfs: deal with convert_extent_bit errors to avoid fs
  corruption (bnc#902016).
- btrfs: be aware of btree inode write errors to avoid fs
  corruption (bnc#899551).
- btrfs: add missing end_page_writeback on submit_extent_page
  failure (bnc#899551).
- btrfs: fix crash of btrfs_release_extent_buffer_page
  (bnc#899551).
- btrfs: ensure readers see new data after a clone operation
  (bnc#898234).
- btrfs: avoid visiting all extent items when cloning a range
  (bnc#898234).
- btrfs: fix clone to deal with holes when NO_HOLES feature is
  enabled (bnc#898234).
- btrfs: make fsync work after cloning into a file (bnc#898234).
- btrfs: fix use-after-free when cloning a trailing file hole
  (bnc#898234).
- btrfs: clone, don't create invalid hole extent map (bnc#898234).
- btrfs: limit the path size in send to PATH_MAX (bnc#897770).
- btrfs: send, fix more issues related to directory renames
  (bnc#897770).
- btrfs: send, remove dead code from __get_cur_name_and_parent
  (bnc#897770).
- btrfs: send, account for orphan directories when building path
  strings (bnc#897770).
- btrfs: send, avoid unnecessary inode item lookup in the btree
  (bnc#897770).
- btrfs: send, fix incorrect ref access when using extrefs
  (bnc#897770).
- btrfs: send, build path string only once in send_hole
  (bnc#897770).
- btrfs: part 2, fix incremental send's decision to delay a dir
  move/rename (bnc#897770).
- btrfs: fix incremental send's decision to delay a dir
  move/rename (bnc#897770).
- btrfs: remove unnecessary inode generation lookup in send
  (bnc#897770).
- btrfs: avoid unnecessary utimes update in incremental send
  (bnc#897770).
- btrfs: fix send issuing outdated paths for utimes, chown and
  chmod (bnc#897770).
- btrfs: fix send attempting to rmdir non-empty directories
  (bnc#897770).
- btrfs: send, don't send rmdir for same target multiple times
  (bnc#897770).
- btrfs: incremental send, fix invalid path after dir rename
  (bnc#897770).
- btrfs: fix assert screwup for the pending move stuff
  (bnc#897770).
- btrfs: make some tree searches in send.c more efficient
  (bnc#897770).
- btrfs: use right extent item position in send when finding
  extent clones (bnc#897770).
- btrfs: more send support for parent/child dir relationship
  inversion (bnc#897770).
- btrfs: fix send dealing with file renames and directory moves
  (bnc#897770).
- btrfs: add missing error check in incremental send (bnc#897770).
- btrfs: make send's file extent item search more efficient
  (bnc#897770).
- btrfs: fix infinite path build loops in incremental send
  (bnc#897770).
- btrfs: send, don't delay dir move if there's a new parent inode
  (bnc#897770).
- btrfs: add helper btrfs_fdatawrite_range (bnc#902010).
- btrfs: correctly flush compressed data before/after direct IO
  (bnc#902010).
- btrfs: make inode.c:compress_file_range() return void
  (bnc#902010).
- btrfs: report error after failure inlining extent in compressed
  write path (bnc#902010).
- btrfs: don't ignore compressed bio write errors (bnc#902010).
- btrfs: make inode.c:submit_compressed_extents() return void
  (bnc#902010).
- btrfs: process all async extents on compressed write failure
  (bnc#902010).
- btrfs: don't leak pages and memory on compressed write error
  (bnc#902010).
- btrfs: fix hang on compressed write error (bnc#902010).
- btrfs: set page and mapping error on compressed write failure
  (bnc#902010).
- btrfs: fix kfree on list_head in btrfs_lookup_csums_range
  error cleanup (bnc#904115).


Hyper-V:
- hyperv: Fix a bug in netvsc_send().
- hyperv: Fix a bug in netvsc_start_xmit().
- drivers: hv: vmbus: Enable interrupt driven flow control.
- drivers: hv: vmbus: Properly protect calls to
  smp_processor_id().
- drivers: hv: vmbus: Cleanup hv_post_message().
- drivers: hv: vmbus: Cleanup vmbus_close_internal().
- drivers: hv: vmbus: Fix a bug in vmbus_open().
- drivers: hv: vmbus: Cleanup vmbus_establish_gpadl().
- drivers: hv: vmbus: Cleanup vmbus_teardown_gpadl().
- drivers: hv: vmbus: Cleanup vmbus_post_msg().
- storvsc: get rid of overly verbose warning messages.
- hyperv: NULL dereference on error.
- hyperv: Increase the buffer length for netvsc_channel_cb().

zSeries / S390:
- s390: pass march flag to assembly files as well (bnc#903279,
  LTC#118177).
- kernel: reduce function tracer overhead (bnc#903279,
  LTC#118177).
- SUNRPC: Handle EPIPE in xprt_connect_status (bnc#901090).
- SUNRPC: Ensure that we handle ENOBUFS errors correctly
  (bnc#901090).
- SUNRPC: Ensure call_connect_status() deals correctly with
  SOFTCONN tasks (bnc#901090).
- SUNRPC: Ensure that call_connect times out correctly
  (bnc#901090).
- SUNRPC: Handle connect errors ECONNABORTED and EHOSTUNREACH
  (bnc#901090).
- SUNRPC: Ensure xprt_connect_status handles all potential
  connection errors (bnc#901090).
- SUNRPC: call_connect_status should recheck bind and connect
  status on error (bnc#901090).

kGraft:
- kgr: force patching process to succeed (fate#313296).
- kgr: usb-storage, mark kthread safe (fate#313296 bnc#899908).
- Refresh patches.suse/kgr-0039-kgr-fix-ugly-race.patch.
  Fix few bugs, and also races (immutable vs mark_processes vs other
  threads).
- kgr: always use locked bit ops for thread_info-&gt;flags
  (fate#313296).
- kgr: lower the workqueue scheduling timeout (fate#313296
  bnc#905087).
- kgr: mark even more kthreads (fate#313296 bnc#904871).
- rpm/kernel-binary.spec.in: Provide name-version-release for kgraft
  packages (bnc#901925)

Other:
- NFSv4: test SECINFO RPC_AUTH_GSS pseudoflavors for support
  (bnc#905758).

- Enable cmac(aes) and cmac(3des_ede) for FIPS mode (bnc#905296
  bnc#905772).

- scsi_dh_alua: disable ALUA handling for non-disk devices
  (bnc#876633).

- powerpc/vphn: NUMA node code expects big-endian (bsc#900126).

- net: fix checksum features handling in netif_skb_features()
  (bnc#891259).

- be2net: Fix invocation of be_close() after be_clear()
  (bnc#895468).

- PCI: pciehp: Clear Data Link Layer State Changed during init
  (bnc#898297).
- PCI: pciehp: Use symbolic constants, not hard-coded bitmask
  (bnc#898297).
- PCI: pciehp: Use link change notifications for hot-plug and
  removal (bnc#898297).
- PCI: pciehp: Make check_link_active() non-static (bnc#898297).
- PCI: pciehp: Enable link state change notifications
  (bnc#898297).

- ALSA: hda - Treat zero connection as non-error (bnc#902898).

- bcache: add mutex lock for bch_is_open (bnc#902893).

- futex: Fix a race condition between REQUEUE_PI and task death
  (bcn #851603 (futex scalability series)).

- Linux 3.12.31 (bnc#895983 bnc#897912).

- futex: Ensure get_futex_key_refs() always implies a barrier
  (bcn #851603 (futex scalability series)).

- usbback: don't access request fields in shared ring more
  than once.
- Update Xen patches to 3.12.30.

- locking/rwsem: Avoid double checking before try acquiring
  write lock (Locking scalability.).

- zcrypt: toleration of new crypto adapter hardware (bnc#894057,
  LTC#117041).
- zcrypt: support for extended number of ap domains (bnc#894057,
  LTC#117041).

- kABI: protect linux/fs.h include in mm/internal.h.

- Linux 3.12.30 (FATE#315482 bnc#862957 bnc#863526 bnc#870498).

- Update
  patches.fixes/xfs-mark-all-internal-workqueues-as-freezable.patch
  (bnc#899785).

- xfs: mark all internal workqueues as freezable.

- drm/i915: Move DP port disable to post_disable for pch platforms
  (bnc#899787).

- pagecachelimit: reduce lru_lock congestion for heavy parallel
  reclaim fix (bnc#895680).

- Linux 3.12.29 (bnc#879255 bnc#880892 bnc#887046 bnc#887418
  bnc#891619 bnc#892612 bnc#892650 bnc#897101).

- iommu/vt-d: Work around broken RMRR firmware entries
  (bnc#892860).
- iommu/vt-d: Store bus information in RMRR PCI device path
  (bnc#892860).
- iommu/vt-d: Only remove domain when device is removed
  (bnc#883139).
- driver core: Add BUS_NOTIFY_REMOVED_DEVICE event (bnc#883139).

- Update config files: Re-enable CONFIG_FUNCTION_PROFILER (bnc#899489)
  Option FUNCTION_PROFILER was enabled in debug and trace kernels so far,
  but it was accidentally disabled before tracing features were merged
  into the default kernel and the trace flavor was discarded. So all
  kernels are missing the feature now. Re-enable it.

- xfs: xlog_cil_force_lsn doesn't always wait correctly.

- scsi: clear 'host_scribble' upon successful abort (bnc#894863).

- module: warn if module init + probe takes long (bnc#889297
  bnc#877622 bnc#889295 bnc#893454).

- mm, THP: don't hold mmap_sem in khugepaged when allocating THP
  (bnc#880767, VM Performance).

- pagecache_limit: batch large nr_to_scan targets (bnc#895221).

- iommu/vt-d: Check return value of acpi_bus_get_device() (bnc#903307).

- rpm/kernel-binary.spec.in: Fix including the secure boot cert in /etc/uefi/certs

- sched: Reduce contention in update_cfs_rq_blocked_load()
  (Scheduler/core performance).

- x86: use optimized ioresource lookup in ioremap function
  (Boot time optimisations (bnc#895387)).
- x86: optimize resource lookups for ioremap (Boot time
  optimisations (bnc#895387)).

- usb: Do not re-read descriptors for wired devices in
  usb_authorize_device() (bnc#904354).

- netxen: Fix link event handling (bnc#873228).

- x86, cpu: Detect more TLB configuration -xen (TLB Performance).

- x86/mm: Fix RCU splat from new TLB tracepoints (TLB
  Performance).
- x86/mm: Set TLB flush tunable to sane value (33) (TLB
  Performance).
- x86/mm: New tunable for single vs full TLB flush (TLB
  Performance).
- x86/mm: Add tracepoints for TLB flushes (TLB Performance).
- x86/mm: Unify remote INVLPG code (TLB Performance).
- x86/mm: Fix missed global TLB flush stat (TLB Performance).
- x86/mm: Rip out complicated, out-of-date, buggy TLB flushing
  (TLB Performance).
- x86, cpu: Detect more TLB configuration (TLB Performance).
- mm, x86: Revisit tlb_flushall_shift tuning for page flushes
  except on IvyBridge (TLB Performance).
- x86/mm: Clean up the TLB flushing code (TLB Performance).
- mm: free compound page with correct order (VM Functionality).

- bnx2x: Utilize FW 7.10.51 (bnc#887382).
- bnx2x: Remove unnecessary internal mem config (bnc#887382).

- rtnetlink: fix oops in rtnl_link_get_slave_info_data_size
  (bnc#901774).

- dm: do not call dm_sync_table() when creating new devices
  (bnc#901809).

- [media] uvc: Fix destruction order in uvc_delete() (bnc#897736).

- uas: replace WARN_ON_ONCE() with lockdep_assert_held()
  (FATE#315595).

- cxgb4/cxgb4vf: Add Devicde ID for two more adapter (bsc#903999).
- cxgb4/cxgb4vf: Add device ID for new adapter and remove for
  dbg adapter (bsc#903999).
- cxgb4: Adds device ID for few more Chelsio T4 Adapters
  (bsc#903999).
- cxgb4: Check if rx checksum offload is enabled, while reading
  hardware calculated checksum (bsc#903999).

- xen-pciback: drop SR-IOV VFs when PF driver unloads
  (bsc#901839).

This update also includes fixes contained in the Linux 3.12.stable release series,
not seperately listed here.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-08"/>
	<updated date="2015-01-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/851603">SUSE bug 851603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853040">SUSE bug 853040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860441">SUSE bug 860441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862957">SUSE bug 862957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863526">SUSE bug 863526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870498">SUSE bug 870498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873228">SUSE bug 873228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/874025">SUSE bug 874025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877622">SUSE bug 877622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879255">SUSE bug 879255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880767">SUSE bug 880767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880892">SUSE bug 880892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881085">SUSE bug 881085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883139">SUSE bug 883139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887046">SUSE bug 887046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887382">SUSE bug 887382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887418">SUSE bug 887418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889295">SUSE bug 889295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889297">SUSE bug 889297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891259">SUSE bug 891259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891619">SUSE bug 891619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892254">SUSE bug 892254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892612">SUSE bug 892612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892650">SUSE bug 892650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892860">SUSE bug 892860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893454">SUSE bug 893454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894057">SUSE bug 894057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894863">SUSE bug 894863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895221">SUSE bug 895221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895387">SUSE bug 895387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895468">SUSE bug 895468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895680">SUSE bug 895680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895983">SUSE bug 895983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896391">SUSE bug 896391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897101">SUSE bug 897101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897736">SUSE bug 897736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897770">SUSE bug 897770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897912">SUSE bug 897912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898234">SUSE bug 898234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898297">SUSE bug 898297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899192">SUSE bug 899192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899489">SUSE bug 899489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899551">SUSE bug 899551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899785">SUSE bug 899785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899787">SUSE bug 899787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899908">SUSE bug 899908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900126">SUSE bug 900126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901090">SUSE bug 901090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901774">SUSE bug 901774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901809">SUSE bug 901809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901925">SUSE bug 901925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902010">SUSE bug 902010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902016">SUSE bug 902016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902346">SUSE bug 902346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902893">SUSE bug 902893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902898">SUSE bug 902898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903279">SUSE bug 903279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903307">SUSE bug 903307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904013">SUSE bug 904013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904077">SUSE bug 904077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904115">SUSE bug 904115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904354">SUSE bug 904354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904871">SUSE bug 904871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905087">SUSE bug 905087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905100">SUSE bug 905100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905296">SUSE bug 905296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905758">SUSE bug 905758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905772">SUSE bug 905772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907818">SUSE bug 907818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908184">SUSE bug 908184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909077">SUSE bug 909077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910251">SUSE bug 910251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910697">SUSE bug 910697</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-6405/">CVE-2013-6405</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3185/">CVE-2014-3185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3610/">CVE-2014-3610</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3611/">CVE-2014-3611</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-3647/">CVE-2014-3647</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3673/">CVE-2014-3673</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7826/">CVE-2014-7826</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7841/">CVE-2014-7841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8133/">CVE-2014-8133</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9090/">CVE-2014-9090</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9322/">CVE-2014-9322</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514709" comment="kernel-default-3.12.32-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514710" comment="kernel-default-devel-3.12.32-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514711" comment="kernel-default-extra-3.12.32-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514712" comment="kernel-devel-3.12.32-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514713" comment="kernel-macros-3.12.32-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514714" comment="kernel-source-3.12.32-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514715" comment="kernel-syms-3.12.32-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514716" comment="kernel-xen-3.12.32-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514717" comment="kernel-xen-devel-3.12.32-33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77272" version="1" class="patch">
	<metadata>
		<title>Security update for tigervnc, fltk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="908738" ref_url="https://bugzilla.suse.com/908738" source="BUGZILLA"/>
		<reference ref_id="911577" ref_url="https://bugzilla.suse.com/911577" source="BUGZILLA"/>
		<reference ref_id="915782" ref_url="https://bugzilla.suse.com/915782" source="BUGZILLA"/>
		<reference ref_id="915810" ref_url="https://bugzilla.suse.com/915810" source="BUGZILLA"/>
		<reference ref_id="920969" ref_url="https://bugzilla.suse.com/920969" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0255" ref_url="https://www.suse.com/security/cve/CVE-2015-0255/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001403.html" source="SUSE-SU"/>
		<description>
tigervnc and fltk were updated to fix security issues and non-security bugs.

This security issue was fixed:
- CVE-2015-0255: Information leak in the XkbSetGeometry request of X servers (bnc#915810).

These non-security issues were fixed:
- vncviewer-tigervnc does not display mouse cursor shape changes (bnc#908738).
- vnc module for Xorg fails to load on startup, module mismatch (bnc#911577).
- An Xvnc session may become unusable when user logs out (bnc#920969)

fltk was updated to fix one non-security issue:
- vncviewer-tigervnc does not display mouse cursor shape changes (bnc#908738).

Additionally tigervnc was updated to 1.4.1, the contained X server was updated to to 1.15.2.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-19"/>
	<updated date="2015-05-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/908738">SUSE bug 908738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911577">SUSE bug 911577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915782">SUSE bug 915782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915810">SUSE bug 915810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920969">SUSE bug 920969</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0255/">CVE-2015-0255</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514718" comment="libfltk1-1.3.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514719" comment="tigervnc-1.4.1-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514720" comment="xorg-x11-Xvnc-1.4.1-32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77273" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-bad (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="927559" ref_url="https://bugzilla.suse.com/927559" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0797" ref_url="https://www.suse.com/security/cve/CVE-2015-0797/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001405.html" source="SUSE-SU"/>
		<description>

gstreamer-0_10-plugins-bad was updated to fix a security issue,
a buffer overflow in mp4 parsing (bnc#927559 CVE-2015-0797).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-04-24"/>
	<updated date="2015-04-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/927559">SUSE bug 927559</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0797/">CVE-2015-0797</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514721" comment="gstreamer-0_10-plugins-bad-0.10.23-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514722" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514723" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514724" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514725" comment="libgstbasevideo-0_10-23-0.10.23-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514726" comment="libgstbasevideo-0_10-23-32bit-0.10.23-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514727" comment="libgstcodecparsers-0_10-23-0.10.23-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514728" comment="libgstphotography-0_10-23-0.10.23-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514729" comment="libgstphotography-0_10-23-32bit-0.10.23-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514730" comment="libgstsignalprocessor-0_10-23-0.10.23-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514731" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514732" comment="libgstvdp-0_10-23-0.10.23-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514733" comment="libgstvdp-0_10-23-32bit-0.10.23-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77274" version="1" class="patch">
	<metadata>
		<title>Security update for perl-YAML-LibYAML (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="860617" ref_url="https://bugzilla.suse.com/860617" source="BUGZILLA"/>
		<reference ref_id="868944" ref_url="https://bugzilla.suse.com/868944" source="BUGZILLA"/>
		<reference ref_id="907809" ref_url="https://bugzilla.suse.com/907809" source="BUGZILLA"/>
		<reference ref_id="911782" ref_url="https://bugzilla.suse.com/911782" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6393" ref_url="https://www.suse.com/security/cve/CVE-2013-6393/" source="CVE"/>
		<reference ref_id="CVE-2014-2525" ref_url="https://www.suse.com/security/cve/CVE-2014-2525/" source="CVE"/>
		<reference ref_id="CVE-2014-9130" ref_url="https://www.suse.com/security/cve/CVE-2014-9130/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0953-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001412.html" source="SUSE-SU"/>
		<description>
perl-YAML-LibYAML was updated to fix three security issues.

These security issues were fixed:
- CVE-2013-6393: The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performed an incorrect cast, which allowed remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggered a heap-based buffer overflow (bnc#860617, bnc#911782).
- CVE-2014-9130: scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allowed context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping (bnc#907809, bnc#911782).
- CVE-2014-2525: Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allowed context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file (bnc#868944, bnc#911782).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-10"/>
	<updated date="2015-02-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/860617">SUSE bug 860617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868944">SUSE bug 868944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907809">SUSE bug 907809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911782">SUSE bug 911782</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6393/">CVE-2013-6393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2525/">CVE-2014-2525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9130/">CVE-2014-9130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514734" comment="perl-YAML-LibYAML-0.38-10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77275" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="930622" ref_url="https://bugzilla.suse.com/930622" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0797" ref_url="https://www.suse.com/security/cve/CVE-2015-0797/" source="CVE"/>
		<reference ref_id="CVE-2015-2708" ref_url="https://www.suse.com/security/cve/CVE-2015-2708/" source="CVE"/>
		<reference ref_id="CVE-2015-2709" ref_url="https://www.suse.com/security/cve/CVE-2015-2709/" source="CVE"/>
		<reference ref_id="CVE-2015-2710" ref_url="https://www.suse.com/security/cve/CVE-2015-2710/" source="CVE"/>
		<reference ref_id="CVE-2015-2713" ref_url="https://www.suse.com/security/cve/CVE-2015-2713/" source="CVE"/>
		<reference ref_id="CVE-2015-2716" ref_url="https://www.suse.com/security/cve/CVE-2015-2716/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html" source="SUSE-SU"/>
		<description>

This update to Firefox 31.7.0 ESR (bsc#930622) fixes the following issues:

  * MFSA 2015-46/CVE-2015-2708/CVE-2015-2709
    (bmo#1120655, bmo#1143299, bmo#1151139, bmo#1152177,
     bmo#1111251, bmo#1117977, bmo#1128064, bmo#1135066,
     bmo#1143194, bmo#1146101, bmo#1149526, bmo#1153688,
     bmo#1155474)
    Miscellaneous memory safety hazards (rv:38.0 / rv:31.7)
  * MFSA 2015-47/CVE-2015-0797
    (bmo#1080995)
    Buffer overflow parsing H.264 video with Linux Gstreamer
  * MFSA 2015-48/CVE-2015-2710
    (bmo#1149542)
    Buffer overflow with SVG content and CSS
  * MFSA 2015-51/CVE-2015-2713
    (bmo#1153478)
    Use-after-free during text processing with vertical text
    enabled
  * MFSA 2015-54/CVE-2015-2716
    (bmo#1140537)
    Buffer overflow when parsing compressed XML
		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-21"/>
	<updated date="2015-05-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0797/">CVE-2015-0797</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2708/">CVE-2015-2708</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2709/">CVE-2015-2709</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2710/">CVE-2015-2710</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2713/">CVE-2015-2713</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2716/">CVE-2015-2716</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514735" comment="MozillaFirefox-31.7.0esr-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514736" comment="MozillaFirefox-translations-31.7.0esr-34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77276" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="923144" ref_url="https://bugzilla.suse.com/923144" source="BUGZILLA"/>
		<reference ref_id="928867" ref_url="https://bugzilla.suse.com/928867" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3294" ref_url="https://www.suse.com/security/cve/CVE-2015-3294/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001418.html" source="SUSE-SU"/>
		<description>
The DNS server dnsmasq was updated to fix one security issue and one non-security bug.

The following vulnerability was fixed:

* CVE-2015-3294: A remote unauthenticated attacker could have caused a denial of service (DoS) or read heap memory, potentially disclosing information such as performed DNS queries or encryption keys. (bsc#928867)

The following bug was fixed:

* bsc#923144: When answer to an upstream query is a CNAME pointing to an A/AAAA record which is present locally (/etc/hosts), allow caching when the upstream and local A/AAAA records have the same value.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-04-28"/>
	<updated date="2015-04-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/923144">SUSE bug 923144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928867">SUSE bug 928867</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3294/">CVE-2015-3294</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514737" comment="dnsmasq-2.71-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77277" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="927556" ref_url="https://bugzilla.suse.com/927556" source="BUGZILLA"/>
		<reference ref_id="927607" ref_url="https://bugzilla.suse.com/927607" source="BUGZILLA"/>
		<reference ref_id="927608" ref_url="https://bugzilla.suse.com/927608" source="BUGZILLA"/>
		<reference ref_id="927746" ref_url="https://bugzilla.suse.com/927746" source="BUGZILLA"/>
		<reference ref_id="928533" ref_url="https://bugzilla.suse.com/928533" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3143" ref_url="https://www.suse.com/security/cve/CVE-2015-3143/" source="CVE"/>
		<reference ref_id="CVE-2015-3144" ref_url="https://www.suse.com/security/cve/CVE-2015-3144/" source="CVE"/>
		<reference ref_id="CVE-2015-3145" ref_url="https://www.suse.com/security/cve/CVE-2015-3145/" source="CVE"/>
		<reference ref_id="CVE-2015-3148" ref_url="https://www.suse.com/security/cve/CVE-2015-3148/" source="CVE"/>
		<reference ref_id="CVE-2015-3153" ref_url="https://www.suse.com/security/cve/CVE-2015-3153/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001421.html" source="SUSE-SU"/>
		<description>
curl was updated to fix five security issues.

The following vulnerabilities were fixed:

* CVE-2015-3143: curl could re-use NTML authenticateds connections
* CVE-2015-3144: curl could access memory out of bounds with zero length host names
* CVE-2015-3145: curl cookie parser could access memory out of boundary
* CVE-2015-3148: curl could treat Negotiate as not connection-oriented
* CVE-2015-3153: curl could have sent sensitive HTTP headers also to proxies
		</description>
<advisory from="security@suse.de">
	<issued date="2015-04-29"/>
	<updated date="2015-04-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/927556">SUSE bug 927556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927607">SUSE bug 927607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927608">SUSE bug 927608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927746">SUSE bug 927746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928533">SUSE bug 928533</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3143/">CVE-2015-3143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3144/">CVE-2015-3144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3145/">CVE-2015-3145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3148/">CVE-2015-3148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3153/">CVE-2015-3153</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514738" comment="curl-7.37.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514739" comment="libcurl4-7.37.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514740" comment="libcurl4-32bit-7.37.0-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77278" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="900611" ref_url="https://bugzilla.suse.com/900611" source="BUGZILLA"/>
		<reference ref_id="915323" ref_url="https://bugzilla.suse.com/915323" source="BUGZILLA"/>
		<reference ref_id="927558" ref_url="https://bugzilla.suse.com/927558" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3686" ref_url="https://www.suse.com/security/cve/CVE-2014-3686/" source="CVE"/>
		<reference ref_id="CVE-2015-0210" ref_url="https://www.suse.com/security/cve/CVE-2015-0210/" source="CVE"/>
		<reference ref_id="CVE-2015-1863" ref_url="https://www.suse.com/security/cve/CVE-2015-1863/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001423.html" source="SUSE-SU"/>
		<description>
wpa_supplicant was updated to fix three security issues:

- CVE-2015-0210: wpa_supplicant: broken certificate subject check
  this adds the 'domain_match' config option from upstream
  (additional to the already existing domain_suffix_match)
- CVE-2014-3686: hostapd command execution
- CVE-2015-1863: P2P SSID processing vulnerability
		</description>
<advisory from="security@suse.de">
	<issued date="2015-04-21"/>
	<updated date="2015-04-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/900611">SUSE bug 900611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927558">SUSE bug 927558</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3686/">CVE-2014-3686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0210/">CVE-2015-0210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1863/">CVE-2015-1863</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514741" comment="wpa_supplicant-2.2-8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77279" version="1" class="patch">
	<metadata>
		<title>Security update for vorbis-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="914439" ref_url="https://bugzilla.suse.com/914439" source="BUGZILLA"/>
		<reference ref_id="914441" ref_url="https://bugzilla.suse.com/914441" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9638" ref_url="https://www.suse.com/security/cve/CVE-2014-9638/" source="CVE"/>
		<reference ref_id="CVE-2014-9639" ref_url="https://www.suse.com/security/cve/CVE-2014-9639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001424.html" source="SUSE-SU"/>
		<description>

Vorbis tools was updated to fix division by zero and integer overflows by crafted WAV files (CVE-2014-9638, CVE-2014-9639, bnc#914439, bnc#914441),
that would allow attackers to crash the vorbis tools processes.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-09"/>
	<updated date="2015-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/914439">SUSE bug 914439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914441">SUSE bug 914441</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9638/">CVE-2014-9638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9639/">CVE-2014-9639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514742" comment="vorbis-tools-1.4.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514743" comment="vorbis-tools-lang-1.4.0-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77280" version="1" class="patch">
	<metadata>
		<title>Security update for patch (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="904519" ref_url="https://bugzilla.suse.com/904519" source="BUGZILLA"/>
		<reference ref_id="913678" ref_url="https://bugzilla.suse.com/913678" source="BUGZILLA"/>
		<reference ref_id="915328" ref_url="https://bugzilla.suse.com/915328" source="BUGZILLA"/>
		<reference ref_id="915329" ref_url="https://bugzilla.suse.com/915329" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1196" ref_url="https://www.suse.com/security/cve/CVE-2015-1196/" source="CVE"/>
		<reference ref_id="CVE-2015-1395" ref_url="https://www.suse.com/security/cve/CVE-2015-1395/" source="CVE"/>
		<reference ref_id="CVE-2015-1396" ref_url="https://www.suse.com/security/cve/CVE-2015-1396/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001427.html" source="SUSE-SU"/>
		<description>
The GNU patch utility was updated to 2.7.5 to fix three security issues and one non-security bug.

The following vulnerabilities were fixed:

* CVE-2015-1196: directory traversal flaw when handling git-style patches. This could allow an attacker to overwrite arbitrary files by tricking the user into applying a specially crafted patch. (bsc#913678)
* CVE-2015-1395: directory traversal flaw when handling patches which rename files. This could allow an attacker to overwrite arbitrary files by tricking the user into applying a specially crafted patch. (bsc#915328) 
* CVE-2015-1396: directory traversal flaw via symbolic links. This could allow an attacker to overwrite arbitrary files by tricking the user into applying a by applying a specially crafted patch. (bsc#915329)

The following bug was fixed:

* bsc#904519:  Function names in hunks (from diff -p) are now preserved in  reject files.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-03"/>
	<updated date="2015-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/904519">SUSE bug 904519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913678">SUSE bug 913678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915328">SUSE bug 915328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915329">SUSE bug 915329</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1196/">CVE-2015-1196</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1395/">CVE-2015-1395</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1396/">CVE-2015-1396</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514744" comment="patch-2.7.5-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77281" version="1" class="patch">
	<metadata>
		<title>Security update for autofs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="901448" ref_url="https://bugzilla.suse.com/901448" source="BUGZILLA"/>
		<reference ref_id="909472" ref_url="https://bugzilla.suse.com/909472" source="BUGZILLA"/>
		<reference ref_id="913376" ref_url="https://bugzilla.suse.com/913376" source="BUGZILLA"/>
		<reference ref_id="916203" ref_url="https://bugzilla.suse.com/916203" source="BUGZILLA"/>
		<reference ref_id="917977" ref_url="https://bugzilla.suse.com/917977" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8169" ref_url="https://www.suse.com/security/cve/CVE-2014-8169/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001428.html" source="SUSE-SU"/>
		<description>
autofs was updated to fix one security issue.

This security issue was fixed:
- CVE-2014-8169: Prevent potential privilege escalation via interpreter load path for program-based automount maps (bnc#917977).

These non-security issues were fixed:
- Dont pass sloppy option for other than nfs mounts (bnc#901448, bnc#916203)
- Fix insserv warning at postinstall (bnc#913376)
- Fix autofs.service so that multiple options passed through sysconfig AUTOFS_OPTIONS work correctly (bnc#909472)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-02"/>
	<updated date="2015-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/901448">SUSE bug 901448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909472">SUSE bug 909472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913376">SUSE bug 913376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916203">SUSE bug 916203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917977">SUSE bug 917977</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8169/">CVE-2014-8169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514745" comment="autofs-5.0.9-8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77282" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="909563" ref_url="https://bugzilla.suse.com/909563" source="BUGZILLA"/>
		<reference ref_id="910647" ref_url="https://bugzilla.suse.com/910647" source="BUGZILLA"/>
		<reference ref_id="910669" ref_url="https://bugzilla.suse.com/910669" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1569" ref_url="https://www.suse.com/security/cve/CVE-2014-1569/" source="CVE"/>
		<reference ref_id="CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634/" source="CVE"/>
		<reference ref_id="CVE-2014-8635" ref_url="https://www.suse.com/security/cve/CVE-2014-8635/" source="CVE"/>
		<reference ref_id="CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638/" source="CVE"/>
		<reference ref_id="CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639/" source="CVE"/>
		<reference ref_id="CVE-2014-8641" ref_url="https://www.suse.com/security/cve/CVE-2014-8641/" source="CVE"/>
		<description>

This update fixes the following security issues in MozillaFirefox:
- MFSA 2015-01/CVE-2014-8634/CVE-2014-8635
   (bmo#1109889, bmo#1111737, bmo#1026774, bmo#1027300,
     bmo#1054538, bmo#1067473, bmo#1070962, bmo#1072130,
     bmo#1072871, bmo#1098583)
    Miscellaneous memory safety hazards (rv:35.0 / rv:31.4)
- MFSA 2015-03/CVE-2014-8638
   (bmo#1080987)
   sendBeacon requests lack an Origin header
- MFSA 2015-04/CVE-2014-8639
  (bmo#1095859)
  Cookie injection through Proxy Authenticate responses
- MFSA 2015-06/CVE-2014-8641
  (bmo#1108455)
  Read-after-free in WebRTC

Also Mozilla NSS was updated to 3.17.3 to fix:
* The QuickDER decoder now decodes lengths robustly
  (bmo#1064670/CVE-2014-1569)
* Support for TLS_FALLBACK_SCSV has been added to the ssltap
  and tstclnt utilities
* Changes in CA certificates
		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-16"/>
	<updated date="2015-01-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/909563">SUSE bug 909563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910647">SUSE bug 910647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1569/">CVE-2014-1569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8635/">CVE-2014-8635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8641/">CVE-2014-8641</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514746" comment="MozillaFirefox-31.4.0esr-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514747" comment="MozillaFirefox-translations-31.4.0esr-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514748" comment="libfreebl3-3.17.3-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514749" comment="libfreebl3-32bit-3.17.3-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514750" comment="libsoftokn3-3.17.3-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514751" comment="libsoftokn3-32bit-3.17.3-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514752" comment="mozilla-nss-3.17.3-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514753" comment="mozilla-nss-32bit-3.17.3-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514754" comment="mozilla-nss-certs-3.17.3-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514755" comment="mozilla-nss-certs-32bit-3.17.3-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514756" comment="mozilla-nss-tools-3.17.3-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77283" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="906689" ref_url="https://bugzilla.suse.com/906689" source="BUGZILLA"/>
		<reference ref_id="931625" ref_url="https://bugzilla.suse.com/931625" source="BUGZILLA"/>
		<reference ref_id="931626" ref_url="https://bugzilla.suse.com/931626" source="BUGZILLA"/>
		<reference ref_id="931627" ref_url="https://bugzilla.suse.com/931627" source="BUGZILLA"/>
		<reference ref_id="931628" ref_url="https://bugzilla.suse.com/931628" source="BUGZILLA"/>
		<reference ref_id="932770" ref_url="https://bugzilla.suse.com/932770" source="BUGZILLA"/>
		<reference ref_id="932790" ref_url="https://bugzilla.suse.com/932790" source="BUGZILLA"/>
		<reference ref_id="932996" ref_url="https://bugzilla.suse.com/932996" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209/" source="CVE"/>
		<reference ref_id="CVE-2015-4103" ref_url="https://www.suse.com/security/cve/CVE-2015-4103/" source="CVE"/>
		<reference ref_id="CVE-2015-4104" ref_url="https://www.suse.com/security/cve/CVE-2015-4104/" source="CVE"/>
		<reference ref_id="CVE-2015-4105" ref_url="https://www.suse.com/security/cve/CVE-2015-4105/" source="CVE"/>
		<reference ref_id="CVE-2015-4106" ref_url="https://www.suse.com/security/cve/CVE-2015-4106/" source="CVE"/>
		<reference ref_id="CVE-2015-4163" ref_url="https://www.suse.com/security/cve/CVE-2015-4163/" source="CVE"/>
		<reference ref_id="CVE-2015-4164" ref_url="https://www.suse.com/security/cve/CVE-2015-4164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" source="SUSE-SU"/>
		<description>
Xen was updated to fix seven security issues and one non-security bug.

The following vulnerabilities were fixed:

* CVE-2015-4103: Potential unintended writes to host MSI message data field via qemu (XSA-128) (bnc#931625)
* CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests (XSA-129) (bnc#931626)
* CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error messages (XSA-130) (bnc#931627)
* CVE-2015-4106: Unmediated PCI register access in qemu (XSA-131) (bnc#931628)
* CVE-2015-4163: GNTTABOP_swap_grant_ref operation misbehavior (XSA-134) (bnc#932790)
* CVE-2015-3209: heap overflow in qemu pcnet controller allowing guest to host escape (XSA-135) (bnc#932770)
* CVE-2015-4164: DoS through iret hypercall handler (XSA-136) (bnc#932996)

The following non-security bug was fixed:

* bnc#906689: let systemd schedule xencommons after network-online.target and remote-fs.target so that xendomains has access to remote shares
		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-03"/>
	<updated date="2015-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/906689">SUSE bug 906689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931625">SUSE bug 931625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931626">SUSE bug 931626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931627">SUSE bug 931627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931628">SUSE bug 931628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932770">SUSE bug 932770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932790">SUSE bug 932790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932996">SUSE bug 932996</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4103/">CVE-2015-4103</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4104/">CVE-2015-4104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4105/">CVE-2015-4105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4106/">CVE-2015-4106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4163/">CVE-2015-4163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4164/">CVE-2015-4164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514757" comment="xen-4.4.2_06-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514758" comment="xen-kmp-default-4.4.2_06_k3.12.39_47-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514759" comment="xen-libs-4.4.2_06-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514760" comment="xen-libs-32bit-4.4.2_06-21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77284" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="934088" ref_url="https://bugzilla.suse.com/934088" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3096" ref_url="https://www.suse.com/security/cve/CVE-2015-3096/" source="CVE"/>
		<reference ref_id="CVE-2015-3098" ref_url="https://www.suse.com/security/cve/CVE-2015-3098/" source="CVE"/>
		<reference ref_id="CVE-2015-3099" ref_url="https://www.suse.com/security/cve/CVE-2015-3099/" source="CVE"/>
		<reference ref_id="CVE-2015-3100" ref_url="https://www.suse.com/security/cve/CVE-2015-3100/" source="CVE"/>
		<reference ref_id="CVE-2015-3102" ref_url="https://www.suse.com/security/cve/CVE-2015-3102/" source="CVE"/>
		<reference ref_id="CVE-2015-3103" ref_url="https://www.suse.com/security/cve/CVE-2015-3103/" source="CVE"/>
		<reference ref_id="CVE-2015-3104" ref_url="https://www.suse.com/security/cve/CVE-2015-3104/" source="CVE"/>
		<reference ref_id="CVE-2015-3105" ref_url="https://www.suse.com/security/cve/CVE-2015-3105/" source="CVE"/>
		<reference ref_id="CVE-2015-3106" ref_url="https://www.suse.com/security/cve/CVE-2015-3106/" source="CVE"/>
		<reference ref_id="CVE-2015-3107" ref_url="https://www.suse.com/security/cve/CVE-2015-3107/" source="CVE"/>
		<reference ref_id="CVE-2015-3108" ref_url="https://www.suse.com/security/cve/CVE-2015-3108/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00005.html" source="SUSE-SU"/>
		<description>
  The following issues are fixed by this updated:
    * CVE-2015-3096: These updates resolve a vulnerability that could be exploited to bypass the fix for CVE-2014-5333. 
    * CVE-2015-3098, CVE-2015-3099, CVE-2015-3102:These updates resolve vulnerabilities that could be exploited to bypass the same-origin-policy and lead to information disclosure. 
    * CVE-2015-3100: These updates resolve a stack overflow vulnerability that could lead to code execution.
    * CVE-2015-3103, CVE-2015-3106, CVE-2015-3107: These updates resolve use-after-free vulnerabilities that could lead to code execution.
    * CVE-2015-3104: These updates resolve an integer overflow vulnerability that could lead to code execution.
    * CVE-2015-3105: These updates resolve a memory corruption vulnerability that could lead to code execution.
    * CVE-2015-3108: These updates resolve a memory leak vulnerability that could be used to bypass ASLR (CVE-2015-3108).
 (bsc#934088)		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-11"/>
	<updated date="2015-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/934088">SUSE bug 934088</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3096/">CVE-2015-3096</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3098/">CVE-2015-3098</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3099/">CVE-2015-3099</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3100/">CVE-2015-3100</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3102/">CVE-2015-3102</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3103/">CVE-2015-3103</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3104/">CVE-2015-3104</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3105/">CVE-2015-3105</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3106/">CVE-2015-3106</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3107/">CVE-2015-3107</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3108/">CVE-2015-3108</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514761" comment="flash-player-11.2.202.466-86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514762" comment="flash-player-gnome-11.2.202.466-86.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77285" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="924208" ref_url="https://bugzilla.suse.com/924208" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5519" ref_url="https://www.suse.com/security/cve/CVE-2012-5519/" source="CVE"/>
		<reference ref_id="CVE-2015-1158" ref_url="https://www.suse.com/security/cve/CVE-2015-1158/" source="CVE"/>
		<reference ref_id="CVE-2015-1159" ref_url="https://www.suse.com/security/cve/CVE-2015-1159/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00003.html" source="SUSE-SU"/>
		<description>
The following issues are fixed by this update:

* CVE-2012-5519: privilege escalation via cross-site scripting
  and bad print job submission used to replace cupsd.conf on server (bsc#924208).
* CVE-2015-1158: Improper Update of Reference Count
* CVE-2015-1159: Cross-Site Scripting

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-10"/>
	<updated date="2015-06-10"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/924208">SUSE bug 924208</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5519/">CVE-2012-5519</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1158/">CVE-2015-1158</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1159/">CVE-2015-1159</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514763" comment="cups-1.7.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514764" comment="cups-client-1.7.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514765" comment="cups-libs-1.7.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514766" comment="cups-libs-32bit-1.7.5-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77286" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="930689" ref_url="https://bugzilla.suse.com/930689" source="BUGZILLA"/>
		<reference ref_id="930691" ref_url="https://bugzilla.suse.com/930691" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3811" ref_url="https://www.suse.com/security/cve/CVE-2015-3811/" source="CVE"/>
		<reference ref_id="CVE-2015-3812" ref_url="https://www.suse.com/security/cve/CVE-2015-3812/" source="CVE"/>
		<reference ref_id="CVE-2015-3813" ref_url="https://www.suse.com/security/cve/CVE-2015-3813/" source="CVE"/>
		<reference ref_id="CVE-2015-3814" ref_url="https://www.suse.com/security/cve/CVE-2015-3814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001437.html" source="SUSE-SU"/>
		<description>
Wireshark was updated to 1.10.14 to fix four security issues.

The following vulnerabilities have been fixed:

* CVE-2015-3811: The WCP dissector could crash while decompressing data. (wnpa-sec-2015-14)
* CVE-2015-3812: The X11 dissector could leak memory. (wnpa-sec-2015-15)
* CVE-2015-3813: The packet reassembly code could leak memory. (wnpa-sec-2015-16)
* CVE-2015-3814: The IEEE 802.11 dissector could go into an infinite loop. (wnpa-sec-2015-17)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-03"/>
	<updated date="2015-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/930689">SUSE bug 930689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930691">SUSE bug 930691</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3811/">CVE-2015-3811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3812/">CVE-2015-3812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3813/">CVE-2015-3813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3814/">CVE-2015-3814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514767" comment="wireshark-1.10.14-12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77287" version="1" class="patch">
	<metadata>
		<title>Security update for fuse (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="931452" ref_url="https://bugzilla.suse.com/931452" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3202" ref_url="https://www.suse.com/security/cve/CVE-2015-3202/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001438.html" source="SUSE-SU"/>
		<description>

This update fixes a vulnerability in fuse that 
did not clear the environment upon execution of external programs. 
CVE-2015-3202 has been assigned to this issue
		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-20"/>
	<updated date="2015-05-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/931452">SUSE bug 931452</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3202/">CVE-2015-3202</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514768" comment="fuse-2.9.3-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514769" comment="libfuse2-2.9.3-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77288" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="899192" ref_url="https://bugzilla.suse.com/899192" source="BUGZILLA"/>
		<reference ref_id="900881" ref_url="https://bugzilla.suse.com/900881" source="BUGZILLA"/>
		<reference ref_id="909312" ref_url="https://bugzilla.suse.com/909312" source="BUGZILLA"/>
		<reference ref_id="913232" ref_url="https://bugzilla.suse.com/913232" source="BUGZILLA"/>
		<reference ref_id="914742" ref_url="https://bugzilla.suse.com/914742" source="BUGZILLA"/>
		<reference ref_id="915540" ref_url="https://bugzilla.suse.com/915540" source="BUGZILLA"/>
		<reference ref_id="916225" ref_url="https://bugzilla.suse.com/916225" source="BUGZILLA"/>
		<reference ref_id="917125" ref_url="https://bugzilla.suse.com/917125" source="BUGZILLA"/>
		<reference ref_id="919007" ref_url="https://bugzilla.suse.com/919007" source="BUGZILLA"/>
		<reference ref_id="919018" ref_url="https://bugzilla.suse.com/919018" source="BUGZILLA"/>
		<reference ref_id="920262" ref_url="https://bugzilla.suse.com/920262" source="BUGZILLA"/>
		<reference ref_id="921769" ref_url="https://bugzilla.suse.com/921769" source="BUGZILLA"/>
		<reference ref_id="922583" ref_url="https://bugzilla.suse.com/922583" source="BUGZILLA"/>
		<reference ref_id="922734" ref_url="https://bugzilla.suse.com/922734" source="BUGZILLA"/>
		<reference ref_id="922944" ref_url="https://bugzilla.suse.com/922944" source="BUGZILLA"/>
		<reference ref_id="924664" ref_url="https://bugzilla.suse.com/924664" source="BUGZILLA"/>
		<reference ref_id="924803" ref_url="https://bugzilla.suse.com/924803" source="BUGZILLA"/>
		<reference ref_id="924809" ref_url="https://bugzilla.suse.com/924809" source="BUGZILLA"/>
		<reference ref_id="925567" ref_url="https://bugzilla.suse.com/925567" source="BUGZILLA"/>
		<reference ref_id="926156" ref_url="https://bugzilla.suse.com/926156" source="BUGZILLA"/>
		<reference ref_id="926240" ref_url="https://bugzilla.suse.com/926240" source="BUGZILLA"/>
		<reference ref_id="926314" ref_url="https://bugzilla.suse.com/926314" source="BUGZILLA"/>
		<reference ref_id="927084" ref_url="https://bugzilla.suse.com/927084" source="BUGZILLA"/>
		<reference ref_id="927115" ref_url="https://bugzilla.suse.com/927115" source="BUGZILLA"/>
		<reference ref_id="927116" ref_url="https://bugzilla.suse.com/927116" source="BUGZILLA"/>
		<reference ref_id="927257" ref_url="https://bugzilla.suse.com/927257" source="BUGZILLA"/>
		<reference ref_id="927285" ref_url="https://bugzilla.suse.com/927285" source="BUGZILLA"/>
		<reference ref_id="927308" ref_url="https://bugzilla.suse.com/927308" source="BUGZILLA"/>
		<reference ref_id="927455" ref_url="https://bugzilla.suse.com/927455" source="BUGZILLA"/>
		<reference ref_id="928122" ref_url="https://bugzilla.suse.com/928122" source="BUGZILLA"/>
		<reference ref_id="928130" ref_url="https://bugzilla.suse.com/928130" source="BUGZILLA"/>
		<reference ref_id="928135" ref_url="https://bugzilla.suse.com/928135" source="BUGZILLA"/>
		<reference ref_id="928141" ref_url="https://bugzilla.suse.com/928141" source="BUGZILLA"/>
		<reference ref_id="928708" ref_url="https://bugzilla.suse.com/928708" source="BUGZILLA"/>
		<reference ref_id="929092" ref_url="https://bugzilla.suse.com/929092" source="BUGZILLA"/>
		<reference ref_id="929145" ref_url="https://bugzilla.suse.com/929145" source="BUGZILLA"/>
		<reference ref_id="929525" ref_url="https://bugzilla.suse.com/929525" source="BUGZILLA"/>
		<reference ref_id="929883" ref_url="https://bugzilla.suse.com/929883" source="BUGZILLA"/>
		<reference ref_id="930224" ref_url="https://bugzilla.suse.com/930224" source="BUGZILLA"/>
		<reference ref_id="930226" ref_url="https://bugzilla.suse.com/930226" source="BUGZILLA"/>
		<reference ref_id="930669" ref_url="https://bugzilla.suse.com/930669" source="BUGZILLA"/>
		<reference ref_id="930786" ref_url="https://bugzilla.suse.com/930786" source="BUGZILLA"/>
		<reference ref_id="931014" ref_url="https://bugzilla.suse.com/931014" source="BUGZILLA"/>
		<reference ref_id="931130" ref_url="https://bugzilla.suse.com/931130" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3647" ref_url="https://www.suse.com/security/cve/CVE-2014-3647/" source="CVE"/>
		<reference ref_id="CVE-2014-8086" ref_url="https://www.suse.com/security/cve/CVE-2014-8086/" source="CVE"/>
		<reference ref_id="CVE-2014-8159" ref_url="https://www.suse.com/security/cve/CVE-2014-8159/" source="CVE"/>
		<reference ref_id="CVE-2015-1465" ref_url="https://www.suse.com/security/cve/CVE-2015-1465/" source="CVE"/>
		<reference ref_id="CVE-2015-2041" ref_url="https://www.suse.com/security/cve/CVE-2015-2041/" source="CVE"/>
		<reference ref_id="CVE-2015-2042" ref_url="https://www.suse.com/security/cve/CVE-2015-2042/" source="CVE"/>
		<reference ref_id="CVE-2015-2666" ref_url="https://www.suse.com/security/cve/CVE-2015-2666/" source="CVE"/>
		<reference ref_id="CVE-2015-2830" ref_url="https://www.suse.com/security/cve/CVE-2015-2830/" source="CVE"/>
		<reference ref_id="CVE-2015-2922" ref_url="https://www.suse.com/security/cve/CVE-2015-2922/" source="CVE"/>
		<reference ref_id="CVE-2015-3331" ref_url="https://www.suse.com/security/cve/CVE-2015-3331/" source="CVE"/>
		<reference ref_id="CVE-2015-3332" ref_url="https://www.suse.com/security/cve/CVE-2015-3332/" source="CVE"/>
		<reference ref_id="CVE-2015-3339" ref_url="https://www.suse.com/security/cve/CVE-2015-3339/" source="CVE"/>
		<reference ref_id="CVE-2015-3636" ref_url="https://www.suse.com/security/cve/CVE-2015-3636/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00012.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 kernel was updated to version 3.12.43 to receive various security and bugfixes.

Following security bugs were fixed:

- CVE-2014-3647: arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 did not properly perform RIP changes, which allowed guest OS users to cause a denial of service (guest OS crash) via a crafted application (bsc#899192).
- CVE-2014-8086: Race condition in the ext4_file_write_iter function in fs/ext4/file.c in the Linux kernel through 3.17 allowed local users to cause a denial of service (file unavailability) via a combination of a write action and an F_SETFL fcntl operation for the O_DIRECT flag (bsc#900881).
- CVE-2014-8159: The InfiniBand (IB) implementation did not properly restrict use of User Verbs for registration of memory regions, which allowed local users to access arbitrary physical memory locations, and consequently cause a denial of service (system crash) or gain privileges, by leveraging permissions on a uverbs device under /dev/infiniband/ (bsc#914742).
- CVE-2015-1465: The IPv4 implementation in the Linux kernel before 3.18.8 did not properly consider the length of the Read-Copy Update (RCU) grace period for redirecting lookups in the absence of caching, which allowed remote attackers to cause a denial of service (memory consumption or system crash) via a flood of packets (bsc#916225).
- CVE-2015-2041: net/llc/sysctl_net_llc.c in the Linux kernel before 3.19 used an incorrect data type in a sysctl table, which allowed local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry (bsc#919007).
- CVE-2015-2042: net/rds/sysctl.c in the Linux kernel before 3.19 used an incorrect data type in a sysctl table, which allowed local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry (bsc#919018).
- CVE-2015-2666: Fixed a flaw that allowed crafted microcode to overflow the kernel stack (bsc#922944).
- CVE-2015-2830: Fixed int80 fork from 64-bit tasks mishandling (bsc#926240).
- CVE-2015-2922: Fixed possible denial of service (DoS) attack against IPv6 network stacks due to improper handling of Router Advertisements (bsc#922583).
- CVE-2015-3331: Fixed buffer overruns in RFC4106 implementation using AESNI (bsc#927257).
- CVE-2015-3332: Fixed TCP Fast Open local DoS (bsc#928135).
- CVE-2015-3339: Fixed race condition flaw between the chown() and execve() system calls which could have lead to local privilege escalation (bsc#928130).
- CVE-2015-3636: Fixed use-after-free in ping sockets which could have lead to local privilege escalation (bsc#929525).

The following non-security bugs were fixed:

- /proc/stat: convert to single_open_size() (bsc#928122).
- ACPI / sysfs: Treat the count field of counter_show() as unsigned (bsc#909312).
- Automatically Provide/Obsolete all subpackages of old flavors (bsc#925567)
- Btrfs: btrfs_release_extent_buffer_page did not free pages of dummy extent (bsc#930226).
- Btrfs: fix inode eviction infinite loop after cloning into it (bsc#930224).
- Btrfs: fix inode eviction infinite loop after extent_same ioctl (bsc#930224).
- Btrfs: fix log tree corruption when fs mounted with -o discard (bsc#927116).
- Btrfs: fix up bounds checking in lseek (bsc#927115).
- Fix rtworkqueues crash. Calling __sched_setscheduler() in interrupt context is forbidden, and destroy_worker() did so in the timer interrupt with a nohz_full config. Preclude that possibility for both boot options.
- Input: psmouse - add psmouse_matches_pnp_id helper function (bsc#929092).
- Input: synaptics - fix middle button on Lenovo 2015 products (bsc#929092).
- Input: synaptics - handle spurious release of trackstick buttons (bsc#929092).
- Input: synaptics - re-route tracksticks buttons on the Lenovo 2015 series (bsc#929092).
- Input: synaptics - remove TOPBUTTONPAD property for Lenovos 2015 (bsc#929092).
- Input: synaptics - retrieve the extended capabilities in query $10 (bsc#929092).
- NFS: Add attribute update barriers to nfs_setattr_update_inode() (bsc#920262).
- NFS: restore kabi after change to nfs_setattr_update_inode (bsc#920262).
- af_iucv: fix AF_IUCV sendmsg() errno (bsc#927308, LTC#123304).
- audit: do not reject all AUDIT_INODE filter types (bsc#927455).
- bnx2x: Fix kdump when iommu=on (bsc#921769).
- cpufreq: fix a NULL pointer dereference in __cpufreq_governor() (bsc#924664).
- dasd: Fix device having no paths after suspend/resume (bsc#927308, LTC#123896).
- dasd: Fix inability to set a DASD device offline (bsc#927308, LTC#123905).
- dasd: Fix unresumed device after suspend/resume (bsc#927308, LTC#123892).
- dasd: Missing partition after online processing (bsc#917125, LTC#120565).
- drm/radeon/cik: Add macrotile mode array query (bsc#927285).
- drm/radeon: fix display tiling setup on SI (bsc#927285).
- drm/radeon: set correct number of banks for CIK chips in DCE (bsc#927285).
- iommu/amd: Correctly encode huge pages in iommu page tables (bsc#931014).
- iommu/amd: Optimize alloc_new_range for new fetch_pte interface (bsc#931014).
- iommu/amd: Optimize amd_iommu_iova_to_phys for new fetch_pte interface (bsc#931014).
- iommu/amd: Optimize iommu_unmap_page for new fetch_pte interface (bsc#931014).
- iommu/amd: Return the pte page-size in fetch_pte (bsc#931014).
- ipc/shm.c: fix overly aggressive shmdt() when calls span multiple segments (ipc fixes).
- ipmi: Turn off all activity on an idle ipmi interface (bsc#915540).
- ixgbe: fix detection of SFP+ capable interfaces (bsc#922734).
- kgr: add error code to the message in kgr_revert_replaced_funs.
- kgr: add kgraft annotations to kthreads wait_event_freezable() API calls.
- kgr: correct error handling of the first patching stage.
- kgr: handle the delayed patching of the modules.
- kgr: handle the failure of finalization stage.
- kgr: return error in kgr_init if notifier registration fails.
- kgr: take switching of the fops out of kgr_patch_code to new function.
- kgr: use for_each_process_thread (bsc#929883).
- kgr: use kgr_in_progress for all threads (bnc#929883).
- libata: Blacklist queued TRIM on Samsung SSD 850 Pro (bsc#926156).
- mlx4: Call dev_kfree_skby_any instead of dev_kfree_skb (bsc#928708).
- mm, numa: really disable NUMA balancing by default on single node machines (Automatic NUMA Balancing).
- mm: vmscan: do not throttle based on pfmemalloc reserves if node has no reclaimable pages (bsc#924803, VM Functionality).
- net/mlx4: Cache line CQE/EQE stride fixes (bsc#927084).
- net/mlx4_core: Cache line EQE size support (bsc#927084).
- net/mlx4_core: Enable CQE/EQE stride support (bsc#927084).
- net/mlx4_en: Add mlx4_en_get_cqe helper (bsc#927084).
- perf/x86/amd/ibs: Update IBS MSRs and feature definitions.
- powerpc/mm: Fix mmap errno when MAP_FIXED is set and mapping exceeds the allowed address space (bsc#930669).
- powerpc/numa: Add ability to disable and debug topology updates (bsc#924809).
- powerpc/numa: Enable CONFIG_HAVE_MEMORYLESS_NODES (bsc#924809).
- powerpc/numa: Enable USE_PERCPU_NUMA_NODE_ID (bsc#924809).
- powerpc/numa: check error return from proc_create (bsc#924809).
- powerpc/numa: ensure per-cpu NUMA mappings are correct on topology update (bsc#924809).
- powerpc/numa: use cached value of update-&amp;gt;cpu in update_cpu_topology (bsc#924809).
- powerpc/perf: Cap 64bit userspace backtraces to PERF_MAX_STACK_DEPTH (bsc#928141).
- powerpc/pseries: Introduce api_version to migration sysfs interface (bsc#926314).
- powerpc/pseries: Little endian fixes for post mobility device tree update (bsc#926314).
- powerpc/pseries: Simplify check for suspendability during suspend/migration (bsc#926314).
- powerpc: Fix sys_call_table declaration to enable syscall tracing.
- powerpc: Fix warning reported by verify_cpu_node_mapping() (bsc#924809).
- powerpc: Only set numa node information for present cpus at boottime (bsc#924809).
- powerpc: reorder per-cpu NUMA information initialization (bsc#924809).
- powerpc: some changes in numa_setup_cpu() (bsc#924809).
- quota: Fix use of units in quota getting / setting interfaces (bsc#913232).
- rpm/kernel-binary.spec.in: Fix build if there is no *.crt file
- rpm/kernel-obs-qa.spec.in: Do not fail if the kernel versions do not match
- s390/bpf: Fix ALU_NEG (A = -A) (bsc#917125, LTC#121759).
- s390/bpf: Fix JMP_JGE_K (A &gt;= K) and JMP_JGT_K (A &gt; K) (bsc#917125, LTC#121759).
- s390/bpf: Fix JMP_JGE_X (A &gt; X) and JMP_JGT_X (A &gt;= X) (bsc#917125, LTC#121759).
- s390/bpf: Fix offset parameter for skb_copy_bits() (bsc#917125, LTC#121759).
- s390/bpf: Fix sk_load_byte_msh() (bsc#917125, LTC#121759).
- s390/bpf: Fix skb_copy_bits() parameter passing (bsc#917125, LTC#121759).
- s390/bpf: Zero extend parameters before calling C function (bsc#917125, LTC#121759).
- s390/sclp: Consolidate early sclp init calls to sclp_early_detect() (bsc#917125, LTC#122429).
- s390/sclp: Determine HSA size dynamically for zfcpdump (bsc#917125, LTC#122429).
- s390/sclp: Move declarations for sclp_sdias into separate header file (bsc#917125, LTC#122429).
- s390/sclp: Move early code from sclp_cmd.c to sclp_early.c (bsc#917125, LTC#122429).
- s390/sclp: replace uninitialized early_event_mask_sccb variable with sccb_early (bsc#917125, LTC#122429).
- s390/sclp: revert smp-detect-possible-cpus.patch (bsc#917125, LTC#122429).
- s390/sclp_early: Add function to detect sclp console capabilities (bsc#917125, LTC#122429).
- s390/sclp_early: Get rid of sclp_early_read_info_sccb_valid (bsc#917125, LTC#122429).
- s390/sclp_early: Pass sccb pointer to every *_detect() function (bsc#917125, LTC#122429).
- s390/sclp_early: Replace early_read_info_sccb with sccb_early (bsc#917125, LTC#122429).
- s390/sclp_early: Return correct HSA block count also for zero (bsc#917125, LTC#122429).
- s390/smp: limit number of cpus in possible cpu mask (bsc#917125, LTC#122429).
- s390: kgr, change the kgraft state only if enabled.
- sched, time: Fix lock inversion in thread_group_cputime()
- sched: Fix potential near-infinite distribute_cfs_runtime() loop (bsc#930786)
- sched: Robustify topology setup (bsc#924809).
- seqlock: Add irqsave variant of read_seqbegin_or_lock() (Time scalability).
- storvsc: Set the SRB flags correctly when no data transfer is needed (bsc#931130).
- x86/apic/uv: Update the APIC UV OEM check (bsc#929145).
- x86/apic/uv: Update the UV APIC HUB check (bsc#929145).
- x86/apic/uv: Update the UV APIC driver check (bsc#929145).
- x86/microcode/intel: Guard against stack overflow in the loader (bsc#922944).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-11"/>
	<updated date="2015-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/899192">SUSE bug 899192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900881">SUSE bug 900881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909312">SUSE bug 909312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913232">SUSE bug 913232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914742">SUSE bug 914742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915540">SUSE bug 915540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916225">SUSE bug 916225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917125">SUSE bug 917125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919007">SUSE bug 919007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919018">SUSE bug 919018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920262">SUSE bug 920262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921769">SUSE bug 921769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922583">SUSE bug 922583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922734">SUSE bug 922734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922944">SUSE bug 922944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924664">SUSE bug 924664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924803">SUSE bug 924803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924809">SUSE bug 924809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925567">SUSE bug 925567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926156">SUSE bug 926156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926240">SUSE bug 926240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926314">SUSE bug 926314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927084">SUSE bug 927084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927115">SUSE bug 927115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927116">SUSE bug 927116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927257">SUSE bug 927257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927285">SUSE bug 927285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927308">SUSE bug 927308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927455">SUSE bug 927455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928122">SUSE bug 928122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928130">SUSE bug 928130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928135">SUSE bug 928135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928141">SUSE bug 928141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928708">SUSE bug 928708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929092">SUSE bug 929092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929145">SUSE bug 929145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929525">SUSE bug 929525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929883">SUSE bug 929883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930224">SUSE bug 930224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930226">SUSE bug 930226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930669">SUSE bug 930669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930786">SUSE bug 930786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931014">SUSE bug 931014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931130">SUSE bug 931130</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-3647/">CVE-2014-3647</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8086/">CVE-2014-8086</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8159/">CVE-2014-8159</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1465/">CVE-2015-1465</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2041/">CVE-2015-2041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2042/">CVE-2015-2042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2666/">CVE-2015-2666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2830/">CVE-2015-2830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2922/">CVE-2015-2922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3331/">CVE-2015-3331</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3332/">CVE-2015-3332</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3339/">CVE-2015-3339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3636/">CVE-2015-3636</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514770" comment="kernel-default-3.12.43-52.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514771" comment="kernel-default-devel-3.12.43-52.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514772" comment="kernel-default-extra-3.12.43-52.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514773" comment="kernel-devel-3.12.43-52.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514774" comment="kernel-macros-3.12.43-52.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514775" comment="kernel-source-3.12.43-52.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514776" comment="kernel-syms-3.12.43-52.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514777" comment="kernel-xen-3.12.43-52.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514778" comment="kernel-xen-devel-3.12.43-52.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77289" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="905959" ref_url="https://bugzilla.suse.com/905959" source="BUGZILLA"/>
		<reference ref_id="916897" ref_url="https://bugzilla.suse.com/916897" source="BUGZILLA"/>
		<reference ref_id="916914" ref_url="https://bugzilla.suse.com/916914" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1545" ref_url="https://www.suse.com/security/cve/CVE-2015-1545/" source="CVE"/>
		<reference ref_id="CVE-2015-1546" ref_url="https://www.suse.com/security/cve/CVE-2015-1546/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001443.html" source="SUSE-SU"/>
		<description>
openldap2 was updated to fix two security issues and one non-security bug.

The following vulnerabilities were fixed:

* A remote attacker could cause a denial of service through a NULL pointer dereference and crash via an empty attribute list in a deref control in a search request. (bnc#916897 CVE-2015-1545)
* A remote attacker could cause a denial of service (crash) via a crafted search query with a matched values control. (bnc#916914 CVE-2015-1546) 

The following non-security issue was fixed:

* Prevent connection-0 (internal connection) from showing up in the monitor backend (bnc#905959)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-18"/>
	<updated date="2015-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/905959">SUSE bug 905959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916897">SUSE bug 916897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916914">SUSE bug 916914</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1545/">CVE-2015-1545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1546/">CVE-2015-1546</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514779" comment="libldap-2_4-2-2.4.39-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514780" comment="libldap-2_4-2-32bit-2.4.39-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514781" comment="openldap2-client-2.4.39-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77290" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="923229" ref_url="https://bugzilla.suse.com/923229" source="BUGZILLA"/>
		<reference ref_id="925019" ref_url="https://bugzilla.suse.com/925019" source="BUGZILLA"/>
		<reference ref_id="925021" ref_url="https://bugzilla.suse.com/925021" source="BUGZILLA"/>
		<reference ref_id="925022" ref_url="https://bugzilla.suse.com/925022" source="BUGZILLA"/>
		<reference ref_id="928520" ref_url="https://bugzilla.suse.com/928520" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8092" ref_url="https://www.suse.com/security/cve/CVE-2014-8092/" source="CVE"/>
		<reference ref_id="CVE-2015-3418" ref_url="https://www.suse.com/security/cve/CVE-2015-3418/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001456.html" source="SUSE-SU"/>
		<description>

The X Server was updated to fix 1 security issues and 4 bugs:

Security issues:
- CVE-2015-3418: Fixed a regression introduced by CVE-2014-8092 in
  PutImage that caused crashes when called with 0 height (bnc#928520).

Bugs fixed:
- Xephyr: Don't crash when no command line argument is specified
  The DDX specific command line parsing function only gets called if
  command line arguments are present. Therefore this function is not
  suitable to initialize mandatory global variables.  Replace main()
  instead. (bnc#925022)
- Xephyr: Print default server display number if none is specified (bnc#925022)
- Xephyr: Fix broken image when endianess of client machine and host-Xserver differ
  The image is created in the native byte order of the machine Xephyr is
  rendered on however drawn in the image byte order of the Xephyr server.
  Correct byte order in the xcb_image_t structure and convert to native
  before updating the window.
  If depths of Xephyr and host server differ this is already taken care of
  by the depth conversion routine. (bnc#923229).
- Xephyr: Fix compile when debugging is enabled (bnc#925021)
- Xephyr: Fix screen image draw for the non-Glamor &amp; non-XHSM case
  xcb_image_put() prints the entire image, therefore don't use an offset.
  (bnc#925019)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-12"/>
	<updated date="2015-06-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/923229">SUSE bug 923229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925019">SUSE bug 925019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925021">SUSE bug 925021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925022">SUSE bug 925022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928520">SUSE bug 928520</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2014-8092/">CVE-2014-8092</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3418/">CVE-2015-3418</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514782" comment="xorg-x11-server-7.6_1.15.2-28.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514783" comment="xorg-x11-server-extra-7.6_1.15.2-28.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77291" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="935701" ref_url="https://bugzilla.suse.com/935701" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3113" ref_url="https://www.suse.com/security/cve/CVE-2015-3113/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1136-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00020.html" source="SUSE-SU"/>
		<description>

Adobe Flash Player was updated to 11.2.202.468, fixing a security issue,
where attackers could trigger a heap overflow and could execute code.

https://helpx.adobe.com/security/products/flash-player/apsb15-14.html
		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-24"/>
	<updated date="2015-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/935701">SUSE bug 935701</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3113/">CVE-2015-3113</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514784" comment="flash-player-11.2.202.468-89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514785" comment="flash-player-gnome-11.2.202.468-89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77292" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="926597" ref_url="https://bugzilla.suse.com/926597" source="BUGZILLA"/>
		<reference ref_id="929678" ref_url="https://bugzilla.suse.com/929678" source="BUGZILLA"/>
		<reference ref_id="931698" ref_url="https://bugzilla.suse.com/931698" source="BUGZILLA"/>
		<reference ref_id="933898" ref_url="https://bugzilla.suse.com/933898" source="BUGZILLA"/>
		<reference ref_id="933911" ref_url="https://bugzilla.suse.com/933911" source="BUGZILLA"/>
		<reference ref_id="934487" ref_url="https://bugzilla.suse.com/934487" source="BUGZILLA"/>
		<reference ref_id="934489" ref_url="https://bugzilla.suse.com/934489" source="BUGZILLA"/>
		<reference ref_id="934491" ref_url="https://bugzilla.suse.com/934491" source="BUGZILLA"/>
		<reference ref_id="934493" ref_url="https://bugzilla.suse.com/934493" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791/" source="CVE"/>
		<reference ref_id="CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792/" source="CVE"/>
		<reference ref_id="CVE-2015-3216" ref_url="https://www.suse.com/security/cve/CVE-2015-3216/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html" source="SUSE-SU"/>
		<description>

This update of openssl fixes the following security issues:
- CVE-2015-4000 (bsc#931698)
  * The Logjam Attack / weakdh.org
  * reject connections with DH parameters shorter than 1024 bits
  * generates 2048-bit DH parameters by default
- CVE-2015-1788 (bsc#934487)
  * Malformed ECParameters causes infinite loop
- CVE-2015-1789 (bsc#934489)
  * Exploitable out-of-bounds read in X509_cmp_time
- CVE-2015-1790 (bsc#934491)
  * PKCS7 crash with missing EnvelopedContent
- CVE-2015-1792 (bsc#934493)
  * CMS verify infinite loop with unknown hash function
- CVE-2015-1791 (bsc#933911)
  * race condition in NewSessionTicket
- CVE-2015-3216 (bsc#933898)
  * Crash in ssleay_rand_bytes due to locking regression
- fix a timing side channel in RSA decryption (bnc#929678)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-17"/>
	<updated date="2015-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/926597">SUSE bug 926597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929678">SUSE bug 929678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931698">SUSE bug 931698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933898">SUSE bug 933898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933911">SUSE bug 933911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934487">SUSE bug 934487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934489">SUSE bug 934489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934491">SUSE bug 934491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934493">SUSE bug 934493</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3216/">CVE-2015-3216</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514786" comment="libopenssl1_0_0-1.0.1i-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514787" comment="libopenssl1_0_0-32bit-1.0.1i-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514788" comment="openssl-1.0.1i-25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77293" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl098 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="879179" ref_url="https://bugzilla.suse.com/879179" source="BUGZILLA"/>
		<reference ref_id="929678" ref_url="https://bugzilla.suse.com/929678" source="BUGZILLA"/>
		<reference ref_id="931698" ref_url="https://bugzilla.suse.com/931698" source="BUGZILLA"/>
		<reference ref_id="933898" ref_url="https://bugzilla.suse.com/933898" source="BUGZILLA"/>
		<reference ref_id="933911" ref_url="https://bugzilla.suse.com/933911" source="BUGZILLA"/>
		<reference ref_id="934487" ref_url="https://bugzilla.suse.com/934487" source="BUGZILLA"/>
		<reference ref_id="934489" ref_url="https://bugzilla.suse.com/934489" source="BUGZILLA"/>
		<reference ref_id="934491" ref_url="https://bugzilla.suse.com/934491" source="BUGZILLA"/>
		<reference ref_id="934493" ref_url="https://bugzilla.suse.com/934493" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791/" source="CVE"/>
		<reference ref_id="CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792/" source="CVE"/>
		<reference ref_id="CVE-2015-3216" ref_url="https://www.suse.com/security/cve/CVE-2015-3216/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html" source="SUSE-SU"/>
		<description>

This update fixes the following security issues:

- CVE-2015-4000 (boo#931698)
  * The Logjam Attack / weakdh.org
  * reject connections with DH parameters shorter than 1024 bits
  * generates 2048-bit DH parameters by default
- CVE-2015-1788 (boo#934487)
  * Malformed ECParameters causes infinite loop
- CVE-2015-1789 (boo#934489)
  * Exploitable out-of-bounds read in X509_cmp_time
- CVE-2015-1790 (boo#934491)
  * PKCS7 crash with missing EnvelopedContent
- CVE-2015-1792 (boo#934493)
  * CMS verify infinite loop with unknown hash function
- CVE-2015-1791 (boo#933911)
  * race condition in NewSessionTicket
- CVE-2015-3216 (boo#933898)
  * Crash in ssleay_rand_bytes due to locking regression
  * modified openssl-1.0.1i-fipslocking.patch
- fix timing side channel in RSA decryption (bnc#929678)
- add ECC ciphersuites to DEFAULT (bnc#879179)
- Disable EXPORT ciphers by default (bnc#931698, comment #3)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-17"/>
	<updated date="2015-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/879179">SUSE bug 879179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929678">SUSE bug 929678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931698">SUSE bug 931698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933898">SUSE bug 933898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933911">SUSE bug 933911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934487">SUSE bug 934487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934489">SUSE bug 934489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934491">SUSE bug 934491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934493">SUSE bug 934493</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3216/">CVE-2015-3216</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514789" comment="libopenssl0_9_8-0.9.8j-78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514790" comment="libopenssl0_9_8-32bit-0.9.8j-78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77294" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="901924" ref_url="https://bugzilla.suse.com/901924" source="BUGZILLA"/>
		<reference ref_id="911363" ref_url="https://bugzilla.suse.com/911363" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3707" ref_url="https://www.suse.com/security/cve/CVE-2014-3707/" source="CVE"/>
		<reference ref_id="CVE-2014-8150" ref_url="https://www.suse.com/security/cve/CVE-2014-8150/" source="CVE"/>
		<description>

   This update fixes the following security issues   
      - CVE-2014-8150: URL request injection vulnerability  (bnc#911363)
      - CVE-2014-3707: duphandle read out of bounds  (bnc#901924)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-12"/>
	<updated date="2015-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/901924">SUSE bug 901924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911363">SUSE bug 911363</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3707/">CVE-2014-3707</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8150/">CVE-2014-8150</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514791" comment="curl-7.37.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514792" comment="libcurl4-7.37.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514793" comment="libcurl4-32bit-7.37.0-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77295" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="896202" ref_url="https://bugzilla.suse.com/896202" source="BUGZILLA"/>
		<reference ref_id="896435" ref_url="https://bugzilla.suse.com/896435" source="BUGZILLA"/>
		<reference ref_id="898003" ref_url="https://bugzilla.suse.com/898003" source="BUGZILLA"/>
		<reference ref_id="899524" ref_url="https://bugzilla.suse.com/899524" source="BUGZILLA"/>
		<reference ref_id="900275" ref_url="https://bugzilla.suse.com/900275" source="BUGZILLA"/>
		<reference ref_id="900276" ref_url="https://bugzilla.suse.com/900276" source="BUGZILLA"/>
		<reference ref_id="905483" ref_url="https://bugzilla.suse.com/905483" source="BUGZILLA"/>
		<reference ref_id="920057" ref_url="https://bugzilla.suse.com/920057" source="BUGZILLA"/>
		<reference ref_id="928740" ref_url="https://bugzilla.suse.com/928740" source="BUGZILLA"/>
		<reference ref_id="929919" ref_url="https://bugzilla.suse.com/929919" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3591" ref_url="https://www.suse.com/security/cve/CVE-2014-3591/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001473.html" source="SUSE-SU"/>
		<description>

This update of libgcrypt fixes one security issue and brings various FIPS 140-2 related improvements.

libgcrypt now uses ciphertext blinding for Elgamal decryption (CVE-2014-3591)

FIPS 140-2 related changes:
* The library performs its self-tests when the module is complete (the -hmac file is also installed).

* Added a NIST 800-90a compliant DRBG.

* Change DSA key generation to be FIPS 186-4 compliant.

* Change RSA key generation to be FIPS 186-4 compliant.

* Enable HW support in fips mode (bnc#896435)

* Make DSA selftest use 2048 bit keys (bnc#898003)

* Added ECDSA selftests and add support for it to the CAVS testing
  framework (bnc#896202)

* Various CAVS testing improvements.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-11"/>
	<updated date="2015-06-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/896202">SUSE bug 896202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896435">SUSE bug 896435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898003">SUSE bug 898003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899524">SUSE bug 899524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900275">SUSE bug 900275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900276">SUSE bug 900276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905483">SUSE bug 905483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920057">SUSE bug 920057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928740">SUSE bug 928740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929919">SUSE bug 929919</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3591/">CVE-2014-3591</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514794" comment="libgcrypt20-1.6.1-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514795" comment="libgcrypt20-32bit-1.6.1-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77296" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="933591" ref_url="https://bugzilla.suse.com/933591" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4171" ref_url="https://www.suse.com/security/cve/CVE-2015-4171/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001483.html" source="SUSE-SU"/>
		<description>
Strongswan was updated to fix one security issue.

The following vulnerability was fixed:

* CVE-2015-4171: Rogue servers were able to authenticate themselves with certificate issued by any CA the client trusts, to gain user credentials from a client in certain IKEv2 setups (bsc#933591)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-08"/>
	<updated date="2015-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/933591">SUSE bug 933591</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4171/">CVE-2015-4171</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514796" comment="strongswan-5.1.3-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514797" comment="strongswan-doc-5.1.3-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514798" comment="strongswan-ipsec-5.1.3-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514799" comment="strongswan-libs0-5.1.3-18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77297" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="899712" ref_url="https://bugzilla.suse.com/899712" source="BUGZILLA"/>
		<reference ref_id="907453" ref_url="https://bugzilla.suse.com/907453" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9116" ref_url="https://www.suse.com/security/cve/CVE-2014-9116/" source="CVE"/>
		<description>
mutt was updated to fix one security issue.

This security issue was fixed:
- Heap-based buffer overflow in mutt_substrdup() (CVE-2014-9116).

This non-security issue was fixed:
- Handle text/html by default (bnc#899712)
  		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-05"/>
	<updated date="2014-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/899712">SUSE bug 899712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907453">SUSE bug 907453</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9116/">CVE-2014-9116</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514800" comment="mutt-1.5.21-49.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77298" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="918330" ref_url="https://bugzilla.suse.com/918330" source="BUGZILLA"/>
		<reference ref_id="936476" ref_url="https://bugzilla.suse.com/936476" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1349" ref_url="https://www.suse.com/security/cve/CVE-2015-1349/" source="CVE"/>
		<reference ref_id="CVE-2015-4620" ref_url="https://www.suse.com/security/cve/CVE-2015-4620/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001484.html" source="SUSE-SU"/>
		<description>
bind was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-1349: Named in ISC BIND 9.7.0 through 9.9.6 before 9.9.6-P2 and 9.10.x before 9.10.1-P2, when DNSSEC validation and the managed-keys feature are enabled, allowed remote attackers to cause a denial of service (assertion failure and daemon exit, or daemon crash) by triggering an incorrect trust-anchor management scenario in which no key is ready for use (bsc#918330).
- CVE-2015-4620: Fixed resolver crash when validating (bsc#936476).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-07"/>
	<updated date="2015-07-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/918330">SUSE bug 918330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936476">SUSE bug 936476</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1349/">CVE-2015-1349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4620/">CVE-2015-4620</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514801" comment="bind-libs-9.9.6P1-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514802" comment="bind-libs-32bit-9.9.6P1-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514803" comment="bind-utils-9.9.6P1-18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77299" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="937339" ref_url="https://bugzilla.suse.com/937339" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0578" ref_url="https://www.suse.com/security/cve/CVE-2014-0578/" source="CVE"/>
		<reference ref_id="CVE-2015-3114" ref_url="https://www.suse.com/security/cve/CVE-2015-3114/" source="CVE"/>
		<reference ref_id="CVE-2015-3115" ref_url="https://www.suse.com/security/cve/CVE-2015-3115/" source="CVE"/>
		<reference ref_id="CVE-2015-3116" ref_url="https://www.suse.com/security/cve/CVE-2015-3116/" source="CVE"/>
		<reference ref_id="CVE-2015-3117" ref_url="https://www.suse.com/security/cve/CVE-2015-3117/" source="CVE"/>
		<reference ref_id="CVE-2015-3118" ref_url="https://www.suse.com/security/cve/CVE-2015-3118/" source="CVE"/>
		<reference ref_id="CVE-2015-3119" ref_url="https://www.suse.com/security/cve/CVE-2015-3119/" source="CVE"/>
		<reference ref_id="CVE-2015-3120" ref_url="https://www.suse.com/security/cve/CVE-2015-3120/" source="CVE"/>
		<reference ref_id="CVE-2015-3121" ref_url="https://www.suse.com/security/cve/CVE-2015-3121/" source="CVE"/>
		<reference ref_id="CVE-2015-3122" ref_url="https://www.suse.com/security/cve/CVE-2015-3122/" source="CVE"/>
		<reference ref_id="CVE-2015-3123" ref_url="https://www.suse.com/security/cve/CVE-2015-3123/" source="CVE"/>
		<reference ref_id="CVE-2015-3124" ref_url="https://www.suse.com/security/cve/CVE-2015-3124/" source="CVE"/>
		<reference ref_id="CVE-2015-3125" ref_url="https://www.suse.com/security/cve/CVE-2015-3125/" source="CVE"/>
		<reference ref_id="CVE-2015-3126" ref_url="https://www.suse.com/security/cve/CVE-2015-3126/" source="CVE"/>
		<reference ref_id="CVE-2015-3127" ref_url="https://www.suse.com/security/cve/CVE-2015-3127/" source="CVE"/>
		<reference ref_id="CVE-2015-3128" ref_url="https://www.suse.com/security/cve/CVE-2015-3128/" source="CVE"/>
		<reference ref_id="CVE-2015-3129" ref_url="https://www.suse.com/security/cve/CVE-2015-3129/" source="CVE"/>
		<reference ref_id="CVE-2015-3130" ref_url="https://www.suse.com/security/cve/CVE-2015-3130/" source="CVE"/>
		<reference ref_id="CVE-2015-3131" ref_url="https://www.suse.com/security/cve/CVE-2015-3131/" source="CVE"/>
		<reference ref_id="CVE-2015-3132" ref_url="https://www.suse.com/security/cve/CVE-2015-3132/" source="CVE"/>
		<reference ref_id="CVE-2015-3133" ref_url="https://www.suse.com/security/cve/CVE-2015-3133/" source="CVE"/>
		<reference ref_id="CVE-2015-3134" ref_url="https://www.suse.com/security/cve/CVE-2015-3134/" source="CVE"/>
		<reference ref_id="CVE-2015-3135" ref_url="https://www.suse.com/security/cve/CVE-2015-3135/" source="CVE"/>
		<reference ref_id="CVE-2015-3136" ref_url="https://www.suse.com/security/cve/CVE-2015-3136/" source="CVE"/>
		<reference ref_id="CVE-2015-3137" ref_url="https://www.suse.com/security/cve/CVE-2015-3137/" source="CVE"/>
		<reference ref_id="CVE-2015-4428" ref_url="https://www.suse.com/security/cve/CVE-2015-4428/" source="CVE"/>
		<reference ref_id="CVE-2015-4429" ref_url="https://www.suse.com/security/cve/CVE-2015-4429/" source="CVE"/>
		<reference ref_id="CVE-2015-4430" ref_url="https://www.suse.com/security/cve/CVE-2015-4430/" source="CVE"/>
		<reference ref_id="CVE-2015-4431" ref_url="https://www.suse.com/security/cve/CVE-2015-4431/" source="CVE"/>
		<reference ref_id="CVE-2015-4432" ref_url="https://www.suse.com/security/cve/CVE-2015-4432/" source="CVE"/>
		<reference ref_id="CVE-2015-4433" ref_url="https://www.suse.com/security/cve/CVE-2015-4433/" source="CVE"/>
		<reference ref_id="CVE-2015-5116" ref_url="https://www.suse.com/security/cve/CVE-2015-5116/" source="CVE"/>
		<reference ref_id="CVE-2015-5117" ref_url="https://www.suse.com/security/cve/CVE-2015-5117/" source="CVE"/>
		<reference ref_id="CVE-2015-5118" ref_url="https://www.suse.com/security/cve/CVE-2015-5118/" source="CVE"/>
		<reference ref_id="CVE-2015-5119" ref_url="https://www.suse.com/security/cve/CVE-2015-5119/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<description>
flash-player was updated to fix 35 security issues.

These security issues were fixed:
- CVE-2015-3135, CVE-2015-4432, CVE-2015-5118: Heap buffer overflow vulnerabilities that could lead to code execution (bsc#937339).
- CVE-2015-3117, CVE-2015-3123, CVE-2015-3130, CVE-2015-3133, CVE-2015-3134, CVE-2015-4431: Memory corruption vulnerabilities that could lead to code execution (bsc#937339).
- CVE-2015-3126, CVE-2015-4429: Null pointer dereference issues (bsc#937339).
- CVE-2015-3114: A security bypass vulnerability that could lead to information disclosure (bsc#937339).
- CVE-2015-3119, CVE-2015-3120, CVE-2015-3121, CVE-2015-3122, CVE-2015-4433: Type confusion vulnerabilities that could lead to code execution (bsc#937339).
- CVE-2015-3118, CVE-2015-3124, CVE-2015-5117, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, CVE-2015-4430, CVE-2015-5119: Use-after-free vulnerabilities that could lead to code execution (bsc#937339).
- CVE-2014-0578, CVE-2015-3115, CVE-2015-3116, CVE-2015-3125, CVE-2015-5116: Vulnerabilities that could be exploited to bypass the same-origin-policy and lead to information disclosure (bsc#937339).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-08"/>
	<updated date="2015-07-08"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0578/">CVE-2014-0578</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3114/">CVE-2015-3114</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3115/">CVE-2015-3115</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3116/">CVE-2015-3116</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3117/">CVE-2015-3117</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3118/">CVE-2015-3118</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3119/">CVE-2015-3119</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3120/">CVE-2015-3120</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3121/">CVE-2015-3121</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3122/">CVE-2015-3122</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3123/">CVE-2015-3123</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3124/">CVE-2015-3124</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3125/">CVE-2015-3125</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3126/">CVE-2015-3126</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3127/">CVE-2015-3127</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3128/">CVE-2015-3128</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3129/">CVE-2015-3129</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3130/">CVE-2015-3130</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3131/">CVE-2015-3131</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3132/">CVE-2015-3132</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3133/">CVE-2015-3133</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3134/">CVE-2015-3134</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3135/">CVE-2015-3135</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3136/">CVE-2015-3136</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3137/">CVE-2015-3137</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4428/">CVE-2015-4428</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4429/">CVE-2015-4429</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4430/">CVE-2015-4430</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4431/">CVE-2015-4431</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4432/">CVE-2015-4432</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4433/">CVE-2015-4433</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5116/">CVE-2015-5116</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5117/">CVE-2015-5117</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5118/">CVE-2015-5118</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5119/">CVE-2015-5119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514804" comment="flash-player-11.2.202.481-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514805" comment="flash-player-gnome-11.2.202.481-93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77300" version="1" class="patch">
	<metadata>
		<title>Security update for augeas (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="925225" ref_url="https://bugzilla.suse.com/925225" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001494.html" source="SUSE-SU"/>
		<description>

This update fixes an untrusted argument escaping problem (CVE-2014-8119):

* new API - aug_escape_name() - which can be used to escape
  untrusted inputs before using them as part of path expressions
* aug_match() is changed to return properly escaped output
		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-24"/>
	<updated date="2015-06-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/925225">SUSE bug 925225</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514806" comment="libaugeas0-1.2.0-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77301" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="937752" ref_url="https://bugzilla.suse.com/937752" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5122" ref_url="https://www.suse.com/security/cve/CVE-2015-5122/" source="CVE"/>
		<reference ref_id="CVE-2015-5123" ref_url="https://www.suse.com/security/cve/CVE-2015-5123/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00028.html" source="SUSE-SU"/>
		<description>
flash-player was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-5123: Use-after-free vulnerability in the BitmapData class in the ActionScript 3 (AS3) implementation in Adobe Flash Player allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function (bsc#937752).
- CVE-2015-5122: Use-after-free vulnerability in the DisplayObject class in the ActionScript 3 (AS3) implementation in Adobe Flash Player allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that leverages improper handling of the opaqueBackground property (bsc#937752).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-16"/>
	<updated date="2015-07-16"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/937752">SUSE bug 937752</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5122/">CVE-2015-5122</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5123/">CVE-2015-5123</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514807" comment="flash-player-11.2.202.491-96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514808" comment="flash-player-gnome-11.2.202.491-96.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77302" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql93 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="931972" ref_url="https://bugzilla.suse.com/931972" source="BUGZILLA"/>
		<reference ref_id="931973" ref_url="https://bugzilla.suse.com/931973" source="BUGZILLA"/>
		<reference ref_id="931974" ref_url="https://bugzilla.suse.com/931974" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3165" ref_url="https://www.suse.com/security/cve/CVE-2015-3165/" source="CVE"/>
		<reference ref_id="CVE-2015-3166" ref_url="https://www.suse.com/security/cve/CVE-2015-3166/" source="CVE"/>
		<reference ref_id="CVE-2015-3167" ref_url="https://www.suse.com/security/cve/CVE-2015-3167/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001499.html" source="SUSE-SU"/>
		<description>

PostgreSQL was updated to the security and bugfix release 9.3.8 including 9.3.7.

Security issues fixed:

* CVE-2015-3165, bsc#931972: Avoid possible crash when client disconnects just before the authentication timeout expires.
* CVE-2015-3166, bsc#931973: Consistently check for failure of the printf() family of functions.
* CVE-2015-3167, bsc#931974: In contrib/pgcrypto, uniformly report decryption failures as 'Wrong key or corrupt data'

Bugs fixed:

* Protect against wraparound of multixact member IDs.
* Avoid failures while fsync'ing data directory during crash restart.
* Fix pg_get_functiondef() to show functions' LEAKPROOF property, if set.
* Allow libpq to use TLS protocol versions beyond v1.

- For the full release notes, see the following two URLs
  http://www.postgresql.org/docs/9.3/static/release-9-3-8.html
  http://www.postgresql.org/docs/9.3/static/release-9-3-7.html
		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-24"/>
	<updated date="2015-06-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/931972">SUSE bug 931972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931973">SUSE bug 931973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931974">SUSE bug 931974</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3165/">CVE-2015-3165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3166/">CVE-2015-3166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3167/">CVE-2015-3167</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514809" comment="libecpg6-9.3.8-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514810" comment="libpq5-9.3.8-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514811" comment="libpq5-32bit-9.3.8-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514812" comment="postgresql93-9.3.8-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77303" version="1" class="patch">
	<metadata>
		<title>Security update for libpng16 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="912076" ref_url="https://bugzilla.suse.com/912076" source="BUGZILLA"/>
		<reference ref_id="912929" ref_url="https://bugzilla.suse.com/912929" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9495" ref_url="https://www.suse.com/security/cve/CVE-2014-9495/" source="CVE"/>
		<reference ref_id="CVE-2015-0973" ref_url="https://www.suse.com/security/cve/CVE-2015-0973/" source="CVE"/>
		<description>

  This update fixes the following security issues:

  * CVE-2014-9495: libpng versions heap overflow vulnerability, that under certain circumstances could be exploit. [bnc#912076]

  * CVE-2015-0973: A heap-based overflow was found in the png_combine_row() function of the libpng library, when very large interlaced images were used.[bnc#912929]

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-14"/>
	<updated date="2015-01-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/912076">SUSE bug 912076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912929">SUSE bug 912929</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9495/">CVE-2014-9495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0973/">CVE-2015-0973</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514813" comment="libpng16-16-1.6.8-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514814" comment="libpng16-16-32bit-1.6.8-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77304" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="856315" ref_url="https://bugzilla.suse.com/856315" source="BUGZILLA"/>
		<reference ref_id="935033" ref_url="https://bugzilla.suse.com/935033" source="BUGZILLA"/>
		<reference ref_id="935979" ref_url="https://bugzilla.suse.com/935979" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722/" source="CVE"/>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725/" source="CVE"/>
		<reference ref_id="CVE-2015-2726" ref_url="https://www.suse.com/security/cve/CVE-2015-2726/" source="CVE"/>
		<reference ref_id="CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728/" source="CVE"/>
		<reference ref_id="CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730/" source="CVE"/>
		<reference ref_id="CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735/" source="CVE"/>
		<reference ref_id="CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736/" source="CVE"/>
		<reference ref_id="CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739/" source="CVE"/>
		<reference ref_id="CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740/" source="CVE"/>
		<reference ref_id="CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<description>
MozillaFirefox, mozilla-nspr and  mozilla-nss were updated to fix 17 security issues.

For more details please check the changelogs.
- CVE-2015-2724/CVE-2015-2725/CVE-2015-2726: Miscellaneous memory safety hazards (bsc#935979).
- CVE-2015-2728: Type confusion in Indexed Database Manager (bsc#935979).
- CVE-2015-2730: ECDSA signature validation fails to handle some signatures correctly (bsc#935979).
- CVE-2015-2722/CVE-2015-2733: Use-after-free in workers while using XMLHttpRequest (bsc#935979).
- CVE-2015-2734/CVE-2015-2735/CVE-2015-2736/CVE-2015-2737/CVE-2015-2738/CVE-2015-2739/CVE-2015-2740: Vulnerabilities found through code inspection (bsc#935979).
- CVE-2015-2743: Privilege escalation in PDF.js (bsc#935979).
- CVE-2015-4000: NSS accepts export-length DHE keys with regular DHE cipher suites (bsc#935033).
- CVE-2015-2721: NSS incorrectly permits skipping of ServerKeyExchange (bsc#935979).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-14"/>
	<updated date="2015-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/856315">SUSE bug 856315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935033">SUSE bug 935033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2726/">CVE-2015-2726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514815" comment="MozillaFirefox-31.8.0esr-37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514816" comment="MozillaFirefox-translations-31.8.0esr-37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514817" comment="libfreebl3-3.19.2_CKBI_1.98-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514818" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514819" comment="libsoftokn3-3.19.2_CKBI_1.98-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514820" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514821" comment="mozilla-nspr-4.10.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514822" comment="mozilla-nspr-32bit-4.10.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514823" comment="mozilla-nss-3.19.2_CKBI_1.98-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514824" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514825" comment="mozilla-nss-certs-3.19.2_CKBI_1.98-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514826" comment="mozilla-nss-certs-32bit-3.19.2_CKBI_1.98-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514827" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77305" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="906574" ref_url="https://bugzilla.suse.com/906574" source="BUGZILLA"/>
		<reference ref_id="919053" ref_url="https://bugzilla.suse.com/919053" source="BUGZILLA"/>
		<reference ref_id="919062" ref_url="https://bugzilla.suse.com/919062" source="BUGZILLA"/>
		<reference ref_id="920865" ref_url="https://bugzilla.suse.com/920865" source="BUGZILLA"/>
		<reference ref_id="920896" ref_url="https://bugzilla.suse.com/920896" source="BUGZILLA"/>
		<reference ref_id="921333" ref_url="https://bugzilla.suse.com/921333" source="BUGZILLA"/>
		<reference ref_id="924663" ref_url="https://bugzilla.suse.com/924663" source="BUGZILLA"/>
		<reference ref_id="924960" ref_url="https://bugzilla.suse.com/924960" source="BUGZILLA"/>
		<reference ref_id="924961" ref_url="https://bugzilla.suse.com/924961" source="BUGZILLA"/>
		<reference ref_id="934789" ref_url="https://bugzilla.suse.com/934789" source="BUGZILLA"/>
		<reference ref_id="936407" ref_url="https://bugzilla.suse.com/936407" source="BUGZILLA"/>
		<reference ref_id="936408" ref_url="https://bugzilla.suse.com/936408" source="BUGZILLA"/>
		<reference ref_id="936409" ref_url="https://bugzilla.suse.com/936409" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964/" source="CVE"/>
		<reference ref_id="CVE-2015-0433" ref_url="https://www.suse.com/security/cve/CVE-2015-0433/" source="CVE"/>
		<reference ref_id="CVE-2015-0441" ref_url="https://www.suse.com/security/cve/CVE-2015-0441/" source="CVE"/>
		<reference ref_id="CVE-2015-0499" ref_url="https://www.suse.com/security/cve/CVE-2015-0499/" source="CVE"/>
		<reference ref_id="CVE-2015-0501" ref_url="https://www.suse.com/security/cve/CVE-2015-0501/" source="CVE"/>
		<reference ref_id="CVE-2015-0505" ref_url="https://www.suse.com/security/cve/CVE-2015-0505/" source="CVE"/>
		<reference ref_id="CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325/" source="CVE"/>
		<reference ref_id="CVE-2015-2326" ref_url="https://www.suse.com/security/cve/CVE-2015-2326/" source="CVE"/>
		<reference ref_id="CVE-2015-2568" ref_url="https://www.suse.com/security/cve/CVE-2015-2568/" source="CVE"/>
		<reference ref_id="CVE-2015-2571" ref_url="https://www.suse.com/security/cve/CVE-2015-2571/" source="CVE"/>
		<reference ref_id="CVE-2015-2573" ref_url="https://www.suse.com/security/cve/CVE-2015-2573/" source="CVE"/>
		<reference ref_id="CVE-2015-3152" ref_url="https://www.suse.com/security/cve/CVE-2015-3152/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<description>

      This update fixes the following security issues:
    * Logjam attack: mysql uses 512 bit dh groups in SSL [bnc#934789]
    * CVE-2015-3152: mysql --ssl does not enforce SSL [bnc#924663]
    * CVE-2014-8964: heap buffer overflow [bnc#906574]
    * CVE-2015-2325: heap buffer overflow in compile_branch() [bnc#924960]
    * CVE-2015-2326: heap buffer overflow in pcre_compile2() [bnc#924961]
    * CVE-2015-0501: unspecified vulnerability related to Server:Compiling (CPU April 2015) 
    * CVE-2015-2571: unspecified vulnerability related to Server:Optimizer (CPU April 2015)
    * CVE-2015-0505: unspecified vulnerability related to Server:DDL (CPU April 2015) 
    * CVE-2015-0499: unspecified vulnerability related to Server:Federated (CPU April 2015) 
    * CVE-2015-2568: unspecified vulnerability related to Server:Security:Privileges (CPU April 2015) 
    * CVE-2015-2573: unspecified vulnerability related to Server:DDL (CPU April 2015)
    * CVE-2015-0433: unspecified vulnerability related to Server:InnoDB:DML (CPU April 2015) 
    * CVE-2015-0441: unspecified vulnerability related to Server:Security:Encryption (CPU April 2015) 
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-21"/>
	<updated date="2015-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/906574">SUSE bug 906574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919053">SUSE bug 919053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919062">SUSE bug 919062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920865">SUSE bug 920865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920896">SUSE bug 920896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921333">SUSE bug 921333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924663">SUSE bug 924663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924960">SUSE bug 924960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924961">SUSE bug 924961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934789">SUSE bug 934789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936407">SUSE bug 936407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936409">SUSE bug 936409</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0433/">CVE-2015-0433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0441/">CVE-2015-0441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0499/">CVE-2015-0499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0501/">CVE-2015-0501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0505/">CVE-2015-0505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2326/">CVE-2015-2326</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2568/">CVE-2015-2568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2571/">CVE-2015-2571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2573/">CVE-2015-2573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3152/">CVE-2015-3152</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514828" comment="libmysqlclient18-10.0.20-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514829" comment="libmysqlclient18-32bit-10.0.20-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514830" comment="libmysqlclient_r18-10.0.20-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514831" comment="libmysqlclient_r18-32bit-10.0.20-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514832" comment="mariadb-10.0.20-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514833" comment="mariadb-client-10.0.20-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514834" comment="mariadb-errormessages-10.0.20-18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77306" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="902851" ref_url="https://bugzilla.suse.com/902851" source="BUGZILLA"/>
		<reference ref_id="905326" ref_url="https://bugzilla.suse.com/905326" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8080" ref_url="https://www.suse.com/security/cve/CVE-2014-8080/" source="CVE"/>
		<reference ref_id="CVE-2014-8090" ref_url="https://www.suse.com/security/cve/CVE-2014-8090/" source="CVE"/>
		<description>
This ruby update fixes the following two security issues:

- bnc#902851: fix CVE-2014-8080: Denial Of Service XML Expansion
- bnc#905326: fix CVE-2014-8090: Another Denial Of Service XML Expansion
- Enable tests to run during the build. This way we can compare
  the results on different builds.
		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-19"/>
	<updated date="2014-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/902851">SUSE bug 902851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905326">SUSE bug 905326</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8080/">CVE-2014-8080</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8090/">CVE-2014-8090</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514835" comment="libruby2_1-2_1-2.1.2-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514836" comment="ruby2.1-2.1.2-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514837" comment="ruby2.1-stdlib-2.1.2-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77307" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="925466" ref_url="https://bugzilla.suse.com/925466" source="BUGZILLA"/>
		<reference ref_id="935256" ref_url="https://bugzilla.suse.com/935256" source="BUGZILLA"/>
		<reference ref_id="935634" ref_url="https://bugzilla.suse.com/935634" source="BUGZILLA"/>
		<reference ref_id="938344" ref_url="https://bugzilla.suse.com/938344" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3259" ref_url="https://www.suse.com/security/cve/CVE-2015-3259/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00042.html" source="SUSE-SU"/>
		<description>
xen was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-3259: xl command line config handling stack overflow (bsc#935634, XSA-137).
- CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344).
  
These non-security issues were fixed:
- Restart of xencommons service did lead to loss of xenstore data (bsc#935256).
- Kdump did not work in a XEN environment (bsc#925466).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-17"/>
	<updated date="2015-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/925466">SUSE bug 925466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935256">SUSE bug 935256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935634">SUSE bug 935634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3259/">CVE-2015-3259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514838" comment="xen-4.4.2_08-22.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514839" comment="xen-kmp-default-4.4.2_08_k3.12.43_52.6-22.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514840" comment="xen-libs-4.4.2_08-22.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514841" comment="xen-libs-32bit-4.4.2_08-22.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77308" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="939567" ref_url="https://bugzilla.suse.com/939567" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5477" ref_url="https://www.suse.com/security/cve/CVE-2015-5477/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00044.html" source="SUSE-SU"/>
		<description>
bind was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-5477: Remote DoS via TKEY queries (bsc#939567)

Exposure to this issue can not be prevented by either ACLs or configuration options limiting or denying service because the exploitable code occurs early in the packet handling. 
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-28"/>
	<updated date="2015-07-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/939567">SUSE bug 939567</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5477/">CVE-2015-5477</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514842" comment="bind-libs-9.9.6P1-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514843" comment="bind-libs-32bit-9.9.6P1-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514844" comment="bind-utils-9.9.6P1-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77309" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="938248" ref_url="https://bugzilla.suse.com/938248" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2596" ref_url="https://www.suse.com/security/cve/CVE-2015-2596/" source="CVE"/>
		<reference ref_id="CVE-2015-2597" ref_url="https://www.suse.com/security/cve/CVE-2015-2597/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2619" ref_url="https://www.suse.com/security/cve/CVE-2015-2619/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2627" ref_url="https://www.suse.com/security/cve/CVE-2015-2627/" source="CVE"/>
		<reference ref_id="CVE-2015-2628" ref_url="https://www.suse.com/security/cve/CVE-2015-2628/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4729" ref_url="https://www.suse.com/security/cve/CVE-2015-4729/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4736" ref_url="https://www.suse.com/security/cve/CVE-2015-4736/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<description>
OpenJDK was updated to 2.6.1 - OpenJDK 7u85 to fix security issues and bugs.

The following vulnerabilities were fixed:

* CVE-2015-2590: Easily exploitable vulnerability in the Libraries component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2596: Difficult to exploit vulnerability in the Hotspot component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data.
* CVE-2015-2597: Easily exploitable vulnerability in the Install component requiring logon to Operating System. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2601: Easily exploitable vulnerability in the JCE component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2613: Easily exploitable vulnerability in the JCE component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data.
* CVE-2015-2619: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2621: Easily exploitable vulnerability in the JMX component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2625: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2627: Very difficult to exploit vulnerability in the Install component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2628: Easily exploitable vulnerability in the CORBA component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2632: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2637: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2638: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2664: Difficult to exploit vulnerability in the Deployment component requiring logon to Operating System. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2808: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data as well as read access to a subset of Java accessible data.
* CVE-2015-4000: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data as well as read access to a subset of Java Embedded accessible data. 
* CVE-2015-4729: Very difficult to exploit vulnerability in the Deployment component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java SE accessible data as well as read access to a subset of Java SE accessible data.
* CVE-2015-4731: Easily exploitable vulnerability in the JMX component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4732: Easily exploitable vulnerability in the Libraries component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4733: Easily exploitable vulnerability in the RMI component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4736: Difficult to exploit vulnerability in the Deployment component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4748: Very difficult to exploit vulnerability in the Security component allowed successful unauthenticated network attacks via OCSP. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4749: Difficult to exploit vulnerability in the JNDI component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized ability to cause a partial denial of service (partial DOS).
* CVE-2015-4760: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-23"/>
	<updated date="2015-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2596/">CVE-2015-2596</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2597/">CVE-2015-2597</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2619/">CVE-2015-2619</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2627/">CVE-2015-2627</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2628/">CVE-2015-2628</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4729/">CVE-2015-4729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4736/">CVE-2015-4736</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514845" comment="java-1_7_0-openjdk-1.7.0.85-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514846" comment="java-1_7_0-openjdk-headless-1.7.0.85-18.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77310" version="1" class="patch">
	<metadata>
		<title>Security update for the SUSE Linux Enterprise 12 kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="854817" ref_url="https://bugzilla.suse.com/854817" source="BUGZILLA"/>
		<reference ref_id="854824" ref_url="https://bugzilla.suse.com/854824" source="BUGZILLA"/>
		<reference ref_id="858727" ref_url="https://bugzilla.suse.com/858727" source="BUGZILLA"/>
		<reference ref_id="866911" ref_url="https://bugzilla.suse.com/866911" source="BUGZILLA"/>
		<reference ref_id="867362" ref_url="https://bugzilla.suse.com/867362" source="BUGZILLA"/>
		<reference ref_id="895814" ref_url="https://bugzilla.suse.com/895814" source="BUGZILLA"/>
		<reference ref_id="903279" ref_url="https://bugzilla.suse.com/903279" source="BUGZILLA"/>
		<reference ref_id="907092" ref_url="https://bugzilla.suse.com/907092" source="BUGZILLA"/>
		<reference ref_id="908491" ref_url="https://bugzilla.suse.com/908491" source="BUGZILLA"/>
		<reference ref_id="915183" ref_url="https://bugzilla.suse.com/915183" source="BUGZILLA"/>
		<reference ref_id="917630" ref_url="https://bugzilla.suse.com/917630" source="BUGZILLA"/>
		<reference ref_id="918618" ref_url="https://bugzilla.suse.com/918618" source="BUGZILLA"/>
		<reference ref_id="921430" ref_url="https://bugzilla.suse.com/921430" source="BUGZILLA"/>
		<reference ref_id="924071" ref_url="https://bugzilla.suse.com/924071" source="BUGZILLA"/>
		<reference ref_id="924526" ref_url="https://bugzilla.suse.com/924526" source="BUGZILLA"/>
		<reference ref_id="926369" ref_url="https://bugzilla.suse.com/926369" source="BUGZILLA"/>
		<reference ref_id="926953" ref_url="https://bugzilla.suse.com/926953" source="BUGZILLA"/>
		<reference ref_id="927455" ref_url="https://bugzilla.suse.com/927455" source="BUGZILLA"/>
		<reference ref_id="927697" ref_url="https://bugzilla.suse.com/927697" source="BUGZILLA"/>
		<reference ref_id="927786" ref_url="https://bugzilla.suse.com/927786" source="BUGZILLA"/>
		<reference ref_id="928131" ref_url="https://bugzilla.suse.com/928131" source="BUGZILLA"/>
		<reference ref_id="929475" ref_url="https://bugzilla.suse.com/929475" source="BUGZILLA"/>
		<reference ref_id="929696" ref_url="https://bugzilla.suse.com/929696" source="BUGZILLA"/>
		<reference ref_id="929879" ref_url="https://bugzilla.suse.com/929879" source="BUGZILLA"/>
		<reference ref_id="929974" ref_url="https://bugzilla.suse.com/929974" source="BUGZILLA"/>
		<reference ref_id="930092" ref_url="https://bugzilla.suse.com/930092" source="BUGZILLA"/>
		<reference ref_id="930399" ref_url="https://bugzilla.suse.com/930399" source="BUGZILLA"/>
		<reference ref_id="930579" ref_url="https://bugzilla.suse.com/930579" source="BUGZILLA"/>
		<reference ref_id="930599" ref_url="https://bugzilla.suse.com/930599" source="BUGZILLA"/>
		<reference ref_id="930972" ref_url="https://bugzilla.suse.com/930972" source="BUGZILLA"/>
		<reference ref_id="931124" ref_url="https://bugzilla.suse.com/931124" source="BUGZILLA"/>
		<reference ref_id="931403" ref_url="https://bugzilla.suse.com/931403" source="BUGZILLA"/>
		<reference ref_id="931538" ref_url="https://bugzilla.suse.com/931538" source="BUGZILLA"/>
		<reference ref_id="931620" ref_url="https://bugzilla.suse.com/931620" source="BUGZILLA"/>
		<reference ref_id="931860" ref_url="https://bugzilla.suse.com/931860" source="BUGZILLA"/>
		<reference ref_id="931988" ref_url="https://bugzilla.suse.com/931988" source="BUGZILLA"/>
		<reference ref_id="932348" ref_url="https://bugzilla.suse.com/932348" source="BUGZILLA"/>
		<reference ref_id="932793" ref_url="https://bugzilla.suse.com/932793" source="BUGZILLA"/>
		<reference ref_id="932897" ref_url="https://bugzilla.suse.com/932897" source="BUGZILLA"/>
		<reference ref_id="932898" ref_url="https://bugzilla.suse.com/932898" source="BUGZILLA"/>
		<reference ref_id="932899" ref_url="https://bugzilla.suse.com/932899" source="BUGZILLA"/>
		<reference ref_id="932900" ref_url="https://bugzilla.suse.com/932900" source="BUGZILLA"/>
		<reference ref_id="932967" ref_url="https://bugzilla.suse.com/932967" source="BUGZILLA"/>
		<reference ref_id="933117" ref_url="https://bugzilla.suse.com/933117" source="BUGZILLA"/>
		<reference ref_id="933429" ref_url="https://bugzilla.suse.com/933429" source="BUGZILLA"/>
		<reference ref_id="933637" ref_url="https://bugzilla.suse.com/933637" source="BUGZILLA"/>
		<reference ref_id="933896" ref_url="https://bugzilla.suse.com/933896" source="BUGZILLA"/>
		<reference ref_id="933904" ref_url="https://bugzilla.suse.com/933904" source="BUGZILLA"/>
		<reference ref_id="933907" ref_url="https://bugzilla.suse.com/933907" source="BUGZILLA"/>
		<reference ref_id="934160" ref_url="https://bugzilla.suse.com/934160" source="BUGZILLA"/>
		<reference ref_id="935083" ref_url="https://bugzilla.suse.com/935083" source="BUGZILLA"/>
		<reference ref_id="935085" ref_url="https://bugzilla.suse.com/935085" source="BUGZILLA"/>
		<reference ref_id="935088" ref_url="https://bugzilla.suse.com/935088" source="BUGZILLA"/>
		<reference ref_id="935174" ref_url="https://bugzilla.suse.com/935174" source="BUGZILLA"/>
		<reference ref_id="935542" ref_url="https://bugzilla.suse.com/935542" source="BUGZILLA"/>
		<reference ref_id="935881" ref_url="https://bugzilla.suse.com/935881" source="BUGZILLA"/>
		<reference ref_id="935918" ref_url="https://bugzilla.suse.com/935918" source="BUGZILLA"/>
		<reference ref_id="936012" ref_url="https://bugzilla.suse.com/936012" source="BUGZILLA"/>
		<reference ref_id="936423" ref_url="https://bugzilla.suse.com/936423" source="BUGZILLA"/>
		<reference ref_id="936445" ref_url="https://bugzilla.suse.com/936445" source="BUGZILLA"/>
		<reference ref_id="936446" ref_url="https://bugzilla.suse.com/936446" source="BUGZILLA"/>
		<reference ref_id="936502" ref_url="https://bugzilla.suse.com/936502" source="BUGZILLA"/>
		<reference ref_id="936556" ref_url="https://bugzilla.suse.com/936556" source="BUGZILLA"/>
		<reference ref_id="936831" ref_url="https://bugzilla.suse.com/936831" source="BUGZILLA"/>
		<reference ref_id="936875" ref_url="https://bugzilla.suse.com/936875" source="BUGZILLA"/>
		<reference ref_id="937032" ref_url="https://bugzilla.suse.com/937032" source="BUGZILLA"/>
		<reference ref_id="937087" ref_url="https://bugzilla.suse.com/937087" source="BUGZILLA"/>
		<reference ref_id="937609" ref_url="https://bugzilla.suse.com/937609" source="BUGZILLA"/>
		<reference ref_id="937612" ref_url="https://bugzilla.suse.com/937612" source="BUGZILLA"/>
		<reference ref_id="937613" ref_url="https://bugzilla.suse.com/937613" source="BUGZILLA"/>
		<reference ref_id="937616" ref_url="https://bugzilla.suse.com/937616" source="BUGZILLA"/>
		<reference ref_id="938022" ref_url="https://bugzilla.suse.com/938022" source="BUGZILLA"/>
		<reference ref_id="938023" ref_url="https://bugzilla.suse.com/938023" source="BUGZILLA"/>
		<reference ref_id="938024" ref_url="https://bugzilla.suse.com/938024" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9728" ref_url="https://www.suse.com/security/cve/CVE-2014-9728/" source="CVE"/>
		<reference ref_id="CVE-2014-9729" ref_url="https://www.suse.com/security/cve/CVE-2014-9729/" source="CVE"/>
		<reference ref_id="CVE-2014-9730" ref_url="https://www.suse.com/security/cve/CVE-2014-9730/" source="CVE"/>
		<reference ref_id="CVE-2014-9731" ref_url="https://www.suse.com/security/cve/CVE-2014-9731/" source="CVE"/>
		<reference ref_id="CVE-2015-1805" ref_url="https://www.suse.com/security/cve/CVE-2015-1805/" source="CVE"/>
		<reference ref_id="CVE-2015-3212" ref_url="https://www.suse.com/security/cve/CVE-2015-3212/" source="CVE"/>
		<reference ref_id="CVE-2015-4036" ref_url="https://www.suse.com/security/cve/CVE-2015-4036/" source="CVE"/>
		<reference ref_id="CVE-2015-4167" ref_url="https://www.suse.com/security/cve/CVE-2015-4167/" source="CVE"/>
		<reference ref_id="CVE-2015-4692" ref_url="https://www.suse.com/security/cve/CVE-2015-4692/" source="CVE"/>
		<reference ref_id="CVE-2015-5364" ref_url="https://www.suse.com/security/cve/CVE-2015-5364/" source="CVE"/>
		<reference ref_id="CVE-2015-5366" ref_url="https://www.suse.com/security/cve/CVE-2015-5366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 kernel was updated to 3.12.44 to receive various security and bugfixes.

These features were added:
- mpt2sas: Added Reply Descriptor Post Queue (RDPQ) Array support (bsc#854824).
- mpt3sas: Bump mpt3sas driver version to 04.100.00.00 (bsc#854817).

Following security bugs were fixed:
- CVE-2015-1805: iov overrun for failed atomic copy could have lead to
  DoS or privilege escalation (bsc#933429).
- CVE-2015-3212: A race condition in the way the Linux kernel handled
  lists of associations in SCTP sockets could have lead to list
  corruption and kernel panics (bsc#936502).
- CVE-2015-4036: DoS via memory corruption in vhost/scsi driver
  (bsc#931988).
- CVE-2015-4167: Linux kernel built with the UDF file
  system(CONFIG_UDF_FS) support was vulnerable to a crash. It occurred
  while fetching inode information from a corrupted/malicious udf file
  system image (bsc#933907).
- CVE-2015-4692: DoS via NULL pointer dereference in kvm_apic_has_events
  function (bsc#935542).
- CVE-2015-5364: Remote DoS via flood of UDP packets with invalid
  checksums (bsc#936831).
- CVE-2015-5366: Remote DoS of EPOLLET epoll applications via flood of
  UDP packets with invalid checksums (bsc#936831).

Security issues already fixed in the previous update but not referenced by CVE:
- CVE-2014-9728: Kernel built with the UDF file system(CONFIG_UDF_FS)
  support were vulnerable to a crash (bsc#933904).
- CVE-2014-9729: Kernel built with the UDF file system(CONFIG_UDF_FS)
  support were vulnerable to a crash (bsc#933904).
- CVE-2014-9730: Kernel built with the UDF file system(CONFIG_UDF_FS)
  support were vulnerable to a crash (bsc#933904).
- CVE-2014-9731: Kernel built with the UDF file system(CONFIG_UDF_FS)
  support were vulnerable to information leakage (bsc#933896).

The following non-security bugs were fixed:
- ALSA: hda - add codec ID for Skylake display audio codec (bsc#936556).
- ALSA: hda/hdmi - apply Haswell fix-ups to Skylake display codec
  (bsc#936556).
- ALSA: hda_controller: Separate stream_tag for input and output streams
  (bsc#936556).
- ALSA: hda_intel: add AZX_DCAPS_I915_POWERWELL for SKL and BSW
  (bsc#936556).
- ALSA: hda_intel: apply the Seperate stream_tag for Skylake
  (bsc#936556).
- ALSA: hda_intel: apply the Seperate stream_tag for Sunrise Point
  (bsc#936556).
- Btrfs: Handle unaligned length in extent_same (bsc#937609).
- Btrfs: add missing inode item update in fallocate() (bsc#938023).
- Btrfs: check pending chunks when shrinking fs to avoid corruption
  (bsc#936445).
- Btrfs: do not update mtime/ctime on deduped inodes (bsc#937616).
- Btrfs: fix block group -&gt;space_info null pointer dereference
  (bsc#935088).
- Btrfs: fix clone / extent-same deadlocks (bsc#937612).
- Btrfs: fix deadlock with extent-same and readpage (bsc#937612).
- Btrfs: fix fsync data loss after append write (bsc#936446).
- Btrfs: fix hang during inode eviction due to concurrent readahead
  (bsc#935085).
- Btrfs: fix memory leak in the extent_same ioctl (bsc#937613).
- Btrfs: fix race when reusing stale extent buffers that leads to BUG_ON
  (bsc#926369).
- Btrfs: fix use after free when close_ctree frees the orphan_rsv
  (bsc#938022).
- Btrfs: pass unaligned length to btrfs_cmp_data() (bsc#937609).
- Btrfs: provide super_operations-&gt;inode_get_dev (bsc#927455).
- Drivers: hv: balloon: check if ha_region_mutex was acquired in
  MEM_CANCEL_ONLINE case.
- Drivers: hv: fcopy: process deferred messages when we complete the
  transaction.
- Drivers: hv: fcopy: rename fcopy_work -&gt; fcopy_timeout_work.
- Drivers: hv: fcopy: set .owner reference for file operations.
- Drivers: hv: fcopy: switch to using the hvutil_device_state state
  machine.
- Drivers: hv: hv_balloon: correctly handle num_pages&gt;INT_MAX case.
- Drivers: hv: hv_balloon: correctly handle val.freeram lower than num_pages case.
- Drivers: hv: hv_balloon: do not lose memory when onlining order is not
  natural.
- Drivers: hv: hv_balloon: do not online pages in offline blocks.
- Drivers: hv: hv_balloon: eliminate jumps in piecewiese linear floor
  function.
- Drivers: hv: hv_balloon: eliminate the trylock path in
  acquire/release_region_mutex.
- Drivers: hv: hv_balloon: keep locks balanced on add_memory() failure.
- Drivers: hv: hv_balloon: refuse to balloon below the floor.
- Drivers: hv: hv_balloon: report offline pages as being used.
- Drivers: hv: hv_balloon: survive ballooning request with num_pages=0.
- Drivers: hv: kvp: move poll_channel() to hyperv_vmbus.h.
- Drivers: hv: kvp: rename kvp_work -&gt; kvp_timeout_work.
- Drivers: hv: kvp: reset kvp_context.
- Drivers: hv: kvp: switch to using the hvutil_device_state state
  machine.
- Drivers: hv: util: Fix a bug in the KVP code. reapply upstream change
  ontop of v3.12-stable change
- Drivers: hv: util: On device remove, close the channel after
  de-initializing the service.
- Drivers: hv: util: introduce hv_utils_transport abstraction.
- Drivers: hv: util: introduce state machine for util drivers.
- Drivers: hv: util: move kvp/vss function declarations to
  hyperv_vmbus.h.
- Drivers: hv: vmbus: Add device and vendor ID to vmbus devices.
- Drivers: hv: vmbus: Add support for VMBus panic notifier handler
  (bsc#934160).
- Drivers: hv: vmbus: Add support for the NetworkDirect GUID.
- Drivers: hv: vmbus: Correcting truncation error for constant
  HV_CRASH_CTL_CRASH_NOTIFY (bsc#934160).
- Drivers: hv: vmbus: Export the vmbus_sendpacket_pagebuffer_ctl().
- Drivers: hv: vmbus: Fix a bug in rescind processing in
  vmbus_close_internal().
- Drivers: hv: vmbus: Fix a siganlling host signalling issue.
- Drivers: hv: vmbus: Get rid of some unnecessary messages.
- Drivers: hv: vmbus: Get rid of some unused definitions.
- Drivers: hv: vmbus: Handle both rescind and offer messages in the same
  context.
- Drivers: hv: vmbus: Implement the protocol for tearing down vmbus
  state.
- Drivers: hv: vmbus: Introduce a function to remove a rescinded offer.
- Drivers: hv: vmbus: Perform device register in the per-channel work
  element.
- Drivers: hv: vmbus: Permit sending of packets without payload.
- Drivers: hv: vmbus: Properly handle child device remove.
- Drivers: hv: vmbus: Remove the channel from the channel list(s) on
  failure.
- Drivers: hv: vmbus: Suport an API to send packet with additional
  control.
- Drivers: hv: vmbus: Suport an API to send pagebuffers with additional
  control.
- Drivers: hv: vmbus: Teardown clockevent devices on module unload.
- Drivers: hv: vmbus: Teardown synthetic interrupt controllers on module
  unload.
- Drivers: hv: vmbus: Use a round-robin algorithm for picking the
  outgoing channel.
- Drivers: hv: vmbus: Use the vp_index map even for channels bound to CPU
  0.
- Drivers: hv: vmbus: avoid double kfree for device_obj.
- Drivers: hv: vmbus: briefly comment num_sc and next_oc.
- Drivers: hv: vmbus: decrease num_sc on subchannel removal.
- Drivers: hv: vmbus: distribute subchannels among all vcpus.
- Drivers: hv: vmbus: do cleanup on all vmbus_open() failure paths.
- Drivers: hv: vmbus: introduce vmbus_acpi_remove.
- Drivers: hv: vmbus: kill tasklets on module unload.
- Drivers: hv: vmbus: move init_vp_index() call to vmbus_process_offer().
- Drivers: hv: vmbus: prevent cpu offlining on newer hypervisors.
- Drivers: hv: vmbus: rename channel work queues.
- Drivers: hv: vmbus: teardown hv_vmbus_con workqueue and
  vmbus_connection pages on shutdown.
- Drivers: hv: vmbus: unify calls to percpu_channel_enq().
- Drivers: hv: vmbus: unregister panic notifier on module unload.
- Drivers: hv: vmbus:Update preferred vmbus protocol version to windows
  10.
- Drivers: hv: vss: process deferred messages when we complete the
  transaction.
- Drivers: hv: vss: switch to using the hvutil_device_state state
  machine.
- Enable CONFIG_BRIDGE_NF_EBTABLES on s390x (bsc#936012)
- Fix connection reuse when sk_error_report is used (bsc#930972).
- GHES: Carve out error queueing in a separate function (bsc#917630).
- GHES: Carve out the panic functionality (bsc#917630).
- GHES: Elliminate double-loop in the NMI handler (bsc#917630).
- GHES: Make NMI handler have a single reader (bsc#917630).
- GHES: Panic right after detection (bsc#917630).
- IB/mlx4: Fix wrong usage of IPv4 protocol for multicast attach/detach
  (bsc#918618).
- Initialize hv_netvsc_packet-&gt;xmit_more to avoid transfer stalls
- KVM: PPC: BOOK3S: HV: CMA: Reserve cma region only in hypervisor mode
  (bsc#908491).
- KVM: s390: virtio-ccw: Handle command rejects (bsc#931860).
- MODSIGN: loading keys from db when SecureBoot disabled (bsc#929696).
- MODSIGN: loading keys from db when SecureBoot disabled (bsc#929696).
- PCI: pciehp: Add hotplug_lock to serialize hotplug events (bsc#866911).
- Revert 'MODSIGN: loading keys from db when SecureBoot disabled'. This
  reverts commit b45412d4, because it breaks legacy boot.
- SUNRPC: Report connection error values to rpc_tasks on the pending
  queue (bsc#930972).
- Update s390x kabi files with netfilter change (bsc#936012)
- client MUST ignore EncryptionKeyLength if CAP_EXTENDED_SECURITY is set
  (bsc#932348).
- cpufreq: pcc: Enable autoload of pcc-cpufreq for ACPI processors
  (bsc#933117).
- dmapi: fix value from newer Linux strnlen_user() (bsc#932897).
- drm/i915/hsw: Fix workaround for server AUX channel clock divisor
  (bsc#935918).
- drm/i915: Evict CS TLBs between batches (bsc#935918).
- drm/i915: Fix DDC probe for passive adapters (bsc#935918).
- drm/i915: Handle failure to kick out a conflicting fb driver
  (bsc#935918).
- drm/i915: drop WaSetupGtModeTdRowDispatch:snb (bsc#935918).
- drm/i915: save/restore GMBUS freq across suspend/resume on gen4
  (bsc#935918).
- edd: support original Phoenix EDD 3.0 information (bsc#929974).
- ext4: fix over-defensive complaint after journal abort (bsc#935174).
- fs/cifs: Fix corrupt SMB2 ioctl requests (bsc#931124).
- ftrace: add oco handling patch (bsc#924526).
- ftrace: allow architectures to specify ftrace compile options
  (bsc#924526).
- ftrace: let notrace function attribute disable hotpatching if necessary
  (bsc#924526).
- hugetlb, kabi: do not account hugetlb pages as NR_FILE_PAGES
  (bsc#930092).
- hugetlb: do not account hugetlb pages as NR_FILE_PAGES (bsc#930092).
- hv: channel: match var type to return type of wait_for_completion.
- hv: do not schedule new works in
  vmbus_onoffer()/vmbus_onoffer_rescind().
- hv: hv_balloon: match var type to return type of wait_for_completion.
- hv: hv_util: move vmbus_open() to a later place.
- hv: hypervvssd: call endmntent before call setmntent again.
- hv: no rmmod for hv_vmbus and hv_utils.
- hv: remove the per-channel workqueue.
- hv: run non-blocking message handlers in the dispatch tasklet.
- hv: vmbus: missing curly braces in vmbus_process_offer().
- hv: vmbus_free_channels(): remove the redundant free_channel().
- hv: vmbus_open(): reset the channel state on ENOMEM.
- hv: vmbus_post_msg: retry the hypercall on some transient errors.
- hv_netvsc: Allocate the receive buffer from the correct NUMA node.
- hv_netvsc: Allocate the sendbuf in a NUMA aware way.
- hv_netvsc: Clean up two unused variables.
- hv_netvsc: Cleanup the test for freeing skb when we use sendbuf
  mechanism.
- hv_netvsc: Define a macro RNDIS_AND_PPI_SIZE.
- hv_netvsc: Eliminate memory allocation in the packet send path.
- hv_netvsc: Fix a bug in netvsc_start_xmit().
- hv_netvsc: Fix the packet free when it is in skb headroom.
- hv_netvsc: Implement batching in send buffer.
- hv_netvsc: Implement partial copy into send buffer.
- hv_netvsc: Use the xmit_more skb flag to optimize signaling the host.
- hv_netvsc: change member name of struct netvsc_stats.
- hv_netvsc: introduce netif-msg into netvsc module.
- hv_netvsc: remove unused variable in netvsc_send().
- hv_netvsc: remove vmbus_are_subchannels_present() in
  rndis_filter_device_add().
- hv_netvsc: try linearizing big SKBs before dropping them.
- hv_netvsc: use per_cpu stats to calculate TX/RX data.
- hv_netvsc: use single existing drop path in netvsc_start_xmit.
- hv_vmbus: Add gradually increased delay for retries in
  vmbus_post_msg().
- hyperv: Implement netvsc_get_channels() ethool op.
- hyperv: hyperv_fb: match wait_for_completion_timeout return type.
- iommu/amd: Handle integer overflow in dma_ops_area_alloc (bsc#931538).
- iommu/amd: Handle large pages correctly in free_pagetable (bsc#935881).
- ipr: Increase default adapter init stage change timeout (bsc#930579).
- ipv6: do not delete previously existing ECMP routes if add fails
  (bsc#930399).
- ipv6: fix ECMP route replacement (bsc#930399).
- jbd2: improve error messages for inconsistent journal heads
  (bsc#935174).
- jbd2: revise KERN_EMERG error messages (bsc#935174).
- kabi/severities: Add s390 symbols allowed to change in bsc#931860
- kabi: only use sops-&gt;get_inode_dev with proper fsflag.
- kernel: add panic_on_warn.
- kexec: allocate the kexec control page with KEXEC_CONTROL_MEMORY_GFP
  (bsc#928131).
- kgr: fix redirection on s390x arch (bsc#903279).
- kgr: move kgr_task_in_progress() to sched.h.
- kgr: send a fake signal to all blocking tasks.
- kvm: irqchip: Break up high order allocations of kvm_irq_routing_table
  (bsc#926953).
- libata: Blacklist queued TRIM on all Samsung 800-series (bsc#930599).
- mei: bus: () can be static.
- mm, thp: really limit transparent hugepage allocation to local node (VM
  Performance, bsc#931620).
- mm, thp: respect MPOL_PREFERRED policy with non-local node (VM
  Performance, bsc#931620).
- mm/mempolicy.c: merge alloc_hugepage_vma to alloc_pages_vma (VM
  Performance, bsc#931620).
- mm/thp: allocate transparent hugepages on local node (VM Performance,
  bsc#931620).
- net/mlx4_en: Call register_netdevice in the proper location
  (bsc#858727).
- net/mlx4_en: Do not attempt to TX offload the outer UDP checksum for
  VXLAN (bsc#858727).
- net: fib6: fib6_commit_metrics: fix potential NULL pointer dereference
  (bsc#867362).
- net: introduce netdev_alloc_pcpu_stats() for drivers.
- net: ipv6: fib: do not sleep inside atomic lock (bsc#867362).
- netdev: set __percpu attribute on netdev_alloc_pcpu_stats.
- netdev_alloc_pcpu_stats: use less common iterator variable.
- netfilter: xt_NFQUEUE: fix --queue-bypass regression (bsc#935083)
- ovl: default permissions (bsc#924071).
- ovl: move s_stack_depth .
- powerpc/perf/hv-24x7: use kmem_cache instead of aligned stack
  allocations (bsc#931403).
- powerpc/pseries: Correct cpu affinity for dlpar added cpus (bsc#932967).
- powerpc: Add VM_FAULT_HWPOISON handling to powerpc page fault handler
  (bsc#929475).
- powerpc: Fill in si_addr_lsb siginfo field (bsc#929475).
- powerpc: Simplify do_sigbus (bsc#929475).
- reiserfs: Fix use after free in journal teardown (bsc#927697).
- rtlwifi: rtl8192cu: Fix kernel deadlock (bsc#927786).
- s390/airq: add support for irq ranges (bsc#931860).
- s390/airq: silence lockdep warning (bsc#931860).
- s390/compat,signal: change return values to -EFAULT (bsc#929879).
- s390/ftrace: hotpatch support for function tracing (bsc#924526).
- s390/irq: improve displayed interrupt order in /proc/interrupts
  (bsc#931860).
- s390/kernel: use stnsm 255 instead of stosm 0 (bsc#929879).
- s390/kgr: reorganize kgr infrastructure in entry64.S.
- s390/mm: align 64-bit PIE binaries to 4GB (bsc#929879).
- s390/mm: limit STACK_RND_MASK for compat tasks (bsc#929879).
- s390/rwlock: add missing local_irq_restore calls (bsc#929879).
- s390/sclp_vt220: Fix kernel panic due to early terminal input
  (bsc#931860).
- s390/smp: only send external call ipi if needed (bsc#929879).
- s390/spinlock,rwlock: always to a load-and-test first (bsc#929879).
- s390/spinlock: cleanup spinlock code (bsc#929879).
- s390/spinlock: optimize spin_unlock code (bsc#929879).
- s390/spinlock: optimize spinlock code sequence (bsc#929879).
- s390/spinlock: refactor arch_spin_lock_wait[_flags] (bsc#929879).
- s390/time: use stck clock fast for do_account_vtime (bsc#929879).
- s390: Remove zfcpdump NR_CPUS dependency (bsc#929879).
- s390: add z13 code generation support (bsc#929879).
- s390: avoid z13 cache aliasing (bsc#929879).
- s390: fix control register update (bsc#929879).
- s390: optimize control register update (bsc#929879).
- s390: z13 base performance (bsc#929879).
- sched: fix __sched_setscheduler() vs load balancing race (bsc#921430)
- scsi: retry MODE SENSE on unit attention (bsc#895814).
- scsi_dh_alua: Recheck state on unit attention (bsc#895814).
- scsi_dh_alua: fixup crash in alua_rtpg_work() (bsc#895814).
- scsi_dh_alua: parse device id instead of target id (bsc#895814).
- scsi_dh_alua: recheck RTPG in regular intervals (bsc#895814).
- scsi_dh_alua: update all port states (bsc#895814).
- sd: always retry READ CAPACITY for ALUA state transition (bsc#895814).
- st: null pointer dereference panic caused by use after kref_put by
  st_open (bsc#936875).
- supported.conf: add btrfs to kernel-$flavor-base (bsc#933637)
- udf: Remove repeated loads blocksize (bsc#933907).
- usb: core: Fix USB 3.0 devices lost in NOTATTACHED state after a hub
  port reset (bsc#938024).
- vTPM: set virtual device before passing to ibmvtpm_reset_crq
  (bsc#937087).
- vfs: add super_operations-&gt;get_inode_dev (bsc#927455).
- virtio-ccw: virtio-ccw adapter interrupt support (bsc#931860).
- virtio-rng: do not crash if virtqueue is broken (bsc#931860).
- virtio: fail adding buffer on broken queues (bsc#931860).
- virtio: virtio_break_device() to mark all virtqueues broken
  (bsc#931860).
- virtio_blk: verify if queue is broken after virtqueue_get_buf()
  (bsc#931860).
- virtio_ccw: fix hang in set offline processing (bsc#931860).
- virtio_ccw: fix vcdev pointer handling issues (bsc#931860).
- virtio_ccw: introduce device_lost in virtio_ccw_device (bsc#931860).
- virtio_net: do not crash if virtqueue is broken (bsc#931860).
- virtio_net: verify if queue is broken after virtqueue_get_buf()
  (bsc#931860).
- virtio_ring: adapt to notify() returning bool (bsc#931860).
- virtio_ring: add new function virtqueue_is_broken() (bsc#931860).
- virtio_ring: change host notification API (bsc#931860).
- virtio_ring: let virtqueue_{kick()/notify()} return a bool
  (bsc#931860).
- virtio_ring: plug kmemleak false positive (bsc#931860).
- virtio_scsi: do not call virtqueue_add_sgs(... GFP_NOIO) holding
  spinlock (bsc#931860).
- virtio_scsi: verify if queue is broken after virtqueue_get_buf()
  (bsc#931860).
- vmxnet3: Bump up driver version number (bsc#936423).
- vmxnet3: Changes for vmxnet3 adapter version 2 (fwd) (bug#936423).
- vmxnet3: Fix memory leaks in rx path (fwd) (bug#936423).
- vmxnet3: Register shutdown handler for device (fwd) (bug#936423).
- x86/PCI: Use host bridge _CRS info on Foxconn K8M890-8237A
  (bsc#907092).
- x86/PCI: Use host bridge _CRS info on systems with &gt;32 bit addressing
  (bsc#907092).
- x86/kgr: move kgr infrastructure from asm to C.
- x86/mm: Improve AMD Bulldozer ASLR workaround (bsc#937032).
- xfrm: release dst_orig in case of error in xfrm_lookup() (bsc#932793).
- xfs: Skip dirty pages in -&gt;releasepage (bsc#915183).
- xfs: fix xfs_setattr for DMAPI (bsc#932900).
- xfs_dmapi: fix transaction ilocks (bsc#932899).
- xfs_dmapi: fix value from newer Linux strnlen_user() (bsc#932897).
- xfs_dmapi: xfs_dm_rdwr() uses dir file ops not file's ops (bsc#932898).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-16"/>
	<updated date="2015-07-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/854817">SUSE bug 854817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854824">SUSE bug 854824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858727">SUSE bug 858727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866911">SUSE bug 866911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867362">SUSE bug 867362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895814">SUSE bug 895814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903279">SUSE bug 903279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907092">SUSE bug 907092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908491">SUSE bug 908491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915183">SUSE bug 915183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917630">SUSE bug 917630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918618">SUSE bug 918618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921430">SUSE bug 921430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924071">SUSE bug 924071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924526">SUSE bug 924526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926369">SUSE bug 926369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926953">SUSE bug 926953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927455">SUSE bug 927455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927697">SUSE bug 927697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927786">SUSE bug 927786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928131">SUSE bug 928131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929475">SUSE bug 929475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929696">SUSE bug 929696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929879">SUSE bug 929879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929974">SUSE bug 929974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930092">SUSE bug 930092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930399">SUSE bug 930399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930579">SUSE bug 930579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930599">SUSE bug 930599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930972">SUSE bug 930972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931124">SUSE bug 931124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931403">SUSE bug 931403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931538">SUSE bug 931538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931620">SUSE bug 931620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931860">SUSE bug 931860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931988">SUSE bug 931988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932348">SUSE bug 932348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932793">SUSE bug 932793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932897">SUSE bug 932897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932898">SUSE bug 932898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932899">SUSE bug 932899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932900">SUSE bug 932900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932967">SUSE bug 932967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933117">SUSE bug 933117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933429">SUSE bug 933429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933637">SUSE bug 933637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933896">SUSE bug 933896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933904">SUSE bug 933904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933907">SUSE bug 933907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934160">SUSE bug 934160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935083">SUSE bug 935083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935085">SUSE bug 935085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935088">SUSE bug 935088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935174">SUSE bug 935174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935542">SUSE bug 935542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935881">SUSE bug 935881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935918">SUSE bug 935918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936012">SUSE bug 936012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936423">SUSE bug 936423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936445">SUSE bug 936445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936446">SUSE bug 936446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936502">SUSE bug 936502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936556">SUSE bug 936556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936831">SUSE bug 936831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936875">SUSE bug 936875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937032">SUSE bug 937032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937087">SUSE bug 937087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937609">SUSE bug 937609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937612">SUSE bug 937612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937613">SUSE bug 937613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937616">SUSE bug 937616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938022">SUSE bug 938022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938023">SUSE bug 938023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938024">SUSE bug 938024</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9728/">CVE-2014-9728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9729/">CVE-2014-9729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9730/">CVE-2014-9730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9731/">CVE-2014-9731</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1805/">CVE-2015-1805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3212/">CVE-2015-3212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4036/">CVE-2015-4036</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4167/">CVE-2015-4167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4692/">CVE-2015-4692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5364/">CVE-2015-5364</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5366/">CVE-2015-5366</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514847" comment="kernel-default-3.12.44-52.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514848" comment="kernel-default-devel-3.12.44-52.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514849" comment="kernel-default-extra-3.12.44-52.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514850" comment="kernel-devel-3.12.44-52.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514851" comment="kernel-macros-3.12.44-52.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514852" comment="kernel-source-3.12.44-52.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514853" comment="kernel-syms-3.12.44-52.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514854" comment="kernel-xen-3.12.44-52.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514855" comment="kernel-xen-devel-3.12.44-52.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77311" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="908994" ref_url="https://bugzilla.suse.com/908994" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8500" ref_url="https://www.suse.com/security/cve/CVE-2014-8500/" source="CVE"/>
		<description>

This update of bind to 9.9.6P1 fixes bugs and also the following security issue:

A flaw in delegation handling could be exploited to put named
into an infinite loop.  This has been addressed by placing
limits on the number of levels of recursion named will allow
(default 7), and the number of iterative queries that it will
send (default 50) before terminating a recursive query
(CVE-2014-8500, bnc#908994).

The recursion depth limit is configured via the
'max-recursion-depth' option, and the query limit via the
'max-recursion-queries' option.

Also the rpz2 patch was removed as it is no longer maintained.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-14"/>
	<updated date="2015-01-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/908994">SUSE bug 908994</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8500/">CVE-2014-8500</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514856" comment="bind-libs-9.9.5P1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514857" comment="bind-libs-32bit-9.9.5P1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514858" comment="bind-utils-9.9.5P1-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77312" version="1" class="patch">
	<metadata>
		<title>Security update for e2fsprogs (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="915402" ref_url="https://bugzilla.suse.com/915402" source="BUGZILLA"/>
		<reference ref_id="918346" ref_url="https://bugzilla.suse.com/918346" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0247" ref_url="https://www.suse.com/security/cve/CVE-2015-0247/" source="CVE"/>
		<reference ref_id="CVE-2015-1572" ref_url="https://www.suse.com/security/cve/CVE-2015-1572/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001524.html" source="SUSE-SU"/>
		<description>

Two security issues were fixed in e2fsprogs:

Security issues fixed:

* CVE-2015-0247: Various heap overflows were fixed in e2fsprogs (fsck, dumpe2fs, e2image...).
* CVE-2015-1572: Fixed a potential buffer overflow in closefs() (bsc#918346 )
		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-29"/>
	<updated date="2015-06-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/915402">SUSE bug 915402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918346">SUSE bug 918346</bugzilla>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-0247/">CVE-2015-0247</cve>
	<cve impact="low" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-1572/">CVE-2015-1572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514859" comment="e2fsprogs-1.42.11-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514860" comment="libcom_err2-1.42.11-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514861" comment="libcom_err2-32bit-1.42.11-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514862" comment="libext2fs2-1.42.11-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77313" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="898572" ref_url="https://bugzilla.suse.com/898572" source="BUGZILLA"/>
		<reference ref_id="901715" ref_url="https://bugzilla.suse.com/901715" source="BUGZILLA"/>
		<reference ref_id="924312" ref_url="https://bugzilla.suse.com/924312" source="BUGZILLA"/>
		<reference ref_id="935856" ref_url="https://bugzilla.suse.com/935856" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-1753" ref_url="https://www.suse.com/security/cve/CVE-2013-1753/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2014-7185" ref_url="https://www.suse.com/security/cve/CVE-2014-7185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001525.html" source="SUSE-SU"/>
		<description>
This update to python 2.7.9 fixes the following issues:
* python-2.7-libffi-aarch64.patch: Fix argument passing in libffi for aarch64

From the version update to 2.7.9:
  * contains full backport of ssl module from Python 3.4 (PEP466)
  * HTTPS certificate validation enabled by default (PEP476)
  * SSLv3 disabled by default (bnc#901715)
  * backported ensurepip module (PEP477)
  * fixes several missing CVEs from last release: CVE-2013-1752, CVE-2013-1753
  * dropped upstreamed patches: python-2.7.6-poplib.patch,
    smtplib_maxline-2.7.patch, xmlrpc_gzip_27.patch
  * dropped patch python-2.7.3-ssl_ca_path.patch because we don't need it
    with ssl module from Python 3
  * libffi was upgraded upstream, seems to contain our changes,
    so dropping libffi-ppc64le.diff as well
  * python-2.7-urllib2-localnet-ssl.patch - properly remove unconditional
    'import ssl' from test_urllib2_localnet that caused it to fail without ssl

  * skip test_thread in qemu_linux_user mode 

From the version update to 2.7.8:
  * fixes CVE-2014-4650 directory traversal in CGIHTTPServer
  * fixes CVE-2014-7185 (bnc#898572) potential buffer overflow in buffer()

Also the DH parameters were increased to 2048 bit to fix logjam security issue (bsc#935856)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-30"/>
	<updated date="2015-06-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/898572">SUSE bug 898572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901715">SUSE bug 901715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924312">SUSE bug 924312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935856">SUSE bug 935856</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1753/">CVE-2013-1753</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7185/">CVE-2014-7185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514863" comment="libpython2_7-1_0-2.7.9-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514864" comment="libpython2_7-1_0-32bit-2.7.9-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514865" comment="python-2.7.9-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514866" comment="python-base-2.7.9-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514867" comment="python-curses-2.7.9-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514868" comment="python-devel-2.7.9-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514869" comment="python-tk-2.7.9-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514870" comment="python-xml-2.7.9-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77314" version="1" class="patch">
	<metadata>
		<title>Security update for libqt4 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="847880" ref_url="https://bugzilla.suse.com/847880" source="BUGZILLA"/>
		<reference ref_id="921999" ref_url="https://bugzilla.suse.com/921999" source="BUGZILLA"/>
		<reference ref_id="927806" ref_url="https://bugzilla.suse.com/927806" source="BUGZILLA"/>
		<reference ref_id="927807" ref_url="https://bugzilla.suse.com/927807" source="BUGZILLA"/>
		<reference ref_id="927808" ref_url="https://bugzilla.suse.com/927808" source="BUGZILLA"/>
		<reference ref_id="929688" ref_url="https://bugzilla.suse.com/929688" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0295" ref_url="https://www.suse.com/security/cve/CVE-2015-0295/" source="CVE"/>
		<reference ref_id="CVE-2015-1858" ref_url="https://www.suse.com/security/cve/CVE-2015-1858/" source="CVE"/>
		<reference ref_id="CVE-2015-1859" ref_url="https://www.suse.com/security/cve/CVE-2015-1859/" source="CVE"/>
		<reference ref_id="CVE-2015-1860" ref_url="https://www.suse.com/security/cve/CVE-2015-1860/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001528.html" source="SUSE-SU"/>
		<description>
The libqt4 library was updated to fix several security and non security issues.

The following vulnerabilities were fixed:
- bsc#921999: CVE-2015-0295: division by zero when processing malformed BMP files
- bsc#927806: CVE-2015-1858: segmentation fault in BMP Qt Image Format Handling
- bsc#927807: CVE-2015-1859: segmentation fault in ICO Qt Image Format Handling
- bsc#927808: CVE-2015-1860: segmentation fault in GIF Qt Image Format Handling

The following non-secuirty issues were fixed:
- bsc#929688: Critical Problem in Qt Network Stack
- bsc#847880: kde/qt rendering error in qemu cirrus i586
- Update use-freetype-default.diff to use same method as with
  libqt5-qtbase package: Qt itself already does runtime check
  whether subpixel rendering is available, but only when
  FT_CONFIG_OPTION_SUBPIXEL_RENDERING is defined. Thus it is enough
  to only remove that condition
- The -devel subpackage requires Mesa-devel, not only at build time 
- Fixed compilation on SLE_11_SP3 by making it build against
  Mesa-devel on that system
- Replace patch l-qclipboard_fix_recursive.patch with
  qtcore-4.8.5-qeventdispatcher-recursive.patch. The later one 
  seems to work better and really resolves the issue in LibreOffice
- Added kde4_qt_plugin_path.patch, so kde4 plugins are magically
  found/known outside kde4 enviroment/session
- added _constraints. building took up to 7GB of disk space on
  s390x, and more than 6GB on x86_64 
- Add 3 patches for Qt bugs to make LibreOffice KDE4 file
  picker work properly again:
  * Add glib-honor-ExcludeSocketNotifiers-flag.diff (QTBUG-37380)
  * Add l-qclipboard_fix_recursive.patch (QTBUG-34614)
  * Add l-qclipboard_delay.patch (QTBUG-38585)		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-27"/>
	<updated date="2015-05-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/847880">SUSE bug 847880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921999">SUSE bug 921999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927806">SUSE bug 927806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927807">SUSE bug 927807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927808">SUSE bug 927808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929688">SUSE bug 929688</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0295/">CVE-2015-0295</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1858/">CVE-2015-1858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1859/">CVE-2015-1859</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1860/">CVE-2015-1860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514871" comment="libqt4-4.8.6-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514872" comment="libqt4-32bit-4.8.6-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514873" comment="libqt4-qt3support-4.8.6-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514874" comment="libqt4-qt3support-32bit-4.8.6-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514875" comment="libqt4-sql-4.8.6-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514876" comment="libqt4-sql-32bit-4.8.6-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514877" comment="libqt4-sql-mysql-4.8.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514878" comment="libqt4-sql-mysql-32bit-4.8.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514879" comment="libqt4-sql-postgresql-4.8.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514880" comment="libqt4-sql-postgresql-32bit-4.8.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514881" comment="libqt4-sql-sqlite-4.8.6-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514882" comment="libqt4-sql-sqlite-32bit-4.8.6-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514883" comment="libqt4-sql-unixODBC-4.8.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514884" comment="libqt4-sql-unixODBC-32bit-4.8.6-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514885" comment="libqt4-x11-4.8.6-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514886" comment="libqt4-x11-32bit-4.8.6-4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77315" version="1" class="patch">
	<metadata>
		<title>Security update for evolution-data-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="901361" ref_url="https://bugzilla.suse.com/901361" source="BUGZILLA"/>
		<reference ref_id="901553" ref_url="https://bugzilla.suse.com/901553" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<description>
evolution-data-server was updated to disable support for SSLv3.

This security issues was fixed:
- SSLv3 POODLE attack (CVE-2014-3566)
		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-15"/>
	<updated date="2014-12-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/901361">SUSE bug 901361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901553">SUSE bug 901553</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514887" comment="evolution-data-server-3.10.4-5.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514888" comment="evolution-data-server-lang-3.10.4-5.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514889" comment="libcamel-1_2-45-3.10.4-5.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514890" comment="libcamel-1_2-45-32bit-3.10.4-5.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514891" comment="libebackend-1_2-7-3.10.4-5.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514892" comment="libebackend-1_2-7-32bit-3.10.4-5.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514893" comment="libebook-1_2-14-3.10.4-5.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514894" comment="libebook-1_2-14-32bit-3.10.4-5.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514895" comment="libebook-contacts-1_2-0-3.10.4-5.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514896" comment="libebook-contacts-1_2-0-32bit-3.10.4-5.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514897" comment="libecal-1_2-16-3.10.4-5.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514898" comment="libecal-1_2-16-32bit-3.10.4-5.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514899" comment="libedata-book-1_2-20-3.10.4-5.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514900" comment="libedata-book-1_2-20-32bit-3.10.4-5.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514901" comment="libedata-cal-1_2-23-3.10.4-5.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514902" comment="libedata-cal-1_2-23-32bit-3.10.4-5.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514903" comment="libedataserver-1_2-18-3.10.4-5.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514904" comment="libedataserver-1_2-18-32bit-3.10.4-5.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77316" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="941239" ref_url="https://bugzilla.suse.com/941239" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3107" ref_url="https://www.suse.com/security/cve/CVE-2015-3107/" source="CVE"/>
		<reference ref_id="CVE-2015-5124" ref_url="https://www.suse.com/security/cve/CVE-2015-5124/" source="CVE"/>
		<reference ref_id="CVE-2015-5125" ref_url="https://www.suse.com/security/cve/CVE-2015-5125/" source="CVE"/>
		<reference ref_id="CVE-2015-5127" ref_url="https://www.suse.com/security/cve/CVE-2015-5127/" source="CVE"/>
		<reference ref_id="CVE-2015-5128" ref_url="https://www.suse.com/security/cve/CVE-2015-5128/" source="CVE"/>
		<reference ref_id="CVE-2015-5129" ref_url="https://www.suse.com/security/cve/CVE-2015-5129/" source="CVE"/>
		<reference ref_id="CVE-2015-5130" ref_url="https://www.suse.com/security/cve/CVE-2015-5130/" source="CVE"/>
		<reference ref_id="CVE-2015-5131" ref_url="https://www.suse.com/security/cve/CVE-2015-5131/" source="CVE"/>
		<reference ref_id="CVE-2015-5132" ref_url="https://www.suse.com/security/cve/CVE-2015-5132/" source="CVE"/>
		<reference ref_id="CVE-2015-5133" ref_url="https://www.suse.com/security/cve/CVE-2015-5133/" source="CVE"/>
		<reference ref_id="CVE-2015-5134" ref_url="https://www.suse.com/security/cve/CVE-2015-5134/" source="CVE"/>
		<reference ref_id="CVE-2015-5539" ref_url="https://www.suse.com/security/cve/CVE-2015-5539/" source="CVE"/>
		<reference ref_id="CVE-2015-5540" ref_url="https://www.suse.com/security/cve/CVE-2015-5540/" source="CVE"/>
		<reference ref_id="CVE-2015-5541" ref_url="https://www.suse.com/security/cve/CVE-2015-5541/" source="CVE"/>
		<reference ref_id="CVE-2015-5544" ref_url="https://www.suse.com/security/cve/CVE-2015-5544/" source="CVE"/>
		<reference ref_id="CVE-2015-5545" ref_url="https://www.suse.com/security/cve/CVE-2015-5545/" source="CVE"/>
		<reference ref_id="CVE-2015-5546" ref_url="https://www.suse.com/security/cve/CVE-2015-5546/" source="CVE"/>
		<reference ref_id="CVE-2015-5547" ref_url="https://www.suse.com/security/cve/CVE-2015-5547/" source="CVE"/>
		<reference ref_id="CVE-2015-5548" ref_url="https://www.suse.com/security/cve/CVE-2015-5548/" source="CVE"/>
		<reference ref_id="CVE-2015-5549" ref_url="https://www.suse.com/security/cve/CVE-2015-5549/" source="CVE"/>
		<reference ref_id="CVE-2015-5550" ref_url="https://www.suse.com/security/cve/CVE-2015-5550/" source="CVE"/>
		<reference ref_id="CVE-2015-5551" ref_url="https://www.suse.com/security/cve/CVE-2015-5551/" source="CVE"/>
		<reference ref_id="CVE-2015-5552" ref_url="https://www.suse.com/security/cve/CVE-2015-5552/" source="CVE"/>
		<reference ref_id="CVE-2015-5553" ref_url="https://www.suse.com/security/cve/CVE-2015-5553/" source="CVE"/>
		<reference ref_id="CVE-2015-5554" ref_url="https://www.suse.com/security/cve/CVE-2015-5554/" source="CVE"/>
		<reference ref_id="CVE-2015-5555" ref_url="https://www.suse.com/security/cve/CVE-2015-5555/" source="CVE"/>
		<reference ref_id="CVE-2015-5556" ref_url="https://www.suse.com/security/cve/CVE-2015-5556/" source="CVE"/>
		<reference ref_id="CVE-2015-5557" ref_url="https://www.suse.com/security/cve/CVE-2015-5557/" source="CVE"/>
		<reference ref_id="CVE-2015-5558" ref_url="https://www.suse.com/security/cve/CVE-2015-5558/" source="CVE"/>
		<reference ref_id="CVE-2015-5559" ref_url="https://www.suse.com/security/cve/CVE-2015-5559/" source="CVE"/>
		<reference ref_id="CVE-2015-5560" ref_url="https://www.suse.com/security/cve/CVE-2015-5560/" source="CVE"/>
		<reference ref_id="CVE-2015-5561" ref_url="https://www.suse.com/security/cve/CVE-2015-5561/" source="CVE"/>
		<reference ref_id="CVE-2015-5562" ref_url="https://www.suse.com/security/cve/CVE-2015-5562/" source="CVE"/>
		<reference ref_id="CVE-2015-5563" ref_url="https://www.suse.com/security/cve/CVE-2015-5563/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<description>

This security update to 11.2.202.508 (bsc#941239) fixes
the following issues:

  * APSB15-19: CVE-2015-3107, CVE-2015-5124, CVE-2015-5125,
    CVE-2015-5127, CVE-2015-5128, CVE-2015-5129, CVE-2015-5130,
    CVE-2015-5131, CVE-2015-5132, CVE-2015-5133, CVE-2015-5134,
    CVE-2015-5539, CVE-2015-5540, CVE-2015-5541, CVE-2015-5544,
    CVE-2015-5545, CVE-2015-5546, CVE-2015-5547, CVE-2015-5548,
    CVE-2015-5549, CVE-2015-5550, CVE-2015-5551, CVE-2015-5552,
    CVE-2015-5553, CVE-2015-5554, CVE-2015-5555, CVE-2015-5556,
    CVE-2015-5557, CVE-2015-5558, CVE-2015-5559, CVE-2015-5560,
    CVE-2015-5561, CVE-2015-5562, CVE-2015-5563
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-12"/>
	<updated date="2015-08-12"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3107/">CVE-2015-3107</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5124/">CVE-2015-5124</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5125/">CVE-2015-5125</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5127/">CVE-2015-5127</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5128/">CVE-2015-5128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5129/">CVE-2015-5129</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5130/">CVE-2015-5130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5131/">CVE-2015-5131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5132/">CVE-2015-5132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5133/">CVE-2015-5133</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5134/">CVE-2015-5134</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5539/">CVE-2015-5539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5540/">CVE-2015-5540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5541/">CVE-2015-5541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5544/">CVE-2015-5544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5545/">CVE-2015-5545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5546/">CVE-2015-5546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5547/">CVE-2015-5547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5548/">CVE-2015-5548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5549/">CVE-2015-5549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5550/">CVE-2015-5550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5551/">CVE-2015-5551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5552/">CVE-2015-5552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5553/">CVE-2015-5553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5554/">CVE-2015-5554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5555/">CVE-2015-5555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5556/">CVE-2015-5556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5557/">CVE-2015-5557</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5558/">CVE-2015-5558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5559/">CVE-2015-5559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5560/">CVE-2015-5560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5561/">CVE-2015-5561</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5562/">CVE-2015-5562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5563/">CVE-2015-5563</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514905" comment="flash-player-11.2.202.508-99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514906" comment="flash-player-gnome-11.2.202.508-99.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77317" version="1" class="patch">
	<metadata>
		<title>Security update for cups-filters (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="936281" ref_url="https://bugzilla.suse.com/936281" source="BUGZILLA"/>
		<reference ref_id="937018" ref_url="https://bugzilla.suse.com/937018" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3258" ref_url="https://www.suse.com/security/cve/CVE-2015-3258/" source="CVE"/>
		<reference ref_id="CVE-2015-3279" ref_url="https://www.suse.com/security/cve/CVE-2015-3279/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001536.html" source="SUSE-SU"/>
		<description>
cups-filters was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-3279: Texttopdf integer overflow (incomplete fix for CVE-2015-3258) (bsc#937018).
- CVE-2015-3258: Texttopdf heap-based buffer overflow (bsc#936281).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-06"/>
	<updated date="2015-07-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/936281">SUSE bug 936281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937018">SUSE bug 937018</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3258/">CVE-2015-3258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3279/">CVE-2015-3279</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514907" comment="cups-filters-1.0.58-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514908" comment="cups-filters-cups-browsed-1.0.58-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514909" comment="cups-filters-foomatic-rip-1.0.58-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514910" comment="cups-filters-ghostscript-1.0.58-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77318" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="940918" ref_url="https://bugzilla.suse.com/940918" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00009.html" source="SUSE-SU"/>
		<description>


This security update (bsc#940918) fixes the following issues:

  * MFSA 2015-78: (CVE-2015-4495, bmo#1178058): Same origin violation
  * Remove PlayPreview registration from PDF Viewer (bmo#1179262)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-12"/>
	<updated date="2015-08-12"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/940918">SUSE bug 940918</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514911" comment="MozillaFirefox-31.8.0esr-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514912" comment="MozillaFirefox-translations-31.8.0esr-40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77319" version="1" class="patch">
	<metadata>
		<title>security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="939709" ref_url="https://bugzilla.suse.com/939709" source="BUGZILLA"/>
		<reference ref_id="939712" ref_url="https://bugzilla.suse.com/939712" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5165" ref_url="https://www.suse.com/security/cve/CVE-2015-5165/" source="CVE"/>
		<reference ref_id="CVE-2015-5166" ref_url="https://www.suse.com/security/cve/CVE-2015-5166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001541.html" source="SUSE-SU"/>
		<description>


This security update of Xen fixes the following issues:

* bsc#939712 (XSA-140): QEMU leak of uninitialized heap
  memory in rtl8139 device model (CVE-2015-5165)
* bsc#939709 (XSA-139):  Use after free in QEMU/Xen
  block unplug protocol (CVE-2015-5166)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-11"/>
	<updated date="2015-08-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/939709">SUSE bug 939709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939712">SUSE bug 939712</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-5165/">CVE-2015-5165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5166/">CVE-2015-5166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514913" comment="xen-4.4.2_10-22.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514914" comment="xen-kmp-default-4.4.2_10_k3.12.44_52.10-22.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514915" comment="xen-libs-4.4.2_10-22.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514916" comment="xen-libs-32bit-4.4.2_10-22.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77320" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="870151" ref_url="https://bugzilla.suse.com/870151" source="BUGZILLA"/>
		<reference ref_id="921999" ref_url="https://bugzilla.suse.com/921999" source="BUGZILLA"/>
		<reference ref_id="927806" ref_url="https://bugzilla.suse.com/927806" source="BUGZILLA"/>
		<reference ref_id="927807" ref_url="https://bugzilla.suse.com/927807" source="BUGZILLA"/>
		<reference ref_id="927808" ref_url="https://bugzilla.suse.com/927808" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0295" ref_url="https://www.suse.com/security/cve/CVE-2015-0295/" source="CVE"/>
		<reference ref_id="CVE-2015-1858" ref_url="https://www.suse.com/security/cve/CVE-2015-1858/" source="CVE"/>
		<reference ref_id="CVE-2015-1859" ref_url="https://www.suse.com/security/cve/CVE-2015-1859/" source="CVE"/>
		<reference ref_id="CVE-2015-1860" ref_url="https://www.suse.com/security/cve/CVE-2015-1860/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001540.html" source="SUSE-SU"/>
		<description>

This security update fixes the following issues:

 * Add libqt5-Fix-a-division-by-zero-processing-malformed-BMP.patch
   - QTBUG-44547, bsc#921999 (CVE-2015-0295)
 * Add libqt5-Fixes-crash-in-bmp-and-ico-image-decoding.patch
   - bsc#927806 (CVE-2015-1858), bsc#927807 (CVE-2015-1859)
 * Add libqt5-Fixes-crash-in-gif-image-decoder.patch
   - bsc#927808 (CVE-2015-1860)
 * Add libqt5-fix-use-after-free-bug.patch from upstream
   - fixes the use-after-free bug in backingstore, boo#870151
		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-29"/>
	<updated date="2015-05-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/870151">SUSE bug 870151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921999">SUSE bug 921999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927806">SUSE bug 927806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927807">SUSE bug 927807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927808">SUSE bug 927808</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0295/">CVE-2015-0295</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1858/">CVE-2015-1858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1859/">CVE-2015-1859</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1860/">CVE-2015-1860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514917" comment="libQt5Core5-5.3.1-4.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514918" comment="libQt5DBus5-5.3.1-4.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514919" comment="libQt5Gui5-5.3.1-4.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514920" comment="libQt5Widgets5-5.3.1-4.4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77321" version="1" class="patch">
	<metadata>
		<title>Security update for libyaml (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="907809" ref_url="https://bugzilla.suse.com/907809" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9130" ref_url="https://www.suse.com/security/cve/CVE-2014-9130/" source="CVE"/>
		<description>

This libyaml update fixes the following security issue:

- bnc#907809: assert failure when processing wrapped strings
  (CVE-2014-9130)
		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-03"/>
	<updated date="2014-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/907809">SUSE bug 907809</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9130/">CVE-2014-9130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514921" comment="libyaml-0-2-0.1.6-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77322" version="1" class="patch">
	<metadata>
		<title>Security update for rpm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="892431" ref_url="https://bugzilla.suse.com/892431" source="BUGZILLA"/>
		<reference ref_id="906803" ref_url="https://bugzilla.suse.com/906803" source="BUGZILLA"/>
		<reference ref_id="908128" ref_url="https://bugzilla.suse.com/908128" source="BUGZILLA"/>
		<reference ref_id="911228" ref_url="https://bugzilla.suse.com/911228" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6435" ref_url="https://www.suse.com/security/cve/CVE-2013-6435/" source="CVE"/>
		<reference ref_id="CVE-2014-8118" ref_url="https://www.suse.com/security/cve/CVE-2014-8118/" source="CVE"/>
		<description>
This rpm update fixes the following security and non-security issues:

- bnc#908128: Check for bad invalid name sizes (CVE-2014-8118)
- bnc#906803: Create files with mode 0 (CVE-2013-6435)
- bnc#892431: Honor --noglob in install mode 
- bnc#911228: Fix noglob patch, it broke files with space.		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-15"/>
	<updated date="2015-01-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/892431">SUSE bug 892431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906803">SUSE bug 906803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908128">SUSE bug 908128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911228">SUSE bug 911228</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6435/">CVE-2013-6435</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8118/">CVE-2014-8118</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514922" comment="rpm-4.11.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514923" comment="rpm-32bit-4.11.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514924" comment="rpm-build-4.11.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514925" comment="rpm-python-4.11.2-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77323" version="1" class="patch">
	<metadata>
		<title>Recommended update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="937212" ref_url="https://bugzilla.suse.com/937212" source="BUGZILLA"/>
		<reference ref_id="937492" ref_url="https://bugzilla.suse.com/937492" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001545.html" source="SUSE-SU"/>
		<description>

This update of openssl fixes two regressions.

- A regression was caused by the security fix for CVE-2015-0287, where
  DSA keys were not correctly loaded from file anymore. (bsc#937492)

- RSA key generation odd keylengths was entering an endless loop (bsc#937212)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-06"/>
	<updated date="2015-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/937212">SUSE bug 937212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937492">SUSE bug 937492</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514926" comment="libopenssl1_0_0-1.0.1i-27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514927" comment="libopenssl1_0_0-32bit-1.0.1i-27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514928" comment="openssl-1.0.1i-27.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77324" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="914333" ref_url="https://bugzilla.suse.com/914333" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0310" ref_url="https://www.suse.com/security/cve/CVE-2015-0310/" source="CVE"/>
		<description>

Adobe Flash Player was updated to 11.2.202.438 to fix one security isssue.

http://helpx.adobe.com/security/products/flash-player/apsb15-02.html
(APSB15-02, CVE-2015-0310)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-22"/>
	<updated date="2015-01-22"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/914333">SUSE bug 914333</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0310/">CVE-2015-0310</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514929" comment="flash-player-11.2.202.438-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514930" comment="flash-player-gnome-11.2.202.438-27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77325" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="914463" ref_url="https://bugzilla.suse.com/914463" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0311" ref_url="https://www.suse.com/security/cve/CVE-2015-0311/" source="CVE"/>
		<description>

Adobe Flash Player was updated to 11.2.202.440 (bsc#914463, APSA15-01, CVE-2015-0311).

More information can be found on https://helpx.adobe.com/security/products/flash-player/apsa15-01.html

An update of flashplayer (executable binary) for i386 is currently not available. Disabled!
		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-27"/>
	<updated date="2015-01-27"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/914463">SUSE bug 914463</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0311/">CVE-2015-0311</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514931" comment="flash-player-11.2.202.440-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514932" comment="flash-player-gnome-11.2.202.440-31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77326" version="1" class="patch">
	<metadata>
		<title>Security update for p7zip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="912878" ref_url="https://bugzilla.suse.com/912878" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1038" ref_url="https://www.suse.com/security/cve/CVE-2015-1038/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001551.html" source="SUSE-SU"/>
		<description>

      This update fixes the following security issue:
      - CVE-2015-1038: directory traversal vulnerability [bnc#912878]

       This could for the overwriting of arbitrary files through uncompressing a crafted archive, with the privileges of the user running 7z
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-31"/>
	<updated date="2015-07-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/912878">SUSE bug 912878</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1038/">CVE-2015-1038</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514933" comment="p7zip-9.20.1-3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77327" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="902676" ref_url="https://bugzilla.suse.com/902676" source="BUGZILLA"/>
		<reference ref_id="902677" ref_url="https://bugzilla.suse.com/902677" source="BUGZILLA"/>
		<reference ref_id="903655" ref_url="https://bugzilla.suse.com/903655" source="BUGZILLA"/>
		<reference ref_id="905735" ref_url="https://bugzilla.suse.com/905735" source="BUGZILLA"/>
		<reference ref_id="905736" ref_url="https://bugzilla.suse.com/905736" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8484" ref_url="https://www.suse.com/security/cve/CVE-2014-8484/" source="CVE"/>
		<reference ref_id="CVE-2014-8485" ref_url="https://www.suse.com/security/cve/CVE-2014-8485/" source="CVE"/>
		<reference ref_id="CVE-2014-8501" ref_url="https://www.suse.com/security/cve/CVE-2014-8501/" source="CVE"/>
		<reference ref_id="CVE-2014-8502" ref_url="https://www.suse.com/security/cve/CVE-2014-8502/" source="CVE"/>
		<reference ref_id="CVE-2014-8503" ref_url="https://www.suse.com/security/cve/CVE-2014-8503/" source="CVE"/>
		<reference ref_id="CVE-2014-8504" ref_url="https://www.suse.com/security/cve/CVE-2014-8504/" source="CVE"/>
		<reference ref_id="CVE-2014-8737" ref_url="https://www.suse.com/security/cve/CVE-2014-8737/" source="CVE"/>
		<reference ref_id="CVE-2014-8738" ref_url="https://www.suse.com/security/cve/CVE-2014-8738/" source="CVE"/>
		<description>
This binutils update fixes the following security issues:

- bnc#902676: lack of range checking leading to controlled write in 
  _bfd_elf_setup_sections() (CVE-2014-8485)
- bnc#902677: invalid read flaw in libbfd (CVE-2014-8484)
- bnc#903655: Multiple memory corruption issues in binary parsers of 
  libbfd (CVE-2014-8501, CVE-2014-8502, CVE-2014-8503, CVE-2014-8504)
- bnc#905735: Out-of-bounds memory write while processing a crafted 'ar'
  archive (CVE-2014-8738)
- bnc#905736: Directory traversal vulnerability allowing random file 
  deletion/creation (CVE-2014-8737)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-19"/>
	<updated date="2015-01-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/902676">SUSE bug 902676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902677">SUSE bug 902677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903655">SUSE bug 903655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905735">SUSE bug 905735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905736">SUSE bug 905736</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8484/">CVE-2014-8484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8485/">CVE-2014-8485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8501/">CVE-2014-8501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8502/">CVE-2014-8502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8503/">CVE-2014-8503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8504/">CVE-2014-8504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8737/">CVE-2014-8737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8738/">CVE-2014-8738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514934" comment="binutils-2.24-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77328" version="1" class="patch">
	<metadata>
		<title>Security update for perl-XML-LibXML (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="929237" ref_url="https://bugzilla.suse.com/929237" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3451" ref_url="https://www.suse.com/security/cve/CVE-2015-3451/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001553.html" source="SUSE-SU"/>
		<description>

perl-XML-LibXML was updated to fix the expand_entities option to be preserved in all cases. (CVE-2015-3451).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-31"/>
	<updated date="2015-07-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/929237">SUSE bug 929237</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3451/">CVE-2015-3451</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514935" comment="perl-XML-LibXML-2.0019-5.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77329" version="1" class="patch">
	<metadata>
		<title>Security update for busybox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="914660" ref_url="https://bugzilla.suse.com/914660" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9645" ref_url="https://www.suse.com/security/cve/CVE-2014-9645/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001555.html" source="SUSE-SU"/>
		<description>
-The following issues are fixed by this update:
      CVE-2014-9645: do not allow / in module names to avoid loading bad modules (bnc#914660)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-31"/>
	<updated date="2015-07-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/914660">SUSE bug 914660</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9645/">CVE-2014-9645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514936" comment="busybox-1.21.1-3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77330" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="911796" ref_url="https://bugzilla.suse.com/911796" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9496" ref_url="https://www.suse.com/security/cve/CVE-2014-9496/" source="CVE"/>
		<description>

      This update fixes the following security issue:
      - two buffer read overflows in sd2_parse_rsrc_fork() (CVE-2014-9496, bnc#911796): backported upstream fix patches
		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-08"/>
	<updated date="2015-01-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/911796">SUSE bug 911796</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9496/">CVE-2014-9496</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514937" comment="libsndfile1-1.0.25-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514938" comment="libsndfile1-32bit-1.0.25-21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77331" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="940806" ref_url="https://bugzilla.suse.com/940806" source="BUGZILLA"/>
		<reference ref_id="943557" ref_url="https://bugzilla.suse.com/943557" source="BUGZILLA"/>
		<reference ref_id="943558" ref_url="https://bugzilla.suse.com/943558" source="BUGZILLA"/>
		<reference ref_id="943608" ref_url="https://bugzilla.suse.com/943608" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473/" source="CVE"/>
		<reference ref_id="CVE-2015-4474" ref_url="https://www.suse.com/security/cve/CVE-2015-4474/" source="CVE"/>
		<reference ref_id="CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475/" source="CVE"/>
		<reference ref_id="CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478/" source="CVE"/>
		<reference ref_id="CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479/" source="CVE"/>
		<reference ref_id="CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484/" source="CVE"/>
		<reference ref_id="CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485/" source="CVE"/>
		<reference ref_id="CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486/" source="CVE"/>
		<reference ref_id="CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487/" source="CVE"/>
		<reference ref_id="CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488/" source="CVE"/>
		<reference ref_id="CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492/" source="CVE"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="CVE-2015-4497" ref_url="https://www.suse.com/security/cve/CVE-2015-4497/" source="CVE"/>
		<reference ref_id="CVE-2015-4498" ref_url="https://www.suse.com/security/cve/CVE-2015-4498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox was updated to version 38.2.1 ESR to fix several
critical and non critical security vulnerabilities.

- Firefox was updated to 38.2.1 ESR (bsc#943608)
  * MFSA 2015-94/CVE-2015-4497 (bsc#943557)
    Use-after-free when resizing canvas element during restyling
  * MFSA 2015-95/CVE-2015-4498 (bsc#943558)
    Add-on notification bypass through data URLs

- Firefox was updated to 38.2.0 ESR (bsc#940806)
  * MFSA 2015-78/CVE-2015-4495
    (bmo#1178058, bmo#1179262)
    Same origin violation and local file stealing via PDF reader
  * MFSA 2015-79/CVE-2015-4473/CVE-2015-4474
    (bmo#1143130, bmo#1161719, bmo#1177501, bmo#1181204,
     bmo#1184068, bmo#1188590, bmo#1146213, bmo#1178890,
     bmo#1182711)
    Miscellaneous memory safety hazards (rv:40.0 / rv:38.2)
  * MFSA 2015-80/CVE-2015-4475
    (bmo#1175396)
    Out-of-bounds read with malformed MP3 file
  * MFSA 2015-82/CVE-2015-4478
    (bmo#1105914)
    Redefinition of non-configurable JavaScript object properties
  * MFSA 2015-83/CVE-2015-4479
    (bmo#1185115, bmo#1144107, bmo#1170344, bmo#1186718)
    Overflow issues in libstagefright
  * MFSA 2015-87/CVE-2015-4484
    (bmo#1171540)
    Crash when using shared memory in JavaScript
  * MFSA 2015-88/CVE-2015-4491
    (bmo#1184009)
    Heap overflow in gdk-pixbuf when scaling bitmap images
  * MFSA 2015-89/CVE-2015-4485/CVE-2015-4486
    (bmo#1177948, bmo#1178148)
    Buffer overflows on Libvpx when decoding WebM video
  * MFSA 2015-90/CVE-2015-4487/CVE-2015-4488/CVE-2015-4489
    (bmo#1176270, bmo#1182723, bmo#1171603)
    Vulnerabilities found through code inspection
  * MFSA 2015-92/CVE-2015-4492
    (bmo#1185820)
    Use-after-free in XMLHttpRequest with shared workers

Mozilla NSS switched the CKBI ABI from 1.98 to 2.4, which is what Firefox 38ESR uses.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-01"/>
	<updated date="2015-09-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943557">SUSE bug 943557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943558">SUSE bug 943558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943608">SUSE bug 943608</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4474/">CVE-2015-4474</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4497/">CVE-2015-4497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4498/">CVE-2015-4498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514939" comment="MozillaFirefox-38.2.1esr-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514940" comment="MozillaFirefox-branding-SLE-31.0-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514941" comment="MozillaFirefox-translations-38.2.1esr-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514942" comment="libfreebl3-3.19.2.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514943" comment="libfreebl3-32bit-3.19.2.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514944" comment="libsoftokn3-3.19.2.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514945" comment="libsoftokn3-32bit-3.19.2.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514946" comment="mozilla-nss-3.19.2.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514947" comment="mozilla-nss-32bit-3.19.2.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514948" comment="mozilla-nss-certs-3.19.2.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514949" comment="mozilla-nss-certs-32bit-3.19.2.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514950" comment="mozilla-nss-tools-3.19.2.0-26.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77332" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="914890" ref_url="https://bugzilla.suse.com/914890" source="BUGZILLA"/>
		<reference ref_id="916927" ref_url="https://bugzilla.suse.com/916927" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127/" source="CVE"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2014-8129" ref_url="https://www.suse.com/security/cve/CVE-2014-8129/" source="CVE"/>
		<reference ref_id="CVE-2014-8130" ref_url="https://www.suse.com/security/cve/CVE-2014-8130/" source="CVE"/>
		<reference ref_id="CVE-2014-9655" ref_url="https://www.suse.com/security/cve/CVE-2014-9655/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001561.html" source="SUSE-SU"/>
		<description>

LibTiff was updated to the 4.0.4 stable release fixing various security
issues and bugs.

These security issues were fixed:
- CVE-2014-8127: Out-of-bounds write (bnc#914890).
- CVE-2014-8128: Out-of-bounds write (bnc#914890).
- CVE-2014-8129: Out-of-bounds write (bnc#914890).
- CVE-2014-8130: Out-of-bounds write (bnc#914890).
- CVE-2014-9655: Access of uninitialized memory (bnc#916927).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-25"/>
	<updated date="2015-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916927">SUSE bug 916927</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8129/">CVE-2014-8129</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8130/">CVE-2014-8130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9655/">CVE-2014-9655</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514951" comment="libtiff5-4.0.4-12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514952" comment="libtiff5-32bit-4.0.4-12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77333" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="944066" ref_url="https://bugzilla.suse.com/944066" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5722" ref_url="https://www.suse.com/security/cve/CVE-2015-5722/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00006.html" source="SUSE-SU"/>
		<description>

The nameserver bind was updated to fix a remote denial of service (crash) attack against 
bind nameservers doing validation on DNSSEC signed records. (CVE-2015-5722, bsc#944066).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-02"/>
	<updated date="2015-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/944066">SUSE bug 944066</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5722/">CVE-2015-5722</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514953" comment="bind-libs-9.9.6P1-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514954" comment="bind-libs-32bit-9.9.6P1-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514955" comment="bind-utils-9.9.6P1-26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77334" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="800255" ref_url="https://bugzilla.suse.com/800255" source="BUGZILLA"/>
		<reference ref_id="809493" ref_url="https://bugzilla.suse.com/809493" source="BUGZILLA"/>
		<reference ref_id="829110" ref_url="https://bugzilla.suse.com/829110" source="BUGZILLA"/>
		<reference ref_id="856659" ref_url="https://bugzilla.suse.com/856659" source="BUGZILLA"/>
		<reference ref_id="862374" ref_url="https://bugzilla.suse.com/862374" source="BUGZILLA"/>
		<reference ref_id="873252" ref_url="https://bugzilla.suse.com/873252" source="BUGZILLA"/>
		<reference ref_id="875220" ref_url="https://bugzilla.suse.com/875220" source="BUGZILLA"/>
		<reference ref_id="884407" ref_url="https://bugzilla.suse.com/884407" source="BUGZILLA"/>
		<reference ref_id="887108" ref_url="https://bugzilla.suse.com/887108" source="BUGZILLA"/>
		<reference ref_id="887597" ref_url="https://bugzilla.suse.com/887597" source="BUGZILLA"/>
		<reference ref_id="889192" ref_url="https://bugzilla.suse.com/889192" source="BUGZILLA"/>
		<reference ref_id="891086" ref_url="https://bugzilla.suse.com/891086" source="BUGZILLA"/>
		<reference ref_id="891277" ref_url="https://bugzilla.suse.com/891277" source="BUGZILLA"/>
		<reference ref_id="893428" ref_url="https://bugzilla.suse.com/893428" source="BUGZILLA"/>
		<reference ref_id="895387" ref_url="https://bugzilla.suse.com/895387" source="BUGZILLA"/>
		<reference ref_id="895814" ref_url="https://bugzilla.suse.com/895814" source="BUGZILLA"/>
		<reference ref_id="902232" ref_url="https://bugzilla.suse.com/902232" source="BUGZILLA"/>
		<reference ref_id="902346" ref_url="https://bugzilla.suse.com/902346" source="BUGZILLA"/>
		<reference ref_id="902349" ref_url="https://bugzilla.suse.com/902349" source="BUGZILLA"/>
		<reference ref_id="903279" ref_url="https://bugzilla.suse.com/903279" source="BUGZILLA"/>
		<reference ref_id="903640" ref_url="https://bugzilla.suse.com/903640" source="BUGZILLA"/>
		<reference ref_id="904053" ref_url="https://bugzilla.suse.com/904053" source="BUGZILLA"/>
		<reference ref_id="904177" ref_url="https://bugzilla.suse.com/904177" source="BUGZILLA"/>
		<reference ref_id="904659" ref_url="https://bugzilla.suse.com/904659" source="BUGZILLA"/>
		<reference ref_id="904969" ref_url="https://bugzilla.suse.com/904969" source="BUGZILLA"/>
		<reference ref_id="905087" ref_url="https://bugzilla.suse.com/905087" source="BUGZILLA"/>
		<reference ref_id="905100" ref_url="https://bugzilla.suse.com/905100" source="BUGZILLA"/>
		<reference ref_id="906027" ref_url="https://bugzilla.suse.com/906027" source="BUGZILLA"/>
		<reference ref_id="906140" ref_url="https://bugzilla.suse.com/906140" source="BUGZILLA"/>
		<reference ref_id="906545" ref_url="https://bugzilla.suse.com/906545" source="BUGZILLA"/>
		<reference ref_id="907069" ref_url="https://bugzilla.suse.com/907069" source="BUGZILLA"/>
		<reference ref_id="907325" ref_url="https://bugzilla.suse.com/907325" source="BUGZILLA"/>
		<reference ref_id="907536" ref_url="https://bugzilla.suse.com/907536" source="BUGZILLA"/>
		<reference ref_id="907593" ref_url="https://bugzilla.suse.com/907593" source="BUGZILLA"/>
		<reference ref_id="907714" ref_url="https://bugzilla.suse.com/907714" source="BUGZILLA"/>
		<reference ref_id="907818" ref_url="https://bugzilla.suse.com/907818" source="BUGZILLA"/>
		<reference ref_id="907969" ref_url="https://bugzilla.suse.com/907969" source="BUGZILLA"/>
		<reference ref_id="907970" ref_url="https://bugzilla.suse.com/907970" source="BUGZILLA"/>
		<reference ref_id="907971" ref_url="https://bugzilla.suse.com/907971" source="BUGZILLA"/>
		<reference ref_id="907973" ref_url="https://bugzilla.suse.com/907973" source="BUGZILLA"/>
		<reference ref_id="908057" ref_url="https://bugzilla.suse.com/908057" source="BUGZILLA"/>
		<reference ref_id="908163" ref_url="https://bugzilla.suse.com/908163" source="BUGZILLA"/>
		<reference ref_id="908198" ref_url="https://bugzilla.suse.com/908198" source="BUGZILLA"/>
		<reference ref_id="908803" ref_url="https://bugzilla.suse.com/908803" source="BUGZILLA"/>
		<reference ref_id="908825" ref_url="https://bugzilla.suse.com/908825" source="BUGZILLA"/>
		<reference ref_id="908904" ref_url="https://bugzilla.suse.com/908904" source="BUGZILLA"/>
		<reference ref_id="909077" ref_url="https://bugzilla.suse.com/909077" source="BUGZILLA"/>
		<reference ref_id="909092" ref_url="https://bugzilla.suse.com/909092" source="BUGZILLA"/>
		<reference ref_id="909095" ref_url="https://bugzilla.suse.com/909095" source="BUGZILLA"/>
		<reference ref_id="909829" ref_url="https://bugzilla.suse.com/909829" source="BUGZILLA"/>
		<reference ref_id="910249" ref_url="https://bugzilla.suse.com/910249" source="BUGZILLA"/>
		<reference ref_id="910697" ref_url="https://bugzilla.suse.com/910697" source="BUGZILLA"/>
		<reference ref_id="911181" ref_url="https://bugzilla.suse.com/911181" source="BUGZILLA"/>
		<reference ref_id="911325" ref_url="https://bugzilla.suse.com/911325" source="BUGZILLA"/>
		<reference ref_id="912129" ref_url="https://bugzilla.suse.com/912129" source="BUGZILLA"/>
		<reference ref_id="912278" ref_url="https://bugzilla.suse.com/912278" source="BUGZILLA"/>
		<reference ref_id="912281" ref_url="https://bugzilla.suse.com/912281" source="BUGZILLA"/>
		<reference ref_id="912290" ref_url="https://bugzilla.suse.com/912290" source="BUGZILLA"/>
		<reference ref_id="912514" ref_url="https://bugzilla.suse.com/912514" source="BUGZILLA"/>
		<reference ref_id="912705" ref_url="https://bugzilla.suse.com/912705" source="BUGZILLA"/>
		<reference ref_id="912946" ref_url="https://bugzilla.suse.com/912946" source="BUGZILLA"/>
		<reference ref_id="913233" ref_url="https://bugzilla.suse.com/913233" source="BUGZILLA"/>
		<reference ref_id="913387" ref_url="https://bugzilla.suse.com/913387" source="BUGZILLA"/>
		<reference ref_id="913466" ref_url="https://bugzilla.suse.com/913466" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3687" ref_url="https://www.suse.com/security/cve/CVE-2014-3687/" source="CVE"/>
		<reference ref_id="CVE-2014-3690" ref_url="https://www.suse.com/security/cve/CVE-2014-3690/" source="CVE"/>
		<reference ref_id="CVE-2014-8559" ref_url="https://www.suse.com/security/cve/CVE-2014-8559/" source="CVE"/>
		<reference ref_id="CVE-2014-9420" ref_url="https://www.suse.com/security/cve/CVE-2014-9420/" source="CVE"/>
		<reference ref_id="CVE-2014-9585" ref_url="https://www.suse.com/security/cve/CVE-2014-9585/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 12 kernel was updated to 3.12.36 to receive
various security and bugfixes.

Following security bugs were fixed:
- CVE-2014-8559: The d_walk function in fs/dcache.c in the Linux kernel
  through 3.17.2 did not properly maintain the semantics of rename_lock,
  which allowed local users to cause a denial of service (deadlock and
  system hang) via a crafted application (bnc#903640).
- CVE-2014-9420: The rock_continue function in fs/isofs/rock.c in the
  Linux kernel through 3.18.1 did not restrict the number of Rock Ridge
  continuation entries, which allowed local users to cause a denial of
  service (infinite loop, and system crash or hang) via a crafted iso9660
  image (bnc#906545 911325).
- CVE-2014-3690: arch/x86/kvm/vmx.c in the KVM subsystem in the Linux
  kernel before 3.17.2 on Intel processors did not ensure that the value
  in the CR4 control register remained the same after a VM entry, which
  allowed host OS users to kill arbitrary processes or cause a denial of
  service (system disruption) by leveraging /dev/kvm access, as
  demonstrated by PR_SET_TSC prctl calls within a modified copy of QEMU
  (bnc#902232).
- CVE-2014-3687: The sctp_assoc_lookup_asconf_ack function in
  net/sctp/associola.c in the SCTP implementation in the Linux kernel
  through 3.17.2 allowed remote attackers to cause a denial of service
  (panic) via duplicate ASCONF chunks that triggered an incorrect uncork
  within the side-effect interpreter (bnc#902349).
- CVE-2014-9585: The vdso_addr function in arch/x86/vdso/vma.c in the
  Linux kernel through 3.18.2 did not properly choose memory locations
  for the vDSO area, which made it easier for local users to bypass the
  ASLR protection mechanism by guessing a location at the end of a PMD
  (bnc#912705).

The following non-security bugs were fixed:
- ACPI idle: permit sparse C-state sub-state numbers (bnc#907969).
- ALSA: hda - verify pin:converter connection on unsol event for HSW and
  VLV.
- ALSA: hda - verify pin:cvt connection on preparing a stream for Intel
  HDMI codec.
- ALSA: hda/hdmi - apply Valleyview fix-ups to Cherryview display codec.
- ALSA: hda_intel: Add Device IDs for Intel Sunrise Point PCH.
- ALSA: hda_intel: Add DeviceIDs for Sunrise Point-LP.
- Btrfs: Disable
  patches.suse/Btrfs-fix-abnormal-long-waiting-in-fsync.patch
  (bnc#910697) because it needs to be revisited due partial msync behavior.
- Btrfs: Fix misuse of chunk mutex (bnc#912514).
- Btrfs: always clear a block group node when removing it from the tree
  (bnc#912514).
- Btrfs: collect only the necessary ordered extents on ranged fsync
  (bnc#912946).
- Btrfs: do not access non-existent key when csum tree is empty.
- Btrfs: do not delay inode ref updates during log replay.
- Btrfs: do not ignore log btree writeback errors (bnc#912946).
- Btrfs: ensure btrfs_prev_leaf does not miss 1 item.
- Btrfs: ensure deletion from pinned_chunks list is protected
  (bnc#908198).
- Btrfs: ensure ordered extent errors are not missed on fsync
  (bnc#912946).
- Btrfs: fix abnormal long waiting in fsync (VM/FS Micro-optimisations).
- Btrfs: fix abnormal long waiting in fsync (bnc#912946).
- Btrfs: fix crash caused by block group removal (bnc#912514).
- Btrfs: fix freeing used extent after removing empty block group
  (bnc#912514).
- Btrfs: fix freeing used extents after removing empty block group
  (bnc#912514).
- Btrfs: fix fs corruption on transaction abort if device supports
  discard (bnc#908198).
- Btrfs: fix fs mapping extent map leak (bnc#908198).
- Btrfs: fix invalid block group rbtree access after bg is removed
  (bnc#912514).
- Btrfs: fix memory leak after block remove + trimming (bnc#908198).
- Btrfs: fix race between fs trimming and block group remove/allocation
  (bnc#908198).
- Btrfs: fix race between writing free space cache and trimming
  (bnc#908198).
- Btrfs: fix transaction leak during fsync call.
- Btrfs: fix unprotected deletion from pending_chunks list (bnc#908198).
- Btrfs: fix unprotected system chunk array insertion (bnc#912514).
- Btrfs: free ulist in qgroup_shared_accounting() error path.
- Btrfs: ioctl, do not re-lock extent range when not necessary.
- Btrfs: make btrfs_abort_transaction consider existence of new block
  groups (bnc#908198).
- Btrfs: make sure logged extents complete in the current transaction V3
  (bnc#912946).
- Btrfs: make sure we wait on logged extents when fsycning two subvols
  (bnc#912946).
- Btrfs: make xattr replace operations atomic (bnc#913466).
- Btrfs: remove empty block groups automatically (bnc#912514).
- Btrfs: remove unused wait queue in struct extent_buffer.
- Btrfs: replace EINVAL with ERANGE for resize when ULLONG_MAX.
- Btrfs: use helpers for last_trans_log_full_commit instead of opencode
  (bnc#912946).
- Drivers: hv: kvp,vss: Fast propagation of userspace communication
  failure.
- Drivers: hv: util: Properly pack the data for file copy functionality.
- Drivers: hv: util: make struct hv_do_fcopy match Hyper-V host messages.
- Drivers: hv: vmbus: Fix a race condition when unregistering a device.
- Drivers: hv: vss: Introduce timeout for communication with userspace.
- Fixed warning on DP unplugging driver in intel_dp.c (bnc#907536).
- Fixed warning on suspend in intel_display.c (bnc#907593).
- KEYS: Fix stale key registration at error path (bnc#908163).
- PCI/MSI: Add pci_enable_msi_range() and pci_enable_msix_range()
  (bug#912281).
- PCI/MSI: Add pci_enable_msi_range() and pci_enable_msix_range()
  (bug#912281).
- Refresh patches.xen/xen3-patch-3.9 (bsc#909829).
- Remove filesize checks for sync I/O journal commit (bnc#800255).
- SELinux: fix selinuxfs policy file on big endian systems (bsc#913233).
- Tools: hv: vssdaemon: ignore the EBUSY on multiple freezing the same
  partition.
- Tools: hv: vssdaemon: report freeze errors.
- Tools: hv: vssdaemon: skip all filesystems mounted readonly.
- Update Xen patches to 3.12.35.
- Update s390x kabi files again (bnc#903279, LTC#118177)
- benet: Use pci_enable_msix_range() instead of pci_enable_msix()
  (bug#912281).
- bfa: check for terminated commands (bnc#906027).
- cpuidle / menu: Return (-1) if there are no suitable states (cpuidle
  performance).
- cpuidle / menu: move repeated correction factor check to init (cpuidle
  performance).
- cpuidle: Do not substract exit latency from assumed sleep length
  (cpuidle performance).
- cpuidle: Ensure menu coefficients stay within domain (cpuidle
  performance).
- cpuidle: Move perf multiplier calculation out of the selection loop
  (cpuidle performance).
- cpuidle: Use actual state latency in menu governor (cpuidle
  performance).
- cpuidle: menu governor - remove unused macro STDDEV_THRESH (cpuidle
  performance).
- cpuidle: menu: Call nr_iowait_cpu less times (cpuidle performance).
- cpuidle: menu: Lookup CPU runqueues less (cpuidle performance).
- cpuidle: menu: Use ktime_to_us instead of reinventing the wheel
  (cpuidle performance).
- cpuidle: menu: Use shifts when calculating averages where possible
  (cpuidle performance).
- cpuidle: rename expected_us to next_timer_us in menu governor (cpuidle
  performance).
- crypto: aesni - Add support for 192 &amp; 256 bit keys to AESNI RFC4106
  (bsc#913387).
- crypto: kernel oops at insmod of the z90crypt device driver
  (bnc#908057, LTC#119591).
- cxgb4: Add the MC1 registers to read in the interrupt handler
  (bsc#912290).
- cxgb4: Allow T4/T5 firmware sizes up to 1MB (bsc#912290).
- cxgb4: Fix FW flash logic using ethtool (bsc#912290).
- cxgb4: Fix T5 adapter accessing T4 adapter registers (bsc#912290).
- cxgb4: Fix for handling 1Gb/s SFP+ Transceiver Modules (bsc#912290).
- cxgb4: Fix race condition in cleanup (bsc#912290).
- cxgb4: Free completed tx skbs promptly (bsc#912290).
- cxgb4: Not need to hold the adap_rcu_lock lock when read adap_rcu_list
  (bsc#912290).
- cxgb4: Use FW interface to get BAR0 value (bsc#912290).
- drm/i915: Do a dummy DPCD read before the actual read (bnc#907714).
- drm: add MIPI DSI encoder and connector types (bnc#907971).
- ext4: cache extent hole in extent status tree for ext4_da_map_blocks()
  (bnc#893428).
- ext4: change LRU to round-robin in extent status tree shrinker
  (bnc#893428).
- ext4: cleanup flag definitions for extent status tree (bnc#893428).
- ext4: fix block reservation for bigalloc filesystems (bnc#893428).
- ext4: improve extents status tree trace point (bnc#893428).
- ext4: introduce aging to extent status tree (bnc#893428).
- ext4: limit number of scanned extents in status tree shrinker
  (bnc#893428).
- ext4: move handling of list of shrinkable inodes into extent status
  code (bnc#893428).
- ext4: track extent status tree shrinker delay statictics (bnc#893428).
- fix kABI after 'x86: use custom dma_get_required_mask()'.
- fsnotify: next_i is freed during fsnotify_unmount_inodes (bnc#908904).
- hv: hv_balloon: avoid memory leak on alloc_error of 2MB memory block.
- hyperv: Add processing of MTU reduced by the host.
- hyperv: Fix some variable name typos in send-buffer init/revoke.
- hyperv: Fix the total_data_buflen in send path.
- intel_idle: Add CPU model 54 (Atom N2000 series) (bnc#907969).
- intel_idle: allow sparse sub-state numbering, for Bay Trail
  (bnc#907969).
- intel_idle: support Bay Trail (bnc#907969).
- intel_pstate: Add setting voltage value for baytrail P states
  (bnc#907973).
- intel_pstate: Add support for Baytrail turbo P states (bnc#907973).
- intel_pstate: Fix BYT frequency reporting (bnc#907973).
- intel_pstate: Fix setting VID (bnc#907973).
- intel_pstate: Set turbo VID for BayTrail (bnc#907973).
- intel_pstate: Use LFM bus ratio as min ratio/P state (bnc#907973).
- iommu/vt-d: Fix an off-by-one bug in __domain_mapping() (bsc#908825).
- ipc/sem.c: change memory barrier in sem_lock() to smp_rmb() (IPC
  scalability).
- isofs: Fix unchecked printing of ER records.
- kABI: fix for move of d_rcu (bnc#903640 CVE-2014-8559).
- kABI: protect ipv6.h include in drivers/net.
- kABI: protect rmap include in mm/truncate.c.
- kABI: protect struct iwl_trans.
- kABI: protect struct pci_dev.
- kABI: protect struct user_namespace.
- kABI: protect user_namespace.h include in kernel/groups.c.
- kABI: reintroduce generic_write_sync.
- kABI: uninline of_property_count_string* functions. Omitted ppc64le
  kabi fix for 3.12.33.
- kernel: kprobes instruction corruption (bnc#908057, LTC#119330).
- kernel: reduce function tracer overhead (bnc#903279, LTC#118177).
- kgr: allow to search various types of struct kgr_patch_fun.
- kgr: be consistent when applying patches on loaded modules.
- kgr: fix replace_all.
- kgr: fix typo in error message.
- kgr: fix unwinder and user addresses (bnc#908803).
- kgr: handle IRQ context using global variable.
- kgr: mark even more kthreads (bnc#905087 bnc#906140).
- kgr: prevent recursive loops of stubs in ftrace.
- kgr: set revert slow state for all reverted symbols when loading
  patched module.
- kgr: unregister only the used ftrace ops when removing a patched
  module.
- kprobes: introduce weak arch_check_ftrace_location() helper function
  (bnc#903279, LTC#118177).
- kvm: Do not expose MONITOR cpuid as available (bnc#887597)
- lpfc: Fix race on command completion (bnc#906027).
- macvlan: allow setting LRO independently of lower device (bnc#829110
  bnc#891277 bnc#904053).
- mm, cma: drain single zone pcplists (VM Performance, bnc#904177).
- mm, compaction: always update cached scanner positions (VM Performance,
  bnc#904177).
- mm, compaction: defer each zone individually instead of preferred zone
  (VM Performance, bnc#904177).
- mm, compaction: defer only on COMPACT_COMPLETE (VM Performance,
  bnc#904177).
- mm, compaction: do not count compact_stall if all zones skipped
  compaction (VM Performance, bnc#904177).
- mm, compaction: do not recheck suitable_migration_target under lock (VM
  Performance, bnc#904177).
- mm, compaction: khugepaged should not give up due to need_resched() (VM
  Performance, bnc#904177).
- mm, compaction: more focused lru and pcplists draining (VM Performance,
  bnc#904177).
- mm, compaction: move pageblock checks up from
  isolate_migratepages_range() (VM Performance, bnc#904177).
- mm, compaction: pass classzone_idx and alloc_flags to watermark
  checking (VM Performance, bnc#904177).
- mm, compaction: pass gfp mask to compact_control (VM Cleanup,
  bnc#904177).
- mm, compaction: periodically drop lock and restore IRQs in scanners (VM
  Performance, bnc#904177).
- mm, compaction: prevent infinite loop in compact_zone (VM
  Functionality, bnc#904177).
- mm, compaction: reduce zone checking frequency in the migration scanner
  (VM Performance, bnc#904177).
- mm, compaction: remember position within pageblock in free pages
  scanner (VM Performance, bnc#904177).
- mm, compaction: simplify deferred compaction (VM Performance,
  bnc#904177).
- mm, compaction: skip buddy pages by their order in the migrate scanner
  (VM Performance, bnc#904177).
- mm, compaction: skip rechecks when lock was already held (VM
  Performance, bnc#904177).
- mm, memory_hotplug/failure: drain single zone pcplists (VM Performance,
  bnc#904177).
- mm, page_isolation: drain single zone pcplists (VM Performance,
  bnc#904177).
- mm, thp: avoid excessive compaction latency during fault (VM
  Performance, bnc#904177).
- mm, thp: restructure thp avoidance of light synchronous migration (VM
  Performance, bnc#904177).
- mm/compaction.c: avoid premature range skip in
  isolate_migratepages_range (VM Functionality, bnc#904177).
- mm/compaction: skip the range until proper target pageblock is met (VM
  Performance, bnc#904177).
- mm/vmscan.c: use DIV_ROUND_UP for calculation of zones balance_gap and
  correct comments (VM Cleanup, bnc#904177).
- mm/vmscan: do not check compaction_ready on promoted zones (VM Cleanup,
  bnc#904177).
- mm/vmscan: restore sc-&gt;gfp_mask after promoting it to __GFP_HIGHMEM (VM
  Cleanup, bnc#904177).
- mm: Disable patches.suse/msync-fix-incorrect-fstart-calculation.patch
  (bnc#910697) because it needs to be revisited due partial msync
  behavior.
- mm: Disabled
  patches.suse/mm-msync.c-sync-only-the-requested-range-in-msync.patch
  (bnc#910697) because it needs to be revisited due partial msync behavior.
- mm: improve documentation of page_order (VM Cleanup, bnc#904177).
- mm: introduce single zone pcplists drain (VM Performance, bnc#904177).
- mm: memcontrol: remove hierarchy restrictions for swappiness and
  oom_control (VM Cleanup, bnc#904177).
- mm: page_alloc: determine migratetype only once (VM Performance,
  bnc#904177).
- mm: rename allocflags_to_migratetype for clarity (VM Cleanup,
  bnc#904177).
- mm: unmapped page migration avoid unmap+remap overhead (MM
  performance).
- mm: vmscan: clean up struct scan_control (VM Cleanup, bnc#904177).
- mm: vmscan: move call to shrink_slab() to shrink_zones() (VM Cleanup,
  bnc#904177).
- mm: vmscan: move swappiness out of scan_control (VM Cleanup,
  bnc#904177).
- mm: vmscan: remove all_unreclaimable() (VM Cleanup, bnc#904177).
- mm: vmscan: remove remains of kswapd-managed zone-&gt;all_unreclaimable
  (VM Cleanup, bnc#904177).
- mm: vmscan: remove shrink_control arg from do_try_to_free_pages() (VM
  Cleanup, bnc#904177).
- mm: vmscan: rework compaction-ready signaling in direct reclaim (VM
  Cleanup, bnc#904177).
- msync: fix incorrect fstart calculation (VM/FS Micro-optimisations).
- net, sunrpc: suppress allocation warning in rpc_malloc() (bnc#904659).
- net: Find the nesting level of a given device by type (bnc#829110
  bnc#891277 bnc#904053).
- net: Hyper-V: Deletion of an unnecessary check before the function call
  'vfree'.
- net: generic dev_disable_lro() stacked device handling (bnc#829110
  bnc#891277 bnc#904053).
- nvme: Add missing hunk from backport (bnc#873252).
- parport: parport_pc, do not remove parent devices early (bnc#856659).
- patches.suse/supported-flag: fix mis-reported supported status
  (bnc#809493).
- patches.xen/xen-privcmd-hcall-preemption: Fix EFLAGS.IF check.
- powerpc/fadump: Fix endianess issues in firmware assisted dump handling
  (bsc#889192).
- powerpc/pseries/hvcserver: Fix endian issue in hvcs_get_partner_info
  (bsc#912129).
- powerpc/pseries: Make CPU hotplug path endian safe (bsc#907069).
- powerpc: fix dlpar memory
- pseries: Fix endian issues in cpu hot-removal (bsc#907069).
- pseries: Fix endian issues in onlining cpu threads (bsc#907069).
- rpm/constraints.in: Require 10GB disk space on POWER A debuginfo build
  currently requires about 8.5 GB on POWER. Also, require at least 8
  CPUs, so that builds do not get accidentally scheduled on slow machines.
- rpm/gitlog-fixups: Fix invalid address in two commits
- s390/ftrace,kprobes: allow to patch first instruction (bnc#903279,
  LTC#118177).
- s390/ftrace: add HAVE_DYNAMIC_FTRACE_WITH_REGS support (bnc#903279,
  LTC#118177).
- s390/ftrace: add code replacement sanity checks (bnc#903279,
  LTC#118177).
- s390/ftrace: enforce DYNAMIC_FTRACE if FUNCTION_TRACER is selected
  (bnc#903279, LTC#118177).
- s390/ftrace: optimize function graph caller code (bnc#903279,
  LTC#118177).
- s390/ftrace: optimize mcount code (bnc#903279, LTC#118177).
- s390/ftrace: remove 31 bit ftrace support (bnc#903279, LTC#118177).
- s390/ftrace: remove check of obsolete variable function_trace_stop
  (bnc#903279, LTC#118177).
- s390/ftrace: revert mcount_adjust change (bnc#903279, LTC#118177).
- s390/ftrace: simplify enabling/disabling of ftrace_graph_caller
  (bnc#903279, LTC#118177).
- s390: pass march flag to assembly files as well (bnc#903279,
  LTC#118177).
- sched/fair: cleanup: Remove useless assignment in select_task_rq_fair()
  (cpuidle performance).
- scripts/tags.sh: Do not specify kind-spec for emacs ctags/etags.
- scripts/tags.sh: fix DEFINE_HASHTABLE in emacs case.
- scripts/tags.sh: include compat_sys_* symbols in the generated tags.
- scsi: call device handler for failed TUR command (bnc#895814).
- series.conf: remove orphan bnc comments
- storvsc: ring buffer failures may result in I/O freeze.
- supported.conf: mark tcm_qla2xxx as supported Has not been ported from
  SLES11 SP3 automatically.
- tags.sh: Fixup regex definition for etags.
- tcm_loop: Wrong I_T nexus association (bnc#907325).
- tools: hv: ignore ENOBUFS and ENOMEM in the KVP daemon.
- tools: hv: introduce -n/--no-daemon option.
- udf: Check component length before reading it.
- udf: Check path length when reading symlink.
- udf: Verify i_size when loading inode.
- udf: Verify symlink size before loading it.
- vmscan: memcg: always use swappiness of the reclaimed memcg (VM
  Cleanup, bnc#904177).
- x86, cpu: Detect more TLB configuration (TLB Performance).
- x86-64/MCE: flip CPU and bank numbers in log message.
- x86/UV: Fix conditional in gru_exit() (bsc#909095).
- x86/early quirk: use gen6 stolen detection for VLV (bnc#907970).
- x86/efi: Do not export efi runtime map in case old map (bsc#904969).
- x86/mm: Add tracepoints for TLB flushes (TLB Performance).
- x86/mm: Rip out complicated, out-of-date, buggy TLB flushing (TLB
  Performance).
- x86/uv: Update the UV3 TLB shootdown logic (bsc#909092).
- x86: UV BAU: Avoid NULL pointer reference in ptc_seq_show (bsc#911181).
- x86: UV BAU: Increase maximum CPUs per socket/hub (bsc#911181).
- x86: fix step size adjustment during initial memory mapping
  (bsc#910249).
- x86: use custom dma_get_required_mask().
- x86: use optimized ioresource lookup in ioremap function (Boot time
  optimisations (bnc#895387)).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-21"/>
	<updated date="2015-01-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/800255">SUSE bug 800255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809493">SUSE bug 809493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829110">SUSE bug 829110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856659">SUSE bug 856659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862374">SUSE bug 862374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873252">SUSE bug 873252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875220">SUSE bug 875220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884407">SUSE bug 884407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887108">SUSE bug 887108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887597">SUSE bug 887597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889192">SUSE bug 889192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891086">SUSE bug 891086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891277">SUSE bug 891277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893428">SUSE bug 893428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895387">SUSE bug 895387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895814">SUSE bug 895814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902232">SUSE bug 902232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902346">SUSE bug 902346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902349">SUSE bug 902349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903279">SUSE bug 903279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903640">SUSE bug 903640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904053">SUSE bug 904053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904177">SUSE bug 904177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904659">SUSE bug 904659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904969">SUSE bug 904969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905087">SUSE bug 905087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905100">SUSE bug 905100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906027">SUSE bug 906027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906140">SUSE bug 906140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906545">SUSE bug 906545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907069">SUSE bug 907069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907325">SUSE bug 907325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907536">SUSE bug 907536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907593">SUSE bug 907593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907714">SUSE bug 907714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907818">SUSE bug 907818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907969">SUSE bug 907969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907970">SUSE bug 907970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907971">SUSE bug 907971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907973">SUSE bug 907973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908057">SUSE bug 908057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908163">SUSE bug 908163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908198">SUSE bug 908198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908803">SUSE bug 908803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908825">SUSE bug 908825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908904">SUSE bug 908904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909077">SUSE bug 909077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909092">SUSE bug 909092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909095">SUSE bug 909095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909829">SUSE bug 909829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910249">SUSE bug 910249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910697">SUSE bug 910697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911181">SUSE bug 911181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911325">SUSE bug 911325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912129">SUSE bug 912129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912278">SUSE bug 912278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912281">SUSE bug 912281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912290">SUSE bug 912290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912514">SUSE bug 912514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912705">SUSE bug 912705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912946">SUSE bug 912946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913233">SUSE bug 913233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913387">SUSE bug 913387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913466">SUSE bug 913466</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3687/">CVE-2014-3687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3690/">CVE-2014-3690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8559/">CVE-2014-8559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9420/">CVE-2014-9420</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9585/">CVE-2014-9585</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514956" comment="kernel-default-3.12.36-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514957" comment="kernel-default-devel-3.12.36-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514958" comment="kernel-default-extra-3.12.36-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514959" comment="kernel-devel-3.12.36-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514960" comment="kernel-macros-3.12.36-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514961" comment="kernel-source-3.12.36-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514962" comment="kernel-syms-3.12.36-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514963" comment="kernel-xen-3.12.36-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514964" comment="kernel-xen-devel-3.12.36-38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77335" version="1" class="patch">
	<metadata>
		<title>Security update for libwmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="495842" ref_url="https://bugzilla.suse.com/495842" source="BUGZILLA"/>
		<reference ref_id="831299" ref_url="https://bugzilla.suse.com/831299" source="BUGZILLA"/>
		<reference ref_id="933109" ref_url="https://bugzilla.suse.com/933109" source="BUGZILLA"/>
		<reference ref_id="936058" ref_url="https://bugzilla.suse.com/936058" source="BUGZILLA"/>
		<reference ref_id="936062" ref_url="https://bugzilla.suse.com/936062" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1364" ref_url="https://www.suse.com/security/cve/CVE-2009-1364/" source="CVE"/>
		<reference ref_id="CVE-2015-0848" ref_url="https://www.suse.com/security/cve/CVE-2015-0848/" source="CVE"/>
		<reference ref_id="CVE-2015-4588" ref_url="https://www.suse.com/security/cve/CVE-2015-4588/" source="CVE"/>
		<reference ref_id="CVE-2015-4695" ref_url="https://www.suse.com/security/cve/CVE-2015-4695/" source="CVE"/>
		<reference ref_id="CVE-2015-4696" ref_url="https://www.suse.com/security/cve/CVE-2015-4696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001569.html" source="SUSE-SU"/>
		<description>
libwmf was updated to fix five security issues.

These security issues were fixed:
- CVE-2009-1364: Fixed realloc return value usage (bsc#495842, bnc#831299)
- CVE-2015-0848: Heap overflow on libwmf0.2-7 (bsc#933109)
- CVE-2015-4588: DecodeImage() did not check that the run-length 'count' fits into the total size of the image, which could lead to a heap-based buffer overflow (bsc#933109)
- CVE-2015-4695: meta_pen_create heap buffer over read (bsc#936058)
- CVE-2015-4696: Use after free (bsc#936062)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-31"/>
	<updated date="2015-07-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/495842">SUSE bug 495842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831299">SUSE bug 831299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933109">SUSE bug 933109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936058">SUSE bug 936058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936062">SUSE bug 936062</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1364/">CVE-2009-1364</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0848/">CVE-2015-0848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4588/">CVE-2015-4588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4695/">CVE-2015-4695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4696/">CVE-2015-4696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514965" comment="libwmf-0_2-7-0.2.8.4-242.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77336" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="903489" ref_url="https://bugzilla.suse.com/903489" source="BUGZILLA"/>
		<reference ref_id="903719" ref_url="https://bugzilla.suse.com/903719" source="BUGZILLA"/>
		<reference ref_id="904207" ref_url="https://bugzilla.suse.com/904207" source="BUGZILLA"/>
		<reference ref_id="906077" ref_url="https://bugzilla.suse.com/906077" source="BUGZILLA"/>
		<reference ref_id="906770" ref_url="https://bugzilla.suse.com/906770" source="BUGZILLA"/>
		<reference ref_id="908731" ref_url="https://bugzilla.suse.com/908731" source="BUGZILLA"/>
		<reference ref_id="914505" ref_url="https://bugzilla.suse.com/914505" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6497" ref_url="https://www.suse.com/security/cve/CVE-2013-6497/" source="CVE"/>
		<reference ref_id="CVE-2014-9050" ref_url="https://www.suse.com/security/cve/CVE-2014-9050/" source="CVE"/>
		<description>

Clamav was updated to version 0.98.5:

* Support for the XDP file format and extracting, decoding, and
  scanning PDF files within XDP files.

* Addition of shared library support for LLVM versions 3.1 - 3.5
  for the purpose of just-in-time(JIT) compilation of ClamAV
  bytecode signatures.
* Enhancements to the clambc command line utility to assist
  ClamAV bytecode signature authors by providing introspection
  into compiled bytecode programs.
* Resolution of many of the warning messages from ClamAV
  compilation.
* Improved detection of malicious PE files
  (bnc#906770, CVE-2014-9050)
* Security fix for ClamAV crash when using 'clamscan -a'.
* Security fix for ClamAV crash when scanning maliciously
  crafted yoda's crypter files (bnc#906077, CVE-2013-6497).
* ClamAV 0.98.5 now works with OpenSSL in FIPS compliant
  mode (bnc#904207).
* Fix server socket setup code in clamd (bnc#903489).

- Change updateclamconf to prefer the state of the old config
  file even for commented-out options (bnc#903719) (bnc#908731).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-26"/>
	<updated date="2015-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/903489">SUSE bug 903489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903719">SUSE bug 903719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904207">SUSE bug 904207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906077">SUSE bug 906077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906770">SUSE bug 906770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908731">SUSE bug 908731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914505">SUSE bug 914505</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6497/">CVE-2013-6497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9050/">CVE-2014-9050</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514966" comment="clamav-0.98.5-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77337" version="1" class="patch">
	<metadata>
		<title>Security update for zeromq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="912460" ref_url="https://bugzilla.suse.com/912460" source="BUGZILLA"/>
		<reference ref_id="931978" ref_url="https://bugzilla.suse.com/931978" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9721" ref_url="https://www.suse.com/security/cve/CVE-2014-9721/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001578.html" source="SUSE-SU"/>
		<description>
zeromq was updated to fix one security issue and one non-security bug.

The following vulnerability was fixed:

* CVE-2014-9721: zeromq protocol downgrade attack on sockets using the ZMTP v3 protocol (boo#931978)

The following bug was fixed:

* boo#912460: avoid curve test to hang for ppc ppc64 ppc64le architectures
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-31"/>
	<updated date="2015-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/912460">SUSE bug 912460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931978">SUSE bug 931978</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-9721/">CVE-2014-9721</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514967" comment="libzmq3-4.0.4-13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77338" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="906364" ref_url="https://bugzilla.suse.com/906364" source="BUGZILLA"/>
		<reference ref_id="909474" ref_url="https://bugzilla.suse.com/909474" source="BUGZILLA"/>
		<reference ref_id="909475" ref_url="https://bugzilla.suse.com/909475" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8137" ref_url="https://www.suse.com/security/cve/CVE-2014-8137/" source="CVE"/>
		<reference ref_id="CVE-2014-9029" ref_url="https://www.suse.com/security/cve/CVE-2014-9029/" source="CVE"/>
		<description>
This libjasper update fixes the following three security issues:

- bnc#906364: heap overflows in libjasper (CVE-2014-9029)
- bnc#909474: double-free in jas_iccattrval_destroy() (CVE-2014-8137)
- bnc#909475: heap overflow in jas_decode() (CVE-2014-8138)
		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-19"/>
	<updated date="2014-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/906364">SUSE bug 906364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909474">SUSE bug 909474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909475">SUSE bug 909475</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8137/">CVE-2014-8137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9029/">CVE-2014-9029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514968" comment="libjasper1-1.900.1-166.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514969" comment="libjasper1-32bit-1.900.1-166.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77339" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="920057" ref_url="https://bugzilla.suse.com/920057" source="BUGZILLA"/>
		<reference ref_id="938343" ref_url="https://bugzilla.suse.com/938343" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0837" ref_url="https://www.suse.com/security/cve/CVE-2015-0837/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001579.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

Security:
* Fixed data-dependent timing variations in modular exponentiation
  [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
   are Practical] (bsc#920057)

Bugfixes:
* don't drop privileges when locking secure memory (bsc#938343)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-17"/>
	<updated date="2015-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/920057">SUSE bug 920057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938343">SUSE bug 938343</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0837/">CVE-2015-0837</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514970" comment="libgcrypt20-1.6.1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514971" comment="libgcrypt20-32bit-1.6.1-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77340" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="893892" ref_url="https://bugzilla.suse.com/893892" source="BUGZILLA"/>
		<reference ref_id="932267" ref_url="https://bugzilla.suse.com/932267" source="BUGZILLA"/>
		<reference ref_id="932770" ref_url="https://bugzilla.suse.com/932770" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html" source="SUSE-SU"/>
		<description>
qemu was updated to fix two security issues and augments one non-security bug fix.

The following vulnerabilities were fixed:

* CVE-2015-3209: heap overflow in qemu pcnet controller allowing guest to host escape (XSA-135) (bsc#932770)
* CVE-2015-4037: Avoid predictable directory name for smb config (bsc#932267)

The fix for the following non-security bug was improved:

* bsc#893892: Use improved upstream patch for display issue affecting installs of SLES 11 VMs on SLES 12
		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-08"/>
	<updated date="2015-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/893892">SUSE bug 893892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932267">SUSE bug 932267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932770">SUSE bug 932770</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514972" comment="qemu-2.0.2-48.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514973" comment="qemu-block-curl-2.0.2-48.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514974" comment="qemu-ipxe-1.0.0-48.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514975" comment="qemu-kvm-2.0.2-48.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514976" comment="qemu-seabios-1.7.4-48.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514977" comment="qemu-sgabios-8-48.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514978" comment="qemu-tools-2.0.2-48.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514979" comment="qemu-vgabios-1.7.4-48.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514980" comment="qemu-x86-2.0.2-48.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77341" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="929414" ref_url="https://bugzilla.suse.com/929414" source="BUGZILLA"/>
		<reference ref_id="929690" ref_url="https://bugzilla.suse.com/929690" source="BUGZILLA"/>
		<reference ref_id="941794" ref_url="https://bugzilla.suse.com/941794" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3622" ref_url="https://www.suse.com/security/cve/CVE-2015-3622/" source="CVE"/>
		<reference ref_id="CVE-2015-6251" ref_url="https://www.suse.com/security/cve/CVE-2015-6251/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001582.html" source="SUSE-SU"/>
		<description>
gnutls was updated to fix several security vulnerabilities.

- fix double free in certificate DN decoding (GNUTLS-SA-2015-3)(bsc#941794,CVE-2015-6251)
- fix invalid read in octet string in bundled libtasn1 (bsc#929414,CVE-2015-3622)
- fix ServerKeyExchange signature issue (GNUTLS-SA-2015-2)(bsc#929690)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-24"/>
	<updated date="2015-08-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/929414">SUSE bug 929414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929690">SUSE bug 929690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941794">SUSE bug 941794</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3622/">CVE-2015-3622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6251/">CVE-2015-6251</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514981" comment="gnutls-3.2.15-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514982" comment="libgnutls28-3.2.15-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514983" comment="libgnutls28-32bit-3.2.15-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77342" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="855676" ref_url="https://bugzilla.suse.com/855676" source="BUGZILLA"/>
		<reference ref_id="895129" ref_url="https://bugzilla.suse.com/895129" source="BUGZILLA"/>
		<reference ref_id="901902" ref_url="https://bugzilla.suse.com/901902" source="BUGZILLA"/>
		<reference ref_id="906878" ref_url="https://bugzilla.suse.com/906878" source="BUGZILLA"/>
		<reference ref_id="908362" ref_url="https://bugzilla.suse.com/908362" source="BUGZILLA"/>
		<reference ref_id="908372" ref_url="https://bugzilla.suse.com/908372" source="BUGZILLA"/>
		<reference ref_id="912014" ref_url="https://bugzilla.suse.com/912014" source="BUGZILLA"/>
		<reference ref_id="912015" ref_url="https://bugzilla.suse.com/912015" source="BUGZILLA"/>
		<reference ref_id="912018" ref_url="https://bugzilla.suse.com/912018" source="BUGZILLA"/>
		<reference ref_id="912292" ref_url="https://bugzilla.suse.com/912292" source="BUGZILLA"/>
		<reference ref_id="912293" ref_url="https://bugzilla.suse.com/912293" source="BUGZILLA"/>
		<reference ref_id="912294" ref_url="https://bugzilla.suse.com/912294" source="BUGZILLA"/>
		<reference ref_id="912296" ref_url="https://bugzilla.suse.com/912296" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0206" ref_url="https://www.suse.com/security/cve/CVE-2015-0206/" source="CVE"/>
		<description>

OpenSSL was updated to fix security issues and also provide FIPS
compliance.

Security issues fixed:
CVE-2014-3570: Bignum squaring (BN_sqr) may have produced
incorrect results on some platforms, including x86_64.

CVE-2014-3571: Fixed crash in dtls1_get_record whilst in the
listen state where you get two separate reads performed - one for the
header and one for the body of the handshake record.

CVE-2014-3572: No longer accept a handshake using an ephemeral ECDH
ciphersuites with the server key exchange message omitted.

CVE-2014-8275: Fixed various certificate fingerprint issues.

CVE-2015-0204: Only allow ephemeral RSA keys in export ciphersuites.

CVE-2015-0205: Fix to prevent use of DH client certificates without
sending certificate verify message.

CVE-2015-0206: A memory leak could have occured in dtls1_buffer_record.

Bugfixes:
- Do not advertise curves we don't support (bsc#906878)

FIPS changes:
- Make RSA2 key generation FIPS 186-4 compliant (bsc#901902)

- X9.31 rand method is not allowed in FIPS mode.

- Do not allow dynamic ENGINEs loading in FIPS mode.

- Added a locking hack which prevents hangs in FIPS mode (bsc#895129)

- In non-FIPS RSA key generation, mirror the maximum and minimum limiters from
  FIPS rsa generation to meet Common Criteria and BSI TR requirements
  on minimum and maximum distances between p and q. (bsc#908362)

- Do constant reseeding from /dev/urandom; for every random byte pulled, seed with
  one byte from /dev/urandom, also change RAND_poll to pull the full state size of
  the SSLEAY DRBG to fulfil Common Criteria requirements. (bsc#908372)

FIPS mode can be enabled by either using the environment variable OPENSSL_FORCE_FIPS_MODE=1
or supplying the 'fips=1' parameter on the kernel boot commandline.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-30"/>
	<updated date="2015-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/855676">SUSE bug 855676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895129">SUSE bug 895129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901902">SUSE bug 901902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906878">SUSE bug 906878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908362">SUSE bug 908362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908372">SUSE bug 908372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912014">SUSE bug 912014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912015">SUSE bug 912015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912018">SUSE bug 912018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912292">SUSE bug 912292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912293">SUSE bug 912293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912294">SUSE bug 912294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912296">SUSE bug 912296</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0206/">CVE-2015-0206</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514984" comment="libopenssl1_0_0-1.0.1i-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514985" comment="libopenssl1_0_0-32bit-1.0.1i-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514986" comment="openssl-1.0.1i-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77343" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="903649" ref_url="https://bugzilla.suse.com/903649" source="BUGZILLA"/>
		<reference ref_id="932483" ref_url="https://bugzilla.suse.com/932483" source="BUGZILLA"/>
		<reference ref_id="936695" ref_url="https://bugzilla.suse.com/936695" source="BUGZILLA"/>
		<reference ref_id="938746" ref_url="https://bugzilla.suse.com/938746" source="BUGZILLA"/>
		<reference ref_id="943006" ref_url="https://bugzilla.suse.com/943006" source="BUGZILLA"/>
		<reference ref_id="943010" ref_url="https://bugzilla.suse.com/943010" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-5352" ref_url="https://www.suse.com/security/cve/CVE-2015-5352/" source="CVE"/>
		<reference ref_id="CVE-2015-5600" ref_url="https://www.suse.com/security/cve/CVE-2015-5600/" source="CVE"/>
		<reference ref_id="CVE-2015-6563" ref_url="https://www.suse.com/security/cve/CVE-2015-6563/" source="CVE"/>
		<reference ref_id="CVE-2015-6564" ref_url="https://www.suse.com/security/cve/CVE-2015-6564/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001589.html" source="SUSE-SU"/>
		<description>

openssh was updated to fix several security issues.

These security issues were fixed:
* CVE-2015-5352: The x11_open_helper function in channels.c in ssh
  in OpenSSH when ForwardX11Trusted mode is not used, lacked a check of
  the refusal deadline for X connections, which made it easier for remote
  attackers to bypass intended access restrictions via a connection outside
  of the permitted time window (bsc#936695).
* CVE-2015-5600: The kbdint_next_device function in auth2-chall.c
  in sshd in OpenSSH did not properly restrict the processing of
  keyboard-interactive devices within a single connection, which made it
  easier for remote attackers to conduct brute-force attacks or cause a
  denial of service (CPU consumption) via a long and duplicative list in
  the ssh -oKbdInteractiveDevices option, as demonstrated by a modified
  client that provides a different password for each pam element on this
  list (bsc#938746).
* CVE-2015-4000: Removed and disabled weak DH groups to address LOGJAM (bsc#932483).
* Hardening patch to fix sftp RCE (bsc#903649).
* CVE-2015-6563: The monitor component in sshd in OpenSSH accepted
  extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which
  allowed local users to conduct impersonation attacks by leveraging any SSH
  login access in conjunction with control of the sshd uid to send a crafted
  MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c. (bsc#943010)
* CVE-2015-6564: Use-after-free vulnerability in the
  mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH might
  have allowed local users to gain privileges by leveraging control of the
  sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request. (bsc#943006)

Also use %restart_on_update in the trigger script.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-09"/>
	<updated date="2015-09-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/903649">SUSE bug 903649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932483">SUSE bug 932483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936695">SUSE bug 936695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938746">SUSE bug 938746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943006">SUSE bug 943006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943010">SUSE bug 943010</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5352/">CVE-2015-5352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5600/">CVE-2015-5600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6563/">CVE-2015-6563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6564/">CVE-2015-6564</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514987" comment="openssh-6.6p1-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514988" comment="openssh-askpass-gnome-6.6p1-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514989" comment="openssh-helpers-6.6p1-29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77344" version="1" class="patch">
	<metadata>
		<title>Security update for mpfr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="911812" ref_url="https://bugzilla.suse.com/911812" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9474" ref_url="https://www.suse.com/security/cve/CVE-2014-9474/" source="CVE"/>
		<description>

      This update fixes the following security issue: 
      - CVE-2014-9474: possible buffer overflow in mpfr_strtofr (bnc#911812)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-13"/>
	<updated date="2015-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/911812">SUSE bug 911812</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9474/">CVE-2014-9474</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514990" comment="libmpfr4-3.1.2-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77345" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="909479" ref_url="https://bugzilla.suse.com/909479" source="BUGZILLA"/>
		<reference ref_id="935863" ref_url="https://bugzilla.suse.com/935863" source="BUGZILLA"/>
		<reference ref_id="935876" ref_url="https://bugzilla.suse.com/935876" source="BUGZILLA"/>
		<reference ref_id="940084" ref_url="https://bugzilla.suse.com/940084" source="BUGZILLA"/>
		<reference ref_id="940188" ref_url="https://bugzilla.suse.com/940188" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5621" ref_url="https://www.suse.com/security/cve/CVE-2015-5621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001593.html" source="SUSE-SU"/>
		<description>

The following issues have been fixed within this update:

* fix btrfs output inside HOST-RESOURCES-MIB::hrStorageDescr.
  (bsc#909479)
* fix an incompletely initialized vulnerability within the
  snmp_pdu_parse() function of snmp_api.c. (bsc#940188, CVE-2015-5621)
* add build requirement 'procps' to fix a net-snmp-config error
  (bsc#935863)
* --disable-md5 to allow operation in FIPS mode and not use the
  old algorithm (bsc#935876 bsc#940084)
* also stop snmptrapd on removal

		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-21"/>
	<updated date="2015-08-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/909479">SUSE bug 909479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935863">SUSE bug 935863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935876">SUSE bug 935876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940084">SUSE bug 940084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940188">SUSE bug 940188</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5621/">CVE-2015-5621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514991" comment="libsnmp30-5.7.2.1-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514992" comment="libsnmp30-32bit-5.7.2.1-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514993" comment="net-snmp-5.7.2.1-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514994" comment="perl-SNMP-5.7.2.1-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514995" comment="snmp-mibs-5.7.2.1-4.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77346" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="915918" ref_url="https://bugzilla.suse.com/915918" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0313" ref_url="https://www.suse.com/security/cve/CVE-2015-0313/" source="CVE"/>
		<reference ref_id="CVE-2015-0314" ref_url="https://www.suse.com/security/cve/CVE-2015-0314/" source="CVE"/>
		<reference ref_id="CVE-2015-0315" ref_url="https://www.suse.com/security/cve/CVE-2015-0315/" source="CVE"/>
		<reference ref_id="CVE-2015-0316" ref_url="https://www.suse.com/security/cve/CVE-2015-0316/" source="CVE"/>
		<reference ref_id="CVE-2015-0317" ref_url="https://www.suse.com/security/cve/CVE-2015-0317/" source="CVE"/>
		<reference ref_id="CVE-2015-0318" ref_url="https://www.suse.com/security/cve/CVE-2015-0318/" source="CVE"/>
		<reference ref_id="CVE-2015-0319" ref_url="https://www.suse.com/security/cve/CVE-2015-0319/" source="CVE"/>
		<reference ref_id="CVE-2015-0320" ref_url="https://www.suse.com/security/cve/CVE-2015-0320/" source="CVE"/>
		<reference ref_id="CVE-2015-0321" ref_url="https://www.suse.com/security/cve/CVE-2015-0321/" source="CVE"/>
		<reference ref_id="CVE-2015-0322" ref_url="https://www.suse.com/security/cve/CVE-2015-0322/" source="CVE"/>
		<reference ref_id="CVE-2015-0323" ref_url="https://www.suse.com/security/cve/CVE-2015-0323/" source="CVE"/>
		<reference ref_id="CVE-2015-0324" ref_url="https://www.suse.com/security/cve/CVE-2015-0324/" source="CVE"/>
		<reference ref_id="CVE-2015-0325" ref_url="https://www.suse.com/security/cve/CVE-2015-0325/" source="CVE"/>
		<reference ref_id="CVE-2015-0326" ref_url="https://www.suse.com/security/cve/CVE-2015-0326/" source="CVE"/>
		<reference ref_id="CVE-2015-0327" ref_url="https://www.suse.com/security/cve/CVE-2015-0327/" source="CVE"/>
		<reference ref_id="CVE-2015-0328" ref_url="https://www.suse.com/security/cve/CVE-2015-0328/" source="CVE"/>
		<reference ref_id="CVE-2015-0329" ref_url="https://www.suse.com/security/cve/CVE-2015-0329/" source="CVE"/>
		<reference ref_id="CVE-2015-0330" ref_url="https://www.suse.com/security/cve/CVE-2015-0330/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<description>
flash-player was updated to version 11.2.202.442 to fix 18 security issues.

These security issues were fixed:
- Use-after-free vulnerabilities that could lead to code execution (CVE-2015-0313, CVE-2015-0315, CVE-2015-0320, CVE-2015-0322).
- Memory corruption vulnerabilities that could lead to code execution (CVE-2015-0314, CVE-2015-0316, CVE-2015-0318, CVE-2015-0321, CVE-2015-0329, CVE-2015-0330).
- Type confusion vulnerabilities that could lead to code execution (CVE-2015-0317, CVE-2015-0319).
- Heap buffer overflow vulnerabilities that could lead to code execution (CVE-2015-0323, CVE-2015-0327).
- Buffer overflow vulnerability that could lead to code execution (CVE-2015-0324).
- Null pointer dereference issues (CVE-2015-0325, CVE-2015-0326, CVE-2015-0328).

More information is available at
https://helpx.adobe.com/security/products/flash-player/apsb15-04.html
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-06"/>
	<updated date="2015-02-06"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0313/">CVE-2015-0313</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0314/">CVE-2015-0314</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0315/">CVE-2015-0315</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0316/">CVE-2015-0316</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0317/">CVE-2015-0317</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0318/">CVE-2015-0318</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0319/">CVE-2015-0319</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0320/">CVE-2015-0320</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0321/">CVE-2015-0321</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0322/">CVE-2015-0322</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0323/">CVE-2015-0323</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0324/">CVE-2015-0324</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0325/">CVE-2015-0325</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0326/">CVE-2015-0326</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0327/">CVE-2015-0327</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0328/">CVE-2015-0328</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0329/">CVE-2015-0329</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0330/">CVE-2015-0330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514996" comment="flash-player-11.2.202.442-67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514997" comment="flash-player-gnome-11.2.202.442-67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77347" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="946880" ref_url="https://bugzilla.suse.com/946880" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5567" ref_url="https://www.suse.com/security/cve/CVE-2015-5567/" source="CVE"/>
		<reference ref_id="CVE-2015-5568" ref_url="https://www.suse.com/security/cve/CVE-2015-5568/" source="CVE"/>
		<reference ref_id="CVE-2015-5570" ref_url="https://www.suse.com/security/cve/CVE-2015-5570/" source="CVE"/>
		<reference ref_id="CVE-2015-5571" ref_url="https://www.suse.com/security/cve/CVE-2015-5571/" source="CVE"/>
		<reference ref_id="CVE-2015-5572" ref_url="https://www.suse.com/security/cve/CVE-2015-5572/" source="CVE"/>
		<reference ref_id="CVE-2015-5573" ref_url="https://www.suse.com/security/cve/CVE-2015-5573/" source="CVE"/>
		<reference ref_id="CVE-2015-5574" ref_url="https://www.suse.com/security/cve/CVE-2015-5574/" source="CVE"/>
		<reference ref_id="CVE-2015-5575" ref_url="https://www.suse.com/security/cve/CVE-2015-5575/" source="CVE"/>
		<reference ref_id="CVE-2015-5576" ref_url="https://www.suse.com/security/cve/CVE-2015-5576/" source="CVE"/>
		<reference ref_id="CVE-2015-5577" ref_url="https://www.suse.com/security/cve/CVE-2015-5577/" source="CVE"/>
		<reference ref_id="CVE-2015-5578" ref_url="https://www.suse.com/security/cve/CVE-2015-5578/" source="CVE"/>
		<reference ref_id="CVE-2015-5579" ref_url="https://www.suse.com/security/cve/CVE-2015-5579/" source="CVE"/>
		<reference ref_id="CVE-2015-5580" ref_url="https://www.suse.com/security/cve/CVE-2015-5580/" source="CVE"/>
		<reference ref_id="CVE-2015-5581" ref_url="https://www.suse.com/security/cve/CVE-2015-5581/" source="CVE"/>
		<reference ref_id="CVE-2015-5582" ref_url="https://www.suse.com/security/cve/CVE-2015-5582/" source="CVE"/>
		<reference ref_id="CVE-2015-5584" ref_url="https://www.suse.com/security/cve/CVE-2015-5584/" source="CVE"/>
		<reference ref_id="CVE-2015-5587" ref_url="https://www.suse.com/security/cve/CVE-2015-5587/" source="CVE"/>
		<reference ref_id="CVE-2015-5588" ref_url="https://www.suse.com/security/cve/CVE-2015-5588/" source="CVE"/>
		<reference ref_id="CVE-2015-6676" ref_url="https://www.suse.com/security/cve/CVE-2015-6676/" source="CVE"/>
		<reference ref_id="CVE-2015-6677" ref_url="https://www.suse.com/security/cve/CVE-2015-6677/" source="CVE"/>
		<reference ref_id="CVE-2015-6678" ref_url="https://www.suse.com/security/cve/CVE-2015-6678/" source="CVE"/>
		<reference ref_id="CVE-2015-6679" ref_url="https://www.suse.com/security/cve/CVE-2015-6679/" source="CVE"/>
		<reference ref_id="CVE-2015-6682" ref_url="https://www.suse.com/security/cve/CVE-2015-6682/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<description>

Adobe Flash Player was updated to 11.2.202.521 (APSB15-23 bsc#946880) fixing several security issues:

More information can be found on:

  https://helpx.adobe.com/security/products/flash-player/apsb15-23.html

		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-22"/>
	<updated date="2015-09-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5567/">CVE-2015-5567</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5568/">CVE-2015-5568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5570/">CVE-2015-5570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5571/">CVE-2015-5571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5572/">CVE-2015-5572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5573/">CVE-2015-5573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5574/">CVE-2015-5574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5575/">CVE-2015-5575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5576/">CVE-2015-5576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5577/">CVE-2015-5577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5578/">CVE-2015-5578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5579/">CVE-2015-5579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5580/">CVE-2015-5580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5581/">CVE-2015-5581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5582/">CVE-2015-5582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5584/">CVE-2015-5584</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5587/">CVE-2015-5587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5588/">CVE-2015-5588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6676/">CVE-2015-6676</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6677/">CVE-2015-6677</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6678/">CVE-2015-6678</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6679/">CVE-2015-6679</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6682/">CVE-2015-6682</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514998" comment="flash-player-11.2.202.521-102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514999" comment="flash-player-gnome-11.2.202.521-102.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77348" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-source (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="924525" ref_url="https://bugzilla.suse.com/924525" source="BUGZILLA"/>
		<reference ref_id="936916" ref_url="https://bugzilla.suse.com/936916" source="BUGZILLA"/>
		<reference ref_id="944001" ref_url="https://bugzilla.suse.com/944001" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2015:1612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001599.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 kernel was updated to version 3.12.44-52.13
to receive various bugfixes.

- Btrfs: don't initialize a space info as full to prevent ENOSPC (bsc#944001).
- kernel/kvm: Fix MSA3/MSA4 detection (bsc#936916, LTC#127868).
- zcrypt: Fixed reset and interrupt handling of AP queues (bsc#936916,
  LTC#126491).
- Update s390x kABI files after gcc update (bsc#924525).		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-10"/>
	<updated date="2015-09-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924525">SUSE bug 924525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936916">SUSE bug 936916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944001">SUSE bug 944001</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515000" comment="kernel-default-3.12.44-52.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515001" comment="kernel-default-devel-3.12.44-52.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515002" comment="kernel-default-extra-3.12.44-52.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515003" comment="kernel-devel-3.12.44-52.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515004" comment="kernel-macros-3.12.44-52.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515005" comment="kernel-source-3.12.44-52.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515006" comment="kernel-syms-3.12.44-52.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515007" comment="kernel-xen-3.12.44-52.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515008" comment="kernel-xen-devel-3.12.44-52.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77349" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="891936" ref_url="https://bugzilla.suse.com/891936" source="BUGZILLA"/>
		<reference ref_id="899334" ref_url="https://bugzilla.suse.com/899334" source="BUGZILLA"/>
		<reference ref_id="899484" ref_url="https://bugzilla.suse.com/899484" source="BUGZILLA"/>
		<reference ref_id="900587" ref_url="https://bugzilla.suse.com/900587" source="BUGZILLA"/>
		<reference ref_id="902976" ref_url="https://bugzilla.suse.com/902976" source="BUGZILLA"/>
		<reference ref_id="903756" ref_url="https://bugzilla.suse.com/903756" source="BUGZILLA"/>
		<reference ref_id="904176" ref_url="https://bugzilla.suse.com/904176" source="BUGZILLA"/>
		<reference ref_id="904426" ref_url="https://bugzilla.suse.com/904426" source="BUGZILLA"/>
		<reference ref_id="904432" ref_url="https://bugzilla.suse.com/904432" source="BUGZILLA"/>
		<reference ref_id="909828" ref_url="https://bugzilla.suse.com/909828" source="BUGZILLA"/>
		<reference ref_id="910862" ref_url="https://bugzilla.suse.com/910862" source="BUGZILLA"/>
		<reference ref_id="911737" ref_url="https://bugzilla.suse.com/911737" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3657" ref_url="https://www.suse.com/security/cve/CVE-2014-3657/" source="CVE"/>
		<reference ref_id="CVE-2014-7823" ref_url="https://www.suse.com/security/cve/CVE-2014-7823/" source="CVE"/>
		<reference ref_id="CVE-2014-8136" ref_url="https://www.suse.com/security/cve/CVE-2014-8136/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001213.html" source="SUSE-SU"/>
		<description>
libvirt was updated to fix security issues and bugs.

These security issues were fixed:
- Fixed denial of service flaw in libvirt's virConnectListAllDomains() function (CVE-2014-3657).
- Information leak with flag VIR_DOMAIN_XML_MIGRATABLE (CVE-2014-7823).
- local denial of service in qemu driver (CVE-2014-8136)

These non-security issues were fixed:
- Get /proc/sys/net/ipv[46] read-write for wicked to work in containers (bsc#904432).
- libxl: Several migration improvements (bsc#903756).
- libxl: allow libxl to find pygrub binary (bdo#770485).
- Fix Qemu AppArmor abstraction (bsc#904426).
- AppArmor confined kvm domains couldn't find the apparmor profile template (bnc#902976).
- Backport commit c110cdb2 to fix non-raw storage format error (bnc#900587).
- qemu: use systemd's TerminateMachine to kill all processes (bsc#899334).
- Transformed Errors into warnings in detect_scsi_host_caps.
- Fix a missing cleanup for lxc containers.
- Adding network configuration to containers. bsc#904432
		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-08"/>
	<updated date="2015-01-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/891936">SUSE bug 891936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899334">SUSE bug 899334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899484">SUSE bug 899484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900587">SUSE bug 900587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902976">SUSE bug 902976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903756">SUSE bug 903756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904176">SUSE bug 904176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904426">SUSE bug 904426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904432">SUSE bug 904432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909828">SUSE bug 909828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910862">SUSE bug 910862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911737">SUSE bug 911737</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3657/">CVE-2014-3657</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7823/">CVE-2014-7823</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8136/">CVE-2014-8136</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515009" comment="libvirt-1.2.5-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515010" comment="libvirt-client-1.2.5-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515011" comment="libvirt-client-32bit-1.2.5-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515012" comment="libvirt-daemon-1.2.5-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515013" comment="libvirt-daemon-config-network-1.2.5-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515014" comment="libvirt-daemon-config-nwfilter-1.2.5-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515015" comment="libvirt-daemon-driver-interface-1.2.5-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515016" comment="libvirt-daemon-driver-libxl-1.2.5-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515017" comment="libvirt-daemon-driver-lxc-1.2.5-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515018" comment="libvirt-daemon-driver-network-1.2.5-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515019" comment="libvirt-daemon-driver-nodedev-1.2.5-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515020" comment="libvirt-daemon-driver-nwfilter-1.2.5-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515021" comment="libvirt-daemon-driver-qemu-1.2.5-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515022" comment="libvirt-daemon-driver-secret-1.2.5-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515023" comment="libvirt-daemon-driver-storage-1.2.5-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515024" comment="libvirt-daemon-lxc-1.2.5-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515025" comment="libvirt-daemon-qemu-1.2.5-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515026" comment="libvirt-daemon-xen-1.2.5-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515027" comment="libvirt-doc-1.2.5-21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77350" version="1" class="patch">
	<metadata>
		<title>Security update for coreutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="866010" ref_url="https://bugzilla.suse.com/866010" source="BUGZILLA"/>
		<reference ref_id="901905" ref_url="https://bugzilla.suse.com/901905" source="BUGZILLA"/>
		<reference ref_id="907290" ref_url="https://bugzilla.suse.com/907290" source="BUGZILLA"/>
		<reference ref_id="921559" ref_url="https://bugzilla.suse.com/921559" source="BUGZILLA"/>
		<reference ref_id="928749" ref_url="https://bugzilla.suse.com/928749" source="BUGZILLA"/>
		<reference ref_id="930565" ref_url="https://bugzilla.suse.com/930565" source="BUGZILLA"/>
		<reference ref_id="933396" ref_url="https://bugzilla.suse.com/933396" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4041" ref_url="https://www.suse.com/security/cve/CVE-2015-4041/" source="CVE"/>
		<reference ref_id="CVE-2015-4042" ref_url="https://www.suse.com/security/cve/CVE-2015-4042/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001604.html" source="SUSE-SU"/>
		<description>
This update for coreutils provides the following fixes:

- Fix memory handling error with case insensitive sort using UTF-8.
  (CVE-2015-4041, CVE-2015-4042)
- Ensure 'df -a' shows all remote file system entries.
- Only suppress remote mounts of separate exports with 'df --total'.
- Document that 'df -a' might list duplicated file systems.
- Adjust references to info nodes in man pages.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-14"/>
	<updated date="2015-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/866010">SUSE bug 866010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901905">SUSE bug 901905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907290">SUSE bug 907290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921559">SUSE bug 921559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928749">SUSE bug 928749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930565">SUSE bug 930565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933396">SUSE bug 933396</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4041/">CVE-2015-4041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4042/">CVE-2015-4042</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515028" comment="coreutils-8.22-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515029" comment="coreutils-lang-8.22-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77351" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="947003" ref_url="https://bugzilla.suse.com/947003" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox was updated to version 38.3.0 ESR (bsc#947003),
fixing bugs and security issues.

* MFSA 2015-96/CVE-2015-4500/CVE-2015-4501
  Miscellaneous memory safety hazards (rv:41.0 / rv:38.3)
* MFSA 2015-101/CVE-2015-4506
  Buffer overflow in libvpx while parsing vp9 format video
* MFSA 2015-105/CVE-2015-4511
  Buffer overflow while decoding WebM video
* MFSA 2015-106/CVE-2015-4509
  Use-after-free while manipulating HTML media content
* MFSA 2015-110/CVE-2015-4519
  Dragging and dropping images exposes final URL after
  redirects
* MFSA 2015-111/CVE-2015-4520
  Errors in the handling of CORS preflight request headers
* MFSA 2015-112/CVE-2015-4517/CVE-2015-4521/CVE-2015-4522
  CVE-2015-7174/CVE-2015-7175/CVE-2015-7176/CVE-2015-7177
  CVE-2015-7180
  Vulnerabilities found through code inspection

More details can be found on
	https://www.mozilla.org/en-US/security/advisories/

The Mozilla NSPR library was updated to version 4.10.9, fixing various bugs.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-23"/>
	<updated date="2015-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515030" comment="MozillaFirefox-38.3.0esr-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515031" comment="MozillaFirefox-translations-38.3.0esr-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515032" comment="mozilla-nspr-4.10.9-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515033" comment="mozilla-nspr-32bit-4.10.9-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77352" version="1" class="patch">
	<metadata>
		<title>Security update for icedtea-web (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="944208" ref_url="https://bugzilla.suse.com/944208" source="BUGZILLA"/>
		<reference ref_id="944209" ref_url="https://bugzilla.suse.com/944209" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5234" ref_url="https://www.suse.com/security/cve/CVE-2015-5234/" source="CVE"/>
		<reference ref_id="CVE-2015-5235" ref_url="https://www.suse.com/security/cve/CVE-2015-5235/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001613.html" source="SUSE-SU"/>
		<description>

The Java IcedTea-Web Plugin was updated to 1.6.1 bringing
various features, bug- and securityfixes.

* Enabled Entry-Point attribute check
* permissions sandbox and signed app and unsigned app with
  permissions all-permissions now run in sandbox instead of not
t all.
* fixed DownloadService
* comments in deployment.properties now should persists load/save
* fixed bug in caching of files with query
* fixed issues with recreating of existing shortcut
* trustAll/trustNone now processed correctly
* headless no longer shows dialogues
* RH1231441 Unable to read the text of the buttons of the security
  dialogue
* Fixed RH1233697 icedtea-web: applet origin spoofing
  (CVE-2015-5235, bsc#944208)
* Fixed RH1233667 icedtea-web: unexpected permanent authorization
  of unsigned applets (CVE-2015-5234, bsc#944209)
* MissingALACAdialog made available also for unsigned applications
  (but ignoring actual manifest value) and fixed
* NetX
  - fixed issues with -html shortcuts
  - fixed issue with -html receiving garbage in width and height
* PolicyEditor
  - file flag made to work when used standalone
  - file flag and main argument cannot be used in combination

The update to 1.6 is included and brings:

* Massively improved offline abilities. Added Xoffline switch to
  force work without inet connection.
* Improved to be able to run with any JDK
* JDK 6 and older no longer supported
* JDK 8 support added (URLPermission granted if applicable)
* JDK 9 supported 
* Added support for Entry-Point manifest attribute
* Added KEY_ENABLE_MANIFEST_ATTRIBUTES_CHECK deployment property
  to control scan of Manifest file 
* starting arguments now accept also -- abbreviations
* Added new documentation
* Added support for menu shortcuts - both javaws
  applications/applets and html applets are supported
* added support for -html switch for javaws. Now you can run most
  of the applets without browser at all
* Control Panel
  - PR1856: ControlPanel UI improvement for lower resolutions
    (800*600)
* NetX
  - PR1858: Java Console accepts multi-byte encodings
  - PR1859: Java Console UI improvement for lower resolutions
    (800*600)
  - RH1091563: [abrt] icedtea-web-1.5-2.fc20: Uncaught exception
   java.lang.ClassCastException in method
   sun.applet.PluginAppletViewer$8.run()
  - Dropped support for long unmaintained -basedir argument
  - Returned support for -jnlp argument
  - RH1095311, PR574 -  References class sun.misc.Ref removed in
    OpenJDK 9 - fixed, and so buildable on JDK9
* Plugin
  - PR1743 - Intermittant deadlock in PluginRequestProcessor
  - PR1298 - LiveConnect - problem setting array elements (applet
    variables) from JS
  - RH1121549: coverity defects
  - Resolves method overloading correctly with superclass
    heirarchy distance
* PolicyEditor
  - codebases can be renamed in-place, copied, and pasted
  - codebase URLs can be copied to system clipboard
  - displays a progress dialog while opening or saving files
  - codebases without permissions assigned save to file anyway
    (and re-appear on next open)
  - PR1776: NullPointer on save-and-exit
  - PR1850: duplicate codebases when launching from security dialogs
  - Fixed bug where clicking 'Cancel' on the 'Save before Exiting'
    dialog could result in the editor exiting without saving
    changes
  - Keyboard accelerators and mnemonics greatly improved
  - 'File - New' allows editing a new policy without first
    selecting the file to save to
* Common
  - PR1769: support signed applets which specify Sandbox
    permissions in their manifests
* Temporary Permissions in security dialog now multi-selectable
  and based on PolicyEditor permissions

The update to 1.5.2 brings OpenJDK 8 support (fate#318956)
* NetX
  - RH1095311, PR574 -  References class sun.misc.Ref removed in
    OpenJDK 9 - fixed, and so buildable on JDK9
  - RH1154177 - decoded file needed from cache
  - fixed NPE  in https dialog
  - empty codebase behaves  as '.'
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-15"/>
	<updated date="2015-09-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/944208">SUSE bug 944208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944209">SUSE bug 944209</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5234/">CVE-2015-5234</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5235/">CVE-2015-5235</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515034" comment="java-1_7_0-openjdk-plugin-1.6.1-2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77353" version="1" class="patch">
	<metadata>
		<title>Security update for rpcbind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="940191" ref_url="https://bugzilla.suse.com/940191" source="BUGZILLA"/>
		<reference ref_id="946204" ref_url="https://bugzilla.suse.com/946204" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7236" ref_url="https://www.suse.com/security/cve/CVE-2015-7236/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1705-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001622.html" source="SUSE-SU"/>
		<description>

A use-after-free security bug in rpcbind was fixed which could lead to a remote denial of service.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-17"/>
	<updated date="2015-09-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/940191">SUSE bug 940191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946204">SUSE bug 946204</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7236/">CVE-2015-7236</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515035" comment="rpcbind-0.2.1_rc4-13.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77354" version="1" class="patch">
	<metadata>
		<title>Security update for libssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="928323" ref_url="https://bugzilla.suse.com/928323" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3146" ref_url="https://www.suse.com/security/cve/CVE-2015-3146/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1707-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001624.html" source="SUSE-SU"/>
		<description>
The encryption library libssh was updated to fix one security issue.

The following vulnerability was fixed:

* CVE-2015-3146: Unauthenticated remote attackers could crash the server or client with specially crafted packages.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-01"/>
	<updated date="2015-10-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/928323">SUSE bug 928323</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3146/">CVE-2015-3146</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515036" comment="libssh4-0.6.3-8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77355" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="935158" ref_url="https://bugzilla.suse.com/935158" source="BUGZILLA"/>
		<reference ref_id="941500" ref_url="https://bugzilla.suse.com/941500" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3813" ref_url="https://www.suse.com/security/cve/CVE-2015-3813/" source="CVE"/>
		<reference ref_id="CVE-2015-6241" ref_url="https://www.suse.com/security/cve/CVE-2015-6241/" source="CVE"/>
		<reference ref_id="CVE-2015-6242" ref_url="https://www.suse.com/security/cve/CVE-2015-6242/" source="CVE"/>
		<reference ref_id="CVE-2015-6243" ref_url="https://www.suse.com/security/cve/CVE-2015-6243/" source="CVE"/>
		<reference ref_id="CVE-2015-6244" ref_url="https://www.suse.com/security/cve/CVE-2015-6244/" source="CVE"/>
		<reference ref_id="CVE-2015-6245" ref_url="https://www.suse.com/security/cve/CVE-2015-6245/" source="CVE"/>
		<reference ref_id="CVE-2015-6246" ref_url="https://www.suse.com/security/cve/CVE-2015-6246/" source="CVE"/>
		<reference ref_id="CVE-2015-6247" ref_url="https://www.suse.com/security/cve/CVE-2015-6247/" source="CVE"/>
		<reference ref_id="CVE-2015-6248" ref_url="https://www.suse.com/security/cve/CVE-2015-6248/" source="CVE"/>
		<reference ref_id="CVE-2015-6249" ref_url="https://www.suse.com/security/cve/CVE-2015-6249/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001625.html" source="SUSE-SU"/>
		<description>

Wireshark has been updated to 1.12.7. (FATE#319388)

The following vulnerabilities have been fixed:
* Wireshark could crash when adding an item to the protocol tree. wnpa-sec-2015-21 CVE-2015-6241
* Wireshark could attempt to free invalid memory. wnpa-sec-2015-22 CVE-2015-6242
* Wireshark could crash when searching for a protocol dissector. wnpa-sec-2015-23 CVE-2015-6243
* The ZigBee dissector could crash. wnpa-sec-2015-24 CVE-2015-6244
* The GSM RLC/MAC dissector could go into an infinite loop. wnpa-sec-2015-25 CVE-2015-6245
* The WaveAgent dissector could crash. wnpa-sec-2015-26 CVE-2015-6246
* The OpenFlow dissector could go into an infinite loop. wnpa-sec-2015-27 CVE-2015-6247
* Wireshark could crash due to invalid ptvcursor length checking. wnpa-sec-2015-28 CVE-2015-6248
* The WCCP dissector could crash. wnpa-sec-2015-29 CVE-2015-6249
* Further bug fixes and updated protocol support as listed in:
    https://www.wireshark.org/docs/relnotes/wireshark-1.12.7.html 

Also a fix from 1.12.6 in GSM DTAP was backported. (bnc#935158)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-16"/>
	<updated date="2015-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935158">SUSE bug 935158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3813/">CVE-2015-3813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6241/">CVE-2015-6241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6242/">CVE-2015-6242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6243/">CVE-2015-6243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6244/">CVE-2015-6244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6245/">CVE-2015-6245</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6246/">CVE-2015-6246</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6247/">CVE-2015-6247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6248/">CVE-2015-6248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6249/">CVE-2015-6249</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515037" comment="wireshark-1.12.7-15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77356" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-source (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="856382" ref_url="https://bugzilla.suse.com/856382" source="BUGZILLA"/>
		<reference ref_id="886785" ref_url="https://bugzilla.suse.com/886785" source="BUGZILLA"/>
		<reference ref_id="898159" ref_url="https://bugzilla.suse.com/898159" source="BUGZILLA"/>
		<reference ref_id="907973" ref_url="https://bugzilla.suse.com/907973" source="BUGZILLA"/>
		<reference ref_id="908950" ref_url="https://bugzilla.suse.com/908950" source="BUGZILLA"/>
		<reference ref_id="912183" ref_url="https://bugzilla.suse.com/912183" source="BUGZILLA"/>
		<reference ref_id="914818" ref_url="https://bugzilla.suse.com/914818" source="BUGZILLA"/>
		<reference ref_id="916543" ref_url="https://bugzilla.suse.com/916543" source="BUGZILLA"/>
		<reference ref_id="920016" ref_url="https://bugzilla.suse.com/920016" source="BUGZILLA"/>
		<reference ref_id="922071" ref_url="https://bugzilla.suse.com/922071" source="BUGZILLA"/>
		<reference ref_id="924722" ref_url="https://bugzilla.suse.com/924722" source="BUGZILLA"/>
		<reference ref_id="929092" ref_url="https://bugzilla.suse.com/929092" source="BUGZILLA"/>
		<reference ref_id="929871" ref_url="https://bugzilla.suse.com/929871" source="BUGZILLA"/>
		<reference ref_id="930813" ref_url="https://bugzilla.suse.com/930813" source="BUGZILLA"/>
		<reference ref_id="932285" ref_url="https://bugzilla.suse.com/932285" source="BUGZILLA"/>
		<reference ref_id="932350" ref_url="https://bugzilla.suse.com/932350" source="BUGZILLA"/>
		<reference ref_id="934430" ref_url="https://bugzilla.suse.com/934430" source="BUGZILLA"/>
		<reference ref_id="934942" ref_url="https://bugzilla.suse.com/934942" source="BUGZILLA"/>
		<reference ref_id="934962" ref_url="https://bugzilla.suse.com/934962" source="BUGZILLA"/>
		<reference ref_id="936556" ref_url="https://bugzilla.suse.com/936556" source="BUGZILLA"/>
		<reference ref_id="936773" ref_url="https://bugzilla.suse.com/936773" source="BUGZILLA"/>
		<reference ref_id="937609" ref_url="https://bugzilla.suse.com/937609" source="BUGZILLA"/>
		<reference ref_id="937612" ref_url="https://bugzilla.suse.com/937612" source="BUGZILLA"/>
		<reference ref_id="937613" ref_url="https://bugzilla.suse.com/937613" source="BUGZILLA"/>
		<reference ref_id="937616" ref_url="https://bugzilla.suse.com/937616" source="BUGZILLA"/>
		<reference ref_id="938550" ref_url="https://bugzilla.suse.com/938550" source="BUGZILLA"/>
		<reference ref_id="938706" ref_url="https://bugzilla.suse.com/938706" source="BUGZILLA"/>
		<reference ref_id="938891" ref_url="https://bugzilla.suse.com/938891" source="BUGZILLA"/>
		<reference ref_id="938892" ref_url="https://bugzilla.suse.com/938892" source="BUGZILLA"/>
		<reference ref_id="938893" ref_url="https://bugzilla.suse.com/938893" source="BUGZILLA"/>
		<reference ref_id="939145" ref_url="https://bugzilla.suse.com/939145" source="BUGZILLA"/>
		<reference ref_id="939266" ref_url="https://bugzilla.suse.com/939266" source="BUGZILLA"/>
		<reference ref_id="939716" ref_url="https://bugzilla.suse.com/939716" source="BUGZILLA"/>
		<reference ref_id="939834" ref_url="https://bugzilla.suse.com/939834" source="BUGZILLA"/>
		<reference ref_id="939994" ref_url="https://bugzilla.suse.com/939994" source="BUGZILLA"/>
		<reference ref_id="940398" ref_url="https://bugzilla.suse.com/940398" source="BUGZILLA"/>
		<reference ref_id="940545" ref_url="https://bugzilla.suse.com/940545" source="BUGZILLA"/>
		<reference ref_id="940679" ref_url="https://bugzilla.suse.com/940679" source="BUGZILLA"/>
		<reference ref_id="940776" ref_url="https://bugzilla.suse.com/940776" source="BUGZILLA"/>
		<reference ref_id="940912" ref_url="https://bugzilla.suse.com/940912" source="BUGZILLA"/>
		<reference ref_id="940925" ref_url="https://bugzilla.suse.com/940925" source="BUGZILLA"/>
		<reference ref_id="940965" ref_url="https://bugzilla.suse.com/940965" source="BUGZILLA"/>
		<reference ref_id="941098" ref_url="https://bugzilla.suse.com/941098" source="BUGZILLA"/>
		<reference ref_id="941305" ref_url="https://bugzilla.suse.com/941305" source="BUGZILLA"/>
		<reference ref_id="941908" ref_url="https://bugzilla.suse.com/941908" source="BUGZILLA"/>
		<reference ref_id="941951" ref_url="https://bugzilla.suse.com/941951" source="BUGZILLA"/>
		<reference ref_id="942160" ref_url="https://bugzilla.suse.com/942160" source="BUGZILLA"/>
		<reference ref_id="942204" ref_url="https://bugzilla.suse.com/942204" source="BUGZILLA"/>
		<reference ref_id="942307" ref_url="https://bugzilla.suse.com/942307" source="BUGZILLA"/>
		<reference ref_id="942367" ref_url="https://bugzilla.suse.com/942367" source="BUGZILLA"/>
		<reference ref_id="948536" ref_url="https://bugzilla.suse.com/948536" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5156" ref_url="https://www.suse.com/security/cve/CVE-2015-5156/" source="CVE"/>
		<reference ref_id="CVE-2015-5157" ref_url="https://www.suse.com/security/cve/CVE-2015-5157/" source="CVE"/>
		<reference ref_id="CVE-2015-5283" ref_url="https://www.suse.com/security/cve/CVE-2015-5283/" source="CVE"/>
		<reference ref_id="CVE-2015-5697" ref_url="https://www.suse.com/security/cve/CVE-2015-5697/" source="CVE"/>
		<reference ref_id="CVE-2015-6252" ref_url="https://www.suse.com/security/cve/CVE-2015-6252/" source="CVE"/>
		<reference ref_id="CVE-2015-6937" ref_url="https://www.suse.com/security/cve/CVE-2015-6937/" source="CVE"/>
		<reference ref_id="CVE-2015-7613" ref_url="https://www.suse.com/security/cve/CVE-2015-7613/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 kernel was updated to 3.12.48-52.27 to
receive various security and bugfixes.

Following security bugs were fixed:
* CVE-2015-7613: A flaw was found in the Linux kernel IPC code that could
  lead to arbitrary code execution. The ipc_addid() function initialized
  a shared object that has unset uid/gid values. Since the fields are not
  initialized, the check can falsely succeed. (bsc#948536)
* CVE-2015-5156: When a guests KVM network devices is in a bridge
  configuration the kernel can create a situation in which packets are
  fragmented in an unexpected fashion. The GRO functionality can create
  a situation in which multiple SKB's are chained together in a single
  packets fraglist (by design). (bsc#940776)
* CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel before
  4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs
  that occurred during userspace execution, which might allow local
  users to gain privileges by triggering an NMI (bsc#938706).
* CVE-2015-6252: A flaw was found in the way the Linux kernel's vhost
  driver treated userspace provided log file descriptor when processing
  the VHOST_SET_LOG_FD ioctl command. The file descriptor was never
  released and continued to consume kernel memory. A privileged local
  user with access to the /dev/vhost-net files could use this flaw to
  create a denial-of-service attack (bsc#942367).
* CVE-2015-5697: The get_bitmap_file function in drivers/md/md.c in the
  Linux kernel before 4.1.6 does not initialize a certain bitmap data
  structure, which allows local users to obtain sensitive information
  from kernel memory via a GET_BITMAP_FILE ioctl call. (bnc#939994)
* CVE-2015-6937: A NULL pointer dereference flaw was found in the
  Reliable Datagram Sockets (RDS) implementation allowing a local user to
  cause system DoS. A verification was missing that the underlying
  transport exists when a connection was created. (bsc#945825)
* CVE-2015-5283: A NULL pointer dereference flaw was found in SCTP
  implementation allowing a local user to cause system DoS. Creation of
  multiple sockets in parallel when system doesn't have SCTP module
  loaded can lead to kernel panic. (bsc#947155)

The following non-security bugs were fixed:
- ALSA: hda - Abort the probe without i915 binding for HSW/BDW
  (bsc#936556).
- Btrfs: Backport subvolume mount option handling (bsc#934962)
- Btrfs: Handle unaligned length in extent_same (bsc#937609).
- Btrfs: advertise which crc32c implementation is being used on mount
  (bsc#946057).
- Btrfs: allow mounting btrfs subvolumes with different ro/rw options.
- Btrfs: check if previous transaction aborted to avoid fs corruption
  (bnc#942509).
- Btrfs: clean up error handling in mount_subvol() (bsc#934962).
- Btrfs: cleanup orphans while looking up default subvolume (bsc#914818).
- Btrfs: do not update mtime/ctime on deduped inodes (bsc#937616).
- Btrfs: fail on mismatched subvol and subvolid mount options
  (bsc#934962).
- Btrfs: fix chunk allocation regression leading to transaction abort
  (bnc#938550).
- Btrfs: fix clone / extent-same deadlocks (bsc#937612).
- Btrfs: fix crash on close_ctree() if cleaner starts new transaction
  (bnc#938891).
- Btrfs: fix deadlock with extent-same and readpage (bsc#937612).
- Btrfs: fix file corruption after cloning inline extents (bnc#942512).
- Btrfs: fix file read corruption after extent cloning and fsync
  (bnc#946902).
- Btrfs: fix find_free_dev_extent() malfunction in case device tree has
  hole (bnc#938550).
- Btrfs: fix hang when failing to submit bio of directIO (bnc#942685).
- Btrfs: fix list transaction-&amp;gt;pending_ordered corruption
  (bnc#938893).
- Btrfs: fix memory corruption on failure to submit bio for direct IO
  (bnc#942685).
- Btrfs: fix memory leak in the extent_same ioctl (bsc#937613).
- Btrfs: fix put dio bio twice when we submit dio bio fail (bnc#942685).
- Btrfs: fix race between balance and unused block group deletion
  (bnc#938892).
- Btrfs: fix range cloning when same inode used as source and destination
  (bnc#942511).
- Btrfs: fix read corruption of compressed and shared extents
  (bnc#946906).
- Btrfs: fix uninit variable in clone ioctl (bnc#942511).
- Btrfs: fix use-after-free in mount_subvol().
- Btrfs: fix wrong check for btrfs_force_chunk_alloc() (bnc#938550).
- Btrfs: lock superblock before remounting for rw subvol (bsc#934962).
- Btrfs: pass unaligned length to btrfs_cmp_data() (bsc#937609).
- Btrfs: remove all subvol options before mounting top-level
  (bsc#934962).
- Btrfs: show subvol= and subvolid= in /proc/mounts (bsc#934962).
- Btrfs: unify subvol= and subvolid= mounting (bsc#934962).
- Btrfs: fill -&gt;last_trans for delayed inode in btrfs_fill_inode
  (bnc#942925).
- Btrfs: fix metadata inconsistencies after directory fsync (bnc#942925).
- Btrfs: fix stale dir entries after removing a link and fsync
  (bnc#942925).
- Btrfs: fix stale dir entries after unlink, inode eviction and fsync
  (bnc#942925).
- Btrfs: fix stale directory entries after fsync log replay (bnc#942925).
- Btrfs: make btrfs_search_forward return with nodes unlocked
  (bnc#942925).
- Btrfs: support NFSv2 export (bnc#929871).
- Btrfs: update fix for read corruption of compressed and shared extents
  (bsc#948256).
- Drivers: hv: do not do hypercalls when hypercall_page is NULL.
- Drivers: hv: vmbus: add special crash handler.
- Drivers: hv: vmbus: add special kexec handler.
- Drivers: hv: vmbus: remove hv_synic_free_cpu() call from
  hv_synic_cleanup().
- Input: evdev - do not report errors form flush() (bsc#939834).
- Input: synaptics - do not retrieve the board id on old firmwares
  (bsc#929092).
- Input: synaptics - log queried and quirked dimension values
  (bsc#929092).
- Input: synaptics - query min dimensions for fw v8.1.
- Input: synaptics - remove X1 Carbon 3rd gen from the topbuttonpad list
  (bsc#929092).
- Input: synaptics - remove X250 from the topbuttonpad list.
- Input: synaptics - remove obsolete min/max quirk for X240 (bsc#929092).
- Input: synaptics - skip quirks when post-2013 dimensions (bsc#929092).
- Input: synaptics - split synaptics_resolution(), query first
  (bsc#929092).
- Input: synaptics - support min/max board id in min_max_pnpid_table
  (bsc#929092).
- NFS: Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).
- NFSv4: do not set SETATTR for O_RDONLY|O_EXCL (bsc#939716).
- PCI: Move MPS configuration check to pci_configure_device()
  (bsc#943313).
- PCI: Set MPS to match upstream bridge (bsc#943313).
- SCSI: fix regression in scsi_send_eh_cmnd() (bsc#930813).
- SCSI: fix scsi_error_handler vs. scsi_host_dev_release race
  (bnc#942204).
- SCSI: vmw_pvscsi: Fix pvscsi_abort() function (bnc#940398).
- UAS: fixup for remaining use of dead_list (bnc#934942).
- USB: storage: use %*ph specifier to dump small buffers (bnc#934942).
- aio: fix reqs_available handling (bsc#943378).
- audit: do not generate loginuid log when audit disabled (bsc#941098).
- blk-merge: do not compute bi_phys_segments from bi_vcnt for cloned bio
  (bnc#934430).
- blk-merge: fix blk_recount_segments (bnc#934430).
- blk-merge: recaculate segment if it isn't less than max segments
  (bnc#934430).
- block: add queue flag for disabling SG merging (bnc#934430).
- block: blk-merge: fix blk_recount_segments() (bnc#934430).
- config: disable CONFIG_TCM_RBD on ppc64le and s390x
- cpufreq: intel_pstate: Add CPU ID for Braswell processor.
- dlm: fix missing endian conversion of rcom_status flags (bsc#940679).
- dm cache mq: fix memory allocation failure for large cache devices
  (bsc#942707).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt
  (bsc#942938).
- drm/i915: Make hpd arrays big enough to avoid out of bounds access
  (bsc#942938).
- drm/i915: Only print hotplug event message when hotplug bit is set
  (bsc#942938).
- drm/i915: Queue reenable timer also when enable_hotplug_processing is
  false (bsc#942938).
- drm/i915: Use an interrupt save spinlock in intel_hpd_irq_handler()
  (bsc#942938).
- drm/radeon: fix hotplug race at startup (bsc#942307).
- ethtool, net/mlx4_en: Add 100M, 20G, 56G speeds ethtool reporting
  support (bsc#945710).
- hrtimer: prevent timer interrupt DoS (bnc#886785).
- hv: fcopy: add memory barrier to propagate state (bnc#943529).
- inotify: Fix nested sleeps in inotify_read() (bsc#940925).
- intel_pstate: Add CPU IDs for Broadwell processors.
- intel_pstate: Add CPUID for BDW-H CPU.
- intel_pstate: Add support for SkyLake.
- intel_pstate: Correct BYT VID values (bnc#907973).
- intel_pstate: Remove periodic P state boost (bnc#907973).
- intel_pstate: add sample time scaling (bnc#907973, bnc#924722,
  bnc#916543).
- intel_pstate: don't touch turbo bit if turbo disabled or unavailable
  (bnc#907973).
- intel_pstate: remove setting P state to MAX on init (bnc#907973).
- intel_pstate: remove unneeded sample buffers (bnc#907973).
- intel_pstate: set BYT MSR with wrmsrl_on_cpu() (bnc#907973).
- ipr: Fix incorrect trace indexing (bsc#940912).
- ipr: Fix invalid array indexing for HRRQ (bsc#940912).
- iwlwifi: dvm: drop non VO frames when flushing (bsc#940545).
- kABI workaround for ieee80211_ops.flush argument change (bsc#940545).
- kconfig: Do not print status messages in make -s mode (bnc#942160).
- kernel/modsign_uefi.c: Check for EFI_RUNTIME_SERVICES in
  load_uefi_certs (bsc#856382).
- kernel: do full redraw of the 3270 screen on reconnect (bnc#943476,
  LTC#129509).
- kexec: define kexec_in_progress in !CONFIG_KEXEC case.
- kvm: Use WARN_ON_ONCE for missing X86_FEATURE_NRIPS (bsc#947537).
- lpfc: Fix scsi prep dma buf error (bsc#908950).
- mac80211: add vif to flush call (bsc#940545).
- md/bitmap: do not abuse i_writecount for bitmap files (bsc#943270).
- md/bitmap: protect clearing of -&amp;gt;bitmap by mddev-&amp;gt;lock
  (bnc#912183).
- md/raid5: use -&amp;gt;lock to protect accessing raid5 sysfs attributes
  (bnc#912183).
- md: fix problems with freeing private data after -&amp;gt;run failure
  (bnc#912183).
- md: level_store: group all important changes into one place
  (bnc#912183).
- md: move GET_BITMAP_FILE ioctl out from mddev_lock (bsc#943270).
- md: protect -&amp;gt;pers changes with mddev-&amp;gt;lock (bnc#912183).
- md: remove mddev_lock from rdev_attr_show() (bnc#912183).
- md: remove mddev_lock() from md_attr_show() (bnc#912183).
- md: remove need for mddev_lock() in md_seq_show() (bnc#912183).
- md: split detach operation out from -&amp;gt;stop (bnc#912183).
- md: tidy up set_bitmap_file (bsc#943270).
- megaraid_sas: Handle firmware initialization after fast boot
  (bsc#922071).
- mfd: lpc_ich: Assign subdevice ids automatically (bnc#898159).
- mm: filemap: Avoid unnecessary barriers and waitqueue lookups -fix
  (VM/FS Performance (bnc#941951)).
- mm: make page pfmemalloc check more robust (bnc#920016).
- mm: numa: disable change protection for vma(VM_HUGETLB) (bnc#943573).
- netfilter: nf_conntrack_proto_sctp: minimal multihoming support
  (bsc#932350).
- net/mlx4_core: Add ethernet backplane autoneg device capability
  (bsc#945710).
- net/mlx4_core: Introduce ACCESS_REG CMD and eth_prot_ctrl dev cap
  (bsc#945710).
- net/mlx4_en: Use PTYS register to query ethtool settings (bsc#945710).
- net/mlx4_en: Use PTYS register to set ethtool settings (Speed)
  (bsc#945710).
- rcu: Reject memory-order-induced stall-warning false positives
  (bnc#941908).
- s390/dasd: fix kernel panic when alias is set offline (bnc#940965,
  LTC#128595).
- sched: Fix KMALLOC_MAX_SIZE overflow during cpumask allocation
  (bnc#939266).
- sched: Fix cpu_active_mask/cpu_online_mask race (bsc#936773).
- sched, numa: do not hint for NUMA balancing on VM_MIXEDMAP mappings
  (bnc#943573).
- uas: Add US_FL_MAX_SECTORS_240 flag (bnc#934942).
- uas: Add response iu handling (bnc#934942).
- uas: Add uas_get_tag() helper function (bnc#934942).
- uas: Check against unexpected completions (bnc#934942).
- uas: Cleanup uas_log_cmd_state usage (bnc#934942).
- uas: Do not log urb status error on cancellation (bnc#934942).
- uas: Do not use scsi_host_find_tag (bnc#934942).
- uas: Drop COMMAND_COMPLETED flag (bnc#934942).
- uas: Drop all references to a scsi_cmnd once it has been aborted
  (bnc#934942).
- uas: Drop inflight list (bnc#934942).
- uas: Fix memleak of non-submitted urbs (bnc#934942).
- uas: Fix resetting flag handling (bnc#934942).
- uas: Free data urbs on completion (bnc#934942).
- uas: Log error codes when logging errors (bnc#934942).
- uas: Reduce number of function arguments for uas_alloc_foo functions
  (bnc#934942).
- uas: Remove cmnd reference from the cmd urb (bnc#934942).
- uas: Remove support for old sense ui as used in pre-production hardware
  (bnc#934942).
- uas: Remove task-management / abort error handling code (bnc#934942).
- uas: Set max_sectors_240 quirk for ASM1053 devices (bnc#934942).
- uas: Simplify reset / disconnect handling (bnc#934942).
- uas: Simplify unlink of data urbs on error (bnc#934942).
- uas: Use scsi_print_command (bnc#934942).
- uas: pre_reset and suspend: Fix a few races (bnc#934942).
- uas: zap_pending: data urbs should have completed at this time
  (bnc#934942).
- x86/kernel: Do not reserve crashkernel high memory if crashkernel low
  memory reserving failed (bsc#939145).
- x86/smpboot: Check for cpu_active on cpu initialization (bsc#932285).
- x86/smpboot: Check for cpu_active on cpu initialization (bsc#936773).
- xhci: Workaround for PME stuck issues in Intel xhci (bnc#944028).
- xhci: rework cycle bit checking for new dequeue pointers (bnc#944028).
- xfs: Fix file type directory corruption for btree directories
  (bsc#941305).		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-06"/>
	<updated date="2015-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/856382">SUSE bug 856382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886785">SUSE bug 886785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898159">SUSE bug 898159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907973">SUSE bug 907973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908950">SUSE bug 908950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912183">SUSE bug 912183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914818">SUSE bug 914818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916543">SUSE bug 916543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920016">SUSE bug 920016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922071">SUSE bug 922071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924722">SUSE bug 924722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929092">SUSE bug 929092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929871">SUSE bug 929871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930813">SUSE bug 930813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932285">SUSE bug 932285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932350">SUSE bug 932350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934430">SUSE bug 934430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934942">SUSE bug 934942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934962">SUSE bug 934962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936556">SUSE bug 936556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936773">SUSE bug 936773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937609">SUSE bug 937609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937612">SUSE bug 937612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937613">SUSE bug 937613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937616">SUSE bug 937616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938550">SUSE bug 938550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938706">SUSE bug 938706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938891">SUSE bug 938891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938892">SUSE bug 938892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938893">SUSE bug 938893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939145">SUSE bug 939145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939266">SUSE bug 939266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939716">SUSE bug 939716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939834">SUSE bug 939834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939994">SUSE bug 939994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940398">SUSE bug 940398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940545">SUSE bug 940545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940679">SUSE bug 940679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940776">SUSE bug 940776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940912">SUSE bug 940912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940925">SUSE bug 940925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940965">SUSE bug 940965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941098">SUSE bug 941098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941305">SUSE bug 941305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941908">SUSE bug 941908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941951">SUSE bug 941951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942160">SUSE bug 942160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942204">SUSE bug 942204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942307">SUSE bug 942307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942367">SUSE bug 942367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948536">SUSE bug 948536</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5156/">CVE-2015-5156</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5157/">CVE-2015-5157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5283/">CVE-2015-5283</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-5697/">CVE-2015-5697</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6252/">CVE-2015-6252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6937/">CVE-2015-6937</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-7613/">CVE-2015-7613</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515038" comment="kernel-default-3.12.48-52.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515039" comment="kernel-default-devel-3.12.48-52.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515040" comment="kernel-default-extra-3.12.48-52.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515041" comment="kernel-devel-3.12.48-52.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515042" comment="kernel-macros-3.12.48-52.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515043" comment="kernel-source-3.12.48-52.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515044" comment="kernel-syms-3.12.48-52.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515045" comment="kernel-xen-3.12.48-52.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515046" comment="kernel-xen-devel-3.12.48-52.27.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77357" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="907434" ref_url="https://bugzilla.suse.com/907434" source="BUGZILLA"/>
		<reference ref_id="908742" ref_url="https://bugzilla.suse.com/908742" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9114" ref_url="https://www.suse.com/security/cve/CVE-2014-9114/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001218.html" source="SUSE-SU"/>
		<description>
util-linux was updated to fix one security issue.

This security issue was fixed:
- CVE-2014-9114: Using crafted block devices (e.g. USB sticks) it was possibly to inject code via libblkid.
  libblkid was fixed to care about unsafe chars and possible buffer overflow in cache (bnc#907434)

This non-security issue was fixed:
- libblkid: Reset errno in blkid_probe_get_buffer() to prevent
  failing probes (e. g. for exFAT) (bnc#908742).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-10"/>
	<updated date="2015-02-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/907434">SUSE bug 907434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908742">SUSE bug 908742</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9114/">CVE-2014-9114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515047" comment="libblkid1-2.25-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515048" comment="libblkid1-32bit-2.25-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515049" comment="libmount1-2.25-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515050" comment="libmount1-32bit-2.25-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515051" comment="libsmartcols1-2.25-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515052" comment="libuuid-devel-2.25-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515053" comment="libuuid1-2.25-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515054" comment="libuuid1-32bit-2.25-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515055" comment="python-libmount-2.25-10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515056" comment="util-linux-2.25-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515057" comment="util-linux-lang-2.25-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515058" comment="util-linux-systemd-2.25-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515059" comment="uuidd-2.25-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77358" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="944460" ref_url="https://bugzilla.suse.com/944460" source="BUGZILLA"/>
		<reference ref_id="948976" ref_url="https://bugzilla.suse.com/948976" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3247" ref_url="https://www.suse.com/security/cve/CVE-2015-3247/" source="CVE"/>
		<reference ref_id="CVE-2015-5260" ref_url="https://www.suse.com/security/cve/CVE-2015-5260/" source="CVE"/>
		<reference ref_id="CVE-2015-5261" ref_url="https://www.suse.com/security/cve/CVE-2015-5261/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001627.html" source="SUSE-SU"/>
		<description>
Spice was updated to fix three security issues.
    
The following vulnerabilities were fixed:  
* CVE-2015-3247: heap corruption in the spice server (bsc#944460)
* CVE-2015-5261: Guest could have accessed host memory using crafted images (bsc#948976)
* CVE-2015-5260: Insufficient validation of surface_id parameter could have caused a crash (bsc#944460)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-07"/>
	<updated date="2015-10-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/944460">SUSE bug 944460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948976">SUSE bug 948976</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3247/">CVE-2015-3247</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5260/">CVE-2015-5260</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2015-5261/">CVE-2015-5261</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515060" comment="libspice-server1-0.12.4-8.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77359" version="1" class="patch">
	<metadata>
		<title>Security update for xdg-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="906625" ref_url="https://bugzilla.suse.com/906625" source="BUGZILLA"/>
		<reference ref_id="913676" ref_url="https://bugzilla.suse.com/913676" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9622" ref_url="https://www.suse.com/security/cve/CVE-2014-9622/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001219.html" source="SUSE-SU"/>
		<description>

This update of xdg-utils fixes a command injection security problem (CVE-2014-9622, bsc#913676)
and a bug when opening files where multiple mime handlers existed (bsc#906625).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-24"/>
	<updated date="2015-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/906625">SUSE bug 906625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913676">SUSE bug 913676</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9622/">CVE-2014-9622</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515061" comment="xdg-utils-20140630-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77360" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="950169" ref_url="https://bugzilla.suse.com/950169" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5569" ref_url="https://www.suse.com/security/cve/CVE-2015-5569/" source="CVE"/>
		<reference ref_id="CVE-2015-7625" ref_url="https://www.suse.com/security/cve/CVE-2015-7625/" source="CVE"/>
		<reference ref_id="CVE-2015-7626" ref_url="https://www.suse.com/security/cve/CVE-2015-7626/" source="CVE"/>
		<reference ref_id="CVE-2015-7627" ref_url="https://www.suse.com/security/cve/CVE-2015-7627/" source="CVE"/>
		<reference ref_id="CVE-2015-7628" ref_url="https://www.suse.com/security/cve/CVE-2015-7628/" source="CVE"/>
		<reference ref_id="CVE-2015-7629" ref_url="https://www.suse.com/security/cve/CVE-2015-7629/" source="CVE"/>
		<reference ref_id="CVE-2015-7630" ref_url="https://www.suse.com/security/cve/CVE-2015-7630/" source="CVE"/>
		<reference ref_id="CVE-2015-7631" ref_url="https://www.suse.com/security/cve/CVE-2015-7631/" source="CVE"/>
		<reference ref_id="CVE-2015-7632" ref_url="https://www.suse.com/security/cve/CVE-2015-7632/" source="CVE"/>
		<reference ref_id="CVE-2015-7633" ref_url="https://www.suse.com/security/cve/CVE-2015-7633/" source="CVE"/>
		<reference ref_id="CVE-2015-7634" ref_url="https://www.suse.com/security/cve/CVE-2015-7634/" source="CVE"/>
		<reference ref_id="CVE-2015-7643" ref_url="https://www.suse.com/security/cve/CVE-2015-7643/" source="CVE"/>
		<reference ref_id="CVE-2015-7644" ref_url="https://www.suse.com/security/cve/CVE-2015-7644/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1740-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html" source="SUSE-SU"/>
		<description>
flash-player was updated to version 11.2.202.535 to fix 13 security issues (bsc#950169).

These security issues were fixed:
- A vulnerability that could be exploited to bypass the same-origin-policy and lead to information disclosure (CVE-2015-7628).
- A defense-in-depth feature in the Flash broker API (CVE-2015-5569).
- Use-after-free vulnerabilities that could lead to code execution (CVE-2015-7629, CVE-2015-7631, CVE-2015-7643, CVE-2015-7644).
- A buffer overflow vulnerability that could lead to code execution (CVE-2015-7632).
- Memory corruption vulnerabilities that could lead to code execution (CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7630, CVE-2015-7633, CVE-2015-7634).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-14"/>
	<updated date="2015-10-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/950169">SUSE bug 950169</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5569/">CVE-2015-5569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7625/">CVE-2015-7625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7626/">CVE-2015-7626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7627/">CVE-2015-7627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7628/">CVE-2015-7628</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7629/">CVE-2015-7629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7630/">CVE-2015-7630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7631/">CVE-2015-7631</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7632/">CVE-2015-7632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7633/">CVE-2015-7633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7634/">CVE-2015-7634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7643/">CVE-2015-7643</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7644/">CVE-2015-7644</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515062" comment="flash-player-11.2.202.535-105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515063" comment="flash-player-gnome-11.2.202.535-105.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77361" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="910764" ref_url="https://bugzilla.suse.com/910764" source="BUGZILLA"/>
		<reference ref_id="911792" ref_url="https://bugzilla.suse.com/911792" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9293" ref_url="https://www.suse.com/security/cve/CVE-2014-9293/" source="CVE"/>
		<reference ref_id="CVE-2014-9294" ref_url="https://www.suse.com/security/cve/CVE-2014-9294/" source="CVE"/>
		<reference ref_id="CVE-2014-9297" ref_url="https://www.suse.com/security/cve/CVE-2014-9297/" source="CVE"/>
		<reference ref_id="CVE-2014-9298" ref_url="https://www.suse.com/security/cve/CVE-2014-9298/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00013.html" source="SUSE-SU"/>
		<description>
ntp was updated to fix four security issues.

These security issues were fixed:
- CVE-2014-9294: util/ntp-keygen.c in ntp-keygen used a weak RNG seed, which made it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack (bnc#910764 911792).
- CVE-2014-9293: The config_auth function in ntpd, when an auth key was not configured, improperly generated a key, which made it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack (bnc#910764 911792).
- CVE-2014-9298: ::1 can be spoofed on some OSes, so ACLs based on IPv6 ::1 addresses could be bypassed (bnc#911792).
- CVE-2014-9297: Information leak by not properly checking a length in several places in ntp_crypto.c (bnc#911792).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-09"/>
	<updated date="2015-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/910764">SUSE bug 910764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9293/">CVE-2014-9293</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9294/">CVE-2014-9294</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9297/">CVE-2014-9297</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9298/">CVE-2014-9298</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515064" comment="ntp-4.2.6p5-37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515065" comment="ntp-doc-4.2.6p5-37.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77362" version="1" class="patch">
	<metadata>
		<title>Security update for vorbis-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="943795" ref_url="https://bugzilla.suse.com/943795" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6749" ref_url="https://www.suse.com/security/cve/CVE-2015-6749/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001631.html" source="SUSE-SU"/>
		<description>

vorbis-tools was updated to fix a buffer overflow in aiff_open() that could be triggered
by opening prepared malicious files. (CVE-2015-6749, bsc#943795).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-26"/>
	<updated date="2015-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/943795">SUSE bug 943795</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6749/">CVE-2015-6749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515066" comment="vorbis-tools-1.4.0-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515067" comment="vorbis-tools-lang-1.4.0-26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77363" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="950474" ref_url="https://bugzilla.suse.com/950474" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7645" ref_url="https://www.suse.com/security/cve/CVE-2015-7645/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00016.html" source="SUSE-SU"/>
		<description>
flash-player was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-7645: Critical vulnerability affecting 11.2.202.535 used in Pawn Storm (APSA15-05) (bsc#950474).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-16"/>
	<updated date="2015-10-16"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/950474">SUSE bug 950474</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7645/">CVE-2015-7645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515068" comment="flash-player-11.2.202.540-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515069" comment="flash-player-gnome-11.2.202.540-108.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77364" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="856322" ref_url="https://bugzilla.suse.com/856322" source="BUGZILLA"/>
		<reference ref_id="897048" ref_url="https://bugzilla.suse.com/897048" source="BUGZILLA"/>
		<reference ref_id="897512" ref_url="https://bugzilla.suse.com/897512" source="BUGZILLA"/>
		<reference ref_id="910491" ref_url="https://bugzilla.suse.com/910491" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9221" ref_url="https://www.suse.com/security/cve/CVE-2014-9221/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001221.html" source="SUSE-SU"/>
		<description>
This strongswan update fixes the following security and non security
issues.

- Disallow brainpool elliptic curve groups in fips mode (bnc#856322).
- Applied an upstream fix for a denial-of-service vulnerability,
  which can be triggered by an IKEv2 Key Exchange payload, that
  contains the Diffie-Hellman group 1025 (bsc#910491,CVE-2014-9221).
- Adjusted whilelist of approved algorithms in fips mode (bsc#856322).
- Updated strongswan-hmac package description (bsc#856322).
- Disabled explicit gpg validation; osc source_validator does it.
- Guarded fipscheck and hmac package in the spec file for &gt;13.1.
- Added generation of fips hmac hash files using fipshmac utility
  and a _fipscheck script to verify binaries/libraries/plugings
  shipped in the strongswan-hmac package.
  With enabled fips in the kernel, the ipsec script will call it
  before any action or in a enforced/manual 'ipsec _fipscheck' call.
  Added config file to load openssl and kernel af-alg plugins, but
  not all the other modules which provide further/alternative algs.
  Applied a filter disallowing non-approved algorithms in fips mode.
  (fate#316931,bnc#856322).
- Fixed file list in the optional (disabled) strongswan-test package.
- Fixed build of the strongswan built-in integrity checksum library
  and enabled building it only on architectures tested to work.
- Fix to use bug number 897048 instead 856322 in last changes entry.
- Applied an upstream patch reverting to store algorithms in the
  registration order again as ordering them by identifier caused
  weaker algorithms to be proposed first by default (bsc#897512).		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-19"/>
	<updated date="2014-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/856322">SUSE bug 856322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897048">SUSE bug 897048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897512">SUSE bug 897512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910491">SUSE bug 910491</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9221/">CVE-2014-9221</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515070" comment="strongswan-5.1.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515071" comment="strongswan-doc-5.1.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515072" comment="strongswan-ipsec-5.1.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515073" comment="strongswan-libs0-5.1.3-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77365" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="902737" ref_url="https://bugzilla.suse.com/902737" source="BUGZILLA"/>
		<reference ref_id="928308" ref_url="https://bugzilla.suse.com/928308" source="BUGZILLA"/>
		<reference ref_id="934506" ref_url="https://bugzilla.suse.com/934506" source="BUGZILLA"/>
		<reference ref_id="934517" ref_url="https://bugzilla.suse.com/934517" source="BUGZILLA"/>
		<reference ref_id="936537" ref_url="https://bugzilla.suse.com/936537" source="BUGZILLA"/>
		<reference ref_id="937125" ref_url="https://bugzilla.suse.com/937125" source="BUGZILLA"/>
		<reference ref_id="937572" ref_url="https://bugzilla.suse.com/937572" source="BUGZILLA"/>
		<reference ref_id="938344" ref_url="https://bugzilla.suse.com/938344" source="BUGZILLA"/>
		<reference ref_id="939216" ref_url="https://bugzilla.suse.com/939216" source="BUGZILLA"/>
		<reference ref_id="943446" ref_url="https://bugzilla.suse.com/943446" source="BUGZILLA"/>
		<reference ref_id="944017" ref_url="https://bugzilla.suse.com/944017" source="BUGZILLA"/>
		<reference ref_id="945404" ref_url="https://bugzilla.suse.com/945404" source="BUGZILLA"/>
		<reference ref_id="945778" ref_url="https://bugzilla.suse.com/945778" source="BUGZILLA"/>
		<reference ref_id="945987" ref_url="https://bugzilla.suse.com/945987" source="BUGZILLA"/>
		<reference ref_id="945989" ref_url="https://bugzilla.suse.com/945989" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-5279" ref_url="https://www.suse.com/security/cve/CVE-2015-5279/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html" source="SUSE-SU"/>
		<description>
qemu was updated to fix several security issues and bugs.

The following vulnerabilities were fixed:
- CVE-2015-5154: Heap-based buffer overflow in the IDE subsystem in QEMU,
  when the container has a CDROM drive enabled, allows local guest users
  to execute arbitrary code on the host via unspecified ATAPI commands.
  (bsc#938344).
- CVE-2015-5278: QEMU was vulnerable to an infinite loop issue that
  could occur when receiving packets over the network. (bsc#945989)
- CVE-2015-5279: QEMU was vulnerable to a heap buffer overflow issue
  that could occur when receiving packets over the network. (bsc#945987)
- CVE-2015-6855: QEMU was vulnerable to a divide by zero issue that could
  occur while executing an IDE command WIN_READ_NATIVE_MAX to determine
  the maximum size of a drive. (bsc#945404)
- CVE-2014-7815: The set_pixel_format function in ui/vnc.c in QEMU
  allowed remote attackers to cause a denial of service (crash) via a small
  bytes_per_pixel value.  (bsc#902737):

Also these non-security issues were fixed:
- bsc#937572: Fixed dictzip on big endian systems 
- bsc#934517: Fix 'info tlb' causes guest to freeze
- bsc#934506: Fix vte monitor consol looks empy
- bsc#937125: Fix parsing of scsi-disk wwn uint64 property 
- bsc#945778: Drop .probe hooks for DictZip and tar block drivers
- bsc#937572: Fold common-obj-y -&gt; block-obj-y change into original patches
- bsc#928308,bsc#944017: Fix virtio-ccw index errors when initrd gets too large 
- bsc#936537: Fix possible qemu-img error when converting to compressed qcow2 image
- bsc#939216: Fix reboot fail after install using uefi
- bsc#943446: qemu-img convert doesn't create MB aligned VHDs anymore

		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-28"/>
	<updated date="2015-09-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/902737">SUSE bug 902737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928308">SUSE bug 928308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934506">SUSE bug 934506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934517">SUSE bug 934517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936537">SUSE bug 936537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937125">SUSE bug 937125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937572">SUSE bug 937572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939216">SUSE bug 939216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943446">SUSE bug 943446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944017">SUSE bug 944017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945404">SUSE bug 945404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945778">SUSE bug 945778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945987">SUSE bug 945987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945989">SUSE bug 945989</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5279/">CVE-2015-5279</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515074" comment="qemu-2.0.2-48.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515075" comment="qemu-block-curl-2.0.2-48.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515076" comment="qemu-ipxe-1.0.0-48.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515077" comment="qemu-kvm-2.0.2-48.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515078" comment="qemu-seabios-1.7.4-48.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515079" comment="qemu-sgabios-8-48.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515080" comment="qemu-tools-2.0.2-48.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515081" comment="qemu-vgabios-1.7.4-48.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515082" comment="qemu-x86-2.0.2-48.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77366" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="911837" ref_url="https://bugzilla.suse.com/911837" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8157" ref_url="https://www.suse.com/security/cve/CVE-2014-8157/" source="CVE"/>
		<reference ref_id="CVE-2014-8158" ref_url="https://www.suse.com/security/cve/CVE-2014-8158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001223.html" source="SUSE-SU"/>
		<description>
jasper was updated to fix two security issues.

These security issues were fixed:
- CVE-2014-8157: Off-by-one error in the jpc_dec_process_sot function in JasPer 1.900.1 and earlier allowed remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image, which triggers a heap-based buffer overflow (bnc#911837).
CVE-2014-8158: Multiple stack-based buffer overflows in jpc_qmfb.c in JasPer 1.900.1 and earlier allowed remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image (bnc#911837).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-02"/>
	<updated date="2015-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/911837">SUSE bug 911837</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8157/">CVE-2014-8157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8158/">CVE-2014-8158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515083" comment="libjasper1-1.900.1-170.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515084" comment="libjasper1-32bit-1.900.1-170.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77367" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="897874" ref_url="https://bugzilla.suse.com/897874" source="BUGZILLA"/>
		<reference ref_id="898439" ref_url="https://bugzilla.suse.com/898439" source="BUGZILLA"/>
		<reference ref_id="912002" ref_url="https://bugzilla.suse.com/912002" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5351" ref_url="https://www.suse.com/security/cve/CVE-2014-5351/" source="CVE"/>
		<reference ref_id="CVE-2014-5352" ref_url="https://www.suse.com/security/cve/CVE-2014-5352/" source="CVE"/>
		<reference ref_id="CVE-2014-9421" ref_url="https://www.suse.com/security/cve/CVE-2014-9421/" source="CVE"/>
		<reference ref_id="CVE-2014-9422" ref_url="https://www.suse.com/security/cve/CVE-2014-9422/" source="CVE"/>
		<reference ref_id="CVE-2014-9423" ref_url="https://www.suse.com/security/cve/CVE-2014-9423/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0290-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00017.html" source="SUSE-SU"/>
		<description>

MIT kerberos krb5 was updated to fix several security issues and bugs.

Security issues fixed:
CVE-2014-5351: The kadm5_randkey_principal_3 function in
lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5)
sent old keys in a response to a -randkey -keepold request, which allowed
remote authenticated users to forge tickets by leveraging administrative
access.

CVE-2014-5352: In the MIT krb5 libgssapi_krb5 library, after
gss_process_context_token() is used to process a valid context
deletion token, the caller was left with a security context handle
containing a dangling pointer.  Further uses of this handle would have
resulted in use-after-free and double-free memory access violations.
libgssrpc server applications such as kadmind were vulnerable as they
can be instructed to call gss_process_context_token().

CVE-2014-9421: If the MIT krb5 kadmind daemon receives invalid XDR
data from an authenticated user, it may have performed use-after-free and
double-free memory access violations while cleaning up the partial
deserialization results. Other libgssrpc server applications might also
been vulnerable if they contain insufficiently defensive XDR functions.

CVE-2014-9422: The MIT krb5 kadmind daemon incorrectly accepted
authentications to two-component server principals whose first
component is a left substring of 'kadmin' or whose realm is a left
prefix of the default realm.

CVE-2014-9423: libgssrpc applications including kadmind output four or
eight bytes of uninitialized memory to the network as part of an
unused 'handle' field in replies to clients.

Bugs fixed:
- Work around replay cache creation race; (bnc#898439).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-21"/>
	<updated date="2015-01-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/897874">SUSE bug 897874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898439">SUSE bug 898439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912002">SUSE bug 912002</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5351/">CVE-2014-5351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5352/">CVE-2014-5352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9421/">CVE-2014-9421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9422/">CVE-2014-9422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9423/">CVE-2014-9423</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515085" comment="krb5-1.12.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515086" comment="krb5-32bit-1.12.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515087" comment="krb5-client-1.12.1-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77368" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql93 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="949669" ref_url="https://bugzilla.suse.com/949669" source="BUGZILLA"/>
		<reference ref_id="949670" ref_url="https://bugzilla.suse.com/949670" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001646.html" source="SUSE-SU"/>
		<description>

The PostreSQL database postgresql93 was updated to the bugfix release 9.3.10:

Security issues fixed:
- CVE-2015-5289, bsc#949670: json or jsonb input values
  constructed from arbitrary user input can crash the PostgreSQL
  server and cause a denial of service.
- CVE-2015-5288, bsc#949669: The crypt() function included with
  the optional pgCrypto extension could be exploited to read a
  few additional bytes of memory. No working exploit for this
  issue has been developed.

For the full release notes, see:
  http://www.postgresql.org/docs/current/static/release-9-3-10.html

Other bugs fixed:
* Move systemd related stuff and user creation to postgresql-init.
* Remove some obsolete %suse_version conditionals.
* Relax dependency on libpq to major version.
* Fix possible failure to recover from an inconsistent database state. See full release notes for details.
* Fix rare failure to invalidate relation cache init file.
* Avoid deadlock between incoming sessions and CREATE/DROP DATABASE.
* Improve planner's cost estimates for semi-joins and anti-joins with inner indexscans
* For the full release notes for 9.3.9 see: http://www.postgresql.org/docs/9.3/static/release-9-3-9.html
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-20"/>
	<updated date="2015-10-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949670">SUSE bug 949670</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515088" comment="postgresql93-9.3.10-11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77369" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="915512" ref_url="https://bugzilla.suse.com/915512" source="BUGZILLA"/>
		<reference ref_id="916214" ref_url="https://bugzilla.suse.com/916214" source="BUGZILLA"/>
		<reference ref_id="916215" ref_url="https://bugzilla.suse.com/916215" source="BUGZILLA"/>
		<reference ref_id="916217" ref_url="https://bugzilla.suse.com/916217" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9328" ref_url="https://www.suse.com/security/cve/CVE-2014-9328/" source="CVE"/>
		<reference ref_id="CVE-2015-1461" ref_url="https://www.suse.com/security/cve/CVE-2015-1461/" source="CVE"/>
		<reference ref_id="CVE-2015-1462" ref_url="https://www.suse.com/security/cve/CVE-2015-1462/" source="CVE"/>
		<reference ref_id="CVE-2015-1463" ref_url="https://www.suse.com/security/cve/CVE-2015-1463/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001226.html" source="SUSE-SU"/>
		<description>
clamav was updated to version 0.98.6 to fix four security issues.

These security issues were fixed:
- CVE-2015-1462: ClamAV allowed remote attackers to have unspecified impact via a crafted upx packer file, related to a heap out of bounds condition (bnc#916214).
- CVE-2015-1463: ClamAV allowed remote attackers to cause a denial of service (crash) via a crafted petite packer file, related to an incorrect compiler optimization (bnc#916215).
- CVE-2014-9328: ClamAV allowed remote attackers to have unspecified impact via a crafted upack packer file, related to a heap out of bounds condition (bnc#915512).
- CVE-2015-1461: ClamAV allowed remote attackers to have unspecified impact via a crafted (1) Yoda's crypter or (2) mew packer file, related to a heap out of bounds condition (bnc#916217).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-06"/>
	<updated date="2015-02-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/915512">SUSE bug 915512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916214">SUSE bug 916214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916215">SUSE bug 916215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916217">SUSE bug 916217</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9328/">CVE-2014-9328</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1461/">CVE-2015-1461</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1462/">CVE-2015-1462</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1463/">CVE-2015-1463</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515089" comment="clamav-0.98.6-10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77370" version="1" class="patch">
	<metadata>
		<title>Security update for gcc48 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="945842" ref_url="https://bugzilla.suse.com/945842" source="BUGZILLA"/>
		<reference ref_id="947772" ref_url="https://bugzilla.suse.com/947772" source="BUGZILLA"/>
		<reference ref_id="947791" ref_url="https://bugzilla.suse.com/947791" source="BUGZILLA"/>
		<reference ref_id="948168" ref_url="https://bugzilla.suse.com/948168" source="BUGZILLA"/>
		<reference ref_id="949000" ref_url="https://bugzilla.suse.com/949000" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001648.html" source="SUSE-SU"/>
		<description>
This update for GCC 4.8 provides the following fixes:

- Fix C++11 std::random_device short read issue that could lead to predictable
  randomness. (CVE-2015-5276, bsc#945842)
- Fix linker segmentation fault when building SLOF on ppc64le. (bsc#949000)
- Fix no_instrument_function attribute handling on PPC64 with -mprofile-kernel. (bsc#947791)
- Fix internal compiler error with aarch64 target using PCH and builtin functions. (bsc#947772)
- Fix libffi issues on aarch64. (bsc#948168)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-07"/>
	<updated date="2015-10-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/945842">SUSE bug 945842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947772">SUSE bug 947772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947791">SUSE bug 947791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948168">SUSE bug 948168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949000">SUSE bug 949000</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515090" comment="cpp48-4.8.5-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515091" comment="gcc48-4.8.5-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515092" comment="gcc48-32bit-4.8.5-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515093" comment="gcc48-c++-4.8.5-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515094" comment="gcc48-gij-4.8.5-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515095" comment="gcc48-gij-32bit-4.8.5-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515096" comment="gcc48-info-4.8.5-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515097" comment="libasan0-4.8.5-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515098" comment="libasan0-32bit-4.8.5-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515099" comment="libgcj48-4.8.5-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515100" comment="libgcj48-32bit-4.8.5-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515101" comment="libgcj48-jar-4.8.5-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515102" comment="libgcj_bc1-4.8.5-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515103" comment="libstdc++48-devel-4.8.5-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515104" comment="libstdc++48-devel-32bit-4.8.5-24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77371" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="912889" ref_url="https://bugzilla.suse.com/912889" source="BUGZILLA"/>
		<reference ref_id="933922" ref_url="https://bugzilla.suse.com/933922" source="BUGZILLA"/>
		<reference ref_id="935119" ref_url="https://bugzilla.suse.com/935119" source="BUGZILLA"/>
		<reference ref_id="939246" ref_url="https://bugzilla.suse.com/939246" source="BUGZILLA"/>
		<reference ref_id="943816" ref_url="https://bugzilla.suse.com/943816" source="BUGZILLA"/>
		<reference ref_id="950114" ref_url="https://bugzilla.suse.com/950114" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3218" ref_url="https://www.suse.com/security/cve/CVE-2015-3218/" source="CVE"/>
		<reference ref_id="CVE-2015-3255" ref_url="https://www.suse.com/security/cve/CVE-2015-3255/" source="CVE"/>
		<reference ref_id="CVE-2015-3256" ref_url="https://www.suse.com/security/cve/CVE-2015-3256/" source="CVE"/>
		<reference ref_id="CVE-2015-4625" ref_url="https://www.suse.com/security/cve/CVE-2015-4625/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001649.html" source="SUSE-SU"/>
		<description>

polkit was updated to the 0.113 release, fixing security issues and bugs.

Security issues fixed:
* Fixes CVE-2015-4625, a local privilege escalation due to predictable
  authentication session cookie values. Thanks to Tavis Ormandy, Google Project
  Zero for reporting this issue. For the future, authentication agents are
  encouraged to use PolkitAgentSession instead of using the D-Bus agent response
  API directly. (bsc#935119)
* Fixes CVE-2015-3256, various memory corruption vulnerabilities in use of the
  JavaScript interpreter, possibly leading to local privilege escalation.
  (bsc#943816)
* Fixes CVE-2015-3255, a memory corruption vulnerability in handling duplicate
  action IDs, possibly leading to local privilege escalation. Thanks to
  Laurent Bigonville for reporting this issue. (bsc#939246)
* Fixes CVE-2015-3218, which allowed any local user to crash polkitd. Thanks to
  Tavis Ormandy, Google Project Zero, for reporting this issue. (bsc#933922)

Other issues fixed:
* On systemd-213 and later, the 'active' state is shared across all sessions of
  an user, instead of being tracked separately.
* pkexec, when not given a program to execute, runs the users shell by
  default.
* Fixed shutdown problems on powerpc64le (bsc#950114)
* polkit had a memory leak (bsc#912889)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-22"/>
	<updated date="2015-10-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/912889">SUSE bug 912889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933922">SUSE bug 933922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935119">SUSE bug 935119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939246">SUSE bug 939246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943816">SUSE bug 943816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950114">SUSE bug 950114</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3218/">CVE-2015-3218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3255/">CVE-2015-3255</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3256/">CVE-2015-3256</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4625/">CVE-2015-4625</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515105" comment="libpolkit0-0.113-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515106" comment="libpolkit0-32bit-0.113-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515107" comment="polkit-0.113-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515108" comment="typelib-1_0-Polkit-1_0-0.113-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77372" version="1" class="patch">
	<metadata>
		<title>Security update for elfutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="911662" ref_url="https://bugzilla.suse.com/911662" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9447" ref_url="https://www.suse.com/security/cve/CVE-2014-9447/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001227.html" source="SUSE-SU"/>
		<description>
elfutils was updated to fix one security issue.

This security issue was fixed:
- Directory traversal vulnerability in the read_long_names function (CVE-2014-9447).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-30"/>
	<updated date="2015-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/911662">SUSE bug 911662</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9447/">CVE-2014-9447</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515109" comment="elfutils-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515110" comment="libasm1-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515111" comment="libdw1-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515112" comment="libdw1-32bit-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515113" comment="libebl1-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515114" comment="libebl1-32bit-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515115" comment="libelf1-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515116" comment="libelf1-32bit-0.158-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77373" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="915955" ref_url="https://bugzilla.suse.com/915955" source="BUGZILLA"/>
		<reference ref_id="918187" ref_url="https://bugzilla.suse.com/918187" source="BUGZILLA"/>
		<reference ref_id="920338" ref_url="https://bugzilla.suse.com/920338" source="BUGZILLA"/>
		<reference ref_id="927080" ref_url="https://bugzilla.suse.com/927080" source="BUGZILLA"/>
		<reference ref_id="928723" ref_url="https://bugzilla.suse.com/928723" source="BUGZILLA"/>
		<reference ref_id="931480" ref_url="https://bugzilla.suse.com/931480" source="BUGZILLA"/>
		<reference ref_id="934084" ref_url="https://bugzilla.suse.com/934084" source="BUGZILLA"/>
		<reference ref_id="937853" ref_url="https://bugzilla.suse.com/937853" source="BUGZILLA"/>
		<reference ref_id="939211" ref_url="https://bugzilla.suse.com/939211" source="BUGZILLA"/>
		<reference ref_id="940195" ref_url="https://bugzilla.suse.com/940195" source="BUGZILLA"/>
		<reference ref_id="940332" ref_url="https://bugzilla.suse.com/940332" source="BUGZILLA"/>
		<reference ref_id="944494" ref_url="https://bugzilla.suse.com/944494" source="BUGZILLA"/>
		<reference ref_id="945779" ref_url="https://bugzilla.suse.com/945779" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121/" source="CVE"/>
		<reference ref_id="CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001651.html" source="SUSE-SU"/>
		<description>

glibc was updated to fix bugs and security issues.

Security issues fixed:

* A buffer overflow in nss_dns was fixed that could lead to crashes. (CVE-2015-1781, bsc#927080, BZ #18287)
* A denial of service attack (out of memory) in the NSS files backend was fixed (CVE-2014-8121, bsc#918187, GLIBC BZ #18007)

Non security bugs fixed:

* Fix regression in threaded application malloc performance (bsc#915955, GLIBC#17195)
* Fix read past end of pattern in fnmatch (bsc#920338, GLIBC#17062, GLIBC#18032, GLIBC#18036)
* Record TTL also for DNS PTR queries (bsc#928723, GLIBC#18513)
* Increase MINSIGSTKSZ and SIGSTKSZ for aarch64 (bsc#931480, GLIBC#16850)
* Fix handling of IPv6 nameservers (bsc#939211, GLIBC#13028, GLIBC#17053)
* Avoid use of asm/ptrace.h (bsc#934084)
* Do not corrupt the top of a threaded heap if top chunk is MINSIZE (GLIBC#18502)
* Terminate unwinding after makecontext_ret on s390 (bsc#940332. bsc#944494, GLIBC#18508)
* Restore signal mask in set/swapcontext on s390 (bsc#940195, bsc#944494, GLIBC#18080)
* fix dlopen in static binaries (bsc#937853, GLIBC#17250)
* Properly reread entry after failure in nss_files getent function (bsc#945779, BZ #18991)

Features added:

* AVX512 support (fate#318844)
* Add compatibility symlinks for LSB 3.0 (fate#318933)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-24"/>
	<updated date="2015-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/915955">SUSE bug 915955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918187">SUSE bug 918187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920338">SUSE bug 920338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927080">SUSE bug 927080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928723">SUSE bug 928723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931480">SUSE bug 931480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934084">SUSE bug 934084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937853">SUSE bug 937853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939211">SUSE bug 939211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940195">SUSE bug 940195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940332">SUSE bug 940332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944494">SUSE bug 944494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945779">SUSE bug 945779</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515117" comment="glibc-2.19-22.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515118" comment="glibc-32bit-2.19-22.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515119" comment="glibc-devel-2.19-22.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515120" comment="glibc-devel-32bit-2.19-22.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515121" comment="glibc-i18ndata-2.19-22.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515122" comment="glibc-locale-2.19-22.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515123" comment="glibc-locale-32bit-2.19-22.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515124" comment="nscd-2.19-22.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77374" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl098 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="892403" ref_url="https://bugzilla.suse.com/892403" source="BUGZILLA"/>
		<reference ref_id="912014" ref_url="https://bugzilla.suse.com/912014" source="BUGZILLA"/>
		<reference ref_id="912015" ref_url="https://bugzilla.suse.com/912015" source="BUGZILLA"/>
		<reference ref_id="912018" ref_url="https://bugzilla.suse.com/912018" source="BUGZILLA"/>
		<reference ref_id="912293" ref_url="https://bugzilla.suse.com/912293" source="BUGZILLA"/>
		<reference ref_id="912294" ref_url="https://bugzilla.suse.com/912294" source="BUGZILLA"/>
		<reference ref_id="912296" ref_url="https://bugzilla.suse.com/912296" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<description>

The openssl 0.9.8j compatibility package was updated to fix several security vulnerabilities:

CVE-2014-3570: Bignum squaring (BN_sqr) may produce incorrect results
on some platforms, including x86_64.

CVE-2014-3571: Fix crash in dtls1_get_record whilst in the listen state where
you get two separate reads performed - one for the header and
one for the body of the handshake record.

CVE-2014-3572: Do not accept a handshake using an ephemeral ECDH ciphersuites
with the server key exchange message omitted.

CVE-2014-8275: Fixed various certificate fingerprint issues

CVE-2015-0204: Only allow ephemeral RSA keys in export ciphersuites

CVE-2015-0205: OpenSSL 0.9.8j is NOT vulnerable to CVE-2015-0205 as it doesn't
support DH certificates and this typo prohibits skipping of
certificate verify message for sign only certificates anyway.
(This patch only fixes the wrong condition)

This update also fixes regression caused by CVE-2014-0224.patch (bnc#892403)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-04"/>
	<updated date="2015-02-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/892403">SUSE bug 892403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912014">SUSE bug 912014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912015">SUSE bug 912015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912018">SUSE bug 912018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912293">SUSE bug 912293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912294">SUSE bug 912294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912296">SUSE bug 912296</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515125" comment="libopenssl0_9_8-0.9.8j-70.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515126" comment="libopenssl0_9_8-32bit-0.9.8j-70.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77375" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="951376" ref_url="https://bugzilla.suse.com/951376" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4881" ref_url="https://www.suse.com/security/cve/CVE-2015-4881/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<description>
java-1_7_0-openjdk was updated to version 7u91 to fix 17 security issues.

These security issues were fixed:
- CVE-2015-4843: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries (bsc#951376).
- CVE-2015-4842: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality via vectors related to JAXP (bsc#951376).
- CVE-2015-4840: Unspecified vulnerability in Oracle Java SE 7u85 and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality via unknown vectors related to 2D (bsc#951376).
- CVE-2015-4872: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allowed remote attackers to affect integrity via unknown vectors related to Security (bsc#951376).
- CVE-2015-4860: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI, a different vulnerability than CVE-2015-4883 (bsc#951376).
- CVE-2015-4844: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D (bsc#951376).
- CVE-2015-4883: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI, a different vulnerability than CVE-2015-4860 (bsc#951376).
- CVE-2015-4893: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allowed remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4803 and CVE-2015-4911 (bsc#951376).
- CVE-2015-4911: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allowed remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4803 and CVE-2015-4893 (bsc#951376).
- CVE-2015-4882: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect availability via vectors related to CORBA (bsc#951376).
- CVE-2015-4881: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2015-4835 (bsc#951376).
- CVE-2015-4734: Unspecified vulnerability in Oracle Java SE 6u101, 7u85 and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality via vectors related to JGSS (bsc#951376).
- CVE-2015-4806: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries (bsc#951376).
- CVE-2015-4805: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Serialization (bsc#951376).
- CVE-2015-4803: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allowed remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4893 and CVE-2015-4911 (bsc#951376).
- CVE-2015-4835: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2015-4881 (bsc#951376).
- CVE-2015-4903: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality via vectors related to RMI (bsc#951376).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-23"/>
	<updated date="2015-10-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4881/">CVE-2015-4881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515127" comment="java-1_7_0-openjdk-1.7.0.91-21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515128" comment="java-1_7_0-openjdk-headless-1.7.0.91-21.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77376" version="1" class="patch">
	<metadata>
		<title>Security update for libvdpau (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="943967" ref_url="https://bugzilla.suse.com/943967" source="BUGZILLA"/>
		<reference ref_id="943968" ref_url="https://bugzilla.suse.com/943968" source="BUGZILLA"/>
		<reference ref_id="943969" ref_url="https://bugzilla.suse.com/943969" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5198" ref_url="https://www.suse.com/security/cve/CVE-2015-5198/" source="CVE"/>
		<reference ref_id="CVE-2015-5199" ref_url="https://www.suse.com/security/cve/CVE-2015-5199/" source="CVE"/>
		<reference ref_id="CVE-2015-5200" ref_url="https://www.suse.com/security/cve/CVE-2015-5200/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001664.html" source="SUSE-SU"/>
		<description>

libvdpau was updated to use secure_getenv() instead of getenv() for several variables
so it can be more safely used in setuid applications.

* CVE-2015-5198: libvdpau: incorrect check for security transition (bnc#943967)
* CVE-2015-5199: libvdpau: directory traversal in dlopen (bnc#943968)
* CVE-2015-5200: libvdpau: vulnerability in trace functionality (bnc#943969)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-02"/>
	<updated date="2015-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/943967">SUSE bug 943967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943968">SUSE bug 943968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943969">SUSE bug 943969</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5198/">CVE-2015-5198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5199/">CVE-2015-5199</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5200/">CVE-2015-5200</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515129" comment="libvdpau1-0.8-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515130" comment="libvdpau1-32bit-0.8-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77377" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="948011" ref_url="https://bugzilla.suse.com/948011" source="BUGZILLA"/>
		<reference ref_id="952188" ref_url="https://bugzilla.suse.com/952188" source="BUGZILLA"/>
		<reference ref_id="952189" ref_url="https://bugzilla.suse.com/952189" source="BUGZILLA"/>
		<reference ref_id="952190" ref_url="https://bugzilla.suse.com/952190" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="CVE-2015-2696" ref_url="https://www.suse.com/security/cve/CVE-2015-2696/" source="CVE"/>
		<reference ref_id="CVE-2015-2697" ref_url="https://www.suse.com/security/cve/CVE-2015-2697/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html" source="SUSE-SU"/>
		<description>
krb5 was updated to fix three security issues.

These security issues were fixed:
- CVE-2015-2695: Applications which call gss_inquire_context() on a partially-established SPNEGO context could have caused the GSS-API library to read from a pointer using the wrong type, generally causing a process crash. (bsc#952188).
- CVE-2015-2696: Applications which call gss_inquire_context() on a partially-established IAKERB context could have caused the GSS-API library to read from a pointer using the wrong type, generally causing a process crash. (bsc#952189).
- CVE-2015-2697: Incorrect string handling in build_principal_va can lead to DOS (bsc#952190).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-30"/>
	<updated date="2015-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/948011">SUSE bug 948011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952188">SUSE bug 952188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952189">SUSE bug 952189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952190">SUSE bug 952190</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2696/">CVE-2015-2696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2697/">CVE-2015-2697</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515131" comment="krb5-1.12.1-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515132" comment="krb5-32bit-1.12.1-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515133" comment="krb5-client-1.12.1-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77378" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="901488" ref_url="https://bugzilla.suse.com/901488" source="BUGZILLA"/>
		<reference ref_id="907514" ref_url="https://bugzilla.suse.com/907514" source="BUGZILLA"/>
		<reference ref_id="910258" ref_url="https://bugzilla.suse.com/910258" source="BUGZILLA"/>
		<reference ref_id="918984" ref_url="https://bugzilla.suse.com/918984" source="BUGZILLA"/>
		<reference ref_id="923967" ref_url="https://bugzilla.suse.com/923967" source="BUGZILLA"/>
		<reference ref_id="932267" ref_url="https://bugzilla.suse.com/932267" source="BUGZILLA"/>
		<reference ref_id="944463" ref_url="https://bugzilla.suse.com/944463" source="BUGZILLA"/>
		<reference ref_id="944697" ref_url="https://bugzilla.suse.com/944697" source="BUGZILLA"/>
		<reference ref_id="945167" ref_url="https://bugzilla.suse.com/945167" source="BUGZILLA"/>
		<reference ref_id="947165" ref_url="https://bugzilla.suse.com/947165" source="BUGZILLA"/>
		<reference ref_id="949138" ref_url="https://bugzilla.suse.com/949138" source="BUGZILLA"/>
		<reference ref_id="950367" ref_url="https://bugzilla.suse.com/950367" source="BUGZILLA"/>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950705" ref_url="https://bugzilla.suse.com/950705" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html" source="SUSE-SU"/>
		<description>
xen was updated to version 4.4.3 to fix nine security issues.

These security issues were fixed:
- CVE-2015-4037: The slirp_smb function in net/slirp.c created temporary files with predictable names, which allowed local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program (bsc#932267).
- CVE-2014-0222: Integer overflow in the qcow_open function allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
- CVE-2015-7835: Uncontrolled creation of large page mappings by PV guests (bsc#950367).
- CVE-2015-7311: libxl in Xen did not properly handle the readonly flag on disks when using the qemu-xen device model, which allowed local guest users to write to a read-only disk image (bsc#947165).
- CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463).
- CVE-2015-6815: With e1000 NIC emulation support it was possible to enter an infinite loop (bsc#944697).
- CVE-2015-7969: Leak of main per-domain vcpu pointer array leading to denial of service (bsc#950703).
- CVE-2015-7969: Leak of per-domain profiling- related vcpu pointer array leading to denial of service (bsc#950705).
- CVE-2015-7971: Some pmu and profiling hypercalls log without rate limiting (bsc#950706).

These non-security issues were fixed:
- bsc#907514: Bus fatal error: SLES 12 sudden reboot has been observed
- bsc#910258: SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC
- bsc#918984: Bus fatal error: SLES11-SP4 sudden reboot has been observed
- bsc#923967: Partner-L3: Bus fatal error: SLES11-SP3 sudden reboot has been observed
- bnc#901488: Intel ixgbe driver assigns rx/tx queues per core resulting in irq problems on servers with a large amount of CPU cores
- bsc#945167: Running command: xl pci-assignable-add 03:10.1 secondly show errors
- bsc#949138: Setting vcpu affinity under Xen causes libvirtd abort
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-29"/>
	<updated date="2015-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901488">SUSE bug 901488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907514">SUSE bug 907514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910258">SUSE bug 910258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918984">SUSE bug 918984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923967">SUSE bug 923967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932267">SUSE bug 932267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944463">SUSE bug 944463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944697">SUSE bug 944697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945167">SUSE bug 945167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947165">SUSE bug 947165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949138">SUSE bug 949138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515134" comment="xen-4.4.3_02-22.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515135" comment="xen-kmp-default-4.4.3_02_k3.12.48_52.27-22.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515136" comment="xen-libs-4.4.3_02-22.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515137" comment="xen-libs-32bit-4.4.3_02-22.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77379" version="1" class="patch">
	<metadata>
		<title>Recommended update for LibreOffice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="470073" ref_url="https://bugzilla.suse.com/470073" source="BUGZILLA"/>
		<reference ref_id="806250" ref_url="https://bugzilla.suse.com/806250" source="BUGZILLA"/>
		<reference ref_id="829430" ref_url="https://bugzilla.suse.com/829430" source="BUGZILLA"/>
		<reference ref_id="86241" ref_url="https://bugzilla.suse.com/86241" source="BUGZILLA"/>
		<reference ref_id="87222" ref_url="https://bugzilla.suse.com/87222" source="BUGZILLA"/>
		<reference ref_id="890735" ref_url="https://bugzilla.suse.com/890735" source="BUGZILLA"/>
		<reference ref_id="900186" ref_url="https://bugzilla.suse.com/900186" source="BUGZILLA"/>
		<reference ref_id="900877" ref_url="https://bugzilla.suse.com/900877" source="BUGZILLA"/>
		<reference ref_id="907966" ref_url="https://bugzilla.suse.com/907966" source="BUGZILLA"/>
		<reference ref_id="910805" ref_url="https://bugzilla.suse.com/910805" source="BUGZILLA"/>
		<reference ref_id="910806" ref_url="https://bugzilla.suse.com/910806" source="BUGZILLA"/>
		<reference ref_id="913042" ref_url="https://bugzilla.suse.com/913042" source="BUGZILLA"/>
		<reference ref_id="914911" ref_url="https://bugzilla.suse.com/914911" source="BUGZILLA"/>
		<reference ref_id="915996" ref_url="https://bugzilla.suse.com/915996" source="BUGZILLA"/>
		<reference ref_id="916181" ref_url="https://bugzilla.suse.com/916181" source="BUGZILLA"/>
		<reference ref_id="918852" ref_url="https://bugzilla.suse.com/918852" source="BUGZILLA"/>
		<reference ref_id="919409" ref_url="https://bugzilla.suse.com/919409" source="BUGZILLA"/>
		<reference ref_id="926375" ref_url="https://bugzilla.suse.com/926375" source="BUGZILLA"/>
		<reference ref_id="929793" ref_url="https://bugzilla.suse.com/929793" source="BUGZILLA"/>
		<reference ref_id="934423" ref_url="https://bugzilla.suse.com/934423" source="BUGZILLA"/>
		<reference ref_id="936188" ref_url="https://bugzilla.suse.com/936188" source="BUGZILLA"/>
		<reference ref_id="936190" ref_url="https://bugzilla.suse.com/936190" source="BUGZILLA"/>
		<reference ref_id="940838" ref_url="https://bugzilla.suse.com/940838" source="BUGZILLA"/>
		<reference ref_id="943075" ref_url="https://bugzilla.suse.com/943075" source="BUGZILLA"/>
		<reference ref_id="945692" ref_url="https://bugzilla.suse.com/945692" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8146" ref_url="https://www.suse.com/security/cve/CVE-2014-8146/" source="CVE"/>
		<reference ref_id="CVE-2014-8147" ref_url="https://www.suse.com/security/cve/CVE-2014-8147/" source="CVE"/>
		<reference ref_id="CVE-2015-1774" ref_url="https://www.suse.com/security/cve/CVE-2015-1774/" source="CVE"/>
		<reference ref_id="CVE-2015-4551" ref_url="https://www.suse.com/security/cve/CVE-2015-4551/" source="CVE"/>
		<reference ref_id="CVE-2015-5212" ref_url="https://www.suse.com/security/cve/CVE-2015-5212/" source="CVE"/>
		<reference ref_id="CVE-2015-5213" ref_url="https://www.suse.com/security/cve/CVE-2015-5213/" source="CVE"/>
		<reference ref_id="CVE-2015-5214" ref_url="https://www.suse.com/security/cve/CVE-2015-5214/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001669.html" source="SUSE-SU"/>
		<description>

This update brings LibreOffice to version 5.0.2, a major version
update.

It brings lots of new features, bugfixes and also security fixes.

Features as seen on http://www.libreoffice.org/discover/new-features/

* LibreOffice 5.0 ships an impressive number of new features for
  its spreadsheet module, Calc: complex formulae image cropping, new
  functions, more powerful conditional formatting, table addressing
  and much more. Calc's blend of performance and features makes it
  an enterprise-ready, heavy duty spreadsheet application capable of
  handling all kinds of workload for an impressive range of use cases
* New icons, major improvements to menus and sidebar : no other
  LibreOffice version has looked that good and helped you be creative and
  get things done the right way. In addition, style management is now more
  intuitive thanks to the visualization of styles right in the interface.
* LibreOffice 5 ships with numerous improvements to document import and
  export filters for MS Office, PDF, RTF, and more. You can now timestamp
  PDF documents generated with LibreOffice and enjoy enhanced document
  conversion fidelity all around.

The Pentaho Flow Reporting Engine is now added and used.

Security issues fixed:

* CVE-2014-8146: The resolveImplicitLevels function in common/ubidi.c
  in the Unicode Bidirectional Algorithm implementation in ICU4C in
  International Components for Unicode (ICU) before 55.1 did not properly
  track directionally isolated pieces of text, which allowed remote
  attackers to cause a denial of service (heap-based buffer overflow)
  or possibly execute arbitrary code via crafted text.
* CVE-2014-8147: The resolveImplicitLevels function in common/ubidi.c
  in the Unicode Bidirectional Algorithm implementation in ICU4C in
  International Components for Unicode (ICU) before 55.1 used an integer
  data type that is inconsistent with a header file, which allowed remote
  attackers to cause a denial of service (incorrect malloc followed by
  invalid free) or possibly execute arbitrary code via crafted text.
* CVE-2015-4551: An arbitrary file disclosure vulnerability in Libreoffice
  and Openoffice Calc and Writer was fixed.
* CVE-2015-1774: The HWP filter in LibreOffice allowed remote attackers
  to cause a denial of service (crash) or possibly execute arbitrary code
  via a crafted HWP document, which triggered an out-of-bounds write.
* CVE-2015-5212: A LibreOffice 'PrinterSetup Length' integer underflow
  vulnerability could be used by attackers supplying documents to execute
  code as the user opening the document.
* CVE-2015-5213: A LibreOffice 'Piece Table Counter' invalid check design
  error vulnerability allowed attackers supplying documents to execute
  code as the user opening the document.
* CVE-2015-5214: Multiple Vendor LibreOffice Bookmark Status Memory
  Corruption Vulnerability allowed attackers supplying documents to execute
  code as the user opening the document.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-10"/>
	<updated date="2015-10-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/470073">SUSE bug 470073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806250">SUSE bug 806250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829430">SUSE bug 829430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/86241">SUSE bug 86241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/87222">SUSE bug 87222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890735">SUSE bug 890735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900186">SUSE bug 900186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900877">SUSE bug 900877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907966">SUSE bug 907966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910805">SUSE bug 910805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910806">SUSE bug 910806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913042">SUSE bug 913042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914911">SUSE bug 914911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915996">SUSE bug 915996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916181">SUSE bug 916181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918852">SUSE bug 918852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919409">SUSE bug 919409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926375">SUSE bug 926375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929793">SUSE bug 929793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934423">SUSE bug 934423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936188">SUSE bug 936188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936190">SUSE bug 936190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940838">SUSE bug 940838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943075">SUSE bug 943075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945692">SUSE bug 945692</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8146/">CVE-2014-8146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8147/">CVE-2014-8147</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1774/">CVE-2015-1774</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4551/">CVE-2015-4551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5212/">CVE-2015-5212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5213/">CVE-2015-5213</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5214/">CVE-2015-5214</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515138" comment="apache-commons-logging-1.1.3-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515139" comment="flute-1.3.0-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515140" comment="libabw-0_1-1-0.1.1-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515141" comment="libbase-1.1.3-4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515142" comment="libcdr-0_1-1-0.1.1-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515143" comment="libcmis-0_5-5-0.5.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515144" comment="libe-book-0_1-1-0.1.2-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515145" comment="libetonyek-0_1-1-0.1.3-3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515146" comment="libfonts-1.1.3-4.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515147" comment="libformula-1.1.3-4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515148" comment="libfreehand-0_1-1-0.1.1-4.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515149" comment="libgltf-0_0-0-0.0.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515150" comment="libgraphite2-3-1.3.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515151" comment="libgraphite2-3-32bit-1.3.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515152" comment="libhyphen0-2.8.8-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515153" comment="libixion-0_10-0-0.9.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515154" comment="liblangtag1-0.5.7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515155" comment="liblayout-0.2.10-4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515156" comment="libloader-1.1.3-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515157" comment="libmspub-0_1-1-0.1.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515158" comment="libmwaw-0_3-3-0.3.6-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515159" comment="libodfgen-0_1-1-0.1.4-3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515160" comment="liborcus-0_8-0-0.7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515161" comment="libpagemaker-0_0-0-0.0.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515162" comment="libreoffice-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515163" comment="libreoffice-base-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515164" comment="libreoffice-base-drivers-mysql-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515165" comment="libreoffice-base-drivers-postgresql-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515166" comment="libreoffice-calc-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515167" comment="libreoffice-calc-extensions-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515168" comment="libreoffice-draw-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515169" comment="libreoffice-filters-optional-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515170" comment="libreoffice-gnome-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515171" comment="libreoffice-icon-theme-tango-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515172" comment="libreoffice-impress-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515173" comment="libreoffice-l10n-af-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515174" comment="libreoffice-l10n-ar-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515175" comment="libreoffice-l10n-ca-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515176" comment="libreoffice-l10n-cs-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515177" comment="libreoffice-l10n-da-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515178" comment="libreoffice-l10n-de-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515179" comment="libreoffice-l10n-en-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515180" comment="libreoffice-l10n-es-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515181" comment="libreoffice-l10n-fi-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515182" comment="libreoffice-l10n-fr-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515183" comment="libreoffice-l10n-gu-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515184" comment="libreoffice-l10n-hi-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515185" comment="libreoffice-l10n-hu-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515186" comment="libreoffice-l10n-it-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515187" comment="libreoffice-l10n-ja-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515188" comment="libreoffice-l10n-ko-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515189" comment="libreoffice-l10n-nb-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515190" comment="libreoffice-l10n-nl-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515191" comment="libreoffice-l10n-nn-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515192" comment="libreoffice-l10n-pl-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515193" comment="libreoffice-l10n-pt-BR-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515194" comment="libreoffice-l10n-pt-PT-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515195" comment="libreoffice-l10n-ru-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515196" comment="libreoffice-l10n-sk-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515197" comment="libreoffice-l10n-sv-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515198" comment="libreoffice-l10n-xh-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515199" comment="libreoffice-l10n-zh-Hans-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515200" comment="libreoffice-l10n-zh-Hant-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515201" comment="libreoffice-l10n-zu-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515202" comment="libreoffice-mailmerge-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515203" comment="libreoffice-math-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515204" comment="libreoffice-officebean-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515205" comment="libreoffice-pyuno-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515206" comment="libreoffice-share-linker-1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515207" comment="libreoffice-voikko-4.1-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515208" comment="libreoffice-writer-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515209" comment="libreoffice-writer-extensions-5.0.2.2-13.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515210" comment="librepository-1.1.3-4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515211" comment="librevenge-0_0-0-0.0.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515212" comment="librevenge-stream-0_0-0-0.0.2-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515213" comment="libserializer-1.1.2-4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515214" comment="libvisio-0_1-1-0.1.3-4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515215" comment="libvoikko1-3.7.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515216" comment="libwps-0_4-4-0.4.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515217" comment="malaga-suomi-1.18-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515218" comment="myspell-af_ZA-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515219" comment="myspell-ar-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515220" comment="myspell-be_BY-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515221" comment="myspell-bg_BG-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515222" comment="myspell-bn_BD-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515223" comment="myspell-bs_BA-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515224" comment="myspell-ca-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515225" comment="myspell-cs_CZ-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515226" comment="myspell-da_DK-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515227" comment="myspell-de-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515228" comment="myspell-dictionaries-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515229" comment="myspell-el_GR-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515230" comment="myspell-en-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515231" comment="myspell-es-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515232" comment="myspell-et_EE-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515233" comment="myspell-fr_FR-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515234" comment="myspell-gu_IN-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515235" comment="myspell-he_IL-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515236" comment="myspell-hi_IN-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515237" comment="myspell-hr_HR-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515238" comment="myspell-hu_HU-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515239" comment="myspell-it_IT-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515240" comment="myspell-lo_LA-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515241" comment="myspell-lt_LT-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515242" comment="myspell-lv_LV-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515243" comment="myspell-nl_NL-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515244" comment="myspell-no-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515245" comment="myspell-pl_PL-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515246" comment="myspell-pt_BR-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515247" comment="myspell-pt_PT-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515248" comment="myspell-ro-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515249" comment="myspell-ru_RU-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515250" comment="myspell-sk_SK-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515251" comment="myspell-sl_SI-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515252" comment="myspell-sr-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515253" comment="myspell-sv_SE-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515254" comment="myspell-te_IN-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515255" comment="myspell-th_TH-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515256" comment="myspell-vi-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515257" comment="myspell-zu_ZA-20150827-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515258" comment="pentaho-libxml-1.1.3-4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515259" comment="pentaho-reporting-flow-engine-0.9.4-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515260" comment="sac-1.3-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77380" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="826717" ref_url="https://bugzilla.suse.com/826717" source="BUGZILLA"/>
		<reference ref_id="866902" ref_url="https://bugzilla.suse.com/866902" source="BUGZILLA"/>
		<reference ref_id="882089" ref_url="https://bugzilla.suse.com/882089" source="BUGZILLA"/>
		<reference ref_id="889526" ref_url="https://bugzilla.suse.com/889526" source="BUGZILLA"/>
		<reference ref_id="896023" ref_url="https://bugzilla.suse.com/896023" source="BUGZILLA"/>
		<reference ref_id="897614" ref_url="https://bugzilla.suse.com/897614" source="BUGZILLA"/>
		<reference ref_id="897906" ref_url="https://bugzilla.suse.com/897906" source="BUGZILLA"/>
		<reference ref_id="898772" ref_url="https://bugzilla.suse.com/898772" source="BUGZILLA"/>
		<reference ref_id="900292" ref_url="https://bugzilla.suse.com/900292" source="BUGZILLA"/>
		<reference ref_id="901317" ref_url="https://bugzilla.suse.com/901317" source="BUGZILLA"/>
		<reference ref_id="903357" ref_url="https://bugzilla.suse.com/903357" source="BUGZILLA"/>
		<reference ref_id="903359" ref_url="https://bugzilla.suse.com/903359" source="BUGZILLA"/>
		<reference ref_id="903850" ref_url="https://bugzilla.suse.com/903850" source="BUGZILLA"/>
		<reference ref_id="903967" ref_url="https://bugzilla.suse.com/903967" source="BUGZILLA"/>
		<reference ref_id="903970" ref_url="https://bugzilla.suse.com/903970" source="BUGZILLA"/>
		<reference ref_id="905465" ref_url="https://bugzilla.suse.com/905465" source="BUGZILLA"/>
		<reference ref_id="905467" ref_url="https://bugzilla.suse.com/905467" source="BUGZILLA"/>
		<reference ref_id="906439" ref_url="https://bugzilla.suse.com/906439" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-3495" ref_url="https://www.suse.com/security/cve/CVE-2013-3495/" source="CVE"/>
		<reference ref_id="CVE-2014-5146" ref_url="https://www.suse.com/security/cve/CVE-2014-5146/" source="CVE"/>
		<reference ref_id="CVE-2014-5149" ref_url="https://www.suse.com/security/cve/CVE-2014-5149/" source="CVE"/>
		<reference ref_id="CVE-2014-8594" ref_url="https://www.suse.com/security/cve/CVE-2014-8594/" source="CVE"/>
		<reference ref_id="CVE-2014-8595" ref_url="https://www.suse.com/security/cve/CVE-2014-8595/" source="CVE"/>
		<reference ref_id="CVE-2014-8866" ref_url="https://www.suse.com/security/cve/CVE-2014-8866/" source="CVE"/>
		<reference ref_id="CVE-2014-8867" ref_url="https://www.suse.com/security/cve/CVE-2014-8867/" source="CVE"/>
		<reference ref_id="CVE-2014-9030" ref_url="https://www.suse.com/security/cve/CVE-2014-9030/" source="CVE"/>
		<description>
xen was updated to fix nine security issues.

These security issues were fixed:
- Guest affectable page reference leak in MMU_MACHPHYS_UPDATE handling (CVE-2014-9030).
- Insufficient bounding of 'REP MOVS' to MMIO emulated inside the hypervisor (CVE-2014-8867).
- Excessive checking in compatibility mode hypercall argument translation (CVE-2014-8866).
- Guest user mode triggerable VM exits not handled by hypervisor (bnc#9038500).
- Missing privilege level checks in x86 emulation of far branches (CVE-2014-8595).
- Insufficient restrictions on certain MMU update hypercalls (CVE-2014-8594).
- Long latency virtual-mmu operations are not preemptible (CVE-2014-5146, CVE-2014-5149).
- Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts  (CVE-2013-3495).

These non-security issues were fixed:
- Corrupted save/restore test leaves orphaned data in xenstore (bnc#903357).
- Temporary migration name is not cleaned up after migration (bnc#903359).
- Xen save/restore of HVM guests cuts off disk and networking  (bnc#866902).
- increase limit domUloader to 32MB (bnc#901317).
- XEN Host crashes when assigning non-VF device (SR-IOV) to guest (bnc#898772).
- Windows 2012 R2 fails to boot up with greater than 60 vcpus (bnc#882089).
- Restrict requires on grub2-x86_64-xen to x86_64 hosts
- Change default dump directory (bsc#900292).
- Update xen2libvirt.py to better detect and handle file formats
- libxc: check return values on mmap() and madvise() on xc_alloc_hypercall_buffer() (bnc#897906).
- Bug `xen-tools` uninstallable; grub2-x86_64-xen dependency not available (bnc#897614).
- Adjust xentop column layout (bnc#896023).
		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-02"/>
	<updated date="2014-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/826717">SUSE bug 826717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866902">SUSE bug 866902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882089">SUSE bug 882089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889526">SUSE bug 889526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896023">SUSE bug 896023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897614">SUSE bug 897614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897906">SUSE bug 897906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898772">SUSE bug 898772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900292">SUSE bug 900292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901317">SUSE bug 901317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903357">SUSE bug 903357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903359">SUSE bug 903359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903850">SUSE bug 903850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905465">SUSE bug 905465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905467">SUSE bug 905467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906439">SUSE bug 906439</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3495/">CVE-2013-3495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5146/">CVE-2014-5146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5149/">CVE-2014-5149</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8594/">CVE-2014-8594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8595/">CVE-2014-8595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8866/">CVE-2014-8866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8867/">CVE-2014-8867</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9030/">CVE-2014-9030</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515261" comment="xen-4.4.1_08-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515262" comment="xen-kmp-default-4.4.1_08_k3.12.28_4-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515263" comment="xen-libs-4.4.1_08-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515264" comment="xen-libs-32bit-4.4.1_08-5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77381" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="908275" ref_url="https://bugzilla.suse.com/908275" source="BUGZILLA"/>
		<reference ref_id="952810" ref_url="https://bugzilla.suse.com/952810" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<reference ref_id="CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188/" source="CVE"/>
		<reference ref_id="CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193/" source="CVE"/>
		<reference ref_id="CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194/" source="CVE"/>
		<reference ref_id="CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196/" source="CVE"/>
		<reference ref_id="CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197/" source="CVE"/>
		<reference ref_id="CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198/" source="CVE"/>
		<reference ref_id="CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199/" source="CVE"/>
		<reference ref_id="CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<description>

This Mozilla Firefox, NSS and NSPR update fixes the following security
and non security issues.

- mozilla-nspr was updated to version 4.10.10 (bsc#952810)
  * MFSA 2015-133/CVE-2015-7183
    (bmo#1205157)
    NSPR memory corruption issues

- mozilla-nss was updated to 3.19.2.1 (bsc#952810)
  * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182
    (bmo#1192028, bmo#1202868)
    NSS and NSPR memory corruption issues

- MozillaFirefox was updated to 38.4.0 ESR (bsc#952810)
  * MFSA 2015-116/CVE-2015-4513
    (bmo#1107011, bmo#1191942, bmo#1193038, bmo#1204580,
     bmo#1204669, bmo#1204700, bmo#1205707, bmo#1206564,
     bmo#1208665, bmo#1209471, bmo#1213979)
    Miscellaneous memory safety hazards (rv:42.0 / rv:38.4)
  * MFSA 2015-122/CVE-2015-7188
    (bmo#1199430)
    Trailing whitespace in IP address hostnames can bypass
    same-origin policy
  * MFSA 2015-123/CVE-2015-7189
    (bmo#1205900)
    Buffer overflow during image interactions in canvas
  * MFSA 2015-127/CVE-2015-7193
    (bmo#1210302)
    CORS preflight is bypassed when non-standard Content-Type
    headers are received
  * MFSA 2015-128/CVE-2015-7194
    (bmo#1211262)
    Memory corruption in libjar through zip files
  * MFSA 2015-130/CVE-2015-7196
    (bmo#1140616)
    JavaScript garbage collection crash with Java applet
  * MFSA 2015-131/CVE-2015-7198/CVE-2015-7199/CVE-2015-7200
    (bmo#1204061, bmo#1188010, bmo#1204155)
    Vulnerabilities found through code inspection
  * MFSA 2015-132/CVE-2015-7197
    (bmo#1204269)
    Mixed content WebSocket policy bypass through workers
  * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182/CVE-2015-7183
    (bmo#1202868, bmo#1192028, bmo#1205157)
    NSS and NSPR memory corruption issues
- fix printing on landscape media (bsc#908275)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-04"/>
	<updated date="2015-11-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/908275">SUSE bug 908275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515265" comment="MozillaFirefox-38.4.0esr-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515266" comment="MozillaFirefox-branding-SLE-31.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515267" comment="MozillaFirefox-translations-38.4.0esr-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515268" comment="libfreebl3-3.19.2.1-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515269" comment="libfreebl3-32bit-3.19.2.1-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515270" comment="libsoftokn3-3.19.2.1-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515271" comment="libsoftokn3-32bit-3.19.2.1-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515272" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515273" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515274" comment="mozilla-nss-3.19.2.1-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515275" comment="mozilla-nss-32bit-3.19.2.1-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515276" comment="mozilla-nss-certs-3.19.2.1-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515277" comment="mozilla-nss-certs-32bit-3.19.2.1-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515278" comment="mozilla-nss-tools-3.19.2.1-29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77382" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="912365" ref_url="https://bugzilla.suse.com/912365" source="BUGZILLA"/>
		<reference ref_id="912368" ref_url="https://bugzilla.suse.com/912368" source="BUGZILLA"/>
		<reference ref_id="912369" ref_url="https://bugzilla.suse.com/912369" source="BUGZILLA"/>
		<reference ref_id="912370" ref_url="https://bugzilla.suse.com/912370" source="BUGZILLA"/>
		<reference ref_id="912372" ref_url="https://bugzilla.suse.com/912372" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0559" ref_url="https://www.suse.com/security/cve/CVE-2015-0559/" source="CVE"/>
		<reference ref_id="CVE-2015-0560" ref_url="https://www.suse.com/security/cve/CVE-2015-0560/" source="CVE"/>
		<reference ref_id="CVE-2015-0561" ref_url="https://www.suse.com/security/cve/CVE-2015-0561/" source="CVE"/>
		<reference ref_id="CVE-2015-0562" ref_url="https://www.suse.com/security/cve/CVE-2015-0562/" source="CVE"/>
		<reference ref_id="CVE-2015-0563" ref_url="https://www.suse.com/security/cve/CVE-2015-0563/" source="CVE"/>
		<reference ref_id="CVE-2015-0564" ref_url="https://www.suse.com/security/cve/CVE-2015-0564/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001234.html" source="SUSE-SU"/>
		<description>

      This update fixes the following security issues:

- The following vulnerabilities allowed Wireshark to be crashed by
  injecting a malformed packet onto the wire or by convincing someone
  to read a malformed packet trace file.
  + The WCCP dissector could crash
    wnpa-sec-2015-01 CVE-2015-0559 CVE-2015-0560 [boo#912365]
  + The LPP dissector could crash.
    wnpa-sec-2015-02 CVE-2015-0561 [boo#912368]
  + The DEC DNA Routing Protocol dissector could crash.
    wnpa-sec-2015-03 CVE-2015-0562 [boo#912369]
  + The SMTP dissector could crash. 
    wnpa-sec-2015-04 CVE-2015-0563 [boo#912370]
  + Wireshark could crash while decypting TLS/SSL sessions.
    wnpa-sec-2015-05 CVE-2015-0564 [boo#912372]
		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-22"/>
	<updated date="2015-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/912365">SUSE bug 912365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912368">SUSE bug 912368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912369">SUSE bug 912369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912370">SUSE bug 912370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912372">SUSE bug 912372</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0559/">CVE-2015-0559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0560/">CVE-2015-0560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0561/">CVE-2015-0561</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0562/">CVE-2015-0562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0563/">CVE-2015-0563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0564/">CVE-2015-0564</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515279" comment="wireshark-1.10.12-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77383" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="954512" ref_url="https://bugzilla.suse.com/954512" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7651" ref_url="https://www.suse.com/security/cve/CVE-2015-7651/" source="CVE"/>
		<reference ref_id="CVE-2015-7652" ref_url="https://www.suse.com/security/cve/CVE-2015-7652/" source="CVE"/>
		<reference ref_id="CVE-2015-7653" ref_url="https://www.suse.com/security/cve/CVE-2015-7653/" source="CVE"/>
		<reference ref_id="CVE-2015-7654" ref_url="https://www.suse.com/security/cve/CVE-2015-7654/" source="CVE"/>
		<reference ref_id="CVE-2015-7655" ref_url="https://www.suse.com/security/cve/CVE-2015-7655/" source="CVE"/>
		<reference ref_id="CVE-2015-7656" ref_url="https://www.suse.com/security/cve/CVE-2015-7656/" source="CVE"/>
		<reference ref_id="CVE-2015-7657" ref_url="https://www.suse.com/security/cve/CVE-2015-7657/" source="CVE"/>
		<reference ref_id="CVE-2015-7658" ref_url="https://www.suse.com/security/cve/CVE-2015-7658/" source="CVE"/>
		<reference ref_id="CVE-2015-7659" ref_url="https://www.suse.com/security/cve/CVE-2015-7659/" source="CVE"/>
		<reference ref_id="CVE-2015-7660" ref_url="https://www.suse.com/security/cve/CVE-2015-7660/" source="CVE"/>
		<reference ref_id="CVE-2015-7661" ref_url="https://www.suse.com/security/cve/CVE-2015-7661/" source="CVE"/>
		<reference ref_id="CVE-2015-7662" ref_url="https://www.suse.com/security/cve/CVE-2015-7662/" source="CVE"/>
		<reference ref_id="CVE-2015-7663" ref_url="https://www.suse.com/security/cve/CVE-2015-7663/" source="CVE"/>
		<reference ref_id="CVE-2015-8042" ref_url="https://www.suse.com/security/cve/CVE-2015-8042/" source="CVE"/>
		<reference ref_id="CVE-2015-8043" ref_url="https://www.suse.com/security/cve/CVE-2015-8043/" source="CVE"/>
		<reference ref_id="CVE-2015-8044" ref_url="https://www.suse.com/security/cve/CVE-2015-8044/" source="CVE"/>
		<reference ref_id="CVE-2015-8046" ref_url="https://www.suse.com/security/cve/CVE-2015-8046/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<description>
The flash-player package was updated to fix the following security issues:

- Security update to 11.2.202.548 (bsc#954512):
  * APSB15-28, CVE-2015-7651, CVE-2015-7652, CVE-2015-7653,
    CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,
    CVE-2015-7658, CVE-2015-7659, CVE-2015-7660, CVE-2015-7661,
    CVE-2015-7662, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,
    CVE-2015-8044, CVE-2015-8046
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-11"/>
	<updated date="2015-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7651/">CVE-2015-7651</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7652/">CVE-2015-7652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7653/">CVE-2015-7653</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7654/">CVE-2015-7654</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7655/">CVE-2015-7655</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7656/">CVE-2015-7656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7657/">CVE-2015-7657</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7658/">CVE-2015-7658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7659/">CVE-2015-7659</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7660/">CVE-2015-7660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7661/">CVE-2015-7661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7662/">CVE-2015-7662</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7663/">CVE-2015-7663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8042/">CVE-2015-8042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8043/">CVE-2015-8043</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8044/">CVE-2015-8044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8046/">CVE-2015-8046</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515280" comment="flash-player-11.2.202.548-111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515281" comment="flash-player-gnome-11.2.202.548-111.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77384" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="953516" ref_url="https://bugzilla.suse.com/953516" source="BUGZILLA"/>
		<reference ref_id="953519" ref_url="https://bugzilla.suse.com/953519" source="BUGZILLA"/>
		<reference ref_id="953521" ref_url="https://bugzilla.suse.com/953521" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9756" ref_url="https://www.suse.com/security/cve/CVE-2014-9756/" source="CVE"/>
		<reference ref_id="CVE-2015-7805" ref_url="https://www.suse.com/security/cve/CVE-2015-7805/" source="CVE"/>
		<reference ref_id="CVE-2015-8075" ref_url="https://www.suse.com/security/cve/CVE-2015-8075/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001679.html" source="SUSE-SU"/>
		<description>
The libsndfile package was updated to fix the following security issue:

- CVE-2014-9756: Fixed a divide by zero problem that can lead to a Denial of Service (DoS) (bsc#953521).
- CVE-2015-7805: Fixed heap overflow issue (bsc#953516).
- CVE-2015-8075: Fixed heap overflow issue (bsc#953519).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-25"/>
	<updated date="2015-12-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/953516">SUSE bug 953516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953519">SUSE bug 953519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953521">SUSE bug 953521</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9756/">CVE-2014-9756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7805/">CVE-2015-7805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8075/">CVE-2015-8075</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515282" comment="libsndfile1-1.0.25-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515283" comment="libsndfile1-32bit-1.0.25-25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77385" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="952051" ref_url="https://bugzilla.suse.com/952051" source="BUGZILLA"/>
		<reference ref_id="954980" ref_url="https://bugzilla.suse.com/954980" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001683.html" source="SUSE-SU"/>
		<description>
The libpng12 package was updated to fix the following security issues:

- CVE-2015-8126: Fixed a buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions (bsc#954980).
- CVE-2015-7981: Fixed an out-of-bound read (bsc#952051).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-18"/>
	<updated date="2015-11-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952051">SUSE bug 952051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515284" comment="libpng12-0-1.2.50-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515285" comment="libpng12-0-32bit-1.2.50-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77386" version="1" class="patch">
	<metadata>
		<title>Security update for libpng16 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="954980" ref_url="https://bugzilla.suse.com/954980" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001681.html" source="SUSE-SU"/>
		<description>
The libpng16 package was updated to fix the following security issue:

- CVE-2015-8126: Fixed a buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions (bsc#954980).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-18"/>
	<updated date="2015-11-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515286" comment="libpng16-16-1.6.8-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515287" comment="libpng16-16-32bit-1.6.8-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77387" version="1" class="patch">
	<metadata>
		<title>Recommended update for libksba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="926826" ref_url="https://bugzilla.suse.com/926826" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2015:2056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001687.html" source="SUSE-SU"/>
		<description>
The libksba package was updated to fix the following security issues:

- Fixed an integer overflow, an out of bounds read and a stack overflow issues (bsc#926826).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-23"/>
	<updated date="2015-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926826">SUSE bug 926826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515288" comment="libksba8-1.3.0-18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77388" version="1" class="patch">
	<metadata>
		<title>Security update for xscreensaver (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="952062" ref_url="https://bugzilla.suse.com/952062" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8025" ref_url="https://www.suse.com/security/cve/CVE-2015-8025/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001685.html" source="SUSE-SU"/>
		<description>
The xscreensaver package was updated to fix the following security issue:

- CVE-2015-8025: Fixed a crash when hot-swapping monitors while locked (bsc#952062).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-29"/>
	<updated date="2015-12-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952062">SUSE bug 952062</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8025/">CVE-2015-8025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515289" comment="xscreensaver-5.22-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515290" comment="xscreensaver-data-5.22-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77389" version="1" class="patch">
	<metadata>
		<title>Security update for dracut (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="935338" ref_url="https://bugzilla.suse.com/935338" source="BUGZILLA"/>
		<reference ref_id="935993" ref_url="https://bugzilla.suse.com/935993" source="BUGZILLA"/>
		<reference ref_id="947518" ref_url="https://bugzilla.suse.com/947518" source="BUGZILLA"/>
		<reference ref_id="952491" ref_url="https://bugzilla.suse.com/952491" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0794" ref_url="https://www.suse.com/security/cve/CVE-2015-0794/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001690.html" source="SUSE-SU"/>
		<description>
The dracut package was updated to fix the following security and non-security issues:

- CVE-2015-0794: Use mktemp instead of hardcoded filenames, possible vulnerability (bsc#935338).
- Always install mdraid modules (bsc#935993).
- Add notice when dracut failed to install modules (bsc#952491).
- Always install dm-snaphost module if lvm dracut module is needed, even if dm-snapshot is not loaded on the host yet (bsc#947518).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-20"/>
	<updated date="2015-11-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935338">SUSE bug 935338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935993">SUSE bug 935993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947518">SUSE bug 947518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952491">SUSE bug 952491</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0794/">CVE-2015-0794</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515291" comment="dracut-037-51.17.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77390" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="905097" ref_url="https://bugzilla.suse.com/905097" source="BUGZILLA"/>
		<reference ref_id="907805" ref_url="https://bugzilla.suse.com/907805" source="BUGZILLA"/>
		<reference ref_id="908380" ref_url="https://bugzilla.suse.com/908380" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-7840" ref_url="https://www.suse.com/security/cve/CVE-2014-7840/" source="CVE"/>
		<reference ref_id="CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001243.html" source="SUSE-SU"/>
		<description>

QEMU was updated to fix various bugs and security issues.

Following security issues were fixed:
CVE-2014-8106: Heap-based buffer overflow in the Cirrus VGA emulator
(hw/display/cirrus_vga.c) in QEMU allowed local guest users to execute
arbitrary code via vectors related to blit regions.

CVE-2014-7840: The host_from_stream_offset function in arch_init.c in
QEMU, when loading RAM during migration, allowed remote attackers to
execute arbitrary code via a crafted (1) offset or (2) length value in
savevm data.

Also a bug was fixed where qemu-img convert could occasionaly corrupt
images. (bsc#908380)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-10"/>
	<updated date="2015-02-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/905097">SUSE bug 905097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907805">SUSE bug 907805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908380">SUSE bug 908380</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7840/">CVE-2014-7840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515292" comment="qemu-2.0.2-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515293" comment="qemu-block-curl-2.0.2-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515294" comment="qemu-ipxe-1.0.0-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515295" comment="qemu-kvm-2.0.2-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515296" comment="qemu-seabios-1.7.4-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515297" comment="qemu-sgabios-8-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515298" comment="qemu-tools-2.0.2-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515299" comment="qemu-vgabios-1.7.4-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515300" comment="qemu-x86-2.0.2-42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77391" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="854151" ref_url="https://bugzilla.suse.com/854151" source="BUGZILLA"/>
		<reference ref_id="897031" ref_url="https://bugzilla.suse.com/897031" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-6051" ref_url="https://www.suse.com/security/cve/CVE-2014-6051/" source="CVE"/>
		<reference ref_id="CVE-2014-6052" ref_url="https://www.suse.com/security/cve/CVE-2014-6052/" source="CVE"/>
		<reference ref_id="CVE-2014-6053" ref_url="https://www.suse.com/security/cve/CVE-2014-6053/" source="CVE"/>
		<reference ref_id="CVE-2014-6054" ref_url="https://www.suse.com/security/cve/CVE-2014-6054/" source="CVE"/>
		<reference ref_id="CVE-2014-6055" ref_url="https://www.suse.com/security/cve/CVE-2014-6055/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001696.html" source="SUSE-SU"/>
		<description>
The LibVNCServer package was updated to fix the following security issues:

- bsc#897031: fix several security issues:
  * CVE-2014-6051: Integer overflow in MallocFrameBuffer() on client side.
  * CVE-2014-6052: Lack of malloc() return value checking on client side.
  * CVE-2014-6053: Server crash on a very large ClientCutText message.
  * CVE-2014-6054: Server crash when scaling factor is set to zero.
  * CVE-2014-6055: Multiple stack overflows in File Transfer feature.
- bsc#854151: Restrict the SSL cipher suite.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-30"/>
	<updated date="2015-12-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/854151">SUSE bug 854151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6051/">CVE-2014-6051</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6052/">CVE-2014-6052</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6053/">CVE-2014-6053</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6054/">CVE-2014-6054</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6055/">CVE-2014-6055</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515301" comment="libvncclient0-0.9.9-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515302" comment="libvncserver0-0.9.9-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77392" version="1" class="patch">
	<metadata>
		<title>Security update for sblim-sfcb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="942628" ref_url="https://bugzilla.suse.com/942628" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5185" ref_url="https://www.suse.com/security/cve/CVE-2015-5185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001702.html" source="SUSE-SU"/>
		<description>

This update of sblim-sfcb fixes a potential NULL pointer crash in lookupProviders() (CVE-2015-5185).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-27"/>
	<updated date="2015-11-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/942628">SUSE bug 942628</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5185/">CVE-2015-5185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515303" comment="sblim-sfcb-1.4.8-5.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77393" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="872912" ref_url="https://bugzilla.suse.com/872912" source="BUGZILLA"/>
		<reference ref_id="873922" ref_url="https://bugzilla.suse.com/873922" source="BUGZILLA"/>
		<reference ref_id="876312" ref_url="https://bugzilla.suse.com/876312" source="BUGZILLA"/>
		<reference ref_id="889175" ref_url="https://bugzilla.suse.com/889175" source="BUGZILLA"/>
		<reference ref_id="898031" ref_url="https://bugzilla.suse.com/898031" source="BUGZILLA"/>
		<reference ref_id="908627" ref_url="https://bugzilla.suse.com/908627" source="BUGZILLA"/>
		<reference ref_id="913238" ref_url="https://bugzilla.suse.com/913238" source="BUGZILLA"/>
		<reference ref_id="917376" ref_url="https://bugzilla.suse.com/917376" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0240" ref_url="https://www.suse.com/security/cve/CVE-2015-0240/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0353-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00028.html" source="SUSE-SU"/>
		<description>
samba was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-0240: Don't call talloc_free on an uninitialized pointer (bnc#917376).

These non-security issues were fixed:
- Fix vfs_snapper DBus string handling (bso#11055, bnc#913238).
- Fix libsmbclient DFS referral handling.
  + Reuse connections derived from DFS referrals (bso#10123).
  + Set domain/workgroup based on authentication callback value (bso#11059).
- pam_winbind: Fix warn_pwd_expire implementation (bso#9056).
- nsswitch: Fix soname of linux nss_*.so.2 modules (bso#9299).
- Fix profiles tool (bso#9629).
- s3-lib: Do not require a password with --use-ccache (bso#10279).
- s4:dsdb/rootdse: Expand extended dn values with the AS_SYSTEM control (bso#10949).
- s4-rpc: dnsserver: Fix enumeration of IPv4 and IPv6 addresses (bso#10952).
- s3:smb2_server: Allow reauthentication without signing (bso#10958).
- s3-smbclient: Return success if we listed the shares (bso#10960).
- s3-smbstatus: Fix exit code of profile output (bso#10961).
- libcli: SMB2: Pure SMB2-only negprot fix to make us behave as a Windows client does (bso#10966).
- s3: smbd/modules: Fix *allocate* calls to follow POSIX error return convention (bso#10982).
- Fix 'domain join' by adding 'drsuapi.DsBindInfoFallBack' attribute 'supported_extensions' (bso#11006).
- idl:drsuapi: Manage all possible lengths of drsuapi_DsBindInfo (bso#11006).
- winbind: Retry LogonControl RPC in ping-dc after session expiration (bso#11034).
- yast2-samba-client should be able to specify osName and osVer on AD domain join (bnc#873922).
- Lookup FSRVP share snums at runtime rather than storing them persistently (bnc#908627).
- Specify soft dependency for network-online.target in Winbind systemd service file (bnc#889175).
- Fix spoolss error response marshalling; (bso#10984).
- pidl/wscript: Remove --with-perl-* options; revert buildtools/wafadmin/ Tools/perl.py back to upstream state (bso#10472).
- s4-dns: Add support for BIND 9.10 (bso#10620).
- nmbd fails to accept '--piddir' option; (bso#10711).
- S3: source3/smbd/process.c::srv_send_smb() returns true on the error path (bso#10880).
- vfs_glusterfs: Remove 'integer fd' code and store the glfs pointers (bso#10889).
- s3-nmbd: Fix netbios name truncation (bso#10896).
- spoolss: Fix handling of bad EnumJobs levels (bso#10898).
- spoolss: Fix jobid in level 3 EnumJobs response; (bso#10905).
- s3: nmbd: Ensure NetBIOS names are only 15 characters stored; (bso#10920).
- s3:smbd: Fix file corruption using 'write cache size != 0'; (bso#10921).
- pdb_tdb: Fix a TALLOC/SAFE_FREE mixup; (bso#10932).
- s3-keytab: Fix keytab array NULL termination; (bso#10933).
- Cleanup add_string_to_array and usage; (bso#10942).
- Remove and cleanup shares and registry state associated with
  externally deleted snaphots exposed as shadow copies; (bnc#876312).
- Use the upstream tar ball, as signature verification is now able to handle
  compressed archives.
- Fix leak when closing file descriptor returned from dirfd; (bso#10918).
- Fix spoolss EnumJobs and GetJob responses; (bso#10905); (bnc#898031).
  + Fix handling of bad EnumJobs levels; (bso#10898).
- Remove dependency on gpg-offline as signature checking is implemented in the
  source validator.
- s3-libnet: Add libnet_join_get_machine_spns(); (bso#9984).
- s3-libnet: Make sure we do not overwrite precreated SPNs; (bso#9984).
- s3-libads: Add all machine account principals to the keytab; (bso#9985).
- s3: winbindd: Old NT Domain code sets struct winbind_domain-&gt;alt_name to
  be NULL. Ensure this is safe with modern AD-DCs; (bso#10717).
- Fix unstrcpy; (bso#10735).
- pthreadpool: Slightly serialize jobs; (bso#10779).
- s3: smbd: streams - Ensure share mode validation ignores internal opens
  (op_mid == 0); (bso#10797).
- s3: smbd:open_file: Open logic fix; Use a more natural check; (bso#10809).
- vfs_media_harmony: Fix a crash bug; (bso#10813).
- docs: Mention incompatibility between kernel oplocks and streams_xattr;
  (bso#10814).
- nmbd: Send waiting status to systemd; (bso#10816).
- libcli: Fix a segfault calling smbXcli_req_set_pending() on NULL;
  (bso#10817).
- nsswitch: Skip groups we were not able to map; (bso#10824).
- s3-winbindd: Use correct realm for trusted domains in idmap child;
  (bso#10826).
- s3: nmbd: Ensure the main nmbd process doesn't create zombies; (bso#10830).
- s3: lib: Signal handling - ensure smbrun and change password code save and
  restore existing SIGCHLD handlers; (bso#10831).
- idmap_rfc2307: Fix a crash after connection problem to DC; (bso#10837).
- s3-winbindd: Do not use domain SID from LookupSids for Sids2UnixIDs call;
  (bso#10838).
- s3: smb2cli: Query info return length check was reversed; (bso#10848).
- registry: Don't leave dangling transactions; (bso#10860).
- Prune idle or hung connections older than 'winbind request timeout';
  (bso#3204); (bnc#872912).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-18"/>
	<updated date="2015-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/872912">SUSE bug 872912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873922">SUSE bug 873922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876312">SUSE bug 876312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889175">SUSE bug 889175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898031">SUSE bug 898031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908627">SUSE bug 908627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913238">SUSE bug 913238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917376">SUSE bug 917376</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0240/">CVE-2015-0240</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515304" comment="libdcerpc-binding0-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515305" comment="libdcerpc-binding0-32bit-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515306" comment="libdcerpc0-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515307" comment="libdcerpc0-32bit-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515308" comment="libgensec0-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515309" comment="libgensec0-32bit-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515310" comment="libndr-krb5pac0-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515311" comment="libndr-krb5pac0-32bit-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515312" comment="libndr-nbt0-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515313" comment="libndr-nbt0-32bit-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515314" comment="libndr-standard0-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515315" comment="libndr-standard0-32bit-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515316" comment="libndr0-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515317" comment="libndr0-32bit-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515318" comment="libnetapi0-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515319" comment="libnetapi0-32bit-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515320" comment="libpdb0-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515321" comment="libpdb0-32bit-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515322" comment="libregistry0-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515323" comment="libsamba-credentials0-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515324" comment="libsamba-credentials0-32bit-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515325" comment="libsamba-hostconfig0-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515326" comment="libsamba-hostconfig0-32bit-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515327" comment="libsamba-util0-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515328" comment="libsamba-util0-32bit-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515329" comment="libsamdb0-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515330" comment="libsamdb0-32bit-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515331" comment="libsmbclient-raw0-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515332" comment="libsmbclient-raw0-32bit-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515333" comment="libsmbclient0-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515334" comment="libsmbclient0-32bit-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515335" comment="libsmbconf0-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515336" comment="libsmbconf0-32bit-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515337" comment="libsmbldap0-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515338" comment="libsmbldap0-32bit-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515339" comment="libtevent-util0-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515340" comment="libtevent-util0-32bit-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515341" comment="libwbclient0-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515342" comment="libwbclient0-32bit-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515343" comment="samba-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515344" comment="samba-32bit-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515345" comment="samba-client-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515346" comment="samba-client-32bit-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515347" comment="samba-doc-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515348" comment="samba-libs-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515349" comment="samba-libs-32bit-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515350" comment="samba-winbind-4.1.12-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515351" comment="samba-winbind-32bit-4.1.12-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77394" version="1" class="patch">
	<metadata>
		<title>Security update for unzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="914442" ref_url="https://bugzilla.suse.com/914442" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9636" ref_url="https://www.suse.com/security/cve/CVE-2014-9636/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001245.html" source="SUSE-SU"/>
		<description>
unzip was updated to fix one security issue.

This security issue was fixed:
- Out-of-bounds read/write in test_compr_eb() in extract.c (CVE-2014-9636).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-30"/>
	<updated date="2015-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/914442">SUSE bug 914442</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9636/">CVE-2014-9636</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515352" comment="unzip-6.00-32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77395" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="918089" ref_url="https://bugzilla.suse.com/918089" source="BUGZILLA"/>
		<reference ref_id="918090" ref_url="https://bugzilla.suse.com/918090" source="BUGZILLA"/>
		<reference ref_id="952347" ref_url="https://bugzilla.suse.com/952347" source="BUGZILLA"/>
		<reference ref_id="955753" ref_url="https://bugzilla.suse.com/955753" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1606" ref_url="https://www.suse.com/security/cve/CVE-2015-1606/" source="CVE"/>
		<reference ref_id="CVE-2015-1607" ref_url="https://www.suse.com/security/cve/CVE-2015-1607/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001709.html" source="SUSE-SU"/>
		<description>
The gpg2 package was updated to fix the following security and non security issues:

- CVE-2015-1606: Fixed invalid memory read using a garbled keyring (bsc#918089).
- CVE-2015-1607: Fixed memcpy with overlapping ranges (bsc#918090).

- bsc#955753: Fixed a regression of 'gpg --recv' due to keyserver import filter (also boo#952347). 
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-22"/>
	<updated date="2015-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/918089">SUSE bug 918089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918090">SUSE bug 918090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952347">SUSE bug 952347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955753">SUSE bug 955753</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1606/">CVE-2015-1606</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1607/">CVE-2015-1607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515353" comment="gpg2-2.0.24-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515354" comment="gpg2-lang-2.0.24-3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77396" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="953817" ref_url="https://bugzilla.suse.com/953817" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8023" ref_url="https://www.suse.com/security/cve/CVE-2015-8023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001713.html" source="SUSE-SU"/>
		<description>
The strongswan package was updated to fix the following security issue:

- CVE-2015-8023: Fixed an authentication bypass vulnerability in the eap-mschapv2 plugin (bsc#953817).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-21"/>
	<updated date="2015-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/953817">SUSE bug 953817</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8023/">CVE-2015-8023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515355" comment="strongswan-5.1.3-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515356" comment="strongswan-doc-5.1.3-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515357" comment="strongswan-ipsec-5.1.3-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515358" comment="strongswan-libs0-5.1.3-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77397" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="814440" ref_url="https://bugzilla.suse.com/814440" source="BUGZILLA"/>
		<reference ref_id="867595" ref_url="https://bugzilla.suse.com/867595" source="BUGZILLA"/>
		<reference ref_id="904348" ref_url="https://bugzilla.suse.com/904348" source="BUGZILLA"/>
		<reference ref_id="921949" ref_url="https://bugzilla.suse.com/921949" source="BUGZILLA"/>
		<reference ref_id="924493" ref_url="https://bugzilla.suse.com/924493" source="BUGZILLA"/>
		<reference ref_id="930145" ref_url="https://bugzilla.suse.com/930145" source="BUGZILLA"/>
		<reference ref_id="933514" ref_url="https://bugzilla.suse.com/933514" source="BUGZILLA"/>
		<reference ref_id="935961" ref_url="https://bugzilla.suse.com/935961" source="BUGZILLA"/>
		<reference ref_id="936076" ref_url="https://bugzilla.suse.com/936076" source="BUGZILLA"/>
		<reference ref_id="936773" ref_url="https://bugzilla.suse.com/936773" source="BUGZILLA"/>
		<reference ref_id="939826" ref_url="https://bugzilla.suse.com/939826" source="BUGZILLA"/>
		<reference ref_id="939926" ref_url="https://bugzilla.suse.com/939926" source="BUGZILLA"/>
		<reference ref_id="940853" ref_url="https://bugzilla.suse.com/940853" source="BUGZILLA"/>
		<reference ref_id="941202" ref_url="https://bugzilla.suse.com/941202" source="BUGZILLA"/>
		<reference ref_id="941867" ref_url="https://bugzilla.suse.com/941867" source="BUGZILLA"/>
		<reference ref_id="942938" ref_url="https://bugzilla.suse.com/942938" source="BUGZILLA"/>
		<reference ref_id="944749" ref_url="https://bugzilla.suse.com/944749" source="BUGZILLA"/>
		<reference ref_id="945626" ref_url="https://bugzilla.suse.com/945626" source="BUGZILLA"/>
		<reference ref_id="946078" ref_url="https://bugzilla.suse.com/946078" source="BUGZILLA"/>
		<reference ref_id="947241" ref_url="https://bugzilla.suse.com/947241" source="BUGZILLA"/>
		<reference ref_id="947321" ref_url="https://bugzilla.suse.com/947321" source="BUGZILLA"/>
		<reference ref_id="947478" ref_url="https://bugzilla.suse.com/947478" source="BUGZILLA"/>
		<reference ref_id="948521" ref_url="https://bugzilla.suse.com/948521" source="BUGZILLA"/>
		<reference ref_id="948685" ref_url="https://bugzilla.suse.com/948685" source="BUGZILLA"/>
		<reference ref_id="948831" ref_url="https://bugzilla.suse.com/948831" source="BUGZILLA"/>
		<reference ref_id="949100" ref_url="https://bugzilla.suse.com/949100" source="BUGZILLA"/>
		<reference ref_id="949463" ref_url="https://bugzilla.suse.com/949463" source="BUGZILLA"/>
		<reference ref_id="949504" ref_url="https://bugzilla.suse.com/949504" source="BUGZILLA"/>
		<reference ref_id="949706" ref_url="https://bugzilla.suse.com/949706" source="BUGZILLA"/>
		<reference ref_id="949744" ref_url="https://bugzilla.suse.com/949744" source="BUGZILLA"/>
		<reference ref_id="950013" ref_url="https://bugzilla.suse.com/950013" source="BUGZILLA"/>
		<reference ref_id="950750" ref_url="https://bugzilla.suse.com/950750" source="BUGZILLA"/>
		<reference ref_id="950862" ref_url="https://bugzilla.suse.com/950862" source="BUGZILLA"/>
		<reference ref_id="950998" ref_url="https://bugzilla.suse.com/950998" source="BUGZILLA"/>
		<reference ref_id="951110" ref_url="https://bugzilla.suse.com/951110" source="BUGZILLA"/>
		<reference ref_id="951165" ref_url="https://bugzilla.suse.com/951165" source="BUGZILLA"/>
		<reference ref_id="951199" ref_url="https://bugzilla.suse.com/951199" source="BUGZILLA"/>
		<reference ref_id="951440" ref_url="https://bugzilla.suse.com/951440" source="BUGZILLA"/>
		<reference ref_id="951546" ref_url="https://bugzilla.suse.com/951546" source="BUGZILLA"/>
		<reference ref_id="952666" ref_url="https://bugzilla.suse.com/952666" source="BUGZILLA"/>
		<reference ref_id="952758" ref_url="https://bugzilla.suse.com/952758" source="BUGZILLA"/>
		<reference ref_id="953796" ref_url="https://bugzilla.suse.com/953796" source="BUGZILLA"/>
		<reference ref_id="953980" ref_url="https://bugzilla.suse.com/953980" source="BUGZILLA"/>
		<reference ref_id="954635" ref_url="https://bugzilla.suse.com/954635" source="BUGZILLA"/>
		<reference ref_id="955148" ref_url="https://bugzilla.suse.com/955148" source="BUGZILLA"/>
		<reference ref_id="955224" ref_url="https://bugzilla.suse.com/955224" source="BUGZILLA"/>
		<reference ref_id="955422" ref_url="https://bugzilla.suse.com/955422" source="BUGZILLA"/>
		<reference ref_id="955533" ref_url="https://bugzilla.suse.com/955533" source="BUGZILLA"/>
		<reference ref_id="955644" ref_url="https://bugzilla.suse.com/955644" source="BUGZILLA"/>
		<reference ref_id="956047" ref_url="https://bugzilla.suse.com/956047" source="BUGZILLA"/>
		<reference ref_id="956053" ref_url="https://bugzilla.suse.com/956053" source="BUGZILLA"/>
		<reference ref_id="956703" ref_url="https://bugzilla.suse.com/956703" source="BUGZILLA"/>
		<reference ref_id="956711" ref_url="https://bugzilla.suse.com/956711" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0272" ref_url="https://www.suse.com/security/cve/CVE-2015-0272/" source="CVE"/>
		<reference ref_id="CVE-2015-2925" ref_url="https://www.suse.com/security/cve/CVE-2015-2925/" source="CVE"/>
		<reference ref_id="CVE-2015-5283" ref_url="https://www.suse.com/security/cve/CVE-2015-5283/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-7799" ref_url="https://www.suse.com/security/cve/CVE-2015-7799/" source="CVE"/>
		<reference ref_id="CVE-2015-7872" ref_url="https://www.suse.com/security/cve/CVE-2015-7872/" source="CVE"/>
		<reference ref_id="CVE-2015-7990" ref_url="https://www.suse.com/security/cve/CVE-2015-7990/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 kernel was updated to 3.12.51 to receive various security and bugfixes.

Following security bugs were fixed:
- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel did not ensure that certain slot numbers were valid, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call (bnc#949936).
- CVE-2015-5283: The sctp_init function in net/sctp/protocol.c in the Linux kernel had an incorrect sequence of protocol-initialization steps, which allowed local users to cause a denial of service (panic or memory corruption) by creating SCTP sockets before all of the steps have finished (bnc#947155).
- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux kernel did not properly handle rename actions inside a bind mount, which allowed local users to bypass an intended container protection mechanism by renaming a directory, related to a 'double-chroot attack (bnc#926238).
- CVE-2015-8104: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).
- CVE-2015-5307: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c (bnc#953527).
- CVE-2015-7990: RDS: There was no verification that an underlying transport exists when creating a connection, causing usage of a NULL pointer (bsc#952384).
- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel allowed local users to cause a denial of service (OOPS) via crafted keyctl commands (bnc#951440).
- CVE-2015-0272: Missing checks allowed remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215 (bnc#944296).

The following non-security bugs were fixed:
- ALSA: hda - Disable 64bit address for Creative HDA controllers (bnc#814440).
- Add PCI IDs of Intel Sunrise Point-H SATA Controller S232/236 (bsc#953796).
- Btrfs: fix file corruption and data loss after cloning inline extents (bnc#956053).
- Btrfs: fix truncation of compressed and inlined extents (bnc#956053).
- Disable some ppc64le netfilter modules to restore the kabi (bsc#951546)
- Fix regression in NFSRDMA server (bsc#951110).
- KEYS: Fix race between key destruction and finding a keyring by name (bsc#951440).
- KVM: x86: call irq notifiers with directed EOI (bsc#950862).
- NVMe: Add shutdown timeout as module parameter (bnc#936076).
- NVMe: Mismatched host/device page size support (bsc#935961).
- PCI: Drop 'setting latency timer' messages (bsc#956047).
- SCSI: Fix hard lockup in scsi_remove_target() (bsc#944749).
- SCSI: hosts: update to use ida_simple for host_no (bsc#939926)
- SUNRPC: Fix oops when trace sunrpc_task events in nfs client (bnc#956703).
- Sync ppc64le netfilter config options with other archs (bnc#951546)
- Update kabi files with sbc_parse_cdb symbol change (bsc#954635).
- apparmor: allow SYS_CAP_RESOURCE to be sufficient to prlimit another task (bsc#921949).
- apparmor: temporary work around for bug while unloading policy (boo#941867).
- audit: correctly record file names with different path name types (bsc#950013).
- audit: create private file name copies when auditing inodes (bsc#950013).
- cpu: Defer smpboot kthread unparking until CPU known to scheduler (bsc#936773).
- dlm: make posix locks interruptible, (bsc#947241).
- dm sysfs: introduce ability to add writable attributes (bsc#904348).
- dm-snap: avoid deadock on s-&gt;lock when a read is split (bsc#939826).
- dm: do not start current request if it would've merged with the previous (bsc#904348).
- dm: impose configurable deadline for dm_request_fn's merge heuristic (bsc#904348).
- dmapi: Fix xfs dmapi to not unlock and lock XFS_ILOCK_EXCL (bsc#949744).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt, v2 (bsc#942938).
- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).
- fanotify: fix notification of groups with inode and mount marks (bsc#955533).
- genirq: Make sure irq descriptors really exist when __irq_alloc_descs returns (bsc#945626).
- hv: vss: run only on supported host versions (bnc#949504).
- ipv4: Do not increase PMTU with Datagram Too Big message (bsc#955224).
- ipv6: Check RTF_LOCAL on rt-&gt;rt6i_flags instead of rt-&gt;dst.flags (bsc#947321).
- ipv6: Consider RTF_CACHE when searching the fib6 tree (bsc#947321).
- ipv6: Extend the route lookups to low priority metrics (bsc#947321).
- ipv6: Stop /128 route from disappearing after pmtu update (bsc#947321).
- ipv6: Stop rt6_info from using inet_peer's metrics (bsc#947321).
- ipv6: distinguish frag queues by device for multicast and link-local packets (bsc#955422).
- ipvs: drop first packet to dead server (bsc#946078).
- kABI: protect struct ahci_host_priv.
- kABI: protect struct rt6_info changes from bsc#947321 changes (bsc#947321).
- kabi: Hide rt6_* types from genksyms on ppc64le (bsc#951546).
- kabi: Restore kabi in struct iscsi_tpg_attrib (bsc#954635).
- kabi: Restore kabi in struct se_cmd (bsc#954635).
- kabi: Restore kabi in struct se_subsystem_api (bsc#954635).
- kabi: protect skb_copy_and_csum_datagram_iovec() signature (bsc#951199).
- kgr: fix migration of kthreads to the new universe.
- kgr: wake up kthreads periodically.
- ktime: add ktime_after and ktime_before helper (bsc#904348).
- macvlan: Support bonding events (bsc#948521).
- net: add length argument to skb_copy_and_csum_datagram_iovec (bsc#951199).
- net: handle null iovec pointer in skb_copy_and_csum_datagram_iovec() (bsc#951199).
- pci: Update VPD size with correct length (bsc#924493).
- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).
- ring-buffer: Always run per-cpu ring buffer resize with schedule_work_on() (bnc#956711).
- route: Use ipv4_mtu instead of raw rt_pmtu (bsc#955224).
- rtc: cmos: Cancel alarm timer if alarm time is equal to now+1 seconds (bsc#930145).
- rtc: cmos: Revert 'rtc-cmos: Add an alarm disable quirk' (bsc#930145).
- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bnc#949100).
- sunrpc/cache: make cache flushing more reliable (bsc#947478).
- supported.conf: Add missing dependencies of supported modules hwmon_vid needed by nct6775 hwmon_vid needed by w83627ehf reed_solomon needed by ramoops
- supported.conf: Fix dependencies on ppc64le of_mdio needed by mdio-gpio
- target/pr: fix core_scsi3_pr_seq_non_holder() caller (bnc#952666).
- target/rbd: fix COMPARE AND WRITE page vector leak (bnc#948831).
- target/rbd: fix PR info memory leaks (bnc#948831).
- target: Send UA upon LUN RESET tmr completion (bsc#933514).
- target: use '^A' when allocating UAs (bsc#933514).
- usbvision fix overflow of interfaces array (bnc#950998).
- vmxnet3: Fix ethtool -S to return correct rx queue stats (bsc#950750).
- vmxnet3: adjust ring sizes when interface is down (bsc#950750).
- x86/efi: Fix boot crash by mapping EFI memmap entries bottom-up at runtime, instead of top-down (bsc#940853).
- x86/evtchn: make use of PHYSDEVOP_map_pirq.
- x86/mm/hotplug: Modify PGD entry when removing memory (VM Functionality, bnc#955148).
- x86/mm/hotplug: Pass sync_global_pgds() a correct argument in remove_pagetable() (VM Functionality, bnc#955148).
- xfs: DIO needs an ioend for writes (bsc#949744).
- xfs: DIO write completion size updates race (bsc#949744).
- xfs: DIO writes within EOF do not need an ioend (bsc#949744).
- xfs: always drain dio before extending aio write submission (bsc#949744).
- xfs: direct IO EOF zeroing needs to drain AIO (bsc#949744).
- xfs: do not allocate an ioend for direct I/O completions (bsc#949744).
- xfs: factor DIO write mapping from get_blocks (bsc#949744).
- xfs: handle DIO overwrite EOF update completion correctly (bsc#949744).
- xfs: move DIO mapping size calculation (bsc#949744).
- xfs: using generic_file_direct_write() is unnecessary (bsc#949744).
- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bnc#951165).
- xhci: change xhci 1.0 only restrictions to support xhci 1.1 (bnc#949463).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-04"/>
	<updated date="2015-12-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/814440">SUSE bug 814440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867595">SUSE bug 867595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904348">SUSE bug 904348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921949">SUSE bug 921949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924493">SUSE bug 924493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930145">SUSE bug 930145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933514">SUSE bug 933514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935961">SUSE bug 935961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936076">SUSE bug 936076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936773">SUSE bug 936773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939826">SUSE bug 939826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939926">SUSE bug 939926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940853">SUSE bug 940853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941202">SUSE bug 941202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941867">SUSE bug 941867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942938">SUSE bug 942938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944749">SUSE bug 944749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945626">SUSE bug 945626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946078">SUSE bug 946078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947241">SUSE bug 947241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947321">SUSE bug 947321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947478">SUSE bug 947478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948521">SUSE bug 948521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948685">SUSE bug 948685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948831">SUSE bug 948831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949100">SUSE bug 949100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949463">SUSE bug 949463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949504">SUSE bug 949504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949706">SUSE bug 949706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949744">SUSE bug 949744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950013">SUSE bug 950013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950750">SUSE bug 950750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950862">SUSE bug 950862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950998">SUSE bug 950998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951110">SUSE bug 951110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951165">SUSE bug 951165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951199">SUSE bug 951199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951440">SUSE bug 951440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951546">SUSE bug 951546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952666">SUSE bug 952666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952758">SUSE bug 952758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953796">SUSE bug 953796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953980">SUSE bug 953980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954635">SUSE bug 954635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955148">SUSE bug 955148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955224">SUSE bug 955224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955422">SUSE bug 955422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955533">SUSE bug 955533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955644">SUSE bug 955644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956047">SUSE bug 956047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956053">SUSE bug 956053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956703">SUSE bug 956703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956711">SUSE bug 956711</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0272/">CVE-2015-0272</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2925/">CVE-2015-2925</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5283/">CVE-2015-5283</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7799/">CVE-2015-7799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7872/">CVE-2015-7872</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7990/">CVE-2015-7990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515359" comment="kernel-default-3.12.51-52.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515360" comment="kernel-default-devel-3.12.51-52.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515361" comment="kernel-default-extra-3.12.51-52.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515362" comment="kernel-devel-3.12.51-52.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515363" comment="kernel-macros-3.12.51-52.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515364" comment="kernel-source-3.12.51-52.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515365" comment="kernel-syms-3.12.51-52.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515366" comment="kernel-xen-3.12.51-52.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515367" comment="kernel-xen-devel-3.12.51-52.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77398" version="1" class="patch">
	<metadata>
		<title>Security update for gdk-pixbuf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="942801" ref_url="https://bugzilla.suse.com/942801" source="BUGZILLA"/>
		<reference ref_id="948790" ref_url="https://bugzilla.suse.com/948790" source="BUGZILLA"/>
		<reference ref_id="948791" ref_url="https://bugzilla.suse.com/948791" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-7673" ref_url="https://www.suse.com/security/cve/CVE-2015-7673/" source="CVE"/>
		<reference ref_id="CVE-2015-7674" ref_url="https://www.suse.com/security/cve/CVE-2015-7674/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001719.html" source="SUSE-SU"/>
		<description>
The gdk pixbuf library was updated to fix three security issues.

These security issues were fixed:
- CVE-2015-7673: Fix some more overflows scaling a gif (bsc#948791)
- CVE-2015-4491: Check for overflow before allocating memory when scaling (bsc#942801)
- CVE-2015-7673: Fix an overflow and DoS when scaling TGA files (bsc#948790).
- CVE-2015-7674: Fix overflow when scaling GIF files(bsc#948791).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-23"/>
	<updated date="2015-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/942801">SUSE bug 942801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948790">SUSE bug 948790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948791">SUSE bug 948791</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7673/">CVE-2015-7673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7674/">CVE-2015-7674</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515368" comment="gdk-pixbuf-lang-2.30.6-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515369" comment="gdk-pixbuf-query-loaders-2.30.6-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515370" comment="gdk-pixbuf-query-loaders-32bit-2.30.6-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515371" comment="libgdk_pixbuf-2_0-0-2.30.6-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515372" comment="libgdk_pixbuf-2_0-0-32bit-2.30.6-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515373" comment="typelib-1_0-GdkPixbuf-2_0-2.30.6-7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77399" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="912214" ref_url="https://bugzilla.suse.com/912214" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9556" ref_url="https://www.suse.com/security/cve/CVE-2014-9556/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001249.html" source="SUSE-SU"/>
		<description>
libmspack was updated to fix one security issue.

This security issue was fixed:
- Possible DoS by infinite loop (bnc#912214, CVE-2014-9556)
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-30"/>
	<updated date="2015-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/912214">SUSE bug 912214</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9556/">CVE-2014-9556</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515374" comment="libmspack0-0.4-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77400" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="937085" ref_url="https://bugzilla.suse.com/937085" source="BUGZILLA"/>
		<reference ref_id="947104" ref_url="https://bugzilla.suse.com/947104" source="BUGZILLA"/>
		<reference ref_id="954256" ref_url="https://bugzilla.suse.com/954256" source="BUGZILLA"/>
		<reference ref_id="957812" ref_url="https://bugzilla.suse.com/957812" source="BUGZILLA"/>
		<reference ref_id="957813" ref_url="https://bugzilla.suse.com/957813" source="BUGZILLA"/>
		<reference ref_id="957815" ref_url="https://bugzilla.suse.com/957815" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194/" source="CVE"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="CVE-2015-3196" ref_url="https://www.suse.com/security/cve/CVE-2015-3196/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001728.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues: 

Security fixes:
- CVE-2015-3194: The signature verification routines will crash with a
  NULL pointer dereference if presented with an ASN.1 signature using the
  RSA PSS algorithm and absent mask generation function parameter. Since
  these routines are used to verify certificate signature algorithms
  this can be used to crash any certificate verification operation and
  exploited in a DoS attack. Any application which performs certificate
  verification is vulnerable including OpenSSL clients and servers which
  enable client authentication. (bsc#957815)
- CVE-2015-3195: When presented with a malformed X509_ATTRIBUTE structure OpenSSL would leak
  memory. This structure is used by the PKCS#7 and CMS routines so any
  application which reads PKCS#7 or CMS data from untrusted sources is affected.
  SSL/TLS is not affected. (bsc#957812)
- CVE-2015-3196: If PSK identity hints are received by a multi-threaded client then
  the values were wrongly updated in the parent SSL_CTX structure. This could
  result in a race condition potentially leading to a double free of the
  identify hint data.  (bsc#957813)

Non security bugs fixed:
- Clear the error after setting non-fips mode (bsc#947104)
- Improve S/390 performance on IBM z196 and z13 (bsc#954256)
- Add support for 'ciphers' providing no encryption (bsc#937085)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-09"/>
	<updated date="2015-12-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/937085">SUSE bug 937085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947104">SUSE bug 947104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954256">SUSE bug 954256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957813">SUSE bug 957813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957815">SUSE bug 957815</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3196/">CVE-2015-3196</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515375" comment="libopenssl1_0_0-1.0.1i-27.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515376" comment="libopenssl1_0_0-32bit-1.0.1i-27.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515377" comment="openssl-1.0.1i-27.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77401" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="958324" ref_url="https://bugzilla.suse.com/958324" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8045" ref_url="https://www.suse.com/security/cve/CVE-2015-8045/" source="CVE"/>
		<reference ref_id="CVE-2015-8047" ref_url="https://www.suse.com/security/cve/CVE-2015-8047/" source="CVE"/>
		<reference ref_id="CVE-2015-8048" ref_url="https://www.suse.com/security/cve/CVE-2015-8048/" source="CVE"/>
		<reference ref_id="CVE-2015-8049" ref_url="https://www.suse.com/security/cve/CVE-2015-8049/" source="CVE"/>
		<reference ref_id="CVE-2015-8050" ref_url="https://www.suse.com/security/cve/CVE-2015-8050/" source="CVE"/>
		<reference ref_id="CVE-2015-8055" ref_url="https://www.suse.com/security/cve/CVE-2015-8055/" source="CVE"/>
		<reference ref_id="CVE-2015-8056" ref_url="https://www.suse.com/security/cve/CVE-2015-8056/" source="CVE"/>
		<reference ref_id="CVE-2015-8057" ref_url="https://www.suse.com/security/cve/CVE-2015-8057/" source="CVE"/>
		<reference ref_id="CVE-2015-8058" ref_url="https://www.suse.com/security/cve/CVE-2015-8058/" source="CVE"/>
		<reference ref_id="CVE-2015-8059" ref_url="https://www.suse.com/security/cve/CVE-2015-8059/" source="CVE"/>
		<reference ref_id="CVE-2015-8060" ref_url="https://www.suse.com/security/cve/CVE-2015-8060/" source="CVE"/>
		<reference ref_id="CVE-2015-8061" ref_url="https://www.suse.com/security/cve/CVE-2015-8061/" source="CVE"/>
		<reference ref_id="CVE-2015-8062" ref_url="https://www.suse.com/security/cve/CVE-2015-8062/" source="CVE"/>
		<reference ref_id="CVE-2015-8063" ref_url="https://www.suse.com/security/cve/CVE-2015-8063/" source="CVE"/>
		<reference ref_id="CVE-2015-8064" ref_url="https://www.suse.com/security/cve/CVE-2015-8064/" source="CVE"/>
		<reference ref_id="CVE-2015-8065" ref_url="https://www.suse.com/security/cve/CVE-2015-8065/" source="CVE"/>
		<reference ref_id="CVE-2015-8066" ref_url="https://www.suse.com/security/cve/CVE-2015-8066/" source="CVE"/>
		<reference ref_id="CVE-2015-8067" ref_url="https://www.suse.com/security/cve/CVE-2015-8067/" source="CVE"/>
		<reference ref_id="CVE-2015-8068" ref_url="https://www.suse.com/security/cve/CVE-2015-8068/" source="CVE"/>
		<reference ref_id="CVE-2015-8069" ref_url="https://www.suse.com/security/cve/CVE-2015-8069/" source="CVE"/>
		<reference ref_id="CVE-2015-8070" ref_url="https://www.suse.com/security/cve/CVE-2015-8070/" source="CVE"/>
		<reference ref_id="CVE-2015-8071" ref_url="https://www.suse.com/security/cve/CVE-2015-8071/" source="CVE"/>
		<reference ref_id="CVE-2015-8401" ref_url="https://www.suse.com/security/cve/CVE-2015-8401/" source="CVE"/>
		<reference ref_id="CVE-2015-8402" ref_url="https://www.suse.com/security/cve/CVE-2015-8402/" source="CVE"/>
		<reference ref_id="CVE-2015-8403" ref_url="https://www.suse.com/security/cve/CVE-2015-8403/" source="CVE"/>
		<reference ref_id="CVE-2015-8404" ref_url="https://www.suse.com/security/cve/CVE-2015-8404/" source="CVE"/>
		<reference ref_id="CVE-2015-8405" ref_url="https://www.suse.com/security/cve/CVE-2015-8405/" source="CVE"/>
		<reference ref_id="CVE-2015-8406" ref_url="https://www.suse.com/security/cve/CVE-2015-8406/" source="CVE"/>
		<reference ref_id="CVE-2015-8407" ref_url="https://www.suse.com/security/cve/CVE-2015-8407/" source="CVE"/>
		<reference ref_id="CVE-2015-8408" ref_url="https://www.suse.com/security/cve/CVE-2015-8408/" source="CVE"/>
		<reference ref_id="CVE-2015-8409" ref_url="https://www.suse.com/security/cve/CVE-2015-8409/" source="CVE"/>
		<reference ref_id="CVE-2015-8410" ref_url="https://www.suse.com/security/cve/CVE-2015-8410/" source="CVE"/>
		<reference ref_id="CVE-2015-8411" ref_url="https://www.suse.com/security/cve/CVE-2015-8411/" source="CVE"/>
		<reference ref_id="CVE-2015-8412" ref_url="https://www.suse.com/security/cve/CVE-2015-8412/" source="CVE"/>
		<reference ref_id="CVE-2015-8413" ref_url="https://www.suse.com/security/cve/CVE-2015-8413/" source="CVE"/>
		<reference ref_id="CVE-2015-8414" ref_url="https://www.suse.com/security/cve/CVE-2015-8414/" source="CVE"/>
		<reference ref_id="CVE-2015-8415" ref_url="https://www.suse.com/security/cve/CVE-2015-8415/" source="CVE"/>
		<reference ref_id="CVE-2015-8416" ref_url="https://www.suse.com/security/cve/CVE-2015-8416/" source="CVE"/>
		<reference ref_id="CVE-2015-8417" ref_url="https://www.suse.com/security/cve/CVE-2015-8417/" source="CVE"/>
		<reference ref_id="CVE-2015-8418" ref_url="https://www.suse.com/security/cve/CVE-2015-8418/" source="CVE"/>
		<reference ref_id="CVE-2015-8419" ref_url="https://www.suse.com/security/cve/CVE-2015-8419/" source="CVE"/>
		<reference ref_id="CVE-2015-8420" ref_url="https://www.suse.com/security/cve/CVE-2015-8420/" source="CVE"/>
		<reference ref_id="CVE-2015-8421" ref_url="https://www.suse.com/security/cve/CVE-2015-8421/" source="CVE"/>
		<reference ref_id="CVE-2015-8422" ref_url="https://www.suse.com/security/cve/CVE-2015-8422/" source="CVE"/>
		<reference ref_id="CVE-2015-8423" ref_url="https://www.suse.com/security/cve/CVE-2015-8423/" source="CVE"/>
		<reference ref_id="CVE-2015-8424" ref_url="https://www.suse.com/security/cve/CVE-2015-8424/" source="CVE"/>
		<reference ref_id="CVE-2015-8425" ref_url="https://www.suse.com/security/cve/CVE-2015-8425/" source="CVE"/>
		<reference ref_id="CVE-2015-8426" ref_url="https://www.suse.com/security/cve/CVE-2015-8426/" source="CVE"/>
		<reference ref_id="CVE-2015-8427" ref_url="https://www.suse.com/security/cve/CVE-2015-8427/" source="CVE"/>
		<reference ref_id="CVE-2015-8428" ref_url="https://www.suse.com/security/cve/CVE-2015-8428/" source="CVE"/>
		<reference ref_id="CVE-2015-8429" ref_url="https://www.suse.com/security/cve/CVE-2015-8429/" source="CVE"/>
		<reference ref_id="CVE-2015-8430" ref_url="https://www.suse.com/security/cve/CVE-2015-8430/" source="CVE"/>
		<reference ref_id="CVE-2015-8431" ref_url="https://www.suse.com/security/cve/CVE-2015-8431/" source="CVE"/>
		<reference ref_id="CVE-2015-8432" ref_url="https://www.suse.com/security/cve/CVE-2015-8432/" source="CVE"/>
		<reference ref_id="CVE-2015-8433" ref_url="https://www.suse.com/security/cve/CVE-2015-8433/" source="CVE"/>
		<reference ref_id="CVE-2015-8434" ref_url="https://www.suse.com/security/cve/CVE-2015-8434/" source="CVE"/>
		<reference ref_id="CVE-2015-8435" ref_url="https://www.suse.com/security/cve/CVE-2015-8435/" source="CVE"/>
		<reference ref_id="CVE-2015-8436" ref_url="https://www.suse.com/security/cve/CVE-2015-8436/" source="CVE"/>
		<reference ref_id="CVE-2015-8437" ref_url="https://www.suse.com/security/cve/CVE-2015-8437/" source="CVE"/>
		<reference ref_id="CVE-2015-8438" ref_url="https://www.suse.com/security/cve/CVE-2015-8438/" source="CVE"/>
		<reference ref_id="CVE-2015-8439" ref_url="https://www.suse.com/security/cve/CVE-2015-8439/" source="CVE"/>
		<reference ref_id="CVE-2015-8440" ref_url="https://www.suse.com/security/cve/CVE-2015-8440/" source="CVE"/>
		<reference ref_id="CVE-2015-8441" ref_url="https://www.suse.com/security/cve/CVE-2015-8441/" source="CVE"/>
		<reference ref_id="CVE-2015-8442" ref_url="https://www.suse.com/security/cve/CVE-2015-8442/" source="CVE"/>
		<reference ref_id="CVE-2015-8443" ref_url="https://www.suse.com/security/cve/CVE-2015-8443/" source="CVE"/>
		<reference ref_id="CVE-2015-8444" ref_url="https://www.suse.com/security/cve/CVE-2015-8444/" source="CVE"/>
		<reference ref_id="CVE-2015-8445" ref_url="https://www.suse.com/security/cve/CVE-2015-8445/" source="CVE"/>
		<reference ref_id="CVE-2015-8446" ref_url="https://www.suse.com/security/cve/CVE-2015-8446/" source="CVE"/>
		<reference ref_id="CVE-2015-8447" ref_url="https://www.suse.com/security/cve/CVE-2015-8447/" source="CVE"/>
		<reference ref_id="CVE-2015-8448" ref_url="https://www.suse.com/security/cve/CVE-2015-8448/" source="CVE"/>
		<reference ref_id="CVE-2015-8449" ref_url="https://www.suse.com/security/cve/CVE-2015-8449/" source="CVE"/>
		<reference ref_id="CVE-2015-8450" ref_url="https://www.suse.com/security/cve/CVE-2015-8450/" source="CVE"/>
		<reference ref_id="CVE-2015-8451" ref_url="https://www.suse.com/security/cve/CVE-2015-8451/" source="CVE"/>
		<reference ref_id="CVE-2015-8452" ref_url="https://www.suse.com/security/cve/CVE-2015-8452/" source="CVE"/>
		<reference ref_id="CVE-2015-8453" ref_url="https://www.suse.com/security/cve/CVE-2015-8453/" source="CVE"/>
		<reference ref_id="CVE-2015-8454" ref_url="https://www.suse.com/security/cve/CVE-2015-8454/" source="CVE"/>
		<reference ref_id="CVE-2015-8455" ref_url="https://www.suse.com/security/cve/CVE-2015-8455/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<description>

This update for flash-player to version 11.2.202.554 fixes the following security issues
in Adobe security advisory APSB15-32.

* These updates resolve heap buffer overflow vulnerabilities that could
  lead to code execution (CVE-2015-8438, CVE-2015-8446).
* These updates resolve memory corruption vulnerabilities that could
  lead to code execution (CVE-2015-8444, CVE-2015-8443, CVE-2015-8417,
  CVE-2015-8416, CVE-2015-8451, CVE-2015-8047, CVE-2015-8455, CVE-2015-8045,
  CVE-2015-8418, CVE-2015-8060, CVE-2015-8419, CVE-2015-8408).
* These updates resolve security bypass vulnerabilities (CVE-2015-8453,
  CVE-2015-8440, CVE-2015-8409).
* These updates resolve a stack overflow vulnerability that could lead
  to code execution (CVE-2015-8407).
* These updates resolve a type confusion vulnerability that could lead
  to code execution (CVE-2015-8439).
* These updates resolve an integer overflow vulnerability that could
  lead to code execution (CVE-2015-8445).
* These updates resolve a buffer overflow vulnerability that could lead
  to code execution (CVE-2015-8415)
* These updates resolve use-after-free vulnerabilities that could
  lead to code execution (CVE-2015-8050, CVE-2015-8049, CVE-2015-8437,
  CVE-2015-8450, CVE-2015-8449, CVE-2015-8448, CVE-2015-8436, CVE-2015-8452,
  CVE-2015-8048, CVE-2015-8413, CVE-2015-8412, CVE-2015-8410, CVE-2015-8411,
  CVE-2015-8424, CVE-2015-8422, CVE-2015-8420, CVE-2015-8421, CVE-2015-8423,
  CVE-2015-8425, CVE-2015-8433, CVE-2015-8432, CVE-2015-8431, CVE-2015-8426,
  CVE-2015-8430, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8434,
  CVE-2015-8435, CVE-2015-8414, CVE-2015-8454, CVE-2015-8059, CVE-2015-8058,
  CVE-2015-8055, CVE-2015-8057, CVE-2015-8056, CVE-2015-8061, CVE-2015-8067,
  CVE-2015-8066, CVE-2015-8062, CVE-2015-8068, CVE-2015-8064, CVE-2015-8065,
  CVE-2015-8063, CVE-2015-8405, CVE-2015-8404, CVE-2015-8402, CVE-2015-8403,
  CVE-2015-8071, CVE-2015-8401, CVE-2015-8406, CVE-2015-8069, CVE-2015-8070,
  CVE-2015-8441, CVE-2015-8442, CVE-2015-8447).

Please also see
        https://helpx.adobe.com/security/products/flash-player/apsb15-32.html
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-10"/>
	<updated date="2015-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8045/">CVE-2015-8045</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8047/">CVE-2015-8047</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8048/">CVE-2015-8048</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8049/">CVE-2015-8049</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8050/">CVE-2015-8050</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8055/">CVE-2015-8055</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8056/">CVE-2015-8056</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8057/">CVE-2015-8057</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8058/">CVE-2015-8058</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8059/">CVE-2015-8059</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8060/">CVE-2015-8060</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8061/">CVE-2015-8061</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8062/">CVE-2015-8062</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8063/">CVE-2015-8063</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8064/">CVE-2015-8064</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8065/">CVE-2015-8065</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8066/">CVE-2015-8066</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8067/">CVE-2015-8067</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8068/">CVE-2015-8068</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8069/">CVE-2015-8069</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8070/">CVE-2015-8070</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8071/">CVE-2015-8071</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8401/">CVE-2015-8401</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8402/">CVE-2015-8402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8403/">CVE-2015-8403</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8404/">CVE-2015-8404</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8405/">CVE-2015-8405</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8406/">CVE-2015-8406</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8407/">CVE-2015-8407</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8408/">CVE-2015-8408</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8409/">CVE-2015-8409</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8410/">CVE-2015-8410</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8411/">CVE-2015-8411</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8412/">CVE-2015-8412</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8413/">CVE-2015-8413</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8414/">CVE-2015-8414</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8415/">CVE-2015-8415</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8416/">CVE-2015-8416</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8417/">CVE-2015-8417</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8418/">CVE-2015-8418</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8419/">CVE-2015-8419</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8420/">CVE-2015-8420</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8421/">CVE-2015-8421</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8422/">CVE-2015-8422</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8423/">CVE-2015-8423</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8424/">CVE-2015-8424</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8425/">CVE-2015-8425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8426/">CVE-2015-8426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8427/">CVE-2015-8427</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8428/">CVE-2015-8428</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8429/">CVE-2015-8429</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8430/">CVE-2015-8430</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8431/">CVE-2015-8431</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8432/">CVE-2015-8432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8433/">CVE-2015-8433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8434/">CVE-2015-8434</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8435/">CVE-2015-8435</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8436/">CVE-2015-8436</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8437/">CVE-2015-8437</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8438/">CVE-2015-8438</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8439/">CVE-2015-8439</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8440/">CVE-2015-8440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8441/">CVE-2015-8441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8442/">CVE-2015-8442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8443/">CVE-2015-8443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8444/">CVE-2015-8444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8445/">CVE-2015-8445</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8446/">CVE-2015-8446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8447/">CVE-2015-8447</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8448/">CVE-2015-8448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8449/">CVE-2015-8449</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8450/">CVE-2015-8450</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8451/">CVE-2015-8451</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8452/">CVE-2015-8452</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8453/">CVE-2015-8453</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8454/">CVE-2015-8454</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8455/">CVE-2015-8455</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77402" version="1" class="patch">
	<metadata>
		<title>Security update for vorbis-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="914938" ref_url="https://bugzilla.suse.com/914938" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9640" ref_url="https://www.suse.com/security/cve/CVE-2014-9640/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001250.html" source="SUSE-SU"/>
		<description>

      This update fixes the following security issue:

      - A crafted raw file used as input could cause a segmentation fault (CVE-2014-9640, bsc#914938)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-29"/>
	<updated date="2015-01-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/914938">SUSE bug 914938</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9640/">CVE-2014-9640</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515380" comment="vorbis-tools-1.4.0-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515381" comment="vorbis-tools-lang-1.4.0-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77403" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="954204" ref_url="https://bugzilla.suse.com/954204" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2698" ref_url="https://www.suse.com/security/cve/CVE-2015-2698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001738.html" source="SUSE-SU"/>
		<description>
The krb5 package was updated to fix the following security issue:

- CVE-2015-2698: Fixed a memory corruption regression introduced by resolving of CVE-2015-2698 (bsc#954204).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-18"/>
	<updated date="2015-12-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954204">SUSE bug 954204</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2698/">CVE-2015-2698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515382" comment="krb5-1.12.1-22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515383" comment="krb5-32bit-1.12.1-22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515384" comment="krb5-client-1.12.1-22.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77404" version="1" class="patch">
	<metadata>
		<title>Security update for ldb, samba, talloc, tdb, tevent (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="295284" ref_url="https://bugzilla.suse.com/295284" source="BUGZILLA"/>
		<reference ref_id="773464" ref_url="https://bugzilla.suse.com/773464" source="BUGZILLA"/>
		<reference ref_id="872912" ref_url="https://bugzilla.suse.com/872912" source="BUGZILLA"/>
		<reference ref_id="901813" ref_url="https://bugzilla.suse.com/901813" source="BUGZILLA"/>
		<reference ref_id="902421" ref_url="https://bugzilla.suse.com/902421" source="BUGZILLA"/>
		<reference ref_id="910378" ref_url="https://bugzilla.suse.com/910378" source="BUGZILLA"/>
		<reference ref_id="912457" ref_url="https://bugzilla.suse.com/912457" source="BUGZILLA"/>
		<reference ref_id="913304" ref_url="https://bugzilla.suse.com/913304" source="BUGZILLA"/>
		<reference ref_id="923374" ref_url="https://bugzilla.suse.com/923374" source="BUGZILLA"/>
		<reference ref_id="931854" ref_url="https://bugzilla.suse.com/931854" source="BUGZILLA"/>
		<reference ref_id="936909" ref_url="https://bugzilla.suse.com/936909" source="BUGZILLA"/>
		<reference ref_id="939051" ref_url="https://bugzilla.suse.com/939051" source="BUGZILLA"/>
		<reference ref_id="947552" ref_url="https://bugzilla.suse.com/947552" source="BUGZILLA"/>
		<reference ref_id="949022" ref_url="https://bugzilla.suse.com/949022" source="BUGZILLA"/>
		<reference ref_id="951660" ref_url="https://bugzilla.suse.com/951660" source="BUGZILLA"/>
		<reference ref_id="953382" ref_url="https://bugzilla.suse.com/953382" source="BUGZILLA"/>
		<reference ref_id="954658" ref_url="https://bugzilla.suse.com/954658" source="BUGZILLA"/>
		<reference ref_id="958581" ref_url="https://bugzilla.suse.com/958581" source="BUGZILLA"/>
		<reference ref_id="958582" ref_url="https://bugzilla.suse.com/958582" source="BUGZILLA"/>
		<reference ref_id="958583" ref_url="https://bugzilla.suse.com/958583" source="BUGZILLA"/>
		<reference ref_id="958584" ref_url="https://bugzilla.suse.com/958584" source="BUGZILLA"/>
		<reference ref_id="958585" ref_url="https://bugzilla.suse.com/958585" source="BUGZILLA"/>
		<reference ref_id="958586" ref_url="https://bugzilla.suse.com/958586" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3223" ref_url="https://www.suse.com/security/cve/CVE-2015-3223/" source="CVE"/>
		<reference ref_id="CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252/" source="CVE"/>
		<reference ref_id="CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296/" source="CVE"/>
		<reference ref_id="CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<reference ref_id="CVE-2015-8467" ref_url="https://www.suse.com/security/cve/CVE-2015-8467/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" source="SUSE-SU"/>
		<description>

This update for ldb, samba, talloc, tdb, tevent fixes the following security issues: 

- ldb was updated to version 1.1.24.
  + Fix ldap \00 search expression attack dos; CVE-2015-3223; (bso#11325)
  + Fix remote read memory exploit in ldb; CVE-2015-5330; (bso#11599)
  + Move ldb_(un)pack_data into ldb_module.h for testing
  + Fix installation of _ldb_text.py
  + Fix propagation of ldb errors through tdb
  + Fix bug triggered by having an empty message in database during search

- Move the ldb-cmdline library to the ldb-tools package as the packaged
  binaries depend on it.

- Update the samba library distribution key file 'ldb.keyring'; (bso#945116).

Samba was updated to fix these issues:
- Malicious request can cause samba ldap server to hang, spinning using cpu;
  CVE-2015-3223; (bso#11325); (bsc#958581).
- Remote read memory exploit in ldb; cve-2015-5330; (bso#11599); (bsc#958586).
- Insufficient symlink verification (file access outside the share);
  CVE-2015-5252; (bso#11395); (bsc#958582).
- No man in the middle protection when forcing smb encryption on the client
  side; CVE-2015-5296; (bso#11536); (bsc#958584).
- Currently the snapshot browsing is not secure thru windows previous version
  (shadow_copy2); CVE-2015-5299; (bso#11529); (bsc#958583).
- Fix microsoft ms15-096 to prevent machine accounts from being changed into
  user accounts; CVE-2015-8467; (bso#11552); (bsc#958585).
- Changing log level of two entries to from 1 to 3; (bso#9912).
- Vfs_gpfs: re-enable share modes; (bso#11243).
- Wafsamba: also build libraries with relro protection; (bso#11346).
- Ctdb: strip trailing spaces from nodes file; (bso#11365).
- S3-smbd: fix old dos client doing wildcard delete - gives a attribute type
  of zero; (bso#11452).
- Nss_wins: do not run into use after free issues when we access memory
  allocated on the globals and the global being reinitialized; (bso#11563).
- Async_req: fix non-blocking connect(); (bso#11564).
- Auth: gensec: fix a memory leak; (bso#11565).
- Lib: util: make non-critical message a warning; (bso#11566).
- Fix winbindd crashes with samlogon for trusted domain user; (bso#11569);
  (bsc#949022).
- Smbd: send smb2 oplock breaks unencrypted; (bso#11570).
- Ctdb: open the ro tracking db with perms 0600 instead of 0000; (bso#11577).
- Manpage: correct small typo error; (bso#11584).
- S3: smbd: if ea's are turned off on a share don't allow an smb2 create
  containing them; (bso#11589).
- Backport some valgrind fixes from upstream master; (bso#11597).
- S3: smbd: have_file_open_below() fails to enumerate open files below an open
  directory handle; (bso#11615).
- Docs: fix some typos in the idmap config section of man 5 smb.conf;
  (bso#11619).
- Cleanup and enhance the pidl sub package.
- S3: smbd: fix our access-based enumeration on 'hide unreadable' to match
  Windows; (bso#10252).
- Smbd: fix file name buflen and padding in notify repsonse; (bso#10634).
- Kerberos: make sure we only use prompter type when available; (bso#11038).
- S3:ctdbd_conn: make sure we destroy tevent_fd before closing the socket;
  (bso#11316).
- Dcerpc.idl: accept invalid dcerpc_bind_nak pdus; (bso#11327).
- Fix a deadlock in tdb; (bso#11381).
- S3: smbd: fix mkdir race condition; (bso#11486).
- Pam_winbind: fix a segfault if initialization fails; (bso#11502).
- S3: dfs: fix a crash when the dfs targets are disabled; (bso#11509).
- S3: smbd: fix opening/creating :stream files on the root share directory;
  (bso#11522).
- Net: fix a crash with 'net ads keytab create'; (bso#11528).
- S3: smbd: fix a crash in unix_convert() and a null pointer bug introduced by
  previous 'raw' stream fix (bso#11522); (bso#11535).
- Vfs_fruit: return value of ad_pack in vfs_fruit.c; (bso#11543).
- Vfs_commit: set the fd on open before calling smb_vfs_fstat; (bso#11547).
- Fix bug in smbstatus where the lease info is not printed; (bso#11549).
- S3:smbstatus: add stream name to share_entry_forall(); (bso#11550).
- Prevent null pointer access in samlogon fallback when security
  credentials are null; (bsc#949022).
- Fix 100% cpu in winbindd when logging in with 'user must change password on
  next logon'; (bso#11038).

talloc was updated to version 2.1.5; (bsc#954658) (bsc#951660).
  + Test that talloc magic differs between processes.
  + Increment minor version due to added talloc_test_get_magic.
  + Provide tests access to talloc_magic.
  + Test magic protection measures.

tdb was updated to version 1.3.8; (bsc#954658).
  + First fix deadlock in the interaction between fcntl and mutex locking; (bso#11381)
  + Improved python3 bindings
  + Fix runtime detection for robust mutexes in the standalone build;
    (bso#11326).
  + Possible fix for the build with robust mutexes on solaris 11; (bso#11319).
  + Abi change: tdb_chainlock_read_nonblock() has been added, a nonblock
    variant of tdb_chainlock_read()
  + Do not build test binaries if it's not a standalone build
  + Fix cid 1034842 resource leak
  + Fix cid 1034841 resource leak
  + Don't let tdb_wrap_open() segfault with name==null
  + Toos: allow transactions with tdb_mutex_locking
  + Test: add tdb1-run-mutex-transaction1 test
  + Allow transactions on on tdb's with tdb_mutex_locking
  + Test: tdb_clear_if_first | tdb_mutex_locking, o_rdonly is a valid
    combination
  + Allow tdb_open_ex() with o_rdonly of tdb_feature_flag_mutex tdbs.
  + Fix a comment
  + Fix tdb_runtime_check_for_robust_mutexes()
  + Improve wording in a comment
  + Tdb.h needs bool type; obsoletes include_stdbool_bso10625.patch
  + Tdb_wrap: make mutexes easier to use
  + Tdb_wrap: only pull in samba-debug
  + Tdb_wrap: standalone compile without includes.h
  + Tdb_wrap: tdb_wrap.h doesn't need struct loadparm_context
- Update to version 1.3.1.
  + Tools: fix a compiler warning
  + Defragment the freelist in tdb_allocate_from_freelist()
  + Add 'freelist_size' sub-command to tdbtool
  + Use tdb_freelist_merge_adjacent in tdb_freelist_size()
  + Add tdb_freelist_merge_adjacent()
  + Add utility function check_merge_ptr_with_left_record()
  + Simplify tdb_free() using check_merge_with_left_record()
  + Add utility function check_merge_with_left_record()
  + Improve comments for tdb_free().
  + Factor merge_with_left_record() out of tdb_free()
  + Fix debug message in tdb_free()
  + Reduce indentation in tdb_free() for merging left
  + Increase readability of read_record_on_left()
  + Factor read_record_on_left() out of tdb_free()
  + Build: improve detection of srcdir.

tevent was updated to 0.9.26; (bsc#954658).
  + New tevent_thread_proxy api
  + Minor build fixes
  + Fix compile error in solaris ports backend.
  + Fix access after free in tevent_common_check_signal(); (bso#11308).
  + Improve pytevent bindings.
  + Testsuite fixes.
  + Improve the documentation of the tevent_add_fd() assumtions. it must be
    talloc_free'ed before closing the fd! (bso##11141); (bso#11316).
  + Ignore unexpected signal events in the same way the epoll backend does.
  + Update the tevent_data.dox tutrial stuff to fix some errors, including
    white space problems.
  + Use tevent_req_simple_recv_unix in a few places.
  + Remove unused exit_code in tevent_select.c
  + Remove unused exit_code in tevent_poll.c
  + Build: improve detection of srcdir
  + Lib: tevent: make tevent_sig_increment atomic.
  + Update flags in tevent pkgconfig file
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-18"/>
	<updated date="2015-12-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/295284">SUSE bug 295284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773464">SUSE bug 773464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/872912">SUSE bug 872912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901813">SUSE bug 901813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902421">SUSE bug 902421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910378">SUSE bug 910378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912457">SUSE bug 912457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913304">SUSE bug 913304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923374">SUSE bug 923374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931854">SUSE bug 931854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936909">SUSE bug 936909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939051">SUSE bug 939051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947552">SUSE bug 947552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949022">SUSE bug 949022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951660">SUSE bug 951660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953382">SUSE bug 953382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954658">SUSE bug 954658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958581">SUSE bug 958581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958582">SUSE bug 958582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958583">SUSE bug 958583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958584">SUSE bug 958584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958585">SUSE bug 958585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958586">SUSE bug 958586</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3223/">CVE-2015-3223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8467/">CVE-2015-8467</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515385" comment="libdcerpc-binding0-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515386" comment="libdcerpc-binding0-32bit-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515387" comment="libdcerpc0-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515388" comment="libdcerpc0-32bit-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515389" comment="libgensec0-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515390" comment="libgensec0-32bit-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515391" comment="libldb1-1.1.24-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515392" comment="libldb1-32bit-1.1.24-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515393" comment="libndr-krb5pac0-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515394" comment="libndr-krb5pac0-32bit-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515395" comment="libndr-nbt0-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515396" comment="libndr-nbt0-32bit-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515397" comment="libndr-standard0-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515398" comment="libndr-standard0-32bit-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515399" comment="libndr0-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515400" comment="libndr0-32bit-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515401" comment="libnetapi0-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515402" comment="libnetapi0-32bit-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515403" comment="libpdb0-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515404" comment="libpdb0-32bit-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515405" comment="libregistry0-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515406" comment="libsamba-credentials0-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515407" comment="libsamba-credentials0-32bit-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515408" comment="libsamba-hostconfig0-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515409" comment="libsamba-hostconfig0-32bit-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515410" comment="libsamba-util0-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515411" comment="libsamba-util0-32bit-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515412" comment="libsamdb0-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515413" comment="libsamdb0-32bit-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515414" comment="libsmbclient-raw0-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515415" comment="libsmbclient-raw0-32bit-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515416" comment="libsmbclient0-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515417" comment="libsmbclient0-32bit-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515418" comment="libsmbconf0-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515419" comment="libsmbconf0-32bit-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515420" comment="libsmbldap0-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515421" comment="libsmbldap0-32bit-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515422" comment="libtalloc2-2.1.5-3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515423" comment="libtalloc2-32bit-2.1.5-3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515424" comment="libtdb1-1.3.8-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515425" comment="libtdb1-32bit-1.3.8-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515426" comment="libtevent-util0-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515427" comment="libtevent-util0-32bit-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515428" comment="libtevent0-0.9.26-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515429" comment="libtevent0-32bit-0.9.26-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515430" comment="libwbclient0-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515431" comment="libwbclient0-32bit-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515432" comment="pytalloc-2.1.5-3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515433" comment="pytalloc-32bit-2.1.5-3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515434" comment="samba-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515435" comment="samba-32bit-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515436" comment="samba-client-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515437" comment="samba-client-32bit-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515438" comment="samba-doc-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515439" comment="samba-libs-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515440" comment="samba-libs-32bit-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515441" comment="samba-winbind-4.1.12-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515442" comment="samba-winbind-32bit-4.1.12-18.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77405" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="676471" ref_url="https://bugzilla.suse.com/676471" source="BUGZILLA"/>
		<reference ref_id="880007" ref_url="https://bugzilla.suse.com/880007" source="BUGZILLA"/>
		<reference ref_id="889207" ref_url="https://bugzilla.suse.com/889207" source="BUGZILLA"/>
		<reference ref_id="899908" ref_url="https://bugzilla.suse.com/899908" source="BUGZILLA"/>
		<reference ref_id="903279" ref_url="https://bugzilla.suse.com/903279" source="BUGZILLA"/>
		<reference ref_id="928547" ref_url="https://bugzilla.suse.com/928547" source="BUGZILLA"/>
		<reference ref_id="931448" ref_url="https://bugzilla.suse.com/931448" source="BUGZILLA"/>
		<reference ref_id="940413" ref_url="https://bugzilla.suse.com/940413" source="BUGZILLA"/>
		<reference ref_id="943989" ref_url="https://bugzilla.suse.com/943989" source="BUGZILLA"/>
		<reference ref_id="944309" ref_url="https://bugzilla.suse.com/944309" source="BUGZILLA"/>
		<reference ref_id="945345" ref_url="https://bugzilla.suse.com/945345" source="BUGZILLA"/>
		<reference ref_id="947337" ref_url="https://bugzilla.suse.com/947337" source="BUGZILLA"/>
		<reference ref_id="953233" ref_url="https://bugzilla.suse.com/953233" source="BUGZILLA"/>
		<reference ref_id="954847" ref_url="https://bugzilla.suse.com/954847" source="BUGZILLA"/>
		<reference ref_id="956491" ref_url="https://bugzilla.suse.com/956491" source="BUGZILLA"/>
		<reference ref_id="956852" ref_url="https://bugzilla.suse.com/956852" source="BUGZILLA"/>
		<reference ref_id="957805" ref_url="https://bugzilla.suse.com/957805" source="BUGZILLA"/>
		<reference ref_id="957986" ref_url="https://bugzilla.suse.com/957986" source="BUGZILLA"/>
		<reference ref_id="960857" ref_url="https://bugzilla.suse.com/960857" source="BUGZILLA"/>
		<reference ref_id="962336" ref_url="https://bugzilla.suse.com/962336" source="BUGZILLA"/>
		<reference ref_id="962846" ref_url="https://bugzilla.suse.com/962846" source="BUGZILLA"/>
		<reference ref_id="962872" ref_url="https://bugzilla.suse.com/962872" source="BUGZILLA"/>
		<reference ref_id="963193" ref_url="https://bugzilla.suse.com/963193" source="BUGZILLA"/>
		<reference ref_id="963572" ref_url="https://bugzilla.suse.com/963572" source="BUGZILLA"/>
		<reference ref_id="963762" ref_url="https://bugzilla.suse.com/963762" source="BUGZILLA"/>
		<reference ref_id="964461" ref_url="https://bugzilla.suse.com/964461" source="BUGZILLA"/>
		<reference ref_id="964727" ref_url="https://bugzilla.suse.com/964727" source="BUGZILLA"/>
		<reference ref_id="965319" ref_url="https://bugzilla.suse.com/965319" source="BUGZILLA"/>
		<reference ref_id="966054" ref_url="https://bugzilla.suse.com/966054" source="BUGZILLA"/>
		<reference ref_id="966245" ref_url="https://bugzilla.suse.com/966245" source="BUGZILLA"/>
		<reference ref_id="966573" ref_url="https://bugzilla.suse.com/966573" source="BUGZILLA"/>
		<reference ref_id="966831" ref_url="https://bugzilla.suse.com/966831" source="BUGZILLA"/>
		<reference ref_id="967251" ref_url="https://bugzilla.suse.com/967251" source="BUGZILLA"/>
		<reference ref_id="967292" ref_url="https://bugzilla.suse.com/967292" source="BUGZILLA"/>
		<reference ref_id="967299" ref_url="https://bugzilla.suse.com/967299" source="BUGZILLA"/>
		<reference ref_id="967903" ref_url="https://bugzilla.suse.com/967903" source="BUGZILLA"/>
		<reference ref_id="968010" ref_url="https://bugzilla.suse.com/968010" source="BUGZILLA"/>
		<reference ref_id="968141" ref_url="https://bugzilla.suse.com/968141" source="BUGZILLA"/>
		<reference ref_id="968448" ref_url="https://bugzilla.suse.com/968448" source="BUGZILLA"/>
		<reference ref_id="968512" ref_url="https://bugzilla.suse.com/968512" source="BUGZILLA"/>
		<reference ref_id="968667" ref_url="https://bugzilla.suse.com/968667" source="BUGZILLA"/>
		<reference ref_id="968670" ref_url="https://bugzilla.suse.com/968670" source="BUGZILLA"/>
		<reference ref_id="968687" ref_url="https://bugzilla.suse.com/968687" source="BUGZILLA"/>
		<reference ref_id="968812" ref_url="https://bugzilla.suse.com/968812" source="BUGZILLA"/>
		<reference ref_id="968813" ref_url="https://bugzilla.suse.com/968813" source="BUGZILLA"/>
		<reference ref_id="969439" ref_url="https://bugzilla.suse.com/969439" source="BUGZILLA"/>
		<reference ref_id="969571" ref_url="https://bugzilla.suse.com/969571" source="BUGZILLA"/>
		<reference ref_id="969655" ref_url="https://bugzilla.suse.com/969655" source="BUGZILLA"/>
		<reference ref_id="969690" ref_url="https://bugzilla.suse.com/969690" source="BUGZILLA"/>
		<reference ref_id="969735" ref_url="https://bugzilla.suse.com/969735" source="BUGZILLA"/>
		<reference ref_id="969992" ref_url="https://bugzilla.suse.com/969992" source="BUGZILLA"/>
		<reference ref_id="969993" ref_url="https://bugzilla.suse.com/969993" source="BUGZILLA"/>
		<reference ref_id="970062" ref_url="https://bugzilla.suse.com/970062" source="BUGZILLA"/>
		<reference ref_id="970114" ref_url="https://bugzilla.suse.com/970114" source="BUGZILLA"/>
		<reference ref_id="970504" ref_url="https://bugzilla.suse.com/970504" source="BUGZILLA"/>
		<reference ref_id="970506" ref_url="https://bugzilla.suse.com/970506" source="BUGZILLA"/>
		<reference ref_id="970604" ref_url="https://bugzilla.suse.com/970604" source="BUGZILLA"/>
		<reference ref_id="970892" ref_url="https://bugzilla.suse.com/970892" source="BUGZILLA"/>
		<reference ref_id="970909" ref_url="https://bugzilla.suse.com/970909" source="BUGZILLA"/>
		<reference ref_id="970911" ref_url="https://bugzilla.suse.com/970911" source="BUGZILLA"/>
		<reference ref_id="970948" ref_url="https://bugzilla.suse.com/970948" source="BUGZILLA"/>
		<reference ref_id="970955" ref_url="https://bugzilla.suse.com/970955" source="BUGZILLA"/>
		<reference ref_id="970956" ref_url="https://bugzilla.suse.com/970956" source="BUGZILLA"/>
		<reference ref_id="970958" ref_url="https://bugzilla.suse.com/970958" source="BUGZILLA"/>
		<reference ref_id="970970" ref_url="https://bugzilla.suse.com/970970" source="BUGZILLA"/>
		<reference ref_id="971049" ref_url="https://bugzilla.suse.com/971049" source="BUGZILLA"/>
		<reference ref_id="971124" ref_url="https://bugzilla.suse.com/971124" source="BUGZILLA"/>
		<reference ref_id="971125" ref_url="https://bugzilla.suse.com/971125" source="BUGZILLA"/>
		<reference ref_id="971126" ref_url="https://bugzilla.suse.com/971126" source="BUGZILLA"/>
		<reference ref_id="971159" ref_url="https://bugzilla.suse.com/971159" source="BUGZILLA"/>
		<reference ref_id="971170" ref_url="https://bugzilla.suse.com/971170" source="BUGZILLA"/>
		<reference ref_id="971360" ref_url="https://bugzilla.suse.com/971360" source="BUGZILLA"/>
		<reference ref_id="971600" ref_url="https://bugzilla.suse.com/971600" source="BUGZILLA"/>
		<reference ref_id="971628" ref_url="https://bugzilla.suse.com/971628" source="BUGZILLA"/>
		<reference ref_id="971947" ref_url="https://bugzilla.suse.com/971947" source="BUGZILLA"/>
		<reference ref_id="972003" ref_url="https://bugzilla.suse.com/972003" source="BUGZILLA"/>
		<reference ref_id="972174" ref_url="https://bugzilla.suse.com/972174" source="BUGZILLA"/>
		<reference ref_id="972844" ref_url="https://bugzilla.suse.com/972844" source="BUGZILLA"/>
		<reference ref_id="972891" ref_url="https://bugzilla.suse.com/972891" source="BUGZILLA"/>
		<reference ref_id="972933" ref_url="https://bugzilla.suse.com/972933" source="BUGZILLA"/>
		<reference ref_id="972951" ref_url="https://bugzilla.suse.com/972951" source="BUGZILLA"/>
		<reference ref_id="973378" ref_url="https://bugzilla.suse.com/973378" source="BUGZILLA"/>
		<reference ref_id="973556" ref_url="https://bugzilla.suse.com/973556" source="BUGZILLA"/>
		<reference ref_id="973570" ref_url="https://bugzilla.suse.com/973570" source="BUGZILLA"/>
		<reference ref_id="973855" ref_url="https://bugzilla.suse.com/973855" source="BUGZILLA"/>
		<reference ref_id="974165" ref_url="https://bugzilla.suse.com/974165" source="BUGZILLA"/>
		<reference ref_id="974308" ref_url="https://bugzilla.suse.com/974308" source="BUGZILLA"/>
		<reference ref_id="974406" ref_url="https://bugzilla.suse.com/974406" source="BUGZILLA"/>
		<reference ref_id="974418" ref_url="https://bugzilla.suse.com/974418" source="BUGZILLA"/>
		<reference ref_id="974646" ref_url="https://bugzilla.suse.com/974646" source="BUGZILLA"/>
		<reference ref_id="975371" ref_url="https://bugzilla.suse.com/975371" source="BUGZILLA"/>
		<reference ref_id="975488" ref_url="https://bugzilla.suse.com/975488" source="BUGZILLA"/>
		<reference ref_id="975533" ref_url="https://bugzilla.suse.com/975533" source="BUGZILLA"/>
		<reference ref_id="975945" ref_url="https://bugzilla.suse.com/975945" source="BUGZILLA"/>
		<reference ref_id="976739" ref_url="https://bugzilla.suse.com/976739" source="BUGZILLA"/>
		<reference ref_id="976868" ref_url="https://bugzilla.suse.com/976868" source="BUGZILLA"/>
		<reference ref_id="977582" ref_url="https://bugzilla.suse.com/977582" source="BUGZILLA"/>
		<reference ref_id="977685" ref_url="https://bugzilla.suse.com/977685" source="BUGZILLA"/>
		<reference ref_id="978401" ref_url="https://bugzilla.suse.com/978401" source="BUGZILLA"/>
		<reference ref_id="978822" ref_url="https://bugzilla.suse.com/978822" source="BUGZILLA"/>
		<reference ref_id="979169" ref_url="https://bugzilla.suse.com/979169" source="BUGZILLA"/>
		<reference ref_id="979213" ref_url="https://bugzilla.suse.com/979213" source="BUGZILLA"/>
		<reference ref_id="979419" ref_url="https://bugzilla.suse.com/979419" source="BUGZILLA"/>
		<reference ref_id="979485" ref_url="https://bugzilla.suse.com/979485" source="BUGZILLA"/>
		<reference ref_id="979548" ref_url="https://bugzilla.suse.com/979548" source="BUGZILLA"/>
		<reference ref_id="979867" ref_url="https://bugzilla.suse.com/979867" source="BUGZILLA"/>
		<reference ref_id="979879" ref_url="https://bugzilla.suse.com/979879" source="BUGZILLA"/>
		<reference ref_id="980348" ref_url="https://bugzilla.suse.com/980348" source="BUGZILLA"/>
		<reference ref_id="980371" ref_url="https://bugzilla.suse.com/980371" source="BUGZILLA"/>
		<reference ref_id="981143" ref_url="https://bugzilla.suse.com/981143" source="BUGZILLA"/>
		<reference ref_id="981344" ref_url="https://bugzilla.suse.com/981344" source="BUGZILLA"/>
		<reference ref_id="982354" ref_url="https://bugzilla.suse.com/982354" source="BUGZILLA"/>
		<reference ref_id="982698" ref_url="https://bugzilla.suse.com/982698" source="BUGZILLA"/>
		<reference ref_id="983213" ref_url="https://bugzilla.suse.com/983213" source="BUGZILLA"/>
		<reference ref_id="983318" ref_url="https://bugzilla.suse.com/983318" source="BUGZILLA"/>
		<reference ref_id="983394" ref_url="https://bugzilla.suse.com/983394" source="BUGZILLA"/>
		<reference ref_id="983904" ref_url="https://bugzilla.suse.com/983904" source="BUGZILLA"/>
		<reference ref_id="984456" ref_url="https://bugzilla.suse.com/984456" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9717" ref_url="https://www.suse.com/security/cve/CVE-2014-9717/" source="CVE"/>
		<reference ref_id="CVE-2015-8816" ref_url="https://www.suse.com/security/cve/CVE-2015-8816/" source="CVE"/>
		<reference ref_id="CVE-2015-8845" ref_url="https://www.suse.com/security/cve/CVE-2015-8845/" source="CVE"/>
		<reference ref_id="CVE-2016-0758" ref_url="https://www.suse.com/security/cve/CVE-2016-0758/" source="CVE"/>
		<reference ref_id="CVE-2016-2053" ref_url="https://www.suse.com/security/cve/CVE-2016-2053/" source="CVE"/>
		<reference ref_id="CVE-2016-2143" ref_url="https://www.suse.com/security/cve/CVE-2016-2143/" source="CVE"/>
		<reference ref_id="CVE-2016-2184" ref_url="https://www.suse.com/security/cve/CVE-2016-2184/" source="CVE"/>
		<reference ref_id="CVE-2016-2185" ref_url="https://www.suse.com/security/cve/CVE-2016-2185/" source="CVE"/>
		<reference ref_id="CVE-2016-2186" ref_url="https://www.suse.com/security/cve/CVE-2016-2186/" source="CVE"/>
		<reference ref_id="CVE-2016-2188" ref_url="https://www.suse.com/security/cve/CVE-2016-2188/" source="CVE"/>
		<reference ref_id="CVE-2016-2782" ref_url="https://www.suse.com/security/cve/CVE-2016-2782/" source="CVE"/>
		<reference ref_id="CVE-2016-2847" ref_url="https://www.suse.com/security/cve/CVE-2016-2847/" source="CVE"/>
		<reference ref_id="CVE-2016-3134" ref_url="https://www.suse.com/security/cve/CVE-2016-3134/" source="CVE"/>
		<reference ref_id="CVE-2016-3136" ref_url="https://www.suse.com/security/cve/CVE-2016-3136/" source="CVE"/>
		<reference ref_id="CVE-2016-3137" ref_url="https://www.suse.com/security/cve/CVE-2016-3137/" source="CVE"/>
		<reference ref_id="CVE-2016-3138" ref_url="https://www.suse.com/security/cve/CVE-2016-3138/" source="CVE"/>
		<reference ref_id="CVE-2016-3139" ref_url="https://www.suse.com/security/cve/CVE-2016-3139/" source="CVE"/>
		<reference ref_id="CVE-2016-3140" ref_url="https://www.suse.com/security/cve/CVE-2016-3140/" source="CVE"/>
		<reference ref_id="CVE-2016-3156" ref_url="https://www.suse.com/security/cve/CVE-2016-3156/" source="CVE"/>
		<reference ref_id="CVE-2016-3672" ref_url="https://www.suse.com/security/cve/CVE-2016-3672/" source="CVE"/>
		<reference ref_id="CVE-2016-3689" ref_url="https://www.suse.com/security/cve/CVE-2016-3689/" source="CVE"/>
		<reference ref_id="CVE-2016-3951" ref_url="https://www.suse.com/security/cve/CVE-2016-3951/" source="CVE"/>
		<reference ref_id="CVE-2016-4482" ref_url="https://www.suse.com/security/cve/CVE-2016-4482/" source="CVE"/>
		<reference ref_id="CVE-2016-4486" ref_url="https://www.suse.com/security/cve/CVE-2016-4486/" source="CVE"/>
		<reference ref_id="CVE-2016-4565" ref_url="https://www.suse.com/security/cve/CVE-2016-4565/" source="CVE"/>
		<reference ref_id="CVE-2016-4569" ref_url="https://www.suse.com/security/cve/CVE-2016-4569/" source="CVE"/>
		<reference ref_id="CVE-2016-4578" ref_url="https://www.suse.com/security/cve/CVE-2016-4578/" source="CVE"/>
		<reference ref_id="CVE-2016-4805" ref_url="https://www.suse.com/security/cve/CVE-2016-4805/" source="CVE"/>
		<reference ref_id="CVE-2016-5244" ref_url="https://www.suse.com/security/cve/CVE-2016-5244/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 kernel was updated to 3.12.60 to receive various security and bugfixes.

The following security bugs were fixed:
- CVE-2014-9717: fs/namespace.c in the Linux kernel processes MNT_DETACH umount2 system called without verifying that the MNT_LOCKED flag is unset, which allowed local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace (bnc#928547).
- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bnc#968010).
- CVE-2015-8845: The tm_reclaim_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms did not ensure that TM suspend mode exists before proceeding with a tm_reclaim call, which allowed local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application (bnc#975533).
- CVE-2016-0758: Fix ASN.1 indefinite length object parsing (bsc#979867).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).
- CVE-2016-2143: The fork implementation in the Linux kernel on s390 platforms mishandled the case of four page-table levels, which allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h. (bnc#970504)
- CVE-2016-2184: The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971125).
- CVE-2016-2185: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971124).
- CVE-2016-2186: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970958).
- CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956).
- CVE-2016-2782: The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint (bnc#968670).
- CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bnc#970948).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).
- CVE-2016-3136: The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors (bnc#970955).
- CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions (bnc#970970).
- CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor (bnc#970911).
- CVE-2016-3139: The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970909).
- CVE-2016-3140: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970892).
- CVE-2016-3156: The IPv4 implementation in the Linux kernel mishandled destruction of device objects, which allowed guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses (bnc#971360).
- CVE-2016-3672: The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel did not properly randomize the legacy base address, which made it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits (bnc#974308).
- CVE-2016-3689: The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface (bnc#971628).
- CVE-2016-3951: Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor (bnc#974418).
- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).
- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).
- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).
- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).
- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).
- CVE-2016-5244: Fixed an infoleak in rds_inc_info_copy (bsc#983213).

The following non-security bugs were fixed:
- ALSA: hrtimer: Handle start/stop more properly (bsc#973378).
- ALSA: timer: Call notifier in the same spinlock (bsc#973378).
- ALSA: timer: Protect the whole snd_timer_close() with open race (bsc#973378).
- ALSA: timer: Sync timer deletion at closing the system timer (bsc#973378).
- ALSA: timer: Use mod_timer() for rearming the system timer (bsc#973378).
- Btrfs-8394-qgroup-Account-data-space-in-more-proper-timin.patch: (bsc#963193).
- Btrfs: do not collect ordered extents when logging that inode exists (bsc#977685).
- Btrfs: do not use src fd for printk (bsc#980348).
- Btrfs: fix deadlock between direct IO reads and buffered writes (bsc#973855).
- Btrfs: fix empty symlink after creating symlink and fsync parent dir (bsc#977685).
- Btrfs: fix file loss on log replay after renaming a file and fsync (bsc#977685).
- Btrfs: fix file/data loss caused by fsync after rename and new inode (bsc#977685).
- Btrfs: fix for incorrect directory entries after fsync log replay (bsc#957805, bsc#977685).
- Btrfs: fix loading of orphan roots leading to BUG_ON (bsc#972844).
- Btrfs: fix race between fsync and lockless direct IO writes (bsc#977685).
- Btrfs: fix unreplayable log after snapshot delete + parent dir fsync (bsc#977685).
- Btrfs: handle non-fatal errors in btrfs_qgroup_inherit() (bsc#972951).
- Btrfs: qgroup: Fix dead judgement on qgroup_rescan_leaf() return value (bsc#969439).
- Btrfs: qgroup: Fix qgroup accounting when creating snapshot (bsc#972933).
- Btrfs: qgroup: return EINVAL if level of parent is not higher than child's (bsc#972951).
- Btrfs: teach backref walking about backrefs with underflowed offset values (bsc#975371).
- CacheFiles: Fix incorrect test for in-memory object collision (bsc#971049).
- CacheFiles: Handle object being killed before being set up (bsc#971049).
- Ceph: Remove racey watch/notify event infrastructure (bsc#964727)
- Driver: Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets (bsc#976739).
- FS-Cache: Add missing initialization of ret in cachefiles_write_page() (bsc#971049).
- FS-Cache: Count culled objects and objects rejected due to lack of space (bsc#971049).
- FS-Cache: Fix cancellation of in-progress operation (bsc#971049).
- FS-Cache: Handle a new operation submitted against a killed object (bsc#971049).
- FS-Cache: Move fscache_report_unexpected_submission() to make it more available (bsc#971049).
- FS-Cache: Out of line fscache_operation_init() (bsc#971049).
- FS-Cache: Permit fscache_cancel_op() to cancel in-progress operations too (bsc#971049).
- FS-Cache: Put an aborted initialised op so that it is accounted correctly (bsc#971049).
- FS-Cache: Reduce cookie ref count if submit fails (bsc#971049).
- FS-Cache: Synchronise object death state change vs operation submission (bsc#971049).
- FS-Cache: The operation cancellation method needs calling in more places (bsc#971049).
- FS-Cache: Timeout for releasepage() (bsc#971049).
- FS-Cache: When submitting an op, cancel it if the target object is dying (bsc#971049).
- FS-Cache: fscache_object_is_dead() has wrong logic, kill it (bsc#971049).
- Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)
- Fix kabi issue (bsc#971049).
- Fix kmalloc overflow in LPFC driver at large core count (bsc#969690).
- Fix problem with setting ACL on directories (bsc#967251).
- Input: i8042 - lower log level for 'no controller' message (bsc#945345).
- KVM: SVM: add rdmsr support for AMD event registers (bsc#968448).
- MM: increase safety margin provided by PF_LESS_THROTTLE (bsc#956491).
- NFSv4.1: do not use machine credentials for CLOSE when using 'sec=sys' (bsc#972003).
- PCI/AER: Fix aer_inject error codes (bsc#931448).
- PCI/AER: Log actual error causes in aer_inject (bsc#931448).
- PCI/AER: Log aer_inject error injections (bsc#931448).
- PCI/AER: Use dev_warn() in aer_inject (bsc#931448).
- Revert 'libata: Align ata_device's id on a cacheline'.
- Revert 'net/ipv6: add sysctl option accept_ra_min_hop_limit'.
- USB: quirk to stop runtime PM for Intel 7260 (bnc#984456).
- USB: usbip: fix potential out-of-bounds write (bnc#975945).
- USB: xhci: Add broken streams quirk for Frescologic device id 1009 (bnc#982698).
- Update patches.drivers/0001-nvme-fix-max_segments-integer-truncation.patch (bsc#979419). Fix reference.
- Update patches.drivers/drm-ast-Initialize-data-needed-to-map-fbdev-memory.patch (bnc#880007). Fix refs and upstream status.
- Update patches.kernel.org/patch-3.12.55-56 references (add bsc#973570).
- Update patches.suse/kgr-0102-add-TAINT_KGRAFT.patch (bsc#974406).
- acpi: Disable ACPI table override when UEFI Secure Boot is enabled (bsc#970604).
- acpi: Disable APEI error injection if securelevel is set (bsc#972891).
- cachefiles: perform test on s_blocksize when opening cache file (bsc#971049).
- cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857, bsc#974646).
- dmapi: fix dm_open_by_handle_rvp taking an extra ref to mnt (bsc#967292).
- drm/core: Preserve the framebuffer after removing it (bsc#968812).
- drm/mgag200: Add support for a new G200eW3 chipset (bsc#983904).
- drm/mgag200: Add support for a new rev of G200e (bsc#983904).
- drm/mgag200: Black screen fix for G200e rev 4 (bsc#983904).
- drm/mgag200: remove unused variables (bsc#983904).
- drm/radeon: fix-up some float to fixed conversion thinkos (bsc#968813).
- drm/radeon: use HDP_MEM_COHERENCY_FLUSH_CNTL for sdma as well (bsc#968813).
- drm: qxl: Workaround for buggy user-space (bsc#981344).
- efifb: Fix 16 color palette entry calculation (bsc#983318).
- ehci-pci: enable interrupt on BayTrail (bnc#947337).
- enic: set netdev-&gt;vlan_features (bsc#966245).
- ext4: fix races between page faults and hole punching (bsc#972174).
- ext4: fix races of writeback with punch hole and zero range (bsc#972174).
- fix: print ext4 mountopt data_err=abort correctly (bsc#969735).
- fs, seq_file: fallback to vmalloc instead of oom kill processes (bnc#968687).
- fs, seqfile: always allow oom killer (bnc#968687).
- fs/pipe.c: skip file_update_time on frozen fs (bsc#975488).
- hid-elo: kill not flush the work (bnc#982354).
- ibmvscsi: Remove unsupported host config MAD (bsc#973556).
- ipv6: make fib6 serial number per namespace (bsc#965319).
- ipv6: mld: fix add_grhead skb_over_panic for devs with large MTUs (bsc#956852).
- ipv6: per netns FIB garbage collection (bsc#965319).
- ipv6: per netns fib6 walkers (bsc#965319).
- ipv6: replace global gc_args with local variable (bsc#965319).
- ipvs: count pre-established TCP states as active (bsc#970114).
- kABI: kgr: fix subtle race with kgr_module_init(), going notifier and kgr_modify_kernel().
- kABI: protect enum enclosure_component_type.
- kABI: protect function file_open_root.
- kABI: protect include in evm.
- kABI: protect struct dm_exception_store_type.
- kABI: protect struct fib_nh_exception.
- kABI: protect struct module.
- kABI: protect struct rq.
- kABI: protect struct sched_class.
- kABI: protect struct scm_creds.
- kABI: protect struct user_struct.
- kABI: protect struct user_struct.
- kabi fix for patches.fixes/reduce-m_start-cost (bsc#966573).
- kabi/severities: Whitelist libceph and rbd (bsc#964727).
- kabi: kgr, add reserved fields
- kabi: protect struct fc_rport_priv (bsc#953233, bsc#962846).
- kabi: protect struct netns_ipv6 after FIB6 GC series (bsc#965319).
- kgr: add TAINT_KGRAFT
- kgr: add kgraft annotation to hwrng kthread.
- kgr: add kgraft annotations to kthreads' wait_event_freezable() API calls.
- kgr: add objname to kgr_patch_fun struct.
- kgr: add sympos and objname to error and debug messages.
- kgr: add sympos as disambiguator field to kgr_patch_fun structure.
- kgr: add sympos to sysfs.
- kgr: call kgr_init_ftrace_ops() only for loaded objects.
- kgr: change to kallsyms_on_each_symbol iterator.
- kgr: define pr_fmt and modify all pr_* messages.
- kgr: do not print error for !abort_if_missing symbols (bnc#943989).
- kgr: do not return and print an error only if the object is not loaded.
- kgr: do not use WQ_MEM_RECLAIM workqueue (bnc#963572).
- kgr: fix an asymmetric dealing with delayed module loading.
- kgr: fix redirection on s390x arch (bsc#903279).
- kgr: fix subtle race with kgr_module_init(), going notifier and kgr_modify_kernel().
- kgr: handle btrfs kthreads (bnc#889207).
- kgr: kmemleak, really mark the kthread safe after an interrupt.
- kgr: log when modifying kernel.
- kgr: mark some more missed kthreads (bnc#962336).
- kgr: remove abort_if_missing flag.
- kgr: usb/storage: do not emit thread awakened (bnc#899908).
- kgraft/gfs2: Do not block livepatching in the log daemon for too long.
- kgraft/xen: Do not block livepatching in the XEN blkif kthread.
- libfc: replace 'rp_mutex' with 'rp_lock' (bsc#953233, bsc#962846).
- memcg: do not hang on OOM when killed by userspace OOM access to memory reserves (bnc#969571).
- mld, igmp: Fix reserved tailroom calculation (bsc#956852).
- mmc: Allow forward compatibility for eMMC (bnc#966054).
- mmc: sdhci: Allow for irq being shared (bnc#977582).
- net/qlge: Avoids recursive EEH error (bsc#954847).
- net: Account for all vlan headers in skb_mac_gso_segment (bsc#968667).
- net: Start with correct mac_len in skb_network_protocol (bsc#968667).
- net: disable fragment reassembly if high_thresh is set to zero (bsc#970506).
- net: fix wrong mac_len calculation for vlans (bsc#968667).
- net: irda: Fix use-after-free in irtty_open() (bnc#967903).
- nfs4: treat lock owners as opaque values (bnc#968141).
- nfs: fix high load average due to callback thread sleeping (bsc#971170).
- nfsd: fix nfsd_setattr return code for HSM (bsc#969992).
- nvme: fix max_segments integer truncation (bsc#676471).
- ocfs2: do not set fs read-only if rec[0] is empty while committing truncate (bnc#971947).
- ocfs2: extend enough credits for freeing one truncate record while replaying truncate records (bnc#971947).
- ocfs2: extend transaction for ocfs2_remove_rightmost_path() and ocfs2_update_edge_lengths() before to avoid inconsistency between inode and et (bnc#971947).
- perf, nmi: Fix unknown NMI warning (bsc#968512).
- pipe: limit the per-user amount of pages allocated in pipes (bsc#970948).
- rbd: do not log miscompare as an error (bsc#970062).
- rbd: handle OBJ_REQUEST_SG types for copyup (bsc#983394).
- rbd: report unsupported features to syslog (bsc#979169).
- rbd: use GFP_NOIO consistently for request allocations (bsc#971159).
- reduce m_start() cost.. (bsc#966573).
- rpm/modprobe-xen.conf: Revert comment change to allow parallel install (bsc#957986). This reverts commit 6c6d86d3cdc26f7746fe4ba2bef8859b5aeb346c.
- s390/pageattr: do a single TLB flush for change_page_attr (bsc#940413).
- sched/x86: Fix up typo in topology detection (bsc#974165).
- scsi: proper state checking and module refcount handling in scsi_device_get (boo#966831).
- series.conf: move netfilter section at the end of core networking
- supported.conf: Add bridge.ko for OpenStack (bsc#971600)
- supported.conf: Add isofs to -base (bsc#969655).
- supported.conf:Add drivers/infiniband/hw/ocrdma/ocrdma.ko to supported.conf (bsc#964461)
- target/rbd: do not put snap_context twice (bsc#981143).
- target/rbd: remove caw_mutex usage (bsc#981143).
- target: Drop incorrect ABORT_TASK put for completed commands (bsc#962872).
- target: Fix LUN_RESET active I/O handling for ACK_KREF (bsc#962872).
- target: Fix LUN_RESET active TMR descriptor handling (bsc#962872).
- target: Fix TAS handling for multi-session se_node_acls (bsc#962872).
- target: Fix race with SCF_SEND_DELAYED_TAS handling (bsc#962872).
- target: Fix remote-port TMR ABORT + se_cmd fabric stop (bsc#962872).
- vgaarb: Add more context to error messages (bsc#976868).
- x86, sched: Add new topology for multi-NUMA-node CPUs (bsc#974165).
- x86/efi: parse_efi_setup() build fix (bsc#979485).
- x86: standardize mmap_rnd() usage (bnc#974308).
- xen/acpi: Disable ACPI table override when UEFI Secure Boot is enabled (bsc#970604).
- xfs/dmapi: drop lock over synchronous XFS_SEND_DATA events (bsc#969993).
- xfs/dmapi: propertly send postcreate event (bsc#967299).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-27"/>
	<updated date="2016-06-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/676471">SUSE bug 676471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880007">SUSE bug 880007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889207">SUSE bug 889207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899908">SUSE bug 899908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903279">SUSE bug 903279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928547">SUSE bug 928547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931448">SUSE bug 931448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940413">SUSE bug 940413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943989">SUSE bug 943989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944309">SUSE bug 944309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945345">SUSE bug 945345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947337">SUSE bug 947337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953233">SUSE bug 953233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954847">SUSE bug 954847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956491">SUSE bug 956491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956852">SUSE bug 956852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957805">SUSE bug 957805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957986">SUSE bug 957986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960857">SUSE bug 960857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962336">SUSE bug 962336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962846">SUSE bug 962846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962872">SUSE bug 962872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963193">SUSE bug 963193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963572">SUSE bug 963572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963762">SUSE bug 963762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964461">SUSE bug 964461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964727">SUSE bug 964727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965319">SUSE bug 965319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966054">SUSE bug 966054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966245">SUSE bug 966245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966573">SUSE bug 966573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966831">SUSE bug 966831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967251">SUSE bug 967251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967292">SUSE bug 967292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967299">SUSE bug 967299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967903">SUSE bug 967903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968010">SUSE bug 968010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968141">SUSE bug 968141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968448">SUSE bug 968448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968512">SUSE bug 968512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968667">SUSE bug 968667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968670">SUSE bug 968670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968687">SUSE bug 968687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968812">SUSE bug 968812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968813">SUSE bug 968813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969439">SUSE bug 969439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969571">SUSE bug 969571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969655">SUSE bug 969655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969690">SUSE bug 969690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969735">SUSE bug 969735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969992">SUSE bug 969992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969993">SUSE bug 969993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970062">SUSE bug 970062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970114">SUSE bug 970114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970504">SUSE bug 970504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970506">SUSE bug 970506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970604">SUSE bug 970604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970892">SUSE bug 970892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970909">SUSE bug 970909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970911">SUSE bug 970911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970948">SUSE bug 970948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970955">SUSE bug 970955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970956">SUSE bug 970956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970958">SUSE bug 970958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970970">SUSE bug 970970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971049">SUSE bug 971049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971124">SUSE bug 971124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971125">SUSE bug 971125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971126">SUSE bug 971126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971159">SUSE bug 971159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971170">SUSE bug 971170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971360">SUSE bug 971360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971600">SUSE bug 971600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971628">SUSE bug 971628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971947">SUSE bug 971947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972003">SUSE bug 972003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972174">SUSE bug 972174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972844">SUSE bug 972844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972891">SUSE bug 972891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972933">SUSE bug 972933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972951">SUSE bug 972951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973378">SUSE bug 973378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973556">SUSE bug 973556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973570">SUSE bug 973570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973855">SUSE bug 973855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974165">SUSE bug 974165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974308">SUSE bug 974308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974406">SUSE bug 974406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974418">SUSE bug 974418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974646">SUSE bug 974646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975371">SUSE bug 975371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975488">SUSE bug 975488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975533">SUSE bug 975533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975945">SUSE bug 975945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976739">SUSE bug 976739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976868">SUSE bug 976868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977582">SUSE bug 977582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977685">SUSE bug 977685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978401">SUSE bug 978401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978822">SUSE bug 978822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979169">SUSE bug 979169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979213">SUSE bug 979213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979419">SUSE bug 979419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979485">SUSE bug 979485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979548">SUSE bug 979548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979867">SUSE bug 979867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979879">SUSE bug 979879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980348">SUSE bug 980348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980371">SUSE bug 980371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981143">SUSE bug 981143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981344">SUSE bug 981344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982354">SUSE bug 982354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982698">SUSE bug 982698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983213">SUSE bug 983213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983318">SUSE bug 983318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983394">SUSE bug 983394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983904">SUSE bug 983904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984456">SUSE bug 984456</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9717/">CVE-2014-9717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8816/">CVE-2015-8816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8845/">CVE-2015-8845</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0758/">CVE-2016-0758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2053/">CVE-2016-2053</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2143/">CVE-2016-2143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2184/">CVE-2016-2184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2185/">CVE-2016-2185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2186/">CVE-2016-2186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2188/">CVE-2016-2188</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2782/">CVE-2016-2782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2847/">CVE-2016-2847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3134/">CVE-2016-3134</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3136/">CVE-2016-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3137/">CVE-2016-3137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3138/">CVE-2016-3138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3139/">CVE-2016-3139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3140/">CVE-2016-3140</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3156/">CVE-2016-3156</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3672/">CVE-2016-3672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3689/">CVE-2016-3689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3951/">CVE-2016-3951</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4482/">CVE-2016-4482</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4486/">CVE-2016-4486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4565/">CVE-2016-4565</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4569/">CVE-2016-4569</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4578/">CVE-2016-4578</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4805/">CVE-2016-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5244/">CVE-2016-5244</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515443" comment="kernel-default-3.12.60-52.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515444" comment="kernel-default-devel-3.12.60-52.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515445" comment="kernel-default-extra-3.12.60-52.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515446" comment="kernel-devel-3.12.60-52.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515447" comment="kernel-macros-3.12.60-52.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515448" comment="kernel-source-3.12.60-52.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515449" comment="kernel-syms-3.12.60-52.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515450" comment="kernel-xen-3.12.60-52.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515451" comment="kernel-xen-devel-3.12.60-52.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77406" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="969820" ref_url="https://bugzilla.suse.com/969820" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2774" ref_url="https://www.suse.com/security/cve/CVE-2016-2774/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002138.html" source="SUSE-SU"/>
		<description>

This update for dhcp fixes the following issues:

- CVE-2016-2774: Fixed a denial of service attack against the DHCP server over the OMAPI TCP socket, which could be used
  by network adjacent attackers to make the DHCP server non-functional (bsc#969820).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-27"/>
	<updated date="2016-06-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/969820">SUSE bug 969820</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2774/">CVE-2016-2774</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515452" comment="dhcp-4.2.6-14.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515453" comment="dhcp-client-4.2.6-14.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77407" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="982366" ref_url="https://bugzilla.suse.com/982366" source="BUGZILLA"/>
		<reference ref_id="983549" ref_url="https://bugzilla.suse.com/983549" source="BUGZILLA"/>
		<reference ref_id="983638" ref_url="https://bugzilla.suse.com/983638" source="BUGZILLA"/>
		<reference ref_id="983639" ref_url="https://bugzilla.suse.com/983639" source="BUGZILLA"/>
		<reference ref_id="983643" ref_url="https://bugzilla.suse.com/983643" source="BUGZILLA"/>
		<reference ref_id="983646" ref_url="https://bugzilla.suse.com/983646" source="BUGZILLA"/>
		<reference ref_id="983651" ref_url="https://bugzilla.suse.com/983651" source="BUGZILLA"/>
		<reference ref_id="983652" ref_url="https://bugzilla.suse.com/983652" source="BUGZILLA"/>
		<reference ref_id="983653" ref_url="https://bugzilla.suse.com/983653" source="BUGZILLA"/>
		<reference ref_id="983655" ref_url="https://bugzilla.suse.com/983655" source="BUGZILLA"/>
		<reference ref_id="984006" ref_url="https://bugzilla.suse.com/984006" source="BUGZILLA"/>
		<reference ref_id="984126" ref_url="https://bugzilla.suse.com/984126" source="BUGZILLA"/>
		<reference ref_id="985659" ref_url="https://bugzilla.suse.com/985659" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2815" ref_url="https://www.suse.com/security/cve/CVE-2016-2815/" source="CVE"/>
		<reference ref_id="CVE-2016-2818" ref_url="https://www.suse.com/security/cve/CVE-2016-2818/" source="CVE"/>
		<reference ref_id="CVE-2016-2819" ref_url="https://www.suse.com/security/cve/CVE-2016-2819/" source="CVE"/>
		<reference ref_id="CVE-2016-2821" ref_url="https://www.suse.com/security/cve/CVE-2016-2821/" source="CVE"/>
		<reference ref_id="CVE-2016-2822" ref_url="https://www.suse.com/security/cve/CVE-2016-2822/" source="CVE"/>
		<reference ref_id="CVE-2016-2824" ref_url="https://www.suse.com/security/cve/CVE-2016-2824/" source="CVE"/>
		<reference ref_id="CVE-2016-2828" ref_url="https://www.suse.com/security/cve/CVE-2016-2828/" source="CVE"/>
		<reference ref_id="CVE-2016-2831" ref_url="https://www.suse.com/security/cve/CVE-2016-2831/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1691-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html" source="SUSE-SU"/>
		<description>
MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nss and mozilla-nspr were updated to fix nine security issues.

MozillaFirefox was updated to version 45.2.0 ESR. mozilla-nss was updated to version 3.21.1.

These security issues were fixed:
- CVE-2016-2834: Memory safety bugs in NSS (MFSA 2016-61) (bsc#983639).
- CVE-2016-2824: Out-of-bounds write with WebGL shader (MFSA 2016-53) (bsc#983651).
- CVE-2016-2822: Addressbar spoofing though the SELECT element (MFSA 2016-52) (bsc#983652).
- CVE-2016-2821: Use-after-free deleting tables from a contenteditable document (MFSA 2016-51) (bsc#983653).
- CVE-2016-2819: Buffer overflow parsing HTML5 fragments (MFSA 2016-50) (bsc#983655).
- CVE-2016-2828: Use-after-free when textures are used in WebGL operations after recycle pool destruction (MFSA 2016-56) (bsc#983646).
- CVE-2016-2831: Entering fullscreen and persistent pointerlock without user permission (MFSA 2016-58) (bsc#983643).
- CVE-2016-2815, CVE-2016-2818: Miscellaneous memory safety hazards (MFSA 2016-49) (bsc#983638)
  
These non-security issues were fixed:
- bsc#982366: Unknown SSL protocol error in connections 
- Fix crashes on aarch64
  * Determine page size at runtime (bsc#984006)
  * Allow aarch64 to work in safe mode (bsc#985659)
- Fix crashes on mainframes

All extensions must now be signed by addons.mozilla.org. Please read README.SUSE for more details.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-27"/>
	<updated date="2016-06-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/982366">SUSE bug 982366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983638">SUSE bug 983638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983639">SUSE bug 983639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983643">SUSE bug 983643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983646">SUSE bug 983646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983651">SUSE bug 983651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983652">SUSE bug 983652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983653">SUSE bug 983653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983655">SUSE bug 983655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984006">SUSE bug 984006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984126">SUSE bug 984126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985659">SUSE bug 985659</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2815/">CVE-2016-2815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2818/">CVE-2016-2818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2819/">CVE-2016-2819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2821/">CVE-2016-2821</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2822/">CVE-2016-2822</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2824/">CVE-2016-2824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2828/">CVE-2016-2828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2831/">CVE-2016-2831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515454" comment="MozillaFirefox-45.2.0esr-75.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515455" comment="MozillaFirefox-branding-SLE-45.0-28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515456" comment="MozillaFirefox-translations-45.2.0esr-75.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515457" comment="libfreebl3-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515458" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515459" comment="libsoftokn3-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515460" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515461" comment="mozilla-nspr-4.12-15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515462" comment="mozilla-nspr-32bit-4.12-15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515463" comment="mozilla-nss-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515464" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515465" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515466" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515467" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515468" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515469" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77408" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="986362" ref_url="https://bugzilla.suse.com/986362" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4997" ref_url="https://www.suse.com/security/cve/CVE-2016-4997/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00061.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 GA kernel was updated to receive one critical security fix.

Security issue fixed:
- CVE-2016-4997: A buffer overflow in 32bit compat_setsockopt iptables handling could lead to a local privilege escalation. (bsc#986362)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-30"/>
	<updated date="2016-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/986362">SUSE bug 986362</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4997/">CVE-2016-4997</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515470" comment="kernel-default-3.12.60-52.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515471" comment="kernel-default-devel-3.12.60-52.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515472" comment="kernel-default-extra-3.12.60-52.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515473" comment="kernel-devel-3.12.60-52.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515474" comment="kernel-macros-3.12.60-52.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515475" comment="kernel-source-3.12.60-52.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515476" comment="kernel-syms-3.12.60-52.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515477" comment="kernel-xen-3.12.60-52.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515478" comment="kernel-xen-devel-3.12.60-52.54.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77409" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="968787" ref_url="https://bugzilla.suse.com/968787" source="BUGZILLA"/>
		<reference ref_id="969727" ref_url="https://bugzilla.suse.com/969727" source="BUGZILLA"/>
		<reference ref_id="973010" ref_url="https://bugzilla.suse.com/973010" source="BUGZILLA"/>
		<reference ref_id="973164" ref_url="https://bugzilla.suse.com/973164" source="BUGZILLA"/>
		<reference ref_id="975930" ref_url="https://bugzilla.suse.com/975930" source="BUGZILLA"/>
		<reference ref_id="980483" ref_url="https://bugzilla.suse.com/980483" source="BUGZILLA"/>
		<reference ref_id="980854" ref_url="https://bugzilla.suse.com/980854" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1234" ref_url="https://www.suse.com/security/cve/CVE-2016-1234/" source="CVE"/>
		<reference ref_id="CVE-2016-3075" ref_url="https://www.suse.com/security/cve/CVE-2016-3075/" source="CVE"/>
		<reference ref_id="CVE-2016-3706" ref_url="https://www.suse.com/security/cve/CVE-2016-3706/" source="CVE"/>
		<reference ref_id="CVE-2016-4429" ref_url="https://www.suse.com/security/cve/CVE-2016-4429/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002145.html" source="SUSE-SU"/>
		<description>

This update for glibc provides the following fixes:

- Increase DTV_SURPLUS limit. (bsc#968787)
- Do not copy d_name field of struct dirent. (CVE-2016-1234, bsc#969727)
- Fix memory leak in _nss_dns_gethostbyname4_r. (bsc#973010)
- Fix stack overflow in _nss_dns_getnetbyname_r. (CVE-2016-3075, bsc#973164)
- Fix malloc performance regression from SLE 11. (bsc#975930)
- Fix getaddrinfo stack overflow in hostent conversion. (CVE-2016-3706, bsc#980483)
- Do not use alloca in clntudp_call (CVE-2016-4429, bsc#980854)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-30"/>
	<updated date="2016-06-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/968787">SUSE bug 968787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969727">SUSE bug 969727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973010">SUSE bug 973010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973164">SUSE bug 973164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975930">SUSE bug 975930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980483">SUSE bug 980483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980854">SUSE bug 980854</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1234/">CVE-2016-1234</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3075/">CVE-2016-3075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3706/">CVE-2016-3706</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4429/">CVE-2016-4429</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515479" comment="glibc-2.19-22.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515480" comment="glibc-32bit-2.19-22.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515481" comment="glibc-devel-2.19-22.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515482" comment="glibc-devel-32bit-2.19-22.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515483" comment="glibc-i18ndata-2.19-22.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515484" comment="glibc-locale-2.19-22.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515485" comment="glibc-locale-32bit-2.19-22.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515486" comment="nscd-2.19-22.16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77410" version="1" class="patch">
	<metadata>
		<title>Security update for LibreOffice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="718113" ref_url="https://bugzilla.suse.com/718113" source="BUGZILLA"/>
		<reference ref_id="856729" ref_url="https://bugzilla.suse.com/856729" source="BUGZILLA"/>
		<reference ref_id="939998" ref_url="https://bugzilla.suse.com/939998" source="BUGZILLA"/>
		<reference ref_id="945443" ref_url="https://bugzilla.suse.com/945443" source="BUGZILLA"/>
		<reference ref_id="945445" ref_url="https://bugzilla.suse.com/945445" source="BUGZILLA"/>
		<reference ref_id="955832" ref_url="https://bugzilla.suse.com/955832" source="BUGZILLA"/>
		<reference ref_id="965294" ref_url="https://bugzilla.suse.com/965294" source="BUGZILLA"/>
		<reference ref_id="965296" ref_url="https://bugzilla.suse.com/965296" source="BUGZILLA"/>
		<reference ref_id="967014" ref_url="https://bugzilla.suse.com/967014" source="BUGZILLA"/>
		<reference ref_id="967015" ref_url="https://bugzilla.suse.com/967015" source="BUGZILLA"/>
		<reference ref_id="977784" ref_url="https://bugzilla.suse.com/977784" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0794" ref_url="https://www.suse.com/security/cve/CVE-2016-0794/" source="CVE"/>
		<reference ref_id="CVE-2016-0795" ref_url="https://www.suse.com/security/cve/CVE-2016-0795/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002146.html" source="SUSE-SU"/>
		<description>

LibreOffice was updated to version 5.1.3.2, bringing many new features and bug fixes.

Two security issues have been fixed:

- CVE-2016-0795: LibreOffice allowed remote attackers to cause a denial of service
  (memory corruption) or possibly have unspecified other impact via a crafted
  LwpTocSuperLayout record in a LotusWordPro (lwp) document.
- CVE-2016-0794: The lwp filter in LibreOffice allowed remote attackers to cause a
  denial of service (memory corruption) or possibly have unspecified other impact
  via a crafted LotusWordPro (lwp) document.

A comprehensive list of new features and improvements in this release is provided by
the Document Foundation at https://wiki.documentfoundation.org/ReleaseNotes/5.1 .
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-01"/>
	<updated date="2016-07-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/718113">SUSE bug 718113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856729">SUSE bug 856729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939998">SUSE bug 939998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945443">SUSE bug 945443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945445">SUSE bug 945445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955832">SUSE bug 955832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965294">SUSE bug 965294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965296">SUSE bug 965296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967014">SUSE bug 967014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967015">SUSE bug 967015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977784">SUSE bug 977784</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0794/">CVE-2016-0794</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0795/">CVE-2016-0795</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515487" comment="boost-license1_54_0-1.54.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515488" comment="hunspell-1.3.2-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515489" comment="hunspell-32bit-1.3.2-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515490" comment="hunspell-tools-1.3.2-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515491" comment="libOpenCOLLADA0-1_3335ac1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515492" comment="libboost_atomic1_54_0-1.54.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515493" comment="libboost_date_time1_54_0-1.54.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515494" comment="libboost_filesystem1_54_0-1.54.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515495" comment="libboost_iostreams1_54_0-1.54.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515496" comment="libboost_program_options1_54_0-1.54.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515497" comment="libboost_regex1_54_0-1.54.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515498" comment="libboost_signals1_54_0-1.54.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515499" comment="libboost_system1_54_0-1.54.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515500" comment="libboost_thread1_54_0-1.54.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515501" comment="libcmis-0_5-5-0.5.1-8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515502" comment="libetonyek-0_1-1-0.1.6-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515503" comment="libhyphen0-2.8.8-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515504" comment="libixion-0_11-0-0.11.0-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515505" comment="liborcus-0_11-0-0.11.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515506" comment="libreoffice-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515507" comment="libreoffice-base-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515508" comment="libreoffice-base-drivers-mysql-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515509" comment="libreoffice-base-drivers-postgresql-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515510" comment="libreoffice-calc-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515511" comment="libreoffice-calc-extensions-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515512" comment="libreoffice-draw-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515513" comment="libreoffice-filters-optional-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515514" comment="libreoffice-gnome-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515515" comment="libreoffice-icon-theme-galaxy-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515516" comment="libreoffice-icon-theme-tango-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515517" comment="libreoffice-impress-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515518" comment="libreoffice-l10n-af-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515519" comment="libreoffice-l10n-ar-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515520" comment="libreoffice-l10n-ca-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515521" comment="libreoffice-l10n-cs-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515522" comment="libreoffice-l10n-da-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515523" comment="libreoffice-l10n-de-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515524" comment="libreoffice-l10n-en-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515525" comment="libreoffice-l10n-es-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515526" comment="libreoffice-l10n-fi-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515527" comment="libreoffice-l10n-fr-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515528" comment="libreoffice-l10n-gu-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515529" comment="libreoffice-l10n-hi-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515530" comment="libreoffice-l10n-hu-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515531" comment="libreoffice-l10n-it-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515532" comment="libreoffice-l10n-ja-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515533" comment="libreoffice-l10n-ko-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515534" comment="libreoffice-l10n-nb-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515535" comment="libreoffice-l10n-nl-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515536" comment="libreoffice-l10n-nn-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515537" comment="libreoffice-l10n-pl-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515538" comment="libreoffice-l10n-pt-BR-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515539" comment="libreoffice-l10n-pt-PT-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515540" comment="libreoffice-l10n-ru-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515541" comment="libreoffice-l10n-sk-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515542" comment="libreoffice-l10n-sv-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515543" comment="libreoffice-l10n-xh-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515544" comment="libreoffice-l10n-zh-Hans-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515545" comment="libreoffice-l10n-zh-Hant-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515546" comment="libreoffice-l10n-zu-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515547" comment="libreoffice-mailmerge-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515548" comment="libreoffice-math-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515549" comment="libreoffice-officebean-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515550" comment="libreoffice-pyuno-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515551" comment="libreoffice-writer-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515552" comment="libreoffice-writer-extensions-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515553" comment="libvisio-0_1-1-0.1.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515554" comment="libwps-0_4-4-0.4.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515555" comment="myspell-af_NA-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515556" comment="myspell-af_ZA-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515557" comment="myspell-ar-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515558" comment="myspell-ar_AE-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515559" comment="myspell-ar_BH-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515560" comment="myspell-ar_DZ-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515561" comment="myspell-ar_EG-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515562" comment="myspell-ar_IQ-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515563" comment="myspell-ar_JO-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515564" comment="myspell-ar_KW-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515565" comment="myspell-ar_LB-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515566" comment="myspell-ar_LY-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515567" comment="myspell-ar_MA-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515568" comment="myspell-ar_OM-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515569" comment="myspell-ar_QA-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515570" comment="myspell-ar_SA-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515571" comment="myspell-ar_SD-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515572" comment="myspell-ar_SY-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515573" comment="myspell-ar_TN-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515574" comment="myspell-ar_YE-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515575" comment="myspell-be_BY-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515576" comment="myspell-bg_BG-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515577" comment="myspell-bn_BD-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515578" comment="myspell-bn_IN-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515579" comment="myspell-bs-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515580" comment="myspell-bs_BA-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515581" comment="myspell-ca-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515582" comment="myspell-ca_AD-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515583" comment="myspell-ca_ES-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515584" comment="myspell-ca_ES_valencia-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515585" comment="myspell-ca_FR-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515586" comment="myspell-ca_IT-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515587" comment="myspell-cs_CZ-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515588" comment="myspell-da_DK-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515589" comment="myspell-de-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515590" comment="myspell-de_AT-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515591" comment="myspell-de_CH-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515592" comment="myspell-de_DE-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515593" comment="myspell-dictionaries-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515594" comment="myspell-el_GR-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515595" comment="myspell-en-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515596" comment="myspell-en_AU-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515597" comment="myspell-en_BS-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515598" comment="myspell-en_BZ-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515599" comment="myspell-en_CA-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515600" comment="myspell-en_GB-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515601" comment="myspell-en_GH-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515602" comment="myspell-en_IE-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515603" comment="myspell-en_IN-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515604" comment="myspell-en_JM-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515605" comment="myspell-en_MW-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515606" comment="myspell-en_NA-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515607" comment="myspell-en_NZ-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515608" comment="myspell-en_PH-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515609" comment="myspell-en_TT-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515610" comment="myspell-en_US-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515611" comment="myspell-en_ZA-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515612" comment="myspell-en_ZW-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515613" comment="myspell-es-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515614" comment="myspell-es_AR-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515615" comment="myspell-es_BO-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515616" comment="myspell-es_CL-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515617" comment="myspell-es_CO-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515618" comment="myspell-es_CR-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515619" comment="myspell-es_CU-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515620" comment="myspell-es_DO-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515621" comment="myspell-es_EC-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515622" comment="myspell-es_ES-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515623" comment="myspell-es_GT-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515624" comment="myspell-es_HN-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515625" comment="myspell-es_MX-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515626" comment="myspell-es_NI-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515627" comment="myspell-es_PA-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515628" comment="myspell-es_PE-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515629" comment="myspell-es_PR-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515630" comment="myspell-es_PY-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515631" comment="myspell-es_SV-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515632" comment="myspell-es_UY-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515633" comment="myspell-es_VE-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515634" comment="myspell-et_EE-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515635" comment="myspell-fr_BE-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515636" comment="myspell-fr_CA-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515637" comment="myspell-fr_CH-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515638" comment="myspell-fr_FR-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515639" comment="myspell-fr_LU-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515640" comment="myspell-fr_MC-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515641" comment="myspell-gu_IN-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515642" comment="myspell-he_IL-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515643" comment="myspell-hi_IN-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515644" comment="myspell-hr_HR-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515645" comment="myspell-hu_HU-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515646" comment="myspell-it_IT-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515647" comment="myspell-lightproof-en-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515648" comment="myspell-lightproof-hu_HU-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515649" comment="myspell-lightproof-pt_BR-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515650" comment="myspell-lightproof-ru_RU-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515651" comment="myspell-lo_LA-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515652" comment="myspell-lt_LT-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515653" comment="myspell-lv_LV-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515654" comment="myspell-nb_NO-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515655" comment="myspell-nl_BE-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515656" comment="myspell-nl_NL-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515657" comment="myspell-nn_NO-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515658" comment="myspell-no-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515659" comment="myspell-pl_PL-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515660" comment="myspell-pt_AO-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515661" comment="myspell-pt_BR-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515662" comment="myspell-pt_PT-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515663" comment="myspell-ro-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515664" comment="myspell-ro_RO-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515665" comment="myspell-ru_RU-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515666" comment="myspell-sk_SK-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515667" comment="myspell-sl_SI-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515668" comment="myspell-sr-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515669" comment="myspell-sr_CS-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515670" comment="myspell-sr_Latn_CS-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515671" comment="myspell-sr_Latn_RS-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515672" comment="myspell-sr_RS-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515673" comment="myspell-sv_FI-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515674" comment="myspell-sv_SE-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515675" comment="myspell-te-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515676" comment="myspell-te_IN-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515677" comment="myspell-th_TH-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515678" comment="myspell-vi-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515679" comment="myspell-vi_VN-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515680" comment="myspell-zu_ZA-20160511-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77411" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="942690" ref_url="https://bugzilla.suse.com/942690" source="BUGZILLA"/>
		<reference ref_id="960341" ref_url="https://bugzilla.suse.com/960341" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001808.html" source="SUSE-SU"/>
		<description>

This update to tiff 4.0.6 fixes the following issues:

- CVE-2015-7554: Out-of-bounds write in the thumbnail and tiffcmp tools allowed attacker to cause a denial of service or have unspecified further impact (bsc#960341)
- bsc#942690: potential out-of-bound write in NeXTDecode() (#2508)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-18"/>
	<updated date="2016-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/942690">SUSE bug 942690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515681" comment="libtiff5-4.0.6-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515682" comment="libtiff5-32bit-4.0.6-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77412" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="758040" ref_url="https://bugzilla.suse.com/758040" source="BUGZILLA"/>
		<reference ref_id="902606" ref_url="https://bugzilla.suse.com/902606" source="BUGZILLA"/>
		<reference ref_id="924919" ref_url="https://bugzilla.suse.com/924919" source="BUGZILLA"/>
		<reference ref_id="935087" ref_url="https://bugzilla.suse.com/935087" source="BUGZILLA"/>
		<reference ref_id="937261" ref_url="https://bugzilla.suse.com/937261" source="BUGZILLA"/>
		<reference ref_id="943959" ref_url="https://bugzilla.suse.com/943959" source="BUGZILLA"/>
		<reference ref_id="945649" ref_url="https://bugzilla.suse.com/945649" source="BUGZILLA"/>
		<reference ref_id="949440" ref_url="https://bugzilla.suse.com/949440" source="BUGZILLA"/>
		<reference ref_id="951155" ref_url="https://bugzilla.suse.com/951155" source="BUGZILLA"/>
		<reference ref_id="951199" ref_url="https://bugzilla.suse.com/951199" source="BUGZILLA"/>
		<reference ref_id="951392" ref_url="https://bugzilla.suse.com/951392" source="BUGZILLA"/>
		<reference ref_id="951615" ref_url="https://bugzilla.suse.com/951615" source="BUGZILLA"/>
		<reference ref_id="951638" ref_url="https://bugzilla.suse.com/951638" source="BUGZILLA"/>
		<reference ref_id="952579" ref_url="https://bugzilla.suse.com/952579" source="BUGZILLA"/>
		<reference ref_id="952976" ref_url="https://bugzilla.suse.com/952976" source="BUGZILLA"/>
		<reference ref_id="956708" ref_url="https://bugzilla.suse.com/956708" source="BUGZILLA"/>
		<reference ref_id="956801" ref_url="https://bugzilla.suse.com/956801" source="BUGZILLA"/>
		<reference ref_id="956876" ref_url="https://bugzilla.suse.com/956876" source="BUGZILLA"/>
		<reference ref_id="957395" ref_url="https://bugzilla.suse.com/957395" source="BUGZILLA"/>
		<reference ref_id="957546" ref_url="https://bugzilla.suse.com/957546" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="957990" ref_url="https://bugzilla.suse.com/957990" source="BUGZILLA"/>
		<reference ref_id="958463" ref_url="https://bugzilla.suse.com/958463" source="BUGZILLA"/>
		<reference ref_id="958504" ref_url="https://bugzilla.suse.com/958504" source="BUGZILLA"/>
		<reference ref_id="958510" ref_url="https://bugzilla.suse.com/958510" source="BUGZILLA"/>
		<reference ref_id="958647" ref_url="https://bugzilla.suse.com/958647" source="BUGZILLA"/>
		<reference ref_id="958886" ref_url="https://bugzilla.suse.com/958886" source="BUGZILLA"/>
		<reference ref_id="958951" ref_url="https://bugzilla.suse.com/958951" source="BUGZILLA"/>
		<reference ref_id="959190" ref_url="https://bugzilla.suse.com/959190" source="BUGZILLA"/>
		<reference ref_id="959364" ref_url="https://bugzilla.suse.com/959364" source="BUGZILLA"/>
		<reference ref_id="959399" ref_url="https://bugzilla.suse.com/959399" source="BUGZILLA"/>
		<reference ref_id="959436" ref_url="https://bugzilla.suse.com/959436" source="BUGZILLA"/>
		<reference ref_id="959705" ref_url="https://bugzilla.suse.com/959705" source="BUGZILLA"/>
		<reference ref_id="960300" ref_url="https://bugzilla.suse.com/960300" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7550" ref_url="https://www.suse.com/security/cve/CVE-2015-7550/" source="CVE"/>
		<reference ref_id="CVE-2015-8539" ref_url="https://www.suse.com/security/cve/CVE-2015-8539/" source="CVE"/>
		<reference ref_id="CVE-2015-8543" ref_url="https://www.suse.com/security/cve/CVE-2015-8543/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8551" ref_url="https://www.suse.com/security/cve/CVE-2015-8551/" source="CVE"/>
		<reference ref_id="CVE-2015-8552" ref_url="https://www.suse.com/security/cve/CVE-2015-8552/" source="CVE"/>
		<reference ref_id="CVE-2015-8569" ref_url="https://www.suse.com/security/cve/CVE-2015-8569/" source="CVE"/>
		<reference ref_id="CVE-2015-8575" ref_url="https://www.suse.com/security/cve/CVE-2015-8575/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00018.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 kernel was updated to receive various security and bugfixes.

Following security bugs were fixed:
- CVE-2015-7550: A local user could have triggered a race between read and revoke in keyctl (bnc#958951).
- CVE-2015-8539: A negatively instantiated user key could have been used by a local user to leverage privileges (bnc#958463).
- CVE-2015-8543: The networking implementation in the Linux kernel did not validate protocol identifiers for certain protocol families, which allowed local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application (bnc#958886).
- CVE-2015-8550: Compiler optimizations in the XEN PV backend drivers could have lead to double fetch vulnerabilities, causing denial of service or arbitrary code execution (depending on the configuration) (bsc#957988).
- CVE-2015-8551, CVE-2015-8552: xen/pciback: For XEN_PCI_OP_disable_msi[|x] only disable if device has MSI(X) enabled (bsc#957990).
- CVE-2015-8569: The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel did not verify an address length, which allowed local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application (bnc#959190).
- CVE-2015-8575: Validate socket address length in sco_sock_bind() to prevent information leak (bsc#959399).

The following non-security bugs were fixed:
- ACPICA: Correctly cleanup after a ACPI table load failure (bnc#937261).
- ALSA: hda - Fix noise problems on Thinkpad T440s (boo#958504).
- Input: aiptek - fix crash on detecting device without endpoints (bnc#956708).
- Re-add copy_page_vector_to_user()
- Refresh patches.xen/xen3-patch-3.12.46-47 (bsc#959705).
- Refresh patches.xen/xen3-patch-3.9 (bsc#951155).
- Update patches.suse/btrfs-8361-Btrfs-keep-dropped-roots-in-cache-until-transaction-.patch (bnc#935087, bnc#945649, bnc#951615).
- bcache: Add btree_insert_node() (bnc#951638).
- bcache: Add explicit keylist arg to btree_insert() (bnc#951638).
- bcache: Clean up keylist code (bnc#951638).
- bcache: Convert btree_insert_check_key() to btree_insert_node() (bnc#951638).
- bcache: Convert bucket_wait to wait_queue_head_t (bnc#951638).
- bcache: Convert try_wait to wait_queue_head_t (bnc#951638).
- bcache: Explicitly track btree node's parent (bnc#951638).
- bcache: Fix a bug when detaching (bsc#951638).
- bcache: Fix a lockdep splat in an error path (bnc#951638).
- bcache: Fix a shutdown bug (bsc#951638).
- bcache: Fix more early shutdown bugs (bsc#951638).
- bcache: Fix sysfs splat on shutdown with flash only devs (bsc#951638).
- bcache: Insert multiple keys at a time (bnc#951638).
- bcache: Refactor journalling flow control (bnc#951638).
- bcache: Refactor request_write() (bnc#951638).
- bcache: Use blkdev_issue_discard() (bnc#951638).
- bcache: backing device set to clean after finishing detach (bsc#951638).
- bcache: kill closure locking usage (bnc#951638).
- blktap: also call blkif_disconnect() when frontend switched to closed (bsc#952976).
- blktap: refine mm tracking (bsc#952976).
- block: Always check queue limits for cloned requests (bsc#902606).
- btrfs: Add qgroup tracing (bnc#935087, bnc#945649).
- btrfs: Adjust commit-transaction condition to avoid NO_SPACE more (bsc#958647).
- btrfs: Fix out-of-space bug (bsc#958647).
- btrfs: Fix tail space processing in find_free_dev_extent() (bsc#958647).
- btrfs: Set relative data on clear btrfs_block_group_cache-&gt;pinned (bsc#958647).
- btrfs: Update btrfs qgroup status item when rescan is done (bnc#960300).
- btrfs: backref: Add special time_seq == (u64)-1 case for btrfs_find_all_roots() (bnc#935087, bnc#945649).
- btrfs: backref: Do not merge refs which are not for same block (bnc#935087, bnc#945649).
- btrfs: cleanup: remove no-used alloc_chunk in btrfs_check_data_free_space() (bsc#958647).
- btrfs: delayed-ref: Cleanup the unneeded functions (bnc#935087, bnc#945649).
- btrfs: delayed-ref: Use list to replace the ref_root in ref_head (bnc#935087, bnc#945649).
- btrfs: extent-tree: Use ref_node to replace unneeded parameters in __inc_extent_ref() and __free_extent() (bnc#935087, bnc#945649).
- btrfs: fix comp_oper to get right order (bnc#935087, bnc#945649).
- btrfs: fix condition of commit transaction (bsc#958647).
- btrfs: fix leak in qgroup_subtree_accounting() error path (bnc#935087, bnc#945649).
- btrfs: fix order by which delayed references are run (bnc#949440).
- btrfs: fix qgroup sanity tests (bnc#951615).
- btrfs: fix race waiting for qgroup rescan worker (bnc#960300).
- btrfs: fix regression running delayed references when using qgroups (bnc#951615).
- btrfs: fix regression when running delayed references (bnc#951615).
- btrfs: fix sleeping inside atomic context in qgroup rescan worker (bnc#960300).
- btrfs: fix the number of transaction units needed to remove a block group (bsc#958647).
- btrfs: keep dropped roots in cache until transaction commit (bnc#935087, bnc#945649).
- btrfs: qgroup: Add function qgroup_update_counters() (bnc#935087, bnc#945649).
- btrfs: qgroup: Add function qgroup_update_refcnt() (bnc#935087, bnc#945649).
- btrfs: qgroup: Add new function to record old_roots (bnc#935087, bnc#945649).
- btrfs: qgroup: Add new qgroup calculation function btrfs_qgroup_account_extents() (bnc#935087, bnc#945649).
- btrfs: qgroup: Add the ability to skip given qgroup for old/new_roots (bnc#935087, bnc#945649).
- btrfs: qgroup: Cleanup open-coded old/new_refcnt update and read (bnc#935087, bnc#945649).
- btrfs: qgroup: Cleanup the old ref_node-oriented mechanism (bnc#935087, bnc#945649).
- btrfs: qgroup: Do not copy extent buffer to do qgroup rescan (bnc#960300).
- btrfs: qgroup: Fix a regression in qgroup reserved space (bnc#935087, bnc#945649).
- btrfs: qgroup: Make snapshot accounting work with new extent-oriented qgroup (bnc#935087, bnc#945649).
- btrfs: qgroup: Record possible quota-related extent for qgroup (bnc#935087, bnc#945649).
- btrfs: qgroup: Switch rescan to new mechanism (bnc#935087, bnc#945649).
- btrfs: qgroup: Switch self test to extent-oriented qgroup mechanism (bnc#935087, bnc#945649).
- btrfs: qgroup: Switch to new extent-oriented qgroup mechanism (bnc#935087, bnc#945649).
- btrfs: qgroup: account shared subtree during snapshot delete (bnc#935087, bnc#945649).
- btrfs: qgroup: clear STATUS_FLAG_ON in disabling quota (bnc#960300).
- btrfs: qgroup: exit the rescan worker during umount (bnc#960300).
- btrfs: qgroup: fix quota disable during rescan (bnc#960300).
- btrfs: qgroup: move WARN_ON() to the correct location (bnc#935087, bnc#945649).
- btrfs: remove transaction from send (bnc#935087, bnc#945649).
- btrfs: ulist: Add ulist_del() function (bnc#935087, bnc#945649).
- btrfs: use btrfs_get_fs_root in resolve_indirect_ref (bnc#935087, bnc#945649).
- btrfs: use global reserve when deleting unused block group after ENOSPC (bsc#958647).
- cache: Fix sysfs splat on shutdown with flash only devs (bsc#951638).
- cpusets, isolcpus: exclude isolcpus from load balancing in cpusets (bsc#957395).
- drm/i915: Fix SRC_COPY width on 830/845g (bsc#758040).
- drm: Allocate new master object when client becomes master (bsc#956876, bsc#956801).
- drm: Fix KABI of 'struct drm_file' (bsc#956876, bsc#956801).
- e1000e: Do not read ICR in Other interrupt (bsc#924919).
- e1000e: Do not write lsc to ics in msi-x mode (bsc#924919).
- e1000e: Fix msi-x interrupt automask (bsc#924919).
- e1000e: Remove unreachable code (bsc#924919).
- genksyms: Handle string literals with spaces in reference files (bsc#958510).
- ipv6: fix tunnel error handling (bsc#952579).
- lpfc: Fix null ndlp dereference in target_reset_handler (bsc#951392).
- mm/mempolicy.c: convert the shared_policy lock to a rwlock (bnc#959436).
- mm: remove PG_waiters from PAGE_FLAGS_CHECK_AT_FREE (bnc#943959).
- pm, hinernate: use put_page in release_swap_writer (bnc#943959).
- sched, isolcpu: make cpu_isolated_map visible outside scheduler (bsc#957395).
- udp: properly support MSG_PEEK with truncated buffers (bsc#951199 bsc#959364).
- xhci: Workaround to get Intel xHCI reset working more reliably (bnc#957546).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-19"/>
	<updated date="2016-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/758040">SUSE bug 758040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902606">SUSE bug 902606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924919">SUSE bug 924919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935087">SUSE bug 935087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937261">SUSE bug 937261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943959">SUSE bug 943959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945649">SUSE bug 945649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949440">SUSE bug 949440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951155">SUSE bug 951155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951199">SUSE bug 951199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951392">SUSE bug 951392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951615">SUSE bug 951615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951638">SUSE bug 951638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952579">SUSE bug 952579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952976">SUSE bug 952976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956708">SUSE bug 956708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956801">SUSE bug 956801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956876">SUSE bug 956876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957395">SUSE bug 957395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957546">SUSE bug 957546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957990">SUSE bug 957990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958463">SUSE bug 958463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958504">SUSE bug 958504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958510">SUSE bug 958510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958647">SUSE bug 958647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958886">SUSE bug 958886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958951">SUSE bug 958951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959190">SUSE bug 959190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959364">SUSE bug 959364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959399">SUSE bug 959399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959436">SUSE bug 959436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959705">SUSE bug 959705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960300">SUSE bug 960300</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7550/">CVE-2015-7550</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8539/">CVE-2015-8539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8543/">CVE-2015-8543</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8551/">CVE-2015-8551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8552/">CVE-2015-8552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8569/">CVE-2015-8569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8575/">CVE-2015-8575</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515683" comment="kernel-default-3.12.51-52.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515684" comment="kernel-default-devel-3.12.51-52.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515685" comment="kernel-default-extra-3.12.51-52.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515686" comment="kernel-devel-3.12.51-52.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515687" comment="kernel-macros-3.12.51-52.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515688" comment="kernel-source-3.12.51-52.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515689" comment="kernel-syms-3.12.51-52.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515690" comment="kernel-xen-3.12.51-52.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515691" comment="kernel-xen-devel-3.12.51-52.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77413" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="947164" ref_url="https://bugzilla.suse.com/947164" source="BUGZILLA"/>
		<reference ref_id="953187" ref_url="https://bugzilla.suse.com/953187" source="BUGZILLA"/>
		<reference ref_id="956829" ref_url="https://bugzilla.suse.com/956829" source="BUGZILLA"/>
		<reference ref_id="957162" ref_url="https://bugzilla.suse.com/957162" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001778.html" source="SUSE-SU"/>
		<description>


This update fixes the following security issues:

- Enforce receive packet size, thus eliminating buffer overflow and
  potential security issue. (bsc#957162 CVE-2015-7512)
- Infinite loop in processing command block list. CVE-2015-8345 (bsc#956829):

Also a non-security bug fixed:
- Fix cases of wrong clock values in kvmclock timekeeping (bsc#947164 and bsc#953187)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-05"/>
	<updated date="2016-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/947164">SUSE bug 947164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953187">SUSE bug 953187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956829">SUSE bug 956829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957162">SUSE bug 957162</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515692" comment="qemu-2.0.2-48.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515693" comment="qemu-block-curl-2.0.2-48.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515694" comment="qemu-ipxe-1.0.0-48.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515695" comment="qemu-kvm-2.0.2-48.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515696" comment="qemu-seabios-1.7.4-48.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515697" comment="qemu-sgabios-8-48.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515698" comment="qemu-tools-2.0.2-48.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515699" comment="qemu-vgabios-1.7.4-48.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515700" comment="qemu-x86-2.0.2-48.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77414" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="898513" ref_url="https://bugzilla.suse.com/898513" source="BUGZILLA"/>
		<reference ref_id="900914" ref_url="https://bugzilla.suse.com/900914" source="BUGZILLA"/>
		<reference ref_id="915410" ref_url="https://bugzilla.suse.com/915410" source="BUGZILLA"/>
		<reference ref_id="922710" ref_url="https://bugzilla.suse.com/922710" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8242" ref_url="https://www.suse.com/security/cve/CVE-2014-8242/" source="CVE"/>
		<reference ref_id="CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001811.html" source="SUSE-SU"/>
		<description>

This update for rsync fixes two security issues and two non-security bugs.

The following vulnerabilities were fixed:

- CVE-2014-8242: Checksum collisions leading to a denial of service (bsc#900914)
- CVE-2014-9512: Malicious servers could send files outside of the transferred directory (bsc#915410)

The following non-security bugs were fixed:

- bsc#922710: Prevent rsyncd from spamming the log when trying to register SLP.
- bsc#898513: slp support broke rsync usage.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-19"/>
	<updated date="2016-01-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/898513">SUSE bug 898513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900914">SUSE bug 900914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915410">SUSE bug 915410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922710">SUSE bug 922710</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8242/">CVE-2014-8242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515701" comment="rsync-3.1.0-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77415" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="960674" ref_url="https://bugzilla.suse.com/960674" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8710" ref_url="https://www.suse.com/security/cve/CVE-2015-8710/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001814.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following security issue:

- CVE-2015-8710: Parsing short unclosed HTML comment could cause uninitialized memory access, which allowed remote attackers to read contents from previous HTTP requests depending on the application (bsc#960674)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-20"/>
	<updated date="2016-01-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960674">SUSE bug 960674</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8710/">CVE-2015-8710</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515702" comment="libxml2-2-2.9.1-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515703" comment="libxml2-2-32bit-2.9.1-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515704" comment="libxml2-tools-2.9.1-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515705" comment="python-libxml2-2.9.1-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77416" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="962189" ref_url="https://bugzilla.suse.com/962189" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8704" ref_url="https://www.suse.com/security/cve/CVE-2015-8704/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00020.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- CVE-2015-8704: Specific APL data allowed remote attacker to trigger a crash in certain configurations (bsc#962189)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-20"/>
	<updated date="2016-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/962189">SUSE bug 962189</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8704/">CVE-2015-8704</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515706" comment="bind-libs-9.9.6P1-28.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515707" comment="bind-libs-32bit-9.9.6P1-28.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515708" comment="bind-utils-9.9.6P1-28.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77417" version="1" class="patch">
	<metadata>
		<title>Security update for giflib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="949160" ref_url="https://bugzilla.suse.com/949160" source="BUGZILLA"/>
		<reference ref_id="960319" ref_url="https://bugzilla.suse.com/960319" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7555" ref_url="https://www.suse.com/security/cve/CVE-2015-7555/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001821.html" source="SUSE-SU"/>
		<description>

This update for giflib fixes the following issues:

- CVE-2015-7555: Heap overflow in giffix (bsc#960319)
- bsc#949160: Fix a memory leak
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-22"/>
	<updated date="2016-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/949160">SUSE bug 949160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960319">SUSE bug 960319</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7555/">CVE-2015-7555</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515709" comment="libgif6-5.0.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515710" comment="libgif6-32bit-5.0.5-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77418" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="962075" ref_url="https://bugzilla.suse.com/962075" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0728" ref_url="https://www.suse.com/security/cve/CVE-2016-0728/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00026.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 kernel was updated to receive a security fix.

Following security bug was fixed:
- A reference leak in keyring handling with join_session_keyring() could lead
  to local attackers gain root privileges. (bsc#962075, CVE-2016-0728).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-22"/>
	<updated date="2016-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/962075">SUSE bug 962075</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0728/">CVE-2016-0728</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515711" comment="kernel-default-3.12.51-52.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515712" comment="kernel-default-devel-3.12.51-52.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515713" comment="kernel-default-extra-3.12.51-52.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515714" comment="kernel-devel-3.12.51-52.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515715" comment="kernel-macros-3.12.51-52.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515716" comment="kernel-source-3.12.51-52.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515717" comment="kernel-syms-3.12.51-52.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515718" comment="kernel-xen-3.12.51-52.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515719" comment="kernel-xen-devel-3.12.51-52.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77419" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="937766" ref_url="https://bugzilla.suse.com/937766" source="BUGZILLA"/>
		<reference ref_id="945582" ref_url="https://bugzilla.suse.com/945582" source="BUGZILLA"/>
		<reference ref_id="955210" ref_url="https://bugzilla.suse.com/955210" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0224-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html" source="SUSE-SU"/>
		<description>
This update fixes the following security issues:

- CVE-2015-6908: The ber_get_next function allowed remote attackers to cause a denial
  of service (reachable assertion and application crash) via crafted BER data, as
  demonstrated by an attack against slapd. (bsc#945582)
- CVE-2015-4000: Fix weak Diffie-Hellman size vulnerability. (bsc#937766)

It also fixes the following non-security bugs:

- bsc#955210: Unresponsive LDAP host lookups in IPv6 environment

This update adds the following functionality:

- fate#319300: SHA2 password hashing module that can be loaded on-demand. 
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-25"/>
	<updated date="2016-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/937766">SUSE bug 937766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945582">SUSE bug 945582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955210">SUSE bug 955210</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515720" comment="libldap-2_4-2-2.4.41-18.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515721" comment="libldap-2_4-2-32bit-2.4.41-18.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515722" comment="openldap2-client-2.4.41-18.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77420" version="1" class="patch">
	<metadata>
		<title>Security update for gdk-pixbuf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="958963" ref_url="https://bugzilla.suse.com/958963" source="BUGZILLA"/>
		<reference ref_id="960155" ref_url="https://bugzilla.suse.com/960155" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7552" ref_url="https://www.suse.com/security/cve/CVE-2015-7552/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001824.html" source="SUSE-SU"/>
		<description>

This update for gdk-pixbuf fixes the following security issues:

- CVE-2015-7552: various overflows, including heap overflow in flipping bmp files (bsc#958963)

The following non-security issue was fixed:

- bsc#960155: fix a possible divide by zero
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-25"/>
	<updated date="2016-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958963">SUSE bug 958963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960155">SUSE bug 960155</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7552/">CVE-2015-7552</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515723" comment="gdk-pixbuf-lang-2.30.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515724" comment="gdk-pixbuf-query-loaders-2.30.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515725" comment="gdk-pixbuf-query-loaders-32bit-2.30.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515726" comment="libgdk_pixbuf-2_0-0-2.30.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515727" comment="libgdk_pixbuf-2_0-0-32bit-2.30.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515728" comment="typelib-1_0-GdkPixbuf-2_0-2.30.6-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77421" version="1" class="patch">
	<metadata>
		<title>Security update for ecryptfs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="920160" ref_url="https://bugzilla.suse.com/920160" source="BUGZILLA"/>
		<reference ref_id="962052" ref_url="https://bugzilla.suse.com/962052" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9687" ref_url="https://www.suse.com/security/cve/CVE-2014-9687/" source="CVE"/>
		<reference ref_id="CVE-2016-1572" ref_url="https://www.suse.com/security/cve/CVE-2016-1572/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001827.html" source="SUSE-SU"/>
		<description>

This update for ecryptfs-utils fixes the following issues:

- CVE-2016-1572: A local user could have escalated privileges by mounting over special filesystems (bsc#962052)
- CVE-2014-9687: A default salt value reduced complexity of offline precomputation attacks (bsc#920160)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-25"/>
	<updated date="2016-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/920160">SUSE bug 920160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962052">SUSE bug 962052</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9687/">CVE-2014-9687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1572/">CVE-2016-1572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515729" comment="ecryptfs-utils-103-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515730" comment="ecryptfs-utils-32bit-103-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77422" version="1" class="patch">
	<metadata>
		<title>Security update for libpng16 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="954980" ref_url="https://bugzilla.suse.com/954980" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001779.html" source="SUSE-SU"/>
		<description>

  This update fixes the following security issue:

  * CVE-2015-8126 Multiple buffer overflows in the png_set_PLTE and png_get_PLTE functions
    allow remote attackers to cause a denial of service (application crash) or possibly have 
    unspecified other impact [bsc#954980]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-05"/>
	<updated date="2016-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515731" comment="libpng16-16-1.6.8-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515732" comment="libpng16-16-32bit-1.6.8-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77423" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="939523" ref_url="https://bugzilla.suse.com/939523" source="BUGZILLA"/>
		<reference ref_id="960996" ref_url="https://bugzilla.suse.com/960996" source="BUGZILLA"/>
		<reference ref_id="962743" ref_url="https://bugzilla.suse.com/962743" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" source="SUSE-SU"/>
		<description>
java-1_7_0-openjdk was updated to version 7u95 to fix 9 security issues. (bsc#962743)

- CVE-2015-4871: Rebinding of the receiver of a DirectMethodHandle may allow a protected method to be accessed
- CVE-2015-7575: Further reduce use of MD5 (SLOTH) (bsc#960996)
- CVE-2015-8126: Vulnerability in the AWT component related to splashscreen displays
- CVE-2015-8472: Vulnerability in the AWT component, addressed by same fix
- CVE-2016-0402: Vulnerability in the Networking component related to URL processing
- CVE-2016-0448: Vulnerability in the JMX comonent related to attribute processing
- CVE-2016-0466: Vulnerability in the JAXP component, related to limits
- CVE-2016-0483: Vulnerability in the AWT component related to image decoding
- CVE-2016-0494: Vulnerability in 2D component related to font actions

The following bugs were fixed:

- bsc#939523: java-1_7_0-openjdk-headless had X dependencies, move libjavagtk to full package
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-27"/>
	<updated date="2016-01-27"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/939523">SUSE bug 939523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960996">SUSE bug 960996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515733" comment="java-1_7_0-openjdk-1.7.0.95-24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515734" comment="java-1_7_0-openjdk-headless-1.7.0.95-24.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77424" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="899334" ref_url="https://bugzilla.suse.com/899334" source="BUGZILLA"/>
		<reference ref_id="903757" ref_url="https://bugzilla.suse.com/903757" source="BUGZILLA"/>
		<reference ref_id="904432" ref_url="https://bugzilla.suse.com/904432" source="BUGZILLA"/>
		<reference ref_id="911737" ref_url="https://bugzilla.suse.com/911737" source="BUGZILLA"/>
		<reference ref_id="914297" ref_url="https://bugzilla.suse.com/914297" source="BUGZILLA"/>
		<reference ref_id="914693" ref_url="https://bugzilla.suse.com/914693" source="BUGZILLA"/>
		<reference ref_id="921355" ref_url="https://bugzilla.suse.com/921355" source="BUGZILLA"/>
		<reference ref_id="921555" ref_url="https://bugzilla.suse.com/921555" source="BUGZILLA"/>
		<reference ref_id="921586" ref_url="https://bugzilla.suse.com/921586" source="BUGZILLA"/>
		<reference ref_id="936524" ref_url="https://bugzilla.suse.com/936524" source="BUGZILLA"/>
		<reference ref_id="938228" ref_url="https://bugzilla.suse.com/938228" source="BUGZILLA"/>
		<reference ref_id="948516" ref_url="https://bugzilla.suse.com/948516" source="BUGZILLA"/>
		<reference ref_id="948686" ref_url="https://bugzilla.suse.com/948686" source="BUGZILLA"/>
		<reference ref_id="953110" ref_url="https://bugzilla.suse.com/953110" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0236" ref_url="https://www.suse.com/security/cve/CVE-2015-0236/" source="CVE"/>
		<reference ref_id="CVE-2015-5313" ref_url="https://www.suse.com/security/cve/CVE-2015-5313/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001840.html" source="SUSE-SU"/>
		<description>
libvirt was updated to fix one security issue and several non-security issues.

This security issue was fixed:

- CVE-2015-0236: libvirt allowed remote authenticated users to obtain the VNC
  password by using the VIR_DOMAIN_XML_SECURE flag with a crafted (1) snapshot
  to the virDomainSnapshotGetXMLDesc interface or (2) image to the
  virDomainSaveImageGetXMLDesc interface. (bsc#914693)
- CVE-2015-5313: path traversal vulnerability allowed libvirtd process to write arbitrary files into file system using root permissions (bsc#953110)

Theses non-security issues were fixed:

- bsc#948686: Use PAUSED state for domains that are starting up.
- bsc#903757: Provide nodeGetSecurityModel implementation in libxl.
- bsc#938228: Set disk type to BLOCK when driver is not tap or file.
- bsc#948516: Fix profile_status to distinguish between errors and unconfined domains.
- bsc#936524: Fix error starting lxc containers with direct interfaces.
- bsc#921555: Fixed apparmor generated profile for PCI hostdevs.
- bsc#899334: Include additional upstream fixes for systemd TerminateMachine.
- bsc#921586: Fix security driver default settings in /etc/libvirt/qemu.conf.
- bsc#921355: Fixed a number of QEMU apparmor abstraction problems.
- bsc#911737: Additional fix for the case where security labels aren't automatically set.
- bsc#914297: Allow setting the URL of an SMT server to use in place of SCC.
- bsc#904432: Backported route definition changes.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-01"/>
	<updated date="2016-02-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/899334">SUSE bug 899334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903757">SUSE bug 903757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904432">SUSE bug 904432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911737">SUSE bug 911737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914297">SUSE bug 914297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914693">SUSE bug 914693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921355">SUSE bug 921355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921555">SUSE bug 921555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921586">SUSE bug 921586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936524">SUSE bug 936524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938228">SUSE bug 938228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948516">SUSE bug 948516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948686">SUSE bug 948686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953110">SUSE bug 953110</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0236/">CVE-2015-0236</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5313/">CVE-2015-5313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515735" comment="libvirt-1.2.5-27.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515736" comment="libvirt-client-1.2.5-27.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515737" comment="libvirt-client-32bit-1.2.5-27.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515738" comment="libvirt-daemon-1.2.5-27.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515739" comment="libvirt-daemon-config-network-1.2.5-27.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515740" comment="libvirt-daemon-config-nwfilter-1.2.5-27.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515741" comment="libvirt-daemon-driver-interface-1.2.5-27.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515742" comment="libvirt-daemon-driver-libxl-1.2.5-27.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515743" comment="libvirt-daemon-driver-lxc-1.2.5-27.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515744" comment="libvirt-daemon-driver-network-1.2.5-27.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515745" comment="libvirt-daemon-driver-nodedev-1.2.5-27.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515746" comment="libvirt-daemon-driver-nwfilter-1.2.5-27.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515747" comment="libvirt-daemon-driver-qemu-1.2.5-27.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515748" comment="libvirt-daemon-driver-secret-1.2.5-27.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515749" comment="libvirt-daemon-driver-storage-1.2.5-27.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515750" comment="libvirt-daemon-lxc-1.2.5-27.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515751" comment="libvirt-daemon-qemu-1.2.5-27.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515752" comment="libvirt-daemon-xen-1.2.5-27.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515753" comment="libvirt-doc-1.2.5-27.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77425" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="954447" ref_url="https://bugzilla.suse.com/954447" source="BUGZILLA"/>
		<reference ref_id="963520" ref_url="https://bugzilla.suse.com/963520" source="BUGZILLA"/>
		<reference ref_id="963632" ref_url="https://bugzilla.suse.com/963632" source="BUGZILLA"/>
		<reference ref_id="963635" ref_url="https://bugzilla.suse.com/963635" source="BUGZILLA"/>
		<reference ref_id="963731" ref_url="https://bugzilla.suse.com/963731" source="BUGZILLA"/>
		<reference ref_id="964332" ref_url="https://bugzilla.suse.com/964332" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930/" source="CVE"/>
		<reference ref_id="CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935/" source="CVE"/>
		<reference ref_id="CVE-2016-1938" ref_url="https://www.suse.com/security/cve/CVE-2016-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0338-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nss fixes the following issues: (bsc#963520)

Mozilla Firefox was updated to 38.6.0 ESR.
Mozilla NSS was updated to 3.20.2.

The following vulnerabilities were fixed:

- CVE-2016-1930: Memory safety bugs fixed in Firefox ESR 38.6 (bsc#963632)
- CVE-2016-1935: Buffer overflow in WebGL after out of memory allocation (bsc#963635)
- CVE-2016-1938: Calculations with mp_div and mp_exptmod in Network Security Services (NSS) canproduce wrong results (bsc#963731)

The following improvements were added:

- bsc#954447: Mozilla NSS now supports a number of new DHE ciphersuites
- Tracking protection is now enabled by default
- bsc#964332: Fixed leaking file descriptors inside FIPS selfcheck code
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-04"/>
	<updated date="2016-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/954447">SUSE bug 954447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963520">SUSE bug 963520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963632">SUSE bug 963632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963635">SUSE bug 963635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963731">SUSE bug 963731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964332">SUSE bug 964332</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1938/">CVE-2016-1938</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515754" comment="MozillaFirefox-38.6.0esr-57.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515755" comment="MozillaFirefox-branding-SLE-31.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515756" comment="MozillaFirefox-translations-38.6.0esr-57.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515757" comment="libfreebl3-3.20.2-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515758" comment="libfreebl3-32bit-3.20.2-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515759" comment="libsoftokn3-3.20.2-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515760" comment="libsoftokn3-32bit-3.20.2-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515761" comment="mozilla-nss-3.20.2-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515762" comment="mozilla-nss-32bit-3.20.2-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515763" comment="mozilla-nss-certs-3.20.2-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515764" comment="mozilla-nss-certs-32bit-3.20.2-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515765" comment="mozilla-nss-sysinit-3.20.2-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515766" comment="mozilla-nss-sysinit-32bit-3.20.2-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515767" comment="mozilla-nss-tools-3.20.2-37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77426" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="934524" ref_url="https://bugzilla.suse.com/934524" source="BUGZILLA"/>
		<reference ref_id="934525" ref_url="https://bugzilla.suse.com/934525" source="BUGZILLA"/>
		<reference ref_id="934526" ref_url="https://bugzilla.suse.com/934526" source="BUGZILLA"/>
		<reference ref_id="934527" ref_url="https://bugzilla.suse.com/934527" source="BUGZILLA"/>
		<reference ref_id="934528" ref_url="https://bugzilla.suse.com/934528" source="BUGZILLA"/>
		<reference ref_id="934529" ref_url="https://bugzilla.suse.com/934529" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9732" ref_url="https://www.suse.com/security/cve/CVE-2014-9732/" source="CVE"/>
		<reference ref_id="CVE-2015-4467" ref_url="https://www.suse.com/security/cve/CVE-2015-4467/" source="CVE"/>
		<reference ref_id="CVE-2015-4468" ref_url="https://www.suse.com/security/cve/CVE-2015-4468/" source="CVE"/>
		<reference ref_id="CVE-2015-4469" ref_url="https://www.suse.com/security/cve/CVE-2015-4469/" source="CVE"/>
		<reference ref_id="CVE-2015-4470" ref_url="https://www.suse.com/security/cve/CVE-2015-4470/" source="CVE"/>
		<reference ref_id="CVE-2015-4471" ref_url="https://www.suse.com/security/cve/CVE-2015-4471/" source="CVE"/>
		<reference ref_id="CVE-2015-4472" ref_url="https://www.suse.com/security/cve/CVE-2015-4472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001776.html" source="SUSE-SU"/>
		<description>
libmspack was updated to fix security issues.

These security issues were fixed:
* CVE-2014-9732: The cabd_extract function in cabd.c in libmspack did not properly maintain decompression callbacks in certain cases where an invalid file follows a valid file, which allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted CAB archive (bnc#934524).
* CVE-2015-4467: The chmd_init_decomp function in chmd.c in libmspack did not properly validate the reset interval, which allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted CHM file (bnc#934525).
* CVE-2015-4468: Multiple integer overflows in the search_chunk function in chmd.c in libmspack allowed remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted CHM file (bnc#934526).
* CVE-2015-4469: The chmd_read_headers function in chmd.c in libmspack did not validate name lengths, which allowed remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted CHM file (bnc#934526).
* CVE-2015-4470: Off-by-one error in the inflate function in mszipd.c in libmspack allowed remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted CAB archive (bnc#934527).
* CVE-2015-4471: Off-by-one error in the lzxd_decompress function in lzxd.c in libmspack allowed remote attackers to cause a denial of service (buffer under-read and application crash) via a crafted CAB archive (bnc#934528).
* CVE-2015-4472: Off-by-one error in the READ_ENCINT macro in chmd.c in libmspack allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted CHM file (bnc#934529).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-04"/>
	<updated date="2016-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934524">SUSE bug 934524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934525">SUSE bug 934525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934526">SUSE bug 934526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934527">SUSE bug 934527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934528">SUSE bug 934528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934529">SUSE bug 934529</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9732/">CVE-2014-9732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4467/">CVE-2015-4467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4468/">CVE-2015-4468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4469/">CVE-2015-4469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4470/">CVE-2015-4470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4471/">CVE-2015-4471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4472/">CVE-2015-4472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515768" comment="libmspack0-0.4-14.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77427" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="934333" ref_url="https://bugzilla.suse.com/934333" source="BUGZILLA"/>
		<reference ref_id="936676" ref_url="https://bugzilla.suse.com/936676" source="BUGZILLA"/>
		<reference ref_id="962983" ref_url="https://bugzilla.suse.com/962983" source="BUGZILLA"/>
		<reference ref_id="962996" ref_url="https://bugzilla.suse.com/962996" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0755" ref_url="https://www.suse.com/security/cve/CVE-2016-0755/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001848.html" source="SUSE-SU"/>
		<description>

This update for curl fixes the following issues:

- CVE-2016-0755: libcurl would reuse NTLM-authenticated proxy connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer (bsc#962983)

The following non-security bugs were fixed:

- bsc#936676: secure_getenv or __secure_getenv may not be detected correctly at build time

The following tracked bugs only affect the test suite:

- bsc#962996: Expired cookie in test 46 caused test failures
- bsc#934333: Curl test suite was not run, is now enabled during build
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-04"/>
	<updated date="2016-02-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934333">SUSE bug 934333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936676">SUSE bug 936676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962983">SUSE bug 962983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962996">SUSE bug 962996</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0755/">CVE-2016-0755</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515769" comment="curl-7.37.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515770" comment="libcurl4-7.37.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515771" comment="libcurl4-32bit-7.37.0-18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77428" version="1" class="patch">
	<metadata>
		<title>Security update for socat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="938913" ref_url="https://bugzilla.suse.com/938913" source="BUGZILLA"/>
		<reference ref_id="964844" ref_url="https://bugzilla.suse.com/964844" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001851.html" source="SUSE-SU"/>
		<description>

This update for socat fixed the following issues:

- bsc#964844: Fixed security advisory 8, Stack overflow in parser, http://www.openwall.com/lists/oss-security/2016/02/01/5.
- bsc#938913: Improved resilience against Logjam attacks (CVE-2015-4000) by increasing the size of the default DH group from 512 to 2048 bit. This change avoids the non-prime 1024 bit DH p parameter in OpenSSL http://www.dest-unreach.org/socat/contrib/socat-secadv7.html.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/938913">SUSE bug 938913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964844">SUSE bug 964844</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515772" comment="socat-1.7.2.4-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77429" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="965901" ref_url="https://bugzilla.suse.com/965901" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0964" ref_url="https://www.suse.com/security/cve/CVE-2016-0964/" source="CVE"/>
		<reference ref_id="CVE-2016-0965" ref_url="https://www.suse.com/security/cve/CVE-2016-0965/" source="CVE"/>
		<reference ref_id="CVE-2016-0966" ref_url="https://www.suse.com/security/cve/CVE-2016-0966/" source="CVE"/>
		<reference ref_id="CVE-2016-0967" ref_url="https://www.suse.com/security/cve/CVE-2016-0967/" source="CVE"/>
		<reference ref_id="CVE-2016-0968" ref_url="https://www.suse.com/security/cve/CVE-2016-0968/" source="CVE"/>
		<reference ref_id="CVE-2016-0969" ref_url="https://www.suse.com/security/cve/CVE-2016-0969/" source="CVE"/>
		<reference ref_id="CVE-2016-0970" ref_url="https://www.suse.com/security/cve/CVE-2016-0970/" source="CVE"/>
		<reference ref_id="CVE-2016-0971" ref_url="https://www.suse.com/security/cve/CVE-2016-0971/" source="CVE"/>
		<reference ref_id="CVE-2016-0972" ref_url="https://www.suse.com/security/cve/CVE-2016-0972/" source="CVE"/>
		<reference ref_id="CVE-2016-0973" ref_url="https://www.suse.com/security/cve/CVE-2016-0973/" source="CVE"/>
		<reference ref_id="CVE-2016-0974" ref_url="https://www.suse.com/security/cve/CVE-2016-0974/" source="CVE"/>
		<reference ref_id="CVE-2016-0975" ref_url="https://www.suse.com/security/cve/CVE-2016-0975/" source="CVE"/>
		<reference ref_id="CVE-2016-0976" ref_url="https://www.suse.com/security/cve/CVE-2016-0976/" source="CVE"/>
		<reference ref_id="CVE-2016-0977" ref_url="https://www.suse.com/security/cve/CVE-2016-0977/" source="CVE"/>
		<reference ref_id="CVE-2016-0978" ref_url="https://www.suse.com/security/cve/CVE-2016-0978/" source="CVE"/>
		<reference ref_id="CVE-2016-0979" ref_url="https://www.suse.com/security/cve/CVE-2016-0979/" source="CVE"/>
		<reference ref_id="CVE-2016-0980" ref_url="https://www.suse.com/security/cve/CVE-2016-0980/" source="CVE"/>
		<reference ref_id="CVE-2016-0981" ref_url="https://www.suse.com/security/cve/CVE-2016-0981/" source="CVE"/>
		<reference ref_id="CVE-2016-0982" ref_url="https://www.suse.com/security/cve/CVE-2016-0982/" source="CVE"/>
		<reference ref_id="CVE-2016-0983" ref_url="https://www.suse.com/security/cve/CVE-2016-0983/" source="CVE"/>
		<reference ref_id="CVE-2016-0984" ref_url="https://www.suse.com/security/cve/CVE-2016-0984/" source="CVE"/>
		<reference ref_id="CVE-2016-0985" ref_url="https://www.suse.com/security/cve/CVE-2016-0985/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<description>

This update for flash-player fixes the following issues:

- Security update to 11.2.202.569 (bsc#965901):
  * APSB16-04, CVE-2016-0964, CVE-2016-0965, CVE-2016-0966,
    CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970,
    CVE-2016-0971, CVE-2016-0972, CVE-2016-0973, CVE-2016-0974,
    CVE-2016-0975, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978,
    CVE-2016-0979, CVE-2016-0980, CVE-2016-0981, CVE-2016-0982,
    CVE-2016-0983, CVE-2016-0984, CVE-2016-0985
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-10"/>
	<updated date="2016-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0964/">CVE-2016-0964</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0965/">CVE-2016-0965</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0966/">CVE-2016-0966</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0967/">CVE-2016-0967</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0968/">CVE-2016-0968</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0969/">CVE-2016-0969</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0970/">CVE-2016-0970</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0971/">CVE-2016-0971</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0972/">CVE-2016-0972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0973/">CVE-2016-0973</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0974/">CVE-2016-0974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0975/">CVE-2016-0975</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0976/">CVE-2016-0976</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0977/">CVE-2016-0977</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0978/">CVE-2016-0978</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0979/">CVE-2016-0979</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0980/">CVE-2016-0980</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0981/">CVE-2016-0981</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0982/">CVE-2016-0982</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0983/">CVE-2016-0983</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0984/">CVE-2016-0984</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0985/">CVE-2016-0985</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515773" comment="flash-player-11.2.202.569-120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515774" comment="flash-player-gnome-11.2.202.569-120.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77430" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="963964" ref_url="https://bugzilla.suse.com/963964" source="BUGZILLA"/>
		<reference ref_id="963968" ref_url="https://bugzilla.suse.com/963968" source="BUGZILLA"/>
		<reference ref_id="963975" ref_url="https://bugzilla.suse.com/963975" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8629" ref_url="https://www.suse.com/security/cve/CVE-2015-8629/" source="CVE"/>
		<reference ref_id="CVE-2015-8630" ref_url="https://www.suse.com/security/cve/CVE-2015-8630/" source="CVE"/>
		<reference ref_id="CVE-2015-8631" ref_url="https://www.suse.com/security/cve/CVE-2015-8631/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001870.html" source="SUSE-SU"/>
		<description>

This update for krb5 fixes the following issues:

- CVE-2015-8629: Information leak authenticated attackers with permissions to modify the database (bsc#963968)
- CVE-2015-8630: An authenticated attacker with permission to modify a principal entry may have caused kadmind to crash (bsc#963964)
- CVE-2015-8631: An authenticated attacker could have caused a memory leak in auditd by supplying a null principal name in request (bsc#963975)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-11"/>
	<updated date="2016-02-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/963964">SUSE bug 963964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963968">SUSE bug 963968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963975">SUSE bug 963975</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8629/">CVE-2015-8629</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8630/">CVE-2015-8630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8631/">CVE-2015-8631</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515775" comment="krb5-1.12.1-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515776" comment="krb5-32bit-1.12.1-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515777" comment="krb5-client-1.12.1-25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77431" version="1" class="patch">
	<metadata>
		<title>Security update for libnettle (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="964845" ref_url="https://bugzilla.suse.com/964845" source="BUGZILLA"/>
		<reference ref_id="964847" ref_url="https://bugzilla.suse.com/964847" source="BUGZILLA"/>
		<reference ref_id="964849" ref_url="https://bugzilla.suse.com/964849" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8803" ref_url="https://www.suse.com/security/cve/CVE-2015-8803/" source="CVE"/>
		<reference ref_id="CVE-2015-8804" ref_url="https://www.suse.com/security/cve/CVE-2015-8804/" source="CVE"/>
		<reference ref_id="CVE-2015-8805" ref_url="https://www.suse.com/security/cve/CVE-2015-8805/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001877.html" source="SUSE-SU"/>
		<description>
This update for libnettle fixes the following security issues: 

- CVE-2015-8803: Fixed miscomputation bugs in secp-256r1 modulo functions. (bsc#964845)
- CVE-2015-8804: Fixed carry folding bug in x86_64 ecc_384_modp. (bsc#964847)
- CVE-2015-8805: Fixed miscomputation bugs in secp-256r1 modulo functions. (bsc#964849)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-15"/>
	<updated date="2016-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/964845">SUSE bug 964845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964847">SUSE bug 964847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964849">SUSE bug 964849</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8803/">CVE-2015-8803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8804/">CVE-2015-8804</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8805/">CVE-2015-8805</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515778" comment="libhogweed2-2.7.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515779" comment="libhogweed2-32bit-2.7.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515780" comment="libnettle4-2.7.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515781" comment="libnettle4-32bit-2.7.1-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77432" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="950944" ref_url="https://bugzilla.suse.com/950944" source="BUGZILLA"/>
		<reference ref_id="955647" ref_url="https://bugzilla.suse.com/955647" source="BUGZILLA"/>
		<reference ref_id="956716" ref_url="https://bugzilla.suse.com/956716" source="BUGZILLA"/>
		<reference ref_id="958315" ref_url="https://bugzilla.suse.com/958315" source="BUGZILLA"/>
		<reference ref_id="961721" ref_url="https://bugzilla.suse.com/961721" source="BUGZILLA"/>
		<reference ref_id="962736" ref_url="https://bugzilla.suse.com/962736" source="BUGZILLA"/>
		<reference ref_id="962737" ref_url="https://bugzilla.suse.com/962737" source="BUGZILLA"/>
		<reference ref_id="962738" ref_url="https://bugzilla.suse.com/962738" source="BUGZILLA"/>
		<reference ref_id="962739" ref_url="https://bugzilla.suse.com/962739" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761/" source="CVE"/>
		<reference ref_id="CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547/" source="CVE"/>
		<reference ref_id="CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776/" source="CVE"/>
		<reference ref_id="CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777/" source="CVE"/>
		<reference ref_id="CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778/" source="CVE"/>
		<reference ref_id="CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html" source="SUSE-SU"/>
		<description>

This update for glibc fixes the following security issues:

- CVE-2015-7547: A stack-based buffer overflow in getaddrinfo allowed remote attackers to cause a crash or execute arbitrary code via crafted and timed DNS responses (bsc#961721)
- CVE-2015-8777: Insufficient checking of LD_POINTER_GUARD environment variable allowed local attackers to bypass the pointer guarding protection of the dynamic loader on set-user-ID and set-group-ID programs (bsc#950944)
- CVE-2015-8776: Out-of-range time values passed to the strftime function may cause it to crash, leading to a denial of service, or potentially disclosure information (bsc#962736)
- CVE-2015-8778: Integer overflow in hcreate and hcreate_r could have caused an out-of-bound memory access. leading to application crashes or, potentially, arbitrary code execution (bsc#962737)
- CVE-2014-9761: A stack overflow (unbounded alloca) could have caused applications which process long strings with the nan function to crash or, potentially, execute arbitrary code. (bsc#962738)
- CVE-2015-8779: A stack overflow (unbounded alloca) in the catopen function could have caused applications which pass long strings to the catopen function to crash or, potentially execute arbitrary code. (bsc#962739)

The following non-security bugs were fixed:

- bsc#955647: Resource leak in resolver
- bsc#956716: Don't do lock elision on an error checking mutex
- bsc#958315: Reinitialize dl_load_write_lock on fork
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/950944">SUSE bug 950944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955647">SUSE bug 955647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956716">SUSE bug 956716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958315">SUSE bug 958315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961721">SUSE bug 961721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962736">SUSE bug 962736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962737">SUSE bug 962737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962738">SUSE bug 962738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962739">SUSE bug 962739</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515782" comment="glibc-2.19-22.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515783" comment="glibc-32bit-2.19-22.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515784" comment="glibc-devel-2.19-22.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515785" comment="glibc-devel-32bit-2.19-22.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515786" comment="glibc-i18ndata-2.19-22.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515787" comment="glibc-locale-2.19-22.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515788" comment="glibc-locale-32bit-2.19-22.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515789" comment="nscd-2.19-22.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77433" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql93 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="966435" ref_url="https://bugzilla.suse.com/966435" source="BUGZILLA"/>
		<reference ref_id="966436" ref_url="https://bugzilla.suse.com/966436" source="BUGZILLA"/>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2016-0766" ref_url="https://www.suse.com/security/cve/CVE-2016-0766/" source="CVE"/>
		<reference ref_id="CVE-2016-0773" ref_url="https://www.suse.com/security/cve/CVE-2016-0773/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0539-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00052.html" source="SUSE-SU"/>
		<description>

This update for postgresql93 fixes the following issues: 

- Security and bugfix release 9.3.11:
  * Fix infinite loops and buffer-overrun problems in regular
    expressions (CVE-2016-0773, bsc#966436).
  * Fix regular-expression compiler to handle loops of constraint
    arcs (CVE-2007-4772).
  * Prevent certain PL/Java parameters from being set by
    non-superusers (CVE-2016-0766, bsc#966435).
  * Fix many issues in pg_dump with specific object types
  * Prevent over-eager pushdown of HAVING clauses for
    GROUPING SETS
  * Fix deparsing error with ON CONFLICT ... WHERE clauses
  * Fix tableoid errors for postgres_fdw
  * Prevent floating-point exceptions in pgbench
  * Make \det search Foreign Table names consistently
  * Fix quoting of domain constraint names in pg_dump
  * Prevent putting expanded objects into Const nodes
  * Allow compile of PL/Java on Windows
  * Fix 'unresolved symbol' errors in PL/Python execution
  * Allow Python2 and Python3 to be used in the same database
  * Add support for Python 3.5 in PL/Python
  * Fix issue with subdirectory creation during initdb
  * Make pg_ctl report status correctly on Windows
  * Suppress confusing error when using pg_receivexlog with older
    servers
  * Multiple documentation corrections and additions
  * Fix erroneous hash calculations in gin_extract_jsonb_path()
- For the full release notse, see:
  http://www.postgresql.org/docs/9.3/static/release-9-3-11.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-22"/>
	<updated date="2016-02-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/966435">SUSE bug 966435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966436">SUSE bug 966436</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0766/">CVE-2016-0766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0773/">CVE-2016-0773</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515790" comment="postgresql93-9.3.11-14.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77434" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="880984" ref_url="https://bugzilla.suse.com/880984" source="BUGZILLA"/>
		<reference ref_id="891961" ref_url="https://bugzilla.suse.com/891961" source="BUGZILLA"/>
		<reference ref_id="910686" ref_url="https://bugzilla.suse.com/910686" source="BUGZILLA"/>
		<reference ref_id="912098" ref_url="https://bugzilla.suse.com/912098" source="BUGZILLA"/>
		<reference ref_id="919959" ref_url="https://bugzilla.suse.com/919959" source="BUGZILLA"/>
		<reference ref_id="926159" ref_url="https://bugzilla.suse.com/926159" source="BUGZILLA"/>
		<reference ref_id="928390" ref_url="https://bugzilla.suse.com/928390" source="BUGZILLA"/>
		<reference ref_id="936923" ref_url="https://bugzilla.suse.com/936923" source="BUGZILLA"/>
		<reference ref_id="947780" ref_url="https://bugzilla.suse.com/947780" source="BUGZILLA"/>
		<reference ref_id="956159" ref_url="https://bugzilla.suse.com/956159" source="BUGZILLA"/>
		<reference ref_id="960506" ref_url="https://bugzilla.suse.com/960506" source="BUGZILLA"/>
		<reference ref_id="961305" ref_url="https://bugzilla.suse.com/961305" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8605" ref_url="https://www.suse.com/security/cve/CVE-2015-8605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001889.html" source="SUSE-SU"/>
		<description>

This update for dhcp fixes the following issues:

- CVE-2015-8605: A remote attacker could have used badly formed packets with an invalid IPv4 UDP length field to cause a DHCP server, client, or relay program to terminate abnormally (bsc#961305)

The following bugs were fixed:

- bsc#936923: Improper lease duration checking
- bsc#880984: Integer overflows in the date and time handling code
- bsc#956159: fixed service files to start dhcpd after slapd
- bsc#960506: Improve exit reason and logging when /sbin/dhclient-script is unable to pre-init requested interface
- bsc#947780: DHCP server could abort with 'Unable to set up timer: out of range' on very long or infinite timer intervals / lease lifetimes 
- bsc#912098: dhclient could pretend to run while silently declining leases
- bsc#919959: server: Do not log success report before send reported success
- bsc#928390: dhclient dit not expose next-server DHCPv4 option to script
- bsc#926159: DHCP preferrend and valid lifetime would be logged incorrectly
- bsc#910686: Prevent a dependency conflict of dhcp-devel with bind-devel package

The following tracked changes affect the build of the package only:

- bsc#891961: Disabled /sbin/service legacy-action hooks
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-22"/>
	<updated date="2016-02-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/880984">SUSE bug 880984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891961">SUSE bug 891961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910686">SUSE bug 910686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912098">SUSE bug 912098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919959">SUSE bug 919959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926159">SUSE bug 926159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928390">SUSE bug 928390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936923">SUSE bug 936923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947780">SUSE bug 947780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956159">SUSE bug 956159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960506">SUSE bug 960506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961305">SUSE bug 961305</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8605/">CVE-2015-8605</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515791" comment="dhcp-4.2.6-14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515792" comment="dhcp-client-4.2.6-14.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77435" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="578053" ref_url="https://bugzilla.suse.com/578053" source="BUGZILLA"/>
		<reference ref_id="966435" ref_url="https://bugzilla.suse.com/966435" source="BUGZILLA"/>
		<reference ref_id="966436" ref_url="https://bugzilla.suse.com/966436" source="BUGZILLA"/>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2016-0766" ref_url="https://www.suse.com/security/cve/CVE-2016-0766/" source="CVE"/>
		<reference ref_id="CVE-2016-0773" ref_url="https://www.suse.com/security/cve/CVE-2016-0773/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00054.html" source="SUSE-SU"/>
		<description>

This update for postgresql94 fixes the following issues: 

- Security and bugfix release 9.4.6:
  * *** IMPORTANT ***
    Users of version 9.4 will need to reindex any jsonb_path_ops
    indexes they have created, in order to fix a persistent issue
    with missing index entries.
  * Fix infinite loops and buffer-overrun problems in regular
    expressions (CVE-2016-0773, bsc#966436).
  * Fix regular-expression compiler to handle loops of constraint
    arcs (CVE-2007-4772).
  * Prevent certain PL/Java parameters from being set by
    non-superusers (CVE-2016-0766, bsc#966435).
  * Fix many issues in pg_dump with specific object types
  * Prevent over-eager pushdown of HAVING clauses for
    GROUPING SETS
  * Fix deparsing error with ON CONFLICT ... WHERE clauses
  * Fix tableoid errors for postgres_fdw
  * Prevent floating-point exceptions in pgbench
  * Make \det search Foreign Table names consistently
  * Fix quoting of domain constraint names in pg_dump
  * Prevent putting expanded objects into Const nodes
  * Allow compile of PL/Java on Windows
  * Fix 'unresolved symbol' errors in PL/Python execution
  * Allow Python2 and Python3 to be used in the same database
  * Add support for Python 3.5 in PL/Python
  * Fix issue with subdirectory creation during initdb
  * Make pg_ctl report status correctly on Windows
  * Suppress confusing error when using pg_receivexlog with older
    servers
  * Multiple documentation corrections and additions
  * Fix erroneous hash calculations in gin_extract_jsonb_path()
- For the full release notse, see:
  http://www.postgresql.org/docs/9.4/static/release-9-4-6.html

- PL/Perl still needs to be linked with rpath, so that it can find
  libperl.so at runtime.
  bsc#578053, postgresql-plperl-keep-rpath.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-24"/>
	<updated date="2016-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/578053">SUSE bug 578053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966435">SUSE bug 966435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966436">SUSE bug 966436</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0766/">CVE-2016-0766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0773/">CVE-2016-0773</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515793" comment="libecpg6-9.4.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515794" comment="libpq5-9.4.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515795" comment="libpq5-32bit-9.4.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515796" comment="postgresql94-9.4.6-7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77436" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="967087" ref_url="https://bugzilla.suse.com/967087" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1523" ref_url="https://www.suse.com/security/cve/CVE-2016-1523/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0554-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00053.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox fixes the following issues: 

- update to Firefox 38.6.1 ESR (bsc#967087)
  * MFSA 2016-14/CVE-2016-1523
    (bmo#1246093)
    Vulnerabilities in Graphite 2
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-24"/>
	<updated date="2016-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/967087">SUSE bug 967087</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1523/">CVE-2016-1523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515797" comment="MozillaFirefox-38.6.1esr-60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515798" comment="MozillaFirefox-translations-38.6.1esr-60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77437" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="952871" ref_url="https://bugzilla.suse.com/952871" source="BUGZILLA"/>
		<reference ref_id="958501" ref_url="https://bugzilla.suse.com/958501" source="BUGZILLA"/>
		<reference ref_id="963415" ref_url="https://bugzilla.suse.com/963415" source="BUGZILLA"/>
		<reference ref_id="968046" ref_url="https://bugzilla.suse.com/968046" source="BUGZILLA"/>
		<reference ref_id="968047" ref_url="https://bugzilla.suse.com/968047" source="BUGZILLA"/>
		<reference ref_id="968048" ref_url="https://bugzilla.suse.com/968048" source="BUGZILLA"/>
		<reference ref_id="968050" ref_url="https://bugzilla.suse.com/968050" source="BUGZILLA"/>
		<reference ref_id="968051" ref_url="https://bugzilla.suse.com/968051" source="BUGZILLA"/>
		<reference ref_id="968053" ref_url="https://bugzilla.suse.com/968053" source="BUGZILLA"/>
		<reference ref_id="968265" ref_url="https://bugzilla.suse.com/968265" source="BUGZILLA"/>
		<reference ref_id="968374" ref_url="https://bugzilla.suse.com/968374" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0703" ref_url="https://www.suse.com/security/cve/CVE-2016-0703/" source="CVE"/>
		<reference ref_id="CVE-2016-0704" ref_url="https://www.suse.com/security/cve/CVE-2016-0704/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0798" ref_url="https://www.suse.com/security/cve/CVE-2016-0798/" source="CVE"/>
		<reference ref_id="CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes various security issues and bugs: 

Security issues fixed:
- CVE-2016-0800 aka the 'DROWN' attack (bsc#968046):
  OpenSSL was vulnerable to a cross-protocol attack that could lead to
  decryption of TLS sessions by using a server supporting SSLv2 and
  EXPORT cipher suites as a Bleichenbacher RSA padding oracle.

  This update changes the openssl library to:

  * Disable SSLv2 protocol support by default.

    This can be overridden by setting the environment variable
    'OPENSSL_ALLOW_SSL2' or by using SSL_CTX_clear_options using the
    SSL_OP_NO_SSLv2 flag.

    Note that various services and clients had already disabled SSL
    protocol 2 by default previously.

  * Disable all weak EXPORT ciphers by default. These can be reenabled
    if required by old legacy software using the environment variable
    'OPENSSL_ALLOW_EXPORT'.

- CVE-2016-0702 aka the 'CacheBleed' attack. (bsc#968050)
  Various changes in the modular exponentation code were added that
  make sure that it is not possible to recover RSA secret keys by
  analyzing cache-bank conflicts on the Intel Sandy-Bridge microarchitecture.

  Note that this was only exploitable if the malicious code was running
  on the same hyper threaded Intel Sandy Bridge processor as the victim
  thread performing decryptions.

- CVE-2016-0705 (bnc#968047):
  A double free() bug in the DSA ASN1 parser code was fixed that could
  be abused to facilitate a denial-of-service attack.

- CVE-2016-0797 (bnc#968048):
  The BN_hex2bn() and BN_dec2bn() functions had a bug that could result
  in an attempt to de-reference a NULL pointer leading to crashes.
  This could have security consequences if these functions were ever
  called by user applications with large untrusted hex/decimal data. Also,
  internal usage of these functions in OpenSSL uses data from config files
  or application command line arguments. If user developed applications
  generated config file data based on untrusted data, then this could
  have had security consequences as well.

- CVE-2016-0798 (bnc#968265)
  The SRP user database lookup method SRP_VBASE_get_by_user() had a memory
  leak that attackers could abuse to facility DoS attacks. To mitigate
  the issue, the seed handling in SRP_VBASE_get_by_user() was disabled
  even if the user has configured a seed. Applications are advised to
  migrate to SRP_VBASE_get1_by_user().

- CVE-2016-0799 (bnc#968374)
  On many 64 bit systems, the internal fmtstr() and doapr_outch()
  functions could miscalculate the length of a string and attempt to
  access out-of-bounds memory locations. These problems could have
  enabled attacks where large amounts of untrusted data is passed to
  the BIO_*printf functions. If applications use these functions in
  this way then they could have been vulnerable. OpenSSL itself uses
  these functions when printing out human-readable dumps of ASN.1
  data. Therefore applications that print this data could have been
  vulnerable if the data is from untrusted sources. OpenSSL command line
  applications could also have been vulnerable when they print out ASN.1
  data, or if untrusted data is passed as command line arguments. Libssl
  is not considered directly vulnerable.

- CVE-2015-3197 (bsc#963415):
  The SSLv2 protocol did not block disabled ciphers.


Note that the March 1st 2016 release also references following CVEs
that were fixed by us with CVE-2015-0293 in 2015:

- CVE-2016-0703 (bsc#968051): This issue only affected versions of
  OpenSSL prior to March 19th 2015 at which time the code was refactored
  to address vulnerability CVE-2015-0293. It would have made the above
  'DROWN' attack much easier.
- CVE-2016-0704 (bsc#968053): 'Bleichenbacher oracle in SSLv2'
  This issue only affected versions of OpenSSL prior to March 19th
  2015 at which time the code was refactored to address vulnerability
  CVE-2015-0293. It would have made the above 'DROWN' attack much easier.

Bugs fixed:
- Avoid running OPENSSL_config twice. This avoids breaking
  engine loading. (bsc#952871)
- Ensure that OpenSSL doesn't fall back to the default digest
  algorithm (SHA1) in case a non-FIPS algorithm was negotiated while
  running in FIPS mode. Instead, OpenSSL will refuse the digest.
  (bnc#958501)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-01"/>
	<updated date="2016-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/952871">SUSE bug 952871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958501">SUSE bug 958501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963415">SUSE bug 963415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968047">SUSE bug 968047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968048">SUSE bug 968048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968050">SUSE bug 968050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968051">SUSE bug 968051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968053">SUSE bug 968053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968265">SUSE bug 968265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968374">SUSE bug 968374</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0703/">CVE-2016-0703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0704/">CVE-2016-0704</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0798/">CVE-2016-0798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515799" comment="libopenssl1_0_0-1.0.1i-27.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515800" comment="libopenssl1_0_0-32bit-1.0.1i-27.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515801" comment="openssl-1.0.1i-27.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77438" version="1" class="patch">
	<metadata>
		<title>Security update for libssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="965875" ref_url="https://bugzilla.suse.com/965875" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0739" ref_url="https://www.suse.com/security/cve/CVE-2016-0739/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001908.html" source="SUSE-SU"/>
		<description>

This update for libssh fixes the following issues: 

- CVE-2016-0739: Fix Weakness in diffie-hellman secret key generation. (bsc#965875)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-01"/>
	<updated date="2016-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/965875">SUSE bug 965875</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0739/">CVE-2016-0739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515802" comment="libssh4-0.6.3-11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77439" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="952871" ref_url="https://bugzilla.suse.com/952871" source="BUGZILLA"/>
		<reference ref_id="963415" ref_url="https://bugzilla.suse.com/963415" source="BUGZILLA"/>
		<reference ref_id="968046" ref_url="https://bugzilla.suse.com/968046" source="BUGZILLA"/>
		<reference ref_id="968048" ref_url="https://bugzilla.suse.com/968048" source="BUGZILLA"/>
		<reference ref_id="968051" ref_url="https://bugzilla.suse.com/968051" source="BUGZILLA"/>
		<reference ref_id="968053" ref_url="https://bugzilla.suse.com/968053" source="BUGZILLA"/>
		<reference ref_id="968374" ref_url="https://bugzilla.suse.com/968374" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0703" ref_url="https://www.suse.com/security/cve/CVE-2016-0703/" source="CVE"/>
		<reference ref_id="CVE-2016-0704" ref_url="https://www.suse.com/security/cve/CVE-2016-0704/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html" source="SUSE-SU"/>
		<description>

This update for compat-openssl098 fixes various security issues and bugs: 

Security issues fixed:
- CVE-2016-0800 aka the 'DROWN' attack (bsc#968046):
  OpenSSL was vulnerable to a cross-protocol attack that could lead to
  decryption of TLS sessions by using a server supporting SSLv2 and
  EXPORT cipher suites as a Bleichenbacher RSA padding oracle.

  This update changes the openssl library to:

  * Disable SSLv2 protocol support by default.

    This can be overridden by setting the environment variable
    'OPENSSL_ALLOW_SSL2' or by using SSL_CTX_clear_options using the
    SSL_OP_NO_SSLv2 flag.

    Note that various services and clients had already disabled SSL
    protocol 2 by default previously.

  * Disable all weak EXPORT ciphers by default. These can be reenabled
    if required by old legacy software using the environment variable
    'OPENSSL_ALLOW_EXPORT'.

- CVE-2016-0797 (bnc#968048):
  The BN_hex2bn() and BN_dec2bn() functions had a bug that could result
  in an attempt to de-reference a NULL pointer leading to crashes.
  This could have security consequences if these functions were ever
  called by user applications with large untrusted hex/decimal data. Also,
  internal usage of these functions in OpenSSL uses data from config files
  or application command line arguments. If user developed applications
  generated config file data based on untrusted data, then this could
  have had security consequences as well.

- CVE-2016-0799 (bnc#968374)
  On many 64 bit systems, the internal fmtstr() and doapr_outch()
  functions could miscalculate the length of a string and attempt to
  access out-of-bounds memory locations. These problems could have
  enabled attacks where large amounts of untrusted data is passed to
  the BIO_*printf functions. If applications use these functions in
  this way then they could have been vulnerable. OpenSSL itself uses
  these functions when printing out human-readable dumps of ASN.1
  data. Therefore applications that print this data could have been
  vulnerable if the data is from untrusted sources. OpenSSL command line
  applications could also have been vulnerable when they print out ASN.1
  data, or if untrusted data is passed as command line arguments. Libssl
  is not considered directly vulnerable.

- CVE-2015-3197 (bsc#963415):
  The SSLv2 protocol did not block disabled ciphers.

Note that the March 1st 2016 release also references following CVEs
that were fixed by us with CVE-2015-0293 in 2015:

- CVE-2016-0703 (bsc#968051): This issue only affected versions of
  OpenSSL prior to March 19th 2015 at which time the code was refactored
  to address vulnerability CVE-2015-0293. It would have made the above
  'DROWN' attack much easier.
- CVE-2016-0704 (bsc#968053): 'Bleichenbacher oracle in SSLv2'
  This issue only affected versions of OpenSSL prior to March 19th
  2015 at which time the code was refactored to address vulnerability
  CVE-2015-0293. It would have made the above 'DROWN' attack much easier.

Also fixes the following bug:
- Avoid running OPENSSL_config twice. This avoids breaking
  engine loading and also fixes a memory leak in libssl. (bsc#952871)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-03"/>
	<updated date="2016-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/952871">SUSE bug 952871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963415">SUSE bug 963415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968048">SUSE bug 968048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968051">SUSE bug 968051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968053">SUSE bug 968053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968374">SUSE bug 968374</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0703/">CVE-2016-0703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0704/">CVE-2016-0704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515803" comment="libopenssl0_9_8-0.9.8j-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515804" comment="libopenssl0_9_8-32bit-0.9.8j-94.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77440" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="954980" ref_url="https://bugzilla.suse.com/954980" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001789.html" source="SUSE-SU"/>
		<description>

  This update fixes the following security issue
  * CVE-2015-8126 Multiple buffer overflows in the png_set_PLTE and png_get_PLTE functions
    allow remote attackers to cause a denial of service (application crash) or possibly have 
    unspecified other impact [bsc#954980]
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-07"/>
	<updated date="2016-01-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515805" comment="libpng12-0-1.2.50-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515806" comment="libpng12-0-32bit-1.2.50-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77441" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="928193" ref_url="https://bugzilla.suse.com/928193" source="BUGZILLA"/>
		<reference ref_id="951734" ref_url="https://bugzilla.suse.com/951734" source="BUGZILLA"/>
		<reference ref_id="951735" ref_url="https://bugzilla.suse.com/951735" source="BUGZILLA"/>
		<reference ref_id="954429" ref_url="https://bugzilla.suse.com/954429" source="BUGZILLA"/>
		<reference ref_id="956018" ref_url="https://bugzilla.suse.com/956018" source="BUGZILLA"/>
		<reference ref_id="956021" ref_url="https://bugzilla.suse.com/956021" source="BUGZILLA"/>
		<reference ref_id="956260" ref_url="https://bugzilla.suse.com/956260" source="BUGZILLA"/>
		<reference ref_id="957105" ref_url="https://bugzilla.suse.com/957105" source="BUGZILLA"/>
		<reference ref_id="957106" ref_url="https://bugzilla.suse.com/957106" source="BUGZILLA"/>
		<reference ref_id="957107" ref_url="https://bugzilla.suse.com/957107" source="BUGZILLA"/>
		<reference ref_id="957109" ref_url="https://bugzilla.suse.com/957109" source="BUGZILLA"/>
		<reference ref_id="957110" ref_url="https://bugzilla.suse.com/957110" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-8035" ref_url="https://www.suse.com/security/cve/CVE-2015-8035/" source="CVE"/>
		<reference ref_id="CVE-2015-8241" ref_url="https://www.suse.com/security/cve/CVE-2015-8241/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2015-8317" ref_url="https://www.suse.com/security/cve/CVE-2015-8317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<description>
- security update:
      This update fixes the following security issues: 

    * CVE-2015-1819 Enforce the reader to run in constant memory [bnc#928193]
    * CVE-2015-7941 Fix out of bound read with crafted xml input by stopping parsing on entities boundaries errors [bnc#951734]
    * CVE-2015-7942 Fix another variation of overflow in Conditional sections [bnc#951735]
    * CVE-2015-8241 Avoid extra processing of MarkupDecl when EOF [bnc#956018]
    * CVE-2015-8242 Buffer overead with HTML parser in push mode [bnc#956021]
    * CVE-2015-8317 Return if the encoding declaration is broken or encoding conversion failed [bnc#956260]
    * CVE-2015-5312 Fix another entity expansion issue [bnc#957105]
    * CVE-2015-7497 Avoid an heap buffer overflow in xmlDictComputeFastQKey [bnc#957106]
    * CVE-2015-7498 Processes entities after encoding conversion failures [bnc#957107]
    * CVE-2015-7499 Add xmlHaltParser() to stop the parser / Detect incoherency on GROW [bnc#957109]
    * CVE-2015-8317 Multiple out-of-bound read could lead to denial of service [bnc#956260]
    * CVE-2015-8035 DoS when parsing specially crafted XML document if XZ support is enabled [bnc#954429]
    * CVE-2015-7500 Fix memory access error due to incorrect entities boundaries [bnc#957110] 
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-07"/>
	<updated date="2016-01-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/928193">SUSE bug 928193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951734">SUSE bug 951734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951735">SUSE bug 951735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954429">SUSE bug 954429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956018">SUSE bug 956018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956021">SUSE bug 956021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956260">SUSE bug 956260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957105">SUSE bug 957105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957106">SUSE bug 957106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957107">SUSE bug 957107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957109">SUSE bug 957109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957110">SUSE bug 957110</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8035/">CVE-2015-8035</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8241/">CVE-2015-8241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8317/">CVE-2015-8317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515807" comment="libxml2-2-2.9.1-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515808" comment="libxml2-2-32bit-2.9.1-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515809" comment="libxml2-tools-2.9.1-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515810" comment="python-libxml2-2.9.1-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77442" version="1" class="patch">
	<metadata>
		<title>Security update for libotr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="969785" ref_url="https://bugzilla.suse.com/969785" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2851" ref_url="https://www.suse.com/security/cve/CVE-2016-2851/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001919.html" source="SUSE-SU"/>
		<description>

This update for libotr fixes the following issue:

- Apply 'libotr-CVE-2016-2851.patch' to fix integer overflows that
  used to occur on 64-bit architectures when receiving 4GB messages.
  This flaw could potentially have been exploited by an attacker to
  remotely execute arbitrary code on the user's machine
  * (CVE-2016-2851, bsc#969785)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-09"/>
	<updated date="2016-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/969785">SUSE bug 969785</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2851/">CVE-2016-2851</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515811" comment="libotr5-4.0.0-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77443" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="970547" ref_url="https://bugzilla.suse.com/970547" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0960" ref_url="https://www.suse.com/security/cve/CVE-2016-0960/" source="CVE"/>
		<reference ref_id="CVE-2016-0961" ref_url="https://www.suse.com/security/cve/CVE-2016-0961/" source="CVE"/>
		<reference ref_id="CVE-2016-0962" ref_url="https://www.suse.com/security/cve/CVE-2016-0962/" source="CVE"/>
		<reference ref_id="CVE-2016-0963" ref_url="https://www.suse.com/security/cve/CVE-2016-0963/" source="CVE"/>
		<reference ref_id="CVE-2016-0986" ref_url="https://www.suse.com/security/cve/CVE-2016-0986/" source="CVE"/>
		<reference ref_id="CVE-2016-0987" ref_url="https://www.suse.com/security/cve/CVE-2016-0987/" source="CVE"/>
		<reference ref_id="CVE-2016-0988" ref_url="https://www.suse.com/security/cve/CVE-2016-0988/" source="CVE"/>
		<reference ref_id="CVE-2016-0989" ref_url="https://www.suse.com/security/cve/CVE-2016-0989/" source="CVE"/>
		<reference ref_id="CVE-2016-0990" ref_url="https://www.suse.com/security/cve/CVE-2016-0990/" source="CVE"/>
		<reference ref_id="CVE-2016-0991" ref_url="https://www.suse.com/security/cve/CVE-2016-0991/" source="CVE"/>
		<reference ref_id="CVE-2016-0992" ref_url="https://www.suse.com/security/cve/CVE-2016-0992/" source="CVE"/>
		<reference ref_id="CVE-2016-0993" ref_url="https://www.suse.com/security/cve/CVE-2016-0993/" source="CVE"/>
		<reference ref_id="CVE-2016-0994" ref_url="https://www.suse.com/security/cve/CVE-2016-0994/" source="CVE"/>
		<reference ref_id="CVE-2016-0995" ref_url="https://www.suse.com/security/cve/CVE-2016-0995/" source="CVE"/>
		<reference ref_id="CVE-2016-0996" ref_url="https://www.suse.com/security/cve/CVE-2016-0996/" source="CVE"/>
		<reference ref_id="CVE-2016-0997" ref_url="https://www.suse.com/security/cve/CVE-2016-0997/" source="CVE"/>
		<reference ref_id="CVE-2016-0998" ref_url="https://www.suse.com/security/cve/CVE-2016-0998/" source="CVE"/>
		<reference ref_id="CVE-2016-0999" ref_url="https://www.suse.com/security/cve/CVE-2016-0999/" source="CVE"/>
		<reference ref_id="CVE-2016-1000" ref_url="https://www.suse.com/security/cve/CVE-2016-1000/" source="CVE"/>
		<reference ref_id="CVE-2016-1001" ref_url="https://www.suse.com/security/cve/CVE-2016-1001/" source="CVE"/>
		<reference ref_id="CVE-2016-1002" ref_url="https://www.suse.com/security/cve/CVE-2016-1002/" source="CVE"/>
		<reference ref_id="CVE-2016-1005" ref_url="https://www.suse.com/security/cve/CVE-2016-1005/" source="CVE"/>
		<reference ref_id="CVE-2016-1010" ref_url="https://www.suse.com/security/cve/CVE-2016-1010/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<description>

Adobe flash-player was updated to 11.2.202.577 to fix the following
list of security issues (bsc#970547):

These updates resolve integer overflow vulnerabilities that could lead
to code execution (CVE-2016-0963, CVE-2016-0993, CVE-2016-1010).

These updates resolve use-after-free vulnerabilities that could
lead to code execution (CVE-2016-0987, CVE-2016-0988, CVE-2016-0990,
CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997,
CVE-2016-0998, CVE-2016-0999, CVE-2016-1000).

These updates resolve a heap overflow vulnerability that could lead to
code execution (CVE-2016-1001).

These updates resolve memory corruption vulnerabilities that could
lead to code execution (CVE-2016-0960, CVE-2016-0961, CVE-2016-0962,
CVE-2016-0986, CVE-2016-0989, CVE-2016-0992, CVE-2016-1002,
CVE-2016-1005).

Adobe advisory with more information:
https://helpx.adobe.com/security/products/flash-player/apsb16-08.html

		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-11"/>
	<updated date="2016-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0960/">CVE-2016-0960</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0961/">CVE-2016-0961</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0962/">CVE-2016-0962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0963/">CVE-2016-0963</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0986/">CVE-2016-0986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0987/">CVE-2016-0987</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0988/">CVE-2016-0988</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0989/">CVE-2016-0989</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0990/">CVE-2016-0990</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0991/">CVE-2016-0991</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0992/">CVE-2016-0992</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0993/">CVE-2016-0993</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0994/">CVE-2016-0994</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0995/">CVE-2016-0995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0996/">CVE-2016-0996</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0997/">CVE-2016-0997</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0998/">CVE-2016-0998</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0999/">CVE-2016-0999</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1000/">CVE-2016-1000</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1001/">CVE-2016-1001</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1002/">CVE-2016-1002</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1005/">CVE-2016-1005</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1010/">CVE-2016-1010</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515812" comment="flash-player-11.2.202.577-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515813" comment="flash-player-gnome-11.2.202.577-123.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77444" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="933336" ref_url="https://bugzilla.suse.com/933336" source="BUGZILLA"/>
		<reference ref_id="961964" ref_url="https://bugzilla.suse.com/961964" source="BUGZILLA"/>
		<reference ref_id="967026" ref_url="https://bugzilla.suse.com/967026" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0787" ref_url="https://www.suse.com/security/cve/CVE-2016-0787/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001922.html" source="SUSE-SU"/>
		<description>

This update for libssh2_org fixes the following issues: 

Security issue fixed:
- CVE-2016-0787 (bsc#967026):
  Weakness in diffie-hellman secret key generation lead to much shorter DH groups
  then needed, which could be used to retrieve server keys.

A feature was added:
- Support of SHA256 digests for DH group exchanges was added (fate#320343, bsc#961964)

Bug fixed:
- Properly detect EVP_aes_128_ctr at configure time (bsc#933336)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-11"/>
	<updated date="2016-03-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/933336">SUSE bug 933336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961964">SUSE bug 961964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967026">SUSE bug 967026</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0787/">CVE-2016-0787</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515814" comment="libssh2-1-1.4.3-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515815" comment="libssh2-1-32bit-1.4.3-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77445" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="969894" ref_url="https://bugzilla.suse.com/969894" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1952" ref_url="https://www.suse.com/security/cve/CVE-2016-1952/" source="CVE"/>
		<reference ref_id="CVE-2016-1953" ref_url="https://www.suse.com/security/cve/CVE-2016-1953/" source="CVE"/>
		<reference ref_id="CVE-2016-1954" ref_url="https://www.suse.com/security/cve/CVE-2016-1954/" source="CVE"/>
		<reference ref_id="CVE-2016-1957" ref_url="https://www.suse.com/security/cve/CVE-2016-1957/" source="CVE"/>
		<reference ref_id="CVE-2016-1958" ref_url="https://www.suse.com/security/cve/CVE-2016-1958/" source="CVE"/>
		<reference ref_id="CVE-2016-1960" ref_url="https://www.suse.com/security/cve/CVE-2016-1960/" source="CVE"/>
		<reference ref_id="CVE-2016-1961" ref_url="https://www.suse.com/security/cve/CVE-2016-1961/" source="CVE"/>
		<reference ref_id="CVE-2016-1962" ref_url="https://www.suse.com/security/cve/CVE-2016-1962/" source="CVE"/>
		<reference ref_id="CVE-2016-1964" ref_url="https://www.suse.com/security/cve/CVE-2016-1964/" source="CVE"/>
		<reference ref_id="CVE-2016-1965" ref_url="https://www.suse.com/security/cve/CVE-2016-1965/" source="CVE"/>
		<reference ref_id="CVE-2016-1966" ref_url="https://www.suse.com/security/cve/CVE-2016-1966/" source="CVE"/>
		<reference ref_id="CVE-2016-1974" ref_url="https://www.suse.com/security/cve/CVE-2016-1974/" source="CVE"/>
		<reference ref_id="CVE-2016-1977" ref_url="https://www.suse.com/security/cve/CVE-2016-1977/" source="CVE"/>
		<reference ref_id="CVE-2016-1978" ref_url="https://www.suse.com/security/cve/CVE-2016-1978/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<reference ref_id="CVE-2016-2790" ref_url="https://www.suse.com/security/cve/CVE-2016-2790/" source="CVE"/>
		<reference ref_id="CVE-2016-2791" ref_url="https://www.suse.com/security/cve/CVE-2016-2791/" source="CVE"/>
		<reference ref_id="CVE-2016-2792" ref_url="https://www.suse.com/security/cve/CVE-2016-2792/" source="CVE"/>
		<reference ref_id="CVE-2016-2793" ref_url="https://www.suse.com/security/cve/CVE-2016-2793/" source="CVE"/>
		<reference ref_id="CVE-2016-2794" ref_url="https://www.suse.com/security/cve/CVE-2016-2794/" source="CVE"/>
		<reference ref_id="CVE-2016-2795" ref_url="https://www.suse.com/security/cve/CVE-2016-2795/" source="CVE"/>
		<reference ref_id="CVE-2016-2796" ref_url="https://www.suse.com/security/cve/CVE-2016-2796/" source="CVE"/>
		<reference ref_id="CVE-2016-2797" ref_url="https://www.suse.com/security/cve/CVE-2016-2797/" source="CVE"/>
		<reference ref_id="CVE-2016-2798" ref_url="https://www.suse.com/security/cve/CVE-2016-2798/" source="CVE"/>
		<reference ref_id="CVE-2016-2799" ref_url="https://www.suse.com/security/cve/CVE-2016-2799/" source="CVE"/>
		<reference ref_id="CVE-2016-2800" ref_url="https://www.suse.com/security/cve/CVE-2016-2800/" source="CVE"/>
		<reference ref_id="CVE-2016-2801" ref_url="https://www.suse.com/security/cve/CVE-2016-2801/" source="CVE"/>
		<reference ref_id="CVE-2016-2802" ref_url="https://www.suse.com/security/cve/CVE-2016-2802/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox, mozilla-nspr, mozilla-nss fixes the following issues:

Mozilla Firefox was updated to 38.7.0 ESR (bsc#969894), fixing
following security issues:
* MFSA 2016-16/CVE-2016-1952/CVE-2016-1953
  Miscellaneous memory safety hazards (rv:45.0 / rv:38.7)
* MFSA 2016-17/CVE-2016-1954
  Local file overwriting and potential privilege escalation
  through CSP reports
* MFSA 2016-20/CVE-2016-1957
  Memory leak in libstagefright when deleting an array during
  MP4 processing
* MFSA 2016-21/CVE-2016-1958
  Displayed page address can be overridden
* MFSA 2016-23/CVE-2016-1960
  Use-after-free in HTML5 string parser
* MFSA 2016-24/CVE-2016-1961
  Use-after-free in SetBody
* MFSA 2016-25/CVE-2016-1962
  Use-after-free when using multiple WebRTC data channels
* MFSA 2016-27/CVE-2016-1964
  Use-after-free during XML transformations
* MFSA 2016-28/CVE-2016-1965
  Addressbar spoofing though history navigation and Location
  protocol property
* MFSA 2016-31/CVE-2016-1966
  Memory corruption with malicious NPAPI plugin
* MFSA 2016-34/CVE-2016-1974
  Out-of-bounds read in HTML parser following a failed
  allocation
* MFSA 2016-35/CVE-2016-1950
  Buffer overflow during ASN.1 decoding in NSS
* MFSA 2016-37/CVE-2016-1977/CVE-2016-2790/CVE-2016-2791/
  CVE-2016-2792/CVE-2016-2793/CVE-2016-2794/CVE-2016-2795/
  CVE-2016-2796/CVE-2016-2797/CVE-2016-2798/CVE-2016-2799/
  CVE-2016-2800/CVE-2016-2801/CVE-2016-2802
  Font vulnerabilities in the Graphite 2 library

Mozilla NSPR was updated to version 4.12 (bsc#969894), fixing following bugs:
* added a PR_GetEnvSecure function, which attempts to detect if
  the program is being executed with elevated privileges, and
  returns NULL if detected. It is recommended to use this function
  in general purpose library code.
* fixed a memory allocation bug related to the PR_*printf functions
* exported API PR_DuplicateEnvironment, which had already been
  added in NSPR 4.10.9
* added support for FreeBSD aarch64
* several minor correctness and compatibility fixes

Mozilla NSS was updated to fix security issues (bsc#969894):
* MFSA 2016-15/CVE-2016-1978
  Use-after-free in NSS during SSL connections in low memory
* MFSA 2016-35/CVE-2016-1950
  Buffer overflow during ASN.1 decoding in NSS
* MFSA 2016-36/CVE-2016-1979
  Use-after-free during processing of DER encoded keys in NSS
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-11"/>
	<updated date="2016-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1952/">CVE-2016-1952</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1953/">CVE-2016-1953</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1954/">CVE-2016-1954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1957/">CVE-2016-1957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1958/">CVE-2016-1958</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1960/">CVE-2016-1960</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1961/">CVE-2016-1961</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1962/">CVE-2016-1962</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1964/">CVE-2016-1964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1965/">CVE-2016-1965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1966/">CVE-2016-1966</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1974/">CVE-2016-1974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1977/">CVE-2016-1977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1978/">CVE-2016-1978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2790/">CVE-2016-2790</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2791/">CVE-2016-2791</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2792/">CVE-2016-2792</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2793/">CVE-2016-2793</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2794/">CVE-2016-2794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2795/">CVE-2016-2795</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2796/">CVE-2016-2796</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2797/">CVE-2016-2797</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2798/">CVE-2016-2798</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2799/">CVE-2016-2799</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2800/">CVE-2016-2800</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2801/">CVE-2016-2801</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2802/">CVE-2016-2802</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515816" comment="MozillaFirefox-38.7.0esr-63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515817" comment="MozillaFirefox-translations-38.7.0esr-63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515818" comment="libfreebl3-3.20.2-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515819" comment="libfreebl3-32bit-3.20.2-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515820" comment="libsoftokn3-3.20.2-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515821" comment="libsoftokn3-32bit-3.20.2-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515822" comment="mozilla-nspr-4.12-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515823" comment="mozilla-nspr-32bit-4.12-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515824" comment="mozilla-nss-3.20.2-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515825" comment="mozilla-nss-32bit-3.20.2-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515826" comment="mozilla-nss-certs-3.20.2-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515827" comment="mozilla-nss-certs-32bit-3.20.2-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515828" comment="mozilla-nss-sysinit-3.20.2-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515829" comment="mozilla-nss-sysinit-32bit-3.20.2-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515830" comment="mozilla-nss-tools-3.20.2-40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77446" version="1" class="patch">
	<metadata>
		<title>Security update for graphite2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="965803" ref_url="https://bugzilla.suse.com/965803" source="BUGZILLA"/>
		<reference ref_id="965807" ref_url="https://bugzilla.suse.com/965807" source="BUGZILLA"/>
		<reference ref_id="965810" ref_url="https://bugzilla.suse.com/965810" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1521" ref_url="https://www.suse.com/security/cve/CVE-2016-1521/" source="CVE"/>
		<reference ref_id="CVE-2016-1523" ref_url="https://www.suse.com/security/cve/CVE-2016-1523/" source="CVE"/>
		<reference ref_id="CVE-2016-1526" ref_url="https://www.suse.com/security/cve/CVE-2016-1526/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0779-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00052.html" source="SUSE-SU"/>
		<description>

This update for graphite2 fixes the following issues:

- CVE-2016-1521: The directrun function in directmachine.cpp in
  Libgraphite did not validate a certain skip operation, which allowed
  remote attackers to execute arbitrary code, obtain sensitive information,
  or cause a denial of service (out-of-bounds read and application crash)
  via a crafted Graphite smart font.

- CVE-2016-1523: The SillMap::readFace function in FeatureMap.cpp in
  Libgraphite mishandled a return value, which allowed remote attackers
  to cause a denial of service (missing initialization, NULL pointer
  dereference, and application crash) via a crafted Graphite smart font.

- CVE-2016-1526: The TtfUtil:LocaLookup function in TtfUtil.cpp in
  Libgraphite incorrectly validated a size value, which allowed remote
  attackers to obtain sensitive information or cause a denial of service
  (out-of-bounds read and application crash) via a crafted Graphite
  smart font.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-15"/>
	<updated date="2016-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/965803">SUSE bug 965803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965807">SUSE bug 965807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965810">SUSE bug 965810</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1521/">CVE-2016-1521</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1523/">CVE-2016-1523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1526/">CVE-2016-1526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515831" comment="libgraphite2-3-1.3.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515832" comment="libgraphite2-3-32bit-1.3.1-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77447" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="970072" ref_url="https://bugzilla.suse.com/970072" source="BUGZILLA"/>
		<reference ref_id="970073" ref_url="https://bugzilla.suse.com/970073" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1285" ref_url="https://www.suse.com/security/cve/CVE-2016-1285/" source="CVE"/>
		<reference ref_id="CVE-2016-1286" ref_url="https://www.suse.com/security/cve/CVE-2016-1286/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00053.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

Fix two assertion failures that can lead to a remote denial of service attack:
* CVE-2016-1285: An error when parsing signature records for DNAME can lead to named exiting due to an assertion failure. (bsc#970072)
* CVE-2016-1286: An error when parsing signature records for DNAME records having specific properties can lead to named exiting due to an assertion failure in resolver.c or db.c. (bsc#970073)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-15"/>
	<updated date="2016-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/970072">SUSE bug 970072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970073">SUSE bug 970073</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1285/">CVE-2016-1285</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1286/">CVE-2016-1286</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515833" comment="bind-libs-9.9.6P1-28.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515834" comment="bind-libs-32bit-9.9.6P1-28.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515835" comment="bind-utils-9.9.6P1-28.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77448" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="812259" ref_url="https://bugzilla.suse.com/812259" source="BUGZILLA"/>
		<reference ref_id="816099" ref_url="https://bugzilla.suse.com/816099" source="BUGZILLA"/>
		<reference ref_id="855062" ref_url="https://bugzilla.suse.com/855062" source="BUGZILLA"/>
		<reference ref_id="867583" ref_url="https://bugzilla.suse.com/867583" source="BUGZILLA"/>
		<reference ref_id="884701" ref_url="https://bugzilla.suse.com/884701" source="BUGZILLA"/>
		<reference ref_id="899908" ref_url="https://bugzilla.suse.com/899908" source="BUGZILLA"/>
		<reference ref_id="922071" ref_url="https://bugzilla.suse.com/922071" source="BUGZILLA"/>
		<reference ref_id="937444" ref_url="https://bugzilla.suse.com/937444" source="BUGZILLA"/>
		<reference ref_id="940338" ref_url="https://bugzilla.suse.com/940338" source="BUGZILLA"/>
		<reference ref_id="940946" ref_url="https://bugzilla.suse.com/940946" source="BUGZILLA"/>
		<reference ref_id="941363" ref_url="https://bugzilla.suse.com/941363" source="BUGZILLA"/>
		<reference ref_id="943989" ref_url="https://bugzilla.suse.com/943989" source="BUGZILLA"/>
		<reference ref_id="945219" ref_url="https://bugzilla.suse.com/945219" source="BUGZILLA"/>
		<reference ref_id="947953" ref_url="https://bugzilla.suse.com/947953" source="BUGZILLA"/>
		<reference ref_id="949752" ref_url="https://bugzilla.suse.com/949752" source="BUGZILLA"/>
		<reference ref_id="950292" ref_url="https://bugzilla.suse.com/950292" source="BUGZILLA"/>
		<reference ref_id="951155" ref_url="https://bugzilla.suse.com/951155" source="BUGZILLA"/>
		<reference ref_id="955308" ref_url="https://bugzilla.suse.com/955308" source="BUGZILLA"/>
		<reference ref_id="955654" ref_url="https://bugzilla.suse.com/955654" source="BUGZILLA"/>
		<reference ref_id="956084" ref_url="https://bugzilla.suse.com/956084" source="BUGZILLA"/>
		<reference ref_id="956514" ref_url="https://bugzilla.suse.com/956514" source="BUGZILLA"/>
		<reference ref_id="957525" ref_url="https://bugzilla.suse.com/957525" source="BUGZILLA"/>
		<reference ref_id="957986" ref_url="https://bugzilla.suse.com/957986" source="BUGZILLA"/>
		<reference ref_id="959090" ref_url="https://bugzilla.suse.com/959090" source="BUGZILLA"/>
		<reference ref_id="959146" ref_url="https://bugzilla.suse.com/959146" source="BUGZILLA"/>
		<reference ref_id="959257" ref_url="https://bugzilla.suse.com/959257" source="BUGZILLA"/>
		<reference ref_id="959463" ref_url="https://bugzilla.suse.com/959463" source="BUGZILLA"/>
		<reference ref_id="959629" ref_url="https://bugzilla.suse.com/959629" source="BUGZILLA"/>
		<reference ref_id="959709" ref_url="https://bugzilla.suse.com/959709" source="BUGZILLA"/>
		<reference ref_id="960174" ref_url="https://bugzilla.suse.com/960174" source="BUGZILLA"/>
		<reference ref_id="960227" ref_url="https://bugzilla.suse.com/960227" source="BUGZILLA"/>
		<reference ref_id="960458" ref_url="https://bugzilla.suse.com/960458" source="BUGZILLA"/>
		<reference ref_id="960561" ref_url="https://bugzilla.suse.com/960561" source="BUGZILLA"/>
		<reference ref_id="960629" ref_url="https://bugzilla.suse.com/960629" source="BUGZILLA"/>
		<reference ref_id="961257" ref_url="https://bugzilla.suse.com/961257" source="BUGZILLA"/>
		<reference ref_id="961500" ref_url="https://bugzilla.suse.com/961500" source="BUGZILLA"/>
		<reference ref_id="961509" ref_url="https://bugzilla.suse.com/961509" source="BUGZILLA"/>
		<reference ref_id="961516" ref_url="https://bugzilla.suse.com/961516" source="BUGZILLA"/>
		<reference ref_id="961588" ref_url="https://bugzilla.suse.com/961588" source="BUGZILLA"/>
		<reference ref_id="961658" ref_url="https://bugzilla.suse.com/961658" source="BUGZILLA"/>
		<reference ref_id="961971" ref_url="https://bugzilla.suse.com/961971" source="BUGZILLA"/>
		<reference ref_id="962336" ref_url="https://bugzilla.suse.com/962336" source="BUGZILLA"/>
		<reference ref_id="962356" ref_url="https://bugzilla.suse.com/962356" source="BUGZILLA"/>
		<reference ref_id="962788" ref_url="https://bugzilla.suse.com/962788" source="BUGZILLA"/>
		<reference ref_id="962965" ref_url="https://bugzilla.suse.com/962965" source="BUGZILLA"/>
		<reference ref_id="963193" ref_url="https://bugzilla.suse.com/963193" source="BUGZILLA"/>
		<reference ref_id="963449" ref_url="https://bugzilla.suse.com/963449" source="BUGZILLA"/>
		<reference ref_id="963572" ref_url="https://bugzilla.suse.com/963572" source="BUGZILLA"/>
		<reference ref_id="963746" ref_url="https://bugzilla.suse.com/963746" source="BUGZILLA"/>
		<reference ref_id="963765" ref_url="https://bugzilla.suse.com/963765" source="BUGZILLA"/>
		<reference ref_id="963767" ref_url="https://bugzilla.suse.com/963767" source="BUGZILLA"/>
		<reference ref_id="963825" ref_url="https://bugzilla.suse.com/963825" source="BUGZILLA"/>
		<reference ref_id="963960" ref_url="https://bugzilla.suse.com/963960" source="BUGZILLA"/>
		<reference ref_id="964201" ref_url="https://bugzilla.suse.com/964201" source="BUGZILLA"/>
		<reference ref_id="964730" ref_url="https://bugzilla.suse.com/964730" source="BUGZILLA"/>
		<reference ref_id="965199" ref_url="https://bugzilla.suse.com/965199" source="BUGZILLA"/>
		<reference ref_id="965344" ref_url="https://bugzilla.suse.com/965344" source="BUGZILLA"/>
		<reference ref_id="965830" ref_url="https://bugzilla.suse.com/965830" source="BUGZILLA"/>
		<reference ref_id="965840" ref_url="https://bugzilla.suse.com/965840" source="BUGZILLA"/>
		<reference ref_id="965891" ref_url="https://bugzilla.suse.com/965891" source="BUGZILLA"/>
		<reference ref_id="966026" ref_url="https://bugzilla.suse.com/966026" source="BUGZILLA"/>
		<reference ref_id="966094" ref_url="https://bugzilla.suse.com/966094" source="BUGZILLA"/>
		<reference ref_id="966278" ref_url="https://bugzilla.suse.com/966278" source="BUGZILLA"/>
		<reference ref_id="966437" ref_url="https://bugzilla.suse.com/966437" source="BUGZILLA"/>
		<reference ref_id="966471" ref_url="https://bugzilla.suse.com/966471" source="BUGZILLA"/>
		<reference ref_id="966693" ref_url="https://bugzilla.suse.com/966693" source="BUGZILLA"/>
		<reference ref_id="966864" ref_url="https://bugzilla.suse.com/966864" source="BUGZILLA"/>
		<reference ref_id="966910" ref_url="https://bugzilla.suse.com/966910" source="BUGZILLA"/>
		<reference ref_id="967802" ref_url="https://bugzilla.suse.com/967802" source="BUGZILLA"/>
		<reference ref_id="968018" ref_url="https://bugzilla.suse.com/968018" source="BUGZILLA"/>
		<reference ref_id="968074" ref_url="https://bugzilla.suse.com/968074" source="BUGZILLA"/>
		<reference ref_id="968206" ref_url="https://bugzilla.suse.com/968206" source="BUGZILLA"/>
		<reference ref_id="968230" ref_url="https://bugzilla.suse.com/968230" source="BUGZILLA"/>
		<reference ref_id="968234" ref_url="https://bugzilla.suse.com/968234" source="BUGZILLA"/>
		<reference ref_id="968253" ref_url="https://bugzilla.suse.com/968253" source="BUGZILLA"/>
		<reference ref_id="969112" ref_url="https://bugzilla.suse.com/969112" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7446" ref_url="https://www.suse.com/security/cve/CVE-2013-7446/" source="CVE"/>
		<reference ref_id="CVE-2015-5707" ref_url="https://www.suse.com/security/cve/CVE-2015-5707/" source="CVE"/>
		<reference ref_id="CVE-2015-8709" ref_url="https://www.suse.com/security/cve/CVE-2015-8709/" source="CVE"/>
		<reference ref_id="CVE-2015-8767" ref_url="https://www.suse.com/security/cve/CVE-2015-8767/" source="CVE"/>
		<reference ref_id="CVE-2015-8785" ref_url="https://www.suse.com/security/cve/CVE-2015-8785/" source="CVE"/>
		<reference ref_id="CVE-2015-8812" ref_url="https://www.suse.com/security/cve/CVE-2015-8812/" source="CVE"/>
		<reference ref_id="CVE-2016-0723" ref_url="https://www.suse.com/security/cve/CVE-2016-0723/" source="CVE"/>
		<reference ref_id="CVE-2016-0774" ref_url="https://www.suse.com/security/cve/CVE-2016-0774/" source="CVE"/>
		<reference ref_id="CVE-2016-2069" ref_url="https://www.suse.com/security/cve/CVE-2016-2069/" source="CVE"/>
		<reference ref_id="CVE-2016-2384" ref_url="https://www.suse.com/security/cve/CVE-2016-2384/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00054.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 kernel was updated to 3.12.55 to receive various security and bugfixes.

Features added:
- A improved XEN blkfront module was added, which allows more I/O bandwidth. (FATE#320625)
  It is called xen-blkfront in PV, and xen-vbd-upstream in HVM mode.

The following security bugs were fixed:
- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in
  the Linux kernel allowed local users to bypass intended AF_UNIX socket
  permissions or cause a denial of service (panic) via crafted epoll_ctl
  calls (bnc#955654).
- CVE-2015-5707: Integer overflow in the sg_start_req function in
  drivers/scsi/sg.c in the Linux kernel allowed local users to cause a
  denial of service or possibly have unspecified other impact via a large
  iov_count value in a write request (bnc#940338).
- CVE-2015-8709: kernel/ptrace.c in the Linux kernel mishandled uid and
  gid mappings, which allowed local users to gain privileges by establishing
  a user namespace, waiting for a root process to enter that namespace
  with an unsafe uid or gid, and then using the ptrace system call.  NOTE:
  the vendor states 'there is no kernel bug here' (bnc#959709 bnc#960561).
- CVE-2015-8767: net/sctp/sm_sideeffect.c in the Linux kernel did not
  properly manage the relationship between a lock and a socket, which
  allowed local users to cause a denial of service (deadlock) via a crafted
  sctp_accept call (bnc#961509).
- CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c
  in the Linux kernel allowed local users to cause a denial of service
  (infinite loop) via a writev system call that triggers a zero length
  for the first segment of an iov (bnc#963765).
- CVE-2015-8812: A use-after-free flaw was found in the CXGB3 kernel
  driver when the network was considered to be congested. This could be
  used by local attackers to cause machine crashes or potentially code
  executuon (bsc#966437).
- CVE-2016-0723: Race condition in the tty_ioctl function in
  drivers/tty/tty_io.c in the Linux kernel allowed local users to obtain
  sensitive information from kernel memory or cause a denial of service
  (use-after-free and system crash) by making a TIOCGETD ioctl call during
  processing of a TIOCSETD ioctl call (bnc#961500).
- CVE-2016-0774: A pipe buffer state corruption after unsuccessful atomic
  read from pipe was fixed (bsc#964730).
- CVE-2016-2069: Race conditions in TLB syncing was fixed which could
  leak to information leaks (bnc#963767).
- CVE-2016-2384: A double-free triggered by invalid USB descriptor in
  ALSA usb-audio was fixed, which could be exploited by physical local
  attackers to crash the kernel or gain code execution (bnc#966693).

The following non-security bugs were fixed:
- alsa: rawmidi: Make snd_rawmidi_transmit() race-free (bsc#968018).
- alsa: seq: Fix leak of pool buffer at concurrent writes (bsc#968018).
- be2net: fix some log messages (bnc#855062 FATE#315961, bnc#867583).
- block: xen-blkfront: Fix possible NULL ptr dereference (bsc#957986 fate#320625).
- btrfs: Add handler for invalidate page (bsc#963193).
- btrfs: check prepare_uptodate_page() error code earlier (bnc#966910).
- btrfs: delayed_ref: Add new function to record reserved space into delayed ref (bsc#963193).
- btrfs: delayed_ref: release and free qgroup reserved at proper timing (bsc#963193).
- btrfs: extent_io: Introduce needed structure for recoding set/clear bits (bsc#963193).
- btrfs: extent_io: Introduce new function clear_record_extent_bits() (bsc#963193).
- btrfs: extent_io: Introduce new function set_record_extent_bits (bsc#963193).
- btrfs: extent-tree: Add new version of btrfs_check_data_free_space and btrfs_free_reserved_data_space (bsc#963193).
- btrfs: extent-tree: Add new version of btrfs_delalloc_reserve/release_space (bsc#963193).
- btrfs: extent-tree: Switch to new check_data_free_space and free_reserved_data_space (bsc#963193).
- btrfs: extent-tree: Switch to new delalloc space reserve and release (bsc#963193).
- btrfs: fallocate: Add support to accurate qgroup reserve (bsc#963193).
- btrfs: fix deadlock between direct IO write and defrag/readpages (bnc#965344).
- btrfs: fix invalid page accesses in extent_same (dedup) ioctl (bnc#968230).
- btrfs: fix page reading in extent_same ioctl leading to csum errors (bnc#968230).
- btrfs: fix warning in backref walking (bnc#966278).
- btrfs: qgroup: Add handler for NOCOW and inline (bsc#963193).
- btrfs: qgroup: Add new trace point for qgroup data reserve (bsc#963193).
- btrfs: qgroup: Avoid calling btrfs_free_reserved_data_space in clear_bit_hook (bsc#963193).
- btrfs: qgroup: Check if qgroup reserved space leaked (bsc#963193).
- btrfs: qgroup: Cleanup old inaccurate facilities (bsc#963193).
- btrfs: qgroup: Fix a race in delayed_ref which leads to abort trans (bsc#963193).
- btrfs: qgroup: Fix a rebase bug which will cause qgroup double free (bsc#963193).
- btrfs: qgroup: Introduce btrfs_qgroup_reserve_data function (bsc#963193).
- btrfs: qgroup: Introduce functions to release/free qgroup reserve data space (bsc#963193).
- btrfs: qgroup: Introduce new functions to reserve/free metadata (bsc#963193).
- btrfs: qgroup: Use new metadata reservation (bsc#963193).
- btrfs: skip locking when searching commit root (bnc#963825).
- dcache: use IS_ROOT to decide where dentry is hashed (bsc#949752).
- documentation: Document kernel.panic_on_io_nmi sysctl (bsc#940946, bsc#937444).
- documentation: Fix build of PDF files in kernel-docs package Double the spaces for tex, and fix buildrequires for docbook.
- doc: Use fop for creating PDF files in kernel-docs package as some files still cannot be built with the default backend.
- driver core: Add BUS_NOTIFY_REMOVED_DEVICE event (bnc#962965).
- drivers: xen-blkfront: only talk_to_blkback() when in XenbusStateInitialising (bsc#957986 fate#320625).
- driver: xen-blkfront: move talk_to_blkback to a more suitable place (bsc#957986 fate#320625).
- ec2: updated kabi files and start tracking
- fs: Improve fairness when locking the per-superblock s_anon list (bsc#957525, bsc#941363).
- fs/proc_namespace.c: simplify testing nsp and nsp-&gt;mnt_ns (bug#963960).
- fuse: break infinite loop in fuse_fill_write_pages() (bsc#963765).
- futex: Drop refcount if requeue_pi() acquired the rtmutex (bug#960174).
- jbd2: Fix unreclaimed pages after truncate in data=journal mode (bsc#961516).
- kabi: Preserve checksum of kvm_x86_ops (bsc#969112).
- kABI: protect struct af_alg_type.
- kABI: protect struct crypto_ahash.
- kABI: reintroduce blk_rq_check_limits.
- kabi/severities: Fail on changes in kvm_x86_ops, needed by lttng-modules
- kernel: Change ASSIGN_ONCE(val, x) to WRITE_ONCE(x, val) (bsc#940946, bsc#937444).
- kernel: Provide READ_ONCE and ASSIGN_ONCE (bsc#940946, bsc#937444).
- kernel/watchdog.c: perform all-CPU backtrace in case of hard lockup (bsc#940946, bsc#937444).
- kexec: Fix race between panic() and crash_kexec() (bsc#940946, bsc#937444).
- kgr: do not print error for !abort_if_missing symbols (bnc#943989).
- kgr: do not use WQ_MEM_RECLAIM workqueue (bnc#963572).
- kgr: log when modifying kernel (fate#317827).
- kgr: mark some more missed kthreads (bnc#962336).
- kgr: usb/storage: do not emit thread awakened (bnc#899908).
- kvm: x86: Check dest_map-&gt;vector to match eoi signals for rtc (bsc#966471).
- kvm: x86: Convert ioapic-&gt;rtc_status.dest_map to a struct (bsc#966471).
- kvm: x86: store IOAPIC-handled vectors in each VCPU (bsc#966471).
- kvm: x86: Track irq vectors in ioapic-&gt;rtc_status.dest_map (bsc#966471).
- libceph: fix scatterlist last_piece calculation (bsc#963746).
- megaraid_sas: Chip reset if driver fails to get IOC ready (bsc#922071). Refresh the patch based on the actual upstream commit, and add the commit ID.
- mm/memory_hotplug.c: check for missing sections in test_pages_in_a_zone() (VM Functionality, bnc#961588).
- module: keep percpu symbols in module's symtab (bsc#962788).
- namespaces: Re-introduce task_nsproxy() helper (bug#963960).
- namespaces: Use task_lock and not rcu to protect nsproxy (bug#963960).
- net: core: Correct an over-stringent device loop detection (bsc#945219).
- nfs: Background flush should not be low priority (bsc#955308).
- nfsd: Do not start lockd when only NFSv4 is running (fate#316311).
- nfs: do not use STABLE writes during writeback (bnc#816099).
- nfs: Fix handling of re-write-before-commit for mmapped NFS pages (bsc#964201).
- nfs: Move nfsd patch to the right section
- nfsv4: Recovery of recalled read delegations is broken (bsc#956514).
- nmi: provide the option to issue an NMI back trace to every cpu but current (bsc#940946, bsc#937444).
- nmi: provide the option to issue an NMI back trace to every cpu but current (bsc#940946, bsc#937444).
- panic, x86: Allow CPUs to save registers even if looping in NMI context (bsc#940946, bsc#937444).
- panic, x86: Fix re-entrance problem due to panic on NMI (bsc#940946, bsc#937444).
- pci: allow access to VPD attributes with size 0 (bsc#959146).
- pciback: Check PF instead of VF for PCI_COMMAND_MEMORY.
- pciback: Save the number of MSI-X entries to be copied later.
- pci: Blacklist vpd access for buggy devices (bsc#959146).
- pci: Determine actual VPD size on first access (bsc#959146).
- pci: Update VPD definitions (bsc#959146).
- perf: Do not modify perf bias performance setting by default at boot (bnc#812259,bsc#959629).
- proc: Fix ptrace-based permission checks for accessing task maps.
- rpm/constraints.in: Bump disk space requirements up a bit Require 10GB on s390x, 20GB elsewhere.
- rpm/kernel-binary.spec.in: Fix build if no UEFI certs are installed
- rpm/kernel-binary.spec.in: Fix kernel-vanilla-devel dependency (bsc#959090)
- rpm/kernel-binary.spec.in: Fix paths in kernel-vanilla-devel (bsc#959090).
- rpm/kernel-binary.spec.in: Install libopenssl-devel for newer sign-file
- rpm/kernel-binary.spec.in: Sync the main and -base package dependencies (bsc#965830#c51).
- rpm/kernel-binary.spec.in: Use bzip compression to speed up build (bsc#962356)
- rpm/kernel-module-subpackage: Fix obsoleting dropped flavors (bsc#968253)
- rpm/kernel-source.spec.in: Install kernel-macros for kernel-source-vanilla (bsc#959090)
- rpm/kernel-spec-macros: Do not modify the release string in PTFs (bsc#963449)
- rpm/package-descriptions: Add kernel-zfcpdump and drop -desktop
- sched/fair: Disable tg load_avg/runnable_avg update for root_task_group (bnc#960227).
- sched/fair: Move cache hot load_avg/runnable_avg into separate cacheline (bnc#960227).
- sched: Fix race between task_group and sched_task_group (Automatic NUMA Balancing (fate#315482))
- scsi: Add sd_mod to initrd modules For some reason PowerVM backend can't work without sd_mod
- scsi_dh_alua: Do not block request queue if workqueue is active (bsc#960458).
- scsi: fix soft lockup in scsi_remove_target() on module removal (bsc#965199).
- scsi: restart list search after unlock in scsi_remove_target (bsc#959257).
- series.conf: add section comments
- supported.conf: Add e1000e (emulated by VMware) to -base (bsc#968074)
- supported.conf: Add Hyper-V modules to -base (bsc#965830)
- supported.conf: Add more QEMU and VMware drivers to -base (bsc#965840).
- supported.conf: Add more qemu device driver (bsc#968234)
- supported.conf: Add mptspi and mptsas to -base (bsc#968206)
- supported.conf: Add netfilter modules to base (bsc#950292)
- supported.conf: Add nls_iso8859-1 and nls_cp437 to -base (bsc#950292)
- supported.conf: Add the qemu scsi driver (sym53c8xx) to -base (bsc#967802)
- supported.conf: Add tulip to -base for Hyper-V (bsc#968234)
- supported.conf: Add vfat to -base to be able to mount the ESP (bsc#950292).
- supported.conf: Add virtio_{blk,net,scsi} to kernel-default-base (bsc#950292)
- supported.conf: Add virtio-rng (bsc#966026)
- supported.conf: Add xen-blkfront.
- supported.conf: Add xfs to -base (bsc#965891)
- supported.conf: Also add virtio_pci to kernel-default-base (bsc#950292).
- supported.conf: drop +external from ghash-clmulni-intel It was agreed that it does not make sense to maintain 'external' for this specific module. Furthermore it causes problems in rather ordinary VMware environments. (bsc#961971)
- supported.conf: Fix usb-common path usb-common moved to its own subdirectory in kernel v3.16, and we backported that change to SLE12.
- tcp: Restore RFC5961-compliant behavior for SYN packets (bsc#966864).
- usb: Quiet down false peer failure messages (bnc#960629).
- x86/apic: Introduce apic_extnmi command line parameter (bsc#940946, bsc#937444).
- x86/nmi: Save regs in crash dump on external NMI (bsc#940946, bsc#937444).
- x86/nmi: Save regs in crash dump on external NMI (bsc#940946, bsc#937444).
- xen: Add /etc/modprobe.d/50-xen.conf selecting Xen frontend driver implementation (bsc#957986, bsc#956084, bsc#961658).
- xen-blkfront: allow building in our Xen environment (bsc#957986 fate#320625).
- xen, blkfront: factor out flush-related checks from do_blkif_request() (bsc#957986 fate#320625).
- xen-blkfront: fix accounting of reqs when migrating (bsc#957986 fate#320625).
- xen/blkfront: Fix crash if backend does not follow the right states (bsc#957986 fate#320625).
- xen-blkfront: improve aproximation of required grants per request (bsc#957986 fate#320625).
- xen/blkfront: improve protection against issuing unsupported REQ_FUA (bsc#957986 fate#320625).
- xen/blkfront: remove redundant flush_op (bsc#957986 fate#320625).
- xen-blkfront: remove type check from blkfront_setup_discard (bsc#957986 fate#320625).
- xen-blkfront: Silence pfn maybe-uninitialized warning (bsc#957986 fate#320625).
- xen: Linux 3.12.52.
- xen: Refresh patches.xen/xen3-patch-3.9 (bsc#951155).
- xen: Refresh patches.xen/xen3-patch-3.9 (do not subvert NX protection during 1:1 mapping setup).
- xen-vscsi-large-requests: Fix resource collision for racing request maps and unmaps (bsc#966094).
- xen: Xen config files updated to enable upstream block frontend.
- xfs: add a few more verifier tests (bsc#947953).
- xfs: fix double free in xlog_recover_commit_trans (bsc#947953).
- xfs: recovery of XLOG_UNMOUNT_TRANS leaks memory (bsc#947953).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-16"/>
	<updated date="2016-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/812259">SUSE bug 812259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816099">SUSE bug 816099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855062">SUSE bug 855062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867583">SUSE bug 867583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884701">SUSE bug 884701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899908">SUSE bug 899908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922071">SUSE bug 922071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937444">SUSE bug 937444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940338">SUSE bug 940338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940946">SUSE bug 940946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941363">SUSE bug 941363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943989">SUSE bug 943989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945219">SUSE bug 945219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947953">SUSE bug 947953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949752">SUSE bug 949752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950292">SUSE bug 950292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951155">SUSE bug 951155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955308">SUSE bug 955308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955654">SUSE bug 955654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956084">SUSE bug 956084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956514">SUSE bug 956514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957525">SUSE bug 957525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957986">SUSE bug 957986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959090">SUSE bug 959090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959146">SUSE bug 959146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959257">SUSE bug 959257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959463">SUSE bug 959463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959629">SUSE bug 959629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959709">SUSE bug 959709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960174">SUSE bug 960174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960227">SUSE bug 960227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960458">SUSE bug 960458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960561">SUSE bug 960561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960629">SUSE bug 960629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961257">SUSE bug 961257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961500">SUSE bug 961500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961509">SUSE bug 961509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961516">SUSE bug 961516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961588">SUSE bug 961588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961658">SUSE bug 961658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961971">SUSE bug 961971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962336">SUSE bug 962336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962356">SUSE bug 962356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962788">SUSE bug 962788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962965">SUSE bug 962965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963193">SUSE bug 963193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963449">SUSE bug 963449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963572">SUSE bug 963572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963746">SUSE bug 963746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963765">SUSE bug 963765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963767">SUSE bug 963767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963825">SUSE bug 963825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963960">SUSE bug 963960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964201">SUSE bug 964201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964730">SUSE bug 964730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965199">SUSE bug 965199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965344">SUSE bug 965344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965830">SUSE bug 965830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965840">SUSE bug 965840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965891">SUSE bug 965891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966026">SUSE bug 966026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966094">SUSE bug 966094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966278">SUSE bug 966278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966437">SUSE bug 966437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966471">SUSE bug 966471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966693">SUSE bug 966693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966864">SUSE bug 966864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966910">SUSE bug 966910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967802">SUSE bug 967802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968018">SUSE bug 968018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968074">SUSE bug 968074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968206">SUSE bug 968206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968230">SUSE bug 968230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968234">SUSE bug 968234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968253">SUSE bug 968253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969112">SUSE bug 969112</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7446/">CVE-2013-7446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5707/">CVE-2015-5707</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8709/">CVE-2015-8709</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8767/">CVE-2015-8767</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8785/">CVE-2015-8785</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8812/">CVE-2015-8812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0723/">CVE-2016-0723</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0774/">CVE-2016-0774</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2069/">CVE-2016-2069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2384/">CVE-2016-2384</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515836" comment="kernel-default-3.12.55-52.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515837" comment="kernel-default-devel-3.12.55-52.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515838" comment="kernel-default-extra-3.12.55-52.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515839" comment="kernel-devel-3.12.55-52.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515840" comment="kernel-macros-3.12.55-52.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515841" comment="kernel-source-3.12.55-52.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515842" comment="kernel-syms-3.12.55-52.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515843" comment="kernel-xen-3.12.55-52.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515844" comment="kernel-xen-devel-3.12.55-52.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77449" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="953382" ref_url="https://bugzilla.suse.com/953382" source="BUGZILLA"/>
		<reference ref_id="953972" ref_url="https://bugzilla.suse.com/953972" source="BUGZILLA"/>
		<reference ref_id="960249" ref_url="https://bugzilla.suse.com/960249" source="BUGZILLA"/>
		<reference ref_id="962177" ref_url="https://bugzilla.suse.com/962177" source="BUGZILLA"/>
		<reference ref_id="968222" ref_url="https://bugzilla.suse.com/968222" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7560" ref_url="https://www.suse.com/security/cve/CVE-2015-7560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00064.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issues:

- CVE-2015-7560: Getting and setting Windows ACLs on symlinks can change permissions on link 
  target. (bso#11648 bsc#968222)

Also the following bugs were fixed:
- Add quotes around path of update-apparmor-samba-profile; (bsc#962177).
- Prevent access denied if the share path is '/'; (bso#11647); (bsc#960249).
- Ensure samlogon fallback requests are rerouted after kerberos failure; (bsc#953382).
- samba: winbind crash -&gt; netlogon_creds_client_authenticator; (bsc#953972).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-18"/>
	<updated date="2016-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/953382">SUSE bug 953382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953972">SUSE bug 953972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960249">SUSE bug 960249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962177">SUSE bug 962177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968222">SUSE bug 968222</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7560/">CVE-2015-7560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515845" comment="libdcerpc-binding0-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515846" comment="libdcerpc-binding0-32bit-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515847" comment="libdcerpc0-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515848" comment="libdcerpc0-32bit-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515849" comment="libgensec0-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515850" comment="libgensec0-32bit-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515851" comment="libndr-krb5pac0-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515852" comment="libndr-krb5pac0-32bit-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515853" comment="libndr-nbt0-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515854" comment="libndr-nbt0-32bit-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515855" comment="libndr-standard0-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515856" comment="libndr-standard0-32bit-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515857" comment="libndr0-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515858" comment="libndr0-32bit-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515859" comment="libnetapi0-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515860" comment="libnetapi0-32bit-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515861" comment="libpdb0-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515862" comment="libpdb0-32bit-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515863" comment="libregistry0-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515864" comment="libsamba-credentials0-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515865" comment="libsamba-credentials0-32bit-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515866" comment="libsamba-hostconfig0-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515867" comment="libsamba-hostconfig0-32bit-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515868" comment="libsamba-util0-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515869" comment="libsamba-util0-32bit-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515870" comment="libsamdb0-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515871" comment="libsamdb0-32bit-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515872" comment="libsmbclient-raw0-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515873" comment="libsmbclient-raw0-32bit-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515874" comment="libsmbclient0-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515875" comment="libsmbclient0-32bit-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515876" comment="libsmbconf0-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515877" comment="libsmbconf0-32bit-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515878" comment="libsmbldap0-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515879" comment="libsmbldap0-32bit-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515880" comment="libtevent-util0-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515881" comment="libtevent-util0-32bit-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515882" comment="libwbclient0-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515883" comment="libwbclient0-32bit-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515884" comment="samba-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515885" comment="samba-32bit-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515886" comment="samba-client-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515887" comment="samba-client-32bit-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515888" comment="samba-doc-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515889" comment="samba-libs-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515890" comment="samba-libs-32bit-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515891" comment="samba-winbind-4.1.12-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515892" comment="samba-winbind-32bit-4.1.12-18.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77450" version="1" class="patch">
	<metadata>
		<title>Security update for libqt4 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="865241" ref_url="https://bugzilla.suse.com/865241" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-403" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00000.html" source="SUSE-SU"/>
		<description>

This update for libqt4 fixes the following issues:

Various unsafe SSL ciphers have been disabled in the standard SSL classes.
Also the RC4 based ciphers have been disabled. (bsc#865241)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-22"/>
	<updated date="2016-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/865241">SUSE bug 865241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515893" comment="libqt4-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515894" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515895" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515896" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515897" comment="libqt4-sql-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515898" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515899" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515900" comment="libqt4-sql-mysql-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515901" comment="libqt4-sql-postgresql-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515902" comment="libqt4-sql-postgresql-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515903" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515904" comment="libqt4-sql-sqlite-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515905" comment="libqt4-sql-unixODBC-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515906" comment="libqt4-sql-unixODBC-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515907" comment="libqt4-x11-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515908" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77451" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="939342" ref_url="https://bugzilla.suse.com/939342" source="BUGZILLA"/>
		<reference ref_id="963017" ref_url="https://bugzilla.suse.com/963017" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3228" ref_url="https://www.suse.com/security/cve/CVE-2015-3228/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001968.html" source="SUSE-SU"/>
		<description>
ghostscript was updated to fix one security issue and one bug.

The following vulnerability was fixed:

* CVE-2015-3228: Specially crafted ps files could have caused an out of
  bound read/write due to an integer overflow, causing a segfault in the
  application or having unspecified further impact.

Also a non security bug was fixed:
- fix a crash in mutex handling (bsc#963017)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-24"/>
	<updated date="2016-03-24"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/939342">SUSE bug 939342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963017">SUSE bug 963017</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3228/">CVE-2015-3228</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515909" comment="ghostscript-9.15-6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515910" comment="ghostscript-x11-9.15-6.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77452" version="1" class="patch">
	<metadata>
		<title>Security update for pidgin-otr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="970498" ref_url="https://bugzilla.suse.com/970498" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8833" ref_url="https://www.suse.com/security/cve/CVE-2015-8833/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00095.html" source="SUSE-SU"/>
		<description>

This update for pidgin-otr fixes the following issues:

- CVE-2015-8833: A heap based use-after-free issue was fixed in pidgin-otr
  that could lead to crashes or potential code execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-30"/>
	<updated date="2016-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/970498">SUSE bug 970498</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8833/">CVE-2015-8833</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515911" comment="pidgin-otr-4.0.0-8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77453" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="972468" ref_url="https://bugzilla.suse.com/972468" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0636" ref_url="https://www.suse.com/security/cve/CVE-2016-0636/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0959-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00005.html" source="SUSE-SU"/>
		<description>

The OpenJDK Java java-1_7_0-openjdk was updated to 2.6.5 to fix the following issues:

Update to 2.6.5 - OpenJDK 7u99 (bsc#972468)
* Security fixes
  - S8152335, CVE-2016-0636: Improve MethodHandle consistency
* Import of OpenJDK 7 u99 build 0
  - S6425769, PR2858: Allow specifying an address to bind JMX
    remote connector
  - S6961123: setWMClass fails to null-terminate WM_CLASS string
  - S8145982, PR2858: JMXInterfaceBindingTest is failing
    intermittently
  - S8146015, PR2858: JMXInterfaceBindingTest is failing
    intermittently for IPv6 addresses
* Backports
  - S8028727, PR2814: [parfait] warnings from b116 for
   jdk.src.share.native.sun.security.ec: JNI pending exceptions
  - S8048512, PR2814: Uninitialised memory in
    jdk/src/share/native/sun/security/ec/ECC_JNI.cpp
  - S8071705. PR2819, RH1182694: Java application menu misbehaves
    when running multiple screen stacked vertically
  - S8150954, PR2866, RH1176206: AWT Robot not compatible with
    GNOME Shell
* Bug fixes
  - PR2803: Make system CUPS optional
  - PR2886: Location of 'stap' executable is hard-coded
  - PR2893: test/tapset/jstaptest.pl should be executable
  - PR2894: Add missing test directory in make check.
* CACAO
  - PR2781, CA195: typeinfo.cpp: typeinfo_merge_nonarrays:
    Assertion `dest &amp;&amp; result &amp;&amp; x.any &amp;&amp; y.any' failed
* AArch64 port
  - PR2852: Add support for large code cache
  - PR2852: Apply ReservedCodeCacheSize default limiting to
    AArch64 only.
  - S8081289, PR2852: aarch64: add support for
    RewriteFrequentPairs in interpreter
  - S8131483, PR2852: aarch64: illegal stlxr instructions
  - S8133352, PR2852: aarch64: generates constrained unpredictable
    instructions
  - S8133842, PR2852: aarch64: C2 generates illegal instructions
    with int shifts &gt;=32
  - S8134322, PR2852: AArch64: Fix several errors in C2 biased
    locking implementation
  - S8136615, PR2852: aarch64: elide DecodeN when followed by
    CmpP 0
  - S8138575, PR2852: Improve generated code for profile counters
  - S8138641, PR2852: Disable C2 peephole by default for aarch64
  - S8138966, PR2852: Intermittent SEGV running ParallelGC
  - S8143067, PR2852: aarch64: guarantee failure in javac
  - S8143285, PR2852: aarch64: Missing load acquire when checking
    if ConstantPoolCacheEntry is resolved
  - S8143584, PR2852: Load constant pool tag and class status with
 load acquire
  - S8144201, PR2852: aarch64:
    jdk/test/com/sun/net/httpserver/Test6a.java fails with
    --enable-unlimited-crypto
  - S8144582, PR2852: AArch64 does not generate correct branch
    profile data
  - S8146709, PR2852: AArch64: Incorrect use of ADRP for
    byte_map_base
  - S8147805, PR2852: aarch64: C1 segmentation fault due to inline
    Unsafe.getAndSetObject
  - S8148240, PR2852: aarch64: random infrequent null pointer
    exceptions in javac
* PPC &amp; AIX port
  - S8034797, PR2851: AIX: Fix os::naked_short_sleep() in
    os_aix.cpp after 8028280
  - S8139258, PR2851: PPC64LE: argument passing problem when
    passing 15 floats in native call
  - S8139421, PR2851: PPC64LE: MacroAssembler::bxx64_patchable
    kill register R12

Update to 2.6.5 - OpenJDK 7u99 (bsc#972468)
* Security fixes
  - S8152335, CVE-2016-0636: Improve MethodHandle consistency
* Import of OpenJDK 7 u99 build 0
  - S6425769, PR2858: Allow specifying an address to bind JMX
    remote connector
  - S6961123: setWMClass fails to null-terminate WM_CLASS string
  - S8145982, PR2858: JMXInterfaceBindingTest is failing
    intermittently
  - S8146015, PR2858: JMXInterfaceBindingTest is failing
    intermittently for IPv6 addresses
* Backports
  - S8028727, PR2814: [parfait] warnings from b116 for
   jdk.src.share.native.sun.security.ec: JNI pending exceptions
  - S8048512, PR2814: Uninitialised memory in
    jdk/src/share/native/sun/security/ec/ECC_JNI.cpp
  - S8071705. PR2819, RH1182694: Java application menu misbehaves
    when running multiple screen stacked vertically
  - S8150954, PR2866, RH1176206: AWT Robot not compatible with
    GNOME Shell
* Bug fixes
  - PR2803: Make system CUPS optional
  - PR2886: Location of 'stap' executable is hard-coded
  - PR2893: test/tapset/jstaptest.pl should be executable
  - PR2894: Add missing test directory in make check.
* CACAO
  - PR2781, CA195: typeinfo.cpp: typeinfo_merge_nonarrays:
    Assertion `dest &amp;&amp; result &amp;&amp; x.any &amp;&amp; y.any' failed
* AArch64 port
  - PR2852: Add support for large code cache
  - PR2852: Apply ReservedCodeCacheSize default limiting to
    AArch64 only.
  - S8081289, PR2852: aarch64: add support for
    RewriteFrequentPairs in interpreter
  - S8131483, PR2852: aarch64: illegal stlxr instructions
  - S8133352, PR2852: aarch64: generates constrained unpredictable
    instructions
  - S8133842, PR2852: aarch64: C2 generates illegal instructions
    with int shifts &gt;=32
  - S8134322, PR2852: AArch64: Fix several errors in C2 biased
    locking implementation
  - S8136615, PR2852: aarch64: elide DecodeN when followed by
    CmpP 0
  - S8138575, PR2852: Improve generated code for profile counters
  - S8138641, PR2852: Disable C2 peephole by default for aarch64
  - S8138966, PR2852: Intermittent SEGV running ParallelGC
  - S8143067, PR2852: aarch64: guarantee failure in javac
  - S8143285, PR2852: aarch64: Missing load acquire when checking
    if ConstantPoolCacheEntry is resolved
  - S8143584, PR2852: Load constant pool tag and class status with
 load acquire
  - S8144201, PR2852: aarch64:
    jdk/test/com/sun/net/httpserver/Test6a.java fails with
    --enable-unlimited-crypto
  - S8144582, PR2852: AArch64 does not generate correct branch
    profile data
  - S8146709, PR2852: AArch64: Incorrect use of ADRP for
    byte_map_base
  - S8147805, PR2852: aarch64: C1 segmentation fault due to inline
    Unsafe.getAndSetObject
  - S8148240, PR2852: aarch64: random infrequent null pointer
    exceptions in javac
* PPC &amp; AIX port
  - S8034797, PR2851: AIX: Fix os::naked_short_sleep() in
    os_aix.cpp after 8028280
  - S8139258, PR2851: PPC64LE: argument passing problem when
    passing 15 floats in native call
  - S8139421, PR2851: PPC64LE: MacroAssembler::bxx64_patchable
    kill register R12
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-05"/>
	<updated date="2016-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/972468">SUSE bug 972468</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0636/">CVE-2016-0636</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515912" comment="java-1_7_0-openjdk-1.7.0.99-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515913" comment="java-1_7_0-openjdk-headless-1.7.0.99-27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77454" version="1" class="patch">
	<metadata>
		<title>Security update for gcc5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="939460" ref_url="https://bugzilla.suse.com/939460" source="BUGZILLA"/>
		<reference ref_id="945842" ref_url="https://bugzilla.suse.com/945842" source="BUGZILLA"/>
		<reference ref_id="952151" ref_url="https://bugzilla.suse.com/952151" source="BUGZILLA"/>
		<reference ref_id="953831" ref_url="https://bugzilla.suse.com/953831" source="BUGZILLA"/>
		<reference ref_id="954002" ref_url="https://bugzilla.suse.com/954002" source="BUGZILLA"/>
		<reference ref_id="955382" ref_url="https://bugzilla.suse.com/955382" source="BUGZILLA"/>
		<reference ref_id="962765" ref_url="https://bugzilla.suse.com/962765" source="BUGZILLA"/>
		<reference ref_id="964468" ref_url="https://bugzilla.suse.com/964468" source="BUGZILLA"/>
		<reference ref_id="966220" ref_url="https://bugzilla.suse.com/966220" source="BUGZILLA"/>
		<reference ref_id="968771" ref_url="https://bugzilla.suse.com/968771" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001987.html" source="SUSE-SU"/>
		<description>

The GNU Compiler Collection was updated to version 5.3.1, which brings several fixes
and enhancements.

The following security issue has been fixed:

- Fix C++11 std::random_device short read issue that could lead to predictable
  randomness. (CVE-2015-5276, bsc#945842)

The following non-security issues have been fixed:

- Enable frame pointer for TARGET_64BIT_MS_ABI when stack is misaligned. Fixes internal
  compiler error when building Wine. (bsc#966220)
- Fix a PowerPC specific issue in gcc-go that broke compilation of newer versions of
  Docker. (bsc#964468)
- Fix HTM built-ins on PowerPC. (bsc#955382)
- Fix libgo certificate lookup. (bsc#953831)
- Suppress deprecated-declarations warnings for inline definitions of deprecated virtual
  methods. (bsc#939460)
- Build s390[x] with '--with-tune=z9-109 --with-arch=z900' on SLE11 again. (bsc#954002)
- Revert accidental libffi ABI breakage on aarch64. (bsc#968771)
- On x86_64, set default 32bit code generation to -march=x86-64 rather than -march=i586.
- Add experimental File System TS library.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-06"/>
	<updated date="2016-04-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/939460">SUSE bug 939460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945842">SUSE bug 945842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952151">SUSE bug 952151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953831">SUSE bug 953831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954002">SUSE bug 954002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955382">SUSE bug 955382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962765">SUSE bug 962765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964468">SUSE bug 964468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966220">SUSE bug 966220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968771">SUSE bug 968771</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515914" comment="libasan2-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515915" comment="libasan2-32bit-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515916" comment="libatomic1-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515917" comment="libatomic1-32bit-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515918" comment="libcilkrts5-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515919" comment="libcilkrts5-32bit-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515920" comment="libffi4-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515921" comment="libffi4-32bit-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515922" comment="libgcc_s1-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515923" comment="libgcc_s1-32bit-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515924" comment="libgfortran3-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515925" comment="libgfortran3-32bit-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515926" comment="libgomp1-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515927" comment="libgomp1-32bit-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515928" comment="libitm1-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515929" comment="libitm1-32bit-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515930" comment="liblsan0-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515931" comment="libmpx0-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515932" comment="libmpx0-32bit-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515933" comment="libmpxwrappers0-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515934" comment="libmpxwrappers0-32bit-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515935" comment="libquadmath0-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515936" comment="libquadmath0-32bit-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515937" comment="libstdc++6-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515938" comment="libstdc++6-32bit-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515939" comment="libstdc++6-locale-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515940" comment="libtsan0-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515941" comment="libubsan0-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515942" comment="libubsan0-32bit-5.3.1+r233831-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77455" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="974209" ref_url="https://bugzilla.suse.com/974209" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1019" ref_url="https://www.suse.com/security/cve/CVE-2016-1019/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00010.html" source="SUSE-SU"/>
		<description>
flash-player was updated to fix one security issue.

This security issue was fixed:
- CVE-2016-1019: Adobe Flash Player allowed remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors, as exploited in the wild in April 2016 (bsc#974209).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-08"/>
	<updated date="2016-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/974209">SUSE bug 974209</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1019/">CVE-2016-1019</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515943" comment="flash-player-11.2.202.616-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515944" comment="flash-player-gnome-11.2.202.616-126.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77456" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="971942" ref_url="https://bugzilla.suse.com/971942" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3119" ref_url="https://www.suse.com/security/cve/CVE-2016-3119/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001993.html" source="SUSE-SU"/>
		<description>

This update for krb5 fixes the following security issue:

- CVE-2016-3119: An authenticated attacker with permission to modify a
  principal entry could have caused kadmind to dereference a null pointer
  by supplying an empty DB argument to the modify_principal command,
  if kadmind is configured to use the LDAP KDB module. (bsc#971942)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-08"/>
	<updated date="2016-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/971942">SUSE bug 971942</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3119/">CVE-2016-3119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515945" comment="krb5-1.12.1-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515946" comment="krb5-32bit-1.12.1-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515947" comment="krb5-client-1.12.1-28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77457" version="1" class="patch">
	<metadata>
		<title>Security update for python-tornado (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="930361" ref_url="https://bugzilla.suse.com/930361" source="BUGZILLA"/>
		<reference ref_id="930362" ref_url="https://bugzilla.suse.com/930362" source="BUGZILLA"/>
		<reference ref_id="974657" ref_url="https://bugzilla.suse.com/974657" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9720" ref_url="https://www.suse.com/security/cve/CVE-2014-9720/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002034.html" source="SUSE-SU"/>
		<description>

The python-tornado module was updated to version 4.2.1, which brings several fixes,
enhancements and new features.

The following security issues have been fixed:

- A path traversal vulnerability in StaticFileHandler, in which files whose names
  started with the static_path directory but were not actually in that directory
  could be accessed.
- The XSRF token is now encoded with a random mask on each request. This makes it
  safe to include in compressed pages without being vulnerable to the BREACH attack.
  This applies to most applications that use both the xsrf_cookies and gzip options
  (or have gzip applied by a proxy). (bsc#930362, CVE-2014-9720)
- The signed-value format used by RequestHandler.{g,s}et_secure_cookie changed to be
  more secure. (bsc#930361)

The following enhancements have been implemented:

- SSLIOStream.connect and IOStream.start_tls now validate certificates by default.
- Certificate validation will now use the system CA root certificates.
- The default SSL configuration has become stricter, using ssl.create_default_context
  where available on the client side.
- The deprecated classes in the tornado.auth module, GoogleMixin, FacebookMixin and
  FriendFeedMixin have been removed.
- New modules have been added: tornado.locks and tornado.queues.
- The tornado.websocket module now supports compression via the 'permessage-deflate'
  extension.
- Tornado now depends on the backports.ssl_match_hostname when running on Python 2.

For a comprehensive list of changes, please refer to the release notes:

- http://www.tornadoweb.org/en/stable/releases/v4.2.0.html
- http://www.tornadoweb.org/en/stable/releases/v4.1.0.html
- http://www.tornadoweb.org/en/stable/releases/v4.0.0.html
- http://www.tornadoweb.org/en/stable/releases/v3.2.0.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-02"/>
	<updated date="2016-05-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/930361">SUSE bug 930361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930362">SUSE bug 930362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974657">SUSE bug 974657</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9720/">CVE-2014-9720</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515948" comment="python-backports.ssl_match_hostname-3.4.0.2-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515949" comment="python-tornado-4.2.1-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77458" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="320709" ref_url="https://bugzilla.suse.com/320709" source="BUGZILLA"/>
		<reference ref_id="913547" ref_url="https://bugzilla.suse.com/913547" source="BUGZILLA"/>
		<reference ref_id="919309" ref_url="https://bugzilla.suse.com/919309" source="BUGZILLA"/>
		<reference ref_id="924519" ref_url="https://bugzilla.suse.com/924519" source="BUGZILLA"/>
		<reference ref_id="936862" ref_url="https://bugzilla.suse.com/936862" source="BUGZILLA"/>
		<reference ref_id="942716" ref_url="https://bugzilla.suse.com/942716" source="BUGZILLA"/>
		<reference ref_id="946051" ref_url="https://bugzilla.suse.com/946051" source="BUGZILLA"/>
		<reference ref_id="949022" ref_url="https://bugzilla.suse.com/949022" source="BUGZILLA"/>
		<reference ref_id="964023" ref_url="https://bugzilla.suse.com/964023" source="BUGZILLA"/>
		<reference ref_id="966271" ref_url="https://bugzilla.suse.com/966271" source="BUGZILLA"/>
		<reference ref_id="968973" ref_url="https://bugzilla.suse.com/968973" source="BUGZILLA"/>
		<reference ref_id="971965" ref_url="https://bugzilla.suse.com/971965" source="BUGZILLA"/>
		<reference ref_id="972197" ref_url="https://bugzilla.suse.com/972197" source="BUGZILLA"/>
		<reference ref_id="973031" ref_url="https://bugzilla.suse.com/973031" source="BUGZILLA"/>
		<reference ref_id="973032" ref_url="https://bugzilla.suse.com/973032" source="BUGZILLA"/>
		<reference ref_id="973033" ref_url="https://bugzilla.suse.com/973033" source="BUGZILLA"/>
		<reference ref_id="973034" ref_url="https://bugzilla.suse.com/973034" source="BUGZILLA"/>
		<reference ref_id="973036" ref_url="https://bugzilla.suse.com/973036" source="BUGZILLA"/>
		<reference ref_id="973832" ref_url="https://bugzilla.suse.com/973832" source="BUGZILLA"/>
		<reference ref_id="974629" ref_url="https://bugzilla.suse.com/974629" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5370" ref_url="https://www.suse.com/security/cve/CVE-2015-5370/" source="CVE"/>
		<reference ref_id="CVE-2016-2110" ref_url="https://www.suse.com/security/cve/CVE-2016-2110/" source="CVE"/>
		<reference ref_id="CVE-2016-2111" ref_url="https://www.suse.com/security/cve/CVE-2016-2111/" source="CVE"/>
		<reference ref_id="CVE-2016-2112" ref_url="https://www.suse.com/security/cve/CVE-2016-2112/" source="CVE"/>
		<reference ref_id="CVE-2016-2113" ref_url="https://www.suse.com/security/cve/CVE-2016-2113/" source="CVE"/>
		<reference ref_id="CVE-2016-2115" ref_url="https://www.suse.com/security/cve/CVE-2016-2115/" source="CVE"/>
		<reference ref_id="CVE-2016-2118" ref_url="https://www.suse.com/security/cve/CVE-2016-2118/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" source="SUSE-SU"/>
		<description>
Samba was updated to the 4.2.x codestream, bringing some new features and security fixes (bsc#973832, FATE#320709).

These security issues were fixed:
- CVE-2015-5370: DCERPC server and client were vulnerable to DOS and MITM attacks (bsc#936862).
- CVE-2016-2110: A man-in-the-middle could have downgraded NTLMSSP authentication (bsc#973031).
- CVE-2016-2111: Domain controller netlogon member computer could have been spoofed (bsc#973032).
- CVE-2016-2112: LDAP conenctions were vulnerable to downgrade and MITM attack (bsc#973033).
- CVE-2016-2113: TLS certificate validation were missing (bsc#973034).
- CVE-2016-2115: Named pipe IPC were vulnerable to MITM attacks (bsc#973036).
- CVE-2016-2118: 'Badlock' DCERPC impersonation of authenticated account were possible (bsc#971965).

Also the following fixes were done:
- Upgrade on-disk FSRVP server state to new version; (bsc#924519).
- Fix samba.tests.messaging test and prevent potential tdb corruption by removing obsolete now invalid tdb_close call; (bsc#974629).
- Align fsrvp feature sources with upstream version.
- Obsolete libsmbsharemodes0 from samba-libs and libsmbsharemodes-devel from samba-core-devel; (bsc#973832).
- s3:utils/smbget: Fix recursive download; (bso#6482).
- s3: smbd: posix_acls: Fix check for setting u:g:o entry on a filesystem with no ACL support; (bso#10489).
- docs: Add example for domain logins to smbspool man page; (bso#11643).
- s3-client: Add a KRB5 wrapper for smbspool; (bso#11690).
- loadparm: Fix memory leak issue; (bso#11708).
- lib/tsocket: Work around sockets not supporting FIONREAD; (bso#11714).
- ctdb-scripts: Drop use of 'smbcontrol winbindd ip-dropped ...'; (bso#11719).
- s3:smbd:open: Skip redundant call to file_set_dosmode when creating a new file; (bso#11727).
- param: Fix str_list_v3 to accept ';' again; (bso#11732).
- Real memeory leak(buildup) issue in loadparm; (bso#11740).
- Obsolete libsmbclient from libsmbclient0 and libpdb-devel from libsamba-passdb-devel while not providing it; (bsc#972197).
- Getting and setting Windows ACLs on symlinks can change permissions on link
- Only obsolete but do not provide gplv2/3 package names; (bsc#968973).
- Enable clustering (CTDB) support; (bsc#966271).
- s3: smbd: Fix timestamp rounding inside SMB2 create; (bso#11703); (bsc#964023).
- vfs_fruit: Fix renaming directories with open files; (bso#11065).
- Fix MacOS finder error 36 when copying folder to Samba; (bso#11347).
- s3:smbd/oplock: Obey kernel oplock setting when releasing oplocks; (bso#11400).
- Fix copying files with vfs_fruit when using vfs_streams_xattr without stream prefix and type suffix; (bso#11466).
- s3:libsmb: Correctly initialize the list head when keeping a list of primary followed by DFS connections; (bso#11624).
- Reduce the memory footprint of empty string options; (bso#11625).
- lib/async_req: Do not install async_connect_send_test; (bso#11639).
- docs: Fix typos in man vfs_gpfs; (bso#11641).
- smbd: make 'hide dot files' option work with 'store dos attributes = yes'; (bso#11645).
- smbcacls: Fix uninitialized variable; (bso#11682).
- s3:smbd: Ignore initial allocation size for directory creation; (bso#11684).
- Changing log level of two entries to from 1 to 3; (bso#9912).
- vfs_gpfs: Re-enable share modes; (bso#11243).
- wafsamba: Also build libraries with RELRO protection; (bso#11346).
- ctdb: Strip trailing spaces from nodes file; (bso#11365).
- s3-smbd: Fix old DOS client doing wildcard delete - gives a attribute type of zero; (bso#11452).
- nss_wins: Do not run into use after free issues when we access memory allocated on the globals and the global being reinitialized; (bso#11563).
- async_req: Fix non-blocking connect(); (bso#11564).
- auth: gensec: Fix a memory leak; (bso#11565).
- lib: util: Make non-critical message a warning; (bso#11566).
- Fix winbindd crashes with samlogon for trusted domain user; (bso#11569); (bsc#949022).
- smbd: Send SMB2 oplock breaks unencrypted; (bso#11570).
- ctdb: Open the RO tracking db with perms 0600 instead of 0000; (bso#11577).
- manpage: Correct small typo error; (bso#11584).
- s3: smbd: If EA's are turned off on a share don't allow an SMB2 create containing them; (bso#11589).
- Backport some valgrind fixes from upstream master; (bso#11597).
- s3: smbd: have_file_open_below() fails to enumerate open files below an open directory handle; (bso#11615).
- docs: Fix some typos in the idmap config section of man 5 smb.conf; (bso#11619).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-12"/>
	<updated date="2016-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/320709">SUSE bug 320709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913547">SUSE bug 913547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919309">SUSE bug 919309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924519">SUSE bug 924519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936862">SUSE bug 936862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942716">SUSE bug 942716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946051">SUSE bug 946051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949022">SUSE bug 949022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964023">SUSE bug 964023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966271">SUSE bug 966271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968973">SUSE bug 968973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971965">SUSE bug 971965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972197">SUSE bug 972197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973031">SUSE bug 973031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973032">SUSE bug 973032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973033">SUSE bug 973033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973034">SUSE bug 973034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973036">SUSE bug 973036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973832">SUSE bug 973832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974629">SUSE bug 974629</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5370/">CVE-2015-5370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2110/">CVE-2016-2110</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2111/">CVE-2016-2111</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2112/">CVE-2016-2112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2113/">CVE-2016-2113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2115/">CVE-2016-2115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2118/">CVE-2016-2118</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515950" comment="libdcerpc-binding0-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515951" comment="libdcerpc-binding0-32bit-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515952" comment="libdcerpc0-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515953" comment="libdcerpc0-32bit-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515954" comment="libgensec0-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515955" comment="libgensec0-32bit-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515956" comment="libndr-krb5pac0-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515957" comment="libndr-krb5pac0-32bit-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515958" comment="libndr-nbt0-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515959" comment="libndr-nbt0-32bit-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515960" comment="libndr-standard0-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515961" comment="libndr-standard0-32bit-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515962" comment="libndr0-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515963" comment="libndr0-32bit-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515964" comment="libnetapi0-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515965" comment="libnetapi0-32bit-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515966" comment="libregistry0-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515967" comment="libsamba-credentials0-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515968" comment="libsamba-credentials0-32bit-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515969" comment="libsamba-hostconfig0-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515970" comment="libsamba-hostconfig0-32bit-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515971" comment="libsamba-passdb0-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515972" comment="libsamba-passdb0-32bit-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515973" comment="libsamba-util0-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515974" comment="libsamba-util0-32bit-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515975" comment="libsamdb0-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515976" comment="libsamdb0-32bit-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515977" comment="libsmbclient-raw0-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515978" comment="libsmbclient-raw0-32bit-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515979" comment="libsmbclient0-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515980" comment="libsmbclient0-32bit-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515981" comment="libsmbconf0-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515982" comment="libsmbconf0-32bit-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515983" comment="libsmbldap0-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515984" comment="libsmbldap0-32bit-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515985" comment="libtevent-util0-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515986" comment="libtevent-util0-32bit-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515987" comment="libwbclient0-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515988" comment="libwbclient0-32bit-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515989" comment="samba-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515990" comment="samba-32bit-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515991" comment="samba-client-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515992" comment="samba-client-32bit-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515993" comment="samba-doc-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515994" comment="samba-libs-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515995" comment="samba-libs-32bit-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515996" comment="samba-winbind-4.2.4-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515997" comment="samba-winbind-32bit-4.2.4-18.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77459" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-c (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="966822" ref_url="https://bugzilla.suse.com/966822" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0729" ref_url="https://www.suse.com/security/cve/CVE-2016-0729/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002000.html" source="SUSE-SU"/>
		<description>

This update for xerces-c fixes the following security issue:

- CVE-2016-0729: Fixed mishandling certain kinds of malformed input documents,
  that resulted in buffer overlows during processing and error reporting.
  The overflows can manifest as a segmentation fault or as memory
  corruption during a parse operation. (bsc#966822)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-13"/>
	<updated date="2016-04-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/966822">SUSE bug 966822</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0729/">CVE-2016-0729</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515998" comment="libxerces-c-3_1-3.1.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515999" comment="libxerces-c-3_1-32bit-3.1.1-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77460" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="965902" ref_url="https://bugzilla.suse.com/965902" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7511" ref_url="https://www.suse.com/security/cve/CVE-2015-7511/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002017.html" source="SUSE-SU"/>
		<description>
libgcrypt was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-7511: Side-channel attack on ECDH with Weierstrass curves (bsc#965902).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-18"/>
	<updated date="2016-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/965902">SUSE bug 965902</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7511/">CVE-2015-7511</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516000" comment="libgcrypt20-1.6.1-16.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516001" comment="libgcrypt20-32bit-1.6.1-16.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77461" version="1" class="patch">
	<metadata>
		<title>Security update for lhasa (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="973790" ref_url="https://bugzilla.suse.com/973790" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2347" ref_url="https://www.suse.com/security/cve/CVE-2016-2347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002019.html" source="SUSE-SU"/>
		<description>
lhasa was updated to fix one security issue.

This security issue was fixed:
- CVE-2016-2347: decode_level3_header heap corruption vulnerability (bsc#973790).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-18"/>
	<updated date="2016-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/973790">SUSE bug 973790</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2347/">CVE-2016-2347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516002" comment="lhasa-0.2.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516003" comment="liblhasa0-0.2.0-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77462" version="1" class="patch">
	<metadata>
		<title>Security update for cairo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="971964" ref_url="https://bugzilla.suse.com/971964" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3190" ref_url="https://www.suse.com/security/cve/CVE-2016-3190/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002020.html" source="SUSE-SU"/>
		<description>

This update for cairo fixes the following issues:

- CVE-2016-3190: Fixed an out-of-bound read in the fill_xrgb32_lerp_opaque_spans
  function that might lead to a crash when processing a maliciously
  crafted image file (bsc#971964).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-19"/>
	<updated date="2016-04-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/971964">SUSE bug 971964</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3190/">CVE-2016-3190</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516004" comment="libcairo-gobject2-1.12.16-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516005" comment="libcairo-gobject2-32bit-1.12.16-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516006" comment="libcairo2-1.12.16-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516007" comment="libcairo2-32bit-1.12.16-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77463" version="1" class="patch">
	<metadata>
		<title>Security update for cups-filters (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="957531" ref_url="https://bugzilla.suse.com/957531" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8327" ref_url="https://www.suse.com/security/cve/CVE-2015-8327/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001794.html" source="SUSE-SU"/>
		<description>

  This update fixes the following security issue:

  CVE-2015-8327 adds backtick and semicolon to the list of illegal shell escape characters (bsc#957531).

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-12"/>
	<updated date="2016-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/957531">SUSE bug 957531</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8327/">CVE-2015-8327</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516008" comment="cups-filters-1.0.58-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516009" comment="cups-filters-cups-browsed-1.0.58-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516010" comment="cups-filters-foomatic-rip-1.0.58-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516011" comment="cups-filters-ghostscript-1.0.58-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77464" version="1" class="patch">
	<metadata>
		<title>Security update for giflib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="974847" ref_url="https://bugzilla.suse.com/974847" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3977" ref_url="https://www.suse.com/security/cve/CVE-2016-3977/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002025.html" source="SUSE-SU"/>
		<description>
giflib was updated to fix one security issue.

This security issue was fixed:
- CVE-2016-3977: Heap buffer overflow in gif2rgb (bsc#974847).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-25"/>
	<updated date="2016-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/974847">SUSE bug 974847</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3977/">CVE-2016-3977</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516012" comment="libgif6-5.0.5-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516013" comment="libgif6-32bit-5.0.5-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77465" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="972335" ref_url="https://bugzilla.suse.com/972335" source="BUGZILLA"/>
		<reference ref_id="975947" ref_url="https://bugzilla.suse.com/975947" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3627" ref_url="https://www.suse.com/security/cve/CVE-2016-3627/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002036.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes two security issues:

- libxml2 limits the number of recursions an XML document can contain so to protect against the 'Billion Laughs' denial-of-service attack. Unfortunately, the underlying counter was not incremented properly in all necessary locations. Therefore, specially crafted XML documents could exhaust all available stack space and crash the XML parser without running into the recursion limit. This vulnerability has been fixed. (bsc#975947)

- When running in recovery mode, certain invalid XML documents would trigger an infinite recursion in libxml2 that ran until all stack space was exhausted. This vulnerability could have been used to facilitate a denial-of-sevice attack. (CVE-2016-3627, bsc#972335)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-03"/>
	<updated date="2016-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/972335">SUSE bug 972335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975947">SUSE bug 975947</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3627/">CVE-2016-3627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516014" comment="libxml2-2-2.9.1-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516015" comment="libxml2-2-32bit-2.9.1-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516016" comment="libxml2-tools-2.9.1-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516017" comment="python-libxml2-2.9.1-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77466" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="958501" ref_url="https://bugzilla.suse.com/958501" source="BUGZILLA"/>
		<reference ref_id="976942" ref_url="https://bugzilla.suse.com/976942" source="BUGZILLA"/>
		<reference ref_id="976943" ref_url="https://bugzilla.suse.com/976943" source="BUGZILLA"/>
		<reference ref_id="977614" ref_url="https://bugzilla.suse.com/977614" source="BUGZILLA"/>
		<reference ref_id="977615" ref_url="https://bugzilla.suse.com/977615" source="BUGZILLA"/>
		<reference ref_id="977616" ref_url="https://bugzilla.suse.com/977616" source="BUGZILLA"/>
		<reference ref_id="977617" ref_url="https://bugzilla.suse.com/977617" source="BUGZILLA"/>
		<reference ref_id="977621" ref_url="https://bugzilla.suse.com/977621" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2107" ref_url="https://www.suse.com/security/cve/CVE-2016-2107/" source="CVE"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1228-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2016-2108: Memory corruption in the ASN.1 encoder (bsc#977617)
- CVE-2016-2107: Padding oracle in AES-NI CBC MAC check (bsc#977616)
- CVE-2016-2105: EVP_EncodeUpdate overflow (bsc#977614)
- CVE-2016-2106: EVP_EncryptUpdate overflow (bsc#977615)
- CVE-2016-2109: ASN.1 BIO excessive memory allocation (bsc#976942)
- bsc#976943: Buffer overrun in ASN1_parse
- bsc#977621: Preserve negotiated digests for SNI (bsc#977621)
- bsc#958501: Fix openssl enc -non-fips-allow option in FIPS mode (bsc#958501)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-04"/>
	<updated date="2016-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/958501">SUSE bug 958501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976943">SUSE bug 976943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977614">SUSE bug 977614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977615">SUSE bug 977615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977616">SUSE bug 977616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977617">SUSE bug 977617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977621">SUSE bug 977621</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2107/">CVE-2016-2107</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516018" comment="libopenssl1_0_0-1.0.1i-27.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516019" comment="libopenssl1_0_0-32bit-1.0.1i-27.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516020" comment="openssl-1.0.1i-27.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77467" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="976340" ref_url="https://bugzilla.suse.com/976340" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-0695" ref_url="https://www.suse.com/security/cve/CVE-2016-0695/" source="CVE"/>
		<reference ref_id="CVE-2016-3425" ref_url="https://www.suse.com/security/cve/CVE-2016-3425/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk to version 2.6.6 fixes five security issues.

These security issues were fixed:
- CVE-2016-0686: Ensure thread consistency (bsc#976340).
- CVE-2016-0687: Better byte behavior (bsc#976340).
- CVE-2016-0695: Make DSA more fair (bsc#976340).
- CVE-2016-3425: Better buffering of XML strings (bsc#976340).
- CVE-2016-3427: Improve JMX connections (bsc#976340).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-06"/>
	<updated date="2016-05-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/976340">SUSE bug 976340</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0695/">CVE-2016-0695</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3425/">CVE-2016-3425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516021" comment="java-1_7_0-openjdk-1.7.0.101-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516022" comment="java-1_7_0-openjdk-headless-1.7.0.101-30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77468" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="782060" ref_url="https://bugzilla.suse.com/782060" source="BUGZILLA"/>
		<reference ref_id="905885" ref_url="https://bugzilla.suse.com/905885" source="BUGZILLA"/>
		<reference ref_id="910063" ref_url="https://bugzilla.suse.com/910063" source="BUGZILLA"/>
		<reference ref_id="916617" ref_url="https://bugzilla.suse.com/916617" source="BUGZILLA"/>
		<reference ref_id="920238" ref_url="https://bugzilla.suse.com/920238" source="BUGZILLA"/>
		<reference ref_id="926510" ref_url="https://bugzilla.suse.com/926510" source="BUGZILLA"/>
		<reference ref_id="936327" ref_url="https://bugzilla.suse.com/936327" source="BUGZILLA"/>
		<reference ref_id="937837" ref_url="https://bugzilla.suse.com/937837" source="BUGZILLA"/>
		<reference ref_id="942587" ref_url="https://bugzilla.suse.com/942587" source="BUGZILLA"/>
		<reference ref_id="944300" ref_url="https://bugzilla.suse.com/944300" source="BUGZILLA"/>
		<reference ref_id="946386" ref_url="https://bugzilla.suse.com/946386" source="BUGZILLA"/>
		<reference ref_id="951559" ref_url="https://bugzilla.suse.com/951559" source="BUGZILLA"/>
		<reference ref_id="951608" ref_url="https://bugzilla.suse.com/951608" source="BUGZILLA"/>
		<reference ref_id="951629" ref_url="https://bugzilla.suse.com/951629" source="BUGZILLA"/>
		<reference ref_id="954982" ref_url="https://bugzilla.suse.com/954982" source="BUGZILLA"/>
		<reference ref_id="956773" ref_url="https://bugzilla.suse.com/956773" source="BUGZILLA"/>
		<reference ref_id="962318" ref_url="https://bugzilla.suse.com/962318" source="BUGZILLA"/>
		<reference ref_id="962784" ref_url="https://bugzilla.suse.com/962784" source="BUGZILLA"/>
		<reference ref_id="962802" ref_url="https://bugzilla.suse.com/962802" source="BUGZILLA"/>
		<reference ref_id="962960" ref_url="https://bugzilla.suse.com/962960" source="BUGZILLA"/>
		<reference ref_id="962966" ref_url="https://bugzilla.suse.com/962966" source="BUGZILLA"/>
		<reference ref_id="962970" ref_url="https://bugzilla.suse.com/962970" source="BUGZILLA"/>
		<reference ref_id="962988" ref_url="https://bugzilla.suse.com/962988" source="BUGZILLA"/>
		<reference ref_id="962994" ref_url="https://bugzilla.suse.com/962994" source="BUGZILLA"/>
		<reference ref_id="962995" ref_url="https://bugzilla.suse.com/962995" source="BUGZILLA"/>
		<reference ref_id="962997" ref_url="https://bugzilla.suse.com/962997" source="BUGZILLA"/>
		<reference ref_id="963000" ref_url="https://bugzilla.suse.com/963000" source="BUGZILLA"/>
		<reference ref_id="963002" ref_url="https://bugzilla.suse.com/963002" source="BUGZILLA"/>
		<reference ref_id="975496" ref_url="https://bugzilla.suse.com/975496" source="BUGZILLA"/>
		<reference ref_id="975981" ref_url="https://bugzilla.suse.com/975981" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5300" ref_url="https://www.suse.com/security/cve/CVE-2015-5300/" source="CVE"/>
		<reference ref_id="CVE-2015-7691" ref_url="https://www.suse.com/security/cve/CVE-2015-7691/" source="CVE"/>
		<reference ref_id="CVE-2015-7692" ref_url="https://www.suse.com/security/cve/CVE-2015-7692/" source="CVE"/>
		<reference ref_id="CVE-2015-7701" ref_url="https://www.suse.com/security/cve/CVE-2015-7701/" source="CVE"/>
		<reference ref_id="CVE-2015-7702" ref_url="https://www.suse.com/security/cve/CVE-2015-7702/" source="CVE"/>
		<reference ref_id="CVE-2015-7703" ref_url="https://www.suse.com/security/cve/CVE-2015-7703/" source="CVE"/>
		<reference ref_id="CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704/" source="CVE"/>
		<reference ref_id="CVE-2015-7705" ref_url="https://www.suse.com/security/cve/CVE-2015-7705/" source="CVE"/>
		<reference ref_id="CVE-2015-7848" ref_url="https://www.suse.com/security/cve/CVE-2015-7848/" source="CVE"/>
		<reference ref_id="CVE-2015-7849" ref_url="https://www.suse.com/security/cve/CVE-2015-7849/" source="CVE"/>
		<reference ref_id="CVE-2015-7850" ref_url="https://www.suse.com/security/cve/CVE-2015-7850/" source="CVE"/>
		<reference ref_id="CVE-2015-7851" ref_url="https://www.suse.com/security/cve/CVE-2015-7851/" source="CVE"/>
		<reference ref_id="CVE-2015-7852" ref_url="https://www.suse.com/security/cve/CVE-2015-7852/" source="CVE"/>
		<reference ref_id="CVE-2015-7853" ref_url="https://www.suse.com/security/cve/CVE-2015-7853/" source="CVE"/>
		<reference ref_id="CVE-2015-7854" ref_url="https://www.suse.com/security/cve/CVE-2015-7854/" source="CVE"/>
		<reference ref_id="CVE-2015-7855" ref_url="https://www.suse.com/security/cve/CVE-2015-7855/" source="CVE"/>
		<reference ref_id="CVE-2015-7871" ref_url="https://www.suse.com/security/cve/CVE-2015-7871/" source="CVE"/>
		<reference ref_id="CVE-2015-7973" ref_url="https://www.suse.com/security/cve/CVE-2015-7973/" source="CVE"/>
		<reference ref_id="CVE-2015-7974" ref_url="https://www.suse.com/security/cve/CVE-2015-7974/" source="CVE"/>
		<reference ref_id="CVE-2015-7975" ref_url="https://www.suse.com/security/cve/CVE-2015-7975/" source="CVE"/>
		<reference ref_id="CVE-2015-7976" ref_url="https://www.suse.com/security/cve/CVE-2015-7976/" source="CVE"/>
		<reference ref_id="CVE-2015-7977" ref_url="https://www.suse.com/security/cve/CVE-2015-7977/" source="CVE"/>
		<reference ref_id="CVE-2015-7978" ref_url="https://www.suse.com/security/cve/CVE-2015-7978/" source="CVE"/>
		<reference ref_id="CVE-2015-7979" ref_url="https://www.suse.com/security/cve/CVE-2015-7979/" source="CVE"/>
		<reference ref_id="CVE-2015-8138" ref_url="https://www.suse.com/security/cve/CVE-2015-8138/" source="CVE"/>
		<reference ref_id="CVE-2015-8139" ref_url="https://www.suse.com/security/cve/CVE-2015-8139/" source="CVE"/>
		<reference ref_id="CVE-2015-8140" ref_url="https://www.suse.com/security/cve/CVE-2015-8140/" source="CVE"/>
		<reference ref_id="CVE-2015-8158" ref_url="https://www.suse.com/security/cve/CVE-2015-8158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<description>
ntp was updated to version 4.2.8p6 to fix 28 security issues.

Major functional changes:
- The 'sntp' commandline tool changed its option handling in a major way,
  some options have been renamed or dropped.
- 'controlkey 1' is added during update to ntp.conf to allow sntp to work.
- The local clock is being disabled during update.
- ntpd is no longer running chrooted.

Other functional changes:
- ntp-signd is installed.
- 'enable mode7' can be added to the configuration to allow ntdpc to work as compatibility mode option.
- 'kod' was removed from the default restrictions.
- SHA1 keys are used by default instead of MD5 keys.

Also yast2-ntp-client was updated to match some sntp syntax changes. (bsc#937837)

These security issues were fixed:
- CVE-2015-8158: Fixed potential infinite loop in ntpq (bsc#962966).
- CVE-2015-8138: Zero Origin Timestamp Bypass (bsc#963002).
- CVE-2015-7979: Off-path Denial of Service (DoS) attack on authenticated broadcast mode (bsc#962784).
- CVE-2015-7978: Stack exhaustion in recursive traversal of restriction list (bsc#963000).
- CVE-2015-7977: reslist NULL pointer dereference (bsc#962970).
- CVE-2015-7976: ntpq saveconfig command allows dangerous characters in filenames (bsc#962802).
- CVE-2015-7975: nextvar() missing length check (bsc#962988).
- CVE-2015-7974: Skeleton Key: Missing key check allows impersonation between authenticated peers (bsc#962960).
- CVE-2015-7973: Replay attack on authenticated broadcast mode (bsc#962995).
- CVE-2015-8140: ntpq vulnerable to replay attacks (bsc#962994).
- CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin (bsc#962997).
- CVE-2015-5300: MITM attacker could have forced ntpd to make a step larger than the panic threshold (bsc#951629).
- CVE-2015-7871: NAK to the Future: Symmetric association authentication bypass via crypto-NAK (bsc#951608).
- CVE-2015-7855: decodenetnum() will ASSERT botch instead of returning FAIL on some bogus values (bsc#951608).
- CVE-2015-7854: Password Length Memory Corruption Vulnerability (bsc#951608).
- CVE-2015-7853: Invalid length data provided by a custom refclock driver could cause a buffer overflow (bsc#951608).
- CVE-2015-7852: ntpq atoascii() Memory Corruption Vulnerability (bsc#951608).
- CVE-2015-7851: saveconfig Directory Traversal Vulnerability (bsc#951608).
- CVE-2015-7850: remote config logfile-keyfile (bsc#951608).
- CVE-2015-7849: trusted key use-after-free (bsc#951608).
- CVE-2015-7848: mode 7 loop counter underrun (bsc#951608).
- CVE-2015-7701: Slow memory leak in CRYPTO_ASSOC (bsc#951608).
- CVE-2015-7703: configuration directives 'pidfile' and 'driftfile' should only be allowed locally (bsc#951608).
- CVE-2015-7704, CVE-2015-7705: Clients that receive a KoD should validate the origin timestamp field (bsc#951608).
- CVE-2015-7691, CVE-2015-7692, CVE-2015-7702: Incomplete autokey data packet length checks (bsc#951608).

These non-security issues were fixed:
- fate#320758 bsc#975981: Enable compile-time support for MS-SNTP (--enable-ntp-signd).
  This replaces the w32 patches in 4.2.4 that added the authreg
  directive.
- bsc#962318: Call /usr/sbin/sntp with full path to synchronize in start-ntpd.
  When run as cron job, /usr/sbin/ is not in the path, which caused
  the synchronization to fail.
- bsc#782060: Speedup ntpq.
- bsc#916617: Add /var/db/ntp-kod.
- bsc#956773: Add ntp-ENOBUFS.patch to limit a warning that might happen quite a lot on loaded systems.
- bsc#951559,bsc#975496: Fix the TZ offset output of sntp during DST.
- Add ntp-fork.patch and build with threads disabled to allow name resolution even when running chrooted.
- Add a controlkey line to /etc/ntp.conf if one does not already exist to allow runtime configuuration via ntpq.
- bsc#946386: Temporarily disable memlock to avoid problems due to high memory usage during name resolution.
- bsc#905885: Use SHA1 instead of MD5 for symmetric keys.
- Improve runtime configuration:
  * Read keytype from ntp.conf
  * Don't write ntp keys to syslog.
- Fix legacy action scripts to pass on command line arguments.
- bsc#944300: Remove 'kod' from the restrict line in ntp.conf.
- bsc#936327: Use ntpq instead of deprecated ntpdc in start-ntpd.
- Add a controlkey to ntp.conf to make the above work.
- Don't let 'keysdir' lines in ntp.conf trigger the 'keys' parser.
- Disable mode 7 (ntpdc) again, now that we don't use it anymore.
- Add 'addserver' as a new legacy action.
- bsc#910063: Fix the comment regarding addserver in ntp.conf.
- bsc#926510: Disable chroot by default.
- bsc#920238: Enable ntpdc for backwards compatibility.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-06"/>
	<updated date="2016-05-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/782060">SUSE bug 782060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905885">SUSE bug 905885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910063">SUSE bug 910063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916617">SUSE bug 916617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920238">SUSE bug 920238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926510">SUSE bug 926510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936327">SUSE bug 936327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937837">SUSE bug 937837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942587">SUSE bug 942587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944300">SUSE bug 944300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946386">SUSE bug 946386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951559">SUSE bug 951559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951629">SUSE bug 951629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954982">SUSE bug 954982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956773">SUSE bug 956773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962318">SUSE bug 962318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962784">SUSE bug 962784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962802">SUSE bug 962802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962960">SUSE bug 962960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962966">SUSE bug 962966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962970">SUSE bug 962970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962988">SUSE bug 962988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962994">SUSE bug 962994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962997">SUSE bug 962997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963000">SUSE bug 963000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963002">SUSE bug 963002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975496">SUSE bug 975496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975981">SUSE bug 975981</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5300/">CVE-2015-5300</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7691/">CVE-2015-7691</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7692/">CVE-2015-7692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7701/">CVE-2015-7701</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7702/">CVE-2015-7702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7703/">CVE-2015-7703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7705/">CVE-2015-7705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7848/">CVE-2015-7848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7849/">CVE-2015-7849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7850/">CVE-2015-7850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7851/">CVE-2015-7851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7852/">CVE-2015-7852</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7853/">CVE-2015-7853</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7854/">CVE-2015-7854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7855/">CVE-2015-7855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7871/">CVE-2015-7871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7973/">CVE-2015-7973</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7974/">CVE-2015-7974</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7975/">CVE-2015-7975</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7976/">CVE-2015-7976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7977/">CVE-2015-7977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7978/">CVE-2015-7978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7979/">CVE-2015-7979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8138/">CVE-2015-8138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8139/">CVE-2015-8139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8140/">CVE-2015-8140</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8158/">CVE-2015-8158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516023" comment="ntp-4.2.8p6-46.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516024" comment="ntp-doc-4.2.8p6-46.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516025" comment="yast2-ntp-client-3.1.12.4-8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77469" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="977333" ref_url="https://bugzilla.suse.com/977333" source="BUGZILLA"/>
		<reference ref_id="977374" ref_url="https://bugzilla.suse.com/977374" source="BUGZILLA"/>
		<reference ref_id="977376" ref_url="https://bugzilla.suse.com/977376" source="BUGZILLA"/>
		<reference ref_id="977381" ref_url="https://bugzilla.suse.com/977381" source="BUGZILLA"/>
		<reference ref_id="977386" ref_url="https://bugzilla.suse.com/977386" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2805" ref_url="https://www.suse.com/security/cve/CVE-2016-2805/" source="CVE"/>
		<reference ref_id="CVE-2016-2807" ref_url="https://www.suse.com/security/cve/CVE-2016-2807/" source="CVE"/>
		<reference ref_id="CVE-2016-2808" ref_url="https://www.suse.com/security/cve/CVE-2016-2808/" source="CVE"/>
		<reference ref_id="CVE-2016-2814" ref_url="https://www.suse.com/security/cve/CVE-2016-2814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00023.html" source="SUSE-SU"/>
		<description>
This update to MozillaFirefox 38.8.0 ESR fixes the following issues (bsc#977333):

- CVE-2016-2805: Miscellaneous memory safety hazards - MFSA 2016-39 (bsc#977374)
- CVE-2016-2807: Miscellaneous memory safety hazards - MFSA 2016-39 (bsc#977376)
- CVE-2016-2814: Buffer overflow in libstagefright with CENC offsets - MFSA 2016-44 (bsc#977381)
- CVE-2016-2808: Write to invalid HashMap entry through JavaScript.watch() - MFSA 2016-47 (bsc#977386)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-06"/>
	<updated date="2016-05-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977374">SUSE bug 977374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977376">SUSE bug 977376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977381">SUSE bug 977381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977386">SUSE bug 977386</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2805/">CVE-2016-2805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2807/">CVE-2016-2807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2808/">CVE-2016-2808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2814/">CVE-2016-2814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516026" comment="MozillaFirefox-38.8.0esr-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516027" comment="MozillaFirefox-translations-38.8.0esr-66.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77470" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="978061" ref_url="https://bugzilla.suse.com/978061" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<reference ref_id="CVE-2016-3715" ref_url="https://www.suse.com/security/cve/CVE-2016-3715/" source="CVE"/>
		<reference ref_id="CVE-2016-3716" ref_url="https://www.suse.com/security/cve/CVE-2016-3716/" source="CVE"/>
		<reference ref_id="CVE-2016-3717" ref_url="https://www.suse.com/security/cve/CVE-2016-3717/" source="CVE"/>
		<reference ref_id="CVE-2016-3718" ref_url="https://www.suse.com/security/cve/CVE-2016-3718/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

Security issues fixed:
- Several coders were vulnerable to remote code execution attacks, 
  these coders have now been disabled by default but can be 
  re-enabled by editing '/etc/ImageMagick-*/policy.xml' (bsc#978061)
- CVE-2016-3714: Insufficient shell characters filtering leads to
  (potentially remote) code execution
- CVE-2016-3715: Possible file deletion by using ImageMagick's
  'ephemeral' pseudo protocol which deletes files after reading.
- CVE-2016-3716: Possible file moving by using ImageMagick's 'msl'
  pseudo protocol with any extension in any folder.
- CVE-2016-3717: Possible local file read by using ImageMagick's 
  'label' pseudo protocol to get content of the files from the server.
- CVE-2016-3718: Possible Server Side Request Forgery (SSRF) to make
  HTTP GET or FTP request.

Bugs fixed:
- Use external svg loader (rsvg)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-07"/>
	<updated date="2016-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3715/">CVE-2016-3715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3716/">CVE-2016-3716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3717/">CVE-2016-3717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3718/">CVE-2016-3718</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516028" comment="ImageMagick-6.8.8.1-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516029" comment="libMagick++-6_Q16-3-6.8.8.1-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516030" comment="libMagickCore-6_Q16-1-6.8.8.1-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516031" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516032" comment="libMagickWand-6_Q16-1-6.8.8.1-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77471" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl098 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="889013" ref_url="https://bugzilla.suse.com/889013" source="BUGZILLA"/>
		<reference ref_id="968050" ref_url="https://bugzilla.suse.com/968050" source="BUGZILLA"/>
		<reference ref_id="976942" ref_url="https://bugzilla.suse.com/976942" source="BUGZILLA"/>
		<reference ref_id="976943" ref_url="https://bugzilla.suse.com/976943" source="BUGZILLA"/>
		<reference ref_id="977614" ref_url="https://bugzilla.suse.com/977614" source="BUGZILLA"/>
		<reference ref_id="977615" ref_url="https://bugzilla.suse.com/977615" source="BUGZILLA"/>
		<reference ref_id="977617" ref_url="https://bugzilla.suse.com/977617" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html" source="SUSE-SU"/>
		<description>
This update for compat-openssl098 fixes the following issues:

- CVE-2016-2108: Memory corruption in the ASN.1 encoder (bsc#977617)
- CVE-2016-2105: EVP_EncodeUpdate overflow (bsc#977614)
- CVE-2016-2106: EVP_EncryptUpdate overflow (bsc#977615)
- CVE-2016-2109: ASN.1 BIO excessive memory allocation (bsc#976942)
- CVE-2016-0702: Side channel attack on modular exponentiation 'CacheBleed' (bsc#968050)
- bsc#976943: Buffer overrun in ASN1_parse

The following non-security bugs were fixed:

- bsc#889013: Rename README.SuSE to the new spelling (bsc#889013)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-09"/>
	<updated date="2016-05-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/889013">SUSE bug 889013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968050">SUSE bug 968050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976943">SUSE bug 976943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977614">SUSE bug 977614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977615">SUSE bug 977615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977617">SUSE bug 977617</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516033" comment="libopenssl0_9_8-0.9.8j-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516034" comment="libopenssl0_9_8-32bit-0.9.8j-97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77472" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="950437" ref_url="https://bugzilla.suse.com/950437" source="BUGZILLA"/>
		<reference ref_id="960382" ref_url="https://bugzilla.suse.com/960382" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7830" ref_url="https://www.suse.com/security/cve/CVE-2015-7830/" source="CVE"/>
		<reference ref_id="CVE-2015-8711" ref_url="https://www.suse.com/security/cve/CVE-2015-8711/" source="CVE"/>
		<reference ref_id="CVE-2015-8712" ref_url="https://www.suse.com/security/cve/CVE-2015-8712/" source="CVE"/>
		<reference ref_id="CVE-2015-8713" ref_url="https://www.suse.com/security/cve/CVE-2015-8713/" source="CVE"/>
		<reference ref_id="CVE-2015-8714" ref_url="https://www.suse.com/security/cve/CVE-2015-8714/" source="CVE"/>
		<reference ref_id="CVE-2015-8715" ref_url="https://www.suse.com/security/cve/CVE-2015-8715/" source="CVE"/>
		<reference ref_id="CVE-2015-8716" ref_url="https://www.suse.com/security/cve/CVE-2015-8716/" source="CVE"/>
		<reference ref_id="CVE-2015-8717" ref_url="https://www.suse.com/security/cve/CVE-2015-8717/" source="CVE"/>
		<reference ref_id="CVE-2015-8718" ref_url="https://www.suse.com/security/cve/CVE-2015-8718/" source="CVE"/>
		<reference ref_id="CVE-2015-8719" ref_url="https://www.suse.com/security/cve/CVE-2015-8719/" source="CVE"/>
		<reference ref_id="CVE-2015-8720" ref_url="https://www.suse.com/security/cve/CVE-2015-8720/" source="CVE"/>
		<reference ref_id="CVE-2015-8721" ref_url="https://www.suse.com/security/cve/CVE-2015-8721/" source="CVE"/>
		<reference ref_id="CVE-2015-8722" ref_url="https://www.suse.com/security/cve/CVE-2015-8722/" source="CVE"/>
		<reference ref_id="CVE-2015-8723" ref_url="https://www.suse.com/security/cve/CVE-2015-8723/" source="CVE"/>
		<reference ref_id="CVE-2015-8724" ref_url="https://www.suse.com/security/cve/CVE-2015-8724/" source="CVE"/>
		<reference ref_id="CVE-2015-8725" ref_url="https://www.suse.com/security/cve/CVE-2015-8725/" source="CVE"/>
		<reference ref_id="CVE-2015-8726" ref_url="https://www.suse.com/security/cve/CVE-2015-8726/" source="CVE"/>
		<reference ref_id="CVE-2015-8727" ref_url="https://www.suse.com/security/cve/CVE-2015-8727/" source="CVE"/>
		<reference ref_id="CVE-2015-8728" ref_url="https://www.suse.com/security/cve/CVE-2015-8728/" source="CVE"/>
		<reference ref_id="CVE-2015-8729" ref_url="https://www.suse.com/security/cve/CVE-2015-8729/" source="CVE"/>
		<reference ref_id="CVE-2015-8730" ref_url="https://www.suse.com/security/cve/CVE-2015-8730/" source="CVE"/>
		<reference ref_id="CVE-2015-8731" ref_url="https://www.suse.com/security/cve/CVE-2015-8731/" source="CVE"/>
		<reference ref_id="CVE-2015-8732" ref_url="https://www.suse.com/security/cve/CVE-2015-8732/" source="CVE"/>
		<reference ref_id="CVE-2015-8733" ref_url="https://www.suse.com/security/cve/CVE-2015-8733/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<description>

This update contains Wireshark 1.12.9 and fixes the following issues:

* CVE-2015-7830: pcapng file parser could crash while copying an interface filter (bsc#950437)
* CVE-2015-8711: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate conversation data, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
* CVE-2015-8712: The dissect_hsdsch_channel_info function in epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not validate the number of PDUs, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8713: epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not properly reserve memory for channel ID mappings, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.
* CVE-2015-8714: The dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8715: epan/dissectors/packet-alljoyn.c in the AllJoyn dissector in Wireshark 1.12.x before 1.12.9 does not check for empty arguments, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
* CVE-2015-8716: The init_t38_info_conv function in epan/dissectors/packet-t38.c in the T.38 dissector in Wireshark 1.12.x before 1.12.9 does not ensure that a conversation exists, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8717: The dissect_sdp function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.12.x before 1.12.9 does not prevent use of a negative media count, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8718: Double free vulnerability in epan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1, when the 'Match MSG/RES packets for async NLM' option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8719: The dissect_dns_answer function in epan/dissectors/packet-dns.c in the DNS dissector in Wireshark 1.12.x before 1.12.9 mishandles the EDNS0 Client Subnet option, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8720: The dissect_ber_GeneralizedTime function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8721: Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet with zlib compression.
* CVE-2015-8722: epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the frame pointer, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
* CVE-2015-8723: The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted
* CVE-2015-8724: The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not verify the WPA broadcast key length, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8725: The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
* CVE-2015-8726: wiretap/vwr.c in the VeriWave file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate certain signature and Modulation and Coding Scheme (MCS) data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
* CVE-2015-8727: The dissect_rsvp_common function in epan/dissectors/packet-rsvp.c in the RSVP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not properly maintain request-key data, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.
* CVE-2015-8728: The Mobile Identity parser in (1) epan/dissectors/packet-ansi_a.c in the ANSI A dissector and (2) epan/dissectors/packet-gsm_a_common.c in the GSM A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly uses the tvb_bcd_dig_to_wmem_packet_str function, which allows remote attackers to cause a denial of service (buffer overflow and application crash) via a crafted packet.
* CVE-2015-8729: The ascend_seek function in wiretap/ascendtext.c in the Ascend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not ensure the presence of a '\0' character at the end of a date string, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
* CVE-2015-8730: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the number of items, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted packet.
* CVE-2015-8731: The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8732: The dissect_zcl_pwr_prof_pwrprofstatersp function in epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the Total Profile Number field, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8733: The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-13"/>
	<updated date="2016-01-13"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/950437">SUSE bug 950437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7830/">CVE-2015-7830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8711/">CVE-2015-8711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8712/">CVE-2015-8712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8713/">CVE-2015-8713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8714/">CVE-2015-8714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8715/">CVE-2015-8715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8716/">CVE-2015-8716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8717/">CVE-2015-8717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8718/">CVE-2015-8718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8719/">CVE-2015-8719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8720/">CVE-2015-8720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8721/">CVE-2015-8721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8722/">CVE-2015-8722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8723/">CVE-2015-8723</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8724/">CVE-2015-8724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8725/">CVE-2015-8725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8726/">CVE-2015-8726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8727/">CVE-2015-8727</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8728/">CVE-2015-8728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8729/">CVE-2015-8729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8730/">CVE-2015-8730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8731/">CVE-2015-8731</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8732/">CVE-2015-8732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8733/">CVE-2015-8733</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516035" comment="wireshark-1.12.9-22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77473" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="979422" ref_url="https://bugzilla.suse.com/979422" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1006" ref_url="https://www.suse.com/security/cve/CVE-2016-1006/" source="CVE"/>
		<reference ref_id="CVE-2016-1011" ref_url="https://www.suse.com/security/cve/CVE-2016-1011/" source="CVE"/>
		<reference ref_id="CVE-2016-1012" ref_url="https://www.suse.com/security/cve/CVE-2016-1012/" source="CVE"/>
		<reference ref_id="CVE-2016-1013" ref_url="https://www.suse.com/security/cve/CVE-2016-1013/" source="CVE"/>
		<reference ref_id="CVE-2016-1014" ref_url="https://www.suse.com/security/cve/CVE-2016-1014/" source="CVE"/>
		<reference ref_id="CVE-2016-1015" ref_url="https://www.suse.com/security/cve/CVE-2016-1015/" source="CVE"/>
		<reference ref_id="CVE-2016-1016" ref_url="https://www.suse.com/security/cve/CVE-2016-1016/" source="CVE"/>
		<reference ref_id="CVE-2016-1017" ref_url="https://www.suse.com/security/cve/CVE-2016-1017/" source="CVE"/>
		<reference ref_id="CVE-2016-1018" ref_url="https://www.suse.com/security/cve/CVE-2016-1018/" source="CVE"/>
		<reference ref_id="CVE-2016-1019" ref_url="https://www.suse.com/security/cve/CVE-2016-1019/" source="CVE"/>
		<reference ref_id="CVE-2016-1020" ref_url="https://www.suse.com/security/cve/CVE-2016-1020/" source="CVE"/>
		<reference ref_id="CVE-2016-1021" ref_url="https://www.suse.com/security/cve/CVE-2016-1021/" source="CVE"/>
		<reference ref_id="CVE-2016-1022" ref_url="https://www.suse.com/security/cve/CVE-2016-1022/" source="CVE"/>
		<reference ref_id="CVE-2016-1023" ref_url="https://www.suse.com/security/cve/CVE-2016-1023/" source="CVE"/>
		<reference ref_id="CVE-2016-1024" ref_url="https://www.suse.com/security/cve/CVE-2016-1024/" source="CVE"/>
		<reference ref_id="CVE-2016-1025" ref_url="https://www.suse.com/security/cve/CVE-2016-1025/" source="CVE"/>
		<reference ref_id="CVE-2016-1026" ref_url="https://www.suse.com/security/cve/CVE-2016-1026/" source="CVE"/>
		<reference ref_id="CVE-2016-1027" ref_url="https://www.suse.com/security/cve/CVE-2016-1027/" source="CVE"/>
		<reference ref_id="CVE-2016-1028" ref_url="https://www.suse.com/security/cve/CVE-2016-1028/" source="CVE"/>
		<reference ref_id="CVE-2016-1029" ref_url="https://www.suse.com/security/cve/CVE-2016-1029/" source="CVE"/>
		<reference ref_id="CVE-2016-1030" ref_url="https://www.suse.com/security/cve/CVE-2016-1030/" source="CVE"/>
		<reference ref_id="CVE-2016-1031" ref_url="https://www.suse.com/security/cve/CVE-2016-1031/" source="CVE"/>
		<reference ref_id="CVE-2016-1032" ref_url="https://www.suse.com/security/cve/CVE-2016-1032/" source="CVE"/>
		<reference ref_id="CVE-2016-1033" ref_url="https://www.suse.com/security/cve/CVE-2016-1033/" source="CVE"/>
		<reference ref_id="CVE-2016-1096" ref_url="https://www.suse.com/security/cve/CVE-2016-1096/" source="CVE"/>
		<reference ref_id="CVE-2016-1097" ref_url="https://www.suse.com/security/cve/CVE-2016-1097/" source="CVE"/>
		<reference ref_id="CVE-2016-1098" ref_url="https://www.suse.com/security/cve/CVE-2016-1098/" source="CVE"/>
		<reference ref_id="CVE-2016-1099" ref_url="https://www.suse.com/security/cve/CVE-2016-1099/" source="CVE"/>
		<reference ref_id="CVE-2016-1100" ref_url="https://www.suse.com/security/cve/CVE-2016-1100/" source="CVE"/>
		<reference ref_id="CVE-2016-1101" ref_url="https://www.suse.com/security/cve/CVE-2016-1101/" source="CVE"/>
		<reference ref_id="CVE-2016-1102" ref_url="https://www.suse.com/security/cve/CVE-2016-1102/" source="CVE"/>
		<reference ref_id="CVE-2016-1103" ref_url="https://www.suse.com/security/cve/CVE-2016-1103/" source="CVE"/>
		<reference ref_id="CVE-2016-1104" ref_url="https://www.suse.com/security/cve/CVE-2016-1104/" source="CVE"/>
		<reference ref_id="CVE-2016-1105" ref_url="https://www.suse.com/security/cve/CVE-2016-1105/" source="CVE"/>
		<reference ref_id="CVE-2016-1106" ref_url="https://www.suse.com/security/cve/CVE-2016-1106/" source="CVE"/>
		<reference ref_id="CVE-2016-1107" ref_url="https://www.suse.com/security/cve/CVE-2016-1107/" source="CVE"/>
		<reference ref_id="CVE-2016-1108" ref_url="https://www.suse.com/security/cve/CVE-2016-1108/" source="CVE"/>
		<reference ref_id="CVE-2016-1109" ref_url="https://www.suse.com/security/cve/CVE-2016-1109/" source="CVE"/>
		<reference ref_id="CVE-2016-1110" ref_url="https://www.suse.com/security/cve/CVE-2016-1110/" source="CVE"/>
		<reference ref_id="CVE-2016-4108" ref_url="https://www.suse.com/security/cve/CVE-2016-4108/" source="CVE"/>
		<reference ref_id="CVE-2016-4109" ref_url="https://www.suse.com/security/cve/CVE-2016-4109/" source="CVE"/>
		<reference ref_id="CVE-2016-4110" ref_url="https://www.suse.com/security/cve/CVE-2016-4110/" source="CVE"/>
		<reference ref_id="CVE-2016-4111" ref_url="https://www.suse.com/security/cve/CVE-2016-4111/" source="CVE"/>
		<reference ref_id="CVE-2016-4112" ref_url="https://www.suse.com/security/cve/CVE-2016-4112/" source="CVE"/>
		<reference ref_id="CVE-2016-4113" ref_url="https://www.suse.com/security/cve/CVE-2016-4113/" source="CVE"/>
		<reference ref_id="CVE-2016-4114" ref_url="https://www.suse.com/security/cve/CVE-2016-4114/" source="CVE"/>
		<reference ref_id="CVE-2016-4115" ref_url="https://www.suse.com/security/cve/CVE-2016-4115/" source="CVE"/>
		<reference ref_id="CVE-2016-4116" ref_url="https://www.suse.com/security/cve/CVE-2016-4116/" source="CVE"/>
		<reference ref_id="CVE-2016-4117" ref_url="https://www.suse.com/security/cve/CVE-2016-4117/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
		<description>

This update for flash-player fixes the following issues: 

- Security update to 11.2.202.621 (bsc#979422):
  * APSA16-02, APSB16-15, CVE-2016-1096, CVE-2016-1097,
    CVE-2016-1098, CVE-2016-1099, CVE-2016-1100, CVE-2016-1101,
    CVE-2016-1102, CVE-2016-1103, CVE-2016-1104, CVE-2016-1105,
    CVE-2016-1106, CVE-2016-1107, CVE-2016-1108, CVE-2016-1109,
    CVE-2016-1110, CVE-2016-4108, CVE-2016-4109, CVE-2016-4110,
    CVE-2016-4111, CVE-2016-4112, CVE-2016-4113, CVE-2016-4114,
    CVE-2016-4115, CVE-2016-4116, CVE-2016-4117

- The following CVEs got fixed during the previous release, but
  got published afterwards:
  * APSA16-01, APSB16-10, CVE-2016-1006, CVE-2016-1011,
    CVE-2016-1012, CVE-2016-1013, CVE-2016-1014, CVE-2016-1015,
    CVE-2016-1016, CVE-2016-1017, CVE-2016-1018, CVE-2016-1019,
    CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023,
    CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027,
    CVE-2016-1028, CVE-2016-1029, CVE-2016-1030, CVE-2016-1031,
    CVE-2016-1032, CVE-2016-1033		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-16"/>
	<updated date="2016-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979422">SUSE bug 979422</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1006/">CVE-2016-1006</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1011/">CVE-2016-1011</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1012/">CVE-2016-1012</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1013/">CVE-2016-1013</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1014/">CVE-2016-1014</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1015/">CVE-2016-1015</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1016/">CVE-2016-1016</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1017/">CVE-2016-1017</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1018/">CVE-2016-1018</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1019/">CVE-2016-1019</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1020/">CVE-2016-1020</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1021/">CVE-2016-1021</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1022/">CVE-2016-1022</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1023/">CVE-2016-1023</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1024/">CVE-2016-1024</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1025/">CVE-2016-1025</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1026/">CVE-2016-1026</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1027/">CVE-2016-1027</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1028/">CVE-2016-1028</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1029/">CVE-2016-1029</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1030/">CVE-2016-1030</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1031/">CVE-2016-1031</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1032/">CVE-2016-1032</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1033/">CVE-2016-1033</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1096/">CVE-2016-1096</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1097/">CVE-2016-1097</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1098/">CVE-2016-1098</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1099/">CVE-2016-1099</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1100/">CVE-2016-1100</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1101/">CVE-2016-1101</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1102/">CVE-2016-1102</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1103/">CVE-2016-1103</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1104/">CVE-2016-1104</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1105/">CVE-2016-1105</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1106/">CVE-2016-1106</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1107/">CVE-2016-1107</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1108/">CVE-2016-1108</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1109/">CVE-2016-1109</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1110/">CVE-2016-1110</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-4108/">CVE-2016-4108</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-4109/">CVE-2016-4109</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-4110/">CVE-2016-4110</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-4111/">CVE-2016-4111</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-4112/">CVE-2016-4112</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-4113/">CVE-2016-4113</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-4114/">CVE-2016-4114</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-4115/">CVE-2016-4115</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-4116/">CVE-2016-4116</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4117/">CVE-2016-4117</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77474" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="954872" ref_url="https://bugzilla.suse.com/954872" source="BUGZILLA"/>
		<reference ref_id="956832" ref_url="https://bugzilla.suse.com/956832" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="958007" ref_url="https://bugzilla.suse.com/958007" source="BUGZILLA"/>
		<reference ref_id="958009" ref_url="https://bugzilla.suse.com/958009" source="BUGZILLA"/>
		<reference ref_id="958493" ref_url="https://bugzilla.suse.com/958493" source="BUGZILLA"/>
		<reference ref_id="958523" ref_url="https://bugzilla.suse.com/958523" source="BUGZILLA"/>
		<reference ref_id="958918" ref_url="https://bugzilla.suse.com/958918" source="BUGZILLA"/>
		<reference ref_id="959006" ref_url="https://bugzilla.suse.com/959006" source="BUGZILLA"/>
		<reference ref_id="959387" ref_url="https://bugzilla.suse.com/959387" source="BUGZILLA"/>
		<reference ref_id="959695" ref_url="https://bugzilla.suse.com/959695" source="BUGZILLA"/>
		<reference ref_id="960707" ref_url="https://bugzilla.suse.com/960707" source="BUGZILLA"/>
		<reference ref_id="960726" ref_url="https://bugzilla.suse.com/960726" source="BUGZILLA"/>
		<reference ref_id="960836" ref_url="https://bugzilla.suse.com/960836" source="BUGZILLA"/>
		<reference ref_id="960861" ref_url="https://bugzilla.suse.com/960861" source="BUGZILLA"/>
		<reference ref_id="960862" ref_url="https://bugzilla.suse.com/960862" source="BUGZILLA"/>
		<reference ref_id="961332" ref_url="https://bugzilla.suse.com/961332" source="BUGZILLA"/>
		<reference ref_id="961358" ref_url="https://bugzilla.suse.com/961358" source="BUGZILLA"/>
		<reference ref_id="961692" ref_url="https://bugzilla.suse.com/961692" source="BUGZILLA"/>
		<reference ref_id="962321" ref_url="https://bugzilla.suse.com/962321" source="BUGZILLA"/>
		<reference ref_id="962335" ref_url="https://bugzilla.suse.com/962335" source="BUGZILLA"/>
		<reference ref_id="962360" ref_url="https://bugzilla.suse.com/962360" source="BUGZILLA"/>
		<reference ref_id="962611" ref_url="https://bugzilla.suse.com/962611" source="BUGZILLA"/>
		<reference ref_id="962627" ref_url="https://bugzilla.suse.com/962627" source="BUGZILLA"/>
		<reference ref_id="962632" ref_url="https://bugzilla.suse.com/962632" source="BUGZILLA"/>
		<reference ref_id="962642" ref_url="https://bugzilla.suse.com/962642" source="BUGZILLA"/>
		<reference ref_id="962758" ref_url="https://bugzilla.suse.com/962758" source="BUGZILLA"/>
		<reference ref_id="963783" ref_url="https://bugzilla.suse.com/963783" source="BUGZILLA"/>
		<reference ref_id="963923" ref_url="https://bugzilla.suse.com/963923" source="BUGZILLA"/>
		<reference ref_id="964415" ref_url="https://bugzilla.suse.com/964415" source="BUGZILLA"/>
		<reference ref_id="964431" ref_url="https://bugzilla.suse.com/964431" source="BUGZILLA"/>
		<reference ref_id="964452" ref_url="https://bugzilla.suse.com/964452" source="BUGZILLA"/>
		<reference ref_id="964644" ref_url="https://bugzilla.suse.com/964644" source="BUGZILLA"/>
		<reference ref_id="964746" ref_url="https://bugzilla.suse.com/964746" source="BUGZILLA"/>
		<reference ref_id="964925" ref_url="https://bugzilla.suse.com/964925" source="BUGZILLA"/>
		<reference ref_id="964929" ref_url="https://bugzilla.suse.com/964929" source="BUGZILLA"/>
		<reference ref_id="964947" ref_url="https://bugzilla.suse.com/964947" source="BUGZILLA"/>
		<reference ref_id="964950" ref_url="https://bugzilla.suse.com/964950" source="BUGZILLA"/>
		<reference ref_id="965112" ref_url="https://bugzilla.suse.com/965112" source="BUGZILLA"/>
		<reference ref_id="965156" ref_url="https://bugzilla.suse.com/965156" source="BUGZILLA"/>
		<reference ref_id="965269" ref_url="https://bugzilla.suse.com/965269" source="BUGZILLA"/>
		<reference ref_id="965315" ref_url="https://bugzilla.suse.com/965315" source="BUGZILLA"/>
		<reference ref_id="965317" ref_url="https://bugzilla.suse.com/965317" source="BUGZILLA"/>
		<reference ref_id="967090" ref_url="https://bugzilla.suse.com/967090" source="BUGZILLA"/>
		<reference ref_id="967101" ref_url="https://bugzilla.suse.com/967101" source="BUGZILLA"/>
		<reference ref_id="968004" ref_url="https://bugzilla.suse.com/968004" source="BUGZILLA"/>
		<reference ref_id="969125" ref_url="https://bugzilla.suse.com/969125" source="BUGZILLA"/>
		<reference ref_id="969126" ref_url="https://bugzilla.suse.com/969126" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4527" ref_url="https://www.suse.com/security/cve/CVE-2013-4527/" source="CVE"/>
		<reference ref_id="CVE-2013-4529" ref_url="https://www.suse.com/security/cve/CVE-2013-4529/" source="CVE"/>
		<reference ref_id="CVE-2013-4530" ref_url="https://www.suse.com/security/cve/CVE-2013-4530/" source="CVE"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-3689" ref_url="https://www.suse.com/security/cve/CVE-2014-3689/" source="CVE"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2014-9718" ref_url="https://www.suse.com/security/cve/CVE-2014-9718/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8554" ref_url="https://www.suse.com/security/cve/CVE-2015-8554/" source="CVE"/>
		<reference ref_id="CVE-2015-8555" ref_url="https://www.suse.com/security/cve/CVE-2015-8555/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567/" source="CVE"/>
		<reference ref_id="CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2015-8817" ref_url="https://www.suse.com/security/cve/CVE-2015-8817/" source="CVE"/>
		<reference ref_id="CVE-2015-8818" ref_url="https://www.suse.com/security/cve/CVE-2015-8818/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1570" ref_url="https://www.suse.com/security/cve/CVE-2016-1570/" source="CVE"/>
		<reference ref_id="CVE-2016-1571" ref_url="https://www.suse.com/security/cve/CVE-2016-1571/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-2270" ref_url="https://www.suse.com/security/cve/CVE-2016-2270/" source="CVE"/>
		<reference ref_id="CVE-2016-2271" ref_url="https://www.suse.com/security/cve/CVE-2016-2271/" source="CVE"/>
		<reference ref_id="CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391/" source="CVE"/>
		<reference ref_id="CVE-2016-2392" ref_url="https://www.suse.com/security/cve/CVE-2016-2392/" source="CVE"/>
		<reference ref_id="CVE-2016-2538" ref_url="https://www.suse.com/security/cve/CVE-2016-2538/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<description>
xen was updated to fix 46 security issues.

These security issues were fixed:
- CVE-2013-4527: Buffer overflow in hw/timer/hpet.c might have allowed remote attackers to execute arbitrary code via vectors related to the number of timers (bsc#964746).
- CVE-2013-4529: Buffer overflow in hw/pci/pcie_aer.c allowed remote attackers to cause a denial of service and possibly execute arbitrary code via a large log_num value in a savevm image (bsc#964929).
- CVE-2013-4530: Buffer overflow in hw/ssi/pl022.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via crafted tx_fifo_head and rx_fifo_head values in a savevm image (bsc#964950).
- CVE-2013-4533: Buffer overflow in the pxa2xx_ssp_load function in hw/arm/pxa2xx.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted s-&gt;rx_level value in a savevm image (bsc#964644).
- CVE-2013-4534: Buffer overflow in hw/intc/openpic.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via vectors related to IRQDest elements (bsc#964452).
- CVE-2013-4537: The ssi_sd_transfer function in hw/sd/ssi-sd.c allowed remote attackers to execute arbitrary code via a crafted arglen value in a savevm image (bsc#962642).
- CVE-2013-4538: Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c allowed remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_end values in a savevm image (bsc#962335).
- CVE-2013-4539: Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c might have allowed remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image (bsc#962758).
- CVE-2014-0222: Integer overflow in the qcow_open function in block/qcow.c allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#964925).
- CVE-2014-3640: The sosendto function in slirp/udp.c allowed local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket (bsc#965112).
- CVE-2014-3689: The vmware-vga driver (hw/display/vmware_vga.c) allowed local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling (bsc#962611).
- CVE-2014-7815: The set_pixel_format function in ui/vnc.c allowed remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value (bsc#962627).
- CVE-2014-9718: The (1) BMDMA and (2) AHCI HBA interfaces in the IDE functionality had multiple interpretations of a function's return value, which allowed guest OS users to cause a host OS denial of service (memory consumption or infinite loop, and system crash) via a PRDT with zero complete sectors, related to the bmdma_prepare_buf and ahci_dma_prepare_buf functions (bsc#964431).
- CVE-2015-1779: The VNC websocket frame decoder allowed remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section (bsc#962632).
- CVE-2015-5278: Infinite loop in ne2000_receive() function (bsc#964947).
- CVE-2015-6855: hw/ide/core.c did not properly restrict the commands accepted by an ATAPI device, which allowed guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash (bsc#965156).
- CVE-2015-7512: Buffer overflow in the pcnet_receive function in hw/net/pcnet.c, when a guest NIC has a larger MTU, allowed remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet (bsc#962360).
- CVE-2015-7549: pci: NULL pointer dereference issue (bsc#958918).
- CVE-2015-8345: eepro100: infinite loop in processing command block list (bsc#956832).
- CVE-2015-8504: VNC: floating point exception (bsc#958493).
- CVE-2015-8550: Paravirtualized drivers were incautious about shared memory contents (XSA-155) (bsc#957988).
- CVE-2015-8554: qemu-dm buffer overrun in MSI-X handling (XSA-164) (bsc#958007).
- CVE-2015-8555: Information leak in legacy x86 FPU/XMM initialization (XSA-165) (bsc#958009).
- CVE-2015-8558: Infinite loop in ehci_advance_state resulted in DoS (bsc#959006).
- CVE-2015-8567: vmxnet3: host memory leakage (bsc#959387).
- CVE-2015-8568: vmxnet3: host memory leakage (bsc#959387).
- CVE-2015-8613: SCSI: stack based buffer overflow in megasas_ctrl_get_info (bsc#961358).
- CVE-2015-8619: Stack based OOB write in hmp_sendkey routine (bsc#965269).
- CVE-2015-8743: ne2000: OOB memory access in ioport r/w functions (bsc#960726).
- CVE-2015-8744: vmxnet3: Incorrect l2 header validation lead to a crash via assert(2) call (bsc#960836).
- CVE-2015-8745: Reading IMR registers lead to a crash via assert(2) call (bsc#960707).
- CVE-2015-8817: OOB access in address_space_rw lead to segmentation fault (I) (bsc#969125).
- CVE-2015-8818: OOB access in address_space_rw lead to segmentation fault (II) (bsc#969126).
- CVE-2016-1568: AHCI use-after-free vulnerability in aio port commands (bsc#961332).
- CVE-2016-1570: The PV superpage functionality in arch/x86/mm.c allowed local PV guests to obtain sensitive information, cause a denial of service, gain privileges, or have unspecified other impact via a crafted page identifier (MFN) to the (1) MMUEXT_MARK_SUPER or (2) MMUEXT_UNMARK_SUPER sub-op in the HYPERVISOR_mmuext_op hypercall or (3) unknown vectors related to page table updates (bsc#960861).
- CVE-2016-1571: VMX: intercept issue with INVLPG on non-canonical address (XSA-168) (bsc#960862).
- CVE-2016-1714: nvram: OOB r/w access in processing firmware configurations (bsc#961692).
- CVE-2016-1922: NULL pointer dereference in vapic_write() (bsc#962321).
- CVE-2016-1981: e1000 infinite loop in start_xmit and e1000_receive_iov routines (bsc#963783).
- CVE-2016-2198: EHCI NULL pointer dereference in ehci_caps_write (bsc#964415).
- CVE-2016-2270: Xen allowed local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings (bsc#965315).
- CVE-2016-2271: VMX when using an Intel or Cyrix CPU, allowed local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP (bsc#965317).
- CVE-2016-2391: usb: multiple eof_timers in ohci module lead to NULL pointer dereference (bsc#967101).
- CVE-2016-2392: NULL pointer dereference in remote NDIS control message handling (bsc#967090).
- CVE-2016-2538: Integer overflow in remote NDIS control message handling (bsc#968004).
- XSA-166: ioreq handling possibly susceptible to multiple read issue (bsc#958523).

These non-security issues were fixed:
- bsc#954872: script block-dmmd not working as expected 
- bsc#963923: domain weights not honored when sched-credit tslice is reduced
- bsc#959695: Missing docs for xen
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-17"/>
	<updated date="2016-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/954872">SUSE bug 954872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956832">SUSE bug 956832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958007">SUSE bug 958007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958009">SUSE bug 958009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958493">SUSE bug 958493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958523">SUSE bug 958523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958918">SUSE bug 958918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959006">SUSE bug 959006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959387">SUSE bug 959387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959695">SUSE bug 959695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960707">SUSE bug 960707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960726">SUSE bug 960726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960836">SUSE bug 960836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960861">SUSE bug 960861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960862">SUSE bug 960862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961332">SUSE bug 961332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961358">SUSE bug 961358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961692">SUSE bug 961692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962321">SUSE bug 962321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962335">SUSE bug 962335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962360">SUSE bug 962360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962611">SUSE bug 962611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962627">SUSE bug 962627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962632">SUSE bug 962632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962642">SUSE bug 962642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962758">SUSE bug 962758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963783">SUSE bug 963783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963923">SUSE bug 963923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964415">SUSE bug 964415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964431">SUSE bug 964431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964452">SUSE bug 964452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964644">SUSE bug 964644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964746">SUSE bug 964746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964925">SUSE bug 964925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964929">SUSE bug 964929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964947">SUSE bug 964947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964950">SUSE bug 964950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965112">SUSE bug 965112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965156">SUSE bug 965156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965269">SUSE bug 965269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965315">SUSE bug 965315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965317">SUSE bug 965317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967090">SUSE bug 967090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967101">SUSE bug 967101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968004">SUSE bug 968004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969125">SUSE bug 969125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969126">SUSE bug 969126</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4527/">CVE-2013-4527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4529/">CVE-2013-4529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4530/">CVE-2013-4530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3689/">CVE-2014-3689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9718/">CVE-2014-9718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8554/">CVE-2015-8554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8555/">CVE-2015-8555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8817/">CVE-2015-8817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8818/">CVE-2015-8818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1570/">CVE-2016-1570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1571/">CVE-2016-1571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2270/">CVE-2016-2270</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2271/">CVE-2016-2271</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2392/">CVE-2016-2392</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2538/">CVE-2016-2538</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516038" comment="xen-4.4.4_02-22.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516039" comment="xen-kmp-default-4.4.4_02_k3.12.55_52.42-22.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516040" comment="xen-libs-4.4.4_02-22.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516041" comment="xen-libs-32bit-4.4.4_02-22.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77475" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="968565" ref_url="https://bugzilla.suse.com/968565" source="BUGZILLA"/>
		<reference ref_id="976944" ref_url="https://bugzilla.suse.com/976944" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2523" ref_url="https://www.suse.com/security/cve/CVE-2016-2523/" source="CVE"/>
		<reference ref_id="CVE-2016-2530" ref_url="https://www.suse.com/security/cve/CVE-2016-2530/" source="CVE"/>
		<reference ref_id="CVE-2016-2531" ref_url="https://www.suse.com/security/cve/CVE-2016-2531/" source="CVE"/>
		<reference ref_id="CVE-2016-2532" ref_url="https://www.suse.com/security/cve/CVE-2016-2532/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002068.html" source="SUSE-SU"/>
		<description>
This update to Wireshark 1 12.11 fixes a number issues in protocol dissectors that could have allowed a remote attacker to crash Wireshark or cause excessive CPU usage through specially crafted packages inserted into the network or a capture file.

- The PKTC dissector could crash (wnpa-sec-2016-22)
- The PKTC dissector could crash (wnpa-sec-2016-23)
- The IAX2 dissector could go into an infinite loop (wnpa-sec-2016-24)
- Wireshark and TShark could exhaust the stack (wnpa-sec-2016-25) 
- The GSM CBCH dissector could crash (wnpa-sec-2016-26)
- The NCP dissector could crash (wnpa-sec-2016-28)
- CVE-2016-2523: DNP dissector infinite loop (wnpa-sec-2016-03)
- CVE-2016-2530: RSL dissector crash (wnpa-sec-2016-10)
- CVE-2016-2531: RSL dissector crash (wnpa-sec-2016-10)
- CVE-2016-2532: LLRP dissector crash (wnpa-sec-2016-11)
- GSM A-bis OML dissector crash (wnpa-sec-2016-14)
- ASN.1 BER dissector crash (wnpa-sec-2016-15)
- ASN.1 BER dissector crash (wnpa-sec-2016-18) 

Also containsfurther bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-1.12.11.html 
https://www.wireshark.org/docs/relnotes/wireshark-1.12.10.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-18"/>
	<updated date="2016-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/968565">SUSE bug 968565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976944">SUSE bug 976944</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2523/">CVE-2016-2523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2530/">CVE-2016-2530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2531/">CVE-2016-2531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2532/">CVE-2016-2532</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516042" comment="wireshark-1.12.11-25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77476" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="959886" ref_url="https://bugzilla.suse.com/959886" source="BUGZILLA"/>
		<reference ref_id="960158" ref_url="https://bugzilla.suse.com/960158" source="BUGZILLA"/>
		<reference ref_id="963230" ref_url="https://bugzilla.suse.com/963230" source="BUGZILLA"/>
		<reference ref_id="965897" ref_url="https://bugzilla.suse.com/965897" source="BUGZILLA"/>
		<reference ref_id="967122" ref_url="https://bugzilla.suse.com/967122" source="BUGZILLA"/>
		<reference ref_id="970423" ref_url="https://bugzilla.suse.com/970423" source="BUGZILLA"/>
		<reference ref_id="970860" ref_url="https://bugzilla.suse.com/970860" source="BUGZILLA"/>
		<reference ref_id="972612" ref_url="https://bugzilla.suse.com/972612" source="BUGZILLA"/>
		<reference ref_id="972727" ref_url="https://bugzilla.suse.com/972727" source="BUGZILLA"/>
		<reference ref_id="973848" ref_url="https://bugzilla.suse.com/973848" source="BUGZILLA"/>
		<reference ref_id="976766" ref_url="https://bugzilla.suse.com/976766" source="BUGZILLA"/>
		<reference ref_id="978275" ref_url="https://bugzilla.suse.com/978275" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9770" ref_url="https://www.suse.com/security/cve/CVE-2014-9770/" source="CVE"/>
		<reference ref_id="CVE-2015-8842" ref_url="https://www.suse.com/security/cve/CVE-2015-8842/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002071.html" source="SUSE-SU"/>
		<description>

This update for SystemD provides fixes and enhancements.

The following security issue has been fixed:

- Don't allow read access to journal files to users. (bsc#972612, CVE-2014-9770, CVE-2015-8842)

The following non-security issues have been fixed:

- Restore initrd-udevadm-cleanup-db.service. (bsc#978275, bsc#976766)
- Incorrect permissions set after boot on journal files. (bsc#973848)
- Exclude device-mapper from block device ownership event locking. (bsc#972727)
- Explicitly set mode for /run/log.
- Don't apply sgid and executable bit to journal files, only the directories they are contained in.
- Add ability to mask access mode by pre-existing access mode on files/directories.
- No need to pass --all if inactive is explicitly requested in list-units. (bsc#967122)
- Fix automount option and don't start associated mount unit at boot. (bsc#970423)
- Support more than just power-gpio-key. (fate#318444, bsc#970860)
- Add standard gpio power button support. (fate#318444, bsc#970860)
- Downgrade warnings about wanted unit which are not found. (bsc#960158)
- Shorten hostname before checking for trailing dot. (bsc#965897)
- Remove WorkingDirectory parameter from emergency, rescue and console-shell.service. (bsc#959886)
- Don't ship boot.udev and systemd-journald.init anymore.
- Revert 'log: honour the kernel's quiet cmdline argument'. (bsc#963230)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-18"/>
	<updated date="2016-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/959886">SUSE bug 959886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960158">SUSE bug 960158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963230">SUSE bug 963230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965897">SUSE bug 965897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967122">SUSE bug 967122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970423">SUSE bug 970423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970860">SUSE bug 970860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972612">SUSE bug 972612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972727">SUSE bug 972727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973848">SUSE bug 973848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976766">SUSE bug 976766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978275">SUSE bug 978275</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9770/">CVE-2014-9770</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8842/">CVE-2015-8842</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516043" comment="libgudev-1_0-0-210-70.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516044" comment="libgudev-1_0-0-32bit-210-70.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516045" comment="libudev1-210-70.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516046" comment="libudev1-32bit-210-70.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516047" comment="systemd-210-70.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516048" comment="systemd-32bit-210-70.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516049" comment="systemd-bash-completion-210-70.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516050" comment="systemd-sysvinit-210-70.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516051" comment="udev-210-70.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77477" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="729190" ref_url="https://bugzilla.suse.com/729190" source="BUGZILLA"/>
		<reference ref_id="932483" ref_url="https://bugzilla.suse.com/932483" source="BUGZILLA"/>
		<reference ref_id="945484" ref_url="https://bugzilla.suse.com/945484" source="BUGZILLA"/>
		<reference ref_id="945493" ref_url="https://bugzilla.suse.com/945493" source="BUGZILLA"/>
		<reference ref_id="947458" ref_url="https://bugzilla.suse.com/947458" source="BUGZILLA"/>
		<reference ref_id="948902" ref_url="https://bugzilla.suse.com/948902" source="BUGZILLA"/>
		<reference ref_id="960414" ref_url="https://bugzilla.suse.com/960414" source="BUGZILLA"/>
		<reference ref_id="961368" ref_url="https://bugzilla.suse.com/961368" source="BUGZILLA"/>
		<reference ref_id="962313" ref_url="https://bugzilla.suse.com/962313" source="BUGZILLA"/>
		<reference ref_id="965576" ref_url="https://bugzilla.suse.com/965576" source="BUGZILLA"/>
		<reference ref_id="970632" ref_url="https://bugzilla.suse.com/970632" source="BUGZILLA"/>
		<reference ref_id="975865" ref_url="https://bugzilla.suse.com/975865" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8325" ref_url="https://www.suse.com/security/cve/CVE-2015-8325/" source="CVE"/>
		<reference ref_id="CVE-2016-1908" ref_url="https://www.suse.com/security/cve/CVE-2016-1908/" source="CVE"/>
		<reference ref_id="CVE-2016-3115" ref_url="https://www.suse.com/security/cve/CVE-2016-3115/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002080.html" source="SUSE-SU"/>
		<description>
This update for OpenSSH fixes three security issues.

These security issues were fixed:
- CVE-2016-3115: Sanitise input for xauth(1) (bsc#970632)
- CVE-2016-1908: Prevent X11 SECURITY circumvention when forwarding X11 connections (bsc#962313)
- CVE-2015-8325: Ignore PAM environment when using login (bsc#975865)

These non-security issues were fixed:
- Fix help output of sftp (bsc#945493)
- Restarting openssh with openssh-fips installed was not working correctly (bsc#945484)
- Fix crashes when /proc is not available in the chroot (bsc#947458)
- Correctly parse GSSAPI KEX algorithms (bsc#961368)
- More verbose FIPS mode/CC related documentation in README.FIPS (bsc#965576, bsc#960414)
- Fix PRNG re-seeding (bsc#960414, bsc#729190)
- Disable DH parameters under 2048 bits by default and allow lowering the limit back to the RFC 4419 specified minimum through an option (bsc#932483, bsc#948902)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-23"/>
	<updated date="2016-05-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/729190">SUSE bug 729190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932483">SUSE bug 932483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945484">SUSE bug 945484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945493">SUSE bug 945493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947458">SUSE bug 947458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948902">SUSE bug 948902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960414">SUSE bug 960414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961368">SUSE bug 961368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962313">SUSE bug 962313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965576">SUSE bug 965576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970632">SUSE bug 970632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975865">SUSE bug 975865</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8325/">CVE-2015-8325</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1908/">CVE-2016-1908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3115/">CVE-2016-3115</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516052" comment="openssh-6.6p1-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516053" comment="openssh-askpass-gnome-6.6p1-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516054" comment="openssh-helpers-6.6p1-42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77478" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="961642" ref_url="https://bugzilla.suse.com/961642" source="BUGZILLA"/>
		<reference ref_id="961645" ref_url="https://bugzilla.suse.com/961645" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0777" ref_url="https://www.suse.com/security/cve/CVE-2016-0777/" source="CVE"/>
		<reference ref_id="CVE-2016-0778" ref_url="https://www.suse.com/security/cve/CVE-2016-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html" source="SUSE-SU"/>
		<description>

This update for openssh fixes the following issues:

- CVE-2016-0777: A malicious or compromised server could cause the OpenSSH client to expose part or all of the client's private key through the roaming feature (bsc#961642)
- CVE-2016-0778: A malicious or compromised server could could trigger a buffer overflow in the OpenSSH client through the roaming feature (bsc#961645)

This update disables the undocumented feature supported by the OpenSSH client and a commercial SSH server.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-14"/>
	<updated date="2016-01-14"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/961642">SUSE bug 961642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961645">SUSE bug 961645</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0777/">CVE-2016-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0778/">CVE-2016-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516055" comment="openssh-6.6p1-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516056" comment="openssh-askpass-gnome-6.6p1-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516057" comment="openssh-helpers-6.6p1-33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77479" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="934401" ref_url="https://bugzilla.suse.com/934401" source="BUGZILLA"/>
		<reference ref_id="937258" ref_url="https://bugzilla.suse.com/937258" source="BUGZILLA"/>
		<reference ref_id="937343" ref_url="https://bugzilla.suse.com/937343" source="BUGZILLA"/>
		<reference ref_id="937787" ref_url="https://bugzilla.suse.com/937787" source="BUGZILLA"/>
		<reference ref_id="958789" ref_url="https://bugzilla.suse.com/958789" source="BUGZILLA"/>
		<reference ref_id="958790" ref_url="https://bugzilla.suse.com/958790" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4792" ref_url="https://www.suse.com/security/cve/CVE-2015-4792/" source="CVE"/>
		<reference ref_id="CVE-2015-4802" ref_url="https://www.suse.com/security/cve/CVE-2015-4802/" source="CVE"/>
		<reference ref_id="CVE-2015-4807" ref_url="https://www.suse.com/security/cve/CVE-2015-4807/" source="CVE"/>
		<reference ref_id="CVE-2015-4815" ref_url="https://www.suse.com/security/cve/CVE-2015-4815/" source="CVE"/>
		<reference ref_id="CVE-2015-4816" ref_url="https://www.suse.com/security/cve/CVE-2015-4816/" source="CVE"/>
		<reference ref_id="CVE-2015-4819" ref_url="https://www.suse.com/security/cve/CVE-2015-4819/" source="CVE"/>
		<reference ref_id="CVE-2015-4826" ref_url="https://www.suse.com/security/cve/CVE-2015-4826/" source="CVE"/>
		<reference ref_id="CVE-2015-4830" ref_url="https://www.suse.com/security/cve/CVE-2015-4830/" source="CVE"/>
		<reference ref_id="CVE-2015-4836" ref_url="https://www.suse.com/security/cve/CVE-2015-4836/" source="CVE"/>
		<reference ref_id="CVE-2015-4858" ref_url="https://www.suse.com/security/cve/CVE-2015-4858/" source="CVE"/>
		<reference ref_id="CVE-2015-4861" ref_url="https://www.suse.com/security/cve/CVE-2015-4861/" source="CVE"/>
		<reference ref_id="CVE-2015-4870" ref_url="https://www.suse.com/security/cve/CVE-2015-4870/" source="CVE"/>
		<reference ref_id="CVE-2015-4879" ref_url="https://www.suse.com/security/cve/CVE-2015-4879/" source="CVE"/>
		<reference ref_id="CVE-2015-4895" ref_url="https://www.suse.com/security/cve/CVE-2015-4895/" source="CVE"/>
		<reference ref_id="CVE-2015-4913" ref_url="https://www.suse.com/security/cve/CVE-2015-4913/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<description>

MariaDB has been updated to version 10.0.22, which brings fixes for many security
issues and other improvements.

The following CVEs have been fixed:

- 10.0.22: CVE-2015-4802, CVE-2015-4807, CVE-2015-4815, CVE-2015-4826,
           CVE-2015-4830, CVE-2015-4836, CVE-2015-4858, CVE-2015-4861,
           CVE-2015-4870, CVE-2015-4913, CVE-2015-4792
- 10.0.21: CVE-2015-4816, CVE-2015-4819, CVE-2015-4879, CVE-2015-4895

The following non-security issues have been fixed:

- Fix rc.mysql-multi script to properly start instances after restart. (bsc#934401)
- Fix rc.mysql-multi script to restart after crash. (bsc#937258)

For a comprehensive list of changes refer to the upstream Release Notes and Change
Log documents:

- https://kb.askmonty.org/en/mariadb-10022-release-notes/
- https://kb.askmonty.org/en/mariadb-10021-release-notes/
- https://kb.askmonty.org/en/mariadb-10022-changelog/
- https://kb.askmonty.org/en/mariadb-10021-changelog/
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-14"/>
	<updated date="2016-01-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934401">SUSE bug 934401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937258">SUSE bug 937258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937343">SUSE bug 937343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937787">SUSE bug 937787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958790">SUSE bug 958790</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4792/">CVE-2015-4792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4802/">CVE-2015-4802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4807/">CVE-2015-4807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4815/">CVE-2015-4815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4816/">CVE-2015-4816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4819/">CVE-2015-4819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4826/">CVE-2015-4826</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4830/">CVE-2015-4830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4836/">CVE-2015-4836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4858/">CVE-2015-4858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4861/">CVE-2015-4861</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4870/">CVE-2015-4870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4879/">CVE-2015-4879</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4895/">CVE-2015-4895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4913/">CVE-2015-4913</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516058" comment="libmysqlclient18-10.0.22-20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516059" comment="libmysqlclient18-32bit-10.0.22-20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516060" comment="libmysqlclient_r18-10.0.22-20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516061" comment="libmysqlclient_r18-32bit-10.0.22-20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516062" comment="mariadb-10.0.22-20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516063" comment="mariadb-client-10.0.22-20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516064" comment="mariadb-errormessages-10.0.22-20.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77480" version="1" class="patch">
	<metadata>
		<title>Security update for supportutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="980670" ref_url="https://bugzilla.suse.com/980670" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1602" ref_url="https://www.suse.com/security/cve/CVE-2016-1602/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002096.html" source="SUSE-SU"/>
		<description>
supportutils was updated to fix one security issue.

This security issue was fixed:
- CVE-2016-1602: Code injection and privilege escalation via unescaped filenames (bsc#980670).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-07"/>
	<updated date="2016-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/980670">SUSE bug 980670</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1602/">CVE-2016-1602</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516065" comment="supportutils-3.0-82.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77481" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="979441" ref_url="https://bugzilla.suse.com/979441" source="BUGZILLA"/>
		<reference ref_id="980391" ref_url="https://bugzilla.suse.com/980391" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1283" ref_url="https://www.suse.com/security/cve/CVE-2015-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1508-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html" source="SUSE-SU"/>
		<description>

This update for expat fixes the following issues: 

Security issue fixed:
- CVE-2016-0718: Fix Expat XML parser that mishandles certain kinds of malformed input documents. (bsc#979441)
- CVE-2015-1283: Fix multiple integer overflows. (bnc#980391)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-07"/>
	<updated date="2016-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979441">SUSE bug 979441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980391">SUSE bug 980391</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1283/">CVE-2015-1283</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516066" comment="expat-2.1.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516067" comment="libexpat1-2.1.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516068" comment="libexpat1-32bit-2.1.0-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77482" version="1" class="patch">
	<metadata>
		<title>Security update for libksba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="979261" ref_url="https://bugzilla.suse.com/979261" source="BUGZILLA"/>
		<reference ref_id="979906" ref_url="https://bugzilla.suse.com/979906" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4574" ref_url="https://www.suse.com/security/cve/CVE-2016-4574/" source="CVE"/>
		<reference ref_id="CVE-2016-4579" ref_url="https://www.suse.com/security/cve/CVE-2016-4579/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002099.html" source="SUSE-SU"/>
		<description>

This update for libksba fixes the following issues:

- CVE-2016-4579: Out-of-bounds read in _ksba_ber_parse_tl()
- CVE-2016-4574: two OOB read access bugs (remote DoS) (bsc#979261)

Also adding reliability fixes from v1.3.4.

		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-07"/>
	<updated date="2016-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/979261">SUSE bug 979261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979906">SUSE bug 979906</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4574/">CVE-2016-4574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4579/">CVE-2016-4579</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516069" comment="libksba8-1.3.0-23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77483" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="963963" ref_url="https://bugzilla.suse.com/963963" source="BUGZILLA"/>
		<reference ref_id="965283" ref_url="https://bugzilla.suse.com/965283" source="BUGZILLA"/>
		<reference ref_id="978395" ref_url="https://bugzilla.suse.com/978395" source="BUGZILLA"/>
		<reference ref_id="981040" ref_url="https://bugzilla.suse.com/981040" source="BUGZILLA"/>
		<reference ref_id="981041" ref_url="https://bugzilla.suse.com/981041" source="BUGZILLA"/>
		<reference ref_id="981108" ref_url="https://bugzilla.suse.com/981108" source="BUGZILLA"/>
		<reference ref_id="981109" ref_url="https://bugzilla.suse.com/981109" source="BUGZILLA"/>
		<reference ref_id="981111" ref_url="https://bugzilla.suse.com/981111" source="BUGZILLA"/>
		<reference ref_id="981112" ref_url="https://bugzilla.suse.com/981112" source="BUGZILLA"/>
		<reference ref_id="981114" ref_url="https://bugzilla.suse.com/981114" source="BUGZILLA"/>
		<reference ref_id="981115" ref_url="https://bugzilla.suse.com/981115" source="BUGZILLA"/>
		<reference ref_id="981548" ref_url="https://bugzilla.suse.com/981548" source="BUGZILLA"/>
		<reference ref_id="981549" ref_url="https://bugzilla.suse.com/981549" source="BUGZILLA"/>
		<reference ref_id="981550" ref_url="https://bugzilla.suse.com/981550" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8806" ref_url="https://www.suse.com/security/cve/CVE-2015-8806/" source="CVE"/>
		<reference ref_id="CVE-2016-1762" ref_url="https://www.suse.com/security/cve/CVE-2016-1762/" source="CVE"/>
		<reference ref_id="CVE-2016-1833" ref_url="https://www.suse.com/security/cve/CVE-2016-1833/" source="CVE"/>
		<reference ref_id="CVE-2016-1834" ref_url="https://www.suse.com/security/cve/CVE-2016-1834/" source="CVE"/>
		<reference ref_id="CVE-2016-1835" ref_url="https://www.suse.com/security/cve/CVE-2016-1835/" source="CVE"/>
		<reference ref_id="CVE-2016-1837" ref_url="https://www.suse.com/security/cve/CVE-2016-1837/" source="CVE"/>
		<reference ref_id="CVE-2016-1838" ref_url="https://www.suse.com/security/cve/CVE-2016-1838/" source="CVE"/>
		<reference ref_id="CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839/" source="CVE"/>
		<reference ref_id="CVE-2016-1840" ref_url="https://www.suse.com/security/cve/CVE-2016-1840/" source="CVE"/>
		<reference ref_id="CVE-2016-2073" ref_url="https://www.suse.com/security/cve/CVE-2016-2073/" source="CVE"/>
		<reference ref_id="CVE-2016-3705" ref_url="https://www.suse.com/security/cve/CVE-2016-3705/" source="CVE"/>
		<reference ref_id="CVE-2016-4447" ref_url="https://www.suse.com/security/cve/CVE-2016-4447/" source="CVE"/>
		<reference ref_id="CVE-2016-4448" ref_url="https://www.suse.com/security/cve/CVE-2016-4448/" source="CVE"/>
		<reference ref_id="CVE-2016-4449" ref_url="https://www.suse.com/security/cve/CVE-2016-4449/" source="CVE"/>
		<reference ref_id="CVE-2016-4483" ref_url="https://www.suse.com/security/cve/CVE-2016-4483/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00012.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following security issues: 

- CVE-2016-2073, CVE-2015-8806, CVE-2016-1839: A Heap-buffer overread
  was fixed in libxml2/dict.c  [bsc#963963, bsc#965283, bsc#981114].
- CVE-2016-4483: Code was added to avoid an out of bound access when
  serializing malformed strings [bsc#978395].
- CVE-2016-1762: Fixed a heap-based buffer overread in xmlNextChar [bsc#981040].
- CVE-2016-1834: Fixed a heap-buffer-overflow in xmlStrncat [bsc#981041].
- CVE-2016-1833: Fixed a heap-based buffer overread in htmlCurrentChar [bsc#981108].
- CVE-2016-1835: Fixed a heap use-after-free in xmlSAX2AttributeNs [bsc#981109].
- CVE-2016-1837: Fixed a heap use-after-free in htmlParsePubidLiteral
  and htmlParseSystemiteral [bsc#981111].
- CVE-2016-1838: Fixed a heap-based buffer overread in
  xmlParserPrintFileContextInternal [bsc#981112].
- CVE-2016-1840: Fixed a heap-buffer-overflow in xmlFAParsePosCharGroup [bsc#981115].
- CVE-2016-4447: Fixed a heap-based buffer-underreads due to xmlParseName [bsc#981548].
- CVE-2016-4448: Fixed some format string warnings with possible format
  string vulnerability [bsc#981549],
- CVE-2016-4449: Fixed inappropriate fetch of entities content [bsc#981550].
- CVE-2016-3705: Fixed missing increment of recursion counter.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-09"/>
	<updated date="2016-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/963963">SUSE bug 963963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965283">SUSE bug 965283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978395">SUSE bug 978395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981040">SUSE bug 981040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981041">SUSE bug 981041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981108">SUSE bug 981108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981109">SUSE bug 981109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981111">SUSE bug 981111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981112">SUSE bug 981112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981114">SUSE bug 981114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981115">SUSE bug 981115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981548">SUSE bug 981548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981549">SUSE bug 981549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981550">SUSE bug 981550</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8806/">CVE-2015-8806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1762/">CVE-2016-1762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1833/">CVE-2016-1833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1834/">CVE-2016-1834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1835/">CVE-2016-1835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1837/">CVE-2016-1837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1838/">CVE-2016-1838</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1840/">CVE-2016-1840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2073/">CVE-2016-2073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3705/">CVE-2016-3705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4447/">CVE-2016-4447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4448/">CVE-2016-4448</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4449/">CVE-2016-4449</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4483/">CVE-2016-4483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516070" comment="libxml2-2-2.9.1-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516071" comment="libxml2-2-32bit-2.9.1-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516072" comment="libxml2-tools-2.9.1-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516073" comment="python-libxml2-2.9.1-24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77484" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="976844" ref_url="https://bugzilla.suse.com/976844" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8868" ref_url="https://www.suse.com/security/cve/CVE-2015-8868/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002106.html" source="SUSE-SU"/>
		<description>

This update for poppler fixes the following issues: 

Security issues fixed:
- CVE-2015-8868: Corrupted PDF file can corrupt heap, causing DoS (bsc#976844)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-10"/>
	<updated date="2016-06-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/976844">SUSE bug 976844</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8868/">CVE-2015-8868</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516074" comment="libpoppler-glib8-0.24.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516075" comment="libpoppler-qt4-4-0.24.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516076" comment="libpoppler44-0.24.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516077" comment="poppler-tools-0.24.4-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77485" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="886378" ref_url="https://bugzilla.suse.com/886378" source="BUGZILLA"/>
		<reference ref_id="895528" ref_url="https://bugzilla.suse.com/895528" source="BUGZILLA"/>
		<reference ref_id="901508" ref_url="https://bugzilla.suse.com/901508" source="BUGZILLA"/>
		<reference ref_id="928393" ref_url="https://bugzilla.suse.com/928393" source="BUGZILLA"/>
		<reference ref_id="934069" ref_url="https://bugzilla.suse.com/934069" source="BUGZILLA"/>
		<reference ref_id="940929" ref_url="https://bugzilla.suse.com/940929" source="BUGZILLA"/>
		<reference ref_id="944463" ref_url="https://bugzilla.suse.com/944463" source="BUGZILLA"/>
		<reference ref_id="947159" ref_url="https://bugzilla.suse.com/947159" source="BUGZILLA"/>
		<reference ref_id="958491" ref_url="https://bugzilla.suse.com/958491" source="BUGZILLA"/>
		<reference ref_id="958917" ref_url="https://bugzilla.suse.com/958917" source="BUGZILLA"/>
		<reference ref_id="959005" ref_url="https://bugzilla.suse.com/959005" source="BUGZILLA"/>
		<reference ref_id="959386" ref_url="https://bugzilla.suse.com/959386" source="BUGZILLA"/>
		<reference ref_id="960334" ref_url="https://bugzilla.suse.com/960334" source="BUGZILLA"/>
		<reference ref_id="960708" ref_url="https://bugzilla.suse.com/960708" source="BUGZILLA"/>
		<reference ref_id="960725" ref_url="https://bugzilla.suse.com/960725" source="BUGZILLA"/>
		<reference ref_id="960835" ref_url="https://bugzilla.suse.com/960835" source="BUGZILLA"/>
		<reference ref_id="961332" ref_url="https://bugzilla.suse.com/961332" source="BUGZILLA"/>
		<reference ref_id="961333" ref_url="https://bugzilla.suse.com/961333" source="BUGZILLA"/>
		<reference ref_id="961358" ref_url="https://bugzilla.suse.com/961358" source="BUGZILLA"/>
		<reference ref_id="961556" ref_url="https://bugzilla.suse.com/961556" source="BUGZILLA"/>
		<reference ref_id="961691" ref_url="https://bugzilla.suse.com/961691" source="BUGZILLA"/>
		<reference ref_id="962320" ref_url="https://bugzilla.suse.com/962320" source="BUGZILLA"/>
		<reference ref_id="963782" ref_url="https://bugzilla.suse.com/963782" source="BUGZILLA"/>
		<reference ref_id="964413" ref_url="https://bugzilla.suse.com/964413" source="BUGZILLA"/>
		<reference ref_id="967969" ref_url="https://bugzilla.suse.com/967969" source="BUGZILLA"/>
		<reference ref_id="969121" ref_url="https://bugzilla.suse.com/969121" source="BUGZILLA"/>
		<reference ref_id="969122" ref_url="https://bugzilla.suse.com/969122" source="BUGZILLA"/>
		<reference ref_id="969350" ref_url="https://bugzilla.suse.com/969350" source="BUGZILLA"/>
		<reference ref_id="970036" ref_url="https://bugzilla.suse.com/970036" source="BUGZILLA"/>
		<reference ref_id="970037" ref_url="https://bugzilla.suse.com/970037" source="BUGZILLA"/>
		<reference ref_id="975128" ref_url="https://bugzilla.suse.com/975128" source="BUGZILLA"/>
		<reference ref_id="975136" ref_url="https://bugzilla.suse.com/975136" source="BUGZILLA"/>
		<reference ref_id="975700" ref_url="https://bugzilla.suse.com/975700" source="BUGZILLA"/>
		<reference ref_id="976109" ref_url="https://bugzilla.suse.com/976109" source="BUGZILLA"/>
		<reference ref_id="978158" ref_url="https://bugzilla.suse.com/978158" source="BUGZILLA"/>
		<reference ref_id="978160" ref_url="https://bugzilla.suse.com/978160" source="BUGZILLA"/>
		<reference ref_id="980711" ref_url="https://bugzilla.suse.com/980711" source="BUGZILLA"/>
		<reference ref_id="980723" ref_url="https://bugzilla.suse.com/980723" source="BUGZILLA"/>
		<reference ref_id="981266" ref_url="https://bugzilla.suse.com/981266" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3615" ref_url="https://www.suse.com/security/cve/CVE-2014-3615/" source="CVE"/>
		<reference ref_id="CVE-2014-3689" ref_url="https://www.suse.com/security/cve/CVE-2014-3689/" source="CVE"/>
		<reference ref_id="CVE-2014-9718" ref_url="https://www.suse.com/security/cve/CVE-2014-9718/" source="CVE"/>
		<reference ref_id="CVE-2015-3214" ref_url="https://www.suse.com/security/cve/CVE-2015-3214/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-5745" ref_url="https://www.suse.com/security/cve/CVE-2015-5745/" source="CVE"/>
		<reference ref_id="CVE-2015-7295" ref_url="https://www.suse.com/security/cve/CVE-2015-7295/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567/" source="CVE"/>
		<reference ref_id="CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2015-8817" ref_url="https://www.suse.com/security/cve/CVE-2015-8817/" source="CVE"/>
		<reference ref_id="CVE-2015-8818" ref_url="https://www.suse.com/security/cve/CVE-2015-8818/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-2538" ref_url="https://www.suse.com/security/cve/CVE-2016-2538/" source="CVE"/>
		<reference ref_id="CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841/" source="CVE"/>
		<reference ref_id="CVE-2016-2857" ref_url="https://www.suse.com/security/cve/CVE-2016-2857/" source="CVE"/>
		<reference ref_id="CVE-2016-2858" ref_url="https://www.suse.com/security/cve/CVE-2016-2858/" source="CVE"/>
		<reference ref_id="CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710/" source="CVE"/>
		<reference ref_id="CVE-2016-3712" ref_url="https://www.suse.com/security/cve/CVE-2016-3712/" source="CVE"/>
		<reference ref_id="CVE-2016-4001" ref_url="https://www.suse.com/security/cve/CVE-2016-4001/" source="CVE"/>
		<reference ref_id="CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002/" source="CVE"/>
		<reference ref_id="CVE-2016-4020" ref_url="https://www.suse.com/security/cve/CVE-2016-4020/" source="CVE"/>
		<reference ref_id="CVE-2016-4037" ref_url="https://www.suse.com/security/cve/CVE-2016-4037/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-4952" ref_url="https://www.suse.com/security/cve/CVE-2016-4952/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<description>
qemu was updated to fix 37 security issues.

These security issues were fixed:
- CVE-2016-4439: Avoid OOB access in 53C9X emulation (bsc#980711)
- CVE-2016-4441: Avoid OOB access in 53C9X emulation (bsc#980723)
- CVE-2016-4952: Avoid OOB access in Vmware PV SCSI emulation (bsc#981266)
- CVE-2015-8817: Avoid OOB access in PCI DMA I/O (bsc#969121)
- CVE-2015-8818: Avoid OOB access in PCI DMA I/O (bsc#969122)
- CVE-2016-3710: Fixed VGA emulation based OOB access with potential for guest escape (bsc#978158)
- CVE-2016-3712: Fixed VGa emulation based DOS and OOB read access exploit (bsc#978160)
- CVE-2016-4037: Fixed USB ehci based DOS (bsc#976109)
- CVE-2016-2538: Fixed potential OOB access in USB net device emulation (bsc#967969)
- CVE-2016-2841: Fixed OOB access / hang in ne2000 emulation (bsc#969350)
- CVE-2016-2858: Avoid potential DOS when using QEMU pseudo random number generator (bsc#970036)
- CVE-2016-2857: Fixed OOB access when processing IP checksums (bsc#970037)
- CVE-2016-4001: Fixed OOB access in Stellaris enet emulated nic (bsc#975128)
- CVE-2016-4002: Fixed OOB access in MIPSnet emulated controller (bsc#975136)
- CVE-2016-4020: Fixed possible host data leakage to guest from TPR access (bsc#975700)
- CVE-2015-3214: Fixed OOB read in i8254 PIC (bsc#934069)
- CVE-2014-9718: Fixed the handling of malformed or short ide PRDTs to avoid any opportunity for guest to cause DoS by abusing that interface (bsc#928393)
- CVE-2014-3689: Fixed insufficient parameter validation in rectangle functions (bsc#901508)
- CVE-2014-3615: The VGA emulator in QEMU allowed local guest users to read host memory by setting the display to a high resolution (bsc#895528).
- CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463).
- CVE-2015-5745: Buffer overflow in virtio-serial (bsc#940929).
- CVE-2015-7295: hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allowed remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface (bsc#947159).
- CVE-2015-7549: PCI null pointer dereferences (bsc#958917).
- CVE-2015-8504: VNC floating point exception (bsc#958491).
- CVE-2015-8558: Infinite loop in ehci_advance_state resulting in DoS (bsc#959005).
- CVE-2015-8567: A guest repeatedly activating a vmxnet3 device can leak host memory (bsc#959386).
- CVE-2015-8568: A guest repeatedly activating a vmxnet3 device can leak host memory (bsc#959386).
- CVE-2015-8613: Wrong sized memset in megasas command handler (bsc#961358).
- CVE-2015-8619: Potential DoS for long HMP sendkey command argument (bsc#960334).
- CVE-2015-8743: OOB memory access in ne2000 ioport r/w functions (bsc#960725).
- CVE-2015-8744: Incorrect l2 header validation could have lead to a crash via assert(2) call (bsc#960835).
- CVE-2015-8745: Reading IMR registers could have lead to a crash via assert(2) call (bsc#960708).
- CVE-2016-1568: AHCI use-after-free in aio port commands (bsc#961332).
- CVE-2016-1714: Potential OOB memory access in processing firmware configuration (bsc#961691).
- CVE-2016-1922: NULL pointer dereference when processing hmp i/o command (bsc#962320).
- CVE-2016-1981: Potential DoS (infinite loop) in e1000 device emulation by malicious privileged user within guest (bsc#963782).
- CVE-2016-2198: Malicious privileged guest user were able to cause DoS by writing to read-only EHCI capabilities registers (bsc#964413).

This non-security issue was fixed
- bsc#886378: qemu truncates vhd images in virt-rescue
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-13"/>
	<updated date="2016-06-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/886378">SUSE bug 886378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895528">SUSE bug 895528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901508">SUSE bug 901508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928393">SUSE bug 928393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934069">SUSE bug 934069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940929">SUSE bug 940929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944463">SUSE bug 944463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947159">SUSE bug 947159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958491">SUSE bug 958491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958917">SUSE bug 958917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959005">SUSE bug 959005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959386">SUSE bug 959386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960334">SUSE bug 960334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960708">SUSE bug 960708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960725">SUSE bug 960725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960835">SUSE bug 960835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961332">SUSE bug 961332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961333">SUSE bug 961333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961358">SUSE bug 961358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961556">SUSE bug 961556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961691">SUSE bug 961691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962320">SUSE bug 962320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963782">SUSE bug 963782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964413">SUSE bug 964413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967969">SUSE bug 967969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969121">SUSE bug 969121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969122">SUSE bug 969122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969350">SUSE bug 969350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970036">SUSE bug 970036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970037">SUSE bug 970037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975128">SUSE bug 975128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975136">SUSE bug 975136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975700">SUSE bug 975700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976109">SUSE bug 976109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978158">SUSE bug 978158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978160">SUSE bug 978160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980711">SUSE bug 980711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980723">SUSE bug 980723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981266">SUSE bug 981266</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3615/">CVE-2014-3615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3689/">CVE-2014-3689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9718/">CVE-2014-9718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3214/">CVE-2015-3214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5745/">CVE-2015-5745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7295/">CVE-2015-7295</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8817/">CVE-2015-8817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8818/">CVE-2015-8818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2538/">CVE-2016-2538</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2857/">CVE-2016-2857</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2858/">CVE-2016-2858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3712/">CVE-2016-3712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4001/">CVE-2016-4001</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4020/">CVE-2016-4020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4037/">CVE-2016-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4952/">CVE-2016-4952</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516078" comment="qemu-2.0.2-48.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516079" comment="qemu-block-curl-2.0.2-48.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516080" comment="qemu-ipxe-1.0.0-48.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516081" comment="qemu-kvm-2.0.2-48.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516082" comment="qemu-seabios-1.7.4-48.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516083" comment="qemu-sgabios-8-48.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516084" comment="qemu-tools-2.0.2-48.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516085" comment="qemu-vgabios-1.7.4-48.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516086" comment="qemu-x86-2.0.2-48.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77486" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="982385" ref_url="https://bugzilla.suse.com/982385" source="BUGZILLA"/>
		<reference ref_id="982386" ref_url="https://bugzilla.suse.com/982386" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0749" ref_url="https://www.suse.com/security/cve/CVE-2016-0749/" source="CVE"/>
		<reference ref_id="CVE-2016-2150" ref_url="https://www.suse.com/security/cve/CVE-2016-2150/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002110.html" source="SUSE-SU"/>
		<description>
spice was updated to fix two security issues.

These security issues were fixed:
- CVE-2016-2150: Guest escape using crafted primary surface parameters (bsc#982386).
- CVE-2016-0749: Heap-based buffer overflow in smartcard interaction (bsc#982385).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-13"/>
	<updated date="2016-06-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/982385">SUSE bug 982385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982386">SUSE bug 982386</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-0749/">CVE-2016-0749</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2150/">CVE-2016-2150</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516087" comment="libspice-server1-0.12.4-8.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77487" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="957226" ref_url="https://bugzilla.suse.com/957226" source="BUGZILLA"/>
		<reference ref_id="962960" ref_url="https://bugzilla.suse.com/962960" source="BUGZILLA"/>
		<reference ref_id="977450" ref_url="https://bugzilla.suse.com/977450" source="BUGZILLA"/>
		<reference ref_id="977451" ref_url="https://bugzilla.suse.com/977451" source="BUGZILLA"/>
		<reference ref_id="977452" ref_url="https://bugzilla.suse.com/977452" source="BUGZILLA"/>
		<reference ref_id="977455" ref_url="https://bugzilla.suse.com/977455" source="BUGZILLA"/>
		<reference ref_id="977457" ref_url="https://bugzilla.suse.com/977457" source="BUGZILLA"/>
		<reference ref_id="977458" ref_url="https://bugzilla.suse.com/977458" source="BUGZILLA"/>
		<reference ref_id="977459" ref_url="https://bugzilla.suse.com/977459" source="BUGZILLA"/>
		<reference ref_id="977461" ref_url="https://bugzilla.suse.com/977461" source="BUGZILLA"/>
		<reference ref_id="977464" ref_url="https://bugzilla.suse.com/977464" source="BUGZILLA"/>
		<reference ref_id="979302" ref_url="https://bugzilla.suse.com/979302" source="BUGZILLA"/>
		<reference ref_id="979981" ref_url="https://bugzilla.suse.com/979981" source="BUGZILLA"/>
		<reference ref_id="981422" ref_url="https://bugzilla.suse.com/981422" source="BUGZILLA"/>
		<reference ref_id="982064" ref_url="https://bugzilla.suse.com/982064" source="BUGZILLA"/>
		<reference ref_id="982065" ref_url="https://bugzilla.suse.com/982065" source="BUGZILLA"/>
		<reference ref_id="982066" ref_url="https://bugzilla.suse.com/982066" source="BUGZILLA"/>
		<reference ref_id="982067" ref_url="https://bugzilla.suse.com/982067" source="BUGZILLA"/>
		<reference ref_id="982068" ref_url="https://bugzilla.suse.com/982068" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704/" source="CVE"/>
		<reference ref_id="CVE-2015-7705" ref_url="https://www.suse.com/security/cve/CVE-2015-7705/" source="CVE"/>
		<reference ref_id="CVE-2015-7974" ref_url="https://www.suse.com/security/cve/CVE-2015-7974/" source="CVE"/>
		<reference ref_id="CVE-2016-1547" ref_url="https://www.suse.com/security/cve/CVE-2016-1547/" source="CVE"/>
		<reference ref_id="CVE-2016-1548" ref_url="https://www.suse.com/security/cve/CVE-2016-1548/" source="CVE"/>
		<reference ref_id="CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549/" source="CVE"/>
		<reference ref_id="CVE-2016-1550" ref_url="https://www.suse.com/security/cve/CVE-2016-1550/" source="CVE"/>
		<reference ref_id="CVE-2016-1551" ref_url="https://www.suse.com/security/cve/CVE-2016-1551/" source="CVE"/>
		<reference ref_id="CVE-2016-2516" ref_url="https://www.suse.com/security/cve/CVE-2016-2516/" source="CVE"/>
		<reference ref_id="CVE-2016-2517" ref_url="https://www.suse.com/security/cve/CVE-2016-2517/" source="CVE"/>
		<reference ref_id="CVE-2016-2518" ref_url="https://www.suse.com/security/cve/CVE-2016-2518/" source="CVE"/>
		<reference ref_id="CVE-2016-2519" ref_url="https://www.suse.com/security/cve/CVE-2016-2519/" source="CVE"/>
		<reference ref_id="CVE-2016-4953" ref_url="https://www.suse.com/security/cve/CVE-2016-4953/" source="CVE"/>
		<reference ref_id="CVE-2016-4954" ref_url="https://www.suse.com/security/cve/CVE-2016-4954/" source="CVE"/>
		<reference ref_id="CVE-2016-4955" ref_url="https://www.suse.com/security/cve/CVE-2016-4955/" source="CVE"/>
		<reference ref_id="CVE-2016-4956" ref_url="https://www.suse.com/security/cve/CVE-2016-4956/" source="CVE"/>
		<reference ref_id="CVE-2016-4957" ref_url="https://www.suse.com/security/cve/CVE-2016-4957/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<description>
ntp was updated to version 4.2.8p8 to fix 17 security issues.

These security issues were fixed:
- CVE-2016-4956: Broadcast interleave (bsc#982068).
- CVE-2016-2518: Crafted addpeer with hmode &gt; 7 causes array wraparound with MATCH_ASSOC (bsc#977457).
- CVE-2016-2519: ctl_getitem() return value not always checked (bsc#977458).
- CVE-2016-4954: Processing spoofed server packets (bsc#982066).
- CVE-2016-4955: Autokey association reset (bsc#982067).
- CVE-2015-7974: NTP did not verify peer associations of symmetric keys when authenticating packets, which might allowed remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a 'skeleton key (bsc#962960).
- CVE-2016-4957: CRYPTO_NAK crash (bsc#982064).
- CVE-2016-2516: Duplicate IPs on unconfig directives will cause an assertion botch (bsc#977452).
- CVE-2016-2517: Remote configuration trustedkey/requestkey values are not properly validated (bsc#977455).
- CVE-2016-4953: Bad authentication demobilizes ephemeral associations (bsc#982065).
- CVE-2016-1547: CRYPTO-NAK DoS (bsc#977459).
- CVE-2016-1551: Refclock impersonation vulnerability, AKA: refclock-peering (bsc#977450).
- CVE-2016-1550: Improve NTP security against buffer comparison timing attacks, authdecrypt-timing, AKA: authdecrypt-timing (bsc#977464).
- CVE-2016-1548: Interleave-pivot - MITIGATION ONLY (bsc#977461).
- CVE-2016-1549: Sybil vulnerability: ephemeral association attack, AKA: ntp-sybil - MITIGATION ONLY (bsc#977451).

This release also contained improved patches for CVE-2015-7704, CVE-2015-7705, CVE-2015-7974.

These non-security issues were fixed:
- bsc#979302: Change the process name of the forking DNS worker process to avoid the impression that ntpd is started twice.
- bsc#981422: Don't ignore SIGCHILD because it breaks wait().
- bsc#979981: ntp-wait does not accept fractional seconds, so use 1 instead of 0.2 in ntp-wait.service.
- Separate the creation of ntp.keys and key #1 in it to avoid problems when upgrading installations that have the file, but no key #1, which is needed e.g. by 'rcntp addserver'.
- bsc#957226: Restrict the parser in the startup script to the first occurrance of 'keys' and 'controlkey' in ntp.conf.
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-14"/>
	<updated date="2016-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/957226">SUSE bug 957226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962960">SUSE bug 962960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977450">SUSE bug 977450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977451">SUSE bug 977451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977452">SUSE bug 977452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977455">SUSE bug 977455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977457">SUSE bug 977457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977458">SUSE bug 977458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977459">SUSE bug 977459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977461">SUSE bug 977461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977464">SUSE bug 977464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979302">SUSE bug 979302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979981">SUSE bug 979981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981422">SUSE bug 981422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982064">SUSE bug 982064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982065">SUSE bug 982065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982066">SUSE bug 982066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982067">SUSE bug 982067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982068">SUSE bug 982068</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7705/">CVE-2015-7705</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7974/">CVE-2015-7974</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1547/">CVE-2016-1547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1548/">CVE-2016-1548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1550/">CVE-2016-1550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1551/">CVE-2016-1551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2516/">CVE-2016-2516</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2517/">CVE-2016-2517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2518/">CVE-2016-2518</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2519/">CVE-2016-2519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4953/">CVE-2016-4953</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4954/">CVE-2016-4954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4955/">CVE-2016-4955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4956/">CVE-2016-4956</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4957/">CVE-2016-4957</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516088" comment="ntp-4.2.8p8-46.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516089" comment="ntp-doc-4.2.8p8-46.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77488" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="867943" ref_url="https://bugzilla.suse.com/867943" source="BUGZILLA"/>
		<reference ref_id="982178" ref_url="https://bugzilla.suse.com/982178" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5118" ref_url="https://www.suse.com/security/cve/CVE-2016-5118/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00021.html" source="SUSE-SU"/>
		<description>
 This update for ImageMagick fixes the following issues:

This security issue was fixed:
- CVE-2016-5118: Prevent code execution via popen() (bsc#982178)

This non-security issue was fixed:
- Fix encoding of /Title in generated PDFs. (bsc#867943)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-14"/>
	<updated date="2016-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/867943">SUSE bug 867943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982178">SUSE bug 982178</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5118/">CVE-2016-5118</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516090" comment="ImageMagick-6.8.8.1-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516091" comment="libMagick++-6_Q16-3-6.8.8.1-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516092" comment="libMagickCore-6_Q16-1-6.8.8.1-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516093" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516094" comment="libMagickWand-6_Q16-1-6.8.8.1-25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77489" version="1" class="patch">
	<metadata>
		<title>Security update for libarchive (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="979005" ref_url="https://bugzilla.suse.com/979005" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1541" ref_url="https://www.suse.com/security/cve/CVE-2016-1541/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002117.html" source="SUSE-SU"/>
		<description>

This update for libarchive fixes the following issue: 

- Fix a heap-based buffer overflow (CVE-2016-1541, bsc#979005)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-15"/>
	<updated date="2016-06-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/979005">SUSE bug 979005</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1541/">CVE-2016-1541</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516095" comment="libarchive13-3.1.2-12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77490" version="1" class="patch">
	<metadata>
		<title>Security update for p7zip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="979823" ref_url="https://bugzilla.suse.com/979823" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2335" ref_url="https://www.suse.com/security/cve/CVE-2016-2335/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002118.html" source="SUSE-SU"/>
		<description>

This update for p7zip fixes the following issues: 

- add p7zip-9.20.1-CVE-2016-2335.patch to fix 7zip UDF
  CInArchive::ReadFileItem code execution vulnerability
  [bsc#979823], [CVE-2016-2335]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-16"/>
	<updated date="2016-06-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/979823">SUSE bug 979823</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2335/">CVE-2016-2335</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516096" comment="p7zip-9.20.1-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77491" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="983143" ref_url="https://bugzilla.suse.com/983143" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1583" ref_url="https://www.suse.com/security/cve/CVE-2016-1583/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1596-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00027.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 GA kernel was updated to fix one security issue.

The following security bug was fixed:
- CVE-2016-1583: Prevent the usage of mmap when the lower file system does not allow it. This could have lead to local privilege escalation when ecryptfs-utils was installed and /sbin/mount.ecryptfs_private was setuid (bsc#983143).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-16"/>
	<updated date="2016-06-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/983143">SUSE bug 983143</bugzilla>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1583/">CVE-2016-1583</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516097" comment="kernel-default-3.12.55-52.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516098" comment="kernel-default-devel-3.12.55-52.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516099" comment="kernel-default-extra-3.12.55-52.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516100" comment="kernel-devel-3.12.55-52.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516101" comment="kernel-macros-3.12.55-52.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516102" comment="kernel-source-3.12.55-52.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516103" comment="kernel-syms-3.12.55-52.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516104" comment="kernel-xen-3.12.55-52.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516105" comment="kernel-xen-devel-3.12.55-52.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77492" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="929414" ref_url="https://bugzilla.suse.com/929414" source="BUGZILLA"/>
		<reference ref_id="961491" ref_url="https://bugzilla.suse.com/961491" source="BUGZILLA"/>
		<reference ref_id="982779" ref_url="https://bugzilla.suse.com/982779" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3622" ref_url="https://www.suse.com/security/cve/CVE-2015-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-4008" ref_url="https://www.suse.com/security/cve/CVE-2016-4008/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002121.html" source="SUSE-SU"/>
		<description>
This update for libtasn1 fixes the following issues:

- Malformed asn1 definitions could have caused a segmentation fault in the asn1 definition parser (bsc#961491)
- CVE-2015-3622: Fixed invalid read in octet string decoding (bsc#929414)
- CVE-2016-4008: Fixed infinite loop while parsing DER certificates (bsc#982779)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-16"/>
	<updated date="2016-06-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/929414">SUSE bug 929414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961491">SUSE bug 961491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982779">SUSE bug 982779</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3622/">CVE-2015-3622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4008/">CVE-2016-4008</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516106" comment="libtasn1-3.7-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516107" comment="libtasn1-6-3.7-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516108" comment="libtasn1-6-32bit-3.7-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77493" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="984695" ref_url="https://bugzilla.suse.com/984695" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4122" ref_url="https://www.suse.com/security/cve/CVE-2016-4122/" source="CVE"/>
		<reference ref_id="CVE-2016-4123" ref_url="https://www.suse.com/security/cve/CVE-2016-4123/" source="CVE"/>
		<reference ref_id="CVE-2016-4124" ref_url="https://www.suse.com/security/cve/CVE-2016-4124/" source="CVE"/>
		<reference ref_id="CVE-2016-4125" ref_url="https://www.suse.com/security/cve/CVE-2016-4125/" source="CVE"/>
		<reference ref_id="CVE-2016-4127" ref_url="https://www.suse.com/security/cve/CVE-2016-4127/" source="CVE"/>
		<reference ref_id="CVE-2016-4128" ref_url="https://www.suse.com/security/cve/CVE-2016-4128/" source="CVE"/>
		<reference ref_id="CVE-2016-4129" ref_url="https://www.suse.com/security/cve/CVE-2016-4129/" source="CVE"/>
		<reference ref_id="CVE-2016-4130" ref_url="https://www.suse.com/security/cve/CVE-2016-4130/" source="CVE"/>
		<reference ref_id="CVE-2016-4131" ref_url="https://www.suse.com/security/cve/CVE-2016-4131/" source="CVE"/>
		<reference ref_id="CVE-2016-4132" ref_url="https://www.suse.com/security/cve/CVE-2016-4132/" source="CVE"/>
		<reference ref_id="CVE-2016-4133" ref_url="https://www.suse.com/security/cve/CVE-2016-4133/" source="CVE"/>
		<reference ref_id="CVE-2016-4134" ref_url="https://www.suse.com/security/cve/CVE-2016-4134/" source="CVE"/>
		<reference ref_id="CVE-2016-4135" ref_url="https://www.suse.com/security/cve/CVE-2016-4135/" source="CVE"/>
		<reference ref_id="CVE-2016-4136" ref_url="https://www.suse.com/security/cve/CVE-2016-4136/" source="CVE"/>
		<reference ref_id="CVE-2016-4137" ref_url="https://www.suse.com/security/cve/CVE-2016-4137/" source="CVE"/>
		<reference ref_id="CVE-2016-4138" ref_url="https://www.suse.com/security/cve/CVE-2016-4138/" source="CVE"/>
		<reference ref_id="CVE-2016-4139" ref_url="https://www.suse.com/security/cve/CVE-2016-4139/" source="CVE"/>
		<reference ref_id="CVE-2016-4140" ref_url="https://www.suse.com/security/cve/CVE-2016-4140/" source="CVE"/>
		<reference ref_id="CVE-2016-4141" ref_url="https://www.suse.com/security/cve/CVE-2016-4141/" source="CVE"/>
		<reference ref_id="CVE-2016-4142" ref_url="https://www.suse.com/security/cve/CVE-2016-4142/" source="CVE"/>
		<reference ref_id="CVE-2016-4143" ref_url="https://www.suse.com/security/cve/CVE-2016-4143/" source="CVE"/>
		<reference ref_id="CVE-2016-4144" ref_url="https://www.suse.com/security/cve/CVE-2016-4144/" source="CVE"/>
		<reference ref_id="CVE-2016-4145" ref_url="https://www.suse.com/security/cve/CVE-2016-4145/" source="CVE"/>
		<reference ref_id="CVE-2016-4146" ref_url="https://www.suse.com/security/cve/CVE-2016-4146/" source="CVE"/>
		<reference ref_id="CVE-2016-4147" ref_url="https://www.suse.com/security/cve/CVE-2016-4147/" source="CVE"/>
		<reference ref_id="CVE-2016-4148" ref_url="https://www.suse.com/security/cve/CVE-2016-4148/" source="CVE"/>
		<reference ref_id="CVE-2016-4149" ref_url="https://www.suse.com/security/cve/CVE-2016-4149/" source="CVE"/>
		<reference ref_id="CVE-2016-4150" ref_url="https://www.suse.com/security/cve/CVE-2016-4150/" source="CVE"/>
		<reference ref_id="CVE-2016-4151" ref_url="https://www.suse.com/security/cve/CVE-2016-4151/" source="CVE"/>
		<reference ref_id="CVE-2016-4152" ref_url="https://www.suse.com/security/cve/CVE-2016-4152/" source="CVE"/>
		<reference ref_id="CVE-2016-4153" ref_url="https://www.suse.com/security/cve/CVE-2016-4153/" source="CVE"/>
		<reference ref_id="CVE-2016-4154" ref_url="https://www.suse.com/security/cve/CVE-2016-4154/" source="CVE"/>
		<reference ref_id="CVE-2016-4155" ref_url="https://www.suse.com/security/cve/CVE-2016-4155/" source="CVE"/>
		<reference ref_id="CVE-2016-4156" ref_url="https://www.suse.com/security/cve/CVE-2016-4156/" source="CVE"/>
		<reference ref_id="CVE-2016-4166" ref_url="https://www.suse.com/security/cve/CVE-2016-4166/" source="CVE"/>
		<reference ref_id="CVE-2016-4171" ref_url="https://www.suse.com/security/cve/CVE-2016-4171/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<description>

Adobe flash-player was updated to 11.2.202.626 to fix the following security issues:

Security update to 11.2.202.626 (boo#984695):
* APSB16-18, CVE-2016-4122, CVE-2016-4123, CVE-2016-4124,
  CVE-2016-4125, CVE-2016-4127, CVE-2016-4128, CVE-2016-4129,
  CVE-2016-4130, CVE-2016-4131, CVE-2016-4132, CVE-2016-4133,
  CVE-2016-4134, CVE-2016-4135, CVE-2016-4136, CVE-2016-4137,
  CVE-2016-4138, CVE-2016-4139, CVE-2016-4140, CVE-2016-4141,
  CVE-2016-4142, CVE-2016-4143, CVE-2016-4144, CVE-2016-4145,
  CVE-2016-4146, CVE-2016-4147, CVE-2016-4148, CVE-2016-4149,
  CVE-2016-4150, CVE-2016-4151, CVE-2016-4152, CVE-2016-4153,
  CVE-2016-4154, CVE-2016-4155, CVE-2016-4156, CVE-2016-4166,
  CVE-2016-4171

Please see https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4122/">CVE-2016-4122</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4123/">CVE-2016-4123</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4124/">CVE-2016-4124</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4125/">CVE-2016-4125</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4127/">CVE-2016-4127</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4128/">CVE-2016-4128</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4129/">CVE-2016-4129</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4130/">CVE-2016-4130</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4131/">CVE-2016-4131</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4132/">CVE-2016-4132</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4133/">CVE-2016-4133</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4134/">CVE-2016-4134</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4135/">CVE-2016-4135</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4136/">CVE-2016-4136</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4137/">CVE-2016-4137</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4138/">CVE-2016-4138</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4139/">CVE-2016-4139</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4140/">CVE-2016-4140</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4141/">CVE-2016-4141</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4142/">CVE-2016-4142</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4143/">CVE-2016-4143</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4144/">CVE-2016-4144</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4145/">CVE-2016-4145</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4146/">CVE-2016-4146</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4147/">CVE-2016-4147</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4148/">CVE-2016-4148</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4149/">CVE-2016-4149</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4150/">CVE-2016-4150</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4151/">CVE-2016-4151</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4152/">CVE-2016-4152</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4153/">CVE-2016-4153</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4154/">CVE-2016-4154</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4155/">CVE-2016-4155</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4156/">CVE-2016-4156</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4166/">CVE-2016-4166</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4171/">CVE-2016-4171</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77494" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="960961" ref_url="https://bugzilla.suse.com/960961" source="BUGZILLA"/>
		<reference ref_id="961935" ref_url="https://bugzilla.suse.com/961935" source="BUGZILLA"/>
		<reference ref_id="963806" ref_url="https://bugzilla.suse.com/963806" source="BUGZILLA"/>
		<reference ref_id="980904" ref_url="https://bugzilla.suse.com/980904" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0505" ref_url="https://www.suse.com/security/cve/CVE-2016-0505/" source="CVE"/>
		<reference ref_id="CVE-2016-0546" ref_url="https://www.suse.com/security/cve/CVE-2016-0546/" source="CVE"/>
		<reference ref_id="CVE-2016-0596" ref_url="https://www.suse.com/security/cve/CVE-2016-0596/" source="CVE"/>
		<reference ref_id="CVE-2016-0597" ref_url="https://www.suse.com/security/cve/CVE-2016-0597/" source="CVE"/>
		<reference ref_id="CVE-2016-0598" ref_url="https://www.suse.com/security/cve/CVE-2016-0598/" source="CVE"/>
		<reference ref_id="CVE-2016-0600" ref_url="https://www.suse.com/security/cve/CVE-2016-0600/" source="CVE"/>
		<reference ref_id="CVE-2016-0606" ref_url="https://www.suse.com/security/cve/CVE-2016-0606/" source="CVE"/>
		<reference ref_id="CVE-2016-0608" ref_url="https://www.suse.com/security/cve/CVE-2016-0608/" source="CVE"/>
		<reference ref_id="CVE-2016-0609" ref_url="https://www.suse.com/security/cve/CVE-2016-0609/" source="CVE"/>
		<reference ref_id="CVE-2016-0616" ref_url="https://www.suse.com/security/cve/CVE-2016-0616/" source="CVE"/>
		<reference ref_id="CVE-2016-0640" ref_url="https://www.suse.com/security/cve/CVE-2016-0640/" source="CVE"/>
		<reference ref_id="CVE-2016-0641" ref_url="https://www.suse.com/security/cve/CVE-2016-0641/" source="CVE"/>
		<reference ref_id="CVE-2016-0642" ref_url="https://www.suse.com/security/cve/CVE-2016-0642/" source="CVE"/>
		<reference ref_id="CVE-2016-0643" ref_url="https://www.suse.com/security/cve/CVE-2016-0643/" source="CVE"/>
		<reference ref_id="CVE-2016-0644" ref_url="https://www.suse.com/security/cve/CVE-2016-0644/" source="CVE"/>
		<reference ref_id="CVE-2016-0646" ref_url="https://www.suse.com/security/cve/CVE-2016-0646/" source="CVE"/>
		<reference ref_id="CVE-2016-0647" ref_url="https://www.suse.com/security/cve/CVE-2016-0647/" source="CVE"/>
		<reference ref_id="CVE-2016-0648" ref_url="https://www.suse.com/security/cve/CVE-2016-0648/" source="CVE"/>
		<reference ref_id="CVE-2016-0649" ref_url="https://www.suse.com/security/cve/CVE-2016-0649/" source="CVE"/>
		<reference ref_id="CVE-2016-0650" ref_url="https://www.suse.com/security/cve/CVE-2016-0650/" source="CVE"/>
		<reference ref_id="CVE-2016-0651" ref_url="https://www.suse.com/security/cve/CVE-2016-0651/" source="CVE"/>
		<reference ref_id="CVE-2016-0655" ref_url="https://www.suse.com/security/cve/CVE-2016-0655/" source="CVE"/>
		<reference ref_id="CVE-2016-0666" ref_url="https://www.suse.com/security/cve/CVE-2016-0666/" source="CVE"/>
		<reference ref_id="CVE-2016-0668" ref_url="https://www.suse.com/security/cve/CVE-2016-0668/" source="CVE"/>
		<reference ref_id="CVE-2016-2047" ref_url="https://www.suse.com/security/cve/CVE-2016-2047/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<description>
mariadb was updated to version 10.0.25 to fix 25 security issues.

These security issues were fixed:
- CVE-2016-0505: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to Options (bsc#980904).
- CVE-2016-0546: Unspecified vulnerability allowed local users to affect confidentiality, integrity, and availability via unknown vectors related to Client (bsc#980904).
- CVE-2016-0596: Unspecified vulnerability allowed remote authenticated users to affect availability via vectors related to DML (bsc#980904).
- CVE-2016-0597: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to Optimizer (bsc#980904).
- CVE-2016-0598: Unspecified vulnerability allowed remote authenticated users to affect availability via vectors related to DML (bsc#980904).
- CVE-2016-0600: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to InnoDB (bsc#980904).
- CVE-2016-0606: Unspecified vulnerability allowed remote authenticated users to affect integrity via unknown vectors related to encryption (bsc#980904).
- CVE-2016-0608: Unspecified vulnerability allowed remote authenticated users to affect availability via vectors related to UDF (bsc#980904).
- CVE-2016-0609: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to privileges (bsc#980904).
- CVE-2016-0616: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to Optimizer (bsc#980904).
- CVE-2016-0640: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to DML (bsc#980904).
- CVE-2016-0641: Unspecified vulnerability allowed local users to affect confidentiality and availability via vectors related to MyISAM (bsc#980904).
- CVE-2016-0642: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to Federated (bsc#980904).
- CVE-2016-0643: Unspecified vulnerability allowed local users to affect confidentiality via vectors related to DML (bsc#980904).
- CVE-2016-0644: Unspecified vulnerability allowed local users to affect availability via vectors related to DDL (bsc#980904).
- CVE-2016-0646: Unspecified vulnerability allowed local users to affect availability via vectors related to DML (bsc#980904).
- CVE-2016-0647: Unspecified vulnerability allowed local users to affect availability via vectors related to FTS (bsc#980904).
- CVE-2016-0648: Unspecified vulnerability allowed local users to affect availability via vectors related to PS (bsc#980904).
- CVE-2016-0649: Unspecified vulnerability allowed local users to affect availability via vectors related to PS (bsc#980904).
- CVE-2016-0650: Unspecified vulnerability allowed local users to affect availability via vectors related to Replication (bsc#980904).
- CVE-2016-0651: Unspecified vulnerability allowed local users to affect availability via vectors related to Optimizer (bsc#980904).
- CVE-2016-0655: Unspecified vulnerability allowed local users to affect availability via vectors related to InnoDB (bsc#980904).
- CVE-2016-0666: Unspecified vulnerability allowed local users to affect availability via vectors related to Security: Privileges (bsc#980904).
- CVE-2016-0668: Unspecified vulnerability allowed local users to affect availability via vectors related to InnoDB (bsc#980904).
- CVE-2016-2047: The ssl_verify_server_cert function in sql-common/client.c did not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allowed man-in-the-middle attackers to spoof SSL servers via a '/CN=' string in a field in a certificate, as demonstrated by '/OU=/CN=bar.com/CN=foo.com (bsc#963806).

These non-security issues were fixed:
- bsc#960961: Use 'plugin-load-add' instead of 'plugin-load' in default_plugins.cnf. It contained 'plugin-load' options which
  caused that only last plugin was actually loaded ('plugin-load' overrides the previous 'plugin-load') 
- bsc#961935: Remove the leftovers of 'openSUSE' string in the '-DWITH_COMMENT' and 'DCOMPILATION_COMMENT' options 
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/960961">SUSE bug 960961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961935">SUSE bug 961935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963806">SUSE bug 963806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0505/">CVE-2016-0505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0546/">CVE-2016-0546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0596/">CVE-2016-0596</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0597/">CVE-2016-0597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0598/">CVE-2016-0598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0600/">CVE-2016-0600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0606/">CVE-2016-0606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0608/">CVE-2016-0608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0609/">CVE-2016-0609</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0616/">CVE-2016-0616</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0640/">CVE-2016-0640</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0641/">CVE-2016-0641</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0642/">CVE-2016-0642</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0643/">CVE-2016-0643</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0644/">CVE-2016-0644</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0646/">CVE-2016-0646</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0647/">CVE-2016-0647</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0648/">CVE-2016-0648</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0649/">CVE-2016-0649</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0650/">CVE-2016-0650</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0651/">CVE-2016-0651</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0655/">CVE-2016-0655</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0666/">CVE-2016-0666</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0668/">CVE-2016-0668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2047/">CVE-2016-2047</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516111" comment="libmysqlclient18-10.0.25-20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516112" comment="libmysqlclient18-32bit-10.0.25-20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516113" comment="libmysqlclient_r18-10.0.25-20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516114" comment="libmysqlclient_r18-32bit-10.0.25-20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516115" comment="mariadb-10.0.25-20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516116" comment="mariadb-client-10.0.25-20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516117" comment="mariadb-errormessages-10.0.25-20.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77495" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="981049" ref_url="https://bugzilla.suse.com/981049" source="BUGZILLA"/>
		<reference ref_id="981050" ref_url="https://bugzilla.suse.com/981050" source="BUGZILLA"/>
		<reference ref_id="981061" ref_url="https://bugzilla.suse.com/981061" source="BUGZILLA"/>
		<reference ref_id="982009" ref_url="https://bugzilla.suse.com/982009" source="BUGZILLA"/>
		<reference ref_id="982010" ref_url="https://bugzilla.suse.com/982010" source="BUGZILLA"/>
		<reference ref_id="982011" ref_url="https://bugzilla.suse.com/982011" source="BUGZILLA"/>
		<reference ref_id="982012" ref_url="https://bugzilla.suse.com/982012" source="BUGZILLA"/>
		<reference ref_id="982013" ref_url="https://bugzilla.suse.com/982013" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7456" ref_url="https://www.suse.com/security/cve/CVE-2013-7456/" source="CVE"/>
		<reference ref_id="CVE-2015-8876" ref_url="https://www.suse.com/security/cve/CVE-2015-8876/" source="CVE"/>
		<reference ref_id="CVE-2015-8877" ref_url="https://www.suse.com/security/cve/CVE-2015-8877/" source="CVE"/>
		<reference ref_id="CVE-2015-8879" ref_url="https://www.suse.com/security/cve/CVE-2015-8879/" source="CVE"/>
		<reference ref_id="CVE-2016-5093" ref_url="https://www.suse.com/security/cve/CVE-2016-5093/" source="CVE"/>
		<reference ref_id="CVE-2016-5094" ref_url="https://www.suse.com/security/cve/CVE-2016-5094/" source="CVE"/>
		<reference ref_id="CVE-2016-5095" ref_url="https://www.suse.com/security/cve/CVE-2016-5095/" source="CVE"/>
		<reference ref_id="CVE-2016-5096" ref_url="https://www.suse.com/security/cve/CVE-2016-5096/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002130.html" source="SUSE-SU"/>
		<description>
This update for php5 fixes the following issues:

- CVE-2013-7456: imagescale out-of-bounds read (bnc#982009).
- CVE-2016-5093: get_icu_value_internal out-of-bounds read (bnc#982010).
- CVE-2016-5094: Don't create strings with lengths outside of valid range (bnc#982011).
- CVE-2016-5095: Don't create strings with lengths outside of valid range (bnc#982012).
- CVE-2016-5096: int/size_t confusion in fread (bsc#982013).
- CVE-2015-8877: The gdImageScaleTwoPass function in gd_interpolation.c in the GD Graphics Library (aka libgd) as used in PHP used inconsistent allocate and free approaches, which allowed remote attackers to cause a denial of service (memory consumption) via a crafted call, as demonstrated by a call to the PHP imagescale function (bsc#981061).
- CVE-2015-8876: Zend/zend_exceptions.c in PHP did not validate certain Exception objects, which allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) or trigger unintended method execution via crafted serialized data (bsc#981049).
- CVE-2015-8879: The odbc_bindcols function in ext/odbc/php_odbc.c in PHP mishandles driver behavior for SQL_WVARCHAR columns, which allowed remote attackers to cause a denial of service (application crash) in opportunistic circumstances by leveraging use of the odbc_fetch_array function to access a certain type of Microsoft SQL Server table (bsc#981050).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-20"/>
	<updated date="2016-06-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/981049">SUSE bug 981049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981050">SUSE bug 981050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981061">SUSE bug 981061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982009">SUSE bug 982009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982010">SUSE bug 982010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982011">SUSE bug 982011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982012">SUSE bug 982012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982013">SUSE bug 982013</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7456/">CVE-2013-7456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8876/">CVE-2015-8876</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8877/">CVE-2015-8877</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8879/">CVE-2015-8879</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5093/">CVE-2016-5093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5094/">CVE-2016-5094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5095/">CVE-2016-5095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5096/">CVE-2016-5096</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516118" comment="libc-client2007e_suse-2007e_suse-19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77496" version="1" class="patch">
	<metadata>
		<title>Security update for libimobiledevice, usbmuxd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="982014" ref_url="https://bugzilla.suse.com/982014" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5104" ref_url="https://www.suse.com/security/cve/CVE-2016-5104/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00042.html" source="SUSE-SU"/>
		<description>
libimobiledevice, usbmuxd were updated to fix one security issue.

This security issue was fixed:
- CVE-2016-5104: Sockets listening on INADDR_ANY instead of only locally (982014).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-21"/>
	<updated date="2016-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/982014">SUSE bug 982014</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5104/">CVE-2016-5104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516119" comment="libimobiledevice-tools-1.1.5-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516120" comment="libimobiledevice4-1.1.5-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516121" comment="libusbmuxd2-1.0.8-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516122" comment="usbmuxd-1.0.8-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77497" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12</platform>
		</affected>
		<reference ref_id="959888" ref_url="https://bugzilla.suse.com/959888" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001807.html" source="SUSE-SU"/>
		<description>
This update contains mozilla-nss 3.19.2.2 and fixes the following security issue:

  - CVE-2015-7575: MD5 signatures accepted within TLS 1.2 ServerKeyExchange in server signature (bsc#959888).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-18"/>
	<updated date="2016-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/959888">SUSE bug 959888</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009116183" comment="SUSE Linux Enterprise Desktop 12 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516123" comment="libfreebl3-3.19.2.2-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516124" comment="libfreebl3-32bit-3.19.2.2-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516125" comment="libsoftokn3-3.19.2.2-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516126" comment="libsoftokn3-32bit-3.19.2.2-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516127" comment="mozilla-nss-3.19.2.2-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516128" comment="mozilla-nss-32bit-3.19.2.2-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516129" comment="mozilla-nss-certs-3.19.2.2-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516130" comment="mozilla-nss-certs-32bit-3.19.2.2-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516131" comment="mozilla-nss-sysinit-3.19.2.2-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516132" comment="mozilla-nss-sysinit-32bit-3.19.2.2-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516133" comment="mozilla-nss-tools-3.19.2.2-32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77498" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="959277" ref_url="https://bugzilla.suse.com/959277" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201/" source="CVE"/>
		<reference ref_id="CVE-2015-7202" ref_url="https://www.suse.com/security/cve/CVE-2015-7202/" source="CVE"/>
		<reference ref_id="CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205/" source="CVE"/>
		<reference ref_id="CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210/" source="CVE"/>
		<reference ref_id="CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212/" source="CVE"/>
		<reference ref_id="CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213/" source="CVE"/>
		<reference ref_id="CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214/" source="CVE"/>
		<reference ref_id="CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to version 38.5.0 ESR to fix the following issues: 

* MFSA 2015-134/CVE-2015-7201/CVE-2015-7202
  Miscellaneous memory safety hazards (rv:43.0 / rv:38.5)
* MFSA 2015-138/CVE-2015-7210
  A use-after-free in WebRTC when datachannel is used after being
  destroyed
* MFSA 2015-139/CVE-2015-7212
  An integer overflow allocating extremely large textures
* MFSA 2015-145/CVE-2015-7205
  A underflow found through code inspection
* MFSA 2015-146/CVE-2015-7213
  A integer overflow in MP4 playback in 64-bit versions
* MFSA 2015-147/CVE-2015-7222
  Integer underflow and buffer overflow processing MP4 metadata
  in libstagefright
* MFSA 2015-149/CVE-2015-7214
  Cross-site reading attack through data and view-source URIs
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-21"/>
	<updated date="2015-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7202/">CVE-2015-7202</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514536" comment="MozillaFirefox-38.5.0esr-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514537" comment="MozillaFirefox-translations-38.5.0esr-54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77499" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl098 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="952099" ref_url="https://bugzilla.suse.com/952099" source="BUGZILLA"/>
		<reference ref_id="957812" ref_url="https://bugzilla.suse.com/957812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001758.html" source="SUSE-SU"/>
		<description>

This update for compat-openssl098 fixes the following issues: 

Security issue fixed:;
- CVE-2015-3195: When presented with a malformed X509_ATTRIBUTE structure
  OpenSSL would leak memory. This structure is used by the PKCS#7 and CMS
  routines so any application which reads PKCS#7 or CMS data from untrusted
  sources is affected. SSL/TLS is not affected. (bsc#957812)

Non security issue fixed:
- Prevent segfault in s_client with invalid options (bsc#952099)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-22"/>
	<updated date="2015-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952099">SUSE bug 952099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514541" comment="libopenssl0_9_8-0.9.8j-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514542" comment="libopenssl0_9_8-32bit-0.9.8j-87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77500" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="958861" ref_url="https://bugzilla.suse.com/958861" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8000" ref_url="https://www.suse.com/security/cve/CVE-2015-8000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00034.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following security issue: 

- CVE-2015-8000: Fix remote denial of service by misparsing incoming responses
  (bsc#958861).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-24"/>
	<updated date="2015-12-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/958861">SUSE bug 958861</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8000/">CVE-2015-8000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516134" comment="bind-libs-9.9.6P1-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516135" comment="bind-libs-32bit-9.9.6P1-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516136" comment="bind-utils-9.9.6P1-32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77501" version="1" class="patch">
	<metadata>
		<title>Security update for xfsprogs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="939367" ref_url="https://bugzilla.suse.com/939367" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2150" ref_url="https://www.suse.com/security/cve/CVE-2012-2150/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001765.html" source="SUSE-SU"/>
		<description>
xfsprogs was updated to fix one security vulnerability and several bugs.

- Handle unwanted data disclosure in xfs_metadump (bsc#939367, CVE-2012-2150)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-28"/>
	<updated date="2015-12-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/939367">SUSE bug 939367</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2150/">CVE-2012-2150</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514545" comment="xfsprogs-3.2.1-3.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77502" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="774666" ref_url="https://bugzilla.suse.com/774666" source="BUGZILLA"/>
		<reference ref_id="917427" ref_url="https://bugzilla.suse.com/917427" source="BUGZILLA"/>
		<reference ref_id="946148" ref_url="https://bugzilla.suse.com/946148" source="BUGZILLA"/>
		<reference ref_id="952539" ref_url="https://bugzilla.suse.com/952539" source="BUGZILLA"/>
		<reference ref_id="954126" ref_url="https://bugzilla.suse.com/954126" source="BUGZILLA"/>
		<reference ref_id="954519" ref_url="https://bugzilla.suse.com/954519" source="BUGZILLA"/>
		<reference ref_id="955493" ref_url="https://bugzilla.suse.com/955493" source="BUGZILLA"/>
		<reference ref_id="955609" ref_url="https://bugzilla.suse.com/955609" source="BUGZILLA"/>
		<reference ref_id="956631" ref_url="https://bugzilla.suse.com/956631" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8370" ref_url="https://www.suse.com/security/cve/CVE-2015-8370/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00041.html" source="SUSE-SU"/>
		<description>


- Fix buffer overflows when reading username and password. (bsc#956631, CVE-2015-8370)
- Check MS-DOS header to find PE file header. (bsc#954126)
- Use dirname for copying Xen kernel and initrd to esp. (bsc#955493)
- Fix reading password by grub2-mkpasswd-pbdk2 without controlling tty. (bsc#954519)
- Add luks, gcry_rijndael and gcry_sha1 to signed EFI image to support LUKS partition
  in default setup. (bsc#917427, bsc#955609)
- Expand list of grub.cfg search path in PV Xen guests for systems installed on btrfs
  snapshots. (bsc#946148, bsc#952539)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-29"/>
	<updated date="2015-12-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/774666">SUSE bug 774666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917427">SUSE bug 917427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946148">SUSE bug 946148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952539">SUSE bug 952539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954126">SUSE bug 954126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954519">SUSE bug 954519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955493">SUSE bug 955493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955609">SUSE bug 955609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956631">SUSE bug 956631</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8370/">CVE-2015-8370</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516137" comment="grub2-2.02~beta2-73.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516138" comment="grub2-i386-pc-2.02~beta2-73.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516139" comment="grub2-snapper-plugin-2.02~beta2-73.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516140" comment="grub2-x86_64-efi-2.02~beta2-73.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516141" comment="grub2-x86_64-xen-2.02~beta2-73.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77503" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="960317" ref_url="https://bugzilla.suse.com/960317" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8459" ref_url="https://www.suse.com/security/cve/CVE-2015-8459/" source="CVE"/>
		<reference ref_id="CVE-2015-8460" ref_url="https://www.suse.com/security/cve/CVE-2015-8460/" source="CVE"/>
		<reference ref_id="CVE-2015-8634" ref_url="https://www.suse.com/security/cve/CVE-2015-8634/" source="CVE"/>
		<reference ref_id="CVE-2015-8635" ref_url="https://www.suse.com/security/cve/CVE-2015-8635/" source="CVE"/>
		<reference ref_id="CVE-2015-8636" ref_url="https://www.suse.com/security/cve/CVE-2015-8636/" source="CVE"/>
		<reference ref_id="CVE-2015-8638" ref_url="https://www.suse.com/security/cve/CVE-2015-8638/" source="CVE"/>
		<reference ref_id="CVE-2015-8639" ref_url="https://www.suse.com/security/cve/CVE-2015-8639/" source="CVE"/>
		<reference ref_id="CVE-2015-8640" ref_url="https://www.suse.com/security/cve/CVE-2015-8640/" source="CVE"/>
		<reference ref_id="CVE-2015-8641" ref_url="https://www.suse.com/security/cve/CVE-2015-8641/" source="CVE"/>
		<reference ref_id="CVE-2015-8642" ref_url="https://www.suse.com/security/cve/CVE-2015-8642/" source="CVE"/>
		<reference ref_id="CVE-2015-8643" ref_url="https://www.suse.com/security/cve/CVE-2015-8643/" source="CVE"/>
		<reference ref_id="CVE-2015-8644" ref_url="https://www.suse.com/security/cve/CVE-2015-8644/" source="CVE"/>
		<reference ref_id="CVE-2015-8645" ref_url="https://www.suse.com/security/cve/CVE-2015-8645/" source="CVE"/>
		<reference ref_id="CVE-2015-8646" ref_url="https://www.suse.com/security/cve/CVE-2015-8646/" source="CVE"/>
		<reference ref_id="CVE-2015-8647" ref_url="https://www.suse.com/security/cve/CVE-2015-8647/" source="CVE"/>
		<reference ref_id="CVE-2015-8648" ref_url="https://www.suse.com/security/cve/CVE-2015-8648/" source="CVE"/>
		<reference ref_id="CVE-2015-8649" ref_url="https://www.suse.com/security/cve/CVE-2015-8649/" source="CVE"/>
		<reference ref_id="CVE-2015-8650" ref_url="https://www.suse.com/security/cve/CVE-2015-8650/" source="CVE"/>
		<reference ref_id="CVE-2015-8651" ref_url="https://www.suse.com/security/cve/CVE-2015-8651/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<description>

This update for flash-player fixes the following issues: 

   - CVE-2015-8644: Type confusion vulnerability that could lead to code execution .
   - CVE-2015-8651: Integer overflow vulnerability that could lead to code execution.
   - CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, CVE-2015-8650: Use-after-free vulnerabilities that could lead to code execution.
   - CVE-2015-8459, CVE-2015-8460, CVE-2015-8636, CVE-2015-8645: Memory corruption vulnerabilities that could lead to code execution.

		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-30"/>
	<updated date="2015-12-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8459/">CVE-2015-8459</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8460/">CVE-2015-8460</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8634/">CVE-2015-8634</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8635/">CVE-2015-8635</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8636/">CVE-2015-8636</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8638/">CVE-2015-8638</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8639/">CVE-2015-8639</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8640/">CVE-2015-8640</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8641/">CVE-2015-8641</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8642/">CVE-2015-8642</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8643/">CVE-2015-8643</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8644/">CVE-2015-8644</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8645/">CVE-2015-8645</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8646/">CVE-2015-8646</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8647/">CVE-2015-8647</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8648/">CVE-2015-8648</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8649/">CVE-2015-8649</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8650/">CVE-2015-8650</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8651/">CVE-2015-8651</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009514551" comment="flash-player-11.2.202.559-117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009514552" comment="flash-player-gnome-11.2.202.559-117.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77504" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="953516" ref_url="https://bugzilla.suse.com/953516" source="BUGZILLA"/>
		<reference ref_id="953519" ref_url="https://bugzilla.suse.com/953519" source="BUGZILLA"/>
		<reference ref_id="953521" ref_url="https://bugzilla.suse.com/953521" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9756" ref_url="https://www.suse.com/security/cve/CVE-2014-9756/" source="CVE"/>
		<reference ref_id="CVE-2015-7805" ref_url="https://www.suse.com/security/cve/CVE-2015-7805/" source="CVE"/>
		<reference ref_id="CVE-2015-8075" ref_url="https://www.suse.com/security/cve/CVE-2015-8075/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2000-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001763.html" source="SUSE-SU"/>
		<description>
The libsndfile package was updated to fix the following security issue:

- CVE-2014-9756: Fixed a divide by zero problem that can lead to a Denial of Service (DoS) (bsc#953521).
- CVE-2015-7805: Fixed heap overflow issue (bsc#953516).
- CVE-2015-8075: Fixed heap overflow issue (bsc#953519).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-25"/>
	<updated date="2015-12-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/953516">SUSE bug 953516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953519">SUSE bug 953519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953521">SUSE bug 953521</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9756/">CVE-2014-9756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7805/">CVE-2015-7805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8075/">CVE-2015-8075</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515282" comment="libsndfile1-1.0.25-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515283" comment="libsndfile1-32bit-1.0.25-25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77505" version="1" class="patch">
	<metadata>
		<title>Recommended update for libksba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="926826" ref_url="https://bugzilla.suse.com/926826" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2015:2056-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001759.html" source="SUSE-SU"/>
		<description>
The libksba package was updated to fix the following security issues:

- Fixed an integer overflow, an out of bounds read and a stack overflow issues (bsc#926826).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-23"/>
	<updated date="2015-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926826">SUSE bug 926826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515288" comment="libksba8-1.3.0-18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77506" version="1" class="patch">
	<metadata>
		<title>Security update for xscreensaver (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="952062" ref_url="https://bugzilla.suse.com/952062" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8025" ref_url="https://www.suse.com/security/cve/CVE-2015-8025/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2053-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001769.html" source="SUSE-SU"/>
		<description>
The xscreensaver package was updated to fix the following security issue:

- CVE-2015-8025: Fixed a crash when hot-swapping monitors while locked (bsc#952062).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-29"/>
	<updated date="2015-12-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952062">SUSE bug 952062</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8025/">CVE-2015-8025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515289" comment="xscreensaver-5.22-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515290" comment="xscreensaver-data-5.22-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77507" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="918089" ref_url="https://bugzilla.suse.com/918089" source="BUGZILLA"/>
		<reference ref_id="918090" ref_url="https://bugzilla.suse.com/918090" source="BUGZILLA"/>
		<reference ref_id="952347" ref_url="https://bugzilla.suse.com/952347" source="BUGZILLA"/>
		<reference ref_id="955753" ref_url="https://bugzilla.suse.com/955753" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1606" ref_url="https://www.suse.com/security/cve/CVE-2015-1606/" source="CVE"/>
		<reference ref_id="CVE-2015-1607" ref_url="https://www.suse.com/security/cve/CVE-2015-1607/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2171-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001753.html" source="SUSE-SU"/>
		<description>
The gpg2 package was updated to fix the following security and non security issues:

- CVE-2015-1606: Fixed invalid memory read using a garbled keyring (bsc#918089).
- CVE-2015-1607: Fixed memcpy with overlapping ranges (bsc#918090).

- bsc#955753: Fixed a regression of 'gpg --recv' due to keyserver import filter (also boo#952347). 
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-22"/>
	<updated date="2015-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/918089">SUSE bug 918089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918090">SUSE bug 918090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952347">SUSE bug 952347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955753">SUSE bug 955753</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1606/">CVE-2015-1606</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1607/">CVE-2015-1607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515353" comment="gpg2-2.0.24-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515354" comment="gpg2-lang-2.0.24-3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77508" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="953817" ref_url="https://bugzilla.suse.com/953817" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8023" ref_url="https://www.suse.com/security/cve/CVE-2015-8023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2183-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00025.html" source="SUSE-SU"/>
		<description>
The strongswan package was updated to fix the following security issue:

- CVE-2015-8023: Fixed an authentication bypass vulnerability in the eap-mschapv2 plugin (bsc#953817).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-21"/>
	<updated date="2015-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/953817">SUSE bug 953817</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8023/">CVE-2015-8023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515355" comment="strongswan-5.1.3-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515356" comment="strongswan-doc-5.1.3-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515357" comment="strongswan-ipsec-5.1.3-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515358" comment="strongswan-libs0-5.1.3-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77509" version="1" class="patch">
	<metadata>
		<title>Security update for gdk-pixbuf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="942801" ref_url="https://bugzilla.suse.com/942801" source="BUGZILLA"/>
		<reference ref_id="948790" ref_url="https://bugzilla.suse.com/948790" source="BUGZILLA"/>
		<reference ref_id="948791" ref_url="https://bugzilla.suse.com/948791" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-7673" ref_url="https://www.suse.com/security/cve/CVE-2015-7673/" source="CVE"/>
		<reference ref_id="CVE-2015-7674" ref_url="https://www.suse.com/security/cve/CVE-2015-7674/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2195-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001761.html" source="SUSE-SU"/>
		<description>
The gdk pixbuf library was updated to fix three security issues.

These security issues were fixed:
- CVE-2015-7673: Fix some more overflows scaling a gif (bsc#948791)
- CVE-2015-4491: Check for overflow before allocating memory when scaling (bsc#942801)
- CVE-2015-7673: Fix an overflow and DoS when scaling TGA files (bsc#948790).
- CVE-2015-7674: Fix overflow when scaling GIF files(bsc#948791).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-23"/>
	<updated date="2015-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/942801">SUSE bug 942801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948790">SUSE bug 948790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948791">SUSE bug 948791</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7673/">CVE-2015-7673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7674/">CVE-2015-7674</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515368" comment="gdk-pixbuf-lang-2.30.6-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515369" comment="gdk-pixbuf-query-loaders-2.30.6-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515370" comment="gdk-pixbuf-query-loaders-32bit-2.30.6-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515371" comment="libgdk_pixbuf-2_0-0-2.30.6-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515372" comment="libgdk_pixbuf-2_0-0-32bit-2.30.6-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515373" comment="typelib-1_0-GdkPixbuf-2_0-2.30.6-7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77510" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="954256" ref_url="https://bugzilla.suse.com/954256" source="BUGZILLA"/>
		<reference ref_id="957812" ref_url="https://bugzilla.suse.com/957812" source="BUGZILLA"/>
		<reference ref_id="957813" ref_url="https://bugzilla.suse.com/957813" source="BUGZILLA"/>
		<reference ref_id="957815" ref_url="https://bugzilla.suse.com/957815" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194/" source="CVE"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="CVE-2015-3196" ref_url="https://www.suse.com/security/cve/CVE-2015-3196/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001726.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues: 

Security fixes:
- CVE-2015-3194: The signature verification routines will crash with a
  NULL pointer dereference if presented with an ASN.1 signature using the
  RSA PSS algorithm and absent mask generation function parameter. Since
  these routines are used to verify certificate signature algorithms
  this can be used to crash any certificate verification operation and
  exploited in a DoS attack. Any application which performs certificate
  verification is vulnerable including OpenSSL clients and servers which
  enable client authentication. (bsc#957815)
- CVE-2015-3195: When presented with a malformed X509_ATTRIBUTE structure OpenSSL would leak
  memory. This structure is used by the PKCS#7 and CMS routines so any
  application which reads PKCS#7 or CMS data from untrusted sources is affected.
  SSL/TLS is not affected. (bsc#957812)
- CVE-2015-3196: If PSK identity hints are received by a multi-threaded client then
  the values were wrongly updated in the parent SSL_CTX structure. This could
  result in a race condition potentially leading to a double free of the
  identify hint data.  (bsc#957813)

Non security bugs fixed:
- Improve S/390 performance on IBM z196 and z13 (bsc#954256)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-08"/>
	<updated date="2015-12-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954256">SUSE bug 954256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957813">SUSE bug 957813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957815">SUSE bug 957815</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3196/">CVE-2015-3196</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516142" comment="libopenssl1_0_0-1.0.1i-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516143" comment="libopenssl1_0_0-32bit-1.0.1i-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516144" comment="openssl-1.0.1i-36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77511" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="958324" ref_url="https://bugzilla.suse.com/958324" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8045" ref_url="https://www.suse.com/security/cve/CVE-2015-8045/" source="CVE"/>
		<reference ref_id="CVE-2015-8047" ref_url="https://www.suse.com/security/cve/CVE-2015-8047/" source="CVE"/>
		<reference ref_id="CVE-2015-8048" ref_url="https://www.suse.com/security/cve/CVE-2015-8048/" source="CVE"/>
		<reference ref_id="CVE-2015-8049" ref_url="https://www.suse.com/security/cve/CVE-2015-8049/" source="CVE"/>
		<reference ref_id="CVE-2015-8050" ref_url="https://www.suse.com/security/cve/CVE-2015-8050/" source="CVE"/>
		<reference ref_id="CVE-2015-8055" ref_url="https://www.suse.com/security/cve/CVE-2015-8055/" source="CVE"/>
		<reference ref_id="CVE-2015-8056" ref_url="https://www.suse.com/security/cve/CVE-2015-8056/" source="CVE"/>
		<reference ref_id="CVE-2015-8057" ref_url="https://www.suse.com/security/cve/CVE-2015-8057/" source="CVE"/>
		<reference ref_id="CVE-2015-8058" ref_url="https://www.suse.com/security/cve/CVE-2015-8058/" source="CVE"/>
		<reference ref_id="CVE-2015-8059" ref_url="https://www.suse.com/security/cve/CVE-2015-8059/" source="CVE"/>
		<reference ref_id="CVE-2015-8060" ref_url="https://www.suse.com/security/cve/CVE-2015-8060/" source="CVE"/>
		<reference ref_id="CVE-2015-8061" ref_url="https://www.suse.com/security/cve/CVE-2015-8061/" source="CVE"/>
		<reference ref_id="CVE-2015-8062" ref_url="https://www.suse.com/security/cve/CVE-2015-8062/" source="CVE"/>
		<reference ref_id="CVE-2015-8063" ref_url="https://www.suse.com/security/cve/CVE-2015-8063/" source="CVE"/>
		<reference ref_id="CVE-2015-8064" ref_url="https://www.suse.com/security/cve/CVE-2015-8064/" source="CVE"/>
		<reference ref_id="CVE-2015-8065" ref_url="https://www.suse.com/security/cve/CVE-2015-8065/" source="CVE"/>
		<reference ref_id="CVE-2015-8066" ref_url="https://www.suse.com/security/cve/CVE-2015-8066/" source="CVE"/>
		<reference ref_id="CVE-2015-8067" ref_url="https://www.suse.com/security/cve/CVE-2015-8067/" source="CVE"/>
		<reference ref_id="CVE-2015-8068" ref_url="https://www.suse.com/security/cve/CVE-2015-8068/" source="CVE"/>
		<reference ref_id="CVE-2015-8069" ref_url="https://www.suse.com/security/cve/CVE-2015-8069/" source="CVE"/>
		<reference ref_id="CVE-2015-8070" ref_url="https://www.suse.com/security/cve/CVE-2015-8070/" source="CVE"/>
		<reference ref_id="CVE-2015-8071" ref_url="https://www.suse.com/security/cve/CVE-2015-8071/" source="CVE"/>
		<reference ref_id="CVE-2015-8401" ref_url="https://www.suse.com/security/cve/CVE-2015-8401/" source="CVE"/>
		<reference ref_id="CVE-2015-8402" ref_url="https://www.suse.com/security/cve/CVE-2015-8402/" source="CVE"/>
		<reference ref_id="CVE-2015-8403" ref_url="https://www.suse.com/security/cve/CVE-2015-8403/" source="CVE"/>
		<reference ref_id="CVE-2015-8404" ref_url="https://www.suse.com/security/cve/CVE-2015-8404/" source="CVE"/>
		<reference ref_id="CVE-2015-8405" ref_url="https://www.suse.com/security/cve/CVE-2015-8405/" source="CVE"/>
		<reference ref_id="CVE-2015-8406" ref_url="https://www.suse.com/security/cve/CVE-2015-8406/" source="CVE"/>
		<reference ref_id="CVE-2015-8407" ref_url="https://www.suse.com/security/cve/CVE-2015-8407/" source="CVE"/>
		<reference ref_id="CVE-2015-8408" ref_url="https://www.suse.com/security/cve/CVE-2015-8408/" source="CVE"/>
		<reference ref_id="CVE-2015-8409" ref_url="https://www.suse.com/security/cve/CVE-2015-8409/" source="CVE"/>
		<reference ref_id="CVE-2015-8410" ref_url="https://www.suse.com/security/cve/CVE-2015-8410/" source="CVE"/>
		<reference ref_id="CVE-2015-8411" ref_url="https://www.suse.com/security/cve/CVE-2015-8411/" source="CVE"/>
		<reference ref_id="CVE-2015-8412" ref_url="https://www.suse.com/security/cve/CVE-2015-8412/" source="CVE"/>
		<reference ref_id="CVE-2015-8413" ref_url="https://www.suse.com/security/cve/CVE-2015-8413/" source="CVE"/>
		<reference ref_id="CVE-2015-8414" ref_url="https://www.suse.com/security/cve/CVE-2015-8414/" source="CVE"/>
		<reference ref_id="CVE-2015-8415" ref_url="https://www.suse.com/security/cve/CVE-2015-8415/" source="CVE"/>
		<reference ref_id="CVE-2015-8416" ref_url="https://www.suse.com/security/cve/CVE-2015-8416/" source="CVE"/>
		<reference ref_id="CVE-2015-8417" ref_url="https://www.suse.com/security/cve/CVE-2015-8417/" source="CVE"/>
		<reference ref_id="CVE-2015-8418" ref_url="https://www.suse.com/security/cve/CVE-2015-8418/" source="CVE"/>
		<reference ref_id="CVE-2015-8419" ref_url="https://www.suse.com/security/cve/CVE-2015-8419/" source="CVE"/>
		<reference ref_id="CVE-2015-8420" ref_url="https://www.suse.com/security/cve/CVE-2015-8420/" source="CVE"/>
		<reference ref_id="CVE-2015-8421" ref_url="https://www.suse.com/security/cve/CVE-2015-8421/" source="CVE"/>
		<reference ref_id="CVE-2015-8422" ref_url="https://www.suse.com/security/cve/CVE-2015-8422/" source="CVE"/>
		<reference ref_id="CVE-2015-8423" ref_url="https://www.suse.com/security/cve/CVE-2015-8423/" source="CVE"/>
		<reference ref_id="CVE-2015-8424" ref_url="https://www.suse.com/security/cve/CVE-2015-8424/" source="CVE"/>
		<reference ref_id="CVE-2015-8425" ref_url="https://www.suse.com/security/cve/CVE-2015-8425/" source="CVE"/>
		<reference ref_id="CVE-2015-8426" ref_url="https://www.suse.com/security/cve/CVE-2015-8426/" source="CVE"/>
		<reference ref_id="CVE-2015-8427" ref_url="https://www.suse.com/security/cve/CVE-2015-8427/" source="CVE"/>
		<reference ref_id="CVE-2015-8428" ref_url="https://www.suse.com/security/cve/CVE-2015-8428/" source="CVE"/>
		<reference ref_id="CVE-2015-8429" ref_url="https://www.suse.com/security/cve/CVE-2015-8429/" source="CVE"/>
		<reference ref_id="CVE-2015-8430" ref_url="https://www.suse.com/security/cve/CVE-2015-8430/" source="CVE"/>
		<reference ref_id="CVE-2015-8431" ref_url="https://www.suse.com/security/cve/CVE-2015-8431/" source="CVE"/>
		<reference ref_id="CVE-2015-8432" ref_url="https://www.suse.com/security/cve/CVE-2015-8432/" source="CVE"/>
		<reference ref_id="CVE-2015-8433" ref_url="https://www.suse.com/security/cve/CVE-2015-8433/" source="CVE"/>
		<reference ref_id="CVE-2015-8434" ref_url="https://www.suse.com/security/cve/CVE-2015-8434/" source="CVE"/>
		<reference ref_id="CVE-2015-8435" ref_url="https://www.suse.com/security/cve/CVE-2015-8435/" source="CVE"/>
		<reference ref_id="CVE-2015-8436" ref_url="https://www.suse.com/security/cve/CVE-2015-8436/" source="CVE"/>
		<reference ref_id="CVE-2015-8437" ref_url="https://www.suse.com/security/cve/CVE-2015-8437/" source="CVE"/>
		<reference ref_id="CVE-2015-8438" ref_url="https://www.suse.com/security/cve/CVE-2015-8438/" source="CVE"/>
		<reference ref_id="CVE-2015-8439" ref_url="https://www.suse.com/security/cve/CVE-2015-8439/" source="CVE"/>
		<reference ref_id="CVE-2015-8440" ref_url="https://www.suse.com/security/cve/CVE-2015-8440/" source="CVE"/>
		<reference ref_id="CVE-2015-8441" ref_url="https://www.suse.com/security/cve/CVE-2015-8441/" source="CVE"/>
		<reference ref_id="CVE-2015-8442" ref_url="https://www.suse.com/security/cve/CVE-2015-8442/" source="CVE"/>
		<reference ref_id="CVE-2015-8443" ref_url="https://www.suse.com/security/cve/CVE-2015-8443/" source="CVE"/>
		<reference ref_id="CVE-2015-8444" ref_url="https://www.suse.com/security/cve/CVE-2015-8444/" source="CVE"/>
		<reference ref_id="CVE-2015-8445" ref_url="https://www.suse.com/security/cve/CVE-2015-8445/" source="CVE"/>
		<reference ref_id="CVE-2015-8446" ref_url="https://www.suse.com/security/cve/CVE-2015-8446/" source="CVE"/>
		<reference ref_id="CVE-2015-8447" ref_url="https://www.suse.com/security/cve/CVE-2015-8447/" source="CVE"/>
		<reference ref_id="CVE-2015-8448" ref_url="https://www.suse.com/security/cve/CVE-2015-8448/" source="CVE"/>
		<reference ref_id="CVE-2015-8449" ref_url="https://www.suse.com/security/cve/CVE-2015-8449/" source="CVE"/>
		<reference ref_id="CVE-2015-8450" ref_url="https://www.suse.com/security/cve/CVE-2015-8450/" source="CVE"/>
		<reference ref_id="CVE-2015-8451" ref_url="https://www.suse.com/security/cve/CVE-2015-8451/" source="CVE"/>
		<reference ref_id="CVE-2015-8452" ref_url="https://www.suse.com/security/cve/CVE-2015-8452/" source="CVE"/>
		<reference ref_id="CVE-2015-8453" ref_url="https://www.suse.com/security/cve/CVE-2015-8453/" source="CVE"/>
		<reference ref_id="CVE-2015-8454" ref_url="https://www.suse.com/security/cve/CVE-2015-8454/" source="CVE"/>
		<reference ref_id="CVE-2015-8455" ref_url="https://www.suse.com/security/cve/CVE-2015-8455/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<description>

This update for flash-player to version 11.2.202.554 fixes the following security issues
in Adobe security advisory APSB15-32.

* These updates resolve heap buffer overflow vulnerabilities that could
  lead to code execution (CVE-2015-8438, CVE-2015-8446).
* These updates resolve memory corruption vulnerabilities that could
  lead to code execution (CVE-2015-8444, CVE-2015-8443, CVE-2015-8417,
  CVE-2015-8416, CVE-2015-8451, CVE-2015-8047, CVE-2015-8455, CVE-2015-8045,
  CVE-2015-8418, CVE-2015-8060, CVE-2015-8419, CVE-2015-8408).
* These updates resolve security bypass vulnerabilities (CVE-2015-8453,
  CVE-2015-8440, CVE-2015-8409).
* These updates resolve a stack overflow vulnerability that could lead
  to code execution (CVE-2015-8407).
* These updates resolve a type confusion vulnerability that could lead
  to code execution (CVE-2015-8439).
* These updates resolve an integer overflow vulnerability that could
  lead to code execution (CVE-2015-8445).
* These updates resolve a buffer overflow vulnerability that could lead
  to code execution (CVE-2015-8415)
* These updates resolve use-after-free vulnerabilities that could
  lead to code execution (CVE-2015-8050, CVE-2015-8049, CVE-2015-8437,
  CVE-2015-8450, CVE-2015-8449, CVE-2015-8448, CVE-2015-8436, CVE-2015-8452,
  CVE-2015-8048, CVE-2015-8413, CVE-2015-8412, CVE-2015-8410, CVE-2015-8411,
  CVE-2015-8424, CVE-2015-8422, CVE-2015-8420, CVE-2015-8421, CVE-2015-8423,
  CVE-2015-8425, CVE-2015-8433, CVE-2015-8432, CVE-2015-8431, CVE-2015-8426,
  CVE-2015-8430, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8434,
  CVE-2015-8435, CVE-2015-8414, CVE-2015-8454, CVE-2015-8059, CVE-2015-8058,
  CVE-2015-8055, CVE-2015-8057, CVE-2015-8056, CVE-2015-8061, CVE-2015-8067,
  CVE-2015-8066, CVE-2015-8062, CVE-2015-8068, CVE-2015-8064, CVE-2015-8065,
  CVE-2015-8063, CVE-2015-8405, CVE-2015-8404, CVE-2015-8402, CVE-2015-8403,
  CVE-2015-8071, CVE-2015-8401, CVE-2015-8406, CVE-2015-8069, CVE-2015-8070,
  CVE-2015-8441, CVE-2015-8442, CVE-2015-8447).

Please also see
        https://helpx.adobe.com/security/products/flash-player/apsb15-32.html
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-10"/>
	<updated date="2015-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8045/">CVE-2015-8045</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8047/">CVE-2015-8047</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8048/">CVE-2015-8048</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8049/">CVE-2015-8049</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8050/">CVE-2015-8050</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8055/">CVE-2015-8055</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8056/">CVE-2015-8056</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8057/">CVE-2015-8057</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8058/">CVE-2015-8058</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8059/">CVE-2015-8059</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8060/">CVE-2015-8060</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8061/">CVE-2015-8061</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8062/">CVE-2015-8062</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8063/">CVE-2015-8063</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8064/">CVE-2015-8064</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8065/">CVE-2015-8065</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8066/">CVE-2015-8066</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8067/">CVE-2015-8067</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8068/">CVE-2015-8068</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8069/">CVE-2015-8069</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8070/">CVE-2015-8070</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8071/">CVE-2015-8071</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8401/">CVE-2015-8401</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8402/">CVE-2015-8402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8403/">CVE-2015-8403</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8404/">CVE-2015-8404</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8405/">CVE-2015-8405</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8406/">CVE-2015-8406</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8407/">CVE-2015-8407</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8408/">CVE-2015-8408</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8409/">CVE-2015-8409</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8410/">CVE-2015-8410</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8411/">CVE-2015-8411</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8412/">CVE-2015-8412</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8413/">CVE-2015-8413</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8414/">CVE-2015-8414</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8415/">CVE-2015-8415</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8416/">CVE-2015-8416</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8417/">CVE-2015-8417</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8418/">CVE-2015-8418</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8419/">CVE-2015-8419</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8420/">CVE-2015-8420</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8421/">CVE-2015-8421</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8422/">CVE-2015-8422</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8423/">CVE-2015-8423</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8424/">CVE-2015-8424</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8425/">CVE-2015-8425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8426/">CVE-2015-8426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8427/">CVE-2015-8427</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8428/">CVE-2015-8428</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8429/">CVE-2015-8429</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8430/">CVE-2015-8430</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8431/">CVE-2015-8431</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8432/">CVE-2015-8432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8433/">CVE-2015-8433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8434/">CVE-2015-8434</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8435/">CVE-2015-8435</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8436/">CVE-2015-8436</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8437/">CVE-2015-8437</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8438/">CVE-2015-8438</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8439/">CVE-2015-8439</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8440/">CVE-2015-8440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8441/">CVE-2015-8441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8442/">CVE-2015-8442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8443/">CVE-2015-8443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8444/">CVE-2015-8444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8445/">CVE-2015-8445</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8446/">CVE-2015-8446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8447/">CVE-2015-8447</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8448/">CVE-2015-8448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8449/">CVE-2015-8449</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8450/">CVE-2015-8450</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8451/">CVE-2015-8451</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8452/">CVE-2015-8452</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8453/">CVE-2015-8453</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8454/">CVE-2015-8454</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8455/">CVE-2015-8455</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515378" comment="flash-player-11.2.202.554-114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515379" comment="flash-player-gnome-11.2.202.554-114.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77512" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="758040" ref_url="https://bugzilla.suse.com/758040" source="BUGZILLA"/>
		<reference ref_id="814440" ref_url="https://bugzilla.suse.com/814440" source="BUGZILLA"/>
		<reference ref_id="904348" ref_url="https://bugzilla.suse.com/904348" source="BUGZILLA"/>
		<reference ref_id="921949" ref_url="https://bugzilla.suse.com/921949" source="BUGZILLA"/>
		<reference ref_id="924493" ref_url="https://bugzilla.suse.com/924493" source="BUGZILLA"/>
		<reference ref_id="926238" ref_url="https://bugzilla.suse.com/926238" source="BUGZILLA"/>
		<reference ref_id="933514" ref_url="https://bugzilla.suse.com/933514" source="BUGZILLA"/>
		<reference ref_id="936773" ref_url="https://bugzilla.suse.com/936773" source="BUGZILLA"/>
		<reference ref_id="939826" ref_url="https://bugzilla.suse.com/939826" source="BUGZILLA"/>
		<reference ref_id="939926" ref_url="https://bugzilla.suse.com/939926" source="BUGZILLA"/>
		<reference ref_id="940776" ref_url="https://bugzilla.suse.com/940776" source="BUGZILLA"/>
		<reference ref_id="941113" ref_url="https://bugzilla.suse.com/941113" source="BUGZILLA"/>
		<reference ref_id="941202" ref_url="https://bugzilla.suse.com/941202" source="BUGZILLA"/>
		<reference ref_id="943959" ref_url="https://bugzilla.suse.com/943959" source="BUGZILLA"/>
		<reference ref_id="944296" ref_url="https://bugzilla.suse.com/944296" source="BUGZILLA"/>
		<reference ref_id="947241" ref_url="https://bugzilla.suse.com/947241" source="BUGZILLA"/>
		<reference ref_id="947478" ref_url="https://bugzilla.suse.com/947478" source="BUGZILLA"/>
		<reference ref_id="949100" ref_url="https://bugzilla.suse.com/949100" source="BUGZILLA"/>
		<reference ref_id="949192" ref_url="https://bugzilla.suse.com/949192" source="BUGZILLA"/>
		<reference ref_id="949706" ref_url="https://bugzilla.suse.com/949706" source="BUGZILLA"/>
		<reference ref_id="949744" ref_url="https://bugzilla.suse.com/949744" source="BUGZILLA"/>
		<reference ref_id="949936" ref_url="https://bugzilla.suse.com/949936" source="BUGZILLA"/>
		<reference ref_id="950013" ref_url="https://bugzilla.suse.com/950013" source="BUGZILLA"/>
		<reference ref_id="950580" ref_url="https://bugzilla.suse.com/950580" source="BUGZILLA"/>
		<reference ref_id="950750" ref_url="https://bugzilla.suse.com/950750" source="BUGZILLA"/>
		<reference ref_id="950998" ref_url="https://bugzilla.suse.com/950998" source="BUGZILLA"/>
		<reference ref_id="951110" ref_url="https://bugzilla.suse.com/951110" source="BUGZILLA"/>
		<reference ref_id="951165" ref_url="https://bugzilla.suse.com/951165" source="BUGZILLA"/>
		<reference ref_id="951440" ref_url="https://bugzilla.suse.com/951440" source="BUGZILLA"/>
		<reference ref_id="951638" ref_url="https://bugzilla.suse.com/951638" source="BUGZILLA"/>
		<reference ref_id="951864" ref_url="https://bugzilla.suse.com/951864" source="BUGZILLA"/>
		<reference ref_id="952384" ref_url="https://bugzilla.suse.com/952384" source="BUGZILLA"/>
		<reference ref_id="952666" ref_url="https://bugzilla.suse.com/952666" source="BUGZILLA"/>
		<reference ref_id="953717" ref_url="https://bugzilla.suse.com/953717" source="BUGZILLA"/>
		<reference ref_id="953826" ref_url="https://bugzilla.suse.com/953826" source="BUGZILLA"/>
		<reference ref_id="953830" ref_url="https://bugzilla.suse.com/953830" source="BUGZILLA"/>
		<reference ref_id="953971" ref_url="https://bugzilla.suse.com/953971" source="BUGZILLA"/>
		<reference ref_id="953980" ref_url="https://bugzilla.suse.com/953980" source="BUGZILLA"/>
		<reference ref_id="954635" ref_url="https://bugzilla.suse.com/954635" source="BUGZILLA"/>
		<reference ref_id="954986" ref_url="https://bugzilla.suse.com/954986" source="BUGZILLA"/>
		<reference ref_id="955136" ref_url="https://bugzilla.suse.com/955136" source="BUGZILLA"/>
		<reference ref_id="955148" ref_url="https://bugzilla.suse.com/955148" source="BUGZILLA"/>
		<reference ref_id="955224" ref_url="https://bugzilla.suse.com/955224" source="BUGZILLA"/>
		<reference ref_id="955354" ref_url="https://bugzilla.suse.com/955354" source="BUGZILLA"/>
		<reference ref_id="955422" ref_url="https://bugzilla.suse.com/955422" source="BUGZILLA"/>
		<reference ref_id="955533" ref_url="https://bugzilla.suse.com/955533" source="BUGZILLA"/>
		<reference ref_id="955644" ref_url="https://bugzilla.suse.com/955644" source="BUGZILLA"/>
		<reference ref_id="956047" ref_url="https://bugzilla.suse.com/956047" source="BUGZILLA"/>
		<reference ref_id="956053" ref_url="https://bugzilla.suse.com/956053" source="BUGZILLA"/>
		<reference ref_id="956147" ref_url="https://bugzilla.suse.com/956147" source="BUGZILLA"/>
		<reference ref_id="956284" ref_url="https://bugzilla.suse.com/956284" source="BUGZILLA"/>
		<reference ref_id="956703" ref_url="https://bugzilla.suse.com/956703" source="BUGZILLA"/>
		<reference ref_id="956711" ref_url="https://bugzilla.suse.com/956711" source="BUGZILLA"/>
		<reference ref_id="956717" ref_url="https://bugzilla.suse.com/956717" source="BUGZILLA"/>
		<reference ref_id="956801" ref_url="https://bugzilla.suse.com/956801" source="BUGZILLA"/>
		<reference ref_id="956876" ref_url="https://bugzilla.suse.com/956876" source="BUGZILLA"/>
		<reference ref_id="957395" ref_url="https://bugzilla.suse.com/957395" source="BUGZILLA"/>
		<reference ref_id="957546" ref_url="https://bugzilla.suse.com/957546" source="BUGZILLA"/>
		<reference ref_id="958504" ref_url="https://bugzilla.suse.com/958504" source="BUGZILLA"/>
		<reference ref_id="958510" ref_url="https://bugzilla.suse.com/958510" source="BUGZILLA"/>
		<reference ref_id="958647" ref_url="https://bugzilla.suse.com/958647" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0272" ref_url="https://www.suse.com/security/cve/CVE-2015-0272/" source="CVE"/>
		<reference ref_id="CVE-2015-2925" ref_url="https://www.suse.com/security/cve/CVE-2015-2925/" source="CVE"/>
		<reference ref_id="CVE-2015-5156" ref_url="https://www.suse.com/security/cve/CVE-2015-5156/" source="CVE"/>
		<reference ref_id="CVE-2015-7799" ref_url="https://www.suse.com/security/cve/CVE-2015-7799/" source="CVE"/>
		<reference ref_id="CVE-2015-7872" ref_url="https://www.suse.com/security/cve/CVE-2015-7872/" source="CVE"/>
		<reference ref_id="CVE-2015-7990" ref_url="https://www.suse.com/security/cve/CVE-2015-7990/" source="CVE"/>
		<reference ref_id="CVE-2015-8215" ref_url="https://www.suse.com/security/cve/CVE-2015-8215/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.51 to receive
various security and bugfixes.

Following features were added:
- hwrng: Add a driver for the hwrng found in power7+ systems (fate#315784).

Following security bugs were fixed:
- CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux
  kernel did not validate attempted changes to the MTU value, which allowed
  context-dependent attackers to cause a denial of service (packet loss)
  via a value that is (1) smaller than the minimum compliant value or
  (2) larger than the MTU of an interface, as demonstrated by a Router
  Advertisement (RA) message that is not validated by a daemon, a different
  vulnerability than CVE-2015-0272. (bsc#955354)
- CVE-2015-5156: The virtnet_probe function in drivers/net/virtio_net.c in
  the Linux kernel attempted to support a FRAGLIST feature without proper
  memory allocation, which allowed guest OS users to cause a denial of
  service (buffer overflow and memory corruption) via a crafted sequence
  of fragmented packets (bnc#940776).
- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c
  in the Linux kernel allowed local users to cause a denial of service
  (OOPS) via crafted keyctl commands (bnc#951440).
- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in
  the Linux kernel did not ensure that certain slot numbers are valid,
  which allowed local users to cause a denial of service (NULL
  pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl
  call (bnc#949936).
- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux
  kernel did not properly handle rename actions inside a bind mount, which
  allowed local users to bypass an intended container protection mechanism
  by renaming a directory, related to a 'double-chroot attack (bnc#926238).
- CVE-2015-7990: RDS: Verify the underlying transport exists before
  creating a connection, preventing possible DoS (bsc#952384).

The following non-security bugs were fixed:
- af_iucv: avoid path quiesce of severed path in shutdown() (bnc#954986, LTC#131684).
- alsa: hda - Disable 64bit address for Creative HDA controllers (bnc#814440).
- alsa: hda - Fix noise problems on Thinkpad T440s (boo#958504).
- alsa: hda - Fix noise problems on Thinkpad T440s (boo#958504).
- apparmor: allow SYS_CAP_RESOURCE to be sufficient to prlimit another task (bsc#921949).
- audit: correctly record file names with different path name types (bsc#950013).
- audit: create private file name copies when auditing inodes (bsc#950013).
- bcache: Add btree_insert_node() (bnc#951638).
- bcache: Add explicit keylist arg to btree_insert() (bnc#951638).
- bcache: backing device set to clean after finishing detach (bsc#951638).
- bcache: backing device set to clean after finishing detach (bsc#951638).
- bcache: Clean up keylist code (bnc#951638).
- bcache: Convert btree_insert_check_key() to btree_insert_node() (bnc#951638).
- bcache: Convert bucket_wait to wait_queue_head_t (bnc#951638).
- bcache: Convert try_wait to wait_queue_head_t (bnc#951638).
- bcache: Explicitly track btree node's parent (bnc#951638).
- bcache: Fix a bug when detaching (bsc#951638).
- bcache: Fix a lockdep splat in an error path (bnc#951638).
- bcache: Fix a shutdown bug (bsc#951638).
- bcache: Fix more early shutdown bugs (bsc#951638).
- bcache: Fix sysfs splat on shutdown with flash only devs (bsc#951638).
- bcache: Insert multiple keys at a time (bnc#951638).
- bcache: kill closure locking usage (bnc#951638).
- bcache: Refactor journalling flow control (bnc#951638).
- bcache: Refactor request_write() (bnc#951638).
- bcache: Use blkdev_issue_discard() (bnc#951638).
- btrfs: Adjust commit-transaction condition to avoid NO_SPACE more (bsc#958647).
- btrfs: Adjust commit-transaction condition to avoid NO_SPACE more (bsc#958647).
- btrfs: cleanup: remove no-used alloc_chunk in btrfs_check_data_free_space() (bsc#958647).
- btrfs: cleanup: remove no-used alloc_chunk in btrfs_check_data_free_space() (bsc#958647).
- btrfs: fix condition of commit transaction (bsc#958647).
- btrfs: fix condition of commit transaction (bsc#958647).
- btrfs: fix file corruption and data loss after cloning inline extents (bnc#956053).
- btrfs: Fix out-of-space bug (bsc#958647).
- btrfs: Fix out-of-space bug (bsc#958647).
- btrfs: Fix tail space processing in find_free_dev_extent() (bsc#958647).
- btrfs: Fix tail space processing in find_free_dev_extent() (bsc#958647).
- btrfs: fix the number of transaction units needed to remove a block group (bsc#958647).
- btrfs: fix the number of transaction units needed to remove a block group (bsc#958647).
- btrfs: fix truncation of compressed and inlined extents (bnc#956053).
- btrfs: Set relative data on clear btrfs_block_group_cache-&amp;gt;pinned (bsc#958647).
- btrfs: Set relative data on clear btrfs_block_group_cache-&gt;pinned (bsc#958647).
- btrfs: use global reserve when deleting unused block group after ENOSPC (bsc#958647).
- btrfs: use global reserve when deleting unused block group after ENOSPC (bsc#958647).
- cache: Fix sysfs splat on shutdown with flash only devs (bsc#951638).
- cpu: Defer smpboot kthread unparking until CPU known to scheduler (bsc#936773).
- cpusets, isolcpus: exclude isolcpus from load balancing in cpusets (bsc#957395).
- cxgb4i: Increased the value of MAX_IMM_TX_PKT_LEN from 128 to 256 bytes (bsc#950580).
- dlm: make posix locks interruptible, (bsc#947241).
- dmapi: Fix xfs dmapi to not unlock &amp; lock XFS_ILOCK_EXCL (bsc#949744).
- dm: do not start current request if it would've merged with the previous (bsc#904348).
- dm: impose configurable deadline for dm_request_fn's merge heuristic (bsc#904348).
- dm-snap: avoid deadock on s-&amp;gt;lock when a read is split (bsc#939826).
- dm sysfs: introduce ability to add writable attributes (bsc#904348).
- drm: Allocate new master object when client becomes master (bsc#956876, bsc#956801).
- drm: Fix KABI of 'struct drm_file' (bsc#956876, bsc#956801).
- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).
- drm/i915: clean up backlight conditional build (bsc#941113).
- drm/i915: debug print on backlight register (bsc#941113).
- drm/i915: do full backlight setup at enable time (bsc#941113).
- drm/i915: do not save/restore backlight registers in KMS (bsc#941113).
- drm/i915: Eliminate lots of WARNs when there's no backlight present (bsc#941113).
- drm/i915: fix gen2-gen3 backlight set (bsc#941113,bsc#953971).
- drm/i915: Fix gen3 self-refresh watermarks (bsc#953830,bsc#953971).
- drm/i915: Fix missing backlight update during panel disablement (bsc#941113).
- drm/i915: Fix SRC_COPY width on 830/845g (bsc#758040).
- drm/i915: gather backlight information at setup (bsc#941113).
- drm/i915: handle backlight through chip specific functions (bsc#941113).
- drm/i915: Ignore 'digital output' and 'not HDMI output' bits for eDP detection (bsc#949192).
- drm/i915: make asle notifications update backlight on all connectors (bsc#941113).
- drm/i915: make backlight info per-connector (bsc#941113).
- drm/i915: move backlight level setting in enable/disable to hooks (bsc#941113).
- drm/i915: move opregion asle request handling to a work queue (bsc#953826).
- drm/i915: nuke get max backlight functions (bsc#941113).
- drm/i915/opregion: fix build error on CONFIG_ACPI=n (bsc#953826).
- drm/i915: restore backlight precision when converting from ACPI (bsc#941113).
- drm/i915/tv: add -&amp;gt;get_config callback (bsc#953830).
- drm/i915: use backlight legacy combination mode also for i915gm/i945gm (bsc#941113).
- drm/i915: use the initialized backlight max value instead of reading it (bsc#941113).
- drm/i915: vlv does not have pipe field in backlight registers (bsc#941113).
- fanotify: fix notification of groups with inode &amp; mount marks (bsc#955533).
- Fix remove_and_add_spares removes drive added as spare in slot_store (bsc#956717).
- genksyms: Handle string literals with spaces in reference files (bsc#958510).
- genksyms: Handle string literals with spaces in reference files (bsc#958510).
- hwrng: Add a driver for the hwrng found in power7+ systems (fate#315784).
  in the non-RT kernel to minimize the differences.
- ipv4: Do not increase PMTU with Datagram Too Big message (bsc#955224).
- ipv6: distinguish frag queues by device for multicast and link-local packets (bsc#955422).
- ixgbe: fix broken PFC with X550 (bsc#951864).
- ixgbe: use correct fcoe ddp max check (bsc#951864).
- kabi: Fix spurious kabi change in mm/util.c.
- kABI: protect struct ahci_host_priv.
- kabi: Restore kabi in struct iscsi_tpg_attrib (bsc#954635).
- kabi: Restore kabi in struct se_cmd (bsc#954635).
- kabi: Restore kabi in struct se_subsystem_api (bsc#954635).
- ktime: add ktime_after and ktime_before helper (bsc#904348).
- mm: factor commit limit calculation (VM Performance).
- mm: get rid of 'vmalloc_info' from /proc/meminfo (VM Performance).
- mm: hugetlbfs: skip shared VMAs when unmapping private pages to satisfy a fault (Automatic NUMA Balancing (fate#315482)).
- mm: remove PG_waiters from PAGE_FLAGS_CHECK_AT_FREE (bnc#943959).
- mm: vmscan: never isolate more pages than necessary (VM Performance).
- Move ktime_after patch to the networking section
- nfsrdma: Fix regression in NFSRDMA server (bsc#951110).
- pci: Drop 'setting latency timer' messages (bsc#956047).
- pci: Update VPD size with correct length (bsc#924493).
- perf/x86/intel/uncore: Delete an unnecessary check before pci_dev_put() call (bsc#955136).
- perf/x86/intel/uncore: Delete an unnecessary check before pci_dev_put() call (bsc#955136).
- perf/x86/intel/uncore: Fix multi-segment problem of perf_event_intel_uncore (bsc#955136).
- perf/x86/intel/uncore: Fix multi-segment problem of perf_event_intel_uncore (bsc#955136).
- pm, hinernate: use put_page in release_swap_writer (bnc#943959).
- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).
- Re-add copy_page_vector_to_user()
- ring-buffer: Always run per-cpu ring buffer resize with schedule_work_on() (bnc#956711).
- route: Use ipv4_mtu instead of raw rt_pmtu (bsc#955224).
- rpm/constraints.in: Require 14GB worth of disk space on POWER The builds started to fail randomly due to ENOSPC errors.
- rpm/kernel-binary.spec.in: Always build zImage for ARM
- rpm/kernel-binary.spec.in: Do not explicitly set DEBUG_SECTION_MISMATCH CONFIG_DEBUG_SECTION_MISMATCH is a selectable Kconfig option since 2.6.39 and is enabled in our configs.
- rpm/kernel-binary.spec.in: Drop the %build_src_dir macro It is the parent directory of the O= directory.
- rpm/kernel-binary.spec.in: really pass down %{?_smp_mflags}
- rpm/kernel-binary.spec.in: Use parallel make in all invocations Also, remove the lengthy comment, since we are using a standard rpm macro now.
- rpm/kernel-binary.spec.in: Use upstream script to support config.addon
- s390/dasd: fix disconnected device with valid path mask (bnc#954986, LTC#132707).
- s390/dasd: fix invalid PAV assignment after suspend/resume (bnc#954986, LTC#132706).
- s390/dasd: fix list_del corruption after lcu changes (bnc#954986, LTC#133077).
- sched: Call select_idle_sibling() when not affine_sd (Scheduler Performance).
- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bnc#949100).
- sched, isolcpu: make cpu_isolated_map visible outside scheduler (bsc#957395).
- sched/numa: Check all nodes when placing a pseudo-interleaved group (Automatic NUMA Balancing (fate#315482)).
- sched/numa: Fix math underflow in task_tick_numa() (Automatic NUMA Balancing (fate#315482)).
- sched/numa: Only consider less busy nodes as numa balancing destinations (Automatic NUMA Balancing (fate#315482)).
- sched: Put expensive runtime debugging checks under a separate Kconfig entry (Scheduler performance).
- scsi: hosts: update to use ida_simple for host_no (bsc#939926)
- sunrpc/cache: make cache flushing more reliable (bsc#947478).
- sunrpc: Fix oops when trace sunrpc_task events in nfs client (bnc#956703).
- supported.conf: Support peak_pci and sja1000: These 2 CAN drivers are
  supported in the RT kernel for a long time so we can also support them
- target/pr: fix core_scsi3_pr_seq_non_holder() caller (bnc#952666).
- target: Send UA upon LUN RESET tmr completion (bsc#933514).
- target: use 'se_dev_entry' when allocating UAs (bsc#933514).
- Update config files. (bnc#955644)
- Update kabi files with sbc_parse_cdb symbol change (bsc#954635).
- usbvision fix overflow of interfaces array (bnc#950998).
- vmxnet3: adjust ring sizes when interface is down (bsc#950750).
- vmxnet3: Fix ethtool -S to return correct rx queue stats (bsc#950750).
- x86/efi: Fix invalid parameter error when getting hibernation key (fate#316350, bsc#956284).
- x86/evtchn: make use of PHYSDEVOP_map_pirq.
- x86/mm: Add parenthesis for TLB tracepoint size calculation (VM Performance (Reduce IPIs during reclaim)).
- x86/mm/hotplug: Modify PGD entry when removing memory (VM Functionality, bnc#955148).
- x86/mm/hotplug: Pass sync_global_pgds() a correct argument in remove_pagetable() (VM Functionality, bnc#955148).
- x86/tsc: Let high latency PIT fail fast in quick_pit_calibrate() (bsc#953717).
- xen: fix boot crash in EC2 settings (bsc#956147).
- xen: refresh patches.xen/xen-x86_64-m2p-strict (bsc#956147).
- xen: Update Xen patches to 3.12.50.
- xfs: always drain dio before extending aio write submission (bsc#949744).
- xfs: DIO needs an ioend for writes (bsc#949744).
- xfs: DIO write completion size updates race (bsc#949744).
- xfs: DIO writes within EOF do not need an ioend (bsc#949744).
- xfs: direct IO EOF zeroing needs to drain AIO (bsc#949744).
- xfs: do not allocate an ioend for direct I/O completions (bsc#949744).
- xfs: factor DIO write mapping from get_blocks (bsc#949744).
- xfs: handle DIO overwrite EOF update completion correctly (bsc#949744).
- xfs: move DIO mapping size calculation (bsc#949744).
- xfs: using generic_file_direct_write() is unnecessary (bsc#949744).
- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bnc#951165).
- xhci: Workaround to get Intel xHCI reset working more reliably (bnc#957546).
- zfcp: fix fc_host port_type with NPIV (bnc#954986, LTC#132479).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-17"/>
	<updated date="2015-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/758040">SUSE bug 758040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814440">SUSE bug 814440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904348">SUSE bug 904348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921949">SUSE bug 921949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924493">SUSE bug 924493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926238">SUSE bug 926238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933514">SUSE bug 933514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936773">SUSE bug 936773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939826">SUSE bug 939826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939926">SUSE bug 939926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940776">SUSE bug 940776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941113">SUSE bug 941113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941202">SUSE bug 941202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943959">SUSE bug 943959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944296">SUSE bug 944296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947241">SUSE bug 947241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947478">SUSE bug 947478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949100">SUSE bug 949100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949192">SUSE bug 949192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949706">SUSE bug 949706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949744">SUSE bug 949744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949936">SUSE bug 949936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950013">SUSE bug 950013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950580">SUSE bug 950580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950750">SUSE bug 950750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950998">SUSE bug 950998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951110">SUSE bug 951110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951165">SUSE bug 951165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951440">SUSE bug 951440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951638">SUSE bug 951638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951864">SUSE bug 951864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952384">SUSE bug 952384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952666">SUSE bug 952666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953717">SUSE bug 953717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953826">SUSE bug 953826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953830">SUSE bug 953830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953971">SUSE bug 953971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953980">SUSE bug 953980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954635">SUSE bug 954635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954986">SUSE bug 954986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955136">SUSE bug 955136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955148">SUSE bug 955148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955224">SUSE bug 955224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955354">SUSE bug 955354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955422">SUSE bug 955422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955533">SUSE bug 955533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955644">SUSE bug 955644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956047">SUSE bug 956047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956053">SUSE bug 956053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956147">SUSE bug 956147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956284">SUSE bug 956284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956703">SUSE bug 956703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956711">SUSE bug 956711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956717">SUSE bug 956717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956801">SUSE bug 956801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956876">SUSE bug 956876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957395">SUSE bug 957395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957546">SUSE bug 957546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958504">SUSE bug 958504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958510">SUSE bug 958510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958647">SUSE bug 958647</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0272/">CVE-2015-0272</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2925/">CVE-2015-2925</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5156/">CVE-2015-5156</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7799/">CVE-2015-7799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7872/">CVE-2015-7872</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7990/">CVE-2015-7990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8215/">CVE-2015-8215</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516145" comment="kernel-default-3.12.51-60.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516146" comment="kernel-default-devel-3.12.51-60.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516147" comment="kernel-default-extra-3.12.51-60.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516148" comment="kernel-devel-3.12.51-60.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516149" comment="kernel-macros-3.12.51-60.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516150" comment="kernel-source-3.12.51-60.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516151" comment="kernel-syms-3.12.51-60.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516152" comment="kernel-xen-3.12.51-60.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516153" comment="kernel-xen-devel-3.12.51-60.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77513" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="954204" ref_url="https://bugzilla.suse.com/954204" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2698" ref_url="https://www.suse.com/security/cve/CVE-2015-2698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001738.html" source="SUSE-SU"/>
		<description>
The krb5 package was updated to fix the following security issue:

- CVE-2015-2698: Fixed a memory corruption regression introduced by resolving of CVE-2015-2698 (bsc#954204).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-18"/>
	<updated date="2015-12-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954204">SUSE bug 954204</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2698/">CVE-2015-2698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515382" comment="krb5-1.12.1-22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515383" comment="krb5-32bit-1.12.1-22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515384" comment="krb5-client-1.12.1-22.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77514" version="1" class="patch">
	<metadata>
		<title>Security update for ldb, samba, talloc, tdb, tevent (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="949022" ref_url="https://bugzilla.suse.com/949022" source="BUGZILLA"/>
		<reference ref_id="951660" ref_url="https://bugzilla.suse.com/951660" source="BUGZILLA"/>
		<reference ref_id="954658" ref_url="https://bugzilla.suse.com/954658" source="BUGZILLA"/>
		<reference ref_id="958581" ref_url="https://bugzilla.suse.com/958581" source="BUGZILLA"/>
		<reference ref_id="958582" ref_url="https://bugzilla.suse.com/958582" source="BUGZILLA"/>
		<reference ref_id="958583" ref_url="https://bugzilla.suse.com/958583" source="BUGZILLA"/>
		<reference ref_id="958584" ref_url="https://bugzilla.suse.com/958584" source="BUGZILLA"/>
		<reference ref_id="958585" ref_url="https://bugzilla.suse.com/958585" source="BUGZILLA"/>
		<reference ref_id="958586" ref_url="https://bugzilla.suse.com/958586" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3223" ref_url="https://www.suse.com/security/cve/CVE-2015-3223/" source="CVE"/>
		<reference ref_id="CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252/" source="CVE"/>
		<reference ref_id="CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296/" source="CVE"/>
		<reference ref_id="CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<reference ref_id="CVE-2015-8467" ref_url="https://www.suse.com/security/cve/CVE-2015-8467/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" source="SUSE-SU"/>
		<description>

This update for ldb, samba, talloc, tdb, tevent fixes the following security issues and bugs:

The Samba LDB was updated to version 1.1.24:

- Fix ldap \00 search expression attack dos; CVE-2015-3223; (bso#11325)
- Fix remote read memory exploit in ldb; CVE-2015-5330; (bso#11599)
- Move ldb_(un)pack_data into ldb_module.h for testing
- Fix installation of _ldb_text.py
- Fix propagation of ldb errors through tdb
- Fix bug triggered by having an empty message in database during search

Samba was updated to fix these issues:

- Malicious request can cause Samba LDAP server to hang, spinning using CPU;
  CVE-2015-3223; (bso#11325); (bnc#958581).
- Remote read memory exploit in LDB; CVE-2015-5330; (bso#11599); (bnc#958586).
- Insufficient symlink verification (file access outside the share);
  CVE-2015-5252; (bso#11395); (bnc#958582).
- No man in the middle protection when forcing smb encryption on the client
  side; CVE-2015-5296; (bso#11536); (bnc#958584).
- Currently the snapshot browsing is not secure thru windows previous version
  (shadow_copy2); CVE-2015-5299; (bso#11529); (bnc#958583).
- Fix Microsoft MS15-096 to prevent machine accounts from being changed into
  user accounts; CVE-2015-8467; (bso#11552); (bnc#958585).
- Changing log level of two entries to from 1 to 3; (bso#9912).
- vfs_gpfs: Re-enable share modes; (bso#11243).
- wafsamba: Also build libraries with RELRO protection; (bso#11346).
- ctdb: Strip trailing spaces from nodes file; (bso#11365).
- s3-smbd: Fix old DOS client doing wildcard delete - gives a attribute type
  of zero; (bso#11452).
- nss_wins: Do not run into use after free issues when we access memory
  allocated on the globals and the global being reinitialized; (bso#11563).
- async_req: Fix non-blocking connect(); (bso#11564).
- auth: gensec: Fix a memory leak; (bso#11565).
- lib: util: Make non-critical message a warning; (bso#11566).
- Fix winbindd crashes with samlogon for trusted domain user; (bso#11569);
  (bnc#949022).
- smbd: Send SMB2 oplock breaks unencrypted; (bso#11570).
- ctdb: Open the RO tracking db with perms 0600 instead of 0000; (bso#11577).
- manpage: Correct small typo error; (bso#11584).
- s3: smbd: If EA's are turned off on a share don't allow an SMB2 create
  containing them; (bso#11589).
- Backport some valgrind fixes from upstream master; (bso#11597).
- s3: smbd: have_file_open_below() fails to enumerate open files below an open
  directory handle; (bso#11615).
- docs: Fix some typos in the idmap config section of man 5 smb.conf;
  (bso#11619).
- Cleanup and enhance the pidl sub package.
- s3: smbd: Fix our access-based enumeration on 'hide unreadable' to match
  Windows; (bso#10252).
- smbd: Fix file name buflen and padding in notify repsonse; (bso#10634).
- kerberos: Make sure we only use prompter type when available; (bso#11038).
- s3:ctdbd_conn: Make sure we destroy tevent_fd before closing the socket;
  (bso#11316).
- dcerpc.idl: accept invalid dcerpc_bind_nak pdus; (bso#11327).
- Fix a deadlock in tdb; (bso#11381).
- s3: smbd: Fix mkdir race condition; (bso#11486).
- pam_winbind: Fix a segfault if initialization fails; (bso#11502).
- s3: dfs: Fix a crash when the dfs targets are disabled; (bso#11509).
- s3: smbd: Fix opening/creating :stream files on the root share directory;
  (bso#11522).
- net: Fix a crash with 'net ads keytab create'; (bso#11528).
- s3: smbd: Fix a crash in unix_convert() and a NULL pointer bug introduced by
  previous 'raw' stream fix (bso#11522); (bso#11535).
- vfs_fruit: Return value of ad_pack in vfs_fruit.c; (bso#11543).
- vfs_commit: Set the fd on open before calling SMB_VFS_FSTAT; (bso#11547).
- Fix bug in smbstatus where the lease info is not printed; (bso#11549).
- s3:smbstatus: Add stream name to share_entry_forall(); (bso#11550).
- Prevent null pointer access in samlogon fallback when security
  credentials are null; (bnc#949022).
- Fix 100% CPU in winbindd when logging in with 'user must change password on
  next logon'; (bso#11038).

talloc was updated to version 2.1.5; (bsc#954658) (bsc#951660).

- Test that talloc magic differs between processes.
- Increment minor version due to added talloc_test_get_magic.
- Provide tests access to talloc_magic.
- Test magic protection measures.

tdb was updated to version 1.3.8; (bsc#954658).

- Improved python3 bindings

tevent was updated to 0.9.26; (bsc#954658).

- New tevent_thread_proxy api
- Minor build fixes
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-18"/>
	<updated date="2015-12-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/949022">SUSE bug 949022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951660">SUSE bug 951660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954658">SUSE bug 954658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958581">SUSE bug 958581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958582">SUSE bug 958582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958583">SUSE bug 958583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958584">SUSE bug 958584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958585">SUSE bug 958585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958586">SUSE bug 958586</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3223/">CVE-2015-3223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8467/">CVE-2015-8467</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516154" comment="libdcerpc-binding0-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516155" comment="libdcerpc-binding0-32bit-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516156" comment="libdcerpc0-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516157" comment="libdcerpc0-32bit-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516158" comment="libgensec0-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516159" comment="libgensec0-32bit-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516160" comment="libldb1-1.1.24-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516161" comment="libldb1-32bit-1.1.24-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516162" comment="libndr-krb5pac0-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516163" comment="libndr-krb5pac0-32bit-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516164" comment="libndr-nbt0-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516165" comment="libndr-nbt0-32bit-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516166" comment="libndr-standard0-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516167" comment="libndr-standard0-32bit-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516168" comment="libndr0-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516169" comment="libndr0-32bit-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516170" comment="libnetapi0-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516171" comment="libnetapi0-32bit-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516172" comment="libregistry0-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516173" comment="libsamba-credentials0-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516174" comment="libsamba-credentials0-32bit-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516175" comment="libsamba-hostconfig0-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516176" comment="libsamba-hostconfig0-32bit-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516177" comment="libsamba-passdb0-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516178" comment="libsamba-passdb0-32bit-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516179" comment="libsamba-util0-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516180" comment="libsamba-util0-32bit-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516181" comment="libsamdb0-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516182" comment="libsamdb0-32bit-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516183" comment="libsmbclient-raw0-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516184" comment="libsmbclient-raw0-32bit-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516185" comment="libsmbclient0-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516186" comment="libsmbclient0-32bit-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516187" comment="libsmbconf0-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516188" comment="libsmbconf0-32bit-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516189" comment="libsmbldap0-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516190" comment="libsmbldap0-32bit-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516191" comment="libtalloc2-2.1.5-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516192" comment="libtalloc2-32bit-2.1.5-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516193" comment="libtdb1-1.3.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516194" comment="libtdb1-32bit-1.3.8-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516195" comment="libtevent-util0-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516196" comment="libtevent-util0-32bit-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516197" comment="libtevent0-0.9.26-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516198" comment="libtevent0-32bit-0.9.26-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516199" comment="libwbclient0-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516200" comment="libwbclient0-32bit-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516201" comment="pytalloc-2.1.5-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516202" comment="pytalloc-32bit-2.1.5-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516203" comment="samba-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516204" comment="samba-32bit-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516205" comment="samba-client-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516206" comment="samba-client-32bit-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516207" comment="samba-doc-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516208" comment="samba-libs-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516209" comment="samba-libs-32bit-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516210" comment="samba-winbind-4.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516211" comment="samba-winbind-32bit-4.2.4-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77515" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="947165" ref_url="https://bugzilla.suse.com/947165" source="BUGZILLA"/>
		<reference ref_id="954018" ref_url="https://bugzilla.suse.com/954018" source="BUGZILLA"/>
		<reference ref_id="954405" ref_url="https://bugzilla.suse.com/954405" source="BUGZILLA"/>
		<reference ref_id="956408" ref_url="https://bugzilla.suse.com/956408" source="BUGZILLA"/>
		<reference ref_id="956409" ref_url="https://bugzilla.suse.com/956409" source="BUGZILLA"/>
		<reference ref_id="956411" ref_url="https://bugzilla.suse.com/956411" source="BUGZILLA"/>
		<reference ref_id="956592" ref_url="https://bugzilla.suse.com/956592" source="BUGZILLA"/>
		<reference ref_id="956832" ref_url="https://bugzilla.suse.com/956832" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3259" ref_url="https://www.suse.com/security/cve/CVE-2015-3259/" source="CVE"/>
		<reference ref_id="CVE-2015-4106" ref_url="https://www.suse.com/security/cve/CVE-2015-4106/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339/" source="CVE"/>
		<reference ref_id="CVE-2015-8340" ref_url="https://www.suse.com/security/cve/CVE-2015-8340/" source="CVE"/>
		<reference ref_id="CVE-2015-8341" ref_url="https://www.suse.com/security/cve/CVE-2015-8341/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<description>


This update fixes the following security issues:

- bsc#956832 -  CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list

- Revert x86/IO-APIC: don't create pIRQ mapping from masked RTE until kernel maintenance release goes out.

- bsc#956592 -  xen: virtual PMU is unsupported (XSA-163)

- bsc#956408 -  CVE-2015-8339, CVE-2015-8340: xen: XENMEM_exchange error handling issues (XSA-159)

- bsc#956409 -  CVE-2015-8341: xen: libxl leak of pv kernel and initrd on error (XSA-160)

- bsc#956411 -  CVE-2015-7504: xen: heap buffer overflow vulnerability in pcnet emulator (XSA-162)

- bsc#947165 -  CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142)

- bsc#954405 -  CVE-2015-8104: Xen: guest to host DoS by triggering an infinite loop in microcode via #DB exception

- bsc#954018 -  CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-19"/>
	<updated date="2015-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/947165">SUSE bug 947165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954018">SUSE bug 954018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954405">SUSE bug 954405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956408">SUSE bug 956408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956409">SUSE bug 956409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956411">SUSE bug 956411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956592">SUSE bug 956592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956832">SUSE bug 956832</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3259/">CVE-2015-3259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4106/">CVE-2015-4106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8340/">CVE-2015-8340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8341/">CVE-2015-8341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516212" comment="xen-4.5.2_02-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516213" comment="xen-kmp-default-4.5.2_02_k3.12.49_11-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516214" comment="xen-libs-4.5.2_02-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516215" comment="xen-libs-32bit-4.5.2_02-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77516" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="982366" ref_url="https://bugzilla.suse.com/982366" source="BUGZILLA"/>
		<reference ref_id="983549" ref_url="https://bugzilla.suse.com/983549" source="BUGZILLA"/>
		<reference ref_id="983638" ref_url="https://bugzilla.suse.com/983638" source="BUGZILLA"/>
		<reference ref_id="983639" ref_url="https://bugzilla.suse.com/983639" source="BUGZILLA"/>
		<reference ref_id="983643" ref_url="https://bugzilla.suse.com/983643" source="BUGZILLA"/>
		<reference ref_id="983646" ref_url="https://bugzilla.suse.com/983646" source="BUGZILLA"/>
		<reference ref_id="983651" ref_url="https://bugzilla.suse.com/983651" source="BUGZILLA"/>
		<reference ref_id="983652" ref_url="https://bugzilla.suse.com/983652" source="BUGZILLA"/>
		<reference ref_id="983653" ref_url="https://bugzilla.suse.com/983653" source="BUGZILLA"/>
		<reference ref_id="983655" ref_url="https://bugzilla.suse.com/983655" source="BUGZILLA"/>
		<reference ref_id="984006" ref_url="https://bugzilla.suse.com/984006" source="BUGZILLA"/>
		<reference ref_id="984126" ref_url="https://bugzilla.suse.com/984126" source="BUGZILLA"/>
		<reference ref_id="985659" ref_url="https://bugzilla.suse.com/985659" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2815" ref_url="https://www.suse.com/security/cve/CVE-2016-2815/" source="CVE"/>
		<reference ref_id="CVE-2016-2818" ref_url="https://www.suse.com/security/cve/CVE-2016-2818/" source="CVE"/>
		<reference ref_id="CVE-2016-2819" ref_url="https://www.suse.com/security/cve/CVE-2016-2819/" source="CVE"/>
		<reference ref_id="CVE-2016-2821" ref_url="https://www.suse.com/security/cve/CVE-2016-2821/" source="CVE"/>
		<reference ref_id="CVE-2016-2822" ref_url="https://www.suse.com/security/cve/CVE-2016-2822/" source="CVE"/>
		<reference ref_id="CVE-2016-2824" ref_url="https://www.suse.com/security/cve/CVE-2016-2824/" source="CVE"/>
		<reference ref_id="CVE-2016-2828" ref_url="https://www.suse.com/security/cve/CVE-2016-2828/" source="CVE"/>
		<reference ref_id="CVE-2016-2831" ref_url="https://www.suse.com/security/cve/CVE-2016-2831/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1691-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html" source="SUSE-SU"/>
		<description>
MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nss and mozilla-nspr were updated to fix nine security issues.

MozillaFirefox was updated to version 45.2.0 ESR. mozilla-nss was updated to version 3.21.1.

These security issues were fixed:
- CVE-2016-2834: Memory safety bugs in NSS (MFSA 2016-61) (bsc#983639).
- CVE-2016-2824: Out-of-bounds write with WebGL shader (MFSA 2016-53) (bsc#983651).
- CVE-2016-2822: Addressbar spoofing though the SELECT element (MFSA 2016-52) (bsc#983652).
- CVE-2016-2821: Use-after-free deleting tables from a contenteditable document (MFSA 2016-51) (bsc#983653).
- CVE-2016-2819: Buffer overflow parsing HTML5 fragments (MFSA 2016-50) (bsc#983655).
- CVE-2016-2828: Use-after-free when textures are used in WebGL operations after recycle pool destruction (MFSA 2016-56) (bsc#983646).
- CVE-2016-2831: Entering fullscreen and persistent pointerlock without user permission (MFSA 2016-58) (bsc#983643).
- CVE-2016-2815, CVE-2016-2818: Miscellaneous memory safety hazards (MFSA 2016-49) (bsc#983638)
  
These non-security issues were fixed:
- bsc#982366: Unknown SSL protocol error in connections 
- Fix crashes on aarch64
  * Determine page size at runtime (bsc#984006)
  * Allow aarch64 to work in safe mode (bsc#985659)
- Fix crashes on mainframes

All extensions must now be signed by addons.mozilla.org. Please read README.SUSE for more details.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-27"/>
	<updated date="2016-06-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/982366">SUSE bug 982366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983638">SUSE bug 983638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983639">SUSE bug 983639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983643">SUSE bug 983643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983646">SUSE bug 983646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983651">SUSE bug 983651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983652">SUSE bug 983652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983653">SUSE bug 983653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983655">SUSE bug 983655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984006">SUSE bug 984006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984126">SUSE bug 984126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985659">SUSE bug 985659</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2815/">CVE-2016-2815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2818/">CVE-2016-2818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2819/">CVE-2016-2819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2821/">CVE-2016-2821</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2822/">CVE-2016-2822</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2824/">CVE-2016-2824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2828/">CVE-2016-2828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2831/">CVE-2016-2831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515454" comment="MozillaFirefox-45.2.0esr-75.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515455" comment="MozillaFirefox-branding-SLE-45.0-28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515456" comment="MozillaFirefox-translations-45.2.0esr-75.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515457" comment="libfreebl3-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515458" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515459" comment="libsoftokn3-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515460" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515461" comment="mozilla-nspr-4.12-15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515462" comment="mozilla-nspr-32bit-4.12-15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515463" comment="mozilla-nss-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515464" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515465" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515466" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515467" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515468" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515469" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77517" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="662458" ref_url="https://bugzilla.suse.com/662458" source="BUGZILLA"/>
		<reference ref_id="676471" ref_url="https://bugzilla.suse.com/676471" source="BUGZILLA"/>
		<reference ref_id="889207" ref_url="https://bugzilla.suse.com/889207" source="BUGZILLA"/>
		<reference ref_id="897662" ref_url="https://bugzilla.suse.com/897662" source="BUGZILLA"/>
		<reference ref_id="899908" ref_url="https://bugzilla.suse.com/899908" source="BUGZILLA"/>
		<reference ref_id="903279" ref_url="https://bugzilla.suse.com/903279" source="BUGZILLA"/>
		<reference ref_id="908151" ref_url="https://bugzilla.suse.com/908151" source="BUGZILLA"/>
		<reference ref_id="928547" ref_url="https://bugzilla.suse.com/928547" source="BUGZILLA"/>
		<reference ref_id="931448" ref_url="https://bugzilla.suse.com/931448" source="BUGZILLA"/>
		<reference ref_id="937086" ref_url="https://bugzilla.suse.com/937086" source="BUGZILLA"/>
		<reference ref_id="940413" ref_url="https://bugzilla.suse.com/940413" source="BUGZILLA"/>
		<reference ref_id="942262" ref_url="https://bugzilla.suse.com/942262" source="BUGZILLA"/>
		<reference ref_id="943989" ref_url="https://bugzilla.suse.com/943989" source="BUGZILLA"/>
		<reference ref_id="944309" ref_url="https://bugzilla.suse.com/944309" source="BUGZILLA"/>
		<reference ref_id="945345" ref_url="https://bugzilla.suse.com/945345" source="BUGZILLA"/>
		<reference ref_id="951844" ref_url="https://bugzilla.suse.com/951844" source="BUGZILLA"/>
		<reference ref_id="953233" ref_url="https://bugzilla.suse.com/953233" source="BUGZILLA"/>
		<reference ref_id="957805" ref_url="https://bugzilla.suse.com/957805" source="BUGZILLA"/>
		<reference ref_id="958390" ref_url="https://bugzilla.suse.com/958390" source="BUGZILLA"/>
		<reference ref_id="959514" ref_url="https://bugzilla.suse.com/959514" source="BUGZILLA"/>
		<reference ref_id="960857" ref_url="https://bugzilla.suse.com/960857" source="BUGZILLA"/>
		<reference ref_id="962336" ref_url="https://bugzilla.suse.com/962336" source="BUGZILLA"/>
		<reference ref_id="962846" ref_url="https://bugzilla.suse.com/962846" source="BUGZILLA"/>
		<reference ref_id="962872" ref_url="https://bugzilla.suse.com/962872" source="BUGZILLA"/>
		<reference ref_id="963572" ref_url="https://bugzilla.suse.com/963572" source="BUGZILLA"/>
		<reference ref_id="964461" ref_url="https://bugzilla.suse.com/964461" source="BUGZILLA"/>
		<reference ref_id="964727" ref_url="https://bugzilla.suse.com/964727" source="BUGZILLA"/>
		<reference ref_id="965319" ref_url="https://bugzilla.suse.com/965319" source="BUGZILLA"/>
		<reference ref_id="966054" ref_url="https://bugzilla.suse.com/966054" source="BUGZILLA"/>
		<reference ref_id="966573" ref_url="https://bugzilla.suse.com/966573" source="BUGZILLA"/>
		<reference ref_id="967640" ref_url="https://bugzilla.suse.com/967640" source="BUGZILLA"/>
		<reference ref_id="968497" ref_url="https://bugzilla.suse.com/968497" source="BUGZILLA"/>
		<reference ref_id="968687" ref_url="https://bugzilla.suse.com/968687" source="BUGZILLA"/>
		<reference ref_id="968812" ref_url="https://bugzilla.suse.com/968812" source="BUGZILLA"/>
		<reference ref_id="968813" ref_url="https://bugzilla.suse.com/968813" source="BUGZILLA"/>
		<reference ref_id="969016" ref_url="https://bugzilla.suse.com/969016" source="BUGZILLA"/>
		<reference ref_id="970604" ref_url="https://bugzilla.suse.com/970604" source="BUGZILLA"/>
		<reference ref_id="970609" ref_url="https://bugzilla.suse.com/970609" source="BUGZILLA"/>
		<reference ref_id="970892" ref_url="https://bugzilla.suse.com/970892" source="BUGZILLA"/>
		<reference ref_id="970911" ref_url="https://bugzilla.suse.com/970911" source="BUGZILLA"/>
		<reference ref_id="970948" ref_url="https://bugzilla.suse.com/970948" source="BUGZILLA"/>
		<reference ref_id="970955" ref_url="https://bugzilla.suse.com/970955" source="BUGZILLA"/>
		<reference ref_id="970956" ref_url="https://bugzilla.suse.com/970956" source="BUGZILLA"/>
		<reference ref_id="970958" ref_url="https://bugzilla.suse.com/970958" source="BUGZILLA"/>
		<reference ref_id="970970" ref_url="https://bugzilla.suse.com/970970" source="BUGZILLA"/>
		<reference ref_id="971049" ref_url="https://bugzilla.suse.com/971049" source="BUGZILLA"/>
		<reference ref_id="971124" ref_url="https://bugzilla.suse.com/971124" source="BUGZILLA"/>
		<reference ref_id="971126" ref_url="https://bugzilla.suse.com/971126" source="BUGZILLA"/>
		<reference ref_id="971159" ref_url="https://bugzilla.suse.com/971159" source="BUGZILLA"/>
		<reference ref_id="971170" ref_url="https://bugzilla.suse.com/971170" source="BUGZILLA"/>
		<reference ref_id="971600" ref_url="https://bugzilla.suse.com/971600" source="BUGZILLA"/>
		<reference ref_id="971628" ref_url="https://bugzilla.suse.com/971628" source="BUGZILLA"/>
		<reference ref_id="971793" ref_url="https://bugzilla.suse.com/971793" source="BUGZILLA"/>
		<reference ref_id="971947" ref_url="https://bugzilla.suse.com/971947" source="BUGZILLA"/>
		<reference ref_id="972003" ref_url="https://bugzilla.suse.com/972003" source="BUGZILLA"/>
		<reference ref_id="972068" ref_url="https://bugzilla.suse.com/972068" source="BUGZILLA"/>
		<reference ref_id="972174" ref_url="https://bugzilla.suse.com/972174" source="BUGZILLA"/>
		<reference ref_id="972780" ref_url="https://bugzilla.suse.com/972780" source="BUGZILLA"/>
		<reference ref_id="972844" ref_url="https://bugzilla.suse.com/972844" source="BUGZILLA"/>
		<reference ref_id="972891" ref_url="https://bugzilla.suse.com/972891" source="BUGZILLA"/>
		<reference ref_id="972951" ref_url="https://bugzilla.suse.com/972951" source="BUGZILLA"/>
		<reference ref_id="973378" ref_url="https://bugzilla.suse.com/973378" source="BUGZILLA"/>
		<reference ref_id="973556" ref_url="https://bugzilla.suse.com/973556" source="BUGZILLA"/>
		<reference ref_id="973855" ref_url="https://bugzilla.suse.com/973855" source="BUGZILLA"/>
		<reference ref_id="974418" ref_url="https://bugzilla.suse.com/974418" source="BUGZILLA"/>
		<reference ref_id="974646" ref_url="https://bugzilla.suse.com/974646" source="BUGZILLA"/>
		<reference ref_id="974692" ref_url="https://bugzilla.suse.com/974692" source="BUGZILLA"/>
		<reference ref_id="975371" ref_url="https://bugzilla.suse.com/975371" source="BUGZILLA"/>
		<reference ref_id="975488" ref_url="https://bugzilla.suse.com/975488" source="BUGZILLA"/>
		<reference ref_id="975772" ref_url="https://bugzilla.suse.com/975772" source="BUGZILLA"/>
		<reference ref_id="975945" ref_url="https://bugzilla.suse.com/975945" source="BUGZILLA"/>
		<reference ref_id="976739" ref_url="https://bugzilla.suse.com/976739" source="BUGZILLA"/>
		<reference ref_id="976821" ref_url="https://bugzilla.suse.com/976821" source="BUGZILLA"/>
		<reference ref_id="976868" ref_url="https://bugzilla.suse.com/976868" source="BUGZILLA"/>
		<reference ref_id="977582" ref_url="https://bugzilla.suse.com/977582" source="BUGZILLA"/>
		<reference ref_id="977685" ref_url="https://bugzilla.suse.com/977685" source="BUGZILLA"/>
		<reference ref_id="978401" ref_url="https://bugzilla.suse.com/978401" source="BUGZILLA"/>
		<reference ref_id="978527" ref_url="https://bugzilla.suse.com/978527" source="BUGZILLA"/>
		<reference ref_id="978822" ref_url="https://bugzilla.suse.com/978822" source="BUGZILLA"/>
		<reference ref_id="979213" ref_url="https://bugzilla.suse.com/979213" source="BUGZILLA"/>
		<reference ref_id="979347" ref_url="https://bugzilla.suse.com/979347" source="BUGZILLA"/>
		<reference ref_id="983143" ref_url="https://bugzilla.suse.com/983143" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9717" ref_url="https://www.suse.com/security/cve/CVE-2014-9717/" source="CVE"/>
		<reference ref_id="CVE-2016-1583" ref_url="https://www.suse.com/security/cve/CVE-2016-1583/" source="CVE"/>
		<reference ref_id="CVE-2016-2185" ref_url="https://www.suse.com/security/cve/CVE-2016-2185/" source="CVE"/>
		<reference ref_id="CVE-2016-2186" ref_url="https://www.suse.com/security/cve/CVE-2016-2186/" source="CVE"/>
		<reference ref_id="CVE-2016-2188" ref_url="https://www.suse.com/security/cve/CVE-2016-2188/" source="CVE"/>
		<reference ref_id="CVE-2016-2847" ref_url="https://www.suse.com/security/cve/CVE-2016-2847/" source="CVE"/>
		<reference ref_id="CVE-2016-3134" ref_url="https://www.suse.com/security/cve/CVE-2016-3134/" source="CVE"/>
		<reference ref_id="CVE-2016-3136" ref_url="https://www.suse.com/security/cve/CVE-2016-3136/" source="CVE"/>
		<reference ref_id="CVE-2016-3137" ref_url="https://www.suse.com/security/cve/CVE-2016-3137/" source="CVE"/>
		<reference ref_id="CVE-2016-3138" ref_url="https://www.suse.com/security/cve/CVE-2016-3138/" source="CVE"/>
		<reference ref_id="CVE-2016-3140" ref_url="https://www.suse.com/security/cve/CVE-2016-3140/" source="CVE"/>
		<reference ref_id="CVE-2016-3689" ref_url="https://www.suse.com/security/cve/CVE-2016-3689/" source="CVE"/>
		<reference ref_id="CVE-2016-3951" ref_url="https://www.suse.com/security/cve/CVE-2016-3951/" source="CVE"/>
		<reference ref_id="CVE-2016-4482" ref_url="https://www.suse.com/security/cve/CVE-2016-4482/" source="CVE"/>
		<reference ref_id="CVE-2016-4486" ref_url="https://www.suse.com/security/cve/CVE-2016-4486/" source="CVE"/>
		<reference ref_id="CVE-2016-4569" ref_url="https://www.suse.com/security/cve/CVE-2016-4569/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.59 to receive various security and bugfixes.

Main feature additions:
- Improved support for Clustered File System (CephFS, fate#318586).
- Addition of kGraft patches now produces logging messages to simplify auditing (fate#317827).

The following security bugs were fixed:
- CVE-2016-1583: Prevent the usage of mmap when the lower file system does not allow it. This could have lead to local privilege escalation when ecryptfs-utils was installed and /sbin/mount.ecryptfs_private was setuid (bsc#983143).
- CVE-2014-9717: fs/namespace.c in the Linux kernel processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allowed local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace (bnc#928547).
- CVE-2016-2185: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971124).
- CVE-2016-2186: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970958).
- CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956).
- CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bsc#970948).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126 971793).
- CVE-2016-3136: The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors (bnc#970955).
- CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions (bnc#970970).
- CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor (bnc#970911 970970).
- CVE-2016-3140: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970892).
- CVE-2016-3689: The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface (bnc#971628).
- CVE-2016-3951: Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor (bnc#974418).
- CVE-2016-4482: Fixed information leak in devio (bnc#978401).
- CVE-2016-4486: Fixed information leak in rtnetlink ( bsc#978822).
- CVE-2016-4569: Fixed information leak in events via snd_timer_user_tinterrupt (bsc#979213).

The following non-security bugs were fixed:
- ALSA: timer: Call notifier in the same spinlock (bsc#973378).
- ALSA: timer: Protect the whole snd_timer_close() with open race (bsc#973378).
- ALSA: timer: Sync timer deletion at closing the system timer (bsc#973378).
- ALSA: timer: Use mod_timer() for rearming the system timer (bsc#973378).
- Btrfs: do not collect ordered extents when logging that inode exists (bsc#977685).
- Btrfs: do not return EBUSY on concurrent subvolume mounts (bsc#951844).
- Btrfs: fix deadlock between direct IO reads and buffered writes (bsc#973855).
- Btrfs: fix empty symlink after creating symlink and fsync parent dir (bsc#977685).
- Btrfs: fix file loss on log replay after renaming a file and fsync (bsc#977685).
- Btrfs: fix file/data loss caused by fsync after rename and new inode (bsc#977685).
- Btrfs: fix for incorrect directory entries after fsync log replay (bsc#957805, bsc#977685).
- Btrfs: fix loading of orphan roots leading to BUG_ON (bsc#972844).
- Btrfs: fix race between fsync and lockless direct IO writes (bsc#977685).
- Btrfs: fix unreplayable log after snapshot delete + parent dir fsync (bsc#977685).
- Btrfs: handle non-fatal errors in btrfs_qgroup_inherit() (bsc#972951).
- Btrfs: qgroup: return EINVAL if level of parent is not higher than child's (bsc#972951).
- Btrfs: teach backref walking about backrefs with underflowed offset values (bsc#975371).
- CacheFiles: Fix incorrect test for in-memory object collision (bsc#971049).
- CacheFiles: Handle object being killed before being set up (bsc#971049).
- Driver: Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets (bsc#976739).
- Drivers: hv: util: Pass the channel information during the init call (bnc#978527).
- Drivers: hv: utils: Invoke the poll function after handshake (bnc#978527).
- Drivers: hv: vmbus: Fix signaling logic in hv_need_to_signal_on_read().
- Export helper function to set irq affinity in pci-hyperv.
- FS-Cache: Add missing initialization of ret in cachefiles_write_page() (bsc#971049).
- FS-Cache: Count culled objects and objects rejected due to lack of space (bsc#971049).
- FS-Cache: Fix cancellation of in-progress operation (bsc#971049).
- FS-Cache: Handle a new operation submitted against a killed object (bsc#971049).
- FS-Cache: Move fscache_report_unexpected_submission() to make it more available (bsc#971049).
- FS-Cache: Out of line fscache_operation_init() (bsc#971049).
- FS-Cache: Permit fscache_cancel_op() to cancel in-progress operations too (bsc#971049).
- FS-Cache: Put an aborted initialised op so that it is accounted correctly (bsc#971049).
- FS-Cache: Reduce cookie ref count if submit fails (bsc#971049).
- FS-Cache: Synchronise object death state change vs operation submission (bsc#971049).
- FS-Cache: The operation cancellation method needs calling in more places (bsc#971049).
- FS-Cache: Timeout for releasepage() (bsc#971049).
- FS-Cache: When submitting an op, cancel it if the target object is dying (bsc#971049).
- FS-Cache: fscache_object_is_dead() has wrong logic, kill it (bsc#971049).
- Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)
- Fix kabi issue (bsc#971049).
- Input: i8042 - lower log level for 'no controller' message (bsc#945345).
- NFSv4.1: do not use machine credentials for CLOSE when using 'sec=sys' (bsc#972003).
- NVMe: Unify controller probe and resume (bsc#979347).
- NVMe: init nvme queue before enabling irq (bsc#662458).
- PCI/AER: Fix aer_inject error codes (bsc#931448).
- PCI/AER: Log actual error causes in aer_inject (bsc#931448).
- PCI/AER: Log aer_inject error injections (bsc#931448).
- PCI/AER: Use dev_warn() in aer_inject (bsc#931448).
- RDMA/ocrdma: Avoid reporting wrong completions in case of error CQEs (bsc#908151).
- Revert 'scsi: fix soft lockup in scsi_remove_target() on module removal' (bsc#970609).
- SUNRPC: Fix large reads on NFS/RDMA (bsc#908151).
- SUNRPC: remove KERN_INFO from dprintk() call sites (bsc#908151).
- USB: usbip: fix potential out-of-bounds write (bnc#975945).
- Use mainline variant of hyperv KVP IP failover patch (bnc#978527)
- acpi: Disable ACPI table override when UEFI Secure Boot is enabled (bsc#970604).
- acpi: Disable APEI error injection if securelevel is set (bsc#972891).
- apparmor: Skip proc ns files (bsc#959514).
- cachefiles: perform test on s_blocksize when opening cache file (bsc#971049).
- ceph fscache: Introduce a routine for uncaching single no data page from fscache ().
- ceph fscache: Uncaching no data page from fscache in readpage().
- ceph: Add fs/ceph as a supported module.
- ceph: Asynchronous IO support.
- ceph: Avoid to propagate the invalid page point.
- ceph: Clean up if error occurred in finish_read().
- ceph: EIO all operations after forced umount.
- ceph: Implement writev/pwritev for sync operation.
- ceph: Remove racey watch/notify event infrastructure (bsc#964727)
- ceph: Remove racey watch/notify event infrastructure (bsc#964727)
- ceph: add acl for cephfs.
- ceph: add acl, noacl options for cephfs mount.
- ceph: add get_name() NFS export callback.
- ceph: add get_parent() NFS export callback.
- ceph: add imported caps when handling cap export message.
- ceph: add inline data to pagecache.
- ceph: add missing init_acl() for mkdir() and atomic_open().
- ceph: add open export target session helper.
- ceph: add request to i_unsafe_dirops when getting unsafe reply.
- ceph: additional debugfs output.
- ceph: always re-send cap flushes when MDS recovers.
- ceph: avoid block operation when !TASK_RUNNING (ceph_get_caps).
- ceph: avoid block operation when !TASK_RUNNING (ceph_mdsc_close_sessions).
- ceph: avoid block operation when !TASK_RUNNING (ceph_mdsc_sync).
- ceph: avoid releasing caps that are being used.
- ceph: avoid sending unnessesary FLUSHSNAP message.
- ceph: avoid useless ceph_get_dentry_parent_inode() in ceph_rename().
- ceph: cast PAGE_SIZE to size_t in ceph_sync_write().
- ceph: ceph_frag_contains_value can be boolean.
- ceph: ceph_get_parent() can be static.
- ceph: check OSD caps before read/write.
- ceph: check buffer size in ceph_vxattrcb_layout().
- ceph: check caps in filemap_fault and page_mkwrite.
- ceph: check directory's completeness before emitting directory entry.
- ceph: check inode caps in ceph_d_revalidate.
- ceph: check unsupported fallocate mode.
- ceph: check zero length in ceph_sync_read().
- ceph: checking for IS_ERR instead of NULL.
- ceph: cleanup unsafe requests when reconnecting is denied.
- ceph: cleanup use of ceph_msg_get.
- ceph: clear directory's completeness when creating file.
- ceph: convert inline data to normal data before data write.
- ceph: do not assume r_old_dentry[_dir] always set together.
- ceph: do not chain inode updates to parent fsync.
- ceph: do not grabs open file reference for aborted request.
- ceph: do not include ceph.{file,dir}.layout vxattr in listxattr().
- ceph: do not include used caps in cap_wanted.
- ceph: do not invalidate page cache when inode is no longer used.
- ceph: do not mark dirty caps when there is no auth cap.
- ceph: do not pre-allocate space for cap release messages.
- ceph: do not set r_old_dentry_dir on link().
- ceph: do not trim auth cap when there are cap snaps.
- ceph: do not zero i_wrbuffer_ref when reconnecting is denied.
- ceph: drop cap releases in requests composed before cap reconnect.
- ceph: drop extra open file reference in ceph_atomic_open().
- ceph: drop unconnected inodes.
- ceph: exclude setfilelock requests when calculating oldest tid.
- ceph: export ceph_session_state_name function.
- ceph: fetch inline data when getting Fcr cap refs.
- ceph: fix __dcache_readdir().
- ceph: fix a comment typo.
- ceph: fix append mode write.
- ceph: fix atomic_open snapdir.
- ceph: fix bool assignments.
- ceph: fix cache revoke race.
- ceph: fix ceph_dir_llseek().
- ceph: fix ceph_fh_to_parent().
- ceph: fix ceph_removexattr().
- ceph: fix ceph_set_acl().
- ceph: fix ceph_writepages_start().
- ceph: fix dcache/nocache mount option.
- ceph: fix dentry leaks.
- ceph: fix directory fsync.
- ceph: fix divide-by-zero in __validate_layout().
- ceph: fix double page_unlock() in page_mkwrite().
- ceph: fix dout() compile warnings in ceph_filemap_fault().
- ceph: fix file lock interruption.
- ceph: fix flush tid comparision.
- ceph: fix flushing caps.
- ceph: fix llistxattr on symlink.
- ceph: fix message length computation.
- ceph: fix mksnap crash.
- ceph: fix null pointer dereference in send_mds_reconnect().
- ceph: fix pr_fmt() redefinition.
- ceph: fix queuing inode to mdsdir's snaprealm.
- ceph: fix reading inline data when i_size &gt; PAGE_SIZE.
- ceph: fix request time stamp encoding.
- ceph: fix reset_readdir().
- ceph: fix setting empty extended attribute.
- ceph: fix sizeof(struct tYpO *) typo.
- ceph: fix snap context leak in error path.
- ceph: fix trim caps.
- ceph: fix uninline data function.
- ceph: flush cap release queue when trimming session caps.
- ceph: flush inline version.
- ceph: forbid mandatory file lock.
- ceph: fscache: Update object store limit after file writing.
- ceph: fscache: Wait for completion of object initialization.
- ceph: fscache: add an interface to synchronize object store limit.
- ceph: get inode size for each append write.
- ceph: handle -ESTALE reply.
- ceph: handle SESSION_FORCE_RO message.
- ceph: handle cap export race in try_flush_caps().
- ceph: handle cap import atomically.
- ceph: handle frag mismatch between readdir request and reply.
- ceph: handle race between cap reconnect and cap release.
- ceph: handle session flush message.
- ceph: hold on to exclusive caps on complete directories.
- ceph: implement readv/preadv for sync operation.
- ceph: improve readahead for file holes.
- ceph: improve reference tracking for snaprealm.
- ceph: include time stamp in every MDS request.
- ceph: include time stamp in replayed MDS requests.
- ceph: initial CEPH_FEATURE_FS_FILE_LAYOUT_V2 support.
- ceph: initialize inode before instantiating dentry.
- ceph: introduce a new inode flag indicating if cached dentries are ordered.
- ceph: introduce ceph_fill_fragtree().
- ceph: introduce global empty snap context.
- ceph: invalidate dirty pages after forced umount.
- ceph: keep i_snap_realm while there are writers.
- ceph: kstrdup() memory handling.
- ceph: let MDS adjust readdir 'frag'.
- ceph: make ceph_forget_all_cached_acls() static inline.
- ceph: make fsync() wait unsafe requests that created/modified inode.
- ceph: make sure syncfs flushes all cap snaps.
- ceph: make sure write caps are registered with auth MDS.
- ceph: match wait_for_completion_timeout return type.
- ceph: message versioning fixes.
- ceph: move ceph_find_inode() outside the s_mutex.
- ceph: move spinlocking into ceph_encode_locks_to_buffer and ceph_count_locks.
- ceph: no need to get parent inode in ceph_open.
- ceph: parse inline data in MClientReply and MClientCaps.
- ceph: pre-allocate ceph_cap struct for ceph_add_cap().
- ceph: pre-allocate data structure that tracks caps flushing.
- ceph: preallocate buffer for readdir reply.
- ceph: print inode number for LOOKUPINO request.
- ceph: properly apply umask when ACL is enabled.
- ceph: properly handle XATTR_CREATE and XATTR_REPLACE.
- ceph: properly mark empty directory as complete.
- ceph: properly release page upon error.
- ceph: properly zero data pages for file holes.
- ceph: provide seperate {inode,file}_operations for snapdir.
- ceph: queue cap release in __ceph_remove_cap().
- ceph: queue vmtruncate if necessary when handing cap grant/revoke.
- ceph: ratelimit warn messages for MDS closes session.
- ceph: re-send AIO write request when getting -EOLDSNAP error.
- ceph: re-send flushing caps (which are revoked) in reconnect stage.
- ceph: re-send requests when MDS enters reconnecting stage.
- ceph: refactor readpage_nounlock() to make the logic clearer.
- ceph: remember subtree root dirfrag's auth MDS.
- ceph: remove exported caps when handling cap import message.
- ceph: remove outdated frag information.
- ceph: remove redundant code for max file size verification.
- ceph: remove redundant declaration.
- ceph: remove redundant memset(0).
- ceph: remove redundant test of head-&gt;safe and silence static analysis warnings.
- ceph: remove the useless judgement.
- ceph: remove unused functions in ceph_frag.h.
- ceph: remove unused stringification macros.
- ceph: remove useless ACL check.
- ceph: remove xattr when null value is given to setxattr().
- ceph: rename snapshot support.
- ceph: replace comma with a semicolon.
- ceph: request xattrs if xattr_version is zero.
- ceph: reserve caps for file layout/lock MDS requests.
- ceph: reset r_resend_mds after receiving -ESTALE.
- ceph: return error for traceless reply race.
- ceph: rework dcache readdir.
- ceph: send TID of the oldest pending caps flush to MDS.
- ceph: send client metadata to MDS.
- ceph: set caps count after composing cap reconnect message.
- ceph: set i_head_snapc when getting CEPH_CAP_FILE_WR reference.
- ceph: set mds_wanted when MDS reply changes a cap to auth cap.
- ceph: show nocephx_require_signatures and notcp_nodelay options.
- ceph: show non-default options only.
- ceph: simplify ceph_fh_to_dentry().
- ceph: simplify two mount_timeout sites.
- ceph: skip invalid dentry during dcache readdir.
- ceph: support inline data feature.
- ceph: switch some GFP_NOFS memory allocation to GFP_KERNEL.
- ceph: sync read inline data.
- ceph: take snap_rwsem when accessing snap realm's cached_context.
- ceph: track pending caps flushing accurately.
- ceph: track pending caps flushing globally.
- ceph: trim unused inodes before reconnecting to recovering MDS.
- ceph: trivial comment fix.
- ceph: update i_max_size even if inode version does not change.
- ceph: update inode fields according to issued caps.
- ceph: use %zu for len in ceph_fill_inline_data().
- ceph: use ceph_seq_cmp() to compare migrate_seq.
- ceph: use empty snap context for uninline_data and get_pool_perm.
- ceph: use fl-&gt;fl_file as owner identifier of flock and posix lock.
- ceph: use fl-&gt;fl_type to decide flock operation.
- ceph: use fpos_cmp() to compare dentry positions.
- ceph: use getattr request to fetch inline data.
- ceph: use i_size_{read,write} to get/set i_size.
- ceph: use msecs_to_jiffies for time conversion.
- ceph: use pagelist to present MDS request data.
- ceph: use truncate_pagecache() instead of truncate_inode_pages().
- ceph_sync_{,direct_}write: fix an oops on ceph_osdc_new_request() failure.
- client: include kernel version in client metadata.
- cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857, bsc#974646).
- crush: add chooseleaf_stable tunable.
- crush: decode and initialize chooseleaf_stable.
- crush: ensure bucket id is valid before indexing buckets array.
- crush: ensure take bucket value is valid.
- crush: fix crash from invalid 'take' argument.
- crush: sync up with userspace.
- crypto: testmgr - allow rfc3686 aes-ctr variants in fips mode (bsc#958390).
- crypto: testmgr - mark authenticated ctr(aes) also as FIPS able (bsc#958390).
- dasd: fix hanging system after LCU changes (bnc#968497, LTC#136671).
- drm/core: Preserve the framebuffer after removing it (bsc#968812).
- drm/i915: do not warn if backlight unexpectedly enabled (boo#972068).
- drm/i915: set backlight duty cycle after backlight enable for gen4 (boo#972780).
- drm/radeon: fix-up some float to fixed conversion thinkos (bsc#968813).
- drm/radeon: use HDP_MEM_COHERENCY_FLUSH_CNTL for sdma as well (bsc#968813).
- ext4: Fix softlockups in SEEK_HOLE and SEEK_DATA implementations (bsc#942262).
- ext4: fix races between page faults and hole punching (bsc#972174).
- ext4: fix races of writeback with punch hole and zero range (bsc#972174).
- fs, seq_file: fallback to vmalloc instead of oom kill processes (bnc#968687).
- fs, seqfile: always allow oom killer (bnc#968687).
- fs/ceph/debugfs.c: replace seq_printf by seq_puts.
- fs/ceph: replace pr_warning by pr_warn.
- fs/pipe.c: skip file_update_time on frozen fs (bsc#975488).
- ibmvscsi: Remove unsupported host config MAD (bsc#973556).
- iommu/vt-d: Improve fault handler error messages (bsc#975772).
- iommu/vt-d: Ratelimit fault handler (bsc#975772).
- ipv6: make fib6 serial number per namespace (bsc#965319).
- ipv6: per netns FIB garbage collection (bsc#965319).
- ipv6: per netns fib6 walkers (bsc#965319).
- ipv6: replace global gc_args with local variable (bsc#965319).
- kABI: kgr: fix subtle race with kgr_module_init(), going notifier and kgr_modify_kernel().
- kABI: protect function file_open_root.
- kABI: protect include in evm.
- kABI: protect struct user_struct.
- kabi fix for patches.fixes/reduce-m_start-cost (bsc#966573).
- kabi/severities: Allow changes in zpci_* symbols (bsc#974692)
- kabi/severities: Whitelist libceph and rbd (bsc#964727).
- kabi: kgr, add reserved fields.
- kabi: protect struct fc_rport_priv (bsc#953233, bsc#962846).
- kabi: protect struct netns_ipv6 after FIB6 GC series (bsc#965319).
- kgr: add TAINT_KGRAFT.
- kgr: add kgraft annotation to hwrng kthread.
- kgr: add kgraft annotations to kthreads' wait_event_freezable() API calls.
- kgr: add objname to kgr_patch_fun struct.
- kgr: add sympos and objname to error and debug messages.
- kgr: add sympos as disambiguator field to kgr_patch_fun structure.
- kgr: add sympos to sysfs.
- kgr: call kgr_init_ftrace_ops() only for loaded objects.
- kgr: change to kallsyms_on_each_symbol iterator.
- kgr: define pr_fmt and modify all pr_* messages.
- kgr: do not print error for !abort_if_missing symbols (bnc#943989).
- kgr: do not return and print an error only if the object is not loaded.
- kgr: do not use WQ_MEM_RECLAIM workqueue (bnc#963572).
- kgr: fix an asymmetric dealing with delayed module loading.
- kgr: fix redirection on s390x arch (bsc#903279).
- kgr: fix subtle race with kgr_module_init(), going notifier and kgr_modify_kernel().
- kgr: handle btrfs kthreads (bnc#889207).
- kgr: kmemleak, really mark the kthread safe after an interrupt.
- kgr: kmemleak, really mark the kthread safe after an interrupt.
- kgr: log when modifying kernel.
- kgr: mark kernel unsupported upon patch revert.
- kgr: mark some more missed kthreads (bnc#962336).
- kgr: remove abort_if_missing flag.
- kgr: usb/storage: do not emit thread awakened (bnc#899908).
- kgraft/gfs2: Do not block livepatching in the log daemon for too long.
- kgraft/xen: Do not block livepatching in the XEN blkif kthread.
- libceph: Avoid holding the zero page on ceph_msgr_slab_init errors.
- libceph: Fix ceph_tcp_sendpage()'s more boolean usage.
- libceph: MOSDOpReply v7 encoding.
- libceph: Remove spurious kunmap() of the zero page.
- libceph: a couple tweaks for wait loops.
- libceph: add nocephx_sign_messages option.
- libceph: advertise support for TUNABLES5.
- libceph: advertise support for keepalive2.
- libceph: allow setting osd_req_op's flags.
- libceph: check data_len in -&gt;alloc_msg().
- libceph: clear messenger auth_retry flag if we fault.
- libceph: clear msg-&gt;con in ceph_msg_release() only.
- libceph: do not access invalid memory in keepalive2 path.
- libceph: do not spam dmesg with stray reply warnings.
- libceph: drop authorizer check from cephx msg signing routines.
- libceph: evaluate osd_req_op_data() arguments only once.
- libceph: fix authorizer invalidation, take 2.
- libceph: fix ceph_msg_revoke().
- libceph: fix wrong name 'Ceph filesystem for Linux'.
- libceph: introduce ceph_x_authorizer_cleanup().
- libceph: invalidate AUTH in addition to a service ticket.
- libceph: kill off ceph_x_ticket_handler::validity.
- libceph: move ceph_file_layout helpers to ceph_fs.h.
- libceph: msg signing callouts do not need con argument.
- libceph: nuke time_sub().
- libceph: properly release STAT request's raw_data_in.
- libceph: remove con argument in handle_reply().
- libceph: remove outdated comment.
- libceph: remove the unused macro AES_KEY_SIZE.
- libceph: rename con_work() to ceph_con_workfn().
- libceph: set 'exists' flag for newly up osd.
- libceph: stop duplicating client fields in messenger.
- libceph: store timeouts in jiffies, verify user input.
- libceph: treat sockaddr_storage with uninitialized family as blank.
- libceph: use keepalive2 to verify the mon session is alive.
- libceph: use list_for_each_entry_safe.
- libceph: use list_next_entry instead of list_entry_next.
- libceph: use local variable cursor instead of &amp;msg-&gt;cursor.
- libceph: use the right footer size when skipping a message.
- libfc: replace 'rp_mutex' with 'rp_lock' (bsc#953233, bsc#962846).
- mds: check cap ID when handling cap export message.
- mmc: Allow forward compatibility for eMMC (bnc#966054).
- mmc: sdhci: Allow for irq being shared (bnc#977582).
- mpt3sas: Fix use sas_is_tlr_enabled API before enabling MPI2_SCSIIO_CONTROL_TLR_ON flag (bsc#967640).
- nfs-rdma: Fix for FMR leaks (bsc#908151).
- nfs: fix high load average due to callback thread sleeping (bsc#971170).
- nvme: fix max_segments integer truncation (bsc#676471).
- ocfs2: do not set fs read-only if rec[0] is empty while committing truncate (bnc#971947).
- ocfs2: extend enough credits for freeing one truncate record while replaying truncate records (bnc#971947).
- ocfs2: extend transaction for ocfs2_remove_rightmost_path() and ocfs2_update_edge_lengths() before to avoid inconsistency between inode and et (bnc#971947).
- pipe: limit the per-user amount of pages allocated in pipes (bsc#970948).
- powerpc/book3s64: Fix branching to OOL handlers in relocatable kernel (bsc@976821).
- powerpc/book3s64: Remove __end_handlers marker (bsc#976821).
- rbd: bump queue_max_segments.
- rbd: delete an unnecessary check before rbd_dev_destroy().
- rbd: do not free rbd_dev outside of the release callback.
- rbd: do not put snap_context twice in rbd_queue_workfn().
- rbd: drop null test before destroy functions.
- rbd: plug rbd_dev-&gt;header.object_prefix memory leak.
- rbd: rbd_wq comment is obsolete.
- rbd: remove duplicate calls to rbd_dev_mapping_clear().
- rbd: return -ENOMEM instead of pool id if rbd_dev_create() fails.
- rbd: set device_type::release instead of device::release.
- rbd: set max_sectors explicitly.
- rbd: store rbd_options in rbd_device.
- rbd: terminate rbd_opts_tokens with Opt_err.
- rbd: timeout watch teardown on unmap with mount_timeout.
- rbd: use GFP_NOIO consistently for request allocations (bsc#971159).
- rbd: use writefull op for object size writes.
- reduce m_start() cost.. (bsc#966573).
- s390/compat: correct restore of high gprs on signal return (bnc#968497, LTC#137571).
- s390/pageattr: do a single TLB flush for change_page_attr (bsc#940413).
- s390/pci: add extra padding to function measurement block (bnc#974692, LTC#139445).
- s390/pci: enforce fmb page boundary rule (bnc#974692, LTC#139445).
- s390/pci: extract software counters from fmb (bnc#974692, LTC#139445).
- s390/pci: remove pdev pointer from arch data (bnc#974692, LTC#139444).
- s390/pci_dma: fix DMA table corruption with &gt; 4 TB main memory (bnc#974692, LTC#139401).
- s390/pci_dma: handle dma table failures (bnc#974692, LTC#139442).
- s390/pci_dma: improve debugging of errors during dma map (bnc#974692, LTC#139442).
- s390/pci_dma: unify label of invalid translation table entries (bnc#974692, LTC#139442).
- s390/zcrypt: HWRNG registration cause kernel panic on CEX hotplug (bnc#968497, LTC#138409).
- scsi-bnx2fc-handle_scsi_retry_delay
- scsi-bnx2fc-soft_lockup_when_rmmod
- scsi: Add intermediate STARGET_REMOVE state to scsi_target_state (bsc#970609).
- scsi: Avoid crashing if device uses DIX but adapter does not support it (bsc#969016).
- sd: get disk reference in sd_check_events() (bnc#897662).
- supported.conf: Add bridge.ko for OpenStack (bsc#971600)
- supported.conf: add pci-hyperv
- supported.conf:Add drivers/infiniband/hw/ocrdma/ocrdma.ko to supported.conf (bsc#964461)
- svcrdma: Fence LOCAL_INV work requests (bsc#908151).
- svcrdma: advertise the correct max payload (bsc#908151).
- svcrdma: fix offset calculation for non-page aligned sge entries (bsc#908151).
- svcrdma: fix printk when memory allocation fails (bsc#908151).
- svcrdma: refactor marshalling logic (bsc#908151).
- svcrdma: send_write() must not overflow the device's max sge (bsc#908151).
- target: Drop incorrect ABORT_TASK put for completed commands (bsc#962872).
- target: Fix LUN_RESET active I/O handling for ACK_KREF (bsc#962872).
- target: Fix LUN_RESET active TMR descriptor handling (bsc#962872).
- target: Fix TAS handling for multi-session se_node_acls (bsc#962872).
- target: Fix race with SCF_SEND_DELAYED_TAS handling (bsc#962872).
- target: Fix remote-port TMR ABORT + se_cmd fabric stop (bsc#962872).
- tcp: convert cached rtt from usec to jiffies when feeding initial rto (bsc#937086).
- vgaarb: Add more context to error messages (bsc#976868).
- xen/acpi: Disable ACPI table override when UEFI Secure Boot is enabled (bsc#970604).
- xprtrdma: Allocate missing pagelist (bsc#908151).
- xprtrdma: Avoid deadlock when credit window is reset (bsc#908151).
- xprtrdma: Disconnect on registration failure (bsc#908151).
- xprtrdma: Ensure ia-&gt;ri_id-&gt;qp is not NULL when reconnecting (bsc#908151).
- xprtrdma: Fall back to MTHCAFMR when FRMR is not supported (bsc#908151).
- xprtrdma: Limit work done by completion handler (bsc#908151).
- xprtrdma: Make rpcrdma_ep_destroy() return void (bsc#908151).
- xprtrdma: RPC/RDMA must invoke xprt_wake_pending_tasks() in process context (bsc#908151).
- xprtrdma: Reduce the number of hardway buffer allocations (bsc#908151).
- xprtrdma: Remove BOUNCEBUFFERS memory registration mode (bsc#908151).
- xprtrdma: Remove BUG_ON() call sites (bsc#908151).
- xprtrdma: Remove MEMWINDOWS registration modes (bsc#908151).
- xprtrdma: Remove REGISTER memory registration mode (bsc#908151).
- xprtrdma: Remove Tavor MTU setting (bsc#908151).
- xprtrdma: Reset connection timeout after successful reconnect (bsc#908151).
- xprtrdma: Simplify rpcrdma_deregister_external() synopsis (bsc#908151).
- xprtrdma: Split the completion queue (bsc#908151).
- xprtrdma: Use macros for reconnection timeout constants (bsc#908151).
- xprtrdma: mind the device's max fast register page list depth (bsc#908151).
- xprtrdma: mount reports 'Invalid mount option' if memreg mode not supported (bsc#908151).
- xprtrmda: Reduce calls to ib_poll_cq() in completion handlers (bsc#908151).
- xprtrmda: Reduce lock contention in completion handlers (bsc#908151).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-28"/>
	<updated date="2016-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/662458">SUSE bug 662458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/676471">SUSE bug 676471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889207">SUSE bug 889207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897662">SUSE bug 897662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899908">SUSE bug 899908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903279">SUSE bug 903279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908151">SUSE bug 908151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928547">SUSE bug 928547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931448">SUSE bug 931448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937086">SUSE bug 937086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940413">SUSE bug 940413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942262">SUSE bug 942262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943989">SUSE bug 943989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944309">SUSE bug 944309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945345">SUSE bug 945345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951844">SUSE bug 951844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953233">SUSE bug 953233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957805">SUSE bug 957805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958390">SUSE bug 958390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959514">SUSE bug 959514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960857">SUSE bug 960857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962336">SUSE bug 962336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962846">SUSE bug 962846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962872">SUSE bug 962872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963572">SUSE bug 963572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964461">SUSE bug 964461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964727">SUSE bug 964727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965319">SUSE bug 965319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966054">SUSE bug 966054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966573">SUSE bug 966573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967640">SUSE bug 967640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968497">SUSE bug 968497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968687">SUSE bug 968687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968812">SUSE bug 968812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968813">SUSE bug 968813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969016">SUSE bug 969016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970604">SUSE bug 970604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970609">SUSE bug 970609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970892">SUSE bug 970892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970911">SUSE bug 970911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970948">SUSE bug 970948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970955">SUSE bug 970955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970956">SUSE bug 970956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970958">SUSE bug 970958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970970">SUSE bug 970970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971049">SUSE bug 971049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971124">SUSE bug 971124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971126">SUSE bug 971126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971159">SUSE bug 971159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971170">SUSE bug 971170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971600">SUSE bug 971600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971628">SUSE bug 971628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971793">SUSE bug 971793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971947">SUSE bug 971947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972003">SUSE bug 972003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972068">SUSE bug 972068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972174">SUSE bug 972174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972780">SUSE bug 972780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972844">SUSE bug 972844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972891">SUSE bug 972891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972951">SUSE bug 972951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973378">SUSE bug 973378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973556">SUSE bug 973556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973855">SUSE bug 973855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974418">SUSE bug 974418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974646">SUSE bug 974646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974692">SUSE bug 974692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975371">SUSE bug 975371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975488">SUSE bug 975488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975772">SUSE bug 975772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975945">SUSE bug 975945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976739">SUSE bug 976739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976821">SUSE bug 976821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976868">SUSE bug 976868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977582">SUSE bug 977582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977685">SUSE bug 977685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978401">SUSE bug 978401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978527">SUSE bug 978527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978822">SUSE bug 978822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979213">SUSE bug 979213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979347">SUSE bug 979347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983143">SUSE bug 983143</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9717/">CVE-2014-9717</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1583/">CVE-2016-1583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2185/">CVE-2016-2185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2186/">CVE-2016-2186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2188/">CVE-2016-2188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2847/">CVE-2016-2847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3134/">CVE-2016-3134</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3136/">CVE-2016-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3137/">CVE-2016-3137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3138/">CVE-2016-3138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3140/">CVE-2016-3140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3689/">CVE-2016-3689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3951/">CVE-2016-3951</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4482/">CVE-2016-4482</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4486/">CVE-2016-4486</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4569/">CVE-2016-4569</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516216" comment="kernel-default-3.12.59-60.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516217" comment="kernel-default-devel-3.12.59-60.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516218" comment="kernel-default-extra-3.12.59-60.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516219" comment="kernel-devel-3.12.59-60.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516220" comment="kernel-macros-3.12.59-60.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516221" comment="kernel-source-3.12.59-60.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516222" comment="kernel-syms-3.12.59-60.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516223" comment="kernel-xen-3.12.59-60.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516224" comment="kernel-xen-devel-3.12.59-60.41.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77518" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="886378" ref_url="https://bugzilla.suse.com/886378" source="BUGZILLA"/>
		<reference ref_id="940929" ref_url="https://bugzilla.suse.com/940929" source="BUGZILLA"/>
		<reference ref_id="958491" ref_url="https://bugzilla.suse.com/958491" source="BUGZILLA"/>
		<reference ref_id="958917" ref_url="https://bugzilla.suse.com/958917" source="BUGZILLA"/>
		<reference ref_id="959005" ref_url="https://bugzilla.suse.com/959005" source="BUGZILLA"/>
		<reference ref_id="959386" ref_url="https://bugzilla.suse.com/959386" source="BUGZILLA"/>
		<reference ref_id="960334" ref_url="https://bugzilla.suse.com/960334" source="BUGZILLA"/>
		<reference ref_id="960708" ref_url="https://bugzilla.suse.com/960708" source="BUGZILLA"/>
		<reference ref_id="960725" ref_url="https://bugzilla.suse.com/960725" source="BUGZILLA"/>
		<reference ref_id="960835" ref_url="https://bugzilla.suse.com/960835" source="BUGZILLA"/>
		<reference ref_id="961332" ref_url="https://bugzilla.suse.com/961332" source="BUGZILLA"/>
		<reference ref_id="961333" ref_url="https://bugzilla.suse.com/961333" source="BUGZILLA"/>
		<reference ref_id="961358" ref_url="https://bugzilla.suse.com/961358" source="BUGZILLA"/>
		<reference ref_id="961556" ref_url="https://bugzilla.suse.com/961556" source="BUGZILLA"/>
		<reference ref_id="961691" ref_url="https://bugzilla.suse.com/961691" source="BUGZILLA"/>
		<reference ref_id="962320" ref_url="https://bugzilla.suse.com/962320" source="BUGZILLA"/>
		<reference ref_id="963782" ref_url="https://bugzilla.suse.com/963782" source="BUGZILLA"/>
		<reference ref_id="964411" ref_url="https://bugzilla.suse.com/964411" source="BUGZILLA"/>
		<reference ref_id="964413" ref_url="https://bugzilla.suse.com/964413" source="BUGZILLA"/>
		<reference ref_id="967969" ref_url="https://bugzilla.suse.com/967969" source="BUGZILLA"/>
		<reference ref_id="969121" ref_url="https://bugzilla.suse.com/969121" source="BUGZILLA"/>
		<reference ref_id="969122" ref_url="https://bugzilla.suse.com/969122" source="BUGZILLA"/>
		<reference ref_id="969350" ref_url="https://bugzilla.suse.com/969350" source="BUGZILLA"/>
		<reference ref_id="970036" ref_url="https://bugzilla.suse.com/970036" source="BUGZILLA"/>
		<reference ref_id="970037" ref_url="https://bugzilla.suse.com/970037" source="BUGZILLA"/>
		<reference ref_id="975128" ref_url="https://bugzilla.suse.com/975128" source="BUGZILLA"/>
		<reference ref_id="975136" ref_url="https://bugzilla.suse.com/975136" source="BUGZILLA"/>
		<reference ref_id="975700" ref_url="https://bugzilla.suse.com/975700" source="BUGZILLA"/>
		<reference ref_id="976109" ref_url="https://bugzilla.suse.com/976109" source="BUGZILLA"/>
		<reference ref_id="978158" ref_url="https://bugzilla.suse.com/978158" source="BUGZILLA"/>
		<reference ref_id="978160" ref_url="https://bugzilla.suse.com/978160" source="BUGZILLA"/>
		<reference ref_id="980711" ref_url="https://bugzilla.suse.com/980711" source="BUGZILLA"/>
		<reference ref_id="980723" ref_url="https://bugzilla.suse.com/980723" source="BUGZILLA"/>
		<reference ref_id="981266" ref_url="https://bugzilla.suse.com/981266" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5745" ref_url="https://www.suse.com/security/cve/CVE-2015-5745/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567/" source="CVE"/>
		<reference ref_id="CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2015-8817" ref_url="https://www.suse.com/security/cve/CVE-2015-8817/" source="CVE"/>
		<reference ref_id="CVE-2015-8818" ref_url="https://www.suse.com/security/cve/CVE-2015-8818/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2197" ref_url="https://www.suse.com/security/cve/CVE-2016-2197/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-2538" ref_url="https://www.suse.com/security/cve/CVE-2016-2538/" source="CVE"/>
		<reference ref_id="CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841/" source="CVE"/>
		<reference ref_id="CVE-2016-2857" ref_url="https://www.suse.com/security/cve/CVE-2016-2857/" source="CVE"/>
		<reference ref_id="CVE-2016-2858" ref_url="https://www.suse.com/security/cve/CVE-2016-2858/" source="CVE"/>
		<reference ref_id="CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710/" source="CVE"/>
		<reference ref_id="CVE-2016-3712" ref_url="https://www.suse.com/security/cve/CVE-2016-3712/" source="CVE"/>
		<reference ref_id="CVE-2016-4001" ref_url="https://www.suse.com/security/cve/CVE-2016-4001/" source="CVE"/>
		<reference ref_id="CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002/" source="CVE"/>
		<reference ref_id="CVE-2016-4020" ref_url="https://www.suse.com/security/cve/CVE-2016-4020/" source="CVE"/>
		<reference ref_id="CVE-2016-4037" ref_url="https://www.suse.com/security/cve/CVE-2016-4037/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-4952" ref_url="https://www.suse.com/security/cve/CVE-2016-4952/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<description>
qemu was updated to fix 29 security issues.

These security issues were fixed:
- CVE-2016-4439: Avoid OOB access in 53C9X emulation (bsc#980711)
- CVE-2016-4441: Avoid OOB access in 53C9X emulation (bsc#980723)
- CVE-2016-4952: Avoid OOB access in Vmware PV SCSI emulation (bsc#981266)
- CVE-2015-8817: Avoid OOB access in PCI dma I/O (bsc#969121)
- CVE-2015-8818: Avoid OOB access in PCI dma I/O (bsc#969122)
- CVE-2016-3710: Fixed VGA emulation based OOB access with potential for guest escape (bsc#978158)
- CVE-2016-3712: Fixed VGa emulation based DOS and OOB read access exploit (bsc#978160)
- CVE-2016-4037: Fixed USB ehci based DOS (bsc#976109)
- CVE-2016-2538: Fixed potential OOB access in USB net device emulation (bsc#967969)
- CVE-2016-2841: Fixed OOB access / hang in ne2000 emulation (bsc#969350)
- CVE-2016-2858: Avoid potential DOS when using QEMU pseudo random number generator (bsc#970036)
- CVE-2016-2857: Fixed OOB access when processing IP checksums (bsc#970037)
- CVE-2016-4001: Fixed OOB access in Stellaris enet emulated nic (bsc#975128)
- CVE-2016-4002: Fixed OOB access in MIPSnet emulated controller (bsc#975136)
- CVE-2016-4020: Fixed possible host data leakage to guest from TPR access (bsc#975700)
- CVE-2016-2197: Prevent AHCI NULL pointer dereference when using FIS CLB engine (bsc#964411)
- CVE-2015-5745: Buffer overflow in virtio-serial (bsc#940929).
- CVE-2015-7549: PCI null pointer dereferences (bsc#958917).
- CVE-2015-8504: VNC floating point exception (bsc#958491).
- CVE-2015-8558: Infinite loop in ehci_advance_state resulting in DoS (bsc#959005).
- CVE-2015-8567: A guest repeatedly activating a vmxnet3 device can leak host memory (bsc#959386).
- CVE-2015-8568: A guest repeatedly activating a vmxnet3 device can leak host memory (bsc#959386).
- CVE-2015-8613: Wrong sized memset in megasas command handler (bsc#961358).
- CVE-2015-8619: Potential DoS for long HMP sendkey command argument (bsc#960334).
- CVE-2015-8743: OOB memory access in ne2000 ioport r/w functions (bsc#960725).
- CVE-2015-8744: Incorrect l2 header validation could have lead to a crash via assert(2) call (bsc#960835).
- CVE-2015-8745: Reading IMR registers could have lead to a crash via assert(2) call (bsc#960708).
- CVE-2016-1568: AHCI use-after-free in aio port commands (bsc#961332).
- CVE-2016-1714: Potential OOB memory access in processing firmware configuration (bsc#961691).
- CVE-2016-1922: NULL pointer dereference when processing hmp i/o command (bsc#962320).
- CVE-2016-1981: Potential DoS (infinite loop) in e1000 device emulation by malicious privileged user within guest (bsc#963782).
- CVE-2016-2198: Malicious privileged guest user were able to cause DoS by writing to read-only EHCI capabilities registers (bsc#964413).

This non-security issue was fixed
- bsc#886378: qemu truncates vhd images in virt-rescue
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-29"/>
	<updated date="2016-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/886378">SUSE bug 886378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940929">SUSE bug 940929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958491">SUSE bug 958491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958917">SUSE bug 958917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959005">SUSE bug 959005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959386">SUSE bug 959386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960334">SUSE bug 960334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960708">SUSE bug 960708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960725">SUSE bug 960725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960835">SUSE bug 960835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961332">SUSE bug 961332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961333">SUSE bug 961333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961358">SUSE bug 961358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961556">SUSE bug 961556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961691">SUSE bug 961691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962320">SUSE bug 962320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963782">SUSE bug 963782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964411">SUSE bug 964411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964413">SUSE bug 964413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967969">SUSE bug 967969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969121">SUSE bug 969121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969122">SUSE bug 969122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969350">SUSE bug 969350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970036">SUSE bug 970036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970037">SUSE bug 970037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975128">SUSE bug 975128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975136">SUSE bug 975136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975700">SUSE bug 975700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976109">SUSE bug 976109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978158">SUSE bug 978158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978160">SUSE bug 978160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980711">SUSE bug 980711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980723">SUSE bug 980723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981266">SUSE bug 981266</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5745/">CVE-2015-5745</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8817/">CVE-2015-8817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8818/">CVE-2015-8818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2197/">CVE-2016-2197</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2538/">CVE-2016-2538</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2857/">CVE-2016-2857</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2858/">CVE-2016-2858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3712/">CVE-2016-3712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4001/">CVE-2016-4001</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4020/">CVE-2016-4020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4037/">CVE-2016-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4952/">CVE-2016-4952</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516225" comment="qemu-2.3.1-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516226" comment="qemu-block-curl-2.3.1-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516227" comment="qemu-ipxe-1.0.0-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516228" comment="qemu-kvm-2.3.1-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516229" comment="qemu-seabios-1.8.1-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516230" comment="qemu-sgabios-8-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516231" comment="qemu-tools-2.3.1-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516232" comment="qemu-vgabios-1.8.1-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516233" comment="qemu-x86-2.3.1-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77519" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="971770" ref_url="https://bugzilla.suse.com/971770" source="BUGZILLA"/>
		<reference ref_id="972124" ref_url="https://bugzilla.suse.com/972124" source="BUGZILLA"/>
		<reference ref_id="981143" ref_url="https://bugzilla.suse.com/981143" source="BUGZILLA"/>
		<reference ref_id="983394" ref_url="https://bugzilla.suse.com/983394" source="BUGZILLA"/>
		<reference ref_id="986362" ref_url="https://bugzilla.suse.com/986362" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4997" ref_url="https://www.suse.com/security/cve/CVE-2016-4997/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1709-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00060.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 kernel was updated to receive critical security and bugfixes.

Security issue fixed:
- CVE-2016-4997: A buffer overflow in 32bit compat_setsockopt iptables handling could lead to a local privilege escalation. (bsc#986362)

The following non-security bugs were fixed:
- KVM: x86: expose invariant tsc cpuid bit (v2) (bsc#971770).
- block: do not check request size in blk_cloned_rq_check_limits() (bsc#972124).
- rbd: handle OBJ_REQUEST_SG types for copyup (bsc#983394).
- target/rbd: do not put snap_context twice (bsc#981143).
- target/rbd: remove caw_mutex usage (bsc#981143).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-30"/>
	<updated date="2016-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/971770">SUSE bug 971770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972124">SUSE bug 972124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981143">SUSE bug 981143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983394">SUSE bug 983394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986362">SUSE bug 986362</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4997/">CVE-2016-4997</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516234" comment="kernel-default-3.12.59-60.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516235" comment="kernel-default-devel-3.12.59-60.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516236" comment="kernel-default-extra-3.12.59-60.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516237" comment="kernel-devel-3.12.59-60.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516238" comment="kernel-macros-3.12.59-60.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516239" comment="kernel-source-3.12.59-60.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516240" comment="kernel-syms-3.12.59-60.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516241" comment="kernel-xen-3.12.59-60.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516242" comment="kernel-xen-devel-3.12.59-60.45.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77520" version="1" class="patch">
	<metadata>
		<title>Security update for LibreOffice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="718113" ref_url="https://bugzilla.suse.com/718113" source="BUGZILLA"/>
		<reference ref_id="856729" ref_url="https://bugzilla.suse.com/856729" source="BUGZILLA"/>
		<reference ref_id="939998" ref_url="https://bugzilla.suse.com/939998" source="BUGZILLA"/>
		<reference ref_id="945443" ref_url="https://bugzilla.suse.com/945443" source="BUGZILLA"/>
		<reference ref_id="945445" ref_url="https://bugzilla.suse.com/945445" source="BUGZILLA"/>
		<reference ref_id="955832" ref_url="https://bugzilla.suse.com/955832" source="BUGZILLA"/>
		<reference ref_id="965294" ref_url="https://bugzilla.suse.com/965294" source="BUGZILLA"/>
		<reference ref_id="965296" ref_url="https://bugzilla.suse.com/965296" source="BUGZILLA"/>
		<reference ref_id="967014" ref_url="https://bugzilla.suse.com/967014" source="BUGZILLA"/>
		<reference ref_id="967015" ref_url="https://bugzilla.suse.com/967015" source="BUGZILLA"/>
		<reference ref_id="977784" ref_url="https://bugzilla.suse.com/977784" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0794" ref_url="https://www.suse.com/security/cve/CVE-2016-0794/" source="CVE"/>
		<reference ref_id="CVE-2016-0795" ref_url="https://www.suse.com/security/cve/CVE-2016-0795/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002146.html" source="SUSE-SU"/>
		<description>

LibreOffice was updated to version 5.1.3.2, bringing many new features and bug fixes.

Two security issues have been fixed:

- CVE-2016-0795: LibreOffice allowed remote attackers to cause a denial of service
  (memory corruption) or possibly have unspecified other impact via a crafted
  LwpTocSuperLayout record in a LotusWordPro (lwp) document.
- CVE-2016-0794: The lwp filter in LibreOffice allowed remote attackers to cause a
  denial of service (memory corruption) or possibly have unspecified other impact
  via a crafted LotusWordPro (lwp) document.

A comprehensive list of new features and improvements in this release is provided by
the Document Foundation at https://wiki.documentfoundation.org/ReleaseNotes/5.1 .
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-01"/>
	<updated date="2016-07-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/718113">SUSE bug 718113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856729">SUSE bug 856729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939998">SUSE bug 939998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945443">SUSE bug 945443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945445">SUSE bug 945445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955832">SUSE bug 955832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965294">SUSE bug 965294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965296">SUSE bug 965296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967014">SUSE bug 967014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967015">SUSE bug 967015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977784">SUSE bug 977784</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0794/">CVE-2016-0794</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0795/">CVE-2016-0795</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515487" comment="boost-license1_54_0-1.54.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515488" comment="hunspell-1.3.2-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515489" comment="hunspell-32bit-1.3.2-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515490" comment="hunspell-tools-1.3.2-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515491" comment="libOpenCOLLADA0-1_3335ac1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515492" comment="libboost_atomic1_54_0-1.54.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515493" comment="libboost_date_time1_54_0-1.54.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515494" comment="libboost_filesystem1_54_0-1.54.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515495" comment="libboost_iostreams1_54_0-1.54.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515496" comment="libboost_program_options1_54_0-1.54.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515497" comment="libboost_regex1_54_0-1.54.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515498" comment="libboost_signals1_54_0-1.54.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515499" comment="libboost_system1_54_0-1.54.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515500" comment="libboost_thread1_54_0-1.54.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515501" comment="libcmis-0_5-5-0.5.1-8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515502" comment="libetonyek-0_1-1-0.1.6-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515503" comment="libhyphen0-2.8.8-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515504" comment="libixion-0_11-0-0.11.0-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515505" comment="liborcus-0_11-0-0.11.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515506" comment="libreoffice-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515507" comment="libreoffice-base-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515508" comment="libreoffice-base-drivers-mysql-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515509" comment="libreoffice-base-drivers-postgresql-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515510" comment="libreoffice-calc-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515511" comment="libreoffice-calc-extensions-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515512" comment="libreoffice-draw-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515513" comment="libreoffice-filters-optional-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515514" comment="libreoffice-gnome-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515515" comment="libreoffice-icon-theme-galaxy-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515516" comment="libreoffice-icon-theme-tango-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515517" comment="libreoffice-impress-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515518" comment="libreoffice-l10n-af-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515519" comment="libreoffice-l10n-ar-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515520" comment="libreoffice-l10n-ca-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515521" comment="libreoffice-l10n-cs-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515522" comment="libreoffice-l10n-da-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515523" comment="libreoffice-l10n-de-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515524" comment="libreoffice-l10n-en-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515525" comment="libreoffice-l10n-es-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515526" comment="libreoffice-l10n-fi-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515527" comment="libreoffice-l10n-fr-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515528" comment="libreoffice-l10n-gu-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515529" comment="libreoffice-l10n-hi-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515530" comment="libreoffice-l10n-hu-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515531" comment="libreoffice-l10n-it-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515532" comment="libreoffice-l10n-ja-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515533" comment="libreoffice-l10n-ko-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515534" comment="libreoffice-l10n-nb-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515535" comment="libreoffice-l10n-nl-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515536" comment="libreoffice-l10n-nn-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515537" comment="libreoffice-l10n-pl-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515538" comment="libreoffice-l10n-pt-BR-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515539" comment="libreoffice-l10n-pt-PT-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515540" comment="libreoffice-l10n-ru-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515541" comment="libreoffice-l10n-sk-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515542" comment="libreoffice-l10n-sv-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515543" comment="libreoffice-l10n-xh-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515544" comment="libreoffice-l10n-zh-Hans-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515545" comment="libreoffice-l10n-zh-Hant-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515546" comment="libreoffice-l10n-zu-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515547" comment="libreoffice-mailmerge-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515548" comment="libreoffice-math-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515549" comment="libreoffice-officebean-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515550" comment="libreoffice-pyuno-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515551" comment="libreoffice-writer-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515552" comment="libreoffice-writer-extensions-5.1.3.2-22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515553" comment="libvisio-0_1-1-0.1.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515554" comment="libwps-0_4-4-0.4.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515555" comment="myspell-af_NA-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515556" comment="myspell-af_ZA-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515557" comment="myspell-ar-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515558" comment="myspell-ar_AE-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515559" comment="myspell-ar_BH-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515560" comment="myspell-ar_DZ-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515561" comment="myspell-ar_EG-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515562" comment="myspell-ar_IQ-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515563" comment="myspell-ar_JO-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515564" comment="myspell-ar_KW-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515565" comment="myspell-ar_LB-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515566" comment="myspell-ar_LY-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515567" comment="myspell-ar_MA-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515568" comment="myspell-ar_OM-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515569" comment="myspell-ar_QA-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515570" comment="myspell-ar_SA-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515571" comment="myspell-ar_SD-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515572" comment="myspell-ar_SY-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515573" comment="myspell-ar_TN-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515574" comment="myspell-ar_YE-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515575" comment="myspell-be_BY-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515576" comment="myspell-bg_BG-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515577" comment="myspell-bn_BD-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515578" comment="myspell-bn_IN-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515579" comment="myspell-bs-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515580" comment="myspell-bs_BA-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515581" comment="myspell-ca-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515582" comment="myspell-ca_AD-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515583" comment="myspell-ca_ES-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515584" comment="myspell-ca_ES_valencia-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515585" comment="myspell-ca_FR-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515586" comment="myspell-ca_IT-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515587" comment="myspell-cs_CZ-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515588" comment="myspell-da_DK-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515589" comment="myspell-de-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515590" comment="myspell-de_AT-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515591" comment="myspell-de_CH-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515592" comment="myspell-de_DE-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515593" comment="myspell-dictionaries-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515594" comment="myspell-el_GR-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515595" comment="myspell-en-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515596" comment="myspell-en_AU-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515597" comment="myspell-en_BS-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515598" comment="myspell-en_BZ-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515599" comment="myspell-en_CA-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515600" comment="myspell-en_GB-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515601" comment="myspell-en_GH-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515602" comment="myspell-en_IE-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515603" comment="myspell-en_IN-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515604" comment="myspell-en_JM-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515605" comment="myspell-en_MW-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515606" comment="myspell-en_NA-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515607" comment="myspell-en_NZ-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515608" comment="myspell-en_PH-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515609" comment="myspell-en_TT-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515610" comment="myspell-en_US-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515611" comment="myspell-en_ZA-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515612" comment="myspell-en_ZW-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515613" comment="myspell-es-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515614" comment="myspell-es_AR-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515615" comment="myspell-es_BO-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515616" comment="myspell-es_CL-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515617" comment="myspell-es_CO-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515618" comment="myspell-es_CR-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515619" comment="myspell-es_CU-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515620" comment="myspell-es_DO-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515621" comment="myspell-es_EC-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515622" comment="myspell-es_ES-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515623" comment="myspell-es_GT-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515624" comment="myspell-es_HN-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515625" comment="myspell-es_MX-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515626" comment="myspell-es_NI-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515627" comment="myspell-es_PA-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515628" comment="myspell-es_PE-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515629" comment="myspell-es_PR-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515630" comment="myspell-es_PY-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515631" comment="myspell-es_SV-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515632" comment="myspell-es_UY-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515633" comment="myspell-es_VE-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515634" comment="myspell-et_EE-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515635" comment="myspell-fr_BE-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515636" comment="myspell-fr_CA-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515637" comment="myspell-fr_CH-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515638" comment="myspell-fr_FR-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515639" comment="myspell-fr_LU-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515640" comment="myspell-fr_MC-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515641" comment="myspell-gu_IN-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515642" comment="myspell-he_IL-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515643" comment="myspell-hi_IN-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515644" comment="myspell-hr_HR-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515645" comment="myspell-hu_HU-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515646" comment="myspell-it_IT-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515647" comment="myspell-lightproof-en-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515648" comment="myspell-lightproof-hu_HU-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515649" comment="myspell-lightproof-pt_BR-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515650" comment="myspell-lightproof-ru_RU-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515651" comment="myspell-lo_LA-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515652" comment="myspell-lt_LT-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515653" comment="myspell-lv_LV-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515654" comment="myspell-nb_NO-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515655" comment="myspell-nl_BE-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515656" comment="myspell-nl_NL-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515657" comment="myspell-nn_NO-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515658" comment="myspell-no-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515659" comment="myspell-pl_PL-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515660" comment="myspell-pt_AO-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515661" comment="myspell-pt_BR-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515662" comment="myspell-pt_PT-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515663" comment="myspell-ro-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515664" comment="myspell-ro_RO-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515665" comment="myspell-ru_RU-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515666" comment="myspell-sk_SK-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515667" comment="myspell-sl_SI-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515668" comment="myspell-sr-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515669" comment="myspell-sr_CS-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515670" comment="myspell-sr_Latn_CS-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515671" comment="myspell-sr_Latn_RS-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515672" comment="myspell-sr_RS-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515673" comment="myspell-sv_FI-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515674" comment="myspell-sv_SE-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515675" comment="myspell-te-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515676" comment="myspell-te_IN-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515677" comment="myspell-th_TH-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515678" comment="myspell-vi-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515679" comment="myspell-vi_VN-20160511-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515680" comment="myspell-zu_ZA-20160511-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77521" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="967190" ref_url="https://bugzilla.suse.com/967190" source="BUGZILLA"/>
		<reference ref_id="968787" ref_url="https://bugzilla.suse.com/968787" source="BUGZILLA"/>
		<reference ref_id="969727" ref_url="https://bugzilla.suse.com/969727" source="BUGZILLA"/>
		<reference ref_id="973010" ref_url="https://bugzilla.suse.com/973010" source="BUGZILLA"/>
		<reference ref_id="973164" ref_url="https://bugzilla.suse.com/973164" source="BUGZILLA"/>
		<reference ref_id="975930" ref_url="https://bugzilla.suse.com/975930" source="BUGZILLA"/>
		<reference ref_id="980483" ref_url="https://bugzilla.suse.com/980483" source="BUGZILLA"/>
		<reference ref_id="980854" ref_url="https://bugzilla.suse.com/980854" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1234" ref_url="https://www.suse.com/security/cve/CVE-2016-1234/" source="CVE"/>
		<reference ref_id="CVE-2016-3075" ref_url="https://www.suse.com/security/cve/CVE-2016-3075/" source="CVE"/>
		<reference ref_id="CVE-2016-3706" ref_url="https://www.suse.com/security/cve/CVE-2016-3706/" source="CVE"/>
		<reference ref_id="CVE-2016-4429" ref_url="https://www.suse.com/security/cve/CVE-2016-4429/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002147.html" source="SUSE-SU"/>
		<description>

This update for glibc provides the following fixes:

- Increase DTV_SURPLUS limit. (bsc#968787)
- Do not copy d_name field of struct dirent. (CVE-2016-1234, bsc#969727)
- Fix memory leak in _nss_dns_gethostbyname4_r. (bsc#973010)
- Fix stack overflow in _nss_dns_getnetbyname_r. (CVE-2016-3075, bsc#973164)
- Fix malloc performance regression from SLE 11. (bsc#975930)
- Fix getaddrinfo stack overflow in hostent conversion. (CVE-2016-3706, bsc#980483)
- Do not use alloca in clntudp_call. (CVE-2016-4429, bsc#980854)
- Remove mtrace.1, now included in the man-pages package. (bsc#967190)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-04"/>
	<updated date="2016-07-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/967190">SUSE bug 967190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968787">SUSE bug 968787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969727">SUSE bug 969727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973010">SUSE bug 973010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973164">SUSE bug 973164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975930">SUSE bug 975930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980483">SUSE bug 980483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980854">SUSE bug 980854</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1234/">CVE-2016-1234</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3075/">CVE-2016-3075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3706/">CVE-2016-3706</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4429/">CVE-2016-4429</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516243" comment="glibc-2.19-38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516244" comment="glibc-32bit-2.19-38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516245" comment="glibc-devel-2.19-38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516246" comment="glibc-devel-32bit-2.19-38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516247" comment="glibc-i18ndata-2.19-38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516248" comment="glibc-locale-2.19-38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516249" comment="glibc-locale-32bit-2.19-38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516250" comment="nscd-2.19-38.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77522" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="942690" ref_url="https://bugzilla.suse.com/942690" source="BUGZILLA"/>
		<reference ref_id="960341" ref_url="https://bugzilla.suse.com/960341" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001808.html" source="SUSE-SU"/>
		<description>

This update to tiff 4.0.6 fixes the following issues:

- CVE-2015-7554: Out-of-bounds write in the thumbnail and tiffcmp tools allowed attacker to cause a denial of service or have unspecified further impact (bsc#960341)
- bsc#942690: potential out-of-bound write in NeXTDecode() (#2508)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-18"/>
	<updated date="2016-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/942690">SUSE bug 942690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515681" comment="libtiff5-4.0.6-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515682" comment="libtiff5-32bit-4.0.6-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77523" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="983232" ref_url="https://bugzilla.suse.com/983232" source="BUGZILLA"/>
		<reference ref_id="983234" ref_url="https://bugzilla.suse.com/983234" source="BUGZILLA"/>
		<reference ref_id="983253" ref_url="https://bugzilla.suse.com/983253" source="BUGZILLA"/>
		<reference ref_id="983259" ref_url="https://bugzilla.suse.com/983259" source="BUGZILLA"/>
		<reference ref_id="983292" ref_url="https://bugzilla.suse.com/983292" source="BUGZILLA"/>
		<reference ref_id="983305" ref_url="https://bugzilla.suse.com/983305" source="BUGZILLA"/>
		<reference ref_id="983308" ref_url="https://bugzilla.suse.com/983308" source="BUGZILLA"/>
		<reference ref_id="983521" ref_url="https://bugzilla.suse.com/983521" source="BUGZILLA"/>
		<reference ref_id="983523" ref_url="https://bugzilla.suse.com/983523" source="BUGZILLA"/>
		<reference ref_id="983527" ref_url="https://bugzilla.suse.com/983527" source="BUGZILLA"/>
		<reference ref_id="983533" ref_url="https://bugzilla.suse.com/983533" source="BUGZILLA"/>
		<reference ref_id="983739" ref_url="https://bugzilla.suse.com/983739" source="BUGZILLA"/>
		<reference ref_id="983746" ref_url="https://bugzilla.suse.com/983746" source="BUGZILLA"/>
		<reference ref_id="983752" ref_url="https://bugzilla.suse.com/983752" source="BUGZILLA"/>
		<reference ref_id="983774" ref_url="https://bugzilla.suse.com/983774" source="BUGZILLA"/>
		<reference ref_id="983794" ref_url="https://bugzilla.suse.com/983794" source="BUGZILLA"/>
		<reference ref_id="983796" ref_url="https://bugzilla.suse.com/983796" source="BUGZILLA"/>
		<reference ref_id="983799" ref_url="https://bugzilla.suse.com/983799" source="BUGZILLA"/>
		<reference ref_id="983803" ref_url="https://bugzilla.suse.com/983803" source="BUGZILLA"/>
		<reference ref_id="984014" ref_url="https://bugzilla.suse.com/984014" source="BUGZILLA"/>
		<reference ref_id="984018" ref_url="https://bugzilla.suse.com/984018" source="BUGZILLA"/>
		<reference ref_id="984023" ref_url="https://bugzilla.suse.com/984023" source="BUGZILLA"/>
		<reference ref_id="984028" ref_url="https://bugzilla.suse.com/984028" source="BUGZILLA"/>
		<reference ref_id="984032" ref_url="https://bugzilla.suse.com/984032" source="BUGZILLA"/>
		<reference ref_id="984035" ref_url="https://bugzilla.suse.com/984035" source="BUGZILLA"/>
		<reference ref_id="984135" ref_url="https://bugzilla.suse.com/984135" source="BUGZILLA"/>
		<reference ref_id="984137" ref_url="https://bugzilla.suse.com/984137" source="BUGZILLA"/>
		<reference ref_id="984142" ref_url="https://bugzilla.suse.com/984142" source="BUGZILLA"/>
		<reference ref_id="984144" ref_url="https://bugzilla.suse.com/984144" source="BUGZILLA"/>
		<reference ref_id="984145" ref_url="https://bugzilla.suse.com/984145" source="BUGZILLA"/>
		<reference ref_id="984149" ref_url="https://bugzilla.suse.com/984149" source="BUGZILLA"/>
		<reference ref_id="984150" ref_url="https://bugzilla.suse.com/984150" source="BUGZILLA"/>
		<reference ref_id="984160" ref_url="https://bugzilla.suse.com/984160" source="BUGZILLA"/>
		<reference ref_id="984166" ref_url="https://bugzilla.suse.com/984166" source="BUGZILLA"/>
		<reference ref_id="984172" ref_url="https://bugzilla.suse.com/984172" source="BUGZILLA"/>
		<reference ref_id="984179" ref_url="https://bugzilla.suse.com/984179" source="BUGZILLA"/>
		<reference ref_id="984181" ref_url="https://bugzilla.suse.com/984181" source="BUGZILLA"/>
		<reference ref_id="984183" ref_url="https://bugzilla.suse.com/984183" source="BUGZILLA"/>
		<reference ref_id="984184" ref_url="https://bugzilla.suse.com/984184" source="BUGZILLA"/>
		<reference ref_id="984185" ref_url="https://bugzilla.suse.com/984185" source="BUGZILLA"/>
		<reference ref_id="984186" ref_url="https://bugzilla.suse.com/984186" source="BUGZILLA"/>
		<reference ref_id="984187" ref_url="https://bugzilla.suse.com/984187" source="BUGZILLA"/>
		<reference ref_id="984191" ref_url="https://bugzilla.suse.com/984191" source="BUGZILLA"/>
		<reference ref_id="984193" ref_url="https://bugzilla.suse.com/984193" source="BUGZILLA"/>
		<reference ref_id="984370" ref_url="https://bugzilla.suse.com/984370" source="BUGZILLA"/>
		<reference ref_id="984372" ref_url="https://bugzilla.suse.com/984372" source="BUGZILLA"/>
		<reference ref_id="984373" ref_url="https://bugzilla.suse.com/984373" source="BUGZILLA"/>
		<reference ref_id="984374" ref_url="https://bugzilla.suse.com/984374" source="BUGZILLA"/>
		<reference ref_id="984375" ref_url="https://bugzilla.suse.com/984375" source="BUGZILLA"/>
		<reference ref_id="984379" ref_url="https://bugzilla.suse.com/984379" source="BUGZILLA"/>
		<reference ref_id="984394" ref_url="https://bugzilla.suse.com/984394" source="BUGZILLA"/>
		<reference ref_id="984398" ref_url="https://bugzilla.suse.com/984398" source="BUGZILLA"/>
		<reference ref_id="984400" ref_url="https://bugzilla.suse.com/984400" source="BUGZILLA"/>
		<reference ref_id="984401" ref_url="https://bugzilla.suse.com/984401" source="BUGZILLA"/>
		<reference ref_id="984404" ref_url="https://bugzilla.suse.com/984404" source="BUGZILLA"/>
		<reference ref_id="984406" ref_url="https://bugzilla.suse.com/984406" source="BUGZILLA"/>
		<reference ref_id="984408" ref_url="https://bugzilla.suse.com/984408" source="BUGZILLA"/>
		<reference ref_id="984409" ref_url="https://bugzilla.suse.com/984409" source="BUGZILLA"/>
		<reference ref_id="984427" ref_url="https://bugzilla.suse.com/984427" source="BUGZILLA"/>
		<reference ref_id="984433" ref_url="https://bugzilla.suse.com/984433" source="BUGZILLA"/>
		<reference ref_id="984436" ref_url="https://bugzilla.suse.com/984436" source="BUGZILLA"/>
		<reference ref_id="985442" ref_url="https://bugzilla.suse.com/985442" source="BUGZILLA"/>
		<reference ref_id="985448" ref_url="https://bugzilla.suse.com/985448" source="BUGZILLA"/>
		<reference ref_id="985451" ref_url="https://bugzilla.suse.com/985451" source="BUGZILLA"/>
		<reference ref_id="985456" ref_url="https://bugzilla.suse.com/985456" source="BUGZILLA"/>
		<reference ref_id="985460" ref_url="https://bugzilla.suse.com/985460" source="BUGZILLA"/>
		<reference ref_id="986608" ref_url="https://bugzilla.suse.com/986608" source="BUGZILLA"/>
		<reference ref_id="986609" ref_url="https://bugzilla.suse.com/986609" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9805" ref_url="https://www.suse.com/security/cve/CVE-2014-9805/" source="CVE"/>
		<reference ref_id="CVE-2014-9806" ref_url="https://www.suse.com/security/cve/CVE-2014-9806/" source="CVE"/>
		<reference ref_id="CVE-2014-9807" ref_url="https://www.suse.com/security/cve/CVE-2014-9807/" source="CVE"/>
		<reference ref_id="CVE-2014-9808" ref_url="https://www.suse.com/security/cve/CVE-2014-9808/" source="CVE"/>
		<reference ref_id="CVE-2014-9809" ref_url="https://www.suse.com/security/cve/CVE-2014-9809/" source="CVE"/>
		<reference ref_id="CVE-2014-9810" ref_url="https://www.suse.com/security/cve/CVE-2014-9810/" source="CVE"/>
		<reference ref_id="CVE-2014-9811" ref_url="https://www.suse.com/security/cve/CVE-2014-9811/" source="CVE"/>
		<reference ref_id="CVE-2014-9812" ref_url="https://www.suse.com/security/cve/CVE-2014-9812/" source="CVE"/>
		<reference ref_id="CVE-2014-9813" ref_url="https://www.suse.com/security/cve/CVE-2014-9813/" source="CVE"/>
		<reference ref_id="CVE-2014-9814" ref_url="https://www.suse.com/security/cve/CVE-2014-9814/" source="CVE"/>
		<reference ref_id="CVE-2014-9815" ref_url="https://www.suse.com/security/cve/CVE-2014-9815/" source="CVE"/>
		<reference ref_id="CVE-2014-9816" ref_url="https://www.suse.com/security/cve/CVE-2014-9816/" source="CVE"/>
		<reference ref_id="CVE-2014-9817" ref_url="https://www.suse.com/security/cve/CVE-2014-9817/" source="CVE"/>
		<reference ref_id="CVE-2014-9818" ref_url="https://www.suse.com/security/cve/CVE-2014-9818/" source="CVE"/>
		<reference ref_id="CVE-2014-9819" ref_url="https://www.suse.com/security/cve/CVE-2014-9819/" source="CVE"/>
		<reference ref_id="CVE-2014-9820" ref_url="https://www.suse.com/security/cve/CVE-2014-9820/" source="CVE"/>
		<reference ref_id="CVE-2014-9821" ref_url="https://www.suse.com/security/cve/CVE-2014-9821/" source="CVE"/>
		<reference ref_id="CVE-2014-9822" ref_url="https://www.suse.com/security/cve/CVE-2014-9822/" source="CVE"/>
		<reference ref_id="CVE-2014-9823" ref_url="https://www.suse.com/security/cve/CVE-2014-9823/" source="CVE"/>
		<reference ref_id="CVE-2014-9824" ref_url="https://www.suse.com/security/cve/CVE-2014-9824/" source="CVE"/>
		<reference ref_id="CVE-2014-9825" ref_url="https://www.suse.com/security/cve/CVE-2014-9825/" source="CVE"/>
		<reference ref_id="CVE-2014-9826" ref_url="https://www.suse.com/security/cve/CVE-2014-9826/" source="CVE"/>
		<reference ref_id="CVE-2014-9828" ref_url="https://www.suse.com/security/cve/CVE-2014-9828/" source="CVE"/>
		<reference ref_id="CVE-2014-9829" ref_url="https://www.suse.com/security/cve/CVE-2014-9829/" source="CVE"/>
		<reference ref_id="CVE-2014-9830" ref_url="https://www.suse.com/security/cve/CVE-2014-9830/" source="CVE"/>
		<reference ref_id="CVE-2014-9831" ref_url="https://www.suse.com/security/cve/CVE-2014-9831/" source="CVE"/>
		<reference ref_id="CVE-2014-9832" ref_url="https://www.suse.com/security/cve/CVE-2014-9832/" source="CVE"/>
		<reference ref_id="CVE-2014-9833" ref_url="https://www.suse.com/security/cve/CVE-2014-9833/" source="CVE"/>
		<reference ref_id="CVE-2014-9834" ref_url="https://www.suse.com/security/cve/CVE-2014-9834/" source="CVE"/>
		<reference ref_id="CVE-2014-9835" ref_url="https://www.suse.com/security/cve/CVE-2014-9835/" source="CVE"/>
		<reference ref_id="CVE-2014-9836" ref_url="https://www.suse.com/security/cve/CVE-2014-9836/" source="CVE"/>
		<reference ref_id="CVE-2014-9837" ref_url="https://www.suse.com/security/cve/CVE-2014-9837/" source="CVE"/>
		<reference ref_id="CVE-2014-9838" ref_url="https://www.suse.com/security/cve/CVE-2014-9838/" source="CVE"/>
		<reference ref_id="CVE-2014-9839" ref_url="https://www.suse.com/security/cve/CVE-2014-9839/" source="CVE"/>
		<reference ref_id="CVE-2014-9840" ref_url="https://www.suse.com/security/cve/CVE-2014-9840/" source="CVE"/>
		<reference ref_id="CVE-2014-9841" ref_url="https://www.suse.com/security/cve/CVE-2014-9841/" source="CVE"/>
		<reference ref_id="CVE-2014-9842" ref_url="https://www.suse.com/security/cve/CVE-2014-9842/" source="CVE"/>
		<reference ref_id="CVE-2014-9843" ref_url="https://www.suse.com/security/cve/CVE-2014-9843/" source="CVE"/>
		<reference ref_id="CVE-2014-9844" ref_url="https://www.suse.com/security/cve/CVE-2014-9844/" source="CVE"/>
		<reference ref_id="CVE-2014-9845" ref_url="https://www.suse.com/security/cve/CVE-2014-9845/" source="CVE"/>
		<reference ref_id="CVE-2014-9846" ref_url="https://www.suse.com/security/cve/CVE-2014-9846/" source="CVE"/>
		<reference ref_id="CVE-2014-9847" ref_url="https://www.suse.com/security/cve/CVE-2014-9847/" source="CVE"/>
		<reference ref_id="CVE-2014-9848" ref_url="https://www.suse.com/security/cve/CVE-2014-9848/" source="CVE"/>
		<reference ref_id="CVE-2014-9849" ref_url="https://www.suse.com/security/cve/CVE-2014-9849/" source="CVE"/>
		<reference ref_id="CVE-2014-9850" ref_url="https://www.suse.com/security/cve/CVE-2014-9850/" source="CVE"/>
		<reference ref_id="CVE-2014-9851" ref_url="https://www.suse.com/security/cve/CVE-2014-9851/" source="CVE"/>
		<reference ref_id="CVE-2014-9852" ref_url="https://www.suse.com/security/cve/CVE-2014-9852/" source="CVE"/>
		<reference ref_id="CVE-2014-9853" ref_url="https://www.suse.com/security/cve/CVE-2014-9853/" source="CVE"/>
		<reference ref_id="CVE-2014-9854" ref_url="https://www.suse.com/security/cve/CVE-2014-9854/" source="CVE"/>
		<reference ref_id="CVE-2015-8894" ref_url="https://www.suse.com/security/cve/CVE-2015-8894/" source="CVE"/>
		<reference ref_id="CVE-2015-8895" ref_url="https://www.suse.com/security/cve/CVE-2015-8895/" source="CVE"/>
		<reference ref_id="CVE-2015-8896" ref_url="https://www.suse.com/security/cve/CVE-2015-8896/" source="CVE"/>
		<reference ref_id="CVE-2015-8897" ref_url="https://www.suse.com/security/cve/CVE-2015-8897/" source="CVE"/>
		<reference ref_id="CVE-2015-8898" ref_url="https://www.suse.com/security/cve/CVE-2015-8898/" source="CVE"/>
		<reference ref_id="CVE-2015-8900" ref_url="https://www.suse.com/security/cve/CVE-2015-8900/" source="CVE"/>
		<reference ref_id="CVE-2015-8901" ref_url="https://www.suse.com/security/cve/CVE-2015-8901/" source="CVE"/>
		<reference ref_id="CVE-2015-8902" ref_url="https://www.suse.com/security/cve/CVE-2015-8902/" source="CVE"/>
		<reference ref_id="CVE-2015-8903" ref_url="https://www.suse.com/security/cve/CVE-2015-8903/" source="CVE"/>
		<reference ref_id="CVE-2016-4562" ref_url="https://www.suse.com/security/cve/CVE-2016-4562/" source="CVE"/>
		<reference ref_id="CVE-2016-4563" ref_url="https://www.suse.com/security/cve/CVE-2016-4563/" source="CVE"/>
		<reference ref_id="CVE-2016-4564" ref_url="https://www.suse.com/security/cve/CVE-2016-4564/" source="CVE"/>
		<reference ref_id="CVE-2016-5687" ref_url="https://www.suse.com/security/cve/CVE-2016-5687/" source="CVE"/>
		<reference ref_id="CVE-2016-5688" ref_url="https://www.suse.com/security/cve/CVE-2016-5688/" source="CVE"/>
		<reference ref_id="CVE-2016-5689" ref_url="https://www.suse.com/security/cve/CVE-2016-5689/" source="CVE"/>
		<reference ref_id="CVE-2016-5690" ref_url="https://www.suse.com/security/cve/CVE-2016-5690/" source="CVE"/>
		<reference ref_id="CVE-2016-5691" ref_url="https://www.suse.com/security/cve/CVE-2016-5691/" source="CVE"/>
		<reference ref_id="CVE-2016-5841" ref_url="https://www.suse.com/security/cve/CVE-2016-5841/" source="CVE"/>
		<reference ref_id="CVE-2016-5842" ref_url="https://www.suse.com/security/cve/CVE-2016-5842/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<description>
ImageMagick was updated to fix 66 security issues.

These security issues were fixed:
- CVE-2014-9810: SEGV in dpx file handler. (bsc#983803).
- CVE-2014-9811: Crash in xwd file handler (bsc#984032).
- CVE-2014-9812: NULL pointer dereference in ps file handling (bsc#984137).
- CVE-2014-9813: Crash on corrupted viff file (bsc#984035).
- CVE-2014-9814: NULL pointer dereference in wpg file handling (bsc#984193).
- CVE-2014-9815: Crash on corrupted wpg file (bsc#984372).
- CVE-2014-9816: Out of bound access in viff image (bsc#984398).
- CVE-2014-9817: Heap buffer overflow in pdb file handling (bsc#984400).
- CVE-2014-9818: Out of bound access on malformed sun file (bsc#984181).
- CVE-2014-9819: Heap overflow in palm files (bsc#984142).
- CVE-2014-9830: Handling of corrupted sun file (bsc#984135).
- CVE-2014-9831: Handling of corrupted wpg file (bsc#984375).
- CVE-2014-9850: Incorrect thread limit logic (bsc#984149).
- CVE-2014-9851: Crash when parsing resource block (bsc#984160).
- CVE-2014-9852: Incorrect usage of object after it has been destroyed (bsc#984191).
- CVE-2014-9853: Memory leak in rle file handling (bsc#984408).
- CVE-2015-8902: PDB file DoS (CPU consumption) (bsc#983253).
- CVE-2015-8903: Denial of service (cpu) in vicar (bsc#983259).
- CVE-2015-8900: HDR file DoS (endless loop) (bsc#983232).
- CVE-2015-8901: MIFF file DoS (endless loop) (bsc#983234).
- CVE-2016-5688: Various invalid memory reads in ImageMagick WPG (bsc#985442).
- CVE-2014-9834: Heap overflow in pict file (bsc#984436).
- CVE-2014-9806: Prevent leak of file descriptor due to corrupted file. (bsc#983774).
- CVE-2016-5687: Out of bounds read in DDS coder (bsc#985448).
- CVE-2014-9838: Out of memory crash in magick/cache.c (bsc#984370).
- CVE-2014-9854: Filling memory during identification of TIFF image (bsc#984184).
- CVE-2015-8898: Prevent null pointer access in magick/constitute.c (bsc#983746).
- CVE-2014-9833: Heap overflow in psd file (bsc#984406).
- CVE-2015-8894: Double free in coders/tga.c:221 (bsc#983523).
- CVE-2015-8895: Integer and Buffer overflow in coders/icon.c (bsc#983527).
- CVE-2015-8896: Double free / integer truncation issue in coders/pict.c:2000 (bsc#983533).
- CVE-2015-8897: Out of bounds error in SpliceImage (bsc#983739).
- CVE-2016-5690: Bad foor loop in  DCM coder (bsc#985451).
- CVE-2016-5691: Checks for pixel.red/green/blue in dcm coder (bsc#985456).
- CVE-2014-9836: Crash in xpm file handling (bsc#984023).
- CVE-2014-9808: SEGV due to corrupted dpc images. (bsc#983796).
- CVE-2014-9821: Avoid heap overflow in pnm files. (bsc#984014).
- CVE-2014-9820: Heap overflow in xpm files (bsc#984150).
- CVE-2014-9823: Heap overflow in palm file (bsc#984401).
- CVE-2014-9822: Heap overflow in quantum file (bsc#984187).
- CVE-2014-9825: Heap overflow in corrupted psd file (bsc#984427).
- CVE-2014-9824: Heap overflow in psd file (bsc#984185).
- CVE-2014-9809: SEGV due to corrupted xwd images. (bsc#983799).
- CVE-2014-9826: Incorrect error handling in sun files (bsc#984186).
- CVE-2014-9843: Incorrect boundary checks in DecodePSDPixels (bsc#984179).
- CVE-2014-9842: Memory leak in psd handling (bsc#984374).
- CVE-2014-9841: Throwing of exceptions in psd handling (bsc#984172).
- CVE-2014-9840: Out of bound access in palm file (bsc#984433).
- CVE-2014-9847: Incorrect handling of 'previous' image in the JNG decoder (bsc#984144).
- CVE-2014-9846: Added checks to prevent overflow in rle file. (bsc#983521).
- CVE-2014-9845: Crash due to corrupted dib file (bsc#984394).
- CVE-2014-9844: Out of bound issue in rle file (bsc#984373).
- CVE-2014-9849: Crash in png coder (bsc#984018).
- CVE-2014-9848: Memory leak in quantum management (bsc#984404).
- CVE-2014-9807: Double free in pdb coder. (bsc#983794).
- CVE-2014-9829: Out of bound access in sun file (bsc#984409).
- CVE-2014-9832: Heap overflow in pcx file (bsc#984183).
- CVE-2014-9805: SEGV due to a corrupted pnm file. (bsc#983752).
- CVE-2016-4564: The DrawImage function in MagickCore/draw.c in ImageMagick made an incorrect function call in attempting to locate the next token, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983308).
- CVE-2016-4563: The TraceStrokePolygon function in MagickCore/draw.c in ImageMagick mishandled the relationship between the BezierQuantum value and certain strokes data, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983305).
- CVE-2016-4562: The DrawDashPolygon function in MagickCore/draw.c in ImageMagick mishandled calculations of certain vertices integer data, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983292).
- CVE-2014-9839: Theoretical out of bound access in magick/colormap-private.h (bsc#984379).
- CVE-2016-5689: NULL ptr dereference in dcm coder (bsc#985460).
- CVE-2014-9837: Additional PNM sanity checks (bsc#984166).
- CVE-2014-9835: Heap overflow in wpf file (bsc#984145).
- CVE-2014-9828: Corrupted (too many colors) psd file (bsc#984028).
- CVE-2016-5841: Integer overflow could have read to RCE (bnc#986609).
- CVE-2016-5842: Out-of-bounds read in MagickCore/property.c:1396 could have lead to memory leak (bnc#986608).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-11"/>
	<updated date="2016-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/983232">SUSE bug 983232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983234">SUSE bug 983234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983253">SUSE bug 983253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983259">SUSE bug 983259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983292">SUSE bug 983292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983305">SUSE bug 983305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983308">SUSE bug 983308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983521">SUSE bug 983521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983523">SUSE bug 983523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983527">SUSE bug 983527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983533">SUSE bug 983533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983739">SUSE bug 983739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983746">SUSE bug 983746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983752">SUSE bug 983752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983774">SUSE bug 983774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983794">SUSE bug 983794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983796">SUSE bug 983796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983799">SUSE bug 983799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983803">SUSE bug 983803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984014">SUSE bug 984014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984018">SUSE bug 984018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984023">SUSE bug 984023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984028">SUSE bug 984028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984032">SUSE bug 984032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984035">SUSE bug 984035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984135">SUSE bug 984135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984137">SUSE bug 984137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984142">SUSE bug 984142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984144">SUSE bug 984144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984145">SUSE bug 984145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984149">SUSE bug 984149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984150">SUSE bug 984150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984160">SUSE bug 984160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984166">SUSE bug 984166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984172">SUSE bug 984172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984179">SUSE bug 984179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984181">SUSE bug 984181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984183">SUSE bug 984183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984184">SUSE bug 984184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984185">SUSE bug 984185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984186">SUSE bug 984186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984187">SUSE bug 984187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984191">SUSE bug 984191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984193">SUSE bug 984193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984370">SUSE bug 984370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984372">SUSE bug 984372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984373">SUSE bug 984373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984374">SUSE bug 984374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984375">SUSE bug 984375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984379">SUSE bug 984379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984394">SUSE bug 984394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984398">SUSE bug 984398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984400">SUSE bug 984400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984401">SUSE bug 984401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984404">SUSE bug 984404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984406">SUSE bug 984406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984408">SUSE bug 984408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984409">SUSE bug 984409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984427">SUSE bug 984427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984433">SUSE bug 984433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984436">SUSE bug 984436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985442">SUSE bug 985442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985448">SUSE bug 985448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985451">SUSE bug 985451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985456">SUSE bug 985456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985460">SUSE bug 985460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986608">SUSE bug 986608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986609">SUSE bug 986609</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9805/">CVE-2014-9805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9806/">CVE-2014-9806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9807/">CVE-2014-9807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9808/">CVE-2014-9808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9809/">CVE-2014-9809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9810/">CVE-2014-9810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9811/">CVE-2014-9811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9812/">CVE-2014-9812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9813/">CVE-2014-9813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9814/">CVE-2014-9814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9815/">CVE-2014-9815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9816/">CVE-2014-9816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9817/">CVE-2014-9817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9818/">CVE-2014-9818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9819/">CVE-2014-9819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9820/">CVE-2014-9820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9821/">CVE-2014-9821</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9822/">CVE-2014-9822</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9823/">CVE-2014-9823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9824/">CVE-2014-9824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9825/">CVE-2014-9825</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9826/">CVE-2014-9826</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9828/">CVE-2014-9828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9829/">CVE-2014-9829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9830/">CVE-2014-9830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9831/">CVE-2014-9831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9832/">CVE-2014-9832</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9833/">CVE-2014-9833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9834/">CVE-2014-9834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9835/">CVE-2014-9835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9836/">CVE-2014-9836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9837/">CVE-2014-9837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9838/">CVE-2014-9838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9839/">CVE-2014-9839</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9840/">CVE-2014-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9841/">CVE-2014-9841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9842/">CVE-2014-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9843/">CVE-2014-9843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9844/">CVE-2014-9844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9845/">CVE-2014-9845</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9846/">CVE-2014-9846</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9847/">CVE-2014-9847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9848/">CVE-2014-9848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9849/">CVE-2014-9849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9850/">CVE-2014-9850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9851/">CVE-2014-9851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9852/">CVE-2014-9852</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9853/">CVE-2014-9853</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9854/">CVE-2014-9854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8894/">CVE-2015-8894</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8895/">CVE-2015-8895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8896/">CVE-2015-8896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8897/">CVE-2015-8897</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8898/">CVE-2015-8898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8900/">CVE-2015-8900</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8901/">CVE-2015-8901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8902/">CVE-2015-8902</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8903/">CVE-2015-8903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4562/">CVE-2016-4562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4563/">CVE-2016-4563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4564/">CVE-2016-4564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5687/">CVE-2016-5687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5688/">CVE-2016-5688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5689/">CVE-2016-5689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5690/">CVE-2016-5690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5691/">CVE-2016-5691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5841/">CVE-2016-5841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5842/">CVE-2016-5842</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516251" comment="ImageMagick-6.8.8.1-30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516252" comment="libMagick++-6_Q16-3-6.8.8.1-30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516253" comment="libMagickCore-6_Q16-1-6.8.8.1-30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516254" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516255" comment="libMagickWand-6_Q16-1-6.8.8.1-30.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77524" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="969820" ref_url="https://bugzilla.suse.com/969820" source="BUGZILLA"/>
		<reference ref_id="972907" ref_url="https://bugzilla.suse.com/972907" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2774" ref_url="https://www.suse.com/security/cve/CVE-2016-2774/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002155.html" source="SUSE-SU"/>
		<description>

This update for dhcp fixes the following issues:

Security issue fixed:
- CVE-2016-2774: Fixed a denial of service attack against the DHCP server over the OMAPI TCP socket, which could be used
  by network adjacent attackers to make the DHCP server non-functional (bsc#969820).

Non security issues fixed:
- Rename freeaddrinfo(), getaddrinfo() and getnameinfo() in the internal libirs
  library that does not consider /etc/hosts and /etc/nsswitch.conf to use irs_
  prefix. This prevents name conflicts which would result in overriding standard
  glibc functions used by libldap. (bsc#972907)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-13"/>
	<updated date="2016-07-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/969820">SUSE bug 969820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972907">SUSE bug 972907</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2774/">CVE-2016-2774</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516256" comment="dhcp-4.3.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516257" comment="dhcp-client-4.3.3-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77525" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="988579" ref_url="https://bugzilla.suse.com/988579" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4172" ref_url="https://www.suse.com/security/cve/CVE-2016-4172/" source="CVE"/>
		<reference ref_id="CVE-2016-4173" ref_url="https://www.suse.com/security/cve/CVE-2016-4173/" source="CVE"/>
		<reference ref_id="CVE-2016-4174" ref_url="https://www.suse.com/security/cve/CVE-2016-4174/" source="CVE"/>
		<reference ref_id="CVE-2016-4175" ref_url="https://www.suse.com/security/cve/CVE-2016-4175/" source="CVE"/>
		<reference ref_id="CVE-2016-4176" ref_url="https://www.suse.com/security/cve/CVE-2016-4176/" source="CVE"/>
		<reference ref_id="CVE-2016-4177" ref_url="https://www.suse.com/security/cve/CVE-2016-4177/" source="CVE"/>
		<reference ref_id="CVE-2016-4178" ref_url="https://www.suse.com/security/cve/CVE-2016-4178/" source="CVE"/>
		<reference ref_id="CVE-2016-4179" ref_url="https://www.suse.com/security/cve/CVE-2016-4179/" source="CVE"/>
		<reference ref_id="CVE-2016-4180" ref_url="https://www.suse.com/security/cve/CVE-2016-4180/" source="CVE"/>
		<reference ref_id="CVE-2016-4181" ref_url="https://www.suse.com/security/cve/CVE-2016-4181/" source="CVE"/>
		<reference ref_id="CVE-2016-4182" ref_url="https://www.suse.com/security/cve/CVE-2016-4182/" source="CVE"/>
		<reference ref_id="CVE-2016-4183" ref_url="https://www.suse.com/security/cve/CVE-2016-4183/" source="CVE"/>
		<reference ref_id="CVE-2016-4184" ref_url="https://www.suse.com/security/cve/CVE-2016-4184/" source="CVE"/>
		<reference ref_id="CVE-2016-4185" ref_url="https://www.suse.com/security/cve/CVE-2016-4185/" source="CVE"/>
		<reference ref_id="CVE-2016-4186" ref_url="https://www.suse.com/security/cve/CVE-2016-4186/" source="CVE"/>
		<reference ref_id="CVE-2016-4187" ref_url="https://www.suse.com/security/cve/CVE-2016-4187/" source="CVE"/>
		<reference ref_id="CVE-2016-4188" ref_url="https://www.suse.com/security/cve/CVE-2016-4188/" source="CVE"/>
		<reference ref_id="CVE-2016-4189" ref_url="https://www.suse.com/security/cve/CVE-2016-4189/" source="CVE"/>
		<reference ref_id="CVE-2016-4190" ref_url="https://www.suse.com/security/cve/CVE-2016-4190/" source="CVE"/>
		<reference ref_id="CVE-2016-4217" ref_url="https://www.suse.com/security/cve/CVE-2016-4217/" source="CVE"/>
		<reference ref_id="CVE-2016-4218" ref_url="https://www.suse.com/security/cve/CVE-2016-4218/" source="CVE"/>
		<reference ref_id="CVE-2016-4219" ref_url="https://www.suse.com/security/cve/CVE-2016-4219/" source="CVE"/>
		<reference ref_id="CVE-2016-4220" ref_url="https://www.suse.com/security/cve/CVE-2016-4220/" source="CVE"/>
		<reference ref_id="CVE-2016-4221" ref_url="https://www.suse.com/security/cve/CVE-2016-4221/" source="CVE"/>
		<reference ref_id="CVE-2016-4222" ref_url="https://www.suse.com/security/cve/CVE-2016-4222/" source="CVE"/>
		<reference ref_id="CVE-2016-4223" ref_url="https://www.suse.com/security/cve/CVE-2016-4223/" source="CVE"/>
		<reference ref_id="CVE-2016-4224" ref_url="https://www.suse.com/security/cve/CVE-2016-4224/" source="CVE"/>
		<reference ref_id="CVE-2016-4225" ref_url="https://www.suse.com/security/cve/CVE-2016-4225/" source="CVE"/>
		<reference ref_id="CVE-2016-4226" ref_url="https://www.suse.com/security/cve/CVE-2016-4226/" source="CVE"/>
		<reference ref_id="CVE-2016-4227" ref_url="https://www.suse.com/security/cve/CVE-2016-4227/" source="CVE"/>
		<reference ref_id="CVE-2016-4228" ref_url="https://www.suse.com/security/cve/CVE-2016-4228/" source="CVE"/>
		<reference ref_id="CVE-2016-4229" ref_url="https://www.suse.com/security/cve/CVE-2016-4229/" source="CVE"/>
		<reference ref_id="CVE-2016-4230" ref_url="https://www.suse.com/security/cve/CVE-2016-4230/" source="CVE"/>
		<reference ref_id="CVE-2016-4231" ref_url="https://www.suse.com/security/cve/CVE-2016-4231/" source="CVE"/>
		<reference ref_id="CVE-2016-4232" ref_url="https://www.suse.com/security/cve/CVE-2016-4232/" source="CVE"/>
		<reference ref_id="CVE-2016-4233" ref_url="https://www.suse.com/security/cve/CVE-2016-4233/" source="CVE"/>
		<reference ref_id="CVE-2016-4234" ref_url="https://www.suse.com/security/cve/CVE-2016-4234/" source="CVE"/>
		<reference ref_id="CVE-2016-4235" ref_url="https://www.suse.com/security/cve/CVE-2016-4235/" source="CVE"/>
		<reference ref_id="CVE-2016-4236" ref_url="https://www.suse.com/security/cve/CVE-2016-4236/" source="CVE"/>
		<reference ref_id="CVE-2016-4237" ref_url="https://www.suse.com/security/cve/CVE-2016-4237/" source="CVE"/>
		<reference ref_id="CVE-2016-4238" ref_url="https://www.suse.com/security/cve/CVE-2016-4238/" source="CVE"/>
		<reference ref_id="CVE-2016-4239" ref_url="https://www.suse.com/security/cve/CVE-2016-4239/" source="CVE"/>
		<reference ref_id="CVE-2016-4240" ref_url="https://www.suse.com/security/cve/CVE-2016-4240/" source="CVE"/>
		<reference ref_id="CVE-2016-4241" ref_url="https://www.suse.com/security/cve/CVE-2016-4241/" source="CVE"/>
		<reference ref_id="CVE-2016-4242" ref_url="https://www.suse.com/security/cve/CVE-2016-4242/" source="CVE"/>
		<reference ref_id="CVE-2016-4243" ref_url="https://www.suse.com/security/cve/CVE-2016-4243/" source="CVE"/>
		<reference ref_id="CVE-2016-4244" ref_url="https://www.suse.com/security/cve/CVE-2016-4244/" source="CVE"/>
		<reference ref_id="CVE-2016-4245" ref_url="https://www.suse.com/security/cve/CVE-2016-4245/" source="CVE"/>
		<reference ref_id="CVE-2016-4246" ref_url="https://www.suse.com/security/cve/CVE-2016-4246/" source="CVE"/>
		<reference ref_id="CVE-2016-4247" ref_url="https://www.suse.com/security/cve/CVE-2016-4247/" source="CVE"/>
		<reference ref_id="CVE-2016-4248" ref_url="https://www.suse.com/security/cve/CVE-2016-4248/" source="CVE"/>
		<reference ref_id="CVE-2016-4249" ref_url="https://www.suse.com/security/cve/CVE-2016-4249/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html" source="SUSE-SU"/>
		<description>
Adobe Flash Player was updated to 11.2.202.632 to fix many security issues tracked under the upstream advisory APSB16-25, allowing remote attackers to execute arbitrary code when delivering specially crafted Flash content. 

The following vulnerabilities were fixed:

- CVE-2016-4172: memory corruption vulnerability that could lead to code execution
- CVE-2016-4173: use-after-free vulnerability that could lead to code execution
- CVE-2016-4174: use-after-free vulnerability that could lead to code execution
- CVE-2016-4175: memory corruption vulnerability that could lead to code execution
- CVE-2016-4176: stack corruption vulnerability that could lead to code execution
- CVE-2016-4177: stack corruption vulnerability that could lead to code execution
- CVE-2016-4178: security bypass vulnerability that could lead to information disclosure
- CVE-2016-4179: memory corruption vulnerability that could lead to code execution
- CVE-2016-4180: memory corruption vulnerability that could lead to code execution
- CVE-2016-4181: memory corruption vulnerability that could lead to code execution
- CVE-2016-4182: memory corruption vulnerability that could lead to code execution
- CVE-2016-4183: memory corruption vulnerability that could lead to code execution
- CVE-2016-4184: memory corruption vulnerability that could lead to code execution
- CVE-2016-4185: memory corruption vulnerability that could lead to code execution
- CVE-2016-4186: memory corruption vulnerability that could lead to code execution
- CVE-2016-4187: memory corruption vulnerability that could lead to code execution
- CVE-2016-4188: memory corruption vulnerability that could lead to code execution
- CVE-2016-4189: memory corruption vulnerability that could lead to code execution
- CVE-2016-4190: memory corruption vulnerability that could lead to code execution
- CVE-2016-4217: memory corruption vulnerability that could lead to code execution
- CVE-2016-4218: memory corruption vulnerability that could lead to code execution
- CVE-2016-4219: memory corruption vulnerability that could lead to code execution
- CVE-2016-4220: memory corruption vulnerability that could lead to code execution
- CVE-2016-4221: memory corruption vulnerability that could lead to code execution
- CVE-2016-4222: use-after-free vulnerability that could lead to code execution
- CVE-2016-4223: type confusion vulnerability that could lead to code execution
- CVE-2016-4224: type confusion vulnerability that could lead to code execution
- CVE-2016-4225: type confusion vulnerability that could lead to code execution
- CVE-2016-4226: use-after-free vulnerability that could lead to code execution
- CVE-2016-4227: use-after-free vulnerability that could lead to code execution
- CVE-2016-4228: use-after-free vulnerability that could lead to code execution
- CVE-2016-4229: use-after-free vulnerability that could lead to code execution
- CVE-2016-4230: use-after-free vulnerability that could lead to code execution
- CVE-2016-4231: use-after-free vulnerability that could lead to code execution
- CVE-2016-4232: memory leak vulnerability
- CVE-2016-4233: memory corruption vulnerability that could lead to code execution
- CVE-2016-4234: memory corruption vulnerability that could lead to code execution
- CVE-2016-4235: memory corruption vulnerability that could lead to code execution
- CVE-2016-4236: memory corruption vulnerability that could lead to code execution
- CVE-2016-4237: memory corruption vulnerability that could lead to code execution
- CVE-2016-4238: memory corruption vulnerability that could lead to code execution
- CVE-2016-4239: memory corruption vulnerability that could lead to code execution
- CVE-2016-4240: memory corruption vulnerability that could lead to code execution
- CVE-2016-4241: memory corruption vulnerability that could lead to code execution
- CVE-2016-4242: memory corruption vulnerability that could lead to code execution
- CVE-2016-4243: memory corruption vulnerability that could lead to code execution
- CVE-2016-4244: memory corruption vulnerability that could lead to code execution
- CVE-2016-4245: memory corruption vulnerability that could lead to code execution
- CVE-2016-4246: memory corruption vulnerability that could lead to code execution
- CVE-2016-4247: race condition vulnerability that could lead to information disclosure
- CVE-2016-4248: use-after-free vulnerability that could lead to code execution
- CVE-2016-4249: heap buffer overflow vulnerability that could lead to code execution		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-20"/>
	<updated date="2016-07-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/988579">SUSE bug 988579</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4172/">CVE-2016-4172</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4173/">CVE-2016-4173</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4174/">CVE-2016-4174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4175/">CVE-2016-4175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4176/">CVE-2016-4176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4177/">CVE-2016-4177</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4178/">CVE-2016-4178</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4179/">CVE-2016-4179</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4180/">CVE-2016-4180</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4181/">CVE-2016-4181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4182/">CVE-2016-4182</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4183/">CVE-2016-4183</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4184/">CVE-2016-4184</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4185/">CVE-2016-4185</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4186/">CVE-2016-4186</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4187/">CVE-2016-4187</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4188/">CVE-2016-4188</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4189/">CVE-2016-4189</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4190/">CVE-2016-4190</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4217/">CVE-2016-4217</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4218/">CVE-2016-4218</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4219/">CVE-2016-4219</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4220/">CVE-2016-4220</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4221/">CVE-2016-4221</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4222/">CVE-2016-4222</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4223/">CVE-2016-4223</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4224/">CVE-2016-4224</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4225/">CVE-2016-4225</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4226/">CVE-2016-4226</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4227/">CVE-2016-4227</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4228/">CVE-2016-4228</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4229/">CVE-2016-4229</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4230/">CVE-2016-4230</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4231/">CVE-2016-4231</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4232/">CVE-2016-4232</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4233/">CVE-2016-4233</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4234/">CVE-2016-4234</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4235/">CVE-2016-4235</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4236/">CVE-2016-4236</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4237/">CVE-2016-4237</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4238/">CVE-2016-4238</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4239/">CVE-2016-4239</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4240/">CVE-2016-4240</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4241/">CVE-2016-4241</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4242/">CVE-2016-4242</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4243/">CVE-2016-4243</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4244/">CVE-2016-4244</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4245/">CVE-2016-4245</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4246/">CVE-2016-4246</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4247/">CVE-2016-4247</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4248/">CVE-2016-4248</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4249/">CVE-2016-4249</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516258" comment="flash-player-11.2.202.632-137.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516259" comment="flash-player-gnome-11.2.202.632-137.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77526" version="1" class="patch">
	<metadata>
		<title>Security update for libarchive (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="984990" ref_url="https://bugzilla.suse.com/984990" source="BUGZILLA"/>
		<reference ref_id="985609" ref_url="https://bugzilla.suse.com/985609" source="BUGZILLA"/>
		<reference ref_id="985665" ref_url="https://bugzilla.suse.com/985665" source="BUGZILLA"/>
		<reference ref_id="985669" ref_url="https://bugzilla.suse.com/985669" source="BUGZILLA"/>
		<reference ref_id="985673" ref_url="https://bugzilla.suse.com/985673" source="BUGZILLA"/>
		<reference ref_id="985675" ref_url="https://bugzilla.suse.com/985675" source="BUGZILLA"/>
		<reference ref_id="985679" ref_url="https://bugzilla.suse.com/985679" source="BUGZILLA"/>
		<reference ref_id="985682" ref_url="https://bugzilla.suse.com/985682" source="BUGZILLA"/>
		<reference ref_id="985685" ref_url="https://bugzilla.suse.com/985685" source="BUGZILLA"/>
		<reference ref_id="985688" ref_url="https://bugzilla.suse.com/985688" source="BUGZILLA"/>
		<reference ref_id="985689" ref_url="https://bugzilla.suse.com/985689" source="BUGZILLA"/>
		<reference ref_id="985697" ref_url="https://bugzilla.suse.com/985697" source="BUGZILLA"/>
		<reference ref_id="985698" ref_url="https://bugzilla.suse.com/985698" source="BUGZILLA"/>
		<reference ref_id="985700" ref_url="https://bugzilla.suse.com/985700" source="BUGZILLA"/>
		<reference ref_id="985703" ref_url="https://bugzilla.suse.com/985703" source="BUGZILLA"/>
		<reference ref_id="985704" ref_url="https://bugzilla.suse.com/985704" source="BUGZILLA"/>
		<reference ref_id="985706" ref_url="https://bugzilla.suse.com/985706" source="BUGZILLA"/>
		<reference ref_id="985826" ref_url="https://bugzilla.suse.com/985826" source="BUGZILLA"/>
		<reference ref_id="985832" ref_url="https://bugzilla.suse.com/985832" source="BUGZILLA"/>
		<reference ref_id="985835" ref_url="https://bugzilla.suse.com/985835" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8918" ref_url="https://www.suse.com/security/cve/CVE-2015-8918/" source="CVE"/>
		<reference ref_id="CVE-2015-8919" ref_url="https://www.suse.com/security/cve/CVE-2015-8919/" source="CVE"/>
		<reference ref_id="CVE-2015-8920" ref_url="https://www.suse.com/security/cve/CVE-2015-8920/" source="CVE"/>
		<reference ref_id="CVE-2015-8921" ref_url="https://www.suse.com/security/cve/CVE-2015-8921/" source="CVE"/>
		<reference ref_id="CVE-2015-8922" ref_url="https://www.suse.com/security/cve/CVE-2015-8922/" source="CVE"/>
		<reference ref_id="CVE-2015-8923" ref_url="https://www.suse.com/security/cve/CVE-2015-8923/" source="CVE"/>
		<reference ref_id="CVE-2015-8924" ref_url="https://www.suse.com/security/cve/CVE-2015-8924/" source="CVE"/>
		<reference ref_id="CVE-2015-8925" ref_url="https://www.suse.com/security/cve/CVE-2015-8925/" source="CVE"/>
		<reference ref_id="CVE-2015-8926" ref_url="https://www.suse.com/security/cve/CVE-2015-8926/" source="CVE"/>
		<reference ref_id="CVE-2015-8928" ref_url="https://www.suse.com/security/cve/CVE-2015-8928/" source="CVE"/>
		<reference ref_id="CVE-2015-8929" ref_url="https://www.suse.com/security/cve/CVE-2015-8929/" source="CVE"/>
		<reference ref_id="CVE-2015-8930" ref_url="https://www.suse.com/security/cve/CVE-2015-8930/" source="CVE"/>
		<reference ref_id="CVE-2015-8931" ref_url="https://www.suse.com/security/cve/CVE-2015-8931/" source="CVE"/>
		<reference ref_id="CVE-2015-8932" ref_url="https://www.suse.com/security/cve/CVE-2015-8932/" source="CVE"/>
		<reference ref_id="CVE-2015-8933" ref_url="https://www.suse.com/security/cve/CVE-2015-8933/" source="CVE"/>
		<reference ref_id="CVE-2015-8934" ref_url="https://www.suse.com/security/cve/CVE-2015-8934/" source="CVE"/>
		<reference ref_id="CVE-2016-4300" ref_url="https://www.suse.com/security/cve/CVE-2016-4300/" source="CVE"/>
		<reference ref_id="CVE-2016-4301" ref_url="https://www.suse.com/security/cve/CVE-2016-4301/" source="CVE"/>
		<reference ref_id="CVE-2016-4302" ref_url="https://www.suse.com/security/cve/CVE-2016-4302/" source="CVE"/>
		<reference ref_id="CVE-2016-4809" ref_url="https://www.suse.com/security/cve/CVE-2016-4809/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<description>
libarchive was updated to fix 20 security issues.

These security issues were fixed:
- CVE-2015-8918: Overlapping memcpy in CAB parser (bsc#985698).
- CVE-2015-8919: Heap out of bounds read in LHA/LZH parser (bsc#985697).
- CVE-2015-8920: Stack out of bounds read in ar parser (bsc#985675).
- CVE-2015-8921: Global out of bounds read in mtree parser (bsc#985682).
- CVE-2015-8922: Null pointer access in 7z parser (bsc#985685).
- CVE-2015-8923: Unclear crashes in ZIP parser (bsc#985703).
- CVE-2015-8924: Heap buffer read overflow in tar (bsc#985609).
- CVE-2015-8925: Unclear invalid memory read in mtree parser (bsc#985706).
- CVE-2015-8926: NULL pointer access in RAR parser (bsc#985704).
- CVE-2015-8928: Heap out of bounds read in mtree parser (bsc#985679).
- CVE-2015-8929: Memory leak in tar parser (bsc#985669).
- CVE-2015-8930: Endless loop in ISO parser (bsc#985700).
- CVE-2015-8931: Undefined behavior / signed integer overflow in mtree parser (bsc#985689).
- CVE-2015-8932: Compress handler left shifting larger than int size (bsc#985665).
- CVE-2015-8933: Undefined behavior / signed integer overflow in TAR parser (bsc#985688).
- CVE-2015-8934: Out of bounds read in RAR (bsc#985673).
- CVE-2016-4300: Heap buffer overflow vulnerability in the 7zip read_SubStreamsInfo (bsc#985832).
- CVE-2016-4301: Stack buffer overflow in the mtree parse_device (bsc#985826).
- CVE-2016-4302: Heap buffer overflow in the Rar decompression functionality (bsc#985835).
- CVE-2016-4809: Memory allocate error with symbolic links in cpio archives (bsc#984990).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-29"/>
	<updated date="2016-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/984990">SUSE bug 984990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985609">SUSE bug 985609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985665">SUSE bug 985665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985669">SUSE bug 985669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985673">SUSE bug 985673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985675">SUSE bug 985675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985679">SUSE bug 985679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985682">SUSE bug 985682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985685">SUSE bug 985685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985688">SUSE bug 985688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985689">SUSE bug 985689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985697">SUSE bug 985697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985698">SUSE bug 985698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985700">SUSE bug 985700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985703">SUSE bug 985703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985704">SUSE bug 985704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985706">SUSE bug 985706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985826">SUSE bug 985826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985832">SUSE bug 985832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985835">SUSE bug 985835</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8918/">CVE-2015-8918</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8919/">CVE-2015-8919</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8920/">CVE-2015-8920</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8921/">CVE-2015-8921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8922/">CVE-2015-8922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8923/">CVE-2015-8923</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8924/">CVE-2015-8924</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8925/">CVE-2015-8925</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8926/">CVE-2015-8926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8928/">CVE-2015-8928</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8929/">CVE-2015-8929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8930/">CVE-2015-8930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8931/">CVE-2015-8931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8932/">CVE-2015-8932</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8933/">CVE-2015-8933</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8934/">CVE-2015-8934</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4300/">CVE-2016-4300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4301/">CVE-2016-4301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4302/">CVE-2016-4302</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4809/">CVE-2016-4809</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516260" comment="libarchive13-3.1.2-22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77527" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="898513" ref_url="https://bugzilla.suse.com/898513" source="BUGZILLA"/>
		<reference ref_id="900914" ref_url="https://bugzilla.suse.com/900914" source="BUGZILLA"/>
		<reference ref_id="915410" ref_url="https://bugzilla.suse.com/915410" source="BUGZILLA"/>
		<reference ref_id="922710" ref_url="https://bugzilla.suse.com/922710" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8242" ref_url="https://www.suse.com/security/cve/CVE-2014-8242/" source="CVE"/>
		<reference ref_id="CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001811.html" source="SUSE-SU"/>
		<description>

This update for rsync fixes two security issues and two non-security bugs.

The following vulnerabilities were fixed:

- CVE-2014-8242: Checksum collisions leading to a denial of service (bsc#900914)
- CVE-2014-9512: Malicious servers could send files outside of the transferred directory (bsc#915410)

The following non-security bugs were fixed:

- bsc#922710: Prevent rsyncd from spamming the log when trying to register SLP.
- bsc#898513: slp support broke rsync usage.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-19"/>
	<updated date="2016-01-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/898513">SUSE bug 898513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900914">SUSE bug 900914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915410">SUSE bug 915410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922710">SUSE bug 922710</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8242/">CVE-2014-8242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515701" comment="rsync-3.1.0-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77528" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="962189" ref_url="https://bugzilla.suse.com/962189" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8704" ref_url="https://www.suse.com/security/cve/CVE-2015-8704/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00019.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- CVE-2015-8704: Specific APL data allowed remote attacker to trigger a crash in certain configurations (bsc#962189)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-19"/>
	<updated date="2016-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/962189">SUSE bug 962189</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8704/">CVE-2015-8704</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516261" comment="bind-libs-9.9.6P1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516262" comment="bind-libs-32bit-9.9.6P1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516263" comment="bind-utils-9.9.6P1-35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77529" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="987394" ref_url="https://bugzilla.suse.com/987394" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6153" ref_url="https://www.suse.com/security/cve/CVE-2016-6153/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002175.html" source="SUSE-SU"/>
		<description>

This update for sqlite3 fixes the following issues: 

The following security issue was fixed:
- CVE-2016-6153: Fixed a tempdir selection vulnerability (bsc#987394)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-03"/>
	<updated date="2016-08-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/987394">SUSE bug 987394</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6153/">CVE-2016-6153</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516264" comment="libsqlite3-0-3.8.10.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516265" comment="libsqlite3-0-32bit-3.8.10.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516266" comment="sqlite3-3.8.10.2-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77530" version="1" class="patch">
	<metadata>
		<title>Security update for gimp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="986021" ref_url="https://bugzilla.suse.com/986021" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4994" ref_url="https://www.suse.com/security/cve/CVE-2016-4994/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002178.html" source="SUSE-SU"/>
		<description>
gimp was updated to fix one security issue.

This security issue was fixed:
- CVE-2016-4994: Use-after-free vulnerabilities in the channel and layer properties parsing process (bsc#986021).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-04"/>
	<updated date="2016-08-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/986021">SUSE bug 986021</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4994/">CVE-2016-4994</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516267" comment="gimp-2.8.10-7.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516268" comment="gimp-lang-2.8.10-7.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516269" comment="gimp-plugins-python-2.8.10-7.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516270" comment="libgimp-2_0-0-2.8.10-7.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516271" comment="libgimpui-2_0-0-2.8.10-7.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77531" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="960674" ref_url="https://bugzilla.suse.com/960674" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8710" ref_url="https://www.suse.com/security/cve/CVE-2015-8710/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001814.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following security issue:

- CVE-2015-8710: Parsing short unclosed HTML comment could cause uninitialized memory access, which allowed remote attackers to read contents from previous HTTP requests depending on the application (bsc#960674)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-20"/>
	<updated date="2016-01-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960674">SUSE bug 960674</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8710/">CVE-2015-8710</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515702" comment="libxml2-2-2.9.1-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515703" comment="libxml2-2-32bit-2.9.1-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515704" comment="libxml2-tools-2.9.1-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515705" comment="python-libxml2-2.9.1-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77532" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="982366" ref_url="https://bugzilla.suse.com/982366" source="BUGZILLA"/>
		<reference ref_id="984684" ref_url="https://bugzilla.suse.com/984684" source="BUGZILLA"/>
		<reference ref_id="988651" ref_url="https://bugzilla.suse.com/988651" source="BUGZILLA"/>
		<reference ref_id="989722" ref_url="https://bugzilla.suse.com/989722" source="BUGZILLA"/>
		<reference ref_id="989723" ref_url="https://bugzilla.suse.com/989723" source="BUGZILLA"/>
		<reference ref_id="989725" ref_url="https://bugzilla.suse.com/989725" source="BUGZILLA"/>
		<reference ref_id="989727" ref_url="https://bugzilla.suse.com/989727" source="BUGZILLA"/>
		<reference ref_id="989728" ref_url="https://bugzilla.suse.com/989728" source="BUGZILLA"/>
		<reference ref_id="989729" ref_url="https://bugzilla.suse.com/989729" source="BUGZILLA"/>
		<reference ref_id="989730" ref_url="https://bugzilla.suse.com/989730" source="BUGZILLA"/>
		<reference ref_id="989731" ref_url="https://bugzilla.suse.com/989731" source="BUGZILLA"/>
		<reference ref_id="989732" ref_url="https://bugzilla.suse.com/989732" source="BUGZILLA"/>
		<reference ref_id="989733" ref_url="https://bugzilla.suse.com/989733" source="BUGZILLA"/>
		<reference ref_id="989734" ref_url="https://bugzilla.suse.com/989734" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3458" ref_url="https://www.suse.com/security/cve/CVE-2016-3458/" source="CVE"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<reference ref_id="CVE-2016-3498" ref_url="https://www.suse.com/security/cve/CVE-2016-3498/" source="CVE"/>
		<reference ref_id="CVE-2016-3500" ref_url="https://www.suse.com/security/cve/CVE-2016-3500/" source="CVE"/>
		<reference ref_id="CVE-2016-3503" ref_url="https://www.suse.com/security/cve/CVE-2016-3503/" source="CVE"/>
		<reference ref_id="CVE-2016-3508" ref_url="https://www.suse.com/security/cve/CVE-2016-3508/" source="CVE"/>
		<reference ref_id="CVE-2016-3511" ref_url="https://www.suse.com/security/cve/CVE-2016-3511/" source="CVE"/>
		<reference ref_id="CVE-2016-3550" ref_url="https://www.suse.com/security/cve/CVE-2016-3550/" source="CVE"/>
		<reference ref_id="CVE-2016-3598" ref_url="https://www.suse.com/security/cve/CVE-2016-3598/" source="CVE"/>
		<reference ref_id="CVE-2016-3606" ref_url="https://www.suse.com/security/cve/CVE-2016-3606/" source="CVE"/>
		<reference ref_id="CVE-2016-3610" ref_url="https://www.suse.com/security/cve/CVE-2016-3610/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_0-openjdk fixes the following issues:

- Update to 2.6.7 - OpenJDK 7u111
  * Security fixes
    - S8079718, CVE-2016-3458: IIOP Input Stream Hooking
      (bsc#989732)
    - S8145446, CVE-2016-3485: Perfect pipe placement (Windows
      only)  (bsc#989734)
    - S8147771: Construction of static protection domains under
      Javax custom policy
    - S8148872, CVE-2016-3500: Complete name checking (bsc#989730)
    - S8149962, CVE-2016-3508: Better delineation of XML processing
      (bsc#989731)
    - S8150752: Share Class Data
    - S8151925: Font reference improvements
    - S8152479, CVE-2016-3550: Coded byte streams (bsc#989733)
    - S8155981, CVE-2016-3606: Bolster bytecode verification
      (bsc#989722)
    - S8155985, CVE-2016-3598: Persistent Parameter Processing
      (bsc#989723)
    - S8158571, CVE-2016-3610: Additional method handle validation
      (bsc#989725)
    - CVE-2016-3511 (bsc#989727)
    - CVE-2016-3503 (bsc#989728)
    - CVE-2016-3498 (bsc#989729)
  * Import of OpenJDK 7 u111 build 0
    - S6953295: Move few sun.security.{util, x509, pkcs} classes
      used by keytool/jarsigner to another package
    - S7060849: Eliminate pack200 build warnings
    - S7064075: Security libraries don't build with
      javac -Xlint:all,-deprecation -Werror
    - S7069870: Parts of the JDK erroneously rely on generic array
      initializers with diamond
    - S7102686: Restructure timestamp code so that jars and modules
      can more easily share the same code
    - S7105780: Add SSLSocket client/SSLEngine server to templates
      directory
    - S7142339: PKCS7.java is needlessly creating SHA1PRNG
      SecureRandom instances when timestamping is not done
    - S7152582: PKCS11 tests should use the NSS libraries available
      in the OS
    - S7192202: Make sure keytool prints both unknown and
      unparseable extensions
    - S7194449: String resources for Key Tool and Policy Tool
      should be in their respective packages
    - S7196855: autotest.sh fails on ubuntu because libsoftokn.so
      not found
    - S7200682: TEST_BUG: keytool/autotest.sh still has problems
      with libsoftokn.so
    - S8002306: (se) Selector.open fails if invoked with thread
      interrupt status set [win]
    - S8009636: JARSigner including TimeStamp PolicyID
      (TSAPolicyID) as defined in RFC3161
    - S8019341: Update CookieHttpsClientTest to use the newer
      framework.
    - S8022228: Intermittent test failures in
      sun/security/ssl/javax/net/ssl/NewAPIs
    - S8022439: Fix lint warnings in sun.security.ec
    - S8022594: Potential deadlock in &lt;clinit&gt; of
      sun.nio.ch.Util/IOUtil
    - S8023546: sun/security/mscapi/ShortRSAKey1024.sh fails
      intermittently
    - S8036612: [parfait] JNI exception pending in
      jdk/src/windows/native/sun/security/mscapi/security.cpp
    - S8037557: test SessionCacheSizeTests.java timeout
    - S8038837: Add support to jarsigner for specifying timestamp
      hash algorithm
    - S8079410: Hotspot version to share the same update and build
      version from JDK
    - S8130735: javax.swing.TimerQueue: timer fires late when
      another timer starts
    - S8139436: sun.security.mscapi.KeyStore might load incomplete
      data
    - S8144313: Test SessionTimeOutTests can be timeout
    - S8146387: Test SSLSession/SessionCacheSizeTests socket
      accept timed out
    - S8146669: Test SessionTimeOutTests fails intermittently
    - S8146993: Several javax/management/remote/mandatory regression
      tests fail after JDK-8138811
    - S8147857: [TEST] RMIConnector logs attribute names incorrectly
    - S8151841, PR3098: Build needs additional flags to compile
      with GCC 6
    - S8151876: (tz) Support tzdata2016d
    - S8157077: 8u101 L10n resource file updates
    - S8161262: Fix jdk build with gcc 4.1.2: -fno-strict-overflow
      not known.
  * Import of OpenJDK 7 u111 build 1
    - S7081817: test/sun/security/provider/certpath/X509CertPath/IllegalCertificates.java failing
    - S8140344: add support for 3 digit update release numbers
    - S8145017: Add support for 3 digit hotspot minor version
      numbers
    - S8162344: The API changes made by CR 7064075 need to be
      reverted
  * Backports
    - S2178143, PR2958: JVM crashes if the number of bound CPUs
      changed during runtime
    - S4900206, PR3101: Include worst-case rounding tests for Math
      library functions
    - S6260348, PR3067: GTK+ L&amp;F JTextComponent not respecting
      desktop caret blink rate
    - S6934604, PR3075: enable parts of EliminateAutoBox by default
    - S7043064, PR3020: sun/java2d/cmm/ tests failed against
      RI b141 &amp; b138-nightly
    - S7051394, PR3020: NullPointerException when running
      regression tests LoadProfileTest by using openjdk-7-b144
    - S7086015, PR3013: fix
      test/tools/javac/parser/netbeans/JavacParserTest.java
    - S7119487, PR3013: JavacParserTest.java test fails on Windows
      platforms
    - S7124245, PR3020: [lcms] ColorConvertOp to color space
      CS_GRAY apparently converts orange to 244,244,0
    - S7159445, PR3013: (javac) emits inaccurate diagnostics for
      enhanced for-loops
    - S7175845, PR1437, RH1207129: 'jar uf' changes file
      permissions unexpectedly
    - S8005402, PR3020: Need to provide benchmarks for color
      management
    - S8005530, PR3020: [lcms] Improve performance of ColorConverOp
      for default destinations
    - S8005930, PR3020: [lcms] ColorConvertOp: Alpha channel is not
      transferred from source to destination.
    - S8013430, PR3020: REGRESSION:
      closed/java/awt/color/ICC_Profile/LoadProfileTest/LoadProfileTest.java
      fails with java.io.StreamCorruptedException: invalid type
      code: EE since 8b87
    - S8014286, PR3075: failed java/lang/Math/DivModTests.java
      after 6934604 changes
    - S8014959, PR3075: assert(Compile::current()-&gt;live_nodes() &lt; (uint)MaxNodeLimit)
      failed: Live Node limit exceeded limit
    - S8019247, PR3075: SIGSEGV in compiled method
      c8e.e.t_.getArray(Ljava/lang/Class;)[Ljava/lang/Object
    - S8024511, PR3020: Crash during color profile destruction
    - S8025429, PR3020: [parfait] warnings from b107 for
      sun.java2d.cmm: JNI exception pending
    - S8026702, PR3020: Fix for 8025429 breaks jdk build on windows
    - S8026780, PR3020, RH1142587: Crash on PPC and PPC v2 for
      Java_awt test suit
    - S8047066, PR3020: Test test/sun/awt/image/bug8038000.java
      fails with ClassCastException
    - S8069181, PR3012, RH1015612: java.lang.AssertionError when
      compiling JDK 1.4 code in JDK 8
    - S8158260, PR2992, RH1341258: PPC64: unaligned Unsafe.getInt
      can lead to the generation of illegal instructions (bsc#988651)
    - S8159244, PR3075: Partially initialized string object created
      by C2's string concat optimization may escape
  * Bug fixes
    - PR2799, RH1195203: Files are missing from resources.jar
    - PR2900: Don't use WithSeed versions of NSS functions as they
      don't fully process the seed
    - PR3091: SystemTap is heavily confused by multiple JDKs
    - PR3102: Extend 8022594 to AixPollPort
    - PR3103: Handle case in clean-fonts where
      linux.fontconfig.Gentoo.properties.old has not been created
    - PR3111: Provide option to disable SystemTap tests
    - PR3114: Don't assume system mime.types supports
      text/x-java-source
    - PR3115: Add check for elliptic curve cryptography
      implementation
    - PR3116: Add tests for Java debug info and source files
    - PR3118: Path to agpl-3.0.txt not updated
    - PR3119: Makefile handles cacerts as a symlink, but the
      configure check doesn't
  * AArch64 port
    - S8148328, PR3100: aarch64: redundant lsr instructions in stub
      code.
    - S8148783, PR3100: aarch64: SEGV running SpecJBB2013
    - S8148948, PR3100: aarch64: generate_copy_longs calls align()
      incorrectly
    - S8150045, PR3100: arraycopy causes segfaults in SATB during
      garbage collection
    - S8154537, PR3100: AArch64: some integer rotate instructions
      are never emitted
    - S8154739, PR3100: AArch64: TemplateTable::fast_xaccess loads
      in wrong mode
    - S8157906, PR3100: aarch64: some more integer rotate
      instructions are never emitted
- Enable SunEC for SLE12 and Leap (bsc#982366)

- Fix aarch64 running with 48 bits va space (bsc#984684)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-09"/>
	<updated date="2016-08-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/982366">SUSE bug 982366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984684">SUSE bug 984684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988651">SUSE bug 988651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989722">SUSE bug 989722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989723">SUSE bug 989723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989725">SUSE bug 989725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989727">SUSE bug 989727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989728">SUSE bug 989728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989729">SUSE bug 989729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989730">SUSE bug 989730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989731">SUSE bug 989731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989732">SUSE bug 989732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989733">SUSE bug 989733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989734">SUSE bug 989734</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3458/">CVE-2016-3458</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3498/">CVE-2016-3498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3500/">CVE-2016-3500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3503/">CVE-2016-3503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3508/">CVE-2016-3508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3511/">CVE-2016-3511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3550/">CVE-2016-3550</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3598/">CVE-2016-3598</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-3606/">CVE-2016-3606</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3610/">CVE-2016-3610</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516272" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516273" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77533" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="984684" ref_url="https://bugzilla.suse.com/984684" source="BUGZILLA"/>
		<reference ref_id="987895" ref_url="https://bugzilla.suse.com/987895" source="BUGZILLA"/>
		<reference ref_id="988651" ref_url="https://bugzilla.suse.com/988651" source="BUGZILLA"/>
		<reference ref_id="989721" ref_url="https://bugzilla.suse.com/989721" source="BUGZILLA"/>
		<reference ref_id="989722" ref_url="https://bugzilla.suse.com/989722" source="BUGZILLA"/>
		<reference ref_id="989723" ref_url="https://bugzilla.suse.com/989723" source="BUGZILLA"/>
		<reference ref_id="989725" ref_url="https://bugzilla.suse.com/989725" source="BUGZILLA"/>
		<reference ref_id="989726" ref_url="https://bugzilla.suse.com/989726" source="BUGZILLA"/>
		<reference ref_id="989727" ref_url="https://bugzilla.suse.com/989727" source="BUGZILLA"/>
		<reference ref_id="989728" ref_url="https://bugzilla.suse.com/989728" source="BUGZILLA"/>
		<reference ref_id="989729" ref_url="https://bugzilla.suse.com/989729" source="BUGZILLA"/>
		<reference ref_id="989730" ref_url="https://bugzilla.suse.com/989730" source="BUGZILLA"/>
		<reference ref_id="989731" ref_url="https://bugzilla.suse.com/989731" source="BUGZILLA"/>
		<reference ref_id="989732" ref_url="https://bugzilla.suse.com/989732" source="BUGZILLA"/>
		<reference ref_id="989733" ref_url="https://bugzilla.suse.com/989733" source="BUGZILLA"/>
		<reference ref_id="989734" ref_url="https://bugzilla.suse.com/989734" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3458" ref_url="https://www.suse.com/security/cve/CVE-2016-3458/" source="CVE"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<reference ref_id="CVE-2016-3498" ref_url="https://www.suse.com/security/cve/CVE-2016-3498/" source="CVE"/>
		<reference ref_id="CVE-2016-3500" ref_url="https://www.suse.com/security/cve/CVE-2016-3500/" source="CVE"/>
		<reference ref_id="CVE-2016-3503" ref_url="https://www.suse.com/security/cve/CVE-2016-3503/" source="CVE"/>
		<reference ref_id="CVE-2016-3508" ref_url="https://www.suse.com/security/cve/CVE-2016-3508/" source="CVE"/>
		<reference ref_id="CVE-2016-3511" ref_url="https://www.suse.com/security/cve/CVE-2016-3511/" source="CVE"/>
		<reference ref_id="CVE-2016-3550" ref_url="https://www.suse.com/security/cve/CVE-2016-3550/" source="CVE"/>
		<reference ref_id="CVE-2016-3552" ref_url="https://www.suse.com/security/cve/CVE-2016-3552/" source="CVE"/>
		<reference ref_id="CVE-2016-3587" ref_url="https://www.suse.com/security/cve/CVE-2016-3587/" source="CVE"/>
		<reference ref_id="CVE-2016-3598" ref_url="https://www.suse.com/security/cve/CVE-2016-3598/" source="CVE"/>
		<reference ref_id="CVE-2016-3606" ref_url="https://www.suse.com/security/cve/CVE-2016-3606/" source="CVE"/>
		<reference ref_id="CVE-2016-3610" ref_url="https://www.suse.com/security/cve/CVE-2016-3610/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" source="SUSE-SU"/>
		<description>

This update for java-1_8_0-openjdk fixes the following issues:

- Upgrade to version jdk8u101 (icedtea 3.1.0)
- New in release 3.1.0 (2016-07-25):
  * Security fixes
    - S8079718, CVE-2016-3458: IIOP Input Stream Hooking
      (bsc#989732)
    - S8145446, CVE-2016-3485: Perfect pipe placement (Windows
      only) (bsc#989734)
    - S8146514: Enforce GCM limits
    - S8147771: Construction of static protection domains under
      Javax custom policy
    - S8148872, CVE-2016-3500: Complete name checking (bsc#989730)
    - S8149070: Enforce update ordering
    - S8149962, CVE-2016-3508: Better delineation of XML processing
      (bsc#989731)
    - S8150752: Share Class Data
    - S8151925: Font reference improvements
    - S8152479, CVE-2016-3550: Coded byte streams (bsc#989733)
    - S8153312: Constrain AppCDS behavior
    - S8154475, CVE-2016-3587: Clean up lookup visibility
      (bsc#989721)
    - S8155981, CVE-2016-3606: Bolster bytecode verification
      (bsc#989722)
    - S8155985, CVE-2016-3598: Persistent Parameter Processing
      (bsc#989723)
    - S8158571, CVE-2016-3610: Additional method handle validation
      (bsc#989725)
    - CVE-2016-3552 (bsc#989726)
    - CVE-2016-3511 (bsc#989727)
    - CVE-2016-3503 (bsc#989728)
    - CVE-2016-3498 (bsc#989729)
  * New features
    - S8145547, PR1061: [AWT/Swing] Conditional support for GTK 3
      on Linux
    - PR2821: Support building OpenJDK with --disable-headful
    - PR2931, G478960: Provide Infinality Support via fontconfig
    - PR3079: Provide option to build Shenandoah on x86_64
  * Import of OpenJDK 8 u92 build 14
    - S6869327: Add new C2 flag to keep safepoints in counted
      loops.
    - S8022865: [TESTBUG] Compressed Oops testing needs to be
      revised
    - S8029630: Thread id should be displayed as a hex number in
      error report
    - S8029726: On OS X some dtrace probe names are mismatched with
      Solaris
    - S8029727: On OS X dtrace probes
      Call&lt;type&gt;MethodA/Call&lt;type&gt;MethodV are not fired.
    - S8029728: On OS X dtrace probes SetStaticBooleanField are not
      fired
    - S8038184: XMLSignature throws StringIndexOutOfBoundsException
      if ID attribute value is empty String
    - S8038349: Signing XML with DSA throws Exception when key is
      larger than 1024 bits
    - S8041501: ImageIO reader is not capable of reading JPEGs
      without JFIF header
    - S8041900: [macosx] Java forces the use of discrete GPU
    - S8044363: Remove special build options for unpack200 executable
    - S8046471: Use OPENJDK_TARGET_CPU_ARCH instead of legacy value
      for hotspot ARCH
    - S8046611: Build errors with gcc on sparc/fastdebug
    - S8047763: Recognize sparc64 as a sparc platform
    - S8048232: Fix for 8046471 breaks PPC64 build
    - S8052396: Catch exceptions resulting from missing font cmap
    - S8058563: InstanceKlass::_dependencies list isn't cleared from
      empty nmethodBucket entries
    - S8061624: [TESTBUG] Some tests cannot be ran under compact
      profiles and therefore shall be excluded
    - S8062901: Iterators is spelled incorrectly in the Javadoc for
      Spliterator
    - S8064330: Remove SHA224 from the default support list if
      SunMSCAPI enabled
    - S8065579: WB method to start G1 concurrent mark cycle should
      be introduced
    - S8065986: Compiler fails to NullPointerException when calling
      super with Object&lt;&gt;()
    - S8066974: Compiler doesn't infer method's generic type
      information in lambda body
    - S8067800: Clarify java.time.chrono.Chronology.isLeapYear for
      out of range years
    - S8068033: JNI exception pending in jdk/src/share/bin/java.c
    - S8068042: Check jdk/src/share/native/sun/misc/URLClassPath.c
      for JNI pending
    - S8068162: jvmtiRedefineClasses.cpp: guarantee(false) failed:
      OLD and/or OBSOLETE method(s) found
    - S8068254: Method reference uses wrong qualifying type
    - S8074696: Remote debugging session hangs for several minutes
      when calling findBootType
    - S8074935: jdk8 keytool doesn't validate pem files for RFC 1421
      correctness, as jdk7 did
    - S8078423: [TESTBUG] javax/print/PrintSEUmlauts/PrintSEUmlauts.java
      relies on system locale
    - S8080492: [Parfait] Uninitialised variable in
      jdk/src/java/desktop/windows/native/libawt/
    - S8080650: Enable stubs to use frame pointers correctly
    - S8122944: perfdata used is seen as too high on sparc zone with
      jdk1.9 and causes a test failure
    - S8129348: Debugger hangs in trace mode with TRACE_SENDS
    - S8129847: Compiling methods generated by Nashorn triggers high
      memory usage in C2
    - S8130506: javac AssertionError when invoking
      MethodHandle.invoke with lambda parameter
    - S8130910: hsperfdata file is created in wrong directory and
      not cleaned up if /tmp/hsperfdata_&lt;username&gt; has wrong permissions
    - S8131129: Attempt to define a duplicate BMH$Species class
    - S8131665: Bad exception message in HandshakeHash.getFinishedHash
    - S8131782: C1 Class.cast optimization breaks when Class is
      loaded from static final
    - S8132503: [macosx] Chinese full stop symbol cannot be entered
      with Pinyin IM on OS X
    - S8133207: ParallelProbes.java test fails after changes for
      JDK-8080115
    - S8133924: NPE may be thrown when xsltc select a non-existing
      node after JDK-8062518
    - S8134007: Improve string folding
    - S8134759: jdb: Incorrect stepping inside finally block
    - S8134963: [Newtest] New stress test for changing the coarseness
      level of G1 remembered set
    - S8136442: Don't tie Certificate signature algorithms to
      ciphersuites
    - S8137106: EUDC (End User Defined Characters) are not displayed
      on Windows with Java 8u60+
    - S8138745: Implement ExitOnOutOfMemory and CrashOnOutOfMemory
      in HotSpot
    - S8138764: In some cases the usage of TreeLock can be replaced
      by other synchronization
    - S8139373: [TEST_BUG] java/net/MulticastSocket/MultiDead.java
      failed with timeout
    - S8139424: SIGSEGV, Problematic frame: # V [libjvm.so+0xd0c0cc]
      void InstanceKlass::oop_oop_iterate_oop_maps_specialized&lt;true,oopDesc*,MarkAndPushClosure&gt;
    - S8139436: sun.security.mscapi.KeyStore might load incomplete
      data
    - S8139751: Javac crash with -XDallowStringFolding=false
    - S8139863: [TESTBUG] Need to port tests for JDK-8134903 to
      8u-dev
    - S8139985: JNI exception pending in
      jdk/src/jdk/hprof/agent/share/native/libhprof
    - S8140031: SA: Searching for a value in Threads does not work
    - S8140249: JVM Crashing During startUp If Flight Recording is
      enabled
    - S8140344: add support for 3 digit update release numbers
    - S8140587: Atomic*FieldUpdaters should use Class.isInstance
      instead of direct class check
    - S8141260: isReachable crash in windows xp
    - S8143297: Nashorn compilation time reported in nanoseconds
    - S8143397: It looks like InetAddress.isReachable(timeout) works
      incorrectly
    - S8143855: Bad printf formatting in frame_zero.cpp
    - S8143896: java.lang.Long is implicitly converted to double
    - S8143963: improve ClassLoader::trace_class_path to accept an
      additional outputStream* arg
    - S8144020: Remove long as an internal numeric type
    - S8144131: ArrayData.getInt implementations do not convert to
      int32
    - S8144483: One long Safepoint pause directly after each GC log
      rotation
    - S8144487: PhaseIdealLoop::build_and_optimize() must restore
      major_progress flag if skip_loop_opts is true
    - S8144885: agent/src/os/linux/libproc.h needs to support
      Linux/SPARC builds
    - S8144935: C2: safepoint is pruned from a non-counted loop
    - S8144937: [TEST_BUG] testlibrary_tests should be excluded for
      compact1 and compact2 execution
    - S8145017: Add support for 3 digit hotspot minor version numbers
    - S8145099: Better error message when SA can't attach to a process
    - S8145442: Add the facility to verify remembered sets for G1
    - S8145466: javac: No line numbers in compilation error
    - S8145539: (coll) AbstractMap.keySet and .values should not be
      volatile
    - S8145550: Megamorphic invoke should use CompiledFunction
      variants without any LinkLogic
    - S8145669: apply2call optimized callsite fails after becoming
      megamorphic
    - S8145722: NullPointerException in javadoc
    - S8145754: PhaseIdealLoop::is_scaled_iv_plus_offset() does not
      match AddI
    - S8146147: Java linker indexed property getter does not work
      for computed nashorn string
    - S8146566: OpenJDK build can't handle commas in LDFLAGS
    - S8146725: Issues with SignatureAndHashAlgorithm.getSupportedAlgorithms
    - S8146979: Backport of 8046471 breaks ppc64 build in jdk8u
      because 8072383 was badly backported before
    - S8147087: Race when reusing PerRegionTable bitmaps may result
      in dropped remembered set entries
    - S8147630: Wrong test result pushed to 8u-dev
    - S8147845: Varargs Array functions still leaking longs
    - S8147857: RMIConnector logs attribute names incorrectly
    - S8148353: [linux-sparc] Crash in libawt.so on Linux SPARC
    - S8150791: 8u76 L10n resource file translation update
  * Import of OpenJDK 8 u101 build 13
    - S6483657: MSCAPI provider does not create unique alias names
    - S6675699: need comprehensive fix for unconstrained ConvI2L
      with narrowed type
    - S8037557: test SessionCacheSizeTests.java timeout
    - S8038837: Add support to jarsigner for specifying timestamp
      hash algorithm
    - S8081778: Use Intel x64 CPU instructions for RSA acceleration
    - S8130150: Implement BigInteger.montgomeryMultiply intrinsic
    - S8130735: javax.swing.TimerQueue: timer fires late when
      another timer starts
    - S8143913: MSCAPI keystore should accept Certificate[] in
      setEntry()
    - S8144313: Test SessionTimeOutTests can be timeout
    - S8146240: Three nashorn files contain 'GNU General Public
      License' header
    - S8146387: Test SSLSession/SessionCacheSizeTests socket accept
      timed out
    - S8146669: Test SessionTimeOutTests fails intermittently
    - S8146993: Several javax/management/remote/mandatory regression
      tests fail after JDK-8138811
    - S8147994: [macosx] JScrollPane jitters up/down during trackpad
      scrolling on MacOS/Aqua
    - S8151522: Disable 8130150 and 8081778 intrinsics by default
    - S8151876: (tz) Support tzdata2016d
    - S8152098: Fix 8151522 caused test
      compiler/intrinsics/squaretolen/TestSquareToLen.java to fail
    - S8157077: 8u101 L10n resource file updates
  * Backports
    - S6260348, PR3066: GTK+ L&amp;F JTextComponent not respecting
      desktop caret blink rate
    - S6778087, PR1061: getLocationOnScreen() always returns (0, 0)
      for mouse wheel events
    - S6961123, PR2972: setWMClass fails to null-terminate WM_CLASS
      string
    - S8008657, PR3077: JSpinner setComponentOrientation doesn't
      affect on text orientation
    - S8014212, PR2866: Robot captures black screen
    - S8029339, PR1061: Custom MultiResolution image support on
      HiDPI displays
    - S8031145, PR3077: Re-examine closed i18n tests to see it they
      can be moved to the jdk repository.
    - S8034856, PR3095: gcc warnings compiling
      src/solaris/native/sun/security/pkcs11
    - S8034857, PR3095: gcc warnings compiling
      src/solaris/native/sun/management
    - S8035054, PR3095: JarFacade.c should not include ctype.h
    - S8035287, PR3095: gcc warnings compiling various libraries
      files
    - S8038631, PR3077: Create wrapper for awt.Robot with additional
      functionality
    - S8039279, PR3077: Move awt tests to openjdk repository
    - S8041561, PR3077: Inconsistent opacity behaviour between
      JCheckBox and JRadioButton
    - S8041592, PR3077: [TEST_BUG] Move 42 AWT hw/lw mixing tests
      to jdk
    - S8041915, PR3077: Move 8 awt tests to OpenJDK regression
      tests tree
    - S8043126, PR3077: move awt automated functional tests from
      AWT_Events/Lw and AWT_Events/AWT to OpenJDK repository
    - S8043131, PR3077: Move ShapedAndTranslucentWindows and GC
      functional AWT tests to regression tree
    - S8044157, PR3077: [TEST_BUG] Improve recently submitted
      AWT_Mixing tests
    - S8044172, PR3077: [TEST_BUG] Move regtests for 4523758 and
      AltPlusNumberKeyCombinationsTest to jdk
    - S8044429, PR3077: move awt automated tests for AWT_Modality
      to OpenJDK repository
    - S8044762, PR2960: com/sun/jdi/OptionTest.java test time out
    - S8044765, PR3077: Move functional tests
      AWT_SystemTray/Automated to openjdk repository
    - S8047180, PR3077: Move functional tests AWT_Headless/Automated
      to OpenJDK repository
    - S8047367, PR3077: move awt automated tests from AWT_Modality
      to OpenJDK repository - part 2
    - S8048246, PR3077: Move AWT_DnD/Clipboard/Automated functional
      tests to OpenJDK
    - S8049226, PR2960: com/sun/jdi/OptionTest.java test times out
      again
    - S8049617, PR3077: move awt automated tests from AWT_Modality
      to OpenJDK repository - part 3
    - S8049694, PR3077: Migrate functional
      AWT_DesktopProperties/Automated tests to OpenJDK
    - S8050885, PR3077: move awt automated tests from AWT_Modality
      to OpenJDK repository - part 4
    - S8051440, PR3077: move tests about maximizing undecorated to
      OpenJDK
    - S8052012, PR3077: move awt automated tests from AWT_Modality
      to OpenJDK repository - part 5
    - S8052408, PR3077: Move AWT_BAT functional tests to OpenJDK (3
      of 3)
    - S8053657, PR3077: [TEST_BUG] move some 5 tests related to
      undecorated Frame/JFrame to JDK
    - S8054143, PR3077: move awt automated tests from AWT_Modality
      to OpenJDK repository - part 6
    - S8054358, PR3077: move awt automated tests from AWT_Modality
      to OpenJDK repository - part 7
    - S8054359, PR3077: move awt automated tests from AWT_Modality
      to OpenJDK repository - part 8
    - S8055360, PR3077: Move the rest part of AWT
      ShapedAndTranslucent tests to OpenJDK
    - S8055664, PR3077: move 14 tests about setLocationRelativeTo
      to jdk
    - S8055836, PR3077: move awt tests from AWT_Modality to OpenJDK
      repository - part 9
    - S8056911, PR3077: Remove internal API usage from ExtendedRobot
      class
    - S8057694, PR3077: move awt tests from AWT_Modality to OpenJDK
      repository - part 10
    - S8058959, PR1061: closed/java/awt/event/ComponentEvent/MovedResizedTwiceTest/MovedResizedTwiceTest.java
      failed automatically
    - S8062606, PR3077: Fix a typo in java.awt.Robot class
    - S8063102, PR3077: Change open awt regression tests to avoid
      sun.awt.SunToolkit.realSync, part 1
    - S8063104, PR3077: Change open awt regression tests to avoid
      sun.awt.SunToolkit.realSync, part 2
    - S8063106, PR3077: Change open swing regression tests to avoid
      sun.awt.SunToolkit.realSync, part 1
    - S8063107, PR3077: Change open swing regression tests to avoid
      sun.awt.SunToolkit.realSync, part 2
    - S8064573, PR3077: [TEST_BUG] javax/swing/text/AbstractDocument/6968363/Test6968363.java
      is asocial pressing VK_LEFT and not releasing
    - S8064575, PR3077: [TEST_BUG] javax/swing/JEditorPane/6917744/bug6917744.java
      100 times press keys and never releases
    - S8064809, PR3077: [TEST_BUG] javax/swing/JComboBox/4199622/bug4199622.java
      contains a lot of keyPress and not a single keyRelease
    - S8067441, PR3077: Some tests fails with error: cannot find symbol
      getSystemMnemonicKeyCodes()
    - S8068228, PR3077: Test closed/java/awt/Mouse/MaximizedFrameTest/MaximizedFrameTest
      fails with GTKLookAndFeel
    - S8069361, PR1061: SunGraphics2D.getDefaultTransform() does not
      include scale factor
    - S8073320, PR1061: Windows HiDPI Graphics support
    - S8074807, PR3077: Fix some tests unnecessary using internal API
    - S8076315, PR3077: move 4 manual functional swing tests to
      regression suite
    - S8078504, PR3094: Zero lacks declaration of
      VM_Version::initialize()
    - S8129822, PR3077: Define 'headful' jtreg keyword
    - S8132123, PR1061: MultiResolutionCachedImage unnecessarily
      creates base image to get its size
    - S8133539, PR1061: [TEST_BUG] Split
      java/awt/image/MultiResolutionImageTest.java in two to allow
      restricted access
    - S8137571, PR1061: Linux HiDPI Graphics support
    - S8142406, PR1061: [TEST] MultiResolution image: need test to
      cover the case when @2x image is corrupted
    - S8145188, PR2945: No LocalVariableTable generated for the
      entire JDK
    - S8150258, PR1061: [TEST] HiDPI: create a test for
      multiresolution menu items icons
    - S8150724, PR1061: [TEST] HiDPI: create a test for
      multiresolution icons
    - S8150844, PR1061: [hidpi] [macosx] -Dsun.java2d.uiScale should
      be taken into account for OS X
    - S8151841, PR2882: Build needs additional flags to compile with
      GCC 6 [plus parts of 8149647 &amp; 8032045]
    - S8155613, PR1061: [PIT] crash in
      AWT_Desktop/Automated/Exceptions/BasicTest
    - S8156020, PR1061: 8145547 breaks AIX and and uses RTLD_NOLOAD
      incorrectly
    - S8156128, PR1061: Tests for [AWT/Swing] Conditional support
      for GTK 3 on Linux
    - S8158260, PR2991, RH1341258: PPC64: unaligned Unsafe.getInt
      can lead to the generation of illegal instructions (bsc#988651)
    - S8159244, PR3074: Partially initialized string object created
      by C2's string concat optimization may escape
    - S8159690, PR3077: [TESTBUG] Mark headful tests with @key
      headful.
    - S8160294, PR2882, PR3095: Some client libraries cannot be
      built with GCC 6
  * Bug fixes
    - PR1958: GTKLookAndFeel does not honor
      gtk-alternative-button-order
    - PR2822: Feed LIBS &amp; CFLAGS into configure rather than make to
      avoid re-discovery by OpenJDK configure
    - PR2932: Support ccache in a non-automagic manner
    - PR2933: Support ccache 3.2 and later
    - PR2964: Set system defaults based on OS
    - PR2974, RH1337583: PKCS#10 certificate requests now use CRLF
      line endings rather than system line endings
    - PR3078: Remove duplicated line dating back to 6788347 and
      6894807
    - PR3083, RH1346460: Regression in SSL debug output without an
      ECC provider
    - PR3089: Remove old memory limits patch
    - PR3090, RH1204159: SystemTap is heavily confused by multiple
      JDKs
    - PR3095: Fix warnings in URLClassPath.c
    - PR3096: Remove dead --disable-optimizations option
    - PR3105: Use version from hotspot.map to create tarball filename
    - PR3106: Handle both correctly-spelt property
      'enableCustomValueHandler' introduced by S8079718 and typo
      version
    - PR3108: Shenandoah patches not included in release tarball
    - PR3110: Update hotspot.map documentation in INSTALL
  * AArch64 port
    - S8145320, PR3078: Create unsafe_arraycopy and
      generic_arraycopy for AArch64
    - S8148328, PR3078: aarch64: redundant lsr instructions in stub
      code.
    - S8148783, PR3078: aarch64: SEGV running SpecJBB2013
    - S8148948, PR3078: aarch64: generate_copy_longs calls align()
      incorrectly
    - S8149080, PR3078: AArch64: Recognise disjoint array copy in
      stub code
    - S8149365, PR3078: aarch64: memory copy does not prefetch on
      backwards copy
    - S8149907, PR3078: aarch64: use load/store pair instructions
      in call_stub
    - S8150038, PR3078: aarch64: make use of CBZ and CBNZ when
      comparing narrow pointer with zero
    - S8150045, PR3078: arraycopy causes segfaults in SATB during
      garbage collection
    - S8150082, PR3078: aarch64: optimise small array copy
    - S8150229, PR3078: aarch64: pipeline class for several
      instructions is not set correctly
    - S8150313, PR3078: aarch64: optimise array copy using SIMD
      instructions
    - S8150394, PR3078: aarch64: add support for 8.1 LSE CAS
      instructions
    - S8151340, PR3078: aarch64: prefetch the destination word for
      write prior to ldxr/stxr loops.
    - S8151502, PR3078: optimize pd_disjoint_words and
      pd_conjoint_words
    - S8151775, PR3078: aarch64: add support for 8.1 LSE atomic
      operations
    - S8152537, PR3078: aarch64: Make use of CBZ and CBNZ when
      comparing unsigned values with zero.
    - S8152840, PR3078: aarch64: improve _unsafe_arraycopy stub
      routine
    - S8153713, PR3078: aarch64: improve short array clearing using
      store pair
    - S8153797, PR3078: aarch64: Add Arrays.fill stub code
    - S8154537, PR3078: AArch64: some integer rotate instructions
      are never emitted
    - S8154739, PR3078: AArch64: TemplateTable::fast_xaccess loads
      in wrong mode
    - S8155015, PR3078: Aarch64: bad assert in spill generation
      code
    - S8155100, PR3078: AArch64: Relax alignment requirement for
      byte_map_base
    - S8155612, PR3078: Aarch64: vector nodes need to support
      misaligned offset
    - S8155617, PR3078: aarch64: ClearArray does not use DC ZVA
    - S8155653, PR3078: TestVectorUnalignedOffset.java not pushed
      with 8155612
    - S8156731, PR3078: aarch64: java/util/Arrays/Correct.java fails
      due to _generic_arraycopy stub routine
    - S8157841, PR3078: aarch64: prefetch ignores cache line size
    - S8157906, PR3078: aarch64: some more integer rotate
      instructions are never emitted
    - S8158913, PR3078: aarch64: SEGV running Spark terasort
    - S8159052, PR3078: aarch64: optimise unaligned copies in
      pd_disjoint_words and pd_conjoint_words
    - S8159063, PR3078: aarch64: optimise unaligned array copy long
    - PR3078: Cleanup remaining differences from aarch64/jdk8u tree
- Fix script linking /usr/share/javazi/tzdb.dat for platform where
  it applies (bsc#987895)

- Fix aarch64 running with 48 bits va space (bsc#984684)

 avoid some crashes
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-09"/>
	<updated date="2016-08-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/984684">SUSE bug 984684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987895">SUSE bug 987895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988651">SUSE bug 988651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989721">SUSE bug 989721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989722">SUSE bug 989722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989723">SUSE bug 989723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989725">SUSE bug 989725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989726">SUSE bug 989726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989727">SUSE bug 989727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989728">SUSE bug 989728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989729">SUSE bug 989729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989730">SUSE bug 989730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989731">SUSE bug 989731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989732">SUSE bug 989732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989733">SUSE bug 989733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989734">SUSE bug 989734</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3458/">CVE-2016-3458</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3498/">CVE-2016-3498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3500/">CVE-2016-3500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3503/">CVE-2016-3503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3508/">CVE-2016-3508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3511/">CVE-2016-3511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3550/">CVE-2016-3550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3552/">CVE-2016-3552</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3587/">CVE-2016-3587</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3598/">CVE-2016-3598</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-3606/">CVE-2016-3606</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3610/">CVE-2016-3610</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516274" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516275" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77534" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="854343" ref_url="https://bugzilla.suse.com/854343" source="BUGZILLA"/>
		<reference ref_id="968483" ref_url="https://bugzilla.suse.com/968483" source="BUGZILLA"/>
		<reference ref_id="975729" ref_url="https://bugzilla.suse.com/975729" source="BUGZILLA"/>
		<reference ref_id="987527" ref_url="https://bugzilla.suse.com/987527" source="BUGZILLA"/>
		<reference ref_id="989755" ref_url="https://bugzilla.suse.com/989755" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5008" ref_url="https://www.suse.com/security/cve/CVE-2016-5008/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002205.html" source="SUSE-SU"/>
		<description>

This update for libvirt fixes one security issue:

- CVE-2016-5008: Empty VNC password disables authentication. (bsc#987527)

Additionally, the update includes the following non-security fixes:

- Improve waiting for block job readines in virsh. (bsc#989755)
- Parse negative values in augeas lenses. (bsc#975729)
- Restart daemons in %posttrans after connection drivers have been processed.
  (bsc#854343, bsc#968483)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-11"/>
	<updated date="2016-08-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/854343">SUSE bug 854343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968483">SUSE bug 968483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975729">SUSE bug 975729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987527">SUSE bug 987527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989755">SUSE bug 989755</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5008/">CVE-2016-5008</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516276" comment="libvirt-1.2.18.4-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516277" comment="libvirt-client-1.2.18.4-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516278" comment="libvirt-client-32bit-1.2.18.4-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516279" comment="libvirt-daemon-1.2.18.4-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516280" comment="libvirt-daemon-config-network-1.2.18.4-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516281" comment="libvirt-daemon-config-nwfilter-1.2.18.4-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516282" comment="libvirt-daemon-driver-interface-1.2.18.4-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516283" comment="libvirt-daemon-driver-libxl-1.2.18.4-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516284" comment="libvirt-daemon-driver-lxc-1.2.18.4-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516285" comment="libvirt-daemon-driver-network-1.2.18.4-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516286" comment="libvirt-daemon-driver-nodedev-1.2.18.4-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516287" comment="libvirt-daemon-driver-nwfilter-1.2.18.4-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516288" comment="libvirt-daemon-driver-qemu-1.2.18.4-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516289" comment="libvirt-daemon-driver-secret-1.2.18.4-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516290" comment="libvirt-daemon-driver-storage-1.2.18.4-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516291" comment="libvirt-daemon-lxc-1.2.18.4-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516292" comment="libvirt-daemon-qemu-1.2.18.4-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516293" comment="libvirt-daemon-xen-1.2.18.4-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516294" comment="libvirt-doc-1.2.18.4-11.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77535" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="991444" ref_url="https://bugzilla.suse.com/991444" source="BUGZILLA"/>
		<reference ref_id="991445" ref_url="https://bugzilla.suse.com/991445" source="BUGZILLA"/>
		<reference ref_id="991872" ref_url="https://bugzilla.suse.com/991872" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5010" ref_url="https://www.suse.com/security/cve/CVE-2016-5010/" source="CVE"/>
		<reference ref_id="CVE-2016-6491" ref_url="https://www.suse.com/security/cve/CVE-2016-6491/" source="CVE"/>
		<reference ref_id="CVE-2016-6520" ref_url="https://www.suse.com/security/cve/CVE-2016-6520/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002209.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

- security update:
  * CVE-2016-6520: buffer overflow [bsc#991872]
  * CVE-2016-5010: Out-of-bounds read in CopyMagickMemory [bsc#991444]
  * CVE-2016-6491: Out-of-bounds read when processing crafted tiff files [bsc#991445]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-15"/>
	<updated date="2016-08-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/991444">SUSE bug 991444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991445">SUSE bug 991445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991872">SUSE bug 991872</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5010/">CVE-2016-5010</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6491/">CVE-2016-6491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6520/">CVE-2016-6520</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516295" comment="ImageMagick-6.8.8.1-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516296" comment="libMagick++-6_Q16-3-6.8.8.1-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516297" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516298" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516299" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77536" version="1" class="patch">
	<metadata>
		<title>Security update for libidn (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="923241" ref_url="https://bugzilla.suse.com/923241" source="BUGZILLA"/>
		<reference ref_id="990189" ref_url="https://bugzilla.suse.com/990189" source="BUGZILLA"/>
		<reference ref_id="990190" ref_url="https://bugzilla.suse.com/990190" source="BUGZILLA"/>
		<reference ref_id="990191" ref_url="https://bugzilla.suse.com/990191" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2059" ref_url="https://www.suse.com/security/cve/CVE-2015-2059/" source="CVE"/>
		<reference ref_id="CVE-2015-8948" ref_url="https://www.suse.com/security/cve/CVE-2015-8948/" source="CVE"/>
		<reference ref_id="CVE-2016-6261" ref_url="https://www.suse.com/security/cve/CVE-2016-6261/" source="CVE"/>
		<reference ref_id="CVE-2016-6262" ref_url="https://www.suse.com/security/cve/CVE-2016-6262/" source="CVE"/>
		<reference ref_id="CVE-2016-6263" ref_url="https://www.suse.com/security/cve/CVE-2016-6263/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002210.html" source="SUSE-SU"/>
		<description>

This update for libidn fixes the following issues:

- CVE-2016-6262 and CVE-2015-8948: Out-of-bounds-read when reading one zero byte as input (bsc#990189)

- CVE-2016-6261: Out-of-bounds stack read in idna_to_ascii_4i (bsc#990190) 

- CVE-2016-6263: stringprep_utf8_nfkc_normalize reject invalid UTF-8 (bsc#990191)

- CVE-2015-2059: out-of-bounds read with stringprep on invalid UTF-8 (bsc#923241) 

		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-16"/>
	<updated date="2016-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/923241">SUSE bug 923241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990189">SUSE bug 990189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990190">SUSE bug 990190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990191">SUSE bug 990191</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2059/">CVE-2015-2059</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8948/">CVE-2015-8948</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6261/">CVE-2016-6261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6262/">CVE-2016-6262</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6263/">CVE-2016-6263</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516300" comment="libidn11-1.28-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516301" comment="libidn11-32bit-1.28-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77537" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="900418" ref_url="https://bugzilla.suse.com/900418" source="BUGZILLA"/>
		<reference ref_id="949889" ref_url="https://bugzilla.suse.com/949889" source="BUGZILLA"/>
		<reference ref_id="953339" ref_url="https://bugzilla.suse.com/953339" source="BUGZILLA"/>
		<reference ref_id="953362" ref_url="https://bugzilla.suse.com/953362" source="BUGZILLA"/>
		<reference ref_id="953518" ref_url="https://bugzilla.suse.com/953518" source="BUGZILLA"/>
		<reference ref_id="954872" ref_url="https://bugzilla.suse.com/954872" source="BUGZILLA"/>
		<reference ref_id="957986" ref_url="https://bugzilla.suse.com/957986" source="BUGZILLA"/>
		<reference ref_id="958848" ref_url="https://bugzilla.suse.com/958848" source="BUGZILLA"/>
		<reference ref_id="961600" ref_url="https://bugzilla.suse.com/961600" source="BUGZILLA"/>
		<reference ref_id="963161" ref_url="https://bugzilla.suse.com/963161" source="BUGZILLA"/>
		<reference ref_id="964427" ref_url="https://bugzilla.suse.com/964427" source="BUGZILLA"/>
		<reference ref_id="973188" ref_url="https://bugzilla.suse.com/973188" source="BUGZILLA"/>
		<reference ref_id="973631" ref_url="https://bugzilla.suse.com/973631" source="BUGZILLA"/>
		<reference ref_id="974038" ref_url="https://bugzilla.suse.com/974038" source="BUGZILLA"/>
		<reference ref_id="975130" ref_url="https://bugzilla.suse.com/975130" source="BUGZILLA"/>
		<reference ref_id="975138" ref_url="https://bugzilla.suse.com/975138" source="BUGZILLA"/>
		<reference ref_id="975907" ref_url="https://bugzilla.suse.com/975907" source="BUGZILLA"/>
		<reference ref_id="976058" ref_url="https://bugzilla.suse.com/976058" source="BUGZILLA"/>
		<reference ref_id="976111" ref_url="https://bugzilla.suse.com/976111" source="BUGZILLA"/>
		<reference ref_id="978164" ref_url="https://bugzilla.suse.com/978164" source="BUGZILLA"/>
		<reference ref_id="978295" ref_url="https://bugzilla.suse.com/978295" source="BUGZILLA"/>
		<reference ref_id="978413" ref_url="https://bugzilla.suse.com/978413" source="BUGZILLA"/>
		<reference ref_id="979620" ref_url="https://bugzilla.suse.com/979620" source="BUGZILLA"/>
		<reference ref_id="979670" ref_url="https://bugzilla.suse.com/979670" source="BUGZILLA"/>
		<reference ref_id="980716" ref_url="https://bugzilla.suse.com/980716" source="BUGZILLA"/>
		<reference ref_id="980724" ref_url="https://bugzilla.suse.com/980724" source="BUGZILLA"/>
		<reference ref_id="981264" ref_url="https://bugzilla.suse.com/981264" source="BUGZILLA"/>
		<reference ref_id="981276" ref_url="https://bugzilla.suse.com/981276" source="BUGZILLA"/>
		<reference ref_id="982024" ref_url="https://bugzilla.suse.com/982024" source="BUGZILLA"/>
		<reference ref_id="982025" ref_url="https://bugzilla.suse.com/982025" source="BUGZILLA"/>
		<reference ref_id="982026" ref_url="https://bugzilla.suse.com/982026" source="BUGZILLA"/>
		<reference ref_id="982224" ref_url="https://bugzilla.suse.com/982224" source="BUGZILLA"/>
		<reference ref_id="982225" ref_url="https://bugzilla.suse.com/982225" source="BUGZILLA"/>
		<reference ref_id="982286" ref_url="https://bugzilla.suse.com/982286" source="BUGZILLA"/>
		<reference ref_id="982695" ref_url="https://bugzilla.suse.com/982695" source="BUGZILLA"/>
		<reference ref_id="982960" ref_url="https://bugzilla.suse.com/982960" source="BUGZILLA"/>
		<reference ref_id="983973" ref_url="https://bugzilla.suse.com/983973" source="BUGZILLA"/>
		<reference ref_id="983984" ref_url="https://bugzilla.suse.com/983984" source="BUGZILLA"/>
		<reference ref_id="984981" ref_url="https://bugzilla.suse.com/984981" source="BUGZILLA"/>
		<reference ref_id="985503" ref_url="https://bugzilla.suse.com/985503" source="BUGZILLA"/>
		<reference ref_id="986586" ref_url="https://bugzilla.suse.com/986586" source="BUGZILLA"/>
		<reference ref_id="988675" ref_url="https://bugzilla.suse.com/988675" source="BUGZILLA"/>
		<reference ref_id="988676" ref_url="https://bugzilla.suse.com/988676" source="BUGZILLA"/>
		<reference ref_id="990843" ref_url="https://bugzilla.suse.com/990843" source="BUGZILLA"/>
		<reference ref_id="990923" ref_url="https://bugzilla.suse.com/990923" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3672" ref_url="https://www.suse.com/security/cve/CVE-2014-3672/" source="CVE"/>
		<reference ref_id="CVE-2016-3158" ref_url="https://www.suse.com/security/cve/CVE-2016-3158/" source="CVE"/>
		<reference ref_id="CVE-2016-3159" ref_url="https://www.suse.com/security/cve/CVE-2016-3159/" source="CVE"/>
		<reference ref_id="CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710/" source="CVE"/>
		<reference ref_id="CVE-2016-3960" ref_url="https://www.suse.com/security/cve/CVE-2016-3960/" source="CVE"/>
		<reference ref_id="CVE-2016-4001" ref_url="https://www.suse.com/security/cve/CVE-2016-4001/" source="CVE"/>
		<reference ref_id="CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002/" source="CVE"/>
		<reference ref_id="CVE-2016-4020" ref_url="https://www.suse.com/security/cve/CVE-2016-4020/" source="CVE"/>
		<reference ref_id="CVE-2016-4037" ref_url="https://www.suse.com/security/cve/CVE-2016-4037/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-4453" ref_url="https://www.suse.com/security/cve/CVE-2016-4453/" source="CVE"/>
		<reference ref_id="CVE-2016-4454" ref_url="https://www.suse.com/security/cve/CVE-2016-4454/" source="CVE"/>
		<reference ref_id="CVE-2016-4952" ref_url="https://www.suse.com/security/cve/CVE-2016-4952/" source="CVE"/>
		<reference ref_id="CVE-2016-4962" ref_url="https://www.suse.com/security/cve/CVE-2016-4962/" source="CVE"/>
		<reference ref_id="CVE-2016-4963" ref_url="https://www.suse.com/security/cve/CVE-2016-4963/" source="CVE"/>
		<reference ref_id="CVE-2016-5105" ref_url="https://www.suse.com/security/cve/CVE-2016-5105/" source="CVE"/>
		<reference ref_id="CVE-2016-5106" ref_url="https://www.suse.com/security/cve/CVE-2016-5106/" source="CVE"/>
		<reference ref_id="CVE-2016-5107" ref_url="https://www.suse.com/security/cve/CVE-2016-5107/" source="CVE"/>
		<reference ref_id="CVE-2016-5126" ref_url="https://www.suse.com/security/cve/CVE-2016-5126/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5337" ref_url="https://www.suse.com/security/cve/CVE-2016-5337/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-5403" ref_url="https://www.suse.com/security/cve/CVE-2016-5403/" source="CVE"/>
		<reference ref_id="CVE-2016-6258" ref_url="https://www.suse.com/security/cve/CVE-2016-6258/" source="CVE"/>
		<reference ref_id="CVE-2016-6259" ref_url="https://www.suse.com/security/cve/CVE-2016-6259/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<description>
This update for xen to version 4.5.3 fixes the several issues.

These security issues were fixed:

- CVE-2016-6258: Potential privilege escalation in PV guests (XSA-182) (bsc#988675).
- CVE-2016-6259: Missing SMAP whitelisting in 32-bit exception / event delivery (XSA-183) (bsc#988676).
- CVE-2016-5337: The megasas_ctrl_get_info function allowed local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information (bsc#983973).
- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the host via vectors related to the information transfer buffer (bsc#983984).
- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c might have allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982960).
- CVE-2016-4453: The vmsvga_fifo_run function allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982225).
- CVE-2016-4454: The vmsvga_fifo_read_raw function allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggered an out-of-bounds read (bsc#982224).
- CVE-2016-5126: Heap-based buffer overflow in the iscsi_aio_ioctl function allowed local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call (bsc#982286).
- CVE-2016-5105: Stack information leakage while reading configuration (bsc#982024).
- CVE-2016-5106: Out-of-bounds write while setting controller properties (bsc#982025).
- CVE-2016-5107: Out-of-bounds read in megasas_lookup_frame() function (bsc#982026).
- CVE-2016-4963: The libxl device-handling allowed local guest OS users with access to the driver domain to cause a denial of service (management tool confusion) by manipulating information in the backend directories in xenstore (bsc#979670).
- CVE-2016-4962: The libxl device-handling allowed local OS guest administrators to cause a denial of service (resource consumption or management facility confusion) or gain host OS privileges by manipulating information in guest controlled areas of xenstore (bsc#979620).
- CVE-2016-4952: Out-of-bounds access issue in pvsci_ring_init_msg/data routines (bsc#981276).
- CVE-2014-3672: The qemu implementation in libvirt Xen allowed local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr (bsc#981264).
- CVE-2016-4441: The get_cmd function in the 53C9X Fast SCSI Controller (FSC) support did not properly check DMA length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command (bsc#980724).
- CVE-2016-4439: The esp_reg_write function in the 53C9X Fast SCSI Controller (FSC) support did not properly check command buffer length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the host via unspecified vectors (bsc#980716).
- CVE-2016-3710: The VGA module improperly performed bounds checking on banked access to video memory, which allowed local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the 'Dark Portal' issue (bsc#978164).
- CVE-2016-3960: Integer overflow in the x86 shadow pagetable code allowed local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping (bsc#974038).
- CVE-2016-3159: The fpu_fxrstor function in arch/x86/i387.c did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188).
- CVE-2016-3158: The xrstor function did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188).
- CVE-2016-4037: The ehci_advance_state function in hw/usb/hcd-ehci.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular split isochronous transfer descriptor (siTD) list (bsc#976111).
- CVE-2016-4020: The patch_instruction function did not initialize the imm32 variable, which allowed local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR) (bsc#975907).
- CVE-2016-4001: Buffer overflow in the stellaris_enet_receive function, when the Stellaris ethernet controller is configured to accept large packets, allowed remote attackers to cause a denial of service (QEMU crash) via a large packet (bsc#975130).
- CVE-2016-4002: Buffer overflow in the mipsnet_receive function, when the guest NIC is configured to accept large packets, allowed remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes (bsc#975138).
- bsc#978295: x86 software guest page walk PS bit handling flaw (XSA-176)
- CVE-2016-5403: virtio: unbounded memory allocation on host via guest leading to DoS (XSA-184) (bsc#990923)
- CVE-2016-6351: scsi: esp: OOB write access in esp_do_dma (bsc#990843)

These non-security issues were fixed:

- bsc#986586: Out of memory (oom) during boot on 'modprobe xenblk' (non xen kernel)
- bsc#900418: Dump cannot be performed on SLES12 XEN
- bsc#953339: Implement SUSE specific unplug protocol for emulated PCI devices in PVonHVM guests to qemu-xen-upstream
- bsc#953362: Implement SUSE specific unplug protocol for emulated PCI devices in PVonHVM guests to qemu-xen-upstream
- bsc#953518: Implement SUSE specific unplug protocol for emulated PCI devices in PVonHVM guests to qemu-xen-upstream
- bsc#984981: Implement SUSE specific unplug protocol for emulated PCI devices in PVonHVM guests to qemu-xen-upstream
- bsc#954872: Script block-dmmd not working as expected - libxl: error: libxl_dm.c (Additional fixes)
- bsc#982695: qemu fails to boot HVM guest from xvda
- bsc#958848: HVM guest crash at /usr/src/packages/BUILD/xen-4.4.2-testing/obj/default/balloon/balloon.c:407
- bsc#949889: Fail to install 32-bit paravirt VM under SLES12SP1Beta3 XEN
- bsc#954872: Script block-dmmd not working as expected - libxl: error: libxl_dm.c (another modification)
- bsc#961600: Poor performance when Xen HVM domU configured with max memory greater than current memory
- bsc#963161: Windows VM getting stuck during load while a VF is assigned to it after upgrading to latest maintenance updates
- bsc#976058: Xen error running simple HVM guest (Post Alpha 2 xen+qemu)
- bsc#973631: AWS EC2 kdump issue
- bsc#957986: Indirect descriptors are not compatible with Amazon block backend
- bsc#964427: Discarding device blocks: failed - Input/output error
- bsc#985503: Fixed vif-route 
- bsc#978413: PV guest upgrade from SLES11 SP4 to SLES 12 SP2 alpha3 failed 
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-17"/>
	<updated date="2016-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/900418">SUSE bug 900418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949889">SUSE bug 949889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953339">SUSE bug 953339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953362">SUSE bug 953362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953518">SUSE bug 953518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954872">SUSE bug 954872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957986">SUSE bug 957986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958848">SUSE bug 958848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961600">SUSE bug 961600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963161">SUSE bug 963161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964427">SUSE bug 964427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973188">SUSE bug 973188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973631">SUSE bug 973631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974038">SUSE bug 974038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975130">SUSE bug 975130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975138">SUSE bug 975138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975907">SUSE bug 975907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976058">SUSE bug 976058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976111">SUSE bug 976111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978164">SUSE bug 978164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978295">SUSE bug 978295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978413">SUSE bug 978413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979620">SUSE bug 979620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979670">SUSE bug 979670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980716">SUSE bug 980716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980724">SUSE bug 980724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981264">SUSE bug 981264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981276">SUSE bug 981276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982024">SUSE bug 982024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982025">SUSE bug 982025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982026">SUSE bug 982026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982224">SUSE bug 982224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982225">SUSE bug 982225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982286">SUSE bug 982286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982695">SUSE bug 982695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982960">SUSE bug 982960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983973">SUSE bug 983973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983984">SUSE bug 983984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984981">SUSE bug 984981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985503">SUSE bug 985503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986586">SUSE bug 986586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988675">SUSE bug 988675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988676">SUSE bug 988676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990843">SUSE bug 990843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990923">SUSE bug 990923</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3672/">CVE-2014-3672</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3158/">CVE-2016-3158</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3159/">CVE-2016-3159</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3960/">CVE-2016-3960</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4001/">CVE-2016-4001</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4020/">CVE-2016-4020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4037/">CVE-2016-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4453/">CVE-2016-4453</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4454/">CVE-2016-4454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4952/">CVE-2016-4952</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4962/">CVE-2016-4962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4963/">CVE-2016-4963</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5105/">CVE-2016-5105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5106/">CVE-2016-5106</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5107/">CVE-2016-5107</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5126/">CVE-2016-5126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5337/">CVE-2016-5337</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5403/">CVE-2016-5403</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6258/">CVE-2016-6258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6259/">CVE-2016-6259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516302" comment="xen-4.5.3_08-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516303" comment="xen-kmp-default-4.5.3_08_k3.12.59_60.45-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516304" comment="xen-libs-4.5.3_08-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516305" comment="xen-libs-32bit-4.5.3_08-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77538" version="1" class="patch">
	<metadata>
		<title>Security update for ctags (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="899486" ref_url="https://bugzilla.suse.com/899486" source="BUGZILLA"/>
		<reference ref_id="976920" ref_url="https://bugzilla.suse.com/976920" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-7204" ref_url="https://www.suse.com/security/cve/CVE-2014-7204/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002216.html" source="SUSE-SU"/>
		<description>

This update for ctags fixes the following issues:

- CVE-2014-7204: Potential denial of service (infinite loop and CPU and disk
  consumption) via a crafted JavaScript file. (bsc#899486)
- Missing Requires(post) on coreutils as it is using rm(1). (bsc#976920)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-18"/>
	<updated date="2016-08-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/899486">SUSE bug 899486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976920">SUSE bug 976920</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7204/">CVE-2014-7204</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516306" comment="ctags-5.8-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77539" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="962075" ref_url="https://bugzilla.suse.com/962075" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0728" ref_url="https://www.suse.com/security/cve/CVE-2016-0728/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0186-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00021.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP1 kernel was updated to receive a security fix.

Following security bug was fixed:
- A reference leak in keyring handling with join_session_keyring() could lead
  to local attackers gain root privileges. (bsc#962075, CVE-2016-0728).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-20"/>
	<updated date="2016-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/962075">SUSE bug 962075</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0728/">CVE-2016-0728</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516307" comment="kernel-default-3.12.51-60.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516308" comment="kernel-default-devel-3.12.51-60.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516309" comment="kernel-default-extra-3.12.51-60.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516310" comment="kernel-devel-3.12.51-60.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516311" comment="kernel-macros-3.12.51-60.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516312" comment="kernel-source-3.12.51-60.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516313" comment="kernel-syms-3.12.51-60.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516314" comment="kernel-xen-3.12.51-60.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516315" comment="kernel-xen-devel-3.12.51-60.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77540" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="984751" ref_url="https://bugzilla.suse.com/984751" source="BUGZILLA"/>
		<reference ref_id="985177" ref_url="https://bugzilla.suse.com/985177" source="BUGZILLA"/>
		<reference ref_id="985348" ref_url="https://bugzilla.suse.com/985348" source="BUGZILLA"/>
		<reference ref_id="989523" ref_url="https://bugzilla.suse.com/989523" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002219.html" source="SUSE-SU"/>
		<description>

This update for python fixes the following issues:

- CVE-2016-0772: smtplib vulnerability opens startTLS stripping attack (bsc#984751)
- CVE-2016-5636: heap overflow when importing malformed zip files (bsc#985177)
- CVE-2016-5699: incorrect validation of HTTP headers allow header injection (bsc#985348)
- CVE-2016-1000110: HTTPoxy vulnerability in urllib, fixed by disregarding HTTP_PROXY when REQUEST_METHOD is also set (bsc#989523)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-19"/>
	<updated date="2016-08-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/984751">SUSE bug 984751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985177">SUSE bug 985177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985348">SUSE bug 985348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989523">SUSE bug 989523</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516316" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516317" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516318" comment="python-2.7.9-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516319" comment="python-base-2.7.9-24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516320" comment="python-curses-2.7.9-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516321" comment="python-devel-2.7.9-24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516322" comment="python-tk-2.7.9-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516323" comment="python-xml-2.7.9-24.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77541" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="947337" ref_url="https://bugzilla.suse.com/947337" source="BUGZILLA"/>
		<reference ref_id="950998" ref_url="https://bugzilla.suse.com/950998" source="BUGZILLA"/>
		<reference ref_id="951844" ref_url="https://bugzilla.suse.com/951844" source="BUGZILLA"/>
		<reference ref_id="953048" ref_url="https://bugzilla.suse.com/953048" source="BUGZILLA"/>
		<reference ref_id="954847" ref_url="https://bugzilla.suse.com/954847" source="BUGZILLA"/>
		<reference ref_id="956491" ref_url="https://bugzilla.suse.com/956491" source="BUGZILLA"/>
		<reference ref_id="957990" ref_url="https://bugzilla.suse.com/957990" source="BUGZILLA"/>
		<reference ref_id="962742" ref_url="https://bugzilla.suse.com/962742" source="BUGZILLA"/>
		<reference ref_id="963655" ref_url="https://bugzilla.suse.com/963655" source="BUGZILLA"/>
		<reference ref_id="963762" ref_url="https://bugzilla.suse.com/963762" source="BUGZILLA"/>
		<reference ref_id="965087" ref_url="https://bugzilla.suse.com/965087" source="BUGZILLA"/>
		<reference ref_id="966245" ref_url="https://bugzilla.suse.com/966245" source="BUGZILLA"/>
		<reference ref_id="968667" ref_url="https://bugzilla.suse.com/968667" source="BUGZILLA"/>
		<reference ref_id="970114" ref_url="https://bugzilla.suse.com/970114" source="BUGZILLA"/>
		<reference ref_id="970506" ref_url="https://bugzilla.suse.com/970506" source="BUGZILLA"/>
		<reference ref_id="971770" ref_url="https://bugzilla.suse.com/971770" source="BUGZILLA"/>
		<reference ref_id="972933" ref_url="https://bugzilla.suse.com/972933" source="BUGZILLA"/>
		<reference ref_id="973378" ref_url="https://bugzilla.suse.com/973378" source="BUGZILLA"/>
		<reference ref_id="973499" ref_url="https://bugzilla.suse.com/973499" source="BUGZILLA"/>
		<reference ref_id="974165" ref_url="https://bugzilla.suse.com/974165" source="BUGZILLA"/>
		<reference ref_id="974308" ref_url="https://bugzilla.suse.com/974308" source="BUGZILLA"/>
		<reference ref_id="974620" ref_url="https://bugzilla.suse.com/974620" source="BUGZILLA"/>
		<reference ref_id="975531" ref_url="https://bugzilla.suse.com/975531" source="BUGZILLA"/>
		<reference ref_id="975533" ref_url="https://bugzilla.suse.com/975533" source="BUGZILLA"/>
		<reference ref_id="975772" ref_url="https://bugzilla.suse.com/975772" source="BUGZILLA"/>
		<reference ref_id="975788" ref_url="https://bugzilla.suse.com/975788" source="BUGZILLA"/>
		<reference ref_id="977417" ref_url="https://bugzilla.suse.com/977417" source="BUGZILLA"/>
		<reference ref_id="978401" ref_url="https://bugzilla.suse.com/978401" source="BUGZILLA"/>
		<reference ref_id="978469" ref_url="https://bugzilla.suse.com/978469" source="BUGZILLA"/>
		<reference ref_id="978822" ref_url="https://bugzilla.suse.com/978822" source="BUGZILLA"/>
		<reference ref_id="979074" ref_url="https://bugzilla.suse.com/979074" source="BUGZILLA"/>
		<reference ref_id="979213" ref_url="https://bugzilla.suse.com/979213" source="BUGZILLA"/>
		<reference ref_id="979419" ref_url="https://bugzilla.suse.com/979419" source="BUGZILLA"/>
		<reference ref_id="979485" ref_url="https://bugzilla.suse.com/979485" source="BUGZILLA"/>
		<reference ref_id="979489" ref_url="https://bugzilla.suse.com/979489" source="BUGZILLA"/>
		<reference ref_id="979521" ref_url="https://bugzilla.suse.com/979521" source="BUGZILLA"/>
		<reference ref_id="979548" ref_url="https://bugzilla.suse.com/979548" source="BUGZILLA"/>
		<reference ref_id="979681" ref_url="https://bugzilla.suse.com/979681" source="BUGZILLA"/>
		<reference ref_id="979867" ref_url="https://bugzilla.suse.com/979867" source="BUGZILLA"/>
		<reference ref_id="979879" ref_url="https://bugzilla.suse.com/979879" source="BUGZILLA"/>
		<reference ref_id="979922" ref_url="https://bugzilla.suse.com/979922" source="BUGZILLA"/>
		<reference ref_id="980348" ref_url="https://bugzilla.suse.com/980348" source="BUGZILLA"/>
		<reference ref_id="980363" ref_url="https://bugzilla.suse.com/980363" source="BUGZILLA"/>
		<reference ref_id="980371" ref_url="https://bugzilla.suse.com/980371" source="BUGZILLA"/>
		<reference ref_id="980856" ref_url="https://bugzilla.suse.com/980856" source="BUGZILLA"/>
		<reference ref_id="980883" ref_url="https://bugzilla.suse.com/980883" source="BUGZILLA"/>
		<reference ref_id="981038" ref_url="https://bugzilla.suse.com/981038" source="BUGZILLA"/>
		<reference ref_id="981143" ref_url="https://bugzilla.suse.com/981143" source="BUGZILLA"/>
		<reference ref_id="981344" ref_url="https://bugzilla.suse.com/981344" source="BUGZILLA"/>
		<reference ref_id="981597" ref_url="https://bugzilla.suse.com/981597" source="BUGZILLA"/>
		<reference ref_id="982282" ref_url="https://bugzilla.suse.com/982282" source="BUGZILLA"/>
		<reference ref_id="982354" ref_url="https://bugzilla.suse.com/982354" source="BUGZILLA"/>
		<reference ref_id="982544" ref_url="https://bugzilla.suse.com/982544" source="BUGZILLA"/>
		<reference ref_id="982698" ref_url="https://bugzilla.suse.com/982698" source="BUGZILLA"/>
		<reference ref_id="983143" ref_url="https://bugzilla.suse.com/983143" source="BUGZILLA"/>
		<reference ref_id="983213" ref_url="https://bugzilla.suse.com/983213" source="BUGZILLA"/>
		<reference ref_id="983318" ref_url="https://bugzilla.suse.com/983318" source="BUGZILLA"/>
		<reference ref_id="983721" ref_url="https://bugzilla.suse.com/983721" source="BUGZILLA"/>
		<reference ref_id="983904" ref_url="https://bugzilla.suse.com/983904" source="BUGZILLA"/>
		<reference ref_id="983977" ref_url="https://bugzilla.suse.com/983977" source="BUGZILLA"/>
		<reference ref_id="984148" ref_url="https://bugzilla.suse.com/984148" source="BUGZILLA"/>
		<reference ref_id="984456" ref_url="https://bugzilla.suse.com/984456" source="BUGZILLA"/>
		<reference ref_id="984755" ref_url="https://bugzilla.suse.com/984755" source="BUGZILLA"/>
		<reference ref_id="984764" ref_url="https://bugzilla.suse.com/984764" source="BUGZILLA"/>
		<reference ref_id="985232" ref_url="https://bugzilla.suse.com/985232" source="BUGZILLA"/>
		<reference ref_id="985978" ref_url="https://bugzilla.suse.com/985978" source="BUGZILLA"/>
		<reference ref_id="986362" ref_url="https://bugzilla.suse.com/986362" source="BUGZILLA"/>
		<reference ref_id="986365" ref_url="https://bugzilla.suse.com/986365" source="BUGZILLA"/>
		<reference ref_id="986569" ref_url="https://bugzilla.suse.com/986569" source="BUGZILLA"/>
		<reference ref_id="986572" ref_url="https://bugzilla.suse.com/986572" source="BUGZILLA"/>
		<reference ref_id="986573" ref_url="https://bugzilla.suse.com/986573" source="BUGZILLA"/>
		<reference ref_id="986811" ref_url="https://bugzilla.suse.com/986811" source="BUGZILLA"/>
		<reference ref_id="988215" ref_url="https://bugzilla.suse.com/988215" source="BUGZILLA"/>
		<reference ref_id="988498" ref_url="https://bugzilla.suse.com/988498" source="BUGZILLA"/>
		<reference ref_id="988552" ref_url="https://bugzilla.suse.com/988552" source="BUGZILLA"/>
		<reference ref_id="990058" ref_url="https://bugzilla.suse.com/990058" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9904" ref_url="https://www.suse.com/security/cve/CVE-2014-9904/" source="CVE"/>
		<reference ref_id="CVE-2015-7833" ref_url="https://www.suse.com/security/cve/CVE-2015-7833/" source="CVE"/>
		<reference ref_id="CVE-2015-8551" ref_url="https://www.suse.com/security/cve/CVE-2015-8551/" source="CVE"/>
		<reference ref_id="CVE-2015-8552" ref_url="https://www.suse.com/security/cve/CVE-2015-8552/" source="CVE"/>
		<reference ref_id="CVE-2015-8845" ref_url="https://www.suse.com/security/cve/CVE-2015-8845/" source="CVE"/>
		<reference ref_id="CVE-2016-0758" ref_url="https://www.suse.com/security/cve/CVE-2016-0758/" source="CVE"/>
		<reference ref_id="CVE-2016-1583" ref_url="https://www.suse.com/security/cve/CVE-2016-1583/" source="CVE"/>
		<reference ref_id="CVE-2016-2053" ref_url="https://www.suse.com/security/cve/CVE-2016-2053/" source="CVE"/>
		<reference ref_id="CVE-2016-3672" ref_url="https://www.suse.com/security/cve/CVE-2016-3672/" source="CVE"/>
		<reference ref_id="CVE-2016-4470" ref_url="https://www.suse.com/security/cve/CVE-2016-4470/" source="CVE"/>
		<reference ref_id="CVE-2016-4482" ref_url="https://www.suse.com/security/cve/CVE-2016-4482/" source="CVE"/>
		<reference ref_id="CVE-2016-4486" ref_url="https://www.suse.com/security/cve/CVE-2016-4486/" source="CVE"/>
		<reference ref_id="CVE-2016-4565" ref_url="https://www.suse.com/security/cve/CVE-2016-4565/" source="CVE"/>
		<reference ref_id="CVE-2016-4569" ref_url="https://www.suse.com/security/cve/CVE-2016-4569/" source="CVE"/>
		<reference ref_id="CVE-2016-4578" ref_url="https://www.suse.com/security/cve/CVE-2016-4578/" source="CVE"/>
		<reference ref_id="CVE-2016-4805" ref_url="https://www.suse.com/security/cve/CVE-2016-4805/" source="CVE"/>
		<reference ref_id="CVE-2016-4997" ref_url="https://www.suse.com/security/cve/CVE-2016-4997/" source="CVE"/>
		<reference ref_id="CVE-2016-5244" ref_url="https://www.suse.com/security/cve/CVE-2016-5244/" source="CVE"/>
		<reference ref_id="CVE-2016-5828" ref_url="https://www.suse.com/security/cve/CVE-2016-5828/" source="CVE"/>
		<reference ref_id="CVE-2016-5829" ref_url="https://www.suse.com/security/cve/CVE-2016-5829/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.62 to receive various security and bugfixes.

The following security bugs were fixed:
- CVE-2014-9904: The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel did not properly check for an integer overflow, which allowed local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call (bnc#986811).
- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).
- CVE-2015-8551: The PCI backend driver in Xen, when running on an x86 system and using Linux as the driver domain, allowed local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka 'Linux pciback missing sanity checks (bnc#957990).
- CVE-2015-8552: The PCI backend driver in Xen, when running on an x86 system and using Linux as the driver domain, allowed local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka 'Linux pciback missing sanity checks (bnc#957990).
- CVE-2015-8845: The tm_reclaim_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms did not ensure that TM suspend mode exists before proceeding with a tm_reclaim call, which allowed local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application (bnc#975533).
- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bnc#979867).
- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bsc#983143).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).
- CVE-2016-3672: The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel did not properly randomize the legacy base address, which made it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits (bnc#974308).
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).
- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bsc#978401).
- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).
- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bsc#979213).
- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).
- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986362).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bsc#986365).
- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).
- CVE-2016-5828: The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms mishandled transactional state, which allowed local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction an exec system call (bsc#986569).
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).

The following non-security bugs were fixed:
- ALSA: hrtimer: Handle start/stop more properly (bsc#973378).
- Add wait_event_cmd() (bsc#953048).
- Btrfs: be more precise on errors when getting an inode from disk (bsc#981038).
- Btrfs: do not use src fd for printk (bsc#980348).
- Btrfs: improve performance on fsync against new inode after rename/unlink (bsc#981038).
- Btrfs: qgroup: Fix qgroup accounting when creating snapshot (bsc#972933).
- Btrfs: serialize subvolume mounts with potentially mismatching rw flags (bsc#951844).
- Disable btrfs patch (bsc#981597)
- EDAC, sb_edac: Add support for duplicate device IDs (bsc#979521).
- EDAC, sb_edac: Fix TAD presence check for sbridge_mci_bind_devs() (bsc#979521).
- EDAC, sb_edac: Fix rank lookup on Broadwell (bsc#979521).
- EDAC/sb_edac: Fix computation of channel address (bsc#979521).
- EDAC: Correct channel count limit (bsc#979521).
- EDAC: Remove arbitrary limit on number of channels (bsc#979521).
- EDAC: Use static attribute groups for managing sysfs entries (bsc#979521).
- MM: increase safety margin provided by PF_LESS_THROTTLE (bsc#956491).
- PCI/AER: Clear error status registers during enumeration and restore (bsc#985978).
- RAID5: batch adjacent full stripe write (bsc#953048).
- RAID5: check_reshape() shouldn't call mddev_suspend (bsc#953048).
- RAID5: revert e9e4c377e2f563 to fix a livelock (bsc#953048).
- Restore copying of SKBs with head exceeding page size (bsc#978469).
- SCSI: Increase REPORT_LUNS timeout (bsc#982282).
- USB: xhci: Add broken streams quirk for Frescologic device id 1009 (bnc#982698).
- Update patches.drivers/0001-nvme-fix-max_segments-integer-truncation.patch (bsc#979419). Fix reference.
- Update patches.drivers/nvme-0106-init-nvme-queue-before-enabling-irq.patch (bsc#962742). Fix incorrect bugzilla referece.
- VSOCK: Fix lockdep issue (bsc#977417).
- VSOCK: sock_put wasn't safe to call in interrupt context (bsc#977417).
- base: make module_create_drivers_dir race-free (bnc#983977).
- cdc_ncm: workaround for EM7455 'silent' data interface (bnc#988552).
- ceph: tolerate bad i_size for symlink inode (bsc#985232).
- drm/mgag200: Add support for a new G200eW3 chipset (bsc#983904).
- drm/mgag200: Add support for a new rev of G200e (bsc#983904).
- drm/mgag200: Black screen fix for G200e rev 4 (bsc#983904).
- drm/mgag200: remove unused variables (bsc#983904).
- drm: qxl: Workaround for buggy user-space (bsc#981344).
- efifb: Add support for 64-bit frame buffer addresses (bsc#973499).
- efifb: Fix 16 color palette entry calculation (bsc#983318).
- efifb: Fix KABI of screen_info struct (bsc#973499).
- ehci-pci: enable interrupt on BayTrail (bnc#947337).
- enic: set netdev-&gt;vlan_features (bsc#966245).
- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- hid-elo: kill not flush the work (bnc#982354).
- iommu/vt-d: Enable QI on all IOMMUs before setting root entry (bsc#975772).
- ipvs: count pre-established TCP states as active (bsc#970114).
- kabi/severities: Added raw3270_* PASS to allow IBM LTC changes (bnc#979922, LTC#141736)
- kabi: prevent spurious modversion changes after bsc#982544 fix (bsc#982544).
- kvm: Guest does not show the cpu flag nonstop_tsc (bsc#971770) 
- md/raid56: Do not perform reads to support writes until stripe is ready.
- md/raid5: Ensure a batch member is not handled prematurely (bsc#953048).
- md/raid5: For stripe with R5_ReadNoMerge, we replace REQ_FLUSH with REQ_NOMERGE.
- md/raid5: add handle_flags arg to break_stripe_batch_list (bsc#953048).
- md/raid5: allow the stripe_cache to grow and shrink (bsc#953048).
- md/raid5: always set conf-&gt;prev_chunk_sectors and -&gt;prev_algo (bsc#953048).
- md/raid5: avoid races when changing cache size (bsc#953048).
- md/raid5: avoid reading parity blocks for full-stripe write to degraded array (bsc#953048).
- md/raid5: be more selective about distributing flags across batch (bsc#953048).
- md/raid5: break stripe-batches when the array has failed (bsc#953048).
- md/raid5: call break_stripe_batch_list from handle_stripe_clean_event (bsc#953048).
- md/raid5: change -&gt;inactive_blocked to a bit-flag (bsc#953048).
- md/raid5: clear R5_NeedReplace when no longer needed (bsc#953048).
- md/raid5: close race between STRIPE_BIT_DELAY and batching (bsc#953048).
- md/raid5: close recently introduced race in stripe_head management.
- md/raid5: consider updating reshape_position at start of reshape (bsc#953048).
- md/raid5: deadlock between retry_aligned_read with barrier io (bsc#953048).
- md/raid5: do not do chunk aligned read on degraded array (bsc#953048).
- md/raid5: do not index beyond end of array in need_this_block() (bsc#953048).
- md/raid5: do not let shrink_slab shrink too far (bsc#953048).
- md/raid5: duplicate some more handle_stripe_clean_event code in break_stripe_batch_list (bsc#953048).
- md/raid5: ensure device failure recorded before write request returns (bsc#953048).
- md/raid5: ensure whole batch is delayed for all required bitmap updates (bsc#953048).
- md/raid5: fix allocation of 'scribble' array (bsc#953048).
- md/raid5: fix another livelock caused by non-aligned writes (bsc#953048).
- md/raid5: fix handling of degraded stripes in batches (bsc#953048).
- md/raid5: fix init_stripe() inconsistencies (bsc#953048).
- md/raid5: fix locking in handle_stripe_clean_event() (bsc#953048).
- md/raid5: fix newly-broken locking in get_active_stripe.
- md/raid5: handle possible race as reshape completes (bsc#953048).
- md/raid5: ignore released_stripes check (bsc#953048).
- md/raid5: more incorrect BUG_ON in handle_stripe_fill (bsc#953048).
- md/raid5: move max_nr_stripes management into grow_one_stripe and drop_one_stripe (bsc#953048).
- md/raid5: need_this_block: start simplifying the last two conditions (bsc#953048).
- md/raid5: need_this_block: tidy/fix last condition (bsc#953048).
- md/raid5: new alloc_stripe() to allocate an initialize a stripe (bsc#953048).
- md/raid5: pass gfp_t arg to grow_one_stripe() (bsc#953048).
- md/raid5: per hash value and exclusive wait_for_stripe (bsc#953048).
- md/raid5: preserve STRIPE_PREREAD_ACTIVE in break_stripe_batch_list.
- md/raid5: remove condition test from check_break_stripe_batch_list (bsc#953048).
- md/raid5: remove incorrect 'min_t()' when calculating writepos (bsc#953048).
- md/raid5: remove redundant check in stripe_add_to_batch_list() (bsc#953048).
- md/raid5: separate large if clause out of fetch_block() (bsc#953048).
- md/raid5: separate out the easy conditions in need_this_block (bsc#953048).
- md/raid5: split wait_for_stripe and introduce wait_for_quiescent (bsc#953048).
- md/raid5: strengthen check on reshape_position at run (bsc#953048).
- md/raid5: switch to use conf-&gt;chunk_sectors in place of mddev-&gt;chunk_sectors where possible (bsc#953048).
- md/raid5: use -&gt;lock to protect accessing raid5 sysfs attributes (bsc#953048).
- md/raid5: use bio_list for the list of bios to return (bsc#953048).
- md: be careful when testing resync_max against curr_resync_completed (bsc#953048).
- md: do_release_stripe(): No need to call md_wakeup_thread() twice (bsc#953048).
- md: make sure MD_RECOVERY_DONE is clear before starting recovery/resync (bsc#953048).
- md: remove unwanted white space from md.c (bsc#953048).
- md: use set_bit/clear_bit instead of shift/mask for bi_flags changes (bsc#953048).
- mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721).
- net/qlge: Avoids recursive EEH error (bsc#954847).
- net: Account for all vlan headers in skb_mac_gso_segment (bsc#968667).
- net: Start with correct mac_len in skb_network_protocol (bsc#968667).
- net: disable fragment reassembly if high_thresh is set to zero (bsc#970506).
- net: fix wrong mac_len calculation for vlans (bsc#968667).
- netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6 (bsc#982544).
- netfilter: bridge: do not leak skb in error paths (bsc#982544).
- netfilter: bridge: forward IPv6 fragmented packets (bsc#982544).
- nvme: don't poll the CQ from the kthread (bsc#975788, bsc#965087).
- perf/rapl: Fix sysfs_show() initialization for RAPL PMU (bsc#979489).
- perf/x86/intel: Add Intel RAPL PP1 energy counter support (bsc#979489).
- ppp: defer netns reference release for ppp channel (bsc#980371). 
- qeth: delete napi struct when removing a qeth device (bnc#988215, LTC#143590).
- raid5: Retry R5_ReadNoMerge flag when hit a read error.
- raid5: add a new flag to track if a stripe can be batched (bsc#953048).
- raid5: add an option to avoid copy data from bio to stripe cache (bsc#953048).
- raid5: avoid release list until last reference of the stripe (bsc#953048).
- raid5: check faulty flag for array status during recovery (bsc#953048).
- raid5: fix a race of stripe count check.
- raid5: fix broken async operation chain (bsc#953048).
- raid5: get_active_stripe avoids device_lock.
- raid5: handle expansion/resync case with stripe batching (bsc#953048).
- raid5: handle io error of batch list (bsc#953048).
- raid5: make_request does less prepare wait.
- raid5: relieve lock contention in get_active_stripe().
- raid5: relieve lock contention in get_active_stripe().
- raid5: speedup sync_request processing (bsc#953048).
- raid5: track overwrite disk count (bsc#953048).
- raid5: update analysis state for failed stripe (bsc#953048).
- raid5: use flex_array for scribble data (bsc#953048).
- s390/3270: add missing tty_kref_put (bnc#979922, LTC#141736).
- s390/3270: avoid endless I/O loop with disconnected 3270 terminals (bnc#979922, LTC#141736).
- s390/3270: fix garbled output on 3270 tty view (bnc#979922, LTC#141736).
- s390/3270: fix view reference counting (bnc#979922, LTC#141736).
- s390/3270: handle reconnect of a tty with a different size (bnc#979922, LTC#141736).
- s390/3270: hangup the 3270 tty after a disconnect (bnc#979922, LTC#141736).
- s390/mm: fix asce_bits handling with dynamic pagetable levels (bnc#979922, LTC#141456).
- s390/spinlock: avoid yield to non existent cpu (bnc#979922, LTC#141106).
- s390: fix test_fp_ctl inline assembly contraints (bnc#988215, LTC#143138).
- sb_edac: Fix a typo and a thinko in address handling for Haswell (bsc#979521).
- sb_edac: Fix support for systems with two home agents per socket (bsc#979521).
- sb_edac: correctly fetch DIMM width on Ivy Bridge and Haswell (bsc#979521).
- sb_edac: look harder for DDRIO on Haswell systems (bsc#979521).
- sb_edac: support for Broadwell -EP and -EX (bsc#979521).
- sched/cputime: Fix clock_nanosleep()/clock_gettime() inconsistency (bnc#988498).
- sched/cputime: Fix cpu_timer_sample_group() double accounting (bnc#988498).
- sched/x86: Fix up typo in topology detection (bsc#974165).
- sched: Provide update_curr callbacks for stop/idle scheduling classes (bnc#988498).
- target/rbd: do not put snap_context twice (bsc#981143).
- target/rbd: remove caw_mutex usage (bsc#981143).
- usb: quirk to stop runtime PM for Intel 7260 (bnc#984456).
- wait: introduce wait_event_exclusive_cmd (bsc#953048).
- x86 EDAC, sb_edac.c: Repair damage introduced when 'fixing' channel address (bsc#979521).
- x86 EDAC, sb_edac.c: Take account of channel hashing when needed (bsc#979521).
- x86, sched: Add new topology for multi-NUMA-node CPUs (bsc#974165).
- x86/efi: parse_efi_setup() build fix (bsc#979485).
- x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
- x86: Removed the free memblock of hibernat keys to avoid memory corruption (bsc#990058).
- x86: standardize mmap_rnd() usage (bnc#974308).
- xfs: fix premature enospc on inode allocation (bsc#984148).
- xfs: get rid of XFS_IALLOC_BLOCKS macros (bsc#984148).
- xfs: get rid of XFS_INODE_CLUSTER_SIZE macros (bsc#984148).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-19"/>
	<updated date="2016-08-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947337">SUSE bug 947337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950998">SUSE bug 950998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951844">SUSE bug 951844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953048">SUSE bug 953048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954847">SUSE bug 954847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956491">SUSE bug 956491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957990">SUSE bug 957990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962742">SUSE bug 962742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963655">SUSE bug 963655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963762">SUSE bug 963762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965087">SUSE bug 965087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966245">SUSE bug 966245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968667">SUSE bug 968667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970114">SUSE bug 970114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970506">SUSE bug 970506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971770">SUSE bug 971770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972933">SUSE bug 972933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973378">SUSE bug 973378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973499">SUSE bug 973499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974165">SUSE bug 974165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974308">SUSE bug 974308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974620">SUSE bug 974620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975531">SUSE bug 975531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975533">SUSE bug 975533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975772">SUSE bug 975772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975788">SUSE bug 975788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977417">SUSE bug 977417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978401">SUSE bug 978401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978469">SUSE bug 978469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978822">SUSE bug 978822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979074">SUSE bug 979074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979213">SUSE bug 979213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979419">SUSE bug 979419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979485">SUSE bug 979485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979489">SUSE bug 979489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979521">SUSE bug 979521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979548">SUSE bug 979548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979681">SUSE bug 979681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979867">SUSE bug 979867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979879">SUSE bug 979879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979922">SUSE bug 979922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980348">SUSE bug 980348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980363">SUSE bug 980363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980371">SUSE bug 980371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980856">SUSE bug 980856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980883">SUSE bug 980883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981038">SUSE bug 981038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981143">SUSE bug 981143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981344">SUSE bug 981344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981597">SUSE bug 981597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982282">SUSE bug 982282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982354">SUSE bug 982354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982544">SUSE bug 982544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982698">SUSE bug 982698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983143">SUSE bug 983143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983213">SUSE bug 983213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983318">SUSE bug 983318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983721">SUSE bug 983721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983904">SUSE bug 983904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983977">SUSE bug 983977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984148">SUSE bug 984148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984456">SUSE bug 984456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984755">SUSE bug 984755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984764">SUSE bug 984764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985232">SUSE bug 985232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985978">SUSE bug 985978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986362">SUSE bug 986362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986365">SUSE bug 986365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986569">SUSE bug 986569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986572">SUSE bug 986572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986573">SUSE bug 986573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986811">SUSE bug 986811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988215">SUSE bug 988215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988498">SUSE bug 988498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988552">SUSE bug 988552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990058">SUSE bug 990058</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9904/">CVE-2014-9904</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-7833/">CVE-2015-7833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8551/">CVE-2015-8551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8552/">CVE-2015-8552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8845/">CVE-2015-8845</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0758/">CVE-2016-0758</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1583/">CVE-2016-1583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2053/">CVE-2016-2053</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3672/">CVE-2016-3672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4470/">CVE-2016-4470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4482/">CVE-2016-4482</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4486/">CVE-2016-4486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4565/">CVE-2016-4565</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4569/">CVE-2016-4569</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4578/">CVE-2016-4578</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4805/">CVE-2016-4805</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4997/">CVE-2016-4997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5244/">CVE-2016-5244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5828/">CVE-2016-5828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5829/">CVE-2016-5829</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516324" comment="kernel-default-3.12.62-60.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516325" comment="kernel-default-devel-3.12.62-60.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516326" comment="kernel-default-extra-3.12.62-60.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516327" comment="kernel-devel-3.12.62-60.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516328" comment="kernel-macros-3.12.62-60.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516329" comment="kernel-source-3.12.62-60.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516330" comment="kernel-syms-3.12.62-60.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516331" comment="kernel-xen-3.12.62-60.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516332" comment="kernel-xen-devel-3.12.62-60.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77542" version="1" class="patch">
	<metadata>
		<title>Security update for cracklib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="992966" ref_url="https://bugzilla.suse.com/992966" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6318" ref_url="https://www.suse.com/security/cve/CVE-2016-6318/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002220.html" source="SUSE-SU"/>
		<description>

This update for cracklib fixes the following issues:

- Add patch to fix a buffer overflow in GECOS parser (bsc#992966 CVE-2016-6318)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-19"/>
	<updated date="2016-08-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/992966">SUSE bug 992966</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6318/">CVE-2016-6318</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516333" comment="cracklib-2.9.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516334" comment="libcrack2-2.9.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516335" comment="libcrack2-32bit-2.9.0-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77543" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="989196" ref_url="https://bugzilla.suse.com/989196" source="BUGZILLA"/>
		<reference ref_id="990628" ref_url="https://bugzilla.suse.com/990628" source="BUGZILLA"/>
		<reference ref_id="990856" ref_url="https://bugzilla.suse.com/990856" source="BUGZILLA"/>
		<reference ref_id="991809" ref_url="https://bugzilla.suse.com/991809" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-2835" ref_url="https://www.suse.com/security/cve/CVE-2016-2835/" source="CVE"/>
		<reference ref_id="CVE-2016-2836" ref_url="https://www.suse.com/security/cve/CVE-2016-2836/" source="CVE"/>
		<reference ref_id="CVE-2016-2837" ref_url="https://www.suse.com/security/cve/CVE-2016-2837/" source="CVE"/>
		<reference ref_id="CVE-2016-2838" ref_url="https://www.suse.com/security/cve/CVE-2016-2838/" source="CVE"/>
		<reference ref_id="CVE-2016-2839" ref_url="https://www.suse.com/security/cve/CVE-2016-2839/" source="CVE"/>
		<reference ref_id="CVE-2016-5252" ref_url="https://www.suse.com/security/cve/CVE-2016-5252/" source="CVE"/>
		<reference ref_id="CVE-2016-5254" ref_url="https://www.suse.com/security/cve/CVE-2016-5254/" source="CVE"/>
		<reference ref_id="CVE-2016-5258" ref_url="https://www.suse.com/security/cve/CVE-2016-5258/" source="CVE"/>
		<reference ref_id="CVE-2016-5259" ref_url="https://www.suse.com/security/cve/CVE-2016-5259/" source="CVE"/>
		<reference ref_id="CVE-2016-5262" ref_url="https://www.suse.com/security/cve/CVE-2016-5262/" source="CVE"/>
		<reference ref_id="CVE-2016-5263" ref_url="https://www.suse.com/security/cve/CVE-2016-5263/" source="CVE"/>
		<reference ref_id="CVE-2016-5264" ref_url="https://www.suse.com/security/cve/CVE-2016-5264/" source="CVE"/>
		<reference ref_id="CVE-2016-5265" ref_url="https://www.suse.com/security/cve/CVE-2016-5265/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00045.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to 45.3.0 ESR to fix the following issues
(bsc#991809):

* MFSA 2016-62/CVE-2016-2835/CVE-2016-2836
  Miscellaneous memory safety hazards (rv:48.0 / rv:45.3)
* MFSA 2016-63/CVE-2016-2830
  Favicon network connection can persist when page is closed
* MFSA 2016-64/CVE-2016-2838
  Buffer overflow rendering SVG with bidirectional content
* MFSA 2016-65/CVE-2016-2839
  Cairo rendering crash due to memory allocation issue with
  FFmpeg 0.10
* MFSA 2016-67/CVE-2016-5252
  Stack underflow during 2D graphics rendering
* MFSA 2016-70/CVE-2016-5254
  Use-after-free when using alt key and toplevel menus
* MFSA 2016-72/CVE-2016-5258
  Use-after-free in DTLS during WebRTC session shutdown
* MFSA 2016-73/CVE-2016-5259
  Use-after-free in service workers with nested sync events
* MFSA 2016-76/CVE-2016-5262
  Scripts on marquee tag can execute in sandboxed iframes
* MFSA 2016-77/CVE-2016-2837
  Buffer overflow in ClearKey Content Decryption Module (CDM)
  during video playback
* MFSA 2016-78/CVE-2016-5263
  Type confusion in display transformation
* MFSA 2016-79/CVE-2016-5264
  Use-after-free when applying SVG effects
* MFSA 2016-80/CVE-2016-5265
  Same-origin policy violation using local HTML file and saved
  shortcut file
* CVE-2016-6354: Fix for possible buffer overrun (bsc#990856)

Also a temporary workaround was added:
- Temporarily bind Firefox to the first CPU as a hotfix
  for an apparent race condition (bsc#989196, bsc#990628)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-22"/>
	<updated date="2016-08-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/989196">SUSE bug 989196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990628">SUSE bug 990628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990856">SUSE bug 990856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2835/">CVE-2016-2835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2836/">CVE-2016-2836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2837/">CVE-2016-2837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2838/">CVE-2016-2838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2839/">CVE-2016-2839</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5252/">CVE-2016-5252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5254/">CVE-2016-5254</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5258/">CVE-2016-5258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5259/">CVE-2016-5259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5262/">CVE-2016-5262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5263/">CVE-2016-5263</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5264/">CVE-2016-5264</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5265/">CVE-2016-5265</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516336" comment="MozillaFirefox-45.3.0esr-78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516337" comment="MozillaFirefox-translations-45.3.0esr-78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77544" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="991088" ref_url="https://bugzilla.suse.com/991088" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3120" ref_url="https://www.suse.com/security/cve/CVE-2016-3120/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002222.html" source="SUSE-SU"/>
		<description>

This update for krb5 fixes the following issues:

- CVE-2016-3120: KDC NULL Pointer Dereference Denial Of Service Vulnerability (bsc#991088)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-23"/>
	<updated date="2016-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/991088">SUSE bug 991088</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3120/">CVE-2016-3120</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516338" comment="krb5-1.12.1-36.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516339" comment="krb5-32bit-1.12.1-36.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516340" comment="krb5-client-1.12.1-36.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77545" version="1" class="patch">
	<metadata>
		<title>Security update for dosfstools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="912607" ref_url="https://bugzilla.suse.com/912607" source="BUGZILLA"/>
		<reference ref_id="980364" ref_url="https://bugzilla.suse.com/980364" source="BUGZILLA"/>
		<reference ref_id="980377" ref_url="https://bugzilla.suse.com/980377" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8872" ref_url="https://www.suse.com/security/cve/CVE-2015-8872/" source="CVE"/>
		<reference ref_id="CVE-2016-4804" ref_url="https://www.suse.com/security/cve/CVE-2016-4804/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002224.html" source="SUSE-SU"/>
		<description>
dosfstools was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-8872: The set_fat function in fat.c in dosfstools might have allowed attackers to corrupt a FAT12 filesystem or cause a denial of service (invalid memory read and crash) by writing an odd number of clusters to the third to last entry on a FAT12 filesystem, which triggers an 'off-by-two error (bsc#980364).
- CVE-2016-4804: The read_boot function in boot.c in dosfstools allowed attackers to cause a denial of service (crash) via a crafted filesystem, which triggers a heap-based buffer overflow in the (1) read_fat function or an out-of-bounds heap read in (2) get_fat function (bsc#980377).

This non-security issue was fixed:
- bsc#912607: Attempt to rename root dir in fsck due to uninitialized fields.
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-24"/>
	<updated date="2016-08-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/912607">SUSE bug 912607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980364">SUSE bug 980364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980377">SUSE bug 980377</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8872/">CVE-2015-8872</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4804/">CVE-2016-4804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516341" comment="dosfstools-3.0.26-6.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77546" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="915410" ref_url="https://bugzilla.suse.com/915410" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002227.html" source="SUSE-SU"/>
		<description>
rsync was updated to fix one security issue.

- CVE-2014-9512: rsync allowed remote attackers to write to arbitrary files via a symlink attack on a file in the synchronization path (bsc#915410).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-24"/>
	<updated date="2016-08-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/915410">SUSE bug 915410</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516342" comment="rsync-3.1.0-9.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77547" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-c (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="979208" ref_url="https://bugzilla.suse.com/979208" source="BUGZILLA"/>
		<reference ref_id="985860" ref_url="https://bugzilla.suse.com/985860" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2099" ref_url="https://www.suse.com/security/cve/CVE-2016-2099/" source="CVE"/>
		<reference ref_id="CVE-2016-4463" ref_url="https://www.suse.com/security/cve/CVE-2016-4463/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002228.html" source="SUSE-SU"/>
		<description>
xerces-c was updated to fix one security issue.

This security issue was fixed:
- CVE-2016-2099: Use-after-free vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ did not properly handle exceptions raised in the XMLReader class, which allowed context-dependent attackers to have unspecified impact via an invalid character in an XML document (bsc#979208).
- CVE-2016-4463: Apache Xerces-C XML Parser crashed on malformed DTD (bnc#985860).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-25"/>
	<updated date="2016-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/979208">SUSE bug 979208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985860">SUSE bug 985860</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2099/">CVE-2016-2099</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4463/">CVE-2016-4463</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516343" comment="libxerces-c-3_1-3.1.1-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516344" comment="libxerces-c-3_1-32bit-3.1.1-12.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77548" version="1" class="patch">
	<metadata>
		<title>Security update for libstorage (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="986971" ref_url="https://bugzilla.suse.com/986971" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5746" ref_url="https://www.suse.com/security/cve/CVE-2016-5746/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002241.html" source="SUSE-SU"/>
		<description>

This update for libstorage fixes the following issues:

- Use stdin, not tmp files for passwords (bsc#986971, CVE-2016-5746)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-30"/>
	<updated date="2016-08-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/986971">SUSE bug 986971</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5746/">CVE-2016-5746</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516345" comment="libstorage-ruby-2.25.35.1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516346" comment="libstorage6-2.25.35.1-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77549" version="1" class="patch">
	<metadata>
		<title>Security update for fontconfig (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="992534" ref_url="https://bugzilla.suse.com/992534" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5384" ref_url="https://www.suse.com/security/cve/CVE-2016-5384/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002242.html" source="SUSE-SU"/>
		<description>

This update for fontconfig fixes the following issues:

- security update:
  * CVE-2016-5384: Possible double free due to insufficiently validated cache files [bsc#992534]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-30"/>
	<updated date="2016-08-30"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/992534">SUSE bug 992534</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5384/">CVE-2016-5384</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516347" comment="fontconfig-2.11.0-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516348" comment="fontconfig-32bit-2.11.0-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77550" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="984858" ref_url="https://bugzilla.suse.com/984858" source="BUGZILLA"/>
		<reference ref_id="985217" ref_url="https://bugzilla.suse.com/985217" source="BUGZILLA"/>
		<reference ref_id="986251" ref_url="https://bugzilla.suse.com/986251" source="BUGZILLA"/>
		<reference ref_id="991616" ref_url="https://bugzilla.suse.com/991616" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3477" ref_url="https://www.suse.com/security/cve/CVE-2016-3477/" source="CVE"/>
		<reference ref_id="CVE-2016-3521" ref_url="https://www.suse.com/security/cve/CVE-2016-3521/" source="CVE"/>
		<reference ref_id="CVE-2016-3615" ref_url="https://www.suse.com/security/cve/CVE-2016-3615/" source="CVE"/>
		<reference ref_id="CVE-2016-5440" ref_url="https://www.suse.com/security/cve/CVE-2016-5440/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002251.html" source="SUSE-SU"/>
		<description>

This update for mariadb fixes the following issues:

- CVE-2016-3477: Unspecified vulnerability in subcomponent parser [bsc#991616]
- CVE-2016-3521: Unspecified vulnerability in subcomponent types [bsc#991616] 
- CVE-2016-3615: Unspecified vulnerability in subcomponent dml [bsc#991616] 
- CVE-2016-5440: Unspecified vulnerability in subcomponent rbr [bsc#991616]
- mariadb failing test main.bootstrap [bsc#984858]
- left over 'openSUSE' comments in MariaDB on SLE12 GM and SP1 [bsc#985217]
- remove unnecessary conditionals from specfile
- add '--ignore-db-dir=lost+found' option to rc.mysql-multi in order not 
  to misinterpret the lost+found directory as a database [bsc#986251]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-02"/>
	<updated date="2016-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/984858">SUSE bug 984858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985217">SUSE bug 985217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986251">SUSE bug 986251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991616">SUSE bug 991616</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3477/">CVE-2016-3477</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3521/">CVE-2016-3521</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3615/">CVE-2016-3615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5440/">CVE-2016-5440</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516349" comment="libmysqlclient18-10.0.26-9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516350" comment="libmysqlclient18-32bit-10.0.26-9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516351" comment="libmysqlclient_r18-10.0.26-9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516352" comment="libmysqlclient_r18-32bit-10.0.26-9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516353" comment="mariadb-10.0.26-9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516354" comment="mariadb-client-10.0.26-9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516355" comment="mariadb-errormessages-10.0.26-9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77551" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="937096" ref_url="https://bugzilla.suse.com/937096" source="BUGZILLA"/>
		<reference ref_id="958342" ref_url="https://bugzilla.suse.com/958342" source="BUGZILLA"/>
		<reference ref_id="984060" ref_url="https://bugzilla.suse.com/984060" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2059" ref_url="https://www.suse.com/security/cve/CVE-2015-2059/" source="CVE"/>
		<reference ref_id="CVE-2016-4971" ref_url="https://www.suse.com/security/cve/CVE-2016-4971/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002252.html" source="SUSE-SU"/>
		<description>

This update for wget fixes the following issues:

 - Fix for HTTP to a FTP redirection file name confusion vulnerability
   (bsc#984060, CVE-2016-4971).
 - Work around a libidn  vulnerability
   (bsc#937096, CVE-2015-2059).
 - Fix for wget fails with basicauth: Failed writing HTTP request:
   Bad file descriptor
   (bsc#958342)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-02"/>
	<updated date="2016-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/937096">SUSE bug 937096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958342">SUSE bug 958342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984060">SUSE bug 984060</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2059/">CVE-2015-2059</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4971/">CVE-2016-4971</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516356" comment="wget-1.14-10.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77552" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="928292" ref_url="https://bugzilla.suse.com/928292" source="BUGZILLA"/>
		<reference ref_id="932894" ref_url="https://bugzilla.suse.com/932894" source="BUGZILLA"/>
		<reference ref_id="967082" ref_url="https://bugzilla.suse.com/967082" source="BUGZILLA"/>
		<reference ref_id="984906" ref_url="https://bugzilla.suse.com/984906" source="BUGZILLA"/>
		<reference ref_id="987887" ref_url="https://bugzilla.suse.com/987887" source="BUGZILLA"/>
		<reference ref_id="988311" ref_url="https://bugzilla.suse.com/988311" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8853" ref_url="https://www.suse.com/security/cve/CVE-2015-8853/" source="CVE"/>
		<reference ref_id="CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238/" source="CVE"/>
		<reference ref_id="CVE-2016-2381" ref_url="https://www.suse.com/security/cve/CVE-2016-2381/" source="CVE"/>
		<reference ref_id="CVE-2016-6185" ref_url="https://www.suse.com/security/cve/CVE-2016-6185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002262.html" source="SUSE-SU"/>
		<description>

This update for Perl fixes the following issues:

- CVE-2016-6185: Xsloader looking at a '(eval)' directory. (bsc#988311)
- CVE-2016-1238: Searching current directory for optional modules. (bsc#987887)
- CVE-2015-8853: Regular expression engine hanging on bad utf8. (bsc)
- CVE-2016-2381: Environment dup handling bug. (bsc#967082)
- 'Insecure dependency in require' error in taint mode. (bsc#984906)
- Memory leak in 'use utf8' handling. (bsc#928292)
- Missing lock prototype to the debugger. (bsc#932894)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-08"/>
	<updated date="2016-09-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/928292">SUSE bug 928292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932894">SUSE bug 932894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967082">SUSE bug 967082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984906">SUSE bug 984906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987887">SUSE bug 987887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988311">SUSE bug 988311</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8853/">CVE-2015-8853</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2381/">CVE-2016-2381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6185/">CVE-2016-6185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516357" comment="perl-5.18.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516358" comment="perl-32bit-5.18.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516359" comment="perl-base-5.18.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516360" comment="perl-doc-5.18.2-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77553" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="964225" ref_url="https://bugzilla.suse.com/964225" source="BUGZILLA"/>
		<reference ref_id="973340" ref_url="https://bugzilla.suse.com/973340" source="BUGZILLA"/>
		<reference ref_id="984808" ref_url="https://bugzilla.suse.com/984808" source="BUGZILLA"/>
		<reference ref_id="984831" ref_url="https://bugzilla.suse.com/984831" source="BUGZILLA"/>
		<reference ref_id="984837" ref_url="https://bugzilla.suse.com/984837" source="BUGZILLA"/>
		<reference ref_id="984842" ref_url="https://bugzilla.suse.com/984842" source="BUGZILLA"/>
		<reference ref_id="987351" ref_url="https://bugzilla.suse.com/987351" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8781" ref_url="https://www.suse.com/security/cve/CVE-2015-8781/" source="CVE"/>
		<reference ref_id="CVE-2015-8782" ref_url="https://www.suse.com/security/cve/CVE-2015-8782/" source="CVE"/>
		<reference ref_id="CVE-2015-8783" ref_url="https://www.suse.com/security/cve/CVE-2015-8783/" source="CVE"/>
		<reference ref_id="CVE-2016-3186" ref_url="https://www.suse.com/security/cve/CVE-2016-3186/" source="CVE"/>
		<reference ref_id="CVE-2016-5314" ref_url="https://www.suse.com/security/cve/CVE-2016-5314/" source="CVE"/>
		<reference ref_id="CVE-2016-5316" ref_url="https://www.suse.com/security/cve/CVE-2016-5316/" source="CVE"/>
		<reference ref_id="CVE-2016-5317" ref_url="https://www.suse.com/security/cve/CVE-2016-5317/" source="CVE"/>
		<reference ref_id="CVE-2016-5320" ref_url="https://www.suse.com/security/cve/CVE-2016-5320/" source="CVE"/>
		<reference ref_id="CVE-2016-5875" ref_url="https://www.suse.com/security/cve/CVE-2016-5875/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002264.html" source="SUSE-SU"/>
		<description>

This update for tiff fixes the following issues:

* CVE-2015-8781, CVE-2015-8782, CVE-2015-8783: Out-of-bounds writes for invalid images (bsc#964225)
* CVE-2016-3186: Buffer overflow in gif2tiff (bnc#973340).
* CVE-2016-5875: heap-based buffer overflow when using the PixarLog compressionformat (bsc#987351)
* CVE-2016-5316: Out-of-bounds read in PixarLogCleanup() function in tif_pixarlog.c (bsc#984837)
* CVE-2016-5314: Out-of-bounds write in PixarLogDecode() function (bsc#984831)
* CVE-2016-5317: Out-of-bounds write in PixarLogDecode() function in libtiff.so (bsc#984842)
* CVE-2016-5320: Out-of-bounds write in PixarLogDecode() function in tif_pixarlog.c (bsc#984808) 

		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-09"/>
	<updated date="2016-09-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/964225">SUSE bug 964225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973340">SUSE bug 973340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984808">SUSE bug 984808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984831">SUSE bug 984831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984837">SUSE bug 984837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984842">SUSE bug 984842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987351">SUSE bug 987351</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8781/">CVE-2015-8781</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8782/">CVE-2015-8782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8783/">CVE-2015-8783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3186/">CVE-2016-3186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5314/">CVE-2016-5314</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5316/">CVE-2016-5316</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5317/">CVE-2016-5317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5320/">CVE-2016-5320</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5875/">CVE-2016-5875</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516361" comment="libtiff5-4.0.6-26.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516362" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77554" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="948902" ref_url="https://bugzilla.suse.com/948902" source="BUGZILLA"/>
		<reference ref_id="981654" ref_url="https://bugzilla.suse.com/981654" source="BUGZILLA"/>
		<reference ref_id="989363" ref_url="https://bugzilla.suse.com/989363" source="BUGZILLA"/>
		<reference ref_id="992533" ref_url="https://bugzilla.suse.com/992533" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6210" ref_url="https://www.suse.com/security/cve/CVE-2016-6210/" source="CVE"/>
		<reference ref_id="CVE-2016-6515" ref_url="https://www.suse.com/security/cve/CVE-2016-6515/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002265.html" source="SUSE-SU"/>
		<description>

This update for openssh fixes the following issues:

- Prevent user enumeration through the timing of password
  processing (bsc#989363, CVE-2016-6210)
  [-prevent_timing_user_enumeration]
- Allow lowering the DH groups parameter limit in server as well
  as when GSSAPI key exchange is used (bsc#948902)
- limit accepted password length (prevents possible DoS)
  (bsc#992533, CVE-2016-6515)

Bug fixes:
- avoid complaining about unset DISPLAY variable (bsc#981654)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-09"/>
	<updated date="2016-09-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/948902">SUSE bug 948902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981654">SUSE bug 981654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989363">SUSE bug 989363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992533">SUSE bug 992533</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6210/">CVE-2016-6210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6515/">CVE-2016-6515</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516363" comment="openssh-6.6p1-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516364" comment="openssh-askpass-gnome-6.6p1-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516365" comment="openssh-helpers-6.6p1-52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77555" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="982176" ref_url="https://bugzilla.suse.com/982176" source="BUGZILLA"/>
		<reference ref_id="987577" ref_url="https://bugzilla.suse.com/987577" source="BUGZILLA"/>
		<reference ref_id="988032" ref_url="https://bugzilla.suse.com/988032" source="BUGZILLA"/>
		<reference ref_id="991436" ref_url="https://bugzilla.suse.com/991436" source="BUGZILLA"/>
		<reference ref_id="991622" ref_url="https://bugzilla.suse.com/991622" source="BUGZILLA"/>
		<reference ref_id="991710" ref_url="https://bugzilla.suse.com/991710" source="BUGZILLA"/>
		<reference ref_id="995034" ref_url="https://bugzilla.suse.com/995034" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5116" ref_url="https://www.suse.com/security/cve/CVE-2016-5116/" source="CVE"/>
		<reference ref_id="CVE-2016-6128" ref_url="https://www.suse.com/security/cve/CVE-2016-6128/" source="CVE"/>
		<reference ref_id="CVE-2016-6132" ref_url="https://www.suse.com/security/cve/CVE-2016-6132/" source="CVE"/>
		<reference ref_id="CVE-2016-6161" ref_url="https://www.suse.com/security/cve/CVE-2016-6161/" source="CVE"/>
		<reference ref_id="CVE-2016-6207" ref_url="https://www.suse.com/security/cve/CVE-2016-6207/" source="CVE"/>
		<reference ref_id="CVE-2016-6214" ref_url="https://www.suse.com/security/cve/CVE-2016-6214/" source="CVE"/>
		<reference ref_id="CVE-2016-6905" ref_url="https://www.suse.com/security/cve/CVE-2016-6905/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002271.html" source="SUSE-SU"/>
		<description>

This update for gd fixes the following issues:

  * CVE-2016-6214: Buffer over-read issue when parsing crafted TGA file [bsc#991436]
  * CVE-2016-6132: read out-of-bands was found in the parsing of TGA files using libgd [bsc#987577]
  * CVE-2016-6128: Invalid color index not properly handled [bsc#991710]
  * CVE-2016-6207: Integer overflow error within _gdContributionsAlloc() [bsc#991622]
  * CVE-2016-6161: global out of bounds read when encoding gif from malformed input withgd2togif [bsc#988032]
  * CVE-2016-5116: avoid stack overflow (read) with large names [bsc#982176]
  * CVE-2016-6905: Out-of-bounds read in function read_image_tga in gd_tga.c [bsc#995034]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-14"/>
	<updated date="2016-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/982176">SUSE bug 982176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987577">SUSE bug 987577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988032">SUSE bug 988032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991436">SUSE bug 991436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991622">SUSE bug 991622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991710">SUSE bug 991710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995034">SUSE bug 995034</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5116/">CVE-2016-5116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6128/">CVE-2016-6128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6132/">CVE-2016-6132</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6161/">CVE-2016-6161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6207/">CVE-2016-6207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6214/">CVE-2016-6214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6905/">CVE-2016-6905</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516366" comment="gd-2.1.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516367" comment="gd-32bit-2.1.0-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77556" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="969522" ref_url="https://bugzilla.suse.com/969522" source="BUGZILLA"/>
		<reference ref_id="975131" ref_url="https://bugzilla.suse.com/975131" source="BUGZILLA"/>
		<reference ref_id="981566" ref_url="https://bugzilla.suse.com/981566" source="BUGZILLA"/>
		<reference ref_id="986228" ref_url="https://bugzilla.suse.com/986228" source="BUGZILLA"/>
		<reference ref_id="986869" ref_url="https://bugzilla.suse.com/986869" source="BUGZILLA"/>
		<reference ref_id="991564" ref_url="https://bugzilla.suse.com/991564" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2119" ref_url="https://www.suse.com/security/cve/CVE-2016-2119/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002273.html" source="SUSE-SU"/>
		<description>

This update for samba provides the following fixes:
    
- CVE-2016-2119: Prevent client-side SMB2 signing downgrade. (bsc#986869)
- Fix possible ctdb crash when opening sockets with htons(IPPROTO_RAW). (bsc#969522)
- Honor smb.conf socket options in winbind. (bsc#975131)
- Fix ntlm-auth segmentation fault with squid. (bsc#986228)
- Implement new '--no-dns-updates' option in 'net ads' command. (bsc#991564)
- Fix population of ctdb sysconfig after source merge. (bsc#981566)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-14"/>
	<updated date="2016-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/969522">SUSE bug 969522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975131">SUSE bug 975131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981566">SUSE bug 981566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986228">SUSE bug 986228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986869">SUSE bug 986869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991564">SUSE bug 991564</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2119/">CVE-2016-2119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516368" comment="libdcerpc-binding0-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516369" comment="libdcerpc-binding0-32bit-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516370" comment="libdcerpc0-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516371" comment="libdcerpc0-32bit-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516372" comment="libgensec0-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516373" comment="libgensec0-32bit-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516374" comment="libndr-krb5pac0-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516375" comment="libndr-krb5pac0-32bit-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516376" comment="libndr-nbt0-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516377" comment="libndr-nbt0-32bit-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516378" comment="libndr-standard0-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516379" comment="libndr-standard0-32bit-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516380" comment="libndr0-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516381" comment="libndr0-32bit-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516382" comment="libnetapi0-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516383" comment="libnetapi0-32bit-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516384" comment="libregistry0-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516385" comment="libsamba-credentials0-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516386" comment="libsamba-credentials0-32bit-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516387" comment="libsamba-hostconfig0-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516388" comment="libsamba-hostconfig0-32bit-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516389" comment="libsamba-passdb0-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516390" comment="libsamba-passdb0-32bit-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516391" comment="libsamba-util0-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516392" comment="libsamba-util0-32bit-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516393" comment="libsamdb0-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516394" comment="libsamdb0-32bit-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516395" comment="libsmbclient-raw0-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516396" comment="libsmbclient-raw0-32bit-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516397" comment="libsmbclient0-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516398" comment="libsmbclient0-32bit-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516399" comment="libsmbconf0-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516400" comment="libsmbconf0-32bit-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516401" comment="libsmbldap0-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516402" comment="libsmbldap0-32bit-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516403" comment="libtevent-util0-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516404" comment="libtevent-util0-32bit-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516405" comment="libwbclient0-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516406" comment="libwbclient0-32bit-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516407" comment="samba-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516408" comment="samba-32bit-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516409" comment="samba-client-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516410" comment="samba-client-32bit-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516411" comment="samba-doc-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516412" comment="samba-libs-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516413" comment="samba-libs-32bit-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516414" comment="samba-winbind-4.2.4-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516415" comment="samba-winbind-32bit-4.2.4-26.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77557" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="930077" ref_url="https://bugzilla.suse.com/930077" source="BUGZILLA"/>
		<reference ref_id="930078" ref_url="https://bugzilla.suse.com/930078" source="BUGZILLA"/>
		<reference ref_id="930079" ref_url="https://bugzilla.suse.com/930079" source="BUGZILLA"/>
		<reference ref_id="937419" ref_url="https://bugzilla.suse.com/937419" source="BUGZILLA"/>
		<reference ref_id="952254" ref_url="https://bugzilla.suse.com/952254" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4141" ref_url="https://www.suse.com/security/cve/CVE-2015-4141/" source="CVE"/>
		<reference ref_id="CVE-2015-4142" ref_url="https://www.suse.com/security/cve/CVE-2015-4142/" source="CVE"/>
		<reference ref_id="CVE-2015-4143" ref_url="https://www.suse.com/security/cve/CVE-2015-4143/" source="CVE"/>
		<reference ref_id="CVE-2015-5310" ref_url="https://www.suse.com/security/cve/CVE-2015-5310/" source="CVE"/>
		<reference ref_id="CVE-2015-8041" ref_url="https://www.suse.com/security/cve/CVE-2015-8041/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002272.html" source="SUSE-SU"/>
		<description>

This update for wpa_supplicant fixes the following issues:

- CVE-2015-4141: WPS UPnP vulnerability with HTTP chunked transfer encoding. (bnc#930077)
- CVE-2015-4142: Integer underflow in AP mode WMM Action frame processing.  (bnc#930078)
- CVE-2015-4143: EAP-pwd missing payload length validation. (bnc#930079) 
- CVE-2015-5310: Ignore Key Data in WNM Sleep Mode Response frame if no PMF in use. (bsc#952254)
- CVE-2015-8041: Fix payload length validation in NDEF record parser. (bsc#937419)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-14"/>
	<updated date="2016-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/930077">SUSE bug 930077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930078">SUSE bug 930078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930079">SUSE bug 930079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937419">SUSE bug 937419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952254">SUSE bug 952254</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4141/">CVE-2015-4141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4142/">CVE-2015-4142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4143/">CVE-2015-4143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5310/">CVE-2015-5310</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8041/">CVE-2015-8041</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516416" comment="wpa_supplicant-2.2-14.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77558" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="998589" ref_url="https://bugzilla.suse.com/998589" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4182" ref_url="https://www.suse.com/security/cve/CVE-2016-4182/" source="CVE"/>
		<reference ref_id="CVE-2016-4237" ref_url="https://www.suse.com/security/cve/CVE-2016-4237/" source="CVE"/>
		<reference ref_id="CVE-2016-4238" ref_url="https://www.suse.com/security/cve/CVE-2016-4238/" source="CVE"/>
		<reference ref_id="CVE-2016-4271" ref_url="https://www.suse.com/security/cve/CVE-2016-4271/" source="CVE"/>
		<reference ref_id="CVE-2016-4272" ref_url="https://www.suse.com/security/cve/CVE-2016-4272/" source="CVE"/>
		<reference ref_id="CVE-2016-4274" ref_url="https://www.suse.com/security/cve/CVE-2016-4274/" source="CVE"/>
		<reference ref_id="CVE-2016-4275" ref_url="https://www.suse.com/security/cve/CVE-2016-4275/" source="CVE"/>
		<reference ref_id="CVE-2016-4276" ref_url="https://www.suse.com/security/cve/CVE-2016-4276/" source="CVE"/>
		<reference ref_id="CVE-2016-4277" ref_url="https://www.suse.com/security/cve/CVE-2016-4277/" source="CVE"/>
		<reference ref_id="CVE-2016-4278" ref_url="https://www.suse.com/security/cve/CVE-2016-4278/" source="CVE"/>
		<reference ref_id="CVE-2016-4279" ref_url="https://www.suse.com/security/cve/CVE-2016-4279/" source="CVE"/>
		<reference ref_id="CVE-2016-4280" ref_url="https://www.suse.com/security/cve/CVE-2016-4280/" source="CVE"/>
		<reference ref_id="CVE-2016-4281" ref_url="https://www.suse.com/security/cve/CVE-2016-4281/" source="CVE"/>
		<reference ref_id="CVE-2016-4282" ref_url="https://www.suse.com/security/cve/CVE-2016-4282/" source="CVE"/>
		<reference ref_id="CVE-2016-4283" ref_url="https://www.suse.com/security/cve/CVE-2016-4283/" source="CVE"/>
		<reference ref_id="CVE-2016-4284" ref_url="https://www.suse.com/security/cve/CVE-2016-4284/" source="CVE"/>
		<reference ref_id="CVE-2016-4285" ref_url="https://www.suse.com/security/cve/CVE-2016-4285/" source="CVE"/>
		<reference ref_id="CVE-2016-4287" ref_url="https://www.suse.com/security/cve/CVE-2016-4287/" source="CVE"/>
		<reference ref_id="CVE-2016-6921" ref_url="https://www.suse.com/security/cve/CVE-2016-6921/" source="CVE"/>
		<reference ref_id="CVE-2016-6922" ref_url="https://www.suse.com/security/cve/CVE-2016-6922/" source="CVE"/>
		<reference ref_id="CVE-2016-6923" ref_url="https://www.suse.com/security/cve/CVE-2016-6923/" source="CVE"/>
		<reference ref_id="CVE-2016-6924" ref_url="https://www.suse.com/security/cve/CVE-2016-6924/" source="CVE"/>
		<reference ref_id="CVE-2016-6925" ref_url="https://www.suse.com/security/cve/CVE-2016-6925/" source="CVE"/>
		<reference ref_id="CVE-2016-6926" ref_url="https://www.suse.com/security/cve/CVE-2016-6926/" source="CVE"/>
		<reference ref_id="CVE-2016-6927" ref_url="https://www.suse.com/security/cve/CVE-2016-6927/" source="CVE"/>
		<reference ref_id="CVE-2016-6929" ref_url="https://www.suse.com/security/cve/CVE-2016-6929/" source="CVE"/>
		<reference ref_id="CVE-2016-6930" ref_url="https://www.suse.com/security/cve/CVE-2016-6930/" source="CVE"/>
		<reference ref_id="CVE-2016-6931" ref_url="https://www.suse.com/security/cve/CVE-2016-6931/" source="CVE"/>
		<reference ref_id="CVE-2016-6932" ref_url="https://www.suse.com/security/cve/CVE-2016-6932/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00013.html" source="SUSE-SU"/>
		<description>
This update for flash-player fixes the following security issues (APSB16-29, boo#998589):

- integer overflow vulnerability that could lead to code execution (CVE-2016-4287). 
- use-after-free vulnerabilities that could lead to code execution (CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, CVE-2016-6932)
- security bypass vulnerabilities that could lead to information disclosure (CVE-2016-4271, CVE-2016-4277, CVE-2016-4278)
- memory corruption vulnerabilities that could lead to code execution (CVE-2016-4182, CVE-2016-4237, CVE-2016-4238, CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, CVE-2016-6924)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-15"/>
	<updated date="2016-09-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/998589">SUSE bug 998589</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4182/">CVE-2016-4182</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4237/">CVE-2016-4237</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4238/">CVE-2016-4238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4271/">CVE-2016-4271</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4272/">CVE-2016-4272</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4274/">CVE-2016-4274</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4275/">CVE-2016-4275</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4276/">CVE-2016-4276</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4277/">CVE-2016-4277</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4278/">CVE-2016-4278</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4279/">CVE-2016-4279</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4280/">CVE-2016-4280</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4281/">CVE-2016-4281</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4282/">CVE-2016-4282</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4283/">CVE-2016-4283</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4284/">CVE-2016-4284</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4285/">CVE-2016-4285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4287/">CVE-2016-4287</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6921/">CVE-2016-6921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6922/">CVE-2016-6922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6923/">CVE-2016-6923</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6924/">CVE-2016-6924</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6925/">CVE-2016-6925</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6926/">CVE-2016-6926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6927/">CVE-2016-6927</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6929/">CVE-2016-6929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6930/">CVE-2016-6930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6931/">CVE-2016-6931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6932/">CVE-2016-6932</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516417" comment="flash-player-11.2.202.635-140.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516418" comment="flash-player-gnome-11.2.202.635-140.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77559" version="1" class="patch">
	<metadata>
		<title>Security update for giflib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="949160" ref_url="https://bugzilla.suse.com/949160" source="BUGZILLA"/>
		<reference ref_id="960319" ref_url="https://bugzilla.suse.com/960319" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7555" ref_url="https://www.suse.com/security/cve/CVE-2015-7555/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001821.html" source="SUSE-SU"/>
		<description>

This update for giflib fixes the following issues:

- CVE-2015-7555: Heap overflow in giffix (bsc#960319)
- bsc#949160: Fix a memory leak
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-22"/>
	<updated date="2016-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/949160">SUSE bug 949160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960319">SUSE bug 960319</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7555/">CVE-2015-7555</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515709" comment="libgif6-5.0.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515710" comment="libgif6-32bit-5.0.5-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77560" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="991389" ref_url="https://bugzilla.suse.com/991389" source="BUGZILLA"/>
		<reference ref_id="991390" ref_url="https://bugzilla.suse.com/991390" source="BUGZILLA"/>
		<reference ref_id="991391" ref_url="https://bugzilla.suse.com/991391" source="BUGZILLA"/>
		<reference ref_id="991746" ref_url="https://bugzilla.suse.com/991746" source="BUGZILLA"/>
		<reference ref_id="997420" ref_url="https://bugzilla.suse.com/997420" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5419" ref_url="https://www.suse.com/security/cve/CVE-2016-5419/" source="CVE"/>
		<reference ref_id="CVE-2016-5420" ref_url="https://www.suse.com/security/cve/CVE-2016-5420/" source="CVE"/>
		<reference ref_id="CVE-2016-5421" ref_url="https://www.suse.com/security/cve/CVE-2016-5421/" source="CVE"/>
		<reference ref_id="CVE-2016-7141" ref_url="https://www.suse.com/security/cve/CVE-2016-7141/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002278.html" source="SUSE-SU"/>
		<description>

This update for curl fixes the following issues:

Security issues fixed:
- CVE-2016-5419: TLS session resumption client cert bypass (bsc#991389)
- CVE-2016-5420: Re-using connections with wrong client cert (bsc#991390)
- CVE-2016-5421: use of connection struct after free (bsc#991391)
- CVE-2016-7141: Fixed incorrect reuse of client certificates with NSS (bsc#997420)

Also the following bug was fixed:
- fixing a performance issue (bsc#991746)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-16"/>
	<updated date="2016-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/991389">SUSE bug 991389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991390">SUSE bug 991390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991391">SUSE bug 991391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991746">SUSE bug 991746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997420">SUSE bug 997420</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5419/">CVE-2016-5419</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5420/">CVE-2016-5420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5421/">CVE-2016-5421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7141/">CVE-2016-7141</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516419" comment="curl-7.37.0-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516420" comment="libcurl4-7.37.0-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516421" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77561" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="994157" ref_url="https://bugzilla.suse.com/994157" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6313" ref_url="https://www.suse.com/security/cve/CVE-2016-6313/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002280.html" source="SUSE-SU"/>
		<description>

This update for libgcrypt fixes the following issues:

  - RNG prediction vulnerability (bsc#994157, CVE-2016-6313)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-21"/>
	<updated date="2016-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/994157">SUSE bug 994157</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6313/">CVE-2016-6313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516422" comment="libgcrypt20-1.6.1-16.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516423" comment="libgcrypt20-32bit-1.6.1-16.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77562" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="937766" ref_url="https://bugzilla.suse.com/937766" source="BUGZILLA"/>
		<reference ref_id="945582" ref_url="https://bugzilla.suse.com/945582" source="BUGZILLA"/>
		<reference ref_id="955210" ref_url="https://bugzilla.suse.com/955210" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0224-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html" source="SUSE-SU"/>
		<description>
This update fixes the following security issues:

- CVE-2015-6908: The ber_get_next function allowed remote attackers to cause a denial
  of service (reachable assertion and application crash) via crafted BER data, as
  demonstrated by an attack against slapd. (bsc#945582)
- CVE-2015-4000: Fix weak Diffie-Hellman size vulnerability. (bsc#937766)

It also fixes the following non-security bugs:

- bsc#955210: Unresponsive LDAP host lookups in IPv6 environment

This update adds the following functionality:

- fate#319300: SHA2 password hashing module that can be loaded on-demand. 
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-25"/>
	<updated date="2016-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/937766">SUSE bug 937766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945582">SUSE bug 945582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955210">SUSE bug 955210</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515720" comment="libldap-2_4-2-2.4.41-18.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515721" comment="libldap-2_4-2-32bit-2.4.41-18.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515722" comment="openldap2-client-2.4.41-18.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77563" version="1" class="patch">
	<metadata>
		<title>Security update for flex, at, bogofilter, cyrus-imapd, kdelibs4, libQtWebKit4, libbonobo, mdbtools, netpbm, openslp, sgmltool, virtuoso, libqt5-qtwebkit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="954210" ref_url="https://bugzilla.suse.com/954210" source="BUGZILLA"/>
		<reference ref_id="990856" ref_url="https://bugzilla.suse.com/990856" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8079" ref_url="https://www.suse.com/security/cve/CVE-2015-8079/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002293.html" source="SUSE-SU"/>
		<description>

Various packages included vulnerable parsers generated by 'flex'.

This update provides a fixed 'flex' package and also rebuilds of packages
that might have security issues caused by the auto generated code.

Flex itself was updated to fix a buffer overflow in the generated scanner
(bsc#990856, CVE-2016-6354)

Packages that were rebuilt with the fixed flex:
- at
- bogofilter
- cyrus-imapd
- kdelibs4
- libQtWebKit4
- libbonobo
- mdbtools
- netpbm
- openslp
- sgmltool
- virtuoso

Also libqt5-qtwebkit received an additional security fix:
- CVE-2015-8079: QtWebKit logs visited URLs to WebpageIcons.db in private browsing mode (bsc#954210).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-27"/>
	<updated date="2016-09-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954210">SUSE bug 954210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990856">SUSE bug 990856</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8079/">CVE-2015-8079</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516424" comment="at-3.1.14-7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516425" comment="bogofilter-1.2.4-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516426" comment="libQtWebKit4-4.8.6+2.3.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516427" comment="libQtWebKit4-32bit-4.8.6+2.3.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516428" comment="libbonobo-2.32.1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516429" comment="libbonobo-32bit-2.32.1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516430" comment="libbonobo-lang-2.32.1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516431" comment="libkde4-4.12.0-7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516432" comment="libkde4-32bit-4.12.0-7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516433" comment="libkdecore4-4.12.0-7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516434" comment="libkdecore4-32bit-4.12.0-7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516435" comment="libksuseinstall1-4.12.0-7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516436" comment="libksuseinstall1-32bit-4.12.0-7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516437" comment="libnetpbm11-10.66.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516438" comment="libnetpbm11-32bit-10.66.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516439" comment="netpbm-10.66.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516440" comment="openslp-2.0.0-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516441" comment="openslp-32bit-2.0.0-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77564" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="979475" ref_url="https://bugzilla.suse.com/979475" source="BUGZILLA"/>
		<reference ref_id="982575" ref_url="https://bugzilla.suse.com/982575" source="BUGZILLA"/>
		<reference ref_id="982745" ref_url="https://bugzilla.suse.com/982745" source="BUGZILLA"/>
		<reference ref_id="983249" ref_url="https://bugzilla.suse.com/983249" source="BUGZILLA"/>
		<reference ref_id="988591" ref_url="https://bugzilla.suse.com/988591" source="BUGZILLA"/>
		<reference ref_id="990419" ref_url="https://bugzilla.suse.com/990419" source="BUGZILLA"/>
		<reference ref_id="993819" ref_url="https://bugzilla.suse.com/993819" source="BUGZILLA"/>
		<reference ref_id="994749" ref_url="https://bugzilla.suse.com/994749" source="BUGZILLA"/>
		<reference ref_id="994844" ref_url="https://bugzilla.suse.com/994844" source="BUGZILLA"/>
		<reference ref_id="995075" ref_url="https://bugzilla.suse.com/995075" source="BUGZILLA"/>
		<reference ref_id="995324" ref_url="https://bugzilla.suse.com/995324" source="BUGZILLA"/>
		<reference ref_id="995359" ref_url="https://bugzilla.suse.com/995359" source="BUGZILLA"/>
		<reference ref_id="995377" ref_url="https://bugzilla.suse.com/995377" source="BUGZILLA"/>
		<reference ref_id="998190" ref_url="https://bugzilla.suse.com/998190" source="BUGZILLA"/>
		<reference ref_id="999665" ref_url="https://bugzilla.suse.com/999665" source="BUGZILLA"/>
		<reference ref_id="999666" ref_url="https://bugzilla.suse.com/999666" source="BUGZILLA"/>
		<reference ref_id="999668" ref_url="https://bugzilla.suse.com/999668" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2180" ref_url="https://www.suse.com/security/cve/CVE-2016-2180/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues:

OpenSSL Security Advisory [22 Sep 2016] (bsc#999665)

Severity: High
* OCSP Status Request extension unbounded memory growth (CVE-2016-6304) (bsc#999666)

Severity: Low
* Pointer arithmetic undefined behaviour (CVE-2016-2177) (bsc#982575)
* Constant time flag not preserved in DSA signing (CVE-2016-2178) (bsc#983249)
* DTLS buffered message DoS (CVE-2016-2179) (bsc#994844)
* OOB read in TS_OBJ_print_bio() (CVE-2016-2180) (bsc#990419)
* DTLS replay protection DoS (CVE-2016-2181) (bsc#994749)
* OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
* Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359)
* Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324)
* OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
* Certificate message OOB reads (CVE-2016-6306) (bsc#999668)

More information can be found on: https://www.openssl.org/news/secadv/20160922.txt

Also following bugs were fixed:
* update expired S/MIME certs (bsc#979475)
* improve s390x performance (bsc#982745)
* allow &gt;= 64GB AESGCM transfers (bsc#988591)
* fix crash in print_notice (bsc#998190)
* resume reading from /dev/urandom when interrupted by a signal (bsc#995075)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-27"/>
	<updated date="2016-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979475">SUSE bug 979475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982575">SUSE bug 982575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982745">SUSE bug 982745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983249">SUSE bug 983249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988591">SUSE bug 988591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990419">SUSE bug 990419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993819">SUSE bug 993819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994749">SUSE bug 994749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995075">SUSE bug 995075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995324">SUSE bug 995324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995359">SUSE bug 995359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995377">SUSE bug 995377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998190">SUSE bug 998190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999666">SUSE bug 999666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999668">SUSE bug 999668</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2180/">CVE-2016-2180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516442" comment="libopenssl1_0_0-1.0.1i-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516443" comment="libopenssl1_0_0-32bit-1.0.1i-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516444" comment="openssl-1.0.1i-52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77565" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="949520" ref_url="https://bugzilla.suse.com/949520" source="BUGZILLA"/>
		<reference ref_id="998309" ref_url="https://bugzilla.suse.com/998309" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6662" ref_url="https://www.suse.com/security/cve/CVE-2016-6662/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00028.html" source="SUSE-SU"/>
		<description>

This update for mariadb to 1.0.0.27 fixes the following issues:

Security issue fixed:

* CVE-2016-6662: A malicious user with SQL and filesystem access could create
  a my.cnf in the datadir and, under certain circumstances, execute
  arbitrary code as mysql (or even root) user. (bsc#998309)

* release notes:
  * https://kb.askmonty.org/en/mariadb-10027-release-notes
* changelog:
  * https://kb.askmonty.org/en/mariadb-10027-changelog

Bugs fixed:

- Make ORDER BY optimization functions take into account multiple equalities.
  (bsc#949520)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-27"/>
	<updated date="2016-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/949520">SUSE bug 949520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998309">SUSE bug 998309</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6662/">CVE-2016-6662</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516445" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516446" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516447" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516448" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516449" comment="mariadb-10.0.27-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516450" comment="mariadb-client-10.0.27-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516451" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77566" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1000362" ref_url="https://bugzilla.suse.com/1000362" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2776" ref_url="https://www.suse.com/security/cve/CVE-2016-2776/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00026.html" source="SUSE-SU"/>
		<description>

The nameserver bind was updated to fix a remote denial of service
vulnerability, where a crafted packet could cause the nameserver to abort. (CVE-2016-2776, bsc#1000362)
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-27"/>
	<updated date="2016-09-27"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1000362">SUSE bug 1000362</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2776/">CVE-2016-2776</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516452" comment="bind-libs-9.9.9P1-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516453" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516454" comment="bind-utils-9.9.9P1-46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77567" version="1" class="patch">
	<metadata>
		<title>Security update for gdk-pixbuf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="958963" ref_url="https://bugzilla.suse.com/958963" source="BUGZILLA"/>
		<reference ref_id="960155" ref_url="https://bugzilla.suse.com/960155" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7552" ref_url="https://www.suse.com/security/cve/CVE-2015-7552/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001824.html" source="SUSE-SU"/>
		<description>

This update for gdk-pixbuf fixes the following security issues:

- CVE-2015-7552: various overflows, including heap overflow in flipping bmp files (bsc#958963)

The following non-security issue was fixed:

- bsc#960155: fix a possible divide by zero
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-25"/>
	<updated date="2016-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958963">SUSE bug 958963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960155">SUSE bug 960155</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7552/">CVE-2015-7552</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515723" comment="gdk-pixbuf-lang-2.30.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515724" comment="gdk-pixbuf-query-loaders-2.30.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515725" comment="gdk-pixbuf-query-loaders-32bit-2.30.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515726" comment="libgdk_pixbuf-2_0-0-2.30.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515727" comment="libgdk_pixbuf-2_0-0-32bit-2.30.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515728" comment="typelib-1_0-GdkPixbuf-2_0-2.30.6-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77568" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="973660" ref_url="https://bugzilla.suse.com/973660" source="BUGZILLA"/>
		<reference ref_id="993453" ref_url="https://bugzilla.suse.com/993453" source="BUGZILLA"/>
		<reference ref_id="993454" ref_url="https://bugzilla.suse.com/993454" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5423" ref_url="https://www.suse.com/security/cve/CVE-2016-5423/" source="CVE"/>
		<reference ref_id="CVE-2016-5424" ref_url="https://www.suse.com/security/cve/CVE-2016-5424/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00034.html" source="SUSE-SU"/>
		<description>
This update for postgresql94 to version 9.4.9 fixes the several issues.

These security issues were fixed:
- CVE-2016-5423: CASE/WHEN with inlining can cause untrusted pointer dereference (bsc#993454).
- CVE-2016-5424: Fix client programs' handling of special characters in database and role names (bsc#993453).

This non-security issue was fixed:
- bsc#973660: Added 'Requires: timezone' to Service Pack

For additional non-security issues please refer to
- http://www.postgresql.org/docs/9.4/static/release-9-4-9.html
- http://www.postgresql.org/docs/9.4/static/release-9-4-8.html
- http://www.postgresql.org/docs/9.4/static/release-9-4-7.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-29"/>
	<updated date="2016-09-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/973660">SUSE bug 973660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993453">SUSE bug 993453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993454">SUSE bug 993454</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5423/">CVE-2016-5423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5424/">CVE-2016-5424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516455" comment="libecpg6-9.4.9-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516456" comment="libpq5-9.4.9-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516457" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516458" comment="postgresql94-9.4.9-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77569" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="991344" ref_url="https://bugzilla.suse.com/991344" source="BUGZILLA"/>
		<reference ref_id="999701" ref_url="https://bugzilla.suse.com/999701" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5250" ref_url="https://www.suse.com/security/cve/CVE-2016-5250/" source="CVE"/>
		<reference ref_id="CVE-2016-5257" ref_url="https://www.suse.com/security/cve/CVE-2016-5257/" source="CVE"/>
		<reference ref_id="CVE-2016-5261" ref_url="https://www.suse.com/security/cve/CVE-2016-5261/" source="CVE"/>
		<reference ref_id="CVE-2016-5270" ref_url="https://www.suse.com/security/cve/CVE-2016-5270/" source="CVE"/>
		<reference ref_id="CVE-2016-5272" ref_url="https://www.suse.com/security/cve/CVE-2016-5272/" source="CVE"/>
		<reference ref_id="CVE-2016-5274" ref_url="https://www.suse.com/security/cve/CVE-2016-5274/" source="CVE"/>
		<reference ref_id="CVE-2016-5276" ref_url="https://www.suse.com/security/cve/CVE-2016-5276/" source="CVE"/>
		<reference ref_id="CVE-2016-5277" ref_url="https://www.suse.com/security/cve/CVE-2016-5277/" source="CVE"/>
		<reference ref_id="CVE-2016-5278" ref_url="https://www.suse.com/security/cve/CVE-2016-5278/" source="CVE"/>
		<reference ref_id="CVE-2016-5280" ref_url="https://www.suse.com/security/cve/CVE-2016-5280/" source="CVE"/>
		<reference ref_id="CVE-2016-5281" ref_url="https://www.suse.com/security/cve/CVE-2016-5281/" source="CVE"/>
		<reference ref_id="CVE-2016-5284" ref_url="https://www.suse.com/security/cve/CVE-2016-5284/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00001.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to version 45.4.0 ESR to fix the following issues:

Security issues fixed: (bsc#999701 MFSA 2016-86):
* CVE-2016-5270: Heap-buffer-overflow in nsCaseTransformTextRunFactory::TransformString
* CVE-2016-5272: Bad cast in nsImageGeometryMixin
* CVE-2016-5276: Heap-use-after-free in mozilla::a11y::DocAccessible::ProcessInvalidationList
* CVE-2016-5274: use-after-free in nsFrameManager::CaptureFrameState
* CVE-2016-5277: Heap-use-after-free in nsRefreshDriver::Tick
* CVE-2016-5278: Heap-buffer-overflow in nsBMPEncoder::AddImageFrame
* CVE-2016-5280: Use-after-free in mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap
* CVE-2016-5281: use-after-free in DOMSVGLength
* CVE-2016-5284: Add-on update site certificate pin expiration
* CVE-2016-5250: Resource Timing API is storing resources sent by the previous page
* CVE-2016-5261: Integer overflow and memory corruption in WebSocketChannel
* CVE-2016-5257: Memory safety bugs fixed in Firefox 49 and Firefox ESR 45.4

Bug fixed:
- Fix for aarch64 Firefox startup crash (bsc#991344)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-04"/>
	<updated date="2016-10-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/991344">SUSE bug 991344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5250/">CVE-2016-5250</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5257/">CVE-2016-5257</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5261/">CVE-2016-5261</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5270/">CVE-2016-5270</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5272/">CVE-2016-5272</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5274/">CVE-2016-5274</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5276/">CVE-2016-5276</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5277/">CVE-2016-5277</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5278/">CVE-2016-5278</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5280/">CVE-2016-5280</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5281/">CVE-2016-5281</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5284/">CVE-2016-5284</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516459" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516460" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77570" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="983671" ref_url="https://bugzilla.suse.com/983671" source="BUGZILLA"/>
		<reference ref_id="991012" ref_url="https://bugzilla.suse.com/991012" source="BUGZILLA"/>
		<reference ref_id="991013" ref_url="https://bugzilla.suse.com/991013" source="BUGZILLA"/>
		<reference ref_id="991015" ref_url="https://bugzilla.suse.com/991015" source="BUGZILLA"/>
		<reference ref_id="991016" ref_url="https://bugzilla.suse.com/991016" source="BUGZILLA"/>
		<reference ref_id="991017" ref_url="https://bugzilla.suse.com/991017" source="BUGZILLA"/>
		<reference ref_id="991018" ref_url="https://bugzilla.suse.com/991018" source="BUGZILLA"/>
		<reference ref_id="991019" ref_url="https://bugzilla.suse.com/991019" source="BUGZILLA"/>
		<reference ref_id="991020" ref_url="https://bugzilla.suse.com/991020" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5350" ref_url="https://www.suse.com/security/cve/CVE-2016-5350/" source="CVE"/>
		<reference ref_id="CVE-2016-5351" ref_url="https://www.suse.com/security/cve/CVE-2016-5351/" source="CVE"/>
		<reference ref_id="CVE-2016-5352" ref_url="https://www.suse.com/security/cve/CVE-2016-5352/" source="CVE"/>
		<reference ref_id="CVE-2016-5353" ref_url="https://www.suse.com/security/cve/CVE-2016-5353/" source="CVE"/>
		<reference ref_id="CVE-2016-5354" ref_url="https://www.suse.com/security/cve/CVE-2016-5354/" source="CVE"/>
		<reference ref_id="CVE-2016-5355" ref_url="https://www.suse.com/security/cve/CVE-2016-5355/" source="CVE"/>
		<reference ref_id="CVE-2016-5356" ref_url="https://www.suse.com/security/cve/CVE-2016-5356/" source="CVE"/>
		<reference ref_id="CVE-2016-5357" ref_url="https://www.suse.com/security/cve/CVE-2016-5357/" source="CVE"/>
		<reference ref_id="CVE-2016-5358" ref_url="https://www.suse.com/security/cve/CVE-2016-5358/" source="CVE"/>
		<reference ref_id="CVE-2016-5359" ref_url="https://www.suse.com/security/cve/CVE-2016-5359/" source="CVE"/>
		<reference ref_id="CVE-2016-6504" ref_url="https://www.suse.com/security/cve/CVE-2016-6504/" source="CVE"/>
		<reference ref_id="CVE-2016-6505" ref_url="https://www.suse.com/security/cve/CVE-2016-6505/" source="CVE"/>
		<reference ref_id="CVE-2016-6506" ref_url="https://www.suse.com/security/cve/CVE-2016-6506/" source="CVE"/>
		<reference ref_id="CVE-2016-6507" ref_url="https://www.suse.com/security/cve/CVE-2016-6507/" source="CVE"/>
		<reference ref_id="CVE-2016-6508" ref_url="https://www.suse.com/security/cve/CVE-2016-6508/" source="CVE"/>
		<reference ref_id="CVE-2016-6509" ref_url="https://www.suse.com/security/cve/CVE-2016-6509/" source="CVE"/>
		<reference ref_id="CVE-2016-6510" ref_url="https://www.suse.com/security/cve/CVE-2016-6510/" source="CVE"/>
		<reference ref_id="CVE-2016-6511" ref_url="https://www.suse.com/security/cve/CVE-2016-6511/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<description>

    
wireshark was updated to version 1.12.13 to fix the following issues:

- CVE-2016-6504: wireshark: NDS dissector crash (bnc#991012)
- CVE-2016-6505: wireshark: PacketBB dissector could divide
  by zero (bnc#991013)
- CVE-2016-6506: wireshark: WSP infinite loop (bnc#991015)
- CVE-2016-6507: wireshark: MMSE infinite loop (bnc#991016)
- CVE-2016-6508: wireshark: RLC long loop (bnc#991017)
- CVE-2016-6509: wireshark: LDSS dissector crash (bnc#991018)
- CVE-2016-6510: wireshark: RLC dissector crash (bnc#991019)
- CVE-2016-6511: wireshark: OpenFlow long loop (bnc991020)
      
- CVE-2016-5350: SPOOLS infinite loop (bsc#983671).
- CVE-2016-5351: IEEE 802.11 dissector crash (bsc#983671).
- CVE-2016-5352: IEEE 802.11 dissector crash, different from wpna-sec-2016-30 (bsc#983671).
- CVE-2016-5353: UMTS FP crash (bsc#983671).
- CVE-2016-5354: USB dissector crash (bsc#983671).
- CVE-2016-5355: Toshiba file parser crash (bsc#983671).
- CVE-2016-5356: CoSine file parser crash (bsc#983671).
- CVE-2016-5357: NetScreen file parser crash (bsc#983671).
- CVE-2016-5358: Ethernet dissector crash (bsc#983671).
- CVE-2016-5359: WBXML infinite loop (bsc#983671).

For more details please see:
  https://www.wireshark.org/docs/relnotes/wireshark-1.12.12.html
  https://www.wireshark.org/docs/relnotes/wireshark-1.12.13.html
    
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-04"/>
	<updated date="2016-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991012">SUSE bug 991012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991013">SUSE bug 991013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991015">SUSE bug 991015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991016">SUSE bug 991016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991017">SUSE bug 991017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991018">SUSE bug 991018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991019">SUSE bug 991019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991020">SUSE bug 991020</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5350/">CVE-2016-5350</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5351/">CVE-2016-5351</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5352/">CVE-2016-5352</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5353/">CVE-2016-5353</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5354/">CVE-2016-5354</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5355/">CVE-2016-5355</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5356/">CVE-2016-5356</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5357/">CVE-2016-5357</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5358/">CVE-2016-5358</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5359/">CVE-2016-5359</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6504/">CVE-2016-6504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6505/">CVE-2016-6505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6506/">CVE-2016-6506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6507/">CVE-2016-6507</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6508/">CVE-2016-6508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6509/">CVE-2016-6509</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6510/">CVE-2016-6510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6511/">CVE-2016-6511</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516461" comment="wireshark-1.12.13-31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77571" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl098 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="979475" ref_url="https://bugzilla.suse.com/979475" source="BUGZILLA"/>
		<reference ref_id="982575" ref_url="https://bugzilla.suse.com/982575" source="BUGZILLA"/>
		<reference ref_id="983249" ref_url="https://bugzilla.suse.com/983249" source="BUGZILLA"/>
		<reference ref_id="993819" ref_url="https://bugzilla.suse.com/993819" source="BUGZILLA"/>
		<reference ref_id="994749" ref_url="https://bugzilla.suse.com/994749" source="BUGZILLA"/>
		<reference ref_id="994844" ref_url="https://bugzilla.suse.com/994844" source="BUGZILLA"/>
		<reference ref_id="995075" ref_url="https://bugzilla.suse.com/995075" source="BUGZILLA"/>
		<reference ref_id="995324" ref_url="https://bugzilla.suse.com/995324" source="BUGZILLA"/>
		<reference ref_id="995359" ref_url="https://bugzilla.suse.com/995359" source="BUGZILLA"/>
		<reference ref_id="995377" ref_url="https://bugzilla.suse.com/995377" source="BUGZILLA"/>
		<reference ref_id="998190" ref_url="https://bugzilla.suse.com/998190" source="BUGZILLA"/>
		<reference ref_id="999665" ref_url="https://bugzilla.suse.com/999665" source="BUGZILLA"/>
		<reference ref_id="999666" ref_url="https://bugzilla.suse.com/999666" source="BUGZILLA"/>
		<reference ref_id="999668" ref_url="https://bugzilla.suse.com/999668" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html" source="SUSE-SU"/>
		<description>

This update for compat-openssl098 fixes the following issues:

OpenSSL Security Advisory [22 Sep 2016] (bsc#999665)

Severity: High
* OCSP Status Request extension unbounded memory growth (CVE-2016-6304) (bsc#999666)

Severity: Low
* Pointer arithmetic undefined behaviour (CVE-2016-2177) (bsc#982575)
* Constant time flag not preserved in DSA signing (CVE-2016-2178) (bsc#983249)
* DTLS buffered message DoS (CVE-2016-2179) (bsc#994844)
* DTLS replay protection DoS (CVE-2016-2181) (bsc#994749)
* OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
* Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359)
* Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324)
* OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
* Certificate message OOB reads (CVE-2016-6306) (bsc#999668)

More information can be found on: https://www.openssl.org/news/secadv/20160922.txt

Bugs fixed:
* update expired S/MIME certs (bsc#979475)
* fix crash in print_notice (bsc#998190)
* resume reading from /dev/urandom when interrupted by a signal (bsc#995075)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-06"/>
	<updated date="2016-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979475">SUSE bug 979475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982575">SUSE bug 982575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983249">SUSE bug 983249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993819">SUSE bug 993819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994749">SUSE bug 994749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995075">SUSE bug 995075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995324">SUSE bug 995324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995359">SUSE bug 995359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995377">SUSE bug 995377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998190">SUSE bug 998190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999666">SUSE bug 999666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999668">SUSE bug 999668</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516462" comment="libopenssl0_9_8-0.9.8j-102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516463" comment="libopenssl0_9_8-32bit-0.9.8j-102.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77572" version="1" class="patch">
	<metadata>
		<title>Security update for libreoffice (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1000102" ref_url="https://bugzilla.suse.com/1000102" source="BUGZILLA"/>
		<reference ref_id="987553" ref_url="https://bugzilla.suse.com/987553" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4324" ref_url="https://www.suse.com/security/cve/CVE-2016-4324/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002316.html" source="SUSE-SU"/>
		<description>

LibreOffice was updated to version 5.1.5.2, bringing enhancements and bug fixes.

- CVE-2016-4324: Parsing the Rich Text Format character style index was insufficiently
  checked for validity. Documents could be constructed which dereference an iterator to
  the first entry of an empty STL container. (bsc#987553)
- Don't use 'nullable' for introspection, as it isn't available on SLE 12's version
  of gobject-introspection. This prevents a segmentation fault in gnome-documents.
  (bsc#1000102)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-06"/>
	<updated date="2016-10-06"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1000102">SUSE bug 1000102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987553">SUSE bug 987553</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4324/">CVE-2016-4324</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516464" comment="libreoffice-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516465" comment="libreoffice-base-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516466" comment="libreoffice-base-drivers-mysql-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516467" comment="libreoffice-base-drivers-postgresql-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516468" comment="libreoffice-calc-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516469" comment="libreoffice-calc-extensions-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516470" comment="libreoffice-draw-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516471" comment="libreoffice-filters-optional-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516472" comment="libreoffice-gnome-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516473" comment="libreoffice-icon-theme-galaxy-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516474" comment="libreoffice-icon-theme-tango-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516475" comment="libreoffice-impress-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516476" comment="libreoffice-l10n-af-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516477" comment="libreoffice-l10n-ar-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516478" comment="libreoffice-l10n-ca-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516479" comment="libreoffice-l10n-cs-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516480" comment="libreoffice-l10n-da-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516481" comment="libreoffice-l10n-de-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516482" comment="libreoffice-l10n-en-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516483" comment="libreoffice-l10n-es-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516484" comment="libreoffice-l10n-fi-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516485" comment="libreoffice-l10n-fr-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516486" comment="libreoffice-l10n-gu-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516487" comment="libreoffice-l10n-hi-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516488" comment="libreoffice-l10n-hu-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516489" comment="libreoffice-l10n-it-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516490" comment="libreoffice-l10n-ja-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516491" comment="libreoffice-l10n-ko-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516492" comment="libreoffice-l10n-nb-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516493" comment="libreoffice-l10n-nl-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516494" comment="libreoffice-l10n-nn-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516495" comment="libreoffice-l10n-pl-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516496" comment="libreoffice-l10n-pt-BR-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516497" comment="libreoffice-l10n-pt-PT-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516498" comment="libreoffice-l10n-ru-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516499" comment="libreoffice-l10n-sk-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516500" comment="libreoffice-l10n-sv-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516501" comment="libreoffice-l10n-xh-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516502" comment="libreoffice-l10n-zh-Hans-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516503" comment="libreoffice-l10n-zh-Hant-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516504" comment="libreoffice-l10n-zu-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516505" comment="libreoffice-mailmerge-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516506" comment="libreoffice-math-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516507" comment="libreoffice-officebean-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516508" comment="libreoffice-pyuno-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516509" comment="libreoffice-writer-5.1.5.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516510" comment="libreoffice-writer-extensions-5.1.5.2-29.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77573" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="953518" ref_url="https://bugzilla.suse.com/953518" source="BUGZILLA"/>
		<reference ref_id="955104" ref_url="https://bugzilla.suse.com/955104" source="BUGZILLA"/>
		<reference ref_id="959330" ref_url="https://bugzilla.suse.com/959330" source="BUGZILLA"/>
		<reference ref_id="959552" ref_url="https://bugzilla.suse.com/959552" source="BUGZILLA"/>
		<reference ref_id="970135" ref_url="https://bugzilla.suse.com/970135" source="BUGZILLA"/>
		<reference ref_id="971949" ref_url="https://bugzilla.suse.com/971949" source="BUGZILLA"/>
		<reference ref_id="988675" ref_url="https://bugzilla.suse.com/988675" source="BUGZILLA"/>
		<reference ref_id="988676" ref_url="https://bugzilla.suse.com/988676" source="BUGZILLA"/>
		<reference ref_id="990500" ref_url="https://bugzilla.suse.com/990500" source="BUGZILLA"/>
		<reference ref_id="990970" ref_url="https://bugzilla.suse.com/990970" source="BUGZILLA"/>
		<reference ref_id="991934" ref_url="https://bugzilla.suse.com/991934" source="BUGZILLA"/>
		<reference ref_id="992224" ref_url="https://bugzilla.suse.com/992224" source="BUGZILLA"/>
		<reference ref_id="993665" ref_url="https://bugzilla.suse.com/993665" source="BUGZILLA"/>
		<reference ref_id="994421" ref_url="https://bugzilla.suse.com/994421" source="BUGZILLA"/>
		<reference ref_id="994625" ref_url="https://bugzilla.suse.com/994625" source="BUGZILLA"/>
		<reference ref_id="994761" ref_url="https://bugzilla.suse.com/994761" source="BUGZILLA"/>
		<reference ref_id="994772" ref_url="https://bugzilla.suse.com/994772" source="BUGZILLA"/>
		<reference ref_id="994775" ref_url="https://bugzilla.suse.com/994775" source="BUGZILLA"/>
		<reference ref_id="995785" ref_url="https://bugzilla.suse.com/995785" source="BUGZILLA"/>
		<reference ref_id="995789" ref_url="https://bugzilla.suse.com/995789" source="BUGZILLA"/>
		<reference ref_id="995792" ref_url="https://bugzilla.suse.com/995792" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6258" ref_url="https://www.suse.com/security/cve/CVE-2016-6258/" source="CVE"/>
		<reference ref_id="CVE-2016-6259" ref_url="https://www.suse.com/security/cve/CVE-2016-6259/" source="CVE"/>
		<reference ref_id="CVE-2016-6833" ref_url="https://www.suse.com/security/cve/CVE-2016-6833/" source="CVE"/>
		<reference ref_id="CVE-2016-6834" ref_url="https://www.suse.com/security/cve/CVE-2016-6834/" source="CVE"/>
		<reference ref_id="CVE-2016-6835" ref_url="https://www.suse.com/security/cve/CVE-2016-6835/" source="CVE"/>
		<reference ref_id="CVE-2016-6836" ref_url="https://www.suse.com/security/cve/CVE-2016-6836/" source="CVE"/>
		<reference ref_id="CVE-2016-6888" ref_url="https://www.suse.com/security/cve/CVE-2016-6888/" source="CVE"/>
		<reference ref_id="CVE-2016-7092" ref_url="https://www.suse.com/security/cve/CVE-2016-7092/" source="CVE"/>
		<reference ref_id="CVE-2016-7093" ref_url="https://www.suse.com/security/cve/CVE-2016-7093/" source="CVE"/>
		<reference ref_id="CVE-2016-7094" ref_url="https://www.suse.com/security/cve/CVE-2016-7094/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00014.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:
- CVE-2016-7092: The get_page_from_l3e function in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables (bsc#995785).
- CVE-2016-7093: Xen allowed local HVM guest OS administrators to overwrite hypervisor memory and consequently gain host OS privileges by leveraging mishandling of instruction pointer truncation during emulation (bsc#995789).
- CVE-2016-7094: Buffer overflow in Xen allowed local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update (bsc#995792).
- CVE-2016-6836: Information leakage in vmxnet3_complete_packet (bsc#994761).
- CVE-2016-6888: Integer overflow in packet initialisation in VMXNET3 device driver. Aprivileged user inside guest c... (bsc#994772).
- CVE-2016-6833: Use after free while writing (bsc#994775).
- CVE-2016-6835: Buffer overflow in vmxnet_tx_pkt_parse_headers() in vmxnet3 deviceemulation. (bsc#994625).
- CVE-2016-6834: An infinite loop during packet fragmentation (bsc#994421).
- CVE-2016-6258: The PV pagetable code in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries (bsc#988675).
- CVE-2016-6259: Xen did not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allowed local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check (bsc#988676).

These non-security issues were fixed:
- bsc#991934: Hypervisor crash in csched_acct
- bsc#992224: During boot of Xen Hypervisor, failed to get contiguous memory for DMA
- bsc#955104: Virsh reports error 'one or more references were leaked after disconnect from hypervisor' when 'virsh save' failed due to 'no response from client after 6 keepalive messages'
- bsc#959552: Migration of HVM guest leads into libvirt segmentation fault
- bsc#993665: Migration of xen guests finishes in: One or more references were leaked after disconnect from the hypervisor
- bsc#959330: Guest migrations using virsh results in error 'Internal error: received hangup / error event on socket'
- bsc#990500: VM virsh migration fails with keepalive error: ':virKeepAliveTimerInternal:143 : No response from client'
- bsc#953518: Unplug also SCSI disks in qemu-xen-traditional for upstream unplug protocol
- bsc#953518: xen_platform: unplug also SCSI disks in qemu-xen
- bsc#971949: xl: Support (by ignoring) xl migrate --live. xl migrations are always live
- bsc#970135: New virtualization project clock test randomly fails on Xen
- bsc#990970: Add PMU support for Intel E7-8867 v4 (fam=6, model=79)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-07"/>
	<updated date="2016-10-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/953518">SUSE bug 953518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955104">SUSE bug 955104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959330">SUSE bug 959330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959552">SUSE bug 959552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970135">SUSE bug 970135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971949">SUSE bug 971949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988675">SUSE bug 988675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988676">SUSE bug 988676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990500">SUSE bug 990500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990970">SUSE bug 990970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991934">SUSE bug 991934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992224">SUSE bug 992224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993665">SUSE bug 993665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994421">SUSE bug 994421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994625">SUSE bug 994625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994761">SUSE bug 994761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994772">SUSE bug 994772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994775">SUSE bug 994775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995785">SUSE bug 995785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995789">SUSE bug 995789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995792">SUSE bug 995792</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6258/">CVE-2016-6258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6259/">CVE-2016-6259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6833/">CVE-2016-6833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6834/">CVE-2016-6834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6835/">CVE-2016-6835</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6836/">CVE-2016-6836</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6888/">CVE-2016-6888</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7092/">CVE-2016-7092</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7093/">CVE-2016-7093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7094/">CVE-2016-7094</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516511" comment="xen-4.5.3_10-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516512" comment="xen-kmp-default-4.5.3_10_k3.12.62_60.62-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516513" comment="xen-libs-4.5.3_10-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516514" comment="xen-libs-32bit-4.5.3_10-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77574" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1000435" ref_url="https://bugzilla.suse.com/1000435" source="BUGZILLA"/>
		<reference ref_id="1001765" ref_url="https://bugzilla.suse.com/1001765" source="BUGZILLA"/>
		<reference ref_id="954374" ref_url="https://bugzilla.suse.com/954374" source="BUGZILLA"/>
		<reference ref_id="970293" ref_url="https://bugzilla.suse.com/970293" source="BUGZILLA"/>
		<reference ref_id="982210" ref_url="https://bugzilla.suse.com/982210" source="BUGZILLA"/>
		<reference ref_id="982211" ref_url="https://bugzilla.suse.com/982211" source="BUGZILLA"/>
		<reference ref_id="982251" ref_url="https://bugzilla.suse.com/982251" source="BUGZILLA"/>
		<reference ref_id="987173" ref_url="https://bugzilla.suse.com/987173" source="BUGZILLA"/>
		<reference ref_id="987857" ref_url="https://bugzilla.suse.com/987857" source="BUGZILLA"/>
		<reference ref_id="990074" ref_url="https://bugzilla.suse.com/990074" source="BUGZILLA"/>
		<reference ref_id="996269" ref_url="https://bugzilla.suse.com/996269" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7796" ref_url="https://www.suse.com/security/cve/CVE-2016-7796/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00016.html" source="SUSE-SU"/>
		<description>

This update for systemd fixes the following security issue:

- CVE-2016-7796: A zero-length message received over systemd's notification socket
  could make manager_dispatch_notify_fd() return an error and, as a side effect,
  disable the notification handler completely. As the notification socket is
  world-writable, this could have allowed a local user to perform a denial-of-service
  attack against systemd. (bsc#1001765)

Additionally, the following non-security fixes are included:

- Fix HMAC calculation when appending a data object to journal. (bsc#1000435)
- Never accept file descriptors from file systems with mandatory locking enabled.
  (bsc#954374)
- Do not warn about missing install info with 'preset'. (bsc#970293)  
- Save /run/systemd/users/UID before starting user@.service. (bsc#996269)
- Make sure that /var/lib/systemd/sysv-convert/database is always initialized.
  (bsc#982211)
- Remove daylight saving time handling and tzfile parser. (bsc#990074)
- Make sure directory watch is started before cryptsetup. (bsc#987173)
- Introduce sd_pid_notify() and sd_pid_notifyf() APIs. (bsc#987857)
- Set KillMode=mixed for our daemons that fork worker processes.
- Add nosuid and nodev options to tmp.mount.
- Don't start console-getty.service when /dev/console is missing. (bsc#982251)
- Correct segmentation fault in udev/path_id due to missing NULL check. (bsc#982210)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-07"/>
	<updated date="2016-10-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000435">SUSE bug 1000435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001765">SUSE bug 1001765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954374">SUSE bug 954374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970293">SUSE bug 970293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982210">SUSE bug 982210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982211">SUSE bug 982211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982251">SUSE bug 982251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987173">SUSE bug 987173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987857">SUSE bug 987857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990074">SUSE bug 990074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996269">SUSE bug 996269</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7796/">CVE-2016-7796</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516515" comment="libgudev-1_0-0-210-114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516516" comment="libgudev-1_0-0-32bit-210-114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516517" comment="libudev1-210-114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516518" comment="libudev1-32bit-210-114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516519" comment="systemd-210-114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516520" comment="systemd-32bit-210-114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516521" comment="systemd-bash-completion-210-114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516522" comment="systemd-sysvinit-210-114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516523" comment="udev-210-114.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77575" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1001951" ref_url="https://bugzilla.suse.com/1001951" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5653" ref_url="https://www.suse.com/security/cve/CVE-2013-5653/" source="CVE"/>
		<reference ref_id="CVE-2016-7978" ref_url="https://www.suse.com/security/cve/CVE-2016-7978/" source="CVE"/>
		<reference ref_id="CVE-2016-7979" ref_url="https://www.suse.com/security/cve/CVE-2016-7979/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2492-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00018.html" source="SUSE-SU"/>
		<description>

This update for ghostscript-library fixes the following issues:

- Multiple security vulnerabilities have been discovered where ghostscript's
  '-dsafer' flag did not provide sufficient protection against unintended
  access to the file system. Thus, a machine that would process a specially
  crafted Postscript file would potentially leak sensitive information to an
  attacker. (CVE-2013-5653, bsc#1001951)

- An incorrect reference count was found in .setdevice. This issue lead to a
  use-after-free scenario, which could have been exploited for
  denial-of-service or, possibly, arbitrary code execution attacks.
  (CVE-2016-7978, bsc#1001951)

- Insufficient validation of the type of input in .initialize_dsc_parser used
  to allow remote code execution. (CVE-2016-7979, bsc#1001951)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-11"/>
	<updated date="2016-10-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1001951">SUSE bug 1001951</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5653/">CVE-2013-5653</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7978/">CVE-2016-7978</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7979/">CVE-2016-7979</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516524" comment="ghostscript-9.15-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516525" comment="ghostscript-x11-9.15-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77576" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="974449" ref_url="https://bugzilla.suse.com/974449" source="BUGZILLA"/>
		<reference ref_id="974614" ref_url="https://bugzilla.suse.com/974614" source="BUGZILLA"/>
		<reference ref_id="974618" ref_url="https://bugzilla.suse.com/974618" source="BUGZILLA"/>
		<reference ref_id="975069" ref_url="https://bugzilla.suse.com/975069" source="BUGZILLA"/>
		<reference ref_id="975070" ref_url="https://bugzilla.suse.com/975070" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3622" ref_url="https://www.suse.com/security/cve/CVE-2016-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-3623" ref_url="https://www.suse.com/security/cve/CVE-2016-3623/" source="CVE"/>
		<reference ref_id="CVE-2016-3945" ref_url="https://www.suse.com/security/cve/CVE-2016-3945/" source="CVE"/>
		<reference ref_id="CVE-2016-3990" ref_url="https://www.suse.com/security/cve/CVE-2016-3990/" source="CVE"/>
		<reference ref_id="CVE-2016-3991" ref_url="https://www.suse.com/security/cve/CVE-2016-3991/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002326.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following security issues:

- CVE-2016-3622: Specially crafted TIFF images could trigger a crash in tiff2rgba (bsc#974449)
- Various out-of-bound write vulnerabilities with unspecified impact (MSVR 35093, MSVR 35094, MSVR 35095, MSVR 35096, MSVR 35097, MSVR 35098)
- CVE-2016-3623: Specially crafted TIFF images could trigger a crash in rgb2ycbcr (bsc#974618)
- CVE-2016-3945: Specially crafted TIFF images could trigger a crash or allow for arbitrary command execution via tiff2rgba (bsc#974614)
- CVE-2016-3990: Specially crafted TIFF images could trigger a crash or allow for arbitrary command execution (bsc#975069)
- CVE-2016-3991: Specially crafted TIFF images could trigger a crash or allow for arbitrary command execution via the tiffcrop tool (bsc#975070)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-12"/>
	<updated date="2016-10-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/974449">SUSE bug 974449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974614">SUSE bug 974614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974618">SUSE bug 974618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975069">SUSE bug 975069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975070">SUSE bug 975070</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3622/">CVE-2016-3622</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3623/">CVE-2016-3623</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3945/">CVE-2016-3945</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3990/">CVE-2016-3990</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3991/">CVE-2016-3991</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516526" comment="libtiff5-4.0.6-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516527" comment="libtiff5-32bit-4.0.6-31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77577" version="1" class="patch">
	<metadata>
		<title>Security update for freerdp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="829013" ref_url="https://bugzilla.suse.com/829013" source="BUGZILLA"/>
		<reference ref_id="857491" ref_url="https://bugzilla.suse.com/857491" source="BUGZILLA"/>
		<reference ref_id="880317" ref_url="https://bugzilla.suse.com/880317" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4118" ref_url="https://www.suse.com/security/cve/CVE-2013-4118/" source="CVE"/>
		<reference ref_id="CVE-2014-0250" ref_url="https://www.suse.com/security/cve/CVE-2014-0250/" source="CVE"/>
		<reference ref_id="CVE-2014-0791" ref_url="https://www.suse.com/security/cve/CVE-2014-0791/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002324.html" source="SUSE-SU"/>
		<description>

This update for freerdp fixes the following issues:

- CVE-2013-4118: Added a NULL pointer check to fix a server crash (bsc#829013).
- CVE-2014-0791: Integer overflow in the license_read_scope_list
  function in libfreerdp/core/license.c in FreeRDP allowed remote RDP
  servers to cause a denial of service (application crash) or possibly
  have unspecified other impact via a large ScopeCount value in a Scope
  List in a Server License Request packet. (bsc#857491)
- CVE-2014-0250: Multiple integer overflows in client/X11/xf_graphics.c
  in FreeRDP allowed remote attackers to have an unspecified impact via the
  width and height to the (1) xf_Pointer_New or (2) xf_Bitmap_Decompress
  function, which causes an incorrect amount of memory to be
  allocated. (bsc#880317)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-12"/>
	<updated date="2016-10-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/829013">SUSE bug 829013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857491">SUSE bug 857491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880317">SUSE bug 880317</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4118/">CVE-2013-4118</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0250/">CVE-2014-0250</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0791/">CVE-2014-0791</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516528" comment="freerdp-1.0.2-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516529" comment="libfreerdp-1_0-1.0.2-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516530" comment="libfreerdp-1_0-plugins-1.0.2-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77578" version="1" class="patch">
	<metadata>
		<title>Security update for X Window System client libraries (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1002991" ref_url="https://bugzilla.suse.com/1002991" source="BUGZILLA"/>
		<reference ref_id="1002995" ref_url="https://bugzilla.suse.com/1002995" source="BUGZILLA"/>
		<reference ref_id="1002998" ref_url="https://bugzilla.suse.com/1002998" source="BUGZILLA"/>
		<reference ref_id="1003000" ref_url="https://bugzilla.suse.com/1003000" source="BUGZILLA"/>
		<reference ref_id="1003002" ref_url="https://bugzilla.suse.com/1003002" source="BUGZILLA"/>
		<reference ref_id="1003012" ref_url="https://bugzilla.suse.com/1003012" source="BUGZILLA"/>
		<reference ref_id="1003017" ref_url="https://bugzilla.suse.com/1003017" source="BUGZILLA"/>
		<reference ref_id="1003023" ref_url="https://bugzilla.suse.com/1003023" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5407" ref_url="https://www.suse.com/security/cve/CVE-2016-5407/" source="CVE"/>
		<reference ref_id="CVE-2016-7942" ref_url="https://www.suse.com/security/cve/CVE-2016-7942/" source="CVE"/>
		<reference ref_id="CVE-2016-7944" ref_url="https://www.suse.com/security/cve/CVE-2016-7944/" source="CVE"/>
		<reference ref_id="CVE-2016-7945" ref_url="https://www.suse.com/security/cve/CVE-2016-7945/" source="CVE"/>
		<reference ref_id="CVE-2016-7946" ref_url="https://www.suse.com/security/cve/CVE-2016-7946/" source="CVE"/>
		<reference ref_id="CVE-2016-7947" ref_url="https://www.suse.com/security/cve/CVE-2016-7947/" source="CVE"/>
		<reference ref_id="CVE-2016-7948" ref_url="https://www.suse.com/security/cve/CVE-2016-7948/" source="CVE"/>
		<reference ref_id="CVE-2016-7949" ref_url="https://www.suse.com/security/cve/CVE-2016-7949/" source="CVE"/>
		<reference ref_id="CVE-2016-7950" ref_url="https://www.suse.com/security/cve/CVE-2016-7950/" source="CVE"/>
		<reference ref_id="CVE-2016-7951" ref_url="https://www.suse.com/security/cve/CVE-2016-7951/" source="CVE"/>
		<reference ref_id="CVE-2016-7952" ref_url="https://www.suse.com/security/cve/CVE-2016-7952/" source="CVE"/>
		<reference ref_id="CVE-2016-7953" ref_url="https://www.suse.com/security/cve/CVE-2016-7953/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002323.html" source="SUSE-SU"/>
		<description>
This update for the X Window System client libraries fixes a class of privilege escalation issues.

A malicious X Server could send specially crafted data to X clients, which allowed for triggering crashes, or privilege escalation if this relationship was untrusted or crossed user or permission level boundaries.

libX11, libXfixes, libXi, libXrandr, libXrender, libXtst, libXv, libXvMC were fixed, specifically:

libX11:
- CVE-2016-7942: insufficient validation of data from the X server allowed out of boundary memory read (bsc#1002991)

libXfixes:
- CVE-2016-7944: insufficient validation of data from the X server can cause an integer overflow on 32 bit architectures (bsc#1002995)

libXi:
- CVE-2016-7945, CVE-2016-7946: insufficient validation of data from the X server can cause out of boundary memory access or endless loops (Denial of Service) (bsc#1002998)

libXtst:
- CVE-2016-7951, CVE-2016-7952: insufficient validation of data from the X server can cause out of boundary memory access or endless loops (Denial of Service) (bsc#1003012)

libXv:
- CVE-2016-5407: insufficient validation of data from the X server can cause out of boundary memory and memory corruption (bsc#1003017)

libXvMC:
- CVE-2016-7953: insufficient validation of data from the X server can cause a one byte buffer read underrun (bsc#1003023)

libXrender:
- CVE-2016-7949, CVE-2016-7950: insufficient validation of data from the X server can cause out of boundary memory writes (bsc#1003002)

libXrandr:
- CVE-2016-7947, CVE-2016-7948: insufficient validation of data from the X server can cause out of boundary memory writes (bsc#1003000)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-12"/>
	<updated date="2016-10-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002991">SUSE bug 1002991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002995">SUSE bug 1002995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002998">SUSE bug 1002998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003000">SUSE bug 1003000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003002">SUSE bug 1003002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003012">SUSE bug 1003012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003017">SUSE bug 1003017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003023">SUSE bug 1003023</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5407/">CVE-2016-5407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7942/">CVE-2016-7942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7944/">CVE-2016-7944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7945/">CVE-2016-7945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7946/">CVE-2016-7946</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7947/">CVE-2016-7947</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7948/">CVE-2016-7948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7949/">CVE-2016-7949</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7950/">CVE-2016-7950</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7951/">CVE-2016-7951</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7952/">CVE-2016-7952</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7953/">CVE-2016-7953</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516531" comment="libX11-6-1.6.2-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516532" comment="libX11-6-32bit-1.6.2-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516533" comment="libX11-data-1.6.2-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516534" comment="libX11-xcb1-1.6.2-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516535" comment="libX11-xcb1-32bit-1.6.2-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516536" comment="libXfixes3-5.0.1-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516537" comment="libXfixes3-32bit-5.0.1-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516538" comment="libXi6-1.7.4-12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516539" comment="libXi6-32bit-1.7.4-12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516540" comment="libXrandr2-1.4.2-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516541" comment="libXrandr2-32bit-1.4.2-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516542" comment="libXrender1-0.9.8-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516543" comment="libXrender1-32bit-0.9.8-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516544" comment="libXtst6-1.2.2-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516545" comment="libXtst6-32bit-1.2.2-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516546" comment="libXv1-1.0.10-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516547" comment="libXv1-32bit-1.0.10-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516548" comment="libXvMC1-1.0.8-5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77579" version="1" class="patch">
	<metadata>
		<title>Security update for flash-playerqemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1003993" ref_url="https://bugzilla.suse.com/1003993" source="BUGZILLA"/>
		<reference ref_id="1004019" ref_url="https://bugzilla.suse.com/1004019" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4273" ref_url="https://www.suse.com/security/cve/CVE-2016-4273/" source="CVE"/>
		<reference ref_id="CVE-2016-4286" ref_url="https://www.suse.com/security/cve/CVE-2016-4286/" source="CVE"/>
		<reference ref_id="CVE-2016-6981" ref_url="https://www.suse.com/security/cve/CVE-2016-6981/" source="CVE"/>
		<reference ref_id="CVE-2016-6982" ref_url="https://www.suse.com/security/cve/CVE-2016-6982/" source="CVE"/>
		<reference ref_id="CVE-2016-6983" ref_url="https://www.suse.com/security/cve/CVE-2016-6983/" source="CVE"/>
		<reference ref_id="CVE-2016-6984" ref_url="https://www.suse.com/security/cve/CVE-2016-6984/" source="CVE"/>
		<reference ref_id="CVE-2016-6985" ref_url="https://www.suse.com/security/cve/CVE-2016-6985/" source="CVE"/>
		<reference ref_id="CVE-2016-6986" ref_url="https://www.suse.com/security/cve/CVE-2016-6986/" source="CVE"/>
		<reference ref_id="CVE-2016-6987" ref_url="https://www.suse.com/security/cve/CVE-2016-6987/" source="CVE"/>
		<reference ref_id="CVE-2016-6989" ref_url="https://www.suse.com/security/cve/CVE-2016-6989/" source="CVE"/>
		<reference ref_id="CVE-2016-6990" ref_url="https://www.suse.com/security/cve/CVE-2016-6990/" source="CVE"/>
		<reference ref_id="CVE-2016-6992" ref_url="https://www.suse.com/security/cve/CVE-2016-6992/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2512-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00024.html" source="SUSE-SU"/>
		<description>

flash-player was updated to version 11.2.202.637 to fix the following issues (bsc#1004019):

CVE-2016-6992: A type confusion vulnerability that could lead to code execution.
CVE-2016-6981, CVE-2016-6987: use-after-free vulnerabilities that could lead to code execution 
CVE-2016-4286: Security bypass vulnerability 
CVE-2016-4273, CVE-2016-6982, CVE-2016-6983, CVE-2016-6984, CVE-2016-6985, CVE-2016-6986, CVE-2016-6989, CVE-2016-6990: Memory corruption vulnerabilities that could lead to code execution 

Also the EULA was updated to version 23.0 (bsc#1003993).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-12"/>
	<updated date="2016-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1003993">SUSE bug 1003993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004019">SUSE bug 1004019</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4273/">CVE-2016-4273</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4286/">CVE-2016-4286</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6981/">CVE-2016-6981</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6982/">CVE-2016-6982</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6983/">CVE-2016-6983</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6984/">CVE-2016-6984</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6985/">CVE-2016-6985</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6986/">CVE-2016-6986</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6987/">CVE-2016-6987</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6989/">CVE-2016-6989</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6990/">CVE-2016-6990</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6992/">CVE-2016-6992</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516549" comment="flash-player-11.2.202.637-143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516550" comment="flash-player-gnome-11.2.202.637-143.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77580" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="966682" ref_url="https://bugzilla.suse.com/966682" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7447" ref_url="https://www.suse.com/security/cve/CVE-2013-7447/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002336.html" source="SUSE-SU"/>
		<description>

This update for gtk2 fixes the following issues:

- CVE-2013-7447: Avoid an overflow when allocating a cairo pixbuf (bsc#966682).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-17"/>
	<updated date="2016-10-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/966682">SUSE bug 966682</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7447/">CVE-2013-7447</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516551" comment="gtk2-lang-2.24.24-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516552" comment="gtk2-tools-2.24.24-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516553" comment="gtk2-tools-32bit-2.24.24-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516554" comment="libgtk-2_0-0-2.24.24-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516555" comment="libgtk-2_0-0-32bit-2.24.24-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516556" comment="typelib-1_0-Gtk-2_0-2.24.24-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77581" version="1" class="patch">
	<metadata>
		<title>Security update for kdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="927451" ref_url="https://bugzilla.suse.com/927451" source="BUGZILLA"/>
		<reference ref_id="932339" ref_url="https://bugzilla.suse.com/932339" source="BUGZILLA"/>
		<reference ref_id="943214" ref_url="https://bugzilla.suse.com/943214" source="BUGZILLA"/>
		<reference ref_id="951844" ref_url="https://bugzilla.suse.com/951844" source="BUGZILLA"/>
		<reference ref_id="964206" ref_url="https://bugzilla.suse.com/964206" source="BUGZILLA"/>
		<reference ref_id="970708" ref_url="https://bugzilla.suse.com/970708" source="BUGZILLA"/>
		<reference ref_id="973213" ref_url="https://bugzilla.suse.com/973213" source="BUGZILLA"/>
		<reference ref_id="974270" ref_url="https://bugzilla.suse.com/974270" source="BUGZILLA"/>
		<reference ref_id="976864" ref_url="https://bugzilla.suse.com/976864" source="BUGZILLA"/>
		<reference ref_id="980328" ref_url="https://bugzilla.suse.com/980328" source="BUGZILLA"/>
		<reference ref_id="984799" ref_url="https://bugzilla.suse.com/984799" source="BUGZILLA"/>
		<reference ref_id="987862" ref_url="https://bugzilla.suse.com/987862" source="BUGZILLA"/>
		<reference ref_id="989972" ref_url="https://bugzilla.suse.com/989972" source="BUGZILLA"/>
		<reference ref_id="990200" ref_url="https://bugzilla.suse.com/990200" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5759" ref_url="https://www.suse.com/security/cve/CVE-2016-5759/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002337.html" source="SUSE-SU"/>
		<description>

This update for kdump provides several fixes and enhancements:

- Refresh kdumprd if /etc/hosts or /etc/nsswitch.conf is changed. (bsc#943214)
- Add a separate systemd service to rebuild kdumprd at boot. (bsc#943214)
- Improve network setup in the kdump environment by reading configuration from wicked
  by default (system configuration files are used as a fallback). (bsc#980328)
- Use the last mount entry in kdump_get_mountpoints(). (bsc#951844)
- Remove 'notsc' from the kdump kernel command line. (bsc#973213)
- Handle dump files with many program headers. (bsc#932339, bsc#970708)
- Fall back to stat() if file type is DT_UNKNOWN. (bsc#964206)
- Remove vm. sysctls from kdump initrd. (bsc#927451, bsc#987862)
- Use the exit code of kexec, not that of 'local'. (bsc#984799)
- Convert sysroot to a bind mount in kdump initrd. (bsc#976864)
- Distinguish between Xenlinux (aka Xenified or SUSE) and pvops Xen kernels, as the
  latter can run on bare metal. (bsc#974270)
- CVE-2016-5759: Use full path to dracut as argument to bash. (bsc#989972, bsc#990200)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-17"/>
	<updated date="2016-10-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/927451">SUSE bug 927451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932339">SUSE bug 932339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943214">SUSE bug 943214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951844">SUSE bug 951844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964206">SUSE bug 964206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970708">SUSE bug 970708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973213">SUSE bug 973213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974270">SUSE bug 974270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976864">SUSE bug 976864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980328">SUSE bug 980328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984799">SUSE bug 984799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987862">SUSE bug 987862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989972">SUSE bug 989972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990200">SUSE bug 990200</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5759/">CVE-2016-5759</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516557" comment="kdump-0.8.15-29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77582" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1003898" ref_url="https://bugzilla.suse.com/1003898" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2016:2565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002339.html" source="SUSE-SU"/>
		<description>
This update for dbus-1 to version 1.8.22 fixes one security issue and bugs.

The following security issue was fixed:

- bsc#1003898: Do not treat ActivationFailure message received from root-owned systemd name as a format string.

The following upstream changes are included:

- Change the default configuration for the session bus to only allow EXTERNAL authentication (secure kernel-mediated credentials-passing), as was already done for the system bus.
- Fix a memory leak when GetConnectionCredentials() succeeds (fdo#91008)
- Ensure that dbus-monitor does not reply to messages intended for others (fdo#90952)
- Add locking to DBusCounter's reference count and notify function (fdo#89297)
- Ensure that DBusTransport's reference count is protected by the corresponding DBusConnection's lock (fdo#90312)
- Correctly release DBusServer mutex before early-return if we run out of memory while copying authentication mechanisms (fdo#90021)
- Correctly initialize all fields of DBusTypeReader (fdo#90021)
- Fix some missing \n in verbose (debug log) messages (fdo#90004)
- Clean up some memory leaks in test code (fdo#90021)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-19"/>
	<updated date="2016-10-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003898">SUSE bug 1003898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516558" comment="dbus-1-1.8.22-22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516559" comment="dbus-1-x11-1.8.22-22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516560" comment="libdbus-1-3-1.8.22-22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516561" comment="libdbus-1-3-32bit-1.8.22-22.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77583" version="1" class="patch">
	<metadata>
		<title>Security update for sssd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1002973" ref_url="https://bugzilla.suse.com/1002973" source="BUGZILLA"/>
		<reference ref_id="1004220" ref_url="https://bugzilla.suse.com/1004220" source="BUGZILLA"/>
		<reference ref_id="880245" ref_url="https://bugzilla.suse.com/880245" source="BUGZILLA"/>
		<reference ref_id="993582" ref_url="https://bugzilla.suse.com/993582" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0249" ref_url="https://www.suse.com/security/cve/CVE-2014-0249/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002342.html" source="SUSE-SU"/>
		<description>

This update for sssd fixes one security issue and three bugs.

The following vulnerability was fixed:

- CVE-2014-0249: Incorrect expansion of group membership when encountering a non-POSIX group.
  (bsc#880245)

The following non-security fixes were also included:

- Prevent crashes of statically linked binaries using getpwuid when sssd is used and nscd is
  turned off or has caching disabled. (bsc#993582)
- Add logrotate configuration to prevent log files from growing too large when running with
  debug mode enabled. (bsc#1004220)
- Order sudo rules by the same logic used by the native LDAP support from sudo. (bsc#1002973)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-20"/>
	<updated date="2016-10-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002973">SUSE bug 1002973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004220">SUSE bug 1004220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880245">SUSE bug 880245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993582">SUSE bug 993582</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0249/">CVE-2014-0249</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516562" comment="libipa_hbac0-1.11.5.1-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516563" comment="libsss_idmap0-1.11.5.1-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516564" comment="libsss_sudo-1.11.5.1-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516565" comment="python-sssd-config-1.11.5.1-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516566" comment="sssd-1.11.5.1-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516567" comment="sssd-32bit-1.11.5.1-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516568" comment="sssd-ad-1.11.5.1-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516569" comment="sssd-ipa-1.11.5.1-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516570" comment="sssd-krb5-1.11.5.1-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516571" comment="sssd-krb5-common-1.11.5.1-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516572" comment="sssd-ldap-1.11.5.1-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516573" comment="sssd-proxy-1.11.5.1-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516574" comment="sssd-tools-1.11.5.1-28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77584" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1001419" ref_url="https://bugzilla.suse.com/1001419" source="BUGZILLA"/>
		<reference ref_id="1002165" ref_url="https://bugzilla.suse.com/1002165" source="BUGZILLA"/>
		<reference ref_id="1004418" ref_url="https://bugzilla.suse.com/1004418" source="BUGZILLA"/>
		<reference ref_id="904970" ref_url="https://bugzilla.suse.com/904970" source="BUGZILLA"/>
		<reference ref_id="907150" ref_url="https://bugzilla.suse.com/907150" source="BUGZILLA"/>
		<reference ref_id="920615" ref_url="https://bugzilla.suse.com/920615" source="BUGZILLA"/>
		<reference ref_id="920633" ref_url="https://bugzilla.suse.com/920633" source="BUGZILLA"/>
		<reference ref_id="930408" ref_url="https://bugzilla.suse.com/930408" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5195" ref_url="https://www.suse.com/security/cve/CVE-2016-5195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP1 kernel was updated to fix two issues.

This security bug was fixed:

- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).

This non-security bug was fixed:

- sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-21"/>
	<updated date="2016-10-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1001419">SUSE bug 1001419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002165">SUSE bug 1002165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004418">SUSE bug 1004418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904970">SUSE bug 904970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907150">SUSE bug 907150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920615">SUSE bug 920615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920633">SUSE bug 920633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930408">SUSE bug 930408</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5195/">CVE-2016-5195</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516575" comment="kernel-default-3.12.62-60.64.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516576" comment="kernel-default-devel-3.12.62-60.64.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516577" comment="kernel-default-extra-3.12.62-60.64.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516578" comment="kernel-devel-3.12.62-60.64.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516579" comment="kernel-macros-3.12.62-60.64.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516580" comment="kernel-source-3.12.62-60.64.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516581" comment="kernel-syms-3.12.62-60.64.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516582" comment="kernel-xen-3.12.62-60.64.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516583" comment="kernel-xen-devel-3.12.62-60.64.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77585" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1000048" ref_url="https://bugzilla.suse.com/1000048" source="BUGZILLA"/>
		<reference ref_id="967012" ref_url="https://bugzilla.suse.com/967012" source="BUGZILLA"/>
		<reference ref_id="967013" ref_url="https://bugzilla.suse.com/967013" source="BUGZILLA"/>
		<reference ref_id="982017" ref_url="https://bugzilla.suse.com/982017" source="BUGZILLA"/>
		<reference ref_id="982018" ref_url="https://bugzilla.suse.com/982018" source="BUGZILLA"/>
		<reference ref_id="982019" ref_url="https://bugzilla.suse.com/982019" source="BUGZILLA"/>
		<reference ref_id="982222" ref_url="https://bugzilla.suse.com/982222" source="BUGZILLA"/>
		<reference ref_id="982223" ref_url="https://bugzilla.suse.com/982223" source="BUGZILLA"/>
		<reference ref_id="982285" ref_url="https://bugzilla.suse.com/982285" source="BUGZILLA"/>
		<reference ref_id="982959" ref_url="https://bugzilla.suse.com/982959" source="BUGZILLA"/>
		<reference ref_id="983961" ref_url="https://bugzilla.suse.com/983961" source="BUGZILLA"/>
		<reference ref_id="983982" ref_url="https://bugzilla.suse.com/983982" source="BUGZILLA"/>
		<reference ref_id="991080" ref_url="https://bugzilla.suse.com/991080" source="BUGZILLA"/>
		<reference ref_id="991466" ref_url="https://bugzilla.suse.com/991466" source="BUGZILLA"/>
		<reference ref_id="994760" ref_url="https://bugzilla.suse.com/994760" source="BUGZILLA"/>
		<reference ref_id="994771" ref_url="https://bugzilla.suse.com/994771" source="BUGZILLA"/>
		<reference ref_id="994774" ref_url="https://bugzilla.suse.com/994774" source="BUGZILLA"/>
		<reference ref_id="996441" ref_url="https://bugzilla.suse.com/996441" source="BUGZILLA"/>
		<reference ref_id="997858" ref_url="https://bugzilla.suse.com/997858" source="BUGZILLA"/>
		<reference ref_id="997859" ref_url="https://bugzilla.suse.com/997859" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391/" source="CVE"/>
		<reference ref_id="CVE-2016-2392" ref_url="https://www.suse.com/security/cve/CVE-2016-2392/" source="CVE"/>
		<reference ref_id="CVE-2016-4453" ref_url="https://www.suse.com/security/cve/CVE-2016-4453/" source="CVE"/>
		<reference ref_id="CVE-2016-4454" ref_url="https://www.suse.com/security/cve/CVE-2016-4454/" source="CVE"/>
		<reference ref_id="CVE-2016-5105" ref_url="https://www.suse.com/security/cve/CVE-2016-5105/" source="CVE"/>
		<reference ref_id="CVE-2016-5106" ref_url="https://www.suse.com/security/cve/CVE-2016-5106/" source="CVE"/>
		<reference ref_id="CVE-2016-5107" ref_url="https://www.suse.com/security/cve/CVE-2016-5107/" source="CVE"/>
		<reference ref_id="CVE-2016-5126" ref_url="https://www.suse.com/security/cve/CVE-2016-5126/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5337" ref_url="https://www.suse.com/security/cve/CVE-2016-5337/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-5403" ref_url="https://www.suse.com/security/cve/CVE-2016-5403/" source="CVE"/>
		<reference ref_id="CVE-2016-6490" ref_url="https://www.suse.com/security/cve/CVE-2016-6490/" source="CVE"/>
		<reference ref_id="CVE-2016-6833" ref_url="https://www.suse.com/security/cve/CVE-2016-6833/" source="CVE"/>
		<reference ref_id="CVE-2016-6836" ref_url="https://www.suse.com/security/cve/CVE-2016-6836/" source="CVE"/>
		<reference ref_id="CVE-2016-6888" ref_url="https://www.suse.com/security/cve/CVE-2016-6888/" source="CVE"/>
		<reference ref_id="CVE-2016-7116" ref_url="https://www.suse.com/security/cve/CVE-2016-7116/" source="CVE"/>
		<reference ref_id="CVE-2016-7155" ref_url="https://www.suse.com/security/cve/CVE-2016-7155/" source="CVE"/>
		<reference ref_id="CVE-2016-7156" ref_url="https://www.suse.com/security/cve/CVE-2016-7156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<description>
qemu was updated to fix 19 security issues.

These security issues were fixed:
- CVE-2016-2392: The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU did not properly validate USB configuration descriptor objects, which allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet (bsc#967012)
- CVE-2016-2391: The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers (bsc#967013)
- CVE-2016-5106: The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982018)
- CVE-2016-5105: The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, used an uninitialized variable, which allowed local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982017)
- CVE-2016-5107: The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors (bsc#982019)
- CVE-2016-5126: Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allowed local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call (bsc#982285)
- CVE-2016-4454: The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read (bsc#982222)
- CVE-2016-4453: The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982223)
- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer (bsc#983982)
- CVE-2016-5337: The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information (bsc#983961)
- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982959)
- CVE-2016-5403: The virtqueue_pop function in hw/virtio/virtio.c in QEMU allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion (bsc#991080)
- CVE-2016-6490: Infinite loop in the virtio framework. A privileged user inside the guest could have used this flaw to crash the Qemu instance on the host resulting in DoS (bsc#991466)
- CVE-2016-6888: Integer overflow in packet initialisation in VMXNET3 device driver. A privileged user inside guest could have used this flaw to crash the Qemu instance resulting in DoS (bsc#994771)
- CVE-2016-6833: Use-after-free issue in the VMWARE VMXNET3 NIC device support. A privileged user inside guest could have used this issue to crash the Qemu instance resulting in DoS (bsc#994774)
- CVE-2016-7116: Host directory sharing via Plan 9 File System(9pfs) was vulnerable to a directory/path traversal issue. A privileged user inside guest could have used this flaw to access undue files on the host (bsc#996441)
- CVE-2016-6836: VMWARE VMXNET3 NIC device support was leaging information leakage. A privileged user inside guest could have used this to leak host memory bytes to a guest (bsc#994760)
- CVE-2016-7155: In the VMWARE PVSCSI paravirtual SCSI bus a OOB access and/or infinite loop issue could have allowed a privileged user inside guest to crash the Qemu process resulting in DoS (bsc#997858)
- CVE-2016-7156: In the VMWARE PVSCSI paravirtual SCSI bus a infinite loop issue could have allowed a privileged user inside guest to crash the Qemu process resulting in DoS (bsc#997859)

This non-security issue was fixed:
- bsc#1000048: Fix migration failure where target host is a soon to be released SLES 12 SP2. Qemu's spice code gets an assertion.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-21"/>
	<updated date="2016-10-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000048">SUSE bug 1000048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967012">SUSE bug 967012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967013">SUSE bug 967013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982017">SUSE bug 982017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982018">SUSE bug 982018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982019">SUSE bug 982019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982222">SUSE bug 982222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982223">SUSE bug 982223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982285">SUSE bug 982285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982959">SUSE bug 982959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983961">SUSE bug 983961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983982">SUSE bug 983982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991080">SUSE bug 991080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991466">SUSE bug 991466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994760">SUSE bug 994760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994771">SUSE bug 994771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994774">SUSE bug 994774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996441">SUSE bug 996441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997858">SUSE bug 997858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997859">SUSE bug 997859</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2392/">CVE-2016-2392</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4453/">CVE-2016-4453</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4454/">CVE-2016-4454</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5105/">CVE-2016-5105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5106/">CVE-2016-5106</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5107/">CVE-2016-5107</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5126/">CVE-2016-5126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5337/">CVE-2016-5337</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5403/">CVE-2016-5403</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6490/">CVE-2016-6490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6833/">CVE-2016-6833</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6836/">CVE-2016-6836</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6888/">CVE-2016-6888</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7116/">CVE-2016-7116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7155/">CVE-2016-7155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7156/">CVE-2016-7156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516584" comment="qemu-2.3.1-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516585" comment="qemu-block-curl-2.3.1-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516586" comment="qemu-ipxe-1.0.0-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516587" comment="qemu-kvm-2.3.1-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516588" comment="qemu-seabios-1.8.1-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516589" comment="qemu-sgabios-8-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516590" comment="qemu-tools-2.3.1-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516591" comment="qemu-vgabios-1.8.1-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516592" comment="qemu-x86-2.3.1-21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77586" version="1" class="patch">
	<metadata>
		<title>Security update for ecryptfs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="920160" ref_url="https://bugzilla.suse.com/920160" source="BUGZILLA"/>
		<reference ref_id="962052" ref_url="https://bugzilla.suse.com/962052" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9687" ref_url="https://www.suse.com/security/cve/CVE-2014-9687/" source="CVE"/>
		<reference ref_id="CVE-2016-1572" ref_url="https://www.suse.com/security/cve/CVE-2016-1572/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001827.html" source="SUSE-SU"/>
		<description>

This update for ecryptfs-utils fixes the following issues:

- CVE-2016-1572: A local user could have escalated privileges by mounting over special filesystems (bsc#962052)
- CVE-2014-9687: A default salt value reduced complexity of offline precomputation attacks (bsc#920160)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-25"/>
	<updated date="2016-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/920160">SUSE bug 920160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962052">SUSE bug 962052</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9687/">CVE-2014-9687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1572/">CVE-2016-1572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515729" comment="ecryptfs-utils-103-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515730" comment="ecryptfs-utils-32bit-103-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77587" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1005544" ref_url="https://bugzilla.suse.com/1005544" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4658" ref_url="https://www.suse.com/security/cve/CVE-2016-4658/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002363.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following issues:

- CVE-2016-4658: Use after free via namespace node in XPointer ranges (bsc#1005544).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-26"/>
	<updated date="2016-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005544">SUSE bug 1005544</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4658/">CVE-2016-4658</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516593" comment="libxml2-2-2.9.1-26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516594" comment="libxml2-2-32bit-2.9.1-26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516595" comment="libxml2-tools-2.9.1-26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516596" comment="python-libxml2-2.9.1-26.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77588" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1004237" ref_url="https://bugzilla.suse.com/1004237" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8602" ref_url="https://www.suse.com/security/cve/CVE-2016-8602/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002366.html" source="SUSE-SU"/>
		<description>

This update for ghostscript fixes the following issues:

- CVE-2016-8602: Insufficient parameter check in .sethalftone5 (bsc#1004237).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-26"/>
	<updated date="2016-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1004237">SUSE bug 1004237</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8602/">CVE-2016-8602</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516597" comment="ghostscript-9.15-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516598" comment="ghostscript-x11-9.15-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77589" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="951166" ref_url="https://bugzilla.suse.com/951166" source="BUGZILLA"/>
		<reference ref_id="983582" ref_url="https://bugzilla.suse.com/983582" source="BUGZILLA"/>
		<reference ref_id="984751" ref_url="https://bugzilla.suse.com/984751" source="BUGZILLA"/>
		<reference ref_id="985177" ref_url="https://bugzilla.suse.com/985177" source="BUGZILLA"/>
		<reference ref_id="985348" ref_url="https://bugzilla.suse.com/985348" source="BUGZILLA"/>
		<reference ref_id="989523" ref_url="https://bugzilla.suse.com/989523" source="BUGZILLA"/>
		<reference ref_id="991069" ref_url="https://bugzilla.suse.com/991069" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002365.html" source="SUSE-SU"/>
		<description>

This update provides Python 3.4.5, which brings many fixes and enhancements.

The following security issues have been fixed:

- CVE-2016-1000110: CGIHandler could have allowed setting of HTTP_PROXY environment
  variable based on user supplied Proxy request header. (bsc#989523)
- CVE-2016-0772: A vulnerability in smtplib could have allowed a MITM attacker to
  perform a startTLS stripping attack. (bsc#984751)
- CVE-2016-5636: A heap overflow in Python's zipimport module. (bsc#985177)
- CVE-2016-5699: A header injection flaw in urrlib2/urllib/httplib/http.client.
  (bsc#985348)

The update also includes the following non-security fixes:

- Don't force 3rd party C extensions to be built with -Werror=declaration-after-statement.
  (bsc#951166)
- Make urllib proxy var handling behave as usual on POSIX. (bsc#983582)

For a comprehensive list of changes please refer to the upstream change log:
https://docs.python.org/3.4/whatsnew/changelog.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-26"/>
	<updated date="2016-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/951166">SUSE bug 951166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983582">SUSE bug 983582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984751">SUSE bug 984751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985177">SUSE bug 985177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985348">SUSE bug 985348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989523">SUSE bug 989523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991069">SUSE bug 991069</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516599" comment="libpython3_4m1_0-3.4.5-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516600" comment="python3-3.4.5-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516601" comment="python3-base-3.4.5-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77590" version="1" class="patch">
	<metadata>
		<title>Security update for openslp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1001600" ref_url="https://bugzilla.suse.com/1001600" source="BUGZILLA"/>
		<reference ref_id="974655" ref_url="https://bugzilla.suse.com/974655" source="BUGZILLA"/>
		<reference ref_id="980722" ref_url="https://bugzilla.suse.com/980722" source="BUGZILLA"/>
		<reference ref_id="994989" ref_url="https://bugzilla.suse.com/994989" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4912" ref_url="https://www.suse.com/security/cve/CVE-2016-4912/" source="CVE"/>
		<reference ref_id="CVE-2016-7567" ref_url="https://www.suse.com/security/cve/CVE-2016-7567/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002371.html" source="SUSE-SU"/>
		<description>
This update for openslp fixes two security issues and two bugs.

The following vulnerabilities were fixed:
- CVE-2016-4912: A remote attacker could have crashed the server with a large number of packages (bsc#980722)
- CVE-2016-7567: A remote attacker could cause a memory corruption having unspecified impact (bsc#1001600)

The following bugfix changes are included:
- bsc#994989: Removed convenience code as changes bytes in the message buffer breaking the verification code
- bsc#974655: Removed no longer needed slpd init file
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-27"/>
	<updated date="2016-10-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1001600">SUSE bug 1001600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974655">SUSE bug 974655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980722">SUSE bug 980722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994989">SUSE bug 994989</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4912/">CVE-2016-4912</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7567/">CVE-2016-7567</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516602" comment="openslp-2.0.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516603" comment="openslp-32bit-2.0.0-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77591" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1007098" ref_url="https://bugzilla.suse.com/1007098" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7855" ref_url="https://www.suse.com/security/cve/CVE-2016-7855/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2662-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00068.html" source="SUSE-SU"/>
		<description>

This update for flash-player to version 11.2.202.643 fixes one security issue.
	  
This security issue was fixed:

- CVE-2016-7855: Use-after-free vulnerability that could lead to code execution (bsc#1007098).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-27"/>
	<updated date="2016-10-27"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1007098">SUSE bug 1007098</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7855/">CVE-2016-7855</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516604" comment="flash-player-11.2.202.643-146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516605" comment="flash-player-gnome-11.2.202.643-146.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77592" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1001900" ref_url="https://bugzilla.suse.com/1001900" source="BUGZILLA"/>
		<reference ref_id="1004924" ref_url="https://bugzilla.suse.com/1004924" source="BUGZILLA"/>
		<reference ref_id="1005274" ref_url="https://bugzilla.suse.com/1005274" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6911" ref_url="https://www.suse.com/security/cve/CVE-2016-6911/" source="CVE"/>
		<reference ref_id="CVE-2016-7568" ref_url="https://www.suse.com/security/cve/CVE-2016-7568/" source="CVE"/>
		<reference ref_id="CVE-2016-8670" ref_url="https://www.suse.com/security/cve/CVE-2016-8670/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2668-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00071.html" source="SUSE-SU"/>
		<description>

This update for gd fixes the following security issues:

- CVE-2016-7568: A specially crafted image file could cause an application crash or potentially execute arbitrary code
                 when the image is converted to webp (bsc#1001900)
- CVE-2016-8670: Stack Buffer Overflow in GD dynamicGetbuf (bsc#1004924)
- CVE-2016-6911: Check for out-of-bound read in dynamicGetbuf() (bsc#1005274)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-28"/>
	<updated date="2016-10-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1001900">SUSE bug 1001900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004924">SUSE bug 1004924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005274">SUSE bug 1005274</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6911/">CVE-2016-6911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7568/">CVE-2016-7568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8670/">CVE-2016-8670</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516606" comment="gd-2.1.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516607" comment="gd-32bit-2.1.0-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77593" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1000394" ref_url="https://bugzilla.suse.com/1000394" source="BUGZILLA"/>
		<reference ref_id="1000399" ref_url="https://bugzilla.suse.com/1000399" source="BUGZILLA"/>
		<reference ref_id="1000434" ref_url="https://bugzilla.suse.com/1000434" source="BUGZILLA"/>
		<reference ref_id="1000436" ref_url="https://bugzilla.suse.com/1000436" source="BUGZILLA"/>
		<reference ref_id="1000686" ref_url="https://bugzilla.suse.com/1000686" source="BUGZILLA"/>
		<reference ref_id="1000688" ref_url="https://bugzilla.suse.com/1000688" source="BUGZILLA"/>
		<reference ref_id="1000689" ref_url="https://bugzilla.suse.com/1000689" source="BUGZILLA"/>
		<reference ref_id="1000690" ref_url="https://bugzilla.suse.com/1000690" source="BUGZILLA"/>
		<reference ref_id="1000691" ref_url="https://bugzilla.suse.com/1000691" source="BUGZILLA"/>
		<reference ref_id="1000692" ref_url="https://bugzilla.suse.com/1000692" source="BUGZILLA"/>
		<reference ref_id="1000693" ref_url="https://bugzilla.suse.com/1000693" source="BUGZILLA"/>
		<reference ref_id="1000694" ref_url="https://bugzilla.suse.com/1000694" source="BUGZILLA"/>
		<reference ref_id="1000695" ref_url="https://bugzilla.suse.com/1000695" source="BUGZILLA"/>
		<reference ref_id="1000696" ref_url="https://bugzilla.suse.com/1000696" source="BUGZILLA"/>
		<reference ref_id="1000697" ref_url="https://bugzilla.suse.com/1000697" source="BUGZILLA"/>
		<reference ref_id="1000698" ref_url="https://bugzilla.suse.com/1000698" source="BUGZILLA"/>
		<reference ref_id="1000699" ref_url="https://bugzilla.suse.com/1000699" source="BUGZILLA"/>
		<reference ref_id="1000700" ref_url="https://bugzilla.suse.com/1000700" source="BUGZILLA"/>
		<reference ref_id="1000701" ref_url="https://bugzilla.suse.com/1000701" source="BUGZILLA"/>
		<reference ref_id="1000702" ref_url="https://bugzilla.suse.com/1000702" source="BUGZILLA"/>
		<reference ref_id="1000703" ref_url="https://bugzilla.suse.com/1000703" source="BUGZILLA"/>
		<reference ref_id="1000704" ref_url="https://bugzilla.suse.com/1000704" source="BUGZILLA"/>
		<reference ref_id="1000706" ref_url="https://bugzilla.suse.com/1000706" source="BUGZILLA"/>
		<reference ref_id="1000707" ref_url="https://bugzilla.suse.com/1000707" source="BUGZILLA"/>
		<reference ref_id="1000708" ref_url="https://bugzilla.suse.com/1000708" source="BUGZILLA"/>
		<reference ref_id="1000709" ref_url="https://bugzilla.suse.com/1000709" source="BUGZILLA"/>
		<reference ref_id="1000711" ref_url="https://bugzilla.suse.com/1000711" source="BUGZILLA"/>
		<reference ref_id="1000712" ref_url="https://bugzilla.suse.com/1000712" source="BUGZILLA"/>
		<reference ref_id="1000713" ref_url="https://bugzilla.suse.com/1000713" source="BUGZILLA"/>
		<reference ref_id="1000714" ref_url="https://bugzilla.suse.com/1000714" source="BUGZILLA"/>
		<reference ref_id="1000715" ref_url="https://bugzilla.suse.com/1000715" source="BUGZILLA"/>
		<reference ref_id="1001066" ref_url="https://bugzilla.suse.com/1001066" source="BUGZILLA"/>
		<reference ref_id="1001221" ref_url="https://bugzilla.suse.com/1001221" source="BUGZILLA"/>
		<reference ref_id="1002206" ref_url="https://bugzilla.suse.com/1002206" source="BUGZILLA"/>
		<reference ref_id="1002209" ref_url="https://bugzilla.suse.com/1002209" source="BUGZILLA"/>
		<reference ref_id="1002421" ref_url="https://bugzilla.suse.com/1002421" source="BUGZILLA"/>
		<reference ref_id="1002422" ref_url="https://bugzilla.suse.com/1002422" source="BUGZILLA"/>
		<reference ref_id="1003629" ref_url="https://bugzilla.suse.com/1003629" source="BUGZILLA"/>
		<reference ref_id="1005123" ref_url="https://bugzilla.suse.com/1005123" source="BUGZILLA"/>
		<reference ref_id="1005125" ref_url="https://bugzilla.suse.com/1005125" source="BUGZILLA"/>
		<reference ref_id="1005127" ref_url="https://bugzilla.suse.com/1005127" source="BUGZILLA"/>
		<reference ref_id="1005328" ref_url="https://bugzilla.suse.com/1005328" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9907" ref_url="https://www.suse.com/security/cve/CVE-2014-9907/" source="CVE"/>
		<reference ref_id="CVE-2015-8957" ref_url="https://www.suse.com/security/cve/CVE-2015-8957/" source="CVE"/>
		<reference ref_id="CVE-2015-8958" ref_url="https://www.suse.com/security/cve/CVE-2015-8958/" source="CVE"/>
		<reference ref_id="CVE-2015-8959" ref_url="https://www.suse.com/security/cve/CVE-2015-8959/" source="CVE"/>
		<reference ref_id="CVE-2016-6823" ref_url="https://www.suse.com/security/cve/CVE-2016-6823/" source="CVE"/>
		<reference ref_id="CVE-2016-7101" ref_url="https://www.suse.com/security/cve/CVE-2016-7101/" source="CVE"/>
		<reference ref_id="CVE-2016-7513" ref_url="https://www.suse.com/security/cve/CVE-2016-7513/" source="CVE"/>
		<reference ref_id="CVE-2016-7514" ref_url="https://www.suse.com/security/cve/CVE-2016-7514/" source="CVE"/>
		<reference ref_id="CVE-2016-7515" ref_url="https://www.suse.com/security/cve/CVE-2016-7515/" source="CVE"/>
		<reference ref_id="CVE-2016-7516" ref_url="https://www.suse.com/security/cve/CVE-2016-7516/" source="CVE"/>
		<reference ref_id="CVE-2016-7517" ref_url="https://www.suse.com/security/cve/CVE-2016-7517/" source="CVE"/>
		<reference ref_id="CVE-2016-7518" ref_url="https://www.suse.com/security/cve/CVE-2016-7518/" source="CVE"/>
		<reference ref_id="CVE-2016-7519" ref_url="https://www.suse.com/security/cve/CVE-2016-7519/" source="CVE"/>
		<reference ref_id="CVE-2016-7520" ref_url="https://www.suse.com/security/cve/CVE-2016-7520/" source="CVE"/>
		<reference ref_id="CVE-2016-7521" ref_url="https://www.suse.com/security/cve/CVE-2016-7521/" source="CVE"/>
		<reference ref_id="CVE-2016-7522" ref_url="https://www.suse.com/security/cve/CVE-2016-7522/" source="CVE"/>
		<reference ref_id="CVE-2016-7523" ref_url="https://www.suse.com/security/cve/CVE-2016-7523/" source="CVE"/>
		<reference ref_id="CVE-2016-7524" ref_url="https://www.suse.com/security/cve/CVE-2016-7524/" source="CVE"/>
		<reference ref_id="CVE-2016-7525" ref_url="https://www.suse.com/security/cve/CVE-2016-7525/" source="CVE"/>
		<reference ref_id="CVE-2016-7526" ref_url="https://www.suse.com/security/cve/CVE-2016-7526/" source="CVE"/>
		<reference ref_id="CVE-2016-7527" ref_url="https://www.suse.com/security/cve/CVE-2016-7527/" source="CVE"/>
		<reference ref_id="CVE-2016-7528" ref_url="https://www.suse.com/security/cve/CVE-2016-7528/" source="CVE"/>
		<reference ref_id="CVE-2016-7529" ref_url="https://www.suse.com/security/cve/CVE-2016-7529/" source="CVE"/>
		<reference ref_id="CVE-2016-7530" ref_url="https://www.suse.com/security/cve/CVE-2016-7530/" source="CVE"/>
		<reference ref_id="CVE-2016-7531" ref_url="https://www.suse.com/security/cve/CVE-2016-7531/" source="CVE"/>
		<reference ref_id="CVE-2016-7532" ref_url="https://www.suse.com/security/cve/CVE-2016-7532/" source="CVE"/>
		<reference ref_id="CVE-2016-7533" ref_url="https://www.suse.com/security/cve/CVE-2016-7533/" source="CVE"/>
		<reference ref_id="CVE-2016-7534" ref_url="https://www.suse.com/security/cve/CVE-2016-7534/" source="CVE"/>
		<reference ref_id="CVE-2016-7535" ref_url="https://www.suse.com/security/cve/CVE-2016-7535/" source="CVE"/>
		<reference ref_id="CVE-2016-7537" ref_url="https://www.suse.com/security/cve/CVE-2016-7537/" source="CVE"/>
		<reference ref_id="CVE-2016-7538" ref_url="https://www.suse.com/security/cve/CVE-2016-7538/" source="CVE"/>
		<reference ref_id="CVE-2016-7539" ref_url="https://www.suse.com/security/cve/CVE-2016-7539/" source="CVE"/>
		<reference ref_id="CVE-2016-7540" ref_url="https://www.suse.com/security/cve/CVE-2016-7540/" source="CVE"/>
		<reference ref_id="CVE-2016-7799" ref_url="https://www.suse.com/security/cve/CVE-2016-7799/" source="CVE"/>
		<reference ref_id="CVE-2016-7800" ref_url="https://www.suse.com/security/cve/CVE-2016-7800/" source="CVE"/>
		<reference ref_id="CVE-2016-7996" ref_url="https://www.suse.com/security/cve/CVE-2016-7996/" source="CVE"/>
		<reference ref_id="CVE-2016-7997" ref_url="https://www.suse.com/security/cve/CVE-2016-7997/" source="CVE"/>
		<reference ref_id="CVE-2016-8677" ref_url="https://www.suse.com/security/cve/CVE-2016-8677/" source="CVE"/>
		<reference ref_id="CVE-2016-8682" ref_url="https://www.suse.com/security/cve/CVE-2016-8682/" source="CVE"/>
		<reference ref_id="CVE-2016-8683" ref_url="https://www.suse.com/security/cve/CVE-2016-8683/" source="CVE"/>
		<reference ref_id="CVE-2016-8684" ref_url="https://www.suse.com/security/cve/CVE-2016-8684/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:
    
These vulnerabilities could be triggered by processing specially crafted image files,
which could lead to a process crash or resource consumtion, or potentially have
unspecified futher impact.

- CVE-2016-8684: Mismatch between real filesize and header values (bsc#1005123)
- CVE-2016-8683: Check that filesize is reasonable compared to the header value (bsc#1005127)
- CVE-2016-8682: Stack-buffer read overflow while reading SCT header (bsc#1005125)
- CVE-2016-8677: Memory allocation failure in AcquireQuantumPixels (bsc#1005328)
- CVE-2016-7996, CVE-2016-7997: WPG Reader Issues (bsc#1003629)
- CVE-2016-7800: 8BIM/8BIMW unsigned underflow leads to heap overflow (bsc#1002422)
- CVE-2016-7799: mogrify global buffer overflow (bsc#1002421)
- CVE-2016-7540: writing to RGF format aborts (bsc#1000394)
- CVE-2016-7539: Potential DOS by not releasing memory (bsc#1000715)
- CVE-2016-7538: SIGABRT for corrupted pdb file (bsc#1000712)
- CVE-2016-7537: Out of bound access for corrupted pdb file (bsc#1000711)
- CVE-2016-7535: Out of bound access for corrupted psd file (bsc#1000709)
- CVE-2016-7534: Out of bound access in generic decoder (bsc#1000708)
- CVE-2016-7533: Wpg file out of bound for corrupted file (bsc#1000707)
- CVE-2016-7532: fix handling of corrupted psd file (bsc#1000706)
- CVE-2016-7531: Pbd file out of bound access (bsc#1000704)
- CVE-2016-7530: Out of bound in quantum handling (bsc#1000703)
- CVE-2016-7529: Out-of-bound in quantum handling (bsc#1000399)
- CVE-2016-7528: Out-of-bound access in xcf file coder (bsc#1000434)
- CVE-2016-7527: Out-of-bound access in wpg file coder: (bsc#1000436)
- CVE-2016-7526: out-of-bounds write in ./MagickCore/pixel-accessor.h (bsc#1000702)
- CVE-2016-7525: Heap buffer overflow in psd file coder (bsc#1000701)
- CVE-2016-7524: AddressSanitizer:heap-buffer-overflow READ of size 1 in meta.c:465 (bsc#1000700)
- CVE-2016-7523: AddressSanitizer:heap-buffer-overflow READ of size 1 meta.c:496 (bsc#1000699)
- CVE-2016-7522: Out of bound access for malformed psd file (bsc#1000698)
- CVE-2016-7521: Heap buffer overflow in psd file handling (bsc#1000697)
- CVE-2016-7520: Heap overflow in hdr file handling (bsc#1000696)
- CVE-2016-7519: Out-of-bounds read in coders/rle.c (bsc#1000695)
- CVE-2016-7518: Out-of-bounds read in coders/sun.c (bsc#1000694)
- CVE-2016-7517: Out-of-bounds read in coders/pict.c (bsc#1000693)
- CVE-2016-7516: Out-of-bounds problem in rle, pict, viff and sun files (bsc#1000692)
- CVE-2016-7515: Rle file handling for corrupted file (bsc#1000689)
- CVE-2016-7514: Out-of-bounds read in coders/psd.c (bsc#1000688)
- CVE-2016-7513: Off-by-one error leading to segfault (bsc#1000686)
- CVE-2016-7101: raphicsMagick: SGI Coder Out-Of-Bounds Read Vulnerability (bsc#1001221)
- CVE-2016-6823: raphicsMagick: BMP Coder Out-Of-Bounds Write Vulnerability (bsc#1001066)
- CVE-2015-8959: dOS due to corrupted DDS files (bsc#1000713)
- CVE-2015-8958: Potential DOS in sun file handling due to malformed files (bsc#1000691)
- CVE-2015-8957: Buffer overflow in sun file handling (bsc#1000690)
- CVE-2014-9907: DOS due to corrupted DDS files (bsc#1000714)
- Buffer overflows in SIXEL, PDB, MAP, and TIFF coders (bsc#1002209)
- Divide by zero in WriteTIFFImage (bsc#1002206)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-28"/>
	<updated date="2016-10-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000394">SUSE bug 1000394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000399">SUSE bug 1000399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000434">SUSE bug 1000434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000436">SUSE bug 1000436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000686">SUSE bug 1000686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000688">SUSE bug 1000688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000689">SUSE bug 1000689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000690">SUSE bug 1000690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000691">SUSE bug 1000691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000692">SUSE bug 1000692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000693">SUSE bug 1000693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000694">SUSE bug 1000694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000695">SUSE bug 1000695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000696">SUSE bug 1000696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000697">SUSE bug 1000697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000698">SUSE bug 1000698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000699">SUSE bug 1000699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000700">SUSE bug 1000700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000701">SUSE bug 1000701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000702">SUSE bug 1000702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000703">SUSE bug 1000703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000704">SUSE bug 1000704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000706">SUSE bug 1000706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000707">SUSE bug 1000707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000708">SUSE bug 1000708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000709">SUSE bug 1000709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000711">SUSE bug 1000711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000712">SUSE bug 1000712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000713">SUSE bug 1000713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000714">SUSE bug 1000714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000715">SUSE bug 1000715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001066">SUSE bug 1001066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001221">SUSE bug 1001221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002206">SUSE bug 1002206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002209">SUSE bug 1002209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002421">SUSE bug 1002421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002422">SUSE bug 1002422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003629">SUSE bug 1003629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005123">SUSE bug 1005123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005125">SUSE bug 1005125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005127">SUSE bug 1005127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005328">SUSE bug 1005328</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9907/">CVE-2014-9907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8957/">CVE-2015-8957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8958/">CVE-2015-8958</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8959/">CVE-2015-8959</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6823/">CVE-2016-6823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7101/">CVE-2016-7101</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7513/">CVE-2016-7513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7514/">CVE-2016-7514</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7515/">CVE-2016-7515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7516/">CVE-2016-7516</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7517/">CVE-2016-7517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7518/">CVE-2016-7518</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7519/">CVE-2016-7519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7520/">CVE-2016-7520</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7521/">CVE-2016-7521</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7522/">CVE-2016-7522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7523/">CVE-2016-7523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7524/">CVE-2016-7524</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7525/">CVE-2016-7525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7526/">CVE-2016-7526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7527/">CVE-2016-7527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7528/">CVE-2016-7528</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7529/">CVE-2016-7529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7530/">CVE-2016-7530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7531/">CVE-2016-7531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7532/">CVE-2016-7532</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7533/">CVE-2016-7533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7534/">CVE-2016-7534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7535/">CVE-2016-7535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7537/">CVE-2016-7537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7538/">CVE-2016-7538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7539/">CVE-2016-7539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7540/">CVE-2016-7540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7799/">CVE-2016-7799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7800/">CVE-2016-7800</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7996/">CVE-2016-7996</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7997/">CVE-2016-7997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8677/">CVE-2016-8677</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8682/">CVE-2016-8682</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8683/">CVE-2016-8683</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8684/">CVE-2016-8684</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516608" comment="ImageMagick-6.8.8.1-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516609" comment="libMagick++-6_Q16-3-6.8.8.1-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516610" comment="libMagickCore-6_Q16-1-6.8.8.1-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516611" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516612" comment="libMagickWand-6_Q16-1-6.8.8.1-40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77594" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1007829" ref_url="https://bugzilla.suse.com/1007829" source="BUGZILLA"/>
		<reference ref_id="965748" ref_url="https://bugzilla.suse.com/965748" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8864" ref_url="https://www.suse.com/security/cve/CVE-2016-8864/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00005.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- A defect in BIND's handling of responses containing a DNAME answer had
the potential to trigger assertion errors in the server remotely,
thereby facilitating a denial-of-service attack. (CVE-2016-8864, bsc#1007829).

- Fix BIND to return a valid hostname in response to ldapdump queries.
(bsc#965748)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-02"/>
	<updated date="2016-11-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1007829">SUSE bug 1007829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965748">SUSE bug 965748</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8864/">CVE-2016-8864</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516613" comment="bind-libs-9.9.9P1-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516614" comment="bind-libs-32bit-9.9.9P1-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516615" comment="bind-utils-9.9.9P1-49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77595" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1005633" ref_url="https://bugzilla.suse.com/1005633" source="BUGZILLA"/>
		<reference ref_id="1005634" ref_url="https://bugzilla.suse.com/1005634" source="BUGZILLA"/>
		<reference ref_id="1005635" ref_url="https://bugzilla.suse.com/1005635" source="BUGZILLA"/>
		<reference ref_id="1005637" ref_url="https://bugzilla.suse.com/1005637" source="BUGZILLA"/>
		<reference ref_id="1005638" ref_url="https://bugzilla.suse.com/1005638" source="BUGZILLA"/>
		<reference ref_id="1005640" ref_url="https://bugzilla.suse.com/1005640" source="BUGZILLA"/>
		<reference ref_id="1005642" ref_url="https://bugzilla.suse.com/1005642" source="BUGZILLA"/>
		<reference ref_id="1005643" ref_url="https://bugzilla.suse.com/1005643" source="BUGZILLA"/>
		<reference ref_id="1005645" ref_url="https://bugzilla.suse.com/1005645" source="BUGZILLA"/>
		<reference ref_id="1005646" ref_url="https://bugzilla.suse.com/1005646" source="BUGZILLA"/>
		<reference ref_id="998760" ref_url="https://bugzilla.suse.com/998760" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7167" ref_url="https://www.suse.com/security/cve/CVE-2016-7167/" source="CVE"/>
		<reference ref_id="CVE-2016-8615" ref_url="https://www.suse.com/security/cve/CVE-2016-8615/" source="CVE"/>
		<reference ref_id="CVE-2016-8616" ref_url="https://www.suse.com/security/cve/CVE-2016-8616/" source="CVE"/>
		<reference ref_id="CVE-2016-8617" ref_url="https://www.suse.com/security/cve/CVE-2016-8617/" source="CVE"/>
		<reference ref_id="CVE-2016-8618" ref_url="https://www.suse.com/security/cve/CVE-2016-8618/" source="CVE"/>
		<reference ref_id="CVE-2016-8619" ref_url="https://www.suse.com/security/cve/CVE-2016-8619/" source="CVE"/>
		<reference ref_id="CVE-2016-8620" ref_url="https://www.suse.com/security/cve/CVE-2016-8620/" source="CVE"/>
		<reference ref_id="CVE-2016-8621" ref_url="https://www.suse.com/security/cve/CVE-2016-8621/" source="CVE"/>
		<reference ref_id="CVE-2016-8622" ref_url="https://www.suse.com/security/cve/CVE-2016-8622/" source="CVE"/>
		<reference ref_id="CVE-2016-8623" ref_url="https://www.suse.com/security/cve/CVE-2016-8623/" source="CVE"/>
		<reference ref_id="CVE-2016-8624" ref_url="https://www.suse.com/security/cve/CVE-2016-8624/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00006.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following security issues:

- CVE-2016-8624: invalid URL parsing with '#' (bsc#1005646)
- CVE-2016-8623: Use-after-free via shared cookies (bsc#1005645)
- CVE-2016-8622: URL unescape heap overflow via integer truncation (bsc#1005643)
- CVE-2016-8621: curl_getdate read out of bounds (bsc#1005642)
- CVE-2016-8620: glob parser write/read out of bounds (bsc#1005640)
- CVE-2016-8619: double-free in krb5 code (bsc#1005638)
- CVE-2016-8618: double-free in curl_maprintf (bsc#1005637)
- CVE-2016-8617: OOB write via unchecked multiplication (bsc#1005635)
- CVE-2016-8616: case insensitive password comparison (bsc#1005634)
- CVE-2016-8615: cookie injection for other servers (bsc#1005633)
- CVE-2016-7167: escape and unescape integer overflows (bsc#998760)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-02"/>
	<updated date="2016-11-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005633">SUSE bug 1005633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005634">SUSE bug 1005634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005635">SUSE bug 1005635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005637">SUSE bug 1005637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005638">SUSE bug 1005638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005640">SUSE bug 1005640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005642">SUSE bug 1005642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005643">SUSE bug 1005643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005645">SUSE bug 1005645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005646">SUSE bug 1005646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998760">SUSE bug 998760</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7167/">CVE-2016-7167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8615/">CVE-2016-8615</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8616/">CVE-2016-8616</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8617/">CVE-2016-8617</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-8618/">CVE-2016-8618</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8619/">CVE-2016-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8620/">CVE-2016-8620</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-8621/">CVE-2016-8621</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8622/">CVE-2016-8622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8623/">CVE-2016-8623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8624/">CVE-2016-8624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516616" comment="curl-7.37.0-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516617" comment="libcurl4-7.37.0-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516618" comment="libcurl4-32bit-7.37.0-31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77596" version="1" class="patch">
	<metadata>
		<title>Security update for libpng16 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="954980" ref_url="https://bugzilla.suse.com/954980" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001779.html" source="SUSE-SU"/>
		<description>

  This update fixes the following security issue:

  * CVE-2015-8126 Multiple buffer overflows in the png_set_PLTE and png_get_PLTE functions
    allow remote attackers to cause a denial of service (application crash) or possibly have 
    unspecified other impact [bsc#954980]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-05"/>
	<updated date="2016-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515731" comment="libpng16-16-1.6.8-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515732" comment="libpng16-16-32bit-1.6.8-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77597" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="960996" ref_url="https://bugzilla.suse.com/960996" source="BUGZILLA"/>
		<reference ref_id="962743" ref_url="https://bugzilla.suse.com/962743" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0475" ref_url="https://www.suse.com/security/cve/CVE-2016-0475/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html" source="SUSE-SU"/>
		<description>
java-1_8_0-openjdk was updated to version 7u95 to fix several security issues. (bsc#962743)
    
The following vulnerabilities were fixed:

- CVE-2015-7575: Further reduce use of MD5 (SLOTH) (bsc#960996)
- CVE-2015-8126: Vulnerability in the AWT component related to splashscreen displays
- CVE-2015-8472: Vulnerability in the AWT component, addressed by same fix
- CVE-2016-0402: Vulnerability in the Networking component related to URL processing
- CVE-2016-0448: Vulnerability in the JMX comonent related to attribute processing
- CVE-2016-0466: Vulnerability in the JAXP component, related to limits
- CVE-2016-0483: Vulnerability in the AWT component related to image decoding
- CVE-2016-0494: Vulnerability in 2D component related to font actions
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-27"/>
	<updated date="2016-01-27"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/960996">SUSE bug 960996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0475/">CVE-2016-0475</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516619" comment="java-1_8_0-openjdk-1.8.0.72-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516620" comment="java-1_8_0-openjdk-headless-1.8.0.72-3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77598" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="947494" ref_url="https://bugzilla.suse.com/947494" source="BUGZILLA"/>
		<reference ref_id="966891" ref_url="https://bugzilla.suse.com/966891" source="BUGZILLA"/>
		<reference ref_id="978993" ref_url="https://bugzilla.suse.com/978993" source="BUGZILLA"/>
		<reference ref_id="982331" ref_url="https://bugzilla.suse.com/982331" source="BUGZILLA"/>
		<reference ref_id="983164" ref_url="https://bugzilla.suse.com/983164" source="BUGZILLA"/>
		<reference ref_id="987176" ref_url="https://bugzilla.suse.com/987176" source="BUGZILLA"/>
		<reference ref_id="988361" ref_url="https://bugzilla.suse.com/988361" source="BUGZILLA"/>
		<reference ref_id="994399" ref_url="https://bugzilla.suse.com/994399" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5011" ref_url="https://www.suse.com/security/cve/CVE-2016-5011/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002396.html" source="SUSE-SU"/>
		<description>
This update for util-linux fixes a number of bugs and one minor security issue.

The following minor vulnerability was fixed:
- CVE-2016-5011: Infinite loop DoS in libblkid while parsing DOS partition (bsc#988361)

The following bugs were fixed:
- bsc#987176: When mounting a subfolder of a CIFS share, mount -a would show the mount as busy
- bsc#947494: mount -a would fail to recognize btrfs already mounted, address loop re-use in libmount
- bsc#966891: Conflict in meaning of losetup -L. This switch in SLE12 SP1 and SP2 continues to carry the meaning of --logical-blocksize instead of upstream --nooverlap
- bsc#994399: Package would trigger conflicts with sysvinit-tools
- bsc#983164: mount uid= and gid= would reject valid non UID/GID values
- bsc#978993: cfdisk would mangle some text output
- bsc#982331: libmount: ignore redundant slashes
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-09"/>
	<updated date="2016-11-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/947494">SUSE bug 947494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966891">SUSE bug 966891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978993">SUSE bug 978993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982331">SUSE bug 982331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983164">SUSE bug 983164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987176">SUSE bug 987176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988361">SUSE bug 988361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994399">SUSE bug 994399</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5011/">CVE-2016-5011</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516621" comment="libblkid1-2.25-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516622" comment="libblkid1-32bit-2.25-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516623" comment="libmount1-2.25-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516624" comment="libmount1-32bit-2.25-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516625" comment="libsmartcols1-2.25-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516626" comment="libuuid-devel-2.25-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516627" comment="libuuid1-2.25-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516628" comment="libuuid1-32bit-2.25-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516629" comment="python-libmount-2.25-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516630" comment="util-linux-2.25-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516631" comment="util-linux-lang-2.25-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516632" comment="util-linux-systemd-2.25-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516633" comment="uuidd-2.25-37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77599" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1005084" ref_url="https://bugzilla.suse.com/1005084" source="BUGZILLA"/>
		<reference ref_id="1005090" ref_url="https://bugzilla.suse.com/1005090" source="BUGZILLA"/>
		<reference ref_id="1005242" ref_url="https://bugzilla.suse.com/1005242" source="BUGZILLA"/>
		<reference ref_id="1006591" ref_url="https://bugzilla.suse.com/1006591" source="BUGZILLA"/>
		<reference ref_id="1006593" ref_url="https://bugzilla.suse.com/1006593" source="BUGZILLA"/>
		<reference ref_id="1006597" ref_url="https://bugzilla.suse.com/1006597" source="BUGZILLA"/>
		<reference ref_id="1006598" ref_url="https://bugzilla.suse.com/1006598" source="BUGZILLA"/>
		<reference ref_id="1006599" ref_url="https://bugzilla.suse.com/1006599" source="BUGZILLA"/>
		<reference ref_id="1006836" ref_url="https://bugzilla.suse.com/1006836" source="BUGZILLA"/>
		<reference ref_id="1006839" ref_url="https://bugzilla.suse.com/1006839" source="BUGZILLA"/>
		<reference ref_id="1007009" ref_url="https://bugzilla.suse.com/1007009" source="BUGZILLA"/>
		<reference ref_id="392410" ref_url="https://bugzilla.suse.com/392410" source="BUGZILLA"/>
		<reference ref_id="941919" ref_url="https://bugzilla.suse.com/941919" source="BUGZILLA"/>
		<reference ref_id="942553" ref_url="https://bugzilla.suse.com/942553" source="BUGZILLA"/>
		<reference ref_id="961886" ref_url="https://bugzilla.suse.com/961886" source="BUGZILLA"/>
		<reference ref_id="963983" ref_url="https://bugzilla.suse.com/963983" source="BUGZILLA"/>
		<reference ref_id="968373" ref_url="https://bugzilla.suse.com/968373" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-3522" ref_url="https://www.suse.com/security/cve/CVE-2008-3522/" source="CVE"/>
		<reference ref_id="CVE-2014-8158" ref_url="https://www.suse.com/security/cve/CVE-2014-8158/" source="CVE"/>
		<reference ref_id="CVE-2015-5203" ref_url="https://www.suse.com/security/cve/CVE-2015-5203/" source="CVE"/>
		<reference ref_id="CVE-2015-5221" ref_url="https://www.suse.com/security/cve/CVE-2015-5221/" source="CVE"/>
		<reference ref_id="CVE-2016-1577" ref_url="https://www.suse.com/security/cve/CVE-2016-1577/" source="CVE"/>
		<reference ref_id="CVE-2016-1867" ref_url="https://www.suse.com/security/cve/CVE-2016-1867/" source="CVE"/>
		<reference ref_id="CVE-2016-2089" ref_url="https://www.suse.com/security/cve/CVE-2016-2089/" source="CVE"/>
		<reference ref_id="CVE-2016-2116" ref_url="https://www.suse.com/security/cve/CVE-2016-2116/" source="CVE"/>
		<reference ref_id="CVE-2016-8690" ref_url="https://www.suse.com/security/cve/CVE-2016-8690/" source="CVE"/>
		<reference ref_id="CVE-2016-8691" ref_url="https://www.suse.com/security/cve/CVE-2016-8691/" source="CVE"/>
		<reference ref_id="CVE-2016-8692" ref_url="https://www.suse.com/security/cve/CVE-2016-8692/" source="CVE"/>
		<reference ref_id="CVE-2016-8693" ref_url="https://www.suse.com/security/cve/CVE-2016-8693/" source="CVE"/>
		<reference ref_id="CVE-2016-8880" ref_url="https://www.suse.com/security/cve/CVE-2016-8880/" source="CVE"/>
		<reference ref_id="CVE-2016-8881" ref_url="https://www.suse.com/security/cve/CVE-2016-8881/" source="CVE"/>
		<reference ref_id="CVE-2016-8882" ref_url="https://www.suse.com/security/cve/CVE-2016-8882/" source="CVE"/>
		<reference ref_id="CVE-2016-8883" ref_url="https://www.suse.com/security/cve/CVE-2016-8883/" source="CVE"/>
		<reference ref_id="CVE-2016-8884" ref_url="https://www.suse.com/security/cve/CVE-2016-8884/" source="CVE"/>
		<reference ref_id="CVE-2016-8885" ref_url="https://www.suse.com/security/cve/CVE-2016-8885/" source="CVE"/>
		<reference ref_id="CVE-2016-8886" ref_url="https://www.suse.com/security/cve/CVE-2016-8886/" source="CVE"/>
		<reference ref_id="CVE-2016-8887" ref_url="https://www.suse.com/security/cve/CVE-2016-8887/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<description>

This update for jasper to version 1.900.14 fixes several issues.

These security issues were fixed:
- CVE-2016-8887: NULL pointer dereference in jp2_colr_destroy (jp2_cod.c) (bsc#1006836)
- CVE-2016-8886: memory allocation failure in jas_malloc (jas_malloc.c) (bsc#1006599)
- CVE-2016-8884,CVE-2016-8885: two null pointer dereferences in bmp_getdata (incomplete fix for CVE-2016-8690) (bsc#1007009)
- CVE-2016-8883: assert in jpc_dec_tiledecode() (bsc#1006598)
- CVE-2016-8882: segfault / null pointer access in jpc_pi_destroy (bsc#1006597)
- CVE-2016-8881: Heap overflow in jpc_getuint16() (bsc#1006593)
- CVE-2016-8880: Heap overflow in jpc_dec_cp_setfromcox() (bsc#1006591)
- CVE-2016-8693 Double free vulnerability in mem_close (bsc#1005242)
- CVE-2016-8691, CVE-2016-8692: Divide by zero in jpc_dec_process_siz (bsc#1005090)
- CVE-2016-8690: Null pointer dereference in bmp_getdata triggered by crafted BMP image (bsc#1005084)
- CVE-2016-2116: Memory leak in the jas_iccprof_createfrombuf function in JasPer allowed remote attackers to cause a denial of service (memory consumption) via a crafted ICC color profile in a JPEG 2000 image file (bsc#968373) 
- CVE-2016-2089: invalid read in the JasPer's jas_matrix_clip() function (bsc#963983)
- CVE-2016-1867: Out-of-bounds Read in the JasPer's jpc_pi_nextcprl() function (bsc#961886)
- CVE-2015-5221: Use-after-free (and double-free) in Jasper JPEG-200 (bsc#942553).
- CVE-2015-5203: Double free corruption in JasPer JPEG-2000 implementation (bsc#941919)
- CVE-2008-3522: Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer might have allowed context-dependent attackers to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf (bsc#392410)
- jasper: NULL pointer dereference in jp2_colr_destroy (jp2_cod.c) (incomplete fix for CVE-2016-8887) (bsc#1006839)

For additional change description please have a look at the changelog.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-10"/>
	<updated date="2016-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005084">SUSE bug 1005084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005090">SUSE bug 1005090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005242">SUSE bug 1005242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006591">SUSE bug 1006591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006593">SUSE bug 1006593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006597">SUSE bug 1006597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006598">SUSE bug 1006598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006599">SUSE bug 1006599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006836">SUSE bug 1006836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006839">SUSE bug 1006839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007009">SUSE bug 1007009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/392410">SUSE bug 392410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941919">SUSE bug 941919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942553">SUSE bug 942553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961886">SUSE bug 961886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963983">SUSE bug 963983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968373">SUSE bug 968373</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3522/">CVE-2008-3522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8158/">CVE-2014-8158</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5203/">CVE-2015-5203</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5221/">CVE-2015-5221</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1577/">CVE-2016-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1867/">CVE-2016-1867</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2089/">CVE-2016-2089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2116/">CVE-2016-2116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8690/">CVE-2016-8690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8691/">CVE-2016-8691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8692/">CVE-2016-8692</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-8693/">CVE-2016-8693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8880/">CVE-2016-8880</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8881/">CVE-2016-8881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8882/">CVE-2016-8882</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8883/">CVE-2016-8883</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8884/">CVE-2016-8884</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8885/">CVE-2016-8885</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8886/">CVE-2016-8886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8887/">CVE-2016-8887</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516634" comment="libjasper1-1.900.14-181.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516635" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77600" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1009217" ref_url="https://bugzilla.suse.com/1009217" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7857" ref_url="https://www.suse.com/security/cve/CVE-2016-7857/" source="CVE"/>
		<reference ref_id="CVE-2016-7858" ref_url="https://www.suse.com/security/cve/CVE-2016-7858/" source="CVE"/>
		<reference ref_id="CVE-2016-7859" ref_url="https://www.suse.com/security/cve/CVE-2016-7859/" source="CVE"/>
		<reference ref_id="CVE-2016-7860" ref_url="https://www.suse.com/security/cve/CVE-2016-7860/" source="CVE"/>
		<reference ref_id="CVE-2016-7861" ref_url="https://www.suse.com/security/cve/CVE-2016-7861/" source="CVE"/>
		<reference ref_id="CVE-2016-7862" ref_url="https://www.suse.com/security/cve/CVE-2016-7862/" source="CVE"/>
		<reference ref_id="CVE-2016-7863" ref_url="https://www.suse.com/security/cve/CVE-2016-7863/" source="CVE"/>
		<reference ref_id="CVE-2016-7864" ref_url="https://www.suse.com/security/cve/CVE-2016-7864/" source="CVE"/>
		<reference ref_id="CVE-2016-7865" ref_url="https://www.suse.com/security/cve/CVE-2016-7865/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00024.html" source="SUSE-SU"/>
		<description>
This update to Adobe Flash Player 11.2.202.644 fixes the following security issues:

- type confusion vulnerabilities that could lead to code execution
  (CVE-2016-7860, CVE-2016-7861, CVE-2016-7865)
- use-after-free vulnerabilities that could lead to code execution
  (CVE-2016-7857, CVE-2016-7858, CVE-2016-7859, CVE-2016-7862, CVE-2016-7863, CVE-2016-7864)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-11"/>
	<updated date="2016-11-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009217">SUSE bug 1009217</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7857/">CVE-2016-7857</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7858/">CVE-2016-7858</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7859/">CVE-2016-7859</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7860/">CVE-2016-7860</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7861/">CVE-2016-7861</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7862/">CVE-2016-7862</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7863/">CVE-2016-7863</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7864/">CVE-2016-7864</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7865/">CVE-2016-7865</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516636" comment="flash-player-11.2.202.644-149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516637" comment="flash-player-gnome-11.2.202.644-149.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77601" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1006592" ref_url="https://bugzilla.suse.com/1006592" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5653" ref_url="https://www.suse.com/security/cve/CVE-2013-5653/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002404.html" source="SUSE-SU"/>
		<description>

This update for ghostscript fixes the following issues:

- bsc#1006592: Fix a regression introduced in CVE-2013-5653 by which ps files couldn't be
  opened in okular/evince (kde#371887).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-16"/>
	<updated date="2016-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1006592">SUSE bug 1006592</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5653/">CVE-2013-5653</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516638" comment="ghostscript-9.15-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516639" comment="ghostscript-x11-9.15-17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77602" version="1" class="patch">
	<metadata>
		<title>Security update for eog (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="994819" ref_url="https://bugzilla.suse.com/994819" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6855" ref_url="https://www.suse.com/security/cve/CVE-2016-6855/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002405.html" source="SUSE-SU"/>
		<description>

This update for eog fixes the following issues:

- out-of-bounds write in eog (bsc#994819, CVE-2016-6855)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-17"/>
	<updated date="2016-11-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/994819">SUSE bug 994819</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6855/">CVE-2016-6855</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516640" comment="eog-3.10.2-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516641" comment="eog-lang-3.10.2-2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77603" version="1" class="patch">
	<metadata>
		<title>Security update for bash (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1000396" ref_url="https://bugzilla.suse.com/1000396" source="BUGZILLA"/>
		<reference ref_id="1001299" ref_url="https://bugzilla.suse.com/1001299" source="BUGZILLA"/>
		<reference ref_id="1001759" ref_url="https://bugzilla.suse.com/1001759" source="BUGZILLA"/>
		<reference ref_id="898812" ref_url="https://bugzilla.suse.com/898812" source="BUGZILLA"/>
		<reference ref_id="898884" ref_url="https://bugzilla.suse.com/898884" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-6277" ref_url="https://www.suse.com/security/cve/CVE-2014-6277/" source="CVE"/>
		<reference ref_id="CVE-2014-6278" ref_url="https://www.suse.com/security/cve/CVE-2014-6278/" source="CVE"/>
		<reference ref_id="CVE-2016-0634" ref_url="https://www.suse.com/security/cve/CVE-2016-0634/" source="CVE"/>
		<reference ref_id="CVE-2016-7543" ref_url="https://www.suse.com/security/cve/CVE-2016-7543/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002410.html" source="SUSE-SU"/>
		<description>

This update for bash fixes the following issues:

- CVE-2016-7543: Local attackers could have executed arbitrary commands via specially crafted SHELLOPTS+PS4 variables (bsc#1001299)
- CVE-2016-0634: Malicious hostnames could have allowed arbitrary command execution when $HOSTNAME was expanded in the prompt (bsc#1000396)
- CVE-2014-6277: More troubles with functions (bsc#898812, bsc#1001759)
- CVE-2014-6278: Code execution after original 6271 fix (bsc#898884)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-22"/>
	<updated date="2016-11-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000396">SUSE bug 1000396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001299">SUSE bug 1001299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001759">SUSE bug 1001759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898812">SUSE bug 898812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898884">SUSE bug 898884</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6277/">CVE-2014-6277</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6278/">CVE-2014-6278</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0634/">CVE-2016-0634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7543/">CVE-2016-7543</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516642" comment="bash-4.2-82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516643" comment="bash-doc-4.2-82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516644" comment="bash-lang-4.2-82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516645" comment="libreadline6-6.2-82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516646" comment="libreadline6-32bit-6.2-82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516647" comment="readline-doc-6.2-82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77604" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1005522" ref_url="https://bugzilla.suse.com/1005522" source="BUGZILLA"/>
		<reference ref_id="1005523" ref_url="https://bugzilla.suse.com/1005523" source="BUGZILLA"/>
		<reference ref_id="1005524" ref_url="https://bugzilla.suse.com/1005524" source="BUGZILLA"/>
		<reference ref_id="1005525" ref_url="https://bugzilla.suse.com/1005525" source="BUGZILLA"/>
		<reference ref_id="1005526" ref_url="https://bugzilla.suse.com/1005526" source="BUGZILLA"/>
		<reference ref_id="1005527" ref_url="https://bugzilla.suse.com/1005527" source="BUGZILLA"/>
		<reference ref_id="1005528" ref_url="https://bugzilla.suse.com/1005528" source="BUGZILLA"/>
		<reference ref_id="988651" ref_url="https://bugzilla.suse.com/988651" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5582" ref_url="https://www.suse.com/security/cve/CVE-2016-5582/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2887-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00039.html" source="SUSE-SU"/>
		<description>

OpenJDK Java was updated to jdk8u111 (icedtea 3.2.0) to fix the following issues:

* Security fixes
    + S8146490: Direct indirect CRL checks
    + S8151921: Improved page resolution
    + S8155968: Update command line options
    + S8155973, CVE-2016-5542: Tighten jar checks (bsc#1005522)
    + S8156794: Extend data sharing
    + S8157176: Improved classfile parsing
    + S8157739, CVE-2016-5554: Classloader Consistency Checking
      (bsc#1005523)
    + S8157749: Improve handling of DNS error replies
    + S8157753: Audio replay enhancement
    + S8157759: LCMS Transform Sampling Enhancement
    + S8157764: Better handling of interpolation plugins
    + S8158302: Handle contextual glyph substitutions
    + S8158993, CVE-2016-5568: Service Menu services (bsc#1005525)
    + S8159495: Fix index offsets
    + S8159503: Amend Annotation Actions
    + S8159511: Stack map validation
    + S8159515: Improve indy validation
    + S8159519, CVE-2016-5573: Reformat JDWP messages (bsc#1005526)
    + S8160090: Better signature handling in pack200
    + S8160094: Improve pack200 layout
    + S8160098: Clean up color profiles
    + S8160591, CVE-2016-5582: Improve internal array handling
      (bsc#1005527)
    + S8160838, CVE-2016-5597: Better HTTP service (bsc#1005528)
    + PR3206, RH1367357: lcms2: Out-of-bounds read in
      Type_MLU_Read()
    + CVE-2016-5556 (bsc#1005524)
* New features
    + PR1370: Provide option to build without debugging
    + PR1375: Provide option to strip and link debugging info after
      build
    + PR1537: Handle alternative Kerberos credential cache
      locations
    + PR1978: Allow use of system PCSC
    + PR2445: Support system libsctp
    + PR3182: Support building without pre-compiled headers
    + PR3183: Support Fedora/RHEL system crypto policy
    + PR3221: Use pkgconfig to detect Kerberos CFLAGS and libraries
* Import of OpenJDK 8 u102 build 14
    + S4515292: ReferenceType.isStatic() returns true for arrays
    + S4858370: JDWP: Memory Leak: GlobalRefs never deleted when
      processing invokeMethod command
    + S6976636: JVM/TI test ex03t001 fails assertion
    + S7185591: jcmd-big-script.sh ERROR: could not find app's Java
      pid.
    + S8017462: G1: guarantee fails with
      UseDynamicNumberOfGCThreads
    + S8034168: ThreadMXBean/Locks.java failed, blocked on wrong
      object
    + S8036006: [TESTBUG] sun/tools/native2ascii/NativeErrors.java
      fails: Process exit code was 0, but error was expected.
    + S8041781: Need new regression tests for PBE keys
    + S8041787: Need new regressions tests for buffer handling for
      PBE algorithms
    + S8043836: Need new tests for AES cipher
    + S8044199: Tests for RSA keys and key specifications
    + S8044772: TempDirTest.java still times out with -Xcomp
    + S8046339: sun.rmi.transport.DGCAckHandler leaks memory
    + S8047031: Add SocketPermission tests for legacy socket types
    + S8048052: Permission tests for setFactory
    + S8048138: Tests for JAAS callbacks
    + S8048147: Privilege tests with JAAS Subject.doAs
    + S8048356: SecureRandom default provider tests
    + S8048357: PKCS basic tests
    + S8048360: Test signed jar files
    + S8048362: Tests for doPrivileged with accomplice
    + S8048596: Tests for AEAD ciphers
    + S8048599: Tests for key wrap and unwrap operations
    + S8048603: Additional tests for MAC algorithms
    + S8048604: Tests for strong crypto ciphers
    + S8048607: Test key generation of DES and DESEDE
    + S8048610: Implement regression test for bug fix of 4686632
      in JCE
    + S8048617: Tests for PKCS12 read operations
    + S8048618: Tests for PKCS12 write operations.
    + S8048619: Implement tests for converting PKCS12 keystores
    + S8048624: Tests for SealedObject
    + S8048819: Implement reliability test for DH algorithm
    + S8048820: Implement tests for SecretKeyFactory
    + S8048830: Implement tests for new functionality provided in
      JEP 166
    + S8049237: Need new tests for X509V3 certificates
    + S8049321: Support SHA256WithDSA in JSSE
    + S8049429: Tests for java client server communications with
      various TLS/SSL combinations.
    + S8049432: New tests for TLS property jdk.tls.client.protocols
    + S8049814: Additional SASL client-server tests
    + S8050281: New permission tests for JEP 140
    + S8050370: Need new regressions tests for messageDigest with
      DigestIOStream
    + S8050371: More MessageDigest tests
    + S8050374: More Signature tests
    + S8050427: LoginContext tests to cover JDK-4703361
    + S8050460: JAAS login/logout tests with LoginContext
    + S8050461: Tests for syntax checking of JAAS configuration
      file
    + S8054278: Refactor jps utility tests
    + S8055530: assert(_exits.control()-&gt;is_top() ||
      !_gvn.type(ret_phi)-&gt;empty()) failed: return value must be
      well defined
    + S8055844: [TESTBUG]
      test/runtime/NMT/VirtualAllocCommitUncommitRecommit.java
      fails on Solaris Sparc due to incorrect page size being used
    + S8059677: Thread.getName() instantiates Strings
    + S8061464: A typo in CipherTestUtils test
    + S8062536: [TESTBUG] Conflicting GC combinations in jdk tests
    + S8065076: java/net/SocketPermission/SocketPermissionTest.java
      fails intermittently
    + S8065078: NetworkInterface.getNetworkInterfaces() triggers
      intermittent test failures
    + S8066871: java.lang.VerifyError: Bad local variable type -
      local final String
    + S8068427: Hashtable deserialization reconstitutes table with
      wrong capacity
    + S8069038: javax/net/ssl/TLS/TLSClientPropertyTest.java needs
      to be updated for JDK-8061210
    + S8069253: javax/net/ssl/TLS/TestJSSE.java failed on Mac
    + S8071125: Improve exception messages in URLPermission
    + S8072081: Supplementary characters are rejected in comments
    + S8072463: Remove requirement that AKID and SKID have to match
      when building certificate chain
    + S8072725: Provide more granular levels for GC verification
    + S8073400: Some Monospaced logical fonts have a different
      width
    + S8073872: Schemagen fails with StackOverflowError if element
      references containing class
    + S8074931: Additional tests for CertPath API
    + S8075286: Additional tests for signature algorithm OIDs and
      transformation string
    + S8076486: [TESTBUG]
      javax/security/auth/Subject/doAs/NestedActions.java fails if
      extra VM options are given
    + S8076545: Text size is twice bigger under Windows L&amp;F on Win
      8.1 with HiDPI display
    + S8076995: gc/ergonomics/TestDynamicNumberOfGCThreads.java
      failed with java.lang.RuntimeException: 'new_active_workers'
      missing from stdout/stderr
    + S8079138: Additional negative tests for XML signature
      processing
    + S8081512: Remove sun.invoke.anon classes, or move / co-locate
      them with tests
    + S8081771: ProcessTool.createJavaProcessBuilder() needs new
      addTestVmAndJavaOptions argument
    + S8129419: heapDumper.cpp: assert(length_in_bytes &gt; 0) failed:
      nothing to copy
    + S8130150: Implement BigInteger.montgomeryMultiply intrinsic
    + S8130242: DataFlavorComparator transitivity exception
    + S8130304: Inference: NodeNotFoundException thrown with deep
      generic method call chain
    + S8130425: libjvm crash due to stack overflow in executables
      with 32k tbss/tdata
    + S8133023: ParallelGCThreads is not calculated correctly
    + S8134111: Unmarshaller unmarshalls XML element which doesn't
      have the expected namespace
    + S8135259: InetAddress.getAllByName only reports 'unknown
      error' instead of actual cause
    + S8136506: Include sun.arch.data.model as a property that can
      be queried by jtreg
    + S8137068: Tests added in JDK-8048604 fail to compile
    + S8139040: Fix initializations before ShouldNotReachHere()
      etc. and enable -Wuninitialized on linux.
    + S8139581: AWT components are not drawn after removal and
      addition to a container
    + S8141243: Unexpected timezone returned after parsing a date
    + S8141420: Compiler runtime entries don't hold Klass* from
      being GCed
    + S8141445: Use of Solaris/SPARC M7 libadimalloc.so can
      generate unknown signal in hs_err file
    + S8141551: C2 can not handle returns with inccompatible
      interface arrays
    + S8143377: Test PKCS8Test.java fails
    + S8143647: Javac compiles method reference that allows results
      in an IllegalAccessError
    + S8144144: ORB destroy() leaks filedescriptors after
      unsuccessful connection
    + S8144593: Suppress not recognized property/feature warning
      messages from SAXParser
    + S8144957: Remove PICL warning message
    + S8145039: JAXB marshaller fails with ClassCastException on
      classes generated by xjc
    + S8145228: Java Access Bridge,
      getAccessibleStatesStringFromContext doesn't wrap the call to
      getAccessibleRole
    + S8145388: URLConnection.guessContentTypeFromStream returns
      image/jpg for some JPEG images
    + S8145974: XMLStreamWriter produces invalid XML for surrogate
      pairs on OutputStreamWriter
    + S8146035: Windows - With LCD antialiasing, some glyphs are
      not rendered correctly
    + S8146192: Add test for JDK-8049321
    + S8146274: Thread spinning on WeakHashMap.getEntry() with
      concurrent use of nashorn
    + S8147468: Allow users to bound the size of buffers cached in
      the per-thread buffer caches
    + S8147645: get_ctrl_no_update() code is wrong
    + S8147807: crash in libkcms.so on linux-sparc
    + S8148379: jdk.nashorn.api.scripting spec. adjustments,
      clarifications
    + S8148627: RestrictTestMaxCachedBufferSize.java to 64-bit
      platforms
    + S8148820: Missing @since Javadoc tag in Logger.log(Level,
      Supplier)
    + S8148926: Call site profiling fails on braces-wrapped
      anonymous function
    + S8149017: Delayed provider selection broken in RSA client key
      exchange
    + S8149029: Secure validation of XML based digital signature
      always enabled when checking wrapping attacks
    + S8149330: Capacity of StringBuilder should not get close to
      Integer.MAX_VALUE unless necessary
    + S8149334: JSON.parse(JSON.stringify([])).push(10) creates an
      array containing two elements
    + S8149368: [hidpi] JLabel font is twice bigger than JTextArea
      font on Windows 7,HiDPI, Windows L&amp;F
    + S8149411: PKCS12KeyStore cannot extract AES Secret Keys
    + S8149417: Use final restricted flag
    + S8149450: LdapCtx.processReturnCode() throwing Null Pointer
      Exception
    + S8149453: [hidpi] JFileChooser does not scale properly on
      Windows with HiDPI display and Windows L&amp;F
    + S8149543: range check CastII nodes should not be split
      through Phi
    + S8149743: JVM crash after debugger hotswap with lambdas
    + S8149744: fix testng.jar delivery in Nashorn build.xml
    + S8149915: enabling validate-annotations feature for xsd
      schema with annotation causes NPE
    + S8150002: Check for the validity of oop before printing it in
      verify_remembered_set
    + S8150470: JCK: api/xsl/conf/copy/copy19 test failure
    + S8150518: G1 GC crashes at
      G1CollectedHeap::do_collection_pause_at_safepoint(double)
    + S8150533: Test
      java/util/logging/LogManagerAppContextDeadlock.java times out
      intermittently.
    + S8150704: XALAN: ERROR: 'No more DTM IDs are available' when
      transforming with lots of temporary result trees
    + S8150780: Repeated offer and remove on ConcurrentLinkedQueue
      lead to an OutOfMemoryError
    + S8151064: com/sun/jdi/RedefineAddPrivateMethod.sh fails
      intermittently
    + S8151197: [TEST_BUG] Need to backport fix for
      test/javax/net/ssl/TLS/TestJSSE.java
    + S8151352: jdk/test/sample fails with 'effective library path
      is outside the test suite'
    + S8151431: DateFormatSymbols triggers this.clone() in the
      constructor
    + S8151535: TESTBUG: java/lang/invoke/AccessControlTest.java
      should be modified to run with JTREG 4.1 b13
    + S8151731: Add new jtreg keywords to jdk 8
    + S8151998: VS2010 ThemeReader.cpp(758) : error C3861: 'round':
      identifier not found
    + S8152927: Incorrect GPL header in StubFactoryDynamicBase.java
      reported
    + S8153252: SA: Hotspot build on Windows fails if make/closed
      folder does not exist
    + S8153531: Improve exception messaging for RSAClientKeyExchange
    + S8153641: assert(thread_state == _thread_in_native) failed:
      Assumed thread_in_native while heap dump
    + S8153673: [BACKOUT] JDWP: Memory Leak: GlobalRefs never
      deleted when processing invokeMethod command
    + S8154304: NullpointerException at
      LdapReferralException.getReferralContext
    + S8154722: Test gc/ergonomics/TestDynamicNumberOfGCThreads.java
      fails
    + S8157078: 8u102 L10n resource file updates
    + S8157838: Personalized Windows Font Size is not taken into
      account in Java8u102
* Import of OpenJDK 8 u111 build 14
    + S6882559: new JEditorPane('text/plain','') fails for null
      context class loader
    + S8049171: Additional tests for jarsigner's warnings
    + S8063086: Math.pow yields different results upon repeated
      calls
    + S8140530: Creating a VolatileImage with size 0,0 results in
      no longer working g2d.drawString
    + S8142926: OutputAnalyzer's shouldXXX() calls return this
    + S8147077: IllegalArgumentException thrown by
      api/java_awt/Component/FlipBufferStrategy/indexTGF_General
    + S8148127: IllegalArgumentException thrown by JCK test
      api/java_awt/Component/FlipBufferStrategy/indexTGF_General
      in opengl pipeline
    + S8150611: Security problem on sun.misc.resources.Messages*
    + S8153399: Constrain AppCDS behavior (back port)
    + S8157653: [Parfait] Uninitialised variable in awt_Font.cpp
    + S8158734: JEditorPane.createEditorKitForContentType throws
      NPE after 6882559
    + S8158994: Service Menu services
    + S8159684: (tz) Support tzdata2016f
    + S8160904: Typo in code from 8079718 fix :
      enableCustomValueHanlde
    + S8160934: isnan() is not available on older MSVC compilers
    + S8161141: correct bugId for JDK-8158994 fix push
    + S8162411: Service Menu services 2
    + S8162419: closed/com/oracle/jfr/runtime/TestVMInfoEvent.sh
      failing after JDK-8155968
    + S8162511: 8u111 L10n resource file updates
    + S8162792: Remove constraint DSA keySize &lt; 1024 from
      jdk.jar.disabledAlgorithms in jdk8
    + S8164452: 8u111 L10n resource file update - msgdrop 20
    + S8165816: jarsigner -verify shows jar unsigned if it was
      signed with a weak algorithm
    + S8166381: Back out changes to the java.security file to not
      disable MD5
* Backports
    + S8078628, PR3208: Zero build fails with pre-compiled headers
      disabled
    + S8141491, PR3159, G592292: Unaligned memory access in Bits.c
    + S8157306, PR3121: Random infrequent null pointer exceptions
      in javac (enabled on AArch64 only)
    + S8162384, PR3122: Performance regression: bimorphic inlining
      may be bypassed by type speculation
* Bug fixes
    + PR3123: Some object files built without -fPIC on x86 only
    + PR3126: pax-mark-vm script calls 'exit -1' which is invalid
      in dash
    + PR3127, G590348: Only apply PaX markings by default on
      running PaX kernels
    + PR3199: Invalid nashorn URL
    + PR3201: Update infinality configure test
    + PR3218: PR3159 leads to build failure on clean tree
* AArch64 port
    + S8131779, PR3220: AARCH64: add Montgomery multiply intrinsic
    + S8167200, PR3220: AArch64: Broken stack pointer adjustment in
      interpreter
    + S8167421, PR3220: AArch64: in one core system, fatal error:
      Illegal threadstate encountered
    + S8167595, PR3220: AArch64: SEGV in stub code
      cipherBlockChaining_decryptAESCrypt
    + S8168888, PR3220: Port 8160591: Improve internal array
      handling to AArch64.
* Shenandoah
    + PR3224: Shenandoah broken when building without pre-compiled
      headers
- Build against system kerberos 
- Build against system pcsc and sctp 
- S8158260, PR2991, RH1341258: PPC64: unaligned Unsafe.getInt can
      lead to the generation of illegal instructions (bsc#988651)		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-23"/>
	<updated date="2016-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005522">SUSE bug 1005522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005523">SUSE bug 1005523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005524">SUSE bug 1005524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005525">SUSE bug 1005525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005526">SUSE bug 1005526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005527">SUSE bug 1005527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005528">SUSE bug 1005528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988651">SUSE bug 988651</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5582/">CVE-2016-5582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516648" comment="java-1_8_0-openjdk-1.8.0.111-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516649" comment="java-1_8_0-openjdk-headless-1.8.0.111-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77605" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="939523" ref_url="https://bugzilla.suse.com/939523" source="BUGZILLA"/>
		<reference ref_id="960996" ref_url="https://bugzilla.suse.com/960996" source="BUGZILLA"/>
		<reference ref_id="962743" ref_url="https://bugzilla.suse.com/962743" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" source="SUSE-SU"/>
		<description>
java-1_7_0-openjdk was updated to version 7u95 to fix 9 security issues. (bsc#962743)

- CVE-2015-4871: Rebinding of the receiver of a DirectMethodHandle may allow a protected method to be accessed
- CVE-2015-7575: Further reduce use of MD5 (SLOTH) (bsc#960996)
- CVE-2015-8126: Vulnerability in the AWT component related to splashscreen displays
- CVE-2015-8472: Vulnerability in the AWT component, addressed by same fix
- CVE-2016-0402: Vulnerability in the Networking component related to URL processing
- CVE-2016-0448: Vulnerability in the JMX comonent related to attribute processing
- CVE-2016-0466: Vulnerability in the JAXP component, related to limits
- CVE-2016-0483: Vulnerability in the AWT component related to image decoding
- CVE-2016-0494: Vulnerability in 2D component related to font actions

The following bugs were fixed:

- bsc#939523: java-1_7_0-openjdk-headless had X dependencies, move libjavagtk to full package
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-27"/>
	<updated date="2016-01-27"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/939523">SUSE bug 939523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960996">SUSE bug 960996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515733" comment="java-1_7_0-openjdk-1.7.0.95-24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515734" comment="java-1_7_0-openjdk-headless-1.7.0.95-24.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77606" version="1" class="patch">
	<metadata>
		<title>Security update for tar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1007188" ref_url="https://bugzilla.suse.com/1007188" source="BUGZILLA"/>
		<reference ref_id="913058" ref_url="https://bugzilla.suse.com/913058" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6321" ref_url="https://www.suse.com/security/cve/CVE-2016-6321/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002417.html" source="SUSE-SU"/>
		<description>

This update for tar fixes the following issues:

- Fix the POINTYFEATHER vulnerability - GNU tar archiver can be tricked into extracting
  files and directories in the given destination, regardless of the
  path name(s) specified on the command line [bsc#1007188]
  [CVE-2016-6321]
- Fix Amanda integration issue (bsc#913058)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-24"/>
	<updated date="2016-11-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007188">SUSE bug 1007188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913058">SUSE bug 913058</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6321/">CVE-2016-6321</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516650" comment="tar-1.27.1-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516651" comment="tar-lang-1.27.1-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77607" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1007501" ref_url="https://bugzilla.suse.com/1007501" source="BUGZILLA"/>
		<reference ref_id="1007766" ref_url="https://bugzilla.suse.com/1007766" source="BUGZILLA"/>
		<reference ref_id="899252" ref_url="https://bugzilla.suse.com/899252" source="BUGZILLA"/>
		<reference ref_id="917806" ref_url="https://bugzilla.suse.com/917806" source="BUGZILLA"/>
		<reference ref_id="979531" ref_url="https://bugzilla.suse.com/979531" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9680" ref_url="https://www.suse.com/security/cve/CVE-2014-9680/" source="CVE"/>
		<reference ref_id="CVE-2016-7032" ref_url="https://www.suse.com/security/cve/CVE-2016-7032/" source="CVE"/>
		<reference ref_id="CVE-2016-7076" ref_url="https://www.suse.com/security/cve/CVE-2016-7076/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002420.html" source="SUSE-SU"/>
		<description>

This update for sudo fixes the following security issues:

- Fix two security vulnerabilities that allowed users to bypass sudo's NOEXEC functionality:
  * noexec bypass via system() and popen() [CVE-2016-7032, bsc#1007766]
  * noexec bypass via wordexp() [CVE-2016-7076, bsc#1007501]
- Fix unsafe handling of TZ environment variable. [CVE-2014-9680, bsc#917806]

Additionally, these non-security fixes are included in the update:

- Fix 'ignoring time stamp from the future' message after each boot with !tty_tickets. [bsc#899252]
- Enable support for SASL-based authentication. [bsc#979531]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-24"/>
	<updated date="2016-11-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007501">SUSE bug 1007501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007766">SUSE bug 1007766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899252">SUSE bug 899252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917806">SUSE bug 917806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979531">SUSE bug 979531</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9680/">CVE-2014-9680</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7032/">CVE-2016-7032</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7076/">CVE-2016-7076</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516652" comment="sudo-1.8.10p3-2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77608" version="1" class="patch">
	<metadata>
		<title>Security update for libarchive (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1005070" ref_url="https://bugzilla.suse.com/1005070" source="BUGZILLA"/>
		<reference ref_id="1005072" ref_url="https://bugzilla.suse.com/1005072" source="BUGZILLA"/>
		<reference ref_id="1005076" ref_url="https://bugzilla.suse.com/1005076" source="BUGZILLA"/>
		<reference ref_id="986566" ref_url="https://bugzilla.suse.com/986566" source="BUGZILLA"/>
		<reference ref_id="989980" ref_url="https://bugzilla.suse.com/989980" source="BUGZILLA"/>
		<reference ref_id="998677" ref_url="https://bugzilla.suse.com/998677" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2304" ref_url="https://www.suse.com/security/cve/CVE-2015-2304/" source="CVE"/>
		<reference ref_id="CVE-2016-5418" ref_url="https://www.suse.com/security/cve/CVE-2016-5418/" source="CVE"/>
		<reference ref_id="CVE-2016-5844" ref_url="https://www.suse.com/security/cve/CVE-2016-5844/" source="CVE"/>
		<reference ref_id="CVE-2016-6250" ref_url="https://www.suse.com/security/cve/CVE-2016-6250/" source="CVE"/>
		<reference ref_id="CVE-2016-8687" ref_url="https://www.suse.com/security/cve/CVE-2016-8687/" source="CVE"/>
		<reference ref_id="CVE-2016-8688" ref_url="https://www.suse.com/security/cve/CVE-2016-8688/" source="CVE"/>
		<reference ref_id="CVE-2016-8689" ref_url="https://www.suse.com/security/cve/CVE-2016-8689/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002421.html" source="SUSE-SU"/>
		<description>

This update for libarchive fixes several issues.

These security issues were fixed:

- CVE-2016-8687: Buffer overflow when printing a filename (bsc#1005070).
- CVE-2016-8689: Heap overflow when reading corrupted 7Zip files (bsc#1005072).
- CVE-2016-8688: Use after free because of incorrect calculation in next_line (bsc#1005076).
- CVE-2016-5844: Integer overflow in the ISO parser in libarchive allowed remote attackers to cause a denial of service (application crash) via a crafted ISO file (bsc#986566).
- CVE-2016-6250: Integer overflow in the ISO9660 writer in libarchive allowed remote attackers to cause a denial of service (application crash) or execute arbitrary code via vectors related to verifying filename lengths when writing an ISO9660 archive, which trigger a buffer overflow (bsc#989980).
- CVE-2016-5418: The sandboxing code in libarchive mishandled hardlink archive entries of non-zero data size, which might allowed remote attackers to write to arbitrary files via a crafted archive file (bsc#998677).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-25"/>
	<updated date="2016-11-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005070">SUSE bug 1005070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005072">SUSE bug 1005072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005076">SUSE bug 1005076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986566">SUSE bug 986566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989980">SUSE bug 989980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998677">SUSE bug 998677</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2304/">CVE-2015-2304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5418/">CVE-2016-5418</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5844/">CVE-2016-5844</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6250/">CVE-2016-6250</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8687/">CVE-2016-8687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8688/">CVE-2016-8688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8689/">CVE-2016-8689</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516653" comment="libarchive13-3.1.2-25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77609" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1000189" ref_url="https://bugzilla.suse.com/1000189" source="BUGZILLA"/>
		<reference ref_id="1000287" ref_url="https://bugzilla.suse.com/1000287" source="BUGZILLA"/>
		<reference ref_id="1000304" ref_url="https://bugzilla.suse.com/1000304" source="BUGZILLA"/>
		<reference ref_id="1000776" ref_url="https://bugzilla.suse.com/1000776" source="BUGZILLA"/>
		<reference ref_id="1001419" ref_url="https://bugzilla.suse.com/1001419" source="BUGZILLA"/>
		<reference ref_id="1001486" ref_url="https://bugzilla.suse.com/1001486" source="BUGZILLA"/>
		<reference ref_id="1002165" ref_url="https://bugzilla.suse.com/1002165" source="BUGZILLA"/>
		<reference ref_id="1003079" ref_url="https://bugzilla.suse.com/1003079" source="BUGZILLA"/>
		<reference ref_id="1003153" ref_url="https://bugzilla.suse.com/1003153" source="BUGZILLA"/>
		<reference ref_id="1003400" ref_url="https://bugzilla.suse.com/1003400" source="BUGZILLA"/>
		<reference ref_id="1003568" ref_url="https://bugzilla.suse.com/1003568" source="BUGZILLA"/>
		<reference ref_id="1003866" ref_url="https://bugzilla.suse.com/1003866" source="BUGZILLA"/>
		<reference ref_id="1003925" ref_url="https://bugzilla.suse.com/1003925" source="BUGZILLA"/>
		<reference ref_id="1003964" ref_url="https://bugzilla.suse.com/1003964" source="BUGZILLA"/>
		<reference ref_id="1004252" ref_url="https://bugzilla.suse.com/1004252" source="BUGZILLA"/>
		<reference ref_id="1004462" ref_url="https://bugzilla.suse.com/1004462" source="BUGZILLA"/>
		<reference ref_id="1004517" ref_url="https://bugzilla.suse.com/1004517" source="BUGZILLA"/>
		<reference ref_id="1004520" ref_url="https://bugzilla.suse.com/1004520" source="BUGZILLA"/>
		<reference ref_id="1005666" ref_url="https://bugzilla.suse.com/1005666" source="BUGZILLA"/>
		<reference ref_id="1006691" ref_url="https://bugzilla.suse.com/1006691" source="BUGZILLA"/>
		<reference ref_id="1007615" ref_url="https://bugzilla.suse.com/1007615" source="BUGZILLA"/>
		<reference ref_id="1007886" ref_url="https://bugzilla.suse.com/1007886" source="BUGZILLA"/>
		<reference ref_id="744692" ref_url="https://bugzilla.suse.com/744692" source="BUGZILLA"/>
		<reference ref_id="772786" ref_url="https://bugzilla.suse.com/772786" source="BUGZILLA"/>
		<reference ref_id="789311" ref_url="https://bugzilla.suse.com/789311" source="BUGZILLA"/>
		<reference ref_id="857397" ref_url="https://bugzilla.suse.com/857397" source="BUGZILLA"/>
		<reference ref_id="860441" ref_url="https://bugzilla.suse.com/860441" source="BUGZILLA"/>
		<reference ref_id="865545" ref_url="https://bugzilla.suse.com/865545" source="BUGZILLA"/>
		<reference ref_id="866130" ref_url="https://bugzilla.suse.com/866130" source="BUGZILLA"/>
		<reference ref_id="868923" ref_url="https://bugzilla.suse.com/868923" source="BUGZILLA"/>
		<reference ref_id="874131" ref_url="https://bugzilla.suse.com/874131" source="BUGZILLA"/>
		<reference ref_id="876463" ref_url="https://bugzilla.suse.com/876463" source="BUGZILLA"/>
		<reference ref_id="898675" ref_url="https://bugzilla.suse.com/898675" source="BUGZILLA"/>
		<reference ref_id="904489" ref_url="https://bugzilla.suse.com/904489" source="BUGZILLA"/>
		<reference ref_id="909994" ref_url="https://bugzilla.suse.com/909994" source="BUGZILLA"/>
		<reference ref_id="911687" ref_url="https://bugzilla.suse.com/911687" source="BUGZILLA"/>
		<reference ref_id="915183" ref_url="https://bugzilla.suse.com/915183" source="BUGZILLA"/>
		<reference ref_id="921338" ref_url="https://bugzilla.suse.com/921338" source="BUGZILLA"/>
		<reference ref_id="921784" ref_url="https://bugzilla.suse.com/921784" source="BUGZILLA"/>
		<reference ref_id="922064" ref_url="https://bugzilla.suse.com/922064" source="BUGZILLA"/>
		<reference ref_id="922634" ref_url="https://bugzilla.suse.com/922634" source="BUGZILLA"/>
		<reference ref_id="924381" ref_url="https://bugzilla.suse.com/924381" source="BUGZILLA"/>
		<reference ref_id="924384" ref_url="https://bugzilla.suse.com/924384" source="BUGZILLA"/>
		<reference ref_id="930399" ref_url="https://bugzilla.suse.com/930399" source="BUGZILLA"/>
		<reference ref_id="931454" ref_url="https://bugzilla.suse.com/931454" source="BUGZILLA"/>
		<reference ref_id="934067" ref_url="https://bugzilla.suse.com/934067" source="BUGZILLA"/>
		<reference ref_id="937086" ref_url="https://bugzilla.suse.com/937086" source="BUGZILLA"/>
		<reference ref_id="937888" ref_url="https://bugzilla.suse.com/937888" source="BUGZILLA"/>
		<reference ref_id="940545" ref_url="https://bugzilla.suse.com/940545" source="BUGZILLA"/>
		<reference ref_id="941420" ref_url="https://bugzilla.suse.com/941420" source="BUGZILLA"/>
		<reference ref_id="946309" ref_url="https://bugzilla.suse.com/946309" source="BUGZILLA"/>
		<reference ref_id="955446" ref_url="https://bugzilla.suse.com/955446" source="BUGZILLA"/>
		<reference ref_id="956514" ref_url="https://bugzilla.suse.com/956514" source="BUGZILLA"/>
		<reference ref_id="959463" ref_url="https://bugzilla.suse.com/959463" source="BUGZILLA"/>
		<reference ref_id="961257" ref_url="https://bugzilla.suse.com/961257" source="BUGZILLA"/>
		<reference ref_id="962846" ref_url="https://bugzilla.suse.com/962846" source="BUGZILLA"/>
		<reference ref_id="966864" ref_url="https://bugzilla.suse.com/966864" source="BUGZILLA"/>
		<reference ref_id="967640" ref_url="https://bugzilla.suse.com/967640" source="BUGZILLA"/>
		<reference ref_id="970943" ref_url="https://bugzilla.suse.com/970943" source="BUGZILLA"/>
		<reference ref_id="971975" ref_url="https://bugzilla.suse.com/971975" source="BUGZILLA"/>
		<reference ref_id="971989" ref_url="https://bugzilla.suse.com/971989" source="BUGZILLA"/>
		<reference ref_id="974406" ref_url="https://bugzilla.suse.com/974406" source="BUGZILLA"/>
		<reference ref_id="974620" ref_url="https://bugzilla.suse.com/974620" source="BUGZILLA"/>
		<reference ref_id="975596" ref_url="https://bugzilla.suse.com/975596" source="BUGZILLA"/>
		<reference ref_id="975772" ref_url="https://bugzilla.suse.com/975772" source="BUGZILLA"/>
		<reference ref_id="976195" ref_url="https://bugzilla.suse.com/976195" source="BUGZILLA"/>
		<reference ref_id="977687" ref_url="https://bugzilla.suse.com/977687" source="BUGZILLA"/>
		<reference ref_id="978094" ref_url="https://bugzilla.suse.com/978094" source="BUGZILLA"/>
		<reference ref_id="979451" ref_url="https://bugzilla.suse.com/979451" source="BUGZILLA"/>
		<reference ref_id="979928" ref_url="https://bugzilla.suse.com/979928" source="BUGZILLA"/>
		<reference ref_id="982783" ref_url="https://bugzilla.suse.com/982783" source="BUGZILLA"/>
		<reference ref_id="983619" ref_url="https://bugzilla.suse.com/983619" source="BUGZILLA"/>
		<reference ref_id="984194" ref_url="https://bugzilla.suse.com/984194" source="BUGZILLA"/>
		<reference ref_id="984419" ref_url="https://bugzilla.suse.com/984419" source="BUGZILLA"/>
		<reference ref_id="984779" ref_url="https://bugzilla.suse.com/984779" source="BUGZILLA"/>
		<reference ref_id="984992" ref_url="https://bugzilla.suse.com/984992" source="BUGZILLA"/>
		<reference ref_id="985562" ref_url="https://bugzilla.suse.com/985562" source="BUGZILLA"/>
		<reference ref_id="986445" ref_url="https://bugzilla.suse.com/986445" source="BUGZILLA"/>
		<reference ref_id="987192" ref_url="https://bugzilla.suse.com/987192" source="BUGZILLA"/>
		<reference ref_id="987333" ref_url="https://bugzilla.suse.com/987333" source="BUGZILLA"/>
		<reference ref_id="987542" ref_url="https://bugzilla.suse.com/987542" source="BUGZILLA"/>
		<reference ref_id="987565" ref_url="https://bugzilla.suse.com/987565" source="BUGZILLA"/>
		<reference ref_id="987621" ref_url="https://bugzilla.suse.com/987621" source="BUGZILLA"/>
		<reference ref_id="987805" ref_url="https://bugzilla.suse.com/987805" source="BUGZILLA"/>
		<reference ref_id="988440" ref_url="https://bugzilla.suse.com/988440" source="BUGZILLA"/>
		<reference ref_id="988617" ref_url="https://bugzilla.suse.com/988617" source="BUGZILLA"/>
		<reference ref_id="988715" ref_url="https://bugzilla.suse.com/988715" source="BUGZILLA"/>
		<reference ref_id="989152" ref_url="https://bugzilla.suse.com/989152" source="BUGZILLA"/>
		<reference ref_id="989953" ref_url="https://bugzilla.suse.com/989953" source="BUGZILLA"/>
		<reference ref_id="990245" ref_url="https://bugzilla.suse.com/990245" source="BUGZILLA"/>
		<reference ref_id="991247" ref_url="https://bugzilla.suse.com/991247" source="BUGZILLA"/>
		<reference ref_id="991608" ref_url="https://bugzilla.suse.com/991608" source="BUGZILLA"/>
		<reference ref_id="991665" ref_url="https://bugzilla.suse.com/991665" source="BUGZILLA"/>
		<reference ref_id="992244" ref_url="https://bugzilla.suse.com/992244" source="BUGZILLA"/>
		<reference ref_id="992555" ref_url="https://bugzilla.suse.com/992555" source="BUGZILLA"/>
		<reference ref_id="992591" ref_url="https://bugzilla.suse.com/992591" source="BUGZILLA"/>
		<reference ref_id="992593" ref_url="https://bugzilla.suse.com/992593" source="BUGZILLA"/>
		<reference ref_id="992712" ref_url="https://bugzilla.suse.com/992712" source="BUGZILLA"/>
		<reference ref_id="993392" ref_url="https://bugzilla.suse.com/993392" source="BUGZILLA"/>
		<reference ref_id="993841" ref_url="https://bugzilla.suse.com/993841" source="BUGZILLA"/>
		<reference ref_id="993890" ref_url="https://bugzilla.suse.com/993890" source="BUGZILLA"/>
		<reference ref_id="993891" ref_url="https://bugzilla.suse.com/993891" source="BUGZILLA"/>
		<reference ref_id="994296" ref_url="https://bugzilla.suse.com/994296" source="BUGZILLA"/>
		<reference ref_id="994438" ref_url="https://bugzilla.suse.com/994438" source="BUGZILLA"/>
		<reference ref_id="994520" ref_url="https://bugzilla.suse.com/994520" source="BUGZILLA"/>
		<reference ref_id="994748" ref_url="https://bugzilla.suse.com/994748" source="BUGZILLA"/>
		<reference ref_id="995153" ref_url="https://bugzilla.suse.com/995153" source="BUGZILLA"/>
		<reference ref_id="995968" ref_url="https://bugzilla.suse.com/995968" source="BUGZILLA"/>
		<reference ref_id="996664" ref_url="https://bugzilla.suse.com/996664" source="BUGZILLA"/>
		<reference ref_id="997059" ref_url="https://bugzilla.suse.com/997059" source="BUGZILLA"/>
		<reference ref_id="997299" ref_url="https://bugzilla.suse.com/997299" source="BUGZILLA"/>
		<reference ref_id="997708" ref_url="https://bugzilla.suse.com/997708" source="BUGZILLA"/>
		<reference ref_id="997896" ref_url="https://bugzilla.suse.com/997896" source="BUGZILLA"/>
		<reference ref_id="998689" ref_url="https://bugzilla.suse.com/998689" source="BUGZILLA"/>
		<reference ref_id="998795" ref_url="https://bugzilla.suse.com/998795" source="BUGZILLA"/>
		<reference ref_id="998825" ref_url="https://bugzilla.suse.com/998825" source="BUGZILLA"/>
		<reference ref_id="999577" ref_url="https://bugzilla.suse.com/999577" source="BUGZILLA"/>
		<reference ref_id="999584" ref_url="https://bugzilla.suse.com/999584" source="BUGZILLA"/>
		<reference ref_id="999600" ref_url="https://bugzilla.suse.com/999600" source="BUGZILLA"/>
		<reference ref_id="999779" ref_url="https://bugzilla.suse.com/999779" source="BUGZILLA"/>
		<reference ref_id="999907" ref_url="https://bugzilla.suse.com/999907" source="BUGZILLA"/>
		<reference ref_id="999932" ref_url="https://bugzilla.suse.com/999932" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8956" ref_url="https://www.suse.com/security/cve/CVE-2015-8956/" source="CVE"/>
		<reference ref_id="CVE-2016-5696" ref_url="https://www.suse.com/security/cve/CVE-2016-5696/" source="CVE"/>
		<reference ref_id="CVE-2016-6130" ref_url="https://www.suse.com/security/cve/CVE-2016-6130/" source="CVE"/>
		<reference ref_id="CVE-2016-6327" ref_url="https://www.suse.com/security/cve/CVE-2016-6327/" source="CVE"/>
		<reference ref_id="CVE-2016-6480" ref_url="https://www.suse.com/security/cve/CVE-2016-6480/" source="CVE"/>
		<reference ref_id="CVE-2016-6828" ref_url="https://www.suse.com/security/cve/CVE-2016-6828/" source="CVE"/>
		<reference ref_id="CVE-2016-7042" ref_url="https://www.suse.com/security/cve/CVE-2016-7042/" source="CVE"/>
		<reference ref_id="CVE-2016-7097" ref_url="https://www.suse.com/security/cve/CVE-2016-7097/" source="CVE"/>
		<reference ref_id="CVE-2016-7425" ref_url="https://www.suse.com/security/cve/CVE-2016-7425/" source="CVE"/>
		<reference ref_id="CVE-2016-8658" ref_url="https://www.suse.com/security/cve/CVE-2016-8658/" source="CVE"/>
		<reference ref_id="CVE-2016-8666" ref_url="https://www.suse.com/security/cve/CVE-2016-8666/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00041.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 kernel was updated to 3.12.67 to receive various security and bugfixes.

The following security bugs were fixed:
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in
  the Linux kernel used an incorrect buffer size for certain timeout data,
  which allowed local users to cause a denial of service (stack memory
  corruption and panic) by reading the /proc/keys file (bsc#1004517).
- CVE-2016-7097: The filesystem implementation in the Linux kernel
  preserved the setgid bit during a setxattr call, which allowed local
  users to gain group privileges by leveraging the existence of a setgid
  program with restrictions on execute permissions (bsc#995968).
- CVE-2015-8956: The rfcomm_sock_bind function in
  net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to
  obtain sensitive information or cause a denial of service (NULL pointer
  dereference) via vectors involving a bind system call on a Bluetooth
  RFCOMM socket (bnc#1003925).
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly
  determine the rate of challenge ACK segments, which made it easier for
  man-in-the-middle attackers to hijack TCP sessions via a blind in-window
  attack (bnc#989152).
- CVE-2016-6130: Race condition in the sclp_ctl_ioctl_sccb function in
  drivers/s390/char/sclp_ctl.c in the Linux kernel allowed local users to
  obtain sensitive information from kernel memory by changing a certain
  length value, aka a 'double fetch' vulnerability (bnc#987542).
- CVE-2016-6327: drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux
  kernel allowed local users to cause a denial of service (NULL pointer
  dereference and system crash) by using an ABORT_TASK command to abort
  a device write operation (bnc#994748).
- CVE-2016-6480: Race condition in the ioctl_send_fib function in
  drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users
  to cause a denial of service (out-of-bounds access or system crash)
  by changing a certain size value, aka a 'double fetch' vulnerability
  (bnc#991608).
- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h
  in the Linux kernel did not properly maintain certain SACK state after a
  failed data copy, which allowed local users to cause a denial of service
  (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted
  SACK option (bnc#994296).
- CVE-2016-7425: The arcmsr_iop_message_xfer function in
  drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict
  a certain length field, which allowed local users to gain privileges
  or cause a denial of service (heap-based buffer overflow) via an
  ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).
- CVE-2016-8658: Stack-based buffer overflow
  in the brcmf_cfg80211_start_ap function in
  drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux
  kernel allowed local users to cause a denial of service (system crash)
  or possibly have unspecified other impact via a long SSID Information
  Element in a command to a Netlink socket (bnc#1004462).
- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers
  to cause a denial of service (stack consumption and panic) or possibly
  have unspecified other impact by triggering use of the GRO path for
  packets with tunnel stacking, as demonstrated by interleaved IPv4 headers
  and GRE headers, a related issue to CVE-2016-7039 (bsc#1001486).

The following non-security bugs were fixed:

- aacraid: Fix RRQ overload (bsc#1003079).
- acpi / PM: Ignore wakeup setting if the ACPI companion can't wake up (FATE#315621).
- AF_VSOCK: Shrink the area influenced by prepare_to_wait (bsc#994520).
- apparmor: add missing id bounds check on dfa verification (bsc#1000304).
- apparmor: check that xindex is in trans_table bounds (bsc#1000304).
- apparmor: do not expose kernel stack (bsc#1000304).
- apparmor: don't check for vmalloc_addr if kvzalloc() failed (bsc#1000304).
- apparmor: ensure the target profile name is always audited (bsc#1000304).
- apparmor: exec should not be returning ENOENT when it denies (bsc#1000304).
- apparmor: fix arg_size computation for when setprocattr is null terminated (bsc#1000304).
- apparmor: fix audit full profile hname on successful load (bsc#1000304).
- apparmor: fix change_hat not finding hat after policy replacement (bsc#1000287).
- apparmor: fix disconnected bind mnts reconnection (bsc#1000304).
- apparmor: fix log failures for all profiles in a set (bsc#1000304).
- apparmor: fix module parameters can be changed after policy is locked (bsc#1000304).
- apparmor: fix oops in profile_unpack() when policy_db is not present (bsc#1000304).
- apparmor: fix oops, validate buffer size in apparmor_setprocattr() (bsc#1000304).
- apparmor: fix put() parent ref after updating the active ref (bsc#1000304).
- apparmor: fix refcount bug in profile replacement (bsc#1000304).
- apparmor: fix refcount race when finding a child profile (bsc#1000304).
- apparmor: fix replacement bug that adds new child to old parent (bsc#1000304).
- apparmor: fix uninitialized lsm_audit member (bsc#1000304).
- apparmor: fix update the mtime of the profile file on replacement (bsc#1000304).
- apparmor: internal paths should be treated as disconnected (bsc#1000304).
- apparmor: use list_next_entry instead of list_entry_next (bsc#1000304).
- arm64: Ensure pmd_present() returns false after pmd_mknotpresent() (Automatic NUMA Balancing (fate#315482)).
- arm64: mm: remove broken &amp;= operator from pmd_mknotpresent (Automatic NUMA Balancing (fate#315482)).
- avoid dentry crash triggered by NFS (bsc#984194).
- be2net: Don't leak iomapped memory on removal (bsc#921784).
- be2net: fix BE3-R FW download compatibility check (bsc#921784).
- be2net: fix wrong return value in be_check_ufi_compatibility() (bsc#921784).
- be2net: remove vlan promisc capability from VF's profile descriptors (bsc#921784).
- blkfront: fix an error path memory leak (luckily none so far).
- blk-mq: fix undefined behaviour in order_to_size() (fate#315209).
- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).
- blktap2: eliminate race from deferred work queue handling (bsc#911687).
- bond: Check length of IFLA_BOND_ARP_IP_TARGET attributes (fate#316924).
- bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687).
- bonding: fix curr_active_slave/carrier with loadbalance arp monitoring (fate#316924).
- bonding: Prevent IPv6 link local address on enslaved devices (fate#316924).
- bonding: prevent out of bound accesses (fate#316924).
- bonding: set carrier off for devices created through netlink (bsc#999577).
- btrfs: account for non-CoW'd blocks in btrfs_abort_transaction (bsc#983619).
- btrfs: add missing discards when unpinning extents with -o discard (bsc#904489).
- btrfs: btrfs_issue_discard ensure offset/length are aligned to sector boundaries (bsc#904489).
- btrfs: do not create or leak aliased root while cleaning up orphans (bsc#904489).
- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).
- btrfs: explictly delete unused block groups in close_ctree and ro-remount (bsc#904489).
- btrfs: Fix a data space underflow warning (bsc#985562, bsc#975596, bsc#984779)
- btrfs: fix fitrim discarding device area reserved for boot loader's use (bsc#904489).
- btrfs: handle quota reserve failure properly (bsc#1005666).
- btrfs: iterate over unused chunk space in FITRIM (bsc#904489).
- btrfs: make btrfs_issue_discard return bytes discarded (bsc#904489).
- btrfs: properly track when rescan worker is running (bsc#989953).
- btrfs: remove unnecessary locking of cleaner_mutex to avoid deadlock (bsc#904489).
- btrfs: reorder patches to place local patches back at the end of the series
- btrfs: skip superblocks during discard (bsc#904489).
- btrfs: test_check_exists: Fix infinite loop when searching for free space entries (bsc#987192).
- btrfs: waiting on qgroup rescan should not always be interruptible (bsc#992712).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- ceph: After a write, we must free the 'request', not the 'response'. This error crept in during the backport. bsc#995153
- cephfs: ignore error from invalidate_inode_pages2_range() in direct write (bsc#995153).
- cephfs: remove warning when ceph_releasepage() is called on dirty page (bsc#995153).
- clockevents: export clockevents_unbind_device instead of clockevents_unbind (bnc#937888).
- conntrack: RFC5961 challenge ACK confuse conntrack LAST-ACK transition (bsc#966864).
- cpumask, nodemask: implement cpumask/nodemask_pr_args() (bnc1003866).
- cxgbi: fix uninitialized flowi6 (bsc#924384 FATE#318570 bsc#921338).
- dm: fix AB-BA deadlock in __dm_destroy(). (bsc#970943)
- Document the process to blacklist upstream commit-ids
- drivers/hv: share Hyper-V SynIC constants with userspace (bnc#937888).
- drivers: hv: vmbus: avoid scheduling in interrupt context in vmbus_initiate_unload() (bnc#937888).
- drivers: hv: vmbus: avoid unneeded compiler optimizations in vmbus_wait_for_unload() (bnc#937888).
- drivers: hv: vmbus: avoid wait_for_completion() on crash (bnc#937888).
- drivers: hv: vmbus: Cleanup vmbus_set_event() (bnc#937888).
- drivers: hv: vmbus: do not loose HVMSG_TIMER_EXPIRED messages (bnc#937888).
- drivers: hv: vmbus: do not manipulate with clocksources on crash (bnc#937888).
- drivers: hv: vmbus: Force all channel messages to be delivered on CPU 0 (bnc#937888).
- drivers: hv: vmbus: Get rid of the unused irq variable (bnc#937888).
- drivers: hv: vmbus: handle various crash scenarios (bnc#937888).
- drivers: hv: vmbus: remove code duplication in message handling (bnc#937888).
- drivers: hv: vmbus: Support handling messages on multiple CPUs (bnc#937888).
- drivers: hv: vmbus: Support kexec on ws2012 r2 and above (bnc#937888).
- efi: Small leak on error in runtime map code (fate#315019).
- ext2: Enable ext2 driver in config files (bsc#976195, fate#320805)
- ext4: Add parameter for tuning handling of ext2 (bsc#976195).
- ext4: Fixup handling for custom configs.
- fs/select: add vmalloc fallback for select(2) (bsc#1000189).
- ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).
- hyperv: enable call to clockevents_unbind_device in kexec/kdump path
- hyperv: replace KEXEC_CORE by plain KEXEC because we lack 2965faa5e0 in the base kernel
- i40e: fix an uninitialized variable bug (bnc#857397 FATE#315659).
- ib/iwpm: Fix a potential skb leak (bsc#924381 FATE#318568 bsc#921338).
- ib/mlx5: Fix RC transport send queue overhead computation (bnc#865545 FATE#316891).
- input: Revert 'can: dev: fix deadlock reported after bus-off'.
- input: Revert 'Input: i8042 - break load dependency between atkbd/psmouse and i8042'.
- input: Revert 'Input: i8042 - set up shared ps2_cmd_mutex for AUX ports'.
- introduce NETIF_F_GSO_ENCAP_ALL helper mask (bsc#1001486).
- iommu/amd: Update Alias-DTE in update_device_table() (bsc#975772).
- ipv6: Fix improper use or RCU (bsc#961257)
- ipv6: fix multipath route replace error recovery (bsc#930399).
- ipv6: KABI workaround for ipv6: add complete rcu protection around np-&gt;opt.
- ipv6: send NEWLINK on RA managed/otherconf changes (bsc#934067).
- ipv6: send only one NEWLINK when RA causes changes (bsc#934067).
- iscsi: Add a missed complete in iscsit_close_connection (bsc#992555, bsc#987805).
- iwlwifi: dvm: fix flush support for old firmware (bsc#940545).
- kabi: clockevents: export clockevents_unbind again.
- kabi: Fix kabi change cause by adding flock_owner to open_context (bsc#998689).
- kabi: hide harmless change in struct inet_connection_sock (fate#318553).
- kABI: protect backing-dev include in mm/migrate.
- kABI: protect enum usb_device_speed.
- kABI: protect struct mlx5_modify_qp_mbox_in.
- kabi: work around kabi changes from commit 53f9ff48f636 (bsc#988617).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- kernel/fork: fix CLONE_CHILD_CLEARTID regression in nscd (bnc#941420).
- kernel/printk/printk.c: fix faulty logic in the case of recursive printk (bnc#744692, bnc#789311).
- kvm: do not handle APIC access page if in-kernel irqchip is not in use (bsc#959463).
- Kvm: vmx: defer load of APIC access page address during reset (bsc#959463).
- libceph: enable large, variable-sized OSD requests (bsc#988715).
- libceph: make r_request msg_size calculation clearer (bsc#988715).
- libceph: move r_reply_op_{len,result} into struct ceph_osd_req_op (bsc#988715).
- libceph: osdc-&gt;req_mempool should be backed by a slab pool (bsc#988715).
- libceph: rename ceph_osd_req_op::payload_len to indata_len (bsc#988715).
- libfc: do not send ABTS when resetting exchanges (bsc#962846).
- libfc: Do not take rdata-&gt;rp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846).
- libfc: Fixup disc_mutex handling (bsc#962846).
- libfc: fixup locking of ptp_setup() (bsc#962846).
- libfc: Issue PRLI after a PRLO has been received (bsc#962846).
- libfc: reset exchange manager during LOGO handling (bsc#962846).
- libfc: Revisit kref handling (bnc#990245).
- libfc: sanity check cpu number extracted from xid (bsc#988440).
- libfc: send LOGO for PLOGI failure (bsc#962846).
- lib/vsprintf: implement bitmap printing through '%*pb[l]' (bnc#1003866).
- md: check command validity early in md_ioctl() (bsc#1004520).
- md: Drop sending a change uevent when stopping (bsc#1003568).
- md: lockless I/O submission for RAID1 (bsc#982783).
- md/raid5: fix a recently broken BUG_ON() (bsc#1006691).
- memcg: convert threshold to bytes (bnc#931454).
- memcg: fix thresholds for 32b architectures (bnc#931454).
- mm, cma: prevent nr_isolated_* counters from going negative (bnc#971975 VM performance -- git fixes).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- module: Issue warnings when tainting kernel (bsc#974406).
- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).
- MSI-X: fix an error path (luckily none so far).
- netback: fix flipping mode (bsc#996664).
- netback: fix refounting (bsc#978094).
- netfront: don't truncate grant references.
- netfront: use correct linear area after linearizing an skb (bsc#1007886).
- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1003400).
- nfs: Add a stub for GETDEVICELIST (bnc#898675).
- nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584).
- nfsd: Use free_conn to free connection (bsc#979451).
- nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514).
- nfs: Fix a regression in the read() syscall (bsc#999584).
- nfs: fix BUG() crash in notify_change() with patch to chown_common() (bnc#876463).
- nfs: fix pg_test page count calculation (bnc#898675).
- nfs: nfs4_fl_prepare_ds must be careful about reporting success (bsc#1000776).
- nfsv4: add flock_owner to open context (bnc#998689).
- nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).
- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).
- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).
- nfsv4: Ensure nfs_atomic_open set the dentry verifier on ENOENT (bnc#866130).
- oom: print nodemask in the oom report (bnc#1003866).
- packet: tpacket_snd(): fix signed/unsigned comparison (bsc#874131).
- perf/x86/intel: Fix bug for 'cycles:p' and 'cycles:pp' on SLM (bsc#997896).
- pm / hibernate: Fix 2G size issue of snapshot image verification (bsc#1004252).
- pm / hibernate: Fix rtree_next_node() to avoid walking off list ends (bnc#860441).
- powerpc: add kernel parameter iommu_alloc_quiet (bsc#998825).
- printk: add kernel parameter to control writes to /dev/kmsg (bsc#979928).
- qgroup: Prevent qgroup-&gt;reserved from going subzero (bsc#993841).
- qlcnic: potential NULL dereference in qlcnic_83xx_get_minidump_template() (bsc#922064 FATE#318609)
- radeon: avoid boot hang in Xen Dom0 (luckily none so far).
- ratelimit: extend to print suppressed messages on release (bsc#979928).
- ratelimit: fix bug in time interval by resetting right begin time (bsc#979928).
- rbd: truncate objects on cmpext short reads (bsc#988715).
- rpm/config.sh: Set the SP1 release string to 60.&lt;RELEASE&gt; (bsc#997059)
- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)
- rtnetlink: avoid 0 sized arrays (fate#316924).
- s390: add SMT support (bnc#994438, LTC#144756).
- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).
- sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419).
- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).
- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)
- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).
- sd: Fix memory leak caused by RESET_WP patch (bsc#999779).
- squashfs3: properly handle dir_emit() failures (bsc#998795).
- sunrpc: Add missing support for RPC_CLNT_CREATE_NO_RETRANS_TIMEOUT (bnc#868923).
- sunrpc: Fix a regression when reconnecting (bsc#946309).
- supported.conf: Add ext2
- supported.conf: Add iscsi modules to -base (bsc#997299)
- supported.conf: Add tun to -base (bsc#992593)
- supported.conf: Add veth to -base (bsc#992591)
- target: Fix missing complete during ABORT_TASK + CMD_T_FABRIC_STOP (bsc#987621).
- target: Fix race between iscsi-target connection shutdown + ABORT_TASK (bsc#987621).
- tcp: add proper TS val into RST packets (bsc#937086).
- tcp: align tcp_xmit_size_goal() on tcp_tso_autosize() (bsc#937086).
- tcp: fix child sockets to use system default congestion control if not set (fate#318553).
- tcp: fix cwnd limited checking to improve congestion control (bsc#988617).
- tcp: refresh skb timestamp at retransmit time (bsc#937086).
- timers: Use proper base migration in add_timer_on() (bnc#993392).
- tunnels: Do not apply GRO to multiple layers of encapsulation (bsc#1001486).
- tunnels: Remove encapsulation offloads on decap (bsc#1001486).
- Update patches.drivers/mpt3sas-Fix-use-sas_is_tlr_enabled-API-before-enabli.patch (bsc#967640, bsc#992244).
- Update patches.kabi/kabi.clockevents_unbind.patch (bnc#937888).
- uprobes: Fix the memcg accounting (bnc#931454).
- usb: fix typo in wMaxPacketSize validation (bsc#991665).
- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).
- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634).
- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
- vmxnet3: Wake queue from reset work (bsc#999907).
- x86/tlb/trace: Do not trace on CPU that is offline (TLB Performance git-fixes).
- xenbus: don't invoke -&gt;is_ready() for most device states (bsc#987333).
- xenbus: inspect the correct type in xenbus_dev_request_and_reply().
- xen: Linux 3.12.63.
- xen/pciback: Fix conf_space read/write overlap check.
- xen-pciback: return proper values during BAR sizing.
- xen: Refresh patches.xen/xen3-patch-3.9 (bsc#991247).
- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
- xfs: fixed signedness of error code in xfs_inode_buf_verify (bsc#1003153).
- xfs: fix xfs-handle-dquot-buffer-readahead-in-log-recovery-co.patch (bsc#1003153).
- xfs: handle dquot buffer readahead in log recovery correctly (bsc#955446).
- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).
- xhci: silence warnings in switch (bnc#991665).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-25"/>
	<updated date="2016-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000189">SUSE bug 1000189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000287">SUSE bug 1000287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000304">SUSE bug 1000304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000776">SUSE bug 1000776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001419">SUSE bug 1001419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001486">SUSE bug 1001486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002165">SUSE bug 1002165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003079">SUSE bug 1003079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003153">SUSE bug 1003153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003400">SUSE bug 1003400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003568">SUSE bug 1003568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003866">SUSE bug 1003866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003925">SUSE bug 1003925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003964">SUSE bug 1003964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004252">SUSE bug 1004252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004462">SUSE bug 1004462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004517">SUSE bug 1004517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004520">SUSE bug 1004520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005666">SUSE bug 1005666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006691">SUSE bug 1006691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007615">SUSE bug 1007615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007886">SUSE bug 1007886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744692">SUSE bug 744692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/772786">SUSE bug 772786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789311">SUSE bug 789311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857397">SUSE bug 857397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860441">SUSE bug 860441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865545">SUSE bug 865545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866130">SUSE bug 866130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868923">SUSE bug 868923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/874131">SUSE bug 874131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876463">SUSE bug 876463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898675">SUSE bug 898675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904489">SUSE bug 904489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909994">SUSE bug 909994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911687">SUSE bug 911687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915183">SUSE bug 915183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921338">SUSE bug 921338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921784">SUSE bug 921784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922064">SUSE bug 922064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922634">SUSE bug 922634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924381">SUSE bug 924381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924384">SUSE bug 924384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930399">SUSE bug 930399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931454">SUSE bug 931454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934067">SUSE bug 934067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937086">SUSE bug 937086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937888">SUSE bug 937888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940545">SUSE bug 940545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941420">SUSE bug 941420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946309">SUSE bug 946309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955446">SUSE bug 955446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956514">SUSE bug 956514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959463">SUSE bug 959463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961257">SUSE bug 961257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962846">SUSE bug 962846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966864">SUSE bug 966864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967640">SUSE bug 967640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970943">SUSE bug 970943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971975">SUSE bug 971975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971989">SUSE bug 971989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974406">SUSE bug 974406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974620">SUSE bug 974620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975596">SUSE bug 975596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975772">SUSE bug 975772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976195">SUSE bug 976195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977687">SUSE bug 977687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978094">SUSE bug 978094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979451">SUSE bug 979451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979928">SUSE bug 979928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982783">SUSE bug 982783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983619">SUSE bug 983619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984194">SUSE bug 984194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984419">SUSE bug 984419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984779">SUSE bug 984779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984992">SUSE bug 984992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985562">SUSE bug 985562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986445">SUSE bug 986445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987192">SUSE bug 987192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987333">SUSE bug 987333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987542">SUSE bug 987542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987565">SUSE bug 987565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987621">SUSE bug 987621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987805">SUSE bug 987805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988440">SUSE bug 988440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988617">SUSE bug 988617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988715">SUSE bug 988715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989152">SUSE bug 989152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989953">SUSE bug 989953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990245">SUSE bug 990245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991247">SUSE bug 991247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991608">SUSE bug 991608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991665">SUSE bug 991665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992244">SUSE bug 992244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992555">SUSE bug 992555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992591">SUSE bug 992591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992593">SUSE bug 992593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992712">SUSE bug 992712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993392">SUSE bug 993392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993841">SUSE bug 993841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993890">SUSE bug 993890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993891">SUSE bug 993891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994296">SUSE bug 994296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994438">SUSE bug 994438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994520">SUSE bug 994520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994748">SUSE bug 994748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995153">SUSE bug 995153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995968">SUSE bug 995968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996664">SUSE bug 996664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997059">SUSE bug 997059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997299">SUSE bug 997299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997708">SUSE bug 997708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997896">SUSE bug 997896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998689">SUSE bug 998689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998795">SUSE bug 998795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998825">SUSE bug 998825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999577">SUSE bug 999577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999584">SUSE bug 999584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999600">SUSE bug 999600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999779">SUSE bug 999779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999907">SUSE bug 999907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999932">SUSE bug 999932</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8956/">CVE-2015-8956</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5696/">CVE-2016-5696</cve>
	<cve impact="moderate" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-6130/">CVE-2016-6130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6327/">CVE-2016-6327</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6480/">CVE-2016-6480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6828/">CVE-2016-6828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7042/">CVE-2016-7042</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7097/">CVE-2016-7097</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7425/">CVE-2016-7425</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8658/">CVE-2016-8658</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-8666/">CVE-2016-8666</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516654" comment="kernel-default-3.12.67-60.64.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516655" comment="kernel-default-devel-3.12.67-60.64.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516656" comment="kernel-default-extra-3.12.67-60.64.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516657" comment="kernel-devel-3.12.67-60.64.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516658" comment="kernel-macros-3.12.67-60.64.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516659" comment="kernel-source-3.12.67-60.64.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516660" comment="kernel-syms-3.12.67-60.64.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516661" comment="kernel-xen-3.12.67-60.64.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516662" comment="kernel-xen-devel-3.12.67-60.64.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77610" version="1" class="patch">
	<metadata>
		<title>Recommended update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1001367" ref_url="https://bugzilla.suse.com/1001367" source="BUGZILLA"/>
		<reference ref_id="1003800" ref_url="https://bugzilla.suse.com/1003800" source="BUGZILLA"/>
		<reference ref_id="1004477" ref_url="https://bugzilla.suse.com/1004477" source="BUGZILLA"/>
		<reference ref_id="1005555" ref_url="https://bugzilla.suse.com/1005555" source="BUGZILLA"/>
		<reference ref_id="1005558" ref_url="https://bugzilla.suse.com/1005558" source="BUGZILLA"/>
		<reference ref_id="1005562" ref_url="https://bugzilla.suse.com/1005562" source="BUGZILLA"/>
		<reference ref_id="1005564" ref_url="https://bugzilla.suse.com/1005564" source="BUGZILLA"/>
		<reference ref_id="1005566" ref_url="https://bugzilla.suse.com/1005566" source="BUGZILLA"/>
		<reference ref_id="1005569" ref_url="https://bugzilla.suse.com/1005569" source="BUGZILLA"/>
		<reference ref_id="1005581" ref_url="https://bugzilla.suse.com/1005581" source="BUGZILLA"/>
		<reference ref_id="1005582" ref_url="https://bugzilla.suse.com/1005582" source="BUGZILLA"/>
		<reference ref_id="1006539" ref_url="https://bugzilla.suse.com/1006539" source="BUGZILLA"/>
		<reference ref_id="1008318" ref_url="https://bugzilla.suse.com/1008318" source="BUGZILLA"/>
		<reference ref_id="990890" ref_url="https://bugzilla.suse.com/990890" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3492" ref_url="https://www.suse.com/security/cve/CVE-2016-3492/" source="CVE"/>
		<reference ref_id="CVE-2016-5584" ref_url="https://www.suse.com/security/cve/CVE-2016-5584/" source="CVE"/>
		<reference ref_id="CVE-2016-5624" ref_url="https://www.suse.com/security/cve/CVE-2016-5624/" source="CVE"/>
		<reference ref_id="CVE-2016-5626" ref_url="https://www.suse.com/security/cve/CVE-2016-5626/" source="CVE"/>
		<reference ref_id="CVE-2016-5629" ref_url="https://www.suse.com/security/cve/CVE-2016-5629/" source="CVE"/>
		<reference ref_id="CVE-2016-6663" ref_url="https://www.suse.com/security/cve/CVE-2016-6663/" source="CVE"/>
		<reference ref_id="CVE-2016-7440" ref_url="https://www.suse.com/security/cve/CVE-2016-7440/" source="CVE"/>
		<reference ref_id="CVE-2016-8283" ref_url="https://www.suse.com/security/cve/CVE-2016-8283/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00043.html" source="SUSE-SU"/>
		<description>

This mariadb update to version 10.0.28 fixes the following issues (bsc#1008318):

Security fixes:
- CVE-2016-8283: Unspecified vulnerability in subcomponent Types (bsc#1005582)
- CVE-2016-7440: Unspecified vulnerability in subcomponent Encryption (bsc#1005581)
- CVE-2016-5629: Unspecified vulnerability in subcomponent Federated (bsc#1005569)
- CVE-2016-5626: Unspecified vulnerability in subcomponent GIS (bsc#1005566)
- CVE-2016-5624: Unspecified vulnerability in subcomponent DML (bsc#1005564)
- CVE-2016-5616: Unspecified vulnerability in subcomponent MyISAM (bsc#1005562)
- CVE-2016-5584: Unspecified vulnerability in subcomponent Encryption (bsc#1005558)
- CVE-2016-3492: Unspecified vulnerability in subcomponent Optimizer (bsc#1005555)
- CVE-2016-6663: Privilege Escalation / Race Condition (bsc#1001367)

Bugfixes:
- mysql_install_db can't find data files (bsc#1006539)
- mariadb failing test sys_vars.optimizer_switch_basic (bsc#1003800)
- Remove useless mysql@default.service (bsc#1004477)
- Replace all occurrences of the string '@sysconfdir@' with '/etc' as it wasn't expanded properly (bsc#990890)
- Notable changes:
  * XtraDB updated to 5.6.33-79.0
  * TokuDB updated to 5.6.33-79.0
  * Innodb updated to 5.6.33
  * Performance Schema updated to 5.6.33
- Release notes and upstream changelog:
  * https://kb.askmonty.org/en/mariadb-10028-release-notes
  * https://kb.askmonty.org/en/mariadb-10028-changelog
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-28"/>
	<updated date="2016-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1001367">SUSE bug 1001367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003800">SUSE bug 1003800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004477">SUSE bug 1004477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005555">SUSE bug 1005555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005558">SUSE bug 1005558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005562">SUSE bug 1005562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005564">SUSE bug 1005564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005566">SUSE bug 1005566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005569">SUSE bug 1005569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005581">SUSE bug 1005581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005582">SUSE bug 1005582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006539">SUSE bug 1006539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008318">SUSE bug 1008318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990890">SUSE bug 990890</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3492/">CVE-2016-3492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5584/">CVE-2016-5584</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5624/">CVE-2016-5624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5626/">CVE-2016-5626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5629/">CVE-2016-5629</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6663/">CVE-2016-6663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7440/">CVE-2016-7440</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8283/">CVE-2016-8283</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516663" comment="libmysqlclient18-10.0.28-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516664" comment="libmysqlclient18-32bit-10.0.28-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516665" comment="libmysqlclient_r18-10.0.28-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516666" comment="libmysqlclient_r18-32bit-10.0.28-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516667" comment="mariadb-10.0.28-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516668" comment="mariadb-client-10.0.28-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516669" comment="mariadb-errormessages-10.0.28-17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77611" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1010685" ref_url="https://bugzilla.suse.com/1010685" source="BUGZILLA"/>
		<reference ref_id="988903" ref_url="https://bugzilla.suse.com/988903" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1248" ref_url="https://www.suse.com/security/cve/CVE-2016-1248/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00046.html" source="SUSE-SU"/>
		<description>

This update for vim fixes the following security issues:

- Fixed CVE-2016-1248 an arbitrary command execution vulnerability
  (bsc#1010685)

This update for vim fixes the following issues:

- Fix build with Python 3.5. (bsc#988903)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-29"/>
	<updated date="2016-11-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010685">SUSE bug 1010685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988903">SUSE bug 988903</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1248/">CVE-2016-1248</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516670" comment="gvim-7.4.326-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516671" comment="vim-7.4.326-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516672" comment="vim-data-7.4.326-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77612" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1001066" ref_url="https://bugzilla.suse.com/1001066" source="BUGZILLA"/>
		<reference ref_id="1007245" ref_url="https://bugzilla.suse.com/1007245" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6823" ref_url="https://www.suse.com/security/cve/CVE-2016-6823/" source="CVE"/>
		<reference ref_id="CVE-2016-8862" ref_url="https://www.suse.com/security/cve/CVE-2016-8862/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002430.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

- Memory allocation failure in AcquireMagickMemory (CVE-2016-8862) [bsc#1007245]
- update incomplete patch of CVE-2016-6823 [bsc#1001066]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-30"/>
	<updated date="2016-11-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1001066">SUSE bug 1001066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007245">SUSE bug 1007245</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6823/">CVE-2016-6823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8862/">CVE-2016-8862</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516673" comment="ImageMagick-6.8.8.1-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516674" comment="libMagick++-6_Q16-3-6.8.8.1-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516675" comment="libMagickCore-6_Q16-1-6.8.8.1-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516676" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516677" comment="libMagickWand-6_Q16-1-6.8.8.1-47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77613" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1005522" ref_url="https://bugzilla.suse.com/1005522" source="BUGZILLA"/>
		<reference ref_id="1005523" ref_url="https://bugzilla.suse.com/1005523" source="BUGZILLA"/>
		<reference ref_id="1005524" ref_url="https://bugzilla.suse.com/1005524" source="BUGZILLA"/>
		<reference ref_id="1005525" ref_url="https://bugzilla.suse.com/1005525" source="BUGZILLA"/>
		<reference ref_id="1005526" ref_url="https://bugzilla.suse.com/1005526" source="BUGZILLA"/>
		<reference ref_id="1005527" ref_url="https://bugzilla.suse.com/1005527" source="BUGZILLA"/>
		<reference ref_id="1005528" ref_url="https://bugzilla.suse.com/1005528" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5582" ref_url="https://www.suse.com/security/cve/CVE-2016-5582/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002431.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_0-openjdk fixes the following issues:

- Update to 2.6.8 - OpenJDK 7u121
  * Security fixes
    + S8151921: Improved page resolution
    + S8155968: Update command line options
    + S8155973, CVE-2016-5542: Tighten jar checks (bsc#1005522)
    + S8157176: Improved classfile parsing
    + S8157739, CVE-2016-5554: Classloader Consistency Checking
      (bsc#1005523)
    + S8157749: Improve handling of DNS error replies
    + S8157753: Audio replay enhancement
    + S8157759: LCMS Transform Sampling Enhancement
    + S8157764: Better handling of interpolation plugins
    + S8158302: Handle contextual glyph substitutions
    + S8158993, CVE-2016-5568: Service Menu services (bsc#1005525)
    + S8159495: Fix index offsets
    + S8159503: Amend Annotation Actions
    + S8159511: Stack map validation
    + S8159515: Improve indy validation
    + S8159519, CVE-2016-5573: Reformat JDWP messages (bsc#1005526)
    + S8160090: Better signature handling in pack200
    + S8160094: Improve pack200 layout
    + S8160098: Clean up color profiles
    + S8160591, CVE-2016-5582: Improve internal array handling
      (bsc#1005527)
    + S8160838, CVE-2016-5597: Better HTTP service (bsc#1005528)
    + PR3207, RH1367357: lcms2: Out-of-bounds read in
      Type_MLU_Read()
    + CVE-2016-5556 (bsc#1005524)
  * Import of OpenJDK 7 u121 build 0
    + S6624200: Regression test fails:
      test/closed/javax/swing/JMenuItem/4654927/bug4654927.java
    + S6882559: new JEditorPane('text/plain','') fails for null
      context class loader
    + S7090158: Networking Libraries don't build with javac -Werror
    + S7125055: ContentHandler.getContent API changed in error
    + S7145960: sun/security/mscapi/ShortRSAKey1024.sh failing on
      windows
    + S7187051: ShortRSAKeynnn.sh tests should do cleanup before
      start test
    + S8000626: Implement dead key detection for KeyEvent on Linux
    + S8003890: corelibs test scripts should pass TESTVMOPTS
    + S8005629: javac warnings compiling
      java.awt.EventDispatchThread and sun.awt.X11.XIconWindow
    + S8010297: Missing isLoggable() checks in logging code
    + S8010782: clean up source files containing carriage return
      characters
    + S8014431: cleanup warnings indicated by the -Wunused-value
      compiler option on linux
    + S8015265: revise the fix for 8007037
    + S8016747: Replace deprecated PlatformLogger isLoggable(int)
      with isLoggable(Level)
    + S8020708: NLS mnemonics missing in SwingSet2/JInternalFrame
      demo
    + S8024756: method grouping tabs are not selectable
    + S8026741: jdk8 l10n resource file translation update 5
    + S8048147: Privilege tests with JAAS Subject.doAs
    + S8048357: PKCS basic tests
    + S8049171: Additional tests for jarsigner's warnings
    + S8059177: jdk8u40 l10n resource file translation update 1
    + S8075584: test for 8067364 depends on hardwired text advance
    + S8076486: [TESTBUG]
      javax/security/auth/Subject/doAs/NestedActions.java fails if
      extra VM options are given
    + S8077953: [TEST_BUG]
      com/sun/management/OperatingSystemMXBean/TestTotalSwap.java
      Compilation failed after JDK-8077387
    + S8080628: No mnemonics on Open and Save buttons in
      JFileChooser
    + S8083601: jdk8u60 l10n resource file translation update 2
    + S8140530: Creating a VolatileImage with size 0,0 results in
      no longer working g2d.drawString
    + S8142926: OutputAnalyzer's shouldXXX() calls return this
    + S8143134: L10n resource file translation update
    + S8147077: IllegalArgumentException thrown by
      api/java_awt/Component/FlipBufferStrategy/indexTGF_General
    + S8148127: IllegalArgumentException thrown by JCK test
      api/java_awt/Component/FlipBufferStrategy/indexTGF_General in
      opengl pipeline
    + S8150611: Security problem on sun.misc.resources.Messages*
    + S8157653: [Parfait] Uninitialised variable in awt_Font.cpp
    + S8158734: JEditorPane.createEditorKitForContentType throws
      NPE after 6882559
    + S8159684: (tz) Support tzdata2016f
    + S8160934: isnan() is not available on older MSVC compilers
    + S8162411: Service Menu services 2
    + S8162419: closed/com/oracle/jfr/runtime/TestVMInfoEvent.sh
      failing after JDK-8155968
    + S8162511: 8u111 L10n resource file updates
    + S8162792: Remove constraint DSA keySize &lt; 1024 from
      jdk.jar.disabledAlgorithms in jdk8
    + S8164452: 8u111 L10n resource file update - msgdrop 20
    + S8165816: jarsigner -verify shows jar unsigned if it was
      signed with a weak algorithm
    + S8166381: Back out changes to the java.security file to not
      disable MD5
  * Backports
    + S6604109, PR3162: 
      javax.print.PrintServiceLookup.lookupPrintServices fails
      SOMETIMES for Cups
    + S6907252, PR3162: ZipFileInputStream Not Thread-Safe
    + S8024046, PR3162: Test sun/security/krb5/runNameEquals.sh
      failed on 7u45 Embedded linux-ppc*
    + S8028479, PR3162: runNameEquals still cannot precisely detect
      if a usable native krb5 is available
    + S8034057, PR3162: Files.getFileStore and Files.isWritable do
      not work with SUBST'ed drives (win)
    + S8038491, PR3162: Improve synchronization in ZipFile.read()
    + S8038502, PR3162: Deflater.needsInput() should use
      synchronization
    + S8059411, PR3162: RowSetWarning does not correctly chain
      warnings
    + S8062198, PR3162: Add RowSetMetaDataImpl Tests and add column
      range validation to isdefinitlyWritable
    + S8066188, PR3162: BaseRowSet returns the wrong default value
      for escape processing
    + S8072466, PR3162: Deadlock when initializing MulticastSocket
      and DatagramSocket
    + S8075118, PR3162: JVM stuck in infinite loop during
      verification
    + S8076579, PR3162: Popping a stack frame after exception
      breakpoint sets last method param to exception
    + S8078495, PR3162: End time checking for native TGT is wrong
    + S8078668, PR3162: jar usage string mentions unsupported
      option '-n'
    + S8080115, PR3162: (fs) Crash in libgio when calling
      Files.probeContentType(path) from parallel threads
    + S8081794, PR3162: ParsePosition getErrorIndex returns 0 for
      TimeZone parsing problem
    + S8129957, PR3162: Deadlock in JNDI LDAP implementation when
      closing the LDAP context
    + S8130136, PR3162: Swing window sometimes fails to repaint
      partially when it becomes exposed
    + S8130274, PR3162: java/nio/file/FileStore/Basic.java fails
      when two successive stores in an iteration are determined to
      be equal
    + S8132551, PR3162: Initialize local variables before returning
      them in p11_convert.c
    + S8133207, PR3162: [TEST_BUG] ParallelProbes.java test fails
      after changes for JDK-8080115
    + S8133666, PR3162: OperatingSystemMXBean reports abnormally
      high machine CPU consumption on Linux
    + S8135002, PR3162: Fix or remove broken links in
      objectMonitor.cpp comments
    + S8137121, PR3162: (fc) Infinite loop FileChannel.truncate
    + S8137230, PR3162: TEST_BUG:
      java/nio/channels/FileChannel/LoopingTruncate.java timed out
    + S8139373, PR3162: [TEST_BUG]
      java/net/MulticastSocket/MultiDead.java failed with timeout
    + S8140249, PR3162: JVM Crashing During startUp If Flight
      Recording is enabled
    + S8141491, PR3160, G592292: Unaligned memory access in Bits.c
    + S8144483, PR3162: One long Safepoint pause directly after
      each GC log rotation
    + S8149611, PR3160, G592292: Add tests for
      Unsafe.copySwapMemory
  * Bug fixes
    + S8078628, PR3151: Zero build fails with pre-compiled headers
      disabled
    + PR3128: pax-mark-vm script calls 'exit -1' which is invalid
      in dash
    + PR3131: PaX marking fails on filesystems which don't support
      extended attributes
    + PR3135: Makefile.am rule
      stamps/add/tzdata-support-debug.stamp has a typo in
      add-tzdata dependency
    + PR3141: Pass $(CC) and $(CXX) to OpenJDK build
    + PR3166: invalid zip timestamp handling leads to error
      building bootstrap-javac
    + PR3202: Update infinality configure test
    + PR3212: Disable ARM32 JIT by default
  * CACAO
    + PR3136: CACAO is broken due to 2 new native methods in
      sun.misc.Unsafe (from S8158260)
* JamVM
    + PR3134: JamVM is broken due to 2 new native methods in
      sun.misc.Unsafe (from S8158260)
* AArch64 port
    + S8167200, PR3204: AArch64: Broken stack pointer adjustment
      in interpreter
    + S8168888: Port 8160591: Improve internal array handling to
      AArch64.
    + PR3211: AArch64 build fails with pre-compiled headers
      disabled
- Changed patch:
  * java-1_7_0-openjdk-gcc6.patch
    + Rediff to changed context

- Disable arm32 JIT, since its build broken
  (http://icedtea.classpath.org/bugzilla/show_bug.cgi?id=2942)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-30"/>
	<updated date="2016-11-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005522">SUSE bug 1005522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005523">SUSE bug 1005523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005524">SUSE bug 1005524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005525">SUSE bug 1005525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005526">SUSE bug 1005526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005527">SUSE bug 1005527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005528">SUSE bug 1005528</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5582/">CVE-2016-5582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516678" comment="java-1_7_0-openjdk-1.7.0.121-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516679" comment="java-1_7_0-openjdk-headless-1.7.0.121-36.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77614" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1008029" ref_url="https://bugzilla.suse.com/1008029" source="BUGZILLA"/>
		<reference ref_id="986247" ref_url="https://bugzilla.suse.com/986247" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5773" ref_url="https://www.suse.com/security/cve/CVE-2016-5773/" source="CVE"/>
		<reference ref_id="CVE-2016-9137" ref_url="https://www.suse.com/security/cve/CVE-2016-9137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002438.html" source="SUSE-SU"/>
		<description>

This update for php5 fixes the following issues:

- CVE-2016-9137: Use After Free in unserialize() (bsc#1008029)
- CVE-2016-5773: ZipArchive class Use After Free Vulnerability in PHP's GC (bsc#986247)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-02"/>
	<updated date="2016-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1008029">SUSE bug 1008029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986247">SUSE bug 986247</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5773/">CVE-2016-5773</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9137/">CVE-2016-9137</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516680" comment="libc-client2007e_suse-2007e_suse-22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77615" version="1" class="patch">
	<metadata>
		<title>Security update for pcre (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="906574" ref_url="https://bugzilla.suse.com/906574" source="BUGZILLA"/>
		<reference ref_id="924960" ref_url="https://bugzilla.suse.com/924960" source="BUGZILLA"/>
		<reference ref_id="933288" ref_url="https://bugzilla.suse.com/933288" source="BUGZILLA"/>
		<reference ref_id="933878" ref_url="https://bugzilla.suse.com/933878" source="BUGZILLA"/>
		<reference ref_id="936227" ref_url="https://bugzilla.suse.com/936227" source="BUGZILLA"/>
		<reference ref_id="942865" ref_url="https://bugzilla.suse.com/942865" source="BUGZILLA"/>
		<reference ref_id="957566" ref_url="https://bugzilla.suse.com/957566" source="BUGZILLA"/>
		<reference ref_id="957567" ref_url="https://bugzilla.suse.com/957567" source="BUGZILLA"/>
		<reference ref_id="957598" ref_url="https://bugzilla.suse.com/957598" source="BUGZILLA"/>
		<reference ref_id="957600" ref_url="https://bugzilla.suse.com/957600" source="BUGZILLA"/>
		<reference ref_id="960837" ref_url="https://bugzilla.suse.com/960837" source="BUGZILLA"/>
		<reference ref_id="971741" ref_url="https://bugzilla.suse.com/971741" source="BUGZILLA"/>
		<reference ref_id="972127" ref_url="https://bugzilla.suse.com/972127" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964/" source="CVE"/>
		<reference ref_id="CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325/" source="CVE"/>
		<reference ref_id="CVE-2015-2327" ref_url="https://www.suse.com/security/cve/CVE-2015-2327/" source="CVE"/>
		<reference ref_id="CVE-2015-2328" ref_url="https://www.suse.com/security/cve/CVE-2015-2328/" source="CVE"/>
		<reference ref_id="CVE-2015-3210" ref_url="https://www.suse.com/security/cve/CVE-2015-3210/" source="CVE"/>
		<reference ref_id="CVE-2015-3217" ref_url="https://www.suse.com/security/cve/CVE-2015-3217/" source="CVE"/>
		<reference ref_id="CVE-2015-5073" ref_url="https://www.suse.com/security/cve/CVE-2015-5073/" source="CVE"/>
		<reference ref_id="CVE-2015-8380" ref_url="https://www.suse.com/security/cve/CVE-2015-8380/" source="CVE"/>
		<reference ref_id="CVE-2015-8381" ref_url="https://www.suse.com/security/cve/CVE-2015-8381/" source="CVE"/>
		<reference ref_id="CVE-2015-8382" ref_url="https://www.suse.com/security/cve/CVE-2015-8382/" source="CVE"/>
		<reference ref_id="CVE-2015-8383" ref_url="https://www.suse.com/security/cve/CVE-2015-8383/" source="CVE"/>
		<reference ref_id="CVE-2015-8384" ref_url="https://www.suse.com/security/cve/CVE-2015-8384/" source="CVE"/>
		<reference ref_id="CVE-2015-8385" ref_url="https://www.suse.com/security/cve/CVE-2015-8385/" source="CVE"/>
		<reference ref_id="CVE-2015-8386" ref_url="https://www.suse.com/security/cve/CVE-2015-8386/" source="CVE"/>
		<reference ref_id="CVE-2015-8387" ref_url="https://www.suse.com/security/cve/CVE-2015-8387/" source="CVE"/>
		<reference ref_id="CVE-2015-8388" ref_url="https://www.suse.com/security/cve/CVE-2015-8388/" source="CVE"/>
		<reference ref_id="CVE-2015-8389" ref_url="https://www.suse.com/security/cve/CVE-2015-8389/" source="CVE"/>
		<reference ref_id="CVE-2015-8390" ref_url="https://www.suse.com/security/cve/CVE-2015-8390/" source="CVE"/>
		<reference ref_id="CVE-2015-8391" ref_url="https://www.suse.com/security/cve/CVE-2015-8391/" source="CVE"/>
		<reference ref_id="CVE-2015-8392" ref_url="https://www.suse.com/security/cve/CVE-2015-8392/" source="CVE"/>
		<reference ref_id="CVE-2015-8393" ref_url="https://www.suse.com/security/cve/CVE-2015-8393/" source="CVE"/>
		<reference ref_id="CVE-2015-8394" ref_url="https://www.suse.com/security/cve/CVE-2015-8394/" source="CVE"/>
		<reference ref_id="CVE-2015-8395" ref_url="https://www.suse.com/security/cve/CVE-2015-8395/" source="CVE"/>
		<reference ref_id="CVE-2016-1283" ref_url="https://www.suse.com/security/cve/CVE-2016-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-3191" ref_url="https://www.suse.com/security/cve/CVE-2016-3191/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<description>

This update for pcre to version 8.39 (bsc#972127) fixes several issues.

If you use pcre extensively please be aware that this is an update to a new version. Please
make sure that your software works with the updated version.

This version fixes a number of vulnerabilities that affect pcre
and applications using the libary when accepting untrusted input
as regular expressions or as part thereof. Remote attackers could
have caused the application to crash, disclose information or
potentially execute arbitrary code. These security issues were fixed:

- CVE-2014-8964: Heap-based buffer overflow in PCRE allowed remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats (bsc#906574).
- CVE-2015-2325: Heap buffer overflow in compile_branch() (bsc#924960).
- CVE-2015-3210: Heap buffer overflow in pcre_compile2() / compile_regex() (bsc#933288)
- CVE-2015-3217: PCRE Library Call Stack Overflow Vulnerability in match() (bsc#933878).
- CVE-2015-5073: Library Heap Overflow Vulnerability in find_fixedlength() (bsc#936227).
- bsc#942865: heap overflow in compile_regex()
- CVE-2015-8380: The pcre_exec function in pcre_exec.c mishandled a // pattern with a \01 string, which allowed remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror (bsc#957566).
- CVE-2015-2327: PCRE mishandled certain patterns with internal recursive back references, which allowed remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror (bsc#957567).
- bsc#957598: Various security issues 
- CVE-2015-8381: Heap Overflow in compile_regex() (bsc#957598).
- CVE-2015-8382: Regular Expression Uninitialized Pointer Information Disclosure Vulnerability (ZDI-CAN-2547)(bsc#957598).
- CVE-2015-8383: Buffer overflow caused by repeated conditional group(bsc#957598).
- CVE-2015-8384: Buffer overflow caused by recursive back reference by name within certain group(bsc#957598).
- CVE-2015-8385: Buffer overflow caused by forward reference by name to certain group(bsc#957598).
- CVE-2015-8386: Buffer overflow caused by lookbehind assertion(bsc#957598).
- CVE-2015-8387: Integer overflow in subroutine calls(bsc#957598).
- CVE-2015-8388: Buffer overflow caused by certain patterns with an unmatched closing parenthesis(bsc#957598).
- CVE-2015-8389: Infinite recursion in JIT compiler when processing certain patterns(bsc#957598).
- CVE-2015-8390: Reading from uninitialized memory when processing certain patterns(bsc#957598).
- CVE-2015-8391: Some pathological patterns causes pcre_compile() to run for a very long time(bsc#957598).
- CVE-2015-8392: Buffer overflow caused by certain patterns with duplicated named groups(bsc#957598).
- CVE-2015-8393: Information leak when running pcgrep -q on crafted binary(bsc#957598).
- CVE-2015-8394: Integer overflow caused by missing check for certain conditions(bsc#957598).
- CVE-2015-8395: Buffer overflow caused by certain references(bsc#957598).
- CVE-2015-2328: PCRE mishandled the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allowed remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression (bsc#957600).
- CVE-2016-1283: The pcre_compile2 function in pcre_compile.c in PCRE mishandled certain patterns with named subgroups, which allowed remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression (bsc#960837).
- CVE-2016-3191: The compile_branch function in pcre_compile.c in pcre2_compile.c mishandled patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allowed remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression (bsc#971741).

These non-security issues were fixed:
- JIT compiler improvements
- performance improvements
- The Unicode data tables have been updated to Unicode 7.0.0.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-02"/>
	<updated date="2016-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/906574">SUSE bug 906574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924960">SUSE bug 924960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933288">SUSE bug 933288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933878">SUSE bug 933878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936227">SUSE bug 936227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942865">SUSE bug 942865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957566">SUSE bug 957566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957567">SUSE bug 957567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957600">SUSE bug 957600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960837">SUSE bug 960837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971741">SUSE bug 971741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972127">SUSE bug 972127</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2327/">CVE-2015-2327</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2328/">CVE-2015-2328</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3210/">CVE-2015-3210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3217/">CVE-2015-3217</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5073/">CVE-2015-5073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8380/">CVE-2015-8380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8381/">CVE-2015-8381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8382/">CVE-2015-8382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8383/">CVE-2015-8383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8384/">CVE-2015-8384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8385/">CVE-2015-8385</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8386/">CVE-2015-8386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8387/">CVE-2015-8387</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8388/">CVE-2015-8388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8389/">CVE-2015-8389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8390/">CVE-2015-8390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8391/">CVE-2015-8391</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8392/">CVE-2015-8392</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8393/">CVE-2015-8393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8394/">CVE-2015-8394</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8395/">CVE-2015-8395</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1283/">CVE-2016-1283</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3191/">CVE-2016-3191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516681" comment="libpcre1-8.39-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516682" comment="libpcre1-32bit-8.39-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516683" comment="libpcre16-0-8.39-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516684" comment="libpcrecpp0-8.39-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516685" comment="libpcrecpp0-32bit-8.39-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77616" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1000345" ref_url="https://bugzilla.suse.com/1000345" source="BUGZILLA"/>
		<reference ref_id="1001151" ref_url="https://bugzilla.suse.com/1001151" source="BUGZILLA"/>
		<reference ref_id="1002116" ref_url="https://bugzilla.suse.com/1002116" source="BUGZILLA"/>
		<reference ref_id="1002550" ref_url="https://bugzilla.suse.com/1002550" source="BUGZILLA"/>
		<reference ref_id="1002557" ref_url="https://bugzilla.suse.com/1002557" source="BUGZILLA"/>
		<reference ref_id="1003878" ref_url="https://bugzilla.suse.com/1003878" source="BUGZILLA"/>
		<reference ref_id="1003893" ref_url="https://bugzilla.suse.com/1003893" source="BUGZILLA"/>
		<reference ref_id="1003894" ref_url="https://bugzilla.suse.com/1003894" source="BUGZILLA"/>
		<reference ref_id="1004702" ref_url="https://bugzilla.suse.com/1004702" source="BUGZILLA"/>
		<reference ref_id="1004707" ref_url="https://bugzilla.suse.com/1004707" source="BUGZILLA"/>
		<reference ref_id="1006536" ref_url="https://bugzilla.suse.com/1006536" source="BUGZILLA"/>
		<reference ref_id="1006538" ref_url="https://bugzilla.suse.com/1006538" source="BUGZILLA"/>
		<reference ref_id="1007391" ref_url="https://bugzilla.suse.com/1007391" source="BUGZILLA"/>
		<reference ref_id="1007450" ref_url="https://bugzilla.suse.com/1007450" source="BUGZILLA"/>
		<reference ref_id="1007454" ref_url="https://bugzilla.suse.com/1007454" source="BUGZILLA"/>
		<reference ref_id="1007493" ref_url="https://bugzilla.suse.com/1007493" source="BUGZILLA"/>
		<reference ref_id="1007494" ref_url="https://bugzilla.suse.com/1007494" source="BUGZILLA"/>
		<reference ref_id="1007495" ref_url="https://bugzilla.suse.com/1007495" source="BUGZILLA"/>
		<reference ref_id="996524" ref_url="https://bugzilla.suse.com/996524" source="BUGZILLA"/>
		<reference ref_id="998516" ref_url="https://bugzilla.suse.com/998516" source="BUGZILLA"/>
		<reference ref_id="999661" ref_url="https://bugzilla.suse.com/999661" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7161" ref_url="https://www.suse.com/security/cve/CVE-2016-7161/" source="CVE"/>
		<reference ref_id="CVE-2016-7170" ref_url="https://www.suse.com/security/cve/CVE-2016-7170/" source="CVE"/>
		<reference ref_id="CVE-2016-7421" ref_url="https://www.suse.com/security/cve/CVE-2016-7421/" source="CVE"/>
		<reference ref_id="CVE-2016-7466" ref_url="https://www.suse.com/security/cve/CVE-2016-7466/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-8576" ref_url="https://www.suse.com/security/cve/CVE-2016-8576/" source="CVE"/>
		<reference ref_id="CVE-2016-8577" ref_url="https://www.suse.com/security/cve/CVE-2016-8577/" source="CVE"/>
		<reference ref_id="CVE-2016-8578" ref_url="https://www.suse.com/security/cve/CVE-2016-8578/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8909" ref_url="https://www.suse.com/security/cve/CVE-2016-8909/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9101" ref_url="https://www.suse.com/security/cve/CVE-2016-9101/" source="CVE"/>
		<reference ref_id="CVE-2016-9102" ref_url="https://www.suse.com/security/cve/CVE-2016-9102/" source="CVE"/>
		<reference ref_id="CVE-2016-9103" ref_url="https://www.suse.com/security/cve/CVE-2016-9103/" source="CVE"/>
		<reference ref_id="CVE-2016-9104" ref_url="https://www.suse.com/security/cve/CVE-2016-9104/" source="CVE"/>
		<reference ref_id="CVE-2016-9105" ref_url="https://www.suse.com/security/cve/CVE-2016-9105/" source="CVE"/>
		<reference ref_id="CVE-2016-9106" ref_url="https://www.suse.com/security/cve/CVE-2016-9106/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<description>

This update for qemu fixes the following issues:

- Patch queue updated from https://gitlab.suse.de/virtualization/qemu.git SLE12-SP1
- Change package post script udevadm trigger calls to be device
  specific (bsc#1002116)
- Address various security/stability issues
 * Fix OOB access in xlnx.xpx-ethernetlite emulation (CVE-2016-7161 bsc#1001151)
 * Fix OOB access in VMware SVGA emulation (CVE-2016-7170 bsc#998516)
 * Fix DOS in USB xHCI emulation (CVE-2016-7466 bsc#1000345)
 * Fix DOS in Vmware pv scsi interface (CVE-2016-7421 bsc#999661)
 * Fix DOS in ColdFire Fast Ethernet Controller emulation
   (CVE-2016-7908 bsc#1002550)
 * Fix DOS in USB xHCI emulation (CVE-2016-8576 bsc#1003878)
 * Fix DOS in virtio-9pfs (CVE-2016-8578 bsc#1003894)
 * Fix DOS in virtio-9pfs (CVE-2016-9105 bsc#1007494)
 * Fix DOS in virtio-9pfs (CVE-2016-8577 bsc#1003893)
 * Plug data leak in virtio-9pfs interface (CVE-2016-9103 bsc#1007454)
 * Fix DOS in virtio-9pfs interface (CVE-2016-9102 bsc#1007450)
 * Fix DOS in virtio-9pfs (CVE-2016-9106 bsc#1007495)
 * Fix DOS in 16550A UART emulation (CVE-2016-8669 bsc#1004707)
 * Fix DOS in PC-Net II emulation (CVE-2016-7909 bsc#1002557)
 * Fix DOS in PRO100 emulation (CVE-2016-9101 bsc#1007391)
 * Fix DOS in RTL8139 emulation (CVE-2016-8910 bsc#1006538)
 * Fix DOS in Intel HDA controller emulation (CVE-2016-8909 bsc#1006536)
 * Fix DOS in virtio-9pfs (CVE-2016-9104 bsc#1007493)
 * Fix DOS in JAZZ RC4030 emulation (CVE-2016-8667 bsc#1004702)

- Fix case of disk corruption with migration due to improper internal
  state tracking (bsc#996524)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-02"/>
	<updated date="2016-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000345">SUSE bug 1000345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001151">SUSE bug 1001151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002116">SUSE bug 1002116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002550">SUSE bug 1002550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002557">SUSE bug 1002557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003878">SUSE bug 1003878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003893">SUSE bug 1003893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003894">SUSE bug 1003894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004702">SUSE bug 1004702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004707">SUSE bug 1004707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006536">SUSE bug 1006536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006538">SUSE bug 1006538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007391">SUSE bug 1007391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007450">SUSE bug 1007450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007454">SUSE bug 1007454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007493">SUSE bug 1007493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007494">SUSE bug 1007494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007495">SUSE bug 1007495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996524">SUSE bug 996524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998516">SUSE bug 998516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999661">SUSE bug 999661</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7161/">CVE-2016-7161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7170/">CVE-2016-7170</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7421/">CVE-2016-7421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7466/">CVE-2016-7466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8576/">CVE-2016-8576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8577/">CVE-2016-8577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8578/">CVE-2016-8578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8909/">CVE-2016-8909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9101/">CVE-2016-9101</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9102/">CVE-2016-9102</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9103/">CVE-2016-9103</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9104/">CVE-2016-9104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9105/">CVE-2016-9105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9106/">CVE-2016-9106</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516686" comment="qemu-2.3.1-24.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516687" comment="qemu-block-curl-2.3.1-24.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516688" comment="qemu-ipxe-1.0.0-24.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516689" comment="qemu-kvm-2.3.1-24.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516690" comment="qemu-seabios-1.8.1-24.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516691" comment="qemu-sgabios-8-24.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516692" comment="qemu-tools-2.3.1-24.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516693" comment="qemu-vgabios-1.8.1-24.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516694" comment="qemu-x86-2.3.1-24.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77617" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1002991" ref_url="https://bugzilla.suse.com/1002991" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7942" ref_url="https://www.suse.com/security/cve/CVE-2016-7942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002441.html" source="SUSE-SU"/>
		<description>

libX11 was updated to fix a memory leak that was introduced with the
security fix for CVE-2016-7942.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-05"/>
	<updated date="2016-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002991">SUSE bug 1002991</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7942/">CVE-2016-7942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516695" comment="libX11-6-1.6.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516696" comment="libX11-6-32bit-1.6.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516697" comment="libX11-data-1.6.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516698" comment="libX11-xcb1-1.6.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516699" comment="libX11-xcb1-32bit-1.6.2-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77618" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1009026" ref_url="https://bugzilla.suse.com/1009026" source="BUGZILLA"/>
		<reference ref_id="1010395" ref_url="https://bugzilla.suse.com/1010395" source="BUGZILLA"/>
		<reference ref_id="1010401" ref_url="https://bugzilla.suse.com/1010401" source="BUGZILLA"/>
		<reference ref_id="1010402" ref_url="https://bugzilla.suse.com/1010402" source="BUGZILLA"/>
		<reference ref_id="1010404" ref_url="https://bugzilla.suse.com/1010404" source="BUGZILLA"/>
		<reference ref_id="1010410" ref_url="https://bugzilla.suse.com/1010410" source="BUGZILLA"/>
		<reference ref_id="1010422" ref_url="https://bugzilla.suse.com/1010422" source="BUGZILLA"/>
		<reference ref_id="1010427" ref_url="https://bugzilla.suse.com/1010427" source="BUGZILLA"/>
		<reference ref_id="1010517" ref_url="https://bugzilla.suse.com/1010517" source="BUGZILLA"/>
		<reference ref_id="992549" ref_url="https://bugzilla.suse.com/992549" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5285" ref_url="https://www.suse.com/security/cve/CVE-2016-5285/" source="CVE"/>
		<reference ref_id="CVE-2016-5290" ref_url="https://www.suse.com/security/cve/CVE-2016-5290/" source="CVE"/>
		<reference ref_id="CVE-2016-5291" ref_url="https://www.suse.com/security/cve/CVE-2016-5291/" source="CVE"/>
		<reference ref_id="CVE-2016-5296" ref_url="https://www.suse.com/security/cve/CVE-2016-5296/" source="CVE"/>
		<reference ref_id="CVE-2016-5297" ref_url="https://www.suse.com/security/cve/CVE-2016-5297/" source="CVE"/>
		<reference ref_id="CVE-2016-9064" ref_url="https://www.suse.com/security/cve/CVE-2016-9064/" source="CVE"/>
		<reference ref_id="CVE-2016-9066" ref_url="https://www.suse.com/security/cve/CVE-2016-9066/" source="CVE"/>
		<reference ref_id="CVE-2016-9074" ref_url="https://www.suse.com/security/cve/CVE-2016-9074/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00011.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox, mozilla-nss fixes security issues and bugs.

The following vulnerabilities were fixed in Firefox ESR 45.5 (bsc#1009026):

- CVE-2016-5297: Incorrect argument length checking in Javascript (bsc#1010401)
- CVE-2016-9066: Integer overflow leading to a buffer overflow in nsScriptLoadHandler (bsc#1010404)
- CVE-2016-5296: Heap-buffer-overflow WRITE in rasterize_edges_1 (bsc#1010395)
- CVE-2016-9064: Addons update must verify IDs match between current and new versions (bsc#1010402)
- CVE-2016-5290: Memory safety bugs fixed in Firefox 50 and Firefox ESR 45.5 (bsc#1010427)
- CVE-2016-5291: Same-origin policy violation using local HTML file and saved shortcut file (bsc#1010410)

The following vulnerabilities were fixed in mozilla-nss 3.21.3:

- CVE-2016-9074: Insufficient timing side-channel resistance in divSpoiler (bsc#1010422)
- CVE-2016-5285: Missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime causes server crash (bsc#1010517)  

The following bugs were fixed:

- Firefox would fail to go into fullscreen mode with some window managers (bsc#992549)

The Mozilla Firefox changelog was amended to document patched dropped in a previous update.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-05"/>
	<updated date="2016-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010395">SUSE bug 1010395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010401">SUSE bug 1010401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010402">SUSE bug 1010402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010404">SUSE bug 1010404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010410">SUSE bug 1010410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010422">SUSE bug 1010422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010427">SUSE bug 1010427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010517">SUSE bug 1010517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992549">SUSE bug 992549</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5285/">CVE-2016-5285</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5290/">CVE-2016-5290</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5291/">CVE-2016-5291</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5296/">CVE-2016-5296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5297/">CVE-2016-5297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9064/">CVE-2016-9064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9066/">CVE-2016-9066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9074/">CVE-2016-9074</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516700" comment="MozillaFirefox-45.5.0esr-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516701" comment="MozillaFirefox-translations-45.5.0esr-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516702" comment="libfreebl3-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516703" comment="libfreebl3-32bit-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516704" comment="libsoftokn3-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516705" comment="libsoftokn3-32bit-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516706" comment="mozilla-nss-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516707" comment="mozilla-nss-32bit-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516708" comment="mozilla-nss-certs-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516709" comment="mozilla-nss-certs-32bit-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516710" comment="mozilla-nss-sysinit-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516711" comment="mozilla-nss-sysinit-32bit-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516712" comment="mozilla-nss-tools-3.21.3-50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77619" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1008831" ref_url="https://bugzilla.suse.com/1008831" source="BUGZILLA"/>
		<reference ref_id="1011685" ref_url="https://bugzilla.suse.com/1011685" source="BUGZILLA"/>
		<reference ref_id="1012754" ref_url="https://bugzilla.suse.com/1012754" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8632" ref_url="https://www.suse.com/security/cve/CVE-2016-8632/" source="CVE"/>
		<reference ref_id="CVE-2016-8655" ref_url="https://www.suse.com/security/cve/CVE-2016-8655/" source="CVE"/>
		<reference ref_id="CVE-2016-9555" ref_url="https://www.suse.com/security/cve/CVE-2016-9555/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00019.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP1 kernel was updated to receive various critical security fixes.

The following security bugs were fixed:

- CVE-2016-8655: A race condition in the af_packet packet_set_ring
  function could be used by local attackers to crash the kernel or gain
  privileges (bsc#1012754).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in
  the Linux kernel did not validate the relationship between the minimum
  fragment length and the maximum packet size, which allowed local users to
  gain privileges or cause a denial of service (heap-based buffer overflow)
  by leveraging the CAP_NET_ADMIN capability (bnc#1008831).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in
  the Linux kernel lacks chunk-length checking for the first chunk, which
  allowed remote attackers to cause a denial of service (out-of-bounds slab
  access) or possibly have unspecified other impact via crafted SCTP data
  (bnc#1011685).

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-07"/>
	<updated date="2016-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1008831">SUSE bug 1008831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011685">SUSE bug 1011685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012754">SUSE bug 1012754</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8632/">CVE-2016-8632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8655/">CVE-2016-8655</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9555/">CVE-2016-9555</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516713" comment="kernel-default-3.12.67-60.64.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516714" comment="kernel-default-devel-3.12.67-60.64.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516715" comment="kernel-default-extra-3.12.67-60.64.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516716" comment="kernel-devel-3.12.67-60.64.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516717" comment="kernel-macros-3.12.67-60.64.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516718" comment="kernel-source-3.12.67-60.64.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516719" comment="kernel-syms-3.12.67-60.64.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516720" comment="kernel-xen-3.12.67-60.64.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516721" comment="kernel-xen-devel-3.12.67-60.64.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77620" version="1" class="patch">
	<metadata>
		<title>Security update for libXi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1002998" ref_url="https://bugzilla.suse.com/1002998" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7945" ref_url="https://www.suse.com/security/cve/CVE-2016-7945/" source="CVE"/>
		<reference ref_id="CVE-2016-7946" ref_url="https://www.suse.com/security/cve/CVE-2016-7946/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002450.html" source="SUSE-SU"/>
		<description>

libXi was updated to fix two security issues.

These security issues were fixed:
- CVE-2016-7945: Integer overflows in libXI can cause out of boundary memory access or endless loops (Denial of Service) (bsc#1002998).
- CVE-2016-7946: Insufficient validation of data in libXI can cause out of boundary memory access or endless loops (Denial of Service) (bsc#1002998).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-07"/>
	<updated date="2016-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002998">SUSE bug 1002998</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7945/">CVE-2016-7945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7946/">CVE-2016-7946</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516722" comment="libXi6-1.7.4-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516723" comment="libXi6-32bit-1.7.4-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77621" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1012964" ref_url="https://bugzilla.suse.com/1012964" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9079" ref_url="https://www.suse.com/security/cve/CVE-2016-9079/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00024.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox fixes security issues.

The following vulnerabilities were fixed in Firefox ESR 45.5.1 (bbsc#1012964):

- CVE-2016-9079: Use-after-free in SVG Animation could be used for code execution (MFSA 2016-92 bsc#1012964)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-07"/>
	<updated date="2016-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012964">SUSE bug 1012964</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9079/">CVE-2016-9079</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516724" comment="MozillaFirefox-45.5.1esr-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516725" comment="MozillaFirefox-translations-45.5.1esr-93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77622" version="1" class="patch">
	<metadata>
		<title>Security update for w3m (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1011283" ref_url="https://bugzilla.suse.com/1011283" source="BUGZILLA"/>
		<reference ref_id="1011284" ref_url="https://bugzilla.suse.com/1011284" source="BUGZILLA"/>
		<reference ref_id="1011285" ref_url="https://bugzilla.suse.com/1011285" source="BUGZILLA"/>
		<reference ref_id="1011286" ref_url="https://bugzilla.suse.com/1011286" source="BUGZILLA"/>
		<reference ref_id="1011287" ref_url="https://bugzilla.suse.com/1011287" source="BUGZILLA"/>
		<reference ref_id="1011288" ref_url="https://bugzilla.suse.com/1011288" source="BUGZILLA"/>
		<reference ref_id="1011289" ref_url="https://bugzilla.suse.com/1011289" source="BUGZILLA"/>
		<reference ref_id="1011290" ref_url="https://bugzilla.suse.com/1011290" source="BUGZILLA"/>
		<reference ref_id="1011291" ref_url="https://bugzilla.suse.com/1011291" source="BUGZILLA"/>
		<reference ref_id="1011292" ref_url="https://bugzilla.suse.com/1011292" source="BUGZILLA"/>
		<reference ref_id="1011293" ref_url="https://bugzilla.suse.com/1011293" source="BUGZILLA"/>
		<reference ref_id="1012021" ref_url="https://bugzilla.suse.com/1012021" source="BUGZILLA"/>
		<reference ref_id="1012022" ref_url="https://bugzilla.suse.com/1012022" source="BUGZILLA"/>
		<reference ref_id="1012023" ref_url="https://bugzilla.suse.com/1012023" source="BUGZILLA"/>
		<reference ref_id="1012024" ref_url="https://bugzilla.suse.com/1012024" source="BUGZILLA"/>
		<reference ref_id="1012025" ref_url="https://bugzilla.suse.com/1012025" source="BUGZILLA"/>
		<reference ref_id="1012026" ref_url="https://bugzilla.suse.com/1012026" source="BUGZILLA"/>
		<reference ref_id="1012027" ref_url="https://bugzilla.suse.com/1012027" source="BUGZILLA"/>
		<reference ref_id="1012028" ref_url="https://bugzilla.suse.com/1012028" source="BUGZILLA"/>
		<reference ref_id="1012029" ref_url="https://bugzilla.suse.com/1012029" source="BUGZILLA"/>
		<reference ref_id="1012030" ref_url="https://bugzilla.suse.com/1012030" source="BUGZILLA"/>
		<reference ref_id="1012031" ref_url="https://bugzilla.suse.com/1012031" source="BUGZILLA"/>
		<reference ref_id="1012032" ref_url="https://bugzilla.suse.com/1012032" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9434" ref_url="https://www.suse.com/security/cve/CVE-2016-9434/" source="CVE"/>
		<reference ref_id="CVE-2016-9435" ref_url="https://www.suse.com/security/cve/CVE-2016-9435/" source="CVE"/>
		<reference ref_id="CVE-2016-9436" ref_url="https://www.suse.com/security/cve/CVE-2016-9436/" source="CVE"/>
		<reference ref_id="CVE-2016-9437" ref_url="https://www.suse.com/security/cve/CVE-2016-9437/" source="CVE"/>
		<reference ref_id="CVE-2016-9438" ref_url="https://www.suse.com/security/cve/CVE-2016-9438/" source="CVE"/>
		<reference ref_id="CVE-2016-9439" ref_url="https://www.suse.com/security/cve/CVE-2016-9439/" source="CVE"/>
		<reference ref_id="CVE-2016-9440" ref_url="https://www.suse.com/security/cve/CVE-2016-9440/" source="CVE"/>
		<reference ref_id="CVE-2016-9441" ref_url="https://www.suse.com/security/cve/CVE-2016-9441/" source="CVE"/>
		<reference ref_id="CVE-2016-9442" ref_url="https://www.suse.com/security/cve/CVE-2016-9442/" source="CVE"/>
		<reference ref_id="CVE-2016-9443" ref_url="https://www.suse.com/security/cve/CVE-2016-9443/" source="CVE"/>
		<reference ref_id="CVE-2016-9621" ref_url="https://www.suse.com/security/cve/CVE-2016-9621/" source="CVE"/>
		<reference ref_id="CVE-2016-9622" ref_url="https://www.suse.com/security/cve/CVE-2016-9622/" source="CVE"/>
		<reference ref_id="CVE-2016-9623" ref_url="https://www.suse.com/security/cve/CVE-2016-9623/" source="CVE"/>
		<reference ref_id="CVE-2016-9624" ref_url="https://www.suse.com/security/cve/CVE-2016-9624/" source="CVE"/>
		<reference ref_id="CVE-2016-9625" ref_url="https://www.suse.com/security/cve/CVE-2016-9625/" source="CVE"/>
		<reference ref_id="CVE-2016-9626" ref_url="https://www.suse.com/security/cve/CVE-2016-9626/" source="CVE"/>
		<reference ref_id="CVE-2016-9627" ref_url="https://www.suse.com/security/cve/CVE-2016-9627/" source="CVE"/>
		<reference ref_id="CVE-2016-9628" ref_url="https://www.suse.com/security/cve/CVE-2016-9628/" source="CVE"/>
		<reference ref_id="CVE-2016-9629" ref_url="https://www.suse.com/security/cve/CVE-2016-9629/" source="CVE"/>
		<reference ref_id="CVE-2016-9630" ref_url="https://www.suse.com/security/cve/CVE-2016-9630/" source="CVE"/>
		<reference ref_id="CVE-2016-9631" ref_url="https://www.suse.com/security/cve/CVE-2016-9631/" source="CVE"/>
		<reference ref_id="CVE-2016-9632" ref_url="https://www.suse.com/security/cve/CVE-2016-9632/" source="CVE"/>
		<reference ref_id="CVE-2016-9633" ref_url="https://www.suse.com/security/cve/CVE-2016-9633/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<description>

This update for w3m fixes the following issues:

- update to debian git version (bsc#1011293)
  addressed security issues:
         CVE-2016-9622: w3m: null deref (bsc#1012021)
         CVE-2016-9623: w3m: null deref (bsc#1012022)
         CVE-2016-9624: w3m: near-null deref (bsc#1012023)
         CVE-2016-9625: w3m: stack overflow (bsc#1012024)
         CVE-2016-9626: w3m: stack overflow (bsc#1012025)
         CVE-2016-9627: w3m: heap overflow read + deref (bsc#1012026)
         CVE-2016-9628: w3m: null deref (bsc#1012027)
         CVE-2016-9629: w3m: null deref (bsc#1012028)
         CVE-2016-9630: w3m: global-buffer-overflow read (bsc#1012029)
         CVE-2016-9631: w3m: null deref (bsc#1012030)
         CVE-2016-9632: w3m: global-buffer-overflow read (bsc#1012031)
         CVE-2016-9633: w3m: OOM (bsc#1012032)
         CVE-2016-9434: w3m: null deref (bsc#1011283)
         CVE-2016-9435: w3m: use uninit value (bsc#1011284)
         CVE-2016-9436: w3m: use uninit value (bsc#1011285)
         CVE-2016-9437: w3m: write to rodata (bsc#1011286)
         CVE-2016-9438: w3m: null deref (bsc#1011287)
         CVE-2016-9439: w3m: stack overflow (bsc#1011288)
         CVE-2016-9440: w3m: near-null deref (bsc#1011289)
         CVE-2016-9441: w3m: near-null deref (bsc#1011290)
         CVE-2016-9442: w3m: potential heap buffer corruption (bsc#1011291)
         CVE-2016-9443: w3m: null deref (bsc#1011292)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-08"/>
	<updated date="2016-12-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011283">SUSE bug 1011283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011284">SUSE bug 1011284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011285">SUSE bug 1011285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011286">SUSE bug 1011286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011287">SUSE bug 1011287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011288">SUSE bug 1011288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011289">SUSE bug 1011289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011290">SUSE bug 1011290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011291">SUSE bug 1011291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011292">SUSE bug 1011292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012021">SUSE bug 1012021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012022">SUSE bug 1012022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012023">SUSE bug 1012023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012024">SUSE bug 1012024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012025">SUSE bug 1012025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012026">SUSE bug 1012026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012027">SUSE bug 1012027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012028">SUSE bug 1012028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012029">SUSE bug 1012029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012030">SUSE bug 1012030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012031">SUSE bug 1012031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012032">SUSE bug 1012032</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9434/">CVE-2016-9434</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9435/">CVE-2016-9435</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9436/">CVE-2016-9436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9437/">CVE-2016-9437</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9438/">CVE-2016-9438</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9439/">CVE-2016-9439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9440/">CVE-2016-9440</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9441/">CVE-2016-9441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9442/">CVE-2016-9442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9443/">CVE-2016-9443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9621/">CVE-2016-9621</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9622/">CVE-2016-9622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9623/">CVE-2016-9623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9624/">CVE-2016-9624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9625/">CVE-2016-9625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9626/">CVE-2016-9626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9627/">CVE-2016-9627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9628/">CVE-2016-9628</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9629/">CVE-2016-9629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9630/">CVE-2016-9630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9631/">CVE-2016-9631</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9632/">CVE-2016-9632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9633/">CVE-2016-9633</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516726" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77623" version="1" class="patch">
	<metadata>
		<title>Security update for gc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1011276" ref_url="https://bugzilla.suse.com/1011276" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9427" ref_url="https://www.suse.com/security/cve/CVE-2016-9427/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002457.html" source="SUSE-SU"/>
		<description>

This update for gc fixes the following issues:

- integer overflow in GC_MALLOC_ATOMIC() (CVE-2016-9427, bsc#1011276)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-08"/>
	<updated date="2016-12-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011276">SUSE bug 1011276</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9427/">CVE-2016-9427</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516727" comment="libgc1-7.2d-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77624" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1000106" ref_url="https://bugzilla.suse.com/1000106" source="BUGZILLA"/>
		<reference ref_id="1003030" ref_url="https://bugzilla.suse.com/1003030" source="BUGZILLA"/>
		<reference ref_id="1003032" ref_url="https://bugzilla.suse.com/1003032" source="BUGZILLA"/>
		<reference ref_id="1003870" ref_url="https://bugzilla.suse.com/1003870" source="BUGZILLA"/>
		<reference ref_id="1004016" ref_url="https://bugzilla.suse.com/1004016" source="BUGZILLA"/>
		<reference ref_id="1005004" ref_url="https://bugzilla.suse.com/1005004" source="BUGZILLA"/>
		<reference ref_id="1005005" ref_url="https://bugzilla.suse.com/1005005" source="BUGZILLA"/>
		<reference ref_id="1007157" ref_url="https://bugzilla.suse.com/1007157" source="BUGZILLA"/>
		<reference ref_id="1007160" ref_url="https://bugzilla.suse.com/1007160" source="BUGZILLA"/>
		<reference ref_id="1009100" ref_url="https://bugzilla.suse.com/1009100" source="BUGZILLA"/>
		<reference ref_id="1009103" ref_url="https://bugzilla.suse.com/1009103" source="BUGZILLA"/>
		<reference ref_id="1009104" ref_url="https://bugzilla.suse.com/1009104" source="BUGZILLA"/>
		<reference ref_id="1009107" ref_url="https://bugzilla.suse.com/1009107" source="BUGZILLA"/>
		<reference ref_id="1009108" ref_url="https://bugzilla.suse.com/1009108" source="BUGZILLA"/>
		<reference ref_id="1009109" ref_url="https://bugzilla.suse.com/1009109" source="BUGZILLA"/>
		<reference ref_id="1009111" ref_url="https://bugzilla.suse.com/1009111" source="BUGZILLA"/>
		<reference ref_id="1011652" ref_url="https://bugzilla.suse.com/1011652" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7777" ref_url="https://www.suse.com/security/cve/CVE-2016-7777/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-7995" ref_url="https://www.suse.com/security/cve/CVE-2016-7995/" source="CVE"/>
		<reference ref_id="CVE-2016-8576" ref_url="https://www.suse.com/security/cve/CVE-2016-8576/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8909" ref_url="https://www.suse.com/security/cve/CVE-2016-8909/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9377" ref_url="https://www.suse.com/security/cve/CVE-2016-9377/" source="CVE"/>
		<reference ref_id="CVE-2016-9378" ref_url="https://www.suse.com/security/cve/CVE-2016-9378/" source="CVE"/>
		<reference ref_id="CVE-2016-9379" ref_url="https://www.suse.com/security/cve/CVE-2016-9379/" source="CVE"/>
		<reference ref_id="CVE-2016-9380" ref_url="https://www.suse.com/security/cve/CVE-2016-9380/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9382" ref_url="https://www.suse.com/security/cve/CVE-2016-9382/" source="CVE"/>
		<reference ref_id="CVE-2016-9383" ref_url="https://www.suse.com/security/cve/CVE-2016-9383/" source="CVE"/>
		<reference ref_id="CVE-2016-9385" ref_url="https://www.suse.com/security/cve/CVE-2016-9385/" source="CVE"/>
		<reference ref_id="CVE-2016-9386" ref_url="https://www.suse.com/security/cve/CVE-2016-9386/" source="CVE"/>
		<reference ref_id="CVE-2016-9637" ref_url="https://www.suse.com/security/cve/CVE-2016-9637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<description>

This update for xen to version 4.5.5 fixes several issues.

These security issues were fixed:

- CVE-2016-9637: ioport array overflow allowing a malicious guest administrator can escalate their privilege to that of the host (bsc#1011652)
- CVE-2016-9386: x86 null segments were not always treated as unusable allowing an unprivileged guest user program to elevate its privilege to that of the guest operating system. Exploit of this vulnerability is easy on Intel and more complicated on AMD (bsc#1009100)
- CVE-2016-9382: x86 task switch to VM86 mode was mis-handled, allowing a unprivileged guest process to escalate its privilege to that of the guest operating system on AMD hardware. On Intel hardware a malicious unprivileged guest process can crash the guest (bsc#1009103)
- CVE-2016-9385: x86 segment base write emulation lacked canonical address checks, allowing a malicious guest administrator to crash the host (bsc#1009104)
- CVE-2016-9383: The x86 64-bit bit test instruction emulation was broken, allowing a guest to modify arbitrary memory leading to arbitray code execution (bsc#1009107)
- CVE-2016-9378: x86 software interrupt injection was mis-handled, allowing an unprivileged guest user to crash the guest (bsc#1009108)
- CVE-2016-9377: x86 software interrupt injection was mis-handled, allowing an unprivileged guest user to crash the guest (bsc#1009108)
- CVE-2016-9381: Improper processing of shared rings allowing guest administrators take over the qemu process, elevating their privilege to that of the qemu process (bsc#1009109)
- CVE-2016-9380: Delimiter injection vulnerabilities in pygrub allowed  guest administrators to obtain the contents of sensitive host files or delete the files (bsc#1009111)
- CVE-2016-9379: Delimiter injection vulnerabilities in pygrub allowed guest administrators to obtain the contents of sensitive host files or delete the files (bsc#1009111)
- CVE-2016-7777: Xen did not properly honor CR0.TS and CR0.EM, which allowed local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it (bsc#1000106)
- CVE-2016-8910: The rtl8139_cplus_transmit function in hw/net/rtl8139.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count (bsc#1007157)
- CVE-2016-8909: The intel_hda_xfer function in hw/audio/intel-hda.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position (bsc#1007160).
- CVE-2016-8667: The rc4030_write function in hw/dma/rc4030.c in allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value (bsc#1005004)
- CVE-2016-8669: The serial_update_parameters function in hw/char/serial.c allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base (bsc#1005005)
- CVE-2016-7995: A memory leak in ehci_process_itd allowed a privileged user inside guest to DoS the host (bsc#1003870).
- CVE-2016-8576: The xhci_ring_fetch function in hw/usb/hcd-xhci.c allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit the number of link Transfer Request Blocks (TRB) to process (bsc#1004016).
- CVE-2016-7908: The mcf_fec_do_tx function in hw/net/mcf_fec.c did not properly limit the buffer descriptor count when transmitting packets, which allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags (bsc#1003030)
- CVE-2016-7909: The pcnet_rdra_addr function in hw/net/pcnet.c allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0 (bsc#1003032)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-12"/>
	<updated date="2016-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000106">SUSE bug 1000106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003030">SUSE bug 1003030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003032">SUSE bug 1003032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003870">SUSE bug 1003870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004016">SUSE bug 1004016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005004">SUSE bug 1005004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005005">SUSE bug 1005005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007157">SUSE bug 1007157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007160">SUSE bug 1007160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009100">SUSE bug 1009100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009103">SUSE bug 1009103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009104">SUSE bug 1009104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009107">SUSE bug 1009107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009108">SUSE bug 1009108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009109">SUSE bug 1009109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009111">SUSE bug 1009111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011652">SUSE bug 1011652</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7777/">CVE-2016-7777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7995/">CVE-2016-7995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8576/">CVE-2016-8576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8909/">CVE-2016-8909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9377/">CVE-2016-9377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9378/">CVE-2016-9378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9379/">CVE-2016-9379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9380/">CVE-2016-9380</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9382/">CVE-2016-9382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9383/">CVE-2016-9383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9385/">CVE-2016-9385</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9386/">CVE-2016-9386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9637/">CVE-2016-9637</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516728" comment="xen-4.5.5_02-22.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516729" comment="xen-kmp-default-4.5.5_02_k3.12.67_60.64.18-22.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516730" comment="xen-libs-4.5.5_02-22.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516731" comment="xen-libs-32bit-4.5.5_02-22.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77625" version="1" class="patch">
	<metadata>
		<title>Security update for libass (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1002982" ref_url="https://bugzilla.suse.com/1002982" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7969" ref_url="https://www.suse.com/security/cve/CVE-2016-7969/" source="CVE"/>
		<reference ref_id="CVE-2016-7970" ref_url="https://www.suse.com/security/cve/CVE-2016-7970/" source="CVE"/>
		<reference ref_id="CVE-2016-7971" ref_url="https://www.suse.com/security/cve/CVE-2016-7971/" source="CVE"/>
		<reference ref_id="CVE-2016-7972" ref_url="https://www.suse.com/security/cve/CVE-2016-7972/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002475.html" source="SUSE-SU"/>
		<description>


This update for libass fixes the following issues:

CVE-2016-7969, CVE-2016-7970, CVE-2016-7971, CVE-2016-7972: Fixed multiple memory allocation issues found by fuzzing (bsc#1002982).
 
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-13"/>
	<updated date="2016-12-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002982">SUSE bug 1002982</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7969/">CVE-2016-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7970/">CVE-2016-7970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7971/">CVE-2016-7971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7972/">CVE-2016-7972</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516732" comment="libass5-0.10.2-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77626" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1015379" ref_url="https://bugzilla.suse.com/1015379" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7867" ref_url="https://www.suse.com/security/cve/CVE-2016-7867/" source="CVE"/>
		<reference ref_id="CVE-2016-7868" ref_url="https://www.suse.com/security/cve/CVE-2016-7868/" source="CVE"/>
		<reference ref_id="CVE-2016-7869" ref_url="https://www.suse.com/security/cve/CVE-2016-7869/" source="CVE"/>
		<reference ref_id="CVE-2016-7870" ref_url="https://www.suse.com/security/cve/CVE-2016-7870/" source="CVE"/>
		<reference ref_id="CVE-2016-7871" ref_url="https://www.suse.com/security/cve/CVE-2016-7871/" source="CVE"/>
		<reference ref_id="CVE-2016-7872" ref_url="https://www.suse.com/security/cve/CVE-2016-7872/" source="CVE"/>
		<reference ref_id="CVE-2016-7873" ref_url="https://www.suse.com/security/cve/CVE-2016-7873/" source="CVE"/>
		<reference ref_id="CVE-2016-7874" ref_url="https://www.suse.com/security/cve/CVE-2016-7874/" source="CVE"/>
		<reference ref_id="CVE-2016-7875" ref_url="https://www.suse.com/security/cve/CVE-2016-7875/" source="CVE"/>
		<reference ref_id="CVE-2016-7876" ref_url="https://www.suse.com/security/cve/CVE-2016-7876/" source="CVE"/>
		<reference ref_id="CVE-2016-7877" ref_url="https://www.suse.com/security/cve/CVE-2016-7877/" source="CVE"/>
		<reference ref_id="CVE-2016-7878" ref_url="https://www.suse.com/security/cve/CVE-2016-7878/" source="CVE"/>
		<reference ref_id="CVE-2016-7879" ref_url="https://www.suse.com/security/cve/CVE-2016-7879/" source="CVE"/>
		<reference ref_id="CVE-2016-7880" ref_url="https://www.suse.com/security/cve/CVE-2016-7880/" source="CVE"/>
		<reference ref_id="CVE-2016-7881" ref_url="https://www.suse.com/security/cve/CVE-2016-7881/" source="CVE"/>
		<reference ref_id="CVE-2016-7890" ref_url="https://www.suse.com/security/cve/CVE-2016-7890/" source="CVE"/>
		<reference ref_id="CVE-2016-7892" ref_url="https://www.suse.com/security/cve/CVE-2016-7892/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html" source="SUSE-SU"/>
		<description>

This update for flash-player fixes the following issues:

- Security update to 24.0.0.186 (bsc#1015379) APSB16-39:
    * These updates resolve use-after-free vulnerabilities that could have
      lead to code execution (CVE-2016-7872, CVE-2016-7877, CVE-2016-7878,
      CVE-2016-7879, CVE-2016-7880, CVE-2016-7881, CVE-2016-7892).
    * These updates resolve buffer overflow vulnerabilities that could have lead to
      code execution (CVE-2016-7867, CVE-2016-7868, CVE-2016-7869, CVE-2016-7870).
    * These updates resolve memory corruption vulnerabilities that could have lead to
      code execution (CVE-2016-7871, CVE-2016-7873, CVE-2016-7874,
      CVE-2016-7875, CVE-2016-7876).
    * These updates resolve a security bypass vulnerability (CVE-2016-7890).
- Keep standalone flashplayer at version 11, no newer version
  exists (INSECURE!).
- Update EULA to version 24.0.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-14"/>
	<updated date="2016-12-14"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1015379">SUSE bug 1015379</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7867/">CVE-2016-7867</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7868/">CVE-2016-7868</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7869/">CVE-2016-7869</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7870/">CVE-2016-7870</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7871/">CVE-2016-7871</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7872/">CVE-2016-7872</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7873/">CVE-2016-7873</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7874/">CVE-2016-7874</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7875/">CVE-2016-7875</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7876/">CVE-2016-7876</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7877/">CVE-2016-7877</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7878/">CVE-2016-7878</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7879/">CVE-2016-7879</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7880/">CVE-2016-7880</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7881/">CVE-2016-7881</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7890/">CVE-2016-7890</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-7892/">CVE-2016-7892</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516733" comment="flash-player-24.0.0.186-152.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516734" comment="flash-player-gnome-24.0.0.186-152.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77627" version="1" class="patch">
	<metadata>
		<title>Security update for pcre (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="906574" ref_url="https://bugzilla.suse.com/906574" source="BUGZILLA"/>
		<reference ref_id="924960" ref_url="https://bugzilla.suse.com/924960" source="BUGZILLA"/>
		<reference ref_id="933288" ref_url="https://bugzilla.suse.com/933288" source="BUGZILLA"/>
		<reference ref_id="933878" ref_url="https://bugzilla.suse.com/933878" source="BUGZILLA"/>
		<reference ref_id="936227" ref_url="https://bugzilla.suse.com/936227" source="BUGZILLA"/>
		<reference ref_id="942865" ref_url="https://bugzilla.suse.com/942865" source="BUGZILLA"/>
		<reference ref_id="957566" ref_url="https://bugzilla.suse.com/957566" source="BUGZILLA"/>
		<reference ref_id="957567" ref_url="https://bugzilla.suse.com/957567" source="BUGZILLA"/>
		<reference ref_id="957598" ref_url="https://bugzilla.suse.com/957598" source="BUGZILLA"/>
		<reference ref_id="957600" ref_url="https://bugzilla.suse.com/957600" source="BUGZILLA"/>
		<reference ref_id="960837" ref_url="https://bugzilla.suse.com/960837" source="BUGZILLA"/>
		<reference ref_id="971741" ref_url="https://bugzilla.suse.com/971741" source="BUGZILLA"/>
		<reference ref_id="972127" ref_url="https://bugzilla.suse.com/972127" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964/" source="CVE"/>
		<reference ref_id="CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325/" source="CVE"/>
		<reference ref_id="CVE-2015-2327" ref_url="https://www.suse.com/security/cve/CVE-2015-2327/" source="CVE"/>
		<reference ref_id="CVE-2015-2328" ref_url="https://www.suse.com/security/cve/CVE-2015-2328/" source="CVE"/>
		<reference ref_id="CVE-2015-3210" ref_url="https://www.suse.com/security/cve/CVE-2015-3210/" source="CVE"/>
		<reference ref_id="CVE-2015-3217" ref_url="https://www.suse.com/security/cve/CVE-2015-3217/" source="CVE"/>
		<reference ref_id="CVE-2015-5073" ref_url="https://www.suse.com/security/cve/CVE-2015-5073/" source="CVE"/>
		<reference ref_id="CVE-2015-8380" ref_url="https://www.suse.com/security/cve/CVE-2015-8380/" source="CVE"/>
		<reference ref_id="CVE-2015-8381" ref_url="https://www.suse.com/security/cve/CVE-2015-8381/" source="CVE"/>
		<reference ref_id="CVE-2015-8382" ref_url="https://www.suse.com/security/cve/CVE-2015-8382/" source="CVE"/>
		<reference ref_id="CVE-2015-8383" ref_url="https://www.suse.com/security/cve/CVE-2015-8383/" source="CVE"/>
		<reference ref_id="CVE-2015-8384" ref_url="https://www.suse.com/security/cve/CVE-2015-8384/" source="CVE"/>
		<reference ref_id="CVE-2015-8385" ref_url="https://www.suse.com/security/cve/CVE-2015-8385/" source="CVE"/>
		<reference ref_id="CVE-2015-8386" ref_url="https://www.suse.com/security/cve/CVE-2015-8386/" source="CVE"/>
		<reference ref_id="CVE-2015-8387" ref_url="https://www.suse.com/security/cve/CVE-2015-8387/" source="CVE"/>
		<reference ref_id="CVE-2015-8388" ref_url="https://www.suse.com/security/cve/CVE-2015-8388/" source="CVE"/>
		<reference ref_id="CVE-2015-8389" ref_url="https://www.suse.com/security/cve/CVE-2015-8389/" source="CVE"/>
		<reference ref_id="CVE-2015-8390" ref_url="https://www.suse.com/security/cve/CVE-2015-8390/" source="CVE"/>
		<reference ref_id="CVE-2015-8391" ref_url="https://www.suse.com/security/cve/CVE-2015-8391/" source="CVE"/>
		<reference ref_id="CVE-2015-8392" ref_url="https://www.suse.com/security/cve/CVE-2015-8392/" source="CVE"/>
		<reference ref_id="CVE-2015-8393" ref_url="https://www.suse.com/security/cve/CVE-2015-8393/" source="CVE"/>
		<reference ref_id="CVE-2015-8394" ref_url="https://www.suse.com/security/cve/CVE-2015-8394/" source="CVE"/>
		<reference ref_id="CVE-2015-8395" ref_url="https://www.suse.com/security/cve/CVE-2015-8395/" source="CVE"/>
		<reference ref_id="CVE-2016-1283" ref_url="https://www.suse.com/security/cve/CVE-2016-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-3191" ref_url="https://www.suse.com/security/cve/CVE-2016-3191/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<description>

This update for pcre to version 8.39 (bsc#972127) fixes several issues.

If you use pcre extensively please be aware that this is an update to a new version. Please
make sure that your software works with the updated version.

This version fixes a number of vulnerabilities that affect pcre
and applications using the libary when accepting untrusted input
as regular expressions or as part thereof. Remote attackers could
have caused the application to crash, disclose information or
potentially execute arbitrary code. These security issues were fixed:

- CVE-2014-8964: Heap-based buffer overflow in PCRE allowed remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats (bsc#906574).
- CVE-2015-2325: Heap buffer overflow in compile_branch() (bsc#924960).
- CVE-2015-3210: Heap buffer overflow in pcre_compile2() / compile_regex() (bsc#933288)
- CVE-2015-3217: PCRE Library Call Stack Overflow Vulnerability in match() (bsc#933878).
- CVE-2015-5073: Library Heap Overflow Vulnerability in find_fixedlength() (bsc#936227).
- bsc#942865: heap overflow in compile_regex()
- CVE-2015-8380: The pcre_exec function in pcre_exec.c mishandled a // pattern with a \01 string, which allowed remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror (bsc#957566).
- CVE-2015-2327: PCRE mishandled certain patterns with internal recursive back references, which allowed remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror (bsc#957567).
- bsc#957598: Various security issues 
- CVE-2015-8381: Heap Overflow in compile_regex() (bsc#957598).
- CVE-2015-8382: Regular Expression Uninitialized Pointer Information Disclosure Vulnerability (ZDI-CAN-2547)(bsc#957598).
- CVE-2015-8383: Buffer overflow caused by repeated conditional group(bsc#957598).
- CVE-2015-8384: Buffer overflow caused by recursive back reference by name within certain group(bsc#957598).
- CVE-2015-8385: Buffer overflow caused by forward reference by name to certain group(bsc#957598).
- CVE-2015-8386: Buffer overflow caused by lookbehind assertion(bsc#957598).
- CVE-2015-8387: Integer overflow in subroutine calls(bsc#957598).
- CVE-2015-8388: Buffer overflow caused by certain patterns with an unmatched closing parenthesis(bsc#957598).
- CVE-2015-8389: Infinite recursion in JIT compiler when processing certain patterns(bsc#957598).
- CVE-2015-8390: Reading from uninitialized memory when processing certain patterns(bsc#957598).
- CVE-2015-8391: Some pathological patterns causes pcre_compile() to run for a very long time(bsc#957598).
- CVE-2015-8392: Buffer overflow caused by certain patterns with duplicated named groups(bsc#957598).
- CVE-2015-8393: Information leak when running pcgrep -q on crafted binary(bsc#957598).
- CVE-2015-8394: Integer overflow caused by missing check for certain conditions(bsc#957598).
- CVE-2015-8395: Buffer overflow caused by certain references(bsc#957598).
- CVE-2015-2328: PCRE mishandled the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allowed remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression (bsc#957600).
- CVE-2016-1283: The pcre_compile2 function in pcre_compile.c in PCRE mishandled certain patterns with named subgroups, which allowed remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression (bsc#960837).
- CVE-2016-3191: The compile_branch function in pcre_compile.c in pcre2_compile.c mishandled patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allowed remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression (bsc#971741).

These non-security issues were fixed:
- JIT compiler improvements
- performance improvements
- The Unicode data tables have been updated to Unicode 7.0.0.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-15"/>
	<updated date="2016-12-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/906574">SUSE bug 906574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924960">SUSE bug 924960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933288">SUSE bug 933288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933878">SUSE bug 933878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936227">SUSE bug 936227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942865">SUSE bug 942865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957566">SUSE bug 957566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957567">SUSE bug 957567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957600">SUSE bug 957600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960837">SUSE bug 960837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971741">SUSE bug 971741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972127">SUSE bug 972127</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2327/">CVE-2015-2327</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2328/">CVE-2015-2328</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3210/">CVE-2015-3210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3217/">CVE-2015-3217</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5073/">CVE-2015-5073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8380/">CVE-2015-8380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8381/">CVE-2015-8381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8382/">CVE-2015-8382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8383/">CVE-2015-8383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8384/">CVE-2015-8384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8385/">CVE-2015-8385</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8386/">CVE-2015-8386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8387/">CVE-2015-8387</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8388/">CVE-2015-8388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8389/">CVE-2015-8389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8390/">CVE-2015-8390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8391/">CVE-2015-8391</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8392/">CVE-2015-8392</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8393/">CVE-2015-8393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8394/">CVE-2015-8394</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8395/">CVE-2015-8395</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1283/">CVE-2016-1283</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3191/">CVE-2016-3191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516735" comment="libpcre1-8.39-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516736" comment="libpcre1-32bit-8.39-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516737" comment="libpcre16-0-8.39-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516738" comment="libpcrecpp0-8.39-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516739" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77628" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="937787" ref_url="https://bugzilla.suse.com/937787" source="BUGZILLA"/>
		<reference ref_id="957174" ref_url="https://bugzilla.suse.com/957174" source="BUGZILLA"/>
		<reference ref_id="958789" ref_url="https://bugzilla.suse.com/958789" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4792" ref_url="https://www.suse.com/security/cve/CVE-2015-4792/" source="CVE"/>
		<reference ref_id="CVE-2015-4802" ref_url="https://www.suse.com/security/cve/CVE-2015-4802/" source="CVE"/>
		<reference ref_id="CVE-2015-4807" ref_url="https://www.suse.com/security/cve/CVE-2015-4807/" source="CVE"/>
		<reference ref_id="CVE-2015-4815" ref_url="https://www.suse.com/security/cve/CVE-2015-4815/" source="CVE"/>
		<reference ref_id="CVE-2015-4826" ref_url="https://www.suse.com/security/cve/CVE-2015-4826/" source="CVE"/>
		<reference ref_id="CVE-2015-4830" ref_url="https://www.suse.com/security/cve/CVE-2015-4830/" source="CVE"/>
		<reference ref_id="CVE-2015-4836" ref_url="https://www.suse.com/security/cve/CVE-2015-4836/" source="CVE"/>
		<reference ref_id="CVE-2015-4858" ref_url="https://www.suse.com/security/cve/CVE-2015-4858/" source="CVE"/>
		<reference ref_id="CVE-2015-4861" ref_url="https://www.suse.com/security/cve/CVE-2015-4861/" source="CVE"/>
		<reference ref_id="CVE-2015-4870" ref_url="https://www.suse.com/security/cve/CVE-2015-4870/" source="CVE"/>
		<reference ref_id="CVE-2015-4913" ref_url="https://www.suse.com/security/cve/CVE-2015-4913/" source="CVE"/>
		<reference ref_id="CVE-2015-5969" ref_url="https://www.suse.com/security/cve/CVE-2015-5969/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<description>

MariaDB has been updated to version 10.0.22, which brings fixes for many security
issues and other improvements.

The following CVEs have been fixed:

- 10.0.22: CVE-2015-4802, CVE-2015-4807, CVE-2015-4815, CVE-2015-4826,
           CVE-2015-4830, CVE-2015-4836, CVE-2015-4858, CVE-2015-4861,
           CVE-2015-4870, CVE-2015-4913, CVE-2015-4792
- Fix information leak via mysql-systemd-helper script. (CVE-2015-5969, bsc#957174)

For a comprehensive list of changes refer to the upstream Release Notes and Change
Log documents:

- https://kb.askmonty.org/en/mariadb-10022-release-notes/
- https://kb.askmonty.org/en/mariadb-10022-changelog/
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-01"/>
	<updated date="2016-02-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/937787">SUSE bug 937787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957174">SUSE bug 957174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4792/">CVE-2015-4792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4802/">CVE-2015-4802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4807/">CVE-2015-4807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4815/">CVE-2015-4815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4826/">CVE-2015-4826</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4830/">CVE-2015-4830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4836/">CVE-2015-4836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4858/">CVE-2015-4858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4861/">CVE-2015-4861</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4870/">CVE-2015-4870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4913/">CVE-2015-4913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5969/">CVE-2015-5969</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516740" comment="libmysqlclient18-10.0.22-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516741" comment="libmysqlclient18-32bit-10.0.22-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516742" comment="libmysqlclient_r18-10.0.22-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516743" comment="libmysqlclient_r18-32bit-10.0.22-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516744" comment="mariadb-10.0.22-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516745" comment="mariadb-client-10.0.22-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516746" comment="mariadb-errormessages-10.0.22-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77629" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1013533" ref_url="https://bugzilla.suse.com/1013533" source="BUGZILLA"/>
		<reference ref_id="1013604" ref_url="https://bugzilla.suse.com/1013604" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9576" ref_url="https://www.suse.com/security/cve/CVE-2016-9576/" source="CVE"/>
		<reference ref_id="CVE-2016-9794" ref_url="https://www.suse.com/security/cve/CVE-2016-9794/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00072.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP 2 kernel was updated to fix two security issues.

The following security bugs were fixed:

- CVE-2016-9576: A use-after-free vulnerability in the SCSI generic driver allows users with write access to /dev/sg* or /dev/bsg* to elevate their privileges (bsc#1013604).
- CVE-2016-9794: A use-after-free vulnerability in the ALSA pcm layer allowed local users to cause a denial of service, memory corruption or possibly even to elevate their privileges (bsc#1013533).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-16"/>
	<updated date="2016-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013533">SUSE bug 1013533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013604">SUSE bug 1013604</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9576/">CVE-2016-9576</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9794/">CVE-2016-9794</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516747" comment="kernel-default-3.12.67-60.64.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516748" comment="kernel-default-devel-3.12.67-60.64.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516749" comment="kernel-default-extra-3.12.67-60.64.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516750" comment="kernel-devel-3.12.67-60.64.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516751" comment="kernel-macros-3.12.67-60.64.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516752" comment="kernel-source-3.12.67-60.64.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516753" comment="kernel-syms-3.12.67-60.64.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516754" comment="kernel-xen-3.12.67-60.64.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516755" comment="kernel-xen-devel-3.12.67-60.64.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77630" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1009434" ref_url="https://bugzilla.suse.com/1009434" source="BUGZILLA"/>
		<reference ref_id="1011377" ref_url="https://bugzilla.suse.com/1011377" source="BUGZILLA"/>
		<reference ref_id="1011390" ref_url="https://bugzilla.suse.com/1011390" source="BUGZILLA"/>
		<reference ref_id="1011395" ref_url="https://bugzilla.suse.com/1011395" source="BUGZILLA"/>
		<reference ref_id="1011398" ref_url="https://bugzilla.suse.com/1011398" source="BUGZILLA"/>
		<reference ref_id="1011404" ref_url="https://bugzilla.suse.com/1011404" source="BUGZILLA"/>
		<reference ref_id="1011406" ref_url="https://bugzilla.suse.com/1011406" source="BUGZILLA"/>
		<reference ref_id="1011411" ref_url="https://bugzilla.suse.com/1011411" source="BUGZILLA"/>
		<reference ref_id="1011417" ref_url="https://bugzilla.suse.com/1011417" source="BUGZILLA"/>
		<reference ref_id="943216" ref_url="https://bugzilla.suse.com/943216" source="BUGZILLA"/>
		<reference ref_id="956365" ref_url="https://bugzilla.suse.com/956365" source="BUGZILLA"/>
		<reference ref_id="981252" ref_url="https://bugzilla.suse.com/981252" source="BUGZILLA"/>
		<reference ref_id="988028" ref_url="https://bugzilla.suse.com/988028" source="BUGZILLA"/>
		<reference ref_id="992038" ref_url="https://bugzilla.suse.com/992038" source="BUGZILLA"/>
		<reference ref_id="992606" ref_url="https://bugzilla.suse.com/992606" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5219" ref_url="https://www.suse.com/security/cve/CVE-2015-5219/" source="CVE"/>
		<reference ref_id="CVE-2016-7426" ref_url="https://www.suse.com/security/cve/CVE-2016-7426/" source="CVE"/>
		<reference ref_id="CVE-2016-7427" ref_url="https://www.suse.com/security/cve/CVE-2016-7427/" source="CVE"/>
		<reference ref_id="CVE-2016-7428" ref_url="https://www.suse.com/security/cve/CVE-2016-7428/" source="CVE"/>
		<reference ref_id="CVE-2016-7429" ref_url="https://www.suse.com/security/cve/CVE-2016-7429/" source="CVE"/>
		<reference ref_id="CVE-2016-7431" ref_url="https://www.suse.com/security/cve/CVE-2016-7431/" source="CVE"/>
		<reference ref_id="CVE-2016-7433" ref_url="https://www.suse.com/security/cve/CVE-2016-7433/" source="CVE"/>
		<reference ref_id="CVE-2016-7434" ref_url="https://www.suse.com/security/cve/CVE-2016-7434/" source="CVE"/>
		<reference ref_id="CVE-2016-9310" ref_url="https://www.suse.com/security/cve/CVE-2016-9310/" source="CVE"/>
		<reference ref_id="CVE-2016-9311" ref_url="https://www.suse.com/security/cve/CVE-2016-9311/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002497.html" source="SUSE-SU"/>
		<description>

This update for ntp fixes the following issues:

ntp was updated to 4.2.8p9.

Security issues fixed:

- CVE-2016-9311, CVE-2016-9310, bsc#1011377: Mode 6
  unauthenticated trap information disclosure and DDoS vector.
- CVE-2016-7427, bsc#1011390:
  Broadcast Mode Replay Prevention DoS.
- CVE-2016-7428, bsc#1011417:
  Broadcast Mode Poll Interval Enforcement DoS.
- CVE-2016-7431, bsc#1011395:
  Regression: 010-origin: Zero Origin Timestamp Bypass.
- CVE-2016-7434, bsc#1011398:
  Null pointer dereference in _IO_str_init_static_internal().
- CVE-2016-7429, bsc#1011404: Interface selection attack.
- CVE-2016-7426, bsc#1011406:
  Client rate limiting and server responses.
- CVE-2016-7433, bsc#1011411: Reboot sync calculation problem.
- CVE-2015-5219: An endless loop due to incorrect precision to
  double conversion (bsc#943216).

Non-security issues fixed:

- Fix a spurious error message.
- Other bugfixes, see /usr/share/doc/packages/ntp/ChangeLog.
- Fix a regression in 'trap' (bsc#981252).
- Reduce the number of netlink groups to listen on for changes to
  the local network setup (bsc#992606).
- Fix segfault in 'sntp -a' (bsc#1009434).
- Silence an OpenSSL version warning (bsc#992038).
- Make the resolver task change user and group IDs to the same
  values as the main task. (bsc#988028)
- Simplify ntpd's search for its own executable to prevent AppArmor
  warnings (bsc#956365).

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-19"/>
	<updated date="2016-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009434">SUSE bug 1009434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011377">SUSE bug 1011377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011390">SUSE bug 1011390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011395">SUSE bug 1011395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011398">SUSE bug 1011398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011404">SUSE bug 1011404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011406">SUSE bug 1011406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011411">SUSE bug 1011411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011417">SUSE bug 1011417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943216">SUSE bug 943216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956365">SUSE bug 956365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981252">SUSE bug 981252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988028">SUSE bug 988028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992038">SUSE bug 992038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992606">SUSE bug 992606</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5219/">CVE-2015-5219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7426/">CVE-2016-7426</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7427/">CVE-2016-7427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7428/">CVE-2016-7428</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7429/">CVE-2016-7429</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7431/">CVE-2016-7431</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7433/">CVE-2016-7433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7434/">CVE-2016-7434</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9310/">CVE-2016-9310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9311/">CVE-2016-9311</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516756" comment="ntp-4.2.8p9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516757" comment="ntp-doc-4.2.8p9-55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77631" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1012651" ref_url="https://bugzilla.suse.com/1012651" source="BUGZILLA"/>
		<reference ref_id="1014298" ref_url="https://bugzilla.suse.com/1014298" source="BUGZILLA"/>
		<reference ref_id="1016340" ref_url="https://bugzilla.suse.com/1016340" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10013" ref_url="https://www.suse.com/security/cve/CVE-2016-10013/" source="CVE"/>
		<reference ref_id="CVE-2016-10024" ref_url="https://www.suse.com/security/cve/CVE-2016-10024/" source="CVE"/>
		<reference ref_id="CVE-2016-9932" ref_url="https://www.suse.com/security/cve/CVE-2016-9932/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00078.html" source="SUSE-SU"/>
		<description>

This update for xen fixes the following issues:

- A Mishandling of SYSCALL singlestep during emulation which could
  have lead to privilege escalation. (XSA-204, bsc#1016340, CVE-2016-10013)
- CMPXCHG8B emulation failed to ignore operand size override which could have
  lead to information disclosure. (XSA-200, bsc#1012651, CVE-2016-9932)
- PV guests may have been able to mask interrupts causing a Denial of Service.
  (XSA-202, bsc#1014298, CVE-2016-10024)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-21"/>
	<updated date="2016-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012651">SUSE bug 1012651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014298">SUSE bug 1014298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016340">SUSE bug 1016340</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10013/">CVE-2016-10013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10024/">CVE-2016-10024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9932/">CVE-2016-9932</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516758" comment="xen-4.5.5_04-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516759" comment="xen-kmp-default-4.5.5_04_k3.12.67_60.64.24-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516760" comment="xen-libs-4.5.5_04-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516761" comment="xen-libs-32bit-4.5.5_04-22.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77632" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1015187" ref_url="https://bugzilla.suse.com/1015187" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9933" ref_url="https://www.suse.com/security/cve/CVE-2016-9933/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002508.html" source="SUSE-SU"/>
		<description>

This update for gd fixes the following issues:

* CVE-2016-9933 possible stackoverflow on malicious truecolor images [bsc#1015187]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-21"/>
	<updated date="2016-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015187">SUSE bug 1015187</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9933/">CVE-2016-9933</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516762" comment="gd-2.1.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516763" comment="gd-32bit-2.1.0-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77633" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1015422" ref_url="https://bugzilla.suse.com/1015422" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9893" ref_url="https://www.suse.com/security/cve/CVE-2016-9893/" source="CVE"/>
		<reference ref_id="CVE-2016-9895" ref_url="https://www.suse.com/security/cve/CVE-2016-9895/" source="CVE"/>
		<reference ref_id="CVE-2016-9897" ref_url="https://www.suse.com/security/cve/CVE-2016-9897/" source="CVE"/>
		<reference ref_id="CVE-2016-9898" ref_url="https://www.suse.com/security/cve/CVE-2016-9898/" source="CVE"/>
		<reference ref_id="CVE-2016-9899" ref_url="https://www.suse.com/security/cve/CVE-2016-9899/" source="CVE"/>
		<reference ref_id="CVE-2016-9900" ref_url="https://www.suse.com/security/cve/CVE-2016-9900/" source="CVE"/>
		<reference ref_id="CVE-2016-9901" ref_url="https://www.suse.com/security/cve/CVE-2016-9901/" source="CVE"/>
		<reference ref_id="CVE-2016-9902" ref_url="https://www.suse.com/security/cve/CVE-2016-9902/" source="CVE"/>
		<reference ref_id="CVE-2016-9904" ref_url="https://www.suse.com/security/cve/CVE-2016-9904/" source="CVE"/>
		<reference ref_id="CVE-2016-9905" ref_url="https://www.suse.com/security/cve/CVE-2016-9905/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00083.html" source="SUSE-SU"/>
		<description>

MozillaFirefox 45 ESR was updated to 45.6 to fix the following issues:

* MFSA 2016-95/CVE-2016-9897: Memory corruption in libGLES
* MFSA 2016-95/CVE-2016-9901: Data from Pocket server improperly sanitized before execution
* MFSA 2016-95/CVE-2016-9898: Use-after-free in Editor while manipulating DOM subtrees
* MFSA 2016-95/CVE-2016-9899: Use-after-free while manipulating DOM events and audio elements
* MFSA 2016-95/CVE-2016-9904: Cross-origin information leak in shared atoms
* MFSA 2016-95/CVE-2016-9905: Crash in EnumerateSubDocuments
* MFSA 2016-95/CVE-2016-9895: CSP bypass using marquee tag
* MFSA 2016-95/CVE-2016-9900: Restricted external resources can be loaded by SVG images through data URLs
* MFSA 2016-95/CVE-2016-9893: Memory safety bugs fixed in Firefox 50.1 and Firefox ESR 45.6
* MFSA 2016-95/CVE-2016-9902: Pocket extension does not validate the origin of events

Please see https://www.mozilla.org/en-US/security/advisories/mfsa2016-95/
for more information.

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-21"/>
	<updated date="2016-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9893/">CVE-2016-9893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9895/">CVE-2016-9895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9897/">CVE-2016-9897</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9898/">CVE-2016-9898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9899/">CVE-2016-9899</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9900/">CVE-2016-9900</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9901/">CVE-2016-9901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9902/">CVE-2016-9902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9904/">CVE-2016-9904</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9905/">CVE-2016-9905</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516764" comment="MozillaFirefox-45.6.0esr-96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516765" comment="MozillaFirefox-translations-45.6.0esr-96.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77634" version="1" class="patch">
	<metadata>
		<title>Security update for libgme (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1015941" ref_url="https://bugzilla.suse.com/1015941" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9957" ref_url="https://www.suse.com/security/cve/CVE-2016-9957/" source="CVE"/>
		<reference ref_id="CVE-2016-9958" ref_url="https://www.suse.com/security/cve/CVE-2016-9958/" source="CVE"/>
		<reference ref_id="CVE-2016-9959" ref_url="https://www.suse.com/security/cve/CVE-2016-9959/" source="CVE"/>
		<reference ref_id="CVE-2016-9960" ref_url="https://www.suse.com/security/cve/CVE-2016-9960/" source="CVE"/>
		<reference ref_id="CVE-2016-9961" ref_url="https://www.suse.com/security/cve/CVE-2016-9961/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00090.html" source="SUSE-SU"/>
		<description>

This update for libgme fixes the following issues:

- CVE-2016-9957, CVE-2016-9958, CVE-2016-9959, CVE-2016-9960, CVE-2016-9961:
  Various issues were fixed in the handling of SPC music files that could have
  been exploited for gaining privileges of desktop users. [bsc#1015941]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-22"/>
	<updated date="2016-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1015941">SUSE bug 1015941</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9957/">CVE-2016-9957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9958/">CVE-2016-9958</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9959/">CVE-2016-9959</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9960/">CVE-2016-9960</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9961/">CVE-2016-9961</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516766" comment="libgme0-0.6.0-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77635" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1009318" ref_url="https://bugzilla.suse.com/1009318" source="BUGZILLA"/>
		<reference ref_id="1011130" ref_url="https://bugzilla.suse.com/1011130" source="BUGZILLA"/>
		<reference ref_id="1011136" ref_url="https://bugzilla.suse.com/1011136" source="BUGZILLA"/>
		<reference ref_id="1013376" ref_url="https://bugzilla.suse.com/1013376" source="BUGZILLA"/>
		<reference ref_id="1014159" ref_url="https://bugzilla.suse.com/1014159" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9848" ref_url="https://www.suse.com/security/cve/CVE-2014-9848/" source="CVE"/>
		<reference ref_id="CVE-2016-8707" ref_url="https://www.suse.com/security/cve/CVE-2016-8707/" source="CVE"/>
		<reference ref_id="CVE-2016-8866" ref_url="https://www.suse.com/security/cve/CVE-2016-8866/" source="CVE"/>
		<reference ref_id="CVE-2016-9556" ref_url="https://www.suse.com/security/cve/CVE-2016-9556/" source="CVE"/>
		<reference ref_id="CVE-2016-9559" ref_url="https://www.suse.com/security/cve/CVE-2016-9559/" source="CVE"/>
		<reference ref_id="CVE-2016-9773" ref_url="https://www.suse.com/security/cve/CVE-2016-9773/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00093.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

  * CVE-2016-9556 Possible Heap-overflow found by fuzzing [bsc#1011130]
  * CVE-2016-9559 Possible Null pointer access found by fuzzing [bsc#1011136]
  * CVE-2016-8707 Possible code execution in Tiff conver utility [bsc#1014159]
  * CVE-2016-8866 Memory allocation failure in AcquireMagickMemory could lead to Heap overflow [bsc#1009318]
  * CVE-2016-9559 Possible Null pointer access found by fuzzing [bsc#1011136]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-23"/>
	<updated date="2016-12-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009318">SUSE bug 1009318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011130">SUSE bug 1011130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011136">SUSE bug 1011136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013376">SUSE bug 1013376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014159">SUSE bug 1014159</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9848/">CVE-2014-9848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8707/">CVE-2016-8707</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8866/">CVE-2016-8866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9556/">CVE-2016-9556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9559/">CVE-2016-9559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9773/">CVE-2016-9773</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516767" comment="ImageMagick-6.8.8.1-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516768" comment="libMagick++-6_Q16-3-6.8.8.1-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516769" comment="libMagickCore-6_Q16-1-6.8.8.1-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516770" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516771" comment="libMagickWand-6_Q16-1-6.8.8.1-54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77636" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1005091" ref_url="https://bugzilla.suse.com/1005091" source="BUGZILLA"/>
		<reference ref_id="1012677" ref_url="https://bugzilla.suse.com/1012677" source="BUGZILLA"/>
		<reference ref_id="995964" ref_url="https://bugzilla.suse.com/995964" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7098" ref_url="https://www.suse.com/security/cve/CVE-2016-7098/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002523.html" source="SUSE-SU"/>
		<description>

This update for wget fixes the following issues:

Security issues fixed:
- CVE-2016-7098: Fixed a potential race condition by creating files with .tmp ext
  and making them accessible to the current user only. (bsc#995964)

Non security issues fixed:
- bsc#1005091: Don't call xfree() on string returned by usr_error()  
- bsc#1012677: Add support for enforcing TLSv1.1 and TLSv1.2 (TLS 1.2 support was already present, but it was not enforcable).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-23"/>
	<updated date="2016-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005091">SUSE bug 1005091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012677">SUSE bug 1012677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995964">SUSE bug 995964</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7098/">CVE-2016-7098</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516772" comment="wget-1.14-17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77637" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="983273" ref_url="https://bugzilla.suse.com/983273" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8899" ref_url="https://www.suse.com/security/cve/CVE-2015-8899/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00094.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2015-8899: Denial of service between local and remote dns entries (bsc#983273)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-23"/>
	<updated date="2016-12-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/983273">SUSE bug 983273</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8899/">CVE-2015-8899</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516773" comment="dnsmasq-2.71-13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77638" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1001203" ref_url="https://bugzilla.suse.com/1001203" source="BUGZILLA"/>
		<reference ref_id="1009085" ref_url="https://bugzilla.suse.com/1009085" source="BUGZILLA"/>
		<reference ref_id="1014437" ref_url="https://bugzilla.suse.com/1014437" source="BUGZILLA"/>
		<reference ref_id="1014441" ref_url="https://bugzilla.suse.com/1014441" source="BUGZILLA"/>
		<reference ref_id="1014442" ref_url="https://bugzilla.suse.com/1014442" source="BUGZILLA"/>
		<reference ref_id="975299" ref_url="https://bugzilla.suse.com/975299" source="BUGZILLA"/>
		<reference ref_id="986675" ref_url="https://bugzilla.suse.com/986675" source="BUGZILLA"/>
		<reference ref_id="991564" ref_url="https://bugzilla.suse.com/991564" source="BUGZILLA"/>
		<reference ref_id="994500" ref_url="https://bugzilla.suse.com/994500" source="BUGZILLA"/>
		<reference ref_id="997833" ref_url="https://bugzilla.suse.com/997833" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2123" ref_url="https://www.suse.com/security/cve/CVE-2016-2123/" source="CVE"/>
		<reference ref_id="CVE-2016-2125" ref_url="https://www.suse.com/security/cve/CVE-2016-2125/" source="CVE"/>
		<reference ref_id="CVE-2016-2126" ref_url="https://www.suse.com/security/cve/CVE-2016-2126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002527.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issues:

Security issues fixed:

- CVE-2016-2125: Don't send delegated credentials to all servers. (bsc#1014441).
- CVE-2016-2126: Denial of service due to a client triggered crash in the winbindd
  parent process. (bsc#1014442).
- CVE-2016-2123: Heap-based Buffer Overflow Remote Code Execution Vulnerability. (bsc#1014437).
  The component affected is not built in our packages.

Non security issues fixed:

- s3/client: obey 'disable netbios' smb.conf param, don't connect via NBT port; (bsc#1009085)
- Add doc changes for net ads --no-dns-updates switch; (bsc#991564)
- Include vfstest in samba-test; (bsc#1001203).
- s3/winbindd: using default domain with user@domain.com format fails (bsc#997833).
- Fix illegal memory access after memory has been deleted (bsc#975299).
- Fix bug in tevent poll backend causing winbind to loop tightly (bsc#994500).
- Various fixes for spnego/ntlm (bsc#986675).		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-27"/>
	<updated date="2016-12-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1001203">SUSE bug 1001203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009085">SUSE bug 1009085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014437">SUSE bug 1014437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014441">SUSE bug 1014441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014442">SUSE bug 1014442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975299">SUSE bug 975299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986675">SUSE bug 986675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991564">SUSE bug 991564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994500">SUSE bug 994500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997833">SUSE bug 997833</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2123/">CVE-2016-2123</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2125/">CVE-2016-2125</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2126/">CVE-2016-2126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516774" comment="libdcerpc-binding0-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516775" comment="libdcerpc-binding0-32bit-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516776" comment="libdcerpc0-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516777" comment="libdcerpc0-32bit-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516778" comment="libgensec0-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516779" comment="libgensec0-32bit-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516780" comment="libndr-krb5pac0-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516781" comment="libndr-krb5pac0-32bit-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516782" comment="libndr-nbt0-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516783" comment="libndr-nbt0-32bit-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516784" comment="libndr-standard0-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516785" comment="libndr-standard0-32bit-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516786" comment="libndr0-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516787" comment="libndr0-32bit-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516788" comment="libnetapi0-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516789" comment="libnetapi0-32bit-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516790" comment="libregistry0-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516791" comment="libsamba-credentials0-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516792" comment="libsamba-credentials0-32bit-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516793" comment="libsamba-hostconfig0-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516794" comment="libsamba-hostconfig0-32bit-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516795" comment="libsamba-passdb0-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516796" comment="libsamba-passdb0-32bit-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516797" comment="libsamba-util0-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516798" comment="libsamba-util0-32bit-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516799" comment="libsamdb0-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516800" comment="libsamdb0-32bit-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516801" comment="libsmbclient-raw0-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516802" comment="libsmbclient-raw0-32bit-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516803" comment="libsmbclient0-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516804" comment="libsmbclient0-32bit-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516805" comment="libsmbconf0-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516806" comment="libsmbconf0-32bit-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516807" comment="libsmbldap0-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516808" comment="libsmbldap0-32bit-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516809" comment="libtevent-util0-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516810" comment="libtevent-util0-32bit-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516811" comment="libwbclient0-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516812" comment="libwbclient0-32bit-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516813" comment="samba-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516814" comment="samba-32bit-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516815" comment="samba-client-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516816" comment="samba-client-32bit-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516817" comment="samba-doc-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516818" comment="samba-libs-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516819" comment="samba-libs-32bit-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516820" comment="samba-winbind-4.2.4-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516821" comment="samba-winbind-32bit-4.2.4-28.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77639" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-good (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1012102" ref_url="https://bugzilla.suse.com/1012102" source="BUGZILLA"/>
		<reference ref_id="1012103" ref_url="https://bugzilla.suse.com/1012103" source="BUGZILLA"/>
		<reference ref_id="1012104" ref_url="https://bugzilla.suse.com/1012104" source="BUGZILLA"/>
		<reference ref_id="1013653" ref_url="https://bugzilla.suse.com/1013653" source="BUGZILLA"/>
		<reference ref_id="1013655" ref_url="https://bugzilla.suse.com/1013655" source="BUGZILLA"/>
		<reference ref_id="1013663" ref_url="https://bugzilla.suse.com/1013663" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9634" ref_url="https://www.suse.com/security/cve/CVE-2016-9634/" source="CVE"/>
		<reference ref_id="CVE-2016-9635" ref_url="https://www.suse.com/security/cve/CVE-2016-9635/" source="CVE"/>
		<reference ref_id="CVE-2016-9636" ref_url="https://www.suse.com/security/cve/CVE-2016-9636/" source="CVE"/>
		<reference ref_id="CVE-2016-9807" ref_url="https://www.suse.com/security/cve/CVE-2016-9807/" source="CVE"/>
		<reference ref_id="CVE-2016-9808" ref_url="https://www.suse.com/security/cve/CVE-2016-9808/" source="CVE"/>
		<reference ref_id="CVE-2016-9810" ref_url="https://www.suse.com/security/cve/CVE-2016-9810/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00097.html" source="SUSE-SU"/>
		<description>

This update for gstreamer-plugins-good fixes the following issues:

* CVE-2016-9807: flic decoder invalid read could lead to crash [bsc#1013655]
* CVE-2016-9634: flic out-of-bounds write could lead to code execution  [bsc#1012102]
* CVE-2016-9635: flic out-of-bounds write could lead to code execution [bsc#1012103]
* CVE-2016-9635: flic out-of-bounds write could lead to code execution [bsc#1012104]
* CVE-2016-9808: A maliciously crafted flic file can still cause invalid memory accesses. [bsc#1013653]
* CVE-2016-9810: A maliciously crafted flic file can still cause invalid memory accesses [bsc#1013663]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-29"/>
	<updated date="2016-12-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012102">SUSE bug 1012102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012103">SUSE bug 1012103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012104">SUSE bug 1012104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013653">SUSE bug 1013653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013655">SUSE bug 1013655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013663">SUSE bug 1013663</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9634/">CVE-2016-9634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9635/">CVE-2016-9635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9636/">CVE-2016-9636</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9807/">CVE-2016-9807</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9808/">CVE-2016-9808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9810/">CVE-2016-9810</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516822" comment="gstreamer-plugins-good-1.2.4-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516823" comment="gstreamer-plugins-good-lang-1.2.4-2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77640" version="1" class="patch">
	<metadata>
		<title>Security update for libcares2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1007728" ref_url="https://bugzilla.suse.com/1007728" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5180" ref_url="https://www.suse.com/security/cve/CVE-2016-5180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002529.html" source="SUSE-SU"/>
		<description>

This update for libcares2 fixes the following issues:

- Add patch to fix single byte out of buffer write
  (CVE-2016-5180, bsc#1007728)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-29"/>
	<updated date="2016-12-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1007728">SUSE bug 1007728</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5180/">CVE-2016-5180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516824" comment="libcares2-1.9.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516825" comment="libcares2-32bit-1.9.1-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77641" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-bad (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1010829" ref_url="https://bugzilla.suse.com/1010829" source="BUGZILLA"/>
		<reference ref_id="1013659" ref_url="https://bugzilla.suse.com/1013659" source="BUGZILLA"/>
		<reference ref_id="1013678" ref_url="https://bugzilla.suse.com/1013678" source="BUGZILLA"/>
		<reference ref_id="1013680" ref_url="https://bugzilla.suse.com/1013680" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9445" ref_url="https://www.suse.com/security/cve/CVE-2016-9445/" source="CVE"/>
		<reference ref_id="CVE-2016-9446" ref_url="https://www.suse.com/security/cve/CVE-2016-9446/" source="CVE"/>
		<reference ref_id="CVE-2016-9809" ref_url="https://www.suse.com/security/cve/CVE-2016-9809/" source="CVE"/>
		<reference ref_id="CVE-2016-9812" ref_url="https://www.suse.com/security/cve/CVE-2016-9812/" source="CVE"/>
		<reference ref_id="CVE-2016-9813" ref_url="https://www.suse.com/security/cve/CVE-2016-9813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3297-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00098.html" source="SUSE-SU"/>
		<description>

This update for gstreamer-plugins-bad fixes the following issues:

- CVE-2016-9809: Malicious mkv/h264 file could cause an off by one out of bounds read and lead to crash (bsc#1013659)
- CVE-2016-9812: Malicious mpeg file could cause invalid a null pointer access and lead to crash (bsc#1013678)
- CVE-2016-9813: Malicious mpegts file could cause invalid a null pointer access and lead to crash (bsc#1013680)
- CVE-2016-9445, CVE-2016-9446: Check an integer overflow and initialize a buffer in vmncdec (bsc#1010829)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-29"/>
	<updated date="2016-12-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010829">SUSE bug 1010829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013659">SUSE bug 1013659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013678">SUSE bug 1013678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013680">SUSE bug 1013680</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9445/">CVE-2016-9445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9446/">CVE-2016-9446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9809/">CVE-2016-9809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9812/">CVE-2016-9812</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9813/">CVE-2016-9813</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516826" comment="gstreamer-plugins-bad-1.2.4-3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516827" comment="gstreamer-plugins-bad-lang-1.2.4-3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516828" comment="libgstbasecamerabinsrc-1_0-0-1.2.4-3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516829" comment="libgstcodecparsers-1_0-0-1.2.4-3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516830" comment="libgstegl-1_0-0-1.2.4-3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516831" comment="libgstmpegts-1_0-0-1.2.4-3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516832" comment="libgstphotography-1_0-0-1.2.4-3.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77642" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1007280" ref_url="https://bugzilla.suse.com/1007280" source="BUGZILLA"/>
		<reference ref_id="1010161" ref_url="https://bugzilla.suse.com/1010161" source="BUGZILLA"/>
		<reference ref_id="1010163" ref_url="https://bugzilla.suse.com/1010163" source="BUGZILLA"/>
		<reference ref_id="1011103" ref_url="https://bugzilla.suse.com/1011103" source="BUGZILLA"/>
		<reference ref_id="1011107" ref_url="https://bugzilla.suse.com/1011107" source="BUGZILLA"/>
		<reference ref_id="914890" ref_url="https://bugzilla.suse.com/914890" source="BUGZILLA"/>
		<reference ref_id="974449" ref_url="https://bugzilla.suse.com/974449" source="BUGZILLA"/>
		<reference ref_id="974840" ref_url="https://bugzilla.suse.com/974840" source="BUGZILLA"/>
		<reference ref_id="984813" ref_url="https://bugzilla.suse.com/984813" source="BUGZILLA"/>
		<reference ref_id="984815" ref_url="https://bugzilla.suse.com/984815" source="BUGZILLA"/>
		<reference ref_id="987351" ref_url="https://bugzilla.suse.com/987351" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127/" source="CVE"/>
		<reference ref_id="CVE-2016-3622" ref_url="https://www.suse.com/security/cve/CVE-2016-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-3658" ref_url="https://www.suse.com/security/cve/CVE-2016-3658/" source="CVE"/>
		<reference ref_id="CVE-2016-5321" ref_url="https://www.suse.com/security/cve/CVE-2016-5321/" source="CVE"/>
		<reference ref_id="CVE-2016-5323" ref_url="https://www.suse.com/security/cve/CVE-2016-5323/" source="CVE"/>
		<reference ref_id="CVE-2016-5652" ref_url="https://www.suse.com/security/cve/CVE-2016-5652/" source="CVE"/>
		<reference ref_id="CVE-2016-5875" ref_url="https://www.suse.com/security/cve/CVE-2016-5875/" source="CVE"/>
		<reference ref_id="CVE-2016-9273" ref_url="https://www.suse.com/security/cve/CVE-2016-9273/" source="CVE"/>
		<reference ref_id="CVE-2016-9297" ref_url="https://www.suse.com/security/cve/CVE-2016-9297/" source="CVE"/>
		<reference ref_id="CVE-2016-9448" ref_url="https://www.suse.com/security/cve/CVE-2016-9448/" source="CVE"/>
		<reference ref_id="CVE-2016-9453" ref_url="https://www.suse.com/security/cve/CVE-2016-9453/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002537.html" source="SUSE-SU"/>
		<description>

The tiff library and tools were updated to version 4.0.7 fixing various bug and security issues.

- CVE-2014-8127: out-of-bounds read with malformed TIFF image in multiple tools [bnc#914890]
- CVE-2016-9297: tif_dirread.c read outside buffer in _TIFFPrintField() [bnc#1010161]
- CVE-2016-3658: Illegal read in TIFFWriteDirectoryTagLongLong8Array function in tiffset / tif_dirwrite.c [bnc#974840]
- CVE-2016-9273: heap overflow [bnc#1010163]
- CVE-2016-3622: divide By Zero in the tiff2rgba tool [bnc#974449]
- CVE-2016-5652: tiff2pdf JPEG Compression Tables Heap Buffer Overflow [bnc#1007280]
- CVE-2016-9453: out-of-bounds Write memcpy and less bound check in tiff2pdf [bnc#1011107]
- CVE-2016-5875: heap-based buffer overflow when using the PixarLog compressionformat [bnc#987351]
- CVE-2016-9448: regression introduced by fixing CVE-2016-9297 [bnc#1011103]
- CVE-2016-5321: out-of-bounds read in tiffcrop /  DumpModeDecode() function [bnc#984813]
- CVE-2016-5323: Divide-by-zero in _TIFFFax3fillruns() function (null ptr dereference?) [bnc#984815]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-29"/>
	<updated date="2016-12-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007280">SUSE bug 1007280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010161">SUSE bug 1010161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010163">SUSE bug 1010163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011103">SUSE bug 1011103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011107">SUSE bug 1011107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974449">SUSE bug 974449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974840">SUSE bug 974840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984813">SUSE bug 984813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984815">SUSE bug 984815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987351">SUSE bug 987351</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3622/">CVE-2016-3622</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3658/">CVE-2016-3658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5321/">CVE-2016-5321</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5323/">CVE-2016-5323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5652/">CVE-2016-5652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5875/">CVE-2016-5875</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9273/">CVE-2016-9273</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9297/">CVE-2016-9297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9448/">CVE-2016-9448</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9453/">CVE-2016-9453</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516833" comment="libtiff5-4.0.7-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516834" comment="libtiff5-32bit-4.0.7-35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77643" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="954447" ref_url="https://bugzilla.suse.com/954447" source="BUGZILLA"/>
		<reference ref_id="963520" ref_url="https://bugzilla.suse.com/963520" source="BUGZILLA"/>
		<reference ref_id="963632" ref_url="https://bugzilla.suse.com/963632" source="BUGZILLA"/>
		<reference ref_id="963635" ref_url="https://bugzilla.suse.com/963635" source="BUGZILLA"/>
		<reference ref_id="963731" ref_url="https://bugzilla.suse.com/963731" source="BUGZILLA"/>
		<reference ref_id="964332" ref_url="https://bugzilla.suse.com/964332" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930/" source="CVE"/>
		<reference ref_id="CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935/" source="CVE"/>
		<reference ref_id="CVE-2016-1938" ref_url="https://www.suse.com/security/cve/CVE-2016-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0338-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nss fixes the following issues: (bsc#963520)

Mozilla Firefox was updated to 38.6.0 ESR.
Mozilla NSS was updated to 3.20.2.

The following vulnerabilities were fixed:

- CVE-2016-1930: Memory safety bugs fixed in Firefox ESR 38.6 (bsc#963632)
- CVE-2016-1935: Buffer overflow in WebGL after out of memory allocation (bsc#963635)
- CVE-2016-1938: Calculations with mp_div and mp_exptmod in Network Security Services (NSS) canproduce wrong results (bsc#963731)

The following improvements were added:

- bsc#954447: Mozilla NSS now supports a number of new DHE ciphersuites
- Tracking protection is now enabled by default
- bsc#964332: Fixed leaking file descriptors inside FIPS selfcheck code
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-04"/>
	<updated date="2016-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/954447">SUSE bug 954447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963520">SUSE bug 963520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963632">SUSE bug 963632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963635">SUSE bug 963635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963731">SUSE bug 963731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964332">SUSE bug 964332</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1938/">CVE-2016-1938</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515754" comment="MozillaFirefox-38.6.0esr-57.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515755" comment="MozillaFirefox-branding-SLE-31.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515756" comment="MozillaFirefox-translations-38.6.0esr-57.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515757" comment="libfreebl3-3.20.2-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515758" comment="libfreebl3-32bit-3.20.2-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515759" comment="libsoftokn3-3.20.2-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515760" comment="libsoftokn3-32bit-3.20.2-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515761" comment="mozilla-nss-3.20.2-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515762" comment="mozilla-nss-32bit-3.20.2-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515763" comment="mozilla-nss-certs-3.20.2-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515764" comment="mozilla-nss-certs-32bit-3.20.2-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515765" comment="mozilla-nss-sysinit-3.20.2-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515766" comment="mozilla-nss-sysinit-32bit-3.20.2-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515767" comment="mozilla-nss-tools-3.20.2-37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77644" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="934524" ref_url="https://bugzilla.suse.com/934524" source="BUGZILLA"/>
		<reference ref_id="934525" ref_url="https://bugzilla.suse.com/934525" source="BUGZILLA"/>
		<reference ref_id="934526" ref_url="https://bugzilla.suse.com/934526" source="BUGZILLA"/>
		<reference ref_id="934527" ref_url="https://bugzilla.suse.com/934527" source="BUGZILLA"/>
		<reference ref_id="934528" ref_url="https://bugzilla.suse.com/934528" source="BUGZILLA"/>
		<reference ref_id="934529" ref_url="https://bugzilla.suse.com/934529" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9732" ref_url="https://www.suse.com/security/cve/CVE-2014-9732/" source="CVE"/>
		<reference ref_id="CVE-2015-4467" ref_url="https://www.suse.com/security/cve/CVE-2015-4467/" source="CVE"/>
		<reference ref_id="CVE-2015-4468" ref_url="https://www.suse.com/security/cve/CVE-2015-4468/" source="CVE"/>
		<reference ref_id="CVE-2015-4469" ref_url="https://www.suse.com/security/cve/CVE-2015-4469/" source="CVE"/>
		<reference ref_id="CVE-2015-4470" ref_url="https://www.suse.com/security/cve/CVE-2015-4470/" source="CVE"/>
		<reference ref_id="CVE-2015-4471" ref_url="https://www.suse.com/security/cve/CVE-2015-4471/" source="CVE"/>
		<reference ref_id="CVE-2015-4472" ref_url="https://www.suse.com/security/cve/CVE-2015-4472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001776.html" source="SUSE-SU"/>
		<description>
libmspack was updated to fix security issues.

These security issues were fixed:
* CVE-2014-9732: The cabd_extract function in cabd.c in libmspack did not properly maintain decompression callbacks in certain cases where an invalid file follows a valid file, which allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted CAB archive (bnc#934524).
* CVE-2015-4467: The chmd_init_decomp function in chmd.c in libmspack did not properly validate the reset interval, which allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted CHM file (bnc#934525).
* CVE-2015-4468: Multiple integer overflows in the search_chunk function in chmd.c in libmspack allowed remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted CHM file (bnc#934526).
* CVE-2015-4469: The chmd_read_headers function in chmd.c in libmspack did not validate name lengths, which allowed remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted CHM file (bnc#934526).
* CVE-2015-4470: Off-by-one error in the inflate function in mszipd.c in libmspack allowed remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted CAB archive (bnc#934527).
* CVE-2015-4471: Off-by-one error in the lzxd_decompress function in lzxd.c in libmspack allowed remote attackers to cause a denial of service (buffer under-read and application crash) via a crafted CAB archive (bnc#934528).
* CVE-2015-4472: Off-by-one error in the READ_ENCINT macro in chmd.c in libmspack allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted CHM file (bnc#934529).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-04"/>
	<updated date="2016-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934524">SUSE bug 934524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934525">SUSE bug 934525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934526">SUSE bug 934526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934527">SUSE bug 934527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934528">SUSE bug 934528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934529">SUSE bug 934529</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9732/">CVE-2014-9732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4467/">CVE-2015-4467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4468/">CVE-2015-4468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4469/">CVE-2015-4469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4470/">CVE-2015-4470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4471/">CVE-2015-4471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4472/">CVE-2015-4472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515768" comment="libmspack0-0.4-14.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77645" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="934333" ref_url="https://bugzilla.suse.com/934333" source="BUGZILLA"/>
		<reference ref_id="936676" ref_url="https://bugzilla.suse.com/936676" source="BUGZILLA"/>
		<reference ref_id="962983" ref_url="https://bugzilla.suse.com/962983" source="BUGZILLA"/>
		<reference ref_id="962996" ref_url="https://bugzilla.suse.com/962996" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0755" ref_url="https://www.suse.com/security/cve/CVE-2016-0755/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001848.html" source="SUSE-SU"/>
		<description>

This update for curl fixes the following issues:

- CVE-2016-0755: libcurl would reuse NTLM-authenticated proxy connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer (bsc#962983)

The following non-security bugs were fixed:

- bsc#936676: secure_getenv or __secure_getenv may not be detected correctly at build time

The following tracked bugs only affect the test suite:

- bsc#962996: Expired cookie in test 46 caused test failures
- bsc#934333: Curl test suite was not run, is now enabled during build
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-04"/>
	<updated date="2016-02-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934333">SUSE bug 934333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936676">SUSE bug 936676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962983">SUSE bug 962983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962996">SUSE bug 962996</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0755/">CVE-2016-0755</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515769" comment="curl-7.37.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515770" comment="libcurl4-7.37.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515771" comment="libcurl4-32bit-7.37.0-18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77646" version="1" class="patch">
	<metadata>
		<title>Security update for socat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="938913" ref_url="https://bugzilla.suse.com/938913" source="BUGZILLA"/>
		<reference ref_id="964844" ref_url="https://bugzilla.suse.com/964844" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001851.html" source="SUSE-SU"/>
		<description>

This update for socat fixed the following issues:

- bsc#964844: Fixed security advisory 8, Stack overflow in parser, http://www.openwall.com/lists/oss-security/2016/02/01/5.
- bsc#938913: Improved resilience against Logjam attacks (CVE-2015-4000) by increasing the size of the default DH group from 512 to 2048 bit. This change avoids the non-prime 1024 bit DH p parameter in OpenSSL http://www.dest-unreach.org/socat/contrib/socat-secadv7.html.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/938913">SUSE bug 938913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964844">SUSE bug 964844</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515772" comment="socat-1.7.2.4-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77647" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="965901" ref_url="https://bugzilla.suse.com/965901" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0964" ref_url="https://www.suse.com/security/cve/CVE-2016-0964/" source="CVE"/>
		<reference ref_id="CVE-2016-0965" ref_url="https://www.suse.com/security/cve/CVE-2016-0965/" source="CVE"/>
		<reference ref_id="CVE-2016-0966" ref_url="https://www.suse.com/security/cve/CVE-2016-0966/" source="CVE"/>
		<reference ref_id="CVE-2016-0967" ref_url="https://www.suse.com/security/cve/CVE-2016-0967/" source="CVE"/>
		<reference ref_id="CVE-2016-0968" ref_url="https://www.suse.com/security/cve/CVE-2016-0968/" source="CVE"/>
		<reference ref_id="CVE-2016-0969" ref_url="https://www.suse.com/security/cve/CVE-2016-0969/" source="CVE"/>
		<reference ref_id="CVE-2016-0970" ref_url="https://www.suse.com/security/cve/CVE-2016-0970/" source="CVE"/>
		<reference ref_id="CVE-2016-0971" ref_url="https://www.suse.com/security/cve/CVE-2016-0971/" source="CVE"/>
		<reference ref_id="CVE-2016-0972" ref_url="https://www.suse.com/security/cve/CVE-2016-0972/" source="CVE"/>
		<reference ref_id="CVE-2016-0973" ref_url="https://www.suse.com/security/cve/CVE-2016-0973/" source="CVE"/>
		<reference ref_id="CVE-2016-0974" ref_url="https://www.suse.com/security/cve/CVE-2016-0974/" source="CVE"/>
		<reference ref_id="CVE-2016-0975" ref_url="https://www.suse.com/security/cve/CVE-2016-0975/" source="CVE"/>
		<reference ref_id="CVE-2016-0976" ref_url="https://www.suse.com/security/cve/CVE-2016-0976/" source="CVE"/>
		<reference ref_id="CVE-2016-0977" ref_url="https://www.suse.com/security/cve/CVE-2016-0977/" source="CVE"/>
		<reference ref_id="CVE-2016-0978" ref_url="https://www.suse.com/security/cve/CVE-2016-0978/" source="CVE"/>
		<reference ref_id="CVE-2016-0979" ref_url="https://www.suse.com/security/cve/CVE-2016-0979/" source="CVE"/>
		<reference ref_id="CVE-2016-0980" ref_url="https://www.suse.com/security/cve/CVE-2016-0980/" source="CVE"/>
		<reference ref_id="CVE-2016-0981" ref_url="https://www.suse.com/security/cve/CVE-2016-0981/" source="CVE"/>
		<reference ref_id="CVE-2016-0982" ref_url="https://www.suse.com/security/cve/CVE-2016-0982/" source="CVE"/>
		<reference ref_id="CVE-2016-0983" ref_url="https://www.suse.com/security/cve/CVE-2016-0983/" source="CVE"/>
		<reference ref_id="CVE-2016-0984" ref_url="https://www.suse.com/security/cve/CVE-2016-0984/" source="CVE"/>
		<reference ref_id="CVE-2016-0985" ref_url="https://www.suse.com/security/cve/CVE-2016-0985/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<description>

This update for flash-player fixes the following issues:

- Security update to 11.2.202.569 (bsc#965901):
  * APSB16-04, CVE-2016-0964, CVE-2016-0965, CVE-2016-0966,
    CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970,
    CVE-2016-0971, CVE-2016-0972, CVE-2016-0973, CVE-2016-0974,
    CVE-2016-0975, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978,
    CVE-2016-0979, CVE-2016-0980, CVE-2016-0981, CVE-2016-0982,
    CVE-2016-0983, CVE-2016-0984, CVE-2016-0985
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-10"/>
	<updated date="2016-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0964/">CVE-2016-0964</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0965/">CVE-2016-0965</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0966/">CVE-2016-0966</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0967/">CVE-2016-0967</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0968/">CVE-2016-0968</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0969/">CVE-2016-0969</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0970/">CVE-2016-0970</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0971/">CVE-2016-0971</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0972/">CVE-2016-0972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0973/">CVE-2016-0973</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0974/">CVE-2016-0974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0975/">CVE-2016-0975</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0976/">CVE-2016-0976</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0977/">CVE-2016-0977</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0978/">CVE-2016-0978</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0979/">CVE-2016-0979</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0980/">CVE-2016-0980</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0981/">CVE-2016-0981</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0982/">CVE-2016-0982</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0983/">CVE-2016-0983</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0984/">CVE-2016-0984</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0985/">CVE-2016-0985</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515773" comment="flash-player-11.2.202.569-120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515774" comment="flash-player-gnome-11.2.202.569-120.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77648" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="963964" ref_url="https://bugzilla.suse.com/963964" source="BUGZILLA"/>
		<reference ref_id="963968" ref_url="https://bugzilla.suse.com/963968" source="BUGZILLA"/>
		<reference ref_id="963975" ref_url="https://bugzilla.suse.com/963975" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8629" ref_url="https://www.suse.com/security/cve/CVE-2015-8629/" source="CVE"/>
		<reference ref_id="CVE-2015-8630" ref_url="https://www.suse.com/security/cve/CVE-2015-8630/" source="CVE"/>
		<reference ref_id="CVE-2015-8631" ref_url="https://www.suse.com/security/cve/CVE-2015-8631/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001870.html" source="SUSE-SU"/>
		<description>

This update for krb5 fixes the following issues:

- CVE-2015-8629: Information leak authenticated attackers with permissions to modify the database (bsc#963968)
- CVE-2015-8630: An authenticated attacker with permission to modify a principal entry may have caused kadmind to crash (bsc#963964)
- CVE-2015-8631: An authenticated attacker could have caused a memory leak in auditd by supplying a null principal name in request (bsc#963975)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-11"/>
	<updated date="2016-02-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/963964">SUSE bug 963964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963968">SUSE bug 963968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963975">SUSE bug 963975</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8629/">CVE-2015-8629</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8630/">CVE-2015-8630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8631/">CVE-2015-8631</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515775" comment="krb5-1.12.1-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515776" comment="krb5-32bit-1.12.1-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515777" comment="krb5-client-1.12.1-25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77649" version="1" class="patch">
	<metadata>
		<title>Security update for libnettle (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="964845" ref_url="https://bugzilla.suse.com/964845" source="BUGZILLA"/>
		<reference ref_id="964847" ref_url="https://bugzilla.suse.com/964847" source="BUGZILLA"/>
		<reference ref_id="964849" ref_url="https://bugzilla.suse.com/964849" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8803" ref_url="https://www.suse.com/security/cve/CVE-2015-8803/" source="CVE"/>
		<reference ref_id="CVE-2015-8804" ref_url="https://www.suse.com/security/cve/CVE-2015-8804/" source="CVE"/>
		<reference ref_id="CVE-2015-8805" ref_url="https://www.suse.com/security/cve/CVE-2015-8805/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001877.html" source="SUSE-SU"/>
		<description>
This update for libnettle fixes the following security issues: 

- CVE-2015-8803: Fixed miscomputation bugs in secp-256r1 modulo functions. (bsc#964845)
- CVE-2015-8804: Fixed carry folding bug in x86_64 ecc_384_modp. (bsc#964847)
- CVE-2015-8805: Fixed miscomputation bugs in secp-256r1 modulo functions. (bsc#964849)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-15"/>
	<updated date="2016-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/964845">SUSE bug 964845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964847">SUSE bug 964847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964849">SUSE bug 964849</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8803/">CVE-2015-8803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8804/">CVE-2015-8804</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8805/">CVE-2015-8805</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515778" comment="libhogweed2-2.7.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515779" comment="libhogweed2-32bit-2.7.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515780" comment="libnettle4-2.7.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515781" comment="libnettle4-32bit-2.7.1-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77650" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="954864" ref_url="https://bugzilla.suse.com/954864" source="BUGZILLA"/>
		<reference ref_id="956829" ref_url="https://bugzilla.suse.com/956829" source="BUGZILLA"/>
		<reference ref_id="957162" ref_url="https://bugzilla.suse.com/957162" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00035.html" source="SUSE-SU"/>
		<description>

This update fixes the following security issues:

- Enforce receive packet size, thus eliminating buffer overflow and
  potential security issue. (bsc#957162 CVE-2015-7512)
- Infinite loop in processing command block list. CVE-2015-8345 (bsc#956829):

This update also fixes a non-security bug:
- Due to space restrictions in limited bios data areas, don't create
  mptable if vcpu count is 'high' (ie more than ~19). (bsc#954864)
  (No supported guests are negatively impacted by this change, which
  is taken from upstream seabios)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-15"/>
	<updated date="2016-02-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/954864">SUSE bug 954864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956829">SUSE bug 956829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957162">SUSE bug 957162</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516835" comment="qemu-2.3.1-7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516836" comment="qemu-block-curl-2.3.1-7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516837" comment="qemu-ipxe-1.0.0-7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516838" comment="qemu-kvm-2.3.1-7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516839" comment="qemu-seabios-1.8.1-7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516840" comment="qemu-sgabios-8-7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516841" comment="qemu-tools-2.3.1-7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516842" comment="qemu-vgabios-1.8.1-7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516843" comment="qemu-x86-2.3.1-7.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77651" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="950944" ref_url="https://bugzilla.suse.com/950944" source="BUGZILLA"/>
		<reference ref_id="955647" ref_url="https://bugzilla.suse.com/955647" source="BUGZILLA"/>
		<reference ref_id="956716" ref_url="https://bugzilla.suse.com/956716" source="BUGZILLA"/>
		<reference ref_id="958315" ref_url="https://bugzilla.suse.com/958315" source="BUGZILLA"/>
		<reference ref_id="961721" ref_url="https://bugzilla.suse.com/961721" source="BUGZILLA"/>
		<reference ref_id="962736" ref_url="https://bugzilla.suse.com/962736" source="BUGZILLA"/>
		<reference ref_id="962737" ref_url="https://bugzilla.suse.com/962737" source="BUGZILLA"/>
		<reference ref_id="962738" ref_url="https://bugzilla.suse.com/962738" source="BUGZILLA"/>
		<reference ref_id="962739" ref_url="https://bugzilla.suse.com/962739" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761/" source="CVE"/>
		<reference ref_id="CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547/" source="CVE"/>
		<reference ref_id="CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776/" source="CVE"/>
		<reference ref_id="CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777/" source="CVE"/>
		<reference ref_id="CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778/" source="CVE"/>
		<reference ref_id="CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html" source="SUSE-SU"/>
		<description>

This update for glibc fixes the following security issues:

- CVE-2015-7547: A stack-based buffer overflow in getaddrinfo allowed remote attackers to cause a crash or execute arbitrary code via crafted and timed DNS responses (bsc#961721)
- CVE-2015-8777: Insufficient checking of LD_POINTER_GUARD environment variable allowed local attackers to bypass the pointer guarding protection of the dynamic loader on set-user-ID and set-group-ID programs (bsc#950944)
- CVE-2015-8776: Out-of-range time values passed to the strftime function may cause it to crash, leading to a denial of service, or potentially disclosure information (bsc#962736)
- CVE-2015-8778: Integer overflow in hcreate and hcreate_r could have caused an out-of-bound memory access. leading to application crashes or, potentially, arbitrary code execution (bsc#962737)
- CVE-2014-9761: A stack overflow (unbounded alloca) could have caused applications which process long strings with the nan function to crash or, potentially, execute arbitrary code. (bsc#962738)
- CVE-2015-8779: A stack overflow (unbounded alloca) in the catopen function could have caused applications which pass long strings to the catopen function to crash or, potentially execute arbitrary code. (bsc#962739)

The following non-security bugs were fixed:

- bsc#955647: Resource leak in resolver
- bsc#956716: Don't do lock elision on an error checking mutex
- bsc#958315: Reinitialize dl_load_write_lock on fork
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/950944">SUSE bug 950944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955647">SUSE bug 955647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956716">SUSE bug 956716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958315">SUSE bug 958315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961721">SUSE bug 961721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962736">SUSE bug 962736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962737">SUSE bug 962737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962738">SUSE bug 962738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962739">SUSE bug 962739</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516844" comment="glibc-2.19-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516845" comment="glibc-32bit-2.19-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516846" comment="glibc-devel-2.19-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516847" comment="glibc-devel-32bit-2.19-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516848" comment="glibc-i18ndata-2.19-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516849" comment="glibc-locale-2.19-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516850" comment="glibc-locale-32bit-2.19-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516851" comment="nscd-2.19-35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77652" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="880984" ref_url="https://bugzilla.suse.com/880984" source="BUGZILLA"/>
		<reference ref_id="936923" ref_url="https://bugzilla.suse.com/936923" source="BUGZILLA"/>
		<reference ref_id="956159" ref_url="https://bugzilla.suse.com/956159" source="BUGZILLA"/>
		<reference ref_id="960506" ref_url="https://bugzilla.suse.com/960506" source="BUGZILLA"/>
		<reference ref_id="961305" ref_url="https://bugzilla.suse.com/961305" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8605" ref_url="https://www.suse.com/security/cve/CVE-2015-8605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001890.html" source="SUSE-SU"/>
		<description>

This update for dhcp fixes the following issues:

- CVE-2015-8605: A remote attacker could have used badly formed packets with an invalid IPv4 UDP length field to cause a DHCP server, client, or relay program to terminate abnormally (bsc#961305)

The following bugs were fixed:

- bsc#936923: Improper lease duration checking
- bsc#880984: Integer overflows in the date and time handling code
- bsc#956159: fixed service files to start dhcpd after slapd
- bsc#960506: Improve exit reason and logging when /sbin/dhclient-script is unable to pre-init requested interface
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-22"/>
	<updated date="2016-02-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/880984">SUSE bug 880984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936923">SUSE bug 936923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956159">SUSE bug 956159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960506">SUSE bug 960506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961305">SUSE bug 961305</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8605/">CVE-2015-8605</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516852" comment="dhcp-4.3.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516853" comment="dhcp-client-4.3.3-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77653" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="578053" ref_url="https://bugzilla.suse.com/578053" source="BUGZILLA"/>
		<reference ref_id="966435" ref_url="https://bugzilla.suse.com/966435" source="BUGZILLA"/>
		<reference ref_id="966436" ref_url="https://bugzilla.suse.com/966436" source="BUGZILLA"/>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2016-0766" ref_url="https://www.suse.com/security/cve/CVE-2016-0766/" source="CVE"/>
		<reference ref_id="CVE-2016-0773" ref_url="https://www.suse.com/security/cve/CVE-2016-0773/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00054.html" source="SUSE-SU"/>
		<description>

This update for postgresql94 fixes the following issues: 

- Security and bugfix release 9.4.6:
  * *** IMPORTANT ***
    Users of version 9.4 will need to reindex any jsonb_path_ops
    indexes they have created, in order to fix a persistent issue
    with missing index entries.
  * Fix infinite loops and buffer-overrun problems in regular
    expressions (CVE-2016-0773, bsc#966436).
  * Fix regular-expression compiler to handle loops of constraint
    arcs (CVE-2007-4772).
  * Prevent certain PL/Java parameters from being set by
    non-superusers (CVE-2016-0766, bsc#966435).
  * Fix many issues in pg_dump with specific object types
  * Prevent over-eager pushdown of HAVING clauses for
    GROUPING SETS
  * Fix deparsing error with ON CONFLICT ... WHERE clauses
  * Fix tableoid errors for postgres_fdw
  * Prevent floating-point exceptions in pgbench
  * Make \det search Foreign Table names consistently
  * Fix quoting of domain constraint names in pg_dump
  * Prevent putting expanded objects into Const nodes
  * Allow compile of PL/Java on Windows
  * Fix 'unresolved symbol' errors in PL/Python execution
  * Allow Python2 and Python3 to be used in the same database
  * Add support for Python 3.5 in PL/Python
  * Fix issue with subdirectory creation during initdb
  * Make pg_ctl report status correctly on Windows
  * Suppress confusing error when using pg_receivexlog with older
    servers
  * Multiple documentation corrections and additions
  * Fix erroneous hash calculations in gin_extract_jsonb_path()
- For the full release notse, see:
  http://www.postgresql.org/docs/9.4/static/release-9-4-6.html

- PL/Perl still needs to be linked with rpath, so that it can find
  libperl.so at runtime.
  bsc#578053, postgresql-plperl-keep-rpath.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-24"/>
	<updated date="2016-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/578053">SUSE bug 578053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966435">SUSE bug 966435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966436">SUSE bug 966436</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0766/">CVE-2016-0766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0773/">CVE-2016-0773</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515793" comment="libecpg6-9.4.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515794" comment="libpq5-9.4.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515795" comment="libpq5-32bit-9.4.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515796" comment="postgresql94-9.4.6-7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77654" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="967087" ref_url="https://bugzilla.suse.com/967087" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1523" ref_url="https://www.suse.com/security/cve/CVE-2016-1523/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0554-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00053.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox fixes the following issues: 

- update to Firefox 38.6.1 ESR (bsc#967087)
  * MFSA 2016-14/CVE-2016-1523
    (bmo#1246093)
    Vulnerabilities in Graphite 2
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-24"/>
	<updated date="2016-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/967087">SUSE bug 967087</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1523/">CVE-2016-1523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515797" comment="MozillaFirefox-38.6.1esr-60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515798" comment="MozillaFirefox-translations-38.6.1esr-60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77655" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="812259" ref_url="https://bugzilla.suse.com/812259" source="BUGZILLA"/>
		<reference ref_id="855062" ref_url="https://bugzilla.suse.com/855062" source="BUGZILLA"/>
		<reference ref_id="867583" ref_url="https://bugzilla.suse.com/867583" source="BUGZILLA"/>
		<reference ref_id="899908" ref_url="https://bugzilla.suse.com/899908" source="BUGZILLA"/>
		<reference ref_id="902606" ref_url="https://bugzilla.suse.com/902606" source="BUGZILLA"/>
		<reference ref_id="924919" ref_url="https://bugzilla.suse.com/924919" source="BUGZILLA"/>
		<reference ref_id="935087" ref_url="https://bugzilla.suse.com/935087" source="BUGZILLA"/>
		<reference ref_id="937261" ref_url="https://bugzilla.suse.com/937261" source="BUGZILLA"/>
		<reference ref_id="937444" ref_url="https://bugzilla.suse.com/937444" source="BUGZILLA"/>
		<reference ref_id="938577" ref_url="https://bugzilla.suse.com/938577" source="BUGZILLA"/>
		<reference ref_id="940338" ref_url="https://bugzilla.suse.com/940338" source="BUGZILLA"/>
		<reference ref_id="940946" ref_url="https://bugzilla.suse.com/940946" source="BUGZILLA"/>
		<reference ref_id="941363" ref_url="https://bugzilla.suse.com/941363" source="BUGZILLA"/>
		<reference ref_id="942476" ref_url="https://bugzilla.suse.com/942476" source="BUGZILLA"/>
		<reference ref_id="943989" ref_url="https://bugzilla.suse.com/943989" source="BUGZILLA"/>
		<reference ref_id="944749" ref_url="https://bugzilla.suse.com/944749" source="BUGZILLA"/>
		<reference ref_id="945649" ref_url="https://bugzilla.suse.com/945649" source="BUGZILLA"/>
		<reference ref_id="947953" ref_url="https://bugzilla.suse.com/947953" source="BUGZILLA"/>
		<reference ref_id="949440" ref_url="https://bugzilla.suse.com/949440" source="BUGZILLA"/>
		<reference ref_id="949936" ref_url="https://bugzilla.suse.com/949936" source="BUGZILLA"/>
		<reference ref_id="950292" ref_url="https://bugzilla.suse.com/950292" source="BUGZILLA"/>
		<reference ref_id="951199" ref_url="https://bugzilla.suse.com/951199" source="BUGZILLA"/>
		<reference ref_id="951392" ref_url="https://bugzilla.suse.com/951392" source="BUGZILLA"/>
		<reference ref_id="951615" ref_url="https://bugzilla.suse.com/951615" source="BUGZILLA"/>
		<reference ref_id="952579" ref_url="https://bugzilla.suse.com/952579" source="BUGZILLA"/>
		<reference ref_id="952976" ref_url="https://bugzilla.suse.com/952976" source="BUGZILLA"/>
		<reference ref_id="954992" ref_url="https://bugzilla.suse.com/954992" source="BUGZILLA"/>
		<reference ref_id="955118" ref_url="https://bugzilla.suse.com/955118" source="BUGZILLA"/>
		<reference ref_id="955354" ref_url="https://bugzilla.suse.com/955354" source="BUGZILLA"/>
		<reference ref_id="955654" ref_url="https://bugzilla.suse.com/955654" source="BUGZILLA"/>
		<reference ref_id="956514" ref_url="https://bugzilla.suse.com/956514" source="BUGZILLA"/>
		<reference ref_id="956708" ref_url="https://bugzilla.suse.com/956708" source="BUGZILLA"/>
		<reference ref_id="957525" ref_url="https://bugzilla.suse.com/957525" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="957990" ref_url="https://bugzilla.suse.com/957990" source="BUGZILLA"/>
		<reference ref_id="958463" ref_url="https://bugzilla.suse.com/958463" source="BUGZILLA"/>
		<reference ref_id="958886" ref_url="https://bugzilla.suse.com/958886" source="BUGZILLA"/>
		<reference ref_id="958951" ref_url="https://bugzilla.suse.com/958951" source="BUGZILLA"/>
		<reference ref_id="959090" ref_url="https://bugzilla.suse.com/959090" source="BUGZILLA"/>
		<reference ref_id="959146" ref_url="https://bugzilla.suse.com/959146" source="BUGZILLA"/>
		<reference ref_id="959190" ref_url="https://bugzilla.suse.com/959190" source="BUGZILLA"/>
		<reference ref_id="959257" ref_url="https://bugzilla.suse.com/959257" source="BUGZILLA"/>
		<reference ref_id="959364" ref_url="https://bugzilla.suse.com/959364" source="BUGZILLA"/>
		<reference ref_id="959399" ref_url="https://bugzilla.suse.com/959399" source="BUGZILLA"/>
		<reference ref_id="959436" ref_url="https://bugzilla.suse.com/959436" source="BUGZILLA"/>
		<reference ref_id="959463" ref_url="https://bugzilla.suse.com/959463" source="BUGZILLA"/>
		<reference ref_id="959629" ref_url="https://bugzilla.suse.com/959629" source="BUGZILLA"/>
		<reference ref_id="960221" ref_url="https://bugzilla.suse.com/960221" source="BUGZILLA"/>
		<reference ref_id="960227" ref_url="https://bugzilla.suse.com/960227" source="BUGZILLA"/>
		<reference ref_id="960281" ref_url="https://bugzilla.suse.com/960281" source="BUGZILLA"/>
		<reference ref_id="960300" ref_url="https://bugzilla.suse.com/960300" source="BUGZILLA"/>
		<reference ref_id="961202" ref_url="https://bugzilla.suse.com/961202" source="BUGZILLA"/>
		<reference ref_id="961257" ref_url="https://bugzilla.suse.com/961257" source="BUGZILLA"/>
		<reference ref_id="961500" ref_url="https://bugzilla.suse.com/961500" source="BUGZILLA"/>
		<reference ref_id="961509" ref_url="https://bugzilla.suse.com/961509" source="BUGZILLA"/>
		<reference ref_id="961516" ref_url="https://bugzilla.suse.com/961516" source="BUGZILLA"/>
		<reference ref_id="961588" ref_url="https://bugzilla.suse.com/961588" source="BUGZILLA"/>
		<reference ref_id="961971" ref_url="https://bugzilla.suse.com/961971" source="BUGZILLA"/>
		<reference ref_id="962336" ref_url="https://bugzilla.suse.com/962336" source="BUGZILLA"/>
		<reference ref_id="962356" ref_url="https://bugzilla.suse.com/962356" source="BUGZILLA"/>
		<reference ref_id="962788" ref_url="https://bugzilla.suse.com/962788" source="BUGZILLA"/>
		<reference ref_id="962965" ref_url="https://bugzilla.suse.com/962965" source="BUGZILLA"/>
		<reference ref_id="963449" ref_url="https://bugzilla.suse.com/963449" source="BUGZILLA"/>
		<reference ref_id="963572" ref_url="https://bugzilla.suse.com/963572" source="BUGZILLA"/>
		<reference ref_id="963765" ref_url="https://bugzilla.suse.com/963765" source="BUGZILLA"/>
		<reference ref_id="963767" ref_url="https://bugzilla.suse.com/963767" source="BUGZILLA"/>
		<reference ref_id="963825" ref_url="https://bugzilla.suse.com/963825" source="BUGZILLA"/>
		<reference ref_id="964230" ref_url="https://bugzilla.suse.com/964230" source="BUGZILLA"/>
		<reference ref_id="964821" ref_url="https://bugzilla.suse.com/964821" source="BUGZILLA"/>
		<reference ref_id="965344" ref_url="https://bugzilla.suse.com/965344" source="BUGZILLA"/>
		<reference ref_id="965840" ref_url="https://bugzilla.suse.com/965840" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7446" ref_url="https://www.suse.com/security/cve/CVE-2013-7446/" source="CVE"/>
		<reference ref_id="CVE-2015-0272" ref_url="https://www.suse.com/security/cve/CVE-2015-0272/" source="CVE"/>
		<reference ref_id="CVE-2015-5707" ref_url="https://www.suse.com/security/cve/CVE-2015-5707/" source="CVE"/>
		<reference ref_id="CVE-2015-7550" ref_url="https://www.suse.com/security/cve/CVE-2015-7550/" source="CVE"/>
		<reference ref_id="CVE-2015-7799" ref_url="https://www.suse.com/security/cve/CVE-2015-7799/" source="CVE"/>
		<reference ref_id="CVE-2015-8215" ref_url="https://www.suse.com/security/cve/CVE-2015-8215/" source="CVE"/>
		<reference ref_id="CVE-2015-8539" ref_url="https://www.suse.com/security/cve/CVE-2015-8539/" source="CVE"/>
		<reference ref_id="CVE-2015-8543" ref_url="https://www.suse.com/security/cve/CVE-2015-8543/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8551" ref_url="https://www.suse.com/security/cve/CVE-2015-8551/" source="CVE"/>
		<reference ref_id="CVE-2015-8569" ref_url="https://www.suse.com/security/cve/CVE-2015-8569/" source="CVE"/>
		<reference ref_id="CVE-2015-8575" ref_url="https://www.suse.com/security/cve/CVE-2015-8575/" source="CVE"/>
		<reference ref_id="CVE-2015-8660" ref_url="https://www.suse.com/security/cve/CVE-2015-8660/" source="CVE"/>
		<reference ref_id="CVE-2015-8767" ref_url="https://www.suse.com/security/cve/CVE-2015-8767/" source="CVE"/>
		<reference ref_id="CVE-2015-8785" ref_url="https://www.suse.com/security/cve/CVE-2015-8785/" source="CVE"/>
		<reference ref_id="CVE-2016-0723" ref_url="https://www.suse.com/security/cve/CVE-2016-0723/" source="CVE"/>
		<reference ref_id="CVE-2016-2069" ref_url="https://www.suse.com/security/cve/CVE-2016-2069/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.53 to receive various security and bugfixes.

The following security bugs were fixed:
- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel allowed local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls (bnc#955654).
- CVE-2015-5707: Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request (bnc#940338).
- CVE-2015-7550: The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel did not properly use a semaphore, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls (bnc#958951).
- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel did not ensure that certain slot numbers are valid, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call (bnc#949936).
- CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel did not validate attempted changes to the MTU value, which allowed context-dependent attackers to cause a denial of service (packet loss) via a value that was (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272 (bnc#955354).
- CVE-2015-8539: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c (bnc#958463).
- CVE-2015-8543: The networking implementation in the Linux kernel did not validate protocol identifiers for certain protocol families, which allowed local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application (bnc#958886).
- CVE-2015-8550: Optimizations introduced by the compiler could have lead to double fetch vulnerabilities, potentially  possibly leading to arbitrary code execution in backend (bsc#957988).
- CVE-2015-8551: Xen PCI backend driver did not perform proper sanity checks on the device's state, allowing for DoS (bsc#957990).
- CVE-2015-8569: The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel did not verify an address length, which allowed local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application (bnc#959190).
- CVE-2015-8575: The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel did not verify an address length, which allowed local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application (bnc#959399).
- CVE-2015-8660: The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel attempted to merge distinct setattr operations, which allowed local users to bypass intended access restrictions and modify the attributes of arbitrary overlay files via a crafted application (bnc#960281).
- CVE-2015-8767: net/sctp/sm_sideeffect.c in the Linux kernel did not properly manage the relationship between a lock and a socket, which allowed local users to cause a denial of service (deadlock) via a crafted sctp_accept call (bnc#961509).
- CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel allowed local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov (bnc#963765).
- CVE-2016-0723: Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call (bnc#961500).
- CVE-2016-2069: A race in invalidating paging structures that were not in use locally could have lead to disclosoure of information or arbitrary code exectution (bnc#963767).

The following non-security bugs were fixed:
- ACPI: Introduce apic_id in struct processor to save parsed APIC id (bsc#959463).
- ACPI: Make it possible to get local x2apic id via _MAT (bsc#959463).
- ACPI: use apic_id and remove duplicated _MAT evaluation (bsc#959463).
- ACPICA: Correctly cleanup after a ACPI table load failure (bnc#937261).
- Add sd_mod to initrd modules. For some reason PowerVM backend can't work without sd_mod
- Do not modify perf bias performance setting by default at boot (bnc#812259, bsc#959629).
- Documentation: Document kernel.panic_on_io_nmi sysctl (bsc#940946, bsc#937444).
- Driver for IBM System i/p VNIC protocol
- Drop blktap patches from SLE12, since the driver is unsupported
- Improve fairness when locking the per-superblock s_anon list (bsc#957525, bsc#941363).
- Input: aiptek - fix crash on detecting device without endpoints (bnc#956708).
- NFSD: Do not start lockd when only NFSv4 is running
- NFSv4: Recovery of recalled read delegations is broken (bsc#956514).
- Replace with 176bed1d vmstat: explicitly schedule per-cpu work on the CPU we need it to run on
- Revert 'ipv6: add complete rcu protection around np-&gt;opt' (bnc#961257).
- Revert 874bbfe60 workqueue: make sure delayed work run in local cpu 1. Without 22b886dd, 874bbfe60 leads to timer corruption. 2. With 22b886dd applied, victim of 1 reports performance regression (1,2 https://lkml.org/lkml/2016/2/4/618) 3. Leads to scheduling work to offlined CPU (bnc#959463). SLERT: 4. NO_HZ_FULL regressession, unbound delayed work timer is no longer deflected to a housekeeper CPU.
- be2net: fix some log messages (bnc#855062, bnc#867583).
- blktap: also call blkif_disconnect() when frontend switched to closed (bsc#952976).
- blktap: refine mm tracking (bsc#952976).
- block: Always check queue limits for cloned requests (bsc#902606).
- block: Always check queue limits for cloned requests (bsc#902606).
- bnx2x: Add new device ids under the Qlogic vendor (bnc#964821).
- btrfs: Add qgroup tracing (bnc#935087, bnc#945649).
- btrfs: Update btrfs qgroup status item when rescan is done (bnc#960300).
- btrfs: backref: Add special time_seq == (u64)-1 case for btrfs_find_all_roots() (bnc#935087, bnc#945649).
- btrfs: backref: Do not merge refs which are not for same block (bnc#935087, bnc#945649).
- btrfs: delayed-ref: Cleanup the unneeded functions (bnc#935087, bnc#945649).
- btrfs: delayed-ref: Use list to replace the ref_root in ref_head (bnc#935087, bnc#945649).
- btrfs: extent-tree: Use ref_node to replace unneeded parameters in __inc_extent_ref() and __free_extent() (bnc#935087, bnc#945649).
- btrfs: fix comp_oper to get right order (bnc#935087, bnc#945649).
- btrfs: fix deadlock between direct IO write and defrag/readpages (bnc#965344).
- btrfs: fix leak in qgroup_subtree_accounting() error path (bnc#935087, bnc#945649).
- btrfs: fix order by which delayed references are run (bnc#949440).
- btrfs: fix qgroup sanity tests (bnc#951615).
- btrfs: fix race waiting for qgroup rescan worker (bnc#960300).
- btrfs: fix regression running delayed references when using qgroups (bnc#951615).
- btrfs: fix regression when running delayed references (bnc#951615).
- btrfs: fix sleeping inside atomic context in qgroup rescan worker (bnc#960300).
- btrfs: keep dropped roots in cache until transaction commit (bnc#935087, bnc#945649).
- btrfs: qgroup: Add function qgroup_update_counters() (bnc#935087, bnc#945649).
- btrfs: qgroup: Add function qgroup_update_refcnt() (bnc#935087, bnc#945649).
- btrfs: qgroup: Add new function to record old_roots (bnc#935087, bnc#945649).
- btrfs: qgroup: Add new qgroup calculation function btrfs_qgroup_account_extents() (bnc#935087, bnc#945649).
- btrfs: qgroup: Add the ability to skip given qgroup for old/new_roots (bnc#935087, bnc#945649).
- btrfs: qgroup: Cleanup open-coded old/new_refcnt update and read (bnc#935087, bnc#945649).
- btrfs: qgroup: Cleanup the old ref_node-oriented mechanism (bnc#935087, bnc#945649).
- btrfs: qgroup: Do not copy extent buffer to do qgroup rescan (bnc#960300).
- btrfs: qgroup: Fix a regression in qgroup reserved space (bnc#935087, bnc#945649).
- btrfs: qgroup: Make snapshot accounting work with new extent-oriented qgroup (bnc#935087, bnc#945649).
- btrfs: qgroup: Record possible quota-related extent for qgroup (bnc#935087, bnc#945649).
- btrfs: qgroup: Switch rescan to new mechanism (bnc#935087, bnc#945649).
- btrfs: qgroup: Switch self test to extent-oriented qgroup mechanism (bnc#935087, bnc#945649).
- btrfs: qgroup: Switch to new extent-oriented qgroup mechanism (bnc#935087, bnc#945649).
- btrfs: qgroup: account shared subtree during snapshot delete (bnc#935087, bnc#945649).
- btrfs: qgroup: clear STATUS_FLAG_ON in disabling quota (bnc#960300).
- btrfs: qgroup: exit the rescan worker during umount (bnc#960300).
- btrfs: qgroup: fix quota disable during rescan (bnc#960300).
- btrfs: qgroup: move WARN_ON() to the correct location (bnc#935087, bnc#945649).
- btrfs: remove transaction from send (bnc#935087, bnc#945649).
- btrfs: skip locking when searching commit root (bnc#963825).
- btrfs: ulist: Add ulist_del() function (bnc#935087, bnc#945649).
- btrfs: use btrfs_get_fs_root in resolve_indirect_ref (bnc#935087, bnc#945649).
- crypto: nx - use common code for both NX decompress success cases (bsc#942476).
- crypto: nx-842 - Mask XERS0 bit in return value (bsc#960221).
- driver core: Add BUS_NOTIFY_REMOVED_DEVICE event (bnc#962965).
- drivers/firmware/memmap.c: do not allocate firmware_map_entry of same memory range (bsc#959463).
- drivers/firmware/memmap.c: do not create memmap sysfs of same firmware_map_entry (bsc#959463).
- drivers/firmware/memmap.c: pass the correct argument to firmware_map_find_entry_bootmem() (bsc#959463).
- e1000e: Do not read ICR in Other interrupt (bsc#924919).
- e1000e: Do not write lsc to ics in msi-x mode (bsc#924919).
- e1000e: Fix msi-x interrupt automask (bsc#924919).
- e1000e: Remove unreachable code (bsc#924919).
- fuse: break infinite loop in fuse_fill_write_pages() (bsc#963765).
- group-source-files: mark module.lds as devel file ld: cannot open linker script file /usr/src/linux-4.2.5-1/arch/arm/kernel/module.lds: No such file or directory
- ipv6: fix tunnel error handling (bsc#952579).
- jbd2: Fix unreclaimed pages after truncate in data=journal mode (bsc#961516).
- kABI: reintroduce blk_rq_check_limits.
- kabi: protect struct acpi_processor signature (bsc#959463).
- kernel/watchdog.c: perform all-CPU backtrace in case of hard lockup (bsc#940946, bsc#937444).
- kernel: Change ASSIGN_ONCE(val, x) to WRITE_ONCE(x, val) (bsc#940946, bsc#937444).
- kernel: Provide READ_ONCE and ASSIGN_ONCE (bsc#940946, bsc#937444).
- kernel: inadvertent free of the vector register save area (bnc#961202).
- kexec: Fix race between panic() and crash_kexec() (bsc#940946, bsc#937444).
- kgr: Remove the confusing search for fentry
- kgr: Safe way to avoid an infinite redirection
- kgr: do not print error for !abort_if_missing symbols (bnc#943989).
- kgr: do not use WQ_MEM_RECLAIM workqueue (bnc#963572).
- kgr: log when modifying kernel
- kgr: mark some more missed kthreads (bnc#962336).
- kgr: usb/storage: do not emit thread awakened (bnc#899908).
- kvm: Add arch specific mmu notifier for page invalidation (bsc#959463).
- kvm: Make init_rmode_identity_map() return 0 on success (bsc#959463).
- kvm: Remove ept_identity_pagetable from struct kvm_arch (bsc#959463).
- kvm: Rename make_all_cpus_request() to kvm_make_all_cpus_request() and make it non-static (bsc#959463).
- kvm: Use APIC_DEFAULT_PHYS_BASE macro as the apic access page address (bsc#959463).
- kvm: vmx: Implement set_apic_access_page_addr (bsc#959463).
- kvm: x86: Add request bit to reload APIC access page address (bsc#959463).
- kvm: x86: Unpin and remove kvm_arch-&gt;apic_access_page (bsc#959463).
- libiscsi: Fix host busy blocking during connection teardown.
- lpfc: Fix null ndlp dereference in target_reset_handler (bsc#951392).
- md/bitmap: do not pass -1 to bitmap_storage_alloc (bsc#955118).
- md/bitmap: remove confusing code from filemap_get_page.
- md/bitmap: remove rcu annotation from pointer arithmetic.
- mem-hotplug: reset node managed pages when hot-adding a new pgdat (bsc#959463).
- mem-hotplug: reset node present pages when hot-adding a new pgdat (bsc#959463).
- memory-hotplug: clear pgdat which is allocated by bootmem in try_offline_node() (bsc#959463).
- mm/memory_hotplug.c: check for missing sections in test_pages_in_a_zone() (VM Functionality, bnc#961588).
- mm/mempolicy.c: convert the shared_policy lock to a rwlock (VM Performance, bnc#959436).
- module: keep percpu symbols in module's symtab (bsc#962788).
- nmi: provide the option to issue an NMI back trace to every cpu but current (bsc#940946, bsc#937444).
- nmi: provide the option to issue an NMI back trace to every cpu but current (bsc#940946, bsc#937444).
- nvme: Clear BIO_SEG_VALID flag in nvme_bio_split() (bsc#954992).
- panic, x86: Allow CPUs to save registers even if looping in NMI context (bsc#940946, bsc#937444).
- panic, x86: Fix re-entrance problem due to panic on NMI (bsc#940946, bsc#937444).
- pci: Check for valid tags when calculating the VPD size (bsc#959146).
- qeth: initialize net_device with carrier off (bnc#964230).
- rpm/constraints.in: Bump disk space requirements up a bit Require 10GB on s390x, 20GB elsewhere.
- rpm/kernel-binary.spec.in: Fix build if no UEFI certs are installed
- rpm/kernel-binary.spec.in: Fix kernel-vanilla-devel dependency (bsc#959090)
- rpm/kernel-binary.spec.in: Fix paths in kernel-vanilla-devel (bsc#959090).
- rpm/kernel-binary.spec.in: Install libopenssl-devel for newer sign-file
- rpm/kernel-binary.spec.in: Use bzip compression to speed up build (bsc#962356)
- rpm/kernel-source.spec.in: Install kernel-macros for kernel-source-vanilla (bsc#959090)
- rpm/kernel-spec-macros: Do not modify the release string in PTFs (bsc#963449)
- rpm/package-descriptions: Add kernel-zfcpdump and drop -desktop
- s390/cio: ensure consistent measurement state (bnc#964230).
- s390/cio: fix measurement characteristics memleak (bnc#964230).
- s390/cio: update measurement characteristics (bnc#964230).
- s390/dasd: fix failfast for disconnected devices (bnc#961202).
- s390/vtime: correct scaled cputime for SMT (bnc#964230).
- s390/vtime: correct scaled cputime of partially idle CPUs (bnc#964230).
- s390/vtime: limit MT scaling value updates (bnc#964230).
- sched,numa: cap pte scanning overhead to 3% of run time (Automatic NUMA Balancing).
- sched/fair: Care divide error in update_task_scan_period() (bsc#959463).
- sched/fair: Disable tg load_avg/runnable_avg update for root_task_group (bnc#960227).
- sched/fair: Move cache hot load_avg/runnable_avg into separate cacheline (bnc#960227).
- sched/numa: Cap PTE scanning overhead to 3% of run time (Automatic NUMA Balancing).
- sched: Fix race between task_group and sched_task_group (Automatic NUMA Balancing).
- scsi: restart list search after unlock in scsi_remove_target (bsc#944749, bsc#959257).
- supported.conf: Add more QEMU and VMware drivers to -base (bsc#965840).
- supported.conf: Add netfilter modules to base (bsc#950292)
- supported.conf: Add nls_iso8859-1 and nls_cp437 to -base (bsc#950292)
- supported.conf: Add vfat to -base to be able to mount the ESP (bsc#950292).
- supported.conf: Add virtio_{blk,net,scsi} to kernel-default-base (bsc#950292)
- supported.conf: Also add virtio_pci to kernel-default-base (bsc#950292).
- supported.conf: drop +external from ghash-clmulni-intel It was agreed that it does not make sense to maintain 'external' for this specific module. Furthermore it causes problems in rather ordinary VMware environments. (bsc#961971)
- udp: properly support MSG_PEEK with truncated buffers (bsc#951199 bsc#959364).
- x86, xsave: Support eager-only xsave features, add MPX support (bsc#938577).
- x86/apic: Introduce apic_extnmi command line parameter (bsc#940946, bsc#937444).
- x86/fpu/xstate: Do not assume the first zero xfeatures zero bit means the end (bsc#938577).
- x86/fpu: Fix double-increment in setup_xstate_features() (bsc#938577).
- x86/fpu: Remove xsave_init() bootmem allocations (bsc#938577).
- x86/nmi: Save regs in crash dump on external NMI (bsc#940946, bsc#937444).
- x86/nmi: Save regs in crash dump on external NMI (bsc#940946, bsc#937444).
- xen/pciback: Do not allow MSI-X ops if PCI_COMMAND_MEMORY is not set (bsc#957990 XSA-157).
- xfs: add a few more verifier tests (bsc#947953).
- xfs: fix double free in xlog_recover_commit_trans (bsc#947953).
- xfs: recovery of XLOG_UNMOUNT_TRANS leaks memory (bsc#947953).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-25"/>
	<updated date="2016-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/812259">SUSE bug 812259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855062">SUSE bug 855062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867583">SUSE bug 867583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899908">SUSE bug 899908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902606">SUSE bug 902606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924919">SUSE bug 924919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935087">SUSE bug 935087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937261">SUSE bug 937261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937444">SUSE bug 937444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938577">SUSE bug 938577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940338">SUSE bug 940338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940946">SUSE bug 940946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941363">SUSE bug 941363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942476">SUSE bug 942476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943989">SUSE bug 943989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944749">SUSE bug 944749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945649">SUSE bug 945649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947953">SUSE bug 947953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949440">SUSE bug 949440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949936">SUSE bug 949936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950292">SUSE bug 950292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951199">SUSE bug 951199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951392">SUSE bug 951392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951615">SUSE bug 951615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952579">SUSE bug 952579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952976">SUSE bug 952976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954992">SUSE bug 954992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955118">SUSE bug 955118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955354">SUSE bug 955354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955654">SUSE bug 955654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956514">SUSE bug 956514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956708">SUSE bug 956708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957525">SUSE bug 957525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957990">SUSE bug 957990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958463">SUSE bug 958463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958886">SUSE bug 958886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958951">SUSE bug 958951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959090">SUSE bug 959090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959146">SUSE bug 959146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959190">SUSE bug 959190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959257">SUSE bug 959257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959364">SUSE bug 959364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959399">SUSE bug 959399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959436">SUSE bug 959436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959463">SUSE bug 959463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959629">SUSE bug 959629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960221">SUSE bug 960221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960227">SUSE bug 960227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960281">SUSE bug 960281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960300">SUSE bug 960300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961202">SUSE bug 961202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961257">SUSE bug 961257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961500">SUSE bug 961500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961509">SUSE bug 961509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961516">SUSE bug 961516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961588">SUSE bug 961588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961971">SUSE bug 961971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962336">SUSE bug 962336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962356">SUSE bug 962356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962788">SUSE bug 962788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962965">SUSE bug 962965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963449">SUSE bug 963449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963572">SUSE bug 963572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963765">SUSE bug 963765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963767">SUSE bug 963767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963825">SUSE bug 963825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964230">SUSE bug 964230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964821">SUSE bug 964821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965344">SUSE bug 965344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965840">SUSE bug 965840</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7446/">CVE-2013-7446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0272/">CVE-2015-0272</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5707/">CVE-2015-5707</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7550/">CVE-2015-7550</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7799/">CVE-2015-7799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8215/">CVE-2015-8215</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8539/">CVE-2015-8539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8543/">CVE-2015-8543</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8551/">CVE-2015-8551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8569/">CVE-2015-8569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8575/">CVE-2015-8575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8660/">CVE-2015-8660</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8767/">CVE-2015-8767</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8785/">CVE-2015-8785</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0723/">CVE-2016-0723</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2069/">CVE-2016-2069</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516854" comment="kernel-default-3.12.53-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516855" comment="kernel-default-devel-3.12.53-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516856" comment="kernel-default-extra-3.12.53-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516857" comment="kernel-devel-3.12.53-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516858" comment="kernel-macros-3.12.53-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516859" comment="kernel-source-3.12.53-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516860" comment="kernel-syms-3.12.53-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516861" comment="kernel-xen-3.12.53-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516862" comment="kernel-xen-devel-3.12.53-60.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77656" version="1" class="patch">
	<metadata>
		<title>Security update for libpng15 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="954980" ref_url="https://bugzilla.suse.com/954980" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001783.html" source="SUSE-SU"/>
		<description>

      This update fixes the following security issue:

      * CVE-2015-8126 Possible buffer overflow vulnerabilities in png_get_PLTE and png_set_PLTE functions could cause a denial of service (application crash) or possibly have an unspecified impact [bsc#954980]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-07"/>
	<updated date="2016-01-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516863" comment="libpng15-15-1.5.22-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77657" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="958501" ref_url="https://bugzilla.suse.com/958501" source="BUGZILLA"/>
		<reference ref_id="963415" ref_url="https://bugzilla.suse.com/963415" source="BUGZILLA"/>
		<reference ref_id="968046" ref_url="https://bugzilla.suse.com/968046" source="BUGZILLA"/>
		<reference ref_id="968047" ref_url="https://bugzilla.suse.com/968047" source="BUGZILLA"/>
		<reference ref_id="968048" ref_url="https://bugzilla.suse.com/968048" source="BUGZILLA"/>
		<reference ref_id="968050" ref_url="https://bugzilla.suse.com/968050" source="BUGZILLA"/>
		<reference ref_id="968051" ref_url="https://bugzilla.suse.com/968051" source="BUGZILLA"/>
		<reference ref_id="968053" ref_url="https://bugzilla.suse.com/968053" source="BUGZILLA"/>
		<reference ref_id="968265" ref_url="https://bugzilla.suse.com/968265" source="BUGZILLA"/>
		<reference ref_id="968374" ref_url="https://bugzilla.suse.com/968374" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0703" ref_url="https://www.suse.com/security/cve/CVE-2016-0703/" source="CVE"/>
		<reference ref_id="CVE-2016-0704" ref_url="https://www.suse.com/security/cve/CVE-2016-0704/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0798" ref_url="https://www.suse.com/security/cve/CVE-2016-0798/" source="CVE"/>
		<reference ref_id="CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes various security issues: 

Security issues fixed:
- CVE-2016-0800 aka the 'DROWN' attack (bsc#968046):
  OpenSSL was vulnerable to a cross-protocol attack that could lead to
  decryption of TLS sessions by using a server supporting SSLv2 and
  EXPORT cipher suites as a Bleichenbacher RSA padding oracle.

  This update changes the openssl library to:

  * Disable SSLv2 protocol support by default.
   
    This can be overridden by setting the environment variable
    'OPENSSL_ALLOW_SSL2' or by using SSL_CTX_clear_options using the
    SSL_OP_NO_SSLv2 flag.

    Note that various services and clients had already disabled SSL
    protocol 2 by default previously.

  * Disable all weak EXPORT ciphers by default. These can be reenabled
    if required by old legacy software using the environment variable
    'OPENSSL_ALLOW_EXPORT'.

- CVE-2016-0702 aka the 'CacheBleed' attack. (bsc#968050)
  Various changes in the modular exponentation code were added that
  make sure that it is not possible to recover RSA secret keys by
  analyzing cache-bank conflicts on the Intel Sandy-Bridge microarchitecture.

  Note that this was only exploitable if the malicious code was running
  on the same hyper threaded Intel Sandy Bridge processor as the victim
  thread performing decryptions.

- CVE-2016-0705 (bnc#968047):
  A double free() bug in the DSA ASN1 parser code was fixed that could
  be abused to facilitate a denial-of-service attack.

- CVE-2016-0797 (bnc#968048):
  The BN_hex2bn() and BN_dec2bn() functions had a bug that could
  result in an attempt to de-reference a NULL pointer leading to crashes.
  This could have security consequences if these functions were ever called by
  user applications with large untrusted hex/decimal data. Also,
  internal usage of these functions in OpenSSL uses data from config
  files or application command line arguments. If user developed
  applications generated config file data based on untrusted data,
  then this could have had security consequences as well.

- CVE-2016-0798 (bnc#968265)
  The SRP user database lookup method SRP_VBASE_get_by_user() had a memory
  leak that attackers could abuse to facility DoS attacks. To mitigate
  the issue, the seed handling in SRP_VBASE_get_by_user() was disabled
  even if the user has configured a seed. Applications are advised to
  migrate to SRP_VBASE_get1_by_user().

- CVE-2016-0799 (bnc#968374)
  On many 64 bit systems, the internal fmtstr() and doapr_outch()
  functions could miscalculate the length of a string and attempt to
  access out-of-bounds memory locations. These problems could have
  enabled attacks where large amounts of untrusted data is passed to
  the BIO_*printf functions. If applications use these functions in
  this way then they could have been vulnerable. OpenSSL itself uses
  these functions when printing out human-readable dumps of ASN.1
  data. Therefore applications that print this data could have been
  vulnerable if the data is from untrusted sources. OpenSSL command line
  applications could also have been vulnerable when they print out ASN.1
  data, or if untrusted data is passed as command line arguments. Libssl
  is not considered directly vulnerable.

- CVE-2015-3197 (bsc#963415):
  The SSLv2 protocol did not block disabled ciphers.

Note that the March 1st 2016 release also references following CVEs
that were fixed by us with CVE-2015-0293 in 2015:

- CVE-2016-0703 (bsc#968051): This issue only affected versions of
  OpenSSL prior to March 19th 2015 at which time the code was refactored
  to address vulnerability CVE-2015-0293. It would have made the above
  'DROWN' attack much easier.
- CVE-2016-0704 (bsc#968053): 'Bleichenbacher oracle in SSLv2'
  This issue only affected versions of OpenSSL prior to March 19th
  2015 at which time the code was refactored to address vulnerability
  CVE-2015-0293. It would have made the above 'DROWN' attack much easier.

Also the following bug was fixed:
- Ensure that OpenSSL doesn't fall back to the default digest
  algorithm (SHA1) in case a non-FIPS algorithm was negotiated while
  running in FIPS mode. Instead, OpenSSL will refuse the session.
  (bnc#958501)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-01"/>
	<updated date="2016-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/958501">SUSE bug 958501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963415">SUSE bug 963415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968047">SUSE bug 968047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968048">SUSE bug 968048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968050">SUSE bug 968050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968051">SUSE bug 968051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968053">SUSE bug 968053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968265">SUSE bug 968265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968374">SUSE bug 968374</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0703/">CVE-2016-0703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0704/">CVE-2016-0704</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0798/">CVE-2016-0798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516864" comment="libopenssl1_0_0-1.0.1i-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516865" comment="libopenssl1_0_0-32bit-1.0.1i-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516866" comment="openssl-1.0.1i-44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77658" version="1" class="patch">
	<metadata>
		<title>Security update for libssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="965875" ref_url="https://bugzilla.suse.com/965875" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0739" ref_url="https://www.suse.com/security/cve/CVE-2016-0739/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001908.html" source="SUSE-SU"/>
		<description>

This update for libssh fixes the following issues: 

- CVE-2016-0739: Fix Weakness in diffie-hellman secret key generation. (bsc#965875)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-01"/>
	<updated date="2016-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/965875">SUSE bug 965875</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0739/">CVE-2016-0739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515802" comment="libssh4-0.6.3-11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77659" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="952871" ref_url="https://bugzilla.suse.com/952871" source="BUGZILLA"/>
		<reference ref_id="963415" ref_url="https://bugzilla.suse.com/963415" source="BUGZILLA"/>
		<reference ref_id="968046" ref_url="https://bugzilla.suse.com/968046" source="BUGZILLA"/>
		<reference ref_id="968048" ref_url="https://bugzilla.suse.com/968048" source="BUGZILLA"/>
		<reference ref_id="968051" ref_url="https://bugzilla.suse.com/968051" source="BUGZILLA"/>
		<reference ref_id="968053" ref_url="https://bugzilla.suse.com/968053" source="BUGZILLA"/>
		<reference ref_id="968374" ref_url="https://bugzilla.suse.com/968374" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0703" ref_url="https://www.suse.com/security/cve/CVE-2016-0703/" source="CVE"/>
		<reference ref_id="CVE-2016-0704" ref_url="https://www.suse.com/security/cve/CVE-2016-0704/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html" source="SUSE-SU"/>
		<description>

This update for compat-openssl098 fixes various security issues and bugs: 

Security issues fixed:
- CVE-2016-0800 aka the 'DROWN' attack (bsc#968046):
  OpenSSL was vulnerable to a cross-protocol attack that could lead to
  decryption of TLS sessions by using a server supporting SSLv2 and
  EXPORT cipher suites as a Bleichenbacher RSA padding oracle.

  This update changes the openssl library to:

  * Disable SSLv2 protocol support by default.

    This can be overridden by setting the environment variable
    'OPENSSL_ALLOW_SSL2' or by using SSL_CTX_clear_options using the
    SSL_OP_NO_SSLv2 flag.

    Note that various services and clients had already disabled SSL
    protocol 2 by default previously.

  * Disable all weak EXPORT ciphers by default. These can be reenabled
    if required by old legacy software using the environment variable
    'OPENSSL_ALLOW_EXPORT'.

- CVE-2016-0797 (bnc#968048):
  The BN_hex2bn() and BN_dec2bn() functions had a bug that could result
  in an attempt to de-reference a NULL pointer leading to crashes.
  This could have security consequences if these functions were ever
  called by user applications with large untrusted hex/decimal data. Also,
  internal usage of these functions in OpenSSL uses data from config files
  or application command line arguments. If user developed applications
  generated config file data based on untrusted data, then this could
  have had security consequences as well.

- CVE-2016-0799 (bnc#968374)
  On many 64 bit systems, the internal fmtstr() and doapr_outch()
  functions could miscalculate the length of a string and attempt to
  access out-of-bounds memory locations. These problems could have
  enabled attacks where large amounts of untrusted data is passed to
  the BIO_*printf functions. If applications use these functions in
  this way then they could have been vulnerable. OpenSSL itself uses
  these functions when printing out human-readable dumps of ASN.1
  data. Therefore applications that print this data could have been
  vulnerable if the data is from untrusted sources. OpenSSL command line
  applications could also have been vulnerable when they print out ASN.1
  data, or if untrusted data is passed as command line arguments. Libssl
  is not considered directly vulnerable.

- CVE-2015-3197 (bsc#963415):
  The SSLv2 protocol did not block disabled ciphers.

Note that the March 1st 2016 release also references following CVEs
that were fixed by us with CVE-2015-0293 in 2015:

- CVE-2016-0703 (bsc#968051): This issue only affected versions of
  OpenSSL prior to March 19th 2015 at which time the code was refactored
  to address vulnerability CVE-2015-0293. It would have made the above
  'DROWN' attack much easier.
- CVE-2016-0704 (bsc#968053): 'Bleichenbacher oracle in SSLv2'
  This issue only affected versions of OpenSSL prior to March 19th
  2015 at which time the code was refactored to address vulnerability
  CVE-2015-0293. It would have made the above 'DROWN' attack much easier.

Also fixes the following bug:
- Avoid running OPENSSL_config twice. This avoids breaking
  engine loading and also fixes a memory leak in libssl. (bsc#952871)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-03"/>
	<updated date="2016-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/952871">SUSE bug 952871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963415">SUSE bug 963415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968048">SUSE bug 968048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968051">SUSE bug 968051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968053">SUSE bug 968053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968374">SUSE bug 968374</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0703/">CVE-2016-0703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0704/">CVE-2016-0704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515803" comment="libopenssl0_9_8-0.9.8j-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515804" comment="libopenssl0_9_8-32bit-0.9.8j-94.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77660" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="954980" ref_url="https://bugzilla.suse.com/954980" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001789.html" source="SUSE-SU"/>
		<description>

  This update fixes the following security issue
  * CVE-2015-8126 Multiple buffer overflows in the png_set_PLTE and png_get_PLTE functions
    allow remote attackers to cause a denial of service (application crash) or possibly have 
    unspecified other impact [bsc#954980]
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-07"/>
	<updated date="2016-01-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515805" comment="libpng12-0-1.2.50-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515806" comment="libpng12-0-32bit-1.2.50-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77661" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="928193" ref_url="https://bugzilla.suse.com/928193" source="BUGZILLA"/>
		<reference ref_id="951734" ref_url="https://bugzilla.suse.com/951734" source="BUGZILLA"/>
		<reference ref_id="951735" ref_url="https://bugzilla.suse.com/951735" source="BUGZILLA"/>
		<reference ref_id="954429" ref_url="https://bugzilla.suse.com/954429" source="BUGZILLA"/>
		<reference ref_id="956018" ref_url="https://bugzilla.suse.com/956018" source="BUGZILLA"/>
		<reference ref_id="956021" ref_url="https://bugzilla.suse.com/956021" source="BUGZILLA"/>
		<reference ref_id="956260" ref_url="https://bugzilla.suse.com/956260" source="BUGZILLA"/>
		<reference ref_id="957105" ref_url="https://bugzilla.suse.com/957105" source="BUGZILLA"/>
		<reference ref_id="957106" ref_url="https://bugzilla.suse.com/957106" source="BUGZILLA"/>
		<reference ref_id="957107" ref_url="https://bugzilla.suse.com/957107" source="BUGZILLA"/>
		<reference ref_id="957109" ref_url="https://bugzilla.suse.com/957109" source="BUGZILLA"/>
		<reference ref_id="957110" ref_url="https://bugzilla.suse.com/957110" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-8035" ref_url="https://www.suse.com/security/cve/CVE-2015-8035/" source="CVE"/>
		<reference ref_id="CVE-2015-8241" ref_url="https://www.suse.com/security/cve/CVE-2015-8241/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2015-8317" ref_url="https://www.suse.com/security/cve/CVE-2015-8317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<description>
- security update:
      This update fixes the following security issues: 

    * CVE-2015-1819 Enforce the reader to run in constant memory [bnc#928193]
    * CVE-2015-7941 Fix out of bound read with crafted xml input by stopping parsing on entities boundaries errors [bnc#951734]
    * CVE-2015-7942 Fix another variation of overflow in Conditional sections [bnc#951735]
    * CVE-2015-8241 Avoid extra processing of MarkupDecl when EOF [bnc#956018]
    * CVE-2015-8242 Buffer overead with HTML parser in push mode [bnc#956021]
    * CVE-2015-8317 Return if the encoding declaration is broken or encoding conversion failed [bnc#956260]
    * CVE-2015-5312 Fix another entity expansion issue [bnc#957105]
    * CVE-2015-7497 Avoid an heap buffer overflow in xmlDictComputeFastQKey [bnc#957106]
    * CVE-2015-7498 Processes entities after encoding conversion failures [bnc#957107]
    * CVE-2015-7499 Add xmlHaltParser() to stop the parser / Detect incoherency on GROW [bnc#957109]
    * CVE-2015-8317 Multiple out-of-bound read could lead to denial of service [bnc#956260]
    * CVE-2015-8035 DoS when parsing specially crafted XML document if XZ support is enabled [bnc#954429]
    * CVE-2015-7500 Fix memory access error due to incorrect entities boundaries [bnc#957110] 
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-07"/>
	<updated date="2016-01-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/928193">SUSE bug 928193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951734">SUSE bug 951734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951735">SUSE bug 951735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954429">SUSE bug 954429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956018">SUSE bug 956018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956021">SUSE bug 956021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956260">SUSE bug 956260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957105">SUSE bug 957105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957106">SUSE bug 957106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957107">SUSE bug 957107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957109">SUSE bug 957109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957110">SUSE bug 957110</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8035/">CVE-2015-8035</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8241/">CVE-2015-8241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8317/">CVE-2015-8317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515807" comment="libxml2-2-2.9.1-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515808" comment="libxml2-2-32bit-2.9.1-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515809" comment="libxml2-tools-2.9.1-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515810" comment="python-libxml2-2.9.1-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77662" version="1" class="patch">
	<metadata>
		<title>Security update for libotr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="969785" ref_url="https://bugzilla.suse.com/969785" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2851" ref_url="https://www.suse.com/security/cve/CVE-2016-2851/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001919.html" source="SUSE-SU"/>
		<description>

This update for libotr fixes the following issue:

- Apply 'libotr-CVE-2016-2851.patch' to fix integer overflows that
  used to occur on 64-bit architectures when receiving 4GB messages.
  This flaw could potentially have been exploited by an attacker to
  remotely execute arbitrary code on the user's machine
  * (CVE-2016-2851, bsc#969785)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-09"/>
	<updated date="2016-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/969785">SUSE bug 969785</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2851/">CVE-2016-2851</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515811" comment="libotr5-4.0.0-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77663" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="970547" ref_url="https://bugzilla.suse.com/970547" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0960" ref_url="https://www.suse.com/security/cve/CVE-2016-0960/" source="CVE"/>
		<reference ref_id="CVE-2016-0961" ref_url="https://www.suse.com/security/cve/CVE-2016-0961/" source="CVE"/>
		<reference ref_id="CVE-2016-0962" ref_url="https://www.suse.com/security/cve/CVE-2016-0962/" source="CVE"/>
		<reference ref_id="CVE-2016-0963" ref_url="https://www.suse.com/security/cve/CVE-2016-0963/" source="CVE"/>
		<reference ref_id="CVE-2016-0986" ref_url="https://www.suse.com/security/cve/CVE-2016-0986/" source="CVE"/>
		<reference ref_id="CVE-2016-0987" ref_url="https://www.suse.com/security/cve/CVE-2016-0987/" source="CVE"/>
		<reference ref_id="CVE-2016-0988" ref_url="https://www.suse.com/security/cve/CVE-2016-0988/" source="CVE"/>
		<reference ref_id="CVE-2016-0989" ref_url="https://www.suse.com/security/cve/CVE-2016-0989/" source="CVE"/>
		<reference ref_id="CVE-2016-0990" ref_url="https://www.suse.com/security/cve/CVE-2016-0990/" source="CVE"/>
		<reference ref_id="CVE-2016-0991" ref_url="https://www.suse.com/security/cve/CVE-2016-0991/" source="CVE"/>
		<reference ref_id="CVE-2016-0992" ref_url="https://www.suse.com/security/cve/CVE-2016-0992/" source="CVE"/>
		<reference ref_id="CVE-2016-0993" ref_url="https://www.suse.com/security/cve/CVE-2016-0993/" source="CVE"/>
		<reference ref_id="CVE-2016-0994" ref_url="https://www.suse.com/security/cve/CVE-2016-0994/" source="CVE"/>
		<reference ref_id="CVE-2016-0995" ref_url="https://www.suse.com/security/cve/CVE-2016-0995/" source="CVE"/>
		<reference ref_id="CVE-2016-0996" ref_url="https://www.suse.com/security/cve/CVE-2016-0996/" source="CVE"/>
		<reference ref_id="CVE-2016-0997" ref_url="https://www.suse.com/security/cve/CVE-2016-0997/" source="CVE"/>
		<reference ref_id="CVE-2016-0998" ref_url="https://www.suse.com/security/cve/CVE-2016-0998/" source="CVE"/>
		<reference ref_id="CVE-2016-0999" ref_url="https://www.suse.com/security/cve/CVE-2016-0999/" source="CVE"/>
		<reference ref_id="CVE-2016-1000" ref_url="https://www.suse.com/security/cve/CVE-2016-1000/" source="CVE"/>
		<reference ref_id="CVE-2016-1001" ref_url="https://www.suse.com/security/cve/CVE-2016-1001/" source="CVE"/>
		<reference ref_id="CVE-2016-1002" ref_url="https://www.suse.com/security/cve/CVE-2016-1002/" source="CVE"/>
		<reference ref_id="CVE-2016-1005" ref_url="https://www.suse.com/security/cve/CVE-2016-1005/" source="CVE"/>
		<reference ref_id="CVE-2016-1010" ref_url="https://www.suse.com/security/cve/CVE-2016-1010/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<description>

Adobe flash-player was updated to 11.2.202.577 to fix the following
list of security issues (bsc#970547):

These updates resolve integer overflow vulnerabilities that could lead
to code execution (CVE-2016-0963, CVE-2016-0993, CVE-2016-1010).

These updates resolve use-after-free vulnerabilities that could
lead to code execution (CVE-2016-0987, CVE-2016-0988, CVE-2016-0990,
CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997,
CVE-2016-0998, CVE-2016-0999, CVE-2016-1000).

These updates resolve a heap overflow vulnerability that could lead to
code execution (CVE-2016-1001).

These updates resolve memory corruption vulnerabilities that could
lead to code execution (CVE-2016-0960, CVE-2016-0961, CVE-2016-0962,
CVE-2016-0986, CVE-2016-0989, CVE-2016-0992, CVE-2016-1002,
CVE-2016-1005).

Adobe advisory with more information:
https://helpx.adobe.com/security/products/flash-player/apsb16-08.html

		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-11"/>
	<updated date="2016-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0960/">CVE-2016-0960</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0961/">CVE-2016-0961</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0962/">CVE-2016-0962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0963/">CVE-2016-0963</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0986/">CVE-2016-0986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0987/">CVE-2016-0987</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0988/">CVE-2016-0988</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0989/">CVE-2016-0989</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0990/">CVE-2016-0990</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0991/">CVE-2016-0991</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0992/">CVE-2016-0992</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0993/">CVE-2016-0993</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0994/">CVE-2016-0994</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0995/">CVE-2016-0995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0996/">CVE-2016-0996</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0997/">CVE-2016-0997</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0998/">CVE-2016-0998</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0999/">CVE-2016-0999</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1000/">CVE-2016-1000</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1001/">CVE-2016-1001</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1002/">CVE-2016-1002</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1005/">CVE-2016-1005</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1010/">CVE-2016-1010</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515812" comment="flash-player-11.2.202.577-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515813" comment="flash-player-gnome-11.2.202.577-123.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77664" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="933336" ref_url="https://bugzilla.suse.com/933336" source="BUGZILLA"/>
		<reference ref_id="961964" ref_url="https://bugzilla.suse.com/961964" source="BUGZILLA"/>
		<reference ref_id="967026" ref_url="https://bugzilla.suse.com/967026" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0787" ref_url="https://www.suse.com/security/cve/CVE-2016-0787/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001922.html" source="SUSE-SU"/>
		<description>

This update for libssh2_org fixes the following issues: 

Security issue fixed:
- CVE-2016-0787 (bsc#967026):
  Weakness in diffie-hellman secret key generation lead to much shorter DH groups
  then needed, which could be used to retrieve server keys.

A feature was added:
- Support of SHA256 digests for DH group exchanges was added (fate#320343, bsc#961964)

Bug fixed:
- Properly detect EVP_aes_128_ctr at configure time (bsc#933336)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-11"/>
	<updated date="2016-03-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/933336">SUSE bug 933336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961964">SUSE bug 961964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967026">SUSE bug 967026</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0787/">CVE-2016-0787</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515814" comment="libssh2-1-1.4.3-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515815" comment="libssh2-1-32bit-1.4.3-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77665" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="969894" ref_url="https://bugzilla.suse.com/969894" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1952" ref_url="https://www.suse.com/security/cve/CVE-2016-1952/" source="CVE"/>
		<reference ref_id="CVE-2016-1953" ref_url="https://www.suse.com/security/cve/CVE-2016-1953/" source="CVE"/>
		<reference ref_id="CVE-2016-1954" ref_url="https://www.suse.com/security/cve/CVE-2016-1954/" source="CVE"/>
		<reference ref_id="CVE-2016-1957" ref_url="https://www.suse.com/security/cve/CVE-2016-1957/" source="CVE"/>
		<reference ref_id="CVE-2016-1958" ref_url="https://www.suse.com/security/cve/CVE-2016-1958/" source="CVE"/>
		<reference ref_id="CVE-2016-1960" ref_url="https://www.suse.com/security/cve/CVE-2016-1960/" source="CVE"/>
		<reference ref_id="CVE-2016-1961" ref_url="https://www.suse.com/security/cve/CVE-2016-1961/" source="CVE"/>
		<reference ref_id="CVE-2016-1962" ref_url="https://www.suse.com/security/cve/CVE-2016-1962/" source="CVE"/>
		<reference ref_id="CVE-2016-1964" ref_url="https://www.suse.com/security/cve/CVE-2016-1964/" source="CVE"/>
		<reference ref_id="CVE-2016-1965" ref_url="https://www.suse.com/security/cve/CVE-2016-1965/" source="CVE"/>
		<reference ref_id="CVE-2016-1966" ref_url="https://www.suse.com/security/cve/CVE-2016-1966/" source="CVE"/>
		<reference ref_id="CVE-2016-1974" ref_url="https://www.suse.com/security/cve/CVE-2016-1974/" source="CVE"/>
		<reference ref_id="CVE-2016-1977" ref_url="https://www.suse.com/security/cve/CVE-2016-1977/" source="CVE"/>
		<reference ref_id="CVE-2016-1978" ref_url="https://www.suse.com/security/cve/CVE-2016-1978/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<reference ref_id="CVE-2016-2790" ref_url="https://www.suse.com/security/cve/CVE-2016-2790/" source="CVE"/>
		<reference ref_id="CVE-2016-2791" ref_url="https://www.suse.com/security/cve/CVE-2016-2791/" source="CVE"/>
		<reference ref_id="CVE-2016-2792" ref_url="https://www.suse.com/security/cve/CVE-2016-2792/" source="CVE"/>
		<reference ref_id="CVE-2016-2793" ref_url="https://www.suse.com/security/cve/CVE-2016-2793/" source="CVE"/>
		<reference ref_id="CVE-2016-2794" ref_url="https://www.suse.com/security/cve/CVE-2016-2794/" source="CVE"/>
		<reference ref_id="CVE-2016-2795" ref_url="https://www.suse.com/security/cve/CVE-2016-2795/" source="CVE"/>
		<reference ref_id="CVE-2016-2796" ref_url="https://www.suse.com/security/cve/CVE-2016-2796/" source="CVE"/>
		<reference ref_id="CVE-2016-2797" ref_url="https://www.suse.com/security/cve/CVE-2016-2797/" source="CVE"/>
		<reference ref_id="CVE-2016-2798" ref_url="https://www.suse.com/security/cve/CVE-2016-2798/" source="CVE"/>
		<reference ref_id="CVE-2016-2799" ref_url="https://www.suse.com/security/cve/CVE-2016-2799/" source="CVE"/>
		<reference ref_id="CVE-2016-2800" ref_url="https://www.suse.com/security/cve/CVE-2016-2800/" source="CVE"/>
		<reference ref_id="CVE-2016-2801" ref_url="https://www.suse.com/security/cve/CVE-2016-2801/" source="CVE"/>
		<reference ref_id="CVE-2016-2802" ref_url="https://www.suse.com/security/cve/CVE-2016-2802/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox, mozilla-nspr, mozilla-nss fixes the following issues:

Mozilla Firefox was updated to 38.7.0 ESR (bsc#969894), fixing
following security issues:
* MFSA 2016-16/CVE-2016-1952/CVE-2016-1953
  Miscellaneous memory safety hazards (rv:45.0 / rv:38.7)
* MFSA 2016-17/CVE-2016-1954
  Local file overwriting and potential privilege escalation
  through CSP reports
* MFSA 2016-20/CVE-2016-1957
  Memory leak in libstagefright when deleting an array during
  MP4 processing
* MFSA 2016-21/CVE-2016-1958
  Displayed page address can be overridden
* MFSA 2016-23/CVE-2016-1960
  Use-after-free in HTML5 string parser
* MFSA 2016-24/CVE-2016-1961
  Use-after-free in SetBody
* MFSA 2016-25/CVE-2016-1962
  Use-after-free when using multiple WebRTC data channels
* MFSA 2016-27/CVE-2016-1964
  Use-after-free during XML transformations
* MFSA 2016-28/CVE-2016-1965
  Addressbar spoofing though history navigation and Location
  protocol property
* MFSA 2016-31/CVE-2016-1966
  Memory corruption with malicious NPAPI plugin
* MFSA 2016-34/CVE-2016-1974
  Out-of-bounds read in HTML parser following a failed
  allocation
* MFSA 2016-35/CVE-2016-1950
  Buffer overflow during ASN.1 decoding in NSS
* MFSA 2016-37/CVE-2016-1977/CVE-2016-2790/CVE-2016-2791/
  CVE-2016-2792/CVE-2016-2793/CVE-2016-2794/CVE-2016-2795/
  CVE-2016-2796/CVE-2016-2797/CVE-2016-2798/CVE-2016-2799/
  CVE-2016-2800/CVE-2016-2801/CVE-2016-2802
  Font vulnerabilities in the Graphite 2 library

Mozilla NSPR was updated to version 4.12 (bsc#969894), fixing following bugs:
* added a PR_GetEnvSecure function, which attempts to detect if
  the program is being executed with elevated privileges, and
  returns NULL if detected. It is recommended to use this function
  in general purpose library code.
* fixed a memory allocation bug related to the PR_*printf functions
* exported API PR_DuplicateEnvironment, which had already been
  added in NSPR 4.10.9
* added support for FreeBSD aarch64
* several minor correctness and compatibility fixes

Mozilla NSS was updated to fix security issues (bsc#969894):
* MFSA 2016-15/CVE-2016-1978
  Use-after-free in NSS during SSL connections in low memory
* MFSA 2016-35/CVE-2016-1950
  Buffer overflow during ASN.1 decoding in NSS
* MFSA 2016-36/CVE-2016-1979
  Use-after-free during processing of DER encoded keys in NSS
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-11"/>
	<updated date="2016-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1952/">CVE-2016-1952</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1953/">CVE-2016-1953</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1954/">CVE-2016-1954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1957/">CVE-2016-1957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1958/">CVE-2016-1958</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1960/">CVE-2016-1960</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1961/">CVE-2016-1961</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1962/">CVE-2016-1962</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1964/">CVE-2016-1964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1965/">CVE-2016-1965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1966/">CVE-2016-1966</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1974/">CVE-2016-1974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1977/">CVE-2016-1977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1978/">CVE-2016-1978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2790/">CVE-2016-2790</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2791/">CVE-2016-2791</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2792/">CVE-2016-2792</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2793/">CVE-2016-2793</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2794/">CVE-2016-2794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2795/">CVE-2016-2795</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2796/">CVE-2016-2796</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2797/">CVE-2016-2797</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2798/">CVE-2016-2798</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2799/">CVE-2016-2799</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2800/">CVE-2016-2800</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2801/">CVE-2016-2801</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2802/">CVE-2016-2802</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515816" comment="MozillaFirefox-38.7.0esr-63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515817" comment="MozillaFirefox-translations-38.7.0esr-63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515818" comment="libfreebl3-3.20.2-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515819" comment="libfreebl3-32bit-3.20.2-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515820" comment="libsoftokn3-3.20.2-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515821" comment="libsoftokn3-32bit-3.20.2-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515822" comment="mozilla-nspr-4.12-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515823" comment="mozilla-nspr-32bit-4.12-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515824" comment="mozilla-nss-3.20.2-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515825" comment="mozilla-nss-32bit-3.20.2-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515826" comment="mozilla-nss-certs-3.20.2-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515827" comment="mozilla-nss-certs-32bit-3.20.2-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515828" comment="mozilla-nss-sysinit-3.20.2-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515829" comment="mozilla-nss-sysinit-32bit-3.20.2-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515830" comment="mozilla-nss-tools-3.20.2-40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77666" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="970072" ref_url="https://bugzilla.suse.com/970072" source="BUGZILLA"/>
		<reference ref_id="970073" ref_url="https://bugzilla.suse.com/970073" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1285" ref_url="https://www.suse.com/security/cve/CVE-2016-1285/" source="CVE"/>
		<reference ref_id="CVE-2016-1286" ref_url="https://www.suse.com/security/cve/CVE-2016-1286/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00046.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

Fix two assertion failures that can lead to a remote denial of service attack:
* CVE-2016-1285: An error when parsing signature records for DNAME can lead to named exiting due to an assertion failure. (bsc#970072)
* CVE-2016-1286: An error when parsing signature records for DNAME records having specific properties can lead to named exiting due to an assertion failure in resolver.c or db.c. (bsc#970073)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-14"/>
	<updated date="2016-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/970072">SUSE bug 970072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970073">SUSE bug 970073</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1285/">CVE-2016-1285</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1286/">CVE-2016-1286</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516867" comment="bind-libs-9.9.6P1-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516868" comment="bind-libs-32bit-9.9.6P1-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516869" comment="bind-utils-9.9.6P1-38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77667" version="1" class="patch">
	<metadata>
		<title>Security update for graphite2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="965803" ref_url="https://bugzilla.suse.com/965803" source="BUGZILLA"/>
		<reference ref_id="965807" ref_url="https://bugzilla.suse.com/965807" source="BUGZILLA"/>
		<reference ref_id="965810" ref_url="https://bugzilla.suse.com/965810" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1521" ref_url="https://www.suse.com/security/cve/CVE-2016-1521/" source="CVE"/>
		<reference ref_id="CVE-2016-1523" ref_url="https://www.suse.com/security/cve/CVE-2016-1523/" source="CVE"/>
		<reference ref_id="CVE-2016-1526" ref_url="https://www.suse.com/security/cve/CVE-2016-1526/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0779-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00052.html" source="SUSE-SU"/>
		<description>

This update for graphite2 fixes the following issues:

- CVE-2016-1521: The directrun function in directmachine.cpp in
  Libgraphite did not validate a certain skip operation, which allowed
  remote attackers to execute arbitrary code, obtain sensitive information,
  or cause a denial of service (out-of-bounds read and application crash)
  via a crafted Graphite smart font.

- CVE-2016-1523: The SillMap::readFace function in FeatureMap.cpp in
  Libgraphite mishandled a return value, which allowed remote attackers
  to cause a denial of service (missing initialization, NULL pointer
  dereference, and application crash) via a crafted Graphite smart font.

- CVE-2016-1526: The TtfUtil:LocaLookup function in TtfUtil.cpp in
  Libgraphite incorrectly validated a size value, which allowed remote
  attackers to obtain sensitive information or cause a denial of service
  (out-of-bounds read and application crash) via a crafted Graphite
  smart font.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-15"/>
	<updated date="2016-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/965803">SUSE bug 965803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965807">SUSE bug 965807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965810">SUSE bug 965810</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1521/">CVE-2016-1521</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1523/">CVE-2016-1523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1526/">CVE-2016-1526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515831" comment="libgraphite2-3-1.3.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515832" comment="libgraphite2-3-32bit-1.3.1-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77668" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="953382" ref_url="https://bugzilla.suse.com/953382" source="BUGZILLA"/>
		<reference ref_id="953972" ref_url="https://bugzilla.suse.com/953972" source="BUGZILLA"/>
		<reference ref_id="960249" ref_url="https://bugzilla.suse.com/960249" source="BUGZILLA"/>
		<reference ref_id="962177" ref_url="https://bugzilla.suse.com/962177" source="BUGZILLA"/>
		<reference ref_id="964023" ref_url="https://bugzilla.suse.com/964023" source="BUGZILLA"/>
		<reference ref_id="966271" ref_url="https://bugzilla.suse.com/966271" source="BUGZILLA"/>
		<reference ref_id="968222" ref_url="https://bugzilla.suse.com/968222" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7560" ref_url="https://www.suse.com/security/cve/CVE-2015-7560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0816-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00065.html" source="SUSE-SU"/>
		<description>

This update for the samba server fixes the following issues:

Security issue fixed:
- CVE-2015-7560: Getting and setting Windows ACLs on symlinks can change permissions on link 
  target; (bso#11648); (bsc#968222).

Other bugs fixed:
- Enable clustering (CTDB) support; (bsc#966271).
- s3: smbd: Fix timestamp rounding inside SMB2 create; (bso#11703);
  (bsc#964023).
- vfs_fruit: Fix renaming directories with open files; (bso#11065).
- Fix MacOS finder error 36 when copying folder to Samba; (bso#11347).
- s3:smbd/oplock: Obey kernel oplock setting when releasing oplocks;
  (bso#11400).
- Fix copying files with vfs_fruit when using vfs_streams_xattr without
  stream prefix and type suffix; (bso#11466).
- s3:libsmb: Correctly initialize the list head when keeping a list of primary
  followed by DFS connections; (bso#11624).
- Reduce the memory footprint of empty string options; (bso#11625).
- lib/async_req: Do not install async_connect_send_test; (bso#11639).
- docs: Fix typos in man vfs_gpfs; (bso#11641).
- smbd: make 'hide dot files' option work with 'store dos attributes = yes';
  (bso#11645).
- smbcacls: Fix uninitialized variable; (bso#11682).
- s3:smbd: Ignore initial allocation size for directory creation; (bso#11684).
- Add quotes around path of update-apparmor-samba-profile; (bsc#962177).
- Prevent access denied if the share path is '/'; (bso#11647); (bsc#960249).
- Ensure samlogon fallback requests are rerouted after kerberos failure;
  (bsc#953972).
- samba: winbind crash -&gt; netlogon_creds_client_authenticator; (bsc#953972)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-18"/>
	<updated date="2016-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/953382">SUSE bug 953382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953972">SUSE bug 953972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960249">SUSE bug 960249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962177">SUSE bug 962177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964023">SUSE bug 964023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966271">SUSE bug 966271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968222">SUSE bug 968222</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7560/">CVE-2015-7560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516870" comment="libdcerpc-binding0-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516871" comment="libdcerpc-binding0-32bit-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516872" comment="libdcerpc0-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516873" comment="libdcerpc0-32bit-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516874" comment="libgensec0-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516875" comment="libgensec0-32bit-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516876" comment="libndr-krb5pac0-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516877" comment="libndr-krb5pac0-32bit-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516878" comment="libndr-nbt0-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516879" comment="libndr-nbt0-32bit-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516880" comment="libndr-standard0-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516881" comment="libndr-standard0-32bit-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516882" comment="libndr0-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516883" comment="libndr0-32bit-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516884" comment="libnetapi0-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516885" comment="libnetapi0-32bit-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516886" comment="libregistry0-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516887" comment="libsamba-credentials0-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516888" comment="libsamba-credentials0-32bit-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516889" comment="libsamba-hostconfig0-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516890" comment="libsamba-hostconfig0-32bit-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516891" comment="libsamba-passdb0-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516892" comment="libsamba-passdb0-32bit-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516893" comment="libsamba-util0-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516894" comment="libsamba-util0-32bit-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516895" comment="libsamdb0-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516896" comment="libsamdb0-32bit-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516897" comment="libsmbclient-raw0-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516898" comment="libsmbclient-raw0-32bit-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516899" comment="libsmbclient0-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516900" comment="libsmbclient0-32bit-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516901" comment="libsmbconf0-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516902" comment="libsmbconf0-32bit-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516903" comment="libsmbldap0-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516904" comment="libsmbldap0-32bit-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516905" comment="libtevent-util0-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516906" comment="libtevent-util0-32bit-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516907" comment="libwbclient0-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516908" comment="libwbclient0-32bit-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516909" comment="samba-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516910" comment="samba-32bit-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516911" comment="samba-client-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516912" comment="samba-client-32bit-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516913" comment="samba-doc-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516914" comment="samba-libs-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516915" comment="samba-libs-32bit-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516916" comment="samba-winbind-4.2.4-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516917" comment="samba-winbind-32bit-4.2.4-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77669" version="1" class="patch">
	<metadata>
		<title>Security update for libqt4 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="865241" ref_url="https://bugzilla.suse.com/865241" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-403" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00000.html" source="SUSE-SU"/>
		<description>

This update for libqt4 fixes the following issues:

Various unsafe SSL ciphers have been disabled in the standard SSL classes.
Also the RC4 based ciphers have been disabled. (bsc#865241)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-22"/>
	<updated date="2016-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/865241">SUSE bug 865241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515893" comment="libqt4-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515894" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515895" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515896" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515897" comment="libqt4-sql-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515898" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515899" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515900" comment="libqt4-sql-mysql-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515901" comment="libqt4-sql-postgresql-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515902" comment="libqt4-sql-postgresql-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515903" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515904" comment="libqt4-sql-sqlite-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515905" comment="libqt4-sql-unixODBC-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515906" comment="libqt4-sql-unixODBC-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515907" comment="libqt4-x11-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515908" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77670" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="864391" ref_url="https://bugzilla.suse.com/864391" source="BUGZILLA"/>
		<reference ref_id="864655" ref_url="https://bugzilla.suse.com/864655" source="BUGZILLA"/>
		<reference ref_id="864769" ref_url="https://bugzilla.suse.com/864769" source="BUGZILLA"/>
		<reference ref_id="864805" ref_url="https://bugzilla.suse.com/864805" source="BUGZILLA"/>
		<reference ref_id="864811" ref_url="https://bugzilla.suse.com/864811" source="BUGZILLA"/>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="897654" ref_url="https://bugzilla.suse.com/897654" source="BUGZILLA"/>
		<reference ref_id="901508" ref_url="https://bugzilla.suse.com/901508" source="BUGZILLA"/>
		<reference ref_id="902737" ref_url="https://bugzilla.suse.com/902737" source="BUGZILLA"/>
		<reference ref_id="924018" ref_url="https://bugzilla.suse.com/924018" source="BUGZILLA"/>
		<reference ref_id="928393" ref_url="https://bugzilla.suse.com/928393" source="BUGZILLA"/>
		<reference ref_id="945404" ref_url="https://bugzilla.suse.com/945404" source="BUGZILLA"/>
		<reference ref_id="945989" ref_url="https://bugzilla.suse.com/945989" source="BUGZILLA"/>
		<reference ref_id="954872" ref_url="https://bugzilla.suse.com/954872" source="BUGZILLA"/>
		<reference ref_id="956829" ref_url="https://bugzilla.suse.com/956829" source="BUGZILLA"/>
		<reference ref_id="957162" ref_url="https://bugzilla.suse.com/957162" source="BUGZILLA"/>
		<reference ref_id="957698" ref_url="https://bugzilla.suse.com/957698" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="958007" ref_url="https://bugzilla.suse.com/958007" source="BUGZILLA"/>
		<reference ref_id="958009" ref_url="https://bugzilla.suse.com/958009" source="BUGZILLA"/>
		<reference ref_id="958491" ref_url="https://bugzilla.suse.com/958491" source="BUGZILLA"/>
		<reference ref_id="958523" ref_url="https://bugzilla.suse.com/958523" source="BUGZILLA"/>
		<reference ref_id="958917" ref_url="https://bugzilla.suse.com/958917" source="BUGZILLA"/>
		<reference ref_id="959005" ref_url="https://bugzilla.suse.com/959005" source="BUGZILLA"/>
		<reference ref_id="959332" ref_url="https://bugzilla.suse.com/959332" source="BUGZILLA"/>
		<reference ref_id="959387" ref_url="https://bugzilla.suse.com/959387" source="BUGZILLA"/>
		<reference ref_id="959695" ref_url="https://bugzilla.suse.com/959695" source="BUGZILLA"/>
		<reference ref_id="960334" ref_url="https://bugzilla.suse.com/960334" source="BUGZILLA"/>
		<reference ref_id="960707" ref_url="https://bugzilla.suse.com/960707" source="BUGZILLA"/>
		<reference ref_id="960725" ref_url="https://bugzilla.suse.com/960725" source="BUGZILLA"/>
		<reference ref_id="960835" ref_url="https://bugzilla.suse.com/960835" source="BUGZILLA"/>
		<reference ref_id="960861" ref_url="https://bugzilla.suse.com/960861" source="BUGZILLA"/>
		<reference ref_id="960862" ref_url="https://bugzilla.suse.com/960862" source="BUGZILLA"/>
		<reference ref_id="961332" ref_url="https://bugzilla.suse.com/961332" source="BUGZILLA"/>
		<reference ref_id="961358" ref_url="https://bugzilla.suse.com/961358" source="BUGZILLA"/>
		<reference ref_id="961691" ref_url="https://bugzilla.suse.com/961691" source="BUGZILLA"/>
		<reference ref_id="962320" ref_url="https://bugzilla.suse.com/962320" source="BUGZILLA"/>
		<reference ref_id="963782" ref_url="https://bugzilla.suse.com/963782" source="BUGZILLA"/>
		<reference ref_id="963923" ref_url="https://bugzilla.suse.com/963923" source="BUGZILLA"/>
		<reference ref_id="964413" ref_url="https://bugzilla.suse.com/964413" source="BUGZILLA"/>
		<reference ref_id="965315" ref_url="https://bugzilla.suse.com/965315" source="BUGZILLA"/>
		<reference ref_id="965317" ref_url="https://bugzilla.suse.com/965317" source="BUGZILLA"/>
		<reference ref_id="967012" ref_url="https://bugzilla.suse.com/967012" source="BUGZILLA"/>
		<reference ref_id="967013" ref_url="https://bugzilla.suse.com/967013" source="BUGZILLA"/>
		<reference ref_id="967969" ref_url="https://bugzilla.suse.com/967969" source="BUGZILLA"/>
		<reference ref_id="969121" ref_url="https://bugzilla.suse.com/969121" source="BUGZILLA"/>
		<reference ref_id="969122" ref_url="https://bugzilla.suse.com/969122" source="BUGZILLA"/>
		<reference ref_id="969350" ref_url="https://bugzilla.suse.com/969350" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-3689" ref_url="https://www.suse.com/security/cve/CVE-2014-3689/" source="CVE"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2014-9718" ref_url="https://www.suse.com/security/cve/CVE-2014-9718/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8554" ref_url="https://www.suse.com/security/cve/CVE-2015-8554/" source="CVE"/>
		<reference ref_id="CVE-2015-8555" ref_url="https://www.suse.com/security/cve/CVE-2015-8555/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567/" source="CVE"/>
		<reference ref_id="CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2015-8817" ref_url="https://www.suse.com/security/cve/CVE-2015-8817/" source="CVE"/>
		<reference ref_id="CVE-2015-8818" ref_url="https://www.suse.com/security/cve/CVE-2015-8818/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1570" ref_url="https://www.suse.com/security/cve/CVE-2016-1570/" source="CVE"/>
		<reference ref_id="CVE-2016-1571" ref_url="https://www.suse.com/security/cve/CVE-2016-1571/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-2270" ref_url="https://www.suse.com/security/cve/CVE-2016-2270/" source="CVE"/>
		<reference ref_id="CVE-2016-2271" ref_url="https://www.suse.com/security/cve/CVE-2016-2271/" source="CVE"/>
		<reference ref_id="CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391/" source="CVE"/>
		<reference ref_id="CVE-2016-2392" ref_url="https://www.suse.com/security/cve/CVE-2016-2392/" source="CVE"/>
		<reference ref_id="CVE-2016-2538" ref_url="https://www.suse.com/security/cve/CVE-2016-2538/" source="CVE"/>
		<reference ref_id="CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<description>
xen was updated to fix 44 security issues.

These security issues were fixed:
- CVE-2013-4533: Buffer overflow in the pxa2xx_ssp_load function in hw/arm/pxa2xx.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted s-&gt;rx_level value in a savevm image (bsc#864655).
- CVE-2013-4534: Buffer overflow in hw/intc/openpic.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via vectors related to IRQDest elements (bsc#864811).
- CVE-2013-4537: The ssi_sd_transfer function in hw/sd/ssi-sd.c allowed remote attackers to execute arbitrary code via a crafted arglen value in a savevm image (bsc#864391).
- CVE-2013-4538: Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c allowed remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_end values in a savevm image (bsc#864769).
- CVE-2013-4539: Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c might have allowed remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image (bsc#864805).
- CVE-2014-0222: Integer overflow in the qcow_open function in block/qcow.c allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
- CVE-2014-3640: The sosendto function in slirp/udp.c allowed local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket (bsc#897654).
- CVE-2014-3689: The vmware-vga driver (hw/display/vmware_vga.c) allowed local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling (bsc#901508).
- CVE-2014-7815: The set_pixel_format function in ui/vnc.c allowed remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value (bsc#902737).
- CVE-2014-9718: The (1) BMDMA and (2) AHCI HBA interfaces in the IDE functionality had multiple interpretations of a function's return value, which allowed guest OS users to cause a host OS denial of service (memory consumption or infinite loop, and system crash) via a PRDT with zero complete sectors, related to the bmdma_prepare_buf and ahci_dma_prepare_buf functions (bsc#928393).
- CVE-2015-1779: The VNC websocket frame decoder allowed remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section (bsc#924018).
- CVE-2015-5278: Infinite loop in ne2000_receive() function (bsc#945989).
- CVE-2015-6855: hw/ide/core.c did not properly restrict the commands accepted by an ATAPI device, which allowed guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash (bsc#945404).
- CVE-2015-7512: Buffer overflow in the pcnet_receive function in hw/net/pcnet.c, when a guest NIC has a larger MTU, allowed remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet (bsc#957162).
- CVE-2015-7549: pci: NULL pointer dereference issue (bsc#958917).
- CVE-2015-8345: eepro100: infinite loop in processing command block list (bsc#956829).
- CVE-2015-8504: VNC: floating point exception (bsc#958491).
- CVE-2015-8550: Paravirtualized drivers were incautious about shared memory contents (XSA-155) (bsc#957988).
- CVE-2015-8554: qemu-dm buffer overrun in MSI-X handling (XSA-164) (bsc#958007).
- CVE-2015-8555: Information leak in legacy x86 FPU/XMM initialization (XSA-165) (bsc#958009).
- CVE-2015-8558: Infinite loop in ehci_advance_state resulted in DoS (bsc#959005).
- CVE-2015-8567: vmxnet3: host memory leakage (bsc#959387).
- CVE-2015-8568: vmxnet3: host memory leakage (bsc#959387).
- CVE-2015-8613: SCSI: stack based buffer overflow in megasas_ctrl_get_info (bsc#961358).
- CVE-2015-8619: Stack based OOB write in hmp_sendkey routine (bsc#960334).
- CVE-2015-8743: ne2000: OOB memory access in ioport r/w functions (bsc#960725).
- CVE-2015-8744: vmxnet3: Incorrect l2 header validation lead to a crash via assert(2) call (bsc#960835).
- CVE-2015-8745: Reading IMR registers lead to a crash via assert(2) call (bsc#960707).
- CVE-2015-8817: OOB access in address_space_rw lead to segmentation fault (I) (bsc#969121).
- CVE-2015-8818: OOB access in address_space_rw lead to segmentation fault (II) (bsc#969122).
- CVE-2016-1568: AHCI use-after-free vulnerability in aio port commands (bsc#961332).
- CVE-2016-1570: The PV superpage functionality in arch/x86/mm.c allowed local PV guests to obtain sensitive information, cause a denial of service, gain privileges, or have unspecified other impact via a crafted page identifier (MFN) to the (1) MMUEXT_MARK_SUPER or (2) MMUEXT_UNMARK_SUPER sub-op in the HYPERVISOR_mmuext_op hypercall or (3) unknown vectors related to page table updates (bsc#960861).
- CVE-2016-1571: VMX: intercept issue with INVLPG on non-canonical address (XSA-168) (bsc#960862).
- CVE-2016-1714: nvram: OOB r/w access in processing firmware configurations (bsc#961691).
- CVE-2016-1922: NULL pointer dereference in vapic_write() (bsc#962320).
- CVE-2016-1981: e1000 infinite loop in start_xmit and e1000_receive_iov routines (bsc#963782).
- CVE-2016-2198: EHCI NULL pointer dereference in ehci_caps_write (bsc#964413).
- CVE-2016-2270: Xen allowed local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings (bsc#965315).
- CVE-2016-2271: VMX when using an Intel or Cyrix CPU, allowed local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP (bsc#965317).
- CVE-2016-2391: usb: multiple eof_timers in ohci module lead to NULL pointer dereference (bsc#967013).
- CVE-2016-2392: NULL pointer dereference in remote NDIS control message handling (bsc#967012).
- CVE-2016-2538: Integer overflow in remote NDIS control message handling (bsc#967969).
- CVE-2016-2841: ne2000: Infinite loop in ne2000_receive (bsc#969350).
- XSA-166: ioreq handling possibly susceptible to multiple read issue (bsc#958523).

These non-security issues were fixed:
- bsc#954872: script block-dmmd not working as expected 
- bsc#957698: DOM0 can't bring up on Dell PC
- bsc#963923: domain weights not honored when sched-credit tslice is reduced
- bsc#959332: SLES12SP1 PV guest is unreachable when restored or migrated
- bsc#959695: Missing docs for xen
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-24"/>
	<updated date="2016-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/864391">SUSE bug 864391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864655">SUSE bug 864655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864769">SUSE bug 864769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864805">SUSE bug 864805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864811">SUSE bug 864811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897654">SUSE bug 897654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901508">SUSE bug 901508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902737">SUSE bug 902737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924018">SUSE bug 924018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928393">SUSE bug 928393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945404">SUSE bug 945404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945989">SUSE bug 945989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954872">SUSE bug 954872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956829">SUSE bug 956829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957162">SUSE bug 957162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957698">SUSE bug 957698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958007">SUSE bug 958007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958009">SUSE bug 958009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958491">SUSE bug 958491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958523">SUSE bug 958523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958917">SUSE bug 958917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959005">SUSE bug 959005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959332">SUSE bug 959332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959387">SUSE bug 959387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959695">SUSE bug 959695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960334">SUSE bug 960334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960707">SUSE bug 960707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960725">SUSE bug 960725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960835">SUSE bug 960835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960861">SUSE bug 960861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960862">SUSE bug 960862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961332">SUSE bug 961332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961358">SUSE bug 961358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961691">SUSE bug 961691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962320">SUSE bug 962320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963782">SUSE bug 963782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963923">SUSE bug 963923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964413">SUSE bug 964413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965315">SUSE bug 965315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965317">SUSE bug 965317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967012">SUSE bug 967012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967013">SUSE bug 967013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967969">SUSE bug 967969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969121">SUSE bug 969121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969122">SUSE bug 969122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969350">SUSE bug 969350</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3689/">CVE-2014-3689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9718/">CVE-2014-9718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8554/">CVE-2015-8554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8555/">CVE-2015-8555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8817/">CVE-2015-8817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8818/">CVE-2015-8818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1570/">CVE-2016-1570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1571/">CVE-2016-1571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2270/">CVE-2016-2270</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2271/">CVE-2016-2271</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2392/">CVE-2016-2392</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2538/">CVE-2016-2538</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516918" comment="xen-4.5.2_06-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516919" comment="xen-kmp-default-4.5.2_06_k3.12.53_60.30-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516920" comment="xen-libs-4.5.2_06-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516921" comment="xen-libs-32bit-4.5.2_06-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77671" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="939342" ref_url="https://bugzilla.suse.com/939342" source="BUGZILLA"/>
		<reference ref_id="963017" ref_url="https://bugzilla.suse.com/963017" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3228" ref_url="https://www.suse.com/security/cve/CVE-2015-3228/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001968.html" source="SUSE-SU"/>
		<description>
ghostscript was updated to fix one security issue and one bug.

The following vulnerability was fixed:

* CVE-2015-3228: Specially crafted ps files could have caused an out of
  bound read/write due to an integer overflow, causing a segfault in the
  application or having unspecified further impact.

Also a non security bug was fixed:
- fix a crash in mutex handling (bsc#963017)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-24"/>
	<updated date="2016-03-24"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/939342">SUSE bug 939342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963017">SUSE bug 963017</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3228/">CVE-2015-3228</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515909" comment="ghostscript-9.15-6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515910" comment="ghostscript-x11-9.15-6.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77672" version="1" class="patch">
	<metadata>
		<title>Security update for pidgin-otr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="970498" ref_url="https://bugzilla.suse.com/970498" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8833" ref_url="https://www.suse.com/security/cve/CVE-2015-8833/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00095.html" source="SUSE-SU"/>
		<description>

This update for pidgin-otr fixes the following issues:

- CVE-2015-8833: A heap based use-after-free issue was fixed in pidgin-otr
  that could lead to crashes or potential code execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-30"/>
	<updated date="2016-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/970498">SUSE bug 970498</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8833/">CVE-2015-8833</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515911" comment="pidgin-otr-4.0.0-8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77673" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="952849" ref_url="https://bugzilla.suse.com/952849" source="BUGZILLA"/>
		<reference ref_id="953110" ref_url="https://bugzilla.suse.com/953110" source="BUGZILLA"/>
		<reference ref_id="954872" ref_url="https://bugzilla.suse.com/954872" source="BUGZILLA"/>
		<reference ref_id="960305" ref_url="https://bugzilla.suse.com/960305" source="BUGZILLA"/>
		<reference ref_id="964465" ref_url="https://bugzilla.suse.com/964465" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5313" ref_url="https://www.suse.com/security/cve/CVE-2015-5313/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001975.html" source="SUSE-SU"/>
		<description>

This update to libvirt 1.2.18.2 fixes the following minor security issue:

- CVE-2015-5313: Directory traversal allowed privilege escalation (bsc#953110)

The following bugs were fixed:

- bsc#952849: Don't add apparmor deny rw rule for 9P readonly mounts.
- bsc#960305: libxl: support parsing and formatting vif bandwidth
- bsc#954872: libxl: Add support for block-{dmmd,drbd,npiv} scripts
- bsc#964465: Remove 'Wants=xencommons.service' from libvirtd service file
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-31"/>
	<updated date="2016-03-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952849">SUSE bug 952849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953110">SUSE bug 953110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954872">SUSE bug 954872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960305">SUSE bug 960305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964465">SUSE bug 964465</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5313/">CVE-2015-5313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516922" comment="libvirt-1.2.18.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516923" comment="libvirt-client-1.2.18.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516924" comment="libvirt-client-32bit-1.2.18.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516925" comment="libvirt-daemon-1.2.18.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516926" comment="libvirt-daemon-config-network-1.2.18.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516927" comment="libvirt-daemon-config-nwfilter-1.2.18.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516928" comment="libvirt-daemon-driver-interface-1.2.18.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516929" comment="libvirt-daemon-driver-libxl-1.2.18.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516930" comment="libvirt-daemon-driver-lxc-1.2.18.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516931" comment="libvirt-daemon-driver-network-1.2.18.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516932" comment="libvirt-daemon-driver-nodedev-1.2.18.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516933" comment="libvirt-daemon-driver-nwfilter-1.2.18.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516934" comment="libvirt-daemon-driver-qemu-1.2.18.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516935" comment="libvirt-daemon-driver-secret-1.2.18.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516936" comment="libvirt-daemon-driver-storage-1.2.18.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516937" comment="libvirt-daemon-lxc-1.2.18.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516938" comment="libvirt-daemon-qemu-1.2.18.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516939" comment="libvirt-daemon-xen-1.2.18.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516940" comment="libvirt-doc-1.2.18.2-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77674" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="972468" ref_url="https://bugzilla.suse.com/972468" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0636" ref_url="https://www.suse.com/security/cve/CVE-2016-0636/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00004.html" source="SUSE-SU"/>
		<description>

This update for java-1_8_0-openjdk to version jdk8u77-b03 fixes the following security issue:

* CVE-2016-0636: Improve MethodHandle consistency, which had allowed attackers to execute code. (bsc#972468)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-05"/>
	<updated date="2016-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/972468">SUSE bug 972468</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0636/">CVE-2016-0636</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516941" comment="java-1_8_0-openjdk-1.8.0.77-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516942" comment="java-1_8_0-openjdk-headless-1.8.0.77-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77675" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="972468" ref_url="https://bugzilla.suse.com/972468" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0636" ref_url="https://www.suse.com/security/cve/CVE-2016-0636/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0959-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00005.html" source="SUSE-SU"/>
		<description>

The OpenJDK Java java-1_7_0-openjdk was updated to 2.6.5 to fix the following issues:

Update to 2.6.5 - OpenJDK 7u99 (bsc#972468)
* Security fixes
  - S8152335, CVE-2016-0636: Improve MethodHandle consistency
* Import of OpenJDK 7 u99 build 0
  - S6425769, PR2858: Allow specifying an address to bind JMX
    remote connector
  - S6961123: setWMClass fails to null-terminate WM_CLASS string
  - S8145982, PR2858: JMXInterfaceBindingTest is failing
    intermittently
  - S8146015, PR2858: JMXInterfaceBindingTest is failing
    intermittently for IPv6 addresses
* Backports
  - S8028727, PR2814: [parfait] warnings from b116 for
   jdk.src.share.native.sun.security.ec: JNI pending exceptions
  - S8048512, PR2814: Uninitialised memory in
    jdk/src/share/native/sun/security/ec/ECC_JNI.cpp
  - S8071705. PR2819, RH1182694: Java application menu misbehaves
    when running multiple screen stacked vertically
  - S8150954, PR2866, RH1176206: AWT Robot not compatible with
    GNOME Shell
* Bug fixes
  - PR2803: Make system CUPS optional
  - PR2886: Location of 'stap' executable is hard-coded
  - PR2893: test/tapset/jstaptest.pl should be executable
  - PR2894: Add missing test directory in make check.
* CACAO
  - PR2781, CA195: typeinfo.cpp: typeinfo_merge_nonarrays:
    Assertion `dest &amp;&amp; result &amp;&amp; x.any &amp;&amp; y.any' failed
* AArch64 port
  - PR2852: Add support for large code cache
  - PR2852: Apply ReservedCodeCacheSize default limiting to
    AArch64 only.
  - S8081289, PR2852: aarch64: add support for
    RewriteFrequentPairs in interpreter
  - S8131483, PR2852: aarch64: illegal stlxr instructions
  - S8133352, PR2852: aarch64: generates constrained unpredictable
    instructions
  - S8133842, PR2852: aarch64: C2 generates illegal instructions
    with int shifts &gt;=32
  - S8134322, PR2852: AArch64: Fix several errors in C2 biased
    locking implementation
  - S8136615, PR2852: aarch64: elide DecodeN when followed by
    CmpP 0
  - S8138575, PR2852: Improve generated code for profile counters
  - S8138641, PR2852: Disable C2 peephole by default for aarch64
  - S8138966, PR2852: Intermittent SEGV running ParallelGC
  - S8143067, PR2852: aarch64: guarantee failure in javac
  - S8143285, PR2852: aarch64: Missing load acquire when checking
    if ConstantPoolCacheEntry is resolved
  - S8143584, PR2852: Load constant pool tag and class status with
 load acquire
  - S8144201, PR2852: aarch64:
    jdk/test/com/sun/net/httpserver/Test6a.java fails with
    --enable-unlimited-crypto
  - S8144582, PR2852: AArch64 does not generate correct branch
    profile data
  - S8146709, PR2852: AArch64: Incorrect use of ADRP for
    byte_map_base
  - S8147805, PR2852: aarch64: C1 segmentation fault due to inline
    Unsafe.getAndSetObject
  - S8148240, PR2852: aarch64: random infrequent null pointer
    exceptions in javac
* PPC &amp; AIX port
  - S8034797, PR2851: AIX: Fix os::naked_short_sleep() in
    os_aix.cpp after 8028280
  - S8139258, PR2851: PPC64LE: argument passing problem when
    passing 15 floats in native call
  - S8139421, PR2851: PPC64LE: MacroAssembler::bxx64_patchable
    kill register R12

Update to 2.6.5 - OpenJDK 7u99 (bsc#972468)
* Security fixes
  - S8152335, CVE-2016-0636: Improve MethodHandle consistency
* Import of OpenJDK 7 u99 build 0
  - S6425769, PR2858: Allow specifying an address to bind JMX
    remote connector
  - S6961123: setWMClass fails to null-terminate WM_CLASS string
  - S8145982, PR2858: JMXInterfaceBindingTest is failing
    intermittently
  - S8146015, PR2858: JMXInterfaceBindingTest is failing
    intermittently for IPv6 addresses
* Backports
  - S8028727, PR2814: [parfait] warnings from b116 for
   jdk.src.share.native.sun.security.ec: JNI pending exceptions
  - S8048512, PR2814: Uninitialised memory in
    jdk/src/share/native/sun/security/ec/ECC_JNI.cpp
  - S8071705. PR2819, RH1182694: Java application menu misbehaves
    when running multiple screen stacked vertically
  - S8150954, PR2866, RH1176206: AWT Robot not compatible with
    GNOME Shell
* Bug fixes
  - PR2803: Make system CUPS optional
  - PR2886: Location of 'stap' executable is hard-coded
  - PR2893: test/tapset/jstaptest.pl should be executable
  - PR2894: Add missing test directory in make check.
* CACAO
  - PR2781, CA195: typeinfo.cpp: typeinfo_merge_nonarrays:
    Assertion `dest &amp;&amp; result &amp;&amp; x.any &amp;&amp; y.any' failed
* AArch64 port
  - PR2852: Add support for large code cache
  - PR2852: Apply ReservedCodeCacheSize default limiting to
    AArch64 only.
  - S8081289, PR2852: aarch64: add support for
    RewriteFrequentPairs in interpreter
  - S8131483, PR2852: aarch64: illegal stlxr instructions
  - S8133352, PR2852: aarch64: generates constrained unpredictable
    instructions
  - S8133842, PR2852: aarch64: C2 generates illegal instructions
    with int shifts &gt;=32
  - S8134322, PR2852: AArch64: Fix several errors in C2 biased
    locking implementation
  - S8136615, PR2852: aarch64: elide DecodeN when followed by
    CmpP 0
  - S8138575, PR2852: Improve generated code for profile counters
  - S8138641, PR2852: Disable C2 peephole by default for aarch64
  - S8138966, PR2852: Intermittent SEGV running ParallelGC
  - S8143067, PR2852: aarch64: guarantee failure in javac
  - S8143285, PR2852: aarch64: Missing load acquire when checking
    if ConstantPoolCacheEntry is resolved
  - S8143584, PR2852: Load constant pool tag and class status with
 load acquire
  - S8144201, PR2852: aarch64:
    jdk/test/com/sun/net/httpserver/Test6a.java fails with
    --enable-unlimited-crypto
  - S8144582, PR2852: AArch64 does not generate correct branch
    profile data
  - S8146709, PR2852: AArch64: Incorrect use of ADRP for
    byte_map_base
  - S8147805, PR2852: aarch64: C1 segmentation fault due to inline
    Unsafe.getAndSetObject
  - S8148240, PR2852: aarch64: random infrequent null pointer
    exceptions in javac
* PPC &amp; AIX port
  - S8034797, PR2851: AIX: Fix os::naked_short_sleep() in
    os_aix.cpp after 8028280
  - S8139258, PR2851: PPC64LE: argument passing problem when
    passing 15 floats in native call
  - S8139421, PR2851: PPC64LE: MacroAssembler::bxx64_patchable
    kill register R12
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-05"/>
	<updated date="2016-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/972468">SUSE bug 972468</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0636/">CVE-2016-0636</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515912" comment="java-1_7_0-openjdk-1.7.0.99-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515913" comment="java-1_7_0-openjdk-headless-1.7.0.99-27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77676" version="1" class="patch">
	<metadata>
		<title>Security update for gcc5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="939460" ref_url="https://bugzilla.suse.com/939460" source="BUGZILLA"/>
		<reference ref_id="945842" ref_url="https://bugzilla.suse.com/945842" source="BUGZILLA"/>
		<reference ref_id="952151" ref_url="https://bugzilla.suse.com/952151" source="BUGZILLA"/>
		<reference ref_id="953831" ref_url="https://bugzilla.suse.com/953831" source="BUGZILLA"/>
		<reference ref_id="954002" ref_url="https://bugzilla.suse.com/954002" source="BUGZILLA"/>
		<reference ref_id="955382" ref_url="https://bugzilla.suse.com/955382" source="BUGZILLA"/>
		<reference ref_id="962765" ref_url="https://bugzilla.suse.com/962765" source="BUGZILLA"/>
		<reference ref_id="964468" ref_url="https://bugzilla.suse.com/964468" source="BUGZILLA"/>
		<reference ref_id="966220" ref_url="https://bugzilla.suse.com/966220" source="BUGZILLA"/>
		<reference ref_id="968771" ref_url="https://bugzilla.suse.com/968771" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001987.html" source="SUSE-SU"/>
		<description>

The GNU Compiler Collection was updated to version 5.3.1, which brings several fixes
and enhancements.

The following security issue has been fixed:

- Fix C++11 std::random_device short read issue that could lead to predictable
  randomness. (CVE-2015-5276, bsc#945842)

The following non-security issues have been fixed:

- Enable frame pointer for TARGET_64BIT_MS_ABI when stack is misaligned. Fixes internal
  compiler error when building Wine. (bsc#966220)
- Fix a PowerPC specific issue in gcc-go that broke compilation of newer versions of
  Docker. (bsc#964468)
- Fix HTM built-ins on PowerPC. (bsc#955382)
- Fix libgo certificate lookup. (bsc#953831)
- Suppress deprecated-declarations warnings for inline definitions of deprecated virtual
  methods. (bsc#939460)
- Build s390[x] with '--with-tune=z9-109 --with-arch=z900' on SLE11 again. (bsc#954002)
- Revert accidental libffi ABI breakage on aarch64. (bsc#968771)
- On x86_64, set default 32bit code generation to -march=x86-64 rather than -march=i586.
- Add experimental File System TS library.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-06"/>
	<updated date="2016-04-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/939460">SUSE bug 939460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945842">SUSE bug 945842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952151">SUSE bug 952151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953831">SUSE bug 953831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954002">SUSE bug 954002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955382">SUSE bug 955382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962765">SUSE bug 962765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964468">SUSE bug 964468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966220">SUSE bug 966220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968771">SUSE bug 968771</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515914" comment="libasan2-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515915" comment="libasan2-32bit-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515916" comment="libatomic1-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515917" comment="libatomic1-32bit-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515918" comment="libcilkrts5-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515919" comment="libcilkrts5-32bit-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515920" comment="libffi4-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515921" comment="libffi4-32bit-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515922" comment="libgcc_s1-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515923" comment="libgcc_s1-32bit-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515924" comment="libgfortran3-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515925" comment="libgfortran3-32bit-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515926" comment="libgomp1-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515927" comment="libgomp1-32bit-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515928" comment="libitm1-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515929" comment="libitm1-32bit-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515930" comment="liblsan0-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515931" comment="libmpx0-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515932" comment="libmpx0-32bit-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515933" comment="libmpxwrappers0-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515934" comment="libmpxwrappers0-32bit-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515935" comment="libquadmath0-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515936" comment="libquadmath0-32bit-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515937" comment="libstdc++6-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515938" comment="libstdc++6-32bit-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515939" comment="libstdc++6-locale-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515940" comment="libtsan0-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515941" comment="libubsan0-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515942" comment="libubsan0-32bit-5.3.1+r233831-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77677" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="974209" ref_url="https://bugzilla.suse.com/974209" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1019" ref_url="https://www.suse.com/security/cve/CVE-2016-1019/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00010.html" source="SUSE-SU"/>
		<description>
flash-player was updated to fix one security issue.

This security issue was fixed:
- CVE-2016-1019: Adobe Flash Player allowed remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors, as exploited in the wild in April 2016 (bsc#974209).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-08"/>
	<updated date="2016-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/974209">SUSE bug 974209</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1019/">CVE-2016-1019</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515943" comment="flash-player-11.2.202.616-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515944" comment="flash-player-gnome-11.2.202.616-126.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77678" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="971942" ref_url="https://bugzilla.suse.com/971942" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3119" ref_url="https://www.suse.com/security/cve/CVE-2016-3119/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001993.html" source="SUSE-SU"/>
		<description>

This update for krb5 fixes the following security issue:

- CVE-2016-3119: An authenticated attacker with permission to modify a
  principal entry could have caused kadmind to dereference a null pointer
  by supplying an empty DB argument to the modify_principal command,
  if kadmind is configured to use the LDAP KDB module. (bsc#971942)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-08"/>
	<updated date="2016-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/971942">SUSE bug 971942</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3119/">CVE-2016-3119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515945" comment="krb5-1.12.1-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515946" comment="krb5-32bit-1.12.1-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515947" comment="krb5-client-1.12.1-28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77679" version="1" class="patch">
	<metadata>
		<title>Security update for python-tornado (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="930361" ref_url="https://bugzilla.suse.com/930361" source="BUGZILLA"/>
		<reference ref_id="930362" ref_url="https://bugzilla.suse.com/930362" source="BUGZILLA"/>
		<reference ref_id="974657" ref_url="https://bugzilla.suse.com/974657" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9720" ref_url="https://www.suse.com/security/cve/CVE-2014-9720/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002034.html" source="SUSE-SU"/>
		<description>

The python-tornado module was updated to version 4.2.1, which brings several fixes,
enhancements and new features.

The following security issues have been fixed:

- A path traversal vulnerability in StaticFileHandler, in which files whose names
  started with the static_path directory but were not actually in that directory
  could be accessed.
- The XSRF token is now encoded with a random mask on each request. This makes it
  safe to include in compressed pages without being vulnerable to the BREACH attack.
  This applies to most applications that use both the xsrf_cookies and gzip options
  (or have gzip applied by a proxy). (bsc#930362, CVE-2014-9720)
- The signed-value format used by RequestHandler.{g,s}et_secure_cookie changed to be
  more secure. (bsc#930361)

The following enhancements have been implemented:

- SSLIOStream.connect and IOStream.start_tls now validate certificates by default.
- Certificate validation will now use the system CA root certificates.
- The default SSL configuration has become stricter, using ssl.create_default_context
  where available on the client side.
- The deprecated classes in the tornado.auth module, GoogleMixin, FacebookMixin and
  FriendFeedMixin have been removed.
- New modules have been added: tornado.locks and tornado.queues.
- The tornado.websocket module now supports compression via the 'permessage-deflate'
  extension.
- Tornado now depends on the backports.ssl_match_hostname when running on Python 2.

For a comprehensive list of changes, please refer to the release notes:

- http://www.tornadoweb.org/en/stable/releases/v4.2.0.html
- http://www.tornadoweb.org/en/stable/releases/v4.1.0.html
- http://www.tornadoweb.org/en/stable/releases/v4.0.0.html
- http://www.tornadoweb.org/en/stable/releases/v3.2.0.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-02"/>
	<updated date="2016-05-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/930361">SUSE bug 930361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930362">SUSE bug 930362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974657">SUSE bug 974657</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9720/">CVE-2014-9720</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515948" comment="python-backports.ssl_match_hostname-3.4.0.2-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515949" comment="python-tornado-4.2.1-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77680" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="816099" ref_url="https://bugzilla.suse.com/816099" source="BUGZILLA"/>
		<reference ref_id="867251" ref_url="https://bugzilla.suse.com/867251" source="BUGZILLA"/>
		<reference ref_id="875631" ref_url="https://bugzilla.suse.com/875631" source="BUGZILLA"/>
		<reference ref_id="880007" ref_url="https://bugzilla.suse.com/880007" source="BUGZILLA"/>
		<reference ref_id="943645" ref_url="https://bugzilla.suse.com/943645" source="BUGZILLA"/>
		<reference ref_id="944749" ref_url="https://bugzilla.suse.com/944749" source="BUGZILLA"/>
		<reference ref_id="945219" ref_url="https://bugzilla.suse.com/945219" source="BUGZILLA"/>
		<reference ref_id="949752" ref_url="https://bugzilla.suse.com/949752" source="BUGZILLA"/>
		<reference ref_id="955308" ref_url="https://bugzilla.suse.com/955308" source="BUGZILLA"/>
		<reference ref_id="956084" ref_url="https://bugzilla.suse.com/956084" source="BUGZILLA"/>
		<reference ref_id="956852" ref_url="https://bugzilla.suse.com/956852" source="BUGZILLA"/>
		<reference ref_id="957986" ref_url="https://bugzilla.suse.com/957986" source="BUGZILLA"/>
		<reference ref_id="959146" ref_url="https://bugzilla.suse.com/959146" source="BUGZILLA"/>
		<reference ref_id="959257" ref_url="https://bugzilla.suse.com/959257" source="BUGZILLA"/>
		<reference ref_id="959463" ref_url="https://bugzilla.suse.com/959463" source="BUGZILLA"/>
		<reference ref_id="959709" ref_url="https://bugzilla.suse.com/959709" source="BUGZILLA"/>
		<reference ref_id="960174" ref_url="https://bugzilla.suse.com/960174" source="BUGZILLA"/>
		<reference ref_id="960458" ref_url="https://bugzilla.suse.com/960458" source="BUGZILLA"/>
		<reference ref_id="960561" ref_url="https://bugzilla.suse.com/960561" source="BUGZILLA"/>
		<reference ref_id="960629" ref_url="https://bugzilla.suse.com/960629" source="BUGZILLA"/>
		<reference ref_id="961257" ref_url="https://bugzilla.suse.com/961257" source="BUGZILLA"/>
		<reference ref_id="961500" ref_url="https://bugzilla.suse.com/961500" source="BUGZILLA"/>
		<reference ref_id="961516" ref_url="https://bugzilla.suse.com/961516" source="BUGZILLA"/>
		<reference ref_id="961588" ref_url="https://bugzilla.suse.com/961588" source="BUGZILLA"/>
		<reference ref_id="961658" ref_url="https://bugzilla.suse.com/961658" source="BUGZILLA"/>
		<reference ref_id="963193" ref_url="https://bugzilla.suse.com/963193" source="BUGZILLA"/>
		<reference ref_id="963746" ref_url="https://bugzilla.suse.com/963746" source="BUGZILLA"/>
		<reference ref_id="963765" ref_url="https://bugzilla.suse.com/963765" source="BUGZILLA"/>
		<reference ref_id="963827" ref_url="https://bugzilla.suse.com/963827" source="BUGZILLA"/>
		<reference ref_id="963960" ref_url="https://bugzilla.suse.com/963960" source="BUGZILLA"/>
		<reference ref_id="964201" ref_url="https://bugzilla.suse.com/964201" source="BUGZILLA"/>
		<reference ref_id="964730" ref_url="https://bugzilla.suse.com/964730" source="BUGZILLA"/>
		<reference ref_id="965087" ref_url="https://bugzilla.suse.com/965087" source="BUGZILLA"/>
		<reference ref_id="965199" ref_url="https://bugzilla.suse.com/965199" source="BUGZILLA"/>
		<reference ref_id="965830" ref_url="https://bugzilla.suse.com/965830" source="BUGZILLA"/>
		<reference ref_id="965891" ref_url="https://bugzilla.suse.com/965891" source="BUGZILLA"/>
		<reference ref_id="965924" ref_url="https://bugzilla.suse.com/965924" source="BUGZILLA"/>
		<reference ref_id="966026" ref_url="https://bugzilla.suse.com/966026" source="BUGZILLA"/>
		<reference ref_id="966094" ref_url="https://bugzilla.suse.com/966094" source="BUGZILLA"/>
		<reference ref_id="966278" ref_url="https://bugzilla.suse.com/966278" source="BUGZILLA"/>
		<reference ref_id="966437" ref_url="https://bugzilla.suse.com/966437" source="BUGZILLA"/>
		<reference ref_id="966471" ref_url="https://bugzilla.suse.com/966471" source="BUGZILLA"/>
		<reference ref_id="966693" ref_url="https://bugzilla.suse.com/966693" source="BUGZILLA"/>
		<reference ref_id="966831" ref_url="https://bugzilla.suse.com/966831" source="BUGZILLA"/>
		<reference ref_id="966864" ref_url="https://bugzilla.suse.com/966864" source="BUGZILLA"/>
		<reference ref_id="966910" ref_url="https://bugzilla.suse.com/966910" source="BUGZILLA"/>
		<reference ref_id="967047" ref_url="https://bugzilla.suse.com/967047" source="BUGZILLA"/>
		<reference ref_id="967292" ref_url="https://bugzilla.suse.com/967292" source="BUGZILLA"/>
		<reference ref_id="967299" ref_url="https://bugzilla.suse.com/967299" source="BUGZILLA"/>
		<reference ref_id="967650" ref_url="https://bugzilla.suse.com/967650" source="BUGZILLA"/>
		<reference ref_id="967651" ref_url="https://bugzilla.suse.com/967651" source="BUGZILLA"/>
		<reference ref_id="967802" ref_url="https://bugzilla.suse.com/967802" source="BUGZILLA"/>
		<reference ref_id="967903" ref_url="https://bugzilla.suse.com/967903" source="BUGZILLA"/>
		<reference ref_id="968010" ref_url="https://bugzilla.suse.com/968010" source="BUGZILLA"/>
		<reference ref_id="968018" ref_url="https://bugzilla.suse.com/968018" source="BUGZILLA"/>
		<reference ref_id="968074" ref_url="https://bugzilla.suse.com/968074" source="BUGZILLA"/>
		<reference ref_id="968141" ref_url="https://bugzilla.suse.com/968141" source="BUGZILLA"/>
		<reference ref_id="968206" ref_url="https://bugzilla.suse.com/968206" source="BUGZILLA"/>
		<reference ref_id="968230" ref_url="https://bugzilla.suse.com/968230" source="BUGZILLA"/>
		<reference ref_id="968234" ref_url="https://bugzilla.suse.com/968234" source="BUGZILLA"/>
		<reference ref_id="968253" ref_url="https://bugzilla.suse.com/968253" source="BUGZILLA"/>
		<reference ref_id="968448" ref_url="https://bugzilla.suse.com/968448" source="BUGZILLA"/>
		<reference ref_id="968512" ref_url="https://bugzilla.suse.com/968512" source="BUGZILLA"/>
		<reference ref_id="968643" ref_url="https://bugzilla.suse.com/968643" source="BUGZILLA"/>
		<reference ref_id="968670" ref_url="https://bugzilla.suse.com/968670" source="BUGZILLA"/>
		<reference ref_id="969112" ref_url="https://bugzilla.suse.com/969112" source="BUGZILLA"/>
		<reference ref_id="969439" ref_url="https://bugzilla.suse.com/969439" source="BUGZILLA"/>
		<reference ref_id="969571" ref_url="https://bugzilla.suse.com/969571" source="BUGZILLA"/>
		<reference ref_id="969655" ref_url="https://bugzilla.suse.com/969655" source="BUGZILLA"/>
		<reference ref_id="969690" ref_url="https://bugzilla.suse.com/969690" source="BUGZILLA"/>
		<reference ref_id="969735" ref_url="https://bugzilla.suse.com/969735" source="BUGZILLA"/>
		<reference ref_id="969992" ref_url="https://bugzilla.suse.com/969992" source="BUGZILLA"/>
		<reference ref_id="969993" ref_url="https://bugzilla.suse.com/969993" source="BUGZILLA"/>
		<reference ref_id="970062" ref_url="https://bugzilla.suse.com/970062" source="BUGZILLA"/>
		<reference ref_id="970160" ref_url="https://bugzilla.suse.com/970160" source="BUGZILLA"/>
		<reference ref_id="970249" ref_url="https://bugzilla.suse.com/970249" source="BUGZILLA"/>
		<reference ref_id="970909" ref_url="https://bugzilla.suse.com/970909" source="BUGZILLA"/>
		<reference ref_id="971125" ref_url="https://bugzilla.suse.com/971125" source="BUGZILLA"/>
		<reference ref_id="971360" ref_url="https://bugzilla.suse.com/971360" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8709" ref_url="https://www.suse.com/security/cve/CVE-2015-8709/" source="CVE"/>
		<reference ref_id="CVE-2015-8812" ref_url="https://www.suse.com/security/cve/CVE-2015-8812/" source="CVE"/>
		<reference ref_id="CVE-2015-8816" ref_url="https://www.suse.com/security/cve/CVE-2015-8816/" source="CVE"/>
		<reference ref_id="CVE-2016-2143" ref_url="https://www.suse.com/security/cve/CVE-2016-2143/" source="CVE"/>
		<reference ref_id="CVE-2016-2184" ref_url="https://www.suse.com/security/cve/CVE-2016-2184/" source="CVE"/>
		<reference ref_id="CVE-2016-2384" ref_url="https://www.suse.com/security/cve/CVE-2016-2384/" source="CVE"/>
		<reference ref_id="CVE-2016-2782" ref_url="https://www.suse.com/security/cve/CVE-2016-2782/" source="CVE"/>
		<reference ref_id="CVE-2016-3139" ref_url="https://www.suse.com/security/cve/CVE-2016-3139/" source="CVE"/>
		<reference ref_id="CVE-2016-3156" ref_url="https://www.suse.com/security/cve/CVE-2016-3156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.57 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2015-8812: A flaw was found in the CXGB3 kernel driver when
  the network was considered congested.  The kernel would incorrectly
  misinterpret the congestion as an error condition and incorrectly
  free/clean up the skb. When the device would then send the skb's queued,
  these structures would be referenced and may panic the system or allow
  an attacker to escalate privileges in a use-after-free scenario. (bsc#966437)
- CVE-2015-8816: A malicious USB device could cause a kernel crash in the USB hub driver. (bnc#968010).
- CVE-2016-2143: On zSeries a fork of a large process could have caused memory corruption due to incorrect page table handling. (bnc#970504)
- CVE-2016-2184: A malicious USB device could cause a kernel crash in the alsa usb-audio driver. (bsc#971125).
- CVE-2016-2384: A malicious USB device could cause a kernel crash in the alsa usb-audio driver. (bsc#966693)
- CVE-2016-2782: A malicious USB device could cause a kernel crash in the usb visor driver. (bnc#968670).
- CVE-2016-3139: A malicious USB device could cause a kernel crash in the wacom driver. (bnc#970909).
- CVE-2016-3156: Removal of ipv4 interfaces with a large number of IP addresses was taking very long. (bsc#971360).
- CVE-2015-8709: kernel/ptrace.c in the Linux kernel mishandled uid and
  gid mappings, which allowed local users to gain privileges by establishing
  a user namespace, waiting for a root process to enter that namespace
  with an unsafe uid or gid, and then using the ptrace system call.  NOTE:
  the vendor states 'there is no kernel bug here (bnc#960561).

The following non-security bugs were fixed:
- aacraid: Refresh patches.drivers/0005-aacraid-MSI-x-support.patch. (boo#970249)
- acpi: processor: Introduce apic_id in struct processor to save parsed APIC id (bsc#959463).
- alsa: rawmidi: Make snd_rawmidi_transmit() race-free (bsc#968018).
- alsa: seq: Fix leak of pool buffer at concurrent writes (bsc#968018).
- btrfs: Account data space in more proper timing: (bsc#963193).
- btrfs: Add handler for invalidate page (bsc#963193).
- btrfs: check prepare_uptodate_page() error code earlier (bnc#966910).
- btrfs: delayed_ref: Add new function to record reserved space into delayed ref (bsc#963193).
- btrfs: delayed_ref: release and free qgroup reserved at proper timing (bsc#963193).
- btrfs: extent_io: Introduce needed structure for recoding set/clear bits (bsc#963193).
- btrfs: extent_io: Introduce new function clear_record_extent_bits() (bsc#963193).
- btrfs: extent_io: Introduce new function set_record_extent_bits (bsc#963193).
- btrfs: extent-tree: Add new version of btrfs_check_data_free_space and btrfs_free_reserved_data_space (bsc#963193).
- btrfs: extent-tree: Add new version of btrfs_delalloc_reserve/release_space (bsc#963193).
- btrfs: extent-tree: Switch to new check_data_free_space and free_reserved_data_space (bsc#963193).
- btrfs: extent-tree: Switch to new delalloc space reserve and release (bsc#963193).
- btrfs: fallocate: Added a prerequisite patch and rebased the chunks that had previously been taken from it. Fixes a warning we had in fs/btrfs/file.c.
- btrfs: fallocate: Add support to accurate qgroup reserve (bsc#963193).
- btrfs: fix invalid page accesses in extent_same (dedup) ioctl (bnc#968230).
- btrfs: fix page reading in extent_same ioctl leading to csum errors (bnc#968230).
- btrfs: fix warning in backref walking (bnc#966278).
- btrfs: qgroup: Add handler for NOCOW and inline (bsc#963193).
- btrfs: qgroup: Add new trace point for qgroup data reserve (bsc#963193).
- btrfs: qgroup: Avoid calling btrfs_free_reserved_data_space in clear_bit_hook (bsc#963193).
- btrfs: qgroup: Check if qgroup reserved space leaked (bsc#963193).
- btrfs: qgroup: Cleanup old inaccurate facilities (bsc#963193).
- btrfs: qgroup: Fix a race in delayed_ref which leads to abort trans (bsc#963193).
- btrfs: qgroup: Fix a rebase bug which will cause qgroup double free (bsc#963193).
- btrfs: qgroup: Fix dead judgement on qgroup_rescan_leaf() return value (bsc#969439).
- btrfs: qgroup: Introduce btrfs_qgroup_reserve_data function (bsc#963193).
- btrfs: qgroup: Introduce functions to release/free qgroup reserve data space (bsc#963193).
- btrfs: qgroup: Introduce new functions to reserve/free metadata (bsc#963193).
- btrfs: qgroup: Use new metadata reservation (bsc#963193).
- dcache: use IS_ROOT to decide where dentry is hashed (bsc#949752).
- dmapi: fix dm_open_by_handle_rvp taking an extra ref to mnt (bsc#967292).
- drivers/base/memory.c: fix kernel warning during memory hotplug on ppc64 (bsc#963827).
- drivers: hv: Allow for MMIO claims that span ACPI _CRS records (bnc#965924).
- drivers: hv: Define the channel type for Hyper-V PCI Express pass-through (bnc#965924).
- drivers: hv: Export a function that maps Linux CPU num onto Hyper-V proc num (bnc#965924).
- drivers: hv: Export the API to invoke a hypercall on Hyper-V (bnc#965924).
- drivers: hv: kvp: fix IP Failover.
- drivers: pci:hv: New paravirtual PCI front-end for Hyper-V VMs (bnc#965924).
- drivers: xen-blkfront: only talk_to_blkback() when in XenbusStateInitialising (bsc#957986 fate#320625).
- drivers: xen-blkfront: move talk_to_blkback to a more suitable place (bsc#957986 fate#320625).
- e1000e: Avoid divide by zero error (bsc#968643).
- e1000e: fix division by zero on jumbo MTUs (bsc#968643).
- e1000e: Fix tight loop implementation of systime read algorithm (bsc#968643).
- efi: Ignore efivar_validate kabi failures -- it's an EFI internal function.
- fix: print ext4 mountopt data_err=abort correctly (bsc#969735).
- Fix problem with setting ACL on directories (bsc#867251).
- fs/proc_namespace.c: simplify testing nsp and nsp-&gt;mnt_ns (bug#963960).
- futex: Drop refcount if requeue_pi() acquired the rtmutex (bug#960174).
- hv: Lock access to hyperv_mmio resource tree (bnc#965924).
- hv: Make a function to free mmio regions through vmbus (bnc#965924).
- hv: Reverse order of resources in hyperv_mmio (bnc#965924).
- hv: Track allocations of children of hv_vmbus in private resource tree (bnc#965924).
- hv: Use new vmbus_mmio_free() from client drivers (bnc#965924).
- hwmon: (coretemp) Increase maximum core to 128 (bsc#970160)
- ibmvnic: Fix ibmvnic_capability struct (fate#320253).
- intel_pstate: Use del_timer_sync in intel_pstate_cpu_stop (bsc#967650).
- ipv6: mld: fix add_grhead skb_over_panic for devs with large MTUs (bsc#956852).
- kabi: Preserve checksum of kvm_x86_ops (bsc#969112).
- kabi: protect struct acpi_processor signature (bsc#959463).
- kgr: fix reversion of a patch already reverted by a replace_all patch (fate#313296).
- kvm: SVM: add rdmsr support for AMD event registers (bsc#968448).
- kvm: x86: Check dest_map-&gt;vector to match eoi signals for rtc (bsc#966471).
- kvm: x86: Convert ioapic-&gt;rtc_status.dest_map to a struct (bsc#966471).
- kvm: x86: store IOAPIC-handled vectors in each VCPU (bsc#966471).
- kvm: x86: Track irq vectors in ioapic-&gt;rtc_status.dest_map (bsc#966471).
- libata: Revert 'libata: Align ata_device's id on a cacheline'.
- libceph: fix scatterlist last_piece calculation (bsc#963746).
- lpfc: Fix kmalloc overflow in LPFC driver at large core count (bsc#969690).
- memcg: do not hang on OOM when killed by userspace OOM access to memory reserves (bnc#969571).
- mld, igmp: Fix reserved tailroom calculation (bsc#956852).
- namespaces: Re-introduce task_nsproxy() helper (bug#963960).
- namespaces: Use task_lock and not rcu to protect nsproxy (bug#963960).
- net: core: Correct an over-stringent device loop detection (bsc#945219).
- net: irda: Fix use-after-free in irtty_open() (bnc#967903).
- net: Revert 'net/ipv6: add sysctl option accept_ra_min_hop_limit'.
- nfs4: treat lock owners as opaque values (bnc#968141).
- nfs: Background flush should not be low priority (bsc#955308).
- nfsd: fix nfsd_setattr return code for HSM (bsc#969992).
- nfs: do not use STABLE writes during writeback (bnc#816099).
- nfs: Fix handling of re-write-before-commit for mmapped NFS pages (bsc#964201).
- nvme: default to 4k device page size (bsc#967047).
- nvme: special case AEN requests (bsc#965087).
- pci: Add global pci_lock_rescan_remove() (bnc#965924).
- pci: allow access to VPD attributes with size 0 (bsc#959146).
- pciback: Check PF instead of VF for PCI_COMMAND_MEMORY.
- pciback: Save the number of MSI-X entries to be copied later.
- pci: Blacklist vpd access for buggy devices (bsc#959146).
- pci: Determine actual VPD size on first access (bsc#959146).
- pci: Export symbols required for loadable host driver modules (bnc#965924).
- pci: pciehp: Disable link notification across slot reset (bsc#967651).
- pci: pciehp: Do not check adapter or latch status while disabling (bsc#967651).
- pci: pciehp: Do not disable the link permanently during removal (bsc#967651).
- pci: pciehp: Ensure very fast hotplug events are also processed (bsc#967651).
- pci: Update VPD definitions (bsc#959146).
- perf, nmi: Fix unknown NMI warning (bsc#968512).
- proc: Fix ptrace-based permission checks for accessing task maps.
- pv6: Revert 'ipv6: tcp: add rcu locking in tcp_v6_send_synack()' (bnc#961257).
- qla2xxx: Remove unavailable firmware files (bsc#943645).
- rbd: do not log miscompare as an error (bsc#970062).
- resources: Set type in __request_region() (bnc#965924).
- rpm/kernel-binary.spec.in: Sync the main and -base package dependencies (bsc#965830#c51).
- rpm/kernel-module-subpackage: Fix obsoleting dropped flavors (bsc#968253)
- scsi_dh_alua: Do not block request queue if workqueue is active (bsc#960458).
- scsi: fix soft lockup in scsi_remove_target() on module removal (bsc#965199).
- scsi: proper state checking and module refcount handling in scsi_device_get (boo#966831).
- series.conf: add section comments
- supported.conf: Add e1000e (emulated by VMware) to -base (bsc#968074)
- supported.conf: Add Hyper-V modules to -base (bsc#965830)
- supported.conf: Add isofs to -base (bsc#969655).
- supported.conf: Add more qemu device driver (bsc#968234)
- supported.conf: Add mptspi and mptsas to -base (bsc#968206)
- supported.conf: Add the qemu scsi driver (sym53c8xx) to -base (bsc#967802)
- supported.conf: Add tulip to -base for Hyper-V (bsc#968234)
- supported.conf: Add virtio-rng (bsc#966026)
- supported.conf: Add xen-blkfront.
- supported.conf: Add xfs to -base (bsc#965891)
- supported.conf: Fix usb-common path usb-common moved to its own subdirectory in kernel v3.16, and we backported that change to SLE12.
- tcp: Restore RFC5961-compliant behavior for SYN packets (bsc#966864).
- usb: Quiet down false peer failure messages (bnc#960629).
- x86: export x86_msi (bnc#965924).
- xen: Add /etc/modprobe.d/50-xen.conf selecting Xen frontend driver implementation (bsc#957986, bsc#956084, bsc#961658).
- xen-blkfront: allow building in our Xen environment (bsc#957986 fate#320625).
- xen, blkfront: factor out flush-related checks from do_blkif_request() (bsc#957986 fate#320625).
- xen-blkfront: fix accounting of reqs when migrating (bsc#957986 fate#320625).
- xen/blkfront: Fix crash if backend does not follow the right states (bsc#957986 fate#320625).
- xen-blkfront: improve aproximation of required grants per request (bsc#957986 fate#320625).
- xen/blkfront: improve protection against issuing unsupported REQ_FUA (bsc#957986 fate#320625).
- xen/blkfront: remove redundant flush_op (bsc#957986 fate#320625).
- xen-blkfront: remove type check from blkfront_setup_discard (bsc#957986 fate#320625).
- xen-blkfront: Silence pfn maybe-uninitialized warning (bsc#957986 fate#320625).
- xen: block: xen-blkfront: Fix possible NULL ptr dereference (bsc#957986 fate#320625).
- xen: Refresh patches.xen/xen3-patch-2.6.33 (detect NX support early).
- xen: Refresh patches.xen/xen-vscsi-large-requests (gsc#966094).
- xen: Update Xen config files (enable upstream block frontend).
- xen: Update Xen patches to 3.12.55.
- xen-vscsi-large-requests: Fix resource collision for racing request maps and unmaps (bsc#966094).
- xfs/dmapi: drop lock over synchronous XFS_SEND_DATA events (bsc#969993).
- xfs/dmapi: propertly send postcreate event (bsc#967299).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-12"/>
	<updated date="2016-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/816099">SUSE bug 816099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867251">SUSE bug 867251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875631">SUSE bug 875631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880007">SUSE bug 880007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943645">SUSE bug 943645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944749">SUSE bug 944749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945219">SUSE bug 945219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949752">SUSE bug 949752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955308">SUSE bug 955308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956084">SUSE bug 956084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956852">SUSE bug 956852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957986">SUSE bug 957986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959146">SUSE bug 959146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959257">SUSE bug 959257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959463">SUSE bug 959463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959709">SUSE bug 959709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960174">SUSE bug 960174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960458">SUSE bug 960458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960561">SUSE bug 960561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960629">SUSE bug 960629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961257">SUSE bug 961257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961500">SUSE bug 961500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961516">SUSE bug 961516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961588">SUSE bug 961588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961658">SUSE bug 961658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963193">SUSE bug 963193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963746">SUSE bug 963746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963765">SUSE bug 963765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963827">SUSE bug 963827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963960">SUSE bug 963960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964201">SUSE bug 964201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964730">SUSE bug 964730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965087">SUSE bug 965087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965199">SUSE bug 965199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965830">SUSE bug 965830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965891">SUSE bug 965891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965924">SUSE bug 965924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966026">SUSE bug 966026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966094">SUSE bug 966094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966278">SUSE bug 966278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966437">SUSE bug 966437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966471">SUSE bug 966471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966693">SUSE bug 966693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966831">SUSE bug 966831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966864">SUSE bug 966864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966910">SUSE bug 966910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967047">SUSE bug 967047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967292">SUSE bug 967292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967299">SUSE bug 967299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967650">SUSE bug 967650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967651">SUSE bug 967651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967802">SUSE bug 967802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967903">SUSE bug 967903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968010">SUSE bug 968010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968018">SUSE bug 968018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968074">SUSE bug 968074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968141">SUSE bug 968141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968206">SUSE bug 968206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968230">SUSE bug 968230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968234">SUSE bug 968234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968253">SUSE bug 968253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968448">SUSE bug 968448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968512">SUSE bug 968512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968643">SUSE bug 968643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968670">SUSE bug 968670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969112">SUSE bug 969112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969439">SUSE bug 969439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969571">SUSE bug 969571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969655">SUSE bug 969655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969690">SUSE bug 969690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969735">SUSE bug 969735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969992">SUSE bug 969992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969993">SUSE bug 969993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970062">SUSE bug 970062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970160">SUSE bug 970160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970249">SUSE bug 970249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970909">SUSE bug 970909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971125">SUSE bug 971125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971360">SUSE bug 971360</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8709/">CVE-2015-8709</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8812/">CVE-2015-8812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8816/">CVE-2015-8816</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2143/">CVE-2016-2143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2184/">CVE-2016-2184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2384/">CVE-2016-2384</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2782/">CVE-2016-2782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3139/">CVE-2016-3139</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3156/">CVE-2016-3156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516943" comment="kernel-default-3.12.57-60.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516944" comment="kernel-default-devel-3.12.57-60.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516945" comment="kernel-default-extra-3.12.57-60.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516946" comment="kernel-devel-3.12.57-60.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516947" comment="kernel-macros-3.12.57-60.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516948" comment="kernel-source-3.12.57-60.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516949" comment="kernel-syms-3.12.57-60.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516950" comment="kernel-xen-3.12.57-60.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516951" comment="kernel-xen-devel-3.12.57-60.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77681" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="924519" ref_url="https://bugzilla.suse.com/924519" source="BUGZILLA"/>
		<reference ref_id="936862" ref_url="https://bugzilla.suse.com/936862" source="BUGZILLA"/>
		<reference ref_id="968973" ref_url="https://bugzilla.suse.com/968973" source="BUGZILLA"/>
		<reference ref_id="971965" ref_url="https://bugzilla.suse.com/971965" source="BUGZILLA"/>
		<reference ref_id="972197" ref_url="https://bugzilla.suse.com/972197" source="BUGZILLA"/>
		<reference ref_id="973031" ref_url="https://bugzilla.suse.com/973031" source="BUGZILLA"/>
		<reference ref_id="973032" ref_url="https://bugzilla.suse.com/973032" source="BUGZILLA"/>
		<reference ref_id="973033" ref_url="https://bugzilla.suse.com/973033" source="BUGZILLA"/>
		<reference ref_id="973034" ref_url="https://bugzilla.suse.com/973034" source="BUGZILLA"/>
		<reference ref_id="973036" ref_url="https://bugzilla.suse.com/973036" source="BUGZILLA"/>
		<reference ref_id="973832" ref_url="https://bugzilla.suse.com/973832" source="BUGZILLA"/>
		<reference ref_id="974629" ref_url="https://bugzilla.suse.com/974629" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5370" ref_url="https://www.suse.com/security/cve/CVE-2015-5370/" source="CVE"/>
		<reference ref_id="CVE-2016-2110" ref_url="https://www.suse.com/security/cve/CVE-2016-2110/" source="CVE"/>
		<reference ref_id="CVE-2016-2111" ref_url="https://www.suse.com/security/cve/CVE-2016-2111/" source="CVE"/>
		<reference ref_id="CVE-2016-2112" ref_url="https://www.suse.com/security/cve/CVE-2016-2112/" source="CVE"/>
		<reference ref_id="CVE-2016-2113" ref_url="https://www.suse.com/security/cve/CVE-2016-2113/" source="CVE"/>
		<reference ref_id="CVE-2016-2115" ref_url="https://www.suse.com/security/cve/CVE-2016-2115/" source="CVE"/>
		<reference ref_id="CVE-2016-2118" ref_url="https://www.suse.com/security/cve/CVE-2016-2118/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" source="SUSE-SU"/>
		<description>
samba was updated to fix seven security issues.

These security issues were fixed:
- CVE-2015-5370: DCERPC server and client were vulnerable to DOS and MITM attacks (bsc#936862).
- CVE-2016-2110: A man-in-the-middle could have downgraded NTLMSSP authentication (bsc#973031).
- CVE-2016-2111: Domain controller netlogon member computer could have been spoofed (bsc#973032).
- CVE-2016-2112: LDAP conenctions were vulnerable to downgrade and MITM attack (bsc#973033).
- CVE-2016-2113: TLS certificate validation were missing (bsc#973034).
- CVE-2016-2115: Named pipe IPC were vulnerable to MITM attacks (bsc#973036).
- CVE-2016-2118: 'Badlock' DCERPC impersonation of authenticated account were possible (bsc#971965).

These non-security issues were fixed:
- bsc#974629: Fix samba.tests.messaging test and prevent potential tdb corruption by removing obsolete now invalid tdb_close call.
- bsc#973832: Obsolete libsmbsharemodes0 from samba-libs and libsmbsharemodes-devel from samba-core-devel.
- bsc#972197: Obsolete libsmbclient from libsmbclient0 and libpdb-devel from libsamba-passdb-devel while not providing it.
- Getting and setting Windows ACLs on symlinks can change permissions on link
- bsc#924519: Upgrade on-disk FSRVP server state to new version.
- bsc#968973: Only obsolete but do not provide gplv2/3 package names.
- bso#6482: s3:utils/smbget: Fix recursive download.
- bso#10489: s3: smbd: posix_acls: Fix check for setting u:g:o entry on a filesystem with no ACL support.
- bso#11643: docs: Add example for domain logins to smbspool man page.
- bso#11690: s3-client: Add a KRB5 wrapper for smbspool.
- bso#11708: loadparm: Fix memory leak issue.
- bso#11714: lib/tsocket: Work around sockets not supporting FIONREAD.
- bso#11719: ctdb-scripts: Drop use of 'smbcontrol winbindd ip-dropped ...'.
- bso#11727: s3:smbd:open: Skip redundant call to file_set_dosmode when creating a new file.
- bso#11732: param: Fix str_list_v3 to accept ';' again.
- bso#11740: Real memeory leak(buildup) issue in loadparm.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-12"/>
	<updated date="2016-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/924519">SUSE bug 924519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936862">SUSE bug 936862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968973">SUSE bug 968973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971965">SUSE bug 971965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972197">SUSE bug 972197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973031">SUSE bug 973031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973032">SUSE bug 973032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973033">SUSE bug 973033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973034">SUSE bug 973034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973036">SUSE bug 973036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973832">SUSE bug 973832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974629">SUSE bug 974629</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5370/">CVE-2015-5370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2110/">CVE-2016-2110</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2111/">CVE-2016-2111</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2112/">CVE-2016-2112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2113/">CVE-2016-2113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2115/">CVE-2016-2115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2118/">CVE-2016-2118</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516952" comment="libdcerpc-binding0-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516953" comment="libdcerpc-binding0-32bit-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516954" comment="libdcerpc0-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516955" comment="libdcerpc0-32bit-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516956" comment="libgensec0-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516957" comment="libgensec0-32bit-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516958" comment="libndr-krb5pac0-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516959" comment="libndr-krb5pac0-32bit-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516960" comment="libndr-nbt0-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516961" comment="libndr-nbt0-32bit-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516962" comment="libndr-standard0-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516963" comment="libndr-standard0-32bit-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516964" comment="libndr0-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516965" comment="libndr0-32bit-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516966" comment="libnetapi0-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516967" comment="libnetapi0-32bit-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516968" comment="libregistry0-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516969" comment="libsamba-credentials0-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516970" comment="libsamba-credentials0-32bit-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516971" comment="libsamba-hostconfig0-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516972" comment="libsamba-hostconfig0-32bit-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516973" comment="libsamba-passdb0-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516974" comment="libsamba-passdb0-32bit-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516975" comment="libsamba-util0-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516976" comment="libsamba-util0-32bit-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516977" comment="libsamdb0-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516978" comment="libsamdb0-32bit-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516979" comment="libsmbclient-raw0-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516980" comment="libsmbclient-raw0-32bit-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516981" comment="libsmbclient0-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516982" comment="libsmbclient0-32bit-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516983" comment="libsmbconf0-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516984" comment="libsmbconf0-32bit-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516985" comment="libsmbldap0-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516986" comment="libsmbldap0-32bit-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516987" comment="libtevent-util0-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516988" comment="libtevent-util0-32bit-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516989" comment="libwbclient0-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516990" comment="libwbclient0-32bit-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516991" comment="samba-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516992" comment="samba-32bit-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516993" comment="samba-client-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516994" comment="samba-client-32bit-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516995" comment="samba-doc-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516996" comment="samba-libs-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516997" comment="samba-libs-32bit-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516998" comment="samba-winbind-4.2.4-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516999" comment="samba-winbind-32bit-4.2.4-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77682" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-c (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="966822" ref_url="https://bugzilla.suse.com/966822" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0729" ref_url="https://www.suse.com/security/cve/CVE-2016-0729/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002000.html" source="SUSE-SU"/>
		<description>

This update for xerces-c fixes the following security issue:

- CVE-2016-0729: Fixed mishandling certain kinds of malformed input documents,
  that resulted in buffer overlows during processing and error reporting.
  The overflows can manifest as a segmentation fault or as memory
  corruption during a parse operation. (bsc#966822)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-13"/>
	<updated date="2016-04-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/966822">SUSE bug 966822</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0729/">CVE-2016-0729</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009515998" comment="libxerces-c-3_1-3.1.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515999" comment="libxerces-c-3_1-32bit-3.1.1-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77683" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="965902" ref_url="https://bugzilla.suse.com/965902" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7511" ref_url="https://www.suse.com/security/cve/CVE-2015-7511/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002017.html" source="SUSE-SU"/>
		<description>
libgcrypt was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-7511: Side-channel attack on ECDH with Weierstrass curves (bsc#965902).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-18"/>
	<updated date="2016-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/965902">SUSE bug 965902</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7511/">CVE-2015-7511</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516000" comment="libgcrypt20-1.6.1-16.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516001" comment="libgcrypt20-32bit-1.6.1-16.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77684" version="1" class="patch">
	<metadata>
		<title>Security update for lhasa (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="973790" ref_url="https://bugzilla.suse.com/973790" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2347" ref_url="https://www.suse.com/security/cve/CVE-2016-2347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002019.html" source="SUSE-SU"/>
		<description>
lhasa was updated to fix one security issue.

This security issue was fixed:
- CVE-2016-2347: decode_level3_header heap corruption vulnerability (bsc#973790).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-18"/>
	<updated date="2016-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/973790">SUSE bug 973790</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2347/">CVE-2016-2347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516002" comment="lhasa-0.2.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516003" comment="liblhasa0-0.2.0-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77685" version="1" class="patch">
	<metadata>
		<title>Security update for cairo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="971964" ref_url="https://bugzilla.suse.com/971964" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3190" ref_url="https://www.suse.com/security/cve/CVE-2016-3190/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002020.html" source="SUSE-SU"/>
		<description>

This update for cairo fixes the following issues:

- CVE-2016-3190: Fixed an out-of-bound read in the fill_xrgb32_lerp_opaque_spans
  function that might lead to a crash when processing a maliciously
  crafted image file (bsc#971964).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-19"/>
	<updated date="2016-04-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/971964">SUSE bug 971964</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3190/">CVE-2016-3190</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516004" comment="libcairo-gobject2-1.12.16-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516005" comment="libcairo-gobject2-32bit-1.12.16-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517000" comment="libcairo-script-interpreter2-1.12.16-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516006" comment="libcairo2-1.12.16-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516007" comment="libcairo2-32bit-1.12.16-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77686" version="1" class="patch">
	<metadata>
		<title>Security update for cups-filters (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="957531" ref_url="https://bugzilla.suse.com/957531" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8327" ref_url="https://www.suse.com/security/cve/CVE-2015-8327/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001794.html" source="SUSE-SU"/>
		<description>

  This update fixes the following security issue:

  CVE-2015-8327 adds backtick and semicolon to the list of illegal shell escape characters (bsc#957531).

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-12"/>
	<updated date="2016-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/957531">SUSE bug 957531</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8327/">CVE-2015-8327</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516008" comment="cups-filters-1.0.58-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516009" comment="cups-filters-cups-browsed-1.0.58-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516010" comment="cups-filters-foomatic-rip-1.0.58-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516011" comment="cups-filters-ghostscript-1.0.58-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77687" version="1" class="patch">
	<metadata>
		<title>Security update for giflib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="974847" ref_url="https://bugzilla.suse.com/974847" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3977" ref_url="https://www.suse.com/security/cve/CVE-2016-3977/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002025.html" source="SUSE-SU"/>
		<description>
giflib was updated to fix one security issue.

This security issue was fixed:
- CVE-2016-3977: Heap buffer overflow in gif2rgb (bsc#974847).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-25"/>
	<updated date="2016-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/974847">SUSE bug 974847</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3977/">CVE-2016-3977</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516012" comment="libgif6-5.0.5-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516013" comment="libgif6-32bit-5.0.5-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77688" version="1" class="patch">
	<metadata>
		<title>Security update for yast2-users (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="971804" ref_url="https://bugzilla.suse.com/971804" source="BUGZILLA"/>
		<reference ref_id="973639" ref_url="https://bugzilla.suse.com/973639" source="BUGZILLA"/>
		<reference ref_id="974220" ref_url="https://bugzilla.suse.com/974220" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1601" ref_url="https://www.suse.com/security/cve/CVE-2016-1601/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00051.html" source="SUSE-SU"/>
		<description>
yast2-users was updated to fix one security issue.

This security issue was fixed:
- CVE-2016-1601: Empty passwords fields in /etc/shadow after SLES 12 SP1 autoyast installation (bsc#974220).

This update includes a script that fixes installations that we're affected by this problem. It is run automatically
upon installing the update.

This non-security issue was fixed:
- bsc#971804: Set root password correctly when using a minimal profile
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-25"/>
	<updated date="2016-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/971804">SUSE bug 971804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973639">SUSE bug 973639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974220">SUSE bug 974220</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1601/">CVE-2016-1601</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517001" comment="yast2-users-3.1.41.3-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77689" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="782060" ref_url="https://bugzilla.suse.com/782060" source="BUGZILLA"/>
		<reference ref_id="916617" ref_url="https://bugzilla.suse.com/916617" source="BUGZILLA"/>
		<reference ref_id="937837" ref_url="https://bugzilla.suse.com/937837" source="BUGZILLA"/>
		<reference ref_id="951559" ref_url="https://bugzilla.suse.com/951559" source="BUGZILLA"/>
		<reference ref_id="951629" ref_url="https://bugzilla.suse.com/951629" source="BUGZILLA"/>
		<reference ref_id="956773" ref_url="https://bugzilla.suse.com/956773" source="BUGZILLA"/>
		<reference ref_id="962318" ref_url="https://bugzilla.suse.com/962318" source="BUGZILLA"/>
		<reference ref_id="962784" ref_url="https://bugzilla.suse.com/962784" source="BUGZILLA"/>
		<reference ref_id="962802" ref_url="https://bugzilla.suse.com/962802" source="BUGZILLA"/>
		<reference ref_id="962960" ref_url="https://bugzilla.suse.com/962960" source="BUGZILLA"/>
		<reference ref_id="962966" ref_url="https://bugzilla.suse.com/962966" source="BUGZILLA"/>
		<reference ref_id="962970" ref_url="https://bugzilla.suse.com/962970" source="BUGZILLA"/>
		<reference ref_id="962988" ref_url="https://bugzilla.suse.com/962988" source="BUGZILLA"/>
		<reference ref_id="962994" ref_url="https://bugzilla.suse.com/962994" source="BUGZILLA"/>
		<reference ref_id="962995" ref_url="https://bugzilla.suse.com/962995" source="BUGZILLA"/>
		<reference ref_id="962997" ref_url="https://bugzilla.suse.com/962997" source="BUGZILLA"/>
		<reference ref_id="963000" ref_url="https://bugzilla.suse.com/963000" source="BUGZILLA"/>
		<reference ref_id="963002" ref_url="https://bugzilla.suse.com/963002" source="BUGZILLA"/>
		<reference ref_id="975496" ref_url="https://bugzilla.suse.com/975496" source="BUGZILLA"/>
		<reference ref_id="975981" ref_url="https://bugzilla.suse.com/975981" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5300" ref_url="https://www.suse.com/security/cve/CVE-2015-5300/" source="CVE"/>
		<reference ref_id="CVE-2015-7973" ref_url="https://www.suse.com/security/cve/CVE-2015-7973/" source="CVE"/>
		<reference ref_id="CVE-2015-7974" ref_url="https://www.suse.com/security/cve/CVE-2015-7974/" source="CVE"/>
		<reference ref_id="CVE-2015-7975" ref_url="https://www.suse.com/security/cve/CVE-2015-7975/" source="CVE"/>
		<reference ref_id="CVE-2015-7976" ref_url="https://www.suse.com/security/cve/CVE-2015-7976/" source="CVE"/>
		<reference ref_id="CVE-2015-7977" ref_url="https://www.suse.com/security/cve/CVE-2015-7977/" source="CVE"/>
		<reference ref_id="CVE-2015-7978" ref_url="https://www.suse.com/security/cve/CVE-2015-7978/" source="CVE"/>
		<reference ref_id="CVE-2015-7979" ref_url="https://www.suse.com/security/cve/CVE-2015-7979/" source="CVE"/>
		<reference ref_id="CVE-2015-8138" ref_url="https://www.suse.com/security/cve/CVE-2015-8138/" source="CVE"/>
		<reference ref_id="CVE-2015-8139" ref_url="https://www.suse.com/security/cve/CVE-2015-8139/" source="CVE"/>
		<reference ref_id="CVE-2015-8140" ref_url="https://www.suse.com/security/cve/CVE-2015-8140/" source="CVE"/>
		<reference ref_id="CVE-2015-8158" ref_url="https://www.suse.com/security/cve/CVE-2015-8158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" source="SUSE-SU"/>
		<description>
ntp was updated to version 4.2.8p6 to fix 12 security issues.

Also yast2-ntp-client was updated to match some sntp syntax changes. (bsc#937837)

These security issues were fixed:
- CVE-2015-8158: Fixed potential infinite loop in ntpq (bsc#962966).
- CVE-2015-8138: Zero Origin Timestamp Bypass (bsc#963002).
- CVE-2015-7979: Off-path Denial of Service (DoS) attack on authenticated broadcast mode (bsc#962784).
- CVE-2015-7978: Stack exhaustion in recursive traversal of restriction list (bsc#963000).
- CVE-2015-7977: reslist NULL pointer dereference (bsc#962970).
- CVE-2015-7976: ntpq saveconfig command allows dangerous characters in filenames (bsc#962802).
- CVE-2015-7975: nextvar() missing length check (bsc#962988).
- CVE-2015-7974: Skeleton Key: Missing key check allows impersonation between authenticated peers (bsc#962960).
- CVE-2015-7973: Replay attack on authenticated broadcast mode (bsc#962995).
- CVE-2015-8140: ntpq vulnerable to replay attacks (bsc#962994).
- CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin (bsc#962997).
- CVE-2015-5300: MITM attacker could have forced ntpd to make a step larger than the panic threshold (bsc#951629).

These non-security issues were fixed:
- fate#320758 bsc#975981: Enable compile-time support for MS-SNTP
  (--enable-ntp-signd).  This replaces the w32 patches in 4.2.4 that added
  the authreg directive.
- bsc#962318: Call /usr/sbin/sntp with full path to synchronize in start-ntpd.
  When run as cron job, /usr/sbin/ is not in the path, which caused
  the synchronization to fail.
- bsc#782060: Speedup ntpq.
- bsc#916617: Add /var/db/ntp-kod.
- bsc#956773: Add ntp-ENOBUFS.patch to limit a warning that might happen quite a lot on loaded systems.
- bsc#951559,bsc#975496: Fix the TZ offset output of sntp during DST.
- Add ntp-fork.patch and build with threads disabled to allow name resolution even when running chrooted.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-28"/>
	<updated date="2016-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/782060">SUSE bug 782060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916617">SUSE bug 916617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937837">SUSE bug 937837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951559">SUSE bug 951559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951629">SUSE bug 951629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956773">SUSE bug 956773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962318">SUSE bug 962318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962784">SUSE bug 962784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962802">SUSE bug 962802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962960">SUSE bug 962960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962966">SUSE bug 962966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962970">SUSE bug 962970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962988">SUSE bug 962988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962994">SUSE bug 962994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962997">SUSE bug 962997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963000">SUSE bug 963000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963002">SUSE bug 963002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975496">SUSE bug 975496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975981">SUSE bug 975981</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5300/">CVE-2015-5300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7973/">CVE-2015-7973</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7974/">CVE-2015-7974</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7975/">CVE-2015-7975</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7976/">CVE-2015-7976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7977/">CVE-2015-7977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7978/">CVE-2015-7978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7979/">CVE-2015-7979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8138/">CVE-2015-8138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8139/">CVE-2015-8139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8140/">CVE-2015-8140</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8158/">CVE-2015-8158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517002" comment="ntp-4.2.8p6-8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517003" comment="ntp-doc-4.2.8p6-8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517004" comment="yast2-ntp-client-3.1.22-6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77690" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="972335" ref_url="https://bugzilla.suse.com/972335" source="BUGZILLA"/>
		<reference ref_id="975947" ref_url="https://bugzilla.suse.com/975947" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3627" ref_url="https://www.suse.com/security/cve/CVE-2016-3627/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002036.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes two security issues:

- libxml2 limits the number of recursions an XML document can contain so to protect against the 'Billion Laughs' denial-of-service attack. Unfortunately, the underlying counter was not incremented properly in all necessary locations. Therefore, specially crafted XML documents could exhaust all available stack space and crash the XML parser without running into the recursion limit. This vulnerability has been fixed. (bsc#975947)

- When running in recovery mode, certain invalid XML documents would trigger an infinite recursion in libxml2 that ran until all stack space was exhausted. This vulnerability could have been used to facilitate a denial-of-sevice attack. (CVE-2016-3627, bsc#972335)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-03"/>
	<updated date="2016-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/972335">SUSE bug 972335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975947">SUSE bug 975947</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3627/">CVE-2016-3627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516014" comment="libxml2-2-2.9.1-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516015" comment="libxml2-2-32bit-2.9.1-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516016" comment="libxml2-tools-2.9.1-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516017" comment="python-libxml2-2.9.1-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77691" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="958501" ref_url="https://bugzilla.suse.com/958501" source="BUGZILLA"/>
		<reference ref_id="976942" ref_url="https://bugzilla.suse.com/976942" source="BUGZILLA"/>
		<reference ref_id="976943" ref_url="https://bugzilla.suse.com/976943" source="BUGZILLA"/>
		<reference ref_id="977614" ref_url="https://bugzilla.suse.com/977614" source="BUGZILLA"/>
		<reference ref_id="977615" ref_url="https://bugzilla.suse.com/977615" source="BUGZILLA"/>
		<reference ref_id="977616" ref_url="https://bugzilla.suse.com/977616" source="BUGZILLA"/>
		<reference ref_id="977617" ref_url="https://bugzilla.suse.com/977617" source="BUGZILLA"/>
		<reference ref_id="977621" ref_url="https://bugzilla.suse.com/977621" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2107" ref_url="https://www.suse.com/security/cve/CVE-2016-2107/" source="CVE"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2016-2108: Memory corruption in the ASN.1 encoder (bsc#977617)
- CVE-2016-2107: Padding oracle in AES-NI CBC MAC check (bsc#977616)
- CVE-2016-2105: EVP_EncodeUpdate overflow (bsc#977614)
- CVE-2016-2106: EVP_EncryptUpdate overflow (bsc#977615)
- CVE-2016-2109: ASN.1 BIO excessive memory allocation (bsc#976942)
- bsc#976943: Buffer overrun in ASN1_parse
- bsc#977621: Preserve negotiated digests for SNI (bsc#977621)
- bsc#958501: Fix openssl enc -non-fips-allow option in FIPS mode (bsc#958501)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-04"/>
	<updated date="2016-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/958501">SUSE bug 958501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976943">SUSE bug 976943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977614">SUSE bug 977614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977615">SUSE bug 977615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977616">SUSE bug 977616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977617">SUSE bug 977617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977621">SUSE bug 977621</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2107/">CVE-2016-2107</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517005" comment="libopenssl1_0_0-1.0.1i-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517006" comment="libopenssl1_0_0-32bit-1.0.1i-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517007" comment="openssl-1.0.1i-47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77692" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="976340" ref_url="https://bugzilla.suse.com/976340" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-0695" ref_url="https://www.suse.com/security/cve/CVE-2016-0695/" source="CVE"/>
		<reference ref_id="CVE-2016-3425" ref_url="https://www.suse.com/security/cve/CVE-2016-3425/" source="CVE"/>
		<reference ref_id="CVE-2016-3426" ref_url="https://www.suse.com/security/cve/CVE-2016-3426/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following security issues - April 2016 Oracle CPU (bsc#976340):

- CVE-2016-0686: Unspecified vulnerability allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to Serialization. 
- CVE-2016-0687: Unspecified vulnerability allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to the Hotspot sub-component
- CVE-2016-0695: Unspecified vulnerability allowed remote attackers to affect confidentiality via vectors related to the Security Component
- CVE-2016-3425: Unspecified vulnerability allowed remote attackers to affect availability via vectors related to JAXP
- CVE-2016-3426: Unspecified vulnerability allowed remote attackers to affect confidentiality via vectors related to JCE
- CVE-2016-3427: Unspecified vulnerability allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-06"/>
	<updated date="2016-05-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/976340">SUSE bug 976340</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0695/">CVE-2016-0695</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3425/">CVE-2016-3425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3426/">CVE-2016-3426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517008" comment="java-1_8_0-openjdk-1.8.0.91-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517009" comment="java-1_8_0-openjdk-headless-1.8.0.91-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77693" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="976340" ref_url="https://bugzilla.suse.com/976340" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-0695" ref_url="https://www.suse.com/security/cve/CVE-2016-0695/" source="CVE"/>
		<reference ref_id="CVE-2016-3425" ref_url="https://www.suse.com/security/cve/CVE-2016-3425/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk to version 2.6.6 fixes five security issues.

These security issues were fixed:
- CVE-2016-0686: Ensure thread consistency (bsc#976340).
- CVE-2016-0687: Better byte behavior (bsc#976340).
- CVE-2016-0695: Make DSA more fair (bsc#976340).
- CVE-2016-3425: Better buffering of XML strings (bsc#976340).
- CVE-2016-3427: Improve JMX connections (bsc#976340).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-06"/>
	<updated date="2016-05-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/976340">SUSE bug 976340</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0695/">CVE-2016-0695</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3425/">CVE-2016-3425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516021" comment="java-1_7_0-openjdk-1.7.0.101-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516022" comment="java-1_7_0-openjdk-headless-1.7.0.101-30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77694" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="977333" ref_url="https://bugzilla.suse.com/977333" source="BUGZILLA"/>
		<reference ref_id="977374" ref_url="https://bugzilla.suse.com/977374" source="BUGZILLA"/>
		<reference ref_id="977376" ref_url="https://bugzilla.suse.com/977376" source="BUGZILLA"/>
		<reference ref_id="977381" ref_url="https://bugzilla.suse.com/977381" source="BUGZILLA"/>
		<reference ref_id="977386" ref_url="https://bugzilla.suse.com/977386" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2805" ref_url="https://www.suse.com/security/cve/CVE-2016-2805/" source="CVE"/>
		<reference ref_id="CVE-2016-2807" ref_url="https://www.suse.com/security/cve/CVE-2016-2807/" source="CVE"/>
		<reference ref_id="CVE-2016-2808" ref_url="https://www.suse.com/security/cve/CVE-2016-2808/" source="CVE"/>
		<reference ref_id="CVE-2016-2814" ref_url="https://www.suse.com/security/cve/CVE-2016-2814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00023.html" source="SUSE-SU"/>
		<description>
This update to MozillaFirefox 38.8.0 ESR fixes the following issues (bsc#977333):

- CVE-2016-2805: Miscellaneous memory safety hazards - MFSA 2016-39 (bsc#977374)
- CVE-2016-2807: Miscellaneous memory safety hazards - MFSA 2016-39 (bsc#977376)
- CVE-2016-2814: Buffer overflow in libstagefright with CENC offsets - MFSA 2016-44 (bsc#977381)
- CVE-2016-2808: Write to invalid HashMap entry through JavaScript.watch() - MFSA 2016-47 (bsc#977386)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-06"/>
	<updated date="2016-05-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977374">SUSE bug 977374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977376">SUSE bug 977376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977381">SUSE bug 977381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977386">SUSE bug 977386</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2805/">CVE-2016-2805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2807/">CVE-2016-2807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2808/">CVE-2016-2808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2814/">CVE-2016-2814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516026" comment="MozillaFirefox-38.8.0esr-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516027" comment="MozillaFirefox-translations-38.8.0esr-66.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77695" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="978061" ref_url="https://bugzilla.suse.com/978061" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<reference ref_id="CVE-2016-3715" ref_url="https://www.suse.com/security/cve/CVE-2016-3715/" source="CVE"/>
		<reference ref_id="CVE-2016-3716" ref_url="https://www.suse.com/security/cve/CVE-2016-3716/" source="CVE"/>
		<reference ref_id="CVE-2016-3717" ref_url="https://www.suse.com/security/cve/CVE-2016-3717/" source="CVE"/>
		<reference ref_id="CVE-2016-3718" ref_url="https://www.suse.com/security/cve/CVE-2016-3718/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

Security issues fixed:
- Several coders were vulnerable to remote code execution attacks, 
  these coders have now been disabled by default but can be 
  re-enabled by editing '/etc/ImageMagick-*/policy.xml' (bsc#978061)
- CVE-2016-3714: Insufficient shell characters filtering leads to
  (potentially remote) code execution
- CVE-2016-3715: Possible file deletion by using ImageMagick's
  'ephemeral' pseudo protocol which deletes files after reading.
- CVE-2016-3716: Possible file moving by using ImageMagick's 'msl'
  pseudo protocol with any extension in any folder.
- CVE-2016-3717: Possible local file read by using ImageMagick's 
  'label' pseudo protocol to get content of the files from the server.
- CVE-2016-3718: Possible Server Side Request Forgery (SSRF) to make
  HTTP GET or FTP request.

Bugs fixed:
- Use external svg loader (rsvg)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-07"/>
	<updated date="2016-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3715/">CVE-2016-3715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3716/">CVE-2016-3716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3717/">CVE-2016-3717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3718/">CVE-2016-3718</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516028" comment="ImageMagick-6.8.8.1-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516029" comment="libMagick++-6_Q16-3-6.8.8.1-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516030" comment="libMagickCore-6_Q16-1-6.8.8.1-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516031" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516032" comment="libMagickWand-6_Q16-1-6.8.8.1-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77696" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl098 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="889013" ref_url="https://bugzilla.suse.com/889013" source="BUGZILLA"/>
		<reference ref_id="968050" ref_url="https://bugzilla.suse.com/968050" source="BUGZILLA"/>
		<reference ref_id="976942" ref_url="https://bugzilla.suse.com/976942" source="BUGZILLA"/>
		<reference ref_id="976943" ref_url="https://bugzilla.suse.com/976943" source="BUGZILLA"/>
		<reference ref_id="977614" ref_url="https://bugzilla.suse.com/977614" source="BUGZILLA"/>
		<reference ref_id="977615" ref_url="https://bugzilla.suse.com/977615" source="BUGZILLA"/>
		<reference ref_id="977617" ref_url="https://bugzilla.suse.com/977617" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html" source="SUSE-SU"/>
		<description>
This update for compat-openssl098 fixes the following issues:

- CVE-2016-2108: Memory corruption in the ASN.1 encoder (bsc#977617)
- CVE-2016-2105: EVP_EncodeUpdate overflow (bsc#977614)
- CVE-2016-2106: EVP_EncryptUpdate overflow (bsc#977615)
- CVE-2016-2109: ASN.1 BIO excessive memory allocation (bsc#976942)
- CVE-2016-0702: Side channel attack on modular exponentiation 'CacheBleed' (bsc#968050)
- bsc#976943: Buffer overrun in ASN1_parse

The following non-security bugs were fixed:

- bsc#889013: Rename README.SuSE to the new spelling (bsc#889013)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-09"/>
	<updated date="2016-05-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/889013">SUSE bug 889013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968050">SUSE bug 968050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976943">SUSE bug 976943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977614">SUSE bug 977614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977615">SUSE bug 977615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977617">SUSE bug 977617</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516033" comment="libopenssl0_9_8-0.9.8j-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516034" comment="libopenssl0_9_8-32bit-0.9.8j-97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77697" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="950437" ref_url="https://bugzilla.suse.com/950437" source="BUGZILLA"/>
		<reference ref_id="960382" ref_url="https://bugzilla.suse.com/960382" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7830" ref_url="https://www.suse.com/security/cve/CVE-2015-7830/" source="CVE"/>
		<reference ref_id="CVE-2015-8711" ref_url="https://www.suse.com/security/cve/CVE-2015-8711/" source="CVE"/>
		<reference ref_id="CVE-2015-8712" ref_url="https://www.suse.com/security/cve/CVE-2015-8712/" source="CVE"/>
		<reference ref_id="CVE-2015-8713" ref_url="https://www.suse.com/security/cve/CVE-2015-8713/" source="CVE"/>
		<reference ref_id="CVE-2015-8714" ref_url="https://www.suse.com/security/cve/CVE-2015-8714/" source="CVE"/>
		<reference ref_id="CVE-2015-8715" ref_url="https://www.suse.com/security/cve/CVE-2015-8715/" source="CVE"/>
		<reference ref_id="CVE-2015-8716" ref_url="https://www.suse.com/security/cve/CVE-2015-8716/" source="CVE"/>
		<reference ref_id="CVE-2015-8717" ref_url="https://www.suse.com/security/cve/CVE-2015-8717/" source="CVE"/>
		<reference ref_id="CVE-2015-8718" ref_url="https://www.suse.com/security/cve/CVE-2015-8718/" source="CVE"/>
		<reference ref_id="CVE-2015-8719" ref_url="https://www.suse.com/security/cve/CVE-2015-8719/" source="CVE"/>
		<reference ref_id="CVE-2015-8720" ref_url="https://www.suse.com/security/cve/CVE-2015-8720/" source="CVE"/>
		<reference ref_id="CVE-2015-8721" ref_url="https://www.suse.com/security/cve/CVE-2015-8721/" source="CVE"/>
		<reference ref_id="CVE-2015-8722" ref_url="https://www.suse.com/security/cve/CVE-2015-8722/" source="CVE"/>
		<reference ref_id="CVE-2015-8723" ref_url="https://www.suse.com/security/cve/CVE-2015-8723/" source="CVE"/>
		<reference ref_id="CVE-2015-8724" ref_url="https://www.suse.com/security/cve/CVE-2015-8724/" source="CVE"/>
		<reference ref_id="CVE-2015-8725" ref_url="https://www.suse.com/security/cve/CVE-2015-8725/" source="CVE"/>
		<reference ref_id="CVE-2015-8726" ref_url="https://www.suse.com/security/cve/CVE-2015-8726/" source="CVE"/>
		<reference ref_id="CVE-2015-8727" ref_url="https://www.suse.com/security/cve/CVE-2015-8727/" source="CVE"/>
		<reference ref_id="CVE-2015-8728" ref_url="https://www.suse.com/security/cve/CVE-2015-8728/" source="CVE"/>
		<reference ref_id="CVE-2015-8729" ref_url="https://www.suse.com/security/cve/CVE-2015-8729/" source="CVE"/>
		<reference ref_id="CVE-2015-8730" ref_url="https://www.suse.com/security/cve/CVE-2015-8730/" source="CVE"/>
		<reference ref_id="CVE-2015-8731" ref_url="https://www.suse.com/security/cve/CVE-2015-8731/" source="CVE"/>
		<reference ref_id="CVE-2015-8732" ref_url="https://www.suse.com/security/cve/CVE-2015-8732/" source="CVE"/>
		<reference ref_id="CVE-2015-8733" ref_url="https://www.suse.com/security/cve/CVE-2015-8733/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<description>

This update contains Wireshark 1.12.9 and fixes the following issues:

* CVE-2015-7830: pcapng file parser could crash while copying an interface filter (bsc#950437)
* CVE-2015-8711: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate conversation data, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
* CVE-2015-8712: The dissect_hsdsch_channel_info function in epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not validate the number of PDUs, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8713: epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not properly reserve memory for channel ID mappings, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.
* CVE-2015-8714: The dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8715: epan/dissectors/packet-alljoyn.c in the AllJoyn dissector in Wireshark 1.12.x before 1.12.9 does not check for empty arguments, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
* CVE-2015-8716: The init_t38_info_conv function in epan/dissectors/packet-t38.c in the T.38 dissector in Wireshark 1.12.x before 1.12.9 does not ensure that a conversation exists, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8717: The dissect_sdp function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.12.x before 1.12.9 does not prevent use of a negative media count, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8718: Double free vulnerability in epan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1, when the 'Match MSG/RES packets for async NLM' option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8719: The dissect_dns_answer function in epan/dissectors/packet-dns.c in the DNS dissector in Wireshark 1.12.x before 1.12.9 mishandles the EDNS0 Client Subnet option, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8720: The dissect_ber_GeneralizedTime function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8721: Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet with zlib compression.
* CVE-2015-8722: epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the frame pointer, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
* CVE-2015-8723: The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted
* CVE-2015-8724: The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not verify the WPA broadcast key length, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8725: The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
* CVE-2015-8726: wiretap/vwr.c in the VeriWave file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate certain signature and Modulation and Coding Scheme (MCS) data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
* CVE-2015-8727: The dissect_rsvp_common function in epan/dissectors/packet-rsvp.c in the RSVP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not properly maintain request-key data, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.
* CVE-2015-8728: The Mobile Identity parser in (1) epan/dissectors/packet-ansi_a.c in the ANSI A dissector and (2) epan/dissectors/packet-gsm_a_common.c in the GSM A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly uses the tvb_bcd_dig_to_wmem_packet_str function, which allows remote attackers to cause a denial of service (buffer overflow and application crash) via a crafted packet.
* CVE-2015-8729: The ascend_seek function in wiretap/ascendtext.c in the Ascend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not ensure the presence of a '\0' character at the end of a date string, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
* CVE-2015-8730: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the number of items, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted packet.
* CVE-2015-8731: The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8732: The dissect_zcl_pwr_prof_pwrprofstatersp function in epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the Total Profile Number field, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8733: The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-13"/>
	<updated date="2016-01-13"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/950437">SUSE bug 950437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7830/">CVE-2015-7830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8711/">CVE-2015-8711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8712/">CVE-2015-8712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8713/">CVE-2015-8713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8714/">CVE-2015-8714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8715/">CVE-2015-8715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8716/">CVE-2015-8716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8717/">CVE-2015-8717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8718/">CVE-2015-8718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8719/">CVE-2015-8719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8720/">CVE-2015-8720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8721/">CVE-2015-8721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8722/">CVE-2015-8722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8723/">CVE-2015-8723</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8724/">CVE-2015-8724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8725/">CVE-2015-8725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8726/">CVE-2015-8726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8727/">CVE-2015-8727</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8728/">CVE-2015-8728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8729/">CVE-2015-8729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8730/">CVE-2015-8730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8731/">CVE-2015-8731</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8732/">CVE-2015-8732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8733/">CVE-2015-8733</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516035" comment="wireshark-1.12.9-22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77698" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="957226" ref_url="https://bugzilla.suse.com/957226" source="BUGZILLA"/>
		<reference ref_id="977446" ref_url="https://bugzilla.suse.com/977446" source="BUGZILLA"/>
		<reference ref_id="977450" ref_url="https://bugzilla.suse.com/977450" source="BUGZILLA"/>
		<reference ref_id="977451" ref_url="https://bugzilla.suse.com/977451" source="BUGZILLA"/>
		<reference ref_id="977452" ref_url="https://bugzilla.suse.com/977452" source="BUGZILLA"/>
		<reference ref_id="977455" ref_url="https://bugzilla.suse.com/977455" source="BUGZILLA"/>
		<reference ref_id="977457" ref_url="https://bugzilla.suse.com/977457" source="BUGZILLA"/>
		<reference ref_id="977458" ref_url="https://bugzilla.suse.com/977458" source="BUGZILLA"/>
		<reference ref_id="977459" ref_url="https://bugzilla.suse.com/977459" source="BUGZILLA"/>
		<reference ref_id="977461" ref_url="https://bugzilla.suse.com/977461" source="BUGZILLA"/>
		<reference ref_id="977464" ref_url="https://bugzilla.suse.com/977464" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704/" source="CVE"/>
		<reference ref_id="CVE-2015-7705" ref_url="https://www.suse.com/security/cve/CVE-2015-7705/" source="CVE"/>
		<reference ref_id="CVE-2015-7974" ref_url="https://www.suse.com/security/cve/CVE-2015-7974/" source="CVE"/>
		<reference ref_id="CVE-2016-1547" ref_url="https://www.suse.com/security/cve/CVE-2016-1547/" source="CVE"/>
		<reference ref_id="CVE-2016-1548" ref_url="https://www.suse.com/security/cve/CVE-2016-1548/" source="CVE"/>
		<reference ref_id="CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549/" source="CVE"/>
		<reference ref_id="CVE-2016-1550" ref_url="https://www.suse.com/security/cve/CVE-2016-1550/" source="CVE"/>
		<reference ref_id="CVE-2016-1551" ref_url="https://www.suse.com/security/cve/CVE-2016-1551/" source="CVE"/>
		<reference ref_id="CVE-2016-2516" ref_url="https://www.suse.com/security/cve/CVE-2016-2516/" source="CVE"/>
		<reference ref_id="CVE-2016-2517" ref_url="https://www.suse.com/security/cve/CVE-2016-2517/" source="CVE"/>
		<reference ref_id="CVE-2016-2518" ref_url="https://www.suse.com/security/cve/CVE-2016-2518/" source="CVE"/>
		<reference ref_id="CVE-2016-2519" ref_url="https://www.suse.com/security/cve/CVE-2016-2519/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" source="SUSE-SU"/>
		<description>

This update for ntp to 4.2.8p7 fixes the following issues:

* CVE-2016-1547, bsc#977459:
  Validate crypto-NAKs, AKA: CRYPTO-NAK DoS.
* CVE-2016-1548, bsc#977461: Interleave-pivot
* CVE-2016-1549, bsc#977451:
  Sybil vulnerability: ephemeral association attack.
* CVE-2016-1550, bsc#977464: Improve NTP security against buffer
  comparison timing attacks.
* CVE-2016-1551, bsc#977450:
  Refclock impersonation vulnerability
* CVE-2016-2516, bsc#977452: Duplicate IPs on unconfig
  directives will cause an assertion botch in ntpd.
* CVE-2016-2517, bsc#977455: remote configuration trustedkey/
  requestkey/controlkey values are not properly validated.
* CVE-2016-2518, bsc#977457: Crafted addpeer with hmode &gt; 7
  causes array wraparound with MATCH_ASSOC.
* CVE-2016-2519, bsc#977458: ctl_getitem() return value not
  always checked.
* This update also improves the fixes for:
  CVE-2015-7704, CVE-2015-7705, CVE-2015-7974

Bugs fixed:
- Restrict the parser in the startup script to the first
  occurrance of 'keys' and 'controlkey' in ntp.conf (bsc#957226).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-12"/>
	<updated date="2016-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/957226">SUSE bug 957226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977450">SUSE bug 977450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977451">SUSE bug 977451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977452">SUSE bug 977452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977455">SUSE bug 977455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977457">SUSE bug 977457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977458">SUSE bug 977458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977459">SUSE bug 977459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977461">SUSE bug 977461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977464">SUSE bug 977464</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7705/">CVE-2015-7705</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7974/">CVE-2015-7974</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1547/">CVE-2016-1547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1548/">CVE-2016-1548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1550/">CVE-2016-1550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1551/">CVE-2016-1551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2516/">CVE-2016-2516</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2517/">CVE-2016-2517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2518/">CVE-2016-2518</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2519/">CVE-2016-2519</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517010" comment="ntp-4.2.8p7-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517011" comment="ntp-doc-4.2.8p7-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77699" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="979422" ref_url="https://bugzilla.suse.com/979422" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1006" ref_url="https://www.suse.com/security/cve/CVE-2016-1006/" source="CVE"/>
		<reference ref_id="CVE-2016-1011" ref_url="https://www.suse.com/security/cve/CVE-2016-1011/" source="CVE"/>
		<reference ref_id="CVE-2016-1012" ref_url="https://www.suse.com/security/cve/CVE-2016-1012/" source="CVE"/>
		<reference ref_id="CVE-2016-1013" ref_url="https://www.suse.com/security/cve/CVE-2016-1013/" source="CVE"/>
		<reference ref_id="CVE-2016-1014" ref_url="https://www.suse.com/security/cve/CVE-2016-1014/" source="CVE"/>
		<reference ref_id="CVE-2016-1015" ref_url="https://www.suse.com/security/cve/CVE-2016-1015/" source="CVE"/>
		<reference ref_id="CVE-2016-1016" ref_url="https://www.suse.com/security/cve/CVE-2016-1016/" source="CVE"/>
		<reference ref_id="CVE-2016-1017" ref_url="https://www.suse.com/security/cve/CVE-2016-1017/" source="CVE"/>
		<reference ref_id="CVE-2016-1018" ref_url="https://www.suse.com/security/cve/CVE-2016-1018/" source="CVE"/>
		<reference ref_id="CVE-2016-1019" ref_url="https://www.suse.com/security/cve/CVE-2016-1019/" source="CVE"/>
		<reference ref_id="CVE-2016-1020" ref_url="https://www.suse.com/security/cve/CVE-2016-1020/" source="CVE"/>
		<reference ref_id="CVE-2016-1021" ref_url="https://www.suse.com/security/cve/CVE-2016-1021/" source="CVE"/>
		<reference ref_id="CVE-2016-1022" ref_url="https://www.suse.com/security/cve/CVE-2016-1022/" source="CVE"/>
		<reference ref_id="CVE-2016-1023" ref_url="https://www.suse.com/security/cve/CVE-2016-1023/" source="CVE"/>
		<reference ref_id="CVE-2016-1024" ref_url="https://www.suse.com/security/cve/CVE-2016-1024/" source="CVE"/>
		<reference ref_id="CVE-2016-1025" ref_url="https://www.suse.com/security/cve/CVE-2016-1025/" source="CVE"/>
		<reference ref_id="CVE-2016-1026" ref_url="https://www.suse.com/security/cve/CVE-2016-1026/" source="CVE"/>
		<reference ref_id="CVE-2016-1027" ref_url="https://www.suse.com/security/cve/CVE-2016-1027/" source="CVE"/>
		<reference ref_id="CVE-2016-1028" ref_url="https://www.suse.com/security/cve/CVE-2016-1028/" source="CVE"/>
		<reference ref_id="CVE-2016-1029" ref_url="https://www.suse.com/security/cve/CVE-2016-1029/" source="CVE"/>
		<reference ref_id="CVE-2016-1030" ref_url="https://www.suse.com/security/cve/CVE-2016-1030/" source="CVE"/>
		<reference ref_id="CVE-2016-1031" ref_url="https://www.suse.com/security/cve/CVE-2016-1031/" source="CVE"/>
		<reference ref_id="CVE-2016-1032" ref_url="https://www.suse.com/security/cve/CVE-2016-1032/" source="CVE"/>
		<reference ref_id="CVE-2016-1033" ref_url="https://www.suse.com/security/cve/CVE-2016-1033/" source="CVE"/>
		<reference ref_id="CVE-2016-1096" ref_url="https://www.suse.com/security/cve/CVE-2016-1096/" source="CVE"/>
		<reference ref_id="CVE-2016-1097" ref_url="https://www.suse.com/security/cve/CVE-2016-1097/" source="CVE"/>
		<reference ref_id="CVE-2016-1098" ref_url="https://www.suse.com/security/cve/CVE-2016-1098/" source="CVE"/>
		<reference ref_id="CVE-2016-1099" ref_url="https://www.suse.com/security/cve/CVE-2016-1099/" source="CVE"/>
		<reference ref_id="CVE-2016-1100" ref_url="https://www.suse.com/security/cve/CVE-2016-1100/" source="CVE"/>
		<reference ref_id="CVE-2016-1101" ref_url="https://www.suse.com/security/cve/CVE-2016-1101/" source="CVE"/>
		<reference ref_id="CVE-2016-1102" ref_url="https://www.suse.com/security/cve/CVE-2016-1102/" source="CVE"/>
		<reference ref_id="CVE-2016-1103" ref_url="https://www.suse.com/security/cve/CVE-2016-1103/" source="CVE"/>
		<reference ref_id="CVE-2016-1104" ref_url="https://www.suse.com/security/cve/CVE-2016-1104/" source="CVE"/>
		<reference ref_id="CVE-2016-1105" ref_url="https://www.suse.com/security/cve/CVE-2016-1105/" source="CVE"/>
		<reference ref_id="CVE-2016-1106" ref_url="https://www.suse.com/security/cve/CVE-2016-1106/" source="CVE"/>
		<reference ref_id="CVE-2016-1107" ref_url="https://www.suse.com/security/cve/CVE-2016-1107/" source="CVE"/>
		<reference ref_id="CVE-2016-1108" ref_url="https://www.suse.com/security/cve/CVE-2016-1108/" source="CVE"/>
		<reference ref_id="CVE-2016-1109" ref_url="https://www.suse.com/security/cve/CVE-2016-1109/" source="CVE"/>
		<reference ref_id="CVE-2016-1110" ref_url="https://www.suse.com/security/cve/CVE-2016-1110/" source="CVE"/>
		<reference ref_id="CVE-2016-4108" ref_url="https://www.suse.com/security/cve/CVE-2016-4108/" source="CVE"/>
		<reference ref_id="CVE-2016-4109" ref_url="https://www.suse.com/security/cve/CVE-2016-4109/" source="CVE"/>
		<reference ref_id="CVE-2016-4110" ref_url="https://www.suse.com/security/cve/CVE-2016-4110/" source="CVE"/>
		<reference ref_id="CVE-2016-4111" ref_url="https://www.suse.com/security/cve/CVE-2016-4111/" source="CVE"/>
		<reference ref_id="CVE-2016-4112" ref_url="https://www.suse.com/security/cve/CVE-2016-4112/" source="CVE"/>
		<reference ref_id="CVE-2016-4113" ref_url="https://www.suse.com/security/cve/CVE-2016-4113/" source="CVE"/>
		<reference ref_id="CVE-2016-4114" ref_url="https://www.suse.com/security/cve/CVE-2016-4114/" source="CVE"/>
		<reference ref_id="CVE-2016-4115" ref_url="https://www.suse.com/security/cve/CVE-2016-4115/" source="CVE"/>
		<reference ref_id="CVE-2016-4116" ref_url="https://www.suse.com/security/cve/CVE-2016-4116/" source="CVE"/>
		<reference ref_id="CVE-2016-4117" ref_url="https://www.suse.com/security/cve/CVE-2016-4117/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html" source="SUSE-SU"/>
		<description>

This update for flash-player fixes the following issues: 

- Security update to 11.2.202.621 (bsc#979422):
  * APSA16-02, APSB16-15, CVE-2016-1096, CVE-2016-1097,
    CVE-2016-1098, CVE-2016-1099, CVE-2016-1100, CVE-2016-1101,
    CVE-2016-1102, CVE-2016-1103, CVE-2016-1104, CVE-2016-1105,
    CVE-2016-1106, CVE-2016-1107, CVE-2016-1108, CVE-2016-1109,
    CVE-2016-1110, CVE-2016-4108, CVE-2016-4109, CVE-2016-4110,
    CVE-2016-4111, CVE-2016-4112, CVE-2016-4113, CVE-2016-4114,
    CVE-2016-4115, CVE-2016-4116, CVE-2016-4117

- The following CVEs got fixed during the previous release, but
  got published afterwards:
  * APSA16-01, APSB16-10, CVE-2016-1006, CVE-2016-1011,
    CVE-2016-1012, CVE-2016-1013, CVE-2016-1014, CVE-2016-1015,
    CVE-2016-1016, CVE-2016-1017, CVE-2016-1018, CVE-2016-1019,
    CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023,
    CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027,
    CVE-2016-1028, CVE-2016-1029, CVE-2016-1030, CVE-2016-1031,
    CVE-2016-1032, CVE-2016-1033		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-16"/>
	<updated date="2016-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979422">SUSE bug 979422</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1006/">CVE-2016-1006</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1011/">CVE-2016-1011</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1012/">CVE-2016-1012</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1013/">CVE-2016-1013</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1014/">CVE-2016-1014</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1015/">CVE-2016-1015</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1016/">CVE-2016-1016</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1017/">CVE-2016-1017</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1018/">CVE-2016-1018</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1019/">CVE-2016-1019</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1020/">CVE-2016-1020</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1021/">CVE-2016-1021</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1022/">CVE-2016-1022</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1023/">CVE-2016-1023</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1024/">CVE-2016-1024</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1025/">CVE-2016-1025</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1026/">CVE-2016-1026</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1027/">CVE-2016-1027</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1028/">CVE-2016-1028</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1029/">CVE-2016-1029</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1030/">CVE-2016-1030</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1031/">CVE-2016-1031</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1032/">CVE-2016-1032</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1033/">CVE-2016-1033</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1096/">CVE-2016-1096</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1097/">CVE-2016-1097</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1098/">CVE-2016-1098</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1099/">CVE-2016-1099</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1100/">CVE-2016-1100</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1101/">CVE-2016-1101</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1102/">CVE-2016-1102</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1103/">CVE-2016-1103</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1104/">CVE-2016-1104</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1105/">CVE-2016-1105</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1106/">CVE-2016-1106</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1107/">CVE-2016-1107</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1108/">CVE-2016-1108</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1109/">CVE-2016-1109</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1110/">CVE-2016-1110</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-4108/">CVE-2016-4108</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-4109/">CVE-2016-4109</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-4110/">CVE-2016-4110</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-4111/">CVE-2016-4111</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-4112/">CVE-2016-4112</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-4113/">CVE-2016-4113</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-4114/">CVE-2016-4114</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-4115/">CVE-2016-4115</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-4116/">CVE-2016-4116</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4117/">CVE-2016-4117</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516036" comment="flash-player-11.2.202.621-130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516037" comment="flash-player-gnome-11.2.202.621-130.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77700" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="968565" ref_url="https://bugzilla.suse.com/968565" source="BUGZILLA"/>
		<reference ref_id="976944" ref_url="https://bugzilla.suse.com/976944" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2523" ref_url="https://www.suse.com/security/cve/CVE-2016-2523/" source="CVE"/>
		<reference ref_id="CVE-2016-2530" ref_url="https://www.suse.com/security/cve/CVE-2016-2530/" source="CVE"/>
		<reference ref_id="CVE-2016-2531" ref_url="https://www.suse.com/security/cve/CVE-2016-2531/" source="CVE"/>
		<reference ref_id="CVE-2016-2532" ref_url="https://www.suse.com/security/cve/CVE-2016-2532/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002068.html" source="SUSE-SU"/>
		<description>
This update to Wireshark 1 12.11 fixes a number issues in protocol dissectors that could have allowed a remote attacker to crash Wireshark or cause excessive CPU usage through specially crafted packages inserted into the network or a capture file.

- The PKTC dissector could crash (wnpa-sec-2016-22)
- The PKTC dissector could crash (wnpa-sec-2016-23)
- The IAX2 dissector could go into an infinite loop (wnpa-sec-2016-24)
- Wireshark and TShark could exhaust the stack (wnpa-sec-2016-25) 
- The GSM CBCH dissector could crash (wnpa-sec-2016-26)
- The NCP dissector could crash (wnpa-sec-2016-28)
- CVE-2016-2523: DNP dissector infinite loop (wnpa-sec-2016-03)
- CVE-2016-2530: RSL dissector crash (wnpa-sec-2016-10)
- CVE-2016-2531: RSL dissector crash (wnpa-sec-2016-10)
- CVE-2016-2532: LLRP dissector crash (wnpa-sec-2016-11)
- GSM A-bis OML dissector crash (wnpa-sec-2016-14)
- ASN.1 BER dissector crash (wnpa-sec-2016-15)
- ASN.1 BER dissector crash (wnpa-sec-2016-18) 

Also containsfurther bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-1.12.11.html 
https://www.wireshark.org/docs/relnotes/wireshark-1.12.10.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-18"/>
	<updated date="2016-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/968565">SUSE bug 968565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976944">SUSE bug 976944</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2523/">CVE-2016-2523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2530/">CVE-2016-2530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2531/">CVE-2016-2531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2532/">CVE-2016-2532</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516042" comment="wireshark-1.12.11-25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77701" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="959886" ref_url="https://bugzilla.suse.com/959886" source="BUGZILLA"/>
		<reference ref_id="960158" ref_url="https://bugzilla.suse.com/960158" source="BUGZILLA"/>
		<reference ref_id="963230" ref_url="https://bugzilla.suse.com/963230" source="BUGZILLA"/>
		<reference ref_id="965897" ref_url="https://bugzilla.suse.com/965897" source="BUGZILLA"/>
		<reference ref_id="967122" ref_url="https://bugzilla.suse.com/967122" source="BUGZILLA"/>
		<reference ref_id="970423" ref_url="https://bugzilla.suse.com/970423" source="BUGZILLA"/>
		<reference ref_id="970860" ref_url="https://bugzilla.suse.com/970860" source="BUGZILLA"/>
		<reference ref_id="972612" ref_url="https://bugzilla.suse.com/972612" source="BUGZILLA"/>
		<reference ref_id="972727" ref_url="https://bugzilla.suse.com/972727" source="BUGZILLA"/>
		<reference ref_id="973848" ref_url="https://bugzilla.suse.com/973848" source="BUGZILLA"/>
		<reference ref_id="976766" ref_url="https://bugzilla.suse.com/976766" source="BUGZILLA"/>
		<reference ref_id="978275" ref_url="https://bugzilla.suse.com/978275" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9770" ref_url="https://www.suse.com/security/cve/CVE-2014-9770/" source="CVE"/>
		<reference ref_id="CVE-2015-8842" ref_url="https://www.suse.com/security/cve/CVE-2015-8842/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002070.html" source="SUSE-SU"/>
		<description>

This update for SystemD provides fixes and enhancements.

The following security issue has been fixed:

- Don't allow read access to journal files to users. (bsc#972612, CVE-2014-9770, CVE-2015-8842)

The following non-security issues have been fixed:

- Restore initrd-udevadm-cleanup-db.service. (bsc#978275, bsc#976766)
- Incorrect permissions set after boot on journal files. (bsc#973848)
- Exclude device-mapper from block device ownership event locking. (bsc#972727)
- Explicitly set mode for /run/log.
- Don't apply sgid and executable bit to journal files, only the directories they are contained in.
- Add ability to mask access mode by pre-existing access mode on files/directories.
- No need to pass --all if inactive is explicitly requested in list-units. (bsc#967122)
- Fix automount option and don't start associated mount unit at boot. (bsc#970423)
- Support more than just power-gpio-key. (fate#318444, bsc#970860)
- Add standard gpio power button support. (fate#318444, bsc#970860)
- Downgrade warnings about wanted unit which are not found. (bsc#960158)
- Shorten hostname before checking for trailing dot. (bsc#965897)
- Remove WorkingDirectory parameter from emergency, rescue and console-shell.service. (bsc#959886)
- Don't ship boot.udev and systemd-journald.init anymore.
- Revert 'log: honour the kernel's quiet cmdline argument'. (bsc#963230)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-18"/>
	<updated date="2016-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/959886">SUSE bug 959886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960158">SUSE bug 960158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963230">SUSE bug 963230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965897">SUSE bug 965897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967122">SUSE bug 967122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970423">SUSE bug 970423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970860">SUSE bug 970860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972612">SUSE bug 972612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972727">SUSE bug 972727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973848">SUSE bug 973848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976766">SUSE bug 976766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978275">SUSE bug 978275</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9770/">CVE-2014-9770</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8842/">CVE-2015-8842</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517012" comment="libgudev-1_0-0-210-104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517013" comment="libgudev-1_0-0-32bit-210-104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517014" comment="libudev1-210-104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517015" comment="libudev1-32bit-210-104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517016" comment="systemd-210-104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517017" comment="systemd-32bit-210-104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517018" comment="systemd-bash-completion-210-104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517019" comment="systemd-sysvinit-210-104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517020" comment="udev-210-104.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77702" version="1" class="patch">
	<metadata>
		<title>Security update for python-requests (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="922448" ref_url="https://bugzilla.suse.com/922448" source="BUGZILLA"/>
		<reference ref_id="929736" ref_url="https://bugzilla.suse.com/929736" source="BUGZILLA"/>
		<reference ref_id="961596" ref_url="https://bugzilla.suse.com/961596" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001801.html" source="SUSE-SU"/>
		<description>

The python-requests module has been updated to version 2.8.1, which brings several
fixes and enhancements:

- Fix handling of cookies on redirect. Previously a cookie without a host value set
  would use the hostname for the redirected URL exposing requests users to session
  fixation attacks and potentially cookie stealing. (bsc#922448, CVE-2015-2296)

- Add support for per-host proxies. This allows the proxies dictionary to have entries
  of the form {'&lt;scheme&gt;://&lt;hostname&gt;': '&lt;proxy&gt;'}. Host-specific
  proxies will be used in preference to the previously-supported scheme-specific ones,
  but the previous syntax will continue to work.
- Update certificate bundle to match 'certifi' 2015.9.6.2's weak certificate bundle.
- Response.raise_for_status now prints the URL that failed as part of the exception message.
- requests.utils.get_netrc_auth now takes an raise_errors kwarg, defaulting to False.
  When True, errors parsing .netrc files cause exceptions to be thrown.
- Change to bundled projects import logic to make it easier to unbundle requests downstream.
- Change the default User-Agent string to avoid leaking data on Linux: now contains only
  the requests version.
- The json parameter to post() and friends will now only be used if neither data nor files
  are present, consistent with the documentation.
- Empty fields in the NO_PROXY environment variable are now ignored.
- Fix problem where httplib.BadStatusLine would get raised if combining stream=True with
  contextlib.closing.
- Prevent bugs where we would attempt to return the same connection back to the connection
  pool twice when sending a Chunked body.
- Digest Auth support is now thread safe.
- Resolved several bugs involving chunked transfer encoding and response framing.
- Copy a PreparedRequest's CookieJar more reliably.
- Support bytearrays when passed as parameters in the 'files' argument.
- Avoid data duplication when creating a request with 'str', 'bytes', or 'bytearray'
  input to the 'files' argument.
- 'Connection: keep-alive' header is now sent automatically.
- Support for connect timeouts. Timeout now accepts a tuple (connect, read) which is
  used to set individual connect and read timeouts.

For a comprehensive list of changes please refer to the package's change log or the
Release Notes at http://docs.python-requests.org/en/latest/community/updates/#id3
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-13"/>
	<updated date="2016-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/922448">SUSE bug 922448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929736">SUSE bug 929736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961596">SUSE bug 961596</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517021" comment="python-requests-2.8.1-6.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77703" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="729190" ref_url="https://bugzilla.suse.com/729190" source="BUGZILLA"/>
		<reference ref_id="932483" ref_url="https://bugzilla.suse.com/932483" source="BUGZILLA"/>
		<reference ref_id="945484" ref_url="https://bugzilla.suse.com/945484" source="BUGZILLA"/>
		<reference ref_id="945493" ref_url="https://bugzilla.suse.com/945493" source="BUGZILLA"/>
		<reference ref_id="947458" ref_url="https://bugzilla.suse.com/947458" source="BUGZILLA"/>
		<reference ref_id="948902" ref_url="https://bugzilla.suse.com/948902" source="BUGZILLA"/>
		<reference ref_id="960414" ref_url="https://bugzilla.suse.com/960414" source="BUGZILLA"/>
		<reference ref_id="961368" ref_url="https://bugzilla.suse.com/961368" source="BUGZILLA"/>
		<reference ref_id="962313" ref_url="https://bugzilla.suse.com/962313" source="BUGZILLA"/>
		<reference ref_id="965576" ref_url="https://bugzilla.suse.com/965576" source="BUGZILLA"/>
		<reference ref_id="970632" ref_url="https://bugzilla.suse.com/970632" source="BUGZILLA"/>
		<reference ref_id="975865" ref_url="https://bugzilla.suse.com/975865" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8325" ref_url="https://www.suse.com/security/cve/CVE-2015-8325/" source="CVE"/>
		<reference ref_id="CVE-2016-1908" ref_url="https://www.suse.com/security/cve/CVE-2016-1908/" source="CVE"/>
		<reference ref_id="CVE-2016-3115" ref_url="https://www.suse.com/security/cve/CVE-2016-3115/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002080.html" source="SUSE-SU"/>
		<description>
This update for OpenSSH fixes three security issues.

These security issues were fixed:
- CVE-2016-3115: Sanitise input for xauth(1) (bsc#970632)
- CVE-2016-1908: Prevent X11 SECURITY circumvention when forwarding X11 connections (bsc#962313)
- CVE-2015-8325: Ignore PAM environment when using login (bsc#975865)

These non-security issues were fixed:
- Fix help output of sftp (bsc#945493)
- Restarting openssh with openssh-fips installed was not working correctly (bsc#945484)
- Fix crashes when /proc is not available in the chroot (bsc#947458)
- Correctly parse GSSAPI KEX algorithms (bsc#961368)
- More verbose FIPS mode/CC related documentation in README.FIPS (bsc#965576, bsc#960414)
- Fix PRNG re-seeding (bsc#960414, bsc#729190)
- Disable DH parameters under 2048 bits by default and allow lowering the limit back to the RFC 4419 specified minimum through an option (bsc#932483, bsc#948902)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-23"/>
	<updated date="2016-05-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/729190">SUSE bug 729190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932483">SUSE bug 932483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945484">SUSE bug 945484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945493">SUSE bug 945493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947458">SUSE bug 947458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948902">SUSE bug 948902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960414">SUSE bug 960414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961368">SUSE bug 961368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962313">SUSE bug 962313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965576">SUSE bug 965576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970632">SUSE bug 970632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975865">SUSE bug 975865</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8325/">CVE-2015-8325</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1908/">CVE-2016-1908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3115/">CVE-2016-3115</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516052" comment="openssh-6.6p1-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516053" comment="openssh-askpass-gnome-6.6p1-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516054" comment="openssh-helpers-6.6p1-42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77704" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="961642" ref_url="https://bugzilla.suse.com/961642" source="BUGZILLA"/>
		<reference ref_id="961645" ref_url="https://bugzilla.suse.com/961645" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0777" ref_url="https://www.suse.com/security/cve/CVE-2016-0777/" source="CVE"/>
		<reference ref_id="CVE-2016-0778" ref_url="https://www.suse.com/security/cve/CVE-2016-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html" source="SUSE-SU"/>
		<description>

This update for openssh fixes the following issues:

- CVE-2016-0777: A malicious or compromised server could cause the OpenSSH client to expose part or all of the client's private key through the roaming feature (bsc#961642)
- CVE-2016-0778: A malicious or compromised server could could trigger a buffer overflow in the OpenSSH client through the roaming feature (bsc#961645)

This update disables the undocumented feature supported by the OpenSSH client and a commercial SSH server.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-14"/>
	<updated date="2016-01-14"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/961642">SUSE bug 961642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961645">SUSE bug 961645</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0777/">CVE-2016-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0778/">CVE-2016-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516055" comment="openssh-6.6p1-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516056" comment="openssh-askpass-gnome-6.6p1-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516057" comment="openssh-helpers-6.6p1-33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77705" version="1" class="patch">
	<metadata>
		<title>Security update for supportutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="980670" ref_url="https://bugzilla.suse.com/980670" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1602" ref_url="https://www.suse.com/security/cve/CVE-2016-1602/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002096.html" source="SUSE-SU"/>
		<description>
supportutils was updated to fix one security issue.

This security issue was fixed:
- CVE-2016-1602: Code injection and privilege escalation via unescaped filenames (bsc#980670).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-07"/>
	<updated date="2016-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/980670">SUSE bug 980670</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1602/">CVE-2016-1602</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516065" comment="supportutils-3.0-82.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77706" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="979441" ref_url="https://bugzilla.suse.com/979441" source="BUGZILLA"/>
		<reference ref_id="980391" ref_url="https://bugzilla.suse.com/980391" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1283" ref_url="https://www.suse.com/security/cve/CVE-2015-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1508-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html" source="SUSE-SU"/>
		<description>

This update for expat fixes the following issues: 

Security issue fixed:
- CVE-2016-0718: Fix Expat XML parser that mishandles certain kinds of malformed input documents. (bsc#979441)
- CVE-2015-1283: Fix multiple integer overflows. (bnc#980391)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-07"/>
	<updated date="2016-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979441">SUSE bug 979441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980391">SUSE bug 980391</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1283/">CVE-2015-1283</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516066" comment="expat-2.1.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516067" comment="libexpat1-2.1.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516068" comment="libexpat1-32bit-2.1.0-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77707" version="1" class="patch">
	<metadata>
		<title>Security update for libksba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="979261" ref_url="https://bugzilla.suse.com/979261" source="BUGZILLA"/>
		<reference ref_id="979906" ref_url="https://bugzilla.suse.com/979906" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4574" ref_url="https://www.suse.com/security/cve/CVE-2016-4574/" source="CVE"/>
		<reference ref_id="CVE-2016-4579" ref_url="https://www.suse.com/security/cve/CVE-2016-4579/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002099.html" source="SUSE-SU"/>
		<description>

This update for libksba fixes the following issues:

- CVE-2016-4579: Out-of-bounds read in _ksba_ber_parse_tl()
- CVE-2016-4574: two OOB read access bugs (remote DoS) (bsc#979261)

Also adding reliability fixes from v1.3.4.

		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-07"/>
	<updated date="2016-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/979261">SUSE bug 979261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979906">SUSE bug 979906</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4574/">CVE-2016-4574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4579/">CVE-2016-4579</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516069" comment="libksba8-1.3.0-23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77708" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="963963" ref_url="https://bugzilla.suse.com/963963" source="BUGZILLA"/>
		<reference ref_id="965283" ref_url="https://bugzilla.suse.com/965283" source="BUGZILLA"/>
		<reference ref_id="978395" ref_url="https://bugzilla.suse.com/978395" source="BUGZILLA"/>
		<reference ref_id="981040" ref_url="https://bugzilla.suse.com/981040" source="BUGZILLA"/>
		<reference ref_id="981041" ref_url="https://bugzilla.suse.com/981041" source="BUGZILLA"/>
		<reference ref_id="981108" ref_url="https://bugzilla.suse.com/981108" source="BUGZILLA"/>
		<reference ref_id="981109" ref_url="https://bugzilla.suse.com/981109" source="BUGZILLA"/>
		<reference ref_id="981111" ref_url="https://bugzilla.suse.com/981111" source="BUGZILLA"/>
		<reference ref_id="981112" ref_url="https://bugzilla.suse.com/981112" source="BUGZILLA"/>
		<reference ref_id="981114" ref_url="https://bugzilla.suse.com/981114" source="BUGZILLA"/>
		<reference ref_id="981115" ref_url="https://bugzilla.suse.com/981115" source="BUGZILLA"/>
		<reference ref_id="981548" ref_url="https://bugzilla.suse.com/981548" source="BUGZILLA"/>
		<reference ref_id="981549" ref_url="https://bugzilla.suse.com/981549" source="BUGZILLA"/>
		<reference ref_id="981550" ref_url="https://bugzilla.suse.com/981550" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8806" ref_url="https://www.suse.com/security/cve/CVE-2015-8806/" source="CVE"/>
		<reference ref_id="CVE-2016-1762" ref_url="https://www.suse.com/security/cve/CVE-2016-1762/" source="CVE"/>
		<reference ref_id="CVE-2016-1833" ref_url="https://www.suse.com/security/cve/CVE-2016-1833/" source="CVE"/>
		<reference ref_id="CVE-2016-1834" ref_url="https://www.suse.com/security/cve/CVE-2016-1834/" source="CVE"/>
		<reference ref_id="CVE-2016-1835" ref_url="https://www.suse.com/security/cve/CVE-2016-1835/" source="CVE"/>
		<reference ref_id="CVE-2016-1837" ref_url="https://www.suse.com/security/cve/CVE-2016-1837/" source="CVE"/>
		<reference ref_id="CVE-2016-1838" ref_url="https://www.suse.com/security/cve/CVE-2016-1838/" source="CVE"/>
		<reference ref_id="CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839/" source="CVE"/>
		<reference ref_id="CVE-2016-1840" ref_url="https://www.suse.com/security/cve/CVE-2016-1840/" source="CVE"/>
		<reference ref_id="CVE-2016-2073" ref_url="https://www.suse.com/security/cve/CVE-2016-2073/" source="CVE"/>
		<reference ref_id="CVE-2016-3705" ref_url="https://www.suse.com/security/cve/CVE-2016-3705/" source="CVE"/>
		<reference ref_id="CVE-2016-4447" ref_url="https://www.suse.com/security/cve/CVE-2016-4447/" source="CVE"/>
		<reference ref_id="CVE-2016-4448" ref_url="https://www.suse.com/security/cve/CVE-2016-4448/" source="CVE"/>
		<reference ref_id="CVE-2016-4449" ref_url="https://www.suse.com/security/cve/CVE-2016-4449/" source="CVE"/>
		<reference ref_id="CVE-2016-4483" ref_url="https://www.suse.com/security/cve/CVE-2016-4483/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00012.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following security issues: 

- CVE-2016-2073, CVE-2015-8806, CVE-2016-1839: A Heap-buffer overread
  was fixed in libxml2/dict.c  [bsc#963963, bsc#965283, bsc#981114].
- CVE-2016-4483: Code was added to avoid an out of bound access when
  serializing malformed strings [bsc#978395].
- CVE-2016-1762: Fixed a heap-based buffer overread in xmlNextChar [bsc#981040].
- CVE-2016-1834: Fixed a heap-buffer-overflow in xmlStrncat [bsc#981041].
- CVE-2016-1833: Fixed a heap-based buffer overread in htmlCurrentChar [bsc#981108].
- CVE-2016-1835: Fixed a heap use-after-free in xmlSAX2AttributeNs [bsc#981109].
- CVE-2016-1837: Fixed a heap use-after-free in htmlParsePubidLiteral
  and htmlParseSystemiteral [bsc#981111].
- CVE-2016-1838: Fixed a heap-based buffer overread in
  xmlParserPrintFileContextInternal [bsc#981112].
- CVE-2016-1840: Fixed a heap-buffer-overflow in xmlFAParsePosCharGroup [bsc#981115].
- CVE-2016-4447: Fixed a heap-based buffer-underreads due to xmlParseName [bsc#981548].
- CVE-2016-4448: Fixed some format string warnings with possible format
  string vulnerability [bsc#981549],
- CVE-2016-4449: Fixed inappropriate fetch of entities content [bsc#981550].
- CVE-2016-3705: Fixed missing increment of recursion counter.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-09"/>
	<updated date="2016-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/963963">SUSE bug 963963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965283">SUSE bug 965283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978395">SUSE bug 978395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981040">SUSE bug 981040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981041">SUSE bug 981041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981108">SUSE bug 981108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981109">SUSE bug 981109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981111">SUSE bug 981111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981112">SUSE bug 981112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981114">SUSE bug 981114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981115">SUSE bug 981115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981548">SUSE bug 981548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981549">SUSE bug 981549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981550">SUSE bug 981550</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8806/">CVE-2015-8806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1762/">CVE-2016-1762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1833/">CVE-2016-1833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1834/">CVE-2016-1834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1835/">CVE-2016-1835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1837/">CVE-2016-1837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1838/">CVE-2016-1838</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1840/">CVE-2016-1840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2073/">CVE-2016-2073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3705/">CVE-2016-3705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4447/">CVE-2016-4447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4448/">CVE-2016-4448</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4449/">CVE-2016-4449</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4483/">CVE-2016-4483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516070" comment="libxml2-2-2.9.1-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516071" comment="libxml2-2-32bit-2.9.1-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516072" comment="libxml2-tools-2.9.1-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516073" comment="python-libxml2-2.9.1-24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77709" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="976844" ref_url="https://bugzilla.suse.com/976844" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8868" ref_url="https://www.suse.com/security/cve/CVE-2015-8868/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002106.html" source="SUSE-SU"/>
		<description>

This update for poppler fixes the following issues: 

Security issues fixed:
- CVE-2015-8868: Corrupted PDF file can corrupt heap, causing DoS (bsc#976844)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-10"/>
	<updated date="2016-06-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/976844">SUSE bug 976844</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8868/">CVE-2015-8868</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516074" comment="libpoppler-glib8-0.24.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516075" comment="libpoppler-qt4-4-0.24.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516076" comment="libpoppler44-0.24.4-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516077" comment="poppler-tools-0.24.4-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77710" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="944787" ref_url="https://bugzilla.suse.com/944787" source="BUGZILLA"/>
		<reference ref_id="948976" ref_url="https://bugzilla.suse.com/948976" source="BUGZILLA"/>
		<reference ref_id="982385" ref_url="https://bugzilla.suse.com/982385" source="BUGZILLA"/>
		<reference ref_id="982386" ref_url="https://bugzilla.suse.com/982386" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5260" ref_url="https://www.suse.com/security/cve/CVE-2015-5260/" source="CVE"/>
		<reference ref_id="CVE-2015-5261" ref_url="https://www.suse.com/security/cve/CVE-2015-5261/" source="CVE"/>
		<reference ref_id="CVE-2016-0749" ref_url="https://www.suse.com/security/cve/CVE-2016-0749/" source="CVE"/>
		<reference ref_id="CVE-2016-2150" ref_url="https://www.suse.com/security/cve/CVE-2016-2150/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002108.html" source="SUSE-SU"/>
		<description>
spice was updated to fix four security issues.

These security issues were fixed:
- CVE-2016-2150: Guest escape using crafted primary surface parameters (bsc#982386).
- CVE-2016-0749: Heap-based buffer overflow in smartcard interaction (bsc#982385).
- CVE-2015-5260: Insufficient validation of surface_id parameter could have caused a crash (bsc#944787).
- CVE-2015-5261: Host memory access from guest using crafted images (bsc#948976).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-13"/>
	<updated date="2016-06-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/944787">SUSE bug 944787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948976">SUSE bug 948976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982385">SUSE bug 982385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982386">SUSE bug 982386</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5260/">CVE-2015-5260</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2015-5261/">CVE-2015-5261</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-0749/">CVE-2016-0749</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2150/">CVE-2016-2150</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517022" comment="libspice-server1-0.12.5-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77711" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="979302" ref_url="https://bugzilla.suse.com/979302" source="BUGZILLA"/>
		<reference ref_id="979981" ref_url="https://bugzilla.suse.com/979981" source="BUGZILLA"/>
		<reference ref_id="981422" ref_url="https://bugzilla.suse.com/981422" source="BUGZILLA"/>
		<reference ref_id="982056" ref_url="https://bugzilla.suse.com/982056" source="BUGZILLA"/>
		<reference ref_id="982064" ref_url="https://bugzilla.suse.com/982064" source="BUGZILLA"/>
		<reference ref_id="982065" ref_url="https://bugzilla.suse.com/982065" source="BUGZILLA"/>
		<reference ref_id="982066" ref_url="https://bugzilla.suse.com/982066" source="BUGZILLA"/>
		<reference ref_id="982067" ref_url="https://bugzilla.suse.com/982067" source="BUGZILLA"/>
		<reference ref_id="982068" ref_url="https://bugzilla.suse.com/982068" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4953" ref_url="https://www.suse.com/security/cve/CVE-2016-4953/" source="CVE"/>
		<reference ref_id="CVE-2016-4954" ref_url="https://www.suse.com/security/cve/CVE-2016-4954/" source="CVE"/>
		<reference ref_id="CVE-2016-4955" ref_url="https://www.suse.com/security/cve/CVE-2016-4955/" source="CVE"/>
		<reference ref_id="CVE-2016-4956" ref_url="https://www.suse.com/security/cve/CVE-2016-4956/" source="CVE"/>
		<reference ref_id="CVE-2016-4957" ref_url="https://www.suse.com/security/cve/CVE-2016-4957/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1563-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00018.html" source="SUSE-SU"/>
		<description>
ntp was updated to version 4.2.8p8 to fix five security issues.

These security issues were fixed:
- CVE-2016-4953: Bad authentication demobilizes ephemeral associations (bsc#982065).
- CVE-2016-4954: Processing spoofed server packets (bsc#982066).
- CVE-2016-4955: Autokey association reset (bsc#982067).
- CVE-2016-4956: Broadcast interleave (bsc#982068).
- CVE-2016-4957: CRYPTO_NAK crash (bsc#982064).

These non-security issues were fixed:
- Keep the parent process alive until the daemon has finished initialisation, to make sure that the PID file exists when the parent returns.
- bsc#979302: Change the process name of the forking DNS worker process to avoid the impression that ntpd is started twice.
- bsc#981422: Don't ignore SIGCHILD because it breaks wait().
- bsc#979981: ntp-wait does not accept fractional seconds, so use 1 instead of 0.2 in ntp-wait.service.
- Separate the creation of ntp.keys and key #1 in it to avoid problems when upgrading installations that have the file, but no key #1, which is needed e.g. by 'rcntp addserver'.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-13"/>
	<updated date="2016-06-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979302">SUSE bug 979302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979981">SUSE bug 979981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981422">SUSE bug 981422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982056">SUSE bug 982056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982064">SUSE bug 982064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982065">SUSE bug 982065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982066">SUSE bug 982066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982067">SUSE bug 982067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982068">SUSE bug 982068</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4953/">CVE-2016-4953</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4954/">CVE-2016-4954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4955/">CVE-2016-4955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4956/">CVE-2016-4956</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4957/">CVE-2016-4957</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517023" comment="ntp-4.2.8p8-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517024" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77712" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="867943" ref_url="https://bugzilla.suse.com/867943" source="BUGZILLA"/>
		<reference ref_id="982178" ref_url="https://bugzilla.suse.com/982178" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5118" ref_url="https://www.suse.com/security/cve/CVE-2016-5118/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00021.html" source="SUSE-SU"/>
		<description>
 This update for ImageMagick fixes the following issues:

This security issue was fixed:
- CVE-2016-5118: Prevent code execution via popen() (bsc#982178)

This non-security issue was fixed:
- Fix encoding of /Title in generated PDFs. (bsc#867943)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-14"/>
	<updated date="2016-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/867943">SUSE bug 867943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982178">SUSE bug 982178</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5118/">CVE-2016-5118</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516090" comment="ImageMagick-6.8.8.1-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516091" comment="libMagick++-6_Q16-3-6.8.8.1-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516092" comment="libMagickCore-6_Q16-1-6.8.8.1-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516093" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516094" comment="libMagickWand-6_Q16-1-6.8.8.1-25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77713" version="1" class="patch">
	<metadata>
		<title>Security update for libarchive (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="979005" ref_url="https://bugzilla.suse.com/979005" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1541" ref_url="https://www.suse.com/security/cve/CVE-2016-1541/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002117.html" source="SUSE-SU"/>
		<description>

This update for libarchive fixes the following issue: 

- Fix a heap-based buffer overflow (CVE-2016-1541, bsc#979005)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-15"/>
	<updated date="2016-06-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/979005">SUSE bug 979005</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1541/">CVE-2016-1541</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516095" comment="libarchive13-3.1.2-12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77714" version="1" class="patch">
	<metadata>
		<title>Security update for p7zip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="979823" ref_url="https://bugzilla.suse.com/979823" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2335" ref_url="https://www.suse.com/security/cve/CVE-2016-2335/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002118.html" source="SUSE-SU"/>
		<description>

This update for p7zip fixes the following issues: 

- add p7zip-9.20.1-CVE-2016-2335.patch to fix 7zip UDF
  CInArchive::ReadFileItem code execution vulnerability
  [bsc#979823], [CVE-2016-2335]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-16"/>
	<updated date="2016-06-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/979823">SUSE bug 979823</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2335/">CVE-2016-2335</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516096" comment="p7zip-9.20.1-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77715" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="929414" ref_url="https://bugzilla.suse.com/929414" source="BUGZILLA"/>
		<reference ref_id="961491" ref_url="https://bugzilla.suse.com/961491" source="BUGZILLA"/>
		<reference ref_id="982779" ref_url="https://bugzilla.suse.com/982779" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3622" ref_url="https://www.suse.com/security/cve/CVE-2015-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-4008" ref_url="https://www.suse.com/security/cve/CVE-2016-4008/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002121.html" source="SUSE-SU"/>
		<description>
This update for libtasn1 fixes the following issues:

- Malformed asn1 definitions could have caused a segmentation fault in the asn1 definition parser (bsc#961491)
- CVE-2015-3622: Fixed invalid read in octet string decoding (bsc#929414)
- CVE-2016-4008: Fixed infinite loop while parsing DER certificates (bsc#982779)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-16"/>
	<updated date="2016-06-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/929414">SUSE bug 929414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961491">SUSE bug 961491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982779">SUSE bug 982779</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3622/">CVE-2015-3622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4008/">CVE-2016-4008</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516106" comment="libtasn1-3.7-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516107" comment="libtasn1-6-3.7-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516108" comment="libtasn1-6-32bit-3.7-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77716" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="984695" ref_url="https://bugzilla.suse.com/984695" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4122" ref_url="https://www.suse.com/security/cve/CVE-2016-4122/" source="CVE"/>
		<reference ref_id="CVE-2016-4123" ref_url="https://www.suse.com/security/cve/CVE-2016-4123/" source="CVE"/>
		<reference ref_id="CVE-2016-4124" ref_url="https://www.suse.com/security/cve/CVE-2016-4124/" source="CVE"/>
		<reference ref_id="CVE-2016-4125" ref_url="https://www.suse.com/security/cve/CVE-2016-4125/" source="CVE"/>
		<reference ref_id="CVE-2016-4127" ref_url="https://www.suse.com/security/cve/CVE-2016-4127/" source="CVE"/>
		<reference ref_id="CVE-2016-4128" ref_url="https://www.suse.com/security/cve/CVE-2016-4128/" source="CVE"/>
		<reference ref_id="CVE-2016-4129" ref_url="https://www.suse.com/security/cve/CVE-2016-4129/" source="CVE"/>
		<reference ref_id="CVE-2016-4130" ref_url="https://www.suse.com/security/cve/CVE-2016-4130/" source="CVE"/>
		<reference ref_id="CVE-2016-4131" ref_url="https://www.suse.com/security/cve/CVE-2016-4131/" source="CVE"/>
		<reference ref_id="CVE-2016-4132" ref_url="https://www.suse.com/security/cve/CVE-2016-4132/" source="CVE"/>
		<reference ref_id="CVE-2016-4133" ref_url="https://www.suse.com/security/cve/CVE-2016-4133/" source="CVE"/>
		<reference ref_id="CVE-2016-4134" ref_url="https://www.suse.com/security/cve/CVE-2016-4134/" source="CVE"/>
		<reference ref_id="CVE-2016-4135" ref_url="https://www.suse.com/security/cve/CVE-2016-4135/" source="CVE"/>
		<reference ref_id="CVE-2016-4136" ref_url="https://www.suse.com/security/cve/CVE-2016-4136/" source="CVE"/>
		<reference ref_id="CVE-2016-4137" ref_url="https://www.suse.com/security/cve/CVE-2016-4137/" source="CVE"/>
		<reference ref_id="CVE-2016-4138" ref_url="https://www.suse.com/security/cve/CVE-2016-4138/" source="CVE"/>
		<reference ref_id="CVE-2016-4139" ref_url="https://www.suse.com/security/cve/CVE-2016-4139/" source="CVE"/>
		<reference ref_id="CVE-2016-4140" ref_url="https://www.suse.com/security/cve/CVE-2016-4140/" source="CVE"/>
		<reference ref_id="CVE-2016-4141" ref_url="https://www.suse.com/security/cve/CVE-2016-4141/" source="CVE"/>
		<reference ref_id="CVE-2016-4142" ref_url="https://www.suse.com/security/cve/CVE-2016-4142/" source="CVE"/>
		<reference ref_id="CVE-2016-4143" ref_url="https://www.suse.com/security/cve/CVE-2016-4143/" source="CVE"/>
		<reference ref_id="CVE-2016-4144" ref_url="https://www.suse.com/security/cve/CVE-2016-4144/" source="CVE"/>
		<reference ref_id="CVE-2016-4145" ref_url="https://www.suse.com/security/cve/CVE-2016-4145/" source="CVE"/>
		<reference ref_id="CVE-2016-4146" ref_url="https://www.suse.com/security/cve/CVE-2016-4146/" source="CVE"/>
		<reference ref_id="CVE-2016-4147" ref_url="https://www.suse.com/security/cve/CVE-2016-4147/" source="CVE"/>
		<reference ref_id="CVE-2016-4148" ref_url="https://www.suse.com/security/cve/CVE-2016-4148/" source="CVE"/>
		<reference ref_id="CVE-2016-4149" ref_url="https://www.suse.com/security/cve/CVE-2016-4149/" source="CVE"/>
		<reference ref_id="CVE-2016-4150" ref_url="https://www.suse.com/security/cve/CVE-2016-4150/" source="CVE"/>
		<reference ref_id="CVE-2016-4151" ref_url="https://www.suse.com/security/cve/CVE-2016-4151/" source="CVE"/>
		<reference ref_id="CVE-2016-4152" ref_url="https://www.suse.com/security/cve/CVE-2016-4152/" source="CVE"/>
		<reference ref_id="CVE-2016-4153" ref_url="https://www.suse.com/security/cve/CVE-2016-4153/" source="CVE"/>
		<reference ref_id="CVE-2016-4154" ref_url="https://www.suse.com/security/cve/CVE-2016-4154/" source="CVE"/>
		<reference ref_id="CVE-2016-4155" ref_url="https://www.suse.com/security/cve/CVE-2016-4155/" source="CVE"/>
		<reference ref_id="CVE-2016-4156" ref_url="https://www.suse.com/security/cve/CVE-2016-4156/" source="CVE"/>
		<reference ref_id="CVE-2016-4166" ref_url="https://www.suse.com/security/cve/CVE-2016-4166/" source="CVE"/>
		<reference ref_id="CVE-2016-4171" ref_url="https://www.suse.com/security/cve/CVE-2016-4171/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html" source="SUSE-SU"/>
		<description>

Adobe flash-player was updated to 11.2.202.626 to fix the following security issues:

Security update to 11.2.202.626 (boo#984695):
* APSB16-18, CVE-2016-4122, CVE-2016-4123, CVE-2016-4124,
  CVE-2016-4125, CVE-2016-4127, CVE-2016-4128, CVE-2016-4129,
  CVE-2016-4130, CVE-2016-4131, CVE-2016-4132, CVE-2016-4133,
  CVE-2016-4134, CVE-2016-4135, CVE-2016-4136, CVE-2016-4137,
  CVE-2016-4138, CVE-2016-4139, CVE-2016-4140, CVE-2016-4141,
  CVE-2016-4142, CVE-2016-4143, CVE-2016-4144, CVE-2016-4145,
  CVE-2016-4146, CVE-2016-4147, CVE-2016-4148, CVE-2016-4149,
  CVE-2016-4150, CVE-2016-4151, CVE-2016-4152, CVE-2016-4153,
  CVE-2016-4154, CVE-2016-4155, CVE-2016-4156, CVE-2016-4166,
  CVE-2016-4171

Please see https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/984695">SUSE bug 984695</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4122/">CVE-2016-4122</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4123/">CVE-2016-4123</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4124/">CVE-2016-4124</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4125/">CVE-2016-4125</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4127/">CVE-2016-4127</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4128/">CVE-2016-4128</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4129/">CVE-2016-4129</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4130/">CVE-2016-4130</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4131/">CVE-2016-4131</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4132/">CVE-2016-4132</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4133/">CVE-2016-4133</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4134/">CVE-2016-4134</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4135/">CVE-2016-4135</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4136/">CVE-2016-4136</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4137/">CVE-2016-4137</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4138/">CVE-2016-4138</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4139/">CVE-2016-4139</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4140/">CVE-2016-4140</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4141/">CVE-2016-4141</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4142/">CVE-2016-4142</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4143/">CVE-2016-4143</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4144/">CVE-2016-4144</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4145/">CVE-2016-4145</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4146/">CVE-2016-4146</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4147/">CVE-2016-4147</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4148/">CVE-2016-4148</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4149/">CVE-2016-4149</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4150/">CVE-2016-4150</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4151/">CVE-2016-4151</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4152/">CVE-2016-4152</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4153/">CVE-2016-4153</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4154/">CVE-2016-4154</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4155/">CVE-2016-4155</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4156/">CVE-2016-4156</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4166/">CVE-2016-4166</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4171/">CVE-2016-4171</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516109" comment="flash-player-11.2.202.626-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516110" comment="flash-player-gnome-11.2.202.626-133.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77717" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="961935" ref_url="https://bugzilla.suse.com/961935" source="BUGZILLA"/>
		<reference ref_id="963806" ref_url="https://bugzilla.suse.com/963806" source="BUGZILLA"/>
		<reference ref_id="963810" ref_url="https://bugzilla.suse.com/963810" source="BUGZILLA"/>
		<reference ref_id="970287" ref_url="https://bugzilla.suse.com/970287" source="BUGZILLA"/>
		<reference ref_id="970295" ref_url="https://bugzilla.suse.com/970295" source="BUGZILLA"/>
		<reference ref_id="980904" ref_url="https://bugzilla.suse.com/980904" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0505" ref_url="https://www.suse.com/security/cve/CVE-2016-0505/" source="CVE"/>
		<reference ref_id="CVE-2016-0546" ref_url="https://www.suse.com/security/cve/CVE-2016-0546/" source="CVE"/>
		<reference ref_id="CVE-2016-0596" ref_url="https://www.suse.com/security/cve/CVE-2016-0596/" source="CVE"/>
		<reference ref_id="CVE-2016-0597" ref_url="https://www.suse.com/security/cve/CVE-2016-0597/" source="CVE"/>
		<reference ref_id="CVE-2016-0598" ref_url="https://www.suse.com/security/cve/CVE-2016-0598/" source="CVE"/>
		<reference ref_id="CVE-2016-0600" ref_url="https://www.suse.com/security/cve/CVE-2016-0600/" source="CVE"/>
		<reference ref_id="CVE-2016-0606" ref_url="https://www.suse.com/security/cve/CVE-2016-0606/" source="CVE"/>
		<reference ref_id="CVE-2016-0608" ref_url="https://www.suse.com/security/cve/CVE-2016-0608/" source="CVE"/>
		<reference ref_id="CVE-2016-0609" ref_url="https://www.suse.com/security/cve/CVE-2016-0609/" source="CVE"/>
		<reference ref_id="CVE-2016-0616" ref_url="https://www.suse.com/security/cve/CVE-2016-0616/" source="CVE"/>
		<reference ref_id="CVE-2016-0640" ref_url="https://www.suse.com/security/cve/CVE-2016-0640/" source="CVE"/>
		<reference ref_id="CVE-2016-0641" ref_url="https://www.suse.com/security/cve/CVE-2016-0641/" source="CVE"/>
		<reference ref_id="CVE-2016-0642" ref_url="https://www.suse.com/security/cve/CVE-2016-0642/" source="CVE"/>
		<reference ref_id="CVE-2016-0643" ref_url="https://www.suse.com/security/cve/CVE-2016-0643/" source="CVE"/>
		<reference ref_id="CVE-2016-0644" ref_url="https://www.suse.com/security/cve/CVE-2016-0644/" source="CVE"/>
		<reference ref_id="CVE-2016-0646" ref_url="https://www.suse.com/security/cve/CVE-2016-0646/" source="CVE"/>
		<reference ref_id="CVE-2016-0647" ref_url="https://www.suse.com/security/cve/CVE-2016-0647/" source="CVE"/>
		<reference ref_id="CVE-2016-0648" ref_url="https://www.suse.com/security/cve/CVE-2016-0648/" source="CVE"/>
		<reference ref_id="CVE-2016-0649" ref_url="https://www.suse.com/security/cve/CVE-2016-0649/" source="CVE"/>
		<reference ref_id="CVE-2016-0650" ref_url="https://www.suse.com/security/cve/CVE-2016-0650/" source="CVE"/>
		<reference ref_id="CVE-2016-0651" ref_url="https://www.suse.com/security/cve/CVE-2016-0651/" source="CVE"/>
		<reference ref_id="CVE-2016-0655" ref_url="https://www.suse.com/security/cve/CVE-2016-0655/" source="CVE"/>
		<reference ref_id="CVE-2016-0666" ref_url="https://www.suse.com/security/cve/CVE-2016-0666/" source="CVE"/>
		<reference ref_id="CVE-2016-0668" ref_url="https://www.suse.com/security/cve/CVE-2016-0668/" source="CVE"/>
		<reference ref_id="CVE-2016-2047" ref_url="https://www.suse.com/security/cve/CVE-2016-2047/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<description>
mariadb was updated to version 10.0.25 to fix 25 security issues.

These security issues were fixed:
- CVE-2016-0505: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to Options (bsc#980904).
- CVE-2016-0546: Unspecified vulnerability allowed local users to affect confidentiality, integrity, and availability via unknown vectors related to Client (bsc#980904).
- CVE-2016-0596: Unspecified vulnerability allowed remote authenticated users to affect availability via vectors related to DML (bsc#980904).
- CVE-2016-0597: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to Optimizer (bsc#980904).
- CVE-2016-0598: Unspecified vulnerability allowed remote authenticated users to affect availability via vectors related to DML (bsc#980904).
- CVE-2016-0600: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to InnoDB (bsc#980904).
- CVE-2016-0606: Unspecified vulnerability allowed remote authenticated users to affect integrity via unknown vectors related to encryption (bsc#980904).
- CVE-2016-0608: Unspecified vulnerability allowed remote authenticated users to affect availability via vectors related to UDF (bsc#980904).
- CVE-2016-0609: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to privileges (bsc#980904).
- CVE-2016-0616: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to Optimizer (bsc#980904).
- CVE-2016-0640: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to DML (bsc#980904).
- CVE-2016-0641: Unspecified vulnerability allowed local users to affect confidentiality and availability via vectors related to MyISAM (bsc#980904).
- CVE-2016-0642: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to Federated (bsc#980904).
- CVE-2016-0643: Unspecified vulnerability allowed local users to affect confidentiality via vectors related to DML (bsc#980904).
- CVE-2016-0644: Unspecified vulnerability allowed local users to affect availability via vectors related to DDL (bsc#980904).
- CVE-2016-0646: Unspecified vulnerability allowed local users to affect availability via vectors related to DML (bsc#980904).
- CVE-2016-0647: Unspecified vulnerability allowed local users to affect availability via vectors related to FTS (bsc#980904).
- CVE-2016-0648: Unspecified vulnerability allowed local users to affect availability via vectors related to PS (bsc#980904).
- CVE-2016-0649: Unspecified vulnerability allowed local users to affect availability via vectors related to PS (bsc#980904).
- CVE-2016-0650: Unspecified vulnerability allowed local users to affect availability via vectors related to Replication (bsc#980904).
- CVE-2016-0651: Unspecified vulnerability allowed local users to affect availability via vectors related to Optimizer (bsc#980904).
- CVE-2016-0655: Unspecified vulnerability allowed local users to affect availability via vectors related to InnoDB (bsc#980904).
- CVE-2016-0666: Unspecified vulnerability allowed local users to affect availability via vectors related to Security: Privileges (bsc#980904).
- CVE-2016-0668: Unspecified vulnerability allowed local users to affect availability via vectors related to InnoDB (bsc#980904).
- CVE-2016-2047: The ssl_verify_server_cert function in sql-common/client.c did not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allowed man-in-the-middle attackers to spoof SSL servers via a '/CN=' string in a field in a certificate, as demonstrated by '/OU=/CN=bar.com/CN=foo.com (bsc#963806).

These non-security issues were fixed:
- bsc#961935: Remove the leftovers of 'openSUSE' string in the '-DWITH_COMMENT' and 'DCOMPILATION_COMMENT' options
- bsc#970287: remove ha_tokudb.so plugin and tokuft_logprint and tokuftdump binaries as TokuDB storage engine requires the jemalloc library that isn't present in SLE-12-SP1 
- bsc#970295: Fix the leftovers of 'logrotate.d/mysql' string in the logrotate error message. Occurrences of this string were changed to 'logrotate.d/mariadb' 
- bsc#963810: Add 'log-error' and 'secure-file-priv' configuration options
  * add '/etc/my.cnf.d/error_log.conf' that specifies
    'log-error = /var/log/mysql/mysqld.log'. If no path is set,
    the error log is written to '/var/lib/mysql/$HOSTNAME.err',
    which is not picked up by logrotate.
  * add '/etc/my.cnf.d/secure_file_priv.conf' which specifies that
    'LOAD DATA', 'SELECT ... INTO' and 'LOAD FILE()' will only work
    with files in the directory specified by 'secure-file-priv'
    option (='/var/lib/mysql-files').
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/961935">SUSE bug 961935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963806">SUSE bug 963806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963810">SUSE bug 963810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970287">SUSE bug 970287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970295">SUSE bug 970295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0505/">CVE-2016-0505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0546/">CVE-2016-0546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0596/">CVE-2016-0596</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0597/">CVE-2016-0597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0598/">CVE-2016-0598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0600/">CVE-2016-0600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0606/">CVE-2016-0606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0608/">CVE-2016-0608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0609/">CVE-2016-0609</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0616/">CVE-2016-0616</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0640/">CVE-2016-0640</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0641/">CVE-2016-0641</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0642/">CVE-2016-0642</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0643/">CVE-2016-0643</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0644/">CVE-2016-0644</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0646/">CVE-2016-0646</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0647/">CVE-2016-0647</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0648/">CVE-2016-0648</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0649/">CVE-2016-0649</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0650/">CVE-2016-0650</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0651/">CVE-2016-0651</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0655/">CVE-2016-0655</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0666/">CVE-2016-0666</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0668/">CVE-2016-0668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2047/">CVE-2016-2047</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517025" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517026" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517027" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517028" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517029" comment="mariadb-10.0.25-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517030" comment="mariadb-client-10.0.25-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517031" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77718" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="981049" ref_url="https://bugzilla.suse.com/981049" source="BUGZILLA"/>
		<reference ref_id="981050" ref_url="https://bugzilla.suse.com/981050" source="BUGZILLA"/>
		<reference ref_id="981061" ref_url="https://bugzilla.suse.com/981061" source="BUGZILLA"/>
		<reference ref_id="982009" ref_url="https://bugzilla.suse.com/982009" source="BUGZILLA"/>
		<reference ref_id="982010" ref_url="https://bugzilla.suse.com/982010" source="BUGZILLA"/>
		<reference ref_id="982011" ref_url="https://bugzilla.suse.com/982011" source="BUGZILLA"/>
		<reference ref_id="982012" ref_url="https://bugzilla.suse.com/982012" source="BUGZILLA"/>
		<reference ref_id="982013" ref_url="https://bugzilla.suse.com/982013" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7456" ref_url="https://www.suse.com/security/cve/CVE-2013-7456/" source="CVE"/>
		<reference ref_id="CVE-2015-8876" ref_url="https://www.suse.com/security/cve/CVE-2015-8876/" source="CVE"/>
		<reference ref_id="CVE-2015-8877" ref_url="https://www.suse.com/security/cve/CVE-2015-8877/" source="CVE"/>
		<reference ref_id="CVE-2015-8879" ref_url="https://www.suse.com/security/cve/CVE-2015-8879/" source="CVE"/>
		<reference ref_id="CVE-2016-5093" ref_url="https://www.suse.com/security/cve/CVE-2016-5093/" source="CVE"/>
		<reference ref_id="CVE-2016-5094" ref_url="https://www.suse.com/security/cve/CVE-2016-5094/" source="CVE"/>
		<reference ref_id="CVE-2016-5095" ref_url="https://www.suse.com/security/cve/CVE-2016-5095/" source="CVE"/>
		<reference ref_id="CVE-2016-5096" ref_url="https://www.suse.com/security/cve/CVE-2016-5096/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002130.html" source="SUSE-SU"/>
		<description>
This update for php5 fixes the following issues:

- CVE-2013-7456: imagescale out-of-bounds read (bnc#982009).
- CVE-2016-5093: get_icu_value_internal out-of-bounds read (bnc#982010).
- CVE-2016-5094: Don't create strings with lengths outside of valid range (bnc#982011).
- CVE-2016-5095: Don't create strings with lengths outside of valid range (bnc#982012).
- CVE-2016-5096: int/size_t confusion in fread (bsc#982013).
- CVE-2015-8877: The gdImageScaleTwoPass function in gd_interpolation.c in the GD Graphics Library (aka libgd) as used in PHP used inconsistent allocate and free approaches, which allowed remote attackers to cause a denial of service (memory consumption) via a crafted call, as demonstrated by a call to the PHP imagescale function (bsc#981061).
- CVE-2015-8876: Zend/zend_exceptions.c in PHP did not validate certain Exception objects, which allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) or trigger unintended method execution via crafted serialized data (bsc#981049).
- CVE-2015-8879: The odbc_bindcols function in ext/odbc/php_odbc.c in PHP mishandles driver behavior for SQL_WVARCHAR columns, which allowed remote attackers to cause a denial of service (application crash) in opportunistic circumstances by leveraging use of the odbc_fetch_array function to access a certain type of Microsoft SQL Server table (bsc#981050).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-20"/>
	<updated date="2016-06-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/981049">SUSE bug 981049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981050">SUSE bug 981050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981061">SUSE bug 981061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982009">SUSE bug 982009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982010">SUSE bug 982010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982011">SUSE bug 982011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982012">SUSE bug 982012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982013">SUSE bug 982013</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7456/">CVE-2013-7456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8876/">CVE-2015-8876</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8877/">CVE-2015-8877</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8879/">CVE-2015-8879</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5093/">CVE-2016-5093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5094/">CVE-2016-5094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5095/">CVE-2016-5095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5096/">CVE-2016-5096</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516118" comment="libc-client2007e_suse-2007e_suse-19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77719" version="1" class="patch">
	<metadata>
		<title>Security update for libimobiledevice, usbmuxd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="982014" ref_url="https://bugzilla.suse.com/982014" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5104" ref_url="https://www.suse.com/security/cve/CVE-2016-5104/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00042.html" source="SUSE-SU"/>
		<description>
libimobiledevice, usbmuxd were updated to fix one security issue.

This security issue was fixed:
- CVE-2016-5104: Sockets listening on INADDR_ANY instead of only locally (982014).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-21"/>
	<updated date="2016-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/982014">SUSE bug 982014</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5104/">CVE-2016-5104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516119" comment="libimobiledevice-tools-1.1.5-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516120" comment="libimobiledevice4-1.1.5-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516121" comment="libusbmuxd2-1.0.8-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516122" comment="usbmuxd-1.0.8-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77720" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="959888" ref_url="https://bugzilla.suse.com/959888" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001807.html" source="SUSE-SU"/>
		<description>
This update contains mozilla-nss 3.19.2.2 and fixes the following security issue:

  - CVE-2015-7575: MD5 signatures accepted within TLS 1.2 ServerKeyExchange in server signature (bsc#959888).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-18"/>
	<updated date="2016-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/959888">SUSE bug 959888</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516123" comment="libfreebl3-3.19.2.2-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516124" comment="libfreebl3-32bit-3.19.2.2-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516125" comment="libsoftokn3-3.19.2.2-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516126" comment="libsoftokn3-32bit-3.19.2.2-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516127" comment="mozilla-nss-3.19.2.2-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516128" comment="mozilla-nss-32bit-3.19.2.2-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516129" comment="mozilla-nss-certs-3.19.2.2-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516130" comment="mozilla-nss-certs-32bit-3.19.2.2-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516131" comment="mozilla-nss-sysinit-3.19.2.2-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516132" comment="mozilla-nss-sysinit-32bit-3.19.2.2-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516133" comment="mozilla-nss-tools-3.19.2.2-32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77721" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-good (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1012102" ref_url="https://bugzilla.suse.com/1012102" source="BUGZILLA"/>
		<reference ref_id="1012103" ref_url="https://bugzilla.suse.com/1012103" source="BUGZILLA"/>
		<reference ref_id="1012104" ref_url="https://bugzilla.suse.com/1012104" source="BUGZILLA"/>
		<reference ref_id="1013653" ref_url="https://bugzilla.suse.com/1013653" source="BUGZILLA"/>
		<reference ref_id="1013655" ref_url="https://bugzilla.suse.com/1013655" source="BUGZILLA"/>
		<reference ref_id="1013663" ref_url="https://bugzilla.suse.com/1013663" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9634" ref_url="https://www.suse.com/security/cve/CVE-2016-9634/" source="CVE"/>
		<reference ref_id="CVE-2016-9635" ref_url="https://www.suse.com/security/cve/CVE-2016-9635/" source="CVE"/>
		<reference ref_id="CVE-2016-9636" ref_url="https://www.suse.com/security/cve/CVE-2016-9636/" source="CVE"/>
		<reference ref_id="CVE-2016-9807" ref_url="https://www.suse.com/security/cve/CVE-2016-9807/" source="CVE"/>
		<reference ref_id="CVE-2016-9808" ref_url="https://www.suse.com/security/cve/CVE-2016-9808/" source="CVE"/>
		<reference ref_id="CVE-2016-9810" ref_url="https://www.suse.com/security/cve/CVE-2016-9810/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00047.html" source="SUSE-SU"/>
		<description>

gstreamer-0_10-plugins-good was updated to fix five security issues.

These security issues were fixed:

- CVE-2016-9635: Invalid FLIC files could have caused and an out-of-bounds write (bsc#1012103).
- CVE-2016-9634: Invalid FLIC files could have caused and an out-of-bounds write (bsc#1012102).
- CVE-2016-9810: Invalid files can be used to extraneous unreferences, leading to invalid memory access and DoS (bsc#1013663).
- CVE-2016-9807: Prevent the reading of invalid memory in flx_decode_chunks, leading to DoS (bsc#1013655).
- CVE-2016-9808: Prevent maliciously crafted flic files from causing invalid memory accesses (bsc#1013653).

To install this update libbz2-1 needs to be installed if it isn't already present on the system.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-20"/>
	<updated date="2017-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012102">SUSE bug 1012102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012103">SUSE bug 1012103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012104">SUSE bug 1012104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013653">SUSE bug 1013653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013655">SUSE bug 1013655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013663">SUSE bug 1013663</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9634/">CVE-2016-9634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9635/">CVE-2016-9635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9636/">CVE-2016-9636</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9807/">CVE-2016-9807</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9808/">CVE-2016-9808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9810/">CVE-2016-9810</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517032" comment="gstreamer-0_10-plugins-good-0.10.31-13.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517033" comment="gstreamer-0_10-plugins-good-lang-0.10.31-13.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77722" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1013669" ref_url="https://bugzilla.suse.com/1013669" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9811" ref_url="https://www.suse.com/security/cve/CVE-2016-9811/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002591.html" source="SUSE-SU"/>
		<description>

gstreamer-0_10-plugins-base was updated to fix one issue.
	  
This security issue was fixed:

* CVE-2016-9811: Out of bounds memory read in windows_icon_typefind (bsc#1013669).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-23"/>
	<updated date="2017-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013669">SUSE bug 1013669</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9811/">CVE-2016-9811</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517034" comment="gstreamer-0_10-plugins-base-0.10.36-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517035" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517036" comment="gstreamer-0_10-plugins-base-lang-0.10.36-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517037" comment="libgstapp-0_10-0-0.10.36-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517038" comment="libgstapp-0_10-0-32bit-0.10.36-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517039" comment="libgstinterfaces-0_10-0-0.10.36-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517040" comment="libgstinterfaces-0_10-0-32bit-0.10.36-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77723" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-bad (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1010514" ref_url="https://bugzilla.suse.com/1010514" source="BUGZILLA"/>
		<reference ref_id="1010829" ref_url="https://bugzilla.suse.com/1010829" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9445" ref_url="https://www.suse.com/security/cve/CVE-2016-9445/" source="CVE"/>
		<reference ref_id="CVE-2016-9446" ref_url="https://www.suse.com/security/cve/CVE-2016-9446/" source="CVE"/>
		<reference ref_id="CVE-2016-9447" ref_url="https://www.suse.com/security/cve/CVE-2016-9447/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002545.html" source="SUSE-SU"/>
		<description>


This update for gstreamer-0_10-plugins-bad fixes the following issues:

- CVE-2016-9445, CVE-2016-9446: Protection against buffer overflows (bsc#1010829)
- CVE-2016-9447: Disable the nsf plugin (bsc#1010514)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-05"/>
	<updated date="2017-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010514">SUSE bug 1010514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010829">SUSE bug 1010829</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9445/">CVE-2016-9445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9446/">CVE-2016-9446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9447/">CVE-2016-9447</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517041" comment="gstreamer-0_10-plugins-bad-0.10.23-19.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517042" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-19.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517043" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-19.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517044" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-19.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517045" comment="libgstbasevideo-0_10-23-0.10.23-19.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517046" comment="libgstbasevideo-0_10-23-32bit-0.10.23-19.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517047" comment="libgstcodecparsers-0_10-23-0.10.23-19.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517048" comment="libgstphotography-0_10-23-0.10.23-19.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517049" comment="libgstphotography-0_10-23-32bit-0.10.23-19.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517050" comment="libgstsignalprocessor-0_10-23-0.10.23-19.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517051" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-19.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517052" comment="libgstvdp-0_10-23-0.10.23-19.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517053" comment="libgstvdp-0_10-23-32bit-0.10.23-19.3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77724" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-bad (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1013659" ref_url="https://bugzilla.suse.com/1013659" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9809" ref_url="https://www.suse.com/security/cve/CVE-2016-9809/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002608.html" source="SUSE-SU"/>
		<description>

gstreamer-0_10-plugins-bad was udpated to fix one issue.
	  
This security issue was fixed:

- CVE-2016-9809: Off by one read in gst_h264_parse_set_caps() (bsc#1013659).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-30"/>
	<updated date="2017-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013659">SUSE bug 1013659</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9809/">CVE-2016-9809</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517054" comment="gstreamer-0_10-plugins-bad-0.10.23-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517055" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517056" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517057" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517058" comment="libgstbasevideo-0_10-23-0.10.23-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517059" comment="libgstbasevideo-0_10-23-32bit-0.10.23-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517060" comment="libgstcodecparsers-0_10-23-0.10.23-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517061" comment="libgstphotography-0_10-23-0.10.23-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517062" comment="libgstphotography-0_10-23-32bit-0.10.23-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517063" comment="libgstsignalprocessor-0_10-23-0.10.23-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517064" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517065" comment="libgstvdp-0_10-23-0.10.23-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517066" comment="libgstvdp-0_10-23-32bit-0.10.23-19.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77725" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1020905" ref_url="https://bugzilla.suse.com/1020905" source="BUGZILLA"/>
		<reference ref_id="1022053" ref_url="https://bugzilla.suse.com/1022053" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-5546" ref_url="https://www.suse.com/security/cve/CVE-2016-5546/" source="CVE"/>
		<reference ref_id="CVE-2016-5547" ref_url="https://www.suse.com/security/cve/CVE-2016-5547/" source="CVE"/>
		<reference ref_id="CVE-2016-5548" ref_url="https://www.suse.com/security/cve/CVE-2016-5548/" source="CVE"/>
		<reference ref_id="CVE-2016-5549" ref_url="https://www.suse.com/security/cve/CVE-2016-5549/" source="CVE"/>
		<reference ref_id="CVE-2016-5552" ref_url="https://www.suse.com/security/cve/CVE-2016-5552/" source="CVE"/>
		<reference ref_id="CVE-2017-3231" ref_url="https://www.suse.com/security/cve/CVE-2017-3231/" source="CVE"/>
		<reference ref_id="CVE-2017-3241" ref_url="https://www.suse.com/security/cve/CVE-2017-3241/" source="CVE"/>
		<reference ref_id="CVE-2017-3252" ref_url="https://www.suse.com/security/cve/CVE-2017-3252/" source="CVE"/>
		<reference ref_id="CVE-2017-3253" ref_url="https://www.suse.com/security/cve/CVE-2017-3253/" source="CVE"/>
		<reference ref_id="CVE-2017-3260" ref_url="https://www.suse.com/security/cve/CVE-2017-3260/" source="CVE"/>
		<reference ref_id="CVE-2017-3261" ref_url="https://www.suse.com/security/cve/CVE-2017-3261/" source="CVE"/>
		<reference ref_id="CVE-2017-3272" ref_url="https://www.suse.com/security/cve/CVE-2017-3272/" source="CVE"/>
		<reference ref_id="CVE-2017-3289" ref_url="https://www.suse.com/security/cve/CVE-2017-3289/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" source="SUSE-SU"/>
		<description>

This update for java-1_8_0-openjdk fixes the following issues:
Oracle Critical Patch Update of January 2017 (bsc#1020905)
Upgrade to version jdk8u121 (icedtea 3.3.0):
 - S8138725: Add options for Javadoc generation
 - S8140353: Improve signature checking
 - S8151934, CVE-2017-3231: Resolve class resolution
 - S8156804, CVE-2017-3241: Better constraint checking
 - S8158406: Limited Parameter Processing
 - S8158997: JNDI Protocols Switch
 - S8159507: RuntimeVisibleAnnotation validation
 - S8161218: Better bytecode loading
 - S8161743, CVE-2017-3252: Provide proper login context
 - S8162577: Standardize logging levels
 - S8162973: Better component components
 - S8164143, CVE-2017-3260: Improve components for menu items
 - S8164147, CVE-2017-3261: Improve streaming socket output
 - S8165071, CVE-2016-2183: Expand TLS support
 - S8165344, CVE-2017-3272: Update concurrency support
 - S8166988, CVE-2017-3253: Improve image processing performance
 - S8167104, CVE-2017-3289: Additional class construction refinements
 - S8167223, CVE-2016-5552: URL handling improvements
 - S8168705, CVE-2016-5547: Better ObjectIdentifier validation
 - S8168714, CVE-2016-5546: Tighten ECDSA validation
 - S8168728, CVE-2016-5548: DSA signing improvements
 - S8168724, CVE-2016-5549: ECDSA signing improvements
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-31"/>
	<updated date="2017-01-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022053">SUSE bug 1022053</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5546/">CVE-2016-5546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5547/">CVE-2016-5547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5548/">CVE-2016-5548</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5549/">CVE-2016-5549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5552/">CVE-2016-5552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3231/">CVE-2017-3231</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3241/">CVE-2017-3241</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3252/">CVE-2017-3252</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3253/">CVE-2017-3253</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3260/">CVE-2017-3260</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3261/">CVE-2017-3261</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3272/">CVE-2017-3272</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3289/">CVE-2017-3289</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517067" comment="java-1_8_0-openjdk-1.8.0.121-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517068" comment="java-1_8_0-openjdk-headless-1.8.0.121-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77726" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1005879" ref_url="https://bugzilla.suse.com/1005879" source="BUGZILLA"/>
		<reference ref_id="1018832" ref_url="https://bugzilla.suse.com/1018832" source="BUGZILLA"/>
		<reference ref_id="999646" ref_url="https://bugzilla.suse.com/999646" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7444" ref_url="https://www.suse.com/security/cve/CVE-2016-7444/" source="CVE"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2017-5335" ref_url="https://www.suse.com/security/cve/CVE-2017-5335/" source="CVE"/>
		<reference ref_id="CVE-2017-5336" ref_url="https://www.suse.com/security/cve/CVE-2017-5336/" source="CVE"/>
		<reference ref_id="CVE-2017-5337" ref_url="https://www.suse.com/security/cve/CVE-2017-5337/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00000.html" source="SUSE-SU"/>
		<description>

This update for gnutls fixes the following security issues:

- GnuTLS could have crashed when processing maliciously crafted OpenPGP
  certificates (GNUTLS-SA-2017-2, bsc#1018832, CVE-2017-5335, CVE-2017-5337,
  CVE-2017-5336)
- GnuTLS could have falsely accepted certificates when using OCSP
  (GNUTLS-SA-2016-3, bsc#999646, CVE-2016-7444)
- GnuTLS could have suffered from 100% CPU load DoS attacks by using SSL alert
  packets during the handshake (bsc#1005879, CVE-2016-8610)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-01"/>
	<updated date="2017-02-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005879">SUSE bug 1005879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018832">SUSE bug 1018832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999646">SUSE bug 999646</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7444/">CVE-2016-7444</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5335/">CVE-2017-5335</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5336/">CVE-2017-5336</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5337/">CVE-2017-5337</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517069" comment="gnutls-3.2.15-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517070" comment="libgnutls28-3.2.15-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517071" comment="libgnutls28-32bit-3.2.15-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77727" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1020108" ref_url="https://bugzilla.suse.com/1020108" source="BUGZILLA"/>
		<reference ref_id="963448" ref_url="https://bugzilla.suse.com/963448" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2037" ref_url="https://www.suse.com/security/cve/CVE-2016-2037/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002615.html" source="SUSE-SU"/>
		<description>

This update for cpio fixes two issues.

This security issue was fixed:

- CVE-2016-2037: The cpio_safer_name_suffix function in util.c in cpio allowed remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file (bsc#963448).

This non-security issue was fixed:

- bsc#1020108: Always use 32 bit CRC to prevent checksum errors for files greater than 32MB
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-02"/>
	<updated date="2017-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1020108">SUSE bug 1020108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963448">SUSE bug 963448</bugzilla>
	<cve impact="low" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-2037/">CVE-2016-2037</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517072" comment="cpio-2.11-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517073" comment="cpio-lang-2.11-32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77728" version="1" class="patch">
	<metadata>
		<title>Security update for guile (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1004221" ref_url="https://bugzilla.suse.com/1004221" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8605" ref_url="https://www.suse.com/security/cve/CVE-2016-8605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002624.html" source="SUSE-SU"/>
		<description>

This update for guile fixes the following issues:

- CVE-2016-8605: Fixed thread-unsafe umask modification (bsc#1004221).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-06"/>
	<updated date="2017-02-06"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1004221">SUSE bug 1004221</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8605/">CVE-2016-8605</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517074" comment="guile-2.0.9-8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517075" comment="guile-modules-2_0-2.0.9-8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517076" comment="libguile-2_0-22-2.0.9-8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77729" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1023078" ref_url="https://bugzilla.suse.com/1023078" source="BUGZILLA"/>
		<reference ref_id="1023079" ref_url="https://bugzilla.suse.com/1023079" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9577" ref_url="https://www.suse.com/security/cve/CVE-2016-9577/" source="CVE"/>
		<reference ref_id="CVE-2016-9578" ref_url="https://www.suse.com/security/cve/CVE-2016-9578/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00009.html" source="SUSE-SU"/>
		<description>

This security update for spice fixes the following issues:

CVE-2016-9577: A buffer overflow in the spice server could have potentially been used 
by unauthenticated attackers to execute arbitrary code. (bsc#1023078)
CVE-2016-9578: Unauthenticated attackers could have caused a denial of service via a crafted message. (bsc#1023079)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-06"/>
	<updated date="2017-02-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1023078">SUSE bug 1023078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023079">SUSE bug 1023079</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9577/">CVE-2016-9577</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9578/">CVE-2016-9578</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517077" comment="libspice-server1-0.12.5-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77730" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1008253" ref_url="https://bugzilla.suse.com/1008253" source="BUGZILLA"/>
		<reference ref_id="1020868" ref_url="https://bugzilla.suse.com/1020868" source="BUGZILLA"/>
		<reference ref_id="1020873" ref_url="https://bugzilla.suse.com/1020873" source="BUGZILLA"/>
		<reference ref_id="1020875" ref_url="https://bugzilla.suse.com/1020875" source="BUGZILLA"/>
		<reference ref_id="1020877" ref_url="https://bugzilla.suse.com/1020877" source="BUGZILLA"/>
		<reference ref_id="1020878" ref_url="https://bugzilla.suse.com/1020878" source="BUGZILLA"/>
		<reference ref_id="1020882" ref_url="https://bugzilla.suse.com/1020882" source="BUGZILLA"/>
		<reference ref_id="1020884" ref_url="https://bugzilla.suse.com/1020884" source="BUGZILLA"/>
		<reference ref_id="1020885" ref_url="https://bugzilla.suse.com/1020885" source="BUGZILLA"/>
		<reference ref_id="1020891" ref_url="https://bugzilla.suse.com/1020891" source="BUGZILLA"/>
		<reference ref_id="1020894" ref_url="https://bugzilla.suse.com/1020894" source="BUGZILLA"/>
		<reference ref_id="1020896" ref_url="https://bugzilla.suse.com/1020896" source="BUGZILLA"/>
		<reference ref_id="1022428" ref_url="https://bugzilla.suse.com/1022428" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6664" ref_url="https://www.suse.com/security/cve/CVE-2016-6664/" source="CVE"/>
		<reference ref_id="CVE-2017-3238" ref_url="https://www.suse.com/security/cve/CVE-2017-3238/" source="CVE"/>
		<reference ref_id="CVE-2017-3243" ref_url="https://www.suse.com/security/cve/CVE-2017-3243/" source="CVE"/>
		<reference ref_id="CVE-2017-3244" ref_url="https://www.suse.com/security/cve/CVE-2017-3244/" source="CVE"/>
		<reference ref_id="CVE-2017-3257" ref_url="https://www.suse.com/security/cve/CVE-2017-3257/" source="CVE"/>
		<reference ref_id="CVE-2017-3258" ref_url="https://www.suse.com/security/cve/CVE-2017-3258/" source="CVE"/>
		<reference ref_id="CVE-2017-3265" ref_url="https://www.suse.com/security/cve/CVE-2017-3265/" source="CVE"/>
		<reference ref_id="CVE-2017-3291" ref_url="https://www.suse.com/security/cve/CVE-2017-3291/" source="CVE"/>
		<reference ref_id="CVE-2017-3312" ref_url="https://www.suse.com/security/cve/CVE-2017-3312/" source="CVE"/>
		<reference ref_id="CVE-2017-3317" ref_url="https://www.suse.com/security/cve/CVE-2017-3317/" source="CVE"/>
		<reference ref_id="CVE-2017-3318" ref_url="https://www.suse.com/security/cve/CVE-2017-3318/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00013.html" source="SUSE-SU"/>
		<description>

This mariadb version update to 10.0.29 fixes the following issues:

- CVE-2017-3318: unspecified vulnerability affecting Error Handling (bsc#1020896)
- CVE-2017-3317: unspecified vulnerability affecting Logging (bsc#1020894)
- CVE-2017-3312: insecure error log file handling in mysqld_safe, incomplete CVE-2016-6664 (bsc#1020873)
- CVE-2017-3291: unrestricted mysqld_safe's ledir (bsc#1020884)
- CVE-2017-3265: unsafe chmod/chown use in init script (bsc#1020885)
- CVE-2017-3258: unspecified vulnerability in the DDL component (bsc#1020875)
- CVE-2017-3257: unspecified vulnerability affecting InnoDB (bsc#1020878)
- CVE-2017-3244: unspecified vulnerability affecing the DML component (bsc#1020877)
- CVE-2017-3243: unspecified vulnerability affecting the Charsets component (bsc#1020891)
- CVE-2017-3238: unspecified vulnerability affecting the Optimizer component (bsc#1020882)
- CVE-2016-6664: Root Privilege Escalation (bsc#1008253)
- Applications using the client library for MySQL (libmysqlclient.so) had a use-after-free issue that could cause the applications to crash (bsc#1022428)

- notable changes:
  * XtraDB updated to 5.6.34-79.1
  * TokuDB updated to 5.6.34-79.1
  * Innodb updated to 5.6.35
  * Performance Schema updated to 5.6.35

Release notes and changelog:
  * https://kb.askmonty.org/en/mariadb-10029-release-notes
  * https://kb.askmonty.org/en/mariadb-10029-changelog
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-07"/>
	<updated date="2017-02-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1008253">SUSE bug 1008253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020873">SUSE bug 1020873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020875">SUSE bug 1020875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020877">SUSE bug 1020877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020878">SUSE bug 1020878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020882">SUSE bug 1020882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020884">SUSE bug 1020884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020885">SUSE bug 1020885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020891">SUSE bug 1020891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020894">SUSE bug 1020894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020896">SUSE bug 1020896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022428">SUSE bug 1022428</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6664/">CVE-2016-6664</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3238/">CVE-2017-3238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3243/">CVE-2017-3243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3244/">CVE-2017-3244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3257/">CVE-2017-3257</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3258/">CVE-2017-3258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3265/">CVE-2017-3265</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3291/">CVE-2017-3291</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3312/">CVE-2017-3312</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3317/">CVE-2017-3317</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3318/">CVE-2017-3318</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517078" comment="libmysqlclient18-10.0.29-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517079" comment="libmysqlclient18-32bit-10.0.29-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517080" comment="libmysqlclient_r18-10.0.29-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517081" comment="libmysqlclient_r18-32bit-10.0.29-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517082" comment="mariadb-10.0.29-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517083" comment="mariadb-client-10.0.29-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517084" comment="mariadb-errormessages-10.0.29-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77731" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="983215" ref_url="https://bugzilla.suse.com/983215" source="BUGZILLA"/>
		<reference ref_id="983216" ref_url="https://bugzilla.suse.com/983216" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6702" ref_url="https://www.suse.com/security/cve/CVE-2012-6702/" source="CVE"/>
		<reference ref_id="CVE-2016-5300" ref_url="https://www.suse.com/security/cve/CVE-2016-5300/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002631.html" source="SUSE-SU"/>
		<description>

This update for expat fixes the following security issues:

- CVE-2012-6702: Expat, when used in a parser that has not
  called XML_SetHashSalt or passed it a seed of 0, made it easier for
  context-dependent attackers to defeat cryptographic protection mechanisms
  via vectors involving use of the srand function.  (bsc#983215)
- CVE-2016-5300: The XML parser in Expat did not use sufficient entropy
  for hash initialization, which allowed context-dependent attackers to
  cause a denial of service (CPU consumption) via crafted identifiers in
  an XML document. NOTE: this vulnerability exists because of an incomplete
  fix for CVE-2012-0876.  (bsc#983216)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-08"/>
	<updated date="2017-02-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/983215">SUSE bug 983215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983216">SUSE bug 983216</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6702/">CVE-2012-6702</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5300/">CVE-2016-5300</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517085" comment="expat-2.1.0-20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517086" comment="libexpat1-2.1.0-20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517087" comment="libexpat1-32bit-2.1.0-20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77732" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1021814" ref_url="https://bugzilla.suse.com/1021814" source="BUGZILLA"/>
		<reference ref_id="1021817" ref_url="https://bugzilla.suse.com/1021817" source="BUGZILLA"/>
		<reference ref_id="1021818" ref_url="https://bugzilla.suse.com/1021818" source="BUGZILLA"/>
		<reference ref_id="1021819" ref_url="https://bugzilla.suse.com/1021819" source="BUGZILLA"/>
		<reference ref_id="1021820" ref_url="https://bugzilla.suse.com/1021820" source="BUGZILLA"/>
		<reference ref_id="1021821" ref_url="https://bugzilla.suse.com/1021821" source="BUGZILLA"/>
		<reference ref_id="1021822" ref_url="https://bugzilla.suse.com/1021822" source="BUGZILLA"/>
		<reference ref_id="1021823" ref_url="https://bugzilla.suse.com/1021823" source="BUGZILLA"/>
		<reference ref_id="1021824" ref_url="https://bugzilla.suse.com/1021824" source="BUGZILLA"/>
		<reference ref_id="1021991" ref_url="https://bugzilla.suse.com/1021991" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5373" ref_url="https://www.suse.com/security/cve/CVE-2017-5373/" source="CVE"/>
		<reference ref_id="CVE-2017-5375" ref_url="https://www.suse.com/security/cve/CVE-2017-5375/" source="CVE"/>
		<reference ref_id="CVE-2017-5376" ref_url="https://www.suse.com/security/cve/CVE-2017-5376/" source="CVE"/>
		<reference ref_id="CVE-2017-5378" ref_url="https://www.suse.com/security/cve/CVE-2017-5378/" source="CVE"/>
		<reference ref_id="CVE-2017-5380" ref_url="https://www.suse.com/security/cve/CVE-2017-5380/" source="CVE"/>
		<reference ref_id="CVE-2017-5383" ref_url="https://www.suse.com/security/cve/CVE-2017-5383/" source="CVE"/>
		<reference ref_id="CVE-2017-5386" ref_url="https://www.suse.com/security/cve/CVE-2017-5386/" source="CVE"/>
		<reference ref_id="CVE-2017-5390" ref_url="https://www.suse.com/security/cve/CVE-2017-5390/" source="CVE"/>
		<reference ref_id="CVE-2017-5396" ref_url="https://www.suse.com/security/cve/CVE-2017-5396/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0427-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00017.html" source="SUSE-SU"/>
		<description>

MozillaFirefox 45 ESR was updated to 45.7 to fix the following issues (bsc#1021991):

* MFSA 2017-02/CVE-2017-5378: Pointer and frame data leakage of Javascript objects (bsc#1021818)
* MFSA 2017-02/CVE-2017-5396: Use-after-free with Media Decoder (bsc#1021821)
* MFSA 2017-02/CVE-2017-5386: WebExtensions can use data: protocol to affect other extensions (bsc#1021823)
* MFSA 2017-02/CVE-2017-5380: Potential use-after-free during DOM manipulations (bsc#1021819)
* MFSA 2017-02/CVE-2017-5390: Insecure communication methods in Developer Tools JSON viewer (bsc#1021820)
* MFSA 2017-02/CVE-2017-5373: Memory safety bugs fixed in Firefox 51 and Firefox ESR 45.7 (bsc#1021824)
* MFSA 2017-02/CVE-2017-5375: Excessive JIT code allocation allows bypass of ASLR and DEP (bsc#1021814)
* MFSA 2017-02/CVE-2017-5376: Use-after-free in XSL (bsc#1021817)
* MFSA 2017-02/CVE-2017-5383: Location bar spoofing with unicode characters (bsc#1021822)

Please see https://www.mozilla.org/en-US/security/advisories/mfsa2017-02/
for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-08"/>
	<updated date="2017-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1021814">SUSE bug 1021814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021817">SUSE bug 1021817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021818">SUSE bug 1021818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021819">SUSE bug 1021819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021820">SUSE bug 1021820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021821">SUSE bug 1021821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021822">SUSE bug 1021822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021823">SUSE bug 1021823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021824">SUSE bug 1021824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5373/">CVE-2017-5373</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5375/">CVE-2017-5375</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5376/">CVE-2017-5376</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5378/">CVE-2017-5378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5380/">CVE-2017-5380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5383/">CVE-2017-5383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5386/">CVE-2017-5386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5390/">CVE-2017-5390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5396/">CVE-2017-5396</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517088" comment="MozillaFirefox-45.7.0esr-99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517089" comment="MozillaFirefox-translations-45.7.0esr-99.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77733" version="1" class="patch">
	<metadata>
		<title>Security update for opus (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1020102" ref_url="https://bugzilla.suse.com/1020102" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0381" ref_url="https://www.suse.com/security/cve/CVE-2017-0381/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0436-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00018.html" source="SUSE-SU"/>
		<description>

This update for opus fixes the following issues:

- CVE-2017-0381: Fixed a remote code execution vulnerability in silk/NLSF_stabilize.c when playing certain media files (bsc#1020102)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-09"/>
	<updated date="2017-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020102">SUSE bug 1020102</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-0381/">CVE-2017-0381</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517090" comment="libopus0-1.1-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77734" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1019611" ref_url="https://bugzilla.suse.com/1019611" source="BUGZILLA"/>
		<reference ref_id="1022103" ref_url="https://bugzilla.suse.com/1022103" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5225" ref_url="https://www.suse.com/security/cve/CVE-2017-5225/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002639.html" source="SUSE-SU"/>
		<description>

This update for tiff fixes the following issues:

- A crafted TIFF image could cause a crash and potential code execution when
processed by the 'tiffcp' utility (CVE-2017-5225, bsc#1019611).

Also a regression from the version update to 4.0.7 was fixed in
handling TIFFTAG_FAXRECVPARAMS. (bsc#1022103)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-13"/>
	<updated date="2017-02-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1019611">SUSE bug 1019611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022103">SUSE bug 1022103</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5225/">CVE-2017-5225</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517091" comment="libtiff5-4.0.7-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517092" comment="libtiff5-32bit-4.0.7-40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77735" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1000677" ref_url="https://bugzilla.suse.com/1000677" source="BUGZILLA"/>
		<reference ref_id="1001912" ref_url="https://bugzilla.suse.com/1001912" source="BUGZILLA"/>
		<reference ref_id="1004499" ref_url="https://bugzilla.suse.com/1004499" source="BUGZILLA"/>
		<reference ref_id="1005878" ref_url="https://bugzilla.suse.com/1005878" source="BUGZILLA"/>
		<reference ref_id="1019334" ref_url="https://bugzilla.suse.com/1019334" source="BUGZILLA"/>
		<reference ref_id="1021641" ref_url="https://bugzilla.suse.com/1021641" source="BUGZILLA"/>
		<reference ref_id="1022085" ref_url="https://bugzilla.suse.com/1022085" source="BUGZILLA"/>
		<reference ref_id="1022271" ref_url="https://bugzilla.suse.com/1022271" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056/" source="CVE"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2017-3731" ref_url="https://www.suse.com/security/cve/CVE-2017-3731/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002642.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues contained in the
OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)

Security issues fixed:
- CVE-2016-7056: A local ECSDA P-256 timing attack that might have allowed key recovery was fixed (bsc#1019334)
- CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)
- CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)
- CVE-2017-3731: Truncated packet could crash via OOB read (bsc#1022085, CVE-2017-3731)
- Degrade the 3DES cipher to MEDIUM in SSLv2 (bsc#1001912)

Bugs fixed:
- fix crash in openssl speed (bsc#1000677)
- fix ca-bundle path (bsc#1022271)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-14"/>
	<updated date="2017-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000677">SUSE bug 1000677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001912">SUSE bug 1001912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004499">SUSE bug 1004499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005878">SUSE bug 1005878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019334">SUSE bug 1019334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022085">SUSE bug 1022085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022271">SUSE bug 1022271</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3731/">CVE-2017-3731</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517093" comment="libopenssl1_0_0-1.0.1i-54.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517094" comment="libopenssl1_0_0-32bit-1.0.1i-54.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517095" comment="openssl-1.0.1i-54.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77736" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1003813" ref_url="https://bugzilla.suse.com/1003813" source="BUGZILLA"/>
		<reference ref_id="1005666" ref_url="https://bugzilla.suse.com/1005666" source="BUGZILLA"/>
		<reference ref_id="1007197" ref_url="https://bugzilla.suse.com/1007197" source="BUGZILLA"/>
		<reference ref_id="1008557" ref_url="https://bugzilla.suse.com/1008557" source="BUGZILLA"/>
		<reference ref_id="1008567" ref_url="https://bugzilla.suse.com/1008567" source="BUGZILLA"/>
		<reference ref_id="1008833" ref_url="https://bugzilla.suse.com/1008833" source="BUGZILLA"/>
		<reference ref_id="1008876" ref_url="https://bugzilla.suse.com/1008876" source="BUGZILLA"/>
		<reference ref_id="1008979" ref_url="https://bugzilla.suse.com/1008979" source="BUGZILLA"/>
		<reference ref_id="1009062" ref_url="https://bugzilla.suse.com/1009062" source="BUGZILLA"/>
		<reference ref_id="1009969" ref_url="https://bugzilla.suse.com/1009969" source="BUGZILLA"/>
		<reference ref_id="1010040" ref_url="https://bugzilla.suse.com/1010040" source="BUGZILLA"/>
		<reference ref_id="1010213" ref_url="https://bugzilla.suse.com/1010213" source="BUGZILLA"/>
		<reference ref_id="1010294" ref_url="https://bugzilla.suse.com/1010294" source="BUGZILLA"/>
		<reference ref_id="1010475" ref_url="https://bugzilla.suse.com/1010475" source="BUGZILLA"/>
		<reference ref_id="1010478" ref_url="https://bugzilla.suse.com/1010478" source="BUGZILLA"/>
		<reference ref_id="1010501" ref_url="https://bugzilla.suse.com/1010501" source="BUGZILLA"/>
		<reference ref_id="1010502" ref_url="https://bugzilla.suse.com/1010502" source="BUGZILLA"/>
		<reference ref_id="1010507" ref_url="https://bugzilla.suse.com/1010507" source="BUGZILLA"/>
		<reference ref_id="1010612" ref_url="https://bugzilla.suse.com/1010612" source="BUGZILLA"/>
		<reference ref_id="1010711" ref_url="https://bugzilla.suse.com/1010711" source="BUGZILLA"/>
		<reference ref_id="1010716" ref_url="https://bugzilla.suse.com/1010716" source="BUGZILLA"/>
		<reference ref_id="1012060" ref_url="https://bugzilla.suse.com/1012060" source="BUGZILLA"/>
		<reference ref_id="1012422" ref_url="https://bugzilla.suse.com/1012422" source="BUGZILLA"/>
		<reference ref_id="1012917" ref_url="https://bugzilla.suse.com/1012917" source="BUGZILLA"/>
		<reference ref_id="1012985" ref_url="https://bugzilla.suse.com/1012985" source="BUGZILLA"/>
		<reference ref_id="1013001" ref_url="https://bugzilla.suse.com/1013001" source="BUGZILLA"/>
		<reference ref_id="1013038" ref_url="https://bugzilla.suse.com/1013038" source="BUGZILLA"/>
		<reference ref_id="1013479" ref_url="https://bugzilla.suse.com/1013479" source="BUGZILLA"/>
		<reference ref_id="1013531" ref_url="https://bugzilla.suse.com/1013531" source="BUGZILLA"/>
		<reference ref_id="1013540" ref_url="https://bugzilla.suse.com/1013540" source="BUGZILLA"/>
		<reference ref_id="1013542" ref_url="https://bugzilla.suse.com/1013542" source="BUGZILLA"/>
		<reference ref_id="1014410" ref_url="https://bugzilla.suse.com/1014410" source="BUGZILLA"/>
		<reference ref_id="1014746" ref_url="https://bugzilla.suse.com/1014746" source="BUGZILLA"/>
		<reference ref_id="1016713" ref_url="https://bugzilla.suse.com/1016713" source="BUGZILLA"/>
		<reference ref_id="1016725" ref_url="https://bugzilla.suse.com/1016725" source="BUGZILLA"/>
		<reference ref_id="1016961" ref_url="https://bugzilla.suse.com/1016961" source="BUGZILLA"/>
		<reference ref_id="1017164" ref_url="https://bugzilla.suse.com/1017164" source="BUGZILLA"/>
		<reference ref_id="1017170" ref_url="https://bugzilla.suse.com/1017170" source="BUGZILLA"/>
		<reference ref_id="1017410" ref_url="https://bugzilla.suse.com/1017410" source="BUGZILLA"/>
		<reference ref_id="1017589" ref_url="https://bugzilla.suse.com/1017589" source="BUGZILLA"/>
		<reference ref_id="1017710" ref_url="https://bugzilla.suse.com/1017710" source="BUGZILLA"/>
		<reference ref_id="1018100" ref_url="https://bugzilla.suse.com/1018100" source="BUGZILLA"/>
		<reference ref_id="1019032" ref_url="https://bugzilla.suse.com/1019032" source="BUGZILLA"/>
		<reference ref_id="1019148" ref_url="https://bugzilla.suse.com/1019148" source="BUGZILLA"/>
		<reference ref_id="1019260" ref_url="https://bugzilla.suse.com/1019260" source="BUGZILLA"/>
		<reference ref_id="1019300" ref_url="https://bugzilla.suse.com/1019300" source="BUGZILLA"/>
		<reference ref_id="1019783" ref_url="https://bugzilla.suse.com/1019783" source="BUGZILLA"/>
		<reference ref_id="1019851" ref_url="https://bugzilla.suse.com/1019851" source="BUGZILLA"/>
		<reference ref_id="1020214" ref_url="https://bugzilla.suse.com/1020214" source="BUGZILLA"/>
		<reference ref_id="1020602" ref_url="https://bugzilla.suse.com/1020602" source="BUGZILLA"/>
		<reference ref_id="1021258" ref_url="https://bugzilla.suse.com/1021258" source="BUGZILLA"/>
		<reference ref_id="856380" ref_url="https://bugzilla.suse.com/856380" source="BUGZILLA"/>
		<reference ref_id="857394" ref_url="https://bugzilla.suse.com/857394" source="BUGZILLA"/>
		<reference ref_id="858727" ref_url="https://bugzilla.suse.com/858727" source="BUGZILLA"/>
		<reference ref_id="921338" ref_url="https://bugzilla.suse.com/921338" source="BUGZILLA"/>
		<reference ref_id="921778" ref_url="https://bugzilla.suse.com/921778" source="BUGZILLA"/>
		<reference ref_id="922052" ref_url="https://bugzilla.suse.com/922052" source="BUGZILLA"/>
		<reference ref_id="922056" ref_url="https://bugzilla.suse.com/922056" source="BUGZILLA"/>
		<reference ref_id="923036" ref_url="https://bugzilla.suse.com/923036" source="BUGZILLA"/>
		<reference ref_id="923037" ref_url="https://bugzilla.suse.com/923037" source="BUGZILLA"/>
		<reference ref_id="924381" ref_url="https://bugzilla.suse.com/924381" source="BUGZILLA"/>
		<reference ref_id="938963" ref_url="https://bugzilla.suse.com/938963" source="BUGZILLA"/>
		<reference ref_id="972993" ref_url="https://bugzilla.suse.com/972993" source="BUGZILLA"/>
		<reference ref_id="980560" ref_url="https://bugzilla.suse.com/980560" source="BUGZILLA"/>
		<reference ref_id="981709" ref_url="https://bugzilla.suse.com/981709" source="BUGZILLA"/>
		<reference ref_id="983087" ref_url="https://bugzilla.suse.com/983087" source="BUGZILLA"/>
		<reference ref_id="983348" ref_url="https://bugzilla.suse.com/983348" source="BUGZILLA"/>
		<reference ref_id="984194" ref_url="https://bugzilla.suse.com/984194" source="BUGZILLA"/>
		<reference ref_id="984419" ref_url="https://bugzilla.suse.com/984419" source="BUGZILLA"/>
		<reference ref_id="985850" ref_url="https://bugzilla.suse.com/985850" source="BUGZILLA"/>
		<reference ref_id="987192" ref_url="https://bugzilla.suse.com/987192" source="BUGZILLA"/>
		<reference ref_id="987576" ref_url="https://bugzilla.suse.com/987576" source="BUGZILLA"/>
		<reference ref_id="990384" ref_url="https://bugzilla.suse.com/990384" source="BUGZILLA"/>
		<reference ref_id="991273" ref_url="https://bugzilla.suse.com/991273" source="BUGZILLA"/>
		<reference ref_id="993739" ref_url="https://bugzilla.suse.com/993739" source="BUGZILLA"/>
		<reference ref_id="997807" ref_url="https://bugzilla.suse.com/997807" source="BUGZILLA"/>
		<reference ref_id="999101" ref_url="https://bugzilla.suse.com/999101" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8962" ref_url="https://www.suse.com/security/cve/CVE-2015-8962/" source="CVE"/>
		<reference ref_id="CVE-2015-8963" ref_url="https://www.suse.com/security/cve/CVE-2015-8963/" source="CVE"/>
		<reference ref_id="CVE-2015-8964" ref_url="https://www.suse.com/security/cve/CVE-2015-8964/" source="CVE"/>
		<reference ref_id="CVE-2016-10088" ref_url="https://www.suse.com/security/cve/CVE-2016-10088/" source="CVE"/>
		<reference ref_id="CVE-2016-7910" ref_url="https://www.suse.com/security/cve/CVE-2016-7910/" source="CVE"/>
		<reference ref_id="CVE-2016-7911" ref_url="https://www.suse.com/security/cve/CVE-2016-7911/" source="CVE"/>
		<reference ref_id="CVE-2016-7913" ref_url="https://www.suse.com/security/cve/CVE-2016-7913/" source="CVE"/>
		<reference ref_id="CVE-2016-7914" ref_url="https://www.suse.com/security/cve/CVE-2016-7914/" source="CVE"/>
		<reference ref_id="CVE-2016-8399" ref_url="https://www.suse.com/security/cve/CVE-2016-8399/" source="CVE"/>
		<reference ref_id="CVE-2016-8633" ref_url="https://www.suse.com/security/cve/CVE-2016-8633/" source="CVE"/>
		<reference ref_id="CVE-2016-8645" ref_url="https://www.suse.com/security/cve/CVE-2016-8645/" source="CVE"/>
		<reference ref_id="CVE-2016-9083" ref_url="https://www.suse.com/security/cve/CVE-2016-9083/" source="CVE"/>
		<reference ref_id="CVE-2016-9084" ref_url="https://www.suse.com/security/cve/CVE-2016-9084/" source="CVE"/>
		<reference ref_id="CVE-2016-9756" ref_url="https://www.suse.com/security/cve/CVE-2016-9756/" source="CVE"/>
		<reference ref_id="CVE-2016-9793" ref_url="https://www.suse.com/security/cve/CVE-2016-9793/" source="CVE"/>
		<reference ref_id="CVE-2016-9806" ref_url="https://www.suse.com/security/cve/CVE-2016-9806/" source="CVE"/>
		<reference ref_id="CVE-2017-2583" ref_url="https://www.suse.com/security/cve/CVE-2017-2583/" source="CVE"/>
		<reference ref_id="CVE-2017-2584" ref_url="https://www.suse.com/security/cve/CVE-2017-2584/" source="CVE"/>
		<reference ref_id="CVE-2017-5551" ref_url="https://www.suse.com/security/cve/CVE-2017-5551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.69 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).
- CVE-2015-8963: Race condition in kernel/events/core.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation (bnc#1010502).
- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).
- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).
- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed (bnc#1010716).
- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call (bnc#1010711).
- CVE-2016-7913: The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure (bnc#1010478).
- CVE-2016-7914: The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel did not check whether a slot is a leaf, which allowed local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) via an application that uses associative-array data structures, as demonstrated by the keyutils test suite (bnc#1010475).
- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935 (bnc#1014746).
- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel, in certain unusual hardware configurations, allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).
- CVE-2016-8645: The TCP stack in the Linux kernel mishandled skb truncation, which allowed local users to cause a denial of service (system crash) via a crafted application that made sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c (bnc#1009969).
- CVE-2016-9083: drivers/vfio/pci/vfio_pci.c in the Linux kernel allowed local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a 'state machine confusion bug' (bnc#1007197).
- CVE-2016-9084: drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel misuses the kzalloc function, which allowed local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file (bnc#1007197).
- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application (bnc#1013038).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531 1013542).
- CVE-2016-9806: Race condition in the netlink_dump function in net/netlink/af_netlink.c in the Linux kernel allowed local users to cause a denial of service (double free) or possibly have unspecified other impact via a crafted application that made sendmsg system calls, leading to a free operation associated with a new dump that started earlier than anticipated (bnc#1013540 1017589).
- CVE-2017-2584: arch/x86/kvm/emulate.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt (bsc#1019851).
- CVE-2017-2583: Fixed broken emulation of 'MOV SS, null selector' (bsc#1020602).
- CVE-2017-5551: Clear SGID bit when setting file permissions on tmpfs (bsc#1021258).


The following non-security bugs were fixed:

- Fixup acl reference leak and missing conversions in ext3, gfs2, jfs, hfsplus 
- RAID1: ignore discard error (bsc#1017164).
- Update patches.suse/btrfs-8446-fix-qgroup-accounting-when-creating-snap.patch (bsc#972993).
- blacklist: PCI fixes required only for cxl (bsc#1016713).
- blacklist: cxl fixes on SLE12 SP1 (bsc#1016725)
- blacklist: ibmvnic fixes on SLE12 SP1 (bsc#1016961)
- block_dev: do not test bdev-&gt;bd_contains when it is not stable (bsc#1008557).
- bna: Add synchronization for tx ring (bsc#993739).
- bnx2i/bnx2fc : fix randconfig error in next-20140909 (bsc#922052 fate#318602 bsc#922056 FATE#318604).
- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).
- bnx2x: fix lockdep splat (bsc#922052 fate#318602 bsc#922056 FATE#318604).
- btrfs: Ensure proper sector alignment for btrfs_free_reserved_data_space (bsc#1005666).
- btrfs: Export and move leaf/subtree qgroup helpers to qgroup.c (bsc#983087).
- btrfs: Revert 'Btrfs: do not delay inode ref updates during log replay' (bsc#987192).
- btrfs: bugfix: handle FS_IOC32_{GETFLAGS,SETFLAGS,GETVERSION} in btrfs_ioctl (bsc#1018100).
- btrfs: do not delay inode ref updates during log replay (bsc#987192).
- btrfs: fix incremental send failure caused by balance (bsc#985850).
- btrfs: fix relocation incorrectly dropping data references (bsc#990384).
- btrfs: increment ctx-&gt;pos for every emitted or skipped dirent in readdir (bsc#981709).
- btrfs: qgroup: Fix qgroup data leaking by using subtree tracing (bsc#983087).
- btrfs: remove old tree_root dirent processing in btrfs_real_readdir() (bsc#981709).
- btrfs: send, do not bug on inconsistent snapshots (bsc#985850).
- cpufreq: intel_pstate: Fix divide by zero on Knights Landing (KNL) (bsc#1008876).
- ext4: fix data exposure after a crash (bsc#1012985).
- fs: avoid including 'mountproto=' with no protocol in /proc/mounts (bsc#1019260).
- fuse: do not use iocb after it may have been freed (bsc#1012985).
- hpilo: Add support for iLO5 (bsc#999101).
- ib/core: Avoid unsigned int overflow in sg_alloc_table (bsc#924381 FATE#318568 bsc#921338).
- ib/mlx5: Fix FW version diaplay in sysfs (bnc#923036 FATE#318772).
- ib/mlx5: Fix entries check in mlx5_ib_resize_cq (bnc#858727 FATE#315946).
- ib/mlx5: Fix entries checks in mlx5_ib_create_cq (bnc#858727 FATE#315946).
- ib/mlx5: Remove per-MR pas and dma pointers (bnc#923036 FATE#318772).
- ibmveth: calculate gso_segs for large packets (bsc#1019148).
- ibmveth: check return of skb_linearize in ibmveth_start_xmit (bsc#1019148).
- ibmveth: consolidate kmalloc of array, memset 0 to kcalloc (bsc#1019148).
- ibmveth: set correct gso_size and gso_type (bsc#1019148).
- igb: Fix oops caused by missing queue pairing (bnc#857394).
- ipmi_si: create hardware-independent softdep for ipmi_devintf (bsc#1009062).
- ipr: Enable SIS pipe commands for SIS-32 devices (bsc#1016961).
- ipv4: Fix ip_queue_xmit to pass sk into ip_local_out_sk (bsc#938963 FATE#319084).
- kabi fix (bsc#1014410).
- kabi: Whitelist KVM KABI changes resulting from adding a hcall.  caused by 5246adec59458b5d325b8e1462ea9ef3ead7f6ae  powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec No problem is expected as result of changing KVM KABI so whitelisting for now. If we get some additional input from IBM we can back out the patch.
- kabi: protect __sk_mem_reclaim (kabi).
- kabi: protect struct perf_event_context (kabi).
- kabi: reintroduce sk_filter (kabi).
- kbuild: Fix removal of the debian/ directory (bsc#1010213).
- kernel: remove broken memory detection sanity check (bnc#1008567, LTC#148072).
- kgr: ignore zombie tasks during the patching (bnc#1008979).
- kgraft/iscsi-target: Do not block kGraft in iscsi_np kthread (bsc#1010612).
- kgraft/xen: Do not block kGraft in xenbus kthread (bsc#1017410).
- move the call of __d_drop(anon) into __d_materialise_unique(dentry, anon) (bsc#984194).
- net/mlx5: Avoid passing dma address 0 to firmware (bnc#858727 FATE#315946).
- net/mlx5: Fix typo in mlx5_query_port_pvlc (bnc#923036 FATE#318772).
- net/mlx5e: Do not modify CQ before it was created (bnc#923036 FATE#318772).
- net/mlx5e: Do not try to modify CQ moderation if it is not supported (bnc#923036 FATE#318772).
- net/mlx5e: Fix MLX5E_100BASE_T define (bnc#923036 FATE#318772).
- net/mlx5e: Remove wrong poll CQ optimization (bnc#923036 FATE#318772).
- netback: correct array index (bsc#983348).
- nfsv4: Cap the transport reconnection timer at 1/2 lease period (bsc#1014410).
- nfsv4: Cleanup the setting of the nfs4 lease period (bsc#1014410).
- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).
- powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec (bsc#1003813).
- reiserfs: fix race in prealloc discard (bsc#987576).
- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)
- rpm/kernel-spec-macros: Fix the check if there is no rebuild counter (bsc#1012060)
- rpm/kernel-spec-macros: Ignore too high rebuild counter (bsc#1012060)
- serial: 8250_pci: Detach low-level driver during PCI error recovery (bsc#1013001).
- serial: 8250_pci: Fix potential use-after-free in error path (bsc#1013001).
- sfc: clear napi_hash state when copying channels (bsc#923037 FATE#318563).
- sfc: fix potential stack corruption from running past stat bitmask (bsc#923037 FATE#318563).
- sfc: on MC reset, clear PIO buffer linkage in TXQs (bnc#856380 FATE#315942).
- sunrpc: Enforce an upper limit on the number of cached credentials (bsc#1012917).
- sunrpc: Fix reconnection timeouts (bsc#1014410).
- sunrpc: Limit the reconnect backoff timer to the max RPC message timeout (bsc#1014410).
- supported.conf: Add lib/*.ko to supported.conf (bsc#1019032)
- target: Make EXTENDED_COPY 0xe4 failure return COPY TARGET DEVICE NOT REACHABLE (bsc#991273).
- target: add XCOPY target/segment desc sense codes (bsc#991273).
- target: bounds check XCOPY segment descriptor list (bsc#991273).
- target: bounds check XCOPY total descriptor list length (bsc#991273).
- target: check XCOPY segment descriptor CSCD IDs (bsc#1017170).
- target: check for XCOPY parameter truncation (bsc#991273).
- target: return UNSUPPORTED TARGET/SEGMENT DESC TYPE CODE sense (bsc#991273).
- target: simplify XCOPY wwn-&gt;se_dev lookup helper (bsc#991273).
- target: support XCOPY requests without parameters (bsc#991273).
- target: use XCOPY TOO MANY TARGET DESCRIPTORS sense (bsc#991273).
- target: use XCOPY segment descriptor CSCD IDs (bsc#1017170).
- tg3: Avoid NULL pointer dereference in tg3_io_error_detected() (bsc#921778 FATE#318558).
- tty: Prevent ldisc drivers from re-using stale tty fields (bnc#1010507).
- x86/apic: Order irq_enter/exit() calls correctly vs. ack_APIC_irq() (bsc#1013479).
- xen/ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).
- xenbus: correctly signal errors from xenstored_local_init() (luckily none so far).
- xfs: allow lazy sb counter sync during filesystem freeze sequence (bsc#980560).
- xfs: refactor xlog_recover_process_data() (bsc#1019300).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-14"/>
	<updated date="2017-02-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1003813">SUSE bug 1003813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005666">SUSE bug 1005666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007197">SUSE bug 1007197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008557">SUSE bug 1008557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008567">SUSE bug 1008567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008833">SUSE bug 1008833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008876">SUSE bug 1008876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008979">SUSE bug 1008979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009062">SUSE bug 1009062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009969">SUSE bug 1009969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010040">SUSE bug 1010040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010213">SUSE bug 1010213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010294">SUSE bug 1010294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010475">SUSE bug 1010475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010478">SUSE bug 1010478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010501">SUSE bug 1010501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010502">SUSE bug 1010502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010507">SUSE bug 1010507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010612">SUSE bug 1010612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010711">SUSE bug 1010711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010716">SUSE bug 1010716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012060">SUSE bug 1012060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012422">SUSE bug 1012422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012917">SUSE bug 1012917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012985">SUSE bug 1012985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013001">SUSE bug 1013001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013038">SUSE bug 1013038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013479">SUSE bug 1013479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013531">SUSE bug 1013531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013540">SUSE bug 1013540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013542">SUSE bug 1013542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014410">SUSE bug 1014410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014746">SUSE bug 1014746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016713">SUSE bug 1016713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016725">SUSE bug 1016725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016961">SUSE bug 1016961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017164">SUSE bug 1017164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017170">SUSE bug 1017170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017410">SUSE bug 1017410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017589">SUSE bug 1017589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017710">SUSE bug 1017710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018100">SUSE bug 1018100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019032">SUSE bug 1019032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019148">SUSE bug 1019148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019260">SUSE bug 1019260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019300">SUSE bug 1019300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019783">SUSE bug 1019783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019851">SUSE bug 1019851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020214">SUSE bug 1020214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020602">SUSE bug 1020602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021258">SUSE bug 1021258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856380">SUSE bug 856380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857394">SUSE bug 857394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858727">SUSE bug 858727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921338">SUSE bug 921338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921778">SUSE bug 921778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922052">SUSE bug 922052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922056">SUSE bug 922056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923036">SUSE bug 923036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923037">SUSE bug 923037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924381">SUSE bug 924381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938963">SUSE bug 938963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972993">SUSE bug 972993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980560">SUSE bug 980560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981709">SUSE bug 981709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983087">SUSE bug 983087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983348">SUSE bug 983348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984194">SUSE bug 984194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984419">SUSE bug 984419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985850">SUSE bug 985850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987192">SUSE bug 987192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987576">SUSE bug 987576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990384">SUSE bug 990384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991273">SUSE bug 991273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993739">SUSE bug 993739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997807">SUSE bug 997807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999101">SUSE bug 999101</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8962/">CVE-2015-8962</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8963/">CVE-2015-8963</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-8964/">CVE-2015-8964</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10088/">CVE-2016-10088</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7910/">CVE-2016-7910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7911/">CVE-2016-7911</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7913/">CVE-2016-7913</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-7914/">CVE-2016-7914</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8399/">CVE-2016-8399</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8633/">CVE-2016-8633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8645/">CVE-2016-8645</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9083/">CVE-2016-9083</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9084/">CVE-2016-9084</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9756/">CVE-2016-9756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9793/">CVE-2016-9793</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9806/">CVE-2016-9806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2583/">CVE-2017-2583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2584/">CVE-2017-2584</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5551/">CVE-2017-5551</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517096" comment="kernel-default-3.12.69-60.64.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517097" comment="kernel-default-devel-3.12.69-60.64.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517098" comment="kernel-default-extra-3.12.69-60.64.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517099" comment="kernel-devel-3.12.69-60.64.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517100" comment="kernel-macros-3.12.69-60.64.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517101" comment="kernel-source-3.12.69-60.64.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517102" comment="kernel-syms-3.12.69-60.64.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517103" comment="kernel-xen-3.12.69-60.64.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517104" comment="kernel-xen-devel-3.12.69-60.64.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77737" version="1" class="patch">
	<metadata>
		<title>Security update for libXpm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1021315" ref_url="https://bugzilla.suse.com/1021315" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10164" ref_url="https://www.suse.com/security/cve/CVE-2016-10164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002644.html" source="SUSE-SU"/>
		<description>

This update for libXpm fixes the following issues:

- A heap overflow in XPM handling could be used by attackers supplying XPM files to 
  crash or potentially execute code. (bsc#1021315)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-15"/>
	<updated date="2017-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1021315">SUSE bug 1021315</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10164/">CVE-2016-10164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517105" comment="libXpm4-3.5.11-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517106" comment="libXpm4-32bit-3.5.11-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77738" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1022263" ref_url="https://bugzilla.suse.com/1022263" source="BUGZILLA"/>
		<reference ref_id="1022264" ref_url="https://bugzilla.suse.com/1022264" source="BUGZILLA"/>
		<reference ref_id="1022265" ref_url="https://bugzilla.suse.com/1022265" source="BUGZILLA"/>
		<reference ref_id="1022283" ref_url="https://bugzilla.suse.com/1022283" source="BUGZILLA"/>
		<reference ref_id="1022284" ref_url="https://bugzilla.suse.com/1022284" source="BUGZILLA"/>
		<reference ref_id="1022553" ref_url="https://bugzilla.suse.com/1022553" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10166" ref_url="https://www.suse.com/security/cve/CVE-2016-10166/" source="CVE"/>
		<reference ref_id="CVE-2016-10167" ref_url="https://www.suse.com/security/cve/CVE-2016-10167/" source="CVE"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<reference ref_id="CVE-2016-6906" ref_url="https://www.suse.com/security/cve/CVE-2016-6906/" source="CVE"/>
		<reference ref_id="CVE-2016-6912" ref_url="https://www.suse.com/security/cve/CVE-2016-6912/" source="CVE"/>
		<reference ref_id="CVE-2016-9317" ref_url="https://www.suse.com/security/cve/CVE-2016-9317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002645.html" source="SUSE-SU"/>
		<description>

This update for gd fixes the following security issues:

- CVE-2016-6906: An out-of-bounds read in TGA decompression was fixed which could have lead to crashes. (bsc#1022553)
- CVE-2016-6912: Double free vulnerability in the gdImageWebPtr function
  in the GD Graphics Library (aka libgd) allowed remote attackers to have
  unspecified impact via large width and height values. (bsc#1022284)
- CVE-2016-9317: The gdImageCreate function in the GD Graphics Library
  (aka libgd) allowed remote attackers to cause a denial of service
  (system hang) via an oversized image.  (bsc#1022283)
- CVE-2016-10166: A potential unsigned underflow in gd interpolation
  functions could lead to memory corruption in the GD Graphics Library (aka libgd) (bsc#1022263)
- CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx()
  could lead to libgd running out of memory even on small files. (bsc#1022264)
- CVE-2016-10168: A signed integer overflow in the GD Graphics Library (aka libgd) could lead
  to memory corruption (bsc#1022265)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-15"/>
	<updated date="2017-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022263">SUSE bug 1022263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022264">SUSE bug 1022264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022265">SUSE bug 1022265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022283">SUSE bug 1022283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022284">SUSE bug 1022284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022553">SUSE bug 1022553</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10166/">CVE-2016-10166</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10167/">CVE-2016-10167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6906/">CVE-2016-6906</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6912/">CVE-2016-6912</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9317/">CVE-2016-9317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517107" comment="gd-2.1.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517108" comment="gd-32bit-2.1.0-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77739" version="1" class="patch">
	<metadata>
		<title>Security update for ppp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="927841" ref_url="https://bugzilla.suse.com/927841" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3310" ref_url="https://www.suse.com/security/cve/CVE-2015-3310/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002649.html" source="SUSE-SU"/>
		<description>
The ppp package was updated to fix the following security issue:

- CVE-2015-3310: Fixed a buffer overflow in radius plug-in's rc_mksid() (bsc#927841).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-15"/>
	<updated date="2017-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/927841">SUSE bug 927841</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3310/">CVE-2015-3310</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517109" comment="ppp-2.4.7-3.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77740" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1020905" ref_url="https://bugzilla.suse.com/1020905" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-5546" ref_url="https://www.suse.com/security/cve/CVE-2016-5546/" source="CVE"/>
		<reference ref_id="CVE-2016-5547" ref_url="https://www.suse.com/security/cve/CVE-2016-5547/" source="CVE"/>
		<reference ref_id="CVE-2016-5548" ref_url="https://www.suse.com/security/cve/CVE-2016-5548/" source="CVE"/>
		<reference ref_id="CVE-2016-5549" ref_url="https://www.suse.com/security/cve/CVE-2016-5549/" source="CVE"/>
		<reference ref_id="CVE-2016-5552" ref_url="https://www.suse.com/security/cve/CVE-2016-5552/" source="CVE"/>
		<reference ref_id="CVE-2017-3231" ref_url="https://www.suse.com/security/cve/CVE-2017-3231/" source="CVE"/>
		<reference ref_id="CVE-2017-3241" ref_url="https://www.suse.com/security/cve/CVE-2017-3241/" source="CVE"/>
		<reference ref_id="CVE-2017-3252" ref_url="https://www.suse.com/security/cve/CVE-2017-3252/" source="CVE"/>
		<reference ref_id="CVE-2017-3253" ref_url="https://www.suse.com/security/cve/CVE-2017-3253/" source="CVE"/>
		<reference ref_id="CVE-2017-3259" ref_url="https://www.suse.com/security/cve/CVE-2017-3259/" source="CVE"/>
		<reference ref_id="CVE-2017-3260" ref_url="https://www.suse.com/security/cve/CVE-2017-3260/" source="CVE"/>
		<reference ref_id="CVE-2017-3261" ref_url="https://www.suse.com/security/cve/CVE-2017-3261/" source="CVE"/>
		<reference ref_id="CVE-2017-3272" ref_url="https://www.suse.com/security/cve/CVE-2017-3272/" source="CVE"/>
		<reference ref_id="CVE-2017-3289" ref_url="https://www.suse.com/security/cve/CVE-2017-3289/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_0-openjdk fixes the following issues:

- Oracle Critical Patch Update of January 2017 to OpenJDK 7u131 (bsc#1020905):
  * Security Fixes
    - S8138725: Add options for Javadoc generation
    - S8140353: Improve signature checking
    - S8151934, CVE-2017-3231: Resolve class resolution
    - S8156804, CVE-2017-3241: Better constraint checking
    - S8158406: Limited Parameter Processing
    - S8158997: JNDI Protocols Switch
    - S8159507: RuntimeVisibleAnnotation validation
    - S8161218: Better bytecode loading
    - S8161743, CVE-2017-3252: Provide proper login context
    - S8162577: Standardize logging levels
    - S8162973: Better component components
    - S8164143, CVE-2017-3260: Improve components for menu items
    - S8164147, CVE-2017-3261: Improve streaming socket output
    - S8165071, CVE-2016-2183: Expand TLS support
    - S8165344, CVE-2017-3272: Update concurrency support
    - S8166988, CVE-2017-3253: Improve image processing performance
    - S8167104, CVE-2017-3289: Additional class construction refinements
    - S8167223, CVE-2016-5552: URL handling improvements
    - S8168705, CVE-2016-5547: Better ObjectIdentifier validation
    - S8168714, CVE-2016-5546: Tighten ECDSA validation
    - S8168728, CVE-2016-5548: DSA signing improvments
    - S8168724, CVE-2016-5549: ECDSA signing improvments
    - S6253144: Long narrowing conversion should describe the algorithm used and implied 'risks'
    - S6328537: Improve javadocs for Socket class by adding references to SocketOptions
    - S6978886: javadoc shows stacktrace after print error resulting from disk full
    - S6995421: Eliminate the static dependency to sun.security.ec.ECKeyFactory
    - S6996372: synchronizing handshaking hash
    - S7027045: (doc) java/awt/Window.java has several typos in javadoc
    - S7054969: Null-check-in-finally pattern in java/security documentation
    - S7072353: JNDI libraries do not build with javac -Xlint:all -Werror
    - S7075563: Broken link in 'javax.swing.SwingWorker'
    - S7077672: jdk8_tl nightly fail in step-2 build on 8/10/11
    - S7088502: Security libraries don't build with javac -Werror
    - S7092447: Clarify the default locale used in each locale sensitive operation
    - S7093640: Enable client-side TLS 1.2 by default
    - S7103570: AtomicIntegerFieldUpdater does not work when SecurityManager is installed
    - S7117360: Warnings in java.util.concurrent.atomic package
    - S7117465: Warning cleanup for IMF classes
    - S7187144: JavaDoc for ScriptEngineFactory.getProgram() contains an error
    - S8000418: javadoc should used a standard 'generated by javadoc' string
    - S8000666: javadoc should write directly to Writer instead of composing strings
    - S8000673: remove dead code from HtmlWriter and subtypes
    - S8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
    - S8001669: javadoc internal DocletAbortException should set cause when appropriate
    - S8008949: javadoc stopped copying doc-files
    - S8011402: Move blacklisting certificate logic from hard code to data
    - S8011547: Update XML Signature implementation to Apache Santuario 1.5.4
    - S8012288: XML DSig API allows wrong tag names and extra elements in SignedInfo
    - S8016217: More javadoc warnings
    - S8017325: Cleanup of the javadoc &lt;code&gt; tag in java.security.cert
    - S8017326: Cleanup of the javadoc &lt;code&gt; tag in java.security.spec
    - S8019772: Fix doclint issues in javax.crypto and javax.security subpackages
    - S8020557: javadoc cleanup in javax.security
    - S8020688: Broken links in documentation at http://docs.oracle.com/javase/6/docs/api/index.
    - S8021108: Clean up doclint warnings and errors in java.text package
    - S8021417: Fix doclint issues in java.util.concurrent
    - S8021833: javadoc cleanup in java.net
    - S8022120: JCK test api/javax_xml/crypto/dsig/TransformService/index_ParamMethods fails
    - S8022175: Fix doclint warnings in javax.print
    - S8022406: Fix doclint issues in java.beans
    - S8022746: List of spelling errors in API doc
    - S8024779: [macosx] SwingNode crashes on exit
    - S8025085: [javadoc] some errors in javax/swing
    - S8025218: [javadoc] some errors in java/awt classes
    - S8025249: [javadoc] fix some javadoc errors in javax/swing/
    - S8025409: Fix javadoc comments errors and warning reported by doclint report
    - S8026021: more fix of javadoc errors and warnings reported by doclint, see the description
    - S8037099: [macosx] Remove all references to GC from native OBJ-C code
    - S8038184: XMLSignature throws StringIndexOutOfBoundsException if ID attribute value is empty String
    - S8038349: Signing XML with DSA throws Exception when key is larger than 1024 bits
    - S8049244: XML Signature performance issue caused by unbuffered signature data
    - S8049432: New tests for TLS property jdk.tls.client.protocols
    - S8050893: (smartcardio) Invert reset argument in tests in sun/security/smartcardio
    - S8059212: Modify regression tests so that they do not just fail if no cardreader found
    - S8068279: (typo in the spec) javax.script.ScriptEngineFactory.getLanguageName
    - S8068491: Update the protocol for references of docs.oracle.com to HTTPS.
    - S8069038: javax/net/ssl/TLS/TLSClientPropertyTest.java needs to be updated for JDK-8061210
    - S8076369: Introduce the jdk.tls.client.protocols system property for JDK 7u
    - S8139565: Restrict certificates with DSA keys less than 1024 bits
    - S8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions
    - S8140587: Atomic*FieldUpdaters should use Class.isInstance instead of direct class check
    - S8143959: Certificates requiring blacklisting
    - S8145984: [macosx] sun.lwawt.macosx.CAccessible leaks
    - S8148516: Improve the default strength of EC in JDK
    - S8149029: Secure validation of XML based digital signature always enabled when checking wrapping attacks
    - S8151893: Add security property to configure XML Signature secure validation mode
    - S8155760: Implement Serialization Filtering
    - S8156802: Better constraint checking
    - S8161228: URL objects with custom protocol handlers have port changed after deserializing
    - S8161571: Verifying ECDSA signatures permits trailing bytes
    - S8163304: jarsigner -verbose -verify should print the algorithms used to sign the jar
    - S8164908: ReflectionFactory support for IIOP and custom serialization
    - S8165230: RMIConnection addNotificationListeners failing with specific inputs
    - S8166393: disabledAlgorithms property should not be strictly parsed
    - S8166591: [macos 10.12] Trackpad scrolling of text on OS X 10.12 Sierra is very fast (Trackpad, Retina only)
    - S8166739: Improve extensibility of ObjectInputFilter information passed to the filter
    - S8166875: (tz) Support tzdata2016g
    - S8166878: Connection reset during TLS handshake
    - S8167356: Follow up fix for jdk8 backport of 8164143. Changes for CMenuComponent.m were missed
    - S8167459: Add debug output for indicating if a chosen ciphersuite was legacy
    - S8167472: Chrome interop regression with JDK-8148516
    - S8167591: Add MD5 to signed JAR restrictions
    - S8168861: AnchorCertificates uses hardcoded password for cacerts keystore
    - S8168993: JDK8u121 L10n resource file update
    - S8169191: (tz) Support tzdata2016i
    - S8169688: Backout (remove) MD5 from jdk.jar.disabledAlgorithms for January CPU
    - S8169911: Enhanced tests for jarsigner -verbose -verify after JDK-8163304
    - S8170131: Certificates not being blocked by jdk.tls.disabledAlgorithms property
    - S8170268: 8u121 L10n resource file update - msgdrop 20
    - S8173622: Backport of 7180907 is incomplete
    - S8173849: Fix use of java.util.Base64 in test cases
    - S8173854: [TEST] Update DHEKeySizing test case following 8076328 &amp; 8081760
    - CVE-2017-3259 Vulnerability allows unauthenticated attacker with network access via multiple protocols to
      compromise Java SE.
  * Backports
    - S7102489, PR3316, RH1390708: RFE: cleanup jlong typedef on __APPLE__and _LLP64 systems.
    - S8000351, PR3316, RH1390708: Tenuring threshold should be unsigned
    - S8153711, PR3315, RH1284948: [REDO] GlobalRefs never deleted when processing invokeMethod command
    - S8170888, PR3316, RH1390708: [linux] support for cgroup memory limits in container (ie Docker) environments
  * Bug fixes
    - PR3318: Replace 'infinality' with 'improved font rendering' (--enable-improved-font-rendering)
    - PR3318: Fix compatibility with vanilla Fontconfig
    - PR3318: Fix glyph y advance
    - PR3318: Always round glyph advance in 26.6 space
    - PR3318: Simplify glyph advance handling
    - PR3324: Fix NSS_LIBDIR substitution in make_generic_profile.sh broken by PR1989
  * AArch64 port
    - S8165673, PR3320: AArch64: Fix JNI floating point argument handling
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-17"/>
	<updated date="2017-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5546/">CVE-2016-5546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5547/">CVE-2016-5547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5548/">CVE-2016-5548</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5549/">CVE-2016-5549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5552/">CVE-2016-5552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3231/">CVE-2017-3231</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3241/">CVE-2017-3241</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3252/">CVE-2017-3252</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3253/">CVE-2017-3253</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3259/">CVE-2017-3259</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3260/">CVE-2017-3260</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3261/">CVE-2017-3261</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3272/">CVE-2017-3272</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3289/">CVE-2017-3289</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517110" comment="java-1_7_0-openjdk-1.7.0.131-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517111" comment="java-1_7_0-openjdk-headless-1.7.0.131-39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77741" version="1" class="patch">
	<metadata>
		<title>Security update for tigervnc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1019274" ref_url="https://bugzilla.suse.com/1019274" source="BUGZILLA"/>
		<reference ref_id="1023012" ref_url="https://bugzilla.suse.com/1023012" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10207" ref_url="https://www.suse.com/security/cve/CVE-2016-10207/" source="CVE"/>
		<reference ref_id="CVE-2016-9941" ref_url="https://www.suse.com/security/cve/CVE-2016-9941/" source="CVE"/>
		<reference ref_id="CVE-2016-9942" ref_url="https://www.suse.com/security/cve/CVE-2016-9942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002656.html" source="SUSE-SU"/>
		<description>

This update for tigervnc provides the following fixes:

- Prevent malicious server from crashing a server via a buffer overflow, a similar flaw as the LibVNCServer issues CVE-2016-9941 and CVE-2016-9942.. (bsc#1019274)
- CVE-2016-10207: Prevent potential crash due to insufficient clean-up after failure to establish TLS
  connection. (bsc#1023012)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-20"/>
	<updated date="2017-02-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1019274">SUSE bug 1019274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023012">SUSE bug 1023012</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10207/">CVE-2016-10207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9941/">CVE-2016-9941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9942/">CVE-2016-9942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517112" comment="tigervnc-1.4.3-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517113" comment="xorg-x11-Xvnc-1.4.3-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77742" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1020048" ref_url="https://bugzilla.suse.com/1020048" source="BUGZILLA"/>
		<reference ref_id="1024938" ref_url="https://bugzilla.suse.com/1024938" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5970" ref_url="https://www.suse.com/security/cve/CVE-2017-5970/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00033.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP1 kernel was updated to fix the following two issues:

- CVE-2017-5970: Remote attackers could have potentially caused a denial of service by sending
 bad IP options on a socket (bsc#1024938)
- Fix a regression in MD RAID1 which could have caused wrong data to be read (bsc#1020048)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-20"/>
	<updated date="2017-02-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020048">SUSE bug 1020048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024938">SUSE bug 1024938</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5970/">CVE-2017-5970</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517114" comment="kernel-default-3.12.69-60.64.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517115" comment="kernel-default-devel-3.12.69-60.64.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517116" comment="kernel-default-extra-3.12.69-60.64.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517117" comment="kernel-devel-3.12.69-60.64.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517118" comment="kernel-macros-3.12.69-60.64.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517119" comment="kernel-source-3.12.69-60.64.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517120" comment="kernel-syms-3.12.69-60.64.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517121" comment="kernel-xen-3.12.69-60.64.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517122" comment="kernel-xen-devel-3.12.69-60.64.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77743" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1025258" ref_url="https://bugzilla.suse.com/1025258" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2982" ref_url="https://www.suse.com/security/cve/CVE-2017-2982/" source="CVE"/>
		<reference ref_id="CVE-2017-2985" ref_url="https://www.suse.com/security/cve/CVE-2017-2985/" source="CVE"/>
		<reference ref_id="CVE-2017-2986" ref_url="https://www.suse.com/security/cve/CVE-2017-2986/" source="CVE"/>
		<reference ref_id="CVE-2017-2987" ref_url="https://www.suse.com/security/cve/CVE-2017-2987/" source="CVE"/>
		<reference ref_id="CVE-2017-2988" ref_url="https://www.suse.com/security/cve/CVE-2017-2988/" source="CVE"/>
		<reference ref_id="CVE-2017-2990" ref_url="https://www.suse.com/security/cve/CVE-2017-2990/" source="CVE"/>
		<reference ref_id="CVE-2017-2991" ref_url="https://www.suse.com/security/cve/CVE-2017-2991/" source="CVE"/>
		<reference ref_id="CVE-2017-2992" ref_url="https://www.suse.com/security/cve/CVE-2017-2992/" source="CVE"/>
		<reference ref_id="CVE-2017-2993" ref_url="https://www.suse.com/security/cve/CVE-2017-2993/" source="CVE"/>
		<reference ref_id="CVE-2017-2994" ref_url="https://www.suse.com/security/cve/CVE-2017-2994/" source="CVE"/>
		<reference ref_id="CVE-2017-2995" ref_url="https://www.suse.com/security/cve/CVE-2017-2995/" source="CVE"/>
		<reference ref_id="CVE-2017-2996" ref_url="https://www.suse.com/security/cve/CVE-2017-2996/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00034.html" source="SUSE-SU"/>
		<description>

The Adobe flash-player was updated to 24.0.0.221 to fix the following issues:

Security update to 24.0.0.221 (bsc#1025258), fixing the following
  vulnerabilities advised under APSB17-04:

* type confusion vulnerability that could lead to code execution (CVE-2017-2995).
* integer overflow vulnerability that could lead to code execution (CVE-2017-2987).
* use-after-free vulnerabilities that could lead to code execution (CVE-2017-2982, CVE-2017-2985, CVE-2017-2993, CVE-2017-2994).
* heap buffer overflow vulnerabilities that could lead to code execution (CVE-2017- 2984, CVE-2017-2986, CVE-2017-2992).
* memory corruption vulnerabilities that could lead to code execution (CVE-2017-2988, CVE-2017-2990, CVE-2017-2991, CVE-2017-2996).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-20"/>
	<updated date="2017-02-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1025258">SUSE bug 1025258</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-2982/">CVE-2017-2982</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-2985/">CVE-2017-2985</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-2986/">CVE-2017-2986</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-2987/">CVE-2017-2987</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-2988/">CVE-2017-2988</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-2990/">CVE-2017-2990</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-2991/">CVE-2017-2991</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-2992/">CVE-2017-2992</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-2993/">CVE-2017-2993</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-2994/">CVE-2017-2994</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-2995/">CVE-2017-2995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-2996/">CVE-2017-2996</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517123" comment="flash-player-24.0.0.221-158.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517124" comment="flash-player-gnome-24.0.0.221-158.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77744" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1010977" ref_url="https://bugzilla.suse.com/1010977" source="BUGZILLA"/>
		<reference ref_id="1010979" ref_url="https://bugzilla.suse.com/1010979" source="BUGZILLA"/>
		<reference ref_id="1011830" ref_url="https://bugzilla.suse.com/1011830" source="BUGZILLA"/>
		<reference ref_id="1012530" ref_url="https://bugzilla.suse.com/1012530" source="BUGZILLA"/>
		<reference ref_id="1015993" ref_url="https://bugzilla.suse.com/1015993" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8654" ref_url="https://www.suse.com/security/cve/CVE-2016-8654/" source="CVE"/>
		<reference ref_id="CVE-2016-9395" ref_url="https://www.suse.com/security/cve/CVE-2016-9395/" source="CVE"/>
		<reference ref_id="CVE-2016-9398" ref_url="https://www.suse.com/security/cve/CVE-2016-9398/" source="CVE"/>
		<reference ref_id="CVE-2016-9560" ref_url="https://www.suse.com/security/cve/CVE-2016-9560/" source="CVE"/>
		<reference ref_id="CVE-2016-9591" ref_url="https://www.suse.com/security/cve/CVE-2016-9591/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00008.html" source="SUSE-SU"/>
		<description>

This update for jasper fixes the following issues:

- CVE-2016-8654: Heap-based buffer overflow in QMFB code in JPC codec. (bsc#1012530)
- CVE-2016-9395: Invalid jasper files could lead to abort of the library caused by attacker provided image. (bsc#1010977)
- CVE-2016-9398: Invalid jasper files could lead to abort of the library caused by attacker provided image. (bsc#1010979)
- CVE-2016-9560: Stack-based buffer overflow in jpc_tsfb_getbands2. (bsc#1011830)
- CVE-2016-9591: Use-after-free on heap in jas_matrix_destroy. (bsc#1015993)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-08"/>
	<updated date="2017-01-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010977">SUSE bug 1010977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010979">SUSE bug 1010979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011830">SUSE bug 1011830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012530">SUSE bug 1012530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015993">SUSE bug 1015993</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8654/">CVE-2016-8654</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9395/">CVE-2016-9395</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9398/">CVE-2016-9398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9560/">CVE-2016-9560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9591/">CVE-2016-9591</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517125" comment="libjasper1-1.900.14-184.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517126" comment="libjasper1-32bit-1.900.14-184.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77745" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1017308" ref_url="https://bugzilla.suse.com/1017308" source="BUGZILLA"/>
		<reference ref_id="1017310" ref_url="https://bugzilla.suse.com/1017310" source="BUGZILLA"/>
		<reference ref_id="1017311" ref_url="https://bugzilla.suse.com/1017311" source="BUGZILLA"/>
		<reference ref_id="1017312" ref_url="https://bugzilla.suse.com/1017312" source="BUGZILLA"/>
		<reference ref_id="1017313" ref_url="https://bugzilla.suse.com/1017313" source="BUGZILLA"/>
		<reference ref_id="1017314" ref_url="https://bugzilla.suse.com/1017314" source="BUGZILLA"/>
		<reference ref_id="1017318" ref_url="https://bugzilla.suse.com/1017318" source="BUGZILLA"/>
		<reference ref_id="1017319" ref_url="https://bugzilla.suse.com/1017319" source="BUGZILLA"/>
		<reference ref_id="1017320" ref_url="https://bugzilla.suse.com/1017320" source="BUGZILLA"/>
		<reference ref_id="1017321" ref_url="https://bugzilla.suse.com/1017321" source="BUGZILLA"/>
		<reference ref_id="1017322" ref_url="https://bugzilla.suse.com/1017322" source="BUGZILLA"/>
		<reference ref_id="1017324" ref_url="https://bugzilla.suse.com/1017324" source="BUGZILLA"/>
		<reference ref_id="1017325" ref_url="https://bugzilla.suse.com/1017325" source="BUGZILLA"/>
		<reference ref_id="1017326" ref_url="https://bugzilla.suse.com/1017326" source="BUGZILLA"/>
		<reference ref_id="1017421" ref_url="https://bugzilla.suse.com/1017421" source="BUGZILLA"/>
		<reference ref_id="1020433" ref_url="https://bugzilla.suse.com/1020433" source="BUGZILLA"/>
		<reference ref_id="1020435" ref_url="https://bugzilla.suse.com/1020435" source="BUGZILLA"/>
		<reference ref_id="1020436" ref_url="https://bugzilla.suse.com/1020436" source="BUGZILLA"/>
		<reference ref_id="1020439" ref_url="https://bugzilla.suse.com/1020439" source="BUGZILLA"/>
		<reference ref_id="1020441" ref_url="https://bugzilla.suse.com/1020441" source="BUGZILLA"/>
		<reference ref_id="1020443" ref_url="https://bugzilla.suse.com/1020443" source="BUGZILLA"/>
		<reference ref_id="1020446" ref_url="https://bugzilla.suse.com/1020446" source="BUGZILLA"/>
		<reference ref_id="1020448" ref_url="https://bugzilla.suse.com/1020448" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10046" ref_url="https://www.suse.com/security/cve/CVE-2016-10046/" source="CVE"/>
		<reference ref_id="CVE-2016-10048" ref_url="https://www.suse.com/security/cve/CVE-2016-10048/" source="CVE"/>
		<reference ref_id="CVE-2016-10049" ref_url="https://www.suse.com/security/cve/CVE-2016-10049/" source="CVE"/>
		<reference ref_id="CVE-2016-10050" ref_url="https://www.suse.com/security/cve/CVE-2016-10050/" source="CVE"/>
		<reference ref_id="CVE-2016-10051" ref_url="https://www.suse.com/security/cve/CVE-2016-10051/" source="CVE"/>
		<reference ref_id="CVE-2016-10052" ref_url="https://www.suse.com/security/cve/CVE-2016-10052/" source="CVE"/>
		<reference ref_id="CVE-2016-10059" ref_url="https://www.suse.com/security/cve/CVE-2016-10059/" source="CVE"/>
		<reference ref_id="CVE-2016-10060" ref_url="https://www.suse.com/security/cve/CVE-2016-10060/" source="CVE"/>
		<reference ref_id="CVE-2016-10061" ref_url="https://www.suse.com/security/cve/CVE-2016-10061/" source="CVE"/>
		<reference ref_id="CVE-2016-10062" ref_url="https://www.suse.com/security/cve/CVE-2016-10062/" source="CVE"/>
		<reference ref_id="CVE-2016-10063" ref_url="https://www.suse.com/security/cve/CVE-2016-10063/" source="CVE"/>
		<reference ref_id="CVE-2016-10064" ref_url="https://www.suse.com/security/cve/CVE-2016-10064/" source="CVE"/>
		<reference ref_id="CVE-2016-10065" ref_url="https://www.suse.com/security/cve/CVE-2016-10065/" source="CVE"/>
		<reference ref_id="CVE-2016-10068" ref_url="https://www.suse.com/security/cve/CVE-2016-10068/" source="CVE"/>
		<reference ref_id="CVE-2016-10069" ref_url="https://www.suse.com/security/cve/CVE-2016-10069/" source="CVE"/>
		<reference ref_id="CVE-2016-10070" ref_url="https://www.suse.com/security/cve/CVE-2016-10070/" source="CVE"/>
		<reference ref_id="CVE-2016-10071" ref_url="https://www.suse.com/security/cve/CVE-2016-10071/" source="CVE"/>
		<reference ref_id="CVE-2016-10144" ref_url="https://www.suse.com/security/cve/CVE-2016-10144/" source="CVE"/>
		<reference ref_id="CVE-2016-10145" ref_url="https://www.suse.com/security/cve/CVE-2016-10145/" source="CVE"/>
		<reference ref_id="CVE-2016-10146" ref_url="https://www.suse.com/security/cve/CVE-2016-10146/" source="CVE"/>
		<reference ref_id="CVE-2017-5506" ref_url="https://www.suse.com/security/cve/CVE-2017-5506/" source="CVE"/>
		<reference ref_id="CVE-2017-5507" ref_url="https://www.suse.com/security/cve/CVE-2017-5507/" source="CVE"/>
		<reference ref_id="CVE-2017-5508" ref_url="https://www.suse.com/security/cve/CVE-2017-5508/" source="CVE"/>
		<reference ref_id="CVE-2017-5510" ref_url="https://www.suse.com/security/cve/CVE-2017-5510/" source="CVE"/>
		<reference ref_id="CVE-2017-5511" ref_url="https://www.suse.com/security/cve/CVE-2017-5511/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<description>


This update for ImageMagick fixes the following issues:

- CVE-2016-10046: Prevent buffer overflow in draw.c caused by an incorrect length calculation (bsc#1017308)
- CVE-2016-10048: Arbitrary module could have been load because relative path were not escaped (bsc#1017310)
- CVE-2016-10049: Corrupt RLE files could have overflowed a buffer due to a incorrect length calculation (bsc#1017311)
- CVE-2016-10050: Corrupt RLE files could have overflowed a heap buffer due to a missing offset check (bsc#1017312)
- CVE-2016-10051: Fixed use after free when reading PWP files (bsc#1017313)
- CVE-2016-10052: Added bound check to exif parsing of JPEG files (bsc#1017314)
- CVE-2016-10059: Unchecked calculation when reading TIFF files could have lead to a buffer overflow (bsc#1017318)
- CVE-2016-10060: Improved error handling when writing files to not mask errors (bsc#1017319)
- CVE-2016-10061: Improved error handling when writing files to not mask errors (bsc#1017319).
- CVE-2016-10062: Improved error handling when writing files to not mask errors (bsc#1017319).
- CVE-2016-10063: Check validity of extend during TIFF file reading (bsc#1017320)
- CVE-2016-10064: Improved checks for buffer overflow when reading TIFF files (bsc#1017321)
- CVE-2016-10065: Unchecked calculations when reading VIFF files could have lead to out of bound reads (bsc#1017322)
- CVE-2016-10068: Prevent NULL pointer access when using the MSL interpreter (bsc#1017324)
- CVE-2016-10069: Add check for invalid mat file (bsc#1017325).
- CVE-2016-10070: Prevent allocating the wrong amount of memory when reading mat files (bsc#1017326)
- CVE-2016-10071: Prevent allocating the wrong amount of memory when reading mat files (bsc#1017326)
- CVE-2016-10144: Added a check after allocating memory when parsing IPL files (bsc#1020433)
- CVE-2016-10145: Fixed of-by-one in string copy operation when parsing WPG files (bsc#1020435)
- CVE-2016-10146: Captions and labels were handled incorrectly, causing a memory leak that could have lead to DoS (bsc#1020443)
- CVE-2017-5506: Missing offset check leading to a double-free (bsc#1020436)
- CVE-2017-5507: Fixed a memory leak when reading MPC files allowing for DoS (bsc#1020439)
- CVE-2017-5508: Increase the amount of memory allocated for TIFF pixels to prevent a heap buffer-overflow (bsc#1020441)
- CVE-2017-5510: Prevent out-of-bounds write when reading PSD files (bsc#1020446).
- CVE-2017-5511: A missing cast when reading PSD files could have caused memory corruption by a heap overflow (bsc#1020448)

This update removes the fix for CVE-2016-9773. ImageMagick-6 was not affected by CVE-2016-9773 and it caused a regression (at least in GraphicsMagick) (bsc#1017421).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-21"/>
	<updated date="2017-02-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017308">SUSE bug 1017308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017310">SUSE bug 1017310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017311">SUSE bug 1017311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017312">SUSE bug 1017312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017313">SUSE bug 1017313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017314">SUSE bug 1017314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017318">SUSE bug 1017318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017319">SUSE bug 1017319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017320">SUSE bug 1017320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017321">SUSE bug 1017321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017322">SUSE bug 1017322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017324">SUSE bug 1017324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017325">SUSE bug 1017325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017326">SUSE bug 1017326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017421">SUSE bug 1017421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020433">SUSE bug 1020433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020435">SUSE bug 1020435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020436">SUSE bug 1020436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020439">SUSE bug 1020439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020441">SUSE bug 1020441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020443">SUSE bug 1020443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020446">SUSE bug 1020446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020448">SUSE bug 1020448</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10046/">CVE-2016-10046</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10048/">CVE-2016-10048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10049/">CVE-2016-10049</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10050/">CVE-2016-10050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10051/">CVE-2016-10051</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10052/">CVE-2016-10052</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10059/">CVE-2016-10059</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10060/">CVE-2016-10060</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10061/">CVE-2016-10061</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10062/">CVE-2016-10062</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10063/">CVE-2016-10063</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10064/">CVE-2016-10064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10065/">CVE-2016-10065</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10068/">CVE-2016-10068</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10069/">CVE-2016-10069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10070/">CVE-2016-10070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10071/">CVE-2016-10071</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10144/">CVE-2016-10144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10145/">CVE-2016-10145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10146/">CVE-2016-10146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5506/">CVE-2017-5506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5507/">CVE-2017-5507</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5508/">CVE-2017-5508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5510/">CVE-2017-5510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5511/">CVE-2017-5511</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517127" comment="ImageMagick-6.8.8.1-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517128" comment="libMagick++-6_Q16-3-6.8.8.1-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517129" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517130" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517131" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77746" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1008965" ref_url="https://bugzilla.suse.com/1008965" source="BUGZILLA"/>
		<reference ref_id="1012504" ref_url="https://bugzilla.suse.com/1012504" source="BUGZILLA"/>
		<reference ref_id="1012632" ref_url="https://bugzilla.suse.com/1012632" source="BUGZILLA"/>
		<reference ref_id="1019332" ref_url="https://bugzilla.suse.com/1019332" source="BUGZILLA"/>
		<reference ref_id="1020077" ref_url="https://bugzilla.suse.com/1020077" source="BUGZILLA"/>
		<reference ref_id="1023041" ref_url="https://bugzilla.suse.com/1023041" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2616" ref_url="https://www.suse.com/security/cve/CVE-2017-2616/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00040.html" source="SUSE-SU"/>
		<description>

This update for util-linux fixes the following issues:

This security issue was fixed:

- CVE-2017-2616: In su with PAM support it was possible for local users to send SIGKILL to selected other processes with root privileges (bsc#1023041).

This non-security issues were fixed:

- lscpu: Implement WSL detection and work around crash (bsc#1019332)
- fstrim: De-duplicate btrfs sub-volumes for 'fstrim -a' and bind mounts (bsc#1020077)
- Fix regressions in safe loop re-use patch set for libmount (bsc#1012504)
- Disable ro checks for mtab (bsc#1012632)
- Ensure that the option 'users,exec,dev,suid' work as expected on NFS mounts (bsc#1008965)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-23"/>
	<updated date="2017-02-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1008965">SUSE bug 1008965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012504">SUSE bug 1012504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012632">SUSE bug 1012632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019332">SUSE bug 1019332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020077">SUSE bug 1020077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023041">SUSE bug 1023041</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2616/">CVE-2017-2616</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517132" comment="libblkid1-2.25-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517133" comment="libblkid1-32bit-2.25-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517134" comment="libmount1-2.25-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517135" comment="libmount1-32bit-2.25-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517136" comment="libsmartcols1-2.25-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517137" comment="libuuid-devel-2.25-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517138" comment="libuuid1-2.25-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517139" comment="libuuid1-32bit-2.25-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517140" comment="python-libmount-2.25-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517141" comment="util-linux-2.25-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517142" comment="util-linux-lang-2.25-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517143" comment="util-linux-systemd-2.25-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517144" comment="uuidd-2.25-40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77747" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1000195" ref_url="https://bugzilla.suse.com/1000195" source="BUGZILLA"/>
		<reference ref_id="1002496" ref_url="https://bugzilla.suse.com/1002496" source="BUGZILLA"/>
		<reference ref_id="1013657" ref_url="https://bugzilla.suse.com/1013657" source="BUGZILLA"/>
		<reference ref_id="1013668" ref_url="https://bugzilla.suse.com/1013668" source="BUGZILLA"/>
		<reference ref_id="1014490" ref_url="https://bugzilla.suse.com/1014490" source="BUGZILLA"/>
		<reference ref_id="1014507" ref_url="https://bugzilla.suse.com/1014507" source="BUGZILLA"/>
		<reference ref_id="1015169" ref_url="https://bugzilla.suse.com/1015169" source="BUGZILLA"/>
		<reference ref_id="1016340" ref_url="https://bugzilla.suse.com/1016340" source="BUGZILLA"/>
		<reference ref_id="1022627" ref_url="https://bugzilla.suse.com/1022627" source="BUGZILLA"/>
		<reference ref_id="1022871" ref_url="https://bugzilla.suse.com/1022871" source="BUGZILLA"/>
		<reference ref_id="1023004" ref_url="https://bugzilla.suse.com/1023004" source="BUGZILLA"/>
		<reference ref_id="1024183" ref_url="https://bugzilla.suse.com/1024183" source="BUGZILLA"/>
		<reference ref_id="1024186" ref_url="https://bugzilla.suse.com/1024186" source="BUGZILLA"/>
		<reference ref_id="1024307" ref_url="https://bugzilla.suse.com/1024307" source="BUGZILLA"/>
		<reference ref_id="1024834" ref_url="https://bugzilla.suse.com/1024834" source="BUGZILLA"/>
		<reference ref_id="1025188" ref_url="https://bugzilla.suse.com/1025188" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10155" ref_url="https://www.suse.com/security/cve/CVE-2016-10155/" source="CVE"/>
		<reference ref_id="CVE-2016-9101" ref_url="https://www.suse.com/security/cve/CVE-2016-9101/" source="CVE"/>
		<reference ref_id="CVE-2016-9776" ref_url="https://www.suse.com/security/cve/CVE-2016-9776/" source="CVE"/>
		<reference ref_id="CVE-2016-9907" ref_url="https://www.suse.com/security/cve/CVE-2016-9907/" source="CVE"/>
		<reference ref_id="CVE-2016-9911" ref_url="https://www.suse.com/security/cve/CVE-2016-9911/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="CVE-2017-5579" ref_url="https://www.suse.com/security/cve/CVE-2017-5579/" source="CVE"/>
		<reference ref_id="CVE-2017-5856" ref_url="https://www.suse.com/security/cve/CVE-2017-5856/" source="CVE"/>
		<reference ref_id="CVE-2017-5898" ref_url="https://www.suse.com/security/cve/CVE-2017-5898/" source="CVE"/>
		<reference ref_id="CVE-2017-5973" ref_url="https://www.suse.com/security/cve/CVE-2017-5973/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00045.html" source="SUSE-SU"/>
		<description>

This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-5973: A infinite loop while doing control transfer in xhci_kick_epctx allowed privileged user inside the guest to crash the host process resulting in DoS (bsc#1025188).
- CVE-2016-10155: The virtual hardware watchdog 'wdt_i6300esb' was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1024183).
- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024834)
- CVE-2017-5856: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a memory leakage issue allowing a privileged user to leak host memory resulting in DoS (bsc#1024186).
- CVE-2017-5898: The CCID Card device emulator support was vulnerable to an integer overflow flaw allowing a privileged user to crash the Qemu process on the host resulting in DoS (bsc#1024307).
- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004)
- A malicious guest could have, by frequently rebooting over extended periods of time, run the host system out of memory, resulting in a Denial of Service (DoS) (bsc#1022871)
- CVE-2017-5579: The 16550A UART serial device emulation support was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1022627).
- CVE-2016-9907: The USB redirector usb-guest support was vulnerable to a memory leakage flaw when destroying the USB redirector in 'usbredir_handle_destroy'.  A guest user/process could have used this issue to leak host memory, resulting in DoS for a host (bsc#1014490)
- CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in 'ehci_init_transfer'. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014507)
- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)
- CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)
- CVE-2016-9101: A memory leak in hw/net/eepro100.c allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device (bsc#1013668).
- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013657)

These non-security issues were fixed:

- bsc#1000195: Prevent panic on CPU0 while booting on SLES 11 SP3
- bsc#1002496: Added support for reloading clvm in block-dmmd block-dmmd
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-27"/>
	<updated date="2017-02-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000195">SUSE bug 1000195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002496">SUSE bug 1002496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013657">SUSE bug 1013657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013668">SUSE bug 1013668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014490">SUSE bug 1014490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014507">SUSE bug 1014507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015169">SUSE bug 1015169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016340">SUSE bug 1016340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022627">SUSE bug 1022627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022871">SUSE bug 1022871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023004">SUSE bug 1023004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024183">SUSE bug 1024183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024186">SUSE bug 1024186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024307">SUSE bug 1024307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024834">SUSE bug 1024834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025188">SUSE bug 1025188</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10155/">CVE-2016-10155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9101/">CVE-2016-9101</cve>
	<cve impact="moderate" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9776/">CVE-2016-9776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9907/">CVE-2016-9907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9911/">CVE-2016-9911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5579/">CVE-2017-5579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5856/">CVE-2017-5856</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5898/">CVE-2017-5898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5973/">CVE-2017-5973</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517145" comment="xen-4.5.5_06-22.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517146" comment="xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517147" comment="xen-libs-4.5.5_06-22.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517148" comment="xen-libs-32bit-4.5.5_06-22.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77748" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1003577" ref_url="https://bugzilla.suse.com/1003577" source="BUGZILLA"/>
		<reference ref_id="1003579" ref_url="https://bugzilla.suse.com/1003579" source="BUGZILLA"/>
		<reference ref_id="1003580" ref_url="https://bugzilla.suse.com/1003580" source="BUGZILLA"/>
		<reference ref_id="1013882" ref_url="https://bugzilla.suse.com/1013882" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002541.html" source="SUSE-SU"/>
		<description>

This update for zlib fixes the following issues:

CVE-2016-9843: Big-endian out-of-bounds pointer (bsc#1013882)

CVE-2016-9842: Undefined Left Shift of Negative Number (bsc#1003580) 

CVE-2016-9840 CVE-2016-9841: Out-of-bounds pointer arithmetic in inftrees.c (bsc#1003579)

Incompatible declarations for external linkage function deflate (bsc#1003577)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-02"/>
	<updated date="2017-01-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003577">SUSE bug 1003577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003579">SUSE bug 1003579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003580">SUSE bug 1003580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013882">SUSE bug 1013882</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517149" comment="libz1-1.2.8-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517150" comment="libz1-32bit-1.2.8-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77749" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1024130" ref_url="https://bugzilla.suse.com/1024130" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3135" ref_url="https://www.suse.com/security/cve/CVE-2017-3135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002674.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- Fixed a possible denial of service vulnerability (affected only
  configurations using both DNS64 and RPZ, CVE-2017-3135, bsc#1024130)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-02"/>
	<updated date="2017-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3135/">CVE-2017-3135</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517151" comment="bind-libs-9.9.9P1-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517152" comment="bind-libs-32bit-9.9.9P1-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517153" comment="bind-utils-9.9.9P1-56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77750" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl098 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1000677" ref_url="https://bugzilla.suse.com/1000677" source="BUGZILLA"/>
		<reference ref_id="1001912" ref_url="https://bugzilla.suse.com/1001912" source="BUGZILLA"/>
		<reference ref_id="1004499" ref_url="https://bugzilla.suse.com/1004499" source="BUGZILLA"/>
		<reference ref_id="1005878" ref_url="https://bugzilla.suse.com/1005878" source="BUGZILLA"/>
		<reference ref_id="1019334" ref_url="https://bugzilla.suse.com/1019334" source="BUGZILLA"/>
		<reference ref_id="1021641" ref_url="https://bugzilla.suse.com/1021641" source="BUGZILLA"/>
		<reference ref_id="984663" ref_url="https://bugzilla.suse.com/984663" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056/" source="CVE"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002678.html" source="SUSE-SU"/>
		<description>

This update for compat-openssl098 fixes the following issues contained in the
OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)

Security issues fixed:
- CVE-2016-7056: A local ECSDA P-256 timing attack that might have allowed key recovery was fixed (bsc#1019334)
- CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)
- degrade 3DES to MEDIUM in SSL2 (bsc#1001912)
- CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)

Bugs fixed:
- fix crash in openssl speed (bsc#1000677)
- don't attempt session resumption if no ticket is present and session
  ID length is zero (bsc#984663)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-03"/>
	<updated date="2017-03-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000677">SUSE bug 1000677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001912">SUSE bug 1001912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004499">SUSE bug 1004499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005878">SUSE bug 1005878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019334">SUSE bug 1019334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984663">SUSE bug 984663</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517154" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517155" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77751" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1005480" ref_url="https://bugzilla.suse.com/1005480" source="BUGZILLA"/>
		<reference ref_id="1005893" ref_url="https://bugzilla.suse.com/1005893" source="BUGZILLA"/>
		<reference ref_id="1006221" ref_url="https://bugzilla.suse.com/1006221" source="BUGZILLA"/>
		<reference ref_id="1016366" ref_url="https://bugzilla.suse.com/1016366" source="BUGZILLA"/>
		<reference ref_id="1016369" ref_url="https://bugzilla.suse.com/1016369" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10009" ref_url="https://www.suse.com/security/cve/CVE-2016-10009/" source="CVE"/>
		<reference ref_id="CVE-2016-10011" ref_url="https://www.suse.com/security/cve/CVE-2016-10011/" source="CVE"/>
		<reference ref_id="CVE-2016-8858" ref_url="https://www.suse.com/security/cve/CVE-2016-8858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0607-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002685.html" source="SUSE-SU"/>
		<description>

This update for openssh fixes the following issues:

- CVE-2016-8858: prevent resource depletion during key exchange (bsc#1005480)
- CVE-2016-10009: limit directories for loading PKCS11 modules to avoid privilege escalation (bsc#1016366)
- CVE-2016-10011: Prevent possible leaks of host private keys to low-privilege process handling authentication (bsc#1016369)

- Fix suggested command for removing conflicting server keys from the known_hosts file (bsc#1006221)
- Properly verify CIDR masks in the AllowUsers and DenyUsers configuration lists (bsc#1005893)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-06"/>
	<updated date="2017-03-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005480">SUSE bug 1005480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005893">SUSE bug 1005893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006221">SUSE bug 1006221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016366">SUSE bug 1016366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016369">SUSE bug 1016369</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10009/">CVE-2016-10009</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10011/">CVE-2016-10011</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8858/">CVE-2016-8858</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517156" comment="openssh-6.6p1-54.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517157" comment="openssh-askpass-gnome-6.6p1-54.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517158" comment="openssh-helpers-6.6p1-54.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77752" version="1" class="patch">
	<metadata>
		<title>Security update for libquicktime (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1022805" ref_url="https://bugzilla.suse.com/1022805" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2399" ref_url="https://www.suse.com/security/cve/CVE-2016-2399/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002681.html" source="SUSE-SU"/>
		<description>

This update for libquicktime fixes the following issues:

- A crafted MP4 file could have caused libquicktime to crash or lead to
  undefined behaviour (bsc#1022805, CVE-2016-2399)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-06"/>
	<updated date="2017-03-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022805">SUSE bug 1022805</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2399/">CVE-2016-2399</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517159" comment="libquicktime0-1.2.4-10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77753" version="1" class="patch">
	<metadata>
		<title>Security update for dracut (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1005410" ref_url="https://bugzilla.suse.com/1005410" source="BUGZILLA"/>
		<reference ref_id="1006118" ref_url="https://bugzilla.suse.com/1006118" source="BUGZILLA"/>
		<reference ref_id="1007925" ref_url="https://bugzilla.suse.com/1007925" source="BUGZILLA"/>
		<reference ref_id="1008340" ref_url="https://bugzilla.suse.com/1008340" source="BUGZILLA"/>
		<reference ref_id="1017695" ref_url="https://bugzilla.suse.com/1017695" source="BUGZILLA"/>
		<reference ref_id="986734" ref_url="https://bugzilla.suse.com/986734" source="BUGZILLA"/>
		<reference ref_id="986838" ref_url="https://bugzilla.suse.com/986838" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8637" ref_url="https://www.suse.com/security/cve/CVE-2016-8637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002688.html" source="SUSE-SU"/>
		<description>

This update for dracut fixes the following issues:

Security issues fixed:

- CVE-2016-8637: When the early microcode loading was enabled during initrd creation, the initrd
  would be read-only available for all users, allowing local users to retrieve secrets stored in
  the initial ramdisk. (bsc#1008340)

Non security issues fixed:

- Allow booting from degraded MD arrays with systemd. (bsc#1017695)
- Start multipath services before local-fs-pre.target. (bsc#1005410, bsc#1006118, bsc#1007925,
  bsc#986734, bsc#986838)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-09"/>
	<updated date="2017-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005410">SUSE bug 1005410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006118">SUSE bug 1006118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007925">SUSE bug 1007925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008340">SUSE bug 1008340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017695">SUSE bug 1017695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986734">SUSE bug 986734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986838">SUSE bug 986838</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8637/">CVE-2016-8637</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517160" comment="dracut-037-91.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77754" version="1" class="patch">
	<metadata>
		<title>Recommended update for dbus-1 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1025950" ref_url="https://bugzilla.suse.com/1025950" source="BUGZILLA"/>
		<reference ref_id="1025951" ref_url="https://bugzilla.suse.com/1025951" source="BUGZILLA"/>
		<reference ref_id="974092" ref_url="https://bugzilla.suse.com/974092" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:0695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002694.html" source="SUSE-SU"/>
		<description>

This update for dbus-1 fixes the following issues:

Security issues fixed:
- Symlink attack in nonce-tcp transport. (bsc#1025950)
- Symlink attack in unit tests. (bsc#1025951)

Bugfixes:
- Remove sysvinit script, not used under systemd. (bsc#974092)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-15"/>
	<updated date="2017-03-15"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1025950">SUSE bug 1025950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025951">SUSE bug 1025951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974092">SUSE bug 974092</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517161" comment="dbus-1-1.8.22-24.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517162" comment="dbus-1-x11-1.8.22-24.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517163" comment="libdbus-1-3-1.8.22-24.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517164" comment="libdbus-1-3-32bit-1.8.22-24.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77755" version="1" class="patch">
	<metadata>
		<title>Security update for gegl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="789835" ref_url="https://bugzilla.suse.com/789835" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4433" ref_url="https://www.suse.com/security/cve/CVE-2012-4433/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002695.html" source="SUSE-SU"/>
		<description>

This update for gegl fixes the following issues:

Security issue fixed:
- Fix CVE-2012-4433: Fix buffer overflow in and add plausibility checks to ppm-load op (bsc#789835).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-15"/>
	<updated date="2017-03-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/789835">SUSE bug 789835</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4433/">CVE-2012-4433</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517165" comment="gegl-0_2-0.2.0-10.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517166" comment="gegl-0_2-lang-0.2.0-10.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517167" comment="libgegl-0_2-0-0.2.0-10.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77756" version="1" class="patch">
	<metadata>
		<title>Security update for open-vm-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1006796" ref_url="https://bugzilla.suse.com/1006796" source="BUGZILLA"/>
		<reference ref_id="1007600" ref_url="https://bugzilla.suse.com/1007600" source="BUGZILLA"/>
		<reference ref_id="1011057" ref_url="https://bugzilla.suse.com/1011057" source="BUGZILLA"/>
		<reference ref_id="1013496" ref_url="https://bugzilla.suse.com/1013496" source="BUGZILLA"/>
		<reference ref_id="1024200" ref_url="https://bugzilla.suse.com/1024200" source="BUGZILLA"/>
		<reference ref_id="913727" ref_url="https://bugzilla.suse.com/913727" source="BUGZILLA"/>
		<reference ref_id="938593" ref_url="https://bugzilla.suse.com/938593" source="BUGZILLA"/>
		<reference ref_id="941384" ref_url="https://bugzilla.suse.com/941384" source="BUGZILLA"/>
		<reference ref_id="971031" ref_url="https://bugzilla.suse.com/971031" source="BUGZILLA"/>
		<reference ref_id="978424" ref_url="https://bugzilla.suse.com/978424" source="BUGZILLA"/>
		<reference ref_id="985110" ref_url="https://bugzilla.suse.com/985110" source="BUGZILLA"/>
		<reference ref_id="994598" ref_url="https://bugzilla.suse.com/994598" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5191" ref_url="https://www.suse.com/security/cve/CVE-2015-5191/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002696.html" source="SUSE-SU"/>
		<description>

This update for open-vm-tools to 10.1.0 stable brings features, fixes bugs
and security issues:

- New vmware-namespace-cmd command line utility
- GTK3 support
- Common Agent Framework (CAF)
- Guest authentication with xmlsec1
- Sub-command to push updated network information to the host on demand
- Fix for quiesced snapshot failure leaving guest file system quiesced (bsc#1006796)
- Fix for CVE-2015-5191 (bsc#1007600)
- Report SLES for SAP 12 guest OS as SLES 12 (bsc#1013496)
- Add udev rule to increase VMware virtual disk timeout values (bsc#994598) 
- Fix vmtoolsd init script to run vmtoolsd in background (bsc#971031)
- Fix copy-n-paste and drag-n-drop regressions (bsc#978424)
- Add new vmblock-fuse.service
- Fix a suspend with systemd issue (bsc#913727)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-15"/>
	<updated date="2017-03-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1006796">SUSE bug 1006796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007600">SUSE bug 1007600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011057">SUSE bug 1011057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013496">SUSE bug 1013496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024200">SUSE bug 1024200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913727">SUSE bug 913727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938593">SUSE bug 938593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941384">SUSE bug 941384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971031">SUSE bug 971031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978424">SUSE bug 978424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985110">SUSE bug 985110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994598">SUSE bug 994598</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5191/">CVE-2015-5191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517168" comment="libvmtools0-10.1.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517169" comment="open-vm-tools-10.1.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517170" comment="open-vm-tools-desktop-10.1.0-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77757" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1029374" ref_url="https://bugzilla.suse.com/1029374" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2997" ref_url="https://www.suse.com/security/cve/CVE-2017-2997/" source="CVE"/>
		<reference ref_id="CVE-2017-2998" ref_url="https://www.suse.com/security/cve/CVE-2017-2998/" source="CVE"/>
		<reference ref_id="CVE-2017-2999" ref_url="https://www.suse.com/security/cve/CVE-2017-2999/" source="CVE"/>
		<reference ref_id="CVE-2017-3000" ref_url="https://www.suse.com/security/cve/CVE-2017-3000/" source="CVE"/>
		<reference ref_id="CVE-2017-3001" ref_url="https://www.suse.com/security/cve/CVE-2017-3001/" source="CVE"/>
		<reference ref_id="CVE-2017-3002" ref_url="https://www.suse.com/security/cve/CVE-2017-3002/" source="CVE"/>
		<reference ref_id="CVE-2017-3003" ref_url="https://www.suse.com/security/cve/CVE-2017-3003/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00010.html" source="SUSE-SU"/>
		<description>

This update for flash-player fixes the following issues:

Security update to 25.0.0.127 (bsc#1029374), fixing the following vulnerabilities advised under APSB17-07:
- CVE-2017-2997: This update resolves a buffer overflow vulnerability that could lead to code execution.
- CVE-2017-2998, CVE-2017-2999: This update resolves memory corruption vulnerabilities that could lead to
  code execution.
- CVE-2017-3000: This update resolves a random number generator vulnerability used for constant blinding
  that could lead to information disclosure.
- CVE-2017-3001, CVE-2017-3002, CVE-2017-3003: This update resolves use-after-free vulnerabilities that
  could lead to code execution.
- Details:
  https://helpx.adobe.com/security/products/flash-player/apsb17-07.html
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-15"/>
	<updated date="2017-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1029374">SUSE bug 1029374</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-2997/">CVE-2017-2997</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-2998/">CVE-2017-2998</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-2999/">CVE-2017-2999</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3000/">CVE-2017-3000</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3001/">CVE-2017-3001</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3002/">CVE-2017-3002</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3003/">CVE-2017-3003</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517171" comment="flash-player-25.0.0.127-162.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517172" comment="flash-player-gnome-25.0.0.127-162.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77758" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1028391" ref_url="https://bugzilla.suse.com/1028391" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5398" ref_url="https://www.suse.com/security/cve/CVE-2017-5398/" source="CVE"/>
		<reference ref_id="CVE-2017-5400" ref_url="https://www.suse.com/security/cve/CVE-2017-5400/" source="CVE"/>
		<reference ref_id="CVE-2017-5401" ref_url="https://www.suse.com/security/cve/CVE-2017-5401/" source="CVE"/>
		<reference ref_id="CVE-2017-5402" ref_url="https://www.suse.com/security/cve/CVE-2017-5402/" source="CVE"/>
		<reference ref_id="CVE-2017-5404" ref_url="https://www.suse.com/security/cve/CVE-2017-5404/" source="CVE"/>
		<reference ref_id="CVE-2017-5405" ref_url="https://www.suse.com/security/cve/CVE-2017-5405/" source="CVE"/>
		<reference ref_id="CVE-2017-5407" ref_url="https://www.suse.com/security/cve/CVE-2017-5407/" source="CVE"/>
		<reference ref_id="CVE-2017-5408" ref_url="https://www.suse.com/security/cve/CVE-2017-5408/" source="CVE"/>
		<reference ref_id="CVE-2017-5409" ref_url="https://www.suse.com/security/cve/CVE-2017-5409/" source="CVE"/>
		<reference ref_id="CVE-2017-5410" ref_url="https://www.suse.com/security/cve/CVE-2017-5410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00012.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox to ESR 45.8 fixes the following issues:

Security issues fixed (bsc#1028391):
- CVE-2017-5402: Use-after-free working with events in FontFace objects
- CVE-2017-5410: Memory corruption during JavaScript garbage collection incremental sweeping
- CVE-2017-5400: asm.js JIT-spray bypass of ASLR and DEP
- CVE-2017-5401: Memory Corruption when handling ErrorResult
- CVE-2017-5407: Pixel and history stealing via floating-point timing side channel with SVG filters
- CVE-2017-5404: Use-after-free working with ranges in selections
- CVE-2017-5405: FTP response codes can cause use of uninitialized values for ports
- CVE-2017-5408: Cross-origin reading of video captions in violation of CORS
- CVE-2017-5409: File deletion via callback parameter in Mozilla Windows Updater and Maintenance Service
- CVE-2017-5398: Memory safety bugs fixed in Firefox 52 and Firefox ESR 45.8
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5398/">CVE-2017-5398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5400/">CVE-2017-5400</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5401/">CVE-2017-5401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5402/">CVE-2017-5402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5404/">CVE-2017-5404</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5405/">CVE-2017-5405</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5407/">CVE-2017-5407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5408/">CVE-2017-5408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5409/">CVE-2017-5409</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5410/">CVE-2017-5410</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517173" comment="MozillaFirefox-45.8.0esr-102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517174" comment="MozillaFirefox-translations-45.8.0esr-102.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77759" version="1" class="patch">
	<metadata>
		<title>Security update for sane-backends (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1027197" ref_url="https://bugzilla.suse.com/1027197" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6318" ref_url="https://www.suse.com/security/cve/CVE-2017-6318/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002700.html" source="SUSE-SU"/>
		<description>

This update for sane-backends fixes the following issues:

- saned could have leaked uninitialized memory back to its requesters for some
  opcodes, allowing for information disclosure of saned memory
  (CVE-2017-6318, bsc#1027197).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027197">SUSE bug 1027197</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6318/">CVE-2017-6318</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517175" comment="sane-backends-1.0.24-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517176" comment="sane-backends-32bit-1.0.24-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517177" comment="sane-backends-autoconfig-1.0.24-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77760" version="1" class="patch">
	<metadata>
		<title>Security update for rrdtool (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="828003" ref_url="https://bugzilla.suse.com/828003" source="BUGZILLA"/>
		<reference ref_id="967671" ref_url="https://bugzilla.suse.com/967671" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2131" ref_url="https://www.suse.com/security/cve/CVE-2013-2131/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002549.html" source="SUSE-SU"/>
		<description>

This update for rrdtool provides the following fixes:

- CVE-2013-2131: Enhance imginfo format validation checks to prevent crashes. (bsc#828003)
- Add rrdtool-cached sub-package to SLE 12-SP1. (bsc#967671)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-10"/>
	<updated date="2017-01-10"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/828003">SUSE bug 828003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967671">SUSE bug 967671</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2131/">CVE-2013-2131</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517178" comment="rrdtool-1.4.7-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517179" comment="rrdtool-cached-1.4.7-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77761" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1028301" ref_url="https://bugzilla.suse.com/1028301" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6508" ref_url="https://www.suse.com/security/cve/CVE-2017-6508/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002740.html" source="SUSE-SU"/>
		<description>

This update for wget fixes the following issues:

Security issue fixed:
- CVE-2017-6508: (url_parse): Reject control characters in host part of URL (bsc#1028301).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-22"/>
	<updated date="2017-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1028301">SUSE bug 1028301</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6508/">CVE-2017-6508</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517180" comment="wget-1.14-20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77762" version="1" class="patch">
	<metadata>
		<title>Security update for libpng16 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1017646" ref_url="https://bugzilla.suse.com/1017646" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002745.html" source="SUSE-SU"/>
		<description>

This update for libpng16 fixes the following issues:

Security issues fixed:
- CVE-2016-10087: NULL pointer dereference in png_set_text_2() (bsc#1017646)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-29"/>
	<updated date="2017-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017646">SUSE bug 1017646</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517181" comment="libpng16-16-1.6.8-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517182" comment="libpng16-16-32bit-1.6.8-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77763" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1019416" ref_url="https://bugzilla.suse.com/1019416" source="BUGZILLA"/>
		<reference ref_id="1024416" ref_url="https://bugzilla.suse.com/1024416" source="BUGZILLA"/>
		<reference ref_id="1027147" ref_url="https://bugzilla.suse.com/1027147" source="BUGZILLA"/>
		<reference ref_id="993692" ref_url="https://bugzilla.suse.com/993692" source="BUGZILLA"/>
		<reference ref_id="993707" ref_url="https://bugzilla.suse.com/993707" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2619" ref_url="https://www.suse.com/security/cve/CVE-2017-2619/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0859-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00045.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issues:

Security issues fixed:
- CVE-2017-2619: Symlink race permits opening files outside share directory (bsc#1027147).

Bugfixes:
- Don't package man pages for VFS modules that aren't built (bsc#993707).
- sync_req: make async_connect_send() 'reentrant'; (bso#12105); (bsc#1024416).
- Document 'winbind: ignore domains' parameter; (bsc#1019416).
- Prevent core, make sure response-&gt;extra_data.data is always cleared out; (bsc#993692).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-29"/>
	<updated date="2017-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1019416">SUSE bug 1019416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024416">SUSE bug 1024416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027147">SUSE bug 1027147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993692">SUSE bug 993692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993707">SUSE bug 993707</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2619/">CVE-2017-2619</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517183" comment="libdcerpc-binding0-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517184" comment="libdcerpc-binding0-32bit-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517185" comment="libdcerpc0-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517186" comment="libdcerpc0-32bit-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517187" comment="libgensec0-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517188" comment="libgensec0-32bit-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517189" comment="libndr-krb5pac0-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517190" comment="libndr-krb5pac0-32bit-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517191" comment="libndr-nbt0-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517192" comment="libndr-nbt0-32bit-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517193" comment="libndr-standard0-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517194" comment="libndr-standard0-32bit-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517195" comment="libndr0-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517196" comment="libndr0-32bit-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517197" comment="libnetapi0-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517198" comment="libnetapi0-32bit-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517199" comment="libregistry0-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517200" comment="libsamba-credentials0-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517201" comment="libsamba-credentials0-32bit-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517202" comment="libsamba-hostconfig0-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517203" comment="libsamba-hostconfig0-32bit-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517204" comment="libsamba-passdb0-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517205" comment="libsamba-passdb0-32bit-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517206" comment="libsamba-util0-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517207" comment="libsamba-util0-32bit-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517208" comment="libsamdb0-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517209" comment="libsamdb0-32bit-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517210" comment="libsmbclient-raw0-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517211" comment="libsmbclient-raw0-32bit-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517212" comment="libsmbclient0-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517213" comment="libsmbclient0-32bit-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517214" comment="libsmbconf0-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517215" comment="libsmbconf0-32bit-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517216" comment="libsmbldap0-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517217" comment="libsmbldap0-32bit-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517218" comment="libtevent-util0-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517219" comment="libtevent-util0-32bit-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517220" comment="libwbclient0-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517221" comment="libwbclient0-32bit-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517222" comment="samba-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517223" comment="samba-32bit-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517224" comment="samba-client-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517225" comment="samba-client-32bit-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517226" comment="samba-doc-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517227" comment="samba-libs-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517228" comment="samba-libs-32bit-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517229" comment="samba-winbind-4.2.4-28.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517230" comment="samba-winbind-32bit-4.2.4-28.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77764" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1017646" ref_url="https://bugzilla.suse.com/1017646" source="BUGZILLA"/>
		<reference ref_id="958791" ref_url="https://bugzilla.suse.com/958791" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002749.html" source="SUSE-SU"/>
		<description>

This update for libpng12 fixes the following issues:

Security issues fixed:
- CVE-2015-8540: read underflow in libpng (bsc#958791)
- CVE-2016-10087: NULL pointer dereference in png_set_text_2() (bsc#1017646)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-29"/>
	<updated date="2017-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017646">SUSE bug 1017646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958791">SUSE bug 958791</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517231" comment="libpng12-0-1.2.50-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517232" comment="libpng12-0-32bit-1.2.50-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77765" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1027565" ref_url="https://bugzilla.suse.com/1027565" source="BUGZILLA"/>
		<reference ref_id="1028372" ref_url="https://bugzilla.suse.com/1028372" source="BUGZILLA"/>
		<reference ref_id="1030573" ref_url="https://bugzilla.suse.com/1030573" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2636" ref_url="https://www.suse.com/security/cve/CVE-2017-2636/" source="CVE"/>
		<reference ref_id="CVE-2017-7184" ref_url="https://www.suse.com/security/cve/CVE-2017-7184/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0865-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00048.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 kernel was updated to fix the following security bugs:

- CVE-2017-7184: The Linux kernel allowed local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) via unspecified vectors, as demonstrated during a Pwn2Own competition at CanSecWest 2017 (bnc#1030573, bnc#1028372).
- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bnc#1027565).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-30"/>
	<updated date="2017-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027565">SUSE bug 1027565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028372">SUSE bug 1028372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030573">SUSE bug 1030573</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2636/">CVE-2017-2636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7184/">CVE-2017-7184</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517233" comment="kernel-default-3.12.69-60.64.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517234" comment="kernel-default-devel-3.12.69-60.64.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517235" comment="kernel-default-extra-3.12.69-60.64.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517236" comment="kernel-devel-3.12.69-60.64.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517237" comment="kernel-macros-3.12.69-60.64.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517238" comment="kernel-source-3.12.69-60.64.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517239" comment="kernel-syms-3.12.69-60.64.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517240" comment="kernel-xen-3.12.69-60.64.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517241" comment="kernel-xen-devel-3.12.69-60.64.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77766" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1019129" ref_url="https://bugzilla.suse.com/1019129" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2925" ref_url="https://www.suse.com/security/cve/CVE-2017-2925/" source="CVE"/>
		<reference ref_id="CVE-2017-2926" ref_url="https://www.suse.com/security/cve/CVE-2017-2926/" source="CVE"/>
		<reference ref_id="CVE-2017-2927" ref_url="https://www.suse.com/security/cve/CVE-2017-2927/" source="CVE"/>
		<reference ref_id="CVE-2017-2928" ref_url="https://www.suse.com/security/cve/CVE-2017-2928/" source="CVE"/>
		<reference ref_id="CVE-2017-2930" ref_url="https://www.suse.com/security/cve/CVE-2017-2930/" source="CVE"/>
		<reference ref_id="CVE-2017-2931" ref_url="https://www.suse.com/security/cve/CVE-2017-2931/" source="CVE"/>
		<reference ref_id="CVE-2017-2932" ref_url="https://www.suse.com/security/cve/CVE-2017-2932/" source="CVE"/>
		<reference ref_id="CVE-2017-2933" ref_url="https://www.suse.com/security/cve/CVE-2017-2933/" source="CVE"/>
		<reference ref_id="CVE-2017-2934" ref_url="https://www.suse.com/security/cve/CVE-2017-2934/" source="CVE"/>
		<reference ref_id="CVE-2017-2935" ref_url="https://www.suse.com/security/cve/CVE-2017-2935/" source="CVE"/>
		<reference ref_id="CVE-2017-2936" ref_url="https://www.suse.com/security/cve/CVE-2017-2936/" source="CVE"/>
		<reference ref_id="CVE-2017-2937" ref_url="https://www.suse.com/security/cve/CVE-2017-2937/" source="CVE"/>
		<reference ref_id="CVE-2017-2938" ref_url="https://www.suse.com/security/cve/CVE-2017-2938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00013.html" source="SUSE-SU"/>
		<description>
This update to Adobe Flash 24.0.0.194 fixes the following vulnerabilities advised under APSB17-02:

- security bypass vulnerability that could lead to information disclosure (CVE-2017-2938)
- use-after-free vulnerabilities that could lead to code execution (CVE-2017-2932, CVE-2017-2936, CVE-2017-2937)
- heap buffer overflow vulnerabilities that could lead to code execution
  (CVE-2017-2927, CVE-2017-2933, CVE-2017-2934, CVE-2017-2935)
- memory corruption vulnerabilities that could lead to code execution
  (CVE-2017-2925, CVE-2017-2926, CVE-2017-2928, CVE-2017-2930, CVE-2017-2931)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-11"/>
	<updated date="2017-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1019129">SUSE bug 1019129</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2925/">CVE-2017-2925</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2926/">CVE-2017-2926</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2927/">CVE-2017-2927</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2928/">CVE-2017-2928</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2930/">CVE-2017-2930</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2931/">CVE-2017-2931</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2932/">CVE-2017-2932</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2933/">CVE-2017-2933</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2934/">CVE-2017-2934</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2935/">CVE-2017-2935</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2936/">CVE-2017-2936</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2937/">CVE-2017-2937</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2938/">CVE-2017-2938</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517242" comment="flash-player-24.0.0.194-155.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517243" comment="flash-player-gnome-24.0.0.194-155.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77767" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1018699" ref_url="https://bugzilla.suse.com/1018699" source="BUGZILLA"/>
		<reference ref_id="1018700" ref_url="https://bugzilla.suse.com/1018700" source="BUGZILLA"/>
		<reference ref_id="1018701" ref_url="https://bugzilla.suse.com/1018701" source="BUGZILLA"/>
		<reference ref_id="1018702" ref_url="https://bugzilla.suse.com/1018702" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9131" ref_url="https://www.suse.com/security/cve/CVE-2016-9131/" source="CVE"/>
		<reference ref_id="CVE-2016-9147" ref_url="https://www.suse.com/security/cve/CVE-2016-9147/" source="CVE"/>
		<reference ref_id="CVE-2016-9444" ref_url="https://www.suse.com/security/cve/CVE-2016-9444/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00014.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- Fix a potential assertion failure that could have been triggered by a
  malformed response to an ANY query, thereby facilitating a denial-of-service
  attack. [CVE-2016-9131, bsc#1018700, bsc#1018699]

- Fix a potential assertion failure that could have been triggered by
  responding to a query with inconsistent DNSSEC information, thereby
  facilitating a denial-of-service attack. [CVE-2016-9147, bsc#1018701,
  bsc#1018699]

- Fix potential assertion failure that could have been triggered by DNS
  responses that contain unusually-formed DS resource records, facilitating a
  denial-of-service attack. [CVE-2016-9444, bsc#1018702, bsc#1018699]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-11"/>
	<updated date="2017-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1018699">SUSE bug 1018699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9131/">CVE-2016-9131</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9147/">CVE-2016-9147</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9444/">CVE-2016-9444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517244" comment="bind-libs-9.9.9P1-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517245" comment="bind-libs-32bit-9.9.9P1-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517246" comment="bind-utils-9.9.9P1-53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77768" version="1" class="patch">
	<metadata>
		<title>Security update for audiofile (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1026978" ref_url="https://bugzilla.suse.com/1026978" source="BUGZILLA"/>
		<reference ref_id="1026979" ref_url="https://bugzilla.suse.com/1026979" source="BUGZILLA"/>
		<reference ref_id="1026980" ref_url="https://bugzilla.suse.com/1026980" source="BUGZILLA"/>
		<reference ref_id="1026981" ref_url="https://bugzilla.suse.com/1026981" source="BUGZILLA"/>
		<reference ref_id="1026982" ref_url="https://bugzilla.suse.com/1026982" source="BUGZILLA"/>
		<reference ref_id="1026983" ref_url="https://bugzilla.suse.com/1026983" source="BUGZILLA"/>
		<reference ref_id="1026984" ref_url="https://bugzilla.suse.com/1026984" source="BUGZILLA"/>
		<reference ref_id="1026985" ref_url="https://bugzilla.suse.com/1026985" source="BUGZILLA"/>
		<reference ref_id="1026986" ref_url="https://bugzilla.suse.com/1026986" source="BUGZILLA"/>
		<reference ref_id="1026987" ref_url="https://bugzilla.suse.com/1026987" source="BUGZILLA"/>
		<reference ref_id="1026988" ref_url="https://bugzilla.suse.com/1026988" source="BUGZILLA"/>
		<reference ref_id="949399" ref_url="https://bugzilla.suse.com/949399" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7747" ref_url="https://www.suse.com/security/cve/CVE-2015-7747/" source="CVE"/>
		<reference ref_id="CVE-2017-6827" ref_url="https://www.suse.com/security/cve/CVE-2017-6827/" source="CVE"/>
		<reference ref_id="CVE-2017-6828" ref_url="https://www.suse.com/security/cve/CVE-2017-6828/" source="CVE"/>
		<reference ref_id="CVE-2017-6829" ref_url="https://www.suse.com/security/cve/CVE-2017-6829/" source="CVE"/>
		<reference ref_id="CVE-2017-6830" ref_url="https://www.suse.com/security/cve/CVE-2017-6830/" source="CVE"/>
		<reference ref_id="CVE-2017-6831" ref_url="https://www.suse.com/security/cve/CVE-2017-6831/" source="CVE"/>
		<reference ref_id="CVE-2017-6832" ref_url="https://www.suse.com/security/cve/CVE-2017-6832/" source="CVE"/>
		<reference ref_id="CVE-2017-6833" ref_url="https://www.suse.com/security/cve/CVE-2017-6833/" source="CVE"/>
		<reference ref_id="CVE-2017-6834" ref_url="https://www.suse.com/security/cve/CVE-2017-6834/" source="CVE"/>
		<reference ref_id="CVE-2017-6835" ref_url="https://www.suse.com/security/cve/CVE-2017-6835/" source="CVE"/>
		<reference ref_id="CVE-2017-6836" ref_url="https://www.suse.com/security/cve/CVE-2017-6836/" source="CVE"/>
		<reference ref_id="CVE-2017-6837" ref_url="https://www.suse.com/security/cve/CVE-2017-6837/" source="CVE"/>
		<reference ref_id="CVE-2017-6838" ref_url="https://www.suse.com/security/cve/CVE-2017-6838/" source="CVE"/>
		<reference ref_id="CVE-2017-6839" ref_url="https://www.suse.com/security/cve/CVE-2017-6839/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002783.html" source="SUSE-SU"/>
		<description>

This audiofile update fixes the following issue:

Security issues fixed:
- CVE-2015-7747: Fixed buffer overflow issue when changing both number of channels and sample format. (bsc#949399)
- CVE-2017-6827: heap-based buffer overflow in MSADPCM::initializeCoefficients (MSADPCM.cpp) (bsc#1026979)
- CVE-2017-6828: heap-based buffer overflow in readValue (FileHandle.cpp) (bsc#1026980)
- CVE-2017-6829: global buffer overflow in decodeSample (IMA.cpp) (bsc#1026981)
- CVE-2017-6830: heap-based buffer overflow in alaw2linear_buf (G711.cpp) (bsc#1026982)
- CVE-2017-6831: heap-based buffer overflow in IMA::decodeBlockWAVE (IMA.cpp) (bsc#1026983)
- CVE-2017-6832: heap-based buffer overflow in MSADPCM::decodeBlock (MSADPCM.cpp) (bsc#1026984)
- CVE-2017-6833: divide-by-zero in BlockCodec::runPull (BlockCodec.cpp) (bsc#1026985)
- CVE-2017-6834: heap-based buffer overflow in ulaw2linear_buf (G711.cpp) (bsc#1026986)
- CVE-2017-6835: divide-by-zero in BlockCodec::reset1 (BlockCodec.cpp) (bsc#1026988)
- CVE-2017-6836: heap-based buffer overflow in Expand3To4Module::run (SimpleModule.h) (bsc#1026987)
- CVE-2017-6837, CVE-2017-6838, CVE-2017-6839: multiple ubsan crashes (bsc#1026978)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-05"/>
	<updated date="2017-04-05"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1026978">SUSE bug 1026978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026979">SUSE bug 1026979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026980">SUSE bug 1026980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026981">SUSE bug 1026981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026982">SUSE bug 1026982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026983">SUSE bug 1026983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026984">SUSE bug 1026984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026985">SUSE bug 1026985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026986">SUSE bug 1026986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026987">SUSE bug 1026987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026988">SUSE bug 1026988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949399">SUSE bug 949399</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7747/">CVE-2015-7747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6827/">CVE-2017-6827</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6828/">CVE-2017-6828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6829/">CVE-2017-6829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6830/">CVE-2017-6830</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6831/">CVE-2017-6831</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6832/">CVE-2017-6832</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6833/">CVE-2017-6833</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6834/">CVE-2017-6834</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6835/">CVE-2017-6835</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6836/">CVE-2017-6836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6837/">CVE-2017-6837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6838/">CVE-2017-6838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6839/">CVE-2017-6839</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517247" comment="audiofile-0.3.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517248" comment="libaudiofile1-0.3.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517249" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77769" version="1" class="patch">
	<metadata>
		<title>Security update for libpng15 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1017646" ref_url="https://bugzilla.suse.com/1017646" source="BUGZILLA"/>
		<reference ref_id="958791" ref_url="https://bugzilla.suse.com/958791" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002787.html" source="SUSE-SU"/>
		<description>

This update for libpng15 fixes the following issues:

Security issues fixed:
- CVE-2015-8540: read underflow in libpng (bsc#958791)
- CVE-2016-10087: NULL pointer dereference in png_set_text_2() (bsc#1017646)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-06"/>
	<updated date="2017-04-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017646">SUSE bug 1017646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958791">SUSE bug 958791</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517250" comment="libpng15-15-1.5.22-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77770" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1015400" ref_url="https://bugzilla.suse.com/1015400" source="BUGZILLA"/>
		<reference ref_id="1018088" ref_url="https://bugzilla.suse.com/1018088" source="BUGZILLA"/>
		<reference ref_id="1020353" ref_url="https://bugzilla.suse.com/1020353" source="BUGZILLA"/>
		<reference ref_id="1021868" ref_url="https://bugzilla.suse.com/1021868" source="BUGZILLA"/>
		<reference ref_id="1029497" ref_url="https://bugzilla.suse.com/1029497" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10251" ref_url="https://www.suse.com/security/cve/CVE-2016-10251/" source="CVE"/>
		<reference ref_id="CVE-2016-9583" ref_url="https://www.suse.com/security/cve/CVE-2016-9583/" source="CVE"/>
		<reference ref_id="CVE-2016-9600" ref_url="https://www.suse.com/security/cve/CVE-2016-9600/" source="CVE"/>
		<reference ref_id="CVE-2017-5498" ref_url="https://www.suse.com/security/cve/CVE-2017-5498/" source="CVE"/>
		<reference ref_id="CVE-2017-6850" ref_url="https://www.suse.com/security/cve/CVE-2017-6850/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002789.html" source="SUSE-SU"/>
		<description>

This update for jasper fixes the following issues:

Security issues fixed:
- CVE-2016-9600: Null Pointer Dereference due to missing check for UNKNOWN color space in JP2 encoder (bsc#1018088)
- CVE-2016-10251: Use of uninitialized value in jpc_pi_nextcprl (jpc_t2cod.c) (bsc#1029497)
- CVE-2017-5498: left-shift undefined behaviour (bsc#1020353)
- CVE-2017-6850: NULL pointer dereference in jp2_cdef_destroy (jp2_cod.c) (bsc#1021868)
- CVE-2016-9583: Out of bounds heap read in jpc_pi_nextpcrl() (bsc#1015400)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-06"/>
	<updated date="2017-04-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015400">SUSE bug 1015400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018088">SUSE bug 1018088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020353">SUSE bug 1020353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021868">SUSE bug 1021868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029497">SUSE bug 1029497</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10251/">CVE-2016-10251</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9583/">CVE-2016-9583</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9600/">CVE-2016-9600</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5498/">CVE-2017-5498</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6850/">CVE-2017-6850</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517251" comment="libjasper1-1.900.14-194.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517252" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77771" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1024051" ref_url="https://bugzilla.suse.com/1024051" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5838" ref_url="https://www.suse.com/security/cve/CVE-2017-5838/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002792.html" source="SUSE-SU"/>
		<description>

This update for gstreamer fixes the following security issues:

- A crafted AVI file could have caused an invalid memory read, possibly
  causing DoS or corruption (bsc#1024051, CVE-2017-5838)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-07"/>
	<updated date="2017-04-07"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1024051">SUSE bug 1024051</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5838/">CVE-2017-5838</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517253" comment="gstreamer-1.2.4-2.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517254" comment="gstreamer-lang-1.2.4-2.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517255" comment="gstreamer-utils-1.2.4-2.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517256" comment="libgstreamer-1_0-0-1.2.4-2.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517257" comment="libgstreamer-1_0-0-32bit-1.2.4-2.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517258" comment="typelib-1_0-Gst-1_0-1.2.4-2.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77772" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1033619" ref_url="https://bugzilla.suse.com/1033619" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3058" ref_url="https://www.suse.com/security/cve/CVE-2017-3058/" source="CVE"/>
		<reference ref_id="CVE-2017-3059" ref_url="https://www.suse.com/security/cve/CVE-2017-3059/" source="CVE"/>
		<reference ref_id="CVE-2017-3060" ref_url="https://www.suse.com/security/cve/CVE-2017-3060/" source="CVE"/>
		<reference ref_id="CVE-2017-3061" ref_url="https://www.suse.com/security/cve/CVE-2017-3061/" source="CVE"/>
		<reference ref_id="CVE-2017-3062" ref_url="https://www.suse.com/security/cve/CVE-2017-3062/" source="CVE"/>
		<reference ref_id="CVE-2017-3063" ref_url="https://www.suse.com/security/cve/CVE-2017-3063/" source="CVE"/>
		<reference ref_id="CVE-2017-3064" ref_url="https://www.suse.com/security/cve/CVE-2017-3064/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00014.html" source="SUSE-SU"/>
		<description>

Adobe flash-player was updated to 25.0.0.148 to fix the following issues:

- Vulnerabilities fixed as advised under APSB17-10:

  * Use-after-free vulnerabilities that could lead to code execution
    (CVE-2017-3058, CVE-2017-3059, CVE-2017-3062, CVE-2017-3063). 
  * Resolve memory corruption vulnerabilities that could lead to code
    execution (CVE-2017-3060, CVE-2017-3061, CVE-2017-3064).

- Details:
  https://helpx.adobe.com/security/products/flash-player/apsb17-10.html
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-12"/>
	<updated date="2017-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1033619">SUSE bug 1033619</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3058/">CVE-2017-3058</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3059/">CVE-2017-3059</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3060/">CVE-2017-3060</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3061/">CVE-2017-3061</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3062/">CVE-2017-3062</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3063/">CVE-2017-3063</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3064/">CVE-2017-3064</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517259" comment="flash-player-25.0.0.148-165.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517260" comment="flash-player-gnome-25.0.0.148-165.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77773" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1020983" ref_url="https://bugzilla.suse.com/1020983" source="BUGZILLA"/>
		<reference ref_id="1033466" ref_url="https://bugzilla.suse.com/1033466" source="BUGZILLA"/>
		<reference ref_id="1033467" ref_url="https://bugzilla.suse.com/1033467" source="BUGZILLA"/>
		<reference ref_id="1033468" ref_url="https://bugzilla.suse.com/1033468" source="BUGZILLA"/>
		<reference ref_id="987866" ref_url="https://bugzilla.suse.com/987866" source="BUGZILLA"/>
		<reference ref_id="989528" ref_url="https://bugzilla.suse.com/989528" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2775" ref_url="https://www.suse.com/security/cve/CVE-2016-2775/" source="CVE"/>
		<reference ref_id="CVE-2016-6170" ref_url="https://www.suse.com/security/cve/CVE-2016-6170/" source="CVE"/>
		<reference ref_id="CVE-2017-3136" ref_url="https://www.suse.com/security/cve/CVE-2017-3136/" source="CVE"/>
		<reference ref_id="CVE-2017-3137" ref_url="https://www.suse.com/security/cve/CVE-2017-3137/" source="CVE"/>
		<reference ref_id="CVE-2017-3138" ref_url="https://www.suse.com/security/cve/CVE-2017-3138/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00015.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

CVE-2017-3137 (bsc#1033467):
Mistaken assumptions about the ordering of records in the answer
section of a response containing CNAME or DNAME resource records
could have been exploited to cause a denial of service of a bind
server performing recursion.

CVE-2017-3136 (bsc#1033466):
An attacker could have constructed a query that would cause a denial
of service of servers configured to use DNS64.

CVE-2017-3138 (bsc#1033468):
An attacker with access to the BIND control channel could have caused
the server to stop by triggering an assertion failure.

CVE-2016-6170 (bsc#987866):
Primary DNS servers could have caused a denial of service of secondary DNS servers via a large AXFR response.
IXFR servers could have caused a denial of service of IXFR clients via a large IXFR response.
Remote authenticated users could have caused a denial of service of primary DNS servers via a large UPDATE message.

CVE-2016-2775 (bsc#989528):
When lwresd or the named lwres option were enabled, bind allowed remote attackers to cause a denial of service 
(daemon crash) via a long request that uses the lightweight resolver protocol.

One additional non-security bug was fixed:

The default umask was changed to 077. (bsc#1020983)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-13"/>
	<updated date="2017-04-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020983">SUSE bug 1020983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033467">SUSE bug 1033467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033468">SUSE bug 1033468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987866">SUSE bug 987866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989528">SUSE bug 989528</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2775/">CVE-2016-2775</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6170/">CVE-2016-6170</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3136/">CVE-2017-3136</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3137/">CVE-2017-3137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3138/">CVE-2017-3138</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517261" comment="bind-libs-9.9.9P1-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517262" comment="bind-libs-32bit-9.9.9P1-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517263" comment="bind-utils-9.9.9P1-59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77774" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-base (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1024076" ref_url="https://bugzilla.suse.com/1024076" source="BUGZILLA"/>
		<reference ref_id="1024079" ref_url="https://bugzilla.suse.com/1024079" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5837" ref_url="https://www.suse.com/security/cve/CVE-2017-5837/" source="CVE"/>
		<reference ref_id="CVE-2017-5844" ref_url="https://www.suse.com/security/cve/CVE-2017-5844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002802.html" source="SUSE-SU"/>
		<description>

This update for gstreamer-0_10-plugins-base fixes the following issues:

- A crafted AVI file could have caused a floating point exception leading to
  DoS (bsc#1024076, CVE-2017-5837, bsc#1024079, CVE-2017-5844)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-13"/>
	<updated date="2017-04-13"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1024076">SUSE bug 1024076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024079">SUSE bug 1024079</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5837/">CVE-2017-5837</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5844/">CVE-2017-5844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517264" comment="gstreamer-0_10-plugins-base-0.10.36-11.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517265" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-11.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517266" comment="gstreamer-0_10-plugins-base-lang-0.10.36-11.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517267" comment="libgstapp-0_10-0-0.10.36-11.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517268" comment="libgstapp-0_10-0-32bit-0.10.36-11.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517269" comment="libgstinterfaces-0_10-0-0.10.36-11.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517270" comment="libgstinterfaces-0_10-0-32bit-0.10.36-11.6.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77775" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-good (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1024014" ref_url="https://bugzilla.suse.com/1024014" source="BUGZILLA"/>
		<reference ref_id="1024017" ref_url="https://bugzilla.suse.com/1024017" source="BUGZILLA"/>
		<reference ref_id="1024034" ref_url="https://bugzilla.suse.com/1024034" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10198" ref_url="https://www.suse.com/security/cve/CVE-2016-10198/" source="CVE"/>
		<reference ref_id="CVE-2016-10199" ref_url="https://www.suse.com/security/cve/CVE-2016-10199/" source="CVE"/>
		<reference ref_id="CVE-2017-5840" ref_url="https://www.suse.com/security/cve/CVE-2017-5840/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002799.html" source="SUSE-SU"/>
		<description>

This update for gstreamer-plugins-good fixes the following issues:

- A crafted aac audio file could have caused an invalid read and thus
  corruption or denial of service (bsc#1024014, CVE-2016-10198)
- A crafted mp4 file could have caused an invalid read and thus corruption or
  denial of service (bsc#1024017, CVE-2016-10199)
- A crafted avi file could have caused an invalid read and thus corruption or
  denial of service (bsc#1024034, CVE-2017-5840)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-13"/>
	<updated date="2017-04-13"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1024014">SUSE bug 1024014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024017">SUSE bug 1024017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024034">SUSE bug 1024034</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10198/">CVE-2016-10198</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10199/">CVE-2016-10199</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5840/">CVE-2017-5840</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517271" comment="gstreamer-plugins-good-1.2.4-2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517272" comment="gstreamer-plugins-good-lang-1.2.4-2.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77776" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-base (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1024041" ref_url="https://bugzilla.suse.com/1024041" source="BUGZILLA"/>
		<reference ref_id="1024047" ref_url="https://bugzilla.suse.com/1024047" source="BUGZILLA"/>
		<reference ref_id="1024076" ref_url="https://bugzilla.suse.com/1024076" source="BUGZILLA"/>
		<reference ref_id="1024079" ref_url="https://bugzilla.suse.com/1024079" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5837" ref_url="https://www.suse.com/security/cve/CVE-2017-5837/" source="CVE"/>
		<reference ref_id="CVE-2017-5839" ref_url="https://www.suse.com/security/cve/CVE-2017-5839/" source="CVE"/>
		<reference ref_id="CVE-2017-5842" ref_url="https://www.suse.com/security/cve/CVE-2017-5842/" source="CVE"/>
		<reference ref_id="CVE-2017-5844" ref_url="https://www.suse.com/security/cve/CVE-2017-5844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002807.html" source="SUSE-SU"/>
		<description>

This update for gstreamer-plugins-base fixes the following security issues:

- A crafted AVI file could have caused a floating point exception leading to
  DoS (bsc#1024076, CVE-2017-5837, bsc#1024079, CVE-2017-5844)
- A crafted AVI file could have caused a stack overflow leading to DoS
  (bsc#1024047, CVE-2017-5839)
- A crafted SAMI subtitle file could have caused an invalid memory access
  possibly leading to DoS or corruption (bsc#1024041, CVE-2017-5842)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1024041">SUSE bug 1024041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024047">SUSE bug 1024047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024076">SUSE bug 1024076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024079">SUSE bug 1024079</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5837/">CVE-2017-5837</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5839/">CVE-2017-5839</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5842/">CVE-2017-5842</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5844/">CVE-2017-5844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517273" comment="gstreamer-plugins-base-1.2.4-2.6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517274" comment="gstreamer-plugins-base-lang-1.2.4-2.6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517275" comment="libgstallocators-1_0-0-1.2.4-2.6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517276" comment="libgstapp-1_0-0-1.2.4-2.6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517277" comment="libgstapp-1_0-0-32bit-1.2.4-2.6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517278" comment="libgstaudio-1_0-0-1.2.4-2.6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517279" comment="libgstaudio-1_0-0-32bit-1.2.4-2.6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517280" comment="libgstfft-1_0-0-1.2.4-2.6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517281" comment="libgstfft-1_0-0-32bit-1.2.4-2.6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517282" comment="libgstpbutils-1_0-0-1.2.4-2.6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517283" comment="libgstpbutils-1_0-0-32bit-1.2.4-2.6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517284" comment="libgstriff-1_0-0-1.2.4-2.6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517285" comment="libgstrtp-1_0-0-1.2.4-2.6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517286" comment="libgstrtsp-1_0-0-1.2.4-2.6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517287" comment="libgstsdp-1_0-0-1.2.4-2.6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517288" comment="libgsttag-1_0-0-1.2.4-2.6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517289" comment="libgsttag-1_0-0-32bit-1.2.4-2.6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517290" comment="libgstvideo-1_0-0-1.2.4-2.6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517291" comment="libgstvideo-1_0-0-32bit-1.2.4-2.6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517292" comment="typelib-1_0-GstAudio-1_0-1.2.4-2.6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517293" comment="typelib-1_0-GstPbutils-1_0-1.2.4-2.6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517294" comment="typelib-1_0-GstTag-1_0-1.2.4-2.6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517295" comment="typelib-1_0-GstVideo-1_0-1.2.4-2.6.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77777" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1033053" ref_url="https://bugzilla.suse.com/1033053" source="BUGZILLA"/>
		<reference ref_id="1033054" ref_url="https://bugzilla.suse.com/1033054" source="BUGZILLA"/>
		<reference ref_id="1033914" ref_url="https://bugzilla.suse.com/1033914" source="BUGZILLA"/>
		<reference ref_id="1033915" ref_url="https://bugzilla.suse.com/1033915" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7585" ref_url="https://www.suse.com/security/cve/CVE-2017-7585/" source="CVE"/>
		<reference ref_id="CVE-2017-7586" ref_url="https://www.suse.com/security/cve/CVE-2017-7586/" source="CVE"/>
		<reference ref_id="CVE-2017-7741" ref_url="https://www.suse.com/security/cve/CVE-2017-7741/" source="CVE"/>
		<reference ref_id="CVE-2017-7742" ref_url="https://www.suse.com/security/cve/CVE-2017-7742/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002806.html" source="SUSE-SU"/>
		<description>

This update for libsndfile fixes the following security issues:

- CVE-2017-7586: A stack-based buffer overflow via a specially crafted FLAC
  file was fixed (error in the 'header_read()' function) (bsc#1033053)
- CVE-2017-7585,CVE-2017-7741, CVE-2017-7742: Several stack-based buffer overflows via a specially crafted FLAC
  file (error in the 'flac_buffer_copy()' function) were fixed (bsc#1033054,bsc#1033915,bsc#1033914).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033053">SUSE bug 1033053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033054">SUSE bug 1033054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033914">SUSE bug 1033914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033915">SUSE bug 1033915</bugzilla>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7585/">CVE-2017-7585</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7586/">CVE-2017-7586</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7741/">CVE-2017-7741</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7742/">CVE-2017-7742</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517296" comment="libsndfile1-1.0.25-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517297" comment="libsndfile1-32bit-1.0.25-28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77778" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1015332" ref_url="https://bugzilla.suse.com/1015332" source="BUGZILLA"/>
		<reference ref_id="1027712" ref_url="https://bugzilla.suse.com/1027712" source="BUGZILLA"/>
		<reference ref_id="1032309" ref_url="https://bugzilla.suse.com/1032309" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9586" ref_url="https://www.suse.com/security/cve/CVE-2016-9586/" source="CVE"/>
		<reference ref_id="CVE-2017-7407" ref_url="https://www.suse.com/security/cve/CVE-2017-7407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002808.html" source="SUSE-SU"/>
		<description>

This update for curl fixes the following issues:

Security issue fixed:

- CVE-2016-9586: libcurl printf floating point buffer overflow (bsc#1015332)
- CVE-2017-7407: The ourWriteOut function in tool_writeout.c in curl might have allowed physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which lead to a heap-based buffer over-read (bsc#1032309).

With this release new default ciphers are active (SUSE_DEFAULT, bsc#1027712).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015332">SUSE bug 1015332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027712">SUSE bug 1027712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032309">SUSE bug 1032309</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9586/">CVE-2016-9586</cve>
	<cve impact="moderate" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7407/">CVE-2017-7407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517298" comment="curl-7.37.0-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517299" comment="libcurl4-7.37.0-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517300" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77779" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1031247" ref_url="https://bugzilla.suse.com/1031247" source="BUGZILLA"/>
		<reference ref_id="1031249" ref_url="https://bugzilla.suse.com/1031249" source="BUGZILLA"/>
		<reference ref_id="1031250" ref_url="https://bugzilla.suse.com/1031250" source="BUGZILLA"/>
		<reference ref_id="1031254" ref_url="https://bugzilla.suse.com/1031254" source="BUGZILLA"/>
		<reference ref_id="1031255" ref_url="https://bugzilla.suse.com/1031255" source="BUGZILLA"/>
		<reference ref_id="1031262" ref_url="https://bugzilla.suse.com/1031262" source="BUGZILLA"/>
		<reference ref_id="1031263" ref_url="https://bugzilla.suse.com/1031263" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10266" ref_url="https://www.suse.com/security/cve/CVE-2016-10266/" source="CVE"/>
		<reference ref_id="CVE-2016-10267" ref_url="https://www.suse.com/security/cve/CVE-2016-10267/" source="CVE"/>
		<reference ref_id="CVE-2016-10268" ref_url="https://www.suse.com/security/cve/CVE-2016-10268/" source="CVE"/>
		<reference ref_id="CVE-2016-10269" ref_url="https://www.suse.com/security/cve/CVE-2016-10269/" source="CVE"/>
		<reference ref_id="CVE-2016-10270" ref_url="https://www.suse.com/security/cve/CVE-2016-10270/" source="CVE"/>
		<reference ref_id="CVE-2016-10271" ref_url="https://www.suse.com/security/cve/CVE-2016-10271/" source="CVE"/>
		<reference ref_id="CVE-2016-10272" ref_url="https://www.suse.com/security/cve/CVE-2016-10272/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00019.html" source="SUSE-SU"/>
		<description>

This update for tiff fixes the following issues:

Security issues fixed:
- CVE-2016-10272: LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based
  buffer overflow) or possibly have unspecified other impact via a crafted TIFF image, related to
  'WRITE of size 2048' and libtiff/tif_next.c:64:9 (bsc#1031247).
- CVE-2016-10271: tools/tiffcrop.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of
  service (heap-based buffer over-read and buffer overflow) or possibly have unspecified other
  impact via a crafted TIFF image, related to 'READ of size 1' and libtiff/tif_fax3.c:413:13
  (bsc#1031249).
- CVE-2016-10270: LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based
  buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to
  'READ of size 8' and libtiff/tif_read.c:523:22 (bsc#1031250).
- CVE-2016-10269: LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based
  buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to
  'READ of size 512' and libtiff/tif_unix.c:340:2 (bsc#1031254).
- CVE-2016-10268: tools/tiffcp.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of
  service (integer underflow and heap-based buffer under-read) or possibly have unspecified other
  impact via a crafted TIFF image, related to 'READ of size 78490' and libtiff/tif_unix.c:115:23
  (bsc#1031255).
- CVE-2016-10267: LibTIFF 4.0.7 allows remote attackers to cause a denial of service
  (divide-by-zero error and application crash) via a crafted TIFF image, related to
  libtiff/tif_ojpeg.c:816:8 (bsc#1031262).
- CVE-2016-10266: LibTIFF 4.0.7 allows remote attackers to cause a denial of service
  (divide-by-zero error and application crash) via a crafted TIFF image, related to
  libtiff/tif_read.c:351:22. (bsc#1031263).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1031247">SUSE bug 1031247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031249">SUSE bug 1031249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031250">SUSE bug 1031250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031254">SUSE bug 1031254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031255">SUSE bug 1031255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031262">SUSE bug 1031262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031263">SUSE bug 1031263</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10266/">CVE-2016-10266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10267/">CVE-2016-10267</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10268/">CVE-2016-10268</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10269/">CVE-2016-10269</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10270/">CVE-2016-10270</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10271/">CVE-2016-10271</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10272/">CVE-2016-10272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517301" comment="libtiff5-4.0.7-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517302" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77780" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1014172" ref_url="https://bugzilla.suse.com/1014172" source="BUGZILLA"/>
		<reference ref_id="1030050" ref_url="https://bugzilla.suse.com/1030050" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9042" ref_url="https://www.suse.com/security/cve/CVE-2016-9042/" source="CVE"/>
		<reference ref_id="CVE-2017-6451" ref_url="https://www.suse.com/security/cve/CVE-2017-6451/" source="CVE"/>
		<reference ref_id="CVE-2017-6458" ref_url="https://www.suse.com/security/cve/CVE-2017-6458/" source="CVE"/>
		<reference ref_id="CVE-2017-6460" ref_url="https://www.suse.com/security/cve/CVE-2017-6460/" source="CVE"/>
		<reference ref_id="CVE-2017-6462" ref_url="https://www.suse.com/security/cve/CVE-2017-6462/" source="CVE"/>
		<reference ref_id="CVE-2017-6463" ref_url="https://www.suse.com/security/cve/CVE-2017-6463/" source="CVE"/>
		<reference ref_id="CVE-2017-6464" ref_url="https://www.suse.com/security/cve/CVE-2017-6464/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002812.html" source="SUSE-SU"/>
		<description>

This ntp update to version 4.2.8p10 fixes serveral issues.

This updated enables leap smearing. See
/usr/share/doc/packages/ntp/README.leapsmear for details.

Security issues fixed (bsc#1030050):

- CVE-2017-6464: Denial of Service via Malformed Config
- CVE-2017-6462: Buffer Overflow in DPTS Clock
- CVE-2017-6463: Authenticated DoS via Malicious Config Option
- CVE-2017-6458: Potential Overflows in ctl_put() functions
- CVE-2017-6451: Improper use of snprintf() in mx4200_send()
- CVE-2017-6460: Buffer Overflow in ntpq when fetching reslist
- CVE-2016-9042: 0rigin (zero origin) DoS.
- ntpq_stripquotes() returns incorrect Value
- ereallocarray()/eallocarray() underused
- Copious amounts of Unused Code
- Off-by-one in Oncore GPS Receiver
- Makefile does not enforce Security Flags

Bugfixes:

- Remove spurious log messages (bsc#1014172).
- clang scan-build findings
- Support for openssl-1.1.0 without compatibility modes
- Bugfix 3072 breaks multicastclient
- forking async worker: interrupted pipe I/O
- (...) time_pps_create: Exec format error
- Incorrect Logic for Peer Event Limiting
- Change the process name of forked DNS worker
- Trap Configuration Fail
- Nothing happens if minsane &lt; maxclock &lt; minclock
- allow -4/-6 on restrict line with mask
- out-of-bound pointers in ctl_putsys and decode_bitflags
- Move ntp-kod to /var/lib/ntp, because /var/db is not a standard directory and causes problems for
  transactional updates.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1014172">SUSE bug 1014172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9042/">CVE-2016-9042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6451/">CVE-2017-6451</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6458/">CVE-2017-6458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6460/">CVE-2017-6460</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6462/">CVE-2017-6462</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6463/">CVE-2017-6463</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6464/">CVE-2017-6464</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517303" comment="ntp-4.2.8p10-60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517304" comment="ntp-doc-4.2.8p10-60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77781" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1014863" ref_url="https://bugzilla.suse.com/1014863" source="BUGZILLA"/>
		<reference ref_id="1018808" ref_url="https://bugzilla.suse.com/1018808" source="BUGZILLA"/>
		<reference ref_id="887877" ref_url="https://bugzilla.suse.com/887877" source="BUGZILLA"/>
		<reference ref_id="909695" ref_url="https://bugzilla.suse.com/909695" source="BUGZILLA"/>
		<reference ref_id="926974" ref_url="https://bugzilla.suse.com/926974" source="BUGZILLA"/>
		<reference ref_id="936032" ref_url="https://bugzilla.suse.com/936032" source="BUGZILLA"/>
		<reference ref_id="959495" ref_url="https://bugzilla.suse.com/959495" source="BUGZILLA"/>
		<reference ref_id="986630" ref_url="https://bugzilla.suse.com/986630" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4975" ref_url="https://www.suse.com/security/cve/CVE-2014-4975/" source="CVE"/>
		<reference ref_id="CVE-2015-1855" ref_url="https://www.suse.com/security/cve/CVE-2015-1855/" source="CVE"/>
		<reference ref_id="CVE-2015-3900" ref_url="https://www.suse.com/security/cve/CVE-2015-3900/" source="CVE"/>
		<reference ref_id="CVE-2015-7551" ref_url="https://www.suse.com/security/cve/CVE-2015-7551/" source="CVE"/>
		<reference ref_id="CVE-2016-2339" ref_url="https://www.suse.com/security/cve/CVE-2016-2339/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00024.html" source="SUSE-SU"/>
		<description>

This ruby2.1 update to version 2.1.9 fixes the following issues:

Security issues fixed:
- CVE-2016-2339: heap overflow vulnerability in the Fiddle::Function.new'initialize' (bsc#1018808)
- CVE-2015-7551: Unsafe tainted string usage in Fiddle and DL (bsc#959495)
- CVE-2015-3900: hostname validation does not work when fetching gems or making API requests (bsc#936032)
- CVE-2015-1855: Ruby'a OpenSSL extension suffers a vulnerability through overly permissive matching of
  hostnames (bsc#926974)
- CVE-2014-4975: off-by-one stack-based buffer overflow in the encodes() function (bsc#887877)

Bugfixes:
- SUSEconnect doesn't handle domain wildcards in no_proxy environment variable properly (bsc#1014863)
- Segmentation fault after pack &amp; ioctl &amp; unpack (bsc#909695)
- Ruby:HTTP Header injection in 'net/http' (bsc#986630)

ChangeLog:
- http://svn.ruby-lang.org/repos/ruby/tags/v2_1_9/ChangeLog
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-20"/>
	<updated date="2017-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1014863">SUSE bug 1014863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018808">SUSE bug 1018808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887877">SUSE bug 887877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909695">SUSE bug 909695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926974">SUSE bug 926974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936032">SUSE bug 936032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959495">SUSE bug 959495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986630">SUSE bug 986630</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-4975/">CVE-2014-4975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1855/">CVE-2015-1855</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3900/">CVE-2015-3900</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7551/">CVE-2015-7551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2339/">CVE-2016-2339</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517305" comment="libruby2_1-2_1-2.1.9-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517306" comment="ruby2.1-2.1.9-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517307" comment="ruby2.1-stdlib-2.1.9-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77782" version="1" class="patch">
	<metadata>
		<title>Security update for minicom (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1033783" ref_url="https://bugzilla.suse.com/1033783" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7467" ref_url="https://www.suse.com/security/cve/CVE-2017-7467/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002823.html" source="SUSE-SU"/>
		<description>

This update for minicom fixes the following issue:

This security issue was fixed:

- CVE-2017-7467: Invalid cursor coordinates and scroll regions could lead to code execution (bsc#1033783).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-21"/>
	<updated date="2017-04-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033783">SUSE bug 1033783</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7467/">CVE-2017-7467</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517308" comment="minicom-2.7-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77783" version="1" class="patch">
	<metadata>
		<title>Security update for tigervnc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1031875" ref_url="https://bugzilla.suse.com/1031875" source="BUGZILLA"/>
		<reference ref_id="1031877" ref_url="https://bugzilla.suse.com/1031877" source="BUGZILLA"/>
		<reference ref_id="1031879" ref_url="https://bugzilla.suse.com/1031879" source="BUGZILLA"/>
		<reference ref_id="1031886" ref_url="https://bugzilla.suse.com/1031886" source="BUGZILLA"/>
		<reference ref_id="1032880" ref_url="https://bugzilla.suse.com/1032880" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7392" ref_url="https://www.suse.com/security/cve/CVE-2017-7392/" source="CVE"/>
		<reference ref_id="CVE-2017-7393" ref_url="https://www.suse.com/security/cve/CVE-2017-7393/" source="CVE"/>
		<reference ref_id="CVE-2017-7394" ref_url="https://www.suse.com/security/cve/CVE-2017-7394/" source="CVE"/>
		<reference ref_id="CVE-2017-7395" ref_url="https://www.suse.com/security/cve/CVE-2017-7395/" source="CVE"/>
		<reference ref_id="CVE-2017-7396" ref_url="https://www.suse.com/security/cve/CVE-2017-7396/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002824.html" source="SUSE-SU"/>
		<description>

This update for tigervnc provides the several fixes.

These security issues were fixed:

- CVE-2017-7392, CVE-2017-7396: Client can cause leak in VNC server (bsc#1031886)
- CVE-2017-7395: Authenticated VNC client can crash VNC server (bsc#1031877)
- CVE-2017-7394: Client can crash or block VNC server (bsc#1031879)
- CVE-2017-7393: Authenticated client can cause double free in VNC server (bsc#1031875)
- Prevent buffer overflow in VNC client, allowing for crashing the client (bnc#1032880)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-22"/>
	<updated date="2017-04-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1031875">SUSE bug 1031875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031877">SUSE bug 1031877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031879">SUSE bug 1031879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031886">SUSE bug 1031886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032880">SUSE bug 1032880</bugzilla>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7392/">CVE-2017-7392</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7393/">CVE-2017-7393</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7394/">CVE-2017-7394</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7395/">CVE-2017-7395</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7396/">CVE-2017-7396</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517309" comment="tigervnc-1.4.3-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517310" comment="xorg-x11-Xvnc-1.4.3-24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77784" version="1" class="patch">
	<metadata>
		<title>Security update for zziplib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1024517" ref_url="https://bugzilla.suse.com/1024517" source="BUGZILLA"/>
		<reference ref_id="1024528" ref_url="https://bugzilla.suse.com/1024528" source="BUGZILLA"/>
		<reference ref_id="1024531" ref_url="https://bugzilla.suse.com/1024531" source="BUGZILLA"/>
		<reference ref_id="1024532" ref_url="https://bugzilla.suse.com/1024532" source="BUGZILLA"/>
		<reference ref_id="1024533" ref_url="https://bugzilla.suse.com/1024533" source="BUGZILLA"/>
		<reference ref_id="1024534" ref_url="https://bugzilla.suse.com/1024534" source="BUGZILLA"/>
		<reference ref_id="1024535" ref_url="https://bugzilla.suse.com/1024535" source="BUGZILLA"/>
		<reference ref_id="1024536" ref_url="https://bugzilla.suse.com/1024536" source="BUGZILLA"/>
		<reference ref_id="1024537" ref_url="https://bugzilla.suse.com/1024537" source="BUGZILLA"/>
		<reference ref_id="1024539" ref_url="https://bugzilla.suse.com/1024539" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5974" ref_url="https://www.suse.com/security/cve/CVE-2017-5974/" source="CVE"/>
		<reference ref_id="CVE-2017-5975" ref_url="https://www.suse.com/security/cve/CVE-2017-5975/" source="CVE"/>
		<reference ref_id="CVE-2017-5976" ref_url="https://www.suse.com/security/cve/CVE-2017-5976/" source="CVE"/>
		<reference ref_id="CVE-2017-5977" ref_url="https://www.suse.com/security/cve/CVE-2017-5977/" source="CVE"/>
		<reference ref_id="CVE-2017-5978" ref_url="https://www.suse.com/security/cve/CVE-2017-5978/" source="CVE"/>
		<reference ref_id="CVE-2017-5979" ref_url="https://www.suse.com/security/cve/CVE-2017-5979/" source="CVE"/>
		<reference ref_id="CVE-2017-5980" ref_url="https://www.suse.com/security/cve/CVE-2017-5980/" source="CVE"/>
		<reference ref_id="CVE-2017-5981" ref_url="https://www.suse.com/security/cve/CVE-2017-5981/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002826.html" source="SUSE-SU"/>
		<description>

This update for zziplib fixes the following issues:

Secuirty issues fixed:
- CVE-2017-5974: heap-based buffer overflow in __zzip_get32 (fetch.c) (bsc#1024517)
- CVE-2017-5975: heap-based buffer overflow in __zzip_get64 (fetch.c) (bsc#1024528)
- CVE-2017-5976: heap-based buffer overflow in zzip_mem_entry_extra_block (memdisk.c) (bsc#1024531)
- CVE-2017-5977: invalid memory read in zzip_mem_entry_extra_block (memdisk.c) (bsc#1024534)
- CVE-2017-5978: out of bounds read in zzip_mem_entry_new (memdisk.c) (bsc#1024533)
- CVE-2017-5979: NULL pointer dereference in prescan_entry (fseeko.c) (bsc#1024535)
- CVE-2017-5980: NULL pointer dereference in zzip_mem_entry_new (memdisk.c) (bsc#1024536)
- CVE-2017-5981: assertion failure in seeko.c (bsc#1024539)
- NULL pointer dereference in main (unzzipcat-mem.c) (bsc#1024532)
- NULL pointer dereference in main (unzzipcat.c) (bsc#1024537)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-24"/>
	<updated date="2017-04-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024517">SUSE bug 1024517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024528">SUSE bug 1024528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024531">SUSE bug 1024531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024532">SUSE bug 1024532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024533">SUSE bug 1024533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024534">SUSE bug 1024534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024535">SUSE bug 1024535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024536">SUSE bug 1024536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024537">SUSE bug 1024537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024539">SUSE bug 1024539</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5974/">CVE-2017-5974</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5975/">CVE-2017-5975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5976/">CVE-2017-5976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5977/">CVE-2017-5977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5978/">CVE-2017-5978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5979/">CVE-2017-5979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5980/">CVE-2017-5980</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5981/">CVE-2017-5981</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517311" comment="libzzip-0-13-0.13.62-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77785" version="1" class="patch">
	<metadata>
		<title>Security update for dpkg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="957160" ref_url="https://bugzilla.suse.com/957160" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0860" ref_url="https://www.suse.com/security/cve/CVE-2015-0860/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002827.html" source="SUSE-SU"/>
		<description>

This update for dpkg fixes the following issues:

This security issue was fixed:

- CVE-2015-0860: Off-by-one error in the extracthalf function in dpkg-deb/extract.c in the dpkg-deb component in dpkg allowed remote attackers to execute arbitrary code via the archive magic version number in an 'old-style' Debian binary package, which triggered a stack-based buffer overflow (bsc#957160).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-24"/>
	<updated date="2017-04-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/957160">SUSE bug 957160</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0860/">CVE-2015-0860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517312" comment="update-alternatives-1.16.10-12.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77786" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump, libpcap (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1020940" ref_url="https://bugzilla.suse.com/1020940" source="BUGZILLA"/>
		<reference ref_id="1035686" ref_url="https://bugzilla.suse.com/1035686" source="BUGZILLA"/>
		<reference ref_id="905870" ref_url="https://bugzilla.suse.com/905870" source="BUGZILLA"/>
		<reference ref_id="905871" ref_url="https://bugzilla.suse.com/905871" source="BUGZILLA"/>
		<reference ref_id="905872" ref_url="https://bugzilla.suse.com/905872" source="BUGZILLA"/>
		<reference ref_id="922220" ref_url="https://bugzilla.suse.com/922220" source="BUGZILLA"/>
		<reference ref_id="922221" ref_url="https://bugzilla.suse.com/922221" source="BUGZILLA"/>
		<reference ref_id="922222" ref_url="https://bugzilla.suse.com/922222" source="BUGZILLA"/>
		<reference ref_id="922223" ref_url="https://bugzilla.suse.com/922223" source="BUGZILLA"/>
		<reference ref_id="927637" ref_url="https://bugzilla.suse.com/927637" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8767" ref_url="https://www.suse.com/security/cve/CVE-2014-8767/" source="CVE"/>
		<reference ref_id="CVE-2014-8768" ref_url="https://www.suse.com/security/cve/CVE-2014-8768/" source="CVE"/>
		<reference ref_id="CVE-2014-8769" ref_url="https://www.suse.com/security/cve/CVE-2014-8769/" source="CVE"/>
		<reference ref_id="CVE-2015-0261" ref_url="https://www.suse.com/security/cve/CVE-2015-0261/" source="CVE"/>
		<reference ref_id="CVE-2015-2153" ref_url="https://www.suse.com/security/cve/CVE-2015-2153/" source="CVE"/>
		<reference ref_id="CVE-2015-2154" ref_url="https://www.suse.com/security/cve/CVE-2015-2154/" source="CVE"/>
		<reference ref_id="CVE-2015-2155" ref_url="https://www.suse.com/security/cve/CVE-2015-2155/" source="CVE"/>
		<reference ref_id="CVE-2015-3138" ref_url="https://www.suse.com/security/cve/CVE-2015-3138/" source="CVE"/>
		<reference ref_id="CVE-2016-7922" ref_url="https://www.suse.com/security/cve/CVE-2016-7922/" source="CVE"/>
		<reference ref_id="CVE-2016-7923" ref_url="https://www.suse.com/security/cve/CVE-2016-7923/" source="CVE"/>
		<reference ref_id="CVE-2016-7924" ref_url="https://www.suse.com/security/cve/CVE-2016-7924/" source="CVE"/>
		<reference ref_id="CVE-2016-7925" ref_url="https://www.suse.com/security/cve/CVE-2016-7925/" source="CVE"/>
		<reference ref_id="CVE-2016-7926" ref_url="https://www.suse.com/security/cve/CVE-2016-7926/" source="CVE"/>
		<reference ref_id="CVE-2016-7927" ref_url="https://www.suse.com/security/cve/CVE-2016-7927/" source="CVE"/>
		<reference ref_id="CVE-2016-7928" ref_url="https://www.suse.com/security/cve/CVE-2016-7928/" source="CVE"/>
		<reference ref_id="CVE-2016-7929" ref_url="https://www.suse.com/security/cve/CVE-2016-7929/" source="CVE"/>
		<reference ref_id="CVE-2016-7930" ref_url="https://www.suse.com/security/cve/CVE-2016-7930/" source="CVE"/>
		<reference ref_id="CVE-2016-7931" ref_url="https://www.suse.com/security/cve/CVE-2016-7931/" source="CVE"/>
		<reference ref_id="CVE-2016-7932" ref_url="https://www.suse.com/security/cve/CVE-2016-7932/" source="CVE"/>
		<reference ref_id="CVE-2016-7933" ref_url="https://www.suse.com/security/cve/CVE-2016-7933/" source="CVE"/>
		<reference ref_id="CVE-2016-7934" ref_url="https://www.suse.com/security/cve/CVE-2016-7934/" source="CVE"/>
		<reference ref_id="CVE-2016-7935" ref_url="https://www.suse.com/security/cve/CVE-2016-7935/" source="CVE"/>
		<reference ref_id="CVE-2016-7936" ref_url="https://www.suse.com/security/cve/CVE-2016-7936/" source="CVE"/>
		<reference ref_id="CVE-2016-7937" ref_url="https://www.suse.com/security/cve/CVE-2016-7937/" source="CVE"/>
		<reference ref_id="CVE-2016-7938" ref_url="https://www.suse.com/security/cve/CVE-2016-7938/" source="CVE"/>
		<reference ref_id="CVE-2016-7939" ref_url="https://www.suse.com/security/cve/CVE-2016-7939/" source="CVE"/>
		<reference ref_id="CVE-2016-7940" ref_url="https://www.suse.com/security/cve/CVE-2016-7940/" source="CVE"/>
		<reference ref_id="CVE-2016-7973" ref_url="https://www.suse.com/security/cve/CVE-2016-7973/" source="CVE"/>
		<reference ref_id="CVE-2016-7974" ref_url="https://www.suse.com/security/cve/CVE-2016-7974/" source="CVE"/>
		<reference ref_id="CVE-2016-7975" ref_url="https://www.suse.com/security/cve/CVE-2016-7975/" source="CVE"/>
		<reference ref_id="CVE-2016-7983" ref_url="https://www.suse.com/security/cve/CVE-2016-7983/" source="CVE"/>
		<reference ref_id="CVE-2016-7984" ref_url="https://www.suse.com/security/cve/CVE-2016-7984/" source="CVE"/>
		<reference ref_id="CVE-2016-7985" ref_url="https://www.suse.com/security/cve/CVE-2016-7985/" source="CVE"/>
		<reference ref_id="CVE-2016-7986" ref_url="https://www.suse.com/security/cve/CVE-2016-7986/" source="CVE"/>
		<reference ref_id="CVE-2016-7992" ref_url="https://www.suse.com/security/cve/CVE-2016-7992/" source="CVE"/>
		<reference ref_id="CVE-2016-7993" ref_url="https://www.suse.com/security/cve/CVE-2016-7993/" source="CVE"/>
		<reference ref_id="CVE-2016-8574" ref_url="https://www.suse.com/security/cve/CVE-2016-8574/" source="CVE"/>
		<reference ref_id="CVE-2016-8575" ref_url="https://www.suse.com/security/cve/CVE-2016-8575/" source="CVE"/>
		<reference ref_id="CVE-2017-5202" ref_url="https://www.suse.com/security/cve/CVE-2017-5202/" source="CVE"/>
		<reference ref_id="CVE-2017-5203" ref_url="https://www.suse.com/security/cve/CVE-2017-5203/" source="CVE"/>
		<reference ref_id="CVE-2017-5204" ref_url="https://www.suse.com/security/cve/CVE-2017-5204/" source="CVE"/>
		<reference ref_id="CVE-2017-5205" ref_url="https://www.suse.com/security/cve/CVE-2017-5205/" source="CVE"/>
		<reference ref_id="CVE-2017-5341" ref_url="https://www.suse.com/security/cve/CVE-2017-5341/" source="CVE"/>
		<reference ref_id="CVE-2017-5342" ref_url="https://www.suse.com/security/cve/CVE-2017-5342/" source="CVE"/>
		<reference ref_id="CVE-2017-5482" ref_url="https://www.suse.com/security/cve/CVE-2017-5482/" source="CVE"/>
		<reference ref_id="CVE-2017-5483" ref_url="https://www.suse.com/security/cve/CVE-2017-5483/" source="CVE"/>
		<reference ref_id="CVE-2017-5484" ref_url="https://www.suse.com/security/cve/CVE-2017-5484/" source="CVE"/>
		<reference ref_id="CVE-2017-5485" ref_url="https://www.suse.com/security/cve/CVE-2017-5485/" source="CVE"/>
		<reference ref_id="CVE-2017-5486" ref_url="https://www.suse.com/security/cve/CVE-2017-5486/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<description>

This update for tcpdump to version 4.9.0 and libpcap to version 1.8.1 fixes the several issues.

These security issues were fixed in tcpdump:

- CVE-2016-7922: The AH parser in tcpdump had a buffer overflow in print-ah.c:ah_print() (bsc#1020940).
- CVE-2016-7923: The ARP parser in tcpdump had a buffer overflow in print-arp.c:arp_print() (bsc#1020940).
- CVE-2016-7924: The ATM parser in tcpdump had a buffer overflow in print-atm.c:oam_print() (bsc#1020940).
- CVE-2016-7925: The compressed SLIP parser in tcpdump had a buffer overflow in print-sl.c:sl_if_print() (bsc#1020940).
- CVE-2016-7926: The Ethernet parser in tcpdump had a buffer overflow in print-ether.c:ethertype_print() (bsc#1020940).
- CVE-2016-7927: The IEEE 802.11 parser in tcpdump had a buffer overflow in print-802_11.c:ieee802_11_radio_print() (bsc#1020940).
- CVE-2016-7928: The IPComp parser in tcpdump had a buffer overflow in print-ipcomp.c:ipcomp_print() (bsc#1020940).
- CVE-2016-7929: The Juniper PPPoE ATM parser in tcpdump had a buffer overflow in print-juniper.c:juniper_parse_header() (bsc#1020940).
- CVE-2016-7930: The LLC/SNAP parser in tcpdump had a buffer overflow in print-llc.c:llc_print() (bsc#1020940).
- CVE-2016-7931: The MPLS parser in tcpdump had a buffer overflow in print-mpls.c:mpls_print() (bsc#1020940).
- CVE-2016-7932: The PIM parser in tcpdump had a buffer overflow in print-pim.c:pimv2_check_checksum() (bsc#1020940).
- CVE-2016-7933: The PPP parser in tcpdump had a buffer overflow in print-ppp.c:ppp_hdlc_if_print() (bsc#1020940).
- CVE-2016-7934: The RTCP parser in tcpdump had a buffer overflow in print-udp.c:rtcp_print() (bsc#1020940).
- CVE-2016-7935: The RTP parser in tcpdump had a buffer overflow in print-udp.c:rtp_print() (bsc#1020940).
- CVE-2016-7936: The UDP parser in tcpdump had a buffer overflow in print-udp.c:udp_print() (bsc#1020940).
- CVE-2016-7937: The VAT parser in tcpdump had a buffer overflow in print-udp.c:vat_print() (bsc#1020940).
- CVE-2016-7938: The ZeroMQ parser in tcpdump had an integer overflow in print-zeromq.c:zmtp1_print_frame() (bsc#1020940).
- CVE-2016-7939: The GRE parser in tcpdump had a buffer overflow in print-gre.c, multiple functions (bsc#1020940).
- CVE-2016-7940: The STP parser in tcpdump had a buffer overflow in print-stp.c, multiple functions (bsc#1020940).
- CVE-2016-7973: The AppleTalk parser in tcpdump had a buffer overflow in print-atalk.c, multiple functions (bsc#1020940).
- CVE-2016-7974: The IP parser in tcpdump had a buffer overflow in print-ip.c, multiple functions (bsc#1020940).
- CVE-2016-7975: The TCP parser in tcpdump had a buffer overflow in print-tcp.c:tcp_print() (bsc#1020940).
- CVE-2016-7983: The BOOTP parser in tcpdump had a buffer overflow in print-bootp.c:bootp_print() (bsc#1020940).
- CVE-2016-7984: The TFTP parser in tcpdump had a buffer overflow in print-tftp.c:tftp_print() (bsc#1020940).
- CVE-2016-7985: The CALM FAST parser in tcpdump had a buffer overflow in print-calm-fast.c:calm_fast_print() (bsc#1020940).
- CVE-2016-7986: The GeoNetworking parser in tcpdump had a buffer overflow in print-geonet.c, multiple functions (bsc#1020940).
- CVE-2016-7992: The Classical IP over ATM parser in tcpdump had a buffer overflow in print-cip.c:cip_if_print() (bsc#1020940).
- CVE-2016-7993: A bug in util-print.c:relts_print() in tcpdump could cause a buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP, lightweight resolver protocol, PIM) (bsc#1020940).
- CVE-2016-8574: The FRF.15 parser in tcpdump had a buffer overflow in print-fr.c:frf15_print() (bsc#1020940).
- CVE-2016-8575: The Q.933 parser in tcpdump had a buffer overflow in print-fr.c:q933_print(), a different vulnerability than CVE-2017-5482 (bsc#1020940).
- CVE-2017-5202: The ISO CLNS parser in tcpdump had a buffer overflow in print-isoclns.c:clnp_print() (bsc#1020940).
- CVE-2017-5203: The BOOTP parser in tcpdump had a buffer overflow in print-bootp.c:bootp_print() (bsc#1020940).
- CVE-2017-5204: The IPv6 parser in tcpdump had a buffer overflow in print-ip6.c:ip6_print() (bsc#1020940).
- CVE-2017-5205: The ISAKMP parser in tcpdump had a buffer overflow in print-isakmp.c:ikev2_e_print() (bsc#1020940).
- CVE-2017-5341: The OTV parser in tcpdump had a buffer overflow in print-otv.c:otv_print() (bsc#1020940).
- CVE-2017-5342: In tcpdump a bug in multiple protocol parsers (Geneve, GRE, NSH, OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in print-ether.c:ether_print() (bsc#1020940).
- CVE-2017-5482: The Q.933 parser in tcpdump had a buffer overflow in print-fr.c:q933_print(), a different vulnerability than CVE-2016-8575 (bsc#1020940).
- CVE-2017-5483: The SNMP parser in tcpdump had a buffer overflow in print-snmp.c:asn1_parse() (bsc#1020940).
- CVE-2017-5484: The ATM parser in tcpdump had a buffer overflow in print-atm.c:sig_print() (bsc#1020940).
- CVE-2017-5485: The ISO CLNS parser in tcpdump had a buffer overflow in addrtoname.c:lookup_nsap() (bsc#1020940).
- CVE-2017-5486: The ISO CLNS parser in tcpdump had a buffer overflow in print-isoclns.c:clnp_print() (bsc#1020940).
- CVE-2015-3138: Fixed potential denial of service in print-wb.c (bsc#927637).
- CVE-2015-0261: Integer signedness error in the mobility_opt_print function in the IPv6 mobility printer in tcpdump allowed remote attackers to cause a denial of service (out-of-bounds read and crash) or possibly execute arbitrary code via a negative length value (bsc#922220).
- CVE-2015-2153: The rpki_rtr_pdu_print function in print-rpki-rtr.c in the TCP printer in tcpdump allowed remote attackers to cause a denial of service (out-of-bounds read or write and crash) via a crafted header length in an RPKI-RTR Protocol Data Unit (PDU) (bsc#922221).
- CVE-2015-2154: The osi_print_cksum function in print-isoclns.c in the ethernet printer in tcpdump allowed remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) length, (2) offset, or (3) base pointer checksum value (bsc#922222).
- CVE-2015-2155: The force printer in tcpdump allowed remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors (bsc#922223).
- CVE-2014-8767: Integer underflow in the olsr_print function in tcpdump 3.9.6 when in verbose mode, allowed remote attackers to cause a denial of service (crash) via a crafted length value in an OLSR frame (bsc#905870).
- CVE-2014-8768: Multiple Integer underflows in the geonet_print function in tcpdump when run in verbose mode, allowed remote attackers to cause a denial of service (segmentation fault and crash) via a crafted length value in a Geonet frame (bsc#905871).
- CVE-2014-8769: tcpdump might have allowed remote attackers to obtain sensitive information from memory or cause a denial of service (packet loss or segmentation fault) via a crafted Ad hoc On-Demand Distance Vector (AODV) packet, which triggers an out-of-bounds memory access (bsc#905872).

These non-security issues were fixed in tcpdump:

- PPKI to Router Protocol: Fix Segmentation Faults and other problems
- RPKI to Router Protocol: print strings with fn_printn()
- Added a short option '#', same as long option '--number'
- nflog, mobile, forces, pptp, AODV, AHCP, IPv6, OSPFv4, RPL, DHCPv6 enhancements/fixes
- M3UA decode added.
- Added bittok2str().
- A number of unaligned access faults fixed
- The -A flag does not consider CR to be printable anymore
- fx.lebail took over coverity baby sitting
- Default snapshot size increased to 256K for accomodate USB captures

These non-security issues were fixed in libpcap:

- Provide a -devel-static subpackage that contains the static
  libraries and all the extra dependencies which are not needed
  for dynamic linking.
- Fix handling of packet count in the TPACKET_V3 inner loop
- Filter out duplicate looped back CAN frames.
- Fix the handling of loopback filters for IPv6 packets.
- Add a link-layer header type for RDS (IEC 62106) groups.
- Handle all CAN captures with pcap-linux.c, in cooked mode.
- Removes the need for the 'host-endian' link-layer header type.
- Have separate DLTs for big-endian and host-endian SocketCAN headers.
- Properly check for sock_recv() errors.
- Re-impose some of Winsock's limitations on sock_recv().
- Replace sprintf() with pcap_snprintf().
- Fix signature of pcap_stats_ex_remote().
- Have rpcap_remoteact_getsock() return a SOCKET and supply an 'is active' flag.
- Clean up {DAG, Septel, Myricom SNF}-only builds.
- pcap_create_interface() needs the interface name on Linux.
- Clean up hardware time stamp support: the 'any' device does not support any time stamp types.
- Recognize 802.1ad nested VLAN tag in vlan filter.
- Support for filtering Geneve encapsulated packets.
- Fix handling of zones for BPF on Solaris
- Added bpf_filter1() with extensions
- EBUSY can now be returned by SNFv3 code.
- Don't crash on filters testing a non-existent link-layer type field.
- Fix sending in non-blocking mode on Linux with memory-mapped capture.
- Fix timestamps when reading pcap-ng files on big-endian machines.
- Fixes for byte order issues with NFLOG captures
- Handle using cooked mode for DLT_NETLINK in activate_new().
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-26"/>
	<updated date="2017-04-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035686">SUSE bug 1035686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905870">SUSE bug 905870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905871">SUSE bug 905871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905872">SUSE bug 905872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922220">SUSE bug 922220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922221">SUSE bug 922221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922222">SUSE bug 922222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922223">SUSE bug 922223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927637">SUSE bug 927637</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8767/">CVE-2014-8767</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8768/">CVE-2014-8768</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8769/">CVE-2014-8769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0261/">CVE-2015-0261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2153/">CVE-2015-2153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2154/">CVE-2015-2154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2155/">CVE-2015-2155</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3138/">CVE-2015-3138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7922/">CVE-2016-7922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7923/">CVE-2016-7923</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7924/">CVE-2016-7924</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7925/">CVE-2016-7925</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7926/">CVE-2016-7926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7927/">CVE-2016-7927</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7928/">CVE-2016-7928</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7929/">CVE-2016-7929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7930/">CVE-2016-7930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7931/">CVE-2016-7931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7932/">CVE-2016-7932</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7933/">CVE-2016-7933</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7934/">CVE-2016-7934</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7935/">CVE-2016-7935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7936/">CVE-2016-7936</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7937/">CVE-2016-7937</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7938/">CVE-2016-7938</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7939/">CVE-2016-7939</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7940/">CVE-2016-7940</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7973/">CVE-2016-7973</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7974/">CVE-2016-7974</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7975/">CVE-2016-7975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7983/">CVE-2016-7983</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7984/">CVE-2016-7984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7985/">CVE-2016-7985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7986/">CVE-2016-7986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7992/">CVE-2016-7992</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7993/">CVE-2016-7993</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8574/">CVE-2016-8574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8575/">CVE-2016-8575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5202/">CVE-2017-5202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5203/">CVE-2017-5203</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5204/">CVE-2017-5204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5205/">CVE-2017-5205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5341/">CVE-2017-5341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5342/">CVE-2017-5342</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5482/">CVE-2017-5482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5483/">CVE-2017-5483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5484/">CVE-2017-5484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5485/">CVE-2017-5485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5486/">CVE-2017-5486</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77787" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1018128" ref_url="https://bugzilla.suse.com/1018128" source="BUGZILLA"/>
		<reference ref_id="1030263" ref_url="https://bugzilla.suse.com/1030263" source="BUGZILLA"/>
		<reference ref_id="1032114" ref_url="https://bugzilla.suse.com/1032114" source="BUGZILLA"/>
		<reference ref_id="1032120" ref_url="https://bugzilla.suse.com/1032120" source="BUGZILLA"/>
		<reference ref_id="1036453" ref_url="https://bugzilla.suse.com/1036453" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10220" ref_url="https://www.suse.com/security/cve/CVE-2016-10220/" source="CVE"/>
		<reference ref_id="CVE-2016-9601" ref_url="https://www.suse.com/security/cve/CVE-2016-9601/" source="CVE"/>
		<reference ref_id="CVE-2017-5951" ref_url="https://www.suse.com/security/cve/CVE-2017-5951/" source="CVE"/>
		<reference ref_id="CVE-2017-7207" ref_url="https://www.suse.com/security/cve/CVE-2017-7207/" source="CVE"/>
		<reference ref_id="CVE-2017-8291" ref_url="https://www.suse.com/security/cve/CVE-2017-8291/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00037.html" source="SUSE-SU"/>
		<description>

This update for ghostscript fixes the following security vulnerabilities:

CVE-2017-8291: A remote command execution and a -dSAFER bypass via a crafted .eps document were
exploited in the wild. (bsc#1036453)

CVE-2016-9601: An integer overflow in the bundled jbig2dec library could have been misused to cause
a Denial-of-Service. (bsc#1018128)

CVE-2016-10220: A NULL pointer dereference in the PDF Transparency module allowed remote attackers
to cause a Denial-of-Service. (bsc#1032120)

CVE-2017-5951: A NULL pointer dereference allowed remote attackers to cause a denial of service
via a crafted PostScript document. (bsc#1032114)

CVE-2017-7207: A NULL pointer dereference allowed remote attackers to cause a denial of service
via a crafted PostScript document. (bsc#1030263)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-28"/>
	<updated date="2017-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1018128">SUSE bug 1018128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030263">SUSE bug 1030263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032114">SUSE bug 1032114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032120">SUSE bug 1032120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10220/">CVE-2016-10220</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9601/">CVE-2016-9601</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5951/">CVE-2017-5951</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-7207/">CVE-2017-7207</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-8291/">CVE-2017-8291</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517316" comment="ghostscript-9.15-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517317" comment="ghostscript-x11-9.15-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77788" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1015348" ref_url="https://bugzilla.suse.com/1015348" source="BUGZILLA"/>
		<reference ref_id="1022555" ref_url="https://bugzilla.suse.com/1022555" source="BUGZILLA"/>
		<reference ref_id="1026636" ref_url="https://bugzilla.suse.com/1026636" source="BUGZILLA"/>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1027570" ref_url="https://bugzilla.suse.com/1027570" source="BUGZILLA"/>
		<reference ref_id="1028235" ref_url="https://bugzilla.suse.com/1028235" source="BUGZILLA"/>
		<reference ref_id="1028655" ref_url="https://bugzilla.suse.com/1028655" source="BUGZILLA"/>
		<reference ref_id="1029827" ref_url="https://bugzilla.suse.com/1029827" source="BUGZILLA"/>
		<reference ref_id="1030144" ref_url="https://bugzilla.suse.com/1030144" source="BUGZILLA"/>
		<reference ref_id="1030442" ref_url="https://bugzilla.suse.com/1030442" source="BUGZILLA"/>
		<reference ref_id="1034843" ref_url="https://bugzilla.suse.com/1034843" source="BUGZILLA"/>
		<reference ref_id="1034844" ref_url="https://bugzilla.suse.com/1034844" source="BUGZILLA"/>
		<reference ref_id="1034845" ref_url="https://bugzilla.suse.com/1034845" source="BUGZILLA"/>
		<reference ref_id="1034994" ref_url="https://bugzilla.suse.com/1034994" source="BUGZILLA"/>
		<reference ref_id="1035483" ref_url="https://bugzilla.suse.com/1035483" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9603" ref_url="https://www.suse.com/security/cve/CVE-2016-9603/" source="CVE"/>
		<reference ref_id="CVE-2017-2633" ref_url="https://www.suse.com/security/cve/CVE-2017-2633/" source="CVE"/>
		<reference ref_id="CVE-2017-6414" ref_url="https://www.suse.com/security/cve/CVE-2017-6414/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-7718" ref_url="https://www.suse.com/security/cve/CVE-2017-7718/" source="CVE"/>
		<reference ref_id="CVE-2017-7980" ref_url="https://www.suse.com/security/cve/CVE-2017-7980/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00006.html" source="SUSE-SU"/>
		<description>

This update for xen fixes several issues.

These security issues were fixed:

- A malicious 64-bit PV guest may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks by placing a IRET hypercall in the middle of a multicall batch (XSA-213, bsc#1034843)
- A malicious pair of guests may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks because of a missing check when transfering pages via GNTTABOP_transfer (XSA-214, bsc#1034844).
- CVE-2017-7718: hw/display/cirrus_vga_rop.h allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions (bsc#1034994).
- CVE-2016-9603: A privileged user within the guest VM could have caused a heap overflow in the device model process, potentially escalating their privileges to that of the device model process (bsc#1028655)

These non-security issues were fixed:

- bsc#1027519: Missing upstream bug fixes
- bsc#1015348: libvirtd does not start during boot
- bsc#1022555: Timeout in 'execution of /etc/xen/scripts/block add
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-02"/>
	<updated date="2017-05-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1015348">SUSE bug 1015348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022555">SUSE bug 1022555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026636">SUSE bug 1026636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027570">SUSE bug 1027570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028235">SUSE bug 1028235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028655">SUSE bug 1028655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029827">SUSE bug 1029827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030144">SUSE bug 1030144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030442">SUSE bug 1030442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034843">SUSE bug 1034843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034844">SUSE bug 1034844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034845">SUSE bug 1034845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034994">SUSE bug 1034994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035483">SUSE bug 1035483</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9603/">CVE-2016-9603</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-2633/">CVE-2017-2633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6414/">CVE-2017-6414</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7718/">CVE-2017-7718</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7980/">CVE-2017-7980</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517318" comment="xen-4.5.5_10-22.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517319" comment="xen-kmp-default-4.5.5_10_k3.12.69_60.64.35-22.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517320" comment="xen-libs-4.5.5_10-22.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517321" comment="xen-libs-32bit-4.5.5_10-22.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77789" version="1" class="patch">
	<metadata>
		<title>Security update for graphite2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1035204" ref_url="https://bugzilla.suse.com/1035204" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00008.html" source="SUSE-SU"/>
		<description>

This update for graphite2 fixes one issue.

This security issues was fixed:

- CVE-2017-5436: An out-of-bounds write triggered with a maliciously crafted Graphite font could lead to a crash or potentially code execution (bsc#1035204).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-02"/>
	<updated date="2017-05-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1035204">SUSE bug 1035204</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517322" comment="libgraphite2-3-1.3.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517323" comment="libgraphite2-3-32bit-1.3.1-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77790" version="1" class="patch">
	<metadata>
		<title>Security update for apparmor (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1000201" ref_url="https://bugzilla.suse.com/1000201" source="BUGZILLA"/>
		<reference ref_id="1016259" ref_url="https://bugzilla.suse.com/1016259" source="BUGZILLA"/>
		<reference ref_id="1022610" ref_url="https://bugzilla.suse.com/1022610" source="BUGZILLA"/>
		<reference ref_id="1029696" ref_url="https://bugzilla.suse.com/1029696" source="BUGZILLA"/>
		<reference ref_id="1031529" ref_url="https://bugzilla.suse.com/1031529" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6507" ref_url="https://www.suse.com/security/cve/CVE-2017-6507/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002841.html" source="SUSE-SU"/>
		<description>

This update for apparmor provides the following fixes:

This security issue was fixed:

- CVE-2017-6507: Preserve unknown profiles when reloading apparmor.service (bsc#1029696)

These non-security issues were fixed:

- Add tunables/kernelvars abstraction. (bsc#1031529)
- Update flags of ntpd profile. (bsc#1022610)
- Force AppArmor to start after /var/lib mounts. (bsc#1016259)
- Update mlmmj profiles. (bsc#1000201)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-03"/>
	<updated date="2017-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000201">SUSE bug 1000201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016259">SUSE bug 1016259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022610">SUSE bug 1022610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029696">SUSE bug 1029696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031529">SUSE bug 1031529</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6507/">CVE-2017-6507</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517324" comment="apparmor-docs-2.8.2-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517325" comment="apparmor-parser-2.8.2-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517326" comment="apparmor-profiles-2.8.2-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517327" comment="apparmor-utils-2.8.2-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517328" comment="libapparmor1-2.8.2-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517329" comment="libapparmor1-32bit-2.8.2-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517330" comment="pam_apparmor-2.8.2-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517331" comment="pam_apparmor-32bit-2.8.2-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517332" comment="perl-apparmor-2.8.2-54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77791" version="1" class="patch">
	<metadata>
		<title>Security update for firebird (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1023990" ref_url="https://bugzilla.suse.com/1023990" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6369" ref_url="https://www.suse.com/security/cve/CVE-2017-6369/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002843.html" source="SUSE-SU"/>
		<description>

This update for firebird fixes the following security issues:

- CVE-2017-6369: Insufficient checks in the UDF subsystem in Firebird allowed remote authenticated users to execute code by using a 'system' entrypoint from fbudf.so (bsc#1023990).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-03"/>
	<updated date="2017-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023990">SUSE bug 1023990</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6369/">CVE-2017-6369</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517333" comment="libfbembed2_5-2.5.2.26539-15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77792" version="1" class="patch">
	<metadata>
		<title>Security update for libosip2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1034570" ref_url="https://bugzilla.suse.com/1034570" source="BUGZILLA"/>
		<reference ref_id="1034571" ref_url="https://bugzilla.suse.com/1034571" source="BUGZILLA"/>
		<reference ref_id="1034572" ref_url="https://bugzilla.suse.com/1034572" source="BUGZILLA"/>
		<reference ref_id="1034574" ref_url="https://bugzilla.suse.com/1034574" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10324" ref_url="https://www.suse.com/security/cve/CVE-2016-10324/" source="CVE"/>
		<reference ref_id="CVE-2016-10325" ref_url="https://www.suse.com/security/cve/CVE-2016-10325/" source="CVE"/>
		<reference ref_id="CVE-2016-10326" ref_url="https://www.suse.com/security/cve/CVE-2016-10326/" source="CVE"/>
		<reference ref_id="CVE-2017-7853" ref_url="https://www.suse.com/security/cve/CVE-2017-7853/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002848.html" source="SUSE-SU"/>
		<description>

This update for libosip2 fixes several issues.

These security issues were fixed:

- CVE-2017-7853: In libosip2  a malformed SIP message could have lead to a heap buffer overflow in the msg_osip_body_parse() function defined in osipparser2/osip_message_parse.c, resulting in a remote DoS (bsc#1034570).
- CVE-2016-10326: In libosip2 a malformed SIP message could have lead to a heap buffer overflow in the osip_body_to_str() function defined in osipparser2/osip_body.c, resulting in a remote DoS (bsc#1034571).
- CVE-2016-10325: In libosip2 a malformed SIP message could have lead to a heap buffer overflow in the _osip_message_to_str() function defined in osipparser2/osip_message_to_str.c, resulting in a remote DoS (bsc#1034572).
- CVE-2016-10324: In libosip2 a malformed SIP message could have lead to a heap buffer overflow in the osip_clrncpy() function defined in osipparser2/osip_port.c (bsc#1034574).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-06"/>
	<updated date="2017-05-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034570">SUSE bug 1034570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034571">SUSE bug 1034571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034572">SUSE bug 1034572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034574">SUSE bug 1034574</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10324/">CVE-2016-10324</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10325/">CVE-2016-10325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10326/">CVE-2016-10326</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7853/">CVE-2017-7853</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517334" comment="libosip2-3.5.0-20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77793" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1038281" ref_url="https://bugzilla.suse.com/1038281" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3068" ref_url="https://www.suse.com/security/cve/CVE-2017-3068/" source="CVE"/>
		<reference ref_id="CVE-2017-3069" ref_url="https://www.suse.com/security/cve/CVE-2017-3069/" source="CVE"/>
		<reference ref_id="CVE-2017-3070" ref_url="https://www.suse.com/security/cve/CVE-2017-3070/" source="CVE"/>
		<reference ref_id="CVE-2017-3071" ref_url="https://www.suse.com/security/cve/CVE-2017-3071/" source="CVE"/>
		<reference ref_id="CVE-2017-3072" ref_url="https://www.suse.com/security/cve/CVE-2017-3072/" source="CVE"/>
		<reference ref_id="CVE-2017-3073" ref_url="https://www.suse.com/security/cve/CVE-2017-3073/" source="CVE"/>
		<reference ref_id="CVE-2017-3074" ref_url="https://www.suse.com/security/cve/CVE-2017-3074/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00020.html" source="SUSE-SU"/>
		<description>

This update for flash-player fixes the following issues:

- Security update to 25.0.0.171 (bsc#1038281), fixing the following
  vulnerabilities advised under APSB17-15:
  * Use-after-free vulnerability that could lead to code execution
    (CVE-2017-3071).
  * Memory corruption vulnerabilities that could lead to code execution
    (CVE-2017-3068, CVE-2017-3069, CVE-2017-3070, CVE-2017-3072,
    CVE-2017-3073, CVE-2017-3074).
  * Details:
    https://helpx.adobe.com/security/products/flash-player/apsb17-15.html
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-10"/>
	<updated date="2017-05-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038281">SUSE bug 1038281</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3068/">CVE-2017-3068</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3069/">CVE-2017-3069</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3070/">CVE-2017-3070</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3071/">CVE-2017-3071</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3072/">CVE-2017-3072</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3073/">CVE-2017-3073</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3074/">CVE-2017-3074</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517335" comment="flash-player-25.0.0.171-168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517336" comment="flash-player-gnome-25.0.0.171-168.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77794" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1013285" ref_url="https://bugzilla.suse.com/1013285" source="BUGZILLA"/>
		<reference ref_id="1014109" ref_url="https://bugzilla.suse.com/1014109" source="BUGZILLA"/>
		<reference ref_id="1014111" ref_url="https://bugzilla.suse.com/1014111" source="BUGZILLA"/>
		<reference ref_id="1014702" ref_url="https://bugzilla.suse.com/1014702" source="BUGZILLA"/>
		<reference ref_id="1015048" ref_url="https://bugzilla.suse.com/1015048" source="BUGZILLA"/>
		<reference ref_id="1015169" ref_url="https://bugzilla.suse.com/1015169" source="BUGZILLA"/>
		<reference ref_id="1016779" ref_url="https://bugzilla.suse.com/1016779" source="BUGZILLA"/>
		<reference ref_id="1020491" ref_url="https://bugzilla.suse.com/1020491" source="BUGZILLA"/>
		<reference ref_id="1020589" ref_url="https://bugzilla.suse.com/1020589" source="BUGZILLA"/>
		<reference ref_id="1020928" ref_url="https://bugzilla.suse.com/1020928" source="BUGZILLA"/>
		<reference ref_id="1021129" ref_url="https://bugzilla.suse.com/1021129" source="BUGZILLA"/>
		<reference ref_id="1022541" ref_url="https://bugzilla.suse.com/1022541" source="BUGZILLA"/>
		<reference ref_id="1023004" ref_url="https://bugzilla.suse.com/1023004" source="BUGZILLA"/>
		<reference ref_id="1023053" ref_url="https://bugzilla.suse.com/1023053" source="BUGZILLA"/>
		<reference ref_id="1023907" ref_url="https://bugzilla.suse.com/1023907" source="BUGZILLA"/>
		<reference ref_id="1024972" ref_url="https://bugzilla.suse.com/1024972" source="BUGZILLA"/>
		<reference ref_id="937125" ref_url="https://bugzilla.suse.com/937125" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10155" ref_url="https://www.suse.com/security/cve/CVE-2016-10155/" source="CVE"/>
		<reference ref_id="CVE-2016-9776" ref_url="https://www.suse.com/security/cve/CVE-2016-9776/" source="CVE"/>
		<reference ref_id="CVE-2016-9907" ref_url="https://www.suse.com/security/cve/CVE-2016-9907/" source="CVE"/>
		<reference ref_id="CVE-2016-9911" ref_url="https://www.suse.com/security/cve/CVE-2016-9911/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="CVE-2017-5525" ref_url="https://www.suse.com/security/cve/CVE-2017-5525/" source="CVE"/>
		<reference ref_id="CVE-2017-5526" ref_url="https://www.suse.com/security/cve/CVE-2017-5526/" source="CVE"/>
		<reference ref_id="CVE-2017-5667" ref_url="https://www.suse.com/security/cve/CVE-2017-5667/" source="CVE"/>
		<reference ref_id="CVE-2017-5856" ref_url="https://www.suse.com/security/cve/CVE-2017-5856/" source="CVE"/>
		<reference ref_id="CVE-2017-5898" ref_url="https://www.suse.com/security/cve/CVE-2017-5898/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00021.html" source="SUSE-SU"/>
		<description>

This update for qemu fixes several issues.

These security issues were fixed:

- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024972)
- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004)
- CVE-2017-5856: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a memory leakage issue allowing a privileged user to leak host memory resulting in DoS (bsc#1023053)
- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013285)
- CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in 'ehci_init_transfer'. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014111)
- CVE-2016-9907: The USB redirector usb-guest support was vulnerable to a memory leakage flaw when destroying the USB redirector in 'usbredir_handle_destroy'.  A guest user/process could have used this issue to leak host memory, resulting in DoS for a host (bsc#1014109)
- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1014702)
- CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1014702)
- CVE-2016-10155: The virtual hardware watchdog 'wdt_i6300esb' was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1021129)
- CVE-2017-5526: The ES1370 audio device emulation support was vulnerable to a memory leakage issue allowing a privileged user inside the guest to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1020589)
- CVE-2017-5525: The ac97 audio device emulation support was vulnerable to a memory leakage issue allowing a privileged user inside the guest to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1020491)
- CVE-2017-5667: The SDHCI device emulation support was vulnerable to an OOB heap access issue allowing a privileged user inside the guest to crash the Qemu process resulting in DoS or potentially execute arbitrary code with privileges of the Qemu process on the host (bsc#1022541)
- CVE-2017-5898: The CCID Card device emulator support was vulnerable to an integer overflow allowing a privileged user inside the guest to crash the Qemu process resulting in DoS (bnc#1023907)

These non-security issues were fixed:

- Fix post script for qemu-guest-agent rpm to actually activate the guest agent at rpm install time
- Fixed various inaccuracies in cirrus vga device emulation
- Fixed cause of infrequent migration failures from bad virtio device state (bsc#1020928)
- Fixed virtio interface failure (bsc#1015048)
- Fixed graphical update errors introduced by previous security fix (bsc#1016779)
- Fixed uint64 property parsing and add regression tests (bsc#937125)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-11"/>
	<updated date="2017-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013285">SUSE bug 1013285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014109">SUSE bug 1014109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014111">SUSE bug 1014111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014702">SUSE bug 1014702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015048">SUSE bug 1015048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015169">SUSE bug 1015169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016779">SUSE bug 1016779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020491">SUSE bug 1020491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020589">SUSE bug 1020589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020928">SUSE bug 1020928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021129">SUSE bug 1021129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022541">SUSE bug 1022541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023004">SUSE bug 1023004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023053">SUSE bug 1023053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023907">SUSE bug 1023907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024972">SUSE bug 1024972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937125">SUSE bug 937125</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10155/">CVE-2016-10155</cve>
	<cve impact="moderate" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9776/">CVE-2016-9776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9907/">CVE-2016-9907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9911/">CVE-2016-9911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5525/">CVE-2017-5525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5526/">CVE-2017-5526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5667/">CVE-2017-5667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5856/">CVE-2017-5856</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5898/">CVE-2017-5898</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517337" comment="qemu-2.3.1-32.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517338" comment="qemu-block-curl-2.3.1-32.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517339" comment="qemu-ipxe-1.0.0-32.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517340" comment="qemu-kvm-2.3.1-32.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517341" comment="qemu-seabios-1.8.1-32.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517342" comment="qemu-sgabios-8-32.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517343" comment="qemu-tools-2.3.1-32.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517344" comment="qemu-vgabios-1.8.1-32.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517345" comment="qemu-x86-2.3.1-32.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77795" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss, mozilla-nspr, java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1015499" ref_url="https://bugzilla.suse.com/1015499" source="BUGZILLA"/>
		<reference ref_id="1015547" ref_url="https://bugzilla.suse.com/1015547" source="BUGZILLA"/>
		<reference ref_id="1021636" ref_url="https://bugzilla.suse.com/1021636" source="BUGZILLA"/>
		<reference ref_id="1026102" ref_url="https://bugzilla.suse.com/1026102" source="BUGZILLA"/>
		<reference ref_id="1030071" ref_url="https://bugzilla.suse.com/1030071" source="BUGZILLA"/>
		<reference ref_id="1035082" ref_url="https://bugzilla.suse.com/1035082" source="BUGZILLA"/>
		<reference ref_id="983639" ref_url="https://bugzilla.suse.com/983639" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="CVE-2016-8635" ref_url="https://www.suse.com/security/cve/CVE-2016-8635/" source="CVE"/>
		<reference ref_id="CVE-2016-9574" ref_url="https://www.suse.com/security/cve/CVE-2016-9574/" source="CVE"/>
		<reference ref_id="CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429/" source="CVE"/>
		<reference ref_id="CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432/" source="CVE"/>
		<reference ref_id="CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433/" source="CVE"/>
		<reference ref_id="CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434/" source="CVE"/>
		<reference ref_id="CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2017-5437" ref_url="https://www.suse.com/security/cve/CVE-2017-5437/" source="CVE"/>
		<reference ref_id="CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438/" source="CVE"/>
		<reference ref_id="CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439/" source="CVE"/>
		<reference ref_id="CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440/" source="CVE"/>
		<reference ref_id="CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441/" source="CVE"/>
		<reference ref_id="CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442/" source="CVE"/>
		<reference ref_id="CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443/" source="CVE"/>
		<reference ref_id="CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444/" source="CVE"/>
		<reference ref_id="CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445/" source="CVE"/>
		<reference ref_id="CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446/" source="CVE"/>
		<reference ref_id="CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447/" source="CVE"/>
		<reference ref_id="CVE-2017-5448" ref_url="https://www.suse.com/security/cve/CVE-2017-5448/" source="CVE"/>
		<reference ref_id="CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459/" source="CVE"/>
		<reference ref_id="CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460/" source="CVE"/>
		<reference ref_id="CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461/" source="CVE"/>
		<reference ref_id="CVE-2017-5462" ref_url="https://www.suse.com/security/cve/CVE-2017-5462/" source="CVE"/>
		<reference ref_id="CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464/" source="CVE"/>
		<reference ref_id="CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465/" source="CVE"/>
		<reference ref_id="CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox was updated to the Firefox ESR release 45.9.

Mozilla NSS was updated to support TLS 1.3 (close to release draft) and various new 
ciphers, PRFs, Diffie Hellman key agreement and support for more hashes.

Security issues fixed in Firefox (bsc#1035082)

- MFSA 2017-11/CVE-2017-5469: Potential Buffer overflow in flex-generated code
- MFSA 2017-11/CVE-2017-5429: Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9, and Firefox ESR 52.1
- MFSA 2017-11/CVE-2017-5439: Use-after-free in nsTArray Length() during XSLT processing
- MFSA 2017-11/CVE-2017-5438: Use-after-free in nsAutoPtr during XSLT processing
- MFSA 2017-11/CVE-2017-5437: Vulnerabilities in Libevent library
- MFSA 2017-11/CVE-2017-5436: Out-of-bounds write with malicious font in Graphite 2
- MFSA 2017-11/CVE-2017-5435: Use-after-free during transaction processing in the editor
- MFSA 2017-11/CVE-2017-5434: Use-after-free during focus handling
- MFSA 2017-11/CVE-2017-5433: Use-after-free in SMIL animation functions
- MFSA 2017-11/CVE-2017-5432: Use-after-free in text input selection
- MFSA 2017-11/CVE-2017-5464: Memory corruption with accessibility and DOM manipulation
- MFSA 2017-11/CVE-2017-5465: Out-of-bounds read in ConvolvePixel
- MFSA 2017-11/CVE-2017-5460: Use-after-free in frame selection
- MFSA 2017-11/CVE-2017-5448: Out-of-bounds write in ClearKeyDecryptor
- MFSA 2017-11/CVE-2017-5446: Out-of-bounds read when HTTP/2 DATA frames are sent with incorrect data
- MFSA 2017-11/CVE-2017-5447: Out-of-bounds read during glyph processing
- MFSA 2017-11/CVE-2017-5444: Buffer overflow while parsing application/http-index-format content
- MFSA 2017-11/CVE-2017-5445: Uninitialized values used while parsing application/http-index-format content
- MFSA 2017-11/CVE-2017-5442: Use-after-free during style changes
- MFSA 2017-11/CVE-2017-5443: Out-of-bounds write during BinHex decoding
- MFSA 2017-11/CVE-2017-5440: Use-after-free in txExecutionState destructor during XSLT processing
- MFSA 2017-11/CVE-2017-5441: Use-after-free with selection during scroll events
- MFSA 2017-11/CVE-2017-5459: Buffer overflow in WebGL

Mozilla NSS was updated to 3.29.5, bringing new features and fixing bugs:

- Update to NSS 3.29.5:
  * MFSA 2017-11/CVE-2017-5461: Rare crashes in the base 64 decoder and encoder were fixed.
  * MFSA 2017-11/CVE-2017-5462: A carry over bug in the RNG was fixed.
  * CVE-2016-9574: Remote DoS during session handshake when using SessionTicket extention and ECDHE-ECDSA (bsc#1015499).
  * requires NSPR &gt;= 4.13.1

- Update to NSS 3.29.3

  * enables TLS 1.3 by default

- Fixed a bug in hash computation (and build with
  GCC 7 which complains about shifts of boolean values).
  (bsc#1030071, bmo#1348767)

- Update to NSS 3.28.3

  This is a patch release to fix binary compatibility issues.

- Update to NSS 3.28.1

  This is a patch release to update the list of root CA certificates.

  * The following CA certificates were Removed

    CN = Buypass Class 2 CA 1
    CN = Root CA Generalitat Valenciana
    OU = RSA Security 2048 V3

  * The following CA certificates were Added

    OU = AC RAIZ FNMT-RCM
    CN = Amazon Root CA 1
    CN = Amazon Root CA 2
    CN = Amazon Root CA 3
    CN = Amazon Root CA 4
    CN = LuxTrust Global Root 2
    CN = Symantec Class 1 Public Primary Certification Authority - G4
    CN = Symantec Class 1 Public Primary Certification Authority - G6
    CN = Symantec Class 2 Public Primary Certification Authority - G4
    CN = Symantec Class 2 Public Primary Certification Authority - G6

  * The version number of the updated root CA list has been set to 2.11

- Update to NSS 3.28

  New functionality:

  * NSS includes support for TLS 1.3 draft -18. This includes a number
    of improvements to TLS 1.3:

    - The signed certificate timestamp, used in certificate
      transparency, is supported in TLS 1.3.
    - Key exporters for TLS 1.3 are supported. This includes the early
      key exporter, which can be used if 0-RTT is enabled. Note that
      there is a difference between TLS 1.3 and key exporters in older
      versions of TLS. TLS 1.3 does not distinguish between an empty
      context and no context.
    - The TLS 1.3 (draft) protocol can be enabled, by defining
      NSS_ENABLE_TLS_1_3=1 when building NSS.
    - NSS includes support for the X25519 key exchange algorithm,
      which is supported and enabled by default in all versions of TLS.

  Notable Changes:

  * NSS can no longer be compiled with support for additional elliptic curves.
    This was previously possible by replacing certain NSS source files.
  * NSS will now detect the presence of tokens that support additional
    elliptic curves and enable those curves for use in TLS.
    Note that this detection has a one-off performance cost, which can be
    avoided by using the SSL_NamedGroupConfig function to limit supported
    groups to those that NSS provides.
  * PKCS#11 bypass for TLS is no longer supported and has been removed.
  * Support for 'export' grade SSL/TLS cipher suites has been removed.
  * NSS now uses the signature schemes definition in TLS 1.3.
    This also affects TLS 1.2. NSS will now only generate signatures with the
    combinations of hash and signature scheme that are defined in TLS 1.3,
    even when negotiating TLS 1.2.

    - This means that SHA-256 will only be used with P-256 ECDSA certificates,
      SHA-384 with P-384 certificates, and SHA-512 with P-521 certificates.
      SHA-1 is permitted (in TLS 1.2 only) with any certificate for backward
      compatibility reasons.
    - NSS will now no longer assume that default signature schemes are
      supported by a peer if there was no commonly supported signature scheme.

  * NSS will now check if RSA-PSS signing is supported by the token that holds
    the private key prior to using it for TLS.
  * The certificate validation code contains checks to no longer trust
    certificates that are issued by old WoSign and StartCom CAs after
    October 21, 2016. This is equivalent to the behavior that Mozilla will
    release with Firefox 51.

- Update to NSS 3.27.2
  * Fixed SSL_SetTrustAnchors leaks (bmo#1318561)

  - raised the minimum softokn/freebl version to 3.28 as reported in (boo#1021636)

- Update to NSS 3.26.2

  New Functionality:

  * the selfserv test utility has been enhanced to support ALPN
    (HTTP/1.1) and 0-RTT
  * added support for the System-wide crypto policy available on
    Fedora Linux see http://fedoraproject.org/wiki/Changes/CryptoPolicy
  * introduced build flag NSS_DISABLE_LIBPKIX that allows compilation
    of NSS without the libpkix library

  Notable Changes:

  * The following CA certificate was Added
    CN = ISRG Root X1
  * NPN is disabled and ALPN is enabled by default
  * the NSS test suite now completes with the experimental TLS 1.3
    code enabled
  * several test improvements and additions, including a NIST known answer test

  Changes in 3.26.2
  * MD5 signature algorithms sent by the server in CertificateRequest
    messages are now properly ignored. Previously, with rare server
    configurations, an MD5 signature algorithm might have been selected
    for client authentication and caused the client to abort the
    connection soon after.

- Update to NSS 3.25

  New functionality:

  * Implemented DHE key agreement for TLS 1.3
  * Added support for ChaCha with TLS 1.3
  * Added support for TLS 1.2 ciphersuites that use SHA384 as the PRF
  * In previous versions, when using client authentication with TLS 1.2,
    NSS only supported certificate_verify messages that used the same
    signature hash algorithm as used by the PRF. This limitation has
    been removed.

  Notable changes:

  * An SSL socket can no longer be configured to allow both TLS 1.3 and SSLv3
  * Regression fix: NSS no longer reports a failure if an application
    attempts to disable the SSLv2 protocol.
  * The list of trusted CA certificates has been updated to version 2.8
  * The following CA certificate was Removed
    Sonera Class1 CA
  * The following CA certificates were Added
    Hellenic Academic and Research Institutions RootCA 2015
    Hellenic Academic and Research Institutions ECC RootCA 2015
    Certplus Root CA G1
    Certplus Root CA G2
    OpenTrust Root CA G1
    OpenTrust Root CA G2
    OpenTrust Root CA G3

- Update to NSS 3.24

  New functionality:

  * NSS softoken has been updated with the latest National Institute
    of Standards and Technology (NIST) guidance (as of 2015):
    - Software integrity checks and POST functions are executed on
      shared library load. These checks have been disabled by default,
      as they can cause a performance regression. To enable these
      checks, you must define symbol NSS_FORCE_FIPS when building NSS.
    - Counter mode and Galois/Counter Mode (GCM) have checks to
      prevent counter overflow.
    - Additional CSPs are zeroed in the code.
    - NSS softoken uses new guidance for how many Rabin-Miller tests
      are needed to verify a prime based on prime size.
  * NSS softoken has also been updated to allow NSS to run in FIPS
    Level 1 (no password). This mode is triggered by setting the
    database password to the empty string. In FIPS mode, you may move
    from Level 1 to Level 2 (by setting an appropriate password),
    but not the reverse.
  * A SSL_ConfigServerCert function has been added for configuring
    SSL/TLS server sockets with a certificate and private key. Use
    this new function in place of SSL_ConfigSecureServer,
    SSL_ConfigSecureServerWithCertChain, SSL_SetStapledOCSPResponses,
    and SSL_SetSignedCertTimestamps. SSL_ConfigServerCert automatically
    determines the certificate type from the certificate and private key.
    The caller is no longer required to use SSLKEAType explicitly to
    select a 'slot' into which the certificate is configured (which
    incorrectly identifies a key agreement type rather than a certificate).
    Separate functions for configuring Online Certificate Status Protocol
    (OCSP) responses or Signed Certificate Timestamps are not needed,
    since these can be added to the optional SSLExtraServerCertData struct
    provided to SSL_ConfigServerCert.  Also, partial support for RSA
    Probabilistic Signature Scheme (RSA-PSS) certificates has been added.
    Although these certificates can be configured, they will not be
    used by NSS in this version.
  * Deprecate the member attribute authAlgorithm of type SSLCipherSuiteInfo.
    Instead, applications should use the newly added attribute authType.
  * Add a shared library (libfreeblpriv3) on Linux platforms that
    define FREEBL_LOWHASH.
  * Remove most code related to SSL v2, including the ability to actively
    send a SSLv2-compatible client hello. However, the server-side
    implementation of the SSL/TLS protocol still supports processing
    of received v2-compatible client hello messages.
  * Disable (by default) NSS support in optimized builds for logging SSL/TLS
    key material to a logfile if the SSLKEYLOGFILE environment variable
    is set. To enable the functionality in optimized builds, you must define
    the symbol NSS_ALLOW_SSLKEYLOGFILE when building NSS.
  * Update NSS to protect it against the Cachebleed attack.
  * Disable support for DTLS compression.
  * Improve support for TLS 1.3. This includes support for DTLS 1.3.
    Note that TLS 1.3 support is experimental and not suitable for
    production use.

- Update to NSS 3.23

  New functionality:

  * ChaCha20/Poly1305 cipher and TLS cipher suites now supported
  * Experimental-only support TLS 1.3 1-RTT mode (draft-11).
    This code is not ready for production use.

  Notable changes:

  * The list of TLS extensions sent in the TLS handshake has been
    reordered to increase compatibility of the Extended Master Secret
    with with servers
  * The build time environment variable NSS_ENABLE_ZLIB has been
    renamed to NSS_SSL_ENABLE_ZLIB
  * The build time environment variable NSS_DISABLE_CHACHAPOLY was
    added, which can be used to prevent compilation of the
    ChaCha20/Poly1305 code.
  * The following CA certificates were Removed

    - Staat der Nederlanden Root CA
    - NetLock Minositett Kozjegyzoi (Class QA) Tanusitvanykiado
    - NetLock Kozjegyzoi (Class A) Tanusitvanykiado
    - NetLock Uzleti (Class B) Tanusitvanykiado
    - NetLock Expressz (Class C) Tanusitvanykiado
    - VeriSign Class 1 Public PCA - G2
    - VeriSign Class 3 Public PCA
    - VeriSign Class 3 Public PCA - G2
    - CA Disig

  * The following CA certificates were Added

    + SZAFIR ROOT CA2
    + Certum Trusted Network CA 2

  * The following CA certificate had the Email trust bit turned on

    + Actalis Authentication Root CA

  Security fixes:
  * CVE-2016-2834: Memory safety bugs (boo#983639)
    MFSA-2016-61 bmo#1206283 bmo#1221620 bmo#1241034 bmo#1241037

- Update to NSS 3.22.3
  * Increase compatibility of TLS extended master secret,
    don't send an empty TLS extension last in the handshake
    (bmo#1243641)
  * Fixed a heap-based buffer overflow related to the parsing of
    certain ASN.1 structures. An attacker could create a specially-crafted
    certificate which, when parsed by NSS, would cause a crash or
    execution of arbitrary code with the permissions of the user.
    (CVE-2016-1950, bmo#1245528)

- Update to NSS 3.22.2

  New functionality:

  * RSA-PSS signatures are now supported (bmo#1215295)
  * Pseudorandom functions based on hashes other than SHA-1 are now supported
  * Enforce an External Policy on NSS from a config file (bmo#1009429)

- CVE-2016-8635: Fix for DH small subgroup confinement attack (bsc#1015547)

Mozilla NSPR was updated to version 4.13.1:

  The previously released version 4.13 had changed pipes to be
  nonblocking by default, and as a consequence, PollEvent was
  changed to not block on clear.
  The NSPR development team received reports that these changes
  caused regressions in some applications that use NSPR, and it
  has been decided to revert the changes made in NSPR 4.13.
  NSPR 4.13.1 restores the traditional behavior of pipes and
  PollEvent.

Mozilla NSPR update to version 4.13 had these changes:

- PL_strcmp (and others) were fixed to return consistent results
    when one of the arguments is NULL.
- PollEvent was fixed to not block on clear.
- Pipes are always nonblocking.
- PR_GetNameForIdentity: added thread safety lock and bound checks.
- Removed the PLArena freelist.
- Avoid some integer overflows.
- fixed several comments.

This update also contains java-1_8_0-openjdk that needed to be rebuilt against the new
mozilla-nss version.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-11"/>
	<updated date="2017-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1015499">SUSE bug 1015499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015547">SUSE bug 1015547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021636">SUSE bug 1021636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026102">SUSE bug 1026102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030071">SUSE bug 1030071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983639">SUSE bug 983639</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8635/">CVE-2016-8635</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9574/">CVE-2016-9574</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5437/">CVE-2017-5437</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5448/">CVE-2017-5448</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5462/">CVE-2017-5462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517346" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517347" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77796" version="1" class="patch">
	<metadata>
		<title>Security update for libtirpc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1037559" ref_url="https://bugzilla.suse.com/1037559" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8779" ref_url="https://www.suse.com/security/cve/CVE-2017-8779/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00047.html" source="SUSE-SU"/>
		<description>

This update for libtirpc fixes the following issues:

-  CVE-2017-8779: crafted UDP packaged could lead  rpcbind to denial-of-service  (bsc#1037559)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-16"/>
	<updated date="2017-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037559">SUSE bug 1037559</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8779/">CVE-2017-8779</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517363" comment="libtirpc1-0.2.3-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517364" comment="libtirpc1-32bit-0.2.3-13.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77797" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1005591" ref_url="https://bugzilla.suse.com/1005591" source="BUGZILLA"/>
		<reference ref_id="1035905" ref_url="https://bugzilla.suse.com/1035905" source="BUGZILLA"/>
		<reference ref_id="934119" ref_url="https://bugzilla.suse.com/934119" source="BUGZILLA"/>
		<reference ref_id="952474" ref_url="https://bugzilla.suse.com/952474" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7995" ref_url="https://www.suse.com/security/cve/CVE-2015-7995/" source="CVE"/>
		<reference ref_id="CVE-2015-9019" ref_url="https://www.suse.com/security/cve/CVE-2015-9019/" source="CVE"/>
		<reference ref_id="CVE-2016-4738" ref_url="https://www.suse.com/security/cve/CVE-2016-4738/" source="CVE"/>
		<reference ref_id="CVE-2017-5029" ref_url="https://www.suse.com/security/cve/CVE-2017-5029/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002887.html" source="SUSE-SU"/>
		<description>

 This update for libxslt fixes the following issues:
 

- CVE-2017-5029: The xsltAddTextString function in transform.c lacked a check 
for integer overflow during a size calculation, which allowed a remote attacker 
to perform an out of bounds memory write via a crafted HTML page (bsc#1035905).

- CVE-2016-4738: Fix heap overread in xsltFormatNumberConversion: An empty decimal-separator 
could cause a heap overread. This can be exploited to leak a couple of bytes after 
the buffer that holds the pattern string (bsc#1005591).

- CVE-2015-9019: Properly initialize random generator (bsc#934119).

- CVE-2015-7995: Vulnerability in function xsltStylePreCompute' in preproc.c could cause a 
type confusion leading to DoS. (bsc#952474)

 		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-16"/>
	<updated date="2017-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005591">SUSE bug 1005591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035905">SUSE bug 1035905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934119">SUSE bug 934119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952474">SUSE bug 952474</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7995/">CVE-2015-7995</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-9019/">CVE-2015-9019</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4738/">CVE-2016-4738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5029/">CVE-2017-5029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517365" comment="libxslt-tools-1.1.28-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517366" comment="libxslt1-1.1.28-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517367" comment="libxslt1-32bit-1.1.28-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77798" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1020868" ref_url="https://bugzilla.suse.com/1020868" source="BUGZILLA"/>
		<reference ref_id="1020890" ref_url="https://bugzilla.suse.com/1020890" source="BUGZILLA"/>
		<reference ref_id="1020976" ref_url="https://bugzilla.suse.com/1020976" source="BUGZILLA"/>
		<reference ref_id="1022428" ref_url="https://bugzilla.suse.com/1022428" source="BUGZILLA"/>
		<reference ref_id="1034911" ref_url="https://bugzilla.suse.com/1034911" source="BUGZILLA"/>
		<reference ref_id="996821" ref_url="https://bugzilla.suse.com/996821" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3302" ref_url="https://www.suse.com/security/cve/CVE-2017-3302/" source="CVE"/>
		<reference ref_id="CVE-2017-3313" ref_url="https://www.suse.com/security/cve/CVE-2017-3313/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1315-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00051.html" source="SUSE-SU"/>
		<description>

This update for mariadb fixes the following issues:

- update to MariaDB 10.0.30 GA
  * notable changes:
    * XtraDB updated to 5.6.35-80.0
    * TokuDB updated to 5.6.35-80.0
    * PCRE updated to 8.40
    * MDEV-11027: better InnoDB crash recovery progress reporting
    * MDEV-11520: improvements to how InnoDB data files are extended
    * Improvements to InnoDB startup/shutdown to make it more robust
    * MDEV-11233: fix for FULLTEXT index crash
    * MDEV-6143: MariaDB Linux binary tarballs will now always untar
      to directories that match their filename
  * release notes and changelog:
     * https://kb.askmonty.org/en/mariadb-10030-release-notes
     * https://kb.askmonty.org/en/mariadb-10030-changelog
  * fixes the following CVEs:
    CVE-2017-3313: unspecified vulnerability affecting the MyISAM  component [bsc#1020890]
    CVE-2017-3302: Use after free in libmysqlclient.so [bsc#1022428] 
- set the default umask to 077 in mysql-systemd-helper [bsc#1020976]
- [bsc#1034911] - tracker bug

  * fixes also [bsc#1020868]		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-16"/>
	<updated date="2017-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020890">SUSE bug 1020890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020976">SUSE bug 1020976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022428">SUSE bug 1022428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034911">SUSE bug 1034911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996821">SUSE bug 996821</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3302/">CVE-2017-3302</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3313/">CVE-2017-3313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517368" comment="libmysqlclient18-10.0.30-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517369" comment="libmysqlclient18-32bit-10.0.30-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517370" comment="libmysqlclient_r18-10.0.30-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517371" comment="libmysqlclient_r18-32bit-10.0.30-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517372" comment="mariadb-10.0.30-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517373" comment="mariadb-client-10.0.30-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517374" comment="mariadb-errormessages-10.0.30-25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77799" version="1" class="patch">
	<metadata>
		<title>Security update for rpcbind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1037559" ref_url="https://bugzilla.suse.com/1037559" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8779" ref_url="https://www.suse.com/security/cve/CVE-2017-8779/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00056.html" source="SUSE-SU"/>
		<description>

This update for rpcbind fixes the following issues:

 - CVE-2017-8779: A crafted UDP package could lead rcpbind to remote denial-of-service (bsc#1037559)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-18"/>
	<updated date="2017-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037559">SUSE bug 1037559</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8779/">CVE-2017-8779</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517375" comment="rpcbind-0.2.1_rc4-17.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77800" version="1" class="patch">
	<metadata>
		<title>Security update for kdelibs4 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1036244" ref_url="https://bugzilla.suse.com/1036244" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8422" ref_url="https://www.suse.com/security/cve/CVE-2017-8422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00055.html" source="SUSE-SU"/>
		<description>

This update for kdelibs4 fixes the following issues:

- CVE-2017-8422: This update fixes problem in the DBUS authentication of the kauth framework
  that could be used to escalate privileges depending on bugs or misimplemented dbus
  services. (boo#1036244)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-18"/>
	<updated date="2017-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1036244">SUSE bug 1036244</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-8422/">CVE-2017-8422</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517376" comment="libkde4-4.12.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517377" comment="libkde4-32bit-4.12.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517378" comment="libkdecore4-4.12.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517379" comment="libkdecore4-32bit-4.12.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517380" comment="libksuseinstall1-4.12.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517381" comment="libksuseinstall1-32bit-4.12.0-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77801" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1003077" ref_url="https://bugzilla.suse.com/1003077" source="BUGZILLA"/>
		<reference ref_id="1008842" ref_url="https://bugzilla.suse.com/1008842" source="BUGZILLA"/>
		<reference ref_id="1009682" ref_url="https://bugzilla.suse.com/1009682" source="BUGZILLA"/>
		<reference ref_id="1012620" ref_url="https://bugzilla.suse.com/1012620" source="BUGZILLA"/>
		<reference ref_id="1012985" ref_url="https://bugzilla.suse.com/1012985" source="BUGZILLA"/>
		<reference ref_id="1015703" ref_url="https://bugzilla.suse.com/1015703" source="BUGZILLA"/>
		<reference ref_id="1015787" ref_url="https://bugzilla.suse.com/1015787" source="BUGZILLA"/>
		<reference ref_id="1015821" ref_url="https://bugzilla.suse.com/1015821" source="BUGZILLA"/>
		<reference ref_id="1017512" ref_url="https://bugzilla.suse.com/1017512" source="BUGZILLA"/>
		<reference ref_id="1018100" ref_url="https://bugzilla.suse.com/1018100" source="BUGZILLA"/>
		<reference ref_id="1018263" ref_url="https://bugzilla.suse.com/1018263" source="BUGZILLA"/>
		<reference ref_id="1018419" ref_url="https://bugzilla.suse.com/1018419" source="BUGZILLA"/>
		<reference ref_id="1018446" ref_url="https://bugzilla.suse.com/1018446" source="BUGZILLA"/>
		<reference ref_id="1019168" ref_url="https://bugzilla.suse.com/1019168" source="BUGZILLA"/>
		<reference ref_id="1019514" ref_url="https://bugzilla.suse.com/1019514" source="BUGZILLA"/>
		<reference ref_id="1020048" ref_url="https://bugzilla.suse.com/1020048" source="BUGZILLA"/>
		<reference ref_id="1020795" ref_url="https://bugzilla.suse.com/1020795" source="BUGZILLA"/>
		<reference ref_id="1021256" ref_url="https://bugzilla.suse.com/1021256" source="BUGZILLA"/>
		<reference ref_id="1021374" ref_url="https://bugzilla.suse.com/1021374" source="BUGZILLA"/>
		<reference ref_id="1021762" ref_url="https://bugzilla.suse.com/1021762" source="BUGZILLA"/>
		<reference ref_id="1021913" ref_url="https://bugzilla.suse.com/1021913" source="BUGZILLA"/>
		<reference ref_id="1022559" ref_url="https://bugzilla.suse.com/1022559" source="BUGZILLA"/>
		<reference ref_id="1022971" ref_url="https://bugzilla.suse.com/1022971" source="BUGZILLA"/>
		<reference ref_id="1023164" ref_url="https://bugzilla.suse.com/1023164" source="BUGZILLA"/>
		<reference ref_id="1023207" ref_url="https://bugzilla.suse.com/1023207" source="BUGZILLA"/>
		<reference ref_id="1023377" ref_url="https://bugzilla.suse.com/1023377" source="BUGZILLA"/>
		<reference ref_id="1023762" ref_url="https://bugzilla.suse.com/1023762" source="BUGZILLA"/>
		<reference ref_id="1023824" ref_url="https://bugzilla.suse.com/1023824" source="BUGZILLA"/>
		<reference ref_id="1023888" ref_url="https://bugzilla.suse.com/1023888" source="BUGZILLA"/>
		<reference ref_id="1023992" ref_url="https://bugzilla.suse.com/1023992" source="BUGZILLA"/>
		<reference ref_id="1024081" ref_url="https://bugzilla.suse.com/1024081" source="BUGZILLA"/>
		<reference ref_id="1024234" ref_url="https://bugzilla.suse.com/1024234" source="BUGZILLA"/>
		<reference ref_id="1024309" ref_url="https://bugzilla.suse.com/1024309" source="BUGZILLA"/>
		<reference ref_id="1024508" ref_url="https://bugzilla.suse.com/1024508" source="BUGZILLA"/>
		<reference ref_id="1024788" ref_url="https://bugzilla.suse.com/1024788" source="BUGZILLA"/>
		<reference ref_id="1025039" ref_url="https://bugzilla.suse.com/1025039" source="BUGZILLA"/>
		<reference ref_id="1025235" ref_url="https://bugzilla.suse.com/1025235" source="BUGZILLA"/>
		<reference ref_id="1025354" ref_url="https://bugzilla.suse.com/1025354" source="BUGZILLA"/>
		<reference ref_id="1025802" ref_url="https://bugzilla.suse.com/1025802" source="BUGZILLA"/>
		<reference ref_id="1026024" ref_url="https://bugzilla.suse.com/1026024" source="BUGZILLA"/>
		<reference ref_id="1026722" ref_url="https://bugzilla.suse.com/1026722" source="BUGZILLA"/>
		<reference ref_id="1026914" ref_url="https://bugzilla.suse.com/1026914" source="BUGZILLA"/>
		<reference ref_id="1027066" ref_url="https://bugzilla.suse.com/1027066" source="BUGZILLA"/>
		<reference ref_id="1027178" ref_url="https://bugzilla.suse.com/1027178" source="BUGZILLA"/>
		<reference ref_id="1027189" ref_url="https://bugzilla.suse.com/1027189" source="BUGZILLA"/>
		<reference ref_id="1027190" ref_url="https://bugzilla.suse.com/1027190" source="BUGZILLA"/>
		<reference ref_id="1027974" ref_url="https://bugzilla.suse.com/1027974" source="BUGZILLA"/>
		<reference ref_id="1028041" ref_url="https://bugzilla.suse.com/1028041" source="BUGZILLA"/>
		<reference ref_id="1028415" ref_url="https://bugzilla.suse.com/1028415" source="BUGZILLA"/>
		<reference ref_id="1028595" ref_url="https://bugzilla.suse.com/1028595" source="BUGZILLA"/>
		<reference ref_id="1028648" ref_url="https://bugzilla.suse.com/1028648" source="BUGZILLA"/>
		<reference ref_id="1028895" ref_url="https://bugzilla.suse.com/1028895" source="BUGZILLA"/>
		<reference ref_id="1029470" ref_url="https://bugzilla.suse.com/1029470" source="BUGZILLA"/>
		<reference ref_id="1029850" ref_url="https://bugzilla.suse.com/1029850" source="BUGZILLA"/>
		<reference ref_id="1029986" ref_url="https://bugzilla.suse.com/1029986" source="BUGZILLA"/>
		<reference ref_id="1030118" ref_url="https://bugzilla.suse.com/1030118" source="BUGZILLA"/>
		<reference ref_id="1030213" ref_url="https://bugzilla.suse.com/1030213" source="BUGZILLA"/>
		<reference ref_id="1030593" ref_url="https://bugzilla.suse.com/1030593" source="BUGZILLA"/>
		<reference ref_id="1030901" ref_url="https://bugzilla.suse.com/1030901" source="BUGZILLA"/>
		<reference ref_id="1031003" ref_url="https://bugzilla.suse.com/1031003" source="BUGZILLA"/>
		<reference ref_id="1031052" ref_url="https://bugzilla.suse.com/1031052" source="BUGZILLA"/>
		<reference ref_id="1031080" ref_url="https://bugzilla.suse.com/1031080" source="BUGZILLA"/>
		<reference ref_id="1031440" ref_url="https://bugzilla.suse.com/1031440" source="BUGZILLA"/>
		<reference ref_id="1031567" ref_url="https://bugzilla.suse.com/1031567" source="BUGZILLA"/>
		<reference ref_id="1031579" ref_url="https://bugzilla.suse.com/1031579" source="BUGZILLA"/>
		<reference ref_id="1031662" ref_url="https://bugzilla.suse.com/1031662" source="BUGZILLA"/>
		<reference ref_id="1031842" ref_url="https://bugzilla.suse.com/1031842" source="BUGZILLA"/>
		<reference ref_id="1032125" ref_url="https://bugzilla.suse.com/1032125" source="BUGZILLA"/>
		<reference ref_id="1032141" ref_url="https://bugzilla.suse.com/1032141" source="BUGZILLA"/>
		<reference ref_id="1032344" ref_url="https://bugzilla.suse.com/1032344" source="BUGZILLA"/>
		<reference ref_id="1032345" ref_url="https://bugzilla.suse.com/1032345" source="BUGZILLA"/>
		<reference ref_id="1033336" ref_url="https://bugzilla.suse.com/1033336" source="BUGZILLA"/>
		<reference ref_id="1034670" ref_url="https://bugzilla.suse.com/1034670" source="BUGZILLA"/>
		<reference ref_id="103470" ref_url="https://bugzilla.suse.com/103470" source="BUGZILLA"/>
		<reference ref_id="1034700" ref_url="https://bugzilla.suse.com/1034700" source="BUGZILLA"/>
		<reference ref_id="1035576" ref_url="https://bugzilla.suse.com/1035576" source="BUGZILLA"/>
		<reference ref_id="1035699" ref_url="https://bugzilla.suse.com/1035699" source="BUGZILLA"/>
		<reference ref_id="1035738" ref_url="https://bugzilla.suse.com/1035738" source="BUGZILLA"/>
		<reference ref_id="1035877" ref_url="https://bugzilla.suse.com/1035877" source="BUGZILLA"/>
		<reference ref_id="1036752" ref_url="https://bugzilla.suse.com/1036752" source="BUGZILLA"/>
		<reference ref_id="1038261" ref_url="https://bugzilla.suse.com/1038261" source="BUGZILLA"/>
		<reference ref_id="799133" ref_url="https://bugzilla.suse.com/799133" source="BUGZILLA"/>
		<reference ref_id="857926" ref_url="https://bugzilla.suse.com/857926" source="BUGZILLA"/>
		<reference ref_id="914939" ref_url="https://bugzilla.suse.com/914939" source="BUGZILLA"/>
		<reference ref_id="917630" ref_url="https://bugzilla.suse.com/917630" source="BUGZILLA"/>
		<reference ref_id="922853" ref_url="https://bugzilla.suse.com/922853" source="BUGZILLA"/>
		<reference ref_id="930399" ref_url="https://bugzilla.suse.com/930399" source="BUGZILLA"/>
		<reference ref_id="931620" ref_url="https://bugzilla.suse.com/931620" source="BUGZILLA"/>
		<reference ref_id="937444" ref_url="https://bugzilla.suse.com/937444" source="BUGZILLA"/>
		<reference ref_id="940946" ref_url="https://bugzilla.suse.com/940946" source="BUGZILLA"/>
		<reference ref_id="954763" ref_url="https://bugzilla.suse.com/954763" source="BUGZILLA"/>
		<reference ref_id="968697" ref_url="https://bugzilla.suse.com/968697" source="BUGZILLA"/>
		<reference ref_id="970083" ref_url="https://bugzilla.suse.com/970083" source="BUGZILLA"/>
		<reference ref_id="971933" ref_url="https://bugzilla.suse.com/971933" source="BUGZILLA"/>
		<reference ref_id="979215" ref_url="https://bugzilla.suse.com/979215" source="BUGZILLA"/>
		<reference ref_id="982783" ref_url="https://bugzilla.suse.com/982783" source="BUGZILLA"/>
		<reference ref_id="983212" ref_url="https://bugzilla.suse.com/983212" source="BUGZILLA"/>
		<reference ref_id="984530" ref_url="https://bugzilla.suse.com/984530" source="BUGZILLA"/>
		<reference ref_id="985561" ref_url="https://bugzilla.suse.com/985561" source="BUGZILLA"/>
		<reference ref_id="988065" ref_url="https://bugzilla.suse.com/988065" source="BUGZILLA"/>
		<reference ref_id="989056" ref_url="https://bugzilla.suse.com/989056" source="BUGZILLA"/>
		<reference ref_id="993832" ref_url="https://bugzilla.suse.com/993832" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1350" ref_url="https://www.suse.com/security/cve/CVE-2015-1350/" source="CVE"/>
		<reference ref_id="CVE-2016-10044" ref_url="https://www.suse.com/security/cve/CVE-2016-10044/" source="CVE"/>
		<reference ref_id="CVE-2016-10200" ref_url="https://www.suse.com/security/cve/CVE-2016-10200/" source="CVE"/>
		<reference ref_id="CVE-2016-10208" ref_url="https://www.suse.com/security/cve/CVE-2016-10208/" source="CVE"/>
		<reference ref_id="CVE-2016-2117" ref_url="https://www.suse.com/security/cve/CVE-2016-2117/" source="CVE"/>
		<reference ref_id="CVE-2016-3070" ref_url="https://www.suse.com/security/cve/CVE-2016-3070/" source="CVE"/>
		<reference ref_id="CVE-2016-5243" ref_url="https://www.suse.com/security/cve/CVE-2016-5243/" source="CVE"/>
		<reference ref_id="CVE-2016-7117" ref_url="https://www.suse.com/security/cve/CVE-2016-7117/" source="CVE"/>
		<reference ref_id="CVE-2016-9191" ref_url="https://www.suse.com/security/cve/CVE-2016-9191/" source="CVE"/>
		<reference ref_id="CVE-2016-9588" ref_url="https://www.suse.com/security/cve/CVE-2016-9588/" source="CVE"/>
		<reference ref_id="CVE-2016-9604" ref_url="https://www.suse.com/security/cve/CVE-2016-9604/" source="CVE"/>
		<reference ref_id="CVE-2017-2647" ref_url="https://www.suse.com/security/cve/CVE-2017-2647/" source="CVE"/>
		<reference ref_id="CVE-2017-2671" ref_url="https://www.suse.com/security/cve/CVE-2017-2671/" source="CVE"/>
		<reference ref_id="CVE-2017-5669" ref_url="https://www.suse.com/security/cve/CVE-2017-5669/" source="CVE"/>
		<reference ref_id="CVE-2017-5897" ref_url="https://www.suse.com/security/cve/CVE-2017-5897/" source="CVE"/>
		<reference ref_id="CVE-2017-5986" ref_url="https://www.suse.com/security/cve/CVE-2017-5986/" source="CVE"/>
		<reference ref_id="CVE-2017-6074" ref_url="https://www.suse.com/security/cve/CVE-2017-6074/" source="CVE"/>
		<reference ref_id="CVE-2017-6214" ref_url="https://www.suse.com/security/cve/CVE-2017-6214/" source="CVE"/>
		<reference ref_id="CVE-2017-6345" ref_url="https://www.suse.com/security/cve/CVE-2017-6345/" source="CVE"/>
		<reference ref_id="CVE-2017-6346" ref_url="https://www.suse.com/security/cve/CVE-2017-6346/" source="CVE"/>
		<reference ref_id="CVE-2017-6348" ref_url="https://www.suse.com/security/cve/CVE-2017-6348/" source="CVE"/>
		<reference ref_id="CVE-2017-6353" ref_url="https://www.suse.com/security/cve/CVE-2017-6353/" source="CVE"/>
		<reference ref_id="CVE-2017-6951" ref_url="https://www.suse.com/security/cve/CVE-2017-6951/" source="CVE"/>
		<reference ref_id="CVE-2017-7187" ref_url="https://www.suse.com/security/cve/CVE-2017-7187/" source="CVE"/>
		<reference ref_id="CVE-2017-7261" ref_url="https://www.suse.com/security/cve/CVE-2017-7261/" source="CVE"/>
		<reference ref_id="CVE-2017-7294" ref_url="https://www.suse.com/security/cve/CVE-2017-7294/" source="CVE"/>
		<reference ref_id="CVE-2017-7308" ref_url="https://www.suse.com/security/cve/CVE-2017-7308/" source="CVE"/>
		<reference ref_id="CVE-2017-7616" ref_url="https://www.suse.com/security/cve/CVE-2017-7616/" source="CVE"/>
		<reference ref_id="CVE-2017-7645" ref_url="https://www.suse.com/security/cve/CVE-2017-7645/" source="CVE"/>
		<reference ref_id="CVE-2017-8106" ref_url="https://www.suse.com/security/cve/CVE-2017-8106/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.74 to receive various security and bugfixes.

Notable new/improved features:
- Improved support for Hyper-V
- Support for the tcp_westwood TCP scheduling algorithm

The following security bugs were fixed:

- CVE-2017-8106: The handle_invept function in arch/x86/kvm/vmx.c in the Linux kernel allowed privileged KVM guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a single-context INVEPT instruction with a NULL EPT pointer (bsc#1035877).
- CVE-2017-6951: The keyring_search_aux function in security/keys/keyring.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the 'dead' type. (bsc#1029850).
- CVE-2017-2647: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c. (bsc#1030593)
- CVE-2016-9604: This fixes handling of keyrings starting with '.' in KEYCTL_JOIN_SESSION_KEYRING, which could have allowed local users to manipulate privileged keyrings (bsc#1035576)
- CVE-2017-7616: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel allowed local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation. (bnc#1033336).
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c. (bsc#1034670).
- CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bnc#1031579)
- CVE-2017-2671: The ping_unhash function in net/ipv4/ping.c in the Linux kernel was  too late in obtaining a certain lock and consequently could not ensure that disconnect function calls are safe, which allowed local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call (bnc#1031003)
- CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031440)
- CVE-2017-7261: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not check for a zero value of certain levels data, which allowed local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031052)
- CVE-2017-7187: The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function (bnc#1030213)
- CVE-2016-9588: arch/x86/kvm/vmx.c in the Linux kernel mismanaged the #BP and #OF exceptions, which allowed guest OS users to cause a denial of service (guest OS crash) by declining to handle an exception thrown by an L2 guest (bsc#1015703).
- CVE-2017-5669: The do_shmat function in ipc/shm.c in the Linux kernel did not restrict the address calculated by a certain rounding operation, which allowed local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context (bnc#1026914).
- CVE-2016-10200: Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c (bnc#1028415)
- CVE-2016-10208: The ext4_fill_super function in fs/ext4/super.c in the Linux kernel did not properly validate meta block groups, which allowed physically proximate attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image (bnc#1023377).
- CVE-2017-5897: The ip6gre_err function in net/ipv6/ip6_gre.c in the Linux kernel allowed remote attackers to have unspecified impact via vectors involving GRE flags in an IPv6 packet, which trigger an out-of-bounds access (bsc#1023762).
- CVE-2017-5986: A race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel allowed local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state (bsc#1025235).
- CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allowed local users to obtain root privileges or cause a denial of service (double free) via an application that made an IPV6_RECVPKTINFO setsockopt system call (bnc#1026024)
- CVE-2016-9191: The cgroup offline implementation in the Linux kernel mishandled certain drain operations, which allowed local users to cause a denial of service (system hang) by leveraging access to a container environment for executing a crafted application (bnc#1008842)
- CVE-2017-6348: The hashbin_delete function in net/irda/irqueue.c in the Linux kernel improperly managed lock dropping, which allowed local users to cause a denial of service (deadlock) via crafted operations on IrDA devices (bnc#1027178).
- CVE-2016-10044: The aio_mount function in fs/aio.c in the Linux kernel did not properly restrict execute access, which made it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call (bnc#1023992).
- CVE-2016-3070: The trace_writeback_dirty_page implementation in include/trace/events/writeback.h in the Linux kernel improperly interacts with mm/migrate.c, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by triggering a certain page move (bnc#979215).
- CVE-2016-5243: The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel did not properly copy a certain string, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#983212).
- CVE-2017-6345: The LLC subsystem in the Linux kernel did not ensure that a certain destructor exists in required circumstances, which allowed local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls (bnc#1027190)
- CVE-2017-6346: Race condition in net/packet/af_packet.c in the Linux kernel allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that made PACKET_FANOUT setsockopt system calls (bnc#1027189)
- CVE-2017-6353: net/sctp/socket.c in the Linux kernel did not properly restrict association peel-off operations during certain wait states, which allowed local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986 (bnc#1027066)
- CVE-2017-5986: Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel allowed local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state (bsc#1025235).
- CVE-2017-6214: The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel allowed remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag (bnc#1026722)
- CVE-2016-2117: The atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel incorrectly enables scatter/gather I/O, which allowed remote attackers to obtain sensitive information from kernel memory by reading packet data (bnc#968697)
- CVE-2015-1350: The VFS subsystem in the Linux kernel provided an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allowed local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program (bsc#914939).
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bsc#1003077).

The following non-security bugs were fixed:

- ACPI / APEI: Fix NMI notification handling (bsc#917630).
- arch: Mass conversion of smp_mb__*() (bsc#1020795).
- asm-generic: add __smp_xxx wrappers (bsc#1020795).
- block: remove struct request buffer member (bsc#1020795).
- block: submit_bio_wait() conversions (bsc#1020795).
- bonding: Advertize vxlan offload features when supported (bsc#1009682).
- bonding: handle more gso types (bsc#1009682).
- bonding: use the correct ether type for alb (bsc#1028595).
- btrfs: allow unlink to exceed subvolume quota (bsc#1015821).
- btrfs: Change qgroup_meta_rsv to 64bit (bsc#1015821).
- btrfs: fix btrfs_compat_ioctl failures on non-compat ioctls (bsc#1018100).
- btrfs: make file clone aware of fatal signals (bsc#1015787).
- btrfs: qgroups: Retry after commit on getting EDQUOT (bsc#1015821).
- cancel the setfilesize transation when io error happen (bsc#1028648).
- cgroup: remove stray references to css_id (bsc#1020795).
- cpuidle: powernv/pseries: Auto-promotion of snooze to deeper idle state (bnc#1023164).
- dm: add era target (bsc#1020795).
- dm: allow remove to be deferred (bsc#1020795).
- dm bitset: only flush the current word if it has been dirtied (bsc#1020795).
- dm btree: add dm_btree_find_lowest_key (bsc#1020795).
- dm cache: actually resize cache (bsc#1020795).
- dm cache: add block sizes and total cache blocks to status output (bsc#1020795).
- dm cache: add cache block invalidation support (bsc#1020795).
- dm cache: add passthrough mode (bsc#1020795).
- dm cache: add policy name to status output (bsc#1020795).
- dm cache: add remove_cblock method to policy interface (bsc#1020795).
- dm cache: be much more aggressive about promoting writes to discarded blocks (bsc#1020795).
- dm cache: cache shrinking support (bsc#1020795).
- dm cache: do not add migration to completed list before unhooking bio (bsc#1020795).
- dm cache: fix a lock-inversion (bsc#1020795).
- dm cache: fix truncation bug when mapping I/O to more than 2TB fast device (bsc#1020795).
- dm cache: fix writethrough mode quiescing in cache_map (bsc#1020795).
- dm cache: improve efficiency of quiescing flag management (bsc#1020795).
- dm cache: io destined for the cache device can now serve as tick bios (bsc#1020795).
- dm cache: log error message if dm_kcopyd_copy() fails (bsc#1020795).
- dm cache metadata: check the metadata version when reading the superblock (bsc#1020795).
- dm cache metadata: return bool from __superblock_all_zeroes (bsc#1020795).
- dm cache: move hook_info into common portion of per_bio_data structure (bsc#1020795).
- dm cache: optimize commit_if_needed (bsc#1020795).
- dm cache policy mq: a few small fixes (bsc#1020795).
- dm cache policy mq: fix promotions to occur as expected (bsc#1020795).
- dm cache policy mq: implement writeback_work() and mq_{set,clear}_dirty() (bsc#1020795).
- dm cache policy mq: introduce three promotion threshold tunables (bsc#1020795).
- dm cache policy mq: protect residency method with existing mutex (bsc#1020795).
- dm cache policy mq: reduce memory requirements (bsc#1020795).
- dm cache policy mq: use list_del_init instead of list_del + INIT_LIST_HEAD (bsc#1020795).
- dm cache policy: remove return from void policy_remove_mapping (bsc#1020795).
- dm cache: promotion optimisation for writes (bsc#1020795).
- dm cache: resolve small nits and improve Documentation (bsc#1020795).
- dm cache: return -EINVAL if the user specifies unknown cache policy (bsc#1020795).
- dm cache: use cell_defer() boolean argument consistently (bsc#1020795).
- dm: change sector_count member in clone_info from sector_t to unsigned (bsc#1020795).
- dm crypt: add TCW IV mode for old CBC TCRYPT containers (bsc#1020795).
- dm crypt: properly handle extra key string in initialization (bsc#1020795).
- dm delay: use per-bio data instead of a mempool and slab cache (bsc#1020795).
- dm: fix Kconfig indentation (bsc#1020795).
- dm: fix Kconfig menu indentation (bsc#1020795).
- dm: make dm_table_alloc_md_mempools static (bsc#1020795).
- dm mpath: do not call pg_init when it is already running (bsc#1020795).
- dm mpath: fix lock order inconsistency in multipath_ioctl (bsc#1020795).
- dm mpath: print more useful warnings in multipath_message() (bsc#1020795).
- dm mpath: push back requests instead of queueing (bsc#1020795).
- dm mpath: really fix lockdep warning (bsc#1020795).
- dm mpath: reduce memory pressure when requeuing (bsc#1020795).
- dm mpath: remove extra nesting in map function (bsc#1020795).
- dm mpath: remove map_io() (bsc#1020795).
- dm mpath: remove process_queued_ios() (bsc#1020795).
- dm mpath: requeue I/O during pg_init (bsc#1020795).
- dm persistent data: cleanup dm-thin specific references in text (bsc#1020795).
- dm snapshot: call destroy_work_on_stack() to pair with INIT_WORK_ONSTACK() (bsc#1020795).
- dm snapshot: fix metadata corruption (bsc#1020795).
- dm snapshot: prepare for switch to using dm-bufio (bsc#1020795).
- dm snapshot: use dm-bufio (bsc#1020795).
- dm snapshot: use dm-bufio prefetch (bsc#1020795).
- dm snapshot: use GFP_KERNEL when initializing exceptions (bsc#1020795).
- dm space map disk: optimise sm_disk_dec_block (bsc#1020795).
- dm space map metadata: limit errors in sm_metadata_new_block (bsc#1020795).
- dm: stop using bi_private (bsc#1020795).
- dm table: add dm_table_run_md_queue_async (bsc#1020795).
- dm table: print error on preresume failure (bsc#1020795).
- dm table: remove unused buggy code that extends the targets array (bsc#1020795).
- dm thin: add error_if_no_space feature (bsc#1020795).
- dm thin: add mappings to end of prepared_* lists (bsc#1020795).
- dm thin: add 'no_space_timeout' dm-thin-pool module param (bsc#1020795).
- dm thin: add timeout to stop out-of-data-space mode holding IO forever (bsc#1020795).
- dm thin: allow metadata commit if pool is in PM_OUT_OF_DATA_SPACE mode (bsc#1020795).
- dm thin: allow metadata space larger than supported to go unused (bsc#1020795).
- dm thin: cleanup and improve no space handling (bsc#1020795).
- dm thin: eliminate the no_free_space flag (bsc#1020795).
- dm thin: ensure user takes action to validate data and metadata consistency (bsc#1020795).
- dm thin: factor out check_low_water_mark and use bools (bsc#1020795).
- dm thin: fix deadlock in __requeue_bio_list (bsc#1020795).
- dm thin: fix noflush suspend IO queueing (bsc#1020795).
- dm thin: fix out of data space handling (bsc#1020795).
- dm thin: fix pool feature parsing (bsc#1020795).
- dm thin: fix rcu_read_lock being held in code that can sleep (bsc#1020795).
- dm thin: handle metadata failures more consistently (bsc#1020795).
- dm thin: irqsave must always be used with the pool-&gt;lock spinlock (bsc#1020795).
- dm thin: log info when growing the data or metadata device (bsc#1020795).
- dm thin: requeue bios to DM core if no_free_space and in read-only mode (bsc#1020795).
- dm thin: return error from alloc_data_block if pool is not in write mode (bsc#1020795).
- dm thin: simplify pool_is_congested (bsc#1020795).
- dm thin: sort the per thin deferred bios using an rb_tree (bsc#1020795).
- dm thin: synchronize the pool mode during suspend (bsc#1020795).
- dm thin: use bool rather than unsigned for flags in structures (bsc#1020795).
- dm thin: use INIT_WORK_ONSTACK in noflush_work to avoid ODEBUG warning (bsc#1020795).
- dm thin: use per thin device deferred bio lists (bsc#1020795).
- dm: use RCU_INIT_POINTER instead of rcu_assign_pointer in __unbind (bsc#1020795).
- drm/i915: relax uncritical udelay_range() (bsc#1038261).
- ether: add loopback type ETH_P_LOOPBACK (bsc#1028595).
- ext4: fix bh leak on error paths in ext4_rename() and ext4_cross_rename() (bsc#1012985).
- ext4: fix fencepost in s_first_meta_bg validation (bsc#1029986).
- ext4: mark inode dirty after converting inline directory (bsc#1012985).
- ftrace: Make ftrace_location_range() global (FATE#322421).
- HID: usbhid: improve handling of Clear-Halt and reset (bsc#1031080).
- hv: util: catch allocation errors
- hv: utils: use memdup_user in hvt_op_write
- hwrng: virtio - ensure reads happen after successful probe (bsc#954763 bsc#1032344).
- i40e: avoid null pointer dereference (bsc#922853).
- i40e/i40evf: Break up xmit_descriptor_count from maybe_stop_tx (bsc#985561).
- i40e/i40evf: Limit TSO to 7 descriptors for payload instead of 8 per packet (bsc#985561).
- i40e/i40evf: Rewrite logic for 8 descriptor per packet check (bsc#985561).
- i40e: Impose a lower limit on gso size (bsc#985561).
- i40e: Limit TX descriptor count in cases where frag size is greater than 16K (bsc#985561).
- iommu/vt-d: Flush old iommu caches for kdump when the device gets context mapped (bsc#1023824).
- iommu/vt-d: Tylersburg isoch identity map check is done too late (bsc#1032125).
- ipv6: make ECMP route replacement less greedy (bsc#930399).
- kabi: hide changes in struct sk_buff (bsc#1009682).
- KABI: Hide new include in arch/powerpc/kernel/process.c (fate#322421).
- kABI: mask struct xfs_icdinode change (bsc#1024788).
- kABI: protect struct inet6_dev (kabi).
- kABI: protect struct iscsi_conn (bsc#103470).
- kABI: protect struct xfs_buftarg and struct xfs_mount (bsc#1024508).
- kABI: restore can_rx_register parameters (kabi).
- kernel/watchdog: use nmi registers snapshot in hardlockup handler (bsc#940946, bsc#937444).
- kgr: Mark eeh_event_handler() kthread safe using a timeout (bsc#1031662).
- kgr/module: make a taint flag module-specific
- kgr: remove unneeded kgr_needs_lazy_migration() s390x definition
- l2tp: fix address test in __l2tp_ip6_bind_lookup() (bsc#1028415).
- l2tp: fix lookup for sockets not bound to a device in l2tp_ip (bsc#1028415).
- l2tp: fix racy socket lookup in l2tp_ip and l2tp_ip6 bind() (bsc#1028415).
- l2tp: hold socket before dropping lock in l2tp_ip{, 6}_recv() (bsc#1028415).
- l2tp: hold tunnel socket when handling control frames in l2tp_ip and l2tp_ip6 (bsc#1028415).
- l2tp: lock socket before checking flags in connect() (bsc#1028415).
- livepatch: Allow architectures to specify an alternate ftrace location (FATE#322421).
- locking/semaphore: Add down_interruptible_timeout() (bsc#1031662).
- md: avoid oops on unload if some process is in poll or select (bsc#1020795).
- md: Convert use of typedef ctl_table to struct ctl_table (bsc#1020795).
- md: ensure metadata is writen after raid level change (bsc#1020795).
- md linear: fix a race between linear_add() and linear_congested() (bsc#1018446).
- md: md_clear_badblocks should return an error code on failure (bsc#1020795).
- md: refuse to change shape of array if it is active but read-only (bsc#1020795).
- megaraid_sas: add missing curly braces in ioctl handler (bsc#1023207).
- megaraid_sas: Fixup tgtid count in megasas_ld_list_query() (bsc#971933).
- mm/huge_memory.c: respect FOLL_FORCE/FOLL_COW for thp (bnc#1030118).
- mm, memcg: do not retry precharge charges (bnc#1022559).
- mm/mempolicy.c: do not put mempolicy before using its nodemask (References: VM Performance, bnc#931620).
- mm/page_alloc: fix nodes for reclaim in fast path (bnc#1031842).
- module: move add_taint_module() to a header file
- net: Add skb_gro_postpull_rcsum to udp and vxlan (bsc#1009682).
- net: add skb_pop_rcv_encapsulation (bsc#1009682).
- net: Call skb_checksum_init in IPv4 (bsc#1009682).
- net: Call skb_checksum_init in IPv6 (bsc#1009682).
- netfilter: allow logging fron non-init netns (bsc#970083).
- net: Generalize checksum_init functions (bsc#1009682).
- net: Preserve CHECKSUM_COMPLETE at validation (bsc#1009682).
- NFS: do not try to cross a mountpount when there isn't one there (bsc#1028041).
- NFS: Expedite unmount of NFS auto-mounts (bnc#1025802).
- NFS: Fix a performance regression in readdir (bsc#857926).
- NFS: flush out dirty data on file fput() (bsc#1021762).
- ocfs2: do not write error flag to user structure we cannot copy from/to (bsc#1012985).
- powerpc: Blacklist GCC 5.4 6.1 and 6.2 (boo#1028895).
- powerpc: Create a helper for getting the kernel toc value (FATE#322421).
- powerpc/fadump: Fix the race in crash_fadump() (bsc#1022971).
- powerpc/fadump: Reserve memory at an offset closer to bottom of RAM (bsc#1032141).
- powerpc/fadump: Update fadump documentation (bsc#1032141).
- powerpc/ftrace: Add Kconfig &amp; Make glue for mprofile-kernel (FATE#322421).
- powerpc/ftrace: Add support for -mprofile-kernel ftrace ABI (FATE#322421).
- powerpc/ftrace: Use $(CC_FLAGS_FTRACE) when disabling ftrace (FATE#322421).
- powerpc/ftrace: Use generic ftrace_modify_all_code() (FATE#322421).
- powerpc: introduce TIF_KGR_IN_PROGRESS thread flag (FATE#322421).
- powerpc/kgraft: Add kgraft header (FATE#322421).
- powerpc/kgraft: Add kgraft stack to struct thread_info (FATE#322421).
- powerpc/kgraft: Add live patching support on ppc64le (FATE#322421).
- powerpc/module: Create a special stub for ftrace_caller() (FATE#322421).
- powerpc/module: Mark module stubs with a magic value (FATE#322421).
- powerpc/module: Only try to generate the ftrace_caller() stub once (FATE#322421).
- powerpc/modules: Never restore r2 for a mprofile-kernel style mcount() call (FATE#322421).
- powerpc/prom: Increase minimum RMA size to 512MB (bsc#984530).
- powerpc/pseries/cpuidle: Remove MAX_IDLE_STATE macro (bnc#1023164).
- powerpc/pseries/cpuidle: Use cpuidle_register() for initialisation (bnc#1023164).
- powerpc: Reject binutils 2.24 when building little endian (boo#1028895).
- RAID1: avoid unnecessary spin locks in I/O barrier code (bsc#982783,bsc#1020048).
- raid1: include bio_end_io_list in nr_queued to prevent freeze_array hang
- remove mpath patches from dmcache backport, for bsc#1035738
- revert 'procfs: mark thread stack correctly in proc/PID/maps' (bnc#1030901).
- Revert 'RDMA/core: Fix incorrect structure packing for booleans' (kabi).
- rtnetlink: allow to register ops without ops-&gt;setup set (bsc#1021374).
- s390/zcrypt: Introduce CEX6 toleration (FATE#321783, LTC#147506, bsc#1019514).
- sched/loadavg: Avoid loadavg spikes caused by delayed NO_HZ accounting (bsc#1018419).
- scsi_error: count medium access timeout only once per EH run (bsc#993832, bsc#1032345).
- scsi: libiscsi: add lock around task lists to fix list corruption regression (bsc#1034700).
- scsi: storvsc: fix SRB_STATUS_ABORTED handling
- sfc: reduce severity of PIO buffer alloc failures (bsc#1019168).
- svcrpc: fix gss-proxy NULL dereference in some error cases (bsc#1024309).
- taint/module: Clean up global and module taint flags handling
- tcp: abort orphan sockets stalling on zero window probes (bsc#1021913).
- thp: fix MADV_DONTNEED vs. numa balancing race (bnc#1027974).
- thp: reduce indentation level in change_huge_pmd() (bnc#1027974).
- treewide: fix 'distingush' typo (bsc#1020795).
- tree-wide: use reinit_completion instead of INIT_COMPLETION (bsc#1020795).
- usb: dwc3: gadget: Fix incorrect DEPCMD and DGCMD status macros (bsc#1035699).
- usb: host: xhci: print correct command ring address (bnc#1035699).
- USB: serial: kl5kusb105: fix line-state error handling (bsc#1021256).
- vfs: Do not exchange 'short' filenames unconditionally (bsc#1012985).
- vfs: split generic splice code from i_mutex locking (bsc#1024788).
- vmxnet3: segCnt can be 1 for LRO packets (bsc#988065).
- VSOCK: Detach QP check should filter out non matching QPs (bsc#1036752).
- vxlan: cancel sock_work in vxlan_dellink() (bsc#1031567).
- vxlan: Checksum fixes (bsc#1009682).
- vxlan: GRO support at tunnel layer (bsc#1009682).
- xen-blkfront: correct maximum segment accounting (bsc#1018263).
- xen-blkfront: do not call talk_to_blkback when already connected to blkback.
- xen-blkfront: free resources if xlvbd_alloc_gendisk fails.
- xfs_dmapi: fix the debug compilation of xfs_dmapi (bsc#989056).
- xfs: do not allow di_size with high bit set (bsc#1024234).
- xfs: do not assert fail on non-async buffers on ioacct decrement (bsc#1024508).
- xfs: exclude never-released buffers from buftarg I/O accounting (bsc#1024508).
- xfs: fix broken multi-fsb buffer logging (bsc#1024081).
- xfs: fix buffer overflow dm_get_dirattrs/dm_get_dirattrs2 (bsc#989056).
- xfs: Fix lock ordering in splice write (bsc#1024788).
- xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888).
- xfs: Make xfs_icdinode-&gt;di_dmstate atomic_t (bsc#1024788).
- xfs: pass total block res. as total xfs_bmapi_write() parameter (bsc#1029470).
- xfs: replace global xfslogd wq with per-mount wq (bsc#1024508).
- xfs: track and serialize in-flight async buffers against unmount (bsc#1024508).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-19"/>
	<updated date="2017-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1003077">SUSE bug 1003077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008842">SUSE bug 1008842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009682">SUSE bug 1009682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012620">SUSE bug 1012620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012985">SUSE bug 1012985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015703">SUSE bug 1015703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015787">SUSE bug 1015787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015821">SUSE bug 1015821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017512">SUSE bug 1017512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018100">SUSE bug 1018100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018263">SUSE bug 1018263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018419">SUSE bug 1018419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018446">SUSE bug 1018446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019168">SUSE bug 1019168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019514">SUSE bug 1019514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020048">SUSE bug 1020048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020795">SUSE bug 1020795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021256">SUSE bug 1021256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021374">SUSE bug 1021374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021762">SUSE bug 1021762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021913">SUSE bug 1021913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022559">SUSE bug 1022559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022971">SUSE bug 1022971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023164">SUSE bug 1023164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023207">SUSE bug 1023207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023377">SUSE bug 1023377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023762">SUSE bug 1023762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023824">SUSE bug 1023824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023888">SUSE bug 1023888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023992">SUSE bug 1023992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024081">SUSE bug 1024081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024234">SUSE bug 1024234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024309">SUSE bug 1024309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024508">SUSE bug 1024508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024788">SUSE bug 1024788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025039">SUSE bug 1025039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025235">SUSE bug 1025235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025354">SUSE bug 1025354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025802">SUSE bug 1025802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026024">SUSE bug 1026024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026722">SUSE bug 1026722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026914">SUSE bug 1026914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027066">SUSE bug 1027066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027178">SUSE bug 1027178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027189">SUSE bug 1027189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027190">SUSE bug 1027190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027974">SUSE bug 1027974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028041">SUSE bug 1028041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028415">SUSE bug 1028415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028595">SUSE bug 1028595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028648">SUSE bug 1028648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028895">SUSE bug 1028895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029470">SUSE bug 1029470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029850">SUSE bug 1029850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029986">SUSE bug 1029986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030118">SUSE bug 1030118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030213">SUSE bug 1030213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030593">SUSE bug 1030593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030901">SUSE bug 1030901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031003">SUSE bug 1031003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031052">SUSE bug 1031052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031080">SUSE bug 1031080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031440">SUSE bug 1031440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031567">SUSE bug 1031567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031579">SUSE bug 1031579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031662">SUSE bug 1031662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031842">SUSE bug 1031842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032125">SUSE bug 1032125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032141">SUSE bug 1032141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032344">SUSE bug 1032344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032345">SUSE bug 1032345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033336">SUSE bug 1033336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034670">SUSE bug 1034670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/103470">SUSE bug 103470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034700">SUSE bug 1034700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035576">SUSE bug 1035576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035699">SUSE bug 1035699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035738">SUSE bug 1035738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035877">SUSE bug 1035877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036752">SUSE bug 1036752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038261">SUSE bug 1038261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799133">SUSE bug 799133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857926">SUSE bug 857926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914939">SUSE bug 914939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917630">SUSE bug 917630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922853">SUSE bug 922853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930399">SUSE bug 930399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931620">SUSE bug 931620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937444">SUSE bug 937444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940946">SUSE bug 940946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954763">SUSE bug 954763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968697">SUSE bug 968697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970083">SUSE bug 970083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971933">SUSE bug 971933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979215">SUSE bug 979215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982783">SUSE bug 982783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983212">SUSE bug 983212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984530">SUSE bug 984530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985561">SUSE bug 985561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988065">SUSE bug 988065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989056">SUSE bug 989056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993832">SUSE bug 993832</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1350/">CVE-2015-1350</cve>
	<cve impact="low" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10044/">CVE-2016-10044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10200/">CVE-2016-10200</cve>
	<cve impact="important" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10208/">CVE-2016-10208</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2117/">CVE-2016-2117</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3070/">CVE-2016-3070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5243/">CVE-2016-5243</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7117/">CVE-2016-7117</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9191/">CVE-2016-9191</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9588/">CVE-2016-9588</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-9604/">CVE-2016-9604</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2647/">CVE-2017-2647</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2671/">CVE-2017-2671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5669/">CVE-2017-5669</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5897/">CVE-2017-5897</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5986/">CVE-2017-5986</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6074/">CVE-2017-6074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6214/">CVE-2017-6214</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6345/">CVE-2017-6345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6346/">CVE-2017-6346</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6348/">CVE-2017-6348</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6353/">CVE-2017-6353</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6951/">CVE-2017-6951</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7187/">CVE-2017-7187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7261/">CVE-2017-7261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7294/">CVE-2017-7294</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7308/">CVE-2017-7308</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7616/">CVE-2017-7616</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7645/">CVE-2017-7645</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8106/">CVE-2017-8106</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517382" comment="kernel-default-3.12.74-60.64.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517383" comment="kernel-default-devel-3.12.74-60.64.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517384" comment="kernel-default-extra-3.12.74-60.64.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517385" comment="kernel-devel-3.12.74-60.64.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517386" comment="kernel-macros-3.12.74-60.64.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517387" comment="kernel-source-3.12.74-60.64.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517388" comment="kernel-syms-3.12.74-60.64.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517389" comment="kernel-xen-3.12.74-60.64.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517390" comment="kernel-xen-devel-3.12.74-60.64.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77802" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1010675" ref_url="https://bugzilla.suse.com/1010675" source="BUGZILLA"/>
		<reference ref_id="1013930" ref_url="https://bugzilla.suse.com/1013930" source="BUGZILLA"/>
		<reference ref_id="1014873" ref_url="https://bugzilla.suse.com/1014873" source="BUGZILLA"/>
		<reference ref_id="1017497" ref_url="https://bugzilla.suse.com/1017497" source="BUGZILLA"/>
		<reference ref_id="876652" ref_url="https://bugzilla.suse.com/876652" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318/" source="CVE"/>
		<reference ref_id="CVE-2016-9597" ref_url="https://www.suse.com/security/cve/CVE-2016-9597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002905.html" source="SUSE-SU"/>
		<description>

 This update for libxml2 fixes the following issues:
 
* Fix NULL dereference in xpointer.c when in recovery mode [bsc#1014873]
* CVE-2016-9597: An XML document with many opening tags could have caused a overflow of the stack not detected by the recursion limits, allowing for DoS (bsc#1017497)
* CVE-2014-0191: External parameter entity loaded when entity substitution is disabled could cause a DoS. (bsc#876652)
* CVE-2016-9318: XML External Entity (XXE) could be abused via crafted document. (bsc#1010675)
 
 		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-22"/>
	<updated date="2017-05-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013930">SUSE bug 1013930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014873">SUSE bug 1014873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017497">SUSE bug 1017497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876652">SUSE bug 876652</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9597/">CVE-2016-9597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517391" comment="libxml2-2-2.9.1-26.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517392" comment="libxml2-2-32bit-2.9.1-26.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517393" comment="libxml2-tools-2.9.1-26.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517394" comment="python-libxml2-2.9.1-26.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77803" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1033054" ref_url="https://bugzilla.suse.com/1033054" source="BUGZILLA"/>
		<reference ref_id="1033914" ref_url="https://bugzilla.suse.com/1033914" source="BUGZILLA"/>
		<reference ref_id="1033915" ref_url="https://bugzilla.suse.com/1033915" source="BUGZILLA"/>
		<reference ref_id="1036943" ref_url="https://bugzilla.suse.com/1036943" source="BUGZILLA"/>
		<reference ref_id="1036944" ref_url="https://bugzilla.suse.com/1036944" source="BUGZILLA"/>
		<reference ref_id="1036945" ref_url="https://bugzilla.suse.com/1036945" source="BUGZILLA"/>
		<reference ref_id="1036946" ref_url="https://bugzilla.suse.com/1036946" source="BUGZILLA"/>
		<reference ref_id="1038856" ref_url="https://bugzilla.suse.com/1038856" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7585" ref_url="https://www.suse.com/security/cve/CVE-2017-7585/" source="CVE"/>
		<reference ref_id="CVE-2017-7741" ref_url="https://www.suse.com/security/cve/CVE-2017-7741/" source="CVE"/>
		<reference ref_id="CVE-2017-7742" ref_url="https://www.suse.com/security/cve/CVE-2017-7742/" source="CVE"/>
		<reference ref_id="CVE-2017-8361" ref_url="https://www.suse.com/security/cve/CVE-2017-8361/" source="CVE"/>
		<reference ref_id="CVE-2017-8362" ref_url="https://www.suse.com/security/cve/CVE-2017-8362/" source="CVE"/>
		<reference ref_id="CVE-2017-8363" ref_url="https://www.suse.com/security/cve/CVE-2017-8363/" source="CVE"/>
		<reference ref_id="CVE-2017-8365" ref_url="https://www.suse.com/security/cve/CVE-2017-8365/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002906.html" source="SUSE-SU"/>
		<description>

This update for libsndfile fixes the following issues:

- CVE-2017-8361: Global buffer overflow in flac_buffer_copy. (bsc#1036946)
- CVE-2017-8362: Invalid memory read in flac_buffer_copy. (bsc#1036943)
- CVE-2017-8363: Heap-based buffer overflow in flac_buffer_copy. (bsc#1036945)
- CVE-2017-7585, CVE-2017-7741, CVE-2017-7742: Stack-based buffer overflows via specially
  crafted FLAC files. (bsc#1033054)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-22"/>
	<updated date="2017-05-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033054">SUSE bug 1033054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033914">SUSE bug 1033914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033915">SUSE bug 1033915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036943">SUSE bug 1036943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036944">SUSE bug 1036944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036945">SUSE bug 1036945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036946">SUSE bug 1036946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038856">SUSE bug 1038856</bugzilla>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7585/">CVE-2017-7585</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7741/">CVE-2017-7741</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7742/">CVE-2017-7742</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8361/">CVE-2017-8361</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8362/">CVE-2017-8362</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8363/">CVE-2017-8363</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8365/">CVE-2017-8365</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517395" comment="libsndfile1-1.0.25-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517396" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77804" version="1" class="patch">
	<metadata>
		<title>Security update for libplist (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1019531" ref_url="https://bugzilla.suse.com/1019531" source="BUGZILLA"/>
		<reference ref_id="1021610" ref_url="https://bugzilla.suse.com/1021610" source="BUGZILLA"/>
		<reference ref_id="1023807" ref_url="https://bugzilla.suse.com/1023807" source="BUGZILLA"/>
		<reference ref_id="1023822" ref_url="https://bugzilla.suse.com/1023822" source="BUGZILLA"/>
		<reference ref_id="1023848" ref_url="https://bugzilla.suse.com/1023848" source="BUGZILLA"/>
		<reference ref_id="1029631" ref_url="https://bugzilla.suse.com/1029631" source="BUGZILLA"/>
		<reference ref_id="1035312" ref_url="https://bugzilla.suse.com/1035312" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5209" ref_url="https://www.suse.com/security/cve/CVE-2017-5209/" source="CVE"/>
		<reference ref_id="CVE-2017-5545" ref_url="https://www.suse.com/security/cve/CVE-2017-5545/" source="CVE"/>
		<reference ref_id="CVE-2017-5834" ref_url="https://www.suse.com/security/cve/CVE-2017-5834/" source="CVE"/>
		<reference ref_id="CVE-2017-5835" ref_url="https://www.suse.com/security/cve/CVE-2017-5835/" source="CVE"/>
		<reference ref_id="CVE-2017-5836" ref_url="https://www.suse.com/security/cve/CVE-2017-5836/" source="CVE"/>
		<reference ref_id="CVE-2017-6440" ref_url="https://www.suse.com/security/cve/CVE-2017-6440/" source="CVE"/>
		<reference ref_id="CVE-2017-7982" ref_url="https://www.suse.com/security/cve/CVE-2017-7982/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002907.html" source="SUSE-SU"/>
		<description>

This update for libplist fixes the following security issues:

- CVE-2017-5545: The main function in plistutil.c in libimobiledevice libplist allowed attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via Apple Property List data that is too short. (bsc#1021610).
- CVE-2017-5209: The base64decode function in base64.c in libimobiledevice libplist through 1.12 allows attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via split encoded Apple Property List data. (bsc#1019531)
- CVE-2017-5836: A type inconsistency in bplist.c was fixed. (bsc#1023807)
- CVE-2017-5835: A memory allocation error leading to DoS was fixed. (bsc#1023822)
- CVE-2017-5834: A heap-buffer overflow in parse_dict_node was fixed (bsc#1023848)
- CVE-2017-7982: Denial of service (heap-based buffer over-read and application crash) via a crafted plist file (bsc#1035312)
- CVE-2017-6440: A specially crafted plist file could lead to denial of service (bsc#1029631)    
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-22"/>
	<updated date="2017-05-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1019531">SUSE bug 1019531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021610">SUSE bug 1021610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023807">SUSE bug 1023807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023822">SUSE bug 1023822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023848">SUSE bug 1023848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029631">SUSE bug 1029631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035312">SUSE bug 1035312</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5209/">CVE-2017-5209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5545/">CVE-2017-5545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5834/">CVE-2017-5834</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5835/">CVE-2017-5835</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5836/">CVE-2017-5836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6440/">CVE-2017-6440</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7982/">CVE-2017-7982</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517397" comment="libplist++1-1.8-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517398" comment="libplist1-1.8-10.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77805" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1038231" ref_url="https://bugzilla.suse.com/1038231" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7494" ref_url="https://www.suse.com/security/cve/CVE-2017-7494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00066.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issue:

- An unprivileged user with access to the samba server could cause smbd to load
  a specially crafted shared library, which then had the ability to execute
  arbitrary code on the server as 'root'. [CVE-2017-7494, bso#12780, bsc#1038231]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-24"/>
	<updated date="2017-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038231">SUSE bug 1038231</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7494/">CVE-2017-7494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517399" comment="libdcerpc-binding0-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517400" comment="libdcerpc-binding0-32bit-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517401" comment="libdcerpc0-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517402" comment="libdcerpc0-32bit-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517403" comment="libgensec0-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517404" comment="libgensec0-32bit-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517405" comment="libndr-krb5pac0-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517406" comment="libndr-krb5pac0-32bit-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517407" comment="libndr-nbt0-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517408" comment="libndr-nbt0-32bit-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517409" comment="libndr-standard0-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517410" comment="libndr-standard0-32bit-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517411" comment="libndr0-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517412" comment="libndr0-32bit-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517413" comment="libnetapi0-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517414" comment="libnetapi0-32bit-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517415" comment="libregistry0-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517416" comment="libsamba-credentials0-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517417" comment="libsamba-credentials0-32bit-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517418" comment="libsamba-hostconfig0-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517419" comment="libsamba-hostconfig0-32bit-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517420" comment="libsamba-passdb0-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517421" comment="libsamba-passdb0-32bit-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517422" comment="libsamba-util0-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517423" comment="libsamba-util0-32bit-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517424" comment="libsamdb0-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517425" comment="libsamdb0-32bit-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517426" comment="libsmbclient-raw0-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517427" comment="libsmbclient-raw0-32bit-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517428" comment="libsmbclient0-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517429" comment="libsmbclient0-32bit-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517430" comment="libsmbconf0-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517431" comment="libsmbconf0-32bit-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517432" comment="libsmbldap0-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517433" comment="libsmbldap0-32bit-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517434" comment="libtevent-util0-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517435" comment="libtevent-util0-32bit-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517436" comment="libwbclient0-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517437" comment="libwbclient0-32bit-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517438" comment="samba-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517439" comment="samba-32bit-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517440" comment="samba-client-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517441" comment="samba-client-32bit-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517442" comment="samba-doc-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517443" comment="samba-libs-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517444" comment="samba-libs-32bit-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517445" comment="samba-winbind-4.2.4-28.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517446" comment="samba-winbind-32bit-4.2.4-28.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77806" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1034849" ref_url="https://bugzilla.suse.com/1034849" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3289" ref_url="https://www.suse.com/security/cve/CVE-2017-3289/" source="CVE"/>
		<reference ref_id="CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509/" source="CVE"/>
		<reference ref_id="CVE-2017-3511" ref_url="https://www.suse.com/security/cve/CVE-2017-3511/" source="CVE"/>
		<reference ref_id="CVE-2017-3512" ref_url="https://www.suse.com/security/cve/CVE-2017-3512/" source="CVE"/>
		<reference ref_id="CVE-2017-3514" ref_url="https://www.suse.com/security/cve/CVE-2017-3514/" source="CVE"/>
		<reference ref_id="CVE-2017-3526" ref_url="https://www.suse.com/security/cve/CVE-2017-3526/" source="CVE"/>
		<reference ref_id="CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533/" source="CVE"/>
		<reference ref_id="CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539/" source="CVE"/>
		<reference ref_id="CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00068.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_0-openjdk fixes the following issues:

- Update to 2.6.10 - OpenJDK 7u141 (bsc#1034849)
* Security fixes
    - S8163520, CVE-2017-3509: Reuse cache entries
    - S8163528, CVE-2017-3511: Better library loading
    - S8165626, CVE-2017-3512: Improved window framing
    - S8167110, CVE-2017-3514: Windows peering issue
    - S8169011, CVE-2017-3526: Resizing XML parse trees
    - S8170222, CVE-2017-3533: Better transfers of files
    - S8171121, CVE-2017-3539: Enhancing jar checking
    - S8171533, CVE-2017-3544: Better email transfer
    - S8172299: Improve class processing
  * New features
    - PR3347: jstack.stp should support AArch64
  * Import of OpenJDK 7 u141 build 0
    - S4717864: setFont() does not update Fonts of Menus already on
      screen
    - S6474807: (smartcardio) CardTerminal.connect() throws
      CardException instead of CardNotPresentException
    - S6518907: cleanup IA64 specific code in Hotspot
    - S6869327: Add new C2 flag to keep safepoints in counted loops.
    - S7112912: Message 'Error occurred during initialization of
      VM' on boxes with lots of RAM
    - S7124213: [macosx] pack() does ignore size of a component;
      doesn't on the other platforms
    - S7124219: [macosx] Unable to draw images to fullscreen
    - S7124552: [macosx] NullPointerException in getBufferStrategy()
    - S7148275: [macosx] setIconImages() not working correctly
      (distorted icon when minimized)
    - S7154841: [macosx] Popups appear behind taskbar
    - S7155957:
      closed/java/awt/MenuBar/MenuBarStress1/MenuBarStress1.java
      hangs on win 64 bit with jdk8
    - S7160627: [macosx] TextArea has wrong initial size
    - S7167293: FtpURLConnection connection leak on
      FileNotFoundException
    - S7168851: [macosx] Netbeans crashes in
      CImage.nativeCreateNSImageFromArray
    - S7197203: sun/misc/URLClassPath/ClassnameCharTest.sh failed,
      compile error
    - S8005255: [macosx] Cleanup warnings in sun.lwawt
    - S8006088: Incompatible heap size flags accepted by VM
    - S8007295: Reduce number of warnings in awt classes
    - S8010722: assert: failed: heap size is too big for compressed
      oops
    - S8011059: [macosx] Support automatic @2x images loading on
      Mac OS X
    - S8014058: Regression tests for 8006088
    - S8014489:
      tests/gc/arguments/Test(Serial|CMS|Parallel|G1)HeapSizeFlags
      jtreg tests invoke wrong class
    - S8016302: Change type of the number of GC workers to unsigned
      int (2)
    - S8024662: gc/arguments/TestUseCompressedOopsErgo.java does
      not compile.
    - S8024669: Native OOME when allocating after changes to
      maximum heap supporting Coops sizing on sparcv9
    - S8024926: [macosx] AquaIcon HiDPI support
    - S8025974: l10n for policytool
    - S8027025: [macosx] getLocationOnScreen returns 0 if parent
      invisible
    - S8028212: Custom cursor HiDPI support
    - S8028471: PPC64 (part 215): opto: Extend ImplicitNullCheck
      optimization.
    - S8031573: [macosx] Checkmarks of JCheckBoxMenuItems aren't
      rendered in high resolution on Retina
    - S8033534: [macosx] Get MultiResolution image from native
      system
    - S8033786: White flashing when opening Dialogs and Menus using
      Nimbus with dark background
    - S8035568: [macosx] Cursor management unification
    - S8041734: JFrame in full screen mode leaves empty workspace
      after close
    - S8059803: Update use of GetVersionEx to get correct Windows
      version in hs_err files
    - S8066504: GetVersionEx in
      java.base/windows/native/libjava/java_props_md.c might not
      get correct Windows version 0
    - S8079595: Resizing dialog which is JWindow parent makes JVM
      crash
    - S8080729: [macosx] java 7 and 8 JDialogs on multiscreen jump
      to parent frame on focus
    - S8130769: The new menu can't be shown on the menubar after
      clicking the 'Add' button.
    - S8133357: 8u65 l10n resource file translation update
    - S8146602:
      jdk/test/sun/misc/URLClassPath/ClassnameCharTest.java test
      fails with NullPointerException
    - S8147842: IME Composition Window is displayed at incorrect
      location
    - S8147910: Cache initial active_processor_count
    - S8150490: Update OS detection code to recognize Windows
      Server 2016
    - S8161147: jvm crashes when -XX:+UseCountedLoopSafepoints is
      enabled
    - S8161195: Regression:
      closed/javax/swing/text/FlowView/LayoutTest.java
    - S8161993: G1 crashes if active_processor_count changes during
      startup
    - S8162603: Unrecognized VM option 'UseCountedLoopSafepoints'
    - S8162876: [TEST_BUG]
      sun/net/www/protocol/http/HttpInputStream.java fails
      intermittently
    - S8164533: sun/security/ssl/SSLSocketImpl/CloseSocket.java
      failed with 'Error while cleaning up threads after test'
    - S8167179: Make XSL generated namespace prefixes local to
      transformation process
    - S8169465: Deadlock in com.sun.jndi.ldap.pool.Connections
    - S8169589: [macosx] Activating a JDialog puts to back another
      dialog
    - S8170307: Stack size option -Xss is ignored
    - S8170316: (tz) Support tzdata2016j
    - S8170814: Reuse cache entries (part II)
    - S8171388: Update JNDI Thread contexts
    - S8171949: [macosx] AWT_ZoomFrame Automated tests fail with
      error: The bitwise mask Frame.ICONIFIED is not setwhen the
       frame is in ICONIFIED state
    - S8171952: [macosx]
      AWT_Modality/Automated/ModalExclusion/NoExclusion/ModelessDialog
      test fails as DummyButton on Dialog did not gain focus when
      clicked.
    - S8173931: 8u131 L10n resource file update
    - S8174844: Incorrect GPL header causes RE script to miss swap
      to commercial header for licensee source bundle
    - S8175087: [bsd] Fix build after '8024900: PPC64: Enable new
      build on AIX (jdk part)'
    - S8175163: [bsd] Fix build after '8005629: javac warnings
      compiling java.awt.EventDispatchThread...'
    - S8176044: (tz) Support tzdata2017a
  * Import of OpenJDK 7 u141 build 1
    - S8043723: max_heap_for_compressed_oops() declared with
      size_t, but defined with uintx
  * Import of OpenJDK 7 u141 build 2
    - S8011123: serialVersionUID of
      java.awt.dnd.InvalidDnDOperationException changed in JDK8-b82
  * Backports
    - S6515172, PR3362: Runtime.availableProcessors() ignores Linux
      taskset command
    - S8022284, PR3209: Hide internal data structure in PhaseCFG
    - S8023003, PR3209: Cleanup the public interface to PhaseCFG
    - S8023691, PR3209: Create interface for nodes in class Block
    - S8023988, PR3209: Move local scheduling of nodes to the CFG
      creation and code motion phase (PhaseCFG)
    - S8043780, PR3369: Use open(O_CLOEXEC) instead of
      fcntl(FD_CLOEXEC)
    - S8157306, PR3209: Random infrequent null pointer exceptions
      in javac
    - S8173783, PR3329: IllegalArgumentException:
      jdk.tls.namedGroups
    - S8173941, PR3330: SA does not work if executable is DSO
    - S8174729, PR3361: Race Condition in
      java.lang.reflect.WeakCache
  * Bug fixes
    - PR3349: Architectures unsupported by SystemTap tapsets throw
      a parse error
    - PR3370: Disable ARM32 JIT by default in jdk_generic_profile.sh
    - PR3379: Perl should be mandatory
    - PR3390: javac.in and javah.in should use @PERL@ rather than a
      hardcoded path
  * CACAO
    - PR2732: Raise javadoc memory limits for CACAO again!
  * AArch64 port
    - S8177661, PR3367: Correct ad rule output register types from
      iRegX to iRegXNoSp

- Get ecj.jar path from gcj, use the gcc variant that provides Java
  to build C code to make sure jni.h is available.

    - S8167104, CVE-2017-3289: Additional class construction
    - S6253144: Long narrowing conversion should describe the
    - S6328537: Improve javadocs for Socket class by adding
    - S6978886: javadoc shows stacktrace after print error
    - S6995421: Eliminate the static dependency to
    - S7027045: (doc) java/awt/Window.java has several typos in
    - S7054969: Null-check-in-finally pattern in java/security
    - S7072353: JNDI libraries do not build with javac -Xlint:all
    - S7092447: Clarify the default locale used in each locale
    - S7103570: AtomicIntegerFieldUpdater does not work when
    - S7187144: JavaDoc for ScriptEngineFactory.getProgram()
    - S8000418: javadoc should used a standard 'generated by
    - S8000666: javadoc should write directly to Writer instead of
    - S8000970: break out auxiliary classes that will prevent
    - S8001669: javadoc internal DocletAbortException should set
    - S8011402: Move blacklisting certificate logic from hard code
    - S8011547: Update XML Signature implementation to Apache
    - S8012288: XML DSig API allows wrong tag names and extra
    - S8017325: Cleanup of the javadoc &lt;code&gt; tag in
    - S8017326: Cleanup of the javadoc &lt;code&gt; tag in
    - S8019772: Fix doclint issues in javax.crypto and
    - S8020688: Broken links in documentation at
    - S8021108: Clean up doclint warnings and errors in java.text
    - S8022120: JCK test
      api/javax_xml/crypto/dsig/TransformService/index_ParamMethods
    - S8025409: Fix javadoc comments errors and warning reported by
    - S8026021: more fix of javadoc errors and warnings reported by
    - S8037099: [macosx] Remove all references to GC from native
    - S8038184: XMLSignature throws StringIndexOutOfBoundsException
    - S8038349: Signing XML with DSA throws Exception when key is
    - S8049244: XML Signature performance issue caused by
    - S8050893: (smartcardio) Invert reset argument in tests in
    - S8059212: Modify sun/security/smartcardio manual regression
    - S8068279: (typo in the spec)
    - S8068491: Update the protocol for references of
    - S8069038: javax/net/ssl/TLS/TLSClientPropertyTest.java needs
    - S8076369: Introduce the jdk.tls.client.protocols system
    - S8139565: Restrict certificates with DSA keys less than 1024
    - S8140422: Add mechanism to allow non default root CAs to be
    - S8140587: Atomic*FieldUpdaters should use Class.isInstance
    - S8149029: Secure validation of XML based digital signature
    - S8151893: Add security property to configure XML Signature
    - S8161228: URL objects with custom protocol handlers have port
    - S8163304: jarsigner -verbose -verify should print the
    - S8164908: ReflectionFactory support for IIOP and custom
    - S8165230: RMIConnection addNotificationListeners failing with
    - S8166393: disabledAlgorithms property should not be strictly
    - S8166591: [macos 10.12] Trackpad scrolling of text on OS X
    - S8166739: Improve extensibility of ObjectInputFilter
    - S8167356: Follow up fix for jdk8 backport of 8164143. Changes
    - S8167459: Add debug output for indicating if a chosen
    - S8168861: AnchorCertificates uses hardcoded password for
    - S8169688: Backout (remove) MD5 from
    - S8169911: Enhanced tests for jarsigner -verbose -verify after
    - S8170131: Certificates not being blocked by
    - S8173854: [TEST] Update DHEKeySizing test case following
    - S7102489, PR3316, RH1390708: RFE: cleanup jlong typedef on
    - S8000351, PR3316, RH1390708: Tenuring threshold should be
    - S8153711, PR3315, RH1284948: [REDO] JDWP: Memory Leak:
    - S8170888, PR3316, RH1390708: [linux] Experimental support for
    - PR3318: Replace 'infinality' with 'improved font rendering'
    - PR3324: Fix NSS_LIBDIR substitution in
    - S8165673, PR3320: AArch64: Fix JNI floating point argument
    + S6604109, PR3162:
- Add -fno-delete-null-pointer-checks -fno-lifetime-dse to try to
      directory to be specified
      versions of IcedTea
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-24"/>
	<updated date="2017-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3289/">CVE-2017-3289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3511/">CVE-2017-3511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3512/">CVE-2017-3512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3514/">CVE-2017-3514</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3526/">CVE-2017-3526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517447" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517448" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77807" version="1" class="patch">
	<metadata>
		<title>Security update for pam (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1015565" ref_url="https://bugzilla.suse.com/1015565" source="BUGZILLA"/>
		<reference ref_id="1037824" ref_url="https://bugzilla.suse.com/1037824" source="BUGZILLA"/>
		<reference ref_id="934920" ref_url="https://bugzilla.suse.com/934920" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3238" ref_url="https://www.suse.com/security/cve/CVE-2015-3238/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002919.html" source="SUSE-SU"/>
		<description>

This update for pam fixes the following issues:
 

- CVE-2015-3238: pam_unix in conjunction with SELinux allowed for DoS attacks (bsc#934920).
- log a hint to syslog if /etc/nologin is present, but empty (bsc#1015565).
- If /etc/nologin is present, but empty, log a hint to syslog. (bsc#1015565)
- Added support for libowcrypt.so, if present, to configure support for BLOWFISH (bsc#1037824)

 		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-24"/>
	<updated date="2017-05-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015565">SUSE bug 1015565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037824">SUSE bug 1037824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934920">SUSE bug 934920</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3238/">CVE-2015-3238</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517449" comment="pam-1.1.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517450" comment="pam-32bit-1.1.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517451" comment="pam-doc-1.1.8-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77808" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1018128" ref_url="https://bugzilla.suse.com/1018128" source="BUGZILLA"/>
		<reference ref_id="1030263" ref_url="https://bugzilla.suse.com/1030263" source="BUGZILLA"/>
		<reference ref_id="1032114" ref_url="https://bugzilla.suse.com/1032114" source="BUGZILLA"/>
		<reference ref_id="1032120" ref_url="https://bugzilla.suse.com/1032120" source="BUGZILLA"/>
		<reference ref_id="1036453" ref_url="https://bugzilla.suse.com/1036453" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10220" ref_url="https://www.suse.com/security/cve/CVE-2016-10220/" source="CVE"/>
		<reference ref_id="CVE-2016-9601" ref_url="https://www.suse.com/security/cve/CVE-2016-9601/" source="CVE"/>
		<reference ref_id="CVE-2017-5951" ref_url="https://www.suse.com/security/cve/CVE-2017-5951/" source="CVE"/>
		<reference ref_id="CVE-2017-7207" ref_url="https://www.suse.com/security/cve/CVE-2017-7207/" source="CVE"/>
		<reference ref_id="CVE-2017-8291" ref_url="https://www.suse.com/security/cve/CVE-2017-8291/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00070.html" source="SUSE-SU"/>
		<description>

This update for ghostscript fixes the following security vulnerabilities:

- CVE-2017-8291: A remote command execution and a -dSAFER bypass via a crafted .eps document were
  exploited in the wild. (bsc#1036453)
- CVE-2016-9601: An integer overflow in the bundled jbig2dec library could have been misused to cause
  a Denial-of-Service. (bsc#1018128)
- CVE-2016-10220: A NULL pointer dereference in the PDF Transparency module allowed remote attackers
  to cause a Denial-of-Service. (bsc#1032120)
- CVE-2017-5951: A NULL pointer dereference allowed remote attackers to cause a denial of service
  via a crafted PostScript document. (bsc#1032114)
- CVE-2017-7207: A NULL pointer dereference allowed remote attackers to cause a denial of service
  via a crafted PostScript document. (bsc#1030263)

This is a reissue of the previous update to also include SUSE Linux Enterprise 12 GA LTSS packages.

		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-24"/>
	<updated date="2017-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1018128">SUSE bug 1018128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030263">SUSE bug 1030263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032114">SUSE bug 1032114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032120">SUSE bug 1032120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10220/">CVE-2016-10220</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9601/">CVE-2016-9601</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5951/">CVE-2017-5951</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-7207/">CVE-2017-7207</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-8291/">CVE-2017-8291</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517452" comment="ghostscript-9.15-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517453" comment="ghostscript-x11-9.15-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77809" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1002981" ref_url="https://bugzilla.suse.com/1002981" source="BUGZILLA"/>
		<reference ref_id="1010735" ref_url="https://bugzilla.suse.com/1010735" source="BUGZILLA"/>
		<reference ref_id="1010740" ref_url="https://bugzilla.suse.com/1010740" source="BUGZILLA"/>
		<reference ref_id="1010752" ref_url="https://bugzilla.suse.com/1010752" source="BUGZILLA"/>
		<reference ref_id="1010754" ref_url="https://bugzilla.suse.com/1010754" source="BUGZILLA"/>
		<reference ref_id="1010911" ref_url="https://bugzilla.suse.com/1010911" source="BUGZILLA"/>
		<reference ref_id="1021739" ref_url="https://bugzilla.suse.com/1021739" source="BUGZILLA"/>
		<reference ref_id="1025913" ref_url="https://bugzilla.suse.com/1025913" source="BUGZILLA"/>
		<reference ref_id="1026507" ref_url="https://bugzilla.suse.com/1026507" source="BUGZILLA"/>
		<reference ref_id="1027692" ref_url="https://bugzilla.suse.com/1027692" source="BUGZILLA"/>
		<reference ref_id="1027998" ref_url="https://bugzilla.suse.com/1027998" source="BUGZILLA"/>
		<reference ref_id="1033936" ref_url="https://bugzilla.suse.com/1033936" source="BUGZILLA"/>
		<reference ref_id="1033937" ref_url="https://bugzilla.suse.com/1033937" source="BUGZILLA"/>
		<reference ref_id="1033938" ref_url="https://bugzilla.suse.com/1033938" source="BUGZILLA"/>
		<reference ref_id="1033939" ref_url="https://bugzilla.suse.com/1033939" source="BUGZILLA"/>
		<reference ref_id="1033940" ref_url="https://bugzilla.suse.com/1033940" source="BUGZILLA"/>
		<reference ref_id="1033941" ref_url="https://bugzilla.suse.com/1033941" source="BUGZILLA"/>
		<reference ref_id="1033942" ref_url="https://bugzilla.suse.com/1033942" source="BUGZILLA"/>
		<reference ref_id="1033943" ref_url="https://bugzilla.suse.com/1033943" source="BUGZILLA"/>
		<reference ref_id="1033944" ref_url="https://bugzilla.suse.com/1033944" source="BUGZILLA"/>
		<reference ref_id="1033945" ref_url="https://bugzilla.suse.com/1033945" source="BUGZILLA"/>
		<reference ref_id="990856" ref_url="https://bugzilla.suse.com/990856" source="BUGZILLA"/>
		<reference ref_id="998761" ref_url="https://bugzilla.suse.com/998761" source="BUGZILLA"/>
		<reference ref_id="998762" ref_url="https://bugzilla.suse.com/998762" source="BUGZILLA"/>
		<reference ref_id="998763" ref_url="https://bugzilla.suse.com/998763" source="BUGZILLA"/>
		<reference ref_id="998800" ref_url="https://bugzilla.suse.com/998800" source="BUGZILLA"/>
		<reference ref_id="998963" ref_url="https://bugzilla.suse.com/998963" source="BUGZILLA"/>
		<reference ref_id="998964" ref_url="https://bugzilla.suse.com/998964" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="CVE-2016-7175" ref_url="https://www.suse.com/security/cve/CVE-2016-7175/" source="CVE"/>
		<reference ref_id="CVE-2016-7176" ref_url="https://www.suse.com/security/cve/CVE-2016-7176/" source="CVE"/>
		<reference ref_id="CVE-2016-7177" ref_url="https://www.suse.com/security/cve/CVE-2016-7177/" source="CVE"/>
		<reference ref_id="CVE-2016-7178" ref_url="https://www.suse.com/security/cve/CVE-2016-7178/" source="CVE"/>
		<reference ref_id="CVE-2016-7179" ref_url="https://www.suse.com/security/cve/CVE-2016-7179/" source="CVE"/>
		<reference ref_id="CVE-2016-7180" ref_url="https://www.suse.com/security/cve/CVE-2016-7180/" source="CVE"/>
		<reference ref_id="CVE-2016-9373" ref_url="https://www.suse.com/security/cve/CVE-2016-9373/" source="CVE"/>
		<reference ref_id="CVE-2016-9374" ref_url="https://www.suse.com/security/cve/CVE-2016-9374/" source="CVE"/>
		<reference ref_id="CVE-2016-9375" ref_url="https://www.suse.com/security/cve/CVE-2016-9375/" source="CVE"/>
		<reference ref_id="CVE-2016-9376" ref_url="https://www.suse.com/security/cve/CVE-2016-9376/" source="CVE"/>
		<reference ref_id="CVE-2017-5596" ref_url="https://www.suse.com/security/cve/CVE-2017-5596/" source="CVE"/>
		<reference ref_id="CVE-2017-5597" ref_url="https://www.suse.com/security/cve/CVE-2017-5597/" source="CVE"/>
		<reference ref_id="CVE-2017-6014" ref_url="https://www.suse.com/security/cve/CVE-2017-6014/" source="CVE"/>
		<reference ref_id="CVE-2017-7700" ref_url="https://www.suse.com/security/cve/CVE-2017-7700/" source="CVE"/>
		<reference ref_id="CVE-2017-7701" ref_url="https://www.suse.com/security/cve/CVE-2017-7701/" source="CVE"/>
		<reference ref_id="CVE-2017-7702" ref_url="https://www.suse.com/security/cve/CVE-2017-7702/" source="CVE"/>
		<reference ref_id="CVE-2017-7703" ref_url="https://www.suse.com/security/cve/CVE-2017-7703/" source="CVE"/>
		<reference ref_id="CVE-2017-7704" ref_url="https://www.suse.com/security/cve/CVE-2017-7704/" source="CVE"/>
		<reference ref_id="CVE-2017-7705" ref_url="https://www.suse.com/security/cve/CVE-2017-7705/" source="CVE"/>
		<reference ref_id="CVE-2017-7745" ref_url="https://www.suse.com/security/cve/CVE-2017-7745/" source="CVE"/>
		<reference ref_id="CVE-2017-7746" ref_url="https://www.suse.com/security/cve/CVE-2017-7746/" source="CVE"/>
		<reference ref_id="CVE-2017-7747" ref_url="https://www.suse.com/security/cve/CVE-2017-7747/" source="CVE"/>
		<reference ref_id="CVE-2017-7748" ref_url="https://www.suse.com/security/cve/CVE-2017-7748/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<description>

Wireshark was updated to version 2.2.6, which brings several new features, enhancements
and bug fixes.

Thses security issues were fixed:

- CVE-2017-7700: In Wireshark the NetScaler file parser could go into an infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by ensuring a nonzero record size (bsc#1033936)
- CVE-2017-7701: In Wireshark the BGP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-bgp.c by using a different integer data type (bsc#1033937)
- CVE-2017-7702: In Wireshark the WBXML dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wbxml.c by adding length validation (bsc#1033938)
- CVE-2017-7703: In Wireshark the IMAP dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-imap.c by calculating a line's end correctly (bsc#1033939)
- CVE-2017-7704: In Wireshark the DOF dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dof.c by using a different integer data type and adjusting a return value (bsc#1033940)
- CVE-2017-7705: In Wireshark the RPC over RDMA dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-rpcrdma.c by correctly checking for going beyond the maximum offset (bsc#1033941)
- CVE-2017-7745: In Wireshark the SIGCOMP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-sigcomp.c by correcting a memory-size check (bsc#1033942)
- CVE-2017-7746: In Wireshark the SLSK dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-slsk.c by adding checks for the remaining length (bsc#1033943)
- CVE-2017-7747: In Wireshark the PacketBB dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-packetbb.c by restricting additions to the protocol tree (bsc#1033944)
- CVE-2017-7748: In Wireshark the WSP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wsp.c by adding a length check (bsc#1033945)
- CVE-2017-6014: In Wireshark a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory (bsc#1025913)
- CVE-2017-5596: In Wireshark the ASTERIX dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-asterix.c by changing a data type to avoid an integer overflow (bsc#1021739)
- CVE-2017-5597: In Wireshark the DHCPv6 dissector could go into a large loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dhcpv6.c by changing a data type to avoid an integer overflow (bsc#1021739)
- CVE-2016-9376: In Wireshark the OpenFlow dissector could crash with memory exhaustion, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-openflow_v5.c by ensuring that certain length values were sufficiently large (bsc#1010735)
- CVE-2016-9375: In Wireshark the DTN dissector could go into an infinite loop, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dtn.c by checking whether SDNV evaluation was successful (bsc#1010740)
- CVE-2016-9374: In Wireshark the AllJoyn dissector could crash with a buffer over-read, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-alljoyn.c by ensuring that a length variable properly tracked the state of a signature variable (bsc#1010752)
- CVE-2016-9373: In Wireshark the DCERPC dissector could crash with a use-after-free, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dcerpc-nt.c and epan/dissectors/packet-dcerpc-spoolss.c by using the wmem file scope for private strings (bsc#1010754)
- CVE-2016-7180: epan/dissectors/packet-ipmi-trace.c in the IPMI trace dissector in Wireshark did not properly consider whether a string is constant, which allowed remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet (bsc#998800)
- CVE-2016-7179: Stack-based buffer overflow in epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark allowed remote attackers to cause a denial of service (application crash) via a crafted packet (bsc#998963)
- CVE-2016-7178: epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark did not ensure that memory is allocated for certain data structures, which allowed remote attackers to cause a denial of service (invalid write access and application crash) via a crafted packet (bsc#998964)
- CVE-2016-7177: epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark did not restrict the number of channels, which allowed remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet (bsc#998763)
- CVE-2016-7176: epan/dissectors/packet-h225.c in the H.225 dissector in Wireshark called snprintf with one of its input buffers as the output buffer, which allowed remote attackers to cause a denial of service (copy overlap and application crash) via a crafted packet (bsc#998762)
- CVE-2016-7175: epan/dissectors/packet-qnet6.c in the QNX6 QNET dissector in Wireshark mishandled MAC address data, which allowed remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet (bsc#998761)
- CVE-2016-6354: Heap-based buffer overflow in the yy_get_next_buffer function in Flex might have allowed context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read (bsc#990856).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-30"/>
	<updated date="2017-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002981">SUSE bug 1002981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010735">SUSE bug 1010735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010740">SUSE bug 1010740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010752">SUSE bug 1010752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010754">SUSE bug 1010754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010911">SUSE bug 1010911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021739">SUSE bug 1021739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025913">SUSE bug 1025913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026507">SUSE bug 1026507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027692">SUSE bug 1027692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027998">SUSE bug 1027998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033936">SUSE bug 1033936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033937">SUSE bug 1033937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033938">SUSE bug 1033938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033939">SUSE bug 1033939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033940">SUSE bug 1033940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033941">SUSE bug 1033941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033942">SUSE bug 1033942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033943">SUSE bug 1033943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033944">SUSE bug 1033944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033945">SUSE bug 1033945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990856">SUSE bug 990856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998761">SUSE bug 998761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998762">SUSE bug 998762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998763">SUSE bug 998763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998800">SUSE bug 998800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998963">SUSE bug 998963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998964">SUSE bug 998964</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7175/">CVE-2016-7175</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7176/">CVE-2016-7176</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7177/">CVE-2016-7177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7178/">CVE-2016-7178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7179/">CVE-2016-7179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7180/">CVE-2016-7180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9373/">CVE-2016-9373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9374/">CVE-2016-9374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9375/">CVE-2016-9375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9376/">CVE-2016-9376</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5596/">CVE-2017-5596</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5597/">CVE-2017-5597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6014/">CVE-2017-6014</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7700/">CVE-2017-7700</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7701/">CVE-2017-7701</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7702/">CVE-2017-7702</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7703/">CVE-2017-7703</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7704/">CVE-2017-7704</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7705/">CVE-2017-7705</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7745/">CVE-2017-7745</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7746/">CVE-2017-7746</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7747/">CVE-2017-7747</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7748/">CVE-2017-7748</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517454" comment="libwireshark8-2.2.6-44.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517455" comment="libwiretap6-2.2.6-44.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517456" comment="libwscodecs1-2.2.6-44.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517457" comment="libwsutil7-2.2.6-44.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517458" comment="wireshark-2.2.6-44.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517459" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77810" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1015351" ref_url="https://bugzilla.suse.com/1015351" source="BUGZILLA"/>
		<reference ref_id="1024145" ref_url="https://bugzilla.suse.com/1024145" source="BUGZILLA"/>
		<reference ref_id="1039361" ref_url="https://bugzilla.suse.com/1039361" source="BUGZILLA"/>
		<reference ref_id="981124" ref_url="https://bugzilla.suse.com/981124" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000367" ref_url="https://www.suse.com/security/cve/CVE-2017-1000367/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00077.html" source="SUSE-SU"/>
		<description>

This update for sudo fixes the following issues:

CVE-2017-1000367:
- Due to incorrect assumptions in /proc/[pid]/stat parsing,
  a local attacker can pretend that his tty is any file on the filesystem,
  thus gaining arbitrary file write access on SELinux-enabled systems. [bsc#1039361]
- Fix FQDN for hostname. [bsc#1024145]
- Filter netgroups, they aren't handled by SSSD. [bsc#1015351]
- Fix problems related to 'krb5_ccname' option [bsc#981124]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-30"/>
	<updated date="2017-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1015351">SUSE bug 1015351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024145">SUSE bug 1024145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039361">SUSE bug 1039361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981124">SUSE bug 981124</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000367/">CVE-2017-1000367</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517460" comment="sudo-1.8.10p3-2.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77811" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP1</platform>
		</affected>
		<reference ref_id="1013669" ref_url="https://bugzilla.suse.com/1013669" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9811" ref_url="https://www.suse.com/security/cve/CVE-2016-9811/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002565.html" source="SUSE-SU"/>
		<description>

   * CVE-2016-9811: out of bound memory read could lead to crash [bsc#1013669].
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-17"/>
	<updated date="2017-01-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013669">SUSE bug 1013669</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9811/">CVE-2016-9811</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118774" comment="SUSE Linux Enterprise Desktop 12 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517461" comment="gstreamer-plugins-base-1.2.4-2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517462" comment="gstreamer-plugins-base-lang-1.2.4-2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517463" comment="libgstallocators-1_0-0-1.2.4-2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517464" comment="libgstapp-1_0-0-1.2.4-2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517465" comment="libgstapp-1_0-0-32bit-1.2.4-2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517466" comment="libgstaudio-1_0-0-1.2.4-2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517467" comment="libgstaudio-1_0-0-32bit-1.2.4-2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517468" comment="libgstfft-1_0-0-1.2.4-2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517469" comment="libgstfft-1_0-0-32bit-1.2.4-2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517470" comment="libgstpbutils-1_0-0-1.2.4-2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517471" comment="libgstpbutils-1_0-0-32bit-1.2.4-2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517472" comment="libgstriff-1_0-0-1.2.4-2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517473" comment="libgstrtp-1_0-0-1.2.4-2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517474" comment="libgstrtsp-1_0-0-1.2.4-2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517475" comment="libgstsdp-1_0-0-1.2.4-2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517476" comment="libgsttag-1_0-0-1.2.4-2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517477" comment="libgsttag-1_0-0-32bit-1.2.4-2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517478" comment="libgstvideo-1_0-0-1.2.4-2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517479" comment="libgstvideo-1_0-0-32bit-1.2.4-2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517480" comment="typelib-1_0-GstAudio-1_0-1.2.4-2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517481" comment="typelib-1_0-GstPbutils-1_0-1.2.4-2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517482" comment="typelib-1_0-GstTag-1_0-1.2.4-2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517483" comment="typelib-1_0-GstVideo-1_0-1.2.4-2.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77812" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1007829" ref_url="https://bugzilla.suse.com/1007829" source="BUGZILLA"/>
		<reference ref_id="965748" ref_url="https://bugzilla.suse.com/965748" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8864" ref_url="https://www.suse.com/security/cve/CVE-2016-8864/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00005.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- A defect in BIND's handling of responses containing a DNAME answer had
the potential to trigger assertion errors in the server remotely,
thereby facilitating a denial-of-service attack. (CVE-2016-8864, bsc#1007829).

- Fix BIND to return a valid hostname in response to ldapdump queries.
(bsc#965748)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-02"/>
	<updated date="2016-11-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1007829">SUSE bug 1007829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965748">SUSE bug 965748</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8864/">CVE-2016-8864</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516613" comment="bind-libs-9.9.9P1-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516614" comment="bind-libs-32bit-9.9.9P1-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516615" comment="bind-utils-9.9.9P1-49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77813" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1005084" ref_url="https://bugzilla.suse.com/1005084" source="BUGZILLA"/>
		<reference ref_id="1005090" ref_url="https://bugzilla.suse.com/1005090" source="BUGZILLA"/>
		<reference ref_id="1005242" ref_url="https://bugzilla.suse.com/1005242" source="BUGZILLA"/>
		<reference ref_id="1006591" ref_url="https://bugzilla.suse.com/1006591" source="BUGZILLA"/>
		<reference ref_id="1006593" ref_url="https://bugzilla.suse.com/1006593" source="BUGZILLA"/>
		<reference ref_id="1006597" ref_url="https://bugzilla.suse.com/1006597" source="BUGZILLA"/>
		<reference ref_id="1006598" ref_url="https://bugzilla.suse.com/1006598" source="BUGZILLA"/>
		<reference ref_id="1006599" ref_url="https://bugzilla.suse.com/1006599" source="BUGZILLA"/>
		<reference ref_id="1006836" ref_url="https://bugzilla.suse.com/1006836" source="BUGZILLA"/>
		<reference ref_id="1006839" ref_url="https://bugzilla.suse.com/1006839" source="BUGZILLA"/>
		<reference ref_id="1007009" ref_url="https://bugzilla.suse.com/1007009" source="BUGZILLA"/>
		<reference ref_id="392410" ref_url="https://bugzilla.suse.com/392410" source="BUGZILLA"/>
		<reference ref_id="941919" ref_url="https://bugzilla.suse.com/941919" source="BUGZILLA"/>
		<reference ref_id="942553" ref_url="https://bugzilla.suse.com/942553" source="BUGZILLA"/>
		<reference ref_id="961886" ref_url="https://bugzilla.suse.com/961886" source="BUGZILLA"/>
		<reference ref_id="963983" ref_url="https://bugzilla.suse.com/963983" source="BUGZILLA"/>
		<reference ref_id="968373" ref_url="https://bugzilla.suse.com/968373" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-3522" ref_url="https://www.suse.com/security/cve/CVE-2008-3522/" source="CVE"/>
		<reference ref_id="CVE-2014-8158" ref_url="https://www.suse.com/security/cve/CVE-2014-8158/" source="CVE"/>
		<reference ref_id="CVE-2015-5203" ref_url="https://www.suse.com/security/cve/CVE-2015-5203/" source="CVE"/>
		<reference ref_id="CVE-2015-5221" ref_url="https://www.suse.com/security/cve/CVE-2015-5221/" source="CVE"/>
		<reference ref_id="CVE-2016-1577" ref_url="https://www.suse.com/security/cve/CVE-2016-1577/" source="CVE"/>
		<reference ref_id="CVE-2016-1867" ref_url="https://www.suse.com/security/cve/CVE-2016-1867/" source="CVE"/>
		<reference ref_id="CVE-2016-2089" ref_url="https://www.suse.com/security/cve/CVE-2016-2089/" source="CVE"/>
		<reference ref_id="CVE-2016-2116" ref_url="https://www.suse.com/security/cve/CVE-2016-2116/" source="CVE"/>
		<reference ref_id="CVE-2016-8690" ref_url="https://www.suse.com/security/cve/CVE-2016-8690/" source="CVE"/>
		<reference ref_id="CVE-2016-8691" ref_url="https://www.suse.com/security/cve/CVE-2016-8691/" source="CVE"/>
		<reference ref_id="CVE-2016-8692" ref_url="https://www.suse.com/security/cve/CVE-2016-8692/" source="CVE"/>
		<reference ref_id="CVE-2016-8693" ref_url="https://www.suse.com/security/cve/CVE-2016-8693/" source="CVE"/>
		<reference ref_id="CVE-2016-8880" ref_url="https://www.suse.com/security/cve/CVE-2016-8880/" source="CVE"/>
		<reference ref_id="CVE-2016-8881" ref_url="https://www.suse.com/security/cve/CVE-2016-8881/" source="CVE"/>
		<reference ref_id="CVE-2016-8882" ref_url="https://www.suse.com/security/cve/CVE-2016-8882/" source="CVE"/>
		<reference ref_id="CVE-2016-8883" ref_url="https://www.suse.com/security/cve/CVE-2016-8883/" source="CVE"/>
		<reference ref_id="CVE-2016-8884" ref_url="https://www.suse.com/security/cve/CVE-2016-8884/" source="CVE"/>
		<reference ref_id="CVE-2016-8885" ref_url="https://www.suse.com/security/cve/CVE-2016-8885/" source="CVE"/>
		<reference ref_id="CVE-2016-8886" ref_url="https://www.suse.com/security/cve/CVE-2016-8886/" source="CVE"/>
		<reference ref_id="CVE-2016-8887" ref_url="https://www.suse.com/security/cve/CVE-2016-8887/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<description>

This update for jasper to version 1.900.14 fixes several issues.

These security issues were fixed:
- CVE-2016-8887: NULL pointer dereference in jp2_colr_destroy (jp2_cod.c) (bsc#1006836)
- CVE-2016-8886: memory allocation failure in jas_malloc (jas_malloc.c) (bsc#1006599)
- CVE-2016-8884,CVE-2016-8885: two null pointer dereferences in bmp_getdata (incomplete fix for CVE-2016-8690) (bsc#1007009)
- CVE-2016-8883: assert in jpc_dec_tiledecode() (bsc#1006598)
- CVE-2016-8882: segfault / null pointer access in jpc_pi_destroy (bsc#1006597)
- CVE-2016-8881: Heap overflow in jpc_getuint16() (bsc#1006593)
- CVE-2016-8880: Heap overflow in jpc_dec_cp_setfromcox() (bsc#1006591)
- CVE-2016-8693 Double free vulnerability in mem_close (bsc#1005242)
- CVE-2016-8691, CVE-2016-8692: Divide by zero in jpc_dec_process_siz (bsc#1005090)
- CVE-2016-8690: Null pointer dereference in bmp_getdata triggered by crafted BMP image (bsc#1005084)
- CVE-2016-2116: Memory leak in the jas_iccprof_createfrombuf function in JasPer allowed remote attackers to cause a denial of service (memory consumption) via a crafted ICC color profile in a JPEG 2000 image file (bsc#968373) 
- CVE-2016-2089: invalid read in the JasPer's jas_matrix_clip() function (bsc#963983)
- CVE-2016-1867: Out-of-bounds Read in the JasPer's jpc_pi_nextcprl() function (bsc#961886)
- CVE-2015-5221: Use-after-free (and double-free) in Jasper JPEG-200 (bsc#942553).
- CVE-2015-5203: Double free corruption in JasPer JPEG-2000 implementation (bsc#941919)
- CVE-2008-3522: Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer might have allowed context-dependent attackers to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf (bsc#392410)
- jasper: NULL pointer dereference in jp2_colr_destroy (jp2_cod.c) (incomplete fix for CVE-2016-8887) (bsc#1006839)

For additional change description please have a look at the changelog.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-10"/>
	<updated date="2016-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005084">SUSE bug 1005084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005090">SUSE bug 1005090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005242">SUSE bug 1005242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006591">SUSE bug 1006591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006593">SUSE bug 1006593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006597">SUSE bug 1006597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006598">SUSE bug 1006598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006599">SUSE bug 1006599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006836">SUSE bug 1006836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006839">SUSE bug 1006839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007009">SUSE bug 1007009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/392410">SUSE bug 392410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941919">SUSE bug 941919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942553">SUSE bug 942553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961886">SUSE bug 961886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963983">SUSE bug 963983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968373">SUSE bug 968373</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3522/">CVE-2008-3522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8158/">CVE-2014-8158</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5203/">CVE-2015-5203</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5221/">CVE-2015-5221</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1577/">CVE-2016-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1867/">CVE-2016-1867</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2089/">CVE-2016-2089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2116/">CVE-2016-2116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8690/">CVE-2016-8690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8691/">CVE-2016-8691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8692/">CVE-2016-8692</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-8693/">CVE-2016-8693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8880/">CVE-2016-8880</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8881/">CVE-2016-8881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8882/">CVE-2016-8882</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8883/">CVE-2016-8883</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8884/">CVE-2016-8884</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8885/">CVE-2016-8885</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8886/">CVE-2016-8886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8887/">CVE-2016-8887</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516634" comment="libjasper1-1.900.14-181.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516635" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77814" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1006592" ref_url="https://bugzilla.suse.com/1006592" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5653" ref_url="https://www.suse.com/security/cve/CVE-2013-5653/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002404.html" source="SUSE-SU"/>
		<description>

This update for ghostscript fixes the following issues:

- bsc#1006592: Fix a regression introduced in CVE-2013-5653 by which ps files couldn't be
  opened in okular/evince (kde#371887).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-16"/>
	<updated date="2016-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1006592">SUSE bug 1006592</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5653/">CVE-2013-5653</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516638" comment="ghostscript-9.15-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516639" comment="ghostscript-x11-9.15-17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77815" version="1" class="patch">
	<metadata>
		<title>Security update for X Window System client libraries (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1002991" ref_url="https://bugzilla.suse.com/1002991" source="BUGZILLA"/>
		<reference ref_id="1002995" ref_url="https://bugzilla.suse.com/1002995" source="BUGZILLA"/>
		<reference ref_id="1002998" ref_url="https://bugzilla.suse.com/1002998" source="BUGZILLA"/>
		<reference ref_id="1003000" ref_url="https://bugzilla.suse.com/1003000" source="BUGZILLA"/>
		<reference ref_id="1003002" ref_url="https://bugzilla.suse.com/1003002" source="BUGZILLA"/>
		<reference ref_id="1003012" ref_url="https://bugzilla.suse.com/1003012" source="BUGZILLA"/>
		<reference ref_id="1003017" ref_url="https://bugzilla.suse.com/1003017" source="BUGZILLA"/>
		<reference ref_id="1003023" ref_url="https://bugzilla.suse.com/1003023" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5407" ref_url="https://www.suse.com/security/cve/CVE-2016-5407/" source="CVE"/>
		<reference ref_id="CVE-2016-7942" ref_url="https://www.suse.com/security/cve/CVE-2016-7942/" source="CVE"/>
		<reference ref_id="CVE-2016-7944" ref_url="https://www.suse.com/security/cve/CVE-2016-7944/" source="CVE"/>
		<reference ref_id="CVE-2016-7945" ref_url="https://www.suse.com/security/cve/CVE-2016-7945/" source="CVE"/>
		<reference ref_id="CVE-2016-7946" ref_url="https://www.suse.com/security/cve/CVE-2016-7946/" source="CVE"/>
		<reference ref_id="CVE-2016-7947" ref_url="https://www.suse.com/security/cve/CVE-2016-7947/" source="CVE"/>
		<reference ref_id="CVE-2016-7948" ref_url="https://www.suse.com/security/cve/CVE-2016-7948/" source="CVE"/>
		<reference ref_id="CVE-2016-7949" ref_url="https://www.suse.com/security/cve/CVE-2016-7949/" source="CVE"/>
		<reference ref_id="CVE-2016-7950" ref_url="https://www.suse.com/security/cve/CVE-2016-7950/" source="CVE"/>
		<reference ref_id="CVE-2016-7951" ref_url="https://www.suse.com/security/cve/CVE-2016-7951/" source="CVE"/>
		<reference ref_id="CVE-2016-7952" ref_url="https://www.suse.com/security/cve/CVE-2016-7952/" source="CVE"/>
		<reference ref_id="CVE-2016-7953" ref_url="https://www.suse.com/security/cve/CVE-2016-7953/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002406.html" source="SUSE-SU"/>
		<description>

This update for the X Window System client libraries fixes a class of privilege escalation issues.

A malicious X Server could send specially crafted data to X clients, which allowed for triggering
crashes, or privilege escalation if this relationship was untrusted or crossed user or permission
level boundaries.

libX11, libXfixes, libXi, libXrandr, libXrender, libXtst, libXv, libXvMC were fixed, specifically:

libX11:
- CVE-2016-7942: insufficient validation of data from the X server allowed out of boundary memory
  read (bsc#1002991)

libXfixes:
- CVE-2016-7944: insufficient validation of data from the X server can cause an integer overflow
  on 32 bit architectures (bsc#1002995)

libXi:
- CVE-2016-7945, CVE-2016-7946: insufficient validation of data from the X server can cause out of
  boundary memory access or endless loops (Denial of Service) (bsc#1002998)

libXtst:
- CVE-2016-7951, CVE-2016-7952: insufficient validation of data from the X server can cause out of
  boundary memory access or endless loops (Denial of Service) (bsc#1003012)

libXv:
- CVE-2016-5407: insufficient validation of data from the X server can cause out of boundary memory
  and memory corruption (bsc#1003017)

libXvMC:
- CVE-2016-7953: insufficient validation of data from the X server can cause a one byte buffer read
  underrun (bsc#1003023)

libXrender:
- CVE-2016-7949, CVE-2016-7950: insufficient validation of data from the X server can cause out of
  boundary memory writes (bsc#1003002)

libXrandr:
- CVE-2016-7947, CVE-2016-7948: insufficient validation of data from the X server can cause out of
  boundary memory writes (bsc#1003000)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-17"/>
	<updated date="2016-11-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002991">SUSE bug 1002991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002995">SUSE bug 1002995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002998">SUSE bug 1002998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003000">SUSE bug 1003000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003002">SUSE bug 1003002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003012">SUSE bug 1003012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003017">SUSE bug 1003017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003023">SUSE bug 1003023</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5407/">CVE-2016-5407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7942/">CVE-2016-7942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7944/">CVE-2016-7944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7945/">CVE-2016-7945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7946/">CVE-2016-7946</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7947/">CVE-2016-7947</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7948/">CVE-2016-7948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7949/">CVE-2016-7949</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7950/">CVE-2016-7950</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7951/">CVE-2016-7951</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7952/">CVE-2016-7952</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7953/">CVE-2016-7953</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517484" comment="libX11-6-1.6.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517485" comment="libX11-6-32bit-1.6.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517486" comment="libX11-data-1.6.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517487" comment="libX11-xcb1-1.6.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517488" comment="libX11-xcb1-32bit-1.6.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517489" comment="libXfixes3-5.0.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517490" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517491" comment="libXi6-1.7.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517492" comment="libXi6-32bit-1.7.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517493" comment="libXrender1-0.9.8-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517494" comment="libXrender1-32bit-0.9.8-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517495" comment="libXtst6-1.2.2-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517496" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517497" comment="libXv1-1.0.10-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517498" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517499" comment="libXvMC1-1.0.8-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77816" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="951166" ref_url="https://bugzilla.suse.com/951166" source="BUGZILLA"/>
		<reference ref_id="983582" ref_url="https://bugzilla.suse.com/983582" source="BUGZILLA"/>
		<reference ref_id="984751" ref_url="https://bugzilla.suse.com/984751" source="BUGZILLA"/>
		<reference ref_id="985177" ref_url="https://bugzilla.suse.com/985177" source="BUGZILLA"/>
		<reference ref_id="985348" ref_url="https://bugzilla.suse.com/985348" source="BUGZILLA"/>
		<reference ref_id="989523" ref_url="https://bugzilla.suse.com/989523" source="BUGZILLA"/>
		<reference ref_id="991069" ref_url="https://bugzilla.suse.com/991069" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002407.html" source="SUSE-SU"/>
		<description>

This update provides Python 3.4.5, which brings many fixes and enhancements.

The following security issues have been fixed:

- CVE-2016-1000110: CGIHandler could have allowed setting of HTTP_PROXY environment
  variable based on user supplied Proxy request header. (bsc#989523)
- CVE-2016-0772: A vulnerability in smtplib could have allowed a MITM attacker to
  perform a startTLS stripping attack. (bsc#984751)
- CVE-2016-5636: A heap overflow in Python's zipimport module. (bsc#985177)
- CVE-2016-5699: A header injection flaw in urrlib2/urllib/httplib/http.client.
  (bsc#985348)

The update also includes the following non-security fixes:

- Don't force 3rd party C extensions to be built with -Werror=declaration-after-statement.
  (bsc#951166)
- Make urllib proxy var handling behave as usual on POSIX. (bsc#983582)

For a comprehensive list of changes please refer to the upstream change log:
https://docs.python.org/3.4/whatsnew/changelog.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-18"/>
	<updated date="2016-11-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/951166">SUSE bug 951166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983582">SUSE bug 983582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984751">SUSE bug 984751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985177">SUSE bug 985177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985348">SUSE bug 985348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989523">SUSE bug 989523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991069">SUSE bug 991069</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517500" comment="libpython3_4m1_0-3.4.5-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517501" comment="python3-3.4.5-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517502" comment="python3-base-3.4.5-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517503" comment="python3-curses-3.4.5-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77817" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1000345" ref_url="https://bugzilla.suse.com/1000345" source="BUGZILLA"/>
		<reference ref_id="1000346" ref_url="https://bugzilla.suse.com/1000346" source="BUGZILLA"/>
		<reference ref_id="1001151" ref_url="https://bugzilla.suse.com/1001151" source="BUGZILLA"/>
		<reference ref_id="1002116" ref_url="https://bugzilla.suse.com/1002116" source="BUGZILLA"/>
		<reference ref_id="1002549" ref_url="https://bugzilla.suse.com/1002549" source="BUGZILLA"/>
		<reference ref_id="1002550" ref_url="https://bugzilla.suse.com/1002550" source="BUGZILLA"/>
		<reference ref_id="1002557" ref_url="https://bugzilla.suse.com/1002557" source="BUGZILLA"/>
		<reference ref_id="1003612" ref_url="https://bugzilla.suse.com/1003612" source="BUGZILLA"/>
		<reference ref_id="1003613" ref_url="https://bugzilla.suse.com/1003613" source="BUGZILLA"/>
		<reference ref_id="1003878" ref_url="https://bugzilla.suse.com/1003878" source="BUGZILLA"/>
		<reference ref_id="1003893" ref_url="https://bugzilla.suse.com/1003893" source="BUGZILLA"/>
		<reference ref_id="1003894" ref_url="https://bugzilla.suse.com/1003894" source="BUGZILLA"/>
		<reference ref_id="1004702" ref_url="https://bugzilla.suse.com/1004702" source="BUGZILLA"/>
		<reference ref_id="1004706" ref_url="https://bugzilla.suse.com/1004706" source="BUGZILLA"/>
		<reference ref_id="1004707" ref_url="https://bugzilla.suse.com/1004707" source="BUGZILLA"/>
		<reference ref_id="1005353" ref_url="https://bugzilla.suse.com/1005353" source="BUGZILLA"/>
		<reference ref_id="1005374" ref_url="https://bugzilla.suse.com/1005374" source="BUGZILLA"/>
		<reference ref_id="1006536" ref_url="https://bugzilla.suse.com/1006536" source="BUGZILLA"/>
		<reference ref_id="1006538" ref_url="https://bugzilla.suse.com/1006538" source="BUGZILLA"/>
		<reference ref_id="1007263" ref_url="https://bugzilla.suse.com/1007263" source="BUGZILLA"/>
		<reference ref_id="1007391" ref_url="https://bugzilla.suse.com/1007391" source="BUGZILLA"/>
		<reference ref_id="1007493" ref_url="https://bugzilla.suse.com/1007493" source="BUGZILLA"/>
		<reference ref_id="1007494" ref_url="https://bugzilla.suse.com/1007494" source="BUGZILLA"/>
		<reference ref_id="1007495" ref_url="https://bugzilla.suse.com/1007495" source="BUGZILLA"/>
		<reference ref_id="1007769" ref_url="https://bugzilla.suse.com/1007769" source="BUGZILLA"/>
		<reference ref_id="1008148" ref_url="https://bugzilla.suse.com/1008148" source="BUGZILLA"/>
		<reference ref_id="998516" ref_url="https://bugzilla.suse.com/998516" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7161" ref_url="https://www.suse.com/security/cve/CVE-2016-7161/" source="CVE"/>
		<reference ref_id="CVE-2016-7170" ref_url="https://www.suse.com/security/cve/CVE-2016-7170/" source="CVE"/>
		<reference ref_id="CVE-2016-7422" ref_url="https://www.suse.com/security/cve/CVE-2016-7422/" source="CVE"/>
		<reference ref_id="CVE-2016-7466" ref_url="https://www.suse.com/security/cve/CVE-2016-7466/" source="CVE"/>
		<reference ref_id="CVE-2016-7907" ref_url="https://www.suse.com/security/cve/CVE-2016-7907/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-7994" ref_url="https://www.suse.com/security/cve/CVE-2016-7994/" source="CVE"/>
		<reference ref_id="CVE-2016-7995" ref_url="https://www.suse.com/security/cve/CVE-2016-7995/" source="CVE"/>
		<reference ref_id="CVE-2016-8576" ref_url="https://www.suse.com/security/cve/CVE-2016-8576/" source="CVE"/>
		<reference ref_id="CVE-2016-8577" ref_url="https://www.suse.com/security/cve/CVE-2016-8577/" source="CVE"/>
		<reference ref_id="CVE-2016-8578" ref_url="https://www.suse.com/security/cve/CVE-2016-8578/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8668" ref_url="https://www.suse.com/security/cve/CVE-2016-8668/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8909" ref_url="https://www.suse.com/security/cve/CVE-2016-8909/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9101" ref_url="https://www.suse.com/security/cve/CVE-2016-9101/" source="CVE"/>
		<reference ref_id="CVE-2016-9104" ref_url="https://www.suse.com/security/cve/CVE-2016-9104/" source="CVE"/>
		<reference ref_id="CVE-2016-9105" ref_url="https://www.suse.com/security/cve/CVE-2016-9105/" source="CVE"/>
		<reference ref_id="CVE-2016-9106" ref_url="https://www.suse.com/security/cve/CVE-2016-9106/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<description>
This update for qemu to version 2.6.2 fixes the several issues.

These security issues were fixed:
- CVE-2016-7161: Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allowed attackers to execute arbitrary code on the QEMU host via a large ethlite packet (bsc#1001151).
- CVE-2016-7170: OOB stack memory access when processing svga command (bsc#998516).
- CVE-2016-7466: xhci memory leakage during device unplug (bsc#1000345).
- CVE-2016-7422: NULL pointer dereference in virtqueu_map_desc (bsc#1000346).
- CVE-2016-7908: The mcf_fec_do_tx function in hw/net/mcf_fec.c did not properly limit the buffer descriptor count when transmitting packets, which allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags (bsc#1002550).
- CVE-2016-7995: Memory leak in ehci_process_itd (bsc#1003612).
- CVE-2016-8576: The xhci_ring_fetch function in hw/usb/hcd-xhci.c allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit the number of link Transfer Request Blocks (TRB) to process (bsc#1003878).
- CVE-2016-8578: The v9fs_iov_vunmarshal function in fsdev/9p-iov-marshal.c allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) by sending an empty string parameter to a 9P operation (bsc#1003894).
- CVE-2016-9105: Memory leakage in v9fs_link (bsc#1007494).
- CVE-2016-8577: Memory leak in the v9fs_read function in hw/9pfs/9p.c allowed local guest OS administrators to cause a denial of service (memory consumption) via vectors related to an I/O read operation (bsc#1003893).
- CVE-2016-9106: Memory leakage in v9fs_write (bsc#1007495).
- CVE-2016-8669: The serial_update_parameters function in hw/char/serial.c allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base (bsc#1004707).
- CVE-2016-7909: The pcnet_rdra_addr function in hw/net/pcnet.c allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0 (bsc#1002557).
- CVE-2016-9101: eepro100 memory leakage whern unplugging a device (bsc#1007391).
- CVE-2016-8668: The rocker_io_writel function in hw/net/rocker/rocker.c allowed local guest OS administrators to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging failure to limit DMA buffer size (bsc#1004706).
- CVE-2016-8910: The rtl8139_cplus_transmit function in hw/net/rtl8139.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count (bsc#1006538).
- CVE-2016-8909: The intel_hda_xfer function in hw/audio/intel-hda.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position (bsc#1006536).
- CVE-2016-7994: Memory leak in virtio_gpu_resource_create_2d (bsc#1003613).
- CVE-2016-9104: Integer overflow leading to OOB access in 9pfs (bsc#1007493).
- CVE-2016-8667: The rc4030_write function in hw/dma/rc4030.c allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value (bsc#1004702).
- CVE-2016-7907: The pcnet_rdra_addr function in hw/net/pcnet.c allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0 (bsc#1002549).

These non-security issues were fixed:
- Change kvm-supported.txt to be per-architecture documentation, stored in the
  package documentation directory of each per-arch package (bsc#1005353).
- Update support doc to include current ARM64 (AArch64) support stance (bsc#1005374).
- Fix migration failure when snapshot also has been done (bsc#1008148).
- Change package post script udevadm trigger calls to be device specific (bsc#1002116).
- Add qmp-commands.txt documentation file back in. It was inadvertently dropped.
- Add an x86 cpu option (l3-cache) to specify that an L3 cache is present and
  another option (cpuid-0xb) to enable the cpuid 0xb leaf (bsc#1007769).

For Leap 42.2 this update also enabled the smartcard support (bsc#1007263).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-22"/>
	<updated date="2016-11-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000345">SUSE bug 1000345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000346">SUSE bug 1000346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001151">SUSE bug 1001151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002116">SUSE bug 1002116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002549">SUSE bug 1002549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002550">SUSE bug 1002550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002557">SUSE bug 1002557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003612">SUSE bug 1003612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003613">SUSE bug 1003613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003878">SUSE bug 1003878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003893">SUSE bug 1003893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003894">SUSE bug 1003894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004702">SUSE bug 1004702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004706">SUSE bug 1004706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004707">SUSE bug 1004707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005353">SUSE bug 1005353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005374">SUSE bug 1005374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006536">SUSE bug 1006536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006538">SUSE bug 1006538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007263">SUSE bug 1007263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007391">SUSE bug 1007391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007493">SUSE bug 1007493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007494">SUSE bug 1007494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007495">SUSE bug 1007495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007769">SUSE bug 1007769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008148">SUSE bug 1008148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998516">SUSE bug 998516</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7161/">CVE-2016-7161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7170/">CVE-2016-7170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7422/">CVE-2016-7422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7466/">CVE-2016-7466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7907/">CVE-2016-7907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7994/">CVE-2016-7994</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7995/">CVE-2016-7995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8576/">CVE-2016-8576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8577/">CVE-2016-8577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8578/">CVE-2016-8578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8668/">CVE-2016-8668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8909/">CVE-2016-8909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9101/">CVE-2016-9101</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9104/">CVE-2016-9104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9105/">CVE-2016-9105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9106/">CVE-2016-9106</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517504" comment="qemu-2.6.2-31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517505" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517507" comment="qemu-kvm-2.6.2-31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517510" comment="qemu-tools-2.6.2-31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77818" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1005522" ref_url="https://bugzilla.suse.com/1005522" source="BUGZILLA"/>
		<reference ref_id="1005523" ref_url="https://bugzilla.suse.com/1005523" source="BUGZILLA"/>
		<reference ref_id="1005524" ref_url="https://bugzilla.suse.com/1005524" source="BUGZILLA"/>
		<reference ref_id="1005525" ref_url="https://bugzilla.suse.com/1005525" source="BUGZILLA"/>
		<reference ref_id="1005526" ref_url="https://bugzilla.suse.com/1005526" source="BUGZILLA"/>
		<reference ref_id="1005527" ref_url="https://bugzilla.suse.com/1005527" source="BUGZILLA"/>
		<reference ref_id="1005528" ref_url="https://bugzilla.suse.com/1005528" source="BUGZILLA"/>
		<reference ref_id="988651" ref_url="https://bugzilla.suse.com/988651" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5582" ref_url="https://www.suse.com/security/cve/CVE-2016-5582/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2887-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00039.html" source="SUSE-SU"/>
		<description>

OpenJDK Java was updated to jdk8u111 (icedtea 3.2.0) to fix the following issues:

* Security fixes
    + S8146490: Direct indirect CRL checks
    + S8151921: Improved page resolution
    + S8155968: Update command line options
    + S8155973, CVE-2016-5542: Tighten jar checks (bsc#1005522)
    + S8156794: Extend data sharing
    + S8157176: Improved classfile parsing
    + S8157739, CVE-2016-5554: Classloader Consistency Checking
      (bsc#1005523)
    + S8157749: Improve handling of DNS error replies
    + S8157753: Audio replay enhancement
    + S8157759: LCMS Transform Sampling Enhancement
    + S8157764: Better handling of interpolation plugins
    + S8158302: Handle contextual glyph substitutions
    + S8158993, CVE-2016-5568: Service Menu services (bsc#1005525)
    + S8159495: Fix index offsets
    + S8159503: Amend Annotation Actions
    + S8159511: Stack map validation
    + S8159515: Improve indy validation
    + S8159519, CVE-2016-5573: Reformat JDWP messages (bsc#1005526)
    + S8160090: Better signature handling in pack200
    + S8160094: Improve pack200 layout
    + S8160098: Clean up color profiles
    + S8160591, CVE-2016-5582: Improve internal array handling
      (bsc#1005527)
    + S8160838, CVE-2016-5597: Better HTTP service (bsc#1005528)
    + PR3206, RH1367357: lcms2: Out-of-bounds read in
      Type_MLU_Read()
    + CVE-2016-5556 (bsc#1005524)
* New features
    + PR1370: Provide option to build without debugging
    + PR1375: Provide option to strip and link debugging info after
      build
    + PR1537: Handle alternative Kerberos credential cache
      locations
    + PR1978: Allow use of system PCSC
    + PR2445: Support system libsctp
    + PR3182: Support building without pre-compiled headers
    + PR3183: Support Fedora/RHEL system crypto policy
    + PR3221: Use pkgconfig to detect Kerberos CFLAGS and libraries
* Import of OpenJDK 8 u102 build 14
    + S4515292: ReferenceType.isStatic() returns true for arrays
    + S4858370: JDWP: Memory Leak: GlobalRefs never deleted when
      processing invokeMethod command
    + S6976636: JVM/TI test ex03t001 fails assertion
    + S7185591: jcmd-big-script.sh ERROR: could not find app's Java
      pid.
    + S8017462: G1: guarantee fails with
      UseDynamicNumberOfGCThreads
    + S8034168: ThreadMXBean/Locks.java failed, blocked on wrong
      object
    + S8036006: [TESTBUG] sun/tools/native2ascii/NativeErrors.java
      fails: Process exit code was 0, but error was expected.
    + S8041781: Need new regression tests for PBE keys
    + S8041787: Need new regressions tests for buffer handling for
      PBE algorithms
    + S8043836: Need new tests for AES cipher
    + S8044199: Tests for RSA keys and key specifications
    + S8044772: TempDirTest.java still times out with -Xcomp
    + S8046339: sun.rmi.transport.DGCAckHandler leaks memory
    + S8047031: Add SocketPermission tests for legacy socket types
    + S8048052: Permission tests for setFactory
    + S8048138: Tests for JAAS callbacks
    + S8048147: Privilege tests with JAAS Subject.doAs
    + S8048356: SecureRandom default provider tests
    + S8048357: PKCS basic tests
    + S8048360: Test signed jar files
    + S8048362: Tests for doPrivileged with accomplice
    + S8048596: Tests for AEAD ciphers
    + S8048599: Tests for key wrap and unwrap operations
    + S8048603: Additional tests for MAC algorithms
    + S8048604: Tests for strong crypto ciphers
    + S8048607: Test key generation of DES and DESEDE
    + S8048610: Implement regression test for bug fix of 4686632
      in JCE
    + S8048617: Tests for PKCS12 read operations
    + S8048618: Tests for PKCS12 write operations.
    + S8048619: Implement tests for converting PKCS12 keystores
    + S8048624: Tests for SealedObject
    + S8048819: Implement reliability test for DH algorithm
    + S8048820: Implement tests for SecretKeyFactory
    + S8048830: Implement tests for new functionality provided in
      JEP 166
    + S8049237: Need new tests for X509V3 certificates
    + S8049321: Support SHA256WithDSA in JSSE
    + S8049429: Tests for java client server communications with
      various TLS/SSL combinations.
    + S8049432: New tests for TLS property jdk.tls.client.protocols
    + S8049814: Additional SASL client-server tests
    + S8050281: New permission tests for JEP 140
    + S8050370: Need new regressions tests for messageDigest with
      DigestIOStream
    + S8050371: More MessageDigest tests
    + S8050374: More Signature tests
    + S8050427: LoginContext tests to cover JDK-4703361
    + S8050460: JAAS login/logout tests with LoginContext
    + S8050461: Tests for syntax checking of JAAS configuration
      file
    + S8054278: Refactor jps utility tests
    + S8055530: assert(_exits.control()-&gt;is_top() ||
      !_gvn.type(ret_phi)-&gt;empty()) failed: return value must be
      well defined
    + S8055844: [TESTBUG]
      test/runtime/NMT/VirtualAllocCommitUncommitRecommit.java
      fails on Solaris Sparc due to incorrect page size being used
    + S8059677: Thread.getName() instantiates Strings
    + S8061464: A typo in CipherTestUtils test
    + S8062536: [TESTBUG] Conflicting GC combinations in jdk tests
    + S8065076: java/net/SocketPermission/SocketPermissionTest.java
      fails intermittently
    + S8065078: NetworkInterface.getNetworkInterfaces() triggers
      intermittent test failures
    + S8066871: java.lang.VerifyError: Bad local variable type -
      local final String
    + S8068427: Hashtable deserialization reconstitutes table with
      wrong capacity
    + S8069038: javax/net/ssl/TLS/TLSClientPropertyTest.java needs
      to be updated for JDK-8061210
    + S8069253: javax/net/ssl/TLS/TestJSSE.java failed on Mac
    + S8071125: Improve exception messages in URLPermission
    + S8072081: Supplementary characters are rejected in comments
    + S8072463: Remove requirement that AKID and SKID have to match
      when building certificate chain
    + S8072725: Provide more granular levels for GC verification
    + S8073400: Some Monospaced logical fonts have a different
      width
    + S8073872: Schemagen fails with StackOverflowError if element
      references containing class
    + S8074931: Additional tests for CertPath API
    + S8075286: Additional tests for signature algorithm OIDs and
      transformation string
    + S8076486: [TESTBUG]
      javax/security/auth/Subject/doAs/NestedActions.java fails if
      extra VM options are given
    + S8076545: Text size is twice bigger under Windows L&amp;F on Win
      8.1 with HiDPI display
    + S8076995: gc/ergonomics/TestDynamicNumberOfGCThreads.java
      failed with java.lang.RuntimeException: 'new_active_workers'
      missing from stdout/stderr
    + S8079138: Additional negative tests for XML signature
      processing
    + S8081512: Remove sun.invoke.anon classes, or move / co-locate
      them with tests
    + S8081771: ProcessTool.createJavaProcessBuilder() needs new
      addTestVmAndJavaOptions argument
    + S8129419: heapDumper.cpp: assert(length_in_bytes &gt; 0) failed:
      nothing to copy
    + S8130150: Implement BigInteger.montgomeryMultiply intrinsic
    + S8130242: DataFlavorComparator transitivity exception
    + S8130304: Inference: NodeNotFoundException thrown with deep
      generic method call chain
    + S8130425: libjvm crash due to stack overflow in executables
      with 32k tbss/tdata
    + S8133023: ParallelGCThreads is not calculated correctly
    + S8134111: Unmarshaller unmarshalls XML element which doesn't
      have the expected namespace
    + S8135259: InetAddress.getAllByName only reports 'unknown
      error' instead of actual cause
    + S8136506: Include sun.arch.data.model as a property that can
      be queried by jtreg
    + S8137068: Tests added in JDK-8048604 fail to compile
    + S8139040: Fix initializations before ShouldNotReachHere()
      etc. and enable -Wuninitialized on linux.
    + S8139581: AWT components are not drawn after removal and
      addition to a container
    + S8141243: Unexpected timezone returned after parsing a date
    + S8141420: Compiler runtime entries don't hold Klass* from
      being GCed
    + S8141445: Use of Solaris/SPARC M7 libadimalloc.so can
      generate unknown signal in hs_err file
    + S8141551: C2 can not handle returns with inccompatible
      interface arrays
    + S8143377: Test PKCS8Test.java fails
    + S8143647: Javac compiles method reference that allows results
      in an IllegalAccessError
    + S8144144: ORB destroy() leaks filedescriptors after
      unsuccessful connection
    + S8144593: Suppress not recognized property/feature warning
      messages from SAXParser
    + S8144957: Remove PICL warning message
    + S8145039: JAXB marshaller fails with ClassCastException on
      classes generated by xjc
    + S8145228: Java Access Bridge,
      getAccessibleStatesStringFromContext doesn't wrap the call to
      getAccessibleRole
    + S8145388: URLConnection.guessContentTypeFromStream returns
      image/jpg for some JPEG images
    + S8145974: XMLStreamWriter produces invalid XML for surrogate
      pairs on OutputStreamWriter
    + S8146035: Windows - With LCD antialiasing, some glyphs are
      not rendered correctly
    + S8146192: Add test for JDK-8049321
    + S8146274: Thread spinning on WeakHashMap.getEntry() with
      concurrent use of nashorn
    + S8147468: Allow users to bound the size of buffers cached in
      the per-thread buffer caches
    + S8147645: get_ctrl_no_update() code is wrong
    + S8147807: crash in libkcms.so on linux-sparc
    + S8148379: jdk.nashorn.api.scripting spec. adjustments,
      clarifications
    + S8148627: RestrictTestMaxCachedBufferSize.java to 64-bit
      platforms
    + S8148820: Missing @since Javadoc tag in Logger.log(Level,
      Supplier)
    + S8148926: Call site profiling fails on braces-wrapped
      anonymous function
    + S8149017: Delayed provider selection broken in RSA client key
      exchange
    + S8149029: Secure validation of XML based digital signature
      always enabled when checking wrapping attacks
    + S8149330: Capacity of StringBuilder should not get close to
      Integer.MAX_VALUE unless necessary
    + S8149334: JSON.parse(JSON.stringify([])).push(10) creates an
      array containing two elements
    + S8149368: [hidpi] JLabel font is twice bigger than JTextArea
      font on Windows 7,HiDPI, Windows L&amp;F
    + S8149411: PKCS12KeyStore cannot extract AES Secret Keys
    + S8149417: Use final restricted flag
    + S8149450: LdapCtx.processReturnCode() throwing Null Pointer
      Exception
    + S8149453: [hidpi] JFileChooser does not scale properly on
      Windows with HiDPI display and Windows L&amp;F
    + S8149543: range check CastII nodes should not be split
      through Phi
    + S8149743: JVM crash after debugger hotswap with lambdas
    + S8149744: fix testng.jar delivery in Nashorn build.xml
    + S8149915: enabling validate-annotations feature for xsd
      schema with annotation causes NPE
    + S8150002: Check for the validity of oop before printing it in
      verify_remembered_set
    + S8150470: JCK: api/xsl/conf/copy/copy19 test failure
    + S8150518: G1 GC crashes at
      G1CollectedHeap::do_collection_pause_at_safepoint(double)
    + S8150533: Test
      java/util/logging/LogManagerAppContextDeadlock.java times out
      intermittently.
    + S8150704: XALAN: ERROR: 'No more DTM IDs are available' when
      transforming with lots of temporary result trees
    + S8150780: Repeated offer and remove on ConcurrentLinkedQueue
      lead to an OutOfMemoryError
    + S8151064: com/sun/jdi/RedefineAddPrivateMethod.sh fails
      intermittently
    + S8151197: [TEST_BUG] Need to backport fix for
      test/javax/net/ssl/TLS/TestJSSE.java
    + S8151352: jdk/test/sample fails with 'effective library path
      is outside the test suite'
    + S8151431: DateFormatSymbols triggers this.clone() in the
      constructor
    + S8151535: TESTBUG: java/lang/invoke/AccessControlTest.java
      should be modified to run with JTREG 4.1 b13
    + S8151731: Add new jtreg keywords to jdk 8
    + S8151998: VS2010 ThemeReader.cpp(758) : error C3861: 'round':
      identifier not found
    + S8152927: Incorrect GPL header in StubFactoryDynamicBase.java
      reported
    + S8153252: SA: Hotspot build on Windows fails if make/closed
      folder does not exist
    + S8153531: Improve exception messaging for RSAClientKeyExchange
    + S8153641: assert(thread_state == _thread_in_native) failed:
      Assumed thread_in_native while heap dump
    + S8153673: [BACKOUT] JDWP: Memory Leak: GlobalRefs never
      deleted when processing invokeMethod command
    + S8154304: NullpointerException at
      LdapReferralException.getReferralContext
    + S8154722: Test gc/ergonomics/TestDynamicNumberOfGCThreads.java
      fails
    + S8157078: 8u102 L10n resource file updates
    + S8157838: Personalized Windows Font Size is not taken into
      account in Java8u102
* Import of OpenJDK 8 u111 build 14
    + S6882559: new JEditorPane('text/plain','') fails for null
      context class loader
    + S8049171: Additional tests for jarsigner's warnings
    + S8063086: Math.pow yields different results upon repeated
      calls
    + S8140530: Creating a VolatileImage with size 0,0 results in
      no longer working g2d.drawString
    + S8142926: OutputAnalyzer's shouldXXX() calls return this
    + S8147077: IllegalArgumentException thrown by
      api/java_awt/Component/FlipBufferStrategy/indexTGF_General
    + S8148127: IllegalArgumentException thrown by JCK test
      api/java_awt/Component/FlipBufferStrategy/indexTGF_General
      in opengl pipeline
    + S8150611: Security problem on sun.misc.resources.Messages*
    + S8153399: Constrain AppCDS behavior (back port)
    + S8157653: [Parfait] Uninitialised variable in awt_Font.cpp
    + S8158734: JEditorPane.createEditorKitForContentType throws
      NPE after 6882559
    + S8158994: Service Menu services
    + S8159684: (tz) Support tzdata2016f
    + S8160904: Typo in code from 8079718 fix :
      enableCustomValueHanlde
    + S8160934: isnan() is not available on older MSVC compilers
    + S8161141: correct bugId for JDK-8158994 fix push
    + S8162411: Service Menu services 2
    + S8162419: closed/com/oracle/jfr/runtime/TestVMInfoEvent.sh
      failing after JDK-8155968
    + S8162511: 8u111 L10n resource file updates
    + S8162792: Remove constraint DSA keySize &lt; 1024 from
      jdk.jar.disabledAlgorithms in jdk8
    + S8164452: 8u111 L10n resource file update - msgdrop 20
    + S8165816: jarsigner -verify shows jar unsigned if it was
      signed with a weak algorithm
    + S8166381: Back out changes to the java.security file to not
      disable MD5
* Backports
    + S8078628, PR3208: Zero build fails with pre-compiled headers
      disabled
    + S8141491, PR3159, G592292: Unaligned memory access in Bits.c
    + S8157306, PR3121: Random infrequent null pointer exceptions
      in javac (enabled on AArch64 only)
    + S8162384, PR3122: Performance regression: bimorphic inlining
      may be bypassed by type speculation
* Bug fixes
    + PR3123: Some object files built without -fPIC on x86 only
    + PR3126: pax-mark-vm script calls 'exit -1' which is invalid
      in dash
    + PR3127, G590348: Only apply PaX markings by default on
      running PaX kernels
    + PR3199: Invalid nashorn URL
    + PR3201: Update infinality configure test
    + PR3218: PR3159 leads to build failure on clean tree
* AArch64 port
    + S8131779, PR3220: AARCH64: add Montgomery multiply intrinsic
    + S8167200, PR3220: AArch64: Broken stack pointer adjustment in
      interpreter
    + S8167421, PR3220: AArch64: in one core system, fatal error:
      Illegal threadstate encountered
    + S8167595, PR3220: AArch64: SEGV in stub code
      cipherBlockChaining_decryptAESCrypt
    + S8168888, PR3220: Port 8160591: Improve internal array
      handling to AArch64.
* Shenandoah
    + PR3224: Shenandoah broken when building without pre-compiled
      headers
- Build against system kerberos 
- Build against system pcsc and sctp 
- S8158260, PR2991, RH1341258: PPC64: unaligned Unsafe.getInt can
      lead to the generation of illegal instructions (bsc#988651)		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-23"/>
	<updated date="2016-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005522">SUSE bug 1005522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005523">SUSE bug 1005523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005524">SUSE bug 1005524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005525">SUSE bug 1005525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005526">SUSE bug 1005526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005527">SUSE bug 1005527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005528">SUSE bug 1005528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988651">SUSE bug 988651</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5582/">CVE-2016-5582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516648" comment="java-1_8_0-openjdk-1.8.0.111-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516649" comment="java-1_8_0-openjdk-headless-1.8.0.111-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77819" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1007501" ref_url="https://bugzilla.suse.com/1007501" source="BUGZILLA"/>
		<reference ref_id="1007766" ref_url="https://bugzilla.suse.com/1007766" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7032" ref_url="https://www.suse.com/security/cve/CVE-2016-7032/" source="CVE"/>
		<reference ref_id="CVE-2016-7076" ref_url="https://www.suse.com/security/cve/CVE-2016-7076/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002414.html" source="SUSE-SU"/>
		<description>

This update for sudo fixes the following issues:

- fix two security vulnerabilities that allowed users to bypass
  sudo's NOEXEC functionality:
  * noexec bypass via system() and popen() [CVE-2016-7032, bsc#1007766]
  * noexec bypass via wordexp() [CVE-2016-7076, bsc#1007501]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-23"/>
	<updated date="2016-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007501">SUSE bug 1007501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007766">SUSE bug 1007766</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7032/">CVE-2016-7032</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7076/">CVE-2016-7076</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517513" comment="sudo-1.8.10p3-8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77820" version="1" class="patch">
	<metadata>
		<title>Security update for tar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1007188" ref_url="https://bugzilla.suse.com/1007188" source="BUGZILLA"/>
		<reference ref_id="913058" ref_url="https://bugzilla.suse.com/913058" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6321" ref_url="https://www.suse.com/security/cve/CVE-2016-6321/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002417.html" source="SUSE-SU"/>
		<description>

This update for tar fixes the following issues:

- Fix the POINTYFEATHER vulnerability - GNU tar archiver can be tricked into extracting
  files and directories in the given destination, regardless of the
  path name(s) specified on the command line [bsc#1007188]
  [CVE-2016-6321]
- Fix Amanda integration issue (bsc#913058)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-24"/>
	<updated date="2016-11-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007188">SUSE bug 1007188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913058">SUSE bug 913058</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6321/">CVE-2016-6321</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516650" comment="tar-1.27.1-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516651" comment="tar-lang-1.27.1-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77821" version="1" class="patch">
	<metadata>
		<title>Security update for libarchive (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1005070" ref_url="https://bugzilla.suse.com/1005070" source="BUGZILLA"/>
		<reference ref_id="1005072" ref_url="https://bugzilla.suse.com/1005072" source="BUGZILLA"/>
		<reference ref_id="1005076" ref_url="https://bugzilla.suse.com/1005076" source="BUGZILLA"/>
		<reference ref_id="986566" ref_url="https://bugzilla.suse.com/986566" source="BUGZILLA"/>
		<reference ref_id="989980" ref_url="https://bugzilla.suse.com/989980" source="BUGZILLA"/>
		<reference ref_id="998677" ref_url="https://bugzilla.suse.com/998677" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2304" ref_url="https://www.suse.com/security/cve/CVE-2015-2304/" source="CVE"/>
		<reference ref_id="CVE-2016-5418" ref_url="https://www.suse.com/security/cve/CVE-2016-5418/" source="CVE"/>
		<reference ref_id="CVE-2016-5844" ref_url="https://www.suse.com/security/cve/CVE-2016-5844/" source="CVE"/>
		<reference ref_id="CVE-2016-6250" ref_url="https://www.suse.com/security/cve/CVE-2016-6250/" source="CVE"/>
		<reference ref_id="CVE-2016-8687" ref_url="https://www.suse.com/security/cve/CVE-2016-8687/" source="CVE"/>
		<reference ref_id="CVE-2016-8688" ref_url="https://www.suse.com/security/cve/CVE-2016-8688/" source="CVE"/>
		<reference ref_id="CVE-2016-8689" ref_url="https://www.suse.com/security/cve/CVE-2016-8689/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002421.html" source="SUSE-SU"/>
		<description>

This update for libarchive fixes several issues.

These security issues were fixed:

- CVE-2016-8687: Buffer overflow when printing a filename (bsc#1005070).
- CVE-2016-8689: Heap overflow when reading corrupted 7Zip files (bsc#1005072).
- CVE-2016-8688: Use after free because of incorrect calculation in next_line (bsc#1005076).
- CVE-2016-5844: Integer overflow in the ISO parser in libarchive allowed remote attackers to cause a denial of service (application crash) via a crafted ISO file (bsc#986566).
- CVE-2016-6250: Integer overflow in the ISO9660 writer in libarchive allowed remote attackers to cause a denial of service (application crash) or execute arbitrary code via vectors related to verifying filename lengths when writing an ISO9660 archive, which trigger a buffer overflow (bsc#989980).
- CVE-2016-5418: The sandboxing code in libarchive mishandled hardlink archive entries of non-zero data size, which might allowed remote attackers to write to arbitrary files via a crafted archive file (bsc#998677).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-25"/>
	<updated date="2016-11-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005070">SUSE bug 1005070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005072">SUSE bug 1005072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005076">SUSE bug 1005076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986566">SUSE bug 986566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989980">SUSE bug 989980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998677">SUSE bug 998677</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2304/">CVE-2015-2304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5418/">CVE-2016-5418</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5844/">CVE-2016-5844</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6250/">CVE-2016-6250</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8687/">CVE-2016-8687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8688/">CVE-2016-8688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8689/">CVE-2016-8689</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516653" comment="libarchive13-3.1.2-25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77822" version="1" class="patch">
	<metadata>
		<title>Recommended update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1001367" ref_url="https://bugzilla.suse.com/1001367" source="BUGZILLA"/>
		<reference ref_id="1003800" ref_url="https://bugzilla.suse.com/1003800" source="BUGZILLA"/>
		<reference ref_id="1004477" ref_url="https://bugzilla.suse.com/1004477" source="BUGZILLA"/>
		<reference ref_id="1005555" ref_url="https://bugzilla.suse.com/1005555" source="BUGZILLA"/>
		<reference ref_id="1005558" ref_url="https://bugzilla.suse.com/1005558" source="BUGZILLA"/>
		<reference ref_id="1005562" ref_url="https://bugzilla.suse.com/1005562" source="BUGZILLA"/>
		<reference ref_id="1005564" ref_url="https://bugzilla.suse.com/1005564" source="BUGZILLA"/>
		<reference ref_id="1005566" ref_url="https://bugzilla.suse.com/1005566" source="BUGZILLA"/>
		<reference ref_id="1005569" ref_url="https://bugzilla.suse.com/1005569" source="BUGZILLA"/>
		<reference ref_id="1005581" ref_url="https://bugzilla.suse.com/1005581" source="BUGZILLA"/>
		<reference ref_id="1005582" ref_url="https://bugzilla.suse.com/1005582" source="BUGZILLA"/>
		<reference ref_id="1006539" ref_url="https://bugzilla.suse.com/1006539" source="BUGZILLA"/>
		<reference ref_id="1008318" ref_url="https://bugzilla.suse.com/1008318" source="BUGZILLA"/>
		<reference ref_id="990890" ref_url="https://bugzilla.suse.com/990890" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3492" ref_url="https://www.suse.com/security/cve/CVE-2016-3492/" source="CVE"/>
		<reference ref_id="CVE-2016-5584" ref_url="https://www.suse.com/security/cve/CVE-2016-5584/" source="CVE"/>
		<reference ref_id="CVE-2016-5624" ref_url="https://www.suse.com/security/cve/CVE-2016-5624/" source="CVE"/>
		<reference ref_id="CVE-2016-5626" ref_url="https://www.suse.com/security/cve/CVE-2016-5626/" source="CVE"/>
		<reference ref_id="CVE-2016-5629" ref_url="https://www.suse.com/security/cve/CVE-2016-5629/" source="CVE"/>
		<reference ref_id="CVE-2016-6663" ref_url="https://www.suse.com/security/cve/CVE-2016-6663/" source="CVE"/>
		<reference ref_id="CVE-2016-7440" ref_url="https://www.suse.com/security/cve/CVE-2016-7440/" source="CVE"/>
		<reference ref_id="CVE-2016-8283" ref_url="https://www.suse.com/security/cve/CVE-2016-8283/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00043.html" source="SUSE-SU"/>
		<description>

This mariadb update to version 10.0.28 fixes the following issues (bsc#1008318):

Security fixes:
- CVE-2016-8283: Unspecified vulnerability in subcomponent Types (bsc#1005582)
- CVE-2016-7440: Unspecified vulnerability in subcomponent Encryption (bsc#1005581)
- CVE-2016-5629: Unspecified vulnerability in subcomponent Federated (bsc#1005569)
- CVE-2016-5626: Unspecified vulnerability in subcomponent GIS (bsc#1005566)
- CVE-2016-5624: Unspecified vulnerability in subcomponent DML (bsc#1005564)
- CVE-2016-5616: Unspecified vulnerability in subcomponent MyISAM (bsc#1005562)
- CVE-2016-5584: Unspecified vulnerability in subcomponent Encryption (bsc#1005558)
- CVE-2016-3492: Unspecified vulnerability in subcomponent Optimizer (bsc#1005555)
- CVE-2016-6663: Privilege Escalation / Race Condition (bsc#1001367)

Bugfixes:
- mysql_install_db can't find data files (bsc#1006539)
- mariadb failing test sys_vars.optimizer_switch_basic (bsc#1003800)
- Remove useless mysql@default.service (bsc#1004477)
- Replace all occurrences of the string '@sysconfdir@' with '/etc' as it wasn't expanded properly (bsc#990890)
- Notable changes:
  * XtraDB updated to 5.6.33-79.0
  * TokuDB updated to 5.6.33-79.0
  * Innodb updated to 5.6.33
  * Performance Schema updated to 5.6.33
- Release notes and upstream changelog:
  * https://kb.askmonty.org/en/mariadb-10028-release-notes
  * https://kb.askmonty.org/en/mariadb-10028-changelog
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-28"/>
	<updated date="2016-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1001367">SUSE bug 1001367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003800">SUSE bug 1003800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004477">SUSE bug 1004477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005555">SUSE bug 1005555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005558">SUSE bug 1005558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005562">SUSE bug 1005562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005564">SUSE bug 1005564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005566">SUSE bug 1005566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005569">SUSE bug 1005569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005581">SUSE bug 1005581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005582">SUSE bug 1005582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006539">SUSE bug 1006539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008318">SUSE bug 1008318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990890">SUSE bug 990890</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3492/">CVE-2016-3492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5584/">CVE-2016-5584</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5624/">CVE-2016-5624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5626/">CVE-2016-5626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5629/">CVE-2016-5629</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6663/">CVE-2016-6663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7440/">CVE-2016-7440</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8283/">CVE-2016-8283</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516663" comment="libmysqlclient18-10.0.28-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516664" comment="libmysqlclient18-32bit-10.0.28-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516665" comment="libmysqlclient_r18-10.0.28-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516666" comment="libmysqlclient_r18-32bit-10.0.28-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516667" comment="mariadb-10.0.28-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516668" comment="mariadb-client-10.0.28-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516669" comment="mariadb-errormessages-10.0.28-17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77823" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1010685" ref_url="https://bugzilla.suse.com/1010685" source="BUGZILLA"/>
		<reference ref_id="988903" ref_url="https://bugzilla.suse.com/988903" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1248" ref_url="https://www.suse.com/security/cve/CVE-2016-1248/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00046.html" source="SUSE-SU"/>
		<description>

This update for vim fixes the following security issues:

- Fixed CVE-2016-1248 an arbitrary command execution vulnerability
  (bsc#1010685)

This update for vim fixes the following issues:

- Fix build with Python 3.5. (bsc#988903)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-29"/>
	<updated date="2016-11-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010685">SUSE bug 1010685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988903">SUSE bug 988903</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1248/">CVE-2016-1248</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516670" comment="gvim-7.4.326-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516671" comment="vim-7.4.326-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516672" comment="vim-data-7.4.326-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77824" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1001066" ref_url="https://bugzilla.suse.com/1001066" source="BUGZILLA"/>
		<reference ref_id="1007245" ref_url="https://bugzilla.suse.com/1007245" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6823" ref_url="https://www.suse.com/security/cve/CVE-2016-6823/" source="CVE"/>
		<reference ref_id="CVE-2016-8862" ref_url="https://www.suse.com/security/cve/CVE-2016-8862/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002430.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

- Memory allocation failure in AcquireMagickMemory (CVE-2016-8862) [bsc#1007245]
- update incomplete patch of CVE-2016-6823 [bsc#1001066]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-30"/>
	<updated date="2016-11-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1001066">SUSE bug 1001066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007245">SUSE bug 1007245</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6823/">CVE-2016-6823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8862/">CVE-2016-8862</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516673" comment="ImageMagick-6.8.8.1-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516674" comment="libMagick++-6_Q16-3-6.8.8.1-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516675" comment="libMagickCore-6_Q16-1-6.8.8.1-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516676" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516677" comment="libMagickWand-6_Q16-1-6.8.8.1-47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77825" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1005522" ref_url="https://bugzilla.suse.com/1005522" source="BUGZILLA"/>
		<reference ref_id="1005523" ref_url="https://bugzilla.suse.com/1005523" source="BUGZILLA"/>
		<reference ref_id="1005524" ref_url="https://bugzilla.suse.com/1005524" source="BUGZILLA"/>
		<reference ref_id="1005525" ref_url="https://bugzilla.suse.com/1005525" source="BUGZILLA"/>
		<reference ref_id="1005526" ref_url="https://bugzilla.suse.com/1005526" source="BUGZILLA"/>
		<reference ref_id="1005527" ref_url="https://bugzilla.suse.com/1005527" source="BUGZILLA"/>
		<reference ref_id="1005528" ref_url="https://bugzilla.suse.com/1005528" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5582" ref_url="https://www.suse.com/security/cve/CVE-2016-5582/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002431.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_0-openjdk fixes the following issues:

- Update to 2.6.8 - OpenJDK 7u121
  * Security fixes
    + S8151921: Improved page resolution
    + S8155968: Update command line options
    + S8155973, CVE-2016-5542: Tighten jar checks (bsc#1005522)
    + S8157176: Improved classfile parsing
    + S8157739, CVE-2016-5554: Classloader Consistency Checking
      (bsc#1005523)
    + S8157749: Improve handling of DNS error replies
    + S8157753: Audio replay enhancement
    + S8157759: LCMS Transform Sampling Enhancement
    + S8157764: Better handling of interpolation plugins
    + S8158302: Handle contextual glyph substitutions
    + S8158993, CVE-2016-5568: Service Menu services (bsc#1005525)
    + S8159495: Fix index offsets
    + S8159503: Amend Annotation Actions
    + S8159511: Stack map validation
    + S8159515: Improve indy validation
    + S8159519, CVE-2016-5573: Reformat JDWP messages (bsc#1005526)
    + S8160090: Better signature handling in pack200
    + S8160094: Improve pack200 layout
    + S8160098: Clean up color profiles
    + S8160591, CVE-2016-5582: Improve internal array handling
      (bsc#1005527)
    + S8160838, CVE-2016-5597: Better HTTP service (bsc#1005528)
    + PR3207, RH1367357: lcms2: Out-of-bounds read in
      Type_MLU_Read()
    + CVE-2016-5556 (bsc#1005524)
  * Import of OpenJDK 7 u121 build 0
    + S6624200: Regression test fails:
      test/closed/javax/swing/JMenuItem/4654927/bug4654927.java
    + S6882559: new JEditorPane('text/plain','') fails for null
      context class loader
    + S7090158: Networking Libraries don't build with javac -Werror
    + S7125055: ContentHandler.getContent API changed in error
    + S7145960: sun/security/mscapi/ShortRSAKey1024.sh failing on
      windows
    + S7187051: ShortRSAKeynnn.sh tests should do cleanup before
      start test
    + S8000626: Implement dead key detection for KeyEvent on Linux
    + S8003890: corelibs test scripts should pass TESTVMOPTS
    + S8005629: javac warnings compiling
      java.awt.EventDispatchThread and sun.awt.X11.XIconWindow
    + S8010297: Missing isLoggable() checks in logging code
    + S8010782: clean up source files containing carriage return
      characters
    + S8014431: cleanup warnings indicated by the -Wunused-value
      compiler option on linux
    + S8015265: revise the fix for 8007037
    + S8016747: Replace deprecated PlatformLogger isLoggable(int)
      with isLoggable(Level)
    + S8020708: NLS mnemonics missing in SwingSet2/JInternalFrame
      demo
    + S8024756: method grouping tabs are not selectable
    + S8026741: jdk8 l10n resource file translation update 5
    + S8048147: Privilege tests with JAAS Subject.doAs
    + S8048357: PKCS basic tests
    + S8049171: Additional tests for jarsigner's warnings
    + S8059177: jdk8u40 l10n resource file translation update 1
    + S8075584: test for 8067364 depends on hardwired text advance
    + S8076486: [TESTBUG]
      javax/security/auth/Subject/doAs/NestedActions.java fails if
      extra VM options are given
    + S8077953: [TEST_BUG]
      com/sun/management/OperatingSystemMXBean/TestTotalSwap.java
      Compilation failed after JDK-8077387
    + S8080628: No mnemonics on Open and Save buttons in
      JFileChooser
    + S8083601: jdk8u60 l10n resource file translation update 2
    + S8140530: Creating a VolatileImage with size 0,0 results in
      no longer working g2d.drawString
    + S8142926: OutputAnalyzer's shouldXXX() calls return this
    + S8143134: L10n resource file translation update
    + S8147077: IllegalArgumentException thrown by
      api/java_awt/Component/FlipBufferStrategy/indexTGF_General
    + S8148127: IllegalArgumentException thrown by JCK test
      api/java_awt/Component/FlipBufferStrategy/indexTGF_General in
      opengl pipeline
    + S8150611: Security problem on sun.misc.resources.Messages*
    + S8157653: [Parfait] Uninitialised variable in awt_Font.cpp
    + S8158734: JEditorPane.createEditorKitForContentType throws
      NPE after 6882559
    + S8159684: (tz) Support tzdata2016f
    + S8160934: isnan() is not available on older MSVC compilers
    + S8162411: Service Menu services 2
    + S8162419: closed/com/oracle/jfr/runtime/TestVMInfoEvent.sh
      failing after JDK-8155968
    + S8162511: 8u111 L10n resource file updates
    + S8162792: Remove constraint DSA keySize &lt; 1024 from
      jdk.jar.disabledAlgorithms in jdk8
    + S8164452: 8u111 L10n resource file update - msgdrop 20
    + S8165816: jarsigner -verify shows jar unsigned if it was
      signed with a weak algorithm
    + S8166381: Back out changes to the java.security file to not
      disable MD5
  * Backports
    + S6604109, PR3162: 
      javax.print.PrintServiceLookup.lookupPrintServices fails
      SOMETIMES for Cups
    + S6907252, PR3162: ZipFileInputStream Not Thread-Safe
    + S8024046, PR3162: Test sun/security/krb5/runNameEquals.sh
      failed on 7u45 Embedded linux-ppc*
    + S8028479, PR3162: runNameEquals still cannot precisely detect
      if a usable native krb5 is available
    + S8034057, PR3162: Files.getFileStore and Files.isWritable do
      not work with SUBST'ed drives (win)
    + S8038491, PR3162: Improve synchronization in ZipFile.read()
    + S8038502, PR3162: Deflater.needsInput() should use
      synchronization
    + S8059411, PR3162: RowSetWarning does not correctly chain
      warnings
    + S8062198, PR3162: Add RowSetMetaDataImpl Tests and add column
      range validation to isdefinitlyWritable
    + S8066188, PR3162: BaseRowSet returns the wrong default value
      for escape processing
    + S8072466, PR3162: Deadlock when initializing MulticastSocket
      and DatagramSocket
    + S8075118, PR3162: JVM stuck in infinite loop during
      verification
    + S8076579, PR3162: Popping a stack frame after exception
      breakpoint sets last method param to exception
    + S8078495, PR3162: End time checking for native TGT is wrong
    + S8078668, PR3162: jar usage string mentions unsupported
      option '-n'
    + S8080115, PR3162: (fs) Crash in libgio when calling
      Files.probeContentType(path) from parallel threads
    + S8081794, PR3162: ParsePosition getErrorIndex returns 0 for
      TimeZone parsing problem
    + S8129957, PR3162: Deadlock in JNDI LDAP implementation when
      closing the LDAP context
    + S8130136, PR3162: Swing window sometimes fails to repaint
      partially when it becomes exposed
    + S8130274, PR3162: java/nio/file/FileStore/Basic.java fails
      when two successive stores in an iteration are determined to
      be equal
    + S8132551, PR3162: Initialize local variables before returning
      them in p11_convert.c
    + S8133207, PR3162: [TEST_BUG] ParallelProbes.java test fails
      after changes for JDK-8080115
    + S8133666, PR3162: OperatingSystemMXBean reports abnormally
      high machine CPU consumption on Linux
    + S8135002, PR3162: Fix or remove broken links in
      objectMonitor.cpp comments
    + S8137121, PR3162: (fc) Infinite loop FileChannel.truncate
    + S8137230, PR3162: TEST_BUG:
      java/nio/channels/FileChannel/LoopingTruncate.java timed out
    + S8139373, PR3162: [TEST_BUG]
      java/net/MulticastSocket/MultiDead.java failed with timeout
    + S8140249, PR3162: JVM Crashing During startUp If Flight
      Recording is enabled
    + S8141491, PR3160, G592292: Unaligned memory access in Bits.c
    + S8144483, PR3162: One long Safepoint pause directly after
      each GC log rotation
    + S8149611, PR3160, G592292: Add tests for
      Unsafe.copySwapMemory
  * Bug fixes
    + S8078628, PR3151: Zero build fails with pre-compiled headers
      disabled
    + PR3128: pax-mark-vm script calls 'exit -1' which is invalid
      in dash
    + PR3131: PaX marking fails on filesystems which don't support
      extended attributes
    + PR3135: Makefile.am rule
      stamps/add/tzdata-support-debug.stamp has a typo in
      add-tzdata dependency
    + PR3141: Pass $(CC) and $(CXX) to OpenJDK build
    + PR3166: invalid zip timestamp handling leads to error
      building bootstrap-javac
    + PR3202: Update infinality configure test
    + PR3212: Disable ARM32 JIT by default
  * CACAO
    + PR3136: CACAO is broken due to 2 new native methods in
      sun.misc.Unsafe (from S8158260)
* JamVM
    + PR3134: JamVM is broken due to 2 new native methods in
      sun.misc.Unsafe (from S8158260)
* AArch64 port
    + S8167200, PR3204: AArch64: Broken stack pointer adjustment
      in interpreter
    + S8168888: Port 8160591: Improve internal array handling to
      AArch64.
    + PR3211: AArch64 build fails with pre-compiled headers
      disabled
- Changed patch:
  * java-1_7_0-openjdk-gcc6.patch
    + Rediff to changed context

- Disable arm32 JIT, since its build broken
  (http://icedtea.classpath.org/bugzilla/show_bug.cgi?id=2942)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-30"/>
	<updated date="2016-11-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005522">SUSE bug 1005522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005523">SUSE bug 1005523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005524">SUSE bug 1005524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005525">SUSE bug 1005525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005526">SUSE bug 1005526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005527">SUSE bug 1005527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005528">SUSE bug 1005528</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5582/">CVE-2016-5582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516678" comment="java-1_7_0-openjdk-1.7.0.121-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516679" comment="java-1_7_0-openjdk-headless-1.7.0.121-36.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77826" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="947494" ref_url="https://bugzilla.suse.com/947494" source="BUGZILLA"/>
		<reference ref_id="966891" ref_url="https://bugzilla.suse.com/966891" source="BUGZILLA"/>
		<reference ref_id="982331" ref_url="https://bugzilla.suse.com/982331" source="BUGZILLA"/>
		<reference ref_id="987176" ref_url="https://bugzilla.suse.com/987176" source="BUGZILLA"/>
		<reference ref_id="988361" ref_url="https://bugzilla.suse.com/988361" source="BUGZILLA"/>
		<reference ref_id="990531" ref_url="https://bugzilla.suse.com/990531" source="BUGZILLA"/>
		<reference ref_id="994399" ref_url="https://bugzilla.suse.com/994399" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5011" ref_url="https://www.suse.com/security/cve/CVE-2016-5011/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002432.html" source="SUSE-SU"/>
		<description>

This update for util-linux fixes the following issues:

- Consider redundant slashes when comparing paths (bsc#982331,
  util-linux-libmount-ignore-redundant-slashes.patch, affects
  backport of util-linux-libmount-cifs-is_mounted.patch).

- Use upstream compatibility patches for --show-pt-geometry with
  obsolescence and deprecation warning (bsc#990531)

- Replace cifs mount detection patch with upstream one that covers
  all cases (bsc#987176).

- Reuse existing loop device to prevent possible data corruption
  when multiple -o loop are used to mount a single file
  (bsc#947494)

- Safe loop re-use in libmount, mount and losetup (bsc#947494)

- UPSTREAM DIVERGENCE!!!
  losetup -L continues to use SLE12 SP1 and SP2 specific meaning
  --logical-blocksize instead of upstream --nooverlap (bsc#966891).

- Make release-dependent conflict with old sysvinit-tools SLE
  specific, as it is required only for SLE 11 upgrade,
  and breaks openSUSE staging builds (bsc#994399).

- Extended partition loop in MBR partition table leads to DoS
  (bsc#988361, CVE-2016-5011)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-30"/>
	<updated date="2016-11-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/947494">SUSE bug 947494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966891">SUSE bug 966891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982331">SUSE bug 982331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987176">SUSE bug 987176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988361">SUSE bug 988361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990531">SUSE bug 990531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994399">SUSE bug 994399</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5011/">CVE-2016-5011</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517514" comment="libblkid1-2.28-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517515" comment="libblkid1-32bit-2.28-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517516" comment="libfdisk1-2.28-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517517" comment="libmount1-2.28-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517518" comment="libmount1-32bit-2.28-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517519" comment="libsmartcols1-2.28-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517520" comment="libuuid-devel-2.28-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517521" comment="libuuid1-2.28-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517522" comment="libuuid1-32bit-2.28-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517523" comment="python-libmount-2.28-42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517524" comment="util-linux-2.28-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517525" comment="util-linux-lang-2.28-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517526" comment="util-linux-systemd-2.28-42.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517527" comment="uuidd-2.28-42.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77827" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1008029" ref_url="https://bugzilla.suse.com/1008029" source="BUGZILLA"/>
		<reference ref_id="986247" ref_url="https://bugzilla.suse.com/986247" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5773" ref_url="https://www.suse.com/security/cve/CVE-2016-5773/" source="CVE"/>
		<reference ref_id="CVE-2016-9137" ref_url="https://www.suse.com/security/cve/CVE-2016-9137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002438.html" source="SUSE-SU"/>
		<description>

This update for php5 fixes the following issues:

- CVE-2016-9137: Use After Free in unserialize() (bsc#1008029)
- CVE-2016-5773: ZipArchive class Use After Free Vulnerability in PHP's GC (bsc#986247)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-02"/>
	<updated date="2016-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1008029">SUSE bug 1008029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986247">SUSE bug 986247</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5773/">CVE-2016-5773</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9137/">CVE-2016-9137</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516680" comment="libc-client2007e_suse-2007e_suse-22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77828" version="1" class="patch">
	<metadata>
		<title>Security update for pcre (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="906574" ref_url="https://bugzilla.suse.com/906574" source="BUGZILLA"/>
		<reference ref_id="924960" ref_url="https://bugzilla.suse.com/924960" source="BUGZILLA"/>
		<reference ref_id="933288" ref_url="https://bugzilla.suse.com/933288" source="BUGZILLA"/>
		<reference ref_id="933878" ref_url="https://bugzilla.suse.com/933878" source="BUGZILLA"/>
		<reference ref_id="936227" ref_url="https://bugzilla.suse.com/936227" source="BUGZILLA"/>
		<reference ref_id="942865" ref_url="https://bugzilla.suse.com/942865" source="BUGZILLA"/>
		<reference ref_id="957566" ref_url="https://bugzilla.suse.com/957566" source="BUGZILLA"/>
		<reference ref_id="957567" ref_url="https://bugzilla.suse.com/957567" source="BUGZILLA"/>
		<reference ref_id="957598" ref_url="https://bugzilla.suse.com/957598" source="BUGZILLA"/>
		<reference ref_id="957600" ref_url="https://bugzilla.suse.com/957600" source="BUGZILLA"/>
		<reference ref_id="960837" ref_url="https://bugzilla.suse.com/960837" source="BUGZILLA"/>
		<reference ref_id="971741" ref_url="https://bugzilla.suse.com/971741" source="BUGZILLA"/>
		<reference ref_id="972127" ref_url="https://bugzilla.suse.com/972127" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964/" source="CVE"/>
		<reference ref_id="CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325/" source="CVE"/>
		<reference ref_id="CVE-2015-2327" ref_url="https://www.suse.com/security/cve/CVE-2015-2327/" source="CVE"/>
		<reference ref_id="CVE-2015-2328" ref_url="https://www.suse.com/security/cve/CVE-2015-2328/" source="CVE"/>
		<reference ref_id="CVE-2015-3210" ref_url="https://www.suse.com/security/cve/CVE-2015-3210/" source="CVE"/>
		<reference ref_id="CVE-2015-3217" ref_url="https://www.suse.com/security/cve/CVE-2015-3217/" source="CVE"/>
		<reference ref_id="CVE-2015-5073" ref_url="https://www.suse.com/security/cve/CVE-2015-5073/" source="CVE"/>
		<reference ref_id="CVE-2015-8380" ref_url="https://www.suse.com/security/cve/CVE-2015-8380/" source="CVE"/>
		<reference ref_id="CVE-2015-8381" ref_url="https://www.suse.com/security/cve/CVE-2015-8381/" source="CVE"/>
		<reference ref_id="CVE-2015-8382" ref_url="https://www.suse.com/security/cve/CVE-2015-8382/" source="CVE"/>
		<reference ref_id="CVE-2015-8383" ref_url="https://www.suse.com/security/cve/CVE-2015-8383/" source="CVE"/>
		<reference ref_id="CVE-2015-8384" ref_url="https://www.suse.com/security/cve/CVE-2015-8384/" source="CVE"/>
		<reference ref_id="CVE-2015-8385" ref_url="https://www.suse.com/security/cve/CVE-2015-8385/" source="CVE"/>
		<reference ref_id="CVE-2015-8386" ref_url="https://www.suse.com/security/cve/CVE-2015-8386/" source="CVE"/>
		<reference ref_id="CVE-2015-8387" ref_url="https://www.suse.com/security/cve/CVE-2015-8387/" source="CVE"/>
		<reference ref_id="CVE-2015-8388" ref_url="https://www.suse.com/security/cve/CVE-2015-8388/" source="CVE"/>
		<reference ref_id="CVE-2015-8389" ref_url="https://www.suse.com/security/cve/CVE-2015-8389/" source="CVE"/>
		<reference ref_id="CVE-2015-8390" ref_url="https://www.suse.com/security/cve/CVE-2015-8390/" source="CVE"/>
		<reference ref_id="CVE-2015-8391" ref_url="https://www.suse.com/security/cve/CVE-2015-8391/" source="CVE"/>
		<reference ref_id="CVE-2015-8392" ref_url="https://www.suse.com/security/cve/CVE-2015-8392/" source="CVE"/>
		<reference ref_id="CVE-2015-8393" ref_url="https://www.suse.com/security/cve/CVE-2015-8393/" source="CVE"/>
		<reference ref_id="CVE-2015-8394" ref_url="https://www.suse.com/security/cve/CVE-2015-8394/" source="CVE"/>
		<reference ref_id="CVE-2015-8395" ref_url="https://www.suse.com/security/cve/CVE-2015-8395/" source="CVE"/>
		<reference ref_id="CVE-2016-1283" ref_url="https://www.suse.com/security/cve/CVE-2016-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-3191" ref_url="https://www.suse.com/security/cve/CVE-2016-3191/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<description>

This update for pcre to version 8.39 (bsc#972127) fixes several issues.

If you use pcre extensively please be aware that this is an update to a new version. Please
make sure that your software works with the updated version.

This version fixes a number of vulnerabilities that affect pcre
and applications using the libary when accepting untrusted input
as regular expressions or as part thereof. Remote attackers could
have caused the application to crash, disclose information or
potentially execute arbitrary code. These security issues were fixed:

- CVE-2014-8964: Heap-based buffer overflow in PCRE allowed remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats (bsc#906574).
- CVE-2015-2325: Heap buffer overflow in compile_branch() (bsc#924960).
- CVE-2015-3210: Heap buffer overflow in pcre_compile2() / compile_regex() (bsc#933288)
- CVE-2015-3217: PCRE Library Call Stack Overflow Vulnerability in match() (bsc#933878).
- CVE-2015-5073: Library Heap Overflow Vulnerability in find_fixedlength() (bsc#936227).
- bsc#942865: heap overflow in compile_regex()
- CVE-2015-8380: The pcre_exec function in pcre_exec.c mishandled a // pattern with a \01 string, which allowed remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror (bsc#957566).
- CVE-2015-2327: PCRE mishandled certain patterns with internal recursive back references, which allowed remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror (bsc#957567).
- bsc#957598: Various security issues 
- CVE-2015-8381: Heap Overflow in compile_regex() (bsc#957598).
- CVE-2015-8382: Regular Expression Uninitialized Pointer Information Disclosure Vulnerability (ZDI-CAN-2547)(bsc#957598).
- CVE-2015-8383: Buffer overflow caused by repeated conditional group(bsc#957598).
- CVE-2015-8384: Buffer overflow caused by recursive back reference by name within certain group(bsc#957598).
- CVE-2015-8385: Buffer overflow caused by forward reference by name to certain group(bsc#957598).
- CVE-2015-8386: Buffer overflow caused by lookbehind assertion(bsc#957598).
- CVE-2015-8387: Integer overflow in subroutine calls(bsc#957598).
- CVE-2015-8388: Buffer overflow caused by certain patterns with an unmatched closing parenthesis(bsc#957598).
- CVE-2015-8389: Infinite recursion in JIT compiler when processing certain patterns(bsc#957598).
- CVE-2015-8390: Reading from uninitialized memory when processing certain patterns(bsc#957598).
- CVE-2015-8391: Some pathological patterns causes pcre_compile() to run for a very long time(bsc#957598).
- CVE-2015-8392: Buffer overflow caused by certain patterns with duplicated named groups(bsc#957598).
- CVE-2015-8393: Information leak when running pcgrep -q on crafted binary(bsc#957598).
- CVE-2015-8394: Integer overflow caused by missing check for certain conditions(bsc#957598).
- CVE-2015-8395: Buffer overflow caused by certain references(bsc#957598).
- CVE-2015-2328: PCRE mishandled the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allowed remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression (bsc#957600).
- CVE-2016-1283: The pcre_compile2 function in pcre_compile.c in PCRE mishandled certain patterns with named subgroups, which allowed remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression (bsc#960837).
- CVE-2016-3191: The compile_branch function in pcre_compile.c in pcre2_compile.c mishandled patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allowed remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression (bsc#971741).

These non-security issues were fixed:
- JIT compiler improvements
- performance improvements
- The Unicode data tables have been updated to Unicode 7.0.0.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-02"/>
	<updated date="2016-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/906574">SUSE bug 906574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924960">SUSE bug 924960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933288">SUSE bug 933288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933878">SUSE bug 933878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936227">SUSE bug 936227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942865">SUSE bug 942865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957566">SUSE bug 957566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957567">SUSE bug 957567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957600">SUSE bug 957600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960837">SUSE bug 960837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971741">SUSE bug 971741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972127">SUSE bug 972127</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2327/">CVE-2015-2327</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2328/">CVE-2015-2328</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3210/">CVE-2015-3210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3217/">CVE-2015-3217</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5073/">CVE-2015-5073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8380/">CVE-2015-8380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8381/">CVE-2015-8381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8382/">CVE-2015-8382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8383/">CVE-2015-8383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8384/">CVE-2015-8384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8385/">CVE-2015-8385</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8386/">CVE-2015-8386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8387/">CVE-2015-8387</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8388/">CVE-2015-8388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8389/">CVE-2015-8389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8390/">CVE-2015-8390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8391/">CVE-2015-8391</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8392/">CVE-2015-8392</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8393/">CVE-2015-8393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8394/">CVE-2015-8394</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8395/">CVE-2015-8395</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1283/">CVE-2016-1283</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3191/">CVE-2016-3191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516681" comment="libpcre1-8.39-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516682" comment="libpcre1-32bit-8.39-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516683" comment="libpcre16-0-8.39-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516684" comment="libpcrecpp0-8.39-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516685" comment="libpcrecpp0-32bit-8.39-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77829" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1002991" ref_url="https://bugzilla.suse.com/1002991" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7942" ref_url="https://www.suse.com/security/cve/CVE-2016-7942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002441.html" source="SUSE-SU"/>
		<description>

libX11 was updated to fix a memory leak that was introduced with the
security fix for CVE-2016-7942.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-05"/>
	<updated date="2016-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002991">SUSE bug 1002991</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7942/">CVE-2016-7942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516695" comment="libX11-6-1.6.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516696" comment="libX11-6-32bit-1.6.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516697" comment="libX11-data-1.6.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516698" comment="libX11-xcb1-1.6.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516699" comment="libX11-xcb1-32bit-1.6.2-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77830" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1009026" ref_url="https://bugzilla.suse.com/1009026" source="BUGZILLA"/>
		<reference ref_id="1010395" ref_url="https://bugzilla.suse.com/1010395" source="BUGZILLA"/>
		<reference ref_id="1010401" ref_url="https://bugzilla.suse.com/1010401" source="BUGZILLA"/>
		<reference ref_id="1010402" ref_url="https://bugzilla.suse.com/1010402" source="BUGZILLA"/>
		<reference ref_id="1010404" ref_url="https://bugzilla.suse.com/1010404" source="BUGZILLA"/>
		<reference ref_id="1010410" ref_url="https://bugzilla.suse.com/1010410" source="BUGZILLA"/>
		<reference ref_id="1010422" ref_url="https://bugzilla.suse.com/1010422" source="BUGZILLA"/>
		<reference ref_id="1010427" ref_url="https://bugzilla.suse.com/1010427" source="BUGZILLA"/>
		<reference ref_id="1010517" ref_url="https://bugzilla.suse.com/1010517" source="BUGZILLA"/>
		<reference ref_id="992549" ref_url="https://bugzilla.suse.com/992549" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5285" ref_url="https://www.suse.com/security/cve/CVE-2016-5285/" source="CVE"/>
		<reference ref_id="CVE-2016-5290" ref_url="https://www.suse.com/security/cve/CVE-2016-5290/" source="CVE"/>
		<reference ref_id="CVE-2016-5291" ref_url="https://www.suse.com/security/cve/CVE-2016-5291/" source="CVE"/>
		<reference ref_id="CVE-2016-5296" ref_url="https://www.suse.com/security/cve/CVE-2016-5296/" source="CVE"/>
		<reference ref_id="CVE-2016-5297" ref_url="https://www.suse.com/security/cve/CVE-2016-5297/" source="CVE"/>
		<reference ref_id="CVE-2016-9064" ref_url="https://www.suse.com/security/cve/CVE-2016-9064/" source="CVE"/>
		<reference ref_id="CVE-2016-9066" ref_url="https://www.suse.com/security/cve/CVE-2016-9066/" source="CVE"/>
		<reference ref_id="CVE-2016-9074" ref_url="https://www.suse.com/security/cve/CVE-2016-9074/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00011.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox, mozilla-nss fixes security issues and bugs.

The following vulnerabilities were fixed in Firefox ESR 45.5 (bsc#1009026):

- CVE-2016-5297: Incorrect argument length checking in Javascript (bsc#1010401)
- CVE-2016-9066: Integer overflow leading to a buffer overflow in nsScriptLoadHandler (bsc#1010404)
- CVE-2016-5296: Heap-buffer-overflow WRITE in rasterize_edges_1 (bsc#1010395)
- CVE-2016-9064: Addons update must verify IDs match between current and new versions (bsc#1010402)
- CVE-2016-5290: Memory safety bugs fixed in Firefox 50 and Firefox ESR 45.5 (bsc#1010427)
- CVE-2016-5291: Same-origin policy violation using local HTML file and saved shortcut file (bsc#1010410)

The following vulnerabilities were fixed in mozilla-nss 3.21.3:

- CVE-2016-9074: Insufficient timing side-channel resistance in divSpoiler (bsc#1010422)
- CVE-2016-5285: Missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime causes server crash (bsc#1010517)  

The following bugs were fixed:

- Firefox would fail to go into fullscreen mode with some window managers (bsc#992549)

The Mozilla Firefox changelog was amended to document patched dropped in a previous update.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-05"/>
	<updated date="2016-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010395">SUSE bug 1010395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010401">SUSE bug 1010401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010402">SUSE bug 1010402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010404">SUSE bug 1010404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010410">SUSE bug 1010410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010422">SUSE bug 1010422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010427">SUSE bug 1010427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010517">SUSE bug 1010517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992549">SUSE bug 992549</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5285/">CVE-2016-5285</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5290/">CVE-2016-5290</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5291/">CVE-2016-5291</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5296/">CVE-2016-5296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5297/">CVE-2016-5297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9064/">CVE-2016-9064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9066/">CVE-2016-9066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9074/">CVE-2016-9074</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516700" comment="MozillaFirefox-45.5.0esr-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516701" comment="MozillaFirefox-translations-45.5.0esr-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516702" comment="libfreebl3-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516703" comment="libfreebl3-32bit-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516704" comment="libsoftokn3-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516705" comment="libsoftokn3-32bit-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516706" comment="mozilla-nss-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516707" comment="mozilla-nss-32bit-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516708" comment="mozilla-nss-certs-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516709" comment="mozilla-nss-certs-32bit-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516710" comment="mozilla-nss-sysinit-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516711" comment="mozilla-nss-sysinit-32bit-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516712" comment="mozilla-nss-tools-3.21.3-50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77831" version="1" class="patch">
	<metadata>
		<title>Security update for libXi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1002998" ref_url="https://bugzilla.suse.com/1002998" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7945" ref_url="https://www.suse.com/security/cve/CVE-2016-7945/" source="CVE"/>
		<reference ref_id="CVE-2016-7946" ref_url="https://www.suse.com/security/cve/CVE-2016-7946/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002450.html" source="SUSE-SU"/>
		<description>

libXi was updated to fix two security issues.

These security issues were fixed:
- CVE-2016-7945: Integer overflows in libXI can cause out of boundary memory access or endless loops (Denial of Service) (bsc#1002998).
- CVE-2016-7946: Insufficient validation of data in libXI can cause out of boundary memory access or endless loops (Denial of Service) (bsc#1002998).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-07"/>
	<updated date="2016-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002998">SUSE bug 1002998</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7945/">CVE-2016-7945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7946/">CVE-2016-7946</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516722" comment="libXi6-1.7.4-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516723" comment="libXi6-32bit-1.7.4-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77832" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1012964" ref_url="https://bugzilla.suse.com/1012964" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9079" ref_url="https://www.suse.com/security/cve/CVE-2016-9079/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00024.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox fixes security issues.

The following vulnerabilities were fixed in Firefox ESR 45.5.1 (bbsc#1012964):

- CVE-2016-9079: Use-after-free in SVG Animation could be used for code execution (MFSA 2016-92 bsc#1012964)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-07"/>
	<updated date="2016-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012964">SUSE bug 1012964</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9079/">CVE-2016-9079</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516724" comment="MozillaFirefox-45.5.1esr-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516725" comment="MozillaFirefox-translations-45.5.1esr-93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77833" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1008831" ref_url="https://bugzilla.suse.com/1008831" source="BUGZILLA"/>
		<reference ref_id="1011685" ref_url="https://bugzilla.suse.com/1011685" source="BUGZILLA"/>
		<reference ref_id="1012754" ref_url="https://bugzilla.suse.com/1012754" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8632" ref_url="https://www.suse.com/security/cve/CVE-2016-8632/" source="CVE"/>
		<reference ref_id="CVE-2016-8655" ref_url="https://www.suse.com/security/cve/CVE-2016-8655/" source="CVE"/>
		<reference ref_id="CVE-2016-9555" ref_url="https://www.suse.com/security/cve/CVE-2016-9555/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3049-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00025.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 kernel was updated to receive critical security fixes.

The following security bugs were fixed:

- CVE-2016-8655: A race condition in the af_packet packet_set_ring
  function could be used by local attackers to crash the kernel or gain
  privileges (bsc#1012754).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in
  the Linux kernel did not validate the relationship between the minimum
  fragment length and the maximum packet size, which allowed local users to
  gain privileges or cause a denial of service (heap-based buffer overflow)
  by leveraging the CAP_NET_ADMIN capability (bnc#1008831).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in
  the Linux kernel lacks chunk-length checking for the first chunk, which
  allowed remote attackers to cause a denial of service (out-of-bounds slab
  access) or possibly have unspecified other impact via crafted SCTP data
  (bnc#1011685).

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-07"/>
	<updated date="2016-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1008831">SUSE bug 1008831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011685">SUSE bug 1011685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012754">SUSE bug 1012754</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8632/">CVE-2016-8632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8655/">CVE-2016-8655</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9555/">CVE-2016-9555</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517528" comment="kernel-default-4.4.21-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517529" comment="kernel-default-devel-4.4.21-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517530" comment="kernel-default-extra-4.4.21-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517531" comment="kernel-devel-4.4.21-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517532" comment="kernel-macros-4.4.21-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517533" comment="kernel-source-4.4.21-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517534" comment="kernel-syms-4.4.21-84.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77834" version="1" class="patch">
	<metadata>
		<title>Security update for w3m (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1011283" ref_url="https://bugzilla.suse.com/1011283" source="BUGZILLA"/>
		<reference ref_id="1011284" ref_url="https://bugzilla.suse.com/1011284" source="BUGZILLA"/>
		<reference ref_id="1011285" ref_url="https://bugzilla.suse.com/1011285" source="BUGZILLA"/>
		<reference ref_id="1011286" ref_url="https://bugzilla.suse.com/1011286" source="BUGZILLA"/>
		<reference ref_id="1011287" ref_url="https://bugzilla.suse.com/1011287" source="BUGZILLA"/>
		<reference ref_id="1011288" ref_url="https://bugzilla.suse.com/1011288" source="BUGZILLA"/>
		<reference ref_id="1011289" ref_url="https://bugzilla.suse.com/1011289" source="BUGZILLA"/>
		<reference ref_id="1011290" ref_url="https://bugzilla.suse.com/1011290" source="BUGZILLA"/>
		<reference ref_id="1011291" ref_url="https://bugzilla.suse.com/1011291" source="BUGZILLA"/>
		<reference ref_id="1011292" ref_url="https://bugzilla.suse.com/1011292" source="BUGZILLA"/>
		<reference ref_id="1011293" ref_url="https://bugzilla.suse.com/1011293" source="BUGZILLA"/>
		<reference ref_id="1012021" ref_url="https://bugzilla.suse.com/1012021" source="BUGZILLA"/>
		<reference ref_id="1012022" ref_url="https://bugzilla.suse.com/1012022" source="BUGZILLA"/>
		<reference ref_id="1012023" ref_url="https://bugzilla.suse.com/1012023" source="BUGZILLA"/>
		<reference ref_id="1012024" ref_url="https://bugzilla.suse.com/1012024" source="BUGZILLA"/>
		<reference ref_id="1012025" ref_url="https://bugzilla.suse.com/1012025" source="BUGZILLA"/>
		<reference ref_id="1012026" ref_url="https://bugzilla.suse.com/1012026" source="BUGZILLA"/>
		<reference ref_id="1012027" ref_url="https://bugzilla.suse.com/1012027" source="BUGZILLA"/>
		<reference ref_id="1012028" ref_url="https://bugzilla.suse.com/1012028" source="BUGZILLA"/>
		<reference ref_id="1012029" ref_url="https://bugzilla.suse.com/1012029" source="BUGZILLA"/>
		<reference ref_id="1012030" ref_url="https://bugzilla.suse.com/1012030" source="BUGZILLA"/>
		<reference ref_id="1012031" ref_url="https://bugzilla.suse.com/1012031" source="BUGZILLA"/>
		<reference ref_id="1012032" ref_url="https://bugzilla.suse.com/1012032" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9434" ref_url="https://www.suse.com/security/cve/CVE-2016-9434/" source="CVE"/>
		<reference ref_id="CVE-2016-9435" ref_url="https://www.suse.com/security/cve/CVE-2016-9435/" source="CVE"/>
		<reference ref_id="CVE-2016-9436" ref_url="https://www.suse.com/security/cve/CVE-2016-9436/" source="CVE"/>
		<reference ref_id="CVE-2016-9437" ref_url="https://www.suse.com/security/cve/CVE-2016-9437/" source="CVE"/>
		<reference ref_id="CVE-2016-9438" ref_url="https://www.suse.com/security/cve/CVE-2016-9438/" source="CVE"/>
		<reference ref_id="CVE-2016-9439" ref_url="https://www.suse.com/security/cve/CVE-2016-9439/" source="CVE"/>
		<reference ref_id="CVE-2016-9440" ref_url="https://www.suse.com/security/cve/CVE-2016-9440/" source="CVE"/>
		<reference ref_id="CVE-2016-9441" ref_url="https://www.suse.com/security/cve/CVE-2016-9441/" source="CVE"/>
		<reference ref_id="CVE-2016-9442" ref_url="https://www.suse.com/security/cve/CVE-2016-9442/" source="CVE"/>
		<reference ref_id="CVE-2016-9443" ref_url="https://www.suse.com/security/cve/CVE-2016-9443/" source="CVE"/>
		<reference ref_id="CVE-2016-9621" ref_url="https://www.suse.com/security/cve/CVE-2016-9621/" source="CVE"/>
		<reference ref_id="CVE-2016-9622" ref_url="https://www.suse.com/security/cve/CVE-2016-9622/" source="CVE"/>
		<reference ref_id="CVE-2016-9623" ref_url="https://www.suse.com/security/cve/CVE-2016-9623/" source="CVE"/>
		<reference ref_id="CVE-2016-9624" ref_url="https://www.suse.com/security/cve/CVE-2016-9624/" source="CVE"/>
		<reference ref_id="CVE-2016-9625" ref_url="https://www.suse.com/security/cve/CVE-2016-9625/" source="CVE"/>
		<reference ref_id="CVE-2016-9626" ref_url="https://www.suse.com/security/cve/CVE-2016-9626/" source="CVE"/>
		<reference ref_id="CVE-2016-9627" ref_url="https://www.suse.com/security/cve/CVE-2016-9627/" source="CVE"/>
		<reference ref_id="CVE-2016-9628" ref_url="https://www.suse.com/security/cve/CVE-2016-9628/" source="CVE"/>
		<reference ref_id="CVE-2016-9629" ref_url="https://www.suse.com/security/cve/CVE-2016-9629/" source="CVE"/>
		<reference ref_id="CVE-2016-9630" ref_url="https://www.suse.com/security/cve/CVE-2016-9630/" source="CVE"/>
		<reference ref_id="CVE-2016-9631" ref_url="https://www.suse.com/security/cve/CVE-2016-9631/" source="CVE"/>
		<reference ref_id="CVE-2016-9632" ref_url="https://www.suse.com/security/cve/CVE-2016-9632/" source="CVE"/>
		<reference ref_id="CVE-2016-9633" ref_url="https://www.suse.com/security/cve/CVE-2016-9633/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<description>

This update for w3m fixes the following issues:

- update to debian git version (bsc#1011293)
  addressed security issues:
         CVE-2016-9622: w3m: null deref (bsc#1012021)
         CVE-2016-9623: w3m: null deref (bsc#1012022)
         CVE-2016-9624: w3m: near-null deref (bsc#1012023)
         CVE-2016-9625: w3m: stack overflow (bsc#1012024)
         CVE-2016-9626: w3m: stack overflow (bsc#1012025)
         CVE-2016-9627: w3m: heap overflow read + deref (bsc#1012026)
         CVE-2016-9628: w3m: null deref (bsc#1012027)
         CVE-2016-9629: w3m: null deref (bsc#1012028)
         CVE-2016-9630: w3m: global-buffer-overflow read (bsc#1012029)
         CVE-2016-9631: w3m: null deref (bsc#1012030)
         CVE-2016-9632: w3m: global-buffer-overflow read (bsc#1012031)
         CVE-2016-9633: w3m: OOM (bsc#1012032)
         CVE-2016-9434: w3m: null deref (bsc#1011283)
         CVE-2016-9435: w3m: use uninit value (bsc#1011284)
         CVE-2016-9436: w3m: use uninit value (bsc#1011285)
         CVE-2016-9437: w3m: write to rodata (bsc#1011286)
         CVE-2016-9438: w3m: null deref (bsc#1011287)
         CVE-2016-9439: w3m: stack overflow (bsc#1011288)
         CVE-2016-9440: w3m: near-null deref (bsc#1011289)
         CVE-2016-9441: w3m: near-null deref (bsc#1011290)
         CVE-2016-9442: w3m: potential heap buffer corruption (bsc#1011291)
         CVE-2016-9443: w3m: null deref (bsc#1011292)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-08"/>
	<updated date="2016-12-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011283">SUSE bug 1011283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011284">SUSE bug 1011284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011285">SUSE bug 1011285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011286">SUSE bug 1011286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011287">SUSE bug 1011287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011288">SUSE bug 1011288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011289">SUSE bug 1011289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011290">SUSE bug 1011290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011291">SUSE bug 1011291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011292">SUSE bug 1011292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012021">SUSE bug 1012021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012022">SUSE bug 1012022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012023">SUSE bug 1012023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012024">SUSE bug 1012024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012025">SUSE bug 1012025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012026">SUSE bug 1012026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012027">SUSE bug 1012027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012028">SUSE bug 1012028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012029">SUSE bug 1012029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012030">SUSE bug 1012030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012031">SUSE bug 1012031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012032">SUSE bug 1012032</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9434/">CVE-2016-9434</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9435/">CVE-2016-9435</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9436/">CVE-2016-9436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9437/">CVE-2016-9437</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9438/">CVE-2016-9438</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9439/">CVE-2016-9439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9440/">CVE-2016-9440</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9441/">CVE-2016-9441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9442/">CVE-2016-9442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9443/">CVE-2016-9443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9621/">CVE-2016-9621</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9622/">CVE-2016-9622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9623/">CVE-2016-9623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9624/">CVE-2016-9624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9625/">CVE-2016-9625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9626/">CVE-2016-9626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9627/">CVE-2016-9627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9628/">CVE-2016-9628</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9629/">CVE-2016-9629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9630/">CVE-2016-9630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9631/">CVE-2016-9631</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9632/">CVE-2016-9632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9633/">CVE-2016-9633</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516726" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77835" version="1" class="patch">
	<metadata>
		<title>Security update for gc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1011276" ref_url="https://bugzilla.suse.com/1011276" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9427" ref_url="https://www.suse.com/security/cve/CVE-2016-9427/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002457.html" source="SUSE-SU"/>
		<description>

This update for gc fixes the following issues:

- integer overflow in GC_MALLOC_ATOMIC() (CVE-2016-9427, bsc#1011276)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-08"/>
	<updated date="2016-12-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011276">SUSE bug 1011276</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9427/">CVE-2016-9427</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516727" comment="libgc1-7.2d-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77836" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1000106" ref_url="https://bugzilla.suse.com/1000106" source="BUGZILLA"/>
		<reference ref_id="1003030" ref_url="https://bugzilla.suse.com/1003030" source="BUGZILLA"/>
		<reference ref_id="1003032" ref_url="https://bugzilla.suse.com/1003032" source="BUGZILLA"/>
		<reference ref_id="1004981" ref_url="https://bugzilla.suse.com/1004981" source="BUGZILLA"/>
		<reference ref_id="1005004" ref_url="https://bugzilla.suse.com/1005004" source="BUGZILLA"/>
		<reference ref_id="1005005" ref_url="https://bugzilla.suse.com/1005005" source="BUGZILLA"/>
		<reference ref_id="1007157" ref_url="https://bugzilla.suse.com/1007157" source="BUGZILLA"/>
		<reference ref_id="1007941" ref_url="https://bugzilla.suse.com/1007941" source="BUGZILLA"/>
		<reference ref_id="1009100" ref_url="https://bugzilla.suse.com/1009100" source="BUGZILLA"/>
		<reference ref_id="1009103" ref_url="https://bugzilla.suse.com/1009103" source="BUGZILLA"/>
		<reference ref_id="1009104" ref_url="https://bugzilla.suse.com/1009104" source="BUGZILLA"/>
		<reference ref_id="1009105" ref_url="https://bugzilla.suse.com/1009105" source="BUGZILLA"/>
		<reference ref_id="1009107" ref_url="https://bugzilla.suse.com/1009107" source="BUGZILLA"/>
		<reference ref_id="1009108" ref_url="https://bugzilla.suse.com/1009108" source="BUGZILLA"/>
		<reference ref_id="1009109" ref_url="https://bugzilla.suse.com/1009109" source="BUGZILLA"/>
		<reference ref_id="1009111" ref_url="https://bugzilla.suse.com/1009111" source="BUGZILLA"/>
		<reference ref_id="1011652" ref_url="https://bugzilla.suse.com/1011652" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7777" ref_url="https://www.suse.com/security/cve/CVE-2016-7777/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9377" ref_url="https://www.suse.com/security/cve/CVE-2016-9377/" source="CVE"/>
		<reference ref_id="CVE-2016-9378" ref_url="https://www.suse.com/security/cve/CVE-2016-9378/" source="CVE"/>
		<reference ref_id="CVE-2016-9379" ref_url="https://www.suse.com/security/cve/CVE-2016-9379/" source="CVE"/>
		<reference ref_id="CVE-2016-9380" ref_url="https://www.suse.com/security/cve/CVE-2016-9380/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9382" ref_url="https://www.suse.com/security/cve/CVE-2016-9382/" source="CVE"/>
		<reference ref_id="CVE-2016-9383" ref_url="https://www.suse.com/security/cve/CVE-2016-9383/" source="CVE"/>
		<reference ref_id="CVE-2016-9384" ref_url="https://www.suse.com/security/cve/CVE-2016-9384/" source="CVE"/>
		<reference ref_id="CVE-2016-9385" ref_url="https://www.suse.com/security/cve/CVE-2016-9385/" source="CVE"/>
		<reference ref_id="CVE-2016-9386" ref_url="https://www.suse.com/security/cve/CVE-2016-9386/" source="CVE"/>
		<reference ref_id="CVE-2016-9637" ref_url="https://www.suse.com/security/cve/CVE-2016-9637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<description>

xen was updated to version 4.7.1 to fix 17 security issues.

These security issues were fixed:

- CVE-2016-9637: ioport array overflow allowing a malicious guest administrator can escalate their privilege to that of the host (bsc#1011652).
- CVE-2016-9386: x86 null segments were not always treated as unusable allowing an unprivileged guest user program to elevate its privilege to that of the guest operating system. Exploit of this vulnerability is easy on Intel and more complicated on AMD (bsc#1009100).
- CVE-2016-9382: x86 task switch to VM86 mode was mis-handled, allowing a unprivileged guest process to escalate its privilege to that of the guest operating system on AMD hardware. On Intel hardware a malicious unprivileged guest process can crash the guest (bsc#1009103).
- CVE-2016-9385: x86 segment base write emulation lacked canonical address checks, allowing a malicious guest administrator to crash the host (bsc#1009104).
- CVE-2016-9384: Guest 32-bit ELF symbol table load leaking host data to unprivileged guest users (bsc#1009105).
- CVE-2016-9383: The x86 64-bit bit test instruction emulation was broken, allowing a guest to modify arbitrary memory leading to arbitray code execution (bsc#1009107).
- CVE-2016-9377: x86 software interrupt injection was mis-handled, allowing an unprivileged guest user to crash the guest (bsc#1009108).
- CVE-2016-9378: x86 software interrupt injection was mis-handled, allowing an unprivileged guest user to crash the guest (bsc#1009108)
- CVE-2016-9381: Improper processing of shared rings allowing guest administrators take over the qemu process, elevating their privilege to that of the qemu process (bsc#1009109).
- CVE-2016-9379: Delimiter injection vulnerabilities in pygrub allowed guest administrators to obtain the contents of sensitive host files or delete the files (bsc#1009111).
- CVE-2016-9380: Delimiter injection vulnerabilities in pygrub allowed  guest administrators to obtain the contents of sensitive host files or delete the files  (bsc#1009111).
- CVE-2016-7777: Xen did not properly honor CR0.TS and CR0.EM, which allowed local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it (bsc#1000106).
- CVE-2016-8910: The rtl8139_cplus_transmit function in hw/net/rtl8139.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count (bsc#1007157).
- CVE-2016-8667: The rc4030_write function in hw/dma/rc4030.c in allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value (bsc#1005004).
- CVE-2016-8669: The serial_update_parameters function in hw/char/serial.c allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base (bsc#1005005).
- CVE-2016-7908: The mcf_fec_do_tx function in hw/net/mcf_fec.c did not properly limit the buffer descriptor count when transmitting packets, which allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags (bsc#1003030).
- CVE-2016-7909: The pcnet_rdra_addr function in hw/net/pcnet.c allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0 (bsc#1003032).

These non-security issues were fixed:

- bsc#1004981: Xen RPM didn't contain debug hypervisor for EFI systems
- bsc#1007941: Xen tools limited the number of vcpus to 256 
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-09"/>
	<updated date="2016-12-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000106">SUSE bug 1000106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003030">SUSE bug 1003030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003032">SUSE bug 1003032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004981">SUSE bug 1004981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005004">SUSE bug 1005004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005005">SUSE bug 1005005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007157">SUSE bug 1007157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007941">SUSE bug 1007941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009100">SUSE bug 1009100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009103">SUSE bug 1009103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009104">SUSE bug 1009104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009105">SUSE bug 1009105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009107">SUSE bug 1009107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009108">SUSE bug 1009108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009109">SUSE bug 1009109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009111">SUSE bug 1009111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011652">SUSE bug 1011652</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7777/">CVE-2016-7777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9377/">CVE-2016-9377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9378/">CVE-2016-9378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9379/">CVE-2016-9379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9380/">CVE-2016-9380</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9382/">CVE-2016-9382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9383/">CVE-2016-9383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9384/">CVE-2016-9384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9385/">CVE-2016-9385</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9386/">CVE-2016-9386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9637/">CVE-2016-9637</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77837" version="1" class="patch">
	<metadata>
		<title>Security update for libass (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1002982" ref_url="https://bugzilla.suse.com/1002982" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7969" ref_url="https://www.suse.com/security/cve/CVE-2016-7969/" source="CVE"/>
		<reference ref_id="CVE-2016-7970" ref_url="https://www.suse.com/security/cve/CVE-2016-7970/" source="CVE"/>
		<reference ref_id="CVE-2016-7971" ref_url="https://www.suse.com/security/cve/CVE-2016-7971/" source="CVE"/>
		<reference ref_id="CVE-2016-7972" ref_url="https://www.suse.com/security/cve/CVE-2016-7972/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002475.html" source="SUSE-SU"/>
		<description>


This update for libass fixes the following issues:

CVE-2016-7969, CVE-2016-7970, CVE-2016-7971, CVE-2016-7972: Fixed multiple memory allocation issues found by fuzzing (bsc#1002982).
 
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-13"/>
	<updated date="2016-12-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002982">SUSE bug 1002982</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7969/">CVE-2016-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7970/">CVE-2016-7970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7971/">CVE-2016-7971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7972/">CVE-2016-7972</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516732" comment="libass5-0.10.2-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77838" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1013533" ref_url="https://bugzilla.suse.com/1013533" source="BUGZILLA"/>
		<reference ref_id="1013604" ref_url="https://bugzilla.suse.com/1013604" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9576" ref_url="https://www.suse.com/security/cve/CVE-2016-9576/" source="CVE"/>
		<reference ref_id="CVE-2016-9794" ref_url="https://www.suse.com/security/cve/CVE-2016-9794/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00062.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP 2 kernel was updated to fix two security issues.

The following security bugs were fixed:

- CVE-2016-9576: A use-after-free vulnerability in the SCSI generic driver allows users with write access to /dev/sg* or /dev/bsg* to elevate their privileges (bsc#1013604).
- CVE-2016-9794: A use-after-free vulnerability in the ALSA pcm layer allowed local users to cause a denial of service, memory corruption or possibly even to elevate their privileges (bsc#1013533).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-13"/>
	<updated date="2016-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013533">SUSE bug 1013533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013604">SUSE bug 1013604</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9576/">CVE-2016-9576</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9794/">CVE-2016-9794</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517538" comment="kernel-default-4.4.21-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517539" comment="kernel-default-devel-4.4.21-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517540" comment="kernel-default-extra-4.4.21-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517541" comment="kernel-devel-4.4.21-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517542" comment="kernel-macros-4.4.21-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517543" comment="kernel-source-4.4.21-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517544" comment="kernel-syms-4.4.21-90.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77839" version="1" class="patch">
	<metadata>
		<title>Security update for pcre (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="906574" ref_url="https://bugzilla.suse.com/906574" source="BUGZILLA"/>
		<reference ref_id="924960" ref_url="https://bugzilla.suse.com/924960" source="BUGZILLA"/>
		<reference ref_id="933288" ref_url="https://bugzilla.suse.com/933288" source="BUGZILLA"/>
		<reference ref_id="933878" ref_url="https://bugzilla.suse.com/933878" source="BUGZILLA"/>
		<reference ref_id="936227" ref_url="https://bugzilla.suse.com/936227" source="BUGZILLA"/>
		<reference ref_id="942865" ref_url="https://bugzilla.suse.com/942865" source="BUGZILLA"/>
		<reference ref_id="957566" ref_url="https://bugzilla.suse.com/957566" source="BUGZILLA"/>
		<reference ref_id="957567" ref_url="https://bugzilla.suse.com/957567" source="BUGZILLA"/>
		<reference ref_id="957598" ref_url="https://bugzilla.suse.com/957598" source="BUGZILLA"/>
		<reference ref_id="957600" ref_url="https://bugzilla.suse.com/957600" source="BUGZILLA"/>
		<reference ref_id="960837" ref_url="https://bugzilla.suse.com/960837" source="BUGZILLA"/>
		<reference ref_id="971741" ref_url="https://bugzilla.suse.com/971741" source="BUGZILLA"/>
		<reference ref_id="972127" ref_url="https://bugzilla.suse.com/972127" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964/" source="CVE"/>
		<reference ref_id="CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325/" source="CVE"/>
		<reference ref_id="CVE-2015-2327" ref_url="https://www.suse.com/security/cve/CVE-2015-2327/" source="CVE"/>
		<reference ref_id="CVE-2015-2328" ref_url="https://www.suse.com/security/cve/CVE-2015-2328/" source="CVE"/>
		<reference ref_id="CVE-2015-3210" ref_url="https://www.suse.com/security/cve/CVE-2015-3210/" source="CVE"/>
		<reference ref_id="CVE-2015-3217" ref_url="https://www.suse.com/security/cve/CVE-2015-3217/" source="CVE"/>
		<reference ref_id="CVE-2015-5073" ref_url="https://www.suse.com/security/cve/CVE-2015-5073/" source="CVE"/>
		<reference ref_id="CVE-2015-8380" ref_url="https://www.suse.com/security/cve/CVE-2015-8380/" source="CVE"/>
		<reference ref_id="CVE-2015-8381" ref_url="https://www.suse.com/security/cve/CVE-2015-8381/" source="CVE"/>
		<reference ref_id="CVE-2015-8382" ref_url="https://www.suse.com/security/cve/CVE-2015-8382/" source="CVE"/>
		<reference ref_id="CVE-2015-8383" ref_url="https://www.suse.com/security/cve/CVE-2015-8383/" source="CVE"/>
		<reference ref_id="CVE-2015-8384" ref_url="https://www.suse.com/security/cve/CVE-2015-8384/" source="CVE"/>
		<reference ref_id="CVE-2015-8385" ref_url="https://www.suse.com/security/cve/CVE-2015-8385/" source="CVE"/>
		<reference ref_id="CVE-2015-8386" ref_url="https://www.suse.com/security/cve/CVE-2015-8386/" source="CVE"/>
		<reference ref_id="CVE-2015-8387" ref_url="https://www.suse.com/security/cve/CVE-2015-8387/" source="CVE"/>
		<reference ref_id="CVE-2015-8388" ref_url="https://www.suse.com/security/cve/CVE-2015-8388/" source="CVE"/>
		<reference ref_id="CVE-2015-8389" ref_url="https://www.suse.com/security/cve/CVE-2015-8389/" source="CVE"/>
		<reference ref_id="CVE-2015-8390" ref_url="https://www.suse.com/security/cve/CVE-2015-8390/" source="CVE"/>
		<reference ref_id="CVE-2015-8391" ref_url="https://www.suse.com/security/cve/CVE-2015-8391/" source="CVE"/>
		<reference ref_id="CVE-2015-8392" ref_url="https://www.suse.com/security/cve/CVE-2015-8392/" source="CVE"/>
		<reference ref_id="CVE-2015-8393" ref_url="https://www.suse.com/security/cve/CVE-2015-8393/" source="CVE"/>
		<reference ref_id="CVE-2015-8394" ref_url="https://www.suse.com/security/cve/CVE-2015-8394/" source="CVE"/>
		<reference ref_id="CVE-2015-8395" ref_url="https://www.suse.com/security/cve/CVE-2015-8395/" source="CVE"/>
		<reference ref_id="CVE-2016-1283" ref_url="https://www.suse.com/security/cve/CVE-2016-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-3191" ref_url="https://www.suse.com/security/cve/CVE-2016-3191/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<description>

This update for pcre to version 8.39 (bsc#972127) fixes several issues.

If you use pcre extensively please be aware that this is an update to a new version. Please
make sure that your software works with the updated version.

This version fixes a number of vulnerabilities that affect pcre
and applications using the libary when accepting untrusted input
as regular expressions or as part thereof. Remote attackers could
have caused the application to crash, disclose information or
potentially execute arbitrary code. These security issues were fixed:

- CVE-2014-8964: Heap-based buffer overflow in PCRE allowed remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats (bsc#906574).
- CVE-2015-2325: Heap buffer overflow in compile_branch() (bsc#924960).
- CVE-2015-3210: Heap buffer overflow in pcre_compile2() / compile_regex() (bsc#933288)
- CVE-2015-3217: PCRE Library Call Stack Overflow Vulnerability in match() (bsc#933878).
- CVE-2015-5073: Library Heap Overflow Vulnerability in find_fixedlength() (bsc#936227).
- bsc#942865: heap overflow in compile_regex()
- CVE-2015-8380: The pcre_exec function in pcre_exec.c mishandled a // pattern with a \01 string, which allowed remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror (bsc#957566).
- CVE-2015-2327: PCRE mishandled certain patterns with internal recursive back references, which allowed remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror (bsc#957567).
- bsc#957598: Various security issues 
- CVE-2015-8381: Heap Overflow in compile_regex() (bsc#957598).
- CVE-2015-8382: Regular Expression Uninitialized Pointer Information Disclosure Vulnerability (ZDI-CAN-2547)(bsc#957598).
- CVE-2015-8383: Buffer overflow caused by repeated conditional group(bsc#957598).
- CVE-2015-8384: Buffer overflow caused by recursive back reference by name within certain group(bsc#957598).
- CVE-2015-8385: Buffer overflow caused by forward reference by name to certain group(bsc#957598).
- CVE-2015-8386: Buffer overflow caused by lookbehind assertion(bsc#957598).
- CVE-2015-8387: Integer overflow in subroutine calls(bsc#957598).
- CVE-2015-8388: Buffer overflow caused by certain patterns with an unmatched closing parenthesis(bsc#957598).
- CVE-2015-8389: Infinite recursion in JIT compiler when processing certain patterns(bsc#957598).
- CVE-2015-8390: Reading from uninitialized memory when processing certain patterns(bsc#957598).
- CVE-2015-8391: Some pathological patterns causes pcre_compile() to run for a very long time(bsc#957598).
- CVE-2015-8392: Buffer overflow caused by certain patterns with duplicated named groups(bsc#957598).
- CVE-2015-8393: Information leak when running pcgrep -q on crafted binary(bsc#957598).
- CVE-2015-8394: Integer overflow caused by missing check for certain conditions(bsc#957598).
- CVE-2015-8395: Buffer overflow caused by certain references(bsc#957598).
- CVE-2015-2328: PCRE mishandled the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allowed remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression (bsc#957600).
- CVE-2016-1283: The pcre_compile2 function in pcre_compile.c in PCRE mishandled certain patterns with named subgroups, which allowed remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression (bsc#960837).
- CVE-2016-3191: The compile_branch function in pcre_compile.c in pcre2_compile.c mishandled patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allowed remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression (bsc#971741).

These non-security issues were fixed:
- JIT compiler improvements
- performance improvements
- The Unicode data tables have been updated to Unicode 7.0.0.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-15"/>
	<updated date="2016-12-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/906574">SUSE bug 906574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924960">SUSE bug 924960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933288">SUSE bug 933288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933878">SUSE bug 933878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936227">SUSE bug 936227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942865">SUSE bug 942865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957566">SUSE bug 957566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957567">SUSE bug 957567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957600">SUSE bug 957600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960837">SUSE bug 960837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971741">SUSE bug 971741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972127">SUSE bug 972127</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2327/">CVE-2015-2327</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2328/">CVE-2015-2328</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3210/">CVE-2015-3210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3217/">CVE-2015-3217</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5073/">CVE-2015-5073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8380/">CVE-2015-8380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8381/">CVE-2015-8381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8382/">CVE-2015-8382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8383/">CVE-2015-8383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8384/">CVE-2015-8384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8385/">CVE-2015-8385</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8386/">CVE-2015-8386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8387/">CVE-2015-8387</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8388/">CVE-2015-8388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8389/">CVE-2015-8389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8390/">CVE-2015-8390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8391/">CVE-2015-8391</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8392/">CVE-2015-8392</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8393/">CVE-2015-8393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8394/">CVE-2015-8394</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8395/">CVE-2015-8395</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1283/">CVE-2016-1283</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3191/">CVE-2016-3191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516735" comment="libpcre1-8.39-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516736" comment="libpcre1-32bit-8.39-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516737" comment="libpcre16-0-8.39-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516738" comment="libpcrecpp0-8.39-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516739" comment="libpcrecpp0-32bit-8.39-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77840" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1009434" ref_url="https://bugzilla.suse.com/1009434" source="BUGZILLA"/>
		<reference ref_id="1011377" ref_url="https://bugzilla.suse.com/1011377" source="BUGZILLA"/>
		<reference ref_id="1011390" ref_url="https://bugzilla.suse.com/1011390" source="BUGZILLA"/>
		<reference ref_id="1011395" ref_url="https://bugzilla.suse.com/1011395" source="BUGZILLA"/>
		<reference ref_id="1011398" ref_url="https://bugzilla.suse.com/1011398" source="BUGZILLA"/>
		<reference ref_id="1011404" ref_url="https://bugzilla.suse.com/1011404" source="BUGZILLA"/>
		<reference ref_id="1011406" ref_url="https://bugzilla.suse.com/1011406" source="BUGZILLA"/>
		<reference ref_id="1011411" ref_url="https://bugzilla.suse.com/1011411" source="BUGZILLA"/>
		<reference ref_id="1011417" ref_url="https://bugzilla.suse.com/1011417" source="BUGZILLA"/>
		<reference ref_id="943216" ref_url="https://bugzilla.suse.com/943216" source="BUGZILLA"/>
		<reference ref_id="956365" ref_url="https://bugzilla.suse.com/956365" source="BUGZILLA"/>
		<reference ref_id="981252" ref_url="https://bugzilla.suse.com/981252" source="BUGZILLA"/>
		<reference ref_id="988028" ref_url="https://bugzilla.suse.com/988028" source="BUGZILLA"/>
		<reference ref_id="992038" ref_url="https://bugzilla.suse.com/992038" source="BUGZILLA"/>
		<reference ref_id="992606" ref_url="https://bugzilla.suse.com/992606" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5219" ref_url="https://www.suse.com/security/cve/CVE-2015-5219/" source="CVE"/>
		<reference ref_id="CVE-2016-7426" ref_url="https://www.suse.com/security/cve/CVE-2016-7426/" source="CVE"/>
		<reference ref_id="CVE-2016-7427" ref_url="https://www.suse.com/security/cve/CVE-2016-7427/" source="CVE"/>
		<reference ref_id="CVE-2016-7428" ref_url="https://www.suse.com/security/cve/CVE-2016-7428/" source="CVE"/>
		<reference ref_id="CVE-2016-7429" ref_url="https://www.suse.com/security/cve/CVE-2016-7429/" source="CVE"/>
		<reference ref_id="CVE-2016-7431" ref_url="https://www.suse.com/security/cve/CVE-2016-7431/" source="CVE"/>
		<reference ref_id="CVE-2016-7433" ref_url="https://www.suse.com/security/cve/CVE-2016-7433/" source="CVE"/>
		<reference ref_id="CVE-2016-7434" ref_url="https://www.suse.com/security/cve/CVE-2016-7434/" source="CVE"/>
		<reference ref_id="CVE-2016-9310" ref_url="https://www.suse.com/security/cve/CVE-2016-9310/" source="CVE"/>
		<reference ref_id="CVE-2016-9311" ref_url="https://www.suse.com/security/cve/CVE-2016-9311/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002497.html" source="SUSE-SU"/>
		<description>

This update for ntp fixes the following issues:

ntp was updated to 4.2.8p9.

Security issues fixed:

- CVE-2016-9311, CVE-2016-9310, bsc#1011377: Mode 6
  unauthenticated trap information disclosure and DDoS vector.
- CVE-2016-7427, bsc#1011390:
  Broadcast Mode Replay Prevention DoS.
- CVE-2016-7428, bsc#1011417:
  Broadcast Mode Poll Interval Enforcement DoS.
- CVE-2016-7431, bsc#1011395:
  Regression: 010-origin: Zero Origin Timestamp Bypass.
- CVE-2016-7434, bsc#1011398:
  Null pointer dereference in _IO_str_init_static_internal().
- CVE-2016-7429, bsc#1011404: Interface selection attack.
- CVE-2016-7426, bsc#1011406:
  Client rate limiting and server responses.
- CVE-2016-7433, bsc#1011411: Reboot sync calculation problem.
- CVE-2015-5219: An endless loop due to incorrect precision to
  double conversion (bsc#943216).

Non-security issues fixed:

- Fix a spurious error message.
- Other bugfixes, see /usr/share/doc/packages/ntp/ChangeLog.
- Fix a regression in 'trap' (bsc#981252).
- Reduce the number of netlink groups to listen on for changes to
  the local network setup (bsc#992606).
- Fix segfault in 'sntp -a' (bsc#1009434).
- Silence an OpenSSL version warning (bsc#992038).
- Make the resolver task change user and group IDs to the same
  values as the main task. (bsc#988028)
- Simplify ntpd's search for its own executable to prevent AppArmor
  warnings (bsc#956365).

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-19"/>
	<updated date="2016-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009434">SUSE bug 1009434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011377">SUSE bug 1011377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011390">SUSE bug 1011390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011395">SUSE bug 1011395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011398">SUSE bug 1011398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011404">SUSE bug 1011404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011406">SUSE bug 1011406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011411">SUSE bug 1011411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011417">SUSE bug 1011417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943216">SUSE bug 943216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956365">SUSE bug 956365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981252">SUSE bug 981252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988028">SUSE bug 988028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992038">SUSE bug 992038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992606">SUSE bug 992606</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5219/">CVE-2015-5219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7426/">CVE-2016-7426</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7427/">CVE-2016-7427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7428/">CVE-2016-7428</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7429/">CVE-2016-7429</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7431/">CVE-2016-7431</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7433/">CVE-2016-7433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7434/">CVE-2016-7434</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9310/">CVE-2016-9310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9311/">CVE-2016-9311</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516756" comment="ntp-4.2.8p9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516757" comment="ntp-doc-4.2.8p9-55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77841" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1012651" ref_url="https://bugzilla.suse.com/1012651" source="BUGZILLA"/>
		<reference ref_id="1014298" ref_url="https://bugzilla.suse.com/1014298" source="BUGZILLA"/>
		<reference ref_id="1014300" ref_url="https://bugzilla.suse.com/1014300" source="BUGZILLA"/>
		<reference ref_id="1016340" ref_url="https://bugzilla.suse.com/1016340" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10013" ref_url="https://www.suse.com/security/cve/CVE-2016-10013/" source="CVE"/>
		<reference ref_id="CVE-2016-10024" ref_url="https://www.suse.com/security/cve/CVE-2016-10024/" source="CVE"/>
		<reference ref_id="CVE-2016-10025" ref_url="https://www.suse.com/security/cve/CVE-2016-10025/" source="CVE"/>
		<reference ref_id="CVE-2016-9932" ref_url="https://www.suse.com/security/cve/CVE-2016-9932/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00079.html" source="SUSE-SU"/>
		<description>

This update for xen fixes the following issues:

- A Mishandling of SYSCALL singlestep during emulation which could
  have lead to privilege escalation. (XSA-204, bsc#1016340, CVE-2016-10013)
- CMPXCHG8B emulation failed to ignore operand size override which could have
  lead to information disclosure. (XSA-200, bsc#1012651, CVE-2016-9932)
- PV guests may have been able to mask interrupts causing a Denial of Service.
  (XSA-202, bsc#1014298, CVE-2016-10024)
- A missing NULL pointer check in VMFUNC emulation could lead to a hypervisor
  crash leading to a Denial of Servce. (XSA-203, bsc#1014300, CVE-2016-10025)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-21"/>
	<updated date="2016-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012651">SUSE bug 1012651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014298">SUSE bug 1014298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014300">SUSE bug 1014300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016340">SUSE bug 1016340</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10013/">CVE-2016-10013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10024/">CVE-2016-10024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10025/">CVE-2016-10025</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9932/">CVE-2016-9932</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517545" comment="xen-4.7.1_04-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517546" comment="xen-libs-4.7.1_04-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517547" comment="xen-libs-32bit-4.7.1_04-28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77842" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1015187" ref_url="https://bugzilla.suse.com/1015187" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9933" ref_url="https://www.suse.com/security/cve/CVE-2016-9933/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002508.html" source="SUSE-SU"/>
		<description>

This update for gd fixes the following issues:

* CVE-2016-9933 possible stackoverflow on malicious truecolor images [bsc#1015187]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-21"/>
	<updated date="2016-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015187">SUSE bug 1015187</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9933/">CVE-2016-9933</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516762" comment="gd-2.1.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516763" comment="gd-32bit-2.1.0-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77843" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1015422" ref_url="https://bugzilla.suse.com/1015422" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9893" ref_url="https://www.suse.com/security/cve/CVE-2016-9893/" source="CVE"/>
		<reference ref_id="CVE-2016-9895" ref_url="https://www.suse.com/security/cve/CVE-2016-9895/" source="CVE"/>
		<reference ref_id="CVE-2016-9897" ref_url="https://www.suse.com/security/cve/CVE-2016-9897/" source="CVE"/>
		<reference ref_id="CVE-2016-9898" ref_url="https://www.suse.com/security/cve/CVE-2016-9898/" source="CVE"/>
		<reference ref_id="CVE-2016-9899" ref_url="https://www.suse.com/security/cve/CVE-2016-9899/" source="CVE"/>
		<reference ref_id="CVE-2016-9900" ref_url="https://www.suse.com/security/cve/CVE-2016-9900/" source="CVE"/>
		<reference ref_id="CVE-2016-9901" ref_url="https://www.suse.com/security/cve/CVE-2016-9901/" source="CVE"/>
		<reference ref_id="CVE-2016-9902" ref_url="https://www.suse.com/security/cve/CVE-2016-9902/" source="CVE"/>
		<reference ref_id="CVE-2016-9904" ref_url="https://www.suse.com/security/cve/CVE-2016-9904/" source="CVE"/>
		<reference ref_id="CVE-2016-9905" ref_url="https://www.suse.com/security/cve/CVE-2016-9905/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00083.html" source="SUSE-SU"/>
		<description>

MozillaFirefox 45 ESR was updated to 45.6 to fix the following issues:

* MFSA 2016-95/CVE-2016-9897: Memory corruption in libGLES
* MFSA 2016-95/CVE-2016-9901: Data from Pocket server improperly sanitized before execution
* MFSA 2016-95/CVE-2016-9898: Use-after-free in Editor while manipulating DOM subtrees
* MFSA 2016-95/CVE-2016-9899: Use-after-free while manipulating DOM events and audio elements
* MFSA 2016-95/CVE-2016-9904: Cross-origin information leak in shared atoms
* MFSA 2016-95/CVE-2016-9905: Crash in EnumerateSubDocuments
* MFSA 2016-95/CVE-2016-9895: CSP bypass using marquee tag
* MFSA 2016-95/CVE-2016-9900: Restricted external resources can be loaded by SVG images through data URLs
* MFSA 2016-95/CVE-2016-9893: Memory safety bugs fixed in Firefox 50.1 and Firefox ESR 45.6
* MFSA 2016-95/CVE-2016-9902: Pocket extension does not validate the origin of events

Please see https://www.mozilla.org/en-US/security/advisories/mfsa2016-95/
for more information.

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-21"/>
	<updated date="2016-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9893/">CVE-2016-9893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9895/">CVE-2016-9895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9897/">CVE-2016-9897</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9898/">CVE-2016-9898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9899/">CVE-2016-9899</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9900/">CVE-2016-9900</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9901/">CVE-2016-9901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9902/">CVE-2016-9902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9904/">CVE-2016-9904</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9905/">CVE-2016-9905</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516764" comment="MozillaFirefox-45.6.0esr-96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516765" comment="MozillaFirefox-translations-45.6.0esr-96.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77844" version="1" class="patch">
	<metadata>
		<title>Security update for libgme (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1015941" ref_url="https://bugzilla.suse.com/1015941" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9957" ref_url="https://www.suse.com/security/cve/CVE-2016-9957/" source="CVE"/>
		<reference ref_id="CVE-2016-9958" ref_url="https://www.suse.com/security/cve/CVE-2016-9958/" source="CVE"/>
		<reference ref_id="CVE-2016-9959" ref_url="https://www.suse.com/security/cve/CVE-2016-9959/" source="CVE"/>
		<reference ref_id="CVE-2016-9960" ref_url="https://www.suse.com/security/cve/CVE-2016-9960/" source="CVE"/>
		<reference ref_id="CVE-2016-9961" ref_url="https://www.suse.com/security/cve/CVE-2016-9961/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00090.html" source="SUSE-SU"/>
		<description>

This update for libgme fixes the following issues:

- CVE-2016-9957, CVE-2016-9958, CVE-2016-9959, CVE-2016-9960, CVE-2016-9961:
  Various issues were fixed in the handling of SPC music files that could have
  been exploited for gaining privileges of desktop users. [bsc#1015941]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-22"/>
	<updated date="2016-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1015941">SUSE bug 1015941</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9957/">CVE-2016-9957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9958/">CVE-2016-9958</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9959/">CVE-2016-9959</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9960/">CVE-2016-9960</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9961/">CVE-2016-9961</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516766" comment="libgme0-0.6.0-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77845" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1009318" ref_url="https://bugzilla.suse.com/1009318" source="BUGZILLA"/>
		<reference ref_id="1011130" ref_url="https://bugzilla.suse.com/1011130" source="BUGZILLA"/>
		<reference ref_id="1011136" ref_url="https://bugzilla.suse.com/1011136" source="BUGZILLA"/>
		<reference ref_id="1013376" ref_url="https://bugzilla.suse.com/1013376" source="BUGZILLA"/>
		<reference ref_id="1014159" ref_url="https://bugzilla.suse.com/1014159" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9848" ref_url="https://www.suse.com/security/cve/CVE-2014-9848/" source="CVE"/>
		<reference ref_id="CVE-2016-8707" ref_url="https://www.suse.com/security/cve/CVE-2016-8707/" source="CVE"/>
		<reference ref_id="CVE-2016-8866" ref_url="https://www.suse.com/security/cve/CVE-2016-8866/" source="CVE"/>
		<reference ref_id="CVE-2016-9556" ref_url="https://www.suse.com/security/cve/CVE-2016-9556/" source="CVE"/>
		<reference ref_id="CVE-2016-9559" ref_url="https://www.suse.com/security/cve/CVE-2016-9559/" source="CVE"/>
		<reference ref_id="CVE-2016-9773" ref_url="https://www.suse.com/security/cve/CVE-2016-9773/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00093.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

  * CVE-2016-9556 Possible Heap-overflow found by fuzzing [bsc#1011130]
  * CVE-2016-9559 Possible Null pointer access found by fuzzing [bsc#1011136]
  * CVE-2016-8707 Possible code execution in Tiff conver utility [bsc#1014159]
  * CVE-2016-8866 Memory allocation failure in AcquireMagickMemory could lead to Heap overflow [bsc#1009318]
  * CVE-2016-9559 Possible Null pointer access found by fuzzing [bsc#1011136]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-23"/>
	<updated date="2016-12-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009318">SUSE bug 1009318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011130">SUSE bug 1011130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011136">SUSE bug 1011136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013376">SUSE bug 1013376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014159">SUSE bug 1014159</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9848/">CVE-2014-9848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8707/">CVE-2016-8707</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8866/">CVE-2016-8866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9556/">CVE-2016-9556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9559/">CVE-2016-9559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9773/">CVE-2016-9773</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516767" comment="ImageMagick-6.8.8.1-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516768" comment="libMagick++-6_Q16-3-6.8.8.1-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516769" comment="libMagickCore-6_Q16-1-6.8.8.1-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516770" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516771" comment="libMagickWand-6_Q16-1-6.8.8.1-54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77846" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1005091" ref_url="https://bugzilla.suse.com/1005091" source="BUGZILLA"/>
		<reference ref_id="1012677" ref_url="https://bugzilla.suse.com/1012677" source="BUGZILLA"/>
		<reference ref_id="995964" ref_url="https://bugzilla.suse.com/995964" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7098" ref_url="https://www.suse.com/security/cve/CVE-2016-7098/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002523.html" source="SUSE-SU"/>
		<description>

This update for wget fixes the following issues:

Security issues fixed:
- CVE-2016-7098: Fixed a potential race condition by creating files with .tmp ext
  and making them accessible to the current user only. (bsc#995964)

Non security issues fixed:
- bsc#1005091: Don't call xfree() on string returned by usr_error()  
- bsc#1012677: Add support for enforcing TLSv1.1 and TLSv1.2 (TLS 1.2 support was already present, but it was not enforcable).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-23"/>
	<updated date="2016-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005091">SUSE bug 1005091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012677">SUSE bug 1012677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995964">SUSE bug 995964</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7098/">CVE-2016-7098</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516772" comment="wget-1.14-17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77847" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="983273" ref_url="https://bugzilla.suse.com/983273" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8899" ref_url="https://www.suse.com/security/cve/CVE-2015-8899/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00094.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2015-8899: Denial of service between local and remote dns entries (bsc#983273)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-23"/>
	<updated date="2016-12-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/983273">SUSE bug 983273</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8899/">CVE-2015-8899</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516773" comment="dnsmasq-2.71-13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77848" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1002414" ref_url="https://bugzilla.suse.com/1002414" source="BUGZILLA"/>
		<reference ref_id="1007739" ref_url="https://bugzilla.suse.com/1007739" source="BUGZILLA"/>
		<reference ref_id="1007740" ref_url="https://bugzilla.suse.com/1007740" source="BUGZILLA"/>
		<reference ref_id="1007741" ref_url="https://bugzilla.suse.com/1007741" source="BUGZILLA"/>
		<reference ref_id="1007742" ref_url="https://bugzilla.suse.com/1007742" source="BUGZILLA"/>
		<reference ref_id="1007743" ref_url="https://bugzilla.suse.com/1007743" source="BUGZILLA"/>
		<reference ref_id="1007744" ref_url="https://bugzilla.suse.com/1007744" source="BUGZILLA"/>
		<reference ref_id="1007747" ref_url="https://bugzilla.suse.com/1007747" source="BUGZILLA"/>
		<reference ref_id="1014543" ref_url="https://bugzilla.suse.com/1014543" source="BUGZILLA"/>
		<reference ref_id="1014975" ref_url="https://bugzilla.suse.com/1014975" source="BUGZILLA"/>
		<reference ref_id="999817" ref_url="https://bugzilla.suse.com/999817" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7445" ref_url="https://www.suse.com/security/cve/CVE-2016-7445/" source="CVE"/>
		<reference ref_id="CVE-2016-8332" ref_url="https://www.suse.com/security/cve/CVE-2016-8332/" source="CVE"/>
		<reference ref_id="CVE-2016-9112" ref_url="https://www.suse.com/security/cve/CVE-2016-9112/" source="CVE"/>
		<reference ref_id="CVE-2016-9113" ref_url="https://www.suse.com/security/cve/CVE-2016-9113/" source="CVE"/>
		<reference ref_id="CVE-2016-9114" ref_url="https://www.suse.com/security/cve/CVE-2016-9114/" source="CVE"/>
		<reference ref_id="CVE-2016-9115" ref_url="https://www.suse.com/security/cve/CVE-2016-9115/" source="CVE"/>
		<reference ref_id="CVE-2016-9116" ref_url="https://www.suse.com/security/cve/CVE-2016-9116/" source="CVE"/>
		<reference ref_id="CVE-2016-9117" ref_url="https://www.suse.com/security/cve/CVE-2016-9117/" source="CVE"/>
		<reference ref_id="CVE-2016-9118" ref_url="https://www.suse.com/security/cve/CVE-2016-9118/" source="CVE"/>
		<reference ref_id="CVE-2016-9572" ref_url="https://www.suse.com/security/cve/CVE-2016-9572/" source="CVE"/>
		<reference ref_id="CVE-2016-9573" ref_url="https://www.suse.com/security/cve/CVE-2016-9573/" source="CVE"/>
		<reference ref_id="CVE-2016-9580" ref_url="https://www.suse.com/security/cve/CVE-2016-9580/" source="CVE"/>
		<reference ref_id="CVE-2016-9581" ref_url="https://www.suse.com/security/cve/CVE-2016-9581/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00095.html" source="SUSE-SU"/>
		<description>

This update for openjpeg2 fixes the following issues:

* CVE-2016-9114: NULL Pointer Access in function imagetopnm of convert.c:1943(jp2) could lead to crash [bsc#1007740]
* CVE-2016-9115: Heap Buffer Overflow in function imagetotga of convert.c(jp2) [bsc#1007741]
* CVE-2016-9580, CVE-2016-9581: Possible Heap buffer overflow via integer overflow and infite loop [bsc#1014975]
* CVE-2016-9117: NULL Pointer Access in function imagetopnm of convert.c(jp2):1289 [bsc#1007743]
* CVE-2016-9118: Heap Buffer Overflow in function pnmtoimage of convert.c [bsc#1007744] 
* CVE-2016-9112: FPE(Floating Point Exception) in lib/openjp2/pi.c:523 [bsc#1007747] 
* CVE-2016-9116: NULL Pointer Access in function imagetopnm of convert.c:2226(jp2) [bsc#1007742]
* CVE-2016-9113: NULL point dereference in function imagetobmp of convertbmp.c could lead to crash [bsc#1007739] 
* CVE-2016-9572 CVE-2016-9573: Insuficient check in imagetopnm() could lead to heap buffer overflow [bsc#1014543]
* CVE-2016-8332: Malicious file in OpenJPEG JPEG2000 format  could lead to code execution [bsc#1002414] 
* CVE-2016-7445: Null pointer dereference in convert.c could lead to crash [bsc#999817] 
 
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-27"/>
	<updated date="2016-12-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1002414">SUSE bug 1002414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007740">SUSE bug 1007740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007741">SUSE bug 1007741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007742">SUSE bug 1007742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007743">SUSE bug 1007743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007747">SUSE bug 1007747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014543">SUSE bug 1014543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014975">SUSE bug 1014975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999817">SUSE bug 999817</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7445/">CVE-2016-7445</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-8332/">CVE-2016-8332</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9112/">CVE-2016-9112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9113/">CVE-2016-9113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9114/">CVE-2016-9114</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9115/">CVE-2016-9115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9116/">CVE-2016-9116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9117/">CVE-2016-9117</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9118/">CVE-2016-9118</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9572/">CVE-2016-9572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9573/">CVE-2016-9573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9580/">CVE-2016-9580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9581/">CVE-2016-9581</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517548" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77849" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1009085" ref_url="https://bugzilla.suse.com/1009085" source="BUGZILLA"/>
		<reference ref_id="1014437" ref_url="https://bugzilla.suse.com/1014437" source="BUGZILLA"/>
		<reference ref_id="1014441" ref_url="https://bugzilla.suse.com/1014441" source="BUGZILLA"/>
		<reference ref_id="1014442" ref_url="https://bugzilla.suse.com/1014442" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2123" ref_url="https://www.suse.com/security/cve/CVE-2016-2123/" source="CVE"/>
		<reference ref_id="CVE-2016-2125" ref_url="https://www.suse.com/security/cve/CVE-2016-2125/" source="CVE"/>
		<reference ref_id="CVE-2016-2126" ref_url="https://www.suse.com/security/cve/CVE-2016-2126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002526.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issues:

Security issues fixed:

- CVE-2016-2125: Don't send delegated credentials to all servers. (bsc#1014441).
- CVE-2016-2126: Denial of service due to a client triggered crash in the winbindd
  parent process. (bsc#1014442).
- CVE-2016-2123: Heap-based Buffer Overflow Remote Code Execution Vulnerability. (bsc#1014437).
  This component is not built into our packages, so we are not affected.

Non security issues fixed:

- s3/client: obey 'disable netbios' smb.conf param, don't connect via NBT port; (bsc#1009085)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-27"/>
	<updated date="2016-12-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009085">SUSE bug 1009085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014437">SUSE bug 1014437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014441">SUSE bug 1014441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014442">SUSE bug 1014442</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2123/">CVE-2016-2123</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2125/">CVE-2016-2125</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2126/">CVE-2016-2126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517549" comment="libdcerpc-binding0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517550" comment="libdcerpc-binding0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517551" comment="libdcerpc0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517552" comment="libdcerpc0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517553" comment="libndr-krb5pac0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517554" comment="libndr-krb5pac0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517555" comment="libndr-nbt0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517556" comment="libndr-nbt0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517557" comment="libndr-standard0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517558" comment="libndr-standard0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517559" comment="libndr0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517560" comment="libndr0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517561" comment="libnetapi0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517562" comment="libnetapi0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517563" comment="libsamba-credentials0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517564" comment="libsamba-credentials0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517565" comment="libsamba-errors0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517566" comment="libsamba-errors0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517567" comment="libsamba-hostconfig0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517568" comment="libsamba-hostconfig0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517569" comment="libsamba-passdb0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517570" comment="libsamba-passdb0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517571" comment="libsamba-util0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517572" comment="libsamba-util0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517573" comment="libsamdb0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517574" comment="libsamdb0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517575" comment="libsmbclient0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517576" comment="libsmbclient0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517577" comment="libsmbconf0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517578" comment="libsmbconf0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517579" comment="libsmbldap0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517580" comment="libsmbldap0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517581" comment="libtevent-util0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517582" comment="libtevent-util0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517583" comment="libwbclient0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517584" comment="libwbclient0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517585" comment="samba-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517586" comment="samba-client-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517587" comment="samba-client-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517588" comment="samba-doc-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517589" comment="samba-libs-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517590" comment="samba-libs-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517591" comment="samba-winbind-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517592" comment="samba-winbind-32bit-4.4.2-31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77850" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1001203" ref_url="https://bugzilla.suse.com/1001203" source="BUGZILLA"/>
		<reference ref_id="1009085" ref_url="https://bugzilla.suse.com/1009085" source="BUGZILLA"/>
		<reference ref_id="1014437" ref_url="https://bugzilla.suse.com/1014437" source="BUGZILLA"/>
		<reference ref_id="1014441" ref_url="https://bugzilla.suse.com/1014441" source="BUGZILLA"/>
		<reference ref_id="1014442" ref_url="https://bugzilla.suse.com/1014442" source="BUGZILLA"/>
		<reference ref_id="975299" ref_url="https://bugzilla.suse.com/975299" source="BUGZILLA"/>
		<reference ref_id="986675" ref_url="https://bugzilla.suse.com/986675" source="BUGZILLA"/>
		<reference ref_id="991564" ref_url="https://bugzilla.suse.com/991564" source="BUGZILLA"/>
		<reference ref_id="994500" ref_url="https://bugzilla.suse.com/994500" source="BUGZILLA"/>
		<reference ref_id="997833" ref_url="https://bugzilla.suse.com/997833" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2123" ref_url="https://www.suse.com/security/cve/CVE-2016-2123/" source="CVE"/>
		<reference ref_id="CVE-2016-2125" ref_url="https://www.suse.com/security/cve/CVE-2016-2125/" source="CVE"/>
		<reference ref_id="CVE-2016-2126" ref_url="https://www.suse.com/security/cve/CVE-2016-2126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002527.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issues:

Security issues fixed:

- CVE-2016-2125: Don't send delegated credentials to all servers. (bsc#1014441).
- CVE-2016-2126: Denial of service due to a client triggered crash in the winbindd
  parent process. (bsc#1014442).
- CVE-2016-2123: Heap-based Buffer Overflow Remote Code Execution Vulnerability. (bsc#1014437).
  The component affected is not built in our packages.

Non security issues fixed:

- s3/client: obey 'disable netbios' smb.conf param, don't connect via NBT port; (bsc#1009085)
- Add doc changes for net ads --no-dns-updates switch; (bsc#991564)
- Include vfstest in samba-test; (bsc#1001203).
- s3/winbindd: using default domain with user@domain.com format fails (bsc#997833).
- Fix illegal memory access after memory has been deleted (bsc#975299).
- Fix bug in tevent poll backend causing winbind to loop tightly (bsc#994500).
- Various fixes for spnego/ntlm (bsc#986675).		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-27"/>
	<updated date="2016-12-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1001203">SUSE bug 1001203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009085">SUSE bug 1009085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014437">SUSE bug 1014437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014441">SUSE bug 1014441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014442">SUSE bug 1014442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975299">SUSE bug 975299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986675">SUSE bug 986675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991564">SUSE bug 991564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994500">SUSE bug 994500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997833">SUSE bug 997833</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2123/">CVE-2016-2123</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2125/">CVE-2016-2125</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2126/">CVE-2016-2126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517593" comment="libdcerpc-atsvc0-4.2.4-28.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77851" version="1" class="patch">
	<metadata>
		<title>Security update for libcares2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1007728" ref_url="https://bugzilla.suse.com/1007728" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5180" ref_url="https://www.suse.com/security/cve/CVE-2016-5180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002529.html" source="SUSE-SU"/>
		<description>

This update for libcares2 fixes the following issues:

- Add patch to fix single byte out of buffer write
  (CVE-2016-5180, bsc#1007728)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-29"/>
	<updated date="2016-12-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1007728">SUSE bug 1007728</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5180/">CVE-2016-5180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516824" comment="libcares2-1.9.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516825" comment="libcares2-32bit-1.9.1-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77852" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-bad (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1010829" ref_url="https://bugzilla.suse.com/1010829" source="BUGZILLA"/>
		<reference ref_id="1013659" ref_url="https://bugzilla.suse.com/1013659" source="BUGZILLA"/>
		<reference ref_id="1013678" ref_url="https://bugzilla.suse.com/1013678" source="BUGZILLA"/>
		<reference ref_id="1013680" ref_url="https://bugzilla.suse.com/1013680" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9445" ref_url="https://www.suse.com/security/cve/CVE-2016-9445/" source="CVE"/>
		<reference ref_id="CVE-2016-9446" ref_url="https://www.suse.com/security/cve/CVE-2016-9446/" source="CVE"/>
		<reference ref_id="CVE-2016-9809" ref_url="https://www.suse.com/security/cve/CVE-2016-9809/" source="CVE"/>
		<reference ref_id="CVE-2016-9812" ref_url="https://www.suse.com/security/cve/CVE-2016-9812/" source="CVE"/>
		<reference ref_id="CVE-2016-9813" ref_url="https://www.suse.com/security/cve/CVE-2016-9813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3297-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00098.html" source="SUSE-SU"/>
		<description>

This update for gstreamer-plugins-bad fixes the following issues:

- CVE-2016-9809: Malicious mkv/h264 file could cause an off by one out of bounds read and lead to crash (bsc#1013659)
- CVE-2016-9812: Malicious mpeg file could cause invalid a null pointer access and lead to crash (bsc#1013678)
- CVE-2016-9813: Malicious mpegts file could cause invalid a null pointer access and lead to crash (bsc#1013680)
- CVE-2016-9445, CVE-2016-9446: Check an integer overflow and initialize a buffer in vmncdec (bsc#1010829)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-29"/>
	<updated date="2016-12-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010829">SUSE bug 1010829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013659">SUSE bug 1013659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013678">SUSE bug 1013678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013680">SUSE bug 1013680</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9445/">CVE-2016-9445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9446/">CVE-2016-9446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9809/">CVE-2016-9809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9812/">CVE-2016-9812</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9813/">CVE-2016-9813</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516830" comment="libgstegl-1_0-0-1.2.4-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77853" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-bad (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1010829" ref_url="https://bugzilla.suse.com/1010829" source="BUGZILLA"/>
		<reference ref_id="1013659" ref_url="https://bugzilla.suse.com/1013659" source="BUGZILLA"/>
		<reference ref_id="1013678" ref_url="https://bugzilla.suse.com/1013678" source="BUGZILLA"/>
		<reference ref_id="1013680" ref_url="https://bugzilla.suse.com/1013680" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9445" ref_url="https://www.suse.com/security/cve/CVE-2016-9445/" source="CVE"/>
		<reference ref_id="CVE-2016-9446" ref_url="https://www.suse.com/security/cve/CVE-2016-9446/" source="CVE"/>
		<reference ref_id="CVE-2016-9809" ref_url="https://www.suse.com/security/cve/CVE-2016-9809/" source="CVE"/>
		<reference ref_id="CVE-2016-9812" ref_url="https://www.suse.com/security/cve/CVE-2016-9812/" source="CVE"/>
		<reference ref_id="CVE-2016-9813" ref_url="https://www.suse.com/security/cve/CVE-2016-9813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002532.html" source="SUSE-SU"/>
		<description>

This update for gstreamer-plugins-bad fixes the following security issues,
which would allow attackers able to submit media files for indexing to cause
code execution or crashes:

- Check an integer overflow (CVE-2016-9445) and initialize a buffer
  (CVE-2016-9446) in vmncdec. (bsc#1010829)
- CVE-2016-9809: Ensure codec_data has the right size when reading number of SPS (bsc#1013659).
- CVE-2016-9812: Add more section size checks (bsc#1013678).
- CVE-2016-9813: fix PAT parsing (bsc#1013680).

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-29"/>
	<updated date="2016-12-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010829">SUSE bug 1010829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013659">SUSE bug 1013659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013678">SUSE bug 1013678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013680">SUSE bug 1013680</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9445/">CVE-2016-9445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9446/">CVE-2016-9446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9809/">CVE-2016-9809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9812/">CVE-2016-9812</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9813/">CVE-2016-9813</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517594" comment="gstreamer-plugins-bad-1.8.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517595" comment="gstreamer-plugins-bad-lang-1.8.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517596" comment="libgstadaptivedemux-1_0-0-1.8.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517597" comment="libgstbadaudio-1_0-0-1.8.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517598" comment="libgstbadbase-1_0-0-1.8.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517599" comment="libgstbadvideo-1_0-0-1.8.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517600" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517601" comment="libgstcodecparsers-1_0-0-1.8.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517602" comment="libgstgl-1_0-0-1.8.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517603" comment="libgstmpegts-1_0-0-1.8.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517604" comment="libgstphotography-1_0-0-1.8.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517605" comment="libgsturidownloader-1_0-0-1.8.3-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77854" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1007280" ref_url="https://bugzilla.suse.com/1007280" source="BUGZILLA"/>
		<reference ref_id="1010161" ref_url="https://bugzilla.suse.com/1010161" source="BUGZILLA"/>
		<reference ref_id="1010163" ref_url="https://bugzilla.suse.com/1010163" source="BUGZILLA"/>
		<reference ref_id="1011103" ref_url="https://bugzilla.suse.com/1011103" source="BUGZILLA"/>
		<reference ref_id="1011107" ref_url="https://bugzilla.suse.com/1011107" source="BUGZILLA"/>
		<reference ref_id="914890" ref_url="https://bugzilla.suse.com/914890" source="BUGZILLA"/>
		<reference ref_id="974449" ref_url="https://bugzilla.suse.com/974449" source="BUGZILLA"/>
		<reference ref_id="974840" ref_url="https://bugzilla.suse.com/974840" source="BUGZILLA"/>
		<reference ref_id="984813" ref_url="https://bugzilla.suse.com/984813" source="BUGZILLA"/>
		<reference ref_id="984815" ref_url="https://bugzilla.suse.com/984815" source="BUGZILLA"/>
		<reference ref_id="987351" ref_url="https://bugzilla.suse.com/987351" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127/" source="CVE"/>
		<reference ref_id="CVE-2016-3622" ref_url="https://www.suse.com/security/cve/CVE-2016-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-3658" ref_url="https://www.suse.com/security/cve/CVE-2016-3658/" source="CVE"/>
		<reference ref_id="CVE-2016-5321" ref_url="https://www.suse.com/security/cve/CVE-2016-5321/" source="CVE"/>
		<reference ref_id="CVE-2016-5323" ref_url="https://www.suse.com/security/cve/CVE-2016-5323/" source="CVE"/>
		<reference ref_id="CVE-2016-5652" ref_url="https://www.suse.com/security/cve/CVE-2016-5652/" source="CVE"/>
		<reference ref_id="CVE-2016-5875" ref_url="https://www.suse.com/security/cve/CVE-2016-5875/" source="CVE"/>
		<reference ref_id="CVE-2016-9273" ref_url="https://www.suse.com/security/cve/CVE-2016-9273/" source="CVE"/>
		<reference ref_id="CVE-2016-9297" ref_url="https://www.suse.com/security/cve/CVE-2016-9297/" source="CVE"/>
		<reference ref_id="CVE-2016-9448" ref_url="https://www.suse.com/security/cve/CVE-2016-9448/" source="CVE"/>
		<reference ref_id="CVE-2016-9453" ref_url="https://www.suse.com/security/cve/CVE-2016-9453/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002537.html" source="SUSE-SU"/>
		<description>

The tiff library and tools were updated to version 4.0.7 fixing various bug and security issues.

- CVE-2014-8127: out-of-bounds read with malformed TIFF image in multiple tools [bnc#914890]
- CVE-2016-9297: tif_dirread.c read outside buffer in _TIFFPrintField() [bnc#1010161]
- CVE-2016-3658: Illegal read in TIFFWriteDirectoryTagLongLong8Array function in tiffset / tif_dirwrite.c [bnc#974840]
- CVE-2016-9273: heap overflow [bnc#1010163]
- CVE-2016-3622: divide By Zero in the tiff2rgba tool [bnc#974449]
- CVE-2016-5652: tiff2pdf JPEG Compression Tables Heap Buffer Overflow [bnc#1007280]
- CVE-2016-9453: out-of-bounds Write memcpy and less bound check in tiff2pdf [bnc#1011107]
- CVE-2016-5875: heap-based buffer overflow when using the PixarLog compressionformat [bnc#987351]
- CVE-2016-9448: regression introduced by fixing CVE-2016-9297 [bnc#1011103]
- CVE-2016-5321: out-of-bounds read in tiffcrop /  DumpModeDecode() function [bnc#984813]
- CVE-2016-5323: Divide-by-zero in _TIFFFax3fillruns() function (null ptr dereference?) [bnc#984815]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-29"/>
	<updated date="2016-12-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007280">SUSE bug 1007280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010161">SUSE bug 1010161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010163">SUSE bug 1010163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011103">SUSE bug 1011103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011107">SUSE bug 1011107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974449">SUSE bug 974449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974840">SUSE bug 974840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984813">SUSE bug 984813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984815">SUSE bug 984815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987351">SUSE bug 987351</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3622/">CVE-2016-3622</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3658/">CVE-2016-3658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5321/">CVE-2016-5321</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5323/">CVE-2016-5323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5652/">CVE-2016-5652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5875/">CVE-2016-5875</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9273/">CVE-2016-9273</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9297/">CVE-2016-9297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9448/">CVE-2016-9448</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9453/">CVE-2016-9453</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009516833" comment="libtiff5-4.0.7-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516834" comment="libtiff5-32bit-4.0.7-35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77855" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-good (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1012102" ref_url="https://bugzilla.suse.com/1012102" source="BUGZILLA"/>
		<reference ref_id="1012103" ref_url="https://bugzilla.suse.com/1012103" source="BUGZILLA"/>
		<reference ref_id="1012104" ref_url="https://bugzilla.suse.com/1012104" source="BUGZILLA"/>
		<reference ref_id="1013653" ref_url="https://bugzilla.suse.com/1013653" source="BUGZILLA"/>
		<reference ref_id="1013655" ref_url="https://bugzilla.suse.com/1013655" source="BUGZILLA"/>
		<reference ref_id="1013663" ref_url="https://bugzilla.suse.com/1013663" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9634" ref_url="https://www.suse.com/security/cve/CVE-2016-9634/" source="CVE"/>
		<reference ref_id="CVE-2016-9635" ref_url="https://www.suse.com/security/cve/CVE-2016-9635/" source="CVE"/>
		<reference ref_id="CVE-2016-9636" ref_url="https://www.suse.com/security/cve/CVE-2016-9636/" source="CVE"/>
		<reference ref_id="CVE-2016-9807" ref_url="https://www.suse.com/security/cve/CVE-2016-9807/" source="CVE"/>
		<reference ref_id="CVE-2016-9808" ref_url="https://www.suse.com/security/cve/CVE-2016-9808/" source="CVE"/>
		<reference ref_id="CVE-2016-9810" ref_url="https://www.suse.com/security/cve/CVE-2016-9810/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00099.html" source="SUSE-SU"/>
		<description>

This update for gstreamer-plugins-good fixes the following security issues:

- CVE-2016-9807: Flic decoder invalid read could lead to crash. (bsc#1013655)
- CVE-2016-9634: Flic out-of-bounds write could lead to code execution. (bsc#1012102)
- CVE-2016-9635: Flic out-of-bounds write could lead to code execution. (bsc#1012103)
- CVE-2016-9635: Flic out-of-bounds write could lead to code execution. (bsc#1012104)
- CVE-2016-9808: A maliciously crafted flic file can still cause invalid memory accesses. (bsc#1013653)
- CVE-2016-9810: A maliciously crafted flic file can still cause invalid memory accesses. (bsc#1013663)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-30"/>
	<updated date="2016-12-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012102">SUSE bug 1012102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012103">SUSE bug 1012103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012104">SUSE bug 1012104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013653">SUSE bug 1013653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013655">SUSE bug 1013655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013663">SUSE bug 1013663</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9634/">CVE-2016-9634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9635/">CVE-2016-9635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9636/">CVE-2016-9636</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9807/">CVE-2016-9807</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9808/">CVE-2016-9808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9810/">CVE-2016-9810</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517606" comment="gstreamer-plugins-good-1.8.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517607" comment="gstreamer-plugins-good-lang-1.8.3-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77856" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1034560" ref_url="https://bugzilla.suse.com/1034560" source="BUGZILLA"/>
		<reference ref_id="1042146" ref_url="https://bugzilla.suse.com/1042146" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000368" ref_url="https://www.suse.com/security/cve/CVE-2017-1000368/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1626-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00021.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following security issue:

- CVE-2017-1000368: A follow-up fix to CVE-2017-1000367, the Linux process name could also contain a
  newline, which could be used to trick sudo to read/write to an
  arbitrary open terminal. (bsc#1042146)

Also the following non security bug was fixed:

- Link the 'system_group' plugin with sudo_util library to resolve the missing sudo_dso_findsym symbol (bsc#1034560)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-20"/>
	<updated date="2017-06-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1034560">SUSE bug 1034560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042146">SUSE bug 1042146</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000368/">CVE-2017-1000368</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517608" comment="sudo-1.8.10p3-10.10.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77857" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1044947" ref_url="https://bugzilla.suse.com/1044947" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7508" ref_url="https://www.suse.com/security/cve/CVE-2017-7508/" source="CVE"/>
		<reference ref_id="CVE-2017-7520" ref_url="https://www.suse.com/security/cve/CVE-2017-7520/" source="CVE"/>
		<reference ref_id="CVE-2017-7521" ref_url="https://www.suse.com/security/cve/CVE-2017-7521/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1635-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00027.html" source="SUSE-SU"/>
		<description>
This update for openvpn fixes the following issues:

- Some parts of the certificate-parsing code did not always clear all allocated
  memory. This would have allowed clients to leak a few bytes of memory for
  each connection attempt, thereby facilitating a (quite inefficient) DoS
  attack on the server. [bsc#1044947, CVE-2017-7521]

- The ASN1 parsing code contained a bug that could have resulted in some
  buffers being free()d twice, and this issue could have potentially been
  triggered remotely by a VPN peer. [bsc#1044947, CVE-2017-7521]

- If clients used a HTTP proxy with NTLM authentication, a man-in-the-middle
  attacker between client and proxy could cause the client to crash or disclose
  at most 96 bytes of stack memory. The disclosed stack memory was likely to
  contain the proxy password. If the proxy password had not been reused, this
  was unlikely to compromise the security of the OpenVPN tunnel itself. Clients
  who did not use the --http-proxy option with ntlm2 authentication were not
  affected. [bsc#1044947, CVE-2017-7520]

- It was possible to trigger an assertion by sending a malformed IPv6 packet.
  That issue could have been abused to remotely shutdown an openvpn server or
  client, if IPv6 and --mssfix were enabled and if the IPv6 networks used
  inside the VPN were known. [bsc#1044947, CVE-2017-7508]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-21"/>
	<updated date="2017-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1044947">SUSE bug 1044947</bugzilla>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7508/">CVE-2017-7508</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7520/">CVE-2017-7520</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7521/">CVE-2017-7521</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517609" comment="openvpn-2.3.8-16.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77858" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1013669" ref_url="https://bugzilla.suse.com/1013669" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9811" ref_url="https://www.suse.com/security/cve/CVE-2016-9811/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002569.html" source="SUSE-SU"/>
		<description>

This update for gstreamer-plugins-base fixes the following issues:

* CVE-2016-9811: Malicious file could could cause an invalid read leading to crash [bsc#1013669]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-19"/>
	<updated date="2017-01-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013669">SUSE bug 1013669</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9811/">CVE-2016-9811</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517610" comment="gstreamer-plugins-base-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517611" comment="gstreamer-plugins-base-lang-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517612" comment="libgstallocators-1_0-0-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517613" comment="libgstapp-1_0-0-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517614" comment="libgstapp-1_0-0-32bit-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517615" comment="libgstaudio-1_0-0-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517616" comment="libgstaudio-1_0-0-32bit-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517617" comment="libgstfft-1_0-0-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517618" comment="libgstfft-1_0-0-32bit-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517619" comment="libgstpbutils-1_0-0-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517620" comment="libgstpbutils-1_0-0-32bit-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517621" comment="libgstriff-1_0-0-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517622" comment="libgstrtp-1_0-0-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517623" comment="libgstrtsp-1_0-0-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517624" comment="libgstsdp-1_0-0-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517625" comment="libgsttag-1_0-0-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517626" comment="libgsttag-1_0-0-32bit-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517627" comment="libgstvideo-1_0-0-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517628" comment="libgstvideo-1_0-0-32bit-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517629" comment="typelib-1_0-GstAudio-1_0-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517630" comment="typelib-1_0-GstPbutils-1_0-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517631" comment="typelib-1_0-GstTag-1_0-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517632" comment="typelib-1_0-GstVideo-1_0-1.8.3-9.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77859" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1042298" ref_url="https://bugzilla.suse.com/1042298" source="BUGZILLA"/>
		<reference ref_id="1042299" ref_url="https://bugzilla.suse.com/1042299" source="BUGZILLA"/>
		<reference ref_id="1042300" ref_url="https://bugzilla.suse.com/1042300" source="BUGZILLA"/>
		<reference ref_id="1042301" ref_url="https://bugzilla.suse.com/1042301" source="BUGZILLA"/>
		<reference ref_id="1042302" ref_url="https://bugzilla.suse.com/1042302" source="BUGZILLA"/>
		<reference ref_id="1042303" ref_url="https://bugzilla.suse.com/1042303" source="BUGZILLA"/>
		<reference ref_id="1042304" ref_url="https://bugzilla.suse.com/1042304" source="BUGZILLA"/>
		<reference ref_id="1042305" ref_url="https://bugzilla.suse.com/1042305" source="BUGZILLA"/>
		<reference ref_id="1042306" ref_url="https://bugzilla.suse.com/1042306" source="BUGZILLA"/>
		<reference ref_id="1042307" ref_url="https://bugzilla.suse.com/1042307" source="BUGZILLA"/>
		<reference ref_id="1042308" ref_url="https://bugzilla.suse.com/1042308" source="BUGZILLA"/>
		<reference ref_id="1042309" ref_url="https://bugzilla.suse.com/1042309" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9343" ref_url="https://www.suse.com/security/cve/CVE-2017-9343/" source="CVE"/>
		<reference ref_id="CVE-2017-9344" ref_url="https://www.suse.com/security/cve/CVE-2017-9344/" source="CVE"/>
		<reference ref_id="CVE-2017-9345" ref_url="https://www.suse.com/security/cve/CVE-2017-9345/" source="CVE"/>
		<reference ref_id="CVE-2017-9346" ref_url="https://www.suse.com/security/cve/CVE-2017-9346/" source="CVE"/>
		<reference ref_id="CVE-2017-9347" ref_url="https://www.suse.com/security/cve/CVE-2017-9347/" source="CVE"/>
		<reference ref_id="CVE-2017-9348" ref_url="https://www.suse.com/security/cve/CVE-2017-9348/" source="CVE"/>
		<reference ref_id="CVE-2017-9349" ref_url="https://www.suse.com/security/cve/CVE-2017-9349/" source="CVE"/>
		<reference ref_id="CVE-2017-9350" ref_url="https://www.suse.com/security/cve/CVE-2017-9350/" source="CVE"/>
		<reference ref_id="CVE-2017-9351" ref_url="https://www.suse.com/security/cve/CVE-2017-9351/" source="CVE"/>
		<reference ref_id="CVE-2017-9352" ref_url="https://www.suse.com/security/cve/CVE-2017-9352/" source="CVE"/>
		<reference ref_id="CVE-2017-9353" ref_url="https://www.suse.com/security/cve/CVE-2017-9353/" source="CVE"/>
		<reference ref_id="CVE-2017-9354" ref_url="https://www.suse.com/security/cve/CVE-2017-9354/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002974.html" source="SUSE-SU"/>
		<description>
The network debugging tool wireshark was updated to version 2.2.7 to fix the following issues:

- CVE-2017-9352: Bazaar dissector infinite loop (wnpa-sec-2017-22) (bsc#1042304)
- CVE-2017-9348: DOF dissector read overflow (wnpa-sec-2017-23) (bsc#1042303)
- CVE-2017-9351: DHCP dissector read overflow (wnpa-sec-2017-24) (bsc#1042302)
- CVE-2017-9346: SoulSeek dissector infinite loop (wnpa-sec-2017-25) (bsc#1042301)
- CVE-2017-9345: DNS dissector infinite loop (wnpa-sec-2017-26) (bsc#1042300)
- CVE-2017-9349: DICOM dissector infinite loop (wnpa-sec-2017-27) (bsc#1042305)
- CVE-2017-9350: openSAFETY dissector memory exh.. (wnpa-sec-2017-28) (bsc#1042299)
- CVE-2017-9344: BT L2CAP dissector divide by zero (wnpa-sec-2017-29) (bsc#1042298)
- CVE-2017-9343: MSNIP dissector crash (wnpa-sec-2017-30) (bsc#1042309)
- CVE-2017-9347: ROS dissector crash (wnpa-sec-2017-31) (bsc#1042308)
- CVE-2017-9354: RGMP dissector crash (wnpa-sec-2017-32) (bsc#1042307)
- CVE-2017-9353: wireshark: IPv6 dissector crash (wnpa-sec-2017-33) (bsc#1042306)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-23"/>
	<updated date="2017-06-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042298">SUSE bug 1042298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042299">SUSE bug 1042299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042300">SUSE bug 1042300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042301">SUSE bug 1042301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042302">SUSE bug 1042302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042303">SUSE bug 1042303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042304">SUSE bug 1042304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042305">SUSE bug 1042305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042306">SUSE bug 1042306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042307">SUSE bug 1042307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042308">SUSE bug 1042308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042309">SUSE bug 1042309</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9343/">CVE-2017-9343</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9344/">CVE-2017-9344</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9345/">CVE-2017-9345</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9346/">CVE-2017-9346</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9347/">CVE-2017-9347</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9348/">CVE-2017-9348</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9349/">CVE-2017-9349</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9350/">CVE-2017-9350</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9351/">CVE-2017-9351</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9352/">CVE-2017-9352</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9353/">CVE-2017-9353</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9354/">CVE-2017-9354</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517633" comment="libwireshark8-2.2.7-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517634" comment="libwiretap6-2.2.7-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517635" comment="libwscodecs1-2.2.7-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517636" comment="libwsutil7-2.2.7-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517637" comment="wireshark-2.2.7-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517638" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77860" version="1" class="patch">
	<metadata>
		<title>Security update for cairo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1007255" ref_url="https://bugzilla.suse.com/1007255" source="BUGZILLA"/>
		<reference ref_id="1036789" ref_url="https://bugzilla.suse.com/1036789" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9082" ref_url="https://www.suse.com/security/cve/CVE-2016-9082/" source="CVE"/>
		<reference ref_id="CVE-2017-7475" ref_url="https://www.suse.com/security/cve/CVE-2017-7475/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002978.html" source="SUSE-SU"/>
		<description>
This update for cairo fixes the following issues:

- CVE-2017-7475: Fixed a segfault in get_bitmap_surface due to malformed font
  (bsc#1036789).
- CVE-2016-9082: fix a segfault when using &gt;4GB images since int values were used
  for pointer operations (bsc#1007255).

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-26"/>
	<updated date="2017-06-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007255">SUSE bug 1007255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036789">SUSE bug 1036789</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9082/">CVE-2016-9082</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7475/">CVE-2017-7475</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517639" comment="libcairo-gobject2-1.15.2-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517640" comment="libcairo-gobject2-32bit-1.15.2-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517641" comment="libcairo-script-interpreter2-1.15.2-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517642" comment="libcairo2-1.15.2-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517643" comment="libcairo2-32bit-1.15.2-24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77861" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLE (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1035082" ref_url="https://bugzilla.suse.com/1035082" source="BUGZILLA"/>
		<reference ref_id="1043960" ref_url="https://bugzilla.suse.com/1043960" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10196" ref_url="https://www.suse.com/security/cve/CVE-2016-10196/" source="CVE"/>
		<reference ref_id="CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429/" source="CVE"/>
		<reference ref_id="CVE-2017-5430" ref_url="https://www.suse.com/security/cve/CVE-2017-5430/" source="CVE"/>
		<reference ref_id="CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432/" source="CVE"/>
		<reference ref_id="CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433/" source="CVE"/>
		<reference ref_id="CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434/" source="CVE"/>
		<reference ref_id="CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438/" source="CVE"/>
		<reference ref_id="CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439/" source="CVE"/>
		<reference ref_id="CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440/" source="CVE"/>
		<reference ref_id="CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441/" source="CVE"/>
		<reference ref_id="CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442/" source="CVE"/>
		<reference ref_id="CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443/" source="CVE"/>
		<reference ref_id="CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444/" source="CVE"/>
		<reference ref_id="CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445/" source="CVE"/>
		<reference ref_id="CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446/" source="CVE"/>
		<reference ref_id="CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447/" source="CVE"/>
		<reference ref_id="CVE-2017-5448" ref_url="https://www.suse.com/security/cve/CVE-2017-5448/" source="CVE"/>
		<reference ref_id="CVE-2017-5449" ref_url="https://www.suse.com/security/cve/CVE-2017-5449/" source="CVE"/>
		<reference ref_id="CVE-2017-5451" ref_url="https://www.suse.com/security/cve/CVE-2017-5451/" source="CVE"/>
		<reference ref_id="CVE-2017-5454" ref_url="https://www.suse.com/security/cve/CVE-2017-5454/" source="CVE"/>
		<reference ref_id="CVE-2017-5455" ref_url="https://www.suse.com/security/cve/CVE-2017-5455/" source="CVE"/>
		<reference ref_id="CVE-2017-5456" ref_url="https://www.suse.com/security/cve/CVE-2017-5456/" source="CVE"/>
		<reference ref_id="CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459/" source="CVE"/>
		<reference ref_id="CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460/" source="CVE"/>
		<reference ref_id="CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461/" source="CVE"/>
		<reference ref_id="CVE-2017-5462" ref_url="https://www.suse.com/security/cve/CVE-2017-5462/" source="CVE"/>
		<reference ref_id="CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464/" source="CVE"/>
		<reference ref_id="CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465/" source="CVE"/>
		<reference ref_id="CVE-2017-5466" ref_url="https://www.suse.com/security/cve/CVE-2017-5466/" source="CVE"/>
		<reference ref_id="CVE-2017-5467" ref_url="https://www.suse.com/security/cve/CVE-2017-5467/" source="CVE"/>
		<reference ref_id="CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469/" source="CVE"/>
		<reference ref_id="CVE-2017-5470" ref_url="https://www.suse.com/security/cve/CVE-2017-5470/" source="CVE"/>
		<reference ref_id="CVE-2017-5472" ref_url="https://www.suse.com/security/cve/CVE-2017-5472/" source="CVE"/>
		<reference ref_id="CVE-2017-7749" ref_url="https://www.suse.com/security/cve/CVE-2017-7749/" source="CVE"/>
		<reference ref_id="CVE-2017-7750" ref_url="https://www.suse.com/security/cve/CVE-2017-7750/" source="CVE"/>
		<reference ref_id="CVE-2017-7751" ref_url="https://www.suse.com/security/cve/CVE-2017-7751/" source="CVE"/>
		<reference ref_id="CVE-2017-7752" ref_url="https://www.suse.com/security/cve/CVE-2017-7752/" source="CVE"/>
		<reference ref_id="CVE-2017-7754" ref_url="https://www.suse.com/security/cve/CVE-2017-7754/" source="CVE"/>
		<reference ref_id="CVE-2017-7755" ref_url="https://www.suse.com/security/cve/CVE-2017-7755/" source="CVE"/>
		<reference ref_id="CVE-2017-7756" ref_url="https://www.suse.com/security/cve/CVE-2017-7756/" source="CVE"/>
		<reference ref_id="CVE-2017-7757" ref_url="https://www.suse.com/security/cve/CVE-2017-7757/" source="CVE"/>
		<reference ref_id="CVE-2017-7758" ref_url="https://www.suse.com/security/cve/CVE-2017-7758/" source="CVE"/>
		<reference ref_id="CVE-2017-7761" ref_url="https://www.suse.com/security/cve/CVE-2017-7761/" source="CVE"/>
		<reference ref_id="CVE-2017-7763" ref_url="https://www.suse.com/security/cve/CVE-2017-7763/" source="CVE"/>
		<reference ref_id="CVE-2017-7764" ref_url="https://www.suse.com/security/cve/CVE-2017-7764/" source="CVE"/>
		<reference ref_id="CVE-2017-7765" ref_url="https://www.suse.com/security/cve/CVE-2017-7765/" source="CVE"/>
		<reference ref_id="CVE-2017-7768" ref_url="https://www.suse.com/security/cve/CVE-2017-7768/" source="CVE"/>
		<reference ref_id="CVE-2017-7778" ref_url="https://www.suse.com/security/cve/CVE-2017-7778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<description>
The MozillaFirefox was updated to the new ESR 52.2 release, which fixes the following issues (bsc#1043960):

* MFSA 2017-16/CVE-2017-7758
  Out-of-bounds read in Opus encoder
* MFSA 2017-16/CVE-2017-7749
  Use-after-free during docshell reloading
* MFSA 2017-16/CVE-2017-7751
  Use-after-free with content viewer listeners
* MFSA 2017-16/CVE-2017-5472
  Use-after-free using destroyed node when regenerating trees
* MFSA 2017-16/CVE-2017-5470
  Memory safety bugs fixed in Firefox 54 and Firefox ESR 52.2
* MFSA 2017-16/CVE-2017-7752
  Use-after-free with IME input
* MFSA 2017-16/CVE-2017-7750
  Use-after-free with track elements
* MFSA 2017-16/CVE-2017-7768
  32 byte arbitrary file read through Mozilla Maintenance
  Service
* MFSA 2017-16/CVE-2017-7778
  Vulnerabilities in the Graphite 2 library
* MFSA 2017-16/CVE-2017-7754
  Out-of-bounds read in WebGL with ImageInfo object
* MFSA 2017-16/CVE-2017-7755
  Privilege escalation through Firefox Installer with same
  directory DLL files
* MFSA 2017-16/CVE-2017-7756
  Use-after-free and use-after-scope logging XHR header errors
* MFSA 2017-16/CVE-2017-7757
  Use-after-free in IndexedDB
* MFSA 2017-16/CVE-2017-7761
  File deletion and privilege escalation through Mozilla
  Maintenance Service helper.exe application
* MFSA 2017-16/CVE-2017-7763
  Mac fonts render some unicode characters as spaces
* MFSA 2017-16/CVE-2017-7765
  Mark of the Web bypass when saving executable files
* MFSA 2017-16/CVE-2017-7764
  (bmo#1364283, bmo#http://www.unicode.org/reports/tr31/tr31-26
   .html#Aspirational_Use_Scripts)
  Domain spoofing with combination of Canadian Syllabics and
  other unicode blocks

- update to Firefox ESR 52.1 (bsc#1035082)
* MFSA 2017-12/CVE-2016-10196
  Vulnerabilities in Libevent library
* MFSA 2017-12/CVE-2017-5443
  Out-of-bounds write during BinHex decoding
* MFSA 2017-12/CVE-2017-5429
  Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9, and
  Firefox ESR 52.1
* MFSA 2017-12/CVE-2017-5464
  Memory corruption with accessibility and DOM manipulation
* MFSA 2017-12/CVE-2017-5465
  Out-of-bounds read in ConvolvePixel
* MFSA 2017-12/CVE-2017-5466
  Origin confusion when reloading isolated data:text/html URL
* MFSA 2017-12/CVE-2017-5467
  Memory corruption when drawing Skia content
* MFSA 2017-12/CVE-2017-5460
  Use-after-free in frame selection
* MFSA 2017-12/CVE-2017-5461
  Out-of-bounds write in Base64 encoding in NSS
* MFSA 2017-12/CVE-2017-5448
  Out-of-bounds write in ClearKeyDecryptor
* MFSA 2017-12/CVE-2017-5449
  Crash during bidirectional unicode manipulation with
  animation
* MFSA 2017-12/CVE-2017-5446
  Out-of-bounds read when HTTP/2 DATA frames are sent with
  incorrect data
* MFSA 2017-12/CVE-2017-5447
  Out-of-bounds read during glyph processing
* MFSA 2017-12/CVE-2017-5444
  Buffer overflow while parsing application/http-index-format
  content
* MFSA 2017-12/CVE-2017-5445
  Uninitialized values used while parsing application/http-
  index-format content
* MFSA 2017-12/CVE-2017-5442
  Use-after-free during style changes
* MFSA 2017-12/CVE-2017-5469
  Potential Buffer overflow in flex-generated code
* MFSA 2017-12/CVE-2017-5440
  Use-after-free in txExecutionState destructor during XSLT
  processing
* MFSA 2017-12/CVE-2017-5441
  Use-after-free with selection during scroll events
* MFSA 2017-12/CVE-2017-5439
  Use-after-free in nsTArray Length() during XSLT processing
* MFSA 2017-12/CVE-2017-5438
  Use-after-free in nsAutoPtr during XSLT processing
* MFSA 2017-12/CVE-2017-5436
  Out-of-bounds write with malicious font in Graphite 2
* MFSA 2017-12/CVE-2017-5435
  Use-after-free during transaction processing in the editor
* MFSA 2017-12/CVE-2017-5434
  Use-after-free during focus handling
* MFSA 2017-12/CVE-2017-5433
  Use-after-free in SMIL animation functions
* MFSA 2017-12/CVE-2017-5432
  Use-after-free in text input selection
* MFSA 2017-12/CVE-2017-5430
  Memory safety bugs fixed in Firefox 53 and Firefox ESR 52.1
* MFSA 2017-12/CVE-2017-5459
  Buffer overflow in WebGL
* MFSA 2017-12/CVE-2017-5462
  DRBG flaw in NSS
* MFSA 2017-12/CVE-2017-5455
  Sandbox escape through internal feed reader APIs
* MFSA 2017-12/CVE-2017-5454
  Sandbox escape allowing file system read access through file
  picker
* MFSA 2017-12/CVE-2017-5456
  Sandbox escape allowing local file system access
* MFSA 2017-12/CVE-2017-5451
  Addressbar spoofing with onblur event

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-26"/>
	<updated date="2017-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10196/">CVE-2016-10196</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5430/">CVE-2017-5430</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5448/">CVE-2017-5448</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5449/">CVE-2017-5449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5451/">CVE-2017-5451</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5454/">CVE-2017-5454</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5455/">CVE-2017-5455</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5456/">CVE-2017-5456</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5462/">CVE-2017-5462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5466/">CVE-2017-5466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5467/">CVE-2017-5467</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5470/">CVE-2017-5470</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5472/">CVE-2017-5472</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7749/">CVE-2017-7749</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7750/">CVE-2017-7750</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7751/">CVE-2017-7751</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7752/">CVE-2017-7752</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7754/">CVE-2017-7754</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7755/">CVE-2017-7755</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7756/">CVE-2017-7756</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7757/">CVE-2017-7757</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7758/">CVE-2017-7758</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7761/">CVE-2017-7761</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7763/">CVE-2017-7763</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7764/">CVE-2017-7764</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7765/">CVE-2017-7765</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7768/">CVE-2017-7768</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7778/">CVE-2017-7778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517644" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517645" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517646" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77862" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1024989" ref_url="https://bugzilla.suse.com/1024989" source="BUGZILLA"/>
		<reference ref_id="1044337" ref_url="https://bugzilla.suse.com/1044337" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0663" ref_url="https://www.suse.com/security/cve/CVE-2017-0663/" source="CVE"/>
		<reference ref_id="CVE-2017-5969" ref_url="https://www.suse.com/security/cve/CVE-2017-5969/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002977.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

Security issues fixed:

* CVE-2017-0663: Fixed a heap buffer overflow in xmlAddID (bsc#1044337)
* CVE-2017-5969: Fixed a NULL pointer deref in xmlDumpElementContent (bsc#1024989)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-26"/>
	<updated date="2017-06-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024989">SUSE bug 1024989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044337">SUSE bug 1044337</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0663/">CVE-2017-0663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5969/">CVE-2017-5969</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517647" comment="libxml2-2-2.9.4-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517648" comment="libxml2-2-32bit-2.9.4-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517649" comment="libxml2-tools-2.9.4-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517650" comment="python-libxml2-2.9.4-42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77863" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1019649" ref_url="https://bugzilla.suse.com/1019649" source="BUGZILLA"/>
		<reference ref_id="1021803" ref_url="https://bugzilla.suse.com/1021803" source="BUGZILLA"/>
		<reference ref_id="1025029" ref_url="https://bugzilla.suse.com/1025029" source="BUGZILLA"/>
		<reference ref_id="1025035" ref_url="https://bugzilla.suse.com/1025035" source="BUGZILLA"/>
		<reference ref_id="1025084" ref_url="https://bugzilla.suse.com/1025084" source="BUGZILLA"/>
		<reference ref_id="1025985" ref_url="https://bugzilla.suse.com/1025985" source="BUGZILLA"/>
		<reference ref_id="1032509" ref_url="https://bugzilla.suse.com/1032509" source="BUGZILLA"/>
		<reference ref_id="1039042" ref_url="https://bugzilla.suse.com/1039042" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2624" ref_url="https://www.suse.com/security/cve/CVE-2017-2624/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002980.html" source="SUSE-SU"/>
		<description>

This update for xorg-x11-server provides the following fixes:

- Remove unused function with use-after-free issue. (bsc#1025035)
- Use arc4random to generate cookies. (bsc#1025084)
- Prevent timing attack against MIT cookie. (bsc#1025029, CVE-2017-2624)
- XDrawArc performance improvement. (bsc#1019649)
- Re-enable indirect GLX by default. (bsc#1039042)
- Add IndirectGLX ServerFlags option which allows users to enable or disable indirect GLX. (bsc#1032509)
- Fix dashing in GLAMOR. (bsc#1021803)
- Fix X server crash on drawing dashed lines. (bsc#1025985)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-26"/>
	<updated date="2017-06-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1019649">SUSE bug 1019649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021803">SUSE bug 1021803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025029">SUSE bug 1025029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025035">SUSE bug 1025035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025084">SUSE bug 1025084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025985">SUSE bug 1025985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032509">SUSE bug 1032509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039042">SUSE bug 1039042</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-2624/">CVE-2017-2624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517651" comment="xorg-x11-server-7.6_1.18.3-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517652" comment="xorg-x11-server-extra-7.6_1.18.3-71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77864" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1040170" ref_url="https://bugzilla.suse.com/1040170" source="BUGZILLA"/>
		<reference ref_id="1042803" ref_url="https://bugzilla.suse.com/1042803" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9083" ref_url="https://www.suse.com/security/cve/CVE-2017-9083/" source="CVE"/>
		<reference ref_id="CVE-2017-9406" ref_url="https://www.suse.com/security/cve/CVE-2017-9406/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002979.html" source="SUSE-SU"/>
		<description>
This update for poppler fixes the following issues:

- CVE-2017-9406: Fixed a memory leak that occurred while parsing invalid
  XRef attributes (bsc#1042803).
- CVE-2017-9083: Fixed a memory leak that occurred when the parser tried
  to recover from a broken input file. (bsc#1040170)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-26"/>
	<updated date="2017-06-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040170">SUSE bug 1040170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042803">SUSE bug 1042803</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9083/">CVE-2017-9083</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9406/">CVE-2017-9406</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517653" comment="libpoppler44-0.24.4-14.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77865" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1037603" ref_url="https://bugzilla.suse.com/1037603" source="BUGZILLA"/>
		<reference ref_id="1037624" ref_url="https://bugzilla.suse.com/1037624" source="BUGZILLA"/>
		<reference ref_id="1038293" ref_url="https://bugzilla.suse.com/1038293" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7484" ref_url="https://www.suse.com/security/cve/CVE-2017-7484/" source="CVE"/>
		<reference ref_id="CVE-2017-7485" ref_url="https://www.suse.com/security/cve/CVE-2017-7485/" source="CVE"/>
		<reference ref_id="CVE-2017-7486" ref_url="https://www.suse.com/security/cve/CVE-2017-7486/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002981.html" source="SUSE-SU"/>
		<description>
This update for postgresql94 to 9.4.12 fixes the following issues:

Upstream changelogs:

- https://www.postgresql.org/docs/9.4/static/release-9-4-12.html
- https://www.postgresql.org/docs/9.4/static/release-9-4-11.html
- https://www.postgresql.org/docs/9.4/static/release-9-4-10.html

Security issues fixed:

* CVE-2017-7486: Restrict visibility of
  pg_user_mappings.umoptions, to protect passwords stored as
  user mapping options. (bsc#1037624)

  Please note that manual action is needed to fix this in existing databases
  See the upstream release notes for details.
* CVE-2017-7485: recognize PGREQUIRESSL variable
  again. (bsc#1038293)
* CVE-2017-7484: Prevent exposure of statistical
  information via leaky operators. (bsc#1037603)

Changes in version 9.4.12:

* Build corruption with CREATE INDEX CONCURRENTLY
* Fixes for visibility and write-ahead-log stability

Changes in version 9.4.10:

* Fix WAL-logging of truncation of relation free space maps and
  visibility maps
* Fix incorrect creation of GIN index WAL records on big-endian
  machines
* Fix SELECT FOR UPDATE/SHARE to correctly lock tuples that have
  been updated by a subsequently-aborted transaction
* Fix EvalPlanQual rechecks involving CTE scans
* Fix improper repetition of previous results from hashed
  aggregation in a subquery

The libraries libpq and libecpg are now supplied by postgresql 9.6.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-26"/>
	<updated date="2017-06-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1037603">SUSE bug 1037603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037624">SUSE bug 1037624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038293">SUSE bug 1038293</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7484/">CVE-2017-7484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7485/">CVE-2017-7485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7486/">CVE-2017-7486</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517654" comment="postgresql94-9.4.12-20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77866" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-good (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1012102" ref_url="https://bugzilla.suse.com/1012102" source="BUGZILLA"/>
		<reference ref_id="1012103" ref_url="https://bugzilla.suse.com/1012103" source="BUGZILLA"/>
		<reference ref_id="1012104" ref_url="https://bugzilla.suse.com/1012104" source="BUGZILLA"/>
		<reference ref_id="1013653" ref_url="https://bugzilla.suse.com/1013653" source="BUGZILLA"/>
		<reference ref_id="1013655" ref_url="https://bugzilla.suse.com/1013655" source="BUGZILLA"/>
		<reference ref_id="1013663" ref_url="https://bugzilla.suse.com/1013663" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9634" ref_url="https://www.suse.com/security/cve/CVE-2016-9634/" source="CVE"/>
		<reference ref_id="CVE-2016-9635" ref_url="https://www.suse.com/security/cve/CVE-2016-9635/" source="CVE"/>
		<reference ref_id="CVE-2016-9636" ref_url="https://www.suse.com/security/cve/CVE-2016-9636/" source="CVE"/>
		<reference ref_id="CVE-2016-9807" ref_url="https://www.suse.com/security/cve/CVE-2016-9807/" source="CVE"/>
		<reference ref_id="CVE-2016-9808" ref_url="https://www.suse.com/security/cve/CVE-2016-9808/" source="CVE"/>
		<reference ref_id="CVE-2016-9810" ref_url="https://www.suse.com/security/cve/CVE-2016-9810/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00035.html" source="SUSE-SU"/>
		<description>

This update for gstreamer-0_10-plugins-good fixes the following issues:

- CVE-2016-9634: Invalid FLIC files could have caused and an out-of-bounds write (bsc#1012102)
- CVE-2016-9635: Invalid FLIC files could have caused and an out-of-bounds write (bsc#1012103)
- CVE-2016-9636: Prevent maliciously crafted flic files from causing invalid memory writes (bsc#1012104)
- CVE-2016-9807: Prevent the reading of invalid memory in flx_decode_chunks, leading to DoS (bsc#1013655)
- CVE-2016-9808: Prevent maliciously crafted flic files from causing invalid memory accesses (bsc#1013653)
- CVE-2016-9810: Invalid files can be used to extraneous unreferences, leading to invalid memory access and DoS (bsc#1013663)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-19"/>
	<updated date="2017-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012102">SUSE bug 1012102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012103">SUSE bug 1012103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012104">SUSE bug 1012104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013653">SUSE bug 1013653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013655">SUSE bug 1013655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013663">SUSE bug 1013663</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9634/">CVE-2016-9634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9635/">CVE-2016-9635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9636/">CVE-2016-9636</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9807/">CVE-2016-9807</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9808/">CVE-2016-9808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9810/">CVE-2016-9810</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517655" comment="gstreamer-0_10-plugins-good-0.10.31-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517656" comment="gstreamer-0_10-plugins-good-lang-0.10.31-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77867" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1045340" ref_url="https://bugzilla.suse.com/1045340" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000364" ref_url="https://www.suse.com/security/cve/CVE-2017-1000364/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00038.html" source="SUSE-SU"/>
		<description>
This Linux kernel update for SUSE Linux Enterprise 12 SP2 fixes the following issues:

- A previous security update to address CVE-2017-1000364 caused unintended
  side-effects in several other tools, most notably Java. These issues have
  been remedied. [bsc#1045340]
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-28"/>
	<updated date="2017-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045340">SUSE bug 1045340</bugzilla>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000364/">CVE-2017-1000364</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517657" comment="kernel-default-4.4.59-92.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517658" comment="kernel-default-devel-4.4.59-92.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517659" comment="kernel-default-extra-4.4.59-92.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517660" comment="kernel-devel-4.4.59-92.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517661" comment="kernel-macros-4.4.59-92.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517662" comment="kernel-source-4.4.59-92.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517663" comment="kernel-syms-4.4.59-92.24.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77868" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1018870" ref_url="https://bugzilla.suse.com/1018870" source="BUGZILLA"/>
		<reference ref_id="1024724" ref_url="https://bugzilla.suse.com/1024724" source="BUGZILLA"/>
		<reference ref_id="1027053" ref_url="https://bugzilla.suse.com/1027053" source="BUGZILLA"/>
		<reference ref_id="1027057" ref_url="https://bugzilla.suse.com/1027057" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5953" ref_url="https://www.suse.com/security/cve/CVE-2017-5953/" source="CVE"/>
		<reference ref_id="CVE-2017-6349" ref_url="https://www.suse.com/security/cve/CVE-2017-6349/" source="CVE"/>
		<reference ref_id="CVE-2017-6350" ref_url="https://www.suse.com/security/cve/CVE-2017-6350/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002990.html" source="SUSE-SU"/>
		<description>

This update for vim fixes the following issues:

Security issues fixed:

- CVE-2017-5953: Fixed a possible overflow with corrupted spell file (bsc#1024724)
- CVE-2017-6350: Fixed a possible overflow when reading a corrupted undo file (bsc#1027053)
- CVE-2017-6349: Fixed a possible overflow when reading a corrupted undo file (bsc#1027057)


Non security issues fixed:

- Speed up YAML syntax highlighting (bsc#1018870)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-28"/>
	<updated date="2017-06-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1018870">SUSE bug 1018870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024724">SUSE bug 1024724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027053">SUSE bug 1027053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027057">SUSE bug 1027057</bugzilla>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5953/">CVE-2017-5953</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6349/">CVE-2017-6349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6350/">CVE-2017-6350</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517664" comment="gvim-7.4.326-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517665" comment="vim-7.4.326-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517666" comment="vim-data-7.4.326-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77869" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1040662" ref_url="https://bugzilla.suse.com/1040662" source="BUGZILLA"/>
		<reference ref_id="1045490" ref_url="https://bugzilla.suse.com/1045490" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00041.html" source="SUSE-SU"/>
		<description>

This update for clamav fixes the following issues:

Security issue fixed:

- CVE-2012-6706: Fixed an arbitrary memory write in VMSF_DELTA filter in libclamunrar (bsc#1045490)

Non security issues fixed:

- Provide and obsolete clamav-nodb to trigger its removal in openSUSE Leap. (bsc#1040662)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-29"/>
	<updated date="2017-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045490">SUSE bug 1045490</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517667" comment="clamav-0.99.2-32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77870" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1046554" ref_url="https://bugzilla.suse.com/1046554" source="BUGZILLA"/>
		<reference ref_id="1046555" ref_url="https://bugzilla.suse.com/1046555" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3142" ref_url="https://www.suse.com/security/cve/CVE-2017-3142/" source="CVE"/>
		<reference ref_id="CVE-2017-3143" ref_url="https://www.suse.com/security/cve/CVE-2017-3143/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00044.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- An attacker with the ability to send and receive messages to an authoritative
  DNS server was able to circumvent TSIG authentication of AXFR requests. A
  server that relied solely on TSIG keys for protection could be manipulated
  into (1) providing an AXFR of a zone to an unauthorized recipient and (2)
  accepting bogus Notify packets. [bsc#1046554, CVE-2017-3142]

- An attacker who with the ability to send and receive messages to an
  authoritative DNS server and who had knowledge of a valid TSIG key name for
  the zone and service being targeted was able to manipulate BIND into
  accepting an unauthorized dynamic update. [bsc#1046555, CVE-2017-3143]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-29"/>
	<updated date="2017-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046554">SUSE bug 1046554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046555">SUSE bug 1046555</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3142/">CVE-2017-3142</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3143/">CVE-2017-3143</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517668" comment="bind-libs-9.9.9P1-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517669" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517670" comment="bind-utils-9.9.9P1-62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77871" version="1" class="patch">
	<metadata>
		<title>Security update for unrar (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1045315" ref_url="https://bugzilla.suse.com/1045315" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00049.html" source="SUSE-SU"/>
		<description>
This update for unrar fixes the following issues:

- CVE-2012-6706: decoding malicious RAR files could have lead to memory corruption or code execution. (bsc#1045315).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-30"/>
	<updated date="2017-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045315">SUSE bug 1045315</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517671" comment="unrar-5.0.14-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77872" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1044887" ref_url="https://bugzilla.suse.com/1044887" source="BUGZILLA"/>
		<reference ref_id="1044894" ref_url="https://bugzilla.suse.com/1044894" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7375" ref_url="https://www.suse.com/security/cve/CVE-2017-7375/" source="CVE"/>
		<reference ref_id="CVE-2017-7376" ref_url="https://www.suse.com/security/cve/CVE-2017-7376/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

Security issues fixed:

* CVE-2017-7376: Increase buffer space for port in HTTP redirect support (bsc#1044887)
* CVE-2017-7375: Prevent unwanted external entity reference [bsc#1044894, ]

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-30"/>
	<updated date="2017-06-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1044887">SUSE bug 1044887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044894">SUSE bug 1044894</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7375/">CVE-2017-7375</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7376/">CVE-2017-7376</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517672" comment="libxml2-2-2.9.4-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517673" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517674" comment="libxml2-tools-2.9.4-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517675" comment="python-libxml2-2.9.4-45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77873" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1035642" ref_url="https://bugzilla.suse.com/1035642" source="BUGZILLA"/>
		<reference ref_id="1037243" ref_url="https://bugzilla.suse.com/1037243" source="BUGZILLA"/>
		<reference ref_id="1042160" ref_url="https://bugzilla.suse.com/1042160" source="BUGZILLA"/>
		<reference ref_id="1042882" ref_url="https://bugzilla.suse.com/1042882" source="BUGZILLA"/>
		<reference ref_id="1042893" ref_url="https://bugzilla.suse.com/1042893" source="BUGZILLA"/>
		<reference ref_id="1042915" ref_url="https://bugzilla.suse.com/1042915" source="BUGZILLA"/>
		<reference ref_id="1042923" ref_url="https://bugzilla.suse.com/1042923" source="BUGZILLA"/>
		<reference ref_id="1042924" ref_url="https://bugzilla.suse.com/1042924" source="BUGZILLA"/>
		<reference ref_id="1042931" ref_url="https://bugzilla.suse.com/1042931" source="BUGZILLA"/>
		<reference ref_id="1042938" ref_url="https://bugzilla.suse.com/1042938" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-9330" ref_url="https://www.suse.com/security/cve/CVE-2017-9330/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00047.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- Page transfer might have allowed PV guest to elevate privilege (XSA-217, bsc#1042882)
- Races in the grant table unmap code allowed for informations leaks and potentially privilege escalation (XSA-218, bsc#1042893)
- Insufficient reference counts during shadow emulation allowed a malicious pair of guest to elevate their privileges to the privileges that XEN runs under (XSA-219, bsc#1042915)
- Missing NULL pointer check in event channel poll allows guests to DoS the host (XSA-221, bsc#1042924)
- Stale P2M mappings due to insufficient error checking allowed malicious guest to leak information or elevate privileges (XSA-222, bsc#1042931)
- Grant table operations mishandled reference counts allowing malicious guests to escape (XSA-224, bsc#1042938)
- CVE-2017-9330: USB OHCI Emulation in qemu allowed local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value (bsc#1042160)
- CVE-2017-8309: Memory leak in the audio/audio.c allowed remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture (bsc#1037243)
- PKRU and BND* leakage between vCPU-s might have leaked information to other guests (XSA-220, bsc#1042923)

These non-security issues were fixed:

- bsc#1027519: Included various upstream patches 
- bsc#1035642: Ensure that rpmbuild works
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-30"/>
	<updated date="2017-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035642">SUSE bug 1035642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037243">SUSE bug 1037243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042160">SUSE bug 1042160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042882">SUSE bug 1042882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042893">SUSE bug 1042893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042915">SUSE bug 1042915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042923">SUSE bug 1042923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042924">SUSE bug 1042924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042931">SUSE bug 1042931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042938">SUSE bug 1042938</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9330/">CVE-2017-9330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517676" comment="xen-4.7.2_06-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517677" comment="xen-libs-4.7.2_06-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517678" comment="xen-libs-32bit-4.7.2_06-42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77874" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1016503" ref_url="https://bugzilla.suse.com/1016503" source="BUGZILLA"/>
		<reference ref_id="1016504" ref_url="https://bugzilla.suse.com/1016504" source="BUGZILLA"/>
		<reference ref_id="1017081" ref_url="https://bugzilla.suse.com/1017081" source="BUGZILLA"/>
		<reference ref_id="1017084" ref_url="https://bugzilla.suse.com/1017084" source="BUGZILLA"/>
		<reference ref_id="1020427" ref_url="https://bugzilla.suse.com/1020427" source="BUGZILLA"/>
		<reference ref_id="1021741" ref_url="https://bugzilla.suse.com/1021741" source="BUGZILLA"/>
		<reference ref_id="1025109" ref_url="https://bugzilla.suse.com/1025109" source="BUGZILLA"/>
		<reference ref_id="1025311" ref_url="https://bugzilla.suse.com/1025311" source="BUGZILLA"/>
		<reference ref_id="1028184" ref_url="https://bugzilla.suse.com/1028184" source="BUGZILLA"/>
		<reference ref_id="1028656" ref_url="https://bugzilla.suse.com/1028656" source="BUGZILLA"/>
		<reference ref_id="1030624" ref_url="https://bugzilla.suse.com/1030624" source="BUGZILLA"/>
		<reference ref_id="1031142" ref_url="https://bugzilla.suse.com/1031142" source="BUGZILLA"/>
		<reference ref_id="1032075" ref_url="https://bugzilla.suse.com/1032075" source="BUGZILLA"/>
		<reference ref_id="1034866" ref_url="https://bugzilla.suse.com/1034866" source="BUGZILLA"/>
		<reference ref_id="1034908" ref_url="https://bugzilla.suse.com/1034908" source="BUGZILLA"/>
		<reference ref_id="1035406" ref_url="https://bugzilla.suse.com/1035406" source="BUGZILLA"/>
		<reference ref_id="1035950" ref_url="https://bugzilla.suse.com/1035950" source="BUGZILLA"/>
		<reference ref_id="1036211" ref_url="https://bugzilla.suse.com/1036211" source="BUGZILLA"/>
		<reference ref_id="1037242" ref_url="https://bugzilla.suse.com/1037242" source="BUGZILLA"/>
		<reference ref_id="1037334" ref_url="https://bugzilla.suse.com/1037334" source="BUGZILLA"/>
		<reference ref_id="1037336" ref_url="https://bugzilla.suse.com/1037336" source="BUGZILLA"/>
		<reference ref_id="1039495" ref_url="https://bugzilla.suse.com/1039495" source="BUGZILLA"/>
		<reference ref_id="1042159" ref_url="https://bugzilla.suse.com/1042159" source="BUGZILLA"/>
		<reference ref_id="1042800" ref_url="https://bugzilla.suse.com/1042800" source="BUGZILLA"/>
		<reference ref_id="1042801" ref_url="https://bugzilla.suse.com/1042801" source="BUGZILLA"/>
		<reference ref_id="1043073" ref_url="https://bugzilla.suse.com/1043073" source="BUGZILLA"/>
		<reference ref_id="1043296" ref_url="https://bugzilla.suse.com/1043296" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10028" ref_url="https://www.suse.com/security/cve/CVE-2016-10028/" source="CVE"/>
		<reference ref_id="CVE-2016-10029" ref_url="https://www.suse.com/security/cve/CVE-2016-10029/" source="CVE"/>
		<reference ref_id="CVE-2016-9602" ref_url="https://www.suse.com/security/cve/CVE-2016-9602/" source="CVE"/>
		<reference ref_id="CVE-2016-9603" ref_url="https://www.suse.com/security/cve/CVE-2016-9603/" source="CVE"/>
		<reference ref_id="CVE-2017-5579" ref_url="https://www.suse.com/security/cve/CVE-2017-5579/" source="CVE"/>
		<reference ref_id="CVE-2017-5973" ref_url="https://www.suse.com/security/cve/CVE-2017-5973/" source="CVE"/>
		<reference ref_id="CVE-2017-5987" ref_url="https://www.suse.com/security/cve/CVE-2017-5987/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-7377" ref_url="https://www.suse.com/security/cve/CVE-2017-7377/" source="CVE"/>
		<reference ref_id="CVE-2017-7471" ref_url="https://www.suse.com/security/cve/CVE-2017-7471/" source="CVE"/>
		<reference ref_id="CVE-2017-7493" ref_url="https://www.suse.com/security/cve/CVE-2017-7493/" source="CVE"/>
		<reference ref_id="CVE-2017-7718" ref_url="https://www.suse.com/security/cve/CVE-2017-7718/" source="CVE"/>
		<reference ref_id="CVE-2017-7980" ref_url="https://www.suse.com/security/cve/CVE-2017-7980/" source="CVE"/>
		<reference ref_id="CVE-2017-8086" ref_url="https://www.suse.com/security/cve/CVE-2017-8086/" source="CVE"/>
		<reference ref_id="CVE-2017-8112" ref_url="https://www.suse.com/security/cve/CVE-2017-8112/" source="CVE"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-8379" ref_url="https://www.suse.com/security/cve/CVE-2017-8379/" source="CVE"/>
		<reference ref_id="CVE-2017-8380" ref_url="https://www.suse.com/security/cve/CVE-2017-8380/" source="CVE"/>
		<reference ref_id="CVE-2017-9330" ref_url="https://www.suse.com/security/cve/CVE-2017-9330/" source="CVE"/>
		<reference ref_id="CVE-2017-9373" ref_url="https://www.suse.com/security/cve/CVE-2017-9373/" source="CVE"/>
		<reference ref_id="CVE-2017-9374" ref_url="https://www.suse.com/security/cve/CVE-2017-9374/" source="CVE"/>
		<reference ref_id="CVE-2017-9375" ref_url="https://www.suse.com/security/cve/CVE-2017-9375/" source="CVE"/>
		<reference ref_id="CVE-2017-9503" ref_url="https://www.suse.com/security/cve/CVE-2017-9503/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes several issues.

These security issues were fixed:

- CVE-2017-9330: USB OHCI Emulation in qemu allowed local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value (bsc#1042159).
- CVE-2017-8379: Memory leak in the keyboard input event handlers support allowed local guest OS privileged users to cause a denial of service (host memory consumption) by rapidly generating large keyboard events (bsc#1037334).
- CVE-2017-8309: Memory leak in the audio/audio.c allowed remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture (bsc#1037242).
- CVE-2017-7493: The VirtFS, host directory sharing via Plan 9 File System(9pfs) support, was vulnerable to an improper access control issue. It could occur while accessing virtfs metadata files in mapped-file security mode. A guest user could have used this flaw to escalate their privileges inside guest (bsc#1039495).
- CVE-2017-7377: The v9fs_create and v9fs_lcreate functions in hw/9pfs/9p.c allowed local guest OS privileged users to cause a denial of service (file descriptor or memory consumption) via vectors related to an already in-use fid (bsc#1032075).
- CVE-2017-8086: A memory leak in the v9fs_list_xattr function in hw/9pfs/9p-xattr.c allowed local guest OS privileged users to cause a denial of service (memory consumption) via vectors involving the orig_value variable (bsc#1035950).
- CVE-2017-5973: A infinite loop while doing control transfer in xhci_kick_epctx allowed privileged user inside the guest to crash the host process resulting in DoS (bsc#1025109)
- CVE-2017-5987: The sdhci_sdma_transfer_multi_blocks function in hw/sd/sdhci.c allowed local OS guest privileged users to cause a denial of service (infinite loop and QEMU process crash) via vectors involving the transfer mode register during multi block transfer (bsc#1025311).
- CVE-2017-6505: The ohci_service_ed_list function in hw/usb/hcd-ohci.c allowed local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors (bsc#1028184)
- CVE-2016-9603: A privileged user within the guest VM could have caused a heap overflow in the device model process, potentially escalating their privileges to that of the device model process (bsc#1028656)
- CVE-2017-7718: hw/display/cirrus_vga_rop.h allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions (bsc#1034908)
- CVE-2017-7980: An out-of-bounds r/w access issues in the Cirrus CLGD 54xx VGA Emulator support allowed privileged user inside guest to use this flaw to crash the Qemu process resulting in DoS or potentially execute arbitrary code on a host with privileges of Qemu process on the host (bsc#1035406)
- CVE-2017-8112: hw/scsi/vmw_pvscsi.c allowed local guest OS privileged users to cause a denial of service (infinite loop and CPU consumption) via the message ring page count (bsc#1036211).
- CVE-2017-9375: The USB xHCI controller emulator support was vulnerable to an infinite recursive call loop issue, which allowed a privileged user inside guest to crash the Qemu process resulting in DoS (bsc#1042800).
- CVE-2017-9374: Missing free of 's-&gt;ipacket', causes a host memory leak, allowing for DoS (bsc#1043073).
- CVE-2017-9373: The IDE AHCI Emulation support was vulnerable to a host memory leakage issue, which allowed a privileged user inside guest to leak host memory resulting in DoS (bsc#1042801).
- CVE-2017-8380: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to an out-of-bounds read access issue which allowed a privileged user inside guest to read host memory resulting in DoS (bsc#1037336).
- CVE-2016-9602: The VirtFS host directory sharing via Plan 9 File System(9pfs) support was vulnerable to an improper link following issue which allowed a privileged user inside guest to access host file system beyond the shared folder and potentially escalating their privileges on a host (bsc#1020427).
- CVE-2017-7471: The VirtFS host directory sharing via Plan 9 File System(9pfs) support was vulnerable to an improper access control issue which allowed a privileged user inside guest to access host file system beyond the shared folder and potentially escalating their privileges on a host (bsc#1034866).
- Fix privilege escalation in TCG mode of QEMU. This is not considered a security issue by the upstream project, but is included as additional hardening (bsc#1030624)
- Fix potential DoS in virtfs
- CVE-2016-10028: The Virtio GPU Device emulator support was vulnerable to an out of bounds memory access issue allowing a guest user to crash the Qemu process instance on a host, resulting in DoS (bsc#1017084, bsc#1016503)
- CVE-2016-10029: The Virtio GPU Device emulator support was vulnerable to an OOB read issue allowing a guest user to crash the Qemu process instance resulting in Dos (bsc#1017081, bsc#1016504)
- CVE-2017-5579: The 16550A UART serial device emulation support was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1021741)
- CVE-2017-9503: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a null pointer dereference issue which allowed a privileged user inside guest to crash the Qemu process on the host resulting in DoS (bsc#1043296).

This non-security issue was fixed:

- Enable MONITOR/MWAIT support for guests (bsc#1031142)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-04"/>
	<updated date="2017-07-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1016503">SUSE bug 1016503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016504">SUSE bug 1016504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017081">SUSE bug 1017081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017084">SUSE bug 1017084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020427">SUSE bug 1020427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021741">SUSE bug 1021741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025109">SUSE bug 1025109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025311">SUSE bug 1025311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028184">SUSE bug 1028184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028656">SUSE bug 1028656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030624">SUSE bug 1030624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031142">SUSE bug 1031142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032075">SUSE bug 1032075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034866">SUSE bug 1034866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034908">SUSE bug 1034908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035406">SUSE bug 1035406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035950">SUSE bug 1035950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036211">SUSE bug 1036211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037242">SUSE bug 1037242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037334">SUSE bug 1037334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037336">SUSE bug 1037336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039495">SUSE bug 1039495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042159">SUSE bug 1042159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042800">SUSE bug 1042800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042801">SUSE bug 1042801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043073">SUSE bug 1043073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043296">SUSE bug 1043296</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10028/">CVE-2016-10028</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10029/">CVE-2016-10029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9602/">CVE-2016-9602</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9603/">CVE-2016-9603</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5579/">CVE-2017-5579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5973/">CVE-2017-5973</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5987/">CVE-2017-5987</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7377/">CVE-2017-7377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7471/">CVE-2017-7471</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7493/">CVE-2017-7493</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7718/">CVE-2017-7718</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7980/">CVE-2017-7980</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8086/">CVE-2017-8086</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8112/">CVE-2017-8112</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8379/">CVE-2017-8379</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8380/">CVE-2017-8380</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9330/">CVE-2017-9330</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9373/">CVE-2017-9373</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9374/">CVE-2017-9374</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9375/">CVE-2017-9375</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9503/">CVE-2017-9503</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517679" comment="qemu-2.6.2-41.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517680" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517682" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517685" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77875" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1004995" ref_url="https://bugzilla.suse.com/1004995" source="BUGZILLA"/>
		<reference ref_id="1029102" ref_url="https://bugzilla.suse.com/1029102" source="BUGZILLA"/>
		<reference ref_id="1029516" ref_url="https://bugzilla.suse.com/1029516" source="BUGZILLA"/>
		<reference ref_id="1036873" ref_url="https://bugzilla.suse.com/1036873" source="BUGZILLA"/>
		<reference ref_id="1038865" ref_url="https://bugzilla.suse.com/1038865" source="BUGZILLA"/>
		<reference ref_id="1040258" ref_url="https://bugzilla.suse.com/1040258" source="BUGZILLA"/>
		<reference ref_id="1040614" ref_url="https://bugzilla.suse.com/1040614" source="BUGZILLA"/>
		<reference ref_id="1040942" ref_url="https://bugzilla.suse.com/1040942" source="BUGZILLA"/>
		<reference ref_id="1043758" ref_url="https://bugzilla.suse.com/1043758" source="BUGZILLA"/>
		<reference ref_id="982303" ref_url="https://bugzilla.suse.com/982303" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9217" ref_url="https://www.suse.com/security/cve/CVE-2017-9217/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003005.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

Security issue fixed:

- CVE-2017-9217: resolved: Fix null pointer p-&gt;question dereferencing that could lead to resolved aborting (bsc#1040614)

The update also fixed several non-security bugs:

- core/mount: Use the '-c' flag to not canonicalize paths when calling /bin/umount
- automount: Handle expire_tokens when the mount unit changes its state (bsc#1040942)
- automount: Rework propagation between automount and mount units
- build: Make sure tmpfiles.d/systemd-remote.conf get installed when necessary
- build: Fix systemd-journal-upload installation
- basic: Detect XEN Dom0 as no virtualization (bsc#1036873)
- virt: Make sure some errors are not ignored
- fstab-generator: Do not skip Before= ordering for noauto mountpoints
- fstab-gen: Do not convert device timeout into seconds when initializing JobTimeoutSec
- core/device: Use JobRunningTimeoutSec= for device units (bsc#1004995)
- fstab-generator: Apply the _netdev option also to device units (bsc#1004995)
- job: Add JobRunningTimeoutSec for JOB_RUNNING state (bsc#1004995)
- job: Ensure JobRunningTimeoutSec= survives serialization (bsc#1004995)
- rules: Export NVMe WWID udev attribute (bsc#1038865)
- rules: Introduce disk/by-id (model_serial) symbolic links for NVMe drives
- rules: Add rules for NVMe devices
- sysusers: Make group shadow support configurable (bsc#1029516)
- core: When deserializing a unit, fully restore its cgroup state (bsc#1029102)
- core: Introduce cg_mask_from_string()/cg_mask_to_string()
- core:execute: Fix handling failures of calling fork() in exec_spawn() (bsc#1040258)
- Fix systemd-sysv-convert when a package starts shipping service units (bsc#982303)
  The database might be missing when upgrading a package which was
  shipping no sysv init scripts nor unit files (at the time --save was
  called) but the new version start shipping unit files.
- Disable group shadow support (bsc#1029516)
- Only check signature job error if signature job exists (bsc#1043758)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-04"/>
	<updated date="2017-07-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1004995">SUSE bug 1004995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029102">SUSE bug 1029102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029516">SUSE bug 1029516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036873">SUSE bug 1036873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038865">SUSE bug 1038865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040258">SUSE bug 1040258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040614">SUSE bug 1040614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040942">SUSE bug 1040942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043758">SUSE bug 1043758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982303">SUSE bug 982303</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9217/">CVE-2017-9217</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517688" comment="libsystemd0-228-149.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517689" comment="libsystemd0-32bit-228-149.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517690" comment="libudev1-228-149.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517691" comment="libudev1-32bit-228-149.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517692" comment="systemd-228-149.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517693" comment="systemd-32bit-228-149.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517694" comment="systemd-bash-completion-228-149.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517695" comment="systemd-sysvinit-228-149.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517696" comment="udev-228-149.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77876" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1045986" ref_url="https://bugzilla.suse.com/1045986" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000368" ref_url="https://www.suse.com/security/cve/CVE-2017-1000368/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003004.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

- A regression in the fix for the CVE-2017-1000368 that broke sudo with the
  'requiretty' flag (bsc#1045986)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-04"/>
	<updated date="2017-07-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1045986">SUSE bug 1045986</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000368/">CVE-2017-1000368</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517697" comment="sudo-1.8.10p3-10.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77877" version="1" class="patch">
	<metadata>
		<title>Security update for libquicktime (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1044000" ref_url="https://bugzilla.suse.com/1044000" source="BUGZILLA"/>
		<reference ref_id="1044002" ref_url="https://bugzilla.suse.com/1044002" source="BUGZILLA"/>
		<reference ref_id="1044006" ref_url="https://bugzilla.suse.com/1044006" source="BUGZILLA"/>
		<reference ref_id="1044008" ref_url="https://bugzilla.suse.com/1044008" source="BUGZILLA"/>
		<reference ref_id="1044009" ref_url="https://bugzilla.suse.com/1044009" source="BUGZILLA"/>
		<reference ref_id="1044077" ref_url="https://bugzilla.suse.com/1044077" source="BUGZILLA"/>
		<reference ref_id="1044122" ref_url="https://bugzilla.suse.com/1044122" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9122" ref_url="https://www.suse.com/security/cve/CVE-2017-9122/" source="CVE"/>
		<reference ref_id="CVE-2017-9123" ref_url="https://www.suse.com/security/cve/CVE-2017-9123/" source="CVE"/>
		<reference ref_id="CVE-2017-9124" ref_url="https://www.suse.com/security/cve/CVE-2017-9124/" source="CVE"/>
		<reference ref_id="CVE-2017-9125" ref_url="https://www.suse.com/security/cve/CVE-2017-9125/" source="CVE"/>
		<reference ref_id="CVE-2017-9126" ref_url="https://www.suse.com/security/cve/CVE-2017-9126/" source="CVE"/>
		<reference ref_id="CVE-2017-9127" ref_url="https://www.suse.com/security/cve/CVE-2017-9127/" source="CVE"/>
		<reference ref_id="CVE-2017-9128" ref_url="https://www.suse.com/security/cve/CVE-2017-9128/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003002.html" source="SUSE-SU"/>
		<description>
This update for libquicktime fixes the following issues:

* CVE-2017-9122: A DoS in quicktime_read_moov function in moov.c via acrafted mp4 file was fixed. (bsc#1044077)
* CVE-2017-9123: An invalid memory read in lqt_frame_duration via a crafted mp4 file was fixed. (bsc#1044009)
* CVE-2017-9124: A NULL pointer dereference in quicktime_match_32 via a crafted mp4 file was fixed. (bsc#1044008)
* CVE-2017-9125: A DoS in lqt_frame_duration function in lqt_quicktime.c via crafted mp4 file was fixed. (bsc#1044122)
* CVE-2017-9126: A heap-based buffer overflow in quicktime_read_dref_table via a crafted mp4 file was fixed. (bsc#1044006)
* CVE-2017-9127: A heap-based buffer overflow in quicktime_user_atoms_read_atom via a crafted mp4 file was fixed. (bsc#1044002)
* CVE-2017-9128: A heap-based buffer over-read in quicktime_video_width via a crafted mp4 file was fixed. (bsc#1044000)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-04"/>
	<updated date="2017-07-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1044000">SUSE bug 1044000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044002">SUSE bug 1044002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044006">SUSE bug 1044006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044008">SUSE bug 1044008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044009">SUSE bug 1044009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044077">SUSE bug 1044077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044122">SUSE bug 1044122</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9122/">CVE-2017-9122</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9123/">CVE-2017-9123</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9124/">CVE-2017-9124</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9125/">CVE-2017-9125</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9126/">CVE-2017-9126</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9127/">CVE-2017-9127</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9128/">CVE-2017-9128</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517698" comment="libquicktime0-1.2.4-13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77878" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1046607" ref_url="https://bugzilla.suse.com/1046607" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7526" ref_url="https://www.suse.com/security/cve/CVE-2017-7526/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003014.html" source="SUSE-SU"/>
		<description>
This update for libgcrypt fixes the following issues:

- CVE-2017-7526: Hardening against a local side-channel attack in RSA key handling has been added (bsc#1046607)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-06"/>
	<updated date="2017-07-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046607">SUSE bug 1046607</bugzilla>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7526/">CVE-2017-7526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517699" comment="libgcrypt20-1.6.1-16.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517700" comment="libgcrypt20-32bit-1.6.1-16.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77879" version="1" class="patch">
	<metadata>
		<title>Security update for libcares2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1044946" ref_url="https://bugzilla.suse.com/1044946" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000381" ref_url="https://www.suse.com/security/cve/CVE-2017-1000381/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003012.html" source="SUSE-SU"/>
		<description>
This update for libcares2 fixes the following issues:

- CVE-2017-1000381: A NAPTR parser out of bounds access was fixed that could lead to crashes. (bsc#1044946)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-06"/>
	<updated date="2017-07-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1044946">SUSE bug 1044946</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000381/">CVE-2017-1000381</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517701" comment="libcares2-1.9.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517702" comment="libcares2-32bit-1.9.1-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77880" version="1" class="patch">
	<metadata>
		<title>Recommended update for ncurses (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1000662" ref_url="https://bugzilla.suse.com/1000662" source="BUGZILLA"/>
		<reference ref_id="1046853" ref_url="https://bugzilla.suse.com/1046853" source="BUGZILLA"/>
		<reference ref_id="1046858" ref_url="https://bugzilla.suse.com/1046858" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10684" ref_url="https://www.suse.com/security/cve/CVE-2017-10684/" source="CVE"/>
		<reference ref_id="CVE-2017-10685" ref_url="https://www.suse.com/security/cve/CVE-2017-10685/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1815-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00009.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:
- CVE-2017-10684: Possible RCE via stack-based buffer overflow in the fmt_entry function. (bsc#1046858)
- CVE-2017-10685: Possible RCE with format string vulnerability in the fmt_entry function. (bsc#1046853)

Bugfixes:
- Drop patch ncurses-5.9-environment.dif as YaST2 ncurses GUI does
  not need it anymore and as well as it causes bug bsc#1000662 
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-07"/>
	<updated date="2017-07-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000662">SUSE bug 1000662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046853">SUSE bug 1046853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046858">SUSE bug 1046858</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10684/">CVE-2017-10684</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10685/">CVE-2017-10685</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517703" comment="libncurses5-5.9-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517704" comment="libncurses5-32bit-5.9-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517705" comment="libncurses6-5.9-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517706" comment="libncurses6-32bit-5.9-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517707" comment="ncurses-devel-5.9-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517708" comment="ncurses-utils-5.9-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517709" comment="tack-5.9-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517710" comment="terminfo-5.9-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517711" comment="terminfo-base-5.9-44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77881" version="1" class="patch">
	<metadata>
		<title>Security update for libreoffice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1015115" ref_url="https://bugzilla.suse.com/1015115" source="BUGZILLA"/>
		<reference ref_id="1015118" ref_url="https://bugzilla.suse.com/1015118" source="BUGZILLA"/>
		<reference ref_id="1015360" ref_url="https://bugzilla.suse.com/1015360" source="BUGZILLA"/>
		<reference ref_id="1017925" ref_url="https://bugzilla.suse.com/1017925" source="BUGZILLA"/>
		<reference ref_id="1021369" ref_url="https://bugzilla.suse.com/1021369" source="BUGZILLA"/>
		<reference ref_id="1021373" ref_url="https://bugzilla.suse.com/1021373" source="BUGZILLA"/>
		<reference ref_id="1028817" ref_url="https://bugzilla.suse.com/1028817" source="BUGZILLA"/>
		<reference ref_id="1034192" ref_url="https://bugzilla.suse.com/1034192" source="BUGZILLA"/>
		<reference ref_id="1034329" ref_url="https://bugzilla.suse.com/1034329" source="BUGZILLA"/>
		<reference ref_id="1034568" ref_url="https://bugzilla.suse.com/1034568" source="BUGZILLA"/>
		<reference ref_id="1035087" ref_url="https://bugzilla.suse.com/1035087" source="BUGZILLA"/>
		<reference ref_id="1036975" ref_url="https://bugzilla.suse.com/1036975" source="BUGZILLA"/>
		<reference ref_id="1042828" ref_url="https://bugzilla.suse.com/1042828" source="BUGZILLA"/>
		<reference ref_id="948058" ref_url="https://bugzilla.suse.com/948058" source="BUGZILLA"/>
		<reference ref_id="959926" ref_url="https://bugzilla.suse.com/959926" source="BUGZILLA"/>
		<reference ref_id="962777" ref_url="https://bugzilla.suse.com/962777" source="BUGZILLA"/>
		<reference ref_id="963436" ref_url="https://bugzilla.suse.com/963436" source="BUGZILLA"/>
		<reference ref_id="972777" ref_url="https://bugzilla.suse.com/972777" source="BUGZILLA"/>
		<reference ref_id="975283" ref_url="https://bugzilla.suse.com/975283" source="BUGZILLA"/>
		<reference ref_id="976831" ref_url="https://bugzilla.suse.com/976831" source="BUGZILLA"/>
		<reference ref_id="989564" ref_url="https://bugzilla.suse.com/989564" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8947" ref_url="https://www.suse.com/security/cve/CVE-2015-8947/" source="CVE"/>
		<reference ref_id="CVE-2016-10327" ref_url="https://www.suse.com/security/cve/CVE-2016-10327/" source="CVE"/>
		<reference ref_id="CVE-2016-2052" ref_url="https://www.suse.com/security/cve/CVE-2016-2052/" source="CVE"/>
		<reference ref_id="CVE-2017-7870" ref_url="https://www.suse.com/security/cve/CVE-2017-7870/" source="CVE"/>
		<reference ref_id="CVE-2017-7882" ref_url="https://www.suse.com/security/cve/CVE-2017-7882/" source="CVE"/>
		<reference ref_id="CVE-2017-8358" ref_url="https://www.suse.com/security/cve/CVE-2017-8358/" source="CVE"/>
		<reference ref_id="CVE-2017-9433" ref_url="https://www.suse.com/security/cve/CVE-2017-9433/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003019.html" source="SUSE-SU"/>
		<description>

LibreOffice was updated to version 5.3.3.2, bringing new features and enhancements:

Writer:

- New 'Go to Page' dialog for quickly jumping to another page.
- Support for 'Table Styles'.
- New drawing tools were added.
- Improvements in the toolbar.
- Borderless padding is displayed.

Calc:

- New drawing tools were added.
- In new installations the default setting for new documents is now 'Enable wildcards in formulas'
  instead of regular expressions.
- Improved compatibility with ODF 1.2

Impress:

- Images inserted via 'Photo Album' can now be linked instead of embedded in the document.
- When launching Impress, a Template Selector allows you to choose a Template to start with.
- Two new default templates: Vivid and Pencil.
- All existing templates have been improved.

Draw:

- New arrow endings, including Crow's foot notation's ones.

Base:

- Firebird has been upgraded to version 3.0.0. It is unable to read back Firebird 2.5 data,
  so embedded Firebird odb files created in LibreOffice version up to 5.2 cannot be opened
  with LibreOffice 5.3.

Some security issues have also been fixed:

- CVE-2017-7870: An out-of-bounds write caused by a heap-based buffer overflow related to
  the tools::Polygon::Insert function.
- CVE-2017-7882: An out-of-bounds write related to the HWPFile::TagsRead function.
- CVE-2017-8358: an out-of-bounds write caused by a heap-based buffer overflow related to
  the ReadJPEG function.
- CVE-2016-10327: An out-of-bounds write caused by a heap-based buffer overflow related to
  the EnhWMFReader::ReadEnhWMF function.
- CVE-2017-9433: An out-of-bounds write caused by a heap-based buffer overflow related to
  the MsWrd1Parser::readFootnoteCorrespondance function in libmwaw.

A comprehensive list of new features and changes in this release is available at:
https://wiki.documentfoundation.org/ReleaseNotes/5.3
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-07"/>
	<updated date="2017-07-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015115">SUSE bug 1015115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015118">SUSE bug 1015118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015360">SUSE bug 1015360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017925">SUSE bug 1017925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021369">SUSE bug 1021369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021373">SUSE bug 1021373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028817">SUSE bug 1028817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034192">SUSE bug 1034192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034329">SUSE bug 1034329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034568">SUSE bug 1034568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035087">SUSE bug 1035087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036975">SUSE bug 1036975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042828">SUSE bug 1042828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948058">SUSE bug 948058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959926">SUSE bug 959926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962777">SUSE bug 962777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963436">SUSE bug 963436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972777">SUSE bug 972777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975283">SUSE bug 975283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976831">SUSE bug 976831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989564">SUSE bug 989564</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8947/">CVE-2015-8947</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10327/">CVE-2016-10327</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2052/">CVE-2016-2052</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7870/">CVE-2017-7870</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7882/">CVE-2017-7882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8358/">CVE-2017-8358</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9433/">CVE-2017-9433</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517712" comment="libixion-0_12-0-0.12.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517713" comment="libmwaw-0_3-3-0.3.11-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517714" comment="liborcus-0_12-0-0.12.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517715" comment="libreoffice-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517716" comment="libreoffice-base-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517717" comment="libreoffice-base-drivers-mysql-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517718" comment="libreoffice-base-drivers-postgresql-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517719" comment="libreoffice-calc-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517720" comment="libreoffice-calc-extensions-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517721" comment="libreoffice-draw-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517722" comment="libreoffice-filters-optional-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517723" comment="libreoffice-gnome-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517724" comment="libreoffice-icon-theme-galaxy-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517725" comment="libreoffice-icon-theme-tango-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517726" comment="libreoffice-impress-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517727" comment="libreoffice-l10n-af-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517728" comment="libreoffice-l10n-ar-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517729" comment="libreoffice-l10n-ca-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517730" comment="libreoffice-l10n-cs-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517731" comment="libreoffice-l10n-da-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517732" comment="libreoffice-l10n-de-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517733" comment="libreoffice-l10n-en-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517734" comment="libreoffice-l10n-es-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517735" comment="libreoffice-l10n-fi-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517736" comment="libreoffice-l10n-fr-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517737" comment="libreoffice-l10n-gu-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517738" comment="libreoffice-l10n-hi-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517739" comment="libreoffice-l10n-hu-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517740" comment="libreoffice-l10n-it-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517741" comment="libreoffice-l10n-ja-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517742" comment="libreoffice-l10n-ko-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517743" comment="libreoffice-l10n-nb-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517744" comment="libreoffice-l10n-nl-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517745" comment="libreoffice-l10n-nn-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517746" comment="libreoffice-l10n-pl-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517747" comment="libreoffice-l10n-pt_BR-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517748" comment="libreoffice-l10n-pt_PT-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517749" comment="libreoffice-l10n-ro-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517750" comment="libreoffice-l10n-ru-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517751" comment="libreoffice-l10n-sk-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517752" comment="libreoffice-l10n-sv-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517753" comment="libreoffice-l10n-xh-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517754" comment="libreoffice-l10n-zh_CN-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517755" comment="libreoffice-l10n-zh_TW-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517756" comment="libreoffice-l10n-zu-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517757" comment="libreoffice-mailmerge-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517758" comment="libreoffice-math-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517759" comment="libreoffice-officebean-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517760" comment="libreoffice-pyuno-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517761" comment="libreoffice-writer-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517762" comment="libreoffice-writer-extensions-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517763" comment="libreofficekit-5.3.3.2-40.5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517764" comment="libstaroffice-0_0-0-0.0.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517765" comment="libzmf-0_0-0-0.0.1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517766" comment="myspell-af_NA-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517767" comment="myspell-af_ZA-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517768" comment="myspell-ar-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517769" comment="myspell-ar_AE-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517770" comment="myspell-ar_BH-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517771" comment="myspell-ar_DZ-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517772" comment="myspell-ar_EG-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517773" comment="myspell-ar_IQ-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517774" comment="myspell-ar_JO-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517775" comment="myspell-ar_KW-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517776" comment="myspell-ar_LB-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517777" comment="myspell-ar_LY-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517778" comment="myspell-ar_MA-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517779" comment="myspell-ar_OM-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517780" comment="myspell-ar_QA-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517781" comment="myspell-ar_SA-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517782" comment="myspell-ar_SD-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517783" comment="myspell-ar_SY-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517784" comment="myspell-ar_TN-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517785" comment="myspell-ar_YE-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517786" comment="myspell-be_BY-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517787" comment="myspell-bg_BG-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517788" comment="myspell-bn_BD-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517789" comment="myspell-bn_IN-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517790" comment="myspell-bs-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517791" comment="myspell-bs_BA-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517792" comment="myspell-ca-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517793" comment="myspell-ca_AD-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517794" comment="myspell-ca_ES-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517795" comment="myspell-ca_ES_valencia-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517796" comment="myspell-ca_FR-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517797" comment="myspell-ca_IT-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517798" comment="myspell-cs_CZ-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517799" comment="myspell-da_DK-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517800" comment="myspell-de-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517801" comment="myspell-de_AT-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517802" comment="myspell-de_CH-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517803" comment="myspell-de_DE-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517804" comment="myspell-dictionaries-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517805" comment="myspell-el_GR-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517806" comment="myspell-en-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517807" comment="myspell-en_AU-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517808" comment="myspell-en_BS-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517809" comment="myspell-en_BZ-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517810" comment="myspell-en_CA-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517811" comment="myspell-en_GB-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517812" comment="myspell-en_GH-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517813" comment="myspell-en_IE-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517814" comment="myspell-en_IN-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517815" comment="myspell-en_JM-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517816" comment="myspell-en_MW-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517817" comment="myspell-en_NA-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517818" comment="myspell-en_NZ-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517819" comment="myspell-en_PH-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517820" comment="myspell-en_TT-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517821" comment="myspell-en_US-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517822" comment="myspell-en_ZA-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517823" comment="myspell-en_ZW-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517824" comment="myspell-es-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517825" comment="myspell-es_AR-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517826" comment="myspell-es_BO-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517827" comment="myspell-es_CL-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517828" comment="myspell-es_CO-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517829" comment="myspell-es_CR-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517830" comment="myspell-es_CU-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517831" comment="myspell-es_DO-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517832" comment="myspell-es_EC-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517833" comment="myspell-es_ES-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517834" comment="myspell-es_GT-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517835" comment="myspell-es_HN-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517836" comment="myspell-es_MX-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517837" comment="myspell-es_NI-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517838" comment="myspell-es_PA-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517839" comment="myspell-es_PE-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517840" comment="myspell-es_PR-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517841" comment="myspell-es_PY-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517842" comment="myspell-es_SV-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517843" comment="myspell-es_UY-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517844" comment="myspell-es_VE-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517845" comment="myspell-et_EE-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517846" comment="myspell-fr_BE-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517847" comment="myspell-fr_CA-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517848" comment="myspell-fr_CH-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517849" comment="myspell-fr_FR-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517850" comment="myspell-fr_LU-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517851" comment="myspell-fr_MC-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517852" comment="myspell-gu_IN-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517853" comment="myspell-he_IL-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517854" comment="myspell-hi_IN-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517855" comment="myspell-hr_HR-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517856" comment="myspell-hu_HU-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517857" comment="myspell-it_IT-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517858" comment="myspell-lightproof-en-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517859" comment="myspell-lightproof-hu_HU-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517860" comment="myspell-lightproof-pt_BR-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517861" comment="myspell-lightproof-ru_RU-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517862" comment="myspell-lo_LA-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517863" comment="myspell-lt_LT-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517864" comment="myspell-lv_LV-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517865" comment="myspell-nb_NO-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517866" comment="myspell-nl_BE-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517867" comment="myspell-nl_NL-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517868" comment="myspell-nn_NO-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517869" comment="myspell-no-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517870" comment="myspell-pl_PL-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517871" comment="myspell-pt_AO-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517872" comment="myspell-pt_BR-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517873" comment="myspell-pt_PT-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517874" comment="myspell-ro-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517875" comment="myspell-ro_RO-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517876" comment="myspell-ru_RU-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517877" comment="myspell-sk_SK-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517878" comment="myspell-sl_SI-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517879" comment="myspell-sr-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517880" comment="myspell-sr_CS-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517881" comment="myspell-sr_Latn_CS-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517882" comment="myspell-sr_Latn_RS-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517883" comment="myspell-sr_RS-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517884" comment="myspell-sv_FI-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517885" comment="myspell-sv_SE-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517886" comment="myspell-te-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517887" comment="myspell-te_IN-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517888" comment="myspell-th_TH-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517889" comment="myspell-uk_UA-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517890" comment="myspell-vi-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517891" comment="myspell-vi_VN-20170511-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517892" comment="myspell-zu_ZA-20170511-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77882" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1034173" ref_url="https://bugzilla.suse.com/1034173" source="BUGZILLA"/>
		<reference ref_id="1038337" ref_url="https://bugzilla.suse.com/1038337" source="BUGZILLA"/>
		<reference ref_id="1043398" ref_url="https://bugzilla.suse.com/1043398" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7507" ref_url="https://www.suse.com/security/cve/CVE-2017-7507/" source="CVE"/>
		<reference ref_id="CVE-2017-7869" ref_url="https://www.suse.com/security/cve/CVE-2017-7869/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003024.html" source="SUSE-SU"/>
		<description>
This update for gnutls fixes the following issues:

- GNUTLS-SA-2017-4 / CVE-2017-7507: Fix crash in status response TLS extension decoding (bsc#1043398)
- GNUTLS-SA-2017-3 / CVE-2017-7869: Fix out-of-bounds write in OpenPGP certificate decoding (bsc#1034173)
- Address read of 4 bytes past the end of buffer in OpenPGP certificate parsing (bsc#1038337)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-11"/>
	<updated date="2017-07-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034173">SUSE bug 1034173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038337">SUSE bug 1038337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043398">SUSE bug 1043398</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7507/">CVE-2017-7507</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7869/">CVE-2017-7869</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517893" comment="gnutls-3.2.15-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517894" comment="libgnutls28-3.2.15-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517895" comment="libgnutls28-32bit-3.2.15-18.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77883" version="1" class="patch">
	<metadata>
		<title>Security update for libICE (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1025068" ref_url="https://bugzilla.suse.com/1025068" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2626" ref_url="https://www.suse.com/security/cve/CVE-2017-2626/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003021.html" source="SUSE-SU"/>
		<description>
This update for libICE fixes the following issues:

- CVE-2017-2626: Creation of the ICE auth session cookies used insufficient randomness, making these cookies
  predictable. A more random generation method has been implemented. (boo#1025068)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-11"/>
	<updated date="2017-07-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025068">SUSE bug 1025068</bugzilla>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-2626/">CVE-2017-2626</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517896" comment="libICE6-1.0.8-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517897" comment="libICE6-32bit-1.0.8-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77884" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1046779" ref_url="https://bugzilla.suse.com/1046779" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7506" ref_url="https://www.suse.com/security/cve/CVE-2017-7506/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1836-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00013.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

- CVE-2017-7506: A possible buffer overflow via invalid monitor configurations (bsc#1046779)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-11"/>
	<updated date="2017-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046779">SUSE bug 1046779</bugzilla>
	<cve impact="important" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7506/">CVE-2017-7506</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517898" comment="libspice-server1-0.12.7-10.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77885" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1003581" ref_url="https://bugzilla.suse.com/1003581" source="BUGZILLA"/>
		<reference ref_id="1004003" ref_url="https://bugzilla.suse.com/1004003" source="BUGZILLA"/>
		<reference ref_id="1011044" ref_url="https://bugzilla.suse.com/1011044" source="BUGZILLA"/>
		<reference ref_id="1012060" ref_url="https://bugzilla.suse.com/1012060" source="BUGZILLA"/>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1012422" ref_url="https://bugzilla.suse.com/1012422" source="BUGZILLA"/>
		<reference ref_id="1012452" ref_url="https://bugzilla.suse.com/1012452" source="BUGZILLA"/>
		<reference ref_id="1012829" ref_url="https://bugzilla.suse.com/1012829" source="BUGZILLA"/>
		<reference ref_id="1012910" ref_url="https://bugzilla.suse.com/1012910" source="BUGZILLA"/>
		<reference ref_id="1012985" ref_url="https://bugzilla.suse.com/1012985" source="BUGZILLA"/>
		<reference ref_id="1013561" ref_url="https://bugzilla.suse.com/1013561" source="BUGZILLA"/>
		<reference ref_id="1013887" ref_url="https://bugzilla.suse.com/1013887" source="BUGZILLA"/>
		<reference ref_id="1015342" ref_url="https://bugzilla.suse.com/1015342" source="BUGZILLA"/>
		<reference ref_id="1015452" ref_url="https://bugzilla.suse.com/1015452" source="BUGZILLA"/>
		<reference ref_id="1017461" ref_url="https://bugzilla.suse.com/1017461" source="BUGZILLA"/>
		<reference ref_id="1018885" ref_url="https://bugzilla.suse.com/1018885" source="BUGZILLA"/>
		<reference ref_id="1020412" ref_url="https://bugzilla.suse.com/1020412" source="BUGZILLA"/>
		<reference ref_id="1021424" ref_url="https://bugzilla.suse.com/1021424" source="BUGZILLA"/>
		<reference ref_id="1022266" ref_url="https://bugzilla.suse.com/1022266" source="BUGZILLA"/>
		<reference ref_id="1022595" ref_url="https://bugzilla.suse.com/1022595" source="BUGZILLA"/>
		<reference ref_id="1023287" ref_url="https://bugzilla.suse.com/1023287" source="BUGZILLA"/>
		<reference ref_id="1025461" ref_url="https://bugzilla.suse.com/1025461" source="BUGZILLA"/>
		<reference ref_id="1026570" ref_url="https://bugzilla.suse.com/1026570" source="BUGZILLA"/>
		<reference ref_id="1027101" ref_url="https://bugzilla.suse.com/1027101" source="BUGZILLA"/>
		<reference ref_id="1027512" ref_url="https://bugzilla.suse.com/1027512" source="BUGZILLA"/>
		<reference ref_id="1027974" ref_url="https://bugzilla.suse.com/1027974" source="BUGZILLA"/>
		<reference ref_id="1028217" ref_url="https://bugzilla.suse.com/1028217" source="BUGZILLA"/>
		<reference ref_id="1028310" ref_url="https://bugzilla.suse.com/1028310" source="BUGZILLA"/>
		<reference ref_id="1028340" ref_url="https://bugzilla.suse.com/1028340" source="BUGZILLA"/>
		<reference ref_id="1028883" ref_url="https://bugzilla.suse.com/1028883" source="BUGZILLA"/>
		<reference ref_id="1029607" ref_url="https://bugzilla.suse.com/1029607" source="BUGZILLA"/>
		<reference ref_id="1030057" ref_url="https://bugzilla.suse.com/1030057" source="BUGZILLA"/>
		<reference ref_id="1030070" ref_url="https://bugzilla.suse.com/1030070" source="BUGZILLA"/>
		<reference ref_id="1031040" ref_url="https://bugzilla.suse.com/1031040" source="BUGZILLA"/>
		<reference ref_id="1031142" ref_url="https://bugzilla.suse.com/1031142" source="BUGZILLA"/>
		<reference ref_id="1031147" ref_url="https://bugzilla.suse.com/1031147" source="BUGZILLA"/>
		<reference ref_id="1031470" ref_url="https://bugzilla.suse.com/1031470" source="BUGZILLA"/>
		<reference ref_id="1031500" ref_url="https://bugzilla.suse.com/1031500" source="BUGZILLA"/>
		<reference ref_id="1031512" ref_url="https://bugzilla.suse.com/1031512" source="BUGZILLA"/>
		<reference ref_id="1031555" ref_url="https://bugzilla.suse.com/1031555" source="BUGZILLA"/>
		<reference ref_id="1031717" ref_url="https://bugzilla.suse.com/1031717" source="BUGZILLA"/>
		<reference ref_id="1031796" ref_url="https://bugzilla.suse.com/1031796" source="BUGZILLA"/>
		<reference ref_id="1032141" ref_url="https://bugzilla.suse.com/1032141" source="BUGZILLA"/>
		<reference ref_id="1032339" ref_url="https://bugzilla.suse.com/1032339" source="BUGZILLA"/>
		<reference ref_id="1032345" ref_url="https://bugzilla.suse.com/1032345" source="BUGZILLA"/>
		<reference ref_id="1032400" ref_url="https://bugzilla.suse.com/1032400" source="BUGZILLA"/>
		<reference ref_id="1032581" ref_url="https://bugzilla.suse.com/1032581" source="BUGZILLA"/>
		<reference ref_id="1032803" ref_url="https://bugzilla.suse.com/1032803" source="BUGZILLA"/>
		<reference ref_id="1033117" ref_url="https://bugzilla.suse.com/1033117" source="BUGZILLA"/>
		<reference ref_id="1033281" ref_url="https://bugzilla.suse.com/1033281" source="BUGZILLA"/>
		<reference ref_id="1033336" ref_url="https://bugzilla.suse.com/1033336" source="BUGZILLA"/>
		<reference ref_id="1033340" ref_url="https://bugzilla.suse.com/1033340" source="BUGZILLA"/>
		<reference ref_id="1033885" ref_url="https://bugzilla.suse.com/1033885" source="BUGZILLA"/>
		<reference ref_id="1034048" ref_url="https://bugzilla.suse.com/1034048" source="BUGZILLA"/>
		<reference ref_id="1034419" ref_url="https://bugzilla.suse.com/1034419" source="BUGZILLA"/>
		<reference ref_id="1034635" ref_url="https://bugzilla.suse.com/1034635" source="BUGZILLA"/>
		<reference ref_id="1034670" ref_url="https://bugzilla.suse.com/1034670" source="BUGZILLA"/>
		<reference ref_id="1034671" ref_url="https://bugzilla.suse.com/1034671" source="BUGZILLA"/>
		<reference ref_id="1034762" ref_url="https://bugzilla.suse.com/1034762" source="BUGZILLA"/>
		<reference ref_id="1034902" ref_url="https://bugzilla.suse.com/1034902" source="BUGZILLA"/>
		<reference ref_id="1034995" ref_url="https://bugzilla.suse.com/1034995" source="BUGZILLA"/>
		<reference ref_id="1035024" ref_url="https://bugzilla.suse.com/1035024" source="BUGZILLA"/>
		<reference ref_id="1035866" ref_url="https://bugzilla.suse.com/1035866" source="BUGZILLA"/>
		<reference ref_id="1035887" ref_url="https://bugzilla.suse.com/1035887" source="BUGZILLA"/>
		<reference ref_id="1035920" ref_url="https://bugzilla.suse.com/1035920" source="BUGZILLA"/>
		<reference ref_id="1035922" ref_url="https://bugzilla.suse.com/1035922" source="BUGZILLA"/>
		<reference ref_id="1036214" ref_url="https://bugzilla.suse.com/1036214" source="BUGZILLA"/>
		<reference ref_id="1036638" ref_url="https://bugzilla.suse.com/1036638" source="BUGZILLA"/>
		<reference ref_id="1036752" ref_url="https://bugzilla.suse.com/1036752" source="BUGZILLA"/>
		<reference ref_id="1036763" ref_url="https://bugzilla.suse.com/1036763" source="BUGZILLA"/>
		<reference ref_id="1037177" ref_url="https://bugzilla.suse.com/1037177" source="BUGZILLA"/>
		<reference ref_id="1037186" ref_url="https://bugzilla.suse.com/1037186" source="BUGZILLA"/>
		<reference ref_id="1037384" ref_url="https://bugzilla.suse.com/1037384" source="BUGZILLA"/>
		<reference ref_id="1037483" ref_url="https://bugzilla.suse.com/1037483" source="BUGZILLA"/>
		<reference ref_id="1037669" ref_url="https://bugzilla.suse.com/1037669" source="BUGZILLA"/>
		<reference ref_id="1037840" ref_url="https://bugzilla.suse.com/1037840" source="BUGZILLA"/>
		<reference ref_id="1037871" ref_url="https://bugzilla.suse.com/1037871" source="BUGZILLA"/>
		<reference ref_id="1037969" ref_url="https://bugzilla.suse.com/1037969" source="BUGZILLA"/>
		<reference ref_id="1038033" ref_url="https://bugzilla.suse.com/1038033" source="BUGZILLA"/>
		<reference ref_id="1038043" ref_url="https://bugzilla.suse.com/1038043" source="BUGZILLA"/>
		<reference ref_id="1038085" ref_url="https://bugzilla.suse.com/1038085" source="BUGZILLA"/>
		<reference ref_id="1038142" ref_url="https://bugzilla.suse.com/1038142" source="BUGZILLA"/>
		<reference ref_id="1038143" ref_url="https://bugzilla.suse.com/1038143" source="BUGZILLA"/>
		<reference ref_id="1038297" ref_url="https://bugzilla.suse.com/1038297" source="BUGZILLA"/>
		<reference ref_id="1038458" ref_url="https://bugzilla.suse.com/1038458" source="BUGZILLA"/>
		<reference ref_id="1038544" ref_url="https://bugzilla.suse.com/1038544" source="BUGZILLA"/>
		<reference ref_id="1038842" ref_url="https://bugzilla.suse.com/1038842" source="BUGZILLA"/>
		<reference ref_id="1038843" ref_url="https://bugzilla.suse.com/1038843" source="BUGZILLA"/>
		<reference ref_id="1038846" ref_url="https://bugzilla.suse.com/1038846" source="BUGZILLA"/>
		<reference ref_id="1038847" ref_url="https://bugzilla.suse.com/1038847" source="BUGZILLA"/>
		<reference ref_id="1038848" ref_url="https://bugzilla.suse.com/1038848" source="BUGZILLA"/>
		<reference ref_id="1038879" ref_url="https://bugzilla.suse.com/1038879" source="BUGZILLA"/>
		<reference ref_id="1038981" ref_url="https://bugzilla.suse.com/1038981" source="BUGZILLA"/>
		<reference ref_id="1038982" ref_url="https://bugzilla.suse.com/1038982" source="BUGZILLA"/>
		<reference ref_id="1039214" ref_url="https://bugzilla.suse.com/1039214" source="BUGZILLA"/>
		<reference ref_id="1039348" ref_url="https://bugzilla.suse.com/1039348" source="BUGZILLA"/>
		<reference ref_id="1039354" ref_url="https://bugzilla.suse.com/1039354" source="BUGZILLA"/>
		<reference ref_id="1039700" ref_url="https://bugzilla.suse.com/1039700" source="BUGZILLA"/>
		<reference ref_id="1039864" ref_url="https://bugzilla.suse.com/1039864" source="BUGZILLA"/>
		<reference ref_id="1039882" ref_url="https://bugzilla.suse.com/1039882" source="BUGZILLA"/>
		<reference ref_id="1039883" ref_url="https://bugzilla.suse.com/1039883" source="BUGZILLA"/>
		<reference ref_id="1039885" ref_url="https://bugzilla.suse.com/1039885" source="BUGZILLA"/>
		<reference ref_id="1039900" ref_url="https://bugzilla.suse.com/1039900" source="BUGZILLA"/>
		<reference ref_id="1040069" ref_url="https://bugzilla.suse.com/1040069" source="BUGZILLA"/>
		<reference ref_id="1040125" ref_url="https://bugzilla.suse.com/1040125" source="BUGZILLA"/>
		<reference ref_id="1040182" ref_url="https://bugzilla.suse.com/1040182" source="BUGZILLA"/>
		<reference ref_id="1040279" ref_url="https://bugzilla.suse.com/1040279" source="BUGZILLA"/>
		<reference ref_id="1040351" ref_url="https://bugzilla.suse.com/1040351" source="BUGZILLA"/>
		<reference ref_id="1040364" ref_url="https://bugzilla.suse.com/1040364" source="BUGZILLA"/>
		<reference ref_id="1040395" ref_url="https://bugzilla.suse.com/1040395" source="BUGZILLA"/>
		<reference ref_id="1040425" ref_url="https://bugzilla.suse.com/1040425" source="BUGZILLA"/>
		<reference ref_id="1040463" ref_url="https://bugzilla.suse.com/1040463" source="BUGZILLA"/>
		<reference ref_id="1040567" ref_url="https://bugzilla.suse.com/1040567" source="BUGZILLA"/>
		<reference ref_id="1040609" ref_url="https://bugzilla.suse.com/1040609" source="BUGZILLA"/>
		<reference ref_id="1040855" ref_url="https://bugzilla.suse.com/1040855" source="BUGZILLA"/>
		<reference ref_id="1040929" ref_url="https://bugzilla.suse.com/1040929" source="BUGZILLA"/>
		<reference ref_id="1040941" ref_url="https://bugzilla.suse.com/1040941" source="BUGZILLA"/>
		<reference ref_id="1041087" ref_url="https://bugzilla.suse.com/1041087" source="BUGZILLA"/>
		<reference ref_id="1041160" ref_url="https://bugzilla.suse.com/1041160" source="BUGZILLA"/>
		<reference ref_id="1041168" ref_url="https://bugzilla.suse.com/1041168" source="BUGZILLA"/>
		<reference ref_id="1041242" ref_url="https://bugzilla.suse.com/1041242" source="BUGZILLA"/>
		<reference ref_id="1041431" ref_url="https://bugzilla.suse.com/1041431" source="BUGZILLA"/>
		<reference ref_id="1041810" ref_url="https://bugzilla.suse.com/1041810" source="BUGZILLA"/>
		<reference ref_id="1042286" ref_url="https://bugzilla.suse.com/1042286" source="BUGZILLA"/>
		<reference ref_id="1042356" ref_url="https://bugzilla.suse.com/1042356" source="BUGZILLA"/>
		<reference ref_id="1042421" ref_url="https://bugzilla.suse.com/1042421" source="BUGZILLA"/>
		<reference ref_id="1042517" ref_url="https://bugzilla.suse.com/1042517" source="BUGZILLA"/>
		<reference ref_id="1042535" ref_url="https://bugzilla.suse.com/1042535" source="BUGZILLA"/>
		<reference ref_id="1042536" ref_url="https://bugzilla.suse.com/1042536" source="BUGZILLA"/>
		<reference ref_id="1042863" ref_url="https://bugzilla.suse.com/1042863" source="BUGZILLA"/>
		<reference ref_id="1042886" ref_url="https://bugzilla.suse.com/1042886" source="BUGZILLA"/>
		<reference ref_id="1043014" ref_url="https://bugzilla.suse.com/1043014" source="BUGZILLA"/>
		<reference ref_id="1043231" ref_url="https://bugzilla.suse.com/1043231" source="BUGZILLA"/>
		<reference ref_id="1043236" ref_url="https://bugzilla.suse.com/1043236" source="BUGZILLA"/>
		<reference ref_id="1043347" ref_url="https://bugzilla.suse.com/1043347" source="BUGZILLA"/>
		<reference ref_id="1043371" ref_url="https://bugzilla.suse.com/1043371" source="BUGZILLA"/>
		<reference ref_id="1043467" ref_url="https://bugzilla.suse.com/1043467" source="BUGZILLA"/>
		<reference ref_id="1043488" ref_url="https://bugzilla.suse.com/1043488" source="BUGZILLA"/>
		<reference ref_id="1043598" ref_url="https://bugzilla.suse.com/1043598" source="BUGZILLA"/>
		<reference ref_id="1043912" ref_url="https://bugzilla.suse.com/1043912" source="BUGZILLA"/>
		<reference ref_id="1043935" ref_url="https://bugzilla.suse.com/1043935" source="BUGZILLA"/>
		<reference ref_id="1043990" ref_url="https://bugzilla.suse.com/1043990" source="BUGZILLA"/>
		<reference ref_id="1044015" ref_url="https://bugzilla.suse.com/1044015" source="BUGZILLA"/>
		<reference ref_id="1044082" ref_url="https://bugzilla.suse.com/1044082" source="BUGZILLA"/>
		<reference ref_id="1044120" ref_url="https://bugzilla.suse.com/1044120" source="BUGZILLA"/>
		<reference ref_id="1044125" ref_url="https://bugzilla.suse.com/1044125" source="BUGZILLA"/>
		<reference ref_id="1044532" ref_url="https://bugzilla.suse.com/1044532" source="BUGZILLA"/>
		<reference ref_id="1044767" ref_url="https://bugzilla.suse.com/1044767" source="BUGZILLA"/>
		<reference ref_id="1044772" ref_url="https://bugzilla.suse.com/1044772" source="BUGZILLA"/>
		<reference ref_id="1044854" ref_url="https://bugzilla.suse.com/1044854" source="BUGZILLA"/>
		<reference ref_id="1044880" ref_url="https://bugzilla.suse.com/1044880" source="BUGZILLA"/>
		<reference ref_id="1044912" ref_url="https://bugzilla.suse.com/1044912" source="BUGZILLA"/>
		<reference ref_id="1045154" ref_url="https://bugzilla.suse.com/1045154" source="BUGZILLA"/>
		<reference ref_id="1045235" ref_url="https://bugzilla.suse.com/1045235" source="BUGZILLA"/>
		<reference ref_id="1045286" ref_url="https://bugzilla.suse.com/1045286" source="BUGZILLA"/>
		<reference ref_id="1045307" ref_url="https://bugzilla.suse.com/1045307" source="BUGZILLA"/>
		<reference ref_id="1045467" ref_url="https://bugzilla.suse.com/1045467" source="BUGZILLA"/>
		<reference ref_id="1045568" ref_url="https://bugzilla.suse.com/1045568" source="BUGZILLA"/>
		<reference ref_id="1046105" ref_url="https://bugzilla.suse.com/1046105" source="BUGZILLA"/>
		<reference ref_id="1046434" ref_url="https://bugzilla.suse.com/1046434" source="BUGZILLA"/>
		<reference ref_id="1046589" ref_url="https://bugzilla.suse.com/1046589" source="BUGZILLA"/>
		<reference ref_id="799133" ref_url="https://bugzilla.suse.com/799133" source="BUGZILLA"/>
		<reference ref_id="863764" ref_url="https://bugzilla.suse.com/863764" source="BUGZILLA"/>
		<reference ref_id="922871" ref_url="https://bugzilla.suse.com/922871" source="BUGZILLA"/>
		<reference ref_id="939801" ref_url="https://bugzilla.suse.com/939801" source="BUGZILLA"/>
		<reference ref_id="966170" ref_url="https://bugzilla.suse.com/966170" source="BUGZILLA"/>
		<reference ref_id="966172" ref_url="https://bugzilla.suse.com/966172" source="BUGZILLA"/>
		<reference ref_id="966191" ref_url="https://bugzilla.suse.com/966191" source="BUGZILLA"/>
		<reference ref_id="966321" ref_url="https://bugzilla.suse.com/966321" source="BUGZILLA"/>
		<reference ref_id="966339" ref_url="https://bugzilla.suse.com/966339" source="BUGZILLA"/>
		<reference ref_id="971975" ref_url="https://bugzilla.suse.com/971975" source="BUGZILLA"/>
		<reference ref_id="988065" ref_url="https://bugzilla.suse.com/988065" source="BUGZILLA"/>
		<reference ref_id="989311" ref_url="https://bugzilla.suse.com/989311" source="BUGZILLA"/>
		<reference ref_id="990058" ref_url="https://bugzilla.suse.com/990058" source="BUGZILLA"/>
		<reference ref_id="990682" ref_url="https://bugzilla.suse.com/990682" source="BUGZILLA"/>
		<reference ref_id="993832" ref_url="https://bugzilla.suse.com/993832" source="BUGZILLA"/>
		<reference ref_id="995542" ref_url="https://bugzilla.suse.com/995542" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000365" ref_url="https://www.suse.com/security/cve/CVE-2017-1000365/" source="CVE"/>
		<reference ref_id="CVE-2017-1000380" ref_url="https://www.suse.com/security/cve/CVE-2017-1000380/" source="CVE"/>
		<reference ref_id="CVE-2017-7346" ref_url="https://www.suse.com/security/cve/CVE-2017-7346/" source="CVE"/>
		<reference ref_id="CVE-2017-7487" ref_url="https://www.suse.com/security/cve/CVE-2017-7487/" source="CVE"/>
		<reference ref_id="CVE-2017-7616" ref_url="https://www.suse.com/security/cve/CVE-2017-7616/" source="CVE"/>
		<reference ref_id="CVE-2017-7618" ref_url="https://www.suse.com/security/cve/CVE-2017-7618/" source="CVE"/>
		<reference ref_id="CVE-2017-8890" ref_url="https://www.suse.com/security/cve/CVE-2017-8890/" source="CVE"/>
		<reference ref_id="CVE-2017-8924" ref_url="https://www.suse.com/security/cve/CVE-2017-8924/" source="CVE"/>
		<reference ref_id="CVE-2017-8925" ref_url="https://www.suse.com/security/cve/CVE-2017-8925/" source="CVE"/>
		<reference ref_id="CVE-2017-9074" ref_url="https://www.suse.com/security/cve/CVE-2017-9074/" source="CVE"/>
		<reference ref_id="CVE-2017-9075" ref_url="https://www.suse.com/security/cve/CVE-2017-9075/" source="CVE"/>
		<reference ref_id="CVE-2017-9076" ref_url="https://www.suse.com/security/cve/CVE-2017-9076/" source="CVE"/>
		<reference ref_id="CVE-2017-9077" ref_url="https://www.suse.com/security/cve/CVE-2017-9077/" source="CVE"/>
		<reference ref_id="CVE-2017-9150" ref_url="https://www.suse.com/security/cve/CVE-2017-9150/" source="CVE"/>
		<reference ref_id="CVE-2017-9242" ref_url="https://www.suse.com/security/cve/CVE-2017-9242/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00018.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 kernel was updated to 4.4.74 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-1000365: The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but did not take the argument and environment pointers into account, which allowed attackers to bypass this limitation. (bnc#1039354).
- CVE-2017-1000380: sound/core/timer.c in the Linux kernel is vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents may be disclosed when a read and an ioctl happen at the same time (bnc#1044125).
- CVE-2017-7346: The vmw_gb_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate certain levels data, which allowed local users to cause a denial of service (system hang) via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031796).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bnc#1041431).
- CVE-2017-9076: The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039885).
- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1040069).
- CVE-2017-9075: The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039883).
- CVE-2017-9074: The IPv6 fragmentation implementation in the Linux kernel did not consider that the nexthdr field may be associated with an invalid option, which allowed local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls (bnc#1039882).
- CVE-2017-8924: The edge_bulk_in_callback function in drivers/usb/serial/io_ti.c in the Linux kernel allowed local users to obtain sensitive information (in the dmesg ringbuffer and syslog) from uninitialized kernel memory by using a crafted USB device (posing as an io_ti USB serial device) to trigger an integer underflow. (bsc#1038982)
- CVE-2017-8925: The omninet_open function in drivers/usb/serial/omninet.c in the Linux kernel allowed local users to cause a denial of service (tty exhaustion) by leveraging reference count mishandling. (bsc#1038981)
- CVE-2017-7487: The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel mishandled reference counts, which allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface (bnc#1038879).
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bnc#1038544).
- CVE-2017-9150: The do_check function in kernel/bpf/verifier.c in the Linux kernel did not make the allow_ptr_leaks value available for restricting the output of the print_bpf_insn function, which allowed local users to obtain sensitive address information via crafted bpf system calls (bnc#1040279).
- CVE-2017-7618: crypto/ahash.c in the Linux kernel allowed attackers to cause a denial of service (API operation calling its own callback, and infinite recursion) by triggering EBUSY on a full queue (bnc#1033340).
- CVE-2017-7616: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel allowed local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation (bnc#1033336).

The following non-security bugs were fixed:

- 9p: fix a potential acl leak (4.4.68 stable queue).
- acpi / APEI: Add missing synchronize_rcu() on NOTIFY_SCI removal (bsc#1031717).
- acpi / scan: Drop support for force_remove (bnc#1029607).
- ahci: disable correct irq for dummy ports (bsc#1040125).
- alsa: hda - Fix deadlock of controller device lock at unbinding (4.4.68 stable queue).
- arm: 8452/3: PJ4: make coprocessor access sequences buildable in Thumb2 mode (4.4.68 stable queue).
- arm: OMAP5 / DRA7: Fix HYP mode boot for thumb2 build (4.4.68 stable queue).
- ASoC: Intel: Skylake: Uninitialized variable in probe_codec() (bsc#1043231).
- ASoC: rt5640: use msleep() for long delays (bsc#1031717).
- ASoC: sti: Fix error handling if of_clk_get() fails (bsc#1031717).
- bcache: fix calling ida_simple_remove() with incorrect minor (bsc#1038085).
- block: copy NOMERGE flag from bio to request (bsc#1030070).
- block: get rid of blk_integrity_revalidate() (4.4.68 stable queue).
- bna: add missing per queue ethtool stat (bsc#966321).
- bna: avoid writing uninitialized data into hw registers (bsc#966321).
- bna: integer overflow bug in debugfs (bsc#966321).
- bnxt_en: allocate enough space for -&gt;ntp_fltr_bmap (bsc#1020412 FATE#321671).
- bonding: avoid defaulting hard_header_len to ETH_HLEN on slave removal (bsc#1042286).
- bonding: do not use stale speed and duplex information (bsc#1042286).
- bonding: prevent out of bound accesses (bsc#1042286).
- bpf, arm64: fix jit branch offset related to ldimm64 (4.4.68 stable queue).
- brcmfmac: add fallback for devices that do not report per-chain values (bsc#1043231).
- brcmfmac: avoid writing channel out of allocated array (bsc#1043231).
- brcmfmac: Ensure pointer correctly set if skb data location changes (4.4.68 stable queue).
- brcmfmac: Make skb header writable before use (4.4.68 stable queue).
- brcmfmac: restore stopping netdev queue when bus clogs up (bsc#1031717).
- btrfs: add a flags field to btrfs_fs_info (bsc#1012452).
- btrfs: add ASSERT for block group's memory leak (bsc#1012452).
- btrfs: add btrfs_trans_handle-&gt;fs_info pointer (bsc#1012452).
- btrfs: add bytes_readonly to the spaceinfo at once (bsc#1012452).
- btrfs: add check to sysfs handler of label (bsc#1012452).
- btrfs: add dynamic debug support (bsc#1012452).
- btrfs: add error handling for extent buffer in print tree (bsc#1012452).
- btrfs: add missing bytes_readonly attribute file in sysfs (bsc#1012452).
- btrfs: add missing check for writeback errors on fsync (bsc#1012452).
- btrfs: add more validation checks for superblock (bsc#1012452).
- btrfs: Add ratelimit to btrfs printing (bsc#1012452).
- btrfs: add read-only check to sysfs handler of features (bsc#1012452).
- btrfs: add semaphore to synchronize direct IO writes with fsync (bsc#1012452).
- btrfs: add tracepoint for adding block groups (bsc#1012452).
- btrfs: add tracepoints for flush events (bsc#1012452).
- btrfs: add transaction space reservation tracepoints (bsc#1012452).
- btrfs: add validadtion checks for chunk loading (bsc#1012452).
- btrfs: add write protection to SET_FEATURES ioctl (bsc#1012452).
- btrfs: allow balancing to dup with multi-device (bsc#1012452).
- btrfs: always reserve metadata for delalloc extents (bsc#1012452).
- btrfs: always use trans-&gt;block_rsv for orphans (bsc#1012452).
- btrfs: avoid blocking open_ctree from cleaner_kthread (bsc#1012452).
- btrfs: avoid deadlocks during reservations in btrfs_truncate_block (bsc#1012452).
- btrfs: avoid overflowing f_bfree (bsc#1012452).
- btrfs: avoid uninitialized variable warning (bsc#1012452).
- btrfs: btrfs_abort_transaction, drop root parameter (bsc#1012452).
- btrfs: __btrfs_buffered_write: Pass valid file offset when releasing delalloc space (bsc#1012452).
- btrfs: __btrfs_buffered_write: Reserve/release extents aligned to block size (bsc#1012452).
- btrfs: btrfs_check_super_valid: Allow 4096 as stripesize (bsc#1012452).
- btrfs: btrfs_debug should consume fs_info when DEBUG is not defined (bsc#1012452).
- btrfs: btrfs_ioctl_clone: Truncate complete page after performing clone operation (bsc#1012452).
- btrfs: btrfs_page_mkwrite: Reserve space in sectorsized units (bsc#1012452).
- btrfs: btrfs_relocate_chunk pass extent_root to btrfs_end_transaction (bsc#1012452).
- btrfs: btrfs_submit_direct_hook: Handle map_length &lt; bio vector length (bsc#1012452).
- btrfs: build fixup for qgroup_account_snapshot (bsc#1012452).
- btrfs: change BUG_ON()'s to ASSERT()'s in backref_cache_cleanup() (bsc#1012452).
- btrfs: change delayed reservation fallback behavior (bsc#1012452).
- btrfs: change how we calculate the global block rsv (bsc#1012452).
- btrfs: change how we update the global block rsv (bsc#1012452).
- btrfs: check btree node's nritems (bsc#1012452).
- btrfs: check if extent buffer is aligned to sectorsize (bsc#1012452).
- btrfs: check inconsistence between chunk and block group (bsc#1012452).
- btrfs: check reserved when deciding to background flush (bsc#1012452).
- btrfs: clarify do_chunk_alloc()'s return value (bsc#1012452).
- btrfs: Clean pte corresponding to page straddling i_size (bsc#1012452).
- btrfs: clean the old superblocks before freeing the device (bsc#1012452).
- btrfs: clean up and optimize __check_raid_min_device() (bsc#1012452).
- btrfs: cleanup assigning next active device with a check (bsc#1012452).
- btrfs: cleanup BUG_ON in merge_bio (bsc#1012452).
- btrfs: Cleanup compress_file_range() (bsc#1012452).
- btrfs: cleanup error handling in extent_write_cached_pages (bsc#1012452).
- btrfs: clear uptodate flags of pages in sys_array eb (bsc#1012452).
- btrfs: clone: use vmalloc only as fallback for nodesize bufer (bsc#1012452).
- btrfs: Compute and look up csums based on sectorsized blocks (bsc#1012452).
- btrfs: convert nodesize macros to static inlines (bsc#1012452).
- btrfs: convert printk(KERN_* to use pr_* calls (bsc#1012452).
- btrfs: convert pr_* to btrfs_* where possible (bsc#1012452).
- btrfs: convert send's verbose_printk to btrfs_debug (bsc#1012452).
- btrfs: copy_to_sk drop unused root parameter (bsc#1012452).
- btrfs: create a helper function to read the disk super (bsc#1012452).
- btrfs: create example debugfs file only in debugging build (bsc#1012452).
- btrfs: create helper btrfs_find_device_by_user_input() (bsc#1012452).
- btrfs: create helper function __check_raid_min_devices() (bsc#1012452).
- btrfs: csum_tree_block: return proper errno value (bsc#1012452).
- btrfs: detect corruption when non-root leaf has zero item (bsc#1012452).
- btrfs: device add and remove: use GFP_KERNEL (bsc#1012452).
- btrfs: Direct I/O read: Work on sectorsized blocks (bsc#1012452).
- btrfs: disable possible cause of premature ENOSPC (bsc#1040182)
- btrfs: divide btrfs_update_reserved_bytes() into two functions (bsc#1012452).
- btrfs: do not background blkdev_put() (bsc#1012452).
- btrfs: do not bother kicking async if there's nothing to reclaim (bsc#1012452).
- btrfs: do not BUG_ON() in btrfs_orphan_add (bsc#1012452).
- btrfs: do not create empty block group if we have allocated data (bsc#1012452).
- btrfs: do not decrease bytes_may_use when replaying extents (bsc#1012452).
- btrfs: do not do nocow check unless we have to (bsc#1012452).
- btrfs: do not do unnecessary delalloc flushes when relocating (bsc#1012452).
- btrfs: do not force mounts to wait for cleaner_kthread to delete one or more subvolumes (bsc#1012452).
- btrfs: do not wait for unrelated IO to finish before relocation (bsc#1012452).
- btrfs: do not WARN() in btrfs_transaction_abort() for IO errors (bsc#1035866).
- btrfs: do not write corrupted metadata blocks to disk (bsc#1012452).
- btrfs: end transaction if we abort when creating uuid root (bsc#1012452).
- btrfs: enhance btrfs_find_device_by_user_input() to check device path (bsc#1012452).
- btrfs: error out if generic_bin_search get invalid arguments (bsc#1012452).
- btrfs: expand cow_file_range() to support in-band dedup and subpage-blocksize (bsc#1012452).
- btrfs: extend btrfs_set_extent_delalloc and its friends to support in-band dedupe and subpage size patchset (bsc#1012452).
- btrfs: extent same: use GFP_KERNEL for page array allocations (bsc#1012452).
- btrfs: fallback to vmalloc in btrfs_compare_tree (bsc#1012452).
- btrfs: fallocate: use GFP_KERNEL (bsc#1012452).
- btrfs: fallocate: Work with sectorsized blocks (bsc#1012452).
- btrfs: fill relocation block rsv after allocation (bsc#1012452).
- btrfs: fix an integer overflow check (bsc#1012452).
- btrfs: fix a possible umount deadlock (bsc#1012452).
- btrfs: Fix block size returned to user space (bsc#1012452).
- btrfs: fix btrfs_no_printk stub helper (bsc#1012452).
- btrfs: Fix BUG_ON condition in scrub_setup_recheck_block() (bsc#1012452).
- btrfs: fix BUG_ON in btrfs_mark_buffer_dirty (bsc#1012452).
- btrfs: fix BUG_ON in btrfs_submit_compressed_write (bsc#1012452).
- btrfs: fix build warning (bsc#1012452).
- btrfs: fix callers of btrfs_block_rsv_migrate (bsc#1012452).
- btrfs: fix check_direct_IO() for non-iovec iterators (bsc#1012452).
- btrfs: fix check_shared for fiemap ioctl (bsc#1037177).
- btrfs: fix crash when tracepoint arguments are freed by wq callbacks (bsc#1012452).
- btrfs: fix data loss after truncate when using the no-holes feature (bsc#1036214).
- btrfs: fix deadlock in delayed_ref_async_start (bsc#1012452).
- btrfs: fix delalloc accounting after copy_from_user faults (bsc#1012452).
- btrfs: fix delalloc reservation amount tracepoint (bsc#1012452).
- btrfs: fix disk_i_size update bug when fallocate() fails (bsc#1012452).
- btrfs: fix divide error upon chunk's stripe_len (bsc#1012452).
- btrfs: fix double free of fs root (bsc#1012452).
- btrfs: fix eb memory leak due to readpage failure (bsc#1012452).
- btrfs: fix em leak in find_first_block_group (bsc#1012452).
- btrfs: fix emptiness check for dirtied extent buffers at check_leaf() (bsc#1012452).
- btrfs: fix error handling in map_private_extent_buffer (bsc#1012452).
- btrfs: fix error return code in btrfs_init_test_fs() (bsc#1012452).
- btrfs: fix extent_same allowing destination offset beyond i_size (bsc#1012452).
- btrfs: fix free space calculation in dump_space_info() (bsc#1012452).
- btrfs: fix fsfreeze hang caused by delayed iputs deal (bsc#1012452).
- btrfs: fix fspath error deallocation (bsc#1012452).
- btrfs: fix handling of faults from btrfs_copy_from_user (bsc#1012452).
- btrfs: fix int32 overflow in shrink_delalloc() (bsc#1012452).
- btrfs: Fix integer overflow when calculating bytes_per_bitmap (bsc#1012452).
- btrfs: fix invalid dereference in btrfs_retry_endio (bsc#1040395).
- btrfs: fix invalid reference in replace_path (bsc#1012452).
- btrfs: fix listxattrs not listing all xattrs packed in the same item (bsc#1012452).
- btrfs: fix lockdep deadlock warning due to dev_replace (bsc#1012452).
- btrfs: fix lock dep warning, move scratch dev out of device_list_mutex and uuid_mutex (bsc#1012452).
- btrfs: fix lock dep warning move scratch super outside of chunk_mutex (bsc#1012452).
- btrfs: fix __MAX_CSUM_ITEMS (bsc#1012452).
- btrfs: fix memory leak during RAID 5/6 device replacement (bsc#1012452).
- btrfs: fix memory leak of block group cache (bsc#1012452).
- btrfs: fix memory leak of reloc_root (bsc#1012452).
- btrfs: fix mixed block count of available space (bsc#1012452).
- btrfs: fix one bug that process may endlessly wait for ticket in wait_reserve_ticket() (bsc#1012452).
- btrfs: fix panic in balance due to EIO (bsc#1012452).
- btrfs: fix race between block group relocation and nocow writes (bsc#1012452).
- btrfs: fix race between device replace and block group removal (bsc#1012452).
- btrfs: fix race between device replace and chunk allocation (bsc#1012452).
- btrfs: fix race between device replace and discard (bsc#1012452).
- btrfs: fix race between device replace and read repair (bsc#1012452).
- btrfs: fix race between fsync and direct IO writes for prealloc extents (bsc#1012452).
- btrfs: fix race between readahead and device replace/removal (bsc#1012452).
- btrfs: fix race setting block group back to RW mode during device replace (bsc#1012452).
- btrfs: fix race setting block group readonly during device replace (bsc#1012452).
- btrfs: fix read_node_slot to return errors (bsc#1012452).
- btrfs: fix release reserved extents trace points (bsc#1012452).
- btrfs: fix segmentation fault when doing dio read (bsc#1040425).
- btrfs: Fix slab accounting flags (bsc#1012452).
- btrfs: fix truncate_space_check (bsc#1012452).
- btrfs: fix unexpected return value of fiemap (bsc#1012452).
- btrfs: fix unprotected assignment of the left cursor for device replace (bsc#1012452).
- btrfs: fix WARNING in btrfs_select_ref_head() (bsc#1012452).
- btrfs: flush_space: treat return value of do_chunk_alloc properly (bsc#1012452).
- btrfs: Force stripesize to the value of sectorsize (bsc#1012452).
- btrfs: free sys_array eb as soon as possible (bsc#1012452).
- btrfs: GFP_NOFS does not GFP_HIGHMEM (bsc#1012452).
- btrfs: Handle uninitialised inode eviction (bsc#1012452).
- btrfs: hide test-only member under ifdef (bsc#1012452).
- btrfs: improve check_node to avoid reading corrupted nodes (bsc#1012452).
- btrfs: Improve FL_KEEP_SIZE handling in fallocate (bsc#1012452).
- btrfs: introduce BTRFS_MAX_ITEM_SIZE (bsc#1012452).
- btrfs: introduce device delete by devid (bsc#1012452).
- btrfs: introduce raid-type to error-code table, for minimum device constraint (bsc#1012452).
- btrfs: introduce ticketed enospc infrastructure (bsc#1012452).
- btrfs: introduce tickets_id to determine whether asynchronous metadata reclaim work makes progress (bsc#1012452).
- btrfs: ioctl: reorder exclusive op check in RM_DEV (bsc#1012452).
- btrfs: kill BUG_ON in do_relocation (bsc#1012452).
- btrfs: kill BUG_ON in run_delayed_tree_ref (bsc#1012452).
- btrfs: kill BUG_ON()'s in btrfs_mark_extent_written (bsc#1012452).
- btrfs: kill invalid ASSERT() in process_all_refs() (bsc#1012452).
- btrfs: kill the start argument to read_extent_buffer_pages (bsc#1012452).
- btrfs: kill unused writepage_io_hook callback (bsc#1012452).
- btrfs: let callers of btrfs_alloc_root pass gfp flags (bsc#1012452).
- btrfs: Limit inline extents to root-&gt;sectorsize (bsc#1012452).
- btrfs: make find_workspace always succeed (bsc#1012452).
- btrfs: make find_workspace warn if there are no workspaces (bsc#1012452).
- btrfs: make mapping-&gt;writeback_index point to the last written page (bsc#1012452).
- btrfs: make state preallocation more speculative in __set_extent_bit (bsc#1012452).
- btrfs: make sure device is synced before return (bsc#1012452).
- btrfs: make sure we stay inside the bvec during __btrfs_lookup_bio_sums (bsc#1012452).
- btrfs: make use of btrfs_find_device_by_user_input() (bsc#1012452).
- btrfs: make use of btrfs_scratch_superblocks() in btrfs_rm_device() (bsc#1012452).
- btrfs: Manually implement device_total_bytes getter/setter (bsc#1043912).
- btrfs: memset to avoid stale content in btree leaf (bsc#1012452).
- btrfs: memset to avoid stale content in btree node block (bsc#1012452).
- btrfs: move error handling code together in ctree.h (bsc#1012452).
- btrfs: optimize check for stale device (bsc#1012452).
- btrfs: Output more info for enospc_debug mount option (bsc#1012452).
- btrfs: parent_start initialization cleanup (bsc#1012452).
- btrfs: pass correct args to btrfs_async_run_delayed_refs() (bsc#1012452).
- btrfs: pass number of devices to btrfs_check_raid_min_devices (bsc#1012452).
- btrfs: pass the right error code to the btrfs_std_error (bsc#1012452).
- btrfs: preallocate compression workspaces (bsc#1012452).
- btrfs: Print Warning only if ENOSPC_DEBUG is enabled (bsc#1012452).
- btrfs: Ratelimit 'no csum found' info message (bsc#1012452).
- btrfs: reada: add all reachable mirrors into reada device list (bsc#1012452).
- btrfs: reada: Add missed segment checking in reada_find_zone (bsc#1012452).
- btrfs: reada: Avoid many times of empty loop (bsc#1012452).
- btrfs: reada: avoid undone reada extents in btrfs_reada_wait (bsc#1012452).
- btrfs: reada: bypass adding extent when all zone failed (bsc#1012452).
- btrfs: reada: Fix a debug code typo (bsc#1012452).
- btrfs: reada: Fix in-segment calculation for reada (bsc#1012452).
- btrfs: reada: ignore creating reada_extent for a non-existent device (bsc#1012452).
- btrfs: reada: Jump into cleanup in direct way for __readahead_hook() (bsc#1012452).
- btrfs: reada: limit max works count (bsc#1012452).
- btrfs: reada: Move is_need_to_readahead contition earlier (bsc#1012452).
- btrfs: reada: move reada_extent_put to place after __readahead_hook() (bsc#1012452).
- btrfs: reada: Pass reada_extent into __readahead_hook directly (bsc#1012452).
- btrfs: reada: reduce additional fs_info-&gt;reada_lock in reada_find_zone (bsc#1012452).
- btrfs: reada: Remove level argument in severial functions (bsc#1012452).
- btrfs: reada: simplify dev-&gt;reada_in_flight processing (bsc#1012452).
- btrfs: reada: Use fs_info instead of root in __readahead_hook's argument (bsc#1012452).
- btrfs: reada: use GFP_KERNEL everywhere (bsc#1012452).
- btrfs: readdir: use GFP_KERNEL (bsc#1012452).
- btrfs: refactor btrfs_dev_replace_start for reuse (bsc#1012452).
- btrfs: Refactor btrfs_lock_cluster() to kill compiler warning (bsc#1012452).
- btrfs: remove BUG() in raid56 (bsc#1012452).
- btrfs: remove BUG_ON in start_transaction (bsc#1012452).
- btrfs: remove BUG_ON()'s in btrfs_map_block (bsc#1012452).
- btrfs: remove build fixup for qgroup_account_snapshot (bsc#1012452).
- btrfs: remove redundant error check (bsc#1012452).
- btrfs: remove save_error_info() (bsc#1012452).
- btrfs: remove unnecessary btrfs_mark_buffer_dirty in split_leaf (bsc#1012452).
- btrfs: remove unused function btrfs_assert() (bsc#1012452).
- btrfs: rename and document compression workspace members (bsc#1012452).
- btrfs: rename btrfs_find_device_by_user_input (bsc#1012452).
- btrfs: rename btrfs_std_error to btrfs_handle_fs_error (bsc#1012452).
- btrfs: rename __check_raid_min_devices (bsc#1012452).
- btrfs: rename flags for vol args v2 (bsc#1012452).
- btrfs: reorg btrfs_close_one_device() (bsc#1012452).
- btrfs: Replace -ENOENT by -ERANGE in btrfs_get_acl() (bsc#1012452).
- btrfs: Reset IO error counters before start of device replacing (bsc#1012452).
- btrfs: reuse existing variable in scrub_stripe, reduce stack usage (bsc#1012452).
- btrfs: Round down values which are written for total_bytes_size (bsc#1043912).
- btrfs: s_bdev is not null after missing replace (bsc#1012452).
- btrfs: scrub: Set bbio to NULL before calling btrfs_map_block (bsc#1012452).
- btrfs: scrub: use GFP_KERNEL on the submission path (bsc#1012452).
- btrfs: Search for all ordered extents that could span across a page (bsc#1012452).
- btrfs: send: silence an integer overflow warning (bsc#1012452).
- btrfs: send: use GFP_KERNEL everywhere (bsc#1012452).
- btrfs: send: use temporary variable to store allocation size (bsc#1012452).
- btrfs: send: use vmalloc only as fallback for clone_roots (bsc#1012452).
- btrfs: send: use vmalloc only as fallback for clone_sources_tmp (bsc#1012452).
- btrfs: send: use vmalloc only as fallback for read_buf (bsc#1012452).
- btrfs: send: use vmalloc only as fallback for send_buf (bsc#1012452).
- btrfs: Simplify conditions about compress while mapping btrfs flags to inode flags (bsc#1012452).
- btrfs: sink gfp parameter to clear_extent_bits (bsc#1012452).
- btrfs: sink gfp parameter to clear_extent_dirty (bsc#1012452).
- btrfs: sink gfp parameter to clear_record_extent_bits (bsc#1012452).
- btrfs: sink gfp parameter to convert_extent_bit (bsc#1012452).
- btrfs: sink gfp parameter to set_extent_bits (bsc#1012452).
- btrfs: sink gfp parameter to set_extent_defrag (bsc#1012452).
- btrfs: sink gfp parameter to set_extent_delalloc (bsc#1012452).
- btrfs: sink gfp parameter to set_extent_new (bsc#1012452).
- btrfs: sink gfp parameter to set_record_extent_bits (bsc#1012452).
- btrfs: skip commit transaction if we do not have enough pinned bytes (bsc#1037186).
- btrfs: subpage-blocksize: Rate limit scrub error message (bsc#1012452).
- btrfs: switch to common message helpers in open_ctree, adjust messages (bsc#1012452).
- btrfs: switch to kcalloc in btrfs_cmp_data_prepare (bsc#1012452).
- btrfs: sysfs: protect reading label by lock (bsc#1012452).
- btrfs: trace pinned extents (bsc#1012452).
- btrfs: track transid for delayed ref flushing (bsc#1012452).
- btrfs: uapi/linux/btrfs.h migration, document subvol flags (bsc#1012452).
- btrfs: uapi/linux/btrfs.h migration, move balance flags (bsc#1012452).
- btrfs: uapi/linux/btrfs.h migration, move BTRFS_LABEL_SIZE (bsc#1012452).
- btrfs: uapi/linux/btrfs.h migration, move feature flags (bsc#1012452).
- btrfs: uapi/linux/btrfs.h migration, move struct btrfs_ioctl_defrag_range_args (bsc#1012452).
- btrfs: uapi/linux/btrfs.h migration, qgroup limit flags (bsc#1012452).
- btrfs: uapi/linux/btrfs_tree.h migration, item types and defines (bsc#1012452).
- btrfs: uapi/linux/btrfs_tree.h, use __u8 and __u64 (bsc#1012452).
- btrfs: unsplit printed strings (bsc#1012452).
- btrfs: untangle gotos a bit in __clear_extent_bit (bsc#1012452).
- btrfs: untangle gotos a bit in convert_extent_bit (bsc#1012452).
- btrfs: untangle gotos a bit in __set_extent_bit (bsc#1012452).
- btrfs: update btrfs_space_info's bytes_may_use timely (bsc#1012452).
- btrfs: Use correct format specifier (bsc#1012452).
- btrfs: use correct offset for reloc_inode in prealloc_file_extent_cluster() (bsc#1012452).
- btrfs: use dynamic allocation for root item in create_subvol (bsc#1012452).
- btrfs: Use (eb-&gt;start, seq) as search key for tree modification log (bsc#1012452).
- btrfs: use existing device constraints table btrfs_raid_array (bsc#1012452).
- btrfs: use FLUSH_LIMIT for relocation in reserve_metadata_bytes (bsc#1012452).
- btrfs: use fs_info directly (bsc#1012452).
- btrfs: use new error message helper in qgroup_account_snapshot (bsc#1012452).
- btrfs: use proper type for failrec in extent_state (bsc#1012452).
- btrfs: use root when checking need_async_flush (bsc#1012452).
- btrfs: use the correct struct for BTRFS_IOC_LOGICAL_INO (bsc#1012452).
- btrfs: Use __u64 in exported linux/btrfs.h (bsc#1012452).
- btrfs: warn_on for unaccounted spaces (bsc#1012452).
- ceph: check i_nlink while converting a file handle to dentry (bsc#1039864).
- ceph: Check that the new inode size is within limits in ceph_fallocate() (bsc#1037969).
- ceph: Correctly return NXIO errors from ceph_llseek (git-fixes).
- ceph: fix file open flags on ppc64 (bsc#1022266).
- ceph: fix memory leak in __ceph_setxattr() (bsc#1036763).
- ceph: fix potential use-after-free (bsc#1043371).
- ceph: fix recursively call between ceph_set_acl and __ceph_setattr (bsc#1034902).
- ceph: memory leak in ceph_direct_read_write callback (bsc#1041810).
- cfq-iosched: fix the delay of cfq_group's vdisktime under iops mode (bsc#1012829).
- cgroup: remove redundant cleanup in css_create (bsc#1012829).
- cifs: backport prepath matching fix (bsc#799133).
- cifs: small underflow in cnvrtDosUnixTm() (bnc#1043935).
- clk: Make x86/ conditional on CONFIG_COMMON_CLK (4.4.68 stable queue).
- cpupower: Fix turbo frequency reporting for pre-Sandy Bridge cores (4.4.68 stable queue).
- crypto: algif_aead - Require setkey before accept(2) (bsc#1031717).
- crypto: sha-mb - Fix load failure (bsc#1037384).
- cxgb4: Add control net_device for configuring PCIe VF (bsc#1021424).
- cxgb4: Add llseek operation for flash debugfs entry (bsc#1021424).
- cxgb4: add new routine to get adapter info (bsc#1021424).
- cxgb4: Add PCI device ID for new adapter (bsc#1021424).
- cxgb4: Add port description for new cards (bsc#1021424).
- cxgb4: Add support to enable logging of firmware mailbox commands (bsc#1021424).
- cxgb4: Check for firmware errors in the mailbox command loop (bsc#1021424).
- cxgb4: correct device ID of T6 adapter (bsc#1021424).
- cxgb4/cxgb4vf: Add set VF mac address support (bsc#1021424).
- cxgb4/cxgb4vf: Allocate more queues for 25G and 100G adapter (bsc#1021424).
- cxgb4/cxgb4vf: Assign netdev-&gt;dev_port with port ID (bsc#1021424).
- cxgb4/cxgb4vf: Display 25G and 100G link speed (bsc#1021424).
- cxgb4/cxgb4vf: Remove deprecated module parameters (bsc#1021424).
- cxgb4: DCB message handler needs to use correct portid to netdev mapping (bsc#1021424).
- cxgb4: Decode link down reason code obtained from firmware (bsc#1021424).
- cxgb4: Do not assume FW_PORT_CMD reply is always port info msg (bsc#1021424).
- cxgb4: do not call napi_hash_del() (bsc#1021424).
- cxgb4: Do not sleep when mbox cmd is issued from interrupt context (bsc#1021424).
- cxgb4: Enable SR-IOV configuration via PCI sysfs interface (bsc#1021424).
- cxgb4: Fix issue while re-registering VF mgmt netdev (bsc#1021424).
- cxgb4: MU requested by Chelsio (bsc#1021424).
- cxgb4: Properly decode port module type (bsc#1021424).
- cxgb4: Refactor t4_port_init function (bsc#1021424).
- cxgb4: Reset dcb state machine and tx queue prio only if dcb is enabled (bsc#1021424).
- cxgb4: Support compressed error vector for T6 (bsc#1021424).
- cxgb4: Synchronize access to mailbox (bsc#1021424).
- cxgb4: update latest firmware version supported (bsc#1021424).
- dell-laptop: Adds support for keyboard backlight timeout AC settings (bsc#1013561).
- Disable CONFIG_POWER_SUPPLY_DEBUG in debug kernel (bsc#1031500).
- dmaengine: dw: fix typo in Kconfig (bsc#1031717).
- dm: fix dm_target_io leak if clone_bio() returns an error (bsc#1040125).
- dm-mpath: fix race window in do_end_io() (bsc#1011044).
- dm: remove dummy dm_table definition (bsc#1045307)
- dm round robin: do not use this_cpu_ptr() without having preemption disabled (bsc#1040125).
- dm verity fec: fix block calculation (bsc#1040125).
- dm verity fec: fix bufio leaks (bsc#1040125).
- dm verity fec: limit error correction recursion (bsc#1040125).
- drivers: base: dma-mapping: Fix typo in dmam_alloc_non_coherent comments (bsc#1031717).
- Drivers: hv: vmbus: Raise retry/wait limits in vmbus_post_msg() (fate#320485, bsc#1023287, bsc#1028217).
- drivers/tty: 8250: only call fintek_8250_probe when doing port I/O (bsc#1031717).
- drm/i915: Disable tv output on i9x5gm (bsc#1039700).
- drm/i915: Do not touch NULL sg on i915_gem_object_get_pages_gtt() error (bsc#1031717).
- drm/i915: Fix mismatched INIT power domain disabling during suspend (bsc#1031717).
- drm/i915: Introduce Kabypoint PCH for Kabylake H/DT (bsc#1032581).
- drm/i915: Nuke debug messages from the pipe update critical section (bsc#1031717).
- drm/i915: Program iboost settings for HDMI/DVI on SKL (bsc#1031717).
- drm/i915: relax uncritical udelay_range() (bsc#1031717).
- drm/i915: relax uncritical udelay_range() settings (bsc#1031717).
- drm/i915: Use pagecache write to prepopulate shmemfs from pwrite-ioctl (bsc#1040463).
- drm/mgag200: Fix to always set HiPri for G200e4 (bsc#1015452, bsc#995542).
- drm/nouveau/tmr: fully separate alarm execution/pending lists (bsc#1043467).
- drm/ttm: fix use-after-free races in vm fault handling (4.4.68 stable queue).
- e1000e: Do not return uninitialized stats (bug#1034635).
- efi: Do not issue error message when booted under Xen (bnc#1036638).
- enic: set skb-&gt;hash type properly (bsc#922871 fate#318754).
- ext4: fix data corruption for mmap writes (bsc#1012829).
- ext4: fix data corruption with EXT4_GET_BLOCKS_ZERO (bsc#1012829).
- ext4: fix use-after-iput when fscrypt contexts are inconsistent (bsc#1012829).
- f2fs: fix bad prefetchw of NULL page (bsc#1012829).
- f2fs: sanity check segment count (4.4.68 stable queue).
- Fix kabi after adding new field to struct mddev (bsc#1040351).
- Fix soft lockup in svc_rdma_send (bsc#1044854).
- fnic: Return 'DID_IMM_RETRY' if rport is not ready (bsc#1035920).
- fs/block_dev: always invalidate cleancache in invalidate_bdev() (git-fixes).
- fs: fix data invalidation in the cleancache during direct IO (git-fixes).
- fs/xattr.c: zero out memory copied to userspace in getxattr (git-fixes).
- ftrace: Make ftrace_location_range() global (FATE#322421).
- fuse: fix clearing suid, sgid for chown() (bsc#1012829).
- hpsa: limit transfer length to 1MB (bsc#1025461).
- hwpoison, memcg: forcibly uncharge LRU pages (bnc#1046105).
- ib/addr: Fix setting source address in addr6_resolve() (bsc#1044082).
- ib/core: Fix kernel crash during fail to initialize device (bsc#1022595).
- ib/core: For multicast functions, verify that LIDs are multicast LIDs (bsc#1022595).
- ib/core: If the MGID/MLID pair is not on the list return an error (bsc#1022595).
- ib/ipoib: Fix deadlock between ipoib_stop and mcast join flow (bsc#1022595).
- ib/ipoib: Fix memory leak in create child syscall (bsc#1022595).
- ib/mlx5: Assign DSCP for R-RoCE QPs Address Path (bsc#966170 bsc#966172 bsc#966191).
- ib/mlx5: Check supported flow table size (bsc#966170 bsc#966172 bsc#966191).
- ib/mlx5: Enlarge autogroup flow table (bsc#966170 bsc#966172 bsc#966191).
- ib/mlx5: Fix kernel to user leak prevention logic (bsc#966170 bsc#966172 bsc#966191).
- ibmvnic: Activate disabled RX buffer pools on reset (bsc#1044767).
- ibmvnic: Add set_link_state routine for setting adapter link state (fate#322021, bsc#1031512).
- ibmvnic: Allocate number of rx/tx buffers agreed on by firmware (fate#322021, bsc#1031512).
- ibmvnic: Allocate zero-filled memory for sub crqs (fate#322021, bsc#1031512).
- ibmvnic: Call napi_disable instead of napi_enable in failure path (fate#322021, bsc#1031512).
- ibmvnic: Check adapter state during ibmvnic_poll (fate#322021, bsc#1040855).
- ibmvnic: Check for driver reset first in ibmvnic_xmit (fate#322021, bsc#1038297).
- ibmvnic: Cleanup failure path in ibmvnic_open (fate#322021, bsc#1031512).
- ibmvnic: Clean up tx pools when closing (fate#322021, bsc#1038297).
- ibmvnic: Client-initiated failover (bsc#1043990).
- ibmvnic: Continue skb processing after skb completion error (fate#322021, bsc#1038297).
- ibmvnic: Correct crq and resource releasing (fate#322021, bsc#1031512).
- ibmvnic: Correct ibmvnic handling of device open/close (fate#322021, bsc#1031512).
- ibmvnic: Correct return code checking for ibmvnic_init during probe (bsc#1045286).
- ibmvnic: Create init and release routines for the bounce buffer (fate#322021, bsc#1031512).
- ibmvnic: Create init and release routines for the rx pool (fate#322021, bsc#1031512).
- ibmvnic: Create init and release routines for the tx pool (fate#322021, bsc#1031512).
- ibmvnic: Create init/release routines for stats token (fate#322021, bsc#1031512).
- ibmvnic: Deactivate RX pool buffer replenishment on H_CLOSED (fate#322021, bsc#1040855).
- ibmvnic: Delete napi's when releasing driver resources (fate#322021, bsc#1038297).
- ibmvnic: Disable irq prior to close (fate#322021, bsc#1031512).
- ibmvnic: Do not disable IRQ after scheduling tasklet (fate#322021, bsc#1031512).
- ibmvnic: driver initialization for kdump/kexec (bsc#1044772).
- ibmvnic: Ensure that TX queues are disabled in __ibmvnic_close (bsc#1044767).
- ibmvnic: Exit polling routine correctly during adapter reset (bsc#1044767).
- ibmvnic: Fix assignment of RX/TX IRQ's (bsc#1046589).
- ibmvnic: Fix cleanup of SKB's on driver close (fate#322021, bsc#1040855).
- ibmvnic: Fix endian errors in error reporting output (fate#322021, bsc#1031512).
- ibmvnic: Fix endian error when requesting device capabilities (fate#322021, bsc#1031512).
- ibmvnic: Fix error handling when registering long-term-mapped  buffers (bsc#1045568).
- ibmvnic: Fix ibmvnic_change_mac_addr struct format (fate#322021, bsc#1031512).
- ibmvnic: Fix incorrectly defined ibmvnic_request_map_rsp structure (bsc#1045568).
- ibmvnic: Fix initial MTU settings (bsc#1031512).
- ibmvnic: fix missing unlock on error in __ibmvnic_reset() (fate#322021, bsc#1038297, Fixes: ed651a10875f).
- ibmvnic: Fix overflowing firmware/hardware TX queue (fate#322021, bsc#1031512).
- ibmvnic: Fixup atomic API usage (fate#322021, bsc#1031512).
- ibmvnic: Free skb's in cases of failure in transmit (fate#322021, bsc#1031512).
- ibmvnic: Free tx/rx scrq pointer array when releasing sub-crqs (fate#322021, bsc#1031512).
- ibmvnic: Halt TX and report carrier off on H_CLOSED return code (fate#322021, bsc#1040855).
- ibmvnic: Handle failover after failed init crq (fate#322021, bsc#1040855).
- ibmvnic: Handle processing of CRQ messages in a tasklet (fate#322021, bsc#1031512).
- ibmvnic: Initialize completion variables before starting work (fate#322021, bsc#1031512).
- ibmvnic: Insert header on VLAN tagged received frame (fate#322021, bsc#1031512).
- ibmvnic: Make CRQ interrupt tasklet wait for all capabilities crqs (fate#322021, bsc#1031512).
- ibmvnic: Merge the two release_sub_crq_queue routines (fate#322021, bsc#1031512).
- ibmvnic: Move ibmvnic adapter intialization to its own routine (fate#322021, bsc#1031512).
- ibmvnic: Move initialization of sub crqs to ibmvnic_init (fate#322021, bsc#1031512).
- ibmvnic: Move initialization of the stats token to ibmvnic_open (fate#322021, bsc#1031512).
- ibmvnic: Move login and queue negotiation into ibmvnic_open (fate#322021, bsc#1031512).
- ibmvnic: Move login to its own routine (fate#322021, bsc#1031512).
- ibmvnic: Move queue restarting in ibmvnic_tx_complete (fate#322021, bsc#1038297).
- ibmvnic: Move resource initialization to its own routine (fate#322021, bsc#1038297).
- ibmvnic: Non-fatal error handling (fate#322021, bsc#1040855).
- ibmvnic: Only retrieve error info if present (fate#322021, bsc#1031512).
- ibmvnic: Record SKB RX queue during poll (fate#322021, bsc#1038297).
- ibmvnic: Remove debugfs support (fate#322021, bsc#1031512).
- ibmvnic: Remove inflight list (fate#322021, bsc#1031512).
- ibmvnic: Remove module author mailing address (bsc#1045467).
- ibmvnic: Remove netdev notify for failover resets (bsc#1044120).
- ibmvnic: Remove unused bouce buffer (fate#322021, bsc#1031512).
- ibmvnic: Remove VNIC_CLOSING check from pending_scrq (bsc#1044767).
- ibmvnic: Replace is_closed with state field (fate#322021, bsc#1038297).
- ibmvnic: Report errors when failing to release sub-crqs (fate#322021, bsc#1031512).
- ibmvnic: Reset sub-crqs during driver reset (fate#322021, bsc#1040855).
- ibmvnic: Reset the CRQ queue during driver reset (fate#322021, bsc#1040855).
- ibmvnic: Reset tx/rx pools on driver reset (fate#322021, bsc#1040855).
- ibmvnic: Return failure on attempted mtu change (bsc#1043236).
- ibmvnic: Return from ibmvnic_resume if not in VNIC_OPEN state (bsc#1045235).
- ibmvnic: Sanitize entire SCRQ buffer on reset (bsc#1044767).
- ibmvnic: Send gratuitous arp on reset (fate#322021, bsc#1040855).
- ibmvnic: Set real number of rx queues (fate#322021, bsc#1031512).
- ibmvnic: Split initialization of scrqs to its own routine (fate#322021, bsc#1031512).
- ibmvnic: Track state of adapter napis (fate#322021, bsc#1040855).
- ibmvnic: Unmap longer term buffer before free (fate#322021, bsc#1031512).
- ibmvnic: Updated reset handling (fate#322021, bsc#1038297).
- ibmvnic: Update main crq initialization and release (fate#322021, bsc#1031512).
- ibmvnic: Use common counter for capabilities checks (fate#322021, bsc#1031512).
- ibmvnic: use max_mtu instead of req_mtu for MTU range check (bsc#1031512).
- ibmvnic: Validate napi exist before disabling them (fate#322021, bsc#1031512).
- ibmvnic: Wait for any pending scrqs entries at driver close (fate#322021, bsc#1038297).
- ibmvnic: Whitespace correction in release_rx_pools (fate#322021, bsc#1038297).
- iio: hid-sensor: Store restore poll and hysteresis on S3 (bsc#1031717).
- infiniband: avoid dereferencing uninitialized dst on error path (git-fixes).
- iommu/arm-smmu: Disable stalling faults for all endpoints (bsc#1038843).
- iommu/dma: Respect IOMMU aperture when allocating (bsc#1038842).
- iommu/exynos: Block SYSMMU while invalidating FLPD cache (bsc#1038848).
- iommu: Handle default domain attach failure (bsc#1038846).
- iommu/vt-d: Do not over-free page table directories (bsc#1038847).
- ipv4, ipv6: ensure raw socket message is big enough to hold an IP header (4.4.68 stable queue).
- ipv6: Do not use ufo handling on later transformed packets (bsc#1042286).
- ipv6: fix endianness error in icmpv6_err (bsc#1042286).
- ipv6: initialize route null entry in addrconf_init() (4.4.68 stable queue).
- ipv6: release dst on error in ip6_dst_lookup_tail (git-fixes).
- ipv6: reorder ip6_route_dev_notifier after ipv6_dev_notf (4.4.68 stable queue).
- isa: Call isa_bus_init before dependent ISA bus drivers register (bsc#1031717).
- iscsi-target: Return error if unable to add network portal (bsc#1032803).
- iw_cxgb4: Fix error return code in c4iw_rdev_open() (bsc#1026570).
- iw_cxgb4: Guard against null cm_id in dump_ep/qp (bsc#1026570).
- iwlwifi: 8000: fix MODULE_FIRMWARE input.
- iwlwifi: 9000: increase the number of queues.
- iwlwifi: add device ID for 8265.
- iwlwifi: add device IDs for the 8265 device.
- iwlwifi: add disable_11ac module param.
- iwlwifi: add new 3168 series devices support.
- iwlwifi: add new 8260 PCI IDs.
- iwlwifi: add new 8265.
- iwlwifi: add new 8265 series PCI ID.
- iwlwifi: Add new PCI IDs for 9260 and 5165 series.
- iwlwifi: Add PCI IDs for the new 3168 series.
- iwlwifi: Add PCI IDs for the new series 8165.
- iwlwifi: add support for 12K Receive Buffers.
- iwlwifi: add support for getting HW address from CSR.
- iwlwifi: avoid d0i3 commands when no/init ucode is loaded.
- iwlwifi: bail out in case of bad trans state.
- iwlwifi: block the queues when we send ADD_STA for uAPSD.
- iwlwifi: change the Intel Wireless email address.
- iwlwifi: change the Intel Wireless email address.
- iwlwifi: check for valid ethernet address provided by OEM.
- iwlwifi: clean up transport debugfs handling.
- iwlwifi: clear ieee80211_tx_info-&gt;driver_data in the op_mode.
- iwlwifi: Document missing module options.
- iwlwifi: dump prph registers in a common place for all transports.
- iwlwifi: dvm: advertise NETIF_F_SG.
- iwlwifi: dvm: fix compare_const_fl.cocci warnings.
- iwlwifi: dvm: handle zero brightness for wifi LED.
- iwlwifi: dvm: remove a wrong dependency on m.
- iwlwifi: dvm: remove Kconfig default.
- iwlwifi: dvm: remove stray debug code.
- iwlwifi: export the _no_grab version of PRPH IO functions.
- iwlwifi: expose fw usniffer mode to more utilities.
- iwlwifi: fix double hyphen in MODULE_FIRMWARE for 8000.
- iwlwifi: Fix firmware name maximum length definition.
- iwlwifi: fix name of ucode loaded for 8265 series.
- iwlwifi: fix printf specifier.
- iwlwifi: generalize d0i3_entry_timeout module parameter.
- iwlwifi: mvm: adapt the firmware assert log to new firmware.
- iwlwifi: mvm: add 9000-series RX API.
- iwlwifi: mvm: add 9000 series RX processing.
- iwlwifi: mvm: add a non-trigger window to fw dbg triggers.
- iwlwifi: mvm: add an option to start rs from HT/VHT rates.
- iwlwifi: mvm: Add a station in monitor mode.
- iwlwifi: mvm: add bt rrc and ttc to debugfs.
- iwlwifi: mvm: add bt settings to debugfs.
- iwlwifi: mvm: add ctdp operations to debugfs.
- iwlwifi: mvm: add CT-KILL notification.
- iwlwifi: mvm: add debug print if scan config is ignored.
- iwlwifi: mvm: add extended dwell time.
- iwlwifi: mvm: add new ADD_STA command version.
- iwlwifi: mvm: Add P2P client snoozing.
- iwlwifi: mvm: add registration to cooling device.
- iwlwifi: mvm: add registration to thermal zone.
- iwlwifi: mvm: add support for negative temperatures.
- iwlwifi: mvm: add tlv for multi queue rx support.
- iwlwifi: mvm: add trigger for firmware dump upon TDLS events.
- iwlwifi: mvm: add trigger for firmware dump upon TX response status.
- iwlwifi: mvm: advertise NETIF_F_SG.
- iwlwifi: mvm: Align bt-coex priority with requirements.
- iwlwifi: mvm: allow to disable beacon filtering for AP/GO interface.
- iwlwifi: mvm: avoid harmless -Wmaybe-uninialized warning.
- iwlwifi: mvm: avoid panics with thermal device usage.
- iwlwifi: mvm: avoid to WARN about gscan capabilities.
- iwlwifi: mvm: bail out if CTDP start operation fails.
- iwlwifi: mvm: bump firmware API to 21.
- iwlwifi: mvm: bump max API to 20.
- iwlwifi: mvm: change access to ieee80211_hdr.
- iwlwifi: mvm: change iwl_mvm_get_key_sta_id() to return the station.
- iwlwifi: mvm: change mcc update API.
- iwlwifi: mvm: change name of iwl_mvm_d3_update_gtk.
- iwlwifi: mvm: Change number of associated stations when station becomes associated.
- iwlwifi: mvm: change protocol offload flows.
- iwlwifi: mvm: change the check for ADD_STA status.
- iwlwifi: mvm: check FW's response for nvm access write cmd.
- iwlwifi: mvm: check iwl_mvm_wowlan_config_key_params() return value.
- iwlwifi: mvm: check minimum temperature notification length.
- iwlwifi: mvm: cleanup roc te on restart cleanup.
- iwlwifi: mvm: Configure fragmented scan for scheduled scan.
- iwlwifi: mvm: configure scheduled scan according to traffic conditions.
- iwlwifi: mvm: constify the parameters of a few functions in fw-dbg.c.
- iwlwifi: mvm: Disable beacon storing in D3 when WOWLAN configured.
- iwlwifi: mvm: disable DQA support.
- iwlwifi: mvm: do not ask beacons when P2P GO vif and no assoc sta.
- iwlwifi: mvm: do not keep an mvm ref when the interface is down.
- iwlwifi: mvm: do not let NDPs mess the packet tracking.
- iwlwifi: mvm: do not restart HW if suspend fails with unified image.
- iwlwifi: mvm: Do not switch to D3 image on suspend.
- iwlwifi: mvm: do not try to offload AES-CMAC in AP/IBSS modes.
- iwlwifi: mvm: drop low_latency_agg_frame_cnt_limit.
- iwlwifi: mvm: dump more registers upon error.
- iwlwifi: mvm: dump the radio registers when the firmware crashes.
- iwlwifi: mvm: enable L3 filtering.
- iwlwifi: mvm: Enable MPLUT only on supported hw.
- iwlwifi: mvm: enable VHT MU-MIMO for supported hardware.
- iwlwifi: mvm: extend time event duration.
- iwlwifi: mvm: fix accessing Null pointer during fw dump collection.
- iwlwifi: mvm: fix d3_test with unified D0/D3 images.
- iwlwifi: mvm: fix debugfs signedness warning.
- iwlwifi: mvm: fix extended dwell time.
- iwlwifi: mvm: fix incorrect fallthrough in iwl_mvm_check_running_scans().
- iwlwifi: mvm: fix memory leaks in error paths upon fw error dump.
- iwlwifi: mvm: fix netdetect starting/stopping for unified images.
- iwlwifi: mvm: fix RSS key sizing.
- iwlwifi: mvm: fix unregistration of thermal in some error flows.
- iwlwifi: mvm: flush all used TX queues before suspending.
- iwlwifi: mvm: forbid U-APSD for P2P Client if the firmware does not support it.
- iwlwifi: mvm: handle pass all scan reporting.
- iwlwifi: mvm: ignore LMAC scan notifications when running UMAC scans.
- iwlwifi: mvm: infrastructure for frame-release message.
- iwlwifi: mvm: kill iwl_mvm_enable_agg_txq.
- iwlwifi: mvm: let the firmware choose the antenna for beacons.
- iwlwifi: mvm: make collecting fw debug data optional.
- iwlwifi: mvm: move fw-dbg code to separate file.
- iwlwifi: mvm: only release the trans ref if d0i3 is supported in fw.
- iwlwifi: mvm: prepare the code towards TSO implementation.
- iwlwifi: mvm: refactor d3 key update functions.
- iwlwifi: mvm: refactor the way fw_key_table is handled.
- iwlwifi: mvm: remove an extra tab.
- iwlwifi: mvm: Remove bf_vif from iwl_power_vifs.
- iwlwifi: mvm: Remove iwl_mvm_update_beacon_abort.
- iwlwifi: mvm: remove redundant d0i3 flag from the config struct.
- iwlwifi: mvm: remove shadowing variable.
- iwlwifi: mvm: remove stray nd_config element.
- iwlwifi: mvm: remove the vif parameter of iwl_mvm_configure_bcast_filter().
- iwlwifi: mvm: remove unnecessary check in iwl_mvm_is_d0i3_supported().
- iwlwifi: mvm: remove useless WARN_ON and rely on cfg80211's combination.
- iwlwifi: mvm: report wakeup for wowlan.
- iwlwifi: mvm: reset mvm-&gt;scan_type when firmware is started.
- iwlwifi: mvm: return the cooling state index instead of the budget.
- iwlwifi: mvm: ROC: cleanup time event info on FW failure.
- iwlwifi: mvm: ROC: Extend the ROC max delay duration &amp; limit ROC duration.
- iwlwifi: mvm: rs: fix a potential out of bounds access.
- iwlwifi: mvm: rs: fix a theoretical access to uninitialized array elements.
- iwlwifi: mvm: rs: fix a warning message.
- iwlwifi: mvm: rs: fix TPC action decision algorithm.
- iwlwifi: mvm: rs: fix TPC statistics handling.
- iwlwifi: mvm: Send power command on BSS_CHANGED_BEACON_INFO if needed.
- iwlwifi: mvm: set default new STA as non-aggregated.
- iwlwifi: mvm: set the correct amsdu enum values.
- iwlwifi: mvm: set the correct descriptor size for tracing.
- iwlwifi: mvm: small update in the firmware API.
- iwlwifi: mvm: support A-MSDU in A-MPDU.
- iwlwifi: mvm: support beacon storing.
- iwlwifi: mvm: support description for user triggered fw dbg collection.
- iwlwifi: mvm: support rss queues configuration command.
- iwlwifi: mvm: Support setting continuous recording debug mode.
- iwlwifi: mvm: support setting minimum quota from debugfs.
- iwlwifi: mvm: support sw queue start/stop from mvm.
- iwlwifi: mvm: take care of padded packets.
- iwlwifi: mvm: take the transport ref back when leaving.
- iwlwifi: mvm: track low-latency sources separately.
- iwlwifi: mvm: update GSCAN capabilities.
- iwlwifi: mvm: update ucode status before stopping device.
- iwlwifi: mvm: use build-time assertion for fw trigger ID.
- iwlwifi: mvm: use firmware station lookup, combine code.
- iwlwifi: mvm: various trivial cleanups.
- iwlwifi: mvm: writing zero bytes to debugfs causes a crash.
- iwlwifi: nvm: fix loading default NVM file.
- iwlwifi: nvm: fix up phy section when reading it.
- iwlwifi: pcie: add 9000 series multi queue rx DMA support.
- iwlwifi: pcie: add infrastructure for multi-queue rx.
- iwlwifi: pcie: add initial RTPM support for PCI.
- iwlwifi: pcie: Add new configuration to enable MSIX.
- iwlwifi: pcie: add pm_prepare and pm_complete ops.
- iwlwifi: pcie: add RTPM support when wifi is enabled.
- iwlwifi: pcie: aggregate Flow Handler configuration writes.
- iwlwifi: pcie: allow the op_mode to block the tx queues.
- iwlwifi: pcie: allow to pretend to have Tx CSUM for debug.
- iwlwifi: pcie: avoid restocks inside rx loop if not emergency.
- iwlwifi: pcie: buffer packets to avoid overflowing Tx queues.
- iwlwifi: pcie: build an A-MSDU using TSO core.
- iwlwifi: pcie: configure more RFH settings.
- iwlwifi: pcie: detect and workaround invalid write ptr behavior.
- iwlwifi: pcie: do not increment / decrement a bool.
- iwlwifi: pcie: enable interrupts before releasing the NIC's CPU.
- iwlwifi: pcie: enable multi-queue rx path.
- iwlwifi: pcie: extend device reset delay.
- iwlwifi: pcie: fine tune number of rxbs.
- iwlwifi: pcie: fix a race in firmware loading flow.
- iwlwifi: pcie: fix erroneous return value.
- iwlwifi: pcie: fix global table size.
- iwlwifi: pcie: fix identation in trans.c.
- iwlwifi: pcie: fix RF-Kill vs. firmware load race.
- iwlwifi: pcie: forbid RTPM on device removal.
- iwlwifi: pcie: mark command queue lock with separate lockdep class.
- iwlwifi: pcie: prevent skbs shadowing in iwl_trans_pcie_reclaim.
- iwlwifi: pcie: refactor RXBs reclaiming code.
- iwlwifi: pcie: remove ICT allocation message.
- iwlwifi: pcie: remove pointer from debug message.
- iwlwifi: pcie: re-organize code towards TSO.
- iwlwifi: pcie: set RB chunk size back to 64.
- iwlwifi: pcie: update iwl_mpdu_desc fields.
- iwlwifi: print index in api/capa flags parsing message.
- iwlwifi: refactor the code that reads the MAC address from the NVM.
- iwlwifi: remove IWL_DL_LED.
- iwlwifi: remove unused parameter from grab_nic_access.
- iwlwifi: replace d0i3_mode and wowlan_d0i3 with more generic variables.
- iwlwifi: set max firmware version of 7265 to 17.
- iwlwifi: support ucode with d0 unified image - regular and usniffer.
- iwlwifi: trans: make various conversion macros inlines.
- iwlwifi: trans: support a callback for ASYNC commands.
- iwlwifi: treat iwl_parse_nvm_data() MAC addr as little endian.
- iwlwifi: tt: move ucode_loaded check under mutex.
- iwlwifi: uninline iwl_trans_send_cmd.
- iwlwifi: update host command messages to new format.
- iwlwifi: Update PCI IDs for 8000 and 9000 series.
- iwlwifi: update support for 3168 series firmware and NVM.
- iwlwifi: various comments and code cleanups.
- jump label: fix passing kbuild_cflags when checking for asm goto support (git-fixes).
- kabi: Hide new include in arch/powerpc/kernel/process.c (fate#322421).
- kabi: ignore fs_info parameter for tracepoints that didn't have it (bsc#1044912).
- kABI: move and hide new cxgbi device owner field (bsc#1018885).
- kABI: protect cgroup include in kernel/kthread (kabi).
- kABI: protect struct fib_info (kabi).
- kABI: protect struct mnt_namespace (kabi).
- kABI: protect struct pglist_data (kabi).
- kABI: protect struct snd_fw_async_midi_port (kabi).
- kABI: protect struct xlog (bsc#1043598).
- kABI: restore ttm_ref_object_add parameters (kabi).
- kabi/severities: ignore kABi changes in iwlwifi stuff itself
- kabi workaround for net: ipv6: Fix processing of RAs in presence of VRF (bsc#1042286).
- kernel-binary.spec: Propagate MAKE_ARGS to %build (bsc#1012422)
- kprobes/x86: Fix kernel panic when certain exception-handling addresses are probed (4.4.68 stable queue).
- kvm: better MWAIT emulation for guests (bsc#1031142).
- kvm: nVMX: do not leak PML full vmexit to L1 (4.4.68 stable queue).
- kvm: nVMX: initialize PML fields in vmcs02 (4.4.68 stable queue).
- kvm: svm: add support for RDTSCP (bsc#1033117).
- l2tp: fix race in l2tp_recv_common() (bsc#1042286).
- lan78xx: use skb_cow_head() to deal with cloned skbs (bsc#1045154).
- leds: ktd2692: avoid harmless maybe-uninitialized warning (4.4.68 stable queue).
- libata-scsi: Fixup ata_gen_passthru_sense() (bsc#1040125).
- libceph: NULL deref on crush_decode() error path (bsc#1044015).
- libcxgb: add library module for Chelsio drivers (bsc#1021424).
- lib/mpi: mpi_read_raw_data(): fix nbits calculation (bsc#1003581).
- lib/mpi: mpi_read_raw_data(): purge redundant clearing of nbits (bsc#1003581).
- lib/mpi: mpi_read_raw_from_sgl(): do not include leading zero SGEs in nbytes (bsc#1003581).
- lib/mpi: mpi_read_raw_from_sgl(): fix nbits calculation (bsc#1003581).
- lib/mpi: mpi_read_raw_from_sgl(): fix out-of-bounds buffer access (bsc#1003581).
- lib/mpi: mpi_read_raw_from_sgl(): purge redundant clearing of nbits (bsc#1003581).
- lib/mpi: mpi_read_raw_from_sgl(): replace len argument by nbytes (bsc#1003581).
- lib/mpi: mpi_read_raw_from_sgl(): sanitize meaning of indices (bsc#1003581).
- libnvdimm, pfn: fix 'npfns' vs section alignment (bsc#1040125).
- livepatch: Allow architectures to specify an alternate ftrace location (FATE#322421).
- locking/ww_mutex: Fix compilation of __WW_MUTEX_INITIALIZER (bsc#1031717).
- loop: Add PF_LESS_THROTTLE to block/loop device thread (bsc#1027101).
- lpfc: remove incorrect lockdep assertion (bsc#1040125).
- md: allow creation of mdNNN arrays via md_mod/parameters/new_array (bsc#1032339).
- md.c:didn't unlock the mddev before return EINVAL in array_size_store (bsc#1038143).
- md-cluster: fix potential lock issue in add_new_disk (bsc#1041087).
- md: fix a null dereference (bsc#1040351).
- md: handle read-only member devices better (bsc#1033281).
- md: MD_CLOSING needs to be cleared after called md_set_readonly or do_md_stop (bsc#1038142).
- md/raid1: avoid reusing a resync bio after error handling (Fate#311379).
- md: support disabling of create-on-open semantics (bsc#1032339).
- md: use a separate bio_set for synchronous IO (bsc#1040351).
- media: am437x-vpfe: fix an uninitialized variable bug (bsc#1031717).
- media: b2c2: use IS_REACHABLE() instead of open-coding it (bsc#1031717).
- media: c8sectpfe: Rework firmware loading mechanism (bsc#1031717).
- media: cx231xx-audio: fix NULL-deref at probe (bsc#1031717).
- media: cx231xx-cards: fix NULL-deref at probe (bsc#1031717).
- media: cx23885: uninitialized variable in cx23885_av_work_handler() (bsc#1031717).
- media: DaVinci-VPBE: Check return value of a setup_if_config() call in vpbe_set_output() (bsc#1031717).
- media: DaVinci-VPFE-Capture: fix error handling (bsc#1031717).
- media: dib0700: fix NULL-deref at probe (bsc#1031717).
- media: dvb-usb: avoid link error with dib3000m{b,c| (bsc#1031717).
- media: exynos4-is: fix a format string bug (bsc#1031717).
- media: gspca: konica: add missing endpoint sanity check (bsc#1031717).
- media: lirc_imon: do not leave imon_probe() with mutex held (bsc#1031717).
- media: pvrusb2: reduce stack usage pvr2_eeprom_analyze() (bsc#1031717).
- media: rc: allow rc modules to be loaded if rc-main is not a module (bsc#1031717).
- media: s5p-mfc: Fix unbalanced call to clock management (bsc#1031717).
- media: sh-vou: clarify videobuf2 dependency (bsc#1031717).
- media: staging: media: davinci_vpfe: unlock on error in vpfe_reqbufs() (bsc#1031717).
- media: usbvision: fix NULL-deref at probe (bsc#1031717).
- media: uvcvideo: Fix empty packet statistic (bsc#1031717).
- media: vb2: Fix an off by one error in 'vb2_plane_vaddr' (bsc#1043231).
- mem-hotplug: fix node spanned pages when we have a movable node (bnc#1034671).
- mips: R2-on-R6 MULTU/MADDU/MSUBU emulation bugfix (4.4.68 stable queue).
- mlx4: Fix memory leak after mlx4_en_update_priv() (bsc#966170 bsc#966172 bsc#966191).
- mmc: debugfs: correct wrong voltage value (bsc#1031717).
- mmc: Downgrade error level (bsc#1042536).
- mm,compaction: serialize waitqueue_active() checks (bsc#971975).
- mmc: sdhci-pxav3: fix higher speed mode capabilities (bsc#1031717).
- mmc: sdhci: restore behavior when setting VDD via external regulator (bsc#1031717).
- mm: fix &lt;linux/pagemap.h&gt; stray kernel-doc notation (bnc#971975 VM -- git fixes).
- mm: fix new crash in unmapped_area_topdown() (bnc#1039348).
- mm/hugetlb: check for reserved hugepages during memory offline (bnc#971975 VM -- git fixes).
- mm/hugetlb: fix incorrect hugepages count during mem hotplug (bnc#971975 VM -- git fixes).
- module: fix memory leak on early load_module() failures (bsc#1043014).
- mwifiex: Avoid skipping WEP key deletion for AP (4.4.68 stable queue).
- mwifiex: debugfs: Fix (sometimes) off-by-1 SSID print (4.4.68 stable queue).
- mwifiex: pcie: fix cmd_buf use-after-free in remove/reset (bsc#1031717).
- mwifiex: Removed unused 'pkt_type' variable (bsc#1031717).
- mwifiex: remove redundant dma padding in AMSDU (4.4.68 stable queue).
- mwifiex: Remove unused 'bcd_usb' variable (bsc#1031717).
- mwifiex: Remove unused 'chan_num' variable (bsc#1031717).
- mwifiex: Remove unused 'pm_flag' variable (bsc#1031717).
- mwifiex: Remove unused 'sta_ptr' variable (bsc#1031717).
- net: bridge: start hello timer only if device is up (bnc#1012382).
- netfilter: nf_conntrack_sip: extend request line validation (bsc#1042286).
- netfilter: nf_ct_expect: remove the redundant slash when policy name is empty (bsc#1042286).
- netfilter: nf_dup_ipv6: set again FLOWI_FLAG_KNOWN_NH at flowi6_flags (bsc#1042286).
- netfilter: nf_nat_snmp: Fix panic when snmp_trap_helper fails to register (bsc#1042286).
- netfilter: nfnetlink_queue: reject verdict request from different portid (bsc#1042286).
- netfilter: restart search if moved to other chain (bsc#1042286).
- netfilter: use fwmark_reflect in nf_send_reset (bsc#1042286).
- net: fix compile error in skb_orphan_partial() (bnc#1012382).
- net: ibmvnic: Remove unused net_stats member from struct ibmvnic_adapter (fate#322021, bsc#1031512).
- net: icmp_route_lookup should use rt dev to determine L3 domain (bsc#1042286).
- net: ipv6: Fix processing of RAs in presence of VRF (bsc#1042286).
- net: ipv6: set route type for anycast routes (bsc#1042286).
- net: l3mdev: Add master device lookup by index (bsc#1042286).
- net: make netdev_for_each_lower_dev safe for device removal (bsc#1042286).
- net/mlx5: Do not unlock fte while still using it (bsc#966170 bsc#966172 bsc#966191).
- net/mlx5e: Fix timestamping capabilities reporting (bsc#966170 bsc#1015342).
- net/mlx5e: Modify TIRs hash only when it's needed (bsc#966170 bsc#966172 bsc#966191).
- net/mlx5: Fix create autogroup prev initializer (bsc#966170 bsc#966172 bsc#966191).
- net/mlx5: Prevent setting multicast macs for VFs (bsc#966170 bsc#966172 bsc#966191).
- net/mlx5: Release FTE lock in error flow (bsc#966170 bsc#966172 bsc#966191).
- net: vrf: Create FIB tables on link create (bsc#1042286).
- net: vrf: Fix crash when IPv6 is disabled at boot time (bsc#1042286).
- net: vrf: Fix dev refcnt leak due to IPv6 prefix route (bsc#1042286).
- net: vrf: Fix dst reference counting (bsc#1042286).
- net: vrf: protect changes to private data with rcu (bsc#1042286).
- net: vrf: Switch dst dev to loopback on device delete (bsc#1042286).
- netxen_nic: set rcode to the return status from the call to netxen_issue_cmd (bsc#966339 FATE#320150).
- nfsd4: minor NFSv2/v3 write decoding cleanup (bsc#1034670).
- nfsd: check for oversized NFSv2/v3 arguments (bsc#1034670).
- nfsd: stricter decoding of write-like NFSv2/v3 ops (bsc#1034670).
- nfs: Fix an LOCK/OPEN race when unlinking an open file (git-fixes).
- nfs: Fix 'Do not increment lock sequence ID after NFS4ERR_MOVED' (git-fixes).
- nfs: Fix inode corruption in nfs_prime_dcache() (git-fixes).
- nfs: Fix missing pg_cleanup after nfs_pageio_cond_complete() (git-fixes).
- nfs: Use GFP_NOIO for two allocations in writeback (git-fixes).
- nfsv4.1: Fix Oopsable condition in server callback races (git-fixes).
- nfsv4: do not let hanging mounts block other mounts (bsc#1040364).
- nfsv4: fix a reference leak caused WARNING messages (git-fixes).
- nfsv4: Fix the underestimation of delegation XDR space reservation (git-fixes).
- nsfs: mark dentry with DCACHE_RCUACCESS (bsc#1012829).
- nvme: Delete created IO queues on reset (bsc#1031717).
- nvme: submit nvme_admin_activate_fw to admin queue (bsc#1044532).
- ocfs2/dlmglue: prepare tracking logic to avoid recursive cluster lock (bsc#1004003).
- ocfs2: fix deadlock issue when taking inode lock at vfs entry points (bsc#1004003).
- overlayfs: compat, fix incorrect dentry use in ovl_rename2 (bsc#1032400).
- overlayfs: compat, use correct dentry to detect compat mode in ovl_compat_is_whiteout (bsc#1032400).
- pci: pciehp: Prioritize data-link event over presence detect (bsc#1031040,bsc#1037483).
- pci: Reverse standard ACS vs device-specific ACS enabling (bsc#1030057).
- pci: Work around Intel Sunrise Point PCH incorrect ACS capability (bsc#1030057).
- percpu: remove unused chunk_alloc parameter from pcpu_get_pages() (bnc#971975 VM -- git fixes).
- perf/x86/intel/rapl: Make Knights Landings support functional (bsc#1042517).
- perf/x86/intel/uncore: Remove SBOX support for Broadwell server (bsc#1035887).
- phy: qcom-usb-hs: Add depends on EXTCON (4.4.68 stable queue).
- pid_ns: Sleep in TASK_INTERRUPTIBLE in zap_pid_ns_processes (bnc#1012985).
- PKCS#7: fix missing break on OID_sha224 case (bsc#1031717).
- platform/x86: fujitsu-laptop: use brightness_set_blocking for LED-setting callbacks (bsc#1031717).
- pm / QoS: Fix memory leak on resume_latency.notifiers (bsc#1043231).
- pm / wakeirq: Enable dedicated wakeirq for suspend (bsc#1031717).
- pm / wakeirq: Fix spurious wake-up events for dedicated wakeirqs (bsc#1031717).
- pm / wakeirq: report a wakeup_event on dedicated wekup irq (bsc#1031717).
- power: bq27xxx: fix register numbers of bq27500 (bsc#1031717).
- powerpc/64: Fix flush_(d|i)cache_range() called from modules (bnc#863764 fate#315275, LTC#103998).
- powerpc: Create a helper for getting the kernel toc value (FATE#322421).
- powerpc/fadump: add reschedule point while releasing memory (bsc#1040609).
- powerpc/fadump: avoid duplicates in crash memory ranges (bsc#1037669).
- powerpc/fadump: avoid holes in boot memory area when fadump is registered (bsc#1037669).
- powerpc/fadump: provide a helpful error message (bsc#1037669).
- powerpc/fadump: Reserve memory at an offset closer to bottom of RAM (bsc#1032141).
- powerpc/fadump: return error when fadump registration fails (bsc#1040567).
- powerpc/fadump: Update fadump documentation (bsc#1032141).
- powerpc/ftrace: Add Kconfig &amp; Make glue for mprofile-kernel (FATE#322421).
- powerpc/ftrace: Add support for -mprofile-kernel ftrace ABI (FATE#322421).
- powerpc/ftrace: Pass the correct stack pointer for DYNAMIC_FTRACE_WITH_REGS (FATE#322421).
- powerpc/ftrace: Use $(CC_FLAGS_FTRACE) when disabling ftrace (FATE#322421).
- powerpc/ftrace: Use generic ftrace_modify_all_code() (FATE#322421).
- powerpc: introduce TIF_KGR_IN_PROGRESS thread flag (FATE#322421).
- powerpc/livepatch: Add livepatch header (FATE#322421).
- powerpc/livepatch: Add live patching support on ppc64le (FATE#322421).
- powerpc/livepatch: Add livepatch stack to struct thread_info (FATE#322421).
- powerpc/module: Create a special stub for ftrace_caller() (FATE#322421).
- powerpc/module: Mark module stubs with a magic value (FATE#322421).
- powerpc/module: Only try to generate the ftrace_caller() stub once (FATE#322421).
- powerpc/modules: Never restore r2 for a mprofile-kernel style mcount() call (FATE#322421).
- powerpc/powernv: Fix opal_exit tracepoint opcode (4.4.68 stable queue).
- power: supply: bq24190_charger: Call power_supply_changed() for relevant component (4.4.68 stable queue).
- power: supply: bq24190_charger: Call set_mode_host() on pm_resume() (4.4.68 stable queue).
- power: supply: bq24190_charger: Do not read fault register outside irq_handle_thread() (4.4.68 stable queue).
- power: supply: bq24190_charger: Fix irq trigger to IRQF_TRIGGER_FALLING (4.4.68 stable queue).
- power: supply: bq24190_charger: Handle fault before status on interrupt (4.4.68 stable queue).
- power: supply: bq24190_charger: Install irq_handler_thread() at end of probe() (4.4.68 stable queue).
- printk: Correctly handle preemption in console_unlock() (bsc#1046434).
- printk: Switch to the sync mode when an emergency message is printed (bsc#1034995).
- printk/xen: Force printk sync mode when migrating Xen guest (bsc#1043347).
- quota: fill in Q_XGETQSTAT inode information for inactive quotas (bsc#1042356).
- radix-tree: fix radix_tree_iter_retry() for tagged iterators (bsc#1012829).
- ravb: Fix use-after-free on `ifconfig eth0 down` (git-fixes).
- rdma/iw_cxgb4: Add missing error codes for act open cmd (bsc#1026570).
- rdma/iw_cxgb4: Always wake up waiter in c4iw_peer_abort_intr() (bsc#1026570).
- rdma/iw_cxgb4: Low resource fixes for Completion queue (bsc#1026570).
- rdma/iw_cxgb4: only read markers_enabled mod param once (bsc#1026570).
- regulator: isl9305: fix array size (bsc#1031717).
- reiserfs: do not preallocate blocks for extended attributes (bsc#990682).
- Revert 'acpi, nfit, libnvdimm: fix interleave set cookie calculation (64-bit comparison)' (kabi).
- Revert 'btrfs: qgroup: Move half of the qgroup accounting time out of' (bsc#1017461 bsc#1033885).
- Revert 'KVM: nested VMX: disable perf cpuid reporting' (4.4.68 stable queue).
- Revert 'l2tp: take reference on sessions being dumped' (kabi).
- Revert 'mac80211: pass block ack session timeout to to driver' (kabi).
- Revert 'mac80211: RX BA support for sta max_rx_aggregation_subframes' (kabi).
- Revert 'wlcore: Add RX_BA_WIN_SIZE_CHANGE_EVENT event' (kabi).
- rpm/kernel-spec-macros: Fix the check if there is no rebuild counter (bsc#1012060)
- rpm/SLES-UEFI-SIGN-Certificate-2048.crt: Update the certificate (bsc#1035922)
- rtnetlink: NUL-terminate IFLA_PHYS_PORT_NAME string (4.4.68 stable queue).
- rtnl: reset calcit fptr in rtnl_unregister() (bsc#1042286).
- s390/dasd: check if query host access feature is supported (bsc#1037871).
- sbp-target: Fix second argument of percpu_ida_alloc() (bsc#1032803).
- scsi: be2iscsi: Add FUNCTION_RESET during driver unload (bsc#1038458).
- scsi: be2iscsi: Add IOCTL to check UER supported (bsc#1038458).
- scsi: be2iscsi: Add TPE recovery feature (bsc#1038458).
- scsi: be2iscsi: Add V1 of EPFW cleanup IOCTL (bsc#1038458).
- scsi: be2iscsi: allocate enough memory in beiscsi_boot_get_sinfo() (bsc#1038458).
- scsi: be2iscsi: Check all zeroes IP before issuing IOCTL (bsc#1038458).
- scsi: be2iscsi: Fail the sessions immediately after TPE (bsc#1038458).
- scsi: be2iscsi: Fix async PDU handling path (bsc#1038458).
- scsi: be2iscsi: Fix bad WRB index error (bsc#1038458).
- scsi: be2iscsi: Fix checks for HBA in error state (bsc#1038458).
- scsi: be2iscsi: Fix gateway APIs to support IPv4 &amp; IPv6 (bsc#1038458).
- scsi: be2iscsi: Fix POST check and reset sequence (bsc#1038458).
- scsi: be2iscsi: Fix queue and connection parameters (bsc#1038458).
- scsi: be2iscsi: Fix release of DHCP IP in static mode (bsc#1038458).
- scsi: be2iscsi: Fix to add timer for UE detection (bsc#1038458).
- scsi: be2iscsi: Fix to make boot discovery non-blocking (bsc#1038458).
- scsi: be2iscsi: Fix to use correct configuration values (bsc#1038458).
- scsi: be2iscsi: Handle only NET_PARAM in iface_get_param (bsc#1038458).
- scsi: be2iscsi: Move functions to right files (bsc#1038458).
- scsi: be2iscsi: Move VLAN code to common iface_set_param (bsc#1038458).
- scsi: be2iscsi: Reduce driver load/unload time (bsc#1038458).
- scsi: be2iscsi: Remove alloc_mcc_tag &amp; beiscsi_pci_soft_reset (bsc#1038458).
- scsi: be2iscsi: Remove isr_lock and dead code (bsc#1038458).
- scsi: be2iscsi: Rename iface get/set/create/destroy APIs (bsc#1038458).
- scsi: be2iscsi: Replace _bh version for mcc_lock spinlock (bsc#1038458).
- scsi: be2iscsi: Set and return right iface v4/v6 states (bsc#1038458).
- scsi: be2iscsi: Update copyright information (bsc#1038458).
- scsi: be2iscsi: Update iface handle before any set param (bsc#1038458).
- scsi: be2iscsi: Update the driver version (bsc#1038458).
- scsi: cxgb4i: libcxgbi: add missing module_put() (bsc#1018885).
- scsi: cxgb4i: libcxgbi: cxgb4: add T6 iSCSI completion feature (bsc#1021424).
- scsi: cxlflash: Remove the device cleanly in the system shutdown path (bsc#1028310, fate#321597, bsc#1034762).  cherry-pick from SP3
- scsi_dh_alua: do not call BUG_ON when updating port group (bsc#1028340).
- scsi_dh_alua: Do not retry for unmapped device (bsc#1012910).
- scsi_error: count medium access timeout only once per EH run (bsc#993832, bsc#1032345).
- scsi: fnic: Correcting rport check location in fnic_queuecommand_lck (bsc#1035920).
- scsi: ipr: do not set DID_PASSTHROUGH on CHECK CONDITION (bsc#1034419).
- scsi: ipr: Driver version 2.6.4 (bsc#1031555).
- scsi: ipr: Error path locking fixes (bsc#1031555).
- scsi: ipr: Fix abort path race condition (bsc#1031555).
- scsi: ipr: Fix missed EH wakeup (bsc#1031555).
- scsi: ipr: Fix SATA EH hang (bsc#1031555).
- scsi: ipr: Remove redundant initialization (bsc#1031555).
- scsi: mac_scsi: Fix MAC_SCSI=m option when SCSI=m (4.4.68 stable queue).
- scsi: scsi_dh_alua: Check scsi_device_get() return value (bsc#1040125).
- scsi: scsi_dh_emc: return success in clariion_std_inquiry() (4.4.68 stable queue).
- scsi_transport_fc: do not call queue_work under lock (bsc#1013887).
- scsi_transport_fc: fixup race condition in fc_rport_final_delete() (bsc#1013887).
- scsi_transport_fc: return -EBUSY for deleted vport (bsc#1013887).
- sctp: check af before verify address in sctp_addr_id2transport (git-fixes).
- serial: 8250_omap: Fix probe and remove for PM runtime (4.4.68 stable queue).
- smartpqi: limit transfer length to 1MB (bsc#1025461).
- staging: emxx_udc: remove incorrect __init annotations (4.4.68 stable queue).
- staging: rtl8188eu: prevent an underflow in rtw_check_beacon_data() (bsc#1031717).
- staging: wlan-ng: add missing byte order conversion (4.4.68 stable queue).
- sunrpc: Allow xprt-&gt;ops-&gt;timer method to sleep (git-fixes).
- sunrpc: ensure correct error is reported by xs_tcp_setup_socket() (git-fixes).
- sunrpc: fix UDP memory accounting (git-fixes).
- sunrpc: Silence WARN_ON when NFSv4.1 over RDMA is in use (git-fixes).
- supported.conf: added drivers/net/ethernet/chelsio/libcxgb/libcxgb
- supported.conf: Bugzilla and FATE references for dcdbas and dell_rbu
- sysfs: be careful of error returns from ops-&gt;show() (bsc#1028883).
- tcp: account for ts offset only if tsecr not zero (bsc#1042286).
- tcp: do not inherit fastopen_req from parent (4.4.68 stable queue).
- tcp: do not underestimate skb-&gt;truesize in tcp_trim_head() (4.4.68 stable queue).
- tcp: fastopen: accept data/FIN present in SYNACK message (bsc#1042286).
- tcp: fastopen: avoid negative sk_forward_alloc (bsc#1042286).
- tcp: fastopen: call tcp_fin() if FIN present in SYNACK (bsc#1042286).
- tcp: fastopen: fix rcv_wup initialization for TFO server on SYN/data (bsc#1042286).
- tcp: fix wraparound issue in tcp_lp (4.4.68 stable queue).
- Temporarily disable iwlwifi-expose-default-fallback-ucode-api ... for updating iwlwifi stack
- thp: fix MADV_DONTNEED vs. numa balancing race (bnc#1027974).
- thp: reduce indentation level in change_huge_pmd() (bnc#1027974).
- tpm: Downgrade error level (bsc#1042535).
- tpm: fix checks for policy digest existence in tpm2_seal_trusted() (bsc#1034048, Pending fixes 2017-04-10).
- tpm: fix RC value check in tpm2_seal_trusted (bsc#1034048, Pending fixes 2017-04-10).
- tpm: fix: set continueSession attribute for the unseal operation (bsc#1034048, Pending fixes 2017-04-10).
- tracing/kprobes: Enforce kprobes teardown after testing (bnc#1012985).
- tty: Destroy ldisc instance on hangup (bnc#1043488).
- tty: Fix ldisc crash on reopened tty (bnc#1043488).
- tty: Handle NULL tty-&gt;ldisc (bnc#1043488).
- tty: Move tty_ldisc_kill() (bnc#1043488).
- tty: Prepare for destroying line discipline on hangup (bnc#1043488).
- tty: Refactor tty_ldisc_reinit() for reuse (bnc#1043488).
- tty: Reset c_line from driver's init_termios (bnc#1043488).
- tty: Simplify tty_set_ldisc() exit handling (bnc#1043488).
- tty: Use 'disc' for line discipline index name (bnc#1043488).
- udp: avoid ufo handling on IP payload compression packets (bsc#1042286).
- udplite: call proper backlog handlers (bsc#1042286).
- Update config files: add CONFIG_IWLWIFI_PCIE_RTPM=y (FATE#323335)
- Update patches.fixes/x86-pci-mark-broadwell-ep-home-agent-1-as-having-non-compliant-bars (bsc#1039214). Fix the wrong bsc number.
- Update patches.fixes/xen-silence-efi-error-messge.patch (bnc#1039900).
- Update ppc64le config files to use KGRAFT.
- usb: chipidea: Handle extcon events properly (4.4.68 stable queue).
- usb: chipidea: Only read/write OTGSC from one place (4.4.68 stable queue).
- usb: host: ehci-exynos: Decrese node refcount on exynos_ehci_get_phy() error paths (4.4.68 stable queue).
- usb: host: ohci-exynos: Decrese node refcount on exynos_ehci_get_phy() error paths (4.4.68 stable queue).
- usb: musb: ux500: Fix NULL pointer dereference at system PM (bsc#1038033).
- usb: serial: ark3116: fix open error handling (bnc#1038043).
- usb: serial: ch341: add register and USB request definitions (bnc#1038043).
- usb: serial: ch341: add support for parity, frame length, stop bits (bnc#1038043).
- usb: serial: ch341: fix baud rate and line-control handling (bnc#1038043).
- usb: serial: ch341: fix line settings after reset-resume (bnc#1038043).
- usb: serial: ch341: fix modem-status handling (bnc#1038043).
- usb: serial: ch341: reinitialize chip on reconfiguration (bnc#1038043).
- usb: serial: digi_acceleport: fix incomplete rx sanity check (4.4.68 stable queue).
- usb: serial: fix compare_const_fl.cocci warnings (bnc#1038043).
- usb: serial: ftdi_sio: fix latency-timer error handling (4.4.68 stable queue).
- usb: serial: io_edgeport: fix descriptor error handling (4.4.68 stable queue).
- usb: serial: io_edgeport: fix epic-descriptor handling (bnc#1038043).
- usb: serial: keyspan_pda: fix receive sanity checks (4.4.68 stable queue).
- usb: serial: mct_u232: fix modem-status error handling (4.4.68 stable queue).
- usb: serial: quatech2: fix control-message error handling (bnc#1038043).
- usb: serial: sierra: fix bogus alternate-setting assumption (bnc#1038043).
- usb: serial: ssu100: fix control-message error handling (bnc#1038043).
- usb: serial: ti_usb_3410_5052: fix control-message error handling (4.4.68 stable queue).
- Use make --output-sync feature when available (bsc#1012422). The mesages in make output can interleave making it impossible to extract warnings reliably. Since version 4 GNU Make supports --output-sync flag that prints output of each sub-command atomically preventing this issue. Detect the flag and use it if available.
- Use up spare in struct module for livepatch (FATE#322421).
- vmxnet3: segCnt can be 1 for LRO packets (bsc#988065).
- vrf: remove slave queue and private slave struct (bsc#1042286).
- vsock: Detach QP check should filter out non matching QPs (bsc#1036752).
- x86/CPU/AMD: Fix Zen SMT topology (bsc#1027512).
- x86/ioapic: Restore IO-APIC irq_chip retrigger callback (4.4.68 stable queue).
- x86/pci-calgary: Fix iommu_free() comparison of unsigned expression &gt;= 0 (4.4.68 stable queue).
- x86/PCI: Mark Broadwell-EP Home Agent 1 as having non-compliant BARs (bsc#9048891).
- x86/platform/intel-mid: Correct MSI IRQ line for watchdog device (4.4.68 stable queue).
- x86/platform/uv/BAU: Add generic function pointers (bsc#1035024).
- x86/platform/uv/BAU: Add payload descriptor qualifier (bsc#1035024).
- x86/platform/uv/BAU: Add status mmr location fields to bau_control (bsc#1035024).
- x86/platform/uv/BAU: Add UV4-specific functions (bsc#1035024).
- x86/platform/uv/BAU: Add uv_bau_version enumerated constants (bsc#1035024).
- x86/platform/uv/BAU: Add wait_completion to bau_operations (bsc#1035024).
- x86/platform/uv/BAU: Clean up and update printks (bsc#1035024).
- x86/platform/uv/BAU: Cleanup bau_operations declaration and instances (bsc#1035024).
- x86/platform/uv/BAU: Clean up pq_init() (bsc#1035024).
- x86/platform/uv/BAU: Clean up vertical alignment (bsc#1035024).
- x86/platform/uv/BAU: Convert uv_physnodeaddr() use to uv_gpa_to_offset() (bsc#1035024).
- x86/platform/uv/BAU: Disable software timeout on UV4 hardware (bsc#1035024).
- x86/platform/uv/BAU: Fix HUB errors by remove initial write to sw-ack register (bsc#1035024).
- x86/platform/uv/BAU: Fix payload queue setup on UV4 hardware (bsc#1035024).
- x86/platform/uv/BAU: Implement uv4_wait_completion with read_status (bsc#1035024).
- x86/platform/uv/BAU: Populate -&gt;uvhub_version with UV4 version information (bsc#1035024).
- x86/platform/uv/BAU: Use generic function pointers (bsc#1035024).
- x86/platform/uv: Fix calculation of Global Physical Address (bsc#1031147).
- xen: add sysfs node for guest type (bnc#1037840).
- xen: adjust early dom0 p2m handling to xen hypervisor behavior (bnc#1031470).
- xen-blkback: do not leak stack data via response ring (bsc#1042863 XSA-216).
- xen/mce: do not issue error message for failed /dev/mcelog registration (bnc#1036638).
- xfrm: Fix memory leak of aead algorithm name (bsc#1042286).
- xfrm: Only add l3mdev oif to dst lookups (bsc#1042286).
- xfs: add missing include dependencies to xfs_dir2.h (bsc#1042421).
- xfs: do not assert fail on non-async buffers on ioacct decrement (bsc#1041160).
- xfs: do not warn on buffers not being recovered due to LSN (bsc#1043598).
- xfs: fix eofblocks race with file extending async dio writes (bsc#1040929).
- xfs: Fix missed holes in SEEK_HOLE implementation (bsc#1041168).
- xfs: fix off-by-one on max nr_pages in xfs_find_get_desired_pgoff() (bsc#1041168).
- xfs: fix xfs_mode_to_ftype() prototype (bsc#1043598).
- xfs: in _attrlist_by_handle, copy the cursor back to userspace (bsc#1041242).
- xfs: log recovery tracepoints to track current lsn and buffer submission (bsc#1043598).
- xfs: Make __xfs_xattr_put_listen preperly report errors (bsc#1041242).
- xfs: only return -errno or success from attr -&gt;put_listent (bsc#1041242).
- xfs: pass current lsn to log recovery buffer validation (bsc#1043598).
- xfs: refactor log record unpack and data processing (bsc#1043598).
- xfs: replace xfs_mode_to_ftype table with switch statement (bsc#1042421).
- xfs: rework log recovery to submit buffers on LSN boundaries (bsc#1043598).
- xfs: rework the inline directory verifiers (bsc#1042421).
- xfs: sanity check directory inode di_size (bsc#1042421).
- xfs: sanity check inode di_mode (bsc#1042421).
- xfs: Split default quota limits by quota type (bsc#1049421).
- xfs: update metadata LSN in buffers during log recovery (bsc#1043598).
- xfs: use -&gt;b_state to fix buffer I/O accounting release race (bsc#1041160).
- xfs: verify inline directory data forks (bsc#1042421).
- zswap: do not param_set_charp while holding spinlock (VM Functionality, bsc#1042886).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-13"/>
	<updated date="2017-07-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1003581">SUSE bug 1003581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004003">SUSE bug 1004003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011044">SUSE bug 1011044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012060">SUSE bug 1012060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012422">SUSE bug 1012422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012452">SUSE bug 1012452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012829">SUSE bug 1012829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012910">SUSE bug 1012910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012985">SUSE bug 1012985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013561">SUSE bug 1013561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013887">SUSE bug 1013887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015342">SUSE bug 1015342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015452">SUSE bug 1015452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017461">SUSE bug 1017461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018885">SUSE bug 1018885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020412">SUSE bug 1020412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021424">SUSE bug 1021424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022266">SUSE bug 1022266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022595">SUSE bug 1022595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023287">SUSE bug 1023287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025461">SUSE bug 1025461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026570">SUSE bug 1026570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027101">SUSE bug 1027101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027512">SUSE bug 1027512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027974">SUSE bug 1027974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028217">SUSE bug 1028217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028310">SUSE bug 1028310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028340">SUSE bug 1028340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028883">SUSE bug 1028883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029607">SUSE bug 1029607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030057">SUSE bug 1030057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030070">SUSE bug 1030070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031040">SUSE bug 1031040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031142">SUSE bug 1031142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031147">SUSE bug 1031147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031470">SUSE bug 1031470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031500">SUSE bug 1031500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031512">SUSE bug 1031512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031555">SUSE bug 1031555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031717">SUSE bug 1031717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031796">SUSE bug 1031796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032141">SUSE bug 1032141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032339">SUSE bug 1032339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032345">SUSE bug 1032345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032400">SUSE bug 1032400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032581">SUSE bug 1032581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032803">SUSE bug 1032803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033117">SUSE bug 1033117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033281">SUSE bug 1033281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033336">SUSE bug 1033336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033340">SUSE bug 1033340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033885">SUSE bug 1033885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034048">SUSE bug 1034048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034419">SUSE bug 1034419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034635">SUSE bug 1034635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034670">SUSE bug 1034670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034671">SUSE bug 1034671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034762">SUSE bug 1034762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034902">SUSE bug 1034902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034995">SUSE bug 1034995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035024">SUSE bug 1035024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035866">SUSE bug 1035866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035887">SUSE bug 1035887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035920">SUSE bug 1035920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035922">SUSE bug 1035922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036214">SUSE bug 1036214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036638">SUSE bug 1036638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036752">SUSE bug 1036752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036763">SUSE bug 1036763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037177">SUSE bug 1037177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037186">SUSE bug 1037186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037384">SUSE bug 1037384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037483">SUSE bug 1037483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037669">SUSE bug 1037669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037840">SUSE bug 1037840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037871">SUSE bug 1037871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037969">SUSE bug 1037969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038033">SUSE bug 1038033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038043">SUSE bug 1038043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038085">SUSE bug 1038085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038142">SUSE bug 1038142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038143">SUSE bug 1038143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038297">SUSE bug 1038297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038458">SUSE bug 1038458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038842">SUSE bug 1038842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038843">SUSE bug 1038843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038846">SUSE bug 1038846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038847">SUSE bug 1038847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038848">SUSE bug 1038848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038879">SUSE bug 1038879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038981">SUSE bug 1038981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038982">SUSE bug 1038982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039214">SUSE bug 1039214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039354">SUSE bug 1039354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039700">SUSE bug 1039700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039864">SUSE bug 1039864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039882">SUSE bug 1039882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039883">SUSE bug 1039883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039885">SUSE bug 1039885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039900">SUSE bug 1039900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040069">SUSE bug 1040069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040125">SUSE bug 1040125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040182">SUSE bug 1040182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040279">SUSE bug 1040279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040351">SUSE bug 1040351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040364">SUSE bug 1040364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040395">SUSE bug 1040395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040425">SUSE bug 1040425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040463">SUSE bug 1040463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040567">SUSE bug 1040567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040609">SUSE bug 1040609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040855">SUSE bug 1040855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040929">SUSE bug 1040929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040941">SUSE bug 1040941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041087">SUSE bug 1041087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041160">SUSE bug 1041160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041168">SUSE bug 1041168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041242">SUSE bug 1041242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041431">SUSE bug 1041431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041810">SUSE bug 1041810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042286">SUSE bug 1042286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042356">SUSE bug 1042356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042421">SUSE bug 1042421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042517">SUSE bug 1042517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042535">SUSE bug 1042535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042536">SUSE bug 1042536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042863">SUSE bug 1042863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042886">SUSE bug 1042886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043014">SUSE bug 1043014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043231">SUSE bug 1043231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043236">SUSE bug 1043236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043347">SUSE bug 1043347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043371">SUSE bug 1043371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043467">SUSE bug 1043467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043488">SUSE bug 1043488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043598">SUSE bug 1043598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043912">SUSE bug 1043912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043935">SUSE bug 1043935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043990">SUSE bug 1043990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044015">SUSE bug 1044015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044082">SUSE bug 1044082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044120">SUSE bug 1044120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044125">SUSE bug 1044125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044532">SUSE bug 1044532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044767">SUSE bug 1044767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044772">SUSE bug 1044772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044854">SUSE bug 1044854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044880">SUSE bug 1044880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044912">SUSE bug 1044912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045154">SUSE bug 1045154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045235">SUSE bug 1045235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045286">SUSE bug 1045286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045307">SUSE bug 1045307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045467">SUSE bug 1045467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045568">SUSE bug 1045568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046105">SUSE bug 1046105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046434">SUSE bug 1046434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046589">SUSE bug 1046589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799133">SUSE bug 799133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863764">SUSE bug 863764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922871">SUSE bug 922871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939801">SUSE bug 939801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966170">SUSE bug 966170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966172">SUSE bug 966172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966191">SUSE bug 966191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966321">SUSE bug 966321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966339">SUSE bug 966339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971975">SUSE bug 971975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988065">SUSE bug 988065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989311">SUSE bug 989311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990058">SUSE bug 990058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990682">SUSE bug 990682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993832">SUSE bug 993832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995542">SUSE bug 995542</bugzilla>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000365/">CVE-2017-1000365</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000380/">CVE-2017-1000380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7346/">CVE-2017-7346</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7487/">CVE-2017-7487</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7616/">CVE-2017-7616</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7618/">CVE-2017-7618</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8890/">CVE-2017-8890</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-8924/">CVE-2017-8924</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8925/">CVE-2017-8925</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9074/">CVE-2017-9074</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9075/">CVE-2017-9075</cve>
	<cve impact="important" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9076/">CVE-2017-9076</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9077/">CVE-2017-9077</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9150/">CVE-2017-9150</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9242/">CVE-2017-9242</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517899" comment="kernel-default-4.4.74-92.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517900" comment="kernel-default-devel-4.4.74-92.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517901" comment="kernel-default-extra-4.4.74-92.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517902" comment="kernel-devel-4.4.74-92.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517903" comment="kernel-macros-4.4.74-92.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517904" comment="kernel-source-4.4.74-92.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517905" comment="kernel-syms-4.4.74-92.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77886" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1035283" ref_url="https://bugzilla.suse.com/1035283" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10971" ref_url="https://www.suse.com/security/cve/CVE-2017-10971/" source="CVE"/>
		<reference ref_id="CVE-2017-10972" ref_url="https://www.suse.com/security/cve/CVE-2017-10972/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1860-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00021.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server provides the following fixes:

- CVE-2017-10971: Fix endianess handling of GenericEvent to prevent a stack overflow by clients. (bnc#1035283)
- Make sure the type of all events to be sent by ProcXSendExtensionEvent are in the
  allowed range.
- CVE-2017-10972: Initialize the xEvent eventT with zeros to avoid information leakage.

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-14"/>
	<updated date="2017-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1035283">SUSE bug 1035283</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10971/">CVE-2017-10971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10972/">CVE-2017-10972</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517906" comment="xorg-x11-server-7.6_1.18.3-74.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517907" comment="xorg-x11-server-extra-7.6_1.18.3-74.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77887" version="1" class="patch">
	<metadata>
		<title>Security update for libXdmcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1025046" ref_url="https://bugzilla.suse.com/1025046" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2625" ref_url="https://www.suse.com/security/cve/CVE-2017-2625/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003032.html" source="SUSE-SU"/>
		<description>
This update for libXdmcp fixes the following issues:

- CVE-2017-2625: The generation of session key in XDM using libXdmcp might have used weak entropy, making
  the session keys predictable (bsc#1025046)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-14"/>
	<updated date="2017-07-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025046">SUSE bug 1025046</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2625/">CVE-2017-2625</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517908" comment="libXdmcp6-1.1.1-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517909" comment="libXdmcp6-32bit-1.1.1-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77888" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1046856" ref_url="https://bugzilla.suse.com/1046856" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000083" ref_url="https://www.suse.com/security/cve/CVE-2017-1000083/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00026.html" source="SUSE-SU"/>
		<description>
This update for evince fixes the following issues:

- CVE-2017-1000083: Remote attackers could have used the comicbook mode of evince to inject shell code. (bsc#1046856, bgo#784630)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-18"/>
	<updated date="2017-07-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046856">SUSE bug 1046856</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000083/">CVE-2017-1000083</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517910" comment="evince-3.20.1-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517911" comment="evince-browser-plugin-3.20.1-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517912" comment="evince-lang-3.20.1-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517913" comment="evince-plugin-djvudocument-3.20.1-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517914" comment="evince-plugin-dvidocument-3.20.1-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517915" comment="evince-plugin-pdfdocument-3.20.1-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517916" comment="evince-plugin-psdocument-3.20.1-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517917" comment="evince-plugin-tiffdocument-3.20.1-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517918" comment="evince-plugin-xpsdocument-3.20.1-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517919" comment="libevdocument3-4-3.20.1-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517920" comment="libevview3-3-3.20.1-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517921" comment="nautilus-evince-3.20.1-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517922" comment="typelib-1_0-EvinceDocument-3_0-3.20.1-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517923" comment="typelib-1_0-EvinceView-3_0-3.20.1-6.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77889" version="1" class="patch">
	<metadata>
		<title>Security update for systemd, dracut (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1032029" ref_url="https://bugzilla.suse.com/1032029" source="BUGZILLA"/>
		<reference ref_id="1033238" ref_url="https://bugzilla.suse.com/1033238" source="BUGZILLA"/>
		<reference ref_id="1037120" ref_url="https://bugzilla.suse.com/1037120" source="BUGZILLA"/>
		<reference ref_id="1040153" ref_url="https://bugzilla.suse.com/1040153" source="BUGZILLA"/>
		<reference ref_id="1040968" ref_url="https://bugzilla.suse.com/1040968" source="BUGZILLA"/>
		<reference ref_id="1043900" ref_url="https://bugzilla.suse.com/1043900" source="BUGZILLA"/>
		<reference ref_id="1045290" ref_url="https://bugzilla.suse.com/1045290" source="BUGZILLA"/>
		<reference ref_id="1046750" ref_url="https://bugzilla.suse.com/1046750" source="BUGZILLA"/>
		<reference ref_id="986216" ref_url="https://bugzilla.suse.com/986216" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9445" ref_url="https://www.suse.com/security/cve/CVE-2017-9445/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1898-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00028.html" source="SUSE-SU"/>
		<description>
This update for systemd and dracut fixes the following issues:

Security issues fixed:

- CVE-2017-9445: Possible out-of-bounds write triggered by a specially crafted TCP payload
  from a DNS server. (bsc#1045290)

Non-security issues fixed in systemd:

- Automounter issue in combination with NFS volumes (bsc#1040968)
- Missing symbolic link for SAS device in /dev/disk/by-path (bsc#1040153)
- Add minimal support for boot.d/* scripts in systemd-sysv-convert (bsc#1046750)

Non-security issues fixed in dracut:

- Bail out if module directory does not exist. (bsc#1043900)
- Suppress bogus error message. (bsc#1032029)
- Fix module force loading with systemd. (bsc#986216)
- Ship udev files required by systemd. (bsc#1040153)
- Ignore module resolution errors (e.g. with kgraft). (bsc#1037120)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-19"/>
	<updated date="2017-07-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1032029">SUSE bug 1032029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033238">SUSE bug 1033238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037120">SUSE bug 1037120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040153">SUSE bug 1040153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040968">SUSE bug 1040968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043900">SUSE bug 1043900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045290">SUSE bug 1045290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046750">SUSE bug 1046750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986216">SUSE bug 986216</bugzilla>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9445/">CVE-2017-9445</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517924" comment="dracut-044.1-109.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517925" comment="libsystemd0-228-150.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517926" comment="libsystemd0-32bit-228-150.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517927" comment="libudev1-228-150.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517928" comment="libudev1-32bit-228-150.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517929" comment="systemd-228-150.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517930" comment="systemd-32bit-228-150.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517931" comment="systemd-bash-completion-228-150.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517932" comment="systemd-sysvinit-228-150.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517933" comment="udev-228-150.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77890" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1009994" ref_url="https://bugzilla.suse.com/1009994" source="BUGZILLA"/>
		<reference ref_id="1010756" ref_url="https://bugzilla.suse.com/1010756" source="BUGZILLA"/>
		<reference ref_id="1010757" ref_url="https://bugzilla.suse.com/1010757" source="BUGZILLA"/>
		<reference ref_id="1010766" ref_url="https://bugzilla.suse.com/1010766" source="BUGZILLA"/>
		<reference ref_id="1010774" ref_url="https://bugzilla.suse.com/1010774" source="BUGZILLA"/>
		<reference ref_id="1010782" ref_url="https://bugzilla.suse.com/1010782" source="BUGZILLA"/>
		<reference ref_id="1010968" ref_url="https://bugzilla.suse.com/1010968" source="BUGZILLA"/>
		<reference ref_id="1010975" ref_url="https://bugzilla.suse.com/1010975" source="BUGZILLA"/>
		<reference ref_id="1047958" ref_url="https://bugzilla.suse.com/1047958" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9262" ref_url="https://www.suse.com/security/cve/CVE-2016-9262/" source="CVE"/>
		<reference ref_id="CVE-2016-9388" ref_url="https://www.suse.com/security/cve/CVE-2016-9388/" source="CVE"/>
		<reference ref_id="CVE-2016-9389" ref_url="https://www.suse.com/security/cve/CVE-2016-9389/" source="CVE"/>
		<reference ref_id="CVE-2016-9390" ref_url="https://www.suse.com/security/cve/CVE-2016-9390/" source="CVE"/>
		<reference ref_id="CVE-2016-9391" ref_url="https://www.suse.com/security/cve/CVE-2016-9391/" source="CVE"/>
		<reference ref_id="CVE-2016-9392" ref_url="https://www.suse.com/security/cve/CVE-2016-9392/" source="CVE"/>
		<reference ref_id="CVE-2016-9393" ref_url="https://www.suse.com/security/cve/CVE-2016-9393/" source="CVE"/>
		<reference ref_id="CVE-2016-9394" ref_url="https://www.suse.com/security/cve/CVE-2016-9394/" source="CVE"/>
		<reference ref_id="CVE-2017-1000050" ref_url="https://www.suse.com/security/cve/CVE-2017-1000050/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003054.html" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

Security issues fixed:
- CVE-2016-9262: Multiple integer overflows in the jas_realloc function in base/jas_malloc.c and
  mem_resize function in base/jas_stream.c allow remote attackers to cause a denial of service via
  a crafted image, which triggers use after free vulnerabilities. (bsc#1009994)
- CVE-2016-9388: The ras_getcmap function in ras_dec.c allows remote attackers to cause a denial
  of service (assertion failure) via a crafted image file. (bsc#1010975)
- CVE-2016-9389: The jpc_irct and jpc_iict functions in jpc_mct.c allow remote attackers to cause a
  denial of service (assertion failure). (bsc#1010968)
- CVE-2016-9390: The jas_seq2d_create function in jas_seq.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted image file. (bsc#1010774)
- CVE-2016-9391: The jpc_bitstream_getbits function in jpc_bs.c allows remote attackers to cause a
  denial of service (assertion failure) via a very large integer. (bsc#1010782)
- CVE-2017-1000050: The jp2_encode function in jp2_enc.c allows remote attackers to cause a denial
  of service. (bsc#1047958)

CVEs already fixed with previous update:
- CVE-2016-9392: The calcstepsizes function in jpc_dec.c allows remote attackers to cause a denial
  of service (assertion failure) via a crafted file. (bsc#1010757)
- CVE-2016-9393: The jpc_pi_nextrpcl function in jpc_t2cod.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted file. (bsc#1010766)
- CVE-2016-9394: The jas_seq2d_create function in jas_seq.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted file. (bsc#1010756)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-20"/>
	<updated date="2017-07-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009994">SUSE bug 1009994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010756">SUSE bug 1010756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010757">SUSE bug 1010757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010766">SUSE bug 1010766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010774">SUSE bug 1010774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010782">SUSE bug 1010782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010968">SUSE bug 1010968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010975">SUSE bug 1010975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047958">SUSE bug 1047958</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9262/">CVE-2016-9262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9388/">CVE-2016-9388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9389/">CVE-2016-9389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9390/">CVE-2016-9390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9391/">CVE-2016-9391</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9392/">CVE-2016-9392</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9393/">CVE-2016-9393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9394/">CVE-2016-9394</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000050/">CVE-2017-1000050</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517934" comment="libjasper1-1.900.14-195.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517935" comment="libjasper1-32bit-1.900.14-195.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77891" version="1" class="patch">
	<metadata>
		<title>Security update for libquicktime (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1022805" ref_url="https://bugzilla.suse.com/1022805" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2399" ref_url="https://www.suse.com/security/cve/CVE-2016-2399/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003070.html" source="SUSE-SU"/>
		<description>
This update for libquicktime fixes the following issues:

Security issue fixed:
- CVE-2016-2399: Adjust patch to prevent endless loop when there are less than 256 bytes to read. (bsc#1022805)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-28"/>
	<updated date="2017-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022805">SUSE bug 1022805</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2399/">CVE-2016-2399</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517936" comment="libquicktime0-1.2.4-14.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77892" version="1" class="patch">
	<metadata>
		<title>Security update for libical (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1015964" ref_url="https://bugzilla.suse.com/1015964" source="BUGZILLA"/>
		<reference ref_id="1044995" ref_url="https://bugzilla.suse.com/1044995" source="BUGZILLA"/>
		<reference ref_id="986631" ref_url="https://bugzilla.suse.com/986631" source="BUGZILLA"/>
		<reference ref_id="986639" ref_url="https://bugzilla.suse.com/986639" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5824" ref_url="https://www.suse.com/security/cve/CVE-2016-5824/" source="CVE"/>
		<reference ref_id="CVE-2016-5827" ref_url="https://www.suse.com/security/cve/CVE-2016-5827/" source="CVE"/>
		<reference ref_id="CVE-2016-9584" ref_url="https://www.suse.com/security/cve/CVE-2016-9584/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003072.html" source="SUSE-SU"/>
		<description>
This update for libical fixes the following issues:

Security issues fixed:
- CVE-2016-5824: libical 1.0 allows remote attackers to cause a denial of service (use-after-free)
  via a crafted ics file. (bsc#986639)
- CVE-2016-5827: The icaltime_from_string function in libical 0.47 and 1.0 allows remote attackers
  to cause a denial of service (out-of-bounds heap read) via a crafted string to the
  icalparser_parse_string function. (bsc#986631)
- CVE-2016-9584: libical allows remote attackers to cause a denial of service (use-after-free) and
  possibly read heap memory via a crafted ics file. (bsc#1015964)

Bug fixes:
- libical crashes while parsing timezones (bsc#1044995)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-28"/>
	<updated date="2017-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015964">SUSE bug 1015964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044995">SUSE bug 1044995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986631">SUSE bug 986631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5824/">CVE-2016-5824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5827/">CVE-2016-5827</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9584/">CVE-2016-9584</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517937" comment="libical1-1.0.1-16.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517938" comment="libical1-32bit-1.0.1-16.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77893" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1042802" ref_url="https://bugzilla.suse.com/1042802" source="BUGZILLA"/>
		<reference ref_id="1045719" ref_url="https://bugzilla.suse.com/1045719" source="BUGZILLA"/>
		<reference ref_id="1045721" ref_url="https://bugzilla.suse.com/1045721" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9408" ref_url="https://www.suse.com/security/cve/CVE-2017-9408/" source="CVE"/>
		<reference ref_id="CVE-2017-9775" ref_url="https://www.suse.com/security/cve/CVE-2017-9775/" source="CVE"/>
		<reference ref_id="CVE-2017-9776" ref_url="https://www.suse.com/security/cve/CVE-2017-9776/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003075.html" source="SUSE-SU"/>
		<description>
This update for poppler fixes the following issues:

Security issues fixed:
- CVE-2017-9775: Fix a stack overflow bug in pdftocairo that could have been exploited in a denial
  of service attack through a specially crafted PDF document. (bsc#1045719)
- CVE-2017-9776: Fix an integer overflow bug that could have been exploited in a denial of service
  attack through a specially crafted PDF document. (bsc#1045721)
- CVE-2017-9408: Fix a memory leak that occurred when the parser tried to recover from a broken
  input file. (bsc#1042802) 

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-28"/>
	<updated date="2017-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042802">SUSE bug 1042802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045719">SUSE bug 1045719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045721">SUSE bug 1045721</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9408/">CVE-2017-9408</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9775/">CVE-2017-9775</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9776/">CVE-2017-9776</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517939" comment="libpoppler44-0.24.4-14.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77894" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1041783" ref_url="https://bugzilla.suse.com/1041783" source="BUGZILLA"/>
		<reference ref_id="1042802" ref_url="https://bugzilla.suse.com/1042802" source="BUGZILLA"/>
		<reference ref_id="1042803" ref_url="https://bugzilla.suse.com/1042803" source="BUGZILLA"/>
		<reference ref_id="1043088" ref_url="https://bugzilla.suse.com/1043088" source="BUGZILLA"/>
		<reference ref_id="1045719" ref_url="https://bugzilla.suse.com/1045719" source="BUGZILLA"/>
		<reference ref_id="1045721" ref_url="https://bugzilla.suse.com/1045721" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7511" ref_url="https://www.suse.com/security/cve/CVE-2017-7511/" source="CVE"/>
		<reference ref_id="CVE-2017-7515" ref_url="https://www.suse.com/security/cve/CVE-2017-7515/" source="CVE"/>
		<reference ref_id="CVE-2017-9406" ref_url="https://www.suse.com/security/cve/CVE-2017-9406/" source="CVE"/>
		<reference ref_id="CVE-2017-9408" ref_url="https://www.suse.com/security/cve/CVE-2017-9408/" source="CVE"/>
		<reference ref_id="CVE-2017-9775" ref_url="https://www.suse.com/security/cve/CVE-2017-9775/" source="CVE"/>
		<reference ref_id="CVE-2017-9776" ref_url="https://www.suse.com/security/cve/CVE-2017-9776/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003076.html" source="SUSE-SU"/>
		<description>
This update for poppler fixes the following issues:

Security issues fixed:
- CVE-2017-9775: DoS stack buffer overflow in GfxState.cc in pdftocairo via a crafted PDF document (bsc#1045719)
- CVE-2017-9776: DoS integer overflow leading to heap buffer overflow in JBIG2Stream.cc via a crafted PDF document (bsc#1045721)
- CVE-2017-7515: Stack exhaustion due to infinite recursive call in pdfunite (bsc#1043088)
- CVE-2017-7511: Null pointer dereference in pdfunite via crafted documents (bsc#1041783)
- CVE-2017-9406: Memory leak in the gmalloc function in gmem.cc (bsc#1042803)
- CVE-2017-9408: Memory leak in the Object::initArray function (bsc#1042802)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-28"/>
	<updated date="2017-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1041783">SUSE bug 1041783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042802">SUSE bug 1042802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042803">SUSE bug 1042803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043088">SUSE bug 1043088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045719">SUSE bug 1045719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045721">SUSE bug 1045721</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7511/">CVE-2017-7511</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7515/">CVE-2017-7515</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9406/">CVE-2017-9406</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9408/">CVE-2017-9408</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9775/">CVE-2017-9775</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9776/">CVE-2017-9776</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517940" comment="libpoppler-glib8-0.43.0-16.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517941" comment="libpoppler-qt4-4-0.43.0-16.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517942" comment="libpoppler60-0.43.0-16.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517943" comment="poppler-tools-0.43.0-16.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77895" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1013669" ref_url="https://bugzilla.suse.com/1013669" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9811" ref_url="https://www.suse.com/security/cve/CVE-2016-9811/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002582.html" source="SUSE-SU"/>
		<description>

This update for gstreamer-0_10-plugins-base fixes the following issue:

- CVE-2016-9811: out of bounds memory read in windows_icon_typefind (bsc#1013669)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-20"/>
	<updated date="2017-01-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013669">SUSE bug 1013669</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9811/">CVE-2016-9811</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517944" comment="gstreamer-0_10-plugins-base-0.10.36-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517945" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517946" comment="gstreamer-0_10-plugins-base-lang-0.10.36-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517947" comment="libgstapp-0_10-0-0.10.36-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517948" comment="libgstapp-0_10-0-32bit-0.10.36-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517949" comment="libgstinterfaces-0_10-0-0.10.36-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517950" comment="libgstinterfaces-0_10-0-32bit-0.10.36-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77896" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1048715" ref_url="https://bugzilla.suse.com/1048715" source="BUGZILLA"/>
		<reference ref_id="963041" ref_url="https://bugzilla.suse.com/963041" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3308" ref_url="https://www.suse.com/security/cve/CVE-2017-3308/" source="CVE"/>
		<reference ref_id="CVE-2017-3309" ref_url="https://www.suse.com/security/cve/CVE-2017-3309/" source="CVE"/>
		<reference ref_id="CVE-2017-3453" ref_url="https://www.suse.com/security/cve/CVE-2017-3453/" source="CVE"/>
		<reference ref_id="CVE-2017-3456" ref_url="https://www.suse.com/security/cve/CVE-2017-3456/" source="CVE"/>
		<reference ref_id="CVE-2017-3464" ref_url="https://www.suse.com/security/cve/CVE-2017-3464/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00000.html" source="SUSE-SU"/>
		<description>
This MariaDB update to version 10.0.31 GA fixes the following issues:

Security issues fixed:
- CVE-2017-3308: Subcomponent: Server: DML: Easily 'exploitable' vulnerability allows low
  privileged attacker with network access via multiple protocols to compromise MariaDB Server.
  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or
  frequently repeatable crash (complete DOS). (bsc#1048715)
- CVE-2017-3309: Subcomponent: Server: Optimizer: Easily 'exploitable' vulnerability allows low
  privileged attacker with network access via multiple protocols to compromise MariaDB Server.
  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or
  frequently repeatable crash (complete DOS). (bsc#1048715)
- CVE-2017-3453: Subcomponent: Server: Optimizer: Easily 'exploitable' vulnerability allows low
  privileged attacker with network access via multiple protocols to compromise MariaDB Server.
  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or
  frequently repeatable crash (complete DOS). (bsc#1048715)
- CVE-2017-3456: Subcomponent: Server: DML: Easily 'exploitable' vulnerability allows low
  privileged attacker with network access via multiple protocols to compromise MariaDB Server.
  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or
  frequently repeatable crash (complete DOS). (bsc#1048715)
- CVE-2017-3464: Subcomponent: Server: DDL: Easily 'exploitable' vulnerability allows low
  privileged attacker with network access via multiple protocols to compromise MariaDB Server.
  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or
  frequently repeatable crash (complete DOS). (bsc#1048715)

Bug fixes:
- switch from 'Restart=on-failure' to 'Restart=on-abort' in
  mysql.service in order to follow the upstream. It also fixes
  hanging mysql-systemd-helper when mariadb fails (e.g. because of
  the misconfiguration) (bsc#963041)
- XtraDB updated to 5.6.36-82.0
- TokuDB updated to 5.6.36-82.0
- Innodb updated to 5.6.36
- Performance Schema updated to 5.6.36

Release notes and changelog:
- https://kb.askmonty.org/en/mariadb-10031-release-notes
- https://kb.askmonty.org/en/mariadb-10031-changelog

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-03"/>
	<updated date="2017-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1048715">SUSE bug 1048715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963041">SUSE bug 963041</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3308/">CVE-2017-3308</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3309/">CVE-2017-3309</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3453/">CVE-2017-3453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3456/">CVE-2017-3456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3464/">CVE-2017-3464</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517951" comment="libmysqlclient18-10.0.31-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517952" comment="libmysqlclient18-32bit-10.0.31-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517953" comment="libmysqlclient_r18-10.0.31-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517954" comment="libmysqlclient_r18-32bit-10.0.31-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517955" comment="mariadb-10.0.31-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517956" comment="mariadb-client-10.0.31-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517957" comment="mariadb-errormessages-10.0.31-29.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77897" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1049255" ref_url="https://bugzilla.suse.com/1049255" source="BUGZILLA"/>
		<reference ref_id="1049621" ref_url="https://bugzilla.suse.com/1049621" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11406" ref_url="https://www.suse.com/security/cve/CVE-2017-11406/" source="CVE"/>
		<reference ref_id="CVE-2017-11407" ref_url="https://www.suse.com/security/cve/CVE-2017-11407/" source="CVE"/>
		<reference ref_id="CVE-2017-11408" ref_url="https://www.suse.com/security/cve/CVE-2017-11408/" source="CVE"/>
		<reference ref_id="CVE-2017-11410" ref_url="https://www.suse.com/security/cve/CVE-2017-11410/" source="CVE"/>
		<reference ref_id="CVE-2017-11411" ref_url="https://www.suse.com/security/cve/CVE-2017-11411/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003079.html" source="SUSE-SU"/>
		<description>
This wireshark update to version 2.2.8 fixes the following issues:

Security issues fixed:
- CVE-2017-11411: The openSAFETY dissectorcould crash or exhaust system memory because of missing
  length validation. (bsc#1049621)
- CVE-2017-11410: The WBXML dissector could go into an infinite loop. (bsc#1049255)
- CVE-2017-11408: The AMQP dissector could crash. (bsc#1049255)
- CVE-2017-11407: The MQ dissector could crash. (bsc#1049255)
- CVE-2017-11406: The DOCSIS dissector could go into an infinite loop. (bsc#1049255)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-03"/>
	<updated date="2017-08-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049255">SUSE bug 1049255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049621">SUSE bug 1049621</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11406/">CVE-2017-11406</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11407/">CVE-2017-11407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11408/">CVE-2017-11408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11410/">CVE-2017-11410</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11411/">CVE-2017-11411</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517958" comment="libwireshark8-2.2.8-48.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517959" comment="libwiretap6-2.2.8-48.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517960" comment="libwscodecs1-2.2.8-48.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517961" comment="libwsutil7-2.2.8-48.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517962" comment="wireshark-2.2.8-48.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517963" comment="wireshark-gtk-2.2.8-48.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77898" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1049483" ref_url="https://bugzilla.suse.com/1049483" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7533" ref_url="https://www.suse.com/security/cve/CVE-2017-7533/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00003.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP2 kernel was updated to 4.4.74 to receive
the following security update:

- CVE-2017-7533: Bug in inotify code allowed privilege escalation (bnc#1049483).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-03"/>
	<updated date="2017-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1049483">SUSE bug 1049483</bugzilla>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7533/">CVE-2017-7533</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517964" comment="kernel-default-4.4.74-92.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517965" comment="kernel-default-devel-4.4.74-92.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517966" comment="kernel-default-extra-4.4.74-92.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517967" comment="kernel-devel-4.4.74-92.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517968" comment="kernel-macros-4.4.74-92.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517969" comment="kernel-source-4.4.74-92.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517970" comment="kernel-syms-4.4.74-92.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77899" version="1" class="patch">
	<metadata>
		<title>Security update for libzypp, zypper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1009745" ref_url="https://bugzilla.suse.com/1009745" source="BUGZILLA"/>
		<reference ref_id="1031756" ref_url="https://bugzilla.suse.com/1031756" source="BUGZILLA"/>
		<reference ref_id="1033236" ref_url="https://bugzilla.suse.com/1033236" source="BUGZILLA"/>
		<reference ref_id="1038132" ref_url="https://bugzilla.suse.com/1038132" source="BUGZILLA"/>
		<reference ref_id="1038984" ref_url="https://bugzilla.suse.com/1038984" source="BUGZILLA"/>
		<reference ref_id="1043218" ref_url="https://bugzilla.suse.com/1043218" source="BUGZILLA"/>
		<reference ref_id="1045735" ref_url="https://bugzilla.suse.com/1045735" source="BUGZILLA"/>
		<reference ref_id="1047785" ref_url="https://bugzilla.suse.com/1047785" source="BUGZILLA"/>
		<reference ref_id="1048315" ref_url="https://bugzilla.suse.com/1048315" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7435" ref_url="https://www.suse.com/security/cve/CVE-2017-7435/" source="CVE"/>
		<reference ref_id="CVE-2017-7436" ref_url="https://www.suse.com/security/cve/CVE-2017-7436/" source="CVE"/>
		<reference ref_id="CVE-2017-9269" ref_url="https://www.suse.com/security/cve/CVE-2017-9269/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html" source="SUSE-SU"/>
		<description>
The Software Update Stack was updated to receive fixes and enhancements.

libzypp:

Security issues fixed:
- CVE-2017-7435, CVE-2017-7436, CVE-2017-9269: Fix GPG check workflows, mainly for unsigned
  repositories and packages. (bsc#1045735, bsc#1038984)

Bug fixes:
- Re-probe on refresh if the repository type changes. (bsc#1048315)
- Propagate proper error code to DownloadProgressReport. (bsc#1047785)
- Allow to trigger an appdata refresh unconditionally. (bsc#1009745)
- Support custom repo variables defined in /etc/zypp/vars.d.
- Adapt loop mounting of ISO images. (bsc#1038132, bsc#1033236)
- Fix potential crash if repository has no baseurl. (bsc#1043218)

zypper:

- Adapt download callback to report and handle unsigned packages. (bsc#1038984)
- Report missing/optional files as 'not found' rather than 'error'. (bsc#1047785)
- Document support for custom repository variables defined in /etc/zypp/vars.d.
- Emphasize that it depends on how fast PackageKit will respond to a 'quit' request sent
  if PK blocks package management.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-03"/>
	<updated date="2017-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009745">SUSE bug 1009745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031756">SUSE bug 1031756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033236">SUSE bug 1033236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038132">SUSE bug 1038132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038984">SUSE bug 1038984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043218">SUSE bug 1043218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045735">SUSE bug 1045735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047785">SUSE bug 1047785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048315">SUSE bug 1048315</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7435/">CVE-2017-7435</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7436/">CVE-2017-7436</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2017-9269/">CVE-2017-9269</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517971" comment="libzypp-16.15.2-27.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517972" comment="zypper-1.13.30-18.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517973" comment="zypper-log-1.13.30-18.13.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77900" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1046853" ref_url="https://bugzilla.suse.com/1046853" source="BUGZILLA"/>
		<reference ref_id="1046858" ref_url="https://bugzilla.suse.com/1046858" source="BUGZILLA"/>
		<reference ref_id="1047964" ref_url="https://bugzilla.suse.com/1047964" source="BUGZILLA"/>
		<reference ref_id="1047965" ref_url="https://bugzilla.suse.com/1047965" source="BUGZILLA"/>
		<reference ref_id="1049344" ref_url="https://bugzilla.suse.com/1049344" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10684" ref_url="https://www.suse.com/security/cve/CVE-2017-10684/" source="CVE"/>
		<reference ref_id="CVE-2017-10685" ref_url="https://www.suse.com/security/cve/CVE-2017-10685/" source="CVE"/>
		<reference ref_id="CVE-2017-11112" ref_url="https://www.suse.com/security/cve/CVE-2017-11112/" source="CVE"/>
		<reference ref_id="CVE-2017-11113" ref_url="https://www.suse.com/security/cve/CVE-2017-11113/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003105.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:
- CVE-2017-11112: Illegal address access in append_acs. (bsc#1047964)
- CVE-2017-11113: Dereferencing NULL pointer in _nc_parse_entry. (bsc#1047965)
- CVE-2017-10684, CVE-2017-10685: Add modified upstream fix from ncurses 6.0 to avoid broken
  termcap format (bsc#1046853, bsc#1046858, bsc#1049344)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-07"/>
	<updated date="2017-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046853">SUSE bug 1046853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046858">SUSE bug 1046858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047964">SUSE bug 1047964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047965">SUSE bug 1047965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049344">SUSE bug 1049344</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10684/">CVE-2017-10684</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10685/">CVE-2017-10685</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11112/">CVE-2017-11112</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11113/">CVE-2017-11113</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517974" comment="libncurses5-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517975" comment="libncurses5-32bit-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517976" comment="libncurses6-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517977" comment="libncurses6-32bit-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517978" comment="ncurses-devel-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517979" comment="ncurses-utils-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517980" comment="tack-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517981" comment="terminfo-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517982" comment="terminfo-base-5.9-50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77901" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-bad (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1010514" ref_url="https://bugzilla.suse.com/1010514" source="BUGZILLA"/>
		<reference ref_id="1010829" ref_url="https://bugzilla.suse.com/1010829" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9445" ref_url="https://www.suse.com/security/cve/CVE-2016-9445/" source="CVE"/>
		<reference ref_id="CVE-2016-9446" ref_url="https://www.suse.com/security/cve/CVE-2016-9446/" source="CVE"/>
		<reference ref_id="CVE-2016-9447" ref_url="https://www.suse.com/security/cve/CVE-2016-9447/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002544.html" source="SUSE-SU"/>
		<description>


This update for gstreamer-0_10-plugins-bad fixes the following issues:

- CVE-2016-9445, CVE-2016-9446: Protection against buffer overflows (bsc#1010829)
- CVE-2016-9447: Disable the nsf plugin (bsc#1010514)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-05"/>
	<updated date="2017-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010514">SUSE bug 1010514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010829">SUSE bug 1010829</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9445/">CVE-2016-9445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9446/">CVE-2016-9446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9447/">CVE-2016-9447</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517983" comment="gstreamer-0_10-plugins-bad-0.10.23-22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517984" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517985" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517986" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517987" comment="libgstbasevideo-0_10-23-0.10.23-22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517988" comment="libgstbasevideo-0_10-23-32bit-0.10.23-22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517989" comment="libgstcodecparsers-0_10-23-0.10.23-22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517990" comment="libgstphotography-0_10-23-0.10.23-22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517991" comment="libgstphotography-0_10-23-32bit-0.10.23-22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517992" comment="libgstsignalprocessor-0_10-23-0.10.23-22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517993" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517994" comment="libgstvdp-0_10-23-0.10.23-22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517995" comment="libgstvdp-0_10-23-32bit-0.10.23-22.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77902" version="1" class="patch">
	<metadata>
		<title>Security update for puppet (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1040151" ref_url="https://bugzilla.suse.com/1040151" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2295" ref_url="https://www.suse.com/security/cve/CVE-2017-2295/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00034.html" source="SUSE-SU"/>
		<description>
This update for puppet fixes the following issues:

Security issue fixed:
- CVE-2017-2295: Possible code execution vulnerability where an attacker could force YAML
  deserialization in an unsafe manner. In default, this update breaks a backwards compatibility
  with Puppet agents older than 3.2.2 as the SLE12 master doesn't support other fact formats than
  pson in default anymore.
  In order to allow users to continue using their SLE12 master/SLE11 agents setup and fix
  CVE-2017-2295 for the others, a new puppet master boolean option 'dangerous_fact_formats' was
  added. When it's set to true it enables using dangerous fact formats (e.g. YAML). When it's set
  to false, only PSON fact format is accepted. (bsc#1040151)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-09"/>
	<updated date="2017-08-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040151">SUSE bug 1040151</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2295/">CVE-2017-2295</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517996" comment="puppet-3.8.5-15.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77903" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1049607" ref_url="https://bugzilla.suse.com/1049607" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11464" ref_url="https://www.suse.com/security/cve/CVE-2017-11464/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003126.html" source="SUSE-SU"/>
		<description>
This update librsvg to version 2.40.18 fixes the following issues:

Security issue fixed:
- CVE-2017-11464: A SIGFPE is raised in the function box_blur_line of rsvg-filter.c. (bsc#1049607)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-09"/>
	<updated date="2017-08-09"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1049607">SUSE bug 1049607</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11464/">CVE-2017-11464</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517997" comment="gdk-pixbuf-loader-rsvg-2.40.18-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517998" comment="librsvg-2-2-2.40.18-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517999" comment="librsvg-2-2-32bit-2.40.18-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518000" comment="rsvg-view-2.40.18-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77904" version="1" class="patch">
	<metadata>
		<title>Security update for libsoup (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1052916" ref_url="https://bugzilla.suse.com/1052916" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2885" ref_url="https://www.suse.com/security/cve/CVE-2017-2885/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00037.html" source="SUSE-SU"/>
		<description>
This update for libsoup fixes the following issues:

- A bug in the HTTP Chunked Encoding code has been fixed that could have been
  exploited by attackers to cause a stack-based buffer overflow in client or
  server code running libsoup (bsc#1052916, CVE-2017-2885).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-10"/>
	<updated date="2017-08-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1052916">SUSE bug 1052916</bugzilla>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2885/">CVE-2017-2885</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518001" comment="libsoup-2_4-1-2.54.1-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518002" comment="libsoup-2_4-1-32bit-2.54.1-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518003" comment="libsoup-lang-2.54.1-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518004" comment="typelib-1_0-Soup-2_4-2.54.1-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77905" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1038078" ref_url="https://bugzilla.suse.com/1038078" source="BUGZILLA"/>
		<reference ref_id="1043652" ref_url="https://bugzilla.suse.com/1043652" source="BUGZILLA"/>
		<reference ref_id="1048914" ref_url="https://bugzilla.suse.com/1048914" source="BUGZILLA"/>
		<reference ref_id="1052311" ref_url="https://bugzilla.suse.com/1052311" source="BUGZILLA"/>
		<reference ref_id="1052365" ref_url="https://bugzilla.suse.com/1052365" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000111" ref_url="https://www.suse.com/security/cve/CVE-2017-1000111/" source="CVE"/>
		<reference ref_id="CVE-2017-1000112" ref_url="https://www.suse.com/security/cve/CVE-2017-1000112/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00039.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP2 kernel was updated to 4.4.74 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-1000111: fix race condition in net-packet code that could be
  exploited to cause out-of-bounds memory access (bsc#1052365).
- CVE-2017-1000112: fix race condition in net-packet code that could have been
  exploited by unprivileged users to gain root access. (bsc#1052311).

The following non-security bugs were fixed:

- powerpc/numa: fix regression that could cause kernel panics during installation (bsc#1048914).
- bcache: force trigger gc (bsc#1038078).
- bcache: only recovery I/O error for writethrough mode (bsc#1043652).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-11"/>
	<updated date="2017-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038078">SUSE bug 1038078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043652">SUSE bug 1043652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048914">SUSE bug 1048914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052311">SUSE bug 1052311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052365">SUSE bug 1052365</bugzilla>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000111/">CVE-2017-1000111</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000112/">CVE-2017-1000112</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518005" comment="kernel-default-4.4.74-92.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518006" comment="kernel-default-devel-4.4.74-92.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518007" comment="kernel-default-extra-4.4.74-92.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518008" comment="kernel-devel-4.4.74-92.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518009" comment="kernel-macros-4.4.74-92.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518010" comment="kernel-source-4.4.74-92.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518011" comment="kernel-syms-4.4.74-92.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77906" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1051222" ref_url="https://bugzilla.suse.com/1051222" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11185" ref_url="https://www.suse.com/security/cve/CVE-2017-11185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003132.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:


CVE-2017-11185: Specific RSA signatures passed to the gmp plugin for verification can
cause a null-pointer dereference and it may lead to a denial of service (bsc#1051222) 

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-11"/>
	<updated date="2017-08-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1051222">SUSE bug 1051222</bugzilla>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11185/">CVE-2017-11185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518012" comment="strongswan-5.1.3-26.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518013" comment="strongswan-doc-5.1.3-26.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518014" comment="strongswan-ipsec-5.1.3-26.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518015" comment="strongswan-libs0-5.1.3-26.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77907" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="979907" ref_url="https://bugzilla.suse.com/979907" source="BUGZILLA"/>
		<reference ref_id="997857" ref_url="https://bugzilla.suse.com/997857" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8871" ref_url="https://www.suse.com/security/cve/CVE-2015-8871/" source="CVE"/>
		<reference ref_id="CVE-2016-7163" ref_url="https://www.suse.com/security/cve/CVE-2016-7163/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003133.html" source="SUSE-SU"/>
		<description>
This update for openjpeg2 fixes the following issues:

- CVE 2016-7163: Integer Overflow could lead to remote code execution (bsc#997857).

- CVE 2015-8871: Use-after-free in opj_j2k_write_mco function could lead to denial of service (bsc#979907).


		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-11"/>
	<updated date="2017-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979907">SUSE bug 979907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997857">SUSE bug 997857</bugzilla>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-8871/">CVE-2015-8871</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7163/">CVE-2016-7163</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518016" comment="libopenjp2-7-2.1.0-4.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77908" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1038444" ref_url="https://bugzilla.suse.com/1038444" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8872" ref_url="https://www.suse.com/security/cve/CVE-2017-8872/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003130.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

Security issues fixed:
- CVE-2017-8872: Out-of-bounds read in htmlParseTryOrFinish. (bsc#1038444)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-11"/>
	<updated date="2017-08-11"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1038444">SUSE bug 1038444</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8872/">CVE-2017-8872</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518017" comment="libxml2-2-2.9.4-46.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518018" comment="libxml2-2-32bit-2.9.4-46.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518019" comment="libxml2-tools-2.9.4-46.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518020" comment="python-libxml2-2.9.4-46.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77909" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1051643" ref_url="https://bugzilla.suse.com/1051643" source="BUGZILLA"/>
		<reference ref_id="1051644" ref_url="https://bugzilla.suse.com/1051644" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000100" ref_url="https://www.suse.com/security/cve/CVE-2017-1000100/" source="CVE"/>
		<reference ref_id="CVE-2017-1000101" ref_url="https://www.suse.com/security/cve/CVE-2017-1000101/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003138.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2017-1000100: TFP sends more than buffer size and it could lead to a denial of service (bsc#1051644)
- CVE-2017-1000101: URL globbing out of bounds read could lead to a denial of service (bsc#1051643)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-16"/>
	<updated date="2017-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1051643">SUSE bug 1051643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051644">SUSE bug 1051644</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000100/">CVE-2017-1000100</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000101/">CVE-2017-1000101</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518021" comment="curl-7.37.0-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518022" comment="libcurl4-7.37.0-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518023" comment="libcurl4-32bit-7.37.0-37.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77910" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1049302" ref_url="https://bugzilla.suse.com/1049302" source="BUGZILLA"/>
		<reference ref_id="1049305" ref_url="https://bugzilla.suse.com/1049305" source="BUGZILLA"/>
		<reference ref_id="1049306" ref_url="https://bugzilla.suse.com/1049306" source="BUGZILLA"/>
		<reference ref_id="1049307" ref_url="https://bugzilla.suse.com/1049307" source="BUGZILLA"/>
		<reference ref_id="1049308" ref_url="https://bugzilla.suse.com/1049308" source="BUGZILLA"/>
		<reference ref_id="1049309" ref_url="https://bugzilla.suse.com/1049309" source="BUGZILLA"/>
		<reference ref_id="1049310" ref_url="https://bugzilla.suse.com/1049310" source="BUGZILLA"/>
		<reference ref_id="1049311" ref_url="https://bugzilla.suse.com/1049311" source="BUGZILLA"/>
		<reference ref_id="1049312" ref_url="https://bugzilla.suse.com/1049312" source="BUGZILLA"/>
		<reference ref_id="1049313" ref_url="https://bugzilla.suse.com/1049313" source="BUGZILLA"/>
		<reference ref_id="1049314" ref_url="https://bugzilla.suse.com/1049314" source="BUGZILLA"/>
		<reference ref_id="1049315" ref_url="https://bugzilla.suse.com/1049315" source="BUGZILLA"/>
		<reference ref_id="1049316" ref_url="https://bugzilla.suse.com/1049316" source="BUGZILLA"/>
		<reference ref_id="1049317" ref_url="https://bugzilla.suse.com/1049317" source="BUGZILLA"/>
		<reference ref_id="1049318" ref_url="https://bugzilla.suse.com/1049318" source="BUGZILLA"/>
		<reference ref_id="1049319" ref_url="https://bugzilla.suse.com/1049319" source="BUGZILLA"/>
		<reference ref_id="1049320" ref_url="https://bugzilla.suse.com/1049320" source="BUGZILLA"/>
		<reference ref_id="1049321" ref_url="https://bugzilla.suse.com/1049321" source="BUGZILLA"/>
		<reference ref_id="1049322" ref_url="https://bugzilla.suse.com/1049322" source="BUGZILLA"/>
		<reference ref_id="1049323" ref_url="https://bugzilla.suse.com/1049323" source="BUGZILLA"/>
		<reference ref_id="1049324" ref_url="https://bugzilla.suse.com/1049324" source="BUGZILLA"/>
		<reference ref_id="1049325" ref_url="https://bugzilla.suse.com/1049325" source="BUGZILLA"/>
		<reference ref_id="1049326" ref_url="https://bugzilla.suse.com/1049326" source="BUGZILLA"/>
		<reference ref_id="1049327" ref_url="https://bugzilla.suse.com/1049327" source="BUGZILLA"/>
		<reference ref_id="1049328" ref_url="https://bugzilla.suse.com/1049328" source="BUGZILLA"/>
		<reference ref_id="1049329" ref_url="https://bugzilla.suse.com/1049329" source="BUGZILLA"/>
		<reference ref_id="1049330" ref_url="https://bugzilla.suse.com/1049330" source="BUGZILLA"/>
		<reference ref_id="1049331" ref_url="https://bugzilla.suse.com/1049331" source="BUGZILLA"/>
		<reference ref_id="1049332" ref_url="https://bugzilla.suse.com/1049332" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10053" ref_url="https://www.suse.com/security/cve/CVE-2017-10053/" source="CVE"/>
		<reference ref_id="CVE-2017-10067" ref_url="https://www.suse.com/security/cve/CVE-2017-10067/" source="CVE"/>
		<reference ref_id="CVE-2017-10074" ref_url="https://www.suse.com/security/cve/CVE-2017-10074/" source="CVE"/>
		<reference ref_id="CVE-2017-10078" ref_url="https://www.suse.com/security/cve/CVE-2017-10078/" source="CVE"/>
		<reference ref_id="CVE-2017-10081" ref_url="https://www.suse.com/security/cve/CVE-2017-10081/" source="CVE"/>
		<reference ref_id="CVE-2017-10086" ref_url="https://www.suse.com/security/cve/CVE-2017-10086/" source="CVE"/>
		<reference ref_id="CVE-2017-10087" ref_url="https://www.suse.com/security/cve/CVE-2017-10087/" source="CVE"/>
		<reference ref_id="CVE-2017-10089" ref_url="https://www.suse.com/security/cve/CVE-2017-10089/" source="CVE"/>
		<reference ref_id="CVE-2017-10090" ref_url="https://www.suse.com/security/cve/CVE-2017-10090/" source="CVE"/>
		<reference ref_id="CVE-2017-10096" ref_url="https://www.suse.com/security/cve/CVE-2017-10096/" source="CVE"/>
		<reference ref_id="CVE-2017-10101" ref_url="https://www.suse.com/security/cve/CVE-2017-10101/" source="CVE"/>
		<reference ref_id="CVE-2017-10102" ref_url="https://www.suse.com/security/cve/CVE-2017-10102/" source="CVE"/>
		<reference ref_id="CVE-2017-10105" ref_url="https://www.suse.com/security/cve/CVE-2017-10105/" source="CVE"/>
		<reference ref_id="CVE-2017-10107" ref_url="https://www.suse.com/security/cve/CVE-2017-10107/" source="CVE"/>
		<reference ref_id="CVE-2017-10108" ref_url="https://www.suse.com/security/cve/CVE-2017-10108/" source="CVE"/>
		<reference ref_id="CVE-2017-10109" ref_url="https://www.suse.com/security/cve/CVE-2017-10109/" source="CVE"/>
		<reference ref_id="CVE-2017-10110" ref_url="https://www.suse.com/security/cve/CVE-2017-10110/" source="CVE"/>
		<reference ref_id="CVE-2017-10111" ref_url="https://www.suse.com/security/cve/CVE-2017-10111/" source="CVE"/>
		<reference ref_id="CVE-2017-10114" ref_url="https://www.suse.com/security/cve/CVE-2017-10114/" source="CVE"/>
		<reference ref_id="CVE-2017-10115" ref_url="https://www.suse.com/security/cve/CVE-2017-10115/" source="CVE"/>
		<reference ref_id="CVE-2017-10116" ref_url="https://www.suse.com/security/cve/CVE-2017-10116/" source="CVE"/>
		<reference ref_id="CVE-2017-10118" ref_url="https://www.suse.com/security/cve/CVE-2017-10118/" source="CVE"/>
		<reference ref_id="CVE-2017-10125" ref_url="https://www.suse.com/security/cve/CVE-2017-10125/" source="CVE"/>
		<reference ref_id="CVE-2017-10135" ref_url="https://www.suse.com/security/cve/CVE-2017-10135/" source="CVE"/>
		<reference ref_id="CVE-2017-10176" ref_url="https://www.suse.com/security/cve/CVE-2017-10176/" source="CVE"/>
		<reference ref_id="CVE-2017-10193" ref_url="https://www.suse.com/security/cve/CVE-2017-10193/" source="CVE"/>
		<reference ref_id="CVE-2017-10198" ref_url="https://www.suse.com/security/cve/CVE-2017-10198/" source="CVE"/>
		<reference ref_id="CVE-2017-10243" ref_url="https://www.suse.com/security/cve/CVE-2017-10243/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<description>
This java-1_8_0-openjdk update to version jdk8u141 (icedtea 3.5.0) fixes the following issues:

Security issues fixed:
- CVE-2017-10053: Improved image post-processing steps (bsc#1049305)
- CVE-2017-10067: Additional jar validation steps (bsc#1049306)
- CVE-2017-10074: Image conversion improvements (bsc#1049307)
- CVE-2017-10078: Better script accessibility for JavaScript (bsc#1049308)
- CVE-2017-10081: Right parenthesis issue (bsc#1049309)
- CVE-2017-10086: Unspecified vulnerability in subcomponent JavaFX (bsc#1049310)
- CVE-2017-10087: Better Thread Pool execution (bsc#1049311)
- CVE-2017-10089: Service Registration Lifecycle (bsc#1049312)
- CVE-2017-10090: Better handling of channel groups (bsc#1049313)
- CVE-2017-10096: Transform Transformer Exceptions (bsc#1049314)
- CVE-2017-10101: Better reading of text catalogs (bsc#1049315)
- CVE-2017-10102: Improved garbage collection (bsc#1049316)
- CVE-2017-10105: Unspecified vulnerability in subcomponent deployment (bsc#1049317)
- CVE-2017-10107: Less Active Activations (bsc#1049318)
- CVE-2017-10108: Better naming attribution (bsc#1049319)
- CVE-2017-10109: Better sourcing of code (bsc#1049320)
- CVE-2017-10110: Better image fetching (bsc#1049321)
- CVE-2017-10111: Rearrange MethodHandle arrangements (bsc#1049322)
- CVE-2017-10114: Unspecified vulnerability in subcomponent JavaFX (bsc#1049323)
- CVE-2017-10115: Higher quality DSA operations (bsc#1049324)
- CVE-2017-10116: Proper directory lookup processing (bsc#1049325)
- CVE-2017-10118: Higher quality ECDSA operations (bsc#1049326)
- CVE-2017-10125: Unspecified vulnerability in subcomponent deployment (bsc#1049327)
- CVE-2017-10135: Better handling of PKCS8 material (bsc#1049328)
- CVE-2017-10176: Additional elliptic curve support (bsc#1049329)
- CVE-2017-10193: Improve algorithm constraints implementation (bsc#1049330)
- CVE-2017-10198: Clear certificate chain connections (bsc#1049331)
- CVE-2017-10243: Unspecified vulnerability in subcomponent JAX-WS (bsc#1049332)

Bug fixes:
- Check registry registration location
- Improved certificate processing
- JMX diagnostic improvements
- Update to libpng 1.6.28
- Import of OpenJDK 8 u141 build 15 (bsc#1049302)

New features:
- Support using RSAandMGF1 with the SHA hash algorithms in the PKCS11 provider

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-16"/>
	<updated date="2017-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1049302">SUSE bug 1049302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049305">SUSE bug 1049305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049306">SUSE bug 1049306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049307">SUSE bug 1049307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049308">SUSE bug 1049308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049309">SUSE bug 1049309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049310">SUSE bug 1049310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049311">SUSE bug 1049311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049312">SUSE bug 1049312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049313">SUSE bug 1049313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049314">SUSE bug 1049314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049315">SUSE bug 1049315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049316">SUSE bug 1049316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049317">SUSE bug 1049317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049318">SUSE bug 1049318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049319">SUSE bug 1049319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049320">SUSE bug 1049320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049321">SUSE bug 1049321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049322">SUSE bug 1049322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049323">SUSE bug 1049323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049324">SUSE bug 1049324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049325">SUSE bug 1049325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049326">SUSE bug 1049326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049327">SUSE bug 1049327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049328">SUSE bug 1049328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049329">SUSE bug 1049329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049330">SUSE bug 1049330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049331">SUSE bug 1049331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049332">SUSE bug 1049332</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10053/">CVE-2017-10053</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10067/">CVE-2017-10067</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10074/">CVE-2017-10074</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10078/">CVE-2017-10078</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10081/">CVE-2017-10081</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10086/">CVE-2017-10086</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10087/">CVE-2017-10087</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10089/">CVE-2017-10089</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10090/">CVE-2017-10090</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10096/">CVE-2017-10096</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10101/">CVE-2017-10101</cve>
	<cve impact="important" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10102/">CVE-2017-10102</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10105/">CVE-2017-10105</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10107/">CVE-2017-10107</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10108/">CVE-2017-10108</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10109/">CVE-2017-10109</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10110/">CVE-2017-10110</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10111/">CVE-2017-10111</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10114/">CVE-2017-10114</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-10115/">CVE-2017-10115</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10116/">CVE-2017-10116</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10118/">CVE-2017-10118</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10125/">CVE-2017-10125</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10135/">CVE-2017-10135</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10176/">CVE-2017-10176</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10193/">CVE-2017-10193</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10198/">CVE-2017-10198</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10243/">CVE-2017-10243</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518024" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518025" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77911" version="1" class="patch">
	<metadata>
		<title>Security update for libplist (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1029638" ref_url="https://bugzilla.suse.com/1029638" source="BUGZILLA"/>
		<reference ref_id="1029639" ref_url="https://bugzilla.suse.com/1029639" source="BUGZILLA"/>
		<reference ref_id="1029706" ref_url="https://bugzilla.suse.com/1029706" source="BUGZILLA"/>
		<reference ref_id="1029707" ref_url="https://bugzilla.suse.com/1029707" source="BUGZILLA"/>
		<reference ref_id="1029751" ref_url="https://bugzilla.suse.com/1029751" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6435" ref_url="https://www.suse.com/security/cve/CVE-2017-6435/" source="CVE"/>
		<reference ref_id="CVE-2017-6436" ref_url="https://www.suse.com/security/cve/CVE-2017-6436/" source="CVE"/>
		<reference ref_id="CVE-2017-6437" ref_url="https://www.suse.com/security/cve/CVE-2017-6437/" source="CVE"/>
		<reference ref_id="CVE-2017-6438" ref_url="https://www.suse.com/security/cve/CVE-2017-6438/" source="CVE"/>
		<reference ref_id="CVE-2017-6439" ref_url="https://www.suse.com/security/cve/CVE-2017-6439/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003143.html" source="SUSE-SU"/>
		<description>
This update for libplist fixes the following issues:

Security issues fixed:

- CVE-2017-6439: Heap-based buffer overflow in the parse_string_node function. (bsc#1029638)
- CVE-2017-6438: Heap-based buffer overflow in the parse_unicode_node function. (bsc#1029706)
- CVE-2017-6437: The base64encode function in base64.c allows local users to cause denial of service
  (out-of-bounds read) via a crafted plist file. (bsc#1029707)
- CVE-2017-6436: Integer overflow in parse_string_node. (bsc#1029751)
- CVE-2017-6435: Crafted plist file could lead to Heap-buffer overflow. (bsc#1029639)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-17"/>
	<updated date="2017-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1029638">SUSE bug 1029638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029639">SUSE bug 1029639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029706">SUSE bug 1029706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029707">SUSE bug 1029707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029751">SUSE bug 1029751</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6435/">CVE-2017-6435</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6436/">CVE-2017-6436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6437/">CVE-2017-6437</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6438/">CVE-2017-6438</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6439/">CVE-2017-6439</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518026" comment="libplist++3-1.12-20.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518027" comment="libplist3-1.12-20.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77912" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1042812" ref_url="https://bugzilla.suse.com/1042812" source="BUGZILLA"/>
		<reference ref_id="1042826" ref_url="https://bugzilla.suse.com/1042826" source="BUGZILLA"/>
		<reference ref_id="1043289" ref_url="https://bugzilla.suse.com/1043289" source="BUGZILLA"/>
		<reference ref_id="1049072" ref_url="https://bugzilla.suse.com/1049072" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11403" ref_url="https://www.suse.com/security/cve/CVE-2017-11403/" source="CVE"/>
		<reference ref_id="CVE-2017-9439" ref_url="https://www.suse.com/security/cve/CVE-2017-9439/" source="CVE"/>
		<reference ref_id="CVE-2017-9440" ref_url="https://www.suse.com/security/cve/CVE-2017-9440/" source="CVE"/>
		<reference ref_id="CVE-2017-9501" ref_url="https://www.suse.com/security/cve/CVE-2017-9501/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00053.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:
- CVE-2017-9439: A memory leak was found in the function ReadPDBImage incoders/pdb.c (bsc#1042826)
- CVE-2017-9440: A memory leak was found in the function ReadPSDChannelin coders/psd.c (bsc#1042812)
- CVE-2017-9501: An assertion failure could cause a denial of service via a crafted file (bsc#1043289)
- CVE-2017-11403: ReadMNGImage function in coders/png.c has an out-of-order CloseBlob call, resulting
  in a use-after-free via acrafted file (bsc#1049072)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-17"/>
	<updated date="2017-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1042812">SUSE bug 1042812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042826">SUSE bug 1042826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043289">SUSE bug 1043289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049072">SUSE bug 1049072</bugzilla>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11403/">CVE-2017-11403</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9439/">CVE-2017-9439</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9440/">CVE-2017-9440</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9501/">CVE-2017-9501</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518028" comment="ImageMagick-6.8.8.1-71.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518029" comment="libMagick++-6_Q16-3-6.8.8.1-71.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518030" comment="libMagickCore-6_Q16-1-6.8.8.1-71.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518031" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518032" comment="libMagickWand-6_Q16-1-6.8.8.1-71.5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77913" version="1" class="patch">
	<metadata>
		<title>Security update for gnome-shell (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1008539" ref_url="https://bugzilla.suse.com/1008539" source="BUGZILLA"/>
		<reference ref_id="1034584" ref_url="https://bugzilla.suse.com/1034584" source="BUGZILLA"/>
		<reference ref_id="1034827" ref_url="https://bugzilla.suse.com/1034827" source="BUGZILLA"/>
		<reference ref_id="1036494" ref_url="https://bugzilla.suse.com/1036494" source="BUGZILLA"/>
		<reference ref_id="1047262" ref_url="https://bugzilla.suse.com/1047262" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8288" ref_url="https://www.suse.com/security/cve/CVE-2017-8288/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003146.html" source="SUSE-SU"/>
		<description>

This update for gnome-shell provides the following fixes:

- Fix not intuitive login screen for root user (bsc#1047262)
- Disable session selection button when it's hidden in user switch dialog (bsc#1034584, bsc#1034827)
- Fix app windows overlay app list in overview screen (bsc#1008539)
- Properly handle failures when loading extensions (bsc#1036494, CVE-2017-8288)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-18"/>
	<updated date="2017-08-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1008539">SUSE bug 1008539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034584">SUSE bug 1034584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034827">SUSE bug 1034827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036494">SUSE bug 1036494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047262">SUSE bug 1047262</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8288/">CVE-2017-8288</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518033" comment="gnome-shell-3.20.4-77.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518034" comment="gnome-shell-browser-plugin-3.20.4-77.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518035" comment="gnome-shell-calendar-3.20.4-77.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518036" comment="gnome-shell-lang-3.20.4-77.7.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77914" version="1" class="patch">
	<metadata>
		<title>Security update for freerdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1050699" ref_url="https://bugzilla.suse.com/1050699" source="BUGZILLA"/>
		<reference ref_id="1050704" ref_url="https://bugzilla.suse.com/1050704" source="BUGZILLA"/>
		<reference ref_id="1050708" ref_url="https://bugzilla.suse.com/1050708" source="BUGZILLA"/>
		<reference ref_id="1050711" ref_url="https://bugzilla.suse.com/1050711" source="BUGZILLA"/>
		<reference ref_id="1050712" ref_url="https://bugzilla.suse.com/1050712" source="BUGZILLA"/>
		<reference ref_id="1050714" ref_url="https://bugzilla.suse.com/1050714" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2834" ref_url="https://www.suse.com/security/cve/CVE-2017-2834/" source="CVE"/>
		<reference ref_id="CVE-2017-2835" ref_url="https://www.suse.com/security/cve/CVE-2017-2835/" source="CVE"/>
		<reference ref_id="CVE-2017-2836" ref_url="https://www.suse.com/security/cve/CVE-2017-2836/" source="CVE"/>
		<reference ref_id="CVE-2017-2837" ref_url="https://www.suse.com/security/cve/CVE-2017-2837/" source="CVE"/>
		<reference ref_id="CVE-2017-2838" ref_url="https://www.suse.com/security/cve/CVE-2017-2838/" source="CVE"/>
		<reference ref_id="CVE-2017-2839" ref_url="https://www.suse.com/security/cve/CVE-2017-2839/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00060.html" source="SUSE-SU"/>
		<description>
This update for freerdp fixes the following issues:

  - CVE-2017-2834: Out-of-bounds write in license_recv() (bsc#1050714)
    
  - CVE-2017-2835: Out-of-bounds write in rdp_recv_tpkt_pdu (bsc#1050712)
  
  - CVE-2017-2836: Rdp Client Read Server Proprietary Certificate Denial of Service (bsc#1050699)

  - CVE-2017-2837: Client GCC Read Server Security Data DoS (bsc#1050704)

  - CVE-2017-2838: Client License Read Product Info Denial of Service Vulnerability (bsc#1050708)

  - CVE-2017-2839: Client License Read Challenge Packet Denial of Service (bsc#1050711)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-22"/>
	<updated date="2017-08-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1050699">SUSE bug 1050699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050704">SUSE bug 1050704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050708">SUSE bug 1050708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050711">SUSE bug 1050711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050712">SUSE bug 1050712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050714">SUSE bug 1050714</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2834/">CVE-2017-2834</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2835/">CVE-2017-2835</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2836/">CVE-2017-2836</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2837/">CVE-2017-2837</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2838/">CVE-2017-2838</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2839/">CVE-2017-2839</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518037" comment="freerdp-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518038" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77915" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1005480" ref_url="https://bugzilla.suse.com/1005480" source="BUGZILLA"/>
		<reference ref_id="1005893" ref_url="https://bugzilla.suse.com/1005893" source="BUGZILLA"/>
		<reference ref_id="1006221" ref_url="https://bugzilla.suse.com/1006221" source="BUGZILLA"/>
		<reference ref_id="1016366" ref_url="https://bugzilla.suse.com/1016366" source="BUGZILLA"/>
		<reference ref_id="1016368" ref_url="https://bugzilla.suse.com/1016368" source="BUGZILLA"/>
		<reference ref_id="1016369" ref_url="https://bugzilla.suse.com/1016369" source="BUGZILLA"/>
		<reference ref_id="1016370" ref_url="https://bugzilla.suse.com/1016370" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10009" ref_url="https://www.suse.com/security/cve/CVE-2016-10009/" source="CVE"/>
		<reference ref_id="CVE-2016-10010" ref_url="https://www.suse.com/security/cve/CVE-2016-10010/" source="CVE"/>
		<reference ref_id="CVE-2016-10011" ref_url="https://www.suse.com/security/cve/CVE-2016-10011/" source="CVE"/>
		<reference ref_id="CVE-2016-10012" ref_url="https://www.suse.com/security/cve/CVE-2016-10012/" source="CVE"/>
		<reference ref_id="CVE-2016-8858" ref_url="https://www.suse.com/security/cve/CVE-2016-8858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002592.html" source="SUSE-SU"/>
		<description>

This update for openssh fixes several issues.

These security issues were fixed:

- CVE-2016-8858: The kex_input_kexinit function in kex.c allowed remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests (bsc#1005480).
- CVE-2016-10012: The shared memory manager (associated with pre-authentication compression) did not ensure that a bounds check is enforced by all compilers, which might allowed local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures (bsc#1016370).
- CVE-2016-10009: Untrusted search path vulnerability in ssh-agent.c allowed remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket (bsc#1016366).
- CVE-2016-10010: When forwarding unix domain sockets with privilege separation disabled, the resulting sockets have be created as 'root' instead of the authenticated user. Forwarding unix domain sockets without privilege separation enabled is now rejected.
- CVE-2016-10011: authfile.c in sshd did not properly consider the effects of realloc on buffer contents, which might allowed local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process (bsc#1016369).

These non-security issues were fixed:

- Adjusted suggested command for removing conflicting server keys from the known_hosts file (bsc#1006221)
- Properly verify CIDR masks in configuration (bsc#1005893)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-23"/>
	<updated date="2017-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005480">SUSE bug 1005480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005893">SUSE bug 1005893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006221">SUSE bug 1006221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016366">SUSE bug 1016366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016368">SUSE bug 1016368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016369">SUSE bug 1016369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016370">SUSE bug 1016370</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10009/">CVE-2016-10009</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10010/">CVE-2016-10010</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10011/">CVE-2016-10011</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10012/">CVE-2016-10012</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8858/">CVE-2016-8858</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518039" comment="openssh-7.2p2-66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518040" comment="openssh-askpass-gnome-7.2p2-66.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518041" comment="openssh-helpers-7.2p2-66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77916" version="1" class="patch">
	<metadata>
		<title>Security update for libraw (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1039209" ref_url="https://bugzilla.suse.com/1039209" source="BUGZILLA"/>
		<reference ref_id="1039210" ref_url="https://bugzilla.suse.com/1039210" source="BUGZILLA"/>
		<reference ref_id="1039379" ref_url="https://bugzilla.suse.com/1039379" source="BUGZILLA"/>
		<reference ref_id="1039380" ref_url="https://bugzilla.suse.com/1039380" source="BUGZILLA"/>
		<reference ref_id="930683" ref_url="https://bugzilla.suse.com/930683" source="BUGZILLA"/>
		<reference ref_id="957517" ref_url="https://bugzilla.suse.com/957517" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3885" ref_url="https://www.suse.com/security/cve/CVE-2015-3885/" source="CVE"/>
		<reference ref_id="CVE-2015-8367" ref_url="https://www.suse.com/security/cve/CVE-2015-8367/" source="CVE"/>
		<reference ref_id="CVE-2017-6886" ref_url="https://www.suse.com/security/cve/CVE-2017-6886/" source="CVE"/>
		<reference ref_id="CVE-2017-6887" ref_url="https://www.suse.com/security/cve/CVE-2017-6887/" source="CVE"/>
		<reference ref_id="CVE-2017-6889" ref_url="https://www.suse.com/security/cve/CVE-2017-6889/" source="CVE"/>
		<reference ref_id="CVE-2017-6890" ref_url="https://www.suse.com/security/cve/CVE-2017-6890/" source="CVE"/>
		<reference ref_id="CVE-2017-6899" ref_url="https://www.suse.com/security/cve/CVE-2017-6899/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003170.html" source="SUSE-SU"/>
		<description>
This update for libraw fixes the following issues:

- CVE-2015-3885: A specially crafted raw image file could have caused a Denial of Service
  through an integer overflow. (bsc#930683)

- CVE-2015-8367: The function phase_one_correct() did not handle memory object initialization
  correctly, which may have caused some other problems. (bsc#957517)

- CVE-2017-6886: memory corruption in parse_tiff_ifd() func (internal/dcraw_common.cpp) could lead to Denial of service (bsc#1039380)

- CVE-2017-6889: integer overflow error within the 'foveon_load_camf()' function (dcraw_foveon.c) could lead to Denial of service (bsc#1039210)

- CVE-2017-6890: boundary error within the 'foveon_load_camf()' function (dcraw_foveon.c) (bsc#1039209)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-30"/>
	<updated date="2017-08-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1039209">SUSE bug 1039209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039210">SUSE bug 1039210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039379">SUSE bug 1039379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039380">SUSE bug 1039380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930683">SUSE bug 930683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957517">SUSE bug 957517</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3885/">CVE-2015-3885</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8367/">CVE-2015-8367</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6886/">CVE-2017-6886</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6887/">CVE-2017-6887</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6889/">CVE-2017-6889</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6890/">CVE-2017-6890</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6899/">CVE-2017-6899</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518042" comment="libraw9-0.15.4-9.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77917" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1047236" ref_url="https://bugzilla.suse.com/1047236" source="BUGZILLA"/>
		<reference ref_id="1047240" ref_url="https://bugzilla.suse.com/1047240" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2017-9233" ref_url="https://www.suse.com/security/cve/CVE-2017-9233/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003169.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2016-9063: Possible integer overflow to fix inside XML_Parse leading to unexpected behaviour (bsc#1047240)
- CVE-2017-9233: External Entity Vulnerability could lead to denial of service (bsc#1047236)


		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-30"/>
	<updated date="2017-08-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047236">SUSE bug 1047236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047240">SUSE bug 1047240</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9233/">CVE-2017-9233</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518043" comment="expat-2.1.0-21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518044" comment="libexpat1-2.1.0-21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518045" comment="libexpat1-32bit-2.1.0-21.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77918" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="929629" ref_url="https://bugzilla.suse.com/929629" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8146" ref_url="https://www.suse.com/security/cve/CVE-2014-8146/" source="CVE"/>
		<reference ref_id="CVE-2014-8147" ref_url="https://www.suse.com/security/cve/CVE-2014-8147/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003176.html" source="SUSE-SU"/>
		<description>
icu was updated to fix two security issues.

These security issues were fixed:
- CVE-2014-8147: The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional
  Algorithm implementation in ICU4C in International Components for Unicode (ICU) used an integer
  data type that is inconsistent with a header file, which allowed remote attackers to cause a
  denial of service (incorrect malloc followed by invalid free) or possibly execute arbitrary code
  via crafted text (bsc#929629).
- CVE-2014-8146: The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional
  Algorithm implementation in ICU4C in International Components for Unicode (ICU) did not properly
  track directionally isolated pieces of text, which allowed remote attackers to cause a denial of
  service (heap-based buffer overflow) or possibly execute arbitrary code via crafted text
  (bsc#929629).
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-31"/>
	<updated date="2017-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/929629">SUSE bug 929629</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8146/">CVE-2014-8146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8147/">CVE-2014-8147</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518046" comment="icu-52.1-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518047" comment="libicu52_1-52.1-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518048" comment="libicu52_1-32bit-52.1-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518049" comment="libicu52_1-data-52.1-8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77919" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1002573" ref_url="https://bugzilla.suse.com/1002573" source="BUGZILLA"/>
		<reference ref_id="1026236" ref_url="https://bugzilla.suse.com/1026236" source="BUGZILLA"/>
		<reference ref_id="1035231" ref_url="https://bugzilla.suse.com/1035231" source="BUGZILLA"/>
		<reference ref_id="1037840" ref_url="https://bugzilla.suse.com/1037840" source="BUGZILLA"/>
		<reference ref_id="1046637" ref_url="https://bugzilla.suse.com/1046637" source="BUGZILLA"/>
		<reference ref_id="1049578" ref_url="https://bugzilla.suse.com/1049578" source="BUGZILLA"/>
		<reference ref_id="1051787" ref_url="https://bugzilla.suse.com/1051787" source="BUGZILLA"/>
		<reference ref_id="1051788" ref_url="https://bugzilla.suse.com/1051788" source="BUGZILLA"/>
		<reference ref_id="1051789" ref_url="https://bugzilla.suse.com/1051789" source="BUGZILLA"/>
		<reference ref_id="1052686" ref_url="https://bugzilla.suse.com/1052686" source="BUGZILLA"/>
		<reference ref_id="1055695" ref_url="https://bugzilla.suse.com/1055695" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9603" ref_url="https://www.suse.com/security/cve/CVE-2016-9603/" source="CVE"/>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<reference ref_id="CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434/" source="CVE"/>
		<reference ref_id="CVE-2017-12135" ref_url="https://www.suse.com/security/cve/CVE-2017-12135/" source="CVE"/>
		<reference ref_id="CVE-2017-12136" ref_url="https://www.suse.com/security/cve/CVE-2017-12136/" source="CVE"/>
		<reference ref_id="CVE-2017-12137" ref_url="https://www.suse.com/security/cve/CVE-2017-12137/" source="CVE"/>
		<reference ref_id="CVE-2017-12855" ref_url="https://www.suse.com/security/cve/CVE-2017-12855/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00002.html" source="SUSE-SU"/>
		<description>
This update for xen to version 4.7.3 fixes several issues.

These security issues were fixed:

- CVE-2017-12135: Unbounded recursion in grant table code allowed a malicious
  guest to crash the host or potentially escalate privileges/leak information
  (XSA-226, bsc#1051787).
- CVE-2017-12137: Incorrectly-aligned updates to pagetables allowed for
  privilege escalation (XSA-227, bsc#1051788).
- CVE-2017-12136: Race conditions with maptrack free list handling allows a
  malicious guest administrator to crash the host or escalate their privilege to
  that of the host (XSA-228, bsc#1051789).
- CVE-2017-11434: The dhcp_decode function in slirp/bootp.c allowed local guest
  OS users to cause a denial of service (out-of-bounds read) via a crafted DHCP
  options string (bsc#1049578).
- CVE-2017-10664: qemu-nbd did not ignore SIGPIPE, which allowed remote
  attackers to cause a denial of service (daemon crash) by disconnecting during a
  server-to-client reply attempt (bsc#1046637).
- CVE-2017-12855: Premature clearing of GTF_writing / GTF_reading lead to
  potentially leaking sensitive information (XSA-230 CVE-2017-12855).

These non-security issues were fixed:

- bsc#1055695: XEN: 11SP4 and 12SP3 HVM guests can not be restored after the save using xl stack 
- bsc#1035231: Migration of HVM domU did not use superpages on destination dom0
- bsc#1002573: Optimized LVM functions in block-dmmd block-dmmd
- bsc#1037840: Xen-detect always showed HVM for PV guests
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-01"/>
	<updated date="2017-09-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1002573">SUSE bug 1002573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026236">SUSE bug 1026236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035231">SUSE bug 1035231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037840">SUSE bug 1037840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046637">SUSE bug 1046637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049578">SUSE bug 1049578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051787">SUSE bug 1051787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051788">SUSE bug 1051788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051789">SUSE bug 1051789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052686">SUSE bug 1052686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055695">SUSE bug 1055695</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9603/">CVE-2016-9603</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-12135/">CVE-2017-12135</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12136/">CVE-2017-12136</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12137/">CVE-2017-12137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12855/">CVE-2017-12855</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518050" comment="xen-4.7.3_03-43.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518051" comment="xen-libs-4.7.3_03-43.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518052" comment="xen-libs-32bit-4.7.3_03-43.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77920" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1051684" ref_url="https://bugzilla.suse.com/1051684" source="BUGZILLA"/>
		<reference ref_id="1051685" ref_url="https://bugzilla.suse.com/1051685" source="BUGZILLA"/>
		<reference ref_id="1053259" ref_url="https://bugzilla.suse.com/1053259" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7546" ref_url="https://www.suse.com/security/cve/CVE-2017-7546/" source="CVE"/>
		<reference ref_id="CVE-2017-7547" ref_url="https://www.suse.com/security/cve/CVE-2017-7547/" source="CVE"/>
		<reference ref_id="CVE-2017-7548" ref_url="https://www.suse.com/security/cve/CVE-2017-7548/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2355-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00012.html" source="SUSE-SU"/>
		<description>
This update for postgresql94 fixes the following issues:

* CVE-2017-7547: Further restrict visibility of pg_user_mappings.umoptions, to protect passwords stored as user mapping options. (bsc#1051685)
* CVE-2017-7546: Disallow empty passwords in all password-based authentication methods. (bsc#1051684)
* CVE-2017-7548: lo_put() function ignores ACLs. (bsc#1053259)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-05"/>
	<updated date="2017-09-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051684">SUSE bug 1051684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051685">SUSE bug 1051685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053259">SUSE bug 1053259</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7546/">CVE-2017-7546</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7547/">CVE-2017-7547</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7548/">CVE-2017-7548</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518053" comment="postgresql94-9.4.13-21.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77921" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1051684" ref_url="https://bugzilla.suse.com/1051684" source="BUGZILLA"/>
		<reference ref_id="1051685" ref_url="https://bugzilla.suse.com/1051685" source="BUGZILLA"/>
		<reference ref_id="1053259" ref_url="https://bugzilla.suse.com/1053259" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7546" ref_url="https://www.suse.com/security/cve/CVE-2017-7546/" source="CVE"/>
		<reference ref_id="CVE-2017-7547" ref_url="https://www.suse.com/security/cve/CVE-2017-7547/" source="CVE"/>
		<reference ref_id="CVE-2017-7548" ref_url="https://www.suse.com/security/cve/CVE-2017-7548/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00013.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

* CVE-2017-7547: Further restrict visibility of pg_user_mappings.umoptions, to protect passwords stored as user mapping options. (bsc#1051685)
* CVE-2017-7546: Disallow empty passwords in all password-based authentication methods. (bsc#1051684)
* CVE-2017-7548: lo_put() function ignores ACLs. (bsc#1053259)

The changelog for this release is here:
	https://www.postgresql.org/docs/9.6/static/release-9-6-4.html

		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-05"/>
	<updated date="2017-09-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051684">SUSE bug 1051684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051685">SUSE bug 1051685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053259">SUSE bug 1053259</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7546/">CVE-2017-7546</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7547/">CVE-2017-7547</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7548/">CVE-2017-7548</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518054" comment="libecpg6-9.6.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518055" comment="libpq5-9.6.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518056" comment="libpq5-32bit-9.6.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518057" comment="postgresql96-9.6.4-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77922" version="1" class="patch">
	<metadata>
		<title>Security update for gdk-pixbuf (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1027024" ref_url="https://bugzilla.suse.com/1027024" source="BUGZILLA"/>
		<reference ref_id="1027025" ref_url="https://bugzilla.suse.com/1027025" source="BUGZILLA"/>
		<reference ref_id="1027026" ref_url="https://bugzilla.suse.com/1027026" source="BUGZILLA"/>
		<reference ref_id="1048289" ref_url="https://bugzilla.suse.com/1048289" source="BUGZILLA"/>
		<reference ref_id="1048544" ref_url="https://bugzilla.suse.com/1048544" source="BUGZILLA"/>
		<reference ref_id="1049877" ref_url="https://bugzilla.suse.com/1049877" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2862" ref_url="https://www.suse.com/security/cve/CVE-2017-2862/" source="CVE"/>
		<reference ref_id="CVE-2017-2870" ref_url="https://www.suse.com/security/cve/CVE-2017-2870/" source="CVE"/>
		<reference ref_id="CVE-2017-6312" ref_url="https://www.suse.com/security/cve/CVE-2017-6312/" source="CVE"/>
		<reference ref_id="CVE-2017-6313" ref_url="https://www.suse.com/security/cve/CVE-2017-6313/" source="CVE"/>
		<reference ref_id="CVE-2017-6314" ref_url="https://www.suse.com/security/cve/CVE-2017-6314/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00015.html" source="SUSE-SU"/>
		<description>
This update for gdk-pixbuf fixes the following issues:

- CVE-2017-2862: JPEG gdk_pixbuf__jpeg_image_load_increment Code Execution Vulnerability (bsc#1048289)
- CVE-2017-2870: tiff_image_parse Code Execution Vulnerability (bsc#1048544)
- CVE-2017-6313: A dangerous integer underflow in io-icns.c (bsc#1027024)
- CVE-2017-6314: Infinite loop in io-tiff.c (bsc#1027025)
- CVE-2017-6312: Out-of-bounds read on io-ico.c (bsc#1027026)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-06"/>
	<updated date="2017-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027024">SUSE bug 1027024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027025">SUSE bug 1027025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027026">SUSE bug 1027026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048289">SUSE bug 1048289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048544">SUSE bug 1048544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049877">SUSE bug 1049877</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2862/">CVE-2017-2862</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-2870/">CVE-2017-2870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6312/">CVE-2017-6312</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6313/">CVE-2017-6313</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6314/">CVE-2017-6314</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518058" comment="gdk-pixbuf-lang-2.34.0-19.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518059" comment="gdk-pixbuf-query-loaders-2.34.0-19.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518060" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518061" comment="libgdk_pixbuf-2_0-0-2.34.0-19.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518062" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518063" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77923" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1046856" ref_url="https://bugzilla.suse.com/1046856" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000083" ref_url="https://www.suse.com/security/cve/CVE-2017-1000083/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00018.html" source="SUSE-SU"/>
		<description>
This update for evince fixes the following issue:

- CVE-2017-1000083: Remote attackers could have used the comicbook mode of evince to inject shell code (bsc#1046856).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-08"/>
	<updated date="2017-09-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046856">SUSE bug 1046856</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000083/">CVE-2017-1000083</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518064" comment="evince-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518065" comment="evince-browser-plugin-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518066" comment="evince-lang-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518067" comment="evince-plugin-djvudocument-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518068" comment="evince-plugin-dvidocument-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518069" comment="evince-plugin-pdfdocument-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518070" comment="evince-plugin-psdocument-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518071" comment="evince-plugin-tiffdocument-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518072" comment="evince-plugin-xpsdocument-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518073" comment="libevdocument3-4-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518074" comment="libevview3-3-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518075" comment="nautilus-evince-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518076" comment="typelib-1_0-EvinceDocument-3_0-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518077" comment="typelib-1_0-EvinceView-3_0-3.20.1-6.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77924" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1012266" ref_url="https://bugzilla.suse.com/1012266" source="BUGZILLA"/>
		<reference ref_id="1014560" ref_url="https://bugzilla.suse.com/1014560" source="BUGZILLA"/>
		<reference ref_id="1014566" ref_url="https://bugzilla.suse.com/1014566" source="BUGZILLA"/>
		<reference ref_id="1020601" ref_url="https://bugzilla.suse.com/1020601" source="BUGZILLA"/>
		<reference ref_id="997682" ref_url="https://bugzilla.suse.com/997682" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10156" ref_url="https://www.suse.com/security/cve/CVE-2016-10156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00057.html" source="SUSE-SU"/>
		<description>

This update for systemd fixes the following issues:

This security issue was fixed:

- CVE-2016-10156: Fix permissions set on permanent timer timestamp files, preventing local unprivileged users from escalating privileges (bsc#1020601).

These non-security issues were fixed:

- Fix permission set on /var/lib/systemd/linger/*
- install: follow config_path symlink (#3362)
- install: fix disable when /etc/systemd/system is a symlink (bsc#1014560)
- run: make --slice= work in conjunction with --scope (bsc#1014566)
- core: don't dispatch load queue when setting Slice= for transient units
- systemctl: remove duplicate entries showed by list-dependencies (#5049) (bsc#1012266)
- rule: don't automatically online standby memory on s390x (bsc#997682)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-25"/>
	<updated date="2017-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012266">SUSE bug 1012266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014560">SUSE bug 1014560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014566">SUSE bug 1014566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020601">SUSE bug 1020601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997682">SUSE bug 997682</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10156/">CVE-2016-10156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518078" comment="libsystemd0-228-132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518079" comment="libsystemd0-32bit-228-132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518080" comment="libudev1-228-132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518081" comment="libudev1-32bit-228-132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518082" comment="systemd-228-132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518083" comment="systemd-32bit-228-132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518084" comment="systemd-bash-completion-228-132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518085" comment="systemd-sysvinit-228-132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518086" comment="udev-228-132.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77925" version="1" class="patch">
	<metadata>
		<title>Security update for cvs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1053364" ref_url="https://bugzilla.suse.com/1053364" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12836" ref_url="https://www.suse.com/security/cve/CVE-2017-12836/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003196.html" source="SUSE-SU"/>
		<description>
This update for cvs fixes the following issues:

  - CVE-2017-12836: A leading dash in the argument of the '-d' option could lead to argument injection (bsc#1053364)

  		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-12"/>
	<updated date="2017-09-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1053364">SUSE bug 1053364</bugzilla>
	<cve impact="important" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12836/">CVE-2017-12836</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518087" comment="cvs-1.12.12-182.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77926" version="1" class="patch">
	<metadata>
		<title>Security update for pcsc-lite (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1017902" ref_url="https://bugzilla.suse.com/1017902" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10109" ref_url="https://www.suse.com/security/cve/CVE-2016-10109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002597.html" source="SUSE-SU"/>
		<description>

pcsc-lite was updated to fix one security issue.

This security issue was fixed:

- CVE-2016-10109: This use-after-free and double-free issue allowed local attacker to cause a Denial of Service and possible privilege escalation (bsc#1017902).
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-25"/>
	<updated date="2017-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017902">SUSE bug 1017902</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10109/">CVE-2016-10109</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518088" comment="libpcsclite1-1.8.10-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518089" comment="libpcsclite1-32bit-1.8.10-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518090" comment="pcsc-lite-1.8.10-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77927" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1003898" ref_url="https://bugzilla.suse.com/1003898" source="BUGZILLA"/>
		<reference ref_id="1018556" ref_url="https://bugzilla.suse.com/1018556" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:0292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002599.html" source="SUSE-SU"/>
		<description>
This update for dbus-1 to version 1.8.22 fixes one security issue and bugs.

The following security issue was fixed:

- bsc#1003898: Do not treat ActivationFailure message received from root-owned systemd name as a format string.

The following upstream changes are included:

- Change the default configuration for the session bus to only allow EXTERNAL authentication (secure kernel-mediated credentials-passing), as was already done for the system bus.
- Fix a memory leak when GetConnectionCredentials() succeeds (fdo#91008)
- Ensure that dbus-monitor does not reply to messages intended for others (fdo#90952)
- Add locking to DBusCounter's reference count and notify function (fdo#89297)
- Ensure that DBusTransport's reference count is protected by the corresponding DBusConnection's lock (fdo#90312)
- Correctly release DBusServer mutex before early-return if we run out of memory while copying authentication mechanisms (fdo#90021)
- Correctly initialize all fields of DBusTypeReader (fdo#90021)
- Fix some missing \n in verbose (debug log) messages (fdo#90004)
- Clean up some memory leaks in test code (fdo#90021)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-26"/>
	<updated date="2017-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003898">SUSE bug 1003898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018556">SUSE bug 1018556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518091" comment="dbus-1-1.8.22-24.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518092" comment="dbus-1-x11-1.8.22-24.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518093" comment="libdbus-1-3-1.8.22-24.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518094" comment="libdbus-1-3-32bit-1.8.22-24.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77928" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1055695" ref_url="https://bugzilla.suse.com/1055695" source="BUGZILLA"/>
		<reference ref_id="1056278" ref_url="https://bugzilla.suse.com/1056278" source="BUGZILLA"/>
		<reference ref_id="1056280" ref_url="https://bugzilla.suse.com/1056280" source="BUGZILLA"/>
		<reference ref_id="1056281" ref_url="https://bugzilla.suse.com/1056281" source="BUGZILLA"/>
		<reference ref_id="1056282" ref_url="https://bugzilla.suse.com/1056282" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14316" ref_url="https://www.suse.com/security/cve/CVE-2017-14316/" source="CVE"/>
		<reference ref_id="CVE-2017-14317" ref_url="https://www.suse.com/security/cve/CVE-2017-14317/" source="CVE"/>
		<reference ref_id="CVE-2017-14318" ref_url="https://www.suse.com/security/cve/CVE-2017-14318/" source="CVE"/>
		<reference ref_id="CVE-2017-14319" ref_url="https://www.suse.com/security/cve/CVE-2017-14319/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00070.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-14316: Missing bound check in function `alloc_heap_pages` for an
  internal array allowed attackers using crafted hypercalls to execute
  arbitrary code within Xen (XSA-231, bsc#1056278)
- CVE-2017-14318: The function __gnttab_cache_flush missed a check for grant
  tables, allowing a malicious guest to crash the host or for x86 PV guests to
  potentially escalate privileges (XSA-232, bsc#1056280)
- CVE-2017-14317: A race in cxenstored may have cause a double-free allowind for
  DoS of the xenstored daemon (XSA-233, bsc#1056281).
- CVE-2017-14319: An error while handling grant mappings allowed malicious or
  buggy x86 PV guest to escalate its privileges or crash the hypervisor (XSA-234,
  bsc#1056282).

These non-security issues were fixed:

- bsc#1055695: Fixed restoring updates for HVM guests for ballooned domUs
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-18"/>
	<updated date="2017-09-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055695">SUSE bug 1055695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056278">SUSE bug 1056278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056280">SUSE bug 1056280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056281">SUSE bug 1056281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056282">SUSE bug 1056282</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14316/">CVE-2017-14316</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14317/">CVE-2017-14317</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14318/">CVE-2017-14318</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14319/">CVE-2017-14319</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518095" comment="xen-4.7.3_04-43.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518096" comment="xen-libs-4.7.3_04-43.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518097" comment="xen-libs-32bit-4.7.3_04-43.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77929" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1057389" ref_url="https://bugzilla.suse.com/1057389" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000251" ref_url="https://www.suse.com/security/cve/CVE-2017-1000251/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00071.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP2 kernel was updated to receive the following security fixes:

- CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel was
  vulnerable to a stack overflow while processing L2CAP configuration
  responses, resulting in a potential remote denial-of-service vulnerability
  but no remote code execution due to use of CONFIG_CC_STACKPROTECTOR.
  [bnc#1057389]
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-18"/>
	<updated date="2017-09-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1057389">SUSE bug 1057389</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000251/">CVE-2017-1000251</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518098" comment="kernel-default-4.4.74-92.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518099" comment="kernel-default-devel-4.4.74-92.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518100" comment="kernel-default-extra-4.4.74-92.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518101" comment="kernel-devel-4.4.74-92.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518102" comment="kernel-macros-4.4.74-92.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518103" comment="kernel-source-4.4.74-92.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518104" comment="kernel-syms-4.4.74-92.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77930" version="1" class="patch">
	<metadata>
		<title>Security update for gcc48 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1011348" ref_url="https://bugzilla.suse.com/1011348" source="BUGZILLA"/>
		<reference ref_id="1022062" ref_url="https://bugzilla.suse.com/1022062" source="BUGZILLA"/>
		<reference ref_id="1028744" ref_url="https://bugzilla.suse.com/1028744" source="BUGZILLA"/>
		<reference ref_id="1039513" ref_url="https://bugzilla.suse.com/1039513" source="BUGZILLA"/>
		<reference ref_id="1044016" ref_url="https://bugzilla.suse.com/1044016" source="BUGZILLA"/>
		<reference ref_id="1050947" ref_url="https://bugzilla.suse.com/1050947" source="BUGZILLA"/>
		<reference ref_id="988274" ref_url="https://bugzilla.suse.com/988274" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11671" ref_url="https://www.suse.com/security/cve/CVE-2017-11671/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003249.html" source="SUSE-SU"/>
		<description>
This update for gcc48 fixes the following issues:

Security issues fixed:

- A new option -fstack-clash-protection is now offered, which mitigates the stack clash type of attacks. [bnc#1039513]
  Future maintenance releases of packages will be built with this option.
- CVE-2017-11671: Fixed rdrand/rdseed code generation issue [bsc#1050947]

Bugs fixed:

- Enable LFS support in 32bit libgcov.a.  [bsc#1044016]
- Bump libffi version in libffi.pc to 3.0.11.
- Fix libffi issue for armv7l.  [bsc#988274]
- Properly diagnose missing -fsanitize=address support on ppc64le.  [bnc#1028744]
- Backport patch for PR65612.  [bnc#1022062]
- Fixed DR#1288.  [bnc#1011348]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-19"/>
	<updated date="2017-09-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011348">SUSE bug 1011348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022062">SUSE bug 1022062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028744">SUSE bug 1028744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039513">SUSE bug 1039513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044016">SUSE bug 1044016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050947">SUSE bug 1050947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988274">SUSE bug 988274</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-11671/">CVE-2017-11671</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518105" comment="cpp48-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518106" comment="gcc48-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518107" comment="gcc48-32bit-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518108" comment="gcc48-c++-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518109" comment="gcc48-gij-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518110" comment="gcc48-gij-32bit-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518111" comment="gcc48-info-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518112" comment="libasan0-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518113" comment="libasan0-32bit-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518114" comment="libgcj48-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518115" comment="libgcj48-32bit-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518116" comment="libgcj48-jar-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518117" comment="libgcj_bc1-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518118" comment="libstdc++48-devel-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518119" comment="libstdc++48-devel-32bit-4.8.5-31.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77931" version="1" class="patch">
	<metadata>
		<title>Security update for emacs (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1058425" ref_url="https://bugzilla.suse.com/1058425" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14482" ref_url="https://www.suse.com/security/cve/CVE-2017-14482/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00074.html" source="SUSE-SU"/>
		<description>
This update for emacs fixes one issues.

This security issue was fixed:

- CVE-2017-14482: Remote code execution via mails with 'Content-Type: text/enriched' (bsc#1058425)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-20"/>
	<updated date="2017-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1058425">SUSE bug 1058425</bugzilla>
	<cve impact="moderate" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14482/">CVE-2017-14482</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518120" comment="emacs-24.3-25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518121" comment="emacs-info-24.3-25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518122" comment="emacs-x11-24.3-25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518123" comment="etags-24.3-25.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77932" version="1" class="patch">
	<metadata>
		<title>Security update for libzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1056996" ref_url="https://bugzilla.suse.com/1056996" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14107" ref_url="https://www.suse.com/security/cve/CVE-2017-14107/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003255.html" source="SUSE-SU"/>
		<description>
This update for libzip fixes one issues.

This security issue was fixed:

- CVE-2017-14107: The _zip_read_eocd64 function mishandled EOCD records, which
  allowed remote attackers to cause a denial of service (memory allocation
  failure in _zip_cdir_grow in zip_dirent.c) via a crafted ZIP archive (bsc#1056996).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-21"/>
	<updated date="2017-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056996">SUSE bug 1056996</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14107/">CVE-2017-14107</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518124" comment="libzip2-0.11.1-13.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77933" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1044417" ref_url="https://bugzilla.suse.com/1044417" source="BUGZILLA"/>
		<reference ref_id="1045341" ref_url="https://bugzilla.suse.com/1045341" source="BUGZILLA"/>
		<reference ref_id="1056248" ref_url="https://bugzilla.suse.com/1056248" source="BUGZILLA"/>
		<reference ref_id="1056249" ref_url="https://bugzilla.suse.com/1056249" source="BUGZILLA"/>
		<reference ref_id="1056251" ref_url="https://bugzilla.suse.com/1056251" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13765" ref_url="https://www.suse.com/security/cve/CVE-2017-13765/" source="CVE"/>
		<reference ref_id="CVE-2017-13766" ref_url="https://www.suse.com/security/cve/CVE-2017-13766/" source="CVE"/>
		<reference ref_id="CVE-2017-13767" ref_url="https://www.suse.com/security/cve/CVE-2017-13767/" source="CVE"/>
		<reference ref_id="CVE-2017-9617" ref_url="https://www.suse.com/security/cve/CVE-2017-9617/" source="CVE"/>
		<reference ref_id="CVE-2017-9766" ref_url="https://www.suse.com/security/cve/CVE-2017-9766/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003258.html" source="SUSE-SU"/>
		<description>
This update for wireshark to version 2.2.9 fixes several issues.

These security issues were fixed:

- CVE-2017-13767: The MSDP dissector could have gone into an infinite loop.
  This was addressed by adding length validation (bsc#1056248).
- CVE-2017-13766: The Profinet I/O dissector could have crash with an
  out-of-bounds write. This was addressed by adding string validation
  (bsc#1056249).
- CVE-2017-13765: The IrCOMM dissector had a buffer over-read and application
  crash. This was addressed by adding length validation (bsc#1056251).
- CVE-2017-9766: PROFINET IO data with a high recursion depth allowed remote
  attackers to cause a denial of service (stack exhaustion) in the
  dissect_IODWriteReq function (bsc#1045341).
- CVE-2017-9617: Deeply nested DAAP data may have cause stack exhaustion
  (uncontrolled recursion) in the dissect_daap_one_tag function in the DAAP
  dissector (bsc#1044417).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-22"/>
	<updated date="2017-09-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1044417">SUSE bug 1044417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045341">SUSE bug 1045341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056248">SUSE bug 1056248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056249">SUSE bug 1056249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056251">SUSE bug 1056251</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13765/">CVE-2017-13765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13766/">CVE-2017-13766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13767/">CVE-2017-13767</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9617/">CVE-2017-9617</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9766/">CVE-2017-9766</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518125" comment="libwireshark8-2.2.9-48.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518126" comment="libwiretap6-2.2.9-48.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518127" comment="libwscodecs1-2.2.9-48.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518128" comment="libwsutil7-2.2.9-48.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518129" comment="wireshark-2.2.9-48.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518130" comment="wireshark-gtk-2.2.9-48.9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77934" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1033109" ref_url="https://bugzilla.suse.com/1033109" source="BUGZILLA"/>
		<reference ref_id="1033111" ref_url="https://bugzilla.suse.com/1033111" source="BUGZILLA"/>
		<reference ref_id="1033112" ref_url="https://bugzilla.suse.com/1033112" source="BUGZILLA"/>
		<reference ref_id="1033113" ref_url="https://bugzilla.suse.com/1033113" source="BUGZILLA"/>
		<reference ref_id="1033118" ref_url="https://bugzilla.suse.com/1033118" source="BUGZILLA"/>
		<reference ref_id="1033120" ref_url="https://bugzilla.suse.com/1033120" source="BUGZILLA"/>
		<reference ref_id="1033126" ref_url="https://bugzilla.suse.com/1033126" source="BUGZILLA"/>
		<reference ref_id="1033127" ref_url="https://bugzilla.suse.com/1033127" source="BUGZILLA"/>
		<reference ref_id="1033128" ref_url="https://bugzilla.suse.com/1033128" source="BUGZILLA"/>
		<reference ref_id="1033129" ref_url="https://bugzilla.suse.com/1033129" source="BUGZILLA"/>
		<reference ref_id="1033131" ref_url="https://bugzilla.suse.com/1033131" source="BUGZILLA"/>
		<reference ref_id="1038438" ref_url="https://bugzilla.suse.com/1038438" source="BUGZILLA"/>
		<reference ref_id="1042804" ref_url="https://bugzilla.suse.com/1042804" source="BUGZILLA"/>
		<reference ref_id="1042805" ref_url="https://bugzilla.suse.com/1042805" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10371" ref_url="https://www.suse.com/security/cve/CVE-2016-10371/" source="CVE"/>
		<reference ref_id="CVE-2017-7592" ref_url="https://www.suse.com/security/cve/CVE-2017-7592/" source="CVE"/>
		<reference ref_id="CVE-2017-7593" ref_url="https://www.suse.com/security/cve/CVE-2017-7593/" source="CVE"/>
		<reference ref_id="CVE-2017-7594" ref_url="https://www.suse.com/security/cve/CVE-2017-7594/" source="CVE"/>
		<reference ref_id="CVE-2017-7595" ref_url="https://www.suse.com/security/cve/CVE-2017-7595/" source="CVE"/>
		<reference ref_id="CVE-2017-7596" ref_url="https://www.suse.com/security/cve/CVE-2017-7596/" source="CVE"/>
		<reference ref_id="CVE-2017-7597" ref_url="https://www.suse.com/security/cve/CVE-2017-7597/" source="CVE"/>
		<reference ref_id="CVE-2017-7598" ref_url="https://www.suse.com/security/cve/CVE-2017-7598/" source="CVE"/>
		<reference ref_id="CVE-2017-7599" ref_url="https://www.suse.com/security/cve/CVE-2017-7599/" source="CVE"/>
		<reference ref_id="CVE-2017-7600" ref_url="https://www.suse.com/security/cve/CVE-2017-7600/" source="CVE"/>
		<reference ref_id="CVE-2017-7601" ref_url="https://www.suse.com/security/cve/CVE-2017-7601/" source="CVE"/>
		<reference ref_id="CVE-2017-7602" ref_url="https://www.suse.com/security/cve/CVE-2017-7602/" source="CVE"/>
		<reference ref_id="CVE-2017-9403" ref_url="https://www.suse.com/security/cve/CVE-2017-9403/" source="CVE"/>
		<reference ref_id="CVE-2017-9404" ref_url="https://www.suse.com/security/cve/CVE-2017-9404/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003259.html" source="SUSE-SU"/>
		<description>
This update for tiff to version 4.0.8 fixes a several bugs and security issues:

These security issues were fixed:

- CVE-2017-7595: The JPEGSetupEncode function allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image (bsc#1033127).
- CVE-2016-10371: The TIFFWriteDirectoryTagCheckedRational function allowed remote attackers to cause a denial of service (assertion failure and application exit) via a crafted TIFF file (bsc#1038438).
- CVE-2017-7598: Error in tif_dirread.c allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image (bsc#1033118).
- CVE-2017-7596: Undefined behavior because of floats outside their expected value range, which allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image (bsc#1033126).
- CVE-2017-7597: Undefined behavior because of floats outside their expected value range, which allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image (bsc#1033120).
- CVE-2017-7599: Undefined behavior because of shorts outside their expected value range, which allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image (bsc#1033113).
- CVE-2017-7600: Undefined behavior because of chars outside their expected value range, which allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image (bsc#1033112).
- CVE-2017-7601: Because of a shift exponent too large for 64-bit type long undefined behavior was caused, which allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image (bsc#1033111).
- CVE-2017-7602: Prevent signed integer overflow, which allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image (bsc#1033109).
- CVE-2017-7592: The putagreytile function had a left-shift undefined behavior issue, which might allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image (bsc#1033131).
- CVE-2017-7593: Ensure that tif_rawdata is properly initialized, to prevent remote attackers to obtain sensitive information from process memory via a crafted image (bsc#1033129).
- CVE-2017-7594: The OJPEGReadHeaderInfoSecTablesDcTable function allowed remote attackers to cause a denial of service (memory leak) via a crafted image (bsc#1033128).
- CVE-2017-9403: Prevent memory leak in function TIFFReadDirEntryLong8Array, which allowed attackers to cause a denial of service via a crafted file (bsc#1042805).
- CVE-2017-9404: Fixed memory leak vulnerability in function OJPEGReadHeaderInfoSecTablesQTable, which allowed attackers to cause a denial of service via a crafted file (bsc#1042804).

These various other issues were fixed:

- Fix uint32 overflow in TIFFReadEncodedStrip() that caused an
  integer division by zero. Reported by Agostino Sarubbo.
- fix heap-based buffer overflow on generation of PixarLog / LUV
  compressed files, with ColorMap, TransferFunction attached and
  nasty plays with bitspersample. The fix for LUV has not been
  tested, but suffers from the same kind of issue of PixarLog.
- modify ChopUpSingleUncompressedStrip() to instanciate compute
  ntrips as TIFFhowmany_32(td-&gt;td_imagelength, rowsperstrip),
  instead of a logic based on the total size of data. Which is
  faulty is the total size of data is not sufficient to fill the
  whole image, and thus results in reading outside of the
  StripByCounts/StripOffsets arrays when using
  TIFFReadScanline()
- make OJPEGDecode() early exit in case of failure in
  OJPEGPreDecode(). This will avoid a divide by zero, and
  potential other issues.
- fix misleading indentation as warned by GCC.
- revert change done on 2016-01-09 that made Param member of
  TIFFFaxTabEnt structure a uint16 to reduce size of the
  binary. It happens that the Hylafax software uses the tables
  that follow this typedef (TIFFFaxMainTable, TIFFFaxWhiteTable,
  TIFFFaxBlackTable), although they are not in a public libtiff
  header.
- add TIFFReadRGBAStripExt() and TIFFReadRGBATileExt() variants
  of the functions without ext, with an extra argument to control
  the stop_on_error behaviour.
- fix potential memory leaks in error code path of
  TIFFRGBAImageBegin().
- increase libjpeg max memory usable to 10 MB instead of libjpeg
  1MB default. This helps when creating files with 'big' tile,
  without using libjpeg temporary files.
- add _TIFFcalloc()
- return 0 in Encode functions instead of -1 when
  TIFFFlushData1() fails.
- only run JPEGFixupTagsSubsampling() if the YCbCrSubsampling
  tag is not explicitly present. This helps a bit to reduce the
  I/O amount when the tag is present (especially on cloud hosted
  files).
- in LZWPostEncode(), increase, if necessary, the code bit-width
  after flushing the remaining code and before emitting the EOI
  code.
- fix memory leak in error code path of PixarLogSetupDecode().
- fix potential memory leak in
  OJPEGReadHeaderInfoSecTablesQTable,
  OJPEGReadHeaderInfoSecTablesDcTable and
  OJPEGReadHeaderInfoSecTablesAcTable
- avoid crash in Fax3Close() on empty file.
- TIFFFillStrip(): add limitation to the number of bytes read
  in case td_stripbytecount[strip] is bigger than reasonable,
  so as to avoid excessive memory allocation.
- fix memory leak when the underlying codec (ZIP, PixarLog)
  succeeds its setupdecode() method, but PredictorSetup fails.
- TIFFFillStrip() and TIFFFillTile(): avoid excessive memory
  allocation in case of shorten files. Only effective on 64 bit
  builds and non-mapped cases.
- TIFFFillStripPartial() / TIFFSeek(), avoid potential integer
  overflows with read_ahead in CHUNKY_STRIP_READ_SUPPORT mode.
- avoid excessive memory allocation in case of shorten files.
  Only effective on 64 bit builds.
- update tif_rawcc in CHUNKY_STRIP_READ_SUPPORT mode with
  tif_rawdataloaded when calling TIFFStartStrip() or
  TIFFFillStripPartial(). 
- avoid potential int32 overflow in TIFFYCbCrToRGBInit() Fixes
- avoid potential int32 overflows in multiply_ms() and add_ms().
- fix out-of-buffer read in PackBitsDecode() Fixes
- LogL16InitState(): avoid excessive memory allocation when
  RowsPerStrip tag is missing.
- update dec_bitsleft at beginning of LZWDecode(), and update
  tif_rawcc at end of LZWDecode(). This is needed to properly
  work with the latest chnges in tif_read.c in
  CHUNKY_STRIP_READ_SUPPORT mode.
- PixarLogDecode(): resync tif_rawcp with next_in and tif_rawcc
  with avail_in at beginning and end of function, similarly to
  what is done in LZWDecode(). Likely needed so that it works
  properly with latest chnges in tif_read.c in
  CHUNKY_STRIP_READ_SUPPORT mode.
- initYCbCrConversion(): add basic validation of luma and
  refBlackWhite coefficients (just check they are not NaN for
  now), to avoid potential float to int overflows.
- _TIFFVSetField(): fix outside range cast of double to float.
- initYCbCrConversion(): check luma[1] is not zero to avoid division by zero
- _TIFFVSetField(): fix outside range cast of double to float.
- initYCbCrConversion(): check luma[1] is not zero to avoid
  division by zero.
- initYCbCrConversion(): stricter validation for refBlackWhite
  coefficients values.
- avoid uint32 underflow in cpDecodedStrips that can cause
  various issues, such as buffer overflows in the library.
- fix readContigStripsIntoBuffer() in -i (ignore) mode so that
  the output buffer is correctly incremented to avoid write
  outside bounds.
- add 3 extra bytes at end of strip buffer in
  readSeparateStripsIntoBuffer() to avoid read outside of heap
  allocated buffer.
- fix integer division by zero when BitsPerSample is missing.
- fix null pointer dereference in -r mode when the image has no
  StripByteCount tag.
- avoid potential division by zero is BitsPerSamples tag is
  missing.
- when TIFFGetField(, TIFFTAG_NUMBEROFINKS, ) is called, limit
  the return number of inks to SamplesPerPixel, so that code
  that parses ink names doesn't go past the end of the buffer.
- avoid potential division by zero is BitsPerSamples tag is
  missing.
- fix uint32 underflow/overflow that can cause heap-based buffer
  overflow.
- replace assert( (bps % 8) == 0 ) by a non assert check.
- fix 2 heap-based buffer overflows (in PSDataBW and
  PSDataColorContig).
- prevent heap-based buffer overflow in -j mode on a paletted
  image.
- fix wrong usage of memcpy() that can trigger unspecified behaviour.
- avoid potential invalid memory read in t2p_writeproc.
- avoid potential heap-based overflow in t2p_readwrite_pdf_image_tile().
- remove extraneous TIFFClose() in error code path, that caused
  double free.
- error out cleanly in cpContig2SeparateByRow and
  cpSeparate2ContigByRow if BitsPerSample != 8 to avoid heap
  based overflow.
- avoid integer division by zero.
- call TIFFClose() in error code paths.
- emit appropriate message if the input file is empty.
- close TIFF handle in error code path.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-26"/>
	<updated date="2017-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033109">SUSE bug 1033109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033111">SUSE bug 1033111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033112">SUSE bug 1033112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033113">SUSE bug 1033113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033118">SUSE bug 1033118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033120">SUSE bug 1033120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033126">SUSE bug 1033126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033127">SUSE bug 1033127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033128">SUSE bug 1033128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033129">SUSE bug 1033129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033131">SUSE bug 1033131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038438">SUSE bug 1038438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042804">SUSE bug 1042804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042805">SUSE bug 1042805</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10371/">CVE-2016-10371</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7592/">CVE-2017-7592</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7593/">CVE-2017-7593</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7594/">CVE-2017-7594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7595/">CVE-2017-7595</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7596/">CVE-2017-7596</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7597/">CVE-2017-7597</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7598/">CVE-2017-7598</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7599/">CVE-2017-7599</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7600/">CVE-2017-7600</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7601/">CVE-2017-7601</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7602/">CVE-2017-7602</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9403/">CVE-2017-9403</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9404/">CVE-2017-9404</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518131" comment="libtiff5-4.0.8-44.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518132" comment="libtiff5-32bit-4.0.8-44.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77935" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1056088" ref_url="https://bugzilla.suse.com/1056088" source="BUGZILLA"/>
		<reference ref_id="1056090" ref_url="https://bugzilla.suse.com/1056090" source="BUGZILLA"/>
		<reference ref_id="1056093" ref_url="https://bugzilla.suse.com/1056093" source="BUGZILLA"/>
		<reference ref_id="1056095" ref_url="https://bugzilla.suse.com/1056095" source="BUGZILLA"/>
		<reference ref_id="1056097" ref_url="https://bugzilla.suse.com/1056097" source="BUGZILLA"/>
		<reference ref_id="1056101" ref_url="https://bugzilla.suse.com/1056101" source="BUGZILLA"/>
		<reference ref_id="1056105" ref_url="https://bugzilla.suse.com/1056105" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13738" ref_url="https://www.suse.com/security/cve/CVE-2017-13738/" source="CVE"/>
		<reference ref_id="CVE-2017-13739" ref_url="https://www.suse.com/security/cve/CVE-2017-13739/" source="CVE"/>
		<reference ref_id="CVE-2017-13740" ref_url="https://www.suse.com/security/cve/CVE-2017-13740/" source="CVE"/>
		<reference ref_id="CVE-2017-13741" ref_url="https://www.suse.com/security/cve/CVE-2017-13741/" source="CVE"/>
		<reference ref_id="CVE-2017-13743" ref_url="https://www.suse.com/security/cve/CVE-2017-13743/" source="CVE"/>
		<reference ref_id="CVE-2017-13744" ref_url="https://www.suse.com/security/cve/CVE-2017-13744/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003260.html" source="SUSE-SU"/>
		<description>
This update for liblouis fixes several issues.

These security issues were fixed:

- CVE-2017-13738: Prevent illegal address access in the _lou_getALine function that allowed to cause remote DoS (bsc#1056105).
- CVE-2017-13739: Prevent heap-based buffer overflow in the function resolveSubtable() that could have caused DoS or remote code execution (bsc#1056101).
- CVE-2017-13740: Prevent stack-based buffer overflow in the function parseChars() that could have caused DoS or possibly unspecified other impact (bsc#1056097) 
- CVE-2017-13741: Prevent use-after-free in function compileBrailleIndicator() that allowed to cause remote DoS (bsc#1056095).
- CVE_2017-13742: Prevent stack-based buffer overflow in function includeFile that allowed to cause remote DoS (bsc#1056093).
- CVE-2017-13743: Prevent buffer overflow triggered in the function _lou_showString() that allowed to cause remote DoS (bsc#1056090).
- CVE-2017-13744: Prevent illegal address access in the function _lou_getALine() that allowed to cause remote DoS (bsc#1056088).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-26"/>
	<updated date="2017-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056088">SUSE bug 1056088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056090">SUSE bug 1056090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056093">SUSE bug 1056093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056095">SUSE bug 1056095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056097">SUSE bug 1056097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056101">SUSE bug 1056101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056105">SUSE bug 1056105</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13738/">CVE-2017-13738</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13739/">CVE-2017-13739</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13740/">CVE-2017-13740</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13741/">CVE-2017-13741</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13743/">CVE-2017-13743</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13744/">CVE-2017-13744</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518133" comment="liblouis-data-2.6.4-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518134" comment="liblouis9-2.6.4-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518135" comment="python3-louis-2.6.4-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77936" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1052829" ref_url="https://bugzilla.suse.com/1052829" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7753" ref_url="https://www.suse.com/security/cve/CVE-2017-7753/" source="CVE"/>
		<reference ref_id="CVE-2017-7779" ref_url="https://www.suse.com/security/cve/CVE-2017-7779/" source="CVE"/>
		<reference ref_id="CVE-2017-7782" ref_url="https://www.suse.com/security/cve/CVE-2017-7782/" source="CVE"/>
		<reference ref_id="CVE-2017-7784" ref_url="https://www.suse.com/security/cve/CVE-2017-7784/" source="CVE"/>
		<reference ref_id="CVE-2017-7785" ref_url="https://www.suse.com/security/cve/CVE-2017-7785/" source="CVE"/>
		<reference ref_id="CVE-2017-7786" ref_url="https://www.suse.com/security/cve/CVE-2017-7786/" source="CVE"/>
		<reference ref_id="CVE-2017-7787" ref_url="https://www.suse.com/security/cve/CVE-2017-7787/" source="CVE"/>
		<reference ref_id="CVE-2017-7791" ref_url="https://www.suse.com/security/cve/CVE-2017-7791/" source="CVE"/>
		<reference ref_id="CVE-2017-7792" ref_url="https://www.suse.com/security/cve/CVE-2017-7792/" source="CVE"/>
		<reference ref_id="CVE-2017-7798" ref_url="https://www.suse.com/security/cve/CVE-2017-7798/" source="CVE"/>
		<reference ref_id="CVE-2017-7800" ref_url="https://www.suse.com/security/cve/CVE-2017-7800/" source="CVE"/>
		<reference ref_id="CVE-2017-7801" ref_url="https://www.suse.com/security/cve/CVE-2017-7801/" source="CVE"/>
		<reference ref_id="CVE-2017-7802" ref_url="https://www.suse.com/security/cve/CVE-2017-7802/" source="CVE"/>
		<reference ref_id="CVE-2017-7803" ref_url="https://www.suse.com/security/cve/CVE-2017-7803/" source="CVE"/>
		<reference ref_id="CVE-2017-7804" ref_url="https://www.suse.com/security/cve/CVE-2017-7804/" source="CVE"/>
		<reference ref_id="CVE-2017-7807" ref_url="https://www.suse.com/security/cve/CVE-2017-7807/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to ESR 52.3 fixes several issues.

These security issues were fixed: 

- CVE-2017-7807 Domain hijacking through AppCache fallback (bsc#1052829)
- CVE-2017-7791 Spoofing following page navigation with data: protocol and modal alerts (bsc#1052829)
- CVE-2017-7792 Buffer overflow viewing certificates with an extremely long OID (bsc#1052829)
- CVE-2017-7782 WindowsDllDetourPatcher allocates memory without DEP protections (bsc#1052829)
- CVE-2017-7787 Same-origin policy bypass with iframes through page reloads (bsc#1052829)
- CVE-2017-7786 Buffer overflow while painting non-displayable SVG (bsc#1052829)
- CVE-2017-7785 Buffer overflow manipulating ARIA attributes in DOM (bsc#1052829)
- CVE-2017-7784 Use-after-free with image observers (bsc#1052829)
- CVE-2017-7753 Out-of-bounds read with cached style data and pseudo-elements (bsc#1052829)
- CVE-2017-7798 XUL injection in the style editor in devtools (bsc#1052829)
- CVE-2017-7804 Memory protection bypass through WindowsDllDetourPatcher (bsc#1052829)
- CVE-2017-7779 Memory safety bugs fixed in Firefox 55 and Firefox ESR 52.3 (bsc#1052829)
- CVE-2017-7800 Use-after-free in WebSockets during disconnection (bsc#1052829)
- CVE-2017-7801 Use-after-free with marquee during window resizing (bsc#1052829)
- CVE-2017-7802 Use-after-free resizing image elements (bsc#1052829)
- CVE-2017-7803 CSP containing 'sandbox' improperly applied (bsc#1052829)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-28"/>
	<updated date="2017-09-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<cve impact="important" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7753/">CVE-2017-7753</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7779/">CVE-2017-7779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7782/">CVE-2017-7782</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7784/">CVE-2017-7784</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7785/">CVE-2017-7785</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7786/">CVE-2017-7786</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7787/">CVE-2017-7787</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7791/">CVE-2017-7791</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7792/">CVE-2017-7792</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7798/">CVE-2017-7798</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7800/">CVE-2017-7800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7801/">CVE-2017-7801</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7802/">CVE-2017-7802</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7803/">CVE-2017-7803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7804/">CVE-2017-7804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7807/">CVE-2017-7807</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518136" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518137" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77937" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1060354" ref_url="https://bugzilla.suse.com/1060354" source="BUGZILLA"/>
		<reference ref_id="1060355" ref_url="https://bugzilla.suse.com/1060355" source="BUGZILLA"/>
		<reference ref_id="1060360" ref_url="https://bugzilla.suse.com/1060360" source="BUGZILLA"/>
		<reference ref_id="1060361" ref_url="https://bugzilla.suse.com/1060361" source="BUGZILLA"/>
		<reference ref_id="1060362" ref_url="https://bugzilla.suse.com/1060362" source="BUGZILLA"/>
		<reference ref_id="1060364" ref_url="https://bugzilla.suse.com/1060364" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14491" ref_url="https://www.suse.com/security/cve/CVE-2017-14491/" source="CVE"/>
		<reference ref_id="CVE-2017-14492" ref_url="https://www.suse.com/security/cve/CVE-2017-14492/" source="CVE"/>
		<reference ref_id="CVE-2017-14493" ref_url="https://www.suse.com/security/cve/CVE-2017-14493/" source="CVE"/>
		<reference ref_id="CVE-2017-14494" ref_url="https://www.suse.com/security/cve/CVE-2017-14494/" source="CVE"/>
		<reference ref_id="CVE-2017-14495" ref_url="https://www.suse.com/security/cve/CVE-2017-14495/" source="CVE"/>
		<reference ref_id="CVE-2017-14496" ref_url="https://www.suse.com/security/cve/CVE-2017-14496/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003270.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following security issues:

- CVE-2017-14491: 2 byte heap based overflow. [bsc#1060354]
- CVE-2017-14492: heap based overflow. [bsc#1060355]
- CVE-2017-14493: stack based overflow. [bsc#1060360]
- CVE-2017-14494: DHCP - info leak. [bsc#1060361]
- CVE-2017-14495: DNS - OOM DoS. [bsc#1060362]
- CVE-2017-14496: DNS - DoS Integer underflow. [bsc#1060364]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-02"/>
	<updated date="2017-10-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060354">SUSE bug 1060354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060355">SUSE bug 1060355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14491/">CVE-2017-14491</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14492/">CVE-2017-14492</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14493/">CVE-2017-14493</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14494/">CVE-2017-14494</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14495/">CVE-2017-14495</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-14496/">CVE-2017-14496</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518138" comment="dnsmasq-2.78-18.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77938" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1056421" ref_url="https://bugzilla.suse.com/1056421" source="BUGZILLA"/>
		<reference ref_id="1056562" ref_url="https://bugzilla.suse.com/1056562" source="BUGZILLA"/>
		<reference ref_id="1056621" ref_url="https://bugzilla.suse.com/1056621" source="BUGZILLA"/>
		<reference ref_id="1056622" ref_url="https://bugzilla.suse.com/1056622" source="BUGZILLA"/>
		<reference ref_id="1057511" ref_url="https://bugzilla.suse.com/1057511" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10507" ref_url="https://www.suse.com/security/cve/CVE-2016-10507/" source="CVE"/>
		<reference ref_id="CVE-2017-14039" ref_url="https://www.suse.com/security/cve/CVE-2017-14039/" source="CVE"/>
		<reference ref_id="CVE-2017-14040" ref_url="https://www.suse.com/security/cve/CVE-2017-14040/" source="CVE"/>
		<reference ref_id="CVE-2017-14041" ref_url="https://www.suse.com/security/cve/CVE-2017-14041/" source="CVE"/>
		<reference ref_id="CVE-2017-14164" ref_url="https://www.suse.com/security/cve/CVE-2017-14164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003274.html" source="SUSE-SU"/>
		<description>
This update for openjpeg2 fixes several issues.

These security issues were fixed:

- CVE-2016-10507: Integer overflow vulnerability in the bmp24toimage function
  allowed remote attackers to cause a denial of service (heap-based buffer
  over-read and application crash) via a crafted bmp file (bsc#1056421).
- CVE-2017-14039: A heap-based buffer overflow was discovered in the
  opj_t2_encode_packet function. The vulnerability caused an out-of-bounds write,
  which may have lead to remote denial of service or possibly unspecified other
  impact (bsc#1056622).
- CVE-2017-14164: A size-validation issue was discovered in opj_j2k_write_sot.
  The vulnerability caused an out-of-bounds write, which may have lead to remote
  DoS or possibly remote code execution (bsc#1057511).
- CVE-2017-14040: An invalid write access was discovered in bin/jp2/convert.c,
  triggering a crash in the tgatoimage function. The vulnerability may have lead
  to remote denial of service or possibly unspecified other impact (bsc#1056621).
- CVE-2017-14041: A stack-based buffer overflow was discovered in the
  pgxtoimage function. The vulnerability caused an out-of-bounds write, which may
  have lead to remote denial of service or possibly remote code execution
  (bsc#1056562).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-05"/>
	<updated date="2017-10-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056421">SUSE bug 1056421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056562">SUSE bug 1056562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056621">SUSE bug 1056621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056622">SUSE bug 1056622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057511">SUSE bug 1057511</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10507/">CVE-2016-10507</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14039/">CVE-2017-14039</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14040/">CVE-2017-14040</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14041/">CVE-2017-14041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14164/">CVE-2017-14164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518139" comment="libopenjp2-7-2.1.0-4.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77939" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1042419" ref_url="https://bugzilla.suse.com/1042419" source="BUGZILLA"/>
		<reference ref_id="1044084" ref_url="https://bugzilla.suse.com/1044084" source="BUGZILLA"/>
		<reference ref_id="1050707" ref_url="https://bugzilla.suse.com/1050707" source="BUGZILLA"/>
		<reference ref_id="1058565" ref_url="https://bugzilla.suse.com/1058565" source="BUGZILLA"/>
		<reference ref_id="1058622" ref_url="https://bugzilla.suse.com/1058622" source="BUGZILLA"/>
		<reference ref_id="1058624" ref_url="https://bugzilla.suse.com/1058624" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12150" ref_url="https://www.suse.com/security/cve/CVE-2017-12150/" source="CVE"/>
		<reference ref_id="CVE-2017-12151" ref_url="https://www.suse.com/security/cve/CVE-2017-12151/" source="CVE"/>
		<reference ref_id="CVE-2017-12163" ref_url="https://www.suse.com/security/cve/CVE-2017-12163/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003275.html" source="SUSE-SU"/>
		<description>
This update for samba fixes several issues.

These security issues were fixed:

- CVE-2017-12163: Prevent client short SMB1 write from writing server memory to
  file, leaking information from the server to the client (bsc#1058624).
- CVE-2017-12150: Always enforce smb signing when it is configured (bsc#1058622).
- CVE-2017-12151: Keep required encryption across SMB3 dfs redirects (bsc#1058565).

These non-security issues were fixed:

- Fixed error where short name length was read as 2 bytes, should be 1 (bsc#1042419)
- Fixed GUID string format on GetPrinter to prevent published printers from disappearing 7 (bsc#1050707).
- Halt endless forest trust scan to prevent winbind from running out of memory (bsc#1044084).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-05"/>
	<updated date="2017-10-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042419">SUSE bug 1042419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044084">SUSE bug 1044084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050707">SUSE bug 1050707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058565">SUSE bug 1058565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058622">SUSE bug 1058622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058624">SUSE bug 1058624</bugzilla>
	<cve impact="moderate" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12150/">CVE-2017-12150</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12151/">CVE-2017-12151</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12163/">CVE-2017-12163</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518140" comment="libdcerpc-binding0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518141" comment="libdcerpc-binding0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518142" comment="libdcerpc0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518143" comment="libdcerpc0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518144" comment="libndr-krb5pac0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518145" comment="libndr-krb5pac0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518146" comment="libndr-nbt0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518147" comment="libndr-nbt0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518148" comment="libndr-standard0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518149" comment="libndr-standard0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518150" comment="libndr0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518151" comment="libndr0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518152" comment="libnetapi0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518153" comment="libnetapi0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518154" comment="libsamba-credentials0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518155" comment="libsamba-credentials0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518156" comment="libsamba-errors0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518157" comment="libsamba-errors0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518158" comment="libsamba-hostconfig0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518159" comment="libsamba-hostconfig0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518160" comment="libsamba-passdb0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518161" comment="libsamba-passdb0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518162" comment="libsamba-util0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518163" comment="libsamba-util0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518164" comment="libsamdb0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518165" comment="libsamdb0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518166" comment="libsmbclient0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518167" comment="libsmbclient0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518168" comment="libsmbconf0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518169" comment="libsmbconf0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518170" comment="libsmbldap0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518171" comment="libsmbldap0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518172" comment="libtevent-util0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518173" comment="libtevent-util0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518174" comment="libwbclient0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518175" comment="libwbclient0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518176" comment="samba-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518177" comment="samba-client-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518178" comment="samba-client-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518179" comment="samba-doc-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518180" comment="samba-libs-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518181" comment="samba-libs-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518182" comment="samba-winbind-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518183" comment="samba-winbind-32bit-4.4.2-38.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77940" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1032680" ref_url="https://bugzilla.suse.com/1032680" source="BUGZILLA"/>
		<reference ref_id="1054028" ref_url="https://bugzilla.suse.com/1054028" source="BUGZILLA"/>
		<reference ref_id="1056995" ref_url="https://bugzilla.suse.com/1056995" source="BUGZILLA"/>
		<reference ref_id="903543" ref_url="https://bugzilla.suse.com/903543" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11462" ref_url="https://www.suse.com/security/cve/CVE-2017-11462/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003277.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes several issues.

This security issue was fixed:

- CVE-2017-11462: Prevent automatic security context deletion to prevent
  double-free (bsc#1056995)

These non-security issues were fixed:

- Set 'rdns' and 'dns_canonicalize_hostname' to false in krb5.conf
  in order to improve client security in handling service principle
  names. (bsc#1054028)
- Prevent kadmind.service startup failure caused by absence of
  LDAP service. (bsc#903543)
- Remove main package's dependency on systemd (bsc#1032680)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-09"/>
	<updated date="2017-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1032680">SUSE bug 1032680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054028">SUSE bug 1054028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056995">SUSE bug 1056995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903543">SUSE bug 903543</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11462/">CVE-2017-11462</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518184" comment="krb5-1.12.5-40.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518185" comment="krb5-32bit-1.12.5-40.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518186" comment="krb5-client-1.12.5-40.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77941" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1060445" ref_url="https://bugzilla.suse.com/1060445" source="BUGZILLA"/>
		<reference ref_id="1061005" ref_url="https://bugzilla.suse.com/1061005" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7793" ref_url="https://www.suse.com/security/cve/CVE-2017-7793/" source="CVE"/>
		<reference ref_id="CVE-2017-7805" ref_url="https://www.suse.com/security/cve/CVE-2017-7805/" source="CVE"/>
		<reference ref_id="CVE-2017-7810" ref_url="https://www.suse.com/security/cve/CVE-2017-7810/" source="CVE"/>
		<reference ref_id="CVE-2017-7814" ref_url="https://www.suse.com/security/cve/CVE-2017-7814/" source="CVE"/>
		<reference ref_id="CVE-2017-7818" ref_url="https://www.suse.com/security/cve/CVE-2017-7818/" source="CVE"/>
		<reference ref_id="CVE-2017-7819" ref_url="https://www.suse.com/security/cve/CVE-2017-7819/" source="CVE"/>
		<reference ref_id="CVE-2017-7823" ref_url="https://www.suse.com/security/cve/CVE-2017-7823/" source="CVE"/>
		<reference ref_id="CVE-2017-7824" ref_url="https://www.suse.com/security/cve/CVE-2017-7824/" source="CVE"/>
		<reference ref_id="CVE-2017-7825" ref_url="https://www.suse.com/security/cve/CVE-2017-7825/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2688-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00008.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to ESR 52.4, mozilla-nss fixes the following issues:

This security issue was fixed for mozilla-nss:

- CVE-2017-7805: Prevent use-after-free in TLS 1.2 when generating handshake hashes (bsc#1061005)

These security issues were fixed for Firefox 

- CVE-2017-7825: Fixed some Tibetan and Arabic unicode characters rendering (bsc#1060445).
- CVE-2017-7805: Prevent Use-after-free in TLS 1.2 generating handshake hashes (bsc#1060445).
- CVE-2017-7819: Prevent Use-after-free while resizing images in design mode (bsc#1060445).
- CVE-2017-7818: Prevent Use-after-free during ARIA array manipulation (bsc#1060445).
- CVE-2017-7793: Prevent Use-after-free with Fetch API (bsc#1060445).
- CVE-2017-7824: Prevent Buffer overflow when drawing and validating elements with ANGLE (bsc#1060445).
- CVE-2017-7810: Fixed several memory safety bugs (bsc#1060445).
- CVE-2017-7823: CSP sandbox directive did not create a unique origin (bsc#1060445).
- CVE-2017-7814: Blob and data URLs bypassed phishing and malware protection warnings (bsc#1060445).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-10"/>
	<updated date="2017-10-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061005">SUSE bug 1061005</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7793/">CVE-2017-7793</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7805/">CVE-2017-7805</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7810/">CVE-2017-7810</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7814/">CVE-2017-7814</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7818/">CVE-2017-7818</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7819/">CVE-2017-7819</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7823/">CVE-2017-7823</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7824/">CVE-2017-7824</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7825/">CVE-2017-7825</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518187" comment="MozillaFirefox-52.4.0esr-109.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518188" comment="MozillaFirefox-translations-52.4.0esr-109.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518189" comment="libfreebl3-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518190" comment="libfreebl3-32bit-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518191" comment="libsoftokn3-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518192" comment="libsoftokn3-32bit-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518193" comment="mozilla-nss-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518194" comment="mozilla-nss-32bit-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518195" comment="mozilla-nss-certs-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518196" comment="mozilla-nss-certs-32bit-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518197" comment="mozilla-nss-sysinit-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518198" comment="mozilla-nss-sysinit-32bit-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518199" comment="mozilla-nss-tools-3.29.5-58.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77942" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1012143" ref_url="https://bugzilla.suse.com/1012143" source="BUGZILLA"/>
		<reference ref_id="1017189" ref_url="https://bugzilla.suse.com/1017189" source="BUGZILLA"/>
		<reference ref_id="1031056" ref_url="https://bugzilla.suse.com/1031056" source="BUGZILLA"/>
		<reference ref_id="1036785" ref_url="https://bugzilla.suse.com/1036785" source="BUGZILLA"/>
		<reference ref_id="1048783" ref_url="https://bugzilla.suse.com/1048783" source="BUGZILLA"/>
		<reference ref_id="1049505" ref_url="https://bugzilla.suse.com/1049505" source="BUGZILLA"/>
		<reference ref_id="1051017" ref_url="https://bugzilla.suse.com/1051017" source="BUGZILLA"/>
		<reference ref_id="1052151" ref_url="https://bugzilla.suse.com/1052151" source="BUGZILLA"/>
		<reference ref_id="1053600" ref_url="https://bugzilla.suse.com/1053600" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:2697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003287.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes several issues.

This security issue was fixed:

- bsc#1053600: Escape ssh commed line to prevent interpreting malicious
  hostname as arguments, allowing for command execution

These non-security issues were fixed:

- bsc#1049505, bsc#1051017: Security manager: Don't autogenerate seclabels of
  type 'none' when AppArmor is inactive
- bsc#1052151: Moved /usr/share/libvirt/libvirtLogo.png symlink from client to
  doc subpackage, where its target resides
- bsc#1048783: Ignore newlines in libvirt-guests.sh guest list
- bsc#1031056: Add default controllers for USB devices
- bsc#1012143: Define path to parted using autoconf cache variable. parted is
  used for management of disk-based storage pools
- bsc#1036785: Prevent output of null target in domxml-to-native
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-10"/>
	<updated date="2017-10-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1012143">SUSE bug 1012143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017189">SUSE bug 1017189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031056">SUSE bug 1031056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036785">SUSE bug 1036785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048783">SUSE bug 1048783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049505">SUSE bug 1049505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051017">SUSE bug 1051017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052151">SUSE bug 1052151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053600">SUSE bug 1053600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518200" comment="libvirt-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518201" comment="libvirt-client-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518202" comment="libvirt-client-32bit-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518203" comment="libvirt-daemon-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518204" comment="libvirt-daemon-config-network-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518205" comment="libvirt-daemon-config-nwfilter-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518206" comment="libvirt-daemon-driver-interface-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518207" comment="libvirt-daemon-driver-libxl-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518208" comment="libvirt-daemon-driver-lxc-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518209" comment="libvirt-daemon-driver-network-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518210" comment="libvirt-daemon-driver-nodedev-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518211" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518212" comment="libvirt-daemon-driver-qemu-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518213" comment="libvirt-daemon-driver-secret-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518214" comment="libvirt-daemon-driver-storage-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518215" comment="libvirt-daemon-lxc-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518216" comment="libvirt-daemon-qemu-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518217" comment="libvirt-daemon-xen-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518218" comment="libvirt-doc-2.0.0-27.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77943" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-bad (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1013659" ref_url="https://bugzilla.suse.com/1013659" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9809" ref_url="https://www.suse.com/security/cve/CVE-2016-9809/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002607.html" source="SUSE-SU"/>
		<description>

This update for gstreamer-0_10-plugins-bad fixes the following issue:

- CVE-2016-9809: Off by one read in gst_h264_parse_set_caps() (bsc#1013659)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-30"/>
	<updated date="2017-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013659">SUSE bug 1013659</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9809/">CVE-2016-9809</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518219" comment="gstreamer-0_10-plugins-bad-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518220" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518221" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518222" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518223" comment="libgstbasevideo-0_10-23-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518224" comment="libgstbasevideo-0_10-23-32bit-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518225" comment="libgstcodecparsers-0_10-23-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518226" comment="libgstphotography-0_10-23-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518227" comment="libgstphotography-0_10-23-32bit-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518228" comment="libgstsignalprocessor-0_10-23-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518229" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518230" comment="libgstvdp-0_10-23-0.10.23-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518231" comment="libgstvdp-0_10-23-32bit-0.10.23-25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77944" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1047536" ref_url="https://bugzilla.suse.com/1047536" source="BUGZILLA"/>
		<reference ref_id="814241" ref_url="https://bugzilla.suse.com/814241" source="BUGZILLA"/>
		<reference ref_id="879138" ref_url="https://bugzilla.suse.com/879138" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:2744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003299.html" source="SUSE-SU"/>
		<description>
xerces-j2 was updated to fix several issues.

This security issue was fixed:

- bsc#814241: Prevent possible DoS through very long attribute names

This non-security issue was fixed:

- Prevent StackOverflowError when applying a pattern restriction on long strings
  while trying to validate an XML file against a schema (bsc#1047536, bsc#879138)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-17"/>
	<updated date="2017-10-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047536">SUSE bug 1047536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814241">SUSE bug 814241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879138">SUSE bug 879138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518232" comment="xerces-j2-2.8.1-268.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77945" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1056061" ref_url="https://bugzilla.suse.com/1056061" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13078" ref_url="https://www.suse.com/security/cve/CVE-2017-13078/" source="CVE"/>
		<reference ref_id="CVE-2017-13079" ref_url="https://www.suse.com/security/cve/CVE-2017-13079/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081/" source="CVE"/>
		<reference ref_id="CVE-2017-13087" ref_url="https://www.suse.com/security/cve/CVE-2017-13087/" source="CVE"/>
		<reference ref_id="CVE-2017-13088" ref_url="https://www.suse.com/security/cve/CVE-2017-13088/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the security issues:

- Several vulnerabilities in standard conforming implementations of the WPA2
  protocol have been discovered and published under the code name KRACK. This
  update remedies those issues in a backwards compatible manner, i.e. the
  updated wpa_supplicant can interface properly with both vulnerable and
  patched implementations of WPA2, but an attacker won't be able to exploit the
  KRACK weaknesses in those connections anymore even if the other party is
  still vulnerable. [bsc#1056061, CVE-2017-13078, CVE-2017-13079,
  CVE-2017-13080, CVE-2017-13081, CVE-2017-13087, CVE-2017-13088]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-17"/>
	<updated date="2017-10-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13078/">CVE-2017-13078</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13079/">CVE-2017-13079</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13087/">CVE-2017-13087</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13088/">CVE-2017-13088</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518233" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77946" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1060653" ref_url="https://bugzilla.suse.com/1060653" source="BUGZILLA"/>
		<reference ref_id="1061876" ref_url="https://bugzilla.suse.com/1061876" source="BUGZILLA"/>
		<reference ref_id="1063824" ref_url="https://bugzilla.suse.com/1063824" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000254" ref_url="https://www.suse.com/security/cve/CVE-2017-1000254/" source="CVE"/>
		<reference ref_id="CVE-2017-1000257" ref_url="https://www.suse.com/security/cve/CVE-2017-1000257/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003350.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issues fixed:

- CVE-2017-1000254: FTP PWD response parser out of bounds read (bsc#1061876)
- CVE-2017-1000257: IMAP FETCH response out of bounds read (bsc#1063824)

Bugs fixed:

- Fixed error 'error:1408F10B:SSL routines' when connecting to ftps via proxy (bsc#1060653)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-23"/>
	<updated date="2017-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1060653">SUSE bug 1060653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061876">SUSE bug 1061876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063824">SUSE bug 1063824</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000254/">CVE-2017-1000254</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000257/">CVE-2017-1000257</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518234" comment="curl-7.37.0-37.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518235" comment="libcurl4-7.37.0-37.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518236" comment="libcurl4-32bit-7.37.0-37.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77947" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1020905" ref_url="https://bugzilla.suse.com/1020905" source="BUGZILLA"/>
		<reference ref_id="1022053" ref_url="https://bugzilla.suse.com/1022053" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-5546" ref_url="https://www.suse.com/security/cve/CVE-2016-5546/" source="CVE"/>
		<reference ref_id="CVE-2016-5547" ref_url="https://www.suse.com/security/cve/CVE-2016-5547/" source="CVE"/>
		<reference ref_id="CVE-2016-5548" ref_url="https://www.suse.com/security/cve/CVE-2016-5548/" source="CVE"/>
		<reference ref_id="CVE-2016-5549" ref_url="https://www.suse.com/security/cve/CVE-2016-5549/" source="CVE"/>
		<reference ref_id="CVE-2016-5552" ref_url="https://www.suse.com/security/cve/CVE-2016-5552/" source="CVE"/>
		<reference ref_id="CVE-2017-3231" ref_url="https://www.suse.com/security/cve/CVE-2017-3231/" source="CVE"/>
		<reference ref_id="CVE-2017-3241" ref_url="https://www.suse.com/security/cve/CVE-2017-3241/" source="CVE"/>
		<reference ref_id="CVE-2017-3252" ref_url="https://www.suse.com/security/cve/CVE-2017-3252/" source="CVE"/>
		<reference ref_id="CVE-2017-3253" ref_url="https://www.suse.com/security/cve/CVE-2017-3253/" source="CVE"/>
		<reference ref_id="CVE-2017-3260" ref_url="https://www.suse.com/security/cve/CVE-2017-3260/" source="CVE"/>
		<reference ref_id="CVE-2017-3261" ref_url="https://www.suse.com/security/cve/CVE-2017-3261/" source="CVE"/>
		<reference ref_id="CVE-2017-3272" ref_url="https://www.suse.com/security/cve/CVE-2017-3272/" source="CVE"/>
		<reference ref_id="CVE-2017-3289" ref_url="https://www.suse.com/security/cve/CVE-2017-3289/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" source="SUSE-SU"/>
		<description>

This update for java-1_8_0-openjdk fixes the following issues:
Oracle Critical Patch Update of January 2017 (bsc#1020905)
Upgrade to version jdk8u121 (icedtea 3.3.0):
 - S8138725: Add options for Javadoc generation
 - S8140353: Improve signature checking
 - S8151934, CVE-2017-3231: Resolve class resolution
 - S8156804, CVE-2017-3241: Better constraint checking
 - S8158406: Limited Parameter Processing
 - S8158997: JNDI Protocols Switch
 - S8159507: RuntimeVisibleAnnotation validation
 - S8161218: Better bytecode loading
 - S8161743, CVE-2017-3252: Provide proper login context
 - S8162577: Standardize logging levels
 - S8162973: Better component components
 - S8164143, CVE-2017-3260: Improve components for menu items
 - S8164147, CVE-2017-3261: Improve streaming socket output
 - S8165071, CVE-2016-2183: Expand TLS support
 - S8165344, CVE-2017-3272: Update concurrency support
 - S8166988, CVE-2017-3253: Improve image processing performance
 - S8167104, CVE-2017-3289: Additional class construction refinements
 - S8167223, CVE-2016-5552: URL handling improvements
 - S8168705, CVE-2016-5547: Better ObjectIdentifier validation
 - S8168714, CVE-2016-5546: Tighten ECDSA validation
 - S8168728, CVE-2016-5548: DSA signing improvements
 - S8168724, CVE-2016-5549: ECDSA signing improvements
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-31"/>
	<updated date="2017-01-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022053">SUSE bug 1022053</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5546/">CVE-2016-5546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5547/">CVE-2016-5547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5548/">CVE-2016-5548</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5549/">CVE-2016-5549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5552/">CVE-2016-5552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3231/">CVE-2017-3231</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3241/">CVE-2017-3241</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3252/">CVE-2017-3252</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3253/">CVE-2017-3253</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3260/">CVE-2017-3260</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3261/">CVE-2017-3261</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3272/">CVE-2017-3272</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3289/">CVE-2017-3289</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517067" comment="java-1_8_0-openjdk-1.8.0.121-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517068" comment="java-1_8_0-openjdk-headless-1.8.0.121-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77948" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1060877" ref_url="https://bugzilla.suse.com/1060877" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12166" ref_url="https://www.suse.com/security/cve/CVE-2017-12166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00071.html" source="SUSE-SU"/>
		<description>
This update for openvpn fixes the following issues:

- CVE-2017-12166: Lack of bound check in read_key in old legacy key handling before using values could be used for a remote buffer overflow (bsc#1060877).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-24"/>
	<updated date="2017-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060877">SUSE bug 1060877</bugzilla>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12166/">CVE-2017-12166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518237" comment="openvpn-2.3.8-16.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77949" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1005879" ref_url="https://bugzilla.suse.com/1005879" source="BUGZILLA"/>
		<reference ref_id="1018832" ref_url="https://bugzilla.suse.com/1018832" source="BUGZILLA"/>
		<reference ref_id="999646" ref_url="https://bugzilla.suse.com/999646" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7444" ref_url="https://www.suse.com/security/cve/CVE-2016-7444/" source="CVE"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2017-5335" ref_url="https://www.suse.com/security/cve/CVE-2017-5335/" source="CVE"/>
		<reference ref_id="CVE-2017-5336" ref_url="https://www.suse.com/security/cve/CVE-2017-5336/" source="CVE"/>
		<reference ref_id="CVE-2017-5337" ref_url="https://www.suse.com/security/cve/CVE-2017-5337/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00000.html" source="SUSE-SU"/>
		<description>

This update for gnutls fixes the following security issues:

- GnuTLS could have crashed when processing maliciously crafted OpenPGP
  certificates (GNUTLS-SA-2017-2, bsc#1018832, CVE-2017-5335, CVE-2017-5337,
  CVE-2017-5336)
- GnuTLS could have falsely accepted certificates when using OCSP
  (GNUTLS-SA-2016-3, bsc#999646, CVE-2016-7444)
- GnuTLS could have suffered from 100% CPU load DoS attacks by using SSL alert
  packets during the handshake (bsc#1005879, CVE-2016-8610)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-01"/>
	<updated date="2017-02-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005879">SUSE bug 1005879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018832">SUSE bug 1018832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999646">SUSE bug 999646</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7444/">CVE-2016-7444</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5335/">CVE-2017-5335</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5336/">CVE-2017-5336</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5337/">CVE-2017-5337</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517069" comment="gnutls-3.2.15-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517070" comment="libgnutls28-3.2.15-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517071" comment="libgnutls28-32bit-3.2.15-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77950" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1047873" ref_url="https://bugzilla.suse.com/1047873" source="BUGZILLA"/>
		<reference ref_id="1057247" ref_url="https://bugzilla.suse.com/1057247" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11108" ref_url="https://www.suse.com/security/cve/CVE-2017-11108/" source="CVE"/>
		<reference ref_id="CVE-2017-11541" ref_url="https://www.suse.com/security/cve/CVE-2017-11541/" source="CVE"/>
		<reference ref_id="CVE-2017-11542" ref_url="https://www.suse.com/security/cve/CVE-2017-11542/" source="CVE"/>
		<reference ref_id="CVE-2017-11543" ref_url="https://www.suse.com/security/cve/CVE-2017-11543/" source="CVE"/>
		<reference ref_id="CVE-2017-12893" ref_url="https://www.suse.com/security/cve/CVE-2017-12893/" source="CVE"/>
		<reference ref_id="CVE-2017-12894" ref_url="https://www.suse.com/security/cve/CVE-2017-12894/" source="CVE"/>
		<reference ref_id="CVE-2017-12895" ref_url="https://www.suse.com/security/cve/CVE-2017-12895/" source="CVE"/>
		<reference ref_id="CVE-2017-12896" ref_url="https://www.suse.com/security/cve/CVE-2017-12896/" source="CVE"/>
		<reference ref_id="CVE-2017-12897" ref_url="https://www.suse.com/security/cve/CVE-2017-12897/" source="CVE"/>
		<reference ref_id="CVE-2017-12898" ref_url="https://www.suse.com/security/cve/CVE-2017-12898/" source="CVE"/>
		<reference ref_id="CVE-2017-12899" ref_url="https://www.suse.com/security/cve/CVE-2017-12899/" source="CVE"/>
		<reference ref_id="CVE-2017-12900" ref_url="https://www.suse.com/security/cve/CVE-2017-12900/" source="CVE"/>
		<reference ref_id="CVE-2017-12901" ref_url="https://www.suse.com/security/cve/CVE-2017-12901/" source="CVE"/>
		<reference ref_id="CVE-2017-12902" ref_url="https://www.suse.com/security/cve/CVE-2017-12902/" source="CVE"/>
		<reference ref_id="CVE-2017-12985" ref_url="https://www.suse.com/security/cve/CVE-2017-12985/" source="CVE"/>
		<reference ref_id="CVE-2017-12986" ref_url="https://www.suse.com/security/cve/CVE-2017-12986/" source="CVE"/>
		<reference ref_id="CVE-2017-12987" ref_url="https://www.suse.com/security/cve/CVE-2017-12987/" source="CVE"/>
		<reference ref_id="CVE-2017-12988" ref_url="https://www.suse.com/security/cve/CVE-2017-12988/" source="CVE"/>
		<reference ref_id="CVE-2017-12989" ref_url="https://www.suse.com/security/cve/CVE-2017-12989/" source="CVE"/>
		<reference ref_id="CVE-2017-12990" ref_url="https://www.suse.com/security/cve/CVE-2017-12990/" source="CVE"/>
		<reference ref_id="CVE-2017-12991" ref_url="https://www.suse.com/security/cve/CVE-2017-12991/" source="CVE"/>
		<reference ref_id="CVE-2017-12992" ref_url="https://www.suse.com/security/cve/CVE-2017-12992/" source="CVE"/>
		<reference ref_id="CVE-2017-12993" ref_url="https://www.suse.com/security/cve/CVE-2017-12993/" source="CVE"/>
		<reference ref_id="CVE-2017-12994" ref_url="https://www.suse.com/security/cve/CVE-2017-12994/" source="CVE"/>
		<reference ref_id="CVE-2017-12995" ref_url="https://www.suse.com/security/cve/CVE-2017-12995/" source="CVE"/>
		<reference ref_id="CVE-2017-12996" ref_url="https://www.suse.com/security/cve/CVE-2017-12996/" source="CVE"/>
		<reference ref_id="CVE-2017-12997" ref_url="https://www.suse.com/security/cve/CVE-2017-12997/" source="CVE"/>
		<reference ref_id="CVE-2017-12998" ref_url="https://www.suse.com/security/cve/CVE-2017-12998/" source="CVE"/>
		<reference ref_id="CVE-2017-12999" ref_url="https://www.suse.com/security/cve/CVE-2017-12999/" source="CVE"/>
		<reference ref_id="CVE-2017-13000" ref_url="https://www.suse.com/security/cve/CVE-2017-13000/" source="CVE"/>
		<reference ref_id="CVE-2017-13001" ref_url="https://www.suse.com/security/cve/CVE-2017-13001/" source="CVE"/>
		<reference ref_id="CVE-2017-13002" ref_url="https://www.suse.com/security/cve/CVE-2017-13002/" source="CVE"/>
		<reference ref_id="CVE-2017-13003" ref_url="https://www.suse.com/security/cve/CVE-2017-13003/" source="CVE"/>
		<reference ref_id="CVE-2017-13004" ref_url="https://www.suse.com/security/cve/CVE-2017-13004/" source="CVE"/>
		<reference ref_id="CVE-2017-13005" ref_url="https://www.suse.com/security/cve/CVE-2017-13005/" source="CVE"/>
		<reference ref_id="CVE-2017-13006" ref_url="https://www.suse.com/security/cve/CVE-2017-13006/" source="CVE"/>
		<reference ref_id="CVE-2017-13007" ref_url="https://www.suse.com/security/cve/CVE-2017-13007/" source="CVE"/>
		<reference ref_id="CVE-2017-13008" ref_url="https://www.suse.com/security/cve/CVE-2017-13008/" source="CVE"/>
		<reference ref_id="CVE-2017-13009" ref_url="https://www.suse.com/security/cve/CVE-2017-13009/" source="CVE"/>
		<reference ref_id="CVE-2017-13010" ref_url="https://www.suse.com/security/cve/CVE-2017-13010/" source="CVE"/>
		<reference ref_id="CVE-2017-13011" ref_url="https://www.suse.com/security/cve/CVE-2017-13011/" source="CVE"/>
		<reference ref_id="CVE-2017-13012" ref_url="https://www.suse.com/security/cve/CVE-2017-13012/" source="CVE"/>
		<reference ref_id="CVE-2017-13013" ref_url="https://www.suse.com/security/cve/CVE-2017-13013/" source="CVE"/>
		<reference ref_id="CVE-2017-13014" ref_url="https://www.suse.com/security/cve/CVE-2017-13014/" source="CVE"/>
		<reference ref_id="CVE-2017-13015" ref_url="https://www.suse.com/security/cve/CVE-2017-13015/" source="CVE"/>
		<reference ref_id="CVE-2017-13016" ref_url="https://www.suse.com/security/cve/CVE-2017-13016/" source="CVE"/>
		<reference ref_id="CVE-2017-13017" ref_url="https://www.suse.com/security/cve/CVE-2017-13017/" source="CVE"/>
		<reference ref_id="CVE-2017-13018" ref_url="https://www.suse.com/security/cve/CVE-2017-13018/" source="CVE"/>
		<reference ref_id="CVE-2017-13019" ref_url="https://www.suse.com/security/cve/CVE-2017-13019/" source="CVE"/>
		<reference ref_id="CVE-2017-13020" ref_url="https://www.suse.com/security/cve/CVE-2017-13020/" source="CVE"/>
		<reference ref_id="CVE-2017-13021" ref_url="https://www.suse.com/security/cve/CVE-2017-13021/" source="CVE"/>
		<reference ref_id="CVE-2017-13022" ref_url="https://www.suse.com/security/cve/CVE-2017-13022/" source="CVE"/>
		<reference ref_id="CVE-2017-13023" ref_url="https://www.suse.com/security/cve/CVE-2017-13023/" source="CVE"/>
		<reference ref_id="CVE-2017-13024" ref_url="https://www.suse.com/security/cve/CVE-2017-13024/" source="CVE"/>
		<reference ref_id="CVE-2017-13025" ref_url="https://www.suse.com/security/cve/CVE-2017-13025/" source="CVE"/>
		<reference ref_id="CVE-2017-13026" ref_url="https://www.suse.com/security/cve/CVE-2017-13026/" source="CVE"/>
		<reference ref_id="CVE-2017-13027" ref_url="https://www.suse.com/security/cve/CVE-2017-13027/" source="CVE"/>
		<reference ref_id="CVE-2017-13028" ref_url="https://www.suse.com/security/cve/CVE-2017-13028/" source="CVE"/>
		<reference ref_id="CVE-2017-13029" ref_url="https://www.suse.com/security/cve/CVE-2017-13029/" source="CVE"/>
		<reference ref_id="CVE-2017-13030" ref_url="https://www.suse.com/security/cve/CVE-2017-13030/" source="CVE"/>
		<reference ref_id="CVE-2017-13031" ref_url="https://www.suse.com/security/cve/CVE-2017-13031/" source="CVE"/>
		<reference ref_id="CVE-2017-13032" ref_url="https://www.suse.com/security/cve/CVE-2017-13032/" source="CVE"/>
		<reference ref_id="CVE-2017-13033" ref_url="https://www.suse.com/security/cve/CVE-2017-13033/" source="CVE"/>
		<reference ref_id="CVE-2017-13034" ref_url="https://www.suse.com/security/cve/CVE-2017-13034/" source="CVE"/>
		<reference ref_id="CVE-2017-13035" ref_url="https://www.suse.com/security/cve/CVE-2017-13035/" source="CVE"/>
		<reference ref_id="CVE-2017-13036" ref_url="https://www.suse.com/security/cve/CVE-2017-13036/" source="CVE"/>
		<reference ref_id="CVE-2017-13037" ref_url="https://www.suse.com/security/cve/CVE-2017-13037/" source="CVE"/>
		<reference ref_id="CVE-2017-13038" ref_url="https://www.suse.com/security/cve/CVE-2017-13038/" source="CVE"/>
		<reference ref_id="CVE-2017-13039" ref_url="https://www.suse.com/security/cve/CVE-2017-13039/" source="CVE"/>
		<reference ref_id="CVE-2017-13040" ref_url="https://www.suse.com/security/cve/CVE-2017-13040/" source="CVE"/>
		<reference ref_id="CVE-2017-13041" ref_url="https://www.suse.com/security/cve/CVE-2017-13041/" source="CVE"/>
		<reference ref_id="CVE-2017-13042" ref_url="https://www.suse.com/security/cve/CVE-2017-13042/" source="CVE"/>
		<reference ref_id="CVE-2017-13043" ref_url="https://www.suse.com/security/cve/CVE-2017-13043/" source="CVE"/>
		<reference ref_id="CVE-2017-13044" ref_url="https://www.suse.com/security/cve/CVE-2017-13044/" source="CVE"/>
		<reference ref_id="CVE-2017-13045" ref_url="https://www.suse.com/security/cve/CVE-2017-13045/" source="CVE"/>
		<reference ref_id="CVE-2017-13046" ref_url="https://www.suse.com/security/cve/CVE-2017-13046/" source="CVE"/>
		<reference ref_id="CVE-2017-13047" ref_url="https://www.suse.com/security/cve/CVE-2017-13047/" source="CVE"/>
		<reference ref_id="CVE-2017-13048" ref_url="https://www.suse.com/security/cve/CVE-2017-13048/" source="CVE"/>
		<reference ref_id="CVE-2017-13049" ref_url="https://www.suse.com/security/cve/CVE-2017-13049/" source="CVE"/>
		<reference ref_id="CVE-2017-13050" ref_url="https://www.suse.com/security/cve/CVE-2017-13050/" source="CVE"/>
		<reference ref_id="CVE-2017-13051" ref_url="https://www.suse.com/security/cve/CVE-2017-13051/" source="CVE"/>
		<reference ref_id="CVE-2017-13052" ref_url="https://www.suse.com/security/cve/CVE-2017-13052/" source="CVE"/>
		<reference ref_id="CVE-2017-13053" ref_url="https://www.suse.com/security/cve/CVE-2017-13053/" source="CVE"/>
		<reference ref_id="CVE-2017-13054" ref_url="https://www.suse.com/security/cve/CVE-2017-13054/" source="CVE"/>
		<reference ref_id="CVE-2017-13055" ref_url="https://www.suse.com/security/cve/CVE-2017-13055/" source="CVE"/>
		<reference ref_id="CVE-2017-13687" ref_url="https://www.suse.com/security/cve/CVE-2017-13687/" source="CVE"/>
		<reference ref_id="CVE-2017-13688" ref_url="https://www.suse.com/security/cve/CVE-2017-13688/" source="CVE"/>
		<reference ref_id="CVE-2017-13689" ref_url="https://www.suse.com/security/cve/CVE-2017-13689/" source="CVE"/>
		<reference ref_id="CVE-2017-13690" ref_url="https://www.suse.com/security/cve/CVE-2017-13690/" source="CVE"/>
		<reference ref_id="CVE-2017-13725" ref_url="https://www.suse.com/security/cve/CVE-2017-13725/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<description>
This update for tcpdump to version 4.9.2 fixes several issues.

These security issues were fixed:

- CVE-2017-11108: Prevent remote attackers to cause DoS (heap-based buffer over-read and application crash) via crafted packet data. The crash occured in the EXTRACT_16BITS function, called from the stp_print function for the Spanning Tree Protocol (bsc#1047873, bsc#1057247).
- CVE-2017-11543: Prevent buffer overflow in the sliplink_print function in print-sl.c that allowed remote DoS (bsc#1057247).
- CVE-2017-13011: Prevent buffer overflow in bittok2str_internal() that allowed remote DoS (bsc#1057247)
- CVE-2017-12989: Prevent infinite loop in the RESP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12990: Prevent infinite loop in the ISAKMP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12995: Prevent infinite loop in the DNS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12997: Prevent infinite loop in the LLDP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-11541: Prevent heap-based buffer over-read in the lldp_print function in print-lldp.c, related to util-print.c that allowed remote DoS (bsc#1057247).
- CVE-2017-11542: Prevent heap-based buffer over-read in the pimv1_print function in print-pim.c that allowed remote DoS (bsc#1057247).
- CVE-2017-12893: Prevent buffer over-read in the SMB/CIFS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12894: Prevent buffer over-read in several protocol parsers that allowed remote DoS (bsc#1057247)
- CVE-2017-12895: Prevent buffer over-read in the ICMP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12896: Prevent buffer over-read in the ISAKMP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12897: Prevent buffer over-read in the ISO CLNS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12898: Prevent buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12899: Prevent buffer over-read in the DECnet parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12900: Prevent buffer over-read in the in several protocol parsers that allowed remote DoS (bsc#1057247)
- CVE-2017-12901: Prevent buffer over-read in the EIGRP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12902: Prevent buffer over-read in the Zephyr parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12985: Prevent buffer over-read in the IPv6 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12986: Prevent buffer over-read in the IPv6 routing header parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12987: Prevent buffer over-read in the 802.11 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12988: Prevent buffer over-read in the telnet parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12991: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12992: Prevent buffer over-read in the RIPng parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12993: Prevent buffer over-read in the Juniper protocols parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12994: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12996: Prevent buffer over-read in the PIMv2 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12998: Prevent buffer over-read in the IS-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12999: Prevent buffer over-read in the IS-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13000: Prevent buffer over-read in the IEEE 802.15.4 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13001: Prevent buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13002: Prevent buffer over-read in the AODV parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13003: Prevent buffer over-read in the LMP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13004: Prevent buffer over-read in the Juniper protocols parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13005: Prevent buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13006: Prevent buffer over-read in the L2TP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13007: Prevent buffer over-read in the Apple PKTAP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13008: Prevent buffer over-read in the IEEE 802.11 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13009: Prevent buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13010: Prevent buffer over-read in the BEEP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13012: Prevent buffer over-read in the ICMP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13013: Prevent buffer over-read in the ARP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13014: Prevent buffer over-read in the White Board protocol parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13015: Prevent buffer over-read in the EAP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13016: Prevent buffer over-read in the ISO ES-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13017: Prevent buffer over-read in the DHCPv6 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13018: Prevent buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13019: Prevent buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13020: Prevent buffer over-read in the VTP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13021: Prevent buffer over-read in the ICMPv6 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13022: Prevent buffer over-read in the IP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13023: Prevent buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13024: Prevent buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13025: Prevent buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13026: Prevent buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13027: Prevent buffer over-read in the LLDP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13028: Prevent buffer over-read in the BOOTP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13029: Prevent buffer over-read in the PPP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13030: Prevent buffer over-read in the PIM parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13031: Prevent buffer over-read in the IPv6 fragmentation header parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13032: Prevent buffer over-read in the RADIUS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13033: Prevent buffer over-read in the VTP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13034: Prevent buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13035: Prevent buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13036: Prevent buffer over-read in the OSPFv3 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13037: Prevent buffer over-read in the IP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13038: Prevent buffer over-read in the PPP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13039: Prevent buffer over-read in the ISAKMP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13040: Prevent buffer over-read in the MPTCP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13041: Prevent buffer over-read in the ICMPv6 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13042: Prevent buffer over-read in the HNCP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13043: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13044: Prevent buffer over-read in the HNCP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13045: Prevent buffer over-read in the VQP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13046: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13047: Prevent buffer over-read in the ISO ES-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13048: Prevent buffer over-read in the RSVP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13049: Prevent buffer over-read in the Rx protocol parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13050: Prevent buffer over-read in the RPKI-Router parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13051: Prevent buffer over-read in the RSVP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13052: Prevent buffer over-read in the CFM parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13053: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13054: Prevent buffer over-read in the LLDP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13055: Prevent buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13687: Prevent buffer over-read in the Cisco HDLC parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13688: Prevent buffer over-read in the OLSR parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13689: Prevent buffer over-read in the IKEv1 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13690: Prevent buffer over-read in the IKEv2 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13725: Prevent buffer over-read in the IPv6 routing header parser that allowed remote DoS (bsc#1057247)
- Prevent segmentation fault in ESP decoder with OpenSSL 1.1 (bsc#1057247)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-26"/>
	<updated date="2017-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047873">SUSE bug 1047873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11108/">CVE-2017-11108</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11541/">CVE-2017-11541</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11542/">CVE-2017-11542</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11543/">CVE-2017-11543</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12893/">CVE-2017-12893</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12894/">CVE-2017-12894</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12895/">CVE-2017-12895</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12896/">CVE-2017-12896</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12897/">CVE-2017-12897</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12898/">CVE-2017-12898</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12899/">CVE-2017-12899</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12900/">CVE-2017-12900</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12901/">CVE-2017-12901</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12902/">CVE-2017-12902</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12985/">CVE-2017-12985</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12986/">CVE-2017-12986</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12987/">CVE-2017-12987</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12988/">CVE-2017-12988</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12989/">CVE-2017-12989</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12990/">CVE-2017-12990</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12991/">CVE-2017-12991</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12992/">CVE-2017-12992</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12993/">CVE-2017-12993</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12994/">CVE-2017-12994</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12995/">CVE-2017-12995</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12996/">CVE-2017-12996</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12997/">CVE-2017-12997</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12998/">CVE-2017-12998</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12999/">CVE-2017-12999</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13000/">CVE-2017-13000</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13001/">CVE-2017-13001</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13002/">CVE-2017-13002</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13003/">CVE-2017-13003</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13004/">CVE-2017-13004</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13005/">CVE-2017-13005</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13006/">CVE-2017-13006</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13007/">CVE-2017-13007</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13008/">CVE-2017-13008</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13009/">CVE-2017-13009</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13010/">CVE-2017-13010</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13011/">CVE-2017-13011</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13012/">CVE-2017-13012</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13013/">CVE-2017-13013</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13014/">CVE-2017-13014</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13015/">CVE-2017-13015</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13016/">CVE-2017-13016</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13017/">CVE-2017-13017</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13018/">CVE-2017-13018</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13019/">CVE-2017-13019</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13020/">CVE-2017-13020</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13021/">CVE-2017-13021</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13022/">CVE-2017-13022</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13023/">CVE-2017-13023</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13024/">CVE-2017-13024</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13025/">CVE-2017-13025</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13026/">CVE-2017-13026</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13027/">CVE-2017-13027</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13028/">CVE-2017-13028</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13029/">CVE-2017-13029</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13030/">CVE-2017-13030</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13031/">CVE-2017-13031</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13032/">CVE-2017-13032</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13033/">CVE-2017-13033</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13034/">CVE-2017-13034</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13035/">CVE-2017-13035</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13036/">CVE-2017-13036</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13037/">CVE-2017-13037</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13038/">CVE-2017-13038</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13039/">CVE-2017-13039</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13040/">CVE-2017-13040</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13041/">CVE-2017-13041</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13042/">CVE-2017-13042</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13043/">CVE-2017-13043</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13044/">CVE-2017-13044</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13045/">CVE-2017-13045</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13046/">CVE-2017-13046</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13047/">CVE-2017-13047</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13048/">CVE-2017-13048</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13049/">CVE-2017-13049</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13050/">CVE-2017-13050</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13051/">CVE-2017-13051</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13052/">CVE-2017-13052</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13053/">CVE-2017-13053</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13054/">CVE-2017-13054</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13055/">CVE-2017-13055</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13687/">CVE-2017-13687</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13688/">CVE-2017-13688</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13689/">CVE-2017-13689</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13690/">CVE-2017-13690</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13725/">CVE-2017-13725</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77951" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1062645" ref_url="https://bugzilla.suse.com/1062645" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15191" ref_url="https://www.suse.com/security/cve/CVE-2017-15191/" source="CVE"/>
		<reference ref_id="CVE-2017-15192" ref_url="https://www.suse.com/security/cve/CVE-2017-15192/" source="CVE"/>
		<reference ref_id="CVE-2017-15193" ref_url="https://www.suse.com/security/cve/CVE-2017-15193/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003358.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Wireshark was updated to 2.2.10, fixing security issues and bugs:

* CVE-2017-15191: DMP dissector crash (wnpa-sec-2017-44)
* CVE-2017-15192: BT ATT dissector crash (wnpa-sec-2017-42)
* CVE-2017-15193: MBIM dissector crash (wnpa-sec-2017-43)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-26"/>
	<updated date="2017-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062645">SUSE bug 1062645</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15191/">CVE-2017-15191</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15192/">CVE-2017-15192</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15193/">CVE-2017-15193</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518239" comment="libwireshark8-2.2.10-48.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518240" comment="libwiretap6-2.2.10-48.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518241" comment="libwscodecs1-2.2.10-48.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518242" comment="libwsutil7-2.2.10-48.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518243" comment="wireshark-2.2.10-48.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518244" comment="wireshark-gtk-2.2.10-48.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77952" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1057358" ref_url="https://bugzilla.suse.com/1057358" source="BUGZILLA"/>
		<reference ref_id="1059777" ref_url="https://bugzilla.suse.com/1059777" source="BUGZILLA"/>
		<reference ref_id="1061076" ref_url="https://bugzilla.suse.com/1061076" source="BUGZILLA"/>
		<reference ref_id="1061077" ref_url="https://bugzilla.suse.com/1061077" source="BUGZILLA"/>
		<reference ref_id="1061080" ref_url="https://bugzilla.suse.com/1061080" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1061082" ref_url="https://bugzilla.suse.com/1061082" source="BUGZILLA"/>
		<reference ref_id="1061084" ref_url="https://bugzilla.suse.com/1061084" source="BUGZILLA"/>
		<reference ref_id="1061086" ref_url="https://bugzilla.suse.com/1061086" source="BUGZILLA"/>
		<reference ref_id="1061087" ref_url="https://bugzilla.suse.com/1061087" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15588" ref_url="https://www.suse.com/security/cve/CVE-2017-15588/" source="CVE"/>
		<reference ref_id="CVE-2017-15589" ref_url="https://www.suse.com/security/cve/CVE-2017-15589/" source="CVE"/>
		<reference ref_id="CVE-2017-15590" ref_url="https://www.suse.com/security/cve/CVE-2017-15590/" source="CVE"/>
		<reference ref_id="CVE-2017-15591" ref_url="https://www.suse.com/security/cve/CVE-2017-15591/" source="CVE"/>
		<reference ref_id="CVE-2017-15592" ref_url="https://www.suse.com/security/cve/CVE-2017-15592/" source="CVE"/>
		<reference ref_id="CVE-2017-15593" ref_url="https://www.suse.com/security/cve/CVE-2017-15593/" source="CVE"/>
		<reference ref_id="CVE-2017-15594" ref_url="https://www.suse.com/security/cve/CVE-2017-15594/" source="CVE"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-5526" ref_url="https://www.suse.com/security/cve/CVE-2017-5526/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2864-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00075.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues:

These security issues were fixed:

- CVE-2017-5526: The ES1370 audio device emulation support was vulnerable to a
  memory leakage issue allowing a privileged user inside the guest to cause a DoS
  and/or potentially crash the Qemu process on the host (bsc#1059777)
- CVE-2017-15593: Missing cleanup in the page type system allowed a malicious or
  buggy PV guest to cause DoS (XSA-242 bsc#1061084)
- CVE-2017-15592: A problem in the shadow pagetable code allowed a malicious or
  buggy HVM guest to cause DoS or cause hypervisor memory corruption potentially
  allowing the guest to escalate its privilege (XSA-243 bsc#1061086)
- CVE-2017-15594: Problematic handling of the selector fields in the Interrupt
  Descriptor Table (IDT) allowed a malicious or buggy x86 PV guest to escalate
  its privileges or cause DoS (XSA-244 bsc#1061087)
- CVE-2017-15591: Missing checks in the handling of DMOPs allowed malicious or
  buggy stub domain kernels or tool stacks otherwise living outside of Domain0 to
  cause a DoS (XSA-238 bsc#1061077)
- CVE-2017-15589: Intercepted I/O write operations with less than a full machine
  word's worth of data were not properly handled, which allowed a malicious
  unprivileged x86 HVM guest to obtain sensitive information from the host or
  other guests (XSA-239 bsc#1061080)
- CVE-2017-15595: In certain configurations of linear page tables a stack overflow
  might have occured that allowed a malicious or buggy PV guest to cause DoS and
  potentially privilege escalation and information leaks (XSA-240 bsc#1061081)
- CVE-2017-15588: Under certain conditions x86 PV guests could have caused the
  hypervisor to miss a necessary TLB flush for a page. This allowed a malicious
  x86 PV guest to access all of system memory, allowing for privilege escalation,
  DoS, and information leaks (XSA-241 bsc#1061082)
- CVE-2017-15590: Multiple issues existed with the setup of PCI MSI interrupts
  that allowed a malicious or buggy guest to cause DoS and potentially privilege
  escalation and information leaks (XSA-237 bsc#1061076)

This non-security issue was fixed:

- bsc#1057358: Fixed boot when secure boot is enabled
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-27"/>
	<updated date="2017-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057358">SUSE bug 1057358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059777">SUSE bug 1059777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061076">SUSE bug 1061076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061077">SUSE bug 1061077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061080">SUSE bug 1061080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061082">SUSE bug 1061082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061084">SUSE bug 1061084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061086">SUSE bug 1061086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061087">SUSE bug 1061087</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15588/">CVE-2017-15588</cve>
	<cve impact="moderate" cvss3="3.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15589/">CVE-2017-15589</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15590/">CVE-2017-15590</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15591/">CVE-2017-15591</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15592/">CVE-2017-15592</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15593/">CVE-2017-15593</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15594/">CVE-2017-15594</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5526/">CVE-2017-5526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518245" comment="xen-4.7.3_06-43.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518246" comment="xen-libs-4.7.3_06-43.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518247" comment="xen-libs-32bit-4.7.3_06-43.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77953" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1006180" ref_url="https://bugzilla.suse.com/1006180" source="BUGZILLA"/>
		<reference ref_id="1011913" ref_url="https://bugzilla.suse.com/1011913" source="BUGZILLA"/>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1012829" ref_url="https://bugzilla.suse.com/1012829" source="BUGZILLA"/>
		<reference ref_id="1013887" ref_url="https://bugzilla.suse.com/1013887" source="BUGZILLA"/>
		<reference ref_id="1019151" ref_url="https://bugzilla.suse.com/1019151" source="BUGZILLA"/>
		<reference ref_id="1020645" ref_url="https://bugzilla.suse.com/1020645" source="BUGZILLA"/>
		<reference ref_id="1020657" ref_url="https://bugzilla.suse.com/1020657" source="BUGZILLA"/>
		<reference ref_id="1021424" ref_url="https://bugzilla.suse.com/1021424" source="BUGZILLA"/>
		<reference ref_id="1022476" ref_url="https://bugzilla.suse.com/1022476" source="BUGZILLA"/>
		<reference ref_id="1022743" ref_url="https://bugzilla.suse.com/1022743" source="BUGZILLA"/>
		<reference ref_id="1022967" ref_url="https://bugzilla.suse.com/1022967" source="BUGZILLA"/>
		<reference ref_id="1023175" ref_url="https://bugzilla.suse.com/1023175" source="BUGZILLA"/>
		<reference ref_id="1024405" ref_url="https://bugzilla.suse.com/1024405" source="BUGZILLA"/>
		<reference ref_id="1028173" ref_url="https://bugzilla.suse.com/1028173" source="BUGZILLA"/>
		<reference ref_id="1028286" ref_url="https://bugzilla.suse.com/1028286" source="BUGZILLA"/>
		<reference ref_id="1029693" ref_url="https://bugzilla.suse.com/1029693" source="BUGZILLA"/>
		<reference ref_id="1030552" ref_url="https://bugzilla.suse.com/1030552" source="BUGZILLA"/>
		<reference ref_id="1030850" ref_url="https://bugzilla.suse.com/1030850" source="BUGZILLA"/>
		<reference ref_id="1031515" ref_url="https://bugzilla.suse.com/1031515" source="BUGZILLA"/>
		<reference ref_id="1031717" ref_url="https://bugzilla.suse.com/1031717" source="BUGZILLA"/>
		<reference ref_id="1031784" ref_url="https://bugzilla.suse.com/1031784" source="BUGZILLA"/>
		<reference ref_id="1033587" ref_url="https://bugzilla.suse.com/1033587" source="BUGZILLA"/>
		<reference ref_id="1034048" ref_url="https://bugzilla.suse.com/1034048" source="BUGZILLA"/>
		<reference ref_id="1034075" ref_url="https://bugzilla.suse.com/1034075" source="BUGZILLA"/>
		<reference ref_id="1034762" ref_url="https://bugzilla.suse.com/1034762" source="BUGZILLA"/>
		<reference ref_id="1036303" ref_url="https://bugzilla.suse.com/1036303" source="BUGZILLA"/>
		<reference ref_id="1036632" ref_url="https://bugzilla.suse.com/1036632" source="BUGZILLA"/>
		<reference ref_id="1037344" ref_url="https://bugzilla.suse.com/1037344" source="BUGZILLA"/>
		<reference ref_id="1037404" ref_url="https://bugzilla.suse.com/1037404" source="BUGZILLA"/>
		<reference ref_id="1037994" ref_url="https://bugzilla.suse.com/1037994" source="BUGZILLA"/>
		<reference ref_id="1038078" ref_url="https://bugzilla.suse.com/1038078" source="BUGZILLA"/>
		<reference ref_id="1038583" ref_url="https://bugzilla.suse.com/1038583" source="BUGZILLA"/>
		<reference ref_id="1038616" ref_url="https://bugzilla.suse.com/1038616" source="BUGZILLA"/>
		<reference ref_id="1038792" ref_url="https://bugzilla.suse.com/1038792" source="BUGZILLA"/>
		<reference ref_id="1039915" ref_url="https://bugzilla.suse.com/1039915" source="BUGZILLA"/>
		<reference ref_id="1040307" ref_url="https://bugzilla.suse.com/1040307" source="BUGZILLA"/>
		<reference ref_id="1040351" ref_url="https://bugzilla.suse.com/1040351" source="BUGZILLA"/>
		<reference ref_id="1041958" ref_url="https://bugzilla.suse.com/1041958" source="BUGZILLA"/>
		<reference ref_id="1042286" ref_url="https://bugzilla.suse.com/1042286" source="BUGZILLA"/>
		<reference ref_id="1042314" ref_url="https://bugzilla.suse.com/1042314" source="BUGZILLA"/>
		<reference ref_id="1042422" ref_url="https://bugzilla.suse.com/1042422" source="BUGZILLA"/>
		<reference ref_id="1042778" ref_url="https://bugzilla.suse.com/1042778" source="BUGZILLA"/>
		<reference ref_id="1043652" ref_url="https://bugzilla.suse.com/1043652" source="BUGZILLA"/>
		<reference ref_id="1044112" ref_url="https://bugzilla.suse.com/1044112" source="BUGZILLA"/>
		<reference ref_id="1044636" ref_url="https://bugzilla.suse.com/1044636" source="BUGZILLA"/>
		<reference ref_id="1045154" ref_url="https://bugzilla.suse.com/1045154" source="BUGZILLA"/>
		<reference ref_id="1045563" ref_url="https://bugzilla.suse.com/1045563" source="BUGZILLA"/>
		<reference ref_id="1045922" ref_url="https://bugzilla.suse.com/1045922" source="BUGZILLA"/>
		<reference ref_id="1046682" ref_url="https://bugzilla.suse.com/1046682" source="BUGZILLA"/>
		<reference ref_id="1046821" ref_url="https://bugzilla.suse.com/1046821" source="BUGZILLA"/>
		<reference ref_id="1046985" ref_url="https://bugzilla.suse.com/1046985" source="BUGZILLA"/>
		<reference ref_id="1047027" ref_url="https://bugzilla.suse.com/1047027" source="BUGZILLA"/>
		<reference ref_id="1047048" ref_url="https://bugzilla.suse.com/1047048" source="BUGZILLA"/>
		<reference ref_id="1047096" ref_url="https://bugzilla.suse.com/1047096" source="BUGZILLA"/>
		<reference ref_id="1047118" ref_url="https://bugzilla.suse.com/1047118" source="BUGZILLA"/>
		<reference ref_id="1047121" ref_url="https://bugzilla.suse.com/1047121" source="BUGZILLA"/>
		<reference ref_id="1047152" ref_url="https://bugzilla.suse.com/1047152" source="BUGZILLA"/>
		<reference ref_id="1047277" ref_url="https://bugzilla.suse.com/1047277" source="BUGZILLA"/>
		<reference ref_id="1047343" ref_url="https://bugzilla.suse.com/1047343" source="BUGZILLA"/>
		<reference ref_id="1047354" ref_url="https://bugzilla.suse.com/1047354" source="BUGZILLA"/>
		<reference ref_id="1047487" ref_url="https://bugzilla.suse.com/1047487" source="BUGZILLA"/>
		<reference ref_id="1047651" ref_url="https://bugzilla.suse.com/1047651" source="BUGZILLA"/>
		<reference ref_id="1047653" ref_url="https://bugzilla.suse.com/1047653" source="BUGZILLA"/>
		<reference ref_id="1047670" ref_url="https://bugzilla.suse.com/1047670" source="BUGZILLA"/>
		<reference ref_id="1048155" ref_url="https://bugzilla.suse.com/1048155" source="BUGZILLA"/>
		<reference ref_id="1048221" ref_url="https://bugzilla.suse.com/1048221" source="BUGZILLA"/>
		<reference ref_id="1048317" ref_url="https://bugzilla.suse.com/1048317" source="BUGZILLA"/>
		<reference ref_id="1048891" ref_url="https://bugzilla.suse.com/1048891" source="BUGZILLA"/>
		<reference ref_id="1048893" ref_url="https://bugzilla.suse.com/1048893" source="BUGZILLA"/>
		<reference ref_id="1048914" ref_url="https://bugzilla.suse.com/1048914" source="BUGZILLA"/>
		<reference ref_id="1048934" ref_url="https://bugzilla.suse.com/1048934" source="BUGZILLA"/>
		<reference ref_id="1049226" ref_url="https://bugzilla.suse.com/1049226" source="BUGZILLA"/>
		<reference ref_id="1049483" ref_url="https://bugzilla.suse.com/1049483" source="BUGZILLA"/>
		<reference ref_id="1049486" ref_url="https://bugzilla.suse.com/1049486" source="BUGZILLA"/>
		<reference ref_id="1049580" ref_url="https://bugzilla.suse.com/1049580" source="BUGZILLA"/>
		<reference ref_id="1049603" ref_url="https://bugzilla.suse.com/1049603" source="BUGZILLA"/>
		<reference ref_id="1049645" ref_url="https://bugzilla.suse.com/1049645" source="BUGZILLA"/>
		<reference ref_id="1049882" ref_url="https://bugzilla.suse.com/1049882" source="BUGZILLA"/>
		<reference ref_id="1050061" ref_url="https://bugzilla.suse.com/1050061" source="BUGZILLA"/>
		<reference ref_id="1050188" ref_url="https://bugzilla.suse.com/1050188" source="BUGZILLA"/>
		<reference ref_id="1051022" ref_url="https://bugzilla.suse.com/1051022" source="BUGZILLA"/>
		<reference ref_id="1051059" ref_url="https://bugzilla.suse.com/1051059" source="BUGZILLA"/>
		<reference ref_id="1051239" ref_url="https://bugzilla.suse.com/1051239" source="BUGZILLA"/>
		<reference ref_id="1051399" ref_url="https://bugzilla.suse.com/1051399" source="BUGZILLA"/>
		<reference ref_id="1051478" ref_url="https://bugzilla.suse.com/1051478" source="BUGZILLA"/>
		<reference ref_id="1051479" ref_url="https://bugzilla.suse.com/1051479" source="BUGZILLA"/>
		<reference ref_id="1051556" ref_url="https://bugzilla.suse.com/1051556" source="BUGZILLA"/>
		<reference ref_id="1051663" ref_url="https://bugzilla.suse.com/1051663" source="BUGZILLA"/>
		<reference ref_id="1051790" ref_url="https://bugzilla.suse.com/1051790" source="BUGZILLA"/>
		<reference ref_id="1052049" ref_url="https://bugzilla.suse.com/1052049" source="BUGZILLA"/>
		<reference ref_id="1052223" ref_url="https://bugzilla.suse.com/1052223" source="BUGZILLA"/>
		<reference ref_id="1052533" ref_url="https://bugzilla.suse.com/1052533" source="BUGZILLA"/>
		<reference ref_id="1052580" ref_url="https://bugzilla.suse.com/1052580" source="BUGZILLA"/>
		<reference ref_id="1052593" ref_url="https://bugzilla.suse.com/1052593" source="BUGZILLA"/>
		<reference ref_id="1052709" ref_url="https://bugzilla.suse.com/1052709" source="BUGZILLA"/>
		<reference ref_id="1052773" ref_url="https://bugzilla.suse.com/1052773" source="BUGZILLA"/>
		<reference ref_id="1052794" ref_url="https://bugzilla.suse.com/1052794" source="BUGZILLA"/>
		<reference ref_id="1052888" ref_url="https://bugzilla.suse.com/1052888" source="BUGZILLA"/>
		<reference ref_id="1053117" ref_url="https://bugzilla.suse.com/1053117" source="BUGZILLA"/>
		<reference ref_id="1053802" ref_url="https://bugzilla.suse.com/1053802" source="BUGZILLA"/>
		<reference ref_id="1053915" ref_url="https://bugzilla.suse.com/1053915" source="BUGZILLA"/>
		<reference ref_id="1053919" ref_url="https://bugzilla.suse.com/1053919" source="BUGZILLA"/>
		<reference ref_id="1054084" ref_url="https://bugzilla.suse.com/1054084" source="BUGZILLA"/>
		<reference ref_id="1055013" ref_url="https://bugzilla.suse.com/1055013" source="BUGZILLA"/>
		<reference ref_id="1055096" ref_url="https://bugzilla.suse.com/1055096" source="BUGZILLA"/>
		<reference ref_id="1055359" ref_url="https://bugzilla.suse.com/1055359" source="BUGZILLA"/>
		<reference ref_id="1055493" ref_url="https://bugzilla.suse.com/1055493" source="BUGZILLA"/>
		<reference ref_id="1055755" ref_url="https://bugzilla.suse.com/1055755" source="BUGZILLA"/>
		<reference ref_id="1055896" ref_url="https://bugzilla.suse.com/1055896" source="BUGZILLA"/>
		<reference ref_id="1056261" ref_url="https://bugzilla.suse.com/1056261" source="BUGZILLA"/>
		<reference ref_id="1056588" ref_url="https://bugzilla.suse.com/1056588" source="BUGZILLA"/>
		<reference ref_id="1056827" ref_url="https://bugzilla.suse.com/1056827" source="BUGZILLA"/>
		<reference ref_id="1056982" ref_url="https://bugzilla.suse.com/1056982" source="BUGZILLA"/>
		<reference ref_id="1057015" ref_url="https://bugzilla.suse.com/1057015" source="BUGZILLA"/>
		<reference ref_id="1058038" ref_url="https://bugzilla.suse.com/1058038" source="BUGZILLA"/>
		<reference ref_id="1058116" ref_url="https://bugzilla.suse.com/1058116" source="BUGZILLA"/>
		<reference ref_id="1058410" ref_url="https://bugzilla.suse.com/1058410" source="BUGZILLA"/>
		<reference ref_id="1058507" ref_url="https://bugzilla.suse.com/1058507" source="BUGZILLA"/>
		<reference ref_id="1059051" ref_url="https://bugzilla.suse.com/1059051" source="BUGZILLA"/>
		<reference ref_id="1059465" ref_url="https://bugzilla.suse.com/1059465" source="BUGZILLA"/>
		<reference ref_id="1060197" ref_url="https://bugzilla.suse.com/1060197" source="BUGZILLA"/>
		<reference ref_id="1061017" ref_url="https://bugzilla.suse.com/1061017" source="BUGZILLA"/>
		<reference ref_id="1061046" ref_url="https://bugzilla.suse.com/1061046" source="BUGZILLA"/>
		<reference ref_id="1061064" ref_url="https://bugzilla.suse.com/1061064" source="BUGZILLA"/>
		<reference ref_id="1061067" ref_url="https://bugzilla.suse.com/1061067" source="BUGZILLA"/>
		<reference ref_id="1061172" ref_url="https://bugzilla.suse.com/1061172" source="BUGZILLA"/>
		<reference ref_id="1061831" ref_url="https://bugzilla.suse.com/1061831" source="BUGZILLA"/>
		<reference ref_id="1061872" ref_url="https://bugzilla.suse.com/1061872" source="BUGZILLA"/>
		<reference ref_id="1063667" ref_url="https://bugzilla.suse.com/1063667" source="BUGZILLA"/>
		<reference ref_id="1064206" ref_url="https://bugzilla.suse.com/1064206" source="BUGZILLA"/>
		<reference ref_id="1064388" ref_url="https://bugzilla.suse.com/1064388" source="BUGZILLA"/>
		<reference ref_id="964063" ref_url="https://bugzilla.suse.com/964063" source="BUGZILLA"/>
		<reference ref_id="971975" ref_url="https://bugzilla.suse.com/971975" source="BUGZILLA"/>
		<reference ref_id="974215" ref_url="https://bugzilla.suse.com/974215" source="BUGZILLA"/>
		<reference ref_id="981309" ref_url="https://bugzilla.suse.com/981309" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000252" ref_url="https://www.suse.com/security/cve/CVE-2017-1000252/" source="CVE"/>
		<reference ref_id="CVE-2017-10810" ref_url="https://www.suse.com/security/cve/CVE-2017-10810/" source="CVE"/>
		<reference ref_id="CVE-2017-11472" ref_url="https://www.suse.com/security/cve/CVE-2017-11472/" source="CVE"/>
		<reference ref_id="CVE-2017-11473" ref_url="https://www.suse.com/security/cve/CVE-2017-11473/" source="CVE"/>
		<reference ref_id="CVE-2017-12134" ref_url="https://www.suse.com/security/cve/CVE-2017-12134/" source="CVE"/>
		<reference ref_id="CVE-2017-12153" ref_url="https://www.suse.com/security/cve/CVE-2017-12153/" source="CVE"/>
		<reference ref_id="CVE-2017-12154" ref_url="https://www.suse.com/security/cve/CVE-2017-12154/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-14051" ref_url="https://www.suse.com/security/cve/CVE-2017-14051/" source="CVE"/>
		<reference ref_id="CVE-2017-14106" ref_url="https://www.suse.com/security/cve/CVE-2017-14106/" source="CVE"/>
		<reference ref_id="CVE-2017-14489" ref_url="https://www.suse.com/security/cve/CVE-2017-14489/" source="CVE"/>
		<reference ref_id="CVE-2017-15649" ref_url="https://www.suse.com/security/cve/CVE-2017-15649/" source="CVE"/>
		<reference ref_id="CVE-2017-7518" ref_url="https://www.suse.com/security/cve/CVE-2017-7518/" source="CVE"/>
		<reference ref_id="CVE-2017-7541" ref_url="https://www.suse.com/security/cve/CVE-2017-7541/" source="CVE"/>
		<reference ref_id="CVE-2017-7542" ref_url="https://www.suse.com/security/cve/CVE-2017-7542/" source="CVE"/>
		<reference ref_id="CVE-2017-8831" ref_url="https://www.suse.com/security/cve/CVE-2017-8831/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 kernel was updated to 4.4.90 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-1000252: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (assertion failure, and hypervisor hang or crash) via an out-of bounds guest_irq value, related to arch/x86/kvm/vmx.c and virt/kvm/eventfd.c (bnc#1058038).
- CVE-2017-10810: Memory leak in the virtio_gpu_object_create function in drivers/gpu/drm/virtio/virtgpu_object.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering object-initialization failures (bnc#1047277).
- CVE-2017-11472: The acpi_ns_terminate() function in drivers/acpi/acpica/nsutils.c in the Linux kernel did not flush the operand cache and causes a kernel stack dump, which allowed local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table (bnc#1049580).
- CVE-2017-11473: Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel allowed local users to gain privileges via a crafted ACPI table (bnc#1049603).
- CVE-2017-12134: The xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in Xen might allow local OS guest users to corrupt block device data streams and consequently obtain sensitive memory information, cause a denial of service, or gain host OS privileges by leveraging incorrect block IO merge-ability calculation (bnc#1051790 bnc#1053919).
- CVE-2017-12153: A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel This function did not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash (bnc#1058410).
- CVE-2017-12154: The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the Linux kernel did not ensure that the 'CR8-load exiting' and 'CR8-store exiting' L0 vmcs02 controls exist in cases where L1 omits the 'use TPR shadow' vmcs12 control, which allowed KVM L2 guest OS users to obtain read and write access to the hardware CR8 register (bnc#1058507).
- CVE-2017-13080: Wi-Fi Protected Access (WPA and WPA2) allowed reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients (bnc#1063667).
- CVE-2017-14051: An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash) by leveraging root access (bnc#1056588).
- CVE-2017-14106: The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel allowed local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path (bnc#1056982).
- CVE-2017-14489: The iscsi_if_rx function in drivers/scsi/scsi_transport_iscsi.c in the Linux kernel allowed local users to cause a denial of service (panic) by leveraging incorrect length validation (bnc#1059051).
- CVE-2017-15649: net/packet/af_packet.c in the Linux kernel allowed local users to gain privileges via crafted system calls that trigger mishandling of packet_fanout data structures, because of a race condition (involving fanout_add and packet_do_bind) that leads to a use-after-free, a different vulnerability than CVE-2017-6346 (bnc#1064388).
- CVE-2017-7518: The Linux kernel was vulnerable to an incorrect debug exception(#DB) error. It could occur while emulating a syscall instruction and potentially lead to guest privilege escalation. (bsc#1045922).
- CVE-2017-7541: The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel allowed local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet (bnc#1049645).
- CVE-2017-7542: The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel allowed local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket (bnc#1049882).
- CVE-2017-8831: The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a 'double fetch' vulnerability (bnc#1037994).

The following non-security bugs were fixed:

- acpi / processor: Avoid reserving IO regions too early (bsc#1051478).
- acpi / scan: Prefer devices without _HID for _ADR matching (git-fixes).
- af_key: Add lock to key dump (bsc#1047653).
- af_key: Fix slab-out-of-bounds in pfkey_compile_policy (bsc#1047354).
- alsa: fm801: Initialize chip after IRQ handler is registered (bsc#1031717).
- alsa: hda - Add stereo mic quirk for Lenovo G50-70 (17aa:3978) (bsc#1020657).
- alsa: hda - Fix endless loop of codec configure (bsc#1031717).
- alsa: hda - Implement mic-mute LED mode enum (bsc#1055013).
- alsa: hda/realtek - Add support headphone Mic for ALC221 of HP platform (bsc#1024405).
- alsa: hda - set input_path bitmap to zero after moving it to new place (bsc#1031717).
- alsa: ice1712: Add support for STAudio ADCIII (bsc#1048934).
- alsa: usb-audio: Apply sample rate quirk to Sennheiser headset (bsc#1052580).
- arc: Re-enable MMU upon Machine Check exception (bnc#1012382).
- arm64: fault: Route pte translation faults via do_translation_fault (bnc#1012382).
- arm64: Make sure SPsel is always set (bnc#1012382).
- arm: pxa: add the number of DMA requestor lines (bnc#1012382).
- arm: pxa: fix the number of DMA requestor lines (bnc#1012382).
- b43: Add missing MODULE_FIRMWARE() (bsc#1037344).
- bcache: correct cache_dirty_target in __update_writeback_rate() (bnc#1012382).
- bcache: Correct return value for sysfs attach errors (bnc#1012382).
- bcache: do not subtract sectors_to_gc for bypassed IO (bnc#1012382).
- bcache: fix bch_hprint crash and improve output (bnc#1012382).
- bcache: fix for gc and write-back race (bnc#1012382).
- bcache: Fix leak of bdev reference (bnc#1012382).
- bcache: force trigger gc (bsc#1038078).
- bcache: initialize dirty stripes in flash_dev_run() (bnc#1012382).
- bcache: only recovery I/O error for writethrough mode (bsc#1043652).
- bdi: Fix use-after-free in wb_congested_put() (bsc#1040307).
- blacklist 2400fd822f46 powerpc/asm: Mark cr0 as clobbered in mftb()
- blacklist.conf: 9eeacd3a2f17 not a bug fix (bnc#1050061)
- blacklist.conf: add unapplicable/cosmetic iwlwifi fixes (bsc#1031717).
- blacklist.conf: add unapplicable drm fixes (bsc#1031717).
- blacklist.conf: Blacklist 4e201566402c ('genirq/msi: Drop artificial PCI dependency') (bsc#1051478) This commit just removes an include and does not fix a real issue.
- blacklist.conf: Blacklist aa2369f11ff7 ('mm/gup.c: fix access_ok() argument type') (bsc#1051478) Fixes only a compile-warning.
- blacklist.conf: Blacklist c133c7615751 ('x86/nmi: Fix timeout test in test_nmi_ipi()') It only fixes a self-test (bsc#1051478).
- blacklist.conf: Blacklist c9525a3fab63 ('x86/watchdog: Fix Kconfig help text file path reference to lockup watchdog documentation') Updates only kconfig help-text (bsc#1051478).
- blacklist.conf: Blacklist e80e7edc55ba ('PCI/MSI: Initialize MSI capability for all architectures') This only fixes machines not supported by our kernels.
- blkfront: add uevent for size change (bnc#1036632).
- block: Allow bdi re-registration (bsc#1040307).
- block: do not allow updates through sysfs until registration completes (bsc#1047027).
- block: Fix front merge check (bsc#1051239).
- block: Make del_gendisk() safer for disks without queues (bsc#1040307).
- block: Move bdi_unregister() to del_gendisk() (bsc#1040307).
- block: Relax a check in blk_start_queue() (bnc#1012382).
- bluetooth: bnep: fix possible might sleep error in bnep_session (bsc#1031784).
- bluetooth: cmtp: fix possible might sleep error in cmtp_session (bsc#1031784).
- bluetooth: hidp: fix possible might sleep error in hidp_session_thread (bsc#1031784).
- bnxt: add a missing rcu synchronization (bnc#1038583).
- bnxt: do not busy-poll when link is down (bnc#1038583).
- bnxt_en: Enable MRU enables bit when configuring VNIC MRU (bnc#1038583).
- bnxt_en: Fix and clarify link_info-&gt;advertising (bnc#1038583).
- bnxt_en: Fix a VXLAN vs GENEVE issue (bnc#1038583).
- bnxt_en: Fix NULL pointer dereference in a failure path during open (bnc#1038583).
- bnxt_en: Fix NULL pointer dereference in reopen failure path (bnc#1038583).
- bnxt_en: fix pci cleanup in bnxt_init_one() failure path (bnc#1038583).
- bnxt_en: Fix ring arithmetic in bnxt_setup_tc() (bnc#1038583).
- bnxt_en: Fix TX push operation on ARM64 (bnc#1038583).
- bnxt_en: Fix 'uninitialized variable' bug in TPA code path (bnc#1038583).
- bnxt_en: Fix VF virtual link state (bnc#1038583).
- bnxt_en: initialize rc to zero to avoid returning garbage (bnc#1038583).
- bnxt_en: Pad TX packets below 52 bytes (bnc#1038583).
- bnxt_en: Refactor TPA code path (bnc#1038583).
- brcmfmac: Fix glom_skb leak in brcmf_sdiod_recv_chain (bsc#1031717).
- bsg-lib: do not free job in bsg_prepare_job (bnc#1012382).
- btrfs: add cond_resched to btrfs_qgroup_trace_leaf_items (bsc#1028286).
- btrfs: Add WARN_ON for qgroup reserved underflow (bsc#1031515).
- btrfs: change how we decide to commit transactions during flushing (bsc#1060197).
- btrfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- btrfs: fix early ENOSPC due to delalloc (bsc#1049226).
- btrfs: fix lockup in find_free_extent with read-only block groups (bsc#1046682).
- btrfs: fix NULL pointer dereference from free_reloc_roots() (bnc#1012382).
- btrfs: incremental send, fix invalid path for link commands (bsc#1051479).
- btrfs: incremental send, fix invalid path for unlink commands (bsc#1051479).
- btrfs: prevent to set invalid default subvolid (bnc#1012382).
- btrfs: propagate error to btrfs_cmp_data_prepare caller (bnc#1012382).
- btrfs: qgroup: move noisy underflow warning to debugging build (bsc#1055755).
- btrfs: resume qgroup rescan on rw remount (bsc#1047152).
- btrfs: send, fix invalid path after renaming and linking file (bsc#1051479).
- ceph: fix readpage from fscache (bsc#1057015).
- cifs: Fix SMB3.1.1 guest authentication to Samba (bnc#1012382).
- cifs: release auth_key.response for reconnect (bnc#1012382).
- class: Add 'shutdown' to 'struct class' (bsc#1053117).
- cpuidle: dt: Add missing 'of_node_put()' (bnc#1022476).
- crypto: AF_ALG - remove SGL terminator indicator when chaining (bnc#1012382).
- crypto: s5p-sss - fix incorrect usage of scatterlists api (bsc#1048317).
- crypto: talitos - Do not provide setkey for non hmac hashing algs (bnc#1012382).
- crypto: talitos - fix sha224 (bnc#1012382).
- cx82310_eth: use skb_cow_head() to deal with cloned skbs (bsc# 1045154).
- cxgb4: Fix stack out-of-bounds read due to wrong size to t4_record_mbox() (bsc#1021424 bsc#1022743).
- cxl: Fix driver use count (bnc#1012382).
- cxl: Unlock on error in probe (bsc#1034762, Pending SUSE Kernel Fixes).
- dentry name snapshots (bsc#1049483).
- dmaengine: mmp-pdma: add number of requestors (bnc#1012382).
- dm: fix second blk_delay_queue() parameter to be in msec units not (bsc#1047670).
- drivers: hv: Fix the bug in generating the guest ID (fate#320485).
- drivers: hv: util: Fix a typo (fate#320485).
- drivers: hv: vmbus: Get the current time from the current clocksource (fate#320485, bnc#1044112, bnc#1042778, bnc#1029693).
- drivers: hv: vmbus: Increase the time between retries in vmbus_post_msg() (fate#320485, bnc#1044112).
- drivers: hv: vmbus: Move the code to signal end of message (fate#320485).
- drivers: hv: vmbus: Move the definition of generate_guest_id() (fate#320485).
- drivers: hv: vmbus: Move the definition of hv_x64_msr_hypercall_contents (fate#320485).
- drivers: hv: vmbus: Restructure the clockevents code (fate#320485).
- drivers: net: xgene: Fix wrong logical operation (bsc#1056827).
- drm: Add driver-private objects to atomic state (bsc#1055493).
- drm/amdgpu: Fix overflow of watermark calcs at &gt; 4k resolutions (bsc#1031717).
- drm/bochs: Implement nomodeset (bsc#1047096).
- drm/dp: Introduce MST topology state to track available link bandwidth (bsc#1055493).
- drm/i915/fbdev: Stop repeating tile configuration on stagnation (bsc#1031717).
- drm/i915: Fix scaler init during CRTC HW state readout (bsc#1031717).
- drm/i915: Serialize GTT/Aperture accesses on BXT (bsc#1046821).
- drm/virtio: do not leak bo on drm_gem_object_init failure (bsc#1047277).
- drm/vmwgfx: Fix large topology crash (bsc#1048155).
- drm/vmwgfx: Limit max desktop dimensions to 8Kx8K (bsc#1048155).
- drm/vmwgfx: Support topology greater than texture size (bsc#1048155).
- efi/libstub: Skip GOP with PIXEL_BLT_ONLY format (bnc#974215).
- ext2: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ext4: avoid unnecessary stalls in ext4_evict_inode() (bsc#1049486).
- ext4: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ext4: fix incorrect quotaoff if the quota feature is enabled (bnc#1012382).
- ext4: fix quota inconsistency during orphan cleanup for read-only mounts (bnc#1012382).
- ext4: handle the rest of ext4_mb_load_buddy() ENOMEM errors (bsc#1012829).
- f2fs: check hot_data for roll-forward recovery (bnc#1012382).
- fix xen_swiotlb_dma_mmap prototype (bnc#1012382).
- fs/fcntl: f_setown, avoid undefined behaviour (bnc#1006180).
- ftrace: Fix memleak when unregistering dynamic ops when tracing disabled (bnc#1012382).
- ftrace: Fix selftest goto location on error (bnc#1012382).
- fuse: initialize the flock flag in fuse_file on allocation (git-fixes).
- gcov: add support for gcc version &gt;= 6 (bsc#1051663).
- gcov: support GCC 7.1 (bsc#1051663).
- genirq: Fix for_each_action_of_desc() macro (bsc#1061064).
- getcwd: Close race with d_move called by lustre (bsc#1052593).
- gfs2: Do not clear SGID when inheriting ACLs (bsc#1012829).
- gfs2: Fix debugfs glocks dump (bnc#1012382).
- gfs2: fix flock panic issue (bsc#1012829).
- gianfar: Fix Tx flow control deactivation (bnc#1012382).
- hid: usbhid: Add HID_QUIRK_NOGET for Aten CS-1758 KVM switch (bnc#1022967).
- hrtimer: Catch invalid clockids again (bsc#1047651).
- hrtimer: Revert CLOCK_MONOTONIC_RAW support (bsc#1047651).
- hv_utils: drop .getcrosststamp() support from PTP driver (fate#320485, bnc#1044112, bnc#1042778, bnc#1029693).
- hv_utils: fix TimeSync work on pre-TimeSync-v4 hosts (fate#320485, bnc#1044112, bnc#1042778, bnc#1029693).
- hv_util: switch to using timespec64 (fate#320485).
- i2c: designware-baytrail: fix potential null pointer dereference on dev (bsc#1011913).
- i40e: add hw struct local variable (bsc#1039915).
- i40e: add private flag to control source pruning (bsc#1034075).
- i40e: add VSI info to macaddr messages (bsc#1039915).
- i40e: avoid looping to check whether we're in VLAN mode (bsc#1039915).
- i40e: avoid O(n^2) loop when deleting all filters (bsc#1039915).
- i40e: delete filter after adding its replacement when converting (bsc#1039915).
- i40e: do not add broadcast filter for VFs (bsc#1039915).
- i40e: do not allow i40e_vsi_(add|kill)_vlan to operate when VID&lt;1 (bsc#1039915).
- i40e: drop is_vf and is_netdev fields in struct i40e_mac_filter (bsc#1039915).
- i40e: enable VSI broadcast promiscuous mode instead of adding broadcast filter (bsc#1039915).
- i40e: factor out addition/deletion of VLAN per each MAC address (bsc#1039915).
- i40e: fix MAC filters when removing VLANs (bsc#1039915).
- i40e: fold the i40e_is_vsi_in_vlan check into i40e_put_mac_in_vlan (bsc#1039915).
- i40e: implement __i40e_del_filter and use where applicable (bsc#1039915).
- i40e: make use of __dev_uc_sync and __dev_mc_sync (bsc#1039915).
- i40e: move all updates for VLAN mode into i40e_sync_vsi_filters (bsc#1039915).
- i40e: move i40e_put_mac_in_vlan and i40e_del_mac_all_vlan (bsc#1039915).
- i40e: no need to check is_vsi_in_vlan before calling i40e_del_mac_all_vlan (bsc#1039915).
- i40e: properly cleanup on allocation failure in i40e_sync_vsi_filters (bsc#1039915).
- i40e: recalculate vsi-&gt;active_filters from hash contents (bsc#1039915).
- i40e: refactor i40e_put_mac_in_vlan to avoid changing f-&gt;vlan (bsc#1039915).
- i40e: refactor i40e_update_filter_state to avoid passing aq_err (bsc#1039915).
- i40e: refactor Rx filter handling (bsc#1039915).
- i40e: Removal of workaround for simple MAC address filter deletion (bsc#1039915).
- i40e: remove code to handle dev_addr specially (bsc#1039915).
- i40e: removed unreachable code (bsc#1039915).
- i40e: remove duplicate add/delete adminq command code for filters (bsc#1039915).
- i40e: remove second check of VLAN_N_VID in i40e_vlan_rx_add_vid (bsc#1039915).
- i40e: rename i40e_put_mac_in_vlan and i40e_del_mac_all_vlan (bsc#1039915).
- i40e: restore workaround for removing default MAC filter (bsc#1039915).
- i40e: set broadcast promiscuous mode for each active VLAN (bsc#1039915).
- i40e: store MAC/VLAN filters in a hash with the MAC Address as key (bsc#1039915).
- i40e: use (add|rm)_vlan_all_mac helper functions when changing PVID (bsc#1039915).
- i40e: when adding or removing MAC filters, correctly handle VLANs (bsc#1039915).
- i40e: When searching all MAC/VLAN filters, ignore removed filters (bsc#1039915).
- i40e: write HENA for VFs (bsc#1039915).
- ib/hfi1: Wait for QSFP modules to initialize (bsc#1019151).
- ibmvnic: Check for transport event on driver resume (bsc#1051556, bsc#1052709).
- ibmvnic: Clean up resources on probe failure (fate#323285, bsc#1058116).
- ibmvnic: Initialize SCRQ's during login renegotiation (bsc#1052223).
- ibmvnic: Report rx buffer return codes as netdev_dbg (bsc#1052794).
- iio: hid-sensor: fix return of -EINVAL on invalid values in ret or value (bsc#1031717).
- input: gpio-keys - fix check for disabling unsupported keys (bsc#1031717).
- input: i8042 - add Gigabyte P57 to the keyboard reset table (bnc#1012382).
- introduce the walk_process_tree() helper (bnc#1022476).
- iommu/amd: Fix schedule-while-atomic BUG in initialization code (bsc1052533).
- iommu/vt-d: Avoid calling virt_to_phys() on null pointer (bsc#1061067).
- ipv4: Should use consistent conditional judgement for ip fragment in __ip_append_data and ip_finish_output (bsc#1041958).
- ipv6: accept 64k - 1 packet length in ip6_find_1stfragopt() (bnc#1012382).
- ipv6: add rcu grace period before freeing fib6_node (bnc#1012382).
- ipv6: fix memory leak with multiple tables during netns destruction (bnc#1012382).
- ipv6: fix sparse warning on rt6i_node (bnc#1012382).
- ipv6: fix typo in fib6_net_exit() (bnc#1012382).
- ipv6: Should use consistent conditional judgement for ip6 fragment between __ip6_append_data and ip6_finish_output (bsc#1041958).
- iwlwifi: missing error code in iwl_trans_pcie_alloc() (bsc#1031717).
- iwlwifi: mvm: compare full command ID (FATE#321353, FATE#323335).
- iwlwifi: mvm: do not send CTDP commands via debugfs if not supported (bsc#1031717).
- iwlwifi: mvm: reset the fw_dump_desc pointer after ASSERT (bsc#1031717).
- iwlwifi: mvm: synchronize firmware DMA paging memory (FATE#321353, FATE#323335).
- iwlwifi: mvm: unconditionally stop device after init (bsc#1031717).
- iwlwifi: mvm: unmap the paging memory before freeing it (FATE#321353, FATE#323335).
- iwlwifi: pcie: fix command completion name debug (bsc#1031717).
- kABI-fix for 'x86/panic: replace smp_send_stop() with kdump friendly version in panic path' (bsc#1051478).
- kABI: protect enum pid_type (kabi).
- kABI: protect lwtunnel include in ip6_route.h (kabi).
- kABI: protect struct iscsi_np (kabi).
- kABI: protect struct iscsi_tpg_attrib (kabi).
- kABI: protect struct se_lun (kabi).
- kABI: protect struct tpm_chip (kabi).
- kABI: protect struct xfrm_dst (kabi).
- kABI: protect struct xfrm_dst (kabi).
- kabi/severities: ignore nfs_pgio_data_destroy
- kABI: uninline task_tgid_nr_nr (kabi).
- kernel/*: switch to memdup_user_nul() (bsc#1048893).
- keys: fix writing past end of user-supplied buffer in keyring_read() (bnc#1012382).
- keys: prevent creating a different user's keyrings (bnc#1012382).
- keys: prevent KEYCTL_READ on negative key (bnc#1012382).
- kvm: async_pf: Fix #DF due to inject 'Page not Present' and 'Page Ready' exceptions simultaneously (bsc#1061017).
- kvm: nVMX: fix msr bitmaps to prevent L2 from accessing L0 x2APIC (bsc#1051478).
- kvm: nVMX: Fix nested_vmx_check_msr_bitmap_controls (bsc#1051478).
- kvm: nVMX: Fix nested VPID vmx exec control (bsc#1051478).
- kvm: PPC: Book3S: Fix race and leak in kvm_vm_ioctl_create_spapr_tce() (bnc#1012382).
- kvm: SVM: Add a missing 'break' statement (bsc#1061017).
- kvm: VMX: do not change SN bit in vmx_update_pi_irte() (bsc#1061017).
- kvm: VMX: remove WARN_ON_ONCE in kvm_vcpu_trigger_posted_interrupt (bsc#1061017).
- kvm: VMX: use cmpxchg64 (bnc#1012382).
- kvm: x86: avoid simultaneous queueing of both IRQ and SMI (bsc#1051478).
- libnvdimm: fix badblock range handling of ARS range (bsc#1023175).
- libnvdimm, pmem: fix a NULL pointer BUG in nd_pmem_notify (bsc#1023175).
- lib: test_rhashtable: fix for large entry counts (bsc#1055359).
- lib: test_rhashtable: Fix KASAN warning (bsc#1055359).
- lightnvm: remove unused rq parameter of nvme_nvm_rqtocmd() to kill warning (FATE#319466).
- mac80211: flush hw_roc_start work before cancelling the ROC (bnc#1012382).
- mac80211_hwsim: Replace bogus hrtimer clockid (bsc#1047651).
- md/bitmap: disable bitmap_resize for file-backed bitmaps (bsc#1061172).
- md: fix sleep in atomic (bsc#1040351).
- md/raid5: fix a race condition in stripe batch (linux-stable).
- md/raid5: preserve STRIPE_ON_UNPLUG_LIST in break_stripe_batch_list (bnc#1012382).
- md/raid5: release/flush io in raid5_do_work() (bnc#1012382).
- media: uvcvideo: Prevent heap overflow when accessing mapped controls (bnc#1012382).
- media: v4l2-compat-ioctl32: Fix timespec conversion (bnc#1012382).
- mips: math-emu: &lt;MAXA|MINA&gt;.&lt;D|S&gt;: Fix cases of both infinite inputs (bnc#1012382).
- mips: math-emu: &lt;MAXA|MINA&gt;.&lt;D|S&gt;: Fix cases of input values with opposite signs (bnc#1012382).
- mips: math-emu: &lt;MAX|MAXA|MIN|MINA&gt;.&lt;D|S&gt;: Fix cases of both inputs zero (bnc#1012382).
- mips: math-emu: &lt;MAX|MAXA|MIN|MINA&gt;.&lt;D|S&gt;: Fix quiet NaN propagation (bnc#1012382).
- mips: math-emu: &lt;MAX|MIN&gt;.&lt;D|S&gt;: Fix cases of both inputs negative (bnc#1012382).
- mips: math-emu: MINA.&lt;D|S&gt;: Fix some cases of infinity and zero inputs (bnc#1012382).
- mm: adaptive hash table scaling (bnc#1036303).
- mm: call page_ext_init() after all struct pages are initialized (VM Debugging Functionality, bsc#1047048).
- mm: drop HASH_ADAPT (bnc#1036303).
- mm: fix classzone_idx underflow in shrink_zones() (VM Functionality, bsc#1042314).
- mm, madvise: ensure poisoned pages are removed from per-cpu lists (VM hw poison -- git fixes).
- mm: make PR_SET_THP_DISABLE immediately active (bnc#1048891).
- mm/page_alloc.c: apply gfp_allowed_mask before the first allocation attempt (bnc#971975 VM -- git fixes).
- mm: prevent double decrease of nr_reserved_highatomic (bnc#1012382).
- mptsas: Fixup device hotplug for VMWare ESXi (bsc#1030850).
- mwifiex: do not update MCS set from hostapd (bsc#1031717).
- net: account for current skb length when deciding about UFO (bsc#1041958).
- net: ena: add hardware hints capability to the driver (bsc#1047121).
- net: ena: add missing return when ena_com_get_io_handlers() fails (bsc#1047121).
- net: ena: add missing unmap bars on device removal (bsc#1047121).
- net: ena: add reset reason for each device FLR (bsc#1047121).
- net: ena: add support for out of order rx buffers refill (bsc#1047121).
- net: ena: allow the driver to work with small number of msix vectors (bsc#1047121).
- net: ena: bug fix in lost tx packets detection mechanism (bsc#1047121).
- net: ena: change return value for unsupported features unsupported return value (bsc#1047121).
- net: ena: change sizeof() argument to be the type pointer (bsc#1047121).
- net: ena: disable admin msix while working in polling mode (bsc#1047121).
- net: ena: fix bug that might cause hang after consecutive open/close interface (bsc#1047121).
- net: ena: fix race condition between submit and completion admin command (bsc#1047121).
- net: ena: fix rare uncompleted admin command false alarm (bsc#1047121).
- net: ena: fix theoretical Rx hang on low memory systems (bsc#1047121).
- net: ena: separate skb allocation to dedicated function (bsc#1047121).
- net: ena: update driver's rx drop statistics (bsc#1047121).
- net: ena: update ena driver to version 1.1.7 (bsc#1047121).
- net: ena: update ena driver to version 1.2.0 (bsc#1047121).
- net: ena: use lower_32_bits()/upper_32_bits() to split dma address (bsc#1047121).
- net: ena: use napi_schedule_irqoff when possible (bsc#1047121).
- netfilter: fix IS_ERR_VALUE usage (bsc#1052888).
- netfilter: x_tables: pack percpu counter allocations (bsc#1052888).
- netfilter: x_tables: pass xt_counters struct instead of packet counter (bsc#1052888).
- netfilter: x_tables: pass xt_counters struct to counter allocator (bsc#1052888).
- net: handle NAPI_GRO_FREE_STOLEN_HEAD case also in napi_frags_finish() (bsc#1042286).
- net/mlx5: Fix driver load error flow when firmware is stuck (git-fixes).
- net: phy: Do not perform software reset for Generic PHY (bsc#1042286).
- new helper: memdup_user_nul() (bsc#1048893).
- nfs: Cache aggressively when file is open for writing (bsc#1033587).
- nfsd: Fix general protection fault in release_lock_stateid() (bnc#1012382).
- nfs: Do not flush caches for a getattr that races with writeback (bsc#1033587).
- nfs: flush data when locking a file to ensure cache coherence for mmap (bsc#981309).
- nfs: invalidate file size when taking a lock (git-fixes).
- nfs: only invalidate dentrys that are clearly invalid (bsc#1047118).
- ocfs2: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ocfs2: fix deadlock caused by recursive locking in xattr (bsc#1012829).
- ocfs2: Make ocfs2_set_acl() static (bsc#1030552).
- of: fix '/cpus' reference leak in of_numa_parse_cpu_nodes() (bsc#1056827).
- ovl: fix dentry leak for default_permissions (bsc#1054084).
- pci: Add Mellanox device IDs (bsc#1051478).
- pci: Allow PCI express root ports to find themselves (bsc#1061046).
- pci: Convert Mellanox broken INTx quirks to be for listed devices only (bsc#1051478).
- pci: Correct PCI_STD_RESOURCE_END usage (bsc#1051478).
- pci: dwc: dra7xx: Use RW1C for IRQSTATUS_MSI and IRQSTATUS_MAIN (bsc#1051478).
- pci: dwc: Fix uninitialized variable in dw_handle_msi_irq() (bsc#1051478).
- pci: Enable ECRC only if device supports it (bsc#1051478).
- pci: fix oops when try to find Root Port for a PCI device (bsc#1061046).
- pci: Fix race condition with driver_override (bnc#1012382).
- pci / pm: Fix native PME handling during system suspend/resume (bsc#1051478).
- pci: shpchp: Enable bridge bus mastering if MSI is enabled (bnc#1012382).
- pci: Support INTx masking on ConnectX-4 with firmware x.14.1100+ (bsc#1051478).
- percpu_ref: allow operation mode switching operations to be called concurrently (bsc#1055096).
- percpu_ref: remove unnecessary RCU grace period for staggered atomic switching confirmation (bsc#1055096).
- percpu_ref: reorganize __percpu_ref_switch_to_atomic() and relocate percpu_ref_switch_to_atomic() (bsc#1055096).
- percpu_ref: restructure operation mode switching (bsc#1055096).
- percpu_ref: unify staggered atomic switching wait behavior (bsc#1055096).
- perf/x86: Fix RDPMC vs. mm_struct tracking (bsc#1061831).
- perf/x86: Fix spurious NMI with PEBS Load Latency event (bsc#1051478).
- perf/x86/intel: Cure bogus unwind from PEBS entries (bsc#1051478).
- perf/x86/intel: Fix PEBSv3 record drain (bsc#1051478).
- perf/x86: kABI Workaround for 'perf/x86: Fix RDPMC vs. mm_struct tracking' (bsc#1061831).
- platform/x86: ideapad-laptop: Add IdeaPad 310-15IKB to no_hw_rfkill (bsc#1051022).
- platform/x86: ideapad-laptop: Add IdeaPad V310-15ISK to no_hw_rfkill (bsc#1051022).
- platform/x86: ideapad-laptop: Add IdeaPad V510-15IKB to no_hw_rfkill (bsc#1051022).
- platform/x86: ideapad-laptop: Add Lenovo Yoga 910-13IKB to no_hw_rfkill dmi list (bsc#1051022).
- platform/x86: ideapad-laptop: Add several models to no_hw_rfkill (bsc#1051022).
- platform/x86: ideapad-laptop: Add Y520-15IKBN to no_hw_rfkill (bsc#1051022).
- platform/x86: ideapad-laptop: Add Y700 15-ACZ to no_hw_rfkill DMI list (bsc#1051022).
- platform/x86: ideapad-laptop: Add Y720-15IKBN to no_hw_rfkill (bsc#1051022).
- pm / Hibernate: Fix scheduling while atomic during hibernation (bsc#1051059).
- powerpc: Fix DAR reporting when alignment handler faults (bnc#1012382).
- powerpc/pseries: Fix parent_dn reference leak in add_dt_node() (bnc#1012382).
- prctl: propagate has_child_subreaper flag to every descendant (bnc#1022476).
- qeth: fix L3 next-hop im xmit qeth hdr (bnc#1052773, LTC#157374).
- qlge: avoid memcpy buffer overflow (bnc#1012382).
- reiserfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- Revert 'ACPI / video: Add force_native quirk for HP Pavilion dv6' (bsc#1031717).
- Revert 'net: fix percpu memory leaks' (bnc#1012382).
- Revert 'net: phy: Correctly process PHY_HALTED in phy_stop_machine()' (bnc#1012382).
- Revert 'net: use lib/percpu_counter API for fragmentation mem accounting' (bnc#1012382).
- Revert 'powerpc/numa: Fix percpu allocations to be NUMA aware' (bsc#1048914).
- Revert 'tpm: Issue a TPM2_Shutdown for TPM2 devices.' (kabi).
- rpm/kernel-binary.spec.in: find-debuginfo.sh should not touch build-id This needs rpm-4.14+ (bsc#964063).
- rtnetlink: fix rtnl_vfinfo_size (bsc#1056261).
- s390: export symbols for crash-kmp (bsc#1053915).
- sched/core: Allow __sched_setscheduler() in interrupts when PI is not used (bnc#1022476).
- sched/debug: Print the scheduler topology group mask (bnc#1022476).
- sched/fair, cpumask: Export for_each_cpu_wrap() (bnc#1022476).
- sched/fair: Fix O(nr_cgroups) in load balance path (bnc#1022476).
- sched/fair: Use task_groups instead of leaf_cfs_rq_list to walk all cfs_rqs (bnc#1022476).
- sched/topology: Add sched_group_capacity debugging (bnc#1022476).
- sched/topology: Fix building of overlapping sched-groups (bnc#1022476).
- sched/topology: Fix overlapping sched_group_capacity (bnc#1022476).
- sched/topology: Move comment about asymmetric node setups (bnc#1022476).
- sched/topology: Refactor function build_overlap_sched_groups() (bnc#1022476).
- sched/topology: Remove FORCE_SD_OVERLAP (bnc#1022476).
- sched/topology: Simplify build_overlap_sched_groups() (bnc#1022476).
- sched/topology: Small cleanup (bnc#1022476).
- sched/topology: Verify the first group matches the child domain (bnc#1022476).
- scsi: Add STARGET_CREATE_REMOVE state to scsi_target_state (bsc#1013887).
- scsi: bnx2i: missing error code in bnx2i_ep_connect() (bsc#1048221).
- scsi_devinfo: fixup string compare (bsc#1037404).
- scsi_dh_alua: suppress errors from unsupported devices (bsc#1038792).
- scsi: ILLEGAL REQUEST + ASC==27 =&amp;gt; target failure (bsc#1059465).
- scsi: kABI fix for new state STARGET_CREATED_REMOVE (bsc#1013887).
- scsi: megaraid_sas: Check valid aen class range to avoid kernel panic (bnc#1012382).
- scsi: megaraid_sas: Return pended IOCTLs with cmd_status MFI_STAT_WRONG_STATE in case adapter is dead (bnc#1012382).
- scsi: sg: close race condition in sg_remove_sfp_usercontext() (bsc#1064206).
- scsi: sg: factor out sg_fill_request_table() (bnc#1012382).
- scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE (bnc#1012382).
- scsi: sg: off by one in sg_ioctl() (bnc#1012382).
- scsi: sg: remove 'save_scat_len' (bnc#1012382).
- scsi: sg: use standard lists for sg_requests (bnc#1012382).
- scsi: storvsc: fix memory leak on ring buffer busy (bnc#1012382).
- scsi: storvsc: Workaround for virtual DVD SCSI version (fate#320485, bnc#1044636).
- scsi: zfcp: add handling for FCP_RESID_OVER to the fcp ingress path (bnc#1012382).
- scsi: zfcp: fix capping of unsuccessful GPN_FT SAN response trace records (bnc#1012382).
- scsi: zfcp: fix missing trace records for early returns in TMF eh handlers (bnc#1012382).
- scsi: zfcp: fix passing fsf_req to SCSI trace on TMF to correlate with HBA (bnc#1012382).
- scsi: zfcp: fix payload with full FCP_RSP IU in SCSI trace records (bnc#1012382).
- scsi: zfcp: fix queuecommand for scsi_eh commands when DIX enabled (bnc#1012382).
- scsi: zfcp: trace HBA FSF response by default on dismiss or timedout late response (bnc#1012382).
- scsi: zfcp: trace high part of 'new' 64 bit SCSI LUN (bnc#1012382).
- seccomp: fix the usage of get/put_seccomp_filter() in seccomp_get_filter() (bnc#1012382).
- skd: Avoid that module unloading triggers a use-after-free (bnc#1012382).
- skd: Submit requests to firmware before triggering the doorbell (bnc#1012382).
- smb3: Do not ignore O_SYNC/O_DSYNC and O_DIRECT flags (bnc#1012382).
- smb: Validate negotiate (to protect against downgrade) even if signing off (bnc#1012382).
- smsc75xx: use skb_cow_head() to deal with cloned skbs (bsc#1045154).
- sr9700: use skb_cow_head() to deal with cloned skbs (bsc#1045154).
- supported.conf: clear mistaken external support flag for cifs.ko (bsc#1053802).
- swiotlb-xen: implement xen_swiotlb_dma_mmap callback (bnc#1012382).
- sysctl: do not print negative flag for proc_douintvec (bnc#1046985).
- sysctl: fix lax sysctl_check_table() sanity check (bsc#1048893).
- sysctl: fold sysctl_writes_strict checks into helper (bsc#1048893).
- sysctl: kdoc'ify sysctl_writes_strict (bsc#1048893).
- sysctl: simplify unsigned int support (bsc#1048893).
- timers: Plug locking race vs. timer migration (bnc#1022476).
- timer/sysclt: Restrict timer migration sysctl values to 0 and 1 (bnc#1012382).
- tpm: fix: return rc when devm_add_action() fails (bsc#1020645, fate#321435, fate#321507, fate#321600, bsc#1034048, git-fixes 8e0ee3c9faed).
- tpm: Issue a TPM2_Shutdown for TPM2 devices (bsc#1053117).
- tpm: KABI fix (bsc#1053117).
- tpm: read burstcount from TPM_STS in one 32-bit transaction (bsc#1020645, fate#321435, fate#321507, fate#321600, bsc#1034048, git-fixes 27084efee0c3).
- tpm_tis_core: Choose appropriate timeout for reading burstcount (bsc#1020645, fate#321435, fate#321507, fate#321600, bsc#1034048, git-fixes aec04cbdf723).
- tpm_tis_core: convert max timeouts from msec to jiffies (bsc#1020645, fate#321435, fate#321507, fate#321600, bsc#1034048, git-fixes aec04cbdf723).
- tracing: Apply trace_clock changes to instance max buffer (bnc#1012382).
- tracing: Erase irqsoff trace with empty write (bnc#1012382).
- tracing: Fix trace_pipe behavior for instance traces (bnc#1012382).
- tty: fix __tty_insert_flip_char regression (bnc#1012382).
- tty: improve tty_insert_flip_char() fast path (bnc#1012382).
- tty: improve tty_insert_flip_char() slow path (bnc#1012382).
- tty: serial: msm: Support more bauds (git-fixes).
- ubifs: Correctly evict xattr inodes (bsc#1012829).
- ubifs: Do not leak kernel memory to the MTD (bsc#1012829).
- udf: Fix deadlock between writeback and udf_setsize() (bsc#1012829).
- udf: Fix races with i_size changes during readpage (bsc#1012829).
- usb: core: fix device node leak (bsc#1047487).
- vfs: fix missing inode_get_dev sites (bsc#1052049).
- vfs: Return -ENXIO for negative SEEK_HOLE / SEEK_DATA offsets (bnc#1012382).
- video: fbdev: aty: do not leak uninitialized padding in clk to userspace (bnc#1012382).
- Workaround for kABI compatibility with DP-MST patches (bsc#1055493).
- x86/dmi: Switch dmi_remap() from ioremap() to ioremap_cache() (bsc#1051399).
- x86/fpu: Do not let userspace set bogus xcomp_bv (bnc#1012382).
- x86/fsgsbase/64: Report FSBASE and GSBASE correctly in core dumps (bnc#1012382).
- x86/ldt: Fix off by one in get_segment_base() (bsc#1061872).
- x86/LDT: Print the real LDT base address (bsc#1051478).
- x86/mce: Make timer handling more robust (bsc#1042422).
- x86/panic: replace smp_send_stop() with kdump friendly version in panic path (bsc#1051478).
- xen: allocate page for shared info page from low memory (bnc#1038616).
- xen/balloon: do not online new memory initially (bnc#1028173).
- xen: hold lock_device_hotplug throughout vcpu hotplug operations (bsc#1042422).
- xen-netfront: Rework the fix for Rx stall during OOM and network stress (git-fixes).
- xen/pvh*: Support &amp;gt; 32 VCPUs at domain restore (bnc#1045563).
- xfrm: NULL dereference on allocation failure (bsc#1047343).
- xfrm: Oops on error in pfkey_msg2xfrm_state() (bsc#1047653).
- xfs/dmapi: fix incorrect file-&amp;gt;f_path.dentry-&amp;gt;d_inode usage (bsc#1055896).
- xfs: do not BUG() on mixed direct and mapped I/O (bsc#1050188).
- xfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- xfs: fix inobt inode allocation search optimization (bsc#1012829).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-27"/>
	<updated date="2017-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1006180">SUSE bug 1006180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011913">SUSE bug 1011913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012829">SUSE bug 1012829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013887">SUSE bug 1013887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019151">SUSE bug 1019151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020645">SUSE bug 1020645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020657">SUSE bug 1020657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021424">SUSE bug 1021424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022476">SUSE bug 1022476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022743">SUSE bug 1022743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022967">SUSE bug 1022967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023175">SUSE bug 1023175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024405">SUSE bug 1024405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028173">SUSE bug 1028173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028286">SUSE bug 1028286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029693">SUSE bug 1029693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030552">SUSE bug 1030552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030850">SUSE bug 1030850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031515">SUSE bug 1031515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031717">SUSE bug 1031717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031784">SUSE bug 1031784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033587">SUSE bug 1033587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034048">SUSE bug 1034048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034075">SUSE bug 1034075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034762">SUSE bug 1034762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036303">SUSE bug 1036303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036632">SUSE bug 1036632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037344">SUSE bug 1037344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037404">SUSE bug 1037404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037994">SUSE bug 1037994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038078">SUSE bug 1038078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038583">SUSE bug 1038583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038616">SUSE bug 1038616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038792">SUSE bug 1038792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039915">SUSE bug 1039915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040307">SUSE bug 1040307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040351">SUSE bug 1040351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041958">SUSE bug 1041958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042286">SUSE bug 1042286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042314">SUSE bug 1042314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042422">SUSE bug 1042422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042778">SUSE bug 1042778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043652">SUSE bug 1043652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044112">SUSE bug 1044112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044636">SUSE bug 1044636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045154">SUSE bug 1045154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045563">SUSE bug 1045563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045922">SUSE bug 1045922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046682">SUSE bug 1046682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046821">SUSE bug 1046821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046985">SUSE bug 1046985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047027">SUSE bug 1047027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047048">SUSE bug 1047048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047096">SUSE bug 1047096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047118">SUSE bug 1047118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047121">SUSE bug 1047121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047152">SUSE bug 1047152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047277">SUSE bug 1047277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047343">SUSE bug 1047343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047354">SUSE bug 1047354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047487">SUSE bug 1047487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047651">SUSE bug 1047651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047653">SUSE bug 1047653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047670">SUSE bug 1047670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048155">SUSE bug 1048155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048221">SUSE bug 1048221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048317">SUSE bug 1048317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048891">SUSE bug 1048891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048893">SUSE bug 1048893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048914">SUSE bug 1048914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048934">SUSE bug 1048934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049226">SUSE bug 1049226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049483">SUSE bug 1049483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049486">SUSE bug 1049486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049580">SUSE bug 1049580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049603">SUSE bug 1049603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049645">SUSE bug 1049645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049882">SUSE bug 1049882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050061">SUSE bug 1050061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050188">SUSE bug 1050188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051022">SUSE bug 1051022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051059">SUSE bug 1051059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051239">SUSE bug 1051239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051399">SUSE bug 1051399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051478">SUSE bug 1051478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051479">SUSE bug 1051479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051556">SUSE bug 1051556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051663">SUSE bug 1051663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051790">SUSE bug 1051790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052049">SUSE bug 1052049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052223">SUSE bug 1052223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052533">SUSE bug 1052533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052580">SUSE bug 1052580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052593">SUSE bug 1052593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052709">SUSE bug 1052709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052773">SUSE bug 1052773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052794">SUSE bug 1052794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052888">SUSE bug 1052888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053117">SUSE bug 1053117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053802">SUSE bug 1053802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053915">SUSE bug 1053915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054084">SUSE bug 1054084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055013">SUSE bug 1055013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055096">SUSE bug 1055096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055359">SUSE bug 1055359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055493">SUSE bug 1055493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055755">SUSE bug 1055755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055896">SUSE bug 1055896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056261">SUSE bug 1056261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056588">SUSE bug 1056588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056827">SUSE bug 1056827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056982">SUSE bug 1056982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057015">SUSE bug 1057015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058038">SUSE bug 1058038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058116">SUSE bug 1058116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058410">SUSE bug 1058410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058507">SUSE bug 1058507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059051">SUSE bug 1059051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059465">SUSE bug 1059465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060197">SUSE bug 1060197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061017">SUSE bug 1061017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061046">SUSE bug 1061046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061064">SUSE bug 1061064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061067">SUSE bug 1061067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061172">SUSE bug 1061172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061831">SUSE bug 1061831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061872">SUSE bug 1061872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064206">SUSE bug 1064206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064388">SUSE bug 1064388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964063">SUSE bug 964063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971975">SUSE bug 971975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974215">SUSE bug 974215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981309">SUSE bug 981309</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000252/">CVE-2017-1000252</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10810/">CVE-2017-10810</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-11472/">CVE-2017-11472</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11473/">CVE-2017-11473</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12134/">CVE-2017-12134</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12153/">CVE-2017-12153</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12154/">CVE-2017-12154</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14051/">CVE-2017-14051</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14106/">CVE-2017-14106</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14489/">CVE-2017-14489</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15649/">CVE-2017-15649</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7518/">CVE-2017-7518</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7541/">CVE-2017-7541</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7542/">CVE-2017-7542</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8831/">CVE-2017-8831</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518248" comment="kernel-default-4.4.90-92.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518249" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518250" comment="kernel-default-extra-4.4.90-92.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518254" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77954" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1064715" ref_url="https://bugzilla.suse.com/1064715" source="BUGZILLA"/>
		<reference ref_id="1064716" ref_url="https://bugzilla.suse.com/1064716" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13089" ref_url="https://www.suse.com/security/cve/CVE-2017-13089/" source="CVE"/>
		<reference ref_id="CVE-2017-13090" ref_url="https://www.suse.com/security/cve/CVE-2017-13090/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00027.html" source="SUSE-SU"/>
		<description>


This update for wget fixes the following security issues:

- CVE-2017-13089,CVE-2017-13090: Missing checks for negative remaining_chunk_size in skip_short_body and fd_read_body could
  cause stack buffer overflows, which could have been exploited by malicious servers. (bsc#1064715,bsc#1064716)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-16"/>
	<updated date="2017-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1064715">SUSE bug 1064715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064716">SUSE bug 1064716</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13089/">CVE-2017-13089</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13090/">CVE-2017-13090</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518255" comment="wget-1.14-21.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77955" version="1" class="patch">
	<metadata>
		<title>Security update for SuSEfirewall2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1064127" ref_url="https://bugzilla.suse.com/1064127" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15638" ref_url="https://www.suse.com/security/cve/CVE-2017-15638/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003373.html" source="SUSE-SU"/>
		<description>
This update for SuSEfirewall2 fixes the following issues:

- CVE-2017-15638: Fixed a security issue with too open implicit portmapper rules
  (bsc#1064127): A source net restriction for _rpc_ services
  was not taken into account for the implicitly added rules for port 111,
  making the portmap service accessible to everyone in the affected zone.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-06"/>
	<updated date="2017-11-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064127">SUSE bug 1064127</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15638/">CVE-2017-15638</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518256" comment="SuSEfirewall2-3.6.312-2.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77956" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1020950" ref_url="https://bugzilla.suse.com/1020950" source="BUGZILLA"/>
		<reference ref_id="1024749" ref_url="https://bugzilla.suse.com/1024749" source="BUGZILLA"/>
		<reference ref_id="1045460" ref_url="https://bugzilla.suse.com/1045460" source="BUGZILLA"/>
		<reference ref_id="1050469" ref_url="https://bugzilla.suse.com/1050469" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7586" ref_url="https://www.suse.com/security/cve/CVE-2016-7586/" source="CVE"/>
		<reference ref_id="CVE-2016-7589" ref_url="https://www.suse.com/security/cve/CVE-2016-7589/" source="CVE"/>
		<reference ref_id="CVE-2016-7592" ref_url="https://www.suse.com/security/cve/CVE-2016-7592/" source="CVE"/>
		<reference ref_id="CVE-2016-7599" ref_url="https://www.suse.com/security/cve/CVE-2016-7599/" source="CVE"/>
		<reference ref_id="CVE-2016-7623" ref_url="https://www.suse.com/security/cve/CVE-2016-7623/" source="CVE"/>
		<reference ref_id="CVE-2016-7632" ref_url="https://www.suse.com/security/cve/CVE-2016-7632/" source="CVE"/>
		<reference ref_id="CVE-2016-7635" ref_url="https://www.suse.com/security/cve/CVE-2016-7635/" source="CVE"/>
		<reference ref_id="CVE-2016-7639" ref_url="https://www.suse.com/security/cve/CVE-2016-7639/" source="CVE"/>
		<reference ref_id="CVE-2016-7641" ref_url="https://www.suse.com/security/cve/CVE-2016-7641/" source="CVE"/>
		<reference ref_id="CVE-2016-7645" ref_url="https://www.suse.com/security/cve/CVE-2016-7645/" source="CVE"/>
		<reference ref_id="CVE-2016-7652" ref_url="https://www.suse.com/security/cve/CVE-2016-7652/" source="CVE"/>
		<reference ref_id="CVE-2016-7654" ref_url="https://www.suse.com/security/cve/CVE-2016-7654/" source="CVE"/>
		<reference ref_id="CVE-2016-7656" ref_url="https://www.suse.com/security/cve/CVE-2016-7656/" source="CVE"/>
		<reference ref_id="CVE-2017-2350" ref_url="https://www.suse.com/security/cve/CVE-2017-2350/" source="CVE"/>
		<reference ref_id="CVE-2017-2354" ref_url="https://www.suse.com/security/cve/CVE-2017-2354/" source="CVE"/>
		<reference ref_id="CVE-2017-2355" ref_url="https://www.suse.com/security/cve/CVE-2017-2355/" source="CVE"/>
		<reference ref_id="CVE-2017-2356" ref_url="https://www.suse.com/security/cve/CVE-2017-2356/" source="CVE"/>
		<reference ref_id="CVE-2017-2362" ref_url="https://www.suse.com/security/cve/CVE-2017-2362/" source="CVE"/>
		<reference ref_id="CVE-2017-2363" ref_url="https://www.suse.com/security/cve/CVE-2017-2363/" source="CVE"/>
		<reference ref_id="CVE-2017-2364" ref_url="https://www.suse.com/security/cve/CVE-2017-2364/" source="CVE"/>
		<reference ref_id="CVE-2017-2365" ref_url="https://www.suse.com/security/cve/CVE-2017-2365/" source="CVE"/>
		<reference ref_id="CVE-2017-2366" ref_url="https://www.suse.com/security/cve/CVE-2017-2366/" source="CVE"/>
		<reference ref_id="CVE-2017-2369" ref_url="https://www.suse.com/security/cve/CVE-2017-2369/" source="CVE"/>
		<reference ref_id="CVE-2017-2371" ref_url="https://www.suse.com/security/cve/CVE-2017-2371/" source="CVE"/>
		<reference ref_id="CVE-2017-2373" ref_url="https://www.suse.com/security/cve/CVE-2017-2373/" source="CVE"/>
		<reference ref_id="CVE-2017-2496" ref_url="https://www.suse.com/security/cve/CVE-2017-2496/" source="CVE"/>
		<reference ref_id="CVE-2017-2510" ref_url="https://www.suse.com/security/cve/CVE-2017-2510/" source="CVE"/>
		<reference ref_id="CVE-2017-2538" ref_url="https://www.suse.com/security/cve/CVE-2017-2538/" source="CVE"/>
		<reference ref_id="CVE-2017-2539" ref_url="https://www.suse.com/security/cve/CVE-2017-2539/" source="CVE"/>
		<reference ref_id="CVE-2017-7018" ref_url="https://www.suse.com/security/cve/CVE-2017-7018/" source="CVE"/>
		<reference ref_id="CVE-2017-7030" ref_url="https://www.suse.com/security/cve/CVE-2017-7030/" source="CVE"/>
		<reference ref_id="CVE-2017-7034" ref_url="https://www.suse.com/security/cve/CVE-2017-7034/" source="CVE"/>
		<reference ref_id="CVE-2017-7037" ref_url="https://www.suse.com/security/cve/CVE-2017-7037/" source="CVE"/>
		<reference ref_id="CVE-2017-7039" ref_url="https://www.suse.com/security/cve/CVE-2017-7039/" source="CVE"/>
		<reference ref_id="CVE-2017-7046" ref_url="https://www.suse.com/security/cve/CVE-2017-7046/" source="CVE"/>
		<reference ref_id="CVE-2017-7048" ref_url="https://www.suse.com/security/cve/CVE-2017-7048/" source="CVE"/>
		<reference ref_id="CVE-2017-7055" ref_url="https://www.suse.com/security/cve/CVE-2017-7055/" source="CVE"/>
		<reference ref_id="CVE-2017-7056" ref_url="https://www.suse.com/security/cve/CVE-2017-7056/" source="CVE"/>
		<reference ref_id="CVE-2017-7061" ref_url="https://www.suse.com/security/cve/CVE-2017-7061/" source="CVE"/>
		<reference ref_id="CVE-2017-7064" ref_url="https://www.suse.com/security/cve/CVE-2017-7064/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.18.0 fixes the following issues:

These security issues were fixed:

- CVE-2017-7039: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7018: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7030: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7037: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7034: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7055: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7056: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7064: An issue was fixed that allowed remote attackers to bypass
  intended memory-read restrictions via a crafted app (bsc#1050469).
- CVE-2017-7061: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7048: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7046: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1050469).
- CVE-2017-2538: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1045460)
- CVE-2017-2496: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site.
- CVE-2017-2539: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site.
- CVE-2017-2510: An issue was fixed that allowed remote attackers to conduct
  Universal XSS (UXSS) attacks via a crafted web site that improperly
  interacts with pageshow events.
- CVE-2017-2365: An issue was fixed that allowed remote attackers to bypass the
  Same Origin Policy and obtain sensitive information via a crafted web
  site (bsc#1024749)
- CVE-2017-2366: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1024749)
- CVE-2017-2373: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1024749)
- CVE-2017-2363: An issue was fixed that allowed remote attackers to bypass the
  Same Origin Policy and obtain sensitive information via a crafted web
  site (bsc#1024749)
- CVE-2017-2362: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1024749)
- CVE-2017-2350: An issue was fixed that allowed remote attackers to bypass the
  Same Origin Policy and obtain sensitive information via a crafted web
  site (bsc#1024749)
- CVE-2017-2350: An issue was fixed that allowed remote attackers to bypass the
  Same Origin Policy and obtain sensitive information via a crafted web site
  (bsc#1024749)
- CVE-2017-2354: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1024749).
- CVE-2017-2355: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (uninitialized memory
  access and application crash) via a crafted web site (bsc#1024749)
- CVE-2017-2356: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1024749)
- CVE-2017-2371: An issue was fixed that allowed remote attackers to launch
  popups via a crafted web site (bsc#1024749)
- CVE-2017-2364: An issue was fixed that allowed remote attackers to bypass the
  Same Origin Policy and obtain sensitive information via a crafted web
  site (bsc#1024749)
- CVE-2017-2369: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1024749)
- CVE-2016-7656: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7635: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7654: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7639: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7645: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7652: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7641: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7632: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7599: An issue was fixed that allowed remote attackers to bypass the
  Same Origin Policy and obtain sensitive information via a crafted web
  site that used HTTP redirects (bsc#1020950)
- CVE-2016-7592: An issue was fixed that allowed remote attackers to obtain
  sensitive information via crafted JavaScript prompts on a web site (bsc#1020950)
- CVE-2016-7589: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7623: An issue was fixed that allowed remote attackers to obtain
  sensitive information via a blob URL on a web site (bsc#1020950)
- CVE-2016-7586: An issue was fixed that allowed remote attackers to obtain
  sensitive information via a crafted web site (bsc#1020950)

For other non-security fixes please check the changelog.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-06"/>
	<updated date="2017-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024749">SUSE bug 1024749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045460">SUSE bug 1045460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7586/">CVE-2016-7586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7589/">CVE-2016-7589</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7592/">CVE-2016-7592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7599/">CVE-2016-7599</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7623/">CVE-2016-7623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7632/">CVE-2016-7632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7635/">CVE-2016-7635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7639/">CVE-2016-7639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7641/">CVE-2016-7641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7645/">CVE-2016-7645</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7652/">CVE-2016-7652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7654/">CVE-2016-7654</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7656/">CVE-2016-7656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2350/">CVE-2017-2350</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2354/">CVE-2017-2354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2355/">CVE-2017-2355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2356/">CVE-2017-2356</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2362/">CVE-2017-2362</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2363/">CVE-2017-2363</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2364/">CVE-2017-2364</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2365/">CVE-2017-2365</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2366/">CVE-2017-2366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2369/">CVE-2017-2369</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2371/">CVE-2017-2371</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2373/">CVE-2017-2373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2496/">CVE-2017-2496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2510/">CVE-2017-2510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2538/">CVE-2017-2538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2539/">CVE-2017-2539</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7018/">CVE-2017-7018</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7030/">CVE-2017-7030</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7034/">CVE-2017-7034</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7037/">CVE-2017-7037</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7039/">CVE-2017-7039</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7046/">CVE-2017-7046</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7048/">CVE-2017-7048</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7055/">CVE-2017-7055</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7056/">CVE-2017-7056</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7061/">CVE-2017-7061</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7064/">CVE-2017-7064</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518257" comment="libjavascriptcoregtk-4_0-18-2.18.0-2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518258" comment="libwebkit2gtk-4_0-37-2.18.0-2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518259" comment="libwebkit2gtk3-lang-2.18.0-2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518260" comment="typelib-1_0-JavaScriptCore-4_0-2.18.0-2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518261" comment="typelib-1_0-WebKit2-4_0-2.18.0-2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518262" comment="webkit2gtk-4_0-injected-bundles-2.18.0-2.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77957" version="1" class="patch">
	<metadata>
		<title>Security update for libwpd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1058025" ref_url="https://bugzilla.suse.com/1058025" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14226" ref_url="https://www.suse.com/security/cve/CVE-2017-14226/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2931-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00004.html" source="SUSE-SU"/>
		<description>
This update for libwpd fixes the following issues:

Security issue fixed:
- CVE-2017-14226: WP1StylesListener.cpp, WP5StylesListener.cpp, and WP42StylesListener.cpp in libwpd
  0.10.1 mishandle iterators, which allows remote attackers to cause a denial of service (heap-based
  buffer over-read in the WPXTableList class in WPXTable.cpp). This vulnerability can be triggered
  in LibreOffice before 5.3.7. It may lead to suffering a remote attack against a LibreOffice
  application. (bnc#1058025)

Bugfixes:
- Fix various crashes, leaks and hangs when reading damaged files found by oss-fuzz.
- Fix crash when NULL is passed as input stream.
- Use symbol visibility on Linux. The library only exports public functions now.
- Avoid infinite loop. (libwpd#3)
- Remove bashism. (libwpd#5)
- Fix various crashes and hangs when reading broken files found with the help of american-fuzzy-lop.
- Make --help output of all command line tools more help2man-friendly.
- Miscellaneous fixes and cleanups.
- Generate manpages for the libwpd-tools
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-06"/>
	<updated date="2017-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1058025">SUSE bug 1058025</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14226/">CVE-2017-14226</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518263" comment="libwpd-0_10-10-0.10.2-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77958" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1043176" ref_url="https://bugzilla.suse.com/1043176" source="BUGZILLA"/>
		<reference ref_id="1043808" ref_url="https://bugzilla.suse.com/1043808" source="BUGZILLA"/>
		<reference ref_id="1046636" ref_url="https://bugzilla.suse.com/1046636" source="BUGZILLA"/>
		<reference ref_id="1047674" ref_url="https://bugzilla.suse.com/1047674" source="BUGZILLA"/>
		<reference ref_id="1048902" ref_url="https://bugzilla.suse.com/1048902" source="BUGZILLA"/>
		<reference ref_id="1049381" ref_url="https://bugzilla.suse.com/1049381" source="BUGZILLA"/>
		<reference ref_id="1054724" ref_url="https://bugzilla.suse.com/1054724" source="BUGZILLA"/>
		<reference ref_id="1056334" ref_url="https://bugzilla.suse.com/1056334" source="BUGZILLA"/>
		<reference ref_id="1057378" ref_url="https://bugzilla.suse.com/1057378" source="BUGZILLA"/>
		<reference ref_id="1057585" ref_url="https://bugzilla.suse.com/1057585" source="BUGZILLA"/>
		<reference ref_id="1057966" ref_url="https://bugzilla.suse.com/1057966" source="BUGZILLA"/>
		<reference ref_id="1059369" ref_url="https://bugzilla.suse.com/1059369" source="BUGZILLA"/>
		<reference ref_id="1062069" ref_url="https://bugzilla.suse.com/1062069" source="BUGZILLA"/>
		<reference ref_id="1062942" ref_url="https://bugzilla.suse.com/1062942" source="BUGZILLA"/>
		<reference ref_id="1063122" ref_url="https://bugzilla.suse.com/1063122" source="BUGZILLA"/>
		<reference ref_id="997358" ref_url="https://bugzilla.suse.com/997358" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<reference ref_id="CVE-2017-10806" ref_url="https://www.suse.com/security/cve/CVE-2017-10806/" source="CVE"/>
		<reference ref_id="CVE-2017-10911" ref_url="https://www.suse.com/security/cve/CVE-2017-10911/" source="CVE"/>
		<reference ref_id="CVE-2017-11334" ref_url="https://www.suse.com/security/cve/CVE-2017-11334/" source="CVE"/>
		<reference ref_id="CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434/" source="CVE"/>
		<reference ref_id="CVE-2017-12809" ref_url="https://www.suse.com/security/cve/CVE-2017-12809/" source="CVE"/>
		<reference ref_id="CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672/" source="CVE"/>
		<reference ref_id="CVE-2017-14167" ref_url="https://www.suse.com/security/cve/CVE-2017-14167/" source="CVE"/>
		<reference ref_id="CVE-2017-15038" ref_url="https://www.suse.com/security/cve/CVE-2017-15038/" source="CVE"/>
		<reference ref_id="CVE-2017-15268" ref_url="https://www.suse.com/security/cve/CVE-2017-15268/" source="CVE"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<reference ref_id="CVE-2017-9524" ref_url="https://www.suse.com/security/cve/CVE-2017-9524/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00006.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes several issues.

These security issues were fixed:

- CVE-2017-15268: Qemu allowed remote attackers to cause a memory leak by triggering slow data-channel read operations, related to io/channel-websock.c (bsc#1062942).
- CVE-2017-9524: The qemu-nbd server when built with the Network Block Device (NBD) Server support allowed remote attackers to cause a denial of service (segmentation fault and server crash) by leveraging failure to ensure that all initialization occurs talking to a client in the nbd_negotiate function (bsc#1043808).
- CVE-2017-15289: The mode4and5 write functions allowed local OS guest privileged users to cause a denial of service (out-of-bounds write access and Qemu process crash) via vectors related to dst calculation (bsc#1063122)
- CVE-2017-15038: Race condition in the v9fs_xattrwalk function local guest OS users to obtain sensitive information from host heap memory via vectors related to reading extended attributes (bsc#1062069)
- CVE-2017-10911: The make_response function in the Linux kernel allowed guest OS users to obtain sensitive information from host OS (or other guest OS) kernel memory by leveraging the copying of uninitialized padding fields in Xen block-interface response structures (bsc#1057378)
- CVE-2017-12809: The IDE disk and CD/DVD-ROM Emulator support allowed local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by flushing an empty CDROM device drive (bsc#1054724)
- CVE-2017-10664: qemu-nbd did not ignore SIGPIPE, which allowed remote attackers to cause a denial of service (daemon crash) by disconnecting during a server-to-client reply attempt (bsc#1046636)
- CVE-2017-10806: Stack-based buffer overflow allowed local guest OS users to cause a denial of service (QEMU process crash) via vectors related to logging debug messages (bsc#1047674)
- CVE-2017-14167: Integer overflow in the load_multiboot function allowed local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write (bsc#1057585)
- CVE-2017-11434: The dhcp_decode function in slirp/bootp.c allowed local guest OS users to cause a denial of service (out-of-bounds read) via a crafted DHCP options string (bsc#1049381)
- CVE-2017-11334: The address_space_write_continue function allowed local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area (bsc#1048902)
- CVE-2017-13672: The VGA display emulator support allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors involving display update (bsc#1056334)

These non-security issues were fixed:

- Fixed not being able to build from rpm sources due to undefined macro (bsc#1057966)
- Fixed wrong permissions for kvm_stat.1 file
- Fixed KVM lun resize not working as expected on SLES12 SP2 HV (bsc#1043176)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-06"/>
	<updated date="2017-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1043176">SUSE bug 1043176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043808">SUSE bug 1043808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046636">SUSE bug 1046636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047674">SUSE bug 1047674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048902">SUSE bug 1048902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049381">SUSE bug 1049381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054724">SUSE bug 1054724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056334">SUSE bug 1056334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057378">SUSE bug 1057378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057585">SUSE bug 1057585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057966">SUSE bug 1057966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059369">SUSE bug 1059369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062069">SUSE bug 1062069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062942">SUSE bug 1062942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063122">SUSE bug 1063122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997358">SUSE bug 997358</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10806/">CVE-2017-10806</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10911/">CVE-2017-10911</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11334/">CVE-2017-11334</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12809/">CVE-2017-12809</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14167/">CVE-2017-14167</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15038/">CVE-2017-15038</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15268/">CVE-2017-15268</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9524/">CVE-2017-9524</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518264" comment="qemu-2.6.2-41.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518265" comment="qemu-block-curl-2.6.2-41.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518266" comment="qemu-ipxe-1.0.0-41.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518267" comment="qemu-kvm-2.6.2-41.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518268" comment="qemu-seabios-1.9.1-41.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518269" comment="qemu-sgabios-8-41.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518270" comment="qemu-tools-2.6.2-41.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518271" comment="qemu-vgabios-1.9.1-41.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518272" comment="qemu-x86-2.6.2-41.22.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77959" version="1" class="patch">
	<metadata>
		<title>Security update for sssd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1039567" ref_url="https://bugzilla.suse.com/1039567" source="BUGZILLA"/>
		<reference ref_id="1055123" ref_url="https://bugzilla.suse.com/1055123" source="BUGZILLA"/>
		<reference ref_id="1061832" ref_url="https://bugzilla.suse.com/1061832" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12173" ref_url="https://www.suse.com/security/cve/CVE-2017-12173/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003377.html" source="SUSE-SU"/>
		<description>
This update for sssd provides the following fixes:

Security issues fixed:

- CVE-2017-12173: Fixed unsanitized input when searching in local cache database (bsc#1061832).

Non security issues fixed:

- Fixed a segfault issue in ldap_rfc_2307_fallback_to_local_users. (bsc#1055123)
- Install /var/lib/sss/mc directory to correct sssd cache invalidation behaviour. (bsc#1039567)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-06"/>
	<updated date="2017-11-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1039567">SUSE bug 1039567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055123">SUSE bug 1055123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061832">SUSE bug 1061832</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12173/">CVE-2017-12173</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518273" comment="libipa_hbac0-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518274" comment="libsss_idmap0-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518275" comment="libsss_sudo-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518276" comment="python-sssd-config-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518277" comment="sssd-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518278" comment="sssd-32bit-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518279" comment="sssd-ad-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518280" comment="sssd-ipa-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518281" comment="sssd-krb5-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518282" comment="sssd-krb5-common-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518283" comment="sssd-ldap-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518284" comment="sssd-proxy-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518285" comment="sssd-tools-1.13.4-34.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77960" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1065274" ref_url="https://bugzilla.suse.com/1065274" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15088" ref_url="https://www.suse.com/security/cve/CVE-2017-15088/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2948-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00011.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following issues:

Security issues fixed:

- CVE-2017-15088: A buffer overflow in get_matching_data() was fixed that could under specific circumstances be used to execute code (bsc#1065274)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-08"/>
	<updated date="2017-11-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065274">SUSE bug 1065274</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15088/">CVE-2017-15088</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518286" comment="krb5-1.12.5-40.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518287" comment="krb5-32bit-1.12.5-40.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518288" comment="krb5-client-1.12.5-40.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77961" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1049379" ref_url="https://bugzilla.suse.com/1049379" source="BUGZILLA"/>
		<reference ref_id="1050135" ref_url="https://bugzilla.suse.com/1050135" source="BUGZILLA"/>
		<reference ref_id="1052249" ref_url="https://bugzilla.suse.com/1052249" source="BUGZILLA"/>
		<reference ref_id="1052253" ref_url="https://bugzilla.suse.com/1052253" source="BUGZILLA"/>
		<reference ref_id="1052545" ref_url="https://bugzilla.suse.com/1052545" source="BUGZILLA"/>
		<reference ref_id="1054924" ref_url="https://bugzilla.suse.com/1054924" source="BUGZILLA"/>
		<reference ref_id="1055219" ref_url="https://bugzilla.suse.com/1055219" source="BUGZILLA"/>
		<reference ref_id="1055430" ref_url="https://bugzilla.suse.com/1055430" source="BUGZILLA"/>
		<reference ref_id="1061873" ref_url="https://bugzilla.suse.com/1061873" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7530" ref_url="https://www.suse.com/security/cve/CVE-2016-7530/" source="CVE"/>
		<reference ref_id="CVE-2017-11446" ref_url="https://www.suse.com/security/cve/CVE-2017-11446/" source="CVE"/>
		<reference ref_id="CVE-2017-11534" ref_url="https://www.suse.com/security/cve/CVE-2017-11534/" source="CVE"/>
		<reference ref_id="CVE-2017-12428" ref_url="https://www.suse.com/security/cve/CVE-2017-12428/" source="CVE"/>
		<reference ref_id="CVE-2017-12431" ref_url="https://www.suse.com/security/cve/CVE-2017-12431/" source="CVE"/>
		<reference ref_id="CVE-2017-12433" ref_url="https://www.suse.com/security/cve/CVE-2017-12433/" source="CVE"/>
		<reference ref_id="CVE-2017-13133" ref_url="https://www.suse.com/security/cve/CVE-2017-13133/" source="CVE"/>
		<reference ref_id="CVE-2017-13139" ref_url="https://www.suse.com/security/cve/CVE-2017-13139/" source="CVE"/>
		<reference ref_id="CVE-2017-15033" ref_url="https://www.suse.com/security/cve/CVE-2017-15033/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003381.html" source="SUSE-SU"/>
		<description>


This update for ImageMagick fixes the following issues:

Security issues fixed:

* CVE-2017-15033: A denial of service attack (memory leak) was fixed in ReadYUVImage in coders/yuv.c [bsc#1061873]
* CVE-2017-11446: An infinite loop in ReadPESImage was fixed. (bsc#1049379)
* CVE-2017-12433: A memory leak in ReadPESImage in coders/pes.c was fixed. (bsc#1052545)
* CVE-2017-12428: A memory leak in ReadWMFImage in coders/wmf.c was fixed. (bsc#1052249)
* CVE-2017-12431: A use-after-free in ReadWMFImage was fixed. (bsc#1052253)
* CVE-2017-11534: A memory leak in the lite_font_map() in coders/wmf.c was fixed. (bsc#1050135)
* CVE-2017-13133: A memory exhaustion in load_level function in coders/xcf.c was fixed. (bsc#1055219)
* CVE-2017-13139: A out-of-bounds read in the ReadOneMNGImage was fixed. (bsc#1055430)

This update also reverts an incorrect fix for CVE-2016-7530 [bsc#1054924].
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-08"/>
	<updated date="2017-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049379">SUSE bug 1049379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050135">SUSE bug 1050135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052249">SUSE bug 1052249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052253">SUSE bug 1052253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052545">SUSE bug 1052545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054924">SUSE bug 1054924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055219">SUSE bug 1055219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055430">SUSE bug 1055430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061873">SUSE bug 1061873</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7530/">CVE-2016-7530</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11446/">CVE-2017-11446</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11534/">CVE-2017-11534</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12428/">CVE-2017-12428</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-12431/">CVE-2017-12431</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12433/">CVE-2017-12433</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13133/">CVE-2017-13133</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13139/">CVE-2017-13139</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15033/">CVE-2017-15033</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518289" comment="ImageMagick-6.8.8.1-71.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518290" comment="libMagick++-6_Q16-3-6.8.8.1-71.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518291" comment="libMagickCore-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518292" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518293" comment="libMagickWand-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77962" version="1" class="patch">
	<metadata>
		<title>Security update for shadow (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1023895" ref_url="https://bugzilla.suse.com/1023895" source="BUGZILLA"/>
		<reference ref_id="1052261" ref_url="https://bugzilla.suse.com/1052261" source="BUGZILLA"/>
		<reference ref_id="980486" ref_url="https://bugzilla.suse.com/980486" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12424" ref_url="https://www.suse.com/security/cve/CVE-2017-12424/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003379.html" source="SUSE-SU"/>
		<description>
This update for shadow fixes several issues.

This security issue was fixed:

- CVE-2017-12424: The newusers tool could have been forced to manipulate
  internal data structures in ways unintended by the authors. Malformed input may
  have lead to crashes (with a buffer overflow or other memory corruption) or
  other unspecified behaviors (bsc#1052261).

These non-security issues were fixed:

- bsc#1023895: Fixed man page to not contain invalid options and also prevent
  warnings when using these options in certain settings
- bsc#980486: Reset user in /var/log/tallylog because of the usage of pam_tally2
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-08"/>
	<updated date="2017-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023895">SUSE bug 1023895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052261">SUSE bug 1052261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980486">SUSE bug 980486</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12424/">CVE-2017-12424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518294" comment="shadow-4.2.1-27.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77963" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1059066" ref_url="https://bugzilla.suse.com/1059066" source="BUGZILLA"/>
		<reference ref_id="1059101" ref_url="https://bugzilla.suse.com/1059101" source="BUGZILLA"/>
		<reference ref_id="1059155" ref_url="https://bugzilla.suse.com/1059155" source="BUGZILLA"/>
		<reference ref_id="1061265" ref_url="https://bugzilla.suse.com/1061265" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14517" ref_url="https://www.suse.com/security/cve/CVE-2017-14517/" source="CVE"/>
		<reference ref_id="CVE-2017-14518" ref_url="https://www.suse.com/security/cve/CVE-2017-14518/" source="CVE"/>
		<reference ref_id="CVE-2017-14520" ref_url="https://www.suse.com/security/cve/CVE-2017-14520/" source="CVE"/>
		<reference ref_id="CVE-2017-14977" ref_url="https://www.suse.com/security/cve/CVE-2017-14977/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003384.html" source="SUSE-SU"/>
		<description>
This update for poppler fixes the following issues:

This security issue was fixed:

- CVE-2017-14517: Prevent NULL Pointer dereference in the XRef::parseEntry()
  function via a crafted PDF document (bsc#1059066).
- CVE-2017-14518: Remedy a floating point exception in
  isImageInterpolationRequired() that could have been exploited using a
  specially crafted PDF document. (bsc#1059101)
- CVE-2017-14520: Remedy a floating point exception in
  Splash::scaleImageYuXd() that could have been exploited using a specially
  crafted PDF document. (bsc#1059155)
- CVE-2017-14977: Fixed a NULL pointer dereference vulnerability in the
  FoFiTrueType::getCFFBlock() function in FoFiTrueType.cc that occurred
  due to lack of validation of a table pointer, which allows an attacker
  to launch a denial of service attack. (bsc#1061265)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-08"/>
	<updated date="2017-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1059066">SUSE bug 1059066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059101">SUSE bug 1059101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059155">SUSE bug 1059155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061265">SUSE bug 1061265</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14517/">CVE-2017-14517</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14518/">CVE-2017-14518</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14520/">CVE-2017-14520</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14977/">CVE-2017-14977</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518295" comment="libpoppler44-0.24.4-14.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77964" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1042419" ref_url="https://bugzilla.suse.com/1042419" source="BUGZILLA"/>
		<reference ref_id="1058565" ref_url="https://bugzilla.suse.com/1058565" source="BUGZILLA"/>
		<reference ref_id="1058622" ref_url="https://bugzilla.suse.com/1058622" source="BUGZILLA"/>
		<reference ref_id="1058624" ref_url="https://bugzilla.suse.com/1058624" source="BUGZILLA"/>
		<reference ref_id="1064016" ref_url="https://bugzilla.suse.com/1064016" source="BUGZILLA"/>
		<reference ref_id="1065892" ref_url="https://bugzilla.suse.com/1065892" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12150" ref_url="https://www.suse.com/security/cve/CVE-2017-12150/" source="CVE"/>
		<reference ref_id="CVE-2017-12151" ref_url="https://www.suse.com/security/cve/CVE-2017-12151/" source="CVE"/>
		<reference ref_id="CVE-2017-12163" ref_url="https://www.suse.com/security/cve/CVE-2017-12163/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003390.html" source="SUSE-SU"/>
		<description>

This update for samba fixes several issues.

These security issues were fixed:

- CVE-2017-12163: Prevent client short SMB1 write from writing server memory to
  file, leaking information from the server to the client (bsc#1058624).
- CVE-2017-12150: Always enforce smb signing when it is configured (bsc#1058622).
- CVE-2017-12151: Keep required encryption across SMB3 dfs redirects (bsc#1058565).

This non-security issue was fixed:

- Fix error where short name length was read as 2 bytes, should be 1 (bsc#1042419)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-10"/>
	<updated date="2017-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042419">SUSE bug 1042419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058565">SUSE bug 1058565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058622">SUSE bug 1058622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058624">SUSE bug 1058624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064016">SUSE bug 1064016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065892">SUSE bug 1065892</bugzilla>
	<cve impact="moderate" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12150/">CVE-2017-12150</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12151/">CVE-2017-12151</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12163/">CVE-2017-12163</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518296" comment="libdcerpc-atsvc0-4.2.4-28.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77965" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1032647" ref_url="https://bugzilla.suse.com/1032647" source="BUGZILLA"/>
		<reference ref_id="1052009" ref_url="https://bugzilla.suse.com/1052009" source="BUGZILLA"/>
		<reference ref_id="1064069" ref_url="https://bugzilla.suse.com/1064069" source="BUGZILLA"/>
		<reference ref_id="1064070" ref_url="https://bugzilla.suse.com/1064070" source="BUGZILLA"/>
		<reference ref_id="1064071" ref_url="https://bugzilla.suse.com/1064071" source="BUGZILLA"/>
		<reference ref_id="1064072" ref_url="https://bugzilla.suse.com/1064072" source="BUGZILLA"/>
		<reference ref_id="1064073" ref_url="https://bugzilla.suse.com/1064073" source="BUGZILLA"/>
		<reference ref_id="1064075" ref_url="https://bugzilla.suse.com/1064075" source="BUGZILLA"/>
		<reference ref_id="1064077" ref_url="https://bugzilla.suse.com/1064077" source="BUGZILLA"/>
		<reference ref_id="1064078" ref_url="https://bugzilla.suse.com/1064078" source="BUGZILLA"/>
		<reference ref_id="1064079" ref_url="https://bugzilla.suse.com/1064079" source="BUGZILLA"/>
		<reference ref_id="1064080" ref_url="https://bugzilla.suse.com/1064080" source="BUGZILLA"/>
		<reference ref_id="1064081" ref_url="https://bugzilla.suse.com/1064081" source="BUGZILLA"/>
		<reference ref_id="1064082" ref_url="https://bugzilla.suse.com/1064082" source="BUGZILLA"/>
		<reference ref_id="1064083" ref_url="https://bugzilla.suse.com/1064083" source="BUGZILLA"/>
		<reference ref_id="1064084" ref_url="https://bugzilla.suse.com/1064084" source="BUGZILLA"/>
		<reference ref_id="1064085" ref_url="https://bugzilla.suse.com/1064085" source="BUGZILLA"/>
		<reference ref_id="1064086" ref_url="https://bugzilla.suse.com/1064086" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10165" ref_url="https://www.suse.com/security/cve/CVE-2016-10165/" source="CVE"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-10274" ref_url="https://www.suse.com/security/cve/CVE-2017-10274/" source="CVE"/>
		<reference ref_id="CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281/" source="CVE"/>
		<reference ref_id="CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285/" source="CVE"/>
		<reference ref_id="CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295/" source="CVE"/>
		<reference ref_id="CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345/" source="CVE"/>
		<reference ref_id="CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346/" source="CVE"/>
		<reference ref_id="CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347/" source="CVE"/>
		<reference ref_id="CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348/" source="CVE"/>
		<reference ref_id="CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349/" source="CVE"/>
		<reference ref_id="CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355/" source="CVE"/>
		<reference ref_id="CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356/" source="CVE"/>
		<reference ref_id="CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357/" source="CVE"/>
		<reference ref_id="CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u151 (icedtea 3.6.0)

Security issues fixed:

- CVE-2017-10274: Handle smartcard clean up better (bsc#1064071)
- CVE-2017-10281: Better queuing priorities (bsc#1064072)
- CVE-2017-10285: Unreferenced references (bsc#1064073)
- CVE-2017-10295: Better URL connections (bsc#1064075)
- CVE-2017-10388: Correct Kerberos ticket grants (bsc#1064086)
- CVE-2017-10346: Better invokespecial checks (bsc#1064078)
- CVE-2017-10350: Better Base Exceptions (bsc#1064082)
- CVE-2017-10347: Better timezone processing (bsc#1064079)
- CVE-2017-10349: Better X processing (bsc#1064081)
- CVE-2017-10345: Better keystore handling (bsc#1064077)
- CVE-2017-10348: Better processing of unresolved permissions (bsc#1064080)
- CVE-2017-10357: Process Proxy presentation (bsc#1064085)
- CVE-2017-10355: More stable connection processing (bsc#1064083)
- CVE-2017-10356: Update storage implementations (bsc#1064084)
- CVE-2016-10165: Improve CMS header processing (bsc#1064069)
- CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, CVE-2016-9843: Upgrade compression library (bsc#1064070)

Bug fixes:

- Fix bsc#1032647, bsc#1052009 with btrfs subvolumes and overlayfs
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-10"/>
	<updated date="2017-11-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1032647">SUSE bug 1032647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052009">SUSE bug 1052009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064069">SUSE bug 1064069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064070">SUSE bug 1064070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064071">SUSE bug 1064071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064072">SUSE bug 1064072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064073">SUSE bug 1064073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064075">SUSE bug 1064075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064077">SUSE bug 1064077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064078">SUSE bug 1064078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064079">SUSE bug 1064079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064080">SUSE bug 1064080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064081">SUSE bug 1064081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064082">SUSE bug 1064082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064083">SUSE bug 1064083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064084">SUSE bug 1064084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064085">SUSE bug 1064085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064086">SUSE bug 1064086</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10165/">CVE-2016-10165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10274/">CVE-2017-10274</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518297" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518298" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77966" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1020108" ref_url="https://bugzilla.suse.com/1020108" source="BUGZILLA"/>
		<reference ref_id="963448" ref_url="https://bugzilla.suse.com/963448" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2037" ref_url="https://www.suse.com/security/cve/CVE-2016-2037/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002615.html" source="SUSE-SU"/>
		<description>

This update for cpio fixes two issues.

This security issue was fixed:

- CVE-2016-2037: The cpio_safer_name_suffix function in util.c in cpio allowed remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file (bsc#963448).

This non-security issue was fixed:

- bsc#1020108: Always use 32 bit CRC to prevent checksum errors for files greater than 32MB
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-02"/>
	<updated date="2017-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1020108">SUSE bug 1020108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963448">SUSE bug 963448</bugzilla>
	<cve impact="low" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-2037/">CVE-2016-2037</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517072" comment="cpio-2.11-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517073" comment="cpio-lang-2.11-32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77967" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1005179" ref_url="https://bugzilla.suse.com/1005179" source="BUGZILLA"/>
		<reference ref_id="1007216" ref_url="https://bugzilla.suse.com/1007216" source="BUGZILLA"/>
		<reference ref_id="1008501" ref_url="https://bugzilla.suse.com/1008501" source="BUGZILLA"/>
		<reference ref_id="1008894" ref_url="https://bugzilla.suse.com/1008894" source="BUGZILLA"/>
		<reference ref_id="1014338" ref_url="https://bugzilla.suse.com/1014338" source="BUGZILLA"/>
		<reference ref_id="977940" ref_url="https://bugzilla.suse.com/977940" source="BUGZILLA"/>
		<reference ref_id="982141" ref_url="https://bugzilla.suse.com/982141" source="BUGZILLA"/>
		<reference ref_id="985232" ref_url="https://bugzilla.suse.com/985232" source="BUGZILLA"/>
		<reference ref_id="987144" ref_url="https://bugzilla.suse.com/987144" source="BUGZILLA"/>
		<reference ref_id="990438" ref_url="https://bugzilla.suse.com/990438" source="BUGZILLA"/>
		<reference ref_id="999688" ref_url="https://bugzilla.suse.com/999688" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5009" ref_url="https://www.suse.com/security/cve/CVE-2016-5009/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002616.html" source="SUSE-SU"/>
		<description>

This update for ceph fixes the following issues:

* CVE-2016-5009: moncommand with empty prefix could crash monitor [bsc#987144]
* Invalid commandd in SOC7 with ceph [bsc#1008894]
* Performance fix was missing in SES4 [bsc#1005179]
* ceph build problems on ppc64le [bsc#982141]
* ceph make build unit test failure [bsc#977940]
* ceph-deploy mon create-initial fails on one node [bsc#999688]
* MDS dies while running xfstests  [bsc#985232]
* Typerror while calling _recover_auth_meta() [bsc#1008501]
* OSD daemon uses ~100% CPU load right after OSD creation / first OSD start [bsc#1014338]
* civetweb HTTPS support not working [bsc#990438]
* systemd is killing off OSDs [bsc#1007216]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-28"/>
	<updated date="2017-03-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005179">SUSE bug 1005179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007216">SUSE bug 1007216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008501">SUSE bug 1008501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008894">SUSE bug 1008894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014338">SUSE bug 1014338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977940">SUSE bug 977940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982141">SUSE bug 982141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985232">SUSE bug 985232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987144">SUSE bug 987144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990438">SUSE bug 990438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999688">SUSE bug 999688</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5009/">CVE-2016-5009</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518299" comment="ceph-common-10.2.4+git.1481215985.12b091b-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518300" comment="libcephfs1-10.2.4+git.1481215985.12b091b-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518301" comment="librados2-10.2.4+git.1481215985.12b091b-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518302" comment="libradosstriper1-10.2.4+git.1481215985.12b091b-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518303" comment="librbd1-10.2.4+git.1481215985.12b091b-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518304" comment="python-cephfs-10.2.4+git.1481215985.12b091b-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518305" comment="python-rados-10.2.4+git.1481215985.12b091b-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518306" comment="python-rbd-10.2.4+git.1481215985.12b091b-16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77968" version="1" class="patch">
	<metadata>
		<title>Security update for file (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1009966" ref_url="https://bugzilla.suse.com/1009966" source="BUGZILLA"/>
		<reference ref_id="1063269" ref_url="https://bugzilla.suse.com/1063269" source="BUGZILLA"/>
		<reference ref_id="910252" ref_url="https://bugzilla.suse.com/910252" source="BUGZILLA"/>
		<reference ref_id="910253" ref_url="https://bugzilla.suse.com/910253" source="BUGZILLA"/>
		<reference ref_id="913650" ref_url="https://bugzilla.suse.com/913650" source="BUGZILLA"/>
		<reference ref_id="913651" ref_url="https://bugzilla.suse.com/913651" source="BUGZILLA"/>
		<reference ref_id="917152" ref_url="https://bugzilla.suse.com/917152" source="BUGZILLA"/>
		<reference ref_id="996511" ref_url="https://bugzilla.suse.com/996511" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8116" ref_url="https://www.suse.com/security/cve/CVE-2014-8116/" source="CVE"/>
		<reference ref_id="CVE-2014-8117" ref_url="https://www.suse.com/security/cve/CVE-2014-8117/" source="CVE"/>
		<reference ref_id="CVE-2014-9620" ref_url="https://www.suse.com/security/cve/CVE-2014-9620/" source="CVE"/>
		<reference ref_id="CVE-2014-9621" ref_url="https://www.suse.com/security/cve/CVE-2014-9621/" source="CVE"/>
		<reference ref_id="CVE-2014-9653" ref_url="https://www.suse.com/security/cve/CVE-2014-9653/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003403.html" source="SUSE-SU"/>
		<description>


The GNU file utility was updated to version 5.22.

Security issues fixed:

- CVE-2014-9621: The ELF parser in file allowed remote attackers to cause a denial of service via a long string. (bsc#913650)
- CVE-2014-9620: The ELF parser in file allowed remote attackers to cause a denial of service via a large number of notes. (bsc#913651)
- CVE-2014-9653: readelf.c in file did not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory access) or possibly have unspecified other impact via a crafted ELF file. (bsc#917152)
- CVE-2014-8116: The ELF parser (readelf.c) in file allowed remote attackers to cause a denial of service (CPU consumption or crash) via a large number of (1) program or (2) section headers or (3) invalid capabilities. (bsc#910253)
- CVE-2014-8117: softmagic.c in file did not properly limit recursion, which allowed remote attackers to cause a denial of service (CPU consumption or crash) via unspecified vectors. (bsc#910253)

Version update to file version 5.22

* add indirect relative for TIFF/Exif
* restructure elf note printing to avoid repeated messages
* add note limit, suggested by Alexander Cherepanov
* Bail out on partial pread()'s (Alexander Cherepanov)
* Fix incorrect bounds check in file_printable (Alexander Cherepanov)
* PR/405: ignore SIGPIPE from uncompress programs
* change printable -&gt; file_printable and use it in more places for safety
* in ELF, instead of '(uses dynamic libraries)' when PT_INTERP is present print the interpreter name.

Version update to file version 5.21

* there was an incorrect free in magic_load_buffers()
* there was an out of bounds read for some pascal strings
* there was a memory leak in magic lists
* don't interpret strings printed from files using the current
  locale, convert them to ascii format first.
* there was an out of bounds read in elf note reads

Update to file version 5.20

* recognize encrypted CDF documents
* add magic_load_buffers from Brooks Davis
* add thumbs.db support

Additional non-security bug fixes:

* Fixed a memory corruption during rpmbuild (bsc#1063269)
* Backport of a fix for an increased printable string length as found in file 5.30 (bsc#996511)
* file command throws 'Composite Document File V2 Document, corrupt: Can't read SSAT' error against excel 97/2003 file format. (bsc#1009966)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-22"/>
	<updated date="2017-11-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009966">SUSE bug 1009966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063269">SUSE bug 1063269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910252">SUSE bug 910252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910253">SUSE bug 910253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913650">SUSE bug 913650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913651">SUSE bug 913651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917152">SUSE bug 917152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996511">SUSE bug 996511</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8116/">CVE-2014-8116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8117/">CVE-2014-8117</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9620/">CVE-2014-9620</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9621/">CVE-2014-9621</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9653/">CVE-2014-9653</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518307" comment="file-5.22-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518308" comment="file-magic-5.22-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518309" comment="libmagic1-5.22-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518310" comment="libmagic1-32bit-5.22-10.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77969" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1022727" ref_url="https://bugzilla.suse.com/1022727" source="BUGZILLA"/>
		<reference ref_id="1051150" ref_url="https://bugzilla.suse.com/1051150" source="BUGZILLA"/>
		<reference ref_id="1052984" ref_url="https://bugzilla.suse.com/1052984" source="BUGZILLA"/>
		<reference ref_id="1061107" ref_url="https://bugzilla.suse.com/1061107" source="BUGZILLA"/>
		<reference ref_id="1063034" ref_url="https://bugzilla.suse.com/1063034" source="BUGZILLA"/>
		<reference ref_id="1063035" ref_url="https://bugzilla.suse.com/1063035" source="BUGZILLA"/>
		<reference ref_id="1063037" ref_url="https://bugzilla.suse.com/1063037" source="BUGZILLA"/>
		<reference ref_id="1063038" ref_url="https://bugzilla.suse.com/1063038" source="BUGZILLA"/>
		<reference ref_id="1063039" ref_url="https://bugzilla.suse.com/1063039" source="BUGZILLA"/>
		<reference ref_id="1063040" ref_url="https://bugzilla.suse.com/1063040" source="BUGZILLA"/>
		<reference ref_id="1063041" ref_url="https://bugzilla.suse.com/1063041" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12176" ref_url="https://www.suse.com/security/cve/CVE-2017-12176/" source="CVE"/>
		<reference ref_id="CVE-2017-12177" ref_url="https://www.suse.com/security/cve/CVE-2017-12177/" source="CVE"/>
		<reference ref_id="CVE-2017-12178" ref_url="https://www.suse.com/security/cve/CVE-2017-12178/" source="CVE"/>
		<reference ref_id="CVE-2017-12179" ref_url="https://www.suse.com/security/cve/CVE-2017-12179/" source="CVE"/>
		<reference ref_id="CVE-2017-12180" ref_url="https://www.suse.com/security/cve/CVE-2017-12180/" source="CVE"/>
		<reference ref_id="CVE-2017-12181" ref_url="https://www.suse.com/security/cve/CVE-2017-12181/" source="CVE"/>
		<reference ref_id="CVE-2017-12182" ref_url="https://www.suse.com/security/cve/CVE-2017-12182/" source="CVE"/>
		<reference ref_id="CVE-2017-12183" ref_url="https://www.suse.com/security/cve/CVE-2017-12183/" source="CVE"/>
		<reference ref_id="CVE-2017-12184" ref_url="https://www.suse.com/security/cve/CVE-2017-12184/" source="CVE"/>
		<reference ref_id="CVE-2017-12185" ref_url="https://www.suse.com/security/cve/CVE-2017-12185/" source="CVE"/>
		<reference ref_id="CVE-2017-12186" ref_url="https://www.suse.com/security/cve/CVE-2017-12186/" source="CVE"/>
		<reference ref_id="CVE-2017-12187" ref_url="https://www.suse.com/security/cve/CVE-2017-12187/" source="CVE"/>
		<reference ref_id="CVE-2017-13721" ref_url="https://www.suse.com/security/cve/CVE-2017-13721/" source="CVE"/>
		<reference ref_id="CVE-2017-13723" ref_url="https://www.suse.com/security/cve/CVE-2017-13723/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003402.html" source="SUSE-SU"/>
		<description>


This update for xorg-x11-server fixes several issues.

These security issues were fixed:

- CVE-2017-13721: Missing validation of shmseg resource id in Xext/XShm
  could lead to shared memory segments of other users beeing freed
  (bnc#1052984)
- CVE-2017-13723: A local denial of service via unusual characters in XkbAtomText and XkbStringText was fixed (bnc#1051150)
- CVE-2017-12184,CVE-2017-12185,CVE-2017-12186,CVE-2017-12187: Fixed
  unvalidated lengths in multiple extensions (bsc#1063034)
- CVE-2017-12183: Fixed some unvalidated lengths in the XFIXES
  extension. (bsc#1063035)
- CVE-2017-12180,CVE-2017-12181,CVE-2017-12182: Fixed various unvalidated
  lengths in the XFree86-VidMode/XFree86-DGA/XFree86-DRI extensions
  (bsc#1063037)
- CVE-2017-12179: Fixed an integer overflow and unvalidated length in
  (S)ProcXIBarrierReleasePointer in Xi (bsc#1063038)
- CVE-2017-12178: Fixed a wrong extra length check in
  ProcXIChangeHierarchy in Xi (bsc#1063039)
- CVE-2017-12177: Fixed an unvalidated variable-length request in
  ProcDbeGetVisualInfo (bsc#1063040)
- CVE-2017-12176: Fixed an unvalidated extra length in
  ProcEstablishConnection (bsc#1063041)


These non-security issues were fixed:

- Make colormap/gamma glue code work with the RandR extension disabled. This prevents it
  from crashing and showing wrong colors. (bsc#1061107)
- Recognize ssh as a remote client to fix launching applications remotely when using DRI3.
  (bsc#1022727)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-22"/>
	<updated date="2017-11-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022727">SUSE bug 1022727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051150">SUSE bug 1051150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052984">SUSE bug 1052984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061107">SUSE bug 1061107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063034">SUSE bug 1063034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063035">SUSE bug 1063035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063037">SUSE bug 1063037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063038">SUSE bug 1063038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063039">SUSE bug 1063039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063040">SUSE bug 1063040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063041">SUSE bug 1063041</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12176/">CVE-2017-12176</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12177/">CVE-2017-12177</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12178/">CVE-2017-12178</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12179/">CVE-2017-12179</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12180/">CVE-2017-12180</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12181/">CVE-2017-12181</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12182/">CVE-2017-12182</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12183/">CVE-2017-12183</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12184/">CVE-2017-12184</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12185/">CVE-2017-12185</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12186/">CVE-2017-12186</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12187/">CVE-2017-12187</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-13721/">CVE-2017-13721</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13723/">CVE-2017-13723</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518311" comment="xorg-x11-server-7.6_1.18.3-76.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518312" comment="xorg-x11-server-extra-7.6_1.18.3-76.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77970" version="1" class="patch">
	<metadata>
		<title>Security update for gimp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1050469" ref_url="https://bugzilla.suse.com/1050469" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:3062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003407.html" source="SUSE-SU"/>
		<description>

  
This update for gimp fixes the following issues:

- Don't build gimp with webkit1 support, as it is no longer maintained and has
  plenty of security bugs. 

  This disables the GIMP's built-in help browser; it will use an external browser when configured this way.

  This works around a number of security vulnerabilities in Webkit1.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-23"/>
	<updated date="2017-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518313" comment="gimp-2.8.18-9.3.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518314" comment="gimp-lang-2.8.18-9.3.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518315" comment="gimp-plugins-python-2.8.18-9.3.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518316" comment="libgimp-2_0-0-2.8.18-9.3.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518317" comment="libgimpui-2_0-0-2.8.18-9.3.26 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77971" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1027593" ref_url="https://bugzilla.suse.com/1027593" source="BUGZILLA"/>
		<reference ref_id="1060427" ref_url="https://bugzilla.suse.com/1060427" source="BUGZILLA"/>
		<reference ref_id="1063008" ref_url="https://bugzilla.suse.com/1063008" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14746" ref_url="https://www.suse.com/security/cve/CVE-2017-14746/" source="CVE"/>
		<reference ref_id="CVE-2017-15275" ref_url="https://www.suse.com/security/cve/CVE-2017-15275/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00038.html" source="SUSE-SU"/>
		<description>


This update for samba fixes the following issues:

Security issues fixed:

- CVE-2017-14746: Fixed a use-after-free vulnerability that could be used to crash smbd or potentially execute code (bsc#1060427).
- CVE-2017-15275: Fixed a server heap memory information leak (bsc#1063008).

Non-security issues fixed:

- Update 'winbind expand groups' doc in smb.conf man page;
  (bsc#1027593).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-24"/>
	<updated date="2017-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027593">SUSE bug 1027593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060427">SUSE bug 1060427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063008">SUSE bug 1063008</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14746/">CVE-2017-14746</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15275/">CVE-2017-15275</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518318" comment="libdcerpc-atsvc0-4.2.4-28.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77972" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1047178" ref_url="https://bugzilla.suse.com/1047178" source="BUGZILLA"/>
		<reference ref_id="1057721" ref_url="https://bugzilla.suse.com/1057721" source="BUGZILLA"/>
		<reference ref_id="1057724" ref_url="https://bugzilla.suse.com/1057724" source="BUGZILLA"/>
		<reference ref_id="999735" ref_url="https://bugzilla.suse.com/999735" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12837" ref_url="https://www.suse.com/security/cve/CVE-2017-12837/" source="CVE"/>
		<reference ref_id="CVE-2017-12883" ref_url="https://www.suse.com/security/cve/CVE-2017-12883/" source="CVE"/>
		<reference ref_id="CVE-2017-6512" ref_url="https://www.suse.com/security/cve/CVE-2017-6512/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003416.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

Security issues fixed:
- CVE-2017-12837: Heap-based buffer overflow in the S_regatom function in regcomp.c in Perl 5 before
  5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to cause a denial of service
  (out-of-bounds write) via a regular expression with a '\N{}' escape and the case-insensitive
  modifier. (bnc#1057724)
- CVE-2017-12883: Buffer overflow in the S_grok_bslash_N function in regcomp.c in Perl 5 before
  5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to disclose sensitive information
  or cause a denial of service (application crash) via a crafted regular expression with an invalid
  '\N{U+...}' escape. (bnc#1057721)
- CVE-2017-6512: Race condition in the rmtree and remove_tree functions in the File-Path module
  before 2.13 for Perl allows attackers to set the mode on arbitrary files via vectors involving
  directory-permission loosening logic. (bnc#1047178)

Bug fixes:
- backport set_capture_string changes from upstream (bsc#999735)
- reformat baselibs.conf as source validator workaround
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-24"/>
	<updated date="2017-11-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047178">SUSE bug 1047178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057721">SUSE bug 1057721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057724">SUSE bug 1057724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999735">SUSE bug 999735</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12837/">CVE-2017-12837</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12883/">CVE-2017-12883</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-6512/">CVE-2017-6512</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518319" comment="perl-5.18.2-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518320" comment="perl-32bit-5.18.2-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518321" comment="perl-base-5.18.2-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518322" comment="perl-doc-5.18.2-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77973" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1066295" ref_url="https://bugzilla.suse.com/1066295" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00042.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

- Update Intel WiFi firmwares for the 3160, 7260 and 7265 adapters.

Security issues fixed are part of the 'KRACK' attacks affecting the firmware:

- CVE-2017-13080: The reinstallation of the Group Temporal key could be used for replay attacks (bsc#1066295):
- CVE-2017-13081: The reinstallation of the Integrity Group Temporal key could be used for replay attacks (bsc#1066295):
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-27"/>
	<updated date="2017-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1066295">SUSE bug 1066295</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518323" comment="kernel-firmware-20170530-21.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518324" comment="ucode-amd-20170530-21.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77974" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1027593" ref_url="https://bugzilla.suse.com/1027593" source="BUGZILLA"/>
		<reference ref_id="1060427" ref_url="https://bugzilla.suse.com/1060427" source="BUGZILLA"/>
		<reference ref_id="1063008" ref_url="https://bugzilla.suse.com/1063008" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14746" ref_url="https://www.suse.com/security/cve/CVE-2017-14746/" source="CVE"/>
		<reference ref_id="CVE-2017-15275" ref_url="https://www.suse.com/security/cve/CVE-2017-15275/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3104-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00041.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

Security issues fixed:

- CVE-2017-14746: Use-after-free vulnerability (bsc#1060427).
- CVE-2017-15275: Server heap memory information leak (bsc#1063008).

Bug fixes:

- Update 'winbind expand groups' doc in smb.conf man page (bsc#1027593).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-27"/>
	<updated date="2017-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027593">SUSE bug 1027593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060427">SUSE bug 1060427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063008">SUSE bug 1063008</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14746/">CVE-2017-14746</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15275/">CVE-2017-15275</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518325" comment="libdcerpc-binding0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518326" comment="libdcerpc-binding0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518327" comment="libdcerpc0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518328" comment="libdcerpc0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518329" comment="libndr-krb5pac0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518330" comment="libndr-krb5pac0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518331" comment="libndr-nbt0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518332" comment="libndr-nbt0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518333" comment="libndr-standard0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518334" comment="libndr-standard0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518335" comment="libndr0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518336" comment="libndr0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518337" comment="libnetapi0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518338" comment="libnetapi0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518339" comment="libsamba-credentials0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518340" comment="libsamba-credentials0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518341" comment="libsamba-errors0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518342" comment="libsamba-errors0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518343" comment="libsamba-hostconfig0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518344" comment="libsamba-hostconfig0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518345" comment="libsamba-passdb0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518346" comment="libsamba-passdb0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518347" comment="libsamba-util0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518348" comment="libsamba-util0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518349" comment="libsamdb0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518350" comment="libsamdb0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518351" comment="libsmbclient0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518352" comment="libsmbclient0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518353" comment="libsmbconf0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518354" comment="libsmbconf0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518355" comment="libsmbldap0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518356" comment="libsmbldap0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518357" comment="libtevent-util0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518358" comment="libtevent-util0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518359" comment="libwbclient0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518360" comment="libwbclient0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518361" comment="samba-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518362" comment="samba-client-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518363" comment="samba-client-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518364" comment="samba-doc-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518365" comment="samba-libs-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518366" comment="samba-libs-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518367" comment="samba-winbind-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518368" comment="samba-winbind-32bit-4.4.2-38.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77975" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1005544" ref_url="https://bugzilla.suse.com/1005544" source="BUGZILLA"/>
		<reference ref_id="1010675" ref_url="https://bugzilla.suse.com/1010675" source="BUGZILLA"/>
		<reference ref_id="1013930" ref_url="https://bugzilla.suse.com/1013930" source="BUGZILLA"/>
		<reference ref_id="1014873" ref_url="https://bugzilla.suse.com/1014873" source="BUGZILLA"/>
		<reference ref_id="1017497" ref_url="https://bugzilla.suse.com/1017497" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4658" ref_url="https://www.suse.com/security/cve/CVE-2016-4658/" source="CVE"/>
		<reference ref_id="CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318/" source="CVE"/>
		<reference ref_id="CVE-2016-9597" ref_url="https://www.suse.com/security/cve/CVE-2016-9597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002619.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following issues:

* CVE-2016-4658: use-after-free error could lead to crash [bsc#1005544]
* Fix NULL dereference in xpointer.c when in recovery mode [bsc#1014873]
* CVE-2016-9597: An XML document with many opening tags could have caused a overflow of the stack not detected by the recursion limits, allowing for DoS (bsc#1017497).

For CVE-2016-9318 we decided not to ship a fix since it can break existing setups. Please take appropriate actions if you parse untrusted XML files
and use the new -noxxe flag if possible (bnc#1010675, bnc#1013930).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-03"/>
	<updated date="2017-02-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005544">SUSE bug 1005544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013930">SUSE bug 1013930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014873">SUSE bug 1014873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017497">SUSE bug 1017497</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4658/">CVE-2016-4658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9597/">CVE-2016-9597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518369" comment="libxml2-2-2.9.4-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518370" comment="libxml2-2-32bit-2.9.4-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518371" comment="libxml2-tools-2.9.4-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518372" comment="python-libxml2-2.9.4-33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77976" version="1" class="patch">
	<metadata>
		<title>Security update for guile (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1004221" ref_url="https://bugzilla.suse.com/1004221" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8605" ref_url="https://www.suse.com/security/cve/CVE-2016-8605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002624.html" source="SUSE-SU"/>
		<description>

This update for guile fixes the following issues:

- CVE-2016-8605: Fixed thread-unsafe umask modification (bsc#1004221).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-06"/>
	<updated date="2017-02-06"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1004221">SUSE bug 1004221</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8605/">CVE-2016-8605</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517074" comment="guile-2.0.9-8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517075" comment="guile-modules-2_0-2.0.9-8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517076" comment="libguile-2_0-22-2.0.9-8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77977" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1055825" ref_url="https://bugzilla.suse.com/1055825" source="BUGZILLA"/>
		<reference ref_id="1056058" ref_url="https://bugzilla.suse.com/1056058" source="BUGZILLA"/>
		<reference ref_id="1065363" ref_url="https://bugzilla.suse.com/1065363" source="BUGZILLA"/>
		<reference ref_id="1066242" ref_url="https://bugzilla.suse.com/1066242" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3735" ref_url="https://www.suse.com/security/cve/CVE-2017-3735/" source="CVE"/>
		<reference ref_id="CVE-2017-3736" ref_url="https://www.suse.com/security/cve/CVE-2017-3736/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003461.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed:

- CVE-2017-3735: openssl1,openssl: Malformed X.509 IPAdressFamily could cause OOB read (bsc#1056058)
- CVE-2017-3736: openssl: bn_sqrx8x_internal carry bug on x86_64 (bsc#1066242)
- Out of bounds read+crash in DES_fcrypt (bsc#1065363)
- openssl DEFAULT_SUSE cipher list is missing ECDHE-ECDSA ciphers (bsc#1055825)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-30"/>
	<updated date="2017-11-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1055825">SUSE bug 1055825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056058">SUSE bug 1056058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065363">SUSE bug 1065363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066242">SUSE bug 1066242</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3735/">CVE-2017-3735</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3736/">CVE-2017-3736</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518373" comment="libopenssl-devel-1.0.2j-60.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518374" comment="libopenssl1_0_0-1.0.2j-60.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518375" comment="libopenssl1_0_0-32bit-1.0.2j-60.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518376" comment="openssl-1.0.2j-60.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77978" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1003846" ref_url="https://bugzilla.suse.com/1003846" source="BUGZILLA"/>
		<reference ref_id="1025282" ref_url="https://bugzilla.suse.com/1025282" source="BUGZILLA"/>
		<reference ref_id="1029907" ref_url="https://bugzilla.suse.com/1029907" source="BUGZILLA"/>
		<reference ref_id="1029908" ref_url="https://bugzilla.suse.com/1029908" source="BUGZILLA"/>
		<reference ref_id="1029909" ref_url="https://bugzilla.suse.com/1029909" source="BUGZILLA"/>
		<reference ref_id="1029995" ref_url="https://bugzilla.suse.com/1029995" source="BUGZILLA"/>
		<reference ref_id="1030296" ref_url="https://bugzilla.suse.com/1030296" source="BUGZILLA"/>
		<reference ref_id="1030297" ref_url="https://bugzilla.suse.com/1030297" source="BUGZILLA"/>
		<reference ref_id="1030298" ref_url="https://bugzilla.suse.com/1030298" source="BUGZILLA"/>
		<reference ref_id="1030583" ref_url="https://bugzilla.suse.com/1030583" source="BUGZILLA"/>
		<reference ref_id="1030584" ref_url="https://bugzilla.suse.com/1030584" source="BUGZILLA"/>
		<reference ref_id="1030585" ref_url="https://bugzilla.suse.com/1030585" source="BUGZILLA"/>
		<reference ref_id="1030588" ref_url="https://bugzilla.suse.com/1030588" source="BUGZILLA"/>
		<reference ref_id="1030589" ref_url="https://bugzilla.suse.com/1030589" source="BUGZILLA"/>
		<reference ref_id="1031590" ref_url="https://bugzilla.suse.com/1031590" source="BUGZILLA"/>
		<reference ref_id="1031593" ref_url="https://bugzilla.suse.com/1031593" source="BUGZILLA"/>
		<reference ref_id="1031595" ref_url="https://bugzilla.suse.com/1031595" source="BUGZILLA"/>
		<reference ref_id="1031638" ref_url="https://bugzilla.suse.com/1031638" source="BUGZILLA"/>
		<reference ref_id="1031644" ref_url="https://bugzilla.suse.com/1031644" source="BUGZILLA"/>
		<reference ref_id="1031656" ref_url="https://bugzilla.suse.com/1031656" source="BUGZILLA"/>
		<reference ref_id="1033122" ref_url="https://bugzilla.suse.com/1033122" source="BUGZILLA"/>
		<reference ref_id="1037052" ref_url="https://bugzilla.suse.com/1037052" source="BUGZILLA"/>
		<reference ref_id="1037057" ref_url="https://bugzilla.suse.com/1037057" source="BUGZILLA"/>
		<reference ref_id="1037061" ref_url="https://bugzilla.suse.com/1037061" source="BUGZILLA"/>
		<reference ref_id="1037062" ref_url="https://bugzilla.suse.com/1037062" source="BUGZILLA"/>
		<reference ref_id="1037066" ref_url="https://bugzilla.suse.com/1037066" source="BUGZILLA"/>
		<reference ref_id="1037070" ref_url="https://bugzilla.suse.com/1037070" source="BUGZILLA"/>
		<reference ref_id="1037072" ref_url="https://bugzilla.suse.com/1037072" source="BUGZILLA"/>
		<reference ref_id="1037273" ref_url="https://bugzilla.suse.com/1037273" source="BUGZILLA"/>
		<reference ref_id="1038874" ref_url="https://bugzilla.suse.com/1038874" source="BUGZILLA"/>
		<reference ref_id="1038875" ref_url="https://bugzilla.suse.com/1038875" source="BUGZILLA"/>
		<reference ref_id="1038876" ref_url="https://bugzilla.suse.com/1038876" source="BUGZILLA"/>
		<reference ref_id="1038877" ref_url="https://bugzilla.suse.com/1038877" source="BUGZILLA"/>
		<reference ref_id="1038878" ref_url="https://bugzilla.suse.com/1038878" source="BUGZILLA"/>
		<reference ref_id="1038880" ref_url="https://bugzilla.suse.com/1038880" source="BUGZILLA"/>
		<reference ref_id="1038881" ref_url="https://bugzilla.suse.com/1038881" source="BUGZILLA"/>
		<reference ref_id="1044891" ref_url="https://bugzilla.suse.com/1044891" source="BUGZILLA"/>
		<reference ref_id="1044897" ref_url="https://bugzilla.suse.com/1044897" source="BUGZILLA"/>
		<reference ref_id="1044901" ref_url="https://bugzilla.suse.com/1044901" source="BUGZILLA"/>
		<reference ref_id="1044909" ref_url="https://bugzilla.suse.com/1044909" source="BUGZILLA"/>
		<reference ref_id="1044925" ref_url="https://bugzilla.suse.com/1044925" source="BUGZILLA"/>
		<reference ref_id="1044927" ref_url="https://bugzilla.suse.com/1044927" source="BUGZILLA"/>
		<reference ref_id="1046094" ref_url="https://bugzilla.suse.com/1046094" source="BUGZILLA"/>
		<reference ref_id="1052061" ref_url="https://bugzilla.suse.com/1052061" source="BUGZILLA"/>
		<reference ref_id="1052496" ref_url="https://bugzilla.suse.com/1052496" source="BUGZILLA"/>
		<reference ref_id="1052503" ref_url="https://bugzilla.suse.com/1052503" source="BUGZILLA"/>
		<reference ref_id="1052507" ref_url="https://bugzilla.suse.com/1052507" source="BUGZILLA"/>
		<reference ref_id="1052509" ref_url="https://bugzilla.suse.com/1052509" source="BUGZILLA"/>
		<reference ref_id="1052511" ref_url="https://bugzilla.suse.com/1052511" source="BUGZILLA"/>
		<reference ref_id="1052514" ref_url="https://bugzilla.suse.com/1052514" source="BUGZILLA"/>
		<reference ref_id="1052518" ref_url="https://bugzilla.suse.com/1052518" source="BUGZILLA"/>
		<reference ref_id="1053347" ref_url="https://bugzilla.suse.com/1053347" source="BUGZILLA"/>
		<reference ref_id="1056312" ref_url="https://bugzilla.suse.com/1056312" source="BUGZILLA"/>
		<reference ref_id="1056437" ref_url="https://bugzilla.suse.com/1056437" source="BUGZILLA"/>
		<reference ref_id="1057139" ref_url="https://bugzilla.suse.com/1057139" source="BUGZILLA"/>
		<reference ref_id="1057144" ref_url="https://bugzilla.suse.com/1057144" source="BUGZILLA"/>
		<reference ref_id="1057149" ref_url="https://bugzilla.suse.com/1057149" source="BUGZILLA"/>
		<reference ref_id="1058480" ref_url="https://bugzilla.suse.com/1058480" source="BUGZILLA"/>
		<reference ref_id="1059050" ref_url="https://bugzilla.suse.com/1059050" source="BUGZILLA"/>
		<reference ref_id="1060599" ref_url="https://bugzilla.suse.com/1060599" source="BUGZILLA"/>
		<reference ref_id="1060621" ref_url="https://bugzilla.suse.com/1060621" source="BUGZILLA"/>
		<reference ref_id="1061241" ref_url="https://bugzilla.suse.com/1061241" source="BUGZILLA"/>
		<reference ref_id="437293" ref_url="https://bugzilla.suse.com/437293" source="BUGZILLA"/>
		<reference ref_id="445037" ref_url="https://bugzilla.suse.com/445037" source="BUGZILLA"/>
		<reference ref_id="546106" ref_url="https://bugzilla.suse.com/546106" source="BUGZILLA"/>
		<reference ref_id="561142" ref_url="https://bugzilla.suse.com/561142" source="BUGZILLA"/>
		<reference ref_id="578249" ref_url="https://bugzilla.suse.com/578249" source="BUGZILLA"/>
		<reference ref_id="590820" ref_url="https://bugzilla.suse.com/590820" source="BUGZILLA"/>
		<reference ref_id="691290" ref_url="https://bugzilla.suse.com/691290" source="BUGZILLA"/>
		<reference ref_id="698346" ref_url="https://bugzilla.suse.com/698346" source="BUGZILLA"/>
		<reference ref_id="713504" ref_url="https://bugzilla.suse.com/713504" source="BUGZILLA"/>
		<reference ref_id="776968" ref_url="https://bugzilla.suse.com/776968" source="BUGZILLA"/>
		<reference ref_id="863764" ref_url="https://bugzilla.suse.com/863764" source="BUGZILLA"/>
		<reference ref_id="938658" ref_url="https://bugzilla.suse.com/938658" source="BUGZILLA"/>
		<reference ref_id="970239" ref_url="https://bugzilla.suse.com/970239" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9939" ref_url="https://www.suse.com/security/cve/CVE-2014-9939/" source="CVE"/>
		<reference ref_id="CVE-2017-12448" ref_url="https://www.suse.com/security/cve/CVE-2017-12448/" source="CVE"/>
		<reference ref_id="CVE-2017-12450" ref_url="https://www.suse.com/security/cve/CVE-2017-12450/" source="CVE"/>
		<reference ref_id="CVE-2017-12452" ref_url="https://www.suse.com/security/cve/CVE-2017-12452/" source="CVE"/>
		<reference ref_id="CVE-2017-12453" ref_url="https://www.suse.com/security/cve/CVE-2017-12453/" source="CVE"/>
		<reference ref_id="CVE-2017-12454" ref_url="https://www.suse.com/security/cve/CVE-2017-12454/" source="CVE"/>
		<reference ref_id="CVE-2017-12456" ref_url="https://www.suse.com/security/cve/CVE-2017-12456/" source="CVE"/>
		<reference ref_id="CVE-2017-12799" ref_url="https://www.suse.com/security/cve/CVE-2017-12799/" source="CVE"/>
		<reference ref_id="CVE-2017-13757" ref_url="https://www.suse.com/security/cve/CVE-2017-13757/" source="CVE"/>
		<reference ref_id="CVE-2017-14128" ref_url="https://www.suse.com/security/cve/CVE-2017-14128/" source="CVE"/>
		<reference ref_id="CVE-2017-14129" ref_url="https://www.suse.com/security/cve/CVE-2017-14129/" source="CVE"/>
		<reference ref_id="CVE-2017-14130" ref_url="https://www.suse.com/security/cve/CVE-2017-14130/" source="CVE"/>
		<reference ref_id="CVE-2017-14333" ref_url="https://www.suse.com/security/cve/CVE-2017-14333/" source="CVE"/>
		<reference ref_id="CVE-2017-14529" ref_url="https://www.suse.com/security/cve/CVE-2017-14529/" source="CVE"/>
		<reference ref_id="CVE-2017-14729" ref_url="https://www.suse.com/security/cve/CVE-2017-14729/" source="CVE"/>
		<reference ref_id="CVE-2017-14745" ref_url="https://www.suse.com/security/cve/CVE-2017-14745/" source="CVE"/>
		<reference ref_id="CVE-2017-14974" ref_url="https://www.suse.com/security/cve/CVE-2017-14974/" source="CVE"/>
		<reference ref_id="CVE-2017-6965" ref_url="https://www.suse.com/security/cve/CVE-2017-6965/" source="CVE"/>
		<reference ref_id="CVE-2017-6966" ref_url="https://www.suse.com/security/cve/CVE-2017-6966/" source="CVE"/>
		<reference ref_id="CVE-2017-6969" ref_url="https://www.suse.com/security/cve/CVE-2017-6969/" source="CVE"/>
		<reference ref_id="CVE-2017-7209" ref_url="https://www.suse.com/security/cve/CVE-2017-7209/" source="CVE"/>
		<reference ref_id="CVE-2017-7210" ref_url="https://www.suse.com/security/cve/CVE-2017-7210/" source="CVE"/>
		<reference ref_id="CVE-2017-7223" ref_url="https://www.suse.com/security/cve/CVE-2017-7223/" source="CVE"/>
		<reference ref_id="CVE-2017-7224" ref_url="https://www.suse.com/security/cve/CVE-2017-7224/" source="CVE"/>
		<reference ref_id="CVE-2017-7225" ref_url="https://www.suse.com/security/cve/CVE-2017-7225/" source="CVE"/>
		<reference ref_id="CVE-2017-7226" ref_url="https://www.suse.com/security/cve/CVE-2017-7226/" source="CVE"/>
		<reference ref_id="CVE-2017-7227" ref_url="https://www.suse.com/security/cve/CVE-2017-7227/" source="CVE"/>
		<reference ref_id="CVE-2017-7299" ref_url="https://www.suse.com/security/cve/CVE-2017-7299/" source="CVE"/>
		<reference ref_id="CVE-2017-7300" ref_url="https://www.suse.com/security/cve/CVE-2017-7300/" source="CVE"/>
		<reference ref_id="CVE-2017-7301" ref_url="https://www.suse.com/security/cve/CVE-2017-7301/" source="CVE"/>
		<reference ref_id="CVE-2017-7302" ref_url="https://www.suse.com/security/cve/CVE-2017-7302/" source="CVE"/>
		<reference ref_id="CVE-2017-7303" ref_url="https://www.suse.com/security/cve/CVE-2017-7303/" source="CVE"/>
		<reference ref_id="CVE-2017-7304" ref_url="https://www.suse.com/security/cve/CVE-2017-7304/" source="CVE"/>
		<reference ref_id="CVE-2017-7614" ref_url="https://www.suse.com/security/cve/CVE-2017-7614/" source="CVE"/>
		<reference ref_id="CVE-2017-8392" ref_url="https://www.suse.com/security/cve/CVE-2017-8392/" source="CVE"/>
		<reference ref_id="CVE-2017-8393" ref_url="https://www.suse.com/security/cve/CVE-2017-8393/" source="CVE"/>
		<reference ref_id="CVE-2017-8394" ref_url="https://www.suse.com/security/cve/CVE-2017-8394/" source="CVE"/>
		<reference ref_id="CVE-2017-8395" ref_url="https://www.suse.com/security/cve/CVE-2017-8395/" source="CVE"/>
		<reference ref_id="CVE-2017-8396" ref_url="https://www.suse.com/security/cve/CVE-2017-8396/" source="CVE"/>
		<reference ref_id="CVE-2017-8397" ref_url="https://www.suse.com/security/cve/CVE-2017-8397/" source="CVE"/>
		<reference ref_id="CVE-2017-8398" ref_url="https://www.suse.com/security/cve/CVE-2017-8398/" source="CVE"/>
		<reference ref_id="CVE-2017-8421" ref_url="https://www.suse.com/security/cve/CVE-2017-8421/" source="CVE"/>
		<reference ref_id="CVE-2017-9038" ref_url="https://www.suse.com/security/cve/CVE-2017-9038/" source="CVE"/>
		<reference ref_id="CVE-2017-9039" ref_url="https://www.suse.com/security/cve/CVE-2017-9039/" source="CVE"/>
		<reference ref_id="CVE-2017-9040" ref_url="https://www.suse.com/security/cve/CVE-2017-9040/" source="CVE"/>
		<reference ref_id="CVE-2017-9041" ref_url="https://www.suse.com/security/cve/CVE-2017-9041/" source="CVE"/>
		<reference ref_id="CVE-2017-9042" ref_url="https://www.suse.com/security/cve/CVE-2017-9042/" source="CVE"/>
		<reference ref_id="CVE-2017-9043" ref_url="https://www.suse.com/security/cve/CVE-2017-9043/" source="CVE"/>
		<reference ref_id="CVE-2017-9044" ref_url="https://www.suse.com/security/cve/CVE-2017-9044/" source="CVE"/>
		<reference ref_id="CVE-2017-9746" ref_url="https://www.suse.com/security/cve/CVE-2017-9746/" source="CVE"/>
		<reference ref_id="CVE-2017-9747" ref_url="https://www.suse.com/security/cve/CVE-2017-9747/" source="CVE"/>
		<reference ref_id="CVE-2017-9748" ref_url="https://www.suse.com/security/cve/CVE-2017-9748/" source="CVE"/>
		<reference ref_id="CVE-2017-9750" ref_url="https://www.suse.com/security/cve/CVE-2017-9750/" source="CVE"/>
		<reference ref_id="CVE-2017-9755" ref_url="https://www.suse.com/security/cve/CVE-2017-9755/" source="CVE"/>
		<reference ref_id="CVE-2017-9756" ref_url="https://www.suse.com/security/cve/CVE-2017-9756/" source="CVE"/>
		<reference ref_id="CVE-2017-9954" ref_url="https://www.suse.com/security/cve/CVE-2017-9954/" source="CVE"/>
		<reference ref_id="CVE-2017-9955" ref_url="https://www.suse.com/security/cve/CVE-2017-9955/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<description>


GNU binutil was updated to the 2.29.1 release, bringing various new features, fixing a lot of bugs and security issues.

Following security issues are being addressed by this release:

  * 18750 bsc#1030296 CVE-2014-9939
  * 20891 bsc#1030585 CVE-2017-7225
  * 20892 bsc#1030588 CVE-2017-7224
  * 20898 bsc#1030589 CVE-2017-7223
  * 20905 bsc#1030584 CVE-2017-7226
  * 20908 bsc#1031644 CVE-2017-7299
  * 20909 bsc#1031656 CVE-2017-7300
  * 20921 bsc#1031595 CVE-2017-7302
  * 20922 bsc#1031593 CVE-2017-7303
  * 20924 bsc#1031638 CVE-2017-7301
  * 20931 bsc#1031590 CVE-2017-7304
  * 21135 bsc#1030298 CVE-2017-7209 
  * 21137 bsc#1029909 CVE-2017-6965
  * 21139 bsc#1029908 CVE-2017-6966
  * 21156 bsc#1029907 CVE-2017-6969
  * 21157 bsc#1030297 CVE-2017-7210
  * 21409 bsc#1037052 CVE-2017-8392
  * 21412 bsc#1037057 CVE-2017-8393
  * 21414 bsc#1037061 CVE-2017-8394
  * 21432 bsc#1037066 CVE-2017-8396
  * 21440 bsc#1037273 CVE-2017-8421
  * 21580 bsc#1044891 CVE-2017-9746
  * 21581 bsc#1044897 CVE-2017-9747
  * 21582 bsc#1044901 CVE-2017-9748
  * 21587 bsc#1044909 CVE-2017-9750
  * 21594 bsc#1044925 CVE-2017-9755
  * 21595 bsc#1044927 CVE-2017-9756
  * 21787 bsc#1052518 CVE-2017-12448
  * 21813 bsc#1052503, CVE-2017-12456, bsc#1052507, CVE-2017-12454, bsc#1052509, CVE-2017-12453, bsc#1052511, CVE-2017-12452, bsc#1052514, CVE-2017-12450, bsc#1052503, CVE-2017-12456, bsc#1052507, CVE-2017-12454, bsc#1052509, CVE-2017-12453, bsc#1052511, CVE-2017-12452, bsc#1052514, CVE-2017-12450
  * 21933 bsc#1053347 CVE-2017-12799
  * 21990 bsc#1058480 CVE-2017-14333
  * 22018 bsc#1056312 CVE-2017-13757
  * 22047 bsc#1057144 CVE-2017-14129
  * 22058 bsc#1057149 CVE-2017-14130
  * 22059 bsc#1057139 CVE-2017-14128
  * 22113 bsc#1059050 CVE-2017-14529
  * 22148 bsc#1060599 CVE-2017-14745
  * 22163 bsc#1061241 CVE-2017-14974
  * 22170 bsc#1060621 CVE-2017-14729

Update to binutils 2.29. [fate#321454, fate#321494, fate#323293]:

  * The MIPS port now supports microMIPS eXtended Physical Addressing (XPA)
    instructions for assembly and disassembly.
  * The MIPS port now supports the microMIPS Release 5 ISA for assembly and
    disassembly.
  * The MIPS port now supports the Imagination interAptiv MR2 processor,
    which implements the MIPS32r3 ISA, the MIPS16e2 ASE as well as a couple
    of implementation-specific regular MIPS and MIPS16e2 ASE instructions.
  * The SPARC port now supports the SPARC M8 processor, which implements the
    Oracle SPARC Architecture 2017.
  * The MIPS port now supports the MIPS16e2 ASE for assembly and disassembly.
  * Add support for ELF SHF_GNU_MBIND and PT_GNU_MBIND_XXX.
  * Add support for the wasm32 ELF conversion of the WebAssembly file format.
  * Add --inlines option to objdump, which extends the --line-numbers option
    so that inlined functions will display their nesting information.
  * Add --merge-notes options to objcopy to reduce the size of notes in
    a binary file by merging and deleting redundant notes.
  * Add support for locating separate debug info files using the build-id
    method, where the separate file has a name based upon the build-id of
    the original file.

- GAS specific:

  * Add support for ELF SHF_GNU_MBIND.
  * Add support for the WebAssembly file format and wasm32 ELF conversion.
  * PowerPC gas now checks that the correct register class is used in
    instructions.  For instance, 'addi %f4,%cr3,%r31' warns three times
    that the registers are invalid.
  * Add support for the Texas Instruments PRU processor.
  * Support for the ARMv8-R architecture and Cortex-R52 processor has been
    added to the ARM port.

- GNU ld specific:

  * Support for -z shstk in the x86 ELF linker to generate
    GNU_PROPERTY_X86_FEATURE_1_SHSTK in ELF GNU program properties.
  * Add support for GNU_PROPERTY_X86_FEATURE_1_SHSTK in ELF GNU program
    properties in the x86 ELF linker.
  * Add support for GNU_PROPERTY_X86_FEATURE_1_IBT in ELF GNU program
    properties in the x86 ELF linker.
  * Support for -z ibtplt in the x86 ELF linker to generate IBT-enabled
    PLT.
  * Support for -z ibt in the x86 ELF linker to generate IBT-enabled
    PLT as well as GNU_PROPERTY_X86_FEATURE_1_IBT in ELF GNU program
    properties.
  * Add support for ELF SHF_GNU_MBIND and PT_GNU_MBIND_XXX.
  * Add support for ELF GNU program properties.
  * Add support for the Texas Instruments PRU processor.
  * When configuring for arc*-*-linux* targets the default linker emulation will
    change if --with-cpu=nps400 is used at configure time.
  * Improve assignment of LMAs to orphan sections in some edge cases where a
    mixture of both AT&gt;LMA_REGION and AT(LMA) are used.
  * Orphan sections placed after an empty section that has an AT(LMA) will now
    take an load memory address starting from LMA.
  * Section groups can now be resolved (the group deleted and the group members
    placed like normal sections) at partial link time either using the new
    linker option --force-group-allocation or by placing FORCE_GROUP_ALLOCATION
    into the linker script.

- Add riscv64 target, tested with gcc7 and downstream newlib 2.4.0
- Prepare riscv32 target (gh#riscv/riscv-newlib#8)
- Make compressed debug section handling explicit, disable for
  old products and enable for gas on all architectures otherwise. [bsc#1029995]
- Remove empty rpath component removal optimization from to workaround
  CMake rpath handling.  [bsc#1025282]


  Minor security bugs fixed:
  PR 21147, PR 21148, PR 21149, PR 21150, PR 21151, PR 21155, PR 21158, PR 21159

- Update to binutils 2.28.

  * Add support for locating separate debug info files using the build-id
    method, where the separate file has a name based upon the build-id of
    the original file.
  * This version of binutils fixes a problem with PowerPC VLE 16A and 16D
    relocations which were functionally swapped, for example,
    R_PPC_VLE_HA16A performed like R_PPC_VLE_HA16D while R_PPC_VLE_HA16D
    performed like R_PPC_VLE_HA16A.  This could have been fixed by
    renumbering relocations, which would keep object files created by an
    older version of gas compatible with a newer ld.  However, that would
    require an ABI update, affecting other assemblers and linkers that
    create and process the relocations correctly.  It is recommended that
    all VLE object files be recompiled, but ld can modify the relocations
    if --vle-reloc-fixup is passed to ld.  If the new ld command line
    option is not used, ld will ld warn on finding relocations inconsistent
    with the instructions being relocated.
  * The nm program has a new command line option (--with-version-strings)
    which will display a symbol's version information, if any, after the
    symbol's name.
  * The ARC port of objdump now accepts a -M option to specify the extra
    instruction class(es) that should be disassembled.
  * The --remove-section option for objcopy and strip now accepts section
    patterns starting with an exclamation point to indicate a non-matching
    section.  A non-matching section is removed from the set of sections
    matched by an earlier --remove-section pattern.
  * The --only-section option for objcopy now accepts section patterns
    starting with an exclamation point to indicate a non-matching section.
    A non-matching section is removed from the set of sections matched by
    an earlier --only-section pattern.
  * New --remove-relocations=SECTIONPATTERN option for objcopy and strip.
    This option can be used to remove sections containing relocations.
    The SECTIONPATTERN is the section to which the relocations apply, not
    the relocation section itself.

- GAS specific:

  * Add support for the RISC-V architecture.
  * Add support for the ARM Cortex-M23 and Cortex-M33 processors.

- GNU ld specific:

  * The EXCLUDE_FILE linker script construct can now be applied outside of the
    section list in order for the exclusions to apply over all input sections
    in the list.
  * Add support for the RISC-V architecture.
  * The command line option --no-eh-frame-hdr can now be used in ELF based
    linkers to disable the automatic generation of .eh_frame_hdr sections.
  * Add --in-implib=&lt;infile&gt; to the ARM linker to enable specifying a set of
    Secure Gateway veneers that must exist in the output import library
    specified by --out-implib=&lt;outfile&gt; and the address they must have.
    As such, --in-implib is only supported in combination with --cmse-implib.
  * Extended the --out-implib=&lt;file&gt; option, previously restricted to x86 PE
    targets, to any ELF based target.  This allows the generation of an import
    library for an ELF executable, which can then be used by another application
    to link against the executable.

- GOLD specific:

  * Add -z bndplt option (x86-64 only) to support Intel MPX.
  * Add --orphan-handling option.
  * Add --stub-group-multi option (PowerPC only).
  * Add --target1-rel, --target1-abs, --target2 options (Arm only).
  * Add -z stack-size option.
  * Add --be8 option (Arm only).
  * Add HIDDEN support in linker scripts.
  * Add SORT_BY_INIT_PRIORITY support in linker scripts.

- Other fixes:

  * Fix section alignment on .gnu_debuglink. [bso#21193]
  * Add s390x to gold_archs.
  * Fix alignment frags for aarch64 (bsc#1003846)
  * Call ldconfig for libbfd
  * Fix an assembler problem with clang on ARM.
  * Restore monotonically increasing section offsets.


- Update to binutils 2.27.

  * Add a configure option, --enable-64-bit-archive, to force use of a
    64-bit format when creating an archive symbol index.
  * Add --elf-stt-common= option to objcopy for ELF targets to control
    whether to convert common symbols to the STT_COMMON type.

- GAS specific:

  * Default to --enable-compressed-debug-sections=gas for Linux/x86 targets.
  * Add --no-pad-sections to stop the assembler from padding the end of output
    sections up to their alignment boundary.
  * Support for the ARMv8-M architecture has been added to the ARM port.
    Support for the ARMv8-M Security and DSP Extensions has also been added
    to the ARM port.
  * ARC backend accepts .extInstruction, .extCondCode, .extAuxRegister, and
    .extCoreRegister pseudo-ops that allow an user to define custom
    instructions, conditional codes, auxiliary and core registers.
  * Add a configure option --enable-elf-stt-common to decide whether ELF
    assembler should generate common symbols with the STT_COMMON type by
    default.  Default to no.
  * New command line option --elf-stt-common= for ELF targets to control
    whether to generate common symbols with the STT_COMMON type.
  * Add ability to set section flags and types via numeric values for ELF
    based targets.
  * Add a configure option --enable-x86-relax-relocations to decide whether
    x86 assembler should generate relax relocations by default.  Default to
    yes, except for x86 Solaris targets older than Solaris 12.
  * New command line option -mrelax-relocations= for x86 target to control
    whether to generate relax relocations.
  * New command line option -mfence-as-lock-add=yes for x86 target to encode
    lfence, mfence and sfence as 'lock addl $0x0, (%[re]sp)'.
  * Add assembly-time relaxation option for ARC cpus.
  * Add --with-cpu=TYPE configure option for ARC gas.  This allows the default
    cpu type to be adjusted at configure time.

- GOLD specific:

  * Add a configure option --enable-relro to decide whether -z relro should
    be enabled by default.  Default to yes.
  * Add support for s390, MIPS, AArch64, and TILE-Gx architectures.
  * Add support for STT_GNU_IFUNC symbols.
  * Add support for incremental linking (--incremental).

- GNU ld specific:

  * Add a configure option --enable-relro to decide whether -z relro should
    be enabled in ELF linker by default.  Default to yes for all Linux
    targets except FRV, HPPA, IA64 and MIPS.
  * Support for -z noreloc-overflow in the x86-64 ELF linker to disable
    relocation overflow check.
  * Add -z common/-z nocommon options for ELF targets to control whether to
    convert common symbols to the STT_COMMON type during a relocatable link.
  * Support for -z nodynamic-undefined-weak in the x86 ELF linker, which
    avoids dynamic relocations against undefined weak symbols in executable.
  * The NOCROSSREFSTO command was added to the linker script language.
  * Add --no-apply-dynamic-relocs to the AArch64 linker to do not apply
    link-time values for dynamic relocations.

		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-30"/>
	<updated date="2017-11-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003846">SUSE bug 1003846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025282">SUSE bug 1025282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029907">SUSE bug 1029907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029908">SUSE bug 1029908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029909">SUSE bug 1029909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029995">SUSE bug 1029995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030297">SUSE bug 1030297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030298">SUSE bug 1030298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030583">SUSE bug 1030583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030584">SUSE bug 1030584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030585">SUSE bug 1030585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030588">SUSE bug 1030588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030589">SUSE bug 1030589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031590">SUSE bug 1031590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031593">SUSE bug 1031593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031595">SUSE bug 1031595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031638">SUSE bug 1031638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031644">SUSE bug 1031644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031656">SUSE bug 1031656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033122">SUSE bug 1033122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037052">SUSE bug 1037052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037057">SUSE bug 1037057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037061">SUSE bug 1037061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037062">SUSE bug 1037062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037066">SUSE bug 1037066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037070">SUSE bug 1037070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037072">SUSE bug 1037072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037273">SUSE bug 1037273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038874">SUSE bug 1038874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038875">SUSE bug 1038875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038876">SUSE bug 1038876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038877">SUSE bug 1038877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038878">SUSE bug 1038878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038880">SUSE bug 1038880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038881">SUSE bug 1038881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044891">SUSE bug 1044891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044897">SUSE bug 1044897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044901">SUSE bug 1044901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044909">SUSE bug 1044909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044925">SUSE bug 1044925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044927">SUSE bug 1044927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046094">SUSE bug 1046094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052061">SUSE bug 1052061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052496">SUSE bug 1052496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052503">SUSE bug 1052503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052507">SUSE bug 1052507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052509">SUSE bug 1052509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052511">SUSE bug 1052511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052514">SUSE bug 1052514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052518">SUSE bug 1052518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053347">SUSE bug 1053347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056312">SUSE bug 1056312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056437">SUSE bug 1056437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057139">SUSE bug 1057139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057144">SUSE bug 1057144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057149">SUSE bug 1057149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058480">SUSE bug 1058480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059050">SUSE bug 1059050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060599">SUSE bug 1060599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060621">SUSE bug 1060621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061241">SUSE bug 1061241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/437293">SUSE bug 437293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/445037">SUSE bug 445037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/546106">SUSE bug 546106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/561142">SUSE bug 561142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/578249">SUSE bug 578249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/590820">SUSE bug 590820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/691290">SUSE bug 691290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698346">SUSE bug 698346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/713504">SUSE bug 713504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/776968">SUSE bug 776968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863764">SUSE bug 863764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938658">SUSE bug 938658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970239">SUSE bug 970239</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9939/">CVE-2014-9939</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12448/">CVE-2017-12448</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12450/">CVE-2017-12450</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12452/">CVE-2017-12452</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12453/">CVE-2017-12453</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12454/">CVE-2017-12454</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12456/">CVE-2017-12456</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12799/">CVE-2017-12799</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13757/">CVE-2017-13757</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14128/">CVE-2017-14128</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14129/">CVE-2017-14129</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14130/">CVE-2017-14130</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14333/">CVE-2017-14333</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14529/">CVE-2017-14529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14729/">CVE-2017-14729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14745/">CVE-2017-14745</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14974/">CVE-2017-14974</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6965/">CVE-2017-6965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-6966/">CVE-2017-6966</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6969/">CVE-2017-6969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7209/">CVE-2017-7209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7210/">CVE-2017-7210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7223/">CVE-2017-7223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7224/">CVE-2017-7224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7225/">CVE-2017-7225</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7226/">CVE-2017-7226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7227/">CVE-2017-7227</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7299/">CVE-2017-7299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7300/">CVE-2017-7300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7301/">CVE-2017-7301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7302/">CVE-2017-7302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7303/">CVE-2017-7303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7304/">CVE-2017-7304</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7614/">CVE-2017-7614</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8392/">CVE-2017-8392</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8393/">CVE-2017-8393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8394/">CVE-2017-8394</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8395/">CVE-2017-8395</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8396/">CVE-2017-8396</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8397/">CVE-2017-8397</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8398/">CVE-2017-8398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8421/">CVE-2017-8421</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9038/">CVE-2017-9038</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9039/">CVE-2017-9039</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9040/">CVE-2017-9040</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9041/">CVE-2017-9041</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9042/">CVE-2017-9042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9043/">CVE-2017-9043</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9044/">CVE-2017-9044</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9746/">CVE-2017-9746</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9747/">CVE-2017-9747</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9748/">CVE-2017-9748</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9750/">CVE-2017-9750</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9755/">CVE-2017-9755</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9756/">CVE-2017-9756</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-9954/">CVE-2017-9954</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9955/">CVE-2017-9955</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77979" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1055047" ref_url="https://bugzilla.suse.com/1055047" source="BUGZILLA"/>
		<reference ref_id="1061075" ref_url="https://bugzilla.suse.com/1061075" source="BUGZILLA"/>
		<reference ref_id="1063123" ref_url="https://bugzilla.suse.com/1063123" source="BUGZILLA"/>
		<reference ref_id="1068187" ref_url="https://bugzilla.suse.com/1068187" source="BUGZILLA"/>
		<reference ref_id="1068191" ref_url="https://bugzilla.suse.com/1068191" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<reference ref_id="CVE-2017-15597" ref_url="https://www.suse.com/security/cve/CVE-2017-15597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00001.html" source="SUSE-SU"/>
		<description>
This update for xen to version 4.7.4 (bsc#1027519) fixes several issues.

This new feature was added:

- Support migration of HVM domains larger than 1 TB

These security issues were fixed:

- bsc#1068187: Failure to recognize errors in the Populate on Demand (PoD) code
  allowed for DoS (XSA-246)
- bsc#1068191: Missing p2m error checking in PoD code allowed unprivileged guests
  to retain a writable mapping of freed memory leading to information leaks,
  privilege escalation or DoS (XSA-247).
- CVE-2017-15289: The mode4and5 write functions allowed local OS guest privileged
  users to cause a denial of service (out-of-bounds write access and Qemu process
  crash) via vectors related to dst calculation (bsc#1063123)
- CVE-2017-15597: A grant copy operation being done on a grant of a dying domain
  allowed a malicious guest administrator to corrupt hypervisor memory, allowing
  for DoS or potentially privilege escalation and information leaks (bsc#1061075).

This non-security issue was fixed:

- bsc#1055047: Fixed --initrd-inject option in virt-install
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-01"/>
	<updated date="2017-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055047">SUSE bug 1055047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061075">SUSE bug 1061075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063123">SUSE bug 1063123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068187">SUSE bug 1068187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068191">SUSE bug 1068191</bugzilla>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15597/">CVE-2017-15597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518378" comment="xen-4.7.4_02-43.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518379" comment="xen-libs-4.7.4_02-43.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518380" comment="xen-libs-32bit-4.7.4_02-43.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77980" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1068101" ref_url="https://bugzilla.suse.com/1068101" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7826" ref_url="https://www.suse.com/security/cve/CVE-2017-7826/" source="CVE"/>
		<reference ref_id="CVE-2017-7828" ref_url="https://www.suse.com/security/cve/CVE-2017-7828/" source="CVE"/>
		<reference ref_id="CVE-2017-7830" ref_url="https://www.suse.com/security/cve/CVE-2017-7830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00007.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox ESR 52.5 fixes the following issues:

Security issues fixed:
- CVE-2017-7826: Memory safety bugs fixed (bsc#1068101).
- CVE-2017-7828: Use-after-free of PressShell while restyling layout (bsc#1068101).
- CVE-2017-7830: Cross-origin URL information leak through Resource Timing API (bsc#1068101).

Mozilla Foundation Security Advisory (MFSA 2017-25):
- https://www.mozilla.org/en-US/security/advisories/mfsa2017-25/
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-05"/>
	<updated date="2017-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068101">SUSE bug 1068101</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7826/">CVE-2017-7826</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7828/">CVE-2017-7828</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7830/">CVE-2017-7830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518381" comment="MozillaFirefox-52.5.0esr-109.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518382" comment="MozillaFirefox-translations-52.5.0esr-109.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77981" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1003577" ref_url="https://bugzilla.suse.com/1003577" source="BUGZILLA"/>
		<reference ref_id="1003579" ref_url="https://bugzilla.suse.com/1003579" source="BUGZILLA"/>
		<reference ref_id="1003580" ref_url="https://bugzilla.suse.com/1003580" source="BUGZILLA"/>
		<reference ref_id="1013882" ref_url="https://bugzilla.suse.com/1013882" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002540.html" source="SUSE-SU"/>
		<description>

This update for zlib fixes the following issues:

CVE-2016-9843: Big-endian out-of-bounds pointer

CVE-2016-9842: Undefined Left Shift of Negative Number (bsc#1003580) 

CVE-2016-9840 CVE-2016-9841: Out-of-bounds pointer arithmetic in inftrees.c (bsc#1003579)

Incompatible declarations for external linkage function deflate (bsc#1003577)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-02"/>
	<updated date="2017-01-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003577">SUSE bug 1003577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003579">SUSE bug 1003579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003580">SUSE bug 1003580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013882">SUSE bug 1013882</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518383" comment="libz1-1.2.8-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518384" comment="libz1-32bit-1.2.8-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518385" comment="zlib-devel-1.2.8-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77982" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1023078" ref_url="https://bugzilla.suse.com/1023078" source="BUGZILLA"/>
		<reference ref_id="1023079" ref_url="https://bugzilla.suse.com/1023079" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9577" ref_url="https://www.suse.com/security/cve/CVE-2016-9577/" source="CVE"/>
		<reference ref_id="CVE-2016-9578" ref_url="https://www.suse.com/security/cve/CVE-2016-9578/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00006.html" source="SUSE-SU"/>
		<description>

This security update for spice fixes the following issues:

CVE-2016-9577: A buffer overflow in the spice server could have potentially been used 
by unauthenticated attackers to execute arbitrary code. (bsc#1023078)
CVE-2016-9578: Unauthenticated attackers could have caused a denial of service via a crafted message. (bsc#1023079)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-06"/>
	<updated date="2017-02-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1023078">SUSE bug 1023078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023079">SUSE bug 1023079</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9577/">CVE-2016-9577</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9578/">CVE-2016-9578</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518386" comment="libspice-server1-0.12.7-8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77983" version="1" class="patch">
	<metadata>
		<title>Security update for libXcursor (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1065386" ref_url="https://bugzilla.suse.com/1065386" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16612" ref_url="https://www.suse.com/security/cve/CVE-2017-16612/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003472.html" source="SUSE-SU"/>
		<description>
This update for libXcursor fixes the following issues:

Security issue fixed:

- CVE-2017-16612: Fix integeroverflow while parsing images and a signedness issue while parsing comments (bsc#1065386).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-05"/>
	<updated date="2017-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1065386">SUSE bug 1065386</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16612/">CVE-2017-16612</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518387" comment="libXcursor1-1.1.14-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518388" comment="libXcursor1-32bit-1.1.14-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77984" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1069496" ref_url="https://bugzilla.suse.com/1069496" source="BUGZILLA"/>
		<reference ref_id="1069702" ref_url="https://bugzilla.suse.com/1069702" source="BUGZILLA"/>
		<reference ref_id="1070805" ref_url="https://bugzilla.suse.com/1070805" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000405" ref_url="https://www.suse.com/security/cve/CVE-2017-1000405/" source="CVE"/>
		<reference ref_id="CVE-2017-16939" ref_url="https://www.suse.com/security/cve/CVE-2017-16939/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00012.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-1000405: A bug in the THP CoW support could be used by local attackers to corrupt memory of other processes and cause them to crash (bnc#1069496).
- CVE-2017-16939: The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages (bnc#1069702).

The following non-security bugs were fixed:

Fix a build issue on ppc64le systems (bsc#1070805)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-06"/>
	<updated date="2017-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1069496">SUSE bug 1069496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069702">SUSE bug 1069702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070805">SUSE bug 1070805</bugzilla>
	<cve impact="important" cvss3="5.7/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000405/">CVE-2017-1000405</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16939/">CVE-2017-16939</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518389" comment="kernel-default-4.4.90-92.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518390" comment="kernel-default-devel-4.4.90-92.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518391" comment="kernel-default-extra-4.4.90-92.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518392" comment="kernel-devel-4.4.90-92.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518393" comment="kernel-macros-4.4.90-92.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518394" comment="kernel-source-4.4.90-92.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518395" comment="kernel-syms-4.4.90-92.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77985" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1006166" ref_url="https://bugzilla.suse.com/1006166" source="BUGZILLA"/>
		<reference ref_id="1048367" ref_url="https://bugzilla.suse.com/1048367" source="BUGZILLA"/>
		<reference ref_id="1065000" ref_url="https://bugzilla.suse.com/1065000" source="BUGZILLA"/>
		<reference ref_id="1068310" ref_url="https://bugzilla.suse.com/1068310" source="BUGZILLA"/>
		<reference ref_id="1069509" ref_url="https://bugzilla.suse.com/1069509" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-1483" ref_url="https://www.suse.com/security/cve/CVE-2008-1483/" source="CVE"/>
		<reference ref_id="CVE-2017-15906" ref_url="https://www.suse.com/security/cve/CVE-2017-15906/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003476.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Security issue fixed:

- CVE-2017-15906: Stricter checking of operations in read-only mode in sftp server (bsc#1065000).

Bug fixes:

- FIPS: Startup selfchecks (bsc#1068310).
- FIPS: Silent complaints about unsupported key exchange methods (bsc#1006166).
- Refine handling of sockets for X11 forwarding to remove reintroduced CVE-2008-1483 (bsc#1069509).
- Test configuration before running daemon to prevent looping resulting in service shutdown (bsc#1048367)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-07"/>
	<updated date="2017-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1006166">SUSE bug 1006166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048367">SUSE bug 1048367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065000">SUSE bug 1065000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068310">SUSE bug 1068310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069509">SUSE bug 1069509</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2008-1483/">CVE-2008-1483</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15906/">CVE-2017-15906</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518396" comment="openssh-7.2p2-74.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518397" comment="openssh-askpass-gnome-7.2p2-74.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518398" comment="openssh-helpers-7.2p2-74.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77986" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1008253" ref_url="https://bugzilla.suse.com/1008253" source="BUGZILLA"/>
		<reference ref_id="1020868" ref_url="https://bugzilla.suse.com/1020868" source="BUGZILLA"/>
		<reference ref_id="1020873" ref_url="https://bugzilla.suse.com/1020873" source="BUGZILLA"/>
		<reference ref_id="1020875" ref_url="https://bugzilla.suse.com/1020875" source="BUGZILLA"/>
		<reference ref_id="1020877" ref_url="https://bugzilla.suse.com/1020877" source="BUGZILLA"/>
		<reference ref_id="1020878" ref_url="https://bugzilla.suse.com/1020878" source="BUGZILLA"/>
		<reference ref_id="1020882" ref_url="https://bugzilla.suse.com/1020882" source="BUGZILLA"/>
		<reference ref_id="1020884" ref_url="https://bugzilla.suse.com/1020884" source="BUGZILLA"/>
		<reference ref_id="1020885" ref_url="https://bugzilla.suse.com/1020885" source="BUGZILLA"/>
		<reference ref_id="1020891" ref_url="https://bugzilla.suse.com/1020891" source="BUGZILLA"/>
		<reference ref_id="1020894" ref_url="https://bugzilla.suse.com/1020894" source="BUGZILLA"/>
		<reference ref_id="1020896" ref_url="https://bugzilla.suse.com/1020896" source="BUGZILLA"/>
		<reference ref_id="1022428" ref_url="https://bugzilla.suse.com/1022428" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6664" ref_url="https://www.suse.com/security/cve/CVE-2016-6664/" source="CVE"/>
		<reference ref_id="CVE-2017-3238" ref_url="https://www.suse.com/security/cve/CVE-2017-3238/" source="CVE"/>
		<reference ref_id="CVE-2017-3243" ref_url="https://www.suse.com/security/cve/CVE-2017-3243/" source="CVE"/>
		<reference ref_id="CVE-2017-3244" ref_url="https://www.suse.com/security/cve/CVE-2017-3244/" source="CVE"/>
		<reference ref_id="CVE-2017-3257" ref_url="https://www.suse.com/security/cve/CVE-2017-3257/" source="CVE"/>
		<reference ref_id="CVE-2017-3258" ref_url="https://www.suse.com/security/cve/CVE-2017-3258/" source="CVE"/>
		<reference ref_id="CVE-2017-3265" ref_url="https://www.suse.com/security/cve/CVE-2017-3265/" source="CVE"/>
		<reference ref_id="CVE-2017-3291" ref_url="https://www.suse.com/security/cve/CVE-2017-3291/" source="CVE"/>
		<reference ref_id="CVE-2017-3312" ref_url="https://www.suse.com/security/cve/CVE-2017-3312/" source="CVE"/>
		<reference ref_id="CVE-2017-3317" ref_url="https://www.suse.com/security/cve/CVE-2017-3317/" source="CVE"/>
		<reference ref_id="CVE-2017-3318" ref_url="https://www.suse.com/security/cve/CVE-2017-3318/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00013.html" source="SUSE-SU"/>
		<description>

This mariadb version update to 10.0.29 fixes the following issues:

- CVE-2017-3318: unspecified vulnerability affecting Error Handling (bsc#1020896)
- CVE-2017-3317: unspecified vulnerability affecting Logging (bsc#1020894)
- CVE-2017-3312: insecure error log file handling in mysqld_safe, incomplete CVE-2016-6664 (bsc#1020873)
- CVE-2017-3291: unrestricted mysqld_safe's ledir (bsc#1020884)
- CVE-2017-3265: unsafe chmod/chown use in init script (bsc#1020885)
- CVE-2017-3258: unspecified vulnerability in the DDL component (bsc#1020875)
- CVE-2017-3257: unspecified vulnerability affecting InnoDB (bsc#1020878)
- CVE-2017-3244: unspecified vulnerability affecing the DML component (bsc#1020877)
- CVE-2017-3243: unspecified vulnerability affecting the Charsets component (bsc#1020891)
- CVE-2017-3238: unspecified vulnerability affecting the Optimizer component (bsc#1020882)
- CVE-2016-6664: Root Privilege Escalation (bsc#1008253)
- Applications using the client library for MySQL (libmysqlclient.so) had a use-after-free issue that could cause the applications to crash (bsc#1022428)

- notable changes:
  * XtraDB updated to 5.6.34-79.1
  * TokuDB updated to 5.6.34-79.1
  * Innodb updated to 5.6.35
  * Performance Schema updated to 5.6.35

Release notes and changelog:
  * https://kb.askmonty.org/en/mariadb-10029-release-notes
  * https://kb.askmonty.org/en/mariadb-10029-changelog
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-07"/>
	<updated date="2017-02-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1008253">SUSE bug 1008253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020873">SUSE bug 1020873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020875">SUSE bug 1020875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020877">SUSE bug 1020877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020878">SUSE bug 1020878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020882">SUSE bug 1020882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020884">SUSE bug 1020884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020885">SUSE bug 1020885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020891">SUSE bug 1020891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020894">SUSE bug 1020894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020896">SUSE bug 1020896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022428">SUSE bug 1022428</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6664/">CVE-2016-6664</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3238/">CVE-2017-3238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3243/">CVE-2017-3243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3244/">CVE-2017-3244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3257/">CVE-2017-3257</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3258/">CVE-2017-3258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3265/">CVE-2017-3265</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3291/">CVE-2017-3291</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3312/">CVE-2017-3312</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3317/">CVE-2017-3317</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3318/">CVE-2017-3318</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517078" comment="libmysqlclient18-10.0.29-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517079" comment="libmysqlclient18-32bit-10.0.29-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517080" comment="libmysqlclient_r18-10.0.29-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517081" comment="libmysqlclient_r18-32bit-10.0.29-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517082" comment="mariadb-10.0.29-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517083" comment="mariadb-client-10.0.29-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517084" comment="mariadb-errormessages-10.0.29-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77987" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1071905" ref_url="https://bugzilla.suse.com/1071905" source="BUGZILLA"/>
		<reference ref_id="1071906" ref_url="https://bugzilla.suse.com/1071906" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3737" ref_url="https://www.suse.com/security/cve/CVE-2017-3737/" source="CVE"/>
		<reference ref_id="CVE-2017-3738" ref_url="https://www.suse.com/security/cve/CVE-2017-3738/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00074.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- OpenSSL Security Advisory [07 Dec 2017]
  * CVE-2017-3737: OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an \'error state\' mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer. In order to exploit this issue an application bug would have to be present that resulted in a call to SSL_read()/SSL_write() being issued after having already received a fatal error. OpenSSL version 1.0.2b-1.0.2m are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is not affected. (bsc#1071905)
  * CVE-2017-3738: There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. (bsc#1071906)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-16"/>
	<updated date="2017-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1071905">SUSE bug 1071905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071906">SUSE bug 1071906</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3737/">CVE-2017-3737</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3738/">CVE-2017-3738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518399" comment="libopenssl-devel-1.0.2j-60.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518400" comment="libopenssl1_0_0-1.0.2j-60.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518401" comment="libopenssl1_0_0-32bit-1.0.2j-60.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518402" comment="openssl-1.0.2j-60.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77988" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="983215" ref_url="https://bugzilla.suse.com/983215" source="BUGZILLA"/>
		<reference ref_id="983216" ref_url="https://bugzilla.suse.com/983216" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6702" ref_url="https://www.suse.com/security/cve/CVE-2012-6702/" source="CVE"/>
		<reference ref_id="CVE-2016-5300" ref_url="https://www.suse.com/security/cve/CVE-2016-5300/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002631.html" source="SUSE-SU"/>
		<description>

This update for expat fixes the following security issues:

- CVE-2012-6702: Expat, when used in a parser that has not
  called XML_SetHashSalt or passed it a seed of 0, made it easier for
  context-dependent attackers to defeat cryptographic protection mechanisms
  via vectors involving use of the srand function.  (bsc#983215)
- CVE-2016-5300: The XML parser in Expat did not use sufficient entropy
  for hash initialization, which allowed context-dependent attackers to
  cause a denial of service (CPU consumption) via crafted identifiers in
  an XML document. NOTE: this vulnerability exists because of an incomplete
  fix for CVE-2012-0876.  (bsc#983216)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-08"/>
	<updated date="2017-02-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/983215">SUSE bug 983215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983216">SUSE bug 983216</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6702/">CVE-2012-6702</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5300/">CVE-2016-5300</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517085" comment="expat-2.1.0-20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517086" comment="libexpat1-2.1.0-20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517087" comment="libexpat1-32bit-2.1.0-20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77989" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1048457" ref_url="https://bugzilla.suse.com/1048457" source="BUGZILLA"/>
		<reference ref_id="1049796" ref_url="https://bugzilla.suse.com/1049796" source="BUGZILLA"/>
		<reference ref_id="1050083" ref_url="https://bugzilla.suse.com/1050083" source="BUGZILLA"/>
		<reference ref_id="1050116" ref_url="https://bugzilla.suse.com/1050116" source="BUGZILLA"/>
		<reference ref_id="1050139" ref_url="https://bugzilla.suse.com/1050139" source="BUGZILLA"/>
		<reference ref_id="1050632" ref_url="https://bugzilla.suse.com/1050632" source="BUGZILLA"/>
		<reference ref_id="1051441" ref_url="https://bugzilla.suse.com/1051441" source="BUGZILLA"/>
		<reference ref_id="1051847" ref_url="https://bugzilla.suse.com/1051847" source="BUGZILLA"/>
		<reference ref_id="1052450" ref_url="https://bugzilla.suse.com/1052450" source="BUGZILLA"/>
		<reference ref_id="1052553" ref_url="https://bugzilla.suse.com/1052553" source="BUGZILLA"/>
		<reference ref_id="1052689" ref_url="https://bugzilla.suse.com/1052689" source="BUGZILLA"/>
		<reference ref_id="1052744" ref_url="https://bugzilla.suse.com/1052744" source="BUGZILLA"/>
		<reference ref_id="1052758" ref_url="https://bugzilla.suse.com/1052758" source="BUGZILLA"/>
		<reference ref_id="1052764" ref_url="https://bugzilla.suse.com/1052764" source="BUGZILLA"/>
		<reference ref_id="1054757" ref_url="https://bugzilla.suse.com/1054757" source="BUGZILLA"/>
		<reference ref_id="1055214" ref_url="https://bugzilla.suse.com/1055214" source="BUGZILLA"/>
		<reference ref_id="1056432" ref_url="https://bugzilla.suse.com/1056432" source="BUGZILLA"/>
		<reference ref_id="1057157" ref_url="https://bugzilla.suse.com/1057157" source="BUGZILLA"/>
		<reference ref_id="1057719" ref_url="https://bugzilla.suse.com/1057719" source="BUGZILLA"/>
		<reference ref_id="1057729" ref_url="https://bugzilla.suse.com/1057729" source="BUGZILLA"/>
		<reference ref_id="1057730" ref_url="https://bugzilla.suse.com/1057730" source="BUGZILLA"/>
		<reference ref_id="1058485" ref_url="https://bugzilla.suse.com/1058485" source="BUGZILLA"/>
		<reference ref_id="1058637" ref_url="https://bugzilla.suse.com/1058637" source="BUGZILLA"/>
		<reference ref_id="1059666" ref_url="https://bugzilla.suse.com/1059666" source="BUGZILLA"/>
		<reference ref_id="1059778" ref_url="https://bugzilla.suse.com/1059778" source="BUGZILLA"/>
		<reference ref_id="1060176" ref_url="https://bugzilla.suse.com/1060176" source="BUGZILLA"/>
		<reference ref_id="1060577" ref_url="https://bugzilla.suse.com/1060577" source="BUGZILLA"/>
		<reference ref_id="1061254" ref_url="https://bugzilla.suse.com/1061254" source="BUGZILLA"/>
		<reference ref_id="1062750" ref_url="https://bugzilla.suse.com/1062750" source="BUGZILLA"/>
		<reference ref_id="1066003" ref_url="https://bugzilla.suse.com/1066003" source="BUGZILLA"/>
		<reference ref_id="1067181" ref_url="https://bugzilla.suse.com/1067181" source="BUGZILLA"/>
		<reference ref_id="1067184" ref_url="https://bugzilla.suse.com/1067184" source="BUGZILLA"/>
		<reference ref_id="1067409" ref_url="https://bugzilla.suse.com/1067409" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11188" ref_url="https://www.suse.com/security/cve/CVE-2017-11188/" source="CVE"/>
		<reference ref_id="CVE-2017-11478" ref_url="https://www.suse.com/security/cve/CVE-2017-11478/" source="CVE"/>
		<reference ref_id="CVE-2017-11523" ref_url="https://www.suse.com/security/cve/CVE-2017-11523/" source="CVE"/>
		<reference ref_id="CVE-2017-11527" ref_url="https://www.suse.com/security/cve/CVE-2017-11527/" source="CVE"/>
		<reference ref_id="CVE-2017-11535" ref_url="https://www.suse.com/security/cve/CVE-2017-11535/" source="CVE"/>
		<reference ref_id="CVE-2017-11640" ref_url="https://www.suse.com/security/cve/CVE-2017-11640/" source="CVE"/>
		<reference ref_id="CVE-2017-11752" ref_url="https://www.suse.com/security/cve/CVE-2017-11752/" source="CVE"/>
		<reference ref_id="CVE-2017-12140" ref_url="https://www.suse.com/security/cve/CVE-2017-12140/" source="CVE"/>
		<reference ref_id="CVE-2017-12435" ref_url="https://www.suse.com/security/cve/CVE-2017-12435/" source="CVE"/>
		<reference ref_id="CVE-2017-12587" ref_url="https://www.suse.com/security/cve/CVE-2017-12587/" source="CVE"/>
		<reference ref_id="CVE-2017-12644" ref_url="https://www.suse.com/security/cve/CVE-2017-12644/" source="CVE"/>
		<reference ref_id="CVE-2017-12662" ref_url="https://www.suse.com/security/cve/CVE-2017-12662/" source="CVE"/>
		<reference ref_id="CVE-2017-12669" ref_url="https://www.suse.com/security/cve/CVE-2017-12669/" source="CVE"/>
		<reference ref_id="CVE-2017-12983" ref_url="https://www.suse.com/security/cve/CVE-2017-12983/" source="CVE"/>
		<reference ref_id="CVE-2017-13134" ref_url="https://www.suse.com/security/cve/CVE-2017-13134/" source="CVE"/>
		<reference ref_id="CVE-2017-13769" ref_url="https://www.suse.com/security/cve/CVE-2017-13769/" source="CVE"/>
		<reference ref_id="CVE-2017-14138" ref_url="https://www.suse.com/security/cve/CVE-2017-14138/" source="CVE"/>
		<reference ref_id="CVE-2017-14172" ref_url="https://www.suse.com/security/cve/CVE-2017-14172/" source="CVE"/>
		<reference ref_id="CVE-2017-14173" ref_url="https://www.suse.com/security/cve/CVE-2017-14173/" source="CVE"/>
		<reference ref_id="CVE-2017-14175" ref_url="https://www.suse.com/security/cve/CVE-2017-14175/" source="CVE"/>
		<reference ref_id="CVE-2017-14341" ref_url="https://www.suse.com/security/cve/CVE-2017-14341/" source="CVE"/>
		<reference ref_id="CVE-2017-14342" ref_url="https://www.suse.com/security/cve/CVE-2017-14342/" source="CVE"/>
		<reference ref_id="CVE-2017-14531" ref_url="https://www.suse.com/security/cve/CVE-2017-14531/" source="CVE"/>
		<reference ref_id="CVE-2017-14607" ref_url="https://www.suse.com/security/cve/CVE-2017-14607/" source="CVE"/>
		<reference ref_id="CVE-2017-14682" ref_url="https://www.suse.com/security/cve/CVE-2017-14682/" source="CVE"/>
		<reference ref_id="CVE-2017-14733" ref_url="https://www.suse.com/security/cve/CVE-2017-14733/" source="CVE"/>
		<reference ref_id="CVE-2017-14989" ref_url="https://www.suse.com/security/cve/CVE-2017-14989/" source="CVE"/>
		<reference ref_id="CVE-2017-15217" ref_url="https://www.suse.com/security/cve/CVE-2017-15217/" source="CVE"/>
		<reference ref_id="CVE-2017-15930" ref_url="https://www.suse.com/security/cve/CVE-2017-15930/" source="CVE"/>
		<reference ref_id="CVE-2017-16545" ref_url="https://www.suse.com/security/cve/CVE-2017-16545/" source="CVE"/>
		<reference ref_id="CVE-2017-16546" ref_url="https://www.suse.com/security/cve/CVE-2017-16546/" source="CVE"/>
		<reference ref_id="CVE-2017-16669" ref_url="https://www.suse.com/security/cve/CVE-2017-16669/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

  * CVE-2017-14989: use-after-free in RenderFreetype in MagickCore/annotate.c could lead to denial of service [bsc#1061254]
  * CVE-2017-14682: GetNextToken in MagickCore/token.c heap buffer overflow could lead to denial of service [bsc#1060176]
  * Memory leak in WriteINLINEImage in coders/inline.c could lead to denial of service [bsc#1052744]
  * CVE-2017-14607: out of bounds read flaw related to ReadTIFFImagehas  could possibly disclose potentially sensitive memory [bsc#1059778]
  * CVE-2017-11640: NULL pointer deref in WritePTIFImage() in coders/tiff.c [bsc#1050632]
  * CVE-2017-14342: a memory exhaustion vulnerability in ReadWPGImage in coders/wpg.c could lead to denial of service [bsc#1058485]
  * CVE-2017-14341: Infinite loop in the ReadWPGImage function [bsc#1058637]
  * CVE-2017-16546: problem in the function ReadWPGImage in coders/wpg.c could lead to denial of service [bsc#1067181]
  * CVE-2017-16545: The ReadWPGImage function in coders/wpg.c in  validation problems could lead to denial of service [bsc#1067184]
  * CVE-2017-16669: problem in coders/wpg.c could allow remote attackers to cause a denial of service via crafted file [bsc#1067409]
  * CVE-2017-14175: Lack of End of File check could lead to denial of service [bsc#1057719]
  * CVE-2017-14138: memory leak vulnerability in ReadWEBPImage in coders/webp.c could lead to denial of service [bsc#1057157]
  * CVE-2017-13769: denial of service issue in function WriteTHUMBNAILImage in coders/thumbnail.c [bsc#1056432]
  * CVE-2017-13134: a heap-based buffer over-read was found in thefunction SFWScan in coders/sfw.c, which allows attackers to cause adenial of service via a crafted file. [bsc#1055214]
  * CVE-2017-15217: memory leak in ReadSGIImage in coders/sgi.c [bsc#1062750]
  * CVE-2017-11478: ReadOneDJVUImage in coders/djvu.c in ImageMagick allows remote attackers to cause a DoS [bsc#1049796]
  * CVE-2017-15930: Null Pointer dereference  while transfering JPEG scanlines could lead to denial of service [bsc#1066003]
  * CVE-2017-12983: Heap-based buffer overflow in the ReadSFWImage function in coders/sfw.c inImageMagick 7.0.6-8 allows remote attackers to cause a denial of service [bsc#1054757]
  * CVE-2017-14531: memory exhaustion issue in ReadSUNImage incoders/sun.c. [bsc#1059666]
  * CVE-2017-12435: Memory exhaustion in ReadSUNImage in coders/sun.c, which allows attackers to cause denial of service [bsc#1052553]
  * CVE-2017-12587: User controlable large loop in the ReadPWPImage in coders\pwp.c could lead to denial of service [bsc#1052450]
  * CVE-2017-11523: ReadTXTImage in coders/txt.c allows remote attackers to cause a denial of service [bsc#1050083]
  * CVE-2017-14173: unction ReadTXTImage is vulnerable to a integer overflow that could lead to denial of service [bsc#1057729]
  * CVE-2017-11188: ImageMagick: The ReadDPXImage function in codersdpx.c in ImageMagick 7.0.6-0 has a largeloop vulnerability that can cause CPU exhaustion via a crafted DPX file, relatedto lack of an EOF check. [bnc#1048457]
  * CVE-2017-11527: ImageMagick: ReadDPXImage in coders/dpx.c allows remote attackers to cause DoS [bnc#1050116] 
  * CVE-2017-11535: GraphicsMagick, ImageMagick: Heap-based buffer over-read in WritePSImage() in coders/ps.c [bnc#1050139]
  * CVE-2017-11752: ImageMagick: ReadMAGICKImage in coders/magick.c allows to cause DoS  [bnc#1051441] 
  * CVE-2017-12140: ImageMagick: ReadDCMImage in codersdcm.c has a ninteger signedness error leading to excessive memory consumption [bnc#1051847] 
  * CVE-2017-12669: ImageMagick: Memory leak in WriteCALSImage in coders/cals.c [bnc#1052689]
  * CVE-2017-12662: GraphicsMagick, ImageMagick: Memory leak in WritePDFImage in coders/pdf.c [bnc#1052758]
  * CVE-2017-12644: ImageMagick: Memory leak in ReadDCMImage in codersdcm.c [bnc#1052764]
  * CVE-2017-14172: ImageMagick: Lack of end of file check in ReadPSImage() could lead to a denial of service [bnc#1057730]
  * CVE-2017-14733: GraphicsMagick: Heap overflow on ReadRLEImage in coders/rle.c could lead to denial of service [bnc#1060577]

		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-20"/>
	<updated date="2017-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1048457">SUSE bug 1048457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049796">SUSE bug 1049796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050083">SUSE bug 1050083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050116">SUSE bug 1050116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050139">SUSE bug 1050139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050632">SUSE bug 1050632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051441">SUSE bug 1051441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051847">SUSE bug 1051847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052450">SUSE bug 1052450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052553">SUSE bug 1052553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052689">SUSE bug 1052689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052744">SUSE bug 1052744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052758">SUSE bug 1052758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052764">SUSE bug 1052764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054757">SUSE bug 1054757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055214">SUSE bug 1055214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056432">SUSE bug 1056432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057157">SUSE bug 1057157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057719">SUSE bug 1057719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057729">SUSE bug 1057729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057730">SUSE bug 1057730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058485">SUSE bug 1058485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058637">SUSE bug 1058637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059666">SUSE bug 1059666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059778">SUSE bug 1059778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060176">SUSE bug 1060176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060577">SUSE bug 1060577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061254">SUSE bug 1061254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062750">SUSE bug 1062750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066003">SUSE bug 1066003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067181">SUSE bug 1067181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067184">SUSE bug 1067184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067409">SUSE bug 1067409</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11188/">CVE-2017-11188</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11478/">CVE-2017-11478</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11523/">CVE-2017-11523</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11527/">CVE-2017-11527</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11535/">CVE-2017-11535</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11640/">CVE-2017-11640</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11752/">CVE-2017-11752</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12140/">CVE-2017-12140</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12435/">CVE-2017-12435</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12587/">CVE-2017-12587</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12644/">CVE-2017-12644</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12662/">CVE-2017-12662</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12669/">CVE-2017-12669</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12983/">CVE-2017-12983</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13134/">CVE-2017-13134</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13769/">CVE-2017-13769</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14138/">CVE-2017-14138</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14172/">CVE-2017-14172</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14173/">CVE-2017-14173</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14175/">CVE-2017-14175</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14341/">CVE-2017-14341</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14342/">CVE-2017-14342</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14531/">CVE-2017-14531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14607/">CVE-2017-14607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14682/">CVE-2017-14682</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14733/">CVE-2017-14733</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14989/">CVE-2017-14989</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15217/">CVE-2017-15217</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15930/">CVE-2017-15930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16545/">CVE-2017-16545</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16546/">CVE-2017-16546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16669/">CVE-2017-16669</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77990" version="1" class="patch">
	<metadata>
		<title>Security update for libraw (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1060321" ref_url="https://bugzilla.suse.com/1060321" source="BUGZILLA"/>
		<reference ref_id="1063798" ref_url="https://bugzilla.suse.com/1063798" source="BUGZILLA"/>
		<reference ref_id="1072385" ref_url="https://bugzilla.suse.com/1072385" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13735" ref_url="https://www.suse.com/security/cve/CVE-2017-13735/" source="CVE"/>
		<reference ref_id="CVE-2017-14608" ref_url="https://www.suse.com/security/cve/CVE-2017-14608/" source="CVE"/>
		<reference ref_id="CVE-2017-16909" ref_url="https://www.suse.com/security/cve/CVE-2017-16909/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003548.html" source="SUSE-SU"/>
		<description>
This update for libraw fixes the following issues:

Security issues fixed:

- CVE-2017-13735: A floating point exception in kodak_radc_load_raw could be used by attackers to crash a libraw using application (bsc#1060321)
- CVE-2017-14608: An out-of-bounds read in the kodak_65000_load_raw function could be used for crashing or information leak from the libraw library (bsc#1063798)
- CVE-2017-16909: Fix heap-buffer overflow in the LibRaw::panasonic_load_raw() function (bsc#1072385).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-21"/>
	<updated date="2017-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1060321">SUSE bug 1060321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063798">SUSE bug 1063798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072385">SUSE bug 1072385</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13735/">CVE-2017-13735</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14608/">CVE-2017-14608</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-16909/">CVE-2017-16909</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518408" comment="libraw9-0.15.4-16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77991" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1067841" ref_url="https://bugzilla.suse.com/1067841" source="BUGZILLA"/>
		<reference ref_id="1067844" ref_url="https://bugzilla.suse.com/1067844" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15098" ref_url="https://www.suse.com/security/cve/CVE-2017-15098/" source="CVE"/>
		<reference ref_id="CVE-2017-15099" ref_url="https://www.suse.com/security/cve/CVE-2017-15099/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003547.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

Security issues fixed:

- CVE-2017-15098: Fix crash due to rowtype mismatch in json{b}_populate_recordset() (bsc#1067844).
- CVE-2017-15099: Ensure that INSERT ... ON CONFLICT DO UPDATE checks table permissions and RLS policies in all cases (bsc#1067841).

Bug fixes:

- Update to version 9.6.6:
  * https://www.postgresql.org/docs/9.6/static/release-9-6-6.html
  * https://www.postgresql.org/docs/9.6/static/release-9-6-5.html
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-21"/>
	<updated date="2017-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1067841">SUSE bug 1067841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067844">SUSE bug 1067844</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15098/">CVE-2017-15098</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15099/">CVE-2017-15099</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518409" comment="libecpg6-9.6.6-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518410" comment="libpq5-9.6.6-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518411" comment="libpq5-32bit-9.6.6-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518412" comment="postgresql96-9.6.6-3.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77992" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1010201" ref_url="https://bugzilla.suse.com/1010201" source="BUGZILLA"/>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1012829" ref_url="https://bugzilla.suse.com/1012829" source="BUGZILLA"/>
		<reference ref_id="1017461" ref_url="https://bugzilla.suse.com/1017461" source="BUGZILLA"/>
		<reference ref_id="1020645" ref_url="https://bugzilla.suse.com/1020645" source="BUGZILLA"/>
		<reference ref_id="1021424" ref_url="https://bugzilla.suse.com/1021424" source="BUGZILLA"/>
		<reference ref_id="1022595" ref_url="https://bugzilla.suse.com/1022595" source="BUGZILLA"/>
		<reference ref_id="1022600" ref_url="https://bugzilla.suse.com/1022600" source="BUGZILLA"/>
		<reference ref_id="1022914" ref_url="https://bugzilla.suse.com/1022914" source="BUGZILLA"/>
		<reference ref_id="1024412" ref_url="https://bugzilla.suse.com/1024412" source="BUGZILLA"/>
		<reference ref_id="1025461" ref_url="https://bugzilla.suse.com/1025461" source="BUGZILLA"/>
		<reference ref_id="1027301" ref_url="https://bugzilla.suse.com/1027301" source="BUGZILLA"/>
		<reference ref_id="1028971" ref_url="https://bugzilla.suse.com/1028971" source="BUGZILLA"/>
		<reference ref_id="1030061" ref_url="https://bugzilla.suse.com/1030061" source="BUGZILLA"/>
		<reference ref_id="1031717" ref_url="https://bugzilla.suse.com/1031717" source="BUGZILLA"/>
		<reference ref_id="1034048" ref_url="https://bugzilla.suse.com/1034048" source="BUGZILLA"/>
		<reference ref_id="1037890" ref_url="https://bugzilla.suse.com/1037890" source="BUGZILLA"/>
		<reference ref_id="1046107" ref_url="https://bugzilla.suse.com/1046107" source="BUGZILLA"/>
		<reference ref_id="1050060" ref_url="https://bugzilla.suse.com/1050060" source="BUGZILLA"/>
		<reference ref_id="1050231" ref_url="https://bugzilla.suse.com/1050231" source="BUGZILLA"/>
		<reference ref_id="1053919" ref_url="https://bugzilla.suse.com/1053919" source="BUGZILLA"/>
		<reference ref_id="1055567" ref_url="https://bugzilla.suse.com/1055567" source="BUGZILLA"/>
		<reference ref_id="1056003" ref_url="https://bugzilla.suse.com/1056003" source="BUGZILLA"/>
		<reference ref_id="1056365" ref_url="https://bugzilla.suse.com/1056365" source="BUGZILLA"/>
		<reference ref_id="1056427" ref_url="https://bugzilla.suse.com/1056427" source="BUGZILLA"/>
		<reference ref_id="1056979" ref_url="https://bugzilla.suse.com/1056979" source="BUGZILLA"/>
		<reference ref_id="1057199" ref_url="https://bugzilla.suse.com/1057199" source="BUGZILLA"/>
		<reference ref_id="1058135" ref_url="https://bugzilla.suse.com/1058135" source="BUGZILLA"/>
		<reference ref_id="1059863" ref_url="https://bugzilla.suse.com/1059863" source="BUGZILLA"/>
		<reference ref_id="1060333" ref_url="https://bugzilla.suse.com/1060333" source="BUGZILLA"/>
		<reference ref_id="1060682" ref_url="https://bugzilla.suse.com/1060682" source="BUGZILLA"/>
		<reference ref_id="1060985" ref_url="https://bugzilla.suse.com/1060985" source="BUGZILLA"/>
		<reference ref_id="1061451" ref_url="https://bugzilla.suse.com/1061451" source="BUGZILLA"/>
		<reference ref_id="1061756" ref_url="https://bugzilla.suse.com/1061756" source="BUGZILLA"/>
		<reference ref_id="1062520" ref_url="https://bugzilla.suse.com/1062520" source="BUGZILLA"/>
		<reference ref_id="1062941" ref_url="https://bugzilla.suse.com/1062941" source="BUGZILLA"/>
		<reference ref_id="1062962" ref_url="https://bugzilla.suse.com/1062962" source="BUGZILLA"/>
		<reference ref_id="1063026" ref_url="https://bugzilla.suse.com/1063026" source="BUGZILLA"/>
		<reference ref_id="1063460" ref_url="https://bugzilla.suse.com/1063460" source="BUGZILLA"/>
		<reference ref_id="1063475" ref_url="https://bugzilla.suse.com/1063475" source="BUGZILLA"/>
		<reference ref_id="1063501" ref_url="https://bugzilla.suse.com/1063501" source="BUGZILLA"/>
		<reference ref_id="1063509" ref_url="https://bugzilla.suse.com/1063509" source="BUGZILLA"/>
		<reference ref_id="1063516" ref_url="https://bugzilla.suse.com/1063516" source="BUGZILLA"/>
		<reference ref_id="1063520" ref_url="https://bugzilla.suse.com/1063520" source="BUGZILLA"/>
		<reference ref_id="1063695" ref_url="https://bugzilla.suse.com/1063695" source="BUGZILLA"/>
		<reference ref_id="1064206" ref_url="https://bugzilla.suse.com/1064206" source="BUGZILLA"/>
		<reference ref_id="1064701" ref_url="https://bugzilla.suse.com/1064701" source="BUGZILLA"/>
		<reference ref_id="1064926" ref_url="https://bugzilla.suse.com/1064926" source="BUGZILLA"/>
		<reference ref_id="1065180" ref_url="https://bugzilla.suse.com/1065180" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065639" ref_url="https://bugzilla.suse.com/1065639" source="BUGZILLA"/>
		<reference ref_id="1065692" ref_url="https://bugzilla.suse.com/1065692" source="BUGZILLA"/>
		<reference ref_id="1065717" ref_url="https://bugzilla.suse.com/1065717" source="BUGZILLA"/>
		<reference ref_id="1065866" ref_url="https://bugzilla.suse.com/1065866" source="BUGZILLA"/>
		<reference ref_id="1066045" ref_url="https://bugzilla.suse.com/1066045" source="BUGZILLA"/>
		<reference ref_id="1066192" ref_url="https://bugzilla.suse.com/1066192" source="BUGZILLA"/>
		<reference ref_id="1066213" ref_url="https://bugzilla.suse.com/1066213" source="BUGZILLA"/>
		<reference ref_id="1066223" ref_url="https://bugzilla.suse.com/1066223" source="BUGZILLA"/>
		<reference ref_id="1066285" ref_url="https://bugzilla.suse.com/1066285" source="BUGZILLA"/>
		<reference ref_id="1066382" ref_url="https://bugzilla.suse.com/1066382" source="BUGZILLA"/>
		<reference ref_id="1066470" ref_url="https://bugzilla.suse.com/1066470" source="BUGZILLA"/>
		<reference ref_id="1066471" ref_url="https://bugzilla.suse.com/1066471" source="BUGZILLA"/>
		<reference ref_id="1066472" ref_url="https://bugzilla.suse.com/1066472" source="BUGZILLA"/>
		<reference ref_id="1066573" ref_url="https://bugzilla.suse.com/1066573" source="BUGZILLA"/>
		<reference ref_id="1066606" ref_url="https://bugzilla.suse.com/1066606" source="BUGZILLA"/>
		<reference ref_id="1066629" ref_url="https://bugzilla.suse.com/1066629" source="BUGZILLA"/>
		<reference ref_id="1067105" ref_url="https://bugzilla.suse.com/1067105" source="BUGZILLA"/>
		<reference ref_id="1067132" ref_url="https://bugzilla.suse.com/1067132" source="BUGZILLA"/>
		<reference ref_id="1067494" ref_url="https://bugzilla.suse.com/1067494" source="BUGZILLA"/>
		<reference ref_id="1067888" ref_url="https://bugzilla.suse.com/1067888" source="BUGZILLA"/>
		<reference ref_id="1068671" ref_url="https://bugzilla.suse.com/1068671" source="BUGZILLA"/>
		<reference ref_id="1068978" ref_url="https://bugzilla.suse.com/1068978" source="BUGZILLA"/>
		<reference ref_id="1068980" ref_url="https://bugzilla.suse.com/1068980" source="BUGZILLA"/>
		<reference ref_id="1068982" ref_url="https://bugzilla.suse.com/1068982" source="BUGZILLA"/>
		<reference ref_id="1069270" ref_url="https://bugzilla.suse.com/1069270" source="BUGZILLA"/>
		<reference ref_id="1069793" ref_url="https://bugzilla.suse.com/1069793" source="BUGZILLA"/>
		<reference ref_id="1069942" ref_url="https://bugzilla.suse.com/1069942" source="BUGZILLA"/>
		<reference ref_id="1069996" ref_url="https://bugzilla.suse.com/1069996" source="BUGZILLA"/>
		<reference ref_id="1070006" ref_url="https://bugzilla.suse.com/1070006" source="BUGZILLA"/>
		<reference ref_id="1070145" ref_url="https://bugzilla.suse.com/1070145" source="BUGZILLA"/>
		<reference ref_id="1070535" ref_url="https://bugzilla.suse.com/1070535" source="BUGZILLA"/>
		<reference ref_id="1070767" ref_url="https://bugzilla.suse.com/1070767" source="BUGZILLA"/>
		<reference ref_id="1070771" ref_url="https://bugzilla.suse.com/1070771" source="BUGZILLA"/>
		<reference ref_id="1070805" ref_url="https://bugzilla.suse.com/1070805" source="BUGZILLA"/>
		<reference ref_id="1070825" ref_url="https://bugzilla.suse.com/1070825" source="BUGZILLA"/>
		<reference ref_id="1070964" ref_url="https://bugzilla.suse.com/1070964" source="BUGZILLA"/>
		<reference ref_id="1071231" ref_url="https://bugzilla.suse.com/1071231" source="BUGZILLA"/>
		<reference ref_id="1071693" ref_url="https://bugzilla.suse.com/1071693" source="BUGZILLA"/>
		<reference ref_id="1071694" ref_url="https://bugzilla.suse.com/1071694" source="BUGZILLA"/>
		<reference ref_id="1071695" ref_url="https://bugzilla.suse.com/1071695" source="BUGZILLA"/>
		<reference ref_id="1071833" ref_url="https://bugzilla.suse.com/1071833" source="BUGZILLA"/>
		<reference ref_id="963575" ref_url="https://bugzilla.suse.com/963575" source="BUGZILLA"/>
		<reference ref_id="964944" ref_url="https://bugzilla.suse.com/964944" source="BUGZILLA"/>
		<reference ref_id="966170" ref_url="https://bugzilla.suse.com/966170" source="BUGZILLA"/>
		<reference ref_id="966172" ref_url="https://bugzilla.suse.com/966172" source="BUGZILLA"/>
		<reference ref_id="966186" ref_url="https://bugzilla.suse.com/966186" source="BUGZILLA"/>
		<reference ref_id="966191" ref_url="https://bugzilla.suse.com/966191" source="BUGZILLA"/>
		<reference ref_id="966316" ref_url="https://bugzilla.suse.com/966316" source="BUGZILLA"/>
		<reference ref_id="966318" ref_url="https://bugzilla.suse.com/966318" source="BUGZILLA"/>
		<reference ref_id="969474" ref_url="https://bugzilla.suse.com/969474" source="BUGZILLA"/>
		<reference ref_id="969475" ref_url="https://bugzilla.suse.com/969475" source="BUGZILLA"/>
		<reference ref_id="969476" ref_url="https://bugzilla.suse.com/969476" source="BUGZILLA"/>
		<reference ref_id="969477" ref_url="https://bugzilla.suse.com/969477" source="BUGZILLA"/>
		<reference ref_id="971975" ref_url="https://bugzilla.suse.com/971975" source="BUGZILLA"/>
		<reference ref_id="974590" ref_url="https://bugzilla.suse.com/974590" source="BUGZILLA"/>
		<reference ref_id="979928" ref_url="https://bugzilla.suse.com/979928" source="BUGZILLA"/>
		<reference ref_id="989261" ref_url="https://bugzilla.suse.com/989261" source="BUGZILLA"/>
		<reference ref_id="996376" ref_url="https://bugzilla.suse.com/996376" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000410" ref_url="https://www.suse.com/security/cve/CVE-2017-1000410/" source="CVE"/>
		<reference ref_id="CVE-2017-11600" ref_url="https://www.suse.com/security/cve/CVE-2017-11600/" source="CVE"/>
		<reference ref_id="CVE-2017-12193" ref_url="https://www.suse.com/security/cve/CVE-2017-12193/" source="CVE"/>
		<reference ref_id="CVE-2017-15115" ref_url="https://www.suse.com/security/cve/CVE-2017-15115/" source="CVE"/>
		<reference ref_id="CVE-2017-15265" ref_url="https://www.suse.com/security/cve/CVE-2017-15265/" source="CVE"/>
		<reference ref_id="CVE-2017-16528" ref_url="https://www.suse.com/security/cve/CVE-2017-16528/" source="CVE"/>
		<reference ref_id="CVE-2017-16536" ref_url="https://www.suse.com/security/cve/CVE-2017-16536/" source="CVE"/>
		<reference ref_id="CVE-2017-16537" ref_url="https://www.suse.com/security/cve/CVE-2017-16537/" source="CVE"/>
		<reference ref_id="CVE-2017-16645" ref_url="https://www.suse.com/security/cve/CVE-2017-16645/" source="CVE"/>
		<reference ref_id="CVE-2017-16646" ref_url="https://www.suse.com/security/cve/CVE-2017-16646/" source="CVE"/>
		<reference ref_id="CVE-2017-16994" ref_url="https://www.suse.com/security/cve/CVE-2017-16994/" source="CVE"/>
		<reference ref_id="CVE-2017-17448" ref_url="https://www.suse.com/security/cve/CVE-2017-17448/" source="CVE"/>
		<reference ref_id="CVE-2017-17449" ref_url="https://www.suse.com/security/cve/CVE-2017-17449/" source="CVE"/>
		<reference ref_id="CVE-2017-17450" ref_url="https://www.suse.com/security/cve/CVE-2017-17450/" source="CVE"/>
		<reference ref_id="CVE-2017-7482" ref_url="https://www.suse.com/security/cve/CVE-2017-7482/" source="CVE"/>
		<reference ref_id="CVE-2017-8824" ref_url="https://www.suse.com/security/cve/CVE-2017-8824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 kernel was updated to 4.4.103 to receive various security and bugfixes.

This update enables SMB encryption in the CIFS support in the Linux Kernel (fate#324404)

The following security bugs were fixed:

- CVE-2017-1000410: The Linux kernel was affected by an information leak in the processing of incoming L2CAP commands - ConfigRequest, and ConfigResponse messages. (bnc#1070535).
- CVE-2017-11600: net/xfrm/xfrm_policy.c in the Linux kernel did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bnc#1050231).
- CVE-2017-12193: The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel mishandled node splitting, which allowed local users to cause a denial of service (NULL pointer dereference and panic) via a crafted application, as demonstrated by the keyring key type, and key addition and link creation operations (bnc#1066192).
- CVE-2017-15115: The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel did not check whether the intended netns is used in a peel-off action, which allowed local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls (bnc#1068671).
- CVE-2017-15265: Race condition in the ALSA subsystem in the Linux kernel allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c (bnc#1062520).
- CVE-2017-16528: sound/core/seq_device.c in the Linux kernel allowed local users to cause a denial of service (snd_rawmidi_dev_seq_free use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066629).
- CVE-2017-16536: The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066606).
- CVE-2017-16537: The imon_probe function in drivers/media/rc/imon.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066573).
- CVE-2017-16645: The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel allowed local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067132).
- CVE-2017-16646: drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel allowed local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067105).
- CVE-2017-16994: The walk_hugetlb_range function in mm/pagewalk.c in the Linux kernel mishandled holes in hugetlb ranges, which allowed local users to obtain sensitive information from uninitialized kernel memory via crafted use of the mincore() system call (bnc#1069996).
- CVE-2017-17448: net/netfilter/nfnetlink_cthelper.c in the Linux kernel did not require the CAP_NET_ADMIN capability for new, get, and del operations, which allowed local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces (bnc#1071693).
- CVE-2017-17449: The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, did not restrict observations of Netlink messages to a single net namespace, which allowed local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system (bnc#1071694).
- CVE-2017-17450: net/netfilter/xt_osf.c in the Linux kernel did not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allowed local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces (bnc#1071695).
- CVE-2017-7482: Fixed an overflow when decoding a krb5 principal. (bnc#1046107).
- CVE-2017-8824: The dccp_disconnect function in net/dccp/proto.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state (bnc#1070771).

The following non-security bugs were fixed:

- adm80211: return an error if adm8211_alloc_rings() fails (bsc#1031717).
- adv7604: Initialize drive strength to default when using DT (bnc#1012382).
- af_netlink: ensure that NLMSG_DONE never fails in dumps (bnc#1012382).
- alsa: au88x0: avoid theoretical uninitialized access (bnc#1012382).
- alsa: caiaq: Fix stray URB at probe error path (bnc#1012382).
- alsa: compress: Remove unused variable (bnc#1012382).
- alsa: hda: Add Raven PCI ID (bnc#1012382).
- alsa: hda - Apply ALC269_FIXUP_NO_SHUTUP on HDA_FIXUP_ACT_PROBE (bnc#1012382).
- alsa: hda/ca0132 - Fix memory leak at error path (bsc#1031717).
- alsa: hda - fix headset mic problem for Dell machines with alc236 (bnc#1012382).
- alsa: hda - No loopback on ALC299 codec (git-fixes).
- alsa: hda/realtek: Add headset mic support for Intel NUC Skull Canyon (bsc#1031717).
- alsa: hda/realtek - Add new codec ID ALC299 (bnc#1012382).
- alsa: hda/realtek - Add support for ALC236/ALC3204 (bnc#1012382).
- alsa: hda/realtek - Fix ALC700 family no sound issue (bsc#1031717).
- alsa: hda: Remove superfluous '-' added by printk conversion (bnc#1012382).
- alsa: line6: Fix leftover URB at error-path during probe (bnc#1012382).
- alsa: pcm: update tstamp only if audio_tstamp changed (bsc#1031717).
- alsa: seq: Avoid invalid lockdep class warning (bsc#1031717).
- alsa: seq: Enable 'use' locking in all configurations (bnc#1012382).
- alsa: seq: Fix copy_from_user() call inside lock (bnc#1012382).
- alsa: seq: Fix nested rwsem annotation for lockdep splat (bnc#1012382).
- alsa: seq: Fix OSS sysex delivery in OSS emulation (bnc#1012382).
- alsa: timer: Add missing mutex lock for compat ioctls (bnc#1012382).
- alsa: timer: Remove kernel warning at compat ioctl error paths (bsc#1031717).
- alsa: usb-audio: Add native DSD support for Pro-Ject Pre Box S2 Digital (bnc#1012382).
- alsa: usb-audio: Add sanity checks in v2 clock parsers (bsc#1031717).
- alsa: usb-audio: Add sanity checks to FE parser (bsc#1031717).
- alsa: usb-audio: Check out-of-bounds access by corrupted buffer descriptor (bnc#1012382).
- alsa: usb-audio: Fix potential out-of-bound access at parsing SU (bsc#1031717).
- alsa: usb-audio: Kill stray URB at exiting (bnc#1012382).
- alsa: usb-audio: uac1: Invalidate ctl on interrupt (bsc#1031717).
- alsa: usx2y: Suppress kernel warning at page allocation failures (bnc#1012382).
- alsa: vx: Do not try to update capture stream before running (bnc#1012382).
- alsa: vx: Fix possible transfer overflow (bnc#1012382).
- Apply generic ppc build fixes to vanilla (bsc#1070805)
- arm64: dts: NS2: reserve memory for Nitro firmware (bnc#1012382).
- arm64: ensure __dump_instr() checks addr_limit (bnc#1012382).
- arm64: fix dump_instr when PAN and UAO are in use (bnc#1012382).
- arm: 8635/1: nommu: allow enabling REMAP_VECTORS_TO_RAM (bnc#1012382).
- arm: 8715/1: add a private asm/unaligned.h (bnc#1012382).
- arm: 8720/1: ensure dump_instr() checks addr_limit (bnc#1012382).
- arm: 8721/1: mm: dump: check hardware RO bit for LPAE (bnc#1012382).
- arm: 8722/1: mm: make STRICT_KERNEL_RWX effective for LPAE (bnc#1012382).
- arm: crypto: reduce priority of bit-sliced AES cipher (bnc#1012382).
- arm: dts: Fix am335x and dm814x scm syscon to probe children (bnc#1012382).
- arm: dts: Fix compatible for ti81xx uarts for 8250 (bnc#1012382).
- arm: dts: Fix omap3 off mode pull defines (bnc#1012382).
- arm: dts: mvebu: pl310-cache disable double-linefill (bnc#1012382).
- arm: dts: r8a7790: Use R-Car Gen 2 fallback binding for msiof nodes (bnc#1012382).
- arm: OMAP2+: Fix init for multiple quirks for the same SoC (bnc#1012382).
- arm: omap2plus_defconfig: Fix probe errors on UARTs 5 and 6 (bnc#1012382).
- arm: pxa: Do not rely on public mmc header to include leds.h (bnc#1012382).
- arm: remove duplicate 'const' annotations' (bnc#1012382).
- asm/sections: add helpers to check for section data (bsc#1063026).
- asoc: adau17x1: Workaround for noise bug in ADC (bnc#1012382).
- asoc: cs42l56: Fix reset GPIO name in example DT binding (bsc#1031717).
- asoc: dapm: fix some pointer error handling (bnc#1012382).
- asoc: dapm: handle probe deferrals (bnc#1012382).
- asoc: davinci-mcasp: Fix an error handling path in 'davinci_mcasp_probe()' (bsc#1031717).
- asoc: rsnd: do not double free kctrl (bnc#1012382).
- asoc: samsung: Fix possible double iounmap on s3c24xx driver probe failure (bsc#1031717).
- asoc: wm_adsp: Do not overrun firmware file buffer when reading region data (bnc#1012382).
- ata: ATA_BMDMA should depend on HAS_DMA (bnc#1012382).
- ata: fixes kernel crash while tracing ata_eh_link_autopsy event (bnc#1012382).
- ata: SATA_HIGHBANK should depend on HAS_DMA (bnc#1012382).
- ata: SATA_MV should depend on HAS_DMA (bnc#1012382).
- ath10k: convert warning about non-existent OTP board id to debug message (git-fixes).
- ath10k: fix a warning during channel switch with multiple vaps (bsc#1031717).
- ath10k: fix board data fetch error message (bsc#1031717).
- ath10k: fix diag_read to collect data for larger memory (bsc#1031717).
- ath10k: fix incorrect txpower set by P2P_DEVICE interface (bnc#1012382).
- ath10k: fix potential memory leak in ath10k_wmi_tlv_op_pull_fw_stats() (bnc#1012382).
- ath10k: free cached fw bin contents when get board id fails (bsc#1031717).
- ath10k: ignore configuring the incorrect board_id (bnc#1012382).
- ath10k: set CTS protection VDEV param only if VDEV is up (bnc#1012382).
- ath9k_htc: check for underflow in ath9k_htc_rx_msg() (bsc#1031717).
- ath9k: off by one in ath9k_hw_nvram_read_array() (bsc#1031717).
- audit: log 32-bit socketcalls (bnc#1012382).
- autofs: do not fail mount for transient error (bsc#1065180).
- backlight: adp5520: Fix error handling in adp5520_bl_probe() (bnc#1012382).
- backlight: lcd: Fix race condition during register (bnc#1012382).
- bcache: check ca-&gt;alloc_thread initialized before wake up it (bnc#1012382).
- block: Fix a race between blk_cleanup_queue() and timeout handling (FATE#319965, bsc#964944).
- bluetooth: btusb: fix QCA Rome suspend/resume (bnc#1012382).
- bnxt_en: Call firmware to approve the random VF MAC address (bsc#963575 FATE#320144).
- bnxt_en: Do not setup MAC address in bnxt_hwrm_func_qcaps() (bsc#963575 FATE#320144).
- bnxt_en: Fix possible corrupted NVRAM parameters from firmware response (bsc#963575 FATE#320144).
- bnxt_en: Fix VF PCIe link speed and width logic (bsc#963575 FATE#320144).
- bnxt_en: Re-arrange bnxt_hwrm_func_qcaps() (bsc#963575 FATE#320144).
- bnxt_en: use eth_hw_addr_random() (bsc#963575 FATE#320144).
- bonding: discard lowest hash bit for 802.3ad layer3+4 (bnc#1012382).
- bpf: one perf event close won't free bpf program attached by another perf event (bnc#1012382).
- bpf/verifier: reject BPF_ALU64|BPF_END (bnc#1012382).
- brcmfmac: add length check in brcmf_cfg80211_escan_handler() (bnc#1012382).
- brcmfmac: remove setting IBSS mode when stopping AP (bnc#1012382).
- brcmfmac: setup passive scan if requested by user-space (bnc#1012382).
- brcmsmac: make some local variables 'static const' to reduce stack size (bnc#1012382).
- bridge: netlink: register netdevice before executing changelink (bnc#1012382).
- bt8xx: fix memory leak (bnc#1012382).
- btrfs: add a node counter to each of the rbtrees (bsc#974590 bsc#1030061 bsc#1022914 bsc#1017461).
- btrfs: add cond_resched() calls when resolving backrefs (bsc#974590 bsc#1030061 bsc#1022914 bsc#1017461).
- btrfs: allow backref search checks for shared extents (bsc#974590 bsc#1030061 bsc#1022914 bsc#1017461).
- btrfs: backref, add tracepoints for prelim_ref insertion and merging (bsc#974590 bsc#1030061 bsc#1022914 bsc#1017461).
- btrfs: backref, add unode_aux_to_inode_list helper (bsc#974590 bsc#1030061 bsc#1022914 bsc#1017461).
- btrfs: backref, cleanup __ namespace abuse (bsc#974590 bsc#1030061 bsc#1022914 bsc#1017461).
- btrfs: backref, constify some arguments (bsc#974590 bsc#1030061 bsc#1022914 bsc#1017461).
- btrfs: btrfs_check_shared should manage its own transaction (bsc#974590 bsc#1030061 bsc#1022914 bsc#1017461).
- btrfs: clean up extraneous computations in add_delayed_refs (bsc#974590 bsc#1030061 bsc#1022914 bsc#1017461).
- btrfs: constify tracepoint arguments (bsc#974590 bsc#1030061 bsc#1022914 bsc#1017461).
- btrfs: convert prelimary reference tracking to use rbtrees (bsc#974590 bsc#1030061 bsc#1022914 bsc#1017461).
- btrfs: fix leak and use-after-free in resolve_indirect_refs (bsc#974590 bsc#1030061 bsc#1022914 bsc#1017461).
- btrfs: Fix typo in may_commit_transaction Rather than comparing the result of the percpu comparison I was comparing the value of the percpu counter against 0 or 1.
- btrfs: remove ref_tree implementation from backref.c (bsc#974590 bsc#1030061 bsc#1022914 bsc#1017461).
- btrfs: return the actual error value from from btrfs_uuid_tree_iterate (bnc#1012382).
- btrfs: struct-funcs, constify readers (bsc#974590 bsc#1030061 bsc#1022914 bsc#1017461).
- bus: mbus: fix window size calculation for 4GB windows (bnc#1012382).
- can: c_can: do not indicate triple sampling support for D_CAN (bnc#1012382).
- can: esd_usb2: Fix can_dlc value for received RTR, frames (bnc#1012382).
- can: gs_usb: fix busy loop if no more TX context is available (bnc#1012382).
- can: kvaser_usb: Correct return value in printout (bnc#1012382).
- can: kvaser_usb: Ignore CMD_FLUSH_QUEUE_REPLY messages (bnc#1012382).
- can: sun4i: fix loopback mode (bnc#1012382).
- can: sun4i: handle overrun in RX FIFO (bnc#1012382).
- cdc_ncm: Set NTB format again after altsetting switch for Huawei devices (bnc#1012382).
- ceph: avoid panic in create_session_open_msg() if utsname() returns NULL (bsc#1061451).
- ceph: check negative offsets in ceph_llseek() (bsc#1061451).
- ceph: clean up unsafe d_parent accesses in build_dentry_path (bnc#1012382).
- ceph: unlock dangling spinlock in try_flush_caps() (bsc#1065639).
- cgroup, net_cls: iterate the fds of only the tasks which are being migrated (bnc#1064926).
- cifs: add build_path_from_dentry_optional_prefix() (fate#323482)
- cifs: Add capability to decrypt big read responses (FATE#324404). Allow to decrypt transformed packets that are bigger than the big buffer size. In particular it is used for read responses that can only exceed the big buffer size.
- cifs: Add capability to transform requests before sending (FATE#324404). This will allow us to do protocol specific tranformations of packets before sending to the server. For SMB3 it can be used to support encryption.
- cifs: Add copy into pages callback for a read operation (FATE#324404). Since we have two different types of reads (pagecache and direct) we need to process such responses differently after decryption of a packet. The change allows to specify a callback that copies a read payload data into preallocated pages.
- cifs: Add mid handle callback (FATE#324404). We need to process read responses differently because the data should go directly into preallocated pages. This can be done by specifying a mid handle callback.
- cifs: Add soft dependencies (FATE#324404). List soft dependencies of cifs so that mkinitrd and dracut can include the required helper modules.
- cifs: Add transform header handling callbacks (FATE#324404). We need to recognize and parse transformed packets in demultiplex thread to find a corresponsing mid and process it further.
- cifs: add use_ipc flag to SMB2_ioctl() (fate#323482)
- cifs: Allow to switch on encryption with seal mount  option (FATE#324404). This allows users to inforce encryption for SMB3 shares if a server supports it.
- cifs: check MaxPathNameComponentLength != 0 before using it (bnc#1012382).
- cifs: Decrypt and process small encrypted packets (FATE#324404). Allow to decrypt transformed packets, find a corresponding mid and process as usual further.
- cifs: do not bother with kmap on read_pages side (FATE#324404). just do ITER_BVEC recvmsg
- cifs: Enable encryption during session setup phase  (FATE#324404). In order to allow encryption on SMB connection we need to exchange a session key and generate encryption and decryption keys.
- cifs: Encrypt SMB3 requests before sending (FATE#324404). This change allows to encrypt packets if it is required by a server for SMB sessions or tree connections.
- cifs: fix circular locking dependency (bsc#1064701).
- cifs: Fix some return values in case of error in 'crypt_message' (fate#324404).
- cifs: Fix sparse warnings (fate#323482)
- cifs: implement get_dfs_refer for SMB2+ (fate#323482)
- cifs: let ses-&gt;ipc_tid hold smb2 TreeIds (fate#323482)
- cifs: Make send_cancel take rqst as argument (FATE#324404).
- cifs: Make SendReceive2() takes resp iov (FATE#324404). Now SendReceive2 frees the first iov and returns a response buffer in it that increases a code complexity. Simplify this by making a caller responsible for freeing request buffer itself and returning a response buffer in a separate iov.
- cifs: move DFS response parsing out of SMB1 code (fate#323482)
- cifs: no need to wank with copying and advancing iovec on recvmsg side  either (FATE#324404).
- cifs: Only select the required crypto modules (FATE#324404). The sha256 and cmac crypto modules are only needed for SMB2+, so move the select statements to config CIFS_SMB2. Also select CRYPTO_AES there as SMB2+ needs it.
- cifs: Prepare for encryption support (first part). Add decryption and encryption key generation. (FATE#324404).
- cifs_readv_receive: use cifs_read_from_socket() (FATE#324404).
- cifs: Reconnect expired SMB sessions (bnc#1012382).
- cifs: remove any preceding delimiter from prefix_path (fate#323482)
- cifs: Send RFC1001 length in a separate iov (FATE#324404). In order to simplify further encryption support we need to separate RFC1001 length and SMB2 header when sending a request. Put the length field in iov[0] and the rest of the packet into following iovs.
- cifs: Separate RFC1001 length processing for SMB2 read (FATE#324404). Allocate and initialize SMB2 read request without RFC1001 length field to directly call cifs_send_recv() rather than SendReceive2() in a read codepath.
- cifs: Separate SMB2 header structure (FATE#324404). In order to support compounding and encryption we need to separate RFC1001 length field and SMB2 header structure because the protocol treats them differently. This change will allow to simplify parsing of such complex SMB2 packets further.
- cifs: Separate SMB2 sync header processing (FATE#324404). Do not process RFC1001 length in smb2_hdr_assemble() because it is not a part of SMB2 header. This allows to cleanup the code and adds a possibility combine several SMB2 packets into one for compounding.
- cifs: set signing flag in SMB2+ TreeConnect if needed (fate#323482)
- cifs: Simplify SMB2 and SMB311 dependencies (FATE#324404).
- clk: ti: dra7-atl-clock: fix child-node lookups (bnc#1012382).
- clk: ti: dra7-atl-clock: Fix of_node reference counting (bnc#1012382).
- clockevents/drivers/cs5535: Improve resilience to spurious interrupts (bnc#1012382).
- cma: fix calculation of aligned offset (VM Functionality, bsc#1050060).
- coda: fix 'kernel memory exposure attempt' in fsync (bnc#1012382).
- cpufreq: CPPC: add ACPI_PROCESSOR dependency (bnc#1012382).
- crypto: shash - Fix zero-length shash ahash digest crash (bnc#1012382).
- crypto: vmx - disable preemption to enable vsx in aes_ctr.c (bnc#1012382).
- crypto: x86/sha1-mb - fix panic due to unaligned access (bnc#1012382).
- crypto: xts - Add ECB dependency (bnc#1012382).
- cx231xx: Fix I2C on Internal Master 3 Bus (bnc#1012382).
- cxgb4: Fix error codes in c4iw_create_cq() (bsc#1021424).
- cxl: Fix DAR check &amp; use REGION_ID instead of opencoding (bsc#1066223).
- cxl: Fix leaking pid refs in some error paths (bsc#1066223).
- cxl: Force context lock during EEH flow (bsc#1066223).
- cxl: Prevent adapter reset if an active context exists (bsc#1066223).
- cxl: Route eeh events to all drivers in cxl_pci_error_detected() (bsc#1066223).
- direct-io: Prevent NULL pointer access in submit_page_section (bnc#1012382).
- Disable patches.kernel.org/4.4.93-022-fix-unbalanced-page-refcounting-in-bio_map_use.patch (bsc#1070767)
- dmaengine: dmatest: warn user when dma test times out (bnc#1012382).
- dmaengine: edma: Align the memcpy acnt array size with the transfer (bnc#1012382).
- dmaengine: zx: set DMA_CYCLIC cap_mask bit (bnc#1012382).
- dm bufio: fix integer overflow when limiting maximum cache size (bnc#1012382).
- dm: fix race between dm_get_from_kobject() and __dm_destroy() (bnc#1012382).
- driver core: platform: Do not read past the end of 'driver_override' buffer (bnc#1012382).
- drivers: dma-mapping: Do not leave an invalid area-&gt;pages pointer in dma_common_contiguous_remap() (Git-fixes, bsc#1065692).
- drivers: firmware: psci: drop duplicate const from psci_of_match (bnc#1012382).
- drivers: hv: fcopy: restore correct transfer length (bnc#1012382).
- drm/amdgpu: when dpm disabled, also need to stop/start vce (bnc#1012382).
- drm/amdkfd: fix improper return value on error (bnc#1012382).
- drm/amdkfd: NULL dereference involving create_process() (bsc#1031717).
- drm: Apply range restriction after color adjustment when allocation (bnc#1012382).
- drm/armada: Fix compile fail (bnc#1012382).
- drm: bridge: add DT bindings for TI ths8135 (bnc#1012382).
- drm: drm_minor_register(): Clean up debugfs on failure (bnc#1012382).
- drm_fourcc: Fix DRM_FORMAT_MOD_LINEAR #define (bnc#1012382).
- drm: gma500: fix logic error (bsc#1031717).
- drm/i915/bios: ignore HDMI on port A (bnc#1012382).
- drm/i915/bxt: set min brightness from VBT (bsc#1031717).
- drm/i915: Do not try indexed reads to alternate slave addresses (bsc#1031717).
- drm/i915: fix backlight invert for non-zero minimum brightness (bsc#1031717).
- drm/i915: Prevent zero length 'index' write (bsc#1031717).
- drm/i915: Read timings from the correct transcoder in intel_crtc_mode_get() (bsc#1031717).
- drm/msm: fix an integer overflow test (bnc#1012382).
- drm/msm: Fix potential buffer overflow issue (bnc#1012382).
- drm/nouveau/bsp/g92: disable by default (bnc#1012382).
- drm/nouveau/gr: fallback to legacy paths during firmware lookup (bsc#1031717).
- drm/nouveau/mmu: flush tlbs before deleting page tables (bnc#1012382).
- drm/omap: Fix error handling path in 'omap_dmm_probe()' (bsc#1031717).
- drm/panel: simple: Add missing panel_simple_unprepare() calls (bsc#1031717).
- drm/sti: sti_vtg: Handle return NULL error from devm_ioremap_nocache (bnc#1012382).
- drm/vc4: Fix leak of HDMI EDID (bsc#1031717).
- drm/vmwgfx: Fix Ubuntu 17.10 Wayland black screen issue (bnc#1012382).
- e1000e: Fix error path in link detection (bnc#1012382).
- e1000e: Fix return value test (bnc#1012382).
- e1000e: Separate signaling for link check/link up (bnc#1012382).
- ecryptfs: fix dereference of NULL user_key_payload (bnc#1012382).
- eCryptfs: use after free in ecryptfs_release_messaging() (bsc#1012829).
- epoll: avoid calling ep_call_nested() from ep_poll_safewake() (bsc#1056427).
- epoll: remove ep_call_nested() from ep_eventpoll_poll() (bsc#1056427).
- ext4: cleanup goto next group (bsc#1066285).
- ext4: do not allow encrypted operations without keys (bnc#1012382). patches.drivers/0001-iwlwifi-nvm-fix-up-phy-section-when-reading-it.patch.
- ext4: do not use stripe_width if it is not set (bnc#1012382).
- ext4: fix interaction between i_size, fallocate, and delalloc after a crash (bnc#1012382).
- ext4: fix stripe-unaligned allocations (bnc#1012382).
- ext4: in ext4_seek_{hole,data}, return -ENXIO for negative offsets (bnc#1012382).
- ext4: reduce lock contention in __ext4_new_inode (bsc#1066285).
- extcon: axp288: Use vbus-valid instead of -present to determine cable presence (bnc#1012382).
- extcon: palmas: Check the parent instance to prevent the NULL (bnc#1012382).
- exynos4-is: fimc-is: Unmap region obtained by of_iomap() (bnc#1012382).
- exynos-gsc: Do not swap cb/cr for semi planar formats (bnc#1012382).
- f2fs crypto: add missing locking for keyring_key access (bnc#1012382).
- f2fs crypto: replace some BUG_ON()'s with error checks (bnc#1012382).
- f2fs: do not wait for writeback in write_begin (bnc#1012382).
- fealnx: Fix building error on MIPS (bnc#1012382).
- fix a page leak in vhost_scsi_iov_to_sgl() error recovery (bnc#1012382).
- Fix serial console on SNI RM400 machines (bsc#1031717).
- Fix tracing sample code warning (bnc#1012382).
- fix unbalanced page refcounting in bio_map_user_iov (bnc#1012382).
- fix whitespace according to upstream commit
- fm10k: request reset when mbx-&gt;state changes (bnc#1012382).
- fm10k: Use smp_rmb rather than read_barrier_depends (bnc#1012382).
- fs/9p: Compare qid.path in v9fs_test_inode (bsc#1012829).
- fs-cache: fix dereference of NULL user_key_payload (bnc#1012382).
- fscrypt: fix dereference of NULL user_key_payload (bnc#1012382).
- fscrypt: lock mutex before checking for bounce page pool (bnc#1012382).
- fscrypto: require write access to mount to set encryption policy (bnc#1012382).
- fs/epoll: cache leftmost node (bsc#1056427).
- ftrace: Fix kmemleak in unregister_ftrace_graph (bnc#1012382).
- fuse: fix READDIRPLUS skipping an entry (bnc#1012382).
- gfs2: Fix reference to ERR_PTR in gfs2_glock_iter_next (bnc#1012382).
- gpu: drm: mgag200: mgag200_main:- Handle error from pci_iomap (bnc#1012382).
- hid: elo: clear BTN_LEFT mapping (bsc#1065866).
- hid: i2c-hid: allocate hid buffers for real worst case (bnc#1012382).
- hid: usbhid: fix out-of-bounds bug (bnc#1012382).
- hpsa: correct lun data caching bitmap definition (bsc#1028971).
- hsi: ssi_protocol: double free in ssip_pn_xmit() (bsc#1031717).
- hwmon: (gl520sm) Fix overflows and crash seen when writing into limit attributes (bnc#1012382).
- i2c: at91: ensure state is restored after suspending (bnc#1012382).
- i2c: cadance: fix ctrl/addr reg write order (bsc#1031717).
- i2c: imx: Use correct function to write to register (bsc#1031717).
- i2c: ismt: Separate I2C block read from SMBus block read (bnc#1012382).
- i2c: meson: fix wrong variable usage in meson_i2c_put_data (bnc#1012382).
- i2c: riic: correctly finish transfers (bnc#1012382).
- i2c: riic: fix restart condition (git-fixes).
- i40e: Initialize 64-bit statistics TX ring seqcount (bsc#969476 FATE#319648 bsc#969477 FATE#319816).
- i40e: Use smp_rmb rather than read_barrier_depends (bnc#1012382).
- i40evf: Use smp_rmb rather than read_barrier_depends (bnc#1012382).
- i40iw: Add missing memory barriers (bsc#969476 FATE#319648 bsc#969477 FATE#319816).
- i40iw: Fix port number for query QP (bsc#969476 FATE#319648 bsc#969477 FATE#319816).
- ib/core: Fix calculation of maximum RoCE MTU (bsc#1022595 FATE#322350).
- ib/core: Fix for core panic (bsc#1022595 FATE#322350).
- ib/core: Fix the validations of a multicast LID in attach or detach operations (bsc#1022595 FATE#322350).
- ib/core: Namespace is mandatory input for address resolution (bsc#1022595 FATE#322350).
- ib/i40iw: Fix error code in i40iw_create_cq() (bsc#969476 FATE#319648 bsc#969477 FATE#319816).
- ib/ipoib: Change list_del to list_del_init in the tx object (bnc#1012382).
- ib/ipoib: Clean error paths in add port (bsc#1022595 FATE#322350).
- ib/ipoib: Fix deadlock over vlan_mutex (bnc#1012382).
- ib/ipoib: Prevent setting negative values to max_nonsrq_conn_qp (bsc#1022595 FATE#322350).
- ib/ipoib: Remove double pointer assigning (bsc#1022595 FATE#322350).
- ib/ipoib: Replace list_del of the neigh-&gt;list with list_del_init (bnc#1012382).
- ib/ipoib: rtnl_unlock can not come after free_netdev (bnc#1012382).
- ib/ipoib: Set IPOIB_NEIGH_TBL_FLUSH after flushed completion initialization (bsc#1022595 FATE#322350).
- ib/mlx5: Fix Raw Packet QP event handler assignment (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- ib/mlx5: Fix RoCE Address Path fields (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- ibmvnic: Add netdev_dbg output for debugging (fate#323285).
- ibmvnic: Add vnic client data to login buffer (bsc#1069942).
- ibmvnic: Convert vnic server reported statistics to cpu endian (fate#323285).
- ibmvnic: Enable scatter-gather support (bsc#1066382).
- ibmvnic: Enable TSO support (bsc#1066382).
- ibmvnic: Feature implementation of Vital Product Data (VPD) for the ibmvnic driver (bsc#1069942).
- ibmvnic: Fix calculation of number of TX header descriptors (bsc#1066382).
- ibmvnic: fix dma_mapping_error call (bsc#1069942).
- ibmvnic: Fix failover error path for non-fatal resets (bsc#1066382).
- ibmvnic: Implement .get_channels (fate#323285).
- ibmvnic: Implement .get_ringparam (fate#323285).
- ibmvnic: Implement per-queue statistics reporting (fate#323285).
- ibmvnic: Let users change net device features (bsc#1066382).
- ibmvnic: Set state UP (bsc#1062962).
- ibmvnic: Update reset infrastructure to support tunable parameters (bsc#1066382).
- ib/qib: fix false-postive maybe-uninitialized warning (bnc#1012382).
- ib/srp: Avoid that a cable pull can trigger a kernel crash (bsc#1022595 FATE#322350).
- ib/srpt: Do not accept invalid initiator port names (bnc#1012382).
- ib/uverbs: Fix device cleanup (bsc#1022595 FATE#322350).
- ib/uverbs: Fix NULL pointer dereference during device removal (bsc#1022595 FATE#322350).
- igb: close/suspend race in netif_device_detach (bnc#1012382).
- igb: Fix hw_dbg logging in igb_update_flash_i210 (bnc#1012382).
- igb: re-assign hw address pointer on reset after PCI error (bnc#1012382).
- igb: reset the PHY before reading the PHY ID (bnc#1012382).
- igb: Use smp_rmb rather than read_barrier_depends (bnc#1012382).
- igbvf: Use smp_rmb rather than read_barrier_depends (bnc#1012382).
- iio: ad7793: Fix the serial interface reset (bnc#1012382).
- iio: adc: axp288: Drop bogus AXP288_ADC_TS_PIN_CTRL register modifications (bnc#1012382).
- iio: adc: hx711: Add DT binding for avia,hx711 (bnc#1012382).
- iio: adc: mcp320x: Fix oops on module unload (bnc#1012382).
- iio: adc: mcp320x: Fix readout of negative voltages (bnc#1012382).
- iio: adc: twl4030: Disable the vusb3v1 rugulator in the error handling path of 'twl4030_madc_probe()' (bnc#1012382).
- iio: adc: twl4030: Fix an error handling path in 'twl4030_madc_probe()' (bnc#1012382).
- iio: adc: xilinx: Fix error handling (bnc#1012382).
- iio: ad_sigma_delta: Implement a dedicated reset function (bnc#1012382).
- iio: core: Return error for failed read_reg (bnc#1012382).
- iio: dummy: events: Add missing break (bsc#1031717).
- iio: light: fix improper return value (bnc#1012382).
- iio: trigger: free trigger resource correctly (bnc#1012382).
- ima: do not update security.ima if appraisal status is not INTEGRITY_PASS (bnc#1012382).
- input: ar1021_i2c - fix too long name in driver's device table (bsc#1031717).
- input: edt-ft5x06 - fix setting gain, offset, and threshold via device tree (bsc#1031717).
- input: elan_i2c - add ELAN060C to the ACPI table (bnc#1012382).
- input: elan_i2c - add ELAN0611 to the ACPI table (bnc#1012382).
- input: gtco - fix potential out-of-bound access (bnc#1012382).
- input: mpr121 - handle multiple bits change of status register (bnc#1012382).
- input: mpr121 - set missing event capability (bnc#1012382).
- input: ti_am335x_tsc - fix incorrect step config for 5 wire touchscreen (bsc#1031717).
- input: twl4030-pwrbutton - use correct device for irq request (bsc#1031717).
- input: ucb1400_ts - fix suspend and resume handling (bsc#1031717).
- input: uinput - avoid crash when sending FF request to device going away (bsc#1031717).
- iommu/amd: Finish TLB flush in amd_iommu_unmap() (bnc#1012382).
- iommu/arm-smmu-v3: Clear prior settings when updating STEs (bnc#1012382).
- iommu/io-pgtable-arm: Check for leaf entry before dereferencing it (bnc#1012382).
- iommu/vt-d: Do not register bus-notifier under dmar_global_lock (bsc#1069793).
- ip6_gre: only increase err_count for some certain type icmpv6 in ip6gre_err (bnc#1012382).
- ip6_gre: skb_push ipv6hdr before packing the header in ip6gre_header (bnc#1012382).
- ipip: only increase err_count for some certain type icmp in ipip_err (bnc#1012382).
- ipmi: Disable IPMI fix patches due to regression (bsc#1071833)
- ipmi: fix unsigned long underflow (bnc#1012382).
- ipmi: Pick up slave address from SMBIOS on an ACPI device (bsc#1070006).
- ipmi: Prefer ACPI system interfaces over SMBIOS ones (bsc#1070006).
- ipmi_si: Clean up printks (bsc#1070006).
- ipmi_si: fix memory leak on new_smi (bsc#1070006).
- ipsec: do not ignore crypto err in ah4 input (bnc#1012382).
- ipv6: flowlabel: do not leave opt-&gt;tot_len with garbage (bnc#1012382).
- ipv6: only call ip6_route_dev_notify() once for NETDEV_UNREGISTER (bnc#1012382).
- ipvs: make drop_entry protection effective for SIP-pe (bsc#1056365).
- irqchip/crossbar: Fix incorrect type of local variables (bnc#1012382).
- isa: Prevent NULL dereference in isa_bus driver callbacks (bsc#1031717).
- iscsi-target: Fix non-immediate TMR reference leak (bnc#1012382).
- isdn/i4l: fetch the ppp_write buffer in one shot (bnc#1012382).
- isofs: fix timestamps beyond 2027 (bnc#1012382).
- iwlwifi: add workaround to disable wide channels in 5GHz (bnc#1012382).
- iwlwifi: mvm: fix the coex firmware API (bsc#1031717).
- iwlwifi: mvm: return -ENODATA when reading the temperature with the FW down (bsc#1031717).
- iwlwifi: mvm: set the RTS_MIMO_PROT bit in flag mask when sending sta to fw (bsc#1031717).
- iwlwifi: mvm: use IWL_HCMD_NOCOPY for MCAST_FILTER_CMD (bnc#1012382).
- iwlwifi: split the regulatory rules when the bandwidth flags require it (bsc#1031717).
- ixgbe: add mask for 64 RSS queues (bnc#1012382).
- ixgbe: do not disable FEC from the driver (bnc#1012382).
- ixgbe: fix AER error handling (bnc#1012382).
- ixgbe: Fix incorrect bitwise operations of PTP Rx timestamp flags (bsc#969474 FATE#319812 bsc#969475 FATE#319814).
- ixgbe: Fix skb list corruption on Power systems (bnc#1012382).
- ixgbe: handle close/suspend race with netif_device_detach/present (bnc#1012382).
- ixgbe: Reduce I2C retry count on X550 devices (bnc#1012382).
- ixgbevf: Use smp_rmb rather than read_barrier_depends (bnc#1012382).
- kABI: protect struct l2tp_tunnel (kabi).
- kABI: protect struct regulator_dev (kabi).
- kABI: protect struct rm_data_op (kabi).
- kABI: protect struct sdio_func (kabi).
- kABI: protect structs rt_rq+root_domain (kabi).
- kABI: protect typedef rds_rdma_cookie_t (kabi).
- kernel-docs: unpack the source instead of using kernel-source (bsc#1057199).
- kernel/sysctl.c: remove duplicate UINT_MAX check on do_proc_douintvec_conv() (bsc#1066470).
- kernel/watchdog: Prevent false positives with turbo modes (bnc#1063516).
- keys: do not let add_key() update an uninstantiated key (bnc#1012382).
- keys: do not revoke uninstantiated key in request_key_auth_new() (bsc#1031717).
- keys: encrypted: fix dereference of NULL user_key_payload (bnc#1012382).
- keys: fix cred refcount leak in request_key_auth_new() (bsc#1031717).
- keys: fix key refcount leak in keyctl_assume_authority() (bsc#1031717).
- keys: fix key refcount leak in keyctl_read_key() (bsc#1031717).
- keys: fix NULL pointer dereference during ASN.1 parsing [ver #2] (bnc#1012382).
- keys: fix out-of-bounds read during ASN.1 parsing (bnc#1012382).
- keys: Fix race between updating and finding a negative key (bnc#1012382).
- keys: return full count in keyring_read() if buffer is too small (bnc#1012382).
- keys: trusted: fix writing past end of buffer in trusted_read() (bnc#1012382).
- keys: trusted: sanitize all key material (bnc#1012382).
- kvm: nVMX: fix guest CR4 loading when emulating L2 to L1 exit (bnc#1012382).
- kvm: nVMX: set IDTR and GDTR limits when loading L1 host state (bnc#1012382).
- kvm: PPC: Book 3S: XICS: correct the real mode ICP rejecting counter (bnc#1012382).
- kvm: SVM: obey guest PAT (bnc#1012382).
- l2tp: Avoid schedule while atomic in exit_net (bnc#1012382).
- l2tp: check ps-&gt;sock before running pppol2tp_session_ioctl() (bnc#1012382).
- l2tp: fix race condition in l2tp_tunnel_delete (bnc#1012382).
- libata: transport: Remove circular dependency at free time (bnc#1012382).
- lib/digsig: fix dereference of NULL user_key_payload (bnc#1012382).
- libertas: Fix lbs_prb_rsp_limit_set() (bsc#1031717).
- lib/mpi: call cond_resched() from mpi_powm() loop (bnc#1012382).
- libnvdimm, namespace: fix label initialization to use valid seq numbers (bnc#1012382).
- libnvdimm, namespace: make 'resource' attribute only readable by root (bnc#1012382).
- libnvdimm, pfn: make 'resource' attribute only readable by root (FATE#319858).
- lib/ratelimit.c: use deferred printk() version (bsc#979928).
- locking/lockdep: Add nest_lock integrity test (bnc#1012382).
- lsm: fix smack_inode_removexattr and xattr_getsecurity memleak (bnc#1012382).
- mac80211: agg-tx: call drv_wake_tx_queue in proper context (bsc#1031717).
- mac80211: do not compare TKIP TX MIC key in reinstall prevention (bsc#1066472).
- mac80211: do not send SMPS action frame in AP mode when not needed (bsc#1031717).
- mac80211: Fix addition of mesh configuration element (git-fixes).
- mac80211: Fix BW upgrade for TDLS peers (bsc#1031717).
- mac80211: fix mgmt-tx abort cookie and leak (bsc#1031717).
- mac80211: fix power saving clients handling in iwlwifi (bnc#1012382).
- mac80211_hwsim: check HWSIM_ATTR_RADIO_NAME length (bnc#1012382).
- mac80211_hwsim: Fix memory leak in hwsim_new_radio_nl() (bsc#1031717).
- mac80211: Remove invalid flag operations in mesh TSF synchronization (bnc#1012382).
- mac80211: Remove unused 'beaconint_us' variable (bsc#1031717).
- mac80211: Remove unused 'i' variable (bsc#1031717).
- mac80211: Remove unused 'len' variable (bsc#1031717).
- mac80211: Remove unused 'rates_idx' variable (bsc#1031717).
- mac80211: Remove unused 'sband' and 'local' variables (bsc#1031717).
- mac80211: Remove unused 'struct ieee80211_rx_status' ptr (bsc#1031717).
- mac80211: Suppress NEW_PEER_CANDIDATE event if no room (bnc#1012382).
- mac80211: TDLS: always downgrade invalid chandefs (bsc#1031717).
- mac80211: TDLS: change BW calculation for WIDER_BW peers (bsc#1031717).
- mac80211: use constant time comparison with keys (bsc#1066471).
- md/linear: shutup lockdep warnning (bnc#1012382).
- md/raid10: submit bio directly to replacement disk (bnc#1012382).
- media: au0828: fix RC_CORE dependency (bsc#1031717).
- media: Do not do DMA on stack for firmware upload in the AS102 driver (bnc#1012382).
- media: em28xx: calculate left volume level correctly (bsc#1031717).
- media: mceusb: fix memory leaks in error path (bsc#1031717).
- media: rc: check for integer overflow (bnc#1012382).
- media: v4l2-ctrl: Fix flags field on Control events (bnc#1012382).
- megaraid_sas: Do not fire MR_DCMD_PD_LIST_QUERY to controllers which do not support it (bsc#1027301).
- mei: return error on notification request to a disconnected client (bnc#1012382).
- mfd: ab8500-sysctrl: Handle probe deferral (bnc#1012382).
- mfd: axp20x: Fix axp288 PEK_DBR and PEK_DBF irqs being swapped (bnc#1012382).
- misc: panel: properly restore atomic counter on error path (bnc#1012382).
- mlx5: Avoid that mlx5_ib_sg_to_klms() overflows the klms array (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- mm/backing-dev.c: fix an error handling path in 'cgwb_create()' (bnc#1063475).
- mmc: block: return error on failed mmc_blk_get() (bsc#1031717).
- mmc: core/mmci: restore pre/post_req behaviour (bsc#1031717).
- mmc: dw_mmc: rockchip: Set the drive phase properly (bsc#1031717).
- mm: check the return value of lookup_page_ext for all call sites (bnc#1068982).
- mmc: host: omap_hsmmc: avoid possible overflow of timeout value (bsc#1031717).
- mmc: host: omap_hsmmc: checking for NULL instead of IS_ERR() (bsc#1031717).
- mmc: mediatek: Fixed size in dma_free_coherent (bsc#1031717).
- mm,compaction: serialize waitqueue_active() checks (for real) (bsc#971975).
- mmc: s3cmci: include linux/interrupt.h for tasklet_struct (bnc#1012382).
- mmc: sdio: fix alignment issue in struct sdio_func (bnc#1012382).
- mmc: sd: limit SD card power limit according to cards capabilities (bsc#1031717).
- mm: discard memblock data later (bnc#1063460).
- mm, hwpoison: fixup 'mm: check the return value of lookup_page_ext for all call sites' (bnc#1012382).
- mm/madvise.c: fix madvise() infinite loop under special circumstances (bnc#1070964).
- mm/memblock.c: reversed logic in memblock_discard() (bnc#1063460).
- mm: meminit: mark init_reserved_page as __meminit (bnc#1063509).
- mm/memory_hotplug: change pfn_to_section_nr/section_nr_to_pfn macro to inline function (bnc#1063501).
- mm/memory_hotplug: define find_{smallest|biggest}_section_pfn as unsigned long (bnc#1063520).
- mm/page_alloc.c: broken deferred calculation (bnc#1068980).
- mm, page_alloc: fix potential false positive in __zone_watermark_ok (Git-fixes, bsc#1068978).
- mm/page_ext.c: check if page_ext is not prepared (bnc#1068982).
- mm/page_owner: avoid null pointer dereference (bnc#1068982).
- mm/pagewalk.c: report holes in hugetlb ranges (bnc#1012382).
- net: 3com: typhoon: typhoon_init_one: fix incorrect return values (bnc#1012382).
- net: 3com: typhoon: typhoon_init_one: make return values more specific (bnc#1012382).
- net/9p: Switch to wait_event_killable() (bnc#1012382).
- net: Allow IP_MULTICAST_IF to set index to L3 slave (bnc#1012382).
- net: cdc_ether: fix divide by 0 on bad descriptors (bnc#1012382).
- net: cdc_ncm: GetNtbFormat endian fix (git-fixes).
- net: core: Prevent from dereferencing null pointer when releasing SKB (bnc#1012382).
- net: dsa: select NET_SWITCHDEV (bnc#1012382).
- net: emac: Fix napi poll list corruption (bnc#1012382).
- netfilter: invoke synchronize_rcu after set the _hook_ to NULL (bnc#1012382).
- netfilter/ipvs: clear ipvs_property flag when SKB net namespace changed (bnc#1012382).
- netfilter: nf_ct_expect: Change __nf_ct_expect_check() return value (bnc#1012382).
- netfilter: nfnl_cthelper: fix incorrect helper-&gt;expect_class_max (bnc#1012382).
- netfilter: nf_tables: fix oob access (bnc#1012382).
- netfilter: nft_meta: deal with PACKET_LOOPBACK in netdev family (bnc#1012382).
- netfilter: nft_queue: use raw_smp_processor_id() (bnc#1012382).
- net: ibm: ibmvnic: constify vio_device_id (fate#323285).
- net/mlx4_core: Enable 4K UAR if SRIOV module parameter is not enabled (bsc#966191 FATE#320230 bsc#966186 FATE#320228).
- net/mlx4_core: Fix VF overwrite of module param which disables DMFS on new probed PFs (bnc#1012382).
- net/mlx4_en: fix overflow in mlx4_en_init_timestamp() (bnc#1012382).
- net/mlx5e: Fix wrong delay calculation for overflow check scheduling (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5e: Schedule overflow check work to mlx5e workqueue (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5: Skip mlx5_unload_one if mlx5_load_one fails (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net: mvpp2: release reference to txq_cpu[] entry after unmapping (bnc#1012382).
- net/packet: check length in getsockopt() called with PACKET_HDRLEN (bnc#1012382).
- net: qmi_wwan: fix divide by 0 on bad descriptors (bnc#1012382).
- net/sctp: Always set scope_id in sctp_inet6_skb_msgname (bnc#1012382).
- net: Set sk_prot_creator when cloning sockets to the right proto (bnc#1012382).
- net/unix: do not show information about sockets from other namespaces (bnc#1012382).
- nfc: fix device-allocation error return (bnc#1012382).
- nfsd/callback: Cleanup callback cred on shutdown (bnc#1012382).
- nfsd: deal with revoked delegations appropriately (bnc#1012382).
- nfs: Do not disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261).
- nfs: Fix typo in nomigration mount option (bnc#1012382).
- nfs: Fix ugly referral attributes (bnc#1012382).
- nilfs2: fix race condition that causes file system corruption (bnc#1012382).
- nl80211: Define policy for packet pattern attributes (bnc#1012382).
- nvme: Fix memory order on async queue deletion (bnc#1012382).
- nvme: protect against simultaneous shutdown invocations (FATE#319965 bnc#1012382 bsc#964944).
- ocfs2: fstrim: Fix start offset of first cluster group during fstrim (bnc#1012382).
- ocfs2: should wait dio before inode lock in ocfs2_setattr() (bnc#1012382).
- packet: avoid panic in packet_getsockopt() (bnc#1012382).
- packet: only test po-&gt;has_vnet_hdr once in packet_snd (bnc#1012382).
- parisc: Avoid trashing sr2 and sr3 in LWS code (bnc#1012382).
- parisc: Fix double-word compare and exchange in LWS code on 32-bit kernels (bnc#1012382).
- parisc: Fix validity check of pointer size argument in new CAS implementation (bnc#1012382).
- parisc: perf: Fix potential NULL pointer dereference (bnc#1012382).
- partitions/efi: Fix integer overflow in GPT size calculation (bnc#1012382).
- pci: Apply _HPX settings only to relevant devices (bnc#1012382).
- pci: mvebu: Handle changes to the bridge windows while enabled (bnc#1012382).
- percpu: make this_cpu_generic_read() atomic w.r.t. interrupts (bnc#1012382).
- perf tools: Fix build failure on perl script context (bnc#1012382).
- perf tools: Only increase index if perf_evsel__new_idx() succeeds (bnc#1012382).
- perf/x86/intel/bts: Fix exclusive event reference leak (git-fixes d2878d642a4ed).
- phy: increase size of MII_BUS_ID_SIZE and bus_id (bnc#1012382).
- pkcs#7: fix unitialized boolean 'want' (bnc#1012382).
- pkcs7: Prevent NULL pointer dereference, since sinfo is not always set (bnc#1012382).
- platform/x86: acer-wmi: setup accelerometer when ACPI device was found (bsc#1031717).
- platform/x86: hp-wmi: Do not shadow error values (bnc#1012382).
- platform/x86: hp-wmi: Fix detection for dock and tablet mode (bnc#1012382).
- platform/x86: hp-wmi: Fix error value for hp_wmi_tablet_state (bnc#1012382).
- platform/x86: intel_mid_thermal: Fix module autoload (bnc#1012382).
- platform/x86: sony-laptop: Fix error handling in sony_nc_setup_rfkill() (bsc#1031717).
- pm / OPP: Add missing of_node_put(np) (bnc#1012382).
- power: bq27xxx_battery: Fix bq27541 AveragePower register address (bsc#1031717).
- power: bq27xxx: fix reading for bq27000 and bq27010 (bsc#1031717).
- powerCap: Fix an error code in powercap_register_zone() (bsc#1031717).
- power: ipaq-micro-battery: freeing the wrong variable (bsc#1031717).
- powerpc/64: Fix race condition in setting lock bit in idle/wakeup code (bsc#1066223).
- powerpc/bpf/jit: Disable classic BPF JIT on ppc64le (bsc#1066223).
- powerpc/corenet: explicitly disable the SDHC controller on kmcoge4 (bnc#1012382).
- powerpc: Correct instruction code for xxlor instruction (bsc#1066223).
- powerpc: Fix VSX enabling/flushing to also test MSR_FP and MSR_VEC (bsc#1066223).
- powerpc/mm: Fix check of multiple 16G pages from device tree (bsc#1066223).
- powerpc/mm: Fix virt_addr_valid() etc. on 64-bit hash (bsc#1066223).
- powerpc/mm/hash64: Fix subpage protection with 4K HPTE config (bsc#1010201, bsc#1066223).
- powerpc/mm/hash: Free the subpage_prot_table correctly (bsc#1066223).
- powerpc/numa: Fix multiple bugs in memory_hotplug_max() (bsc#1066223).
- powerpc/numa: Fix whitespace in hot_add_drconf_memory_max() (bsc#1066223).
- powerpc/opal: Fix EBUSY bug in acquiring tokens (bsc#1066223).
- powerpc/perf: Remove PPMU_HAS_SSLOT flag for Power8 (bsc#1066223).
- powerpc/powernv/ioda: Fix endianness when reading TCEs (bsc#1066223).
- powerpc/powernv: Make opal_event_shutdown() callable from IRQ context (bsc#1066223).
- powerpc/pseries/vio: Dispose of virq mapping on vdevice unregister (bsc#1067888).
- powerpc/pseries/vio: Dispose of virq mapping on vdevice unregister (bsc#1067888).
- powerpc/signal: Properly handle return value from uprobe_deny_signal() (bsc#1066223).
- powerpc/sysrq: Fix oops whem ppmu is not registered (bsc#1066223).
- power: supply: bq27xxx_battery: Fix register map for BQ27510 and BQ27520 ('bsc#1069270').
- power: supply: isp1704: Fix unchecked return value of devm_kzalloc (bsc#1031717).
- power: supply: lp8788: prevent out of bounds array access (bsc#1031717).
- power_supply: tps65217-charger: Fix NULL deref during property export (bsc#1031717).
- ppp: fix race in ppp device destruction (bnc#1012382).
- printk/console: Always disable boot consoles that use init memory before it is freed (bsc#1063026).
- printk/console: Enhance the check for consoles using init memory (bsc#1063026).
- printk: include &lt;asm/sections.h&gt; instead of &lt;asm-generic/sections.h&gt; (bsc#1063026).
- printk: only unregister boot consoles when necessary (bsc#1063026).
- qed: Fix stack corruption on probe (bsc#966318 FATE#320158 bsc#966316 FATE#320159).
- quota: Check for register_shrinker() failure (bsc#1012829).
- r8169: Do not increment tx_dropped in TX ring cleaning (bsc#1031717).
- rbd: use GFP_NOIO for parent stat and data requests (bnc#1012382).
- rcu: Allow for page faults in NMI handlers (bnc#1012382).
- rdma/uverbs: Prevent leak of reserved field (bsc#1022595 FATE#322350).
- rds: ib: add error handle (bnc#1012382).
- rds: rdma: Fix the composite message user notification (bnc#1012382).
- rds: rdma: return appropriate error on rdma map failures (bnc#1012382).
- regulator: core: Limit propagation of parent voltage count and list (bsc#1070145).
- regulator: fan53555: fix I2C device ids (bnc#1012382).
- Revert 'bpf: one perf event close won't free bpf program attached by another perf event' (kabi).
- Revert 'bsg-lib: do not free job in bsg_prepare_job' (bnc#1012382).
- Revert 'crypto: xts - Add ECB dependency' (bnc#1012382).
- Revert 'drm: bridge: add DT bindings for TI ths8135' (bnc#1012382).
- Revert 'KEYS: Fix race between updating and finding a negative key' (kabi).
- Revert 'phy: increase size of MII_BUS_ID_SIZE and bus_id' (kabi).
- Revert 'sctp: do not peel off an assoc from one netns to another one' (bnc#1012382).
- Revert 'tty: goldfish: Fix a parameter of a call to free_irq' (bnc#1012382).
- Revert 'uapi: fix linux/rds.h userspace compilation errors' (bnc#1012382).
- rpm/kernel-binary.spec.in: add the kernel-binary dependencies to kernel-binary-base (bsc#1060333).
- rpm/kernel-binary.spec.in: Correct supplements for recent SLE products (bsc#1067494)
- rpm/kernel-binary.spec.in: only rewrite modules.dep if non-zero in size (bsc#1056979).
- rtc: ds1307: Fix relying on reset value for weekday (bsc#1031717).
- rtc: ds1374: wdt: Fix issue with timeout scaling from secs to wdt ticks (bsc#1031717).
- rtc: ds1374: wdt: Fix stop/start ioctl always returning -EINVAL (bsc#1031717).
- rtc: rtc-nuc900: fix loop timeout test (bsc#1031717).
- rtc: sa1100: fix unbalanced clk_prepare_enable/clk_disable_unprepare (bsc#1031717).
- rtlwifi: fix uninitialized rtlhal-&gt;last_suspend_sec time (bnc#1012382).
- rtlwifi: rtl8192ee: Fix memory leak when loading firmware (bnc#1012382).
- rtlwifi: rtl8821ae: Fix connection lost problem (bnc#1012382).
- rtlwifi: rtl8821ae: Fix HW_VAR_NAV_UPPER operation (bsc#1031717).
- s390/dasd: check for device error pointer within state change interrupts (bnc#1012382).
- s390/disassembler: add missing end marker for e7 table (bnc#1012382).
- s390/disassembler: correct disassembly lines alignment (bsc#1070825).
- s390/disassembler: increase show_code buffer size (bnc#1012382).
- s390: fix transactional execution control register handling (bnc#1012382).
- s390/kbuild: enable modversions for symbols exported from asm (bnc#1012382).
- s390/qeth: issue STARTLAN as first IPA command (bnc#1012382).
- s390/runtime instrumention: fix possible memory corruption (bnc#1012382).
- sched/autogroup: Fix autogroup_move_group() to never skip sched_move_task() (bnc#1012382).
- sched/cpuset/pm: Fix cpuset vs. suspend-resume bugs (bnc#1012382).
- sched: Make resched_cpu() unconditional (bnc#1012382).
- sched/rt: Simplify the IPI based RT balancing logic (bnc#1012382).
- scsi: aacraid: Process Error for response I/O (bnc#1012382).
- scsi_devinfo: cleanly zero-pad devinfo strings (bsc#1062941).
- scsi: hpsa: add 'ctlr_num' sysfs attribute (bsc#1028971).
- scsi: hpsa: bump driver version (bsc#1022600 fate#321928).
- scsi: hpsa: change driver version (bsc#1022600 bsc#1028971 fate#321928).
- scsi: hpsa: Check for null device pointers (bsc#1028971).
- scsi: hpsa: Check for null devices in ioaccel (bsc#1028971).
- scsi: hpsa: Check for vpd support before sending (bsc#1028971).
- scsi: hpsa: cleanup reset handler (bsc#1022600 fate#321928).
- scsi: hpsa: correct call to hpsa_do_reset (bsc#1028971).
- scsi: hpsa: correct logical resets (bsc#1028971).
- scsi: hpsa: correct queue depth for externals (bsc#1022600 fate#321928).
- scsi: hpsa: correct resets on retried commands (bsc#1022600 fate#321928).
- scsi: hpsa: correct scsi 6byte lba calculation (bsc#1028971).
- scsi: hpsa: Determine device external status earlier (bsc#1028971).
- scsi: hpsa: do not get enclosure info for external devices (bsc#1022600 fate#321928).
- scsi: hpsa: do not reset enclosures (bsc#1022600 fate#321928).
- scsi: hpsa: do not timeout reset operations (bsc#1022600 bsc#1028971 fate#321928).
- scsi: hpsa: fallback to use legacy REPORT PHYS command (bsc#1028971).
- scsi: hpsa: fix volume offline state (bsc#1022600 bsc#1028971 fate#321928).
- scsi: hpsa: limit outstanding rescans (bsc#1022600 bsc#1028971 fate#321928).
- scsi: hpsa: Prevent sending bmic commands to externals (bsc#1028971).
- scsi: hpsa: remove abort handler (bsc#1022600 fate#321928).
- scsi: hpsa: remove coalescing settings for ioaccel2 (bsc#1028971).
- scsi: hpsa: remove memory allocate failure message (bsc#1028971).
- scsi: hpsa: Remove unneeded void pointer cast (bsc#1028971).
- scsi: hpsa: rescan later if reset in progress (bsc#1022600 fate#321928).
- scsi: hpsa: send ioaccel requests with 0 length down raid path (bsc#1022600 fate#321928).
- scsi: hpsa: separate monitor events from rescan worker (bsc#1022600 fate#321928).
- scsi: hpsa: update check for logical volume status (bsc#1022600 bsc#1028971 fate#321928).
- scsi: hpsa: update identify physical device structure (bsc#1022600 fate#321928).
- scsi: hpsa: update pci ids (bsc#1022600 bsc#1028971 fate#321928).
- scsi: hpsa: update reset handler (bsc#1022600 fate#321928).
- scsi: hpsa: use designated initializers (bsc#1028971).
- scsi: hpsa: use %phN for short hex dumps (bsc#1028971).
- scsi: ipr: Fix scsi-mq lockdep issue (bsc#1066213).
- scsi: ipr: Set no_report_opcodes for RAID arrays (bsc#1066213).
- scsi: libfc: fix a deadlock in fc_rport_work (bsc#1063695).
- scsi: libiscsi: fix shifting of DID_REQUEUE host byte (bsc#1056003).
- scsi: lpfc: Add missing memory barrier (bnc#1012382).
- scsi: lpfc: Clear the VendorVersion in the PLOGI/PLOGI ACC payload (bnc#1012382).
- scsi: lpfc: Correct host name in symbolic_name field (bnc#1012382).
- scsi: lpfc: Correct issue leading to oops during link reset (bnc#1012382).
- scsi: lpfc: FCoE VPort enable-disable does not bring up the VPort (bnc#1012382).
- scsi: reset wait for IO completion (bsc#996376).
- scsi: scsi_devinfo: fixup string compare (bsc#1062941). updated patches.fixes/scsi_devinfo-fixup-string-compare.patch to the version merged upstream.
- scsi: scsi_devinfo: handle non-terminated strings (bsc#1062941).
- scsi: scsi_dh_emc: return success in clariion_std_inquiry() (bnc#1012382).
- scsi: scsi_transport_fc: Also check for NOTPRESENT in fc_remote_port_add() (bsc#1037890).
- scsi: scsi_transport_fc: set scsi_target_id upon rescan (bsc#1058135).
- scsi: sd: Do not override max_sectors_kb sysfs setting (bsc#1025461).
- scsi: sd: Remove LBPRZ dependency for discards (bsc#1060985).
- scsi: sg: close race condition in sg_remove_sfp_usercontext() (bsc#1064206).
- scsi: sg: do not return bogus Sg_requests (bsc#1064206).
- scsi: sg: only check for dxfer_len greater than 256M (bsc#1064206).
- scsi: sg: Re-fix off by one in sg_fill_request_table() (bnc#1012382).
- scsi: ufs: add capability to keep auto bkops always enabled (bnc#1012382).
- scsi: ufs-qcom: Fix module autoload (bnc#1012382).
- scsi: virtio_scsi: let host do exception handling (bsc#1060682).
- scsi: zfcp: fix erp_action use-before-initialize in REC action trace (bnc#1012382).
- sctp: add the missing sock_owned_by_user check in sctp_icmp_redirect (bnc#1012382).
- sctp: do not peel off an assoc from one netns to another one (bnc#1012382).
- sctp: do not peel off an assoc from one netns to another one (bnc#1012382).
- sctp: potential read out of bounds in sctp_ulpevent_type_enabled() (bnc#1012382).
- sctp: reset owner sk for data chunks on out queues when migrating a sock (bnc#1012382).
- security/keys: add CONFIG_KEYS_COMPAT to Kconfig (bnc#1012382).
- selftests: firmware: add empty string and async tests (bnc#1012382).
- selftests: firmware: send expected errors to /dev/null (bnc#1012382).
- serial: 8250_fintek: Fix rs485 disablement on invalid ioctl() (bsc#1031717).
- serial: 8250_uniphier: fix serial port index in private data (bsc#1031717).
- serial: omap: Fix EFR write on RTS deassertion (bnc#1012382).
- serial: Remove unused port type (bsc#1066045).
- serial: sh-sci: Fix register offsets for the IRDA serial port (bnc#1012382).
- sh_eth: use correct name for ECMR_MPDE bit (bnc#1012382).
- slub: do not merge cache if slub_debug contains a never-merge flag (bnc#1012382).
- smb3: parsing for new snapshot timestamp mount parm (FATE#324404). New mount option 'snapshot=&lt;time&gt;' to allow mounting an earlier version of the remote volume (if such a snapshot exists on the server). Note that eventually specifying a snapshot time of 1 will allow the user to mount the oldest snapshot. A subsequent patch add the processing for that and another for actually specifying the 'time warp' create context on SMB2/SMB3 open. Check to make sure SMB2 negotiated, and ensure that we use a different tcon if mount same share twice but with different snaphshot times
- sparc64: Migrate hvcons irq to panicked cpu (bnc#1012382).
- spi: SPI_FSL_DSPI should depend on HAS_DMA (bnc#1012382).
- spi: uapi: spidev: add missing ioctl header (bnc#1012382).
- staging: iio: ad7192: Fix - use the dedicated reset function avoiding dma from stack (bnc#1012382).
- staging: iio: cdc: fix improper return value (bnc#1012382).
- staging: lustre: hsm: stack overrun in hai_dump_data_field (bnc#1012382).
- staging: lustre: llite: do not invoke direct_IO for the EOF case (bnc#1012382).
- staging: lustre: ptlrpc: skip lock if export failed (bnc#1012382).
- staging: r8712u: Fix Sparse warning in rtl871x_xmit.c (bnc#1012382).
- staging: rtl8188eu: fix incorrect ERROR tags from logs (bnc#1012382).
- staging: rtl8712: fixed little endian problem (bnc#1012382).
- staging: rtl8712u: Fix endian settings for structs describing network packets (bnc#1012382).
- stm class: Fix a use-after-free (bnc#1012382).
- sunrpc: Fix tracepoint storage issues with svc_recv and svc_rqst_status (bnc#1012382).
- supported.conf: mark hid-multitouch as supported (FATE#323670)
- target: fix ALUA state file path truncation (bsc#1071231).
- target: Fix node_acl demo-mode + uncached dynamic shutdown regression (bnc#1012382).
- target: fix PR state file path truncation (bsc#1071231).
- target: Fix QUEUE_FULL + SCSI task attribute handling (bnc#1012382).
- target/iscsi: Fix iSCSI task reassignment handling (bnc#1012382).
- target/iscsi: Fix unsolicited data seq_end_offset calculation (bnc#1012382).
- tcp/dccp: fix ireq-&gt;opt races (bnc#1012382).
- tcp/dccp: fix lockdep splat in inet_csk_route_req() (bnc#1012382).
- tcp/dccp: fix other lockdep splats accessing ireq_opt (bnc#1012382).
- tcp: do not mangle skb-&gt;cb[] in tcp_make_synack() (bnc#1012382).
- tcp: fix tcp_mtu_probe() vs highest_sack (bnc#1012382).
- team: call netdev_change_features out of team lock (bsc#1055567).
- team: fix memory leaks (bnc#1012382).
- test: firmware_class: report errors properly on failure (bnc#1012382).
- timer: Prevent timer value 0 for MWAITX (bsc#1065717).
- tipc: fix link attribute propagation bug (bnc#1012382).
- tipc: use only positive error codes in messages (bnc#1012382).
- tools: firmware: check for distro fallback udev cancel rule (bnc#1012382).
- tpm_tis: Do not fall back to a hardcoded address for TPM2 (bsc#1020645, fate#321435, fate#321507, fate#321600, bsc#1034048).
- tracing/samples: Fix creation and deletion of simple_thread_fn creation (bnc#1012382).
- ttpci: address stringop overflow warning (bnc#1012382).
- tty: goldfish: Fix a parameter of a call to free_irq (bnc#1012382).
- tun: allow positive return values on dev_get_valid_name() call (bnc#1012382).
- tun: bail out from tun_get_user() if the skb is empty (bnc#1012382).
- tun: call dev_get_valid_name() before register_netdevice() (bnc#1012382).
- tun/tap: sanitize TUNSETSNDBUF input (bnc#1012382).
- uapi: fix linux/mroute6.h userspace compilation errors (bnc#1012382).
- uapi: fix linux/rds.h userspace compilation error (bnc#1012382).
- uapi: fix linux/rds.h userspace compilation errors (bnc#1012382).
- uapi: fix linux/rds.h userspace compilation errors (bnc#1012382).
- udpv6: Fix the checksum computation when HW checksum does not apply (bnc#1012382).
- usb: Add delay-init quirk for Corsair K70 LUX keyboards (bnc#1012382).
- usb: cdc_acm: Add quirk for Elatec TWN3 (bnc#1012382).
- usb: chipidea: vbus event may exist before starting gadget (bnc#1012382).
- usb: core: fix out-of-bounds access bug in usb_get_bos_descriptor() (bnc#1012382).
- usb: core: harden cdc_parse_cdc_header (bnc#1012382).
- usb: devio: Do not corrupt user memory (bnc#1012382).
- usb: devio: Revert 'USB: devio: Do not corrupt user memory' (bnc#1012382).
- usb: dummy-hcd: fix connection failures (wrong speed) (bnc#1012382).
- usb: dummy-hcd: Fix deadlock caused by disconnect detection (bnc#1012382).
- usb: dummy-hcd: Fix erroneous synchronization change (bnc#1012382).
- usb: dummy-hcd: fix infinite-loop resubmission bug (bnc#1012382).
- usb: fix out-of-bounds in usb_set_configuration (bnc#1012382).
- usb: gadget: composite: Fix use-after-free in usb_composite_overwrite_options (bnc#1012382).
- usb: gadgetfs: fix copy_to_user while holding spinlock (bnc#1012382).
- usb: gadgetfs: Fix crash caused by inadequate synchronization (bnc#1012382).
- usb: gadget: inode.c: fix unbalanced spin_lock in ep0_write (bnc#1012382).
- usb: gadget: mass_storage: set msg_registered after msg registered (bnc#1012382).
- usb: gadget: udc: atmel: set vbus irqflags explicitly (bnc#1012382).
- usb: g_mass_storage: Fix deadlock when driver is unbound (bnc#1012382).
- usb: hcd: initialize hcd-&gt;flags to 0 when rm hcd (bnc#1012382).
- usb: hub: Allow reset retry for USB2 devices on connect bounce (bnc#1012382).
- usb: Increase quirk delay for USB devices (bnc#1012382).
- usb: musb: Check for host-mode using is_host_active() on reset interrupt (bnc#1012382).
- usb: musb: sunxi: Explicitly release USB PHY on exit (bnc#1012382).
- usb: pci-quirks.c: Corrected timeout values used in handshake (bnc#1012382).
- usb: plusb: Add support for PL-27A1 (bnc#1012382).
- usb: quirks: add quirk for WORLDE MINI MIDI keyboard (bnc#1012382).
- usb: renesas_usbhs: Fix DMAC sequence for receiving zero-length packet (bnc#1012382).
- usb: renesas_usbhs: fix the BCLR setting condition for non-DCP pipe (bnc#1012382).
- usb: renesas_usbhs: fix usbhsf_fifo_clear() for RX direction (bnc#1012382).
- usb: serial: console: fix use-after-free after failed setup (bnc#1012382).
- usb: serial: cp210x: add support for ELV TFD500 (bnc#1012382).
- usb: serial: ftdi_sio: add id for Cypress WICED dev board (bnc#1012382).
- usb: serial: garmin_gps: fix I/O after failed probe and remove (bnc#1012382).
- usb: serial: garmin_gps: fix memory leak on probe errors (bnc#1012382).
- usb: serial: metro-usb: add MS7820 device id (bnc#1012382).
- usb: serial: mos7720: fix control-message error handling (bnc#1012382).
- usb: serial: mos7840: fix control-message error handling (bnc#1012382).
- usb: serial: option: add support for TP-Link LTE module (bnc#1012382).
- usb: serial: qcserial: add Dell DW5818, DW5819 (bnc#1012382).
- usb: serial: qcserial: add pid/vid for Sierra Wireless EM7355 fw update (bnc#1012382).
- usb-storage: unusual_devs entry to fix write-access regression for Seagate external drives (bnc#1012382).
- usb: uas: fix bug in handling of alternate settings (bnc#1012382).
- usb: usbfs: compute urb-&gt;actual_length for isochronous (bnc#1012382).
- usb: usbtest: fix NULL pointer dereference (bnc#1012382).
- usb: xhci: Handle error condition in xhci_stop_device() (bnc#1012382).
- uwb: ensure that endpoint is interrupt (bnc#1012382).
- uwb: properly check kthread_run return value (bnc#1012382).
- vfs: expedite unmount (bsc#1024412).
- video: fbdev: pmag-ba-fb: Remove bad `__init' annotation (bnc#1012382).
- video: udlfb: Fix read EDID timeout (bsc#1031717).
- vlan: fix a use-after-free in vlan_device_event() (bnc#1012382).
- vsock: use new wait API for vsock_stream_sendmsg() (bnc#1012382).
- vti: fix use after free in vti_tunnel_xmit/vti6_tnl_xmit (bnc#1012382).
- watchdog: kempld: fix gcc-4.3 build (bnc#1012382).
- workqueue: Fix NULL pointer dereference (bnc#1012382).
- workqueue: replace pool-&gt;manager_arb mutex with a flag (bnc#1012382).
- x86/alternatives: Fix alt_max_short macro to really be a max() (bnc#1012382).
- x86/decoder: Add new TEST instruction pattern (bnc#1012382).
- x86/MCE/AMD: Always give panic severity for UC errors in kernel context (git-fixes bf80bbd7dcf5).
- x86/microcode/AMD: Add support for fam17h microcode loading (bsc#1068032).
- x86/microcode/intel: Disable late loading on model 79 (bnc#1012382).
- x86/oprofile/ppro: Do not use __this_cpu*() in preemptible context (bnc#1012382).
- x86/uaccess, sched/preempt: Verify access_ok() context (bnc#1012382).
- xen: do not print error message in case of missing Xenstore entry (bnc#1012382).
- xen/events: events_fifo: Do not use {get,put}_cpu() in xen_evtchn_fifo_init() (bnc#1065600).
- xen: fix booting ballooned down hvm guest (bnc#1065600).
- xen/gntdev: avoid out of bounds access in case of partial gntdev_mmap() (bnc#1012382).
- xen/manage: correct return value check on xenbus_scanf() (bnc#1012382).
- xen-netback: fix error handling output (bnc#1065600).
- xen: x86: mark xen_find_pt_base as __init (bnc#1065600).
- xen: xenbus driver must not accept invalid transaction ids (bnc#1012382).
- xfs: handle error if xfs_btree_get_bufs fails (bsc#1059863).
- xfs: remove kmem_zalloc_greedy (bnc#1012382).
- xhci: fix finding correct bus_state structure for USB 3.1 hosts (bnc#1012382).
- zd1211rw: fix NULL-deref at probe (bsc#1031717).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-21"/>
	<updated date="2017-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010201">SUSE bug 1010201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012829">SUSE bug 1012829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017461">SUSE bug 1017461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020645">SUSE bug 1020645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021424">SUSE bug 1021424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022595">SUSE bug 1022595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022600">SUSE bug 1022600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022914">SUSE bug 1022914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024412">SUSE bug 1024412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025461">SUSE bug 1025461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027301">SUSE bug 1027301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028971">SUSE bug 1028971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030061">SUSE bug 1030061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031717">SUSE bug 1031717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034048">SUSE bug 1034048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037890">SUSE bug 1037890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046107">SUSE bug 1046107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050060">SUSE bug 1050060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050231">SUSE bug 1050231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055567">SUSE bug 1055567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056003">SUSE bug 1056003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056365">SUSE bug 1056365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056427">SUSE bug 1056427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056979">SUSE bug 1056979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057199">SUSE bug 1057199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058135">SUSE bug 1058135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059863">SUSE bug 1059863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060333">SUSE bug 1060333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060682">SUSE bug 1060682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060985">SUSE bug 1060985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061451">SUSE bug 1061451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061756">SUSE bug 1061756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062520">SUSE bug 1062520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062941">SUSE bug 1062941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062962">SUSE bug 1062962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063026">SUSE bug 1063026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063460">SUSE bug 1063460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063475">SUSE bug 1063475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063501">SUSE bug 1063501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063509">SUSE bug 1063509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063516">SUSE bug 1063516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063520">SUSE bug 1063520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063695">SUSE bug 1063695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064206">SUSE bug 1064206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064701">SUSE bug 1064701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064926">SUSE bug 1064926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065180">SUSE bug 1065180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065639">SUSE bug 1065639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065692">SUSE bug 1065692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065717">SUSE bug 1065717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065866">SUSE bug 1065866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066045">SUSE bug 1066045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066192">SUSE bug 1066192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066213">SUSE bug 1066213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066223">SUSE bug 1066223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066285">SUSE bug 1066285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066382">SUSE bug 1066382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066470">SUSE bug 1066470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066471">SUSE bug 1066471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066472">SUSE bug 1066472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066573">SUSE bug 1066573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066606">SUSE bug 1066606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066629">SUSE bug 1066629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067105">SUSE bug 1067105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067132">SUSE bug 1067132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067494">SUSE bug 1067494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067888">SUSE bug 1067888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068671">SUSE bug 1068671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068978">SUSE bug 1068978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068980">SUSE bug 1068980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068982">SUSE bug 1068982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069270">SUSE bug 1069270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069793">SUSE bug 1069793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069942">SUSE bug 1069942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069996">SUSE bug 1069996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070006">SUSE bug 1070006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070145">SUSE bug 1070145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070535">SUSE bug 1070535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070767">SUSE bug 1070767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070771">SUSE bug 1070771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070805">SUSE bug 1070805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070825">SUSE bug 1070825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070964">SUSE bug 1070964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071231">SUSE bug 1071231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071693">SUSE bug 1071693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071694">SUSE bug 1071694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071695">SUSE bug 1071695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071833">SUSE bug 1071833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963575">SUSE bug 963575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964944">SUSE bug 964944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966170">SUSE bug 966170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966172">SUSE bug 966172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966186">SUSE bug 966186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966191">SUSE bug 966191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966316">SUSE bug 966316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966318">SUSE bug 966318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969474">SUSE bug 969474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969475">SUSE bug 969475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969476">SUSE bug 969476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969477">SUSE bug 969477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971975">SUSE bug 971975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974590">SUSE bug 974590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979928">SUSE bug 979928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989261">SUSE bug 989261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996376">SUSE bug 996376</bugzilla>
	<cve impact="moderate" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000410/">CVE-2017-1000410</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11600/">CVE-2017-11600</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12193/">CVE-2017-12193</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15115/">CVE-2017-15115</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15265/">CVE-2017-15265</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16528/">CVE-2017-16528</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16536/">CVE-2017-16536</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16537/">CVE-2017-16537</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16645/">CVE-2017-16645</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16646/">CVE-2017-16646</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16994/">CVE-2017-16994</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17448/">CVE-2017-17448</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17449/">CVE-2017-17449</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17450/">CVE-2017-17450</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7482/">CVE-2017-7482</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8824/">CVE-2017-8824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518413" comment="kernel-default-4.4.103-92.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518414" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518415" comment="kernel-default-extra-4.4.103-92.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518419" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77993" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1046856" ref_url="https://bugzilla.suse.com/1046856" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000083" ref_url="https://www.suse.com/security/cve/CVE-2017-1000083/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00089.html" source="SUSE-SU"/>
		<description>
This update for evince fixes the following issues:

Security issue fixed:

- CVE-2017-1000083: Remove support for tar and tar-like commands in comics backend (bsc#1046856).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-22"/>
	<updated date="2017-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046856">SUSE bug 1046856</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000083/">CVE-2017-1000083</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518420" comment="evince-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518421" comment="evince-browser-plugin-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518422" comment="evince-lang-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518423" comment="evince-plugin-djvudocument-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518424" comment="evince-plugin-dvidocument-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518425" comment="evince-plugin-pdfdocument-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518426" comment="evince-plugin-psdocument-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518427" comment="evince-plugin-tiffdocument-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518428" comment="evince-plugin-xpsdocument-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518429" comment="libevdocument3-4-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518430" comment="libevview3-3-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518431" comment="nautilus-evince-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518432" comment="typelib-1_0-EvinceDocument-3_0-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518433" comment="typelib-1_0-EvinceView-3_0-3.20.2-6.19.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77994" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1070727" ref_url="https://bugzilla.suse.com/1070727" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17083" ref_url="https://www.suse.com/security/cve/CVE-2017-17083/" source="CVE"/>
		<reference ref_id="CVE-2017-17084" ref_url="https://www.suse.com/security/cve/CVE-2017-17084/" source="CVE"/>
		<reference ref_id="CVE-2017-17085" ref_url="https://www.suse.com/security/cve/CVE-2017-17085/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003554.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:
 
 - CVE-2017-17083: NetBIOS dissector could crash. This was addressed in 
   epan/dissectors/packet-netbios.c by ensuring that write operations are bounded by the beginning of a buffer. (bsc#1070727)
 - CVE-2017-17084: IWARP_MPA dissector could crash. This was addressed in epan/dissectors/packet-iwarp-mpa.c by 
   validating a ULPDU length. (bsc#1070727)
 - CVE-2017-17085: the CIP Safety dissector could crash. This was addressed in epan/dissectors/packet-cipsafety.c 
   by validating the packet length. (bsc#1070727)

 		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-27"/>
	<updated date="2017-12-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1070727">SUSE bug 1070727</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17083/">CVE-2017-17083</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17084/">CVE-2017-17084</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17085/">CVE-2017-17085</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518434" comment="libwireshark8-2.2.11-48.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518435" comment="libwiretap6-2.2.11-48.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518436" comment="libwscodecs1-2.2.11-48.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518437" comment="libwsutil7-2.2.11-48.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518438" comment="wireshark-2.2.11-48.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518439" comment="wireshark-gtk-2.2.11-48.15.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77995" version="1" class="patch">
	<metadata>
		<title>Security update for gdk-pixbuf (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1053417" ref_url="https://bugzilla.suse.com/1053417" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003556.html" source="SUSE-SU"/>
		<description>

This update for gdk-pixbuf provides the following fixes:

- Add overflow checks when creating pixbuf structures in general
- Fix arithmetic overflow in the BMP loader (bsc#1053417) 
- Adds support for BMPv3 with bitmasks (bsc#1053417) 
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-27"/>
	<updated date="2017-12-27"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1053417">SUSE bug 1053417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518440" comment="gdk-pixbuf-lang-2.34.0-19.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518441" comment="gdk-pixbuf-query-loaders-2.34.0-19.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518442" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518443" comment="libgdk_pixbuf-2_0-0-2.34.0-19.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518444" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518445" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77996" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1021814" ref_url="https://bugzilla.suse.com/1021814" source="BUGZILLA"/>
		<reference ref_id="1021817" ref_url="https://bugzilla.suse.com/1021817" source="BUGZILLA"/>
		<reference ref_id="1021818" ref_url="https://bugzilla.suse.com/1021818" source="BUGZILLA"/>
		<reference ref_id="1021819" ref_url="https://bugzilla.suse.com/1021819" source="BUGZILLA"/>
		<reference ref_id="1021820" ref_url="https://bugzilla.suse.com/1021820" source="BUGZILLA"/>
		<reference ref_id="1021821" ref_url="https://bugzilla.suse.com/1021821" source="BUGZILLA"/>
		<reference ref_id="1021822" ref_url="https://bugzilla.suse.com/1021822" source="BUGZILLA"/>
		<reference ref_id="1021823" ref_url="https://bugzilla.suse.com/1021823" source="BUGZILLA"/>
		<reference ref_id="1021824" ref_url="https://bugzilla.suse.com/1021824" source="BUGZILLA"/>
		<reference ref_id="1021991" ref_url="https://bugzilla.suse.com/1021991" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5373" ref_url="https://www.suse.com/security/cve/CVE-2017-5373/" source="CVE"/>
		<reference ref_id="CVE-2017-5375" ref_url="https://www.suse.com/security/cve/CVE-2017-5375/" source="CVE"/>
		<reference ref_id="CVE-2017-5376" ref_url="https://www.suse.com/security/cve/CVE-2017-5376/" source="CVE"/>
		<reference ref_id="CVE-2017-5378" ref_url="https://www.suse.com/security/cve/CVE-2017-5378/" source="CVE"/>
		<reference ref_id="CVE-2017-5380" ref_url="https://www.suse.com/security/cve/CVE-2017-5380/" source="CVE"/>
		<reference ref_id="CVE-2017-5383" ref_url="https://www.suse.com/security/cve/CVE-2017-5383/" source="CVE"/>
		<reference ref_id="CVE-2017-5386" ref_url="https://www.suse.com/security/cve/CVE-2017-5386/" source="CVE"/>
		<reference ref_id="CVE-2017-5390" ref_url="https://www.suse.com/security/cve/CVE-2017-5390/" source="CVE"/>
		<reference ref_id="CVE-2017-5396" ref_url="https://www.suse.com/security/cve/CVE-2017-5396/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0427-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00017.html" source="SUSE-SU"/>
		<description>

MozillaFirefox 45 ESR was updated to 45.7 to fix the following issues (bsc#1021991):

* MFSA 2017-02/CVE-2017-5378: Pointer and frame data leakage of Javascript objects (bsc#1021818)
* MFSA 2017-02/CVE-2017-5396: Use-after-free with Media Decoder (bsc#1021821)
* MFSA 2017-02/CVE-2017-5386: WebExtensions can use data: protocol to affect other extensions (bsc#1021823)
* MFSA 2017-02/CVE-2017-5380: Potential use-after-free during DOM manipulations (bsc#1021819)
* MFSA 2017-02/CVE-2017-5390: Insecure communication methods in Developer Tools JSON viewer (bsc#1021820)
* MFSA 2017-02/CVE-2017-5373: Memory safety bugs fixed in Firefox 51 and Firefox ESR 45.7 (bsc#1021824)
* MFSA 2017-02/CVE-2017-5375: Excessive JIT code allocation allows bypass of ASLR and DEP (bsc#1021814)
* MFSA 2017-02/CVE-2017-5376: Use-after-free in XSL (bsc#1021817)
* MFSA 2017-02/CVE-2017-5383: Location bar spoofing with unicode characters (bsc#1021822)

Please see https://www.mozilla.org/en-US/security/advisories/mfsa2017-02/
for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-08"/>
	<updated date="2017-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1021814">SUSE bug 1021814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021817">SUSE bug 1021817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021818">SUSE bug 1021818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021819">SUSE bug 1021819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021820">SUSE bug 1021820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021821">SUSE bug 1021821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021822">SUSE bug 1021822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021823">SUSE bug 1021823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021824">SUSE bug 1021824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5373/">CVE-2017-5373</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5375/">CVE-2017-5375</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5376/">CVE-2017-5376</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5378/">CVE-2017-5378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5380/">CVE-2017-5380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5383/">CVE-2017-5383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5386/">CVE-2017-5386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5390/">CVE-2017-5390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5396/">CVE-2017-5396</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517088" comment="MozillaFirefox-45.7.0esr-99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517089" comment="MozillaFirefox-translations-45.7.0esr-99.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77997" version="1" class="patch">
	<metadata>
		<title>Security update for opus (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1020102" ref_url="https://bugzilla.suse.com/1020102" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0381" ref_url="https://www.suse.com/security/cve/CVE-2017-0381/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0436-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00018.html" source="SUSE-SU"/>
		<description>

This update for opus fixes the following issues:

- CVE-2017-0381: Fixed a remote code execution vulnerability in silk/NLSF_stabilize.c when playing certain media files (bsc#1020102)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-09"/>
	<updated date="2017-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020102">SUSE bug 1020102</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-0381/">CVE-2017-0381</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517090" comment="libopus0-1.1-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77998" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1000677" ref_url="https://bugzilla.suse.com/1000677" source="BUGZILLA"/>
		<reference ref_id="1001912" ref_url="https://bugzilla.suse.com/1001912" source="BUGZILLA"/>
		<reference ref_id="1009528" ref_url="https://bugzilla.suse.com/1009528" source="BUGZILLA"/>
		<reference ref_id="1019637" ref_url="https://bugzilla.suse.com/1019637" source="BUGZILLA"/>
		<reference ref_id="1021641" ref_url="https://bugzilla.suse.com/1021641" source="BUGZILLA"/>
		<reference ref_id="1022085" ref_url="https://bugzilla.suse.com/1022085" source="BUGZILLA"/>
		<reference ref_id="1022086" ref_url="https://bugzilla.suse.com/1022086" source="BUGZILLA"/>
		<reference ref_id="1022271" ref_url="https://bugzilla.suse.com/1022271" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7055" ref_url="https://www.suse.com/security/cve/CVE-2016-7055/" source="CVE"/>
		<reference ref_id="CVE-2017-3731" ref_url="https://www.suse.com/security/cve/CVE-2017-3731/" source="CVE"/>
		<reference ref_id="CVE-2017-3732" ref_url="https://www.suse.com/security/cve/CVE-2017-3732/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002638.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues contained in the
OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)

Security issues fixed:
- CVE-2016-7055: The x86_64 optimized montgomery multiplication may produce incorrect results (bsc#1009528)
- CVE-2017-3731: Truncated packet could crash via OOB read (bsc#1022085)
- CVE-2017-3732: BN_mod_exp may produce incorrect results on x86_64 (bsc#1022086)
- Degrade the 3DES cipher to MEDIUM in SSLv2 (bsc#1001912)

Non-security issues fixed:
- fix crash in openssl speed (bsc#1000677)
- fix X509_CERT_FILE path (bsc#1022271)
- AES XTS key parts must not be identical in FIPS mode (bsc#1019637)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-10"/>
	<updated date="2017-02-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000677">SUSE bug 1000677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001912">SUSE bug 1001912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009528">SUSE bug 1009528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019637">SUSE bug 1019637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022085">SUSE bug 1022085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022086">SUSE bug 1022086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022271">SUSE bug 1022271</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7055/">CVE-2016-7055</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3731/">CVE-2017-3731</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3732/">CVE-2017-3732</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518446" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518447" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518448" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518449" comment="openssl-1.0.2j-59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77999" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1019611" ref_url="https://bugzilla.suse.com/1019611" source="BUGZILLA"/>
		<reference ref_id="1022103" ref_url="https://bugzilla.suse.com/1022103" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5225" ref_url="https://www.suse.com/security/cve/CVE-2017-5225/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002639.html" source="SUSE-SU"/>
		<description>

This update for tiff fixes the following issues:

- A crafted TIFF image could cause a crash and potential code execution when
processed by the 'tiffcp' utility (CVE-2017-5225, bsc#1019611).

Also a regression from the version update to 4.0.7 was fixed in
handling TIFFTAG_FAXRECVPARAMS. (bsc#1022103)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-13"/>
	<updated date="2017-02-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1019611">SUSE bug 1019611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022103">SUSE bug 1022103</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5225/">CVE-2017-5225</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517091" comment="libtiff5-4.0.7-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517092" comment="libtiff5-32bit-4.0.7-40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78000" version="1" class="patch">
	<metadata>
		<title>Security update for libXpm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1021315" ref_url="https://bugzilla.suse.com/1021315" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10164" ref_url="https://www.suse.com/security/cve/CVE-2016-10164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002644.html" source="SUSE-SU"/>
		<description>

This update for libXpm fixes the following issues:

- A heap overflow in XPM handling could be used by attackers supplying XPM files to 
  crash or potentially execute code. (bsc#1021315)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-15"/>
	<updated date="2017-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1021315">SUSE bug 1021315</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10164/">CVE-2016-10164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517105" comment="libXpm4-3.5.11-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517106" comment="libXpm4-32bit-3.5.11-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78001" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1022263" ref_url="https://bugzilla.suse.com/1022263" source="BUGZILLA"/>
		<reference ref_id="1022264" ref_url="https://bugzilla.suse.com/1022264" source="BUGZILLA"/>
		<reference ref_id="1022265" ref_url="https://bugzilla.suse.com/1022265" source="BUGZILLA"/>
		<reference ref_id="1022283" ref_url="https://bugzilla.suse.com/1022283" source="BUGZILLA"/>
		<reference ref_id="1022284" ref_url="https://bugzilla.suse.com/1022284" source="BUGZILLA"/>
		<reference ref_id="1022553" ref_url="https://bugzilla.suse.com/1022553" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10166" ref_url="https://www.suse.com/security/cve/CVE-2016-10166/" source="CVE"/>
		<reference ref_id="CVE-2016-10167" ref_url="https://www.suse.com/security/cve/CVE-2016-10167/" source="CVE"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<reference ref_id="CVE-2016-6906" ref_url="https://www.suse.com/security/cve/CVE-2016-6906/" source="CVE"/>
		<reference ref_id="CVE-2016-6912" ref_url="https://www.suse.com/security/cve/CVE-2016-6912/" source="CVE"/>
		<reference ref_id="CVE-2016-9317" ref_url="https://www.suse.com/security/cve/CVE-2016-9317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002645.html" source="SUSE-SU"/>
		<description>

This update for gd fixes the following security issues:

- CVE-2016-6906: An out-of-bounds read in TGA decompression was fixed which could have lead to crashes. (bsc#1022553)
- CVE-2016-6912: Double free vulnerability in the gdImageWebPtr function
  in the GD Graphics Library (aka libgd) allowed remote attackers to have
  unspecified impact via large width and height values. (bsc#1022284)
- CVE-2016-9317: The gdImageCreate function in the GD Graphics Library
  (aka libgd) allowed remote attackers to cause a denial of service
  (system hang) via an oversized image.  (bsc#1022283)
- CVE-2016-10166: A potential unsigned underflow in gd interpolation
  functions could lead to memory corruption in the GD Graphics Library (aka libgd) (bsc#1022263)
- CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx()
  could lead to libgd running out of memory even on small files. (bsc#1022264)
- CVE-2016-10168: A signed integer overflow in the GD Graphics Library (aka libgd) could lead
  to memory corruption (bsc#1022265)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-15"/>
	<updated date="2017-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022263">SUSE bug 1022263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022264">SUSE bug 1022264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022265">SUSE bug 1022265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022283">SUSE bug 1022283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022284">SUSE bug 1022284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022553">SUSE bug 1022553</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10166/">CVE-2016-10166</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10167/">CVE-2016-10167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6906/">CVE-2016-6906</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6912/">CVE-2016-6912</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9317/">CVE-2016-9317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517107" comment="gd-2.1.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517108" comment="gd-32bit-2.1.0-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78002" version="1" class="patch">
	<metadata>
		<title>Security update for ppp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="927841" ref_url="https://bugzilla.suse.com/927841" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3310" ref_url="https://www.suse.com/security/cve/CVE-2015-3310/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002649.html" source="SUSE-SU"/>
		<description>
The ppp package was updated to fix the following security issue:

- CVE-2015-3310: Fixed a buffer overflow in radius plug-in's rc_mksid() (bsc#927841).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-15"/>
	<updated date="2017-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/927841">SUSE bug 927841</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3310/">CVE-2015-3310</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517109" comment="ppp-2.4.7-3.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78003" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1020905" ref_url="https://bugzilla.suse.com/1020905" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-5546" ref_url="https://www.suse.com/security/cve/CVE-2016-5546/" source="CVE"/>
		<reference ref_id="CVE-2016-5547" ref_url="https://www.suse.com/security/cve/CVE-2016-5547/" source="CVE"/>
		<reference ref_id="CVE-2016-5548" ref_url="https://www.suse.com/security/cve/CVE-2016-5548/" source="CVE"/>
		<reference ref_id="CVE-2016-5549" ref_url="https://www.suse.com/security/cve/CVE-2016-5549/" source="CVE"/>
		<reference ref_id="CVE-2016-5552" ref_url="https://www.suse.com/security/cve/CVE-2016-5552/" source="CVE"/>
		<reference ref_id="CVE-2017-3231" ref_url="https://www.suse.com/security/cve/CVE-2017-3231/" source="CVE"/>
		<reference ref_id="CVE-2017-3241" ref_url="https://www.suse.com/security/cve/CVE-2017-3241/" source="CVE"/>
		<reference ref_id="CVE-2017-3252" ref_url="https://www.suse.com/security/cve/CVE-2017-3252/" source="CVE"/>
		<reference ref_id="CVE-2017-3253" ref_url="https://www.suse.com/security/cve/CVE-2017-3253/" source="CVE"/>
		<reference ref_id="CVE-2017-3259" ref_url="https://www.suse.com/security/cve/CVE-2017-3259/" source="CVE"/>
		<reference ref_id="CVE-2017-3260" ref_url="https://www.suse.com/security/cve/CVE-2017-3260/" source="CVE"/>
		<reference ref_id="CVE-2017-3261" ref_url="https://www.suse.com/security/cve/CVE-2017-3261/" source="CVE"/>
		<reference ref_id="CVE-2017-3272" ref_url="https://www.suse.com/security/cve/CVE-2017-3272/" source="CVE"/>
		<reference ref_id="CVE-2017-3289" ref_url="https://www.suse.com/security/cve/CVE-2017-3289/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_0-openjdk fixes the following issues:

- Oracle Critical Patch Update of January 2017 to OpenJDK 7u131 (bsc#1020905):
  * Security Fixes
    - S8138725: Add options for Javadoc generation
    - S8140353: Improve signature checking
    - S8151934, CVE-2017-3231: Resolve class resolution
    - S8156804, CVE-2017-3241: Better constraint checking
    - S8158406: Limited Parameter Processing
    - S8158997: JNDI Protocols Switch
    - S8159507: RuntimeVisibleAnnotation validation
    - S8161218: Better bytecode loading
    - S8161743, CVE-2017-3252: Provide proper login context
    - S8162577: Standardize logging levels
    - S8162973: Better component components
    - S8164143, CVE-2017-3260: Improve components for menu items
    - S8164147, CVE-2017-3261: Improve streaming socket output
    - S8165071, CVE-2016-2183: Expand TLS support
    - S8165344, CVE-2017-3272: Update concurrency support
    - S8166988, CVE-2017-3253: Improve image processing performance
    - S8167104, CVE-2017-3289: Additional class construction refinements
    - S8167223, CVE-2016-5552: URL handling improvements
    - S8168705, CVE-2016-5547: Better ObjectIdentifier validation
    - S8168714, CVE-2016-5546: Tighten ECDSA validation
    - S8168728, CVE-2016-5548: DSA signing improvments
    - S8168724, CVE-2016-5549: ECDSA signing improvments
    - S6253144: Long narrowing conversion should describe the algorithm used and implied 'risks'
    - S6328537: Improve javadocs for Socket class by adding references to SocketOptions
    - S6978886: javadoc shows stacktrace after print error resulting from disk full
    - S6995421: Eliminate the static dependency to sun.security.ec.ECKeyFactory
    - S6996372: synchronizing handshaking hash
    - S7027045: (doc) java/awt/Window.java has several typos in javadoc
    - S7054969: Null-check-in-finally pattern in java/security documentation
    - S7072353: JNDI libraries do not build with javac -Xlint:all -Werror
    - S7075563: Broken link in 'javax.swing.SwingWorker'
    - S7077672: jdk8_tl nightly fail in step-2 build on 8/10/11
    - S7088502: Security libraries don't build with javac -Werror
    - S7092447: Clarify the default locale used in each locale sensitive operation
    - S7093640: Enable client-side TLS 1.2 by default
    - S7103570: AtomicIntegerFieldUpdater does not work when SecurityManager is installed
    - S7117360: Warnings in java.util.concurrent.atomic package
    - S7117465: Warning cleanup for IMF classes
    - S7187144: JavaDoc for ScriptEngineFactory.getProgram() contains an error
    - S8000418: javadoc should used a standard 'generated by javadoc' string
    - S8000666: javadoc should write directly to Writer instead of composing strings
    - S8000673: remove dead code from HtmlWriter and subtypes
    - S8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
    - S8001669: javadoc internal DocletAbortException should set cause when appropriate
    - S8008949: javadoc stopped copying doc-files
    - S8011402: Move blacklisting certificate logic from hard code to data
    - S8011547: Update XML Signature implementation to Apache Santuario 1.5.4
    - S8012288: XML DSig API allows wrong tag names and extra elements in SignedInfo
    - S8016217: More javadoc warnings
    - S8017325: Cleanup of the javadoc &lt;code&gt; tag in java.security.cert
    - S8017326: Cleanup of the javadoc &lt;code&gt; tag in java.security.spec
    - S8019772: Fix doclint issues in javax.crypto and javax.security subpackages
    - S8020557: javadoc cleanup in javax.security
    - S8020688: Broken links in documentation at http://docs.oracle.com/javase/6/docs/api/index.
    - S8021108: Clean up doclint warnings and errors in java.text package
    - S8021417: Fix doclint issues in java.util.concurrent
    - S8021833: javadoc cleanup in java.net
    - S8022120: JCK test api/javax_xml/crypto/dsig/TransformService/index_ParamMethods fails
    - S8022175: Fix doclint warnings in javax.print
    - S8022406: Fix doclint issues in java.beans
    - S8022746: List of spelling errors in API doc
    - S8024779: [macosx] SwingNode crashes on exit
    - S8025085: [javadoc] some errors in javax/swing
    - S8025218: [javadoc] some errors in java/awt classes
    - S8025249: [javadoc] fix some javadoc errors in javax/swing/
    - S8025409: Fix javadoc comments errors and warning reported by doclint report
    - S8026021: more fix of javadoc errors and warnings reported by doclint, see the description
    - S8037099: [macosx] Remove all references to GC from native OBJ-C code
    - S8038184: XMLSignature throws StringIndexOutOfBoundsException if ID attribute value is empty String
    - S8038349: Signing XML with DSA throws Exception when key is larger than 1024 bits
    - S8049244: XML Signature performance issue caused by unbuffered signature data
    - S8049432: New tests for TLS property jdk.tls.client.protocols
    - S8050893: (smartcardio) Invert reset argument in tests in sun/security/smartcardio
    - S8059212: Modify regression tests so that they do not just fail if no cardreader found
    - S8068279: (typo in the spec) javax.script.ScriptEngineFactory.getLanguageName
    - S8068491: Update the protocol for references of docs.oracle.com to HTTPS.
    - S8069038: javax/net/ssl/TLS/TLSClientPropertyTest.java needs to be updated for JDK-8061210
    - S8076369: Introduce the jdk.tls.client.protocols system property for JDK 7u
    - S8139565: Restrict certificates with DSA keys less than 1024 bits
    - S8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions
    - S8140587: Atomic*FieldUpdaters should use Class.isInstance instead of direct class check
    - S8143959: Certificates requiring blacklisting
    - S8145984: [macosx] sun.lwawt.macosx.CAccessible leaks
    - S8148516: Improve the default strength of EC in JDK
    - S8149029: Secure validation of XML based digital signature always enabled when checking wrapping attacks
    - S8151893: Add security property to configure XML Signature secure validation mode
    - S8155760: Implement Serialization Filtering
    - S8156802: Better constraint checking
    - S8161228: URL objects with custom protocol handlers have port changed after deserializing
    - S8161571: Verifying ECDSA signatures permits trailing bytes
    - S8163304: jarsigner -verbose -verify should print the algorithms used to sign the jar
    - S8164908: ReflectionFactory support for IIOP and custom serialization
    - S8165230: RMIConnection addNotificationListeners failing with specific inputs
    - S8166393: disabledAlgorithms property should not be strictly parsed
    - S8166591: [macos 10.12] Trackpad scrolling of text on OS X 10.12 Sierra is very fast (Trackpad, Retina only)
    - S8166739: Improve extensibility of ObjectInputFilter information passed to the filter
    - S8166875: (tz) Support tzdata2016g
    - S8166878: Connection reset during TLS handshake
    - S8167356: Follow up fix for jdk8 backport of 8164143. Changes for CMenuComponent.m were missed
    - S8167459: Add debug output for indicating if a chosen ciphersuite was legacy
    - S8167472: Chrome interop regression with JDK-8148516
    - S8167591: Add MD5 to signed JAR restrictions
    - S8168861: AnchorCertificates uses hardcoded password for cacerts keystore
    - S8168993: JDK8u121 L10n resource file update
    - S8169191: (tz) Support tzdata2016i
    - S8169688: Backout (remove) MD5 from jdk.jar.disabledAlgorithms for January CPU
    - S8169911: Enhanced tests for jarsigner -verbose -verify after JDK-8163304
    - S8170131: Certificates not being blocked by jdk.tls.disabledAlgorithms property
    - S8170268: 8u121 L10n resource file update - msgdrop 20
    - S8173622: Backport of 7180907 is incomplete
    - S8173849: Fix use of java.util.Base64 in test cases
    - S8173854: [TEST] Update DHEKeySizing test case following 8076328 &amp; 8081760
    - CVE-2017-3259 Vulnerability allows unauthenticated attacker with network access via multiple protocols to
      compromise Java SE.
  * Backports
    - S7102489, PR3316, RH1390708: RFE: cleanup jlong typedef on __APPLE__and _LLP64 systems.
    - S8000351, PR3316, RH1390708: Tenuring threshold should be unsigned
    - S8153711, PR3315, RH1284948: [REDO] GlobalRefs never deleted when processing invokeMethod command
    - S8170888, PR3316, RH1390708: [linux] support for cgroup memory limits in container (ie Docker) environments
  * Bug fixes
    - PR3318: Replace 'infinality' with 'improved font rendering' (--enable-improved-font-rendering)
    - PR3318: Fix compatibility with vanilla Fontconfig
    - PR3318: Fix glyph y advance
    - PR3318: Always round glyph advance in 26.6 space
    - PR3318: Simplify glyph advance handling
    - PR3324: Fix NSS_LIBDIR substitution in make_generic_profile.sh broken by PR1989
  * AArch64 port
    - S8165673, PR3320: AArch64: Fix JNI floating point argument handling
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-17"/>
	<updated date="2017-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5546/">CVE-2016-5546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5547/">CVE-2016-5547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5548/">CVE-2016-5548</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5549/">CVE-2016-5549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5552/">CVE-2016-5552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3231/">CVE-2017-3231</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3241/">CVE-2017-3241</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3252/">CVE-2017-3252</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3253/">CVE-2017-3253</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3259/">CVE-2017-3259</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3260/">CVE-2017-3260</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3261/">CVE-2017-3261</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3272/">CVE-2017-3272</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3289/">CVE-2017-3289</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517110" comment="java-1_7_0-openjdk-1.7.0.131-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517111" comment="java-1_7_0-openjdk-headless-1.7.0.131-39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78004" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1010977" ref_url="https://bugzilla.suse.com/1010977" source="BUGZILLA"/>
		<reference ref_id="1010979" ref_url="https://bugzilla.suse.com/1010979" source="BUGZILLA"/>
		<reference ref_id="1011830" ref_url="https://bugzilla.suse.com/1011830" source="BUGZILLA"/>
		<reference ref_id="1012530" ref_url="https://bugzilla.suse.com/1012530" source="BUGZILLA"/>
		<reference ref_id="1015993" ref_url="https://bugzilla.suse.com/1015993" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8654" ref_url="https://www.suse.com/security/cve/CVE-2016-8654/" source="CVE"/>
		<reference ref_id="CVE-2016-9395" ref_url="https://www.suse.com/security/cve/CVE-2016-9395/" source="CVE"/>
		<reference ref_id="CVE-2016-9398" ref_url="https://www.suse.com/security/cve/CVE-2016-9398/" source="CVE"/>
		<reference ref_id="CVE-2016-9560" ref_url="https://www.suse.com/security/cve/CVE-2016-9560/" source="CVE"/>
		<reference ref_id="CVE-2016-9591" ref_url="https://www.suse.com/security/cve/CVE-2016-9591/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00008.html" source="SUSE-SU"/>
		<description>

This update for jasper fixes the following issues:

- CVE-2016-8654: Heap-based buffer overflow in QMFB code in JPC codec. (bsc#1012530)
- CVE-2016-9395: Invalid jasper files could lead to abort of the library caused by attacker provided image. (bsc#1010977)
- CVE-2016-9398: Invalid jasper files could lead to abort of the library caused by attacker provided image. (bsc#1010979)
- CVE-2016-9560: Stack-based buffer overflow in jpc_tsfb_getbands2. (bsc#1011830)
- CVE-2016-9591: Use-after-free on heap in jas_matrix_destroy. (bsc#1015993)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-08"/>
	<updated date="2017-01-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010977">SUSE bug 1010977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010979">SUSE bug 1010979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011830">SUSE bug 1011830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012530">SUSE bug 1012530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015993">SUSE bug 1015993</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8654/">CVE-2016-8654</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9395/">CVE-2016-9395</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9398/">CVE-2016-9398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9560/">CVE-2016-9560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9591/">CVE-2016-9591</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517125" comment="libjasper1-1.900.14-184.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517126" comment="libjasper1-32bit-1.900.14-184.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78005" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1017308" ref_url="https://bugzilla.suse.com/1017308" source="BUGZILLA"/>
		<reference ref_id="1017310" ref_url="https://bugzilla.suse.com/1017310" source="BUGZILLA"/>
		<reference ref_id="1017311" ref_url="https://bugzilla.suse.com/1017311" source="BUGZILLA"/>
		<reference ref_id="1017312" ref_url="https://bugzilla.suse.com/1017312" source="BUGZILLA"/>
		<reference ref_id="1017313" ref_url="https://bugzilla.suse.com/1017313" source="BUGZILLA"/>
		<reference ref_id="1017314" ref_url="https://bugzilla.suse.com/1017314" source="BUGZILLA"/>
		<reference ref_id="1017318" ref_url="https://bugzilla.suse.com/1017318" source="BUGZILLA"/>
		<reference ref_id="1017319" ref_url="https://bugzilla.suse.com/1017319" source="BUGZILLA"/>
		<reference ref_id="1017320" ref_url="https://bugzilla.suse.com/1017320" source="BUGZILLA"/>
		<reference ref_id="1017321" ref_url="https://bugzilla.suse.com/1017321" source="BUGZILLA"/>
		<reference ref_id="1017322" ref_url="https://bugzilla.suse.com/1017322" source="BUGZILLA"/>
		<reference ref_id="1017324" ref_url="https://bugzilla.suse.com/1017324" source="BUGZILLA"/>
		<reference ref_id="1017325" ref_url="https://bugzilla.suse.com/1017325" source="BUGZILLA"/>
		<reference ref_id="1017326" ref_url="https://bugzilla.suse.com/1017326" source="BUGZILLA"/>
		<reference ref_id="1017421" ref_url="https://bugzilla.suse.com/1017421" source="BUGZILLA"/>
		<reference ref_id="1020433" ref_url="https://bugzilla.suse.com/1020433" source="BUGZILLA"/>
		<reference ref_id="1020435" ref_url="https://bugzilla.suse.com/1020435" source="BUGZILLA"/>
		<reference ref_id="1020436" ref_url="https://bugzilla.suse.com/1020436" source="BUGZILLA"/>
		<reference ref_id="1020439" ref_url="https://bugzilla.suse.com/1020439" source="BUGZILLA"/>
		<reference ref_id="1020441" ref_url="https://bugzilla.suse.com/1020441" source="BUGZILLA"/>
		<reference ref_id="1020443" ref_url="https://bugzilla.suse.com/1020443" source="BUGZILLA"/>
		<reference ref_id="1020446" ref_url="https://bugzilla.suse.com/1020446" source="BUGZILLA"/>
		<reference ref_id="1020448" ref_url="https://bugzilla.suse.com/1020448" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10046" ref_url="https://www.suse.com/security/cve/CVE-2016-10046/" source="CVE"/>
		<reference ref_id="CVE-2016-10048" ref_url="https://www.suse.com/security/cve/CVE-2016-10048/" source="CVE"/>
		<reference ref_id="CVE-2016-10049" ref_url="https://www.suse.com/security/cve/CVE-2016-10049/" source="CVE"/>
		<reference ref_id="CVE-2016-10050" ref_url="https://www.suse.com/security/cve/CVE-2016-10050/" source="CVE"/>
		<reference ref_id="CVE-2016-10051" ref_url="https://www.suse.com/security/cve/CVE-2016-10051/" source="CVE"/>
		<reference ref_id="CVE-2016-10052" ref_url="https://www.suse.com/security/cve/CVE-2016-10052/" source="CVE"/>
		<reference ref_id="CVE-2016-10059" ref_url="https://www.suse.com/security/cve/CVE-2016-10059/" source="CVE"/>
		<reference ref_id="CVE-2016-10060" ref_url="https://www.suse.com/security/cve/CVE-2016-10060/" source="CVE"/>
		<reference ref_id="CVE-2016-10061" ref_url="https://www.suse.com/security/cve/CVE-2016-10061/" source="CVE"/>
		<reference ref_id="CVE-2016-10062" ref_url="https://www.suse.com/security/cve/CVE-2016-10062/" source="CVE"/>
		<reference ref_id="CVE-2016-10063" ref_url="https://www.suse.com/security/cve/CVE-2016-10063/" source="CVE"/>
		<reference ref_id="CVE-2016-10064" ref_url="https://www.suse.com/security/cve/CVE-2016-10064/" source="CVE"/>
		<reference ref_id="CVE-2016-10065" ref_url="https://www.suse.com/security/cve/CVE-2016-10065/" source="CVE"/>
		<reference ref_id="CVE-2016-10068" ref_url="https://www.suse.com/security/cve/CVE-2016-10068/" source="CVE"/>
		<reference ref_id="CVE-2016-10069" ref_url="https://www.suse.com/security/cve/CVE-2016-10069/" source="CVE"/>
		<reference ref_id="CVE-2016-10070" ref_url="https://www.suse.com/security/cve/CVE-2016-10070/" source="CVE"/>
		<reference ref_id="CVE-2016-10071" ref_url="https://www.suse.com/security/cve/CVE-2016-10071/" source="CVE"/>
		<reference ref_id="CVE-2016-10144" ref_url="https://www.suse.com/security/cve/CVE-2016-10144/" source="CVE"/>
		<reference ref_id="CVE-2016-10145" ref_url="https://www.suse.com/security/cve/CVE-2016-10145/" source="CVE"/>
		<reference ref_id="CVE-2016-10146" ref_url="https://www.suse.com/security/cve/CVE-2016-10146/" source="CVE"/>
		<reference ref_id="CVE-2017-5506" ref_url="https://www.suse.com/security/cve/CVE-2017-5506/" source="CVE"/>
		<reference ref_id="CVE-2017-5507" ref_url="https://www.suse.com/security/cve/CVE-2017-5507/" source="CVE"/>
		<reference ref_id="CVE-2017-5508" ref_url="https://www.suse.com/security/cve/CVE-2017-5508/" source="CVE"/>
		<reference ref_id="CVE-2017-5510" ref_url="https://www.suse.com/security/cve/CVE-2017-5510/" source="CVE"/>
		<reference ref_id="CVE-2017-5511" ref_url="https://www.suse.com/security/cve/CVE-2017-5511/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<description>


This update for ImageMagick fixes the following issues:

- CVE-2016-10046: Prevent buffer overflow in draw.c caused by an incorrect length calculation (bsc#1017308)
- CVE-2016-10048: Arbitrary module could have been load because relative path were not escaped (bsc#1017310)
- CVE-2016-10049: Corrupt RLE files could have overflowed a buffer due to a incorrect length calculation (bsc#1017311)
- CVE-2016-10050: Corrupt RLE files could have overflowed a heap buffer due to a missing offset check (bsc#1017312)
- CVE-2016-10051: Fixed use after free when reading PWP files (bsc#1017313)
- CVE-2016-10052: Added bound check to exif parsing of JPEG files (bsc#1017314)
- CVE-2016-10059: Unchecked calculation when reading TIFF files could have lead to a buffer overflow (bsc#1017318)
- CVE-2016-10060: Improved error handling when writing files to not mask errors (bsc#1017319)
- CVE-2016-10061: Improved error handling when writing files to not mask errors (bsc#1017319).
- CVE-2016-10062: Improved error handling when writing files to not mask errors (bsc#1017319).
- CVE-2016-10063: Check validity of extend during TIFF file reading (bsc#1017320)
- CVE-2016-10064: Improved checks for buffer overflow when reading TIFF files (bsc#1017321)
- CVE-2016-10065: Unchecked calculations when reading VIFF files could have lead to out of bound reads (bsc#1017322)
- CVE-2016-10068: Prevent NULL pointer access when using the MSL interpreter (bsc#1017324)
- CVE-2016-10069: Add check for invalid mat file (bsc#1017325).
- CVE-2016-10070: Prevent allocating the wrong amount of memory when reading mat files (bsc#1017326)
- CVE-2016-10071: Prevent allocating the wrong amount of memory when reading mat files (bsc#1017326)
- CVE-2016-10144: Added a check after allocating memory when parsing IPL files (bsc#1020433)
- CVE-2016-10145: Fixed of-by-one in string copy operation when parsing WPG files (bsc#1020435)
- CVE-2016-10146: Captions and labels were handled incorrectly, causing a memory leak that could have lead to DoS (bsc#1020443)
- CVE-2017-5506: Missing offset check leading to a double-free (bsc#1020436)
- CVE-2017-5507: Fixed a memory leak when reading MPC files allowing for DoS (bsc#1020439)
- CVE-2017-5508: Increase the amount of memory allocated for TIFF pixels to prevent a heap buffer-overflow (bsc#1020441)
- CVE-2017-5510: Prevent out-of-bounds write when reading PSD files (bsc#1020446).
- CVE-2017-5511: A missing cast when reading PSD files could have caused memory corruption by a heap overflow (bsc#1020448)

This update removes the fix for CVE-2016-9773. ImageMagick-6 was not affected by CVE-2016-9773 and it caused a regression (at least in GraphicsMagick) (bsc#1017421).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-21"/>
	<updated date="2017-02-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017308">SUSE bug 1017308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017310">SUSE bug 1017310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017311">SUSE bug 1017311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017312">SUSE bug 1017312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017313">SUSE bug 1017313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017314">SUSE bug 1017314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017318">SUSE bug 1017318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017319">SUSE bug 1017319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017320">SUSE bug 1017320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017321">SUSE bug 1017321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017322">SUSE bug 1017322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017324">SUSE bug 1017324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017325">SUSE bug 1017325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017326">SUSE bug 1017326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017421">SUSE bug 1017421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020433">SUSE bug 1020433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020435">SUSE bug 1020435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020436">SUSE bug 1020436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020439">SUSE bug 1020439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020441">SUSE bug 1020441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020443">SUSE bug 1020443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020446">SUSE bug 1020446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020448">SUSE bug 1020448</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10046/">CVE-2016-10046</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10048/">CVE-2016-10048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10049/">CVE-2016-10049</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10050/">CVE-2016-10050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10051/">CVE-2016-10051</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10052/">CVE-2016-10052</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10059/">CVE-2016-10059</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10060/">CVE-2016-10060</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10061/">CVE-2016-10061</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10062/">CVE-2016-10062</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10063/">CVE-2016-10063</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10064/">CVE-2016-10064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10065/">CVE-2016-10065</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10068/">CVE-2016-10068</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10069/">CVE-2016-10069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10070/">CVE-2016-10070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10071/">CVE-2016-10071</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10144/">CVE-2016-10144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10145/">CVE-2016-10145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10146/">CVE-2016-10146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5506/">CVE-2017-5506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5507/">CVE-2017-5507</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5508/">CVE-2017-5508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5510/">CVE-2017-5510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5511/">CVE-2017-5511</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517127" comment="ImageMagick-6.8.8.1-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517128" comment="libMagick++-6_Q16-3-6.8.8.1-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517129" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517130" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517131" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78006" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1008965" ref_url="https://bugzilla.suse.com/1008965" source="BUGZILLA"/>
		<reference ref_id="1012504" ref_url="https://bugzilla.suse.com/1012504" source="BUGZILLA"/>
		<reference ref_id="1012632" ref_url="https://bugzilla.suse.com/1012632" source="BUGZILLA"/>
		<reference ref_id="1019332" ref_url="https://bugzilla.suse.com/1019332" source="BUGZILLA"/>
		<reference ref_id="1020077" ref_url="https://bugzilla.suse.com/1020077" source="BUGZILLA"/>
		<reference ref_id="1020985" ref_url="https://bugzilla.suse.com/1020985" source="BUGZILLA"/>
		<reference ref_id="1023041" ref_url="https://bugzilla.suse.com/1023041" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2616" ref_url="https://www.suse.com/security/cve/CVE-2017-2616/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0554-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00039.html" source="SUSE-SU"/>
		<description>

This update for util-linux fixes the following issues:

This security issue was fixed:

- CVE-2017-2616: In su with PAM support it was possible for local users to send SIGKILL to selected other processes with root privileges (bsc#1023041).

This non-security issues were fixed:

- lscpu: Implement WSL detection and work around crash (bsc#1019332)
- fstrim: De-duplicate btrfs sub-volumes for 'fstrim -a' and bind mounts (bsc#1020077)
- Fix regressions in safe loop re-use patch set for libmount (bsc#1012504)
- Disable ro checks for mtab (bsc#1012632)
- Ensure that the option 'users,exec,dev,suid' work as expected on NFS mounts (bsc#1008965)
- Fix empty slave detection to prevent 100% CPU load in some cases (bsc#1020985)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-23"/>
	<updated date="2017-02-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1008965">SUSE bug 1008965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012504">SUSE bug 1012504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012632">SUSE bug 1012632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019332">SUSE bug 1019332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020077">SUSE bug 1020077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020985">SUSE bug 1020985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023041">SUSE bug 1023041</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2616/">CVE-2017-2616</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518450" comment="libblkid1-2.28-44.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518451" comment="libblkid1-32bit-2.28-44.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518452" comment="libfdisk1-2.28-44.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518453" comment="libmount1-2.28-44.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518454" comment="libmount1-32bit-2.28-44.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518455" comment="libsmartcols1-2.28-44.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518456" comment="libuuid-devel-2.28-44.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518457" comment="libuuid1-2.28-44.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518458" comment="libuuid1-32bit-2.28-44.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518459" comment="python-libmount-2.28-44.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518460" comment="util-linux-2.28-44.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518461" comment="util-linux-lang-2.28-44.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518462" comment="util-linux-systemd-2.28-44.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518463" comment="uuidd-2.28-44.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78007" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1000195" ref_url="https://bugzilla.suse.com/1000195" source="BUGZILLA"/>
		<reference ref_id="1002496" ref_url="https://bugzilla.suse.com/1002496" source="BUGZILLA"/>
		<reference ref_id="1005028" ref_url="https://bugzilla.suse.com/1005028" source="BUGZILLA"/>
		<reference ref_id="1012651" ref_url="https://bugzilla.suse.com/1012651" source="BUGZILLA"/>
		<reference ref_id="1014298" ref_url="https://bugzilla.suse.com/1014298" source="BUGZILLA"/>
		<reference ref_id="1014300" ref_url="https://bugzilla.suse.com/1014300" source="BUGZILLA"/>
		<reference ref_id="1015169" ref_url="https://bugzilla.suse.com/1015169" source="BUGZILLA"/>
		<reference ref_id="1016340" ref_url="https://bugzilla.suse.com/1016340" source="BUGZILLA"/>
		<reference ref_id="1022871" ref_url="https://bugzilla.suse.com/1022871" source="BUGZILLA"/>
		<reference ref_id="1023004" ref_url="https://bugzilla.suse.com/1023004" source="BUGZILLA"/>
		<reference ref_id="1024834" ref_url="https://bugzilla.suse.com/1024834" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00046.html" source="SUSE-SU"/>
		<description>

This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024834).
- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004).
- A malicious guest could have, by frequently rebooting over extended periods of time, run the host system out of memory, resulting in a Denial of Service (DoS) (bsc#1022871)
- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169

These non-security issues were fixed:

- bsc#1000195: Prevent panic on CPU0 while booting on SLES 11 SP3 
- bsc#1002496: Added support for reloading clvm in block-dmmd block-dmmd
- bsc#1005028: Fixed building Xen RPMs from Sources
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-27"/>
	<updated date="2017-02-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000195">SUSE bug 1000195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002496">SUSE bug 1002496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005028">SUSE bug 1005028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012651">SUSE bug 1012651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014298">SUSE bug 1014298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014300">SUSE bug 1014300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015169">SUSE bug 1015169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016340">SUSE bug 1016340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022871">SUSE bug 1022871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023004">SUSE bug 1023004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024834">SUSE bug 1024834</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518464" comment="xen-4.7.1_06-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518465" comment="xen-libs-4.7.1_06-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518466" comment="xen-libs-32bit-4.7.1_06-31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78008" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1000092" ref_url="https://bugzilla.suse.com/1000092" source="BUGZILLA"/>
		<reference ref_id="1000619" ref_url="https://bugzilla.suse.com/1000619" source="BUGZILLA"/>
		<reference ref_id="1003077" ref_url="https://bugzilla.suse.com/1003077" source="BUGZILLA"/>
		<reference ref_id="1005918" ref_url="https://bugzilla.suse.com/1005918" source="BUGZILLA"/>
		<reference ref_id="1006469" ref_url="https://bugzilla.suse.com/1006469" source="BUGZILLA"/>
		<reference ref_id="1006472" ref_url="https://bugzilla.suse.com/1006472" source="BUGZILLA"/>
		<reference ref_id="1007729" ref_url="https://bugzilla.suse.com/1007729" source="BUGZILLA"/>
		<reference ref_id="1008742" ref_url="https://bugzilla.suse.com/1008742" source="BUGZILLA"/>
		<reference ref_id="1009546" ref_url="https://bugzilla.suse.com/1009546" source="BUGZILLA"/>
		<reference ref_id="1009674" ref_url="https://bugzilla.suse.com/1009674" source="BUGZILLA"/>
		<reference ref_id="1009718" ref_url="https://bugzilla.suse.com/1009718" source="BUGZILLA"/>
		<reference ref_id="1009911" ref_url="https://bugzilla.suse.com/1009911" source="BUGZILLA"/>
		<reference ref_id="1010612" ref_url="https://bugzilla.suse.com/1010612" source="BUGZILLA"/>
		<reference ref_id="1010690" ref_url="https://bugzilla.suse.com/1010690" source="BUGZILLA"/>
		<reference ref_id="1010933" ref_url="https://bugzilla.suse.com/1010933" source="BUGZILLA"/>
		<reference ref_id="1011176" ref_url="https://bugzilla.suse.com/1011176" source="BUGZILLA"/>
		<reference ref_id="1011602" ref_url="https://bugzilla.suse.com/1011602" source="BUGZILLA"/>
		<reference ref_id="1011660" ref_url="https://bugzilla.suse.com/1011660" source="BUGZILLA"/>
		<reference ref_id="1011913" ref_url="https://bugzilla.suse.com/1011913" source="BUGZILLA"/>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1012422" ref_url="https://bugzilla.suse.com/1012422" source="BUGZILLA"/>
		<reference ref_id="1012829" ref_url="https://bugzilla.suse.com/1012829" source="BUGZILLA"/>
		<reference ref_id="1012910" ref_url="https://bugzilla.suse.com/1012910" source="BUGZILLA"/>
		<reference ref_id="1013000" ref_url="https://bugzilla.suse.com/1013000" source="BUGZILLA"/>
		<reference ref_id="1013001" ref_url="https://bugzilla.suse.com/1013001" source="BUGZILLA"/>
		<reference ref_id="1013273" ref_url="https://bugzilla.suse.com/1013273" source="BUGZILLA"/>
		<reference ref_id="1013540" ref_url="https://bugzilla.suse.com/1013540" source="BUGZILLA"/>
		<reference ref_id="1013792" ref_url="https://bugzilla.suse.com/1013792" source="BUGZILLA"/>
		<reference ref_id="1013994" ref_url="https://bugzilla.suse.com/1013994" source="BUGZILLA"/>
		<reference ref_id="1014120" ref_url="https://bugzilla.suse.com/1014120" source="BUGZILLA"/>
		<reference ref_id="1014410" ref_url="https://bugzilla.suse.com/1014410" source="BUGZILLA"/>
		<reference ref_id="1015038" ref_url="https://bugzilla.suse.com/1015038" source="BUGZILLA"/>
		<reference ref_id="1015367" ref_url="https://bugzilla.suse.com/1015367" source="BUGZILLA"/>
		<reference ref_id="1015840" ref_url="https://bugzilla.suse.com/1015840" source="BUGZILLA"/>
		<reference ref_id="1016250" ref_url="https://bugzilla.suse.com/1016250" source="BUGZILLA"/>
		<reference ref_id="1016403" ref_url="https://bugzilla.suse.com/1016403" source="BUGZILLA"/>
		<reference ref_id="1016517" ref_url="https://bugzilla.suse.com/1016517" source="BUGZILLA"/>
		<reference ref_id="1016884" ref_url="https://bugzilla.suse.com/1016884" source="BUGZILLA"/>
		<reference ref_id="1016979" ref_url="https://bugzilla.suse.com/1016979" source="BUGZILLA"/>
		<reference ref_id="1017164" ref_url="https://bugzilla.suse.com/1017164" source="BUGZILLA"/>
		<reference ref_id="1017170" ref_url="https://bugzilla.suse.com/1017170" source="BUGZILLA"/>
		<reference ref_id="1017410" ref_url="https://bugzilla.suse.com/1017410" source="BUGZILLA"/>
		<reference ref_id="1018100" ref_url="https://bugzilla.suse.com/1018100" source="BUGZILLA"/>
		<reference ref_id="1018316" ref_url="https://bugzilla.suse.com/1018316" source="BUGZILLA"/>
		<reference ref_id="1018358" ref_url="https://bugzilla.suse.com/1018358" source="BUGZILLA"/>
		<reference ref_id="1018446" ref_url="https://bugzilla.suse.com/1018446" source="BUGZILLA"/>
		<reference ref_id="1018813" ref_url="https://bugzilla.suse.com/1018813" source="BUGZILLA"/>
		<reference ref_id="1018913" ref_url="https://bugzilla.suse.com/1018913" source="BUGZILLA"/>
		<reference ref_id="1019061" ref_url="https://bugzilla.suse.com/1019061" source="BUGZILLA"/>
		<reference ref_id="1019148" ref_url="https://bugzilla.suse.com/1019148" source="BUGZILLA"/>
		<reference ref_id="1019168" ref_url="https://bugzilla.suse.com/1019168" source="BUGZILLA"/>
		<reference ref_id="1019260" ref_url="https://bugzilla.suse.com/1019260" source="BUGZILLA"/>
		<reference ref_id="1019351" ref_url="https://bugzilla.suse.com/1019351" source="BUGZILLA"/>
		<reference ref_id="1019594" ref_url="https://bugzilla.suse.com/1019594" source="BUGZILLA"/>
		<reference ref_id="1019630" ref_url="https://bugzilla.suse.com/1019630" source="BUGZILLA"/>
		<reference ref_id="1019631" ref_url="https://bugzilla.suse.com/1019631" source="BUGZILLA"/>
		<reference ref_id="1019784" ref_url="https://bugzilla.suse.com/1019784" source="BUGZILLA"/>
		<reference ref_id="1019851" ref_url="https://bugzilla.suse.com/1019851" source="BUGZILLA"/>
		<reference ref_id="1020048" ref_url="https://bugzilla.suse.com/1020048" source="BUGZILLA"/>
		<reference ref_id="1020214" ref_url="https://bugzilla.suse.com/1020214" source="BUGZILLA"/>
		<reference ref_id="1020488" ref_url="https://bugzilla.suse.com/1020488" source="BUGZILLA"/>
		<reference ref_id="1020602" ref_url="https://bugzilla.suse.com/1020602" source="BUGZILLA"/>
		<reference ref_id="1020685" ref_url="https://bugzilla.suse.com/1020685" source="BUGZILLA"/>
		<reference ref_id="1020817" ref_url="https://bugzilla.suse.com/1020817" source="BUGZILLA"/>
		<reference ref_id="1020945" ref_url="https://bugzilla.suse.com/1020945" source="BUGZILLA"/>
		<reference ref_id="1020975" ref_url="https://bugzilla.suse.com/1020975" source="BUGZILLA"/>
		<reference ref_id="1021082" ref_url="https://bugzilla.suse.com/1021082" source="BUGZILLA"/>
		<reference ref_id="1021248" ref_url="https://bugzilla.suse.com/1021248" source="BUGZILLA"/>
		<reference ref_id="1021251" ref_url="https://bugzilla.suse.com/1021251" source="BUGZILLA"/>
		<reference ref_id="1021258" ref_url="https://bugzilla.suse.com/1021258" source="BUGZILLA"/>
		<reference ref_id="1021260" ref_url="https://bugzilla.suse.com/1021260" source="BUGZILLA"/>
		<reference ref_id="1021294" ref_url="https://bugzilla.suse.com/1021294" source="BUGZILLA"/>
		<reference ref_id="1021455" ref_url="https://bugzilla.suse.com/1021455" source="BUGZILLA"/>
		<reference ref_id="1021474" ref_url="https://bugzilla.suse.com/1021474" source="BUGZILLA"/>
		<reference ref_id="1022304" ref_url="https://bugzilla.suse.com/1022304" source="BUGZILLA"/>
		<reference ref_id="1022429" ref_url="https://bugzilla.suse.com/1022429" source="BUGZILLA"/>
		<reference ref_id="1022476" ref_url="https://bugzilla.suse.com/1022476" source="BUGZILLA"/>
		<reference ref_id="1022547" ref_url="https://bugzilla.suse.com/1022547" source="BUGZILLA"/>
		<reference ref_id="1022559" ref_url="https://bugzilla.suse.com/1022559" source="BUGZILLA"/>
		<reference ref_id="1022971" ref_url="https://bugzilla.suse.com/1022971" source="BUGZILLA"/>
		<reference ref_id="1023101" ref_url="https://bugzilla.suse.com/1023101" source="BUGZILLA"/>
		<reference ref_id="1023175" ref_url="https://bugzilla.suse.com/1023175" source="BUGZILLA"/>
		<reference ref_id="1023762" ref_url="https://bugzilla.suse.com/1023762" source="BUGZILLA"/>
		<reference ref_id="1023884" ref_url="https://bugzilla.suse.com/1023884" source="BUGZILLA"/>
		<reference ref_id="1023888" ref_url="https://bugzilla.suse.com/1023888" source="BUGZILLA"/>
		<reference ref_id="1024081" ref_url="https://bugzilla.suse.com/1024081" source="BUGZILLA"/>
		<reference ref_id="1024234" ref_url="https://bugzilla.suse.com/1024234" source="BUGZILLA"/>
		<reference ref_id="1024508" ref_url="https://bugzilla.suse.com/1024508" source="BUGZILLA"/>
		<reference ref_id="1024938" ref_url="https://bugzilla.suse.com/1024938" source="BUGZILLA"/>
		<reference ref_id="1025235" ref_url="https://bugzilla.suse.com/1025235" source="BUGZILLA"/>
		<reference ref_id="921494" ref_url="https://bugzilla.suse.com/921494" source="BUGZILLA"/>
		<reference ref_id="959709" ref_url="https://bugzilla.suse.com/959709" source="BUGZILLA"/>
		<reference ref_id="964944" ref_url="https://bugzilla.suse.com/964944" source="BUGZILLA"/>
		<reference ref_id="969476" ref_url="https://bugzilla.suse.com/969476" source="BUGZILLA"/>
		<reference ref_id="969477" ref_url="https://bugzilla.suse.com/969477" source="BUGZILLA"/>
		<reference ref_id="969479" ref_url="https://bugzilla.suse.com/969479" source="BUGZILLA"/>
		<reference ref_id="971975" ref_url="https://bugzilla.suse.com/971975" source="BUGZILLA"/>
		<reference ref_id="974215" ref_url="https://bugzilla.suse.com/974215" source="BUGZILLA"/>
		<reference ref_id="981709" ref_url="https://bugzilla.suse.com/981709" source="BUGZILLA"/>
		<reference ref_id="982783" ref_url="https://bugzilla.suse.com/982783" source="BUGZILLA"/>
		<reference ref_id="985561" ref_url="https://bugzilla.suse.com/985561" source="BUGZILLA"/>
		<reference ref_id="987192" ref_url="https://bugzilla.suse.com/987192" source="BUGZILLA"/>
		<reference ref_id="987576" ref_url="https://bugzilla.suse.com/987576" source="BUGZILLA"/>
		<reference ref_id="989056" ref_url="https://bugzilla.suse.com/989056" source="BUGZILLA"/>
		<reference ref_id="991273" ref_url="https://bugzilla.suse.com/991273" source="BUGZILLA"/>
		<reference ref_id="998106" ref_url="https://bugzilla.suse.com/998106" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8709" ref_url="https://www.suse.com/security/cve/CVE-2015-8709/" source="CVE"/>
		<reference ref_id="CVE-2016-7117" ref_url="https://www.suse.com/security/cve/CVE-2016-7117/" source="CVE"/>
		<reference ref_id="CVE-2016-9806" ref_url="https://www.suse.com/security/cve/CVE-2016-9806/" source="CVE"/>
		<reference ref_id="CVE-2017-2583" ref_url="https://www.suse.com/security/cve/CVE-2017-2583/" source="CVE"/>
		<reference ref_id="CVE-2017-2584" ref_url="https://www.suse.com/security/cve/CVE-2017-2584/" source="CVE"/>
		<reference ref_id="CVE-2017-5551" ref_url="https://www.suse.com/security/cve/CVE-2017-5551/" source="CVE"/>
		<reference ref_id="CVE-2017-5576" ref_url="https://www.suse.com/security/cve/CVE-2017-5576/" source="CVE"/>
		<reference ref_id="CVE-2017-5577" ref_url="https://www.suse.com/security/cve/CVE-2017-5577/" source="CVE"/>
		<reference ref_id="CVE-2017-5897" ref_url="https://www.suse.com/security/cve/CVE-2017-5897/" source="CVE"/>
		<reference ref_id="CVE-2017-5970" ref_url="https://www.suse.com/security/cve/CVE-2017-5970/" source="CVE"/>
		<reference ref_id="CVE-2017-5986" ref_url="https://www.suse.com/security/cve/CVE-2017-5986/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00047.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP2 kernel was updated to 4.4.49 to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in
  net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary
  code via vectors involving a recvmmsg system call that was mishandled during
  error processing (bnc#1003077).
- CVE-2017-5576: Integer overflow in the vc4_get_bcl function in
  drivers/gpu/drm/vc4/vc4_gem.c in the VideoCore DRM driver in the Linux kernel
  allowed local users to cause a denial of service or possibly have unspecified
  other impact via a crafted size value in a VC4_SUBMIT_CL ioctl call
  (bnc#1021294).
- CVE-2017-5577: The vc4_get_bcl function in drivers/gpu/drm/vc4/vc4_gem.c in
  the VideoCore DRM driver in the Linux kernel did not set an errno value upon
  certain overflow detections, which allowed local users to cause a denial of
  service (incorrect pointer dereference and OOPS) via inconsistent size values
  in a VC4_SUBMIT_CL ioctl call (bnc#1021294).
- CVE-2017-5551: The simple_set_acl function in fs/posix_acl.c in the Linux
  kernel preserved the setgid bit during a setxattr call involving a tmpfs
  filesystem, which allowed local users to gain group privileges by leveraging
  the existence of a setgid program with restrictions on execute permissions.
  (bnc#1021258).
- CVE-2017-2583: The load_segment_descriptor implementation in
  arch/x86/kvm/emulate.c in the Linux kernel improperly emulated a 'MOV SS,
  NULL selector' instruction, which allowed guest OS users to cause a denial of
  service (guest OS crash) or gain guest OS privileges via a crafted
  application (bnc#1020602).
- CVE-2017-2584: arch/x86/kvm/emulate.c in the Linux kernel allowed local users
  to obtain sensitive information from kernel memory or cause a denial of
  service (use-after-free) via a crafted application that leverages instruction
  emulation for fxrstor, fxsave, sgdt, and sidt (bnc#1019851).
- CVE-2015-8709: kernel/ptrace.c in the Linux kernel mishandled uid and gid
  mappings, which allowed local users to gain privileges by establishing a user
  namespace, waiting for a root process to enter that namespace with an unsafe
  uid or gid, and then using the ptrace system call.  NOTE: the vendor states
  'there is no kernel bug here' (bnc#1010933).
- CVE-2016-9806: Race condition in the netlink_dump function in
  net/netlink/af_netlink.c in the Linux kernel allowed local users to cause a
  denial of service (double free) or possibly have unspecified other impact via
  a crafted application that made sendmsg system calls, leading to a free
  operation associated with a new dump that started earlier than anticipated
  (bnc#1013540).
- CVE-2017-5897: fixed a bug in the Linux kernel IPv6 implementation which
  allowed remote attackers to trigger an out-of-bounds access, leading to a
  denial-of-service attack (bnc#1023762).
- CVE-2017-5970: Fixed a possible denial-of-service that could have been
  triggered by sending bad IP options on a socket (bsc#1024938).
- CVE-2017-5986: an application could have triggered a BUG_ON() in
  sctp_wait_for_sndbuf() if the socket TX buffer was full, a thread was waiting
  on it to queue more data, and meanwhile another thread peeled off the
  association being used by the first thread (bsc#1025235).

The following non-security bugs were fixed:

- 8250: fintek: rename IRQ_MODE macro (boo#1009546).
- acpi: nfit, libnvdimm: fix / harden ars_status output length handling (bsc#1023175).
- acpi: nfit: fix bus vs dimm confusion in xlat_status (bsc#1023175).
- acpi: nfit: validate ars_status output buffer size (bsc#1023175).
- arm64: numa: fix incorrect log for memory-less node (bsc#1019631).
- asoc: cht_bsw_rt5645: Fix leftover kmalloc (bsc#1010690).
- asoc: rt5670: add HS ground control (bsc#1016250).
- bcache: Make gc wakeup sane, remove set_task_state() (bsc#1021260).
- bcache: partition support: add 16 minors per bcacheN device (bsc#1019784).
- blk-mq: Allow timeouts to run while queue is freezing (bsc#1020817).
- blk-mq: Always schedule hctx-&gt;next_cpu (bsc#1020817).
- blk-mq: Avoid memory reclaim when remapping queues (bsc#1020817).
- blk-mq: Fix failed allocation path when mapping queues (bsc#1020817).
- blk-mq: do not overwrite rq-&gt;mq_ctx (bsc#1020817).
- blk-mq: improve warning for running a queue on the wrong CPU (bsc#1020817).
- block: Change extern inline to static inline (bsc#1023175).
- bluetooth: btmrvl: fix hung task warning dump (bsc#1018813).
- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).
- brcmfmac: Change error print on wlan0 existence (bsc#1000092).
- btrfs: add support for RENAME_EXCHANGE and RENAME_WHITEOUT (bsc#1020975).
- btrfs: bugfix: handle FS_IOC32_{GETFLAGS,SETFLAGS,GETVERSION} in btrfs_ioctl (bsc#1018100).
- btrfs: fix btrfs_compat_ioctl failures on non-compat ioctls (bsc#1018100).
- btrfs: fix inode leak on failure to setup whiteout inode in rename (bsc#1020975).
- btrfs: fix lockdep warning about log_mutex (bsc#1021455).
- btrfs: fix lockdep warning on deadlock against an inode's log mutex (bsc#1021455).
- btrfs: fix number of transaction units for renames with whiteout (bsc#1020975).
- btrfs: increment ctx-&gt;pos for every emitted or skipped dirent in readdir (bsc#981709).
- btrfs: incremental send, fix invalid paths for rename operations (bsc#1018316).
- btrfs: incremental send, fix premature rmdir operations (bsc#1018316).
- btrfs: pin log earlier when renaming (bsc#1020975).
- btrfs: pin logs earlier when doing a rename exchange operation (bsc#1020975).
- btrfs: remove old tree_root dirent processing in btrfs_real_readdir() (bsc#981709).
- btrfs: send, add missing error check for calls to path_loop() (bsc#1018316).
- btrfs: send, avoid incorrect leaf accesses when sending utimes operations (bsc#1018316).
- btrfs: send, fix failure to move directories with the same name around (bsc#1018316).
- btrfs: send, fix invalid leaf accesses due to incorrect utimes operations (bsc#1018316).
- btrfs: send, fix warning due to late freeing of orphan_dir_info structures (bsc#1018316).
- btrfs: test_check_exists: Fix infinite loop when searching for free space entries (bsc#987192).
- btrfs: unpin log if rename operation fails (bsc#1020975).
- btrfs: unpin logs if rename exchange operation fails (bsc#1020975).
- ceph: fix bad endianness handling in parse_reply_info_extra (bsc#1020488).
- clk: xgene: Add PMD clock (bsc#1019351).
- clk: xgene: Do not call __pa on ioremaped address (bsc#1019351).
- clk: xgene: Remove CLK_IS_ROOT (bsc#1019351).
- config: enable CONFIG_OCFS2_DEBUG_MASKLOG for ocfs2    (bsc#1015038)
- config: enable Ceph kernel client modules for ppc64le
- config: enable Ceph kernel client modules for s390x
- crypto: FIPS - allow tests to be disabled in FIPS mode (bsc#1018913).
- crypto: drbg - do not call drbg_instantiate in healt test (bsc#1018913).
- crypto: drbg - remove FIPS 140-2 continuous test (bsc#1018913).
- crypto: qat - fix bar discovery for c62x (bsc#1021251).
- crypto: qat - zero esram only for DH85x devices (bsc#1021248).
- crypto: rsa - allow keys &gt;= 2048 bits in FIPS mode (bsc#1018913).
- crypto: xts - consolidate sanity check for keys (bsc#1018913).
- crypto: xts - fix compile errors (bsc#1018913).
- cxl: fix potential NULL dereference in free_adapter() (bsc#1016517).
- dax: fix deadlock with DAX 4k holes (bsc#1012829).
- dax: fix device-dax region base (bsc#1023175).
- device-dax: check devm_nsio_enable() return value (bsc#1023175).
- device-dax: fail all private mapping attempts (bsc#1023175).
- device-dax: fix percpu_ref_exit ordering (bsc#1023175).
- driver core: fix race between creating/querying glue dir and its cleanup (bnc#1008742).
- drivers: hv: Introduce a policy for controlling channel affinity.
- drivers: hv: balloon: Add logging for dynamic memory operations.
- drivers: hv: balloon: Disable hot add when CONFIG_MEMORY_HOTPLUG is not set.
- drivers: hv: balloon: Fix info request to show max page count.
- drivers: hv: balloon: Use available memory value in pressure report.
- drivers: hv: balloon: account for gaps in hot add regions.
- drivers: hv: balloon: keep track of where ha_region starts.
- drivers: hv: balloon: replace ha_region_mutex with spinlock.
- drivers: hv: cleanup vmbus_open() for wrap around mappings.
- drivers: hv: do not leak memory in vmbus_establish_gpadl().
- drivers: hv: get rid of id in struct vmbus_channel.
- drivers: hv: get rid of redundant messagecount in create_gpadl_header().
- drivers: hv: get rid of timeout in vmbus_open().
- drivers: hv: make VMBus bus ids persistent.
- drivers: hv: ring_buffer: count on wrap around mappings in get_next_pkt_raw() (v2).
- drivers: hv: ring_buffer: use wrap around mappings in hv_copy{from, to}_ringbuffer().
- drivers: hv: ring_buffer: wrap around mappings for ring buffers.
- drivers: hv: utils: Check VSS daemon is listening before a hot backup.
- drivers: hv: utils: Continue to poll VSS channel after handling requests.
- drivers: hv: utils: Fix the mapping between host version and protocol to use.
- drivers: hv: utils: reduce HV_UTIL_NEGO_TIMEOUT timeout.
- drivers: hv: vmbus: Base host signaling strictly on the ring state.
- drivers: hv: vmbus: Enable explicit signaling policy for NIC channels.
- drivers: hv: vmbus: Implement a mechanism to tag the channel for low latency.
- drivers: hv: vmbus: Make mmio resource local.
- drivers: hv: vmbus: On the read path cleanup the logic to interrupt the host.
- drivers: hv: vmbus: On write cleanup the logic to interrupt the host.
- drivers: hv: vmbus: Reduce the delay between retries in vmbus_post_msg().
- drivers: hv: vmbus: finally fix hv_need_to_signal_on_read().
- drivers: hv: vmbus: fix the race when querying and updating the percpu list.
- drivers: hv: vmbus: suppress some 'hv_vmbus: Unknown GUID' warnings.
- drivers: hv: vss: Improve log messages.
- drivers: hv: vss: Operation timeouts should match host expectation.
- drivers: net: phy: mdio-xgene: Add hardware dependency (bsc#1019351).
- drivers: net: phy: xgene: Fix 'remove' function (bsc#1019351).
- drivers: net: xgene: Add change_mtu function (bsc#1019351).
- drivers: net: xgene: Add flow control configuration (bsc#1019351).
- drivers: net: xgene: Add flow control initialization (bsc#1019351).
- drivers: net: xgene: Add helper function (bsc#1019351).
- drivers: net: xgene: Add support for Jumbo frame (bsc#1019351).
- drivers: net: xgene: Configure classifier with pagepool (bsc#1019351).
- drivers: net: xgene: Fix MSS programming (bsc#1019351).
- drivers: net: xgene: fix build after change_mtu function change (bsc#1019351).
- drivers: net: xgene: fix: Coalescing values for v2 hardware (bsc#1019351).
- drivers: net: xgene: fix: Disable coalescing on v1 hardware (bsc#1019351).
- drivers: net: xgene: fix: RSS for non-TCP/UDP (bsc#1019351).
- drivers: net: xgene: fix: Use GPIO to get link status (bsc#1019351).
- drivers: net: xgene: uninitialized variable in xgene_enet_free_pagepool() (bsc#1019351).
- drm: Delete previous two fixes for i915 (bsc#1019061). These upstream fixes brought some regressions, so better to revert for now.
- drm: Disable patches.drivers/drm-i915-Exit-cherryview_irq_handler-after-one-pass The patch seems leading to the instability on Wyse box (bsc#1015367).
- drm: Fix broken VT switch with video=1366x768 option (bsc#1018358).
- drm: Use u64 for intermediate dotclock calculations (bnc#1006472).
- drm: i915: Do not init hpd polling for vlv and chv from runtime_suspend() (bsc#1014120).
- drm: i915: Fix PCODE polling during CDCLK change notification (bsc#1015367).
- drm: i915: Fix watermarks for VLV/CHV (bsc#1011176).
- drm: i915: Force VDD off on the new power seqeuencer before starting to use it (bsc#1009674).
- drm: i915: Mark CPU cache as dirty when used for rendering (bsc#1015367).
- drm: i915: Mark i915_hpd_poll_init_work as static (bsc#1014120).
- drm: i915: Prevent PPS stealing from a normal DP port on VLV/CHV (bsc#1019061).
- drm: i915: Prevent enabling hpd polling in late suspend (bsc#1014120).
- drm: i915: Restore PPS HW state from the encoder resume hook (bsc#1019061).
- drm: i915: Workaround for DP DPMS D3 on Dell monitor (bsc#1019061).
- drm: vc4: Fix an integer overflow in temporary allocation layout (bsc#1021294).
- drm: vc4: Return -EINVAL on the overflow checks failing (bsc#1021294).
- drm: virtio-gpu: get the fb from the plane state for atomic updates (bsc#1023101).
- edac: xgene: Fix spelling mistake in error messages (bsc#1019351).
- efi: libstub: Move Graphics Output Protocol handling to generic code (bnc#974215).
- fbcon: Fix vc attr at deinit (bsc#1000619).
- fs: nfs: avoid including 'mountproto=' with no protocol in /proc/mounts (bsc#1019260).
- gpio: xgene: make explicitly non-modular (bsc#1019351).
- hv: acquire vmbus_connection.channel_mutex in vmbus_free_channels().
- hv: change clockevents unbind tactics.
- hv: do not reset hv_context.tsc_page on crash.
- hv_netvsc: Add handler for physical link speed change.
- hv_netvsc: Add query for initial physical link speed.
- hv_netvsc: Implement batching of receive completions.
- hv_netvsc: Revert 'make inline functions static'.
- hv_netvsc: Revert 'report vmbus name in ethtool'.
- hv_netvsc: add ethtool statistics for tx packet issues.
- hv_netvsc: count multicast packets received.
- hv_netvsc: dev hold/put reference to VF.
- hv_netvsc: fix a race between netvsc_send() and netvsc_init_buf().
- hv_netvsc: fix comments.
- hv_netvsc: fix rtnl locking in callback.
- hv_netvsc: improve VF device matching.
- hv_netvsc: init completion during alloc.
- hv_netvsc: make RSS hash key static.
- hv_netvsc: make device_remove void.
- hv_netvsc: make inline functions static.
- hv_netvsc: make netvsc_destroy_buf void.
- hv_netvsc: make variable local.
- hv_netvsc: rearrange start_xmit.
- hv_netvsc: refactor completion function.
- hv_netvsc: remove VF in flight counters.
- hv_netvsc: remove excessive logging on MTU change.
- hv_netvsc: report vmbus name in ethtool.
- hv_netvsc: simplify callback event code.
- hv_netvsc: style cleanups.
- hv_netvsc: use ARRAY_SIZE() for NDIS versions.
- hv_netvsc: use RCU to protect vf_netdev.
- hv_netvsc: use consume_skb.
- hv_netvsc: use kcalloc.
- hyperv: Fix spelling of HV_UNKOWN.
- i2c: designware-baytrail: Disallow the CPU to enter C6 or C7 while holding the punit semaphore (bsc#1011913).
- i2c: designware: Implement support for SMBus block read and write (bsc#1019351).
- i2c: designware: fix wrong Tx/Rx FIFO for ACPI (bsc#1019351).
- i2c: xgene: Fix missing code of DTB support (bsc#1019351).
- i40e: Be much more verbose about what we can and cannot offload (bsc#985561).
- ibmveth: calculate gso_segs for large packets (bsc#1019148).
- ibmveth: check return of skb_linearize in ibmveth_start_xmit (bsc#1019148).
- ibmveth: consolidate kmalloc of array, memset 0 to kcalloc (bsc#1019148).
- ibmveth: set correct gso_size and gso_type (bsc#1019148).
- igb: Workaround for igb i210 firmware issue (bsc#1009911).
- igb: add i211 to i210 PHY workaround (bsc#1009911).
- input: i8042: Trust firmware a bit more when probing on X86 (bsc#1011660).
- intel_idle: Add KBL support (bsc#1016884).
- ip6_gre: fix ip6gre_err() invalid reads (CVE-2017-5897, bsc#1023762).
- ipc: msg, make msgrcv work with LONG_MIN (bnc#1005918).
- iwlwifi: Expose the default fallback ucode API to module info (boo#1021082, boo#1023884).
- kgraft: iscsi-target: Do not block kGraft in iscsi_np kthread (bsc#1010612).
- kgraft: xen: Do not block kGraft in xenbus kthread (bsc#1017410).
- libnvdimm: pfn: fix align attribute (bsc#1023175).
- mailbox: xgene-slimpro: Fix wrong test for devm_kzalloc (bsc#1019351).
- md linear: fix a race between linear_add() and linear_congested() (bsc#1018446).
- md-cluster: convert the completion to wait queue.
- md-cluster: protect md_find_rdev_nr_rcu with rcu lock.
- md: ensure md devices are freed before module is unloaded (bsc#1022304).
- md: fix refcount problem on mddev when stopping array (bsc#1022304).
- misc: genwqe: ensure zero initialization.
- mm: do not loop on GFP_REPEAT high order requests if there is no reclaim progress (bnc#1013000).
- mm: memcg: do not retry precharge charges (bnc#1022559).
- mm: page_alloc: fix check for NULL preferred_zone (bnc#971975 VM performance -- page allocator).
- mm: page_alloc: fix fast-path race with cpuset update or removal (bnc#971975 VM performance -- page allocator).
- mm: page_alloc: fix premature OOM when racing with cpuset mems update (bnc#971975 VM performance -- page allocator).
- mm: page_alloc: keep pcp count and list contents in sync if struct page is corrupted (bnc#971975 VM performance -- page allocator).
- mm: page_alloc: move cpuset seqcount checking to slowpath (bnc#971975 VM performance -- page allocator).
- mmc: sdhci-of-arasan: Remove no-hispd and no-cmd23 quirks for sdhci-arasan4.9a (bsc#1019351).
- mwifiex: add missing check for PCIe8997 chipset (bsc#1018813).
- mwifiex: fix IBSS data path issue (bsc#1018813).
- mwifiex: fix PCIe register information for 8997 chipset (bsc#1018813).
- net: af_iucv: do not use paged skbs for TX on HiperSockets (bnc#1020945, LTC#150566).
- net: ethernet: apm: xgene: use phydev from struct net_device (bsc#1019351).
- net: ethtool: Initialize buffer when querying device channel settings (bsc#969479).
- net: hyperv: avoid uninitialized variable.
- net: implement netif_cond_dbg macro (bsc#1019168).
- net: remove useless memset's in drivers get_stats64 (bsc#1019351).
- net: xgene: avoid bogus maybe-uninitialized warning (bsc#1019351).
- net: xgene: fix backward compatibility fix (bsc#1019351).
- net: xgene: fix error handling during reset (bsc#1019351).
- net: xgene: move xgene_cle_ptree_ewdn data off stack (bsc#1019351).
- netvsc: Remove mistaken udp.h inclusion.
- netvsc: add rcu_read locking to netvsc callback.
- netvsc: fix checksum on UDP IPV6.
- netvsc: reduce maximum GSO size.
- nfit: fail DSMs that return non-zero status by default (bsc#1023175).
- nfsv4: Cap the transport reconnection timer at 1/2 lease period (bsc#1014410).
- nfsv4: Cleanup the setting of the nfs4 lease period (bsc#1014410).
- nvdimm: kabi protect nd_cmd_out_size() (bsc#1023175).
- nvme: apply DELAY_BEFORE_CHK_RDY quirk at probe time too (bsc#1020685).
- ocfs2: fix deadlock on mmapped page in ocfs2_write_begin_nolock() (bnc#921494).
- pci: Add devm_request_pci_bus_resources() (bsc#1019351).
- pci: generic: Fix pci_remap_iospace() failure path (bsc#1019630).
- pci: hv: Allocate physically contiguous hypercall params buffer.
- pci: hv: Fix hv_pci_remove() for hot-remove.
- pci: hv: Handle hv_pci_generic_compl() error case.
- pci: hv: Handle vmbus_sendpacket() failure in hv_compose_msi_msg().
- pci: hv: Make unnecessarily global IRQ masking functions static.
- pci: hv: Remove the unused 'wrk' in struct hv_pcibus_device.
- pci: hv: Use list_move_tail() instead of list_del() + list_add_tail().
- pci: hv: Use pci_function_description in struct definitions.
- pci: hv: Use the correct buffer size in new_pcichild_device().
- pci: hv: Use zero-length array in struct pci_packet.
- pci: include header file (bsc#964944).
- pci: xgene: Add local struct device pointers (bsc#1019351).
- pci: xgene: Add register accessors (bsc#1019351).
- pci: xgene: Free bridge resource list on failure (bsc#1019351).
- pci: xgene: Make explicitly non-modular (bsc#1019351).
- pci: xgene: Pass struct xgene_pcie_port to setup functions (bsc#1019351).
- pci: xgene: Remove unused platform data (bsc#1019351).
- pci: xgene: Request host bridge window resources (bsc#1019351).
- perf: xgene: Remove bogus IS_ERR() check (bsc#1019351).
- phy: xgene: rename 'enum phy_mode' to 'enum xgene_phy_mode' (bsc#1019351).
- power: reset: xgene-reboot: Unmap region obtained by of_iomap (bsc#1019351).
- powerpc: fadump: Fix the race in crash_fadump() (bsc#1022971).
- qeth: check not more than 16 SBALEs on the completion queue (bnc#1009718, LTC#148203).
- raid1: Fix a regression observed during the rebuilding of degraded MDRAID VDs (bsc#1020048).
- raid1: ignore discard error (bsc#1017164).
- reiserfs: fix race in prealloc discard (bsc#987576).
- rpm: kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)
- rpm: kernel-binary.spec.in: Fix installation of /etc/uefi/certs (bsc#1019594)
- rtc: cmos: Clear ACPI-driven alarms upon resume (bsc#1022429).
- rtc: cmos: Do not enable interrupts in the middle of the interrupt handler (bsc#1022429).
- rtc: cmos: Restore alarm after resume (bsc#1022429).
- rtc: cmos: avoid unused function warning (bsc#1022429).
- s390: Fix invalid domain response handling (bnc#1009718).
- s390: cpuinfo: show maximum thread id (bnc#1009718, LTC#148580).
- s390: sysinfo: show partition extended name and UUID if available (bnc#1009718, LTC#150160).
- s390: time: LPAR offset handling (bnc#1009718, LTC#146920).
- s390: time: move PTFF definitions (bnc#1009718, LTC#146920).
- sched: Allow hotplug notifiers to be setup early (bnc#1022476).
- sched: Make wake_up_nohz_cpu() handle CPUs going offline (bnc#1022476).
- sched: core, x86/topology: Fix NUMA in package topology bug (bnc#1022476).
- sched: core: Fix incorrect utilization accounting when switching to fair class (bnc#1022476).
- sched: core: Fix set_user_nice() (bnc#1022476).
- sched: cputime: Add steal time support to full dynticks CPU time accounting (bnc#1022476).
- sched: cputime: Fix prev steal time accouting during CPU hotplug (bnc#1022476).
- sched: deadline: Always calculate end of period on sched_yield() (bnc#1022476).
- sched: deadline: Fix a bug in dl_overflow() (bnc#1022476).
- sched: deadline: Fix lock pinning warning during CPU hotplug (bnc#1022476).
- sched: deadline: Fix wrap-around in DL heap (bnc#1022476).
- sched: fair: Avoid using decay_load_missed() with a negative value (bnc#1022476).
- sched: fair: Fix fixed point arithmetic width for shares and effective load (bnc#1022476).
- sched: fair: Fix load_above_capacity fixed point arithmetic width (bnc#1022476).
- sched: fair: Fix min_vruntime tracking (bnc#1022476).
- sched: fair: Fix the wrong throttled clock time for cfs_rq_clock_task() (bnc#1022476).
- sched: fair: Improve PELT stuff some more (bnc#1022476).
- sched: rt, sched/dl: Do not push if task's scheduling class was changed (bnc#1022476).
- sched: rt: Fix PI handling vs. sched_setscheduler() (bnc#1022476).
- sched: rt: Kick RT bandwidth timer immediately on start up (bnc#1022476).
- scsi: Add 'AIX VDASD' to blacklist (bsc#1006469).
- scsi: Modify HITACHI OPEN-V blacklist entry (bsc#1006469).
- scsi: bfa: Increase requested firmware version to 3.2.5.1 (bsc#1013273).
- scsi: storvsc: Payload buffer incorrectly sized for 32 bit kernels.
- scsi_dh_alua: uninitialized variable in alua_rtpg() (bsc#1012910).
- sctp: avoid BUG_ON on sctp_wait_for_sndbuf (CVE-2017-5986, bsc#1025235).
- sd: always scan VPD pages if thin provisioning is enabled (bsc#1013792).
- serial: 8250: Integrate Fintek into 8250_base (boo#1016979). Update config files to change CONFIG_SERIAL_8250_FINTEK to boolean accordingly, too. Also, the corresponding entry got removed from supported.conf.
- serial: 8250_fintek: fix the mismatched IRQ mode (boo#1009546).
- serial: Update metadata for serial fixes (bsc#1013001)
- ses: Fix SAS device detection in enclosure (bsc#1016403).
- sfc: reduce severity of PIO buffer alloc failures (bsc#1019168).
- sfc: refactor debug-or-warnings printks (bsc#1019168).
- sunrpc: Fix reconnection timeouts (bsc#1014410).
- sunrpc: Limit the reconnect backoff timer to the max RPC message timeout (bsc#1014410).
- supported.conf: Support Marvell WiFi/BT SDIO and pinctrl-cherrytrail (bsc#1018813)
- supported.conf: delete xilinx/ll_temac (bsc#1011602)
- target: add XCOPY target/segment desc sense codes (bsc#991273).
- target: bounds check XCOPY segment descriptor list (bsc#991273).
- target: bounds check XCOPY total descriptor list length (bsc#991273).
- target: check XCOPY segment descriptor CSCD IDs (bsc#1017170).
- target: check for XCOPY parameter truncation (bsc#991273).
- target: return UNSUPPORTED TARGET/SEGMENT DESC TYPE CODE sense (bsc#991273).
- target: simplify XCOPY wwn-&gt;se_dev lookup helper (bsc#991273).
- target: support XCOPY requests without parameters (bsc#991273).
- target: use XCOPY TOO MANY TARGET DESCRIPTORS sense (bsc#991273).
- target: use XCOPY segment descriptor CSCD IDs (bsc#1017170).
- tools: hv: Enable network manager for bonding scripts on RHEL.
- tools: hv: fix a compile warning in snprintf.
- tools: hv: kvp: configurable external scripts path.
- tools: hv: kvp: ensure kvp device fd is closed on exec.
- tools: hv: remove unnecessary header files and netlink related code.
- tools: hv: remove unnecessary link flag.
- tty: n_hdlc, fix lockdep false positive (bnc#1015840).
- uvcvideo: uvc_scan_fallback() for webcams with broken chain (bsc#1021474).
- vmbus: make sysfs names consistent with PCI.
- x86: MCE: Dump MCE to dmesg if no consumers (bsc#1013994).
- x86: hyperv: Handle unknown NMIs on one CPU when unknown_nmi_panic.
- xfs: don't allow di_size with high bit set (bsc#1024234).
- xfs: exclude never-released buffers from buftarg I/O accounting (bsc#1024508).
- xfs: fix broken multi-fsb buffer logging (bsc#1024081).
- xfs: fix buffer overflow dm_get_dirattrs/dm_get_dirattrs2 (bsc#989056).
- xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888).
- xfs: track and serialize in-flight async buffers against unmount (bsc#1024508).
- xfs: track and serialize in-flight async buffers against unmount - kABI (bsc#1024508).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-28"/>
	<updated date="2017-02-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000092">SUSE bug 1000092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000619">SUSE bug 1000619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003077">SUSE bug 1003077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005918">SUSE bug 1005918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006469">SUSE bug 1006469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006472">SUSE bug 1006472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007729">SUSE bug 1007729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008742">SUSE bug 1008742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009546">SUSE bug 1009546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009674">SUSE bug 1009674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009718">SUSE bug 1009718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009911">SUSE bug 1009911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010612">SUSE bug 1010612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010690">SUSE bug 1010690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010933">SUSE bug 1010933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011176">SUSE bug 1011176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011602">SUSE bug 1011602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011660">SUSE bug 1011660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011913">SUSE bug 1011913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012422">SUSE bug 1012422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012829">SUSE bug 1012829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012910">SUSE bug 1012910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013000">SUSE bug 1013000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013001">SUSE bug 1013001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013273">SUSE bug 1013273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013540">SUSE bug 1013540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013792">SUSE bug 1013792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013994">SUSE bug 1013994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014120">SUSE bug 1014120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014410">SUSE bug 1014410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015038">SUSE bug 1015038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015367">SUSE bug 1015367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015840">SUSE bug 1015840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016250">SUSE bug 1016250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016403">SUSE bug 1016403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016517">SUSE bug 1016517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016884">SUSE bug 1016884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016979">SUSE bug 1016979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017164">SUSE bug 1017164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017170">SUSE bug 1017170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017410">SUSE bug 1017410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018100">SUSE bug 1018100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018316">SUSE bug 1018316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018358">SUSE bug 1018358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018446">SUSE bug 1018446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018813">SUSE bug 1018813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018913">SUSE bug 1018913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019061">SUSE bug 1019061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019148">SUSE bug 1019148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019168">SUSE bug 1019168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019260">SUSE bug 1019260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019351">SUSE bug 1019351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019594">SUSE bug 1019594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019630">SUSE bug 1019630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019631">SUSE bug 1019631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019784">SUSE bug 1019784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019851">SUSE bug 1019851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020048">SUSE bug 1020048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020214">SUSE bug 1020214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020488">SUSE bug 1020488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020602">SUSE bug 1020602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020685">SUSE bug 1020685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020817">SUSE bug 1020817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020945">SUSE bug 1020945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020975">SUSE bug 1020975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021082">SUSE bug 1021082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021248">SUSE bug 1021248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021251">SUSE bug 1021251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021258">SUSE bug 1021258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021260">SUSE bug 1021260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021294">SUSE bug 1021294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021455">SUSE bug 1021455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021474">SUSE bug 1021474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022304">SUSE bug 1022304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022429">SUSE bug 1022429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022476">SUSE bug 1022476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022547">SUSE bug 1022547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022559">SUSE bug 1022559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022971">SUSE bug 1022971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023101">SUSE bug 1023101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023175">SUSE bug 1023175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023762">SUSE bug 1023762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023884">SUSE bug 1023884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023888">SUSE bug 1023888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024081">SUSE bug 1024081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024234">SUSE bug 1024234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024508">SUSE bug 1024508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024938">SUSE bug 1024938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025235">SUSE bug 1025235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921494">SUSE bug 921494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959709">SUSE bug 959709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964944">SUSE bug 964944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969476">SUSE bug 969476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969477">SUSE bug 969477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969479">SUSE bug 969479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971975">SUSE bug 971975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974215">SUSE bug 974215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981709">SUSE bug 981709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982783">SUSE bug 982783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985561">SUSE bug 985561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987192">SUSE bug 987192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987576">SUSE bug 987576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989056">SUSE bug 989056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991273">SUSE bug 991273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998106">SUSE bug 998106</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8709/">CVE-2015-8709</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7117/">CVE-2016-7117</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9806/">CVE-2016-9806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2583/">CVE-2017-2583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2584/">CVE-2017-2584</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5551/">CVE-2017-5551</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5576/">CVE-2017-5576</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5577/">CVE-2017-5577</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5897/">CVE-2017-5897</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5970/">CVE-2017-5970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5986/">CVE-2017-5986</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518467" comment="kernel-default-4.4.49-92.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518468" comment="kernel-default-devel-4.4.49-92.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518469" comment="kernel-default-extra-4.4.49-92.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518470" comment="kernel-devel-4.4.49-92.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518471" comment="kernel-macros-4.4.49-92.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518472" comment="kernel-source-4.4.49-92.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518473" comment="kernel-syms-4.4.49-92.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78009" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1024130" ref_url="https://bugzilla.suse.com/1024130" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3135" ref_url="https://www.suse.com/security/cve/CVE-2017-3135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002674.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- Fixed a possible denial of service vulnerability (affected only
  configurations using both DNS64 and RPZ, CVE-2017-3135, bsc#1024130)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-02"/>
	<updated date="2017-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3135/">CVE-2017-3135</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517151" comment="bind-libs-9.9.9P1-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517152" comment="bind-libs-32bit-9.9.9P1-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517153" comment="bind-utils-9.9.9P1-56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78010" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl098 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1000677" ref_url="https://bugzilla.suse.com/1000677" source="BUGZILLA"/>
		<reference ref_id="1001912" ref_url="https://bugzilla.suse.com/1001912" source="BUGZILLA"/>
		<reference ref_id="1004499" ref_url="https://bugzilla.suse.com/1004499" source="BUGZILLA"/>
		<reference ref_id="1005878" ref_url="https://bugzilla.suse.com/1005878" source="BUGZILLA"/>
		<reference ref_id="1019334" ref_url="https://bugzilla.suse.com/1019334" source="BUGZILLA"/>
		<reference ref_id="1021641" ref_url="https://bugzilla.suse.com/1021641" source="BUGZILLA"/>
		<reference ref_id="984663" ref_url="https://bugzilla.suse.com/984663" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056/" source="CVE"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002678.html" source="SUSE-SU"/>
		<description>

This update for compat-openssl098 fixes the following issues contained in the
OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)

Security issues fixed:
- CVE-2016-7056: A local ECSDA P-256 timing attack that might have allowed key recovery was fixed (bsc#1019334)
- CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)
- degrade 3DES to MEDIUM in SSL2 (bsc#1001912)
- CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)

Bugs fixed:
- fix crash in openssl speed (bsc#1000677)
- don't attempt session resumption if no ticket is present and session
  ID length is zero (bsc#984663)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-03"/>
	<updated date="2017-03-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000677">SUSE bug 1000677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001912">SUSE bug 1001912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004499">SUSE bug 1004499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005878">SUSE bug 1005878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019334">SUSE bug 1019334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984663">SUSE bug 984663</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517154" comment="libopenssl0_9_8-0.9.8j-105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517155" comment="libopenssl0_9_8-32bit-0.9.8j-105.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78011" version="1" class="patch">
	<metadata>
		<title>Security update for libquicktime (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1022805" ref_url="https://bugzilla.suse.com/1022805" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2399" ref_url="https://www.suse.com/security/cve/CVE-2016-2399/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002681.html" source="SUSE-SU"/>
		<description>

This update for libquicktime fixes the following issues:

- A crafted MP4 file could have caused libquicktime to crash or lead to
  undefined behaviour (bsc#1022805, CVE-2016-2399)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-06"/>
	<updated date="2017-03-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022805">SUSE bug 1022805</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2399/">CVE-2016-2399</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517159" comment="libquicktime0-1.2.4-10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78012" version="1" class="patch">
	<metadata>
		<title>Security update for tigervnc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1019274" ref_url="https://bugzilla.suse.com/1019274" source="BUGZILLA"/>
		<reference ref_id="1023012" ref_url="https://bugzilla.suse.com/1023012" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10207" ref_url="https://www.suse.com/security/cve/CVE-2016-10207/" source="CVE"/>
		<reference ref_id="CVE-2016-9941" ref_url="https://www.suse.com/security/cve/CVE-2016-9941/" source="CVE"/>
		<reference ref_id="CVE-2016-9942" ref_url="https://www.suse.com/security/cve/CVE-2016-9942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002682.html" source="SUSE-SU"/>
		<description>

This update for tigervnc provides the following fixes:

- Prevent malicious server from crashing a server via a buffer overflow, a similar flaw as the LibVNCServer issues CVE-2016-9941 and CVE-2016-9942. (bsc#1019274)
- CVE-2016-10207: Prevent potential crash due to insufficient clean-up after failure to establish TLS
  connection. (bsc#1023012)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-07"/>
	<updated date="2017-03-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1019274">SUSE bug 1019274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023012">SUSE bug 1023012</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10207/">CVE-2016-10207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9941/">CVE-2016-9941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9942/">CVE-2016-9942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518474" comment="libXvnc1-1.6.0-16.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518475" comment="tigervnc-1.6.0-16.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518476" comment="xorg-x11-Xvnc-1.6.0-16.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78013" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1014702" ref_url="https://bugzilla.suse.com/1014702" source="BUGZILLA"/>
		<reference ref_id="1015169" ref_url="https://bugzilla.suse.com/1015169" source="BUGZILLA"/>
		<reference ref_id="1016779" ref_url="https://bugzilla.suse.com/1016779" source="BUGZILLA"/>
		<reference ref_id="1017081" ref_url="https://bugzilla.suse.com/1017081" source="BUGZILLA"/>
		<reference ref_id="1017084" ref_url="https://bugzilla.suse.com/1017084" source="BUGZILLA"/>
		<reference ref_id="1020491" ref_url="https://bugzilla.suse.com/1020491" source="BUGZILLA"/>
		<reference ref_id="1020589" ref_url="https://bugzilla.suse.com/1020589" source="BUGZILLA"/>
		<reference ref_id="1020928" ref_url="https://bugzilla.suse.com/1020928" source="BUGZILLA"/>
		<reference ref_id="1021129" ref_url="https://bugzilla.suse.com/1021129" source="BUGZILLA"/>
		<reference ref_id="1021195" ref_url="https://bugzilla.suse.com/1021195" source="BUGZILLA"/>
		<reference ref_id="1021481" ref_url="https://bugzilla.suse.com/1021481" source="BUGZILLA"/>
		<reference ref_id="1022541" ref_url="https://bugzilla.suse.com/1022541" source="BUGZILLA"/>
		<reference ref_id="1023004" ref_url="https://bugzilla.suse.com/1023004" source="BUGZILLA"/>
		<reference ref_id="1023053" ref_url="https://bugzilla.suse.com/1023053" source="BUGZILLA"/>
		<reference ref_id="1023073" ref_url="https://bugzilla.suse.com/1023073" source="BUGZILLA"/>
		<reference ref_id="1023907" ref_url="https://bugzilla.suse.com/1023907" source="BUGZILLA"/>
		<reference ref_id="1024972" ref_url="https://bugzilla.suse.com/1024972" source="BUGZILLA"/>
		<reference ref_id="1026583" ref_url="https://bugzilla.suse.com/1026583" source="BUGZILLA"/>
		<reference ref_id="977027" ref_url="https://bugzilla.suse.com/977027" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10028" ref_url="https://www.suse.com/security/cve/CVE-2016-10028/" source="CVE"/>
		<reference ref_id="CVE-2016-10029" ref_url="https://www.suse.com/security/cve/CVE-2016-10029/" source="CVE"/>
		<reference ref_id="CVE-2016-10155" ref_url="https://www.suse.com/security/cve/CVE-2016-10155/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="CVE-2017-5525" ref_url="https://www.suse.com/security/cve/CVE-2017-5525/" source="CVE"/>
		<reference ref_id="CVE-2017-5526" ref_url="https://www.suse.com/security/cve/CVE-2017-5526/" source="CVE"/>
		<reference ref_id="CVE-2017-5552" ref_url="https://www.suse.com/security/cve/CVE-2017-5552/" source="CVE"/>
		<reference ref_id="CVE-2017-5578" ref_url="https://www.suse.com/security/cve/CVE-2017-5578/" source="CVE"/>
		<reference ref_id="CVE-2017-5667" ref_url="https://www.suse.com/security/cve/CVE-2017-5667/" source="CVE"/>
		<reference ref_id="CVE-2017-5856" ref_url="https://www.suse.com/security/cve/CVE-2017-5856/" source="CVE"/>
		<reference ref_id="CVE-2017-5857" ref_url="https://www.suse.com/security/cve/CVE-2017-5857/" source="CVE"/>
		<reference ref_id="CVE-2017-5898" ref_url="https://www.suse.com/security/cve/CVE-2017-5898/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00005.html" source="SUSE-SU"/>
		<description>

This update for qemu fixes several issues.

These security issues were fixed:

- CVE-2017-5898: The CCID Card device emulator support was vulnerable to an integer overflow flaw allowing a privileged user to crash the Qemu process on the host resulting in DoS (bsc#1023907).
- CVE-2017-5857: The Virtio GPU Device emulator support was vulnerable to a host memory leakage issue allowing a guest user to leak host memory resulting in DoS (bsc#1023073).
- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024972)
- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004)
- CVE-2017-5856: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a memory leakage issue allowing a privileged user to leak host memory resulting in DoS (bsc#1023053)
- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1014702)
- CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1014702)
- CVE-2016-10029: The Virtio GPU Device emulator support was vulnerable to an OOB read issue allowing a guest user to crash the Qemu process instance resulting in Dos (bsc#1017081).
- CVE-2016-10028: The Virtio GPU Device emulator support was vulnerable to an out of bounds memory access issue allowing a guest user to crash the Qemu process instance on a host, resulting in DoS (bsc#1017084).
- CVE-2016-10155: The virtual hardware watchdog 'wdt_i6300esb' was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1021129)
- CVE-2017-5552: The Virtio GPU Device emulator support was vulnerable to a memory leakage issue allowing a guest user to leak host memory resulting in DoS (bsc#1021195).
- CVE-2017-5578: The Virtio GPU Device emulator support was vulnerable to a memory leakage issue allowing a guest user to leak host memory resulting in DoS (bsc#1021481).
- CVE-2017-5526: The ES1370 audio device emulation support was vulnerable to a memory leakage issue allowing a privileged user inside the guest to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1020589).
- CVE-2017-5525: The ac97 audio device emulation support was vulnerable to a memory leakage issue allowing a privileged user inside the guest to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1020491).
- CVE-2017-5667: The SDHCI device emulation support was vulnerable to an OOB heap access issue allowing a privileged user inside the guest to crash the Qemu process resulting in DoS or potentially execute arbitrary code with privileges of the Qemu process on the host (bsc#1022541).
- CVE-2017-5898: The CCID Card device emulator support was vulnerable to an integer overflow allowing a privileged user inside the guest to crash the Qemu process resulting in DoS (bnc#1023907)

These non-security issues were fixed:

- Fix name of s390x specific sysctl configuration file to end with .conf (bsc#1026583)
- XHCI fixes (bsc#977027)
- Fixed rare race during s390x guest reboot
- Fixed various inaccuracies in cirrus vga device emulation
- Fixed cause of infrequent migration failures from bad virtio device state (bsc#1020928)
- Fixed graphical update errors introduced by previous security fix (bsc#1016779)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-07"/>
	<updated date="2017-03-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1014702">SUSE bug 1014702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015169">SUSE bug 1015169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016779">SUSE bug 1016779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017081">SUSE bug 1017081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017084">SUSE bug 1017084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020491">SUSE bug 1020491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020589">SUSE bug 1020589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020928">SUSE bug 1020928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021129">SUSE bug 1021129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021195">SUSE bug 1021195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021481">SUSE bug 1021481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022541">SUSE bug 1022541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023004">SUSE bug 1023004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023053">SUSE bug 1023053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023073">SUSE bug 1023073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023907">SUSE bug 1023907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024972">SUSE bug 1024972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026583">SUSE bug 1026583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977027">SUSE bug 977027</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10028/">CVE-2016-10028</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10029/">CVE-2016-10029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10155/">CVE-2016-10155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5525/">CVE-2017-5525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5526/">CVE-2017-5526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5552/">CVE-2017-5552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5578/">CVE-2017-5578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5667/">CVE-2017-5667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5856/">CVE-2017-5856</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5857/">CVE-2017-5857</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5898/">CVE-2017-5898</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518477" comment="qemu-2.6.2-41.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518478" comment="qemu-block-curl-2.6.2-41.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518479" comment="qemu-ipxe-1.0.0-41.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518480" comment="qemu-kvm-2.6.2-41.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518481" comment="qemu-seabios-1.9.1-41.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518482" comment="qemu-sgabios-8-41.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518483" comment="qemu-tools-2.6.2-41.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518484" comment="qemu-vgabios-1.9.1-41.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518485" comment="qemu-x86-2.6.2-41.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78014" version="1" class="patch">
	<metadata>
		<title>Recommended update for dbus-1 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1025950" ref_url="https://bugzilla.suse.com/1025950" source="BUGZILLA"/>
		<reference ref_id="1025951" ref_url="https://bugzilla.suse.com/1025951" source="BUGZILLA"/>
		<reference ref_id="974092" ref_url="https://bugzilla.suse.com/974092" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:0695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002694.html" source="SUSE-SU"/>
		<description>

This update for dbus-1 fixes the following issues:

Security issues fixed:
- Symlink attack in nonce-tcp transport. (bsc#1025950)
- Symlink attack in unit tests. (bsc#1025951)

Bugfixes:
- Remove sysvinit script, not used under systemd. (bsc#974092)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-15"/>
	<updated date="2017-03-15"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1025950">SUSE bug 1025950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025951">SUSE bug 1025951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974092">SUSE bug 974092</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517161" comment="dbus-1-1.8.22-24.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517162" comment="dbus-1-x11-1.8.22-24.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517163" comment="libdbus-1-3-1.8.22-24.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517164" comment="libdbus-1-3-32bit-1.8.22-24.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78015" version="1" class="patch">
	<metadata>
		<title>Security update for gegl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="789835" ref_url="https://bugzilla.suse.com/789835" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4433" ref_url="https://www.suse.com/security/cve/CVE-2012-4433/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002693.html" source="SUSE-SU"/>
		<description>

This update for gegl fixes the following issues:

Security issue fixed:
- Fix CVE-2012-4433: Fix buffer overflow in and add plausibility checks to ppm-load op (bsc#789835).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-15"/>
	<updated date="2017-03-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/789835">SUSE bug 789835</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4433/">CVE-2012-4433</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518486" comment="gegl-0_2-0.2.0-14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518487" comment="gegl-0_2-lang-0.2.0-14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518488" comment="libgegl-0_2-0-0.2.0-14.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78016" version="1" class="patch">
	<metadata>
		<title>Security update for open-vm-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1006796" ref_url="https://bugzilla.suse.com/1006796" source="BUGZILLA"/>
		<reference ref_id="1007600" ref_url="https://bugzilla.suse.com/1007600" source="BUGZILLA"/>
		<reference ref_id="1011057" ref_url="https://bugzilla.suse.com/1011057" source="BUGZILLA"/>
		<reference ref_id="1013496" ref_url="https://bugzilla.suse.com/1013496" source="BUGZILLA"/>
		<reference ref_id="1024200" ref_url="https://bugzilla.suse.com/1024200" source="BUGZILLA"/>
		<reference ref_id="971031" ref_url="https://bugzilla.suse.com/971031" source="BUGZILLA"/>
		<reference ref_id="994598" ref_url="https://bugzilla.suse.com/994598" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5191" ref_url="https://www.suse.com/security/cve/CVE-2015-5191/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002697.html" source="SUSE-SU"/>
		<description>

This update for open-vm-tools to 10.1.0 stable brings features, fixes bugs
and security issues:

- New vmware-namespace-cmd command line utility
- GTK3 support
- Common Agent Framework (CAF)
- Guest authentication with xmlsec1
- Sub-command to push updated network information to the host on demand
- Fix for quiesced snapshot failure leaving guest file system quiesced (bsc#1006796)
- Fix for CVE-2015-5191 (bsc#1007600)
- Report SLES for SAP 12 guest OS as SLES 12 (bsc#1013496)
- Add udev rule to increase VMware virtual disk timeout values (bsc#994598) 
- Fix vmtoolsd init script to run vmtoolsd in background (bsc#971031)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-15"/>
	<updated date="2017-03-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1006796">SUSE bug 1006796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007600">SUSE bug 1007600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011057">SUSE bug 1011057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013496">SUSE bug 1013496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024200">SUSE bug 1024200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971031">SUSE bug 971031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994598">SUSE bug 994598</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5191/">CVE-2015-5191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518489" comment="libvmtools0-10.1.0-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518490" comment="open-vm-tools-10.1.0-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518491" comment="open-vm-tools-desktop-10.1.0-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78017" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1028391" ref_url="https://bugzilla.suse.com/1028391" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5398" ref_url="https://www.suse.com/security/cve/CVE-2017-5398/" source="CVE"/>
		<reference ref_id="CVE-2017-5400" ref_url="https://www.suse.com/security/cve/CVE-2017-5400/" source="CVE"/>
		<reference ref_id="CVE-2017-5401" ref_url="https://www.suse.com/security/cve/CVE-2017-5401/" source="CVE"/>
		<reference ref_id="CVE-2017-5402" ref_url="https://www.suse.com/security/cve/CVE-2017-5402/" source="CVE"/>
		<reference ref_id="CVE-2017-5404" ref_url="https://www.suse.com/security/cve/CVE-2017-5404/" source="CVE"/>
		<reference ref_id="CVE-2017-5405" ref_url="https://www.suse.com/security/cve/CVE-2017-5405/" source="CVE"/>
		<reference ref_id="CVE-2017-5407" ref_url="https://www.suse.com/security/cve/CVE-2017-5407/" source="CVE"/>
		<reference ref_id="CVE-2017-5408" ref_url="https://www.suse.com/security/cve/CVE-2017-5408/" source="CVE"/>
		<reference ref_id="CVE-2017-5409" ref_url="https://www.suse.com/security/cve/CVE-2017-5409/" source="CVE"/>
		<reference ref_id="CVE-2017-5410" ref_url="https://www.suse.com/security/cve/CVE-2017-5410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00012.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox to ESR 45.8 fixes the following issues:

Security issues fixed (bsc#1028391):
- CVE-2017-5402: Use-after-free working with events in FontFace objects
- CVE-2017-5410: Memory corruption during JavaScript garbage collection incremental sweeping
- CVE-2017-5400: asm.js JIT-spray bypass of ASLR and DEP
- CVE-2017-5401: Memory Corruption when handling ErrorResult
- CVE-2017-5407: Pixel and history stealing via floating-point timing side channel with SVG filters
- CVE-2017-5404: Use-after-free working with ranges in selections
- CVE-2017-5405: FTP response codes can cause use of uninitialized values for ports
- CVE-2017-5408: Cross-origin reading of video captions in violation of CORS
- CVE-2017-5409: File deletion via callback parameter in Mozilla Windows Updater and Maintenance Service
- CVE-2017-5398: Memory safety bugs fixed in Firefox 52 and Firefox ESR 45.8
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5398/">CVE-2017-5398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5400/">CVE-2017-5400</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5401/">CVE-2017-5401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5402/">CVE-2017-5402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5404/">CVE-2017-5404</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5405/">CVE-2017-5405</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5407/">CVE-2017-5407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5408/">CVE-2017-5408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5409/">CVE-2017-5409</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5410/">CVE-2017-5410</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517173" comment="MozillaFirefox-45.8.0esr-102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517174" comment="MozillaFirefox-translations-45.8.0esr-102.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78018" version="1" class="patch">
	<metadata>
		<title>Security update for sane-backends (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1027197" ref_url="https://bugzilla.suse.com/1027197" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6318" ref_url="https://www.suse.com/security/cve/CVE-2017-6318/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002700.html" source="SUSE-SU"/>
		<description>

This update for sane-backends fixes the following issues:

- saned could have leaked uninitialized memory back to its requesters for some
  opcodes, allowing for information disclosure of saned memory
  (CVE-2017-6318, bsc#1027197).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027197">SUSE bug 1027197</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6318/">CVE-2017-6318</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517175" comment="sane-backends-1.0.24-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517176" comment="sane-backends-32bit-1.0.24-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517177" comment="sane-backends-autoconfig-1.0.24-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78019" version="1" class="patch">
	<metadata>
		<title>Security update for rrdtool (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="828003" ref_url="https://bugzilla.suse.com/828003" source="BUGZILLA"/>
		<reference ref_id="967671" ref_url="https://bugzilla.suse.com/967671" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2131" ref_url="https://www.suse.com/security/cve/CVE-2013-2131/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002549.html" source="SUSE-SU"/>
		<description>

This update for rrdtool provides the following fixes:

- CVE-2013-2131: Enhance imginfo format validation checks to prevent crashes. (bsc#828003)
- Add rrdtool-cached sub-package to SLE 12-SP1. (bsc#967671)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-10"/>
	<updated date="2017-01-10"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/828003">SUSE bug 828003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967671">SUSE bug 967671</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2131/">CVE-2013-2131</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517178" comment="rrdtool-1.4.7-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517179" comment="rrdtool-cached-1.4.7-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78020" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1028301" ref_url="https://bugzilla.suse.com/1028301" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6508" ref_url="https://www.suse.com/security/cve/CVE-2017-6508/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002740.html" source="SUSE-SU"/>
		<description>

This update for wget fixes the following issues:

Security issue fixed:
- CVE-2017-6508: (url_parse): Reject control characters in host part of URL (bsc#1028301).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-22"/>
	<updated date="2017-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1028301">SUSE bug 1028301</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6508/">CVE-2017-6508</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517180" comment="wget-1.14-20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78021" version="1" class="patch">
	<metadata>
		<title>Security update for virglrenderer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1021616" ref_url="https://bugzilla.suse.com/1021616" source="BUGZILLA"/>
		<reference ref_id="1021627" ref_url="https://bugzilla.suse.com/1021627" source="BUGZILLA"/>
		<reference ref_id="1024232" ref_url="https://bugzilla.suse.com/1024232" source="BUGZILLA"/>
		<reference ref_id="1024244" ref_url="https://bugzilla.suse.com/1024244" source="BUGZILLA"/>
		<reference ref_id="1024992" ref_url="https://bugzilla.suse.com/1024992" source="BUGZILLA"/>
		<reference ref_id="1024993" ref_url="https://bugzilla.suse.com/1024993" source="BUGZILLA"/>
		<reference ref_id="1025505" ref_url="https://bugzilla.suse.com/1025505" source="BUGZILLA"/>
		<reference ref_id="1025507" ref_url="https://bugzilla.suse.com/1025507" source="BUGZILLA"/>
		<reference ref_id="1026723" ref_url="https://bugzilla.suse.com/1026723" source="BUGZILLA"/>
		<reference ref_id="1026725" ref_url="https://bugzilla.suse.com/1026725" source="BUGZILLA"/>
		<reference ref_id="1026922" ref_url="https://bugzilla.suse.com/1026922" source="BUGZILLA"/>
		<reference ref_id="1027108" ref_url="https://bugzilla.suse.com/1027108" source="BUGZILLA"/>
		<reference ref_id="1027376" ref_url="https://bugzilla.suse.com/1027376" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10163" ref_url="https://www.suse.com/security/cve/CVE-2016-10163/" source="CVE"/>
		<reference ref_id="CVE-2016-10214" ref_url="https://www.suse.com/security/cve/CVE-2016-10214/" source="CVE"/>
		<reference ref_id="CVE-2017-5580" ref_url="https://www.suse.com/security/cve/CVE-2017-5580/" source="CVE"/>
		<reference ref_id="CVE-2017-5937" ref_url="https://www.suse.com/security/cve/CVE-2017-5937/" source="CVE"/>
		<reference ref_id="CVE-2017-5956" ref_url="https://www.suse.com/security/cve/CVE-2017-5956/" source="CVE"/>
		<reference ref_id="CVE-2017-5957" ref_url="https://www.suse.com/security/cve/CVE-2017-5957/" source="CVE"/>
		<reference ref_id="CVE-2017-5993" ref_url="https://www.suse.com/security/cve/CVE-2017-5993/" source="CVE"/>
		<reference ref_id="CVE-2017-5994" ref_url="https://www.suse.com/security/cve/CVE-2017-5994/" source="CVE"/>
		<reference ref_id="CVE-2017-6209" ref_url="https://www.suse.com/security/cve/CVE-2017-6209/" source="CVE"/>
		<reference ref_id="CVE-2017-6210" ref_url="https://www.suse.com/security/cve/CVE-2017-6210/" source="CVE"/>
		<reference ref_id="CVE-2017-6317" ref_url="https://www.suse.com/security/cve/CVE-2017-6317/" source="CVE"/>
		<reference ref_id="CVE-2017-6355" ref_url="https://www.suse.com/security/cve/CVE-2017-6355/" source="CVE"/>
		<reference ref_id="CVE-2017-6386" ref_url="https://www.suse.com/security/cve/CVE-2017-6386/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
		<description>

This update for virglrenderer fixes the following issues:

Security issues fixed:
- CVE-2017-6386: memory leakage while in vrend_create_vertex_elements_state (bsc#1027376)
- CVE-2017-6355: integer overflow while creating shader object (bsc#1027108)
- CVE-2017-6317: fix memory leak in add shader program (bsc#1026922)
- CVE-2017-6210: null pointer dereference in vrend_decode_reset (bsc#1026725)
- CVE-2017-6209: stack buffer oveflow in parse_identifier (bsc#1026723)
- CVE-2017-5994: out-of-bounds access in vrend_create_vertex_elements_state (bsc#1025507)
- CVE-2017-5993: host memory leakage when initialising blitter context (bsc#1025505)
- CVE-2017-5957: stack overflow in vrend_decode_set_framebuffer_state (bsc#1024993)
- CVE-2017-5956: OOB access while in vrend_draw_vbo (bsc#1024992)
- CVE-2017-5937: null pointer dereference in vrend_clear (bsc#1024232)
- CVE-2017-5580: OOB access while parsing texture instruction (bsc#1021627)
- CVE-2016-10214: host memory leak issue in virgl_resource_attach_backing (bsc#1024244)
- CVE-2016-10163: host memory leakage when creating decode context (bsc#1021616)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-22"/>
	<updated date="2017-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1021616">SUSE bug 1021616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021627">SUSE bug 1021627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024232">SUSE bug 1024232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024244">SUSE bug 1024244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024992">SUSE bug 1024992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024993">SUSE bug 1024993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025505">SUSE bug 1025505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025507">SUSE bug 1025507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026723">SUSE bug 1026723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026725">SUSE bug 1026725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026922">SUSE bug 1026922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027108">SUSE bug 1027108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027376">SUSE bug 1027376</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10163/">CVE-2016-10163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10214/">CVE-2016-10214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5580/">CVE-2017-5580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5937/">CVE-2017-5937</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5956/">CVE-2017-5956</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5957/">CVE-2017-5957</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5993/">CVE-2017-5993</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5994/">CVE-2017-5994</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6209/">CVE-2017-6209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6210/">CVE-2017-6210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6317/">CVE-2017-6317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6355/">CVE-2017-6355</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6386/">CVE-2017-6386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518492" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78022" version="1" class="patch">
	<metadata>
		<title>Security update for libpng16 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1017646" ref_url="https://bugzilla.suse.com/1017646" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002745.html" source="SUSE-SU"/>
		<description>

This update for libpng16 fixes the following issues:

Security issues fixed:
- CVE-2016-10087: NULL pointer dereference in png_set_text_2() (bsc#1017646)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-29"/>
	<updated date="2017-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017646">SUSE bug 1017646</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517181" comment="libpng16-16-1.6.8-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517182" comment="libpng16-16-32bit-1.6.8-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78023" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1012092" ref_url="https://bugzilla.suse.com/1012092" source="BUGZILLA"/>
		<reference ref_id="1019416" ref_url="https://bugzilla.suse.com/1019416" source="BUGZILLA"/>
		<reference ref_id="1023847" ref_url="https://bugzilla.suse.com/1023847" source="BUGZILLA"/>
		<reference ref_id="1024416" ref_url="https://bugzilla.suse.com/1024416" source="BUGZILLA"/>
		<reference ref_id="1027147" ref_url="https://bugzilla.suse.com/1027147" source="BUGZILLA"/>
		<reference ref_id="993692" ref_url="https://bugzilla.suse.com/993692" source="BUGZILLA"/>
		<reference ref_id="993707" ref_url="https://bugzilla.suse.com/993707" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2619" ref_url="https://www.suse.com/security/cve/CVE-2017-2619/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0858-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00044.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issues:

Security issues fixed:
- CVE-2017-2619: Symlink race permits opening files outside share directory (bsc#1027147).

Bugfixes:
- Force usage of ncurses6-config thru NCURSES_CONFIG env var (bsc#1023847).
- Add missing ldb module directory (bsc#1012092).
- Don't package man pages for VFS modules that aren't built (bsc#993707).
- sync_req: make async_connect_send() 'reentrant'; (bso#12105); (bsc#1024416).
- Document 'winbind: ignore domains' parameter; (bsc#1019416).
- Prevent core, make sure response-&gt;extra_data.data is always cleared out; (bsc#993692).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-29"/>
	<updated date="2017-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012092">SUSE bug 1012092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019416">SUSE bug 1019416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023847">SUSE bug 1023847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024416">SUSE bug 1024416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027147">SUSE bug 1027147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993692">SUSE bug 993692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993707">SUSE bug 993707</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2619/">CVE-2017-2619</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518493" comment="libdcerpc-binding0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518494" comment="libdcerpc-binding0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518495" comment="libdcerpc0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518496" comment="libdcerpc0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518497" comment="libndr-krb5pac0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518498" comment="libndr-krb5pac0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518499" comment="libndr-nbt0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518500" comment="libndr-nbt0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518501" comment="libndr-standard0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518502" comment="libndr-standard0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518503" comment="libndr0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518504" comment="libndr0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518505" comment="libnetapi0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518506" comment="libnetapi0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518507" comment="libsamba-credentials0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518508" comment="libsamba-credentials0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518509" comment="libsamba-errors0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518510" comment="libsamba-errors0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518511" comment="libsamba-hostconfig0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518512" comment="libsamba-hostconfig0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518513" comment="libsamba-passdb0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518514" comment="libsamba-passdb0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518515" comment="libsamba-util0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518516" comment="libsamba-util0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518517" comment="libsamdb0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518518" comment="libsamdb0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518519" comment="libsmbclient0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518520" comment="libsmbclient0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518521" comment="libsmbconf0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518522" comment="libsmbconf0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518523" comment="libsmbldap0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518524" comment="libsmbldap0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518525" comment="libtevent-util0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518526" comment="libtevent-util0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518527" comment="libwbclient0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518528" comment="libwbclient0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518529" comment="samba-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518530" comment="samba-client-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518531" comment="samba-client-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518532" comment="samba-doc-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518533" comment="samba-libs-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518534" comment="samba-libs-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518535" comment="samba-winbind-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518536" comment="samba-winbind-32bit-4.4.2-36.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78024" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1019416" ref_url="https://bugzilla.suse.com/1019416" source="BUGZILLA"/>
		<reference ref_id="1024416" ref_url="https://bugzilla.suse.com/1024416" source="BUGZILLA"/>
		<reference ref_id="1027147" ref_url="https://bugzilla.suse.com/1027147" source="BUGZILLA"/>
		<reference ref_id="993692" ref_url="https://bugzilla.suse.com/993692" source="BUGZILLA"/>
		<reference ref_id="993707" ref_url="https://bugzilla.suse.com/993707" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2619" ref_url="https://www.suse.com/security/cve/CVE-2017-2619/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0859-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00045.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issues:

Security issues fixed:
- CVE-2017-2619: Symlink race permits opening files outside share directory (bsc#1027147).

Bugfixes:
- Don't package man pages for VFS modules that aren't built (bsc#993707).
- sync_req: make async_connect_send() 'reentrant'; (bso#12105); (bsc#1024416).
- Document 'winbind: ignore domains' parameter; (bsc#1019416).
- Prevent core, make sure response-&gt;extra_data.data is always cleared out; (bsc#993692).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-29"/>
	<updated date="2017-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1019416">SUSE bug 1019416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024416">SUSE bug 1024416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027147">SUSE bug 1027147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993692">SUSE bug 993692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993707">SUSE bug 993707</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2619/">CVE-2017-2619</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518537" comment="libdcerpc-atsvc0-4.2.4-28.8.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78025" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1017646" ref_url="https://bugzilla.suse.com/1017646" source="BUGZILLA"/>
		<reference ref_id="958791" ref_url="https://bugzilla.suse.com/958791" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002749.html" source="SUSE-SU"/>
		<description>

This update for libpng12 fixes the following issues:

Security issues fixed:
- CVE-2015-8540: read underflow in libpng (bsc#958791)
- CVE-2016-10087: NULL pointer dereference in png_set_text_2() (bsc#1017646)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-29"/>
	<updated date="2017-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017646">SUSE bug 1017646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958791">SUSE bug 958791</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517231" comment="libpng12-0-1.2.50-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517232" comment="libpng12-0-32bit-1.2.50-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78026" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1027565" ref_url="https://bugzilla.suse.com/1027565" source="BUGZILLA"/>
		<reference ref_id="1028372" ref_url="https://bugzilla.suse.com/1028372" source="BUGZILLA"/>
		<reference ref_id="1030573" ref_url="https://bugzilla.suse.com/1030573" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2636" ref_url="https://www.suse.com/security/cve/CVE-2017-2636/" source="CVE"/>
		<reference ref_id="CVE-2017-7184" ref_url="https://www.suse.com/security/cve/CVE-2017-7184/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0864-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00047.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 kernel was updated to fix the following security bugs:

- CVE-2017-7184: The Linux kernel allowed local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) via unspecified vectors, as demonstrated during a Pwn2Own competition at CanSecWest 2017 (bnc#1030573, bnc#1028372).
- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bnc#1027565).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-30"/>
	<updated date="2017-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027565">SUSE bug 1027565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028372">SUSE bug 1028372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030573">SUSE bug 1030573</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2636/">CVE-2017-2636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7184/">CVE-2017-7184</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518538" comment="kernel-default-4.4.49-92.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518539" comment="kernel-default-devel-4.4.49-92.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518540" comment="kernel-default-extra-4.4.49-92.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518541" comment="kernel-devel-4.4.49-92.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518542" comment="kernel-macros-4.4.49-92.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518543" comment="kernel-source-4.4.49-92.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518544" comment="kernel-syms-4.4.49-92.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78027" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1018699" ref_url="https://bugzilla.suse.com/1018699" source="BUGZILLA"/>
		<reference ref_id="1018700" ref_url="https://bugzilla.suse.com/1018700" source="BUGZILLA"/>
		<reference ref_id="1018701" ref_url="https://bugzilla.suse.com/1018701" source="BUGZILLA"/>
		<reference ref_id="1018702" ref_url="https://bugzilla.suse.com/1018702" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9131" ref_url="https://www.suse.com/security/cve/CVE-2016-9131/" source="CVE"/>
		<reference ref_id="CVE-2016-9147" ref_url="https://www.suse.com/security/cve/CVE-2016-9147/" source="CVE"/>
		<reference ref_id="CVE-2016-9444" ref_url="https://www.suse.com/security/cve/CVE-2016-9444/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00014.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- Fix a potential assertion failure that could have been triggered by a
  malformed response to an ANY query, thereby facilitating a denial-of-service
  attack. [CVE-2016-9131, bsc#1018700, bsc#1018699]

- Fix a potential assertion failure that could have been triggered by
  responding to a query with inconsistent DNSSEC information, thereby
  facilitating a denial-of-service attack. [CVE-2016-9147, bsc#1018701,
  bsc#1018699]

- Fix potential assertion failure that could have been triggered by DNS
  responses that contain unusually-formed DS resource records, facilitating a
  denial-of-service attack. [CVE-2016-9444, bsc#1018702, bsc#1018699]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-11"/>
	<updated date="2017-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1018699">SUSE bug 1018699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9131/">CVE-2016-9131</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9147/">CVE-2016-9147</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9444/">CVE-2016-9444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517244" comment="bind-libs-9.9.9P1-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517245" comment="bind-libs-32bit-9.9.9P1-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517246" comment="bind-utils-9.9.9P1-53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78028" version="1" class="patch">
	<metadata>
		<title>Security update for audiofile (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1026978" ref_url="https://bugzilla.suse.com/1026978" source="BUGZILLA"/>
		<reference ref_id="1026979" ref_url="https://bugzilla.suse.com/1026979" source="BUGZILLA"/>
		<reference ref_id="1026980" ref_url="https://bugzilla.suse.com/1026980" source="BUGZILLA"/>
		<reference ref_id="1026981" ref_url="https://bugzilla.suse.com/1026981" source="BUGZILLA"/>
		<reference ref_id="1026982" ref_url="https://bugzilla.suse.com/1026982" source="BUGZILLA"/>
		<reference ref_id="1026983" ref_url="https://bugzilla.suse.com/1026983" source="BUGZILLA"/>
		<reference ref_id="1026984" ref_url="https://bugzilla.suse.com/1026984" source="BUGZILLA"/>
		<reference ref_id="1026985" ref_url="https://bugzilla.suse.com/1026985" source="BUGZILLA"/>
		<reference ref_id="1026986" ref_url="https://bugzilla.suse.com/1026986" source="BUGZILLA"/>
		<reference ref_id="1026987" ref_url="https://bugzilla.suse.com/1026987" source="BUGZILLA"/>
		<reference ref_id="1026988" ref_url="https://bugzilla.suse.com/1026988" source="BUGZILLA"/>
		<reference ref_id="949399" ref_url="https://bugzilla.suse.com/949399" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7747" ref_url="https://www.suse.com/security/cve/CVE-2015-7747/" source="CVE"/>
		<reference ref_id="CVE-2017-6827" ref_url="https://www.suse.com/security/cve/CVE-2017-6827/" source="CVE"/>
		<reference ref_id="CVE-2017-6828" ref_url="https://www.suse.com/security/cve/CVE-2017-6828/" source="CVE"/>
		<reference ref_id="CVE-2017-6829" ref_url="https://www.suse.com/security/cve/CVE-2017-6829/" source="CVE"/>
		<reference ref_id="CVE-2017-6830" ref_url="https://www.suse.com/security/cve/CVE-2017-6830/" source="CVE"/>
		<reference ref_id="CVE-2017-6831" ref_url="https://www.suse.com/security/cve/CVE-2017-6831/" source="CVE"/>
		<reference ref_id="CVE-2017-6832" ref_url="https://www.suse.com/security/cve/CVE-2017-6832/" source="CVE"/>
		<reference ref_id="CVE-2017-6833" ref_url="https://www.suse.com/security/cve/CVE-2017-6833/" source="CVE"/>
		<reference ref_id="CVE-2017-6834" ref_url="https://www.suse.com/security/cve/CVE-2017-6834/" source="CVE"/>
		<reference ref_id="CVE-2017-6835" ref_url="https://www.suse.com/security/cve/CVE-2017-6835/" source="CVE"/>
		<reference ref_id="CVE-2017-6836" ref_url="https://www.suse.com/security/cve/CVE-2017-6836/" source="CVE"/>
		<reference ref_id="CVE-2017-6837" ref_url="https://www.suse.com/security/cve/CVE-2017-6837/" source="CVE"/>
		<reference ref_id="CVE-2017-6838" ref_url="https://www.suse.com/security/cve/CVE-2017-6838/" source="CVE"/>
		<reference ref_id="CVE-2017-6839" ref_url="https://www.suse.com/security/cve/CVE-2017-6839/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002783.html" source="SUSE-SU"/>
		<description>

This audiofile update fixes the following issue:

Security issues fixed:
- CVE-2015-7747: Fixed buffer overflow issue when changing both number of channels and sample format. (bsc#949399)
- CVE-2017-6827: heap-based buffer overflow in MSADPCM::initializeCoefficients (MSADPCM.cpp) (bsc#1026979)
- CVE-2017-6828: heap-based buffer overflow in readValue (FileHandle.cpp) (bsc#1026980)
- CVE-2017-6829: global buffer overflow in decodeSample (IMA.cpp) (bsc#1026981)
- CVE-2017-6830: heap-based buffer overflow in alaw2linear_buf (G711.cpp) (bsc#1026982)
- CVE-2017-6831: heap-based buffer overflow in IMA::decodeBlockWAVE (IMA.cpp) (bsc#1026983)
- CVE-2017-6832: heap-based buffer overflow in MSADPCM::decodeBlock (MSADPCM.cpp) (bsc#1026984)
- CVE-2017-6833: divide-by-zero in BlockCodec::runPull (BlockCodec.cpp) (bsc#1026985)
- CVE-2017-6834: heap-based buffer overflow in ulaw2linear_buf (G711.cpp) (bsc#1026986)
- CVE-2017-6835: divide-by-zero in BlockCodec::reset1 (BlockCodec.cpp) (bsc#1026988)
- CVE-2017-6836: heap-based buffer overflow in Expand3To4Module::run (SimpleModule.h) (bsc#1026987)
- CVE-2017-6837, CVE-2017-6838, CVE-2017-6839: multiple ubsan crashes (bsc#1026978)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-05"/>
	<updated date="2017-04-05"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1026978">SUSE bug 1026978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026979">SUSE bug 1026979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026980">SUSE bug 1026980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026981">SUSE bug 1026981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026982">SUSE bug 1026982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026983">SUSE bug 1026983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026984">SUSE bug 1026984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026985">SUSE bug 1026985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026986">SUSE bug 1026986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026987">SUSE bug 1026987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026988">SUSE bug 1026988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949399">SUSE bug 949399</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7747/">CVE-2015-7747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6827/">CVE-2017-6827</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6828/">CVE-2017-6828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6829/">CVE-2017-6829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6830/">CVE-2017-6830</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6831/">CVE-2017-6831</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6832/">CVE-2017-6832</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6833/">CVE-2017-6833</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6834/">CVE-2017-6834</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6835/">CVE-2017-6835</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6836/">CVE-2017-6836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6837/">CVE-2017-6837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6838/">CVE-2017-6838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6839/">CVE-2017-6839</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517247" comment="audiofile-0.3.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517248" comment="libaudiofile1-0.3.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517249" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78029" version="1" class="patch">
	<metadata>
		<title>Security update for gimp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1025717" ref_url="https://bugzilla.suse.com/1025717" source="BUGZILLA"/>
		<reference ref_id="1032241" ref_url="https://bugzilla.suse.com/1032241" source="BUGZILLA"/>
		<reference ref_id="CVE-2007-3126" ref_url="https://www.suse.com/security/cve/CVE-2007-3126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002784.html" source="SUSE-SU"/>
		<description>

This update for gimp fixes the following issues:

This security issue was fixed:

- CVE-2007-3126: Context-dependent attackers were able to cause a denial of service via an ICO file with an InfoHeader containing a Height of zero (bsc#1032241).

These non-security issues were fixed:

- bsc#1025717: Prefer lcms2 over lcms1 if both are available
- bgo#593576: Preven crash in PDF Import filter when importing large image PDF or specifying high resolution 
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-05"/>
	<updated date="2017-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025717">SUSE bug 1025717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032241">SUSE bug 1032241</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2007-3126/">CVE-2007-3126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518545" comment="gimp-2.8.18-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518546" comment="gimp-lang-2.8.18-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518547" comment="gimp-plugins-python-2.8.18-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518548" comment="libgimp-2_0-0-2.8.18-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518549" comment="libgimpui-2_0-0-2.8.18-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78030" version="1" class="patch">
	<metadata>
		<title>Security update for dracut (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1005410" ref_url="https://bugzilla.suse.com/1005410" source="BUGZILLA"/>
		<reference ref_id="1006118" ref_url="https://bugzilla.suse.com/1006118" source="BUGZILLA"/>
		<reference ref_id="1007925" ref_url="https://bugzilla.suse.com/1007925" source="BUGZILLA"/>
		<reference ref_id="1008340" ref_url="https://bugzilla.suse.com/1008340" source="BUGZILLA"/>
		<reference ref_id="1008648" ref_url="https://bugzilla.suse.com/1008648" source="BUGZILLA"/>
		<reference ref_id="1017141" ref_url="https://bugzilla.suse.com/1017141" source="BUGZILLA"/>
		<reference ref_id="1017695" ref_url="https://bugzilla.suse.com/1017695" source="BUGZILLA"/>
		<reference ref_id="1019938" ref_url="https://bugzilla.suse.com/1019938" source="BUGZILLA"/>
		<reference ref_id="1020063" ref_url="https://bugzilla.suse.com/1020063" source="BUGZILLA"/>
		<reference ref_id="1021687" ref_url="https://bugzilla.suse.com/1021687" source="BUGZILLA"/>
		<reference ref_id="902375" ref_url="https://bugzilla.suse.com/902375" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8637" ref_url="https://www.suse.com/security/cve/CVE-2016-8637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002788.html" source="SUSE-SU"/>
		<description>

This update for dracut fixes the following issues:

Security issues fixed:

- CVE-2016-8637: When the early microcode loading was enabled during initrd creation, the initrd
  would be read-only available for all users, allowing local users to retrieve secrets stored in
  the initial ramdisk. (bsc#1008340)

Non security issues fixed:

- Remove zlib module as requirement. (bsc#1020063)
- Unlimit TaskMax for xfs_repair in emergency shell. (bsc#1019938)
- Resolve symbolic links for -i and -k parameters. (bsc#902375)
- Enhance purge-kernels script to handle kgraft patches. (bsc#1017141)
- Allow booting from degraded MD arrays with systemd. (bsc#1017695)
- Allow booting on s390x with fips=1 on the kernel command line. (bnc#1021687)
- Start multipath services before local-fs-pre.target. (bsc#1005410, bsc#1006118, bsc#1007925)
- Fix /sbin/installkernel to handle kernel packages built with 'make bin-rpmpkg'. (bsc#1008648)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-06"/>
	<updated date="2017-04-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005410">SUSE bug 1005410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006118">SUSE bug 1006118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007925">SUSE bug 1007925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008340">SUSE bug 1008340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008648">SUSE bug 1008648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017141">SUSE bug 1017141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017695">SUSE bug 1017695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019938">SUSE bug 1019938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020063">SUSE bug 1020063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021687">SUSE bug 1021687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902375">SUSE bug 902375</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8637/">CVE-2016-8637</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518550" comment="dracut-044-108.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78031" version="1" class="patch">
	<metadata>
		<title>Security update for libpng15 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1017646" ref_url="https://bugzilla.suse.com/1017646" source="BUGZILLA"/>
		<reference ref_id="958791" ref_url="https://bugzilla.suse.com/958791" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002787.html" source="SUSE-SU"/>
		<description>

This update for libpng15 fixes the following issues:

Security issues fixed:
- CVE-2015-8540: read underflow in libpng (bsc#958791)
- CVE-2016-10087: NULL pointer dereference in png_set_text_2() (bsc#1017646)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-06"/>
	<updated date="2017-04-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017646">SUSE bug 1017646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958791">SUSE bug 958791</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517250" comment="libpng15-15-1.5.22-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78032" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1015400" ref_url="https://bugzilla.suse.com/1015400" source="BUGZILLA"/>
		<reference ref_id="1018088" ref_url="https://bugzilla.suse.com/1018088" source="BUGZILLA"/>
		<reference ref_id="1020353" ref_url="https://bugzilla.suse.com/1020353" source="BUGZILLA"/>
		<reference ref_id="1021868" ref_url="https://bugzilla.suse.com/1021868" source="BUGZILLA"/>
		<reference ref_id="1029497" ref_url="https://bugzilla.suse.com/1029497" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10251" ref_url="https://www.suse.com/security/cve/CVE-2016-10251/" source="CVE"/>
		<reference ref_id="CVE-2016-9583" ref_url="https://www.suse.com/security/cve/CVE-2016-9583/" source="CVE"/>
		<reference ref_id="CVE-2016-9600" ref_url="https://www.suse.com/security/cve/CVE-2016-9600/" source="CVE"/>
		<reference ref_id="CVE-2017-5498" ref_url="https://www.suse.com/security/cve/CVE-2017-5498/" source="CVE"/>
		<reference ref_id="CVE-2017-6850" ref_url="https://www.suse.com/security/cve/CVE-2017-6850/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002789.html" source="SUSE-SU"/>
		<description>

This update for jasper fixes the following issues:

Security issues fixed:
- CVE-2016-9600: Null Pointer Dereference due to missing check for UNKNOWN color space in JP2 encoder (bsc#1018088)
- CVE-2016-10251: Use of uninitialized value in jpc_pi_nextcprl (jpc_t2cod.c) (bsc#1029497)
- CVE-2017-5498: left-shift undefined behaviour (bsc#1020353)
- CVE-2017-6850: NULL pointer dereference in jp2_cdef_destroy (jp2_cod.c) (bsc#1021868)
- CVE-2016-9583: Out of bounds heap read in jpc_pi_nextpcrl() (bsc#1015400)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-06"/>
	<updated date="2017-04-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015400">SUSE bug 1015400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018088">SUSE bug 1018088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020353">SUSE bug 1020353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021868">SUSE bug 1021868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029497">SUSE bug 1029497</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10251/">CVE-2016-10251</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9583/">CVE-2016-9583</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9600/">CVE-2016-9600</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5498/">CVE-2017-5498</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6850/">CVE-2017-6850</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517251" comment="libjasper1-1.900.14-194.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517252" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78033" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-bad (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1024044" ref_url="https://bugzilla.suse.com/1024044" source="BUGZILLA"/>
		<reference ref_id="1024068" ref_url="https://bugzilla.suse.com/1024068" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5843" ref_url="https://www.suse.com/security/cve/CVE-2017-5843/" source="CVE"/>
		<reference ref_id="CVE-2017-5848" ref_url="https://www.suse.com/security/cve/CVE-2017-5848/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002790.html" source="SUSE-SU"/>
		<description>

This update for gstreamer-plugins-bad fixes the following issues:

Security issues fixed:
- CVE-2017-5843: set stream tags to NULL after unrefing (bsc#1024044).
- CVE-2017-5848: rewrite PSM parsing to add bounds checking (bsc#1024068).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-07"/>
	<updated date="2017-04-07"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1024044">SUSE bug 1024044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024068">SUSE bug 1024068</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5843/">CVE-2017-5843</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5848/">CVE-2017-5848</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518551" comment="gstreamer-plugins-bad-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518552" comment="gstreamer-plugins-bad-lang-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518553" comment="libgstadaptivedemux-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518554" comment="libgstbadaudio-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518555" comment="libgstbadbase-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518556" comment="libgstbadvideo-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518557" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518558" comment="libgstcodecparsers-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518559" comment="libgstgl-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518560" comment="libgstmpegts-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518561" comment="libgstphotography-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518562" comment="libgsturidownloader-1_0-0-1.8.3-17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78034" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1024051" ref_url="https://bugzilla.suse.com/1024051" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5838" ref_url="https://www.suse.com/security/cve/CVE-2017-5838/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002791.html" source="SUSE-SU"/>
		<description>

This update for gstreamer fixes the following security issues:

- A crafted AVI file could have caused an invalid memory read, possibly
  causing DoS or corruption (bsc#1024051, CVE-2017-5838)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-07"/>
	<updated date="2017-04-07"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1024051">SUSE bug 1024051</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5838/">CVE-2017-5838</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518563" comment="gstreamer-1.8.3-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518564" comment="gstreamer-lang-1.8.3-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518565" comment="gstreamer-utils-1.8.3-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518566" comment="libgstreamer-1_0-0-1.8.3-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518567" comment="libgstreamer-1_0-0-32bit-1.8.3-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518568" comment="typelib-1_0-Gst-1_0-1.8.3-9.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78035" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1014136" ref_url="https://bugzilla.suse.com/1014136" source="BUGZILLA"/>
		<reference ref_id="1015348" ref_url="https://bugzilla.suse.com/1015348" source="BUGZILLA"/>
		<reference ref_id="1022555" ref_url="https://bugzilla.suse.com/1022555" source="BUGZILLA"/>
		<reference ref_id="1026236" ref_url="https://bugzilla.suse.com/1026236" source="BUGZILLA"/>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1028235" ref_url="https://bugzilla.suse.com/1028235" source="BUGZILLA"/>
		<reference ref_id="1029128" ref_url="https://bugzilla.suse.com/1029128" source="BUGZILLA"/>
		<reference ref_id="1029827" ref_url="https://bugzilla.suse.com/1029827" source="BUGZILLA"/>
		<reference ref_id="1030144" ref_url="https://bugzilla.suse.com/1030144" source="BUGZILLA"/>
		<reference ref_id="1030442" ref_url="https://bugzilla.suse.com/1030442" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-7228" ref_url="https://www.suse.com/security/cve/CVE-2017-7228/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00013.html" source="SUSE-SU"/>
		<description>

This update for xen to version 4.7.2 fixes the following issues:

These security issues were fixed:

- CVE-2017-7228: Broken check in memory_exchange() permited PV guest breakout (bsc#1030442).
- XSA-206: Unprivileged guests issuing writes to xenstore were able to stall progress of the control domain or driver domain, possibly leading to a Denial of Service (DoS) of the entire host (bsc#1030144).
- CVE-2017-6505: The ohci_service_ed_list function in hw/usb/hcd-ohci.c allowed local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors (bsc#1028235).

These non-security issues were fixed:

- bsc#1015348: libvirtd didn't not start during boot
- bsc#1014136: kdump couldn't dump a kernel on SLES12-SP2 with Xen hypervisor.
- bsc#1026236: Fixed paravirtualized performance
- bsc#1022555: Timeout in 'execution of /etc/xen/scripts/block add'
- bsc#1029827: Forward port xenstored
- bsc#1029128: Make xen to really produce xen.efi with gcc48
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-11"/>
	<updated date="2017-04-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1014136">SUSE bug 1014136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015348">SUSE bug 1015348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022555">SUSE bug 1022555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026236">SUSE bug 1026236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028235">SUSE bug 1028235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029128">SUSE bug 1029128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029827">SUSE bug 1029827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030144">SUSE bug 1030144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030442">SUSE bug 1030442</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7228/">CVE-2017-7228</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518569" comment="xen-4.7.2_02-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518570" comment="xen-libs-4.7.2_02-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518571" comment="xen-libs-32bit-4.7.2_02-36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78036" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1020983" ref_url="https://bugzilla.suse.com/1020983" source="BUGZILLA"/>
		<reference ref_id="1033466" ref_url="https://bugzilla.suse.com/1033466" source="BUGZILLA"/>
		<reference ref_id="1033467" ref_url="https://bugzilla.suse.com/1033467" source="BUGZILLA"/>
		<reference ref_id="1033468" ref_url="https://bugzilla.suse.com/1033468" source="BUGZILLA"/>
		<reference ref_id="987866" ref_url="https://bugzilla.suse.com/987866" source="BUGZILLA"/>
		<reference ref_id="989528" ref_url="https://bugzilla.suse.com/989528" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2775" ref_url="https://www.suse.com/security/cve/CVE-2016-2775/" source="CVE"/>
		<reference ref_id="CVE-2016-6170" ref_url="https://www.suse.com/security/cve/CVE-2016-6170/" source="CVE"/>
		<reference ref_id="CVE-2017-3136" ref_url="https://www.suse.com/security/cve/CVE-2017-3136/" source="CVE"/>
		<reference ref_id="CVE-2017-3137" ref_url="https://www.suse.com/security/cve/CVE-2017-3137/" source="CVE"/>
		<reference ref_id="CVE-2017-3138" ref_url="https://www.suse.com/security/cve/CVE-2017-3138/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00015.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

CVE-2017-3137 (bsc#1033467):
Mistaken assumptions about the ordering of records in the answer
section of a response containing CNAME or DNAME resource records
could have been exploited to cause a denial of service of a bind
server performing recursion.

CVE-2017-3136 (bsc#1033466):
An attacker could have constructed a query that would cause a denial
of service of servers configured to use DNS64.

CVE-2017-3138 (bsc#1033468):
An attacker with access to the BIND control channel could have caused
the server to stop by triggering an assertion failure.

CVE-2016-6170 (bsc#987866):
Primary DNS servers could have caused a denial of service of secondary DNS servers via a large AXFR response.
IXFR servers could have caused a denial of service of IXFR clients via a large IXFR response.
Remote authenticated users could have caused a denial of service of primary DNS servers via a large UPDATE message.

CVE-2016-2775 (bsc#989528):
When lwresd or the named lwres option were enabled, bind allowed remote attackers to cause a denial of service 
(daemon crash) via a long request that uses the lightweight resolver protocol.

One additional non-security bug was fixed:

The default umask was changed to 077. (bsc#1020983)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-13"/>
	<updated date="2017-04-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020983">SUSE bug 1020983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033467">SUSE bug 1033467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033468">SUSE bug 1033468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987866">SUSE bug 987866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989528">SUSE bug 989528</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2775/">CVE-2016-2775</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6170/">CVE-2016-6170</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3136/">CVE-2017-3136</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3137/">CVE-2017-3137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3138/">CVE-2017-3138</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517261" comment="bind-libs-9.9.9P1-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517262" comment="bind-libs-32bit-9.9.9P1-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517263" comment="bind-utils-9.9.9P1-59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78037" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-base (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1024076" ref_url="https://bugzilla.suse.com/1024076" source="BUGZILLA"/>
		<reference ref_id="1024079" ref_url="https://bugzilla.suse.com/1024079" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5837" ref_url="https://www.suse.com/security/cve/CVE-2017-5837/" source="CVE"/>
		<reference ref_id="CVE-2017-5844" ref_url="https://www.suse.com/security/cve/CVE-2017-5844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002798.html" source="SUSE-SU"/>
		<description>

This update for gstreamer-0_10-plugins-base fixes the following security issues:

- A crafted AVI file could have caused a floating point exception leading to
  DoS (bsc#1024076, CVE-2017-5837, bsc#1024079, CVE-2017-5844)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-13"/>
	<updated date="2017-04-13"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1024076">SUSE bug 1024076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024079">SUSE bug 1024079</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5837/">CVE-2017-5837</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5844/">CVE-2017-5844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518572" comment="gstreamer-0_10-plugins-base-0.10.36-17.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518573" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-17.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518574" comment="gstreamer-0_10-plugins-base-lang-0.10.36-17.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518575" comment="libgstapp-0_10-0-0.10.36-17.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518576" comment="libgstapp-0_10-0-32bit-0.10.36-17.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518577" comment="libgstinterfaces-0_10-0-0.10.36-17.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518578" comment="libgstinterfaces-0_10-0-32bit-0.10.36-17.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78038" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-good (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1024014" ref_url="https://bugzilla.suse.com/1024014" source="BUGZILLA"/>
		<reference ref_id="1024017" ref_url="https://bugzilla.suse.com/1024017" source="BUGZILLA"/>
		<reference ref_id="1024030" ref_url="https://bugzilla.suse.com/1024030" source="BUGZILLA"/>
		<reference ref_id="1024034" ref_url="https://bugzilla.suse.com/1024034" source="BUGZILLA"/>
		<reference ref_id="1024062" ref_url="https://bugzilla.suse.com/1024062" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10198" ref_url="https://www.suse.com/security/cve/CVE-2016-10198/" source="CVE"/>
		<reference ref_id="CVE-2016-10199" ref_url="https://www.suse.com/security/cve/CVE-2016-10199/" source="CVE"/>
		<reference ref_id="CVE-2017-5840" ref_url="https://www.suse.com/security/cve/CVE-2017-5840/" source="CVE"/>
		<reference ref_id="CVE-2017-5841" ref_url="https://www.suse.com/security/cve/CVE-2017-5841/" source="CVE"/>
		<reference ref_id="CVE-2017-5845" ref_url="https://www.suse.com/security/cve/CVE-2017-5845/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002801.html" source="SUSE-SU"/>
		<description>

This update for gstreamer-plugins-good fixes the following issues:

- A crafted aac audio file could have caused an invalid read and thus
  corruption or denial of service (bsc#1024014, CVE-2016-10198)
- A crafted mp4 file could have caused an invalid read and thus corruption or
  denial of service (bsc#1024017, CVE-2016-10199)
- A crafted avi file could have caused an invalid read and thus corruption or
  denial of service (bsc#1024034, CVE-2017-5840)
- A crafted AVI file with metadata tag entries (ncdt) could have caused
  invalid read access and thus corruption or denial of service (bsc#1024030,
  CVE-2017-5841)
- A crafted avi file could have caused an invalid read access resulting in
  denial of service (bsc#1024062, CVE-2017-5845)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-13"/>
	<updated date="2017-04-13"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1024014">SUSE bug 1024014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024017">SUSE bug 1024017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024030">SUSE bug 1024030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024034">SUSE bug 1024034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024062">SUSE bug 1024062</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10198/">CVE-2016-10198</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10199/">CVE-2016-10199</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5840/">CVE-2017-5840</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5841/">CVE-2017-5841</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5845/">CVE-2017-5845</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518579" comment="gstreamer-plugins-good-1.8.3-12.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518580" comment="gstreamer-plugins-good-lang-1.8.3-12.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78039" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-base (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1024041" ref_url="https://bugzilla.suse.com/1024041" source="BUGZILLA"/>
		<reference ref_id="1024047" ref_url="https://bugzilla.suse.com/1024047" source="BUGZILLA"/>
		<reference ref_id="1024076" ref_url="https://bugzilla.suse.com/1024076" source="BUGZILLA"/>
		<reference ref_id="1024079" ref_url="https://bugzilla.suse.com/1024079" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5837" ref_url="https://www.suse.com/security/cve/CVE-2017-5837/" source="CVE"/>
		<reference ref_id="CVE-2017-5839" ref_url="https://www.suse.com/security/cve/CVE-2017-5839/" source="CVE"/>
		<reference ref_id="CVE-2017-5842" ref_url="https://www.suse.com/security/cve/CVE-2017-5842/" source="CVE"/>
		<reference ref_id="CVE-2017-5844" ref_url="https://www.suse.com/security/cve/CVE-2017-5844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002805.html" source="SUSE-SU"/>
		<description>

This update for gstreamer-plugins-base fixes the following security issues:

- A crafted AVI file could have caused a floating point exception leading to
  DoS (bsc#1024076, CVE-2017-5837, bsc#1024079, CVE-2017-5844)
- A crafted AVI file could have caused a stack overflow leading to DoS
  (bsc#1024047, CVE-2017-5839)
- A crafted SAMI subtitle file could have caused an invalid memory access
  possibly leading to DoS or corruption (bsc#1024041, CVE-2017-5842)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1024041">SUSE bug 1024041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024047">SUSE bug 1024047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024076">SUSE bug 1024076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024079">SUSE bug 1024079</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5837/">CVE-2017-5837</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5839/">CVE-2017-5839</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5842/">CVE-2017-5842</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5844/">CVE-2017-5844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518581" comment="gstreamer-plugins-base-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518582" comment="gstreamer-plugins-base-lang-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518583" comment="libgstallocators-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518584" comment="libgstapp-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518585" comment="libgstapp-1_0-0-32bit-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518586" comment="libgstaudio-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518587" comment="libgstaudio-1_0-0-32bit-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518588" comment="libgstfft-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518589" comment="libgstfft-1_0-0-32bit-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518590" comment="libgstpbutils-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518591" comment="libgstpbutils-1_0-0-32bit-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518592" comment="libgstriff-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518593" comment="libgstrtp-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518594" comment="libgstrtsp-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518595" comment="libgstsdp-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518596" comment="libgsttag-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518597" comment="libgsttag-1_0-0-32bit-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518598" comment="libgstvideo-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518599" comment="libgstvideo-1_0-0-32bit-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518600" comment="typelib-1_0-GstAudio-1_0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518601" comment="typelib-1_0-GstPbutils-1_0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518602" comment="typelib-1_0-GstTag-1_0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518603" comment="typelib-1_0-GstVideo-1_0-1.8.3-12.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78040" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1033053" ref_url="https://bugzilla.suse.com/1033053" source="BUGZILLA"/>
		<reference ref_id="1033054" ref_url="https://bugzilla.suse.com/1033054" source="BUGZILLA"/>
		<reference ref_id="1033914" ref_url="https://bugzilla.suse.com/1033914" source="BUGZILLA"/>
		<reference ref_id="1033915" ref_url="https://bugzilla.suse.com/1033915" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7585" ref_url="https://www.suse.com/security/cve/CVE-2017-7585/" source="CVE"/>
		<reference ref_id="CVE-2017-7586" ref_url="https://www.suse.com/security/cve/CVE-2017-7586/" source="CVE"/>
		<reference ref_id="CVE-2017-7741" ref_url="https://www.suse.com/security/cve/CVE-2017-7741/" source="CVE"/>
		<reference ref_id="CVE-2017-7742" ref_url="https://www.suse.com/security/cve/CVE-2017-7742/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002806.html" source="SUSE-SU"/>
		<description>

This update for libsndfile fixes the following security issues:

- CVE-2017-7586: A stack-based buffer overflow via a specially crafted FLAC
  file was fixed (error in the 'header_read()' function) (bsc#1033053)
- CVE-2017-7585,CVE-2017-7741, CVE-2017-7742: Several stack-based buffer overflows via a specially crafted FLAC
  file (error in the 'flac_buffer_copy()' function) were fixed (bsc#1033054,bsc#1033915,bsc#1033914).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033053">SUSE bug 1033053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033054">SUSE bug 1033054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033914">SUSE bug 1033914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033915">SUSE bug 1033915</bugzilla>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7585/">CVE-2017-7585</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7586/">CVE-2017-7586</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7741/">CVE-2017-7741</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7742/">CVE-2017-7742</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517296" comment="libsndfile1-1.0.25-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517297" comment="libsndfile1-32bit-1.0.25-28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78041" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1015332" ref_url="https://bugzilla.suse.com/1015332" source="BUGZILLA"/>
		<reference ref_id="1027712" ref_url="https://bugzilla.suse.com/1027712" source="BUGZILLA"/>
		<reference ref_id="1032309" ref_url="https://bugzilla.suse.com/1032309" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9586" ref_url="https://www.suse.com/security/cve/CVE-2016-9586/" source="CVE"/>
		<reference ref_id="CVE-2017-7407" ref_url="https://www.suse.com/security/cve/CVE-2017-7407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002808.html" source="SUSE-SU"/>
		<description>

This update for curl fixes the following issues:

Security issue fixed:

- CVE-2016-9586: libcurl printf floating point buffer overflow (bsc#1015332)
- CVE-2017-7407: The ourWriteOut function in tool_writeout.c in curl might have allowed physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which lead to a heap-based buffer over-read (bsc#1032309).

With this release new default ciphers are active (SUSE_DEFAULT, bsc#1027712).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015332">SUSE bug 1015332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027712">SUSE bug 1027712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032309">SUSE bug 1032309</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9586/">CVE-2016-9586</cve>
	<cve impact="moderate" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7407/">CVE-2017-7407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517298" comment="curl-7.37.0-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517299" comment="libcurl4-7.37.0-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517300" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78042" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1031247" ref_url="https://bugzilla.suse.com/1031247" source="BUGZILLA"/>
		<reference ref_id="1031249" ref_url="https://bugzilla.suse.com/1031249" source="BUGZILLA"/>
		<reference ref_id="1031250" ref_url="https://bugzilla.suse.com/1031250" source="BUGZILLA"/>
		<reference ref_id="1031254" ref_url="https://bugzilla.suse.com/1031254" source="BUGZILLA"/>
		<reference ref_id="1031255" ref_url="https://bugzilla.suse.com/1031255" source="BUGZILLA"/>
		<reference ref_id="1031262" ref_url="https://bugzilla.suse.com/1031262" source="BUGZILLA"/>
		<reference ref_id="1031263" ref_url="https://bugzilla.suse.com/1031263" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10266" ref_url="https://www.suse.com/security/cve/CVE-2016-10266/" source="CVE"/>
		<reference ref_id="CVE-2016-10267" ref_url="https://www.suse.com/security/cve/CVE-2016-10267/" source="CVE"/>
		<reference ref_id="CVE-2016-10268" ref_url="https://www.suse.com/security/cve/CVE-2016-10268/" source="CVE"/>
		<reference ref_id="CVE-2016-10269" ref_url="https://www.suse.com/security/cve/CVE-2016-10269/" source="CVE"/>
		<reference ref_id="CVE-2016-10270" ref_url="https://www.suse.com/security/cve/CVE-2016-10270/" source="CVE"/>
		<reference ref_id="CVE-2016-10271" ref_url="https://www.suse.com/security/cve/CVE-2016-10271/" source="CVE"/>
		<reference ref_id="CVE-2016-10272" ref_url="https://www.suse.com/security/cve/CVE-2016-10272/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00019.html" source="SUSE-SU"/>
		<description>

This update for tiff fixes the following issues:

Security issues fixed:
- CVE-2016-10272: LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based
  buffer overflow) or possibly have unspecified other impact via a crafted TIFF image, related to
  'WRITE of size 2048' and libtiff/tif_next.c:64:9 (bsc#1031247).
- CVE-2016-10271: tools/tiffcrop.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of
  service (heap-based buffer over-read and buffer overflow) or possibly have unspecified other
  impact via a crafted TIFF image, related to 'READ of size 1' and libtiff/tif_fax3.c:413:13
  (bsc#1031249).
- CVE-2016-10270: LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based
  buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to
  'READ of size 8' and libtiff/tif_read.c:523:22 (bsc#1031250).
- CVE-2016-10269: LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based
  buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to
  'READ of size 512' and libtiff/tif_unix.c:340:2 (bsc#1031254).
- CVE-2016-10268: tools/tiffcp.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of
  service (integer underflow and heap-based buffer under-read) or possibly have unspecified other
  impact via a crafted TIFF image, related to 'READ of size 78490' and libtiff/tif_unix.c:115:23
  (bsc#1031255).
- CVE-2016-10267: LibTIFF 4.0.7 allows remote attackers to cause a denial of service
  (divide-by-zero error and application crash) via a crafted TIFF image, related to
  libtiff/tif_ojpeg.c:816:8 (bsc#1031262).
- CVE-2016-10266: LibTIFF 4.0.7 allows remote attackers to cause a denial of service
  (divide-by-zero error and application crash) via a crafted TIFF image, related to
  libtiff/tif_read.c:351:22. (bsc#1031263).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1031247">SUSE bug 1031247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031249">SUSE bug 1031249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031250">SUSE bug 1031250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031254">SUSE bug 1031254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031255">SUSE bug 1031255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031262">SUSE bug 1031262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031263">SUSE bug 1031263</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10266/">CVE-2016-10266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10267/">CVE-2016-10267</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10268/">CVE-2016-10268</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10269/">CVE-2016-10269</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10270/">CVE-2016-10270</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10271/">CVE-2016-10271</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10272/">CVE-2016-10272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517301" comment="libtiff5-4.0.7-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517302" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78043" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1014172" ref_url="https://bugzilla.suse.com/1014172" source="BUGZILLA"/>
		<reference ref_id="1030050" ref_url="https://bugzilla.suse.com/1030050" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9042" ref_url="https://www.suse.com/security/cve/CVE-2016-9042/" source="CVE"/>
		<reference ref_id="CVE-2017-6451" ref_url="https://www.suse.com/security/cve/CVE-2017-6451/" source="CVE"/>
		<reference ref_id="CVE-2017-6458" ref_url="https://www.suse.com/security/cve/CVE-2017-6458/" source="CVE"/>
		<reference ref_id="CVE-2017-6460" ref_url="https://www.suse.com/security/cve/CVE-2017-6460/" source="CVE"/>
		<reference ref_id="CVE-2017-6462" ref_url="https://www.suse.com/security/cve/CVE-2017-6462/" source="CVE"/>
		<reference ref_id="CVE-2017-6463" ref_url="https://www.suse.com/security/cve/CVE-2017-6463/" source="CVE"/>
		<reference ref_id="CVE-2017-6464" ref_url="https://www.suse.com/security/cve/CVE-2017-6464/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002812.html" source="SUSE-SU"/>
		<description>

This ntp update to version 4.2.8p10 fixes serveral issues.

This updated enables leap smearing. See
/usr/share/doc/packages/ntp/README.leapsmear for details.

Security issues fixed (bsc#1030050):

- CVE-2017-6464: Denial of Service via Malformed Config
- CVE-2017-6462: Buffer Overflow in DPTS Clock
- CVE-2017-6463: Authenticated DoS via Malicious Config Option
- CVE-2017-6458: Potential Overflows in ctl_put() functions
- CVE-2017-6451: Improper use of snprintf() in mx4200_send()
- CVE-2017-6460: Buffer Overflow in ntpq when fetching reslist
- CVE-2016-9042: 0rigin (zero origin) DoS.
- ntpq_stripquotes() returns incorrect Value
- ereallocarray()/eallocarray() underused
- Copious amounts of Unused Code
- Off-by-one in Oncore GPS Receiver
- Makefile does not enforce Security Flags

Bugfixes:

- Remove spurious log messages (bsc#1014172).
- clang scan-build findings
- Support for openssl-1.1.0 without compatibility modes
- Bugfix 3072 breaks multicastclient
- forking async worker: interrupted pipe I/O
- (...) time_pps_create: Exec format error
- Incorrect Logic for Peer Event Limiting
- Change the process name of forked DNS worker
- Trap Configuration Fail
- Nothing happens if minsane &lt; maxclock &lt; minclock
- allow -4/-6 on restrict line with mask
- out-of-bound pointers in ctl_putsys and decode_bitflags
- Move ntp-kod to /var/lib/ntp, because /var/db is not a standard directory and causes problems for
  transactional updates.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1014172">SUSE bug 1014172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9042/">CVE-2016-9042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6451/">CVE-2017-6451</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6458/">CVE-2017-6458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6460/">CVE-2017-6460</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6462/">CVE-2017-6462</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6463/">CVE-2017-6463</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6464/">CVE-2017-6464</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517303" comment="ntp-4.2.8p10-60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517304" comment="ntp-doc-4.2.8p10-60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78044" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1014863" ref_url="https://bugzilla.suse.com/1014863" source="BUGZILLA"/>
		<reference ref_id="1018808" ref_url="https://bugzilla.suse.com/1018808" source="BUGZILLA"/>
		<reference ref_id="887877" ref_url="https://bugzilla.suse.com/887877" source="BUGZILLA"/>
		<reference ref_id="909695" ref_url="https://bugzilla.suse.com/909695" source="BUGZILLA"/>
		<reference ref_id="926974" ref_url="https://bugzilla.suse.com/926974" source="BUGZILLA"/>
		<reference ref_id="936032" ref_url="https://bugzilla.suse.com/936032" source="BUGZILLA"/>
		<reference ref_id="959495" ref_url="https://bugzilla.suse.com/959495" source="BUGZILLA"/>
		<reference ref_id="986630" ref_url="https://bugzilla.suse.com/986630" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4975" ref_url="https://www.suse.com/security/cve/CVE-2014-4975/" source="CVE"/>
		<reference ref_id="CVE-2015-1855" ref_url="https://www.suse.com/security/cve/CVE-2015-1855/" source="CVE"/>
		<reference ref_id="CVE-2015-3900" ref_url="https://www.suse.com/security/cve/CVE-2015-3900/" source="CVE"/>
		<reference ref_id="CVE-2015-7551" ref_url="https://www.suse.com/security/cve/CVE-2015-7551/" source="CVE"/>
		<reference ref_id="CVE-2016-2339" ref_url="https://www.suse.com/security/cve/CVE-2016-2339/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00024.html" source="SUSE-SU"/>
		<description>

This ruby2.1 update to version 2.1.9 fixes the following issues:

Security issues fixed:
- CVE-2016-2339: heap overflow vulnerability in the Fiddle::Function.new'initialize' (bsc#1018808)
- CVE-2015-7551: Unsafe tainted string usage in Fiddle and DL (bsc#959495)
- CVE-2015-3900: hostname validation does not work when fetching gems or making API requests (bsc#936032)
- CVE-2015-1855: Ruby'a OpenSSL extension suffers a vulnerability through overly permissive matching of
  hostnames (bsc#926974)
- CVE-2014-4975: off-by-one stack-based buffer overflow in the encodes() function (bsc#887877)

Bugfixes:
- SUSEconnect doesn't handle domain wildcards in no_proxy environment variable properly (bsc#1014863)
- Segmentation fault after pack &amp; ioctl &amp; unpack (bsc#909695)
- Ruby:HTTP Header injection in 'net/http' (bsc#986630)

ChangeLog:
- http://svn.ruby-lang.org/repos/ruby/tags/v2_1_9/ChangeLog
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-20"/>
	<updated date="2017-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1014863">SUSE bug 1014863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018808">SUSE bug 1018808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887877">SUSE bug 887877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909695">SUSE bug 909695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926974">SUSE bug 926974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936032">SUSE bug 936032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959495">SUSE bug 959495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986630">SUSE bug 986630</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-4975/">CVE-2014-4975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1855/">CVE-2015-1855</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3900/">CVE-2015-3900</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7551/">CVE-2015-7551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2339/">CVE-2016-2339</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517305" comment="libruby2_1-2_1-2.1.9-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517306" comment="ruby2.1-2.1.9-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517307" comment="ruby2.1-stdlib-2.1.9-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78045" version="1" class="patch">
	<metadata>
		<title>Security update for minicom (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1033783" ref_url="https://bugzilla.suse.com/1033783" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7467" ref_url="https://www.suse.com/security/cve/CVE-2017-7467/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002823.html" source="SUSE-SU"/>
		<description>

This update for minicom fixes the following issue:

This security issue was fixed:

- CVE-2017-7467: Invalid cursor coordinates and scroll regions could lead to code execution (bsc#1033783).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-21"/>
	<updated date="2017-04-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033783">SUSE bug 1033783</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7467/">CVE-2017-7467</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517308" comment="minicom-2.7-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78046" version="1" class="patch">
	<metadata>
		<title>Security update for tigervnc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1024929" ref_url="https://bugzilla.suse.com/1024929" source="BUGZILLA"/>
		<reference ref_id="1026833" ref_url="https://bugzilla.suse.com/1026833" source="BUGZILLA"/>
		<reference ref_id="1031045" ref_url="https://bugzilla.suse.com/1031045" source="BUGZILLA"/>
		<reference ref_id="1031875" ref_url="https://bugzilla.suse.com/1031875" source="BUGZILLA"/>
		<reference ref_id="1031877" ref_url="https://bugzilla.suse.com/1031877" source="BUGZILLA"/>
		<reference ref_id="1031879" ref_url="https://bugzilla.suse.com/1031879" source="BUGZILLA"/>
		<reference ref_id="1031886" ref_url="https://bugzilla.suse.com/1031886" source="BUGZILLA"/>
		<reference ref_id="1032272" ref_url="https://bugzilla.suse.com/1032272" source="BUGZILLA"/>
		<reference ref_id="1032880" ref_url="https://bugzilla.suse.com/1032880" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7392" ref_url="https://www.suse.com/security/cve/CVE-2017-7392/" source="CVE"/>
		<reference ref_id="CVE-2017-7393" ref_url="https://www.suse.com/security/cve/CVE-2017-7393/" source="CVE"/>
		<reference ref_id="CVE-2017-7394" ref_url="https://www.suse.com/security/cve/CVE-2017-7394/" source="CVE"/>
		<reference ref_id="CVE-2017-7395" ref_url="https://www.suse.com/security/cve/CVE-2017-7395/" source="CVE"/>
		<reference ref_id="CVE-2017-7396" ref_url="https://www.suse.com/security/cve/CVE-2017-7396/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002825.html" source="SUSE-SU"/>
		<description>

This update for tigervnc provides the several fixes.

These security issues were fixed:

- CVE-2017-7392, CVE-2017-7396: Client can cause leak in VNC server (bsc#1031886)
- CVE-2017-7395: Authenticated VNC client can crash VNC server (bsc#1031877)
- CVE-2017-7394: Client can crash or block VNC server (bsc#1031879)
- CVE-2017-7393: Authenticated client can cause double free in VNC server (bsc#1031875)
- Prevent buffer overflow in VNC client, allowing for crashing the client (bnc#1032880)

These non-security issues were fixed:

- Prevent client disconnection caused by invalid cursor manipulation. (bsc#1024929, bsc#1031045)
- Readd index.vnc. (bsc#1026833)
- Crop operations to visible screen. (bnc#1032272)  
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-22"/>
	<updated date="2017-04-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024929">SUSE bug 1024929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026833">SUSE bug 1026833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031045">SUSE bug 1031045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031875">SUSE bug 1031875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031877">SUSE bug 1031877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031879">SUSE bug 1031879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031886">SUSE bug 1031886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032272">SUSE bug 1032272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032880">SUSE bug 1032880</bugzilla>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7392/">CVE-2017-7392</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7393/">CVE-2017-7393</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7394/">CVE-2017-7394</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7395/">CVE-2017-7395</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7396/">CVE-2017-7396</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518604" comment="libXvnc1-1.6.0-18.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518605" comment="tigervnc-1.6.0-18.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518606" comment="xorg-x11-Xvnc-1.6.0-18.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78047" version="1" class="patch">
	<metadata>
		<title>Security update for zziplib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1024517" ref_url="https://bugzilla.suse.com/1024517" source="BUGZILLA"/>
		<reference ref_id="1024528" ref_url="https://bugzilla.suse.com/1024528" source="BUGZILLA"/>
		<reference ref_id="1024531" ref_url="https://bugzilla.suse.com/1024531" source="BUGZILLA"/>
		<reference ref_id="1024532" ref_url="https://bugzilla.suse.com/1024532" source="BUGZILLA"/>
		<reference ref_id="1024533" ref_url="https://bugzilla.suse.com/1024533" source="BUGZILLA"/>
		<reference ref_id="1024534" ref_url="https://bugzilla.suse.com/1024534" source="BUGZILLA"/>
		<reference ref_id="1024535" ref_url="https://bugzilla.suse.com/1024535" source="BUGZILLA"/>
		<reference ref_id="1024536" ref_url="https://bugzilla.suse.com/1024536" source="BUGZILLA"/>
		<reference ref_id="1024537" ref_url="https://bugzilla.suse.com/1024537" source="BUGZILLA"/>
		<reference ref_id="1024539" ref_url="https://bugzilla.suse.com/1024539" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5974" ref_url="https://www.suse.com/security/cve/CVE-2017-5974/" source="CVE"/>
		<reference ref_id="CVE-2017-5975" ref_url="https://www.suse.com/security/cve/CVE-2017-5975/" source="CVE"/>
		<reference ref_id="CVE-2017-5976" ref_url="https://www.suse.com/security/cve/CVE-2017-5976/" source="CVE"/>
		<reference ref_id="CVE-2017-5977" ref_url="https://www.suse.com/security/cve/CVE-2017-5977/" source="CVE"/>
		<reference ref_id="CVE-2017-5978" ref_url="https://www.suse.com/security/cve/CVE-2017-5978/" source="CVE"/>
		<reference ref_id="CVE-2017-5979" ref_url="https://www.suse.com/security/cve/CVE-2017-5979/" source="CVE"/>
		<reference ref_id="CVE-2017-5980" ref_url="https://www.suse.com/security/cve/CVE-2017-5980/" source="CVE"/>
		<reference ref_id="CVE-2017-5981" ref_url="https://www.suse.com/security/cve/CVE-2017-5981/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002826.html" source="SUSE-SU"/>
		<description>

This update for zziplib fixes the following issues:

Secuirty issues fixed:
- CVE-2017-5974: heap-based buffer overflow in __zzip_get32 (fetch.c) (bsc#1024517)
- CVE-2017-5975: heap-based buffer overflow in __zzip_get64 (fetch.c) (bsc#1024528)
- CVE-2017-5976: heap-based buffer overflow in zzip_mem_entry_extra_block (memdisk.c) (bsc#1024531)
- CVE-2017-5977: invalid memory read in zzip_mem_entry_extra_block (memdisk.c) (bsc#1024534)
- CVE-2017-5978: out of bounds read in zzip_mem_entry_new (memdisk.c) (bsc#1024533)
- CVE-2017-5979: NULL pointer dereference in prescan_entry (fseeko.c) (bsc#1024535)
- CVE-2017-5980: NULL pointer dereference in zzip_mem_entry_new (memdisk.c) (bsc#1024536)
- CVE-2017-5981: assertion failure in seeko.c (bsc#1024539)
- NULL pointer dereference in main (unzzipcat-mem.c) (bsc#1024532)
- NULL pointer dereference in main (unzzipcat.c) (bsc#1024537)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-24"/>
	<updated date="2017-04-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024517">SUSE bug 1024517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024528">SUSE bug 1024528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024531">SUSE bug 1024531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024532">SUSE bug 1024532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024533">SUSE bug 1024533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024534">SUSE bug 1024534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024535">SUSE bug 1024535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024536">SUSE bug 1024536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024537">SUSE bug 1024537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024539">SUSE bug 1024539</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5974/">CVE-2017-5974</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5975/">CVE-2017-5975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5976/">CVE-2017-5976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5977/">CVE-2017-5977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5978/">CVE-2017-5978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5979/">CVE-2017-5979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5980/">CVE-2017-5980</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5981/">CVE-2017-5981</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517311" comment="libzzip-0-13-0.13.62-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78048" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump, libpcap (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1020940" ref_url="https://bugzilla.suse.com/1020940" source="BUGZILLA"/>
		<reference ref_id="1035686" ref_url="https://bugzilla.suse.com/1035686" source="BUGZILLA"/>
		<reference ref_id="905870" ref_url="https://bugzilla.suse.com/905870" source="BUGZILLA"/>
		<reference ref_id="905871" ref_url="https://bugzilla.suse.com/905871" source="BUGZILLA"/>
		<reference ref_id="905872" ref_url="https://bugzilla.suse.com/905872" source="BUGZILLA"/>
		<reference ref_id="922220" ref_url="https://bugzilla.suse.com/922220" source="BUGZILLA"/>
		<reference ref_id="922221" ref_url="https://bugzilla.suse.com/922221" source="BUGZILLA"/>
		<reference ref_id="922222" ref_url="https://bugzilla.suse.com/922222" source="BUGZILLA"/>
		<reference ref_id="922223" ref_url="https://bugzilla.suse.com/922223" source="BUGZILLA"/>
		<reference ref_id="927637" ref_url="https://bugzilla.suse.com/927637" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8767" ref_url="https://www.suse.com/security/cve/CVE-2014-8767/" source="CVE"/>
		<reference ref_id="CVE-2014-8768" ref_url="https://www.suse.com/security/cve/CVE-2014-8768/" source="CVE"/>
		<reference ref_id="CVE-2014-8769" ref_url="https://www.suse.com/security/cve/CVE-2014-8769/" source="CVE"/>
		<reference ref_id="CVE-2015-0261" ref_url="https://www.suse.com/security/cve/CVE-2015-0261/" source="CVE"/>
		<reference ref_id="CVE-2015-2153" ref_url="https://www.suse.com/security/cve/CVE-2015-2153/" source="CVE"/>
		<reference ref_id="CVE-2015-2154" ref_url="https://www.suse.com/security/cve/CVE-2015-2154/" source="CVE"/>
		<reference ref_id="CVE-2015-2155" ref_url="https://www.suse.com/security/cve/CVE-2015-2155/" source="CVE"/>
		<reference ref_id="CVE-2015-3138" ref_url="https://www.suse.com/security/cve/CVE-2015-3138/" source="CVE"/>
		<reference ref_id="CVE-2016-7922" ref_url="https://www.suse.com/security/cve/CVE-2016-7922/" source="CVE"/>
		<reference ref_id="CVE-2016-7923" ref_url="https://www.suse.com/security/cve/CVE-2016-7923/" source="CVE"/>
		<reference ref_id="CVE-2016-7924" ref_url="https://www.suse.com/security/cve/CVE-2016-7924/" source="CVE"/>
		<reference ref_id="CVE-2016-7925" ref_url="https://www.suse.com/security/cve/CVE-2016-7925/" source="CVE"/>
		<reference ref_id="CVE-2016-7926" ref_url="https://www.suse.com/security/cve/CVE-2016-7926/" source="CVE"/>
		<reference ref_id="CVE-2016-7927" ref_url="https://www.suse.com/security/cve/CVE-2016-7927/" source="CVE"/>
		<reference ref_id="CVE-2016-7928" ref_url="https://www.suse.com/security/cve/CVE-2016-7928/" source="CVE"/>
		<reference ref_id="CVE-2016-7929" ref_url="https://www.suse.com/security/cve/CVE-2016-7929/" source="CVE"/>
		<reference ref_id="CVE-2016-7930" ref_url="https://www.suse.com/security/cve/CVE-2016-7930/" source="CVE"/>
		<reference ref_id="CVE-2016-7931" ref_url="https://www.suse.com/security/cve/CVE-2016-7931/" source="CVE"/>
		<reference ref_id="CVE-2016-7932" ref_url="https://www.suse.com/security/cve/CVE-2016-7932/" source="CVE"/>
		<reference ref_id="CVE-2016-7933" ref_url="https://www.suse.com/security/cve/CVE-2016-7933/" source="CVE"/>
		<reference ref_id="CVE-2016-7934" ref_url="https://www.suse.com/security/cve/CVE-2016-7934/" source="CVE"/>
		<reference ref_id="CVE-2016-7935" ref_url="https://www.suse.com/security/cve/CVE-2016-7935/" source="CVE"/>
		<reference ref_id="CVE-2016-7936" ref_url="https://www.suse.com/security/cve/CVE-2016-7936/" source="CVE"/>
		<reference ref_id="CVE-2016-7937" ref_url="https://www.suse.com/security/cve/CVE-2016-7937/" source="CVE"/>
		<reference ref_id="CVE-2016-7938" ref_url="https://www.suse.com/security/cve/CVE-2016-7938/" source="CVE"/>
		<reference ref_id="CVE-2016-7939" ref_url="https://www.suse.com/security/cve/CVE-2016-7939/" source="CVE"/>
		<reference ref_id="CVE-2016-7940" ref_url="https://www.suse.com/security/cve/CVE-2016-7940/" source="CVE"/>
		<reference ref_id="CVE-2016-7973" ref_url="https://www.suse.com/security/cve/CVE-2016-7973/" source="CVE"/>
		<reference ref_id="CVE-2016-7974" ref_url="https://www.suse.com/security/cve/CVE-2016-7974/" source="CVE"/>
		<reference ref_id="CVE-2016-7975" ref_url="https://www.suse.com/security/cve/CVE-2016-7975/" source="CVE"/>
		<reference ref_id="CVE-2016-7983" ref_url="https://www.suse.com/security/cve/CVE-2016-7983/" source="CVE"/>
		<reference ref_id="CVE-2016-7984" ref_url="https://www.suse.com/security/cve/CVE-2016-7984/" source="CVE"/>
		<reference ref_id="CVE-2016-7985" ref_url="https://www.suse.com/security/cve/CVE-2016-7985/" source="CVE"/>
		<reference ref_id="CVE-2016-7986" ref_url="https://www.suse.com/security/cve/CVE-2016-7986/" source="CVE"/>
		<reference ref_id="CVE-2016-7992" ref_url="https://www.suse.com/security/cve/CVE-2016-7992/" source="CVE"/>
		<reference ref_id="CVE-2016-7993" ref_url="https://www.suse.com/security/cve/CVE-2016-7993/" source="CVE"/>
		<reference ref_id="CVE-2016-8574" ref_url="https://www.suse.com/security/cve/CVE-2016-8574/" source="CVE"/>
		<reference ref_id="CVE-2016-8575" ref_url="https://www.suse.com/security/cve/CVE-2016-8575/" source="CVE"/>
		<reference ref_id="CVE-2017-5202" ref_url="https://www.suse.com/security/cve/CVE-2017-5202/" source="CVE"/>
		<reference ref_id="CVE-2017-5203" ref_url="https://www.suse.com/security/cve/CVE-2017-5203/" source="CVE"/>
		<reference ref_id="CVE-2017-5204" ref_url="https://www.suse.com/security/cve/CVE-2017-5204/" source="CVE"/>
		<reference ref_id="CVE-2017-5205" ref_url="https://www.suse.com/security/cve/CVE-2017-5205/" source="CVE"/>
		<reference ref_id="CVE-2017-5341" ref_url="https://www.suse.com/security/cve/CVE-2017-5341/" source="CVE"/>
		<reference ref_id="CVE-2017-5342" ref_url="https://www.suse.com/security/cve/CVE-2017-5342/" source="CVE"/>
		<reference ref_id="CVE-2017-5482" ref_url="https://www.suse.com/security/cve/CVE-2017-5482/" source="CVE"/>
		<reference ref_id="CVE-2017-5483" ref_url="https://www.suse.com/security/cve/CVE-2017-5483/" source="CVE"/>
		<reference ref_id="CVE-2017-5484" ref_url="https://www.suse.com/security/cve/CVE-2017-5484/" source="CVE"/>
		<reference ref_id="CVE-2017-5485" ref_url="https://www.suse.com/security/cve/CVE-2017-5485/" source="CVE"/>
		<reference ref_id="CVE-2017-5486" ref_url="https://www.suse.com/security/cve/CVE-2017-5486/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<description>

This update for tcpdump to version 4.9.0 and libpcap to version 1.8.1 fixes the several issues.

These security issues were fixed in tcpdump:

- CVE-2016-7922: The AH parser in tcpdump had a buffer overflow in print-ah.c:ah_print() (bsc#1020940).
- CVE-2016-7923: The ARP parser in tcpdump had a buffer overflow in print-arp.c:arp_print() (bsc#1020940).
- CVE-2016-7924: The ATM parser in tcpdump had a buffer overflow in print-atm.c:oam_print() (bsc#1020940).
- CVE-2016-7925: The compressed SLIP parser in tcpdump had a buffer overflow in print-sl.c:sl_if_print() (bsc#1020940).
- CVE-2016-7926: The Ethernet parser in tcpdump had a buffer overflow in print-ether.c:ethertype_print() (bsc#1020940).
- CVE-2016-7927: The IEEE 802.11 parser in tcpdump had a buffer overflow in print-802_11.c:ieee802_11_radio_print() (bsc#1020940).
- CVE-2016-7928: The IPComp parser in tcpdump had a buffer overflow in print-ipcomp.c:ipcomp_print() (bsc#1020940).
- CVE-2016-7929: The Juniper PPPoE ATM parser in tcpdump had a buffer overflow in print-juniper.c:juniper_parse_header() (bsc#1020940).
- CVE-2016-7930: The LLC/SNAP parser in tcpdump had a buffer overflow in print-llc.c:llc_print() (bsc#1020940).
- CVE-2016-7931: The MPLS parser in tcpdump had a buffer overflow in print-mpls.c:mpls_print() (bsc#1020940).
- CVE-2016-7932: The PIM parser in tcpdump had a buffer overflow in print-pim.c:pimv2_check_checksum() (bsc#1020940).
- CVE-2016-7933: The PPP parser in tcpdump had a buffer overflow in print-ppp.c:ppp_hdlc_if_print() (bsc#1020940).
- CVE-2016-7934: The RTCP parser in tcpdump had a buffer overflow in print-udp.c:rtcp_print() (bsc#1020940).
- CVE-2016-7935: The RTP parser in tcpdump had a buffer overflow in print-udp.c:rtp_print() (bsc#1020940).
- CVE-2016-7936: The UDP parser in tcpdump had a buffer overflow in print-udp.c:udp_print() (bsc#1020940).
- CVE-2016-7937: The VAT parser in tcpdump had a buffer overflow in print-udp.c:vat_print() (bsc#1020940).
- CVE-2016-7938: The ZeroMQ parser in tcpdump had an integer overflow in print-zeromq.c:zmtp1_print_frame() (bsc#1020940).
- CVE-2016-7939: The GRE parser in tcpdump had a buffer overflow in print-gre.c, multiple functions (bsc#1020940).
- CVE-2016-7940: The STP parser in tcpdump had a buffer overflow in print-stp.c, multiple functions (bsc#1020940).
- CVE-2016-7973: The AppleTalk parser in tcpdump had a buffer overflow in print-atalk.c, multiple functions (bsc#1020940).
- CVE-2016-7974: The IP parser in tcpdump had a buffer overflow in print-ip.c, multiple functions (bsc#1020940).
- CVE-2016-7975: The TCP parser in tcpdump had a buffer overflow in print-tcp.c:tcp_print() (bsc#1020940).
- CVE-2016-7983: The BOOTP parser in tcpdump had a buffer overflow in print-bootp.c:bootp_print() (bsc#1020940).
- CVE-2016-7984: The TFTP parser in tcpdump had a buffer overflow in print-tftp.c:tftp_print() (bsc#1020940).
- CVE-2016-7985: The CALM FAST parser in tcpdump had a buffer overflow in print-calm-fast.c:calm_fast_print() (bsc#1020940).
- CVE-2016-7986: The GeoNetworking parser in tcpdump had a buffer overflow in print-geonet.c, multiple functions (bsc#1020940).
- CVE-2016-7992: The Classical IP over ATM parser in tcpdump had a buffer overflow in print-cip.c:cip_if_print() (bsc#1020940).
- CVE-2016-7993: A bug in util-print.c:relts_print() in tcpdump could cause a buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP, lightweight resolver protocol, PIM) (bsc#1020940).
- CVE-2016-8574: The FRF.15 parser in tcpdump had a buffer overflow in print-fr.c:frf15_print() (bsc#1020940).
- CVE-2016-8575: The Q.933 parser in tcpdump had a buffer overflow in print-fr.c:q933_print(), a different vulnerability than CVE-2017-5482 (bsc#1020940).
- CVE-2017-5202: The ISO CLNS parser in tcpdump had a buffer overflow in print-isoclns.c:clnp_print() (bsc#1020940).
- CVE-2017-5203: The BOOTP parser in tcpdump had a buffer overflow in print-bootp.c:bootp_print() (bsc#1020940).
- CVE-2017-5204: The IPv6 parser in tcpdump had a buffer overflow in print-ip6.c:ip6_print() (bsc#1020940).
- CVE-2017-5205: The ISAKMP parser in tcpdump had a buffer overflow in print-isakmp.c:ikev2_e_print() (bsc#1020940).
- CVE-2017-5341: The OTV parser in tcpdump had a buffer overflow in print-otv.c:otv_print() (bsc#1020940).
- CVE-2017-5342: In tcpdump a bug in multiple protocol parsers (Geneve, GRE, NSH, OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in print-ether.c:ether_print() (bsc#1020940).
- CVE-2017-5482: The Q.933 parser in tcpdump had a buffer overflow in print-fr.c:q933_print(), a different vulnerability than CVE-2016-8575 (bsc#1020940).
- CVE-2017-5483: The SNMP parser in tcpdump had a buffer overflow in print-snmp.c:asn1_parse() (bsc#1020940).
- CVE-2017-5484: The ATM parser in tcpdump had a buffer overflow in print-atm.c:sig_print() (bsc#1020940).
- CVE-2017-5485: The ISO CLNS parser in tcpdump had a buffer overflow in addrtoname.c:lookup_nsap() (bsc#1020940).
- CVE-2017-5486: The ISO CLNS parser in tcpdump had a buffer overflow in print-isoclns.c:clnp_print() (bsc#1020940).
- CVE-2015-3138: Fixed potential denial of service in print-wb.c (bsc#927637).
- CVE-2015-0261: Integer signedness error in the mobility_opt_print function in the IPv6 mobility printer in tcpdump allowed remote attackers to cause a denial of service (out-of-bounds read and crash) or possibly execute arbitrary code via a negative length value (bsc#922220).
- CVE-2015-2153: The rpki_rtr_pdu_print function in print-rpki-rtr.c in the TCP printer in tcpdump allowed remote attackers to cause a denial of service (out-of-bounds read or write and crash) via a crafted header length in an RPKI-RTR Protocol Data Unit (PDU) (bsc#922221).
- CVE-2015-2154: The osi_print_cksum function in print-isoclns.c in the ethernet printer in tcpdump allowed remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) length, (2) offset, or (3) base pointer checksum value (bsc#922222).
- CVE-2015-2155: The force printer in tcpdump allowed remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors (bsc#922223).
- CVE-2014-8767: Integer underflow in the olsr_print function in tcpdump 3.9.6 when in verbose mode, allowed remote attackers to cause a denial of service (crash) via a crafted length value in an OLSR frame (bsc#905870).
- CVE-2014-8768: Multiple Integer underflows in the geonet_print function in tcpdump when run in verbose mode, allowed remote attackers to cause a denial of service (segmentation fault and crash) via a crafted length value in a Geonet frame (bsc#905871).
- CVE-2014-8769: tcpdump might have allowed remote attackers to obtain sensitive information from memory or cause a denial of service (packet loss or segmentation fault) via a crafted Ad hoc On-Demand Distance Vector (AODV) packet, which triggers an out-of-bounds memory access (bsc#905872).

These non-security issues were fixed in tcpdump:

- PPKI to Router Protocol: Fix Segmentation Faults and other problems
- RPKI to Router Protocol: print strings with fn_printn()
- Added a short option '#', same as long option '--number'
- nflog, mobile, forces, pptp, AODV, AHCP, IPv6, OSPFv4, RPL, DHCPv6 enhancements/fixes
- M3UA decode added.
- Added bittok2str().
- A number of unaligned access faults fixed
- The -A flag does not consider CR to be printable anymore
- fx.lebail took over coverity baby sitting
- Default snapshot size increased to 256K for accomodate USB captures

These non-security issues were fixed in libpcap:

- Provide a -devel-static subpackage that contains the static
  libraries and all the extra dependencies which are not needed
  for dynamic linking.
- Fix handling of packet count in the TPACKET_V3 inner loop
- Filter out duplicate looped back CAN frames.
- Fix the handling of loopback filters for IPv6 packets.
- Add a link-layer header type for RDS (IEC 62106) groups.
- Handle all CAN captures with pcap-linux.c, in cooked mode.
- Removes the need for the 'host-endian' link-layer header type.
- Have separate DLTs for big-endian and host-endian SocketCAN headers.
- Properly check for sock_recv() errors.
- Re-impose some of Winsock's limitations on sock_recv().
- Replace sprintf() with pcap_snprintf().
- Fix signature of pcap_stats_ex_remote().
- Have rpcap_remoteact_getsock() return a SOCKET and supply an 'is active' flag.
- Clean up {DAG, Septel, Myricom SNF}-only builds.
- pcap_create_interface() needs the interface name on Linux.
- Clean up hardware time stamp support: the 'any' device does not support any time stamp types.
- Recognize 802.1ad nested VLAN tag in vlan filter.
- Support for filtering Geneve encapsulated packets.
- Fix handling of zones for BPF on Solaris
- Added bpf_filter1() with extensions
- EBUSY can now be returned by SNFv3 code.
- Don't crash on filters testing a non-existent link-layer type field.
- Fix sending in non-blocking mode on Linux with memory-mapped capture.
- Fix timestamps when reading pcap-ng files on big-endian machines.
- Fixes for byte order issues with NFLOG captures
- Handle using cooked mode for DLT_NETLINK in activate_new().
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-26"/>
	<updated date="2017-04-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035686">SUSE bug 1035686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905870">SUSE bug 905870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905871">SUSE bug 905871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905872">SUSE bug 905872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922220">SUSE bug 922220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922221">SUSE bug 922221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922222">SUSE bug 922222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922223">SUSE bug 922223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927637">SUSE bug 927637</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8767/">CVE-2014-8767</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8768/">CVE-2014-8768</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8769/">CVE-2014-8769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0261/">CVE-2015-0261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2153/">CVE-2015-2153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2154/">CVE-2015-2154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2155/">CVE-2015-2155</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3138/">CVE-2015-3138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7922/">CVE-2016-7922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7923/">CVE-2016-7923</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7924/">CVE-2016-7924</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7925/">CVE-2016-7925</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7926/">CVE-2016-7926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7927/">CVE-2016-7927</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7928/">CVE-2016-7928</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7929/">CVE-2016-7929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7930/">CVE-2016-7930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7931/">CVE-2016-7931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7932/">CVE-2016-7932</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7933/">CVE-2016-7933</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7934/">CVE-2016-7934</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7935/">CVE-2016-7935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7936/">CVE-2016-7936</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7937/">CVE-2016-7937</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7938/">CVE-2016-7938</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7939/">CVE-2016-7939</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7940/">CVE-2016-7940</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7973/">CVE-2016-7973</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7974/">CVE-2016-7974</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7975/">CVE-2016-7975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7983/">CVE-2016-7983</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7984/">CVE-2016-7984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7985/">CVE-2016-7985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7986/">CVE-2016-7986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7992/">CVE-2016-7992</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7993/">CVE-2016-7993</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8574/">CVE-2016-8574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8575/">CVE-2016-8575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5202/">CVE-2017-5202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5203/">CVE-2017-5203</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5204/">CVE-2017-5204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5205/">CVE-2017-5205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5341/">CVE-2017-5341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5342/">CVE-2017-5342</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5482/">CVE-2017-5482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5483/">CVE-2017-5483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5484/">CVE-2017-5484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5485/">CVE-2017-5485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5486/">CVE-2017-5486</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517313" comment="libpcap1-1.8.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517314" comment="libpcap1-32bit-1.8.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517315" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78049" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1018128" ref_url="https://bugzilla.suse.com/1018128" source="BUGZILLA"/>
		<reference ref_id="1030263" ref_url="https://bugzilla.suse.com/1030263" source="BUGZILLA"/>
		<reference ref_id="1032114" ref_url="https://bugzilla.suse.com/1032114" source="BUGZILLA"/>
		<reference ref_id="1032120" ref_url="https://bugzilla.suse.com/1032120" source="BUGZILLA"/>
		<reference ref_id="1036453" ref_url="https://bugzilla.suse.com/1036453" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10220" ref_url="https://www.suse.com/security/cve/CVE-2016-10220/" source="CVE"/>
		<reference ref_id="CVE-2016-9601" ref_url="https://www.suse.com/security/cve/CVE-2016-9601/" source="CVE"/>
		<reference ref_id="CVE-2017-5951" ref_url="https://www.suse.com/security/cve/CVE-2017-5951/" source="CVE"/>
		<reference ref_id="CVE-2017-7207" ref_url="https://www.suse.com/security/cve/CVE-2017-7207/" source="CVE"/>
		<reference ref_id="CVE-2017-8291" ref_url="https://www.suse.com/security/cve/CVE-2017-8291/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00037.html" source="SUSE-SU"/>
		<description>

This update for ghostscript fixes the following security vulnerabilities:

CVE-2017-8291: A remote command execution and a -dSAFER bypass via a crafted .eps document were
exploited in the wild. (bsc#1036453)

CVE-2016-9601: An integer overflow in the bundled jbig2dec library could have been misused to cause
a Denial-of-Service. (bsc#1018128)

CVE-2016-10220: A NULL pointer dereference in the PDF Transparency module allowed remote attackers
to cause a Denial-of-Service. (bsc#1032120)

CVE-2017-5951: A NULL pointer dereference allowed remote attackers to cause a denial of service
via a crafted PostScript document. (bsc#1032114)

CVE-2017-7207: A NULL pointer dereference allowed remote attackers to cause a denial of service
via a crafted PostScript document. (bsc#1030263)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-28"/>
	<updated date="2017-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1018128">SUSE bug 1018128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030263">SUSE bug 1030263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032114">SUSE bug 1032114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032120">SUSE bug 1032120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10220/">CVE-2016-10220</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9601/">CVE-2016-9601</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5951/">CVE-2017-5951</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-7207/">CVE-2017-7207</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-8291/">CVE-2017-8291</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517316" comment="ghostscript-9.15-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517317" comment="ghostscript-x11-9.15-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78050" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1022703" ref_url="https://bugzilla.suse.com/1022703" source="BUGZILLA"/>
		<reference ref_id="1028655" ref_url="https://bugzilla.suse.com/1028655" source="BUGZILLA"/>
		<reference ref_id="1029827" ref_url="https://bugzilla.suse.com/1029827" source="BUGZILLA"/>
		<reference ref_id="1030144" ref_url="https://bugzilla.suse.com/1030144" source="BUGZILLA"/>
		<reference ref_id="1034843" ref_url="https://bugzilla.suse.com/1034843" source="BUGZILLA"/>
		<reference ref_id="1034844" ref_url="https://bugzilla.suse.com/1034844" source="BUGZILLA"/>
		<reference ref_id="1034994" ref_url="https://bugzilla.suse.com/1034994" source="BUGZILLA"/>
		<reference ref_id="1036146" ref_url="https://bugzilla.suse.com/1036146" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9603" ref_url="https://www.suse.com/security/cve/CVE-2016-9603/" source="CVE"/>
		<reference ref_id="CVE-2017-7718" ref_url="https://www.suse.com/security/cve/CVE-2017-7718/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00003.html" source="SUSE-SU"/>
		<description>

This update for xen fixes several issues.

These security issues were fixed:

- A malicious 64-bit PV guest may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks by placing a IRET hypercall in the middle of a multicall batch (XSA-213, bsc#1034843)
- A malicious pair of guests may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks because of a missing check when transfering pages via GNTTABOP_transfer (XSA-214, bsc#1034844).
- CVE-2017-7718: hw/display/cirrus_vga_rop.h allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions (bsc#1034994).
- CVE-2016-9603: A privileged user within the guest VM could have caused a heap overflow in the device model process, potentially escalating their privileges to that of the device model process (bsc#1028655)

These non-security issues were fixed:

- bsc#1029827: Additional xenstore patch
- bsc#1036146: Xen VM dumped core to wrong path
- bsc#1022703: Prevent Xen HVM guest with OVMF to hang with unattached CDRom
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-02"/>
	<updated date="2017-05-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1022703">SUSE bug 1022703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028655">SUSE bug 1028655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029827">SUSE bug 1029827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030144">SUSE bug 1030144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034843">SUSE bug 1034843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034844">SUSE bug 1034844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034994">SUSE bug 1034994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036146">SUSE bug 1036146</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9603/">CVE-2016-9603</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7718/">CVE-2017-7718</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518607" comment="xen-4.7.2_04-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518608" comment="xen-libs-4.7.2_04-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518609" comment="xen-libs-32bit-4.7.2_04-39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78051" version="1" class="patch">
	<metadata>
		<title>Security update for graphite2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1035204" ref_url="https://bugzilla.suse.com/1035204" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00008.html" source="SUSE-SU"/>
		<description>

This update for graphite2 fixes one issue.

This security issues was fixed:

- CVE-2017-5436: An out-of-bounds write triggered with a maliciously crafted Graphite font could lead to a crash or potentially code execution (bsc#1035204).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-02"/>
	<updated date="2017-05-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1035204">SUSE bug 1035204</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517322" comment="libgraphite2-3-1.3.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517323" comment="libgraphite2-3-32bit-1.3.1-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78052" version="1" class="patch">
	<metadata>
		<title>Security update for apparmor (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1000201" ref_url="https://bugzilla.suse.com/1000201" source="BUGZILLA"/>
		<reference ref_id="1016259" ref_url="https://bugzilla.suse.com/1016259" source="BUGZILLA"/>
		<reference ref_id="1022610" ref_url="https://bugzilla.suse.com/1022610" source="BUGZILLA"/>
		<reference ref_id="1029696" ref_url="https://bugzilla.suse.com/1029696" source="BUGZILLA"/>
		<reference ref_id="1031529" ref_url="https://bugzilla.suse.com/1031529" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6507" ref_url="https://www.suse.com/security/cve/CVE-2017-6507/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002841.html" source="SUSE-SU"/>
		<description>

This update for apparmor provides the following fixes:

This security issue was fixed:

- CVE-2017-6507: Preserve unknown profiles when reloading apparmor.service (bsc#1029696)

These non-security issues were fixed:

- Add tunables/kernelvars abstraction. (bsc#1031529)
- Update flags of ntpd profile. (bsc#1022610)
- Force AppArmor to start after /var/lib mounts. (bsc#1016259)
- Update mlmmj profiles. (bsc#1000201)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-03"/>
	<updated date="2017-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000201">SUSE bug 1000201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016259">SUSE bug 1016259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022610">SUSE bug 1022610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029696">SUSE bug 1029696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031529">SUSE bug 1031529</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6507/">CVE-2017-6507</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517324" comment="apparmor-docs-2.8.2-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517325" comment="apparmor-parser-2.8.2-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517326" comment="apparmor-profiles-2.8.2-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517327" comment="apparmor-utils-2.8.2-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517328" comment="libapparmor1-2.8.2-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517329" comment="libapparmor1-32bit-2.8.2-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517330" comment="pam_apparmor-2.8.2-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517331" comment="pam_apparmor-32bit-2.8.2-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517332" comment="perl-apparmor-2.8.2-54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78053" version="1" class="patch">
	<metadata>
		<title>Security update for firebird (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1023990" ref_url="https://bugzilla.suse.com/1023990" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6369" ref_url="https://www.suse.com/security/cve/CVE-2017-6369/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002843.html" source="SUSE-SU"/>
		<description>

This update for firebird fixes the following security issues:

- CVE-2017-6369: Insufficient checks in the UDF subsystem in Firebird allowed remote authenticated users to execute code by using a 'system' entrypoint from fbudf.so (bsc#1023990).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-03"/>
	<updated date="2017-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023990">SUSE bug 1023990</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6369/">CVE-2017-6369</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517333" comment="libfbembed2_5-2.5.2.26539-15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78054" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1007454" ref_url="https://bugzilla.suse.com/1007454" source="BUGZILLA"/>
		<reference ref_id="1008519" ref_url="https://bugzilla.suse.com/1008519" source="BUGZILLA"/>
		<reference ref_id="1009109" ref_url="https://bugzilla.suse.com/1009109" source="BUGZILLA"/>
		<reference ref_id="1013285" ref_url="https://bugzilla.suse.com/1013285" source="BUGZILLA"/>
		<reference ref_id="1013341" ref_url="https://bugzilla.suse.com/1013341" source="BUGZILLA"/>
		<reference ref_id="1013764" ref_url="https://bugzilla.suse.com/1013764" source="BUGZILLA"/>
		<reference ref_id="1013767" ref_url="https://bugzilla.suse.com/1013767" source="BUGZILLA"/>
		<reference ref_id="1014109" ref_url="https://bugzilla.suse.com/1014109" source="BUGZILLA"/>
		<reference ref_id="1014110" ref_url="https://bugzilla.suse.com/1014110" source="BUGZILLA"/>
		<reference ref_id="1014111" ref_url="https://bugzilla.suse.com/1014111" source="BUGZILLA"/>
		<reference ref_id="1014112" ref_url="https://bugzilla.suse.com/1014112" source="BUGZILLA"/>
		<reference ref_id="1014256" ref_url="https://bugzilla.suse.com/1014256" source="BUGZILLA"/>
		<reference ref_id="1014514" ref_url="https://bugzilla.suse.com/1014514" source="BUGZILLA"/>
		<reference ref_id="1016779" ref_url="https://bugzilla.suse.com/1016779" source="BUGZILLA"/>
		<reference ref_id="937125" ref_url="https://bugzilla.suse.com/937125" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9102" ref_url="https://www.suse.com/security/cve/CVE-2016-9102/" source="CVE"/>
		<reference ref_id="CVE-2016-9103" ref_url="https://www.suse.com/security/cve/CVE-2016-9103/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9776" ref_url="https://www.suse.com/security/cve/CVE-2016-9776/" source="CVE"/>
		<reference ref_id="CVE-2016-9845" ref_url="https://www.suse.com/security/cve/CVE-2016-9845/" source="CVE"/>
		<reference ref_id="CVE-2016-9846" ref_url="https://www.suse.com/security/cve/CVE-2016-9846/" source="CVE"/>
		<reference ref_id="CVE-2016-9907" ref_url="https://www.suse.com/security/cve/CVE-2016-9907/" source="CVE"/>
		<reference ref_id="CVE-2016-9908" ref_url="https://www.suse.com/security/cve/CVE-2016-9908/" source="CVE"/>
		<reference ref_id="CVE-2016-9911" ref_url="https://www.suse.com/security/cve/CVE-2016-9911/" source="CVE"/>
		<reference ref_id="CVE-2016-9912" ref_url="https://www.suse.com/security/cve/CVE-2016-9912/" source="CVE"/>
		<reference ref_id="CVE-2016-9913" ref_url="https://www.suse.com/security/cve/CVE-2016-9913/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00017.html" source="SUSE-SU"/>
		<description>

qemu was updated to fix several issues.

These security issues were fixed:

- CVE-2016-9102: Memory leak in the v9fs_xattrcreate function in hw/9pfs/9p.c in allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) via a large number of Txattrcreate messages with the same fid number (bsc#1014256).
- CVE-2016-9103: The v9fs_xattrcreate function in hw/9pfs/9p.c in allowed local guest OS administrators to obtain sensitive host heap memory information by reading xattribute values writing to them (bsc#1007454).
- CVE-2016-9381: Improper processing of shared rings allowing guest administrators take over the qemu process, elevating their privilege to that of the qemu process (bsc#1009109)
- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013285).
- CVE-2016-9845: The Virtio GPU Device emulator support as vulnerable to an information leakage issue while processing the 'VIRTIO_GPU_CMD_GET_CAPSET_INFO' command. A guest user/process could have used this flaw to leak contents of the host memory (bsc#1013767).
- CVE-2016-9846: The Virtio GPU Device emulator support was vulnerable to a memory leakage issue while updating the cursor data in update_cursor_data_virgl. A guest user/process could have used this flaw to leak host memory bytes, resulting in DoS for the host (bsc#1013764).
- CVE-2016-9907: The USB redirector usb-guest support was vulnerable to a memory leakage flaw when destroying the USB redirector in 'usbredir_handle_destroy'.  A guest user/process could have used this issue to leak host memory, resulting in DoS for a host (bsc#1014109).
- CVE-2016-9908: The Virtio GPU Device emulator support was vulnerable to an information leakage issue while processing the 'VIRTIO_GPU_CMD_GET_CAPSET' command. A guest user/process could have used this flaw to leak contents of the host memory (bsc#1014514).
- CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in 'ehci_init_transfer'. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014111).
- CVE-2016-9912: The Virtio GPU Device emulator support was vulnerable to a memory leakage issue while destroying gpu resource object in 'virtio_gpu_resource_destroy'. A guest user/process could have used this flaw to leak host memory bytes, resulting in DoS for the host (bsc#1014112).
- CVE-2016-9913: VirtFS was vulnerable to memory leakage issue via its '9p-handle' or '9p-proxy' backend drivers. A privileged user inside guest could have used this flaw to leak host memory, thus affecting other services on the host and/or potentially crash the Qemu process on the host (bsc#1014110).

These non-security issues were fixed:

- Fixed uint64 property parsing and add regression tests (bsc#937125)
- Added a man page for kvm_stat
- Fix crash in vte (bsc#1008519)
- Various upstream commits targeted towards stable releases (bsc#1013341)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-13"/>
	<updated date="2017-01-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1007454">SUSE bug 1007454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008519">SUSE bug 1008519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009109">SUSE bug 1009109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013285">SUSE bug 1013285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013341">SUSE bug 1013341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013764">SUSE bug 1013764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013767">SUSE bug 1013767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014109">SUSE bug 1014109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014110">SUSE bug 1014110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014111">SUSE bug 1014111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014112">SUSE bug 1014112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014256">SUSE bug 1014256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014514">SUSE bug 1014514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016779">SUSE bug 1016779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937125">SUSE bug 937125</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9102/">CVE-2016-9102</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9103/">CVE-2016-9103</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381</cve>
	<cve impact="moderate" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9776/">CVE-2016-9776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9845/">CVE-2016-9845</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9846/">CVE-2016-9846</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9907/">CVE-2016-9907</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9908/">CVE-2016-9908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9911/">CVE-2016-9911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9912/">CVE-2016-9912</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9913/">CVE-2016-9913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518610" comment="qemu-2.6.2-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518611" comment="qemu-block-curl-2.6.2-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518612" comment="qemu-ipxe-1.0.0-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518613" comment="qemu-kvm-2.6.2-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518614" comment="qemu-seabios-1.9.1-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518615" comment="qemu-sgabios-8-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518616" comment="qemu-tools-2.6.2-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518617" comment="qemu-vgabios-1.9.1-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518618" comment="qemu-x86-2.6.2-39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78055" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1007959" ref_url="https://bugzilla.suse.com/1007959" source="BUGZILLA"/>
		<reference ref_id="1007962" ref_url="https://bugzilla.suse.com/1007962" source="BUGZILLA"/>
		<reference ref_id="1008842" ref_url="https://bugzilla.suse.com/1008842" source="BUGZILLA"/>
		<reference ref_id="1010032" ref_url="https://bugzilla.suse.com/1010032" source="BUGZILLA"/>
		<reference ref_id="1011913" ref_url="https://bugzilla.suse.com/1011913" source="BUGZILLA"/>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1012910" ref_url="https://bugzilla.suse.com/1012910" source="BUGZILLA"/>
		<reference ref_id="1013994" ref_url="https://bugzilla.suse.com/1013994" source="BUGZILLA"/>
		<reference ref_id="1014136" ref_url="https://bugzilla.suse.com/1014136" source="BUGZILLA"/>
		<reference ref_id="1015609" ref_url="https://bugzilla.suse.com/1015609" source="BUGZILLA"/>
		<reference ref_id="1017461" ref_url="https://bugzilla.suse.com/1017461" source="BUGZILLA"/>
		<reference ref_id="1017641" ref_url="https://bugzilla.suse.com/1017641" source="BUGZILLA"/>
		<reference ref_id="1018263" ref_url="https://bugzilla.suse.com/1018263" source="BUGZILLA"/>
		<reference ref_id="1018419" ref_url="https://bugzilla.suse.com/1018419" source="BUGZILLA"/>
		<reference ref_id="1019163" ref_url="https://bugzilla.suse.com/1019163" source="BUGZILLA"/>
		<reference ref_id="1019614" ref_url="https://bugzilla.suse.com/1019614" source="BUGZILLA"/>
		<reference ref_id="1019618" ref_url="https://bugzilla.suse.com/1019618" source="BUGZILLA"/>
		<reference ref_id="1020048" ref_url="https://bugzilla.suse.com/1020048" source="BUGZILLA"/>
		<reference ref_id="1021762" ref_url="https://bugzilla.suse.com/1021762" source="BUGZILLA"/>
		<reference ref_id="1022340" ref_url="https://bugzilla.suse.com/1022340" source="BUGZILLA"/>
		<reference ref_id="1022785" ref_url="https://bugzilla.suse.com/1022785" source="BUGZILLA"/>
		<reference ref_id="1023866" ref_url="https://bugzilla.suse.com/1023866" source="BUGZILLA"/>
		<reference ref_id="1024015" ref_url="https://bugzilla.suse.com/1024015" source="BUGZILLA"/>
		<reference ref_id="1025683" ref_url="https://bugzilla.suse.com/1025683" source="BUGZILLA"/>
		<reference ref_id="1026024" ref_url="https://bugzilla.suse.com/1026024" source="BUGZILLA"/>
		<reference ref_id="1026405" ref_url="https://bugzilla.suse.com/1026405" source="BUGZILLA"/>
		<reference ref_id="1026462" ref_url="https://bugzilla.suse.com/1026462" source="BUGZILLA"/>
		<reference ref_id="1026505" ref_url="https://bugzilla.suse.com/1026505" source="BUGZILLA"/>
		<reference ref_id="1026509" ref_url="https://bugzilla.suse.com/1026509" source="BUGZILLA"/>
		<reference ref_id="1026692" ref_url="https://bugzilla.suse.com/1026692" source="BUGZILLA"/>
		<reference ref_id="1026722" ref_url="https://bugzilla.suse.com/1026722" source="BUGZILLA"/>
		<reference ref_id="1027054" ref_url="https://bugzilla.suse.com/1027054" source="BUGZILLA"/>
		<reference ref_id="1027066" ref_url="https://bugzilla.suse.com/1027066" source="BUGZILLA"/>
		<reference ref_id="1027153" ref_url="https://bugzilla.suse.com/1027153" source="BUGZILLA"/>
		<reference ref_id="1027179" ref_url="https://bugzilla.suse.com/1027179" source="BUGZILLA"/>
		<reference ref_id="1027189" ref_url="https://bugzilla.suse.com/1027189" source="BUGZILLA"/>
		<reference ref_id="1027190" ref_url="https://bugzilla.suse.com/1027190" source="BUGZILLA"/>
		<reference ref_id="1027195" ref_url="https://bugzilla.suse.com/1027195" source="BUGZILLA"/>
		<reference ref_id="1027273" ref_url="https://bugzilla.suse.com/1027273" source="BUGZILLA"/>
		<reference ref_id="1027616" ref_url="https://bugzilla.suse.com/1027616" source="BUGZILLA"/>
		<reference ref_id="1028017" ref_url="https://bugzilla.suse.com/1028017" source="BUGZILLA"/>
		<reference ref_id="1028027" ref_url="https://bugzilla.suse.com/1028027" source="BUGZILLA"/>
		<reference ref_id="1028041" ref_url="https://bugzilla.suse.com/1028041" source="BUGZILLA"/>
		<reference ref_id="1028158" ref_url="https://bugzilla.suse.com/1028158" source="BUGZILLA"/>
		<reference ref_id="1028217" ref_url="https://bugzilla.suse.com/1028217" source="BUGZILLA"/>
		<reference ref_id="1028325" ref_url="https://bugzilla.suse.com/1028325" source="BUGZILLA"/>
		<reference ref_id="1028415" ref_url="https://bugzilla.suse.com/1028415" source="BUGZILLA"/>
		<reference ref_id="1028819" ref_url="https://bugzilla.suse.com/1028819" source="BUGZILLA"/>
		<reference ref_id="1028895" ref_url="https://bugzilla.suse.com/1028895" source="BUGZILLA"/>
		<reference ref_id="1029220" ref_url="https://bugzilla.suse.com/1029220" source="BUGZILLA"/>
		<reference ref_id="1029514" ref_url="https://bugzilla.suse.com/1029514" source="BUGZILLA"/>
		<reference ref_id="1029634" ref_url="https://bugzilla.suse.com/1029634" source="BUGZILLA"/>
		<reference ref_id="1029986" ref_url="https://bugzilla.suse.com/1029986" source="BUGZILLA"/>
		<reference ref_id="1030118" ref_url="https://bugzilla.suse.com/1030118" source="BUGZILLA"/>
		<reference ref_id="1030213" ref_url="https://bugzilla.suse.com/1030213" source="BUGZILLA"/>
		<reference ref_id="1031003" ref_url="https://bugzilla.suse.com/1031003" source="BUGZILLA"/>
		<reference ref_id="1031052" ref_url="https://bugzilla.suse.com/1031052" source="BUGZILLA"/>
		<reference ref_id="1031200" ref_url="https://bugzilla.suse.com/1031200" source="BUGZILLA"/>
		<reference ref_id="1031206" ref_url="https://bugzilla.suse.com/1031206" source="BUGZILLA"/>
		<reference ref_id="1031208" ref_url="https://bugzilla.suse.com/1031208" source="BUGZILLA"/>
		<reference ref_id="1031440" ref_url="https://bugzilla.suse.com/1031440" source="BUGZILLA"/>
		<reference ref_id="1031481" ref_url="https://bugzilla.suse.com/1031481" source="BUGZILLA"/>
		<reference ref_id="1031579" ref_url="https://bugzilla.suse.com/1031579" source="BUGZILLA"/>
		<reference ref_id="1031660" ref_url="https://bugzilla.suse.com/1031660" source="BUGZILLA"/>
		<reference ref_id="1031662" ref_url="https://bugzilla.suse.com/1031662" source="BUGZILLA"/>
		<reference ref_id="1031717" ref_url="https://bugzilla.suse.com/1031717" source="BUGZILLA"/>
		<reference ref_id="1031831" ref_url="https://bugzilla.suse.com/1031831" source="BUGZILLA"/>
		<reference ref_id="1032006" ref_url="https://bugzilla.suse.com/1032006" source="BUGZILLA"/>
		<reference ref_id="1032673" ref_url="https://bugzilla.suse.com/1032673" source="BUGZILLA"/>
		<reference ref_id="1032681" ref_url="https://bugzilla.suse.com/1032681" source="BUGZILLA"/>
		<reference ref_id="897662" ref_url="https://bugzilla.suse.com/897662" source="BUGZILLA"/>
		<reference ref_id="951844" ref_url="https://bugzilla.suse.com/951844" source="BUGZILLA"/>
		<reference ref_id="968697" ref_url="https://bugzilla.suse.com/968697" source="BUGZILLA"/>
		<reference ref_id="969755" ref_url="https://bugzilla.suse.com/969755" source="BUGZILLA"/>
		<reference ref_id="970083" ref_url="https://bugzilla.suse.com/970083" source="BUGZILLA"/>
		<reference ref_id="977572" ref_url="https://bugzilla.suse.com/977572" source="BUGZILLA"/>
		<reference ref_id="977860" ref_url="https://bugzilla.suse.com/977860" source="BUGZILLA"/>
		<reference ref_id="978056" ref_url="https://bugzilla.suse.com/978056" source="BUGZILLA"/>
		<reference ref_id="980892" ref_url="https://bugzilla.suse.com/980892" source="BUGZILLA"/>
		<reference ref_id="981634" ref_url="https://bugzilla.suse.com/981634" source="BUGZILLA"/>
		<reference ref_id="982783" ref_url="https://bugzilla.suse.com/982783" source="BUGZILLA"/>
		<reference ref_id="987899" ref_url="https://bugzilla.suse.com/987899" source="BUGZILLA"/>
		<reference ref_id="988281" ref_url="https://bugzilla.suse.com/988281" source="BUGZILLA"/>
		<reference ref_id="991173" ref_url="https://bugzilla.suse.com/991173" source="BUGZILLA"/>
		<reference ref_id="998106" ref_url="https://bugzilla.suse.com/998106" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10200" ref_url="https://www.suse.com/security/cve/CVE-2016-10200/" source="CVE"/>
		<reference ref_id="CVE-2016-2117" ref_url="https://www.suse.com/security/cve/CVE-2016-2117/" source="CVE"/>
		<reference ref_id="CVE-2016-9191" ref_url="https://www.suse.com/security/cve/CVE-2016-9191/" source="CVE"/>
		<reference ref_id="CVE-2017-2596" ref_url="https://www.suse.com/security/cve/CVE-2017-2596/" source="CVE"/>
		<reference ref_id="CVE-2017-2671" ref_url="https://www.suse.com/security/cve/CVE-2017-2671/" source="CVE"/>
		<reference ref_id="CVE-2017-6074" ref_url="https://www.suse.com/security/cve/CVE-2017-6074/" source="CVE"/>
		<reference ref_id="CVE-2017-6214" ref_url="https://www.suse.com/security/cve/CVE-2017-6214/" source="CVE"/>
		<reference ref_id="CVE-2017-6345" ref_url="https://www.suse.com/security/cve/CVE-2017-6345/" source="CVE"/>
		<reference ref_id="CVE-2017-6346" ref_url="https://www.suse.com/security/cve/CVE-2017-6346/" source="CVE"/>
		<reference ref_id="CVE-2017-6347" ref_url="https://www.suse.com/security/cve/CVE-2017-6347/" source="CVE"/>
		<reference ref_id="CVE-2017-6353" ref_url="https://www.suse.com/security/cve/CVE-2017-6353/" source="CVE"/>
		<reference ref_id="CVE-2017-7187" ref_url="https://www.suse.com/security/cve/CVE-2017-7187/" source="CVE"/>
		<reference ref_id="CVE-2017-7261" ref_url="https://www.suse.com/security/cve/CVE-2017-7261/" source="CVE"/>
		<reference ref_id="CVE-2017-7294" ref_url="https://www.suse.com/security/cve/CVE-2017-7294/" source="CVE"/>
		<reference ref_id="CVE-2017-7308" ref_url="https://www.suse.com/security/cve/CVE-2017-7308/" source="CVE"/>
		<reference ref_id="CVE-2017-7374" ref_url="https://www.suse.com/security/cve/CVE-2017-7374/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP2 kernel was updated to 4.4.58 to receive various security and bugfixes.

Notable new/improved features:
- Improved support for Hyper-V
- Support for Matrox G200eH3
- Support for tcp_westwood

The following security bugs were fixed:

- CVE-2017-2671: The ping_unhash function in net/ipv4/ping.c in the Linux kernel was  too late in obtaining a certain lock and consequently could not ensure that disconnect function calls are safe, which allowed local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call (bnc#1031003).
- CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bnc#1031579).
- CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031440).
- CVE-2017-7261: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not check for a zero value of certain levels data, which allowed local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031052).
- CVE-2017-7187: The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function (bnc#1030213).
- CVE-2017-7374: Use-after-free vulnerability in fs/crypto/ in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference) or possibly gain privileges by revoking keyring keys being used for ext4, f2fs, or ubifs encryption, causing cryptographic transform objects to be freed prematurely (bnc#1032006).
- CVE-2016-10200: Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c (bnc#1028415).
- CVE-2017-6345: The LLC subsystem in the Linux kernel did not ensure that a certain destructor exists in required circumstances, which allowed local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls (bnc#1027190).
- CVE-2017-6346: Race condition in net/packet/af_packet.c in the Linux kernel allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that made PACKET_FANOUT setsockopt system calls (bnc#1027189).
- CVE-2017-6353: net/sctp/socket.c in the Linux kernel did not properly restrict association peel-off operations during certain wait states, which allowed local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986 (bnc#1027066).
- CVE-2017-6214: The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel allowed remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag (bnc#1026722).
- CVE-2016-2117: The atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel incorrectly enables scatter/gather I/O, which allowed remote attackers to obtain sensitive information from kernel memory by reading packet data (bnc#968697).
- CVE-2017-6347: The ip_cmsg_recv_checksum function in net/ipv4/ip_sockglue.c in the Linux kernel had incorrect expectations about skb data layout, which allowed local users to cause a denial of service (buffer over-read) or possibly have unspecified other impact via crafted system calls, as demonstrated by use of the MSG_MORE flag in conjunction with loopback UDP transmission (bnc#1027179).
- CVE-2016-9191: The cgroup offline implementation in the Linux kernel mishandled certain drain operations, which allowed local users to cause a denial of service (system hang) by leveraging access to a container environment for executing a crafted application (bnc#1008842).
- CVE-2017-2596: The nested_vmx_check_vmptr function in arch/x86/kvm/vmx.c in the Linux kernel improperly emulated the VMXON instruction, which allowed KVM L1 guest OS users to cause a denial of service (host OS memory consumption) by leveraging the mishandling of page references (bnc#1022785).
- CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allowed local users to obtain root privileges or cause a denial of service (double free) via an application that made an IPV6_RECVPKTINFO setsockopt system call (bnc#1026024).

The following non-security bugs were fixed:

- ACPI, ioapic: Clear on-stack resource before using it (bsc#1028819).
- ACPI: Do not create a platform_device for IOAPIC/IOxAPIC (bsc#1028819).
- ACPI: Remove platform devices from a bus on removal (bsc#1028819).
- HID: usbhid: Quirk a AMI virtual mouse and keyboard with ALWAYS_POLL (bsc#1022340).
- NFS: do not try to cross a mountpount when there isn't one there (bsc#1028041).
- NFS: flush out dirty data on file fput() (bsc#1021762).
- PCI: hv: Fix wslot_to_devfn() to fix warnings on device removal (bug#1028217).
- PCI: hv: Use device serial number as PCI domain (bug#1028217).
- RAID1: a new I/O barrier implementation to remove resync window (bsc#998106,bsc#1020048,bsc#982783).
- RAID1: avoid unnecessary spin locks in I/O barrier code (bsc#998106,bsc#1020048,bsc#982783).
- Revert 'RDMA/core: Fix incorrect structure packing for booleans' (kabi).
- Revert 'give up on gcc ilog2() constant optimizations' (kabi).
- Revert 'net/mlx4_en: Avoid unregister_netdev at shutdown flow' (bsc#1028017).
- Revert 'net: introduce device min_header_len' (kabi).
- Revert 'nfit, libnvdimm: fix interleave set cookie calculation' (kabi).
- Revert 'target: Fix NULL dereference during LUN lookup + active I/O shutdown' (kabi).
- acpi, nfit: fix acpi_nfit_flush_probe() crash (bsc#1031717).
- acpi, nfit: fix extended status translations for ACPI DSMs (bsc#1031717).
- arm64: Use full path in KBUILD_IMAGE definition (bsc#1010032).
- arm64: hugetlb: fix the wrong address for several functions (bsc#1032681).
- arm64: hugetlb: fix the wrong return value for huge_ptep_set_access_flags (bsc#1032681).
- arm64: hugetlb: remove the wrong pmd check in find_num_contig() (bsc#1032681).
- arm: Use full path in KBUILD_IMAGE definition (bsc#1010032).
- bnx2x: allow adding VLANs while interface is down (bsc#1027273).
- bonding: fix 802.3ad aggregator reselection (bsc#1029514).
- btrfs: Change qgroup_meta_rsv to 64bit (bsc#1019614).
- btrfs: allow unlink to exceed subvolume quota (bsc#1019614).
- btrfs: backref: Fix soft lockup in __merge_refs function (bsc#1017641).
- btrfs: incremental send, do not delay rename when parent inode is new (bsc#1028325).
- btrfs: incremental send, do not issue invalid rmdir operations (bsc#1028325).
- btrfs: qgroup: Move half of the qgroup accounting time out of commit trans (bsc#1017461).
- btrfs: qgroups: Retry after commit on getting EDQUOT (bsc#1019614).
- btrfs: send, fix failure to rename top level inode due to name collision (bsc#1028325).
- btrfs: serialize subvolume mounts with potentially mismatching rw flags (bsc#951844 bsc#1024015)
- cgroup/pids: remove spurious suspicious RCU usage warning (bnc#1031831).
- crypto: algif_hash - avoid zero-sized array (bnc#1007962).
- cxgb4vf: do not offload Rx checksums for IPv6 fragments (bsc#1026692).
- device-dax: fix private mapping restriction, permit read-only (bsc#1031717).
- drm/i915: Add intel_uncore_suspend / resume functions (bsc#1011913).
- drm/i915: Fix crash after S3 resume with DP MST mode change (bsc#1029634).
- drm/i915: Listen for PMIC bus access notifications (bsc#1011913).
- drm/i915: Only enable hotplug interrupts if the display interrupts are enabled (bsc#1031717).
- drm/mgag200: Added support for the new device G200eH3 (bsc#1007959)
- ext4: fix fencepost in s_first_meta_bg validation (bsc#1029986).
- futex: Add missing error handling to FUTEX_REQUEUE_PI (bsc#969755).
- futex: Fix potential use-after-free in FUTEX_REQUEUE_PI (bsc#969755).
- hv: export current Hyper-V clocksource (bsc#1031206).
- hv: util: do not forget to init host_ts.lock (bsc#1031206).
- hv: vmbus: Prevent sending data on a rescinded channel (bug#1028217).
- hv_utils: implement Hyper-V PTP source (bsc#1031206).
- i2c-designware: increase timeout (bsc#1011913).
- i2c: designware-baytrail: Acquire P-Unit access on bus acquire (bsc#1011913).
- i2c: designware-baytrail: Call pmic_bus_access_notifier_chain (bsc#1011913).
- i2c: designware-baytrail: Fix race when resetting the semaphore (bsc#1011913).
- i2c: designware-baytrail: Only check iosf_mbi_available() for shared hosts (bsc#1011913).
- i2c: designware: Disable pm for PMIC i2c-bus even if there is no _SEM method (bsc#1011913).
- i2c: designware: Never suspend i2c-busses used for accessing the system PMIC (bsc#1011913).
- i2c: designware: Rename accessor_flags to flags (bsc#1011913).
- iommu/vt-d: Make sure IOMMUs are off when intel_iommu=off (bsc#1031208).
- kABI: protect struct iscsi_conn (kabi).
- kABI: protect struct se_node_acl (kabi).
- kABI: restore can_rx_register parameters (kabi).
- kgr/module: make a taint flag module-specific
- kgr: Mark eeh_event_handler() kthread safe using a timeout (bsc#1031662).
- kgr: remove all arch-specific kgraft header files
- l2tp: fix address test in __l2tp_ip6_bind_lookup() (bsc#1028415).
- l2tp: fix lookup for sockets not bound to a device in l2tp_ip (bsc#1028415).
- l2tp: fix racy socket lookup in l2tp_ip and l2tp_ip6 bind() (bsc#1028415).
- l2tp: hold socket before dropping lock in l2tp_ip{, 6}_recv() (bsc#1028415).
- l2tp: hold tunnel socket when handling control frames in l2tp_ip and l2tp_ip6 (bsc#1028415).
- l2tp: lock socket before checking flags in connect() (bsc#1028415).
- libnvdimm, pfn: fix memmap reservation size versus 4K alignment (bsc#1031717).
- locking/semaphore: Add down_interruptible_timeout() (bsc#1031662).
- md/raid1: Refactor raid1_make_request (bsc#998106,bsc#1020048,bsc#982783).
- md/raid1: add rcu protection to rdev in fix_read_error (References: bsc#998106,bsc#1020048,bsc#982783).
- md/raid1: fix a use-after-free bug (bsc#998106,bsc#1020048,bsc#982783).
- md/raid1: handle flush request correctly (bsc#998106,bsc#1020048,bsc#982783).
- mm/huge_memory.c: respect FOLL_FORCE/FOLL_COW for thp (bnc#1030118).
- mm/memblock.c: fix memblock_next_valid_pfn() (bnc#1031200).
- mm/page_alloc: Remove useless parameter of __free_pages_boot_core (bnc#1027195).
- mm: fix set pageblock migratetype in deferred struct page init (bnc#1027195).
- mm: page_alloc: skip over regions of invalid pfns where possible (bnc#1031200).
- module: move add_taint_module() to a header file
- net/ena: change condition for host attribute configuration (bsc#1026509).
- net/ena: change driver's default timeouts (bsc#1026509).
- net/ena: fix NULL dereference when removing the driver after device reset failed (bsc#1026509).
- net/ena: fix RSS default hash configuration (bsc#1026509).
- net/ena: fix ethtool RSS flow configuration (bsc#1026509).
- net/ena: fix potential access to freed memory during device reset (bsc#1026509).
- net/ena: fix queues number calculation (bsc#1026509).
- net/ena: reduce the severity of ena printouts (bsc#1026509).
- net/ena: refactor ena_get_stats64 to be atomic context safe (bsc#1026509).
- net/ena: remove ntuple filter support from device feature list (bsc#1026509).
- net/ena: update driver version to 1.1.2 (bsc#1026509).
- net/ena: use READ_ONCE to access completion descriptors (bsc#1026509).
- net/mlx4_core: Avoid command timeouts during VF driver device shutdown (bsc#1028017).
- net/mlx4_core: Avoid delays during VF driver device shutdown (bsc#1028017).
- net/mlx4_core: Fix racy CQ (Completion Queue) free (bsc#1028017).
- net/mlx4_core: Fix when to save some qp context flags for dynamic VST to VGT transitions (bsc#1028017).
- net/mlx4_core: Use cq quota in SRIOV when creating completion EQs (bsc#1028017).
- net/mlx4_en: Fix bad WQE issue (bsc#1028017).
- net: ena: Fix error return code in ena_device_init() (bsc#1026509).
- net: ena: Remove unnecessary pci_set_drvdata() (bsc#1026509).
- net: ena: change the return type of ena_set_push_mode() to be void (bsc#1026509).
- net: ena: remove superfluous check in ena_remove() (bsc#1026509).
- net: ena: use setup_timer() and mod_timer() (bsc#1026509).
- netfilter: allow logging from non-init namespaces (bsc#970083).
- nvme: Do not suspend admin queue that wasn't created (bsc#1026505).
- nvme: Suspend all queues before deletion (bsc#1026505).
- ping: implement proper locking (bsc#1031003).
- powerpc: Blacklist GCC 5.4 6.1 and 6.2 (boo#1028895).
- rtlwifi: rtl_usb: Fix missing entry in USB driver's private data (bsc#1026462).
- s390/kmsg: add missing kmsg descriptions (bnc#1025683).
- s390/mm: fix zone calculation in arch_add_memory() (bnc#1025683).
- sched/loadavg: Avoid loadavg spikes caused by delayed NO_HZ accounting (bsc#1018419).
- scsi: do not print 'reservation conflict' for TEST UNIT READY (bsc#1027054).
- scsi_dh_alua: Do not modify the interval value for retries (bsc#1012910).
- softirq: Let ksoftirqd do its job (bsc#1019618).
- x86, mm: fix gup_pte_range() vs DAX mappings (bsc#1026405).
- x86/apic/uv: Silence a shift wrapping warning (bsc#1023866).
- x86/ioapic: Change prototype of acpi_ioapic_add() (bsc#1027153, bsc#1027616).
- x86/ioapic: Fix IOAPIC failing to request resource (bsc#1027153, bsc#1027616).
- x86/ioapic: Fix incorrect pointers in ioapic_setup_resources() (bsc#1027153, bsc#1027616).
- x86/ioapic: Fix lost IOAPIC resource after hot-removal and hotadd (bsc#1027153, bsc#1027616).
- x86/ioapic: Fix setup_res() failing to get resource (bsc#1027153, bsc#1027616).
- x86/ioapic: Ignore root bridges without a companion ACPI device (bsc#1027153, bsc#1027616).
- x86/ioapic: Simplify ioapic_setup_resources() (bsc#1027153, bsc#1027616).
- x86/ioapic: Support hot-removal of IOAPICs present during boot (bsc#1027153, bsc#1027616).
- x86/ioapic: fix kABI (hide added include) (bsc#1027153, bsc#1027616).
- x86/mce: Do not print MCEs when mcelog is active (bsc#1013994).
- x86/mce: Fix copy/paste error in exception table entries
- x86/mm/gup: Simplify get_user_pages() PTE bit handling (bsc#1026405).
- x86/platform/UV: Add Support for UV4 Hubless NMIs (bsc#1023866).
- x86/platform/UV: Add Support for UV4 Hubless systems (bsc#1023866).
- x86/platform/UV: Add basic CPU NMI health check (bsc#1023866).
- x86/platform/UV: Clean up the NMI code to match current coding style (bsc#1023866).
- x86/platform/UV: Clean up the UV APIC code (bsc#1023866).
- x86/platform/UV: Ensure uv_system_init is called when necessary (bsc#1023866).
- x86/platform/UV: Fix 2 socket config problem (bsc#1023866).
- x86/platform/UV: Fix panic with missing UVsystab support (bsc#1023866).
- x86/platform/UV: Initialize PCH GPP_D_0 NMI Pin to be NMI source (bsc#1023866).
- x86/platform/UV: Verify NMI action is valid, default is standard (bsc#1023866).
- x86/platform/intel/iosf_mbi: Add a PMIC bus access notifier (bsc#1011913).
- x86/platform/intel/iosf_mbi: Add a mutex for P-Unit access (bsc#1011913).
- x86/platform: Remove warning message for duplicate NMI handlers (bsc#1029220).
- x86/ras/therm_throt: Do not log a fake MCE for thermal events (bsc#1028027).
- xen-blkfront: correct maximum segment accounting (bsc#1018263).
- xen-blkfront: do not call talk_to_blkback when already connected to blkback.
- xen-blkfront: free resources if xlvbd_alloc_gendisk fails.
- xen/blkfront: Fix crash if backend does not follow the right states.
- xen/netback: set default upper limit of tx/rx queues to 8 (bnc#1019163).
- xen/netfront: set default upper limit of tx/rx queues to 8 (bnc#1019163).
- xen: Use machine addresses in /sys/kernel/vmcoreinfo when PV (bsc#1014136)
- xfs: do not take the IOLOCK exclusive for direct I/O page invalidation (bsc#1015609).
- xgene_enet: remove bogus forward declarations (bsc#1032673).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-05"/>
	<updated date="2017-05-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1007959">SUSE bug 1007959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007962">SUSE bug 1007962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008842">SUSE bug 1008842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010032">SUSE bug 1010032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011913">SUSE bug 1011913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012910">SUSE bug 1012910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013994">SUSE bug 1013994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014136">SUSE bug 1014136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015609">SUSE bug 1015609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017461">SUSE bug 1017461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017641">SUSE bug 1017641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018263">SUSE bug 1018263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018419">SUSE bug 1018419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019163">SUSE bug 1019163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019614">SUSE bug 1019614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019618">SUSE bug 1019618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020048">SUSE bug 1020048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021762">SUSE bug 1021762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022340">SUSE bug 1022340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022785">SUSE bug 1022785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023866">SUSE bug 1023866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024015">SUSE bug 1024015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025683">SUSE bug 1025683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026024">SUSE bug 1026024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026405">SUSE bug 1026405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026462">SUSE bug 1026462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026505">SUSE bug 1026505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026509">SUSE bug 1026509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026692">SUSE bug 1026692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026722">SUSE bug 1026722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027054">SUSE bug 1027054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027066">SUSE bug 1027066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027153">SUSE bug 1027153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027189">SUSE bug 1027189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027190">SUSE bug 1027190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027195">SUSE bug 1027195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027273">SUSE bug 1027273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027616">SUSE bug 1027616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028017">SUSE bug 1028017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028027">SUSE bug 1028027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028041">SUSE bug 1028041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028158">SUSE bug 1028158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028217">SUSE bug 1028217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028325">SUSE bug 1028325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028415">SUSE bug 1028415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028819">SUSE bug 1028819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028895">SUSE bug 1028895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029220">SUSE bug 1029220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029514">SUSE bug 1029514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029634">SUSE bug 1029634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029986">SUSE bug 1029986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030118">SUSE bug 1030118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030213">SUSE bug 1030213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031003">SUSE bug 1031003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031052">SUSE bug 1031052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031200">SUSE bug 1031200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031206">SUSE bug 1031206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031208">SUSE bug 1031208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031440">SUSE bug 1031440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031481">SUSE bug 1031481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031579">SUSE bug 1031579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031660">SUSE bug 1031660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031662">SUSE bug 1031662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031717">SUSE bug 1031717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031831">SUSE bug 1031831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032006">SUSE bug 1032006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032673">SUSE bug 1032673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032681">SUSE bug 1032681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897662">SUSE bug 897662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951844">SUSE bug 951844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968697">SUSE bug 968697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969755">SUSE bug 969755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970083">SUSE bug 970083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977572">SUSE bug 977572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977860">SUSE bug 977860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978056">SUSE bug 978056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980892">SUSE bug 980892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981634">SUSE bug 981634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982783">SUSE bug 982783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987899">SUSE bug 987899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988281">SUSE bug 988281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991173">SUSE bug 991173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998106">SUSE bug 998106</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10200/">CVE-2016-10200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2117/">CVE-2016-2117</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9191/">CVE-2016-9191</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-2596/">CVE-2017-2596</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2671/">CVE-2017-2671</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6074/">CVE-2017-6074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6214/">CVE-2017-6214</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6345/">CVE-2017-6345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6346/">CVE-2017-6346</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6347/">CVE-2017-6347</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6353/">CVE-2017-6353</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7187/">CVE-2017-7187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7261/">CVE-2017-7261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7294/">CVE-2017-7294</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7308/">CVE-2017-7308</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7374/">CVE-2017-7374</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518619" comment="kernel-default-4.4.59-92.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518620" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518621" comment="kernel-default-extra-4.4.59-92.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518625" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78056" version="1" class="patch">
	<metadata>
		<title>Security update for libosip2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1034570" ref_url="https://bugzilla.suse.com/1034570" source="BUGZILLA"/>
		<reference ref_id="1034571" ref_url="https://bugzilla.suse.com/1034571" source="BUGZILLA"/>
		<reference ref_id="1034572" ref_url="https://bugzilla.suse.com/1034572" source="BUGZILLA"/>
		<reference ref_id="1034574" ref_url="https://bugzilla.suse.com/1034574" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10324" ref_url="https://www.suse.com/security/cve/CVE-2016-10324/" source="CVE"/>
		<reference ref_id="CVE-2016-10325" ref_url="https://www.suse.com/security/cve/CVE-2016-10325/" source="CVE"/>
		<reference ref_id="CVE-2016-10326" ref_url="https://www.suse.com/security/cve/CVE-2016-10326/" source="CVE"/>
		<reference ref_id="CVE-2017-7853" ref_url="https://www.suse.com/security/cve/CVE-2017-7853/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002848.html" source="SUSE-SU"/>
		<description>

This update for libosip2 fixes several issues.

These security issues were fixed:

- CVE-2017-7853: In libosip2  a malformed SIP message could have lead to a heap buffer overflow in the msg_osip_body_parse() function defined in osipparser2/osip_message_parse.c, resulting in a remote DoS (bsc#1034570).
- CVE-2016-10326: In libosip2 a malformed SIP message could have lead to a heap buffer overflow in the osip_body_to_str() function defined in osipparser2/osip_body.c, resulting in a remote DoS (bsc#1034571).
- CVE-2016-10325: In libosip2 a malformed SIP message could have lead to a heap buffer overflow in the _osip_message_to_str() function defined in osipparser2/osip_message_to_str.c, resulting in a remote DoS (bsc#1034572).
- CVE-2016-10324: In libosip2 a malformed SIP message could have lead to a heap buffer overflow in the osip_clrncpy() function defined in osipparser2/osip_port.c (bsc#1034574).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-06"/>
	<updated date="2017-05-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034570">SUSE bug 1034570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034571">SUSE bug 1034571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034572">SUSE bug 1034572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034574">SUSE bug 1034574</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10324/">CVE-2016-10324</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10325/">CVE-2016-10325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10326/">CVE-2016-10326</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7853/">CVE-2017-7853</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517334" comment="libosip2-3.5.0-20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78057" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss, mozilla-nspr, java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1015499" ref_url="https://bugzilla.suse.com/1015499" source="BUGZILLA"/>
		<reference ref_id="1015547" ref_url="https://bugzilla.suse.com/1015547" source="BUGZILLA"/>
		<reference ref_id="1021636" ref_url="https://bugzilla.suse.com/1021636" source="BUGZILLA"/>
		<reference ref_id="1026102" ref_url="https://bugzilla.suse.com/1026102" source="BUGZILLA"/>
		<reference ref_id="1030071" ref_url="https://bugzilla.suse.com/1030071" source="BUGZILLA"/>
		<reference ref_id="1035082" ref_url="https://bugzilla.suse.com/1035082" source="BUGZILLA"/>
		<reference ref_id="983639" ref_url="https://bugzilla.suse.com/983639" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="CVE-2016-8635" ref_url="https://www.suse.com/security/cve/CVE-2016-8635/" source="CVE"/>
		<reference ref_id="CVE-2016-9574" ref_url="https://www.suse.com/security/cve/CVE-2016-9574/" source="CVE"/>
		<reference ref_id="CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429/" source="CVE"/>
		<reference ref_id="CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432/" source="CVE"/>
		<reference ref_id="CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433/" source="CVE"/>
		<reference ref_id="CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434/" source="CVE"/>
		<reference ref_id="CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2017-5437" ref_url="https://www.suse.com/security/cve/CVE-2017-5437/" source="CVE"/>
		<reference ref_id="CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438/" source="CVE"/>
		<reference ref_id="CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439/" source="CVE"/>
		<reference ref_id="CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440/" source="CVE"/>
		<reference ref_id="CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441/" source="CVE"/>
		<reference ref_id="CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442/" source="CVE"/>
		<reference ref_id="CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443/" source="CVE"/>
		<reference ref_id="CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444/" source="CVE"/>
		<reference ref_id="CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445/" source="CVE"/>
		<reference ref_id="CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446/" source="CVE"/>
		<reference ref_id="CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447/" source="CVE"/>
		<reference ref_id="CVE-2017-5448" ref_url="https://www.suse.com/security/cve/CVE-2017-5448/" source="CVE"/>
		<reference ref_id="CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459/" source="CVE"/>
		<reference ref_id="CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460/" source="CVE"/>
		<reference ref_id="CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461/" source="CVE"/>
		<reference ref_id="CVE-2017-5462" ref_url="https://www.suse.com/security/cve/CVE-2017-5462/" source="CVE"/>
		<reference ref_id="CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464/" source="CVE"/>
		<reference ref_id="CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465/" source="CVE"/>
		<reference ref_id="CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox was updated to the Firefox ESR release 45.9.

Mozilla NSS was updated to support TLS 1.3 (close to release draft) and various new 
ciphers, PRFs, Diffie Hellman key agreement and support for more hashes.

Security issues fixed in Firefox (bsc#1035082)

- MFSA 2017-11/CVE-2017-5469: Potential Buffer overflow in flex-generated code
- MFSA 2017-11/CVE-2017-5429: Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9, and Firefox ESR 52.1
- MFSA 2017-11/CVE-2017-5439: Use-after-free in nsTArray Length() during XSLT processing
- MFSA 2017-11/CVE-2017-5438: Use-after-free in nsAutoPtr during XSLT processing
- MFSA 2017-11/CVE-2017-5437: Vulnerabilities in Libevent library
- MFSA 2017-11/CVE-2017-5436: Out-of-bounds write with malicious font in Graphite 2
- MFSA 2017-11/CVE-2017-5435: Use-after-free during transaction processing in the editor
- MFSA 2017-11/CVE-2017-5434: Use-after-free during focus handling
- MFSA 2017-11/CVE-2017-5433: Use-after-free in SMIL animation functions
- MFSA 2017-11/CVE-2017-5432: Use-after-free in text input selection
- MFSA 2017-11/CVE-2017-5464: Memory corruption with accessibility and DOM manipulation
- MFSA 2017-11/CVE-2017-5465: Out-of-bounds read in ConvolvePixel
- MFSA 2017-11/CVE-2017-5460: Use-after-free in frame selection
- MFSA 2017-11/CVE-2017-5448: Out-of-bounds write in ClearKeyDecryptor
- MFSA 2017-11/CVE-2017-5446: Out-of-bounds read when HTTP/2 DATA frames are sent with incorrect data
- MFSA 2017-11/CVE-2017-5447: Out-of-bounds read during glyph processing
- MFSA 2017-11/CVE-2017-5444: Buffer overflow while parsing application/http-index-format content
- MFSA 2017-11/CVE-2017-5445: Uninitialized values used while parsing application/http-index-format content
- MFSA 2017-11/CVE-2017-5442: Use-after-free during style changes
- MFSA 2017-11/CVE-2017-5443: Out-of-bounds write during BinHex decoding
- MFSA 2017-11/CVE-2017-5440: Use-after-free in txExecutionState destructor during XSLT processing
- MFSA 2017-11/CVE-2017-5441: Use-after-free with selection during scroll events
- MFSA 2017-11/CVE-2017-5459: Buffer overflow in WebGL

Mozilla NSS was updated to 3.29.5, bringing new features and fixing bugs:

- Update to NSS 3.29.5:
  * MFSA 2017-11/CVE-2017-5461: Rare crashes in the base 64 decoder and encoder were fixed.
  * MFSA 2017-11/CVE-2017-5462: A carry over bug in the RNG was fixed.
  * CVE-2016-9574: Remote DoS during session handshake when using SessionTicket extention and ECDHE-ECDSA (bsc#1015499).
  * requires NSPR &gt;= 4.13.1

- Update to NSS 3.29.3

  * enables TLS 1.3 by default

- Fixed a bug in hash computation (and build with
  GCC 7 which complains about shifts of boolean values).
  (bsc#1030071, bmo#1348767)

- Update to NSS 3.28.3

  This is a patch release to fix binary compatibility issues.

- Update to NSS 3.28.1

  This is a patch release to update the list of root CA certificates.

  * The following CA certificates were Removed

    CN = Buypass Class 2 CA 1
    CN = Root CA Generalitat Valenciana
    OU = RSA Security 2048 V3

  * The following CA certificates were Added

    OU = AC RAIZ FNMT-RCM
    CN = Amazon Root CA 1
    CN = Amazon Root CA 2
    CN = Amazon Root CA 3
    CN = Amazon Root CA 4
    CN = LuxTrust Global Root 2
    CN = Symantec Class 1 Public Primary Certification Authority - G4
    CN = Symantec Class 1 Public Primary Certification Authority - G6
    CN = Symantec Class 2 Public Primary Certification Authority - G4
    CN = Symantec Class 2 Public Primary Certification Authority - G6

  * The version number of the updated root CA list has been set to 2.11

- Update to NSS 3.28

  New functionality:

  * NSS includes support for TLS 1.3 draft -18. This includes a number
    of improvements to TLS 1.3:

    - The signed certificate timestamp, used in certificate
      transparency, is supported in TLS 1.3.
    - Key exporters for TLS 1.3 are supported. This includes the early
      key exporter, which can be used if 0-RTT is enabled. Note that
      there is a difference between TLS 1.3 and key exporters in older
      versions of TLS. TLS 1.3 does not distinguish between an empty
      context and no context.
    - The TLS 1.3 (draft) protocol can be enabled, by defining
      NSS_ENABLE_TLS_1_3=1 when building NSS.
    - NSS includes support for the X25519 key exchange algorithm,
      which is supported and enabled by default in all versions of TLS.

  Notable Changes:

  * NSS can no longer be compiled with support for additional elliptic curves.
    This was previously possible by replacing certain NSS source files.
  * NSS will now detect the presence of tokens that support additional
    elliptic curves and enable those curves for use in TLS.
    Note that this detection has a one-off performance cost, which can be
    avoided by using the SSL_NamedGroupConfig function to limit supported
    groups to those that NSS provides.
  * PKCS#11 bypass for TLS is no longer supported and has been removed.
  * Support for 'export' grade SSL/TLS cipher suites has been removed.
  * NSS now uses the signature schemes definition in TLS 1.3.
    This also affects TLS 1.2. NSS will now only generate signatures with the
    combinations of hash and signature scheme that are defined in TLS 1.3,
    even when negotiating TLS 1.2.

    - This means that SHA-256 will only be used with P-256 ECDSA certificates,
      SHA-384 with P-384 certificates, and SHA-512 with P-521 certificates.
      SHA-1 is permitted (in TLS 1.2 only) with any certificate for backward
      compatibility reasons.
    - NSS will now no longer assume that default signature schemes are
      supported by a peer if there was no commonly supported signature scheme.

  * NSS will now check if RSA-PSS signing is supported by the token that holds
    the private key prior to using it for TLS.
  * The certificate validation code contains checks to no longer trust
    certificates that are issued by old WoSign and StartCom CAs after
    October 21, 2016. This is equivalent to the behavior that Mozilla will
    release with Firefox 51.

- Update to NSS 3.27.2
  * Fixed SSL_SetTrustAnchors leaks (bmo#1318561)

  - raised the minimum softokn/freebl version to 3.28 as reported in (boo#1021636)

- Update to NSS 3.26.2

  New Functionality:

  * the selfserv test utility has been enhanced to support ALPN
    (HTTP/1.1) and 0-RTT
  * added support for the System-wide crypto policy available on
    Fedora Linux see http://fedoraproject.org/wiki/Changes/CryptoPolicy
  * introduced build flag NSS_DISABLE_LIBPKIX that allows compilation
    of NSS without the libpkix library

  Notable Changes:

  * The following CA certificate was Added
    CN = ISRG Root X1
  * NPN is disabled and ALPN is enabled by default
  * the NSS test suite now completes with the experimental TLS 1.3
    code enabled
  * several test improvements and additions, including a NIST known answer test

  Changes in 3.26.2
  * MD5 signature algorithms sent by the server in CertificateRequest
    messages are now properly ignored. Previously, with rare server
    configurations, an MD5 signature algorithm might have been selected
    for client authentication and caused the client to abort the
    connection soon after.

- Update to NSS 3.25

  New functionality:

  * Implemented DHE key agreement for TLS 1.3
  * Added support for ChaCha with TLS 1.3
  * Added support for TLS 1.2 ciphersuites that use SHA384 as the PRF
  * In previous versions, when using client authentication with TLS 1.2,
    NSS only supported certificate_verify messages that used the same
    signature hash algorithm as used by the PRF. This limitation has
    been removed.

  Notable changes:

  * An SSL socket can no longer be configured to allow both TLS 1.3 and SSLv3
  * Regression fix: NSS no longer reports a failure if an application
    attempts to disable the SSLv2 protocol.
  * The list of trusted CA certificates has been updated to version 2.8
  * The following CA certificate was Removed
    Sonera Class1 CA
  * The following CA certificates were Added
    Hellenic Academic and Research Institutions RootCA 2015
    Hellenic Academic and Research Institutions ECC RootCA 2015
    Certplus Root CA G1
    Certplus Root CA G2
    OpenTrust Root CA G1
    OpenTrust Root CA G2
    OpenTrust Root CA G3

- Update to NSS 3.24

  New functionality:

  * NSS softoken has been updated with the latest National Institute
    of Standards and Technology (NIST) guidance (as of 2015):
    - Software integrity checks and POST functions are executed on
      shared library load. These checks have been disabled by default,
      as they can cause a performance regression. To enable these
      checks, you must define symbol NSS_FORCE_FIPS when building NSS.
    - Counter mode and Galois/Counter Mode (GCM) have checks to
      prevent counter overflow.
    - Additional CSPs are zeroed in the code.
    - NSS softoken uses new guidance for how many Rabin-Miller tests
      are needed to verify a prime based on prime size.
  * NSS softoken has also been updated to allow NSS to run in FIPS
    Level 1 (no password). This mode is triggered by setting the
    database password to the empty string. In FIPS mode, you may move
    from Level 1 to Level 2 (by setting an appropriate password),
    but not the reverse.
  * A SSL_ConfigServerCert function has been added for configuring
    SSL/TLS server sockets with a certificate and private key. Use
    this new function in place of SSL_ConfigSecureServer,
    SSL_ConfigSecureServerWithCertChain, SSL_SetStapledOCSPResponses,
    and SSL_SetSignedCertTimestamps. SSL_ConfigServerCert automatically
    determines the certificate type from the certificate and private key.
    The caller is no longer required to use SSLKEAType explicitly to
    select a 'slot' into which the certificate is configured (which
    incorrectly identifies a key agreement type rather than a certificate).
    Separate functions for configuring Online Certificate Status Protocol
    (OCSP) responses or Signed Certificate Timestamps are not needed,
    since these can be added to the optional SSLExtraServerCertData struct
    provided to SSL_ConfigServerCert.  Also, partial support for RSA
    Probabilistic Signature Scheme (RSA-PSS) certificates has been added.
    Although these certificates can be configured, they will not be
    used by NSS in this version.
  * Deprecate the member attribute authAlgorithm of type SSLCipherSuiteInfo.
    Instead, applications should use the newly added attribute authType.
  * Add a shared library (libfreeblpriv3) on Linux platforms that
    define FREEBL_LOWHASH.
  * Remove most code related to SSL v2, including the ability to actively
    send a SSLv2-compatible client hello. However, the server-side
    implementation of the SSL/TLS protocol still supports processing
    of received v2-compatible client hello messages.
  * Disable (by default) NSS support in optimized builds for logging SSL/TLS
    key material to a logfile if the SSLKEYLOGFILE environment variable
    is set. To enable the functionality in optimized builds, you must define
    the symbol NSS_ALLOW_SSLKEYLOGFILE when building NSS.
  * Update NSS to protect it against the Cachebleed attack.
  * Disable support for DTLS compression.
  * Improve support for TLS 1.3. This includes support for DTLS 1.3.
    Note that TLS 1.3 support is experimental and not suitable for
    production use.

- Update to NSS 3.23

  New functionality:

  * ChaCha20/Poly1305 cipher and TLS cipher suites now supported
  * Experimental-only support TLS 1.3 1-RTT mode (draft-11).
    This code is not ready for production use.

  Notable changes:

  * The list of TLS extensions sent in the TLS handshake has been
    reordered to increase compatibility of the Extended Master Secret
    with with servers
  * The build time environment variable NSS_ENABLE_ZLIB has been
    renamed to NSS_SSL_ENABLE_ZLIB
  * The build time environment variable NSS_DISABLE_CHACHAPOLY was
    added, which can be used to prevent compilation of the
    ChaCha20/Poly1305 code.
  * The following CA certificates were Removed

    - Staat der Nederlanden Root CA
    - NetLock Minositett Kozjegyzoi (Class QA) Tanusitvanykiado
    - NetLock Kozjegyzoi (Class A) Tanusitvanykiado
    - NetLock Uzleti (Class B) Tanusitvanykiado
    - NetLock Expressz (Class C) Tanusitvanykiado
    - VeriSign Class 1 Public PCA - G2
    - VeriSign Class 3 Public PCA
    - VeriSign Class 3 Public PCA - G2
    - CA Disig

  * The following CA certificates were Added

    + SZAFIR ROOT CA2
    + Certum Trusted Network CA 2

  * The following CA certificate had the Email trust bit turned on

    + Actalis Authentication Root CA

  Security fixes:
  * CVE-2016-2834: Memory safety bugs (boo#983639)
    MFSA-2016-61 bmo#1206283 bmo#1221620 bmo#1241034 bmo#1241037

- Update to NSS 3.22.3
  * Increase compatibility of TLS extended master secret,
    don't send an empty TLS extension last in the handshake
    (bmo#1243641)
  * Fixed a heap-based buffer overflow related to the parsing of
    certain ASN.1 structures. An attacker could create a specially-crafted
    certificate which, when parsed by NSS, would cause a crash or
    execution of arbitrary code with the permissions of the user.
    (CVE-2016-1950, bmo#1245528)

- Update to NSS 3.22.2

  New functionality:

  * RSA-PSS signatures are now supported (bmo#1215295)
  * Pseudorandom functions based on hashes other than SHA-1 are now supported
  * Enforce an External Policy on NSS from a config file (bmo#1009429)

- CVE-2016-8635: Fix for DH small subgroup confinement attack (bsc#1015547)

Mozilla NSPR was updated to version 4.13.1:

  The previously released version 4.13 had changed pipes to be
  nonblocking by default, and as a consequence, PollEvent was
  changed to not block on clear.
  The NSPR development team received reports that these changes
  caused regressions in some applications that use NSPR, and it
  has been decided to revert the changes made in NSPR 4.13.
  NSPR 4.13.1 restores the traditional behavior of pipes and
  PollEvent.

Mozilla NSPR update to version 4.13 had these changes:

- PL_strcmp (and others) were fixed to return consistent results
    when one of the arguments is NULL.
- PollEvent was fixed to not block on clear.
- Pipes are always nonblocking.
- PR_GetNameForIdentity: added thread safety lock and bound checks.
- Removed the PLArena freelist.
- Avoid some integer overflows.
- fixed several comments.

This update also contains java-1_8_0-openjdk that needed to be rebuilt against the new
mozilla-nss version.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-11"/>
	<updated date="2017-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1015499">SUSE bug 1015499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015547">SUSE bug 1015547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021636">SUSE bug 1021636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026102">SUSE bug 1026102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030071">SUSE bug 1030071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983639">SUSE bug 983639</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8635/">CVE-2016-8635</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9574/">CVE-2016-9574</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5437/">CVE-2017-5437</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5448/">CVE-2017-5448</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5462/">CVE-2017-5462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517346" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517347" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517348" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517349" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517350" comment="libfreebl3-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517351" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517352" comment="libsoftokn3-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517353" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517354" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517355" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517356" comment="mozilla-nss-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517357" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517358" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517359" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517360" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517361" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517362" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78058" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1005591" ref_url="https://bugzilla.suse.com/1005591" source="BUGZILLA"/>
		<reference ref_id="1035905" ref_url="https://bugzilla.suse.com/1035905" source="BUGZILLA"/>
		<reference ref_id="934119" ref_url="https://bugzilla.suse.com/934119" source="BUGZILLA"/>
		<reference ref_id="952474" ref_url="https://bugzilla.suse.com/952474" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7995" ref_url="https://www.suse.com/security/cve/CVE-2015-7995/" source="CVE"/>
		<reference ref_id="CVE-2015-9019" ref_url="https://www.suse.com/security/cve/CVE-2015-9019/" source="CVE"/>
		<reference ref_id="CVE-2016-4738" ref_url="https://www.suse.com/security/cve/CVE-2016-4738/" source="CVE"/>
		<reference ref_id="CVE-2017-5029" ref_url="https://www.suse.com/security/cve/CVE-2017-5029/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002887.html" source="SUSE-SU"/>
		<description>

 This update for libxslt fixes the following issues:
 

- CVE-2017-5029: The xsltAddTextString function in transform.c lacked a check 
for integer overflow during a size calculation, which allowed a remote attacker 
to perform an out of bounds memory write via a crafted HTML page (bsc#1035905).

- CVE-2016-4738: Fix heap overread in xsltFormatNumberConversion: An empty decimal-separator 
could cause a heap overread. This can be exploited to leak a couple of bytes after 
the buffer that holds the pattern string (bsc#1005591).

- CVE-2015-9019: Properly initialize random generator (bsc#934119).

- CVE-2015-7995: Vulnerability in function xsltStylePreCompute' in preproc.c could cause a 
type confusion leading to DoS. (bsc#952474)

 		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-16"/>
	<updated date="2017-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005591">SUSE bug 1005591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035905">SUSE bug 1035905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934119">SUSE bug 934119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952474">SUSE bug 952474</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7995/">CVE-2015-7995</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-9019/">CVE-2015-9019</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4738/">CVE-2016-4738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5029/">CVE-2017-5029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517365" comment="libxslt-tools-1.1.28-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517366" comment="libxslt1-1.1.28-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517367" comment="libxslt1-32bit-1.1.28-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78059" version="1" class="patch">
	<metadata>
		<title>Security update for bash (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1010845" ref_url="https://bugzilla.suse.com/1010845" source="BUGZILLA"/>
		<reference ref_id="1035371" ref_url="https://bugzilla.suse.com/1035371" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9401" ref_url="https://www.suse.com/security/cve/CVE-2016-9401/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002891.html" source="SUSE-SU"/>
		<description>

This update for bash fixes an issue that could lead to syntax errors when parsing
scripts that use expr(1) inside loops.

Additionally, the popd build-in now ensures that the normalized stack offset is
within bounds before trying to free that stack entry. This fixes a segmentation
fault.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-16"/>
	<updated date="2017-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010845">SUSE bug 1010845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035371">SUSE bug 1035371</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9401/">CVE-2016-9401</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518626" comment="bash-4.3-82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518627" comment="bash-doc-4.3-82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518628" comment="bash-lang-4.3-82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518629" comment="libreadline6-6.3-82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518630" comment="libreadline6-32bit-6.3-82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518631" comment="readline-doc-6.3-82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78060" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1020868" ref_url="https://bugzilla.suse.com/1020868" source="BUGZILLA"/>
		<reference ref_id="1020890" ref_url="https://bugzilla.suse.com/1020890" source="BUGZILLA"/>
		<reference ref_id="1020976" ref_url="https://bugzilla.suse.com/1020976" source="BUGZILLA"/>
		<reference ref_id="1022428" ref_url="https://bugzilla.suse.com/1022428" source="BUGZILLA"/>
		<reference ref_id="1034911" ref_url="https://bugzilla.suse.com/1034911" source="BUGZILLA"/>
		<reference ref_id="996821" ref_url="https://bugzilla.suse.com/996821" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3302" ref_url="https://www.suse.com/security/cve/CVE-2017-3302/" source="CVE"/>
		<reference ref_id="CVE-2017-3313" ref_url="https://www.suse.com/security/cve/CVE-2017-3313/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1315-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00051.html" source="SUSE-SU"/>
		<description>

This update for mariadb fixes the following issues:

- update to MariaDB 10.0.30 GA
  * notable changes:
    * XtraDB updated to 5.6.35-80.0
    * TokuDB updated to 5.6.35-80.0
    * PCRE updated to 8.40
    * MDEV-11027: better InnoDB crash recovery progress reporting
    * MDEV-11520: improvements to how InnoDB data files are extended
    * Improvements to InnoDB startup/shutdown to make it more robust
    * MDEV-11233: fix for FULLTEXT index crash
    * MDEV-6143: MariaDB Linux binary tarballs will now always untar
      to directories that match their filename
  * release notes and changelog:
     * https://kb.askmonty.org/en/mariadb-10030-release-notes
     * https://kb.askmonty.org/en/mariadb-10030-changelog
  * fixes the following CVEs:
    CVE-2017-3313: unspecified vulnerability affecting the MyISAM  component [bsc#1020890]
    CVE-2017-3302: Use after free in libmysqlclient.so [bsc#1022428] 
- set the default umask to 077 in mysql-systemd-helper [bsc#1020976]
- [bsc#1034911] - tracker bug

  * fixes also [bsc#1020868]		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-16"/>
	<updated date="2017-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020890">SUSE bug 1020890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020976">SUSE bug 1020976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022428">SUSE bug 1022428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034911">SUSE bug 1034911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996821">SUSE bug 996821</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3302/">CVE-2017-3302</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3313/">CVE-2017-3313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517368" comment="libmysqlclient18-10.0.30-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517369" comment="libmysqlclient18-32bit-10.0.30-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517370" comment="libmysqlclient_r18-10.0.30-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517371" comment="libmysqlclient_r18-32bit-10.0.30-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517372" comment="mariadb-10.0.30-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517373" comment="mariadb-client-10.0.30-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517374" comment="mariadb-errormessages-10.0.30-25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78061" version="1" class="patch">
	<metadata>
		<title>Security update for libtirpc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1037559" ref_url="https://bugzilla.suse.com/1037559" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8779" ref_url="https://www.suse.com/security/cve/CVE-2017-8779/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00050.html" source="SUSE-SU"/>
		<description>

This update for libtirpc fixes the following issues:

-  CVE-2017-8779: crafted UDP packaged could lead  rpcbind to denial-of-service  (bsc#1037559)


		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-16"/>
	<updated date="2017-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037559">SUSE bug 1037559</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8779/">CVE-2017-8779</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518632" comment="libtirpc-netconfig-1.0.1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518633" comment="libtirpc3-1.0.1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518634" comment="libtirpc3-32bit-1.0.1-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78062" version="1" class="patch">
	<metadata>
		<title>Security update for rpcbind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1037559" ref_url="https://bugzilla.suse.com/1037559" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8779" ref_url="https://www.suse.com/security/cve/CVE-2017-8779/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00054.html" source="SUSE-SU"/>
		<description>

This update for rpcbind fixes the following issues:

  - CVE-2017-8779: A crafted UDP package could lead rcpbind to remote denial-of-service (bsc#1037559)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-18"/>
	<updated date="2017-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037559">SUSE bug 1037559</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8779/">CVE-2017-8779</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518635" comment="rpcbind-0.2.3-23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78063" version="1" class="patch">
	<metadata>
		<title>Security update for kdelibs4 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1036244" ref_url="https://bugzilla.suse.com/1036244" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8422" ref_url="https://www.suse.com/security/cve/CVE-2017-8422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00055.html" source="SUSE-SU"/>
		<description>

This update for kdelibs4 fixes the following issues:

- CVE-2017-8422: This update fixes problem in the DBUS authentication of the kauth framework
  that could be used to escalate privileges depending on bugs or misimplemented dbus
  services. (boo#1036244)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-18"/>
	<updated date="2017-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1036244">SUSE bug 1036244</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-8422/">CVE-2017-8422</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517376" comment="libkde4-4.12.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517377" comment="libkde4-32bit-4.12.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517378" comment="libkdecore4-4.12.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517379" comment="libkdecore4-32bit-4.12.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517380" comment="libksuseinstall1-4.12.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517381" comment="libksuseinstall1-32bit-4.12.0-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78064" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1033054" ref_url="https://bugzilla.suse.com/1033054" source="BUGZILLA"/>
		<reference ref_id="1033914" ref_url="https://bugzilla.suse.com/1033914" source="BUGZILLA"/>
		<reference ref_id="1033915" ref_url="https://bugzilla.suse.com/1033915" source="BUGZILLA"/>
		<reference ref_id="1036943" ref_url="https://bugzilla.suse.com/1036943" source="BUGZILLA"/>
		<reference ref_id="1036944" ref_url="https://bugzilla.suse.com/1036944" source="BUGZILLA"/>
		<reference ref_id="1036945" ref_url="https://bugzilla.suse.com/1036945" source="BUGZILLA"/>
		<reference ref_id="1036946" ref_url="https://bugzilla.suse.com/1036946" source="BUGZILLA"/>
		<reference ref_id="1038856" ref_url="https://bugzilla.suse.com/1038856" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7585" ref_url="https://www.suse.com/security/cve/CVE-2017-7585/" source="CVE"/>
		<reference ref_id="CVE-2017-7741" ref_url="https://www.suse.com/security/cve/CVE-2017-7741/" source="CVE"/>
		<reference ref_id="CVE-2017-7742" ref_url="https://www.suse.com/security/cve/CVE-2017-7742/" source="CVE"/>
		<reference ref_id="CVE-2017-8361" ref_url="https://www.suse.com/security/cve/CVE-2017-8361/" source="CVE"/>
		<reference ref_id="CVE-2017-8362" ref_url="https://www.suse.com/security/cve/CVE-2017-8362/" source="CVE"/>
		<reference ref_id="CVE-2017-8363" ref_url="https://www.suse.com/security/cve/CVE-2017-8363/" source="CVE"/>
		<reference ref_id="CVE-2017-8365" ref_url="https://www.suse.com/security/cve/CVE-2017-8365/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002906.html" source="SUSE-SU"/>
		<description>

This update for libsndfile fixes the following issues:

- CVE-2017-8361: Global buffer overflow in flac_buffer_copy. (bsc#1036946)
- CVE-2017-8362: Invalid memory read in flac_buffer_copy. (bsc#1036943)
- CVE-2017-8363: Heap-based buffer overflow in flac_buffer_copy. (bsc#1036945)
- CVE-2017-7585, CVE-2017-7741, CVE-2017-7742: Stack-based buffer overflows via specially
  crafted FLAC files. (bsc#1033054)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-22"/>
	<updated date="2017-05-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033054">SUSE bug 1033054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033914">SUSE bug 1033914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033915">SUSE bug 1033915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036943">SUSE bug 1036943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036944">SUSE bug 1036944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036945">SUSE bug 1036945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036946">SUSE bug 1036946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038856">SUSE bug 1038856</bugzilla>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7585/">CVE-2017-7585</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7741/">CVE-2017-7741</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7742/">CVE-2017-7742</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8361/">CVE-2017-8361</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8362/">CVE-2017-8362</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8363/">CVE-2017-8363</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8365/">CVE-2017-8365</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517395" comment="libsndfile1-1.0.25-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517396" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78065" version="1" class="patch">
	<metadata>
		<title>Security update for libplist (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1019531" ref_url="https://bugzilla.suse.com/1019531" source="BUGZILLA"/>
		<reference ref_id="1021610" ref_url="https://bugzilla.suse.com/1021610" source="BUGZILLA"/>
		<reference ref_id="1023807" ref_url="https://bugzilla.suse.com/1023807" source="BUGZILLA"/>
		<reference ref_id="1023822" ref_url="https://bugzilla.suse.com/1023822" source="BUGZILLA"/>
		<reference ref_id="1023848" ref_url="https://bugzilla.suse.com/1023848" source="BUGZILLA"/>
		<reference ref_id="1029631" ref_url="https://bugzilla.suse.com/1029631" source="BUGZILLA"/>
		<reference ref_id="1035312" ref_url="https://bugzilla.suse.com/1035312" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5209" ref_url="https://www.suse.com/security/cve/CVE-2017-5209/" source="CVE"/>
		<reference ref_id="CVE-2017-5545" ref_url="https://www.suse.com/security/cve/CVE-2017-5545/" source="CVE"/>
		<reference ref_id="CVE-2017-5834" ref_url="https://www.suse.com/security/cve/CVE-2017-5834/" source="CVE"/>
		<reference ref_id="CVE-2017-5835" ref_url="https://www.suse.com/security/cve/CVE-2017-5835/" source="CVE"/>
		<reference ref_id="CVE-2017-5836" ref_url="https://www.suse.com/security/cve/CVE-2017-5836/" source="CVE"/>
		<reference ref_id="CVE-2017-6440" ref_url="https://www.suse.com/security/cve/CVE-2017-6440/" source="CVE"/>
		<reference ref_id="CVE-2017-7982" ref_url="https://www.suse.com/security/cve/CVE-2017-7982/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002908.html" source="SUSE-SU"/>
		<description>

This update for libplist fixes the following issues:
 
- CVE-2017-5209: The base64decode function in libplist allowed attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via split encoded Apple Property List data (bsc#1019531).
- CVE-2017-5545: The main function in plistutil.c in libimobiledevice libplist allowed attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via Apple Property List data that is too short. (bsc#1021610).
- CVE-2017-5836: A type inconsistency in bplist.c was fixed. (bsc#1023807)
- CVE-2017-5835: A memory allocation error leading to DoS was fixed. (bsc#1023822)
- CVE-2017-5834: A heap-buffer overflow in parse_dict_node was fixed. (bsc#1023848)
- CVE-2017-6440: Ensure that sanity checks work on 32-bit platforms.  (bsc#1029631)
- CVE-2017-7982: Add some safety checks, backported from upstream (bsc#1035312). 
- CVE-2017-5836: A maliciously crafted file could cause the application to crash. (bsc#1023807).
- CVE-2017-5835: Malicious crafted file could cause libplist to allocate large amounts of memory 
and consume lots of CPU (bsc#1023822) 
- CVE-2017-5834: Maliciou crafted file could cause a heap buffer overflow or segmentation fault (bsc#1023848)

 		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-23"/>
	<updated date="2017-05-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1019531">SUSE bug 1019531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021610">SUSE bug 1021610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023807">SUSE bug 1023807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023822">SUSE bug 1023822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023848">SUSE bug 1023848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029631">SUSE bug 1029631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035312">SUSE bug 1035312</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5209/">CVE-2017-5209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5545/">CVE-2017-5545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5834/">CVE-2017-5834</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5835/">CVE-2017-5835</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5836/">CVE-2017-5836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6440/">CVE-2017-6440</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7982/">CVE-2017-7982</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518636" comment="libplist++3-1.12-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518637" comment="libplist3-1.12-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78066" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1038231" ref_url="https://bugzilla.suse.com/1038231" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7494" ref_url="https://www.suse.com/security/cve/CVE-2017-7494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00065.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issue:

- An unprivileged user with access to the samba server could cause smbd to load
  a specially crafted shared library, which then had the ability to execute
  arbitrary code on the server as 'root'. [CVE-2017-7494, bso#12780, bsc#1038231]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-24"/>
	<updated date="2017-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038231">SUSE bug 1038231</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7494/">CVE-2017-7494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518638" comment="libdcerpc-binding0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518639" comment="libdcerpc-binding0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518640" comment="libdcerpc0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518641" comment="libdcerpc0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518642" comment="libndr-krb5pac0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518643" comment="libndr-krb5pac0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518644" comment="libndr-nbt0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518645" comment="libndr-nbt0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518646" comment="libndr-standard0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518647" comment="libndr-standard0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518648" comment="libndr0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518649" comment="libndr0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518650" comment="libnetapi0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518651" comment="libnetapi0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518652" comment="libsamba-credentials0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518653" comment="libsamba-credentials0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518654" comment="libsamba-errors0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518655" comment="libsamba-errors0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518656" comment="libsamba-hostconfig0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518657" comment="libsamba-hostconfig0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518658" comment="libsamba-passdb0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518659" comment="libsamba-passdb0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518660" comment="libsamba-util0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518661" comment="libsamba-util0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518662" comment="libsamdb0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518663" comment="libsamdb0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518664" comment="libsmbclient0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518665" comment="libsmbclient0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518666" comment="libsmbconf0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518667" comment="libsmbconf0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518668" comment="libsmbldap0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518669" comment="libsmbldap0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518670" comment="libtevent-util0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518671" comment="libtevent-util0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518672" comment="libwbclient0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518673" comment="libwbclient0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518674" comment="samba-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518675" comment="samba-client-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518676" comment="samba-client-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518677" comment="samba-doc-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518678" comment="samba-libs-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518679" comment="samba-libs-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518680" comment="samba-winbind-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518681" comment="samba-winbind-32bit-4.4.2-38.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78067" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1038231" ref_url="https://bugzilla.suse.com/1038231" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7494" ref_url="https://www.suse.com/security/cve/CVE-2017-7494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00066.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issue:

- An unprivileged user with access to the samba server could cause smbd to load
  a specially crafted shared library, which then had the ability to execute
  arbitrary code on the server as 'root'. [CVE-2017-7494, bso#12780, bsc#1038231]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-24"/>
	<updated date="2017-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038231">SUSE bug 1038231</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7494/">CVE-2017-7494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518682" comment="libdcerpc-atsvc0-4.2.4-28.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78068" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1034849" ref_url="https://bugzilla.suse.com/1034849" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3289" ref_url="https://www.suse.com/security/cve/CVE-2017-3289/" source="CVE"/>
		<reference ref_id="CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509/" source="CVE"/>
		<reference ref_id="CVE-2017-3511" ref_url="https://www.suse.com/security/cve/CVE-2017-3511/" source="CVE"/>
		<reference ref_id="CVE-2017-3512" ref_url="https://www.suse.com/security/cve/CVE-2017-3512/" source="CVE"/>
		<reference ref_id="CVE-2017-3514" ref_url="https://www.suse.com/security/cve/CVE-2017-3514/" source="CVE"/>
		<reference ref_id="CVE-2017-3526" ref_url="https://www.suse.com/security/cve/CVE-2017-3526/" source="CVE"/>
		<reference ref_id="CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533/" source="CVE"/>
		<reference ref_id="CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539/" source="CVE"/>
		<reference ref_id="CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00068.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_0-openjdk fixes the following issues:

- Update to 2.6.10 - OpenJDK 7u141 (bsc#1034849)
* Security fixes
    - S8163520, CVE-2017-3509: Reuse cache entries
    - S8163528, CVE-2017-3511: Better library loading
    - S8165626, CVE-2017-3512: Improved window framing
    - S8167110, CVE-2017-3514: Windows peering issue
    - S8169011, CVE-2017-3526: Resizing XML parse trees
    - S8170222, CVE-2017-3533: Better transfers of files
    - S8171121, CVE-2017-3539: Enhancing jar checking
    - S8171533, CVE-2017-3544: Better email transfer
    - S8172299: Improve class processing
  * New features
    - PR3347: jstack.stp should support AArch64
  * Import of OpenJDK 7 u141 build 0
    - S4717864: setFont() does not update Fonts of Menus already on
      screen
    - S6474807: (smartcardio) CardTerminal.connect() throws
      CardException instead of CardNotPresentException
    - S6518907: cleanup IA64 specific code in Hotspot
    - S6869327: Add new C2 flag to keep safepoints in counted loops.
    - S7112912: Message 'Error occurred during initialization of
      VM' on boxes with lots of RAM
    - S7124213: [macosx] pack() does ignore size of a component;
      doesn't on the other platforms
    - S7124219: [macosx] Unable to draw images to fullscreen
    - S7124552: [macosx] NullPointerException in getBufferStrategy()
    - S7148275: [macosx] setIconImages() not working correctly
      (distorted icon when minimized)
    - S7154841: [macosx] Popups appear behind taskbar
    - S7155957:
      closed/java/awt/MenuBar/MenuBarStress1/MenuBarStress1.java
      hangs on win 64 bit with jdk8
    - S7160627: [macosx] TextArea has wrong initial size
    - S7167293: FtpURLConnection connection leak on
      FileNotFoundException
    - S7168851: [macosx] Netbeans crashes in
      CImage.nativeCreateNSImageFromArray
    - S7197203: sun/misc/URLClassPath/ClassnameCharTest.sh failed,
      compile error
    - S8005255: [macosx] Cleanup warnings in sun.lwawt
    - S8006088: Incompatible heap size flags accepted by VM
    - S8007295: Reduce number of warnings in awt classes
    - S8010722: assert: failed: heap size is too big for compressed
      oops
    - S8011059: [macosx] Support automatic @2x images loading on
      Mac OS X
    - S8014058: Regression tests for 8006088
    - S8014489:
      tests/gc/arguments/Test(Serial|CMS|Parallel|G1)HeapSizeFlags
      jtreg tests invoke wrong class
    - S8016302: Change type of the number of GC workers to unsigned
      int (2)
    - S8024662: gc/arguments/TestUseCompressedOopsErgo.java does
      not compile.
    - S8024669: Native OOME when allocating after changes to
      maximum heap supporting Coops sizing on sparcv9
    - S8024926: [macosx] AquaIcon HiDPI support
    - S8025974: l10n for policytool
    - S8027025: [macosx] getLocationOnScreen returns 0 if parent
      invisible
    - S8028212: Custom cursor HiDPI support
    - S8028471: PPC64 (part 215): opto: Extend ImplicitNullCheck
      optimization.
    - S8031573: [macosx] Checkmarks of JCheckBoxMenuItems aren't
      rendered in high resolution on Retina
    - S8033534: [macosx] Get MultiResolution image from native
      system
    - S8033786: White flashing when opening Dialogs and Menus using
      Nimbus with dark background
    - S8035568: [macosx] Cursor management unification
    - S8041734: JFrame in full screen mode leaves empty workspace
      after close
    - S8059803: Update use of GetVersionEx to get correct Windows
      version in hs_err files
    - S8066504: GetVersionEx in
      java.base/windows/native/libjava/java_props_md.c might not
      get correct Windows version 0
    - S8079595: Resizing dialog which is JWindow parent makes JVM
      crash
    - S8080729: [macosx] java 7 and 8 JDialogs on multiscreen jump
      to parent frame on focus
    - S8130769: The new menu can't be shown on the menubar after
      clicking the 'Add' button.
    - S8133357: 8u65 l10n resource file translation update
    - S8146602:
      jdk/test/sun/misc/URLClassPath/ClassnameCharTest.java test
      fails with NullPointerException
    - S8147842: IME Composition Window is displayed at incorrect
      location
    - S8147910: Cache initial active_processor_count
    - S8150490: Update OS detection code to recognize Windows
      Server 2016
    - S8161147: jvm crashes when -XX:+UseCountedLoopSafepoints is
      enabled
    - S8161195: Regression:
      closed/javax/swing/text/FlowView/LayoutTest.java
    - S8161993: G1 crashes if active_processor_count changes during
      startup
    - S8162603: Unrecognized VM option 'UseCountedLoopSafepoints'
    - S8162876: [TEST_BUG]
      sun/net/www/protocol/http/HttpInputStream.java fails
      intermittently
    - S8164533: sun/security/ssl/SSLSocketImpl/CloseSocket.java
      failed with 'Error while cleaning up threads after test'
    - S8167179: Make XSL generated namespace prefixes local to
      transformation process
    - S8169465: Deadlock in com.sun.jndi.ldap.pool.Connections
    - S8169589: [macosx] Activating a JDialog puts to back another
      dialog
    - S8170307: Stack size option -Xss is ignored
    - S8170316: (tz) Support tzdata2016j
    - S8170814: Reuse cache entries (part II)
    - S8171388: Update JNDI Thread contexts
    - S8171949: [macosx] AWT_ZoomFrame Automated tests fail with
      error: The bitwise mask Frame.ICONIFIED is not setwhen the
       frame is in ICONIFIED state
    - S8171952: [macosx]
      AWT_Modality/Automated/ModalExclusion/NoExclusion/ModelessDialog
      test fails as DummyButton on Dialog did not gain focus when
      clicked.
    - S8173931: 8u131 L10n resource file update
    - S8174844: Incorrect GPL header causes RE script to miss swap
      to commercial header for licensee source bundle
    - S8175087: [bsd] Fix build after '8024900: PPC64: Enable new
      build on AIX (jdk part)'
    - S8175163: [bsd] Fix build after '8005629: javac warnings
      compiling java.awt.EventDispatchThread...'
    - S8176044: (tz) Support tzdata2017a
  * Import of OpenJDK 7 u141 build 1
    - S8043723: max_heap_for_compressed_oops() declared with
      size_t, but defined with uintx
  * Import of OpenJDK 7 u141 build 2
    - S8011123: serialVersionUID of
      java.awt.dnd.InvalidDnDOperationException changed in JDK8-b82
  * Backports
    - S6515172, PR3362: Runtime.availableProcessors() ignores Linux
      taskset command
    - S8022284, PR3209: Hide internal data structure in PhaseCFG
    - S8023003, PR3209: Cleanup the public interface to PhaseCFG
    - S8023691, PR3209: Create interface for nodes in class Block
    - S8023988, PR3209: Move local scheduling of nodes to the CFG
      creation and code motion phase (PhaseCFG)
    - S8043780, PR3369: Use open(O_CLOEXEC) instead of
      fcntl(FD_CLOEXEC)
    - S8157306, PR3209: Random infrequent null pointer exceptions
      in javac
    - S8173783, PR3329: IllegalArgumentException:
      jdk.tls.namedGroups
    - S8173941, PR3330: SA does not work if executable is DSO
    - S8174729, PR3361: Race Condition in
      java.lang.reflect.WeakCache
  * Bug fixes
    - PR3349: Architectures unsupported by SystemTap tapsets throw
      a parse error
    - PR3370: Disable ARM32 JIT by default in jdk_generic_profile.sh
    - PR3379: Perl should be mandatory
    - PR3390: javac.in and javah.in should use @PERL@ rather than a
      hardcoded path
  * CACAO
    - PR2732: Raise javadoc memory limits for CACAO again!
  * AArch64 port
    - S8177661, PR3367: Correct ad rule output register types from
      iRegX to iRegXNoSp

- Get ecj.jar path from gcj, use the gcc variant that provides Java
  to build C code to make sure jni.h is available.

    - S8167104, CVE-2017-3289: Additional class construction
    - S6253144: Long narrowing conversion should describe the
    - S6328537: Improve javadocs for Socket class by adding
    - S6978886: javadoc shows stacktrace after print error
    - S6995421: Eliminate the static dependency to
    - S7027045: (doc) java/awt/Window.java has several typos in
    - S7054969: Null-check-in-finally pattern in java/security
    - S7072353: JNDI libraries do not build with javac -Xlint:all
    - S7092447: Clarify the default locale used in each locale
    - S7103570: AtomicIntegerFieldUpdater does not work when
    - S7187144: JavaDoc for ScriptEngineFactory.getProgram()
    - S8000418: javadoc should used a standard 'generated by
    - S8000666: javadoc should write directly to Writer instead of
    - S8000970: break out auxiliary classes that will prevent
    - S8001669: javadoc internal DocletAbortException should set
    - S8011402: Move blacklisting certificate logic from hard code
    - S8011547: Update XML Signature implementation to Apache
    - S8012288: XML DSig API allows wrong tag names and extra
    - S8017325: Cleanup of the javadoc &lt;code&gt; tag in
    - S8017326: Cleanup of the javadoc &lt;code&gt; tag in
    - S8019772: Fix doclint issues in javax.crypto and
    - S8020688: Broken links in documentation at
    - S8021108: Clean up doclint warnings and errors in java.text
    - S8022120: JCK test
      api/javax_xml/crypto/dsig/TransformService/index_ParamMethods
    - S8025409: Fix javadoc comments errors and warning reported by
    - S8026021: more fix of javadoc errors and warnings reported by
    - S8037099: [macosx] Remove all references to GC from native
    - S8038184: XMLSignature throws StringIndexOutOfBoundsException
    - S8038349: Signing XML with DSA throws Exception when key is
    - S8049244: XML Signature performance issue caused by
    - S8050893: (smartcardio) Invert reset argument in tests in
    - S8059212: Modify sun/security/smartcardio manual regression
    - S8068279: (typo in the spec)
    - S8068491: Update the protocol for references of
    - S8069038: javax/net/ssl/TLS/TLSClientPropertyTest.java needs
    - S8076369: Introduce the jdk.tls.client.protocols system
    - S8139565: Restrict certificates with DSA keys less than 1024
    - S8140422: Add mechanism to allow non default root CAs to be
    - S8140587: Atomic*FieldUpdaters should use Class.isInstance
    - S8149029: Secure validation of XML based digital signature
    - S8151893: Add security property to configure XML Signature
    - S8161228: URL objects with custom protocol handlers have port
    - S8163304: jarsigner -verbose -verify should print the
    - S8164908: ReflectionFactory support for IIOP and custom
    - S8165230: RMIConnection addNotificationListeners failing with
    - S8166393: disabledAlgorithms property should not be strictly
    - S8166591: [macos 10.12] Trackpad scrolling of text on OS X
    - S8166739: Improve extensibility of ObjectInputFilter
    - S8167356: Follow up fix for jdk8 backport of 8164143. Changes
    - S8167459: Add debug output for indicating if a chosen
    - S8168861: AnchorCertificates uses hardcoded password for
    - S8169688: Backout (remove) MD5 from
    - S8169911: Enhanced tests for jarsigner -verbose -verify after
    - S8170131: Certificates not being blocked by
    - S8173854: [TEST] Update DHEKeySizing test case following
    - S7102489, PR3316, RH1390708: RFE: cleanup jlong typedef on
    - S8000351, PR3316, RH1390708: Tenuring threshold should be
    - S8153711, PR3315, RH1284948: [REDO] JDWP: Memory Leak:
    - S8170888, PR3316, RH1390708: [linux] Experimental support for
    - PR3318: Replace 'infinality' with 'improved font rendering'
    - PR3324: Fix NSS_LIBDIR substitution in
    - S8165673, PR3320: AArch64: Fix JNI floating point argument
    + S6604109, PR3162:
- Add -fno-delete-null-pointer-checks -fno-lifetime-dse to try to
      directory to be specified
      versions of IcedTea
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-24"/>
	<updated date="2017-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3289/">CVE-2017-3289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3511/">CVE-2017-3511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3512/">CVE-2017-3512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3514/">CVE-2017-3514</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3526/">CVE-2017-3526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517447" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517448" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78069" version="1" class="patch">
	<metadata>
		<title>Security update for pam (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1015565" ref_url="https://bugzilla.suse.com/1015565" source="BUGZILLA"/>
		<reference ref_id="1037824" ref_url="https://bugzilla.suse.com/1037824" source="BUGZILLA"/>
		<reference ref_id="934920" ref_url="https://bugzilla.suse.com/934920" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3238" ref_url="https://www.suse.com/security/cve/CVE-2015-3238/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002919.html" source="SUSE-SU"/>
		<description>

This update for pam fixes the following issues:
 

- CVE-2015-3238: pam_unix in conjunction with SELinux allowed for DoS attacks (bsc#934920).
- log a hint to syslog if /etc/nologin is present, but empty (bsc#1015565).
- If /etc/nologin is present, but empty, log a hint to syslog. (bsc#1015565)
- Added support for libowcrypt.so, if present, to configure support for BLOWFISH (bsc#1037824)

 		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-24"/>
	<updated date="2017-05-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015565">SUSE bug 1015565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037824">SUSE bug 1037824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934920">SUSE bug 934920</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3238/">CVE-2015-3238</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517449" comment="pam-1.1.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517450" comment="pam-32bit-1.1.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517451" comment="pam-doc-1.1.8-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78070" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1018128" ref_url="https://bugzilla.suse.com/1018128" source="BUGZILLA"/>
		<reference ref_id="1030263" ref_url="https://bugzilla.suse.com/1030263" source="BUGZILLA"/>
		<reference ref_id="1032114" ref_url="https://bugzilla.suse.com/1032114" source="BUGZILLA"/>
		<reference ref_id="1032120" ref_url="https://bugzilla.suse.com/1032120" source="BUGZILLA"/>
		<reference ref_id="1036453" ref_url="https://bugzilla.suse.com/1036453" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10220" ref_url="https://www.suse.com/security/cve/CVE-2016-10220/" source="CVE"/>
		<reference ref_id="CVE-2016-9601" ref_url="https://www.suse.com/security/cve/CVE-2016-9601/" source="CVE"/>
		<reference ref_id="CVE-2017-5951" ref_url="https://www.suse.com/security/cve/CVE-2017-5951/" source="CVE"/>
		<reference ref_id="CVE-2017-7207" ref_url="https://www.suse.com/security/cve/CVE-2017-7207/" source="CVE"/>
		<reference ref_id="CVE-2017-8291" ref_url="https://www.suse.com/security/cve/CVE-2017-8291/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00070.html" source="SUSE-SU"/>
		<description>

This update for ghostscript fixes the following security vulnerabilities:

- CVE-2017-8291: A remote command execution and a -dSAFER bypass via a crafted .eps document were
  exploited in the wild. (bsc#1036453)
- CVE-2016-9601: An integer overflow in the bundled jbig2dec library could have been misused to cause
  a Denial-of-Service. (bsc#1018128)
- CVE-2016-10220: A NULL pointer dereference in the PDF Transparency module allowed remote attackers
  to cause a Denial-of-Service. (bsc#1032120)
- CVE-2017-5951: A NULL pointer dereference allowed remote attackers to cause a denial of service
  via a crafted PostScript document. (bsc#1032114)
- CVE-2017-7207: A NULL pointer dereference allowed remote attackers to cause a denial of service
  via a crafted PostScript document. (bsc#1030263)

This is a reissue of the previous update to also include SUSE Linux Enterprise 12 GA LTSS packages.

		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-24"/>
	<updated date="2017-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1018128">SUSE bug 1018128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030263">SUSE bug 1030263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032114">SUSE bug 1032114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032120">SUSE bug 1032120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10220/">CVE-2016-10220</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9601/">CVE-2016-9601</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5951/">CVE-2017-5951</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-7207/">CVE-2017-7207</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-8291/">CVE-2017-8291</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517452" comment="ghostscript-9.15-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517453" comment="ghostscript-x11-9.15-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78071" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1000118" ref_url="https://bugzilla.suse.com/1000118" source="BUGZILLA"/>
		<reference ref_id="1000189" ref_url="https://bugzilla.suse.com/1000189" source="BUGZILLA"/>
		<reference ref_id="1000287" ref_url="https://bugzilla.suse.com/1000287" source="BUGZILLA"/>
		<reference ref_id="1000304" ref_url="https://bugzilla.suse.com/1000304" source="BUGZILLA"/>
		<reference ref_id="1000433" ref_url="https://bugzilla.suse.com/1000433" source="BUGZILLA"/>
		<reference ref_id="1000776" ref_url="https://bugzilla.suse.com/1000776" source="BUGZILLA"/>
		<reference ref_id="1001169" ref_url="https://bugzilla.suse.com/1001169" source="BUGZILLA"/>
		<reference ref_id="1001171" ref_url="https://bugzilla.suse.com/1001171" source="BUGZILLA"/>
		<reference ref_id="1001310" ref_url="https://bugzilla.suse.com/1001310" source="BUGZILLA"/>
		<reference ref_id="1001462" ref_url="https://bugzilla.suse.com/1001462" source="BUGZILLA"/>
		<reference ref_id="1001486" ref_url="https://bugzilla.suse.com/1001486" source="BUGZILLA"/>
		<reference ref_id="1001888" ref_url="https://bugzilla.suse.com/1001888" source="BUGZILLA"/>
		<reference ref_id="1002322" ref_url="https://bugzilla.suse.com/1002322" source="BUGZILLA"/>
		<reference ref_id="1002770" ref_url="https://bugzilla.suse.com/1002770" source="BUGZILLA"/>
		<reference ref_id="1002786" ref_url="https://bugzilla.suse.com/1002786" source="BUGZILLA"/>
		<reference ref_id="1003068" ref_url="https://bugzilla.suse.com/1003068" source="BUGZILLA"/>
		<reference ref_id="1003566" ref_url="https://bugzilla.suse.com/1003566" source="BUGZILLA"/>
		<reference ref_id="1003581" ref_url="https://bugzilla.suse.com/1003581" source="BUGZILLA"/>
		<reference ref_id="1003606" ref_url="https://bugzilla.suse.com/1003606" source="BUGZILLA"/>
		<reference ref_id="1003813" ref_url="https://bugzilla.suse.com/1003813" source="BUGZILLA"/>
		<reference ref_id="1003866" ref_url="https://bugzilla.suse.com/1003866" source="BUGZILLA"/>
		<reference ref_id="1003964" ref_url="https://bugzilla.suse.com/1003964" source="BUGZILLA"/>
		<reference ref_id="1004048" ref_url="https://bugzilla.suse.com/1004048" source="BUGZILLA"/>
		<reference ref_id="1004052" ref_url="https://bugzilla.suse.com/1004052" source="BUGZILLA"/>
		<reference ref_id="1004252" ref_url="https://bugzilla.suse.com/1004252" source="BUGZILLA"/>
		<reference ref_id="1004365" ref_url="https://bugzilla.suse.com/1004365" source="BUGZILLA"/>
		<reference ref_id="1004517" ref_url="https://bugzilla.suse.com/1004517" source="BUGZILLA"/>
		<reference ref_id="1005169" ref_url="https://bugzilla.suse.com/1005169" source="BUGZILLA"/>
		<reference ref_id="1005327" ref_url="https://bugzilla.suse.com/1005327" source="BUGZILLA"/>
		<reference ref_id="1005545" ref_url="https://bugzilla.suse.com/1005545" source="BUGZILLA"/>
		<reference ref_id="1005666" ref_url="https://bugzilla.suse.com/1005666" source="BUGZILLA"/>
		<reference ref_id="1005745" ref_url="https://bugzilla.suse.com/1005745" source="BUGZILLA"/>
		<reference ref_id="1005895" ref_url="https://bugzilla.suse.com/1005895" source="BUGZILLA"/>
		<reference ref_id="1005917" ref_url="https://bugzilla.suse.com/1005917" source="BUGZILLA"/>
		<reference ref_id="1005921" ref_url="https://bugzilla.suse.com/1005921" source="BUGZILLA"/>
		<reference ref_id="1005923" ref_url="https://bugzilla.suse.com/1005923" source="BUGZILLA"/>
		<reference ref_id="1005925" ref_url="https://bugzilla.suse.com/1005925" source="BUGZILLA"/>
		<reference ref_id="1005929" ref_url="https://bugzilla.suse.com/1005929" source="BUGZILLA"/>
		<reference ref_id="1006103" ref_url="https://bugzilla.suse.com/1006103" source="BUGZILLA"/>
		<reference ref_id="1006175" ref_url="https://bugzilla.suse.com/1006175" source="BUGZILLA"/>
		<reference ref_id="1006267" ref_url="https://bugzilla.suse.com/1006267" source="BUGZILLA"/>
		<reference ref_id="1006528" ref_url="https://bugzilla.suse.com/1006528" source="BUGZILLA"/>
		<reference ref_id="1006576" ref_url="https://bugzilla.suse.com/1006576" source="BUGZILLA"/>
		<reference ref_id="1006804" ref_url="https://bugzilla.suse.com/1006804" source="BUGZILLA"/>
		<reference ref_id="1006809" ref_url="https://bugzilla.suse.com/1006809" source="BUGZILLA"/>
		<reference ref_id="1006827" ref_url="https://bugzilla.suse.com/1006827" source="BUGZILLA"/>
		<reference ref_id="1006915" ref_url="https://bugzilla.suse.com/1006915" source="BUGZILLA"/>
		<reference ref_id="1006918" ref_url="https://bugzilla.suse.com/1006918" source="BUGZILLA"/>
		<reference ref_id="1007197" ref_url="https://bugzilla.suse.com/1007197" source="BUGZILLA"/>
		<reference ref_id="1007615" ref_url="https://bugzilla.suse.com/1007615" source="BUGZILLA"/>
		<reference ref_id="1007653" ref_url="https://bugzilla.suse.com/1007653" source="BUGZILLA"/>
		<reference ref_id="1007955" ref_url="https://bugzilla.suse.com/1007955" source="BUGZILLA"/>
		<reference ref_id="1008557" ref_url="https://bugzilla.suse.com/1008557" source="BUGZILLA"/>
		<reference ref_id="1008979" ref_url="https://bugzilla.suse.com/1008979" source="BUGZILLA"/>
		<reference ref_id="1009062" ref_url="https://bugzilla.suse.com/1009062" source="BUGZILLA"/>
		<reference ref_id="1009969" ref_url="https://bugzilla.suse.com/1009969" source="BUGZILLA"/>
		<reference ref_id="1010040" ref_url="https://bugzilla.suse.com/1010040" source="BUGZILLA"/>
		<reference ref_id="1010158" ref_url="https://bugzilla.suse.com/1010158" source="BUGZILLA"/>
		<reference ref_id="1010444" ref_url="https://bugzilla.suse.com/1010444" source="BUGZILLA"/>
		<reference ref_id="1010478" ref_url="https://bugzilla.suse.com/1010478" source="BUGZILLA"/>
		<reference ref_id="1010507" ref_url="https://bugzilla.suse.com/1010507" source="BUGZILLA"/>
		<reference ref_id="1010665" ref_url="https://bugzilla.suse.com/1010665" source="BUGZILLA"/>
		<reference ref_id="1010690" ref_url="https://bugzilla.suse.com/1010690" source="BUGZILLA"/>
		<reference ref_id="1010970" ref_url="https://bugzilla.suse.com/1010970" source="BUGZILLA"/>
		<reference ref_id="1011176" ref_url="https://bugzilla.suse.com/1011176" source="BUGZILLA"/>
		<reference ref_id="1011250" ref_url="https://bugzilla.suse.com/1011250" source="BUGZILLA"/>
		<reference ref_id="1011913" ref_url="https://bugzilla.suse.com/1011913" source="BUGZILLA"/>
		<reference ref_id="1012060" ref_url="https://bugzilla.suse.com/1012060" source="BUGZILLA"/>
		<reference ref_id="1012094" ref_url="https://bugzilla.suse.com/1012094" source="BUGZILLA"/>
		<reference ref_id="1012452" ref_url="https://bugzilla.suse.com/1012452" source="BUGZILLA"/>
		<reference ref_id="1012767" ref_url="https://bugzilla.suse.com/1012767" source="BUGZILLA"/>
		<reference ref_id="1012829" ref_url="https://bugzilla.suse.com/1012829" source="BUGZILLA"/>
		<reference ref_id="1012992" ref_url="https://bugzilla.suse.com/1012992" source="BUGZILLA"/>
		<reference ref_id="1013001" ref_url="https://bugzilla.suse.com/1013001" source="BUGZILLA"/>
		<reference ref_id="1013479" ref_url="https://bugzilla.suse.com/1013479" source="BUGZILLA"/>
		<reference ref_id="1013531" ref_url="https://bugzilla.suse.com/1013531" source="BUGZILLA"/>
		<reference ref_id="1013700" ref_url="https://bugzilla.suse.com/1013700" source="BUGZILLA"/>
		<reference ref_id="1014120" ref_url="https://bugzilla.suse.com/1014120" source="BUGZILLA"/>
		<reference ref_id="1014392" ref_url="https://bugzilla.suse.com/1014392" source="BUGZILLA"/>
		<reference ref_id="1014701" ref_url="https://bugzilla.suse.com/1014701" source="BUGZILLA"/>
		<reference ref_id="1014710" ref_url="https://bugzilla.suse.com/1014710" source="BUGZILLA"/>
		<reference ref_id="1015212" ref_url="https://bugzilla.suse.com/1015212" source="BUGZILLA"/>
		<reference ref_id="1015359" ref_url="https://bugzilla.suse.com/1015359" source="BUGZILLA"/>
		<reference ref_id="1015367" ref_url="https://bugzilla.suse.com/1015367" source="BUGZILLA"/>
		<reference ref_id="1015416" ref_url="https://bugzilla.suse.com/1015416" source="BUGZILLA"/>
		<reference ref_id="799133" ref_url="https://bugzilla.suse.com/799133" source="BUGZILLA"/>
		<reference ref_id="914939" ref_url="https://bugzilla.suse.com/914939" source="BUGZILLA"/>
		<reference ref_id="922634" ref_url="https://bugzilla.suse.com/922634" source="BUGZILLA"/>
		<reference ref_id="963609" ref_url="https://bugzilla.suse.com/963609" source="BUGZILLA"/>
		<reference ref_id="963655" ref_url="https://bugzilla.suse.com/963655" source="BUGZILLA"/>
		<reference ref_id="963904" ref_url="https://bugzilla.suse.com/963904" source="BUGZILLA"/>
		<reference ref_id="964462" ref_url="https://bugzilla.suse.com/964462" source="BUGZILLA"/>
		<reference ref_id="966170" ref_url="https://bugzilla.suse.com/966170" source="BUGZILLA"/>
		<reference ref_id="966172" ref_url="https://bugzilla.suse.com/966172" source="BUGZILLA"/>
		<reference ref_id="966186" ref_url="https://bugzilla.suse.com/966186" source="BUGZILLA"/>
		<reference ref_id="966191" ref_url="https://bugzilla.suse.com/966191" source="BUGZILLA"/>
		<reference ref_id="966316" ref_url="https://bugzilla.suse.com/966316" source="BUGZILLA"/>
		<reference ref_id="966318" ref_url="https://bugzilla.suse.com/966318" source="BUGZILLA"/>
		<reference ref_id="966325" ref_url="https://bugzilla.suse.com/966325" source="BUGZILLA"/>
		<reference ref_id="966471" ref_url="https://bugzilla.suse.com/966471" source="BUGZILLA"/>
		<reference ref_id="969474" ref_url="https://bugzilla.suse.com/969474" source="BUGZILLA"/>
		<reference ref_id="969475" ref_url="https://bugzilla.suse.com/969475" source="BUGZILLA"/>
		<reference ref_id="969476" ref_url="https://bugzilla.suse.com/969476" source="BUGZILLA"/>
		<reference ref_id="969477" ref_url="https://bugzilla.suse.com/969477" source="BUGZILLA"/>
		<reference ref_id="969756" ref_url="https://bugzilla.suse.com/969756" source="BUGZILLA"/>
		<reference ref_id="971975" ref_url="https://bugzilla.suse.com/971975" source="BUGZILLA"/>
		<reference ref_id="971989" ref_url="https://bugzilla.suse.com/971989" source="BUGZILLA"/>
		<reference ref_id="972993" ref_url="https://bugzilla.suse.com/972993" source="BUGZILLA"/>
		<reference ref_id="974313" ref_url="https://bugzilla.suse.com/974313" source="BUGZILLA"/>
		<reference ref_id="974842" ref_url="https://bugzilla.suse.com/974842" source="BUGZILLA"/>
		<reference ref_id="974843" ref_url="https://bugzilla.suse.com/974843" source="BUGZILLA"/>
		<reference ref_id="978907" ref_url="https://bugzilla.suse.com/978907" source="BUGZILLA"/>
		<reference ref_id="979378" ref_url="https://bugzilla.suse.com/979378" source="BUGZILLA"/>
		<reference ref_id="979681" ref_url="https://bugzilla.suse.com/979681" source="BUGZILLA"/>
		<reference ref_id="981825" ref_url="https://bugzilla.suse.com/981825" source="BUGZILLA"/>
		<reference ref_id="983087" ref_url="https://bugzilla.suse.com/983087" source="BUGZILLA"/>
		<reference ref_id="983152" ref_url="https://bugzilla.suse.com/983152" source="BUGZILLA"/>
		<reference ref_id="983318" ref_url="https://bugzilla.suse.com/983318" source="BUGZILLA"/>
		<reference ref_id="985850" ref_url="https://bugzilla.suse.com/985850" source="BUGZILLA"/>
		<reference ref_id="986255" ref_url="https://bugzilla.suse.com/986255" source="BUGZILLA"/>
		<reference ref_id="986987" ref_url="https://bugzilla.suse.com/986987" source="BUGZILLA"/>
		<reference ref_id="987641" ref_url="https://bugzilla.suse.com/987641" source="BUGZILLA"/>
		<reference ref_id="987703" ref_url="https://bugzilla.suse.com/987703" source="BUGZILLA"/>
		<reference ref_id="987805" ref_url="https://bugzilla.suse.com/987805" source="BUGZILLA"/>
		<reference ref_id="988524" ref_url="https://bugzilla.suse.com/988524" source="BUGZILLA"/>
		<reference ref_id="988715" ref_url="https://bugzilla.suse.com/988715" source="BUGZILLA"/>
		<reference ref_id="990384" ref_url="https://bugzilla.suse.com/990384" source="BUGZILLA"/>
		<reference ref_id="992555" ref_url="https://bugzilla.suse.com/992555" source="BUGZILLA"/>
		<reference ref_id="993739" ref_url="https://bugzilla.suse.com/993739" source="BUGZILLA"/>
		<reference ref_id="993841" ref_url="https://bugzilla.suse.com/993841" source="BUGZILLA"/>
		<reference ref_id="993891" ref_url="https://bugzilla.suse.com/993891" source="BUGZILLA"/>
		<reference ref_id="994881" ref_url="https://bugzilla.suse.com/994881" source="BUGZILLA"/>
		<reference ref_id="995278" ref_url="https://bugzilla.suse.com/995278" source="BUGZILLA"/>
		<reference ref_id="997059" ref_url="https://bugzilla.suse.com/997059" source="BUGZILLA"/>
		<reference ref_id="997639" ref_url="https://bugzilla.suse.com/997639" source="BUGZILLA"/>
		<reference ref_id="997807" ref_url="https://bugzilla.suse.com/997807" source="BUGZILLA"/>
		<reference ref_id="998054" ref_url="https://bugzilla.suse.com/998054" source="BUGZILLA"/>
		<reference ref_id="998689" ref_url="https://bugzilla.suse.com/998689" source="BUGZILLA"/>
		<reference ref_id="999907" ref_url="https://bugzilla.suse.com/999907" source="BUGZILLA"/>
		<reference ref_id="999932" ref_url="https://bugzilla.suse.com/999932" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1350" ref_url="https://www.suse.com/security/cve/CVE-2015-1350/" source="CVE"/>
		<reference ref_id="CVE-2015-8964" ref_url="https://www.suse.com/security/cve/CVE-2015-8964/" source="CVE"/>
		<reference ref_id="CVE-2016-7039" ref_url="https://www.suse.com/security/cve/CVE-2016-7039/" source="CVE"/>
		<reference ref_id="CVE-2016-7042" ref_url="https://www.suse.com/security/cve/CVE-2016-7042/" source="CVE"/>
		<reference ref_id="CVE-2016-7425" ref_url="https://www.suse.com/security/cve/CVE-2016-7425/" source="CVE"/>
		<reference ref_id="CVE-2016-7913" ref_url="https://www.suse.com/security/cve/CVE-2016-7913/" source="CVE"/>
		<reference ref_id="CVE-2016-7917" ref_url="https://www.suse.com/security/cve/CVE-2016-7917/" source="CVE"/>
		<reference ref_id="CVE-2016-8645" ref_url="https://www.suse.com/security/cve/CVE-2016-8645/" source="CVE"/>
		<reference ref_id="CVE-2016-8666" ref_url="https://www.suse.com/security/cve/CVE-2016-8666/" source="CVE"/>
		<reference ref_id="CVE-2016-9083" ref_url="https://www.suse.com/security/cve/CVE-2016-9083/" source="CVE"/>
		<reference ref_id="CVE-2016-9084" ref_url="https://www.suse.com/security/cve/CVE-2016-9084/" source="CVE"/>
		<reference ref_id="CVE-2016-9793" ref_url="https://www.suse.com/security/cve/CVE-2016-9793/" source="CVE"/>
		<reference ref_id="CVE-2016-9919" ref_url="https://www.suse.com/security/cve/CVE-2016-9919/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00028.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 kernel was updated to 4.4.38 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2015-1350: The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allowed local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program (bnc#914939).
- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).
- CVE-2016-7039: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, a related issue to CVE-2016-8666 (bnc#1001486).
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).
- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).
- CVE-2016-7913: The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure (bnc#1010478).
- CVE-2016-7917: The nfnetlink_rcv_batch function in net/netfilter/nfnetlink.c in the Linux kernel did not check whether a batch message's length field is large enough, which allowed local users to obtain sensitive information from kernel memory or cause a denial of service (infinite loop or out-of-bounds read) by leveraging the CAP_NET_ADMIN capability (bnc#1010444).
- CVE-2016-8645: The TCP stack in the Linux kernel mishandled skb truncation, which allowed local users to cause a denial of service (system crash) via a crafted application that made sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c (bnc#1009969).
- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bnc#1003964).
- CVE-2016-9083: drivers/vfio/pci/vfio_pci.c in the Linux kernel allowed local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a 'state machine confusion bug (bnc#1007197).
- CVE-2016-9084: drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel misuses the kzalloc function, which allowed local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file (bnc#1007197).
- CVE-2016-9793: A bug in SO_{SND|RCV}BUFFORCE setsockopt() implementation was fixed, which allowed CAP_NET_ADMIN users to cause memory corruption. (bsc#1013531).
- CVE-2016-9919: The icmp6_send function in net/ipv6/icmp.c in the Linux kernel omits a certain check of the dst data structure, which allowed remote attackers to cause a denial of service (panic) via a fragmented IPv6 packet (bnc#1014701).

The following non-security bugs were fixed:

- 8250_pci: Fix potential use-after-free in error path (bsc#1013001).
- acpi / PAD: do not register acpi_pad driver if running as Xen dom0 (bnc#995278).
- Add mainline tags to various hyperv patches
- alsa: fm801: detect FM-only card earlier (bsc#1005917).
- alsa: fm801: explicitly free IRQ line (bsc#1005917).
- alsa: fm801: propagate TUNER_ONLY bit when autodetected (bsc#1005917).
- alsa: hda - Bind with i915 only when Intel graphics is present (bsc#1012767).
- alsa: hda - Clear the leftover component assignment at snd_hdac_i915_exit() (bsc#1012767).
- alsa: hda - Degrade i915 binding failure message (bsc#1012767).
- alsa: hda - Fix yet another i915 pointer leftover in error path (bsc#1012767).
- alsa: hda - Gate the mic jack on HP Z1 Gen3 AiO (bsc#1004365).
- alsa: hda - Turn off loopback mixing as default (bsc#1001462).
- apparmor: add missing id bounds check on dfa verification (bsc#1000304).
- apparmor: check that xindex is in trans_table bounds (bsc#1000304).
- apparmor: do not check for vmalloc_addr if kvzalloc() failed (bsc#1000304).
- apparmor: do not expose kernel stack (bsc#1000304).
- apparmor: ensure the target profile name is always audited (bsc#1000304).
- apparmor: exec should not be returning ENOENT when it denies (bsc#1000304).
- apparmor: fix audit full profile hname on successful load (bsc#1000304).
- apparmor: fix change_hat not finding hat after policy replacement (bsc#1000287).
- apparmor: fix disconnected bind mnts reconnection (bsc#1000304).
- apparmor: fix log failures for all profiles in a set (bsc#1000304).
- apparmor: fix module parameters can be changed after policy is locked (bsc#1000304).
- apparmor: fix oops in profile_unpack() when policy_db is not present (bsc#1000304).
- apparmor: fix put() parent ref after updating the active ref (bsc#1000304).
- apparmor: fix refcount bug in profile replacement (bsc#1000304).
- apparmor: fix refcount race when finding a child profile (bsc#1000304).
- apparmor: fix replacement bug that adds new child to old parent (bsc#1000304).
- apparmor: fix uninitialized lsm_audit member (bsc#1000304).
- apparmor: fix update the mtime of the profile file on replacement (bsc#1000304).
- apparmor: internal paths should be treated as disconnected (bsc#1000304).
- apparmor: use list_next_entry instead of list_entry_next (bsc#1000304).
- arm64: Call numa_store_cpu_info() earlier.
- arm64/efi: Enable runtime call flag checking (bsc#1005745).
- arm64/efi: Move to generic {__,}efi_call_virt() (bsc#1005745).
- arm64: Refuse to install 4k kernel on 64k system
- arm64: Update config files. Disable CONFIG_IPMI_SI_PROBE_DEFAULTS (bsc#1006576)
- arm: bcm2835: add CPU node for ARM core (boo#1012094).
- arm: bcm2835: Split the DT for peripherals from the DT for the CPU (boo#1012094).
- asoc: cht_bsw_rt5645: Enable jack detection (bsc#1010690).
- asoc: cht_bsw_rt5645: Fix writing to string literal (bsc#1010690).
- asoc: cht_bsw_rt5672: Use HID translation unit (bsc#1010690).
- asoc: fsl_ssi: mark SACNT register volatile (bsc#1005917).
- asoc: imx-spdif: Fix crash on suspend (bsc#1005917).
- asoc: intel: add function stub when ACPI is not enabled (bsc#1010690).
- asoc: Intel: add fw name to common dsp context (bsc#1010690).
- asoc: Intel: Add missing 10EC5672 ACPI ID matching for Cherry Trail (bsc#1010690).
- asoc: Intel: Add module tags for common match module (bsc#1010690).
- asoc: Intel: add NULL test (bsc#1010690).
- AsoC: Intel: Add quirks for MinnowBoard MAX (bsc#1010690).
- asoc: Intel: Add surface3 entry in CHT-RT5645 machine (bsc#1010690).
- asoc: Intel: Atom: add 24-bit support for media playback and capture (bsc#1010690).
- ASoc: Intel: Atom: add deep buffer definitions for atom platforms (bsc#1010690).
- asoc: Intel: Atom: add definitions for modem/SSP0 interface (bsc#1010690).
- asoc: Intel: Atom: Add quirk for Surface 3 (bsc#1010690).
- asoc: Intel: Atom: add support for CHT w/ RT5640 (bsc#1010690).
- asoc: Intel: Atom: Add support for HP ElitePad 1000 G2 (bsc#1010690).
- asoc: Intel: Atom: add support for RT5642 (bsc#1010690).
- asoc: Intel: Atom: add terminate entry for dmi_system_id tables (bsc#1010690).
- asoc: Intel: Atom: auto-detection of Baytrail-CR (bsc#1010690).
- asoc: Intel: Atom: clean-up compressed DAI definition (bsc#1010690).
- asoc: Intel: atom: enable configuration of SSP0 (bsc#1010690).
- asoc: Intel: atom: fix 0-day warnings (bsc#1010690).
- asoc: Intel: Atom: fix boot warning (bsc#1010690).
- asoc: Intel: Atom: Fix message handling during drop stream (bsc#1010690).
- asoc: Intel: atom: fix missing breaks that would cause the wrong operation to execute (bsc#1010690).
- asoc: Intel: Atom: fix regression on compress DAI (bsc#1010690).
- asoc: Intel: Atom: flip logic for gain Switch (bsc#1010690).
- asoc: Intel: atom: Make some messages to debug level (bsc#1010690).
- asoc: Intel: Atom: move atom driver to common acpi match (bsc#1010690).
- asoc: Intel: atom: statify cht_quirk (bsc#1010690).
- asoc: Intel: boards: add DEEP_BUFFER support for BYT/CHT/BSW (bsc#1010690).
- asoc: Intel: boards: align pin names between byt-rt5640 drivers (bsc#1010690).
- asoc: Intel: boards: merge DMI-based quirks in bytcr-rt5640 driver (bsc#1010690).
- asoc: Intel: boards: start merging byt-rt5640 drivers (bsc#1010690).
- asoc: Intel: bytcr_rt56040: additional routing quirks (bsc#1010690).
- asoc: Intel: bytcr-rt5640: add Asus T100TAF quirks (bsc#1010690).
- asoc: Intel: bytcr_rt5640: add IN3 map (bsc#1010690).
- asoc: Intel: bytcr_rt5640: add MCLK support (bsc#1010690).
- asoc: Intel: bytcr_rt5640: Add quirk for Teclast X98 Air 3G tablet (bsc#1010690).
- asoc: Intel: bytcr_rt5640: add SSP2_AIF2 routing (bsc#1010690).
- asoc: Intel: bytcr_rt5640: change quirk position (bsc#1010690).
- asoc: Intel: bytcr_rt5640: default routing and quirks on Baytrail-CR (bsc#1010690).
- asoc: Intel: bytcr-rt5640: enable ASRC (bsc#1010690).
- asoc: Intel: bytcr_rt5640: enable differential mic quirk (bsc#1010690).
- asoc: Intel: bytcr_rt5640: fallback mechanism if MCLK is not enabled (bsc#1010690).
- asoc: Intel: bytcr_rt5640: fix dai/clock setup for SSP0 routing (bsc#1010690).
- asoc: Intel: bytcr_rt5640: fixup DAI codec_name with HID (bsc#1010690).
- asoc: Intel: bytcr_rt5640: log quirks (bsc#1010690).
- asoc: Intel: bytcr_rt5640: quirk for Acer Aspire SWS-012 (bsc#1010690).
- asoc: Intel: bytcr_rt5640: quirk for mono speaker (bsc#1010690).
- asoc: Intel: bytcr_rt5640: set SSP to I2S mode 2ch (bsc#1010690).
- asoc: Intel: bytcr_rt5640: use HID translation util (bsc#1010690).
- asoc: Intel: cht: fix uninit variable warning (bsc#1010690).
- asoc: Intel: common: add translation from HID to codec-name (bsc#1010690).
- asoc: Intel: common: filter ACPI devices with _STA return value (bsc#1010690).
- asoc: Intel: common: increase the loglevel of 'FW Poll Status' (bsc#1010690).
- asoc: Intel: Create independent acpi match module (bsc#1010690).
- asoc: intel: Fix sst-dsp dependency on dw stuff (bsc#1010690).
- asoc: Intel: Keep building old baytrail machine drivers (bsc#1010690).
- asoc: Intel: Load the atom DPCM driver only (bsc#1010690).
- asoc: intel: make function stub static (bsc#1010690).
- asoc: Intel: Move apci find machine routines (bsc#1010690).
- asoc: Intel: pass correct parameter in sst_alloc_stream_mrfld() (bsc#1005917).
- asoc: intel: Replace kthread with work (bsc#1010690).
- asoc: Intel: Skylake: Always acquire runtime pm ref on unload (bsc#1005917).
- asoc: Intel: sst: fix sst_memcpy32 wrong with non-4x bytes issue (bsc#1010690).
- asoc: rt5640: add ASRC support (bsc#1010690).
- asoc: rt5640: add internal clock source support (bsc#1010690).
- asoc: rt5640: add master clock handling for rt5640 (bsc#1010690).
- asoc: rt5640: add supplys for dac power (bsc#1010690).
- asoc: rt5640: remove unused variable (bsc#1010690).
- asoc: rt5640: Set PLL src according to source (bsc#1010690).
- asoc: rt5645: add DAC1 soft volume func control (bsc#1010690).
- asoc: rt5645: Add dmi_system_id 'Google Setzer' (bsc#1010690).
- asoc: rt5645: extend delay time for headphone pop noise (bsc#1010690).
- asoc: rt5645: fix reg-2f default value (bsc#1010690).
- asoc: rt5645: improve headphone pop when system resumes from S3 (bsc#1010690).
- asoc: rt5645: improve IRQ reaction time for HS button (bsc#1010690).
- asoc: rt5645: merge DMI tables of google projects (bsc#1010690).
- asoc: rt5645: patch reg-0x8a (bsc#1010690).
- asoc: rt5645: polling jd status in all conditions (bsc#1010690).
- asoc: rt5645: Separate regmap for rt5645 and rt5650 (bsc#1010690).
- asoc: rt5645: set RT5645_PRIV_INDEX as volatile (bsc#1010690).
- asoc: rt5645: use polling to support HS button (bsc#1010690).
- asoc: rt5645: Use the mod_delayed_work instead of the queue_delayed_work and cancel_delayed_work_sync (bsc#1010690).
- asoc: rt5670: Add missing 10EC5072 ACPI ID (bsc#1010690).
- asoc: rt5670: Enable Braswell platform workaround for Dell Wyse 3040 (bsc#1010690).
- asoc: rt5670: fix HP Playback Volume control (bsc#1010690).
- asoc: rt5670: patch reg-0x8a (bsc#1010690).
- asoc: simple-card: do not fail if sysclk setting is not supported (bsc#1005917).
- asoc: tegra_alc5632: check return value (bsc#1005917).
- asoc: wm8960: Fix WM8960_SYSCLK_PLL mode (bsc#1005917).
- autofs: fix multiple races (bsc#997639).
- autofs: use dentry flags to block walks during expire (bsc#997639).
- blacklist.conf: Add dup / unapplicable commits (bsc#1005545).
- blacklist.conf: Add i915 stable commits that can be ignored (bsc#1015367)
- blacklist.conf: add inapplicable / duped commits (bsc#1005917)
- blacklist.conf: ignore commit bfe6c8a89e03 ('arm64: Fix NUMA build error when !CONFIG_ACPI')
- blacklist.conf: Remove intel_pstate potential patch that SLE 12 SP2 The code layout upstream that motivated this patch is completely different to what is in SLE 12 SP2 as schedutil was not backported.
- block_dev: do not test bdev-&gt;bd_contains when it is not stable (bsc#1008557).
- bna: Add synchronization for tx ring (bsc#993739).
- btrfs: allocate root item at snapshot ioctl time (bsc#1012452).
- btrfs: better packing of btrfs_delayed_extent_op (bsc#1012452).
- btrfs: Check metadata redundancy on balance (bsc#1012452).
- btrfs: clean up an error code in btrfs_init_space_info() (bsc#1012452).
- btrfs: cleanup, stop casting for extent_map-&gt;lookup everywhere (bsc#1012452).
- btrfs: cleanup, use enum values for btrfs_path reada (bsc#1012452).
- btrfs: deal with duplicates during extent_map insertion in btrfs_get_extent (bsc#1001171).
- btrfs: deal with existing encompassing extent map in btrfs_get_extent() (bsc#1001171).
- btrfs: do an allocation earlier during snapshot creation (bsc#1012452).
- btrfs: do not create or leak aliased root while cleaning up orphans (bsc#994881).
- btrfs: do not leave dangling dentry if symlink creation failed (bsc#1012452).
- btrfs: do not use slab cache for struct btrfs_delalloc_work (bsc#1012452).
- btrfs: drop duplicate prefix from scrub workqueues (bsc#1012452).
- btrfs: drop unused parameter from lock_extent_bits (bsc#1012452).
- btrfs: Enhance chunk validation check (bsc#1012452).
- btrfs: Enhance super validation check (bsc#1012452).
- btrfs: Ensure proper sector alignment for btrfs_free_reserved_data_space (bsc#1005666).
- btrfs: Expoert and move leaf/subtree qgroup helpers to qgroup.c (bsc983087, bsc986255).
- btrfs: fix endless loop in balancing block groups (bsc#1006804).
- btrfs: fix incremental send failure caused by balance (bsc#985850).
- btrfs: fix locking bugs when defragging leaves (bsc#1012452).
- btrfs: fix memory leaks after transaction is aborted (bsc#1012452).
- btrfs: fix output of compression message in btrfs_parse_options() (bsc#1012452).
- btrfs: fix race between free space endio workers and space cache writeout (bsc#1012452).
- btrfs: fix races on root_log_ctx lists (bsc#1007653).
- btrfs: fix race when finishing dev replace leading to transaction abort (bsc#1012452).
- btrfs: fix relocation incorrectly dropping data references (bsc#990384).
- btrfs: fix typo in log message when starting a balance (bsc#1012452).
- btrfs: fix unprotected list operations at btrfs_write_dirty_block_groups (bsc#1012452).
- btrfs: handle quota reserve failure properly (bsc#1005666).
- btrfs: make btrfs_close_one_device static (bsc#1012452).
- btrfs: make clear_extent_bit helpers static inline (bsc#1012452).
- btrfs: make clear_extent_buffer_uptodate return void (bsc#1012452).
- btrfs: make end_extent_writepage return void (bsc#1012452).
- btrfs: make extent_clear_unlock_delalloc return void (bsc#1012452).
- btrfs: make extent_range_clear_dirty_for_io return void (bsc#1012452).
- btrfs: make extent_range_redirty_for_io return void (bsc#1012452).
- btrfs: make lock_extent static inline (bsc#1012452).
- btrfs: make set_extent_bit helpers static inline (bsc#1012452).
- btrfs: make set_extent_buffer_uptodate return void (bsc#1012452).
- btrfs: make set_range_writeback return void (bsc#1012452).
- btrfs: preallocate path for snapshot creation at ioctl time (bsc#1012452).
- btrfs: put delayed item hook into inode (bsc#1012452).
- btrfs: qgroup: Add comments explaining how btrfs qgroup works (bsc983087, bsc986255).
- btrfs: qgroup: Fix qgroup data leaking by using subtree tracing (bsc983087, bsc986255).
- btrfs: qgroup: Rename functions to make it follow reserve, trace, account steps (bsc983087, bsc986255).
- btrfs: remove a trivial helper btrfs_set_buffer_uptodate (bsc#1012452).
- btrfs: remove root_log_ctx from ctx list before btrfs_sync_log returns (bsc#1007653).
- btrfs: remove unused inode argument from uncompress_inline() (bsc#1012452).
- btrfs: remove wait from struct btrfs_delalloc_work (bsc#1012452).
- btrfs: send, do not bug on inconsistent snapshots (bsc#985850).
- btrfs: sink parameter wait to btrfs_alloc_delalloc_work (bsc#1012452).
- btrfs: Support convert to -d dup for btrfs-convert (bsc#1012452).
- btrfs: use GFP_KERNEL for allocations in ioctl handlers (bsc#1012452).
- btrfs: use GFP_KERNEL for allocations of workqueues (bsc#1012452).
- btrfs: use GFP_KERNEL for xattr and acl allocations (bsc#1012452).
- btrfs: use smaller type for btrfs_path locks (bsc#1012452).
- btrfs: use smaller type for btrfs_path lowest_level (bsc#1012452).
- btrfs: use smaller type for btrfs_path reada (bsc#1012452).
- btrfs: verbose error when we find an unexpected item in sys_array (bsc#1012452).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- cxgbi: fix uninitialized flowi6 (bsc#963904 FATE#320115).
- Delete patches.fixes/apparmor-initialize-common_audit_data.patch (bsc#1000304) It'll be fixed in the upcoming apparmor fix series from upstream.
- dell-laptop: Fixate rfkill work on CPU#0 (bsc#1004052).
- dell-wmi: Check if Dell WMI descriptor structure is valid (bsc#1004052).
- dell-wmi: Clean up hotkey table size check (bsc#1004052).
- dell-wmi: Ignore WMI event code 0xe045 (bsc#1004052).
- dell-wmi: Improve unknown hotkey handling (bsc#1004052).
- dell-wmi: Process only one event on devices with interface version 0 (bsc#1004052).
- dell-wmi: Stop storing pointers to DMI tables (bsc#1004052).
- dell-wmi: Support new hotkeys on the XPS 13 9350 (Skylake) (bsc#1004052).
- dell_wmi: Use a C99-style array for bios_to_linux_keycode (bsc#1004052).
- Drivers: hv: utils: fix a race on userspace daemons registration (bnc#1014392).
- drm/amdgpu: Do not leak runtime pm ref on driver load (bsc#1005545).
- drm/amdgpu: Do not leak runtime pm ref on driver unload (bsc#1005545).
- drm/i915: Acquire audio powerwell for HD-Audio registers (bsc#1005545).
- drm/i915: add helpers for platform specific revision id range checks (bsc#1015367).
- drm/i915: Add missing ring_mask to Pineview (bsc#1005917).
- drm/i915: Apply broader WaRsDisableCoarsePowerGating for guc also (bsc#1015367).
- drm/i915/bxt: add revision id for A1 stepping and use it (bsc#1015367).
- drm/i915: Calculate watermark related members in the crtc_state, v4 (bsc#1011176).
- drm/i915: Call intel_dp_mst_resume() before resuming displays (bsc#1015359).
- drm/i915: call kunmap_px on pt_vaddr (bsc#1005545).
- drm/i915: Cleaning up DDI translation tables (bsc#1014392).
- drm/i915: Clean up L3 SQC register field definitions (bsc#1014392).
- drm/i915/dsi: fix CHV dsi encoder hardware state readout on port C (bsc#1015367).
- drm/i915: Enable polling when we do not have hpd (bsc#1014120).
- drm/i915: Exit cherryview_irq_handler() after one pass (bsc#1015367).
- drm/i915: Fix iboost setting for SKL Y/U DP DDI buffer translation entry 2 (bsc#1014392).
- drm/i915: Fix system resume if PCI device remained enabled (bsc#1015367).
- drm/i915: fix the SDE irq dmesg warnings properly (bsc#1005545).
- drm/i915: Fix VBT backlight Hz to PWM conversion for PNV (bsc#1005545).
- drm/i915: Fix vbt PWM max setup for CTG (bsc#1005545).
- drm/i915: Force ringbuffers to not be at offset 0 (bsc#1015367).
- drm/i915/gen9: Add WaInPlaceDecompressionHang (bsc#1014392).
- drm/i915/ivb: Move WaCxSRDisabledForSpriteScaling w/a to atomic check (bsc#1011176).
- drm/i915: Kill intel_runtime_pm_disable() (bsc#1005545).
- drm/i915: Make plane fb tracking work correctly, v2 (bsc#1004048).
- drm/i915: Make prepare_plane_fb fully interruptible (bsc#1004048).
- drm/i915: Move disable_cxsr to the crtc_state (bsc#1011176).
- drm/i915: On fb alloc failure, unref gem object where it gets refed (bsc#1005545).
- drm/i915: Only call commit_planes when there are things to commit (bsc#1004048).
- drm/i915: Only commit active planes when updating planes during reset (bsc#1004048).
- drm/i915: Only run commit when crtc is active, v2 (bsc#1004048).
- drm/i915: remove parens around revision ids (bsc#1015367).
- drm/i915: Set crtc_state-&gt;lane_count for HDMI (bsc#1005545).
- drm/i915/skl: Add WaDisableGafsUnitClkGating (bsc#1014392).
- drm/i915/skl: Fix rc6 based gpu/system hang (bsc#1015367).
- drm/i915/skl: Fix spurious gpu hang with gt3/gt4 revs (bsc#1015367).
- drm/i915/skl: Update DDI translation tables for SKL (bsc#1014392).
- drm/i915/skl: Update watermarks before the crtc is disabled (bsc#1015367).
- drm/i915: suppress spurious !wm_changed warning (bsc#1006267).
- drm/i915: Unconditionally flush any chipset buffers before execbuf (bsc#1005545).
- drm/i915: Update legacy primary state outside the commit hook, v2 (bsc#1004048).
- drm/i915: Update Skylake DDI translation table for DP (bsc#1014392).
- drm/i915: Update Skylake DDI translation table for HDMI (bsc#1014392).
- drm/i915/userptr: Hold mmref whilst calling get-user-pages (bsc#1015367).
- drm/i915/vlv: Disable HPD in valleyview_crt_detect_hotplug() (bsc#1014120).
- drm/i915/vlv: Make intel_crt_reset() per-encoder (bsc#1014120).
- drm/i915/vlv: Reset the ADPA in vlv_display_power_well_init() (bsc#1014120).
- drm/i915: Wait for power cycle delay after turning off DSI panel power (bsc#1005545).
- drm/i915: Wait up to 3ms for the pcu to ack the cdclk change request on SKL (bsc#1005545).
- drm/layerscape: reduce excessive stack usage (bsc#1005545).
- drm/mgag200: fix error return code in mgag200fb_create() (bsc#1005917).
- drm/nouveau: Do not leak runtime pm ref on driver unload (bsc#1005545).
- drm/radeon: Also call cursor_move_locked when the cursor size changes (bsc#1000433).
- drm/radeon: Always store CRTC relative radeon_crtc-&gt;cursor_x/y values (bsc#1000433).
- drm/radeon/ci add comment to document intentionally unreachable code (bsc#1005545).
- drm/radeon: Do not leak runtime pm ref on driver load (bsc#1005545).
- drm/radeon: Do not leak runtime pm ref on driver unload (bsc#1005545).
- drm/radeon: Ensure vblank interrupt is enabled on DPMS transition to on (bsc#998054)
- drm/radeon: Hide the HW cursor while it's out of bounds (bsc#1000433).
- drm/radeon: Switch to drm_vblank_on/off (bsc#998054).
- drm/rockchip: fix a couple off by one bugs (bsc#1005545).
- drm/tegra: checking for IS_ERR() instead of NULL (bsc#1005545).
- edac/mce_amd: Add missing SMCA error descriptions (fate#320474, bsc#1013700).
- edac/mce_amd: Use SMCA prefix for error descriptions arrays (fate#320474, bsc#1013700).
- efi/arm64: Do not apply MEMBLOCK_NOMAP to UEFI memory map mapping (bsc#986987).
- efi: ARM: avoid warning about phys_addr_t cast.
- efi/runtime-wrappers: Add {__,}efi_call_virt() templates (bsc#1005745).
- efi/runtime-wrappers: Detect firmware IRQ flag corruption (bsc#1005745).
- efi/runtime-wrappers: Remove redundant #ifdefs (bsc#1005745).
- ext4: fix data exposure after a crash (bsc#1012829).
- Fix kabi change cause by adding flock_owner to open_context (bsc#998689).
- Fixup UNMAP calculation (bsc#1005327)
- fs, block: force direct-I/O for dax-enabled block devices (bsc#1012992).
- fs/cifs: cifs_get_root shouldn't use path with tree name (bsc#963655, bsc#979681).
- fs/cifs: Compare prepaths when comparing superblocks (bsc#799133).
- fs/cifs: Fix memory leaks in cifs_do_mount() (bsc#799133).
- fs/cifs: Move check for prefix path to within cifs_get_root() (bsc#799133).
- fs/select: add vmalloc fallback for select(2) (bsc#1000189).
- genirq: Add untracked irq handler (bsc#1006827).
- genirq: Use a common macro to go through the actions list (bsc#1006827).
- gpio: generic: make bgpio_pdata always visible.
- gpio: Restore indentation of parent device setup.
- gre: Disable segmentation offloads w/ CSUM and we are encapsulated via FOU (bsc#1001486).
- gro: Allow tunnel stacking in the case of FOU/GUE (bsc#1001486).
- gro_cells: mark napi struct as not busy poll candidates (bsc#966191 FATE#320230 bsc#966186 FATE#320228).
- group-source-files.pl: mark arch/*/scripts as devel make[2]: /usr/src/linux-4.6.4-2/arch/powerpc/scripts/gcc-check-mprofile-kernel.sh: Command not found
- hpsa: fallback to use legacy REPORT PHYS command (bsc#1006175).
- hpsa: use bus '3' for legacy HBA devices (bsc#1010665).
- hpsa: use correct DID_NO_CONNECT hostbyte (bsc#1010665).
- hv: do not lose pending heartbeat vmbus packets (bnc#1006918).
- i2c: designware-baytrail: Add support for cherrytrail (bsc#1011913).
- i2c: designware-baytrail: Pass dw_i2c_dev into helper functions (bsc#1011913).
- i2c: designware-baytrail: Work around Cherry Trail semaphore errors (bsc#1011913).
- i2c: designware: Prevent runtime suspend during adapter registration (bsc#1011913).
- i2c: designware: retry transfer on transient failure (bsc#1011913).
- i2c: designware: Use transfer timeout from ioctl I2C_TIMEOUT (bsc#1011913).
- i2c: Enable CONFIG_I2C_DESIGNWARE_PLATFORM and *_BAYTRAIL (bsc#1010690) Realtek codecs on CHT platform require this i2c bus driver.
- i2c: xgene: Avoid dma_buffer overrun (bsc#1006576).
- i40e: fix an uninitialized variable bug (bsc#969476 FATE#319648).
- i40e: fix broken i40e_config_rss_aq function (bsc#969476 FATE#319648 bsc#969477 FATE#319816).
- i40e: Remove redundant memset (bsc#969476 FATE#319648 bsc#969477 FATE#319816).
- i40iw: Add missing check for interface already open (bsc#974842 FATE#319831 bsc#974843 FATE#319832).
- i40iw: Add missing NULL check for MPA private data (bsc#974842 FATE#319831 bsc#974843 FATE#319832).
- i40iw: Avoid writing to freed memory (bsc#974842 FATE#319831 bsc#974843 FATE#319832).
- i40iw: Change mem_resources pointer to a u8 (bsc#974842 FATE#319831 bsc#974843 FATE#319832).
- i40iw: Do not set self-referencing pointer to NULL after kfree (bsc#974842 FATE#319831 bsc#974843 FATE#319832).
- i40iw: Fix double free of allocated_buffer (bsc#974842 FATE#319831 bsc#974843 FATE#319832).
- i40iw: Protect req_resource_num update (bsc#974842 FATE#319831 bsc#974843 FATE#319832).
- i40iw: Receive notification events correctly (bsc#974842 FATE#319831 bsc#974843 FATE#319832).
- i40iw: Send last streaming mode message for loopback connections (bsc#974842 FATE#319831 bsc#974843 FATE#319832).
- i40iw: Update hw_iwarp_state (bsc#974842 FATE#319831 bsc#974843 FATE#319832).
- ib/core: Fix possible memory leak in cma_resolve_iboe_route() (bsc#966191 FATE#320230 bsc#966186 FATE#320228).
- ib/mlx5: Fix iteration overrun in GSI qps (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- ib/mlx5: Fix steering resource leak (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- ib/mlx5: Set source mac address in FTE (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- ibmvnic: convert to use simple_open() (bsc#1015416).
- ibmvnic: Driver Version 1.0.1 (bsc#1015416).
- ibmvnic: drop duplicate header seq_file.h (bsc#1015416).
- ibmvnic: fix error return code in ibmvnic_probe() (bsc#1015416).
- ibmvnic: Fix GFP_KERNEL allocation in interrupt context (bsc#1015416).
- ibmvnic: Fix missing brackets in init_sub_crq_irqs (bsc#1015416).
- ibmvnic: Fix releasing of sub-CRQ IRQs in interrupt context (bsc#1015416).
- ibmvnic: Fix size of debugfs name buffer (bsc#1015416).
- ibmvnic: Handle backing device failover and reinitialization (bsc#1015416).
- ibmvnic: Start completion queue negotiation at server-provided optimum values (bsc#1015416).
- ibmvnic: Unmap ibmvnic_statistics structure (bsc#1015416).
- ibmvnic: Update MTU after device initialization (bsc#1015416).
- input: ALPS - add touchstick support for SS5 hardware (bsc#987703).
- input: ALPS - allow touchsticks to report pressure (bsc#987703).
- input: ALPS - handle 0-pressure 1F events (bsc#987703).
- input: ALPS - set DualPoint flag for 74 03 28 devices (bsc#987703).
- iommu/arm-smmu: Add support for 16 bit VMID (fate#319978).
- iommu/arm-smmu: Workaround for ThunderX erratum #27704 (fate#319978).
- ipc/sem.c: add cond_resched in exit_sme (bsc#979378).
- ipmi_si: create hardware-independent softdep for ipmi_devintf (bsc#1009062).
- ixgbe: Do not clear RAR entry when clearing VMDq for SAN MAC (bsc#969474 FATE#319812 bsc#969475 FATE#319814).
- ixgbe: Force VLNCTRL.VFE to be set in all VMDq paths (bsc#969474 FATE#319812 bsc#969475 FATE#319814).
- kABI: protect struct dw_mci.
- kABI: protect struct mmc_packed (kabi).
- kABI: reintroduce iov_iter_fault_in_multipages_readable.
- kABI: reintroduce sk_filter (kabi).
- kABI: reintroduce strtobool (kabi).
- kABI: restore ip_cmsg_recv_offset parameters (kabi).
- kabi/severities: Ignore kABI for asoc Intel SST drivers (bsc#1010690) These drivers are self-contained, not for 3rd party drivers.
- kabi/severities: Whitelist libceph and rbd (bsc#988715). Like SLE12-SP1.
- kernel-module-subpackage: Properly quote flavor in expressions That fixes a parse error if the flavor starts with a digit or contains other non-alphabetic characters.
- kgr: ignore zombie tasks during the patching (bnc#1008979).
- kvm: arm/arm64: Fix occasional warning from the timer work function (bsc#988524).
- kvm: x86: correctly reset dest_map-&gt;vector when restoring LAPIC state (bsc#966471).
- libceph: enable large, variable-sized OSD requests (bsc#988715).
- libceph: make r_request msg_size calculation clearer (bsc#988715).
- libceph: move r_reply_op_{len,result} into struct ceph_osd_req_op (bsc#988715).
- libceph: osdc-&gt;req_mempool should be backed by a slab pool (bsc#988715).
- libceph: rename ceph_osd_req_op::payload_len to indata_len (bsc#988715).
- lib/mpi: avoid assembler warning (bsc#1003581).
- lib/mpi: mpi_read_buffer(): fix buffer overflow (bsc#1003581).
- lib/mpi: mpi_read_buffer(): optimize skipping of leading zero limbs (bsc#1003581).
- lib/mpi: mpi_read_buffer(): replace open coded endian conversion (bsc#1003581).
- lib/mpi: mpi_write_sgl(): fix out-of-bounds stack access (bsc#1003581).
- lib/mpi: mpi_write_sgl(): fix style issue with lzero decrement (bsc#1003581).
- lib/mpi: mpi_write_sgl(): purge redundant pointer arithmetic (bsc#1003581).
- lib/mpi: mpi_write_sgl(): replace open coded endian conversion (bsc#1003581).
- lib/mpi: use 'static inline' instead of 'extern inline' (bsc#1003581).
- locking/pv-qspinlock: Use cmpxchg_release() in __pv_queued_spin_unlock() (bsc#969756).
- locking/rtmutex: Prevent dequeue vs. unlock race (bsc#1015212).
- locking/rtmutex: Use READ_ONCE() in rt_mutex_owner() (bsc#1015212).
- mailbox/xgene-slimpro: Checking for IS_ERR instead of NULL.
- md/raid1: fix: IO can block resync indefinitely (bsc#1001310).
- mlx4: Do not BUG_ON() if device reset failed (bsc#1001888).
- mm: do not use radix tree writeback tags for pages in swap cache (bnc#971975 VM performance -- swap).
- mm: filemap: do not plant shadow entries without radix tree node (bnc#1005929).
- mm: filemap: fix mapping-&gt;nrpages double accounting in fuse (bnc#1005929).
- mm/filemap: generic_file_read_iter(): check for zero reads unconditionally (bnc#1007955).
- mm/mprotect.c: do not touch single threaded PTEs which are on the right node (bnc#971975 VM performance -- numa balancing).
- mm: workingset: fix crash in shadow node shrinker caused by replace_page_cache_page() (bnc#1005929).
- mm/zswap: use workqueue to destroy pool (VM Functionality, bsc#1005923).
- net: icmp6_send should use dst dev to determine L3 domain (bsc#1014701).
- net: ipv6: tcp reset, icmp need to consider L3 domain (bsc#1014701).
- net/mlx4_en: Fix panic on xmit while port is down (bsc#966191 FATE#320230).
- net/mlx5: Add ConnectX-5 PCIe 4.0 to list of supported devices (bsc#1006809).
- net/mlx5: Add error prints when validate ETS failed (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5: Avoid setting unused var when modifying vport node GUID (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5e: Use correct flow dissector key on flower offloading (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5: Fix autogroups groups num not decreasing (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5: Fix teardown errors that happen in pci error handler (bsc#1001169).
- net/mlx5: Keep autogroups list ordered (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net_sched: fix a typo in tc_for_each_action() (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net: sctp, forbid negative length (bnc#1005921).
- netvsc: fix incorrect receive checksum offloading (bnc#1006915).
- nfs: nfs4_fl_prepare_ds must be careful about reporting success (bsc#1000776).
- nfsv4: add flock_owner to open context (bnc#998689).
- nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).
- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).
- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).
- oom: print nodemask in the oom report (bnc#1003866).
- overlayfs: allow writing on read-only btrfs subvolumes (bsc#1010158)
- pci/acpi: Allow all PCIe services on non-ACPI host bridges (bsc#1006827).
- pci: Allow additional bus numbers for hotplug bridges (bsc#1006827).
- pci: correctly cast mem_base in pci_read_bridge_mmio_pref() (bsc#1001888).
- pci: Do not set RCB bit in LNKCTL if the upstream bridge hasn't (bsc#1001888).
- pci: Fix BUG on device attach failure (bnc#987641).
- pci: pciehp: Allow exclusive userspace control of indicators (bsc#1006827).
- pci: Remove return values from pcie_port_platform_notify() and relatives (bsc#1006827).
- perf/x86: Add perf support for AMD family-17h processors (fate#320473).
- pm / hibernate: Fix 2G size issue of snapshot image verification (bsc#1004252).
- pm / sleep: declare __tracedata symbols as char rather than char (bnc#1005895).
- powercap/intel_rapl: Add support for Kabylake (bsc#1003566).
- powercap / RAPL: add support for Denverton (bsc#1003566).
- powercap / RAPL: Add support for Ivy Bridge server (bsc#1003566).
- powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec (bsc#1003813).
- powerpc/xmon: Add xmon command to dump process/task similar to ps(1) (fate#322020).
- proc: much faster /proc/vmstat (bnc#971975 VM performance -- vmstat).
- qede: Correctly map aggregation replacement pages (bsc#966318 FATE#320158 bsc#966316 FATE#320159).
- qed: FLR of active VFs might lead to FW assert (bsc#966318 FATE#320158 bsc#966316 FATE#320159).
- qgroup: Prevent qgroup-&gt;reserved from going subzero (bsc#993841).
- qla2xxx: Fix NULL pointer deref in QLA interrupt (bsc#1003068).
- qla2xxx: setup data needed in ISR before setting up the ISR (bsc#1006528).
- rbd: truncate objects on cmpext short reads (bsc#988715).
- Revert 'ACPI / LPSS: allow to use specific PM domain during -&gt;probe()' (bsc#1005917).
- Revert 'can: dev: fix deadlock reported after bus-off'.
- Revert 'fix minor infoleak in get_user_ex()' (p.k.o).
- REVERT fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- Revert 'x86/mm: Expand the exception table logic to allow new handling options' (p.k.o).
- rpm/config.sh: Build against SP2 in the OBS as well
- rpm/constraints.in: increase disk for kernel-syzkaller The kernel-syzkaller build now consumes around 30G. This causes headache in factory where the package rebuilds over and over. Require 35G disk size to successfully build the flavor.
- rpm/kernel-binary.spec.in: Build the -base package unconditionally (bsc#1000118)
- rpm/kernel-binary.spec.in: Do not create KMPs with CONFIG_MODULES=n
- rpm/kernel-binary.spec.in: Only build -base and -extra with CONFIG_MODULES (bsc#1000118)
- rpm/kernel-binary.spec.in: Simplify debug info switch Any CONFIG_DEBUG_INFO sub-options are answered in the configs nowadays.
- rpm/kernel-spec-macros: Ignore too high rebuild counter (bsc#1012060)
- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)
- rpm/package-descriptions: Add 64kb kernel flavor description
- rpm/package-descriptions: add kernel-syzkaller
- rpm/package-descriptions: pv has been merged into -default (fate#315712)
- rpm/package-descriptions: the flavor is 64kb, not 64k
- s390/mm: fix gmap tlb flush issues (bnc#1005925).
- sched/core: Optimize __schedule() (bnc#978907 Scheduler performance -- context switch).
- sched/fair: Fix incorrect task group -&gt;load_avg (bsc#981825).
- sched/fair: Optimize find_idlest_cpu() when there is no choice (bnc#978907 Scheduler performance -- idle search).
- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)
- serial: 8250_pci: Detach low-level driver during PCI error recovery (bsc#1013001).
- serial: 8250_port: fix runtime PM use in __do_stop_tx_rs485() (bsc#983152).
- sunrpc: fix refcounting problems with auth_gss messages (boo#1011250).
- supported.conf: add hid-logitech-hidpp (bsc#1002322 bsc#1002786)
- supported.conf: Add overlay.ko to -base (fate#321903) Also, delete the stale entry for the old overlayfs.
- supported.conf: Mark vmx-crypto as supported (fate#319564)
- supported.conf: xen-netfront should be in base packages, just        like its non-pvops predecessor. (bsc#1002770)
- target: fix tcm_rbd_gen_it_nexus for emulated XCOPY state (bsc#1003606).
- tg3: Avoid NULL pointer dereference in tg3_io_error_detected() (bsc#963609 FATE#320143).
- time: Avoid undefined behaviour in ktime_add_safe() (bnc#1006103).
- Update config files: select new CONFIG_SND_SOC_INTEL_SST_* helpers
- Update patches.suse/btrfs-8401-fix-qgroup-accounting-when-creating-snap.patch (bsc#972993).
- usb: gadget: composite: Clear reserved fields of SSP Dev Cap (FATE#319959).
- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).
- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634).
- Using BUG_ON() as an assert() is _never_ acceptable (bnc#1005929).
- vmxnet3: Wake queue from reset work (bsc#999907).
- Whitelist KVM KABI changes resulting from adding a hcall.  caused by 5246adec59458b5d325b8e1462ea9ef3ead7f6ae  powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec No problem is expected as result of changing KVM KABI so whitelisting for now. If we get some additional input from IBM we can back out the patch.
- writeback: initialize inode members that track writeback history (bsc#1012829).
- x86/apic: Order irq_enter/exit() calls correctly vs. ack_APIC_irq() (bsc#1013479).
- x86/efi: Enable runtime call flag checking (bsc#1005745).
- x86/efi: Move to generic {__,}efi_call_virt() (bsc#1005745).
- x86/hpet: Reduce HPET counter read contention (bsc#1014710).
- x86/mce/AMD, EDAC/mce_amd: Define and use tables for known SMCA IP types (fate#320474, bsc#1013700). Exclude removed symbols from kABI check. They're AMD Zen relevant only and completely useless to other modules - only edac_mce_amd.ko.
- x86/mce/AMD: Increase size of the bank_map type (fate#320474, bsc#1013700).
- x86/mce/AMD: Read MSRs on the CPU allocating the threshold blocks (fate#320474, bsc#1013700).
- x86/mce/AMD: Update sysfs bank names for SMCA systems (fate#320474, bsc#1013700).
- x86/mce/AMD: Use msr_ops.misc() in allocate_threshold_blocks() (fate#320474, bsc#1013700).
- x86/pci: VMD: Attach VMD resources to parent domain's resource tree (bsc#1006827).
- x86/pci: VMD: Document code for maintainability (bsc#1006827).
- x86/pci: VMD: Fix infinite loop executing irq's (bsc#1006827).
- x86/pci: VMD: Initialize list item in IRQ disable (bsc#1006827).
- x86/pci: VMD: Request userspace control of PCIe hotplug indicators (bsc#1006827).
- x86/pci: VMD: Select device dma ops to override (bsc#1006827).
- x86/pci: VMD: Separate MSI and MSI-X vector sharing (bsc#1006827).
- x86/pci: VMD: Set bus resource start to 0 (bsc#1006827).
- x86/pci: VMD: Synchronize with RCU freeing MSI IRQ descs (bsc#1006827).
- x86/pci: VMD: Use lock save/restore in interrupt enable path (bsc#1006827).
- x86/pci/VMD: Use untracked irq handler (bsc#1006827).
- x86/pci: VMD: Use x86_vector_domain as parent domain (bsc#1006827).
- x86, powercap, rapl: Add Skylake Server model number (bsc#1003566).
- x86, powercap, rapl: Reorder CPU detection table (bsc#1003566).
- x86, powercap, rapl: Use Intel model macros intead of open-coding (bsc#1003566).
- xen/gntdev: Use VM_MIXEDMAP instead of VM_IO to avoid NUMA balancing (bnc#1005169).
- zram: Fix unbalanced idr management at hot removal (bsc#1010970).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-17"/>
	<updated date="2017-01-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000118">SUSE bug 1000118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000189">SUSE bug 1000189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000287">SUSE bug 1000287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000304">SUSE bug 1000304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000433">SUSE bug 1000433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000776">SUSE bug 1000776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001169">SUSE bug 1001169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001171">SUSE bug 1001171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001310">SUSE bug 1001310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001462">SUSE bug 1001462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001486">SUSE bug 1001486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001888">SUSE bug 1001888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002322">SUSE bug 1002322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002770">SUSE bug 1002770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002786">SUSE bug 1002786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003068">SUSE bug 1003068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003566">SUSE bug 1003566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003581">SUSE bug 1003581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003606">SUSE bug 1003606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003813">SUSE bug 1003813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003866">SUSE bug 1003866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003964">SUSE bug 1003964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004048">SUSE bug 1004048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004052">SUSE bug 1004052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004252">SUSE bug 1004252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004365">SUSE bug 1004365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004517">SUSE bug 1004517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005169">SUSE bug 1005169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005327">SUSE bug 1005327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005545">SUSE bug 1005545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005666">SUSE bug 1005666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005745">SUSE bug 1005745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005895">SUSE bug 1005895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005917">SUSE bug 1005917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005921">SUSE bug 1005921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005923">SUSE bug 1005923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005925">SUSE bug 1005925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005929">SUSE bug 1005929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006103">SUSE bug 1006103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006175">SUSE bug 1006175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006267">SUSE bug 1006267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006528">SUSE bug 1006528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006576">SUSE bug 1006576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006804">SUSE bug 1006804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006809">SUSE bug 1006809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006827">SUSE bug 1006827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006915">SUSE bug 1006915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006918">SUSE bug 1006918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007197">SUSE bug 1007197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007615">SUSE bug 1007615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007653">SUSE bug 1007653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007955">SUSE bug 1007955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008557">SUSE bug 1008557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008979">SUSE bug 1008979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009062">SUSE bug 1009062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009969">SUSE bug 1009969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010040">SUSE bug 1010040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010158">SUSE bug 1010158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010444">SUSE bug 1010444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010478">SUSE bug 1010478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010507">SUSE bug 1010507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010665">SUSE bug 1010665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010690">SUSE bug 1010690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010970">SUSE bug 1010970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011176">SUSE bug 1011176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011250">SUSE bug 1011250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011913">SUSE bug 1011913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012060">SUSE bug 1012060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012094">SUSE bug 1012094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012452">SUSE bug 1012452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012767">SUSE bug 1012767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012829">SUSE bug 1012829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012992">SUSE bug 1012992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013001">SUSE bug 1013001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013479">SUSE bug 1013479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013531">SUSE bug 1013531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013700">SUSE bug 1013700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014120">SUSE bug 1014120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014392">SUSE bug 1014392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014701">SUSE bug 1014701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014710">SUSE bug 1014710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015212">SUSE bug 1015212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015359">SUSE bug 1015359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015367">SUSE bug 1015367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015416">SUSE bug 1015416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799133">SUSE bug 799133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914939">SUSE bug 914939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922634">SUSE bug 922634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963609">SUSE bug 963609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963655">SUSE bug 963655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963904">SUSE bug 963904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964462">SUSE bug 964462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966170">SUSE bug 966170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966172">SUSE bug 966172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966186">SUSE bug 966186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966191">SUSE bug 966191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966316">SUSE bug 966316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966318">SUSE bug 966318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966325">SUSE bug 966325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966471">SUSE bug 966471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969474">SUSE bug 969474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969475">SUSE bug 969475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969476">SUSE bug 969476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969477">SUSE bug 969477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969756">SUSE bug 969756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971975">SUSE bug 971975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971989">SUSE bug 971989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972993">SUSE bug 972993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974313">SUSE bug 974313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974842">SUSE bug 974842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974843">SUSE bug 974843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978907">SUSE bug 978907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979378">SUSE bug 979378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979681">SUSE bug 979681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981825">SUSE bug 981825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983087">SUSE bug 983087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983152">SUSE bug 983152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983318">SUSE bug 983318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985850">SUSE bug 985850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986255">SUSE bug 986255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986987">SUSE bug 986987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987641">SUSE bug 987641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987703">SUSE bug 987703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987805">SUSE bug 987805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988524">SUSE bug 988524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988715">SUSE bug 988715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990384">SUSE bug 990384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992555">SUSE bug 992555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993739">SUSE bug 993739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993841">SUSE bug 993841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993891">SUSE bug 993891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994881">SUSE bug 994881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995278">SUSE bug 995278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997059">SUSE bug 997059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997639">SUSE bug 997639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997807">SUSE bug 997807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998054">SUSE bug 998054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998689">SUSE bug 998689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999907">SUSE bug 999907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999932">SUSE bug 999932</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1350/">CVE-2015-1350</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-8964/">CVE-2015-8964</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7039/">CVE-2016-7039</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7042/">CVE-2016-7042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7425/">CVE-2016-7425</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7913/">CVE-2016-7913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7917/">CVE-2016-7917</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8645/">CVE-2016-8645</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-8666/">CVE-2016-8666</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9083/">CVE-2016-9083</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9084/">CVE-2016-9084</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9793/">CVE-2016-9793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9919/">CVE-2016-9919</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518683" comment="kernel-default-4.4.38-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518684" comment="kernel-default-devel-4.4.38-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518685" comment="kernel-default-extra-4.4.38-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518686" comment="kernel-devel-4.4.38-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518687" comment="kernel-macros-4.4.38-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518688" comment="kernel-source-4.4.38-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518689" comment="kernel-syms-4.4.38-93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78072" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1034849" ref_url="https://bugzilla.suse.com/1034849" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509/" source="CVE"/>
		<reference ref_id="CVE-2017-3511" ref_url="https://www.suse.com/security/cve/CVE-2017-3511/" source="CVE"/>
		<reference ref_id="CVE-2017-3512" ref_url="https://www.suse.com/security/cve/CVE-2017-3512/" source="CVE"/>
		<reference ref_id="CVE-2017-3514" ref_url="https://www.suse.com/security/cve/CVE-2017-3514/" source="CVE"/>
		<reference ref_id="CVE-2017-3526" ref_url="https://www.suse.com/security/cve/CVE-2017-3526/" source="CVE"/>
		<reference ref_id="CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533/" source="CVE"/>
		<reference ref_id="CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539/" source="CVE"/>
		<reference ref_id="CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00075.html" source="SUSE-SU"/>
		<description>

This update for java-1_8_0-openjdk fixes the following issues:

- Upgrade to version jdk8u131 (icedtea 3.4.0) - bsc#1034849
  * Security fixes
    - S8163520, CVE-2017-3509: Reuse cache entries
    - S8163528, CVE-2017-3511: Better library loading
    - S8165626, CVE-2017-3512: Improved window framing
    - S8167110, CVE-2017-3514: Windows peering issue
    - S8168699: Validate special case invocations
    - S8169011, CVE-2017-3526: Resizing XML parse trees
    - S8170222, CVE-2017-3533: Better transfers of files
    - S8171121, CVE-2017-3539: Enhancing jar checking
    - S8171533, CVE-2017-3544: Better email transfer
    - S8172299: Improve class processing
  * New features
    - PR1969: Add AArch32 JIT port
    - PR3297: Allow Shenandoah to be used on AArch64
    - PR3340: jstack.stp should support AArch64
  * Import of OpenJDK 8 u131 build 11
    - S6474807: (smartcardio) CardTerminal.connect() throws
      CardException instead of CardNotPresentException
    - S6515172, PR3346: Runtime.availableProcessors() ignores Linux
      taskset command
    - S7155957:
      closed/java/awt/MenuBar/MenuBarStress1/MenuBarStress1.java
      hangs on win 64 bit with jdk8
    - S7167293: FtpURLConnection connection leak on
      FileNotFoundException
    - S8035568: [macosx] Cursor management unification
    - S8079595: Resizing dialog which is JWindow parent makes JVM
      crash
    - S8130769: The new menu can't be shown on the menubar after
      clicking the 'Add' button.
    - S8146602:
      jdk/test/sun/misc/URLClassPath/ClassnameCharTest.java test
      fails with NullPointerException
    - S8147842: IME Composition Window is displayed at incorrect
      location
    - S8147910, PR3346: Cache initial active_processor_count
    - S8150490: Update OS detection code to recognize Windows
      Server 2016
    - S8160951: [TEST_BUG]
      javax/xml/bind/marshal/8134111/UnmarshalTest.java should be
      added into :needs_jre group
    - S8160958: [TEST_BUG]
      java/net/SetFactoryPermission/SetFactoryPermission.java
      should be added into :needs_compact2 group
    - S8161147: jvm crashes when -XX:+UseCountedLoopSafepoints is
      enabled
    - S8161195: Regression:
      closed/javax/swing/text/FlowView/LayoutTest.java
    - S8161993, PR3346: G1 crashes if active_processor_count
      changes during startup
    - S8162876: [TEST_BUG]
      sun/net/www/protocol/http/HttpInputStream.java fails
      intermittently
    - S8162916: Test sun/security/krb5/auto/UnboundSSL.java fails
    - S8164533: sun/security/ssl/SSLSocketImpl/CloseSocket.java
      failed with 'Error while cleaning up threads after test'
    - S8167179: Make XSL generated namespace prefixes local to
      transformation process
    - S8168774: Polymorhic signature method check crashes javac
    - S8169465: Deadlock in com.sun.jndi.ldap.pool.Connections
    - S8169589: [macosx] Activating a JDialog puts to back another
      dialog
    - S8170307: Stack size option -Xss is ignored
    - S8170316: (tz) Support tzdata2016j
    - S8170814: Reuse cache entries (part II)
    - S8170888, PR3314, RH1284948: [linux] Experimental support for
      cgroup memory limits in container (ie Docker) environments
    - S8171388: Update JNDI Thread contexts
    - S8171949: [macosx] AWT_ZoomFrame Automated tests fail with
      error: The bitwise mask Frame.ICONIFIED is not setwhen the
      frame is in ICONIFIED state
    - S8171952: [macosx]
      AWT_Modality/Automated/ModalExclusion/NoExclusion/ModelessDialog
      test fails as DummyButton on Dialog did not gain focus when
	  clicked.
    - S8173030: Temporary backout fix #8035568 from 8u131-b03
    - S8173031: Temporary backout fix #8171952 from 8u131-b03
    - S8173783, PR3328: IllegalArgumentException:
      jdk.tls.namedGroups
    - S8173931: 8u131 L10n resource file update
    - S8174844: Incorrect GPL header causes RE script to miss swap
      to commercial header for licensee source bundle
    - S8174985: NTLM authentication doesn't work with IIS if NTLM
      cache is disabled
    - S8176044: (tz) Support tzdata2017a
  * Backports
    - S6457406, PR3335: javadoc doesn't handle &lt;a
      href='http://...'&gt; properly in producing index pages
    - S8030245, PR3335: Update langtools to use try-with-resources
      and multi-catch
    - S8030253, PR3335: Update langtools to use strings-in-switch
    - S8030262, PR3335: Update langtools to use foreach loops
    - S8031113, PR3337: TEST_BUG:
      java/nio/channels/AsynchronousChannelGroup/Basic.java fails
      intermittently
    - S8031625, PR3335: javadoc problems referencing inner class
      constructors
    - S8031649, PR3335: Clean up javadoc tests
    - S8031670, PR3335: Remove unneeded -source options in javadoc
      tests
    - S8032066, PR3335: Serialized form has broken links to non
      private inner classes of package private
    - S8034174, PR2290: Remove use of JVM_* functions from java.net
      code
    - S8034182, PR2290: Misc. warnings in java.net code
    - S8035876, PR2290: AIX build issues after '8034174: Remove use
      of JVM_* functions from java.net code'
    - S8038730, PR3335: Clean up the way JavadocTester is invoked,
      and checks for errors.
    - S8040903, PR3335: Clean up use of BUG_ID in javadoc tests
    - S8040904, PR3335: Ensure javadoc tests do not overwrite
      results within tests
    - S8040908, PR3335: javadoc test TestDocEncoding should use
      -notimestamp
    - S8041150, PR3335: Avoid silly use of static methods in
      JavadocTester
    - S8041253, PR3335: Avoid redundant synonyms of NO_TEST
    - S8043780, PR3368: Use open(O_CLOEXEC) instead of
      fcntl(FD_CLOEXEC)
    - S8061305, PR3335: Javadoc crashes when method name ends with
      'Property'
    - S8072452, PR3337: Support DHE sizes up to 8192-bits and DSA
      sizes up to 3072-bits
    - S8075565, PR3337: Define @intermittent jtreg keyword and mark
      intermittently failing jdk tests
    - S8075670, PR3337: Remove intermittent keyword from some tests
    - S8078334, PR3337: Mark regression tests using randomness
    - S8078880, PR3337: Mark a few more intermittently failuring
      security-libs
    - S8133318, PR3337: Exclude intermittent failing PKCS11 tests
      on Solaris SPARC 11.1 and earlier
    - S8144539, PR3337: Update PKCS11 tests to run with security
      manager
    - S8144566, PR3352: Custom HostnameVerifier disables SNI
      extension
    - S8153711, PR3313, RH1284948: [REDO] JDWP: Memory Leak:
      GlobalRefs never deleted when processing invokeMethod command
    - S8155049, PR3352: New tests from 8144566 fail with 'No
      expected Server Name Indication'
    - S8173941, PR3326: SA does not work if executable is DSO
    - S8174164, PR3334, RH1417266: SafePointNode::_replaced_nodes
      breaks with irreducible loops
    - S8174729, PR3336, RH1420518: Race Condition in
      java.lang.reflect.WeakCache
    - S8175097, PR3334, RH1417266: [TESTBUG] 8174164 fix missed the
      test
  * Bug fixes
    - PR3348: Architectures unsupported by SystemTap tapsets throw
      a parse error
    - PR3378: Perl should be mandatory
    - PR3389: javac.in and javah.in should use @PERL@ rather than a
      hardcoded path
  * AArch64 port
    - S8168699, PR3372: Validate special case invocations [AArch64
      support]
    - S8170100, PR3372: AArch64: Crash in C1-compiled code
      accessing References
    - S8172881, PR3372: AArch64: assertion failure: the int
      pressure is incorrect
    - S8173472, PR3372: AArch64: C1 comparisons with null only use
      32-bit instructions
    - S8177661, PR3372: Correct ad rule output register types from
      iRegX to iRegXNoSp
  * AArch32 port
    - PR3380: Zero should not be enabled by default on arm with the
      AArch32 HotSpot build
    - PR3384, S8139303, S8167584: Add support for AArch32
      architecture to configure and jdk makefiles
    - PR3385: aarch32 does not support -Xshare:dump
    - PR3386, S8164652: AArch32 jvm.cfg wrong for C1 build
    - PR3387: Installation fails on arm with AArch32 port as
      INSTALL_ARCH_DIR is arm, not aarch32
    - PR3388: Wrong path for jvm.cfg being used on arm with AArch32
      build
  * Shenandoah
    - Fix Shenandoah argument checking on 32bit builds.
    - Import from Shenandoah tag
      aarch64-shenandoah-jdk8u101-b14-shenandoah-merge-2016-07-25
    - Import from Shenandoah tag
      aarch64-shenandoah-jdk8u121-b14-shenandoah-merge-2017-02-20
    - Import from Shenandoah tag
      aarch64-shenandoah-jdk8u121-b14-shenandoah-merge-2017-03-06
    - Import from Shenandoah tag
      aarch64-shenandoah-jdk8u121-b14-shenandoah-merge-2017-03-09
    - Import from Shenandoah tag
      aarch64-shenandoah-jdk8u121-b14-shenandoah-merge-2017-03-23
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-30"/>
	<updated date="2017-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3511/">CVE-2017-3511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3512/">CVE-2017-3512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3514/">CVE-2017-3514</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3526/">CVE-2017-3526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518690" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518691" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78073" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1002981" ref_url="https://bugzilla.suse.com/1002981" source="BUGZILLA"/>
		<reference ref_id="1010735" ref_url="https://bugzilla.suse.com/1010735" source="BUGZILLA"/>
		<reference ref_id="1010740" ref_url="https://bugzilla.suse.com/1010740" source="BUGZILLA"/>
		<reference ref_id="1010752" ref_url="https://bugzilla.suse.com/1010752" source="BUGZILLA"/>
		<reference ref_id="1010754" ref_url="https://bugzilla.suse.com/1010754" source="BUGZILLA"/>
		<reference ref_id="1010911" ref_url="https://bugzilla.suse.com/1010911" source="BUGZILLA"/>
		<reference ref_id="1021739" ref_url="https://bugzilla.suse.com/1021739" source="BUGZILLA"/>
		<reference ref_id="1025913" ref_url="https://bugzilla.suse.com/1025913" source="BUGZILLA"/>
		<reference ref_id="1026507" ref_url="https://bugzilla.suse.com/1026507" source="BUGZILLA"/>
		<reference ref_id="1027692" ref_url="https://bugzilla.suse.com/1027692" source="BUGZILLA"/>
		<reference ref_id="1027998" ref_url="https://bugzilla.suse.com/1027998" source="BUGZILLA"/>
		<reference ref_id="1033936" ref_url="https://bugzilla.suse.com/1033936" source="BUGZILLA"/>
		<reference ref_id="1033937" ref_url="https://bugzilla.suse.com/1033937" source="BUGZILLA"/>
		<reference ref_id="1033938" ref_url="https://bugzilla.suse.com/1033938" source="BUGZILLA"/>
		<reference ref_id="1033939" ref_url="https://bugzilla.suse.com/1033939" source="BUGZILLA"/>
		<reference ref_id="1033940" ref_url="https://bugzilla.suse.com/1033940" source="BUGZILLA"/>
		<reference ref_id="1033941" ref_url="https://bugzilla.suse.com/1033941" source="BUGZILLA"/>
		<reference ref_id="1033942" ref_url="https://bugzilla.suse.com/1033942" source="BUGZILLA"/>
		<reference ref_id="1033943" ref_url="https://bugzilla.suse.com/1033943" source="BUGZILLA"/>
		<reference ref_id="1033944" ref_url="https://bugzilla.suse.com/1033944" source="BUGZILLA"/>
		<reference ref_id="1033945" ref_url="https://bugzilla.suse.com/1033945" source="BUGZILLA"/>
		<reference ref_id="990856" ref_url="https://bugzilla.suse.com/990856" source="BUGZILLA"/>
		<reference ref_id="998761" ref_url="https://bugzilla.suse.com/998761" source="BUGZILLA"/>
		<reference ref_id="998762" ref_url="https://bugzilla.suse.com/998762" source="BUGZILLA"/>
		<reference ref_id="998763" ref_url="https://bugzilla.suse.com/998763" source="BUGZILLA"/>
		<reference ref_id="998800" ref_url="https://bugzilla.suse.com/998800" source="BUGZILLA"/>
		<reference ref_id="998963" ref_url="https://bugzilla.suse.com/998963" source="BUGZILLA"/>
		<reference ref_id="998964" ref_url="https://bugzilla.suse.com/998964" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="CVE-2016-7175" ref_url="https://www.suse.com/security/cve/CVE-2016-7175/" source="CVE"/>
		<reference ref_id="CVE-2016-7176" ref_url="https://www.suse.com/security/cve/CVE-2016-7176/" source="CVE"/>
		<reference ref_id="CVE-2016-7177" ref_url="https://www.suse.com/security/cve/CVE-2016-7177/" source="CVE"/>
		<reference ref_id="CVE-2016-7178" ref_url="https://www.suse.com/security/cve/CVE-2016-7178/" source="CVE"/>
		<reference ref_id="CVE-2016-7179" ref_url="https://www.suse.com/security/cve/CVE-2016-7179/" source="CVE"/>
		<reference ref_id="CVE-2016-7180" ref_url="https://www.suse.com/security/cve/CVE-2016-7180/" source="CVE"/>
		<reference ref_id="CVE-2016-9373" ref_url="https://www.suse.com/security/cve/CVE-2016-9373/" source="CVE"/>
		<reference ref_id="CVE-2016-9374" ref_url="https://www.suse.com/security/cve/CVE-2016-9374/" source="CVE"/>
		<reference ref_id="CVE-2016-9375" ref_url="https://www.suse.com/security/cve/CVE-2016-9375/" source="CVE"/>
		<reference ref_id="CVE-2016-9376" ref_url="https://www.suse.com/security/cve/CVE-2016-9376/" source="CVE"/>
		<reference ref_id="CVE-2017-5596" ref_url="https://www.suse.com/security/cve/CVE-2017-5596/" source="CVE"/>
		<reference ref_id="CVE-2017-5597" ref_url="https://www.suse.com/security/cve/CVE-2017-5597/" source="CVE"/>
		<reference ref_id="CVE-2017-6014" ref_url="https://www.suse.com/security/cve/CVE-2017-6014/" source="CVE"/>
		<reference ref_id="CVE-2017-7700" ref_url="https://www.suse.com/security/cve/CVE-2017-7700/" source="CVE"/>
		<reference ref_id="CVE-2017-7701" ref_url="https://www.suse.com/security/cve/CVE-2017-7701/" source="CVE"/>
		<reference ref_id="CVE-2017-7702" ref_url="https://www.suse.com/security/cve/CVE-2017-7702/" source="CVE"/>
		<reference ref_id="CVE-2017-7703" ref_url="https://www.suse.com/security/cve/CVE-2017-7703/" source="CVE"/>
		<reference ref_id="CVE-2017-7704" ref_url="https://www.suse.com/security/cve/CVE-2017-7704/" source="CVE"/>
		<reference ref_id="CVE-2017-7705" ref_url="https://www.suse.com/security/cve/CVE-2017-7705/" source="CVE"/>
		<reference ref_id="CVE-2017-7745" ref_url="https://www.suse.com/security/cve/CVE-2017-7745/" source="CVE"/>
		<reference ref_id="CVE-2017-7746" ref_url="https://www.suse.com/security/cve/CVE-2017-7746/" source="CVE"/>
		<reference ref_id="CVE-2017-7747" ref_url="https://www.suse.com/security/cve/CVE-2017-7747/" source="CVE"/>
		<reference ref_id="CVE-2017-7748" ref_url="https://www.suse.com/security/cve/CVE-2017-7748/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<description>

Wireshark was updated to version 2.2.6, which brings several new features, enhancements
and bug fixes.

Thses security issues were fixed:

- CVE-2017-7700: In Wireshark the NetScaler file parser could go into an infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by ensuring a nonzero record size (bsc#1033936)
- CVE-2017-7701: In Wireshark the BGP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-bgp.c by using a different integer data type (bsc#1033937)
- CVE-2017-7702: In Wireshark the WBXML dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wbxml.c by adding length validation (bsc#1033938)
- CVE-2017-7703: In Wireshark the IMAP dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-imap.c by calculating a line's end correctly (bsc#1033939)
- CVE-2017-7704: In Wireshark the DOF dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dof.c by using a different integer data type and adjusting a return value (bsc#1033940)
- CVE-2017-7705: In Wireshark the RPC over RDMA dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-rpcrdma.c by correctly checking for going beyond the maximum offset (bsc#1033941)
- CVE-2017-7745: In Wireshark the SIGCOMP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-sigcomp.c by correcting a memory-size check (bsc#1033942)
- CVE-2017-7746: In Wireshark the SLSK dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-slsk.c by adding checks for the remaining length (bsc#1033943)
- CVE-2017-7747: In Wireshark the PacketBB dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-packetbb.c by restricting additions to the protocol tree (bsc#1033944)
- CVE-2017-7748: In Wireshark the WSP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wsp.c by adding a length check (bsc#1033945)
- CVE-2017-6014: In Wireshark a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory (bsc#1025913)
- CVE-2017-5596: In Wireshark the ASTERIX dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-asterix.c by changing a data type to avoid an integer overflow (bsc#1021739)
- CVE-2017-5597: In Wireshark the DHCPv6 dissector could go into a large loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dhcpv6.c by changing a data type to avoid an integer overflow (bsc#1021739)
- CVE-2016-9376: In Wireshark the OpenFlow dissector could crash with memory exhaustion, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-openflow_v5.c by ensuring that certain length values were sufficiently large (bsc#1010735)
- CVE-2016-9375: In Wireshark the DTN dissector could go into an infinite loop, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dtn.c by checking whether SDNV evaluation was successful (bsc#1010740)
- CVE-2016-9374: In Wireshark the AllJoyn dissector could crash with a buffer over-read, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-alljoyn.c by ensuring that a length variable properly tracked the state of a signature variable (bsc#1010752)
- CVE-2016-9373: In Wireshark the DCERPC dissector could crash with a use-after-free, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dcerpc-nt.c and epan/dissectors/packet-dcerpc-spoolss.c by using the wmem file scope for private strings (bsc#1010754)
- CVE-2016-7180: epan/dissectors/packet-ipmi-trace.c in the IPMI trace dissector in Wireshark did not properly consider whether a string is constant, which allowed remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet (bsc#998800)
- CVE-2016-7179: Stack-based buffer overflow in epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark allowed remote attackers to cause a denial of service (application crash) via a crafted packet (bsc#998963)
- CVE-2016-7178: epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark did not ensure that memory is allocated for certain data structures, which allowed remote attackers to cause a denial of service (invalid write access and application crash) via a crafted packet (bsc#998964)
- CVE-2016-7177: epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark did not restrict the number of channels, which allowed remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet (bsc#998763)
- CVE-2016-7176: epan/dissectors/packet-h225.c in the H.225 dissector in Wireshark called snprintf with one of its input buffers as the output buffer, which allowed remote attackers to cause a denial of service (copy overlap and application crash) via a crafted packet (bsc#998762)
- CVE-2016-7175: epan/dissectors/packet-qnet6.c in the QNX6 QNET dissector in Wireshark mishandled MAC address data, which allowed remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet (bsc#998761)
- CVE-2016-6354: Heap-based buffer overflow in the yy_get_next_buffer function in Flex might have allowed context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read (bsc#990856).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-30"/>
	<updated date="2017-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002981">SUSE bug 1002981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010735">SUSE bug 1010735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010740">SUSE bug 1010740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010752">SUSE bug 1010752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010754">SUSE bug 1010754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010911">SUSE bug 1010911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021739">SUSE bug 1021739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025913">SUSE bug 1025913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026507">SUSE bug 1026507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027692">SUSE bug 1027692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027998">SUSE bug 1027998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033936">SUSE bug 1033936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033937">SUSE bug 1033937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033938">SUSE bug 1033938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033939">SUSE bug 1033939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033940">SUSE bug 1033940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033941">SUSE bug 1033941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033942">SUSE bug 1033942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033943">SUSE bug 1033943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033944">SUSE bug 1033944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033945">SUSE bug 1033945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990856">SUSE bug 990856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998761">SUSE bug 998761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998762">SUSE bug 998762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998763">SUSE bug 998763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998800">SUSE bug 998800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998963">SUSE bug 998963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998964">SUSE bug 998964</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7175/">CVE-2016-7175</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7176/">CVE-2016-7176</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7177/">CVE-2016-7177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7178/">CVE-2016-7178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7179/">CVE-2016-7179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7180/">CVE-2016-7180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9373/">CVE-2016-9373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9374/">CVE-2016-9374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9375/">CVE-2016-9375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9376/">CVE-2016-9376</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5596/">CVE-2017-5596</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5597/">CVE-2017-5597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6014/">CVE-2017-6014</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7700/">CVE-2017-7700</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7701/">CVE-2017-7701</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7702/">CVE-2017-7702</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7703/">CVE-2017-7703</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7704/">CVE-2017-7704</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7705/">CVE-2017-7705</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7745/">CVE-2017-7745</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7746/">CVE-2017-7746</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7747/">CVE-2017-7747</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7748/">CVE-2017-7748</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517454" comment="libwireshark8-2.2.6-44.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517455" comment="libwiretap6-2.2.6-44.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517456" comment="libwscodecs1-2.2.6-44.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517457" comment="libwsutil7-2.2.6-44.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517458" comment="wireshark-2.2.6-44.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517459" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78074" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1015351" ref_url="https://bugzilla.suse.com/1015351" source="BUGZILLA"/>
		<reference ref_id="1024145" ref_url="https://bugzilla.suse.com/1024145" source="BUGZILLA"/>
		<reference ref_id="1039361" ref_url="https://bugzilla.suse.com/1039361" source="BUGZILLA"/>
		<reference ref_id="981124" ref_url="https://bugzilla.suse.com/981124" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000367" ref_url="https://www.suse.com/security/cve/CVE-2017-1000367/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1450-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00078.html" source="SUSE-SU"/>
		<description>

This update for sudo fixes the following issues:

CVE-2017-1000367:
- Due to incorrect assumptions in /proc/[pid]/stat parsing,
  a local attacker can pretend that his tty is any file on the filesystem,
  thus gaining arbitrary file write access on SELinux-enabled systems. [bsc#1039361]
- Fix FQDN for hostname. [bsc#1024145]
- Filter netgroups, they aren't handled by SSSD. [bsc#1015351]
- Fix problems related to 'krb5_ccname' option [bsc#981124]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-30"/>
	<updated date="2017-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1015351">SUSE bug 1015351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024145">SUSE bug 1024145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039361">SUSE bug 1039361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981124">SUSE bug 981124</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000367/">CVE-2017-1000367</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518692" comment="sudo-1.8.10p3-10.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78075" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1039063" ref_url="https://bugzilla.suse.com/1039063" source="BUGZILLA"/>
		<reference ref_id="1039064" ref_url="https://bugzilla.suse.com/1039064" source="BUGZILLA"/>
		<reference ref_id="1039066" ref_url="https://bugzilla.suse.com/1039066" source="BUGZILLA"/>
		<reference ref_id="1039069" ref_url="https://bugzilla.suse.com/1039069" source="BUGZILLA"/>
		<reference ref_id="1039661" ref_url="https://bugzilla.suse.com/1039661" source="BUGZILLA"/>
		<reference ref_id="981114" ref_url="https://bugzilla.suse.com/981114" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839/" source="CVE"/>
		<reference ref_id="CVE-2017-9047" ref_url="https://www.suse.com/security/cve/CVE-2017-9047/" source="CVE"/>
		<reference ref_id="CVE-2017-9048" ref_url="https://www.suse.com/security/cve/CVE-2017-9048/" source="CVE"/>
		<reference ref_id="CVE-2017-9049" ref_url="https://www.suse.com/security/cve/CVE-2017-9049/" source="CVE"/>
		<reference ref_id="CVE-2017-9050" ref_url="https://www.suse.com/security/cve/CVE-2017-9050/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002931.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following issues:

- CVE-2017-9047, CVE-2017-9048: The function xmlSnprintfElementContent in valid.c was vulnerable to a stack buffer overflow (bsc#1039063, bsc#1039064)
- CVE-2017-9049: The function xmlDictComputeFastKey in dict.c was vulnerable to a heap-based buffer over-read. (bsc#1039066)
- CVE-2017-9050: The function xmlDictAddString was vulnerable to a heap-based buffer over-read (bsc#1039661)
- CVE-2016-1839: heap-based buffer overflow (xmlDictAddString func) (bnc#1039069)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-30"/>
	<updated date="2017-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1039063">SUSE bug 1039063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039064">SUSE bug 1039064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039066">SUSE bug 1039066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039069">SUSE bug 1039069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039661">SUSE bug 1039661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981114">SUSE bug 981114</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9047/">CVE-2017-9047</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9048/">CVE-2017-9048</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9049/">CVE-2017-9049</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9050/">CVE-2017-9050</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518693" comment="libxml2-2-2.9.4-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518694" comment="libxml2-2-32bit-2.9.4-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518695" comment="libxml2-tools-2.9.4-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518696" comment="python-libxml2-2.9.4-36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78076" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1039514" ref_url="https://bugzilla.suse.com/1039514" source="BUGZILLA"/>
		<reference ref_id="1039515" ref_url="https://bugzilla.suse.com/1039515" source="BUGZILLA"/>
		<reference ref_id="985012" ref_url="https://bugzilla.suse.com/985012" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9022" ref_url="https://www.suse.com/security/cve/CVE-2017-9022/" source="CVE"/>
		<reference ref_id="CVE-2017-9023" ref_url="https://www.suse.com/security/cve/CVE-2017-9023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002934.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2017-9022: Insufficient Input Validation in gmp Plugin leads to Denial of service (bsc#1039514)
- CVE-2017-9023: Incorrect x509 ASN.1 parser error handling could lead to Denial of service  (bsc#1039515)
- IKEv1 protocol is vulnerable to DoS amplification attack (bsc#985012)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-01"/>
	<updated date="2017-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1039514">SUSE bug 1039514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039515">SUSE bug 1039515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985012">SUSE bug 985012</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9022/">CVE-2017-9022</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9023/">CVE-2017-9023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518697" comment="strongswan-5.1.3-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518698" comment="strongswan-doc-5.1.3-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518699" comment="strongswan-ipsec-5.1.3-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518700" comment="strongswan-libs0-5.1.3-25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78077" version="1" class="patch">
	<metadata>
		<title>Security update for libnettle (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="991464" ref_url="https://bugzilla.suse.com/991464" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6489" ref_url="https://www.suse.com/security/cve/CVE-2016-6489/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002936.html" source="SUSE-SU"/>
		<description>
This update for libnettle fixes the following issues:

-  CVE-2016-6489:
  * Reject invalid RSA keys with even modulo.
  * Check for invalid keys, with even p, in dsa_sign().
  * Use function mpz_powm_sec() instead of mpz_powm() (bsc#991464).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-02"/>
	<updated date="2017-06-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/991464">SUSE bug 991464</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6489/">CVE-2016-6489</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518701" comment="libhogweed2-2.7.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518702" comment="libhogweed2-32bit-2.7.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518703" comment="libnettle4-2.7.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518704" comment="libnettle4-32bit-2.7.1-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78078" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1028075" ref_url="https://bugzilla.suse.com/1028075" source="BUGZILLA"/>
		<reference ref_id="1033091" ref_url="https://bugzilla.suse.com/1033091" source="BUGZILLA"/>
		<reference ref_id="1034870" ref_url="https://bugzilla.suse.com/1034870" source="BUGZILLA"/>
		<reference ref_id="1034872" ref_url="https://bugzilla.suse.com/1034872" source="BUGZILLA"/>
		<reference ref_id="1034876" ref_url="https://bugzilla.suse.com/1034876" source="BUGZILLA"/>
		<reference ref_id="1036976" ref_url="https://bugzilla.suse.com/1036976" source="BUGZILLA"/>
		<reference ref_id="1036977" ref_url="https://bugzilla.suse.com/1036977" source="BUGZILLA"/>
		<reference ref_id="1036978" ref_url="https://bugzilla.suse.com/1036978" source="BUGZILLA"/>
		<reference ref_id="1036980" ref_url="https://bugzilla.suse.com/1036980" source="BUGZILLA"/>
		<reference ref_id="1036981" ref_url="https://bugzilla.suse.com/1036981" source="BUGZILLA"/>
		<reference ref_id="1036982" ref_url="https://bugzilla.suse.com/1036982" source="BUGZILLA"/>
		<reference ref_id="1036983" ref_url="https://bugzilla.suse.com/1036983" source="BUGZILLA"/>
		<reference ref_id="1036984" ref_url="https://bugzilla.suse.com/1036984" source="BUGZILLA"/>
		<reference ref_id="1036985" ref_url="https://bugzilla.suse.com/1036985" source="BUGZILLA"/>
		<reference ref_id="1036986" ref_url="https://bugzilla.suse.com/1036986" source="BUGZILLA"/>
		<reference ref_id="1036987" ref_url="https://bugzilla.suse.com/1036987" source="BUGZILLA"/>
		<reference ref_id="1036988" ref_url="https://bugzilla.suse.com/1036988" source="BUGZILLA"/>
		<reference ref_id="1036989" ref_url="https://bugzilla.suse.com/1036989" source="BUGZILLA"/>
		<reference ref_id="1036990" ref_url="https://bugzilla.suse.com/1036990" source="BUGZILLA"/>
		<reference ref_id="1036991" ref_url="https://bugzilla.suse.com/1036991" source="BUGZILLA"/>
		<reference ref_id="1037527" ref_url="https://bugzilla.suse.com/1037527" source="BUGZILLA"/>
		<reference ref_id="1038000" ref_url="https://bugzilla.suse.com/1038000" source="BUGZILLA"/>
		<reference ref_id="1040025" ref_url="https://bugzilla.suse.com/1040025" source="BUGZILLA"/>
		<reference ref_id="1040303" ref_url="https://bugzilla.suse.com/1040303" source="BUGZILLA"/>
		<reference ref_id="1040304" ref_url="https://bugzilla.suse.com/1040304" source="BUGZILLA"/>
		<reference ref_id="1040306" ref_url="https://bugzilla.suse.com/1040306" source="BUGZILLA"/>
		<reference ref_id="1040332" ref_url="https://bugzilla.suse.com/1040332" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6502" ref_url="https://www.suse.com/security/cve/CVE-2017-6502/" source="CVE"/>
		<reference ref_id="CVE-2017-7606" ref_url="https://www.suse.com/security/cve/CVE-2017-7606/" source="CVE"/>
		<reference ref_id="CVE-2017-7941" ref_url="https://www.suse.com/security/cve/CVE-2017-7941/" source="CVE"/>
		<reference ref_id="CVE-2017-7942" ref_url="https://www.suse.com/security/cve/CVE-2017-7942/" source="CVE"/>
		<reference ref_id="CVE-2017-7943" ref_url="https://www.suse.com/security/cve/CVE-2017-7943/" source="CVE"/>
		<reference ref_id="CVE-2017-8343" ref_url="https://www.suse.com/security/cve/CVE-2017-8343/" source="CVE"/>
		<reference ref_id="CVE-2017-8344" ref_url="https://www.suse.com/security/cve/CVE-2017-8344/" source="CVE"/>
		<reference ref_id="CVE-2017-8345" ref_url="https://www.suse.com/security/cve/CVE-2017-8345/" source="CVE"/>
		<reference ref_id="CVE-2017-8346" ref_url="https://www.suse.com/security/cve/CVE-2017-8346/" source="CVE"/>
		<reference ref_id="CVE-2017-8347" ref_url="https://www.suse.com/security/cve/CVE-2017-8347/" source="CVE"/>
		<reference ref_id="CVE-2017-8348" ref_url="https://www.suse.com/security/cve/CVE-2017-8348/" source="CVE"/>
		<reference ref_id="CVE-2017-8349" ref_url="https://www.suse.com/security/cve/CVE-2017-8349/" source="CVE"/>
		<reference ref_id="CVE-2017-8350" ref_url="https://www.suse.com/security/cve/CVE-2017-8350/" source="CVE"/>
		<reference ref_id="CVE-2017-8351" ref_url="https://www.suse.com/security/cve/CVE-2017-8351/" source="CVE"/>
		<reference ref_id="CVE-2017-8352" ref_url="https://www.suse.com/security/cve/CVE-2017-8352/" source="CVE"/>
		<reference ref_id="CVE-2017-8353" ref_url="https://www.suse.com/security/cve/CVE-2017-8353/" source="CVE"/>
		<reference ref_id="CVE-2017-8354" ref_url="https://www.suse.com/security/cve/CVE-2017-8354/" source="CVE"/>
		<reference ref_id="CVE-2017-8355" ref_url="https://www.suse.com/security/cve/CVE-2017-8355/" source="CVE"/>
		<reference ref_id="CVE-2017-8356" ref_url="https://www.suse.com/security/cve/CVE-2017-8356/" source="CVE"/>
		<reference ref_id="CVE-2017-8357" ref_url="https://www.suse.com/security/cve/CVE-2017-8357/" source="CVE"/>
		<reference ref_id="CVE-2017-8765" ref_url="https://www.suse.com/security/cve/CVE-2017-8765/" source="CVE"/>
		<reference ref_id="CVE-2017-8830" ref_url="https://www.suse.com/security/cve/CVE-2017-8830/" source="CVE"/>
		<reference ref_id="CVE-2017-9098" ref_url="https://www.suse.com/security/cve/CVE-2017-9098/" source="CVE"/>
		<reference ref_id="CVE-2017-9141" ref_url="https://www.suse.com/security/cve/CVE-2017-9141/" source="CVE"/>
		<reference ref_id="CVE-2017-9142" ref_url="https://www.suse.com/security/cve/CVE-2017-9142/" source="CVE"/>
		<reference ref_id="CVE-2017-9143" ref_url="https://www.suse.com/security/cve/CVE-2017-9143/" source="CVE"/>
		<reference ref_id="CVE-2017-9144" ref_url="https://www.suse.com/security/cve/CVE-2017-9144/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2017-6502: Possible file-descriptor leak in libmagickcore that could be triggered via a
  specially crafted webp file (bsc#1028075).
- CVE-2017-7943: The ReadSVGImage function in svg.c allowed remote attackers to consume an
  amount of available memory via a crafted file (bsc#1034870). Note that this only impacts the
  built-in SVG implementation. As we use the librsgv implementation, we are not affected.
- CVE-2017-7942: The ReadAVSImage function in avs.c allowed remote attackers to consume an
  amount of available memory via a crafted file (bsc#1034872).
- CVE-2017-7941: The ReadSGIImage function in sgi.c allowed remote attackers to consume an
  amount of available memory via a crafted file (bsc#1034876).
- CVE-2017-8351: ImageMagick, GraphicsMagick: denial of service (memory leak) via a crafted
  file (ReadPCDImage func in pcd.c) (bsc#1036986).
- CVE-2017-8352: denial of service (memory leak) via a crafted file (ReadXWDImage func in
  xwd.c) (bsc#1036987)
- CVE-2017-8349: denial of service (memory leak) via a crafted file (ReadSFWImage func in
  sfw.c) (bsc#1036984)
- CVE-2017-8350: denial of service (memory leak) via a crafted file (ReadJNGImage function in
  png.c) (bsc#1036985)
- CVE-2017-8347: denial of service (memory leak) via a crafted file (ReadEXRImage func in
  exr.c) (bsc#1036982)
- CVE-2017-8348: denial of service (memory leak) via a crafted file (ReadMATImage func in
  mat.c) (bsc#1036983)
- CVE-2017-8345: denial of service (memory leak) via a crafted file (ReadMNGImage func in
  png.c) (bsc#1036980)
- CVE-2017-8346: denial of service (memory leak) via a crafted file (ReadDCMImage func in
  dcm.c) (bsc#1036981)
- CVE-2017-8353: denial of service (memory leak) via a crafted file (ReadPICTImage func in
  pict.c) (bsc#1036988)
- CVE-2017-8354: denial of service (memory leak) via a crafted file (ReadBMPImage func in
  bmp.c) (bsc#1036989)
- CVE-2017-8830: denial of service (memory leak) via a crafted file (ReadBMPImage func in
  bmp.c:1379) (bsc#1038000)
- CVE-2017-7606: denial of service (application crash) or possibly have unspecified other
  impact via a crafted image (bsc#1033091)
- CVE-2017-8765: memory leak vulnerability via a crafted ICON file (ReadICONImage in
  coders\icon.c) (bsc#1037527)
- CVE-2017-8356: denial of service (memory leak) via a crafted file (ReadSUNImage function in
  sun.c) (bsc#1036991)
- CVE-2017-8355: denial of service (memory leak) via a crafted file (ReadMTVImage func in
  mtv.c) (bsc#1036990)
- CVE-2017-8344: denial of service (memory leak) via a crafted file (ReadPCXImage func in
  pcx.c) (bsc#1036978)
- CVE-2017-8343: denial of service (memory leak) via a crafted file (ReadAAIImage func in
  aai.c) (bsc#1036977)
- CVE-2017-8357: denial of service (memory leak) via a crafted file (ReadEPTImage func in
  ept.c) (bsc#1036976)
- CVE-2017-9098: uninitialized memory usage in the  ReadRLEImage RLE decoder 
  function coders/rle.c (bsc#1040025)
- CVE-2017-9141: Missing checks in the ReadDDSImage function in
  coders/dds.c could lead to a denial of service (assertion) (bsc#1040303)
- CVE-2017-9142: Missing checks in theReadOneJNGImage function in
  coders/png.c could lead to denial of service (assertion) (bsc#1040304)
- CVE-2017-9143: A possible denial of service attack via crafted .art
  file in ReadARTImage function in coders/art.c (bsc#1040306)
- CVE-2017-9144: A crafted RLE image can trigger a crash in coders/rle.c
  could lead to a denial of service (crash) (bsc#1040332)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-06"/>
	<updated date="2017-06-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1028075">SUSE bug 1028075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033091">SUSE bug 1033091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034870">SUSE bug 1034870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034872">SUSE bug 1034872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034876">SUSE bug 1034876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036976">SUSE bug 1036976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036977">SUSE bug 1036977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036978">SUSE bug 1036978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036980">SUSE bug 1036980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036981">SUSE bug 1036981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036982">SUSE bug 1036982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036983">SUSE bug 1036983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036984">SUSE bug 1036984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036985">SUSE bug 1036985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036986">SUSE bug 1036986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036987">SUSE bug 1036987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036988">SUSE bug 1036988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036989">SUSE bug 1036989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036990">SUSE bug 1036990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036991">SUSE bug 1036991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037527">SUSE bug 1037527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038000">SUSE bug 1038000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040025">SUSE bug 1040025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040303">SUSE bug 1040303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040304">SUSE bug 1040304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040306">SUSE bug 1040306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040332">SUSE bug 1040332</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6502/">CVE-2017-6502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7606/">CVE-2017-7606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7941/">CVE-2017-7941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7942/">CVE-2017-7942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7943/">CVE-2017-7943</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8343/">CVE-2017-8343</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8344/">CVE-2017-8344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8345/">CVE-2017-8345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8346/">CVE-2017-8346</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8347/">CVE-2017-8347</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8348/">CVE-2017-8348</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8349/">CVE-2017-8349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8350/">CVE-2017-8350</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8351/">CVE-2017-8351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8352/">CVE-2017-8352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8353/">CVE-2017-8353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8354/">CVE-2017-8354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8355/">CVE-2017-8355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8356/">CVE-2017-8356</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8357/">CVE-2017-8357</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8765/">CVE-2017-8765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8830/">CVE-2017-8830</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9098/">CVE-2017-9098</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9141/">CVE-2017-9141</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9142/">CVE-2017-9142</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9143/">CVE-2017-9143</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9144/">CVE-2017-9144</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518705" comment="ImageMagick-6.8.8.1-70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518706" comment="libMagick++-6_Q16-3-6.8.8.1-70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518707" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518708" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518709" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78079" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1039063" ref_url="https://bugzilla.suse.com/1039063" source="BUGZILLA"/>
		<reference ref_id="1039064" ref_url="https://bugzilla.suse.com/1039064" source="BUGZILLA"/>
		<reference ref_id="1039066" ref_url="https://bugzilla.suse.com/1039066" source="BUGZILLA"/>
		<reference ref_id="1039069" ref_url="https://bugzilla.suse.com/1039069" source="BUGZILLA"/>
		<reference ref_id="1039661" ref_url="https://bugzilla.suse.com/1039661" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9047" ref_url="https://www.suse.com/security/cve/CVE-2017-9047/" source="CVE"/>
		<reference ref_id="CVE-2017-9048" ref_url="https://www.suse.com/security/cve/CVE-2017-9048/" source="CVE"/>
		<reference ref_id="CVE-2017-9049" ref_url="https://www.suse.com/security/cve/CVE-2017-9049/" source="CVE"/>
		<reference ref_id="CVE-2017-9050" ref_url="https://www.suse.com/security/cve/CVE-2017-9050/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002939.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following security issues:

* CVE-2017-9050: A heap-based buffer over-read in xmlDictAddString (bsc#1039069, bsc#1039661)
* CVE-2017-9049: A heap-based buffer overflow in xmlDictComputeFastKey (bsc#1039066)
* CVE-2017-9048: A stack overflow vulnerability in xmlSnprintfElementContent (bsc#1039063)
* CVE-2017-9047: A stack overflow vulnerability in xmlSnprintfElementContent (bsc#1039064)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-12"/>
	<updated date="2017-06-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1039063">SUSE bug 1039063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039064">SUSE bug 1039064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039066">SUSE bug 1039066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039069">SUSE bug 1039069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039661">SUSE bug 1039661</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9047/">CVE-2017-9047</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9048/">CVE-2017-9048</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9049/">CVE-2017-9049</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9050/">CVE-2017-9050</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518710" comment="libxml2-2-2.9.4-39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518711" comment="libxml2-2-32bit-2.9.4-39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518712" comment="libxml2-tools-2.9.4-39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518713" comment="python-libxml2-2.9.4-39.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78080" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1009470" ref_url="https://bugzilla.suse.com/1009470" source="BUGZILLA"/>
		<reference ref_id="1037396" ref_url="https://bugzilla.suse.com/1037396" source="BUGZILLA"/>
		<reference ref_id="1041764" ref_url="https://bugzilla.suse.com/1041764" source="BUGZILLA"/>
		<reference ref_id="972331" ref_url="https://bugzilla.suse.com/972331" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9287" ref_url="https://www.suse.com/security/cve/CVE-2017-9287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002942.html" source="SUSE-SU"/>
		<description>

This update for openldap2 fixes the following issues:

Security issues fixed:

- CVE-2017-9287: A double free vulnerability in the mdb backend during search with page size 0 was fixed (bsc#1041764)

Non security bugs fixed:

- Let OpenLDAP read system-wide certificates by default and don't hide the error if
  the user-specified CA location cannot be read. (bsc#1009470)
- Fix an uninitialised variable that causes startup failure (bsc#1037396)
- Fix an issue with transaction management that can cause server crash (bsc#972331)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-14"/>
	<updated date="2017-06-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009470">SUSE bug 1009470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037396">SUSE bug 1037396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041764">SUSE bug 1041764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972331">SUSE bug 972331</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9287/">CVE-2017-9287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518714" comment="libldap-2_4-2-2.4.41-18.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518715" comment="libldap-2_4-2-32bit-2.4.41-18.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518716" comment="openldap2-client-2.4.41-18.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78081" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase, libqt5-qtdeclarative (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1013095" ref_url="https://bugzilla.suse.com/1013095" source="BUGZILLA"/>
		<reference ref_id="1034005" ref_url="https://bugzilla.suse.com/1034005" source="BUGZILLA"/>
		<reference ref_id="1034402" ref_url="https://bugzilla.suse.com/1034402" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002946.html" source="SUSE-SU"/>
		<description>

This update for libqt5-qtbase and libqt5-qtdeclarative fixes the following issues:

This security issue was fixed:

- Prevent potential information leak due to race condition in QSaveFile (bsc#1034005).

These non-security issues were fixed:

- Fixed crash in QPlainTextEdit
- Fixed Burmese rendering issue
- Fixed reuse of C++-owned QObjects by different QML engines that could lead to crashes in kwin (bsc#1034402)
- Make libqt5-qtquickcontrols available in SUSE Linux Enterprise.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-16"/>
	<updated date="2017-06-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013095">SUSE bug 1013095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034005">SUSE bug 1034005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034402">SUSE bug 1034402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518717" comment="libQt5Concurrent5-5.6.1-17.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518718" comment="libQt5Core5-5.6.1-17.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518719" comment="libQt5DBus5-5.6.1-17.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518720" comment="libQt5Gui5-5.6.1-17.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518721" comment="libQt5Network5-5.6.1-17.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518722" comment="libQt5OpenGL5-5.6.1-17.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518723" comment="libQt5PrintSupport5-5.6.1-17.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518724" comment="libQt5Sql5-5.6.1-17.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518725" comment="libQt5Sql5-mysql-5.6.1-17.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518726" comment="libQt5Sql5-postgresql-5.6.1-17.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518727" comment="libQt5Sql5-sqlite-5.6.1-17.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518728" comment="libQt5Sql5-unixODBC-5.6.1-17.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518729" comment="libQt5Test5-5.6.1-17.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518730" comment="libQt5Widgets5-5.6.1-17.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518731" comment="libQt5Xml5-5.6.1-17.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518732" comment="libQtQuick5-5.6.1-13.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78082" version="1" class="patch">
	<metadata>
		<title>Security update for netpbm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1024287" ref_url="https://bugzilla.suse.com/1024287" source="BUGZILLA"/>
		<reference ref_id="1024292" ref_url="https://bugzilla.suse.com/1024292" source="BUGZILLA"/>
		<reference ref_id="1024294" ref_url="https://bugzilla.suse.com/1024294" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2581" ref_url="https://www.suse.com/security/cve/CVE-2017-2581/" source="CVE"/>
		<reference ref_id="CVE-2017-2586" ref_url="https://www.suse.com/security/cve/CVE-2017-2586/" source="CVE"/>
		<reference ref_id="CVE-2017-2587" ref_url="https://www.suse.com/security/cve/CVE-2017-2587/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002953.html" source="SUSE-SU"/>
		<description>
This update for netpbm fixes the following issues:

Security bugs:
* CVE-2017-2586: A NULL pointer dereference in stringToUint function could lead to a denial of service (abort) problem when processing malformed images. [bsc#1024292]
* CVE-2017-2581: A out-of-bounds write in writeRasterPbm() could be used by attackers to crash the decoder or potentially execute code. [bsc#1024287]
* CVE-2017-2587: A insufficient size check of memory allocation in createCanvas() function could be used for a denial of service attack (memory exhaustion) [bsc#1024294]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-19"/>
	<updated date="2017-06-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024287">SUSE bug 1024287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024292">SUSE bug 1024292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024294">SUSE bug 1024294</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2581/">CVE-2017-2581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2586/">CVE-2017-2586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2587/">CVE-2017-2587</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518733" comment="libnetpbm11-10.66.3-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518734" comment="libnetpbm11-32bit-10.66.3-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518735" comment="netpbm-10.66.3-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78083" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1042326" ref_url="https://bugzilla.suse.com/1042326" source="BUGZILLA"/>
		<reference ref_id="931932" ref_url="https://bugzilla.suse.com/931932" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9526" ref_url="https://www.suse.com/security/cve/CVE-2017-9526/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002955.html" source="SUSE-SU"/>
		<description>
This update for libgcrypt fixes the following issues:

- CVE-2017-9526: Store the session key in secure memory to ensure that constant
  time point operations are used in the MPI library.  (bsc#1042326)

- Don't require secure memory for the fips selftests, this prevents the
  'Oops, secure memory pool already initialized' warning. (bsc#931932)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-19"/>
	<updated date="2017-06-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042326">SUSE bug 1042326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931932">SUSE bug 931932</bugzilla>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-9526/">CVE-2017-9526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518736" comment="libgcrypt20-1.6.1-16.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518737" comment="libgcrypt20-32bit-1.6.1-16.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78084" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1039357" ref_url="https://bugzilla.suse.com/1039357" source="BUGZILLA"/>
		<reference ref_id="1040043" ref_url="https://bugzilla.suse.com/1040043" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000366" ref_url="https://www.suse.com/security/cve/CVE-2017-1000366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00016.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2017-1000366: Fix a potential privilege escalation vulnerability that
  allowed unprivileged system users to manipulate the stack of setuid binaries
  to gain special privileges. [bsc#1039357]

- A bug in glibc that could result in deadlocks between malloc() and fork() has
  been fixed. [bsc#1040043]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-19"/>
	<updated date="2017-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1039357">SUSE bug 1039357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040043">SUSE bug 1040043</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000366/">CVE-2017-1000366</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518738" comment="glibc-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518739" comment="glibc-32bit-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518740" comment="glibc-devel-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518741" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518742" comment="glibc-i18ndata-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518743" comment="glibc-locale-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518744" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518745" comment="nscd-2.22-61.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78085" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1037384" ref_url="https://bugzilla.suse.com/1037384" source="BUGZILLA"/>
		<reference ref_id="1039348" ref_url="https://bugzilla.suse.com/1039348" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000364" ref_url="https://www.suse.com/security/cve/CVE-2017-1000364/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002960.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2017-1000364: The default stack guard page was too small and could be 'jumped over' by userland programs using 
  more than one page of stack in functions and so lead to memory corruption. This update extends the stack guard page
  to 1 MB (for 4k pages) and 16 MB (for 64k pages) to reduce this attack vector. This is not a kernel bugfix, but a 
  hardening measure against this kind of userland attack.(bsc#1039348)

The following non-security bugs were fixed:

- There was a load failure in the sha-mb encryption implementation (bsc#1037384).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-19"/>
	<updated date="2017-06-19"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1037384">SUSE bug 1037384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000364/">CVE-2017-1000364</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518746" comment="kernel-default-4.4.59-92.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518747" comment="kernel-default-devel-4.4.59-92.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518748" comment="kernel-default-extra-4.4.59-92.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518749" comment="kernel-devel-4.4.59-92.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518750" comment="kernel-macros-4.4.59-92.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518751" comment="kernel-source-4.4.59-92.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518752" comment="kernel-syms-4.4.59-92.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78086" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1038709" ref_url="https://bugzilla.suse.com/1038709" source="BUGZILLA"/>
		<reference ref_id="1038711" ref_url="https://bugzilla.suse.com/1038711" source="BUGZILLA"/>
		<reference ref_id="1038713" ref_url="https://bugzilla.suse.com/1038713" source="BUGZILLA"/>
		<reference ref_id="995374" ref_url="https://bugzilla.suse.com/995374" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6329" ref_url="https://www.suse.com/security/cve/CVE-2016-6329/" source="CVE"/>
		<reference ref_id="CVE-2017-7478" ref_url="https://www.suse.com/security/cve/CVE-2017-7478/" source="CVE"/>
		<reference ref_id="CVE-2017-7479" ref_url="https://www.suse.com/security/cve/CVE-2017-7479/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1622-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00019.html" source="SUSE-SU"/>
		<description>
This update for openvpn fixes the following issues:

- CVE-2016-6329: Show which ciphers should no longer be used in openvpn --show-ciphers (bsc#995374)
- CVE-2017-7478: openvpn: Authenticated user can DoS server by using a big payload in P_CONTROL (bsc#1038709)
- CVE-2017-7479: openvpn: Denial of Service due to Exhaustion of Packet-ID counter (bsc#1038711)
- Hardening measures found by internal audit (bsc#1038713)


		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-20"/>
	<updated date="2017-06-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038709">SUSE bug 1038709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038711">SUSE bug 1038711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038713">SUSE bug 1038713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995374">SUSE bug 995374</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6329/">CVE-2016-6329</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7478/">CVE-2017-7478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7479/">CVE-2017-7479</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518753" comment="openvpn-2.3.8-16.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78087" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1056993" ref_url="https://bugzilla.suse.com/1056993" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6362" ref_url="https://www.suse.com/security/cve/CVE-2017-6362/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003613.html" source="SUSE-SU"/>
		<description>
This update for gd fixes one issues.

This security issue was fixed:

- CVE-2017-6362: Prevent double-free in gdImagePngPtr() that potentially allowed for DoS or remote code execution (bsc#1056993).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-18"/>
	<updated date="2018-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056993">SUSE bug 1056993</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6362/">CVE-2017-6362</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518754" comment="gd-2.1.0-24.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518755" comment="gd-32bit-2.1.0-24.3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78088" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1039616" ref_url="https://bugzilla.suse.com/1039616" source="BUGZILLA"/>
		<reference ref_id="1047487" ref_url="https://bugzilla.suse.com/1047487" source="BUGZILLA"/>
		<reference ref_id="1063043" ref_url="https://bugzilla.suse.com/1063043" source="BUGZILLA"/>
		<reference ref_id="1064311" ref_url="https://bugzilla.suse.com/1064311" source="BUGZILLA"/>
		<reference ref_id="1065180" ref_url="https://bugzilla.suse.com/1065180" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068951" ref_url="https://bugzilla.suse.com/1068951" source="BUGZILLA"/>
		<reference ref_id="1071009" ref_url="https://bugzilla.suse.com/1071009" source="BUGZILLA"/>
		<reference ref_id="1072556" ref_url="https://bugzilla.suse.com/1072556" source="BUGZILLA"/>
		<reference ref_id="1072962" ref_url="https://bugzilla.suse.com/1072962" source="BUGZILLA"/>
		<reference ref_id="1073090" ref_url="https://bugzilla.suse.com/1073090" source="BUGZILLA"/>
		<reference ref_id="1073792" ref_url="https://bugzilla.suse.com/1073792" source="BUGZILLA"/>
		<reference ref_id="1073809" ref_url="https://bugzilla.suse.com/1073809" source="BUGZILLA"/>
		<reference ref_id="1073874" ref_url="https://bugzilla.suse.com/1073874" source="BUGZILLA"/>
		<reference ref_id="1073912" ref_url="https://bugzilla.suse.com/1073912" source="BUGZILLA"/>
		<reference ref_id="964063" ref_url="https://bugzilla.suse.com/964063" source="BUGZILLA"/>
		<reference ref_id="969470" ref_url="https://bugzilla.suse.com/969470" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17805" ref_url="https://www.suse.com/security/cve/CVE-2017-17805/" source="CVE"/>
		<reference ref_id="CVE-2017-17806" ref_url="https://www.suse.com/security/cve/CVE-2017-17806/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.

This update adds mitigations for various side channel attacks against
modern CPUs that could disclose content of otherwise unreadable memory
(bnc#1068032).

- CVE-2017-5753 / 'SpecŧreAttack': Local attackers on systems with
  modern CPUs featuring deep instruction pipelining could use attacker
  controllable speculative execution over code patterns in the Linux
  Kernel to leak content from otherwise not readable memory in the same
  address space, allowing retrieval of passwords, cryptographic keys
  and other secrets.

  This problem is mitigated by adding speculative fencing on affected
  code paths throughout the Linux kernel.


- CVE-2017-5715 / 'SpectreAttack': Local attackers on systems with modern
  CPUs featuring branch prediction could use mispredicted branches to
  speculatively execute code patterns that in turn could be made to
  leak other non-readable content in the same address space, an attack
  similar to CVE-2017-5753.

  This problem is mitigated by disabling predictive branches, depending
  on CPU architecture either by firmware updates and/or fixes in the
  user-kernel privilege boundaries.

  Please also check with your CPU / Hardware vendor on updated firmware
  or BIOS images regarding this issue.

  As this feature can have a performance impact, it can be disabled
  using the 'nospec' kernel commandline option.


- CVE-2017-5754 / 'MeltdownAttack': Local attackers on systems with
  modern CPUs featuring deep instruction pipelining could use code
  patterns in userspace to speculative executive code that would read
  otherwise read protected memory, an attack similar to CVE-2017-5753.

  This problem is mitigated by unmapping the Linux Kernel from the user
  address space during user code execution, following a approach called
  'KAISER'. The terms used here are 'KAISER' / 'Kernel Address Isolation'
  and 'PTI' / 'Page Table Isolation'.

  Note that this is only done on affected platforms.

  This feature can be enabled / disabled by the 'pti=[on|off|auto]' or
  'nopti' commandline options.

Also the following unrelated security bugs were fixed:

- CVE-2017-17806: The HMAC implementation (crypto/hmac.c) in the Linux kernel did not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization (bnc#1073874).
- CVE-2017-17805: The Salsa20 encryption algorithm in the Linux kernel did not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable (bnc#1073792).

The following non-security bugs were fixed:

- Add undefine _unique_build_ids (bsc#964063)
- Always sign validate_negotiate_info reqs (bsc#1071009, fate#324404).
- apei / ERST: Fix missing error handling in erst_reader() (bsc#1072556).
- arm: Hide finish_arch_post_lock_switch() from modules (bsc#1068032).
- autofs: fix careless error in recent commit (bnc#1012382 bsc#1065180).
- bpf: prevent speculative execution in eBPF interpreter (bnc#1068032).
- carl9170: prevent speculative execution (bnc#1068032).
- Check cmdline_find_option() retval properly and use boot_cpu_has().
- cw1200: prevent speculative execution (bnc#1068032).
- e1000e: Avoid receiver overrun interrupt bursts (bsc#969470 FATE#319819).
- e1000e: Fix e1000_check_for_copper_link_ich8lan return value (bsc#1073809).
- Fix leak of validate_negotiate_info resp (bsc#1071009, fate#324404).
- Fix NULL pointer deref in SMB2_tcon() (bsc#1071009, fate#324404).
- Fix validate_negotiate_info uninitialized mem (bsc#1071009, fate#324404).
- fs: prevent speculative execution (bnc#1068032).
- genwqe: Take R/W permissions into account when dealing with memory pages (bsc#1073090).
- ibmvnic: Include header descriptor support for ARP packets (bsc#1073912).
- ibmvnic: Increase maximum number of RX/TX queues (bsc#1073912).
- ibmvnic: Rename IBMVNIC_MAX_TX_QUEUES to IBMVNIC_MAX_QUEUES (bsc#1073912).
- ipv6: prevent speculative execution (bnc#1068032).
- kaiser: add 'nokaiser' boot option, using ALTERNATIVE.
- kaiser: align addition to x86/mm/Makefile.
- kaiser: asm/tlbflush.h handle noPGE at lower level.
- kaiser: cleanups while trying for gold link.
- kaiser: Disable on Xen PV.
- kaiser: do not set _PAGE_NX on pgd_none.
- kaiser: drop is_atomic arg to kaiser_pagetable_walk().
- kaiser: enhanced by kernel and user PCIDs.
- kaiser: ENOMEM if kaiser_pagetable_walk() NULL.
- kaiser: fix build and FIXME in alloc_ldt_struct().
- kaiser: fix perf crashes.
- kaiser: fix regs to do_nmi() ifndef CONFIG_KAISER.
- kaiser: fix unlikely error in alloc_ldt_struct().
- kaiser: KAISER depends on SMP.
- kaiser: kaiser_flush_tlb_on_return_to_user() check PCID.
- kaiser: kaiser_remove_mapping() move along the pgd.
- kaiser: Kernel Address Isolation.
- kaiser: load_new_mm_cr3() let SWITCH_USER_CR3 flush.
- kaiser: load_new_mm_cr3() let SWITCH_USER_CR3 flush user.
- kaiser: name that 0x1000 KAISER_SHADOW_PGD_OFFSET.
- kaiser: paranoid_entry pass cr3 need to paranoid_exit.
- kaiser: PCID 0 for kernel and 128 for user.
- kaiser: _pgd_alloc() without __GFP_REPEAT to avoid stalls.
- kaiser: stack map PAGE_SIZE at THREAD_SIZE-PAGE_SIZE.
- kaiser: tidied up asm/kaiser.h somewhat.
- kaiser: tidied up kaiser_add/remove_mapping slightly.
- kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush.
- kaiser: vmstat show NR_KAISERTABLE as nr_overhead.
- kaiser: x86_cr3_pcid_noflush and x86_cr3_pcid_user.
- kvm: SVM: Do not intercept new speculative control MSRs (bsc#1068032).
- kvm: x86: Add speculative control CPUID support for guests (bsc#1068032).
- locking/barriers: introduce new memory barrier gmb() (bnc#1068032).
- mm/mmu_context, sched/core: Fix mmu_context.h assumption (bsc#1068032).
- net: mpls: prevent speculative execution (bnc#1068032).
- nfs: revalidate '.' etc correctly on 'open' (bsc#1068951).
- nfs: revalidate '.' etc correctly on 'open' (git-fixes). Fix References tag.
- nfsv4: always set NFS_LOCK_LOST when a lock is lost (bsc#1068951).
- p54: prevent speculative execution (bnc#1068032).
- powerpc/barrier: add gmb.
- powerpc: Secure memory rfi flush (bsc#1068032).
- ptrace: Add a new thread access check (bsc#1068032).
- qla2xxx: prevent speculative execution (bnc#1068032).
- Redo encryption backport to fix pkt signing (bsc#1071009, fate#324404).
- s390: add ppa to system call and program check path (bsc#1068032).
- s390: introduce CPU alternatives.
- s390: introduce CPU alternatives (bsc#1068032).
- s390/spinlock: add gmb memory barrier
- s390/spinlock: add gmb memory barrier (bsc#1068032).
- s390/spinlock: add ppa to system call path Signoff the s390 patches.
- sched/core: Add switch_mm_irqs_off() and use it in the scheduler (bsc#1068032).
- sched/core: Idle_task_exit() shouldn't use switch_mm_irqs_off() (bsc#1068032).
- scsi_dh_alua: skip RTPG for devices only supporting active/optimized (bsc#1064311).
- scsi_scan: Exit loop if TUR to LUN0 fails with 0x05/0x25 (bsc#1063043). This is specific to FUJITSU ETERNUS_DX* targets. They can return 'Illegal Request - Logical unit not supported' and processing should leave the timeout loop in this case.
- scsi: ses: check return code from ses_recv_diag() (bsc#1039616).
- scsi: ses: Fixup error message 'failed to get diagnostic page 0xffffffea' (bsc#1039616).
- scsi: ses: Fix wrong page error (bsc#1039616).
- scsi: ses: make page2 support optional (bsc#1039616).
- Thermal/int340x: prevent speculative execution (bnc#1068032).
- udf: prevent speculative execution (bnc#1068032).
- Update config files: enable KAISER.
- usb: host: fix incorrect updating of offset (bsc#1047487).
- userns: prevent speculative execution (bnc#1068032).
- uvcvideo: prevent speculative execution (bnc#1068032).
- vxlan: correctly handle ipv6.disable module parameter (bsc#1072962).
- x86/boot: Add early cmdline parsing for options with arguments.
- x86/CPU/AMD: Add speculative control support for AMD (bsc#1068032).
- x86/CPU/AMD: Make the LFENCE instruction serialized (bsc#1068032).
- x86/CPU/AMD: Remove now unused definition of MFENCE_RDTSC feature (bsc#1068032).
- x86/CPU: Check speculation control CPUID bit (bsc#1068032).
- x86/enter: Add macros to set/clear IBRS and set IBPB (bsc#1068032).
- x86/entry: Add a function to overwrite the RSB (bsc#1068032).
- x86/entry: Stuff RSB for entry to kernel for non-SMEP platform (bsc#1068032).
- x86/entry: Use IBRS on entry to kernel space (bsc#1068032).
- x86/feature: Enable the x86 feature to control Speculation (bsc#1068032).
- x86/idle: Disable IBRS when offlining a CPU and re-enable on wakeup (bsc#1068032).
- x86/idle: Toggle IBRS when going idle (bsc#1068032).
- x86/kaiser: Check boottime cmdline params.
- x86/kaiser: Move feature detection up (bsc#1068032).
- x86/kaiser: Reenable PARAVIRT.
- x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling.
- x86/kvm: Add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm (bsc#1068032).
- x86/kvm: Flush IBP when switching VMs (bsc#1068032).
- x86/kvm: Pad RSB on VM transition (bsc#1068032).
- x86/kvm: Toggle IBRS on VM entry and exit (bsc#1068032).
- x86/mm/64: Fix reboot interaction with CR4.PCIDE (bsc#1068032).
- x86/mm: Add a 'noinvpcid' boot option to turn off INVPCID (bsc#1068032).
- x86/mm: Add INVPCID helpers (bsc#1068032).
- x86/mm: Add the 'nopcid' boot option to turn off PCID (bsc#1068032).
- x86/mm: Build arch/x86/mm/tlb.c even on !SMP (bsc#1068032).
- x86/mm: Enable CR4.PCIDE on supported systems (bsc#1068032).
- x86/mm: Fix INVPCID asm constraint (bsc#1068032).
- x86/mm: If INVPCID is available, use it to flush global mappings (bsc#1068032).
- x86/mm: Make flush_tlb_mm_range() more predictable (bsc#1068032).
- x86/mm: Only set IBPB when the new thread cannot ptrace current thread (bsc#1068032).
- x86/mm: Reimplement flush_tlb_page() using flush_tlb_mm_range() (bsc#1068032).
- x86/mm: Remove flush_tlb() and flush_tlb_current_task() (bsc#1068032).
- x86/mm: Remove the UP asm/tlbflush.h code, always use the (formerly) SMP code (bsc#1068032).
- x86/mm, sched/core: Turn off IRQs in switch_mm() (bsc#1068032).
- x86/mm, sched/core: Uninline switch_mm() (bsc#1068032).
- x86/mm: Set IBPB upon context switch (bsc#1068032).
- x86/MSR: Move native_*msr(.. u64) to msr.h (bsc#1068032).
- x86/paravirt: Dont patch flush_tlb_single (bsc#1068032).
- x86/spec: Add IBRS control functions (bsc#1068032).
- x86/spec: Add 'nospec' chicken bit (bsc#1068032).
- x86/spec: Check CPUID direclty post microcode reload to support IBPB feature (bsc#1068032).
- x86/spec_ctrl: Add an Indirect Branch Predictor barrier (bsc#1068032).
- x86/spec_ctrl: Check whether IBPB is enabled before using it (bsc#1068032).
- x86/spec_ctrl: Check whether IBRS is enabled before using it (bsc#1068032).
- x86/svm: Add code to clear registers on VM exit (bsc#1068032).
- x86/svm: Clobber the RSB on VM exit (bsc#1068032).
- x86/svm: Set IBPB when running a different VCPU (bsc#1068032).
- x86/svm: Set IBRS value on VM entry and exit (bsc#1068032).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039616">SUSE bug 1039616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047487">SUSE bug 1047487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063043">SUSE bug 1063043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064311">SUSE bug 1064311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065180">SUSE bug 1065180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068951">SUSE bug 1068951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071009">SUSE bug 1071009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072556">SUSE bug 1072556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072962">SUSE bug 1072962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073090">SUSE bug 1073090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073792">SUSE bug 1073792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073809">SUSE bug 1073809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073874">SUSE bug 1073874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073912">SUSE bug 1073912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964063">SUSE bug 964063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969470">SUSE bug 969470</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17805/">CVE-2017-17805</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17806/">CVE-2017-17806</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518756" comment="kernel-default-4.4.103-92.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518757" comment="kernel-default-devel-4.4.103-92.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518758" comment="kernel-default-extra-4.4.103-92.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518759" comment="kernel-devel-4.4.103-92.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518760" comment="kernel-macros-4.4.103-92.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518761" comment="kernel-source-4.4.103-92.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518762" comment="kernel-syms-4.4.103-92.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78089" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1076503" ref_url="https://bugzilla.suse.com/1076503" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5764" ref_url="https://www.suse.com/security/cve/CVE-2018-5764/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003619.html" source="SUSE-SU"/>
		<description>
This update for rsync fixes one issues.

This security issue was fixed:

- CVE-2018-5764: The parse_arguments function in options.c did not prevent
  multiple --protect-args uses, which allowed remote attackers to bypass an
  argument-sanitization protection mechanism (bsc#1076503).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-22"/>
	<updated date="2018-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076503">SUSE bug 1076503</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5764/">CVE-2018-5764</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518763" comment="rsync-3.1.0-13.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78090" version="1" class="patch">
	<metadata>
		<title>Security update for procmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1068648" ref_url="https://bugzilla.suse.com/1068648" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16844" ref_url="https://www.suse.com/security/cve/CVE-2017-16844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003618.html" source="SUSE-SU"/>
		<description>
This update for procmail fixes the following issues:

- CVE-2017-16844: Heap-based buffer overflow in loadbuf function could lead to remote denial of service (bsc#1068648)
  
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-22"/>
	<updated date="2018-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068648">SUSE bug 1068648</bugzilla>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16844/">CVE-2017-16844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518764" comment="procmail-3.22-269.3.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78091" version="1" class="patch">
	<metadata>
		<title>Security update for libvpx (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1075992" ref_url="https://bugzilla.suse.com/1075992" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13194" ref_url="https://www.suse.com/security/cve/CVE-2017-13194/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003623.html" source="SUSE-SU"/>
		<description>
This update for libvpx fixes one issues.

This security issue was fixed: 

- CVE-2017-13194: Fixed incorrect memory allocation related to odd frame width (bsc#1075992).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-23"/>
	<updated date="2018-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1075992">SUSE bug 1075992</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13194/">CVE-2017-13194</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518765" comment="libvpx1-1.3.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518766" comment="libvpx1-32bit-1.3.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518767" comment="vpx-tools-1.3.0-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78092" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1074171" ref_url="https://bugzilla.suse.com/1074171" source="BUGZILLA"/>
		<reference ref_id="1075737" ref_url="https://bugzilla.suse.com/1075737" source="BUGZILLA"/>
		<reference ref_id="1075738" ref_url="https://bugzilla.suse.com/1075738" source="BUGZILLA"/>
		<reference ref_id="1075739" ref_url="https://bugzilla.suse.com/1075739" source="BUGZILLA"/>
		<reference ref_id="1075748" ref_url="https://bugzilla.suse.com/1075748" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17935" ref_url="https://www.suse.com/security/cve/CVE-2017-17935/" source="CVE"/>
		<reference ref_id="CVE-2018-5334" ref_url="https://www.suse.com/security/cve/CVE-2018-5334/" source="CVE"/>
		<reference ref_id="CVE-2018-5335" ref_url="https://www.suse.com/security/cve/CVE-2018-5335/" source="CVE"/>
		<reference ref_id="CVE-2018-5336" ref_url="https://www.suse.com/security/cve/CVE-2018-5336/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003624.html" source="SUSE-SU"/>
		<description>
This update for wireshark to version 2.2.12 fixes the following issues:

- CVE-2018-5334: IxVeriWave file could crash (bsc#1075737)
- CVE-2018-5335: WCP dissector could crash (bsc#1075738)
- CVE-2018-5336: Multiple dissector crashes (bsc#1075739)
- CVE-2017-17935: Incorrect handling of '\n' in file_read_line function could
  have lead to denial of service (bsc#1074171)

This release no longer enables the Linux kernel BPF JIT compiler via the
net.core.bpf_jit_enable sysctl, as this would make systems more vulnerable
to Spectre variant 1 CVE-2017-5753 - (bsc#1075748)

Further bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-2.2.12.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-24"/>
	<updated date="2018-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074171">SUSE bug 1074171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075737">SUSE bug 1075737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075738">SUSE bug 1075738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075739">SUSE bug 1075739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075748">SUSE bug 1075748</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17935/">CVE-2017-17935</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5334/">CVE-2018-5334</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5335/">CVE-2018-5335</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5336/">CVE-2018-5336</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518768" comment="libwireshark8-2.2.12-48.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518769" comment="libwiretap6-2.2.12-48.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518770" comment="libwscodecs1-2.2.12-48.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518771" comment="libwsutil7-2.2.12-48.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518772" comment="wireshark-2.2.12-48.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518773" comment="wireshark-gtk-2.2.12-48.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78093" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1055857" ref_url="https://bugzilla.suse.com/1055857" source="BUGZILLA"/>
		<reference ref_id="1059893" ref_url="https://bugzilla.suse.com/1059893" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6328" ref_url="https://www.suse.com/security/cve/CVE-2016-6328/" source="CVE"/>
		<reference ref_id="CVE-2017-7544" ref_url="https://www.suse.com/security/cve/CVE-2017-7544/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003625.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes several issues.

These security issues were fixed:

- CVE-2016-6328: Fixed integer overflow in parsing MNOTE entry data of the input
  file (bsc#1055857)
- CVE-2017-7544: Fixed out-of-bounds heap read vulnerability in
  exif_data_save_data_entry function in libexif/exif-data.c caused by improper
  length computation of the allocated data of an ExifMnote entry which can cause
  denial-of-service or possibly information disclosure (bsc#1059893)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-24"/>
	<updated date="2018-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1055857">SUSE bug 1055857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059893">SUSE bug 1059893</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-6328/">CVE-2016-6328</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7544/">CVE-2017-7544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518774" comment="libexif12-0.6.21-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518775" comment="libexif12-32bit-0.6.21-8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78094" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1052460" ref_url="https://bugzilla.suse.com/1052460" source="BUGZILLA"/>
		<reference ref_id="1055053" ref_url="https://bugzilla.suse.com/1055053" source="BUGZILLA"/>
		<reference ref_id="1055063" ref_url="https://bugzilla.suse.com/1055063" source="BUGZILLA"/>
		<reference ref_id="1056550" ref_url="https://bugzilla.suse.com/1056550" source="BUGZILLA"/>
		<reference ref_id="1057723" ref_url="https://bugzilla.suse.com/1057723" source="BUGZILLA"/>
		<reference ref_id="1058422" ref_url="https://bugzilla.suse.com/1058422" source="BUGZILLA"/>
		<reference ref_id="1063049" ref_url="https://bugzilla.suse.com/1063049" source="BUGZILLA"/>
		<reference ref_id="1063050" ref_url="https://bugzilla.suse.com/1063050" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12563" ref_url="https://www.suse.com/security/cve/CVE-2017-12563/" source="CVE"/>
		<reference ref_id="CVE-2017-12691" ref_url="https://www.suse.com/security/cve/CVE-2017-12691/" source="CVE"/>
		<reference ref_id="CVE-2017-13061" ref_url="https://www.suse.com/security/cve/CVE-2017-13061/" source="CVE"/>
		<reference ref_id="CVE-2017-13062" ref_url="https://www.suse.com/security/cve/CVE-2017-13062/" source="CVE"/>
		<reference ref_id="CVE-2017-14042" ref_url="https://www.suse.com/security/cve/CVE-2017-14042/" source="CVE"/>
		<reference ref_id="CVE-2017-14174" ref_url="https://www.suse.com/security/cve/CVE-2017-14174/" source="CVE"/>
		<reference ref_id="CVE-2017-14343" ref_url="https://www.suse.com/security/cve/CVE-2017-14343/" source="CVE"/>
		<reference ref_id="CVE-2017-15277" ref_url="https://www.suse.com/security/cve/CVE-2017-15277/" source="CVE"/>
		<reference ref_id="CVE-2017-15281" ref_url="https://www.suse.com/security/cve/CVE-2017-15281/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00010.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- security update (xcf.c):
  * CVE-2017-14343: Memory leak vulnerability in ReadXCFImage could lead to denial of service via a crafted file.
    CVE-2017-12691: The ReadOneLayer function in coders/xcf.c allows remote attackers to cause a denial of service 
    (memory consumption) via a crafted file.
    [bsc#1058422]

- security update (pnm.c):
  * CVE-2017-14042: A memory allocation failure was discovered in the ReadPNMImage function in coders/pnm.c and 
    could lead to remote denial of service [bsc#1056550]

- security update (psd.c):
  * CVE-2017-15281: ReadPSDImage allows remote attackers to cause a denial of service (application crash) or 
    possibly have unspecified other impact via a crafted file [bsc#1063049]
  * CVE-2017-13061: A length-validation vulnerability was found in the function ReadPSDLayersInternal in coders/psd.c, 
    which allows attackers to cause a denial of service (ReadPSDImage memory exhaustion) via a crafted file. [bsc#1055063]
  * CVE-2017-12563: A Memory exhaustion vulnerability was found in the function ReadPSDImage in coders/psd.c, 
    which allows attackers to cause a denial of service. [bsc#1052460]
  * CVE-2017-14174: Due to a lack of an EOF check (End of File) in ReadPSDLayersInternal could cause huge CPU consumption, 
    when a crafted PSD file, which claims a large 'length' field in the header but does not contain sufficient backing data, 
    is provided, the loop over \'length\' would consume huge CPU resources, since there is no EOF check inside the loop.[bsc#1057723]

- security update (meta.c):
  * CVE-2017-13062: Amemory leak vulnerability was found in the function formatIPTC in coders/meta.c, 
    which allows attackers to cause a denial of service (WriteMETAImage memory consumption) via a crafted file [bsc#1055053]

- security update (gif.c):
  * CVE-2017-15277: ReadGIFImage in coders/gif.c leaves the palette uninitialized when processing a GIF file that has neither 
    a global nor local palette. If the affected product is used as a library loaded into a process that operates on interesting 
    data, this data sometimes can be leaked via the uninitialized palette.[bsc#1063050]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1052460">SUSE bug 1052460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055053">SUSE bug 1055053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055063">SUSE bug 1055063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056550">SUSE bug 1056550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057723">SUSE bug 1057723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058422">SUSE bug 1058422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063049">SUSE bug 1063049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063050">SUSE bug 1063050</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12563/">CVE-2017-12563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12691/">CVE-2017-12691</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13061/">CVE-2017-13061</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13062/">CVE-2017-13062</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14042/">CVE-2017-14042</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14174/">CVE-2017-14174</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14343/">CVE-2017-14343</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15277/">CVE-2017-15277</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15281/">CVE-2017-15281</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518776" comment="ImageMagick-6.8.8.1-71.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518777" comment="libMagick++-6_Q16-3-6.8.8.1-71.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518778" comment="libMagickCore-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518779" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518780" comment="libMagickWand-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78095" version="1" class="patch">
	<metadata>
		<title>Security update for libevent (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1022917" ref_url="https://bugzilla.suse.com/1022917" source="BUGZILLA"/>
		<reference ref_id="1022918" ref_url="https://bugzilla.suse.com/1022918" source="BUGZILLA"/>
		<reference ref_id="1022919" ref_url="https://bugzilla.suse.com/1022919" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10195" ref_url="https://www.suse.com/security/cve/CVE-2016-10195/" source="CVE"/>
		<reference ref_id="CVE-2016-10196" ref_url="https://www.suse.com/security/cve/CVE-2016-10196/" source="CVE"/>
		<reference ref_id="CVE-2016-10197" ref_url="https://www.suse.com/security/cve/CVE-2016-10197/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003628.html" source="SUSE-SU"/>
		<description>
This update for libevent fixes the following security issues:

- CVE-2016-10195: DNS remote stack overread vulnerability (bsc#1022917) 
- CVE-2016-10196: stack/buffer overflow in evutil_parse_sockaddr_port() (bsc#1022918) 
- CVE-2016-10197: out-of-bounds read in search_make_new() (bsc#1022919) 
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-24"/>
	<updated date="2018-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022917">SUSE bug 1022917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022918">SUSE bug 1022918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022919">SUSE bug 1022919</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10195/">CVE-2016-10195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10196/">CVE-2016-10196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10197/">CVE-2016-10197</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518781" comment="libevent-2_0-5-2.0.21-6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78096" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1077001" ref_url="https://bugzilla.suse.com/1077001" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000007" ref_url="https://www.suse.com/security/cve/CVE-2018-1000007/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003632.html" source="SUSE-SU"/>
		<description>
This update for curl fixes one issues.

This security issue was fixed:

- CVE-2018-1000007: Prevent leaking authentication data to third parties when following redirects (bsc#1077001)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-25"/>
	<updated date="2018-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077001">SUSE bug 1077001</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000007/">CVE-2018-1000007</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518782" comment="curl-7.37.0-37.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518783" comment="libcurl4-7.37.0-37.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518784" comment="libcurl4-32bit-7.37.0-37.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78097" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1059809" ref_url="https://bugzilla.suse.com/1059809" source="BUGZILLA"/>
		<reference ref_id="1059811" ref_url="https://bugzilla.suse.com/1059811" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14632" ref_url="https://www.suse.com/security/cve/CVE-2017-14632/" source="CVE"/>
		<reference ref_id="CVE-2017-14633" ref_url="https://www.suse.com/security/cve/CVE-2017-14633/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003567.html" source="SUSE-SU"/>
		<description>
This update for libvorbis fixes the following issues:

- CVE-2017-14633: out-of-bounds array read vulnerability exists in
  function mapping0_forward() could lead to remote denial of service (bsc#1059811)
- CVE-2017-14632: Remote Code Execution upon freeing uninitialized
  memory in function vorbis_analysis_headerout(bsc#1059809)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1059809">SUSE bug 1059809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059811">SUSE bug 1059811</bugzilla>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14632/">CVE-2017-14632</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14633/">CVE-2017-14633</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518785" comment="libvorbis0-1.3.3-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518786" comment="libvorbis0-32bit-1.3.3-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518787" comment="libvorbisenc2-1.3.3-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518788" comment="libvorbisenc2-32bit-1.3.3-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518789" comment="libvorbisfile3-1.3.3-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518790" comment="libvorbisfile3-32bit-1.3.3-10.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78098" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1020950" ref_url="https://bugzilla.suse.com/1020950" source="BUGZILLA"/>
		<reference ref_id="1024749" ref_url="https://bugzilla.suse.com/1024749" source="BUGZILLA"/>
		<reference ref_id="1050469" ref_url="https://bugzilla.suse.com/1050469" source="BUGZILLA"/>
		<reference ref_id="1066892" ref_url="https://bugzilla.suse.com/1066892" source="BUGZILLA"/>
		<reference ref_id="1069925" ref_url="https://bugzilla.suse.com/1069925" source="BUGZILLA"/>
		<reference ref_id="1073654" ref_url="https://bugzilla.suse.com/1073654" source="BUGZILLA"/>
		<reference ref_id="1075419" ref_url="https://bugzilla.suse.com/1075419" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4692" ref_url="https://www.suse.com/security/cve/CVE-2016-4692/" source="CVE"/>
		<reference ref_id="CVE-2016-4743" ref_url="https://www.suse.com/security/cve/CVE-2016-4743/" source="CVE"/>
		<reference ref_id="CVE-2016-7586" ref_url="https://www.suse.com/security/cve/CVE-2016-7586/" source="CVE"/>
		<reference ref_id="CVE-2016-7587" ref_url="https://www.suse.com/security/cve/CVE-2016-7587/" source="CVE"/>
		<reference ref_id="CVE-2016-7589" ref_url="https://www.suse.com/security/cve/CVE-2016-7589/" source="CVE"/>
		<reference ref_id="CVE-2016-7592" ref_url="https://www.suse.com/security/cve/CVE-2016-7592/" source="CVE"/>
		<reference ref_id="CVE-2016-7598" ref_url="https://www.suse.com/security/cve/CVE-2016-7598/" source="CVE"/>
		<reference ref_id="CVE-2016-7599" ref_url="https://www.suse.com/security/cve/CVE-2016-7599/" source="CVE"/>
		<reference ref_id="CVE-2016-7610" ref_url="https://www.suse.com/security/cve/CVE-2016-7610/" source="CVE"/>
		<reference ref_id="CVE-2016-7623" ref_url="https://www.suse.com/security/cve/CVE-2016-7623/" source="CVE"/>
		<reference ref_id="CVE-2016-7632" ref_url="https://www.suse.com/security/cve/CVE-2016-7632/" source="CVE"/>
		<reference ref_id="CVE-2016-7635" ref_url="https://www.suse.com/security/cve/CVE-2016-7635/" source="CVE"/>
		<reference ref_id="CVE-2016-7639" ref_url="https://www.suse.com/security/cve/CVE-2016-7639/" source="CVE"/>
		<reference ref_id="CVE-2016-7641" ref_url="https://www.suse.com/security/cve/CVE-2016-7641/" source="CVE"/>
		<reference ref_id="CVE-2016-7645" ref_url="https://www.suse.com/security/cve/CVE-2016-7645/" source="CVE"/>
		<reference ref_id="CVE-2016-7652" ref_url="https://www.suse.com/security/cve/CVE-2016-7652/" source="CVE"/>
		<reference ref_id="CVE-2016-7654" ref_url="https://www.suse.com/security/cve/CVE-2016-7654/" source="CVE"/>
		<reference ref_id="CVE-2016-7656" ref_url="https://www.suse.com/security/cve/CVE-2016-7656/" source="CVE"/>
		<reference ref_id="CVE-2017-13788" ref_url="https://www.suse.com/security/cve/CVE-2017-13788/" source="CVE"/>
		<reference ref_id="CVE-2017-13798" ref_url="https://www.suse.com/security/cve/CVE-2017-13798/" source="CVE"/>
		<reference ref_id="CVE-2017-13803" ref_url="https://www.suse.com/security/cve/CVE-2017-13803/" source="CVE"/>
		<reference ref_id="CVE-2017-13856" ref_url="https://www.suse.com/security/cve/CVE-2017-13856/" source="CVE"/>
		<reference ref_id="CVE-2017-13866" ref_url="https://www.suse.com/security/cve/CVE-2017-13866/" source="CVE"/>
		<reference ref_id="CVE-2017-13870" ref_url="https://www.suse.com/security/cve/CVE-2017-13870/" source="CVE"/>
		<reference ref_id="CVE-2017-2350" ref_url="https://www.suse.com/security/cve/CVE-2017-2350/" source="CVE"/>
		<reference ref_id="CVE-2017-2354" ref_url="https://www.suse.com/security/cve/CVE-2017-2354/" source="CVE"/>
		<reference ref_id="CVE-2017-2355" ref_url="https://www.suse.com/security/cve/CVE-2017-2355/" source="CVE"/>
		<reference ref_id="CVE-2017-2356" ref_url="https://www.suse.com/security/cve/CVE-2017-2356/" source="CVE"/>
		<reference ref_id="CVE-2017-2362" ref_url="https://www.suse.com/security/cve/CVE-2017-2362/" source="CVE"/>
		<reference ref_id="CVE-2017-2363" ref_url="https://www.suse.com/security/cve/CVE-2017-2363/" source="CVE"/>
		<reference ref_id="CVE-2017-2364" ref_url="https://www.suse.com/security/cve/CVE-2017-2364/" source="CVE"/>
		<reference ref_id="CVE-2017-2365" ref_url="https://www.suse.com/security/cve/CVE-2017-2365/" source="CVE"/>
		<reference ref_id="CVE-2017-2366" ref_url="https://www.suse.com/security/cve/CVE-2017-2366/" source="CVE"/>
		<reference ref_id="CVE-2017-2369" ref_url="https://www.suse.com/security/cve/CVE-2017-2369/" source="CVE"/>
		<reference ref_id="CVE-2017-2371" ref_url="https://www.suse.com/security/cve/CVE-2017-2371/" source="CVE"/>
		<reference ref_id="CVE-2017-2373" ref_url="https://www.suse.com/security/cve/CVE-2017-2373/" source="CVE"/>
		<reference ref_id="CVE-2017-2496" ref_url="https://www.suse.com/security/cve/CVE-2017-2496/" source="CVE"/>
		<reference ref_id="CVE-2017-2510" ref_url="https://www.suse.com/security/cve/CVE-2017-2510/" source="CVE"/>
		<reference ref_id="CVE-2017-2539" ref_url="https://www.suse.com/security/cve/CVE-2017-2539/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2017-7006" ref_url="https://www.suse.com/security/cve/CVE-2017-7006/" source="CVE"/>
		<reference ref_id="CVE-2017-7011" ref_url="https://www.suse.com/security/cve/CVE-2017-7011/" source="CVE"/>
		<reference ref_id="CVE-2017-7012" ref_url="https://www.suse.com/security/cve/CVE-2017-7012/" source="CVE"/>
		<reference ref_id="CVE-2017-7018" ref_url="https://www.suse.com/security/cve/CVE-2017-7018/" source="CVE"/>
		<reference ref_id="CVE-2017-7019" ref_url="https://www.suse.com/security/cve/CVE-2017-7019/" source="CVE"/>
		<reference ref_id="CVE-2017-7020" ref_url="https://www.suse.com/security/cve/CVE-2017-7020/" source="CVE"/>
		<reference ref_id="CVE-2017-7030" ref_url="https://www.suse.com/security/cve/CVE-2017-7030/" source="CVE"/>
		<reference ref_id="CVE-2017-7034" ref_url="https://www.suse.com/security/cve/CVE-2017-7034/" source="CVE"/>
		<reference ref_id="CVE-2017-7037" ref_url="https://www.suse.com/security/cve/CVE-2017-7037/" source="CVE"/>
		<reference ref_id="CVE-2017-7038" ref_url="https://www.suse.com/security/cve/CVE-2017-7038/" source="CVE"/>
		<reference ref_id="CVE-2017-7039" ref_url="https://www.suse.com/security/cve/CVE-2017-7039/" source="CVE"/>
		<reference ref_id="CVE-2017-7040" ref_url="https://www.suse.com/security/cve/CVE-2017-7040/" source="CVE"/>
		<reference ref_id="CVE-2017-7041" ref_url="https://www.suse.com/security/cve/CVE-2017-7041/" source="CVE"/>
		<reference ref_id="CVE-2017-7042" ref_url="https://www.suse.com/security/cve/CVE-2017-7042/" source="CVE"/>
		<reference ref_id="CVE-2017-7043" ref_url="https://www.suse.com/security/cve/CVE-2017-7043/" source="CVE"/>
		<reference ref_id="CVE-2017-7046" ref_url="https://www.suse.com/security/cve/CVE-2017-7046/" source="CVE"/>
		<reference ref_id="CVE-2017-7048" ref_url="https://www.suse.com/security/cve/CVE-2017-7048/" source="CVE"/>
		<reference ref_id="CVE-2017-7049" ref_url="https://www.suse.com/security/cve/CVE-2017-7049/" source="CVE"/>
		<reference ref_id="CVE-2017-7052" ref_url="https://www.suse.com/security/cve/CVE-2017-7052/" source="CVE"/>
		<reference ref_id="CVE-2017-7055" ref_url="https://www.suse.com/security/cve/CVE-2017-7055/" source="CVE"/>
		<reference ref_id="CVE-2017-7056" ref_url="https://www.suse.com/security/cve/CVE-2017-7056/" source="CVE"/>
		<reference ref_id="CVE-2017-7059" ref_url="https://www.suse.com/security/cve/CVE-2017-7059/" source="CVE"/>
		<reference ref_id="CVE-2017-7061" ref_url="https://www.suse.com/security/cve/CVE-2017-7061/" source="CVE"/>
		<reference ref_id="CVE-2017-7064" ref_url="https://www.suse.com/security/cve/CVE-2017-7064/" source="CVE"/>
		<reference ref_id="CVE-2017-7081" ref_url="https://www.suse.com/security/cve/CVE-2017-7081/" source="CVE"/>
		<reference ref_id="CVE-2017-7087" ref_url="https://www.suse.com/security/cve/CVE-2017-7087/" source="CVE"/>
		<reference ref_id="CVE-2017-7089" ref_url="https://www.suse.com/security/cve/CVE-2017-7089/" source="CVE"/>
		<reference ref_id="CVE-2017-7090" ref_url="https://www.suse.com/security/cve/CVE-2017-7090/" source="CVE"/>
		<reference ref_id="CVE-2017-7091" ref_url="https://www.suse.com/security/cve/CVE-2017-7091/" source="CVE"/>
		<reference ref_id="CVE-2017-7092" ref_url="https://www.suse.com/security/cve/CVE-2017-7092/" source="CVE"/>
		<reference ref_id="CVE-2017-7093" ref_url="https://www.suse.com/security/cve/CVE-2017-7093/" source="CVE"/>
		<reference ref_id="CVE-2017-7094" ref_url="https://www.suse.com/security/cve/CVE-2017-7094/" source="CVE"/>
		<reference ref_id="CVE-2017-7095" ref_url="https://www.suse.com/security/cve/CVE-2017-7095/" source="CVE"/>
		<reference ref_id="CVE-2017-7096" ref_url="https://www.suse.com/security/cve/CVE-2017-7096/" source="CVE"/>
		<reference ref_id="CVE-2017-7098" ref_url="https://www.suse.com/security/cve/CVE-2017-7098/" source="CVE"/>
		<reference ref_id="CVE-2017-7099" ref_url="https://www.suse.com/security/cve/CVE-2017-7099/" source="CVE"/>
		<reference ref_id="CVE-2017-7100" ref_url="https://www.suse.com/security/cve/CVE-2017-7100/" source="CVE"/>
		<reference ref_id="CVE-2017-7102" ref_url="https://www.suse.com/security/cve/CVE-2017-7102/" source="CVE"/>
		<reference ref_id="CVE-2017-7104" ref_url="https://www.suse.com/security/cve/CVE-2017-7104/" source="CVE"/>
		<reference ref_id="CVE-2017-7107" ref_url="https://www.suse.com/security/cve/CVE-2017-7107/" source="CVE"/>
		<reference ref_id="CVE-2017-7109" ref_url="https://www.suse.com/security/cve/CVE-2017-7109/" source="CVE"/>
		<reference ref_id="CVE-2017-7111" ref_url="https://www.suse.com/security/cve/CVE-2017-7111/" source="CVE"/>
		<reference ref_id="CVE-2017-7117" ref_url="https://www.suse.com/security/cve/CVE-2017-7117/" source="CVE"/>
		<reference ref_id="CVE-2017-7120" ref_url="https://www.suse.com/security/cve/CVE-2017-7120/" source="CVE"/>
		<reference ref_id="CVE-2017-7142" ref_url="https://www.suse.com/security/cve/CVE-2017-7142/" source="CVE"/>
		<reference ref_id="CVE-2017-7156" ref_url="https://www.suse.com/security/cve/CVE-2017-7156/" source="CVE"/>
		<reference ref_id="CVE-2017-7157" ref_url="https://www.suse.com/security/cve/CVE-2017-7157/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<description>


This update for webkit2gtk3 fixes the following issues:

Update to version 2.18.5:

  + Disable SharedArrayBuffers from Web API.
  + Reduce the precision of 'high' resolution time to 1ms.
  + bsc#1075419 - Security fixes: includes improvements to mitigate
    the effects of Spectre and Meltdown (CVE-2017-5753 and CVE-2017-5715).

Update to version 2.18.4:

  + Make WebDriver implementation more spec compliant.
  + Fix a bug when trying to remove cookies before a web process is
    spawned.
  + WebKitWebDriver process no longer links to
    libjavascriptcoregtk.
  + Fix several memory leaks in GStreamer media backend.
  + bsc#1073654 - Security fixes: CVE-2017-13866, CVE-2017-13870,
    CVE-2017-7156, CVE-2017-13856.

Update to version 2.18.3:

  + Improve calculation of font metrics to prevent scrollbars from
    being shown unnecessarily in some cases.
  + Fix handling of null capabilities in WebDriver implementation.
  + Security fixes: CVE-2017-13798, CVE-2017-13788, CVE-2017-13803.

Update to version 2.18.2:

  + Fix rendering of arabic text.
  + Fix a crash in the web process when decoding GIF images.
  + Fix rendering of wind in Windy.com.
  + Fix several crashes and rendering issues.

Update to version 2.18.1:

  + Improve performance of GIF animations.
  + Fix garbled display in GMail.
  + Fix rendering of several material design icons when using the
    web font.
  + Fix flickering when resizing the window in Wayland.
  + Prevent default kerberos authentication credentials from being
    used in ephemeral sessions.
  + Fix a crash when webkit_web_resource_get_data() is cancelled.
  + Correctly handle touchmove and touchend events in
    WebKitWebView.
  + Fix the build with enchant 2.1.1.
  + Fix the build in HPPA and Alpha.
  + Fix several crashes and rendering issues.
  + Security fixes: CVE-2017-7081, CVE-2017-7087, CVE-2017-7089,
    CVE-2017-7090, CVE-2017-7091, CVE-2017-7092, CVE-2017-7093,
    CVE-2017-7094, CVE-2017-7095, CVE-2017-7096, CVE-2017-7098,
    CVE-2017-7099, CVE-2017-7100, CVE-2017-7102, CVE-2017-7104,
    CVE-2017-7107, CVE-2017-7109, CVE-2017-7111, CVE-2017-7117,
    CVE-2017-7120, CVE-2017-7142.

- Enable gold linker on s390/s390x on SLE15/Tumbleweed.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-25"/>
	<updated date="2018-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024749">SUSE bug 1024749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069925">SUSE bug 1069925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073654">SUSE bug 1073654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075419">SUSE bug 1075419</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4692/">CVE-2016-4692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4743/">CVE-2016-4743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7586/">CVE-2016-7586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7587/">CVE-2016-7587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7589/">CVE-2016-7589</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7592/">CVE-2016-7592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7598/">CVE-2016-7598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7599/">CVE-2016-7599</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7610/">CVE-2016-7610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7623/">CVE-2016-7623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7632/">CVE-2016-7632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7635/">CVE-2016-7635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7639/">CVE-2016-7639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7641/">CVE-2016-7641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7645/">CVE-2016-7645</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7652/">CVE-2016-7652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7654/">CVE-2016-7654</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7656/">CVE-2016-7656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13788/">CVE-2017-13788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13798/">CVE-2017-13798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13803/">CVE-2017-13803</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13856/">CVE-2017-13856</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13866/">CVE-2017-13866</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13870/">CVE-2017-13870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2350/">CVE-2017-2350</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2354/">CVE-2017-2354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2355/">CVE-2017-2355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2356/">CVE-2017-2356</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2362/">CVE-2017-2362</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2363/">CVE-2017-2363</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2364/">CVE-2017-2364</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2365/">CVE-2017-2365</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2366/">CVE-2017-2366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2369/">CVE-2017-2369</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2371/">CVE-2017-2371</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2373/">CVE-2017-2373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2496/">CVE-2017-2496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2510/">CVE-2017-2510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2539/">CVE-2017-2539</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7006/">CVE-2017-7006</cve>
	<cve impact="critical" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7011/">CVE-2017-7011</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7012/">CVE-2017-7012</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7018/">CVE-2017-7018</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7019/">CVE-2017-7019</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7020/">CVE-2017-7020</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7030/">CVE-2017-7030</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7034/">CVE-2017-7034</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7037/">CVE-2017-7037</cve>
	<cve impact="critical" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7038/">CVE-2017-7038</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7039/">CVE-2017-7039</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7040/">CVE-2017-7040</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7041/">CVE-2017-7041</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7042/">CVE-2017-7042</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7043/">CVE-2017-7043</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7046/">CVE-2017-7046</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7048/">CVE-2017-7048</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7049/">CVE-2017-7049</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7052/">CVE-2017-7052</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7055/">CVE-2017-7055</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7056/">CVE-2017-7056</cve>
	<cve impact="critical" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7059/">CVE-2017-7059</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7061/">CVE-2017-7061</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7064/">CVE-2017-7064</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7081/">CVE-2017-7081</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7087/">CVE-2017-7087</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7089/">CVE-2017-7089</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7090/">CVE-2017-7090</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7091/">CVE-2017-7091</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7092/">CVE-2017-7092</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7093/">CVE-2017-7093</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7094/">CVE-2017-7094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7095/">CVE-2017-7095</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7096/">CVE-2017-7096</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7098/">CVE-2017-7098</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7099/">CVE-2017-7099</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7100/">CVE-2017-7100</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7102/">CVE-2017-7102</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7104/">CVE-2017-7104</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7107/">CVE-2017-7107</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7109/">CVE-2017-7109</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7111/">CVE-2017-7111</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7117/">CVE-2017-7117</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7120/">CVE-2017-7120</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7142/">CVE-2017-7142</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7156/">CVE-2017-7156</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7157/">CVE-2017-7157</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78099" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1069257" ref_url="https://bugzilla.suse.com/1069257" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16899" ref_url="https://www.suse.com/security/cve/CVE-2017-16899/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003635.html" source="SUSE-SU"/>
		<description>
This update for transfig fixes the following issues:

Security issue fixed:

- CVE-2017-16899: Fix array index error in the fig2dev program (bsc#1069257).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1069257">SUSE bug 1069257</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16899/">CVE-2017-16899</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518797" comment="transfig-3.2.5e-2.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78100" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1040662" ref_url="https://bugzilla.suse.com/1040662" source="BUGZILLA"/>
		<reference ref_id="1049423" ref_url="https://bugzilla.suse.com/1049423" source="BUGZILLA"/>
		<reference ref_id="1052448" ref_url="https://bugzilla.suse.com/1052448" source="BUGZILLA"/>
		<reference ref_id="1052449" ref_url="https://bugzilla.suse.com/1052449" source="BUGZILLA"/>
		<reference ref_id="1052466" ref_url="https://bugzilla.suse.com/1052466" source="BUGZILLA"/>
		<reference ref_id="1077732" ref_url="https://bugzilla.suse.com/1077732" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423/" source="CVE"/>
		<reference ref_id="CVE-2017-12374" ref_url="https://www.suse.com/security/cve/CVE-2017-12374/" source="CVE"/>
		<reference ref_id="CVE-2017-12375" ref_url="https://www.suse.com/security/cve/CVE-2017-12375/" source="CVE"/>
		<reference ref_id="CVE-2017-12376" ref_url="https://www.suse.com/security/cve/CVE-2017-12376/" source="CVE"/>
		<reference ref_id="CVE-2017-12377" ref_url="https://www.suse.com/security/cve/CVE-2017-12377/" source="CVE"/>
		<reference ref_id="CVE-2017-12378" ref_url="https://www.suse.com/security/cve/CVE-2017-12378/" source="CVE"/>
		<reference ref_id="CVE-2017-12379" ref_url="https://www.suse.com/security/cve/CVE-2017-12379/" source="CVE"/>
		<reference ref_id="CVE-2017-12380" ref_url="https://www.suse.com/security/cve/CVE-2017-12380/" source="CVE"/>
		<reference ref_id="CVE-2017-6418" ref_url="https://www.suse.com/security/cve/CVE-2017-6418/" source="CVE"/>
		<reference ref_id="CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419/" source="CVE"/>
		<reference ref_id="CVE-2017-6420" ref_url="https://www.suse.com/security/cve/CVE-2017-6420/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00075.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- Update to security release 0.99.3 (bsc#1077732)
  * CVE-2017-12376 (ClamAV Buffer Overflow in handle_pdfname Vulnerability)
  * CVE-2017-12377 (ClamAV Mew Packet Heap Overflow Vulnerability)
  * CVE-2017-12379 (ClamAV Buffer Overflow in messageAddArgument Vulnerability)
    - these vulnerabilities could have allowed an unauthenticated,
      remote attacker to cause a denial of service (DoS) condition
      or potentially execute arbitrary code on an affected device.
  * CVE-2017-12374 (ClamAV use-after-free Vulnerabilities)
  * CVE-2017-12375 (ClamAV Buffer Overflow Vulnerability)
  * CVE-2017-12378 (ClamAV Buffer Over Read Vulnerability)
  * CVE-2017-12380 (ClamAV Null Dereference Vulnerability)
    - these vulnerabilities could have allowed an unauthenticated,
      remote attacker to cause a denial of service (DoS) condition on an affected device.
  * CVE-2017-6420 (bsc#1052448)
    - this vulnerability could have allowed remote attackers to cause a denial of service
      (use-after-free) via a crafted PE file with WWPack compression.
  * CVE-2017-6419 (bsc#1052449)
    - ClamAV could have allowed remote attackers to cause a denial of service
      (heap-based buffer overflow and application crash) or possibly
      have unspecified other impact via a crafted CHM file.
  * CVE-2017-11423 (bsc#1049423)
    - ClamAV could have allowed remote attackers to cause a denial of service
      (stack-based buffer over-read and application crash) via a crafted CAB file.
  * CVE-2017-6418 (bsc#1052466)
    - ClamAV could have allowed remote attackers to cause a denial
      of service (out-of-bounds read) via a crafted e-mail message.
- update upstream keys in the keyring

- provide and obsolete clamav-nodb to trigger it's removal in Leap
  bsc#1040662
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-27"/>
	<updated date="2018-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049423">SUSE bug 1049423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052448">SUSE bug 1052448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052449">SUSE bug 1052449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052466">SUSE bug 1052466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077732">SUSE bug 1077732</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12374/">CVE-2017-12374</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12375/">CVE-2017-12375</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12376/">CVE-2017-12376</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12377/">CVE-2017-12377</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12378/">CVE-2017-12378</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12379/">CVE-2017-12379</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12380/">CVE-2017-12380</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6418/">CVE-2017-6418</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6420/">CVE-2017-6420</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518798" comment="clamav-0.99.3-33.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78101" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1076391" ref_url="https://bugzilla.suse.com/1076391" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5711" ref_url="https://www.suse.com/security/cve/CVE-2018-5711/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003656.html" source="SUSE-SU"/>
		<description>
This update for gd fixes one issues.

This security issue was fixed:

- CVE-2018-5711: Prevent integer signedness error that could have lead to an
  infinite loop via a crafted GIF file allowing for DoS (bsc#1076391)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-29"/>
	<updated date="2018-01-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076391">SUSE bug 1076391</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5711/">CVE-2018-5711</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518799" comment="gd-2.1.0-24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518800" comment="gd-32bit-2.1.0-24.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78102" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1056126" ref_url="https://bugzilla.suse.com/1056126" source="BUGZILLA"/>
		<reference ref_id="1056127" ref_url="https://bugzilla.suse.com/1056127" source="BUGZILLA"/>
		<reference ref_id="1056128" ref_url="https://bugzilla.suse.com/1056128" source="BUGZILLA"/>
		<reference ref_id="1056129" ref_url="https://bugzilla.suse.com/1056129" source="BUGZILLA"/>
		<reference ref_id="1056131" ref_url="https://bugzilla.suse.com/1056131" source="BUGZILLA"/>
		<reference ref_id="1056132" ref_url="https://bugzilla.suse.com/1056132" source="BUGZILLA"/>
		<reference ref_id="1056136" ref_url="https://bugzilla.suse.com/1056136" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13728" ref_url="https://www.suse.com/security/cve/CVE-2017-13728/" source="CVE"/>
		<reference ref_id="CVE-2017-13729" ref_url="https://www.suse.com/security/cve/CVE-2017-13729/" source="CVE"/>
		<reference ref_id="CVE-2017-13730" ref_url="https://www.suse.com/security/cve/CVE-2017-13730/" source="CVE"/>
		<reference ref_id="CVE-2017-13731" ref_url="https://www.suse.com/security/cve/CVE-2017-13731/" source="CVE"/>
		<reference ref_id="CVE-2017-13732" ref_url="https://www.suse.com/security/cve/CVE-2017-13732/" source="CVE"/>
		<reference ref_id="CVE-2017-13733" ref_url="https://www.suse.com/security/cve/CVE-2017-13733/" source="CVE"/>
		<reference ref_id="CVE-2017-13734" ref_url="https://www.suse.com/security/cve/CVE-2017-13734/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003678.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes several issues.

These security issues were fixed:

- CVE-2017-13734: Prevent illegal address access in the _nc_safe_strcat
  function in strings.c that might have lead to a remote denial of service attack
  (bsc#1056126).
- CVE-2017-13733: Prevent illegal address access in the fmt_entry function in
  progs/dump_entry.c that might have lead to a remote denial of service attack
  (bsc#1056127).
- CVE-2017-13732: Prevent illegal address access in the function dump_uses() in
  progs/dump_entry.c that might have lead to a remote denial of service attack
  (bsc#1056128).
- CVE-2017-13731: Prevent illegal address access in the function
  postprocess_termcap() in parse_entry.c that might have lead to a remote denial
  of service attack (bsc#1056129).
- CVE-2017-13730: Prevent illegal address access in the function
  _nc_read_entry_source() in progs/tic.c that might have lead to a remote denial
  of service attack (bsc#1056131).
- CVE-2017-13729: Prevent illegal address access in the _nc_save_str function
  in alloc_entry.c that might have lead to a remote denial of service attack
  (bsc#1056132).
- CVE-2017-13728: Prevent infinite loop in the next_char function in
  comp_scan.c that might have lead to a remote denial of service attack
  (bsc#1056136).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-30"/>
	<updated date="2018-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056126">SUSE bug 1056126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056127">SUSE bug 1056127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056128">SUSE bug 1056128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056129">SUSE bug 1056129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056131">SUSE bug 1056131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056132">SUSE bug 1056132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056136">SUSE bug 1056136</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13728/">CVE-2017-13728</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13729/">CVE-2017-13729</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13730/">CVE-2017-13730</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13731/">CVE-2017-13731</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13732/">CVE-2017-13732</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13733/">CVE-2017-13733</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13734/">CVE-2017-13734</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518801" comment="libncurses5-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518802" comment="libncurses5-32bit-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518803" comment="libncurses6-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518804" comment="libncurses6-32bit-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518805" comment="ncurses-devel-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518806" comment="ncurses-utils-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518807" comment="tack-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518808" comment="terminfo-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518809" comment="terminfo-base-5.9-58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78103" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1048510" ref_url="https://bugzilla.suse.com/1048510" source="BUGZILLA"/>
		<reference ref_id="1065276" ref_url="https://bugzilla.suse.com/1065276" source="BUGZILLA"/>
		<reference ref_id="1066156" ref_url="https://bugzilla.suse.com/1066156" source="BUGZILLA"/>
		<reference ref_id="1068251" ref_url="https://bugzilla.suse.com/1068251" source="BUGZILLA"/>
		<reference ref_id="1070428" ref_url="https://bugzilla.suse.com/1070428" source="BUGZILLA"/>
		<reference ref_id="1071558" ref_url="https://bugzilla.suse.com/1071558" source="BUGZILLA"/>
		<reference ref_id="1074254" ref_url="https://bugzilla.suse.com/1074254" source="BUGZILLA"/>
		<reference ref_id="1075724" ref_url="https://bugzilla.suse.com/1075724" source="BUGZILLA"/>
		<reference ref_id="1076308" ref_url="https://bugzilla.suse.com/1076308" source="BUGZILLA"/>
		<reference ref_id="897422" ref_url="https://bugzilla.suse.com/897422" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15908" ref_url="https://www.suse.com/security/cve/CVE-2017-15908/" source="CVE"/>
		<reference ref_id="CVE-2018-1049" ref_url="https://www.suse.com/security/cve/CVE-2018-1049/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003686.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes several issues.

This security issue was fixed:

- CVE-2018-1049: Prevent race that can lead to DoS when using automounts (bsc#1076308).

These non-security issues were fixed:

- core: don't choke if a unit another unit triggers vanishes during reload
- delta: don't ignore PREFIX when the given argument is PREFIX/SUFFIX
- delta: extend skip logic to work on full directory paths (prefix+suffix) (bsc#1070428)
- delta: check if a prefix needs to be skipped only once
- delta: skip symlink paths when split-usr is enabled (#4591)
- sysctl: use raw file descriptor in sysctl_write (#7753)
- sd-netlink: don't take possesion of netlink fd from caller on failure (bsc#1074254)
- Fix the regexp used to detect broken by-id symlinks in /etc/crypttab
  It was missing the following case: '/dev/disk/by-id/cr_-xxx'.
- sysctl: disable buffer while writing to /proc (bsc#1071558)
- Use read_line() and LONG_LINE_MAX to read values configuration files. (bsc#1071558)
- sysctl: no need to check for eof twice
- def: add new constant LONG_LINE_MAX
- fileio: add new helper call read_line() as bounded getline() replacement
- service: Don't stop unneeded units needed by restarted service (#7526) (bsc#1066156)
- gpt-auto-generator: fix the handling of the value returned by fstab_has_fstype() in add_swap() (#6280)
- gpt-auto-generator: disable gpt auto logic for swaps if at least one is defined in fstab (bsc#897422)
- fstab-util: introduce fstab_has_fstype() helper
- fstab-generator: ignore root=/dev/nfs (#3591)
- fstab-generator: don't process root= if it happens to be 'gpt-auto' (#3452)
- virt: use XENFEAT_dom0 to detect the hardware domain (#6442, #6662) (#7581) (bsc#1048510)
- analyze: replace --no-man with --man=no in the man page (bsc#1068251)
- udev: net_setup_link: don't error out when we couldn't apply link config (#7328)
- Add missing /etc/systemd/network directory
- Fix parsing of features in detect_vm_xen_dom0 (#7890) (bsc#1048510)
- sd-bus: use -- when passing arguments to ssh (#6706)
- systemctl: make sure we terminate the bus connection first, and then close the pager (#3550)
- sd-bus: bump message queue size (bsc#1075724)
- tmpfiles: downgrade warning about duplicate line
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-30"/>
	<updated date="2018-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1048510">SUSE bug 1048510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065276">SUSE bug 1065276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066156">SUSE bug 1066156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068251">SUSE bug 1068251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070428">SUSE bug 1070428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071558">SUSE bug 1071558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074254">SUSE bug 1074254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075724">SUSE bug 1075724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076308">SUSE bug 1076308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897422">SUSE bug 897422</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15908/">CVE-2017-15908</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1049/">CVE-2018-1049</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518810" comment="libsystemd0-228-150.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518811" comment="libsystemd0-32bit-228-150.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518812" comment="libudev1-228-150.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518813" comment="libudev1-32bit-228-150.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518814" comment="systemd-228-150.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518815" comment="systemd-32bit-228-150.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518816" comment="systemd-bash-completion-228-150.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518817" comment="systemd-sysvinit-228-150.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518818" comment="udev-228-150.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78104" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1040039" ref_url="https://bugzilla.suse.com/1040039" source="BUGZILLA"/>
		<reference ref_id="1047184" ref_url="https://bugzilla.suse.com/1047184" source="BUGZILLA"/>
		<reference ref_id="1076118" ref_url="https://bugzilla.suse.com/1076118" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3145" ref_url="https://www.suse.com/security/cve/CVE-2017-3145/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00102.html" source="SUSE-SU"/>
		<description>
This update for bind fixes several issues.

This security issue was fixed:

- CVE-2017-3145: Improper sequencing during cleanup could have lead to a
  use-after-free error that triggered an assertion failure and crash in named
  (bsc#1076118).

These non-security issues were fixed:

- Updated named.root file (bsc#1040039)
- Update bind.keys for DNSSEC root KSK rollover (bsc#1047184)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-30"/>
	<updated date="2018-01-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040039">SUSE bug 1040039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047184">SUSE bug 1047184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076118">SUSE bug 1076118</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3145/">CVE-2017-3145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518819" comment="bind-libs-9.9.9P1-63.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518820" comment="bind-libs-32bit-9.9.9P1-63.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518821" comment="bind-utils-9.9.9P1-63.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78105" version="1" class="patch">
	<metadata>
		<title>Security update for libXfont (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1049692" ref_url="https://bugzilla.suse.com/1049692" source="BUGZILLA"/>
		<reference ref_id="1050459" ref_url="https://bugzilla.suse.com/1050459" source="BUGZILLA"/>
		<reference ref_id="1054285" ref_url="https://bugzilla.suse.com/1054285" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13720" ref_url="https://www.suse.com/security/cve/CVE-2017-13720/" source="CVE"/>
		<reference ref_id="CVE-2017-13722" ref_url="https://www.suse.com/security/cve/CVE-2017-13722/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003693.html" source="SUSE-SU"/>
		<description>
This update for libXfont fixes several issues.

These security issues were fixed:

- CVE-2017-13720: Improper check for end of string in PatterMatch caused invalid reads (bsc#1054285)
- CVE-2017-13722: Malformed PCF file could have caused DoS or leak information (bsc#1049692)
- Prevent the X server from accessing arbitrary files as root. It is not possible to leak information, but special files can be touched allowing for causing side effects (bsc#1050459)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-01"/>
	<updated date="2018-02-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049692">SUSE bug 1049692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050459">SUSE bug 1050459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054285">SUSE bug 1054285</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-13720/">CVE-2017-13720</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13722/">CVE-2017-13722</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518822" comment="libXfont1-1.5.1-11.3.12 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78106" version="1" class="patch">
	<metadata>
		<title>Security update for ecryptfs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="989121" ref_url="https://bugzilla.suse.com/989121" source="BUGZILLA"/>
		<reference ref_id="989122" ref_url="https://bugzilla.suse.com/989122" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8946" ref_url="https://www.suse.com/security/cve/CVE-2015-8946/" source="CVE"/>
		<reference ref_id="CVE-2016-6224" ref_url="https://www.suse.com/security/cve/CVE-2016-6224/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003694.html" source="SUSE-SU"/>
		<description>
This update for ecryptfs-utils fixes the following issues:

- CVE-2015-8946: ecryptfs-setup-swap improperly configures encrypted swap when using GPT partitioning (bsc#989121)
- CVE-2016-6224: ecryptfs-setup-swap improperly configures encrypted swap when using GPT partitioning on a NVMe or MMC drive (bsc#989122)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-01"/>
	<updated date="2018-02-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/989121">SUSE bug 989121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989122">SUSE bug 989122</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8946/">CVE-2015-8946</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6224/">CVE-2016-6224</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518823" comment="ecryptfs-utils-103-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518824" comment="ecryptfs-utils-32bit-103-8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78107" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1043353" ref_url="https://bugzilla.suse.com/1043353" source="BUGZILLA"/>
		<reference ref_id="1043354" ref_url="https://bugzilla.suse.com/1043354" source="BUGZILLA"/>
		<reference ref_id="1047908" ref_url="https://bugzilla.suse.com/1047908" source="BUGZILLA"/>
		<reference ref_id="1050037" ref_url="https://bugzilla.suse.com/1050037" source="BUGZILLA"/>
		<reference ref_id="1050072" ref_url="https://bugzilla.suse.com/1050072" source="BUGZILLA"/>
		<reference ref_id="1050098" ref_url="https://bugzilla.suse.com/1050098" source="BUGZILLA"/>
		<reference ref_id="1050100" ref_url="https://bugzilla.suse.com/1050100" source="BUGZILLA"/>
		<reference ref_id="1050635" ref_url="https://bugzilla.suse.com/1050635" source="BUGZILLA"/>
		<reference ref_id="1051442" ref_url="https://bugzilla.suse.com/1051442" source="BUGZILLA"/>
		<reference ref_id="1052470" ref_url="https://bugzilla.suse.com/1052470" source="BUGZILLA"/>
		<reference ref_id="1052708" ref_url="https://bugzilla.suse.com/1052708" source="BUGZILLA"/>
		<reference ref_id="1052717" ref_url="https://bugzilla.suse.com/1052717" source="BUGZILLA"/>
		<reference ref_id="1052721" ref_url="https://bugzilla.suse.com/1052721" source="BUGZILLA"/>
		<reference ref_id="1052768" ref_url="https://bugzilla.suse.com/1052768" source="BUGZILLA"/>
		<reference ref_id="1052777" ref_url="https://bugzilla.suse.com/1052777" source="BUGZILLA"/>
		<reference ref_id="1052781" ref_url="https://bugzilla.suse.com/1052781" source="BUGZILLA"/>
		<reference ref_id="1054600" ref_url="https://bugzilla.suse.com/1054600" source="BUGZILLA"/>
		<reference ref_id="1055068" ref_url="https://bugzilla.suse.com/1055068" source="BUGZILLA"/>
		<reference ref_id="1055374" ref_url="https://bugzilla.suse.com/1055374" source="BUGZILLA"/>
		<reference ref_id="1055455" ref_url="https://bugzilla.suse.com/1055455" source="BUGZILLA"/>
		<reference ref_id="1055456" ref_url="https://bugzilla.suse.com/1055456" source="BUGZILLA"/>
		<reference ref_id="1057000" ref_url="https://bugzilla.suse.com/1057000" source="BUGZILLA"/>
		<reference ref_id="1060162" ref_url="https://bugzilla.suse.com/1060162" source="BUGZILLA"/>
		<reference ref_id="1062752" ref_url="https://bugzilla.suse.com/1062752" source="BUGZILLA"/>
		<reference ref_id="1072362" ref_url="https://bugzilla.suse.com/1072362" source="BUGZILLA"/>
		<reference ref_id="1072901" ref_url="https://bugzilla.suse.com/1072901" source="BUGZILLA"/>
		<reference ref_id="1074120" ref_url="https://bugzilla.suse.com/1074120" source="BUGZILLA"/>
		<reference ref_id="1074125" ref_url="https://bugzilla.suse.com/1074125" source="BUGZILLA"/>
		<reference ref_id="1074185" ref_url="https://bugzilla.suse.com/1074185" source="BUGZILLA"/>
		<reference ref_id="1074309" ref_url="https://bugzilla.suse.com/1074309" source="BUGZILLA"/>
		<reference ref_id="1075939" ref_url="https://bugzilla.suse.com/1075939" source="BUGZILLA"/>
		<reference ref_id="1076021" ref_url="https://bugzilla.suse.com/1076021" source="BUGZILLA"/>
		<reference ref_id="1076051" ref_url="https://bugzilla.suse.com/1076051" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10995" ref_url="https://www.suse.com/security/cve/CVE-2017-10995/" source="CVE"/>
		<reference ref_id="CVE-2017-11505" ref_url="https://www.suse.com/security/cve/CVE-2017-11505/" source="CVE"/>
		<reference ref_id="CVE-2017-11525" ref_url="https://www.suse.com/security/cve/CVE-2017-11525/" source="CVE"/>
		<reference ref_id="CVE-2017-11526" ref_url="https://www.suse.com/security/cve/CVE-2017-11526/" source="CVE"/>
		<reference ref_id="CVE-2017-11539" ref_url="https://www.suse.com/security/cve/CVE-2017-11539/" source="CVE"/>
		<reference ref_id="CVE-2017-11639" ref_url="https://www.suse.com/security/cve/CVE-2017-11639/" source="CVE"/>
		<reference ref_id="CVE-2017-11750" ref_url="https://www.suse.com/security/cve/CVE-2017-11750/" source="CVE"/>
		<reference ref_id="CVE-2017-12565" ref_url="https://www.suse.com/security/cve/CVE-2017-12565/" source="CVE"/>
		<reference ref_id="CVE-2017-12640" ref_url="https://www.suse.com/security/cve/CVE-2017-12640/" source="CVE"/>
		<reference ref_id="CVE-2017-12641" ref_url="https://www.suse.com/security/cve/CVE-2017-12641/" source="CVE"/>
		<reference ref_id="CVE-2017-12643" ref_url="https://www.suse.com/security/cve/CVE-2017-12643/" source="CVE"/>
		<reference ref_id="CVE-2017-12671" ref_url="https://www.suse.com/security/cve/CVE-2017-12671/" source="CVE"/>
		<reference ref_id="CVE-2017-12673" ref_url="https://www.suse.com/security/cve/CVE-2017-12673/" source="CVE"/>
		<reference ref_id="CVE-2017-12676" ref_url="https://www.suse.com/security/cve/CVE-2017-12676/" source="CVE"/>
		<reference ref_id="CVE-2017-12935" ref_url="https://www.suse.com/security/cve/CVE-2017-12935/" source="CVE"/>
		<reference ref_id="CVE-2017-13059" ref_url="https://www.suse.com/security/cve/CVE-2017-13059/" source="CVE"/>
		<reference ref_id="CVE-2017-13141" ref_url="https://www.suse.com/security/cve/CVE-2017-13141/" source="CVE"/>
		<reference ref_id="CVE-2017-13142" ref_url="https://www.suse.com/security/cve/CVE-2017-13142/" source="CVE"/>
		<reference ref_id="CVE-2017-13147" ref_url="https://www.suse.com/security/cve/CVE-2017-13147/" source="CVE"/>
		<reference ref_id="CVE-2017-14103" ref_url="https://www.suse.com/security/cve/CVE-2017-14103/" source="CVE"/>
		<reference ref_id="CVE-2017-14649" ref_url="https://www.suse.com/security/cve/CVE-2017-14649/" source="CVE"/>
		<reference ref_id="CVE-2017-15218" ref_url="https://www.suse.com/security/cve/CVE-2017-15218/" source="CVE"/>
		<reference ref_id="CVE-2017-17504" ref_url="https://www.suse.com/security/cve/CVE-2017-17504/" source="CVE"/>
		<reference ref_id="CVE-2017-17681" ref_url="https://www.suse.com/security/cve/CVE-2017-17681/" source="CVE"/>
		<reference ref_id="CVE-2017-17879" ref_url="https://www.suse.com/security/cve/CVE-2017-17879/" source="CVE"/>
		<reference ref_id="CVE-2017-17884" ref_url="https://www.suse.com/security/cve/CVE-2017-17884/" source="CVE"/>
		<reference ref_id="CVE-2017-17914" ref_url="https://www.suse.com/security/cve/CVE-2017-17914/" source="CVE"/>
		<reference ref_id="CVE-2017-18008" ref_url="https://www.suse.com/security/cve/CVE-2017-18008/" source="CVE"/>
		<reference ref_id="CVE-2017-18027" ref_url="https://www.suse.com/security/cve/CVE-2017-18027/" source="CVE"/>
		<reference ref_id="CVE-2017-18029" ref_url="https://www.suse.com/security/cve/CVE-2017-18029/" source="CVE"/>
		<reference ref_id="CVE-2017-9261" ref_url="https://www.suse.com/security/cve/CVE-2017-9261/" source="CVE"/>
		<reference ref_id="CVE-2017-9262" ref_url="https://www.suse.com/security/cve/CVE-2017-9262/" source="CVE"/>
		<reference ref_id="CVE-2018-5246" ref_url="https://www.suse.com/security/cve/CVE-2018-5246/" source="CVE"/>
		<reference ref_id="CVE-2018-5685" ref_url="https://www.suse.com/security/cve/CVE-2018-5685/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2017-18027: Prevent memory leak vulnerability in the function
  ReadMATImage which allowed remote attackers to cause a denial of service via a
  crafted file (bsc#1076051)
- CVE-2017-18029: Prevent memory leak in the function ReadMATImage which
  allowed remote attackers to cause a denial of service via a crafted file
  (bsc#1076021)
- CVE-2017-17681: Prevent infinite loop in the function ReadPSDChannelZip in
  coders/psd.c, which allowed attackers to cause a denial of service (CPU
  exhaustion) via a crafted psd image file (bsc#1072901).
- CVE-2017-18008: Prevent memory Leak in ReadPWPImage which allowed attackers
  to cause a denial of service via a PWP file (bsc#1074309).
- CVE-2018-5685: Prevent infinite loop and application hang in the ReadBMPImage
  function. Remote attackers could leverage this vulnerability to cause a denial
  of service via an image file with a crafted bit-field mask value (bsc#1075939)
- CVE-2017-11639: Prevent heap-based buffer over-read in the WriteCIPImage()
  function, related to the GetPixelLuma function in MagickCore/pixel-accessor.h
  (bsc#1050635)
- CVE-2017-11525: Prevent memory consumption in the ReadCINImage function that
  allowed remote attackers to cause a denial of service (bsc#1050098)
- CVE-2017-9262: The ReadJNGImage function in coders/png.c allowed attackers to
  cause a denial of service (memory leak) via a crafted file (bsc#1043353).
- CVE-2017-9261: The ReadMNGImage function in coders/png.c allowed attackers to
  cause a denial of service (memory leak) via a crafted file (bsc#1043354).
- CVE-2017-10995: The mng_get_long function in coders/png.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) via a crafted MNG image (bsc#1047908).
- CVE-2017-11539: Prevent memory leak in the ReadOnePNGImage() function in
  coders/png.c (bsc#1050037).
- CVE-2017-11505: The ReadOneJNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (large loop and CPU consumption) via a
  crafted file (bsc#1050072).
- CVE-2017-11526: The ReadOneMNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (large loop and CPU consumption) via a
  crafted file (bsc#1050100).
- CVE-2017-11750: The ReadOneJNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (NULL pointer dereference) via a crafted
  file (bsc#1051442).
- CVE-2017-12565: Prevent memory leak in the function ReadOneJNGImage in
  coders/png.c, which allowed attackers to cause a denial of service
  (bsc#1052470).
- CVE-2017-12676: Prevent memory leak in the function ReadOneJNGImage in
  coders/png.c, which allowed attackers to cause a denial of service
  (bsc#1052708).
- CVE-2017-12673: Prevent memory leak in the function ReadOneMNGImage in
  coders/png.c, which allowed attackers to cause a denial of service
  (bsc#1052717).
- CVE-2017-12671: Added NULL assignment in coders/png.c to prevent an invalid
  free in the function RelinquishMagickMemory in MagickCore/memory.c, which
  allowed attackers to cause a denial of service (bsc#1052721).
- CVE-2017-12643: Prevent a memory exhaustion vulnerability in ReadOneJNGImage
  in coders\png.c (bsc#1052768).
- CVE-2017-12641: Prevent a memory leak vulnerability in ReadOneJNGImage in
  coders\png.c (bsc#1052777).
- CVE-2017-12640: Prevent an out-of-bounds read vulnerability in
  ReadOneMNGImage in coders/png.c (bsc#1052781).
- CVE-2017-12935: The ReadMNGImage function in coders/png.c mishandled large
  MNG images, leading to an invalid memory read in the SetImageColorCallBack
  function in magick/image.c (bsc#1054600).
- CVE-2017-13059: Prevent memory leak in the function WriteOneJNGImage in
  coders/png.c, which allowed attackers to cause a denial of service
  (WriteJNGImage memory consumption) via a crafted file (bsc#1055068).
- CVE-2017-13147: Prevent allocation failure in the function ReadMNGImage in
  coders/png.c when a small MNG file has a MEND chunk with a large length value
  (bsc#1055374).
- CVE-2017-13142: Added additional checks for short files to prevent a crafted
  PNG file from triggering a crash (bsc#1055455).
- CVE-2017-13141: Prevent memory leak in ReadOnePNGImage in coders/png.c
  (bsc#1055456).
- CVE-2017-14103: The ReadJNGImage and ReadOneJNGImage functions in
  coders/png.c did not properly manage image pointers after certain error
  conditions, which allowed remote attackers to conduct use-after-free attacks
  via a crafted file, related to a ReadMNGImage out-of-order CloseBlob call
  (bsc#1057000).
- CVE-2017-14649: ReadOneJNGImage in coders/png.c did not properly validate JNG
  data, leading to a denial of service (assertion failure in
  magick/pixel_cache.c, and application crash) (bsc#1060162).
- CVE-2017-15218: Prevent memory leak in ReadOneJNGImage in coders/png.c
  (bsc#1062752).
- CVE-2017-17504: Prevent heap-based buffer over-read via a crafted file in
  Magick_png_read_raw_profile, related to ReadOneMNGImage (bsc#1072362).
- CVE-2017-17884: Prevent memory leak in the function WriteOnePNGImage in
  coders/png.c, which allowed attackers to cause a denial of service via a
  crafted PNG image file (bsc#1074120).
- CVE-2017-17879: Prevent heap-based buffer over-read in ReadOneMNGImage in
  coders/png.c, related to length calculation and caused by an off-by-one error
  (bsc#1074125).
- CVE-2017-17914: Prevent crafted files to cause a large loop in
  ReadOneMNGImage (bsc#1074185).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-02"/>
	<updated date="2018-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043353">SUSE bug 1043353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043354">SUSE bug 1043354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047908">SUSE bug 1047908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050037">SUSE bug 1050037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050072">SUSE bug 1050072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050098">SUSE bug 1050098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050100">SUSE bug 1050100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050635">SUSE bug 1050635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051442">SUSE bug 1051442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052470">SUSE bug 1052470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052708">SUSE bug 1052708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052717">SUSE bug 1052717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052721">SUSE bug 1052721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052768">SUSE bug 1052768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052777">SUSE bug 1052777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052781">SUSE bug 1052781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054600">SUSE bug 1054600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055068">SUSE bug 1055068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055374">SUSE bug 1055374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055455">SUSE bug 1055455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055456">SUSE bug 1055456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057000">SUSE bug 1057000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060162">SUSE bug 1060162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062752">SUSE bug 1062752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072362">SUSE bug 1072362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072901">SUSE bug 1072901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074120">SUSE bug 1074120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074125">SUSE bug 1074125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074185">SUSE bug 1074185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074309">SUSE bug 1074309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075939">SUSE bug 1075939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076021">SUSE bug 1076021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076051">SUSE bug 1076051</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10995/">CVE-2017-10995</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11505/">CVE-2017-11505</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11525/">CVE-2017-11525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11526/">CVE-2017-11526</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11539/">CVE-2017-11539</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11639/">CVE-2017-11639</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11750/">CVE-2017-11750</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12565/">CVE-2017-12565</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12640/">CVE-2017-12640</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12641/">CVE-2017-12641</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12643/">CVE-2017-12643</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12671/">CVE-2017-12671</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12673/">CVE-2017-12673</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12676/">CVE-2017-12676</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12935/">CVE-2017-12935</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13059/">CVE-2017-13059</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13141/">CVE-2017-13141</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13142/">CVE-2017-13142</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13147/">CVE-2017-13147</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14103/">CVE-2017-14103</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14649/">CVE-2017-14649</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15218/">CVE-2017-15218</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17504/">CVE-2017-17504</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17681/">CVE-2017-17681</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-17879/">CVE-2017-17879</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17884/">CVE-2017-17884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17914/">CVE-2017-17914</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18008/">CVE-2017-18008</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18027/">CVE-2017-18027</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18029/">CVE-2017-18029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9261/">CVE-2017-9261</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9262/">CVE-2017-9262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5246/">CVE-2018-5246</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5685/">CVE-2018-5685</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78108" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1043978" ref_url="https://bugzilla.suse.com/1043978" source="BUGZILLA"/>
		<reference ref_id="1059911" ref_url="https://bugzilla.suse.com/1059911" source="BUGZILLA"/>
		<reference ref_id="1059912" ref_url="https://bugzilla.suse.com/1059912" source="BUGZILLA"/>
		<reference ref_id="1059913" ref_url="https://bugzilla.suse.com/1059913" source="BUGZILLA"/>
		<reference ref_id="1069874" ref_url="https://bugzilla.suse.com/1069874" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14245" ref_url="https://www.suse.com/security/cve/CVE-2017-14245/" source="CVE"/>
		<reference ref_id="CVE-2017-14246" ref_url="https://www.suse.com/security/cve/CVE-2017-14246/" source="CVE"/>
		<reference ref_id="CVE-2017-14634" ref_url="https://www.suse.com/security/cve/CVE-2017-14634/" source="CVE"/>
		<reference ref_id="CVE-2017-16942" ref_url="https://www.suse.com/security/cve/CVE-2017-16942/" source="CVE"/>
		<reference ref_id="CVE-2017-6892" ref_url="https://www.suse.com/security/cve/CVE-2017-6892/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003705.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2017-16942: Divide-by-zero in the function wav_w64_read_fmt_chunk(), which may lead to Denial of service (bsc#1069874). 
- CVE-2017-6892:  Fixed an out-of-bounds read memory access in the aiff_read_chanmap() (bsc#1043978).
- CVE-2017-14634: In libsndfile 1.0.28, a divide-by-zero error exists in the function double64_init() in double64.c, which may lead to DoS when playing a crafted audio file. (bsc#1059911)
- CVE-2017-14245: An out of bounds read in the function d2alaw_array() in alaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of 
                  the NAN and INFINITY floating-point values. (bsc#1059912)
- CVE-2017-14246: An out of bounds read in the function d2ulaw_array() in ulaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of 
                  the NAN and INFINITY floating-point values.(bsc#1059913)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-02"/>
	<updated date="2018-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043978">SUSE bug 1043978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059911">SUSE bug 1059911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059912">SUSE bug 1059912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059913">SUSE bug 1059913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069874">SUSE bug 1069874</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14245/">CVE-2017-14245</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14246/">CVE-2017-14246</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14634/">CVE-2017-14634</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16942/">CVE-2017-16942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6892/">CVE-2017-6892</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518830" comment="libsndfile1-1.0.25-36.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518831" comment="libsndfile1-32bit-1.0.25-36.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78109" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1062937" ref_url="https://bugzilla.suse.com/1062937" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15232" ref_url="https://www.suse.com/security/cve/CVE-2017-15232/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003709.html" source="SUSE-SU"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

Feature update:

- Update from version 1.3.1 to version 1.5.2 (fate#324061).
  
Security issue fixed:

- CVE-2017-15232: Fix NULL pointer dereference in jdpostct.c and jquant1.c (bsc#1062937).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-06"/>
	<updated date="2018-02-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062937">SUSE bug 1062937</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15232/">CVE-2017-15232</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518832" comment="libjpeg-turbo-1.5.3-31.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518833" comment="libjpeg62-62.2.0-31.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518834" comment="libjpeg62-32bit-62.2.0-31.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518835" comment="libjpeg62-turbo-1.5.3-31.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518836" comment="libjpeg8-8.1.2-31.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518837" comment="libjpeg8-32bit-8.1.2-31.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518838" comment="libturbojpeg0-8.1.2-31.7.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78110" version="1" class="patch">
	<metadata>
		<title>security update for spice-vdagent (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1012215" ref_url="https://bugzilla.suse.com/1012215" source="BUGZILLA"/>
		<reference ref_id="1070724" ref_url="https://bugzilla.suse.com/1070724" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15108" ref_url="https://www.suse.com/security/cve/CVE-2017-15108/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003708.html" source="SUSE-SU"/>
		<description>
This update for spice-vdagent provides the following fixes:

This security issue was fixed:

- CVE-2017-15108: Properly escape save directory that is passed to the shell to
  prevent local attacker with access to the session the agent runs from injecting
  arbitrary commands to be executed (bsc#1070724).

This non-security issue was fixed:

- Implement endian swapping, required for big-endian guests to connect to the spice client
  successfully. (bsc#1012215)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-06"/>
	<updated date="2018-02-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1012215">SUSE bug 1012215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070724">SUSE bug 1070724</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15108/">CVE-2017-15108</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518839" comment="spice-vdagent-0.16.0-8.5.15 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78111" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1077291" ref_url="https://bugzilla.suse.com/1077291" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5089" ref_url="https://www.suse.com/security/cve/CVE-2018-5089/" source="CVE"/>
		<reference ref_id="CVE-2018-5091" ref_url="https://www.suse.com/security/cve/CVE-2018-5091/" source="CVE"/>
		<reference ref_id="CVE-2018-5095" ref_url="https://www.suse.com/security/cve/CVE-2018-5095/" source="CVE"/>
		<reference ref_id="CVE-2018-5096" ref_url="https://www.suse.com/security/cve/CVE-2018-5096/" source="CVE"/>
		<reference ref_id="CVE-2018-5097" ref_url="https://www.suse.com/security/cve/CVE-2018-5097/" source="CVE"/>
		<reference ref_id="CVE-2018-5098" ref_url="https://www.suse.com/security/cve/CVE-2018-5098/" source="CVE"/>
		<reference ref_id="CVE-2018-5099" ref_url="https://www.suse.com/security/cve/CVE-2018-5099/" source="CVE"/>
		<reference ref_id="CVE-2018-5102" ref_url="https://www.suse.com/security/cve/CVE-2018-5102/" source="CVE"/>
		<reference ref_id="CVE-2018-5103" ref_url="https://www.suse.com/security/cve/CVE-2018-5103/" source="CVE"/>
		<reference ref_id="CVE-2018-5104" ref_url="https://www.suse.com/security/cve/CVE-2018-5104/" source="CVE"/>
		<reference ref_id="CVE-2018-5117" ref_url="https://www.suse.com/security/cve/CVE-2018-5117/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00007.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version 52.6 several issues.

These security issues were fixed:

- CVE-2018-5091: Use-after-free with DTMF timers (bsc#1077291).
- CVE-2018-5095: Integer overflow in Skia library during edge builder allocation (bsc#1077291).
- CVE-2018-5096: Use-after-free while editing form elements (bsc#1077291).
- CVE-2018-5097: Use-after-free when source document is manipulated during XSLT (bsc#1077291).
- CVE-2018-5098: Use-after-free while manipulating form input elements (bsc#1077291).
- CVE-2018-5099: Use-after-free with widget listener (bsc#1077291).
- CVE-2018-5104: Use-after-free during font face manipulation (bsc#1077291).
- CVE-2018-5089: Fixed several memory safety bugs (bsc#1077291).
- CVE-2018-5117: URL spoofing with right-to-left text aligned left-to-right (bsc#1077291).
- CVE-2018-5102: Use-after-free in HTML media elements (bsc#1077291).
- CVE-2018-5103: Use-after-free during mouse event handling (bsc#1077291).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-06"/>
	<updated date="2018-02-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5089/">CVE-2018-5089</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5091/">CVE-2018-5091</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5095/">CVE-2018-5095</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5096/">CVE-2018-5096</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5097/">CVE-2018-5097</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5098/">CVE-2018-5098</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5099/">CVE-2018-5099</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5102/">CVE-2018-5102</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5103/">CVE-2018-5103</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5104/">CVE-2018-5104</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5117/">CVE-2018-5117</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518840" comment="MozillaFirefox-52.6.0esr-109.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518841" comment="MozillaFirefox-translations-52.6.0esr-109.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78112" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00021.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

This update for qemu fixes the following issues:

A mitigation for a security flaw has been applied:

- CVE-2017-5715: QEMU was updated to allow passing through new MSR and CPUID flags from 
  the host VM to the CPU, to allow enabling/disabling branch prediction features in the
  Intel CPU. (bsc#1068032)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-08"/>
	<updated date="2018-01-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518842" comment="qemu-2.6.2-41.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518843" comment="qemu-block-curl-2.6.2-41.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518844" comment="qemu-ipxe-1.0.0-41.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518845" comment="qemu-kvm-2.6.2-41.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518846" comment="qemu-seabios-1.9.1-41.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518847" comment="qemu-sgabios-8-41.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518848" comment="qemu-tools-2.6.2-41.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518849" comment="qemu-vgabios-1.9.1-41.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518850" comment="qemu-x86-2.6.2-41.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78113" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1058722" ref_url="https://bugzilla.suse.com/1058722" source="BUGZILLA"/>
		<reference ref_id="1064101" ref_url="https://bugzilla.suse.com/1064101" source="BUGZILLA"/>
		<reference ref_id="1064115" ref_url="https://bugzilla.suse.com/1064115" source="BUGZILLA"/>
		<reference ref_id="1076505" ref_url="https://bugzilla.suse.com/1076505" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10268" ref_url="https://www.suse.com/security/cve/CVE-2017-10268/" source="CVE"/>
		<reference ref_id="CVE-2017-10378" ref_url="https://www.suse.com/security/cve/CVE-2017-10378/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003712.html" source="SUSE-SU"/>
		<description>
This update for mariadb to version 10.0.33 fixes several issues.

These security issues were fixed:

- CVE-2017-10378: Vulnerability in subcomponent: Server: Optimizer. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server. Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server (bsc#1064115).
- CVE-2017-10268: Vulnerability in subcomponent: Server: Replication. Difficult
  to exploit vulnerability allowed high privileged attacker with logon to the
  infrastructure where MySQL Server executes to compromise MySQL Server.
  Successful attacks of this vulnerability can result in unauthorized access to
  critical data or complete access to all MySQL Server accessible data
  (bsc#1064101).

These non-security issues were fixed:

- CHECK TABLE no longer returns an error when run on a CONNECT table
- 'Undo log record is too big.' error occurring in very narrow range of string
  lengths
- Race condition between INFORMATION_SCHEMA.INNODB_SYS_TABLESTATS and
  ALTER/DROP/TRUNCATE TABLE
- Wrong result after altering a partitioned table fixed bugs in InnoDB FULLTEXT
  INDEX
- InnoDB FTS duplicate key error
- InnoDB crash after failed ADD INDEX and table_definition_cache eviction
- fts_create_doc_id() unnecessarily allocates 8 bytes for every inserted row
- IMPORT TABLESPACE may corrupt ROW_FORMAT=REDUNDANT tables

For additional details please see https://kb.askmonty.org/en/mariadb-10033-changelog
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-07"/>
	<updated date="2018-02-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1058722">SUSE bug 1058722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064101">SUSE bug 1064101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064115">SUSE bug 1064115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076505">SUSE bug 1076505</bugzilla>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10268/">CVE-2017-10268</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10378/">CVE-2017-10378</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518851" comment="libmysqlclient18-10.0.33-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518852" comment="libmysqlclient18-32bit-10.0.33-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518853" comment="libmysqlclient_r18-10.0.33-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518854" comment="libmysqlclient_r18-32bit-10.0.33-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518855" comment="mariadb-10.0.33-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518856" comment="mariadb-client-10.0.33-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518857" comment="mariadb-errormessages-10.0.33-29.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78114" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1070130" ref_url="https://bugzilla.suse.com/1070130" source="BUGZILLA"/>
		<reference ref_id="1072887" ref_url="https://bugzilla.suse.com/1072887" source="BUGZILLA"/>
		<reference ref_id="1073973" ref_url="https://bugzilla.suse.com/1073973" source="BUGZILLA"/>
		<reference ref_id="1076500" ref_url="https://bugzilla.suse.com/1076500" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5748" ref_url="https://www.suse.com/security/cve/CVE-2018-5748/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003713.html" source="SUSE-SU"/>
		<description>
This update for libvirt provides several fixes.

This security issue was fixed:

- CVE-2018-5748: Prevent resource exhaustion via qemuMonitorIORead() method which allowed to cause DoS (bsc#1076500).

These security issues were fixed:

- Add a qemu hook script providing functionality similar to Xen's block-dmmd script.
  (fate#324177)
- schema: Make disk driver name attribute optional. (bsc#1073973)
- virt-create-rootfs: Handle all SLE 12 versions. (bsc#1072887)
- libvirt-guests: Fix the 'stop' operation when action is 'suspend'. (bsc#1070130)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-07"/>
	<updated date="2018-02-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1070130">SUSE bug 1070130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072887">SUSE bug 1072887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073973">SUSE bug 1073973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076500">SUSE bug 1076500</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5748/">CVE-2018-5748</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518858" comment="libvirt-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518859" comment="libvirt-client-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518860" comment="libvirt-client-32bit-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518861" comment="libvirt-daemon-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518862" comment="libvirt-daemon-config-network-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518863" comment="libvirt-daemon-config-nwfilter-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518864" comment="libvirt-daemon-driver-interface-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518865" comment="libvirt-daemon-driver-libxl-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518866" comment="libvirt-daemon-driver-lxc-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518867" comment="libvirt-daemon-driver-network-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518868" comment="libvirt-daemon-driver-nodedev-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518869" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518870" comment="libvirt-daemon-driver-qemu-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518871" comment="libvirt-daemon-driver-secret-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518872" comment="libvirt-daemon-driver-storage-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518873" comment="libvirt-daemon-lxc-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518874" comment="libvirt-daemon-qemu-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518875" comment="libvirt-daemon-xen-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518876" comment="libvirt-doc-2.0.0-27.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78115" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1077993" ref_url="https://bugzilla.suse.com/1077993" source="BUGZILLA"/>
		<reference ref_id="1078806" ref_url="https://bugzilla.suse.com/1078806" source="BUGZILLA"/>
		<reference ref_id="1078813" ref_url="https://bugzilla.suse.com/1078813" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5131" ref_url="https://www.suse.com/security/cve/CVE-2016-5131/" source="CVE"/>
		<reference ref_id="CVE-2017-15412" ref_url="https://www.suse.com/security/cve/CVE-2017-15412/" source="CVE"/>
		<reference ref_id="CVE-2017-5130" ref_url="https://www.suse.com/security/cve/CVE-2017-5130/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003716.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes one issue.

This security issue was fixed:

- CVE-2017-15412: Prevent use after free when calling XPath extension functions
  that allowed remote attackers to cause DoS or potentially RCE (bsc#1077993)
- CVE-2016-5131: Use-after-free vulnerability in libxml2 allowed
  remote attackers to cause a denial of service or possibly have
  unspecified other impact via vectors related to the XPointer range-to
  function. (bsc#1078813)
- CVE-2017-5130: Fixed a potential remote buffer overflow in function
  xmlMemoryStrdup() (bsc#1078806)

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-08"/>
	<updated date="2018-02-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077993">SUSE bug 1077993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078806">SUSE bug 1078806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078813">SUSE bug 1078813</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5131/">CVE-2016-5131</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15412/">CVE-2017-15412</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5130/">CVE-2017-5130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518877" comment="libxml2-2-2.9.4-46.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518878" comment="libxml2-2-32bit-2.9.4-46.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518879" comment="libxml2-tools-2.9.4-46.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518880" comment="python-libxml2-2.9.4-46.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78116" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1032138" ref_url="https://bugzilla.suse.com/1032138" source="BUGZILLA"/>
		<reference ref_id="1032230" ref_url="https://bugzilla.suse.com/1032230" source="BUGZILLA"/>
		<reference ref_id="1040643" ref_url="https://bugzilla.suse.com/1040643" source="BUGZILLA"/>
		<reference ref_id="1050879" ref_url="https://bugzilla.suse.com/1050879" source="BUGZILLA"/>
		<reference ref_id="1050887" ref_url="https://bugzilla.suse.com/1050887" source="BUGZILLA"/>
		<reference ref_id="1050888" ref_url="https://bugzilla.suse.com/1050888" source="BUGZILLA"/>
		<reference ref_id="1050889" ref_url="https://bugzilla.suse.com/1050889" source="BUGZILLA"/>
		<reference ref_id="1050891" ref_url="https://bugzilla.suse.com/1050891" source="BUGZILLA"/>
		<reference ref_id="1051184" ref_url="https://bugzilla.suse.com/1051184" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10219" ref_url="https://www.suse.com/security/cve/CVE-2016-10219/" source="CVE"/>
		<reference ref_id="CVE-2016-10317" ref_url="https://www.suse.com/security/cve/CVE-2016-10317/" source="CVE"/>
		<reference ref_id="CVE-2017-11714" ref_url="https://www.suse.com/security/cve/CVE-2017-11714/" source="CVE"/>
		<reference ref_id="CVE-2017-9216" ref_url="https://www.suse.com/security/cve/CVE-2017-9216/" source="CVE"/>
		<reference ref_id="CVE-2017-9612" ref_url="https://www.suse.com/security/cve/CVE-2017-9612/" source="CVE"/>
		<reference ref_id="CVE-2017-9726" ref_url="https://www.suse.com/security/cve/CVE-2017-9726/" source="CVE"/>
		<reference ref_id="CVE-2017-9727" ref_url="https://www.suse.com/security/cve/CVE-2017-9727/" source="CVE"/>
		<reference ref_id="CVE-2017-9739" ref_url="https://www.suse.com/security/cve/CVE-2017-9739/" source="CVE"/>
		<reference ref_id="CVE-2017-9835" ref_url="https://www.suse.com/security/cve/CVE-2017-9835/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003717.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes several issues.



These security issues were fixed: 

- CVE-2017-9835: The gs_alloc_ref_array function allowed remote attackers to
  cause a denial of service (heap-based buffer overflow and application crash) or
  possibly have unspecified other impact via a crafted PostScript document
  (bsc#1050879).
- CVE-2017-9216: Prevent NULL pointer dereference in the jbig2_huffman_get
  function in jbig2_huffman.c which allowed for DoS (bsc#1040643).
- CVE-2016-10317: The fill_threshhold_buffer function in base/gxht_thresh.c
  allowed remote attackers to cause a denial of service (heap-based buffer
  overflow and application crash) or possibly have unspecified other impact via a
  crafted PostScript document (bsc#1032230).
- CVE-2017-9612: The Ins_IP function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (use-after-free and application crash)
  or possibly have unspecified other impact via a crafted document (bsc#1050891).
- CVE-2017-9726: The Ins_MDRP function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050889).
- CVE-2017-9727: The gx_ttfReader__Read function in base/gxttfb.c allowed
  remote attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050888).
- CVE-2017-9739: The Ins_JMPR function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050887).
- CVE-2017-11714: psi/ztoken.c mishandled references to the scanner state
  structure, which allowed remote attackers to cause a denial of service
  (application crash) or possibly have unspecified other impact via a crafted
  PostScript document, related to an out-of-bounds read in the
  igc_reloc_struct_ptr function in psi/igc.c (bsc#1051184).
- CVE-2016-10219: The intersect function in base/gxfill.c allowed remote
  attackers to cause a denial of service (divide-by-zero error and application
  crash) via a crafted file (bsc#1032138).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-09"/>
	<updated date="2018-02-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1032138">SUSE bug 1032138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032230">SUSE bug 1032230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040643">SUSE bug 1040643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050879">SUSE bug 1050879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050887">SUSE bug 1050887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050888">SUSE bug 1050888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050889">SUSE bug 1050889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050891">SUSE bug 1050891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051184">SUSE bug 1051184</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10219/">CVE-2016-10219</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10317/">CVE-2016-10317</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11714/">CVE-2017-11714</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9216/">CVE-2017-9216</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9612/">CVE-2017-9612</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9726/">CVE-2017-9726</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9727/">CVE-2017-9727</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9739/">CVE-2017-9739</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9835/">CVE-2017-9835</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518881" comment="ghostscript-9.15-23.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518882" comment="ghostscript-x11-9.15-23.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78117" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1012917" ref_url="https://bugzilla.suse.com/1012917" source="BUGZILLA"/>
		<reference ref_id="1019784" ref_url="https://bugzilla.suse.com/1019784" source="BUGZILLA"/>
		<reference ref_id="1022476" ref_url="https://bugzilla.suse.com/1022476" source="BUGZILLA"/>
		<reference ref_id="1031717" ref_url="https://bugzilla.suse.com/1031717" source="BUGZILLA"/>
		<reference ref_id="1038078" ref_url="https://bugzilla.suse.com/1038078" source="BUGZILLA"/>
		<reference ref_id="1038085" ref_url="https://bugzilla.suse.com/1038085" source="BUGZILLA"/>
		<reference ref_id="1043652" ref_url="https://bugzilla.suse.com/1043652" source="BUGZILLA"/>
		<reference ref_id="1048585" ref_url="https://bugzilla.suse.com/1048585" source="BUGZILLA"/>
		<reference ref_id="1052360" ref_url="https://bugzilla.suse.com/1052360" source="BUGZILLA"/>
		<reference ref_id="1060279" ref_url="https://bugzilla.suse.com/1060279" source="BUGZILLA"/>
		<reference ref_id="1066223" ref_url="https://bugzilla.suse.com/1066223" source="BUGZILLA"/>
		<reference ref_id="1066842" ref_url="https://bugzilla.suse.com/1066842" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068038" ref_url="https://bugzilla.suse.com/1068038" source="BUGZILLA"/>
		<reference ref_id="1068569" ref_url="https://bugzilla.suse.com/1068569" source="BUGZILLA"/>
		<reference ref_id="1068984" ref_url="https://bugzilla.suse.com/1068984" source="BUGZILLA"/>
		<reference ref_id="1069160" ref_url="https://bugzilla.suse.com/1069160" source="BUGZILLA"/>
		<reference ref_id="1070799" ref_url="https://bugzilla.suse.com/1070799" source="BUGZILLA"/>
		<reference ref_id="1072163" ref_url="https://bugzilla.suse.com/1072163" source="BUGZILLA"/>
		<reference ref_id="1072484" ref_url="https://bugzilla.suse.com/1072484" source="BUGZILLA"/>
		<reference ref_id="1072589" ref_url="https://bugzilla.suse.com/1072589" source="BUGZILLA"/>
		<reference ref_id="1073229" ref_url="https://bugzilla.suse.com/1073229" source="BUGZILLA"/>
		<reference ref_id="1073928" ref_url="https://bugzilla.suse.com/1073928" source="BUGZILLA"/>
		<reference ref_id="1074134" ref_url="https://bugzilla.suse.com/1074134" source="BUGZILLA"/>
		<reference ref_id="1074392" ref_url="https://bugzilla.suse.com/1074392" source="BUGZILLA"/>
		<reference ref_id="1074488" ref_url="https://bugzilla.suse.com/1074488" source="BUGZILLA"/>
		<reference ref_id="1074621" ref_url="https://bugzilla.suse.com/1074621" source="BUGZILLA"/>
		<reference ref_id="1074709" ref_url="https://bugzilla.suse.com/1074709" source="BUGZILLA"/>
		<reference ref_id="1074839" ref_url="https://bugzilla.suse.com/1074839" source="BUGZILLA"/>
		<reference ref_id="1074847" ref_url="https://bugzilla.suse.com/1074847" source="BUGZILLA"/>
		<reference ref_id="1075066" ref_url="https://bugzilla.suse.com/1075066" source="BUGZILLA"/>
		<reference ref_id="1075078" ref_url="https://bugzilla.suse.com/1075078" source="BUGZILLA"/>
		<reference ref_id="1075087" ref_url="https://bugzilla.suse.com/1075087" source="BUGZILLA"/>
		<reference ref_id="1075091" ref_url="https://bugzilla.suse.com/1075091" source="BUGZILLA"/>
		<reference ref_id="1075428" ref_url="https://bugzilla.suse.com/1075428" source="BUGZILLA"/>
		<reference ref_id="1075617" ref_url="https://bugzilla.suse.com/1075617" source="BUGZILLA"/>
		<reference ref_id="1075621" ref_url="https://bugzilla.suse.com/1075621" source="BUGZILLA"/>
		<reference ref_id="1075627" ref_url="https://bugzilla.suse.com/1075627" source="BUGZILLA"/>
		<reference ref_id="1075994" ref_url="https://bugzilla.suse.com/1075994" source="BUGZILLA"/>
		<reference ref_id="1076017" ref_url="https://bugzilla.suse.com/1076017" source="BUGZILLA"/>
		<reference ref_id="1076110" ref_url="https://bugzilla.suse.com/1076110" source="BUGZILLA"/>
		<reference ref_id="1076806" ref_url="https://bugzilla.suse.com/1076806" source="BUGZILLA"/>
		<reference ref_id="1076809" ref_url="https://bugzilla.suse.com/1076809" source="BUGZILLA"/>
		<reference ref_id="1076872" ref_url="https://bugzilla.suse.com/1076872" source="BUGZILLA"/>
		<reference ref_id="1076899" ref_url="https://bugzilla.suse.com/1076899" source="BUGZILLA"/>
		<reference ref_id="1077068" ref_url="https://bugzilla.suse.com/1077068" source="BUGZILLA"/>
		<reference ref_id="1077560" ref_url="https://bugzilla.suse.com/1077560" source="BUGZILLA"/>
		<reference ref_id="1077592" ref_url="https://bugzilla.suse.com/1077592" source="BUGZILLA"/>
		<reference ref_id="1078526" ref_url="https://bugzilla.suse.com/1078526" source="BUGZILLA"/>
		<reference ref_id="1078681" ref_url="https://bugzilla.suse.com/1078681" source="BUGZILLA"/>
		<reference ref_id="963844" ref_url="https://bugzilla.suse.com/963844" source="BUGZILLA"/>
		<reference ref_id="988524" ref_url="https://bugzilla.suse.com/988524" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15129" ref_url="https://www.suse.com/security/cve/CVE-2017-15129/" source="CVE"/>
		<reference ref_id="CVE-2017-17712" ref_url="https://www.suse.com/security/cve/CVE-2017-17712/" source="CVE"/>
		<reference ref_id="CVE-2017-17862" ref_url="https://www.suse.com/security/cve/CVE-2017-17862/" source="CVE"/>
		<reference ref_id="CVE-2017-17864" ref_url="https://www.suse.com/security/cve/CVE-2017-17864/" source="CVE"/>
		<reference ref_id="CVE-2017-18017" ref_url="https://www.suse.com/security/cve/CVE-2017-18017/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<reference ref_id="CVE-2018-5332" ref_url="https://www.suse.com/security/cve/CVE-2018-5332/" source="CVE"/>
		<reference ref_id="CVE-2018-5333" ref_url="https://www.suse.com/security/cve/CVE-2018-5333/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00015.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP2 kernel was updated to 4.4.114 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (bnc#1068032).

  The previous fix using CPU Microcode has been complemented by building the Linux Kernel with return trampolines aka 'retpolines'.

- CVE-2017-15129: A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel The function get_net_ns_by_id() in net/core/net_namespace.c did not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely (bnc#1074839).
- CVE-2017-17712: The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel has a race condition in inet-&gt;hdrincl that leads to uninitialized stack pointer usage; this allowed a local user to execute code and gain privileges (bnc#1073229).
- CVE-2017-17862: kernel/bpf/verifier.c in the Linux kernel ignored unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service (bnc#1073928).
- CVE-2017-17864: kernel/bpf/verifier.c in the Linux kernel mishandled states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allowed local users to obtain potentially sensitive address information, aka a 'pointer leak (bnc#1073928).
- CVE-2017-18017: The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel allowed remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action (bnc#1074488).
- CVE-2018-1000004: In the Linux kernel a race condition vulnerability existed in the sound system, this can lead to a deadlock and denial of service condition (bnc#1076017).
- CVE-2018-5332: In the Linux kernel the rds_message_alloc_sgs() function did not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c) (bnc#1075621).
- CVE-2018-5333: In the Linux kernel the rds_cmsg_atomic function in net/rds/rdma.c mishandled cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference (bnc#1075617).

The following non-security bugs were fixed:

- 8021q: fix a memory leak for VLAN 0 device (bnc#1012382).
- ACPI / scan: Prefer devices without _HID/_CID for _ADR matching (bnc#1012382).
- ARC: uaccess: dont use 'l' gcc inline asm constraint modifier (bnc#1012382).
- Fix EX_SIZE. We do not have the patches that shave off parts of the exception data.
- Fix build error in vma.c (bnc#1012382).
- Fix mishandling of cases with MSR not being present (writing to MSR even though _state == -1).
- Fix return value from ib[rs|pb]_enabled()
- Input: trackpoint - force 3 buttons if 0 button is reported (bnc#1012382).
- KVM: s390: Enable all facility bits that are known good for passthrough (bsc#1076806).
- Kabi: Keep KVM stable after enable s390 wire up bpb feature (bsc#1076806).
- Move RFI sysfs to a separate patch
- Move the RFI debug code into separate patch.
- Re-enable fixup detection by CPU type in case hypervisor call fails.
- Revert 'Bluetooth: btusb: driver to enable the usb-wakeup feature' (bnc#1012382).
- Revert 'Re-enable fixup detection by CPU type in case hypervisor call fails.' The firmware update is required for the existing instructions to also do the cache flush.
- Revert 'arm64: alternatives: add enable parameter to conditional asm macros' (bsc#1068032).
- Revert 'drm/armada: Fix compile fail' (bnc#1012382).
- Revert 'drm/radeon: dont switch vt on suspend' (bnc#1012382).
- Revert 'ipsec: Fix aborted xfrm policy dump crash' (kabi).
- Revert 'kaiser: vmstat show NR_KAISERTABLE as nr_overhead' (kabi).
- Revert 'lib/genalloc.c: make the avail variable an atomic_long_t' (kabi).
- Revert 'module: Add retpoline tag to VERMAGIC' (bnc#1012382 kabi).
- Revert 'netlink: add a start callback for starting a netlink dump' (kabi).
- Revert 'ocfs2: should wait dio before inode lock in ocfs2_setattr()' (bnc#1012382).
- Revert 's390/kbuild: enable modversions for symbols exported from asm' (bnc#1012382).
- Revert 'sched/deadline: Use the revised wakeup rule for suspending constrained dl tasks' (kabi).
- Revert 'scsi: libsas: align sata_device's rps_resp on a cacheline' (kabi).
- Revert 'spi: SPI_FSL_DSPI should depend on HAS_DMA' (bnc#1012382).
- Revert 'userfaultfd: selftest: vm: allow to build in vm/ directory' (bnc#1012382).
- Revert 'x86/efi: Build our own page table structures' (bnc#1012382).
- Revert 'x86/efi: Hoist page table switching code into efi_call_virt()' (bnc#1012382).
- Revert 'x86/mm/pat: Ensure cpa-&gt;pfn only contains page frame numbers' (bnc#1012382).
- SMB2: Fix share type handling (bnc#1074392).
- Set supported_modules_check 1 (bsc#1072163).
- Update patches.suse/powerpc-Secure-memory-rfi-flush-SLE12SP3.patch (bsc#1068032, bsc#1075087).
- af_key: fix buffer overread in parse_exthdrs() (bnc#1012382).
- af_key: fix buffer overread in verify_address_len() (bnc#1012382).
- afs: Adjust mode bits processing (bnc#1012382).
- afs: Connect up the CB.ProbeUuid (bnc#1012382).
- afs: Fix afs_kill_pages() (bnc#1012382).
- afs: Fix missing put_page() (bnc#1012382).
- afs: Fix page leak in afs_write_begin() (bnc#1012382).
- afs: Fix the maths in afs_fs_store_data() (bnc#1012382).
- afs: Flush outstanding writes when an fd is closed (bnc#1012382).
- afs: Migrate vlocation fields to 64-bit (bnc#1012382).
- afs: Populate and use client modification time (bnc#1012382).
- afs: Populate group ID from vnode status (bnc#1012382).
- afs: Prevent callback expiry timer overflow (bnc#1012382).
- alpha: fix build failures (bnc#1012382).
- alsa: aloop: Fix inconsistent format due to incomplete rule (bsc#1031717).
- alsa: aloop: Fix racy hw constraints adjustment (bsc#1031717).
- alsa: aloop: Release cable upon open error path (bsc#1031717).
- alsa: hda - Add HP ZBook 15u G3 Conexant CX20724 GPIO mute leds (bsc#1031717).
- alsa: hda - Add MIC_NO_PRESENCE fixup for 2 HP machines (bsc#1031717).
- alsa: hda - Add mute led support for HP EliteBook 840 G3 (bsc#1031717).
- alsa: hda - Add mute led support for HP ProBook 440 G4 (bsc#1031717).
- alsa: hda - Apply headphone noise quirk for another Dell XPS 13 variant (bsc#1031717).
- alsa: hda - Apply the existing quirk to iMac 14,1 (bsc#1031717).
- alsa: hda - Fix click noises on Samsung Ativ Book 8 (bsc#1031717).
- alsa: hda - Fix headset microphone detection for ASUS N551 and N751 (bsc#1031717).
- alsa: hda - Fix mic regression by ASRock mobo fixup (bsc#1031717).
- alsa: hda - Fix missing COEF init for ALC225/295/299 (bsc#1031717).
- alsa: hda - Fix surround output pins for ASRock B150M mobo (bsc#1031717).
- alsa: hda - On-board speaker fixup on ACER Veriton (bsc#1031717).
- alsa: hda - Skip Realtek SKU check for Lenovo machines (bsc#1031717).
- alsa: hda - add support for docking station for HP 820 G2 (bsc#1031717).
- alsa: hda - add support for docking station for HP 840 G3 (bsc#1031717).
- alsa: hda - change the location for one mic on a Lenovo machine (bsc#1031717).
- alsa: hda - fix headset mic detection issue on a Dell machine (bsc#1031717).
- alsa: hda - fix headset mic problem for Dell machines with alc274 (bsc#1031717).
- alsa: hda/realtek - ALC891 headset mode for Dell (bsc#1031717).
- alsa: hda/realtek - Add ALC256 HP depop function (bsc#1031717).
- alsa: hda/realtek - Add default procedure for suspend and resume state (bsc#1031717).
- alsa: hda/realtek - Add support for ALC1220 (bsc#1031717).
- alsa: hda/realtek - Add support for Acer Aspire E5-475 headset mic (bsc#1031717).
- alsa: hda/realtek - Add support for headset MIC for ALC622 (bsc#1031717).
- alsa: hda/realtek - Enable jack detection function for Intel ALC700 (bsc#1031717).
- alsa: hda/realtek - Fix ALC275 no sound issue (bsc#1031717).
- alsa: hda/realtek - Fix Dell AIO LineOut issue (bsc#1031717).
- alsa: hda/realtek - Fix headset and mic on several Asus laptops with ALC256 (bsc#1031717).
- alsa: hda/realtek - Fix headset mic and speaker on Asus X441SA/X441UV (bsc#1031717).
- alsa: hda/realtek - Fix headset mic on several Asus laptops with ALC255 (bsc#1031717).
- alsa: hda/realtek - Fix pincfg for Dell XPS 13 9370 (bsc#1031717).
- alsa: hda/realtek - Fix speaker support for Asus AiO ZN270IE (bsc#1031717).
- alsa: hda/realtek - Fix typo of pincfg for Dell quirk (bsc#1031717).
- alsa: hda/realtek - New codec device ID for ALC1220 (bsc#1031717).
- alsa: hda/realtek - New codec support for ALC257 (bsc#1031717).
- alsa: hda/realtek - New codec support of ALC1220 (bsc#1031717).
- alsa: hda/realtek - New codecs support for ALC215/ALC285/ALC289 (bsc#1031717).
- alsa: hda/realtek - No loopback on ALC225/ALC295 codec (bsc#1031717).
- alsa: hda/realtek - Remove ALC285 device ID (bsc#1031717).
- alsa: hda/realtek - Support Dell headset mode for ALC3271 (bsc#1031717).
- alsa: hda/realtek - Support headset mode for ALC234/ALC274/ALC294 (bsc#1031717).
- alsa: hda/realtek - There is no loopback mixer in the ALC234/274/294 (bsc#1031717).
- alsa: hda/realtek - Update headset mode for ALC225 (bsc#1031717).
- alsa: hda/realtek - Update headset mode for ALC298 (bsc#1031717).
- alsa: hda/realtek - change the location for one of two front microphones (bsc#1031717).
- alsa: hda/realtek - fix headset mic detection for MSI MS-B120 (bsc#1031717).
- alsa: hda: Drop useless WARN_ON() (bsc#1031717).
- alsa: pcm: Abort properly at pending signal in OSS read/write loops (bsc#1031717).
- alsa: pcm: Add missing error checks in OSS emulation plugin builder (bsc#1031717).
- alsa: pcm: Allow aborting mutex lock at OSS read/write loops (bsc#1031717).
- alsa: pcm: Remove incorrect snd_BUG_ON() usages (bsc#1031717).
- alsa: pcm: Remove yet superfluous WARN_ON() (bsc#1031717).
- alsa: pcm: prevent UAF in snd_pcm_info (bsc#1031717).
- alsa: rawmidi: Avoid racy info ioctl via ctl device (bsc#1031717).
- alsa: seq: Remove spurious WARN_ON() at timer check (bsc#1031717).
- alsa: usb-audio: Add check return value for usb_string() (bsc#1031717).
- alsa: usb-audio: Fix out-of-bound error (bsc#1031717).
- alsa: usb-audio: Fix the missing ctl name suffix at parsing SU (bsc#1031717).
- arm-ccn: perf: Prevent module unload while PMU is in use (bnc#1012382).
- arm64/cpufeature: do not use mutex in bringup path (bsc#1068032).
- arm64: Add hypervisor safe helper for checking constant capabilities (bsc#1068032).
- arm64: Add macros to read/write system registers (bsc#1068032).
- arm64: Add skeleton to harden the branch predictor against aliasing attacks (bsc#1068032).
- arm64: Add trace_hardirqs_off annotation in ret_to_user (bsc#1068032).
- arm64: Disable TTBR0_EL1 during normal kernel execution (bsc#1068032).
- arm64: Disable kpti for non broadcast TLB HW (bsc#1068032).
- arm64: Enable CONFIG_ARM64_SW_TTBR0_PAN (bsc#1068032).
- arm64: Factor out PAN enabling/disabling into separate uaccess_* macros (bsc#1068032).
- arm64: Factor out TTBR0_EL1 post-update workaround into a specific asm macro (bsc#1068032).
- arm64: Fix circular include of asm/lse.h through linux/jump_label.h (bsc#1068032).
- arm64: Fix compilation (bsc#1068032).
- arm64: Handle el1 synchronous instruction aborts cleanly (bsc#1068032).
- arm64: Implement branch predictor hardening for affected Cortex-A CPUs (bsc#1068032).
- arm64: Initialise high_memory global variable earlier (bnc#1012382).
- arm64: Introduce uaccess_{disable,enable} functionality based on TTBR0_EL1 (bsc#1068032).
- arm64: Kconfig: Add CONFIG_UNMAP_KERNEL_AT_EL0 (bsc#1068032).
- arm64: Kconfig: Reword UNMAP_KERNEL_AT_EL0 kconfig entry (bsc#1068032).
- arm64: Mask all exceptions during kernel_exit (bsc#1068032).
- arm64: Move BP hardening to check_and_switch_context (bsc#1068032).
- arm64: Move post_ttbr_update_workaround to C code (bsc#1068032).
- arm64: Move the async/fiq helpers to explicitly set process context flags (bsc#1068032).
- arm64: SW PAN: Point saved ttbr0 at the zero page when switching to init_mm (bsc#1068032).
- arm64: SW PAN: Update saved ttbr0 value on enter_lazy_tlb (bsc#1068032).
- arm64: Store struct thread_info in sp_el0 (bsc#1068032).
- arm64: Take into account ID_AA64PFR0_EL1.CSV3 (bsc#1068032).
- arm64: Use static keys for CPU features (bsc#1068032).
- arm64: add macro to extract ESR_ELx.EC (bsc#1068032).
- arm64: alternative: add auto-nop infrastructure (bsc#1068032).
- arm64: barriers: introduce nops and __nops macros for NOP sequences (bsc#1068032).
- arm64: cpu_errata: Allow an erratum to be match for all revisions of a core (bsc#1068032).
- arm64: cpufeature: Add scope for capability check (bsc#1068032).
- arm64: cpufeature: Pass capability structure to -&gt;enable callback (bsc#1068032).
- arm64: debug: remove unused local_dbg_{enable, disable} macros (bsc#1068032).
- arm64: do not pull uaccess.h into *.S (bsc#1068032).
- arm64: entry.S convert el0_sync (bsc#1068032).
- arm64: entry.S: Remove disable_dbg (bsc#1068032).
- arm64: entry.S: convert el1_sync (bsc#1068032).
- arm64: entry.S: convert elX_irq (bsc#1068032).
- arm64: entry.S: move SError handling into a C function for future expansion (bsc#1068032).
- arm64: entry: Add exception trampoline page for exceptions from EL0 (bsc#1068032).
- arm64: entry: Add fake CPU feature for unmapping the kernel at EL0 (bsc#1068032).
- arm64: entry: Explicitly pass exception level to kernel_ventry macro (bsc#1068032).
- arm64: entry: Hook up entry trampoline to exception vectors (bsc#1068032).
- arm64: entry: remove pointless SPSR mode check (bsc#1068032).
- arm64: explicitly mask all exceptions (bsc#1068032).
- arm64: factor out PAGE_* and CONT_* definitions (bsc#1068032).
- arm64: factor out entry stack manipulation (bsc#1068032).
- arm64: factor work_pending state machine to C (bsc#1068032).
- arm64: fpsimd: Prevent registers leaking from dead tasks (bnc#1012382).
- arm64: head.S: get rid of x25 and x26 with 'global' scope (bsc#1068032).
- arm64: introduce an order for exceptions (bsc#1068032).
- arm64: introduce mov_q macro to move a constant into a 64-bit register (bsc#1068032).
- arm64: kaslr: Put kernel vectors address in separate data page (bsc#1068032).
- arm64: kill ESR_LNX_EXEC (bsc#1068032).
- arm64: kpti: Fix the interaction between ASID switching and software PAN (bsc#1068032).
- arm64: kvm: Fix SMCCC handling of unimplemented SMC/HVC calls (bnc#1012382).
- arm64: kvm: Survive unknown traps from guests (bnc#1012382).
- arm64: kvm: Use per-CPU vector when BP hardening is enabled (bsc#1068032).
- arm64: kvm: fix VTTBR_BADDR_MASK BUG_ON off-by-one (bnc#1012382).
- arm64: mm: Add arm64_kernel_unmapped_at_el0 helper (bsc#1068032).
- arm64: mm: Allocate ASIDs in pairs (bsc#1068032).
- arm64: mm: Fix and re-enable ARM64_SW_TTBR0_PAN (bsc#1068032).
- arm64: mm: Introduce TTBR_ASID_MASK for getting at the ASID in the TTBR (bsc#1068032).
- arm64: mm: Invalidate both kernel and user ASIDs when performing TLBI (bsc#1068032).
- arm64: mm: Map entry trampoline into trampoline and kernel page tables (bsc#1068032).
- arm64: mm: Move ASID from TTBR0 to TTBR1 (bsc#1068032).
- arm64: mm: Rename post_ttbr0_update_workaround (bsc#1068032).
- arm64: mm: Temporarily disable ARM64_SW_TTBR0_PAN (bsc#1068032).
- arm64: mm: Use non-global mappings for kernel space (bsc#1068032).
- arm64: mm: hardcode rodata=true (bsc#1068032).
- arm64: swp emulation: bound LL/SC retries before rescheduling (bsc#1068032).
- arm64: sysreg: Fix unprotected macro argmuent in write_sysreg (bsc#1068032).
- arm64: sysreg: allow write_sysreg to use XZR (bsc#1068032).
- arm64: tlbflush.h: add __tlbi() macro (bsc#1068032).
- arm64: tls: Avoid unconditional zeroing of tpidrro_el0 for native tasks (bsc#1068032).
- arm64: use RET instruction for exiting the trampoline (bsc#1068032).
- arm64: use alternative auto-nop (bsc#1068032).
- arm64: xen: Enable user access before a privcmd hvc call (bsc#1068032).
- arm: BUG if jumping to usermode address in kernel mode (bnc#1012382).
- arm: OMAP1: DMA: Correct the number of logical channels (bnc#1012382).
- arm: OMAP2+: Fix device node reference counts (bnc#1012382).
- arm: OMAP2+: Release device node after it is no longer needed (bnc#1012382).
- arm: OMAP2+: gpmc-onenand: propagate error on initialization failure (bnc#1012382).
- arm: avoid faulting on qemu (bnc#1012382).
- arm: dma-mapping: disallow dma_get_sgtable() for non-kernel managed memory (bnc#1012382).
- arm: dts: am335x-evmsk: adjust mmc2 param to allow suspend (bnc#1012382).
- arm: dts: kirkwood: fix pin-muxing of MPP7 on OpenBlocks A7 (bnc#1012382).
- arm: dts: omap3: logicpd-torpedo-37xx-devkit: Fix MMC1 cd-gpio (bnc#1012382).
- arm: dts: ti: fix PCI bus dtc warnings (bnc#1012382).
- arm: kprobes: Align stack to 8-bytes in test code (bnc#1012382).
- arm: kprobes: Fix the return address of multiple kretprobes (bnc#1012382).
- arm: kvm: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bnc#1012382).
- arm: kvm: Survive unknown traps from guests (bnc#1012382).
- asm-prototypes: Clear any CPP defines before declaring the functions (git-fixes).
- asn.1: check for error from ASN1_OP_END__ACT actions (bnc#1012382).
- asn.1: fix out-of-bounds read when parsing indefinite length item (bnc#1012382).
- asoc: fsl_ssi: AC'97 ops need regmap, clock and cleaning up on failure (bsc#1031717).
- asoc: twl4030: fix child-node lookup (bsc#1031717).
- asoc: wm_adsp: Fix validation of firmware and coeff lengths (bsc#1031717).
- ath9k: fix tx99 potential info leak (bnc#1012382).
- atm: horizon: Fix irq release error (bnc#1012382).
- audit: ensure that 'audit=1' actually enables audit for PID 1 (bnc#1012382).
- axonram: Fix gendisk handling (bnc#1012382).
- backlight: pwm_bl: Fix overflow condition (bnc#1012382).
- bcache.txt: standardize document format (bsc#1076110).
- bcache: Avoid nested function definition (bsc#1076110).
- bcache: Do not reinvent the wheel but use existing llist API (bsc#1076110).
- bcache: Fix building error on MIPS (bnc#1012382).
- bcache: Remove deprecated create_workqueue (bsc#1076110).
- bcache: Remove redundant block_size assignment (bsc#1076110).
- bcache: Remove redundant parameter for cache_alloc() (bsc#1076110).
- bcache: Remove redundant set_capacity (bsc#1076110).
- bcache: Update continue_at() documentation (bsc#1076110).
- bcache: add a comment in journal bucket reading (bsc#1076110).
- bcache: check return value of register_shrinker (bsc#1076110).
- bcache: debug: avoid accessing .bi_io_vec directly (bsc#1076110).
- bcache: do not write back data if reading it failed (bsc#1076110).
- bcache: documentation formatting, edited for clarity, stripe alignment notes (bsc#1076110).
- bcache: documentation updates and corrections (bsc#1076110).
- bcache: explicitly destroy mutex while exiting (bnc#1012382).
- bcache: fix a comments typo in bch_alloc_sectors() (bsc#1076110).
- bcache: fix sequential large write IO bypass (bsc#1076110).
- bcache: fix wrong cache_misses statistics (bnc#1012382).
- bcache: gc does not work when triggering by manual command (bsc#1076110, bsc#1038078).
- bcache: implement PI controller for writeback rate (bsc#1076110).
- bcache: increase the number of open buckets (bsc#1076110).
- bcache: only permit to recovery read error when cache device is clean (bnc#1012382 bsc#1043652).
- bcache: partition support: add 16 minors per bcacheN device (bsc#1076110).
- bcache: pr_err: more meaningful error message when nr_stripes is invalid (bsc#1076110).
- bcache: rearrange writeback main thread ratelimit (bsc#1076110).
- bcache: recover data from backing when data is clean (bnc#1012382 bsc#1043652).
- bcache: register_bcache(): call blkdev_put() when cache_alloc() fails (bsc#1076110).
- bcache: remove unused parameter (bsc#1076110).
- bcache: rewrite multiple partitions support (bsc#1076110, bsc#1038085, bsc#1019784).
- bcache: safeguard a dangerous addressing in closure_queue (bsc#1076110).
- bcache: silence static checker warning (bsc#1076110).
- bcache: smooth writeback rate control (bsc#1076110).
- bcache: switch to using blk_queue_write_cache() (bsc#1076110).
- bcache: update bio-&gt;bi_opf bypass/writeback REQ_ flag hints (bsc#1076110).
- bcache: update bucket_in_use in real time (bsc#1076110).
- bcache: update document info (bsc#1076110).
- bcache: use kmalloc to allocate bio in bch_data_verify() (bsc#1076110).
- bcache: use llist_for_each_entry_safe() in __closure_wake_up() (bsc#1076110).
- bcache: writeback rate clamping: make 32 bit safe (bsc#1076110).
- bcache: writeback rate shouldn't artifically clamp (bsc#1076110).
- be2net: restore properly promisc mode after queues reconfiguration (bsc#963844).
- block: export bio_free_pages to other modules (bsc#1076110).
- block: wake up all tasks blocked in get_request() (bnc#1012382).
- bluetooth: btusb: driver to enable the usb-wakeup feature (bnc#1012382).
- bnx2x: do not rollback VF MAC/VLAN filters we did not configure (bnc#1012382).
- bnx2x: fix possible overrun of VFPF multicast addresses array (bnc#1012382).
- bnx2x: prevent crash when accessing PTP with interface down (bnc#1012382).
- btrfs: account for pinned bytes in should_alloc_chunk (bsc#1066842).
- btrfs: add missing memset while reading compressed inline extents (bnc#1012382).
- btrfs: clear space cache inode generation always (bnc#1012382).
- can: af_can: can_rcv(): replace WARN_ONCE by pr_warn_once (bnc#1012382).
- can: af_can: canfd_rcv(): replace WARN_ONCE by pr_warn_once (bnc#1012382).
- can: ems_usb: cancel urb on -EPIPE and -EPROTO (bnc#1012382).
- can: esd_usb2: cancel urb on -EPIPE and -EPROTO (bnc#1012382).
- can: gs_usb: fix return value of the 'set_bittiming' callback (bnc#1012382).
- can: kvaser_usb: Fix comparison bug in kvaser_usb_read_bulk_callback() (bnc#1012382).
- can: kvaser_usb: cancel urb on -EPIPE and -EPROTO (bnc#1012382).
- can: kvaser_usb: free buf in error paths (bnc#1012382).
- can: kvaser_usb: ratelimit errors if incomplete messages are received (bnc#1012382).
- can: peak: fix potential bug in packet fragmentation (bnc#1012382).
- can: ti_hecc: Fix napi poll return value for repoll (bnc#1012382).
- can: usb_8dev: cancel urb on -EPIPE and -EPROTO (bnc#1012382).
- cdc-acm: apply quirk for card reader (bsc#1060279).
- cdrom: factor out common open_for_* code (bsc#1048585).
- cdrom: wait for tray to close (bsc#1048585).
- ceph: drop negative child dentries before try pruning inode's alias (bnc#1012382).
- ceph: more accurate statfs (bsc#1077068).
- clk: imx6: refine hdmi_isfr's parent to make HDMI work on i.MX6 SoCs w/o VPU (bnc#1012382).
- clk: mediatek: add the option for determining PLL source clock (bnc#1012382).
- clk: tegra: Fix cclk_lp divisor register (bnc#1012382).
- cpuidle: Validate cpu_dev in cpuidle_add_sysfs() (bnc#1012382).
- cpuidle: fix broadcast control when broadcast can not be entered (bnc#1012382).
- cpuidle: powernv: Pass correct drv-&gt;cpumask for registration (bnc#1012382).
- crypto: algapi - fix NULL dereference in crypto_remove_spawns() (bnc#1012382).
- crypto: chacha20poly1305 - validate the digest size (bnc#1012382).
- crypto: crypto4xx - increase context and scatter ring buffer elements (bnc#1012382).
- crypto: deadlock between crypto_alg_sem/rtnl_mutex/genl_mutex (bnc#1012382).
- crypto: mcryptd - protect the per-CPU queue with a lock (bnc#1012382).
- crypto: n2 - cure use after free (bnc#1012382).
- crypto: pcrypt - fix freeing pcrypt instances (bnc#1012382).
- crypto: s5p-sss - Fix completing crypto request in IRQ handler (bnc#1012382).
- crypto: tcrypt - fix buffer lengths in test_aead_speed() (bnc#1012382).
- cxl: Check if vphb exists before iterating over AFU devices (bsc#1066223).
- dax: Pass detailed error code from __dax_fault() (bsc#1072484).
- dccp: don't restart ccid2_hc_tx_rto_expire() if sk in closed state (bnc#1012382).
- delay: add poll_event_interruptible (bsc#1048585).
- dm btree: fix serious bug in btree_split_beneath() (bnc#1012382).
- dm bufio: fix shrinker scans when (nr_to_scan &lt; retain_target) (bnc#1012382).
- dm thin metadata: THIN_MAX_CONCURRENT_LOCKS should be 6 (bnc#1012382).
- dmaengine: Fix array index out of bounds warning in __get_unmap_pool() (bnc#1012382).
- dmaengine: dmatest: move callback wait queue to thread context (bnc#1012382).
- dmaengine: pl330: fix double lock (bnc#1012382).
- dmaengine: ti-dma-crossbar: Correct am335x/am43xx mux value type (bnc#1012382).
- drivers/firmware: Expose psci_get_version through psci_ops structure (bsc#1068032).
- drivers/md/bcache/util.h: remove duplicate inclusion of blkdev.h (bsc#1076110).
- drivers: base: cacheinfo: fix boot error message when acpi is enabled (bnc#1012382).
- drivers: base: cacheinfo: fix x86 with CONFIG_OF enabled (bnc#1012382).
- drivers: net: xgene: Fix hardware checksum setting (bsc#1078526).
- drm/amd/amdgpu: fix console deadlock if late init failed (bnc#1012382).
- drm/exynos/decon5433: set STANDALONE_UPDATE_F on output enablement (bnc#1012382).
- drm/exynos: gem: Drop NONCONTIG flag for buffers allocated without IOMMU (bnc#1012382).
- drm/omap: fix dmabuf mmap for dma_alloc'ed buffers (bnc#1012382).
- drm/radeon/si: add dpm quirk for Oland (bnc#1012382).
- drm/radeon: fix atombios on big endian (bnc#1012382).
- drm/radeon: reinstate oland workaround for sclk (bnc#1012382).
- drm/vmwgfx: Potential off by one in vmw_view_add() (bnc#1012382).
- drm: extra printk() wrapper macros (bnc#1012382).
- dynamic-debug-howto: fix optional/omitted ending line number to be LARGE instead of 0 (bnc#1012382).
- edac, i5000, i5400: Fix definition of NRECMEMB register (bnc#1012382).
- edac, i5000, i5400: Fix use of MTR_DRAM_WIDTH macro (bnc#1012382).
- edac, sb_edac: Fix missing break in switch (bnc#1012382).
- eeprom: at24: check at24_read/write arguments (bnc#1012382).
- efi/esrt: Cleanup bad memory map log messages (bnc#1012382).
- efi: Move some sysfs files to be read-only by root (bnc#1012382).
- eventpoll.h: add missing epoll event masks (bnc#1012382).
- ext4: Fix ENOSPC handling in DAX page fault handle (bsc#1072484).
- ext4: fix crash when a directory's i_size is too small (bnc#1012382).
- ext4: fix fdatasync(2) after fallocate(2) operation (bnc#1012382).
- fbdev: controlfb: Add missing modes to fix out of bounds access (bnc#1012382).
- fjes: Fix wrong netdevice feature flags (bnc#1012382).
- flow_dissector: properly cap thoff field (bnc#1012382).
- fm10k: ensure we process SM mbx when processing VF mbx (bnc#1012382).
- fork: clear thread stack upon allocation (bsc#1077560). Conflicts: 	series.conf
- fscache: Fix the default for fscache_maybe_release_page() (bnc#1012382).
- futex: Prevent overflow by strengthen input validation (bnc#1012382).
- gcov: disable for COMPILE_TEST (bnc#1012382).
- gfs2: Take inode off order_write list when setting jdata flag (bnc#1012382).
- gpio: altera: Use handle_level_irq when configured as a level_high (bnc#1012382).
- hid: chicony: Add support for another ASUS Zen AiO keyboard (bnc#1012382).
- hid: xinmo: fix for out of range for THT 2P arcade controller (bnc#1012382).
- hrtimer: Reset hrtimer cpu base proper on CPU hotplug (bnc#1012382).
- hv: kvp: Avoid reading past allocated blocks from KVP file (bnc#1012382).
- hwmon: (asus_atk0110) fix uninitialized data access (bnc#1012382).
- i40e: Do not enable NAPI on q_vectors that have no rings (bnc#1012382).
- ib/hfi1: Correct defered count after processing qp_wait_list (git-fixes).
- ib/hfi1: Fix rnr_timer addition (git-fixes).
- ib/hfi1: Handle kzalloc failure in init_pervl_scs (git-fixes).
- ib/hfi1: Move iowait_init() to priv allocate (git-fixes).
- ib/hfi1: Prevent kernel QP post send hard lockups (git-fixes).
- ib/hfi1: Reset QSFP on every run through channel tuning (git-fixes).
- ib/ipoib: Fix lockdep issue found on ipoib_ib_dev_heavy_flush (git-fixes).
- ib/ipoib: Grab rtnl lock on heavy flush when calling ndo_open/stop (bnc#1012382).
- ib/mlx4: Increase maximal message size under UD QP (bnc#1012382).
- ib/mlx5: Assign send CQ and recv CQ of UMR QP (bnc#1012382).
- ib/qib: Remove qpt_mask global (git-fixes).
- ib/rdmavt: restore IRQs on error path in rvt_create_ah() (git-fixes).
- ib/srpt: Disable RDMA access by the initiator (bnc#1012382).
- ibmvnic: Allocate and request vpd in init_resources (bsc#1076872).
- ibmvnic: Do not handle RX interrupts when not up (bsc#1075066).
- ibmvnic: Fix IP offload control buffer (bsc#1076899).
- ibmvnic: Fix IPv6 packet descriptors (bsc#1076899).
- ibmvnic: Fix pending MAC address changes (bsc#1075627).
- ibmvnic: Modify buffer size and number of queues on failover (bsc#1076872).
- ibmvnic: Revert to previous mtu when unsupported value requested (bsc#1076872).
- ibmvnic: Wait for device response when changing MAC (bsc#1078681).
- igb: check memory allocation failure (bnc#1012382).
- ima: fix hash algorithm initialization (bnc#1012382).
- inet: frag: release spinlock before calling icmp_send() (bnc#1012382).
- input: 88pm860x-ts - fix child-node lookup (bnc#1012382).
- input: elantech - add new icbody type 15 (bnc#1012382).
- input: i8042 - add TUXEDO BU1406 (N24_25BU) to the nomux list (bnc#1012382).
- input: twl4030-vibra - fix sibling-node lookup (bnc#1012382).
- input: twl6040-vibra - fix DT node memory management (bnc#1012382).
- input: twl6040-vibra - fix child-node lookup (bnc#1012382).
- intel_th: pci: Add Gemini Lake support (bnc#1012382).
- iommu/arm-smmu-v3: Do not free page table ops twice (bnc#1012382).
- iommu/vt-d: Fix scatterlist offset handling (bnc#1012382).
- ip6_tunnel: disable dst caching if tunnel is dual-stack (bnc#1012382).
- ipmi: Stop timers before cleaning up the module (bnc#1012382).
- ipv4: Fix use-after-free when flushing FIB tables (bnc#1012382).
- ipv4: Make neigh lookup keys for loopback/point-to-point devices be INADDR_ANY (bnc#1012382).
- ipv4: igmp: guard against silly MTU values (bnc#1012382).
- ipv6: Fix getsockopt() for sockets with default IPV6_AUTOFLOWLABEL (bnc#1012382).
- ipv6: fix possible mem leaks in ipv6_make_skb() (bnc#1012382).
- ipv6: fix udpv6 sendmsg crash caused by too small MTU (bnc#1012382).
- ipv6: ip6_make_skb() needs to clear cork.base.dst (git-fixes).
- ipv6: mcast: better catch silly mtu values (bnc#1012382).
- ipv6: reorder icmpv6_init() and ip6_mr_init() (bnc#1012382).
- ipvlan: fix ipv6 outbound device (bnc#1012382).
- ipvlan: remove excessive packet scrubbing (bsc#1070799).
- irda: vlsi_ir: fix check for DMA mapping errors (bnc#1012382).
- irqchip/crossbar: Fix incorrect type of register size (bnc#1012382).
- iscsi-target: Make TASK_REASSIGN use proper se_cmd-&gt;cmd_kref (bnc#1012382).
- iscsi-target: fix memory leak in lio_target_tiqn_addtpg() (bnc#1012382).
- isdn: kcapi: avoid uninitialized data (bnc#1012382).
- iw_cxgb4: Only validate the MSN for successful completions (bnc#1012382).
- ixgbe: fix use of uninitialized padding (bnc#1012382).
- jump_label: Invoke jump_label_test() via early_initcall() (bnc#1012382).
- jump_label: Make it possible for arches to invoke jump_label_init() earlier (bsc#1068032).
- jump_labels: Allow array initialisers (bsc#1068032).
- kABI: protect struct bpf_map (kabi).
- kABI: protect struct ipv6_pinfo (kabi).
- kABI: protect struct t10_alua_tg_pt_gp (kabi).
- kabi fix for new hash_cred function (bsc#1012917).
- kabi/severities: do not care about stuff_RSB
- kaiser: Set _PAGE_NX only if supported (bnc#1012382).
- kaiser: Set _PAGE_NX only if supported (bnc#1012382).
- kbuild: add '-fno-stack-check' to kernel build options (bnc#1012382).
- kbuild: modversions for EXPORT_SYMBOL() for asm (bsc#1074621 bsc#1068032).
- kbuild: pkg: use --transform option to prefix paths in tar (bnc#1012382).
- kdb: Fix handling of kallsyms_symbol_next() return value (bnc#1012382).
- kernel/acct.c: fix the acct-&gt;needcheck check in check_free_space() (bnc#1012382).
- kernel/signal.c: protect the SIGNAL_UNKILLABLE tasks from !sig_kernel_only() signals (bnc#1012382).
- kernel/signal.c: protect the traced SIGNAL_UNKILLABLE tasks from SIGKILL (bnc#1012382).
- kernel/signal.c: remove the no longer needed SIGNAL_UNKILLABLE check in complete_signal() (bnc#1012382).
- kernel: make groups_sort calling a responsibility group_info allocators (bnc#1012382).
- keys: add missing permission check for request_key() destination (bnc#1012382).
- kprobes/x86: Disable preemption in ftrace-based jprobes (bnc#1012382).
- kpti: Rename to PAGE_TABLE_ISOLATION (bnc#1012382).
- kpti: Report when enabled (bnc#1012382).
- kvm: Fix stack-out-of-bounds read in write_mmio (bnc#1012382).
- kvm: VMX: Fix enable VPID conditions (bnc#1012382).
- kvm: VMX: remove I/O port 0x80 bypass on Intel hosts (bnc#1012382).
- kvm: X86: Fix load RFLAGS w/o the fixed bit (bnc#1012382).
- kvm: arm/arm64: Fix occasional warning from the timer work function (bnc#1012382 bsc#988524).
- kvm: nVMX: VMCLEAR should not cause the vCPU to shut down (bnc#1012382).
- kvm: nVMX: reset nested_run_pending if the vCPU is going to be reset (bnc#1012382).
- kvm: pci-assign: do not map smm memory slot pages in vt-d page tables (bnc#1012382).
- kvm: s390: wire up bpb feature (bsc#1076806).
- kvm: vmx: Scrub hardware GPRs at VM-exit (bnc#1012382).
- kvm: x86: Add memory barrier on vmcs field lookup (bnc#1012382).
- kvm: x86: Exit to user-mode on #UD intercept when emulator requires (bnc#1012382).
- kvm: x86: correct async page present tracepoint (bnc#1012382).
- kvm: x86: fix RSM when PCID is non-zero (bnc#1012382).
- kvm: x86: inject exceptions produced by x86_decode_insn (bnc#1012382).
- kvm: x86: pvclock: Handle first-time write to pvclock-page contains random junk (bnc#1012382).
- l2tp: cleanup l2tp_tunnel_delete calls (bnc#1012382).
- lan78xx: Fix failure in USB Full Speed (bnc#1012382).
- lib/genalloc.c: make the avail variable an atomic_long_t (bnc#1012382).
- libata: apply MAX_SEC_1024 to all LITEON EP1 series devices (bnc#1012382).
- libata: drop WARN from protocol error in ata_sff_qc_issue() (bnc#1012382).
- macvlan: Only deliver one copy of the frame to the macvlan interface (bnc#1012382).
- md-cluster: free md_cluster_info if node leave cluster (bnc#1012382).
- media: dvb: i2c transfers over usb cannot be done from stack (bnc#1012382).
- mfd: cros ec: spi: Do not send first message too soon (bnc#1012382).
- mfd: twl4030-audio: Fix sibling-node lookup (bnc#1012382).
- mfd: twl6040: Fix child-node lookup (bnc#1012382).
- mlxsw: reg: Fix SPVM max record count (bnc#1012382).
- mlxsw: reg: Fix SPVMLR max record count (bnc#1012382).
- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack (bnc#1012382).
- mm/vmstat: Make NR_TLB_REMOTE_FLUSH_RECEIVED available even on UP (bnc#1012382).
- mm: Handle 0 flags in _calc_vm_trans() macro (bnc#1012382).
- mm: Introduce lm_alias (bsc#1068032).
- mm: avoid returning VM_FAULT_RETRY from -&gt;page_mkwrite handlers (bnc#1012382).
- mm: drop unused pmdp_huge_get_and_clear_notify() (bnc#1012382).
- mmc: core: Do not leave the block driver in a suspended state (bnc#1012382).
- mmc: mediatek: Fixed bug where clock frequency could be set wrong (bnc#1012382).
- module: set __jump_table alignment to 8 (bnc#1012382).
- more bio_map_user_iov() leak fixes (bnc#1012382).
- mtd: nand: Fix writing mtdoops to nand flash (bnc#1012382).
- n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD) (bnc#1012382).
- net/appletalk: Fix kernel memory disclosure (bnc#1012382).
- net/mac80211/debugfs.c: prevent build failure with CONFIG_UBSAN=y (bnc#1012382).
- net/packet: fix a race in packet_bind() and packet_notifier() (bnc#1012382).
- net: Allow neigh contructor functions ability to modify the primary_key (bnc#1012382).
- net: Do not allow negative values for busy_read and busy_poll sysctl interfaces (bnc#1012382).
- net: Fix double free and memory corruption in get_net_ns_by_id() (bnc#1012382).
- net: Resend IGMP memberships upon peer notification (bnc#1012382).
- net: bcmgenet: Power up the internal PHY before probing the MII (bnc#1012382).
- net: bcmgenet: correct MIB access of UniMAC RUNT counters (bnc#1012382).
- net: bcmgenet: correct the RBUF_OVFL_CNT and RBUF_ERR_CNT MIB values (bnc#1012382).
- net: bcmgenet: power down internal phy if open or resume fails (bnc#1012382).
- net: bcmgenet: reserved phy revisions must be checked first (bnc#1012382).
- net: bridge: fix early call to br_stp_change_bridge_id and plug newlink leaks (bnc#1012382).
- net: core: fix module type in sock_diag_bind (bnc#1012382).
- net: fec: fix multicast filtering hardware setup (bnc#1012382).
- net: igmp: Use correct source address on IGMPv3 reports (bnc#1012382).
- net: igmp: fix source address check for IGMPv3 reports (bnc#1012382).
- net: initialize msg.msg_flags in recvfrom (bnc#1012382).
- net: ipv4: fix for a race condition in raw_sendmsg (bnc#1012382).
- net: mvmdio: disable/unprepare clocks in EPROBE_DEFER case (bnc#1012382).
- net: mvneta: clear interface link status on port disable (bnc#1012382).
- net: phy: at803x: Change error to EINVAL for invalid MAC (bnc#1012382).
- net: phy: micrel: ksz9031: reconfigure autoneg after phy autoneg workaround (bnc#1012382).
- net: qdisc_pkt_len_init() should be more robust (bnc#1012382).
- net: qmi_wwan: Add USB IDs for MDM6600 modem on Motorola Droid 4 (bnc#1012382).
- net: qmi_wwan: add Sierra EM7565 1199:9091 (bnc#1012382).
- net: reevalulate autoflowlabel setting after sysctl setting (bnc#1012382).
- net: sctp: fix array overrun read on sctp_timer_tbl (bnc#1012382).
- net: stmmac: enable EEE in MII, GMII or RGMII only (bnc#1012382).
- net: systemport: Pad packet before inserting TSB (bnc#1012382).
- net: systemport: Utilize skb_put_padto() (bnc#1012382).
- net: tcp: close sock if net namespace is exiting (bnc#1012382).
- net: wimax/i2400m: fix NULL-deref at probe (bnc#1012382).
- netfilter: bridge: honor frag_max_size when refragmenting (bnc#1012382).
- netfilter: do not track fragmented packets (bnc#1012382).
- netfilter: ipvs: Fix inappropriate output of procfs (bnc#1012382).
- netfilter: nfnetlink_queue: fix secctx memory leak (bnc#1012382).
- netfilter: nfnetlink_queue: fix timestamp attribute (bsc#1074134).
- netfilter: nfnl_cthelper: Fix memory leak (bnc#1012382).
- netfilter: nfnl_cthelper: fix a race when walk the nf_ct_helper_hash table (bnc#1012382).
- netfilter: nfnl_cthelper: fix runtime expectation policy updates (bnc#1012382).
- netlink: add a start callback for starting a netlink dump (bnc#1012382).
- nfs: Do not take a reference on fl-&gt;fl_file for LOCK operation (bnc#1012382).
- nfs: Fix a typo in nfs_rename() (bnc#1012382).
- nfs: improve shinking of access cache (bsc#1012917).
- nfsd: Fix another OPEN stateid race (bnc#1012382).
- nfsd: Fix stateid races between OPEN and CLOSE (bnc#1012382).
- nfsd: Make init_open_stateid() a bit more whole (bnc#1012382).
- nfsd: auth: Fix gid sorting when rootsquash enabled (bnc#1012382).
- nfsd: fix nfsd_minorversion(.., NFSD_AVAIL) (bnc#1012382).
- nfsd: fix nfsd_reset_versions for NFSv4 (bnc#1012382).
- nfsv4.1 respect server's max size in CREATE_SESSION (bnc#1012382).
- nfsv4: Fix client recovery when server reboots multiple times (bnc#1012382).
- nohz: Prevent a timer interrupt storm in tick_nohz_stop_sched_tick() (bnc#1012382).
- openrisc: fix issue handling 8 byte get_user calls (bnc#1012382).
- packet: fix crash in fanout_demux_rollover() (bnc#1012382).
- parisc: Fix alignment of pa_tlb_lock in assembly on 32-bit SMP kernel (bnc#1012382).
- parisc: Hide Diva-built-in serial aux and graphics card (bnc#1012382).
- partially revert tipc improve link resiliency when rps is activated (bsc#1068038).
- pci / PM: Force devices to D0 in pci_pm_thaw_noirq() (bnc#1012382).
- pci/AER: Report non-fatal errors only to the affected endpoint (bnc#1012382).
- pci/PME: Handle invalid data when reading Root Status (bnc#1012382).
- pci: Avoid bus reset if bridge itself is broken (bnc#1012382).
- pci: Create SR-IOV virtfn/physfn links before attaching driver (bnc#1012382).
- pci: Detach driver before procfs &amp; sysfs teardown on device remove (bnc#1012382).
- perf symbols: Fix symbols__fixup_end heuristic for corner cases (bnc#1012382).
- perf test attr: Fix ignored test case result (bnc#1012382).
- perf: xgene: Add support for SoC PMU version 3 (bsc#1076809).
- perf: xgene: Include module.h (bsc#1076809).
- perf: xgene: Move PMU leaf functions into function pointer structure (bsc#1076809).
- perf: xgene: Parse PMU subnode from the match table (bsc#1076809).
- perf: xgene: Remove unnecessary managed resources cleanup (bsc#1076809).
- phy: work around 'phys' references to usb-nop-xceiv devices (bnc#1012382).
- pinctrl: adi2: Fix Kconfig build problem (bnc#1012382).
- pinctrl: st: add irq_request/release_resources callbacks (bnc#1012382).
- pipe: avoid round_pipe_size() nr_pages overflow on 32-bit (bnc#1012382).
- powerpc/64: Add macros for annotating the destination of rfid/hrfid (bsc#1068032, bsc#1075087).
- powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075087).
- powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075087).
- powerpc/64s: Add EX_SIZE definition for paca exception save areas (bsc#1068032, bsc#1075087).
- powerpc/64s: Add support for RFI flush of L1-D cache (bsc#1068032,  bsc#1075087).
- powerpc/64s: Allow control of RFI flush via debugfs (bsc#1068032, bsc#1075087).
- powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075087).
- powerpc/64s: Simple RFI macro conversions (bsc#1068032, bsc#1075087).
- powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti (bsc#1068032, bsc#1075087).
- powerpc/64s: Wire up cpu_show_meltdown() (bsc#1068032).
- powerpc/asm: Allow including ppc_asm.h in asm files (bsc#1068032, bsc#1075087).
- powerpc/ipic: Fix status get and status clear (bnc#1012382).
- powerpc/perf/hv-24x7: Fix incorrect comparison in memord (bnc#1012382).
- powerpc/perf: Dereference BHRB entries safely (bsc#1066223).
- powerpc/powernv/cpufreq: Fix the frequency read by /proc/cpuinfo (bnc#1012382).
- powerpc/powernv/ioda2: Gracefully fail if too many TCE levels requested (bnc#1012382).
- powerpc/powernv: Check device-tree for RFI flush settings (bsc#1068032,  bsc#1075087).
- powerpc/pseries/rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075087).
- powerpc/pseries: Introduce H_GET_CPU_CHARACTERISTICS (bsc#1068032, bsc#1075087).
- powerpc/pseries: Query hypervisor for RFI flush settings (bsc#1068032,  bsc#1075087).
- powerpc/pseries: include linux/types.h in asm/hvcall.h (bsc#1068032, bsc#1075087).
- powerpc/pseries: rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075087).
- powerpc/rfi-flush: Add DEBUG_RFI config option (bsc#1068032, bsc#1075087).
- powerpc/rfi-flush: Make setup_rfi_flush() not __init (bsc#1068032, bsc#1075087).
- powerpc/rfi-flush: Move RFI flush fields out of the paca (unbreak kABI) (bsc#1068032, bsc#1075087).
- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code (bsc#1068032, bsc#1075087).
- powerpc/rfi-flush: prevent crash when changing flush type to fallback after system boot (bsc#1068032, bsc#1075087).
- ppp: Destroy the mutex when cleanup (bnc#1012382).
- pppoe: take -&gt;needed_headroom of lower device into account on xmit (bnc#1012382).
- pti: unbreak EFI (bsc#1074709).
- r8152: fix the list rx_done may be used without initialization (bnc#1012382).
- r8152: prevent the driver from transmitting packets with carrier off (bnc#1012382).
- r8169: fix memory corruption on retrieval of hardware statistics (bnc#1012382).
- raid5: Set R5_Expanded on parity devices as well as data (bnc#1012382).
- ravb: Remove Rx overflow log messages (bnc#1012382).
- rbd: set max_segments to USHRT_MAX (bnc#1012382).
- rdma/cma: Avoid triggering undefined behavior (bnc#1012382).
- rdma/iser: Fix possible mr leak on device removal event (bnc#1012382).
- rds: Fix NULL pointer dereference in __rds_rdma_map (bnc#1012382).
- rds: Heap OOB write in rds_message_alloc_sgs() (bnc#1012382).
- rds: null pointer dereference in rds_atomic_free_op (bnc#1012382).
- regulator: Try to resolve regulators supplies on registration (bsc#1074847).
- regulator: core: Rely on regulator_dev_release to free constraints (bsc#1074847).
- regulator: da9063: Return an error code on probe failure (bsc#1074847).
- regulator: pwm: Fix regulator ramp delay for continuous mode (bsc#1074847).
- rfi-flush: Make DEBUG_RFI a CONFIG option (bsc#1068032, bsc#1075087).
- ring-buffer: Mask out the info bits when returning buffer page length (bnc#1012382).
- route: also update fnhe_genid when updating a route cache (bnc#1012382).
- route: update fnhe_expires for redirect when the fnhe exists (bnc#1012382).
- rtc: cmos: Initialize hpet timer before irq is registered (bsc#1077592).
- rtc: pcf8563: fix output clock rate (bnc#1012382).
- rtc: pl031: make interrupt optional (bnc#1012382).
- rtc: set the alarm to the next expiring timer (bnc#1012382).
- s390/pci: do not require AIS facility (bnc#1012382).
- s390/qeth: no ETH header for outbound AF_IUCV (bnc#1012382).
- s390/runtime instrumentation: simplify task exit handling (bnc#1012382).
- s390: always save and restore all registers on context switch (bnc#1012382).
- s390: fix compat system call table (bnc#1012382).
- sch_dsmark: fix invalid skb_cow() usage (bnc#1012382).
- sched/deadline: Make sure the replenishment timer fires in the next period (bnc#1012382).
- sched/deadline: Throttle a constrained deadline task activated after the deadline (bnc#1012382).
- sched/deadline: Use deadline instead of period when calculating overflow (bnc#1012382).
- sched/deadline: Use the revised wakeup rule for suspending constrained dl tasks (bnc#1012382).
- sched/deadline: Zero out positive runtime after throttling constrained tasks (git-fixes).
- sched/rt: Do not pull from current CPU if only one CPU to pull (bnc#1022476).
- scsi: bfa: integer overflow in debugfs (bnc#1012382).
- scsi: check for device state in __scsi_remove_target() (bsc#1072589).
- scsi: cxgb4i: fix Tx skb leak (bnc#1012382).
- scsi: fixup kernel warning during rmmod() (bsc#1052360).
- scsi: hpsa: cleanup sas_phy structures in sysfs when unloading (bnc#1012382).
- scsi: hpsa: destroy sas transport properties before scsi_host (bnc#1012382).
- scsi: libsas: align sata_device's rps_resp on a cacheline (bnc#1012382).
- scsi: lpfc: Fix PT2PT PRLI reject (bnc#1012382).
- scsi: lpfc: Fix crash during Hardware error recovery on SLI3 adapters (bnc#1012382).
- scsi: lpfc: Fix secure firmware updates (bnc#1012382).
- scsi: lpfc: PLOGI failures during NPIV testing (bnc#1012382).
- scsi: mpt3sas: Fix IO error occurs on pulling out a drive from RAID1 volume created on two SATA drive (bnc#1012382).
- scsi: sd: change allow_restart to bool in sysfs interface (bnc#1012382).
- scsi: sd: change manage_start_stop to bool in sysfs interface (bnc#1012382).
- scsi: sg: disable SET_FORCE_LOW_DMA (bnc#1012382).
- scsi: sr: wait for the medium to become ready (bsc#1048585).
- sctp: Replace use of sockets_allocated with specified macro (bnc#1012382).
- sctp: do not allow the v4 socket to bind a v4mapped v6 address (bnc#1012382).
- sctp: do not free asoc when it is already dead in sctp_sendmsg (bnc#1012382).
- sctp: return error if the asoc has been peeled off in sctp_wait_for_sndbuf (bnc#1012382).
- sctp: use the right sk after waking up from wait_buf sleep (bnc#1012382).
- selftest/powerpc: Fix false failures for skipped tests (bnc#1012382).
- selftests/x86/ldt_get: Add a few additional tests for limits (bnc#1012382).
- selftests/x86: Add test_vsyscall (bnc#1012382).
- serial: 8250: Preserve DLD[7:4] for PORT_XR17V35X (bnc#1012382).
- serial: 8250_pci: Add Amazon PCI serial device ID (bnc#1012382).
- series.conf: fix wrong bsc reference
- series.conf: whitespace cleanup
- sfc: do not warn on successful change of MAC (bnc#1012382).
- sh_eth: fix SH7757 GEther initialization (bnc#1012382).
- sh_eth: fix TSU resource handling (bnc#1012382).
- sit: update frag_off info (bnc#1012382).
- sock: free skb in skb_complete_tx_timestamp on error (bnc#1012382).
- sparc64/mm: set fields in deferred pages (bnc#1012382).
- spi: sh-msiof: Fix DMA transfer size check (bnc#1012382).
- spi: xilinx: Detect stall with Unknown commands (bnc#1012382).
- spi_ks8995: fix 'BUG: key accdaa28 not in .data!' (bnc#1012382).
- staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl (bnc#1012382).
- sunrpc: Fix rpc_task_begin trace point (bnc#1012382).
- sunrpc: add RPCSEC_GSS hash_cred() function (bsc#1012917).
- sunrpc: add auth_unix hash_cred() function (bsc#1012917).
- sunrpc: add generic_auth hash_cred() function (bsc#1012917).
- sunrpc: add hash_cred() function to rpc_authops struct (bsc#1012917).
- sunrpc: replace generic auth_cred hash with auth-specific function (bsc#1012917).
- sunrpc: use supplimental groups in auth hash (bsc#1012917).
- sunxi-rsb: Include OF based modalias in device uevent (bnc#1012382).
- sysfs/cpu: Add vulnerability folder (bnc#1012382).
- sysfs/cpu: Fix typos in vulnerability documentation (bnc#1012382).
- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).
- sysrq : fix Show Regs call trace on ARM (bnc#1012382).
- target/file: Do not return error for UNMAP if length is zero (bnc#1012382).
- target/iscsi: Fix a race condition in iscsit_add_reject_from_cmd() (bnc#1012382).
- target: Avoid early CMD_T_PRE_EXECUTE failures during ABORT_TASK (bnc#1012382).
- target: Use system workqueue for ALUA transitions (bnc#1012382).
- target: fix ALUA transition timeout handling (bnc#1012382).
- target: fix race during implicit transition work flushes (bnc#1012382).
- target:fix condition return in core_pr_dump_initiator_port() (bnc#1012382).
- tcp md5sig: Use skb's saddr when replying to an incoming segment (bnc#1012382).
- tcp: __tcp_hdrlen() helper (bnc#1012382).
- tcp: correct memory barrier usage in tcp_check_space() (bnc#1012382).
- tcp: fix under-evaluated ssthresh in TCP Vegas (bnc#1012382).
- tg3: Fix rx hang on MTU change with 5717/5719 (bnc#1012382).
- thermal/drivers/step_wise: Fix temperature regulation misbehavior (bnc#1012382).
- thermal: hisilicon: Handle return value of clk_prepare_enable (bnc#1012382).
- tipc: fix cleanup at module unload (bnc#1012382).
- tipc: fix memory leak in tipc_accept_from_sock() (bnc#1012382).
- tipc: improve link resiliency when rps is activated (bsc#1068038).
- tracing: Allocate mask_str buffer dynamically (bnc#1012382).
- tracing: Fix converting enum's from the map in trace_event_eval_update() (bnc#1012382).
- tracing: Fix crash when it fails to alloc ring buffer (bnc#1012382).
- tracing: Fix possible double free on failure of allocating trace buffer (bnc#1012382).
- tracing: Remove extra zeroing out of the ring buffer page (bnc#1012382).
- tty fix oops when rmmod 8250 (bnc#1012382).
- uas: Always apply US_FL_NO_ATA_1X quirk to Seagate devices (bnc#1012382).
- uas: ignore UAS for Norelsys NS1068(X) chips (bnc#1012382).
- udf: Avoid overflow when session starts at large offset (bnc#1012382).
- um: link vmlinux with -no-pie (bnc#1012382).
- usb: Add device quirk for Logitech HD Pro Webcam C925e (bnc#1012382).
- usb: Fix off by one in type-specific length check of BOS SSP capability (git-fixes).
- usb: Increase usbfs transfer limit (bnc#1012382).
- usb: add RESET_RESUME for ELSA MicroLink 56K (bnc#1012382).
- usb: core: Add type-specific length check of BOS descriptors (bnc#1012382).
- usb: core: prevent malicious bNumInterfaces overflow (bnc#1012382).
- usb: devio: Prevent integer overflow in proc_do_submiturb() (bnc#1012382).
- usb: fix usbmon BUG trigger (bnc#1012382).
- usb: gadget: configs: plug memory leak (bnc#1012382).
- usb: gadget: f_uvc: Sanity check wMaxPacketSize for SuperSpeed (bnc#1012382).
- usb: gadget: ffs: Forbid usb_ep_alloc_request from sleeping (bnc#1012382).
- usb: gadget: udc: remove pointer dereference after free (bnc#1012382).
- usb: gadgetfs: Fix a potential memory leak in 'dev_config()' (bnc#1012382).
- usb: hub: Cycle HUB power when initialization fails (bnc#1012382).
- usb: misc: usb3503: make sure reset is low for at least 100us (bnc#1012382).
- usb: musb: da8xx: fix babble condition handling (bnc#1012382).
- usb: phy: isp1301: Add OF device ID table (bnc#1012382).
- usb: phy: isp1301: Fix build warning when CONFIG_OF is disabled (git-fixes).
- usb: phy: tahvo: fix error handling in tahvo_usb_probe() (bnc#1012382).
- usb: quirks: Add no-lpm quirk for KY-688 USB 3.1 Type-C Hub (bnc#1012382).
- usb: serial: cp210x: add IDs for LifeScan OneTouch Verio IQ (bnc#1012382).
- usb: serial: cp210x: add new device ID ELV ALC 8xxx (bnc#1012382).
- usb: serial: ftdi_sio: add id for Airbus DS P8GR (bnc#1012382).
- usb: serial: option: add Quectel BG96 id (bnc#1012382).
- usb: serial: option: add support for Telit ME910 PID 0x1101 (bnc#1012382).
- usb: serial: option: adding support for YUGA CLM920-NC5 (bnc#1012382).
- usb: serial: qcserial: add Sierra Wireless EM7565 (bnc#1012382).
- usb: uas and storage: Add US_FL_BROKEN_FUA for another JMicron JMS567 ID (bnc#1012382).
- usb: usbfs: Filter flags passed in from user space (bnc#1012382).
- usb: usbip: Fix possible deadlocks reported by lockdep (bnc#1012382).
- usb: xhci: Add XHCI_TRUST_TX_LENGTH for Renesas uPD720201 (bnc#1012382).
- usb: xhci: fix panic in xhci_free_virt_devices_depth_first (bnc#1012382).
- usbip: Fix implicit fallthrough warning (bnc#1012382).
- usbip: Fix potential format overflow in userspace tools (bnc#1012382).
- usbip: fix stub_rx: get_pipe() to validate endpoint number (bnc#1012382).
- usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input (bnc#1012382).
- usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer (bnc#1012382).
- usbip: fix usbip bind writing random string after command in match_busid (bnc#1012382).
- usbip: prevent leaking socket pointer address in messages (bnc#1012382).
- usbip: prevent vhci_hcd driver from leaking a socket pointer address (bnc#1012382).
- usbip: remove kernel addresses from usb device and urb debug msgs (bnc#1012382).
- usbip: stub: stop printing kernel pointer addresses in messages (bnc#1012382).
- usbip: vhci: stop printing kernel pointer addresses in messages (bnc#1012382).
- userfaultfd: selftest: vm: allow to build in vm/ directory (bnc#1012382).
- userfaultfd: shmem: __do_fault requires VM_FAULT_NOPAGE (bnc#1012382).
- video: fbdev: au1200fb: Release some resources if a memory allocation fails (bnc#1012382).
- video: fbdev: au1200fb: Return an error code if a memory allocation fails (bnc#1012382).
- virtio: release virtio index when fail to device_register (bnc#1012382).
- vmxnet3: repair memory leak (bnc#1012382).
- vsyscall: Fix permissions for emulate mode with KAISER/PTI (bnc#1012382).
- vt6655: Fix a possible sleep-in-atomic bug in vt6655_suspend (bnc#1012382).
- vti6: Do not report path MTU below IPV6_MIN_MTU (bnc#1012382).
- vti6: fix device register to report IFLA_INFO_KIND (bnc#1012382).
- workqueue: trigger WARN if queue_delayed_work() is called with NULL @wq (bnc#1012382).
- writeback: fix memory leak in wb_queue_work() (bnc#1012382).
- x.509: fix buffer overflow detection in sprint_oid() (bsc#1075078).
- x.509: reject invalid BIT STRING for subjectPublicKey (bnc#1012382).
- x509: fix printing uninitialized stack memory when OID is empty (bsc#1075078).
- x86/Documentation: Add PTI description (bnc#1012382).
- x86/PCI: Make broadcom_postcore_init() check acpi_disabled (bnc#1012382).
- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).
- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).
- x86/alternatives: Add missing '\n' at end of ALTERNATIVE inline asm (bnc#1012382).
- x86/alternatives: Fix optimize_nops() checking (bnc#1012382).
- x86/apic/vector: Fix off by one in error path (bnc#1012382).
- x86/asm/32: Make sync_core() handle missing CPUID on all 32-bit kernels (bnc#1012382).
- x86/boot: Fix early command-line parsing when matching at end (bsc#1068032).
- x86/cpu, x86/pti: Do not enable PTI on AMD processors (bnc#1012382).
- x86/cpu: Factor out application of forced CPU caps (bnc#1012382).
- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).
- x86/cpu: Merge bugs.c and bugs_64.c (bnc#1012382).
- x86/cpufeatures: Add X86_BUG_CPU_INSECURE (bnc#1012382).
- x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (bnc#1012382).
- x86/cpufeatures: Make CPU bugs sticky (bnc#1012382).
- x86/efi-bgrt: Fix kernel panic when mapping BGRT data (bnc#1012382).
- x86/efi-bgrt: Replace early_memremap() with memremap() (bnc#1012382).
- x86/efi: Build our own page table structures (bnc#1012382).
- x86/efi: Hoist page table switching code into efi_call_virt() (bnc#1012382).
- x86/entry: Use SYSCALL_DEFINE() macros for sys_modify_ldt() (bnc#1012382).
- x86/hpet: Prevent might sleep splat on resume (bnc#1012382).
- x86/kasan: Clear kasan_zero_page after TLB flush (bnc#1012382).
- x86/kasan: Write protect kasan zero shadow (bnc#1012382).
- x86/microcode/intel: Extend BDW late-loading further with LLC size check (bnc#1012382).
- x86/microcode/intel: Extend BDW late-loading with a revision check (bnc#1012382).
- x86/microcode/intel: Fix BDW late-loading revision check (bnc#1012382).
- x86/mm/32: Move setup_clear_cpu_cap(X86_FEATURE_PCID) earlier (git-fixes).
- x86/mm/pat: Ensure cpa-&gt;pfn only contains page frame numbers (bnc#1012382).
- x86/mm: Disable PCID on 32-bit kernels (bnc#1012382).
- x86/pti/efi: broken conversion from efi to kernel page table (bnc#1012382).
- x86/pti: Document fix wrong index (bnc#1012382).
- x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN (bnc#1012382).
- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).
- x86/smpboot: Remove stale TLB flush invocations (bnc#1012382).
- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).
- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).
- x86/tlb: Drop the _GPL from the cpu_tlbstate export (bnc#1012382).
- x86/vm86/32: Switch to flush_tlb_mm_range() in mark_screen_rdonly() (bnc#1012382).
- xen-netfront: Improve error handling during initialization (bnc#1012382).
- xen-netfront: avoid crashing on resume after a failure in talk_to_netback() (bnc#1012382).
- xfrm: Copy policy family in clone_policy (bnc#1012382).
- xfs: Add infrastructure needed for error propagation during buffer IO failure (bsc#1068569).
- xfs: Properly retry failed inode items in case of error during buffer writeback (bsc#1068569).
- xfs: add 'fail at unmount' error handling configuration (bsc#1068569).
- xfs: add configurable error support to metadata buffers (bsc#1068569).
- xfs: add configuration handlers for specific errors (bsc#1068569).
- xfs: add configuration of error failure speed (bsc#1068569).
- xfs: address kabi for xfs buffer retry infrastructure (kabi).
- xfs: configurable error behavior via sysfs (bsc#1068569).
- xfs: fix incorrect extent state in xfs_bmap_add_extent_unwritten_real (bnc#1012382).
- xfs: fix log block underflow during recovery cycle verification (bnc#1012382).
- xfs: fix up inode32/64 (re)mount handling (bsc#1069160).
- xfs: introduce metadata IO error class (bsc#1068569).
- xfs: introduce table-based init for error behaviors (bsc#1068569).
- xfs: remove xfs_trans_ail_delete_bulk (bsc#1068569).
- xhci: Do not add a virt_dev to the devs array before it's fully allocated (bnc#1012382).
- xhci: Fix ring leak in failure path of xhci_alloc_virt_device() (bnc#1012382).
- xhci: plat: Register shutdown for xhci_plat (bnc#1012382).
- zram: set physical queue limits to avoid array out of bounds accesses (bnc#1012382).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-09"/>
	<updated date="2018-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012917">SUSE bug 1012917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019784">SUSE bug 1019784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022476">SUSE bug 1022476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031717">SUSE bug 1031717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038078">SUSE bug 1038078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038085">SUSE bug 1038085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043652">SUSE bug 1043652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048585">SUSE bug 1048585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052360">SUSE bug 1052360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060279">SUSE bug 1060279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066223">SUSE bug 1066223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066842">SUSE bug 1066842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068038">SUSE bug 1068038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068569">SUSE bug 1068569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068984">SUSE bug 1068984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069160">SUSE bug 1069160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070799">SUSE bug 1070799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072163">SUSE bug 1072163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072484">SUSE bug 1072484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072589">SUSE bug 1072589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073229">SUSE bug 1073229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073928">SUSE bug 1073928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074134">SUSE bug 1074134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074392">SUSE bug 1074392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074488">SUSE bug 1074488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074621">SUSE bug 1074621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074709">SUSE bug 1074709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074839">SUSE bug 1074839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074847">SUSE bug 1074847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075066">SUSE bug 1075066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075078">SUSE bug 1075078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075087">SUSE bug 1075087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075091">SUSE bug 1075091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075428">SUSE bug 1075428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075617">SUSE bug 1075617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075621">SUSE bug 1075621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075627">SUSE bug 1075627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075994">SUSE bug 1075994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076017">SUSE bug 1076017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076110">SUSE bug 1076110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076806">SUSE bug 1076806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076809">SUSE bug 1076809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076872">SUSE bug 1076872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076899">SUSE bug 1076899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077068">SUSE bug 1077068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077560">SUSE bug 1077560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077592">SUSE bug 1077592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078526">SUSE bug 1078526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078681">SUSE bug 1078681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963844">SUSE bug 963844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988524">SUSE bug 988524</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-15129/">CVE-2017-15129</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17712/">CVE-2017-17712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17862/">CVE-2017-17862</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17864/">CVE-2017-17864</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18017/">CVE-2017-18017</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004</cve>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5332/">CVE-2018-5332</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5333/">CVE-2018-5333</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518883" comment="kernel-default-4.4.114-92.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518884" comment="kernel-default-devel-4.4.114-92.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518885" comment="kernel-default-extra-4.4.114-92.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518886" comment="kernel-devel-4.4.114-92.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518887" comment="kernel-macros-4.4.114-92.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518888" comment="kernel-source-4.4.114-92.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518889" comment="kernel-syms-4.4.114-92.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78118" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1028103" ref_url="https://bugzilla.suse.com/1028103" source="BUGZILLA"/>
		<reference ref_id="1035807" ref_url="https://bugzilla.suse.com/1035807" source="BUGZILLA"/>
		<reference ref_id="1036457" ref_url="https://bugzilla.suse.com/1036457" source="BUGZILLA"/>
		<reference ref_id="1079600" ref_url="https://bugzilla.suse.com/1079600" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10244" ref_url="https://www.suse.com/security/cve/CVE-2016-10244/" source="CVE"/>
		<reference ref_id="CVE-2017-7864" ref_url="https://www.suse.com/security/cve/CVE-2017-7864/" source="CVE"/>
		<reference ref_id="CVE-2017-8105" ref_url="https://www.suse.com/security/cve/CVE-2017-8105/" source="CVE"/>
		<reference ref_id="CVE-2017-8287" ref_url="https://www.suse.com/security/cve/CVE-2017-8287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0414-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00014.html" source="SUSE-SU"/>
		<description>

  
This update for freetype2 fixes the following security issues:

- CVE-2016-10244: Make sure that the parse_charstrings function in
  type1/t1load.c does ensure that a font contains a glyph name to prevent a DoS
  through a heap-based buffer over-read or possibly have unspecified other
  impact via a crafted file (bsc#1028103)
- CVE-2017-8105: Fix an out-of-bounds write caused by a heap-based
  buffer overflow related to the t1_decoder_parse_charstrings function in
  psaux/t1decode.ca (bsc#1035807)
- CVE-2017-8287: an out-of-bounds write caused by a heap-based buffer
  overflow related to the t1_builder_close_contour function in psaux/psobjs.c
  (bsc#1036457)
- Fix several integer overflow issues in truetype/ttinterp.c (bsc#1079600)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-09"/>
	<updated date="2018-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1028103">SUSE bug 1028103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035807">SUSE bug 1035807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036457">SUSE bug 1036457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079600">SUSE bug 1079600</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10244/">CVE-2016-10244</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7864/">CVE-2017-7864</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8105/">CVE-2017-8105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8287/">CVE-2017-8287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518890" comment="ft2demos-2.6.3-7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518891" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518892" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78119" version="1" class="patch">
	<metadata>
		<title>Security update for libreoffice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1080249" ref_url="https://bugzilla.suse.com/1080249" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6871" ref_url="https://www.suse.com/security/cve/CVE-2018-6871/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00017.html" source="SUSE-SU"/>
		<description>
This update for libreoffice fixes the following issues:

LibreOffice was updated to 5.4.5.1:

- CVE-2018-6871: Fixes data exposure when using WEBSERVICE (bsc#1080249)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-12"/>
	<updated date="2018-02-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1080249">SUSE bug 1080249</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6871/">CVE-2018-6871</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518893" comment="libreoffice-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518894" comment="libreoffice-base-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518895" comment="libreoffice-base-drivers-mysql-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518896" comment="libreoffice-base-drivers-postgresql-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518897" comment="libreoffice-calc-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518898" comment="libreoffice-calc-extensions-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518899" comment="libreoffice-draw-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518900" comment="libreoffice-filters-optional-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518901" comment="libreoffice-gnome-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518902" comment="libreoffice-icon-theme-galaxy-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518903" comment="libreoffice-icon-theme-tango-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518904" comment="libreoffice-impress-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518905" comment="libreoffice-l10n-af-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518906" comment="libreoffice-l10n-ar-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518907" comment="libreoffice-l10n-ca-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518908" comment="libreoffice-l10n-cs-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518909" comment="libreoffice-l10n-da-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518910" comment="libreoffice-l10n-de-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518911" comment="libreoffice-l10n-en-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518912" comment="libreoffice-l10n-es-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518913" comment="libreoffice-l10n-fi-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518914" comment="libreoffice-l10n-fr-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518915" comment="libreoffice-l10n-gu-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518916" comment="libreoffice-l10n-hi-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518917" comment="libreoffice-l10n-hu-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518918" comment="libreoffice-l10n-it-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518919" comment="libreoffice-l10n-ja-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518920" comment="libreoffice-l10n-ko-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518921" comment="libreoffice-l10n-nb-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518922" comment="libreoffice-l10n-nl-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518923" comment="libreoffice-l10n-nn-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518924" comment="libreoffice-l10n-pl-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518925" comment="libreoffice-l10n-pt_BR-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518926" comment="libreoffice-l10n-pt_PT-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518927" comment="libreoffice-l10n-ro-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518928" comment="libreoffice-l10n-ru-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518929" comment="libreoffice-l10n-sk-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518930" comment="libreoffice-l10n-sv-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518931" comment="libreoffice-l10n-xh-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518932" comment="libreoffice-l10n-zh_CN-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518933" comment="libreoffice-l10n-zh_TW-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518934" comment="libreoffice-l10n-zu-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518935" comment="libreoffice-mailmerge-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518936" comment="libreoffice-math-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518937" comment="libreoffice-officebean-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518938" comment="libreoffice-pyuno-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518939" comment="libreoffice-writer-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518940" comment="libreoffice-writer-extensions-5.4.5.1-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518941" comment="libreofficekit-5.4.5.1-40.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78120" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1037930" ref_url="https://bugzilla.suse.com/1037930" source="BUGZILLA"/>
		<reference ref_id="1051791" ref_url="https://bugzilla.suse.com/1051791" source="BUGZILLA"/>
		<reference ref_id="1073990" ref_url="https://bugzilla.suse.com/1073990" source="BUGZILLA"/>
		<reference ref_id="1074293" ref_url="https://bugzilla.suse.com/1074293" source="BUGZILLA"/>
		<reference ref_id="1079036" ref_url="https://bugzilla.suse.com/1079036" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12132" ref_url="https://www.suse.com/security/cve/CVE-2017-12132/" source="CVE"/>
		<reference ref_id="CVE-2017-8804" ref_url="https://www.suse.com/security/cve/CVE-2017-8804/" source="CVE"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="CVE-2018-6485" ref_url="https://www.suse.com/security/cve/CVE-2018-6485/" source="CVE"/>
		<reference ref_id="CVE-2018-6551" ref_url="https://www.suse.com/security/cve/CVE-2018-6551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00026.html" source="SUSE-SU"/>
		<description>

  
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2017-8804: Fix memory leak after deserialization failure in xdr_bytes, xdr_string (bsc#1037930)
- CVE-2017-12132: Reduce EDNS payload size to 1200 bytes (bsc#1051791)
- CVE-2018-6485,CVE-2018-6551: Fix integer overflows in internal memalign and malloc functions (bsc#1079036)
- CVE-2018-1000001: Avoid underflow of malloced area (bsc#1074293)

Non security bugs fixed:

- Release read lock after resetting timeout (bsc#1073990)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-15"/>
	<updated date="2018-02-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037930">SUSE bug 1037930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051791">SUSE bug 1051791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073990">SUSE bug 1073990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074293">SUSE bug 1074293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079036">SUSE bug 1079036</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-12132/">CVE-2017-12132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8804/">CVE-2017-8804</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6485/">CVE-2018-6485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6551/">CVE-2018-6551</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518942" comment="glibc-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518943" comment="glibc-32bit-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518944" comment="glibc-devel-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518945" comment="glibc-devel-32bit-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518946" comment="glibc-i18ndata-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518947" comment="glibc-locale-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518948" comment="glibc-locale-32bit-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518949" comment="nscd-2.22-62.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78121" version="1" class="patch">
	<metadata>
		<title>Security update for p7zip (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1077724" ref_url="https://bugzilla.suse.com/1077724" source="BUGZILLA"/>
		<reference ref_id="1077725" ref_url="https://bugzilla.suse.com/1077725" source="BUGZILLA"/>
		<reference ref_id="1077978" ref_url="https://bugzilla.suse.com/1077978" source="BUGZILLA"/>
		<reference ref_id="984650" ref_url="https://bugzilla.suse.com/984650" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1372" ref_url="https://www.suse.com/security/cve/CVE-2016-1372/" source="CVE"/>
		<reference ref_id="CVE-2017-17969" ref_url="https://www.suse.com/security/cve/CVE-2017-17969/" source="CVE"/>
		<reference ref_id="CVE-2018-5996" ref_url="https://www.suse.com/security/cve/CVE-2018-5996/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00034.html" source="SUSE-SU"/>
		<description>

  
This update for p7zip fixes the following issues:

Security issues fixed:

- CVE-2016-1372: Fixed multiple vulnerabilities when processing crafted 7z files (bsc#984650)
- CVE-2017-17969: Fixed a heap-based buffer overflow in a shrink decoder (bsc#1077725)
- CVE-2018-5996: Fixed memory corruption in RAR decompression. The complete RAR decoder was removed as it also has license issues (bsc#1077724 bsc#1077978)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077724">SUSE bug 1077724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077725">SUSE bug 1077725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077978">SUSE bug 1077978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984650">SUSE bug 984650</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1372/">CVE-2016-1372</cve>
	<cve impact="important" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17969/">CVE-2017-17969</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5996/">CVE-2018-5996</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518950" comment="p7zip-9.20.1-7.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78122" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1035442" ref_url="https://bugzilla.suse.com/1035442" source="BUGZILLA"/>
		<reference ref_id="1051729" ref_url="https://bugzilla.suse.com/1051729" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1070158" ref_url="https://bugzilla.suse.com/1070158" source="BUGZILLA"/>
		<reference ref_id="1070159" ref_url="https://bugzilla.suse.com/1070159" source="BUGZILLA"/>
		<reference ref_id="1070160" ref_url="https://bugzilla.suse.com/1070160" source="BUGZILLA"/>
		<reference ref_id="1070163" ref_url="https://bugzilla.suse.com/1070163" source="BUGZILLA"/>
		<reference ref_id="1074562" ref_url="https://bugzilla.suse.com/1074562" source="BUGZILLA"/>
		<reference ref_id="1076116" ref_url="https://bugzilla.suse.com/1076116" source="BUGZILLA"/>
		<reference ref_id="1076180" ref_url="https://bugzilla.suse.com/1076180" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-17563" ref_url="https://www.suse.com/security/cve/CVE-2017-17563/" source="CVE"/>
		<reference ref_id="CVE-2017-17564" ref_url="https://www.suse.com/security/cve/CVE-2017-17564/" source="CVE"/>
		<reference ref_id="CVE-2017-17565" ref_url="https://www.suse.com/security/cve/CVE-2017-17565/" source="CVE"/>
		<reference ref_id="CVE-2017-17566" ref_url="https://www.suse.com/security/cve/CVE-2017-17566/" source="CVE"/>
		<reference ref_id="CVE-2017-18030" ref_url="https://www.suse.com/security/cve/CVE-2017-18030/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-5683" ref_url="https://www.suse.com/security/cve/CVE-2018-5683/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00036.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-5753, CVE-2017-5715, CVE-2017-5754: Prevent information leaks via
  side effects of speculative execution, aka 'Spectre' and 'Meltdown' attacks
  (bsc#1074562, bsc#1068032)
- CVE-2017-15595: x86 PV guest OS users were able to cause a DoS (unbounded
  recursion, stack consumption, and hypervisor crash) or possibly gain privileges
  via crafted page-table stacking (bsc#1061081)
- CVE-2017-17566: Prevent PV guest OS users to cause a denial of service (host
  OS crash) or gain host OS privileges in shadow mode by mapping a certain
  auxiliary page (bsc#1070158).
- CVE-2017-17563: Prevent guest OS users to cause a denial of service (host OS
  crash) or gain host OS privileges by leveraging an incorrect mask for
  reference-count overflow checking in shadow mode (bsc#1070159).
- CVE-2017-17564: Prevent guest OS users to cause a denial of service (host OS
  crash) or gain host OS privileges by leveraging incorrect error handling for
  reference counting in shadow mode (bsc#1070160).
- CVE-2017-17565: Prevent PV guest OS users to cause a denial of service (host
  OS crash) if shadow mode and log-dirty mode are in place, because of an
  incorrect assertion related to M2P (bsc#1070163).
- CVE-2018-5683: The vga_draw_text function allowed local OS guest privileged
  users to cause a denial of service (out-of-bounds read and QEMU process crash)
  by leveraging improper memory address validation (bsc#1076116).
- CVE-2017-18030: The cirrus_invalidate_region function allowed local OS guest
  privileged users to cause a denial of service (out-of-bounds array access and
  QEMU process crash) via vectors related to negative pitch (bsc#1076180).

These non-security issues were fixed:

- bsc#1051729: Prevent invalid symlinks after install of SLES 12 SP2
- bsc#1035442: Increased the value of LIBXL_DESTROY_TIMEOUT from 10 to 100
  seconds. If many domUs shutdown in parallel the backends couldn't keep up
- bsc#1027519: Added several upstream patches
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-19"/>
	<updated date="2018-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035442">SUSE bug 1035442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051729">SUSE bug 1051729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070158">SUSE bug 1070158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070159">SUSE bug 1070159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070160">SUSE bug 1070160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070163">SUSE bug 1070163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076116">SUSE bug 1076116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076180">SUSE bug 1076180</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17563/">CVE-2017-17563</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17564/">CVE-2017-17564</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17565/">CVE-2017-17565</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17566/">CVE-2017-17566</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18030/">CVE-2017-18030</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5683/">CVE-2018-5683</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518951" comment="xen-4.7.4_06-43.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518952" comment="xen-libs-4.7.4_06-43.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518953" comment="xen-libs-32bit-4.7.4_06-43.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78123" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1077983" ref_url="https://bugzilla.suse.com/1077983" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1053" ref_url="https://www.suse.com/security/cve/CVE-2018-1053/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003746.html" source="SUSE-SU"/>
		<description>

  
This update for postgresql96 to version 9.6.7 fixes the following issues:

- CVE-2018-1053: Ensure that all temporary files made by pg_upgrade are non-world-readable. (bsc#1077983)

A full changelog is available here:

	https://www.postgresql.org/docs/9.6/static/release-9-6-7.html

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-21"/>
	<updated date="2018-02-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077983">SUSE bug 1077983</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1053/">CVE-2018-1053</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518954" comment="libecpg6-9.6.7-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518955" comment="libpq5-9.6.7-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518956" comment="libpq5-32bit-9.6.7-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518957" comment="postgresql96-9.6.7-3.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78124" version="1" class="patch">
	<metadata>
		<title>Security update for libdb-4_8 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1043886" ref_url="https://bugzilla.suse.com/1043886" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003748.html" source="SUSE-SU"/>
		<description>
This update for libdb-4_8 fixes the following issues:

- A DB_CONFIG file in the current working directory allowed local
  users to obtain sensitive information via a symlink attack
  involving a setgid or setuid application using libdb-4_8. (bsc#1043886)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-21"/>
	<updated date="2018-02-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043886">SUSE bug 1043886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518958" comment="db48-utils-4.8.30-29.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518959" comment="libdb-4_8-4.8.30-29.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518960" comment="libdb-4_8-32bit-4.8.30-29.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78125" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1023415" ref_url="https://bugzilla.suse.com/1023415" source="BUGZILLA"/>
		<reference ref_id="1059061" ref_url="https://bugzilla.suse.com/1059061" source="BUGZILLA"/>
		<reference ref_id="1073935" ref_url="https://bugzilla.suse.com/1073935" source="BUGZILLA"/>
		<reference ref_id="1076119" ref_url="https://bugzilla.suse.com/1076119" source="BUGZILLA"/>
		<reference ref_id="987170" ref_url="https://bugzilla.suse.com/987170" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3144" ref_url="https://www.suse.com/security/cve/CVE-2017-3144/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003752.html" source="SUSE-SU"/>
		<description>
 This update for dhcp fixes several issues.

This security issue was fixed:

- CVE-2017-3144: OMAPI code didn't free socket descriptors when empty message
  is received allowing DoS (bsc#1076119).

These non-security issues were fixed:

- Optimized if and when DNS client context and ports are initted (bsc#1073935)
- Relax permission of dhclient-script for libguestfs (bsc#987170)
- Modify dhclient-script to handle static route updates (bsc#1023415).
- Use only the 12 least significant bits of an inbound packet's TCI value as the VLAN ID
  to fix some packages being wrongly discarded by the Linux packet filter. (bsc#1059061)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-23"/>
	<updated date="2018-02-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023415">SUSE bug 1023415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059061">SUSE bug 1059061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073935">SUSE bug 1073935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076119">SUSE bug 1076119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987170">SUSE bug 987170</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3144/">CVE-2017-3144</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518961" comment="dhcp-4.3.3-10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518962" comment="dhcp-client-4.3.3-10.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78126" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1057974" ref_url="https://bugzilla.suse.com/1057974" source="BUGZILLA"/>
		<reference ref_id="1068588" ref_url="https://bugzilla.suse.com/1068588" source="BUGZILLA"/>
		<reference ref_id="1071224" ref_url="https://bugzilla.suse.com/1071224" source="BUGZILLA"/>
		<reference ref_id="1071311" ref_url="https://bugzilla.suse.com/1071311" source="BUGZILLA"/>
		<reference ref_id="1075801" ref_url="https://bugzilla.suse.com/1075801" source="BUGZILLA"/>
		<reference ref_id="1077925" ref_url="https://bugzilla.suse.com/1077925" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18078" ref_url="https://www.suse.com/security/cve/CVE-2017-18078/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003753.html" source="SUSE-SU"/>
		<description>

  
This update for systemd fixes the following issues:

Security issue fixed:

- CVE-2017-18078: tmpfiles: refuse to chown()/chmod() files which are
  hardlinked, unless protected_hardlinks sysctl is on. This could be used
  by local attackers to gain privileges (bsc#1077925)

Non Security issues fixed:

- core: use id unit when retrieving unit file state (#8038) (bsc#1075801)
- cryptsetup-generator: run cryptsetup service before swap unit (#5480)
- udev-rules: all values can contain escaped double quotes now (#6890)
- strv: fix buffer size calculation in strv_join_quoted()
- tmpfiles: change ownership of symlinks too
- stdio-bridge: Correctly propagate error
- stdio-bridge: remove dead code
- remove bus-proxyd (bsc#1057974)
- core/timer: Prevent timer looping when unit cannot start (bsc#1068588)

- Make systemd-timesyncd use the openSUSE NTP servers by default
  Previously systemd-timesyncd used the Google Public NTP servers
  time{1..4}.google.com

- Don't ship /usr/lib/systemd/system/tmp.mnt at all (bsc#1071224)
  But we still ship a copy in /var.
  Users who want to use tmpfs on /tmp are supposed to add a symlink in
  /etc/ pointing to the copy shipped in /var.
  To support the update path we automatically create the symlink if
  tmp.mount in use is located in /usr.

- Enable systemd-networkd on Leap distros only (bsc#1071311)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-26"/>
	<updated date="2018-02-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1057974">SUSE bug 1057974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068588">SUSE bug 1068588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071224">SUSE bug 1071224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071311">SUSE bug 1071311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075801">SUSE bug 1075801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077925">SUSE bug 1077925</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18078/">CVE-2017-18078</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518963" comment="libsystemd0-228-150.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518964" comment="libsystemd0-32bit-228-150.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518965" comment="libudev1-228-150.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518966" comment="libudev1-32bit-228-150.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518967" comment="systemd-228-150.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518968" comment="systemd-32bit-228-150.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518969" comment="systemd-bash-completion-228-150.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518970" comment="systemd-sysvinit-228-150.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518971" comment="udev-228-150.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78127" version="1" class="patch">
	<metadata>
		<title>Security update for zziplib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1024532" ref_url="https://bugzilla.suse.com/1024532" source="BUGZILLA"/>
		<reference ref_id="1024536" ref_url="https://bugzilla.suse.com/1024536" source="BUGZILLA"/>
		<reference ref_id="1034539" ref_url="https://bugzilla.suse.com/1034539" source="BUGZILLA"/>
		<reference ref_id="1078497" ref_url="https://bugzilla.suse.com/1078497" source="BUGZILLA"/>
		<reference ref_id="1078701" ref_url="https://bugzilla.suse.com/1078701" source="BUGZILLA"/>
		<reference ref_id="1079096" ref_url="https://bugzilla.suse.com/1079096" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6381" ref_url="https://www.suse.com/security/cve/CVE-2018-6381/" source="CVE"/>
		<reference ref_id="CVE-2018-6484" ref_url="https://www.suse.com/security/cve/CVE-2018-6484/" source="CVE"/>
		<reference ref_id="CVE-2018-6540" ref_url="https://www.suse.com/security/cve/CVE-2018-6540/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003754.html" source="SUSE-SU"/>
		<description>

  
This update for zziplib fixes the following issues:

Version update to 0.13.67 contains lots of bug- and security fixes.

- If an extension block is too small to hold an extension,
  do not use the information therein.
- CVE-2018-6540: If the End of central directory record (EOCD) contains an
  Offset of start of central directory which is beyond the end of
  the file, reject the file.  (bsc#1079096)
- CVE-2018-6484: Reject the ZIP file and report it as corrupt if the size of the
  central directory and/or the offset of start of central directory
  point beyond the end of the ZIP file. (bsc#1078701)
- CVE-2018-6381: If a file is uncompressed, compressed and uncompressed sizes
  should be identical. (bsc#1078497)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-27"/>
	<updated date="2018-02-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024532">SUSE bug 1024532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024536">SUSE bug 1024536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034539">SUSE bug 1034539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078497">SUSE bug 1078497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078701">SUSE bug 1078701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079096">SUSE bug 1079096</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6381/">CVE-2018-6381</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6484/">CVE-2018-6484</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6540/">CVE-2018-6540</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518972" comment="libzzip-0-13-0.13.67-10.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78128" version="1" class="patch">
	<metadata>
		<title>Security update for puppet (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1080288" ref_url="https://bugzilla.suse.com/1080288" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10689" ref_url="https://www.suse.com/security/cve/CVE-2017-10689/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003760.html" source="SUSE-SU"/>
		<description>
This update for puppet fixes the following issues:

- CVE-2017-10689: Reset permissions when unpacking tar in PMT.
  When using minitar, files were unpacked with whatever permissions are in the tarball.
  This is potentially unsafe, as tarballs can be easily created with weird permissions
  (bsc#1080288)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-01"/>
	<updated date="2018-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1080288">SUSE bug 1080288</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10689/">CVE-2017-10689</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518973" comment="puppet-3.8.5-15.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78129" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1042824" ref_url="https://bugzilla.suse.com/1042824" source="BUGZILLA"/>
		<reference ref_id="1042911" ref_url="https://bugzilla.suse.com/1042911" source="BUGZILLA"/>
		<reference ref_id="1048110" ref_url="https://bugzilla.suse.com/1048110" source="BUGZILLA"/>
		<reference ref_id="1048272" ref_url="https://bugzilla.suse.com/1048272" source="BUGZILLA"/>
		<reference ref_id="1049374" ref_url="https://bugzilla.suse.com/1049374" source="BUGZILLA"/>
		<reference ref_id="1049375" ref_url="https://bugzilla.suse.com/1049375" source="BUGZILLA"/>
		<reference ref_id="1050048" ref_url="https://bugzilla.suse.com/1050048" source="BUGZILLA"/>
		<reference ref_id="1050119" ref_url="https://bugzilla.suse.com/1050119" source="BUGZILLA"/>
		<reference ref_id="1050122" ref_url="https://bugzilla.suse.com/1050122" source="BUGZILLA"/>
		<reference ref_id="1050126" ref_url="https://bugzilla.suse.com/1050126" source="BUGZILLA"/>
		<reference ref_id="1050132" ref_url="https://bugzilla.suse.com/1050132" source="BUGZILLA"/>
		<reference ref_id="1050617" ref_url="https://bugzilla.suse.com/1050617" source="BUGZILLA"/>
		<reference ref_id="1052207" ref_url="https://bugzilla.suse.com/1052207" source="BUGZILLA"/>
		<reference ref_id="1052248" ref_url="https://bugzilla.suse.com/1052248" source="BUGZILLA"/>
		<reference ref_id="1052251" ref_url="https://bugzilla.suse.com/1052251" source="BUGZILLA"/>
		<reference ref_id="1052254" ref_url="https://bugzilla.suse.com/1052254" source="BUGZILLA"/>
		<reference ref_id="1052472" ref_url="https://bugzilla.suse.com/1052472" source="BUGZILLA"/>
		<reference ref_id="1052688" ref_url="https://bugzilla.suse.com/1052688" source="BUGZILLA"/>
		<reference ref_id="1052711" ref_url="https://bugzilla.suse.com/1052711" source="BUGZILLA"/>
		<reference ref_id="1052747" ref_url="https://bugzilla.suse.com/1052747" source="BUGZILLA"/>
		<reference ref_id="1052750" ref_url="https://bugzilla.suse.com/1052750" source="BUGZILLA"/>
		<reference ref_id="1052754" ref_url="https://bugzilla.suse.com/1052754" source="BUGZILLA"/>
		<reference ref_id="1052761" ref_url="https://bugzilla.suse.com/1052761" source="BUGZILLA"/>
		<reference ref_id="1055069" ref_url="https://bugzilla.suse.com/1055069" source="BUGZILLA"/>
		<reference ref_id="1055229" ref_url="https://bugzilla.suse.com/1055229" source="BUGZILLA"/>
		<reference ref_id="1056768" ref_url="https://bugzilla.suse.com/1056768" source="BUGZILLA"/>
		<reference ref_id="1057163" ref_url="https://bugzilla.suse.com/1057163" source="BUGZILLA"/>
		<reference ref_id="1058009" ref_url="https://bugzilla.suse.com/1058009" source="BUGZILLA"/>
		<reference ref_id="1072898" ref_url="https://bugzilla.suse.com/1072898" source="BUGZILLA"/>
		<reference ref_id="1074119" ref_url="https://bugzilla.suse.com/1074119" source="BUGZILLA"/>
		<reference ref_id="1074170" ref_url="https://bugzilla.suse.com/1074170" source="BUGZILLA"/>
		<reference ref_id="1075821" ref_url="https://bugzilla.suse.com/1075821" source="BUGZILLA"/>
		<reference ref_id="1076182" ref_url="https://bugzilla.suse.com/1076182" source="BUGZILLA"/>
		<reference ref_id="1078433" ref_url="https://bugzilla.suse.com/1078433" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11166" ref_url="https://www.suse.com/security/cve/CVE-2017-11166/" source="CVE"/>
		<reference ref_id="CVE-2017-11170" ref_url="https://www.suse.com/security/cve/CVE-2017-11170/" source="CVE"/>
		<reference ref_id="CVE-2017-11448" ref_url="https://www.suse.com/security/cve/CVE-2017-11448/" source="CVE"/>
		<reference ref_id="CVE-2017-11450" ref_url="https://www.suse.com/security/cve/CVE-2017-11450/" source="CVE"/>
		<reference ref_id="CVE-2017-11528" ref_url="https://www.suse.com/security/cve/CVE-2017-11528/" source="CVE"/>
		<reference ref_id="CVE-2017-11530" ref_url="https://www.suse.com/security/cve/CVE-2017-11530/" source="CVE"/>
		<reference ref_id="CVE-2017-11531" ref_url="https://www.suse.com/security/cve/CVE-2017-11531/" source="CVE"/>
		<reference ref_id="CVE-2017-11533" ref_url="https://www.suse.com/security/cve/CVE-2017-11533/" source="CVE"/>
		<reference ref_id="CVE-2017-11537" ref_url="https://www.suse.com/security/cve/CVE-2017-11537/" source="CVE"/>
		<reference ref_id="CVE-2017-11638" ref_url="https://www.suse.com/security/cve/CVE-2017-11638/" source="CVE"/>
		<reference ref_id="CVE-2017-11642" ref_url="https://www.suse.com/security/cve/CVE-2017-11642/" source="CVE"/>
		<reference ref_id="CVE-2017-12418" ref_url="https://www.suse.com/security/cve/CVE-2017-12418/" source="CVE"/>
		<reference ref_id="CVE-2017-12427" ref_url="https://www.suse.com/security/cve/CVE-2017-12427/" source="CVE"/>
		<reference ref_id="CVE-2017-12429" ref_url="https://www.suse.com/security/cve/CVE-2017-12429/" source="CVE"/>
		<reference ref_id="CVE-2017-12432" ref_url="https://www.suse.com/security/cve/CVE-2017-12432/" source="CVE"/>
		<reference ref_id="CVE-2017-12566" ref_url="https://www.suse.com/security/cve/CVE-2017-12566/" source="CVE"/>
		<reference ref_id="CVE-2017-12654" ref_url="https://www.suse.com/security/cve/CVE-2017-12654/" source="CVE"/>
		<reference ref_id="CVE-2017-12663" ref_url="https://www.suse.com/security/cve/CVE-2017-12663/" source="CVE"/>
		<reference ref_id="CVE-2017-12664" ref_url="https://www.suse.com/security/cve/CVE-2017-12664/" source="CVE"/>
		<reference ref_id="CVE-2017-12665" ref_url="https://www.suse.com/security/cve/CVE-2017-12665/" source="CVE"/>
		<reference ref_id="CVE-2017-12668" ref_url="https://www.suse.com/security/cve/CVE-2017-12668/" source="CVE"/>
		<reference ref_id="CVE-2017-12674" ref_url="https://www.suse.com/security/cve/CVE-2017-12674/" source="CVE"/>
		<reference ref_id="CVE-2017-13058" ref_url="https://www.suse.com/security/cve/CVE-2017-13058/" source="CVE"/>
		<reference ref_id="CVE-2017-13131" ref_url="https://www.suse.com/security/cve/CVE-2017-13131/" source="CVE"/>
		<reference ref_id="CVE-2017-14060" ref_url="https://www.suse.com/security/cve/CVE-2017-14060/" source="CVE"/>
		<reference ref_id="CVE-2017-14139" ref_url="https://www.suse.com/security/cve/CVE-2017-14139/" source="CVE"/>
		<reference ref_id="CVE-2017-14224" ref_url="https://www.suse.com/security/cve/CVE-2017-14224/" source="CVE"/>
		<reference ref_id="CVE-2017-17682" ref_url="https://www.suse.com/security/cve/CVE-2017-17682/" source="CVE"/>
		<reference ref_id="CVE-2017-17885" ref_url="https://www.suse.com/security/cve/CVE-2017-17885/" source="CVE"/>
		<reference ref_id="CVE-2017-17934" ref_url="https://www.suse.com/security/cve/CVE-2017-17934/" source="CVE"/>
		<reference ref_id="CVE-2017-18028" ref_url="https://www.suse.com/security/cve/CVE-2017-18028/" source="CVE"/>
		<reference ref_id="CVE-2017-9405" ref_url="https://www.suse.com/security/cve/CVE-2017-9405/" source="CVE"/>
		<reference ref_id="CVE-2017-9407" ref_url="https://www.suse.com/security/cve/CVE-2017-9407/" source="CVE"/>
		<reference ref_id="CVE-2018-5357" ref_url="https://www.suse.com/security/cve/CVE-2018-5357/" source="CVE"/>
		<reference ref_id="CVE-2018-6405" ref_url="https://www.suse.com/security/cve/CVE-2018-6405/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2017-9405: A memory leak in the ReadICONImage function was fixed that could lead to DoS via memory exhaustion (bsc#1042911)
- CVE-2017-9407: In ImageMagick, the ReadPALMImage function in palm.c allowed attackers to cause a denial of service (memory leak) via a crafted file.  (bsc#1042824)
- CVE-2017-11166: In ReadXWDImage in coders\xwd.c a memoryleak could have caused memory exhaustion via a crafted length (bsc#1048110)
- CVE-2017-11170: ReadTGAImage in coders\tga.c allowed for memory exhaustion via invalid colors data in the header of a TGA or VST file (bsc#1048272)
- CVE-2017-11448: The ReadJPEGImage function in coders/jpeg.c in ImageMagick allowed remote attackers to obtain sensitive information from uninitialized memory locations via a crafted file.  (bsc#1049375)
- CVE-2017-11450: A remote denial of service in coders/jpeg.c was fixed (bsc#1049374)
- CVE-2017-11528: ReadDIBImage in coders/dib.c allows remote attackers to cause DoS via memory exhaustion (bsc#1050119)
- CVE-2017-11530: ReadEPTImage in coders/ept.c allows remote attackers to cause DoS via memory exhaustion (bsc#1050122)
- CVE-2017-11531: When ImageMagick processed a crafted file in convert, it could lead to a Memory Leak in the WriteHISTOGRAMImage() function in coders/histogram.c.  (bsc#1050126)
- CVE-2017-11533: A information leak by 1 byte due to heap-based buffer over-read in the WriteUILImage() in coders/uil.c was fixed (bsc#1050132)
- CVE-2017-11537: When ImageMagick processed a crafted file in convert, it can lead to a Floating Point Exception (FPE) in the WritePALMImage() function in coders/palm.c, related to an incorrect bits-per-pixel calculation.  (bsc#1050048)
- CVE-2017-11638, CVE-2017-11642: A NULL pointer dereference in theWriteMAPImage() in coders/map.c was fixed which could lead to a crash (bsc#1050617)
- CVE-2017-12418: ImageMagick had memory leaks in the parse8BIMW and format8BIM functions in coders/meta.c, related to the WriteImage function in MagickCore/constitute.c.  (bsc#1052207)
- CVE-2017-12427: ProcessMSLScript coders/msl.c allowed remote attackers to cause a DoS (bsc#1052248)
- CVE-2017-12429: A memory exhaustion flaw in ReadMIFFImage in coders/miff.c was fixed, which allowed attackers to cause DoS (bsc#1052251)
- CVE-2017-12432: In ImageMagick, a memory exhaustion vulnerability was found in the function ReadPCXImage in coders/pcx.c, which allowed attackers to cause a denial of service.  (bsc#1052254)
- CVE-2017-12566: A memory leak in ReadMVGImage in coders/mvg.c, could have allowed attackers to cause DoS (bsc#1052472)
- CVE-2017-12654: The ReadPICTImage function in coders/pict.c in ImageMagick allowed attackers to cause a denial of service (memory leak) via a crafted file.  (bsc#1052761)
- CVE-2017-12663: A memory leak in WriteMAPImage in coders/map.c was fixed that could lead to a DoS via memory exhaustion (bsc#1052754)
- CVE-2017-12664: ImageMagick had a memory leak vulnerability in WritePALMImage in coders/palm.c.  (bsc#1052750)
- CVE-2017-12665: ImageMagick had a memory leak vulnerability in WritePICTImage in coders/pict.c.  (bsc#1052747)
- CVE-2017-12668: ImageMagick had a memory leak vulnerability in WritePCXImage in coders/pcx.c. (bsc#1052688)
- CVE-2017-12674: A CPU exhaustion in ReadPDBImage in coders/pdb.c was fixed, which allowed attackers to cause DoS (bsc#1052711)
- CVE-2017-13058: In ImageMagick, a memory leak vulnerability was found in the function WritePCXImage in coders/pcx.c, which allowed attackers to cause a denial of service via a crafted file.  (bsc#1055069)
- CVE-2017-13131: A memory leak vulnerability was found in thefunction ReadMIFFImage in coders/miff.c, which allowed attackers tocause a denial of service (memory consumption in NewL (bsc#1055229)
- CVE-2017-14060: A NULL Pointer Dereference issue in the ReadCUTImage function in coders/cut.c was fixed that could have caused a Denial of Service (bsc#1056768)
- CVE-2017-14139: A memory leak vulnerability in WriteMSLImage in coders/msl.c was fixed. (bsc#1057163)
- CVE-2017-14224: A heap-based buffer overflow in WritePCXImage in coders/pcx.c  could lead to  denial of service or code execution. (bsc#1058009)
- CVE-2017-17682: A large loop vulnerability was fixed in ExtractPostscript in coders/wpg.c, which allowed attackers to cause a denial of service (CPU exhaustion) (bsc#1072898)
- CVE-2017-17885: In ImageMagick, a memory leak vulnerability was found in the function ReadPICTImage in coders/pict.c, which allowed attackers to cause a denial of service via a crafted PICT image file. (bsc#1074119)
- CVE-2017-17934: A memory leak in the function MSLPopImage and ProcessMSLScript could have lead to a denial of service (bsc#1074170)
- CVE-2017-18028: A memory exhaustion in the function ReadTIFFImage in coders/tiff.c was fixed. (bsc#1076182)
- CVE-2018-5357: ImageMagick had memory leaks in the ReadDCMImage function in coders/dcm.c.  (bsc#1075821)
- CVE-2018-6405: In the ReadDCMImage function in coders/dcm.c in ImageMagick, each redmap, greenmap, and bluemap variable can be overwritten by a new pointer. The previous pointer is lost, which leads to a memory leak. This allowed remote attackers to cause a denial of service. (bsc#1078433)


		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-01"/>
	<updated date="2018-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042824">SUSE bug 1042824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042911">SUSE bug 1042911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048110">SUSE bug 1048110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048272">SUSE bug 1048272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049374">SUSE bug 1049374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049375">SUSE bug 1049375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050048">SUSE bug 1050048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050119">SUSE bug 1050119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050122">SUSE bug 1050122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050126">SUSE bug 1050126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050132">SUSE bug 1050132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050617">SUSE bug 1050617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052207">SUSE bug 1052207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052248">SUSE bug 1052248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052251">SUSE bug 1052251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052254">SUSE bug 1052254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052472">SUSE bug 1052472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052688">SUSE bug 1052688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052711">SUSE bug 1052711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052747">SUSE bug 1052747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052750">SUSE bug 1052750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052754">SUSE bug 1052754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052761">SUSE bug 1052761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055069">SUSE bug 1055069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055229">SUSE bug 1055229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056768">SUSE bug 1056768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057163">SUSE bug 1057163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058009">SUSE bug 1058009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072898">SUSE bug 1072898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074119">SUSE bug 1074119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074170">SUSE bug 1074170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075821">SUSE bug 1075821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076182">SUSE bug 1076182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078433">SUSE bug 1078433</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11166/">CVE-2017-11166</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11170/">CVE-2017-11170</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-11448/">CVE-2017-11448</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11450/">CVE-2017-11450</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11528/">CVE-2017-11528</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11530/">CVE-2017-11530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11531/">CVE-2017-11531</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11533/">CVE-2017-11533</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11537/">CVE-2017-11537</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11638/">CVE-2017-11638</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11642/">CVE-2017-11642</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12418/">CVE-2017-12418</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12427/">CVE-2017-12427</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12429/">CVE-2017-12429</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12432/">CVE-2017-12432</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12566/">CVE-2017-12566</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12654/">CVE-2017-12654</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12663/">CVE-2017-12663</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12664/">CVE-2017-12664</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12665/">CVE-2017-12665</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12668/">CVE-2017-12668</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12674/">CVE-2017-12674</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13058/">CVE-2017-13058</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13131/">CVE-2017-13131</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14060/">CVE-2017-14060</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14139/">CVE-2017-14139</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14224/">CVE-2017-14224</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17682/">CVE-2017-17682</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17885/">CVE-2017-17885</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17934/">CVE-2017-17934</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-18028/">CVE-2017-18028</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9405/">CVE-2017-9405</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9407/">CVE-2017-9407</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5357/">CVE-2018-5357</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6405/">CVE-2018-6405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78130" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1040107" ref_url="https://bugzilla.suse.com/1040107" source="BUGZILLA"/>
		<reference ref_id="1040114" ref_url="https://bugzilla.suse.com/1040114" source="BUGZILLA"/>
		<reference ref_id="1052522" ref_url="https://bugzilla.suse.com/1052522" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12596" ref_url="https://www.suse.com/security/cve/CVE-2017-12596/" source="CVE"/>
		<reference ref_id="CVE-2017-9110" ref_url="https://www.suse.com/security/cve/CVE-2017-9110/" source="CVE"/>
		<reference ref_id="CVE-2017-9114" ref_url="https://www.suse.com/security/cve/CVE-2017-9114/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003772.html" source="SUSE-SU"/>
		<description>
This update for openexr fixes the following issues:

* CVE-2017-9110: In OpenEXR, an invalid read of size 2 in the hufDecode function in ImfHuf.cpp could cause the application to crash. (bsc#1040107)
* CVE-2017-9114: In OpenEXR, an invalid read of size 1 in the refill function in ImfFastHuf.cpp could cause the application to crash.  (bsc#1040114)
* CVE-2017-12596: In OpenEXR, a crafted image causes a heap-based buffer over-read in the hufDecode function in IlmImf/ImfHuf.cpp during exrmaketiled execution; it could have resulted in denial of service or possibly unspecified other impact.  (bsc#1052522)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-02"/>
	<updated date="2018-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040107">SUSE bug 1040107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040114">SUSE bug 1040114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052522">SUSE bug 1052522</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12596/">CVE-2017-12596</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9110/">CVE-2017-9110</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9114/">CVE-2017-9114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518979" comment="libIlmImf-Imf_2_1-21-2.1.0-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518980" comment="libIlmImf-Imf_2_1-21-32bit-2.1.0-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518981" comment="openexr-2.1.0-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78131" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1042948" ref_url="https://bugzilla.suse.com/1042948" source="BUGZILLA"/>
		<reference ref_id="1049373" ref_url="https://bugzilla.suse.com/1049373" source="BUGZILLA"/>
		<reference ref_id="1051412" ref_url="https://bugzilla.suse.com/1051412" source="BUGZILLA"/>
		<reference ref_id="1052252" ref_url="https://bugzilla.suse.com/1052252" source="BUGZILLA"/>
		<reference ref_id="1052771" ref_url="https://bugzilla.suse.com/1052771" source="BUGZILLA"/>
		<reference ref_id="1058082" ref_url="https://bugzilla.suse.com/1058082" source="BUGZILLA"/>
		<reference ref_id="1072902" ref_url="https://bugzilla.suse.com/1072902" source="BUGZILLA"/>
		<reference ref_id="1074122" ref_url="https://bugzilla.suse.com/1074122" source="BUGZILLA"/>
		<reference ref_id="1074425" ref_url="https://bugzilla.suse.com/1074425" source="BUGZILLA"/>
		<reference ref_id="1074610" ref_url="https://bugzilla.suse.com/1074610" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000445" ref_url="https://www.suse.com/security/cve/CVE-2017-1000445/" source="CVE"/>
		<reference ref_id="CVE-2017-1000476" ref_url="https://www.suse.com/security/cve/CVE-2017-1000476/" source="CVE"/>
		<reference ref_id="CVE-2017-11449" ref_url="https://www.suse.com/security/cve/CVE-2017-11449/" source="CVE"/>
		<reference ref_id="CVE-2017-11751" ref_url="https://www.suse.com/security/cve/CVE-2017-11751/" source="CVE"/>
		<reference ref_id="CVE-2017-12430" ref_url="https://www.suse.com/security/cve/CVE-2017-12430/" source="CVE"/>
		<reference ref_id="CVE-2017-12642" ref_url="https://www.suse.com/security/cve/CVE-2017-12642/" source="CVE"/>
		<reference ref_id="CVE-2017-14249" ref_url="https://www.suse.com/security/cve/CVE-2017-14249/" source="CVE"/>
		<reference ref_id="CVE-2017-17680" ref_url="https://www.suse.com/security/cve/CVE-2017-17680/" source="CVE"/>
		<reference ref_id="CVE-2017-17882" ref_url="https://www.suse.com/security/cve/CVE-2017-17882/" source="CVE"/>
		<reference ref_id="CVE-2017-9409" ref_url="https://www.suse.com/security/cve/CVE-2017-9409/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003582.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2017-1000476: A CPU exhaustion vulnerability was found in the function
  ReadDDSInfo in coders/dds.c, which allowed attackers to cause a denial of
  service (bsc#1074610).
- CVE-2017-9409: The ReadMPCImage function in mpc.c allowed attackers to cause
  a denial of service (memory leak) via a crafted file (bsc#1042948).
- CVE-2017-1000445: A NULL pointer dereference in the MagickCore component
  might have lead to denial of service (bsc#1074425).
- CVE-2017-17680: Prevent a memory leak in the function ReadXPMImage in
  coders/xpm.c, which allowed attackers to cause a denial of service via a
  crafted XPM image file (a different vulnerability than CVE-2017-17882)
  (bsc#1072902).
- CVE-2017-17882: Prevent a memory leak in the function ReadXPMImage in
  coders/xpm.c, which allowed attackers to cause a denial of service via a
  crafted XPM image file (a different vulnerability than CVE-2017-17680)
  (bsc#1074122).
- CVE-2017-11449: coders/mpc did not enable seekable streams and thus could not
  validate blob sizes, which allowed remote attackers to cause a denial of
  service (application crash) or possibly have unspecified other impact via an
  image received from stdin (bsc#1049373).
- CVE-2017-12430: A memory exhaustion in the function ReadMPCImage in
  coders/mpc.c allowed attackers to cause DoS (bsc#1052252).
- CVE-2017-12642: Prevent a memory leak vulnerability in ReadMPCImage in
  coders\mpc.c via crafted file allowing for DoS (bsc#1052771).
- CVE-2017-14249: A mishandled EOF check in ReadMPCImage in coders/mpc.c that
  lead to a division by zero in GetPixelCacheTileSize in MagickCore/cache.c
  allowed remote attackers to cause a denial of service via a crafted file
  (bsc#1058082).
- Prevent memory leak via crafted file in pwp.c allowing for DoS (bsc#1051412)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-09"/>
	<updated date="2018-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042948">SUSE bug 1042948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049373">SUSE bug 1049373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051412">SUSE bug 1051412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052252">SUSE bug 1052252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052771">SUSE bug 1052771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058082">SUSE bug 1058082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072902">SUSE bug 1072902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074122">SUSE bug 1074122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074425">SUSE bug 1074425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074610">SUSE bug 1074610</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000445/">CVE-2017-1000445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000476/">CVE-2017-1000476</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11449/">CVE-2017-11449</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11751/">CVE-2017-11751</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12430/">CVE-2017-12430</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12642/">CVE-2017-12642</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14249/">CVE-2017-14249</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17680/">CVE-2017-17680</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17882/">CVE-2017-17882</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9409/">CVE-2017-9409</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518982" comment="ImageMagick-6.8.8.1-71.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518983" comment="libMagick++-6_Q16-3-6.8.8.1-71.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518984" comment="libMagickCore-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518985" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518986" comment="libMagickWand-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78132" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1081557" ref_url="https://bugzilla.suse.com/1081557" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18190" ref_url="https://www.suse.com/security/cve/CVE-2017-18190/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00023.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2017-18190: Removed localhost.localdomain from list
  of trustworthy hosts in scheduler/client.c to avoid arbitrary IPP
  command execution in conjunction with DNS rebinding.
  (bsc#1081557)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-05"/>
	<updated date="2018-03-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1081557">SUSE bug 1081557</bugzilla>
	<cve impact="important" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18190/">CVE-2017-18190</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518987" comment="cups-1.7.5-20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518988" comment="cups-client-1.7.5-20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518989" comment="cups-libs-1.7.5-20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518990" comment="cups-libs-32bit-1.7.5-20.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78133" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1021483" ref_url="https://bugzilla.suse.com/1021483" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10169" ref_url="https://www.suse.com/security/cve/CVE-2016-10169/" source="CVE"/>
		<reference ref_id="CVE-2016-10170" ref_url="https://www.suse.com/security/cve/CVE-2016-10170/" source="CVE"/>
		<reference ref_id="CVE-2016-10171" ref_url="https://www.suse.com/security/cve/CVE-2016-10171/" source="CVE"/>
		<reference ref_id="CVE-2016-10172" ref_url="https://www.suse.com/security/cve/CVE-2016-10172/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003788.html" source="SUSE-SU"/>
		<description>
This update for wavpack fixes the following issues:

- CVE-2016-10169 CVE-2016-10170 CVE-2016-10171 CVE-2016-10172: Make sure upper and lower boundaries make sense, to avoid out of bounds memory reads that could lead to crashes or disclosing memory. (bsc#1021483)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-05"/>
	<updated date="2018-03-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1021483">SUSE bug 1021483</bugzilla>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10169/">CVE-2016-10169</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10170/">CVE-2016-10170</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10171/">CVE-2016-10171</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10172/">CVE-2016-10172</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518991" comment="libwavpack1-4.60.99-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78134" version="1" class="patch">
	<metadata>
		<title>Security update for yaml-cpp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1032144" ref_url="https://bugzilla.suse.com/1032144" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5950" ref_url="https://www.suse.com/security/cve/CVE-2017-5950/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003791.html" source="SUSE-SU"/>
		<description>
This update for yaml-cpp fixes the following issues:

- CVE-2017-5950: Stack overflow in SingleDocParser::HandleNode() function (bsc#1032144)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-07"/>
	<updated date="2018-03-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1032144">SUSE bug 1032144</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5950/">CVE-2017-5950</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518992" comment="libyaml-cpp0_5-0.5.3-3.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78135" version="1" class="patch">
	<metadata>
		<title>Security update for shotwell (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1054311" ref_url="https://bugzilla.suse.com/1054311" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000024" ref_url="https://www.suse.com/security/cve/CVE-2017-1000024/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003794.html" source="SUSE-SU"/>
		<description>
This update for shotwell fixes the following issues:

Security issue fixed:

- CVE-2017-1000024: Use HTTPS encryption all over the publishing plugins (bsc#1054311).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-08"/>
	<updated date="2018-03-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1054311">SUSE bug 1054311</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000024/">CVE-2017-1000024</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518993" comment="shotwell-0.22.0+git.20160103-15.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518994" comment="shotwell-lang-0.22.0+git.20160103-15.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78136" version="1" class="patch">
	<metadata>
		<title>Security update for augeas (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1054171" ref_url="https://bugzilla.suse.com/1054171" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7555" ref_url="https://www.suse.com/security/cve/CVE-2017-7555/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003800.html" source="SUSE-SU"/>
		<description>
This update for augeas fixes the following issues:

Security issue fixed:

- CVE-2017-7555: Fix a memory corruption bug could have lead to arbitrary code execution
  by passing crafted strings that would be mis-handled by parse_name() (bsc#1054171).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-09"/>
	<updated date="2018-03-09"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1054171">SUSE bug 1054171</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7555/">CVE-2017-7555</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518995" comment="augeas-1.2.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518996" comment="augeas-lenses-1.2.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518997" comment="libaugeas0-1.2.0-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78137" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1081556" ref_url="https://bugzilla.suse.com/1081556" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12133" ref_url="https://www.suse.com/security/cve/CVE-2017-12133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003802.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2017-12133: Avoid use-after-free read access in clntudp_call (bsc#1081556)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-09"/>
	<updated date="2018-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081556">SUSE bug 1081556</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12133/">CVE-2017-12133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518998" comment="glibc-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518999" comment="glibc-32bit-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519000" comment="glibc-devel-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519001" comment="glibc-devel-32bit-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519002" comment="glibc-i18ndata-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519003" comment="glibc-locale-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519004" comment="glibc-locale-32bit-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519005" comment="nscd-2.22-62.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78138" version="1" class="patch">
	<metadata>
		<title>Security update for shadow (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1081294" ref_url="https://bugzilla.suse.com/1081294" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7169" ref_url="https://www.suse.com/security/cve/CVE-2018-7169/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003805.html" source="SUSE-SU"/>
		<description>
This update for shadow fixes the following issues:

- CVE-2018-7169: Fixed an privilege escalation in newgidmap,
  which allowed an unprivileged user to be placed in a user namespace where
  setgroups(2) is allowed. (bsc#1081294)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-12"/>
	<updated date="2018-03-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081294">SUSE bug 1081294</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7169/">CVE-2018-7169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519006" comment="shadow-4.2.1-27.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78139" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1076366" ref_url="https://bugzilla.suse.com/1076366" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2579" ref_url="https://www.suse.com/security/cve/CVE-2018-2579/" source="CVE"/>
		<reference ref_id="CVE-2018-2588" ref_url="https://www.suse.com/security/cve/CVE-2018-2588/" source="CVE"/>
		<reference ref_id="CVE-2018-2599" ref_url="https://www.suse.com/security/cve/CVE-2018-2599/" source="CVE"/>
		<reference ref_id="CVE-2018-2602" ref_url="https://www.suse.com/security/cve/CVE-2018-2602/" source="CVE"/>
		<reference ref_id="CVE-2018-2603" ref_url="https://www.suse.com/security/cve/CVE-2018-2603/" source="CVE"/>
		<reference ref_id="CVE-2018-2618" ref_url="https://www.suse.com/security/cve/CVE-2018-2618/" source="CVE"/>
		<reference ref_id="CVE-2018-2629" ref_url="https://www.suse.com/security/cve/CVE-2018-2629/" source="CVE"/>
		<reference ref_id="CVE-2018-2633" ref_url="https://www.suse.com/security/cve/CVE-2018-2633/" source="CVE"/>
		<reference ref_id="CVE-2018-2634" ref_url="https://www.suse.com/security/cve/CVE-2018-2634/" source="CVE"/>
		<reference ref_id="CVE-2018-2637" ref_url="https://www.suse.com/security/cve/CVE-2018-2637/" source="CVE"/>
		<reference ref_id="CVE-2018-2641" ref_url="https://www.suse.com/security/cve/CVE-2018-2641/" source="CVE"/>
		<reference ref_id="CVE-2018-2663" ref_url="https://www.suse.com/security/cve/CVE-2018-2663/" source="CVE"/>
		<reference ref_id="CVE-2018-2677" ref_url="https://www.suse.com/security/cve/CVE-2018-2677/" source="CVE"/>
		<reference ref_id="CVE-2018-2678" ref_url="https://www.suse.com/security/cve/CVE-2018-2678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00031.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Security issues fixed in OpenJDK 7u171 (January 2018 CPU)(bsc#1076366):

- CVE-2018-2579: Improve key keying case
- CVE-2018-2588: Improve LDAP logins
- CVE-2018-2599: Improve reliability of DNS lookups
- CVE-2018-2602: Improve usage messages
- CVE-2018-2603: Improve PKCS usage
- CVE-2018-2618: Stricter key generation
- CVE-2018-2629: Improve GSS handling
- CVE-2018-2633: Improve LDAP lookup robustness
- CVE-2018-2634: Improve property negotiations
- CVE-2018-2637: Improve JMX supportive features
- CVE-2018-2641: Improve GTK initialization
- CVE-2018-2663: More refactoring for deserialization cases
- CVE-2018-2677: More refactoring for client deserialization cases
- CVE-2018-2678: More refactoring for naming
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-12"/>
	<updated date="2018-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2579/">CVE-2018-2579</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2588/">CVE-2018-2588</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2599/">CVE-2018-2599</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2602/">CVE-2018-2602</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2603/">CVE-2018-2603</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2618/">CVE-2018-2618</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2629/">CVE-2018-2629</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2633/">CVE-2018-2633</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2634/">CVE-2018-2634</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2637/">CVE-2018-2637</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2641/">CVE-2018-2641</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2663/">CVE-2018-2663</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2677/">CVE-2018-2677</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2678/">CVE-2018-2678</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519007" comment="java-1_7_0-openjdk-1.7.0.171-43.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519008" comment="java-1_7_0-openjdk-headless-1.7.0.171-43.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78140" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1076366" ref_url="https://bugzilla.suse.com/1076366" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2579" ref_url="https://www.suse.com/security/cve/CVE-2018-2579/" source="CVE"/>
		<reference ref_id="CVE-2018-2582" ref_url="https://www.suse.com/security/cve/CVE-2018-2582/" source="CVE"/>
		<reference ref_id="CVE-2018-2588" ref_url="https://www.suse.com/security/cve/CVE-2018-2588/" source="CVE"/>
		<reference ref_id="CVE-2018-2599" ref_url="https://www.suse.com/security/cve/CVE-2018-2599/" source="CVE"/>
		<reference ref_id="CVE-2018-2602" ref_url="https://www.suse.com/security/cve/CVE-2018-2602/" source="CVE"/>
		<reference ref_id="CVE-2018-2603" ref_url="https://www.suse.com/security/cve/CVE-2018-2603/" source="CVE"/>
		<reference ref_id="CVE-2018-2618" ref_url="https://www.suse.com/security/cve/CVE-2018-2618/" source="CVE"/>
		<reference ref_id="CVE-2018-2629" ref_url="https://www.suse.com/security/cve/CVE-2018-2629/" source="CVE"/>
		<reference ref_id="CVE-2018-2633" ref_url="https://www.suse.com/security/cve/CVE-2018-2633/" source="CVE"/>
		<reference ref_id="CVE-2018-2634" ref_url="https://www.suse.com/security/cve/CVE-2018-2634/" source="CVE"/>
		<reference ref_id="CVE-2018-2637" ref_url="https://www.suse.com/security/cve/CVE-2018-2637/" source="CVE"/>
		<reference ref_id="CVE-2018-2641" ref_url="https://www.suse.com/security/cve/CVE-2018-2641/" source="CVE"/>
		<reference ref_id="CVE-2018-2663" ref_url="https://www.suse.com/security/cve/CVE-2018-2663/" source="CVE"/>
		<reference ref_id="CVE-2018-2677" ref_url="https://www.suse.com/security/cve/CVE-2018-2677/" source="CVE"/>
		<reference ref_id="CVE-2018-2678" ref_url="https://www.suse.com/security/cve/CVE-2018-2678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Security issues fix in jdk8u161 (icedtea 3.7.0)(bsc#1076366):

- CVE-2018-2579: Improve key keying case
- CVE-2018-2582: Better interface invocations
- CVE-2018-2588: Improve LDAP logins
- CVE-2018-2599: Improve reliability of DNS lookups
- CVE-2018-2602: Improve usage messages
- CVE-2018-2603: Improve PKCS usage
- CVE-2018-2618: Stricter key generation
- CVE-2018-2629: Improve GSS handling
- CVE-2018-2633: Improve LDAP lookup robustness
- CVE-2018-2634: Improve property negotiations
- CVE-2018-2637: Improve JMX supportive features
- CVE-2018-2641: Improve GTK initialization
- CVE-2018-2663: More refactoring for deserialization cases
- CVE-2018-2677: More refactoring for client deserialization cases
- CVE-2018-2678: More refactoring for naming deserialization cases
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-12"/>
	<updated date="2018-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2579/">CVE-2018-2579</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2582/">CVE-2018-2582</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2588/">CVE-2018-2588</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2599/">CVE-2018-2599</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2602/">CVE-2018-2602</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2603/">CVE-2018-2603</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2618/">CVE-2018-2618</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2629/">CVE-2018-2629</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2633/">CVE-2018-2633</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2634/">CVE-2018-2634</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2637/">CVE-2018-2637</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2641/">CVE-2018-2641</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2663/">CVE-2018-2663</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2677/">CVE-2018-2677</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2678/">CVE-2018-2678</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519009" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519010" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78141" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1077983" ref_url="https://bugzilla.suse.com/1077983" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1053" ref_url="https://www.suse.com/security/cve/CVE-2018-1053/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003813.html" source="SUSE-SU"/>
		<description>

  
This update for postgresql94 fixes the following issues:

PostgreSQL was updated to version 9.4.15, the full release notes are here:

	https://www.postgresql.org/docs/9.4/static/release-9-4-15.html

- CVE-2018-1053: Ensure that all temporary files made by pg_upgrade are non-world-readable. (bsc#1077983)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-14"/>
	<updated date="2018-03-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077983">SUSE bug 1077983</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1053/">CVE-2018-1053</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519011" comment="postgresql94-9.4.16-21.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78142" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1077355" ref_url="https://bugzilla.suse.com/1077355" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1142857" ref_url="https://www.suse.com/security/cve/CVE-2015-1142857/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003812.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

- CVE-2015-1142857: Add 7.13.1.0 bnx2x firmware files to fix a ethernet flow control
  vulnerability in SRIOV devices (bsc#1077355)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-14"/>
	<updated date="2018-03-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077355">SUSE bug 1077355</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-1142857/">CVE-2015-1142857</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519012" comment="kernel-firmware-20170530-21.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519013" comment="ucode-amd-20170530-21.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78143" version="1" class="patch">
	<metadata>
		<title>Security update for libcdio (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1082877" ref_url="https://bugzilla.suse.com/1082877" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18201" ref_url="https://www.suse.com/security/cve/CVE-2017-18201/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003811.html" source="SUSE-SU"/>
		<description>
This update for libcdio fixes the following issues:

- CVE-2017-18201: Fixed a double free vulnerability (bsc#1082877).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-14"/>
	<updated date="2018-03-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1082877">SUSE bug 1082877</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18201/">CVE-2017-18201</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519014" comment="libcdio14-0.90-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519015" comment="libcdio14-32bit-0.90-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519016" comment="libiso9660-8-0.90-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78144" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1078431" ref_url="https://bugzilla.suse.com/1078431" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2562" ref_url="https://www.suse.com/security/cve/CVE-2018-2562/" source="CVE"/>
		<reference ref_id="CVE-2018-2612" ref_url="https://www.suse.com/security/cve/CVE-2018-2612/" source="CVE"/>
		<reference ref_id="CVE-2018-2622" ref_url="https://www.suse.com/security/cve/CVE-2018-2622/" source="CVE"/>
		<reference ref_id="CVE-2018-2640" ref_url="https://www.suse.com/security/cve/CVE-2018-2640/" source="CVE"/>
		<reference ref_id="CVE-2018-2665" ref_url="https://www.suse.com/security/cve/CVE-2018-2665/" source="CVE"/>
		<reference ref_id="CVE-2018-2668" ref_url="https://www.suse.com/security/cve/CVE-2018-2668/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00040.html" source="SUSE-SU"/>
		<description>

  
This update for mariadb fixes the following issues:

MariaDB was updated to 10.0.34 (bsc#1078431)

The following security vulnerabilities are fixed:

- CVE-2018-2562: Vulnerability in the MySQL Server subcomponent: Server : Partition. Easily exploitable vulnerability allowed low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data.
- CVE-2018-2622: Vulnerability in the MySQL Server subcomponent: Server: DDL. Easily exploitable vulnerability allowed low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
- CVE-2018-2640: Vulnerability in the MySQL Server subcomponent: Server: Optimizer. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
- CVE-2018-2665: Vulnerability in the MySQL Server subcomponent: Server: Optimizer. Easily exploitable vulnerability allowed low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
- CVE-2018-2668: Vulnerability in the MySQL Server subcomponent: Server: Optimizer. Easily exploitable vulnerability allowed low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
- CVE-2018-2612: Vulnerability in the MySQL Server subcomponent: InnoDB. Easily exploitable vulnerability allowed high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.


The MariaDB external release notes and changelog for this release:

* https://kb.askmonty.org/en/mariadb-10034-release-notes
* https://kb.askmonty.org/en/mariadb-10034-changelog

		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-15"/>
	<updated date="2018-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1078431">SUSE bug 1078431</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-2562/">CVE-2018-2562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2612/">CVE-2018-2612</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2622/">CVE-2018-2622</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2640/">CVE-2018-2640</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2665/">CVE-2018-2665</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2668/">CVE-2018-2668</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519017" comment="libmysqlclient18-10.0.34-29.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519018" comment="libmysqlclient18-32bit-10.0.34-29.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519019" comment="libmysqlclient_r18-10.0.34-29.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519020" comment="libmysqlclient_r18-32bit-10.0.34-29.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519021" comment="mariadb-10.0.34-29.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519022" comment="mariadb-client-10.0.34-29.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519023" comment="mariadb-errormessages-10.0.34-29.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78145" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1085207" ref_url="https://bugzilla.suse.com/1085207" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0708-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00044.html" source="SUSE-SU"/>
		<description>

This update for ucode-intel fixes the following issues:

The Intel CPU microcode version was updated to version 20180312.

This update enables the IBPB+IBRS based mitigations of the Spectre v2 flaws (boo#1085207 CVE-2017-5715)

- New Platforms

  - BDX-DE EGW A0 6-56-5:10 e000009
  - SKX B1 6-55-3:97 1000140

- Updates

  - SNB D2 6-2a-7:12 29-&gt;2d
  - JKT C1 6-2d-6:6d 619-&gt;61c
  - JKT C2 6-2d-7:6d 710-&gt;713
  - IVB E2 6-3a-9:12 1c-&gt;1f
  - IVT C0 6-3e-4:ed 428-&gt;42c
  - IVT D1 6-3e-7:ed 70d-&gt;713
  - HSW Cx/Dx 6-3c-3:32 22-&gt;24
  - HSW-ULT Cx/Dx 6-45-1:72 20-&gt;23
  - CRW Cx 6-46-1:32 17-&gt;19
  - HSX C0 6-3f-2:6f 3a-&gt;3c
  - HSX-EX E0 6-3f-4:80 0f-&gt;11
  - BDW-U/Y E/F 6-3d-4:c0 25-&gt;2a
  - BDW-H E/G 6-47-1:22 17-&gt;1d
  - BDX-DE V0/V1 6-56-2:10 0f-&gt;15
  - BDW-DE V2 6-56-3:10 700000d-&gt;7000012
  - BDW-DE Y0 6-56-4:10 f00000a-&gt;f000011
  - SKL-U/Y D0 6-4e-3:c0 ba-&gt;c2
  - SKL R0 6-5e-3:36 ba-&gt;c2
  - KBL-U/Y H0 6-8e-9:c0 62-&gt;84
  - KBL B0 6-9e-9:2a 5e-&gt;84
  - CFL D0 6-8e-a:c0 70-&gt;84
  - CFL U0 6-9e-a:22 70-&gt;84
  - CFL B0 6-9e-b:02 72-&gt;84
  - SKX H0 6-55-4:b7 2000035-&gt;2000043
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-16"/>
	<updated date="2018-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085207">SUSE bug 1085207</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519024" comment="ucode-intel-20180312-13.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78146" version="1" class="patch">
	<metadata>
		<title>Security update for libid3tag (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1081959" ref_url="https://bugzilla.suse.com/1081959" source="BUGZILLA"/>
		<reference ref_id="1081961" ref_url="https://bugzilla.suse.com/1081961" source="BUGZILLA"/>
		<reference ref_id="1081962" ref_url="https://bugzilla.suse.com/1081962" source="BUGZILLA"/>
		<reference ref_id="387731" ref_url="https://bugzilla.suse.com/387731" source="BUGZILLA"/>
		<reference ref_id="CVE-2004-2779" ref_url="https://www.suse.com/security/cve/CVE-2004-2779/" source="CVE"/>
		<reference ref_id="CVE-2008-2109" ref_url="https://www.suse.com/security/cve/CVE-2008-2109/" source="CVE"/>
		<reference ref_id="CVE-2017-11550" ref_url="https://www.suse.com/security/cve/CVE-2017-11550/" source="CVE"/>
		<reference ref_id="CVE-2017-11551" ref_url="https://www.suse.com/security/cve/CVE-2017-11551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003823.html" source="SUSE-SU"/>
		<description>
This update for libid3tag fixes the following issues:

- CVE-2004-2779 CVE-2017-11551: Fixed id3_utf16_deserialize() in utf16.c,
  which previously misparsed ID3v2 tags encoded in UTF-16 with an odd
  number of bytes, triggering an endless loop allocating memory until
  OOM leading to DoS. (bsc#1081959 bsc#1081961)
- CVE-2017-11550 CVE-2008-2109: Fixed the handling of unknown
  encodings when parsing ID3 tags. (bsc#1081962 bsc#387731)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-16"/>
	<updated date="2018-03-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081959">SUSE bug 1081959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081961">SUSE bug 1081961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081962">SUSE bug 1081962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/387731">SUSE bug 387731</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2004-2779/">CVE-2004-2779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2109/">CVE-2008-2109</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11550/">CVE-2017-11550</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11551/">CVE-2017-11551</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519025" comment="libid3tag0-0.15.1b-184.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78147" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1081925" ref_url="https://bugzilla.suse.com/1081925" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1058" ref_url="https://www.suse.com/security/cve/CVE-2018-1058/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003829.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

Security issues fixed:

- CVE-2018-1058: Fixed uncontrolled search path element in pg_dump and other client applications (bsc#1081925).


Bug fixes:

- See release notes for details:
  * https://www.postgresql.org/docs/9.6/static/release-9-6-8.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-21"/>
	<updated date="2018-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081925">SUSE bug 1081925</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1058/">CVE-2018-1058</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519026" comment="libecpg6-9.6.8-3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519027" comment="libpq5-9.6.8-3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519028" comment="libpq5-32bit-9.6.8-3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519029" comment="postgresql96-9.6.8-3.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78148" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1084521" ref_url="https://bugzilla.suse.com/1084521" source="BUGZILLA"/>
		<reference ref_id="1084524" ref_url="https://bugzilla.suse.com/1084524" source="BUGZILLA"/>
		<reference ref_id="1084532" ref_url="https://bugzilla.suse.com/1084532" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000120" ref_url="https://www.suse.com/security/cve/CVE-2018-1000120/" source="CVE"/>
		<reference ref_id="CVE-2018-1000121" ref_url="https://www.suse.com/security/cve/CVE-2018-1000121/" source="CVE"/>
		<reference ref_id="CVE-2018-1000122" ref_url="https://www.suse.com/security/cve/CVE-2018-1000122/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0769-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180769-1.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Following security issues were fixed:

- CVE-2018-1000120: A buffer overflow exists in the FTP URL handling that allowed an attacker to cause a denial of service or possible code execution (bsc#1084521).
- CVE-2018-1000121: A NULL pointer dereference exists in the LDAP code that allowed an attacker to cause a denial of service (bsc#1084524).
- CVE-2018-1000122: A buffer over-read exists in the RTSP+RTP handling code that allowed an attacker to cause a denial of service or information leakage (bsc#1084532).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-22"/>
	<updated date="2018-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1084521">SUSE bug 1084521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084524">SUSE bug 1084524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084532">SUSE bug 1084532</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000120/">CVE-2018-1000120</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000121/">CVE-2018-1000121</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000122/">CVE-2018-1000122</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519030" comment="curl-7.37.0-37.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519031" comment="libcurl4-7.37.0-37.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519032" comment="libcurl4-32bit-7.37.0-37.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78149" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1085687" ref_url="https://bugzilla.suse.com/1085687" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003834.html" source="SUSE-SU"/>
		<description>
This update for libvorbis fixes the following issues:

- CVE-2018-5146: Fixed out of bounds memory write while processing Vorbis audio data (bsc#1085687).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-23"/>
	<updated date="2018-03-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085687">SUSE bug 1085687</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519033" comment="libvorbis0-1.3.3-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519034" comment="libvorbis0-32bit-1.3.3-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519035" comment="libvorbisenc2-1.3.3-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519036" comment="libvorbisenc2-32bit-1.3.3-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519037" comment="libvorbisfile3-1.3.3-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519038" comment="libvorbisfile3-32bit-1.3.3-10.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78150" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1005776" ref_url="https://bugzilla.suse.com/1005776" source="BUGZILLA"/>
		<reference ref_id="1006867" ref_url="https://bugzilla.suse.com/1006867" source="BUGZILLA"/>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1012829" ref_url="https://bugzilla.suse.com/1012829" source="BUGZILLA"/>
		<reference ref_id="1027054" ref_url="https://bugzilla.suse.com/1027054" source="BUGZILLA"/>
		<reference ref_id="1031717" ref_url="https://bugzilla.suse.com/1031717" source="BUGZILLA"/>
		<reference ref_id="1034503" ref_url="https://bugzilla.suse.com/1034503" source="BUGZILLA"/>
		<reference ref_id="1035432" ref_url="https://bugzilla.suse.com/1035432" source="BUGZILLA"/>
		<reference ref_id="1042286" ref_url="https://bugzilla.suse.com/1042286" source="BUGZILLA"/>
		<reference ref_id="1043441" ref_url="https://bugzilla.suse.com/1043441" source="BUGZILLA"/>
		<reference ref_id="1045330" ref_url="https://bugzilla.suse.com/1045330" source="BUGZILLA"/>
		<reference ref_id="1062840" ref_url="https://bugzilla.suse.com/1062840" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065615" ref_url="https://bugzilla.suse.com/1065615" source="BUGZILLA"/>
		<reference ref_id="1066223" ref_url="https://bugzilla.suse.com/1066223" source="BUGZILLA"/>
		<reference ref_id="1067118" ref_url="https://bugzilla.suse.com/1067118" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068569" ref_url="https://bugzilla.suse.com/1068569" source="BUGZILLA"/>
		<reference ref_id="1069135" ref_url="https://bugzilla.suse.com/1069135" source="BUGZILLA"/>
		<reference ref_id="1071306" ref_url="https://bugzilla.suse.com/1071306" source="BUGZILLA"/>
		<reference ref_id="1071892" ref_url="https://bugzilla.suse.com/1071892" source="BUGZILLA"/>
		<reference ref_id="1072363" ref_url="https://bugzilla.suse.com/1072363" source="BUGZILLA"/>
		<reference ref_id="1072689" ref_url="https://bugzilla.suse.com/1072689" source="BUGZILLA"/>
		<reference ref_id="1072739" ref_url="https://bugzilla.suse.com/1072739" source="BUGZILLA"/>
		<reference ref_id="1072865" ref_url="https://bugzilla.suse.com/1072865" source="BUGZILLA"/>
		<reference ref_id="1073401" ref_url="https://bugzilla.suse.com/1073401" source="BUGZILLA"/>
		<reference ref_id="1074198" ref_url="https://bugzilla.suse.com/1074198" source="BUGZILLA"/>
		<reference ref_id="1074426" ref_url="https://bugzilla.suse.com/1074426" source="BUGZILLA"/>
		<reference ref_id="1075087" ref_url="https://bugzilla.suse.com/1075087" source="BUGZILLA"/>
		<reference ref_id="1076282" ref_url="https://bugzilla.suse.com/1076282" source="BUGZILLA"/>
		<reference ref_id="1077285" ref_url="https://bugzilla.suse.com/1077285" source="BUGZILLA"/>
		<reference ref_id="1077513" ref_url="https://bugzilla.suse.com/1077513" source="BUGZILLA"/>
		<reference ref_id="1077560" ref_url="https://bugzilla.suse.com/1077560" source="BUGZILLA"/>
		<reference ref_id="1077779" ref_url="https://bugzilla.suse.com/1077779" source="BUGZILLA"/>
		<reference ref_id="1078583" ref_url="https://bugzilla.suse.com/1078583" source="BUGZILLA"/>
		<reference ref_id="1078609" ref_url="https://bugzilla.suse.com/1078609" source="BUGZILLA"/>
		<reference ref_id="1078672" ref_url="https://bugzilla.suse.com/1078672" source="BUGZILLA"/>
		<reference ref_id="1078673" ref_url="https://bugzilla.suse.com/1078673" source="BUGZILLA"/>
		<reference ref_id="1078787" ref_url="https://bugzilla.suse.com/1078787" source="BUGZILLA"/>
		<reference ref_id="1079029" ref_url="https://bugzilla.suse.com/1079029" source="BUGZILLA"/>
		<reference ref_id="1079038" ref_url="https://bugzilla.suse.com/1079038" source="BUGZILLA"/>
		<reference ref_id="1079384" ref_url="https://bugzilla.suse.com/1079384" source="BUGZILLA"/>
		<reference ref_id="1079989" ref_url="https://bugzilla.suse.com/1079989" source="BUGZILLA"/>
		<reference ref_id="1080014" ref_url="https://bugzilla.suse.com/1080014" source="BUGZILLA"/>
		<reference ref_id="1080263" ref_url="https://bugzilla.suse.com/1080263" source="BUGZILLA"/>
		<reference ref_id="1080344" ref_url="https://bugzilla.suse.com/1080344" source="BUGZILLA"/>
		<reference ref_id="1080360" ref_url="https://bugzilla.suse.com/1080360" source="BUGZILLA"/>
		<reference ref_id="1080364" ref_url="https://bugzilla.suse.com/1080364" source="BUGZILLA"/>
		<reference ref_id="1080384" ref_url="https://bugzilla.suse.com/1080384" source="BUGZILLA"/>
		<reference ref_id="1080464" ref_url="https://bugzilla.suse.com/1080464" source="BUGZILLA"/>
		<reference ref_id="1080774" ref_url="https://bugzilla.suse.com/1080774" source="BUGZILLA"/>
		<reference ref_id="1080809" ref_url="https://bugzilla.suse.com/1080809" source="BUGZILLA"/>
		<reference ref_id="1080813" ref_url="https://bugzilla.suse.com/1080813" source="BUGZILLA"/>
		<reference ref_id="1080851" ref_url="https://bugzilla.suse.com/1080851" source="BUGZILLA"/>
		<reference ref_id="1081134" ref_url="https://bugzilla.suse.com/1081134" source="BUGZILLA"/>
		<reference ref_id="1081431" ref_url="https://bugzilla.suse.com/1081431" source="BUGZILLA"/>
		<reference ref_id="1081491" ref_url="https://bugzilla.suse.com/1081491" source="BUGZILLA"/>
		<reference ref_id="1081498" ref_url="https://bugzilla.suse.com/1081498" source="BUGZILLA"/>
		<reference ref_id="1081500" ref_url="https://bugzilla.suse.com/1081500" source="BUGZILLA"/>
		<reference ref_id="1081512" ref_url="https://bugzilla.suse.com/1081512" source="BUGZILLA"/>
		<reference ref_id="1081671" ref_url="https://bugzilla.suse.com/1081671" source="BUGZILLA"/>
		<reference ref_id="1082223" ref_url="https://bugzilla.suse.com/1082223" source="BUGZILLA"/>
		<reference ref_id="1082299" ref_url="https://bugzilla.suse.com/1082299" source="BUGZILLA"/>
		<reference ref_id="1082478" ref_url="https://bugzilla.suse.com/1082478" source="BUGZILLA"/>
		<reference ref_id="1082795" ref_url="https://bugzilla.suse.com/1082795" source="BUGZILLA"/>
		<reference ref_id="1082864" ref_url="https://bugzilla.suse.com/1082864" source="BUGZILLA"/>
		<reference ref_id="1082897" ref_url="https://bugzilla.suse.com/1082897" source="BUGZILLA"/>
		<reference ref_id="1082979" ref_url="https://bugzilla.suse.com/1082979" source="BUGZILLA"/>
		<reference ref_id="1082993" ref_url="https://bugzilla.suse.com/1082993" source="BUGZILLA"/>
		<reference ref_id="1083494" ref_url="https://bugzilla.suse.com/1083494" source="BUGZILLA"/>
		<reference ref_id="1083548" ref_url="https://bugzilla.suse.com/1083548" source="BUGZILLA"/>
		<reference ref_id="1084610" ref_url="https://bugzilla.suse.com/1084610" source="BUGZILLA"/>
		<reference ref_id="1085053" ref_url="https://bugzilla.suse.com/1085053" source="BUGZILLA"/>
		<reference ref_id="1085107" ref_url="https://bugzilla.suse.com/1085107" source="BUGZILLA"/>
		<reference ref_id="1085224" ref_url="https://bugzilla.suse.com/1085224" source="BUGZILLA"/>
		<reference ref_id="1085239" ref_url="https://bugzilla.suse.com/1085239" source="BUGZILLA"/>
		<reference ref_id="863764" ref_url="https://bugzilla.suse.com/863764" source="BUGZILLA"/>
		<reference ref_id="966328" ref_url="https://bugzilla.suse.com/966328" source="BUGZILLA"/>
		<reference ref_id="975772" ref_url="https://bugzilla.suse.com/975772" source="BUGZILLA"/>
		<reference ref_id="983145" ref_url="https://bugzilla.suse.com/983145" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2017-15951" ref_url="https://www.suse.com/security/cve/CVE-2017-15951/" source="CVE"/>
		<reference ref_id="CVE-2017-16644" ref_url="https://www.suse.com/security/cve/CVE-2017-16644/" source="CVE"/>
		<reference ref_id="CVE-2017-16912" ref_url="https://www.suse.com/security/cve/CVE-2017-16912/" source="CVE"/>
		<reference ref_id="CVE-2017-16913" ref_url="https://www.suse.com/security/cve/CVE-2017-16913/" source="CVE"/>
		<reference ref_id="CVE-2017-17975" ref_url="https://www.suse.com/security/cve/CVE-2017-17975/" source="CVE"/>
		<reference ref_id="CVE-2017-18208" ref_url="https://www.suse.com/security/cve/CVE-2017-18208/" source="CVE"/>
		<reference ref_id="CVE-2018-1000026" ref_url="https://www.suse.com/security/cve/CVE-2018-1000026/" source="CVE"/>
		<reference ref_id="CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068/" source="CVE"/>
		<reference ref_id="CVE-2018-8087" ref_url="https://www.suse.com/security/cve/CVE-2018-8087/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00055.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 kernel was updated to 4.4.120 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-13166: An elevation of privilege vulnerability in the v4l2 video driver was fixed. (bnc#1072865).
- CVE-2017-15951: The KEYS subsystem did not correctly synchronize the actions of updating versus finding a key in the 'negative' state to avoid a race condition, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls (bnc#1062840 bnc#1065615).
- CVE-2017-16644: The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c allowed local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067118).
- CVE-2017-16912: The 'get_pipe()' function (drivers/usb/usbip/stub_rx.c) allowed attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet (bnc#1078673).
- CVE-2017-16913: The 'stub_recv_cmd_submit()' function (drivers/usb/usbip/stub_rx.c) when handling CMD_SUBMIT packets allowed attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet (bnc#1078672).
- CVE-2017-17975: Use-after-free in the usbtv_probe function in drivers/media/usb/usbtv/usbtv-core.c allowed attackers to cause a denial of service (system crash) or possibly have unspecified other impact by triggering failure of audio registration, because a kfree of the usbtv data structure occurs during a usbtv_video_free call, but the usbtv_video_fail label's code attempts to both access and free this data structure (bnc#1074426).
- CVE-2017-18208: The madvise_willneed function in mm/madvise.c allowed local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping (bnc#1083494).
- CVE-2018-8087: Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c allowed local users to cause a denial of service (memory consumption) by triggering an out-of-array error case (bnc#1085053).
- CVE-2018-1000026: A insufficient input validation vulnerability in the bnx2x network card driver could result in DoS: Network card firmware assertion takes card off-line. This attack appear to be exploitable via An attacker on a must pass a very large, specially crafted packet to the bnx2x card. This can be done from an untrusted guest VM. (bnc#1079384).
- CVE-2018-1068: Insufficient user provided offset checking in the ebtables compat code allowed local attackers to overwrite kernel memory and potentially execute code. (bsc#1085107)

The following non-security bugs were fixed:

- acpi / bus: Leave modalias empty for devices which are not present (bnc#1012382).
- acpi: sbshc: remove raw pointer from printk() message (bnc#1012382).
- Add delay-init quirk for Corsair K70 RGB keyboards (bnc#1012382).
- add ip6_make_flowinfo helper (bsc#1042286).
- ahci: Add Intel Cannon Lake PCH-H PCI ID (bnc#1012382).
- ahci: Add PCI ids for Intel Bay Trail, Cherry Trail and Apollo Lake AHCI (bnc#1012382).
- ahci: Annotate PCI ids for mobile Intel chipsets as such (bnc#1012382).
- alpha: fix crash if pthread_create races with signal delivery (bnc#1012382).
- alpha: fix reboot on Avanti platform (bnc#1012382).
- alsa: hda/ca0132 - fix possible NULL pointer use (bnc#1012382).
- alsa: hda - Fix headset mic detection problem for two Dell machines (bnc#1012382).
- alsa: hda/realtek - Add headset mode support for Dell laptop (bsc#1031717).
- alsa: hda/realtek: PCI quirk for Fujitsu U7x7 (bnc#1012382).
- alsa: hda - Reduce the suspend time consumption for ALC256 (bsc#1031717).
- alsa: hda - Use IS_REACHABLE() for dependency on input (bsc#1031717).
- alsa: seq: Fix racy pool initializations (bnc#1012382).
- alsa: seq: Fix regression by incorrect ioctl_mutex usages (bnc#1012382).
- alsa: usb-audio: add implicit fb quirk for Behringer UFX1204 (bnc#1012382).
- alsa: usb-audio: Fix UAC2 get_ctl request with a RANGE attribute (bnc#1012382).
- amd-xgbe: Fix unused suspend handlers build warning (bnc#1012382).
- arm64: define BUG() instruction without CONFIG_BUG (bnc#1012382).
- arm64: Disable unhandled signal log messages by default (bnc#1012382).
- arm64: dts: add #cooling-cells to CPU nodes (bnc#1012382).
- arm64: Kconfig: select COMPAT_BINFMT_ELF only when BINFMT_ELF is set (bnc#1012382).
- arm: 8731/1: Fix csum_partial_copy_from_user() stack mismatch (bnc#1012382).
- arm: AM33xx: PRM: Remove am33xx_pwrdm_read_prev_pwrst function (bnc#1012382).
- arm: dts: am4372: Correct the interrupts_properties of McASP (bnc#1012382).
- arm: dts: Fix omap4 hang with GPS connected to USB by using wakeupgen (bnc#1012382).
- arm: dts: ls1021a: fix incorrect clock references (bnc#1012382).
- arm: dts: s5pv210: add interrupt-parent for ohci (bnc#1012382).
- arm: dts: STi: Add gpio polarity for 'hdmi,hpd-gpio' property (bnc#1012382).
- arm: kvm: Fix SMCCC handling of unimplemented SMC/HVC calls (bnc#1012382).
- arm: OMAP2+: Fix SRAM virt to phys translation for save_secure_ram_context (bnc#1012382).
- arm: omap2: hide omap3_save_secure_ram on non-OMAP3 builds (git-fixes).
- arm: pxa/tosa-bt: add MODULE_LICENSE tag (bnc#1012382).
- arm: spear13xx: Fix dmas cells (bnc#1012382).
- arm: spear13xx: Fix spics gpio controller's warning (bnc#1012382).
- arm: spear600: Add missing interrupt-parent of rtc (bnc#1012382).
- arm: tegra: select USB_ULPI from EHCI rather than platform (bnc#1012382).
- asoc: au1x: Fix timeout tests in au1xac97c_ac97_read() (bsc#1031717).
- asoc: Intel: Kconfig: fix build when acpi is not enabled (bnc#1012382).
- asoc: Intel: sst: Fix the return value of 'sst_send_byte_stream_mrfld()' (bsc#1031717).
- asoc: mediatek: add i2c dependency (bnc#1012382).
- asoc: nuc900: Fix a loop timeout test (bsc#1031717).
- asoc: pcm512x: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bnc#1012382).
- asoc: rockchip: disable clock on error (bnc#1012382).
- asoc: rockchip: use __maybe_unused to hide st_irq_syscfg_resume (bnc#1012382).
- asoc: rsnd: avoid duplicate free_irq() (bnc#1012382).
- asoc: rsnd: do not call free_irq() on Parent SSI (bnc#1012382).
- asoc: simple-card: Fix misleading error message (bnc#1012382).
- asoc: ux500: add MODULE_LICENSE tag (bnc#1012382).
- ata: ahci_xgene: free structure returned by acpi_get_object_info() (bsc#1082979).
- b2c2: flexcop: avoid unused function warnings (bnc#1012382).
- binder: add missing binder_unlock() (bnc#1012382).
- binder: check for binder_thread allocation failure in binder_poll() (bnc#1012382).
- binfmt_elf: compat: avoid unused function warning (bnc#1012382).
- blacklist.conf: commit fd5f7cde1b85d4c8e09 ('printk: Never set console_may_schedule in console_trylock()')
- blktrace: fix unlocked registration of tracepoints (bnc#1012382).
- bluetooth: btsdio: Do not bind to non-removable BCM43341 (bnc#1012382).
- bluetooth: btusb: Restore QCA Rome suspend/resume fix with a 'rewritten' version (bnc#1012382).
- bnx2x: Improve reliability in case of nested PCI errors (bnc#1012382).
- bnxt_en: Fix the 'Invalid VF' id check in bnxt_vf_ndo_prep routine (bnc#1012382).
- bpf: arsh is not supported in 32 bit alu thus reject it (bnc#1012382).
- bpf: avoid false sharing of map refcount with max_entries (bnc#1012382).
- bpf: fix 32-bit divide by zero (bnc#1012382).
- bpf: fix bpf_tail_call() x64 JIT (bnc#1012382).
- bpf: fix divides by zero (bnc#1012382).
- bpf: introduce BPF_JIT_ALWAYS_ON config (bnc#1012382).
- bpf: reject stores into ctx via st and xadd (bnc#1012382).
- bridge: implement missing ndo_uninit() (bsc#1042286).
- bridge: move bridge multicast cleanup to ndo_uninit (bsc#1042286).
- btrfs: copy fsid to super_block s_uuid (bsc#1080774).
- btrfs: fix crash due to not cleaning up tree log block's dirty bits (bnc#1012382).
- btrfs: fix deadlock in run_delalloc_nocow (bnc#1012382).
- btrfs: fix deadlock when writing out space cache (bnc#1012382).
- btrfs: fix kernel oops while reading compressed data (bsc#1081671).
- btrfs: Fix possible off-by-one in btrfs_search_path_in_tree (bnc#1012382).
- btrfs: Fix quota reservation leak on preallocated files (bsc#1079989).
- btrfs: fix unexpected -EEXIST when creating new inode (bnc#1012382).
- btrfs: Handle btrfs_set_extent_delalloc failure in fixup worker (bnc#1012382).
- can: flex_can: Correct the checking for frame length in flexcan_start_xmit() (bnc#1012382).
- cdrom: turn off autoclose by default (bsc#1080813).
- cfg80211: check dev_set_name() return value (bnc#1012382).
- cfg80211: fix cfg80211_beacon_dup (bnc#1012382).
- cifs: dump IPC tcon in debug proc file (bsc#1071306).
- cifs: Fix autonegotiate security settings mismatch (bnc#1012382).
- cifs: Fix missing put_xid in cifs_file_strict_mmap (bnc#1012382).
- cifs: make IPC a regular tcon (bsc#1071306).
- cifs: use tcon_ipc instead of use_ipc parameter of SMB2_ioctl (bsc#1071306).
- cifs: zero sensitive data when freeing (bnc#1012382).
- clk: fix a panic error caused by accessing NULL pointer (bnc#1012382).
- console/dummy: leave .con_font_get set to NULL (bnc#1012382).
- cpufreq: Add Loongson machine dependencies (bnc#1012382).
- crypto: aesni - handle zero length dst buffer (bnc#1012382).
- crypto: af_alg - whitelist mask and type (bnc#1012382).
- crypto: caam - fix endless loop when DECO acquire fails (bnc#1012382).
- crypto: cryptd - pass through absence of -&gt;setkey() (bnc#1012382).
- crypto: hash - introduce crypto_hash_alg_has_setkey() (bnc#1012382).
- crypto: poly1305 - remove -&gt;setkey() method (bnc#1012382).
- crypto: s5p-sss - Fix kernel Oops in AES-ECB mode (bnc#1012382).
- crypto: tcrypt - fix S/G table for test_aead_speed() (bnc#1012382).
- crypto: x86/twofish-3way - Fix %rbp usage (bnc#1012382).
- cw1200: fix bogus maybe-uninitialized warning (bnc#1012382).
- dccp: limit sk_filter trim to payload (bsc#1042286).
- dell-wmi, dell-laptop: depends DMI (bnc#1012382).
- dlm: fix double list_del() (bsc#1082795).
- dlm: fix NULL pointer dereference in send_to_sock() (bsc#1082795).
- dmaengine: at_hdmac: fix potential NULL pointer dereference in atc_prep_dma_interleaved (bnc#1012382).
- dmaengine: dmatest: fix container_of member in dmatest_callback (bnc#1012382).
- dmaengine: ioat: Fix error handling path (bnc#1012382).
- dmaengine: jz4740: disable/unprepare clk if probe fails (bnc#1012382).
- dmaengine: zx: fix build warning (bnc#1012382).
- dm: correctly handle chained bios in dec_pending() (bnc#1012382).
- dn_getsockoptdecnet: move nf_{get/set}sockopt outside sock lock (bnc#1012382).
- do not put symlink bodies in pagecache into highmem (bnc#1012382).
- dpt_i2o: fix build warning (bnc#1012382).
- driver-core: use 'dev' argument in dev_dbg_ratelimited stub (bnc#1012382).
- drivers/net: fix eisa_driver probe section mismatch (bnc#1012382).
- drm/amdgpu: Avoid leaking PM domain on driver unbind (v2) (bnc#1012382).
- drm/amdgpu: Fix SDMA load/unload sequence on HWS disabled mode (bnc#1012382).
- drm/amdkfd: Fix SDMA oversubsription handling (bnc#1012382).
- drm/amdkfd: Fix SDMA ring buffer size calculation (bnc#1012382).
- drm/armada: fix leak of crtc structure (bnc#1012382).
- drm/edid: Add 6 bpc quirk for CPT panel in Asus UX303LA (bnc#1012382).
- drm/gma500: remove helper function (bnc#1012382).
- drm/gma500: Sanity-check pipe index (bnc#1012382).
- drm/nouveau: hide gcc-4.9 -Wmaybe-uninitialized (bnc#1012382).
- drm/nouveau/pci: do a msi rearm on init (bnc#1012382).
- drm/radeon: adjust tested variable (bnc#1012382).
- drm: rcar-du: Fix race condition when disabling planes at CRTC stop (bnc#1012382).
- drm: rcar-du: Use the VBK interrupt for vblank events (bnc#1012382).
- drm: Require __GFP_NOFAIL for the legacy drm_modeset_lock_all (bnc#1012382).
- drm/ttm: check the return value of kzalloc (bnc#1012382).
- drm/vmwgfx: use *_32_bits() macros (bnc#1012382).
- e1000: fix disabling already-disabled warning (bnc#1012382).
- edac, octeon: Fix an uninitialized variable warning (bnc#1012382).
- em28xx: only use mt9v011 if camera support is enabled (bnc#1012382).
- enable DST_CACHE in non-vanilla configs except s390x/zfcpdump
- ext4: correct documentation for grpid mount option (bnc#1012382).
- ext4: do not unnecessarily allocate buffer in recently_deleted() (bsc#1080344).
- ext4: Fix data exposure after failed AIO DIO (bsc#1069135 bsc#1082864).
- ext4: save error to disk in __ext4_grp_locked_error() (bnc#1012382).
- f2fs: fix a bug caused by NULL extent tree (bsc#1082478). While this fs is not supported by SLE it affects opensuse users so let's add it to our kernel for opensuse merging.
- fbdev: auo_k190x: avoid unused function warnings (bnc#1012382).
- fbdev: s6e8ax0: avoid unused function warnings (bnc#1012382).
- fbdev: sis: enforce selection of at least one backend (bnc#1012382).
- fbdev: sm712fb: avoid unused function warnings (bnc#1012382).
- flow_dissector: Check skb for VLAN only if skb specified (bsc#1042286).
- flow_dissector: fix vlan tag handling (bsc#1042286).
- flow_dissector: For stripped vlan, get vlan info from skb-&gt;vlan_tci (bsc#1042286).
- ftrace: Remove incorrect setting of glob search field (bnc#1012382).
- geneve: fix populating tclass in geneve_get_v6_dst (bsc#1042286).
- genirq/msi: Add stubs for get_cached_msi_msg/pci_write_msi_msg (bnc#1012382).
- genksyms: Fix segfault with invalid declarations (bnc#1012382).
- gianfar: fix a flooded alignment reports because of padding issue (bnc#1012382).
- go7007: add MEDIA_CAMERA_SUPPORT dependency (bnc#1012382).
- gpio: ath79: add missing MODULE_DESCRIPTION/LICENSE (bnc#1012382).
- gpio: intel-mid: Fix build warning when !CONFIG_PM (bnc#1012382).
- gpio: iop: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bnc#1012382).
- gpio: xgene: mark PM functions as __maybe_unused (bnc#1012382).
- grace: replace BUG_ON by WARN_ONCE in exit_net hook (bnc#1012382).
- gre: build header correctly for collect metadata tunnels (bsc#1042286).
- gre: do not assign header_ops in collect metadata mode (bsc#1042286).
- gre: do not keep the GRE header around in collect medata mode (bsc#1042286).
- gre: reject GUE and FOU in collect metadata mode (bsc#1042286).
- hdpvr: hide unused variable (bnc#1012382).
- hid: quirks: Fix keyboard + touchpad on Toshiba Click Mini not working (bnc#1012382).
- hippi: Fix a Fix a possible sleep-in-atomic bug in rr_close (bnc#1012382).
- hrtimer: Ensure POSIX compliance (relative CLOCK_REALTIME hrtimers) (bnc#1012382).
- hwmon: (pmbus) Use 64bit math for DIRECT format values (bnc#1012382).
- hwrng: exynos - use __maybe_unused to hide pm functions (bnc#1012382).
- i2c: remove __init from i2c_register_board_info() (bnc#1012382).
- ib/ipoib: Fix race condition in neigh creation (bnc#1012382).
- ib/mlx4: Fix incorrectly releasing steerable UD QPs when have only ETH ports (bnc#1012382).
- ib/mlx4: Fix mlx4_ib_alloc_mr error flow (bnc#1012382).
- ibmvnic: Account for VLAN header length in TX buffers (bsc#1085239).
- ibmvnic: Account for VLAN tag in L2 Header descriptor (bsc#1085239).
- ibmvnic: Allocate max queues stats buffers (bsc#1081498).
- ibmvnic: Allocate statistics buffers during probe (bsc#1082993).
- ibmvnic: Check for NULL skb's in NAPI poll routine (bsc#1081134, git-fixes).
- ibmvnic: Clean RX pool buffers during device close (bsc#1081134).
- ibmvnic: Clean up device close (bsc#1084610).
- ibmvnic: Correct goto target for tx irq initialization failure (bsc#1082223).
- ibmvnic: Do not attempt to login if RX or TX queues are not allocated (bsc#1082993).
- ibmvnic: Do not disable device during failover or partition migration (bsc#1084610).
- ibmvnic: Ensure that buffers are NULL after free (bsc#1080014).
- ibmvnic: Fix early release of login buffer (bsc#1081134, git-fixes).
- ibmvnic: fix empty firmware version and errors cleanup (bsc#1079038).
- ibmvnic: fix firmware version when no firmware level has been provided by the VIOS server (bsc#1079038).
- ibmvnic: Fix login buffer memory leaks (bsc#1081134).
- ibmvnic: Fix NAPI structures memory leak (bsc#1081134).
- ibmvnic: Fix recent errata commit (bsc#1085239).
- ibmvnic: Fix rx queue cleanup for non-fatal resets (bsc#1080014).
- ibmvnic: Fix TX descriptor tracking again (bsc#1082993).
- ibmvnic: Fix TX descriptor tracking (bsc#1081491).
- ibmvnic: Free and re-allocate scrqs when tx/rx scrqs change (bsc#1081498).
- ibmvnic: Free RX socket buffer in case of adapter error (bsc#1081134).
- ibmvnic: Generalize TX pool structure (bsc#1085224).
- ibmvnic: Handle TSO backing device errata (bsc#1085239).
- ibmvnic: Harden TX/RX pool cleaning (bsc#1082993).
- ibmvnic: Improve TX buffer accounting (bsc#1085224).
- ibmvnic: Keep track of supplementary TX descriptors (bsc#1081491).
- ibmvnic: Make napi usage dynamic (bsc#1081498).
- ibmvnic: Move active sub-crq count settings (bsc#1081498).
- ibmvnic: Pad small packets to minimum MTU size (bsc#1085239).
- ibmvnic: queue reset when CRQ gets closed during reset (bsc#1080263).
- ibmvnic: Remove skb-&gt;protocol checks in ibmvnic_xmit (bsc#1080384).
- ibmvnic: Rename active queue count variables (bsc#1081498).
- ibmvnic: Reorganize device close (bsc#1084610).
- ibmvnic: Report queue stops and restarts as debug output (bsc#1082993).
- ibmvnic: Reset long term map ID counter (bsc#1080364).
- ibmvnic: Split counters for scrq/pools/napi (bsc#1082223).
- ibmvnic: Update and clean up reset TX pool routine (bsc#1085224).
- ibmvnic: Update release RX pool routine (bsc#1085224).
- ibmvnic: Update TX and TX completion routines (bsc#1085224).
- ibmvnic: Update TX pool initialization routine (bsc#1085224).
- ibmvnic: Wait until reset is complete to set carrier on (bsc#1081134).
- idle: i7300: add PCI dependency (bnc#1012382).
- igb: Free IRQs when device is hotplugged (bnc#1012382).
- iio: adc: axp288: remove redundant duplicate const on axp288_adc_channels (bnc#1012382).
- iio: adis_lib: Initialize trigger before requesting interrupt (bnc#1012382).
- iio: buffer: check if a buffer has been set up when poll is called (bnc#1012382).
- input: tca8418_keypad - hide gcc-4.9 -Wmaybe-uninitialized warning (bnc#1012382).
- input: tca8418_keypad - remove double read of key event register (git-fixes).
- iommu/amd: Add align parameter to alloc_irq_index() (bsc#975772).
- iommu/amd: Enforce alignment for MSI IRQs (bsc#975772).
- iommu/amd: Fix alloc_irq_index() increment (bsc#975772).
- iommu/vt-d: Use domain instead of cache fetching (bsc#975772).
- ip6mr: fix stale iterator (bnc#1012382).
- ipc/msg: introduce msgctl(MSG_STAT_ANY) (bsc#1072689).
- ipc/sem: introduce semctl(SEM_STAT_ANY) (bsc#1072689).
- ipc/shm: introduce shmctl(SHM_STAT_ANY) (bsc#1072689).
- ip_tunnel: fix preempt warning in ip tunnel creation/updating (bnc#1012382).
- ip_tunnel: replace dst_cache with generic implementation (bnc#1012382).
- ipv4: allow local fragmentation in ip_finish_output_gso() (bsc#1042286).
- ipv4: fix checksum annotation in udp4_csum_init (bsc#1042286).
- ipv4: ipconfig: avoid unused ic_proto_used symbol (bnc#1012382).
- ipv4: update comment to document GSO fragmentation cases (bsc#1042286).
- ipv6: datagram: Refactor dst lookup and update codes to a new function (bsc#1042286).
- ipv6: datagram: Refactor flowi6 init codes to a new function (bsc#1042286).
- ipv6: datagram: Update dst cache of a connected datagram sk during pmtu update (bsc#1042286).
- ipv6: fix checksum annotation in udp6_csum_init (bsc#1042286).
- ipv6: icmp6: Allow icmp messages to be looped back (bnc#1012382).
- ipv6/ila: fix nlsize calculation for lwtunnel (bsc#1042286).
- ipv6: remove unused in6_addr struct (bsc#1042286).
- ipv6: tcp: fix endianness annotation in tcp_v6_send_response (bsc#1042286).
- ipv6: udp: Do a route lookup and update during release_cb (bsc#1042286).
- ipvlan: Add the skb-&gt;mark as flow4's member to lookup route (bnc#1012382).
- ipvlan: fix multicast processing (bsc#1042286).
- ipvlan: fix various issues in ipvlan_process_multicast() (bsc#1042286).
- irqchip/gic-v3: Use wmb() instead of smb_wmb() in gic_raise_softirq() (bnc#1012382).
- isdn: eicon: reduce stack size of sig_ind function (bnc#1012382).
- isdn: icn: remove a #warning (bnc#1012382).
- isdn: sc: work around type mismatch warning (bnc#1012382).
- jffs2: Fix use-after-free bug in jffs2_iget()'s error handling path (git-fixes).
- kABI: protect struct cpuinfo_x86 (kabi).
- kABI: protect struct ip_tunnel and reintroduce ip_tunnel_dst_reset_all (kabi).
- kABI: reintroduce crypto_poly1305_setkey (kabi).
- kabi: restore kabi after 'net: replace dst_cache ip6_tunnel implementation with the generic one' (bsc#1082897).
- kabi: restore nft_set_elem_destroy() signature (bsc#1042286).
- kabi: restore rhashtable_insert_slow() signature (bsc#1042286).
- kabi/severities: add __x86_indirect_thunk_rsp
- kabi/severities: as per bsc#1068569 we can ignore XFS kabi The gods have spoken, let there be light.
- kabi: uninline sk_receive_skb() (bsc#1042286).
- kaiser: fix compile error without vsyscall (bnc#1012382).
- kaiser: fix intel_bts perf crashes (bnc#1012382).
- kasan: rework Kconfig settings (bnc#1012382).
- kernel/async.c: revert 'async: simplify lowest_in_progress()' (bnc#1012382).
- kernel: fix rwlock implementation (bnc#1080360, LTC#164371).
- kernfs: fix regression in kernfs_fop_write caused by wrong type (bnc#1012382).
- keys: encrypted: fix buffer overread in valid_master_desc() (bnc#1012382).
- kmemleak: add scheduling point to kmemleak_scan() (bnc#1012382).
- kvm: add X86_LOCAL_APIC dependency (bnc#1012382).
- kvm: arm/arm64: Check pagesize when allocating a hugepage at Stage 2 (bsc#1079029).
- kvm: nVMX: Fix kernel panics induced by illegal INVEPT/INVVPID types (bnc#1012382).
- kvm: nVMX: Fix races when sending nested PI while dest enters/leaves L2 (bnc#1012382).
- kvm: nVMX: invvpid handling improvements (bnc#1012382).
- kvm: nVMX: kmap() can't fail (bnc#1012382).
- kvm: nVMX: vmx_complete_nested_posted_interrupt() can't fail (bnc#1012382).
- kvm: PPC: Book3S PR: Fix svcpu copying with preemption enabled (bsc#1066223).
- kvm: VMX: clean up declaration of VPID/EPT invalidation types (bnc#1012382).
- kvm: VMX: Fix rflags cache during vCPU reset (bnc#1012382).
- kvm: VMX: Make indirect call speculation safe (bnc#1012382).
- kvm: x86: Do not re-execute instruction when not passing CR2 value (bnc#1012382).
- kvm: x86: emulator: Return to user-mode on L1 CPL=0 emulation failure (bnc#1012382).
- kvm: x86: fix escape of guest dr6 to the host (bnc#1012382).
- kvm: X86: Fix operand/address-size during instruction decoding (bnc#1012382).
- kvm: x86: ioapic: Clear Remote IRR when entry is switched to edge-triggered (bnc#1012382).
- kvm: x86: ioapic: Fix level-triggered EOI and IOAPIC reconfigure race (bnc#1012382).
- kvm: x86: ioapic: Preserve read-only values in the redirection table (bnc#1012382).
- kvm: x86: Make indirect calls in emulator speculation safe (bnc#1012382).
- kvm/x86: Reduce retpoline performance impact in slot_handle_level_range(), by always inlining iterator helper methods (bnc#1012382).
- l2tp: fix use-after-free during module unload (bsc#1042286).
- led: core: Fix brightness setting when setting delay_off=0 (bnc#1012382).
- leds: do not overflow sysfs buffer in led_trigger_show (bsc#1080464).
- lib/mpi: Fix umul_ppmm() for MIPS64r6 (bnc#1012382).
- livepatch: introduce shadow variable API (bsc#1082299 fate#313296). Shadow variables support.
- livepatch: __kgr_shadow_get_or_alloc() is local to shadow.c (bsc#1082299 fate#313296). Shadow variables support.
- lockd: fix 'list_add double add' caused by legacy signal interface (bnc#1012382).
- loop: fix concurrent lo_open/lo_release (bnc#1012382).
- mac80211: fix the update of path metric for RANN frame (bnc#1012382).
- mac80211: mesh: drop frames appearing to be from us (bnc#1012382).
- Make DST_CACHE a silent config option (bnc#1012382).
- mdio-sun4i: Fix a memory leak (bnc#1012382).
- md/raid1: Use a new variable to count flighting sync requests(bsc#1078609)
- media: cxusb, dib0700: ignore XC2028_I2C_FLUSH (bnc#1012382).
- media: dvb-usb-v2: lmedm04: Improve logic checking of warm start (bnc#1012382).
- media: dvb-usb-v2: lmedm04: move ts2020 attach to dm04_lme2510_tuner (bnc#1012382).
- media: r820t: fix r820t_write_reg for KASAN (bnc#1012382).
- media: s5k6aa: describe some function parameters (bnc#1012382).
- media: soc_camera: soc_scale_crop: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bnc#1012382).
- media: ts2020: avoid integer overflows on 32 bit machines (bnc#1012382).
- media: usbtv: add a new usbid (bnc#1012382).
- media: v4l2-compat-ioctl32.c: add missing VIDIOC_PREPARE_BUF (bnc#1012382).
- media: v4l2-compat-ioctl32.c: avoid sizeof(type) (bnc#1012382).
- media: v4l2-compat-ioctl32.c: copy clip list in put_v4l2_window32 (bnc#1012382).
- media: v4l2-compat-ioctl32.c: copy m.userptr in put_v4l2_plane32 (bnc#1012382).
- media: v4l2-compat-ioctl32.c: do not copy back the result for certain errors (bnc#1012382).
- media: v4l2-compat-ioctl32.c: drop pr_info for unknown buffer type (bnc#1012382).
- media: v4l2-compat-ioctl32.c: fix ctrl_is_pointer (bnc#1012382).
- media: v4l2-compat-ioctl32.c: fix the indentation (bnc#1012382).
- media: v4l2-compat-ioctl32.c: make ctrl_is_pointer work for subdevs (bnc#1012382).
- media: v4l2-compat-ioctl32.c: move 'helper' functions to __get/put_v4l2_format32 (bnc#1012382).
- media: v4l2-compat-ioctl32: Copy v4l2_window-&gt;global_alpha (bnc#1012382).
- media: v4l2-compat-ioctl32.c: refactor compat ioctl32 logic (bnc#1012382).
- media: v4l2-ioctl.c: do not copy back the result for -ENOTTY (bnc#1012382).
- mips: Implement __multi3 for GCC7 MIPS64r6 builds (bnc#1012382).
- mmc: bcm2835: Do not overwrite max frequency unconditionally (bsc#983145, git-fixes).
- mm/early_ioremap: Fix boot hang with earlyprintk=efi,keep (bnc#1012382).
- mm: hide a #warning for COMPILE_TEST (bnc#1012382).
- mm/kmemleak.c: make cond_resched() rate-limiting more efficient (git-fixes).
- mm: pin address_space before dereferencing it while isolating an LRU page (bnc#1081500).
- mm,vmscan: Make unregister_shrinker() no-op if register_shrinker() failed (bnc#1012382).
- mn10300/misalignment: Use SIGSEGV SEGV_MAPERR to report a failed user copy (bnc#1012382).
- modsign: hide openssl output in silent builds (bnc#1012382).
- module/retpoline: Warn about missing retpoline in module (bnc#1012382).
- mpt3sas: Do not mark fw_event workqueue as WQ_MEM_RECLAIM (bsc#1078583).
- mptfusion: hide unused seq_mpt_print_ioc_summary function (bnc#1012382).
- mtd: cfi: convert inline functions to macros (bnc#1012382).
- mtd: cfi: enforce valid geometry configuration (bnc#1012382).
- mtd: ichxrom: maybe-uninitialized with gcc-4.9 (bnc#1012382).
- mtd: maps: add __init attribute (bnc#1012382).
- mtd: nand: brcmnand: Disable prefetch by default (bnc#1012382).
- mtd: nand: denali_pci: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bnc#1012382).
- mtd: nand: Fix nand_do_read_oob() return value (bnc#1012382).
- mtd: nand: gpmi: Fix failure when a erased page has a bitflip at BBM (bnc#1012382).
- mtd: nand: sunxi: Fix ECC strength choice (bnc#1012382).
- mtd: sh_flctl: pass FIFO as physical address (bnc#1012382).
- mvpp2: fix multicast address filter (bnc#1012382).
- ncpfs: fix unused variable warning (bnc#1012382).
- ncr5380: shut up gcc indentation warning (bnc#1012382).
- net: add dst_cache support (bnc#1012382).
- net: arc_emac: fix arc_emac_rx() error paths (bnc#1012382).
- net: avoid skb_warn_bad_offload on IS_ERR (bnc#1012382).
- net: cdc_ncm: initialize drvflags before usage (bnc#1012382).
- net: dst_cache_per_cpu_dst_set() can be static (bnc#1012382).
- net: ena: add detection and recovery mechanism for handling missed/misrouted MSI-X (bsc#1083548).
- net: ena: add new admin define for future support of IPv6 RSS (bsc#1083548).
- net: ena: add power management ops to the ENA driver (bsc#1083548).
- net: ena: add statistics for missed tx packets (bsc#1083548).
- net: ena: fix error handling in ena_down() sequence (bsc#1083548).
- net: ena: fix race condition between device reset and link up setup (bsc#1083548).
- net: ena: fix rare kernel crash when bar memory remap fails (bsc#1083548).
- net: ena: fix wrong max Tx/Rx queues on ethtool (bsc#1083548).
- net: ena: improve ENA driver boot time (bsc#1083548).
- net: ena: increase ena driver version to 1.3.0 (bsc#1083548).
- net: ena: increase ena driver version to 1.5.0 (bsc#1083548).
- net: ena: reduce the severity of some printouts (bsc#1083548).
- net: ena: remove legacy suspend suspend/resume support (bsc#1083548).
- net: ena: Remove redundant unlikely() (bsc#1083548).
- net: ena: unmask MSI-X only after device initialization is completed (bsc#1083548).
- net: ethernet: xilinx: Mark XILINX_LL_TEMAC broken on 64-bit (bnc#1012382).
- netfilter: drop outermost socket lock in getsockopt() (bnc#1012382).
- netfilter: ebtables: CONFIG_COMPAT: do not trust userland offsets (bsc#1085107).
- netfilter: ebtables: fix erroneous reject of last rule (bsc#1085107).
- netfilter: ipt_CLUSTERIP: fix out-of-bounds accesses in clusterip_tg_check() (bnc#1012382).
- netfilter: ipvs: avoid unused variable warnings (bnc#1012382).
- netfilter: nf_queue: Make the queue_handler pernet (bnc#1012382).
- netfilter: nf_tables: fix a wrong check to skip the inactive rules (bsc#1042286).
- netfilter: nf_tables: fix inconsistent element expiration calculation (bsc#1042286).
- netfilter: nf_tables: fix *leak* when expr clone fail (bsc#1042286).
- netfilter: nf_tables: fix race when create new element in dynset (bsc#1042286).
- netfilter: on sockopt() acquire sock lock only in the required scope (bnc#1012382).
- netfilter: tee: select NF_DUP_IPV6 unconditionally (bsc#1042286).
- netfilter: x_tables: avoid out-of-bounds reads in xt_request_find_{match|target} (bnc#1012382).
- netfilter: x_tables: fix int overflow in xt_alloc_table_info() (bnc#1012382).
- netfilter: xt_RATEEST: acquire xt_rateest_mutex for hash insert (bnc#1012382).
- netfilter: xt_socket: fix transparent match for IPv6 request sockets (bsc#1042286).
- net: gianfar_ptp: move set_fipers() to spinlock protecting area (bnc#1012382).
- net: hp100: remove unnecessary #ifdefs (bnc#1012382).
- net: igmp: add a missing rcu locking section (bnc#1012382).
- net/ipv4: Introduce IPSKB_FRAG_SEGS bit to inet_skb_parm.flags (bsc#1042286).
- netlink: fix nla_put_{u8,u16,u32} for KASAN (bnc#1012382).
- net: replace dst_cache ip6_tunnel implementation with the generic one (bnc#1012382).
- net_sched: red: Avoid devision by zero (bnc#1012382).
- net_sched: red: Avoid illegal values (bnc#1012382).
- net: vxlan: lwt: Fix vxlan local traffic (bsc#1042286).
- net: vxlan: lwt: Use source ip address during route lookup (bsc#1042286).
- nfs: Add a cond_resched() to nfs_commit_release_pages() (bsc#1077779).
- nfs: commit direct writes even if they fail partially (bnc#1012382).
- nfsd: check for use of the closed special stateid (bnc#1012382).
- nfsd: CLOSE SHOULD return the invalid special stateid for NFSv4.x (x&gt;0) (bnc#1012382).
- nfsd: Ensure we check stateid validity in the seqid operation checks (bnc#1012382).
- nfs: Do not convert nfs_idmap_cache_timeout to jiffies (git-fixes).
- nfs: fix a deadlock in nfs client initialization (bsc#1074198).
- nfs/pnfs: fix nfs_direct_req ref leak when i/o falls back to the mds (bnc#1012382).
- nfs: reject request for id_legacy key without auxdata (bnc#1012382).
- nfs: Trunking detection should handle ERESTARTSYS/EINTR (bsc#1074198).
- nvme: Fix managing degraded controllers (bnc#1012382).
- ocfs2: return error when we attempt to access a dirty bh in jbd2 (bsc#1012829).
- openvswitch: fix the incorrect flow action alloc size (bnc#1012382).
- ovl: fix failure to fsync lower dir (bnc#1012382).
- ovs/geneve: fix rtnl notifications on iface deletion (bsc#1042286).
- ovs/gre: fix rtnl notifications on iface deletion (bsc#1042286).
- ovs/gre,geneve: fix error path when creating an iface (bsc#1042286).
- ovs/vxlan: fix rtnl notifications on iface deletion (bsc#1042286).
- pci/ASPM: Do not retrain link if ASPM not possible (bnc#1071892).
- pci: keystone: Fix interrupt-controller-node lookup (bnc#1012382).
- perf bench numa: Fixup discontiguous/sparse numa nodes (bnc#1012382).
- perf top: Fix window dimensions change handling (bnc#1012382).
- perf/x86: Shut up false-positive -Wmaybe-uninitialized warning (bnc#1012382).
- pinctrl: sunxi: Fix A80 interrupt pin bank (bnc#1012382).
- pipe: cap initial pipe capacity according to pipe-max-size limit (bsc#1045330).
- pktcdvd: Fix pkt_setup_dev() error path (bnc#1012382).
- platform/x86: intel_mid_thermal: Fix suspend handlers unused warning (bnc#1012382).
- PM / devfreq: Propagate error from devfreq_add_device() (bnc#1012382).
- PM / wakeirq: Fix unbalanced IRQ enable for wakeirq (bsc#1031717).
- posix-timer: Properly check sigevent-&gt;sigev_notify (bnc#1012382).
- power: bq27xxx_battery: mark some symbols __maybe_unused (bnc#1012382).
- powerpc/64: Fix flush_(d|i)cache_range() called from modules (FATE#315275 LTC#103998 bnc#1012382 bnc#863764).
- powerpc/64s: Fix RFI flush dependency on HARDLOCKUP_DETECTOR (bnc#1012382).
- powerpc/64s: Improve RFI L1-D cache flush fallback (bsc#1068032, bsc#1075087).
- powerpc: Do not preempt_disable() in show_cpuinfo() (bsc#1066223).
- powerpc/numa: Invalidate numa_cpu_lookup_table on cpu remove (bsc#1081512).
- powerpc/perf: Fix oops when grouping different pmu events (bnc#1012382).
- powerpc/powernv: Fix MCE handler to avoid trashing CR0/CR1 registers (bsc#1066223).
- powerpc/powernv: Move IDLE_STATE_ENTER_SEQ macro to cpuidle.h (bsc#1066223).
- powerpc/powernv: Support firmware disable of RFI flush (bsc#1068032, bsc#1075087).
- powerpc/pseries: Support firmware disable of RFI flush (bsc#1068032, bsc#1075087).
- powerpc: Simplify module TOC handling (bnc#1012382).
- power: reset: zx-reboot: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bnc#1012382).
- profile: hide unused functions when !CONFIG_PROC_FS (bnc#1012382).
- Provide a function to create a NUL-terminated string from unterminated data (bnc#1012382).
- pwc: hide unused label (bnc#1012382).
- qla2xxx: asynchronous pci probing (bsc#1034503).
- qlcnic: fix deadlock bug (bnc#1012382).
- r8169: fix RTL8168EP take too long to complete driver initialization (bnc#1012382).
- RDMA/cma: Make sure that PSN is not over max allowed (bnc#1012382).
- reiserfs: avoid a -Wmaybe-uninitialized warning (bnc#1012382).
- Revert 'Bluetooth: btusb: fix QCA Rome suspend/resume' (bnc#1012382).
- Revert 'bpf: avoid false sharing of map refcount with max_entries' (kabi).
- Revert 'netfilter: nf_queue: Make the queue_handler pernet' (kabi).
- Revert 'net: replace dst_cache ip6_tunnel implementation with the generic one' (kabi bnc#1082897).
- Revert 'power: bq27xxx_battery: Remove unneeded dependency in Kconfig' (bnc#1012382).
- Revert 'powerpc: Simplify module TOC handling' (kabi).
- Revert 'x86/entry/64: Separate cpu_current_top_of_stack from TSS.sp0' This reverts commit 89ef3e2aec59362edf7b1cd1c48acc81cd74e319.
- Revert 'x86/entry/64: Use a per-CPU trampoline stack for IDT entries' This reverts commit 5812bed1a96b27804bfd1eadbe3e263cb58aafdf.
- rfi-flush: Move the logic to avoid a redo into the debugfs code (bsc#1068032, bsc#1075087).
- rfi-flush: Switch to new linear fallback flush (bsc#1068032, bsc#1075087).
- rhashtable: add rhashtable_lookup_get_insert_key() (bsc#1042286).
- rtc-opal: Fix handling of firmware error codes, prevent busy loops (bnc#1012382).
- rtlwifi: fix gcc-6 indentation warning (bnc#1012382).
- rtlwifi: rtl8821ae: Fix connection lost problem correctly (bnc#1012382).
- s390/dasd: fix handling of internal requests (bsc#1080809).
- s390/dasd: fix wrongly assigned configuration data (bnc#1012382).
- s390/dasd: prevent prefix I/O error (bnc#1012382).
- s390: fix handling of -1 in set{,fs}[gu]id16 syscalls (bnc#1012382).
- sched/rt: Up the root domain ref count when passing it around via IPIs (bnc#1012382).
- sched/rt: Use container_of() to get root domain in rto_push_irq_work_func() (bnc#1012382).
- scripts/kernel-doc: Do not fail with status != 0 if error encountered with -none (bnc#1012382).
- scsi: aacraid: Prevent crash in case of free interrupt during scsi EH path (bnc#1012382).
- scsi: advansys: fix build warning for PCI=n (bnc#1012382).
- scsi: advansys: fix uninitialized data access (bnc#1012382).
- scsi: csiostor: fix use after free in csio_hw_use_fwconfig() (bsc#1005776).
- scsi: fdomain: drop fdomain_pci_tbl when built-in (bnc#1012382).
- scsi: ibmvfc: fix misdefined reserved field in ibmvfc_fcp_rsp_info (bnc#1012382).
- SCSI: initio: remove duplicate module device table (bnc#1012382).
- scsi: mvumi: use __maybe_unused to hide pm functions (bnc#1012382).
- scsi: qla2xxx: Fix abort command deadlock due to spinlock (FATE#320146, bsc#966328).
- scsi: qla2xxx: Remove aborting ELS IOCB call issued as part of timeout (FATE#320146, bsc#966328).
- scsi: return correct blkprep status code in case scsi_init_io() fails (bsc#1082979).
- scsi: sim710: fix build warning (bnc#1012382).
- scsi: sr: workaround VMware ESXi cdrom emulation bug (bsc#1080813).
- scsi: storvsc: Fix scsi_cmd error assignments in storvsc_handle_error (bnc#1012382).
- scsi: sun_esp: fix device reference leaks (bsc#1082979).
- scsi: ufs: ufshcd: fix potential NULL pointer dereference in ufshcd_config_vreg (bnc#1012382).
- sctp: make use of pre-calculated len (bnc#1012382).
- selinux: ensure the context is NUL terminated in security_context_to_sid_core() (bnc#1012382).
- selinux: general protection fault in sock_has_perm (bnc#1012382).
- selinux: skip bounded transition processing if the policy isn't loaded (bnc#1012382).
- serial: 8250_mid: fix broken DMA dependency (bnc#1012382).
- serial: 8250_uniphier: fix error return code in uniphier_uart_probe() (bsc#1031717).
- serial: imx: Only wakeup via RTSDEN bit if the system has RTS/CTS (bnc#1012382).
- sget(): handle failures of register_shrinker() (bnc#1012382).
- signal/openrisc: Fix do_unaligned_access to send the proper signal (bnc#1012382).
- signal/sh: Ensure si_signo is initialized in do_divide_error (bnc#1012382).
- SolutionEngine771x: fix Ether platform data (bnc#1012382).
- spi: atmel: fixed spin_lock usage inside atmel_spi_remove (bnc#1012382).
- spi: imx: do not access registers while clocks disabled (bnc#1012382).
- spi: sun4i: disable clocks in the remove function (bnc#1012382).
- ssb: mark ssb_bus_register as __maybe_unused (bnc#1012382).
- staging: android: ashmem: Fix a race condition in pin ioctls (bnc#1012382).
- staging: iio: adc: ad7192: fix external frequency setting (bnc#1012382).
- staging: rtl8188eu: Fix incorrect response to SIOCGIWESSID (bnc#1012382).
- staging: ste_rmi4: avoid unused function warnings (bnc#1012382).
- staging: unisys: visorinput depends on INPUT (bnc#1012382).
- staging: wilc1000: fix kbuild test robot error (bnc#1012382).
- SUNRPC: Allow connect to return EHOSTUNREACH (bnc#1012382).
- tc1100-wmi: fix build warning when CONFIG_PM not enabled (bnc#1012382).
- tc358743: fix register i2c_rd/wr function fix (git-fixes).
- tc358743: fix register i2c_rd/wr functions (bnc#1012382).
- tcp: do not set rtt_min to 1 (bsc#1042286).
- tcp: release sk_frag.page in tcp_disconnect (bnc#1012382).
- test_bpf: fix the dummy skb after dissector changes (bsc#1042286).
- tg3: Add workaround to restrict 5762 MRRS to 2048 (bnc#1012382).
- tg3: Enable PHY reset in MTU change path for 5720 (bnc#1012382).
- thermal: fix INTEL_SOC_DTS_IOSF_CORE dependencies (bnc#1012382).
- thermal: spear: use __maybe_unused for PM functions (bnc#1012382).
- tlan: avoid unused label with PCI=n (bnc#1012382).
- tools build: Add tools tree support for 'make -s' (bnc#1012382).
- tty: cyclades: cyz_interrupt is only used for PCI (bnc#1012382).
- tty: hvc_xen: hide xen_console_remove when unused (bnc#1012382).
- tty: mxser: Remove ASYNC_CLOSING (bnc#1072363).
- ubi: block: Fix locking for idr_alloc/idr_remove (bnc#1012382).
- udp: restore UDPlite many-cast delivery (bsc#1042286).
- usb: build drivers/usb/common/ when USB_SUPPORT is set (bnc#1012382).
- USB: cdc-acm: Do not log urb submission errors on disconnect (bnc#1012382).
- USB: cdc_subset: only build when one driver is enabled (bnc#1012382).
- usb: dwc3: gadget: Set maxpacket size for ep0 IN (bnc#1012382).
- usb: f_fs: Prevent gadget unbind if it is already unbound (bnc#1012382).
- usb: gadget: do not dereference g until after it has been null checked (bnc#1012382).
- usb: gadget: f_fs: Process all descriptors during bind (bnc#1012382).
- usb: gadget: uvc: Missing files for configfs interface (bnc#1012382).
- usbip: fix 3eee23c3ec14 tcp_socket address still in the status file (bnc#1012382).
- usbip: keep usbip_device sockfd state in sync with tcp_socket (bnc#1012382).
- usbip: list: do not list devices attached to vhci_hcd (bnc#1012382).
- usbip: prevent bind loops on devices attached to vhci_hcd (bnc#1012382).
- usbip: vhci_hcd: clear just the USB_PORT_STAT_POWER bit (bnc#1012382).
- usb: ldusb: add PIDs for new CASSY devices supported by this driver (bnc#1012382).
- usb: musb/ux500: remove duplicate check for dma_is_compatible (bnc#1012382).
- usb: ohci: Proper handling of ed_rm_list to handle race condition between usb_kill_urb() and finish_unlinks() (bnc#1012382).
- usb: option: Add support for FS040U modem (bnc#1012382).
- usb: phy: msm add regulator dependency (bnc#1012382).
- usb: renesas_usbhs: missed the 'running' flag in usb_dmac with rx path (bnc#1012382).
- USB: serial: io_edgeport: fix possible sleep-in-atomic (bnc#1012382).
- USB: serial: pl2303: new device id for Chilitag (bnc#1012382).
- USB: serial: simple: add Motorola Tetra driver (bnc#1012382).
- usb: uas: unconditionally bring back host after reset (bnc#1012382).
- v4l: remove MEDIA_TUNER dependency for VIDEO_TUNER (bnc#1012382).
- vb2: V4L2_BUF_FLAG_DONE is set after DQBUF (bnc#1012382).
- vfs: do not do RCU lookup of empty pathnames (bnc#1012382).
- vhost_net: stop device during reset owner (bnc#1012382).
- video: fbdev: atmel_lcdfb: fix display-timings lookup (bnc#1012382).
- video: fbdev/mmp: add MODULE_LICENSE (bnc#1012382).
- video: fbdev: sis: remove unused variable (bnc#1012382).
- video: fbdev: via: remove possibly unused variables (bnc#1012382).
- video: Use bool instead int pointer for get_opt_bool() argument (bnc#1012382).
- virtio_balloon: prevent uninitialized variable use (bnc#1012382).
- vlan: Check for vlan ethernet types for 8021.q or 802.1ad (bsc#1042286).
- vmxnet3: prevent building with 64K pages (bnc#1012382).
- vxlan: consolidate csum flag handling (bsc#1042286).
- vxlan: consolidate output route calculation (bsc#1042286).
- vxlan: consolidate vxlan_xmit_skb and vxlan6_xmit_skb (bsc#1042286).
- vxlan: do not allow overwrite of config src addr (bsc#1042286).
- watchdog: imx2_wdt: restore previous timeout after suspend+resume (bnc#1012382).
- wireless: cw1200: use __maybe_unused to hide pm functions_ (bnc#1012382).
- x86: add MULTIUSER dependency for KVM (bnc#1012382).
- x86/asm: Fix inline asm call constraints for GCC 4.4 (bnc#1012382).
- x86/boot: Avoid warning for zero-filling .bss (bnc#1012382).
- x86: bpf_jit: small optimization in emit_bpf_tail_call() (bnc#1012382).
- x86/bugs: Drop one 'mitigation' from dmesg (bnc#1012382).
- x86/build: Silence the build with 'make -s' (bnc#1012382).
- x86/cpu/bugs: Make retpoline module warning conditional (bnc#1012382).
- x86/cpu: Change type of x86_cache_size variable to unsigned int (bnc#1012382).
- x86/entry/64: Separate cpu_current_top_of_stack from TSS.sp0 (bsc#1077560).
- x86/entry/64: Use a per-CPU trampoline stack for IDT entries (bsc#1077560).
- x86: fix build warnign with 32-bit PAE (bnc#1012382).
- x86/fpu/math-emu: Fix possible uninitialized variable use (bnc#1012382).
- x86/kaiser: fix build error with KASAN &amp;&amp; !FUNCTION_GRAPH_TRACER (bnc#1012382).
- x86/kvm/vmx: do not use vm-exit instruction length for fast MMIO when running nested (bsc#1081431).
- x86/mce: Pin the timer when modifying (bsc#1080851,1076282).
- x86/microcode/AMD: Change load_microcode_amd()'s param to bool to fix preemptibility bug (bnc#1012382).
- x86/microcode/AMD: Do not load when running on a hypervisor (bnc#1012382).
- x86/microcode: Do the family check first (bnc#1012382).
- x86/mm/kmmio: Fix mmiotrace for page unaligned addresses (bnc#1012382).
- x86/nospec: Fix header guards names (bnc#1012382).
- x86/oprofile: Fix bogus GCC-8 warning in nmi_setup() (bnc#1012382).
- x86/paravirt: Remove 'noreplace-paravirt' cmdline option (bnc#1012382).
- x86/platform: Add PCI dependency for PUNIT_ATOM_DEBUG (bnc#1012382).
- x86/platform/olpc: Fix resume handler build warning (bnc#1012382).
- x86/pti: Make unpoison of pgd for trusted boot work for real (bnc#1012382).
- x86/ras/inject: Make it depend on X86_LOCAL_APIC=y (bnc#1012382).
- x86/retpoline: Avoid retpolines for built-in __init functions (bnc#1012382).
- x86/retpoline: Remove the esp/rsp thunk (bnc#1012382).
- x86/spectre: Check CONFIG_RETPOLINE in command line parser (bnc#1012382).
- x86/spectre: Fix an error message (git-fixes).
- x86/spectre: Fix spelling mistake: 'vunerable'-&gt; 'vulnerable' (bnc#1012382).
- x86/spectre: Remove the out-of-tree RSB stuffing
- x86/spectre: Simplify spectre_v2 command line parsing (bnc#1012382).
- x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL (bnc#1012382).
- x86/xen: Zero MSR_IA32_SPEC_CTRL before suspend (bnc#1065600).
- xen/gntdev: Fix off-by-one error when unmapping with holes (bnc#1012382).
- xen/gntdev: Fix partial gntdev_mmap() cleanup (bnc#1012382).
- xen-netfront: enable device after manual module load (bnc#1012382).
- xen-netfront: remove warning when unloading module (bnc#1012382).
- xen: XEN_acpi_PROCESSOR is Dom0-only (bnc#1012382).
- xfrm: check id proto in validate_tmpl() (bnc#1012382).
- xfrm: Fix stack-out-of-bounds read on socket policy lookup (bnc#1012382).
- xfrm: Fix stack-out-of-bounds with misconfigured transport mode policies (bnc#1012382).
- xfrm_user: propagate sec ctx allocation errors (bsc#1042286).
- xfs: do not chain ioends during writepage submission (bsc#1077285 bsc#1043441).
- xfs: factor mapping out of xfs_do_writepage (bsc#1077285 bsc#1043441).
- xfs: Introduce writeback context for writepages (bsc#1077285 bsc#1043441).
- xfs: ioends require logically contiguous file offsets (bsc#1077285 bsc#1043441).
- xfs: quota: check result of register_shrinker() (bnc#1012382).
- xfs: quota: fix missed destroy of qi_tree_lock (bnc#1012382).
- xfs: reinit btree pointer on attr tree inactivation walk (bsc#1078787).
- xfs: remove nonblocking mode from xfs_vm_writepage (bsc#1077285 bsc#1043441).
- xfs: remove racy hasattr check from attr ops (bsc#1035432).
- xfs: remove xfs_cancel_ioend (bsc#1077285 bsc#1043441).
- xfs: stop searching for free slots in an inode chunk when there are none (bsc#1072739).
- xfs: toggle readonly state around xfs_log_mount_finish (bsc#1073401).
- xfs: ubsan fixes (bnc#1012382).
- xfs: validate sb_logsunit is a multiple of the fs blocksize (bsc#1077513).
- xfs: write unmount record for ro mounts (bsc#1073401).
- xfs: xfs_cluster_write is redundant (bsc#1077285 bsc#1043441).
- xtensa: fix futex_atomic_cmpxchg_inatomic (bnc#1012382).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-23"/>
	<updated date="2018-03-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005776">SUSE bug 1005776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006867">SUSE bug 1006867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012829">SUSE bug 1012829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027054">SUSE bug 1027054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031717">SUSE bug 1031717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034503">SUSE bug 1034503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035432">SUSE bug 1035432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042286">SUSE bug 1042286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043441">SUSE bug 1043441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045330">SUSE bug 1045330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062840">SUSE bug 1062840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065615">SUSE bug 1065615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066223">SUSE bug 1066223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067118">SUSE bug 1067118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068569">SUSE bug 1068569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069135">SUSE bug 1069135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071306">SUSE bug 1071306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071892">SUSE bug 1071892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072363">SUSE bug 1072363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072689">SUSE bug 1072689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072739">SUSE bug 1072739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072865">SUSE bug 1072865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073401">SUSE bug 1073401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074198">SUSE bug 1074198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074426">SUSE bug 1074426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075087">SUSE bug 1075087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076282">SUSE bug 1076282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077285">SUSE bug 1077285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077513">SUSE bug 1077513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077560">SUSE bug 1077560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077779">SUSE bug 1077779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078583">SUSE bug 1078583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078609">SUSE bug 1078609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078672">SUSE bug 1078672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078673">SUSE bug 1078673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078787">SUSE bug 1078787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079029">SUSE bug 1079029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079038">SUSE bug 1079038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079384">SUSE bug 1079384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079989">SUSE bug 1079989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080014">SUSE bug 1080014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080263">SUSE bug 1080263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080344">SUSE bug 1080344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080360">SUSE bug 1080360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080364">SUSE bug 1080364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080384">SUSE bug 1080384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080464">SUSE bug 1080464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080774">SUSE bug 1080774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080809">SUSE bug 1080809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080813">SUSE bug 1080813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080851">SUSE bug 1080851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081134">SUSE bug 1081134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081431">SUSE bug 1081431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081491">SUSE bug 1081491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081498">SUSE bug 1081498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081500">SUSE bug 1081500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081512">SUSE bug 1081512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081671">SUSE bug 1081671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082223">SUSE bug 1082223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082299">SUSE bug 1082299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082478">SUSE bug 1082478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082795">SUSE bug 1082795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082864">SUSE bug 1082864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082897">SUSE bug 1082897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082979">SUSE bug 1082979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082993">SUSE bug 1082993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083494">SUSE bug 1083494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083548">SUSE bug 1083548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084610">SUSE bug 1084610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085053">SUSE bug 1085053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085107">SUSE bug 1085107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085224">SUSE bug 1085224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085239">SUSE bug 1085239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863764">SUSE bug 863764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966328">SUSE bug 966328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975772">SUSE bug 975772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983145">SUSE bug 983145</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15951/">CVE-2017-15951</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16644/">CVE-2017-16644</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16912/">CVE-2017-16912</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16913/">CVE-2017-16913</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17975/">CVE-2017-17975</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18208/">CVE-2017-18208</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000026/">CVE-2018-1000026</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8087/">CVE-2018-8087</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519039" comment="kernel-default-4.4.120-92.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519040" comment="kernel-default-devel-4.4.120-92.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519041" comment="kernel-default-extra-4.4.120-92.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519042" comment="kernel-devel-4.4.120-92.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519043" comment="kernel-macros-4.4.120-92.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519044" comment="kernel-source-4.4.120-92.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519045" comment="kernel-syms-4.4.120-92.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78151" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1045315" ref_url="https://bugzilla.suse.com/1045315" source="BUGZILLA"/>
		<reference ref_id="1049423" ref_url="https://bugzilla.suse.com/1049423" source="BUGZILLA"/>
		<reference ref_id="1052449" ref_url="https://bugzilla.suse.com/1052449" source="BUGZILLA"/>
		<reference ref_id="1082858" ref_url="https://bugzilla.suse.com/1082858" source="BUGZILLA"/>
		<reference ref_id="1083915" ref_url="https://bugzilla.suse.com/1083915" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423/" source="CVE"/>
		<reference ref_id="CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419/" source="CVE"/>
		<reference ref_id="CVE-2018-0202" ref_url="https://www.suse.com/security/cve/CVE-2018-0202/" source="CVE"/>
		<reference ref_id="CVE-2018-1000085" ref_url="https://www.suse.com/security/cve/CVE-2018-1000085/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00060.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

Security issues fixed:

- CVE-2012-6706: VMSF_DELTA filter inside the unrar implementation allows an arbitrary memory write (bsc#1045315).
- CVE-2017-6419: A heap-based buffer overflow that can lead to a denial of service in libmspack via a crafted CHM file (bsc#1052449).
- CVE-2017-11423: A stack-based buffer over-read that can lead to a denial of service in mspack via a crafted CAB file (bsc#1049423).
- CVE-2018-1000085: An out-of-bounds heap read vulnerability was found in XAR parser that can lead to a denial of service (bsc#1082858).
- CVE-2018-0202: Fixed two vulnerabilities in the PDF parsing code (bsc#1083915).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-26"/>
	<updated date="2018-03-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045315">SUSE bug 1045315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049423">SUSE bug 1049423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052449">SUSE bug 1052449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082858">SUSE bug 1082858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083915">SUSE bug 1083915</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0202/">CVE-2018-0202</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000085/">CVE-2018-1000085</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519046" comment="clamav-0.99.4-33.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78152" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1083302" ref_url="https://bugzilla.suse.com/1083302" source="BUGZILLA"/>
		<reference ref_id="1083303" ref_url="https://bugzilla.suse.com/1083303" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5732" ref_url="https://www.suse.com/security/cve/CVE-2018-5732/" source="CVE"/>
		<reference ref_id="CVE-2018-5733" ref_url="https://www.suse.com/security/cve/CVE-2018-5733/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003843.html" source="SUSE-SU"/>
		<description>
This update for dhcp fixes the following issues:

Security issues fixed:

- CVE-2018-5733: reference count overflow in dhcpd (bsc#1083303).
- CVE-2018-5732: buffer overflow in dhclient (bsc#1083302).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-26"/>
	<updated date="2018-03-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083302">SUSE bug 1083302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083303">SUSE bug 1083303</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5732/">CVE-2018-5732</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5733/">CVE-2018-5733</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519047" comment="dhcp-4.3.3-10.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519048" comment="dhcp-client-4.3.3-10.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78153" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1077080" ref_url="https://bugzilla.suse.com/1077080" source="BUGZILLA"/>
		<reference ref_id="1082692" ref_url="https://bugzilla.suse.com/1082692" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17997" ref_url="https://www.suse.com/security/cve/CVE-2017-17997/" source="CVE"/>
		<reference ref_id="CVE-2018-7320" ref_url="https://www.suse.com/security/cve/CVE-2018-7320/" source="CVE"/>
		<reference ref_id="CVE-2018-7321" ref_url="https://www.suse.com/security/cve/CVE-2018-7321/" source="CVE"/>
		<reference ref_id="CVE-2018-7322" ref_url="https://www.suse.com/security/cve/CVE-2018-7322/" source="CVE"/>
		<reference ref_id="CVE-2018-7323" ref_url="https://www.suse.com/security/cve/CVE-2018-7323/" source="CVE"/>
		<reference ref_id="CVE-2018-7324" ref_url="https://www.suse.com/security/cve/CVE-2018-7324/" source="CVE"/>
		<reference ref_id="CVE-2018-7325" ref_url="https://www.suse.com/security/cve/CVE-2018-7325/" source="CVE"/>
		<reference ref_id="CVE-2018-7326" ref_url="https://www.suse.com/security/cve/CVE-2018-7326/" source="CVE"/>
		<reference ref_id="CVE-2018-7327" ref_url="https://www.suse.com/security/cve/CVE-2018-7327/" source="CVE"/>
		<reference ref_id="CVE-2018-7328" ref_url="https://www.suse.com/security/cve/CVE-2018-7328/" source="CVE"/>
		<reference ref_id="CVE-2018-7329" ref_url="https://www.suse.com/security/cve/CVE-2018-7329/" source="CVE"/>
		<reference ref_id="CVE-2018-7330" ref_url="https://www.suse.com/security/cve/CVE-2018-7330/" source="CVE"/>
		<reference ref_id="CVE-2018-7331" ref_url="https://www.suse.com/security/cve/CVE-2018-7331/" source="CVE"/>
		<reference ref_id="CVE-2018-7332" ref_url="https://www.suse.com/security/cve/CVE-2018-7332/" source="CVE"/>
		<reference ref_id="CVE-2018-7333" ref_url="https://www.suse.com/security/cve/CVE-2018-7333/" source="CVE"/>
		<reference ref_id="CVE-2018-7334" ref_url="https://www.suse.com/security/cve/CVE-2018-7334/" source="CVE"/>
		<reference ref_id="CVE-2018-7335" ref_url="https://www.suse.com/security/cve/CVE-2018-7335/" source="CVE"/>
		<reference ref_id="CVE-2018-7336" ref_url="https://www.suse.com/security/cve/CVE-2018-7336/" source="CVE"/>
		<reference ref_id="CVE-2018-7337" ref_url="https://www.suse.com/security/cve/CVE-2018-7337/" source="CVE"/>
		<reference ref_id="CVE-2018-7417" ref_url="https://www.suse.com/security/cve/CVE-2018-7417/" source="CVE"/>
		<reference ref_id="CVE-2018-7418" ref_url="https://www.suse.com/security/cve/CVE-2018-7418/" source="CVE"/>
		<reference ref_id="CVE-2018-7419" ref_url="https://www.suse.com/security/cve/CVE-2018-7419/" source="CVE"/>
		<reference ref_id="CVE-2018-7420" ref_url="https://www.suse.com/security/cve/CVE-2018-7420/" source="CVE"/>
		<reference ref_id="CVE-2018-7421" ref_url="https://www.suse.com/security/cve/CVE-2018-7421/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Security issue fixed (bsc#1082692):

- CVE-2018-7335: The IEEE 802.11 dissector could crash (wnpa-sec-2018-05)
- CVE-2018-7321: thrift long dissector loop (dissect_thrift_map)
- CVE-2018-7322: DICOM: inifinite loop (dissect_dcm_tag)
- CVE-2018-7323: WCCP: very long loop (dissect_wccp2_alternate_mask_value_set_element)
- CVE-2018-7324: SCCP: infinite loop (dissect_sccp_optional_parameters)
- CVE-2018-7325: RPKI-Router Protocol: infinite loop (dissect_rpkirtr_pdu)
- CVE-2018-7326: LLTD: infinite loop (dissect_lltd_tlv)
- CVE-2018-7327: openflow_v6: infinite loop (dissect_openflow_bundle_control_v6)
- CVE-2018-7328: USB-DARWIN: long loop (dissect_darwin_usb_iso_transfer)
- CVE-2018-7329: S7COMM: infinite loop (s7comm_decode_ud_cpu_alarm_main)
- CVE-2018-7330: thread_meshcop: infinite loop (get_chancount)
- CVE-2018-7331: GTP: infinite loop (dissect_gprscdr_GGSNPDPRecord, dissect_ber_set)
- CVE-2018-7332: RELOAD: infinite loop (dissect_statans)
- CVE-2018-7333: RPCoRDMA: infinite loop in get_write_list_chunk_count
- CVE-2018-7421: Multiple dissectors could go into large infinite loops (wnpa-sec-2018-06)
- CVE-2018-7334: The UMTS MAC dissector could crash (wnpa-sec-2018-07)
- CVE-2018-7337: The DOCSIS dissector could crash (wnpa-sec-2018-08)
- CVE-2018-7336: The FCP dissector could crash (wnpa-sec-2018-09)
- CVE-2018-7320: The SIGCOMP dissector could crash (wnpa-sec-2018-10)
- CVE-2018-7420: The pcapng file parser could crash (wnpa-sec-2018-11)
- CVE-2018-7417: The IPMI dissector could crash (wnpa-sec-2018-12)
- CVE-2018-7418: The SIGCOMP dissector could crash (wnpa-sec-2018-13)
- CVE-2018-7419: The NBAP disssector could crash (wnpa-sec-2018-14)
- CVE-2017-17997: Misuse of NULL pointer in MRDISC dissector (bsc#1077080).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-26"/>
	<updated date="2018-03-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077080">SUSE bug 1077080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17997/">CVE-2017-17997</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7320/">CVE-2018-7320</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7321/">CVE-2018-7321</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7322/">CVE-2018-7322</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7323/">CVE-2018-7323</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7324/">CVE-2018-7324</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7325/">CVE-2018-7325</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7326/">CVE-2018-7326</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7327/">CVE-2018-7327</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7328/">CVE-2018-7328</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7329/">CVE-2018-7329</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7330/">CVE-2018-7330</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7331/">CVE-2018-7331</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7332/">CVE-2018-7332</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7333/">CVE-2018-7333</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7334/">CVE-2018-7334</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7335/">CVE-2018-7335</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7336/">CVE-2018-7336</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7337/">CVE-2018-7337</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7417/">CVE-2018-7417</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7418/">CVE-2018-7418</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7419/">CVE-2018-7419</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7420/">CVE-2018-7420</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7421/">CVE-2018-7421</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519049" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519050" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519051" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519052" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519053" comment="wireshark-2.2.13-48.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519054" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78154" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1051042" ref_url="https://bugzilla.suse.com/1051042" source="BUGZILLA"/>
		<reference ref_id="1053188" ref_url="https://bugzilla.suse.com/1053188" source="BUGZILLA"/>
		<reference ref_id="1063675" ref_url="https://bugzilla.suse.com/1063675" source="BUGZILLA"/>
		<reference ref_id="1064569" ref_url="https://bugzilla.suse.com/1064569" source="BUGZILLA"/>
		<reference ref_id="1064580" ref_url="https://bugzilla.suse.com/1064580" source="BUGZILLA"/>
		<reference ref_id="1064583" ref_url="https://bugzilla.suse.com/1064583" source="BUGZILLA"/>
		<reference ref_id="1070905" ref_url="https://bugzilla.suse.com/1070905" source="BUGZILLA"/>
		<reference ref_id="1071319" ref_url="https://bugzilla.suse.com/1071319" source="BUGZILLA"/>
		<reference ref_id="1073231" ref_url="https://bugzilla.suse.com/1073231" source="BUGZILLA"/>
		<reference ref_id="1074293" ref_url="https://bugzilla.suse.com/1074293" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000408" ref_url="https://www.suse.com/security/cve/CVE-2017-1000408/" source="CVE"/>
		<reference ref_id="CVE-2017-1000409" ref_url="https://www.suse.com/security/cve/CVE-2017-1000409/" source="CVE"/>
		<reference ref_id="CVE-2017-15670" ref_url="https://www.suse.com/security/cve/CVE-2017-15670/" source="CVE"/>
		<reference ref_id="CVE-2017-15671" ref_url="https://www.suse.com/security/cve/CVE-2017-15671/" source="CVE"/>
		<reference ref_id="CVE-2017-15804" ref_url="https://www.suse.com/security/cve/CVE-2017-15804/" source="CVE"/>
		<reference ref_id="CVE-2017-16997" ref_url="https://www.suse.com/security/cve/CVE-2017-16997/" source="CVE"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00037.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- A privilege escalation bug in the realpath() function has been fixed.
  [CVE-2018-1000001, bsc#1074293]

- A memory leak and a buffer overflow in the dynamic ELF loader has been fixed.
  [CVE-2017-1000408, CVE-2017-1000409, bsc#1071319]

- An issue in the code handling RPATHs was fixed that could have been exploited
  by an attacker to execute code loaded from arbitrary libraries.
  [CVE-2017-16997, bsc#1073231]

- A potential crash caused by a use-after-free bug in pthread_create() has been
  fixed. [bsc#1053188]

- A bug that prevented users to build shared objects which use the optimized
  libmvec.so API has been fixed. [bsc#1070905]

- A memory leak in the glob() function has been fixed. [CVE-2017-15670,
  CVE-2017-15671, CVE-2017-15804, bsc#1064569, bsc#1064580, bsc#1064583]

- A bug that would lose the syscall error code value in case of crashes has
  been fixed. [bsc#1063675]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051042">SUSE bug 1051042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053188">SUSE bug 1053188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063675">SUSE bug 1063675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064569">SUSE bug 1064569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064580">SUSE bug 1064580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064583">SUSE bug 1064583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070905">SUSE bug 1070905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071319">SUSE bug 1071319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073231">SUSE bug 1073231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074293">SUSE bug 1074293</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000408/">CVE-2017-1000408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000409/">CVE-2017-1000409</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15670/">CVE-2017-15670</cve>
	<cve impact="important" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15671/">CVE-2017-15671</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15804/">CVE-2017-15804</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16997/">CVE-2017-16997</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519055" comment="glibc-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519056" comment="glibc-32bit-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519057" comment="glibc-devel-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519058" comment="glibc-devel-32bit-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519059" comment="glibc-i18ndata-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519060" comment="glibc-locale-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519061" comment="glibc-locale-32bit-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519062" comment="nscd-2.22-62.3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78155" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1040202" ref_url="https://bugzilla.suse.com/1040202" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068613" ref_url="https://bugzilla.suse.com/1068613" source="BUGZILLA"/>
		<reference ref_id="1070144" ref_url="https://bugzilla.suse.com/1070144" source="BUGZILLA"/>
		<reference ref_id="1071228" ref_url="https://bugzilla.suse.com/1071228" source="BUGZILLA"/>
		<reference ref_id="1073489" ref_url="https://bugzilla.suse.com/1073489" source="BUGZILLA"/>
		<reference ref_id="1076114" ref_url="https://bugzilla.suse.com/1076114" source="BUGZILLA"/>
		<reference ref_id="1076179" ref_url="https://bugzilla.suse.com/1076179" source="BUGZILLA"/>
		<reference ref_id="1076775" ref_url="https://bugzilla.suse.com/1076775" source="BUGZILLA"/>
		<reference ref_id="1076814" ref_url="https://bugzilla.suse.com/1076814" source="BUGZILLA"/>
		<reference ref_id="1082276" ref_url="https://bugzilla.suse.com/1082276" source="BUGZILLA"/>
		<reference ref_id="1083291" ref_url="https://bugzilla.suse.com/1083291" source="BUGZILLA"/>
		<reference ref_id="1085598" ref_url="https://bugzilla.suse.com/1085598" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15119" ref_url="https://www.suse.com/security/cve/CVE-2017-15119/" source="CVE"/>
		<reference ref_id="CVE-2017-15124" ref_url="https://www.suse.com/security/cve/CVE-2017-15124/" source="CVE"/>
		<reference ref_id="CVE-2017-16845" ref_url="https://www.suse.com/security/cve/CVE-2017-16845/" source="CVE"/>
		<reference ref_id="CVE-2017-17381" ref_url="https://www.suse.com/security/cve/CVE-2017-17381/" source="CVE"/>
		<reference ref_id="CVE-2017-18030" ref_url="https://www.suse.com/security/cve/CVE-2017-18030/" source="CVE"/>
		<reference ref_id="CVE-2017-18043" ref_url="https://www.suse.com/security/cve/CVE-2017-18043/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-5683" ref_url="https://www.suse.com/security/cve/CVE-2018-5683/" source="CVE"/>
		<reference ref_id="CVE-2018-7550" ref_url="https://www.suse.com/security/cve/CVE-2018-7550/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00066.html" source="SUSE-SU"/>
		<description>

  
This update for qemu fixes the following issues:

This update has the next round of Spectre v2 related patches, which
now integrate with corresponding changes in libvirt. (CVE-2017-5715
bsc#1068032)

The January 2018 release of qemu initially addressed the Spectre v2
vulnerability for KVM guests by exposing the spec-ctrl feature
for all x86 vcpu types, which was the quick and dirty approach,
but not the proper solution.

We replaced our initial patch by the patches from upstream.

This update defines spec_ctrl and ibpb cpu feature flags as well as new
cpu models which are clones of existing models with either -IBRS or -IBPB
added to the end of the model name. These new vcpu models explicitly
include the new feature(s), whereas the feature flags can be added
to the cpu parameter as with other features. In short, for continued
Spectre v2 protection, ensure that either the appropriate cpu feature
flag is added to the QEMU command-line, or one of the new cpu models is
used.

Although migration from older versions is supported, the new cpu
features won't be properly exposed to the guest until it is restarted
with the cpu features explicitly added. A reboot is insufficient.

A warning patch is added which attempts to detect a migration
from a qemu version which had the quick and dirty fix (it only
detects certain cases, but hopefully is helpful.)
For additional information on Spectre v2 as it relates to QEMU,
see:
	https://www.qemu.org/2018/02/14/qemu-2-11-1-and-spectre-update/

A patch is added to continue to detect Spectre v2 mitigation
features (as shown by cpuid), and if found provide that feature
to guests, even if running on older KVM (kernel) versions which
do not yet expose that feature to QEMU. (bsc#1082276)

These two patches will be removed when we can reasonably assume
everyone is running with the appropriate updates.


Also security fixes for the following CVE issues are included:

- CVE-2017-15119: The Network Block Device (NBD) server in Quick Emulator (QEMU), was vulnerable to a denial of service issue. It could occur if a client sent large option requests, making the server waste CPU time on reading up to 4GB per request. A client could use this flaw to keep the NBD server from serving other requests, resulting in DoS. (bsc#1070144)
- CVE-2017-15124: VNC server implementation in Quick Emulator (QEMU) was found to be vulnerable to an unbounded memory allocation issue, as it did not throttle the framebuffer updates sent to its client. If the client did not consume these updates, VNC server allocates growing memory to hold onto this data. A malicious remote VNC client could use this flaw to cause DoS to the server host. (bsc#1073489)
- CVE-2017-16845: The PS2 driver in Qemu did not validate 'rptr' and 'count' values during guest migration, leading to out-of-bounds access. (bsc#1068613)
- CVE-2017-17381: The Virtio Vring implementation in QEMU allowed local OS guest users to cause a denial of service (divide-by-zero error and QEMU process crash) by unsetting vring alignment while updating Virtio rings. (bsc#1071228)
- CVE-2017-18030: A problem in the Cirrus driver in Qemu allowed local OS guest privileged users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to negative pitch. (bsc#1076179)
- CVE-2017-18043: Integer overflow in the macro ROUND_UP (n, d) in Quick Emulator (Qemu) allowed a user to cause a denial of service (Qemu process crash). (bsc#1076775)
- CVE-2018-5683: The VGA driver in Qemu allowed local OS guest privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging improper memory address validation. (bsc#1076114)
- CVE-2018-7550: The multiboot functionality in Quick Emulator (aka QEMU) allowed local guest OS users to execute arbitrary code on the QEMU host via an out-of-bounds read or write memory access. (bsc#1083291)  

Also the following bugs were fixed:

- Eliminate bogus use of CPUID_7_0_EDX_PRED_CMD which we've
  carried since the initial Spectre v2 patch was added. EDX bit
  27 of CPUID Leaf 07H, Sub-leaf 0 provides status on STIBP, and
  not the PRED_CMD MSR. Exposing the STIBP CPUID feature bit to the
  guest is wrong in general, since the VM doesn't directly control
  the scheduling of physical hyperthreads. This is left strictly to
  the L0 hypervisor.

- Spectre fixes for IBM Z series by providing more hw features to guests
  (bsc#1076814)
- Pre-add group kvm for qemu-tools (bsc#1040202)
- the qemu-tools package also needs a prerequire of group management
  tools, from the shadow package. (bsc#1085598)


		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-27"/>
	<updated date="2018-03-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040202">SUSE bug 1040202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068613">SUSE bug 1068613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070144">SUSE bug 1070144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071228">SUSE bug 1071228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073489">SUSE bug 1073489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076114">SUSE bug 1076114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076179">SUSE bug 1076179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076775">SUSE bug 1076775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076814">SUSE bug 1076814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082276">SUSE bug 1082276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083291">SUSE bug 1083291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085598">SUSE bug 1085598</bugzilla>
	<cve impact="low" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15119/">CVE-2017-15119</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15124/">CVE-2017-15124</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16845/">CVE-2017-16845</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17381/">CVE-2017-17381</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18030/">CVE-2017-18030</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18043/">CVE-2017-18043</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5683/">CVE-2018-5683</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7550/">CVE-2018-7550</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519063" comment="qemu-2.6.2-41.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519064" comment="qemu-block-curl-2.6.2-41.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519065" comment="qemu-ipxe-1.0.0-41.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519066" comment="qemu-kvm-2.6.2-41.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519067" comment="qemu-seabios-1.9.1-41.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519068" comment="qemu-sgabios-8-41.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519069" comment="qemu-tools-2.6.2-41.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519070" comment="qemu-vgabios-1.9.1-41.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519071" comment="qemu-x86-2.6.2-41.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78156" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1081741" ref_url="https://bugzilla.suse.com/1081741" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1050" ref_url="https://www.suse.com/security/cve/CVE-2018-1050/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003849.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2018-1050: DOS vulnerability when SPOOLSS is run externally (bsc#1081741)
  
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-27"/>
	<updated date="2018-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081741">SUSE bug 1081741</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1050/">CVE-2018-1050</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519072" comment="libdcerpc-binding0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519073" comment="libdcerpc-binding0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519074" comment="libdcerpc0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519075" comment="libdcerpc0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519076" comment="libndr-krb5pac0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519077" comment="libndr-krb5pac0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519078" comment="libndr-nbt0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519079" comment="libndr-nbt0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519080" comment="libndr-standard0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519081" comment="libndr-standard0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519082" comment="libndr0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519083" comment="libndr0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519084" comment="libnetapi0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519085" comment="libnetapi0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519086" comment="libsamba-credentials0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519087" comment="libsamba-credentials0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519088" comment="libsamba-errors0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519089" comment="libsamba-errors0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519090" comment="libsamba-hostconfig0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519091" comment="libsamba-hostconfig0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519092" comment="libsamba-passdb0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519093" comment="libsamba-passdb0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519094" comment="libsamba-util0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519095" comment="libsamba-util0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519096" comment="libsamdb0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519097" comment="libsamdb0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519098" comment="libsmbclient0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519099" comment="libsmbclient0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519100" comment="libsmbconf0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519101" comment="libsmbconf0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519102" comment="libsmbldap0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519103" comment="libsmbldap0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519104" comment="libtevent-util0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519105" comment="libtevent-util0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519106" comment="libwbclient0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519107" comment="libwbclient0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519108" comment="samba-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519109" comment="samba-client-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519110" comment="samba-client-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519111" comment="samba-doc-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519112" comment="samba-libs-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519113" comment="samba-libs-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519114" comment="samba-winbind-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519115" comment="samba-winbind-32bit-4.4.2-38.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78157" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1057662" ref_url="https://bugzilla.suse.com/1057662" source="BUGZILLA"/>
		<reference ref_id="1081725" ref_url="https://bugzilla.suse.com/1081725" source="BUGZILLA"/>
		<reference ref_id="1083926" ref_url="https://bugzilla.suse.com/1083926" source="BUGZILLA"/>
		<reference ref_id="1083927" ref_url="https://bugzilla.suse.com/1083927" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5729" ref_url="https://www.suse.com/security/cve/CVE-2018-5729/" source="CVE"/>
		<reference ref_id="CVE-2018-5730" ref_url="https://www.suse.com/security/cve/CVE-2018-5730/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003856.html" source="SUSE-SU"/>
		<description>
This update for krb5 provides the following fixes:

Security issues fixed:

- CVE-2018-5730: DN container check bypass by supplying special crafted data (bsc#1083927).
- CVE-2018-5729: Null pointer dereference in kadmind or DN container check bypass by supplying special crafted data (bsc#1083926).

Non-security issues fixed:

- Make it possible for legacy applications (e.g. SAP Netweaver) to remain compatible with
  newer Kerberos. System administrators who are experiencing this kind of compatibility
  issues may set the environment variable GSSAPI_ASSUME_MECH_MATCH to a non-empty value,
  and make sure the environment variable is visible and effective to the application
  startup script. (bsc#1057662)
- Fix a GSS failure in legacy applications by not indicating deprecated GSS mechanisms in
  gss_indicate_mech() list. (bsc#1081725)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-29"/>
	<updated date="2018-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1057662">SUSE bug 1057662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081725">SUSE bug 1081725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083926">SUSE bug 1083926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083927">SUSE bug 1083927</bugzilla>
	<cve impact="moderate" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5729/">CVE-2018-5729</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5730/">CVE-2018-5730</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519116" comment="krb5-1.12.5-40.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519117" comment="krb5-32bit-1.12.5-40.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519118" comment="krb5-client-1.12.5-40.23.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78158" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1085130" ref_url="https://bugzilla.suse.com/1085130" source="BUGZILLA"/>
		<reference ref_id="1085671" ref_url="https://bugzilla.suse.com/1085671" source="BUGZILLA"/>
		<reference ref_id="1087059" ref_url="https://bugzilla.suse.com/1087059" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5125" ref_url="https://www.suse.com/security/cve/CVE-2018-5125/" source="CVE"/>
		<reference ref_id="CVE-2018-5127" ref_url="https://www.suse.com/security/cve/CVE-2018-5127/" source="CVE"/>
		<reference ref_id="CVE-2018-5129" ref_url="https://www.suse.com/security/cve/CVE-2018-5129/" source="CVE"/>
		<reference ref_id="CVE-2018-5130" ref_url="https://www.suse.com/security/cve/CVE-2018-5130/" source="CVE"/>
		<reference ref_id="CVE-2018-5131" ref_url="https://www.suse.com/security/cve/CVE-2018-5131/" source="CVE"/>
		<reference ref_id="CVE-2018-5144" ref_url="https://www.suse.com/security/cve/CVE-2018-5144/" source="CVE"/>
		<reference ref_id="CVE-2018-5145" ref_url="https://www.suse.com/security/cve/CVE-2018-5145/" source="CVE"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<reference ref_id="CVE-2018-5147" ref_url="https://www.suse.com/security/cve/CVE-2018-5147/" source="CVE"/>
		<reference ref_id="CVE-2018-5148" ref_url="https://www.suse.com/security/cve/CVE-2018-5148/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed in Firefox ESR 52.7.3 (bsc#1085130):

- CVE-2018-5125: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7
- CVE-2018-5127: Buffer overflow manipulating SVG animatedPathSegList
- CVE-2018-5129: Out-of-bounds write with malformed IPC messages
- CVE-2018-5130: Mismatched RTP payload type can trigger memory corruption
- CVE-2018-5131: Fetch API improperly returns cached copies of no-store/no-cache resources
- CVE-2018-5144: Integer overflow during Unicode conversion
- CVE-2018-5145: Memory safety bugs fixed in Firefox ESR 52.7
- CVE-2018-5146: Out of bounds memory write in libvorbis (bsc#1085671)
- CVE-2018-5147: Out of bounds memory write in libtremor (bsc#1085671)
- CVE-2018-5148: Use-after-free in compositor (MFSA 2018-10) (bsc#1087059)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-29"/>
	<updated date="2018-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085671">SUSE bug 1085671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087059">SUSE bug 1087059</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5125/">CVE-2018-5125</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5127/">CVE-2018-5127</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5129/">CVE-2018-5129</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5130/">CVE-2018-5130</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5131/">CVE-2018-5131</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5144/">CVE-2018-5144</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5145/">CVE-2018-5145</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5147/">CVE-2018-5147</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5148/">CVE-2018-5148</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519119" comment="MozillaFirefox-52.7.3esr-109.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519120" comment="MozillaFirefox-translations-52.7.3esr-109.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78159" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1043290" ref_url="https://bugzilla.suse.com/1043290" source="BUGZILLA"/>
		<reference ref_id="1050087" ref_url="https://bugzilla.suse.com/1050087" source="BUGZILLA"/>
		<reference ref_id="1056434" ref_url="https://bugzilla.suse.com/1056434" source="BUGZILLA"/>
		<reference ref_id="1058630" ref_url="https://bugzilla.suse.com/1058630" source="BUGZILLA"/>
		<reference ref_id="1059735" ref_url="https://bugzilla.suse.com/1059735" source="BUGZILLA"/>
		<reference ref_id="1060382" ref_url="https://bugzilla.suse.com/1060382" source="BUGZILLA"/>
		<reference ref_id="1066168" ref_url="https://bugzilla.suse.com/1066168" source="BUGZILLA"/>
		<reference ref_id="1066170" ref_url="https://bugzilla.suse.com/1066170" source="BUGZILLA"/>
		<reference ref_id="1082283" ref_url="https://bugzilla.suse.com/1082283" source="BUGZILLA"/>
		<reference ref_id="1082291" ref_url="https://bugzilla.suse.com/1082291" source="BUGZILLA"/>
		<reference ref_id="1082348" ref_url="https://bugzilla.suse.com/1082348" source="BUGZILLA"/>
		<reference ref_id="1082362" ref_url="https://bugzilla.suse.com/1082362" source="BUGZILLA"/>
		<reference ref_id="1082792" ref_url="https://bugzilla.suse.com/1082792" source="BUGZILLA"/>
		<reference ref_id="1082837" ref_url="https://bugzilla.suse.com/1082837" source="BUGZILLA"/>
		<reference ref_id="1083628" ref_url="https://bugzilla.suse.com/1083628" source="BUGZILLA"/>
		<reference ref_id="1083634" ref_url="https://bugzilla.suse.com/1083634" source="BUGZILLA"/>
		<reference ref_id="1086011" ref_url="https://bugzilla.suse.com/1086011" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11524" ref_url="https://www.suse.com/security/cve/CVE-2017-11524/" source="CVE"/>
		<reference ref_id="CVE-2017-12692" ref_url="https://www.suse.com/security/cve/CVE-2017-12692/" source="CVE"/>
		<reference ref_id="CVE-2017-12693" ref_url="https://www.suse.com/security/cve/CVE-2017-12693/" source="CVE"/>
		<reference ref_id="CVE-2017-13768" ref_url="https://www.suse.com/security/cve/CVE-2017-13768/" source="CVE"/>
		<reference ref_id="CVE-2017-14314" ref_url="https://www.suse.com/security/cve/CVE-2017-14314/" source="CVE"/>
		<reference ref_id="CVE-2017-14505" ref_url="https://www.suse.com/security/cve/CVE-2017-14505/" source="CVE"/>
		<reference ref_id="CVE-2017-14739" ref_url="https://www.suse.com/security/cve/CVE-2017-14739/" source="CVE"/>
		<reference ref_id="CVE-2017-15016" ref_url="https://www.suse.com/security/cve/CVE-2017-15016/" source="CVE"/>
		<reference ref_id="CVE-2017-15017" ref_url="https://www.suse.com/security/cve/CVE-2017-15017/" source="CVE"/>
		<reference ref_id="CVE-2017-16352" ref_url="https://www.suse.com/security/cve/CVE-2017-16352/" source="CVE"/>
		<reference ref_id="CVE-2017-16353" ref_url="https://www.suse.com/security/cve/CVE-2017-16353/" source="CVE"/>
		<reference ref_id="CVE-2017-18209" ref_url="https://www.suse.com/security/cve/CVE-2017-18209/" source="CVE"/>
		<reference ref_id="CVE-2017-18211" ref_url="https://www.suse.com/security/cve/CVE-2017-18211/" source="CVE"/>
		<reference ref_id="CVE-2017-9500" ref_url="https://www.suse.com/security/cve/CVE-2017-9500/" source="CVE"/>
		<reference ref_id="CVE-2018-7443" ref_url="https://www.suse.com/security/cve/CVE-2018-7443/" source="CVE"/>
		<reference ref_id="CVE-2018-7470" ref_url="https://www.suse.com/security/cve/CVE-2018-7470/" source="CVE"/>
		<reference ref_id="CVE-2018-8804" ref_url="https://www.suse.com/security/cve/CVE-2018-8804/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2018-8804: The WriteEPTImage function allowed remote attackers to cause a
  denial of service (double free and application crash) or possibly have
  unspecified other impact via a crafted file (bsc#1086011).
- CVE-2017-11524: The WriteBlob function allowed remote attackers to cause a
  denial of service (assertion failure and application exit) via a crafted file
  (bsc#1050087).
- CVE-2017-18209: Prevent NULL pointer dereference in the
  GetOpenCLCachedFilesDirectory function caused by a memory allocation result
  that was not checked, related to GetOpenCLCacheDirectory (bsc#1083628).
- CVE-2017-18211: Prevent NULL pointer dereference in the function
  saveBinaryCLProgram caused by a program-lookup result not being checked,
  related to CacheOpenCLKernel (bsc#1083634).
- CVE-2017-9500: Prevent assertion failure in the function
  ResetImageProfileIterator, which allowed attackers to cause a denial of service
  via a crafted file (bsc#1043290).
- CVE-2017-14739: The AcquireResampleFilterThreadSet function mishandled failed
  memory allocation, which allowed remote attackers to cause a denial of service
  (NULL Pointer Dereference in DistortImage in MagickCore/distort.c, and
  application crash) via unspecified vectors (bsc#1060382).
- CVE-2017-16353: Prevent memory information disclosure in the DescribeImage
  function caused by a heap-based buffer over-read. The portion of the code
  containing the vulnerability is responsible for printing the IPTC Profile
  information contained in the image. This vulnerability can be triggered with a
  specially crafted MIFF file. There is an out-of-bounds buffer dereference
  because certain increments were never checked (bsc#1066170).
- CVE-2017-16352: Prevent a heap-based buffer overflow in the 'Display visual
  image directory' feature of the DescribeImage() function. One possible way to
  trigger the vulnerability is to run the identify command on a specially crafted
  MIFF format file with the verbose flag (bsc#1066168).
- CVE-2017-14314: Prevent off-by-one error in the DrawImage function that
  allowed remote attackers to cause a denial of service (DrawDashPolygon
  heap-based buffer over-read and application crash) via a crafted file
  (bsc#1058630).
- CVE-2017-13768: Prevent NULL pointer dereference in the IdentifyImage
  function that allowed an attacker to perform denial of service by sending a
  crafted image file (bsc#1056434).
- CVE-2017-14505: Fixed handling of NULL arrays, which allowed attackers to
  perform Denial of Service (NULL pointer dereference and application crash in
  AcquireQuantumMemory within MagickCore/memory.c) by providing a crafted Image
  File as input (bsc#1059735).
- CVE-2018-7470: The IsWEBPImageLossless function allowed attackers to cause a
  denial of service (segmentation violation) via a crafted file (bsc#1082837).
- CVE-2018-7443: The ReadTIFFImage function did not properly validate the
  amount of image data in a file, which allowed remote attackers to cause a
  denial of service (memory allocation failure in the AcquireMagickMemory
  function in MagickCore/memory.c) (bsc#1082792).
- CVE-2017-15016: Prevent NULL pointer dereference vulnerability in
  ReadEnhMetaFile allowing for denial of service (bsc#1082291).
- CVE-2017-15017: Prevent NULL pointer dereference vulnerability in
  ReadOneMNGImage allowing for denial of service (bsc#1082283).
- CVE-2017-12692: The ReadVIFFImage function allowed remote attackers to cause
  a denial of service (memory consumption) via a crafted VIFF file (bsc#1082362).
- CVE-2017-12693: The ReadBMPImage function allowed remote attackers to cause a
  denial of service (memory consumption) via a crafted BMP file (bsc#1082348).
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043290">SUSE bug 1043290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050087">SUSE bug 1050087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056434">SUSE bug 1056434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058630">SUSE bug 1058630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059735">SUSE bug 1059735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060382">SUSE bug 1060382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066168">SUSE bug 1066168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066170">SUSE bug 1066170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082283">SUSE bug 1082283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082291">SUSE bug 1082291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082348">SUSE bug 1082348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082362">SUSE bug 1082362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082792">SUSE bug 1082792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082837">SUSE bug 1082837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083628">SUSE bug 1083628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083634">SUSE bug 1083634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086011">SUSE bug 1086011</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11524/">CVE-2017-11524</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12692/">CVE-2017-12692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12693/">CVE-2017-12693</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13768/">CVE-2017-13768</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14314/">CVE-2017-14314</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14505/">CVE-2017-14505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14739/">CVE-2017-14739</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15016/">CVE-2017-15016</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15017/">CVE-2017-15017</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-16352/">CVE-2017-16352</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16353/">CVE-2017-16353</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18209/">CVE-2017-18209</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18211/">CVE-2017-18211</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9500/">CVE-2017-9500</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7443/">CVE-2018-7443</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7470/">CVE-2018-7470</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8804/">CVE-2018-8804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519121" comment="ImageMagick-6.8.8.1-71.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519122" comment="libMagick++-6_Q16-3-6.8.8.1-71.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519123" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519124" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519125" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78160" version="1" class="patch">
	<metadata>
		<title>Security update for graphite2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1084850" ref_url="https://bugzilla.suse.com/1084850" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7999" ref_url="https://www.suse.com/security/cve/CVE-2018-7999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003860.html" source="SUSE-SU"/>
		<description>
This update for graphite2 fixes the following issues:

- CVE-2018-7999: Fixed a NULL pointer dereference vulnerability in Segment.cpp that may cause a denial of serivce (bsc#1084850).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1084850">SUSE bug 1084850</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7999/">CVE-2018-7999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519126" comment="libgraphite2-3-1.3.1-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519127" comment="libgraphite2-3-32bit-1.3.1-10.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78161" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1078808" ref_url="https://bugzilla.suse.com/1078808" source="BUGZILLA"/>
		<reference ref_id="1079869" ref_url="https://bugzilla.suse.com/1079869" source="BUGZILLA"/>
		<reference ref_id="1080042" ref_url="https://bugzilla.suse.com/1080042" source="BUGZILLA"/>
		<reference ref_id="1082041" ref_url="https://bugzilla.suse.com/1082041" source="BUGZILLA"/>
		<reference ref_id="1083625" ref_url="https://bugzilla.suse.com/1083625" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-1064" ref_url="https://www.suse.com/security/cve/CVE-2018-1064/" source="CVE"/>
		<reference ref_id="CVE-2018-6764" ref_url="https://www.suse.com/security/cve/CVE-2018-6764/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00000.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Security issues fixed:

- CVE-2017-5715: Fixes for speculative side channel attacks aka 'SpectreAttack' (var2) (bsc#1079869).
- CVE-2018-6764: Fixed guest executable code injection via libnss_dns.so loaded by libvirt_lxc before init (bsc#1080042).
- CVE-2018-1064: Fixed denial of service when reading from guest agent (bsc#1083625).


Non-security issues fixed:

- Error starting domain: internal error: No usable sysfs TPM cancel file could  be found (bsc#1078808).
- SUSE Linux Enterprise 11 SP4 hvm converted to pvhvm. Unless vm memory is on gig boundary, vm won't boot (bsc#1082041).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1078808">SUSE bug 1078808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079869">SUSE bug 1079869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080042">SUSE bug 1080042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082041">SUSE bug 1082041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083625">SUSE bug 1083625</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1064/">CVE-2018-1064</cve>
	<cve impact="low" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6764/">CVE-2018-6764</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519128" comment="libvirt-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519129" comment="libvirt-client-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519130" comment="libvirt-client-32bit-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519131" comment="libvirt-daemon-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519132" comment="libvirt-daemon-config-network-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519133" comment="libvirt-daemon-config-nwfilter-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519134" comment="libvirt-daemon-driver-interface-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519135" comment="libvirt-daemon-driver-libxl-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519136" comment="libvirt-daemon-driver-lxc-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519137" comment="libvirt-daemon-driver-network-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519138" comment="libvirt-daemon-driver-nodedev-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519139" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519140" comment="libvirt-daemon-driver-qemu-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519141" comment="libvirt-daemon-driver-secret-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519142" comment="libvirt-daemon-driver-storage-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519143" comment="libvirt-daemon-lxc-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519144" comment="libvirt-daemon-qemu-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519145" comment="libvirt-daemon-xen-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519146" comment="libvirt-doc-2.0.0-27.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78162" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1017690" ref_url="https://bugzilla.suse.com/1017690" source="BUGZILLA"/>
		<reference ref_id="1069213" ref_url="https://bugzilla.suse.com/1069213" source="BUGZILLA"/>
		<reference ref_id="960341" ref_url="https://bugzilla.suse.com/960341" source="BUGZILLA"/>
		<reference ref_id="969783" ref_url="https://bugzilla.suse.com/969783" source="BUGZILLA"/>
		<reference ref_id="983436" ref_url="https://bugzilla.suse.com/983436" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2016-10095" ref_url="https://www.suse.com/security/cve/CVE-2016-10095/" source="CVE"/>
		<reference ref_id="CVE-2016-5318" ref_url="https://www.suse.com/security/cve/CVE-2016-5318/" source="CVE"/>
		<reference ref_id="CVE-2017-16232" ref_url="https://www.suse.com/security/cve/CVE-2017-16232/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html" source="SUSE-SU"/>
		<description>
This update for tiff to version 4.0.9 fixes the following issues:

Security issues fixed:

- CVE-2014-8128: Fix out-of-bounds read with malformed TIFF image in multiple tools (bsc#969783).
- CVE-2015-7554: Fix invalid write in tiffsplit / _TIFFVGetField (bsc#960341).
- CVE-2016-10095: Fix stack-based buffer overflow in _TIFFVGetField (tif_dir.c) (bsc#1017690).
- CVE-2016-5318: Fix stackoverflow in thumbnail (bsc#983436).
- CVE-2017-16232: Fix memory-based DoS in tiff2bw (bsc#1069213).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069213">SUSE bug 1069213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969783">SUSE bug 969783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983436">SUSE bug 983436</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10095/">CVE-2016-10095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5318/">CVE-2016-5318</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16232/">CVE-2017-16232</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519147" comment="libtiff5-4.0.9-44.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519148" comment="libtiff5-32bit-4.0.9-44.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78163" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1081925" ref_url="https://bugzilla.suse.com/1081925" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1058" ref_url="https://www.suse.com/security/cve/CVE-2018-1058/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003872.html" source="SUSE-SU"/>
		<description>
This update for postgresql94 fixes the following issues:

Security issues fixed:

- CVE-2018-1058: Fixed uncontrolled search path element in pg_dump and other client applications (bsc#1081925).


Bug fixes:

- See release notes for details:
  * https://www.postgresql.org/docs/9.4/static/release-9-4-17.html
  * https://www.postgresql.org/docs/9.4/static/release-9-4-16.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-05"/>
	<updated date="2018-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081925">SUSE bug 1081925</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1058/">CVE-2018-1058</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519149" comment="postgresql94-9.4.17-21.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78164" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1049305" ref_url="https://bugzilla.suse.com/1049305" source="BUGZILLA"/>
		<reference ref_id="1049306" ref_url="https://bugzilla.suse.com/1049306" source="BUGZILLA"/>
		<reference ref_id="1049307" ref_url="https://bugzilla.suse.com/1049307" source="BUGZILLA"/>
		<reference ref_id="1049309" ref_url="https://bugzilla.suse.com/1049309" source="BUGZILLA"/>
		<reference ref_id="1049310" ref_url="https://bugzilla.suse.com/1049310" source="BUGZILLA"/>
		<reference ref_id="1049311" ref_url="https://bugzilla.suse.com/1049311" source="BUGZILLA"/>
		<reference ref_id="1049312" ref_url="https://bugzilla.suse.com/1049312" source="BUGZILLA"/>
		<reference ref_id="1049313" ref_url="https://bugzilla.suse.com/1049313" source="BUGZILLA"/>
		<reference ref_id="1049314" ref_url="https://bugzilla.suse.com/1049314" source="BUGZILLA"/>
		<reference ref_id="1049315" ref_url="https://bugzilla.suse.com/1049315" source="BUGZILLA"/>
		<reference ref_id="1049316" ref_url="https://bugzilla.suse.com/1049316" source="BUGZILLA"/>
		<reference ref_id="1049317" ref_url="https://bugzilla.suse.com/1049317" source="BUGZILLA"/>
		<reference ref_id="1049318" ref_url="https://bugzilla.suse.com/1049318" source="BUGZILLA"/>
		<reference ref_id="1049319" ref_url="https://bugzilla.suse.com/1049319" source="BUGZILLA"/>
		<reference ref_id="1049320" ref_url="https://bugzilla.suse.com/1049320" source="BUGZILLA"/>
		<reference ref_id="1049321" ref_url="https://bugzilla.suse.com/1049321" source="BUGZILLA"/>
		<reference ref_id="1049322" ref_url="https://bugzilla.suse.com/1049322" source="BUGZILLA"/>
		<reference ref_id="1049323" ref_url="https://bugzilla.suse.com/1049323" source="BUGZILLA"/>
		<reference ref_id="1049324" ref_url="https://bugzilla.suse.com/1049324" source="BUGZILLA"/>
		<reference ref_id="1049325" ref_url="https://bugzilla.suse.com/1049325" source="BUGZILLA"/>
		<reference ref_id="1049326" ref_url="https://bugzilla.suse.com/1049326" source="BUGZILLA"/>
		<reference ref_id="1049327" ref_url="https://bugzilla.suse.com/1049327" source="BUGZILLA"/>
		<reference ref_id="1049328" ref_url="https://bugzilla.suse.com/1049328" source="BUGZILLA"/>
		<reference ref_id="1049329" ref_url="https://bugzilla.suse.com/1049329" source="BUGZILLA"/>
		<reference ref_id="1049330" ref_url="https://bugzilla.suse.com/1049330" source="BUGZILLA"/>
		<reference ref_id="1049331" ref_url="https://bugzilla.suse.com/1049331" source="BUGZILLA"/>
		<reference ref_id="1049332" ref_url="https://bugzilla.suse.com/1049332" source="BUGZILLA"/>
		<reference ref_id="1052318" ref_url="https://bugzilla.suse.com/1052318" source="BUGZILLA"/>
		<reference ref_id="1064071" ref_url="https://bugzilla.suse.com/1064071" source="BUGZILLA"/>
		<reference ref_id="1064072" ref_url="https://bugzilla.suse.com/1064072" source="BUGZILLA"/>
		<reference ref_id="1064073" ref_url="https://bugzilla.suse.com/1064073" source="BUGZILLA"/>
		<reference ref_id="1064075" ref_url="https://bugzilla.suse.com/1064075" source="BUGZILLA"/>
		<reference ref_id="1064077" ref_url="https://bugzilla.suse.com/1064077" source="BUGZILLA"/>
		<reference ref_id="1064078" ref_url="https://bugzilla.suse.com/1064078" source="BUGZILLA"/>
		<reference ref_id="1064079" ref_url="https://bugzilla.suse.com/1064079" source="BUGZILLA"/>
		<reference ref_id="1064080" ref_url="https://bugzilla.suse.com/1064080" source="BUGZILLA"/>
		<reference ref_id="1064081" ref_url="https://bugzilla.suse.com/1064081" source="BUGZILLA"/>
		<reference ref_id="1064082" ref_url="https://bugzilla.suse.com/1064082" source="BUGZILLA"/>
		<reference ref_id="1064083" ref_url="https://bugzilla.suse.com/1064083" source="BUGZILLA"/>
		<reference ref_id="1064084" ref_url="https://bugzilla.suse.com/1064084" source="BUGZILLA"/>
		<reference ref_id="1064085" ref_url="https://bugzilla.suse.com/1064085" source="BUGZILLA"/>
		<reference ref_id="1064086" ref_url="https://bugzilla.suse.com/1064086" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10165" ref_url="https://www.suse.com/security/cve/CVE-2016-10165/" source="CVE"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-10053" ref_url="https://www.suse.com/security/cve/CVE-2017-10053/" source="CVE"/>
		<reference ref_id="CVE-2017-10067" ref_url="https://www.suse.com/security/cve/CVE-2017-10067/" source="CVE"/>
		<reference ref_id="CVE-2017-10074" ref_url="https://www.suse.com/security/cve/CVE-2017-10074/" source="CVE"/>
		<reference ref_id="CVE-2017-10081" ref_url="https://www.suse.com/security/cve/CVE-2017-10081/" source="CVE"/>
		<reference ref_id="CVE-2017-10086" ref_url="https://www.suse.com/security/cve/CVE-2017-10086/" source="CVE"/>
		<reference ref_id="CVE-2017-10087" ref_url="https://www.suse.com/security/cve/CVE-2017-10087/" source="CVE"/>
		<reference ref_id="CVE-2017-10089" ref_url="https://www.suse.com/security/cve/CVE-2017-10089/" source="CVE"/>
		<reference ref_id="CVE-2017-10090" ref_url="https://www.suse.com/security/cve/CVE-2017-10090/" source="CVE"/>
		<reference ref_id="CVE-2017-10096" ref_url="https://www.suse.com/security/cve/CVE-2017-10096/" source="CVE"/>
		<reference ref_id="CVE-2017-10101" ref_url="https://www.suse.com/security/cve/CVE-2017-10101/" source="CVE"/>
		<reference ref_id="CVE-2017-10102" ref_url="https://www.suse.com/security/cve/CVE-2017-10102/" source="CVE"/>
		<reference ref_id="CVE-2017-10105" ref_url="https://www.suse.com/security/cve/CVE-2017-10105/" source="CVE"/>
		<reference ref_id="CVE-2017-10107" ref_url="https://www.suse.com/security/cve/CVE-2017-10107/" source="CVE"/>
		<reference ref_id="CVE-2017-10108" ref_url="https://www.suse.com/security/cve/CVE-2017-10108/" source="CVE"/>
		<reference ref_id="CVE-2017-10109" ref_url="https://www.suse.com/security/cve/CVE-2017-10109/" source="CVE"/>
		<reference ref_id="CVE-2017-10110" ref_url="https://www.suse.com/security/cve/CVE-2017-10110/" source="CVE"/>
		<reference ref_id="CVE-2017-10111" ref_url="https://www.suse.com/security/cve/CVE-2017-10111/" source="CVE"/>
		<reference ref_id="CVE-2017-10114" ref_url="https://www.suse.com/security/cve/CVE-2017-10114/" source="CVE"/>
		<reference ref_id="CVE-2017-10115" ref_url="https://www.suse.com/security/cve/CVE-2017-10115/" source="CVE"/>
		<reference ref_id="CVE-2017-10116" ref_url="https://www.suse.com/security/cve/CVE-2017-10116/" source="CVE"/>
		<reference ref_id="CVE-2017-10118" ref_url="https://www.suse.com/security/cve/CVE-2017-10118/" source="CVE"/>
		<reference ref_id="CVE-2017-10125" ref_url="https://www.suse.com/security/cve/CVE-2017-10125/" source="CVE"/>
		<reference ref_id="CVE-2017-10135" ref_url="https://www.suse.com/security/cve/CVE-2017-10135/" source="CVE"/>
		<reference ref_id="CVE-2017-10176" ref_url="https://www.suse.com/security/cve/CVE-2017-10176/" source="CVE"/>
		<reference ref_id="CVE-2017-10193" ref_url="https://www.suse.com/security/cve/CVE-2017-10193/" source="CVE"/>
		<reference ref_id="CVE-2017-10198" ref_url="https://www.suse.com/security/cve/CVE-2017-10198/" source="CVE"/>
		<reference ref_id="CVE-2017-10243" ref_url="https://www.suse.com/security/cve/CVE-2017-10243/" source="CVE"/>
		<reference ref_id="CVE-2017-10274" ref_url="https://www.suse.com/security/cve/CVE-2017-10274/" source="CVE"/>
		<reference ref_id="CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281/" source="CVE"/>
		<reference ref_id="CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285/" source="CVE"/>
		<reference ref_id="CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295/" source="CVE"/>
		<reference ref_id="CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345/" source="CVE"/>
		<reference ref_id="CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346/" source="CVE"/>
		<reference ref_id="CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347/" source="CVE"/>
		<reference ref_id="CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348/" source="CVE"/>
		<reference ref_id="CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349/" source="CVE"/>
		<reference ref_id="CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355/" source="CVE"/>
		<reference ref_id="CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356/" source="CVE"/>
		<reference ref_id="CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357/" source="CVE"/>
		<reference ref_id="CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Security issues fixed:

- CVE-2017-10356: Fix issue inside subcomponent Security (bsc#1064084).
- CVE-2017-10274: Fix issue inside subcomponent Smart Card IO (bsc#1064071).
- CVE-2017-10281: Fix issue inside subcomponent Serialization (bsc#1064072).
- CVE-2017-10285: Fix issue inside subcomponent RMI (bsc#1064073).
- CVE-2017-10295: Fix issue inside subcomponent Networking (bsc#1064075).
- CVE-2017-10388: Fix issue inside subcomponent Libraries (bsc#1064086).
- CVE-2017-10346: Fix issue inside subcomponent Hotspot (bsc#1064078).
- CVE-2017-10350: Fix issue inside subcomponent JAX-WS (bsc#1064082).
- CVE-2017-10347: Fix issue inside subcomponent Serialization (bsc#1064079).
- CVE-2017-10349: Fix issue inside subcomponent JAXP (bsc#1064081).
- CVE-2017-10345: Fix issue inside subcomponent Serialization (bsc#1064077).
- CVE-2017-10348: Fix issue inside subcomponent Libraries (bsc#1064080).
- CVE-2017-10357: Fix issue inside subcomponent Serialization (bsc#1064085).
- CVE-2017-10355: Fix issue inside subcomponent Networking (bsc#1064083).
- CVE-2017-10102: Fix incorrect handling of references in DGC (bsc#1049316).
- CVE-2017-10053: Fix reading of unprocessed image data in JPEGImageReader (bsc#1049305).
- CVE-2017-10067: Fix JAR verifier incorrect handling of missing digest (bsc#1049306).
- CVE-2017-10081: Fix incorrect bracket processing in function signature handling (bsc#1049309).
- CVE-2017-10087: Fix insufficient access control checks in ThreadPoolExecutor (bsc#1049311).
- CVE-2017-10089: Fix insufficient access control checks in ServiceRegistry (bsc#1049312).
- CVE-2017-10090: Fix insufficient access control checks in AsynchronousChannelGroupImpl (bsc#1049313).
- CVE-2017-10096: Fix insufficient access control checks in XML transformations (bsc#1049314).
- CVE-2017-10101: Fix unrestricted access to com.sun.org.apache.xml.internal.resolver (bsc#1049315).
- CVE-2017-10107: Fix insufficient access control checks in ActivationID (bsc#1049318).
- CVE-2017-10074: Fix integer overflows in range check loop predicates (bsc#1049307).
- CVE-2017-10110: Fix insufficient access control checks in ImageWatched (bsc#1049321).
- CVE-2017-10108: Fix unbounded memory allocation in BasicAttribute deserialization (bsc#1049319).
- CVE-2017-10109: Fix unbounded memory allocation in CodeSource deserialization (bsc#1049320).
- CVE-2017-10115: Fix unspecified vulnerability in subcomponent JCE (bsc#1049324).
- CVE-2017-10118: Fix ECDSA implementation timing attack (bsc#1049326).
- CVE-2017-10116: Fix LDAPCertStore following referrals to non-LDAP URL (bsc#1049325).
- CVE-2017-10135: Fix PKCS#8 implementation timing attack (bsc#1049328).
- CVE-2017-10176: Fix incorrect handling of certain EC points (bsc#1049329).
- CVE-2017-10074: Fix integer overflows in range check loop predicates (bsc#1049307).
- CVE-2017-10074: Fix integer overflows in range check loop predicates (bsc#1049307).
- CVE-2017-10111: Fix checks in LambdaFormEditor (bsc#1049322).
- CVE-2017-10243: Fix unspecified vulnerability in subcomponent JAX-WS (bsc#1049332).
- CVE-2017-10125: Fix unspecified vulnerability in subcomponent deployment (bsc#1049327).
- CVE-2017-10114: Fix unspecified vulnerability in subcomponent JavaFX (bsc#1049323).
- CVE-2017-10105: Fix unspecified vulnerability in subcomponent deployment (bsc#1049317).
- CVE-2017-10086: Fix unspecified in subcomponent JavaFX (bsc#1049310).
- CVE-2017-10198: Fix incorrect enforcement of certificate path restrictions (bsc#1049331).
- CVE-2017-10193: Fix incorrect key size constraint check (bsc#1049330).

Bug fixes:

- Drop Exec Shield workaround to fix crashes on recent kernels, where Exec Shield is gone (bsc#1052318).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-03"/>
	<updated date="2018-01-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1049305">SUSE bug 1049305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049306">SUSE bug 1049306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049307">SUSE bug 1049307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049309">SUSE bug 1049309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049310">SUSE bug 1049310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049311">SUSE bug 1049311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049312">SUSE bug 1049312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049313">SUSE bug 1049313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049314">SUSE bug 1049314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049315">SUSE bug 1049315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049316">SUSE bug 1049316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049317">SUSE bug 1049317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049318">SUSE bug 1049318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049319">SUSE bug 1049319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049320">SUSE bug 1049320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049321">SUSE bug 1049321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049322">SUSE bug 1049322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049323">SUSE bug 1049323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049324">SUSE bug 1049324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049325">SUSE bug 1049325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049326">SUSE bug 1049326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049327">SUSE bug 1049327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049328">SUSE bug 1049328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049329">SUSE bug 1049329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049330">SUSE bug 1049330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049331">SUSE bug 1049331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049332">SUSE bug 1049332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052318">SUSE bug 1052318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064071">SUSE bug 1064071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064072">SUSE bug 1064072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064073">SUSE bug 1064073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064075">SUSE bug 1064075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064077">SUSE bug 1064077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064078">SUSE bug 1064078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064079">SUSE bug 1064079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064080">SUSE bug 1064080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064081">SUSE bug 1064081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064082">SUSE bug 1064082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064083">SUSE bug 1064083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064084">SUSE bug 1064084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064085">SUSE bug 1064085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064086">SUSE bug 1064086</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10165/">CVE-2016-10165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10053/">CVE-2017-10053</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10067/">CVE-2017-10067</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10074/">CVE-2017-10074</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10081/">CVE-2017-10081</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10086/">CVE-2017-10086</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10087/">CVE-2017-10087</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10089/">CVE-2017-10089</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10090/">CVE-2017-10090</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10096/">CVE-2017-10096</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10101/">CVE-2017-10101</cve>
	<cve impact="important" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10102/">CVE-2017-10102</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10105/">CVE-2017-10105</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10107/">CVE-2017-10107</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10108/">CVE-2017-10108</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10109/">CVE-2017-10109</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10110/">CVE-2017-10110</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10111/">CVE-2017-10111</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10114/">CVE-2017-10114</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-10115/">CVE-2017-10115</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10116/">CVE-2017-10116</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10118/">CVE-2017-10118</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10125/">CVE-2017-10125</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10135/">CVE-2017-10135</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10176/">CVE-2017-10176</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10193/">CVE-2017-10193</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10198/">CVE-2017-10198</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10243/">CVE-2017-10243</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10274/">CVE-2017-10274</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78165" version="1" class="patch">
	<metadata>
		<title>Security update for gwenhywfar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="958331" ref_url="https://bugzilla.suse.com/958331" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7542" ref_url="https://www.suse.com/security/cve/CVE-2015-7542/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003590.html" source="SUSE-SU"/>
		<description>
This update for gwenhywfar fixes the following issues:

Security issue fixed:

- CVE-2015-7542: Make use of the system's default trusted CAs. Also remove the upstream provided ca-bundle.crt
  file and require ca-certificates so the /etc/ssl/certs directory is populated (bsc#958331).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958331">SUSE bug 958331</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7542/">CVE-2015-7542</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519152" comment="gwenhywfar-lang-4.9.0beta-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519153" comment="gwenhywfar-tools-4.9.0beta-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519154" comment="libgwengui-gtk2-0-4.9.0beta-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519155" comment="libgwenhywfar60-4.9.0beta-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519156" comment="libgwenhywfar60-plugins-4.9.0beta-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78166" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1072834" ref_url="https://bugzilla.suse.com/1072834" source="BUGZILLA"/>
		<reference ref_id="1074562" ref_url="https://bugzilla.suse.com/1074562" source="BUGZILLA"/>
		<reference ref_id="1080635" ref_url="https://bugzilla.suse.com/1080635" source="BUGZILLA"/>
		<reference ref_id="1080662" ref_url="https://bugzilla.suse.com/1080662" source="BUGZILLA"/>
		<reference ref_id="1087251" ref_url="https://bugzilla.suse.com/1087251" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-7540" ref_url="https://www.suse.com/security/cve/CVE-2018-7540/" source="CVE"/>
		<reference ref_id="CVE-2018-7541" ref_url="https://www.suse.com/security/cve/CVE-2018-7541/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00009.html" source="SUSE-SU"/>
		<description>

  
This update for xen fixes the following issues:

Update to Xen 4.7.5 bug fix only release (bsc#1027519)

Security issues fixed:

- CVE-2018-7540: Fixed DoS via non-preemptable L3/L4 pagetable freeing (XSA-252) (bsc#1080635)
- CVE-2018-7541: A grant table v2 -&gt; v1 transition may crash Xen (XSA-255) (bsc#1080662)
- CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 Fixed information leaks via
  side effects of speculative execution (XSA-254). Includes Spectre v2
  mitigation. (bsc#1074562)


- Preserve xen-syms from xen-dbg.gz to allow processing vmcores
  with crash(1) (bsc#1087251)
- Xen HVM: Fixed unchecked MSR access error (bsc#1072834)
- Add script, udev rule and systemd service to watch for vcpu
  online/offline events in a HVM domU They are triggered via xl vcpu-set
  domU N (fate#324965)
- Make sure tools and tools-domU require libs from the very same build

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-10"/>
	<updated date="2018-04-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072834">SUSE bug 1072834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080635">SUSE bug 1080635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080662">SUSE bug 1080662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087251">SUSE bug 1087251</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7540/">CVE-2018-7540</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7541/">CVE-2018-7541</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519157" comment="xen-4.7.5_02-43.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519158" comment="xen-libs-4.7.5_02-43.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519159" comment="xen-libs-32bit-4.7.5_02-43.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78167" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1087102" ref_url="https://bugzilla.suse.com/1087102" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003886.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

    - CVE-2018-0739: Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) 
    could eventually exceed the stack given malicious input with excessive recursion. This could result 
    in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from 
    untrusted sources so this is considered safe. (bsc#1087102).

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-11"/>
	<updated date="2018-04-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1087102">SUSE bug 1087102</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519160" comment="libopenssl-devel-1.0.2j-60.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519161" comment="libopenssl1_0_0-1.0.2j-60.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519162" comment="libopenssl1_0_0-32bit-1.0.2j-60.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519163" comment="openssl-1.0.2j-60.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78168" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1062538" ref_url="https://bugzilla.suse.com/1062538" source="BUGZILLA"/>
		<reference ref_id="1067844" ref_url="https://bugzilla.suse.com/1067844" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12172" ref_url="https://www.suse.com/security/cve/CVE-2017-12172/" source="CVE"/>
		<reference ref_id="CVE-2017-15098" ref_url="https://www.suse.com/security/cve/CVE-2017-15098/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003597.html" source="SUSE-SU"/>
		<description>
This update for postgresql94 fixes the following issues:

Security issues fixed:

- CVE-2017-15098: Fix crash due to rowtype mismatch in json{b}_populate_recordset() (bsc#1067844).
- CVE-2017-12172: Start scripts permit database administrator to modify root-owned files. This issue did not affect SUSE (bsc#1062538).

Bug fixes:

- Update to version 9.4.15
  * https://www.postgresql.org/docs/9.4/static/release-9-4-15.html
  * https://www.postgresql.org/docs/9.4/static/release-9-4-14.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062538">SUSE bug 1062538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067844">SUSE bug 1067844</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12172/">CVE-2017-12172</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15098/">CVE-2017-15098</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519164" comment="postgresql94-9.4.15-21.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78169" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1039034" ref_url="https://bugzilla.suse.com/1039034" source="BUGZILLA"/>
		<reference ref_id="1049399" ref_url="https://bugzilla.suse.com/1049399" source="BUGZILLA"/>
		<reference ref_id="1049404" ref_url="https://bugzilla.suse.com/1049404" source="BUGZILLA"/>
		<reference ref_id="1049417" ref_url="https://bugzilla.suse.com/1049417" source="BUGZILLA"/>
		<reference ref_id="1054591" ref_url="https://bugzilla.suse.com/1054591" source="BUGZILLA"/>
		<reference ref_id="1072665" ref_url="https://bugzilla.suse.com/1072665" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3636" ref_url="https://www.suse.com/security/cve/CVE-2017-3636/" source="CVE"/>
		<reference ref_id="CVE-2017-3641" ref_url="https://www.suse.com/security/cve/CVE-2017-3641/" source="CVE"/>
		<reference ref_id="CVE-2017-3653" ref_url="https://www.suse.com/security/cve/CVE-2017-3653/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003596.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes several issues.

These security issues were fixed:

- CVE-2017-3636: Client programs had an unspecified vulnerability that could
  lead to unauthorized access and denial of service (bsc#1049399)
- CVE-2017-3641: DDL unspecified vulnerability could lead to denial of service
  (bsc#1049404)
- CVE-2017-3653: DML Unspecified vulnerability could lead to unauthorized
  database access (bsc#1049417)

This non-security issues was fixed:

- Add ODBC support for Connect engine (bsc#1039034)
- Relax required version for mariadb-errormessages (bsc#1072665)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1039034">SUSE bug 1039034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049399">SUSE bug 1049399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049404">SUSE bug 1049404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049417">SUSE bug 1049417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054591">SUSE bug 1054591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072665">SUSE bug 1072665</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-3636/">CVE-2017-3636</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3641/">CVE-2017-3641</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3653/">CVE-2017-3653</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519165" comment="libmysqlclient18-10.0.32-29.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519166" comment="libmysqlclient18-32bit-10.0.32-29.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519167" comment="libmysqlclient_r18-10.0.32-29.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519168" comment="libmysqlclient_r18-32bit-10.0.32-29.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519169" comment="mariadb-10.0.32-29.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519170" comment="mariadb-client-10.0.32-29.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519171" comment="mariadb-errormessages-10.0.32-29.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78170" version="1" class="patch">
	<metadata>
		<title>Security update for openslp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1001600" ref_url="https://bugzilla.suse.com/1001600" source="BUGZILLA"/>
		<reference ref_id="974655" ref_url="https://bugzilla.suse.com/974655" source="BUGZILLA"/>
		<reference ref_id="980722" ref_url="https://bugzilla.suse.com/980722" source="BUGZILLA"/>
		<reference ref_id="994989" ref_url="https://bugzilla.suse.com/994989" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4912" ref_url="https://www.suse.com/security/cve/CVE-2016-4912/" source="CVE"/>
		<reference ref_id="CVE-2016-7567" ref_url="https://www.suse.com/security/cve/CVE-2016-7567/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003598.html" source="SUSE-SU"/>
		<description>
This update for openslp fixes two security issues and two bugs.

The following vulnerabilities were fixed:

- CVE-2016-4912: A remote attacker could have crashed the server with a large
  number of packages (bsc#980722)
- CVE-2016-7567: A remote attacker could cause a memory corruption having
  unspecified impact (bsc#1001600)

The following bugfix changes are included:

- bsc#994989: Removed convenience code as changes bytes in the message buffer
  breaking the verification code
- bsc#974655: Removed no longer needed slpd init file
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-15"/>
	<updated date="2018-01-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1001600">SUSE bug 1001600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974655">SUSE bug 974655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980722">SUSE bug 980722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994989">SUSE bug 994989</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4912/">CVE-2016-4912</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7567/">CVE-2016-7567</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519172" comment="openslp-2.0.0-18.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519173" comment="openslp-32bit-2.0.0-18.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78171" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

- Add microcode_amd_fam17h.bin (bsc#1068032 CVE-2017-5715)

This new firmware disables branch prediction on AMD family 17h
processor to mitigate a attack on the branch predictor that could
lead to information disclosure from e.g. kernel memory (bsc#1068032
CVE-2017-5715).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519174" comment="kernel-firmware-20170530-21.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519175" comment="ucode-amd-20170530-21.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78172" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1028842" ref_url="https://bugzilla.suse.com/1028842" source="BUGZILLA"/>
		<reference ref_id="1062063" ref_url="https://bugzilla.suse.com/1062063" source="BUGZILLA"/>
		<reference ref_id="1066644" ref_url="https://bugzilla.suse.com/1066644" source="BUGZILLA"/>
		<reference ref_id="1071459" ref_url="https://bugzilla.suse.com/1071459" source="BUGZILLA"/>
		<reference ref_id="1071460" ref_url="https://bugzilla.suse.com/1071460" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16548" ref_url="https://www.suse.com/security/cve/CVE-2017-16548/" source="CVE"/>
		<reference ref_id="CVE-2017-17433" ref_url="https://www.suse.com/security/cve/CVE-2017-17433/" source="CVE"/>
		<reference ref_id="CVE-2017-17434" ref_url="https://www.suse.com/security/cve/CVE-2017-17434/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003604.html" source="SUSE-SU"/>
		<description>
This update for rsync fixes several issues.

These security issues were fixed:

- CVE-2017-17434: The daemon in rsync did not check for fnamecmp filenames in
  the daemon_filter_list data structure (in the recv_files function in
  receiver.c) and also did not apply the sanitize_paths protection mechanism to
  pathnames found in 'xname follows' strings (in the read_ndx_and_attrs function
  in rsync.c), which allowed remote attackers to bypass intended access
  restrictions' (bsc#1071460).
- CVE-2017-17433: The recv_files function in receiver.c in the daemon in rsync,
  proceeded with certain file metadata updates before checking for a filename in
  the daemon_filter_list data structure, which allowed remote attackers to bypass
  intended access restrictions (bsc#1071459).
- CVE-2017-16548: The receive_xattr function in xattrs.c in rsync did not check
  for a trailing '\\0' character in an xattr name, which allowed remote attackers
  to cause a denial of service (heap-based buffer over-read and application
  crash) or possibly have unspecified other impact by sending crafted data to the
  daemon (bsc#1066644).

This non-security issue was fixed:

- Stop file upload after errors like a full disk (bsc#1062063)
- Ensure -X flag works even when setting owner/group (bsc#1028842)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-17"/>
	<updated date="2018-01-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1028842">SUSE bug 1028842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062063">SUSE bug 1062063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066644">SUSE bug 1066644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071459">SUSE bug 1071459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071460">SUSE bug 1071460</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16548/">CVE-2017-16548</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17433/">CVE-2017-17433</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17434/">CVE-2017-17434</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519176" comment="rsync-3.1.0-13.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78173" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1056127" ref_url="https://bugzilla.suse.com/1056127" source="BUGZILLA"/>
		<reference ref_id="1056128" ref_url="https://bugzilla.suse.com/1056128" source="BUGZILLA"/>
		<reference ref_id="1056129" ref_url="https://bugzilla.suse.com/1056129" source="BUGZILLA"/>
		<reference ref_id="1056131" ref_url="https://bugzilla.suse.com/1056131" source="BUGZILLA"/>
		<reference ref_id="1056132" ref_url="https://bugzilla.suse.com/1056132" source="BUGZILLA"/>
		<reference ref_id="1056136" ref_url="https://bugzilla.suse.com/1056136" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13728" ref_url="https://www.suse.com/security/cve/CVE-2017-13728/" source="CVE"/>
		<reference ref_id="CVE-2017-13729" ref_url="https://www.suse.com/security/cve/CVE-2017-13729/" source="CVE"/>
		<reference ref_id="CVE-2017-13730" ref_url="https://www.suse.com/security/cve/CVE-2017-13730/" source="CVE"/>
		<reference ref_id="CVE-2017-13731" ref_url="https://www.suse.com/security/cve/CVE-2017-13731/" source="CVE"/>
		<reference ref_id="CVE-2017-13732" ref_url="https://www.suse.com/security/cve/CVE-2017-13732/" source="CVE"/>
		<reference ref_id="CVE-2017-13733" ref_url="https://www.suse.com/security/cve/CVE-2017-13733/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003606.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:

- CVE-2017-13728: Fix infinite loop in the next_char function in comp_scan.c (bsc#1056136).
- CVE-2017-13730: Fix illegal address access in the function _nc_read_entry_source() (bsc#1056131).
- CVE-2017-13733: Fix illegal address access in the fmt_entry function (bsc#1056127).
- CVE-2017-13729: Fix illegal address access in the _nc_save_str (bsc#1056132).
- CVE-2017-13732: Fix illegal address access in the function dump_uses() (bsc#1056128).
- CVE-2017-13731: Fix illegal address access in the function postprocess_termcap() (bsc#1056129).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-17"/>
	<updated date="2018-01-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056127">SUSE bug 1056127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056128">SUSE bug 1056128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056129">SUSE bug 1056129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056131">SUSE bug 1056131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056132">SUSE bug 1056132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056136">SUSE bug 1056136</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13728/">CVE-2017-13728</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13729/">CVE-2017-13729</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13730/">CVE-2017-13730</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13731/">CVE-2017-13731</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13732/">CVE-2017-13732</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13733/">CVE-2017-13733</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519177" comment="libncurses5-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519178" comment="libncurses5-32bit-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519179" comment="libncurses6-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519180" comment="libncurses6-32bit-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519181" comment="ncurses-devel-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519182" comment="ncurses-utils-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519183" comment="tack-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519184" comment="terminfo-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519185" comment="terminfo-base-5.9-55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78174" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1069222" ref_url="https://bugzilla.suse.com/1069222" source="BUGZILLA"/>
		<reference ref_id="1069226" ref_url="https://bugzilla.suse.com/1069226" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8816" ref_url="https://www.suse.com/security/cve/CVE-2017-8816/" source="CVE"/>
		<reference ref_id="CVE-2017-8817" ref_url="https://www.suse.com/security/cve/CVE-2017-8817/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003607.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issues fixed:

- CVE-2017-8816: Buffer overrun flaw in the NTLM authentication code (bsc#1069226).
- CVE-2017-8817: Read out of bounds flaw in the FTP wildcard function (bsc#1069222).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-17"/>
	<updated date="2018-01-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1069222">SUSE bug 1069222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069226">SUSE bug 1069226</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8816/">CVE-2017-8816</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-8817/">CVE-2017-8817</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519186" comment="curl-7.37.0-37.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519187" comment="libcurl4-7.37.0-37.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519188" comment="libcurl4-32bit-7.37.0-37.11.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78175" version="1" class="patch">
	<metadata>
		<title>Security update for perl-XML-LibXML (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1046848" ref_url="https://bugzilla.suse.com/1046848" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10672" ref_url="https://www.suse.com/security/cve/CVE-2017-10672/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003608.html" source="SUSE-SU"/>
		<description>
This update for perl-XML-LibXML fixes the following issues:

Security issue fixed:

- CVE-2017-10672: Fix use-after-free that allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call (bsc#1046848).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-17"/>
	<updated date="2018-01-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046848">SUSE bug 1046848</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-10672/">CVE-2017-10672</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519189" comment="perl-XML-LibXML-2.0019-6.3.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78176" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP2</platform>
		</affected>
		<reference ref_id="1047044" ref_url="https://bugzilla.suse.com/1047044" source="BUGZILLA"/>
		<reference ref_id="1047898" ref_url="https://bugzilla.suse.com/1047898" source="BUGZILLA"/>
		<reference ref_id="1050120" ref_url="https://bugzilla.suse.com/1050120" source="BUGZILLA"/>
		<reference ref_id="1050606" ref_url="https://bugzilla.suse.com/1050606" source="BUGZILLA"/>
		<reference ref_id="1051446" ref_url="https://bugzilla.suse.com/1051446" source="BUGZILLA"/>
		<reference ref_id="1052468" ref_url="https://bugzilla.suse.com/1052468" source="BUGZILLA"/>
		<reference ref_id="1052550" ref_url="https://bugzilla.suse.com/1052550" source="BUGZILLA"/>
		<reference ref_id="1052710" ref_url="https://bugzilla.suse.com/1052710" source="BUGZILLA"/>
		<reference ref_id="1052720" ref_url="https://bugzilla.suse.com/1052720" source="BUGZILLA"/>
		<reference ref_id="1052731" ref_url="https://bugzilla.suse.com/1052731" source="BUGZILLA"/>
		<reference ref_id="1052732" ref_url="https://bugzilla.suse.com/1052732" source="BUGZILLA"/>
		<reference ref_id="1055065" ref_url="https://bugzilla.suse.com/1055065" source="BUGZILLA"/>
		<reference ref_id="1055323" ref_url="https://bugzilla.suse.com/1055323" source="BUGZILLA"/>
		<reference ref_id="1055434" ref_url="https://bugzilla.suse.com/1055434" source="BUGZILLA"/>
		<reference ref_id="1055855" ref_url="https://bugzilla.suse.com/1055855" source="BUGZILLA"/>
		<reference ref_id="1058640" ref_url="https://bugzilla.suse.com/1058640" source="BUGZILLA"/>
		<reference ref_id="1059751" ref_url="https://bugzilla.suse.com/1059751" source="BUGZILLA"/>
		<reference ref_id="1074123" ref_url="https://bugzilla.suse.com/1074123" source="BUGZILLA"/>
		<reference ref_id="1074969" ref_url="https://bugzilla.suse.com/1074969" source="BUGZILLA"/>
		<reference ref_id="1074973" ref_url="https://bugzilla.suse.com/1074973" source="BUGZILLA"/>
		<reference ref_id="1074975" ref_url="https://bugzilla.suse.com/1074975" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10800" ref_url="https://www.suse.com/security/cve/CVE-2017-10800/" source="CVE"/>
		<reference ref_id="CVE-2017-11141" ref_url="https://www.suse.com/security/cve/CVE-2017-11141/" source="CVE"/>
		<reference ref_id="CVE-2017-11529" ref_url="https://www.suse.com/security/cve/CVE-2017-11529/" source="CVE"/>
		<reference ref_id="CVE-2017-11644" ref_url="https://www.suse.com/security/cve/CVE-2017-11644/" source="CVE"/>
		<reference ref_id="CVE-2017-11724" ref_url="https://www.suse.com/security/cve/CVE-2017-11724/" source="CVE"/>
		<reference ref_id="CVE-2017-12434" ref_url="https://www.suse.com/security/cve/CVE-2017-12434/" source="CVE"/>
		<reference ref_id="CVE-2017-12564" ref_url="https://www.suse.com/security/cve/CVE-2017-12564/" source="CVE"/>
		<reference ref_id="CVE-2017-12667" ref_url="https://www.suse.com/security/cve/CVE-2017-12667/" source="CVE"/>
		<reference ref_id="CVE-2017-12670" ref_url="https://www.suse.com/security/cve/CVE-2017-12670/" source="CVE"/>
		<reference ref_id="CVE-2017-12672" ref_url="https://www.suse.com/security/cve/CVE-2017-12672/" source="CVE"/>
		<reference ref_id="CVE-2017-12675" ref_url="https://www.suse.com/security/cve/CVE-2017-12675/" source="CVE"/>
		<reference ref_id="CVE-2017-13060" ref_url="https://www.suse.com/security/cve/CVE-2017-13060/" source="CVE"/>
		<reference ref_id="CVE-2017-13146" ref_url="https://www.suse.com/security/cve/CVE-2017-13146/" source="CVE"/>
		<reference ref_id="CVE-2017-13648" ref_url="https://www.suse.com/security/cve/CVE-2017-13648/" source="CVE"/>
		<reference ref_id="CVE-2017-13658" ref_url="https://www.suse.com/security/cve/CVE-2017-13658/" source="CVE"/>
		<reference ref_id="CVE-2017-14326" ref_url="https://www.suse.com/security/cve/CVE-2017-14326/" source="CVE"/>
		<reference ref_id="CVE-2017-14533" ref_url="https://www.suse.com/security/cve/CVE-2017-14533/" source="CVE"/>
		<reference ref_id="CVE-2017-17881" ref_url="https://www.suse.com/security/cve/CVE-2017-17881/" source="CVE"/>
		<reference ref_id="CVE-2017-18022" ref_url="https://www.suse.com/security/cve/CVE-2017-18022/" source="CVE"/>
		<reference ref_id="CVE-2018-5246" ref_url="https://www.suse.com/security/cve/CVE-2018-5246/" source="CVE"/>
		<reference ref_id="CVE-2018-5247" ref_url="https://www.suse.com/security/cve/CVE-2018-5247/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2018-5246: Fixed memory leak vulnerability in ReadPATTERNImage in
  coders/pattern.c (bsc#1074973)
- CVE-2017-18022: Fixed memory leak vulnerability in MontageImageCommand in
  MagickWand/montage.c (bsc#1074975)
- CVE-2018-5247: Fixed memory leak vulnerability in ReadRLAImage in
  coders/rla.c (bsc#1074969)
- CVE-2017-12672: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial
  of service (bsc#1052720)
- CVE-2017-13060: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial
  of service via a crafted file (bsc#1055065)
- CVE-2017-11724: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c involving the quantum_info and clone_info
  data structures (bsc#1051446)
- CVE-2017-12670: Added validation in coders/mat.c to prevent an assertion
  failure in the function DestroyImage in MagickCore/image.c, which
  allowed attackers to cause a denial of service (bsc#1052731)
- CVE-2017-12667: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1052732)
- CVE-2017-13146: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1055323)
- CVE-2017-10800: Processing MATLAB images in coders/mat.c could have lead to a
  denial of service (OOM) in ReadMATImage() if the size specified for a
  MAT Object was larger than the actual amount of data (bsc#1047044)
- CVE-2017-13648: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1055434)
- CVE-2017-11141: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders\mat.c that could have caused memory exhaustion
  via a crafted MAT file, related to incorrect ordering of a
  SetImageExtent call (bsc#1047898)
- CVE-2017-11529: The ReadMATImage function in coders/mat.c allowed remote
  attackers to cause a denial of service (memory leak) via a crafted file
  (bsc#1050120)
- CVE-2017-12564: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial
  of service (bsc#1052468)
- CVE-2017-12434: Added a missing NULL check in the function ReadMATImage in
  coders/mat.c, which allowed attackers to cause a denial of service
  (assertion failure) in DestroyImageInfo in image.c (bsc#1052550)
- CVE-2017-12675: Added a missing check for multidimensional data coders/mat.c,
  that could have lead to a memory leak in the function ReadImage in
  MagickCore/constitute.c, which allowed attackers to cause a denial of
  service (bsc#1052710)
- CVE-2017-14326: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial
  of service via a crafted file (bsc#1058640)
- CVE-2017-11644: Processesing a crafted file in convert could have lead to a
  memory leak in the ReadMATImage() function in coders/mat.c
  (bsc#1050606)
- CVE-2017-13658: Added a missing NULL check in the ReadMATImage function in
  coders/mat.c, which could have lead to a denial of service (assertion
  failure and application exit) in the DestroyImageInfo function in
  MagickCore/image.c (bsc#1055855)
- CVE-2017-14533: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1059751)
- CVE-2017-17881: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service via a crafted MAT image file (bsc#1074123)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-18"/>
	<updated date="2018-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047044">SUSE bug 1047044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047898">SUSE bug 1047898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050120">SUSE bug 1050120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050606">SUSE bug 1050606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051446">SUSE bug 1051446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052468">SUSE bug 1052468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052550">SUSE bug 1052550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052710">SUSE bug 1052710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052720">SUSE bug 1052720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052731">SUSE bug 1052731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052732">SUSE bug 1052732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055065">SUSE bug 1055065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055323">SUSE bug 1055323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055434">SUSE bug 1055434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055855">SUSE bug 1055855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058640">SUSE bug 1058640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059751">SUSE bug 1059751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074123">SUSE bug 1074123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074969">SUSE bug 1074969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074973">SUSE bug 1074973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074975">SUSE bug 1074975</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10800/">CVE-2017-10800</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11141/">CVE-2017-11141</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11529/">CVE-2017-11529</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11644/">CVE-2017-11644</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11724/">CVE-2017-11724</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12434/">CVE-2017-12434</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12564/">CVE-2017-12564</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12667/">CVE-2017-12667</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12670/">CVE-2017-12670</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12672/">CVE-2017-12672</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12675/">CVE-2017-12675</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13060/">CVE-2017-13060</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13146/">CVE-2017-13146</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13648/">CVE-2017-13648</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13658/">CVE-2017-13658</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14326/">CVE-2017-14326</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14533/">CVE-2017-14533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17881/">CVE-2017-17881</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18022/">CVE-2017-18022</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5246/">CVE-2018-5246</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5247/">CVE-2018-5247</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128016" comment="SUSE Linux Enterprise Desktop 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519190" comment="ImageMagick-6.8.8.1-71.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519191" comment="libMagick++-6_Q16-3-6.8.8.1-71.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519192" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519193" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519194" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78177" version="1" class="patch">
	<metadata>
		<title>Security update for libquicktime (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1022805" ref_url="https://bugzilla.suse.com/1022805" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2399" ref_url="https://www.suse.com/security/cve/CVE-2016-2399/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003070.html" source="SUSE-SU"/>
		<description>
This update for libquicktime fixes the following issues:

Security issue fixed:
- CVE-2016-2399: Adjust patch to prevent endless loop when there are less than 256 bytes to read. (bsc#1022805)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-28"/>
	<updated date="2017-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022805">SUSE bug 1022805</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2399/">CVE-2016-2399</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517936" comment="libquicktime0-1.2.4-14.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78178" version="1" class="patch">
	<metadata>
		<title>Security update for libical (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1015964" ref_url="https://bugzilla.suse.com/1015964" source="BUGZILLA"/>
		<reference ref_id="1044995" ref_url="https://bugzilla.suse.com/1044995" source="BUGZILLA"/>
		<reference ref_id="986631" ref_url="https://bugzilla.suse.com/986631" source="BUGZILLA"/>
		<reference ref_id="986639" ref_url="https://bugzilla.suse.com/986639" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5824" ref_url="https://www.suse.com/security/cve/CVE-2016-5824/" source="CVE"/>
		<reference ref_id="CVE-2016-5827" ref_url="https://www.suse.com/security/cve/CVE-2016-5827/" source="CVE"/>
		<reference ref_id="CVE-2016-9584" ref_url="https://www.suse.com/security/cve/CVE-2016-9584/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003072.html" source="SUSE-SU"/>
		<description>
This update for libical fixes the following issues:

Security issues fixed:
- CVE-2016-5824: libical 1.0 allows remote attackers to cause a denial of service (use-after-free)
  via a crafted ics file. (bsc#986639)
- CVE-2016-5827: The icaltime_from_string function in libical 0.47 and 1.0 allows remote attackers
  to cause a denial of service (out-of-bounds heap read) via a crafted string to the
  icalparser_parse_string function. (bsc#986631)
- CVE-2016-9584: libical allows remote attackers to cause a denial of service (use-after-free) and
  possibly read heap memory via a crafted ics file. (bsc#1015964)

Bug fixes:
- libical crashes while parsing timezones (bsc#1044995)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-28"/>
	<updated date="2017-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015964">SUSE bug 1015964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044995">SUSE bug 1044995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986631">SUSE bug 986631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5824/">CVE-2016-5824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5827/">CVE-2016-5827</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9584/">CVE-2016-9584</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517937" comment="libical1-1.0.1-16.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517938" comment="libical1-32bit-1.0.1-16.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78179" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1041783" ref_url="https://bugzilla.suse.com/1041783" source="BUGZILLA"/>
		<reference ref_id="1042802" ref_url="https://bugzilla.suse.com/1042802" source="BUGZILLA"/>
		<reference ref_id="1042803" ref_url="https://bugzilla.suse.com/1042803" source="BUGZILLA"/>
		<reference ref_id="1043088" ref_url="https://bugzilla.suse.com/1043088" source="BUGZILLA"/>
		<reference ref_id="1045719" ref_url="https://bugzilla.suse.com/1045719" source="BUGZILLA"/>
		<reference ref_id="1045721" ref_url="https://bugzilla.suse.com/1045721" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7511" ref_url="https://www.suse.com/security/cve/CVE-2017-7511/" source="CVE"/>
		<reference ref_id="CVE-2017-7515" ref_url="https://www.suse.com/security/cve/CVE-2017-7515/" source="CVE"/>
		<reference ref_id="CVE-2017-9406" ref_url="https://www.suse.com/security/cve/CVE-2017-9406/" source="CVE"/>
		<reference ref_id="CVE-2017-9408" ref_url="https://www.suse.com/security/cve/CVE-2017-9408/" source="CVE"/>
		<reference ref_id="CVE-2017-9775" ref_url="https://www.suse.com/security/cve/CVE-2017-9775/" source="CVE"/>
		<reference ref_id="CVE-2017-9776" ref_url="https://www.suse.com/security/cve/CVE-2017-9776/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003076.html" source="SUSE-SU"/>
		<description>
This update for poppler fixes the following issues:

Security issues fixed:
- CVE-2017-9775: DoS stack buffer overflow in GfxState.cc in pdftocairo via a crafted PDF document (bsc#1045719)
- CVE-2017-9776: DoS integer overflow leading to heap buffer overflow in JBIG2Stream.cc via a crafted PDF document (bsc#1045721)
- CVE-2017-7515: Stack exhaustion due to infinite recursive call in pdfunite (bsc#1043088)
- CVE-2017-7511: Null pointer dereference in pdfunite via crafted documents (bsc#1041783)
- CVE-2017-9406: Memory leak in the gmalloc function in gmem.cc (bsc#1042803)
- CVE-2017-9408: Memory leak in the Object::initArray function (bsc#1042802)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-28"/>
	<updated date="2017-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1041783">SUSE bug 1041783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042802">SUSE bug 1042802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042803">SUSE bug 1042803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043088">SUSE bug 1043088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045719">SUSE bug 1045719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045721">SUSE bug 1045721</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7511/">CVE-2017-7511</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7515/">CVE-2017-7515</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9406/">CVE-2017-9406</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9408/">CVE-2017-9408</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9775/">CVE-2017-9775</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9776/">CVE-2017-9776</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517940" comment="libpoppler-glib8-0.43.0-16.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517941" comment="libpoppler-qt4-4-0.43.0-16.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517942" comment="libpoppler60-0.43.0-16.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517943" comment="poppler-tools-0.43.0-16.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78180" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1004995" ref_url="https://bugzilla.suse.com/1004995" source="BUGZILLA"/>
		<reference ref_id="1029102" ref_url="https://bugzilla.suse.com/1029102" source="BUGZILLA"/>
		<reference ref_id="1029516" ref_url="https://bugzilla.suse.com/1029516" source="BUGZILLA"/>
		<reference ref_id="1032029" ref_url="https://bugzilla.suse.com/1032029" source="BUGZILLA"/>
		<reference ref_id="1033238" ref_url="https://bugzilla.suse.com/1033238" source="BUGZILLA"/>
		<reference ref_id="1036873" ref_url="https://bugzilla.suse.com/1036873" source="BUGZILLA"/>
		<reference ref_id="1037120" ref_url="https://bugzilla.suse.com/1037120" source="BUGZILLA"/>
		<reference ref_id="1038865" ref_url="https://bugzilla.suse.com/1038865" source="BUGZILLA"/>
		<reference ref_id="1040153" ref_url="https://bugzilla.suse.com/1040153" source="BUGZILLA"/>
		<reference ref_id="1040258" ref_url="https://bugzilla.suse.com/1040258" source="BUGZILLA"/>
		<reference ref_id="1040614" ref_url="https://bugzilla.suse.com/1040614" source="BUGZILLA"/>
		<reference ref_id="1040942" ref_url="https://bugzilla.suse.com/1040942" source="BUGZILLA"/>
		<reference ref_id="1040968" ref_url="https://bugzilla.suse.com/1040968" source="BUGZILLA"/>
		<reference ref_id="1043758" ref_url="https://bugzilla.suse.com/1043758" source="BUGZILLA"/>
		<reference ref_id="1043900" ref_url="https://bugzilla.suse.com/1043900" source="BUGZILLA"/>
		<reference ref_id="1045290" ref_url="https://bugzilla.suse.com/1045290" source="BUGZILLA"/>
		<reference ref_id="1046750" ref_url="https://bugzilla.suse.com/1046750" source="BUGZILLA"/>
		<reference ref_id="982303" ref_url="https://bugzilla.suse.com/982303" source="BUGZILLA"/>
		<reference ref_id="986216" ref_url="https://bugzilla.suse.com/986216" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9217" ref_url="https://www.suse.com/security/cve/CVE-2017-9217/" source="CVE"/>
		<reference ref_id="CVE-2017-9445" ref_url="https://www.suse.com/security/cve/CVE-2017-9445/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003077.html" source="SUSE-SU"/>
		<description>
This update for systemd provides several fixes and enhancements.

Security issues fixed:

- CVE-2017-9217: Null pointer dereferencing that could lead to resolved aborting. (bsc#1040614)
- CVE-2017-9445: Possible out-of-bounds write triggered by a specially crafted TCP payload
  from a DNS server. (bsc#1045290)

The update also fixed several non-security bugs:

- core/mount: Use the '-c' flag to not canonicalize paths when calling /bin/umount
- automount: Handle expire_tokens when the mount unit changes its state (bsc#1040942)
- automount: Rework propagation between automount and mount units
- build: Make sure tmpfiles.d/systemd-remote.conf get installed when necessary
- build: Fix systemd-journal-upload installation
- basic: Detect XEN Dom0 as no virtualization (bsc#1036873)
- virt: Make sure some errors are not ignored
- fstab-generator: Do not skip Before= ordering for noauto mountpoints
- fstab-gen: Do not convert device timeout into seconds when initializing JobTimeoutSec
- core/device: Use JobRunningTimeoutSec= for device units (bsc#1004995)
- fstab-generator: Apply the _netdev option also to device units (bsc#1004995)
- job: Add JobRunningTimeoutSec for JOB_RUNNING state (bsc#1004995)
- job: Ensure JobRunningTimeoutSec= survives serialization (bsc#1004995)
- rules: Export NVMe WWID udev attribute (bsc#1038865)
- rules: Introduce disk/by-id (model_serial) symbolic links for NVMe drives
- rules: Add rules for NVMe devices
- sysusers: Make group shadow support configurable (bsc#1029516)
- core: When deserializing a unit, fully restore its cgroup state (bsc#1029102)
- core: Introduce cg_mask_from_string()/cg_mask_to_string()
- core:execute: Fix handling failures of calling fork() in exec_spawn() (bsc#1040258)
- Fix systemd-sysv-convert when a package starts shipping service units (bsc#982303)
  The database might be missing when upgrading a package which was
  shipping no sysv init scripts nor unit files (at the time --save was
  called) but the new version start shipping unit files.
- Disable group shadow support (bsc#1029516)
- Only check signature job error if signature job exists (bsc#1043758)
- Automounter issue in combination with NFS volumes (bsc#1040968)
- Missing symbolic link for SAS device in /dev/disk/by-path (bsc#1040153)
- Add minimal support for boot.d/* scripts in systemd-sysv-convert (bsc#1046750)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-03"/>
	<updated date="2017-08-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1004995">SUSE bug 1004995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029102">SUSE bug 1029102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029516">SUSE bug 1029516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032029">SUSE bug 1032029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033238">SUSE bug 1033238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036873">SUSE bug 1036873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037120">SUSE bug 1037120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038865">SUSE bug 1038865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040153">SUSE bug 1040153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040258">SUSE bug 1040258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040614">SUSE bug 1040614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040942">SUSE bug 1040942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040968">SUSE bug 1040968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043758">SUSE bug 1043758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043900">SUSE bug 1043900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045290">SUSE bug 1045290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046750">SUSE bug 1046750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982303">SUSE bug 982303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986216">SUSE bug 986216</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9217/">CVE-2017-9217</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9445/">CVE-2017-9445</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519195" comment="libsystemd0-228-150.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519196" comment="libsystemd0-32bit-228-150.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519197" comment="libudev1-228-150.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519198" comment="libudev1-32bit-228-150.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519199" comment="systemd-228-150.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519200" comment="systemd-32bit-228-150.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519201" comment="systemd-bash-completion-228-150.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519202" comment="systemd-sysvinit-228-150.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519203" comment="udev-228-150.9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78181" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1048715" ref_url="https://bugzilla.suse.com/1048715" source="BUGZILLA"/>
		<reference ref_id="963041" ref_url="https://bugzilla.suse.com/963041" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3308" ref_url="https://www.suse.com/security/cve/CVE-2017-3308/" source="CVE"/>
		<reference ref_id="CVE-2017-3309" ref_url="https://www.suse.com/security/cve/CVE-2017-3309/" source="CVE"/>
		<reference ref_id="CVE-2017-3453" ref_url="https://www.suse.com/security/cve/CVE-2017-3453/" source="CVE"/>
		<reference ref_id="CVE-2017-3456" ref_url="https://www.suse.com/security/cve/CVE-2017-3456/" source="CVE"/>
		<reference ref_id="CVE-2017-3464" ref_url="https://www.suse.com/security/cve/CVE-2017-3464/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00000.html" source="SUSE-SU"/>
		<description>
This MariaDB update to version 10.0.31 GA fixes the following issues:

Security issues fixed:
- CVE-2017-3308: Subcomponent: Server: DML: Easily 'exploitable' vulnerability allows low
  privileged attacker with network access via multiple protocols to compromise MariaDB Server.
  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or
  frequently repeatable crash (complete DOS). (bsc#1048715)
- CVE-2017-3309: Subcomponent: Server: Optimizer: Easily 'exploitable' vulnerability allows low
  privileged attacker with network access via multiple protocols to compromise MariaDB Server.
  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or
  frequently repeatable crash (complete DOS). (bsc#1048715)
- CVE-2017-3453: Subcomponent: Server: Optimizer: Easily 'exploitable' vulnerability allows low
  privileged attacker with network access via multiple protocols to compromise MariaDB Server.
  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or
  frequently repeatable crash (complete DOS). (bsc#1048715)
- CVE-2017-3456: Subcomponent: Server: DML: Easily 'exploitable' vulnerability allows low
  privileged attacker with network access via multiple protocols to compromise MariaDB Server.
  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or
  frequently repeatable crash (complete DOS). (bsc#1048715)
- CVE-2017-3464: Subcomponent: Server: DDL: Easily 'exploitable' vulnerability allows low
  privileged attacker with network access via multiple protocols to compromise MariaDB Server.
  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or
  frequently repeatable crash (complete DOS). (bsc#1048715)

Bug fixes:
- switch from 'Restart=on-failure' to 'Restart=on-abort' in
  mysql.service in order to follow the upstream. It also fixes
  hanging mysql-systemd-helper when mariadb fails (e.g. because of
  the misconfiguration) (bsc#963041)
- XtraDB updated to 5.6.36-82.0
- TokuDB updated to 5.6.36-82.0
- Innodb updated to 5.6.36
- Performance Schema updated to 5.6.36

Release notes and changelog:
- https://kb.askmonty.org/en/mariadb-10031-release-notes
- https://kb.askmonty.org/en/mariadb-10031-changelog

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-03"/>
	<updated date="2017-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1048715">SUSE bug 1048715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963041">SUSE bug 963041</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3308/">CVE-2017-3308</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3309/">CVE-2017-3309</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3453/">CVE-2017-3453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3456/">CVE-2017-3456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3464/">CVE-2017-3464</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517951" comment="libmysqlclient18-10.0.31-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517952" comment="libmysqlclient18-32bit-10.0.31-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517953" comment="libmysqlclient_r18-10.0.31-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517954" comment="libmysqlclient_r18-32bit-10.0.31-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517955" comment="mariadb-10.0.31-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517956" comment="mariadb-client-10.0.31-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517957" comment="mariadb-errormessages-10.0.31-29.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78182" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1049255" ref_url="https://bugzilla.suse.com/1049255" source="BUGZILLA"/>
		<reference ref_id="1049621" ref_url="https://bugzilla.suse.com/1049621" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11406" ref_url="https://www.suse.com/security/cve/CVE-2017-11406/" source="CVE"/>
		<reference ref_id="CVE-2017-11407" ref_url="https://www.suse.com/security/cve/CVE-2017-11407/" source="CVE"/>
		<reference ref_id="CVE-2017-11408" ref_url="https://www.suse.com/security/cve/CVE-2017-11408/" source="CVE"/>
		<reference ref_id="CVE-2017-11410" ref_url="https://www.suse.com/security/cve/CVE-2017-11410/" source="CVE"/>
		<reference ref_id="CVE-2017-11411" ref_url="https://www.suse.com/security/cve/CVE-2017-11411/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003079.html" source="SUSE-SU"/>
		<description>
This wireshark update to version 2.2.8 fixes the following issues:

Security issues fixed:
- CVE-2017-11411: The openSAFETY dissectorcould crash or exhaust system memory because of missing
  length validation. (bsc#1049621)
- CVE-2017-11410: The WBXML dissector could go into an infinite loop. (bsc#1049255)
- CVE-2017-11408: The AMQP dissector could crash. (bsc#1049255)
- CVE-2017-11407: The MQ dissector could crash. (bsc#1049255)
- CVE-2017-11406: The DOCSIS dissector could go into an infinite loop. (bsc#1049255)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-03"/>
	<updated date="2017-08-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049255">SUSE bug 1049255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049621">SUSE bug 1049621</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11406/">CVE-2017-11406</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11407/">CVE-2017-11407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11408/">CVE-2017-11408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11410/">CVE-2017-11410</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11411/">CVE-2017-11411</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517958" comment="libwireshark8-2.2.8-48.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517959" comment="libwiretap6-2.2.8-48.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517960" comment="libwscodecs1-2.2.8-48.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517961" comment="libwsutil7-2.2.8-48.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517962" comment="wireshark-2.2.8-48.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517963" comment="wireshark-gtk-2.2.8-48.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78183" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1046853" ref_url="https://bugzilla.suse.com/1046853" source="BUGZILLA"/>
		<reference ref_id="1046858" ref_url="https://bugzilla.suse.com/1046858" source="BUGZILLA"/>
		<reference ref_id="1047964" ref_url="https://bugzilla.suse.com/1047964" source="BUGZILLA"/>
		<reference ref_id="1047965" ref_url="https://bugzilla.suse.com/1047965" source="BUGZILLA"/>
		<reference ref_id="1049344" ref_url="https://bugzilla.suse.com/1049344" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10684" ref_url="https://www.suse.com/security/cve/CVE-2017-10684/" source="CVE"/>
		<reference ref_id="CVE-2017-10685" ref_url="https://www.suse.com/security/cve/CVE-2017-10685/" source="CVE"/>
		<reference ref_id="CVE-2017-11112" ref_url="https://www.suse.com/security/cve/CVE-2017-11112/" source="CVE"/>
		<reference ref_id="CVE-2017-11113" ref_url="https://www.suse.com/security/cve/CVE-2017-11113/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003105.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:
- CVE-2017-11112: Illegal address access in append_acs. (bsc#1047964)
- CVE-2017-11113: Dereferencing NULL pointer in _nc_parse_entry. (bsc#1047965)
- CVE-2017-10684, CVE-2017-10685: Add modified upstream fix from ncurses 6.0 to avoid broken
  termcap format (bsc#1046853, bsc#1046858, bsc#1049344)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-07"/>
	<updated date="2017-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046853">SUSE bug 1046853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046858">SUSE bug 1046858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047964">SUSE bug 1047964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047965">SUSE bug 1047965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049344">SUSE bug 1049344</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10684/">CVE-2017-10684</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10685/">CVE-2017-10685</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11112/">CVE-2017-11112</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11113/">CVE-2017-11113</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517974" comment="libncurses5-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517975" comment="libncurses5-32bit-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517976" comment="libncurses6-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517977" comment="libncurses6-32bit-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517978" comment="ncurses-devel-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517979" comment="ncurses-utils-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517980" comment="tack-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517981" comment="terminfo-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517982" comment="terminfo-base-5.9-50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78184" version="1" class="patch">
	<metadata>
		<title>Security update for puppet (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1040151" ref_url="https://bugzilla.suse.com/1040151" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2295" ref_url="https://www.suse.com/security/cve/CVE-2017-2295/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00034.html" source="SUSE-SU"/>
		<description>
This update for puppet fixes the following issues:

Security issue fixed:
- CVE-2017-2295: Possible code execution vulnerability where an attacker could force YAML
  deserialization in an unsafe manner. In default, this update breaks a backwards compatibility
  with Puppet agents older than 3.2.2 as the SLE12 master doesn't support other fact formats than
  pson in default anymore.
  In order to allow users to continue using their SLE12 master/SLE11 agents setup and fix
  CVE-2017-2295 for the others, a new puppet master boolean option 'dangerous_fact_formats' was
  added. When it's set to true it enables using dangerous fact formats (e.g. YAML). When it's set
  to false, only PSON fact format is accepted. (bsc#1040151)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-09"/>
	<updated date="2017-08-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040151">SUSE bug 1040151</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2295/">CVE-2017-2295</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517996" comment="puppet-3.8.5-15.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78185" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1049607" ref_url="https://bugzilla.suse.com/1049607" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11464" ref_url="https://www.suse.com/security/cve/CVE-2017-11464/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003126.html" source="SUSE-SU"/>
		<description>
This update librsvg to version 2.40.18 fixes the following issues:

Security issue fixed:
- CVE-2017-11464: A SIGFPE is raised in the function box_blur_line of rsvg-filter.c. (bsc#1049607)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-09"/>
	<updated date="2017-08-09"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1049607">SUSE bug 1049607</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11464/">CVE-2017-11464</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517997" comment="gdk-pixbuf-loader-rsvg-2.40.18-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517998" comment="librsvg-2-2-2.40.18-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517999" comment="librsvg-2-2-32bit-2.40.18-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518000" comment="rsvg-view-2.40.18-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78186" version="1" class="patch">
	<metadata>
		<title>Security update for libsoup (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1052916" ref_url="https://bugzilla.suse.com/1052916" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2885" ref_url="https://www.suse.com/security/cve/CVE-2017-2885/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00037.html" source="SUSE-SU"/>
		<description>
This update for libsoup fixes the following issues:

- A bug in the HTTP Chunked Encoding code has been fixed that could have been
  exploited by attackers to cause a stack-based buffer overflow in client or
  server code running libsoup (bsc#1052916, CVE-2017-2885).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-10"/>
	<updated date="2017-08-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1052916">SUSE bug 1052916</bugzilla>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2885/">CVE-2017-2885</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518001" comment="libsoup-2_4-1-2.54.1-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518002" comment="libsoup-2_4-1-32bit-2.54.1-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518003" comment="libsoup-lang-2.54.1-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518004" comment="typelib-1_0-Soup-2_4-2.54.1-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78187" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1051222" ref_url="https://bugzilla.suse.com/1051222" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11185" ref_url="https://www.suse.com/security/cve/CVE-2017-11185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003132.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:


CVE-2017-11185: Specific RSA signatures passed to the gmp plugin for verification can
cause a null-pointer dereference and it may lead to a denial of service (bsc#1051222) 

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-11"/>
	<updated date="2017-08-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1051222">SUSE bug 1051222</bugzilla>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11185/">CVE-2017-11185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518012" comment="strongswan-5.1.3-26.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518013" comment="strongswan-doc-5.1.3-26.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518014" comment="strongswan-ipsec-5.1.3-26.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518015" comment="strongswan-libs0-5.1.3-26.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78188" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="979907" ref_url="https://bugzilla.suse.com/979907" source="BUGZILLA"/>
		<reference ref_id="997857" ref_url="https://bugzilla.suse.com/997857" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8871" ref_url="https://www.suse.com/security/cve/CVE-2015-8871/" source="CVE"/>
		<reference ref_id="CVE-2016-7163" ref_url="https://www.suse.com/security/cve/CVE-2016-7163/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003133.html" source="SUSE-SU"/>
		<description>
This update for openjpeg2 fixes the following issues:

- CVE 2016-7163: Integer Overflow could lead to remote code execution (bsc#997857).

- CVE 2015-8871: Use-after-free in opj_j2k_write_mco function could lead to denial of service (bsc#979907).


		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-11"/>
	<updated date="2017-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979907">SUSE bug 979907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997857">SUSE bug 997857</bugzilla>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-8871/">CVE-2015-8871</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7163/">CVE-2016-7163</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518016" comment="libopenjp2-7-2.1.0-4.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78189" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1038444" ref_url="https://bugzilla.suse.com/1038444" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8872" ref_url="https://www.suse.com/security/cve/CVE-2017-8872/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003130.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

Security issues fixed:
- CVE-2017-8872: Out-of-bounds read in htmlParseTryOrFinish. (bsc#1038444)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-11"/>
	<updated date="2017-08-11"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1038444">SUSE bug 1038444</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8872/">CVE-2017-8872</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518017" comment="libxml2-2-2.9.4-46.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518018" comment="libxml2-2-32bit-2.9.4-46.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518019" comment="libxml2-tools-2.9.4-46.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518020" comment="python-libxml2-2.9.4-46.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78190" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1051643" ref_url="https://bugzilla.suse.com/1051643" source="BUGZILLA"/>
		<reference ref_id="1051644" ref_url="https://bugzilla.suse.com/1051644" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000100" ref_url="https://www.suse.com/security/cve/CVE-2017-1000100/" source="CVE"/>
		<reference ref_id="CVE-2017-1000101" ref_url="https://www.suse.com/security/cve/CVE-2017-1000101/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003138.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2017-1000100: TFP sends more than buffer size and it could lead to a denial of service (bsc#1051644)
- CVE-2017-1000101: URL globbing out of bounds read could lead to a denial of service (bsc#1051643)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-16"/>
	<updated date="2017-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1051643">SUSE bug 1051643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051644">SUSE bug 1051644</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000100/">CVE-2017-1000100</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000101/">CVE-2017-1000101</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518021" comment="curl-7.37.0-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518022" comment="libcurl4-7.37.0-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518023" comment="libcurl4-32bit-7.37.0-37.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78191" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1049302" ref_url="https://bugzilla.suse.com/1049302" source="BUGZILLA"/>
		<reference ref_id="1049305" ref_url="https://bugzilla.suse.com/1049305" source="BUGZILLA"/>
		<reference ref_id="1049306" ref_url="https://bugzilla.suse.com/1049306" source="BUGZILLA"/>
		<reference ref_id="1049307" ref_url="https://bugzilla.suse.com/1049307" source="BUGZILLA"/>
		<reference ref_id="1049308" ref_url="https://bugzilla.suse.com/1049308" source="BUGZILLA"/>
		<reference ref_id="1049309" ref_url="https://bugzilla.suse.com/1049309" source="BUGZILLA"/>
		<reference ref_id="1049310" ref_url="https://bugzilla.suse.com/1049310" source="BUGZILLA"/>
		<reference ref_id="1049311" ref_url="https://bugzilla.suse.com/1049311" source="BUGZILLA"/>
		<reference ref_id="1049312" ref_url="https://bugzilla.suse.com/1049312" source="BUGZILLA"/>
		<reference ref_id="1049313" ref_url="https://bugzilla.suse.com/1049313" source="BUGZILLA"/>
		<reference ref_id="1049314" ref_url="https://bugzilla.suse.com/1049314" source="BUGZILLA"/>
		<reference ref_id="1049315" ref_url="https://bugzilla.suse.com/1049315" source="BUGZILLA"/>
		<reference ref_id="1049316" ref_url="https://bugzilla.suse.com/1049316" source="BUGZILLA"/>
		<reference ref_id="1049317" ref_url="https://bugzilla.suse.com/1049317" source="BUGZILLA"/>
		<reference ref_id="1049318" ref_url="https://bugzilla.suse.com/1049318" source="BUGZILLA"/>
		<reference ref_id="1049319" ref_url="https://bugzilla.suse.com/1049319" source="BUGZILLA"/>
		<reference ref_id="1049320" ref_url="https://bugzilla.suse.com/1049320" source="BUGZILLA"/>
		<reference ref_id="1049321" ref_url="https://bugzilla.suse.com/1049321" source="BUGZILLA"/>
		<reference ref_id="1049322" ref_url="https://bugzilla.suse.com/1049322" source="BUGZILLA"/>
		<reference ref_id="1049323" ref_url="https://bugzilla.suse.com/1049323" source="BUGZILLA"/>
		<reference ref_id="1049324" ref_url="https://bugzilla.suse.com/1049324" source="BUGZILLA"/>
		<reference ref_id="1049325" ref_url="https://bugzilla.suse.com/1049325" source="BUGZILLA"/>
		<reference ref_id="1049326" ref_url="https://bugzilla.suse.com/1049326" source="BUGZILLA"/>
		<reference ref_id="1049327" ref_url="https://bugzilla.suse.com/1049327" source="BUGZILLA"/>
		<reference ref_id="1049328" ref_url="https://bugzilla.suse.com/1049328" source="BUGZILLA"/>
		<reference ref_id="1049329" ref_url="https://bugzilla.suse.com/1049329" source="BUGZILLA"/>
		<reference ref_id="1049330" ref_url="https://bugzilla.suse.com/1049330" source="BUGZILLA"/>
		<reference ref_id="1049331" ref_url="https://bugzilla.suse.com/1049331" source="BUGZILLA"/>
		<reference ref_id="1049332" ref_url="https://bugzilla.suse.com/1049332" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10053" ref_url="https://www.suse.com/security/cve/CVE-2017-10053/" source="CVE"/>
		<reference ref_id="CVE-2017-10067" ref_url="https://www.suse.com/security/cve/CVE-2017-10067/" source="CVE"/>
		<reference ref_id="CVE-2017-10074" ref_url="https://www.suse.com/security/cve/CVE-2017-10074/" source="CVE"/>
		<reference ref_id="CVE-2017-10078" ref_url="https://www.suse.com/security/cve/CVE-2017-10078/" source="CVE"/>
		<reference ref_id="CVE-2017-10081" ref_url="https://www.suse.com/security/cve/CVE-2017-10081/" source="CVE"/>
		<reference ref_id="CVE-2017-10086" ref_url="https://www.suse.com/security/cve/CVE-2017-10086/" source="CVE"/>
		<reference ref_id="CVE-2017-10087" ref_url="https://www.suse.com/security/cve/CVE-2017-10087/" source="CVE"/>
		<reference ref_id="CVE-2017-10089" ref_url="https://www.suse.com/security/cve/CVE-2017-10089/" source="CVE"/>
		<reference ref_id="CVE-2017-10090" ref_url="https://www.suse.com/security/cve/CVE-2017-10090/" source="CVE"/>
		<reference ref_id="CVE-2017-10096" ref_url="https://www.suse.com/security/cve/CVE-2017-10096/" source="CVE"/>
		<reference ref_id="CVE-2017-10101" ref_url="https://www.suse.com/security/cve/CVE-2017-10101/" source="CVE"/>
		<reference ref_id="CVE-2017-10102" ref_url="https://www.suse.com/security/cve/CVE-2017-10102/" source="CVE"/>
		<reference ref_id="CVE-2017-10105" ref_url="https://www.suse.com/security/cve/CVE-2017-10105/" source="CVE"/>
		<reference ref_id="CVE-2017-10107" ref_url="https://www.suse.com/security/cve/CVE-2017-10107/" source="CVE"/>
		<reference ref_id="CVE-2017-10108" ref_url="https://www.suse.com/security/cve/CVE-2017-10108/" source="CVE"/>
		<reference ref_id="CVE-2017-10109" ref_url="https://www.suse.com/security/cve/CVE-2017-10109/" source="CVE"/>
		<reference ref_id="CVE-2017-10110" ref_url="https://www.suse.com/security/cve/CVE-2017-10110/" source="CVE"/>
		<reference ref_id="CVE-2017-10111" ref_url="https://www.suse.com/security/cve/CVE-2017-10111/" source="CVE"/>
		<reference ref_id="CVE-2017-10114" ref_url="https://www.suse.com/security/cve/CVE-2017-10114/" source="CVE"/>
		<reference ref_id="CVE-2017-10115" ref_url="https://www.suse.com/security/cve/CVE-2017-10115/" source="CVE"/>
		<reference ref_id="CVE-2017-10116" ref_url="https://www.suse.com/security/cve/CVE-2017-10116/" source="CVE"/>
		<reference ref_id="CVE-2017-10118" ref_url="https://www.suse.com/security/cve/CVE-2017-10118/" source="CVE"/>
		<reference ref_id="CVE-2017-10125" ref_url="https://www.suse.com/security/cve/CVE-2017-10125/" source="CVE"/>
		<reference ref_id="CVE-2017-10135" ref_url="https://www.suse.com/security/cve/CVE-2017-10135/" source="CVE"/>
		<reference ref_id="CVE-2017-10176" ref_url="https://www.suse.com/security/cve/CVE-2017-10176/" source="CVE"/>
		<reference ref_id="CVE-2017-10193" ref_url="https://www.suse.com/security/cve/CVE-2017-10193/" source="CVE"/>
		<reference ref_id="CVE-2017-10198" ref_url="https://www.suse.com/security/cve/CVE-2017-10198/" source="CVE"/>
		<reference ref_id="CVE-2017-10243" ref_url="https://www.suse.com/security/cve/CVE-2017-10243/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<description>
This java-1_8_0-openjdk update to version jdk8u141 (icedtea 3.5.0) fixes the following issues:

Security issues fixed:
- CVE-2017-10053: Improved image post-processing steps (bsc#1049305)
- CVE-2017-10067: Additional jar validation steps (bsc#1049306)
- CVE-2017-10074: Image conversion improvements (bsc#1049307)
- CVE-2017-10078: Better script accessibility for JavaScript (bsc#1049308)
- CVE-2017-10081: Right parenthesis issue (bsc#1049309)
- CVE-2017-10086: Unspecified vulnerability in subcomponent JavaFX (bsc#1049310)
- CVE-2017-10087: Better Thread Pool execution (bsc#1049311)
- CVE-2017-10089: Service Registration Lifecycle (bsc#1049312)
- CVE-2017-10090: Better handling of channel groups (bsc#1049313)
- CVE-2017-10096: Transform Transformer Exceptions (bsc#1049314)
- CVE-2017-10101: Better reading of text catalogs (bsc#1049315)
- CVE-2017-10102: Improved garbage collection (bsc#1049316)
- CVE-2017-10105: Unspecified vulnerability in subcomponent deployment (bsc#1049317)
- CVE-2017-10107: Less Active Activations (bsc#1049318)
- CVE-2017-10108: Better naming attribution (bsc#1049319)
- CVE-2017-10109: Better sourcing of code (bsc#1049320)
- CVE-2017-10110: Better image fetching (bsc#1049321)
- CVE-2017-10111: Rearrange MethodHandle arrangements (bsc#1049322)
- CVE-2017-10114: Unspecified vulnerability in subcomponent JavaFX (bsc#1049323)
- CVE-2017-10115: Higher quality DSA operations (bsc#1049324)
- CVE-2017-10116: Proper directory lookup processing (bsc#1049325)
- CVE-2017-10118: Higher quality ECDSA operations (bsc#1049326)
- CVE-2017-10125: Unspecified vulnerability in subcomponent deployment (bsc#1049327)
- CVE-2017-10135: Better handling of PKCS8 material (bsc#1049328)
- CVE-2017-10176: Additional elliptic curve support (bsc#1049329)
- CVE-2017-10193: Improve algorithm constraints implementation (bsc#1049330)
- CVE-2017-10198: Clear certificate chain connections (bsc#1049331)
- CVE-2017-10243: Unspecified vulnerability in subcomponent JAX-WS (bsc#1049332)

Bug fixes:
- Check registry registration location
- Improved certificate processing
- JMX diagnostic improvements
- Update to libpng 1.6.28
- Import of OpenJDK 8 u141 build 15 (bsc#1049302)

New features:
- Support using RSAandMGF1 with the SHA hash algorithms in the PKCS11 provider

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-16"/>
	<updated date="2017-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1049302">SUSE bug 1049302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049305">SUSE bug 1049305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049306">SUSE bug 1049306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049307">SUSE bug 1049307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049308">SUSE bug 1049308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049309">SUSE bug 1049309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049310">SUSE bug 1049310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049311">SUSE bug 1049311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049312">SUSE bug 1049312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049313">SUSE bug 1049313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049314">SUSE bug 1049314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049315">SUSE bug 1049315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049316">SUSE bug 1049316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049317">SUSE bug 1049317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049318">SUSE bug 1049318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049319">SUSE bug 1049319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049320">SUSE bug 1049320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049321">SUSE bug 1049321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049322">SUSE bug 1049322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049323">SUSE bug 1049323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049324">SUSE bug 1049324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049325">SUSE bug 1049325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049326">SUSE bug 1049326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049327">SUSE bug 1049327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049328">SUSE bug 1049328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049329">SUSE bug 1049329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049330">SUSE bug 1049330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049331">SUSE bug 1049331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049332">SUSE bug 1049332</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10053/">CVE-2017-10053</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10067/">CVE-2017-10067</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10074/">CVE-2017-10074</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10078/">CVE-2017-10078</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10081/">CVE-2017-10081</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10086/">CVE-2017-10086</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10087/">CVE-2017-10087</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10089/">CVE-2017-10089</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10090/">CVE-2017-10090</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10096/">CVE-2017-10096</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10101/">CVE-2017-10101</cve>
	<cve impact="important" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10102/">CVE-2017-10102</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10105/">CVE-2017-10105</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10107/">CVE-2017-10107</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10108/">CVE-2017-10108</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10109/">CVE-2017-10109</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10110/">CVE-2017-10110</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10111/">CVE-2017-10111</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10114/">CVE-2017-10114</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-10115/">CVE-2017-10115</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10116/">CVE-2017-10116</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10118/">CVE-2017-10118</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10125/">CVE-2017-10125</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10135/">CVE-2017-10135</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10176/">CVE-2017-10176</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10193/">CVE-2017-10193</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10198/">CVE-2017-10198</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10243/">CVE-2017-10243</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518024" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518025" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78192" version="1" class="patch">
	<metadata>
		<title>Security update for libplist (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1029638" ref_url="https://bugzilla.suse.com/1029638" source="BUGZILLA"/>
		<reference ref_id="1029639" ref_url="https://bugzilla.suse.com/1029639" source="BUGZILLA"/>
		<reference ref_id="1029706" ref_url="https://bugzilla.suse.com/1029706" source="BUGZILLA"/>
		<reference ref_id="1029707" ref_url="https://bugzilla.suse.com/1029707" source="BUGZILLA"/>
		<reference ref_id="1029751" ref_url="https://bugzilla.suse.com/1029751" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6435" ref_url="https://www.suse.com/security/cve/CVE-2017-6435/" source="CVE"/>
		<reference ref_id="CVE-2017-6436" ref_url="https://www.suse.com/security/cve/CVE-2017-6436/" source="CVE"/>
		<reference ref_id="CVE-2017-6437" ref_url="https://www.suse.com/security/cve/CVE-2017-6437/" source="CVE"/>
		<reference ref_id="CVE-2017-6438" ref_url="https://www.suse.com/security/cve/CVE-2017-6438/" source="CVE"/>
		<reference ref_id="CVE-2017-6439" ref_url="https://www.suse.com/security/cve/CVE-2017-6439/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003143.html" source="SUSE-SU"/>
		<description>
This update for libplist fixes the following issues:

Security issues fixed:

- CVE-2017-6439: Heap-based buffer overflow in the parse_string_node function. (bsc#1029638)
- CVE-2017-6438: Heap-based buffer overflow in the parse_unicode_node function. (bsc#1029706)
- CVE-2017-6437: The base64encode function in base64.c allows local users to cause denial of service
  (out-of-bounds read) via a crafted plist file. (bsc#1029707)
- CVE-2017-6436: Integer overflow in parse_string_node. (bsc#1029751)
- CVE-2017-6435: Crafted plist file could lead to Heap-buffer overflow. (bsc#1029639)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-17"/>
	<updated date="2017-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1029638">SUSE bug 1029638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029639">SUSE bug 1029639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029706">SUSE bug 1029706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029707">SUSE bug 1029707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029751">SUSE bug 1029751</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6435/">CVE-2017-6435</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6436/">CVE-2017-6436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6437/">CVE-2017-6437</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6438/">CVE-2017-6438</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6439/">CVE-2017-6439</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518026" comment="libplist++3-1.12-20.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518027" comment="libplist3-1.12-20.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78193" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1042812" ref_url="https://bugzilla.suse.com/1042812" source="BUGZILLA"/>
		<reference ref_id="1042826" ref_url="https://bugzilla.suse.com/1042826" source="BUGZILLA"/>
		<reference ref_id="1043289" ref_url="https://bugzilla.suse.com/1043289" source="BUGZILLA"/>
		<reference ref_id="1049072" ref_url="https://bugzilla.suse.com/1049072" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11403" ref_url="https://www.suse.com/security/cve/CVE-2017-11403/" source="CVE"/>
		<reference ref_id="CVE-2017-9439" ref_url="https://www.suse.com/security/cve/CVE-2017-9439/" source="CVE"/>
		<reference ref_id="CVE-2017-9440" ref_url="https://www.suse.com/security/cve/CVE-2017-9440/" source="CVE"/>
		<reference ref_id="CVE-2017-9501" ref_url="https://www.suse.com/security/cve/CVE-2017-9501/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00053.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:
- CVE-2017-9439: A memory leak was found in the function ReadPDBImage incoders/pdb.c (bsc#1042826)
- CVE-2017-9440: A memory leak was found in the function ReadPSDChannelin coders/psd.c (bsc#1042812)
- CVE-2017-9501: An assertion failure could cause a denial of service via a crafted file (bsc#1043289)
- CVE-2017-11403: ReadMNGImage function in coders/png.c has an out-of-order CloseBlob call, resulting
  in a use-after-free via acrafted file (bsc#1049072)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-17"/>
	<updated date="2017-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1042812">SUSE bug 1042812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042826">SUSE bug 1042826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043289">SUSE bug 1043289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049072">SUSE bug 1049072</bugzilla>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11403/">CVE-2017-11403</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9439/">CVE-2017-9439</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9440/">CVE-2017-9440</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9501/">CVE-2017-9501</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518028" comment="ImageMagick-6.8.8.1-71.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518029" comment="libMagick++-6_Q16-3-6.8.8.1-71.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518030" comment="libMagickCore-6_Q16-1-6.8.8.1-71.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518031" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518032" comment="libMagickWand-6_Q16-1-6.8.8.1-71.5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78194" version="1" class="patch">
	<metadata>
		<title>Security update for gnome-shell (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1008539" ref_url="https://bugzilla.suse.com/1008539" source="BUGZILLA"/>
		<reference ref_id="1034584" ref_url="https://bugzilla.suse.com/1034584" source="BUGZILLA"/>
		<reference ref_id="1034827" ref_url="https://bugzilla.suse.com/1034827" source="BUGZILLA"/>
		<reference ref_id="1036494" ref_url="https://bugzilla.suse.com/1036494" source="BUGZILLA"/>
		<reference ref_id="1047262" ref_url="https://bugzilla.suse.com/1047262" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8288" ref_url="https://www.suse.com/security/cve/CVE-2017-8288/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003146.html" source="SUSE-SU"/>
		<description>

This update for gnome-shell provides the following fixes:

- Fix not intuitive login screen for root user (bsc#1047262)
- Disable session selection button when it's hidden in user switch dialog (bsc#1034584, bsc#1034827)
- Fix app windows overlay app list in overview screen (bsc#1008539)
- Properly handle failures when loading extensions (bsc#1036494, CVE-2017-8288)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-18"/>
	<updated date="2017-08-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1008539">SUSE bug 1008539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034584">SUSE bug 1034584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034827">SUSE bug 1034827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036494">SUSE bug 1036494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047262">SUSE bug 1047262</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8288/">CVE-2017-8288</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518033" comment="gnome-shell-3.20.4-77.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518034" comment="gnome-shell-browser-plugin-3.20.4-77.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518035" comment="gnome-shell-calendar-3.20.4-77.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518036" comment="gnome-shell-lang-3.20.4-77.7.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78195" version="1" class="patch">
	<metadata>
		<title>Security update for freerdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1050699" ref_url="https://bugzilla.suse.com/1050699" source="BUGZILLA"/>
		<reference ref_id="1050704" ref_url="https://bugzilla.suse.com/1050704" source="BUGZILLA"/>
		<reference ref_id="1050708" ref_url="https://bugzilla.suse.com/1050708" source="BUGZILLA"/>
		<reference ref_id="1050711" ref_url="https://bugzilla.suse.com/1050711" source="BUGZILLA"/>
		<reference ref_id="1050712" ref_url="https://bugzilla.suse.com/1050712" source="BUGZILLA"/>
		<reference ref_id="1050714" ref_url="https://bugzilla.suse.com/1050714" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2834" ref_url="https://www.suse.com/security/cve/CVE-2017-2834/" source="CVE"/>
		<reference ref_id="CVE-2017-2835" ref_url="https://www.suse.com/security/cve/CVE-2017-2835/" source="CVE"/>
		<reference ref_id="CVE-2017-2836" ref_url="https://www.suse.com/security/cve/CVE-2017-2836/" source="CVE"/>
		<reference ref_id="CVE-2017-2837" ref_url="https://www.suse.com/security/cve/CVE-2017-2837/" source="CVE"/>
		<reference ref_id="CVE-2017-2838" ref_url="https://www.suse.com/security/cve/CVE-2017-2838/" source="CVE"/>
		<reference ref_id="CVE-2017-2839" ref_url="https://www.suse.com/security/cve/CVE-2017-2839/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00060.html" source="SUSE-SU"/>
		<description>
This update for freerdp fixes the following issues:

  - CVE-2017-2834: Out-of-bounds write in license_recv() (bsc#1050714)
    
  - CVE-2017-2835: Out-of-bounds write in rdp_recv_tpkt_pdu (bsc#1050712)
  
  - CVE-2017-2836: Rdp Client Read Server Proprietary Certificate Denial of Service (bsc#1050699)

  - CVE-2017-2837: Client GCC Read Server Security Data DoS (bsc#1050704)

  - CVE-2017-2838: Client License Read Product Info Denial of Service Vulnerability (bsc#1050708)

  - CVE-2017-2839: Client License Read Challenge Packet Denial of Service (bsc#1050711)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-22"/>
	<updated date="2017-08-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1050699">SUSE bug 1050699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050704">SUSE bug 1050704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050708">SUSE bug 1050708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050711">SUSE bug 1050711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050712">SUSE bug 1050712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050714">SUSE bug 1050714</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2834/">CVE-2017-2834</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2835/">CVE-2017-2835</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2836/">CVE-2017-2836</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2837/">CVE-2017-2837</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2838/">CVE-2017-2838</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2839/">CVE-2017-2839</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518037" comment="freerdp-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518038" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-12.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78196" version="1" class="patch">
	<metadata>
		<title>Security update for samba and resource-agents (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1048278" ref_url="https://bugzilla.suse.com/1048278" source="BUGZILLA"/>
		<reference ref_id="1048339" ref_url="https://bugzilla.suse.com/1048339" source="BUGZILLA"/>
		<reference ref_id="1048352" ref_url="https://bugzilla.suse.com/1048352" source="BUGZILLA"/>
		<reference ref_id="1048387" ref_url="https://bugzilla.suse.com/1048387" source="BUGZILLA"/>
		<reference ref_id="1048790" ref_url="https://bugzilla.suse.com/1048790" source="BUGZILLA"/>
		<reference ref_id="1052577" ref_url="https://bugzilla.suse.com/1052577" source="BUGZILLA"/>
		<reference ref_id="1054017" ref_url="https://bugzilla.suse.com/1054017" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11103" ref_url="https://www.suse.com/security/cve/CVE-2017-11103/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00063.html" source="SUSE-SU"/>
		<description>
This update provides Samba 4.6.7, which fixes the following issues:

- CVE-2017-11103: Metadata were being taken from the unauthenticated plaintext (the Ticket)
  rather than the authenticated and encrypted KDC response. (bsc#1048278)
- Fix cephwrap_chdir(). (bsc#1048790)
- Fix ctdb logs to /var/log/log.ctdb instead of /var/log/ctdb. (bsc#1048339)
- Fix inconsistent ctdb socket path. (bsc#1048352)
- Fix non-admin cephx authentication. (bsc#1048387)
- CTDB cannot start when there is no persistent database. (bsc#1052577)

The CTDB resource agent was also fixed to not fail when the database is empty.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-22"/>
	<updated date="2017-08-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1048278">SUSE bug 1048278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048339">SUSE bug 1048339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048352">SUSE bug 1048352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048387">SUSE bug 1048387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048790">SUSE bug 1048790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052577">SUSE bug 1052577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054017">SUSE bug 1054017</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-11103/">CVE-2017-11103</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519204" comment="libdcerpc-binding0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519205" comment="libdcerpc-binding0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519206" comment="libdcerpc0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519207" comment="libdcerpc0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519208" comment="libndr-krb5pac0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519209" comment="libndr-krb5pac0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519210" comment="libndr-nbt0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519211" comment="libndr-nbt0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519212" comment="libndr-standard0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519213" comment="libndr-standard0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519214" comment="libndr0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519215" comment="libndr0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519216" comment="libnetapi0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519217" comment="libnetapi0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519218" comment="libsamba-credentials0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519219" comment="libsamba-credentials0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519220" comment="libsamba-errors0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519221" comment="libsamba-errors0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519222" comment="libsamba-hostconfig0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519223" comment="libsamba-hostconfig0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519224" comment="libsamba-passdb0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519225" comment="libsamba-passdb0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519226" comment="libsamba-util0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519227" comment="libsamba-util0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519228" comment="libsamdb0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519229" comment="libsamdb0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519230" comment="libsmbclient0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519231" comment="libsmbclient0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519232" comment="libsmbconf0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519233" comment="libsmbconf0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519234" comment="libsmbldap0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519235" comment="libsmbldap0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519236" comment="libtevent-util0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519237" comment="libtevent-util0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519238" comment="libwbclient0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519239" comment="libwbclient0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519240" comment="samba-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519241" comment="samba-client-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519242" comment="samba-client-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519243" comment="samba-doc-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519244" comment="samba-libs-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519245" comment="samba-libs-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519246" comment="samba-winbind-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519247" comment="samba-winbind-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78197" version="1" class="patch">
	<metadata>
		<title>Security update for libzypp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1009745" ref_url="https://bugzilla.suse.com/1009745" source="BUGZILLA"/>
		<reference ref_id="1036659" ref_url="https://bugzilla.suse.com/1036659" source="BUGZILLA"/>
		<reference ref_id="1038984" ref_url="https://bugzilla.suse.com/1038984" source="BUGZILLA"/>
		<reference ref_id="1043218" ref_url="https://bugzilla.suse.com/1043218" source="BUGZILLA"/>
		<reference ref_id="1045735" ref_url="https://bugzilla.suse.com/1045735" source="BUGZILLA"/>
		<reference ref_id="1046417" ref_url="https://bugzilla.suse.com/1046417" source="BUGZILLA"/>
		<reference ref_id="1047785" ref_url="https://bugzilla.suse.com/1047785" source="BUGZILLA"/>
		<reference ref_id="1048315" ref_url="https://bugzilla.suse.com/1048315" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7435" ref_url="https://www.suse.com/security/cve/CVE-2017-7435/" source="CVE"/>
		<reference ref_id="CVE-2017-7436" ref_url="https://www.suse.com/security/cve/CVE-2017-7436/" source="CVE"/>
		<reference ref_id="CVE-2017-9269" ref_url="https://www.suse.com/security/cve/CVE-2017-9269/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00066.html" source="SUSE-SU"/>
		<description>
The Software Update Stack was updated to receive fixes and enhancements.


libzypp:

- CVE-2017-7435, CVE-2017-7436, CVE-2017-9269: Fix GPG check workflows, mainly for unsigned
  repositories and packages. (bsc#1045735, bsc#1038984)
- Fix gpg-pubkey release (creation time) computation. (bsc#1036659)
- Update lsof blacklist. (bsc#1046417)
- Re-probe on refresh if the repository type changes. (bsc#1048315)
- Propagate proper error code to DownloadProgressReport. (bsc#1047785)
- Allow to trigger an appdata refresh unconditionally. (bsc#1009745)
- Support custom repo variables defined in /etc/zypp/vars.d.

yast2-pkg-bindings:

- Do not crash when the repository URL is not defined. (bsc#1043218)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-25"/>
	<updated date="2017-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009745">SUSE bug 1009745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036659">SUSE bug 1036659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038984">SUSE bug 1038984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043218">SUSE bug 1043218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045735">SUSE bug 1045735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046417">SUSE bug 1046417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047785">SUSE bug 1047785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048315">SUSE bug 1048315</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7435/">CVE-2017-7435</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7436/">CVE-2017-7436</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2017-9269/">CVE-2017-9269</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519248" comment="libzypp-16.15.3-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519249" comment="yast2-pkg-bindings-3.2.4-2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78198" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1005778" ref_url="https://bugzilla.suse.com/1005778" source="BUGZILLA"/>
		<reference ref_id="1006180" ref_url="https://bugzilla.suse.com/1006180" source="BUGZILLA"/>
		<reference ref_id="1011913" ref_url="https://bugzilla.suse.com/1011913" source="BUGZILLA"/>
		<reference ref_id="1012829" ref_url="https://bugzilla.suse.com/1012829" source="BUGZILLA"/>
		<reference ref_id="1013887" ref_url="https://bugzilla.suse.com/1013887" source="BUGZILLA"/>
		<reference ref_id="1015337" ref_url="https://bugzilla.suse.com/1015337" source="BUGZILLA"/>
		<reference ref_id="1015342" ref_url="https://bugzilla.suse.com/1015342" source="BUGZILLA"/>
		<reference ref_id="1016119" ref_url="https://bugzilla.suse.com/1016119" source="BUGZILLA"/>
		<reference ref_id="1019151" ref_url="https://bugzilla.suse.com/1019151" source="BUGZILLA"/>
		<reference ref_id="1019695" ref_url="https://bugzilla.suse.com/1019695" source="BUGZILLA"/>
		<reference ref_id="1020645" ref_url="https://bugzilla.suse.com/1020645" source="BUGZILLA"/>
		<reference ref_id="1022476" ref_url="https://bugzilla.suse.com/1022476" source="BUGZILLA"/>
		<reference ref_id="1022600" ref_url="https://bugzilla.suse.com/1022600" source="BUGZILLA"/>
		<reference ref_id="1022604" ref_url="https://bugzilla.suse.com/1022604" source="BUGZILLA"/>
		<reference ref_id="1023175" ref_url="https://bugzilla.suse.com/1023175" source="BUGZILLA"/>
		<reference ref_id="1024346" ref_url="https://bugzilla.suse.com/1024346" source="BUGZILLA"/>
		<reference ref_id="1024373" ref_url="https://bugzilla.suse.com/1024373" source="BUGZILLA"/>
		<reference ref_id="1025461" ref_url="https://bugzilla.suse.com/1025461" source="BUGZILLA"/>
		<reference ref_id="1026570" ref_url="https://bugzilla.suse.com/1026570" source="BUGZILLA"/>
		<reference ref_id="1028173" ref_url="https://bugzilla.suse.com/1028173" source="BUGZILLA"/>
		<reference ref_id="1028286" ref_url="https://bugzilla.suse.com/1028286" source="BUGZILLA"/>
		<reference ref_id="1029693" ref_url="https://bugzilla.suse.com/1029693" source="BUGZILLA"/>
		<reference ref_id="1030552" ref_url="https://bugzilla.suse.com/1030552" source="BUGZILLA"/>
		<reference ref_id="1031515" ref_url="https://bugzilla.suse.com/1031515" source="BUGZILLA"/>
		<reference ref_id="1031717" ref_url="https://bugzilla.suse.com/1031717" source="BUGZILLA"/>
		<reference ref_id="1031784" ref_url="https://bugzilla.suse.com/1031784" source="BUGZILLA"/>
		<reference ref_id="1033587" ref_url="https://bugzilla.suse.com/1033587" source="BUGZILLA"/>
		<reference ref_id="1034075" ref_url="https://bugzilla.suse.com/1034075" source="BUGZILLA"/>
		<reference ref_id="1034113" ref_url="https://bugzilla.suse.com/1034113" source="BUGZILLA"/>
		<reference ref_id="1034762" ref_url="https://bugzilla.suse.com/1034762" source="BUGZILLA"/>
		<reference ref_id="1036215" ref_url="https://bugzilla.suse.com/1036215" source="BUGZILLA"/>
		<reference ref_id="1036632" ref_url="https://bugzilla.suse.com/1036632" source="BUGZILLA"/>
		<reference ref_id="1037344" ref_url="https://bugzilla.suse.com/1037344" source="BUGZILLA"/>
		<reference ref_id="1037404" ref_url="https://bugzilla.suse.com/1037404" source="BUGZILLA"/>
		<reference ref_id="1037838" ref_url="https://bugzilla.suse.com/1037838" source="BUGZILLA"/>
		<reference ref_id="1037994" ref_url="https://bugzilla.suse.com/1037994" source="BUGZILLA"/>
		<reference ref_id="1038078" ref_url="https://bugzilla.suse.com/1038078" source="BUGZILLA"/>
		<reference ref_id="1038616" ref_url="https://bugzilla.suse.com/1038616" source="BUGZILLA"/>
		<reference ref_id="1038792" ref_url="https://bugzilla.suse.com/1038792" source="BUGZILLA"/>
		<reference ref_id="1039153" ref_url="https://bugzilla.suse.com/1039153" source="BUGZILLA"/>
		<reference ref_id="1039348" ref_url="https://bugzilla.suse.com/1039348" source="BUGZILLA"/>
		<reference ref_id="1039915" ref_url="https://bugzilla.suse.com/1039915" source="BUGZILLA"/>
		<reference ref_id="1040307" ref_url="https://bugzilla.suse.com/1040307" source="BUGZILLA"/>
		<reference ref_id="1040347" ref_url="https://bugzilla.suse.com/1040347" source="BUGZILLA"/>
		<reference ref_id="1040351" ref_url="https://bugzilla.suse.com/1040351" source="BUGZILLA"/>
		<reference ref_id="1041958" ref_url="https://bugzilla.suse.com/1041958" source="BUGZILLA"/>
		<reference ref_id="1042257" ref_url="https://bugzilla.suse.com/1042257" source="BUGZILLA"/>
		<reference ref_id="1042286" ref_url="https://bugzilla.suse.com/1042286" source="BUGZILLA"/>
		<reference ref_id="1042314" ref_url="https://bugzilla.suse.com/1042314" source="BUGZILLA"/>
		<reference ref_id="1042422" ref_url="https://bugzilla.suse.com/1042422" source="BUGZILLA"/>
		<reference ref_id="1042778" ref_url="https://bugzilla.suse.com/1042778" source="BUGZILLA"/>
		<reference ref_id="1043261" ref_url="https://bugzilla.suse.com/1043261" source="BUGZILLA"/>
		<reference ref_id="1043347" ref_url="https://bugzilla.suse.com/1043347" source="BUGZILLA"/>
		<reference ref_id="1043520" ref_url="https://bugzilla.suse.com/1043520" source="BUGZILLA"/>
		<reference ref_id="1043598" ref_url="https://bugzilla.suse.com/1043598" source="BUGZILLA"/>
		<reference ref_id="1043652" ref_url="https://bugzilla.suse.com/1043652" source="BUGZILLA"/>
		<reference ref_id="1043805" ref_url="https://bugzilla.suse.com/1043805" source="BUGZILLA"/>
		<reference ref_id="1043912" ref_url="https://bugzilla.suse.com/1043912" source="BUGZILLA"/>
		<reference ref_id="1044112" ref_url="https://bugzilla.suse.com/1044112" source="BUGZILLA"/>
		<reference ref_id="1044443" ref_url="https://bugzilla.suse.com/1044443" source="BUGZILLA"/>
		<reference ref_id="1044623" ref_url="https://bugzilla.suse.com/1044623" source="BUGZILLA"/>
		<reference ref_id="1044636" ref_url="https://bugzilla.suse.com/1044636" source="BUGZILLA"/>
		<reference ref_id="1045154" ref_url="https://bugzilla.suse.com/1045154" source="BUGZILLA"/>
		<reference ref_id="1045293" ref_url="https://bugzilla.suse.com/1045293" source="BUGZILLA"/>
		<reference ref_id="1045330" ref_url="https://bugzilla.suse.com/1045330" source="BUGZILLA"/>
		<reference ref_id="1045404" ref_url="https://bugzilla.suse.com/1045404" source="BUGZILLA"/>
		<reference ref_id="1045563" ref_url="https://bugzilla.suse.com/1045563" source="BUGZILLA"/>
		<reference ref_id="1045596" ref_url="https://bugzilla.suse.com/1045596" source="BUGZILLA"/>
		<reference ref_id="1045709" ref_url="https://bugzilla.suse.com/1045709" source="BUGZILLA"/>
		<reference ref_id="1045715" ref_url="https://bugzilla.suse.com/1045715" source="BUGZILLA"/>
		<reference ref_id="1045866" ref_url="https://bugzilla.suse.com/1045866" source="BUGZILLA"/>
		<reference ref_id="1045922" ref_url="https://bugzilla.suse.com/1045922" source="BUGZILLA"/>
		<reference ref_id="1045937" ref_url="https://bugzilla.suse.com/1045937" source="BUGZILLA"/>
		<reference ref_id="1046105" ref_url="https://bugzilla.suse.com/1046105" source="BUGZILLA"/>
		<reference ref_id="1046170" ref_url="https://bugzilla.suse.com/1046170" source="BUGZILLA"/>
		<reference ref_id="1046434" ref_url="https://bugzilla.suse.com/1046434" source="BUGZILLA"/>
		<reference ref_id="1046651" ref_url="https://bugzilla.suse.com/1046651" source="BUGZILLA"/>
		<reference ref_id="1046655" ref_url="https://bugzilla.suse.com/1046655" source="BUGZILLA"/>
		<reference ref_id="1046682" ref_url="https://bugzilla.suse.com/1046682" source="BUGZILLA"/>
		<reference ref_id="1046821" ref_url="https://bugzilla.suse.com/1046821" source="BUGZILLA"/>
		<reference ref_id="1046985" ref_url="https://bugzilla.suse.com/1046985" source="BUGZILLA"/>
		<reference ref_id="1047027" ref_url="https://bugzilla.suse.com/1047027" source="BUGZILLA"/>
		<reference ref_id="1047048" ref_url="https://bugzilla.suse.com/1047048" source="BUGZILLA"/>
		<reference ref_id="1047096" ref_url="https://bugzilla.suse.com/1047096" source="BUGZILLA"/>
		<reference ref_id="1047118" ref_url="https://bugzilla.suse.com/1047118" source="BUGZILLA"/>
		<reference ref_id="1047121" ref_url="https://bugzilla.suse.com/1047121" source="BUGZILLA"/>
		<reference ref_id="1047152" ref_url="https://bugzilla.suse.com/1047152" source="BUGZILLA"/>
		<reference ref_id="1047174" ref_url="https://bugzilla.suse.com/1047174" source="BUGZILLA"/>
		<reference ref_id="1047277" ref_url="https://bugzilla.suse.com/1047277" source="BUGZILLA"/>
		<reference ref_id="1047343" ref_url="https://bugzilla.suse.com/1047343" source="BUGZILLA"/>
		<reference ref_id="1047354" ref_url="https://bugzilla.suse.com/1047354" source="BUGZILLA"/>
		<reference ref_id="1047418" ref_url="https://bugzilla.suse.com/1047418" source="BUGZILLA"/>
		<reference ref_id="1047506" ref_url="https://bugzilla.suse.com/1047506" source="BUGZILLA"/>
		<reference ref_id="1047595" ref_url="https://bugzilla.suse.com/1047595" source="BUGZILLA"/>
		<reference ref_id="1047651" ref_url="https://bugzilla.suse.com/1047651" source="BUGZILLA"/>
		<reference ref_id="1047653" ref_url="https://bugzilla.suse.com/1047653" source="BUGZILLA"/>
		<reference ref_id="1047670" ref_url="https://bugzilla.suse.com/1047670" source="BUGZILLA"/>
		<reference ref_id="1047802" ref_url="https://bugzilla.suse.com/1047802" source="BUGZILLA"/>
		<reference ref_id="1048146" ref_url="https://bugzilla.suse.com/1048146" source="BUGZILLA"/>
		<reference ref_id="1048155" ref_url="https://bugzilla.suse.com/1048155" source="BUGZILLA"/>
		<reference ref_id="1048221" ref_url="https://bugzilla.suse.com/1048221" source="BUGZILLA"/>
		<reference ref_id="1048317" ref_url="https://bugzilla.suse.com/1048317" source="BUGZILLA"/>
		<reference ref_id="1048348" ref_url="https://bugzilla.suse.com/1048348" source="BUGZILLA"/>
		<reference ref_id="1048356" ref_url="https://bugzilla.suse.com/1048356" source="BUGZILLA"/>
		<reference ref_id="1048421" ref_url="https://bugzilla.suse.com/1048421" source="BUGZILLA"/>
		<reference ref_id="1048451" ref_url="https://bugzilla.suse.com/1048451" source="BUGZILLA"/>
		<reference ref_id="1048501" ref_url="https://bugzilla.suse.com/1048501" source="BUGZILLA"/>
		<reference ref_id="1048891" ref_url="https://bugzilla.suse.com/1048891" source="BUGZILLA"/>
		<reference ref_id="1048912" ref_url="https://bugzilla.suse.com/1048912" source="BUGZILLA"/>
		<reference ref_id="1048914" ref_url="https://bugzilla.suse.com/1048914" source="BUGZILLA"/>
		<reference ref_id="1048916" ref_url="https://bugzilla.suse.com/1048916" source="BUGZILLA"/>
		<reference ref_id="1048919" ref_url="https://bugzilla.suse.com/1048919" source="BUGZILLA"/>
		<reference ref_id="1049231" ref_url="https://bugzilla.suse.com/1049231" source="BUGZILLA"/>
		<reference ref_id="1049289" ref_url="https://bugzilla.suse.com/1049289" source="BUGZILLA"/>
		<reference ref_id="1049298" ref_url="https://bugzilla.suse.com/1049298" source="BUGZILLA"/>
		<reference ref_id="1049361" ref_url="https://bugzilla.suse.com/1049361" source="BUGZILLA"/>
		<reference ref_id="1049483" ref_url="https://bugzilla.suse.com/1049483" source="BUGZILLA"/>
		<reference ref_id="1049486" ref_url="https://bugzilla.suse.com/1049486" source="BUGZILLA"/>
		<reference ref_id="1049603" ref_url="https://bugzilla.suse.com/1049603" source="BUGZILLA"/>
		<reference ref_id="1049619" ref_url="https://bugzilla.suse.com/1049619" source="BUGZILLA"/>
		<reference ref_id="1049645" ref_url="https://bugzilla.suse.com/1049645" source="BUGZILLA"/>
		<reference ref_id="1049706" ref_url="https://bugzilla.suse.com/1049706" source="BUGZILLA"/>
		<reference ref_id="1049882" ref_url="https://bugzilla.suse.com/1049882" source="BUGZILLA"/>
		<reference ref_id="1050061" ref_url="https://bugzilla.suse.com/1050061" source="BUGZILLA"/>
		<reference ref_id="1050188" ref_url="https://bugzilla.suse.com/1050188" source="BUGZILLA"/>
		<reference ref_id="1050211" ref_url="https://bugzilla.suse.com/1050211" source="BUGZILLA"/>
		<reference ref_id="1050320" ref_url="https://bugzilla.suse.com/1050320" source="BUGZILLA"/>
		<reference ref_id="1050322" ref_url="https://bugzilla.suse.com/1050322" source="BUGZILLA"/>
		<reference ref_id="1050677" ref_url="https://bugzilla.suse.com/1050677" source="BUGZILLA"/>
		<reference ref_id="1051022" ref_url="https://bugzilla.suse.com/1051022" source="BUGZILLA"/>
		<reference ref_id="1051048" ref_url="https://bugzilla.suse.com/1051048" source="BUGZILLA"/>
		<reference ref_id="1051059" ref_url="https://bugzilla.suse.com/1051059" source="BUGZILLA"/>
		<reference ref_id="1051239" ref_url="https://bugzilla.suse.com/1051239" source="BUGZILLA"/>
		<reference ref_id="1051399" ref_url="https://bugzilla.suse.com/1051399" source="BUGZILLA"/>
		<reference ref_id="1051471" ref_url="https://bugzilla.suse.com/1051471" source="BUGZILLA"/>
		<reference ref_id="1051478" ref_url="https://bugzilla.suse.com/1051478" source="BUGZILLA"/>
		<reference ref_id="1051479" ref_url="https://bugzilla.suse.com/1051479" source="BUGZILLA"/>
		<reference ref_id="1051556" ref_url="https://bugzilla.suse.com/1051556" source="BUGZILLA"/>
		<reference ref_id="1051663" ref_url="https://bugzilla.suse.com/1051663" source="BUGZILLA"/>
		<reference ref_id="1051689" ref_url="https://bugzilla.suse.com/1051689" source="BUGZILLA"/>
		<reference ref_id="1051979" ref_url="https://bugzilla.suse.com/1051979" source="BUGZILLA"/>
		<reference ref_id="1052049" ref_url="https://bugzilla.suse.com/1052049" source="BUGZILLA"/>
		<reference ref_id="1052223" ref_url="https://bugzilla.suse.com/1052223" source="BUGZILLA"/>
		<reference ref_id="1052311" ref_url="https://bugzilla.suse.com/1052311" source="BUGZILLA"/>
		<reference ref_id="1052325" ref_url="https://bugzilla.suse.com/1052325" source="BUGZILLA"/>
		<reference ref_id="1052365" ref_url="https://bugzilla.suse.com/1052365" source="BUGZILLA"/>
		<reference ref_id="1052442" ref_url="https://bugzilla.suse.com/1052442" source="BUGZILLA"/>
		<reference ref_id="1052533" ref_url="https://bugzilla.suse.com/1052533" source="BUGZILLA"/>
		<reference ref_id="1052709" ref_url="https://bugzilla.suse.com/1052709" source="BUGZILLA"/>
		<reference ref_id="1052773" ref_url="https://bugzilla.suse.com/1052773" source="BUGZILLA"/>
		<reference ref_id="1052794" ref_url="https://bugzilla.suse.com/1052794" source="BUGZILLA"/>
		<reference ref_id="1052899" ref_url="https://bugzilla.suse.com/1052899" source="BUGZILLA"/>
		<reference ref_id="1052925" ref_url="https://bugzilla.suse.com/1052925" source="BUGZILLA"/>
		<reference ref_id="1053043" ref_url="https://bugzilla.suse.com/1053043" source="BUGZILLA"/>
		<reference ref_id="1053117" ref_url="https://bugzilla.suse.com/1053117" source="BUGZILLA"/>
		<reference ref_id="964063" ref_url="https://bugzilla.suse.com/964063" source="BUGZILLA"/>
		<reference ref_id="974215" ref_url="https://bugzilla.suse.com/974215" source="BUGZILLA"/>
		<reference ref_id="998664" ref_url="https://bugzilla.suse.com/998664" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000111" ref_url="https://www.suse.com/security/cve/CVE-2017-1000111/" source="CVE"/>
		<reference ref_id="CVE-2017-1000112" ref_url="https://www.suse.com/security/cve/CVE-2017-1000112/" source="CVE"/>
		<reference ref_id="CVE-2017-10810" ref_url="https://www.suse.com/security/cve/CVE-2017-10810/" source="CVE"/>
		<reference ref_id="CVE-2017-11473" ref_url="https://www.suse.com/security/cve/CVE-2017-11473/" source="CVE"/>
		<reference ref_id="CVE-2017-7533" ref_url="https://www.suse.com/security/cve/CVE-2017-7533/" source="CVE"/>
		<reference ref_id="CVE-2017-7541" ref_url="https://www.suse.com/security/cve/CVE-2017-7541/" source="CVE"/>
		<reference ref_id="CVE-2017-7542" ref_url="https://www.suse.com/security/cve/CVE-2017-7542/" source="CVE"/>
		<reference ref_id="CVE-2017-8831" ref_url="https://www.suse.com/security/cve/CVE-2017-8831/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00071.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.82 to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2017-1000111: Fixed a race condition in net-packet code that could be exploited to cause out-of-bounds memory access (bsc#1052365).
- CVE-2017-1000112: Fixed a race condition in net-packet code that could have been exploited by unprivileged users to gain root access. (bsc#1052311).
- CVE-2017-8831: The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a 'double fetch' vulnerability (bnc#1037994).
- CVE-2017-7542: The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel allowed local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket (bnc#1049882).
- CVE-2017-11473: Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel allowed local users to gain privileges via a crafted ACPI table (bnc#1049603).
- CVE-2017-7533: Race condition in the fsnotify implementation in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions (bnc#1049483 bnc#1050677).
- CVE-2017-7541: The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel allowed local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet (bnc#1049645).
- CVE-2017-10810: Memory leak in the virtio_gpu_object_create function in drivers/gpu/drm/virtio/virtgpu_object.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering object-initialization failures (bnc#1047277).

The following non-security bugs were fixed:

- acpi/nfit: Add support of NVDIMM memory error notification in ACPI 6.2 (bsc#1052325).
- acpi/nfit: Issue Start ARS to retrieve existing records (bsc#1052325).
- acpi / processor: Avoid reserving IO regions too early (bsc#1051478).
- acpi / scan: Prefer devices without _HID for _ADR matching (git-fixes).
- Add 'shutdown' to 'struct class' (bsc#1053117).
- af_key: Add lock to key dump (bsc#1047653).
- af_key: Fix slab-out-of-bounds in pfkey_compile_policy (bsc#1047354).
- alsa: fm801: Initialize chip after IRQ handler is registered (bsc#1031717).
- alsa: hda - add more ML register definitions (bsc#1048356).
- alsa: hda - add sanity check to force the separate stream tags (bsc#1048356).
- alsa: hda: Add support for parsing new HDA capabilities (bsc#1048356).
- alsa: hdac: Add support for hda DMA Resume capability (bsc#1048356).
- alsa: hdac_regmap - fix the register access for runtime PM (bsc#1048356).
- alsa: hda: Fix cpu lockup when stopping the cmd dmas (bsc#1048356).
- alsa: hda - Fix endless loop of codec configure (bsc#1031717).
- alsa: hda: fix to wait for RIRB &amp; CORB DMA to set (bsc#1048356).
- alsa: hda - Loop interrupt handling until really cleared (bsc#1048356).
- alsa: hda - move bus_parse_capabilities to core (bsc#1048356).
- alsa: hda - set input_path bitmap to zero after moving it to new place (bsc#1031717).
- alsa: hda - set intel audio clock to a proper value (bsc#1048356).
- arm64: kernel: restrict /dev/mem read() calls to linear region (bsc#1046651).
- arm64: mm: remove page_mapping check in __sync_icache_dcache (bsc#1040347).
- arm64: Update config files. Disable DEVKMEM
- b43: Add missing MODULE_FIRMWARE() (bsc#1037344).
- bcache: force trigger gc (bsc#1038078).
- bcache: only recovery I/O error for writethrough mode (bsc#1043652).
- bcache: only recovery I/O error for writethrough mode (bsc#1043652).
- bdi: Fix use-after-free in wb_congested_put() (bsc#1040307).
- blacklist.conf: 9eeacd3a2f17 not a bug fix (bnc#1050061)
- blacklist.conf: add inapplicable commits for wifi (bsc#1031717)
- blacklist.conf: add non-applicable fixes for iwlwifi (FATE#323335)
- blacklist.conf: add unapplicable/cosmetic iwlwifi fixes (bsc#1031717).
- blacklist.conf: add unapplicable drm fixes (bsc#1031717).
- blacklist.conf: Blacklist aa2369f11ff7 ('mm/gup.c: fix access_ok() argument type') (bsc#1051478) Fixes only a compile-warning.
- blacklist.conf: Blacklist c133c7615751 ('x86/nmi: Fix timeout test in test_nmi_ipi()') It only fixes a self-test (bsc#1051478).
- blacklist.conf: Blacklist c9525a3fab63 ('x86/watchdog: Fix Kconfig help text file path reference to lockup watchdog documentation') Updates only kconfig help-text (bsc#1051478).
- blkfront: add uevent for size change (bnc#1036632).
- blk-mq: map all HWQ also in hyperthreaded system (bsc#1045866).
- block: add kblock_mod_delayed_work_on() (bsc#1050211).
- block: Allow bdi re-registration (bsc#1040307).
- block: do not allow updates through sysfs until registration completes (bsc#1047027).
- block: Fix front merge check (bsc#1051239).
- block: Make blk_mq_delay_kick_requeue_list() rerun the queue at a quiet time (bsc#1050211).
- block: Make del_gendisk() safer for disks without queues (bsc#1040307).
- block: Move bdi_unregister() to del_gendisk() (bsc#1040307).
- block: provide bio_uninit() free freeing integrity/task associations (bsc#1050211).
- bluetooth: hidp: fix possible might sleep error in hidp_session_thread (bsc#1031784).
- brcmfmac: Fix glom_skb leak in brcmf_sdiod_recv_chain (bsc#1031717).
- btrfs: add cond_resched to btrfs_qgroup_trace_leaf_items (bsc#1028286).
- btrfs: Add WARN_ON for qgroup reserved underflow (bsc#1031515).
- btrfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- btrfs: fix lockup in find_free_extent with read-only block groups (bsc#1046682).
- btrfs: incremental send, fix invalid path for link commands (bsc#1051479).
- btrfs: incremental send, fix invalid path for unlink commands (bsc#1051479).
- btrfs: Manually implement device_total_bytes getter/setter (bsc#1043912).
- btrfs: resume qgroup rescan on rw remount (bsc#1047152).
- btrfs: Round down values which are written for total_bytes_size (bsc#1043912).
- btrfs: send, fix invalid path after renaming and linking file (bsc#1051479).
- cifs: Fix some return values in case of error in 'crypt_message' (bnc#1047802).
- clocksource/drivers/arm_arch_timer: Fix read and iounmap of incorrect variable (bsc#1045937).
- cpuidle: dt: Add missing 'of_node_put()' (bnc#1022476).
- crypto: s5p-sss - fix incorrect usage of scatterlists api (bsc#1048317).
- cx82310_eth: use skb_cow_head() to deal with cloned skbs (bsc# 1045154).
- cxgb4: fix a NULL dereference (bsc#1005778).
- cxgb4: fix BUG() on interrupt deallocating path of ULD (bsc#1005778).
- cxgb4: fix memory leak in init_one() (bsc#1005778).
- cxl: Unlock on error in probe (bsc#1034762, Pending SUSE Kernel Fixes).
- dentry name snapshots (bsc#1049483).
- device-dax: fix sysfs attribute deadlock (bsc#1048919).
- dm: fix second blk_delay_queue() parameter to be in msec units not (bsc#1047670).
- dm: make flush bios explicitly sync (bsc#1050211).
- dm raid1: fixes two crash cases if mirror leg failed (bsc#1043520)
- drivers/char: kmem: disable on arm64 (bsc#1046655).
- drivers: hv: As a bandaid, increase HV_UTIL_TIMEOUT from 30 to 60 seconds (bnc#1039153)
- drivers: hv: Fix a typo (fate#320485).
- drivers: hv: Fix the bug in generating the guest ID (fate#320485).
- drivers: hv: util: Fix a typo (fate#320485).
- drivers: hv: util: Make hv_poll_channel() a little more efficient (fate#320485).
- drivers: hv: vmbus: Close timing hole that can corrupt per-cpu page (fate#320485).
- drivers: hv: vmbus: Fix error code returned by vmbus_post_msg() (fate#320485).
- drivers: hv: vmbus: Get the current time from the current clocksource (fate#320485, bnc#1044112).
- drivers: hv: vmbus: Get the current time from the current clocksource (fate#320485, bnc#1044112, bnc#1042778, bnc#1029693).
- drivers: hv: vmbus: Increase the time between retries in vmbus_post_msg() (fate#320485, bnc#1044112).
- drivers: hv: vmbus: Increase the time between retries in vmbus_post_msg() (fate#320485, bnc#1044112).
- drivers: hv: vmbus: Move the code to signal end of message (fate#320485).
- drivers: hv: vmbus: Move the definition of generate_guest_id() (fate#320485).
- drivers: hv: vmbus: Move the definition of hv_x64_msr_hypercall_contents (fate#320485).
- drivers: hv: vmbus: Restructure the clockevents code (fate#320485).
- drm/amdgpu: Fix overflow of watermark calcs at &gt; 4k resolutions (bsc#1031717).
- drm/bochs: Implement nomodeset (bsc#1047096).
- drm/i915/fbdev: Stop repeating tile configuration on stagnation (bsc#1031717).
- drm/i915: Fix scaler init during CRTC HW state readout (bsc#1031717).
- drm/i915: Serialize GTT/Aperture accesses on BXT (bsc#1046821).
- drm/virtio: do not leak bo on drm_gem_object_init failure (bsc#1047277).
- drm/vmwgfx: Fix large topology crash (bsc#1048155).
- drm/vmwgfx: Support topology greater than texture size (bsc#1048155).
- Drop patches; obsoleted by 'scsi: Add STARGET_CREATE_REMOVE state'
- efi/libstub: Skip GOP with PIXEL_BLT_ONLY format (bnc#974215).
- ext2: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ext4: avoid unnecessary stalls in ext4_evict_inode() (bsc#1049486).
- ext4: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ext4: handle the rest of ext4_mb_load_buddy() ENOMEM errors (bsc#1012829).
- Fix kABI breakage by HD-audio bus caps extensions (bsc#1048356).
- Fix kABI breakage by KVM CVE fix (bsc#1045922).
- fs/fcntl: f_setown, avoid undefined behaviour (bnc#1006180).
- fs: pass on flags in compat_writev (bsc#1050211).
- fuse: initialize the flock flag in fuse_file on allocation (git-fixes).
- gcov: add support for gcc version &gt;= 6 (bsc#1051663).
- gcov: support GCC 7.1 (bsc#1051663).
- gfs2: fix flock panic issue (bsc#1012829).
- hpsa: limit transfer length to 1MB (bsc#1025461).
- hrtimer: Catch invalid clockids again (bsc#1047651).
- hrtimer: Revert CLOCK_MONOTONIC_RAW support (bsc#1047651).
- hv_netvsc: change netvsc device default duplex to FULL (fate#320485).
- hv_netvsc: Exclude non-TCP port numbers from vRSS hashing (bsc#1048421).
- hv_netvsc: Fix the carrier state error when data path is off (fate#320485).
- hv_netvsc: Fix the queue index computation in forwarding case (bsc#1048421).
- hv_netvsc: Remove unnecessary var link_state from struct netvsc_device_info (fate#320485).
- hv: print extra debug in kvp_on_msg in error paths (bnc#1039153).
- hv_utils: drop .getcrosststamp() support from PTP driver (fate#320485, bnc#1044112).
- hv_utils: drop .getcrosststamp() support from PTP driver (fate#320485, bnc#1044112, bnc#1042778, bnc#1029693).
- hv_utils: fix TimeSync work on pre-TimeSync-v4 hosts (fate#320485, bnc#1044112).
- hv_utils: fix TimeSync work on pre-TimeSync-v4 hosts (fate#320485, bnc#1044112, bnc#1042778, bnc#1029693).
- hv_util: switch to using timespec64 (fate#320485).
- hwpoison, memcg: forcibly uncharge LRU pages (bnc#1046105).
- hyperv: fix warning about missing prototype (fate#320485).
- hyperv: netvsc: Neaten netvsc_send_pkt by using a temporary (fate#320485).
- hyperv: remove unnecessary return variable (fate#320485).
- i2c: designware-baytrail: fix potential null pointer dereference on dev (bsc#1011913).
- i40e: add hw struct local variable (bsc#1039915).
- i40e: add private flag to control source pruning (bsc#1034075).
- i40e: add VSI info to macaddr messages (bsc#1039915).
- i40e: avoid looping to check whether we're in VLAN mode (bsc#1039915).
- i40e: avoid O(n^2) loop when deleting all filters (bsc#1039915).
- i40e: delete filter after adding its replacement when converting (bsc#1039915).
- i40e: do not add broadcast filter for VFs (bsc#1039915).
- i40e: do not allow i40e_vsi_(add|kill)_vlan to operate when VID&lt;1 (bsc#1039915).
- i40e: drop is_vf and is_netdev fields in struct i40e_mac_filter (bsc#1039915).
- i40e: enable VSI broadcast promiscuous mode instead of adding broadcast filter (bsc#1039915).
- i40e: factor out addition/deletion of VLAN per each MAC address (bsc#1039915).
- i40e: fix ethtool to get EEPROM data from X722 interface (bsc#1047418).
- i40e: fix MAC filters when removing VLANs (bsc#1039915).
- i40e: fold the i40e_is_vsi_in_vlan check into i40e_put_mac_in_vlan (bsc#1039915).
- i40e/i40evf: Fix use after free in Rx cleanup path (bsc#1051689).
- i40e: implement __i40e_del_filter and use where applicable (bsc#1039915).
- i40e: make use of __dev_uc_sync and __dev_mc_sync (bsc#1039915).
- i40e: move all updates for VLAN mode into i40e_sync_vsi_filters (bsc#1039915).
- i40e: move i40e_put_mac_in_vlan and i40e_del_mac_all_vlan (bsc#1039915).
- i40e: no need to check is_vsi_in_vlan before calling i40e_del_mac_all_vlan (bsc#1039915).
- i40e: properly cleanup on allocation failure in i40e_sync_vsi_filters (bsc#1039915).
- i40e: recalculate vsi-&gt;active_filters from hash contents (bsc#1039915).
- i40e: refactor i40e_put_mac_in_vlan to avoid changing f-&gt;vlan (bsc#1039915).
- i40e: refactor i40e_update_filter_state to avoid passing aq_err (bsc#1039915).
- i40e: refactor Rx filter handling (bsc#1039915).
- i40e: Removal of workaround for simple MAC address filter deletion (bsc#1039915).
- i40e: remove code to handle dev_addr specially (bsc#1039915).
- i40e: removed unreachable code (bsc#1039915).
- i40e: remove duplicate add/delete adminq command code for filters (bsc#1039915).
- i40e: remove second check of VLAN_N_VID in i40e_vlan_rx_add_vid (bsc#1039915).
- i40e: rename i40e_put_mac_in_vlan and i40e_del_mac_all_vlan (bsc#1039915).
- i40e: restore workaround for removing default MAC filter (bsc#1039915).
- i40e: set broadcast promiscuous mode for each active VLAN (bsc#1039915).
- i40e: store MAC/VLAN filters in a hash with the MAC Address as key (bsc#1039915).
- i40e: use (add|rm)_vlan_all_mac helper functions when changing PVID (bsc#1039915).
- i40evf: fix merge error in older patch (bsc#1024346 FATE#321239 bsc#1024373 FATE#321247).
- i40e: when adding or removing MAC filters, correctly handle VLANs (bsc#1039915).
- i40e: When searching all MAC/VLAN filters, ignore removed filters (bsc#1039915).
- i40e: write HENA for VFs (bsc#1039915).
- IB/hfi1: Wait for QSFP modules to initialize (bsc#1019151).
- IB/iser: Fix connection teardown race condition (bsc#1050211).
- ibmvnic: Check for transport event on driver resume (bsc#1051556, bsc#1052709).
- ibmvnic: Initialize SCRQ's during login renegotiation (bsc#1052223).
- ibmvnic: Report rx buffer return codes as netdev_dbg (bsc#1052794).
- IB/rxe: Fix kernel panic from skb destructor (bsc#1049361).
- iio: hid-sensor: fix return of -EINVAL on invalid values in ret or value (bsc#1031717).
- include/linux/mmzone.h: simplify zone_intersects() (bnc#1047506).
- input: gpio-keys - fix check for disabling unsupported keys (bsc#1031717).
- introduce the walk_process_tree() helper (bnc#1022476).
- iommu/amd: Add flush counters to struct dma_ops_domain (bsc#1045709).
- iommu/amd: Add locking to per-domain flush-queue (bsc#1045709).
- iommu/amd: Add new init-state IOMMU_CMDLINE_DISABLED (bsc#1045715).
- iommu/amd: Add per-domain flush-queue data structures (bsc#1045709).
- iommu/amd: Add per-domain timer to flush per-cpu queues (bsc#1045709).
- iommu/amd: Check for error states first in iommu_go_to_state() (bsc#1045715).
- iommu/amd: Constify irq_domain_ops (bsc#1045709).
- iommu/amd: Disable IOMMUs at boot if they are enabled (bsc#1045715).
- iommu/amd: Enable ga_log_intr when enabling guest_mode (bsc1052533).
- iommu/amd: Fix interrupt remapping when disable guest_mode (bsc#1051471).
- iommu/amd: Fix schedule-while-atomic BUG in initialization code (bsc1052533).
- iommu/amd: Free already flushed ring-buffer entries before full-check (bsc#1045709).
- iommu/amd: Free IOMMU resources when disabled on command line (bsc#1045715).
- iommu/amd: Make use of the per-domain flush queue (bsc#1045709).
- iommu/amd: Ratelimit io-page-faults per device (bsc#1045709).
- iommu/amd: Reduce amount of MMIO when submitting commands (bsc#1045709).
- iommu/amd: Reduce delay waiting for command buffer space (bsc#1045709).
- iommu/amd: Remove amd_iommu_disabled check from amd_iommu_detect() (bsc#1045715).
- iommu/amd: Remove queue_release() function (bsc#1045709).
- iommu/amd: Rename free_on_init_error() (bsc#1045715).
- iommu/amd: Rip out old queue flushing code (bsc#1045709).
- iommu/amd: Set global pointers to NULL after freeing them (bsc#1045715).
- iommu/amd: Suppress IO_PAGE_FAULTs in kdump kernel (bsc#1045715 bsc#1043261).
- iommu: Remove a patch because it caused problems for users. See bsc#1048348.
- ipv4: Should use consistent conditional judgement for ip fragment in __ip_append_data and ip_finish_output (bsc#1041958).
- ipv6: Should use consistent conditional judgement for ip6 fragment between __ip6_append_data and ip6_finish_output (bsc#1041958).
- iw_cxgb4: Fix error return code in c4iw_rdev_open() (bsc#1026570).
- iwlwifi: 8000: fix MODULE_FIRMWARE input (FATE#321353, FATE#323335).
- iwlwifi: 9000: increase the number of queues (FATE#321353, FATE#323335).
- iwlwifi: add device ID for 8265 (FATE#321353, FATE#323335).
- iwlwifi: add device IDs for the 8265 device (FATE#321353, FATE#323335).
- iwlwifi: add disable_11ac module param (FATE#321353, FATE#323335).
- iwlwifi: add new 3168 series devices support (FATE#321353, FATE#323335).
- iwlwifi: add new 8260 PCI IDs (FATE#321353, FATE#323335).
- iwlwifi: add new 8265 (FATE#321353, FATE#323335).
- iwlwifi: add new 8265 series PCI ID (FATE#321353, FATE#323335).
- iwlwifi: Add new PCI IDs for 9260 and 5165 series (FATE#321353, FATE#323335).
- iwlwifi: Add PCI IDs for the new 3168 series (FATE#321353, FATE#323335).
- iwlwifi: Add PCI IDs for the new series 8165 (FATE#321353, FATE#323335).
- iwlwifi: add support for 12K Receive Buffers (FATE#321353, FATE#323335).
- iwlwifi: add support for getting HW address from CSR (FATE#321353, FATE#323335).
- iwlwifi: avoid d0i3 commands when no/init ucode is loaded (FATE#321353, FATE#323335).
- iwlwifi: bail out in case of bad trans state (FATE#321353, FATE#323335).
- iwlwifi: block the queues when we send ADD_STA for uAPSD (FATE#321353, FATE#323335).
- iwlwifi: change the Intel Wireless email address (FATE#321353, FATE#323335).
- iwlwifi: change the Intel Wireless email address (FATE#321353, FATE#323335).
- iwlwifi: check for valid ethernet address provided by OEM (FATE#321353, FATE#323335).
- iwlwifi: clean up transport debugfs handling (FATE#321353, FATE#323335).
- iwlwifi: clear ieee80211_tx_info-&gt;driver_data in the op_mode (FATE#321353, FATE#323335).
- iwlwifi: Document missing module options (FATE#321353, FATE#323335).
- iwlwifi: dump prph registers in a common place for all transports (FATE#321353, FATE#323335).
- iwlwifi: dvm: advertise NETIF_F_SG (FATE#321353, FATE#323335).
- iwlwifi: dvm: fix compare_const_fl.cocci warnings (FATE#321353, FATE#323335).
- iwlwifi: dvm: handle zero brightness for wifi LED (FATE#321353, FATE#323335).
- iwlwifi: dvm: remove a wrong dependency on m (FATE#321353, FATE#323335).
- iwlwifi: dvm: remove Kconfig default (FATE#321353, FATE#323335).
- iwlwifi: dvm: remove stray debug code (FATE#321353, FATE#323335).
- iwlwifi: export the _no_grab version of PRPH IO functions (FATE#321353, FATE#323335).
- iwlwifi: expose fw usniffer mode to more utilities (FATE#321353, FATE#323335).
- iwlwifi: fix double hyphen in MODULE_FIRMWARE for 8000 (FATE#321353, FATE#323335).
- iwlwifi: Fix firmware name maximum length definition (FATE#321353, FATE#323335).
- iwlwifi: fix name of ucode loaded for 8265 series (FATE#321353, FATE#323335).
- iwlwifi: fix printf specifier (FATE#321353, FATE#323335).
- iwlwifi: generalize d0i3_entry_timeout module parameter (FATE#321353, FATE#323335).
- iwlwifi: missing error code in iwl_trans_pcie_alloc() (bsc#1031717).
- iwlwifi: mvm: adapt the firmware assert log to new firmware (FATE#321353, FATE#323335).
- iwlwifi: mvm: add 9000-series RX API (FATE#321353, FATE#323335).
- iwlwifi: mvm: add 9000 series RX processing (FATE#321353, FATE#323335).
- iwlwifi: mvm: add a non-trigger window to fw dbg triggers (FATE#321353, FATE#323335).
- iwlwifi: mvm: add an option to start rs from HT/VHT rates (FATE#321353, FATE#323335).
- iwlwifi: mvm: Add a station in monitor mode (FATE#321353, FATE#323335).
- iwlwifi: mvm: add bt rrc and ttc to debugfs (FATE#321353, FATE#323335).
- iwlwifi: mvm: add bt settings to debugfs (FATE#321353, FATE#323335).
- iwlwifi: mvm: add ctdp operations to debugfs (FATE#321353, FATE#323335).
- iwlwifi: mvm: add CT-KILL notification (FATE#321353, FATE#323335).
- iwlwifi: mvm: add debug print if scan config is ignored (FATE#321353, FATE#323335).
- iwlwifi: mvm: add extended dwell time (FATE#321353, FATE#323335).
- iwlwifi: mvm: add new ADD_STA command version (FATE#321353, FATE#323335).
- iwlwifi: mvm: Add P2P client snoozing (FATE#321353, FATE#323335).
- iwlwifi: mvm: add registration to cooling device (FATE#321353, FATE#323335).
- iwlwifi: mvm: add registration to thermal zone (FATE#321353, FATE#323335).
- iwlwifi: mvm: add support for negative temperatures (FATE#321353, FATE#323335).
- iwlwifi: mvm: add tlv for multi queue rx support (FATE#321353, FATE#323335).
- iwlwifi: mvm: add trigger for firmware dump upon TDLS events (FATE#321353, FATE#323335).
- iwlwifi: mvm: add trigger for firmware dump upon TX response status (FATE#321353, FATE#323335).
- iwlwifi: mvm: advertise NETIF_F_SG (FATE#321353, FATE#323335).
- iwlwifi: mvm: Align bt-coex priority with requirements (FATE#321353, FATE#323335).
- iwlwifi: mvm: allow to disable beacon filtering for AP/GO interface (FATE#321353, FATE#323335).
- iwlwifi: mvm: avoid harmless -Wmaybe-uninialized warning (FATE#321353, FATE#323335).
- iwlwifi: mvm: avoid panics with thermal device usage (FATE#321353, FATE#323335).
- iwlwifi: mvm: avoid to WARN about gscan capabilities (FATE#321353, FATE#323335).
- iwlwifi: mvm: bail out if CTDP start operation fails (FATE#321353, FATE#323335).
- iwlwifi: mvm: bump firmware API to 21 (FATE#321353, FATE#323335).
- iwlwifi: mvm: bump max API to 20 (FATE#321353, FATE#323335).
- iwlwifi: mvm: change access to ieee80211_hdr (FATE#321353, FATE#323335).
- iwlwifi: mvm: change iwl_mvm_get_key_sta_id() to return the station (FATE#321353, FATE#323335).
- iwlwifi: mvm: change mcc update API (FATE#321353, FATE#323335).
- iwlwifi: mvm: change name of iwl_mvm_d3_update_gtk (FATE#321353, FATE#323335).
- iwlwifi: mvm: Change number of associated stations when station becomes associated (FATE#321353, FATE#323335).
- iwlwifi: mvm: change protocol offload flows (FATE#321353, FATE#323335).
- iwlwifi: mvm: change the check for ADD_STA status (FATE#321353, FATE#323335).
- iwlwifi: mvm: check FW's response for nvm access write cmd (FATE#321353, FATE#323335).
- iwlwifi: mvm: check iwl_mvm_wowlan_config_key_params() return value (FATE#321353, FATE#323335).
- iwlwifi: mvm: check minimum temperature notification length (FATE#321353, FATE#323335).
- iwlwifi: mvm: cleanup roc te on restart cleanup (FATE#321353, FATE#323335).
- iwlwifi: mvm: compare full command ID (FATE#321353, FATE#323335).
- iwlwifi: mvm: Configure fragmented scan for scheduled scan (FATE#321353, FATE#323335).
- iwlwifi: mvm: configure scheduled scan according to traffic conditions (FATE#321353, FATE#323335).
- iwlwifi: mvm: constify the parameters of a few functions in fw-dbg.c (FATE#321353, FATE#323335).
- iwlwifi: mvm: Disable beacon storing in D3 when WOWLAN configured (FATE#321353, FATE#323335).
- iwlwifi: mvm: disable DQA support (FATE#321353, FATE#323335).
- iwlwifi: mvm: do not ask beacons when P2P GO vif and no assoc sta (FATE#321353, FATE#323335).
- iwlwifi: mvm: do not keep an mvm ref when the interface is down (FATE#321353, FATE#323335).
- iwlwifi: mvm: do not let NDPs mess the packet tracking (FATE#321353, FATE#323335).
- iwlwifi: mvm: do not restart HW if suspend fails with unified image (FATE#321353, FATE#323335).
- iwlwifi: mvm: Do not switch to D3 image on suspend (FATE#321353, FATE#323335).
- iwlwifi: mvm: do not try to offload AES-CMAC in AP/IBSS modes (FATE#321353, FATE#323335).
- iwlwifi: mvm: drop low_latency_agg_frame_cnt_limit (FATE#321353, FATE#323335).
- iwlwifi: mvm: dump more registers upon error (FATE#321353, FATE#323335).
- iwlwifi: mvm: dump the radio registers when the firmware crashes (FATE#321353, FATE#323335).
- iwlwifi: mvm: enable L3 filtering (FATE#321353, FATE#323335).
- iwlwifi: mvm: Enable MPLUT only on supported hw (FATE#321353, FATE#323335).
- iwlwifi: mvm: enable VHT MU-MIMO for supported hardware (FATE#321353, FATE#323335).
- iwlwifi: mvm: extend time event duration (FATE#321353, FATE#323335).
- iwlwifi: mvm: fix accessing Null pointer during fw dump collection (FATE#321353, FATE#323335).
- iwlwifi: mvm: fix d3_test with unified D0/D3 images (FATE#321353, FATE#323335).
- iwlwifi: mvm: fix debugfs signedness warning (FATE#321353, FATE#323335).
- iwlwifi: mvm: fix extended dwell time (FATE#321353, FATE#323335).
- iwlwifi: mvm: fix incorrect fallthrough in iwl_mvm_check_running_scans() (FATE#321353, FATE#323335).
- iwlwifi: mvm: fix memory leaks in error paths upon fw error dump (FATE#321353, FATE#323335).
- iwlwifi: mvm: fix netdetect starting/stopping for unified images (FATE#321353, FATE#323335).
- iwlwifi: mvm: fix RSS key sizing (FATE#321353, FATE#323335).
- iwlwifi: mvm: fix unregistration of thermal in some error flows (FATE#321353, FATE#323335).
- iwlwifi: mvm: flush all used TX queues before suspending (FATE#321353, FATE#323335).
- iwlwifi: mvm: forbid U-APSD for P2P Client if the firmware does not support it (FATE#321353, FATE#323335).
- iwlwifi: mvm: handle pass all scan reporting (FATE#321353, FATE#323335).
- iwlwifi: mvm: ignore LMAC scan notifications when running UMAC scans (FATE#321353, FATE#323335).
- iwlwifi: mvm: infrastructure for frame-release message (FATE#321353, FATE#323335).
- iwlwifi: mvm: kill iwl_mvm_enable_agg_txq (FATE#321353, FATE#323335).
- iwlwifi: mvm: let the firmware choose the antenna for beacons (FATE#321353, FATE#323335).
- iwlwifi: mvm: make collecting fw debug data optional (FATE#321353, FATE#323335).
- iwlwifi: mvm: move fw-dbg code to separate file (FATE#321353, FATE#323335).
- iwlwifi: mvm: only release the trans ref if d0i3 is supported in fw (FATE#321353, FATE#323335).
- iwlwifi: mvm: prepare the code towards TSO implementation (FATE#321353, FATE#323335).
- iwlwifi: mvm: refactor d3 key update functions (FATE#321353, FATE#323335).
- iwlwifi: mvm: refactor the way fw_key_table is handled (FATE#321353, FATE#323335).
- iwlwifi: mvm: remove an extra tab (FATE#321353, FATE#323335).
- iwlwifi: mvm: Remove bf_vif from iwl_power_vifs (FATE#321353, FATE#323335).
- iwlwifi: mvm: Remove iwl_mvm_update_beacon_abort (FATE#321353, FATE#323335).
- iwlwifi: mvm: remove redundant d0i3 flag from the config struct (FATE#321353, FATE#323335).
- iwlwifi: mvm: remove shadowing variable (FATE#321353, FATE#323335).
- iwlwifi: mvm: remove stray nd_config element (FATE#321353, FATE#323335).
- iwlwifi: mvm: remove the vif parameter of iwl_mvm_configure_bcast_filter() (FATE#321353, FATE#323335).
- iwlwifi: mvm: remove unnecessary check in iwl_mvm_is_d0i3_supported() (FATE#321353, FATE#323335).
- iwlwifi: mvm: remove useless WARN_ON and rely on cfg80211's combination (FATE#321353, FATE#323335).
- iwlwifi: mvm: report wakeup for wowlan (FATE#321353, FATE#323335).
- iwlwifi: mvm: reset mvm-&gt;scan_type when firmware is started (FATE#321353, FATE#323335).
- iwlwifi: mvm: reset the fw_dump_desc pointer after ASSERT (bsc#1031717).
- iwlwifi: mvm: return the cooling state index instead of the budget (FATE#321353, FATE#323335).
- iwlwifi: mvm: ROC: cleanup time event info on FW failure (FATE#321353, FATE#323335).
- iwlwifi: mvm: ROC: Extend the ROC max delay duration &amp; limit ROC duration (FATE#321353, FATE#323335).
- iwlwifi: mvm: rs: fix a potential out of bounds access (FATE#321353, FATE#323335).
- iwlwifi: mvm: rs: fix a theoretical access to uninitialized array elements (FATE#321353, FATE#323335).
- iwlwifi: mvm: rs: fix a warning message (FATE#321353, FATE#323335).
- iwlwifi: mvm: rs: fix TPC action decision algorithm (FATE#321353, FATE#323335).
- iwlwifi: mvm: rs: fix TPC statistics handling (FATE#321353, FATE#323335).
- iwlwifi: mvm: Send power command on BSS_CHANGED_BEACON_INFO if needed (FATE#321353, FATE#323335).
- iwlwifi: mvm: set default new STA as non-aggregated (FATE#321353, FATE#323335).
- iwlwifi: mvm: set the correct amsdu enum values (FATE#321353, FATE#323335).
- iwlwifi: mvm: set the correct descriptor size for tracing (FATE#321353, FATE#323335).
- iwlwifi: mvm: small update in the firmware API (FATE#321353, FATE#323335).
- iwlwifi: mvm: support A-MSDU in A-MPDU (FATE#321353, FATE#323335).
- iwlwifi: mvm: support beacon storing (FATE#321353, FATE#323335).
- iwlwifi: mvm: support description for user triggered fw dbg collection (FATE#321353, FATE#323335).
- iwlwifi: mvm: support rss queues configuration command (FATE#321353, FATE#323335).
- iwlwifi: mvm: Support setting continuous recording debug mode (FATE#321353, FATE#323335).
- iwlwifi: mvm: support setting minimum quota from debugfs (FATE#321353, FATE#323335).
- iwlwifi: mvm: support sw queue start/stop from mvm (FATE#321353, FATE#323335).
- iwlwifi: mvm: synchronize firmware DMA paging memory (FATE#321353, FATE#323335).
- iwlwifi: mvm: take care of padded packets (FATE#321353, FATE#323335).
- iwlwifi: mvm: take the transport ref back when leaving (FATE#321353, FATE#323335).
- iwlwifi: mvm: track low-latency sources separately (FATE#321353, FATE#323335).
- iwlwifi: mvm: unconditionally stop device after init (bsc#1031717).
- iwlwifi: mvm: unmap the paging memory before freeing it (FATE#321353, FATE#323335).
- iwlwifi: mvm: update GSCAN capabilities (FATE#321353, FATE#323335).
- iwlwifi: mvm: update ucode status before stopping device (FATE#321353, FATE#323335).
- iwlwifi: mvm: use build-time assertion for fw trigger ID (FATE#321353, FATE#323335).
- iwlwifi: mvm: use firmware station lookup, combine code (FATE#321353, FATE#323335).
- iwlwifi: mvm: various trivial cleanups (FATE#321353, FATE#323335).
- iwlwifi: mvm: writing zero bytes to debugfs causes a crash (FATE#321353, FATE#323335).
- iwlwifi: nvm: fix loading default NVM file (FATE#321353, FATE#323335).
- iwlwifi: nvm: fix up phy section when reading it (FATE#321353, FATE#323335).
- iwlwifi: pcie: add 9000 series multi queue rx DMA support (FATE#321353, FATE#323335).
- iwlwifi: pcie: add infrastructure for multi-queue rx (FATE#321353, FATE#323335).
- iwlwifi: pcie: add initial RTPM support for PCI (FATE#321353, FATE#323335).
- iwlwifi: pcie: Add new configuration to enable MSIX (FATE#321353, FATE#323335).
- iwlwifi: pcie: add pm_prepare and pm_complete ops (FATE#321353, FATE#323335).
- iwlwifi: pcie: add RTPM support when wifi is enabled (FATE#321353, FATE#323335).
- iwlwifi: pcie: aggregate Flow Handler configuration writes (FATE#321353, FATE#323335).
- iwlwifi: pcie: allow the op_mode to block the tx queues (FATE#321353, FATE#323335).
- iwlwifi: pcie: allow to pretend to have Tx CSUM for debug (FATE#321353, FATE#323335).
- iwlwifi: pcie: avoid restocks inside rx loop if not emergency (FATE#321353, FATE#323335).
- iwlwifi: pcie: buffer packets to avoid overflowing Tx queues (FATE#321353, FATE#323335).
- iwlwifi: pcie: build an A-MSDU using TSO core (FATE#321353, FATE#323335).
- iwlwifi: pcie: configure more RFH settings (FATE#321353, FATE#323335).
- iwlwifi: pcie: detect and workaround invalid write ptr behavior (FATE#321353, FATE#323335).
- iwlwifi: pcie: do not increment / decrement a bool (FATE#321353, FATE#323335).
- iwlwifi: pcie: enable interrupts before releasing the NIC's CPU (FATE#321353, FATE#323335).
- iwlwifi: pcie: enable multi-queue rx path (FATE#321353, FATE#323335).
- iwlwifi: pcie: extend device reset delay (FATE#321353, FATE#323335).
- iwlwifi: pcie: fine tune number of rxbs (FATE#321353, FATE#323335).
- iwlwifi: pcie: fix a race in firmware loading flow (FATE#321353, FATE#323335).
- iwlwifi: pcie: fix command completion name debug (bsc#1031717).
- iwlwifi: pcie: fix erroneous return value (FATE#321353, FATE#323335).
- iwlwifi: pcie: fix global table size (FATE#321353, FATE#323335).
- iwlwifi: pcie: fix identation in trans.c (FATE#321353, FATE#323335).
- iwlwifi: pcie: fix RF-Kill vs. firmware load race (FATE#321353, FATE#323335).
- iwlwifi: pcie: forbid RTPM on device removal (FATE#321353, FATE#323335).
- iwlwifi: pcie: mark command queue lock with separate lockdep class (FATE#321353, FATE#323335).
- iwlwifi: pcie: prevent skbs shadowing in iwl_trans_pcie_reclaim (FATE#321353, FATE#323335).
- iwlwifi: pcie: refactor RXBs reclaiming code (FATE#321353, FATE#323335).
- iwlwifi: pcie: remove ICT allocation message (FATE#321353, FATE#323335).
- iwlwifi: pcie: remove pointer from debug message (FATE#321353, FATE#323335).
- iwlwifi: pcie: re-organize code towards TSO (FATE#321353, FATE#323335).
- iwlwifi: pcie: set RB chunk size back to 64 (FATE#321353, FATE#323335).
- iwlwifi: pcie: update iwl_mpdu_desc fields (FATE#321353, FATE#323335).
- iwlwifi: print index in api/capa flags parsing message (FATE#321353, FATE#323335).
- iwlwifi: refactor the code that reads the MAC address from the NVM (FATE#321353, FATE#323335).
- iwlwifi: remove IWL_DL_LED (FATE#321353, FATE#323335).
- iwlwifi: remove unused parameter from grab_nic_access (FATE#321353, FATE#323335).
- iwlwifi: replace d0i3_mode and wowlan_d0i3 with more generic variables (FATE#321353, FATE#323335).
- iwlwifi: set max firmware version of 7265 to 17 (FATE#321353, FATE#323335).
- iwlwifi: support ucode with d0 unified image - regular and usniffer (FATE#321353, FATE#323335).
- iwlwifi: trans: make various conversion macros inlines (FATE#321353, FATE#323335).
- iwlwifi: trans: support a callback for ASYNC commands (FATE#321353, FATE#323335).
- iwlwifi: treat iwl_parse_nvm_data() MAC addr as little endian (FATE#321353, FATE#323335).
- iwlwifi: tt: move ucode_loaded check under mutex (FATE#321353, FATE#323335).
- iwlwifi: uninline iwl_trans_send_cmd (FATE#321353, FATE#323335).
- iwlwifi: update host command messages to new format (FATE#321353, FATE#323335).
- iwlwifi: Update PCI IDs for 8000 and 9000 series (FATE#321353, FATE#323335).
- iwlwifi: update support for 3168 series firmware and NVM (FATE#321353, FATE#323335).
- iwlwifi: various comments and code cleanups (FATE#321353, FATE#323335).
- kABI-fix for 'x86/panic: replace smp_send_stop() with kdump friendly version in panic path' (bsc#1051478).
- kABI: protect lwtunnel include in ip6_route.h (kabi).
- KABI protect struct acpi_nfit_desc (bsc#1052325).
- kABI: protect struct iscsi_tpg_attrib (kabi).
- kABI: protect struct se_lun (kabi).
- kABI: protect struct tpm_chip (kabi).
- kABI: protect struct xfrm_dst (kabi).
- kABI: protect struct xfrm_dst (kabi).
- kabi/severities: add drivers/scsi/hisi_sas to kabi severities
- kabi/severities: ignore kABi changes in iwlwifi stuff itself
- kvm: nVMX: fix msr bitmaps to prevent L2 from accessing L0 x2APIC (bsc#1051478).
- kvm: nVMX: Fix nested_vmx_check_msr_bitmap_controls (bsc#1051478).
- kvm: nVMX: Fix nested VPID vmx exec control (bsc#1051478).
- kvm: x86: avoid simultaneous queueing of both IRQ and SMI (bsc#1051478).
- libnvdimm: fix badblock range handling of ARS range (bsc#1023175).
- libnvdimm: fix badblock range handling of ARS range (bsc#1051048).
- libnvdimm, pmem: fix a NULL pointer BUG in nd_pmem_notify (bsc#1023175).
- libnvdimm, pmem: fix a NULL pointer BUG in nd_pmem_notify (bsc#1048919).
- libnvdimm, region: fix flush hint detection crash (bsc#1048919).
- lightnvm: fix 'warning: ‘ret’ may be used uninitialized' (FATE#319466).
- mac80211_hwsim: Replace bogus hrtimer clockid (bsc#1047651).
- md-cluster: Fix a memleak in an error handling path (bsc#1049289).
- md: do not return -EAGAIN in md_allow_write for external metadata arrays (bsc#1047174).
- md: fix sleep in atomic (bsc#1040351).
- mm: call page_ext_init() after all struct pages are initialized (VM Debugging Functionality, bsc#1047048).
- mm: fix classzone_idx underflow in shrink_zones() (VM Functionality, bsc#1042314).
- mm: make PR_SET_THP_DISABLE immediately active (bnc#1048891).
- mm, memory_hotplug: get rid of is_zone_device_section fix (bnc#1047595).
- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack (bnc#1039348).
- mwifiex: do not update MCS set from hostapd (bsc#1031717).
- net: account for current skb length when deciding about UFO (bsc#1041958).
- net: add netdev_lockdep_set_classes() helper (fate#320485).
- net: ena: add hardware hints capability to the driver (bsc#1047121).
- net: ena: add hardware hints capability to the driver (bsc#1047121).
- net: ena: add missing return when ena_com_get_io_handlers() fails (bsc#1047121).
- net: ena: add missing return when ena_com_get_io_handlers() fails (bsc#1047121).
- net: ena: add missing unmap bars on device removal (bsc#1047121).
- net: ena: add missing unmap bars on device removal (bsc#1047121).
- net: ena: add reset reason for each device FLR (bsc#1047121).
- net: ena: add reset reason for each device FLR (bsc#1047121).
- net: ena: add support for out of order rx buffers refill (bsc#1047121).
- net: ena: add support for out of order rx buffers refill (bsc#1047121).
- net: ena: allow the driver to work with small number of msix vectors (bsc#1047121).
- net: ena: allow the driver to work with small number of msix vectors (bsc#1047121).
- net: ena: bug fix in lost tx packets detection mechanism (bsc#1047121).
- net: ena: bug fix in lost tx packets detection mechanism (bsc#1047121).
- net: ena: change return value for unsupported features unsupported return value (bsc#1047121).
- net: ena: change return value for unsupported features unsupported return value (bsc#1047121).
- net: ena: change sizeof() argument to be the type pointer (bsc#1047121).
- net: ena: change sizeof() argument to be the type pointer (bsc#1047121).
- net: ena: disable admin msix while working in polling mode (bsc#1047121).
- net: ena: disable admin msix while working in polling mode (bsc#1047121).
- net: ena: fix bug that might cause hang after consecutive open/close interface (bsc#1047121).
- net: ena: fix bug that might cause hang after consecutive open/close interface (bsc#1047121).
- net: ena: fix race condition between submit and completion admin command (bsc#1047121).
- net: ena: fix race condition between submit and completion admin command (bsc#1047121).
- net: ena: fix rare uncompleted admin command false alarm (bsc#1047121).
- net: ena: fix rare uncompleted admin command false alarm (bsc#1047121).
- net: ena: fix theoretical Rx hang on low memory systems (bsc#1047121).
- net: ena: fix theoretical Rx hang on low memory systems (bsc#1047121).
- net: ena: separate skb allocation to dedicated function (bsc#1047121).
- net: ena: separate skb allocation to dedicated function (bsc#1047121).
- net/ena: switch to pci_alloc_irq_vectors (bsc#1047121).
- net: ena: update driver's rx drop statistics (bsc#1047121).
- net: ena: update driver's rx drop statistics (bsc#1047121).
- net: ena: update ena driver to version 1.1.7 (bsc#1047121).
- net: ena: update ena driver to version 1.1.7 (bsc#1047121).
- net: ena: update ena driver to version 1.2.0 (bsc#1047121).
- net: ena: update ena driver to version 1.2.0 (bsc#1047121).
- net: ena: use lower_32_bits()/upper_32_bits() to split dma address (bsc#1047121).
- net: ena: use lower_32_bits()/upper_32_bits() to split dma address (bsc#1047121).
- net: ena: use napi_schedule_irqoff when possible (bsc#1047121).
- net: ena: use napi_schedule_irqoff when possible (bsc#1047121).
- net: handle NAPI_GRO_FREE_STOLEN_HEAD case also in napi_frags_finish() (bsc#1042286).
- net: hns: Bugfix for Tx timeout handling in hns driver (bsc#1048451).
- net: hyperv: use new api ethtool_{get|set}_link_ksettings (fate#320485).
- net/mlx4_core: Fixes missing capability bit in flags2 capability dump (bsc#1015337).
- net/mlx4_core: Fix namespace misalignment in QinQ VST support commit (bsc#1015337).
- net/mlx4_core: Fix sl_to_vl_change bit offset in flags2 dump (bsc#1015337).
- net/mlx5: Cancel delayed recovery work when unloading the driver (bsc#1015342).
- net/mlx5: Clean SRIOV eswitch resources upon VF creation failure (bsc#1015342).
- net/mlx5: Consider tx_enabled in all modes on remap (bsc#1015342).
- net/mlx5e: Add field select to MTPPS register (bsc#1015342).
- net/mlx5e: Add missing support for PTP_CLK_REQ_PPS request (bsc#1015342).
- net/mlx5e: Change 1PPS out scheme (bsc#1015342).
- net/mlx5e: Fix broken disable 1PPS flow (bsc#1015342).
- net/mlx5e: Fix outer_header_zero() check size (bsc#1015342).
- net/mlx5e: Fix TX carrier errors report in get stats ndo (bsc#1015342).
- net/mlx5e: Initialize CEE's getpermhwaddr address buffer to 0xff (bsc#1015342).
- net/mlx5e: Rename physical symbol errors counter (bsc#1015342).
- net/mlx5: Fix driver load error flow when firmware is stuck (git-fixes).
- net/mlx5: Fix mlx5_add_flow_rules call with correct num of dests (bsc#1015342).
- net/mlx5: Fix mlx5_ifc_mtpps_reg_bits structure size (bsc#1015342).
- net/mlx5: Fix offset of hca cap reserved field (bsc#1015342).
- net: phy: Do not perform software reset for Generic PHY (bsc#1042286).
- netvsc: add comments about callback's and NAPI (fate#320485).
- netvsc: Add #include's for csum_* function declarations (fate#320485).
- netvsc: add rtnl annotations in rndis (fate#320485).
- netvsc: add some rtnl_dereference annotations (fate#320485).
- netvsc: avoid race with callback (fate#320485).
- netvsc: change logic for change mtu and set_queues (fate#320485).
- netvsc: change max channel calculation (fate#320485).
- netvsc: change order of steps in setting queues (fate#320485).
- netvsc: Deal with rescinded channels correctly (fate#320485).
- netvsc: do not access netdev-&gt;num_rx_queues directly (fate#320485).
- netvsc: do not overload variable in same function (fate#320485).
- netvsc: do not print pointer value in error message (fate#320485).
- netvsc: eliminate unnecessary skb == NULL checks (fate#320485).
- netvsc: enable GRO (fate#320485).
- netvsc: Fix a bug in sub-channel handling (fate#320485).
- netvsc: fix and cleanup rndis_filter_set_packet_filter (fate#320485).
- netvsc: fix calculation of available send sections (fate#320485).
- netvsc: fix dereference before null check errors (fate#320485).
- netvsc: fix error unwind on device setup failure (fate#320485).
- netvsc: fix hang on netvsc module removal (fate#320485).
- netvsc: fix NAPI performance regression (fate#320485).
- netvsc: fix net poll mode (fate#320485).
- netvsc: fix netvsc_set_channels (fate#320485).
- netvsc: fix ptr_ret.cocci warnings (fate#320485).
- netvsc: fix rcu dereference warning from ethtool (fate#320485).
- netvsc: fix RCU warning in get_stats (fate#320485).
- netvsc: fix return value for set_channels (fate#320485).
- netvsc: fix rtnl deadlock on unregister of vf (fate#320485, bsc#1052442).
- netvsc: fix use after free on module removal (fate#320485).
- netvsc: fix warnings reported by lockdep (fate#320485).
- netvsc: fold in get_outbound_net_device (fate#320485).
- netvsc: force link update after MTU change (fate#320485).
- netvsc: handle offline mtu and channel change (fate#320485).
- netvsc: implement NAPI (fate#320485).
- netvsc: include rtnetlink.h (fate#320485).
- netvsc: Initialize all channel related state prior to opening the channel (fate#320485).
- netvsc: make sure and unregister datapath (fate#320485, bsc#1052899).
- netvsc: make sure napi enabled before vmbus_open (fate#320485).
- netvsc: mark error cases as unlikely (fate#320485).
- netvsc: move filter setting to rndis_device (fate#320485).
- netvsc: need napi scheduled during removal (fate#320485).
- netvsc: need rcu_derefence when accessing internal device info (fate#320485).
- netvsc: optimize calculation of number of slots (fate#320485).
- netvsc: optimize receive completions (fate#320485).
- netvsc: pass net_device to netvsc_init_buf and netvsc_connect_vsp (fate#320485).
- netvsc: prefetch the first incoming ring element (fate#320485).
- netvsc: Properly initialize the return value (fate#320485).
- netvsc: remove bogus rtnl_unlock (fate#320485).
- netvsc: remove no longer used max_num_rss queues (fate#320485).
- netvsc: Remove redundant use of ipv6_hdr() (fate#320485).
- netvsc: remove unnecessary indirection of page_buffer (fate#320485).
- netvsc: remove unnecessary lock on shutdown (fate#320485).
- netvsc: remove unused #define (fate#320485).
- netvsc: replace netdev_alloc_skb_ip_align with napi_alloc_skb (fate#320485).
- netvsc: save pointer to parent netvsc_device in channel table (fate#320485).
- netvsc: signal host if receive ring is emptied (fate#320485).
- netvsc: transparent VF management (fate#320485, bsc#1051979).
- netvsc: use ERR_PTR to avoid dereference issues (fate#320485).
- netvsc: use hv_get_bytes_to_read (fate#320485).
- netvsc: use napi_consume_skb (fate#320485).
- netvsc: use RCU to protect inner device structure (fate#320485).
- netvsc: uses RCU instead of removal flag (fate#320485).
- netvsc: use typed pointer for internal state (fate#320485).
- nfs: Cache aggressively when file is open for writing (bsc#1033587).
- nfs: Do not flush caches for a getattr that races with writeback (bsc#1033587).
- nfs: invalidate file size when taking a lock (git-fixes).
- nfs: only invalidate dentrys that are clearly invalid (bsc#1047118).
- nfs: Optimize fallocate by refreshing mapping when needed (git-fixes).
- nvme: add hostid token to fabric options (bsc#1045293).
- nvme: also provide a UUID in the WWID sysfs attribute (bsc#1048146).
- nvme: fabrics commands should use the fctype field for data direction (bsc#1043805).
- nvme-pci: fix CMB sysfs file removal in reset path (bsc#1050211).
- nvme/pci: Fix stuck nvme reset (bsc#1043805).
- nvmet: identify controller: improve standard compliance (bsc#1048146).
- nvme: wwid_show: strip trailing 0-bytes (bsc#1048146).
- ocfs2: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ocfs2: fix deadlock caused by recursive locking in xattr (bsc#1012829).
- ocfs2: Make ocfs2_set_acl() static (bsc#1030552).
- pci: Add Mellanox device IDs (bsc#1051478).
- pci: Convert Mellanox broken INTx quirks to be for listed devices only (bsc#1051478).
- pci: Correct PCI_STD_RESOURCE_END usage (bsc#1051478).
- pci: dwc: dra7xx: Use RW1C for IRQSTATUS_MSI and IRQSTATUS_MAIN (bsc#1051478).
- pci: dwc: Fix uninitialized variable in dw_handle_msi_irq() (bsc#1051478).
- pci: Enable ECRC only if device supports it (bsc#1051478).
- pci: hv: Allocate interrupt descriptors with GFP_ATOMIC (fate#320295, bnc#1034113).
- pci: hv: Lock PCI bus on device eject (fate#320295, bnc#1034113). Replaces a change for (bnc#998664)
- pci/msi: fix the pci_alloc_irq_vectors_affinity stub (bsc#1050211).
- pci/msi: Ignore affinity if pre/post vector count is more than min_vecs (1050211).
- pci/pm: Fix native PME handling during system suspend/resume (bsc#1051478).
- pci: Support INTx masking on ConnectX-4 with firmware x.14.1100+ (bsc#1051478).
- perf/x86: Fix spurious NMI with PEBS Load Latency event (bsc#1051478).
- perf/x86/intel: Cure bogus unwind from PEBS entries (bsc#1051478).
- perf/x86/intel: Fix PEBSv3 record drain (bsc#1051478).
- pipe: cap initial pipe capacity according to pipe-max-size limit (bsc#1045330).
- platform/x86: ideapad-laptop: Add IdeaPad 310-15IKB to no_hw_rfkill (bsc#1051022).
- platform/x86: ideapad-laptop: Add IdeaPad V310-15ISK to no_hw_rfkill (bsc#1051022).
- platform/x86: ideapad-laptop: Add IdeaPad V510-15IKB to no_hw_rfkill (bsc#1051022).
- platform/x86: ideapad-laptop: Add Lenovo Yoga 910-13IKB to no_hw_rfkill dmi list (bsc#1051022).
- platform/x86: ideapad-laptop: Add several models to no_hw_rfkill (bsc#1051022).
- platform/x86: ideapad-laptop: Add Y520-15IKBN to no_hw_rfkill (bsc#1051022).
- platform/x86: ideapad-laptop: Add Y700 15-ACZ to no_hw_rfkill DMI list (bsc#1051022).
- platform/x86: ideapad-laptop: Add Y720-15IKBN to no_hw_rfkill (bsc#1051022).
- pm / Hibernate: Fix scheduling while atomic during hibernation (bsc#1051059).
- powerpc: Add POWER9 architected mode to cputable (bsc#1048916, fate#321439).
- powerpc/fadump: Add a warning when 'fadump_reserve_mem=' is used (bsc#1049231).
- powerpc/ftrace: Pass the correct stack pointer for DYNAMIC_FTRACE_WITH_REGS (FATE#322421).
- powerpc/perf: Fix branch event code for power9 (fate#321438,  Pending SUSE Kernel Fixes).
- powerpc/perf: Fix oops when kthread execs user process
- powerpc/perf: Fix SDAR_MODE value for continous sampling on Power9 (bsc#1053043 (git-fixes)).
- powerpc: Support POWER9 in architected mode (bsc#1048916, fate#321439).
- powerpc/tm: Fix saving of TM SPRs in core dump (fate#318470, git-fixes 08e1c01d6aed).
- prctl: propagate has_child_subreaper flag to every descendant (bnc#1022476).
- printk: Correctly handle preemption in console_unlock() (bsc#1046434).
- printk/xen: Force printk sync mode when migrating Xen guest (bsc#1043347).
- qed: Add missing static/local dcbx info (bsc#1019695).
- qed: Correct print in iscsi error-flow (bsc#1019695).
- qeth: fix L3 next-hop im xmit qeth hdr (bnc#1052773, LTC#157374).
- rbd: drop extra rbd_img_request_get (bsc#1045596).
- rbd: make sure pages are freed by libceph (bsc#1045596).
- rdma/bnxt_re: checking for NULL instead of IS_ERR() (bsc#1052925).
- rdma/iw_cxgb4: Always wake up waiter in c4iw_peer_abort_intr() (bsc#1026570).
- rdma/mlx5: Fix existence check for extended address vector (bsc#1015342).
- rdma/qedr: Prevent memory overrun in verbs' user responses (bsc#1022604 FATE#321747).
- reiserfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- Remove upstream commit e14b4db7a567 netvsc: fix race during initialization will be replaced by following changes
- reorder upstream commit d0c2c9973ecd net: use core MTU range checking in virt drivers
- Revert 'ACPI / video: Add force_native quirk for HP Pavilion dv6' (bsc#1031717).
- Revert 'Add 'shutdown' to 'struct class'.' (kabi).
- Revert 'KVM: x86: fix emulation of RSM and IRET instructions' (kabi).
- Revert 'Make file credentials available to the seqfile interfaces' (kabi).
- Revert 'mm/list_lru.c: fix list_lru_count_node() to be race free' (kabi).
- Revert 'netvsc: optimize calculation of number of slots' (fate#320485).
- Revert 'powerpc/numa: Fix percpu allocations to be NUMA aware' (bsc#1048914).
- Revert 'powerpc/numa: Fix percpu allocations to be NUMA aware' (bsc#1048914).
- Revert '/proc/iomem: only expose physical resource addresses to privileged users' (kabi).
- Revert 'tpm: Issue a TPM2_Shutdown for TPM2 devices.' (kabi).
- rpm/kernel-binary.spec.in: find-debuginfo.sh should not touch build-id This needs rpm-4.14+ (bsc#964063).
- s390/crash: Remove unused KEXEC_NOTE_BYTES (bsc#1049706).
- s390/kdump: remove code to create ELF notes in the crashed system (bsc#1049706).
- sched/core: Allow __sched_setscheduler() in interrupts when PI is not used (bnc#1022476).
- sched/debug: Print the scheduler topology group mask (bnc#1022476).
- sched/fair, cpumask: Export for_each_cpu_wrap() (bnc#1022476).
- sched/fair: Fix O(nr_cgroups) in load balance path (bnc#1022476).
- sched/fair: Use task_groups instead of leaf_cfs_rq_list to walk all cfs_rqs (bnc#1022476).
- sched/topology: Add sched_group_capacity debugging (bnc#1022476).
- sched/topology: Fix building of overlapping sched-groups (bnc#1022476).
- sched/topology: Fix overlapping sched_group_capacity (bnc#1022476).
- sched/topology: Move comment about asymmetric node setups (bnc#1022476).
- sched/topology: Refactor function build_overlap_sched_groups() (bnc#1022476).
- sched/topology: Remove FORCE_SD_OVERLAP (bnc#1022476).
- sched/topology: Simplify build_overlap_sched_groups() (bnc#1022476).
- sched/topology: Small cleanup (bnc#1022476).
- sched/topology: Verify the first group matches the child domain (bnc#1022476).
- scsi: aacraid: Do not copy uninitialized stack memory to userspace (bsc#1048912).
- scsi: aacraid: fix leak of data from stack back to userspace (bsc#1048912).
- scsi: aacraid: fix PCI error recovery path (bsc#1048912).
- scsi: Add STARGET_CREATE_REMOVE state to scsi_target_state (bsc#1013887).
- scsi: bnx2i: missing error code in bnx2i_ep_connect() (bsc#1048221).
- scsi: bnx2i: missing error code in bnx2i_ep_connect() (bsc#1048221).
- scsi_devinfo: fixup string compare (bsc#1037404).
- scsi_dh_alua: suppress errors from unsupported devices (bsc#1038792).
- scsi: hisi_sas: add pci_dev in hisi_hba struct (bsc#1049298).
- scsi: hisi_sas: add v2 hw internal abort timeout workaround (bsc#1049298).
- scsi: hisi_sas: controller reset for multi-bits ECC and AXI fatal errors (bsc#1049298).
- scsi: hisi_sas: fix NULL deference when TMF timeouts (bsc#1049298).
- scsi: hisi_sas: fix timeout check in hisi_sas_internal_task_abort() (bsc#1049298).
- scsi: hisi_sas: optimise DMA slot memory (bsc#1049298).
- scsi: hisi_sas: optimise the usage of hisi_hba.lock (bsc#1049298).
- scsi: hisi_sas: relocate get_ata_protocol() (bsc#1049298).
- scsi: hisi_sas: workaround a SoC SATA IO processing bug (bsc#1049298).
- scsi: hisi_sas: workaround SoC about abort timeout bug (bsc#1049298).
- scsi: hisi_sas: workaround STP link SoC bug (bsc#1049298).
- scsi: kABI fix for new state STARGET_CREATED_REMOVE (bsc#1013887).
- scsi: lpfc: Add auto EQ delay logic (bsc#1042257).
- scsi: lpfc: Added recovery logic for running out of NVMET IO context resources (bsc#1037838).
- scsi: lpfc: Adding additional stats counters for nvme (bsc#1037838).
- scsi: lpfc: Add MDS Diagnostic support (bsc#1037838).
- scsi: lpfc: Cleanup entry_repost settings on SLI4 queues (bsc#1037838).
- scsi: lpfc: do not double count abort errors (bsc#1048912).
- scsi: lpfc: Driver responds LS_RJT to Beacon Off ELS - Linux (bsc#1044623).
- scsi: lpfc: Fix crash after firmware flash when IO is running (bsc#1044623).
- scsi: lpfc: Fix crash doing IO with resets (bsc#1044623).
- scsi: lpfc: Fix crash in lpfc_sli_ringtxcmpl_put when nvmet gets an abort request (bsc#1044623).
- scsi: lpfc: Fix debugfs root inode 'lpfc' not getting deleted on driver unload (bsc#1037838).
- scsi: lpfc: Fix defects reported by Coverity Scan (bsc#1042257).
- scsi: lpfc: fix linking against modular NVMe support (bsc#1048912).
- scsi: lpfc: Fix NMI watchdog assertions when running nvmet IOPS tests (bsc#1037838).
- scsi: lpfc: Fix NVMEI driver not decrementing counter causing bad rport state (bsc#1037838).
- scsi: lpfc: Fix nvme io stoppage after link bounce (bsc#1045404).
- scsi: lpfc: Fix NVMEI's handling of NVMET's PRLI response attributes (bsc#1037838).
- scsi: lpfc: Fix NVME I+T not registering NVME as a supported FC4 type (bsc#1037838).
- scsi: lpfc: Fix nvmet RQ resource needs for large block writes (bsc#1037838).
- scsi: lpfc: fix refcount error on node list (bsc#1045404).
- scsi: lpfc: Fix SLI3 drivers attempting NVME ELS commands (bsc#1044623).
- scsi: lpfc: Fix system crash when port is reset (bsc#1037838).
- scsi: lpfc: Fix system panic when express lane enabled (bsc#1044623).
- scsi: lpfc: Fix used-RPI accounting problem (bsc#1037838).
- scsi: lpfc: Reduce time spent in IRQ for received NVME commands (bsc#1044623).
- scsi: lpfc: Separate NVMET data buffer pool fir ELS/CT (bsc#1037838).
- scsi: lpfc: Separate NVMET RQ buffer posting from IO resources SGL/iocbq/context (bsc#1037838).
- scsi: lpfc: update to revision to 11.4.0.1 (bsc#1044623).
- scsi: lpfc: update version to 11.2.0.14 (bsc#1037838).
- scsi: lpfc: Vport creation is failing with 'Link Down' error (bsc#1044623).
- scsi: qedf: Fix a return value in case of error in 'qedf_alloc_global_queues' (bsc#1048912).
- scsi: qedi: Fix return code in qedi_ep_connect() (bsc#1048912).
- scsi: qedi: Remove WARN_ON for untracked cleanup (bsc#1044443).
- scsi: qedi: Remove WARN_ON from clear task context (bsc#1044443).
- scsi: storvsc: Prefer kcalloc over kzalloc with multiply (fate#320485).
- scsi: storvsc: remove return at end of void function (fate#320485).
- scsi: storvsc: Workaround for virtual DVD SCSI version (fate#320485, bnc#1044636).
- sfc: Add ethtool -m support for QSFP modules (bsc#1049619).
- smartpqi: limit transfer length to 1MB (bsc#1025461).
- smsc75xx: use skb_cow_head() to deal with cloned skbs (bsc#1045154).
- sr9700: use skb_cow_head() to deal with cloned skbs (bsc#1045154).
- string.h: add memcpy_and_pad() (bsc#1048146).
- sysctl: do not print negative flag for proc_douintvec (bnc#1046985).
- Temporarily disable iwlwifi-expose-default-fallback-ucode-api ... for updating iwlwifi stack
- timers: Plug locking race vs. timer migration (bnc#1022476).
- tools: hv: Add clean up for included files in Ubuntu net config (fate#320485).
- tools: hv: Add clean up function for Ubuntu config (fate#320485).
- tools: hv: properly handle long paths (fate#320485).
- tools: hv: set allow-hotplug for VF on Ubuntu (fate#320485).
- tools: hv: set hotplug for VF on Suse (fate#320485).
- Tools: hv: vss: Thaw the filesystem and continue if freeze call has timed out (fate#320485).
- tpm: Issue a TPM2_Shutdown for TPM2 devices (bsc#1053117).
- tpm: KABI fix (bsc#1053117).
- tpm_tis: Fix IRQ autoprobing when using platform_device (bsc#1020645, fate#321435, fate#321507, fate#321600, Pending fixes 2017-07-06).
- tpm_tis: Use platform_get_irq (bsc#1020645, fate#321435, fate#321507, fate#321600, Pending fixes 2017-07-06).
- tpm/tpm_crb: fix priv-&gt;cmd_size initialisation (bsc#1020645, fate#321435, fate#321507, fate#321600, Pending SUSE Kernel Fixes).
- udf: Fix deadlock between writeback and udf_setsize() (bsc#1012829).
- udf: Fix races with i_size changes during readpage (bsc#1012829).
- Update config files: add CONFIG_IWLWIFI_PCIE_RTPM=y (FATE#323335)
- vfs: fix missing inode_get_dev sites (bsc#1052049).
- vmbus: cleanup header file style (fate#320485).
- vmbus: expose debug info for drivers (fate#320485).
- vmbus: fix spelling errors (fate#320485).
- vmbus: introduce in-place packet iterator (fate#320485).
- vmbus: only reschedule tasklet if time limit exceeded (fate#320485).
- vmbus: re-enable channel tasklet (fate#320485).
- vmbus: remove unnecessary initialization (fate#320485).
- vmbus: remove useless return's (fate#320485).
- x86/dmi: Switch dmi_remap() from ioremap() to ioremap_cache() (bsc#1051399).
- x86/hyperv: Check frequency MSRs presence according to the specification (fate#320485).
- x86/LDT: Print the real LDT base address (bsc#1051478).
- x86/mce: Make timer handling more robust (bsc#1042422).
- x86/panic: replace smp_send_stop() with kdump friendly version in panic path (bsc#1051478).
- x86/platform/uv/BAU: Disable BAU on single hub configurations (bsc#1050320).
- x86/platform/uv/BAU: Fix congested_response_us not taking effect (bsc#1050322).
- xen: allocate page for shared info page from low memory (bnc#1038616).
- xen/balloon: do not online new memory initially (bnc#1028173).
- xen: hold lock_device_hotplug throughout vcpu hotplug operations (bsc#1042422).
- xen-netfront: Rework the fix for Rx stall during OOM and network stress (git-fixes).
- xen/pvh*: Support &gt; 32 VCPUs at domain restore (bnc#1045563).
- xfrm: NULL dereference on allocation failure (bsc#1047343).
- xfrm: Oops on error in pfkey_msg2xfrm_state() (bsc#1047653).
- xfs: detect and handle invalid iclog size set by mkfs (bsc#1043598).
- xfs: detect and trim torn writes during log recovery (bsc#1036215).
- xfs: do not BUG() on mixed direct and mapped I/O (bsc#1050188).
- xfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- xfs: refactor and open code log record crc check (bsc#1036215).
- xfs: refactor log record start detection into a new helper (bsc#1036215).
- xfs: return start block of first bad log record during recovery (bsc#1036215).
- xfs: support a crc verification only log record pass (bsc#1036215).
- xgene: Do not fail probe, if there is no clk resource for SGMII interfaces (bsc#1048501).
- xilinx network drivers: disable (bsc#1046170).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-29"/>
	<updated date="2017-08-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005778">SUSE bug 1005778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006180">SUSE bug 1006180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011913">SUSE bug 1011913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012829">SUSE bug 1012829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013887">SUSE bug 1013887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015337">SUSE bug 1015337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015342">SUSE bug 1015342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016119">SUSE bug 1016119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019151">SUSE bug 1019151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019695">SUSE bug 1019695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020645">SUSE bug 1020645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022476">SUSE bug 1022476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022600">SUSE bug 1022600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022604">SUSE bug 1022604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023175">SUSE bug 1023175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024346">SUSE bug 1024346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024373">SUSE bug 1024373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025461">SUSE bug 1025461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026570">SUSE bug 1026570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028173">SUSE bug 1028173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028286">SUSE bug 1028286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029693">SUSE bug 1029693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030552">SUSE bug 1030552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031515">SUSE bug 1031515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031717">SUSE bug 1031717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031784">SUSE bug 1031784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033587">SUSE bug 1033587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034075">SUSE bug 1034075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034113">SUSE bug 1034113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034762">SUSE bug 1034762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036215">SUSE bug 1036215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036632">SUSE bug 1036632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037344">SUSE bug 1037344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037404">SUSE bug 1037404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037838">SUSE bug 1037838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037994">SUSE bug 1037994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038078">SUSE bug 1038078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038616">SUSE bug 1038616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038792">SUSE bug 1038792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039153">SUSE bug 1039153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039915">SUSE bug 1039915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040307">SUSE bug 1040307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040347">SUSE bug 1040347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040351">SUSE bug 1040351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041958">SUSE bug 1041958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042257">SUSE bug 1042257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042286">SUSE bug 1042286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042314">SUSE bug 1042314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042422">SUSE bug 1042422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042778">SUSE bug 1042778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043261">SUSE bug 1043261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043347">SUSE bug 1043347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043520">SUSE bug 1043520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043598">SUSE bug 1043598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043652">SUSE bug 1043652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043805">SUSE bug 1043805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043912">SUSE bug 1043912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044112">SUSE bug 1044112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044443">SUSE bug 1044443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044623">SUSE bug 1044623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044636">SUSE bug 1044636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045154">SUSE bug 1045154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045293">SUSE bug 1045293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045330">SUSE bug 1045330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045404">SUSE bug 1045404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045563">SUSE bug 1045563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045596">SUSE bug 1045596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045709">SUSE bug 1045709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045715">SUSE bug 1045715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045866">SUSE bug 1045866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045922">SUSE bug 1045922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045937">SUSE bug 1045937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046105">SUSE bug 1046105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046170">SUSE bug 1046170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046434">SUSE bug 1046434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046651">SUSE bug 1046651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046655">SUSE bug 1046655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046682">SUSE bug 1046682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046821">SUSE bug 1046821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046985">SUSE bug 1046985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047027">SUSE bug 1047027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047048">SUSE bug 1047048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047096">SUSE bug 1047096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047118">SUSE bug 1047118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047121">SUSE bug 1047121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047152">SUSE bug 1047152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047174">SUSE bug 1047174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047277">SUSE bug 1047277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047343">SUSE bug 1047343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047354">SUSE bug 1047354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047418">SUSE bug 1047418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047506">SUSE bug 1047506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047595">SUSE bug 1047595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047651">SUSE bug 1047651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047653">SUSE bug 1047653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047670">SUSE bug 1047670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047802">SUSE bug 1047802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048146">SUSE bug 1048146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048155">SUSE bug 1048155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048221">SUSE bug 1048221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048317">SUSE bug 1048317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048348">SUSE bug 1048348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048356">SUSE bug 1048356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048421">SUSE bug 1048421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048451">SUSE bug 1048451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048501">SUSE bug 1048501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048891">SUSE bug 1048891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048912">SUSE bug 1048912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048914">SUSE bug 1048914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048916">SUSE bug 1048916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048919">SUSE bug 1048919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049231">SUSE bug 1049231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049289">SUSE bug 1049289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049298">SUSE bug 1049298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049361">SUSE bug 1049361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049483">SUSE bug 1049483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049486">SUSE bug 1049486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049603">SUSE bug 1049603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049619">SUSE bug 1049619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049645">SUSE bug 1049645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049706">SUSE bug 1049706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049882">SUSE bug 1049882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050061">SUSE bug 1050061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050188">SUSE bug 1050188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050211">SUSE bug 1050211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050320">SUSE bug 1050320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050322">SUSE bug 1050322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050677">SUSE bug 1050677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051022">SUSE bug 1051022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051048">SUSE bug 1051048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051059">SUSE bug 1051059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051239">SUSE bug 1051239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051399">SUSE bug 1051399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051471">SUSE bug 1051471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051478">SUSE bug 1051478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051479">SUSE bug 1051479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051556">SUSE bug 1051556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051663">SUSE bug 1051663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051689">SUSE bug 1051689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051979">SUSE bug 1051979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052049">SUSE bug 1052049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052223">SUSE bug 1052223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052311">SUSE bug 1052311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052325">SUSE bug 1052325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052365">SUSE bug 1052365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052442">SUSE bug 1052442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052533">SUSE bug 1052533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052709">SUSE bug 1052709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052773">SUSE bug 1052773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052794">SUSE bug 1052794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052899">SUSE bug 1052899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052925">SUSE bug 1052925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053043">SUSE bug 1053043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053117">SUSE bug 1053117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964063">SUSE bug 964063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974215">SUSE bug 974215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998664">SUSE bug 998664</bugzilla>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000111/">CVE-2017-1000111</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000112/">CVE-2017-1000112</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10810/">CVE-2017-10810</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11473/">CVE-2017-11473</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7533/">CVE-2017-7533</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7541/">CVE-2017-7541</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7542/">CVE-2017-7542</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8831/">CVE-2017-8831</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519250" comment="kernel-default-4.4.82-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519251" comment="kernel-default-devel-4.4.82-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519252" comment="kernel-default-extra-4.4.82-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519253" comment="kernel-devel-4.4.82-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519254" comment="kernel-macros-4.4.82-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519255" comment="kernel-source-4.4.82-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519256" comment="kernel-syms-4.4.82-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78199" version="1" class="patch">
	<metadata>
		<title>Security update for libraw (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1039209" ref_url="https://bugzilla.suse.com/1039209" source="BUGZILLA"/>
		<reference ref_id="1039210" ref_url="https://bugzilla.suse.com/1039210" source="BUGZILLA"/>
		<reference ref_id="1039379" ref_url="https://bugzilla.suse.com/1039379" source="BUGZILLA"/>
		<reference ref_id="1039380" ref_url="https://bugzilla.suse.com/1039380" source="BUGZILLA"/>
		<reference ref_id="930683" ref_url="https://bugzilla.suse.com/930683" source="BUGZILLA"/>
		<reference ref_id="957517" ref_url="https://bugzilla.suse.com/957517" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3885" ref_url="https://www.suse.com/security/cve/CVE-2015-3885/" source="CVE"/>
		<reference ref_id="CVE-2015-8367" ref_url="https://www.suse.com/security/cve/CVE-2015-8367/" source="CVE"/>
		<reference ref_id="CVE-2017-6886" ref_url="https://www.suse.com/security/cve/CVE-2017-6886/" source="CVE"/>
		<reference ref_id="CVE-2017-6887" ref_url="https://www.suse.com/security/cve/CVE-2017-6887/" source="CVE"/>
		<reference ref_id="CVE-2017-6889" ref_url="https://www.suse.com/security/cve/CVE-2017-6889/" source="CVE"/>
		<reference ref_id="CVE-2017-6890" ref_url="https://www.suse.com/security/cve/CVE-2017-6890/" source="CVE"/>
		<reference ref_id="CVE-2017-6899" ref_url="https://www.suse.com/security/cve/CVE-2017-6899/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003170.html" source="SUSE-SU"/>
		<description>
This update for libraw fixes the following issues:

- CVE-2015-3885: A specially crafted raw image file could have caused a Denial of Service
  through an integer overflow. (bsc#930683)

- CVE-2015-8367: The function phase_one_correct() did not handle memory object initialization
  correctly, which may have caused some other problems. (bsc#957517)

- CVE-2017-6886: memory corruption in parse_tiff_ifd() func (internal/dcraw_common.cpp) could lead to Denial of service (bsc#1039380)

- CVE-2017-6889: integer overflow error within the 'foveon_load_camf()' function (dcraw_foveon.c) could lead to Denial of service (bsc#1039210)

- CVE-2017-6890: boundary error within the 'foveon_load_camf()' function (dcraw_foveon.c) (bsc#1039209)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-30"/>
	<updated date="2017-08-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1039209">SUSE bug 1039209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039210">SUSE bug 1039210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039379">SUSE bug 1039379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039380">SUSE bug 1039380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930683">SUSE bug 930683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957517">SUSE bug 957517</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3885/">CVE-2015-3885</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8367/">CVE-2015-8367</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6886/">CVE-2017-6886</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6887/">CVE-2017-6887</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6889/">CVE-2017-6889</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6890/">CVE-2017-6890</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6899/">CVE-2017-6899</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518042" comment="libraw9-0.15.4-9.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78200" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1047236" ref_url="https://bugzilla.suse.com/1047236" source="BUGZILLA"/>
		<reference ref_id="1047240" ref_url="https://bugzilla.suse.com/1047240" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2017-9233" ref_url="https://www.suse.com/security/cve/CVE-2017-9233/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003169.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2016-9063: Possible integer overflow to fix inside XML_Parse leading to unexpected behaviour (bsc#1047240)
- CVE-2017-9233: External Entity Vulnerability could lead to denial of service (bsc#1047236)


		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-30"/>
	<updated date="2017-08-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047236">SUSE bug 1047236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047240">SUSE bug 1047240</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9233/">CVE-2017-9233</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518043" comment="expat-2.1.0-21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518044" comment="libexpat1-2.1.0-21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518045" comment="libexpat1-32bit-2.1.0-21.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78201" version="1" class="patch">
	<metadata>
		<title>Security update for libreoffice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1015115" ref_url="https://bugzilla.suse.com/1015115" source="BUGZILLA"/>
		<reference ref_id="1015118" ref_url="https://bugzilla.suse.com/1015118" source="BUGZILLA"/>
		<reference ref_id="1015360" ref_url="https://bugzilla.suse.com/1015360" source="BUGZILLA"/>
		<reference ref_id="1017925" ref_url="https://bugzilla.suse.com/1017925" source="BUGZILLA"/>
		<reference ref_id="1021369" ref_url="https://bugzilla.suse.com/1021369" source="BUGZILLA"/>
		<reference ref_id="1021373" ref_url="https://bugzilla.suse.com/1021373" source="BUGZILLA"/>
		<reference ref_id="1021675" ref_url="https://bugzilla.suse.com/1021675" source="BUGZILLA"/>
		<reference ref_id="1028817" ref_url="https://bugzilla.suse.com/1028817" source="BUGZILLA"/>
		<reference ref_id="1034192" ref_url="https://bugzilla.suse.com/1034192" source="BUGZILLA"/>
		<reference ref_id="1034329" ref_url="https://bugzilla.suse.com/1034329" source="BUGZILLA"/>
		<reference ref_id="1034568" ref_url="https://bugzilla.suse.com/1034568" source="BUGZILLA"/>
		<reference ref_id="1035087" ref_url="https://bugzilla.suse.com/1035087" source="BUGZILLA"/>
		<reference ref_id="1035589" ref_url="https://bugzilla.suse.com/1035589" source="BUGZILLA"/>
		<reference ref_id="1036975" ref_url="https://bugzilla.suse.com/1036975" source="BUGZILLA"/>
		<reference ref_id="1042828" ref_url="https://bugzilla.suse.com/1042828" source="BUGZILLA"/>
		<reference ref_id="1045339" ref_url="https://bugzilla.suse.com/1045339" source="BUGZILLA"/>
		<reference ref_id="947117" ref_url="https://bugzilla.suse.com/947117" source="BUGZILLA"/>
		<reference ref_id="948058" ref_url="https://bugzilla.suse.com/948058" source="BUGZILLA"/>
		<reference ref_id="954776" ref_url="https://bugzilla.suse.com/954776" source="BUGZILLA"/>
		<reference ref_id="959926" ref_url="https://bugzilla.suse.com/959926" source="BUGZILLA"/>
		<reference ref_id="962777" ref_url="https://bugzilla.suse.com/962777" source="BUGZILLA"/>
		<reference ref_id="963436" ref_url="https://bugzilla.suse.com/963436" source="BUGZILLA"/>
		<reference ref_id="972777" ref_url="https://bugzilla.suse.com/972777" source="BUGZILLA"/>
		<reference ref_id="975283" ref_url="https://bugzilla.suse.com/975283" source="BUGZILLA"/>
		<reference ref_id="976831" ref_url="https://bugzilla.suse.com/976831" source="BUGZILLA"/>
		<reference ref_id="989564" ref_url="https://bugzilla.suse.com/989564" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8947" ref_url="https://www.suse.com/security/cve/CVE-2015-8947/" source="CVE"/>
		<reference ref_id="CVE-2016-10327" ref_url="https://www.suse.com/security/cve/CVE-2016-10327/" source="CVE"/>
		<reference ref_id="CVE-2016-2052" ref_url="https://www.suse.com/security/cve/CVE-2016-2052/" source="CVE"/>
		<reference ref_id="CVE-2017-7870" ref_url="https://www.suse.com/security/cve/CVE-2017-7870/" source="CVE"/>
		<reference ref_id="CVE-2017-7882" ref_url="https://www.suse.com/security/cve/CVE-2017-7882/" source="CVE"/>
		<reference ref_id="CVE-2017-8358" ref_url="https://www.suse.com/security/cve/CVE-2017-8358/" source="CVE"/>
		<reference ref_id="CVE-2017-9433" ref_url="https://www.suse.com/security/cve/CVE-2017-9433/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003174.html" source="SUSE-SU"/>
		<description>

LibreOffice was updated to version 5.3.5.2, bringing new features and enhancements:

Writer:

- New 'Go to Page' dialog for quickly jumping to another page.
- Support for 'Table Styles'.
- New drawing tools were added.
- Improvements in the toolbar.
- Borderless padding is displayed.

Calc:

- New drawing tools were added.
- In new installations the default setting for new documents is now 'Enable wildcards in formulas'
  instead of regular expressions.
- Improved compatibility with ODF 1.2

Impress:

- Images inserted via 'Photo Album' can now be linked instead of embedded in the document.
- When launching Impress, a Template Selector allows you to choose a Template to start with.
- Two new default templates: Vivid and Pencil.
- All existing templates have been improved.

Draw:

- New arrow endings, including Crow's foot notation's ones.

Base:

- Firebird has been upgraded to version 3.0.0. It is unable to read back Firebird 2.5 data,
  so embedded Firebird odb files created in LibreOffice version up to 5.2 cannot be opened
  with LibreOffice 5.3.

Some security issues have also been fixed:

- CVE-2017-7870: An out-of-bounds write caused by a heap-based buffer overflow related to
  the tools::Polygon::Insert function.
- CVE-2017-7882: An out-of-bounds write related to the HWPFile::TagsRead function.
- CVE-2017-8358: an out-of-bounds write caused by a heap-based buffer overflow related to
  the ReadJPEG function.
- CVE-2016-10327: An out-of-bounds write caused by a heap-based buffer overflow related to
  the EnhWMFReader::ReadEnhWMF function.
- CVE-2017-9433: An out-of-bounds write caused by a heap-based buffer overflow related to
  the MsWrd1Parser::readFootnoteCorrespondance function in libmwaw.

A comprehensive list of new features and changes in this release is available at:
https://wiki.documentfoundation.org/ReleaseNotes/5.3
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-31"/>
	<updated date="2017-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015115">SUSE bug 1015115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015118">SUSE bug 1015118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015360">SUSE bug 1015360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017925">SUSE bug 1017925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021369">SUSE bug 1021369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021373">SUSE bug 1021373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021675">SUSE bug 1021675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028817">SUSE bug 1028817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034192">SUSE bug 1034192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034329">SUSE bug 1034329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034568">SUSE bug 1034568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035087">SUSE bug 1035087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035589">SUSE bug 1035589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036975">SUSE bug 1036975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042828">SUSE bug 1042828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045339">SUSE bug 1045339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947117">SUSE bug 947117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948058">SUSE bug 948058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954776">SUSE bug 954776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959926">SUSE bug 959926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962777">SUSE bug 962777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963436">SUSE bug 963436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972777">SUSE bug 972777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975283">SUSE bug 975283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976831">SUSE bug 976831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989564">SUSE bug 989564</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8947/">CVE-2015-8947</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10327/">CVE-2016-10327</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2052/">CVE-2016-2052</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7870/">CVE-2017-7870</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7882/">CVE-2017-7882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8358/">CVE-2017-8358</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9433/">CVE-2017-9433</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519257" comment="libixion-0_12-0-0.12.1-13.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519258" comment="libmwaw-0_3-3-0.3.11-7.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519259" comment="liborcus-0_12-0-0.12.1-10.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519260" comment="libreoffice-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519261" comment="libreoffice-base-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519262" comment="libreoffice-base-drivers-mysql-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519263" comment="libreoffice-base-drivers-postgresql-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519264" comment="libreoffice-calc-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519265" comment="libreoffice-calc-extensions-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519266" comment="libreoffice-draw-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519267" comment="libreoffice-filters-optional-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519268" comment="libreoffice-gnome-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519269" comment="libreoffice-icon-theme-galaxy-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519270" comment="libreoffice-icon-theme-tango-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519271" comment="libreoffice-impress-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519272" comment="libreoffice-l10n-af-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519273" comment="libreoffice-l10n-ar-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519274" comment="libreoffice-l10n-ca-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519275" comment="libreoffice-l10n-cs-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519276" comment="libreoffice-l10n-da-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519277" comment="libreoffice-l10n-de-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519278" comment="libreoffice-l10n-en-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519279" comment="libreoffice-l10n-es-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519280" comment="libreoffice-l10n-fi-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519281" comment="libreoffice-l10n-fr-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519282" comment="libreoffice-l10n-gu-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519283" comment="libreoffice-l10n-hi-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519284" comment="libreoffice-l10n-hu-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519285" comment="libreoffice-l10n-it-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519286" comment="libreoffice-l10n-ja-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519287" comment="libreoffice-l10n-ko-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519288" comment="libreoffice-l10n-nb-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519289" comment="libreoffice-l10n-nl-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519290" comment="libreoffice-l10n-nn-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519291" comment="libreoffice-l10n-pl-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519292" comment="libreoffice-l10n-pt_BR-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519293" comment="libreoffice-l10n-pt_PT-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519294" comment="libreoffice-l10n-ro-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519295" comment="libreoffice-l10n-ru-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519296" comment="libreoffice-l10n-sk-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519297" comment="libreoffice-l10n-sv-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519298" comment="libreoffice-l10n-xh-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519299" comment="libreoffice-l10n-zh_CN-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519300" comment="libreoffice-l10n-zh_TW-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519301" comment="libreoffice-l10n-zu-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519302" comment="libreoffice-mailmerge-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519303" comment="libreoffice-math-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519304" comment="libreoffice-officebean-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519305" comment="libreoffice-pyuno-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519306" comment="libreoffice-writer-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519307" comment="libreoffice-writer-extensions-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519308" comment="libreofficekit-5.3.5.2-43.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519309" comment="libstaroffice-0_0-0-0.0.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519310" comment="libzmf-0_0-0-0.0.1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519311" comment="myspell-af_NA-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519312" comment="myspell-af_ZA-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519313" comment="myspell-ar-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519314" comment="myspell-ar_AE-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519315" comment="myspell-ar_BH-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519316" comment="myspell-ar_DZ-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519317" comment="myspell-ar_EG-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519318" comment="myspell-ar_IQ-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519319" comment="myspell-ar_JO-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519320" comment="myspell-ar_KW-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519321" comment="myspell-ar_LB-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519322" comment="myspell-ar_LY-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519323" comment="myspell-ar_MA-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519324" comment="myspell-ar_OM-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519325" comment="myspell-ar_QA-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519326" comment="myspell-ar_SA-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519327" comment="myspell-ar_SD-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519328" comment="myspell-ar_SY-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519329" comment="myspell-ar_TN-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519330" comment="myspell-ar_YE-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519331" comment="myspell-be_BY-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519332" comment="myspell-bg_BG-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519333" comment="myspell-bn_BD-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519334" comment="myspell-bn_IN-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519335" comment="myspell-bs-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519336" comment="myspell-bs_BA-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519337" comment="myspell-ca-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519338" comment="myspell-ca_AD-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519339" comment="myspell-ca_ES-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519340" comment="myspell-ca_ES_valencia-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519341" comment="myspell-ca_FR-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519342" comment="myspell-ca_IT-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519343" comment="myspell-cs_CZ-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519344" comment="myspell-da_DK-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519345" comment="myspell-de-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519346" comment="myspell-de_AT-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519347" comment="myspell-de_CH-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519348" comment="myspell-de_DE-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519349" comment="myspell-dictionaries-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519350" comment="myspell-el_GR-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519351" comment="myspell-en-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519352" comment="myspell-en_AU-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519353" comment="myspell-en_BS-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519354" comment="myspell-en_BZ-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519355" comment="myspell-en_CA-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519356" comment="myspell-en_GB-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519357" comment="myspell-en_GH-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519358" comment="myspell-en_IE-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519359" comment="myspell-en_IN-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519360" comment="myspell-en_JM-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519361" comment="myspell-en_MW-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519362" comment="myspell-en_NA-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519363" comment="myspell-en_NZ-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519364" comment="myspell-en_PH-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519365" comment="myspell-en_TT-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519366" comment="myspell-en_US-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519367" comment="myspell-en_ZA-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519368" comment="myspell-en_ZW-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519369" comment="myspell-es-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519370" comment="myspell-es_AR-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519371" comment="myspell-es_BO-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519372" comment="myspell-es_CL-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519373" comment="myspell-es_CO-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519374" comment="myspell-es_CR-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519375" comment="myspell-es_CU-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519376" comment="myspell-es_DO-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519377" comment="myspell-es_EC-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519378" comment="myspell-es_ES-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519379" comment="myspell-es_GT-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519380" comment="myspell-es_HN-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519381" comment="myspell-es_MX-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519382" comment="myspell-es_NI-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519383" comment="myspell-es_PA-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519384" comment="myspell-es_PE-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519385" comment="myspell-es_PR-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519386" comment="myspell-es_PY-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519387" comment="myspell-es_SV-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519388" comment="myspell-es_UY-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519389" comment="myspell-es_VE-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519390" comment="myspell-et_EE-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519391" comment="myspell-fr_BE-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519392" comment="myspell-fr_CA-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519393" comment="myspell-fr_CH-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519394" comment="myspell-fr_FR-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519395" comment="myspell-fr_LU-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519396" comment="myspell-fr_MC-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519397" comment="myspell-gu_IN-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519398" comment="myspell-he_IL-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519399" comment="myspell-hi_IN-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519400" comment="myspell-hr_HR-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519401" comment="myspell-hu_HU-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519402" comment="myspell-it_IT-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519403" comment="myspell-lightproof-en-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519404" comment="myspell-lightproof-hu_HU-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519405" comment="myspell-lightproof-pt_BR-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519406" comment="myspell-lightproof-ru_RU-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519407" comment="myspell-lo_LA-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519408" comment="myspell-lt_LT-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519409" comment="myspell-lv_LV-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519410" comment="myspell-nb_NO-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519411" comment="myspell-nl_BE-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519412" comment="myspell-nl_NL-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519413" comment="myspell-nn_NO-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519414" comment="myspell-no-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519415" comment="myspell-pl_PL-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519416" comment="myspell-pt_AO-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519417" comment="myspell-pt_BR-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519418" comment="myspell-pt_PT-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519419" comment="myspell-ro-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519420" comment="myspell-ro_RO-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519421" comment="myspell-ru_RU-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519422" comment="myspell-sk_SK-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519423" comment="myspell-sl_SI-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519424" comment="myspell-sr-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519425" comment="myspell-sr_CS-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519426" comment="myspell-sr_Latn_CS-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519427" comment="myspell-sr_Latn_RS-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519428" comment="myspell-sr_RS-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519429" comment="myspell-sv_FI-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519430" comment="myspell-sv_SE-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519431" comment="myspell-te-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519432" comment="myspell-te_IN-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519433" comment="myspell-th_TH-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519434" comment="myspell-uk_UA-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519435" comment="myspell-vi-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519436" comment="myspell-vi_VN-20170511-16.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519437" comment="myspell-zu_ZA-20170511-16.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78202" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="929629" ref_url="https://bugzilla.suse.com/929629" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8146" ref_url="https://www.suse.com/security/cve/CVE-2014-8146/" source="CVE"/>
		<reference ref_id="CVE-2014-8147" ref_url="https://www.suse.com/security/cve/CVE-2014-8147/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003176.html" source="SUSE-SU"/>
		<description>
icu was updated to fix two security issues.

These security issues were fixed:
- CVE-2014-8147: The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional
  Algorithm implementation in ICU4C in International Components for Unicode (ICU) used an integer
  data type that is inconsistent with a header file, which allowed remote attackers to cause a
  denial of service (incorrect malloc followed by invalid free) or possibly execute arbitrary code
  via crafted text (bsc#929629).
- CVE-2014-8146: The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional
  Algorithm implementation in ICU4C in International Components for Unicode (ICU) did not properly
  track directionally isolated pieces of text, which allowed remote attackers to cause a denial of
  service (heap-based buffer overflow) or possibly execute arbitrary code via crafted text
  (bsc#929629).
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-31"/>
	<updated date="2017-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/929629">SUSE bug 929629</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8146/">CVE-2014-8146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8147/">CVE-2014-8147</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518046" comment="icu-52.1-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518047" comment="libicu52_1-52.1-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518048" comment="libicu52_1-32bit-52.1-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518049" comment="libicu52_1-data-52.1-8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78203" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1002573" ref_url="https://bugzilla.suse.com/1002573" source="BUGZILLA"/>
		<reference ref_id="1026236" ref_url="https://bugzilla.suse.com/1026236" source="BUGZILLA"/>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1035231" ref_url="https://bugzilla.suse.com/1035231" source="BUGZILLA"/>
		<reference ref_id="1046637" ref_url="https://bugzilla.suse.com/1046637" source="BUGZILLA"/>
		<reference ref_id="1049578" ref_url="https://bugzilla.suse.com/1049578" source="BUGZILLA"/>
		<reference ref_id="1051787" ref_url="https://bugzilla.suse.com/1051787" source="BUGZILLA"/>
		<reference ref_id="1051788" ref_url="https://bugzilla.suse.com/1051788" source="BUGZILLA"/>
		<reference ref_id="1051789" ref_url="https://bugzilla.suse.com/1051789" source="BUGZILLA"/>
		<reference ref_id="1052686" ref_url="https://bugzilla.suse.com/1052686" source="BUGZILLA"/>
		<reference ref_id="1055695" ref_url="https://bugzilla.suse.com/1055695" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<reference ref_id="CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434/" source="CVE"/>
		<reference ref_id="CVE-2017-12135" ref_url="https://www.suse.com/security/cve/CVE-2017-12135/" source="CVE"/>
		<reference ref_id="CVE-2017-12136" ref_url="https://www.suse.com/security/cve/CVE-2017-12136/" source="CVE"/>
		<reference ref_id="CVE-2017-12137" ref_url="https://www.suse.com/security/cve/CVE-2017-12137/" source="CVE"/>
		<reference ref_id="CVE-2017-12855" ref_url="https://www.suse.com/security/cve/CVE-2017-12855/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00003.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-12135: Unbounded recursion in grant table code allowed a malicious
  guest to crash the host or potentially escalate privileges/leak information
  (XSA-226, bsc#1051787).
- CVE-2017-12137: Incorrectly-aligned updates to pagetables allowed for
  privilege escalation (XSA-227, bsc#1051788).
- CVE-2017-12136: Race conditions with maptrack free list handling allows a
  malicious guest administrator to crash the host or escalate their privilege to
  that of the host (XSA-228, bsc#1051789).
- CVE-2017-11434: The dhcp_decode function in slirp/bootp.c allowed local guest
  OS users to cause a denial of service (out-of-bounds read) via a crafted DHCP
  options string (bsc#1049578).
- CVE-2017-10664: qemu-nbd did not ignore SIGPIPE, which allowed remote
  attackers to cause a denial of service (daemon crash) by disconnecting during a
  server-to-client reply attempt (bsc#1046637).
- CVE-2017-12855: Premature clearing of GTF_writing / GTF_reading lead to
  potentially leaking sensitive information (XSA-230 bsc#1052686.

These non-security issues were fixed:

- bsc#1055695: XEN: 11SP4 and 12SP3 HVM guests can not be restored after the save using xl stack
- bsc#1035231: Migration of HVM domU did not use superpages on destination dom0
- bsc#1002573: Optimized LVM functions in block-dmmd block-dmmd
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-16"/>
	<updated date="2017-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1002573">SUSE bug 1002573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026236">SUSE bug 1026236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035231">SUSE bug 1035231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046637">SUSE bug 1046637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049578">SUSE bug 1049578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051787">SUSE bug 1051787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051788">SUSE bug 1051788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051789">SUSE bug 1051789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052686">SUSE bug 1052686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055695">SUSE bug 1055695</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-12135/">CVE-2017-12135</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12136/">CVE-2017-12136</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12137/">CVE-2017-12137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12855/">CVE-2017-12855</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519438" comment="xen-4.9.0_11-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519439" comment="xen-libs-4.9.0_11-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519440" comment="xen-libs-32bit-4.9.0_11-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78204" version="1" class="patch">
	<metadata>
		<title>Security update for libzypp, zypper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1008325" ref_url="https://bugzilla.suse.com/1008325" source="BUGZILLA"/>
		<reference ref_id="1038984" ref_url="https://bugzilla.suse.com/1038984" source="BUGZILLA"/>
		<reference ref_id="1045735" ref_url="https://bugzilla.suse.com/1045735" source="BUGZILLA"/>
		<reference ref_id="1047785" ref_url="https://bugzilla.suse.com/1047785" source="BUGZILLA"/>
		<reference ref_id="1054088" ref_url="https://bugzilla.suse.com/1054088" source="BUGZILLA"/>
		<reference ref_id="1054671" ref_url="https://bugzilla.suse.com/1054671" source="BUGZILLA"/>
		<reference ref_id="1055920" ref_url="https://bugzilla.suse.com/1055920" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7436" ref_url="https://www.suse.com/security/cve/CVE-2017-7436/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00010.html" source="SUSE-SU"/>
		<description>
The Software Update Stack was updated to receive fixes and enhancements.

libzypp:

- Adapt to work with GnuPG 2.1.23. (bsc#1054088)
- Support signing with subkeys. (bsc#1008325)
- Enhance sort order for media.1/products. (bsc#1054671)

zypper:

- Also show a gpg key's subkeys. (bsc#1008325)
- Improve signature check callback messages. (bsc#1045735)
- Add options to tune the GPG check settings. (bsc#1045735)
- Adapt download callback to report and handle unsigned packages. (bsc#1038984, CVE-2017-7436)
- Report missing/optional files as 'not found' rather than 'error'. (bsc#1047785)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-04"/>
	<updated date="2017-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1008325">SUSE bug 1008325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038984">SUSE bug 1038984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045735">SUSE bug 1045735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047785">SUSE bug 1047785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054088">SUSE bug 1054088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054671">SUSE bug 1054671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055920">SUSE bug 1055920</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7436/">CVE-2017-7436</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519441" comment="libzypp-16.15.6-2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519442" comment="zypper-1.13.32-21.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519443" comment="zypper-log-1.13.32-21.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78205" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1051684" ref_url="https://bugzilla.suse.com/1051684" source="BUGZILLA"/>
		<reference ref_id="1051685" ref_url="https://bugzilla.suse.com/1051685" source="BUGZILLA"/>
		<reference ref_id="1053259" ref_url="https://bugzilla.suse.com/1053259" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7546" ref_url="https://www.suse.com/security/cve/CVE-2017-7546/" source="CVE"/>
		<reference ref_id="CVE-2017-7547" ref_url="https://www.suse.com/security/cve/CVE-2017-7547/" source="CVE"/>
		<reference ref_id="CVE-2017-7548" ref_url="https://www.suse.com/security/cve/CVE-2017-7548/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00013.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

* CVE-2017-7547: Further restrict visibility of pg_user_mappings.umoptions, to protect passwords stored as user mapping options. (bsc#1051685)
* CVE-2017-7546: Disallow empty passwords in all password-based authentication methods. (bsc#1051684)
* CVE-2017-7548: lo_put() function ignores ACLs. (bsc#1053259)

The changelog for this release is here:
	https://www.postgresql.org/docs/9.6/static/release-9-6-4.html

		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-05"/>
	<updated date="2017-09-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051684">SUSE bug 1051684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051685">SUSE bug 1051685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053259">SUSE bug 1053259</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7546/">CVE-2017-7546</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7547/">CVE-2017-7547</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7548/">CVE-2017-7548</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518054" comment="libecpg6-9.6.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518055" comment="libpq5-9.6.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518056" comment="libpq5-32bit-9.6.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518057" comment="postgresql96-9.6.4-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78206" version="1" class="patch">
	<metadata>
		<title>Security update for gdk-pixbuf (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1027024" ref_url="https://bugzilla.suse.com/1027024" source="BUGZILLA"/>
		<reference ref_id="1027025" ref_url="https://bugzilla.suse.com/1027025" source="BUGZILLA"/>
		<reference ref_id="1027026" ref_url="https://bugzilla.suse.com/1027026" source="BUGZILLA"/>
		<reference ref_id="1048289" ref_url="https://bugzilla.suse.com/1048289" source="BUGZILLA"/>
		<reference ref_id="1048544" ref_url="https://bugzilla.suse.com/1048544" source="BUGZILLA"/>
		<reference ref_id="1049877" ref_url="https://bugzilla.suse.com/1049877" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2862" ref_url="https://www.suse.com/security/cve/CVE-2017-2862/" source="CVE"/>
		<reference ref_id="CVE-2017-2870" ref_url="https://www.suse.com/security/cve/CVE-2017-2870/" source="CVE"/>
		<reference ref_id="CVE-2017-6312" ref_url="https://www.suse.com/security/cve/CVE-2017-6312/" source="CVE"/>
		<reference ref_id="CVE-2017-6313" ref_url="https://www.suse.com/security/cve/CVE-2017-6313/" source="CVE"/>
		<reference ref_id="CVE-2017-6314" ref_url="https://www.suse.com/security/cve/CVE-2017-6314/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00015.html" source="SUSE-SU"/>
		<description>
This update for gdk-pixbuf fixes the following issues:

- CVE-2017-2862: JPEG gdk_pixbuf__jpeg_image_load_increment Code Execution Vulnerability (bsc#1048289)
- CVE-2017-2870: tiff_image_parse Code Execution Vulnerability (bsc#1048544)
- CVE-2017-6313: A dangerous integer underflow in io-icns.c (bsc#1027024)
- CVE-2017-6314: Infinite loop in io-tiff.c (bsc#1027025)
- CVE-2017-6312: Out-of-bounds read on io-ico.c (bsc#1027026)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-06"/>
	<updated date="2017-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027024">SUSE bug 1027024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027025">SUSE bug 1027025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027026">SUSE bug 1027026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048289">SUSE bug 1048289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048544">SUSE bug 1048544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049877">SUSE bug 1049877</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2862/">CVE-2017-2862</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-2870/">CVE-2017-2870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6312/">CVE-2017-6312</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6313/">CVE-2017-6313</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6314/">CVE-2017-6314</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518058" comment="gdk-pixbuf-lang-2.34.0-19.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518059" comment="gdk-pixbuf-query-loaders-2.34.0-19.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518060" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518061" comment="libgdk_pixbuf-2_0-0-2.34.0-19.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518062" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518063" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78207" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1046856" ref_url="https://bugzilla.suse.com/1046856" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000083" ref_url="https://www.suse.com/security/cve/CVE-2017-1000083/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00018.html" source="SUSE-SU"/>
		<description>
This update for evince fixes the following issue:

- CVE-2017-1000083: Remote attackers could have used the comicbook mode of evince to inject shell code (bsc#1046856).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-08"/>
	<updated date="2017-09-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046856">SUSE bug 1046856</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000083/">CVE-2017-1000083</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518064" comment="evince-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518065" comment="evince-browser-plugin-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518066" comment="evince-lang-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518067" comment="evince-plugin-djvudocument-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518068" comment="evince-plugin-dvidocument-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518069" comment="evince-plugin-pdfdocument-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518070" comment="evince-plugin-psdocument-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518071" comment="evince-plugin-tiffdocument-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518072" comment="evince-plugin-xpsdocument-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518073" comment="libevdocument3-4-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518074" comment="libevview3-3-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518075" comment="nautilus-evince-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518076" comment="typelib-1_0-EvinceDocument-3_0-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518077" comment="typelib-1_0-EvinceView-3_0-3.20.1-6.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78208" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1011144" ref_url="https://bugzilla.suse.com/1011144" source="BUGZILLA"/>
		<reference ref_id="1031692" ref_url="https://bugzilla.suse.com/1031692" source="BUGZILLA"/>
		<reference ref_id="1046636" ref_url="https://bugzilla.suse.com/1046636" source="BUGZILLA"/>
		<reference ref_id="1047674" ref_url="https://bugzilla.suse.com/1047674" source="BUGZILLA"/>
		<reference ref_id="1048296" ref_url="https://bugzilla.suse.com/1048296" source="BUGZILLA"/>
		<reference ref_id="1048902" ref_url="https://bugzilla.suse.com/1048902" source="BUGZILLA"/>
		<reference ref_id="1049381" ref_url="https://bugzilla.suse.com/1049381" source="BUGZILLA"/>
		<reference ref_id="1050268" ref_url="https://bugzilla.suse.com/1050268" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<reference ref_id="CVE-2017-10806" ref_url="https://www.suse.com/security/cve/CVE-2017-10806/" source="CVE"/>
		<reference ref_id="CVE-2017-11334" ref_url="https://www.suse.com/security/cve/CVE-2017-11334/" source="CVE"/>
		<reference ref_id="CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00024.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

* CVE-2017-10664: Fix DOS vulnerability in qemu-nbd (bsc#1046636)
* CVE-2017-10806: Fix DOS from stack overflow in debug messages of usb redirection
  support (bsc#1047674) 
* CVE-2017-11334: Fix OOB access during DMA operation (bsc#1048902) 
* CVE-2017-11434: Fix OOB access parsing dhcp slirp options (bsc#1049381) 

Following non-security issues were fixed:

- Postrequire acl for setfacl
- Prerequire shadow for groupadd
- The recent security fix for CVE-2017-11334 adversely affects Xen.
  Include two additional patches to make sure Xen is going to be OK.
- Pre-add group kvm for qemu-tools (bsc#1011144)
- Fixed a few more inaccuracies in the support docs.
- Fix support docs to indicate ARM64 is now fully L3 supported in
  SLES 12 SP3. Apply a few additional clarifications in the support
  docs. (bsc#1050268)
- Adjust to libvdeplug-devel package naming changes.
- Fix migration with xhci (bsc#1048296)
- Increase VNC delay to fix missing keyboard input events (bsc#1031692)
- Remove build dependency package iasl used for seabios

		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-11"/>
	<updated date="2017-09-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1011144">SUSE bug 1011144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031692">SUSE bug 1031692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046636">SUSE bug 1046636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047674">SUSE bug 1047674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048296">SUSE bug 1048296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048902">SUSE bug 1048902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049381">SUSE bug 1049381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050268">SUSE bug 1050268</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10806/">CVE-2017-10806</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11334/">CVE-2017-11334</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519444" comment="qemu-2.9.0-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519445" comment="qemu-block-curl-2.9.0-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519446" comment="qemu-ipxe-1.0.0-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519447" comment="qemu-kvm-2.9.0-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519448" comment="qemu-seabios-1.10.2-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519449" comment="qemu-sgabios-8-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519450" comment="qemu-tools-2.9.0-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519451" comment="qemu-vgabios-1.10.2-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519452" comment="qemu-x86-2.9.0-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78209" version="1" class="patch">
	<metadata>
		<title>Security update for cvs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1053364" ref_url="https://bugzilla.suse.com/1053364" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12836" ref_url="https://www.suse.com/security/cve/CVE-2017-12836/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003196.html" source="SUSE-SU"/>
		<description>
This update for cvs fixes the following issues:

  - CVE-2017-12836: A leading dash in the argument of the '-d' option could lead to argument injection (bsc#1053364)

  		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-12"/>
	<updated date="2017-09-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1053364">SUSE bug 1053364</bugzilla>
	<cve impact="important" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12836/">CVE-2017-12836</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518087" comment="cvs-1.12.12-182.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78210" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1055695" ref_url="https://bugzilla.suse.com/1055695" source="BUGZILLA"/>
		<reference ref_id="1056278" ref_url="https://bugzilla.suse.com/1056278" source="BUGZILLA"/>
		<reference ref_id="1056280" ref_url="https://bugzilla.suse.com/1056280" source="BUGZILLA"/>
		<reference ref_id="1056281" ref_url="https://bugzilla.suse.com/1056281" source="BUGZILLA"/>
		<reference ref_id="1056282" ref_url="https://bugzilla.suse.com/1056282" source="BUGZILLA"/>
		<reference ref_id="1057358" ref_url="https://bugzilla.suse.com/1057358" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14316" ref_url="https://www.suse.com/security/cve/CVE-2017-14316/" source="CVE"/>
		<reference ref_id="CVE-2017-14317" ref_url="https://www.suse.com/security/cve/CVE-2017-14317/" source="CVE"/>
		<reference ref_id="CVE-2017-14318" ref_url="https://www.suse.com/security/cve/CVE-2017-14318/" source="CVE"/>
		<reference ref_id="CVE-2017-14319" ref_url="https://www.suse.com/security/cve/CVE-2017-14319/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00025.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-14316: Missing bound check in function `alloc_heap_pages` for an
  internal array allowed attackers using crafted hypercalls to execute
  arbitrary code within Xen (XSA-231, bsc#1056278)
- CVE-2017-14318: The function __gnttab_cache_flush missed a check for grant
  tables, allowing a malicious guest to crash the host or for x86 PV guests to
  potentially escalate privileges (XSA-232, bsc#1056280)
- CVE-2017-14317: A race in cxenstored may have cause a double-free allowind for
  DoS of the xenstored daemon (XSA-233, bsc#1056281).
- CVE-2017-14319: An error while handling grant mappings allowed malicious or
  buggy x86 PV guest to escalate its privileges or crash the hypervisor (XSA-234,
  bsc#1056282).

These non-security issues were fixed:

- bsc#1057358: Fixed boot into SUSE Linux Enterprise 12.3 with secure boot
- bsc#1055695: Fixed restoring updates for HVM guests for ballooned domUs
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-12"/>
	<updated date="2017-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055695">SUSE bug 1055695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056278">SUSE bug 1056278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056280">SUSE bug 1056280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056281">SUSE bug 1056281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056282">SUSE bug 1056282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057358">SUSE bug 1057358</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14316/">CVE-2017-14316</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14317/">CVE-2017-14317</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14318/">CVE-2017-14318</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14319/">CVE-2017-14319</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519453" comment="xen-4.9.0_12-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519454" comment="xen-libs-4.9.0_12-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519455" comment="xen-libs-32bit-4.9.0_12-3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78211" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1057389" ref_url="https://bugzilla.suse.com/1057389" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000251" ref_url="https://www.suse.com/security/cve/CVE-2017-1000251/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00072.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to receive the following security fixes:

- CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel was
  vulnerable to a stack overflow while processing L2CAP configuration
  responses, resulting in a potential remote denial-of-service vulnerability
  but no remote code execution due to use of CONFIG_CC_STACKPROTECTOR.
  [bnc#1057389]
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-18"/>
	<updated date="2017-09-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1057389">SUSE bug 1057389</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000251/">CVE-2017-1000251</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519456" comment="kernel-default-4.4.82-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519457" comment="kernel-default-devel-4.4.82-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519458" comment="kernel-default-extra-4.4.82-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519459" comment="kernel-devel-4.4.82-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519460" comment="kernel-macros-4.4.82-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519461" comment="kernel-source-4.4.82-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519462" comment="kernel-syms-4.4.82-6.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78212" version="1" class="patch">
	<metadata>
		<title>Security update for gcc48 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1011348" ref_url="https://bugzilla.suse.com/1011348" source="BUGZILLA"/>
		<reference ref_id="1022062" ref_url="https://bugzilla.suse.com/1022062" source="BUGZILLA"/>
		<reference ref_id="1028744" ref_url="https://bugzilla.suse.com/1028744" source="BUGZILLA"/>
		<reference ref_id="1039513" ref_url="https://bugzilla.suse.com/1039513" source="BUGZILLA"/>
		<reference ref_id="1044016" ref_url="https://bugzilla.suse.com/1044016" source="BUGZILLA"/>
		<reference ref_id="1050947" ref_url="https://bugzilla.suse.com/1050947" source="BUGZILLA"/>
		<reference ref_id="988274" ref_url="https://bugzilla.suse.com/988274" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11671" ref_url="https://www.suse.com/security/cve/CVE-2017-11671/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003249.html" source="SUSE-SU"/>
		<description>
This update for gcc48 fixes the following issues:

Security issues fixed:

- A new option -fstack-clash-protection is now offered, which mitigates the stack clash type of attacks. [bnc#1039513]
  Future maintenance releases of packages will be built with this option.
- CVE-2017-11671: Fixed rdrand/rdseed code generation issue [bsc#1050947]

Bugs fixed:

- Enable LFS support in 32bit libgcov.a.  [bsc#1044016]
- Bump libffi version in libffi.pc to 3.0.11.
- Fix libffi issue for armv7l.  [bsc#988274]
- Properly diagnose missing -fsanitize=address support on ppc64le.  [bnc#1028744]
- Backport patch for PR65612.  [bnc#1022062]
- Fixed DR#1288.  [bnc#1011348]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-19"/>
	<updated date="2017-09-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011348">SUSE bug 1011348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022062">SUSE bug 1022062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028744">SUSE bug 1028744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039513">SUSE bug 1039513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044016">SUSE bug 1044016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050947">SUSE bug 1050947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988274">SUSE bug 988274</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-11671/">CVE-2017-11671</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518105" comment="cpp48-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518106" comment="gcc48-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518107" comment="gcc48-32bit-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518108" comment="gcc48-c++-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518109" comment="gcc48-gij-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518110" comment="gcc48-gij-32bit-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518111" comment="gcc48-info-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518112" comment="libasan0-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518113" comment="libasan0-32bit-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518114" comment="libgcj48-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518115" comment="libgcj48-32bit-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518116" comment="libgcj48-jar-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518117" comment="libgcj_bc1-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518118" comment="libstdc++48-devel-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518119" comment="libstdc++48-devel-32bit-4.8.5-31.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78213" version="1" class="patch">
	<metadata>
		<title>Security update for emacs (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1058425" ref_url="https://bugzilla.suse.com/1058425" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14482" ref_url="https://www.suse.com/security/cve/CVE-2017-14482/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00074.html" source="SUSE-SU"/>
		<description>
This update for emacs fixes one issues.

This security issue was fixed:

- CVE-2017-14482: Remote code execution via mails with 'Content-Type: text/enriched' (bsc#1058425)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-20"/>
	<updated date="2017-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1058425">SUSE bug 1058425</bugzilla>
	<cve impact="moderate" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14482/">CVE-2017-14482</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518120" comment="emacs-24.3-25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518121" comment="emacs-info-24.3-25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518122" comment="emacs-x11-24.3-25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518123" comment="etags-24.3-25.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78214" version="1" class="patch">
	<metadata>
		<title>Security update for libzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1056996" ref_url="https://bugzilla.suse.com/1056996" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14107" ref_url="https://www.suse.com/security/cve/CVE-2017-14107/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003255.html" source="SUSE-SU"/>
		<description>
This update for libzip fixes one issues.

This security issue was fixed:

- CVE-2017-14107: The _zip_read_eocd64 function mishandled EOCD records, which
  allowed remote attackers to cause a denial of service (memory allocation
  failure in _zip_cdir_grow in zip_dirent.c) via a crafted ZIP archive (bsc#1056996).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-21"/>
	<updated date="2017-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056996">SUSE bug 1056996</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14107/">CVE-2017-14107</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518124" comment="libzip2-0.11.1-13.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78215" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1046779" ref_url="https://bugzilla.suse.com/1046779" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7506" ref_url="https://www.suse.com/security/cve/CVE-2017-7506/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2552-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00081.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following security issues:

- CVE-2017-7506: Fixed an out-of-bounds memory access when processing specially
  crafted messages from authenticated attacker to the spice server resulting into
  crash and/or server memory leak (bsc#1046779).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-22"/>
	<updated date="2017-09-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046779">SUSE bug 1046779</bugzilla>
	<cve impact="important" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7506/">CVE-2017-7506</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519463" comment="libspice-server1-0.12.8-3.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78216" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1044417" ref_url="https://bugzilla.suse.com/1044417" source="BUGZILLA"/>
		<reference ref_id="1045341" ref_url="https://bugzilla.suse.com/1045341" source="BUGZILLA"/>
		<reference ref_id="1056248" ref_url="https://bugzilla.suse.com/1056248" source="BUGZILLA"/>
		<reference ref_id="1056249" ref_url="https://bugzilla.suse.com/1056249" source="BUGZILLA"/>
		<reference ref_id="1056251" ref_url="https://bugzilla.suse.com/1056251" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13765" ref_url="https://www.suse.com/security/cve/CVE-2017-13765/" source="CVE"/>
		<reference ref_id="CVE-2017-13766" ref_url="https://www.suse.com/security/cve/CVE-2017-13766/" source="CVE"/>
		<reference ref_id="CVE-2017-13767" ref_url="https://www.suse.com/security/cve/CVE-2017-13767/" source="CVE"/>
		<reference ref_id="CVE-2017-9617" ref_url="https://www.suse.com/security/cve/CVE-2017-9617/" source="CVE"/>
		<reference ref_id="CVE-2017-9766" ref_url="https://www.suse.com/security/cve/CVE-2017-9766/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003258.html" source="SUSE-SU"/>
		<description>
This update for wireshark to version 2.2.9 fixes several issues.

These security issues were fixed:

- CVE-2017-13767: The MSDP dissector could have gone into an infinite loop.
  This was addressed by adding length validation (bsc#1056248).
- CVE-2017-13766: The Profinet I/O dissector could have crash with an
  out-of-bounds write. This was addressed by adding string validation
  (bsc#1056249).
- CVE-2017-13765: The IrCOMM dissector had a buffer over-read and application
  crash. This was addressed by adding length validation (bsc#1056251).
- CVE-2017-9766: PROFINET IO data with a high recursion depth allowed remote
  attackers to cause a denial of service (stack exhaustion) in the
  dissect_IODWriteReq function (bsc#1045341).
- CVE-2017-9617: Deeply nested DAAP data may have cause stack exhaustion
  (uncontrolled recursion) in the dissect_daap_one_tag function in the DAAP
  dissector (bsc#1044417).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-22"/>
	<updated date="2017-09-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1044417">SUSE bug 1044417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045341">SUSE bug 1045341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056248">SUSE bug 1056248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056249">SUSE bug 1056249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056251">SUSE bug 1056251</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13765/">CVE-2017-13765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13766/">CVE-2017-13766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13767/">CVE-2017-13767</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9617/">CVE-2017-9617</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9766/">CVE-2017-9766</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518125" comment="libwireshark8-2.2.9-48.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518126" comment="libwiretap6-2.2.9-48.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518127" comment="libwscodecs1-2.2.9-48.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518128" comment="libwsutil7-2.2.9-48.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518129" comment="wireshark-2.2.9-48.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518130" comment="wireshark-gtk-2.2.9-48.9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78217" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1033109" ref_url="https://bugzilla.suse.com/1033109" source="BUGZILLA"/>
		<reference ref_id="1033111" ref_url="https://bugzilla.suse.com/1033111" source="BUGZILLA"/>
		<reference ref_id="1033112" ref_url="https://bugzilla.suse.com/1033112" source="BUGZILLA"/>
		<reference ref_id="1033113" ref_url="https://bugzilla.suse.com/1033113" source="BUGZILLA"/>
		<reference ref_id="1033118" ref_url="https://bugzilla.suse.com/1033118" source="BUGZILLA"/>
		<reference ref_id="1033120" ref_url="https://bugzilla.suse.com/1033120" source="BUGZILLA"/>
		<reference ref_id="1033126" ref_url="https://bugzilla.suse.com/1033126" source="BUGZILLA"/>
		<reference ref_id="1033127" ref_url="https://bugzilla.suse.com/1033127" source="BUGZILLA"/>
		<reference ref_id="1033128" ref_url="https://bugzilla.suse.com/1033128" source="BUGZILLA"/>
		<reference ref_id="1033129" ref_url="https://bugzilla.suse.com/1033129" source="BUGZILLA"/>
		<reference ref_id="1033131" ref_url="https://bugzilla.suse.com/1033131" source="BUGZILLA"/>
		<reference ref_id="1038438" ref_url="https://bugzilla.suse.com/1038438" source="BUGZILLA"/>
		<reference ref_id="1042804" ref_url="https://bugzilla.suse.com/1042804" source="BUGZILLA"/>
		<reference ref_id="1042805" ref_url="https://bugzilla.suse.com/1042805" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10371" ref_url="https://www.suse.com/security/cve/CVE-2016-10371/" source="CVE"/>
		<reference ref_id="CVE-2017-7592" ref_url="https://www.suse.com/security/cve/CVE-2017-7592/" source="CVE"/>
		<reference ref_id="CVE-2017-7593" ref_url="https://www.suse.com/security/cve/CVE-2017-7593/" source="CVE"/>
		<reference ref_id="CVE-2017-7594" ref_url="https://www.suse.com/security/cve/CVE-2017-7594/" source="CVE"/>
		<reference ref_id="CVE-2017-7595" ref_url="https://www.suse.com/security/cve/CVE-2017-7595/" source="CVE"/>
		<reference ref_id="CVE-2017-7596" ref_url="https://www.suse.com/security/cve/CVE-2017-7596/" source="CVE"/>
		<reference ref_id="CVE-2017-7597" ref_url="https://www.suse.com/security/cve/CVE-2017-7597/" source="CVE"/>
		<reference ref_id="CVE-2017-7598" ref_url="https://www.suse.com/security/cve/CVE-2017-7598/" source="CVE"/>
		<reference ref_id="CVE-2017-7599" ref_url="https://www.suse.com/security/cve/CVE-2017-7599/" source="CVE"/>
		<reference ref_id="CVE-2017-7600" ref_url="https://www.suse.com/security/cve/CVE-2017-7600/" source="CVE"/>
		<reference ref_id="CVE-2017-7601" ref_url="https://www.suse.com/security/cve/CVE-2017-7601/" source="CVE"/>
		<reference ref_id="CVE-2017-7602" ref_url="https://www.suse.com/security/cve/CVE-2017-7602/" source="CVE"/>
		<reference ref_id="CVE-2017-9403" ref_url="https://www.suse.com/security/cve/CVE-2017-9403/" source="CVE"/>
		<reference ref_id="CVE-2017-9404" ref_url="https://www.suse.com/security/cve/CVE-2017-9404/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003259.html" source="SUSE-SU"/>
		<description>
This update for tiff to version 4.0.8 fixes a several bugs and security issues:

These security issues were fixed:

- CVE-2017-7595: The JPEGSetupEncode function allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image (bsc#1033127).
- CVE-2016-10371: The TIFFWriteDirectoryTagCheckedRational function allowed remote attackers to cause a denial of service (assertion failure and application exit) via a crafted TIFF file (bsc#1038438).
- CVE-2017-7598: Error in tif_dirread.c allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image (bsc#1033118).
- CVE-2017-7596: Undefined behavior because of floats outside their expected value range, which allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image (bsc#1033126).
- CVE-2017-7597: Undefined behavior because of floats outside their expected value range, which allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image (bsc#1033120).
- CVE-2017-7599: Undefined behavior because of shorts outside their expected value range, which allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image (bsc#1033113).
- CVE-2017-7600: Undefined behavior because of chars outside their expected value range, which allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image (bsc#1033112).
- CVE-2017-7601: Because of a shift exponent too large for 64-bit type long undefined behavior was caused, which allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image (bsc#1033111).
- CVE-2017-7602: Prevent signed integer overflow, which allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image (bsc#1033109).
- CVE-2017-7592: The putagreytile function had a left-shift undefined behavior issue, which might allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image (bsc#1033131).
- CVE-2017-7593: Ensure that tif_rawdata is properly initialized, to prevent remote attackers to obtain sensitive information from process memory via a crafted image (bsc#1033129).
- CVE-2017-7594: The OJPEGReadHeaderInfoSecTablesDcTable function allowed remote attackers to cause a denial of service (memory leak) via a crafted image (bsc#1033128).
- CVE-2017-9403: Prevent memory leak in function TIFFReadDirEntryLong8Array, which allowed attackers to cause a denial of service via a crafted file (bsc#1042805).
- CVE-2017-9404: Fixed memory leak vulnerability in function OJPEGReadHeaderInfoSecTablesQTable, which allowed attackers to cause a denial of service via a crafted file (bsc#1042804).

These various other issues were fixed:

- Fix uint32 overflow in TIFFReadEncodedStrip() that caused an
  integer division by zero. Reported by Agostino Sarubbo.
- fix heap-based buffer overflow on generation of PixarLog / LUV
  compressed files, with ColorMap, TransferFunction attached and
  nasty plays with bitspersample. The fix for LUV has not been
  tested, but suffers from the same kind of issue of PixarLog.
- modify ChopUpSingleUncompressedStrip() to instanciate compute
  ntrips as TIFFhowmany_32(td-&gt;td_imagelength, rowsperstrip),
  instead of a logic based on the total size of data. Which is
  faulty is the total size of data is not sufficient to fill the
  whole image, and thus results in reading outside of the
  StripByCounts/StripOffsets arrays when using
  TIFFReadScanline()
- make OJPEGDecode() early exit in case of failure in
  OJPEGPreDecode(). This will avoid a divide by zero, and
  potential other issues.
- fix misleading indentation as warned by GCC.
- revert change done on 2016-01-09 that made Param member of
  TIFFFaxTabEnt structure a uint16 to reduce size of the
  binary. It happens that the Hylafax software uses the tables
  that follow this typedef (TIFFFaxMainTable, TIFFFaxWhiteTable,
  TIFFFaxBlackTable), although they are not in a public libtiff
  header.
- add TIFFReadRGBAStripExt() and TIFFReadRGBATileExt() variants
  of the functions without ext, with an extra argument to control
  the stop_on_error behaviour.
- fix potential memory leaks in error code path of
  TIFFRGBAImageBegin().
- increase libjpeg max memory usable to 10 MB instead of libjpeg
  1MB default. This helps when creating files with 'big' tile,
  without using libjpeg temporary files.
- add _TIFFcalloc()
- return 0 in Encode functions instead of -1 when
  TIFFFlushData1() fails.
- only run JPEGFixupTagsSubsampling() if the YCbCrSubsampling
  tag is not explicitly present. This helps a bit to reduce the
  I/O amount when the tag is present (especially on cloud hosted
  files).
- in LZWPostEncode(), increase, if necessary, the code bit-width
  after flushing the remaining code and before emitting the EOI
  code.
- fix memory leak in error code path of PixarLogSetupDecode().
- fix potential memory leak in
  OJPEGReadHeaderInfoSecTablesQTable,
  OJPEGReadHeaderInfoSecTablesDcTable and
  OJPEGReadHeaderInfoSecTablesAcTable
- avoid crash in Fax3Close() on empty file.
- TIFFFillStrip(): add limitation to the number of bytes read
  in case td_stripbytecount[strip] is bigger than reasonable,
  so as to avoid excessive memory allocation.
- fix memory leak when the underlying codec (ZIP, PixarLog)
  succeeds its setupdecode() method, but PredictorSetup fails.
- TIFFFillStrip() and TIFFFillTile(): avoid excessive memory
  allocation in case of shorten files. Only effective on 64 bit
  builds and non-mapped cases.
- TIFFFillStripPartial() / TIFFSeek(), avoid potential integer
  overflows with read_ahead in CHUNKY_STRIP_READ_SUPPORT mode.
- avoid excessive memory allocation in case of shorten files.
  Only effective on 64 bit builds.
- update tif_rawcc in CHUNKY_STRIP_READ_SUPPORT mode with
  tif_rawdataloaded when calling TIFFStartStrip() or
  TIFFFillStripPartial(). 
- avoid potential int32 overflow in TIFFYCbCrToRGBInit() Fixes
- avoid potential int32 overflows in multiply_ms() and add_ms().
- fix out-of-buffer read in PackBitsDecode() Fixes
- LogL16InitState(): avoid excessive memory allocation when
  RowsPerStrip tag is missing.
- update dec_bitsleft at beginning of LZWDecode(), and update
  tif_rawcc at end of LZWDecode(). This is needed to properly
  work with the latest chnges in tif_read.c in
  CHUNKY_STRIP_READ_SUPPORT mode.
- PixarLogDecode(): resync tif_rawcp with next_in and tif_rawcc
  with avail_in at beginning and end of function, similarly to
  what is done in LZWDecode(). Likely needed so that it works
  properly with latest chnges in tif_read.c in
  CHUNKY_STRIP_READ_SUPPORT mode.
- initYCbCrConversion(): add basic validation of luma and
  refBlackWhite coefficients (just check they are not NaN for
  now), to avoid potential float to int overflows.
- _TIFFVSetField(): fix outside range cast of double to float.
- initYCbCrConversion(): check luma[1] is not zero to avoid division by zero
- _TIFFVSetField(): fix outside range cast of double to float.
- initYCbCrConversion(): check luma[1] is not zero to avoid
  division by zero.
- initYCbCrConversion(): stricter validation for refBlackWhite
  coefficients values.
- avoid uint32 underflow in cpDecodedStrips that can cause
  various issues, such as buffer overflows in the library.
- fix readContigStripsIntoBuffer() in -i (ignore) mode so that
  the output buffer is correctly incremented to avoid write
  outside bounds.
- add 3 extra bytes at end of strip buffer in
  readSeparateStripsIntoBuffer() to avoid read outside of heap
  allocated buffer.
- fix integer division by zero when BitsPerSample is missing.
- fix null pointer dereference in -r mode when the image has no
  StripByteCount tag.
- avoid potential division by zero is BitsPerSamples tag is
  missing.
- when TIFFGetField(, TIFFTAG_NUMBEROFINKS, ) is called, limit
  the return number of inks to SamplesPerPixel, so that code
  that parses ink names doesn't go past the end of the buffer.
- avoid potential division by zero is BitsPerSamples tag is
  missing.
- fix uint32 underflow/overflow that can cause heap-based buffer
  overflow.
- replace assert( (bps % 8) == 0 ) by a non assert check.
- fix 2 heap-based buffer overflows (in PSDataBW and
  PSDataColorContig).
- prevent heap-based buffer overflow in -j mode on a paletted
  image.
- fix wrong usage of memcpy() that can trigger unspecified behaviour.
- avoid potential invalid memory read in t2p_writeproc.
- avoid potential heap-based overflow in t2p_readwrite_pdf_image_tile().
- remove extraneous TIFFClose() in error code path, that caused
  double free.
- error out cleanly in cpContig2SeparateByRow and
  cpSeparate2ContigByRow if BitsPerSample != 8 to avoid heap
  based overflow.
- avoid integer division by zero.
- call TIFFClose() in error code paths.
- emit appropriate message if the input file is empty.
- close TIFF handle in error code path.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-26"/>
	<updated date="2017-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033109">SUSE bug 1033109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033111">SUSE bug 1033111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033112">SUSE bug 1033112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033113">SUSE bug 1033113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033118">SUSE bug 1033118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033120">SUSE bug 1033120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033126">SUSE bug 1033126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033127">SUSE bug 1033127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033128">SUSE bug 1033128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033129">SUSE bug 1033129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033131">SUSE bug 1033131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038438">SUSE bug 1038438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042804">SUSE bug 1042804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042805">SUSE bug 1042805</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10371/">CVE-2016-10371</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7592/">CVE-2017-7592</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7593/">CVE-2017-7593</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7594/">CVE-2017-7594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7595/">CVE-2017-7595</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7596/">CVE-2017-7596</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7597/">CVE-2017-7597</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7598/">CVE-2017-7598</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7599/">CVE-2017-7599</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7600/">CVE-2017-7600</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7601/">CVE-2017-7601</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7602/">CVE-2017-7602</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9403/">CVE-2017-9403</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9404/">CVE-2017-9404</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518131" comment="libtiff5-4.0.8-44.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518132" comment="libtiff5-32bit-4.0.8-44.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78218" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1056088" ref_url="https://bugzilla.suse.com/1056088" source="BUGZILLA"/>
		<reference ref_id="1056090" ref_url="https://bugzilla.suse.com/1056090" source="BUGZILLA"/>
		<reference ref_id="1056093" ref_url="https://bugzilla.suse.com/1056093" source="BUGZILLA"/>
		<reference ref_id="1056095" ref_url="https://bugzilla.suse.com/1056095" source="BUGZILLA"/>
		<reference ref_id="1056097" ref_url="https://bugzilla.suse.com/1056097" source="BUGZILLA"/>
		<reference ref_id="1056101" ref_url="https://bugzilla.suse.com/1056101" source="BUGZILLA"/>
		<reference ref_id="1056105" ref_url="https://bugzilla.suse.com/1056105" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13738" ref_url="https://www.suse.com/security/cve/CVE-2017-13738/" source="CVE"/>
		<reference ref_id="CVE-2017-13739" ref_url="https://www.suse.com/security/cve/CVE-2017-13739/" source="CVE"/>
		<reference ref_id="CVE-2017-13740" ref_url="https://www.suse.com/security/cve/CVE-2017-13740/" source="CVE"/>
		<reference ref_id="CVE-2017-13741" ref_url="https://www.suse.com/security/cve/CVE-2017-13741/" source="CVE"/>
		<reference ref_id="CVE-2017-13743" ref_url="https://www.suse.com/security/cve/CVE-2017-13743/" source="CVE"/>
		<reference ref_id="CVE-2017-13744" ref_url="https://www.suse.com/security/cve/CVE-2017-13744/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003260.html" source="SUSE-SU"/>
		<description>
This update for liblouis fixes several issues.

These security issues were fixed:

- CVE-2017-13738: Prevent illegal address access in the _lou_getALine function that allowed to cause remote DoS (bsc#1056105).
- CVE-2017-13739: Prevent heap-based buffer overflow in the function resolveSubtable() that could have caused DoS or remote code execution (bsc#1056101).
- CVE-2017-13740: Prevent stack-based buffer overflow in the function parseChars() that could have caused DoS or possibly unspecified other impact (bsc#1056097) 
- CVE-2017-13741: Prevent use-after-free in function compileBrailleIndicator() that allowed to cause remote DoS (bsc#1056095).
- CVE_2017-13742: Prevent stack-based buffer overflow in function includeFile that allowed to cause remote DoS (bsc#1056093).
- CVE-2017-13743: Prevent buffer overflow triggered in the function _lou_showString() that allowed to cause remote DoS (bsc#1056090).
- CVE-2017-13744: Prevent illegal address access in the function _lou_getALine() that allowed to cause remote DoS (bsc#1056088).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-26"/>
	<updated date="2017-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056088">SUSE bug 1056088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056090">SUSE bug 1056090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056093">SUSE bug 1056093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056095">SUSE bug 1056095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056097">SUSE bug 1056097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056101">SUSE bug 1056101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056105">SUSE bug 1056105</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13738/">CVE-2017-13738</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13739/">CVE-2017-13739</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13740/">CVE-2017-13740</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13741/">CVE-2017-13741</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13743/">CVE-2017-13743</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13744/">CVE-2017-13744</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518133" comment="liblouis-data-2.6.4-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518134" comment="liblouis9-2.6.4-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518135" comment="python3-louis-2.6.4-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78219" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1052829" ref_url="https://bugzilla.suse.com/1052829" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7753" ref_url="https://www.suse.com/security/cve/CVE-2017-7753/" source="CVE"/>
		<reference ref_id="CVE-2017-7779" ref_url="https://www.suse.com/security/cve/CVE-2017-7779/" source="CVE"/>
		<reference ref_id="CVE-2017-7782" ref_url="https://www.suse.com/security/cve/CVE-2017-7782/" source="CVE"/>
		<reference ref_id="CVE-2017-7784" ref_url="https://www.suse.com/security/cve/CVE-2017-7784/" source="CVE"/>
		<reference ref_id="CVE-2017-7785" ref_url="https://www.suse.com/security/cve/CVE-2017-7785/" source="CVE"/>
		<reference ref_id="CVE-2017-7786" ref_url="https://www.suse.com/security/cve/CVE-2017-7786/" source="CVE"/>
		<reference ref_id="CVE-2017-7787" ref_url="https://www.suse.com/security/cve/CVE-2017-7787/" source="CVE"/>
		<reference ref_id="CVE-2017-7791" ref_url="https://www.suse.com/security/cve/CVE-2017-7791/" source="CVE"/>
		<reference ref_id="CVE-2017-7792" ref_url="https://www.suse.com/security/cve/CVE-2017-7792/" source="CVE"/>
		<reference ref_id="CVE-2017-7798" ref_url="https://www.suse.com/security/cve/CVE-2017-7798/" source="CVE"/>
		<reference ref_id="CVE-2017-7800" ref_url="https://www.suse.com/security/cve/CVE-2017-7800/" source="CVE"/>
		<reference ref_id="CVE-2017-7801" ref_url="https://www.suse.com/security/cve/CVE-2017-7801/" source="CVE"/>
		<reference ref_id="CVE-2017-7802" ref_url="https://www.suse.com/security/cve/CVE-2017-7802/" source="CVE"/>
		<reference ref_id="CVE-2017-7803" ref_url="https://www.suse.com/security/cve/CVE-2017-7803/" source="CVE"/>
		<reference ref_id="CVE-2017-7804" ref_url="https://www.suse.com/security/cve/CVE-2017-7804/" source="CVE"/>
		<reference ref_id="CVE-2017-7807" ref_url="https://www.suse.com/security/cve/CVE-2017-7807/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to ESR 52.3 fixes several issues.

These security issues were fixed: 

- CVE-2017-7807 Domain hijacking through AppCache fallback (bsc#1052829)
- CVE-2017-7791 Spoofing following page navigation with data: protocol and modal alerts (bsc#1052829)
- CVE-2017-7792 Buffer overflow viewing certificates with an extremely long OID (bsc#1052829)
- CVE-2017-7782 WindowsDllDetourPatcher allocates memory without DEP protections (bsc#1052829)
- CVE-2017-7787 Same-origin policy bypass with iframes through page reloads (bsc#1052829)
- CVE-2017-7786 Buffer overflow while painting non-displayable SVG (bsc#1052829)
- CVE-2017-7785 Buffer overflow manipulating ARIA attributes in DOM (bsc#1052829)
- CVE-2017-7784 Use-after-free with image observers (bsc#1052829)
- CVE-2017-7753 Out-of-bounds read with cached style data and pseudo-elements (bsc#1052829)
- CVE-2017-7798 XUL injection in the style editor in devtools (bsc#1052829)
- CVE-2017-7804 Memory protection bypass through WindowsDllDetourPatcher (bsc#1052829)
- CVE-2017-7779 Memory safety bugs fixed in Firefox 55 and Firefox ESR 52.3 (bsc#1052829)
- CVE-2017-7800 Use-after-free in WebSockets during disconnection (bsc#1052829)
- CVE-2017-7801 Use-after-free with marquee during window resizing (bsc#1052829)
- CVE-2017-7802 Use-after-free resizing image elements (bsc#1052829)
- CVE-2017-7803 CSP containing 'sandbox' improperly applied (bsc#1052829)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-28"/>
	<updated date="2017-09-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<cve impact="important" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7753/">CVE-2017-7753</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7779/">CVE-2017-7779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7782/">CVE-2017-7782</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7784/">CVE-2017-7784</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7785/">CVE-2017-7785</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7786/">CVE-2017-7786</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7787/">CVE-2017-7787</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7791/">CVE-2017-7791</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7792/">CVE-2017-7792</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7798/">CVE-2017-7798</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7800/">CVE-2017-7800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7801/">CVE-2017-7801</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7802/">CVE-2017-7802</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7803/">CVE-2017-7803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7804/">CVE-2017-7804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7807/">CVE-2017-7807</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518136" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518137" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78220" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1045693" ref_url="https://bugzilla.suse.com/1045693" source="BUGZILLA"/>
		<reference ref_id="1049505" ref_url="https://bugzilla.suse.com/1049505" source="BUGZILLA"/>
		<reference ref_id="1051017" ref_url="https://bugzilla.suse.com/1051017" source="BUGZILLA"/>
		<reference ref_id="1053600" ref_url="https://bugzilla.suse.com/1053600" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003264.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes several issues.

This security issue was fixed:

- bsc#1053600: Escape ssh commed line to prevent interpreting malicious
  hostname as arguments, allowing for command execution

These non-security issues were fixed:

- bsc#1049505, bsc#1051017: Security manager: Don't autogenerate seclabels of
  type 'none' when AppArmor is inactive
- bsc#1045693: Support chardevs with ARM machines 
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-29"/>
	<updated date="2017-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1045693">SUSE bug 1045693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049505">SUSE bug 1049505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051017">SUSE bug 1051017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053600">SUSE bug 1053600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519464" comment="libvirt-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519465" comment="libvirt-admin-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519466" comment="libvirt-client-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519467" comment="libvirt-daemon-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519468" comment="libvirt-daemon-config-network-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519469" comment="libvirt-daemon-config-nwfilter-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519470" comment="libvirt-daemon-driver-interface-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519471" comment="libvirt-daemon-driver-libxl-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519472" comment="libvirt-daemon-driver-lxc-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519473" comment="libvirt-daemon-driver-network-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519474" comment="libvirt-daemon-driver-nodedev-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519475" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519476" comment="libvirt-daemon-driver-qemu-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519477" comment="libvirt-daemon-driver-secret-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519478" comment="libvirt-daemon-driver-storage-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519479" comment="libvirt-daemon-driver-storage-core-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519480" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519481" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519482" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519483" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519484" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519485" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519486" comment="libvirt-daemon-lxc-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519487" comment="libvirt-daemon-qemu-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519488" comment="libvirt-daemon-xen-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519489" comment="libvirt-doc-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519490" comment="libvirt-libs-3.3.0-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78221" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1060354" ref_url="https://bugzilla.suse.com/1060354" source="BUGZILLA"/>
		<reference ref_id="1060355" ref_url="https://bugzilla.suse.com/1060355" source="BUGZILLA"/>
		<reference ref_id="1060360" ref_url="https://bugzilla.suse.com/1060360" source="BUGZILLA"/>
		<reference ref_id="1060361" ref_url="https://bugzilla.suse.com/1060361" source="BUGZILLA"/>
		<reference ref_id="1060362" ref_url="https://bugzilla.suse.com/1060362" source="BUGZILLA"/>
		<reference ref_id="1060364" ref_url="https://bugzilla.suse.com/1060364" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14491" ref_url="https://www.suse.com/security/cve/CVE-2017-14491/" source="CVE"/>
		<reference ref_id="CVE-2017-14492" ref_url="https://www.suse.com/security/cve/CVE-2017-14492/" source="CVE"/>
		<reference ref_id="CVE-2017-14493" ref_url="https://www.suse.com/security/cve/CVE-2017-14493/" source="CVE"/>
		<reference ref_id="CVE-2017-14494" ref_url="https://www.suse.com/security/cve/CVE-2017-14494/" source="CVE"/>
		<reference ref_id="CVE-2017-14495" ref_url="https://www.suse.com/security/cve/CVE-2017-14495/" source="CVE"/>
		<reference ref_id="CVE-2017-14496" ref_url="https://www.suse.com/security/cve/CVE-2017-14496/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003270.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following security issues:

- CVE-2017-14491: 2 byte heap based overflow. [bsc#1060354]
- CVE-2017-14492: heap based overflow. [bsc#1060355]
- CVE-2017-14493: stack based overflow. [bsc#1060360]
- CVE-2017-14494: DHCP - info leak. [bsc#1060361]
- CVE-2017-14495: DNS - OOM DoS. [bsc#1060362]
- CVE-2017-14496: DNS - DoS Integer underflow. [bsc#1060364]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-02"/>
	<updated date="2017-10-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060354">SUSE bug 1060354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060355">SUSE bug 1060355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14491/">CVE-2017-14491</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14492/">CVE-2017-14492</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14493/">CVE-2017-14493</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14494/">CVE-2017-14494</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14495/">CVE-2017-14495</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-14496/">CVE-2017-14496</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518138" comment="dnsmasq-2.78-18.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78222" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1056421" ref_url="https://bugzilla.suse.com/1056421" source="BUGZILLA"/>
		<reference ref_id="1056562" ref_url="https://bugzilla.suse.com/1056562" source="BUGZILLA"/>
		<reference ref_id="1056621" ref_url="https://bugzilla.suse.com/1056621" source="BUGZILLA"/>
		<reference ref_id="1056622" ref_url="https://bugzilla.suse.com/1056622" source="BUGZILLA"/>
		<reference ref_id="1057511" ref_url="https://bugzilla.suse.com/1057511" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10507" ref_url="https://www.suse.com/security/cve/CVE-2016-10507/" source="CVE"/>
		<reference ref_id="CVE-2017-14039" ref_url="https://www.suse.com/security/cve/CVE-2017-14039/" source="CVE"/>
		<reference ref_id="CVE-2017-14040" ref_url="https://www.suse.com/security/cve/CVE-2017-14040/" source="CVE"/>
		<reference ref_id="CVE-2017-14041" ref_url="https://www.suse.com/security/cve/CVE-2017-14041/" source="CVE"/>
		<reference ref_id="CVE-2017-14164" ref_url="https://www.suse.com/security/cve/CVE-2017-14164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003274.html" source="SUSE-SU"/>
		<description>
This update for openjpeg2 fixes several issues.

These security issues were fixed:

- CVE-2016-10507: Integer overflow vulnerability in the bmp24toimage function
  allowed remote attackers to cause a denial of service (heap-based buffer
  over-read and application crash) via a crafted bmp file (bsc#1056421).
- CVE-2017-14039: A heap-based buffer overflow was discovered in the
  opj_t2_encode_packet function. The vulnerability caused an out-of-bounds write,
  which may have lead to remote denial of service or possibly unspecified other
  impact (bsc#1056622).
- CVE-2017-14164: A size-validation issue was discovered in opj_j2k_write_sot.
  The vulnerability caused an out-of-bounds write, which may have lead to remote
  DoS or possibly remote code execution (bsc#1057511).
- CVE-2017-14040: An invalid write access was discovered in bin/jp2/convert.c,
  triggering a crash in the tgatoimage function. The vulnerability may have lead
  to remote denial of service or possibly unspecified other impact (bsc#1056621).
- CVE-2017-14041: A stack-based buffer overflow was discovered in the
  pgxtoimage function. The vulnerability caused an out-of-bounds write, which may
  have lead to remote denial of service or possibly remote code execution
  (bsc#1056562).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-05"/>
	<updated date="2017-10-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056421">SUSE bug 1056421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056562">SUSE bug 1056562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056621">SUSE bug 1056621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056622">SUSE bug 1056622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057511">SUSE bug 1057511</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10507/">CVE-2016-10507</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14039/">CVE-2017-14039</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14040/">CVE-2017-14040</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14041/">CVE-2017-14041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14164/">CVE-2017-14164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518139" comment="libopenjp2-7-2.1.0-4.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78223" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1032680" ref_url="https://bugzilla.suse.com/1032680" source="BUGZILLA"/>
		<reference ref_id="1054028" ref_url="https://bugzilla.suse.com/1054028" source="BUGZILLA"/>
		<reference ref_id="1056995" ref_url="https://bugzilla.suse.com/1056995" source="BUGZILLA"/>
		<reference ref_id="903543" ref_url="https://bugzilla.suse.com/903543" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11462" ref_url="https://www.suse.com/security/cve/CVE-2017-11462/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003277.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes several issues.

This security issue was fixed:

- CVE-2017-11462: Prevent automatic security context deletion to prevent
  double-free (bsc#1056995)

These non-security issues were fixed:

- Set 'rdns' and 'dns_canonicalize_hostname' to false in krb5.conf
  in order to improve client security in handling service principle
  names. (bsc#1054028)
- Prevent kadmind.service startup failure caused by absence of
  LDAP service. (bsc#903543)
- Remove main package's dependency on systemd (bsc#1032680)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-09"/>
	<updated date="2017-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1032680">SUSE bug 1032680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054028">SUSE bug 1054028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056995">SUSE bug 1056995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903543">SUSE bug 903543</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11462/">CVE-2017-11462</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518184" comment="krb5-1.12.5-40.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518185" comment="krb5-32bit-1.12.5-40.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518186" comment="krb5-client-1.12.5-40.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78224" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1060445" ref_url="https://bugzilla.suse.com/1060445" source="BUGZILLA"/>
		<reference ref_id="1061005" ref_url="https://bugzilla.suse.com/1061005" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7793" ref_url="https://www.suse.com/security/cve/CVE-2017-7793/" source="CVE"/>
		<reference ref_id="CVE-2017-7805" ref_url="https://www.suse.com/security/cve/CVE-2017-7805/" source="CVE"/>
		<reference ref_id="CVE-2017-7810" ref_url="https://www.suse.com/security/cve/CVE-2017-7810/" source="CVE"/>
		<reference ref_id="CVE-2017-7814" ref_url="https://www.suse.com/security/cve/CVE-2017-7814/" source="CVE"/>
		<reference ref_id="CVE-2017-7818" ref_url="https://www.suse.com/security/cve/CVE-2017-7818/" source="CVE"/>
		<reference ref_id="CVE-2017-7819" ref_url="https://www.suse.com/security/cve/CVE-2017-7819/" source="CVE"/>
		<reference ref_id="CVE-2017-7823" ref_url="https://www.suse.com/security/cve/CVE-2017-7823/" source="CVE"/>
		<reference ref_id="CVE-2017-7824" ref_url="https://www.suse.com/security/cve/CVE-2017-7824/" source="CVE"/>
		<reference ref_id="CVE-2017-7825" ref_url="https://www.suse.com/security/cve/CVE-2017-7825/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2688-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00008.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to ESR 52.4, mozilla-nss fixes the following issues:

This security issue was fixed for mozilla-nss:

- CVE-2017-7805: Prevent use-after-free in TLS 1.2 when generating handshake hashes (bsc#1061005)

These security issues were fixed for Firefox 

- CVE-2017-7825: Fixed some Tibetan and Arabic unicode characters rendering (bsc#1060445).
- CVE-2017-7805: Prevent Use-after-free in TLS 1.2 generating handshake hashes (bsc#1060445).
- CVE-2017-7819: Prevent Use-after-free while resizing images in design mode (bsc#1060445).
- CVE-2017-7818: Prevent Use-after-free during ARIA array manipulation (bsc#1060445).
- CVE-2017-7793: Prevent Use-after-free with Fetch API (bsc#1060445).
- CVE-2017-7824: Prevent Buffer overflow when drawing and validating elements with ANGLE (bsc#1060445).
- CVE-2017-7810: Fixed several memory safety bugs (bsc#1060445).
- CVE-2017-7823: CSP sandbox directive did not create a unique origin (bsc#1060445).
- CVE-2017-7814: Blob and data URLs bypassed phishing and malware protection warnings (bsc#1060445).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-10"/>
	<updated date="2017-10-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061005">SUSE bug 1061005</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7793/">CVE-2017-7793</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7805/">CVE-2017-7805</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7810/">CVE-2017-7810</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7814/">CVE-2017-7814</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7818/">CVE-2017-7818</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7819/">CVE-2017-7819</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7823/">CVE-2017-7823</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7824/">CVE-2017-7824</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7825/">CVE-2017-7825</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518187" comment="MozillaFirefox-52.4.0esr-109.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518188" comment="MozillaFirefox-translations-52.4.0esr-109.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518189" comment="libfreebl3-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518190" comment="libfreebl3-32bit-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518191" comment="libsoftokn3-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518192" comment="libsoftokn3-32bit-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518193" comment="mozilla-nss-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518194" comment="mozilla-nss-32bit-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518195" comment="mozilla-nss-certs-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518196" comment="mozilla-nss-certs-32bit-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518197" comment="mozilla-nss-sysinit-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518198" comment="mozilla-nss-sysinit-32bit-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518199" comment="mozilla-nss-tools-3.29.5-58.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78225" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1050707" ref_url="https://bugzilla.suse.com/1050707" source="BUGZILLA"/>
		<reference ref_id="1058565" ref_url="https://bugzilla.suse.com/1058565" source="BUGZILLA"/>
		<reference ref_id="1058622" ref_url="https://bugzilla.suse.com/1058622" source="BUGZILLA"/>
		<reference ref_id="1058624" ref_url="https://bugzilla.suse.com/1058624" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12150" ref_url="https://www.suse.com/security/cve/CVE-2017-12150/" source="CVE"/>
		<reference ref_id="CVE-2017-12151" ref_url="https://www.suse.com/security/cve/CVE-2017-12151/" source="CVE"/>
		<reference ref_id="CVE-2017-12163" ref_url="https://www.suse.com/security/cve/CVE-2017-12163/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003285.html" source="SUSE-SU"/>
		<description>
This update for samba fixes several issues.

These security issues were fixed:

- CVE-2017-12163: Prevent client short SMB1 write from writing server memory to
  file, leaking information from the server to the client (bsc#1058624)
- CVE-2017-12150: Always enforce smb signing when it is configured (bsc#1058622)
- CVE-2017-12151: Keep required encryption across SMB3 dfs redirects (bsc#1058565)

The following non-security issue was fixed:

- Fix GUID string format on GetPrinter info request. (bsc#1050707)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-10"/>
	<updated date="2017-10-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050707">SUSE bug 1050707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058565">SUSE bug 1058565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058622">SUSE bug 1058622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058624">SUSE bug 1058624</bugzilla>
	<cve impact="moderate" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12150/">CVE-2017-12150</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12151/">CVE-2017-12151</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12163/">CVE-2017-12163</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519491" comment="libdcerpc-binding0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519492" comment="libdcerpc-binding0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519493" comment="libdcerpc0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519494" comment="libdcerpc0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519495" comment="libndr-krb5pac0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519496" comment="libndr-krb5pac0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519497" comment="libndr-nbt0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519498" comment="libndr-nbt0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519499" comment="libndr-standard0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519500" comment="libndr-standard0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519501" comment="libndr0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519502" comment="libndr0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519503" comment="libnetapi0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519504" comment="libnetapi0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519505" comment="libsamba-credentials0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519506" comment="libsamba-credentials0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519507" comment="libsamba-errors0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519508" comment="libsamba-errors0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519509" comment="libsamba-hostconfig0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519510" comment="libsamba-hostconfig0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519511" comment="libsamba-passdb0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519512" comment="libsamba-passdb0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519513" comment="libsamba-util0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519514" comment="libsamba-util0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519515" comment="libsamdb0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519516" comment="libsamdb0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519517" comment="libsmbclient0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519518" comment="libsmbclient0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519519" comment="libsmbconf0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519520" comment="libsmbconf0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519521" comment="libsmbldap0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519522" comment="libsmbldap0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519523" comment="libtevent-util0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519524" comment="libtevent-util0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519525" comment="libwbclient0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519526" comment="libwbclient0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519527" comment="samba-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519528" comment="samba-client-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519529" comment="samba-client-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519530" comment="samba-doc-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519531" comment="samba-libs-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519532" comment="samba-libs-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519533" comment="samba-winbind-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519534" comment="samba-winbind-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78226" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1047536" ref_url="https://bugzilla.suse.com/1047536" source="BUGZILLA"/>
		<reference ref_id="814241" ref_url="https://bugzilla.suse.com/814241" source="BUGZILLA"/>
		<reference ref_id="879138" ref_url="https://bugzilla.suse.com/879138" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:2744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003299.html" source="SUSE-SU"/>
		<description>
xerces-j2 was updated to fix several issues.

This security issue was fixed:

- bsc#814241: Prevent possible DoS through very long attribute names

This non-security issue was fixed:

- Prevent StackOverflowError when applying a pattern restriction on long strings
  while trying to validate an XML file against a schema (bsc#1047536, bsc#879138)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-17"/>
	<updated date="2017-10-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047536">SUSE bug 1047536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814241">SUSE bug 814241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879138">SUSE bug 879138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518232" comment="xerces-j2-2.8.1-268.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78227" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1055321" ref_url="https://bugzilla.suse.com/1055321" source="BUGZILLA"/>
		<reference ref_id="1059777" ref_url="https://bugzilla.suse.com/1059777" source="BUGZILLA"/>
		<reference ref_id="1061076" ref_url="https://bugzilla.suse.com/1061076" source="BUGZILLA"/>
		<reference ref_id="1061077" ref_url="https://bugzilla.suse.com/1061077" source="BUGZILLA"/>
		<reference ref_id="1061080" ref_url="https://bugzilla.suse.com/1061080" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1061082" ref_url="https://bugzilla.suse.com/1061082" source="BUGZILLA"/>
		<reference ref_id="1061084" ref_url="https://bugzilla.suse.com/1061084" source="BUGZILLA"/>
		<reference ref_id="1061086" ref_url="https://bugzilla.suse.com/1061086" source="BUGZILLA"/>
		<reference ref_id="1061087" ref_url="https://bugzilla.suse.com/1061087" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5526" ref_url="https://www.suse.com/security/cve/CVE-2017-5526/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2751-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00022.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues:

These security issues were fixed:

- CVE-2017-5526: The ES1370 audio device emulation support was vulnerable to a
  memory leakage issue allowing a privileged user inside the guest to cause a DoS
  and/or potentially crash the Qemu process on the host (bsc#1059777)
- bsc#1061084: Missing cleanup in the page type system allowed a malicious or
  buggy PV guest to cause DoS (XSA-242)
- bsc#1061086: A problem in the shadow pagetable code allowed a malicious or
  buggy HVM guest to cause DoS or cause hypervisor memory corruption potentially
  allowing the guest to escalate its privilege (XSA-243)
- bsc#1061087: Problematic handling of the selector fields in the Interrupt
  Descriptor Table (IDT) allowed a malicious or buggy x86 PV guest to escalate
  its privileges or cause DoS (XSA-244)
- bsc#1061077 Missing checks in the handling of DMOPs allowed malicious or
  buggy stub domain kernels or tool stacks otherwise living outside of Domain0 to
  cause a DoS (XSA-238)
- bsc#1061080: Intercepted I/O write operations with less than a full machine
  word's worth of data were not properly handled, which allowed a malicious
  unprivileged x86 HVM guest to obtain sensitive information from the host or
  other guests (XSA-239)
- bsc#1061081: In certain configurations of linear page tables a stack overflow
  might have occured that allowed a malicious or buggy PV guest to cause DoS and
  potentially privilege escalation and information leaks (XSA-240)
- bsc#1061082: Under certain conditions x86 PV guests could have caused the
  hypervisor to miss a necessary TLB flush for a page. This allowed a malicious
  x86 PV guest to access all of system memory, allowing for privilege escalation,
  DoS, and information leaks (XSA-241)
- bsc#1061076: Multiple issues existed with the setup of PCI MSI interrupts
  that allowed a malicious or buggy guest to cause DoS and potentially privilege
  escalation and information leaks (XSA-237)
- bsc#1055321: When dealing with the grant map space of add-to-physmap
  operations, ARM specific code failed to release a lock. This allowed a
  malicious guest administrator to cause DoS (XSA-235)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-17"/>
	<updated date="2017-10-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055321">SUSE bug 1055321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059777">SUSE bug 1059777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061076">SUSE bug 1061076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061077">SUSE bug 1061077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061080">SUSE bug 1061080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061082">SUSE bug 1061082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061084">SUSE bug 1061084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061086">SUSE bug 1061086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061087">SUSE bug 1061087</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5526/">CVE-2017-5526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519535" comment="xen-4.9.0_14-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519536" comment="xen-libs-4.9.0_14-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519537" comment="xen-libs-32bit-4.9.0_14-3.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78228" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1056061" ref_url="https://bugzilla.suse.com/1056061" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13078" ref_url="https://www.suse.com/security/cve/CVE-2017-13078/" source="CVE"/>
		<reference ref_id="CVE-2017-13079" ref_url="https://www.suse.com/security/cve/CVE-2017-13079/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081/" source="CVE"/>
		<reference ref_id="CVE-2017-13087" ref_url="https://www.suse.com/security/cve/CVE-2017-13087/" source="CVE"/>
		<reference ref_id="CVE-2017-13088" ref_url="https://www.suse.com/security/cve/CVE-2017-13088/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the security issues:

- Several vulnerabilities in standard conforming implementations of the WPA2
  protocol have been discovered and published under the code name KRACK. This
  update remedies those issues in a backwards compatible manner, i.e. the
  updated wpa_supplicant can interface properly with both vulnerable and
  patched implementations of WPA2, but an attacker won't be able to exploit the
  KRACK weaknesses in those connections anymore even if the other party is
  still vulnerable. [bsc#1056061, CVE-2017-13078, CVE-2017-13079,
  CVE-2017-13080, CVE-2017-13081, CVE-2017-13087, CVE-2017-13088]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-17"/>
	<updated date="2017-10-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13078/">CVE-2017-13078</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13079/">CVE-2017-13079</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13087/">CVE-2017-13087</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13088/">CVE-2017-13088</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518233" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78229" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1060653" ref_url="https://bugzilla.suse.com/1060653" source="BUGZILLA"/>
		<reference ref_id="1061876" ref_url="https://bugzilla.suse.com/1061876" source="BUGZILLA"/>
		<reference ref_id="1063824" ref_url="https://bugzilla.suse.com/1063824" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000254" ref_url="https://www.suse.com/security/cve/CVE-2017-1000254/" source="CVE"/>
		<reference ref_id="CVE-2017-1000257" ref_url="https://www.suse.com/security/cve/CVE-2017-1000257/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003350.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issues fixed:

- CVE-2017-1000254: FTP PWD response parser out of bounds read (bsc#1061876)
- CVE-2017-1000257: IMAP FETCH response out of bounds read (bsc#1063824)

Bugs fixed:

- Fixed error 'error:1408F10B:SSL routines' when connecting to ftps via proxy (bsc#1060653)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-23"/>
	<updated date="2017-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1060653">SUSE bug 1060653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061876">SUSE bug 1061876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063824">SUSE bug 1063824</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000254/">CVE-2017-1000254</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000257/">CVE-2017-1000257</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518234" comment="curl-7.37.0-37.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518235" comment="libcurl4-7.37.0-37.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518236" comment="libcurl4-32bit-7.37.0-37.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78230" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1060877" ref_url="https://bugzilla.suse.com/1060877" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12166" ref_url="https://www.suse.com/security/cve/CVE-2017-12166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00071.html" source="SUSE-SU"/>
		<description>
This update for openvpn fixes the following issues:

- CVE-2017-12166: Lack of bound check in read_key in old legacy key handling before using values could be used for a remote buffer overflow (bsc#1060877).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-24"/>
	<updated date="2017-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060877">SUSE bug 1060877</bugzilla>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12166/">CVE-2017-12166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518237" comment="openvpn-2.3.8-16.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78231" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1004527" ref_url="https://bugzilla.suse.com/1004527" source="BUGZILLA"/>
		<reference ref_id="1005776" ref_url="https://bugzilla.suse.com/1005776" source="BUGZILLA"/>
		<reference ref_id="1005778" ref_url="https://bugzilla.suse.com/1005778" source="BUGZILLA"/>
		<reference ref_id="1005780" ref_url="https://bugzilla.suse.com/1005780" source="BUGZILLA"/>
		<reference ref_id="1005781" ref_url="https://bugzilla.suse.com/1005781" source="BUGZILLA"/>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1012829" ref_url="https://bugzilla.suse.com/1012829" source="BUGZILLA"/>
		<reference ref_id="1015342" ref_url="https://bugzilla.suse.com/1015342" source="BUGZILLA"/>
		<reference ref_id="1015343" ref_url="https://bugzilla.suse.com/1015343" source="BUGZILLA"/>
		<reference ref_id="1019675" ref_url="https://bugzilla.suse.com/1019675" source="BUGZILLA"/>
		<reference ref_id="1019680" ref_url="https://bugzilla.suse.com/1019680" source="BUGZILLA"/>
		<reference ref_id="1019695" ref_url="https://bugzilla.suse.com/1019695" source="BUGZILLA"/>
		<reference ref_id="1019699" ref_url="https://bugzilla.suse.com/1019699" source="BUGZILLA"/>
		<reference ref_id="1020412" ref_url="https://bugzilla.suse.com/1020412" source="BUGZILLA"/>
		<reference ref_id="1020645" ref_url="https://bugzilla.suse.com/1020645" source="BUGZILLA"/>
		<reference ref_id="1020657" ref_url="https://bugzilla.suse.com/1020657" source="BUGZILLA"/>
		<reference ref_id="1020989" ref_url="https://bugzilla.suse.com/1020989" source="BUGZILLA"/>
		<reference ref_id="1021424" ref_url="https://bugzilla.suse.com/1021424" source="BUGZILLA"/>
		<reference ref_id="1022595" ref_url="https://bugzilla.suse.com/1022595" source="BUGZILLA"/>
		<reference ref_id="1022604" ref_url="https://bugzilla.suse.com/1022604" source="BUGZILLA"/>
		<reference ref_id="1022743" ref_url="https://bugzilla.suse.com/1022743" source="BUGZILLA"/>
		<reference ref_id="1022912" ref_url="https://bugzilla.suse.com/1022912" source="BUGZILLA"/>
		<reference ref_id="1022967" ref_url="https://bugzilla.suse.com/1022967" source="BUGZILLA"/>
		<reference ref_id="1024346" ref_url="https://bugzilla.suse.com/1024346" source="BUGZILLA"/>
		<reference ref_id="1024373" ref_url="https://bugzilla.suse.com/1024373" source="BUGZILLA"/>
		<reference ref_id="1024405" ref_url="https://bugzilla.suse.com/1024405" source="BUGZILLA"/>
		<reference ref_id="1025461" ref_url="https://bugzilla.suse.com/1025461" source="BUGZILLA"/>
		<reference ref_id="1030850" ref_url="https://bugzilla.suse.com/1030850" source="BUGZILLA"/>
		<reference ref_id="1031717" ref_url="https://bugzilla.suse.com/1031717" source="BUGZILLA"/>
		<reference ref_id="1031784" ref_url="https://bugzilla.suse.com/1031784" source="BUGZILLA"/>
		<reference ref_id="1032150" ref_url="https://bugzilla.suse.com/1032150" source="BUGZILLA"/>
		<reference ref_id="1034048" ref_url="https://bugzilla.suse.com/1034048" source="BUGZILLA"/>
		<reference ref_id="1034075" ref_url="https://bugzilla.suse.com/1034075" source="BUGZILLA"/>
		<reference ref_id="1035479" ref_url="https://bugzilla.suse.com/1035479" source="BUGZILLA"/>
		<reference ref_id="1036060" ref_url="https://bugzilla.suse.com/1036060" source="BUGZILLA"/>
		<reference ref_id="1036215" ref_url="https://bugzilla.suse.com/1036215" source="BUGZILLA"/>
		<reference ref_id="1036737" ref_url="https://bugzilla.suse.com/1036737" source="BUGZILLA"/>
		<reference ref_id="1037579" ref_url="https://bugzilla.suse.com/1037579" source="BUGZILLA"/>
		<reference ref_id="1037838" ref_url="https://bugzilla.suse.com/1037838" source="BUGZILLA"/>
		<reference ref_id="1037890" ref_url="https://bugzilla.suse.com/1037890" source="BUGZILLA"/>
		<reference ref_id="1038583" ref_url="https://bugzilla.suse.com/1038583" source="BUGZILLA"/>
		<reference ref_id="1040813" ref_url="https://bugzilla.suse.com/1040813" source="BUGZILLA"/>
		<reference ref_id="1042847" ref_url="https://bugzilla.suse.com/1042847" source="BUGZILLA"/>
		<reference ref_id="1043598" ref_url="https://bugzilla.suse.com/1043598" source="BUGZILLA"/>
		<reference ref_id="1044503" ref_url="https://bugzilla.suse.com/1044503" source="BUGZILLA"/>
		<reference ref_id="1046529" ref_url="https://bugzilla.suse.com/1046529" source="BUGZILLA"/>
		<reference ref_id="1047238" ref_url="https://bugzilla.suse.com/1047238" source="BUGZILLA"/>
		<reference ref_id="1047487" ref_url="https://bugzilla.suse.com/1047487" source="BUGZILLA"/>
		<reference ref_id="1047989" ref_url="https://bugzilla.suse.com/1047989" source="BUGZILLA"/>
		<reference ref_id="1048155" ref_url="https://bugzilla.suse.com/1048155" source="BUGZILLA"/>
		<reference ref_id="1048228" ref_url="https://bugzilla.suse.com/1048228" source="BUGZILLA"/>
		<reference ref_id="1048325" ref_url="https://bugzilla.suse.com/1048325" source="BUGZILLA"/>
		<reference ref_id="1048327" ref_url="https://bugzilla.suse.com/1048327" source="BUGZILLA"/>
		<reference ref_id="1048356" ref_url="https://bugzilla.suse.com/1048356" source="BUGZILLA"/>
		<reference ref_id="1048501" ref_url="https://bugzilla.suse.com/1048501" source="BUGZILLA"/>
		<reference ref_id="1048893" ref_url="https://bugzilla.suse.com/1048893" source="BUGZILLA"/>
		<reference ref_id="1048912" ref_url="https://bugzilla.suse.com/1048912" source="BUGZILLA"/>
		<reference ref_id="1048934" ref_url="https://bugzilla.suse.com/1048934" source="BUGZILLA"/>
		<reference ref_id="1049226" ref_url="https://bugzilla.suse.com/1049226" source="BUGZILLA"/>
		<reference ref_id="1049272" ref_url="https://bugzilla.suse.com/1049272" source="BUGZILLA"/>
		<reference ref_id="1049291" ref_url="https://bugzilla.suse.com/1049291" source="BUGZILLA"/>
		<reference ref_id="1049336" ref_url="https://bugzilla.suse.com/1049336" source="BUGZILLA"/>
		<reference ref_id="1049361" ref_url="https://bugzilla.suse.com/1049361" source="BUGZILLA"/>
		<reference ref_id="1049580" ref_url="https://bugzilla.suse.com/1049580" source="BUGZILLA"/>
		<reference ref_id="1050471" ref_url="https://bugzilla.suse.com/1050471" source="BUGZILLA"/>
		<reference ref_id="1050742" ref_url="https://bugzilla.suse.com/1050742" source="BUGZILLA"/>
		<reference ref_id="1051790" ref_url="https://bugzilla.suse.com/1051790" source="BUGZILLA"/>
		<reference ref_id="1051987" ref_url="https://bugzilla.suse.com/1051987" source="BUGZILLA"/>
		<reference ref_id="1052093" ref_url="https://bugzilla.suse.com/1052093" source="BUGZILLA"/>
		<reference ref_id="1052094" ref_url="https://bugzilla.suse.com/1052094" source="BUGZILLA"/>
		<reference ref_id="1052095" ref_url="https://bugzilla.suse.com/1052095" source="BUGZILLA"/>
		<reference ref_id="1052360" ref_url="https://bugzilla.suse.com/1052360" source="BUGZILLA"/>
		<reference ref_id="1052384" ref_url="https://bugzilla.suse.com/1052384" source="BUGZILLA"/>
		<reference ref_id="1052580" ref_url="https://bugzilla.suse.com/1052580" source="BUGZILLA"/>
		<reference ref_id="1052593" ref_url="https://bugzilla.suse.com/1052593" source="BUGZILLA"/>
		<reference ref_id="1052888" ref_url="https://bugzilla.suse.com/1052888" source="BUGZILLA"/>
		<reference ref_id="1053043" ref_url="https://bugzilla.suse.com/1053043" source="BUGZILLA"/>
		<reference ref_id="1053309" ref_url="https://bugzilla.suse.com/1053309" source="BUGZILLA"/>
		<reference ref_id="1053472" ref_url="https://bugzilla.suse.com/1053472" source="BUGZILLA"/>
		<reference ref_id="1053627" ref_url="https://bugzilla.suse.com/1053627" source="BUGZILLA"/>
		<reference ref_id="1053629" ref_url="https://bugzilla.suse.com/1053629" source="BUGZILLA"/>
		<reference ref_id="1053633" ref_url="https://bugzilla.suse.com/1053633" source="BUGZILLA"/>
		<reference ref_id="1053681" ref_url="https://bugzilla.suse.com/1053681" source="BUGZILLA"/>
		<reference ref_id="1053685" ref_url="https://bugzilla.suse.com/1053685" source="BUGZILLA"/>
		<reference ref_id="1053802" ref_url="https://bugzilla.suse.com/1053802" source="BUGZILLA"/>
		<reference ref_id="1053915" ref_url="https://bugzilla.suse.com/1053915" source="BUGZILLA"/>
		<reference ref_id="1053919" ref_url="https://bugzilla.suse.com/1053919" source="BUGZILLA"/>
		<reference ref_id="1054082" ref_url="https://bugzilla.suse.com/1054082" source="BUGZILLA"/>
		<reference ref_id="1054084" ref_url="https://bugzilla.suse.com/1054084" source="BUGZILLA"/>
		<reference ref_id="1054654" ref_url="https://bugzilla.suse.com/1054654" source="BUGZILLA"/>
		<reference ref_id="1055013" ref_url="https://bugzilla.suse.com/1055013" source="BUGZILLA"/>
		<reference ref_id="1055096" ref_url="https://bugzilla.suse.com/1055096" source="BUGZILLA"/>
		<reference ref_id="1055272" ref_url="https://bugzilla.suse.com/1055272" source="BUGZILLA"/>
		<reference ref_id="1055290" ref_url="https://bugzilla.suse.com/1055290" source="BUGZILLA"/>
		<reference ref_id="1055359" ref_url="https://bugzilla.suse.com/1055359" source="BUGZILLA"/>
		<reference ref_id="1055493" ref_url="https://bugzilla.suse.com/1055493" source="BUGZILLA"/>
		<reference ref_id="1055567" ref_url="https://bugzilla.suse.com/1055567" source="BUGZILLA"/>
		<reference ref_id="1055709" ref_url="https://bugzilla.suse.com/1055709" source="BUGZILLA"/>
		<reference ref_id="1055755" ref_url="https://bugzilla.suse.com/1055755" source="BUGZILLA"/>
		<reference ref_id="1055896" ref_url="https://bugzilla.suse.com/1055896" source="BUGZILLA"/>
		<reference ref_id="1055935" ref_url="https://bugzilla.suse.com/1055935" source="BUGZILLA"/>
		<reference ref_id="1055963" ref_url="https://bugzilla.suse.com/1055963" source="BUGZILLA"/>
		<reference ref_id="1056061" ref_url="https://bugzilla.suse.com/1056061" source="BUGZILLA"/>
		<reference ref_id="1056185" ref_url="https://bugzilla.suse.com/1056185" source="BUGZILLA"/>
		<reference ref_id="1056230" ref_url="https://bugzilla.suse.com/1056230" source="BUGZILLA"/>
		<reference ref_id="1056261" ref_url="https://bugzilla.suse.com/1056261" source="BUGZILLA"/>
		<reference ref_id="1056427" ref_url="https://bugzilla.suse.com/1056427" source="BUGZILLA"/>
		<reference ref_id="1056587" ref_url="https://bugzilla.suse.com/1056587" source="BUGZILLA"/>
		<reference ref_id="1056588" ref_url="https://bugzilla.suse.com/1056588" source="BUGZILLA"/>
		<reference ref_id="1056596" ref_url="https://bugzilla.suse.com/1056596" source="BUGZILLA"/>
		<reference ref_id="1056686" ref_url="https://bugzilla.suse.com/1056686" source="BUGZILLA"/>
		<reference ref_id="1056827" ref_url="https://bugzilla.suse.com/1056827" source="BUGZILLA"/>
		<reference ref_id="1056849" ref_url="https://bugzilla.suse.com/1056849" source="BUGZILLA"/>
		<reference ref_id="1056982" ref_url="https://bugzilla.suse.com/1056982" source="BUGZILLA"/>
		<reference ref_id="1057015" ref_url="https://bugzilla.suse.com/1057015" source="BUGZILLA"/>
		<reference ref_id="1057031" ref_url="https://bugzilla.suse.com/1057031" source="BUGZILLA"/>
		<reference ref_id="1057035" ref_url="https://bugzilla.suse.com/1057035" source="BUGZILLA"/>
		<reference ref_id="1057038" ref_url="https://bugzilla.suse.com/1057038" source="BUGZILLA"/>
		<reference ref_id="1057047" ref_url="https://bugzilla.suse.com/1057047" source="BUGZILLA"/>
		<reference ref_id="1057067" ref_url="https://bugzilla.suse.com/1057067" source="BUGZILLA"/>
		<reference ref_id="1057383" ref_url="https://bugzilla.suse.com/1057383" source="BUGZILLA"/>
		<reference ref_id="1057498" ref_url="https://bugzilla.suse.com/1057498" source="BUGZILLA"/>
		<reference ref_id="1057849" ref_url="https://bugzilla.suse.com/1057849" source="BUGZILLA"/>
		<reference ref_id="1058038" ref_url="https://bugzilla.suse.com/1058038" source="BUGZILLA"/>
		<reference ref_id="1058116" ref_url="https://bugzilla.suse.com/1058116" source="BUGZILLA"/>
		<reference ref_id="1058135" ref_url="https://bugzilla.suse.com/1058135" source="BUGZILLA"/>
		<reference ref_id="1058410" ref_url="https://bugzilla.suse.com/1058410" source="BUGZILLA"/>
		<reference ref_id="1058507" ref_url="https://bugzilla.suse.com/1058507" source="BUGZILLA"/>
		<reference ref_id="1058512" ref_url="https://bugzilla.suse.com/1058512" source="BUGZILLA"/>
		<reference ref_id="1058550" ref_url="https://bugzilla.suse.com/1058550" source="BUGZILLA"/>
		<reference ref_id="1059051" ref_url="https://bugzilla.suse.com/1059051" source="BUGZILLA"/>
		<reference ref_id="1059465" ref_url="https://bugzilla.suse.com/1059465" source="BUGZILLA"/>
		<reference ref_id="1059500" ref_url="https://bugzilla.suse.com/1059500" source="BUGZILLA"/>
		<reference ref_id="1059863" ref_url="https://bugzilla.suse.com/1059863" source="BUGZILLA"/>
		<reference ref_id="1060197" ref_url="https://bugzilla.suse.com/1060197" source="BUGZILLA"/>
		<reference ref_id="1060229" ref_url="https://bugzilla.suse.com/1060229" source="BUGZILLA"/>
		<reference ref_id="1060249" ref_url="https://bugzilla.suse.com/1060249" source="BUGZILLA"/>
		<reference ref_id="1060400" ref_url="https://bugzilla.suse.com/1060400" source="BUGZILLA"/>
		<reference ref_id="1060985" ref_url="https://bugzilla.suse.com/1060985" source="BUGZILLA"/>
		<reference ref_id="1061017" ref_url="https://bugzilla.suse.com/1061017" source="BUGZILLA"/>
		<reference ref_id="1061046" ref_url="https://bugzilla.suse.com/1061046" source="BUGZILLA"/>
		<reference ref_id="1061064" ref_url="https://bugzilla.suse.com/1061064" source="BUGZILLA"/>
		<reference ref_id="1061067" ref_url="https://bugzilla.suse.com/1061067" source="BUGZILLA"/>
		<reference ref_id="1061172" ref_url="https://bugzilla.suse.com/1061172" source="BUGZILLA"/>
		<reference ref_id="1061451" ref_url="https://bugzilla.suse.com/1061451" source="BUGZILLA"/>
		<reference ref_id="1061721" ref_url="https://bugzilla.suse.com/1061721" source="BUGZILLA"/>
		<reference ref_id="1061775" ref_url="https://bugzilla.suse.com/1061775" source="BUGZILLA"/>
		<reference ref_id="1061831" ref_url="https://bugzilla.suse.com/1061831" source="BUGZILLA"/>
		<reference ref_id="1061872" ref_url="https://bugzilla.suse.com/1061872" source="BUGZILLA"/>
		<reference ref_id="1062279" ref_url="https://bugzilla.suse.com/1062279" source="BUGZILLA"/>
		<reference ref_id="1062520" ref_url="https://bugzilla.suse.com/1062520" source="BUGZILLA"/>
		<reference ref_id="1062962" ref_url="https://bugzilla.suse.com/1062962" source="BUGZILLA"/>
		<reference ref_id="1063102" ref_url="https://bugzilla.suse.com/1063102" source="BUGZILLA"/>
		<reference ref_id="1063349" ref_url="https://bugzilla.suse.com/1063349" source="BUGZILLA"/>
		<reference ref_id="1063460" ref_url="https://bugzilla.suse.com/1063460" source="BUGZILLA"/>
		<reference ref_id="1063475" ref_url="https://bugzilla.suse.com/1063475" source="BUGZILLA"/>
		<reference ref_id="1063479" ref_url="https://bugzilla.suse.com/1063479" source="BUGZILLA"/>
		<reference ref_id="1063501" ref_url="https://bugzilla.suse.com/1063501" source="BUGZILLA"/>
		<reference ref_id="1063509" ref_url="https://bugzilla.suse.com/1063509" source="BUGZILLA"/>
		<reference ref_id="1063520" ref_url="https://bugzilla.suse.com/1063520" source="BUGZILLA"/>
		<reference ref_id="1063570" ref_url="https://bugzilla.suse.com/1063570" source="BUGZILLA"/>
		<reference ref_id="1063667" ref_url="https://bugzilla.suse.com/1063667" source="BUGZILLA"/>
		<reference ref_id="1063671" ref_url="https://bugzilla.suse.com/1063671" source="BUGZILLA"/>
		<reference ref_id="1063695" ref_url="https://bugzilla.suse.com/1063695" source="BUGZILLA"/>
		<reference ref_id="1064064" ref_url="https://bugzilla.suse.com/1064064" source="BUGZILLA"/>
		<reference ref_id="1064206" ref_url="https://bugzilla.suse.com/1064206" source="BUGZILLA"/>
		<reference ref_id="1064388" ref_url="https://bugzilla.suse.com/1064388" source="BUGZILLA"/>
		<reference ref_id="1064436" ref_url="https://bugzilla.suse.com/1064436" source="BUGZILLA"/>
		<reference ref_id="963575" ref_url="https://bugzilla.suse.com/963575" source="BUGZILLA"/>
		<reference ref_id="964944" ref_url="https://bugzilla.suse.com/964944" source="BUGZILLA"/>
		<reference ref_id="966170" ref_url="https://bugzilla.suse.com/966170" source="BUGZILLA"/>
		<reference ref_id="966172" ref_url="https://bugzilla.suse.com/966172" source="BUGZILLA"/>
		<reference ref_id="966186" ref_url="https://bugzilla.suse.com/966186" source="BUGZILLA"/>
		<reference ref_id="966191" ref_url="https://bugzilla.suse.com/966191" source="BUGZILLA"/>
		<reference ref_id="966316" ref_url="https://bugzilla.suse.com/966316" source="BUGZILLA"/>
		<reference ref_id="966318" ref_url="https://bugzilla.suse.com/966318" source="BUGZILLA"/>
		<reference ref_id="969476" ref_url="https://bugzilla.suse.com/969476" source="BUGZILLA"/>
		<reference ref_id="969477" ref_url="https://bugzilla.suse.com/969477" source="BUGZILLA"/>
		<reference ref_id="969756" ref_url="https://bugzilla.suse.com/969756" source="BUGZILLA"/>
		<reference ref_id="971975" ref_url="https://bugzilla.suse.com/971975" source="BUGZILLA"/>
		<reference ref_id="981309" ref_url="https://bugzilla.suse.com/981309" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000252" ref_url="https://www.suse.com/security/cve/CVE-2017-1000252/" source="CVE"/>
		<reference ref_id="CVE-2017-11472" ref_url="https://www.suse.com/security/cve/CVE-2017-11472/" source="CVE"/>
		<reference ref_id="CVE-2017-12134" ref_url="https://www.suse.com/security/cve/CVE-2017-12134/" source="CVE"/>
		<reference ref_id="CVE-2017-12153" ref_url="https://www.suse.com/security/cve/CVE-2017-12153/" source="CVE"/>
		<reference ref_id="CVE-2017-12154" ref_url="https://www.suse.com/security/cve/CVE-2017-12154/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-14051" ref_url="https://www.suse.com/security/cve/CVE-2017-14051/" source="CVE"/>
		<reference ref_id="CVE-2017-14106" ref_url="https://www.suse.com/security/cve/CVE-2017-14106/" source="CVE"/>
		<reference ref_id="CVE-2017-14489" ref_url="https://www.suse.com/security/cve/CVE-2017-14489/" source="CVE"/>
		<reference ref_id="CVE-2017-15265" ref_url="https://www.suse.com/security/cve/CVE-2017-15265/" source="CVE"/>
		<reference ref_id="CVE-2017-15649" ref_url="https://www.suse.com/security/cve/CVE-2017-15649/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00073.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.92 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-1000252: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (assertion failure, and hypervisor hang or crash) via an out-of bounds guest_irq value, related to arch/x86/kvm/vmx.c and virt/kvm/eventfd.c (bnc#1058038).
- CVE-2017-11472: The acpi_ns_terminate() function in drivers/acpi/acpica/nsutils.c in the Linux kernel did not flush the operand cache and causes a kernel stack dump, which allowed local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table (bnc#1049580).
- CVE-2017-12134: The xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in Xen might allow local OS guest users to corrupt block device data streams and consequently obtain sensitive memory information, cause a denial of service, or gain host OS privileges by leveraging incorrect block IO merge-ability calculation (bnc#1051790 bsc#1053919).
- CVE-2017-12153: A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel This function did not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash (bnc#1058410).
- CVE-2017-12154: The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the Linux kernel did not ensure that the 'CR8-load exiting' and 'CR8-store exiting' L0 vmcs02 controls exist in cases where L1 omits the 'use TPR shadow' vmcs12 control, which allowed KVM L2 guest OS users to obtain read and write access to the hardware CR8 register (bnc#1058507).
- CVE-2017-13080: Wi-Fi Protected Access (WPA and WPA2) allowed reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients (bnc#1056061 1063479 1063667 1063671).
- CVE-2017-14051: An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash) by leveraging root access (bnc#1056588).
- CVE-2017-14106: The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel allowed local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path (bnc#1056982).
- CVE-2017-14489: The iscsi_if_rx function in drivers/scsi/scsi_transport_iscsi.c in the Linux kernel allowed local users to cause a denial of service (panic) by leveraging incorrect length validation (bnc#1059051).
- CVE-2017-15265: Use-after-free vulnerability in the Linux kernel before 4.14-rc5 allowed local users to have unspecified impact via vectors related to /dev/snd/seq (bnc#1062520).
- CVE-2017-15649: net/packet/af_packet.c in the Linux kernel allowed local users to gain privileges via crafted system calls that trigger mishandling of packet_fanout data structures, because of a race condition (involving fanout_add and packet_do_bind) that leads to a use-after-free, a different vulnerability than CVE-2017-6346 (bnc#1064388).

The following non-security bugs were fixed:

- acpi: apd: Add clock frequency for Hisilicon Hip07/08 I2C controller (bsc#1049291).
- acpi: apd: Fix HID for Hisilicon Hip07/08 (bsc#1049291).
- acpi: apei: Enable APEI multiple GHES source to share a single external IRQ (bsc#1053627).
- acpica: iort: Update SMMU models for revision C (bsc#1036060).
- acpi: irq: Fix return code of acpi_gsi_to_irq() (bsc#1053627).
- acpi/nfit: Fix memory corruption/Unregister mce decoder on failure (bsc#1057047).
- acpi: pci: fix GIC irq model default PCI IRQ polarity (bsc#1053629).
- acpi/processor: Check for duplicate processor ids at hotplug time (bnc#1056230).
- acpi/processor: Implement DEVICE operator for processor enumeration (bnc#1056230).
- ahci: do not use MSI for devices with the silly Intel NVMe remapping scheme (bsc#1048912).
- ahci: thunderx2: stop engine fix update (bsc#1057031).
- alsa: au88x0: avoid theoretical uninitialized access (bnc#1012382).
- alsa: compress: Remove unused variable (bnc#1012382).
- alsa: hda - Add stereo mic quirk for Lenovo G50-70 (17aa:3978) (bsc#1020657).
- alsa: hda - Implement mic-mute LED mode enum (bsc#1055013).
- alsa: hda/realtek - Add support headphone Mic for ALC221 of HP platform (bsc#1024405).
- alsa: hda - Workaround for i915 KBL breakage (bsc#1048356,bsc#1047989,bsc#1055272).
- alsa: ice1712: Add support for STAudio ADCIII (bsc#1048934).
- alsa: usb-audio: Apply sample rate quirk to Sennheiser headset (bsc#1052580).
- alsa: usb-audio: Check out-of-bounds access by corrupted buffer descriptor (bnc#1012382).
- alsa: usx2y: Suppress kernel warning at page allocation failures (bnc#1012382).
- arc: Re-enable MMU upon Machine Check exception (bnc#1012382).
- arm64: add function to get a cpu's MADT GICC table (bsc#1062279).
- arm64: do not trace atomic operations (bsc#1055290).
- arm64: dts: Add Broadcom Vulcan PMU in dts (fate#319481).
- arm64: fault: Route pte translation faults via do_translation_fault (bnc#1012382).
- arm64: Make sure SPsel is always set (bnc#1012382).
- arm64: mm: select CONFIG_ARCH_PROC_KCORE_TEXT (bsc#1046529).
- arm64: pci: Fix struct acpi_pci_root_ops allocation failure path (bsc#1056849).
- arm64/perf: Access pmu register using &lt;read/write&gt;_sys_reg (bsc#1062279).
- arm64/perf: Add Broadcom Vulcan PMU support (fate#319481).
- arm64/perf: Changed events naming as per the ARM ARM (fate#319481).
- arm64/perf: Define complete ARMv8 recommended implementation defined events (fate#319481).
- arm64: perf: do not expose CHAIN event in sysfs (bsc#1062279).
- arm64: perf: Extend event config for ARMv8.1 (bsc#1062279).
- arm64/perf: Filter common events based on PMCEIDn_EL0 (fate#319481).
- arm64: perf: Ignore exclude_hv when kernel is running in HYP (bsc#1062279).
- arm64: perf: move to common attr_group fields (bsc#1062279).
- arm64: perf: Use the builtin_platform_driver (bsc#1062279).
- arm64: pmu: add fallback probe table (bsc#1062279).
- arm64: pmu: Hoist pmu platform device name (bsc#1062279).
- arm64: pmu: Probe default hw/cache counters (bsc#1062279).
- arm64: pmuv3: handle pmuv3+ (bsc#1062279).
- arm64: pmuv3: handle !PMUv3 when probing (bsc#1062279).
- arm64: pmuv3: use arm_pmu ACPI framework (bsc#1062279).
- arm64: pmu: Wire-up Cortex A53 L2 cache events and DTLB refills (bsc#1062279).
- arm: 8635/1: nommu: allow enabling REMAP_VECTORS_TO_RAM (bnc#1012382).
- arm: dts: r8a7790: Use R-Car Gen 2 fallback binding for msiof nodes (bnc#1012382).
- arm/perf: Convert to hotplug state machine (bsc#1062279).
- arm/perf: Fix hotplug state machine conversion (bsc#1062279).
- arm/perf: Use multi instance instead of custom list (bsc#1062279).
- arm: pxa: add the number of DMA requestor lines (bnc#1012382).
- arm: pxa: fix the number of DMA requestor lines (bnc#1012382).
- arm: remove duplicate 'const' annotations' (bnc#1012382).
- asoc: dapm: fix some pointer error handling (bnc#1012382).
- asoc: dapm: handle probe deferrals (bnc#1012382).
- audit: log 32-bit socketcalls (bnc#1012382).
- bcache: correct cache_dirty_target in __update_writeback_rate() (bnc#1012382).
- bcache: Correct return value for sysfs attach errors (bnc#1012382).
- bcache: do not subtract sectors_to_gc for bypassed IO (bnc#1012382).
- bcache: fix bch_hprint crash and improve output (bnc#1012382).
- bcache: fix for gc and write-back race (bnc#1012382).
- bcache: Fix leak of bdev reference (bnc#1012382).
- bcache: initialize dirty stripes in flash_dev_run() (bnc#1012382).
- blacklist.conf: a7b8829d242b1a58107e9c02b09e93aec446d55c is not applicable
- blacklist.conf: Add commit b5accbb0dfae
- blacklist.conf: add one more
- blacklist.conf: Blacklist d12fe87e62d7 signal/testing: Do not look for __SI_FAULT in userspace It just fixes a self-test.
- blacklist.conf: e859afe1ee0c5ae981c55387ccd45eba258a7842 is not applicable
- blacklist.conf: fixes on relevant for MIPS/driver not in our tree
- blacklist.conf: gcc7 compiler warning (bsc#1056849)
- block: genhd: add device_add_disk_with_groups (bsc#1060400).
- block: Relax a check in blk_start_queue() (bnc#1012382).
- block: return on congested block device (FATE#321994).
- bluetooth: bnep: fix possible might sleep error in bnep_session (bsc#1031784).
- bluetooth: cmtp: fix possible might sleep error in cmtp_session (bsc#1031784).
- bnx2x: Do not log mc removal needlessly (bsc#1019680 FATE#321692).
- bnxt: add a missing rcu synchronization (bnc#1038583).
- bnxt: do not busy-poll when link is down (bnc#1038583).
- bnxt_en: Add a callback to inform RDMA driver during PCI shutdown (bsc#1053309).
- bnxt_en: Add additional chip ID definitions (bsc#1053309).
- bnxt_en: Add bnxt_get_num_stats() to centrally get the number of ethtool stats (bsc#1053309).
- bnxt_en: Add missing logic to handle TPA end error conditions (bsc#1053309).
- bnxt_en: Add PCI IDs for BCM57454 VF devices (bsc#1053309).
- bnxt_en: Allow the user to set ethtool stats-block-usecs to 0 (bsc#1053309).
- bnxt_en: Call bnxt_dcb_init() after getting firmware DCBX configuration (bsc#1053309).
- bnxt_en: Check status of firmware DCBX agent before setting DCB_CAP_DCBX_HOST (bsc#1053309).
- bnxt_en: Do not setup MAC address in bnxt_hwrm_func_qcaps() (bsc#963575 FATE#320144).
- bnxt_en: Enable MRU enables bit when configuring VNIC MRU (bnc#1038583).
- bnxt_en: Fix and clarify link_info-&gt;advertising (bnc#1038583).
- bnxt_en: Fix a VXLAN vs GENEVE issue (bnc#1038583).
- bnxt_en: Fix bug in ethtool -L (bsc#1053309).
- bnxt_en: Fix netpoll handling (bsc#1053309).
- bnxt_en: Fix NULL pointer dereference in a failure path during open (bnc#1038583).
- bnxt_en: Fix NULL pointer dereference in reopen failure path (bnc#1038583).
- bnxt_en: fix pci cleanup in bnxt_init_one() failure path (bnc#1038583).
- bnxt_en: Fix race conditions in .ndo_get_stats64() (bsc#1053309).
- bnxt_en: Fix ring arithmetic in bnxt_setup_tc() (bnc#1038583).
- bnxt_en: Fix SRIOV on big-endian architecture (bsc#1053309).
- bnxt_en: Fix TX push operation on ARM64 (bnc#1038583).
- bnxt_en: Fix 'uninitialized variable' bug in TPA code path (bnc#1038583).
- bnxt_en: Fix VF virtual link state (bnc#1038583).
- bnxt_en: Fix xmit_more with BQL (bsc#1053309).
- bnxt_en: Free MSIX vectors when unregistering the device from bnxt_re (bsc#1020412 FATE#321671).
- bnxt_en: Implement ndo_bridge_{get|set}link methods (bsc#1053309).
- bnxt_en: Implement xmit_more (bsc#1053309).
- bnxt_en: initialize rc to zero to avoid returning garbage (bnc#1038583).
- bnxt_en: Optimize doorbell write operations for newer chips (bsc#1053309).
- bnxt_en: Pad TX packets below 52 bytes (bnc#1038583).
- bnxt_en: Pass in sh parameter to bnxt_set_dflt_rings() (bsc#1053309).
- bnxt_en: Refactor TPA code path (bnc#1038583).
- bnxt_en: Report firmware DCBX agent (bsc#1053309).
- bnxt_en: Retrieve the hardware bridge mode from the firmware (bsc#1053309).
- bnxt_en: Set ETS min_bw parameter for older firmware (bsc#1053309).
- bnxt_en: Support for Short Firmware Message (bsc#1053309).
- bnxt_en: Update firmware interface spec to 1.8.0 (bsc#1053309).
- bnxt: fix unsigned comparsion with 0 (bsc#1053309).
- bnxt: fix unused variable warnings (bsc#1053309).
- bnxt_re: Do not issue cmd to delete GID for QP1 GID entry before the QP is destroyed (bsc#1056596).
- bnxt_re: Fix compare and swap atomic operands (bsc#1056596).
- bnxt_re: Fix memory leak in FRMR path (bsc#1056596).
- bnxt_re: Fix race between the netdev register and unregister events (bsc#1037579).
- bnxt_re: Fix update of qplib_qp.mtu when modified (bsc#1056596).
- bnxt_re: Free up devices in module_exit path (bsc#1056596).
- bnxt_re: Remove RTNL lock dependency in bnxt_re_query_port (bsc#1056596).
- bnxt_re: Stop issuing further cmds to FW once a cmd times out (bsc#1056596).
- brcmfmac: setup passive scan if requested by user-space (bnc#1012382).
- bridge: netlink: register netdevice before executing changelink (bnc#1012382).
- bsg-lib: do not free job in bsg_prepare_job (bnc#1012382).
- btrfs: change how we decide to commit transactions during flushing (bsc#1060197).
- btrfs: fix early ENOSPC due to delalloc (bsc#1049226).
- btrfs: fix NULL pointer dereference from free_reloc_roots() (bnc#1012382).
- btrfs: nowait aio: Correct assignment of pos (FATE#321994).
- btrfs: nowait aio support (FATE#321994).
- btrfs: prevent to set invalid default subvolid (bnc#1012382).
- btrfs: propagate error to btrfs_cmp_data_prepare caller (bnc#1012382).
- btrfs: qgroup: move noisy underflow warning to debugging build (bsc#1055755).
- ceph: avoid accessing freeing inode in ceph_check_delayed_caps() (bsc#1048228).
- ceph: avoid invalid memory dereference in the middle of umount (bsc#1048228).
- ceph: avoid panic in create_session_open_msg() if utsname() returns NULL (bsc#1061451).
- ceph: check negative offsets in ceph_llseek() (bsc#1061451).
- ceph: cleanup writepage_nounlock() (bsc#1048228).
- ceph: do not re-send interrupted flock request (bsc#1048228).
- ceph: fix message order check in handle_cap_export() (bsc#1061451).
- ceph: fix NULL pointer dereference in ceph_flush_snaps() (bsc#1061451).
- ceph: fix readpage from fscache (bsc#1057015).
- ceph: getattr before read on ceph.* xattrs (bsc#1048228).
- ceph: handle epoch barriers in cap messages (bsc#1048228).
- ceph: limit osd read size to CEPH_MSG_MAX_DATA_LEN (bsc#1061451).
- ceph: limit osd write size (bsc#1061451).
- ceph: new mount option that specifies fscache uniquifier (bsc#1048228).
- ceph: redirty page when writepage_nounlock() skips unwritable page (bsc#1048228).
- ceph: remove special ack vs commit behavior (bsc#1048228).
- ceph: remove useless page-&gt;mapping check in writepage_nounlock() (bsc#1048228).
- ceph: re-request max size after importing caps (bsc#1048228).
- ceph: stop on-going cached readdir if mds revokes FILE_SHARED cap (bsc#1061451).
- ceph: update ceph_dentry_info::lease_session when necessary (bsc#1048228).
- ceph: update the 'approaching max_size' code (bsc#1048228).
- ceph: validate correctness of some mount options (bsc#1061451).
- ceph: when seeing write errors on an inode, switch to sync writes (bsc#1048228).
- cifs: add build_path_from_dentry_optional_prefix() (fate#323482).
- cifs: add use_ipc flag to SMB2_ioctl() (fate#323482).
- cifs: Fix maximum SMB2 header size (bsc#1056185).
- cifs: Fix SMB3.1.1 guest authentication to Samba (bnc#1012382).
- cifs: Fix sparse warnings (fate#323482).
- cifs: implement get_dfs_refer for SMB2+ (fate#323482).
- cifs: let ses-&gt;ipc_tid hold smb2 TreeIds (fate#323482).
- cifs: move DFS response parsing out of SMB1 code (fate#323482).
- cifs: release auth_key.response for reconnect (bnc#1012382).
- cifs: remove any preceding delimiter from prefix_path (fate#323482).
- cifs: set signing flag in SMB2+ TreeConnect if needed (fate#323482).
- cifs: use DFS pathnames in SMB2+ Create requests (fate#323482).
- clocksource/drivers/arm_arch_timer: Fix mem frame loop initialization (bsc#1055709).
- cpufreq: intel_pstate: Disable energy efficiency optimization (bsc#1054654).
- crush: assume weight_set != null imples weight_set_size &gt; 0 (bsc#1048228).
- crush: crush_init_workspace starts with struct crush_work (bsc#1048228).
- crush: implement weight and id overrides for straw2 (bsc#1048228).
- crush: remove an obsolete comment (bsc#1048228).
- crypto: AF_ALG - remove SGL terminator indicator when chaining (bnc#1012382).
- crypto: chcr - Add ctr mode and process large sg entries for cipher (bsc#1048325).
- crypto: chcr - Avoid changing request structure (bsc#1048325).
- crypto: chcr - Ensure Destination sg entry size less than 2k (bsc#1048325).
- crypto: chcr - Fix fallback key setting (bsc#1048325).
- crypto: chcr - Pass lcb bit setting to firmware (bsc#1048325).
- crypto: chcr - Return correct error code (bsc#1048325).
- crypto: talitos - Do not provide setkey for non hmac hashing algs (bnc#1012382).
- crypto: talitos - fix sha224 (bnc#1012382).
- cxgb4: Fix stack out-of-bounds read due to wrong size to t4_record_mbox() (bsc#1021424 bsc#1022743).
- cxgb4: update latest firmware version supported (bsc#1048327).
- cxgbit: add missing __kfree_skb() (bsc#1052095).
- cxgbit: fix sg_nents calculation (bsc#1052095).
- cxl: Fix driver use count (bnc#1012382).
- device-dax: fix cdev leak (bsc#1057047).
- dmaengine: mmp-pdma: add number of requestors (bnc#1012382).
- dmaengine: mv_xor_v2: do not use descriptors not acked by async_tx (bsc#1056849).
- dmaengine: mv_xor_v2: enable XOR engine after its configuration (bsc#1056849).
- dmaengine: mv_xor_v2: fix tx_submit() implementation (bsc#1056849).
- dmaengine: mv_xor_v2: handle mv_xor_v2_prep_sw_desc() error properly (bsc#1056849).
- dmaengine: mv_xor_v2: properly handle wrapping in the array of HW descriptors (bsc#1056849).
- dmaengine: mv_xor_v2: remove interrupt coalescing (bsc#1056849).
- dmaengine: mv_xor_v2: set DMA mask to 40 bits (bsc#1056849).
- dm mpath: do not lock up a CPU with requeuing activity (bsc#1048912).
- documentation: arm64: pmu: Add Broadcom Vulcan PMU binding (fate#319481).
- driver-core: platform: Add platform_irq_count() (bsc#1062279).
- driver core: platform: Do not read past the end of 'driver_override' buffer (bnc#1012382).
- drivers: base: cacheinfo: fix boot error message when acpi is enabled (bsc#1057849).
- drivers: firmware: psci: drop duplicate const from psci_of_match (FATE#319482 bnc#1012382).
- drivers: hv: fcopy: restore correct transfer length (bnc#1012382).
- drivers: net: phy: xgene: Fix mdio write (bsc#1057383).
- drivers: net: xgene: Fix wrong logical operation (bsc#1056827).
- drivers/perf: arm_pmu_acpi: avoid perf IRQ init when guest PMU is off (bsc#1062279).
- drivers/perf: arm_pmu_acpi: Release memory obtained by kasprintf (bsc#1062279).
- drivers/perf: arm_pmu: add ACPI framework (bsc#1062279).
- drivers/perf: arm_pmu: add common attr group fields (bsc#1062279).
- drivers/perf: arm_pmu: Always consider IRQ0 as an error (bsc#1062279).
- drivers/perf: arm_pmu: Avoid leaking pmu-&gt;irq_affinity on error (bsc#1062279).
- drivers/perf: arm_pmu: avoid NULL dereference when not using devicetree (bsc#1062279).
- drivers/perf: arm-pmu: convert arm_pmu_mutex to spinlock (bsc#1062279).
- drivers/perf: arm_pmu: Defer the setting of __oprofile_cpu_pmu (bsc#1062279).
- drivers/perf: arm_pmu: define armpmu_init_fn (bsc#1062279).
- drivers/perf: arm_pmu: expose a cpumask in sysfs (bsc#1062279).
- drivers/perf: arm_pmu: factor out pmu registration (bsc#1062279).
- drivers/perf: arm-pmu: Fix handling of SPI lacking 'interrupt-affinity' property (bsc#1062279).
- drivers/perf: arm_pmu: Fix NULL pointer dereference during probe (bsc#1062279).
- drivers/perf: arm-pmu: fix RCU usage on pmu resume from low-power (bsc#1062279).
- drivers/perf: arm_pmu: Fix reference count of a device_node in of_pmu_irq_cfg (bsc#1062279).
- drivers/perf: arm_pmu: fold init into alloc (bsc#1062279).
- drivers/perf: arm_pmu: handle no platform_device (bsc#1062279).
- drivers/perf: arm-pmu: Handle per-interrupt affinity mask (bsc#1062279).
- drivers/perf: arm_pmu: implement CPU_PM notifier (bsc#1062279).
- drivers/perf: arm_pmu: make info messages more verbose (bsc#1062279).
- drivers/perf: arm_pmu: manage interrupts per-cpu (bsc#1062279).
- drivers/perf: arm_pmu: move irq request/free into probe (bsc#1062279).
- drivers/perf: arm_pmu: only use common attr_groups (bsc#1062279).
- drivers/perf: arm_pmu: remove pointless PMU disabling (bsc#1062279).
- drivers/perf: arm_pmu: rename irq request/free functions (bsc#1062279).
- drivers/perf: arm_pmu: Request PMU SPIs with IRQF_PER_CPU (bsc#1062279).
- drivers/perf: arm_pmu: rework per-cpu allocation (bsc#1062279).
- drivers/perf: arm_pmu: simplify cpu_pmu_request_irqs() (bsc#1062279).
- drivers/perf: arm_pmu: split cpu-local irq request/free (bsc#1062279).
- drivers/perf: arm_pmu: split irq request from enable (bsc#1062279).
- drivers/perf: arm_pmu: split out platform device probe logic (bsc#1062279).
- drivers/perf: kill armpmu_register (bsc#1062279).
- drm: Add driver-private objects to atomic state (bsc#1055493).
- drm/amdkfd: fix improper return value on error (bnc#1012382).
- drm: bridge: add DT bindings for TI ths8135 (bnc#1012382).
- drm/dp: Introduce MST topology state to track available link bandwidth (bsc#1055493).
- drm_fourcc: Fix DRM_FORMAT_MOD_LINEAR #define (bnc#1012382).
- drm/i915/bios: ignore HDMI on port A (bnc#1012382).
- drm/vmwgfx: Limit max desktop dimensions to 8Kx8K (bsc#1048155).
- e1000e: use disable_hardirq() also for MSIX vectors in e1000_netpoll() (bsc#1022912 FATE#321246).
- edac, sb_edac: Assign EDAC memory controller per h/w controller (bsc#1061721).
- edac, sb_edac: Avoid creating SOCK memory controller (bsc#1061721).
- edac, sb_edac: Bump driver version and do some cleanups (bsc#1061721).
- edac, sb_edac: Carve out dimm-populating loop (bsc#1061721).
- edac, sb_edac: Check if ECC enabled when at least one DIMM is present (bsc#1061721).
- edac, sb_edac: Classify memory mirroring modes (bsc#1061721).
- edac, sb_edac: Classify PCI-IDs by topology (bsc#1061721).
- edac, sb_edac: Do not create a second memory controller if HA1 is not present (bsc#1061721).
- edac, sb_edac: Do not use 'Socket#' in the memory controller name (bsc#1061721).
- edac, sb_edac: Drop NUM_CHANNELS from 8 back to 4 (bsc#1061721).
- edac, sb_edac: Fix mod_name (bsc#1061721).
- edac, sb_edac: Get rid of -&gt;show_interleave_mode() (bsc#1061721).
- edac, sb_edac: Remove double buffering of error records (bsc#1061721).
- edac, sb_edac: Remove NULL pointer check on array pci_tad (bsc#1061721).
- edac, skx_edac: Handle systems with segmented PCI busses (bsc#1063102).
- edac, thunderx: Fix a warning during l2c debugfs node creation (bsc#1057038).
- edac, thunderx: Fix error handling path in thunderx_lmc_probe() (bsc#1057038).
- efi/fb: Avoid reconfiguration of BAR that covers the framebuffer (bsc#1051987).
- efi/fb: Correct PCI_STD_RESOURCE_END usage (bsc#1051987).
- ext4: do not allow encrypted operations without keys (bnc#1012382).
- ext4: fix incorrect quotaoff if the quota feature is enabled (bnc#1012382).
- ext4: fix quota inconsistency during orphan cleanup for read-only mounts (bnc#1012382).
- ext4: nowait aio support (FATE#321994).
- extcon: axp288: Use vbus-valid instead of -present to determine cable presence (bnc#1012382).
- exynos-gsc: Do not swap cb/cr for semi planar formats (bnc#1012382).
- f2fs: check hot_data for roll-forward recovery (bnc#1012382).
- fix flags ordering (bsc#1034075 comment 131)
- Fix mpage_writepage() for pages with buffers (bsc#1050471).
- fix whitespace according to upstream commit
- fix xen_swiotlb_dma_mmap prototype (bnc#1012382).
- fs/epoll: cache leftmost node (bsc#1056427).
- fs: Introduce filemap_range_has_page() (FATE#321994).
- fs: Introduce RWF_NOWAIT and FMODE_AIO_NOWAIT (FATE#321994).
- fs/mpage.c: fix mpage_writepage() for pages with buffers (bsc#1050471). Update to version in mainline
- fs/proc: kcore: use kcore_list type to check for vmalloc/module address (bsc#1046529).
- fs: return if direct I/O will trigger writeback (FATE#321994).
- fs: Separate out kiocb flags setup based on RWF_* flags (FATE#321994).
- fs: Use RWF_* flags for AIO operations (FATE#321994).
- ftrace: Fix kmemleak in unregister_ftrace_graph (bnc#1012382).
- ftrace: Fix memleak when unregistering dynamic ops when tracing disabled (bnc#1012382).
- ftrace: Fix selftest goto location on error (bnc#1012382).
- genirq: Fix for_each_action_of_desc() macro (bsc#1061064).
- getcwd: Close race with d_move called by lustre (bsc#1052593).
- gfs2: Do not clear SGID when inheriting ACLs (bsc#1012829).
- gfs2: Fix debugfs glocks dump (bnc#1012382).
- gfs2: Fix reference to ERR_PTR in gfs2_glock_iter_next (bnc#1012382).
- gianfar: Fix Tx flow control deactivation (bnc#1012382).
- hid: i2c-hid: allocate hid buffers for real worst case (bnc#1012382).
- Hid: usbhid: Add HID_QUIRK_NOGET for Aten CS-1758 KVM switch (bnc#1022967).
- hwmon: (gl520sm) Fix overflows and crash seen when writing into limit attributes (bnc#1012382).
- i2c: designware: Add ACPI HID for Hisilicon Hip07/08 I2C controller (bsc#1049291).
- i2c: designware: Convert to use unified device property API (bsc#1049291).
- i2c: meson: fix wrong variable usage in meson_i2c_put_data (bnc#1012382).
- i2c: xgene: Set ACPI_COMPANION_I2C (bsc#1053633).
- i2c: xgene-slimpro: Add ACPI support by using PCC mailbox (bsc#1053633).
- i2c: xgene-slimpro: include linux/io.h for memremap (bsc#1053633).
- i2c: xgene-slimpro: Use a single function to send command message (bsc#1053633).
- i40e/i40evf: fix out-of-bounds read of cpumask (bsc#1053685).
- i40e: Initialize 64-bit statistics TX ring seqcount (bsc#1024346 FATE#321239 bsc#1024373 FATE#321247).
- i40iw: Add missing memory barriers (bsc#969476 FATE#319648 bsc#969477 FATE#319816).
- i40iw: Fix port number for query QP (bsc#969476 FATE#319648 bsc#969477 FATE#319816).
- ib/core: Add generic function to extract IB speed from netdev (bsc#1056596).
- ib/core: Add ordered workqueue for RoCE GID management (bsc#1056596).
- ib/core: Fix for core panic (bsc#1022595 FATE#322350).
- ib/core: Fix the validations of a multicast LID in attach or detach operations (bsc#1022595 FATE#322350).
- ib/hns: checking for IS_ERR() instead of NULL (bsc#1056849).
- ib/i40iw: Fix error code in i40iw_create_cq() (bsc#969476 FATE#319648 bsc#969477 FATE#319816).
- ib/ipoib: Fix deadlock over vlan_mutex (bnc#1012382 bsc#1022595 FATE#322350).
- ib/ipoib: Replace list_del of the neigh-&gt;list with list_del_init (FATE#322350 bnc#1012382 bsc#1022595).
- ib/ipoib: rtnl_unlock can not come after free_netdev (FATE#322350 bnc#1012382 bsc#1022595).
- ib/mlx5: Change logic for dispatching IB events for port state (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- ib/mlx5: Fix cached MR allocation flow (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- ib/mlx5: Fix Raw Packet QP event handler assignment (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- ibmvnic: Clean up resources on probe failure (fate#323285, bsc#1058116).
- ibmvnic: Set state UP (bsc#1062962).
- ib/qib: fix false-postive maybe-uninitialized warning (FATE#321231 FATE#321473 FATE#322149 FATE#322153 bnc#1012382).
- ib/rxe: Add dst_clone() in prepare_ipv6_hdr() (bsc#1049361).
- ib/rxe: Avoid ICRC errors by copying into the skb first (bsc#1049361).
- ib/rxe: Disable completion upcalls when a CQ is destroyed (bsc#1049361).
- ib/rxe: Fix destination cache for IPv6 (bsc#1049361).
- ib/rxe: Fix up rxe_qp_cleanup() (bsc#1049361).
- ib/rxe: Fix up the responder's find_resources() function (bsc#1049361).
- ib/rxe: Handle NETDEV_CHANGE events (bsc#1049361).
- ib/rxe: Move refcounting earlier in rxe_send() (bsc#1049361).
- ib/rxe: Remove dangling prototype (bsc#1049361).
- ib/rxe: Remove unneeded initialization in prepare6() (bsc#1049361).
- ib/rxe: Set dma_mask and coherent_dma_mask (bsc#1049361).
- igb: re-assign hw address pointer on reset after PCI error (bnc#1012382).
- iio: ad7793: Fix the serial interface reset (bnc#1012382).
- iio: adc: axp288: Drop bogus AXP288_ADC_TS_PIN_CTRL register modifications (bnc#1012382).
- iio: adc: hx711: Add DT binding for avia,hx711 (bnc#1012382).
- iio: adc: mcp320x: Fix oops on module unload (bnc#1012382).
- iio: adc: mcp320x: Fix readout of negative voltages (bnc#1012382).
- iio: adc: twl4030: Disable the vusb3v1 rugulator in the error handling path of 'twl4030_madc_probe()' (bnc#1012382).
- iio: adc: twl4030: Fix an error handling path in 'twl4030_madc_probe()' (bnc#1012382).
- iio: ad_sigma_delta: Implement a dedicated reset function (bnc#1012382).
- iio: core: Return error for failed read_reg (bnc#1012382).
- input: i8042 - add Gigabyte P57 to the keyboard reset table (bnc#1012382).
- iommu/arm-smmu-v3, acpi: Add temporary Cavium SMMU-V3 IORT model number definitions (bsc#1036060).
- iommu/arm-smmu-v3: Increase CMDQ drain timeout value (bsc#1035479). Refresh patch to mainline version
- iommu/io-pgtable-arm: Check for leaf entry before dereferencing it (bnc#1012382).
- iommu/vt-d: Avoid calling virt_to_phys() on null pointer (bsc#1061067).
- ipv6: accept 64k - 1 packet length in ip6_find_1stfragopt() (bnc#1012382).
- ipv6: add rcu grace period before freeing fib6_node (bnc#1012382).
- ipv6: fix memory leak with multiple tables during netns destruction (bnc#1012382).
- ipv6: fix sparse warning on rt6i_node (bnc#1012382).
- ipv6: fix typo in fib6_net_exit() (bnc#1012382).
- irqchip/gic-v3-its: Fix command buffer allocation (bsc#1057067).
- iscsi-target: fix invalid flags in text response (bsc#1052095).
- iw_cxgb4: put ep reference in pass_accept_req() (FATE#321658 bsc#1005778 FATE#321660 bsc#1005780 FATE#321661 bsc#1005781).
- iwlwifi: add workaround to disable wide channels in 5GHz (bnc#1012382).
- iwlwifi: mvm: do not send CTDP commands via debugfs if not supported (bsc#1031717).
- kabi: arm64: compatibility workaround for lse atomics (bsc#1055290).
- kabi fix drivers/nvme/target/nvmet.h (bsc#1058550).
- KABI fixup struct nvmet_sq (bsc#1063349).
- kABI: protect enum fs_flow_table_type (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- kABI: protect enum pid_type (kabi).
- kABI: protect struct iscsi_np (kabi).
- kABI: protect struct mlx5_priv (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- kABI: protect struct rm_data_op (kabi).
- kABI: protect struct sdio_func (kabi).
- kabi/severities: add fs/ceph to kabi severities (bsc#1048228).
- kabi/severities: Ignore drivers/scsi/cxgbi (bsc#1052094)
- kabi/severities: Ignore kABI changes due to last patchset (bnc#1053472)
- kabi/severities: ignore nfs_pgio_data_destroy
- kABI: uninline task_tgid_nr_nr (kabi).
- kABI: Workaround kABI breakage of AMD-AVIC fixes (bsc#1044503).
- kernel/*: switch to memdup_user_nul() (bsc#1048893).
- kernel/sysctl_binary.c: check name array length in deprecated_sysctl_warning() (FATE#323821).
- keys: fix writing past end of user-supplied buffer in keyring_read() (bnc#1012382).
- keys: prevent creating a different user's keyrings (bnc#1012382).
- keys: prevent KEYCTL_READ on negative key (bnc#1012382).
- kvm: Add struct kvm_vcpu pointer parameter to get_enable_apicv() (bsc#1044503).
- kvm: arm64: Restore host physical timer access on hyp_panic() (bsc#1054082).
- kvm: arm/arm64: Fix bug in advertising KVM_CAP_MSI_DEVID capability (bsc#1054082).
- kvm: async_pf: Fix #DF due to inject 'Page not Present' and 'Page Ready' exceptions simultaneously (bsc#1061017).
- kvm, pkeys: do not use PKRU value in vcpu-&gt;arch.guest_fpu.state (bsc#1055935).
- kvm: PPC: Book3S: Fix race and leak in kvm_vm_ioctl_create_spapr_tce() (bnc#1012382).
- kvm: SVM: Add a missing 'break' statement (bsc#1061017).
- kvm: SVM: Add irqchip_split() checks before enabling AVIC (bsc#1044503).
- kvm: SVM: delete avic_vm_id_bitmap (2 megabyte static array) (bsc#1059500).
- kvm: SVM: Refactor AVIC vcpu initialization into avic_init_vcpu() (bsc#1044503).
- kvm: VMX: do not change SN bit in vmx_update_pi_irte() (bsc#1061017).
- kvm: VMX: remove WARN_ON_ONCE in kvm_vcpu_trigger_posted_interrupt (bsc#1061017).
- kvm: VMX: use cmpxchg64 (bnc#1012382).
- kvm: x86: block guest protection keys unless the host has them enabled (bsc#1055935).
- kvm: x86: kABI workaround for PKRU fixes (bsc#1055935).
- kvm: x86: simplify handling of PKRU (bsc#1055935).
- libata: transport: Remove circular dependency at free time (bnc#1012382).
- libceph: abort already submitted but abortable requests when map or pool goes full (bsc#1048228).
- libceph: add an epoch_barrier field to struct ceph_osd_client (bsc#1048228).
- libceph: advertise support for NEW_OSDOP_ENCODING and SERVER_LUMINOUS (bsc#1048228).
- libceph: advertise support for OSD_POOLRESEND (bsc#1048228).
- libceph: allow requests to return immediately on full conditions if caller wishes (bsc#1048228).
- libceph: always populate t-&gt;target_{oid,oloc} in calc_target() (bsc#1048228).
- libceph: always signal completion when done (bsc#1048228).
- libceph: apply_upmap() (bsc#1048228).
- libceph: avoid unnecessary pi lookups in calc_target() (bsc#1048228).
- libceph: ceph_connection_operations::reencode_message() method (bsc#1048228).
- libceph: ceph_decode_skip_* helpers (bsc#1048228).
- libceph: compute actual pgid in ceph_pg_to_up_acting_osds() (bsc#1048228).
- libceph, crush: per-pool crush_choose_arg_map for crush_do_rule() (bsc#1048228).
- libceph: delete from need_resend_linger before check_linger_pool_dne() (bsc#1048228).
- libceph: do not allow bidirectional swap of pg-upmap-items (bsc#1061451).
- libceph: do not call encode_request_finish() on MOSDBackoff messages (bsc#1048228).
- libceph: do not call -&gt;reencode_message() more than once per message (bsc#1048228).
- libceph: do not pass pgid by value (bsc#1048228).
- libceph: drop need_resend from calc_target() (bsc#1048228).
- libceph: encode_{pgid,oloc}() helpers (bsc#1048228).
- libceph: fallback for when there isn't a pool-specific choose_arg (bsc#1048228).
- libceph: fix old style declaration warnings (bsc#1048228).
- libceph: foldreq-&gt;last_force_resend into ceph_osd_request_target (bsc#1048228).
- libceph: get rid of ack vs commit (bsc#1048228).
- libceph: handle non-empty dest in ceph_{oloc,oid}_copy() (bsc#1048228).
- libceph: initialize last_linger_id with a large integer (bsc#1048228).
- libceph: introduce and switch to decode_pg_mapping() (bsc#1048228).
- libceph: introduce ceph_spg, ceph_pg_to_primary_shard() (bsc#1048228).
- libceph: kill __{insert,lookup,remove}_pg_mapping() (bsc#1048228).
- libceph: make DEFINE_RB_* helpers more general (bsc#1048228).
- libceph: make encode_request_*() work with r_mempool requests (bsc#1048228).
- libceph: make RECOVERY_DELETES feature create a new interval (bsc#1048228).
- libceph: make sure need_resend targets reflect latest map (bsc#1048228).
- libceph: MOSDOp v8 encoding (actual spgid + full hash) (bsc#1048228).
- libceph: new features macros (bsc#1048228).
- libceph: new pi-&gt;last_force_request_resend (bsc#1048228).
- libceph: NULL deref on osdmap_apply_incremental() error path (bsc#1048228).
- libceph: osd_request_timeout option (bsc#1048228).
- libceph: osd_state is 32 bits wide in luminous (bsc#1048228).
- libceph: pg_upmap[_items] infrastructure (bsc#1048228).
- libceph: pool deletion detection (bsc#1048228).
- libceph: potential NULL dereference in ceph_msg_data_create() (bsc#1048228).
- libceph: remove ceph_sanitize_features() workaround (bsc#1048228).
- libceph: remove now unused finish_request() wrapper (bsc#1048228).
- libceph: remove req-&gt;r_replay_version (bsc#1048228).
- libceph: resend on PG splits if OSD has RESEND_ON_SPLIT (bsc#1048228).
- libceph: respect RADOS_BACKOFF backoffs (bsc#1048228).
- libceph: set -EINVAL in one place in crush_decode() (bsc#1048228).
- libceph: support SERVER_JEWEL feature bits (bsc#1048228).
- libceph: take osdc-&gt;lock in osdmap_show() and dump flags in hex (bsc#1048228).
- libceph: upmap semantic changes (bsc#1048228).
- libceph: use alloc_pg_mapping() in __decode_pg_upmap_items() (bsc#1048228).
- libceph: use target pi for calc_target() calculations (bsc#1048228).
- lib: test_rhashtable: fix for large entry counts (bsc#1055359).
- lib: test_rhashtable: Fix KASAN warning (bsc#1055359).
- lightnvm: remove unused rq parameter of nvme_nvm_rqtocmd() to kill warning (FATE#319466).
- locking/rwsem: Fix down_write_killable() for CONFIG_RWSEM_GENERIC_SPINLOCK=y (bsc#969756).
- locking/rwsem-spinlock: Fix EINTR branch in __down_write_common() (bsc#969756).
- lpfc: Add Buffer to Buffer credit recovery support (bsc#1052384).
- lpfc: convert info messages to standard messages (bsc#1052384).
- lpfc: Correct issues with FAWWN and FDISCs (bsc#1052384).
- lpfc: Correct return error codes to align with nvme_fc transport (bsc#1052384).
- lpfc: Fix bad sgl reposting after 2nd adapter reset (bsc#1052384).
- lpfc: Fix crash in lpfc nvmet when fc port is reset (bsc#1052384).
- lpfc: Fix duplicate NVME rport entries and namespaces (bsc#1052384).
- lpfc: Fix handling of FCP and NVME FC4 types in Pt2Pt topology (bsc#1052384).
- lpfc: fix 'integer constant too large' error on 32bit archs (bsc#1052384).
- lpfc: Fix loop mode target discovery (bsc#1052384).
- lpfc: Fix MRQ &gt; 1 context list handling (bsc#1052384).
- lpfc: Fix NVME PRLI handling during RSCN (bsc#1052384).
- lpfc: Fix nvme target failure after 2nd adapter reset (bsc#1052384).
- lpfc: Fix oops when NVME Target is discovered in a nonNVME environment (bsc#1052384).
- lpfc: Fix plogi collision that causes illegal state transition (bsc#1052384).
- lpfc: Fix rediscovery on switch blade pull (bsc#1052384).
- lpfc: Fix relative offset error on large nvmet target ios (bsc#1052384).
- lpfc: fixup crash during storage failover operations (bsc#1042847).
- lpfc: Limit amount of work processed in IRQ (bsc#1052384).
- lpfc: lpfc version bump 11.4.0.3 (bsc#1052384).
- lpfc: remove console log clutter (bsc#1052384).
- lpfc: support nvmet_fc defer_rcv callback (bsc#1052384).
- lsm: fix smack_inode_removexattr and xattr_getsecurity memleak (bnc#1012382).
- mac80211: flush hw_roc_start work before cancelling the ROC (bnc#1012382).
- md/bitmap: disable bitmap_resize for file-backed bitmaps (bsc#1061172).
- md/raid10: submit bio directly to replacement disk (bnc#1012382).
- md/raid5: fix a race condition in stripe batch (linux-stable).
- md/raid5: preserve STRIPE_ON_UNPLUG_LIST in break_stripe_batch_list (bnc#1012382).
- md/raid5: release/flush io in raid5_do_work() (bnc#1012382).
- media: uvcvideo: Prevent heap overflow when accessing mapped controls (bnc#1012382).
- media: v4l2-compat-ioctl32: Fix timespec conversion (bnc#1012382).
- megaraid_sas: Fix probing cards without io port (bsc#1053681).
- mips: Ensure bss section ends on a long-aligned address (bnc#1012382).
- mips: Fix minimum alignment requirement of IRQ stack (git-fixes).
- mips: IRQ Stack: Unwind IRQ stack onto task stack (bnc#1012382).
- mips: Lantiq: Fix another request_mem_region() return code check (bnc#1012382).
- mips: math-emu: &lt;MAXA|MINA&gt;.&lt;D|S&gt;: Fix cases of both infinite inputs (bnc#1012382).
- mips: math-emu: &lt;MAXA|MINA&gt;.&lt;D|S&gt;: Fix cases of input values with opposite signs (bnc#1012382).
- mips: math-emu: &lt;MAX|MAXA|MIN|MINA&gt;.&lt;D|S&gt;: Fix cases of both inputs zero (bnc#1012382).
- mips: math-emu: &lt;MAX|MAXA|MIN|MINA&gt;.&lt;D|S&gt;: Fix quiet NaN propagation (bnc#1012382).
- mips: math-emu: &lt;MAX|MIN&gt;.&lt;D|S&gt;: Fix cases of both inputs negative (bnc#1012382).
- mips: math-emu: MINA.&lt;D|S&gt;: Fix some cases of infinity and zero inputs (bnc#1012382).
- mips: ralink: Fix incorrect assignment on ralink_soc (bnc#1012382).
- mlx5: Avoid that mlx5_ib_sg_to_klms() overflows the klms array (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- mm: avoid marking swap cached page as lazyfree (VM Functionality, bsc#1061775).
- mm/backing-dev.c: fix an error handling path in 'cgwb_create()' (bnc#1063475).
- mmc: mmc: correct the logic for setting HS400ES signal voltage (bsc#1054082).
- mm,compaction: serialize waitqueue_active() checks (for real) (bsc#971975).
- mmc: sdhci-xenon: add set_power callback (bsc#1057035).
- mmc: sdhci-xenon: Fix the work flow in xenon_remove() (bsc#1057035).
- mmc: sdio: fix alignment issue in struct sdio_func (bnc#1012382).
- mm: discard memblock data later (bnc#1063460).
- mm: fix data corruption caused by lazyfree page (VM Functionality, bsc#1061775).
- mm, madvise: ensure poisoned pages are removed from per-cpu lists (VM hw poison -- git fixes).
- mm/memblock.c: reversed logic in memblock_discard() (bnc#1063460).
- mm: meminit: mark init_reserved_page as __meminit (bnc#1063509).
- mm/memory_hotplug: change pfn_to_section_nr/section_nr_to_pfn macro to inline function (bnc#1063501).
- mm/memory_hotplug: define find_{smallest|biggest}_section_pfn as unsigned long (bnc#1063520).
- mm/page_alloc.c: apply gfp_allowed_mask before the first allocation attempt (bnc#971975 VM -- git fixes).
- mm: prevent double decrease of nr_reserved_highatomic (bnc#1012382).
- mm/vmalloc.c: huge-vmap: fail gracefully on unexpected huge vmap mappings (bsc#1046529).
- mptsas: Fixup device hotplug for VMWare ESXi (bsc#1030850).
- net: core: Prevent from dereferencing null pointer when releasing SKB (bnc#1012382).
- net: ethernet: hip04: Call SET_NETDEV_DEV() (bsc#1049336).
- netfilter: fix IS_ERR_VALUE usage (bsc#1052888).
- netfilter: invoke synchronize_rcu after set the _hook_ to NULL (bnc#1012382).
- netfilter: nfnl_cthelper: fix incorrect helper-&gt;expect_class_max (bnc#1012382).
- netfilter: x_tables: pack percpu counter allocations (bsc#1052888).
- netfilter: x_tables: pass xt_counters struct instead of packet counter (bsc#1052888).
- netfilter: x_tables: pass xt_counters struct to counter allocator (bsc#1052888).
- net: hns: add acpi function of xge led control (bsc#1049336).
- net: hns: Fix a skb used after free bug (bsc#1049336).
- net/mlx4_core: Enable 4K UAR if SRIOV module parameter is not enabled (bsc#966191 FATE#320230 bsc#966186 FATE#320228).
- net/mlx5: Check device capability for maximum flow counters (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5: Delay events till ib registration ends (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5e: Check for qos capability in dcbnl_initialize (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5e: Do not add/remove 802.1ad rules when changing 802.1Q VLAN filter (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5e: Fix calculated checksum offloads counters (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5e: Fix dangling page pointer on DMA mapping error (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5e: Fix DCB_CAP_ATTR_DCBX capability for DCBNL getcap (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5e: Fix inline header size for small packets (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5e: Print netdev features correctly in error message (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5e: Schedule overflow check work to mlx5e workqueue (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5: E-Switch, Unload the representors in the correct order (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5: Fix arm SRQ command for ISSI version 0 (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5: Fix command completion after timeout access invalid structure (bsc#966318 FATE#320158 bsc#966316 FATE#320159).
- net/mlx5: Fix counter list hardware structure (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5: Remove the flag MLX5_INTERFACE_STATE_SHUTDOWN (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5: Skip mlx5_unload_one if mlx5_load_one fails (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net: mvpp2: fix the mac address used when using PPv2.2 (bsc#1032150).
- net: mvpp2: use {get, put}_cpu() instead of smp_processor_id() (bsc#1032150).
- net/packet: check length in getsockopt() called with PACKET_HDRLEN (bnc#1012382).
- net: phy: Fix lack of reference count on PHY driver (bsc#1049336).
- net: phy: Fix PHY module checks and NULL deref in phy_attach_direct() (bsc#1049336).
- netvsc: Initialize 64-bit stats seqcount (fate#320485).
- new helper: memdup_user_nul() (bsc#1048893).
- nfsd: Fix general protection fault in release_lock_stateid() (bnc#1012382).
- nfs: flush data when locking a file to ensure cache coherence for mmap (bsc#981309).
- nvme: allow timed-out ios to retry (bsc#1063349).
- nvme-fabrics: generate spec-compliant UUID NQNs (bsc#1057498).
- nvme-fc: address target disconnect race conditions in fcp io submit (bsc#1052384).
- nvme-fc: do not override opts-&gt;nr_io_queues (bsc#1052384).
- nvme-fc: kABI fix for defer_rcv() callback (bsc#1052384).
- nvme_fc/nvmet_fc: revise Create Association descriptor length (bsc#1052384).
- nvme_fc: Reattach to localports on re-registration (bsc#1052384).
- nvme-fc: revise TRADDR parsing (bsc#1052384).
- nvme-fc: update tagset nr_hw_queues after queues reinit (bsc#1052384).
- nvme-fc: use blk_mq_delay_run_hw_queue instead of open-coding it (bsc#1052384).
- nvme: fix hostid parsing (bsc#1049272).
- nvme: fix sqhd reference when admin queue connect fails (bsc#1063349).
- nvme: fix visibility of 'uuid' ns attribute (bsc#1060400).
- nvme-loop: update tagset nr_hw_queues after reconnecting/resetting (bsc#1052384).
- nvme: protect against simultaneous shutdown invocations (FATE#319965 bnc#1012382 bsc#964944).
- nvme-rdma: update tagset nr_hw_queues after reconnecting/resetting (bsc#1052384).
- nvme: stop aer posting if controller state not live (bsc#1063349).
- nvmet: avoid unneeded assignment of submit_bio return value (bsc#1052384).
- nvmet_fc: Accept variable pad lengths on Create Association LS (bsc#1052384).
- nvmet_fc: add defer_req callback for deferment of cmd buffer return (bsc#1052384).
- nvmet-fc: correct use after free on list teardown (bsc#1052384).
- nvmet-fc: eliminate incorrect static markers on local variables (bsc#1052384).
- nvmet-fc: fix byte swapping in nvmet_fc_ls_create_association (bsc#1052384).
- nvmet_fc: Simplify sg list handling (bsc#1052384).
- nvmet: implement valid sqhd values in completions (bsc#1063349).
- nvmet: Move serial number from controller to subsystem (bsc#1058550).
- nvmet: prefix version configfs file with attr (bsc#1052384).
- nvmet: preserve controller serial number between reboots (bsc#1058550).
- nvmet: synchronize sqhd update (bsc#1063349).
- nvme: use device_add_disk_with_groups() (bsc#1060400).
- of: fix '/cpus' reference leak in of_numa_parse_cpu_nodes() (bsc#1056827).
- ovl: fix dentry leak for default_permissions (bsc#1054084).
- parisc: perf: Fix potential NULL pointer dereference (bnc#1012382).
- partitions/efi: Fix integer overflow in GPT size calculation (FATE#322379 bnc#1012382 bsc#1020989).
- pci: Allow PCI express root ports to find themselves (bsc#1061046).
- pci: fix oops when try to find Root Port for a PCI device (bsc#1061046).
- pci: Fix race condition with driver_override (bnc#1012382).
- pci: Mark AMD Stoney GPU ATS as broken (bsc#1061046).
- pci: rockchip: Handle regulator_get_current_limit() failure correctly (bsc#1056849).
- pci: rockchip: Use normal register bank for config accessors (bsc#1056849).
- pci: shpchp: Enable bridge bus mastering if MSI is enabled (bnc#1012382).
- percpu_ref: allow operation mode switching operations to be called concurrently (bsc#1055096).
- percpu_ref: remove unnecessary RCU grace period for staggered atomic switching confirmation (bsc#1055096).
- percpu_ref: reorganize __percpu_ref_switch_to_atomic() and relocate percpu_ref_switch_to_atomic() (bsc#1055096).
- percpu_ref: restructure operation mode switching (bsc#1055096).
- percpu_ref: unify staggered atomic switching wait behavior (bsc#1055096).
- perf: arm: acpi: remove cpu hotplug statemachine dependency (bsc#1062279).
- perf: arm: platform: remove cpu hotplug statemachine dependency (bsc#1062279).
- perf: arm: replace irq_get_percpu_devid_partition call (bsc#1062279).
- perf: arm: temporary workaround for build errors (bsc#1062279).
- perf: Convert to using %pOF instead of full_name (bsc#1062279).
- perf/x86: Fix RDPMC vs. mm_struct tracking (bsc#1061831).
- perf/x86: kABI Workaround for 'perf/x86: Fix RDPMC vs. mm_struct tracking' (bsc#1061831).
- perf: xgene: Add APM X-Gene SoC Performance Monitoring Unit driver (bsc#1036737).
- perf: xgene: Include module.h (bsc#1036737).
- perf: xgene: Move PMU leaf functions into function pointer structure (bsc#1036737).
- perf: xgene: Parse PMU subnode from the match table (bsc#1036737).
- phy: Do not increment MDIO bus refcount unless it's a different owner (bsc#1049336).
- phy: fix error case of phy_led_triggers_(un)register (bsc#1049336).
- pm / Domains: Fix unsafe iteration over modified list of domains (bsc#1056849).
- powerpc: Fix DAR reporting when alignment handler faults (bnc#1012382).
- powerpc: Fix unused function warning 'lmb_to_memblock' (FATE#322022).
- powerpc/perf: Cleanup of PM_BR_CMPL vs. PM_BRU_CMPL in Power9 event list (bsc#1056686, fate#321438, bsc#1047238, git-fixes 34922527a2bc).
- powerpc/perf: Factor out PPMU_ONLY_COUNT_RUN check code from power8 (fate#321438, bsc#1053043, git-fixes efe881afdd999).
- powerpc/pseries: Add pseries hotplug workqueue (FATE#322022).
- powerpc/pseries: Auto-online hotplugged memory (FATE#322022).
- powerpc/pseries: Check memory device state before onlining/offlining (FATE#322022).
- powerpc/pseries: Correct possible read beyond dlpar sysfs buffer (FATE#322022).
- powerpc/pseries: Do not attempt to acquire drc during memory hot add for assigned lmbs (FATE#322022).
- powerpc/pseries: Fix build break when MEMORY_HOTREMOVE=n (FATE#322022).
- powerpc/pseries: fix memory leak in queue_hotplug_event() error path (FATE#322022).
- powerpc/pseries: Fix parent_dn reference leak in add_dt_node() (bnc#1012382).
- powerpc/pseries: Implement indexed-count hotplug memory add (FATE#322022).
- powerpc/pseries: Implement indexed-count hotplug memory remove (FATE#322022).
- powerpc/pseries: Introduce memory hotplug READD operation (FATE#322022).
- powerpc/pseries: Make the acquire/release of the drc for memory a seperate step (FATE#322022).
- powerpc/pseries: Remove call to memblock_add() (FATE#322022).
- powerpc/pseries: Revert 'Auto-online hotplugged memory' (FATE#322022).
- powerpc/pseries: Update affinity for memory and cpus specified in a PRRN event (FATE#322022).
- powerpc/pseries: Use kernel hotplug queue for PowerVM hotplug events (FATE#322022).
- powerpc/pseries: Use lmb_is_removable() to check removability (FATE#322022).
- powerpc/pseries: Verify CPU does not exist before adding (FATE#322022).
- qeth: add network device features for VLAN devices (bnc#1053472, LTC#157385).
- qlge: avoid memcpy buffer overflow (bnc#1012382).
- r8169: Add support for restarting auto-negotiation (bsc#1050742).
- r8169:Correct the way of setting RTL8168DP ephy (bsc#1050742).
- r8169:fix system hange problem (bsc#1050742).
- r8169:Fix typo in setting RTL8168H PHY parameter (bsc#1050742).
- r8169:Fix typo in setting RTL8168H PHY PFM mode (bsc#1050742).
- r8169:Remove unnecessary phy reset for pcie nic when setting link spped (bsc#1050742).
- r8169:Update the way of reading RTL8168H PHY register 'rg_saw_cnt' (bsc#1050742).
- rda=sRDMA: Fix the composite message user notification (bnc#1012382).
- rdma/bnxt_re: Allocate multiple notification queues (bsc#1037579).
- rdma/bnxt_re: Implement the alloc/get_hw_stats callback (bsc#1037579).
- rdma: Fix return value check for ib_get_eth_speed() (bsc#1056596).
- rdma/qedr: Parse VLAN ID correctly and ignore the value of zero (bsc#1019695 FATE#321703 bsc#1019699 FATE#321702 bsc#1022604 FATE#321747).
- rdma/qedr: Parse vlan priority as sl (bsc#1019695 FATE#321703 bsc#1019699 FATE#321702 bsc#1022604 FATE#321747).
- rds: ib: add error handle (bnc#1012382).
- Remove patch 0407-nvme_fc-change-failure-code-on-remoteport-connectivi.patch (bsc#1037838)
- Remove superfluous hunk in bigmem backport (bsc#1064436).
- Revert 'ceph: SetPageError() for writeback pages if writepages fails' (bsc#1048228).
- Revert 'ipv6: add rcu grace period before freeing fib6_node' (kabi).
- Revert 'ipv6: fix sparse warning on rt6i_node' (kabi).
- Revert 'net: fix percpu memory leaks' (bnc#1012382).
- Revert 'net: phy: Correctly process PHY_HALTED in phy_stop_machine()' (bnc#1012382).
- Revert 'net: use lib/percpu_counter API for fragmentation mem accounting' (bnc#1012382).
- Revert 'Update patches.fixes/xfs-refactor-log-record-unpack-and-data-processing.patch (bsc#1043598, bsc#1036215).' This reverts commit 54e17b011580b532415d2aee5e875c8cf0460df4.
- Revert 'x86/acpi: Enable MADT APIs to return disabled apicids' (bnc#1056230).
- Revert 'x86/acpi: Set persistent cpuid &amp;lt;-&amp;gt; nodeid mapping when booting' (bnc#1056230).
- Revert 'xfs: detect and handle invalid iclog size set by mkfs (bsc#1043598).' This reverts commit caf0b124b172568b3e39544cb9abfdaa7fb3d852.
- Revert 'xfs: detect and trim torn writes during log recovery (bsc#1036215).' This reverts commit a7a591776e8628a33f0223ca9a3f46c1e79bd908.
- Revert 'xfs: refactor and open code log record crc check (bsc#1036215).' This reverts commit 6aef5e1fee21246222618f2337c84d6093281561.
- Revert 'xfs: refactor log record start detection into a new helper (bsc#1036215).' This reverts commit a424c875bdc05dcf3bb0d1af740b644773091cf0.
- Revert 'xfs: return start block of first bad log record during recovery (bsc#1036215).' This reverts commit cb0ce8b2f1435d7ac9aaeb5d5709e73946d55bed.
- Revert 'xfs: support a crc verification only log record pass (bsc#1036215).' This reverts commit f5c0c41b1f3626750f1f0d76b6d71fac673854d2.
- Rewrote KVM kABI fix patches for addressing regressions (bsc#1063570)
- rtnetlink: fix rtnl_vfinfo_size (bsc#1056261).
- s390/cpcmd,vmcp: avoid GFP_DMA allocations (bnc#1060249, LTC#159112).
- s390/diag: add diag26c support (bnc#1053472, LTC#156729).
- s390: export symbols for crash-kmp (bsc#1053915).
- s390: Include uapi/linux/if_ether.h instead of linux/if_ether.h (bsc#1053472).
- s390/pci: do not cleanup in arch_setup_msi_irqs (bnc#1053472, LTC#157731).
- s390/pci: fix handling of PEC 306 (bnc#1053472, LTC#157731).
- s390/pci: improve error handling during fmb (de)registration (bnc#1053472, LTC#157731).
- s390/pci: improve error handling during interrupt deregistration (bnc#1053472, LTC#157731).
- s390/pci: improve pci hotplug (bnc#1053472, LTC#157731).
- s390/pci: improve unreg_ioat error handling (bnc#1053472, LTC#157731).
- s390/pci: introduce clp_get_state (bnc#1053472, LTC#157731).
- s390/pci: provide more debug information (bnc#1053472, LTC#157731).
- s390/pci: recognize name clashes with uids (bnc#1053472, LTC#157731).
- s390/qdio: avoid reschedule of outbound tasklet once killed (bnc#1060249, LTC#159885).
- s390/qeth: no ETH header for outbound AF_IUCV (bnc#1053472, LTC#156276).
- s390/qeth: size calculation outbound buffers (bnc#1053472, LTC#156276).
- s390/qeth: use diag26c to get MAC address on L2 (bnc#1053472, LTC#156729).
- s390/topology: alternative topology for topology-less machines (bnc#1060249, LTC#159177).
- s390/topology: always use s390 specific sched_domain_topology_level (bnc#1060249, LTC#159177).
- s390/topology: enable / disable topology dynamically (bnc#1060249, LTC#159177).
- sched/cpuset/pm: Fix cpuset vs. suspend-resume bugs (bnc#1012382).
- scsi: csiostor: add check for supported fw version (bsc#1005776).
- scsi: csiostor: add support for Chelsio T6 adapters (bsc#1005776).
- scsi: csiostor: fix use after free in csio_hw_use_fwconfig() (bsc#1005776).
- scsi: csiostor: switch to pci_alloc_irq_vectors (bsc#1005776).
- scsi: csiostor: update module version (bsc#1052093).
- scsi: cxgb4i: assign rxqs in round robin mode (bsc#1052094).
- scsi: fixup kernel warning during rmmod() (bsc#1052360).
- scsi: hisi_sas: add missing break in switch statement (bsc#1056849).
- scsi: ILLEGAL REQUEST + ASC==27 =&gt; target failure (bsc#1059465).
- scsi: libfc: fix a deadlock in fc_rport_work (bsc#1063695).
- scsi: lpfc: Ensure io aborts interlocked with the target (bsc#1056587).
- scsi: megaraid_sas: Check valid aen class range to avoid kernel panic (bnc#1012382).
- scsi: megaraid_sas: Return pended IOCTLs with cmd_status MFI_STAT_WRONG_STATE in case adapter is dead (bnc#1012382).
- scsi: qedf: Fix a potential NULL pointer dereference (bsc#1048912).
- scsi: qedf: Limit number of CQs (bsc#1040813).
- scsi: qedi: off by one in qedi_get_cmd_from_tid() (bsc#1004527, FATE#321744).
- scsi: qla2xxx: Fix uninitialized work element (bsc#1019675,FATE#321701).
- scsi: scsi_transport_fc: Also check for NOTPRESENT in fc_remote_port_add() (bsc#1037890).
- scsi: scsi_transport_fc: set scsi_target_id upon rescan (bsc#1058135).
- scsi: sd: Do not override max_sectors_kb sysfs setting (bsc#1025461).
- scsi: sd: Remove LBPRZ dependency for discards (bsc#1060985). This patch is originally part of a larger series which can't be easily backported to SLE-12. For a reasoning why we think it's safe to apply, see bsc#1060985, comment 20.
- scsi: sg: close race condition in sg_remove_sfp_usercontext() (bsc#1064206).
- scsi: sg: do not return bogus Sg_requests (bsc#1064206).
- scsi: sg: factor out sg_fill_request_table() (bnc#1012382).
- scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE (bnc#1012382).
- scsi: sg: off by one in sg_ioctl() (bnc#1012382).
- scsi: sg: only check for dxfer_len greater than 256M (bsc#1064206).
- scsi: sg: remove 'save_scat_len' (bnc#1012382).
- scsi: sg: use standard lists for sg_requests (bnc#1012382).
- scsi: storvsc: fix memory leak on ring buffer busy (bnc#1012382).
- scsi_transport_fc: Also check for NOTPRESENT in fc_remote_port_add() (bsc#1037890).
- scsi: zfcp: add handling for FCP_RESID_OVER to the fcp ingress path (bnc#1012382).
- scsi: zfcp: fix capping of unsuccessful GPN_FT SAN response trace records (bnc#1012382).
- scsi: zfcp: fix missing trace records for early returns in TMF eh handlers (bnc#1012382).
- scsi: zfcp: fix passing fsf_req to SCSI trace on TMF to correlate with HBA (bnc#1012382).
- scsi: zfcp: fix payload with full FCP_RSP IU in SCSI trace records (bnc#1012382).
- scsi: zfcp: fix queuecommand for scsi_eh commands when DIX enabled (bnc#1012382).
- scsi: zfcp: trace HBA FSF response by default on dismiss or timedout late response (bnc#1012382).
- scsi: zfcp: trace high part of 'new' 64 bit SCSI LUN (bnc#1012382).
- seccomp: fix the usage of get/put_seccomp_filter() in seccomp_get_filter() (bnc#1012382).
- sh_eth: use correct name for ECMR_MPDE bit (bnc#1012382).
- skd: Avoid that module unloading triggers a use-after-free (bnc#1012382).
- skd: Submit requests to firmware before triggering the doorbell (bnc#1012382).
- SMB3: Do not ignore O_SYNC/O_DSYNC and O_DIRECT flags (bnc#1012382).
- SMB: Validate negotiate (to protect against downgrade) even if signing off (bnc#1012382).
- staging: iio: ad7192: Fix - use the dedicated reset function avoiding dma from stack (bnc#1012382).
- stm class: Fix a use-after-free (bnc#1012382).
- supported.conf: clear mistaken external support flag for cifs.ko (bsc#1053802).
- supported.conf: enable dw_mmc-rockchip driver References: bsc#1064064
- swiotlb-xen: implement xen_swiotlb_dma_mmap callback (bnc#1012382).
- sysctl: fix lax sysctl_check_table() sanity check (bsc#1048893).
- sysctl: fold sysctl_writes_strict checks into helper (bsc#1048893).
- sysctl: kdoc'ify sysctl_writes_strict (bsc#1048893).
- sysctl: simplify unsigned int support (bsc#1048893).
- team: call netdev_change_features out of team lock (bsc#1055567).
- team: fix memory leaks (bnc#1012382).
- timer/sysclt: Restrict timer migration sysctl values to 0 and 1 (bnc#1012382).
- tpm: fix: return rc when devm_add_action() fails (bsc#1020645, fate#321435, fate#321507, fate#321600, bsc#1034048, git-fixes 8e0ee3c9faed).
- tpm: read burstcount from TPM_STS in one 32-bit transaction (bsc#1020645, fate#321435, fate#321507, fate#321600, bsc#1034048, git-fixes 27084efee0c3).
- tpm_tis_core: Choose appropriate timeout for reading burstcount (bsc#1020645, fate#321435, fate#321507, fate#321600, bsc#1034048, git-fixes aec04cbdf723).
- tpm_tis_core: convert max timeouts from msec to jiffies (bsc#1020645, fate#321435, fate#321507, fate#321600, bsc#1034048, git-fixes aec04cbdf723).
- tracing: Apply trace_clock changes to instance max buffer (bnc#1012382).
- tracing: Erase irqsoff trace with empty write (bnc#1012382).
- tracing: Fix trace_pipe behavior for instance traces (bnc#1012382).
- ttpci: address stringop overflow warning (bnc#1012382).
- tty: fix __tty_insert_flip_char regression (bnc#1012382).
- tty: goldfish: Fix a parameter of a call to free_irq (bnc#1012382).
- tty: improve tty_insert_flip_char() fast path (bnc#1012382).
- tty: improve tty_insert_flip_char() slow path (bnc#1012382).
- tty: pl011: fix initialization order of QDF2400 E44 (bsc#1054082).
- tty: serial: msm: Support more bauds (git-fixes).
- ubifs: Correctly evict xattr inodes (bsc#1012829).
- ubifs: Do not leak kernel memory to the MTD (bsc#1012829).
- Update patches.drivers/0029-perf-xgene-Remove-bogus-IS_ERR-check.patch (bsc#1036737).
- Update patches.drivers/tpm-141-fix-RC-value-check-in-tpm2_seal_trusted.patch (bsc#1020645, fate#321435, fate#321507, fate#321600, bsc#1034048, git-fixes 5ca4c20cfd37).
- usb: chipidea: vbus event may exist before starting gadget (bnc#1012382).
- usb: core: fix device node leak (bsc#1047487).
- usb: core: harden cdc_parse_cdc_header (bnc#1012382).
- usb: devio: Do not corrupt user memory (bnc#1012382).
- usb: dummy-hcd: fix connection failures (wrong speed) (bnc#1012382).
- usb: dummy-hcd: Fix erroneous synchronization change (bnc#1012382).
- usb: dummy-hcd: fix infinite-loop resubmission bug (bnc#1012382).
- usb: fix out-of-bounds in usb_set_configuration (bnc#1012382).
- usb: gadgetfs: fix copy_to_user while holding spinlock (bnc#1012382).
- usb: gadgetfs: Fix crash caused by inadequate synchronization (bnc#1012382).
- usb: gadget: inode.c: fix unbalanced spin_lock in ep0_write (bnc#1012382).
- usb: gadget: mass_storage: set msg_registered after msg registered (bnc#1012382).
- usb: gadget: udc: atmel: set vbus irqflags explicitly (bnc#1012382).
- usb: g_mass_storage: Fix deadlock when driver is unbound (bnc#1012382).
- usb: Increase quirk delay for USB devices (bnc#1012382).
- usb: pci-quirks.c: Corrected timeout values used in handshake (bnc#1012382).
- usb: plusb: Add support for PL-27A1 (bnc#1012382).
- usb: renesas_usbhs: fix the BCLR setting condition for non-DCP pipe (bnc#1012382).
- usb: renesas_usbhs: fix usbhsf_fifo_clear() for RX direction (bnc#1012382).
- usb: serial: mos7720: fix control-message error handling (bnc#1012382).
- usb: serial: mos7840: fix control-message error handling (bnc#1012382).
- usb-storage: unusual_devs entry to fix write-access regression for Seagate external drives (bnc#1012382).
- usb: uas: fix bug in handling of alternate settings (bnc#1012382).
- uwb: ensure that endpoint is interrupt (bnc#1012382).
- uwb: properly check kthread_run return value (bnc#1012382).
- vfs: Return -ENXIO for negative SEEK_HOLE / SEEK_DATA offsets (bnc#1012382).
- video: fbdev: aty: do not leak uninitialized padding in clk to userspace (bnc#1012382).
- Workaround for kABI compatibility with DP-MST patches (bsc#1055493).
- x86/acpi: Restore the order of CPU IDs (bnc#1056230).
- x86/cpu/amd: Hide unused legacy_fixup_core_id() function (bsc#1060229).
- x86/cpu/amd: Limit cpu_core_id fixup to families older than F17h (bsc#1060229).
- x86/cpu: Remove unused and undefined __generic_processor_info() declaration (bnc#1056230).
- x86 edac, sb_edac.c: Take account of channel hashing when needed (bsc#1061721).
- x86/fpu: Do not let userspace set bogus xcomp_bv (bnc#1012382).
- x86/fsgsbase/64: Report FSBASE and GSBASE correctly in core dumps (bnc#1012382).
- x86/ldt: Fix off by one in get_segment_base() (bsc#1061872).
- x86/mm: Fix boot crash caused by incorrect loop count calculation in sync_global_pgds() (bsc#1058512).
- x86/mm: Fix fault error path using unsafe vma pointer (fate#321300).
- x86/mm: Fix use-after-free of ldt_struct (bsc#1055963).
- x86/mshyperv: Remove excess #includes from mshyperv.h (fate#320485).
- xfs/dmapi: fix incorrect file-&gt;f_path.dentry-&gt;d_inode usage (bsc#1055896).
- xfs: fix inobt inode allocation search optimization (bsc#1012829).
- xfs: handle error if xfs_btree_get_bufs fails (bsc#1059863).
- xfs: nowait aio support (FATE#321994).
- xfs: remove kmem_zalloc_greedy (bnc#1012382).
- xgene: Always get clk source, but ignore if it's missing for SGMII ports (bsc#1048501).
- xgene: Do not fail probe, if there is no clk resource for SGMII interfaces (bsc#1048501).
- xhci: fix finding correct bus_state structure for USB 3.1 hosts (bnc#1012382).

		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-25"/>
	<updated date="2017-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1004527">SUSE bug 1004527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005776">SUSE bug 1005776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005778">SUSE bug 1005778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005780">SUSE bug 1005780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005781">SUSE bug 1005781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012829">SUSE bug 1012829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015342">SUSE bug 1015342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015343">SUSE bug 1015343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019675">SUSE bug 1019675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019680">SUSE bug 1019680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019695">SUSE bug 1019695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019699">SUSE bug 1019699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020412">SUSE bug 1020412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020645">SUSE bug 1020645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020657">SUSE bug 1020657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020989">SUSE bug 1020989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021424">SUSE bug 1021424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022595">SUSE bug 1022595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022604">SUSE bug 1022604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022743">SUSE bug 1022743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022912">SUSE bug 1022912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022967">SUSE bug 1022967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024346">SUSE bug 1024346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024373">SUSE bug 1024373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024405">SUSE bug 1024405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025461">SUSE bug 1025461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030850">SUSE bug 1030850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031717">SUSE bug 1031717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031784">SUSE bug 1031784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032150">SUSE bug 1032150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034048">SUSE bug 1034048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034075">SUSE bug 1034075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035479">SUSE bug 1035479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036060">SUSE bug 1036060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036215">SUSE bug 1036215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036737">SUSE bug 1036737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037579">SUSE bug 1037579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037838">SUSE bug 1037838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037890">SUSE bug 1037890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038583">SUSE bug 1038583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040813">SUSE bug 1040813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042847">SUSE bug 1042847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043598">SUSE bug 1043598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044503">SUSE bug 1044503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046529">SUSE bug 1046529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047238">SUSE bug 1047238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047487">SUSE bug 1047487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047989">SUSE bug 1047989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048155">SUSE bug 1048155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048228">SUSE bug 1048228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048325">SUSE bug 1048325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048327">SUSE bug 1048327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048356">SUSE bug 1048356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048501">SUSE bug 1048501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048893">SUSE bug 1048893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048912">SUSE bug 1048912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048934">SUSE bug 1048934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049226">SUSE bug 1049226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049272">SUSE bug 1049272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049291">SUSE bug 1049291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049336">SUSE bug 1049336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049361">SUSE bug 1049361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049580">SUSE bug 1049580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050471">SUSE bug 1050471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050742">SUSE bug 1050742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051790">SUSE bug 1051790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051987">SUSE bug 1051987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052093">SUSE bug 1052093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052094">SUSE bug 1052094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052095">SUSE bug 1052095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052360">SUSE bug 1052360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052384">SUSE bug 1052384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052580">SUSE bug 1052580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052593">SUSE bug 1052593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052888">SUSE bug 1052888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053043">SUSE bug 1053043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053309">SUSE bug 1053309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053472">SUSE bug 1053472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053627">SUSE bug 1053627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053629">SUSE bug 1053629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053633">SUSE bug 1053633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053681">SUSE bug 1053681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053685">SUSE bug 1053685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053802">SUSE bug 1053802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053915">SUSE bug 1053915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054082">SUSE bug 1054082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054084">SUSE bug 1054084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054654">SUSE bug 1054654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055013">SUSE bug 1055013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055096">SUSE bug 1055096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055272">SUSE bug 1055272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055290">SUSE bug 1055290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055359">SUSE bug 1055359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055493">SUSE bug 1055493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055567">SUSE bug 1055567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055709">SUSE bug 1055709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055755">SUSE bug 1055755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055896">SUSE bug 1055896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055935">SUSE bug 1055935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055963">SUSE bug 1055963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056185">SUSE bug 1056185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056230">SUSE bug 1056230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056261">SUSE bug 1056261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056427">SUSE bug 1056427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056587">SUSE bug 1056587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056588">SUSE bug 1056588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056596">SUSE bug 1056596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056686">SUSE bug 1056686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056827">SUSE bug 1056827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056849">SUSE bug 1056849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056982">SUSE bug 1056982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057015">SUSE bug 1057015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057031">SUSE bug 1057031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057035">SUSE bug 1057035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057038">SUSE bug 1057038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057047">SUSE bug 1057047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057067">SUSE bug 1057067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057383">SUSE bug 1057383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057498">SUSE bug 1057498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057849">SUSE bug 1057849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058038">SUSE bug 1058038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058116">SUSE bug 1058116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058135">SUSE bug 1058135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058410">SUSE bug 1058410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058507">SUSE bug 1058507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058512">SUSE bug 1058512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058550">SUSE bug 1058550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059051">SUSE bug 1059051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059465">SUSE bug 1059465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059500">SUSE bug 1059500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059863">SUSE bug 1059863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060197">SUSE bug 1060197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060229">SUSE bug 1060229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060249">SUSE bug 1060249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060400">SUSE bug 1060400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060985">SUSE bug 1060985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061017">SUSE bug 1061017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061046">SUSE bug 1061046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061064">SUSE bug 1061064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061067">SUSE bug 1061067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061172">SUSE bug 1061172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061451">SUSE bug 1061451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061721">SUSE bug 1061721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061775">SUSE bug 1061775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061831">SUSE bug 1061831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061872">SUSE bug 1061872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062279">SUSE bug 1062279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062520">SUSE bug 1062520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062962">SUSE bug 1062962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063102">SUSE bug 1063102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063349">SUSE bug 1063349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063460">SUSE bug 1063460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063475">SUSE bug 1063475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063501">SUSE bug 1063501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063509">SUSE bug 1063509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063520">SUSE bug 1063520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063570">SUSE bug 1063570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063671">SUSE bug 1063671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063695">SUSE bug 1063695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064064">SUSE bug 1064064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064206">SUSE bug 1064206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064388">SUSE bug 1064388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064436">SUSE bug 1064436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963575">SUSE bug 963575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964944">SUSE bug 964944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966170">SUSE bug 966170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966172">SUSE bug 966172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966186">SUSE bug 966186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966191">SUSE bug 966191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966316">SUSE bug 966316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966318">SUSE bug 966318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969476">SUSE bug 969476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969477">SUSE bug 969477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969756">SUSE bug 969756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971975">SUSE bug 971975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981309">SUSE bug 981309</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000252/">CVE-2017-1000252</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-11472/">CVE-2017-11472</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12134/">CVE-2017-12134</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12153/">CVE-2017-12153</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12154/">CVE-2017-12154</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14051/">CVE-2017-14051</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14106/">CVE-2017-14106</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14489/">CVE-2017-14489</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15265/">CVE-2017-15265</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15649/">CVE-2017-15649</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519538" comment="kernel-default-4.4.92-6.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519539" comment="kernel-default-devel-4.4.92-6.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519540" comment="kernel-default-extra-4.4.92-6.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519541" comment="kernel-devel-4.4.92-6.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519542" comment="kernel-macros-4.4.92-6.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519543" comment="kernel-source-4.4.92-6.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519544" comment="kernel-syms-4.4.92-6.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78232" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1062563" ref_url="https://bugzilla.suse.com/1062563" source="BUGZILLA"/>
		<reference ref_id="1062620" ref_url="https://bugzilla.suse.com/1062620" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000256" ref_url="https://www.suse.com/security/cve/CVE-2017-1000256/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003354.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Security issue fixed:

- CVE-2017-1000256: Ensure TLS clients always verify the server certificate in the serial/TLS support. (bsc#1062563)

Non security issue fixed:

- libvirt-daemon-qemu requires libvirt-daemon-driver-storage (bsc#1062620)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-25"/>
	<updated date="2017-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062563">SUSE bug 1062563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062620">SUSE bug 1062620</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000256/">CVE-2017-1000256</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519545" comment="libvirt-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519546" comment="libvirt-admin-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519547" comment="libvirt-client-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519548" comment="libvirt-daemon-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519549" comment="libvirt-daemon-config-network-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519550" comment="libvirt-daemon-config-nwfilter-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519551" comment="libvirt-daemon-driver-interface-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519552" comment="libvirt-daemon-driver-libxl-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519553" comment="libvirt-daemon-driver-lxc-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519554" comment="libvirt-daemon-driver-network-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519555" comment="libvirt-daemon-driver-nodedev-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519556" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519557" comment="libvirt-daemon-driver-qemu-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519558" comment="libvirt-daemon-driver-secret-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519559" comment="libvirt-daemon-driver-storage-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519560" comment="libvirt-daemon-driver-storage-core-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519561" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519562" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519563" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519564" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519565" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519566" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519567" comment="libvirt-daemon-lxc-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519568" comment="libvirt-daemon-qemu-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519569" comment="libvirt-daemon-xen-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519570" comment="libvirt-doc-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519571" comment="libvirt-libs-3.3.0-5.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78233" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1047873" ref_url="https://bugzilla.suse.com/1047873" source="BUGZILLA"/>
		<reference ref_id="1057247" ref_url="https://bugzilla.suse.com/1057247" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11108" ref_url="https://www.suse.com/security/cve/CVE-2017-11108/" source="CVE"/>
		<reference ref_id="CVE-2017-11541" ref_url="https://www.suse.com/security/cve/CVE-2017-11541/" source="CVE"/>
		<reference ref_id="CVE-2017-11542" ref_url="https://www.suse.com/security/cve/CVE-2017-11542/" source="CVE"/>
		<reference ref_id="CVE-2017-11543" ref_url="https://www.suse.com/security/cve/CVE-2017-11543/" source="CVE"/>
		<reference ref_id="CVE-2017-12893" ref_url="https://www.suse.com/security/cve/CVE-2017-12893/" source="CVE"/>
		<reference ref_id="CVE-2017-12894" ref_url="https://www.suse.com/security/cve/CVE-2017-12894/" source="CVE"/>
		<reference ref_id="CVE-2017-12895" ref_url="https://www.suse.com/security/cve/CVE-2017-12895/" source="CVE"/>
		<reference ref_id="CVE-2017-12896" ref_url="https://www.suse.com/security/cve/CVE-2017-12896/" source="CVE"/>
		<reference ref_id="CVE-2017-12897" ref_url="https://www.suse.com/security/cve/CVE-2017-12897/" source="CVE"/>
		<reference ref_id="CVE-2017-12898" ref_url="https://www.suse.com/security/cve/CVE-2017-12898/" source="CVE"/>
		<reference ref_id="CVE-2017-12899" ref_url="https://www.suse.com/security/cve/CVE-2017-12899/" source="CVE"/>
		<reference ref_id="CVE-2017-12900" ref_url="https://www.suse.com/security/cve/CVE-2017-12900/" source="CVE"/>
		<reference ref_id="CVE-2017-12901" ref_url="https://www.suse.com/security/cve/CVE-2017-12901/" source="CVE"/>
		<reference ref_id="CVE-2017-12902" ref_url="https://www.suse.com/security/cve/CVE-2017-12902/" source="CVE"/>
		<reference ref_id="CVE-2017-12985" ref_url="https://www.suse.com/security/cve/CVE-2017-12985/" source="CVE"/>
		<reference ref_id="CVE-2017-12986" ref_url="https://www.suse.com/security/cve/CVE-2017-12986/" source="CVE"/>
		<reference ref_id="CVE-2017-12987" ref_url="https://www.suse.com/security/cve/CVE-2017-12987/" source="CVE"/>
		<reference ref_id="CVE-2017-12988" ref_url="https://www.suse.com/security/cve/CVE-2017-12988/" source="CVE"/>
		<reference ref_id="CVE-2017-12989" ref_url="https://www.suse.com/security/cve/CVE-2017-12989/" source="CVE"/>
		<reference ref_id="CVE-2017-12990" ref_url="https://www.suse.com/security/cve/CVE-2017-12990/" source="CVE"/>
		<reference ref_id="CVE-2017-12991" ref_url="https://www.suse.com/security/cve/CVE-2017-12991/" source="CVE"/>
		<reference ref_id="CVE-2017-12992" ref_url="https://www.suse.com/security/cve/CVE-2017-12992/" source="CVE"/>
		<reference ref_id="CVE-2017-12993" ref_url="https://www.suse.com/security/cve/CVE-2017-12993/" source="CVE"/>
		<reference ref_id="CVE-2017-12994" ref_url="https://www.suse.com/security/cve/CVE-2017-12994/" source="CVE"/>
		<reference ref_id="CVE-2017-12995" ref_url="https://www.suse.com/security/cve/CVE-2017-12995/" source="CVE"/>
		<reference ref_id="CVE-2017-12996" ref_url="https://www.suse.com/security/cve/CVE-2017-12996/" source="CVE"/>
		<reference ref_id="CVE-2017-12997" ref_url="https://www.suse.com/security/cve/CVE-2017-12997/" source="CVE"/>
		<reference ref_id="CVE-2017-12998" ref_url="https://www.suse.com/security/cve/CVE-2017-12998/" source="CVE"/>
		<reference ref_id="CVE-2017-12999" ref_url="https://www.suse.com/security/cve/CVE-2017-12999/" source="CVE"/>
		<reference ref_id="CVE-2017-13000" ref_url="https://www.suse.com/security/cve/CVE-2017-13000/" source="CVE"/>
		<reference ref_id="CVE-2017-13001" ref_url="https://www.suse.com/security/cve/CVE-2017-13001/" source="CVE"/>
		<reference ref_id="CVE-2017-13002" ref_url="https://www.suse.com/security/cve/CVE-2017-13002/" source="CVE"/>
		<reference ref_id="CVE-2017-13003" ref_url="https://www.suse.com/security/cve/CVE-2017-13003/" source="CVE"/>
		<reference ref_id="CVE-2017-13004" ref_url="https://www.suse.com/security/cve/CVE-2017-13004/" source="CVE"/>
		<reference ref_id="CVE-2017-13005" ref_url="https://www.suse.com/security/cve/CVE-2017-13005/" source="CVE"/>
		<reference ref_id="CVE-2017-13006" ref_url="https://www.suse.com/security/cve/CVE-2017-13006/" source="CVE"/>
		<reference ref_id="CVE-2017-13007" ref_url="https://www.suse.com/security/cve/CVE-2017-13007/" source="CVE"/>
		<reference ref_id="CVE-2017-13008" ref_url="https://www.suse.com/security/cve/CVE-2017-13008/" source="CVE"/>
		<reference ref_id="CVE-2017-13009" ref_url="https://www.suse.com/security/cve/CVE-2017-13009/" source="CVE"/>
		<reference ref_id="CVE-2017-13010" ref_url="https://www.suse.com/security/cve/CVE-2017-13010/" source="CVE"/>
		<reference ref_id="CVE-2017-13011" ref_url="https://www.suse.com/security/cve/CVE-2017-13011/" source="CVE"/>
		<reference ref_id="CVE-2017-13012" ref_url="https://www.suse.com/security/cve/CVE-2017-13012/" source="CVE"/>
		<reference ref_id="CVE-2017-13013" ref_url="https://www.suse.com/security/cve/CVE-2017-13013/" source="CVE"/>
		<reference ref_id="CVE-2017-13014" ref_url="https://www.suse.com/security/cve/CVE-2017-13014/" source="CVE"/>
		<reference ref_id="CVE-2017-13015" ref_url="https://www.suse.com/security/cve/CVE-2017-13015/" source="CVE"/>
		<reference ref_id="CVE-2017-13016" ref_url="https://www.suse.com/security/cve/CVE-2017-13016/" source="CVE"/>
		<reference ref_id="CVE-2017-13017" ref_url="https://www.suse.com/security/cve/CVE-2017-13017/" source="CVE"/>
		<reference ref_id="CVE-2017-13018" ref_url="https://www.suse.com/security/cve/CVE-2017-13018/" source="CVE"/>
		<reference ref_id="CVE-2017-13019" ref_url="https://www.suse.com/security/cve/CVE-2017-13019/" source="CVE"/>
		<reference ref_id="CVE-2017-13020" ref_url="https://www.suse.com/security/cve/CVE-2017-13020/" source="CVE"/>
		<reference ref_id="CVE-2017-13021" ref_url="https://www.suse.com/security/cve/CVE-2017-13021/" source="CVE"/>
		<reference ref_id="CVE-2017-13022" ref_url="https://www.suse.com/security/cve/CVE-2017-13022/" source="CVE"/>
		<reference ref_id="CVE-2017-13023" ref_url="https://www.suse.com/security/cve/CVE-2017-13023/" source="CVE"/>
		<reference ref_id="CVE-2017-13024" ref_url="https://www.suse.com/security/cve/CVE-2017-13024/" source="CVE"/>
		<reference ref_id="CVE-2017-13025" ref_url="https://www.suse.com/security/cve/CVE-2017-13025/" source="CVE"/>
		<reference ref_id="CVE-2017-13026" ref_url="https://www.suse.com/security/cve/CVE-2017-13026/" source="CVE"/>
		<reference ref_id="CVE-2017-13027" ref_url="https://www.suse.com/security/cve/CVE-2017-13027/" source="CVE"/>
		<reference ref_id="CVE-2017-13028" ref_url="https://www.suse.com/security/cve/CVE-2017-13028/" source="CVE"/>
		<reference ref_id="CVE-2017-13029" ref_url="https://www.suse.com/security/cve/CVE-2017-13029/" source="CVE"/>
		<reference ref_id="CVE-2017-13030" ref_url="https://www.suse.com/security/cve/CVE-2017-13030/" source="CVE"/>
		<reference ref_id="CVE-2017-13031" ref_url="https://www.suse.com/security/cve/CVE-2017-13031/" source="CVE"/>
		<reference ref_id="CVE-2017-13032" ref_url="https://www.suse.com/security/cve/CVE-2017-13032/" source="CVE"/>
		<reference ref_id="CVE-2017-13033" ref_url="https://www.suse.com/security/cve/CVE-2017-13033/" source="CVE"/>
		<reference ref_id="CVE-2017-13034" ref_url="https://www.suse.com/security/cve/CVE-2017-13034/" source="CVE"/>
		<reference ref_id="CVE-2017-13035" ref_url="https://www.suse.com/security/cve/CVE-2017-13035/" source="CVE"/>
		<reference ref_id="CVE-2017-13036" ref_url="https://www.suse.com/security/cve/CVE-2017-13036/" source="CVE"/>
		<reference ref_id="CVE-2017-13037" ref_url="https://www.suse.com/security/cve/CVE-2017-13037/" source="CVE"/>
		<reference ref_id="CVE-2017-13038" ref_url="https://www.suse.com/security/cve/CVE-2017-13038/" source="CVE"/>
		<reference ref_id="CVE-2017-13039" ref_url="https://www.suse.com/security/cve/CVE-2017-13039/" source="CVE"/>
		<reference ref_id="CVE-2017-13040" ref_url="https://www.suse.com/security/cve/CVE-2017-13040/" source="CVE"/>
		<reference ref_id="CVE-2017-13041" ref_url="https://www.suse.com/security/cve/CVE-2017-13041/" source="CVE"/>
		<reference ref_id="CVE-2017-13042" ref_url="https://www.suse.com/security/cve/CVE-2017-13042/" source="CVE"/>
		<reference ref_id="CVE-2017-13043" ref_url="https://www.suse.com/security/cve/CVE-2017-13043/" source="CVE"/>
		<reference ref_id="CVE-2017-13044" ref_url="https://www.suse.com/security/cve/CVE-2017-13044/" source="CVE"/>
		<reference ref_id="CVE-2017-13045" ref_url="https://www.suse.com/security/cve/CVE-2017-13045/" source="CVE"/>
		<reference ref_id="CVE-2017-13046" ref_url="https://www.suse.com/security/cve/CVE-2017-13046/" source="CVE"/>
		<reference ref_id="CVE-2017-13047" ref_url="https://www.suse.com/security/cve/CVE-2017-13047/" source="CVE"/>
		<reference ref_id="CVE-2017-13048" ref_url="https://www.suse.com/security/cve/CVE-2017-13048/" source="CVE"/>
		<reference ref_id="CVE-2017-13049" ref_url="https://www.suse.com/security/cve/CVE-2017-13049/" source="CVE"/>
		<reference ref_id="CVE-2017-13050" ref_url="https://www.suse.com/security/cve/CVE-2017-13050/" source="CVE"/>
		<reference ref_id="CVE-2017-13051" ref_url="https://www.suse.com/security/cve/CVE-2017-13051/" source="CVE"/>
		<reference ref_id="CVE-2017-13052" ref_url="https://www.suse.com/security/cve/CVE-2017-13052/" source="CVE"/>
		<reference ref_id="CVE-2017-13053" ref_url="https://www.suse.com/security/cve/CVE-2017-13053/" source="CVE"/>
		<reference ref_id="CVE-2017-13054" ref_url="https://www.suse.com/security/cve/CVE-2017-13054/" source="CVE"/>
		<reference ref_id="CVE-2017-13055" ref_url="https://www.suse.com/security/cve/CVE-2017-13055/" source="CVE"/>
		<reference ref_id="CVE-2017-13687" ref_url="https://www.suse.com/security/cve/CVE-2017-13687/" source="CVE"/>
		<reference ref_id="CVE-2017-13688" ref_url="https://www.suse.com/security/cve/CVE-2017-13688/" source="CVE"/>
		<reference ref_id="CVE-2017-13689" ref_url="https://www.suse.com/security/cve/CVE-2017-13689/" source="CVE"/>
		<reference ref_id="CVE-2017-13690" ref_url="https://www.suse.com/security/cve/CVE-2017-13690/" source="CVE"/>
		<reference ref_id="CVE-2017-13725" ref_url="https://www.suse.com/security/cve/CVE-2017-13725/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<description>
This update for tcpdump to version 4.9.2 fixes several issues.

These security issues were fixed:

- CVE-2017-11108: Prevent remote attackers to cause DoS (heap-based buffer over-read and application crash) via crafted packet data. The crash occured in the EXTRACT_16BITS function, called from the stp_print function for the Spanning Tree Protocol (bsc#1047873, bsc#1057247).
- CVE-2017-11543: Prevent buffer overflow in the sliplink_print function in print-sl.c that allowed remote DoS (bsc#1057247).
- CVE-2017-13011: Prevent buffer overflow in bittok2str_internal() that allowed remote DoS (bsc#1057247)
- CVE-2017-12989: Prevent infinite loop in the RESP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12990: Prevent infinite loop in the ISAKMP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12995: Prevent infinite loop in the DNS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12997: Prevent infinite loop in the LLDP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-11541: Prevent heap-based buffer over-read in the lldp_print function in print-lldp.c, related to util-print.c that allowed remote DoS (bsc#1057247).
- CVE-2017-11542: Prevent heap-based buffer over-read in the pimv1_print function in print-pim.c that allowed remote DoS (bsc#1057247).
- CVE-2017-12893: Prevent buffer over-read in the SMB/CIFS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12894: Prevent buffer over-read in several protocol parsers that allowed remote DoS (bsc#1057247)
- CVE-2017-12895: Prevent buffer over-read in the ICMP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12896: Prevent buffer over-read in the ISAKMP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12897: Prevent buffer over-read in the ISO CLNS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12898: Prevent buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12899: Prevent buffer over-read in the DECnet parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12900: Prevent buffer over-read in the in several protocol parsers that allowed remote DoS (bsc#1057247)
- CVE-2017-12901: Prevent buffer over-read in the EIGRP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12902: Prevent buffer over-read in the Zephyr parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12985: Prevent buffer over-read in the IPv6 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12986: Prevent buffer over-read in the IPv6 routing header parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12987: Prevent buffer over-read in the 802.11 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12988: Prevent buffer over-read in the telnet parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12991: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12992: Prevent buffer over-read in the RIPng parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12993: Prevent buffer over-read in the Juniper protocols parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12994: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12996: Prevent buffer over-read in the PIMv2 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12998: Prevent buffer over-read in the IS-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12999: Prevent buffer over-read in the IS-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13000: Prevent buffer over-read in the IEEE 802.15.4 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13001: Prevent buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13002: Prevent buffer over-read in the AODV parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13003: Prevent buffer over-read in the LMP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13004: Prevent buffer over-read in the Juniper protocols parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13005: Prevent buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13006: Prevent buffer over-read in the L2TP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13007: Prevent buffer over-read in the Apple PKTAP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13008: Prevent buffer over-read in the IEEE 802.11 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13009: Prevent buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13010: Prevent buffer over-read in the BEEP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13012: Prevent buffer over-read in the ICMP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13013: Prevent buffer over-read in the ARP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13014: Prevent buffer over-read in the White Board protocol parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13015: Prevent buffer over-read in the EAP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13016: Prevent buffer over-read in the ISO ES-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13017: Prevent buffer over-read in the DHCPv6 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13018: Prevent buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13019: Prevent buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13020: Prevent buffer over-read in the VTP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13021: Prevent buffer over-read in the ICMPv6 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13022: Prevent buffer over-read in the IP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13023: Prevent buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13024: Prevent buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13025: Prevent buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13026: Prevent buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13027: Prevent buffer over-read in the LLDP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13028: Prevent buffer over-read in the BOOTP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13029: Prevent buffer over-read in the PPP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13030: Prevent buffer over-read in the PIM parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13031: Prevent buffer over-read in the IPv6 fragmentation header parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13032: Prevent buffer over-read in the RADIUS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13033: Prevent buffer over-read in the VTP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13034: Prevent buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13035: Prevent buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13036: Prevent buffer over-read in the OSPFv3 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13037: Prevent buffer over-read in the IP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13038: Prevent buffer over-read in the PPP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13039: Prevent buffer over-read in the ISAKMP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13040: Prevent buffer over-read in the MPTCP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13041: Prevent buffer over-read in the ICMPv6 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13042: Prevent buffer over-read in the HNCP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13043: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13044: Prevent buffer over-read in the HNCP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13045: Prevent buffer over-read in the VQP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13046: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13047: Prevent buffer over-read in the ISO ES-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13048: Prevent buffer over-read in the RSVP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13049: Prevent buffer over-read in the Rx protocol parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13050: Prevent buffer over-read in the RPKI-Router parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13051: Prevent buffer over-read in the RSVP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13052: Prevent buffer over-read in the CFM parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13053: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13054: Prevent buffer over-read in the LLDP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13055: Prevent buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13687: Prevent buffer over-read in the Cisco HDLC parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13688: Prevent buffer over-read in the OLSR parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13689: Prevent buffer over-read in the IKEv1 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13690: Prevent buffer over-read in the IKEv2 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13725: Prevent buffer over-read in the IPv6 routing header parser that allowed remote DoS (bsc#1057247)
- Prevent segmentation fault in ESP decoder with OpenSSL 1.1 (bsc#1057247)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-26"/>
	<updated date="2017-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047873">SUSE bug 1047873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11108/">CVE-2017-11108</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11541/">CVE-2017-11541</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11542/">CVE-2017-11542</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11543/">CVE-2017-11543</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12893/">CVE-2017-12893</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12894/">CVE-2017-12894</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12895/">CVE-2017-12895</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12896/">CVE-2017-12896</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12897/">CVE-2017-12897</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12898/">CVE-2017-12898</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12899/">CVE-2017-12899</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12900/">CVE-2017-12900</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12901/">CVE-2017-12901</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12902/">CVE-2017-12902</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12985/">CVE-2017-12985</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12986/">CVE-2017-12986</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12987/">CVE-2017-12987</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12988/">CVE-2017-12988</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12989/">CVE-2017-12989</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12990/">CVE-2017-12990</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12991/">CVE-2017-12991</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12992/">CVE-2017-12992</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12993/">CVE-2017-12993</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12994/">CVE-2017-12994</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12995/">CVE-2017-12995</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12996/">CVE-2017-12996</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12997/">CVE-2017-12997</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12998/">CVE-2017-12998</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12999/">CVE-2017-12999</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13000/">CVE-2017-13000</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13001/">CVE-2017-13001</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13002/">CVE-2017-13002</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13003/">CVE-2017-13003</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13004/">CVE-2017-13004</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13005/">CVE-2017-13005</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13006/">CVE-2017-13006</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13007/">CVE-2017-13007</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13008/">CVE-2017-13008</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13009/">CVE-2017-13009</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13010/">CVE-2017-13010</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13011/">CVE-2017-13011</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13012/">CVE-2017-13012</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13013/">CVE-2017-13013</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13014/">CVE-2017-13014</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13015/">CVE-2017-13015</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13016/">CVE-2017-13016</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13017/">CVE-2017-13017</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13018/">CVE-2017-13018</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13019/">CVE-2017-13019</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13020/">CVE-2017-13020</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13021/">CVE-2017-13021</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13022/">CVE-2017-13022</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13023/">CVE-2017-13023</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13024/">CVE-2017-13024</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13025/">CVE-2017-13025</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13026/">CVE-2017-13026</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13027/">CVE-2017-13027</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13028/">CVE-2017-13028</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13029/">CVE-2017-13029</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13030/">CVE-2017-13030</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13031/">CVE-2017-13031</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13032/">CVE-2017-13032</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13033/">CVE-2017-13033</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13034/">CVE-2017-13034</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13035/">CVE-2017-13035</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13036/">CVE-2017-13036</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13037/">CVE-2017-13037</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13038/">CVE-2017-13038</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13039/">CVE-2017-13039</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13040/">CVE-2017-13040</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13041/">CVE-2017-13041</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13042/">CVE-2017-13042</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13043/">CVE-2017-13043</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13044/">CVE-2017-13044</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13045/">CVE-2017-13045</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13046/">CVE-2017-13046</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13047/">CVE-2017-13047</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13048/">CVE-2017-13048</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13049/">CVE-2017-13049</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13050/">CVE-2017-13050</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13051/">CVE-2017-13051</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13052/">CVE-2017-13052</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13053/">CVE-2017-13053</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13054/">CVE-2017-13054</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13055/">CVE-2017-13055</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13687/">CVE-2017-13687</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13688/">CVE-2017-13688</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13689/">CVE-2017-13689</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13690/">CVE-2017-13690</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13725/">CVE-2017-13725</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518238" comment="tcpdump-4.9.2-14.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78234" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1062645" ref_url="https://bugzilla.suse.com/1062645" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15191" ref_url="https://www.suse.com/security/cve/CVE-2017-15191/" source="CVE"/>
		<reference ref_id="CVE-2017-15192" ref_url="https://www.suse.com/security/cve/CVE-2017-15192/" source="CVE"/>
		<reference ref_id="CVE-2017-15193" ref_url="https://www.suse.com/security/cve/CVE-2017-15193/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003358.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Wireshark was updated to 2.2.10, fixing security issues and bugs:

* CVE-2017-15191: DMP dissector crash (wnpa-sec-2017-44)
* CVE-2017-15192: BT ATT dissector crash (wnpa-sec-2017-42)
* CVE-2017-15193: MBIM dissector crash (wnpa-sec-2017-43)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-26"/>
	<updated date="2017-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062645">SUSE bug 1062645</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15191/">CVE-2017-15191</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15192/">CVE-2017-15192</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15193/">CVE-2017-15193</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518239" comment="libwireshark8-2.2.10-48.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518240" comment="libwiretap6-2.2.10-48.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518241" comment="libwscodecs1-2.2.10-48.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518242" comment="libwsutil7-2.2.10-48.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518243" comment="wireshark-2.2.10-48.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518244" comment="wireshark-gtk-2.2.10-48.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78235" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1064715" ref_url="https://bugzilla.suse.com/1064715" source="BUGZILLA"/>
		<reference ref_id="1064716" ref_url="https://bugzilla.suse.com/1064716" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13089" ref_url="https://www.suse.com/security/cve/CVE-2017-13089/" source="CVE"/>
		<reference ref_id="CVE-2017-13090" ref_url="https://www.suse.com/security/cve/CVE-2017-13090/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00027.html" source="SUSE-SU"/>
		<description>


This update for wget fixes the following security issues:

- CVE-2017-13089,CVE-2017-13090: Missing checks for negative remaining_chunk_size in skip_short_body and fd_read_body could
  cause stack buffer overflows, which could have been exploited by malicious servers. (bsc#1064715,bsc#1064716)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-16"/>
	<updated date="2017-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1064715">SUSE bug 1064715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064716">SUSE bug 1064716</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13089/">CVE-2017-13089</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13090/">CVE-2017-13090</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518255" comment="wget-1.14-21.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78236" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1054724" ref_url="https://bugzilla.suse.com/1054724" source="BUGZILLA"/>
		<reference ref_id="1055587" ref_url="https://bugzilla.suse.com/1055587" source="BUGZILLA"/>
		<reference ref_id="1056291" ref_url="https://bugzilla.suse.com/1056291" source="BUGZILLA"/>
		<reference ref_id="1056334" ref_url="https://bugzilla.suse.com/1056334" source="BUGZILLA"/>
		<reference ref_id="1057378" ref_url="https://bugzilla.suse.com/1057378" source="BUGZILLA"/>
		<reference ref_id="1057585" ref_url="https://bugzilla.suse.com/1057585" source="BUGZILLA"/>
		<reference ref_id="1057966" ref_url="https://bugzilla.suse.com/1057966" source="BUGZILLA"/>
		<reference ref_id="1062069" ref_url="https://bugzilla.suse.com/1062069" source="BUGZILLA"/>
		<reference ref_id="1062942" ref_url="https://bugzilla.suse.com/1062942" source="BUGZILLA"/>
		<reference ref_id="1063122" ref_url="https://bugzilla.suse.com/1063122" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10911" ref_url="https://www.suse.com/security/cve/CVE-2017-10911/" source="CVE"/>
		<reference ref_id="CVE-2017-12809" ref_url="https://www.suse.com/security/cve/CVE-2017-12809/" source="CVE"/>
		<reference ref_id="CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672/" source="CVE"/>
		<reference ref_id="CVE-2017-13711" ref_url="https://www.suse.com/security/cve/CVE-2017-13711/" source="CVE"/>
		<reference ref_id="CVE-2017-14167" ref_url="https://www.suse.com/security/cve/CVE-2017-14167/" source="CVE"/>
		<reference ref_id="CVE-2017-15038" ref_url="https://www.suse.com/security/cve/CVE-2017-15038/" source="CVE"/>
		<reference ref_id="CVE-2017-15268" ref_url="https://www.suse.com/security/cve/CVE-2017-15268/" source="CVE"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00003.html" source="SUSE-SU"/>
		<description>
This update for qemu to version 2.9.1 fixes several issues.

It also announces that the qed storage format will be no longer supported in SLE 15 (fate#324200).

These security issues were fixed:

- CVE-2017-15268: Qemu allowed remote attackers to cause a memory leak by triggering slow data-channel read operations, related to io/channel-websock.c (bsc#1062942)
- CVE-2017-15289: The mode4and5 write functions allowed local OS guest privileged users to cause a denial of service (out-of-bounds write access and Qemu process crash) via vectors related to dst calculation (bsc#1063122)
- CVE-2017-15038: Race condition in the v9fs_xattrwalk function local guest OS users to obtain sensitive information from host heap memory via vectors related to reading extended attributes (bsc#1062069)
- CVE-2017-10911: The make_response function in the Linux kernel allowed guest OS users to obtain sensitive information from host OS (or other guest OS) kernel memory by leveraging the copying of uninitialized padding fields in Xen block-interface response structures (bsc#1057378)
- CVE-2017-12809: The IDE disk and CD/DVD-ROM Emulator support allowed local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by flushing an empty CDROM device drive (bsc#1054724)
- CVE-2017-14167: Integer overflow in the load_multiboot function allowed local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write (bsc#1057585)
- CVE-2017-13672: The VGA display emulator support allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors involving display update (bsc#1056334)
- CVE-2017-13711: Use-after-free vulnerability allowed attackers to cause a denial of service (QEMU instance crash) by leveraging failure to properly clear ifq_so from pending packets (bsc#1056291).

These non-security issues were fixed:

- Fixed not being able to build from rpm sources due to undefined macro (bsc#1057966)
- Fiedx package build failure against new glibc (bsc#1055587)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-02"/>
	<updated date="2017-11-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1054724">SUSE bug 1054724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055587">SUSE bug 1055587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056291">SUSE bug 1056291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056334">SUSE bug 1056334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057378">SUSE bug 1057378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057585">SUSE bug 1057585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057966">SUSE bug 1057966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062069">SUSE bug 1062069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062942">SUSE bug 1062942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063122">SUSE bug 1063122</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10911/">CVE-2017-10911</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12809/">CVE-2017-12809</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13711/">CVE-2017-13711</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14167/">CVE-2017-14167</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15038/">CVE-2017-15038</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15268/">CVE-2017-15268</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519572" comment="qemu-2.9.1-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519573" comment="qemu-block-curl-2.9.1-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519574" comment="qemu-ipxe-1.0.0-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519575" comment="qemu-kvm-2.9.1-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519576" comment="qemu-seabios-1.10.2-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519577" comment="qemu-sgabios-8-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519578" comment="qemu-tools-2.9.1-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519579" comment="qemu-vgabios-1.10.2-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519580" comment="qemu-x86-2.9.1-6.6.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78237" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1020950" ref_url="https://bugzilla.suse.com/1020950" source="BUGZILLA"/>
		<reference ref_id="1024749" ref_url="https://bugzilla.suse.com/1024749" source="BUGZILLA"/>
		<reference ref_id="1045460" ref_url="https://bugzilla.suse.com/1045460" source="BUGZILLA"/>
		<reference ref_id="1050469" ref_url="https://bugzilla.suse.com/1050469" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7586" ref_url="https://www.suse.com/security/cve/CVE-2016-7586/" source="CVE"/>
		<reference ref_id="CVE-2016-7589" ref_url="https://www.suse.com/security/cve/CVE-2016-7589/" source="CVE"/>
		<reference ref_id="CVE-2016-7592" ref_url="https://www.suse.com/security/cve/CVE-2016-7592/" source="CVE"/>
		<reference ref_id="CVE-2016-7599" ref_url="https://www.suse.com/security/cve/CVE-2016-7599/" source="CVE"/>
		<reference ref_id="CVE-2016-7623" ref_url="https://www.suse.com/security/cve/CVE-2016-7623/" source="CVE"/>
		<reference ref_id="CVE-2016-7632" ref_url="https://www.suse.com/security/cve/CVE-2016-7632/" source="CVE"/>
		<reference ref_id="CVE-2016-7635" ref_url="https://www.suse.com/security/cve/CVE-2016-7635/" source="CVE"/>
		<reference ref_id="CVE-2016-7639" ref_url="https://www.suse.com/security/cve/CVE-2016-7639/" source="CVE"/>
		<reference ref_id="CVE-2016-7641" ref_url="https://www.suse.com/security/cve/CVE-2016-7641/" source="CVE"/>
		<reference ref_id="CVE-2016-7645" ref_url="https://www.suse.com/security/cve/CVE-2016-7645/" source="CVE"/>
		<reference ref_id="CVE-2016-7652" ref_url="https://www.suse.com/security/cve/CVE-2016-7652/" source="CVE"/>
		<reference ref_id="CVE-2016-7654" ref_url="https://www.suse.com/security/cve/CVE-2016-7654/" source="CVE"/>
		<reference ref_id="CVE-2016-7656" ref_url="https://www.suse.com/security/cve/CVE-2016-7656/" source="CVE"/>
		<reference ref_id="CVE-2017-2350" ref_url="https://www.suse.com/security/cve/CVE-2017-2350/" source="CVE"/>
		<reference ref_id="CVE-2017-2354" ref_url="https://www.suse.com/security/cve/CVE-2017-2354/" source="CVE"/>
		<reference ref_id="CVE-2017-2355" ref_url="https://www.suse.com/security/cve/CVE-2017-2355/" source="CVE"/>
		<reference ref_id="CVE-2017-2356" ref_url="https://www.suse.com/security/cve/CVE-2017-2356/" source="CVE"/>
		<reference ref_id="CVE-2017-2362" ref_url="https://www.suse.com/security/cve/CVE-2017-2362/" source="CVE"/>
		<reference ref_id="CVE-2017-2363" ref_url="https://www.suse.com/security/cve/CVE-2017-2363/" source="CVE"/>
		<reference ref_id="CVE-2017-2364" ref_url="https://www.suse.com/security/cve/CVE-2017-2364/" source="CVE"/>
		<reference ref_id="CVE-2017-2365" ref_url="https://www.suse.com/security/cve/CVE-2017-2365/" source="CVE"/>
		<reference ref_id="CVE-2017-2366" ref_url="https://www.suse.com/security/cve/CVE-2017-2366/" source="CVE"/>
		<reference ref_id="CVE-2017-2369" ref_url="https://www.suse.com/security/cve/CVE-2017-2369/" source="CVE"/>
		<reference ref_id="CVE-2017-2371" ref_url="https://www.suse.com/security/cve/CVE-2017-2371/" source="CVE"/>
		<reference ref_id="CVE-2017-2373" ref_url="https://www.suse.com/security/cve/CVE-2017-2373/" source="CVE"/>
		<reference ref_id="CVE-2017-2496" ref_url="https://www.suse.com/security/cve/CVE-2017-2496/" source="CVE"/>
		<reference ref_id="CVE-2017-2510" ref_url="https://www.suse.com/security/cve/CVE-2017-2510/" source="CVE"/>
		<reference ref_id="CVE-2017-2538" ref_url="https://www.suse.com/security/cve/CVE-2017-2538/" source="CVE"/>
		<reference ref_id="CVE-2017-2539" ref_url="https://www.suse.com/security/cve/CVE-2017-2539/" source="CVE"/>
		<reference ref_id="CVE-2017-7018" ref_url="https://www.suse.com/security/cve/CVE-2017-7018/" source="CVE"/>
		<reference ref_id="CVE-2017-7030" ref_url="https://www.suse.com/security/cve/CVE-2017-7030/" source="CVE"/>
		<reference ref_id="CVE-2017-7034" ref_url="https://www.suse.com/security/cve/CVE-2017-7034/" source="CVE"/>
		<reference ref_id="CVE-2017-7037" ref_url="https://www.suse.com/security/cve/CVE-2017-7037/" source="CVE"/>
		<reference ref_id="CVE-2017-7039" ref_url="https://www.suse.com/security/cve/CVE-2017-7039/" source="CVE"/>
		<reference ref_id="CVE-2017-7046" ref_url="https://www.suse.com/security/cve/CVE-2017-7046/" source="CVE"/>
		<reference ref_id="CVE-2017-7048" ref_url="https://www.suse.com/security/cve/CVE-2017-7048/" source="CVE"/>
		<reference ref_id="CVE-2017-7055" ref_url="https://www.suse.com/security/cve/CVE-2017-7055/" source="CVE"/>
		<reference ref_id="CVE-2017-7056" ref_url="https://www.suse.com/security/cve/CVE-2017-7056/" source="CVE"/>
		<reference ref_id="CVE-2017-7061" ref_url="https://www.suse.com/security/cve/CVE-2017-7061/" source="CVE"/>
		<reference ref_id="CVE-2017-7064" ref_url="https://www.suse.com/security/cve/CVE-2017-7064/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.18.0 fixes the following issues:

These security issues were fixed:

- CVE-2017-7039: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7018: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7030: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7037: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7034: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7055: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7056: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7064: An issue was fixed that allowed remote attackers to bypass
  intended memory-read restrictions via a crafted app (bsc#1050469).
- CVE-2017-7061: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7048: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7046: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1050469).
- CVE-2017-2538: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1045460)
- CVE-2017-2496: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site.
- CVE-2017-2539: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site.
- CVE-2017-2510: An issue was fixed that allowed remote attackers to conduct
  Universal XSS (UXSS) attacks via a crafted web site that improperly
  interacts with pageshow events.
- CVE-2017-2365: An issue was fixed that allowed remote attackers to bypass the
  Same Origin Policy and obtain sensitive information via a crafted web
  site (bsc#1024749)
- CVE-2017-2366: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1024749)
- CVE-2017-2373: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1024749)
- CVE-2017-2363: An issue was fixed that allowed remote attackers to bypass the
  Same Origin Policy and obtain sensitive information via a crafted web
  site (bsc#1024749)
- CVE-2017-2362: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1024749)
- CVE-2017-2350: An issue was fixed that allowed remote attackers to bypass the
  Same Origin Policy and obtain sensitive information via a crafted web
  site (bsc#1024749)
- CVE-2017-2350: An issue was fixed that allowed remote attackers to bypass the
  Same Origin Policy and obtain sensitive information via a crafted web site
  (bsc#1024749)
- CVE-2017-2354: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1024749).
- CVE-2017-2355: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (uninitialized memory
  access and application crash) via a crafted web site (bsc#1024749)
- CVE-2017-2356: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1024749)
- CVE-2017-2371: An issue was fixed that allowed remote attackers to launch
  popups via a crafted web site (bsc#1024749)
- CVE-2017-2364: An issue was fixed that allowed remote attackers to bypass the
  Same Origin Policy and obtain sensitive information via a crafted web
  site (bsc#1024749)
- CVE-2017-2369: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1024749)
- CVE-2016-7656: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7635: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7654: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7639: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7645: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7652: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7641: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7632: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7599: An issue was fixed that allowed remote attackers to bypass the
  Same Origin Policy and obtain sensitive information via a crafted web
  site that used HTTP redirects (bsc#1020950)
- CVE-2016-7592: An issue was fixed that allowed remote attackers to obtain
  sensitive information via crafted JavaScript prompts on a web site (bsc#1020950)
- CVE-2016-7589: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7623: An issue was fixed that allowed remote attackers to obtain
  sensitive information via a blob URL on a web site (bsc#1020950)
- CVE-2016-7586: An issue was fixed that allowed remote attackers to obtain
  sensitive information via a crafted web site (bsc#1020950)

For other non-security fixes please check the changelog.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-06"/>
	<updated date="2017-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024749">SUSE bug 1024749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045460">SUSE bug 1045460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7586/">CVE-2016-7586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7589/">CVE-2016-7589</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7592/">CVE-2016-7592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7599/">CVE-2016-7599</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7623/">CVE-2016-7623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7632/">CVE-2016-7632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7635/">CVE-2016-7635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7639/">CVE-2016-7639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7641/">CVE-2016-7641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7645/">CVE-2016-7645</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7652/">CVE-2016-7652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7654/">CVE-2016-7654</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7656/">CVE-2016-7656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2350/">CVE-2017-2350</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2354/">CVE-2017-2354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2355/">CVE-2017-2355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2356/">CVE-2017-2356</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2362/">CVE-2017-2362</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2363/">CVE-2017-2363</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2364/">CVE-2017-2364</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2365/">CVE-2017-2365</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2366/">CVE-2017-2366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2369/">CVE-2017-2369</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2371/">CVE-2017-2371</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2373/">CVE-2017-2373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2496/">CVE-2017-2496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2510/">CVE-2017-2510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2538/">CVE-2017-2538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2539/">CVE-2017-2539</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7018/">CVE-2017-7018</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7030/">CVE-2017-7030</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7034/">CVE-2017-7034</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7037/">CVE-2017-7037</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7039/">CVE-2017-7039</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7046/">CVE-2017-7046</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7048/">CVE-2017-7048</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7055/">CVE-2017-7055</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7056/">CVE-2017-7056</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7061/">CVE-2017-7061</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7064/">CVE-2017-7064</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518257" comment="libjavascriptcoregtk-4_0-18-2.18.0-2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518258" comment="libwebkit2gtk-4_0-37-2.18.0-2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518259" comment="libwebkit2gtk3-lang-2.18.0-2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518260" comment="typelib-1_0-JavaScriptCore-4_0-2.18.0-2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518261" comment="typelib-1_0-WebKit2-4_0-2.18.0-2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518262" comment="webkit2gtk-4_0-injected-bundles-2.18.0-2.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78238" version="1" class="patch">
	<metadata>
		<title>Security update for libwpd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1058025" ref_url="https://bugzilla.suse.com/1058025" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14226" ref_url="https://www.suse.com/security/cve/CVE-2017-14226/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2931-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00004.html" source="SUSE-SU"/>
		<description>
This update for libwpd fixes the following issues:

Security issue fixed:
- CVE-2017-14226: WP1StylesListener.cpp, WP5StylesListener.cpp, and WP42StylesListener.cpp in libwpd
  0.10.1 mishandle iterators, which allows remote attackers to cause a denial of service (heap-based
  buffer over-read in the WPXTableList class in WPXTable.cpp). This vulnerability can be triggered
  in LibreOffice before 5.3.7. It may lead to suffering a remote attack against a LibreOffice
  application. (bnc#1058025)

Bugfixes:
- Fix various crashes, leaks and hangs when reading damaged files found by oss-fuzz.
- Fix crash when NULL is passed as input stream.
- Use symbol visibility on Linux. The library only exports public functions now.
- Avoid infinite loop. (libwpd#3)
- Remove bashism. (libwpd#5)
- Fix various crashes and hangs when reading broken files found with the help of american-fuzzy-lop.
- Make --help output of all command line tools more help2man-friendly.
- Miscellaneous fixes and cleanups.
- Generate manpages for the libwpd-tools
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-06"/>
	<updated date="2017-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1058025">SUSE bug 1058025</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14226/">CVE-2017-14226</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518263" comment="libwpd-0_10-10-0.10.2-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78239" version="1" class="patch">
	<metadata>
		<title>Security update for SuSEfirewall2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1064127" ref_url="https://bugzilla.suse.com/1064127" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15638" ref_url="https://www.suse.com/security/cve/CVE-2017-15638/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003375.html" source="SUSE-SU"/>
		<description>
This update for SuSEfirewall2 fixes the following issues:

- CVE-2017-15638: Fixed security issue with too open implicit portmapper rules
  (bsc#1064127): A source net restriction for _rpc_ services
  was not taken into account for the implicitly added rules for port 111,
  making the portmap service accessible to everyone in the affected zone when
  the 'rpc' matching was used.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-06"/>
	<updated date="2017-11-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064127">SUSE bug 1064127</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15638/">CVE-2017-15638</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519581" comment="SuSEfirewall2-3.6.312.333-3.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78240" version="1" class="patch">
	<metadata>
		<title>Security update for sssd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1039567" ref_url="https://bugzilla.suse.com/1039567" source="BUGZILLA"/>
		<reference ref_id="1055123" ref_url="https://bugzilla.suse.com/1055123" source="BUGZILLA"/>
		<reference ref_id="1061832" ref_url="https://bugzilla.suse.com/1061832" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12173" ref_url="https://www.suse.com/security/cve/CVE-2017-12173/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003377.html" source="SUSE-SU"/>
		<description>
This update for sssd provides the following fixes:

Security issues fixed:

- CVE-2017-12173: Fixed unsanitized input when searching in local cache database (bsc#1061832).

Non security issues fixed:

- Fixed a segfault issue in ldap_rfc_2307_fallback_to_local_users. (bsc#1055123)
- Install /var/lib/sss/mc directory to correct sssd cache invalidation behaviour. (bsc#1039567)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-06"/>
	<updated date="2017-11-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1039567">SUSE bug 1039567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055123">SUSE bug 1055123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061832">SUSE bug 1061832</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12173/">CVE-2017-12173</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518273" comment="libipa_hbac0-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518274" comment="libsss_idmap0-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519582" comment="libsss_nss_idmap0-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518275" comment="libsss_sudo-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518276" comment="python-sssd-config-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518277" comment="sssd-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518278" comment="sssd-32bit-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518279" comment="sssd-ad-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518280" comment="sssd-ipa-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518281" comment="sssd-krb5-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518282" comment="sssd-krb5-common-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518283" comment="sssd-ldap-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518284" comment="sssd-proxy-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518285" comment="sssd-tools-1.13.4-34.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78241" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1065274" ref_url="https://bugzilla.suse.com/1065274" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15088" ref_url="https://www.suse.com/security/cve/CVE-2017-15088/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2948-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00011.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following issues:

Security issues fixed:

- CVE-2017-15088: A buffer overflow in get_matching_data() was fixed that could under specific circumstances be used to execute code (bsc#1065274)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-08"/>
	<updated date="2017-11-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065274">SUSE bug 1065274</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15088/">CVE-2017-15088</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518286" comment="krb5-1.12.5-40.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518287" comment="krb5-32bit-1.12.5-40.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518288" comment="krb5-client-1.12.5-40.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78242" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1049379" ref_url="https://bugzilla.suse.com/1049379" source="BUGZILLA"/>
		<reference ref_id="1050135" ref_url="https://bugzilla.suse.com/1050135" source="BUGZILLA"/>
		<reference ref_id="1052249" ref_url="https://bugzilla.suse.com/1052249" source="BUGZILLA"/>
		<reference ref_id="1052253" ref_url="https://bugzilla.suse.com/1052253" source="BUGZILLA"/>
		<reference ref_id="1052545" ref_url="https://bugzilla.suse.com/1052545" source="BUGZILLA"/>
		<reference ref_id="1054924" ref_url="https://bugzilla.suse.com/1054924" source="BUGZILLA"/>
		<reference ref_id="1055219" ref_url="https://bugzilla.suse.com/1055219" source="BUGZILLA"/>
		<reference ref_id="1055430" ref_url="https://bugzilla.suse.com/1055430" source="BUGZILLA"/>
		<reference ref_id="1061873" ref_url="https://bugzilla.suse.com/1061873" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7530" ref_url="https://www.suse.com/security/cve/CVE-2016-7530/" source="CVE"/>
		<reference ref_id="CVE-2017-11446" ref_url="https://www.suse.com/security/cve/CVE-2017-11446/" source="CVE"/>
		<reference ref_id="CVE-2017-11534" ref_url="https://www.suse.com/security/cve/CVE-2017-11534/" source="CVE"/>
		<reference ref_id="CVE-2017-12428" ref_url="https://www.suse.com/security/cve/CVE-2017-12428/" source="CVE"/>
		<reference ref_id="CVE-2017-12431" ref_url="https://www.suse.com/security/cve/CVE-2017-12431/" source="CVE"/>
		<reference ref_id="CVE-2017-12433" ref_url="https://www.suse.com/security/cve/CVE-2017-12433/" source="CVE"/>
		<reference ref_id="CVE-2017-13133" ref_url="https://www.suse.com/security/cve/CVE-2017-13133/" source="CVE"/>
		<reference ref_id="CVE-2017-13139" ref_url="https://www.suse.com/security/cve/CVE-2017-13139/" source="CVE"/>
		<reference ref_id="CVE-2017-15033" ref_url="https://www.suse.com/security/cve/CVE-2017-15033/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003381.html" source="SUSE-SU"/>
		<description>


This update for ImageMagick fixes the following issues:

Security issues fixed:

* CVE-2017-15033: A denial of service attack (memory leak) was fixed in ReadYUVImage in coders/yuv.c [bsc#1061873]
* CVE-2017-11446: An infinite loop in ReadPESImage was fixed. (bsc#1049379)
* CVE-2017-12433: A memory leak in ReadPESImage in coders/pes.c was fixed. (bsc#1052545)
* CVE-2017-12428: A memory leak in ReadWMFImage in coders/wmf.c was fixed. (bsc#1052249)
* CVE-2017-12431: A use-after-free in ReadWMFImage was fixed. (bsc#1052253)
* CVE-2017-11534: A memory leak in the lite_font_map() in coders/wmf.c was fixed. (bsc#1050135)
* CVE-2017-13133: A memory exhaustion in load_level function in coders/xcf.c was fixed. (bsc#1055219)
* CVE-2017-13139: A out-of-bounds read in the ReadOneMNGImage was fixed. (bsc#1055430)

This update also reverts an incorrect fix for CVE-2016-7530 [bsc#1054924].
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-08"/>
	<updated date="2017-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049379">SUSE bug 1049379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050135">SUSE bug 1050135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052249">SUSE bug 1052249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052253">SUSE bug 1052253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052545">SUSE bug 1052545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054924">SUSE bug 1054924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055219">SUSE bug 1055219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055430">SUSE bug 1055430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061873">SUSE bug 1061873</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7530/">CVE-2016-7530</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11446/">CVE-2017-11446</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11534/">CVE-2017-11534</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12428/">CVE-2017-12428</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-12431/">CVE-2017-12431</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12433/">CVE-2017-12433</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13133/">CVE-2017-13133</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13139/">CVE-2017-13139</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15033/">CVE-2017-15033</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518289" comment="ImageMagick-6.8.8.1-71.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518290" comment="libMagick++-6_Q16-3-6.8.8.1-71.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518291" comment="libMagickCore-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518292" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518293" comment="libMagickWand-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78243" version="1" class="patch">
	<metadata>
		<title>Security update for shadow (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1023895" ref_url="https://bugzilla.suse.com/1023895" source="BUGZILLA"/>
		<reference ref_id="1052261" ref_url="https://bugzilla.suse.com/1052261" source="BUGZILLA"/>
		<reference ref_id="980486" ref_url="https://bugzilla.suse.com/980486" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12424" ref_url="https://www.suse.com/security/cve/CVE-2017-12424/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003379.html" source="SUSE-SU"/>
		<description>
This update for shadow fixes several issues.

This security issue was fixed:

- CVE-2017-12424: The newusers tool could have been forced to manipulate
  internal data structures in ways unintended by the authors. Malformed input may
  have lead to crashes (with a buffer overflow or other memory corruption) or
  other unspecified behaviors (bsc#1052261).

These non-security issues were fixed:

- bsc#1023895: Fixed man page to not contain invalid options and also prevent
  warnings when using these options in certain settings
- bsc#980486: Reset user in /var/log/tallylog because of the usage of pam_tally2
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-08"/>
	<updated date="2017-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023895">SUSE bug 1023895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052261">SUSE bug 1052261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980486">SUSE bug 980486</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12424/">CVE-2017-12424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518294" comment="shadow-4.2.1-27.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78244" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1032647" ref_url="https://bugzilla.suse.com/1032647" source="BUGZILLA"/>
		<reference ref_id="1052009" ref_url="https://bugzilla.suse.com/1052009" source="BUGZILLA"/>
		<reference ref_id="1064069" ref_url="https://bugzilla.suse.com/1064069" source="BUGZILLA"/>
		<reference ref_id="1064070" ref_url="https://bugzilla.suse.com/1064070" source="BUGZILLA"/>
		<reference ref_id="1064071" ref_url="https://bugzilla.suse.com/1064071" source="BUGZILLA"/>
		<reference ref_id="1064072" ref_url="https://bugzilla.suse.com/1064072" source="BUGZILLA"/>
		<reference ref_id="1064073" ref_url="https://bugzilla.suse.com/1064073" source="BUGZILLA"/>
		<reference ref_id="1064075" ref_url="https://bugzilla.suse.com/1064075" source="BUGZILLA"/>
		<reference ref_id="1064077" ref_url="https://bugzilla.suse.com/1064077" source="BUGZILLA"/>
		<reference ref_id="1064078" ref_url="https://bugzilla.suse.com/1064078" source="BUGZILLA"/>
		<reference ref_id="1064079" ref_url="https://bugzilla.suse.com/1064079" source="BUGZILLA"/>
		<reference ref_id="1064080" ref_url="https://bugzilla.suse.com/1064080" source="BUGZILLA"/>
		<reference ref_id="1064081" ref_url="https://bugzilla.suse.com/1064081" source="BUGZILLA"/>
		<reference ref_id="1064082" ref_url="https://bugzilla.suse.com/1064082" source="BUGZILLA"/>
		<reference ref_id="1064083" ref_url="https://bugzilla.suse.com/1064083" source="BUGZILLA"/>
		<reference ref_id="1064084" ref_url="https://bugzilla.suse.com/1064084" source="BUGZILLA"/>
		<reference ref_id="1064085" ref_url="https://bugzilla.suse.com/1064085" source="BUGZILLA"/>
		<reference ref_id="1064086" ref_url="https://bugzilla.suse.com/1064086" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10165" ref_url="https://www.suse.com/security/cve/CVE-2016-10165/" source="CVE"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-10274" ref_url="https://www.suse.com/security/cve/CVE-2017-10274/" source="CVE"/>
		<reference ref_id="CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281/" source="CVE"/>
		<reference ref_id="CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285/" source="CVE"/>
		<reference ref_id="CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295/" source="CVE"/>
		<reference ref_id="CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345/" source="CVE"/>
		<reference ref_id="CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346/" source="CVE"/>
		<reference ref_id="CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347/" source="CVE"/>
		<reference ref_id="CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348/" source="CVE"/>
		<reference ref_id="CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349/" source="CVE"/>
		<reference ref_id="CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355/" source="CVE"/>
		<reference ref_id="CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356/" source="CVE"/>
		<reference ref_id="CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357/" source="CVE"/>
		<reference ref_id="CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u151 (icedtea 3.6.0)

Security issues fixed:

- CVE-2017-10274: Handle smartcard clean up better (bsc#1064071)
- CVE-2017-10281: Better queuing priorities (bsc#1064072)
- CVE-2017-10285: Unreferenced references (bsc#1064073)
- CVE-2017-10295: Better URL connections (bsc#1064075)
- CVE-2017-10388: Correct Kerberos ticket grants (bsc#1064086)
- CVE-2017-10346: Better invokespecial checks (bsc#1064078)
- CVE-2017-10350: Better Base Exceptions (bsc#1064082)
- CVE-2017-10347: Better timezone processing (bsc#1064079)
- CVE-2017-10349: Better X processing (bsc#1064081)
- CVE-2017-10345: Better keystore handling (bsc#1064077)
- CVE-2017-10348: Better processing of unresolved permissions (bsc#1064080)
- CVE-2017-10357: Process Proxy presentation (bsc#1064085)
- CVE-2017-10355: More stable connection processing (bsc#1064083)
- CVE-2017-10356: Update storage implementations (bsc#1064084)
- CVE-2016-10165: Improve CMS header processing (bsc#1064069)
- CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, CVE-2016-9843: Upgrade compression library (bsc#1064070)

Bug fixes:

- Fix bsc#1032647, bsc#1052009 with btrfs subvolumes and overlayfs
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-10"/>
	<updated date="2017-11-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1032647">SUSE bug 1032647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052009">SUSE bug 1052009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064069">SUSE bug 1064069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064070">SUSE bug 1064070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064071">SUSE bug 1064071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064072">SUSE bug 1064072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064073">SUSE bug 1064073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064075">SUSE bug 1064075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064077">SUSE bug 1064077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064078">SUSE bug 1064078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064079">SUSE bug 1064079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064080">SUSE bug 1064080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064081">SUSE bug 1064081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064082">SUSE bug 1064082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064083">SUSE bug 1064083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064084">SUSE bug 1064084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064085">SUSE bug 1064085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064086">SUSE bug 1064086</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10165/">CVE-2016-10165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10274/">CVE-2017-10274</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518297" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518298" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78245" version="1" class="patch">
	<metadata>
		<title>Security update for file (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1009966" ref_url="https://bugzilla.suse.com/1009966" source="BUGZILLA"/>
		<reference ref_id="1063269" ref_url="https://bugzilla.suse.com/1063269" source="BUGZILLA"/>
		<reference ref_id="910252" ref_url="https://bugzilla.suse.com/910252" source="BUGZILLA"/>
		<reference ref_id="910253" ref_url="https://bugzilla.suse.com/910253" source="BUGZILLA"/>
		<reference ref_id="913650" ref_url="https://bugzilla.suse.com/913650" source="BUGZILLA"/>
		<reference ref_id="913651" ref_url="https://bugzilla.suse.com/913651" source="BUGZILLA"/>
		<reference ref_id="917152" ref_url="https://bugzilla.suse.com/917152" source="BUGZILLA"/>
		<reference ref_id="996511" ref_url="https://bugzilla.suse.com/996511" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8116" ref_url="https://www.suse.com/security/cve/CVE-2014-8116/" source="CVE"/>
		<reference ref_id="CVE-2014-8117" ref_url="https://www.suse.com/security/cve/CVE-2014-8117/" source="CVE"/>
		<reference ref_id="CVE-2014-9620" ref_url="https://www.suse.com/security/cve/CVE-2014-9620/" source="CVE"/>
		<reference ref_id="CVE-2014-9621" ref_url="https://www.suse.com/security/cve/CVE-2014-9621/" source="CVE"/>
		<reference ref_id="CVE-2014-9653" ref_url="https://www.suse.com/security/cve/CVE-2014-9653/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003403.html" source="SUSE-SU"/>
		<description>


The GNU file utility was updated to version 5.22.

Security issues fixed:

- CVE-2014-9621: The ELF parser in file allowed remote attackers to cause a denial of service via a long string. (bsc#913650)
- CVE-2014-9620: The ELF parser in file allowed remote attackers to cause a denial of service via a large number of notes. (bsc#913651)
- CVE-2014-9653: readelf.c in file did not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory access) or possibly have unspecified other impact via a crafted ELF file. (bsc#917152)
- CVE-2014-8116: The ELF parser (readelf.c) in file allowed remote attackers to cause a denial of service (CPU consumption or crash) via a large number of (1) program or (2) section headers or (3) invalid capabilities. (bsc#910253)
- CVE-2014-8117: softmagic.c in file did not properly limit recursion, which allowed remote attackers to cause a denial of service (CPU consumption or crash) via unspecified vectors. (bsc#910253)

Version update to file version 5.22

* add indirect relative for TIFF/Exif
* restructure elf note printing to avoid repeated messages
* add note limit, suggested by Alexander Cherepanov
* Bail out on partial pread()'s (Alexander Cherepanov)
* Fix incorrect bounds check in file_printable (Alexander Cherepanov)
* PR/405: ignore SIGPIPE from uncompress programs
* change printable -&gt; file_printable and use it in more places for safety
* in ELF, instead of '(uses dynamic libraries)' when PT_INTERP is present print the interpreter name.

Version update to file version 5.21

* there was an incorrect free in magic_load_buffers()
* there was an out of bounds read for some pascal strings
* there was a memory leak in magic lists
* don't interpret strings printed from files using the current
  locale, convert them to ascii format first.
* there was an out of bounds read in elf note reads

Update to file version 5.20

* recognize encrypted CDF documents
* add magic_load_buffers from Brooks Davis
* add thumbs.db support

Additional non-security bug fixes:

* Fixed a memory corruption during rpmbuild (bsc#1063269)
* Backport of a fix for an increased printable string length as found in file 5.30 (bsc#996511)
* file command throws 'Composite Document File V2 Document, corrupt: Can't read SSAT' error against excel 97/2003 file format. (bsc#1009966)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-22"/>
	<updated date="2017-11-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009966">SUSE bug 1009966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063269">SUSE bug 1063269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910252">SUSE bug 910252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910253">SUSE bug 910253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913650">SUSE bug 913650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913651">SUSE bug 913651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917152">SUSE bug 917152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996511">SUSE bug 996511</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8116/">CVE-2014-8116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8117/">CVE-2014-8117</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9620/">CVE-2014-9620</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9621/">CVE-2014-9621</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9653/">CVE-2014-9653</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518307" comment="file-5.22-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518308" comment="file-magic-5.22-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518309" comment="libmagic1-5.22-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518310" comment="libmagic1-32bit-5.22-10.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78246" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1022727" ref_url="https://bugzilla.suse.com/1022727" source="BUGZILLA"/>
		<reference ref_id="1051150" ref_url="https://bugzilla.suse.com/1051150" source="BUGZILLA"/>
		<reference ref_id="1052984" ref_url="https://bugzilla.suse.com/1052984" source="BUGZILLA"/>
		<reference ref_id="1061107" ref_url="https://bugzilla.suse.com/1061107" source="BUGZILLA"/>
		<reference ref_id="1063034" ref_url="https://bugzilla.suse.com/1063034" source="BUGZILLA"/>
		<reference ref_id="1063035" ref_url="https://bugzilla.suse.com/1063035" source="BUGZILLA"/>
		<reference ref_id="1063037" ref_url="https://bugzilla.suse.com/1063037" source="BUGZILLA"/>
		<reference ref_id="1063038" ref_url="https://bugzilla.suse.com/1063038" source="BUGZILLA"/>
		<reference ref_id="1063039" ref_url="https://bugzilla.suse.com/1063039" source="BUGZILLA"/>
		<reference ref_id="1063040" ref_url="https://bugzilla.suse.com/1063040" source="BUGZILLA"/>
		<reference ref_id="1063041" ref_url="https://bugzilla.suse.com/1063041" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12176" ref_url="https://www.suse.com/security/cve/CVE-2017-12176/" source="CVE"/>
		<reference ref_id="CVE-2017-12177" ref_url="https://www.suse.com/security/cve/CVE-2017-12177/" source="CVE"/>
		<reference ref_id="CVE-2017-12178" ref_url="https://www.suse.com/security/cve/CVE-2017-12178/" source="CVE"/>
		<reference ref_id="CVE-2017-12179" ref_url="https://www.suse.com/security/cve/CVE-2017-12179/" source="CVE"/>
		<reference ref_id="CVE-2017-12180" ref_url="https://www.suse.com/security/cve/CVE-2017-12180/" source="CVE"/>
		<reference ref_id="CVE-2017-12181" ref_url="https://www.suse.com/security/cve/CVE-2017-12181/" source="CVE"/>
		<reference ref_id="CVE-2017-12182" ref_url="https://www.suse.com/security/cve/CVE-2017-12182/" source="CVE"/>
		<reference ref_id="CVE-2017-12183" ref_url="https://www.suse.com/security/cve/CVE-2017-12183/" source="CVE"/>
		<reference ref_id="CVE-2017-12184" ref_url="https://www.suse.com/security/cve/CVE-2017-12184/" source="CVE"/>
		<reference ref_id="CVE-2017-12185" ref_url="https://www.suse.com/security/cve/CVE-2017-12185/" source="CVE"/>
		<reference ref_id="CVE-2017-12186" ref_url="https://www.suse.com/security/cve/CVE-2017-12186/" source="CVE"/>
		<reference ref_id="CVE-2017-12187" ref_url="https://www.suse.com/security/cve/CVE-2017-12187/" source="CVE"/>
		<reference ref_id="CVE-2017-13721" ref_url="https://www.suse.com/security/cve/CVE-2017-13721/" source="CVE"/>
		<reference ref_id="CVE-2017-13723" ref_url="https://www.suse.com/security/cve/CVE-2017-13723/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003402.html" source="SUSE-SU"/>
		<description>


This update for xorg-x11-server fixes several issues.

These security issues were fixed:

- CVE-2017-13721: Missing validation of shmseg resource id in Xext/XShm
  could lead to shared memory segments of other users beeing freed
  (bnc#1052984)
- CVE-2017-13723: A local denial of service via unusual characters in XkbAtomText and XkbStringText was fixed (bnc#1051150)
- CVE-2017-12184,CVE-2017-12185,CVE-2017-12186,CVE-2017-12187: Fixed
  unvalidated lengths in multiple extensions (bsc#1063034)
- CVE-2017-12183: Fixed some unvalidated lengths in the XFIXES
  extension. (bsc#1063035)
- CVE-2017-12180,CVE-2017-12181,CVE-2017-12182: Fixed various unvalidated
  lengths in the XFree86-VidMode/XFree86-DGA/XFree86-DRI extensions
  (bsc#1063037)
- CVE-2017-12179: Fixed an integer overflow and unvalidated length in
  (S)ProcXIBarrierReleasePointer in Xi (bsc#1063038)
- CVE-2017-12178: Fixed a wrong extra length check in
  ProcXIChangeHierarchy in Xi (bsc#1063039)
- CVE-2017-12177: Fixed an unvalidated variable-length request in
  ProcDbeGetVisualInfo (bsc#1063040)
- CVE-2017-12176: Fixed an unvalidated extra length in
  ProcEstablishConnection (bsc#1063041)


These non-security issues were fixed:

- Make colormap/gamma glue code work with the RandR extension disabled. This prevents it
  from crashing and showing wrong colors. (bsc#1061107)
- Recognize ssh as a remote client to fix launching applications remotely when using DRI3.
  (bsc#1022727)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-22"/>
	<updated date="2017-11-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022727">SUSE bug 1022727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051150">SUSE bug 1051150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052984">SUSE bug 1052984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061107">SUSE bug 1061107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063034">SUSE bug 1063034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063035">SUSE bug 1063035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063037">SUSE bug 1063037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063038">SUSE bug 1063038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063039">SUSE bug 1063039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063040">SUSE bug 1063040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063041">SUSE bug 1063041</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12176/">CVE-2017-12176</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12177/">CVE-2017-12177</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12178/">CVE-2017-12178</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12179/">CVE-2017-12179</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12180/">CVE-2017-12180</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12181/">CVE-2017-12181</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12182/">CVE-2017-12182</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12183/">CVE-2017-12183</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12184/">CVE-2017-12184</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12185/">CVE-2017-12185</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12186/">CVE-2017-12186</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12187/">CVE-2017-12187</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-13721/">CVE-2017-13721</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13723/">CVE-2017-13723</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518311" comment="xorg-x11-server-7.6_1.18.3-76.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518312" comment="xorg-x11-server-extra-7.6_1.18.3-76.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78247" version="1" class="patch">
	<metadata>
		<title>Security update for gimp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1050469" ref_url="https://bugzilla.suse.com/1050469" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:3062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003407.html" source="SUSE-SU"/>
		<description>

  
This update for gimp fixes the following issues:

- Don't build gimp with webkit1 support, as it is no longer maintained and has
  plenty of security bugs. 

  This disables the GIMP's built-in help browser; it will use an external browser when configured this way.

  This works around a number of security vulnerabilities in Webkit1.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-23"/>
	<updated date="2017-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518313" comment="gimp-2.8.18-9.3.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518314" comment="gimp-lang-2.8.18-9.3.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518315" comment="gimp-plugins-python-2.8.18-9.3.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518316" comment="libgimp-2_0-0-2.8.18-9.3.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518317" comment="libgimpui-2_0-0-2.8.18-9.3.26 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78248" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1047178" ref_url="https://bugzilla.suse.com/1047178" source="BUGZILLA"/>
		<reference ref_id="1057721" ref_url="https://bugzilla.suse.com/1057721" source="BUGZILLA"/>
		<reference ref_id="1057724" ref_url="https://bugzilla.suse.com/1057724" source="BUGZILLA"/>
		<reference ref_id="999735" ref_url="https://bugzilla.suse.com/999735" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12837" ref_url="https://www.suse.com/security/cve/CVE-2017-12837/" source="CVE"/>
		<reference ref_id="CVE-2017-12883" ref_url="https://www.suse.com/security/cve/CVE-2017-12883/" source="CVE"/>
		<reference ref_id="CVE-2017-6512" ref_url="https://www.suse.com/security/cve/CVE-2017-6512/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003416.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

Security issues fixed:
- CVE-2017-12837: Heap-based buffer overflow in the S_regatom function in regcomp.c in Perl 5 before
  5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to cause a denial of service
  (out-of-bounds write) via a regular expression with a '\N{}' escape and the case-insensitive
  modifier. (bnc#1057724)
- CVE-2017-12883: Buffer overflow in the S_grok_bslash_N function in regcomp.c in Perl 5 before
  5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to disclose sensitive information
  or cause a denial of service (application crash) via a crafted regular expression with an invalid
  '\N{U+...}' escape. (bnc#1057721)
- CVE-2017-6512: Race condition in the rmtree and remove_tree functions in the File-Path module
  before 2.13 for Perl allows attackers to set the mode on arbitrary files via vectors involving
  directory-permission loosening logic. (bnc#1047178)

Bug fixes:
- backport set_capture_string changes from upstream (bsc#999735)
- reformat baselibs.conf as source validator workaround
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-24"/>
	<updated date="2017-11-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047178">SUSE bug 1047178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057721">SUSE bug 1057721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057724">SUSE bug 1057724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999735">SUSE bug 999735</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12837/">CVE-2017-12837</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12883/">CVE-2017-12883</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-6512/">CVE-2017-6512</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518319" comment="perl-5.18.2-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518320" comment="perl-32bit-5.18.2-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518321" comment="perl-base-5.18.2-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518322" comment="perl-doc-5.18.2-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78249" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1066295" ref_url="https://bugzilla.suse.com/1066295" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00042.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

- Update Intel WiFi firmwares for the 3160, 7260 and 7265 adapters.

Security issues fixed are part of the 'KRACK' attacks affecting the firmware:

- CVE-2017-13080: The reinstallation of the Group Temporal key could be used for replay attacks (bsc#1066295):
- CVE-2017-13081: The reinstallation of the Integrity Group Temporal key could be used for replay attacks (bsc#1066295):
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-27"/>
	<updated date="2017-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1066295">SUSE bug 1066295</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518323" comment="kernel-firmware-20170530-21.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518324" comment="ucode-amd-20170530-21.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78250" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1055047" ref_url="https://bugzilla.suse.com/1055047" source="BUGZILLA"/>
		<reference ref_id="1061075" ref_url="https://bugzilla.suse.com/1061075" source="BUGZILLA"/>
		<reference ref_id="1063123" ref_url="https://bugzilla.suse.com/1063123" source="BUGZILLA"/>
		<reference ref_id="1068187" ref_url="https://bugzilla.suse.com/1068187" source="BUGZILLA"/>
		<reference ref_id="1068191" ref_url="https://bugzilla.suse.com/1068191" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<reference ref_id="CVE-2017-15597" ref_url="https://www.suse.com/security/cve/CVE-2017-15597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00043.html" source="SUSE-SU"/>
		<description>
This update for xen to version 4.9.1 (bsc#1027519) fixes several issues.

This new feature was added:

- Support migration of HVM domains larger than 1 TB

These security issues were fixed:

- bsc#1068187: Failure to recognize errors in the Populate on Demand (PoD) code
  allowed for DoS (XSA-246)
- bsc#1068191: Missing p2m error checking in PoD code allowed unprivileged guests
  to retain a writable mapping of freed memory leading to information leaks,
  privilege escalation or DoS (XSA-247).
- CVE-2017-15289: The mode4and5 write functions allowed local OS guest privileged
  users to cause a denial of service (out-of-bounds write access and Qemu process
  crash) via vectors related to dst calculation (bsc#1063123)
- CVE-2017-15597: A grant copy operation being done on a grant of a dying domain
  allowed a malicious guest administrator to corrupt hypervisor memory, allowing
  for DoS or potentially privilege escalation and information leaks (bsc#1061075).

This non-security issue was fixed:

- bsc#1055047: Fixed --initrd-inject option in virt-install 
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-29"/>
	<updated date="2017-11-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055047">SUSE bug 1055047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061075">SUSE bug 1061075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063123">SUSE bug 1063123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068187">SUSE bug 1068187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068191">SUSE bug 1068191</bugzilla>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15597/">CVE-2017-15597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519583" comment="xen-4.9.1_02-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519584" comment="xen-libs-4.9.1_02-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519585" comment="xen-libs-32bit-4.9.1_02-3.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78251" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1058565" ref_url="https://bugzilla.suse.com/1058565" source="BUGZILLA"/>
		<reference ref_id="1058622" ref_url="https://bugzilla.suse.com/1058622" source="BUGZILLA"/>
		<reference ref_id="1058624" ref_url="https://bugzilla.suse.com/1058624" source="BUGZILLA"/>
		<reference ref_id="1060427" ref_url="https://bugzilla.suse.com/1060427" source="BUGZILLA"/>
		<reference ref_id="1063008" ref_url="https://bugzilla.suse.com/1063008" source="BUGZILLA"/>
		<reference ref_id="1065066" ref_url="https://bugzilla.suse.com/1065066" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12150" ref_url="https://www.suse.com/security/cve/CVE-2017-12150/" source="CVE"/>
		<reference ref_id="CVE-2017-12151" ref_url="https://www.suse.com/security/cve/CVE-2017-12151/" source="CVE"/>
		<reference ref_id="CVE-2017-12163" ref_url="https://www.suse.com/security/cve/CVE-2017-12163/" source="CVE"/>
		<reference ref_id="CVE-2017-14746" ref_url="https://www.suse.com/security/cve/CVE-2017-14746/" source="CVE"/>
		<reference ref_id="CVE-2017-15275" ref_url="https://www.suse.com/security/cve/CVE-2017-15275/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003453.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

Security issues fixed:

- CVE-2017-14746: Use-after-free vulnerability (bsc#1060427).
- CVE-2017-15275: Server heap memory information leak (bsc#1063008).
- CVE-2017-12163: Prevent client short SMB1 write from writing server memory to file (bsc#1058624).
- CVE-2017-12151: Keep required encryption across SMB3 dfs redirects (bsc#1058565).
- CVE-2017-12150: Some code path don't enforce smb signing when they should (bsc#1058565).

Bug fixes:
- Samba was updated to 4.6.9 (bsc#1065066) see release notes for details.
  * https://www.samba.org/samba/history/samba-4.6.9.html
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-30"/>
	<updated date="2017-11-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1058565">SUSE bug 1058565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058622">SUSE bug 1058622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058624">SUSE bug 1058624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060427">SUSE bug 1060427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063008">SUSE bug 1063008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065066">SUSE bug 1065066</bugzilla>
	<cve impact="moderate" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12150/">CVE-2017-12150</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12151/">CVE-2017-12151</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12163/">CVE-2017-12163</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14746/">CVE-2017-14746</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15275/">CVE-2017-15275</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519586" comment="libdcerpc-binding0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519587" comment="libdcerpc-binding0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519588" comment="libdcerpc0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519589" comment="libdcerpc0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519590" comment="libndr-krb5pac0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519591" comment="libndr-krb5pac0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519592" comment="libndr-nbt0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519593" comment="libndr-nbt0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519594" comment="libndr-standard0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519595" comment="libndr-standard0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519596" comment="libndr0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519597" comment="libndr0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519598" comment="libnetapi0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519599" comment="libnetapi0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519600" comment="libsamba-credentials0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519601" comment="libsamba-credentials0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519602" comment="libsamba-errors0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519603" comment="libsamba-errors0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519604" comment="libsamba-hostconfig0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519605" comment="libsamba-hostconfig0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519606" comment="libsamba-passdb0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519607" comment="libsamba-passdb0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519608" comment="libsamba-util0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519609" comment="libsamba-util0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519610" comment="libsamdb0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519611" comment="libsamdb0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519612" comment="libsmbclient0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519613" comment="libsmbclient0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519614" comment="libsmbconf0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519615" comment="libsmbconf0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519616" comment="libsmbldap0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519617" comment="libsmbldap0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519618" comment="libtevent-util0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519619" comment="libtevent-util0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519620" comment="libwbclient0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519621" comment="libwbclient0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519622" comment="samba-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519623" comment="samba-client-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519624" comment="samba-client-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519625" comment="samba-doc-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519626" comment="samba-libs-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519627" comment="samba-libs-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519628" comment="samba-winbind-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519629" comment="samba-winbind-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78252" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1055825" ref_url="https://bugzilla.suse.com/1055825" source="BUGZILLA"/>
		<reference ref_id="1056058" ref_url="https://bugzilla.suse.com/1056058" source="BUGZILLA"/>
		<reference ref_id="1065363" ref_url="https://bugzilla.suse.com/1065363" source="BUGZILLA"/>
		<reference ref_id="1066242" ref_url="https://bugzilla.suse.com/1066242" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3735" ref_url="https://www.suse.com/security/cve/CVE-2017-3735/" source="CVE"/>
		<reference ref_id="CVE-2017-3736" ref_url="https://www.suse.com/security/cve/CVE-2017-3736/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003461.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed:

- CVE-2017-3735: openssl1,openssl: Malformed X.509 IPAdressFamily could cause OOB read (bsc#1056058)
- CVE-2017-3736: openssl: bn_sqrx8x_internal carry bug on x86_64 (bsc#1066242)
- Out of bounds read+crash in DES_fcrypt (bsc#1065363)
- openssl DEFAULT_SUSE cipher list is missing ECDHE-ECDSA ciphers (bsc#1055825)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-30"/>
	<updated date="2017-11-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1055825">SUSE bug 1055825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056058">SUSE bug 1056058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065363">SUSE bug 1065363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066242">SUSE bug 1066242</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3735/">CVE-2017-3735</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3736/">CVE-2017-3736</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518373" comment="libopenssl-devel-1.0.2j-60.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518374" comment="libopenssl1_0_0-1.0.2j-60.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518375" comment="libopenssl1_0_0-32bit-1.0.2j-60.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518376" comment="openssl-1.0.2j-60.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78253" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1003846" ref_url="https://bugzilla.suse.com/1003846" source="BUGZILLA"/>
		<reference ref_id="1025282" ref_url="https://bugzilla.suse.com/1025282" source="BUGZILLA"/>
		<reference ref_id="1029907" ref_url="https://bugzilla.suse.com/1029907" source="BUGZILLA"/>
		<reference ref_id="1029908" ref_url="https://bugzilla.suse.com/1029908" source="BUGZILLA"/>
		<reference ref_id="1029909" ref_url="https://bugzilla.suse.com/1029909" source="BUGZILLA"/>
		<reference ref_id="1029995" ref_url="https://bugzilla.suse.com/1029995" source="BUGZILLA"/>
		<reference ref_id="1030296" ref_url="https://bugzilla.suse.com/1030296" source="BUGZILLA"/>
		<reference ref_id="1030297" ref_url="https://bugzilla.suse.com/1030297" source="BUGZILLA"/>
		<reference ref_id="1030298" ref_url="https://bugzilla.suse.com/1030298" source="BUGZILLA"/>
		<reference ref_id="1030583" ref_url="https://bugzilla.suse.com/1030583" source="BUGZILLA"/>
		<reference ref_id="1030584" ref_url="https://bugzilla.suse.com/1030584" source="BUGZILLA"/>
		<reference ref_id="1030585" ref_url="https://bugzilla.suse.com/1030585" source="BUGZILLA"/>
		<reference ref_id="1030588" ref_url="https://bugzilla.suse.com/1030588" source="BUGZILLA"/>
		<reference ref_id="1030589" ref_url="https://bugzilla.suse.com/1030589" source="BUGZILLA"/>
		<reference ref_id="1031590" ref_url="https://bugzilla.suse.com/1031590" source="BUGZILLA"/>
		<reference ref_id="1031593" ref_url="https://bugzilla.suse.com/1031593" source="BUGZILLA"/>
		<reference ref_id="1031595" ref_url="https://bugzilla.suse.com/1031595" source="BUGZILLA"/>
		<reference ref_id="1031638" ref_url="https://bugzilla.suse.com/1031638" source="BUGZILLA"/>
		<reference ref_id="1031644" ref_url="https://bugzilla.suse.com/1031644" source="BUGZILLA"/>
		<reference ref_id="1031656" ref_url="https://bugzilla.suse.com/1031656" source="BUGZILLA"/>
		<reference ref_id="1033122" ref_url="https://bugzilla.suse.com/1033122" source="BUGZILLA"/>
		<reference ref_id="1037052" ref_url="https://bugzilla.suse.com/1037052" source="BUGZILLA"/>
		<reference ref_id="1037057" ref_url="https://bugzilla.suse.com/1037057" source="BUGZILLA"/>
		<reference ref_id="1037061" ref_url="https://bugzilla.suse.com/1037061" source="BUGZILLA"/>
		<reference ref_id="1037062" ref_url="https://bugzilla.suse.com/1037062" source="BUGZILLA"/>
		<reference ref_id="1037066" ref_url="https://bugzilla.suse.com/1037066" source="BUGZILLA"/>
		<reference ref_id="1037070" ref_url="https://bugzilla.suse.com/1037070" source="BUGZILLA"/>
		<reference ref_id="1037072" ref_url="https://bugzilla.suse.com/1037072" source="BUGZILLA"/>
		<reference ref_id="1037273" ref_url="https://bugzilla.suse.com/1037273" source="BUGZILLA"/>
		<reference ref_id="1038874" ref_url="https://bugzilla.suse.com/1038874" source="BUGZILLA"/>
		<reference ref_id="1038875" ref_url="https://bugzilla.suse.com/1038875" source="BUGZILLA"/>
		<reference ref_id="1038876" ref_url="https://bugzilla.suse.com/1038876" source="BUGZILLA"/>
		<reference ref_id="1038877" ref_url="https://bugzilla.suse.com/1038877" source="BUGZILLA"/>
		<reference ref_id="1038878" ref_url="https://bugzilla.suse.com/1038878" source="BUGZILLA"/>
		<reference ref_id="1038880" ref_url="https://bugzilla.suse.com/1038880" source="BUGZILLA"/>
		<reference ref_id="1038881" ref_url="https://bugzilla.suse.com/1038881" source="BUGZILLA"/>
		<reference ref_id="1044891" ref_url="https://bugzilla.suse.com/1044891" source="BUGZILLA"/>
		<reference ref_id="1044897" ref_url="https://bugzilla.suse.com/1044897" source="BUGZILLA"/>
		<reference ref_id="1044901" ref_url="https://bugzilla.suse.com/1044901" source="BUGZILLA"/>
		<reference ref_id="1044909" ref_url="https://bugzilla.suse.com/1044909" source="BUGZILLA"/>
		<reference ref_id="1044925" ref_url="https://bugzilla.suse.com/1044925" source="BUGZILLA"/>
		<reference ref_id="1044927" ref_url="https://bugzilla.suse.com/1044927" source="BUGZILLA"/>
		<reference ref_id="1046094" ref_url="https://bugzilla.suse.com/1046094" source="BUGZILLA"/>
		<reference ref_id="1052061" ref_url="https://bugzilla.suse.com/1052061" source="BUGZILLA"/>
		<reference ref_id="1052496" ref_url="https://bugzilla.suse.com/1052496" source="BUGZILLA"/>
		<reference ref_id="1052503" ref_url="https://bugzilla.suse.com/1052503" source="BUGZILLA"/>
		<reference ref_id="1052507" ref_url="https://bugzilla.suse.com/1052507" source="BUGZILLA"/>
		<reference ref_id="1052509" ref_url="https://bugzilla.suse.com/1052509" source="BUGZILLA"/>
		<reference ref_id="1052511" ref_url="https://bugzilla.suse.com/1052511" source="BUGZILLA"/>
		<reference ref_id="1052514" ref_url="https://bugzilla.suse.com/1052514" source="BUGZILLA"/>
		<reference ref_id="1052518" ref_url="https://bugzilla.suse.com/1052518" source="BUGZILLA"/>
		<reference ref_id="1053347" ref_url="https://bugzilla.suse.com/1053347" source="BUGZILLA"/>
		<reference ref_id="1056312" ref_url="https://bugzilla.suse.com/1056312" source="BUGZILLA"/>
		<reference ref_id="1056437" ref_url="https://bugzilla.suse.com/1056437" source="BUGZILLA"/>
		<reference ref_id="1057139" ref_url="https://bugzilla.suse.com/1057139" source="BUGZILLA"/>
		<reference ref_id="1057144" ref_url="https://bugzilla.suse.com/1057144" source="BUGZILLA"/>
		<reference ref_id="1057149" ref_url="https://bugzilla.suse.com/1057149" source="BUGZILLA"/>
		<reference ref_id="1058480" ref_url="https://bugzilla.suse.com/1058480" source="BUGZILLA"/>
		<reference ref_id="1059050" ref_url="https://bugzilla.suse.com/1059050" source="BUGZILLA"/>
		<reference ref_id="1060599" ref_url="https://bugzilla.suse.com/1060599" source="BUGZILLA"/>
		<reference ref_id="1060621" ref_url="https://bugzilla.suse.com/1060621" source="BUGZILLA"/>
		<reference ref_id="1061241" ref_url="https://bugzilla.suse.com/1061241" source="BUGZILLA"/>
		<reference ref_id="437293" ref_url="https://bugzilla.suse.com/437293" source="BUGZILLA"/>
		<reference ref_id="445037" ref_url="https://bugzilla.suse.com/445037" source="BUGZILLA"/>
		<reference ref_id="546106" ref_url="https://bugzilla.suse.com/546106" source="BUGZILLA"/>
		<reference ref_id="561142" ref_url="https://bugzilla.suse.com/561142" source="BUGZILLA"/>
		<reference ref_id="578249" ref_url="https://bugzilla.suse.com/578249" source="BUGZILLA"/>
		<reference ref_id="590820" ref_url="https://bugzilla.suse.com/590820" source="BUGZILLA"/>
		<reference ref_id="691290" ref_url="https://bugzilla.suse.com/691290" source="BUGZILLA"/>
		<reference ref_id="698346" ref_url="https://bugzilla.suse.com/698346" source="BUGZILLA"/>
		<reference ref_id="713504" ref_url="https://bugzilla.suse.com/713504" source="BUGZILLA"/>
		<reference ref_id="776968" ref_url="https://bugzilla.suse.com/776968" source="BUGZILLA"/>
		<reference ref_id="863764" ref_url="https://bugzilla.suse.com/863764" source="BUGZILLA"/>
		<reference ref_id="938658" ref_url="https://bugzilla.suse.com/938658" source="BUGZILLA"/>
		<reference ref_id="970239" ref_url="https://bugzilla.suse.com/970239" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9939" ref_url="https://www.suse.com/security/cve/CVE-2014-9939/" source="CVE"/>
		<reference ref_id="CVE-2017-12448" ref_url="https://www.suse.com/security/cve/CVE-2017-12448/" source="CVE"/>
		<reference ref_id="CVE-2017-12450" ref_url="https://www.suse.com/security/cve/CVE-2017-12450/" source="CVE"/>
		<reference ref_id="CVE-2017-12452" ref_url="https://www.suse.com/security/cve/CVE-2017-12452/" source="CVE"/>
		<reference ref_id="CVE-2017-12453" ref_url="https://www.suse.com/security/cve/CVE-2017-12453/" source="CVE"/>
		<reference ref_id="CVE-2017-12454" ref_url="https://www.suse.com/security/cve/CVE-2017-12454/" source="CVE"/>
		<reference ref_id="CVE-2017-12456" ref_url="https://www.suse.com/security/cve/CVE-2017-12456/" source="CVE"/>
		<reference ref_id="CVE-2017-12799" ref_url="https://www.suse.com/security/cve/CVE-2017-12799/" source="CVE"/>
		<reference ref_id="CVE-2017-13757" ref_url="https://www.suse.com/security/cve/CVE-2017-13757/" source="CVE"/>
		<reference ref_id="CVE-2017-14128" ref_url="https://www.suse.com/security/cve/CVE-2017-14128/" source="CVE"/>
		<reference ref_id="CVE-2017-14129" ref_url="https://www.suse.com/security/cve/CVE-2017-14129/" source="CVE"/>
		<reference ref_id="CVE-2017-14130" ref_url="https://www.suse.com/security/cve/CVE-2017-14130/" source="CVE"/>
		<reference ref_id="CVE-2017-14333" ref_url="https://www.suse.com/security/cve/CVE-2017-14333/" source="CVE"/>
		<reference ref_id="CVE-2017-14529" ref_url="https://www.suse.com/security/cve/CVE-2017-14529/" source="CVE"/>
		<reference ref_id="CVE-2017-14729" ref_url="https://www.suse.com/security/cve/CVE-2017-14729/" source="CVE"/>
		<reference ref_id="CVE-2017-14745" ref_url="https://www.suse.com/security/cve/CVE-2017-14745/" source="CVE"/>
		<reference ref_id="CVE-2017-14974" ref_url="https://www.suse.com/security/cve/CVE-2017-14974/" source="CVE"/>
		<reference ref_id="CVE-2017-6965" ref_url="https://www.suse.com/security/cve/CVE-2017-6965/" source="CVE"/>
		<reference ref_id="CVE-2017-6966" ref_url="https://www.suse.com/security/cve/CVE-2017-6966/" source="CVE"/>
		<reference ref_id="CVE-2017-6969" ref_url="https://www.suse.com/security/cve/CVE-2017-6969/" source="CVE"/>
		<reference ref_id="CVE-2017-7209" ref_url="https://www.suse.com/security/cve/CVE-2017-7209/" source="CVE"/>
		<reference ref_id="CVE-2017-7210" ref_url="https://www.suse.com/security/cve/CVE-2017-7210/" source="CVE"/>
		<reference ref_id="CVE-2017-7223" ref_url="https://www.suse.com/security/cve/CVE-2017-7223/" source="CVE"/>
		<reference ref_id="CVE-2017-7224" ref_url="https://www.suse.com/security/cve/CVE-2017-7224/" source="CVE"/>
		<reference ref_id="CVE-2017-7225" ref_url="https://www.suse.com/security/cve/CVE-2017-7225/" source="CVE"/>
		<reference ref_id="CVE-2017-7226" ref_url="https://www.suse.com/security/cve/CVE-2017-7226/" source="CVE"/>
		<reference ref_id="CVE-2017-7227" ref_url="https://www.suse.com/security/cve/CVE-2017-7227/" source="CVE"/>
		<reference ref_id="CVE-2017-7299" ref_url="https://www.suse.com/security/cve/CVE-2017-7299/" source="CVE"/>
		<reference ref_id="CVE-2017-7300" ref_url="https://www.suse.com/security/cve/CVE-2017-7300/" source="CVE"/>
		<reference ref_id="CVE-2017-7301" ref_url="https://www.suse.com/security/cve/CVE-2017-7301/" source="CVE"/>
		<reference ref_id="CVE-2017-7302" ref_url="https://www.suse.com/security/cve/CVE-2017-7302/" source="CVE"/>
		<reference ref_id="CVE-2017-7303" ref_url="https://www.suse.com/security/cve/CVE-2017-7303/" source="CVE"/>
		<reference ref_id="CVE-2017-7304" ref_url="https://www.suse.com/security/cve/CVE-2017-7304/" source="CVE"/>
		<reference ref_id="CVE-2017-7614" ref_url="https://www.suse.com/security/cve/CVE-2017-7614/" source="CVE"/>
		<reference ref_id="CVE-2017-8392" ref_url="https://www.suse.com/security/cve/CVE-2017-8392/" source="CVE"/>
		<reference ref_id="CVE-2017-8393" ref_url="https://www.suse.com/security/cve/CVE-2017-8393/" source="CVE"/>
		<reference ref_id="CVE-2017-8394" ref_url="https://www.suse.com/security/cve/CVE-2017-8394/" source="CVE"/>
		<reference ref_id="CVE-2017-8395" ref_url="https://www.suse.com/security/cve/CVE-2017-8395/" source="CVE"/>
		<reference ref_id="CVE-2017-8396" ref_url="https://www.suse.com/security/cve/CVE-2017-8396/" source="CVE"/>
		<reference ref_id="CVE-2017-8397" ref_url="https://www.suse.com/security/cve/CVE-2017-8397/" source="CVE"/>
		<reference ref_id="CVE-2017-8398" ref_url="https://www.suse.com/security/cve/CVE-2017-8398/" source="CVE"/>
		<reference ref_id="CVE-2017-8421" ref_url="https://www.suse.com/security/cve/CVE-2017-8421/" source="CVE"/>
		<reference ref_id="CVE-2017-9038" ref_url="https://www.suse.com/security/cve/CVE-2017-9038/" source="CVE"/>
		<reference ref_id="CVE-2017-9039" ref_url="https://www.suse.com/security/cve/CVE-2017-9039/" source="CVE"/>
		<reference ref_id="CVE-2017-9040" ref_url="https://www.suse.com/security/cve/CVE-2017-9040/" source="CVE"/>
		<reference ref_id="CVE-2017-9041" ref_url="https://www.suse.com/security/cve/CVE-2017-9041/" source="CVE"/>
		<reference ref_id="CVE-2017-9042" ref_url="https://www.suse.com/security/cve/CVE-2017-9042/" source="CVE"/>
		<reference ref_id="CVE-2017-9043" ref_url="https://www.suse.com/security/cve/CVE-2017-9043/" source="CVE"/>
		<reference ref_id="CVE-2017-9044" ref_url="https://www.suse.com/security/cve/CVE-2017-9044/" source="CVE"/>
		<reference ref_id="CVE-2017-9746" ref_url="https://www.suse.com/security/cve/CVE-2017-9746/" source="CVE"/>
		<reference ref_id="CVE-2017-9747" ref_url="https://www.suse.com/security/cve/CVE-2017-9747/" source="CVE"/>
		<reference ref_id="CVE-2017-9748" ref_url="https://www.suse.com/security/cve/CVE-2017-9748/" source="CVE"/>
		<reference ref_id="CVE-2017-9750" ref_url="https://www.suse.com/security/cve/CVE-2017-9750/" source="CVE"/>
		<reference ref_id="CVE-2017-9755" ref_url="https://www.suse.com/security/cve/CVE-2017-9755/" source="CVE"/>
		<reference ref_id="CVE-2017-9756" ref_url="https://www.suse.com/security/cve/CVE-2017-9756/" source="CVE"/>
		<reference ref_id="CVE-2017-9954" ref_url="https://www.suse.com/security/cve/CVE-2017-9954/" source="CVE"/>
		<reference ref_id="CVE-2017-9955" ref_url="https://www.suse.com/security/cve/CVE-2017-9955/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<description>


GNU binutil was updated to the 2.29.1 release, bringing various new features, fixing a lot of bugs and security issues.

Following security issues are being addressed by this release:

  * 18750 bsc#1030296 CVE-2014-9939
  * 20891 bsc#1030585 CVE-2017-7225
  * 20892 bsc#1030588 CVE-2017-7224
  * 20898 bsc#1030589 CVE-2017-7223
  * 20905 bsc#1030584 CVE-2017-7226
  * 20908 bsc#1031644 CVE-2017-7299
  * 20909 bsc#1031656 CVE-2017-7300
  * 20921 bsc#1031595 CVE-2017-7302
  * 20922 bsc#1031593 CVE-2017-7303
  * 20924 bsc#1031638 CVE-2017-7301
  * 20931 bsc#1031590 CVE-2017-7304
  * 21135 bsc#1030298 CVE-2017-7209 
  * 21137 bsc#1029909 CVE-2017-6965
  * 21139 bsc#1029908 CVE-2017-6966
  * 21156 bsc#1029907 CVE-2017-6969
  * 21157 bsc#1030297 CVE-2017-7210
  * 21409 bsc#1037052 CVE-2017-8392
  * 21412 bsc#1037057 CVE-2017-8393
  * 21414 bsc#1037061 CVE-2017-8394
  * 21432 bsc#1037066 CVE-2017-8396
  * 21440 bsc#1037273 CVE-2017-8421
  * 21580 bsc#1044891 CVE-2017-9746
  * 21581 bsc#1044897 CVE-2017-9747
  * 21582 bsc#1044901 CVE-2017-9748
  * 21587 bsc#1044909 CVE-2017-9750
  * 21594 bsc#1044925 CVE-2017-9755
  * 21595 bsc#1044927 CVE-2017-9756
  * 21787 bsc#1052518 CVE-2017-12448
  * 21813 bsc#1052503, CVE-2017-12456, bsc#1052507, CVE-2017-12454, bsc#1052509, CVE-2017-12453, bsc#1052511, CVE-2017-12452, bsc#1052514, CVE-2017-12450, bsc#1052503, CVE-2017-12456, bsc#1052507, CVE-2017-12454, bsc#1052509, CVE-2017-12453, bsc#1052511, CVE-2017-12452, bsc#1052514, CVE-2017-12450
  * 21933 bsc#1053347 CVE-2017-12799
  * 21990 bsc#1058480 CVE-2017-14333
  * 22018 bsc#1056312 CVE-2017-13757
  * 22047 bsc#1057144 CVE-2017-14129
  * 22058 bsc#1057149 CVE-2017-14130
  * 22059 bsc#1057139 CVE-2017-14128
  * 22113 bsc#1059050 CVE-2017-14529
  * 22148 bsc#1060599 CVE-2017-14745
  * 22163 bsc#1061241 CVE-2017-14974
  * 22170 bsc#1060621 CVE-2017-14729

Update to binutils 2.29. [fate#321454, fate#321494, fate#323293]:

  * The MIPS port now supports microMIPS eXtended Physical Addressing (XPA)
    instructions for assembly and disassembly.
  * The MIPS port now supports the microMIPS Release 5 ISA for assembly and
    disassembly.
  * The MIPS port now supports the Imagination interAptiv MR2 processor,
    which implements the MIPS32r3 ISA, the MIPS16e2 ASE as well as a couple
    of implementation-specific regular MIPS and MIPS16e2 ASE instructions.
  * The SPARC port now supports the SPARC M8 processor, which implements the
    Oracle SPARC Architecture 2017.
  * The MIPS port now supports the MIPS16e2 ASE for assembly and disassembly.
  * Add support for ELF SHF_GNU_MBIND and PT_GNU_MBIND_XXX.
  * Add support for the wasm32 ELF conversion of the WebAssembly file format.
  * Add --inlines option to objdump, which extends the --line-numbers option
    so that inlined functions will display their nesting information.
  * Add --merge-notes options to objcopy to reduce the size of notes in
    a binary file by merging and deleting redundant notes.
  * Add support for locating separate debug info files using the build-id
    method, where the separate file has a name based upon the build-id of
    the original file.

- GAS specific:

  * Add support for ELF SHF_GNU_MBIND.
  * Add support for the WebAssembly file format and wasm32 ELF conversion.
  * PowerPC gas now checks that the correct register class is used in
    instructions.  For instance, 'addi %f4,%cr3,%r31' warns three times
    that the registers are invalid.
  * Add support for the Texas Instruments PRU processor.
  * Support for the ARMv8-R architecture and Cortex-R52 processor has been
    added to the ARM port.

- GNU ld specific:

  * Support for -z shstk in the x86 ELF linker to generate
    GNU_PROPERTY_X86_FEATURE_1_SHSTK in ELF GNU program properties.
  * Add support for GNU_PROPERTY_X86_FEATURE_1_SHSTK in ELF GNU program
    properties in the x86 ELF linker.
  * Add support for GNU_PROPERTY_X86_FEATURE_1_IBT in ELF GNU program
    properties in the x86 ELF linker.
  * Support for -z ibtplt in the x86 ELF linker to generate IBT-enabled
    PLT.
  * Support for -z ibt in the x86 ELF linker to generate IBT-enabled
    PLT as well as GNU_PROPERTY_X86_FEATURE_1_IBT in ELF GNU program
    properties.
  * Add support for ELF SHF_GNU_MBIND and PT_GNU_MBIND_XXX.
  * Add support for ELF GNU program properties.
  * Add support for the Texas Instruments PRU processor.
  * When configuring for arc*-*-linux* targets the default linker emulation will
    change if --with-cpu=nps400 is used at configure time.
  * Improve assignment of LMAs to orphan sections in some edge cases where a
    mixture of both AT&gt;LMA_REGION and AT(LMA) are used.
  * Orphan sections placed after an empty section that has an AT(LMA) will now
    take an load memory address starting from LMA.
  * Section groups can now be resolved (the group deleted and the group members
    placed like normal sections) at partial link time either using the new
    linker option --force-group-allocation or by placing FORCE_GROUP_ALLOCATION
    into the linker script.

- Add riscv64 target, tested with gcc7 and downstream newlib 2.4.0
- Prepare riscv32 target (gh#riscv/riscv-newlib#8)
- Make compressed debug section handling explicit, disable for
  old products and enable for gas on all architectures otherwise. [bsc#1029995]
- Remove empty rpath component removal optimization from to workaround
  CMake rpath handling.  [bsc#1025282]


  Minor security bugs fixed:
  PR 21147, PR 21148, PR 21149, PR 21150, PR 21151, PR 21155, PR 21158, PR 21159

- Update to binutils 2.28.

  * Add support for locating separate debug info files using the build-id
    method, where the separate file has a name based upon the build-id of
    the original file.
  * This version of binutils fixes a problem with PowerPC VLE 16A and 16D
    relocations which were functionally swapped, for example,
    R_PPC_VLE_HA16A performed like R_PPC_VLE_HA16D while R_PPC_VLE_HA16D
    performed like R_PPC_VLE_HA16A.  This could have been fixed by
    renumbering relocations, which would keep object files created by an
    older version of gas compatible with a newer ld.  However, that would
    require an ABI update, affecting other assemblers and linkers that
    create and process the relocations correctly.  It is recommended that
    all VLE object files be recompiled, but ld can modify the relocations
    if --vle-reloc-fixup is passed to ld.  If the new ld command line
    option is not used, ld will ld warn on finding relocations inconsistent
    with the instructions being relocated.
  * The nm program has a new command line option (--with-version-strings)
    which will display a symbol's version information, if any, after the
    symbol's name.
  * The ARC port of objdump now accepts a -M option to specify the extra
    instruction class(es) that should be disassembled.
  * The --remove-section option for objcopy and strip now accepts section
    patterns starting with an exclamation point to indicate a non-matching
    section.  A non-matching section is removed from the set of sections
    matched by an earlier --remove-section pattern.
  * The --only-section option for objcopy now accepts section patterns
    starting with an exclamation point to indicate a non-matching section.
    A non-matching section is removed from the set of sections matched by
    an earlier --only-section pattern.
  * New --remove-relocations=SECTIONPATTERN option for objcopy and strip.
    This option can be used to remove sections containing relocations.
    The SECTIONPATTERN is the section to which the relocations apply, not
    the relocation section itself.

- GAS specific:

  * Add support for the RISC-V architecture.
  * Add support for the ARM Cortex-M23 and Cortex-M33 processors.

- GNU ld specific:

  * The EXCLUDE_FILE linker script construct can now be applied outside of the
    section list in order for the exclusions to apply over all input sections
    in the list.
  * Add support for the RISC-V architecture.
  * The command line option --no-eh-frame-hdr can now be used in ELF based
    linkers to disable the automatic generation of .eh_frame_hdr sections.
  * Add --in-implib=&lt;infile&gt; to the ARM linker to enable specifying a set of
    Secure Gateway veneers that must exist in the output import library
    specified by --out-implib=&lt;outfile&gt; and the address they must have.
    As such, --in-implib is only supported in combination with --cmse-implib.
  * Extended the --out-implib=&lt;file&gt; option, previously restricted to x86 PE
    targets, to any ELF based target.  This allows the generation of an import
    library for an ELF executable, which can then be used by another application
    to link against the executable.

- GOLD specific:

  * Add -z bndplt option (x86-64 only) to support Intel MPX.
  * Add --orphan-handling option.
  * Add --stub-group-multi option (PowerPC only).
  * Add --target1-rel, --target1-abs, --target2 options (Arm only).
  * Add -z stack-size option.
  * Add --be8 option (Arm only).
  * Add HIDDEN support in linker scripts.
  * Add SORT_BY_INIT_PRIORITY support in linker scripts.

- Other fixes:

  * Fix section alignment on .gnu_debuglink. [bso#21193]
  * Add s390x to gold_archs.
  * Fix alignment frags for aarch64 (bsc#1003846)
  * Call ldconfig for libbfd
  * Fix an assembler problem with clang on ARM.
  * Restore monotonically increasing section offsets.


- Update to binutils 2.27.

  * Add a configure option, --enable-64-bit-archive, to force use of a
    64-bit format when creating an archive symbol index.
  * Add --elf-stt-common= option to objcopy for ELF targets to control
    whether to convert common symbols to the STT_COMMON type.

- GAS specific:

  * Default to --enable-compressed-debug-sections=gas for Linux/x86 targets.
  * Add --no-pad-sections to stop the assembler from padding the end of output
    sections up to their alignment boundary.
  * Support for the ARMv8-M architecture has been added to the ARM port.
    Support for the ARMv8-M Security and DSP Extensions has also been added
    to the ARM port.
  * ARC backend accepts .extInstruction, .extCondCode, .extAuxRegister, and
    .extCoreRegister pseudo-ops that allow an user to define custom
    instructions, conditional codes, auxiliary and core registers.
  * Add a configure option --enable-elf-stt-common to decide whether ELF
    assembler should generate common symbols with the STT_COMMON type by
    default.  Default to no.
  * New command line option --elf-stt-common= for ELF targets to control
    whether to generate common symbols with the STT_COMMON type.
  * Add ability to set section flags and types via numeric values for ELF
    based targets.
  * Add a configure option --enable-x86-relax-relocations to decide whether
    x86 assembler should generate relax relocations by default.  Default to
    yes, except for x86 Solaris targets older than Solaris 12.
  * New command line option -mrelax-relocations= for x86 target to control
    whether to generate relax relocations.
  * New command line option -mfence-as-lock-add=yes for x86 target to encode
    lfence, mfence and sfence as 'lock addl $0x0, (%[re]sp)'.
  * Add assembly-time relaxation option for ARC cpus.
  * Add --with-cpu=TYPE configure option for ARC gas.  This allows the default
    cpu type to be adjusted at configure time.

- GOLD specific:

  * Add a configure option --enable-relro to decide whether -z relro should
    be enabled by default.  Default to yes.
  * Add support for s390, MIPS, AArch64, and TILE-Gx architectures.
  * Add support for STT_GNU_IFUNC symbols.
  * Add support for incremental linking (--incremental).

- GNU ld specific:

  * Add a configure option --enable-relro to decide whether -z relro should
    be enabled in ELF linker by default.  Default to yes for all Linux
    targets except FRV, HPPA, IA64 and MIPS.
  * Support for -z noreloc-overflow in the x86-64 ELF linker to disable
    relocation overflow check.
  * Add -z common/-z nocommon options for ELF targets to control whether to
    convert common symbols to the STT_COMMON type during a relocatable link.
  * Support for -z nodynamic-undefined-weak in the x86 ELF linker, which
    avoids dynamic relocations against undefined weak symbols in executable.
  * The NOCROSSREFSTO command was added to the linker script language.
  * Add --no-apply-dynamic-relocs to the AArch64 linker to do not apply
    link-time values for dynamic relocations.

		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-30"/>
	<updated date="2017-11-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003846">SUSE bug 1003846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025282">SUSE bug 1025282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029907">SUSE bug 1029907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029908">SUSE bug 1029908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029909">SUSE bug 1029909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029995">SUSE bug 1029995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030297">SUSE bug 1030297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030298">SUSE bug 1030298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030583">SUSE bug 1030583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030584">SUSE bug 1030584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030585">SUSE bug 1030585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030588">SUSE bug 1030588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030589">SUSE bug 1030589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031590">SUSE bug 1031590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031593">SUSE bug 1031593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031595">SUSE bug 1031595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031638">SUSE bug 1031638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031644">SUSE bug 1031644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031656">SUSE bug 1031656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033122">SUSE bug 1033122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037052">SUSE bug 1037052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037057">SUSE bug 1037057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037061">SUSE bug 1037061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037062">SUSE bug 1037062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037066">SUSE bug 1037066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037070">SUSE bug 1037070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037072">SUSE bug 1037072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037273">SUSE bug 1037273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038874">SUSE bug 1038874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038875">SUSE bug 1038875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038876">SUSE bug 1038876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038877">SUSE bug 1038877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038878">SUSE bug 1038878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038880">SUSE bug 1038880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038881">SUSE bug 1038881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044891">SUSE bug 1044891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044897">SUSE bug 1044897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044901">SUSE bug 1044901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044909">SUSE bug 1044909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044925">SUSE bug 1044925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044927">SUSE bug 1044927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046094">SUSE bug 1046094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052061">SUSE bug 1052061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052496">SUSE bug 1052496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052503">SUSE bug 1052503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052507">SUSE bug 1052507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052509">SUSE bug 1052509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052511">SUSE bug 1052511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052514">SUSE bug 1052514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052518">SUSE bug 1052518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053347">SUSE bug 1053347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056312">SUSE bug 1056312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056437">SUSE bug 1056437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057139">SUSE bug 1057139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057144">SUSE bug 1057144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057149">SUSE bug 1057149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058480">SUSE bug 1058480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059050">SUSE bug 1059050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060599">SUSE bug 1060599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060621">SUSE bug 1060621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061241">SUSE bug 1061241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/437293">SUSE bug 437293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/445037">SUSE bug 445037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/546106">SUSE bug 546106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/561142">SUSE bug 561142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/578249">SUSE bug 578249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/590820">SUSE bug 590820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/691290">SUSE bug 691290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698346">SUSE bug 698346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/713504">SUSE bug 713504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/776968">SUSE bug 776968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863764">SUSE bug 863764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938658">SUSE bug 938658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970239">SUSE bug 970239</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9939/">CVE-2014-9939</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12448/">CVE-2017-12448</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12450/">CVE-2017-12450</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12452/">CVE-2017-12452</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12453/">CVE-2017-12453</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12454/">CVE-2017-12454</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12456/">CVE-2017-12456</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12799/">CVE-2017-12799</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13757/">CVE-2017-13757</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14128/">CVE-2017-14128</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14129/">CVE-2017-14129</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14130/">CVE-2017-14130</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14333/">CVE-2017-14333</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14529/">CVE-2017-14529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14729/">CVE-2017-14729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14745/">CVE-2017-14745</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14974/">CVE-2017-14974</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6965/">CVE-2017-6965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-6966/">CVE-2017-6966</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6969/">CVE-2017-6969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7209/">CVE-2017-7209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7210/">CVE-2017-7210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7223/">CVE-2017-7223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7224/">CVE-2017-7224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7225/">CVE-2017-7225</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7226/">CVE-2017-7226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7227/">CVE-2017-7227</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7299/">CVE-2017-7299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7300/">CVE-2017-7300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7301/">CVE-2017-7301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7302/">CVE-2017-7302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7303/">CVE-2017-7303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7304/">CVE-2017-7304</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7614/">CVE-2017-7614</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8392/">CVE-2017-8392</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8393/">CVE-2017-8393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8394/">CVE-2017-8394</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8395/">CVE-2017-8395</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8396/">CVE-2017-8396</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8397/">CVE-2017-8397</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8398/">CVE-2017-8398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8421/">CVE-2017-8421</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9038/">CVE-2017-9038</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9039/">CVE-2017-9039</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9040/">CVE-2017-9040</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9041/">CVE-2017-9041</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9042/">CVE-2017-9042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9043/">CVE-2017-9043</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9044/">CVE-2017-9044</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9746/">CVE-2017-9746</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9747/">CVE-2017-9747</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9748/">CVE-2017-9748</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9750/">CVE-2017-9750</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9755/">CVE-2017-9755</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9756/">CVE-2017-9756</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-9954/">CVE-2017-9954</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9955/">CVE-2017-9955</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518377" comment="binutils-2.29.1-9.20.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78254" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1068101" ref_url="https://bugzilla.suse.com/1068101" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7826" ref_url="https://www.suse.com/security/cve/CVE-2017-7826/" source="CVE"/>
		<reference ref_id="CVE-2017-7828" ref_url="https://www.suse.com/security/cve/CVE-2017-7828/" source="CVE"/>
		<reference ref_id="CVE-2017-7830" ref_url="https://www.suse.com/security/cve/CVE-2017-7830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00007.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox ESR 52.5 fixes the following issues:

Security issues fixed:
- CVE-2017-7826: Memory safety bugs fixed (bsc#1068101).
- CVE-2017-7828: Use-after-free of PressShell while restyling layout (bsc#1068101).
- CVE-2017-7830: Cross-origin URL information leak through Resource Timing API (bsc#1068101).

Mozilla Foundation Security Advisory (MFSA 2017-25):
- https://www.mozilla.org/en-US/security/advisories/mfsa2017-25/
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-05"/>
	<updated date="2017-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068101">SUSE bug 1068101</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7826/">CVE-2017-7826</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7828/">CVE-2017-7828</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7830/">CVE-2017-7830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518381" comment="MozillaFirefox-52.5.0esr-109.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518382" comment="MozillaFirefox-translations-52.5.0esr-109.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78255" version="1" class="patch">
	<metadata>
		<title>Security update for libXcursor (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1065386" ref_url="https://bugzilla.suse.com/1065386" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16612" ref_url="https://www.suse.com/security/cve/CVE-2017-16612/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003472.html" source="SUSE-SU"/>
		<description>
This update for libXcursor fixes the following issues:

Security issue fixed:

- CVE-2017-16612: Fix integeroverflow while parsing images and a signedness issue while parsing comments (bsc#1065386).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-05"/>
	<updated date="2017-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1065386">SUSE bug 1065386</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16612/">CVE-2017-16612</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518387" comment="libXcursor1-1.1.14-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518388" comment="libXcursor1-32bit-1.1.14-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78256" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1069496" ref_url="https://bugzilla.suse.com/1069496" source="BUGZILLA"/>
		<reference ref_id="1069702" ref_url="https://bugzilla.suse.com/1069702" source="BUGZILLA"/>
		<reference ref_id="1070805" ref_url="https://bugzilla.suse.com/1070805" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000405" ref_url="https://www.suse.com/security/cve/CVE-2017-1000405/" source="CVE"/>
		<reference ref_id="CVE-2017-16939" ref_url="https://www.suse.com/security/cve/CVE-2017-16939/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00011.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-1000405: A bug in the THP CoW support could be used by local attackers to corrupt memory of other processes and cause them to crash (bnc#1069496).
- CVE-2017-16939: The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages (bnc#1069702).

The following non-security bugs were fixed:

Fix a build issue on ppc64le systems (bsc#1070805)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-06"/>
	<updated date="2017-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1069496">SUSE bug 1069496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069702">SUSE bug 1069702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070805">SUSE bug 1070805</bugzilla>
	<cve impact="important" cvss3="5.7/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000405/">CVE-2017-1000405</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16939/">CVE-2017-16939</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519630" comment="kernel-default-4.4.92-6.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519631" comment="kernel-default-devel-4.4.92-6.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519632" comment="kernel-default-extra-4.4.92-6.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519633" comment="kernel-devel-4.4.92-6.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519634" comment="kernel-macros-4.4.92-6.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519635" comment="kernel-source-4.4.92-6.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519636" comment="kernel-syms-4.4.92-6.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78257" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1006166" ref_url="https://bugzilla.suse.com/1006166" source="BUGZILLA"/>
		<reference ref_id="1048367" ref_url="https://bugzilla.suse.com/1048367" source="BUGZILLA"/>
		<reference ref_id="1065000" ref_url="https://bugzilla.suse.com/1065000" source="BUGZILLA"/>
		<reference ref_id="1068310" ref_url="https://bugzilla.suse.com/1068310" source="BUGZILLA"/>
		<reference ref_id="1069509" ref_url="https://bugzilla.suse.com/1069509" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-1483" ref_url="https://www.suse.com/security/cve/CVE-2008-1483/" source="CVE"/>
		<reference ref_id="CVE-2017-15906" ref_url="https://www.suse.com/security/cve/CVE-2017-15906/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003476.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Security issue fixed:

- CVE-2017-15906: Stricter checking of operations in read-only mode in sftp server (bsc#1065000).

Bug fixes:

- FIPS: Startup selfchecks (bsc#1068310).
- FIPS: Silent complaints about unsupported key exchange methods (bsc#1006166).
- Refine handling of sockets for X11 forwarding to remove reintroduced CVE-2008-1483 (bsc#1069509).
- Test configuration before running daemon to prevent looping resulting in service shutdown (bsc#1048367)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-07"/>
	<updated date="2017-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1006166">SUSE bug 1006166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048367">SUSE bug 1048367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065000">SUSE bug 1065000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068310">SUSE bug 1068310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069509">SUSE bug 1069509</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2008-1483/">CVE-2008-1483</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15906/">CVE-2017-15906</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518396" comment="openssh-7.2p2-74.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518397" comment="openssh-askpass-gnome-7.2p2-74.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518398" comment="openssh-helpers-7.2p2-74.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78258" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1071905" ref_url="https://bugzilla.suse.com/1071905" source="BUGZILLA"/>
		<reference ref_id="1071906" ref_url="https://bugzilla.suse.com/1071906" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3737" ref_url="https://www.suse.com/security/cve/CVE-2017-3737/" source="CVE"/>
		<reference ref_id="CVE-2017-3738" ref_url="https://www.suse.com/security/cve/CVE-2017-3738/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00074.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- OpenSSL Security Advisory [07 Dec 2017]
  * CVE-2017-3737: OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an \'error state\' mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer. In order to exploit this issue an application bug would have to be present that resulted in a call to SSL_read()/SSL_write() being issued after having already received a fatal error. OpenSSL version 1.0.2b-1.0.2m are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is not affected. (bsc#1071905)
  * CVE-2017-3738: There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. (bsc#1071906)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-16"/>
	<updated date="2017-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1071905">SUSE bug 1071905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071906">SUSE bug 1071906</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3737/">CVE-2017-3737</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3738/">CVE-2017-3738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518399" comment="libopenssl-devel-1.0.2j-60.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518400" comment="libopenssl1_0_0-1.0.2j-60.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518401" comment="libopenssl1_0_0-32bit-1.0.2j-60.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518402" comment="openssl-1.0.2j-60.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78259" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1048457" ref_url="https://bugzilla.suse.com/1048457" source="BUGZILLA"/>
		<reference ref_id="1049796" ref_url="https://bugzilla.suse.com/1049796" source="BUGZILLA"/>
		<reference ref_id="1050083" ref_url="https://bugzilla.suse.com/1050083" source="BUGZILLA"/>
		<reference ref_id="1050116" ref_url="https://bugzilla.suse.com/1050116" source="BUGZILLA"/>
		<reference ref_id="1050139" ref_url="https://bugzilla.suse.com/1050139" source="BUGZILLA"/>
		<reference ref_id="1050632" ref_url="https://bugzilla.suse.com/1050632" source="BUGZILLA"/>
		<reference ref_id="1051441" ref_url="https://bugzilla.suse.com/1051441" source="BUGZILLA"/>
		<reference ref_id="1051847" ref_url="https://bugzilla.suse.com/1051847" source="BUGZILLA"/>
		<reference ref_id="1052450" ref_url="https://bugzilla.suse.com/1052450" source="BUGZILLA"/>
		<reference ref_id="1052553" ref_url="https://bugzilla.suse.com/1052553" source="BUGZILLA"/>
		<reference ref_id="1052689" ref_url="https://bugzilla.suse.com/1052689" source="BUGZILLA"/>
		<reference ref_id="1052744" ref_url="https://bugzilla.suse.com/1052744" source="BUGZILLA"/>
		<reference ref_id="1052758" ref_url="https://bugzilla.suse.com/1052758" source="BUGZILLA"/>
		<reference ref_id="1052764" ref_url="https://bugzilla.suse.com/1052764" source="BUGZILLA"/>
		<reference ref_id="1054757" ref_url="https://bugzilla.suse.com/1054757" source="BUGZILLA"/>
		<reference ref_id="1055214" ref_url="https://bugzilla.suse.com/1055214" source="BUGZILLA"/>
		<reference ref_id="1056432" ref_url="https://bugzilla.suse.com/1056432" source="BUGZILLA"/>
		<reference ref_id="1057157" ref_url="https://bugzilla.suse.com/1057157" source="BUGZILLA"/>
		<reference ref_id="1057719" ref_url="https://bugzilla.suse.com/1057719" source="BUGZILLA"/>
		<reference ref_id="1057729" ref_url="https://bugzilla.suse.com/1057729" source="BUGZILLA"/>
		<reference ref_id="1057730" ref_url="https://bugzilla.suse.com/1057730" source="BUGZILLA"/>
		<reference ref_id="1058485" ref_url="https://bugzilla.suse.com/1058485" source="BUGZILLA"/>
		<reference ref_id="1058637" ref_url="https://bugzilla.suse.com/1058637" source="BUGZILLA"/>
		<reference ref_id="1059666" ref_url="https://bugzilla.suse.com/1059666" source="BUGZILLA"/>
		<reference ref_id="1059778" ref_url="https://bugzilla.suse.com/1059778" source="BUGZILLA"/>
		<reference ref_id="1060176" ref_url="https://bugzilla.suse.com/1060176" source="BUGZILLA"/>
		<reference ref_id="1060577" ref_url="https://bugzilla.suse.com/1060577" source="BUGZILLA"/>
		<reference ref_id="1061254" ref_url="https://bugzilla.suse.com/1061254" source="BUGZILLA"/>
		<reference ref_id="1062750" ref_url="https://bugzilla.suse.com/1062750" source="BUGZILLA"/>
		<reference ref_id="1066003" ref_url="https://bugzilla.suse.com/1066003" source="BUGZILLA"/>
		<reference ref_id="1067181" ref_url="https://bugzilla.suse.com/1067181" source="BUGZILLA"/>
		<reference ref_id="1067184" ref_url="https://bugzilla.suse.com/1067184" source="BUGZILLA"/>
		<reference ref_id="1067409" ref_url="https://bugzilla.suse.com/1067409" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11188" ref_url="https://www.suse.com/security/cve/CVE-2017-11188/" source="CVE"/>
		<reference ref_id="CVE-2017-11478" ref_url="https://www.suse.com/security/cve/CVE-2017-11478/" source="CVE"/>
		<reference ref_id="CVE-2017-11523" ref_url="https://www.suse.com/security/cve/CVE-2017-11523/" source="CVE"/>
		<reference ref_id="CVE-2017-11527" ref_url="https://www.suse.com/security/cve/CVE-2017-11527/" source="CVE"/>
		<reference ref_id="CVE-2017-11535" ref_url="https://www.suse.com/security/cve/CVE-2017-11535/" source="CVE"/>
		<reference ref_id="CVE-2017-11640" ref_url="https://www.suse.com/security/cve/CVE-2017-11640/" source="CVE"/>
		<reference ref_id="CVE-2017-11752" ref_url="https://www.suse.com/security/cve/CVE-2017-11752/" source="CVE"/>
		<reference ref_id="CVE-2017-12140" ref_url="https://www.suse.com/security/cve/CVE-2017-12140/" source="CVE"/>
		<reference ref_id="CVE-2017-12435" ref_url="https://www.suse.com/security/cve/CVE-2017-12435/" source="CVE"/>
		<reference ref_id="CVE-2017-12587" ref_url="https://www.suse.com/security/cve/CVE-2017-12587/" source="CVE"/>
		<reference ref_id="CVE-2017-12644" ref_url="https://www.suse.com/security/cve/CVE-2017-12644/" source="CVE"/>
		<reference ref_id="CVE-2017-12662" ref_url="https://www.suse.com/security/cve/CVE-2017-12662/" source="CVE"/>
		<reference ref_id="CVE-2017-12669" ref_url="https://www.suse.com/security/cve/CVE-2017-12669/" source="CVE"/>
		<reference ref_id="CVE-2017-12983" ref_url="https://www.suse.com/security/cve/CVE-2017-12983/" source="CVE"/>
		<reference ref_id="CVE-2017-13134" ref_url="https://www.suse.com/security/cve/CVE-2017-13134/" source="CVE"/>
		<reference ref_id="CVE-2017-13769" ref_url="https://www.suse.com/security/cve/CVE-2017-13769/" source="CVE"/>
		<reference ref_id="CVE-2017-14138" ref_url="https://www.suse.com/security/cve/CVE-2017-14138/" source="CVE"/>
		<reference ref_id="CVE-2017-14172" ref_url="https://www.suse.com/security/cve/CVE-2017-14172/" source="CVE"/>
		<reference ref_id="CVE-2017-14173" ref_url="https://www.suse.com/security/cve/CVE-2017-14173/" source="CVE"/>
		<reference ref_id="CVE-2017-14175" ref_url="https://www.suse.com/security/cve/CVE-2017-14175/" source="CVE"/>
		<reference ref_id="CVE-2017-14341" ref_url="https://www.suse.com/security/cve/CVE-2017-14341/" source="CVE"/>
		<reference ref_id="CVE-2017-14342" ref_url="https://www.suse.com/security/cve/CVE-2017-14342/" source="CVE"/>
		<reference ref_id="CVE-2017-14531" ref_url="https://www.suse.com/security/cve/CVE-2017-14531/" source="CVE"/>
		<reference ref_id="CVE-2017-14607" ref_url="https://www.suse.com/security/cve/CVE-2017-14607/" source="CVE"/>
		<reference ref_id="CVE-2017-14682" ref_url="https://www.suse.com/security/cve/CVE-2017-14682/" source="CVE"/>
		<reference ref_id="CVE-2017-14733" ref_url="https://www.suse.com/security/cve/CVE-2017-14733/" source="CVE"/>
		<reference ref_id="CVE-2017-14989" ref_url="https://www.suse.com/security/cve/CVE-2017-14989/" source="CVE"/>
		<reference ref_id="CVE-2017-15217" ref_url="https://www.suse.com/security/cve/CVE-2017-15217/" source="CVE"/>
		<reference ref_id="CVE-2017-15930" ref_url="https://www.suse.com/security/cve/CVE-2017-15930/" source="CVE"/>
		<reference ref_id="CVE-2017-16545" ref_url="https://www.suse.com/security/cve/CVE-2017-16545/" source="CVE"/>
		<reference ref_id="CVE-2017-16546" ref_url="https://www.suse.com/security/cve/CVE-2017-16546/" source="CVE"/>
		<reference ref_id="CVE-2017-16669" ref_url="https://www.suse.com/security/cve/CVE-2017-16669/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

  * CVE-2017-14989: use-after-free in RenderFreetype in MagickCore/annotate.c could lead to denial of service [bsc#1061254]
  * CVE-2017-14682: GetNextToken in MagickCore/token.c heap buffer overflow could lead to denial of service [bsc#1060176]
  * Memory leak in WriteINLINEImage in coders/inline.c could lead to denial of service [bsc#1052744]
  * CVE-2017-14607: out of bounds read flaw related to ReadTIFFImagehas  could possibly disclose potentially sensitive memory [bsc#1059778]
  * CVE-2017-11640: NULL pointer deref in WritePTIFImage() in coders/tiff.c [bsc#1050632]
  * CVE-2017-14342: a memory exhaustion vulnerability in ReadWPGImage in coders/wpg.c could lead to denial of service [bsc#1058485]
  * CVE-2017-14341: Infinite loop in the ReadWPGImage function [bsc#1058637]
  * CVE-2017-16546: problem in the function ReadWPGImage in coders/wpg.c could lead to denial of service [bsc#1067181]
  * CVE-2017-16545: The ReadWPGImage function in coders/wpg.c in  validation problems could lead to denial of service [bsc#1067184]
  * CVE-2017-16669: problem in coders/wpg.c could allow remote attackers to cause a denial of service via crafted file [bsc#1067409]
  * CVE-2017-14175: Lack of End of File check could lead to denial of service [bsc#1057719]
  * CVE-2017-14138: memory leak vulnerability in ReadWEBPImage in coders/webp.c could lead to denial of service [bsc#1057157]
  * CVE-2017-13769: denial of service issue in function WriteTHUMBNAILImage in coders/thumbnail.c [bsc#1056432]
  * CVE-2017-13134: a heap-based buffer over-read was found in thefunction SFWScan in coders/sfw.c, which allows attackers to cause adenial of service via a crafted file. [bsc#1055214]
  * CVE-2017-15217: memory leak in ReadSGIImage in coders/sgi.c [bsc#1062750]
  * CVE-2017-11478: ReadOneDJVUImage in coders/djvu.c in ImageMagick allows remote attackers to cause a DoS [bsc#1049796]
  * CVE-2017-15930: Null Pointer dereference  while transfering JPEG scanlines could lead to denial of service [bsc#1066003]
  * CVE-2017-12983: Heap-based buffer overflow in the ReadSFWImage function in coders/sfw.c inImageMagick 7.0.6-8 allows remote attackers to cause a denial of service [bsc#1054757]
  * CVE-2017-14531: memory exhaustion issue in ReadSUNImage incoders/sun.c. [bsc#1059666]
  * CVE-2017-12435: Memory exhaustion in ReadSUNImage in coders/sun.c, which allows attackers to cause denial of service [bsc#1052553]
  * CVE-2017-12587: User controlable large loop in the ReadPWPImage in coders\pwp.c could lead to denial of service [bsc#1052450]
  * CVE-2017-11523: ReadTXTImage in coders/txt.c allows remote attackers to cause a denial of service [bsc#1050083]
  * CVE-2017-14173: unction ReadTXTImage is vulnerable to a integer overflow that could lead to denial of service [bsc#1057729]
  * CVE-2017-11188: ImageMagick: The ReadDPXImage function in codersdpx.c in ImageMagick 7.0.6-0 has a largeloop vulnerability that can cause CPU exhaustion via a crafted DPX file, relatedto lack of an EOF check. [bnc#1048457]
  * CVE-2017-11527: ImageMagick: ReadDPXImage in coders/dpx.c allows remote attackers to cause DoS [bnc#1050116] 
  * CVE-2017-11535: GraphicsMagick, ImageMagick: Heap-based buffer over-read in WritePSImage() in coders/ps.c [bnc#1050139]
  * CVE-2017-11752: ImageMagick: ReadMAGICKImage in coders/magick.c allows to cause DoS  [bnc#1051441] 
  * CVE-2017-12140: ImageMagick: ReadDCMImage in codersdcm.c has a ninteger signedness error leading to excessive memory consumption [bnc#1051847] 
  * CVE-2017-12669: ImageMagick: Memory leak in WriteCALSImage in coders/cals.c [bnc#1052689]
  * CVE-2017-12662: GraphicsMagick, ImageMagick: Memory leak in WritePDFImage in coders/pdf.c [bnc#1052758]
  * CVE-2017-12644: ImageMagick: Memory leak in ReadDCMImage in codersdcm.c [bnc#1052764]
  * CVE-2017-14172: ImageMagick: Lack of end of file check in ReadPSImage() could lead to a denial of service [bnc#1057730]
  * CVE-2017-14733: GraphicsMagick: Heap overflow on ReadRLEImage in coders/rle.c could lead to denial of service [bnc#1060577]

		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-20"/>
	<updated date="2017-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1048457">SUSE bug 1048457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049796">SUSE bug 1049796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050083">SUSE bug 1050083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050116">SUSE bug 1050116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050139">SUSE bug 1050139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050632">SUSE bug 1050632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051441">SUSE bug 1051441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051847">SUSE bug 1051847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052450">SUSE bug 1052450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052553">SUSE bug 1052553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052689">SUSE bug 1052689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052744">SUSE bug 1052744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052758">SUSE bug 1052758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052764">SUSE bug 1052764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054757">SUSE bug 1054757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055214">SUSE bug 1055214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056432">SUSE bug 1056432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057157">SUSE bug 1057157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057719">SUSE bug 1057719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057729">SUSE bug 1057729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057730">SUSE bug 1057730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058485">SUSE bug 1058485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058637">SUSE bug 1058637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059666">SUSE bug 1059666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059778">SUSE bug 1059778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060176">SUSE bug 1060176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060577">SUSE bug 1060577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061254">SUSE bug 1061254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062750">SUSE bug 1062750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066003">SUSE bug 1066003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067181">SUSE bug 1067181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067184">SUSE bug 1067184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067409">SUSE bug 1067409</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11188/">CVE-2017-11188</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11478/">CVE-2017-11478</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11523/">CVE-2017-11523</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11527/">CVE-2017-11527</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11535/">CVE-2017-11535</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11640/">CVE-2017-11640</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11752/">CVE-2017-11752</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12140/">CVE-2017-12140</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12435/">CVE-2017-12435</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12587/">CVE-2017-12587</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12644/">CVE-2017-12644</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12662/">CVE-2017-12662</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12669/">CVE-2017-12669</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12983/">CVE-2017-12983</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13134/">CVE-2017-13134</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13769/">CVE-2017-13769</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14138/">CVE-2017-14138</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14172/">CVE-2017-14172</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14173/">CVE-2017-14173</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14175/">CVE-2017-14175</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14341/">CVE-2017-14341</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14342/">CVE-2017-14342</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14531/">CVE-2017-14531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14607/">CVE-2017-14607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14682/">CVE-2017-14682</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14733/">CVE-2017-14733</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14989/">CVE-2017-14989</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15217/">CVE-2017-15217</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15930/">CVE-2017-15930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16545/">CVE-2017-16545</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16546/">CVE-2017-16546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16669/">CVE-2017-16669</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518403" comment="ImageMagick-6.8.8.1-71.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518404" comment="libMagick++-6_Q16-3-6.8.8.1-71.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518405" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518406" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518407" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78260" version="1" class="patch">
	<metadata>
		<title>Security update for libraw (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1060321" ref_url="https://bugzilla.suse.com/1060321" source="BUGZILLA"/>
		<reference ref_id="1063798" ref_url="https://bugzilla.suse.com/1063798" source="BUGZILLA"/>
		<reference ref_id="1072385" ref_url="https://bugzilla.suse.com/1072385" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13735" ref_url="https://www.suse.com/security/cve/CVE-2017-13735/" source="CVE"/>
		<reference ref_id="CVE-2017-14608" ref_url="https://www.suse.com/security/cve/CVE-2017-14608/" source="CVE"/>
		<reference ref_id="CVE-2017-16909" ref_url="https://www.suse.com/security/cve/CVE-2017-16909/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003548.html" source="SUSE-SU"/>
		<description>
This update for libraw fixes the following issues:

Security issues fixed:

- CVE-2017-13735: A floating point exception in kodak_radc_load_raw could be used by attackers to crash a libraw using application (bsc#1060321)
- CVE-2017-14608: An out-of-bounds read in the kodak_65000_load_raw function could be used for crashing or information leak from the libraw library (bsc#1063798)
- CVE-2017-16909: Fix heap-buffer overflow in the LibRaw::panasonic_load_raw() function (bsc#1072385).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-21"/>
	<updated date="2017-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1060321">SUSE bug 1060321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063798">SUSE bug 1063798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072385">SUSE bug 1072385</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13735/">CVE-2017-13735</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14608/">CVE-2017-14608</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-16909/">CVE-2017-16909</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518408" comment="libraw9-0.15.4-16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78261" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1067841" ref_url="https://bugzilla.suse.com/1067841" source="BUGZILLA"/>
		<reference ref_id="1067844" ref_url="https://bugzilla.suse.com/1067844" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15098" ref_url="https://www.suse.com/security/cve/CVE-2017-15098/" source="CVE"/>
		<reference ref_id="CVE-2017-15099" ref_url="https://www.suse.com/security/cve/CVE-2017-15099/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003547.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

Security issues fixed:

- CVE-2017-15098: Fix crash due to rowtype mismatch in json{b}_populate_recordset() (bsc#1067844).
- CVE-2017-15099: Ensure that INSERT ... ON CONFLICT DO UPDATE checks table permissions and RLS policies in all cases (bsc#1067841).

Bug fixes:

- Update to version 9.6.6:
  * https://www.postgresql.org/docs/9.6/static/release-9-6-6.html
  * https://www.postgresql.org/docs/9.6/static/release-9-6-5.html
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-21"/>
	<updated date="2017-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1067841">SUSE bug 1067841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067844">SUSE bug 1067844</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15098/">CVE-2017-15098</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15099/">CVE-2017-15099</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518409" comment="libecpg6-9.6.6-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518410" comment="libpq5-9.6.6-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518411" comment="libpq5-32bit-9.6.6-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518412" comment="postgresql96-9.6.6-3.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78262" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1010201" ref_url="https://bugzilla.suse.com/1010201" source="BUGZILLA"/>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1012523" ref_url="https://bugzilla.suse.com/1012523" source="BUGZILLA"/>
		<reference ref_id="1015336" ref_url="https://bugzilla.suse.com/1015336" source="BUGZILLA"/>
		<reference ref_id="1015337" ref_url="https://bugzilla.suse.com/1015337" source="BUGZILLA"/>
		<reference ref_id="1015340" ref_url="https://bugzilla.suse.com/1015340" source="BUGZILLA"/>
		<reference ref_id="1015342" ref_url="https://bugzilla.suse.com/1015342" source="BUGZILLA"/>
		<reference ref_id="1015343" ref_url="https://bugzilla.suse.com/1015343" source="BUGZILLA"/>
		<reference ref_id="1019675" ref_url="https://bugzilla.suse.com/1019675" source="BUGZILLA"/>
		<reference ref_id="1020412" ref_url="https://bugzilla.suse.com/1020412" source="BUGZILLA"/>
		<reference ref_id="1020645" ref_url="https://bugzilla.suse.com/1020645" source="BUGZILLA"/>
		<reference ref_id="1022595" ref_url="https://bugzilla.suse.com/1022595" source="BUGZILLA"/>
		<reference ref_id="1022607" ref_url="https://bugzilla.suse.com/1022607" source="BUGZILLA"/>
		<reference ref_id="1024346" ref_url="https://bugzilla.suse.com/1024346" source="BUGZILLA"/>
		<reference ref_id="1024373" ref_url="https://bugzilla.suse.com/1024373" source="BUGZILLA"/>
		<reference ref_id="1024376" ref_url="https://bugzilla.suse.com/1024376" source="BUGZILLA"/>
		<reference ref_id="1024412" ref_url="https://bugzilla.suse.com/1024412" source="BUGZILLA"/>
		<reference ref_id="1031717" ref_url="https://bugzilla.suse.com/1031717" source="BUGZILLA"/>
		<reference ref_id="1032150" ref_url="https://bugzilla.suse.com/1032150" source="BUGZILLA"/>
		<reference ref_id="1036489" ref_url="https://bugzilla.suse.com/1036489" source="BUGZILLA"/>
		<reference ref_id="1036800" ref_url="https://bugzilla.suse.com/1036800" source="BUGZILLA"/>
		<reference ref_id="1037404" ref_url="https://bugzilla.suse.com/1037404" source="BUGZILLA"/>
		<reference ref_id="1037838" ref_url="https://bugzilla.suse.com/1037838" source="BUGZILLA"/>
		<reference ref_id="1038299" ref_url="https://bugzilla.suse.com/1038299" source="BUGZILLA"/>
		<reference ref_id="1039542" ref_url="https://bugzilla.suse.com/1039542" source="BUGZILLA"/>
		<reference ref_id="1040073" ref_url="https://bugzilla.suse.com/1040073" source="BUGZILLA"/>
		<reference ref_id="1041873" ref_url="https://bugzilla.suse.com/1041873" source="BUGZILLA"/>
		<reference ref_id="1042268" ref_url="https://bugzilla.suse.com/1042268" source="BUGZILLA"/>
		<reference ref_id="1042957" ref_url="https://bugzilla.suse.com/1042957" source="BUGZILLA"/>
		<reference ref_id="1042977" ref_url="https://bugzilla.suse.com/1042977" source="BUGZILLA"/>
		<reference ref_id="1042978" ref_url="https://bugzilla.suse.com/1042978" source="BUGZILLA"/>
		<reference ref_id="1043017" ref_url="https://bugzilla.suse.com/1043017" source="BUGZILLA"/>
		<reference ref_id="1045404" ref_url="https://bugzilla.suse.com/1045404" source="BUGZILLA"/>
		<reference ref_id="1046054" ref_url="https://bugzilla.suse.com/1046054" source="BUGZILLA"/>
		<reference ref_id="1046107" ref_url="https://bugzilla.suse.com/1046107" source="BUGZILLA"/>
		<reference ref_id="1047901" ref_url="https://bugzilla.suse.com/1047901" source="BUGZILLA"/>
		<reference ref_id="1047989" ref_url="https://bugzilla.suse.com/1047989" source="BUGZILLA"/>
		<reference ref_id="1048317" ref_url="https://bugzilla.suse.com/1048317" source="BUGZILLA"/>
		<reference ref_id="1048327" ref_url="https://bugzilla.suse.com/1048327" source="BUGZILLA"/>
		<reference ref_id="1048356" ref_url="https://bugzilla.suse.com/1048356" source="BUGZILLA"/>
		<reference ref_id="1050060" ref_url="https://bugzilla.suse.com/1050060" source="BUGZILLA"/>
		<reference ref_id="1050231" ref_url="https://bugzilla.suse.com/1050231" source="BUGZILLA"/>
		<reference ref_id="1051406" ref_url="https://bugzilla.suse.com/1051406" source="BUGZILLA"/>
		<reference ref_id="1051635" ref_url="https://bugzilla.suse.com/1051635" source="BUGZILLA"/>
		<reference ref_id="1051987" ref_url="https://bugzilla.suse.com/1051987" source="BUGZILLA"/>
		<reference ref_id="1052384" ref_url="https://bugzilla.suse.com/1052384" source="BUGZILLA"/>
		<reference ref_id="1053309" ref_url="https://bugzilla.suse.com/1053309" source="BUGZILLA"/>
		<reference ref_id="1053919" ref_url="https://bugzilla.suse.com/1053919" source="BUGZILLA"/>
		<reference ref_id="1055272" ref_url="https://bugzilla.suse.com/1055272" source="BUGZILLA"/>
		<reference ref_id="1056003" ref_url="https://bugzilla.suse.com/1056003" source="BUGZILLA"/>
		<reference ref_id="1056365" ref_url="https://bugzilla.suse.com/1056365" source="BUGZILLA"/>
		<reference ref_id="1056427" ref_url="https://bugzilla.suse.com/1056427" source="BUGZILLA"/>
		<reference ref_id="1056587" ref_url="https://bugzilla.suse.com/1056587" source="BUGZILLA"/>
		<reference ref_id="1056596" ref_url="https://bugzilla.suse.com/1056596" source="BUGZILLA"/>
		<reference ref_id="1056652" ref_url="https://bugzilla.suse.com/1056652" source="BUGZILLA"/>
		<reference ref_id="1056979" ref_url="https://bugzilla.suse.com/1056979" source="BUGZILLA"/>
		<reference ref_id="1057079" ref_url="https://bugzilla.suse.com/1057079" source="BUGZILLA"/>
		<reference ref_id="1057199" ref_url="https://bugzilla.suse.com/1057199" source="BUGZILLA"/>
		<reference ref_id="1057820" ref_url="https://bugzilla.suse.com/1057820" source="BUGZILLA"/>
		<reference ref_id="1058413" ref_url="https://bugzilla.suse.com/1058413" source="BUGZILLA"/>
		<reference ref_id="1059639" ref_url="https://bugzilla.suse.com/1059639" source="BUGZILLA"/>
		<reference ref_id="1060333" ref_url="https://bugzilla.suse.com/1060333" source="BUGZILLA"/>
		<reference ref_id="1061756" ref_url="https://bugzilla.suse.com/1061756" source="BUGZILLA"/>
		<reference ref_id="1062496" ref_url="https://bugzilla.suse.com/1062496" source="BUGZILLA"/>
		<reference ref_id="1062835" ref_url="https://bugzilla.suse.com/1062835" source="BUGZILLA"/>
		<reference ref_id="1062941" ref_url="https://bugzilla.suse.com/1062941" source="BUGZILLA"/>
		<reference ref_id="1063026" ref_url="https://bugzilla.suse.com/1063026" source="BUGZILLA"/>
		<reference ref_id="1063349" ref_url="https://bugzilla.suse.com/1063349" source="BUGZILLA"/>
		<reference ref_id="1063516" ref_url="https://bugzilla.suse.com/1063516" source="BUGZILLA"/>
		<reference ref_id="1064206" ref_url="https://bugzilla.suse.com/1064206" source="BUGZILLA"/>
		<reference ref_id="1064320" ref_url="https://bugzilla.suse.com/1064320" source="BUGZILLA"/>
		<reference ref_id="1064591" ref_url="https://bugzilla.suse.com/1064591" source="BUGZILLA"/>
		<reference ref_id="1064597" ref_url="https://bugzilla.suse.com/1064597" source="BUGZILLA"/>
		<reference ref_id="1064606" ref_url="https://bugzilla.suse.com/1064606" source="BUGZILLA"/>
		<reference ref_id="1064701" ref_url="https://bugzilla.suse.com/1064701" source="BUGZILLA"/>
		<reference ref_id="1064926" ref_url="https://bugzilla.suse.com/1064926" source="BUGZILLA"/>
		<reference ref_id="1065101" ref_url="https://bugzilla.suse.com/1065101" source="BUGZILLA"/>
		<reference ref_id="1065180" ref_url="https://bugzilla.suse.com/1065180" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065639" ref_url="https://bugzilla.suse.com/1065639" source="BUGZILLA"/>
		<reference ref_id="1065692" ref_url="https://bugzilla.suse.com/1065692" source="BUGZILLA"/>
		<reference ref_id="1065717" ref_url="https://bugzilla.suse.com/1065717" source="BUGZILLA"/>
		<reference ref_id="1065866" ref_url="https://bugzilla.suse.com/1065866" source="BUGZILLA"/>
		<reference ref_id="1065959" ref_url="https://bugzilla.suse.com/1065959" source="BUGZILLA"/>
		<reference ref_id="1066045" ref_url="https://bugzilla.suse.com/1066045" source="BUGZILLA"/>
		<reference ref_id="1066175" ref_url="https://bugzilla.suse.com/1066175" source="BUGZILLA"/>
		<reference ref_id="1066192" ref_url="https://bugzilla.suse.com/1066192" source="BUGZILLA"/>
		<reference ref_id="1066213" ref_url="https://bugzilla.suse.com/1066213" source="BUGZILLA"/>
		<reference ref_id="1066223" ref_url="https://bugzilla.suse.com/1066223" source="BUGZILLA"/>
		<reference ref_id="1066285" ref_url="https://bugzilla.suse.com/1066285" source="BUGZILLA"/>
		<reference ref_id="1066382" ref_url="https://bugzilla.suse.com/1066382" source="BUGZILLA"/>
		<reference ref_id="1066470" ref_url="https://bugzilla.suse.com/1066470" source="BUGZILLA"/>
		<reference ref_id="1066471" ref_url="https://bugzilla.suse.com/1066471" source="BUGZILLA"/>
		<reference ref_id="1066472" ref_url="https://bugzilla.suse.com/1066472" source="BUGZILLA"/>
		<reference ref_id="1066573" ref_url="https://bugzilla.suse.com/1066573" source="BUGZILLA"/>
		<reference ref_id="1066606" ref_url="https://bugzilla.suse.com/1066606" source="BUGZILLA"/>
		<reference ref_id="1066629" ref_url="https://bugzilla.suse.com/1066629" source="BUGZILLA"/>
		<reference ref_id="1066660" ref_url="https://bugzilla.suse.com/1066660" source="BUGZILLA"/>
		<reference ref_id="1066696" ref_url="https://bugzilla.suse.com/1066696" source="BUGZILLA"/>
		<reference ref_id="1066767" ref_url="https://bugzilla.suse.com/1066767" source="BUGZILLA"/>
		<reference ref_id="1066812" ref_url="https://bugzilla.suse.com/1066812" source="BUGZILLA"/>
		<reference ref_id="1066974" ref_url="https://bugzilla.suse.com/1066974" source="BUGZILLA"/>
		<reference ref_id="1067105" ref_url="https://bugzilla.suse.com/1067105" source="BUGZILLA"/>
		<reference ref_id="1067132" ref_url="https://bugzilla.suse.com/1067132" source="BUGZILLA"/>
		<reference ref_id="1067225" ref_url="https://bugzilla.suse.com/1067225" source="BUGZILLA"/>
		<reference ref_id="1067494" ref_url="https://bugzilla.suse.com/1067494" source="BUGZILLA"/>
		<reference ref_id="1067734" ref_url="https://bugzilla.suse.com/1067734" source="BUGZILLA"/>
		<reference ref_id="1067735" ref_url="https://bugzilla.suse.com/1067735" source="BUGZILLA"/>
		<reference ref_id="1067888" ref_url="https://bugzilla.suse.com/1067888" source="BUGZILLA"/>
		<reference ref_id="1067906" ref_url="https://bugzilla.suse.com/1067906" source="BUGZILLA"/>
		<reference ref_id="1068671" ref_url="https://bugzilla.suse.com/1068671" source="BUGZILLA"/>
		<reference ref_id="1068978" ref_url="https://bugzilla.suse.com/1068978" source="BUGZILLA"/>
		<reference ref_id="1068980" ref_url="https://bugzilla.suse.com/1068980" source="BUGZILLA"/>
		<reference ref_id="1068982" ref_url="https://bugzilla.suse.com/1068982" source="BUGZILLA"/>
		<reference ref_id="1069152" ref_url="https://bugzilla.suse.com/1069152" source="BUGZILLA"/>
		<reference ref_id="1069250" ref_url="https://bugzilla.suse.com/1069250" source="BUGZILLA"/>
		<reference ref_id="1069270" ref_url="https://bugzilla.suse.com/1069270" source="BUGZILLA"/>
		<reference ref_id="1069277" ref_url="https://bugzilla.suse.com/1069277" source="BUGZILLA"/>
		<reference ref_id="1069484" ref_url="https://bugzilla.suse.com/1069484" source="BUGZILLA"/>
		<reference ref_id="1069583" ref_url="https://bugzilla.suse.com/1069583" source="BUGZILLA"/>
		<reference ref_id="1069721" ref_url="https://bugzilla.suse.com/1069721" source="BUGZILLA"/>
		<reference ref_id="1069793" ref_url="https://bugzilla.suse.com/1069793" source="BUGZILLA"/>
		<reference ref_id="1069879" ref_url="https://bugzilla.suse.com/1069879" source="BUGZILLA"/>
		<reference ref_id="1069916" ref_url="https://bugzilla.suse.com/1069916" source="BUGZILLA"/>
		<reference ref_id="1069942" ref_url="https://bugzilla.suse.com/1069942" source="BUGZILLA"/>
		<reference ref_id="1069996" ref_url="https://bugzilla.suse.com/1069996" source="BUGZILLA"/>
		<reference ref_id="1070001" ref_url="https://bugzilla.suse.com/1070001" source="BUGZILLA"/>
		<reference ref_id="1070006" ref_url="https://bugzilla.suse.com/1070006" source="BUGZILLA"/>
		<reference ref_id="1070145" ref_url="https://bugzilla.suse.com/1070145" source="BUGZILLA"/>
		<reference ref_id="1070169" ref_url="https://bugzilla.suse.com/1070169" source="BUGZILLA"/>
		<reference ref_id="1070404" ref_url="https://bugzilla.suse.com/1070404" source="BUGZILLA"/>
		<reference ref_id="1070535" ref_url="https://bugzilla.suse.com/1070535" source="BUGZILLA"/>
		<reference ref_id="1070767" ref_url="https://bugzilla.suse.com/1070767" source="BUGZILLA"/>
		<reference ref_id="1070771" ref_url="https://bugzilla.suse.com/1070771" source="BUGZILLA"/>
		<reference ref_id="1070805" ref_url="https://bugzilla.suse.com/1070805" source="BUGZILLA"/>
		<reference ref_id="1070825" ref_url="https://bugzilla.suse.com/1070825" source="BUGZILLA"/>
		<reference ref_id="1070964" ref_url="https://bugzilla.suse.com/1070964" source="BUGZILLA"/>
		<reference ref_id="1071693" ref_url="https://bugzilla.suse.com/1071693" source="BUGZILLA"/>
		<reference ref_id="1071694" ref_url="https://bugzilla.suse.com/1071694" source="BUGZILLA"/>
		<reference ref_id="1071695" ref_url="https://bugzilla.suse.com/1071695" source="BUGZILLA"/>
		<reference ref_id="1071833" ref_url="https://bugzilla.suse.com/1071833" source="BUGZILLA"/>
		<reference ref_id="1072589" ref_url="https://bugzilla.suse.com/1072589" source="BUGZILLA"/>
		<reference ref_id="744692" ref_url="https://bugzilla.suse.com/744692" source="BUGZILLA"/>
		<reference ref_id="789311" ref_url="https://bugzilla.suse.com/789311" source="BUGZILLA"/>
		<reference ref_id="964944" ref_url="https://bugzilla.suse.com/964944" source="BUGZILLA"/>
		<reference ref_id="966170" ref_url="https://bugzilla.suse.com/966170" source="BUGZILLA"/>
		<reference ref_id="966172" ref_url="https://bugzilla.suse.com/966172" source="BUGZILLA"/>
		<reference ref_id="969470" ref_url="https://bugzilla.suse.com/969470" source="BUGZILLA"/>
		<reference ref_id="979928" ref_url="https://bugzilla.suse.com/979928" source="BUGZILLA"/>
		<reference ref_id="989261" ref_url="https://bugzilla.suse.com/989261" source="BUGZILLA"/>
		<reference ref_id="996376" ref_url="https://bugzilla.suse.com/996376" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000410" ref_url="https://www.suse.com/security/cve/CVE-2017-1000410/" source="CVE"/>
		<reference ref_id="CVE-2017-11600" ref_url="https://www.suse.com/security/cve/CVE-2017-11600/" source="CVE"/>
		<reference ref_id="CVE-2017-12193" ref_url="https://www.suse.com/security/cve/CVE-2017-12193/" source="CVE"/>
		<reference ref_id="CVE-2017-15115" ref_url="https://www.suse.com/security/cve/CVE-2017-15115/" source="CVE"/>
		<reference ref_id="CVE-2017-16528" ref_url="https://www.suse.com/security/cve/CVE-2017-16528/" source="CVE"/>
		<reference ref_id="CVE-2017-16536" ref_url="https://www.suse.com/security/cve/CVE-2017-16536/" source="CVE"/>
		<reference ref_id="CVE-2017-16537" ref_url="https://www.suse.com/security/cve/CVE-2017-16537/" source="CVE"/>
		<reference ref_id="CVE-2017-16645" ref_url="https://www.suse.com/security/cve/CVE-2017-16645/" source="CVE"/>
		<reference ref_id="CVE-2017-16646" ref_url="https://www.suse.com/security/cve/CVE-2017-16646/" source="CVE"/>
		<reference ref_id="CVE-2017-16994" ref_url="https://www.suse.com/security/cve/CVE-2017-16994/" source="CVE"/>
		<reference ref_id="CVE-2017-17448" ref_url="https://www.suse.com/security/cve/CVE-2017-17448/" source="CVE"/>
		<reference ref_id="CVE-2017-17449" ref_url="https://www.suse.com/security/cve/CVE-2017-17449/" source="CVE"/>
		<reference ref_id="CVE-2017-17450" ref_url="https://www.suse.com/security/cve/CVE-2017-17450/" source="CVE"/>
		<reference ref_id="CVE-2017-7482" ref_url="https://www.suse.com/security/cve/CVE-2017-7482/" source="CVE"/>
		<reference ref_id="CVE-2017-8824" ref_url="https://www.suse.com/security/cve/CVE-2017-8824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00083.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.103 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-1000410: The Linux kernel was affected by an information lea that lies in the processing of incoming L2CAP commands - ConfigRequest, and ConfigResponse messages. (bnc#1070535).
- CVE-2017-11600: net/xfrm/xfrm_policy.c in the Linux kernel did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bnc#1050231).
- CVE-2017-12193: The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel mishandled node splitting, which allowed local users to cause a denial of service (NULL pointer dereference and panic) via a crafted application, as demonstrated by the keyring key type, and key addition and link creation operations (bnc#1066192).
- CVE-2017-15115: The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel did not check whether the intended netns is used in a peel-off action, which allowed local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls (bnc#1068671).
- CVE-2017-16528: sound/core/seq_device.c in the Linux kernel allowed local users to cause a denial of service (snd_rawmidi_dev_seq_free use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066629).
- CVE-2017-16536: The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066606).
- CVE-2017-16537: The imon_probe function in drivers/media/rc/imon.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066573).
- CVE-2017-16645: The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel allowed local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067132).
- CVE-2017-16646: drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel allowed local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067105).
- CVE-2017-16994: The walk_hugetlb_range function in mm/pagewalk.c in the Linux kernel mishandled holes in hugetlb ranges, which allowed local users to obtain sensitive information from uninitialized kernel memory via crafted use of the mincore() system call (bnc#1069996).
- CVE-2017-17448: net/netfilter/nfnetlink_cthelper.c in the Linux kernel did not require the CAP_NET_ADMIN capability for new, get, and del operations, which allowed local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces (bnc#1071693).
- CVE-2017-17449: The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel did not restrict observations of Netlink messages to a single net namespace, which allowed local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system (bnc#1071694).
- CVE-2017-17450: net/netfilter/xt_osf.c in the Linux kernel did not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allowed local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces (bnc#1071695).
- CVE-2017-7482: Fixed an overflow when decoding a krb5 principal. (bnc#1046107).
- CVE-2017-8824: The dccp_disconnect function in net/dccp/proto.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state (bnc#1070771).

The following non-security bugs were fixed:

- acpi / APD: Add clock frequency for ThunderX2 I2C controller (bsc#1067225).
- Add references (bsc#1062941, bsc#1037404, bsc#1012523, bsc#1038299) The scsi_devinfo patches are relevant for all bugs related to HITACHI OPEN-V:
- adm80211: return an error if adm8211_alloc_rings() fails (bsc#1031717).
- adv7604: Initialize drive strength to default when using DT (bnc#1012382).
- af_netlink: ensure that NLMSG_DONE never fails in dumps (bnc#1012382).
- alsa: caiaq: Fix stray URB at probe error path (bnc#1012382).
- alsa: hda: Abort capability probe at invalid register read (bsc#1048356).
- alsa: hda: Add Raven PCI ID (bnc#1012382).
- alsa: hda - Apply ALC269_FIXUP_NO_SHUTUP on HDA_FIXUP_ACT_PROBE (bnc#1012382).
- alsa: hda/ca0132 - Fix memory leak at error path (bsc#1031717).
- alsa: hda - fix headset mic problem for Dell machines with alc236 (bnc#1012382).
- alsa: hda - No loopback on ALC299 codec (git-fixes).
- alsa: hda/realtek: Add headset mic support for Intel NUC Skull Canyon (bsc#1031717).
- alsa: hda/realtek - Add new codec ID ALC299 (bnc#1012382).
- alsa: hda/realtek - Add support for ALC236/ALC3204 (bnc#1012382).
- alsa: hda/realtek - Fix ALC700 family no sound issue (bsc#1031717).
- alsa: hda: Remove superfluous '-' added by printk conversion (bnc#1012382).
- alsa: hda: Workaround for KBL codec power control (bsc#1048356,bsc#1047989,bsc#1055272,bsc#1058413).
- alsa: line6: Fix leftover URB at error-path during probe (bnc#1012382).
- alsa: pcm: update tstamp only if audio_tstamp changed (bsc#1031717).
- alsa: seq: Avoid invalid lockdep class warning (bsc#1031717).
- alsa: seq: Enable 'use' locking in all configurations (bnc#1012382).
- alsa: seq: Fix copy_from_user() call inside lock (bnc#1012382).
- alsa: seq: Fix nested rwsem annotation for lockdep splat (bnc#1012382).
- alsa: seq: Fix OSS sysex delivery in OSS emulation (bnc#1012382).
- alsa: timer: Add missing mutex lock for compat ioctls (bnc#1012382).
- alsa: timer: Remove kernel warning at compat ioctl error paths (bsc#1031717).
- alsa: usb-audio: Add native DSD support for Pro-Ject Pre Box S2 Digital (bnc#1012382).
- alsa: usb-audio: Add sanity checks in v2 clock parsers (bsc#1031717).
- alsa: usb-audio: Add sanity checks to FE parser (bsc#1031717).
- alsa: usb-audio: Fix potential out-of-bound access at parsing SU (bsc#1031717).
- alsa: usb-audio: Kill stray URB at exiting (bnc#1012382).
- alsa: usb-audio: uac1: Invalidate ctl on interrupt (bsc#1031717).
- alsa: vx: Do not try to update capture stream before running (bnc#1012382).
- alsa: vx: Fix possible transfer overflow (bnc#1012382).
- Apply generic ppc build fixes to vanilla (bsc#1070805)
- arm64: dts: NS2: reserve memory for Nitro firmware (bnc#1012382).
- arm64: ensure __dump_instr() checks addr_limit (bnc#1012382).
- arm: 8715/1: add a private asm/unaligned.h (bnc#1012382).
- arm: 8720/1: ensure dump_instr() checks addr_limit (bnc#1012382).
- arm: 8721/1: mm: dump: check hardware RO bit for LPAE (bnc#1012382).
- arm: 8722/1: mm: make STRICT_KERNEL_RWX effective for LPAE (bnc#1012382).
- arm: crypto: reduce priority of bit-sliced AES cipher (bnc#1012382).
- arm: dts: Fix am335x and dm814x scm syscon to probe children (bnc#1012382).
- arm: dts: Fix compatible for ti81xx uarts for 8250 (bnc#1012382).
- arm: dts: Fix omap3 off mode pull defines (bnc#1012382).
- arm: dts: mvebu: pl310-cache disable double-linefill (bnc#1012382).
- arm: OMAP2+: Fix init for multiple quirks for the same SoC (bnc#1012382).
- arm: omap2plus_defconfig: Fix probe errors on UARTs 5 and 6 (bnc#1012382).
- arm: pxa: Do not rely on public mmc header to include leds.h (bnc#1012382).
- asm/sections: add helpers to check for section data (bsc#1063026).
- asoc: adau17x1: Workaround for noise bug in ADC (bnc#1012382).
- asoc: cs42l56: Fix reset GPIO name in example DT binding (bsc#1031717).
- asoc: davinci-mcasp: Fix an error handling path in 'davinci_mcasp_probe()' (bsc#1031717).
- asoc: rsnd: do not double free kctrl (bnc#1012382).
- asoc: samsung: Fix possible double iounmap on s3c24xx driver probe failure (bsc#1031717).
- asoc: wm_adsp: Do not overrun firmware file buffer when reading region data (bnc#1012382).
- ata: ATA_BMDMA should depend on HAS_DMA (bnc#1012382).
- ata: fixes kernel crash while tracing ata_eh_link_autopsy event (bnc#1012382).
- ata: SATA_HIGHBANK should depend on HAS_DMA (bnc#1012382).
- ata: SATA_MV should depend on HAS_DMA (bnc#1012382).
- ath10k: convert warning about non-existent OTP board id to debug message (git-fixes).
- ath10k: fix a warning during channel switch with multiple vaps (bsc#1031717).
- ath10k: fix board data fetch error message (bsc#1031717).
- ath10k: fix diag_read to collect data for larger memory (bsc#1031717).
- ath10k: fix incorrect txpower set by P2P_DEVICE interface (bnc#1012382).
- ath10k: fix potential memory leak in ath10k_wmi_tlv_op_pull_fw_stats() (bnc#1012382).
- ath10k: free cached fw bin contents when get board id fails (bsc#1031717).
- ath10k: ignore configuring the incorrect board_id (bnc#1012382).
- ath10k: set CTS protection VDEV param only if VDEV is up (bnc#1012382).
- ath9k_htc: check for underflow in ath9k_htc_rx_msg() (bsc#1031717).
- ath9k: off by one in ath9k_hw_nvram_read_array() (bsc#1031717).
- autofs: do not fail mount for transient error (bsc#1065180).
- backlight: adp5520: Fix error handling in adp5520_bl_probe() (bnc#1012382).
- backlight: lcd: Fix race condition during register (bnc#1012382).
- bcache: check ca-&gt;alloc_thread initialized before wake up it (bnc#1012382).
- bio-integrity: bio_integrity_advance must update integrity seed (bsc#1046054).
- bio-integrity: bio_trim should truncate integrity vector accordingly (bsc#1046054).
- bio-integrity: Do not allocate integrity context for bio w/o data (bsc#1046054).
- bio-integrity: fix interface for bio_integrity_trim (bsc#1046054).
- bio: partially revert 'fix interface for bio_integrity_trim' (bsc#1046054).
- blacklist.conf: Add ath10k, mmc and rtl8192u commits (bsc#1031717)
- blacklist.conf: Add drm/i915 blacklist (bsc#1031717)
- blacklist.conf: added misc commits (bsc#1031717)
- blacklist.conf: Add misc entries (bsc#1031717)
- blacklist.conf: Add non-applicable commit ID (bsc#1066812)
- blacklist.conf: Add non-applicable commits (bsc#1066812)
- blacklist.conf: blacklisted 16af97dc5a89 (bnc#1053919)
- blacklist.conf: Blacklist two commits (bbb3be170ac2 and ccf1e0045eea).
- blacklist.conf: Update blacklist (bsc#1031717)
- blacklist.conf: Update iwlwifi blacklist (bsc#1031717)
- blacklist.conf: yet another serial entry (bsc#1031717)
- block: Fix a race between blk_cleanup_queue() and timeout handling (FATE#319965, bsc#964944).
- block: Make q_usage_counter also track legacy requests (bsc#1057820).
- bluetooth: btusb: fix QCA Rome suspend/resume (bnc#1012382).
- bnxt_en: Do not use rtnl lock to protect link change logic in workqueue (bsc#1020412 FATE#321671).
- bnxt_en: Fix a variable scoping in bnxt_hwrm_do_send_msg() (bsc#1053309).
- bnxt_en: Fix possible corrupted NVRAM parameters from firmware response (bsc#1020412 FATE#321671).
- bnxt_en: Fix possible corruption in DCB parameters from firmware (bsc#1020412 FATE#321671).
- bnxt_en: Fix VF PCIe link speed and width logic (bsc#1020412 FATE#321671).
- bnxt_en: Need to unconditionally shut down RoCE in bnxt_shutdown (bsc#1053309).
- bnxt_re: Make room for mapping beyond 32 entries (bsc#1056596).
- bonding: discard lowest hash bit for 802.3ad layer3+4 (bnc#1012382).
- bpf: one perf event close won't free bpf program attached by another perf event (bnc#1012382).
- bpf/verifier: reject BPF_ALU64|BPF_END (bnc#1012382).
- brcmfmac: add length check in brcmf_cfg80211_escan_handler() (bnc#1012382).
- brcmfmac: remove setting IBSS mode when stopping AP (bnc#1012382).
- brcmsmac: make some local variables 'static const' to reduce stack size (bnc#1012382).
- bt8xx: fix memory leak (bnc#1012382).
- btrfs: return the actual error value from from btrfs_uuid_tree_iterate (bnc#1012382).
- bus: mbus: fix window size calculation for 4GB windows (bnc#1012382).
- can: c_can: do not indicate triple sampling support for D_CAN (bnc#1012382).
- can: esd_usb2: Fix can_dlc value for received RTR, frames (bnc#1012382).
- can: gs_usb: fix busy loop if no more TX context is available (bnc#1012382).
- can: kvaser_usb: Correct return value in printout (bnc#1012382).
- can: kvaser_usb: Ignore CMD_FLUSH_QUEUE_REPLY messages (bnc#1012382).
- can: sun4i: fix loopback mode (bnc#1012382).
- can: sun4i: handle overrun in RX FIFO (bnc#1012382).
- cdc_ncm: Set NTB format again after altsetting switch for Huawei devices (bnc#1012382).
- ceph: clean up unsafe d_parent accesses in build_dentry_path (FATE#322288 bnc#1012382).
- ceph: disable cached readdir after dropping positive dentry (bsc#1069277).
- ceph: -EINVAL on decoding failure in ceph_mdsc_handle_fsmap() (bsc#1069277).
- ceph: present consistent fsid, regardless of arch endianness (bsc#1069277).
- ceph: unlock dangling spinlock in try_flush_caps() (bsc#1065639).
- cgroup, net_cls: iterate the fds of only the tasks which are being migrated (bnc#1064926).
- cifs: check MaxPathNameComponentLength != 0 before using it (bnc#1012382).
- cifs: fix circular locking dependency (bsc#1064701).
- cifs: Reconnect expired SMB sessions (bnc#1012382).
- clk: ti: dra7-atl-clock: fix child-node lookups (bnc#1012382).
- clk: ti: dra7-atl-clock: Fix of_node reference counting (bnc#1012382).
- clockevents/drivers/cs5535: Improve resilience to spurious interrupts (bnc#1012382).
- cma: fix calculation of aligned offset (VM Functionality, bsc#1050060).
- coda: fix 'kernel memory exposure attempt' in fsync (bnc#1012382).
- cpufreq: CPPC: add acpi_PROCESSOR dependency (bnc#1012382).
- crypto: dh - Do not permit 'key' or 'g' size longer than 'p' (bsc#1048317).
- crypto: dh - Do not permit 'p' to be 0 (bsc#1048317).
- crypto: dh - Fix double free of ctx-&gt;p (bsc#1048317).
- crypto: dh - fix memleak in setkey (bsc#1048317).
- crypto: rsa - fix buffer overread when stripping leading zeroes (bsc#1048317).
- crypto: shash - Fix zero-length shash ahash digest crash (bnc#1012382).
- crypto: vmx - disable preemption to enable vsx in aes_ctr.c (bnc#1012382).
- crypto: x86/sha1-mb - fix panic due to unaligned access (bnc#1012382).
- crypto: xts - Add ECB dependency (bnc#1012382).
- cx231xx: Fix I2C on Internal Master 3 Bus (bnc#1012382).
- cxgb4: Fix error codes in c4iw_create_cq() (bsc#1048327).
- cxl: Fix DAR check &amp; use REGION_ID instead of opencoding (bsc#1066223).
- cxl: Fix leaking pid refs in some error paths (bsc#1066223).
- cxl: Force context lock during EEH flow (bsc#1066223).
- cxl: Prevent adapter reset if an active context exists (bsc#1066223).
- cxl: Route eeh events to all drivers in cxl_pci_error_detected() (bsc#1066223).
- direct-io: Prevent NULL pointer access in submit_page_section (bnc#1012382).
- Disable IPMI fix patches due to regression (bsc#1071833)
- Disable patches.kernel.org/4.4.93-022-fix-unbalanced-page-refcounting-in-bio_map_use.patch (bsc#1070767)
- dmaengine: dmatest: warn user when dma test times out (bnc#1012382).
- dmaengine: edma: Align the memcpy acnt array size with the transfer (bnc#1012382).
- dmaengine: zx: set DMA_CYCLIC cap_mask bit (bnc#1012382).
- dm bufio: fix integer overflow when limiting maximum cache size (bnc#1012382).
- dm: fix race between dm_get_from_kobject() and __dm_destroy() (bnc#1012382).
- dm mpath: remove annoying message of 'blk_get_request() returned -11' (bsc#1066812).
- dm raid: fix NULL pointer dereference for raid1 without bitmap (bsc#1042957, FATE#321488).
- dm rq: Avoid that request processing stalls sporadically (bsc#1042978).
- drivers: base: cacheinfo: fix x86 with CONFIG_OF enabled (bsc#1070001).
- drivers: dma-mapping: Do not leave an invalid area-&gt;pages pointer in dma_common_contiguous_remap() (Git-fixes, bsc#1065692).
- drivers/fbdev/efifb: Allow BAR to be moved instead of claiming it (bsc#1051987).
- drivers: of: Fix of_pci.h header guard (bsc#1065959).
- drm/amdgpu: when dpm disabled, also need to stop/start vce (bnc#1012382).
- drm/amdkfd: NULL dereference involving create_process() (bsc#1031717).
- drm: Apply range restriction after color adjustment when allocation (bnc#1012382).
- drm/armada: Fix compile fail (bnc#1012382).
- drm: drm_minor_register(): Clean up debugfs on failure (bnc#1012382).
- drm: gma500: fix logic error (bsc#1031717).
- drm/i915/bxt: set min brightness from VBT (bsc#1031717).
- drm/i915: Do not try indexed reads to alternate slave addresses (bsc#1031717).
- drm/i915: fix backlight invert for non-zero minimum brightness (bsc#1031717).
- drm/i915: Prevent zero length 'index' write (bsc#1031717).
- drm/i915: Read timings from the correct transcoder in intel_crtc_mode_get() (bsc#1031717).
- drm/msm: fix an integer overflow test (bnc#1012382).
- drm/msm: Fix potential buffer overflow issue (bnc#1012382).
- drm/nouveau/bsp/g92: disable by default (bnc#1012382).
- drm/nouveau/gr: fallback to legacy paths during firmware lookup (bsc#1031717).
- drm/nouveau/mmu: flush tlbs before deleting page tables (bnc#1012382).
- drm/omap: Fix error handling path in 'omap_dmm_probe()' (bsc#1031717).
- drm/panel: simple: Add missing panel_simple_unprepare() calls (bsc#1031717).
- drm/radeon: Avoid double gpu reset by adding a timeout on IB ring tests (bsc#1066175).
- drm/sti: sti_vtg: Handle return NULL error from devm_ioremap_nocache (bnc#1012382).
- drm/vc4: Fix leak of HDMI EDID (bsc#1031717).
- drm/vmwgfx: Fix Ubuntu 17.10 Wayland black screen issue (bnc#1012382).
- Drop obsolete patch (bsc#1067734)
- e1000e: Avoid receiver overrun interrupt bursts (bsc#969470 FATE#319819).
- e1000e: Fix error path in link detection (bnc#1012382).
- e1000e: Fix return value test (bnc#1012382).
- e1000e: Separate signaling for link check/link up (bnc#1012382).
- ecryptfs: fix dereference of NULL user_key_payload (bnc#1012382).
- eCryptfs: use after free in ecryptfs_release_messaging() (bsc#1070404).
- epoll: avoid calling ep_call_nested() from ep_poll_safewake() (bsc#1056427).
- epoll: remove ep_call_nested() from ep_eventpoll_poll() (bsc#1056427).
- ext4: cleanup goto next group (bsc#1066285).
- ext4: do not use stripe_width if it is not set (bnc#1012382).
- ext4: fix fault handling when mounted with -o dax,ro (bsc#1069484).
- ext4: fix interaction between i_size, fallocate, and delalloc after a crash (bnc#1012382).
- ext4: fix stripe-unaligned allocations (bnc#1012382).
- ext4: in ext4_seek_{hole,data}, return -ENXIO for negative offsets (bnc#1012382).
- ext4: prevent data corruption with inline data + DAX (bsc#1064591).
- ext4: prevent data corruption with journaling + DAX (bsc#1064591).
- ext4: reduce lock contention in __ext4_new_inode (bsc#1066285).
- extcon: palmas: Check the parent instance to prevent the NULL (bnc#1012382).
- exynos4-is: fimc-is: Unmap region obtained by of_iomap() (bnc#1012382).
- f2fs crypto: add missing locking for keyring_key access (bnc#1012382).
- f2fs crypto: replace some BUG_ON()'s with error checks (bnc#1012382).
- f2fs: do not wait for writeback in write_begin (bnc#1012382).
- fealnx: Fix building error on MIPS (bnc#1012382).
- fix a page leak in vhost_scsi_iov_to_sgl() error recovery (bnc#1012382).
- Fix tracing sample code warning (bnc#1012382).
- fix unbalanced page refcounting in bio_map_user_iov (bnc#1012382).
- Fixup patches.fixes/block-Make-q_usage_counter-also-track-legacy-request.patch. (bsc#1062496)
- fm10k: Use smp_rmb rather than read_barrier_depends (bnc#1012382).
- fs/9p: Compare qid.path in v9fs_test_inode (bsc#1070404).
- fs-cache: fix dereference of NULL user_key_payload (bnc#1012382).
- fscrypt: fix dereference of NULL user_key_payload (bnc#1012382).
- fscrypt: lock mutex before checking for bounce page pool (bnc#1012382).
- fscrypto: require write access to mount to set encryption policy (bnc#1012382).
- fuse: fix READDIRPLUS skipping an entry (bnc#1012382).
- gpu: drm: mgag200: mgag200_main:- Handle error from pci_iomap (bnc#1012382).
- hid: elo: clear BTN_LEFT mapping (bsc#1065866).
- hid: usbhid: fix out-of-bounds bug (bnc#1012382).
- hsi: ssi_protocol: double free in ssip_pn_xmit() (bsc#1031717).
- hwmon: (xgene) Fix up error handling path mixup in 'xgene_hwmon_probe()' (bsc#).
- i2c: at91: ensure state is restored after suspending (bnc#1012382).
- i2c: bcm2835: Add support for dynamic clock (bsc#1066660).
- i2c: bcm2835: Add support for Repeated Start Condition (bsc#1066660).
- i2c: bcm2835: Avoid possible NULL ptr dereference (bsc#1066660).
- i2c: bcm2835: Can't support I2C_M_IGNORE_NAK (bsc#1066660).
- i2c: bcm2835: Do not complain on -EPROBE_DEFER from getting our clock (bsc#1066660).
- i2c: bcm2835: Fix hang for writing messages larger than 16 bytes (bsc#1066660).
- i2c: bcm2835: Protect against unexpected TXW/RXR interrupts (bsc#1066660).
- i2c: bcm2835: Support i2c-dev ioctl I2C_TIMEOUT (bsc#1066660).
- i2c: bcm2835: Use dev_dbg logging on transfer errors (bsc#1066660).
- i2c: cadance: fix ctrl/addr reg write order (bsc#1031717).
- i2c: imx: Use correct function to write to register (bsc#1031717).
- i2c: ismt: Separate I2C block read from SMBus block read (bnc#1012382).
- i2c: riic: correctly finish transfers (bnc#1012382).
- i2c: riic: fix restart condition (git-fixes).
- i2c: xlp9xx: Enable HWMON class probing for xlp9xx (bsc#1067225).
- i2c: xlp9xx: Get clock frequency with clk API (bsc#1067225).
- i2c: xlp9xx: Handle I2C_M_RECV_LEN in msg-&gt;flags (bsc#1067225).
- i40e: Fix incorrect use of tx_itr_setting when checking for Rx ITR setup (bsc#1024346 FATE#321239 bsc#1024373 FATE#321247).
- i40e: fix the calculation of VFs mac addresses (bsc#1024346 FATE#321239 bsc#1024373 FATE#321247).
- i40e: only redistribute MSI-X vectors when needed (bsc#1024346 FATE#321239 bsc#1024373 FATE#321247).
- i40e: Use smp_rmb rather than read_barrier_depends (bnc#1012382).
- i40evf: Use smp_rmb rather than read_barrier_depends (bnc#1012382).
- i40iw: Remove UDA QP from QoS list if creation fails (bsc#1024376 FATE#321249).
- ib/core: Fix calculation of maximum RoCE MTU (bsc#1022595 FATE#322350).
- ib/core: Fix unable to change lifespan entry for hw_counters (FATE#321231 FATE#321473).
- ib/core: Namespace is mandatory input for address resolution (bsc#1022595 FATE#322350).
- ib/hfi1: Add MODULE_FIRMWARE statements (bsc#1036800).
- ib/ipoib: Clean error paths in add port (bsc#1022595 FATE#322350).
- ib/ipoib: Prevent setting negative values to max_nonsrq_conn_qp (bsc#1022595 FATE#322350).
- ib/ipoib: Remove double pointer assigning (bsc#1022595 FATE#322350).
- ib/ipoib: Set IPOIB_NEIGH_TBL_FLUSH after flushed completion initialization (bsc#1022595 FATE#322350).
- ib/mlx5: Fix RoCE Address Path fields (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- ibmvnic: Add netdev_dbg output for debugging (fate#323285).
- ibmvnic: Add vnic client data to login buffer (bsc#1069942).
- ibmvnic: Convert vnic server reported statistics to cpu endian (fate#323285).
- ibmvnic: Enable scatter-gather support (bsc#1066382).
- ibmvnic: Enable TSO support (bsc#1066382).
- ibmvnic: Feature implementation of Vital Product Data (VPD) for the ibmvnic driver (bsc#1069942).
- ibmvnic: Fix calculation of number of TX header descriptors (bsc#1066382).
- ibmvnic: fix dma_mapping_error call (bsc#1069942).
- ibmvnic: Fix failover error path for non-fatal resets (bsc#1066382).
- ibmvnic: Implement .get_channels (fate#323285).
- ibmvnic: Implement .get_ringparam (fate#323285).
- ibmvnic: Implement per-queue statistics reporting (fate#323285).
- ibmvnic: Let users change net device features (bsc#1066382).
- ibmvnic: Update reset infrastructure to support tunable parameters (bsc#1066382).
- ib/rxe: check for allocation failure on elem (FATE#322149).
- ib/rxe: do not crash, if allocation of crc algorithm failed (bsc#1051635).
- ib/rxe: put the pool on allocation failure (FATE#322149).
- ib/srp: Avoid that a cable pull can trigger a kernel crash (bsc#1022595 FATE#322350).
- ib/srpt: Do not accept invalid initiator port names (bnc#1012382).
- ib/uverbs: Fix device cleanup (bsc#1022595 FATE#322350).
- ib/uverbs: Fix NULL pointer dereference during device removal (bsc#1022595 FATE#322350).
- igb: close/suspend race in netif_device_detach (bnc#1012382).
- igb: Fix hw_dbg logging in igb_update_flash_i210 (bnc#1012382).
- igb: reset the PHY before reading the PHY ID (bnc#1012382).
- igb: Use smp_rmb rather than read_barrier_depends (bnc#1012382).
- igbvf: Use smp_rmb rather than read_barrier_depends (bnc#1012382).
- iio: adc: xilinx: Fix error handling (bnc#1012382).
- iio: dummy: events: Add missing break (bsc#1031717).
- iio: light: fix improper return value (bnc#1012382).
- iio: trigger: free trigger resource correctly (bnc#1012382).
- ima: do not update security.ima if appraisal status is not INTEGRITY_PASS (bnc#1012382).
- input: ar1021_i2c - fix too long name in driver's device table (bsc#1031717).
- input: edt-ft5x06 - fix setting gain, offset, and threshold via device tree (bsc#1031717).
- input: elan_i2c - add ELAN060C to the acpi table (bnc#1012382).
- input: elan_i2c - add ELAN0611 to the acpi table (bnc#1012382).
- input: gtco - fix potential out-of-bound access (bnc#1012382).
- input: mpr121 - handle multiple bits change of status register (bnc#1012382).
- input: mpr121 - set missing event capability (bnc#1012382).
- input: ti_am335x_tsc - fix incorrect step config for 5 wire touchscreen (bsc#1031717).
- input: twl4030-pwrbutton - use correct device for irq request (bsc#1031717).
- input: ucb1400_ts - fix suspend and resume handling (bsc#1031717).
- input: uinput - avoid crash when sending FF request to device going away (bsc#1031717).
- iommu/amd: Finish TLB flush in amd_iommu_unmap() (bnc#1012382).
- iommu/vt-d: Do not register bus-notifier under dmar_global_lock (bsc#1069793).
- ip6_gre: only increase err_count for some certain type icmpv6 in ip6gre_err (bnc#1012382).
- ip6_gre: skb_push ipv6hdr before packing the header in ip6gre_header (bnc#1012382).
- ipip: only increase err_count for some certain type icmp in ipip_err (bnc#1012382).
- ipmi: fix unsigned long underflow (bnc#1012382).
- ipmi: Pick up slave address from SMBIOS on an acpi device (bsc#1070006).
- ipmi: Prefer acpi system interfaces over SMBIOS ones (bsc#1070006).
- ipmi_si: Clean up printks (bsc#1070006).
- ipmi_si: fix memory leak on new_smi (bsc#1070006).
- ipsec: do not ignore crypto err in ah4 input (bnc#1012382).
- ipv6: flowlabel: do not leave opt-&gt;tot_len with garbage (bnc#1012382).
- ipv6: only call ip6_route_dev_notify() once for NETDEV_UNREGISTER (bnc#1012382).
- ipvs: make drop_entry protection effective for SIP-pe (bsc#1056365).
- irqchip/crossbar: Fix incorrect type of local variables (bnc#1012382).
- isa: Prevent NULL dereference in isa_bus driver callbacks (bsc#1031717).
- iscsi-target: Fix non-immediate TMR reference leak (bnc#1012382).
- isdn/i4l: fetch the ppp_write buffer in one shot (bnc#1012382).
- isofs: fix timestamps beyond 2027 (bnc#1012382).
- iwlwifi: mvm: fix the coex firmware API (bsc#1031717).
- iwlwifi: mvm: return -ENODATA when reading the temperature with the FW down (bsc#1031717).
- iwlwifi: mvm: set the RTS_MIMO_PROT bit in flag mask when sending sta to fw (bsc#1031717).
- iwlwifi: mvm: use IWL_HCMD_NOCOPY for MCAST_FILTER_CMD (bnc#1012382).
- iwlwifi: split the regulatory rules when the bandwidth flags require it (bsc#1031717).
- ixgbe: add mask for 64 RSS queues (bnc#1012382).
- ixgbe: do not disable FEC from the driver (bnc#1012382).
- ixgbe: fix AER error handling (bnc#1012382).
- ixgbe: Fix skb list corruption on Power systems (bnc#1012382).
- ixgbe: handle close/suspend race with netif_device_detach/present (bnc#1012382).
- ixgbe: Reduce I2C retry count on X550 devices (bnc#1012382).
- ixgbevf: Use smp_rmb rather than read_barrier_depends (bnc#1012382).
- kABI: protect struct l2tp_tunnel (kabi).
- kABI: protect struct regulator_dev (kabi).
- kABI: protect structs rt_rq+root_domain (kabi).
- kABI: protect typedef rds_rdma_cookie_t (kabi).
- kabi/severities: Ignore drivers/nvme/target (bsc#1063349)
- kabi/severities: Ignore kABI changes for qla2xxx (bsc#1043017)
- kernel-docs: unpack the source instead of using kernel-source (bsc#1057199).
- kernel/sysctl_binary.c: check name array length in deprecated_sysctl_warning() (FATE#323821).
- kernel/sysctl.c: remove duplicate UINT_MAX check on do_proc_douintvec_conv() (bsc#1066470).
- kernel/watchdog: Prevent false positives with turbo modes (bnc#1063516).
- keys: do not let add_key() update an uninstantiated key (bnc#1012382).
- keys: do not revoke uninstantiated key in request_key_auth_new() (bsc#1031717).
- keys: encrypted: fix dereference of NULL user_key_payload (bnc#1012382).
- keys: fix cred refcount leak in request_key_auth_new() (bsc#1031717).
- keys: fix key refcount leak in keyctl_assume_authority() (bsc#1031717).
- keys: fix key refcount leak in keyctl_read_key() (bsc#1031717).
- keys: fix NULL pointer dereference during ASN.1 parsing [ver #2] (bnc#1012382).
- keys: fix out-of-bounds read during ASN.1 parsing (bnc#1012382).
- keys: Fix race between updating and finding a negative key (bnc#1012382).
- keys: return full count in keyring_read() if buffer is too small (bnc#1012382).
- keys: trusted: fix writing past end of buffer in trusted_read() (bnc#1012382).
- keys: trusted: sanitize all key material (bnc#1012382).
- kvm: nVMX: fix guest CR4 loading when emulating L2 to L1 exit (bnc#1012382).
- kvm: nVMX: set IDTR and GDTR limits when loading L1 host state (bnc#1012382).
- kvm: PPC: Book 3S: XICS: correct the real mode ICP rejecting counter (bnc#1012382).
- kvm: SVM: obey guest PAT (bnc#1012382).
- l2tp: Avoid schedule while atomic in exit_net (bnc#1012382).
- l2tp: check ps-&gt;sock before running pppol2tp_session_ioctl() (bnc#1012382).
- l2tp: fix race condition in l2tp_tunnel_delete (bnc#1012382).
- libceph: do not WARN() if user tries to add invalid key (bsc#1069277).
- lib/digsig: fix dereference of NULL user_key_payload (bnc#1012382).
- libertas: Fix lbs_prb_rsp_limit_set() (bsc#1031717).
- lib/mpi: call cond_resched() from mpi_powm() loop (bnc#1012382).
- libnvdimm, namespace: fix label initialization to use valid seq numbers (bnc#1012382).
- libnvdimm, namespace: make 'resource' attribute only readable by root (bnc#1012382).
- libnvdimm, pfn: make 'resource' attribute only readable by root (FATE#319858).
- lib/ratelimit.c: use deferred printk() version (bsc#979928).
- locking/lockdep: Add nest_lock integrity test (bnc#1012382).
- lpfc: tie in to new dev_loss_tmo interface in nvme transport (bsc#1041873).
- mac80211: agg-tx: call drv_wake_tx_queue in proper context (bsc#1031717).
- mac80211: do not compare TKIP TX MIC key in reinstall prevention (bsc#1066472).
- mac80211: do not send SMPS action frame in AP mode when not needed (bsc#1031717).
- mac80211: Fix addition of mesh configuration element (git-fixes).
- mac80211: Fix BW upgrade for TDLS peers (bsc#1031717).
- mac80211: fix mgmt-tx abort cookie and leak (bsc#1031717).
- mac80211: fix power saving clients handling in iwlwifi (bnc#1012382).
- mac80211_hwsim: check HWSIM_ATTR_RADIO_NAME length (bnc#1012382).
- mac80211_hwsim: Fix memory leak in hwsim_new_radio_nl() (bsc#1031717).
- mac80211: Remove invalid flag operations in mesh TSF synchronization (bnc#1012382).
- mac80211: Remove unused 'beaconint_us' variable (bsc#1031717).
- mac80211: Remove unused 'i' variable (bsc#1031717).
- mac80211: Remove unused 'len' variable (bsc#1031717).
- mac80211: Remove unused 'rates_idx' variable (bsc#1031717).
- mac80211: Remove unused 'sband' and 'local' variables (bsc#1031717).
- mac80211: Remove unused 'struct ieee80211_rx_status' ptr (bsc#1031717).
- mac80211: Suppress NEW_PEER_CANDIDATE event if no room (bnc#1012382).
- mac80211: TDLS: always downgrade invalid chandefs (bsc#1031717).
- mac80211: TDLS: change BW calculation for WIDER_BW peers (bsc#1031717).
- mac80211: use constant time comparison with keys (bsc#1066471).
- md/linear: shutup lockdep warnning (FATE#321488 bnc#1012382 bsc#1042977).
- media: au0828: fix RC_CORE dependency (bsc#1031717).
- media: Do not do DMA on stack for firmware upload in the AS102 driver (bnc#1012382).
- media: em28xx: calculate left volume level correctly (bsc#1031717).
- media: mceusb: fix memory leaks in error path (bsc#1031717).
- media: rc: check for integer overflow (bnc#1012382).
- media: v4l2-ctrl: Fix flags field on Control events (bnc#1012382).
- mei: return error on notification request to a disconnected client (bnc#1012382).
- memremap: add scheduling point to devm_memremap_pages (bnc#1057079).
- mfd: ab8500-sysctrl: Handle probe deferral (bnc#1012382).
- mfd: axp20x: Fix axp288 PEK_DBR and PEK_DBF irqs being swapped (bnc#1012382).
- misc: panel: properly restore atomic counter on error path (bnc#1012382).
- mmc: block: return error on failed mmc_blk_get() (bsc#1031717).
- mmc: core: add driver strength selection when selecting hs400es (bsc#1069721).
- mmc: core: Fix access to HS400-ES devices (bsc#1031717).
- mmc: core/mmci: restore pre/post_req behaviour (bsc#1031717).
- mmc: dw_mmc: Fix the DTO timeout calculation (bsc#1069721).
- mm: check the return value of lookup_page_ext for all call sites (bnc#1068982).
- mmc: host: omap_hsmmc: avoid possible overflow of timeout value (bsc#1031717).
- mmc: host: omap_hsmmc: checking for NULL instead of IS_ERR() (bsc#1031717).
- mmc: mediatek: Fixed size in dma_free_coherent (bsc#1031717).
- mmc: s3cmci: include linux/interrupt.h for tasklet_struct (bnc#1012382).
- mmc: sd: limit SD card power limit according to cards capabilities (bsc#1031717).
- mm: distinguish CMA and MOVABLE isolation in has_unmovable_pages (bnc#1051406).
- mm: drop migrate type checks from has_unmovable_pages (bnc#1051406).
- mm, hwpoison: fixup 'mm: check the return value of lookup_page_ext for all call sites' (bnc#1012382).
- mm/madvise.c: fix freeing of locked page with MADV_FREE (bnc#1069152).
- mm/madvise.c: fix madvise() infinite loop under special circumstances (bnc#1070964).
- mm, memory_hotplug: add scheduling point to __add_pages (bnc#1057079).
- mm, memory_hotplug: do not fail offlining too early (bnc#1051406).
- mm, memory_hotplug: remove timeout from __offline_memory (bnc#1051406).
- mm, page_alloc: add scheduling point to memmap_init_zone (bnc#1057079).
- mm/page_alloc.c: broken deferred calculation (bnc#1068980).
- mm, page_alloc: fix potential false positive in __zone_watermark_ok (Git-fixes, bsc#1068978).
- mm/page_ext.c: check if page_ext is not prepared (bnc#1068982).
- mm/page_owner: avoid null pointer dereference (bnc#1068982).
- mm/pagewalk.c: report holes in hugetlb ranges (bnc#1012382).
- mm, sparse: do not swamp log with huge vmemmap allocation failures (bnc#1047901).
- net: 3com: typhoon: typhoon_init_one: fix incorrect return values (bnc#1012382).
- net: 3com: typhoon: typhoon_init_one: make return values more specific (bnc#1012382).
- net/9p: Switch to wait_event_killable() (bnc#1012382).
- net: Allow IP_MULTICAST_IF to set index to L3 slave (bnc#1012382).
- net: cdc_ether: fix divide by 0 on bad descriptors (bnc#1012382).
- net: cdc_ncm: GetNtbFormat endian fix (git-fixes).
- net: dsa: select NET_SWITCHDEV (bnc#1012382).
- net: emac: Fix napi poll list corruption (bnc#1012382).
- netfilter/ipvs: clear ipvs_property flag when SKB net namespace changed (bnc#1012382).
- netfilter: nf_ct_expect: Change __nf_ct_expect_check() return value (bnc#1012382).
- netfilter: nf_tables: fix oob access (bnc#1012382).
- netfilter: nft_meta: deal with PACKET_LOOPBACK in netdev family (bnc#1012382).
- netfilter: nft_queue: use raw_smp_processor_id() (bnc#1012382).
- net: ibm: ibmvnic: constify vio_device_id (fate#323285).
- net: ixgbe: Use new IXGBE_FLAG2_ROOT_RELAXED_ORDERING flag (bsc#1056652).
- net/mlx4_core: Fix VF overwrite of module param which disables DMFS on new probed PFs (FATE#321685 FATE#321686 FATE#321687 bnc#1012382 bsc#1015336 bsc#1015337 bsc#1015340).
- net/mlx4_en: fix overflow in mlx4_en_init_timestamp() (FATE#321685 FATE#321686 FATE#321687 bnc#1012382 bsc#1015336 bsc#1015337 bsc#1015340).
- net/mlx5: Delay events till mlx5 interface's add complete for pci resume (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5e: Increase Striding RQ minimum size limit to 4 multi-packet WQEs (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5: Fix health work queue spin lock to IRQ safe (bsc#1015342).
- net/mlx5: Loop over temp list to release delay events (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net: mvneta: fix handling of the Tx descriptor counter (fate#319899).
- net: mvpp2: release reference to txq_cpu[] entry after unmapping (bnc#1012382 bsc#1032150).
- net: qmi_wwan: fix divide by 0 on bad descriptors (bnc#1012382).
- net/sctp: Always set scope_id in sctp_inet6_skb_msgname (bnc#1012382).
- net: Set sk_prot_creator when cloning sockets to the right proto (bnc#1012382).
- net/smc: dev_put for netdev after usage of ib_query_gid() (bsc#1066812).
- net: thunderx: Fix TCP/UDP checksum offload for IPv4 pkts (bsc#1069583).
- net: thunderx: Fix TCP/UDP checksum offload for IPv6 pkts (bsc#1069583).
- net/unix: do not show information about sockets from other namespaces (bnc#1012382).
- netvsc: use refcount_t for keeping track of sub channels (bsc#1062835).
- nfc: fix device-allocation error return (bnc#1012382).
- nfsd/callback: Cleanup callback cred on shutdown (bnc#1012382).
- nfsd: deal with revoked delegations appropriately (bnc#1012382).
- nfs: Do not disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261).
- nfs: Fix typo in nomigration mount option (bnc#1012382).
- nfs: Fix ugly referral attributes (bnc#1012382).
- nilfs2: fix race condition that causes file system corruption (bnc#1012382).
- nl80211: Define policy for packet pattern attributes (bnc#1012382).
- nvme: add duplicate_connect option (bsc#1067734).
- nvme: add helper to compare options to controller (bsc#1067734).
- nvme: add transport SGL definitions (bsc#1057820).
- nvme: allow controller RESETTING to RECONNECTING transition (bsc#1037838).
- nvme-fabrics: Allow 0 as KATO value (bsc#1067734).
- nvme-fabrics: kABI fix for duplicate_connect option (bsc#1067734).
- nvme-fc: add a dev_loss_tmo field to the remoteport (bsc#1037838).
- nvme-fc: add dev_loss_tmo timeout and remoteport resume support (bsc#1037838).
- nvme-fc: add support for duplicate_connect option (bsc#1067734).
- nvme-fc: add uevent for auto-connect (bsc#1037838).
- nvme-fc: change ctlr state assignments during reset/reconnect (bsc#1037838).
- nvme-fc: check connectivity before initiating reconnects (bsc#1037838).
- nvme-fc: correct io termination handling (bsc#1067734).
- nvme-fc: correct io timeout behavior (bsc#1067734).
- nvme-fc: create fc class and transport device (bsc#1037838).
- nvme-fc: decouple ns references from lldd references (bsc#1067734).
- nvme-fc: fix iowait hang (bsc#1052384).
- nvme-fc: fix localport resume using stale values (bsc#1067734).
- nvme-fcloop: fix port deletes and callbacks (bsc#1037838).
- nvme-fc: move remote port get/put/free location (bsc#1037838).
- nvme-fc: on lldd/transport io error, terminate association (bsc#1042268).
- nvme-fc: Reattach to localports on re-registration (bsc#1052384).
- nvme-fc: remove NVME_FC_MAX_SEGMENTS (bsc#1067734).
- nvme-fc: remove unused 'queue_size' field (bsc#1042268).
- nvme-fc: retry initial controller connections 3 times (bsc#1067734).
- nvme-fc: use transport-specific sgl format (bsc#1057820).
- nvme: Fix memory order on async queue deletion (bnc#1012382).
- nvme: fix the definition of the doorbell buffer config support bit (bsc#1066812).
- nvme-rdma: add support for duplicate_connect option (bsc#1067734).
- nvme/rdma: Kick admin queue when a connection is going down (bsc#1059639).
- nvmet-fc: correct ref counting error when deferred rcv used (bsc#1067734).
- nvmet-fc: fix failing max io queue connections (bsc#1067734).
- nvmet-fc: on port remove call put outside lock (bsc#1067734).
- nvmet-fc: simplify sg list handling (bsc#1052384).
- nvmet: Fix fatal_err_work deadlock (bsc#1063349).
- ocfs2: fstrim: Fix start offset of first cluster group during fstrim (bnc#1012382).
- ocfs2: should wait dio before inode lock in ocfs2_setattr() (bnc#1012382).
- packet: avoid panic in packet_getsockopt() (bnc#1012382).
- packet: only test po-&gt;has_vnet_hdr once in packet_snd (bnc#1012382).
- parisc: Avoid trashing sr2 and sr3 in LWS code (bnc#1012382).
- parisc: Fix double-word compare and exchange in LWS code on 32-bit kernels (bnc#1012382).
- parisc: Fix validity check of pointer size argument in new CAS implementation (bnc#1012382).
- pci: Apply Cavium ThunderX ACS quirk to more Root Ports (bsc#1069250).
- pci: Apply _HPX settings only to relevant devices (bnc#1012382).
- pci: Enable Relaxed Ordering for Hisilicon Hip07 chip (bsc#1056652).
- pci: Mark Cavium CN8xxx to avoid bus reset (bsc#1069250).
- pci: Set Cavium ACS capability quirk flags to assert RR/CR/SV/UF (bsc#1069250).
- percpu: make this_cpu_generic_read() atomic w.r.t. interrupts (bnc#1012382).
- perf tools: Fix build failure on perl script context (bnc#1012382).
- perf tools: Only increase index if perf_evsel__new_idx() succeeds (bnc#1012382).
- perf/x86/intel/bts: Fix exclusive event reference leak (git-fixes d2878d642a4ed).
- phy: increase size of MII_BUS_ID_SIZE and bus_id (bnc#1012382).
- pkcs#7: fix unitialized boolean 'want' (bnc#1012382).
- pkcs7: Prevent NULL pointer dereference, since sinfo is not always set (bnc#1012382).
- platform/x86: acer-wmi: setup accelerometer when acpi device was found (bsc#1031717).
- platform/x86: hp-wmi: Do not shadow error values (bnc#1012382).
- platform/x86: hp-wmi: Fix detection for dock and tablet mode (bnc#1012382).
- platform/x86: hp-wmi: Fix error value for hp_wmi_tablet_state (bnc#1012382).
- platform/x86: intel_mid_thermal: Fix module autoload (bnc#1012382).
- platform/x86: sony-laptop: Fix error handling in sony_nc_setup_rfkill() (bsc#1031717).
- pm / OPP: Add missing of_node_put(np) (bnc#1012382).
- power: bq27xxx_battery: Fix bq27541 AveragePower register address (bsc#1031717).
- power: bq27xxx: fix reading for bq27000 and bq27010 (bsc#1031717).
- powerCap: Fix an error code in powercap_register_zone() (bsc#1031717).
- power: ipaq-micro-battery: freeing the wrong variable (bsc#1031717).
- powerpc/64: Fix race condition in setting lock bit in idle/wakeup code (bsc#1066223).
- powerpc/64s/hash: Allow MAP_FIXED allocations to cross 128TB boundary (bsc#1070169).
- powerpc/64s/hash: Fix 128TB-512TB virtual address boundary case allocation (bsc#1070169).
- powerpc/64s/hash: Fix 512T hint detection to use &gt;= 128T (bsc#1070169).
- powerpc/64s/hash: Fix fork() with 512TB process address space (bsc#1070169).
- powerpc/64s/slice: Use addr limit when computing slice mask (bsc#1070169).
- powerpc/bpf/jit: Disable classic BPF JIT on ppc64le (bsc#1066223).
- powerpc/corenet: explicitly disable the SDHC controller on kmcoge4 (bnc#1012382).
- powerpc: Correct instruction code for xxlor instruction (bsc#1066223).
- powerpc: Fix VSX enabling/flushing to also test MSR_FP and MSR_VEC (bsc#1066223).
- powerpc/hotplug: Improve responsiveness of hotplug change (FATE#322022, bsc#1067906).
- powerpc/mm: Fix check of multiple 16G pages from device tree (bsc#1066223).
- powerpc/mm: Fix virt_addr_valid() etc. on 64-bit hash (bsc#1066223).
- powerpc/mm/hash64: Fix subpage protection with 4K HPTE config (bsc#1010201, bsc#1066223).
- powerpc/mm/hash: Free the subpage_prot_table correctly (bsc#1066223).
- powerpc/numa: Fix multiple bugs in memory_hotplug_max() (bsc#1066223).
- powerpc/numa: Fix whitespace in hot_add_drconf_memory_max() (bsc#1066223).
- powerpc/opal: Fix EBUSY bug in acquiring tokens (bsc#1066223).
- powerpc/powernv/ioda: Fix endianness when reading TCEs (bsc#1066223).
- powerpc/powernv: Make opal_event_shutdown() callable from IRQ context (bsc#1066223).
- powerpc/pseries/vio: Dispose of virq mapping on vdevice unregister (bsc#1067888).
- powerpc/signal: Properly handle return value from uprobe_deny_signal() (bsc#1066223).
- powerpc/sysrq: Fix oops whem ppmu is not registered (bsc#1066223).
- powerpc/vphn: Fix numa update end-loop bug (FATE#322022, bsc#1067906).
- powerpc/vphn: Improve recognition of PRRN/VPHN (FATE#322022, bsc#1067906).
- powerpc/vphn: Update CPU topology when VPHN enabled (FATE#322022, bsc#1067906).
- power: supply: bq27xxx_battery: Fix register map for BQ27510 and BQ27520 ('bsc#1069270').
- power: supply: isp1704: Fix unchecked return value of devm_kzalloc (bsc#1031717).
- power: supply: lp8788: prevent out of bounds array access (bsc#1031717).
- power_supply: tps65217-charger: Fix NULL deref during property export (bsc#1031717).
- ppp: fix race in ppp device destruction (bnc#1012382).
- printk/console: Always disable boot consoles that use init memory before it is freed (bsc#1063026).
- printk/console: Enhance the check for consoles using init memory (bsc#1063026).
- printk: include &lt;asm/sections.h&gt; instead of &lt;asm-generic/sections.h&gt; (bsc#1063026).
- printk: Make sure to wake up printk kthread from irq work for pending output (bnc#744692, bnc#789311).
- printk: only unregister boot consoles when necessary (bsc#1063026).
- qla2xxx: Fix cable swap (bsc#1043017).
- qla2xxx: Fix notify ack without timeout handling (bsc#1043017).
- qla2xxx: Fix re-login for Nport Handle in use (bsc#1043017).
- qla2xxx: fix stale memory access (bsc#1043017).
- qla2xxx: Login state machine stuck at GPDB (bsc#1043017).
- qla2xxx: Recheck session state after RSCN (bsc#1043017).
- qla2xxx: relogin is being triggered too fast (bsc#1043017).
- qla2xxx: Retry switch command on timed out (bsc#1043017).
- qla2xxx: Serialize gpnid (bsc#1043017).
- quota: Check for register_shrinker() failure (bsc#1070404).
- r8169: Do not increment tx_dropped in TX ring cleaning (bsc#1031717).
- rbd: set discard_alignment to zero (bsc#1064320).
- rbd: use GFP_NOIO for parent stat and data requests (bnc#1012382).
- rcu: Allow for page faults in NMI handlers (bnc#1012382).
- rdma/uverbs: Prevent leak of reserved field (bsc#1022595 FATE#322350).
- rds: rdma: return appropriate error on rdma map failures (bnc#1012382).
- Refresh patches with upstream commit ID (bsc#1067734)
- regulator: core: Limit propagation of parent voltage count and list (bsc#1070145).
- regulator: fan53555: fix I2C device ids (bnc#1012382).
- Revert 'crypto: xts - Add ECB dependency' (bnc#1012382).
- Revert 'drm: bridge: add DT bindings for TI ths8135' (bnc#1012382).
- Revert 'phy: increase size of MII_BUS_ID_SIZE and bus_id' (kabi).
- Revert 'sctp: do not peel off an assoc from one netns to another one' (bnc#1012382).
- Revert 'tty: goldfish: Fix a parameter of a call to free_irq' (bnc#1012382).
- Revert 'uapi: fix linux/rds.h userspace compilation errors' (bnc#1012382).
- rpm/kernel-binary.spec.in: add the kernel-binary dependencies to kernel-binary-base (bsc#1060333).
- rpm/kernel-binary.spec.in: Correct supplements for recent SLE products (bsc#1067494)
- rpm/kernel-binary.spec.in: only rewrite modules.dep if non-zero in size (bsc#1056979).
- rpm/package-descriptions:
- rtc: ds1307: Fix relying on reset value for weekday (bsc#1031717).
- rtc: ds1374: wdt: Fix issue with timeout scaling from secs to wdt ticks (bsc#1031717).
- rtc: ds1374: wdt: Fix stop/start ioctl always returning -EINVAL (bsc#1031717).
- rtc: rtc-nuc900: fix loop timeout test (bsc#1031717).
- rtc: sa1100: fix unbalanced clk_prepare_enable/clk_disable_unprepare (bsc#1031717).
- rtlwifi: fix uninitialized rtlhal-&gt;last_suspend_sec time (bnc#1012382).
- rtlwifi: rtl8192ee: Fix memory leak when loading firmware (bnc#1012382).
- rtlwifi: rtl8821ae: Fix connection lost problem (bnc#1012382).
- rtlwifi: rtl8821ae: Fix HW_VAR_NAV_UPPER operation (bsc#1031717).
- s390/dasd: check for device error pointer within state change interrupts (bnc#1012382).
- s390/disassembler: add missing end marker for e7 table (bnc#1012382).
- s390/disassembler: correct disassembly lines alignment (bsc#1070825).
- s390/disassembler: increase show_code buffer size (bnc#1070825, LTC#161577).
- s390/disassembler: increase show_code buffer size (LTC#161577 bnc#1012382 bnc#1070825).
- s390: fix transactional execution control register handling (bnc#1012382).
- s390/kbuild: enable modversions for symbols exported from asm (bnc#1012382).
- s390/mm: fix write access check in gup_huge_pmd() (bnc#1066974, LTC#160551).
- s390/qeth: allow hsuid configuration in DOWN state (bnc#1070825, LTC#161871).
- s390/qeth: issue STARTLAN as first IPA command (bnc#1012382).
- s390/qeth: use ip_lock for hsuid configuration (bnc#1070825, LTC#161871).
- s390/runtime instrumention: fix possible memory corruption (bnc#1012382).
- sched/autogroup: Fix autogroup_move_group() to never skip sched_move_task() (bnc#1012382).
- sched: Make resched_cpu() unconditional (bnc#1012382).
- sched/rt: Simplify the IPI based RT balancing logic (bnc#1012382).
- scsi: aacraid: Check for PCI state of device in a generic way (bsc#1022607, FATE#321673).
- scsi: aacraid: Fix controller initialization failure (FATE#320140).
- scsi: bfa: fix access to bfad_im_port_s (bsc#1065101).
- scsi: check for device state in __scsi_remove_target() (bsc#1072589).
- scsi_devinfo: cleanly zero-pad devinfo strings (bsc#1062941).
- scsi: fcoe: move fcoe_interface_remove() out of fcoe_interface_cleanup() (bsc#1039542).
- scsi: fcoe: open-code fcoe_destroy_work() for NETDEV_UNREGISTER (bsc#1039542).
- scsi: fcoe: separate out fcoe_vport_remove() (bsc#1039542).
- scsi: ipr: Fix scsi-mq lockdep issue (bsc#1066213).
- scsi: ipr: Set no_report_opcodes for RAID arrays (bsc#1066213).
- scsi: libiscsi: fix shifting of DID_REQUEUE host byte (bsc#1056003).
- scsi: lpfc: Add Buffer to Buffer credit recovery support (bsc#1052384).
- scsi: lpfc: Add changes to assist in NVMET debugging (bsc#1041873).
- scsi: lpfc: Add nvme initiator devloss support (bsc#1041873).
- scsi: lpfc: Adjust default value of lpfc_nvmet_mrq (bsc#1067735).
- scsi: lpfc: Break up IO ctx list into a separate get and put list (bsc#1045404).
- scsi: lpfc: change version to 11.4.0.4 (bsc#1067735).
- scsi: lpfc: convert info messages to standard messages (bsc#1052384).
- scsi: lpfc: Correct driver deregistrations with host nvme transport (bsc#1067735).
- scsi: lpfc: Correct issues with FAWWN and FDISCs (bsc#1052384).
- scsi: lpfc: correct nvme sg segment count check (bsc#1067735).
- scsi: lpfc: correct port registrations with nvme_fc (bsc#1067735).
- scsi: lpfc: Correct return error codes to align with nvme_fc transport (bsc#1052384).
- scsi: lpfc: Disable NPIV support if NVME is enabled (bsc#1067735).
- scsi: lpfc: Driver fails to detect direct attach storage array (bsc#1067735).
- scsi: lpfc: Expand WQE capability of every NVME hardware queue (bsc#1067735).
- scsi: lpfc: Extend RDP support (bsc#1067735).
- scsi: lpfc: Fix a precedence bug in lpfc_nvme_io_cmd_wqe_cmpl() (bsc#1056587).
- scsi: lpfc: Fix bad sgl reposting after 2nd adapter reset (bsc#1052384).
- scsi: lpfc: fix build issue if NVME_FC_TARGET is not defined (bsc#1040073).
- scsi: lpfc: Fix counters so outstandng NVME IO count is accurate (bsc#1041873).
- scsi: lpfc: Fix crash after bad bar setup on driver attachment (bsc#1067735).
- scsi: lpfc: Fix crash during driver unload with running nvme traffic (bsc#1067735).
- scsi: lpfc: Fix crash in lpfc_nvme_fcp_io_submit during LIP (bsc#1067735).
- scsi: lpfc: Fix crash in lpfc nvmet when fc port is reset (bsc#1052384).
- scsi: lpfc: Fix crash receiving ELS while detaching driver (bsc#1067735).
- scsi: lpfc: Fix display for debugfs queInfo (bsc#1067735).
- scsi: lpfc: Fix driver handling of nvme resources during unload (bsc#1067735).
- scsi: lpfc: Fix duplicate NVME rport entries and namespaces (bsc#1052384).
- scsi: lpfc: Fix FCP hba_wqidx assignment (bsc#1067735).
- scsi: lpfc: Fix handling of FCP and NVME FC4 types in Pt2Pt topology (bsc#1052384).
- scsi: lpfc: Fix hard lock up NMI in els timeout handling (bsc#1067735).
- scsi: lpfc: fix 'integer constant too large' error on 32bit archs (bsc#1052384).
- scsi: lpfc: Fix loop mode target discovery (bsc#1052384).
- scsi: lpfc: Fix lpfc nvme host rejecting IO with Not Ready message (bsc#1067735).
- scsi: lpfc: Fix Lun Priority level shown as NA (bsc#1041873).
- scsi: lpfc: Fix ndlp ref count for pt2pt mode issue RSCN (bsc#1067735).
- scsi: lpfc: Fix NVME LS abort_xri (bsc#1067735).
- scsi: lpfc: Fix nvme port role handling in sysfs and debugfs handlers (bsc#1041873).
- scsi: lpfc: Fix NVME PRLI handling during RSCN (bsc#1052384).
- scsi: lpfc: Fix nvme target failure after 2nd adapter reset (bsc#1052384).
- scsi: lpfc: Fix nvmet node ref count handling (bsc#1041873).
- scsi: lpfc: Fix oops if nvmet_fc_register_targetport fails (bsc#1067735).
- scsi: lpfc: Fix oops of nvme host during driver unload (bsc#1067735).
- scsi: lpfc: Fix oops when NVME Target is discovered in a nonNVME environment.
- scsi: lpfc: fix pci hot plug crash in list_add call (bsc#1067735).
- scsi: lpfc: fix pci hot plug crash in timer management routines (bsc#1067735).
- scsi: lpfc: Fix plogi collision that causes illegal state transition (bsc#1052384).
- scsi: lpfc: Fix Port going offline after multiple resets (bsc#1041873).
- scsi: lpfc: Fix PRLI retry handling when target rejects it (bsc#1041873).
- scsi: lpfc: Fix rediscovery on switch blade pull (bsc#1052384).
- scsi: lpfc: Fix relative offset error on large nvmet target ios (bsc#1052384).
- scsi: lpfc: Fix return value of board_mode store routine in case of online failure (bsc#1041873).
- scsi: lpfc: Fix secure firmware updates (bsc#1067735).
- scsi: lpfc: Fix System panic after loading the driver (bsc#1041873).
- scsi: lpfc: Fix transition nvme-i rport handling to nport only (bsc#1041873).
- scsi: lpfc: Fix vports not logging into target (bsc#1041873).
- scsi: lpfc: Fix warning messages when NVME_TARGET_FC not defined (bsc#1067735).
- scsi: lpfc: FLOGI failures are reported when connected to a private loop (bsc#1067735).
- scsi: lpfc: Handle XRI_ABORTED_CQE in soft IRQ (bsc#1067735).
- scsi: lpfc: Limit amount of work processed in IRQ (bsc#1052384).
- scsi: lpfc: Linux LPFC driver does not process all RSCNs (bsc#1067735).
- scsi: lpfc: lpfc version bump 11.4.0.3 (bsc#1052384).
- scsi: lpfc: Make ktime sampling more accurate (bsc#1067735).
- scsi: lpfc: Move CQ processing to a soft IRQ (bsc#1067735).
- scsi: lpfc: Null pointer dereference when log_verbose is set to 0xffffffff (bsc#1041873).
- scsi: lpfc: PLOGI failures during NPIV testing (bsc#1067735).
- scsi: lpfc: Raise maximum NVME sg list size for 256 elements (bsc#1067735).
- scsi: lpfc: Reduce log spew on controller reconnects (bsc#1067735).
- scsi: lpfc: remove console log clutter (bsc#1052384).
- scsi: lpfc: Revise NVME module parameter descriptions for better clarity (bsc#1067735).
- scsi: lpfc: Set missing abort context (bsc#1067735).
- scsi: lpfc: small sg cnt cleanup (bsc#1067735).
- scsi: lpfc: spin_lock_irq() is not nestable (bsc#1045404).
- scsi: lpfc: update driver version to 11.4.0.5 (bsc#1067735).
- scsi: lpfc: update to revision to 11.4.0.0 (bsc#1041873).
- scsi: megaraid_sas: mismatch of allocated MFI frame size and length exposed in MFI MPT pass through command (bsc#1066767).
- scsi: qla2xxx: Cleanup debug message IDs (bsc#1043017).
- scsi: qla2xxx: Correction to vha-&gt;vref_count timeout (bsc#1066812).
- scsi: qla2xxx: Fix name server relogin (bsc#1043017).
- scsi: qla2xxx: Fix path recovery (bsc#1043017).
- scsi: qla2xxx: Initialize Work element before requesting IRQs (bsc#1019675,FATE#321701).
- scsi: qla2xxx: Replace usage of spin_lock with spin_lock_irqsave (bsc#1043017).
- scsi: qla2xxx: Retain loop test for fwdump length exceeding buffer length (bsc#1043017).
- scsi: qla2xxx: Turn on FW option for exchange check (bsc#1043017).
- scsi: qla2xxx: Use BIT_6 to acquire FAWWPN from switch (bsc#1066812).
- scsi: qla2xxx: Use fabric name for Get Port Speed command (bsc#1066812).
- scsi: qla2xxx: Use flag PFLG_DISCONNECTED (bsc#1043017).
- scsi: reset wait for IO completion (bsc#996376).
- scsi: scsi_devinfo: fixup string compare (bsc#1062941). updated patches.fixes/scsi_devinfo-fixup-string-compare.patch to the version merged upstream.
- scsi: scsi_devinfo: handle non-terminated strings (bsc#1062941).
- scsi: scsi_dh_emc: return success in clariion_std_inquiry() (bnc#1012382).
- scsi: sd_zbc: Fix sd_zbc_read_zoned_characteristics() (bsc#1066812).
- scsi: sg: close race condition in sg_remove_sfp_usercontext() (bsc#1064206).
- scsi: sg: do not return bogus Sg_requests (bsc#1064206).
- scsi: sg: only check for dxfer_len greater than 256M (bsc#1064206).
- scsi: sg: Re-fix off by one in sg_fill_request_table() (bnc#1012382).
- scsi: ufs: add capability to keep auto bkops always enabled (bnc#1012382).
- scsi: ufs-qcom: Fix module autoload (bnc#1012382).
- scsi: zfcp: fix erp_action use-before-initialize in REC action trace (bnc#1012382).
- sctp: add the missing sock_owned_by_user check in sctp_icmp_redirect (bnc#1012382).
- sctp: do not peel off an assoc from one netns to another one (bnc#1012382).
- sctp: do not peel off an assoc from one netns to another one (bnc#1012382).
- sctp: potential read out of bounds in sctp_ulpevent_type_enabled() (bnc#1012382).
- sctp: reset owner sk for data chunks on out queues when migrating a sock (bnc#1012382).
- security/keys: add CONFIG_KEYS_COMPAT to Kconfig (bnc#1012382).
- selftests: firmware: add empty string and async tests (bnc#1012382).
- selftests: firmware: send expected errors to /dev/null (bnc#1012382).
- serial: 8250_fintek: Fix rs485 disablement on invalid ioctl() (bsc#1031717).
- serial: 8250_uniphier: fix serial port index in private data (bsc#1031717).
- serial: Fix serial console on SNI RM400 machines (bsc#1031717).
- serial: omap: Fix EFR write on RTS deassertion (bnc#1012382).
- serial: Remove unused port type (bsc#1066045).
- serial: sh-sci: Fix register offsets for the IRDA serial port (bnc#1012382).
- slub: do not merge cache if slub_debug contains a never-merge flag (bnc#1012382).
- smb3: Validate negotiate request must always be signed (bsc#1064597).
- smb: fix leak of validate negotiate info response buffer (bsc#1064597).
- smb: fix validate negotiate info uninitialised memory use (bsc#1064597).
- sparc64: Migrate hvcons irq to panicked cpu (bnc#1012382).
- spi: SPI_FSL_DSPI should depend on HAS_DMA (bnc#1012382).
- spi: uapi: spidev: add missing ioctl header (bnc#1012382).
- staging: iio: cdc: fix improper return value (bnc#1012382).
- staging: lustre: hsm: stack overrun in hai_dump_data_field (bnc#1012382).
- staging: lustre: llite: do not invoke direct_IO for the EOF case (bnc#1012382).
- staging: lustre: ptlrpc: skip lock if export failed (bnc#1012382).
- staging: r8712u: Fix Sparse warning in rtl871x_xmit.c (bnc#1012382).
- staging: rtl8188eu: fix incorrect ERROR tags from logs (bnc#1012382).
- staging: rtl8712: fixed little endian problem (bnc#1012382).
- staging: rtl8712u: Fix endian settings for structs describing network packets (bnc#1012382).
- sunrpc: Fix tracepoint storage issues with svc_recv and svc_rqst_status (bnc#1012382).
- supported.conf:
- supported.conf: add test_syctl to new kselftests-kmp package FATE#323821 As per FATE#323821 we will require new FATE requests per each new selftest driver. We do not want to support these module on production runs but we do want to support them for QA / testing uses. The compromise is to package them into its own package, this will be the kselftests-kmp package. Selftests can also be used as proof of concept vehicle for issues by customers or ourselves. Vanilla kernels do not get test_sysctl given that driver was using built-in defaults, this also means we cannot run sefltests on config/s390x/zfcpdump which does not enable modules. Likeweise, since we had to *change* the kernel for test_syctl, it it also means we can't test test_syctl with vanilla kernels. It should be possible with other selftests drivers if they are present in vanilla kernels though.
- supported.conf: Support spidev (bsc#1066696)
- sysctl: add unsigned int range support (FATE#323821)
- target: fix ALUA state file path truncation (bsc#1064606).
- target: Fix node_acl demo-mode + uncached dynamic shutdown regression (bnc#1012382).
- target: fix PR state file path truncation (bsc#1064606).
- target: Fix QUEUE_FULL + SCSI task attribute handling (bnc#1012382).
- target/iscsi: Fix unsolicited data seq_end_offset calculation (bnc#1012382 bsc#1036489).
- target/rbd: handle zero length UNMAP requests early (bsc#1064320).
- target/rbd: use target_configure_unmap_from_queue() helper (bsc#1064320).
- tcp/dccp: fix ireq-&gt;opt races (bnc#1012382).
- tcp/dccp: fix lockdep splat in inet_csk_route_req() (bnc#1012382).
- tcp/dccp: fix other lockdep splats accessing ireq_opt (bnc#1012382).
- tcp: do not mangle skb-&gt;cb[] in tcp_make_synack() (bnc#1012382).
- tcp: fix tcp_mtu_probe() vs highest_sack (bnc#1012382).
- test: firmware_class: report errors properly on failure (bnc#1012382).
- test_sysctl: add dedicated proc sysctl test driver (FATE#323821)
- test_sysctl: add generic script to expand on tests (FATE#323821)
- test_sysctl: add simple proc_dointvec() case (FATE#323821).
- test_sysctl: add simple proc_douintvec() case (bsc#323821).
- test_sysctl: fix sysctl.sh by making it executable (FATE#323821).
- test_sysctl: test against int proc_dointvec() array support (FATE#323821).
- test_sysctl: test against PAGE_SIZE for int (FATE#323821)
- timer: Prevent timer value 0 for MWAITX (bsc#1065717).
- tipc: fix link attribute propagation bug (bnc#1012382).
- tipc: use only positive error codes in messages (bnc#1012382).
- tools: firmware: check for distro fallback udev cancel rule (bnc#1012382).
- tpm: constify transmit data pointers (bsc#1020645, git-fixes).
- tpm: kabi: do not bother with added const (bsc#1020645, git-fixes).
- tpm_tis_spi: Use DMA-safe memory for SPI transfers (bsc#1020645, git-fixes).
- tracing/samples: Fix creation and deletion of simple_thread_fn creation (bnc#1012382).
- tun: allow positive return values on dev_get_valid_name() call (bnc#1012382).
- tun: bail out from tun_get_user() if the skb is empty (bnc#1012382).
- tun: call dev_get_valid_name() before register_netdevice() (bnc#1012382).
- tun/tap: sanitize TUNSETSNDBUF input (bnc#1012382).
- uapi: fix linux/mroute6.h userspace compilation errors (bnc#1012382).
- uapi: fix linux/rds.h userspace compilation error (bnc#1012382).
- uapi: fix linux/rds.h userspace compilation errors (bnc#1012382).
- uapi: fix linux/rds.h userspace compilation errors (bnc#1012382).
- udpv6: Fix the checksum computation when HW checksum does not apply (bnc#1012382).
- Update config files to enable spidev on arm64. (bsc#1066696)
- Update preliminary FC-NVMe patches to mainline status (bsc#1067734)
- usb: Add delay-init quirk for Corsair K70 LUX keyboards (bnc#1012382).
- usb: cdc_acm: Add quirk for Elatec TWN3 (bnc#1012382).
- usb: core: fix out-of-bounds access bug in usb_get_bos_descriptor() (bnc#1012382).
- usb: devio: Revert 'USB: devio: Do not corrupt user memory' (bnc#1012382).
- usb: dummy-hcd: Fix deadlock caused by disconnect detection (bnc#1012382).
- usb: gadget: composite: Fix use-after-free in usb_composite_overwrite_options (bnc#1012382).
- usb: hcd: initialize hcd-&gt;flags to 0 when rm hcd (bnc#1012382).
- usb: hub: Allow reset retry for USB2 devices on connect bounce (bnc#1012382).
- usb: musb: Check for host-mode using is_host_active() on reset interrupt (bnc#1012382).
- usb: musb: sunxi: Explicitly release USB PHY on exit (bnc#1012382).
- usb: quirks: add quirk for WORLDE MINI MIDI keyboard (bnc#1012382).
- usb: renesas_usbhs: Fix DMAC sequence for receiving zero-length packet (bnc#1012382).
- usb: serial: console: fix use-after-free after failed setup (bnc#1012382).
- usb: serial: cp210x: add support for ELV TFD500 (bnc#1012382).
- usb: serial: ftdi_sio: add id for Cypress WICED dev board (bnc#1012382).
- usb: serial: garmin_gps: fix I/O after failed probe and remove (bnc#1012382).
- usb: serial: garmin_gps: fix memory leak on probe errors (bnc#1012382).
- usb: serial: metro-usb: add MS7820 device id (bnc#1012382).
- usb: serial: option: add support for TP-Link LTE module (bnc#1012382).
- usb: serial: qcserial: add Dell DW5818, DW5819 (bnc#1012382).
- usb: serial: qcserial: add pid/vid for Sierra Wireless EM7355 fw update (bnc#1012382).
- usb: usbfs: compute urb-&gt;actual_length for isochronous (bnc#1012382).
- usb: usbtest: fix NULL pointer dereference (bnc#1012382).
- usb: xhci: Handle error condition in xhci_stop_device() (bnc#1012382).
- vfs: expedite unmount (bsc#1024412).
- video: fbdev: pmag-ba-fb: Remove bad `__init' annotation (bnc#1012382).
- video: udlfb: Fix read EDID timeout (bsc#1031717).
- vlan: fix a use-after-free in vlan_device_event() (bnc#1012382).
- vsock: use new wait API for vsock_stream_sendmsg() (bnc#1012382).
- vti: fix use after free in vti_tunnel_xmit/vti6_tnl_xmit (bnc#1012382).
- watchdog: kempld: fix gcc-4.3 build (bnc#1012382).
- workqueue: Fix NULL pointer dereference (bnc#1012382).
- workqueue: replace pool-&gt;manager_arb mutex with a flag (bnc#1012382).
- x86/acpi/cstate: Allow ACPI C1 FFH MWAIT use on AMD systems (bsc#1069879).
- x86/alternatives: Fix alt_max_short macro to really be a max() (bnc#1012382).
- x86/decoder: Add new TEST instruction pattern (bnc#1012382).
- x86/MCE/AMD: Always give panic severity for UC errors in kernel context (git-fixes bf80bbd7dcf5).
- x86/microcode/AMD: Add support for fam17h microcode loading (bsc#1068032).
- x86/microcode/intel: Disable late loading on model 79 (bnc#1012382).
- x86/mm: fix use-after-free of vma during userfaultfd fault (Git-fixes, bsc#1069916).
- x86/oprofile/ppro: Do not use __this_cpu*() in preemptible context (bnc#1012382).
- x86/uaccess, sched/preempt: Verify access_ok() context (bnc#1012382).
- xen: do not print error message in case of missing Xenstore entry (bnc#1012382).
- xen/events: events_fifo: Do not use {get,put}_cpu() in xen_evtchn_fifo_init() (bnc#1065600).
- xen: fix booting ballooned down hvm guest (bnc#1065600).
- xen/gntdev: avoid out of bounds access in case of partial gntdev_mmap() (bnc#1012382).
- xen/manage: correct return value check on xenbus_scanf() (bnc#1012382).
- xen-netback: fix error handling output (bnc#1065600).
- xen: x86: mark xen_find_pt_base as __init (bnc#1065600).
- xen: xenbus driver must not accept invalid transaction ids (bnc#1012382).
- zd1211rw: fix NULL-deref at probe (bsc#1031717).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-21"/>
	<updated date="2017-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010201">SUSE bug 1010201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012523">SUSE bug 1012523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015336">SUSE bug 1015336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015337">SUSE bug 1015337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015340">SUSE bug 1015340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015342">SUSE bug 1015342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015343">SUSE bug 1015343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019675">SUSE bug 1019675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020412">SUSE bug 1020412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020645">SUSE bug 1020645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022595">SUSE bug 1022595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022607">SUSE bug 1022607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024346">SUSE bug 1024346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024373">SUSE bug 1024373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024376">SUSE bug 1024376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024412">SUSE bug 1024412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031717">SUSE bug 1031717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032150">SUSE bug 1032150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036489">SUSE bug 1036489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036800">SUSE bug 1036800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037404">SUSE bug 1037404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037838">SUSE bug 1037838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038299">SUSE bug 1038299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039542">SUSE bug 1039542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040073">SUSE bug 1040073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041873">SUSE bug 1041873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042268">SUSE bug 1042268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042957">SUSE bug 1042957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042977">SUSE bug 1042977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042978">SUSE bug 1042978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043017">SUSE bug 1043017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045404">SUSE bug 1045404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046054">SUSE bug 1046054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046107">SUSE bug 1046107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047901">SUSE bug 1047901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047989">SUSE bug 1047989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048317">SUSE bug 1048317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048327">SUSE bug 1048327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048356">SUSE bug 1048356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050060">SUSE bug 1050060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050231">SUSE bug 1050231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051406">SUSE bug 1051406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051635">SUSE bug 1051635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051987">SUSE bug 1051987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052384">SUSE bug 1052384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053309">SUSE bug 1053309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055272">SUSE bug 1055272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056003">SUSE bug 1056003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056365">SUSE bug 1056365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056427">SUSE bug 1056427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056587">SUSE bug 1056587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056596">SUSE bug 1056596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056652">SUSE bug 1056652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056979">SUSE bug 1056979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057079">SUSE bug 1057079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057199">SUSE bug 1057199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057820">SUSE bug 1057820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058413">SUSE bug 1058413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059639">SUSE bug 1059639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060333">SUSE bug 1060333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061756">SUSE bug 1061756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062496">SUSE bug 1062496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062835">SUSE bug 1062835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062941">SUSE bug 1062941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063026">SUSE bug 1063026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063349">SUSE bug 1063349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063516">SUSE bug 1063516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064206">SUSE bug 1064206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064320">SUSE bug 1064320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064591">SUSE bug 1064591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064597">SUSE bug 1064597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064606">SUSE bug 1064606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064701">SUSE bug 1064701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064926">SUSE bug 1064926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065101">SUSE bug 1065101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065180">SUSE bug 1065180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065639">SUSE bug 1065639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065692">SUSE bug 1065692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065717">SUSE bug 1065717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065866">SUSE bug 1065866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065959">SUSE bug 1065959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066045">SUSE bug 1066045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066175">SUSE bug 1066175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066192">SUSE bug 1066192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066213">SUSE bug 1066213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066223">SUSE bug 1066223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066285">SUSE bug 1066285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066382">SUSE bug 1066382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066470">SUSE bug 1066470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066471">SUSE bug 1066471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066472">SUSE bug 1066472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066573">SUSE bug 1066573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066606">SUSE bug 1066606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066629">SUSE bug 1066629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066660">SUSE bug 1066660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066696">SUSE bug 1066696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066767">SUSE bug 1066767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066812">SUSE bug 1066812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066974">SUSE bug 1066974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067105">SUSE bug 1067105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067132">SUSE bug 1067132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067225">SUSE bug 1067225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067494">SUSE bug 1067494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067734">SUSE bug 1067734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067735">SUSE bug 1067735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067888">SUSE bug 1067888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067906">SUSE bug 1067906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068671">SUSE bug 1068671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068978">SUSE bug 1068978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068980">SUSE bug 1068980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068982">SUSE bug 1068982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069152">SUSE bug 1069152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069250">SUSE bug 1069250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069270">SUSE bug 1069270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069277">SUSE bug 1069277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069484">SUSE bug 1069484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069583">SUSE bug 1069583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069721">SUSE bug 1069721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069793">SUSE bug 1069793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069879">SUSE bug 1069879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069916">SUSE bug 1069916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069942">SUSE bug 1069942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069996">SUSE bug 1069996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070001">SUSE bug 1070001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070006">SUSE bug 1070006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070145">SUSE bug 1070145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070169">SUSE bug 1070169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070404">SUSE bug 1070404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070535">SUSE bug 1070535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070767">SUSE bug 1070767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070771">SUSE bug 1070771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070805">SUSE bug 1070805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070825">SUSE bug 1070825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070964">SUSE bug 1070964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071693">SUSE bug 1071693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071694">SUSE bug 1071694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071695">SUSE bug 1071695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071833">SUSE bug 1071833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072589">SUSE bug 1072589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744692">SUSE bug 744692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789311">SUSE bug 789311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964944">SUSE bug 964944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966170">SUSE bug 966170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966172">SUSE bug 966172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969470">SUSE bug 969470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979928">SUSE bug 979928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989261">SUSE bug 989261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996376">SUSE bug 996376</bugzilla>
	<cve impact="moderate" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000410/">CVE-2017-1000410</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11600/">CVE-2017-11600</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12193/">CVE-2017-12193</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15115/">CVE-2017-15115</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16528/">CVE-2017-16528</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16536/">CVE-2017-16536</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16537/">CVE-2017-16537</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16645/">CVE-2017-16645</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16646/">CVE-2017-16646</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16994/">CVE-2017-16994</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17448/">CVE-2017-17448</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17449/">CVE-2017-17449</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17450/">CVE-2017-17450</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7482/">CVE-2017-7482</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8824/">CVE-2017-8824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519637" comment="kernel-default-4.4.103-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519638" comment="kernel-default-devel-4.4.103-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519639" comment="kernel-default-extra-4.4.103-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519640" comment="kernel-devel-4.4.103-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519641" comment="kernel-macros-4.4.103-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519642" comment="kernel-source-4.4.103-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519643" comment="kernel-syms-4.4.103-6.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78263" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1046856" ref_url="https://bugzilla.suse.com/1046856" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000083" ref_url="https://www.suse.com/security/cve/CVE-2017-1000083/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00089.html" source="SUSE-SU"/>
		<description>
This update for evince fixes the following issues:

Security issue fixed:

- CVE-2017-1000083: Remove support for tar and tar-like commands in comics backend (bsc#1046856).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-22"/>
	<updated date="2017-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046856">SUSE bug 1046856</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000083/">CVE-2017-1000083</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518420" comment="evince-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518421" comment="evince-browser-plugin-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518422" comment="evince-lang-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518423" comment="evince-plugin-djvudocument-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518424" comment="evince-plugin-dvidocument-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518425" comment="evince-plugin-pdfdocument-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518426" comment="evince-plugin-psdocument-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518427" comment="evince-plugin-tiffdocument-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518428" comment="evince-plugin-xpsdocument-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518429" comment="libevdocument3-4-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518430" comment="libevview3-3-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518431" comment="nautilus-evince-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518432" comment="typelib-1_0-EvinceDocument-3_0-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518433" comment="typelib-1_0-EvinceView-3_0-3.20.2-6.19.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78264" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1070727" ref_url="https://bugzilla.suse.com/1070727" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17083" ref_url="https://www.suse.com/security/cve/CVE-2017-17083/" source="CVE"/>
		<reference ref_id="CVE-2017-17084" ref_url="https://www.suse.com/security/cve/CVE-2017-17084/" source="CVE"/>
		<reference ref_id="CVE-2017-17085" ref_url="https://www.suse.com/security/cve/CVE-2017-17085/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003554.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:
 
 - CVE-2017-17083: NetBIOS dissector could crash. This was addressed in 
   epan/dissectors/packet-netbios.c by ensuring that write operations are bounded by the beginning of a buffer. (bsc#1070727)
 - CVE-2017-17084: IWARP_MPA dissector could crash. This was addressed in epan/dissectors/packet-iwarp-mpa.c by 
   validating a ULPDU length. (bsc#1070727)
 - CVE-2017-17085: the CIP Safety dissector could crash. This was addressed in epan/dissectors/packet-cipsafety.c 
   by validating the packet length. (bsc#1070727)

 		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-27"/>
	<updated date="2017-12-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1070727">SUSE bug 1070727</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17083/">CVE-2017-17083</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17084/">CVE-2017-17084</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17085/">CVE-2017-17085</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518434" comment="libwireshark8-2.2.11-48.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518435" comment="libwiretap6-2.2.11-48.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518436" comment="libwscodecs1-2.2.11-48.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518437" comment="libwsutil7-2.2.11-48.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518438" comment="wireshark-2.2.11-48.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518439" comment="wireshark-gtk-2.2.11-48.15.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78265" version="1" class="patch">
	<metadata>
		<title>Security update for gdk-pixbuf (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1053417" ref_url="https://bugzilla.suse.com/1053417" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003556.html" source="SUSE-SU"/>
		<description>

This update for gdk-pixbuf provides the following fixes:

- Add overflow checks when creating pixbuf structures in general
- Fix arithmetic overflow in the BMP loader (bsc#1053417) 
- Adds support for BMPv3 with bitmasks (bsc#1053417) 
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-27"/>
	<updated date="2017-12-27"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1053417">SUSE bug 1053417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518440" comment="gdk-pixbuf-lang-2.34.0-19.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518441" comment="gdk-pixbuf-query-loaders-2.34.0-19.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518442" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518443" comment="libgdk_pixbuf-2_0-0-2.34.0-19.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518444" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518445" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78266" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1056993" ref_url="https://bugzilla.suse.com/1056993" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6362" ref_url="https://www.suse.com/security/cve/CVE-2017-6362/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003613.html" source="SUSE-SU"/>
		<description>
This update for gd fixes one issues.

This security issue was fixed:

- CVE-2017-6362: Prevent double-free in gdImagePngPtr() that potentially allowed for DoS or remote code execution (bsc#1056993).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-18"/>
	<updated date="2018-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056993">SUSE bug 1056993</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6362/">CVE-2017-6362</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518754" comment="gd-2.1.0-24.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518755" comment="gd-32bit-2.1.0-24.3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78267" version="1" class="patch">
	<metadata>
		<title>Security update for xdg-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1093086" ref_url="https://bugzilla.suse.com/1093086" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18266" ref_url="https://www.suse.com/security/cve/CVE-2017-18266/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004111.html" source="SUSE-SU"/>
		<description>
This update for xdg-utils fixes the following issues:

Security issue:

- CVE-2017-18266: Fix an argument injection when BROWSER contains %s (bsc#1093086).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-04"/>
	<updated date="2018-06-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1093086">SUSE bug 1093086</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18266/">CVE-2017-18266</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519644" comment="xdg-utils-20140630-6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78268" version="1" class="patch">
	<metadata>
		<title>Security update for zziplib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1079094" ref_url="https://bugzilla.suse.com/1079094" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6542" ref_url="https://www.suse.com/security/cve/CVE-2018-6542/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004116.html" source="SUSE-SU"/>
		<description>
This update for zziplib fixes the following issues:

Security issue fixed:

- CVE-2018-6542: Reject file if the size of the central directory is too big and display an error message (bsc#1079094).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-05"/>
	<updated date="2018-06-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1079094">SUSE bug 1079094</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6542/">CVE-2018-6542</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519645" comment="libzzip-0-13-0.13.67-10.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78269" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1086690" ref_url="https://bugzilla.suse.com/1086690" source="BUGZILLA"/>
		<reference ref_id="1094150" ref_url="https://bugzilla.suse.com/1094150" source="BUGZILLA"/>
		<reference ref_id="1094154" ref_url="https://bugzilla.suse.com/1094154" source="BUGZILLA"/>
		<reference ref_id="1094161" ref_url="https://bugzilla.suse.com/1094161" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18269" ref_url="https://www.suse.com/security/cve/CVE-2017-18269/" source="CVE"/>
		<reference ref_id="CVE-2018-11236" ref_url="https://www.suse.com/security/cve/CVE-2018-11236/" source="CVE"/>
		<reference ref_id="CVE-2018-11237" ref_url="https://www.suse.com/security/cve/CVE-2018-11237/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004156.html" source="SUSE-SU"/>
		<description>

  
This update for glibc fixes the following issues:

- CVE-2017-18269: Fix SSE2 memmove issue when crossing 2GB boundary (bsc#1094150)
- CVE-2018-11236: Fix overflow in path length computation (bsc#1094161)
- CVE-2018-11237: Don't write beyond buffer destination in __mempcpy_avx512_no_vzeroupper (bsc#1094154)

Non security bugs fixed:

- Fix crash in resolver on memory allocation failure (bsc#1086690)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-06"/>
	<updated date="2018-06-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1086690">SUSE bug 1086690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094150">SUSE bug 1094150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094154">SUSE bug 1094154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094161">SUSE bug 1094161</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18269/">CVE-2017-18269</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11236/">CVE-2018-11236</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11237/">CVE-2018-11237</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519646" comment="glibc-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519647" comment="glibc-32bit-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519648" comment="glibc-devel-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519649" comment="glibc-devel-32bit-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519650" comment="glibc-i18ndata-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519651" comment="glibc-locale-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519652" comment="glibc-locale-32bit-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519653" comment="nscd-2.22-62.13.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78270" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1091070" ref_url="https://bugzilla.suse.com/1091070" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10392" ref_url="https://www.suse.com/security/cve/CVE-2018-10392/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004158.html" source="SUSE-SU"/>
		<description>
This update for libvorbis fixes the following issues:
  
The following security issue was fixed:
  
- Fixed the validation of channels in mapping0_forward(), which previously
  allowed remote attackers to cause a denial of service via specially crafted
  files (CVE-2018-10392, bsc#1091070)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-07"/>
	<updated date="2018-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091070">SUSE bug 1091070</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10392/">CVE-2018-10392</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519654" comment="libvorbis0-1.3.3-10.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519655" comment="libvorbis0-32bit-1.3.3-10.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519656" comment="libvorbisenc2-1.3.3-10.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519657" comment="libvorbisenc2-32bit-1.3.3-10.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519658" comment="libvorbisfile3-1.3.3-10.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519659" comment="libvorbisfile3-32bit-1.3.3-10.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78271" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1095735" ref_url="https://bugzilla.suse.com/1095735" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004162.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

This security issue was fixed:

- CVE-2017-5715: Prevent unauthorized disclosure of information to an attacker
  with local user access caused by speculative execution and indirect branch
  prediction (bsc#1095735)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-07"/>
	<updated date="2018-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1095735">SUSE bug 1095735</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519660" comment="kernel-firmware-20170530-21.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519661" comment="ucode-amd-20170530-21.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78272" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1045939" ref_url="https://bugzilla.suse.com/1045939" source="BUGZILLA"/>
		<reference ref_id="1059066" ref_url="https://bugzilla.suse.com/1059066" source="BUGZILLA"/>
		<reference ref_id="1059101" ref_url="https://bugzilla.suse.com/1059101" source="BUGZILLA"/>
		<reference ref_id="1059155" ref_url="https://bugzilla.suse.com/1059155" source="BUGZILLA"/>
		<reference ref_id="1060220" ref_url="https://bugzilla.suse.com/1060220" source="BUGZILLA"/>
		<reference ref_id="1061092" ref_url="https://bugzilla.suse.com/1061092" source="BUGZILLA"/>
		<reference ref_id="1061263" ref_url="https://bugzilla.suse.com/1061263" source="BUGZILLA"/>
		<reference ref_id="1061264" ref_url="https://bugzilla.suse.com/1061264" source="BUGZILLA"/>
		<reference ref_id="1061265" ref_url="https://bugzilla.suse.com/1061265" source="BUGZILLA"/>
		<reference ref_id="1064593" ref_url="https://bugzilla.suse.com/1064593" source="BUGZILLA"/>
		<reference ref_id="1074453" ref_url="https://bugzilla.suse.com/1074453" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000456" ref_url="https://www.suse.com/security/cve/CVE-2017-1000456/" source="CVE"/>
		<reference ref_id="CVE-2017-14517" ref_url="https://www.suse.com/security/cve/CVE-2017-14517/" source="CVE"/>
		<reference ref_id="CVE-2017-14518" ref_url="https://www.suse.com/security/cve/CVE-2017-14518/" source="CVE"/>
		<reference ref_id="CVE-2017-14520" ref_url="https://www.suse.com/security/cve/CVE-2017-14520/" source="CVE"/>
		<reference ref_id="CVE-2017-14617" ref_url="https://www.suse.com/security/cve/CVE-2017-14617/" source="CVE"/>
		<reference ref_id="CVE-2017-14928" ref_url="https://www.suse.com/security/cve/CVE-2017-14928/" source="CVE"/>
		<reference ref_id="CVE-2017-14975" ref_url="https://www.suse.com/security/cve/CVE-2017-14975/" source="CVE"/>
		<reference ref_id="CVE-2017-14976" ref_url="https://www.suse.com/security/cve/CVE-2017-14976/" source="CVE"/>
		<reference ref_id="CVE-2017-14977" ref_url="https://www.suse.com/security/cve/CVE-2017-14977/" source="CVE"/>
		<reference ref_id="CVE-2017-15565" ref_url="https://www.suse.com/security/cve/CVE-2017-15565/" source="CVE"/>
		<reference ref_id="CVE-2017-9865" ref_url="https://www.suse.com/security/cve/CVE-2017-9865/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004186.html" source="SUSE-SU"/>
		<description>
This update for poppler fixes the following issues:

These security issues were fixed:

- CVE-2017-14517: Prevent NULL Pointer dereference in the XRef::parseEntry()
  function via a crafted PDF document (bsc#1059066).
- CVE-2017-9865: Fixed a stack-based buffer overflow vulnerability
  in GfxState.cc that would have allowed attackers to facilitate
  a denial-of-service attack via specially crafted PDF
  documents. (bsc#1045939)
- CVE-2017-14518: Remedy a floating point exception in
  isImageInterpolationRequired() that could have been exploited using a
  specially crafted PDF document. (bsc#1059101)
- CVE-2017-14520: Remedy a floating point exception in
  Splash::scaleImageYuXd() that could have been exploited using a specially
  crafted PDF document. (bsc#1059155)
- CVE-2017-14617: Fixed a floating point exception in Stream.cc,
  which may lead to a potential attack when handling malicious PDF
  files. (bsc#1060220)
- CVE-2017-14928: Fixed a NULL Pointer dereference in
  AnnotRichMedia::Configuration::Configuration() in Annot.cc, which may
  lead to a potential attack when handling malicious PDF
  files. (bsc#1061092)
- CVE-2017-14975: Fixed a NULL pointer dereference vulnerability,
  that existed because a data structure in FoFiType1C.cc was not
  initialized, which allowed an attacker to launch a denial of service
  attack. (bsc#1061263)
- CVE-2017-14976: Fixed a heap-based buffer over-read vulnerability in
  FoFiType1C.cc that occurred when an out-of-bounds font dictionary index
  was encountered, which allowed an attacker to launch a denial of service
  attack. (bsc#1061264)
- CVE-2017-14977: Fixed a NULL pointer dereference vulnerability in the
  FoFiTrueType::getCFFBlock() function in FoFiTrueType.cc that occurred
  due to lack of validation of a table pointer, which allows an attacker
  to launch a denial of service attack. (bsc#1061265)
- CVE-2017-15565: Prevent NULL Pointer dereference in the
  GfxImageColorMap::getGrayLine() function via a crafted PDF document
  (bsc#1064593).
- CVE-2017-1000456: Validate boundaries in TextPool::addWord to prevent
  overflows in subsequent calculations (bsc#1074453).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-12"/>
	<updated date="2018-06-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1045939">SUSE bug 1045939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059066">SUSE bug 1059066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059101">SUSE bug 1059101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059155">SUSE bug 1059155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060220">SUSE bug 1060220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061092">SUSE bug 1061092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061263">SUSE bug 1061263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061264">SUSE bug 1061264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061265">SUSE bug 1061265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064593">SUSE bug 1064593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074453">SUSE bug 1074453</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000456/">CVE-2017-1000456</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14517/">CVE-2017-14517</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14518/">CVE-2017-14518</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14520/">CVE-2017-14520</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14617/">CVE-2017-14617</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14928/">CVE-2017-14928</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14975/">CVE-2017-14975</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14976/">CVE-2017-14976</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14977/">CVE-2017-14977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15565/">CVE-2017-15565</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9865/">CVE-2017-9865</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519662" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519663" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519664" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519665" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78273" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1091836" ref_url="https://bugzilla.suse.com/1091836" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:1661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004185.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Update to version 20180425 (bsc#1091836)

Fix provided for:

- GLK          B0       6-7a-1/01 0000001e-&gt;00000022 Pentium Silver N/J5xxx, Celeron N/J4xxx

- Name microcodes which are not allowed to load late
  with a *.early suffix
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-12"/>
	<updated date="2018-06-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091836">SUSE bug 1091836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519666" comment="ucode-intel-20180425-13.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78274" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1081024" ref_url="https://bugzilla.suse.com/1081024" source="BUGZILLA"/>
		<reference ref_id="1093664" ref_url="https://bugzilla.suse.com/1093664" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1057" ref_url="https://www.suse.com/security/cve/CVE-2018-1057/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004187.html" source="SUSE-SU"/>
		<description>

  
Samba was updated to 4.6.14, fixing bugs and security issues:

Version update to 4.6.14 (bsc#1093664):

+ vfs_ceph: add fake async pwrite/pread send/recv hooks; (bso#13425).
+ Fix memory leak in vfs_ceph; (bso#13424).
+ winbind: avoid using fstrcpy(dcname,...) in _dual_init_connection;
  (bso#13294).
+ s3:smb2_server: correctly maintain request counters for compound
  requests; (bso#13215).
+ s3: smbd: Unix extensions attempts to change wrong field in fchown
  call; (bso#13375).
+ s3:smbd: map nterror on smb2_flush errorpath; (bso#13338).
+ vfs_glusterfs: Fix the wrong pointer being sent in glfs_fsync_async;
  (bso#13297).
+ s3: smbd: Fix possible directory fd leak if the underlying OS doesn't
  support fdopendir(); (bso#13270).
+ s3: ldap: Ensure the ADS_STRUCT pointer doesn't get freed on error, we
  don't own it here; (bso#13244).
+ s3:libsmb: allow -U'\\administrator' to work; (bso#13206).
+ CVE-2018-1057: s4:dsdb: fix unprivileged password changes;
  (bso#13272); (bsc#1081024).
+ s3:smbd: Do not crash if we fail to init the session table;
  (bso#13315).
+ libsmb: Use smb2 tcon if conn_protocol &gt;= SMB2_02; (bso#13310).
+ smbXcli: Add 'force_channel_sequence'; (bso#13215).
+ smbd: Fix channel sequence number checks for long-running requests;
  (bso#13215).
+ s3:smb2_server: allow logoff, close, unlock, cancel and echo on
  expired sessions; (bso#13197).
+ s3:smbd: return the correct error for cancelled SMB2 notifies on
  expired sessions; (bso#13197).
+ samba: Only use async signal-safe functions in signal handler;
  (bso#13240).
+ subnet: Avoid a segfault when renaming subnet objects; (bso#13031).

- Fix vfs_ceph with 'aio read size' or 'aio write size' &gt; 0;
  (bsc#1093664).
  + vfs_ceph: add fake async pwrite/pread send/recv hooks; (bso#13425).
  + Fix memory leak in vfs_ceph; (bso#13424).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-13"/>
	<updated date="2018-06-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081024">SUSE bug 1081024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093664">SUSE bug 1093664</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1057/">CVE-2018-1057</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519667" comment="libdcerpc-binding0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519668" comment="libdcerpc-binding0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519669" comment="libdcerpc0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519670" comment="libdcerpc0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519671" comment="libndr-krb5pac0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519672" comment="libndr-krb5pac0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519673" comment="libndr-nbt0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519674" comment="libndr-nbt0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519675" comment="libndr-standard0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519676" comment="libndr-standard0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519677" comment="libndr0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519678" comment="libndr0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519679" comment="libnetapi0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519680" comment="libnetapi0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519681" comment="libsamba-credentials0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519682" comment="libsamba-credentials0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519683" comment="libsamba-errors0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519684" comment="libsamba-errors0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519685" comment="libsamba-hostconfig0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519686" comment="libsamba-hostconfig0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519687" comment="libsamba-passdb0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519688" comment="libsamba-passdb0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519689" comment="libsamba-util0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519690" comment="libsamba-util0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519691" comment="libsamdb0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519692" comment="libsamdb0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519693" comment="libsmbclient0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519694" comment="libsmbclient0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519695" comment="libsmbconf0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519696" comment="libsmbconf0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519697" comment="libsmbldap0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519698" comment="libsmbldap0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519699" comment="libtevent-util0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519700" comment="libtevent-util0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519701" comment="libwbclient0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519702" comment="libwbclient0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519703" comment="samba-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519704" comment="samba-client-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519705" comment="samba-client-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519706" comment="samba-doc-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519707" comment="samba-libs-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519708" comment="samba-libs-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519709" comment="samba-winbind-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519710" comment="samba-winbind-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78275" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1087066" ref_url="https://bugzilla.suse.com/1087066" source="BUGZILLA"/>
		<reference ref_id="1090023" ref_url="https://bugzilla.suse.com/1090023" source="BUGZILLA"/>
		<reference ref_id="1090024" ref_url="https://bugzilla.suse.com/1090024" source="BUGZILLA"/>
		<reference ref_id="1090025" ref_url="https://bugzilla.suse.com/1090025" source="BUGZILLA"/>
		<reference ref_id="1090026" ref_url="https://bugzilla.suse.com/1090026" source="BUGZILLA"/>
		<reference ref_id="1090027" ref_url="https://bugzilla.suse.com/1090027" source="BUGZILLA"/>
		<reference ref_id="1090028" ref_url="https://bugzilla.suse.com/1090028" source="BUGZILLA"/>
		<reference ref_id="1090029" ref_url="https://bugzilla.suse.com/1090029" source="BUGZILLA"/>
		<reference ref_id="1090030" ref_url="https://bugzilla.suse.com/1090030" source="BUGZILLA"/>
		<reference ref_id="1090032" ref_url="https://bugzilla.suse.com/1090032" source="BUGZILLA"/>
		<reference ref_id="1090033" ref_url="https://bugzilla.suse.com/1090033" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="CVE-2018-2815" ref_url="https://www.suse.com/security/cve/CVE-2018-2815/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version 8u171 fixes the following issues:

These security issues were fixed:

- S8180881: Better packaging of deserialization
- S8182362: Update CipherOutputStream Usage
- S8183032: Upgrade to LittleCMS 2.9
- S8189123: More consistent classloading
- S8189969, CVE-2018-2790, bsc#1090023: Manifest better manifest entries
- S8189977, CVE-2018-2795, bsc#1090025: Improve permission portability
- S8189981, CVE-2018-2796, bsc#1090026: Improve queuing portability
- S8189985, CVE-2018-2797, bsc#1090027: Improve tabular data portability
- S8189989, CVE-2018-2798, bsc#1090028: Improve container portability
- S8189993, CVE-2018-2799, bsc#1090029: Improve document portability
- S8189997, CVE-2018-2794, bsc#1090024: Enhance keystore mechanisms
- S8190478: Improved interface method selection
- S8190877: Better handling of abstract classes
- S8191696: Better mouse positioning
- S8192025, CVE-2018-2814, bsc#1090032: Less referential references
- S8192030: Better MTSchema support
- S8192757, CVE-2018-2815, bsc#1090033: Improve stub classes implementation
- S8193409: Improve AES supporting classes
- S8193414: Improvements in MethodType lookups
- S8193833, CVE-2018-2800, bsc#1090030: Better RMI connection support

For other changes please consult the changelog.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-14"/>
	<updated date="2018-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087066">SUSE bug 1087066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090023">SUSE bug 1090023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090024">SUSE bug 1090024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090025">SUSE bug 1090025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090026">SUSE bug 1090026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090027">SUSE bug 1090027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090028">SUSE bug 1090028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090029">SUSE bug 1090029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090030">SUSE bug 1090030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090032">SUSE bug 1090032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090033">SUSE bug 1090033</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2815/">CVE-2018-2815</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519711" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519712" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78276" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1090023" ref_url="https://bugzilla.suse.com/1090023" source="BUGZILLA"/>
		<reference ref_id="1090024" ref_url="https://bugzilla.suse.com/1090024" source="BUGZILLA"/>
		<reference ref_id="1090025" ref_url="https://bugzilla.suse.com/1090025" source="BUGZILLA"/>
		<reference ref_id="1090026" ref_url="https://bugzilla.suse.com/1090026" source="BUGZILLA"/>
		<reference ref_id="1090027" ref_url="https://bugzilla.suse.com/1090027" source="BUGZILLA"/>
		<reference ref_id="1090028" ref_url="https://bugzilla.suse.com/1090028" source="BUGZILLA"/>
		<reference ref_id="1090029" ref_url="https://bugzilla.suse.com/1090029" source="BUGZILLA"/>
		<reference ref_id="1090030" ref_url="https://bugzilla.suse.com/1090030" source="BUGZILLA"/>
		<reference ref_id="1090032" ref_url="https://bugzilla.suse.com/1090032" source="BUGZILLA"/>
		<reference ref_id="1090033" ref_url="https://bugzilla.suse.com/1090033" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="CVE-2018-2815" ref_url="https://www.suse.com/security/cve/CVE-2018-2815/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk to version 7u181 fixes the following issues:

+ S8162488: JDK should be updated to use LittleCMS 2.8
+ S8180881: Better packaging of deserialization
+ S8182362: Update CipherOutputStream Usage
+ S8183032: Upgrade to LittleCMS 2.9
+ S8189123: More consistent classloading
+ S8190478: Improved interface method selection
+ S8190877: Better handling of abstract classes
+ S8191696: Better mouse positioning
+ S8192030: Better MTSchema support
+ S8193409: Improve AES supporting classes
+ S8193414: Improvements in MethodType lookups
+ S8189969, CVE-2018-2790, bsc#1090023: Manifest better manifest entries
+ S8189977, CVE-2018-2795, bsc#1090025: Improve permission portability
+ S8189981, CVE-2018-2796, bsc#1090026: Improve queuing portability
+ S8189985, CVE-2018-2797, bsc#1090027: Improve tabular data portability
+ S8189989, CVE-2018-2798, bsc#1090028: Improve container portability
+ S8189993, CVE-2018-2799, bsc#1090029: Improve document portability
+ S8189997, CVE-2018-2794, bsc#1090024: Enhance keystore mechanisms
+ S8192025, CVE-2018-2814, bsc#1090032: Less referential references
+ S8192757, CVE-2018-2815, bsc#1090033: Improve stub classes implementation
+ S8193833, CVE-2018-2800, bsc#1090030: Better RMI connection support

For additional changes please consult the changelog.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-14"/>
	<updated date="2018-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090023">SUSE bug 1090023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090024">SUSE bug 1090024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090025">SUSE bug 1090025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090026">SUSE bug 1090026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090027">SUSE bug 1090027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090028">SUSE bug 1090028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090029">SUSE bug 1090029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090030">SUSE bug 1090030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090032">SUSE bug 1090032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090033">SUSE bug 1090033</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2815/">CVE-2018-2815</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519713" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519714" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78277" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1091610" ref_url="https://bugzilla.suse.com/1091610" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1115" ref_url="https://www.suse.com/security/cve/CVE-2018-1115/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004192.html" source="SUSE-SU"/>
		<description>

  
PostgreSQL was updated to 9.6.9 fixing bugs and security issues:

Release notes:

- https://www.postgresql.org/about/news/1851/
- https://www.postgresql.org/docs/current/static/release-9-6-9.html

  A dump/restore is not required for those running 9.6.X.
  However, if you use the adminpack extension, you should update
  it as per the first changelog entry below.
  Also, if the function marking mistakes mentioned in the second
  and third changelog entries below affect you, you will want to
  take steps to correct your database catalogs.

Security issue fixed:

- CVE-2018-1115: Remove public execute privilege
  from contrib/adminpack's pg_logfile_rotate() function
  pg_logfile_rotate() is a deprecated wrapper for the core
  function pg_rotate_logfile(). When that function was changed
  to rely on SQL privileges for access control rather than a
  hard-coded superuser check, pg_logfile_rotate() should have
  been updated as well, but the need for this was missed. Hence,
  if adminpack is installed, any user could request a logfile
  rotation, creating a minor security issue.
  After installing this update, administrators should update
  adminpack by performing ALTER EXTENSION adminpack UPDATE in
  each database in which adminpack is installed. (bsc#1091610)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-14"/>
	<updated date="2018-06-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091610">SUSE bug 1091610</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1115/">CVE-2018-1115</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519715" comment="libecpg6-9.6.9-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519716" comment="libpq5-9.6.9-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519717" comment="libpq5-32bit-9.6.9-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519718" comment="postgresql96-9.6.9-3.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78278" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1096745" ref_url="https://bugzilla.suse.com/1096745" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12020" ref_url="https://www.suse.com/security/cve/CVE-2018-12020/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004194.html" source="SUSE-SU"/>
		<description>
This update for gpg2 fixes the following security issue:

- CVE-2018-12020: GnuPG mishandled the original filename during decryption and
  verification actions, which allowed remote attackers to spoof the output that
  GnuPG sends on file descriptor 2 to other programs that use the '--status-fd 2'
  option (bsc#1096745)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-15"/>
	<updated date="2018-06-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096745">SUSE bug 1096745</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12020/">CVE-2018-12020</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519719" comment="gpg2-2.0.24-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519720" comment="gpg2-lang-2.0.24-9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78279" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1076503" ref_url="https://bugzilla.suse.com/1076503" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5764" ref_url="https://www.suse.com/security/cve/CVE-2018-5764/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003619.html" source="SUSE-SU"/>
		<description>
This update for rsync fixes one issues.

This security issue was fixed:

- CVE-2018-5764: The parse_arguments function in options.c did not prevent
  multiple --protect-args uses, which allowed remote attackers to bypass an
  argument-sanitization protection mechanism (bsc#1076503).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-22"/>
	<updated date="2018-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076503">SUSE bug 1076503</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5764/">CVE-2018-5764</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518763" comment="rsync-3.1.0-13.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78280" version="1" class="patch">
	<metadata>
		<title>Security update for procmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1068648" ref_url="https://bugzilla.suse.com/1068648" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16844" ref_url="https://www.suse.com/security/cve/CVE-2017-16844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003618.html" source="SUSE-SU"/>
		<description>
This update for procmail fixes the following issues:

- CVE-2017-16844: Heap-based buffer overflow in loadbuf function could lead to remote denial of service (bsc#1068648)
  
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-22"/>
	<updated date="2018-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068648">SUSE bug 1068648</bugzilla>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16844/">CVE-2017-16844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518764" comment="procmail-3.22-269.3.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78281" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1077445" ref_url="https://bugzilla.suse.com/1077445" source="BUGZILLA"/>
		<reference ref_id="1082063" ref_url="https://bugzilla.suse.com/1082063" source="BUGZILLA"/>
		<reference ref_id="1082210" ref_url="https://bugzilla.suse.com/1082210" source="BUGZILLA"/>
		<reference ref_id="1083417" ref_url="https://bugzilla.suse.com/1083417" source="BUGZILLA"/>
		<reference ref_id="1083420" ref_url="https://bugzilla.suse.com/1083420" source="BUGZILLA"/>
		<reference ref_id="1083422" ref_url="https://bugzilla.suse.com/1083422" source="BUGZILLA"/>
		<reference ref_id="1083424" ref_url="https://bugzilla.suse.com/1083424" source="BUGZILLA"/>
		<reference ref_id="1083426" ref_url="https://bugzilla.suse.com/1083426" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549/" source="CVE"/>
		<reference ref_id="CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170/" source="CVE"/>
		<reference ref_id="CVE-2018-7182" ref_url="https://www.suse.com/security/cve/CVE-2018-7182/" source="CVE"/>
		<reference ref_id="CVE-2018-7183" ref_url="https://www.suse.com/security/cve/CVE-2018-7183/" source="CVE"/>
		<reference ref_id="CVE-2018-7184" ref_url="https://www.suse.com/security/cve/CVE-2018-7184/" source="CVE"/>
		<reference ref_id="CVE-2018-7185" ref_url="https://www.suse.com/security/cve/CVE-2018-7185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004208.html" source="SUSE-SU"/>
		<description>
This update for ntp fixes the following issues:

- Update to 4.2.8p11 (bsc#1082210):
  * CVE-2016-1549: Sybil vulnerability: ephemeral association
    attack. While fixed in ntp-4.2.8p7, there are significant
    additional protections for this issue in 4.2.8p11.
  * CVE-2018-7182: ctl_getitem(): buffer read overrun
    leads to undefined behavior and information leak. (bsc#1083426)
  * CVE-2018-7170: Multiple authenticated ephemeral
    associations. (bsc#1083424)
  * CVE-2018-7184: Interleaved symmetric mode cannot
    recover from bad state. (bsc#1083422)
  * CVE-2018-7185: Unauthenticated packet can reset
    authenticated interleaved association. (bsc#1083420)
  * CVE-2018-7183: ntpq:decodearr() can write beyond its
    buffer limit.(bsc#1083417)
- Don't use libevent's cached time stamps in sntp. (bsc#1077445)

This update is a reissue of the previous update with LTSS channels included.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-20"/>
	<updated date="2018-06-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077445">SUSE bug 1077445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082063">SUSE bug 1082063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082210">SUSE bug 1082210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083417">SUSE bug 1083417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083420">SUSE bug 1083420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083422">SUSE bug 1083422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083426">SUSE bug 1083426</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7182/">CVE-2018-7182</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-7183/">CVE-2018-7183</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7184/">CVE-2018-7184</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7185/">CVE-2018-7185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519721" comment="ntp-4.2.8p11-64.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519722" comment="ntp-doc-4.2.8p11-64.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78282" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1013721" ref_url="https://bugzilla.suse.com/1013721" source="BUGZILLA"/>
		<reference ref_id="1013877" ref_url="https://bugzilla.suse.com/1013877" source="BUGZILLA"/>
		<reference ref_id="1026652" ref_url="https://bugzilla.suse.com/1026652" source="BUGZILLA"/>
		<reference ref_id="1057342" ref_url="https://bugzilla.suse.com/1057342" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7837" ref_url="https://www.suse.com/security/cve/CVE-2016-7837/" source="CVE"/>
		<reference ref_id="CVE-2016-9800" ref_url="https://www.suse.com/security/cve/CVE-2016-9800/" source="CVE"/>
		<reference ref_id="CVE-2016-9804" ref_url="https://www.suse.com/security/cve/CVE-2016-9804/" source="CVE"/>
		<reference ref_id="CVE-2017-1000250" ref_url="https://www.suse.com/security/cve/CVE-2017-1000250/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004212.html" source="SUSE-SU"/>
		<description>
This update for bluez fixes the following issues:

Security issues fixed:

- CVE-2016-9800: Fix hcidump memory leak in pin_code_reply_dump() (bsc#1013721).
- CVE-2016-9804: Fix hcidump buffer overflow in commands_dump() (bsc#1013877).
- CVE-2016-7837: Fix possible buffer overflow, make sure we don't write past the end of the array (bsc#1026652).
- CVE-2017-1000250: Fix information disclosure vulnerability in service_search_attr_req (bsc#1057342).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-21"/>
	<updated date="2018-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013721">SUSE bug 1013721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013877">SUSE bug 1013877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026652">SUSE bug 1026652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057342">SUSE bug 1057342</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7837/">CVE-2016-7837</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9800/">CVE-2016-9800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9804/">CVE-2016-9804</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000250/">CVE-2017-1000250</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519723" comment="bluez-5.13-5.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519724" comment="bluez-cups-5.13-5.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519725" comment="libbluetooth3-5.13-5.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78283" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1024718" ref_url="https://bugzilla.suse.com/1024718" source="BUGZILLA"/>
		<reference ref_id="1031717" ref_url="https://bugzilla.suse.com/1031717" source="BUGZILLA"/>
		<reference ref_id="1035432" ref_url="https://bugzilla.suse.com/1035432" source="BUGZILLA"/>
		<reference ref_id="1041740" ref_url="https://bugzilla.suse.com/1041740" source="BUGZILLA"/>
		<reference ref_id="1045330" ref_url="https://bugzilla.suse.com/1045330" source="BUGZILLA"/>
		<reference ref_id="1056415" ref_url="https://bugzilla.suse.com/1056415" source="BUGZILLA"/>
		<reference ref_id="1066223" ref_url="https://bugzilla.suse.com/1066223" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068054" ref_url="https://bugzilla.suse.com/1068054" source="BUGZILLA"/>
		<reference ref_id="1068951" ref_url="https://bugzilla.suse.com/1068951" source="BUGZILLA"/>
		<reference ref_id="1070404" ref_url="https://bugzilla.suse.com/1070404" source="BUGZILLA"/>
		<reference ref_id="1073311" ref_url="https://bugzilla.suse.com/1073311" source="BUGZILLA"/>
		<reference ref_id="1075428" ref_url="https://bugzilla.suse.com/1075428" source="BUGZILLA"/>
		<reference ref_id="1076049" ref_url="https://bugzilla.suse.com/1076049" source="BUGZILLA"/>
		<reference ref_id="1078583" ref_url="https://bugzilla.suse.com/1078583" source="BUGZILLA"/>
		<reference ref_id="1079152" ref_url="https://bugzilla.suse.com/1079152" source="BUGZILLA"/>
		<reference ref_id="1080542" ref_url="https://bugzilla.suse.com/1080542" source="BUGZILLA"/>
		<reference ref_id="1080656" ref_url="https://bugzilla.suse.com/1080656" source="BUGZILLA"/>
		<reference ref_id="1081500" ref_url="https://bugzilla.suse.com/1081500" source="BUGZILLA"/>
		<reference ref_id="1081514" ref_url="https://bugzilla.suse.com/1081514" source="BUGZILLA"/>
		<reference ref_id="1082153" ref_url="https://bugzilla.suse.com/1082153" source="BUGZILLA"/>
		<reference ref_id="1082504" ref_url="https://bugzilla.suse.com/1082504" source="BUGZILLA"/>
		<reference ref_id="1082979" ref_url="https://bugzilla.suse.com/1082979" source="BUGZILLA"/>
		<reference ref_id="1085185" ref_url="https://bugzilla.suse.com/1085185" source="BUGZILLA"/>
		<reference ref_id="1085308" ref_url="https://bugzilla.suse.com/1085308" source="BUGZILLA"/>
		<reference ref_id="1086400" ref_url="https://bugzilla.suse.com/1086400" source="BUGZILLA"/>
		<reference ref_id="1086716" ref_url="https://bugzilla.suse.com/1086716" source="BUGZILLA"/>
		<reference ref_id="1087036" ref_url="https://bugzilla.suse.com/1087036" source="BUGZILLA"/>
		<reference ref_id="1087086" ref_url="https://bugzilla.suse.com/1087086" source="BUGZILLA"/>
		<reference ref_id="1088871" ref_url="https://bugzilla.suse.com/1088871" source="BUGZILLA"/>
		<reference ref_id="1090435" ref_url="https://bugzilla.suse.com/1090435" source="BUGZILLA"/>
		<reference ref_id="1090534" ref_url="https://bugzilla.suse.com/1090534" source="BUGZILLA"/>
		<reference ref_id="1090734" ref_url="https://bugzilla.suse.com/1090734" source="BUGZILLA"/>
		<reference ref_id="1090955" ref_url="https://bugzilla.suse.com/1090955" source="BUGZILLA"/>
		<reference ref_id="1091594" ref_url="https://bugzilla.suse.com/1091594" source="BUGZILLA"/>
		<reference ref_id="1094532" ref_url="https://bugzilla.suse.com/1094532" source="BUGZILLA"/>
		<reference ref_id="1095042" ref_url="https://bugzilla.suse.com/1095042" source="BUGZILLA"/>
		<reference ref_id="1095147" ref_url="https://bugzilla.suse.com/1095147" source="BUGZILLA"/>
		<reference ref_id="1096037" ref_url="https://bugzilla.suse.com/1096037" source="BUGZILLA"/>
		<reference ref_id="1096140" ref_url="https://bugzilla.suse.com/1096140" source="BUGZILLA"/>
		<reference ref_id="1096214" ref_url="https://bugzilla.suse.com/1096214" source="BUGZILLA"/>
		<reference ref_id="1096242" ref_url="https://bugzilla.suse.com/1096242" source="BUGZILLA"/>
		<reference ref_id="1096281" ref_url="https://bugzilla.suse.com/1096281" source="BUGZILLA"/>
		<reference ref_id="1096751" ref_url="https://bugzilla.suse.com/1096751" source="BUGZILLA"/>
		<reference ref_id="1096982" ref_url="https://bugzilla.suse.com/1096982" source="BUGZILLA"/>
		<reference ref_id="1097234" ref_url="https://bugzilla.suse.com/1097234" source="BUGZILLA"/>
		<reference ref_id="1097356" ref_url="https://bugzilla.suse.com/1097356" source="BUGZILLA"/>
		<reference ref_id="1098009" ref_url="https://bugzilla.suse.com/1098009" source="BUGZILLA"/>
		<reference ref_id="1098012" ref_url="https://bugzilla.suse.com/1098012" source="BUGZILLA"/>
		<reference ref_id="971975" ref_url="https://bugzilla.suse.com/971975" source="BUGZILLA"/>
		<reference ref_id="973378" ref_url="https://bugzilla.suse.com/973378" source="BUGZILLA"/>
		<reference ref_id="978907" ref_url="https://bugzilla.suse.com/978907" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17741" ref_url="https://www.suse.com/security/cve/CVE-2017-17741/" source="CVE"/>
		<reference ref_id="CVE-2017-18241" ref_url="https://www.suse.com/security/cve/CVE-2017-18241/" source="CVE"/>
		<reference ref_id="CVE-2017-18249" ref_url="https://www.suse.com/security/cve/CVE-2017-18249/" source="CVE"/>
		<reference ref_id="CVE-2018-12233" ref_url="https://www.suse.com/security/cve/CVE-2018-12233/" source="CVE"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="CVE-2018-5848" ref_url="https://www.suse.com/security/cve/CVE-2018-5848/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004211.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.136  to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-5848: In the function wmi_set_ie(), the length validation code did
  not handle unsigned integer overflow properly. As a result, a large value of
  the 'ie_len' argument could have caused a buffer overflow (bnc#1097356).
- CVE-2017-18249: The add_free_nid function did not properly track an allocated
  nid, which allowed local users to cause a denial of service (race condition) or
  possibly have unspecified other impact via concurrent threads (bnc#1087036).
- CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX
  registers) between processes. These registers might contain encryption keys
  when doing SSE accelerated AES enc/decryption (bsc#1087086).
- CVE-2017-18241: Prevent a NULL pointer dereference by using a noflush_merge
  option that triggers a NULL value for a flush_cmd_control data structure
  (bnc#1086400).
- CVE-2017-17741: The KVM implementation in the Linux kernel allowed attackers
  to obtain potentially sensitive information from kernel memory, aka a
  write_mmio stack-based out-of-bounds read (bnc#1073311).
- CVE-2018-12233: In the ea_get function in fs/jfs/xattr.c, a memory
  corruption bug in JFS can be triggered by calling setxattr twice with two
  different extended attribute names on the same file. This vulnerability
  can be triggered by an unprivileged user with the ability to create
  files and execute programs. A kmalloc call is incorrect, leading to
  slab-out-of-bounds in jfs_xattr (bnc#1097234).

The following non-security bugs were fixed:

- 8139too: Use disable_irq_nosync() in rtl8139_poll_controller() (bnc#1012382).
- ACPI: acpi_pad: Fix memory leak in power saving threads (bnc#1012382).
- ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c (bnc#1012382).
- ACPICA: Events: add a return on failure from acpi_hw_register_read (bnc#1012382).
- ACPI: processor_perflib: Do not send _PPC change notification if not ready (bnc#1012382).
- affs_lookup(): close a race with affs_remove_link() (bnc#1012382).
- af_key: Always verify length of provided sadb_key (bnc#1012382).
- aio: fix io_destroy(2) vs. lookup_ioctx() race (bnc#1012382).
- alsa: control: fix a redundant-copy issue (bnc#1012382).
- alsa: hda: Add Lenovo C50 All in one to the power_save blacklist (bnc#1012382).
- alsa: hda - Use IS_REACHABLE() for dependency on input (bnc#1012382 bsc#1031717).
- alsa: timer: Call notifier in the same spinlock (bnc#1012382 bsc#973378).
- alsa: timer: Fix pause event notification (bnc#1012382 bsc#973378).
- alsa: usb: mixer: volume quirk for CM102-A+/102S+ (bnc#1012382).
- alsa: vmaster: Propagate slave error (bnc#1012382).
- arc: Fix malformed ARC_EMUL_UNALIGNED default (bnc#1012382).
- arm64: Add ARCH_WORKAROUND_2 probing (bsc#1085308).
- arm64: Add per-cpu infrastructure to call ARCH_WORKAROUND_2 (bsc#1085308).
- arm64: Add 'ssbd' command-line option (bsc#1085308).
- arm64: Add this_cpu_ptr() assembler macro for use in entry.S (bsc#1085308).
- arm64: Add work around for Arm Cortex-A55 Erratum 1024718 (bnc#1012382).
- arm64: alternatives: Add dynamic patching feature (bsc#1085308).
- arm64: assembler: introduce ldr_this_cpu (bsc#1085308).
- arm64: Call ARCH_WORKAROUND_2 on transitions between EL0 and EL1 (bsc#1085308).
- arm64: do not call C code with el0's fp register (bsc#1085308).
- arm64: fix endianness annotation for __apply_alternatives()/get_alt_insn() (bsc#1085308).
- arm64: introduce mov_q macro to move a constant into a 64-bit register (bnc#1012382 bsc#1068032).
- arm64: lse: Add early clobbers to some input/output asm operands (bnc#1012382).
- arm64: spinlock: Fix theoretical trylock() A-B-A with LSE atomics (bnc#1012382).
- arm64: ssbd: Add global mitigation state accessor (bsc#1085308).
- arm64: ssbd: Add prctl interface for per-thread mitigation (bsc#1085308).
- arm64: ssbd: Introduce thread flag to control userspace mitigation (bsc#1085308).
- arm64: ssbd: Restore mitigation status on CPU resume (bsc#1085308).
- arm64: ssbd: Skip apply_ssbd if not using dynamic mitigation (bsc#1085308).
- arm: 8748/1: mm: Define vdso_start, vdso_end as array (bnc#1012382).
- arm: 8769/1: kprobes: Fix to use get_kprobe_ctlblk after irq-disabed (bnc#1012382).
- arm: 8770/1: kprobes: Prohibit probing on optimized_callback (bnc#1012382).
- arm: 8771/1: kprobes: Prohibit kprobes on do_undefinstr (bnc#1012382).
- arm: 8772/1: kprobes: Prohibit kprobes on get_user functions (bnc#1012382).
- arm/arm64: smccc: Add SMCCC-specific return codes (bsc#1085308).
- arm: dts: socfpga: fix GIC PPI warning (bnc#1012382).
- arm: OMAP1: clock: Fix debugfs_create_*() usage (bnc#1012382).
- arm: OMAP2+: timer: fix a kmemleak caused in omap_get_timer_dt (bnc#1012382).
- arm: OMAP3: Fix prm wake interrupt for resume (bnc#1012382).
- arm: OMAP: Fix dmtimer init for omap1 (bnc#1012382).
- asm-generic: provide generic_pmdp_establish() (bnc#1012382).
- ASoC: au1x: Fix timeout tests in au1xac97c_ac97_read() (bnc#1012382 bsc#1031717).
- ASoC: Intel: sst: remove redundant variable dma_dev_name (bnc#1012382).
- ASoC: samsung: i2s: Ensure the RCLK rate is properly determined (bnc#1012382).
- ASoC: topology: create TLV data for dapm widgets (bnc#1012382).
- ath10k: Fix kernel panic while using worker (ath10k_sta_rc_update_wk) (bnc#1012382).
- audit: move calcs after alloc and check when logging set loginuid (bnc#1012382).
- audit: return on memory error to avoid null pointer dereference (bnc#1012382).
- autofs: change autofs4_expire_wait()/do_expire_wait() to take struct path (bsc#1086716).
- autofs: change autofs4_wait() to take struct path (bsc#1086716).
- autofs: use path_has_submounts() to fix unreliable have_submount() checks (bsc#1086716).
- autofs: use path_is_mountpoint() to fix unreliable d_mountpoint() checks (bsc#1086716).
- batman-adv: fix header size check in batadv_dbg_arp() (bnc#1012382).
- batman-adv: fix multicast-via-unicast transmission with AP isolation (bnc#1012382).
- batman-adv: fix packet checksum in receive path (bnc#1012382).
- batman-adv: fix packet loss for broadcasted DHCP packets to a server (bnc#1012382).
- batman-adv: invalidate checksum on fragment reassembly (bnc#1012382).
- bcache: fix for allocator and register thread race (bnc#1012382).
- bcache: fix for data collapse after re-attaching an attached device (bnc#1012382).
- bcache: fix kcrashes with fio in RAID5 backend dev (bnc#1012382).
- bcache: properly set task state in bch_writeback_thread() (bnc#1012382).
- bcache: quit dc-&gt;writeback_thread when BCACHE_DEV_DETACHING is set (bnc#1012382).
- bcache: return attach error when no cache set exist (bnc#1012382).
- block: cancel workqueue entries on blk_mq_freeze_queue() (bsc#1090435).
- Bluetooth: Apply QCA Rome patches for some ATH3012 models (bsc#1082504, bsc#1095147).
- Bluetooth: btusb: Add device ID for RTL8822BE (bnc#1012382).
- Bluetooth: btusb: Add USB ID 7392:a611 for Edimax EW-7611ULB (bnc#1012382).
- bnx2x: use the right constant (bnc#1012382).
- bnxt_en: Check valid VNIC ID in bnxt_hwrm_vnic_set_tpa() (bnc#1012382).
- bonding: do not allow rlb updates to invalid mac (bnc#1012382).
- bpf: fix selftests/bpf test_kmod.sh failure when CONFIG_BPF_JIT_ALWAYS_ON=y (bnc#1012382).
- brcmfmac: Fix check for ISO3166 code (bnc#1012382).
- bridge: check iface upper dev when setting master via ioctl (bnc#1012382).
- Btrfs: bail out on error during replay_dir_deletes (bnc#1012382).
- Btrfs: fix copy_items() return value when logging an inode (bnc#1012382).
- Btrfs: fix crash when trying to resume balance without the resume flag (bnc#1012382).
- Btrfs: fix lockdep splat in btrfs_alloc_subvolume_writers (bnc#1012382).
- Btrfs: fix NULL pointer dereference in log_dir_items (bnc#1012382).
- Btrfs: Fix out of bounds access in btrfs_search_slot (bnc#1012382).
- Btrfs: Fix possible softlock on single core machines (bnc#1012382).
- Btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bnc#1012382).
- Btrfs: fix scrub to repair raid6 corruption (bnc#1012382).
- Btrfs: fix xattr loss after power failure (bnc#1012382).
- Btrfs: send, fix issuing write op when processing hole in no data mode (bnc#1012382).
- Btrfs: set plug for fsync (bnc#1012382).
- Btrfs: tests/qgroup: Fix wrong tree backref level (bnc#1012382).
- cdrom: do not call check_disk_change() inside cdrom_open() (bnc#1012382).
- ceph: delete unreachable code in ceph_check_caps() (bsc#1096214).
- ceph: fix race of queuing delayed caps (bsc#1096214).
- cfg80211: further limit wiphy names to 64 bytes (bnc#1012382 git-fixes).
- cfg80211: further limit wiphy names to 64 bytes (git-fixes).
- cfg80211: limit wiphy names to 128 bytes (bnc#1012382).
- cifs: silence compiler warnings showing up with gcc-8.0.0 (bnc#1012382 bsc#1090734).
- Clarify (and fix) MAX_LFS_FILESIZE macros (bnc#1012382).
- clk: Do not show the incorrect clock phase (bnc#1012382).
- clk: rockchip: Prevent calculating mmc phase if clock rate is zero (bnc#1012382).
- clk: samsung: exynos3250: Fix PLL rates (bnc#1012382).
- clk: samsung: exynos5250: Fix PLL rates (bnc#1012382).
- clk: samsung: exynos5260: Fix PLL rates (bnc#1012382).
- clk: samsung: exynos5433: Fix PLL rates (bnc#1012382).
- clk: samsung: s3c2410: Fix PLL rates (bnc#1012382).
- clocksource/drivers/fsl_ftm_timer: Fix error return checking (bnc#1012382).
- config: arm64: enable Spectre-v4 per-thread mitigation
- Correct the prefix in references tag in previous patches (bsc#1041740).
- cpufreq: cppc_cpufreq: Fix cppc_cpufreq_init() failure path (bnc#1012382).
- cpufreq: CPPC: Initialize shared perf capabilities of CPUs (bnc#1012382).
- cpufreq: intel_pstate: Enable HWP by default (bnc#1012382).
- cpuidle: coupled: remove unused define cpuidle_coupled_lock (bnc#1012382).
- crypto: sunxi-ss - Add MODULE_ALIAS to sun4i-ss (bnc#1012382).
- crypto: vmx - Remove overly verbose printk from AES init routines (bnc#1012382).
- dccp: do not free ccid2_hc_tx_sock struct in dccp_disconnect() (bnc#1012382).
- dccp: fix tasklet usage (bnc#1012382).
- dlm: fix a clerical error when set SCTP_NODELAY (bsc#1091594).
- dlm: make sctp_connect_to_sock() return in specified time (bsc#1080542).
- dlm: remove O_NONBLOCK flag in sctp_connect_to_sock (bsc#1080542).
- dmaengine: ensure dmaengine helpers check valid callback (bnc#1012382).
- dmaengine: pl330: fix a race condition in case of threaded irqs (bnc#1012382).
- dmaengine: rcar-dmac: fix max_chunk_size for R-Car Gen3 (bnc#1012382).
- dmaengine: usb-dmac: fix endless loop in usb_dmac_chan_terminate_all() (bnc#1012382).
- dm thin: fix documentation relative to low water mark threshold (bnc#1012382).
- do d_instantiate/unlock_new_inode combinations safely (bnc#1012382).
- dp83640: Ensure against premature access to PHY registers after reset (bnc#1012382).
- drm/exynos: fix comparison to bitshift when dealing with a mask (bnc#1012382).
- drm/i915: Disable LVDS on Radiant P845 (bnc#1012382).
- drm/rockchip: Respect page offset for PRIME mmap calls (bnc#1012382).
- drm: set FMODE_UNSIGNED_OFFSET for drm files (bnc#1012382).
- e1000e: allocate ring descriptors with dma_zalloc_coherent (bnc#1012382).
- e1000e: Fix check_for_link return value with autoneg off (bnc#1012382 bsc#1075428).
- efi: Avoid potential crashes, fix the 'struct efi_pci_io_protocol_32' definition for mixed mode (bnc#1012382).
- enic: enable rq before updating rq descriptors (bnc#1012382).
- enic: set DMA mask to 47 bit (bnc#1012382).
- ext2: fix a block leak (bnc#1012382).
- fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper() (bnc#1012382).
- firewire-ohci: work around oversized DMA reads on JMicron controllers (bnc#1012382).
- firmware: dmi: handle missing DMI data gracefully (bsc#1096037).
- firmware: dmi_scan: Fix handling of empty DMI strings (bnc#1012382).
- fix io_destroy()/aio_complete() race (bnc#1012382).
- Force log to disk before reading the AGF during a fstrim (bnc#1012382).
- fscache: Fix hanging wait on page discarded by writeback (bnc#1012382).
- fs/proc/proc_sysctl.c: fix potential page fault while unregistering sysctl table (bnc#1012382).
- futex: futex_wake_op, do not fail on invalid op (git-fixes).
- futex: futex_wake_op, fix sign_extend32 sign bits (bnc#1012382).
- futex: Remove duplicated code and fix undefined behaviour (bnc#1012382).
- futex: Remove unnecessary warning from get_futex_key (bnc#1012382).
- gfs2: Fix fallocate chunk size (bnc#1012382).
- gianfar: Fix Rx byte accounting for ndev stats (bnc#1012382).
- gpio: No NULL owner (bnc#1012382).
- gpio: rcar: Add Runtime PM handling for interrupts (bnc#1012382).
- hfsplus: stop workqueue when fill_super() failed (bnc#1012382).
- HID: roccat: prevent an out of bounds read in kovaplus_profile_activated() (bnc#1012382).
- hwmon: (nct6775) Fix writing pwmX_mode (bnc#1012382).
- hwmon: (pmbus/adm1275) Accept negative page register values (bnc#1012382).
- hwmon: (pmbus/max8688) Accept negative page register values (bnc#1012382).
- hwrng: stm32 - add reset during probe (bnc#1012382).
- hwtracing: stm: fix build error on some arches (bnc#1012382).
- i2c: mv64xxx: Apply errata delay only in standard mode (bnc#1012382).
- i2c: rcar: check master irqs before slave irqs (bnc#1012382).
- i2c: rcar: do not issue stop when HW does it automatically (bnc#1012382).
- i2c: rcar: init new messages in irq (bnc#1012382).
- i2c: rcar: make sure clocks are on when doing clock calculation (bnc#1012382).
- i2c: rcar: refactor setup of a msg (bnc#1012382).
- i2c: rcar: remove spinlock (bnc#1012382).
- i2c: rcar: remove unused IOERROR state (bnc#1012382).
- i2c: rcar: revoke START request early (bnc#1012382).
- i2c: rcar: rework hw init (bnc#1012382).
- IB/ipoib: Fix for potential no-carrier state (bnc#1012382).
- iio:kfifo_buf: check for uint overflow (bnc#1012382).
- ima: Fallback to the builtin hash algorithm (bnc#1012382).
- ima: Fix Kconfig to select TPM 2.0 CRB interface (bnc#1012382).
- init: fix false positives in W+X checking (bsc#1096982).
- input: elan_i2c - add ELAN0612 (Lenovo v330 14IKB) ACPI ID (bnc#1012382).
- Input: elan_i2c_smbus - fix corrupted stack (bnc#1012382).
- input: goodix - add new ACPI id for GPD Win 2 touch screen (bnc#1012382).
- ip6mr: only set ip6mr_table from setsockopt when ip6mr_new_table succeeds (bnc#1012382).
- ipc/shm: fix shmat() nil address after round-down when remapping (bnc#1012382).
- ipmi/powernv: Fix error return code in ipmi_powernv_probe() (bnc#1012382).
- ipmi_ssif: Fix kernel panic at msg_done_handler (bnc#1012382 bsc#1088871).
- ipv4: fix memory leaks in udp_sendmsg, ping_v4_sendmsg (bnc#1012382).
- ipv4: lock mtu in fnhe when received PMTU lower than net.ipv4.route.min_pmtu (bnc#1012382).
- ipv4: remove warning in ip_recv_error (bnc#1012382).
- ipv6: omit traffic class when calculating flow hash (bsc#1095042).
- irda: fix overly long udelay() (bnc#1012382).
- irqchip/gic-v3: Change pr_debug message to pr_devel (bnc#1012382).
- isdn: eicon: fix a missing-check bug (bnc#1012382).
- jffs2: Fix use-after-free bug in jffs2_iget()'s error handling path (bnc#1012382 git-fixes).
- kabi: vfs: Restore dentry_operations-&gt;d_manage (bsc#1086716).
- kasan: fix memory hotplug during boot (bnc#1012382).
- Kbuild: change CC_OPTIMIZE_FOR_SIZE definition (bnc#1012382).
- kconfig: Avoid format overflow warning from GCC 8.1 (bnc#1012382).
- kconfig: Do not leak main menus during parsing (bnc#1012382).
- kconfig: Fix automatic menu creation mem leak (bnc#1012382).
- kconfig: Fix expr_free() E_NOT leak (bnc#1012382).
- kdb: make 'mdr' command repeat (bnc#1012382).
- kernel: Fix memory leak on EP11 target list processing (bnc#1096751, LTC#168596).
- kernel/relay.c: limit kmalloc size to KMALLOC_MAX_SIZE (bnc#1012382).
- kernel/sys.c: fix potential Spectre v1 issue (bnc#1012382).
- kvm: Fix spelling mistake: 'cop_unsuable' -&gt; 'cop_unusable' (bnc#1012382).
- kvm: lapic: stop advertising DIRECTED_EOI when in-kernel IOAPIC is in use (bnc#1012382).
- kvm: PPC: Book3S HV: Fix VRMA initialization with 2MB or 1GB memory backing (bnc#1012382).
- kvm: VMX: raise internal error for exception during invalid protected mode state (bnc#1012382).
- kvm: x86: fix KVM_XEN_HVM_CONFIG ioctl (bnc#1012382).
- kvm: x86: introduce linear_{read,write}_system (bnc#1012382).
- kvm: x86: pass kvm_vcpu to kvm_read_guest_virt and kvm_write_guest_virt_system (bnc#1012382).
- kvm: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281).
- kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access (bnc#1012382).
- l2tp: revert 'l2tp: fix missing print session offset info' (bnc#1012382).
- libata: blacklist Micron 500IT SSD with MU01 firmware (bnc#1012382).
- libata: Blacklist some Sandisk SSDs for NCQ (bnc#1012382).
- llc: better deal with too small mtu (bnc#1012382).
- llc: properly handle dev_queue_xmit() return value (bnc#1012382).
- lockd: lost rollback of set_grace_period() in lockd_down_net() (bnc#1012382 git-fixes).
- locking/qspinlock: Ensure node-&gt;count is updated before initialising node (bnc#1012382).
- locking/xchg/alpha: Add unconditional memory barrier to cmpxchg() (bnc#1012382).
- locking/xchg/alpha: Fix xchg() and cmpxchg() memory ordering bugs (bnc#1012382).
- m68k: set dma and coherent masks for platform FEC ethernets (bnc#1012382).
- mac80211: round IEEE80211_TX_STATUS_HEADROOM up to multiple of 4 (bnc#1012382).
- md raid10: fix NULL deference in handle_write_completed() (bnc#1012382 bsc#1056415).
- md/raid1: fix NULL pointer dereference (bnc#1012382).
- md: raid5: avoid string overflow warning (bnc#1012382).
- media: cx23885: Override 888 ImpactVCBe crystal frequency (bnc#1012382).
- media: cx23885: Set subdev host data to clk_freq pointer (bnc#1012382).
- media: cx25821: prevent out-of-bounds read on array card (bnc#1012382 bsc#1031717).
- media: dmxdev: fix error code for invalid ioctls (bnc#1012382).
- media: em28xx: USB bulk packet size fix (bnc#1012382).
- media: s3c-camif: fix out-of-bounds array access (bnc#1012382 bsc#1031717).
- mmap: introduce sane default mmap limits (bnc#1012382).
- mmap: relax file size limit for regular files (bnc#1012382).
- mmc: sdhci-iproc: fix 32bit writes for TRANSFER_MODE register (bnc#1012382).
- mm: do not allow deferred pages with NEED_PER_CPU_KM (bnc#1012382).
- mm: filemap: avoid unnecessary calls to lock_page when waiting for IO to complete during a read (bnc#1012382 bnc#971975).
- mm: filemap: remove redundant code in do_read_cache_page (bnc#1012382 bnc#971975).
- mm: fix races between address_space dereference and free in page_evicatable (bnc#1012382).
- mm: fix the NULL mapping case in __isolate_lru_page() (bnc#1012382).
- mm/kmemleak.c: wait for scan completion before disabling free (bnc#1012382).
- mm/ksm: fix interaction with THP (bnc#1012382).
- mm/mempolicy: add nodes_empty check in SYSC_migrate_pages (bnc#1012382).
- mm/mempolicy.c: avoid use uninitialized preferred_node (bnc#1012382).
- mm/mempolicy: fix the check of nodemask from user (bnc#1012382).
- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset (bsc#1079152, VM Functionality).
- mm: pin address_space before dereferencing it while isolating an LRU page (bnc#1012382 bnc#1081500).
- net: bgmac: Fix endian access in bgmac_dma_tx_ring_free() (bnc#1012382).
- netdev-FAQ: clarify DaveM's position for stable backports (bnc#1012382).
- net: ethernet: sun: niu set correct packet size in skb (bnc#1012382).
- netfilter: ebtables: convert BUG_ONs to WARN_ONs (bnc#1012382).
- net: Fix untag for vlan packets without ethernet header (bnc#1012382).
- net: Fix vlan untag for bridge and vlan_dev with reorder_hdr off (bnc#1012382).
- netlabel: If PF_INET6, check sk_buff ip header version (bnc#1012382).
- net: metrics: add proper netlink validation (bnc#1012382).
- net/mlx4_en: Verify coalescing parameters are in range (bnc#1012382).
- net/mlx4: Fix irq-unsafe spinlock usage (bnc#1012382).
- net/mlx5: Protect from command bit overflow (bnc#1012382).
- net: mvneta: fix enable of all initialized RXQs (bnc#1012382).
- net/packet: refine check for priv area size (bnc#1012382).
- net: phy: broadcom: Fix bcm_write_exp() (bnc#1012382).
- net: qmi_wwan: add BroadMobi BM806U 2020:2033 (bnc#1012382).
- net_sched: fq: take care of throttled flows before reuse (bnc#1012382).
- net: support compat 64-bit time in {s,g}etsockopt (bnc#1012382).
- net/tcp/illinois: replace broken algorithm reference link (bnc#1012382).
- net: test tailroom before appending to linear skb (bnc#1012382).
- net-usb: add qmi_wwan if on lte modem wistron neweb d18q1 (bnc#1012382).
- net: usb: cdc_mbim: add flag FLAG_SEND_ZLP (bnc#1012382).
- net/usb/qmi_wwan.c: Add USB id for lt4120 modem (bnc#1012382).
- nfc: llcp: Limit size of SDP URI (bnc#1012382).
- nfs: Do not convert nfs_idmap_cache_timeout to jiffies (bnc#1012382 git-fixes).
- nfsv4: always set NFS_LOCK_LOST when a lock is lost (bnc#1012382 bsc#1068951).
- ntb_transport: Fix bug with max_mw_size parameter (bnc#1012382).
- nvme-pci: Fix nvme queue cleanup if IRQ setup fails (bnc#1012382).
- ocfs2/acl: use 'ip_xattr_sem' to protect getting extended attribute (bnc#1012382).
- ocfs2/dlm: do not handle migrate lockres if already in shutdown (bnc#1012382).
- ocfs2: return -EROFS to mount.ocfs2 if inode block is invalid (bnc#1012382).
- ocfs2: return error when we attempt to access a dirty bh in jbd2 (bnc#1012382 bsc#1070404).
- openvswitch: Do not swap table in nlattr_set() after OVS_ATTR_NESTED is found (bnc#1012382).
- packet: fix reserve calculation (bnc#1012382 git-fixes).
- packet: fix reserve calculation (git-fixes).
- packet: in packet_snd start writing at link layer allocation (bnc#1012382).
- parisc/pci: Switch LBA PCI bus from Hard Fail to Soft Fail mode (bnc#1012382).
- pci: Add function 1 DMA alias quirk for Marvell 88SE9220 (bnc#1012382).
- pci: Add function 1 DMA alias quirk for Marvell 9128 (bnc#1012382).
- pci: Restore config space on runtime resume despite being unbound (bnc#1012382).
- perf callchain: Fix attr.sample_max_stack setting (bnc#1012382).
- perf/cgroup: Fix child event counting bug (bnc#1012382).
- perf/core: Fix perf_output_read_group() (bnc#1012382).
- perf report: Fix memory corruption in --branch-history mode --branch-history (bnc#1012382).
- perf tests: Use arch__compare_symbol_names to compare symbols (bnc#1012382).
- pipe: cap initial pipe capacity according to pipe-max-size limit (bnc#1012382 bsc#1045330).
- powerpc/64s: Clear PCR on boot (bnc#1012382).
- powerpc: Add missing prototype for arch_irq_work_raise() (bnc#1012382).
- powerpc/bpf/jit: Fix 32-bit JIT for seccomp_data access (bnc#1012382).
- powerpc: Do not preempt_disable() in show_cpuinfo() (bnc#1012382 bsc#1066223).
- powerpc/mpic: Check if cpu_possible() in mpic_physmask() (bnc#1012382).
- powerpc/numa: Ensure nodes initialized for hotplug (bnc#1012382 bsc#1081514).
- powerpc/numa: Use ibm,max-associativity-domains to discover possible nodes (bnc#1012382 bsc#1081514).
- powerpc/perf: Fix kernel address leak via sampling registers (bnc#1012382).
- powerpc/perf: Prevent kernel address leak to userspace via BHRB buffer (bnc#1012382).
- powerpc/powernv: Fix NVRAM sleep in invalid context when crashing (bnc#1012382).
- powerpc/powernv: panic() on OPAL lower than V3 (bnc#1012382).
- powerpc/powernv: remove FW_FEATURE_OPALv3 and just use FW_FEATURE_OPAL (bnc#1012382).
- powerpc/powernv: Remove OPALv2 firmware define and references (bnc#1012382).
- proc: fix /proc/*/map_files lookup (bnc#1012382).
- procfs: fix pthread cross-thread naming if !PR_DUMPABLE (bnc#1012382).
- proc: meminfo: estimate available memory more conservatively (bnc#1012382).
- proc read mm's {arg,env}_{start,end} with mmap semaphore taken (bnc#1012382).
- qed: Fix mask for physical address in ILT entry (bnc#1012382).
- qla2xxx: Mask off Scope bits in retry delay (bsc#1068054).
- qmi_wwan: do not steal interfaces from class drivers (bnc#1012382).
- r8152: fix tx packets accounting (bnc#1012382).
- r8169: fix powering up RTL8168h (bnc#1012382).
- RDMA/mlx5: Avoid memory leak in case of XRCD dealloc failure (bnc#1012382).
- RDMA/ucma: Correct option size check using optlen (bnc#1012382).
- RDS: IB: Fix null pointer issue (bnc#1012382).
- Refreshed contents of patches (bsc#1085185)
- regulator: of: Add a missing 'of_node_put()' in an error handling path of 'of_regulator_match()' (bnc#1012382).
- regulatory: add NUL to request alpha2 (bnc#1012382).
- Revert 'arm: dts: imx6qdl-wandboard: Fix audio channel swap' (bnc#1012382).
- Revert 'ima: limit file hash setting by user to fix and log modes' (bnc#1012382).
- Revert 'ipc/shm: Fix shmat mmap nil-page protection' (bnc#1012382).
- Revert 'regulatory: add NUL to request alpha2' (kabi).
- Revert 'vti4: Do not override MTU passed on link creation via IFLA_MTU' (bnc#1012382).
- rtc: hctosys: Ensure system time does not overflow time_t (bnc#1012382).
- rtc: snvs: Fix usage of snvs_rtc_enable (bnc#1012382).
- rtc: tx4939: avoid unintended sign extension on a 24 bit shift (bnc#1012382).
- rtlwifi: rtl8192cu: Remove variable self-assignment in rf.c (bnc#1012382).
- rtnetlink: validate attributes in do_setlink() (bnc#1012382).
- s390: add assembler macros for CPU alternatives (bnc#1012382).
- s390/cio: clear timer when terminating driver I/O (bnc#1012382).
- s390/cio: fix return code after missing interrupt (bnc#1012382).
- s390/cpum_sf: ensure sample frequency of perf event attributes is non-zero (LTC#168035 bnc#1012382 bnc#1094532).
- s390: extend expoline to BC instructions (bnc#1012382).
- s390/ftrace: use expoline for indirect branches (bnc#1012382).
- s390/kernel: use expoline for indirect branches (bnc#1012382).
- s390/lib: use expoline for indirect branches (bnc#1012382).
- s390: move expoline assembler macros to a header (bnc#1012382).
- s390: move spectre sysfs attribute code (bnc#1012382).
- s390/qdio: do not release memory in qdio_setup_irq() (bnc#1012382).
- s390/qdio: fix access to uninitialized qdio_q fields (LTC#168037 bnc#1012382 bnc#1094532).
- s390: remove indirect branch from do_softirq_own_stack (bnc#1012382).
- s390: use expoline thunks in the BPF JIT (bnc#1012382).
- sched/rt: Fix rq-&gt;clock_update_flags lower than RQCF_ACT_SKIP warning (bnc#1012382).
- scripts/git-pre-commit:
- scsi: aacraid: fix shutdown crash when init fails (bnc#1012382).
- scsi: aacraid: Insure command thread is not recursively stopped (bnc#1012382).
- scsi: bnx2fc: Fix check in SCSI completion handler for timed out request (bnc#1012382).
- scsi: fas216: fix sense buffer initialization (bnc#1012382 bsc#1082979).
- scsi: libsas: defer ata device eh commands to libata (bnc#1012382).
- scsi: lpfc: Fix frequency of Release WQE CQEs (bnc#1012382).
- scsi: lpfc: Fix issue_lip if link is disabled (bnc#1012382 bsc#1080656).
- scsi: lpfc: Fix soft lockup in lpfc worker thread during LIP testing (bnc#1012382 bsc#1080656).
- scsi: mpt3sas: Do not mark fw_event workqueue as WQ_MEM_RECLAIM (bnc#1012382 bsc#1078583).
- scsi: mptfusion: Add bounds check in mptctl_hp_targetinfo() (bnc#1012382).
- scsi: qla2xxx: Avoid triggering undefined behavior in qla2x00_mbx_completion() (bnc#1012382).
- scsi: qla4xxx: skip error recovery in case of register disconnect (bnc#1012382).
- scsi: scsi_transport_srp: Fix shost to rport translation (bnc#1012382).
- scsi: sd: Keep disk read-only when re-reading partition (bnc#1012382).
- scsi: sg: allocate with __GFP_ZERO in sg_build_indirect() (bnc#1012382).
- scsi: storvsc: Increase cmd_per_lun for higher speed devices (bnc#1012382).
- scsi: sym53c8xx_2: iterator underflow in sym_getsync() (bnc#1012382).
- scsi: ufs: Enable quirk to ignore sending WRITE_SAME command (bnc#1012382).
- scsi: zfcp: fix infinite iteration on ERP ready list (LTC#168038 bnc#1012382 bnc#1094532).
- sctp: delay the authentication for the duplicated cookie-echo chunk (bnc#1012382).
- sctp: fix the issue that the cookie-ack with auth can't get processed (bnc#1012382).
- sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr (bnc#1012382).
- sctp: use the old asoc when making the cookie-ack chunk in dupcook_d (bnc#1012382).
- selftests: ftrace: Add a testcase for probepoint (bnc#1012382).
- selftests: ftrace: Add a testcase for string type with kprobe_event (bnc#1012382).
- selftests: ftrace: Add probe event argument syntax testcase (bnc#1012382).
- selftests: memfd: add config fragment for fuse (bnc#1012382).
- selftests/net: fixes psock_fanout eBPF test case (bnc#1012382).
- selftests/powerpc: Skip the subpage_prot tests if the syscall is unavailable (bnc#1012382).
- selftests: Print the test we're running to /dev/kmsg (bnc#1012382).
- selinux: KASAN: slab-out-of-bounds in xattr_getsecurity (bnc#1012382).
- serial: arc_uart: Fix out-of-bounds access through DT alias (bnc#1012382).
- serial: fsl_lpuart: Fix out-of-bounds access through DT alias (bnc#1012382).
- serial: imx: Fix out-of-bounds access through serial port index (bnc#1012382).
- serial: mxs-auart: Fix out-of-bounds access through serial port index (bnc#1012382).
- serial: samsung: fix maxburst parameter for DMA transactions (bnc#1012382).
- serial: samsung: Fix out-of-bounds access through serial port index (bnc#1012382).
- serial: xuartps: Fix out-of-bounds access through DT alias (bnc#1012382).
- sh: fix debug trap failure to process signals before return to user (bnc#1012382).
- sh: New gcc support (bnc#1012382).
- signals: avoid unnecessary taking of sighand-&gt;siglock (bnc#1012382 bnc#978907).
- sit: fix IFLA_MTU ignored on NEWLINK (bnc#1012382).
- smsc75xx: fix smsc75xx_set_features() (bnc#1012382).
- sock_diag: fix use-after-free read in __sk_free (bnc#1012382).
- sparc64: Fix build warnings with gcc 7 (bnc#1012382).
- sparc64: Make atomic_xchg() an inline function rather than a macro (bnc#1012382).
- spi: pxa2xx: Allow 64-bit DMA (bnc#1012382).
- sr: get/drop reference to device in revalidate and check_events (bnc#1012382).
- staging: rtl8192u: return -ENOMEM on failed allocation of priv-&gt;oldaddr (bnc#1012382).
- stm class: Use vmalloc for the master map (bnc#1012382).
- sunvnet: does not support GSO for sctp (bnc#1012382).
- swap: divide-by-zero when zero length swap file on ssd (bnc#1012382 bsc#1082153).
- tcp: avoid integer overflows in tcp_rcv_space_adjust() (bnc#1012382).
- tcp: ignore Fast Open on repair mode (bnc#1012382).
- tcp: purge write queue in tcp_connect_init() (bnc#1012382).
- team: use netdev_features_t instead of u32 (bnc#1012382).
- test_bpf: Fix testing with CONFIG_BPF_JIT_ALWAYS_ON=y on other arches (git-fixes).
- tg3: Fix vunmap() BUG_ON() triggered from tg3_free_consistent() (bnc#1012382).
- tick/broadcast: Use for_each_cpu() specially on UP kernels (bnc#1012382).
- time: Fix CLOCK_MONOTONIC_RAW sub-nanosecond accounting (bnc#1012382).
- tools/libbpf: handle issues with bpf ELF objects containing .eh_frames (bnc#1012382).
- tools lib traceevent: Fix get_field_str() for dynamic strings (bnc#1012382).
- tools lib traceevent: Simplify pointer print logic and fix %pF (bnc#1012382).
- tools/thermal: tmon: fix for segfault (bnc#1012382).
- tpm: do not suspend/resume if power stays on (bnc#1012382).
- tpm: self test failure should not cause suspend to fail (bnc#1012382).
- tracing: Fix crash when freeing instances with event triggers (bnc#1012382).
- tracing/hrtimer: Fix tracing bugs by taking all clock bases and modes into account (bnc#1012382).
- tracing/x86/xen: Remove zero data size trace events trace_xen_mmu_flush_tlb{_all} (bnc#1012382).
- udf: Provide saner default for invalid uid / gid (bnc#1012382).
- usb: dwc2: Fix dwc2_hsotg_core_init_disconnected() (bnc#1012382).
- usb: dwc2: Fix interval type issue (bnc#1012382).
- usb: dwc3: Update DWC_usb31 GTXFIFOSIZ reg fields (bnc#1012382).
- usb: gadget: composite: fix incorrect handling of OS desc requests (bnc#1012382).
- usb: gadget: ffs: Execute copy_to_user() with USER_DS set (bnc#1012382).
- usb: gadget: ffs: Let setup() return USB_GADGET_DELAYED_STATUS (bnc#1012382).
- usb: gadget: fsl_udc_core: fix ep valid checks (bnc#1012382).
- usb: gadget: f_uac2: fix bFirstInterface in composite gadget (bnc#1012382).
- usb: gadget: udc: change comparison to bitshift when dealing with a mask (bnc#1012382).
- usbip: usbip_host: delete device from busid_table after rebind (bnc#1012382).
- usbip: usbip_host: fix bad unlock balance during stub_probe() (bnc#1012382).
- usbip: usbip_host: fix NULL-ptr deref and use-after-free errors (bnc#1012382).
- usbip: usbip_host: refine probe and disconnect debug msgs to be useful (bnc#1012382).
- usbip: usbip_host: run rebind from exit when module is removed (bnc#1012382).
- usb: musb: call pm_runtime_{get,put}_sync before reading vbus registers (bnc#1012382).
- usb: musb: fix enumeration after resume (bnc#1012382).
- USB: OHCI: Fix NULL dereference in HCDs using HCD_LOCAL_MEM (bnc#1012382).
- USB: serial: cp210x: use tcflag_t to fix incompatible pointer type (bnc#1012382).
- vfs: add path_has_submounts() (bsc#1086716).
- vfs: add path_is_mountpoint() helper (bsc#1086716).
- vfs: change d_manage() to take a struct path (bsc#1086716).
- virtio-gpu: fix ioctl and expose the fixed status to userspace (bnc#1012382).
- virtio-net: Fix operstate for virtio when no VIRTIO_NET_F_STATUS (bnc#1012382).
- vmscan: do not force-scan file lru if its absolute size is small (bnc#1012382).
- vmw_balloon: fixing double free when batching mode is off (bnc#1012382).
- vti4: Do not count header length twice on tunnel setup (bnc#1012382).
- vti4: Do not override MTU passed on link creation via IFLA_MTU (bnc#1012382).
- watchdog: f71808e_wdt: Fix magic close handling (bnc#1012382).
- watchdog: sp5100_tco: Fix watchdog disable bit (bnc#1012382).
- workqueue: use put_device() instead of kfree() (bnc#1012382).
- x86/apic: Set up through-local-APIC mode on the boot CPU if 'noapic' specified (bnc#1012382).
- x86/boot: Fix early command-line parsing when partial word matches (bsc#1096140).
- x86/bugs: IBRS: make runtime disabling fully dynamic (bsc#1068032).
- x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140).
- x86/cpufeature: Remove unused and seldomly used cpu_has_xx macros (bnc#1012382).
- x86/crypto, x86/fpu: Remove X86_FEATURE_EAGER_FPU #ifdef from the crc32c code (bnc#1012382).
- x86/devicetree: Fix device IRQ settings in DT (bnc#1012382).
- x86/devicetree: Initialize device tree before using it (bnc#1012382).
- x86: ENABLE_IBRS is sometimes called early during boot while it should not. Let's drop the uoptimization for now. Fixes bsc#1098009 and bsc#1098012
- x86/fpu: Disable AVX when eagerfpu is off (bnc#1012382).
- x86/fpu: Hard-disable lazy FPU mode (bnc#1012382).
- x86/fpu: Revert ('x86/fpu: Disable AVX when eagerfpu is off') (bnc#1012382).
- x86/kexec: Avoid double free_page() upon do_kexec_load() failure (bnc#1012382).
- x86/pgtable: Do not set huge PUD/PMD on non-leaf entries (bnc#1012382).
- x86/pkeys: Do not special case protection key 0 (1041740).
- x86/pkeys: Override pkey when moving away from PROT_EXEC (1041740).
- x86/power: Fix swsusp_arch_resume prototype (bnc#1012382).
- x86: Remove unused function cpu_has_ht_siblings() (bnc#1012382).
- x86/topology: Update the 'cpu cores' field in /proc/cpuinfo correctly across CPU hotplug operations (bnc#1012382).
- xen/acpi: off by one in read_acpi_id() (bnc#1012382).
- xen/grant-table: Use put_page instead of free_page (bnc#1012382).
- xen-netfront: Fix race between device setup and open (bnc#1012382).
- xen/netfront: raise max number of slots in xennet_get_responses() (bnc#1076049).
- xen/pirq: fix error path cleanup when binding MSIs (bnc#1012382).
- xen-swiotlb: fix the check condition for xen_swiotlb_free_coherent (bnc#1012382).
- xen: xenbus: use put_device() instead of kfree() (bnc#1012382).
- xfrm: fix xfrm_do_migrate() with AEAD e.g(AES-GCM) (bnc#1012382).
- xfs: convert XFS_AGFL_SIZE to a helper function (bsc#1090955, bsc#1090534).
- xfs: detect agfl count corruption and reset agfl (bnc#1012382 bsc#1090534 bsc#1090955).
- xfs: detect agfl count corruption and reset agfl (bsc#1090955, bsc#1090534).
- xfs: do not log/recover swapext extent owner changes for deleted inodes (bsc#1090955).
- xfs: remove racy hasattr check from attr ops (bnc#1012382 bsc#1035432).
- xhci: Fix USB3 NULL pointer dereference at logical disconnect (git-fixes).
- xhci: Fix use-after-free in xhci_free_virt_device (git-fixes).
- xhci: zero usb device slot_id member when disabling and freeing a xhci slot (bnc#1012382).
- zorro: Set up z-&gt;dev.dma_mask for the DMA API (bnc#1012382).
- xfs: fix incorrect log_flushed on fsync (bnc#1012382).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-21"/>
	<updated date="2018-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024718">SUSE bug 1024718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031717">SUSE bug 1031717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035432">SUSE bug 1035432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041740">SUSE bug 1041740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045330">SUSE bug 1045330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056415">SUSE bug 1056415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066223">SUSE bug 1066223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068054">SUSE bug 1068054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068951">SUSE bug 1068951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070404">SUSE bug 1070404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073311">SUSE bug 1073311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075428">SUSE bug 1075428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076049">SUSE bug 1076049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078583">SUSE bug 1078583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079152">SUSE bug 1079152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080542">SUSE bug 1080542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080656">SUSE bug 1080656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081500">SUSE bug 1081500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081514">SUSE bug 1081514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082153">SUSE bug 1082153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082504">SUSE bug 1082504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082979">SUSE bug 1082979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085185">SUSE bug 1085185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085308">SUSE bug 1085308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086400">SUSE bug 1086400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086716">SUSE bug 1086716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087036">SUSE bug 1087036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087086">SUSE bug 1087086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088871">SUSE bug 1088871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090435">SUSE bug 1090435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090534">SUSE bug 1090534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090734">SUSE bug 1090734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090955">SUSE bug 1090955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091594">SUSE bug 1091594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094532">SUSE bug 1094532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095042">SUSE bug 1095042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095147">SUSE bug 1095147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096037">SUSE bug 1096037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096140">SUSE bug 1096140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096214">SUSE bug 1096214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096242">SUSE bug 1096242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096281">SUSE bug 1096281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096751">SUSE bug 1096751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096982">SUSE bug 1096982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097234">SUSE bug 1097234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097356">SUSE bug 1097356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098009">SUSE bug 1098009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098012">SUSE bug 1098012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971975">SUSE bug 971975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973378">SUSE bug 973378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978907">SUSE bug 978907</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17741/">CVE-2017-17741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18241/">CVE-2017-18241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18249/">CVE-2017-18249</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12233/">CVE-2018-12233</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5848/">CVE-2018-5848</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519726" comment="kernel-default-4.4.138-94.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519727" comment="kernel-default-devel-4.4.138-94.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519728" comment="kernel-default-extra-4.4.138-94.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519729" comment="kernel-devel-4.4.138-94.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519730" comment="kernel-macros-4.4.138-94.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519731" comment="kernel-source-4.4.138-94.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519732" comment="kernel-syms-4.4.138-94.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78284" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1005778" ref_url="https://bugzilla.suse.com/1005778" source="BUGZILLA"/>
		<reference ref_id="1005780" ref_url="https://bugzilla.suse.com/1005780" source="BUGZILLA"/>
		<reference ref_id="1005781" ref_url="https://bugzilla.suse.com/1005781" source="BUGZILLA"/>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1017967" ref_url="https://bugzilla.suse.com/1017967" source="BUGZILLA"/>
		<reference ref_id="1039616" ref_url="https://bugzilla.suse.com/1039616" source="BUGZILLA"/>
		<reference ref_id="1047487" ref_url="https://bugzilla.suse.com/1047487" source="BUGZILLA"/>
		<reference ref_id="1063043" ref_url="https://bugzilla.suse.com/1063043" source="BUGZILLA"/>
		<reference ref_id="1064311" ref_url="https://bugzilla.suse.com/1064311" source="BUGZILLA"/>
		<reference ref_id="1065180" ref_url="https://bugzilla.suse.com/1065180" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068951" ref_url="https://bugzilla.suse.com/1068951" source="BUGZILLA"/>
		<reference ref_id="1070116" ref_url="https://bugzilla.suse.com/1070116" source="BUGZILLA"/>
		<reference ref_id="1071009" ref_url="https://bugzilla.suse.com/1071009" source="BUGZILLA"/>
		<reference ref_id="1072166" ref_url="https://bugzilla.suse.com/1072166" source="BUGZILLA"/>
		<reference ref_id="1072216" ref_url="https://bugzilla.suse.com/1072216" source="BUGZILLA"/>
		<reference ref_id="1072556" ref_url="https://bugzilla.suse.com/1072556" source="BUGZILLA"/>
		<reference ref_id="1072866" ref_url="https://bugzilla.suse.com/1072866" source="BUGZILLA"/>
		<reference ref_id="1072890" ref_url="https://bugzilla.suse.com/1072890" source="BUGZILLA"/>
		<reference ref_id="1072962" ref_url="https://bugzilla.suse.com/1072962" source="BUGZILLA"/>
		<reference ref_id="1073090" ref_url="https://bugzilla.suse.com/1073090" source="BUGZILLA"/>
		<reference ref_id="1073525" ref_url="https://bugzilla.suse.com/1073525" source="BUGZILLA"/>
		<reference ref_id="1073792" ref_url="https://bugzilla.suse.com/1073792" source="BUGZILLA"/>
		<reference ref_id="1073809" ref_url="https://bugzilla.suse.com/1073809" source="BUGZILLA"/>
		<reference ref_id="1073868" ref_url="https://bugzilla.suse.com/1073868" source="BUGZILLA"/>
		<reference ref_id="1073874" ref_url="https://bugzilla.suse.com/1073874" source="BUGZILLA"/>
		<reference ref_id="1073912" ref_url="https://bugzilla.suse.com/1073912" source="BUGZILLA"/>
		<reference ref_id="963897" ref_url="https://bugzilla.suse.com/963897" source="BUGZILLA"/>
		<reference ref_id="964063" ref_url="https://bugzilla.suse.com/964063" source="BUGZILLA"/>
		<reference ref_id="966170" ref_url="https://bugzilla.suse.com/966170" source="BUGZILLA"/>
		<reference ref_id="966172" ref_url="https://bugzilla.suse.com/966172" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17805" ref_url="https://www.suse.com/security/cve/CVE-2017-17805/" source="CVE"/>
		<reference ref_id="CVE-2017-17806" ref_url="https://www.suse.com/security/cve/CVE-2017-17806/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

This update adds mitigations for various side channel attacks against modern CPUs that could disclose
content of otherwise unreadable memory (bnc#1068032).

- CVE-2017-5753 / 'SpectreAttack': Local attackers on systems with modern CPUs featuring
  deep instruction pipelining could use attacker controllable speculative
  execution over code patterns in the Linux Kernel to leak content from
  otherwise not readable memory in the same address space, allowing
  retrieval of passwords, cryptographic keys and other secrets.

  This problem is mitigated by adding speculative fencing on affected
  code paths throughout the Linux kernel.


- CVE-2017-5715 / 'SpectreAttack': Local attackers on systems with modern CPUs featuring
  branch prediction could use mispredicted branches to speculatively execute
  code patterns that in turn could be made to leak other non-readable
  content in the same address space, an attack similar to CVE-2017-5753.

  This problem is mitigated by disabling predictive branches, depending
  on CPU architecture either by firmware updates and/or fixes in the
  user-kernel privilege boundaries.

  Please also check with your CPU / Hardware vendor for available
  firmware or BIOS updates.

  As this feature can have a performance impact, it can be disabled
  using the 'nospec' kernel commandline option.


- CVE-2017-5754 / 'MeltdownAttack': Local attackers on systems with
  modern CPUs featuring deep instruction pipelining could use code
  patterns in userspace to speculative executive code that would read
  otherwise read protected memory.

  This problem is mitigated by unmapping the Linux Kernel from the user
  address space during user code execution, following a approach called
  'KAISER'. The terms used here are 'KAISER' / 'Kernel Address Isolation'
  and 'PTI' / 'Page Table Isolation'.

  This is only enabled by default on affected architectures.

  This feature can be enabled / disabled by the 'pti=[on|off|auto]' or 'nopti' commandline options.


The following security bugs were fixed:

- CVE-2017-17806: The HMAC implementation (crypto/hmac.c) in the Linux
  kernel did not validate that the underlying cryptographic hash algorithm
  is unkeyed, allowing a local attacker able to use the AF_ALG-based hash
  interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm
  (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing
  a crafted sequence of system calls that encounter a missing SHA-3
  initialization (bnc#1073874).
- CVE-2017-17805: The Salsa20 encryption algorithm in the Linux kernel did
  not correctly handle zero-length inputs, allowing a local attacker able to
  use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER)
  to cause a denial of service (uninitialized-memory free and kernel
  crash) or have unspecified other impact by executing a crafted sequence
  of system calls that use the blkcipher_walk API. Both the generic
  implementation (crypto/salsa20_generic.c) and x86 implementation
  (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable (bnc#1073792).


The following non-security bugs were fixed:

- Add undefine _unique_build_ids (bsc#964063)
- apei / ERST: Fix missing error handling in erst_reader() (bsc#1072556).
- arm: Hide finish_arch_post_lock_switch() from modules (bsc#1068032).
- autofs: fix careless error in recent commit (bnc#1012382 bsc#1065180).
- bnxt_en: Do not print 'Link speed -1 no longer supported' messages (bsc#1070116).
- bpf: prevent speculative execution in eBPF interpreter (bnc#1068032).
- carl9170: prevent speculative execution (bnc#1068032).
- ceph: drop negative child dentries before try pruning inode's alias (bsc#1073525).
- Check cmdline_find_option() retval properly and use boot_cpu_has().
- cifs: Fix NULL pointer deref on SMB2_tcon() failure (bsc#1071009).
- cw1200: prevent speculative execution (bnc#1068032).
- e1000e: Fix e1000_check_for_copper_link_ich8lan return value (bsc#1073809).
- Fix unsed variable warning in has_unmovable_pages (bsc#1073868).
- fs: prevent speculative execution (bnc#1068032).
- genwqe: Take R/W permissions into account when dealing with memory pages (bsc#1073090).
- ibmvnic: Include header descriptor support for ARP packets (bsc#1073912).
- ibmvnic: Increase maximum number of RX/TX queues (bsc#1073912).
- ibmvnic: Rename IBMVNIC_MAX_TX_QUEUES to IBMVNIC_MAX_QUEUES (bsc#1073912).
- ipv6: prevent speculative execution (bnc#1068032).
- iw_cxgb4: fix misuse of integer variable (bsc#963897,FATE#320114).
- iw_cxgb4: only insert drain cqes if wq is flushed (bsc#321658 FATE#1005778 bsc#321660 FATE#1005780 bsc#321661 FATE#1005781).
- kaiser: add 'nokaiser' boot option, using ALTERNATIVE.
- kaiser: align addition to x86/mm/Makefile.
- kaiser: asm/tlbflush.h handle noPGE at lower level.
- kaiser: cleanups while trying for gold link.
- kaiser: disabled on Xen PV.
- kaiser: do not set _PAGE_NX on pgd_none.
- kaiser: drop is_atomic arg to kaiser_pagetable_walk().
- kaiser: enhanced by kernel and user PCIDs.
- kaiser: ENOMEM if kaiser_pagetable_walk() NULL.
- kaiser: fix build and FIXME in alloc_ldt_struct().
- kaiser: fix perf crashes.
- kaiser: fix regs to do_nmi() ifndef CONFIG_KAISER.
- kaiser: fix unlikely error in alloc_ldt_struct().
- kaiser: KAISER depends on SMP.
- kaiser: kaiser_flush_tlb_on_return_to_user() check PCID.
- kaiser: kaiser_remove_mapping() move along the pgd.
- kaiser: Kernel Address Isolation.
- kaiser: load_new_mm_cr3() let SWITCH_USER_CR3 flush.
- kaiser: load_new_mm_cr3() let SWITCH_USER_CR3 flush user.
- kaiser: name that 0x1000 KAISER_SHADOW_PGD_OFFSET.
- kaiser: paranoid_entry pass cr3 need to paranoid_exit.
- kaiser: PCID 0 for kernel and 128 for user.
- kaiser: _pgd_alloc() without __GFP_REPEAT to avoid stalls.
- kaiser: stack map PAGE_SIZE at THREAD_SIZE-PAGE_SIZE.
- kaiser: tidied up asm/kaiser.h somewhat.
- kaiser: tidied up kaiser_add/remove_mapping slightly.
- kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush.
- kaiser: vmstat show NR_KAISERTABLE as nr_overhead.
- kaiser: x86_cr3_pcid_noflush and x86_cr3_pcid_user.
- kvm: svm: Do not intercept new speculative control MSRs (bsc#1068032).
- kvm: x86: Add speculative control CPUID support for guests (bsc#1068032).
- locking/barriers: introduce new memory barrier gmb() (bnc#1068032).
- mm/mmu_context, sched/core: Fix mmu_context.h assumption (bsc#1068032).
- net/mlx5e: DCBNL, Implement tc with ets type and zero bandwidth (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net: mpls: prevent speculative execution (bnc#1068032).
- nfs: revalidate '.' etc correctly on 'open' (bsc#1068951).
- nfs: revalidate '.' etc correctly on 'open' (git-fixes). Fix References: tag.
- nfsv4: always set NFS_LOCK_LOST when a lock is lost (bsc#1068951).
- nvme-fabrics: introduce init command check for a queue that is not alive (bsc#1072890).
- nvme-fc: check if queue is ready in queue_rq (bsc#1072890).
- nvme-fc: do not use bit masks for set/test_bit() numbers (bsc#1072890).
- nvme-loop: check if queue is ready in queue_rq (bsc#1072890).
- nvmet-fc: cleanup nvmet add_port/remove_port (bsc#1072890).
- nvmet_fc: correct broken add_port (bsc#1072890).
- p54: prevent speculative execution (bnc#1068032).
- powerpc/barrier: add gmb.
- powerpc: Secure memory rfi flush (bsc#1068032).
- ptrace: Add a new thread access check (bsc#1068032).
- qla2xxx: prevent speculative execution (bnc#1068032).
- s390: add ppa to system call and program check path (bsc#1068032).
- s390: introduce CPU alternatives (bsc#1068032).
- s390/qeth: add missing hash table initializations (bnc#1072216, LTC#162173).
- s390/qeth: fix early exit from error path (bnc#1072216, LTC#162173).
- s390/qeth: fix thinko in IPv4 multicast address tracking (bnc#1072216, LTC#162173).
- s390/spinlock: add gmb memory barrier (bsc#1068032).
- sched/core: Add switch_mm_irqs_off() and use it in the scheduler (bsc#1068032).
- sched/core: Idle_task_exit() shouldn't use switch_mm_irqs_off() (bsc#1068032).
- scsi_dh_alua: skip RTPG for devices only supporting active/optimized (bsc#1064311).
- scsi: lpfc: correct sg_seg_cnt attribute min vs default (bsc#1072166).
- scsi: qedi: Limit number for CQ queues (bsc#1072866).
- scsi_scan: Exit loop if TUR to LUN0 fails with 0x05/0x25 (bsc#1063043). This is specific to FUJITSU ETERNUS_DX* targets. They can return 'Illegal Request - Logical unit not supported' and processing should leave the timeout loop in this case.
- scsi: ses: check return code from ses_recv_diag() (bsc#1039616).
- scsi: ses: Fixup error message 'failed to get diagnostic page 0xffffffea' (bsc#1039616).
- scsi: ses: Fix wrong page error (bsc#1039616).
- scsi: ses: make page2 support optional (bsc#1039616).
- sfc: pass valid pointers from efx_enqueue_unwind (bsc#1017967 FATE#321663).
- thermal/int340x: prevent speculative execution (bnc#1068032).
- udf: prevent speculative execution (bnc#1068032).
- Update config files: enable KAISER.
- usb: host: fix incorrect updating of offset (bsc#1047487).
- userns: prevent speculative execution (bnc#1068032).
- uvcvideo: prevent speculative execution (bnc#1068032).
- vxlan: correctly handle ipv6.disable module parameter (bsc#1072962).
- x86/boot: Add early cmdline parsing for options with arguments.
- x86/CPU/AMD: Add speculative control support for AMD (bsc#1068032).
- x86/CPU/AMD: Make the LFENCE instruction serialized (bsc#1068032).
- x86/CPU/AMD: Remove now unused definition of MFENCE_RDTSC feature (bsc#1068032).
- x86/CPU: Check speculation control CPUID bit (bsc#1068032).
- x86/enter: Add macros to set/clear IBRS and set IBPB (bsc#1068032).
- x86/entry: Add a function to overwrite the RSB (bsc#1068032).
- x86/entry: Stuff RSB for entry to kernel for non-SMEP platform (bsc#1068032).
- x86/entry: Use IBRS on entry to kernel space (bsc#1068032).
- x86/feature: Enable the x86 feature to control Speculation (bsc#1068032).
- x86/idle: Disable IBRS when offlining a CPU and re-enable on wakeup (bsc#1068032).
- x86/idle: Toggle IBRS when going idle (bsc#1068032).
- x86/kaiser: Check boottime cmdline params.
- x86/kaiser: Move feature detection up (bsc#1068032).
- x86/kaiser: Reenable PARAVIRT.
- x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling.
- x86/kvm: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm (bsc#1068032).
- x86/kvm: Add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm (bsc#1068032).
- x86/kvm: Flush IBP when switching VMs (bsc#1068032).
- x86/kvm: Pad RSB on VM transition (bsc#1068032).
- x86/kvm: Toggle IBRS on VM entry and exit (bsc#1068032).
- x86/mm/64: Fix reboot interaction with CR4.PCIDE (bsc#1068032).
- x86/mm: Add a 'noinvpcid' boot option to turn off INVPCID (bsc#1068032).
- x86/mm: Add INVPCID helpers (bsc#1068032).
- x86/mm: Add the 'nopcid' boot option to turn off PCID (bsc#1068032).
- x86/mm: Build arch/x86/mm/tlb.c even on !SMP (bsc#1068032).
- x86/mm: Enable CR4.PCIDE on supported systems (bsc#1068032).
- x86/mm: Fix INVPCID asm constraint (bsc#1068032).
- x86/mm: If INVPCID is available, use it to flush global mappings (bsc#1068032).
- x86/mm: Make flush_tlb_mm_range() more predictable (bsc#1068032).
- x86/mm: Only set IBPB when the new thread cannot ptrace current thread (bsc#1068032).
- x86/mm: Reimplement flush_tlb_page() using flush_tlb_mm_range() (bsc#1068032).
- x86/mm: Remove flush_tlb() and flush_tlb_current_task() (bsc#1068032).
- x86/mm: Remove the UP asm/tlbflush.h code, always use the (formerly) SMP code (bsc#1068032).
- x86/mm, sched/core: Turn off IRQs in switch_mm() (bsc#1068032).
- x86/mm, sched/core: Uninline switch_mm() (bsc#1068032).
- x86/mm: Set IBPB upon context switch (bsc#1068032).
- x86/MSR: Move native_*msr(.. u64) to msr.h (bsc#1068032).
- x86/paravirt: Dont patch flush_tlb_single (bsc#1068032).
- x86/spec: Add IBRS control functions (bsc#1068032).
- x86/spec: Add 'nospec' chicken bit (bsc#1068032).
- x86/spec: Check CPUID direclty post microcode reload to support IBPB feature (bsc#1068032).
- x86/spec_ctrl: Add an Indirect Branch Predictor barrier (bsc#1068032).
- x86/spec_ctrl: Check whether IBPB is enabled before using it (bsc#1068032).
- x86/spec_ctrl: Check whether IBRS is enabled before using it (bsc#1068032).
- x86/svm: Add code to clear registers on VM exit (bsc#1068032).
- x86/svm: Clobber the RSB on VM exit (bsc#1068032).
- x86/svm: Set IBPB when running a different VCPU (bsc#1068032).
- x86/svm: Set IBRS value on VM entry and exit (bsc#1068032).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005778">SUSE bug 1005778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005780">SUSE bug 1005780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005781">SUSE bug 1005781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017967">SUSE bug 1017967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039616">SUSE bug 1039616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047487">SUSE bug 1047487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063043">SUSE bug 1063043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064311">SUSE bug 1064311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065180">SUSE bug 1065180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068951">SUSE bug 1068951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070116">SUSE bug 1070116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071009">SUSE bug 1071009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072166">SUSE bug 1072166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072216">SUSE bug 1072216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072556">SUSE bug 1072556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072866">SUSE bug 1072866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072890">SUSE bug 1072890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072962">SUSE bug 1072962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073090">SUSE bug 1073090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073525">SUSE bug 1073525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073792">SUSE bug 1073792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073809">SUSE bug 1073809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073868">SUSE bug 1073868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073874">SUSE bug 1073874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073912">SUSE bug 1073912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963897">SUSE bug 963897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964063">SUSE bug 964063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966170">SUSE bug 966170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966172">SUSE bug 966172</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17805/">CVE-2017-17805</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17806/">CVE-2017-17806</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519733" comment="kernel-default-4.4.103-6.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519734" comment="kernel-default-devel-4.4.103-6.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519735" comment="kernel-default-extra-4.4.103-6.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519736" comment="kernel-devel-4.4.103-6.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519737" comment="kernel-macros-4.4.103-6.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519738" comment="kernel-source-4.4.103-6.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519739" comment="kernel-syms-4.4.103-6.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78285" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1088681" ref_url="https://bugzilla.suse.com/1088681" source="BUGZILLA"/>
		<reference ref_id="1090518" ref_url="https://bugzilla.suse.com/1090518" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2755" ref_url="https://www.suse.com/security/cve/CVE-2018-2755/" source="CVE"/>
		<reference ref_id="CVE-2018-2761" ref_url="https://www.suse.com/security/cve/CVE-2018-2761/" source="CVE"/>
		<reference ref_id="CVE-2018-2766" ref_url="https://www.suse.com/security/cve/CVE-2018-2766/" source="CVE"/>
		<reference ref_id="CVE-2018-2767" ref_url="https://www.suse.com/security/cve/CVE-2018-2767/" source="CVE"/>
		<reference ref_id="CVE-2018-2771" ref_url="https://www.suse.com/security/cve/CVE-2018-2771/" source="CVE"/>
		<reference ref_id="CVE-2018-2781" ref_url="https://www.suse.com/security/cve/CVE-2018-2781/" source="CVE"/>
		<reference ref_id="CVE-2018-2782" ref_url="https://www.suse.com/security/cve/CVE-2018-2782/" source="CVE"/>
		<reference ref_id="CVE-2018-2784" ref_url="https://www.suse.com/security/cve/CVE-2018-2784/" source="CVE"/>
		<reference ref_id="CVE-2018-2787" ref_url="https://www.suse.com/security/cve/CVE-2018-2787/" source="CVE"/>
		<reference ref_id="CVE-2018-2813" ref_url="https://www.suse.com/security/cve/CVE-2018-2813/" source="CVE"/>
		<reference ref_id="CVE-2018-2817" ref_url="https://www.suse.com/security/cve/CVE-2018-2817/" source="CVE"/>
		<reference ref_id="CVE-2018-2819" ref_url="https://www.suse.com/security/cve/CVE-2018-2819/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<description>


MariaDB was updated to 10.0.35 (bsc#1090518)

Notable changes:

* PCRE updated to 8.42
* XtraDB updated to 5.6.39-83.1
* TokuDB updated to 5.6.39-83.1
* InnoDB updated to 5.6.40
* The embedded server library now supports SSL when connecting
  to remote servers [bsc#1088681], [CVE-2018-2767]
* MDEV-15249 - Crash in MVCC read after IMPORT TABLESPACE
* MDEV-14988 - innodb_read_only tries to modify files if
  transactions were recovered in COMMITTED state
* MDEV-14773 - DROP TABLE hangs for InnoDB table with FULLTEXT index
* MDEV-15723 - Crash in INFORMATION_SCHEMA.INNODB_SYS_TABLES when
  accessing corrupted record
* fixes for the following security vulnerabilities:
  CVE-2018-2782, CVE-2018-2784, CVE-2018-2787, CVE-2018-2766,
  CVE-2018-2755, CVE-2018-2819, CVE-2018-2817, CVE-2018-2761,
  CVE-2018-2781, CVE-2018-2771, CVE-2018-2813
* Release notes and changelog:

    * https://kb.askmonty.org/en/mariadb-10035-release-notes
    * https://kb.askmonty.org/en/mariadb-10035-changelog
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-22"/>
	<updated date="2018-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1088681">SUSE bug 1088681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2755/">CVE-2018-2755</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2761/">CVE-2018-2761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2766/">CVE-2018-2766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2767/">CVE-2018-2767</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2771/">CVE-2018-2771</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2781/">CVE-2018-2781</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2782/">CVE-2018-2782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2784/">CVE-2018-2784</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2787/">CVE-2018-2787</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2813/">CVE-2018-2813</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2817/">CVE-2018-2817</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2819/">CVE-2018-2819</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519740" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519741" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519742" comment="libmysqlclient_r18-10.0.35-29.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519743" comment="libmysqlclient_r18-32bit-10.0.35-29.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519744" comment="mariadb-10.0.35-29.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519745" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519746" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78286" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1096449" ref_url="https://bugzilla.suse.com/1096449" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6126" ref_url="https://www.suse.com/security/cve/CVE-2018-6126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004214.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following security issue:

- CVE-2018-6126: Prevent heap buffer overflow in rasterizing paths in SVG with Skia (bsc#1096449).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-22"/>
	<updated date="2018-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096449">SUSE bug 1096449</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6126/">CVE-2018-6126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519747" comment="MozillaFirefox-52.8.1esr-109.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519748" comment="MozillaFirefox-translations-52.8.1esr-109.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78287" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1007276" ref_url="https://bugzilla.suse.com/1007276" source="BUGZILLA"/>
		<reference ref_id="1074317" ref_url="https://bugzilla.suse.com/1074317" source="BUGZILLA"/>
		<reference ref_id="1082332" ref_url="https://bugzilla.suse.com/1082332" source="BUGZILLA"/>
		<reference ref_id="1082825" ref_url="https://bugzilla.suse.com/1082825" source="BUGZILLA"/>
		<reference ref_id="1086408" ref_url="https://bugzilla.suse.com/1086408" source="BUGZILLA"/>
		<reference ref_id="1092949" ref_url="https://bugzilla.suse.com/1092949" source="BUGZILLA"/>
		<reference ref_id="974621" ref_url="https://bugzilla.suse.com/974621" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3632" ref_url="https://www.suse.com/security/cve/CVE-2016-3632/" source="CVE"/>
		<reference ref_id="CVE-2016-8331" ref_url="https://www.suse.com/security/cve/CVE-2016-8331/" source="CVE"/>
		<reference ref_id="CVE-2017-11613" ref_url="https://www.suse.com/security/cve/CVE-2017-11613/" source="CVE"/>
		<reference ref_id="CVE-2017-13726" ref_url="https://www.suse.com/security/cve/CVE-2017-13726/" source="CVE"/>
		<reference ref_id="CVE-2017-18013" ref_url="https://www.suse.com/security/cve/CVE-2017-18013/" source="CVE"/>
		<reference ref_id="CVE-2018-10963" ref_url="https://www.suse.com/security/cve/CVE-2018-10963/" source="CVE"/>
		<reference ref_id="CVE-2018-7456" ref_url="https://www.suse.com/security/cve/CVE-2018-7456/" source="CVE"/>
		<reference ref_id="CVE-2018-8905" ref_url="https://www.suse.com/security/cve/CVE-2018-8905/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004224.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

These security issues were fixed:

- CVE-2017-18013: There was a Null-Pointer Dereference in the tif_print.c TIFFPrintDirectory function, as demonstrated by a tiffinfo crash.  (bsc#1074317)
- CVE-2018-10963: The TIFFWriteDirectorySec() function in tif_dirwrite.c allowed remote attackers to cause a denial of service (assertion failure and application crash) via a crafted file, a different vulnerability than CVE-2017-13726.  (bsc#1092949)
- CVE-2018-7456: Prevent a NULL Pointer dereference in the function TIFFPrintDirectory when using the tiffinfo tool to print crafted TIFF information, a different vulnerability than CVE-2017-18013 (bsc#1082825)
- CVE-2017-11613: Prevent denial of service in the TIFFOpen function. During the TIFFOpen process, td_imagelength is not checked. The value of td_imagelength can be directly controlled by an input file. In the ChopUpSingleUncompressedStrip function, the _TIFFCheckMalloc function is called based on td_imagelength. If the value of td_imagelength is set close to the amount of system memory, it will hang the system or trigger the OOM killer (bsc#1082332)
- CVE-2018-8905: Prevent heap-based buffer overflow in the function LZWDecodeCompat via a crafted TIFF file (bsc#1086408)
- CVE-2016-8331: Prevent remote code execution because of incorrect handling of TIFF images. A crafted TIFF document could have lead to a type confusion vulnerability resulting in remote code execution. This vulnerability could have been be triggered via a TIFF file delivered to the application using LibTIFF's tag extension functionality (bsc#1007276)
- CVE-2016-3632: The _TIFFVGetField function allowed remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted TIFF image (bsc#974621)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-27"/>
	<updated date="2018-06-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007276">SUSE bug 1007276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074317">SUSE bug 1074317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082332">SUSE bug 1082332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082825">SUSE bug 1082825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086408">SUSE bug 1086408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092949">SUSE bug 1092949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974621">SUSE bug 974621</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3632/">CVE-2016-3632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8331/">CVE-2016-8331</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11613/">CVE-2017-11613</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13726/">CVE-2017-13726</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18013/">CVE-2017-18013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10963/">CVE-2018-10963</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7456/">CVE-2018-7456</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-8905/">CVE-2018-8905</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519749" comment="libtiff5-4.0.9-44.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519750" comment="libtiff5-32bit-4.0.9-44.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78288" version="1" class="patch">
	<metadata>
		<title>Security update for unixODBC (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1044970" ref_url="https://bugzilla.suse.com/1044970" source="BUGZILLA"/>
		<reference ref_id="1082060" ref_url="https://bugzilla.suse.com/1082060" source="BUGZILLA"/>
		<reference ref_id="1082290" ref_url="https://bugzilla.suse.com/1082290" source="BUGZILLA"/>
		<reference ref_id="1082484" ref_url="https://bugzilla.suse.com/1082484" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7409" ref_url="https://www.suse.com/security/cve/CVE-2018-7409/" source="CVE"/>
		<reference ref_id="CVE-2018-7485" ref_url="https://www.suse.com/security/cve/CVE-2018-7485/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004227.html" source="SUSE-SU"/>
		<description>


This update for unixODBC to version 2.3.6 fixes the following issues:

- CVE-2018-7409: Buffer overflow in unicode_to_ansi_copy() was fixed in 2.3.5 (bsc#1082290)
- CVE-2018-7485: Swapped arguments in SQLWriteFileDSN() in odbcinst/SQLWriteFileDSN.c (bsc#1082484)

Other fixes:

- Enabled --enable-fastvalidate option in configure (bsc#1044970)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-27"/>
	<updated date="2018-06-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1044970">SUSE bug 1044970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082060">SUSE bug 1082060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082290">SUSE bug 1082290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082484">SUSE bug 1082484</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-7409/">CVE-2018-7409</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-7485/">CVE-2018-7485</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519751" comment="unixODBC-2.3.6-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519752" comment="unixODBC-32bit-2.3.6-7.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78289" version="1" class="patch">
	<metadata>
		<title>Security update for procps (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1092100" ref_url="https://bugzilla.suse.com/1092100" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1122" ref_url="https://www.suse.com/security/cve/CVE-2018-1122/" source="CVE"/>
		<reference ref_id="CVE-2018-1123" ref_url="https://www.suse.com/security/cve/CVE-2018-1123/" source="CVE"/>
		<reference ref_id="CVE-2018-1124" ref_url="https://www.suse.com/security/cve/CVE-2018-1124/" source="CVE"/>
		<reference ref_id="CVE-2018-1125" ref_url="https://www.suse.com/security/cve/CVE-2018-1125/" source="CVE"/>
		<reference ref_id="CVE-2018-1126" ref_url="https://www.suse.com/security/cve/CVE-2018-1126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004229.html" source="SUSE-SU"/>
		<description>
This update for procps fixes the following security issues:

- CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top
  with HOME unset in an attacker-controlled directory, the attacker could have
  achieved privilege escalation by exploiting one of several vulnerabilities in
  the config_file() function (bsc#1092100).
- CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow.
  Inbuilt protection in ps maped a guard page at the end of the overflowed
  buffer, ensuring that the impact of this flaw is limited to a crash (temporary
  denial of service) (bsc#1092100).
- CVE-2018-1124: Prevent multiple integer overflows leading to a heap
  corruption in file2strvec function. This allowed a privilege escalation for a
  local attacker who can create entries in procfs by starting processes, which
  could result in crashes or arbitrary code execution in proc utilities run by
  other users (bsc#1092100).
- CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was
  mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).
- CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent
  truncation/integer overflow issues (bsc#1092100).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-28"/>
	<updated date="2018-06-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1122/">CVE-2018-1122</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1123/">CVE-2018-1123</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1124/">CVE-2018-1124</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1125/">CVE-2018-1125</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1126/">CVE-2018-1126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519753" comment="libprocps3-3.3.9-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519754" comment="procps-3.3.9-11.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78290" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1047356" ref_url="https://bugzilla.suse.com/1047356" source="BUGZILLA"/>
		<reference ref_id="1056277" ref_url="https://bugzilla.suse.com/1056277" source="BUGZILLA"/>
		<reference ref_id="1087820" ref_url="https://bugzilla.suse.com/1087820" source="BUGZILLA"/>
		<reference ref_id="1094204" ref_url="https://bugzilla.suse.com/1094204" source="BUGZILLA"/>
		<reference ref_id="1094237" ref_url="https://bugzilla.suse.com/1094237" source="BUGZILLA"/>
		<reference ref_id="1095730" ref_url="https://bugzilla.suse.com/1095730" source="BUGZILLA"/>
		<reference ref_id="1095812" ref_url="https://bugzilla.suse.com/1095812" source="BUGZILLA"/>
		<reference ref_id="1095813" ref_url="https://bugzilla.suse.com/1095813" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10928" ref_url="https://www.suse.com/security/cve/CVE-2017-10928/" source="CVE"/>
		<reference ref_id="CVE-2017-13758" ref_url="https://www.suse.com/security/cve/CVE-2017-13758/" source="CVE"/>
		<reference ref_id="CVE-2017-18271" ref_url="https://www.suse.com/security/cve/CVE-2017-18271/" source="CVE"/>
		<reference ref_id="CVE-2018-10804" ref_url="https://www.suse.com/security/cve/CVE-2018-10804/" source="CVE"/>
		<reference ref_id="CVE-2018-10805" ref_url="https://www.suse.com/security/cve/CVE-2018-10805/" source="CVE"/>
		<reference ref_id="CVE-2018-11251" ref_url="https://www.suse.com/security/cve/CVE-2018-11251/" source="CVE"/>
		<reference ref_id="CVE-2018-11655" ref_url="https://www.suse.com/security/cve/CVE-2018-11655/" source="CVE"/>
		<reference ref_id="CVE-2018-9133" ref_url="https://www.suse.com/security/cve/CVE-2018-9133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004234.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

These security issues were fixed:

- CVE-2017-13758: Prevent heap-based buffer overflow in the TracePoint()
  function (bsc#1056277).
- CVE-2017-10928: Prevent heap-based buffer over-read in the GetNextToken
  function that allowed remote attackers to obtain sensitive information from
  process memory or possibly have unspecified other impact via a crafted SVG
  document (bsc#1047356).
- CVE-2018-9133: Long compute times in the tiff decoder have been fixed (bsc#1087820).
- CVE-2018-11251: Heap-based buffer over-read in ReadSUNImage in coders/sun.c, which allows attackers to cause denial of service (bsc#1094237).
- CVE-2017-18271: Infinite loop in the function ReadMIFFImage in coders/miff.c, which allows attackers to cause a denial of service (bsc#1094204).
- CVE-2018-11655: Memory leak in the GetImagePixelCache in MagickCore/cache.c was fixed (bsc#1095730)
- CVE-2018-10804: Memory leak in WriteTIFFImage in coders/tiff.c was fixed (bsc#1095813)
- CVE-2018-10805: Fixed memory leaks in bgr.c, rgb.c, cmyk.c, gray.c, ycbcr.c (bsc#1095812)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-29"/>
	<updated date="2018-06-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047356">SUSE bug 1047356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056277">SUSE bug 1056277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087820">SUSE bug 1087820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094204">SUSE bug 1094204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094237">SUSE bug 1094237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095730">SUSE bug 1095730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095812">SUSE bug 1095812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095813">SUSE bug 1095813</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10928/">CVE-2017-10928</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13758/">CVE-2017-13758</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18271/">CVE-2017-18271</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10804/">CVE-2018-10804</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10805/">CVE-2018-10805</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11251/">CVE-2018-11251</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11655/">CVE-2018-11655</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-9133/">CVE-2018-9133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519755" comment="ImageMagick-6.8.8.1-71.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519756" comment="libMagick++-6_Q16-3-6.8.8.1-71.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519757" comment="libMagickCore-6_Q16-1-6.8.8.1-71.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519758" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519759" comment="libMagickWand-6_Q16-1-6.8.8.1-71.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78291" version="1" class="patch">
	<metadata>
		<title>Security update for libvpx (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1075992" ref_url="https://bugzilla.suse.com/1075992" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13194" ref_url="https://www.suse.com/security/cve/CVE-2017-13194/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003623.html" source="SUSE-SU"/>
		<description>
This update for libvpx fixes one issues.

This security issue was fixed: 

- CVE-2017-13194: Fixed incorrect memory allocation related to odd frame width (bsc#1075992).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-23"/>
	<updated date="2018-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1075992">SUSE bug 1075992</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13194/">CVE-2017-13194</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518765" comment="libvpx1-1.3.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518766" comment="libvpx1-32bit-1.3.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518767" comment="vpx-tools-1.3.0-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78292" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1097158" ref_url="https://bugzilla.suse.com/1097158" source="BUGZILLA"/>
		<reference ref_id="1097624" ref_url="https://bugzilla.suse.com/1097624" source="BUGZILLA"/>
		<reference ref_id="1098592" ref_url="https://bugzilla.suse.com/1098592" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004245.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based
  ciphersuite a malicious server could have sent a very large prime value to the
  client. This caused the client to spend an unreasonably long period of time
  generating a key for this prime resulting in a hang until the client has
  finished. This could be exploited in a Denial Of Service attack (bsc#1097158).
- Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-05"/>
	<updated date="2018-07-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097624">SUSE bug 1097624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098592">SUSE bug 1098592</bugzilla>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519760" comment="libopenssl-devel-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519761" comment="libopenssl1_0_0-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519762" comment="libopenssl1_0_0-32bit-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519763" comment="openssl-1.0.2j-60.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78293" version="1" class="patch">
	<metadata>
		<title>Security update for libqt4 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1039291" ref_url="https://bugzilla.suse.com/1039291" source="BUGZILLA"/>
		<reference ref_id="1042657" ref_url="https://bugzilla.suse.com/1042657" source="BUGZILLA"/>
		<reference ref_id="956357" ref_url="https://bugzilla.suse.com/956357" source="BUGZILLA"/>
		<reference ref_id="964458" ref_url="https://bugzilla.suse.com/964458" source="BUGZILLA"/>
		<reference ref_id="982826" ref_url="https://bugzilla.suse.com/982826" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10040" ref_url="https://www.suse.com/security/cve/CVE-2016-10040/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004250.html" source="SUSE-SU"/>
		<description>

This update for libqt4 fixes the following issues:

LibQt4 was updated to 4.8.7 (bsc#1039291, CVE-2016-10040):

See
	http://download.qt.io/official_releases/qt/4.8/4.8.7/changes-4.8.7
for more details.

Also libQtWebkit4 was updated to 2.3.4 to match libqt4.

Also following bugs were fixed:

- Enable libqt4-devel-32bit (bsc#982826)
- Fixed bolder font in Qt4 apps (boo#956357)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-06"/>
	<updated date="2018-07-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1039291">SUSE bug 1039291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042657">SUSE bug 1042657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956357">SUSE bug 956357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964458">SUSE bug 964458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982826">SUSE bug 982826</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10040/">CVE-2016-10040</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519764" comment="libQtWebKit4-4.8.7+2.3.4-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519765" comment="libQtWebKit4-32bit-4.8.7+2.3.4-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519766" comment="libqca2-2.0.3-17.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519767" comment="libqca2-32bit-2.0.3-17.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519768" comment="libqt4-4.8.7-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519769" comment="libqt4-32bit-4.8.7-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519770" comment="libqt4-qt3support-4.8.7-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519771" comment="libqt4-qt3support-32bit-4.8.7-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519772" comment="libqt4-sql-4.8.7-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519773" comment="libqt4-sql-32bit-4.8.7-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519774" comment="libqt4-sql-mysql-4.8.7-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519775" comment="libqt4-sql-mysql-32bit-4.8.7-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519776" comment="libqt4-sql-postgresql-4.8.7-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519777" comment="libqt4-sql-postgresql-32bit-4.8.7-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519778" comment="libqt4-sql-sqlite-4.8.7-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519779" comment="libqt4-sql-sqlite-32bit-4.8.7-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519780" comment="libqt4-sql-unixODBC-4.8.7-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519781" comment="libqt4-sql-unixODBC-32bit-4.8.7-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519782" comment="libqt4-x11-4.8.7-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519783" comment="libqt4-x11-32bit-4.8.7-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519784" comment="qt4-qtscript-0.2.0-11.2.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78294" version="1" class="patch">
	<metadata>
		<title>Recommended update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087083" ref_url="https://bugzilla.suse.com/1087083" source="BUGZILLA"/>
		<reference ref_id="1096141" ref_url="https://bugzilla.suse.com/1096141" source="BUGZILLA"/>
		<reference ref_id="1100147" ref_url="https://bugzilla.suse.com/1100147" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004257.html" source="SUSE-SU"/>
		<description>


The Intel CPU microcode bundle was updated to the 20180703 release.

For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a)
and helps mitigating CVE-2018-3639 (Spectre v4)  (bsc#1100147 bsc#1087082 bsc#1087083).

More information on:
  https://downloadcenter.intel.com/download/27945/Linux-Processor-Microcode-Data-File

Following chipsets are fixed in this round:

Model        Stepping F-MO-S/PI      Old-&gt;New

---- updated platforms ------------------------------------

SNB-EP       C1       6-2d-6/6d 0000061c-&gt;0000061d Xeon E5
SNB-EP       C2       6-2d-7/6d 00000713-&gt;00000714 Xeon E5
IVT          C0       6-3e-4/ed 0000042c-&gt;0000042d Xeon E5 v2; Core i7-4960X/4930K/4820K
IVT          D1       6-3e-7/ed 00000713-&gt;00000714 Xeon E5 v2
HSX-E/EP/4S  C0       6-3f-2/6f 0000003c-&gt;0000003d Xeon E5 v3
HSX-EX       E0       6-3f-4/80 00000011-&gt;00000012 Xeon E7 v3
SKX-SP/D/W/X H0       6-55-4/b7 02000043-&gt;0200004d Xeon Bronze 31xx, Silver 41xx, Gold 51xx/61xx Platinum 81xx, D/W-21xx; Core i9-7xxxX
BDX-DE       A1       6-56-5/10 0e000009-&gt;0e00000a Xeon D-15x3N
BDX-ML       B/M/R0   6-4f-1/ef 0b00002c-&gt;0b00002e Xeon E5/E7 v4; Core i7-69xx/68xx

- Add a new style supplements for the recent kernels. (bsc#1096141)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-12"/>
	<updated date="2018-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087083">SUSE bug 1087083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096141">SUSE bug 1096141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100147">SUSE bug 1100147</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519785" comment="ucode-intel-20180703-13.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78295" version="1" class="patch">
	<metadata>
		<title>Security update for gdk-pixbuf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1074462" ref_url="https://bugzilla.suse.com/1074462" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000422" ref_url="https://www.suse.com/security/cve/CVE-2017-1000422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004273.html" source="SUSE-SU"/>
		<description>
This update for gdk-pixbuf fixes the following security issue:

- CVE-2017-1000422: Prevent several integer overflow in the gif_get_lzw
  function resulting in memory corruption and potential code execution
  (bsc#1074462).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-13"/>
	<updated date="2018-07-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074462">SUSE bug 1074462</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000422/">CVE-2017-1000422</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519786" comment="gdk-pixbuf-lang-2.34.0-19.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519787" comment="gdk-pixbuf-query-loaders-2.34.0-19.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519788" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519789" comment="libgdk_pixbuf-2_0-0-2.34.0-19.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519790" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519791" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78296" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1068565" ref_url="https://bugzilla.suse.com/1068565" source="BUGZILLA"/>
		<reference ref_id="1082216" ref_url="https://bugzilla.suse.com/1082216" source="BUGZILLA"/>
		<reference ref_id="1082233" ref_url="https://bugzilla.suse.com/1082233" source="BUGZILLA"/>
		<reference ref_id="1082234" ref_url="https://bugzilla.suse.com/1082234" source="BUGZILLA"/>
		<reference ref_id="1096718" ref_url="https://bugzilla.suse.com/1096718" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12015" ref_url="https://www.suse.com/security/cve/CVE-2018-12015/" source="CVE"/>
		<reference ref_id="CVE-2018-6797" ref_url="https://www.suse.com/security/cve/CVE-2018-6797/" source="CVE"/>
		<reference ref_id="CVE-2018-6798" ref_url="https://www.suse.com/security/cve/CVE-2018-6798/" source="CVE"/>
		<reference ref_id="CVE-2018-6913" ref_url="https://www.suse.com/security/cve/CVE-2018-6913/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004278.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

These security issue were fixed: 

- CVE-2018-6913: Fixed space calculation issues in pp_pack.c (bsc#1082216).
- CVE-2018-6798: Fixed heap buffer overflow in regexec.c (bsc#1082233).
- CVE-2018-6797: Fixed sharp-s regexp overflow (bsc#1082234).
- CVE-2018-12015: The Archive::Tar module allowed remote attackers to bypass a
  directory-traversal protection mechanism and overwrite arbitrary files
  (bsc#1096718)

This non-security issue was fixed: 

- fix debugger crash in tab completion with Term::ReadLine::Gnu [bsc#1068565]

		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-17"/>
	<updated date="2018-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068565">SUSE bug 1068565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082216">SUSE bug 1082216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082233">SUSE bug 1082233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082234">SUSE bug 1082234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096718">SUSE bug 1096718</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12015/">CVE-2018-12015</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6797/">CVE-2018-6797</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-6798/">CVE-2018-6798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6913/">CVE-2018-6913</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519792" comment="perl-5.18.2-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519793" comment="perl-32bit-5.18.2-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519794" comment="perl-base-5.18.2-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519795" comment="perl-doc-5.18.2-12.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78297" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1074171" ref_url="https://bugzilla.suse.com/1074171" source="BUGZILLA"/>
		<reference ref_id="1075737" ref_url="https://bugzilla.suse.com/1075737" source="BUGZILLA"/>
		<reference ref_id="1075738" ref_url="https://bugzilla.suse.com/1075738" source="BUGZILLA"/>
		<reference ref_id="1075739" ref_url="https://bugzilla.suse.com/1075739" source="BUGZILLA"/>
		<reference ref_id="1075748" ref_url="https://bugzilla.suse.com/1075748" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17935" ref_url="https://www.suse.com/security/cve/CVE-2017-17935/" source="CVE"/>
		<reference ref_id="CVE-2018-5334" ref_url="https://www.suse.com/security/cve/CVE-2018-5334/" source="CVE"/>
		<reference ref_id="CVE-2018-5335" ref_url="https://www.suse.com/security/cve/CVE-2018-5335/" source="CVE"/>
		<reference ref_id="CVE-2018-5336" ref_url="https://www.suse.com/security/cve/CVE-2018-5336/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003624.html" source="SUSE-SU"/>
		<description>
This update for wireshark to version 2.2.12 fixes the following issues:

- CVE-2018-5334: IxVeriWave file could crash (bsc#1075737)
- CVE-2018-5335: WCP dissector could crash (bsc#1075738)
- CVE-2018-5336: Multiple dissector crashes (bsc#1075739)
- CVE-2017-17935: Incorrect handling of '\n' in file_read_line function could
  have lead to denial of service (bsc#1074171)

This release no longer enables the Linux kernel BPF JIT compiler via the
net.core.bpf_jit_enable sysctl, as this would make systems more vulnerable
to Spectre variant 1 CVE-2017-5753 - (bsc#1075748)

Further bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-2.2.12.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-24"/>
	<updated date="2018-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074171">SUSE bug 1074171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075737">SUSE bug 1075737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075738">SUSE bug 1075738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075739">SUSE bug 1075739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075748">SUSE bug 1075748</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17935/">CVE-2017-17935</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5334/">CVE-2018-5334</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5335/">CVE-2018-5335</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5336/">CVE-2018-5336</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518768" comment="libwireshark8-2.2.12-48.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518769" comment="libwiretap6-2.2.12-48.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518770" comment="libwscodecs1-2.2.12-48.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518771" comment="libwsutil7-2.2.12-48.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518772" comment="wireshark-2.2.12-48.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518773" comment="wireshark-gtk-2.2.12-48.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78298" version="1" class="patch">
	<metadata>
		<title>Security update for shadow (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1099310" ref_url="https://bugzilla.suse.com/1099310" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6252" ref_url="https://www.suse.com/security/cve/CVE-2016-6252/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004291.html" source="SUSE-SU"/>
		<description>
This update for shadow fixes the following issues:

- CVE-2016-6252: Incorrect integer handling could results in local privilege escalation (bsc#1099310)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-19"/>
	<updated date="2018-07-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1099310">SUSE bug 1099310</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-6252/">CVE-2016-6252</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519796" comment="shadow-4.2.1-27.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78299" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1076957" ref_url="https://bugzilla.suse.com/1076957" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10708" ref_url="https://www.suse.com/security/cve/CVE-2016-10708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004283.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Security issue fixed:

- CVE-2016-10708: Prevent DoS due to crashes caused by out-of-sequence NEWKEYS message (bsc#1076957).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-19"/>
	<updated date="2018-07-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076957">SUSE bug 1076957</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10708/">CVE-2016-10708</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519797" comment="openssh-7.2p2-74.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519798" comment="openssh-askpass-gnome-7.2p2-74.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519799" comment="openssh-helpers-7.2p2-74.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78300" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1055857" ref_url="https://bugzilla.suse.com/1055857" source="BUGZILLA"/>
		<reference ref_id="1059893" ref_url="https://bugzilla.suse.com/1059893" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6328" ref_url="https://www.suse.com/security/cve/CVE-2016-6328/" source="CVE"/>
		<reference ref_id="CVE-2017-7544" ref_url="https://www.suse.com/security/cve/CVE-2017-7544/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003625.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes several issues.

These security issues were fixed:

- CVE-2016-6328: Fixed integer overflow in parsing MNOTE entry data of the input
  file (bsc#1055857)
- CVE-2017-7544: Fixed out-of-bounds heap read vulnerability in
  exif_data_save_data_entry function in libexif/exif-data.c caused by improper
  length computation of the allocated data of an ExifMnote entry which can cause
  denial-of-service or possibly information disclosure (bsc#1059893)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-24"/>
	<updated date="2018-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1055857">SUSE bug 1055857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059893">SUSE bug 1059893</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-6328/">CVE-2016-6328</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7544/">CVE-2017-7544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518774" comment="libexif12-0.6.21-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518775" comment="libexif12-32bit-0.6.21-8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78301" version="1" class="patch">
	<metadata>
		<title>Security update for rsyslog (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="935393" ref_url="https://bugzilla.suse.com/935393" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3243" ref_url="https://www.suse.com/security/cve/CVE-2015-3243/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004295.html" source="SUSE-SU"/>
		<description>
This update for rsyslog fixes the following issues:

The following security vulnerability was addressed:

CVE-2015-3243: Make sure that log files are not created world-readable (bsc#935393)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-23"/>
	<updated date="2018-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935393">SUSE bug 935393</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-3243/">CVE-2015-3243</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519800" comment="rsyslog-8.24.0-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78302" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1083507" ref_url="https://bugzilla.suse.com/1083507" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004297.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

The following security vulnerabilities were addressed:

- Add a check to Lib/wave.py that verifies that at least one channel is
  provided. Prior to this, attackers could cause a denial of service via a
  crafted wav format audio file. [bsc#1083507, CVE-2017-18207]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-23"/>
	<updated date="2018-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083507">SUSE bug 1083507</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519801" comment="libpython2_7-1_0-2.7.13-28.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519802" comment="libpython2_7-1_0-32bit-2.7.13-28.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519803" comment="python-2.7.13-28.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519804" comment="python-base-2.7.13-28.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519805" comment="python-curses-2.7.13-28.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519806" comment="python-devel-2.7.13-28.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519807" comment="python-tk-2.7.13-28.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519808" comment="python-xml-2.7.13-28.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78303" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1064232" ref_url="https://bugzilla.suse.com/1064232" source="BUGZILLA"/>
		<reference ref_id="1075876" ref_url="https://bugzilla.suse.com/1075876" source="BUGZILLA"/>
		<reference ref_id="1076110" ref_url="https://bugzilla.suse.com/1076110" source="BUGZILLA"/>
		<reference ref_id="1085185" ref_url="https://bugzilla.suse.com/1085185" source="BUGZILLA"/>
		<reference ref_id="1085657" ref_url="https://bugzilla.suse.com/1085657" source="BUGZILLA"/>
		<reference ref_id="1089525" ref_url="https://bugzilla.suse.com/1089525" source="BUGZILLA"/>
		<reference ref_id="1090435" ref_url="https://bugzilla.suse.com/1090435" source="BUGZILLA"/>
		<reference ref_id="1090888" ref_url="https://bugzilla.suse.com/1090888" source="BUGZILLA"/>
		<reference ref_id="1091171" ref_url="https://bugzilla.suse.com/1091171" source="BUGZILLA"/>
		<reference ref_id="1092207" ref_url="https://bugzilla.suse.com/1092207" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1094248" ref_url="https://bugzilla.suse.com/1094248" source="BUGZILLA"/>
		<reference ref_id="1094643" ref_url="https://bugzilla.suse.com/1094643" source="BUGZILLA"/>
		<reference ref_id="1095453" ref_url="https://bugzilla.suse.com/1095453" source="BUGZILLA"/>
		<reference ref_id="1096790" ref_url="https://bugzilla.suse.com/1096790" source="BUGZILLA"/>
		<reference ref_id="1097034" ref_url="https://bugzilla.suse.com/1097034" source="BUGZILLA"/>
		<reference ref_id="1097140" ref_url="https://bugzilla.suse.com/1097140" source="BUGZILLA"/>
		<reference ref_id="1097492" ref_url="https://bugzilla.suse.com/1097492" source="BUGZILLA"/>
		<reference ref_id="1097501" ref_url="https://bugzilla.suse.com/1097501" source="BUGZILLA"/>
		<reference ref_id="1097551" ref_url="https://bugzilla.suse.com/1097551" source="BUGZILLA"/>
		<reference ref_id="1097808" ref_url="https://bugzilla.suse.com/1097808" source="BUGZILLA"/>
		<reference ref_id="1097931" ref_url="https://bugzilla.suse.com/1097931" source="BUGZILLA"/>
		<reference ref_id="1097961" ref_url="https://bugzilla.suse.com/1097961" source="BUGZILLA"/>
		<reference ref_id="1098016" ref_url="https://bugzilla.suse.com/1098016" source="BUGZILLA"/>
		<reference ref_id="1098236" ref_url="https://bugzilla.suse.com/1098236" source="BUGZILLA"/>
		<reference ref_id="1098425" ref_url="https://bugzilla.suse.com/1098425" source="BUGZILLA"/>
		<reference ref_id="1098435" ref_url="https://bugzilla.suse.com/1098435" source="BUGZILLA"/>
		<reference ref_id="1098527" ref_url="https://bugzilla.suse.com/1098527" source="BUGZILLA"/>
		<reference ref_id="1098599" ref_url="https://bugzilla.suse.com/1098599" source="BUGZILLA"/>
		<reference ref_id="1099042" ref_url="https://bugzilla.suse.com/1099042" source="BUGZILLA"/>
		<reference ref_id="1099183" ref_url="https://bugzilla.suse.com/1099183" source="BUGZILLA"/>
		<reference ref_id="1099279" ref_url="https://bugzilla.suse.com/1099279" source="BUGZILLA"/>
		<reference ref_id="1099713" ref_url="https://bugzilla.suse.com/1099713" source="BUGZILLA"/>
		<reference ref_id="1099732" ref_url="https://bugzilla.suse.com/1099732" source="BUGZILLA"/>
		<reference ref_id="1099792" ref_url="https://bugzilla.suse.com/1099792" source="BUGZILLA"/>
		<reference ref_id="1099810" ref_url="https://bugzilla.suse.com/1099810" source="BUGZILLA"/>
		<reference ref_id="1099918" ref_url="https://bugzilla.suse.com/1099918" source="BUGZILLA"/>
		<reference ref_id="1099924" ref_url="https://bugzilla.suse.com/1099924" source="BUGZILLA"/>
		<reference ref_id="1099966" ref_url="https://bugzilla.suse.com/1099966" source="BUGZILLA"/>
		<reference ref_id="1099993" ref_url="https://bugzilla.suse.com/1099993" source="BUGZILLA"/>
		<reference ref_id="1100089" ref_url="https://bugzilla.suse.com/1100089" source="BUGZILLA"/>
		<reference ref_id="1100340" ref_url="https://bugzilla.suse.com/1100340" source="BUGZILLA"/>
		<reference ref_id="1100416" ref_url="https://bugzilla.suse.com/1100416" source="BUGZILLA"/>
		<reference ref_id="1100418" ref_url="https://bugzilla.suse.com/1100418" source="BUGZILLA"/>
		<reference ref_id="1100491" ref_url="https://bugzilla.suse.com/1100491" source="BUGZILLA"/>
		<reference ref_id="1100843" ref_url="https://bugzilla.suse.com/1100843" source="BUGZILLA"/>
		<reference ref_id="1101296" ref_url="https://bugzilla.suse.com/1101296" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053/" source="CVE"/>
		<reference ref_id="CVE-2018-13405" ref_url="https://www.suse.com/security/cve/CVE-2018-13405/" source="CVE"/>
		<reference ref_id="CVE-2018-13406" ref_url="https://www.suse.com/security/cve/CVE-2018-13406/" source="CVE"/>
		<reference ref_id="CVE-2018-9385" ref_url="https://www.suse.com/security/cve/CVE-2018-9385/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004305.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.140 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-13053: The alarm_timer_nsleep function had an integer overflow via a
  large relative timeout because ktime_add_safe was not used (bnc#1099924)
- CVE-2018-9385: Prevent overread of the 'driver_override' buffer (bsc#1100491)
- CVE-2018-13405: The inode_init_owner function allowed local users to create
  files with an unintended group ownership allowing attackers to escalate
  privileges by making a plain file executable and SGID (bnc#1100416)
- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function could
  have result in local attackers being able to crash the kernel or potentially
  elevate privileges because kmalloc_array is not used (bnc#1100418)

The following non-security bugs were fixed:

- 1wire: family module autoload fails because of upper/lower case mismatch (bnc#1012382).
- ALSA: hda - Clean up ALC299 init code (bsc#1099810).
- ALSA: hda - Enable power_save_node for CX20722 (bsc#1099810).
- ALSA: hda - Fix a wrong FIXUP for alc289 on Dell machines (bsc#1099810).
- ALSA: hda - Fix incorrect usage of IS_REACHABLE() (bsc#1099810).
- ALSA: hda - Fix pincfg at resume on Lenovo T470 dock (bsc#1099810).
- ALSA: hda - Handle kzalloc() failure in snd_hda_attach_pcm_stream() (bnc#1012382).
- ALSA: hda - Use acpi_dev_present() (bsc#1099810).
- ALSA: hda - add a new condition to check if it is thinkpad (bsc#1099810).
- ALSA: hda - silence uninitialized variable warning in activate_amp_in() (bsc#1099810).
- ALSA: hda/patch_sigmatel: Add AmigaOne X1000 pinconfigs (bsc#1099810).
- ALSA: hda/realtek - Add a quirk for FSC ESPRIMO U9210 (bsc#1099810).
- ALSA: hda/realtek - Add headset mode support for Dell laptop (bsc#1099810).
- ALSA: hda/realtek - Add support headset mode for DELL WYSE (bsc#1099810).
- ALSA: hda/realtek - Clevo P950ER ALC1220 Fixup (bsc#1099810).
- ALSA: hda/realtek - Enable Thinkpad Dock device for ALC298 platform (bsc#1099810).
- ALSA: hda/realtek - Enable mic-mute hotkey for several Lenovo AIOs (bsc#1099810).
- ALSA: hda/realtek - Fix Dell headset Mic can't record (bsc#1099810).
- ALSA: hda/realtek - Fix pop noise on Lenovo P50 and co (bsc#1099810).
- ALSA: hda/realtek - Fix the problem of two front mics on more machines (bsc#1099810).
- ALSA: hda/realtek - Fixup for HP x360 laptops with BandO speakers (bsc#1099810).
- ALSA: hda/realtek - Fixup mute led on HP Spectre x360 (bsc#1099810).
- ALSA: hda/realtek - Make dock sound work on ThinkPad L570 (bsc#1099810).
- ALSA: hda/realtek - Refactor alc269_fixup_hp_mute_led_mic*() (bsc#1099810).
- ALSA: hda/realtek - Reorder ALC269 ASUS quirk entries (bsc#1099810).
- ALSA: hda/realtek - Support headset mode for ALC215/ALC285/ALC289 (bsc#1099810).
- ALSA: hda/realtek - Update ALC255 depop optimize (bsc#1099810).
- ALSA: hda/realtek - adjust the location of one mic (bsc#1099810).
- ALSA: hda/realtek - change the location for one of two front mics (bsc#1099810).
- ALSA: hda/realtek - set PINCFG_HEADSET_MIC to parse_flags (bsc#1099810).
- ALSA: hda/realtek - update ALC215 depop optimize (bsc#1099810).
- ALSA: hda/realtek - update ALC225 depop optimize (bsc#1099810).
- ALSA: hda/realtek: Fix mic and headset jack sense on Asus X705UD (bsc#1099810).
- ALSA: hda/realtek: Limit mic boost on T480 (bsc#1099810).
- ALSA: hda: Fix forget to free resource in error handling code path in hda_codec_driver_probe (bsc#1099810).
- ALSA: hda: add dock and led support for HP EliteBook 830 G5 (bsc#1099810).
- ALSA: hda: add dock and led support for HP ProBook 640 G4 (bsc#1099810).
- ALSA: hda: fix some klockwork scan warnings (bsc#1099810).
- ARM: 8764/1: kgdb: fix NUMREGBYTES so that gdb_regs[] is the correct size (bnc#1012382).
- ARM: dts: imx6q: Use correct SDMA script for SPI5 core (bnc#1012382).
- ASoC: cirrus: i2s: Fix LRCLK configuration (bnc#1012382).
- ASoC: cirrus: i2s: Fix {TX|RX}LinCtrlData setup (bnc#1012382).
- ASoC: dapm: delete dapm_kcontrol_data paths list before freeing it (bnc#1012382).
- Bluetooth: Fix connection if directed advertising and privacy is used (bnc#1012382).
- Bluetooth: hci_qca: Avoid missing rampatch failure with userspace fw loader (bnc#1012382).
- Btrfs: fix clone vs chattr NODATASUM race (bnc#1012382).
- Btrfs: fix unexpected cow in run_delalloc_nocow (bnc#1012382).
- Btrfs: make raid6 rebuild retry more (bnc#1012382).
- Correct the arguments to verbose() (bsc#1098425)
- HID: debug: check length before copy_to_user() (bnc#1012382).
- HID: hiddev: fix potential Spectre v1 (bnc#1012382).
- HID: i2c-hid: Fix 'incomplete report' noise (bnc#1012382).
- Hang/soft lockup in d_invalidate with simultaneous calls (bsc#1094248, bsc@1097140).
- IB/qib: Fix DMA api warning with debug kernel (bnc#1012382).
- Input: elan_i2c - add ELAN0618 (Lenovo v330 15IKB) ACPI ID (bnc#1012382).
- Input: elan_i2c_smbus - fix more potential stack buffer overflows (bnc#1012382).
- Input: elantech - enable middle button of touchpads on ThinkPad P52 (bnc#1012382).
- Input: elantech - fix V4 report decoding for module with middle key (bnc#1012382).
- MIPS: BCM47XX: Enable 74K Core ExternalSync for PCIe erratum (bnc#1012382).
- MIPS: io: Add barrier after register read in inX() (bnc#1012382).
- NFSv4: Fix possible 1-byte stack overflow in nfs_idmap_read_and_verify_message (bnc#1012382).
- PCI: pciehp: Clear Presence Detect and Data Link Layer Status Changed on resume (bnc#1012382).
- RDMA/mlx4: Discard unknown SQP work requests (bnc#1012382).
- Refresh with upstream commit:62290a5c194b since the typo fix has been merged in upstream. (bsc#1085185)
- Remove broken patches for dac9063 watchdog (bsc#1100843)
- Remove sorted section marker This branch contains a small sorted section with an old format that fails the current checker. Updating the section and scripts to the new format might make merges with other branches more difficult. Instead, simply remove the section marker.
- Revert 'Btrfs: fix scrub to repair raid6 corruption' (bnc#1012382).
- Revert 'kvm: nVMX: Enforce cpl=0 for VMX instructions (bsc#1099183).' This turned out to be superfluous for 4.4.x kernels.
- Revert 'scsi: lpfc: Fix 16gb hbas failing cq create (bsc#1089525).' This reverts commit b054499f7615e2ffa7571ac0d05c7d5c9a8c0327.
- UBIFS: Fix potential integer overflow in allocation (bnc#1012382).
- USB: serial: cp210x: add CESINEL device ids (bnc#1012382).
- USB: serial: cp210x: add Silicon Labs IDs for Windows Update (bnc#1012382).
- Update patches.fixes/nvme-expand-nvmf_check_if_ready-checks.patch (bsc#1098527).
- ath10k: fix rfc1042 header retrieval in QCA4019 with eth decap mode (bnc#1012382).
- atm: zatm: fix memcmp casting (bnc#1012382).
- backlight: as3711_bl: Fix Device Tree node lookup (bnc#1012382).
- backlight: max8925_bl: Fix Device Tree node lookup (bnc#1012382).
- backlight: tps65217_bl: Fix Device Tree node lookup (bnc#1012382).
- bcache: Add __printf annotation to __bch_check_keys() (bsc#1064232).
- bcache: Annotate switch fall-through (bsc#1064232).
- bcache: Fix a compiler warning in bcache_device_init() (bsc#1064232).
- bcache: Fix indentation (bsc#1064232).
- bcache: Fix kernel-doc warnings (bsc#1064232).
- bcache: Fix, improve efficiency of closure_sync() (bsc#1076110).
- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1064232).
- bcache: Remove an unused variable (bsc#1064232).
- bcache: Suppress more warnings about set-but-not-used variables (bsc#1064232).
- bcache: Use PTR_ERR_OR_ZERO() (bsc#1076110).
- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1064232).
- bcache: add backing_request_endio() for bi_end_io (bsc#1064232).
- bcache: add io_disable to struct cached_dev (bsc#1064232).
- bcache: add journal statistic (bsc#1076110).
- bcache: add stop_when_cache_set_failed option to backing device (bsc#1064232).
- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1064232).
- bcache: closures: move control bits one bit right (bsc#1076110).
- bcache: correct flash only vols (check all uuids) (bsc#1064232).
- bcache: count backing device I/O error for writeback I/O (bsc#1064232).
- bcache: fix cached_dev-&gt;count usage for bch_cache_set_error() (bsc#1064232).
- bcache: fix crashes in duplicate cache device register (bsc#1076110).
- bcache: fix error return value in memory shrink (bsc#1064232).
- bcache: fix high CPU occupancy during journal (bsc#1076110).
- bcache: fix inaccurate io state for detached bcache devices (bsc#1064232).
- bcache: fix incorrect sysfs output value of strip size (bsc#1064232).
- bcache: fix misleading error message in bch_count_io_errors() (bsc#1064232).
- bcache: fix using of loop variable in memory shrink (bsc#1064232).
- bcache: fix writeback target calc on large devices (bsc#1076110).
- bcache: fix wrong return value in bch_debug_init() (bsc#1076110).
- bcache: mark closure_sync() __sched (bsc#1076110).
- bcache: move closure debug file into debug directory (bsc#1064232).
- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1064232).
- bcache: ret IOERR when read meets metadata error (bsc#1076110).
- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1064232).
- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1064232).
- bcache: set dc-&gt;io_disable to true in conditional_stop_bcache_device() (bsc#1064232).
- bcache: set error_limit correctly (bsc#1064232).
- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1064232).
- bcache: stop bcache device when backing device is offline (bsc#1064232).
- bcache: stop dc-&gt;writeback_rate_update properly (bsc#1064232).
- bcache: stop writeback thread after detaching (bsc#1076110).
- bcache: store disk name in struct cache and struct cached_dev (bsc#1064232).
- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1064232).
- block: Fix transfer when chunk sectors exceeds max (bnc#1012382).
- bonding: re-evaluate force_primary when the primary slave name changes (bnc#1012382).
- bpf: properly enforce index mask to prevent out-of-bounds speculation (bsc#1098425).
- branch-check: fix long-&gt;int truncation when profiling branches (bnc#1012382).
- btrfs: scrub: Do not use inode pages for device replace (bnc#1012382).
- cdc_ncm: avoid padding beyond end of skb (bnc#1012382).
- ceph: fix dentry leak in splice_dentry() (bsc#1098236).
- ceph: fix use-after-free in ceph_statfs() (bsc#1098236).
- ceph: fix wrong check for the case of updating link count (bsc#1098236).
- ceph: prevent i_version from going back (bsc#1098236).
- ceph: support file lock on directory (bsc#1098236).
- cifs: Check for timeout on Negotiate stage (bsc#1091171).
- cifs: Fix infinite loop when using hard mount option (bnc#1012382).
- cpufreq: Fix new policy initialization during limits updates via sysfs (bnc#1012382).
- cpuidle: powernv: Fix promotion from snooze if next state disabled (bnc#1012382).
- dm thin: handle running out of data space vs concurrent discard (bnc#1012382).
- dm: convert DM printk macros to pr level macros (bsc#1099918).
- dm: fix printk() rate limiting code (bsc#1099918).
- drbd: fix access after free (bnc#1012382).
- driver core: Do not ignore class_dir_create_and_add() failure (bnc#1012382).
- e1000e: Ignore TSYNCRXCTL when getting I219 clock attributes (bsc#1075876).
- ext4: add more inode number paranoia checks (bnc#1012382).
- ext4: add more mount time checks of the superblock (bnc#1012382).
- ext4: always check block group bounds in ext4_init_block_bitmap() (bnc#1012382).
- ext4: check superblock mapped prior to committing (bnc#1012382).
- ext4: clear i_data in ext4_inode_info when removing inline data (bnc#1012382).
- ext4: fix fencepost error in check for inode count overflow during resize (bnc#1012382).
- ext4: fix unsupported feature message formatting (bsc#1098435).
- ext4: include the illegal physical block in the bad map ext4_error msg (bnc#1012382).
- ext4: make sure bitmaps and the inode table do not overlap with bg descriptors (bnc#1012382).
- ext4: only look at the bg_flags field if it is valid (bnc#1012382).
- ext4: update mtime in ext4_punch_hole even if no blocks are released (bnc#1012382).
- ext4: verify the depth of extent tree in ext4_find_extent() (bnc#1012382).
- fs/binfmt_misc.c: do not allow offset overflow (bsc#1099279).
- fuse: atomic_o_trunc should truncate pagecache (bnc#1012382).
- fuse: do not keep dead fuse_conn at fuse_fill_super() (bnc#1012382).
- fuse: fix control dir setup and teardown (bnc#1012382).
- hv_netvsc: avoid repeated updates of packet filter (bsc#1097492).
- hv_netvsc: defer queue selection to VF (bsc#1097492).
- hv_netvsc: enable multicast if necessary (bsc#1097492).
- hv_netvsc: filter multicast/broadcast (bsc#1097492).
- hv_netvsc: fix filter flags (bsc#1097492).
- hv_netvsc: fix locking during VF setup (bsc#1097492).
- hv_netvsc: fix locking for rx_mode (bsc#1097492).
- hv_netvsc: propagate rx filters to VF (bsc#1097492).
- i2c: rcar: fix resume by always initializing registers before transfer (bnc#1012382).
- iio:buffer: make length types match kfifo types (bnc#1012382).
- iommu/vt-d: Fix race condition in add_unmap() (bsc#1096790, bsc#1097034).
- ipmi:bt: Set the timeout before doing a capabilities check (bnc#1012382).
- ipv4: Fix error return value in fib_convert_metrics() (bnc#1012382).
- ipvs: fix buffer overflow with sync daemon and service (bnc#1012382).
- iwlmvm: tdls: Check TDLS channel switch support (bsc#1099810).
- iwlwifi: fix non_shared_ant for 9000 devices (bsc#1099810).
- jbd2: do not mark block as modified if the handle is out of credits (bnc#1012382).
- kabi/severities: add 'drivers/md/bcache/* PASS' since no one uses symboles expoted by bcache.
- kmod: fix wait on recursive loop (bsc#1099792).
- kmod: reduce atomic operations on kmod_concurrent and simplify (bsc#1099792).
- kmod: throttle kmod thread limit (bsc#1099792).
- kprobes/x86: Do not modify singlestep buffer while resuming (bnc#1012382).
- kvm: nVMX: Enforce cpl=0 for VMX instructions (bsc#1099183).
- lib/vsprintf: Remove atomic-unsafe support for %pCr (bnc#1012382).
- libata: Drop SanDisk SD7UB3Q*G1001 NOLPM quirk (bnc#1012382).
- libata: zpodd: make arrays cdb static, reduces object code size (bnc#1012382).
- libata: zpodd: small read overflow in eject_tray() (bnc#1012382).
- linvdimm, pmem: Preserve read-only setting for pmem devices (bnc#1012382).
- m68k/mm: Adjust VM area to be unmapped by gap size for __iounmap() (bnc#1012382).
- mac80211: Fix condition validating WMM IE (bsc#1099810,bsc#1099732).
- media: cx231xx: Add support for AverMedia DVD EZMaker 7 (bnc#1012382).
- media: cx25840: Use subdev host data for PLL override (bnc#1012382).
- media: dvb_frontend: fix locking issues at dvb_frontend_get_event() (bnc#1012382).
- media: smiapp: fix timeout checking in smiapp_read_nvm (bsc#1099918).
- media: v4l2-compat-ioctl32: prevent go past max size (bnc#1012382).
- mfd: intel-lpss: Program REMAP register in PIO mode (bnc#1012382).
- mips: ftrace: fix static function graph tracing (bnc#1012382).
- mm: hugetlb: yield when prepping struct pages (bnc#1012382).
- mtd: cfi_cmdset_0002: Avoid walking all chips when unlocking (bnc#1012382).
- mtd: cfi_cmdset_0002: Change definition naming to retry write operation (bnc#1012382).
- mtd: cfi_cmdset_0002: Change erase functions to check chip good only (bnc#1012382).
- mtd: cfi_cmdset_0002: Change erase functions to retry for error (bnc#1012382).
- mtd: cfi_cmdset_0002: Change write buffer to check correct value (bnc#1012382).
- mtd: cfi_cmdset_0002: Fix unlocking requests crossing a chip boudary (bnc#1012382).
- mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock() (bnc#1012382).
- mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips (bnc#1012382).
- mtd: cmdlinepart: Update comment for introduction of OFFSET_CONTINUOUS (bsc#1099918).
- mtd: partitions: add helper for deleting partition (bsc#1099918).
- mtd: partitions: remove sysfs files when deleting all master's partitions (bsc#1099918).
- mtd: rawnand: mxc: set spare area size register explicitly (bnc#1012382).
- n_tty: Access echo_* variables carefully (bnc#1012382).
- n_tty: Fix stall at n_tty_receive_char_special() (bnc#1012382).
- net/sonic: Use dma_mapping_error() (bnc#1012382).
- net: qmi_wwan: Add Netgear Aircard 779S (bnc#1012382).
- netfilter: ebtables: handle string from userspace with care (bnc#1012382).
- netfilter: nf_log: do not hold nf_log_mutex during user access (bnc#1012382).
- netfilter: nf_tables: use WARN_ON_ONCE instead of BUG_ON in nft_do_chain() (bnc#1012382).
- nfsd: restrict rd_maxcount to svc_max_payload in nfsd_encode_readdir (bnc#1012382).
- nvme-fabrics: allow duplicate connections to the discovery controller (bsc#1098527).
- nvme-fabrics: allow internal passthrough command on deleting controllers (bsc#1098527).
- nvme-fabrics: centralize discovery controller defaults (bsc#1098527).
- nvme-fabrics: fix and refine state checks in __nvmf_check_ready (bsc#1098527).
- nvme-fabrics: refactor queue ready check (bsc#1098527).
- nvme-fc: change controllers first connect to use reconnect path (bsc#1098527).
- nvme-fc: fix nulling of queue data on reconnect (bsc#1098527).
- nvme-fc: remove reinit_request routine (bsc#1098527).
- nvme-fc: remove setting DNR on exception conditions (bsc#1098527).
- nvme-pci: initialize queue memory before interrupts (bnc#1012382).
- nvme: allow duplicate controller if prior controller being deleted (bsc#1098527).
- nvme: move init of keep_alive work item to controller initialization (bsc#1098527).
- nvme: reimplement nvmf_check_if_ready() to avoid kabi breakage (bsc#1098527).
- nvmet-fc: increase LS buffer count per fc port (bsc#1098527).
- nvmet: switch loopback target state to connecting when resetting (bsc#1098527).
- of: unittest: for strings, account for trailing \0 in property length field (bnc#1012382).
- ovl: fix random return value on mount (bsc#1099993).
- ovl: fix uid/gid when creating over whiteout (bsc#1099993).
- ovl: override creds with the ones from the superblock mounter (bsc#1099993).
- perf intel-pt: Fix 'Unexpected indirect branch' error (bnc#1012382).
- perf intel-pt: Fix MTC timing after overflow (bnc#1012382).
- perf intel-pt: Fix decoding to accept CBR between FUP and corresponding TIP (bnc#1012382).
- perf intel-pt: Fix packet decoding of CYC packets (bnc#1012382).
- perf intel-pt: Fix sync_switch INTEL_PT_SS_NOT_TRACING (bnc#1012382).
- perf tools: Fix symbol and object code resolution for vdso32 and vdsox32 (bnc#1012382).
- platform/x86: thinkpad_acpi: Adding new hotkey ID for Lenovo thinkpad (bsc#1099810).
- powerpc/64s: Exception macro for stack frame and initial register save (bsc#1094244).
- powerpc/64s: Fix mce accounting for powernv (bsc#1094244).
- powerpc/fadump: Unregister fadump on kexec down path (bnc#1012382).
- powerpc/mm/hash: Add missing isync prior to kernel stack SLB switch (bnc#1012382).
- powerpc/ptrace: Fix enforcement of DAWR constraints (bnc#1012382).
- powerpc/ptrace: Fix setting 512B aligned breakpoints with PTRACE_SET_DEBUGREG (bnc#1012382).
- powerpc: Machine check interrupt is a non-maskable interrupt (bsc#1094244).
- procfs: add tunable for fd/fdinfo dentry retention (bsc#10866542).
- qla2xxx: Fix NULL pointer derefrence for fcport search (bsc#1085657).
- qla2xxx: Fix inconsistent DMA mem alloc/free (bsc#1085657).
- qla2xxx: Fix kernel crash due to late workqueue allocation (bsc#1085657).
- regulator: Do not return or expect -errno from of_map_mode() (bsc#1099042).
- restore cond_resched() in shrink_dcache_parent() (bsc#1098599).
- rmdir(),rename(): do shrink_dcache_parent() only on success (bsc#1100340).
- s390/dasd: configurable IFCC handling (bsc#1097808).
- s390: Correct register corruption in critical section cleanup (bnc#1012382).
- sbitmap: check for valid bitmap in sbitmap_for_each (bsc#1090435).
- sched/sysctl: Check user input value of sysctl_sched_time_avg (bsc#1100089).
- scsi: ipr: Format HCAM overlay ID 0x41 (bsc#1097961).
- scsi: ipr: new IOASC update (bsc#1097961).
- scsi: lpfc: Change IO submit return to EBUSY if remote port is recovering (bsc#1092207).
- scsi: lpfc: Driver NVME load fails when CPU cnt &gt; WQ resource cnt (bsc#1092207).
- scsi: lpfc: Fix 16gb hbas failing cq create (bsc#1089525).
- scsi: lpfc: Fix 16gb hbas failing cq create (bsc#1095453).
- scsi: lpfc: Fix MDS diagnostics failure (Rx lower than Tx) (bsc#1095453).
- scsi: lpfc: Fix crash in blk_mq layer when executing modprobe -r lpfc (bsc#1095453).
- scsi: lpfc: Fix port initialization failure (bsc#1095453).
- scsi: lpfc: Fix up log messages and stats counters in IO submit code path (bsc#1092207).
- scsi: lpfc: Handle new link fault code returned by adapter firmware (bsc#1092207).
- scsi: lpfc: correct oversubscription of nvme io requests for an adapter (bsc#1095453).
- scsi: lpfc: update driver version to 11.4.0.7-3 (bsc#1092207).
- scsi: lpfc: update driver version to 11.4.0.7-4 (bsc#1095453).
- scsi: qedi: Fix truncation of CHAP name and secret (bsc#1097931)
- scsi: qla2xxx: Fix setting lower transfer speed if GPSC fails (bnc#1012382).
- scsi: qla2xxx: Spinlock recursion in qla_target (bsc#1097501)
- scsi: sg: mitigate read/write abuse (bsc#1101296).
- scsi: zfcp: fix misleading REC trigger trace where erp_action setup failed (LTC#168765 bnc#1012382 bnc#1099713).
- scsi: zfcp: fix misleading REC trigger trace where erp_action setup failed (bnc#1099713, LTC#168765).
- scsi: zfcp: fix missing REC trigger trace for all objects in ERP_FAILED (LTC#168765 bnc#1012382 bnc#1099713).
- scsi: zfcp: fix missing REC trigger trace for all objects in ERP_FAILED (bnc#1099713, LTC#168765).
- scsi: zfcp: fix missing REC trigger trace on enqueue without ERP thread (LTC#168765 bnc#1012382 bnc#1099713).
- scsi: zfcp: fix missing REC trigger trace on enqueue without ERP thread (bnc#1099713, LTC#168765).
- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io early return (LTC#168765 bnc#1012382 bnc#1099713).
- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io early return (bnc#1099713, LTC#168765).
- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io for ERP_FAILED (LTC#168765 bnc#1012382 bnc#1099713).
- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io for ERP_FAILED (bnc#1099713, LTC#168765).
- scsi: zfcp: fix missing SCSI trace for result of eh_host_reset_handler (LTC#168765 bnc#1012382 bnc#1099713).
- scsi: zfcp: fix missing SCSI trace for result of eh_host_reset_handler (bnc#1099713, LTC#168765).
- scsi: zfcp: fix missing SCSI trace for retry of abort / scsi_eh TMF (LTC#168765 bnc#1012382 bnc#1099713).
- scsi: zfcp: fix missing SCSI trace for retry of abort / scsi_eh TMF (bnc#1099713, LTC#168765).
- serial: sh-sci: Use spin_{try}lock_irqsave instead of open coding version (bnc#1012382).
- signal/xtensa: Consistenly use SIGBUS in do_unaligned_user (bnc#1012382).
- sort and rename various hyperv patches
- spi: Fix scatterlist elements size in spi_map_buf (bnc#1012382).
- staging: android: ion: Return an ERR_PTR in ion_map_kernel (bnc#1012382).
- staging: comedi: quatech_daqp_cs: fix no-op loop daqp_ao_insn_write() (bnc#1012382).
- tcp: do not overshoot window_clamp in tcp_rcv_space_adjust() (bnc#1012382).
- tcp: verify the checksum of the first data segment in a new connection (bnc#1012382).
- thinkpad_acpi: Add support for HKEY version 0x200 (bsc#1099810).
- time: Make sure jiffies_to_msecs() preserves non-zero time periods (bnc#1012382).
- tracing: Fix missing return symbol in function_graph output (bnc#1012382).
- ubi: fastmap: Cancel work upon detach (bnc#1012382).
- ubi: fastmap: Correctly handle interrupted erasures in EBA (bnc#1012382).
- udf: Detect incorrect directory size (bnc#1012382).
- usb: cdc_acm: Add quirk for Uniden UBC125 scanner (bnc#1012382).
- usb: do not reset if a low-speed or full-speed device timed out (bnc#1012382).
- usb: musb: fix remote wakeup racing with suspend (bnc#1012382).
- video/fbdev/stifb: Return -ENOMEM after a failed kzalloc() in stifb_init_fb() (bsc#1090888 bsc#1099966).
- video: uvesafb: Fix integer overflow in allocation (bnc#1012382).
- w1: mxc_w1: Enable clock before calling clk_get_rate() on it (bnc#1012382).
- wait: add wait_event_killable_timeout() (bsc#1099792).
- watchdog: da9063: Fix setting/changing timeout (bsc#1100843).
- watchdog: da9063: Fix timeout handling during probe (bsc#1100843).
- watchdog: da9063: Fix updating timeout value (bsc#1100843).
- x86/cpu/amd: Derive L3 shared_cpu_map from cpu_llc_shared_mask (bsc#1094643).
- x86/mce: Fix incorrect 'Machine check from unknown source' message (bnc#1012382).
- x86/mce: Improve error message when kernel cannot recover (git-fixes b2f9d678e28c).
- x86/pti: do not report XenPV as vulnerable (bsc#1097551).
- xen: Remove unnecessary BUG_ON from __unbind_from_irq() (bnc#1012382).
- xfrm6: avoid potential infinite loop in _decode_session6() (bnc#1012382).
- xfrm: Ignore socket policies when rebuilding hash tables (bnc#1012382).
- xfrm: skip policies marked as dead while rehashing (bnc#1012382).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-24"/>
	<updated date="2018-07-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064232">SUSE bug 1064232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075876">SUSE bug 1075876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076110">SUSE bug 1076110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085185">SUSE bug 1085185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085657">SUSE bug 1085657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089525">SUSE bug 1089525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090435">SUSE bug 1090435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090888">SUSE bug 1090888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091171">SUSE bug 1091171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092207">SUSE bug 1092207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094248">SUSE bug 1094248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094643">SUSE bug 1094643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095453">SUSE bug 1095453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096790">SUSE bug 1096790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097034">SUSE bug 1097034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097140">SUSE bug 1097140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097492">SUSE bug 1097492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097501">SUSE bug 1097501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097551">SUSE bug 1097551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097808">SUSE bug 1097808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097931">SUSE bug 1097931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097961">SUSE bug 1097961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098016">SUSE bug 1098016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098236">SUSE bug 1098236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098425">SUSE bug 1098425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098435">SUSE bug 1098435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098527">SUSE bug 1098527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098599">SUSE bug 1098599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099042">SUSE bug 1099042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099183">SUSE bug 1099183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099279">SUSE bug 1099279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099713">SUSE bug 1099713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099732">SUSE bug 1099732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099792">SUSE bug 1099792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099810">SUSE bug 1099810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099918">SUSE bug 1099918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099924">SUSE bug 1099924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099966">SUSE bug 1099966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099993">SUSE bug 1099993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100089">SUSE bug 1100089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100340">SUSE bug 1100340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100416">SUSE bug 1100416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100418">SUSE bug 1100418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100491">SUSE bug 1100491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100843">SUSE bug 1100843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101296">SUSE bug 1101296</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13405/">CVE-2018-13405</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13406/">CVE-2018-13406</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9385/">CVE-2018-9385</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519809" comment="kernel-default-4.4.140-94.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519810" comment="kernel-default-devel-4.4.140-94.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519811" comment="kernel-default-extra-4.4.140-94.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519812" comment="kernel-devel-4.4.140-94.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519813" comment="kernel-macros-4.4.140-94.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519814" comment="kernel-source-4.4.140-94.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519815" comment="kernel-syms-4.4.140-94.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78304" version="1" class="patch">
	<metadata>
		<title>Security update for nautilus (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1060031" ref_url="https://bugzilla.suse.com/1060031" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14604" ref_url="https://www.suse.com/security/cve/CVE-2017-14604/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004307.html" source="SUSE-SU"/>
		<description>
This update for nautilus fixes the following issues:

Security issue fixed:

- CVE-2017-14604: Add a metadata::trusted metadata to the file once the user
  acknowledges the file as trusted, and also remove the 'trusted' content in the
  desktop file (bsc#1060031).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-25"/>
	<updated date="2018-07-25"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1060031">SUSE bug 1060031</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14604/">CVE-2017-14604</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519816" comment="gnome-shell-search-provider-nautilus-3.20.3-23.3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519817" comment="libnautilus-extension1-3.20.3-23.3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519818" comment="libnautilus-extension1-32bit-3.20.3-23.3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519819" comment="nautilus-3.20.3-23.3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519820" comment="nautilus-lang-3.20.3-23.3.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78305" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1087289" ref_url="https://bugzilla.suse.com/1087289" source="BUGZILLA"/>
		<reference ref_id="1095242" ref_url="https://bugzilla.suse.com/1095242" source="BUGZILLA"/>
		<reference ref_id="1096224" ref_url="https://bugzilla.suse.com/1096224" source="BUGZILLA"/>
		<reference ref_id="1097521" ref_url="https://bugzilla.suse.com/1097521" source="BUGZILLA"/>
		<reference ref_id="1097522" ref_url="https://bugzilla.suse.com/1097522" source="BUGZILLA"/>
		<reference ref_id="1097523" ref_url="https://bugzilla.suse.com/1097523" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12891" ref_url="https://www.suse.com/security/cve/CVE-2018-12891/" source="CVE"/>
		<reference ref_id="CVE-2018-12892" ref_url="https://www.suse.com/security/cve/CVE-2018-12892/" source="CVE"/>
		<reference ref_id="CVE-2018-12893" ref_url="https://www.suse.com/security/cve/CVE-2018-12893/" source="CVE"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004308.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed:

- CVE-2018-3665: Fix Lazy FP Save/Restore issue (XSA-267) (bsc#1095242).
- CVE-2018-12891: Fix possible Denial of Service (DoS) via certain PV MMU operations that affect the entire host (XSA-264) (bsc#1097521).
- CVE-2018-12892: Fix libxl to honour the readonly flag on HVM emulated SCSI disks (XSA-266) (bsc#1097523).
- CVE-2018-12893: Fix crash/Denial of Service (DoS) via safety check (XSA-265) (bsc#1097522).
- CVE-2018-11806: Fix heap buffer overflow while reassembling fragmented datagrams (bsc#1096224).

Bug fixes:

- bsc#1027519: Add upstream patches from January.
- bsc#1087289: Fix xen scheduler crash.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-25"/>
	<updated date="2018-07-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087289">SUSE bug 1087289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095242">SUSE bug 1095242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096224">SUSE bug 1096224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097521">SUSE bug 1097521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097522">SUSE bug 1097522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097523">SUSE bug 1097523</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806</cve>
	<cve impact="important" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12891/">CVE-2018-12891</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-12892/">CVE-2018-12892</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12893/">CVE-2018-12893</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519821" comment="xen-4.9.2_08-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519822" comment="xen-libs-4.9.2_08-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519823" comment="xen-libs-32bit-4.9.2_08-3.35.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78306" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1052460" ref_url="https://bugzilla.suse.com/1052460" source="BUGZILLA"/>
		<reference ref_id="1055053" ref_url="https://bugzilla.suse.com/1055053" source="BUGZILLA"/>
		<reference ref_id="1055063" ref_url="https://bugzilla.suse.com/1055063" source="BUGZILLA"/>
		<reference ref_id="1056550" ref_url="https://bugzilla.suse.com/1056550" source="BUGZILLA"/>
		<reference ref_id="1057723" ref_url="https://bugzilla.suse.com/1057723" source="BUGZILLA"/>
		<reference ref_id="1058422" ref_url="https://bugzilla.suse.com/1058422" source="BUGZILLA"/>
		<reference ref_id="1063049" ref_url="https://bugzilla.suse.com/1063049" source="BUGZILLA"/>
		<reference ref_id="1063050" ref_url="https://bugzilla.suse.com/1063050" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12563" ref_url="https://www.suse.com/security/cve/CVE-2017-12563/" source="CVE"/>
		<reference ref_id="CVE-2017-12691" ref_url="https://www.suse.com/security/cve/CVE-2017-12691/" source="CVE"/>
		<reference ref_id="CVE-2017-13061" ref_url="https://www.suse.com/security/cve/CVE-2017-13061/" source="CVE"/>
		<reference ref_id="CVE-2017-13062" ref_url="https://www.suse.com/security/cve/CVE-2017-13062/" source="CVE"/>
		<reference ref_id="CVE-2017-14042" ref_url="https://www.suse.com/security/cve/CVE-2017-14042/" source="CVE"/>
		<reference ref_id="CVE-2017-14174" ref_url="https://www.suse.com/security/cve/CVE-2017-14174/" source="CVE"/>
		<reference ref_id="CVE-2017-14343" ref_url="https://www.suse.com/security/cve/CVE-2017-14343/" source="CVE"/>
		<reference ref_id="CVE-2017-15277" ref_url="https://www.suse.com/security/cve/CVE-2017-15277/" source="CVE"/>
		<reference ref_id="CVE-2017-15281" ref_url="https://www.suse.com/security/cve/CVE-2017-15281/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00010.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- security update (xcf.c):
  * CVE-2017-14343: Memory leak vulnerability in ReadXCFImage could lead to denial of service via a crafted file.
    CVE-2017-12691: The ReadOneLayer function in coders/xcf.c allows remote attackers to cause a denial of service 
    (memory consumption) via a crafted file.
    [bsc#1058422]

- security update (pnm.c):
  * CVE-2017-14042: A memory allocation failure was discovered in the ReadPNMImage function in coders/pnm.c and 
    could lead to remote denial of service [bsc#1056550]

- security update (psd.c):
  * CVE-2017-15281: ReadPSDImage allows remote attackers to cause a denial of service (application crash) or 
    possibly have unspecified other impact via a crafted file [bsc#1063049]
  * CVE-2017-13061: A length-validation vulnerability was found in the function ReadPSDLayersInternal in coders/psd.c, 
    which allows attackers to cause a denial of service (ReadPSDImage memory exhaustion) via a crafted file. [bsc#1055063]
  * CVE-2017-12563: A Memory exhaustion vulnerability was found in the function ReadPSDImage in coders/psd.c, 
    which allows attackers to cause a denial of service. [bsc#1052460]
  * CVE-2017-14174: Due to a lack of an EOF check (End of File) in ReadPSDLayersInternal could cause huge CPU consumption, 
    when a crafted PSD file, which claims a large 'length' field in the header but does not contain sufficient backing data, 
    is provided, the loop over \'length\' would consume huge CPU resources, since there is no EOF check inside the loop.[bsc#1057723]

- security update (meta.c):
  * CVE-2017-13062: Amemory leak vulnerability was found in the function formatIPTC in coders/meta.c, 
    which allows attackers to cause a denial of service (WriteMETAImage memory consumption) via a crafted file [bsc#1055053]

- security update (gif.c):
  * CVE-2017-15277: ReadGIFImage in coders/gif.c leaves the palette uninitialized when processing a GIF file that has neither 
    a global nor local palette. If the affected product is used as a library loaded into a process that operates on interesting 
    data, this data sometimes can be leaked via the uninitialized palette.[bsc#1063050]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1052460">SUSE bug 1052460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055053">SUSE bug 1055053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055063">SUSE bug 1055063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056550">SUSE bug 1056550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057723">SUSE bug 1057723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058422">SUSE bug 1058422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063049">SUSE bug 1063049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063050">SUSE bug 1063050</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12563/">CVE-2017-12563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12691/">CVE-2017-12691</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13061/">CVE-2017-13061</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13062/">CVE-2017-13062</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14042/">CVE-2017-14042</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14174/">CVE-2017-14174</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14343/">CVE-2017-14343</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15277/">CVE-2017-15277</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15281/">CVE-2017-15281</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518776" comment="ImageMagick-6.8.8.1-71.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518777" comment="libMagick++-6_Q16-3-6.8.8.1-71.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518778" comment="libMagickCore-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518779" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518780" comment="libMagickWand-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78307" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1072947" ref_url="https://bugzilla.suse.com/1072947" source="BUGZILLA"/>
		<reference ref_id="1078662" ref_url="https://bugzilla.suse.com/1078662" source="BUGZILLA"/>
		<reference ref_id="1080740" ref_url="https://bugzilla.suse.com/1080740" source="BUGZILLA"/>
		<reference ref_id="1084300" ref_url="https://bugzilla.suse.com/1084300" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7738" ref_url="https://www.suse.com/security/cve/CVE-2018-7738/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004317.html" source="SUSE-SU"/>
		<description>
This update for util-linux fixes the following issues:

This non-security issue was fixed:

- CVE-2018-7738: bash-completion/umount allowed local users to gain privileges
  by embedding shell commands in a mountpoint name, which was mishandled during a
  umount command by a different user (bsc#1084300).

These non-security issues were fixed:

- Fixed crash loop in lscpu (bsc#1072947).
- Fixed possible segfault of umount -a
- Fixed mount -a on NFS bind mounts (bsc#1080740).
- Fixed lsblk on NVMe (bsc#1078662).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-26"/>
	<updated date="2018-07-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1072947">SUSE bug 1072947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078662">SUSE bug 1078662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080740">SUSE bug 1080740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084300">SUSE bug 1084300</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7738/">CVE-2018-7738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519824" comment="libblkid1-2.29.2-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519825" comment="libblkid1-32bit-2.29.2-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519826" comment="libfdisk1-2.29.2-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519827" comment="libmount1-2.29.2-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519828" comment="libmount1-32bit-2.29.2-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519829" comment="libsmartcols1-2.29.2-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519830" comment="libuuid-devel-2.29.2-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519831" comment="libuuid1-2.29.2-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519832" comment="libuuid1-32bit-2.29.2-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519833" comment="python-libmount-2.29.2-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519834" comment="util-linux-2.29.2-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519835" comment="util-linux-lang-2.29.2-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519836" comment="util-linux-systemd-2.29.2-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519837" comment="uuidd-2.29.2-3.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78308" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1071767" ref_url="https://bugzilla.suse.com/1071767" source="BUGZILLA"/>
		<reference ref_id="1071777" ref_url="https://bugzilla.suse.com/1071777" source="BUGZILLA"/>
		<reference ref_id="1100167" ref_url="https://bugzilla.suse.com/1100167" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17456" ref_url="https://www.suse.com/security/cve/CVE-2017-17456/" source="CVE"/>
		<reference ref_id="CVE-2017-17457" ref_url="https://www.suse.com/security/cve/CVE-2017-17457/" source="CVE"/>
		<reference ref_id="CVE-2018-13139" ref_url="https://www.suse.com/security/cve/CVE-2018-13139/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004311.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

Security issues fixed:

- CVE-2018-13139: Fix a stack-based buffer overflow in psf_memset in common.c that allows remote attackers to cause a denial of service (bsc#1100167).
- CVE-2017-17456: Prevent segmentation fault in the function d2alaw_array() that may have lead to a remote DoS (bsc#1071777)
- CVE-2017-17457: Prevent segmentation fault in the function d2ulaw_array() that may have lead to a remote DoS, a different vulnerability than CVE-2017-14246 (bsc#1071767)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-26"/>
	<updated date="2018-07-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1071767">SUSE bug 1071767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071777">SUSE bug 1071777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100167">SUSE bug 1100167</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17456/">CVE-2017-17456</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17457/">CVE-2017-17457</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13139/">CVE-2018-13139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519838" comment="libsndfile1-1.0.25-36.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519839" comment="libsndfile1-32bit-1.0.25-36.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78309" version="1" class="patch">
	<metadata>
		<title>Security update for libofx (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1058673" ref_url="https://bugzilla.suse.com/1058673" source="BUGZILLA"/>
		<reference ref_id="1060437" ref_url="https://bugzilla.suse.com/1060437" source="BUGZILLA"/>
		<reference ref_id="1061964" ref_url="https://bugzilla.suse.com/1061964" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14731" ref_url="https://www.suse.com/security/cve/CVE-2017-14731/" source="CVE"/>
		<reference ref_id="CVE-2017-2816" ref_url="https://www.suse.com/security/cve/CVE-2017-2816/" source="CVE"/>
		<reference ref_id="CVE-2017-2920" ref_url="https://www.suse.com/security/cve/CVE-2017-2920/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004310.html" source="SUSE-SU"/>
		<description>
This update for libofx fixes the following issues:

Security issues fixed:

- CVE-2017-2816: Fix an exploitable buffer overflow vulnerability in the tag parsing functionality (bsc#1058673).
- CVE-2017-2920: Fix a buffer overflow vulnerability in sanitize_proprietary_tags in lib/ofx_preproc.cpp (bsc#1061964).
- CVE-2017-14731: Fix remote denial of service via a crafted file in ofx_proc_file in ofx_preproc.cpp (bsc#1060437).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-26"/>
	<updated date="2018-07-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1058673">SUSE bug 1058673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060437">SUSE bug 1060437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061964">SUSE bug 1061964</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14731/">CVE-2017-14731</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-2816/">CVE-2017-2816</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-2920/">CVE-2017-2920</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519840" comment="libofx-0.9.9-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519841" comment="libofx6-0.9.9-3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78310" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1064455" ref_url="https://bugzilla.suse.com/1064455" source="BUGZILLA"/>
		<reference ref_id="1090766" ref_url="https://bugzilla.suse.com/1090766" source="BUGZILLA"/>
		<reference ref_id="1097410" ref_url="https://bugzilla.suse.com/1097410" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004331.html" source="SUSE-SU"/>
		<description>
This update for libgcrypt fixes the following issues:

The following security vulnerability was addressed:

- CVE-2018-0495: Mitigate a novel side-channel attack by enabling blinding for
  ECDSA signatures (bsc#1097410).

The following other issues were fixed:

- Extended the fipsdrv dsa-sign and dsa-verify commands with the
  --algo parameter for the FIPS testing of DSA SigVer and SigGen (bsc#1064455).
- Ensure libgcrypt20-hmac and libgcrypt20 are installed in the correct order. (bsc#1090766)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-27"/>
	<updated date="2018-07-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064455">SUSE bug 1064455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090766">SUSE bug 1090766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097410">SUSE bug 1097410</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519842" comment="libgcrypt20-1.6.1-16.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519843" comment="libgcrypt20-32bit-1.6.1-16.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78311" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1061343" ref_url="https://bugzilla.suse.com/1061343" source="BUGZILLA"/>
		<reference ref_id="1094717" ref_url="https://bugzilla.suse.com/1094717" source="BUGZILLA"/>
		<reference ref_id="1101428" ref_url="https://bugzilla.suse.com/1101428" source="BUGZILLA"/>
		<reference ref_id="1101566" ref_url="https://bugzilla.suse.com/1101566" source="BUGZILLA"/>
		<reference ref_id="1101567" ref_url="https://bugzilla.suse.com/1101567" source="BUGZILLA"/>
		<reference ref_id="1101568" ref_url="https://bugzilla.suse.com/1101568" source="BUGZILLA"/>
		<reference ref_id="1101569" ref_url="https://bugzilla.suse.com/1101569" source="BUGZILLA"/>
		<reference ref_id="1101570" ref_url="https://bugzilla.suse.com/1101570" source="BUGZILLA"/>
		<reference ref_id="1101571" ref_url="https://bugzilla.suse.com/1101571" source="BUGZILLA"/>
		<reference ref_id="1101573" ref_url="https://bugzilla.suse.com/1101573" source="BUGZILLA"/>
		<reference ref_id="1101576" ref_url="https://bugzilla.suse.com/1101576" source="BUGZILLA"/>
		<reference ref_id="1101577" ref_url="https://bugzilla.suse.com/1101577" source="BUGZILLA"/>
		<reference ref_id="1101578" ref_url="https://bugzilla.suse.com/1101578" source="BUGZILLA"/>
		<reference ref_id="1101581" ref_url="https://bugzilla.suse.com/1101581" source="BUGZILLA"/>
		<reference ref_id="1101582" ref_url="https://bugzilla.suse.com/1101582" source="BUGZILLA"/>
		<reference ref_id="1101583" ref_url="https://bugzilla.suse.com/1101583" source="BUGZILLA"/>
		<reference ref_id="1101588" ref_url="https://bugzilla.suse.com/1101588" source="BUGZILLA"/>
		<reference ref_id="1101589" ref_url="https://bugzilla.suse.com/1101589" source="BUGZILLA"/>
		<reference ref_id="980830" ref_url="https://bugzilla.suse.com/980830" source="BUGZILLA"/>
		<reference ref_id="982129" ref_url="https://bugzilla.suse.com/982129" source="BUGZILLA"/>
		<reference ref_id="986534" ref_url="https://bugzilla.suse.com/986534" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9116" ref_url="https://www.suse.com/security/cve/CVE-2014-9116/" source="CVE"/>
		<reference ref_id="CVE-2018-14349" ref_url="https://www.suse.com/security/cve/CVE-2018-14349/" source="CVE"/>
		<reference ref_id="CVE-2018-14350" ref_url="https://www.suse.com/security/cve/CVE-2018-14350/" source="CVE"/>
		<reference ref_id="CVE-2018-14351" ref_url="https://www.suse.com/security/cve/CVE-2018-14351/" source="CVE"/>
		<reference ref_id="CVE-2018-14352" ref_url="https://www.suse.com/security/cve/CVE-2018-14352/" source="CVE"/>
		<reference ref_id="CVE-2018-14353" ref_url="https://www.suse.com/security/cve/CVE-2018-14353/" source="CVE"/>
		<reference ref_id="CVE-2018-14354" ref_url="https://www.suse.com/security/cve/CVE-2018-14354/" source="CVE"/>
		<reference ref_id="CVE-2018-14355" ref_url="https://www.suse.com/security/cve/CVE-2018-14355/" source="CVE"/>
		<reference ref_id="CVE-2018-14356" ref_url="https://www.suse.com/security/cve/CVE-2018-14356/" source="CVE"/>
		<reference ref_id="CVE-2018-14357" ref_url="https://www.suse.com/security/cve/CVE-2018-14357/" source="CVE"/>
		<reference ref_id="CVE-2018-14358" ref_url="https://www.suse.com/security/cve/CVE-2018-14358/" source="CVE"/>
		<reference ref_id="CVE-2018-14359" ref_url="https://www.suse.com/security/cve/CVE-2018-14359/" source="CVE"/>
		<reference ref_id="CVE-2018-14360" ref_url="https://www.suse.com/security/cve/CVE-2018-14360/" source="CVE"/>
		<reference ref_id="CVE-2018-14361" ref_url="https://www.suse.com/security/cve/CVE-2018-14361/" source="CVE"/>
		<reference ref_id="CVE-2018-14362" ref_url="https://www.suse.com/security/cve/CVE-2018-14362/" source="CVE"/>
		<reference ref_id="CVE-2018-14363" ref_url="https://www.suse.com/security/cve/CVE-2018-14363/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004326.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

Security issues fixed:

- bsc#1101428: Mutt 1.10.1 security release update.
- CVE-2018-14351: Fix imap/command.c that mishandles long IMAP status mailbox literal count size (bsc#1101583).
- CVE-2018-14353: Fix imap_quote_string in imap/util.c that has an integer underflow (bsc#1101581).
- CVE-2018-14362: Fix pop.c that does not forbid characters that may have unsafe interaction with message-cache pathnames (bsc#1101567).
- CVE-2018-14354: Fix arbitrary command execution from remote IMAP servers via backquote characters (bsc#1101578).
- CVE-2018-14352: Fix imap_quote_string in imap/util.c that does not leave room for quote characters (bsc#1101582).
- CVE-2018-14356: Fix pop.c that mishandles a zero-length UID (bsc#1101576).
- CVE-2018-14355: Fix imap/util.c that mishandles '..' directory traversal in a mailbox name (bsc#1101577).
- CVE-2018-14349: Fix imap/command.c that mishandles a NO response without a message (bsc#1101589).
- CVE-2018-14350: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along INTERNALDATE field (bsc#1101588).
- CVE-2018-14363: Fix newsrc.c that does not properlyrestrict '/' characters that may have unsafe interaction with cache pathnames (bsc#1101566).
- CVE-2018-14359: Fix buffer overflow via base64 data (bsc#1101570).
- CVE-2018-14358: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along RFC822.SIZE field (bsc#1101571).
- CVE-2018-14360: Fix nntp_add_group in newsrc.c that has a stack-based buffer overflow because of incorrect sscanf usage (bsc#1101569).
- CVE-2018-14357: Fix that remote IMAP servers are allowed to execute arbitrary commands via backquote characters (bsc#1101573).
- CVE-2018-14361: Fix that nntp.c proceeds even if memory allocation fails for messages data (bsc#1101568).

Bug fixes:

- mutt reports as neomutt and incorrect version (bsc#1094717)
- No sidebar available in mutt 1.6.1 from Tumbleweed snapshot 20160517 (bsc#980830)
- mutt-1.6.1 unusable when built with --enable-sidebar (bsc#982129)
- (neo)mutt displaying times in Zulu time (bsc#1061343)
- mutt unconditionally segfaults when displaying a message (bsc#986534)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-27"/>
	<updated date="2018-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1061343">SUSE bug 1061343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094717">SUSE bug 1094717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101566">SUSE bug 1101566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101567">SUSE bug 1101567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101568">SUSE bug 1101568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101569">SUSE bug 1101569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101570">SUSE bug 1101570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101571">SUSE bug 1101571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101573">SUSE bug 1101573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101576">SUSE bug 1101576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101577">SUSE bug 1101577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101578">SUSE bug 1101578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101581">SUSE bug 1101581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101582">SUSE bug 1101582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101583">SUSE bug 1101583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101588">SUSE bug 1101588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101589">SUSE bug 1101589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980830">SUSE bug 980830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982129">SUSE bug 982129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986534">SUSE bug 986534</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9116/">CVE-2014-9116</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14349/">CVE-2018-14349</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14350/">CVE-2018-14350</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14351/">CVE-2018-14351</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14352/">CVE-2018-14352</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14353/">CVE-2018-14353</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14354/">CVE-2018-14354</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14355/">CVE-2018-14355</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14356/">CVE-2018-14356</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14357/">CVE-2018-14357</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14358/">CVE-2018-14358</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14359/">CVE-2018-14359</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-14360/">CVE-2018-14360</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-14361/">CVE-2018-14361</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14362/">CVE-2018-14362</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-14363/">CVE-2018-14363</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519844" comment="mutt-1.10.1-55.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78312" version="1" class="patch">
	<metadata>
		<title>Security update for libevent (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1022917" ref_url="https://bugzilla.suse.com/1022917" source="BUGZILLA"/>
		<reference ref_id="1022918" ref_url="https://bugzilla.suse.com/1022918" source="BUGZILLA"/>
		<reference ref_id="1022919" ref_url="https://bugzilla.suse.com/1022919" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10195" ref_url="https://www.suse.com/security/cve/CVE-2016-10195/" source="CVE"/>
		<reference ref_id="CVE-2016-10196" ref_url="https://www.suse.com/security/cve/CVE-2016-10196/" source="CVE"/>
		<reference ref_id="CVE-2016-10197" ref_url="https://www.suse.com/security/cve/CVE-2016-10197/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003628.html" source="SUSE-SU"/>
		<description>
This update for libevent fixes the following security issues:

- CVE-2016-10195: DNS remote stack overread vulnerability (bsc#1022917) 
- CVE-2016-10196: stack/buffer overflow in evutil_parse_sockaddr_port() (bsc#1022918) 
- CVE-2016-10197: out-of-bounds read in search_make_new() (bsc#1022919) 
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-24"/>
	<updated date="2018-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022917">SUSE bug 1022917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022918">SUSE bug 1022918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022919">SUSE bug 1022919</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10195/">CVE-2016-10195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10196/">CVE-2016-10196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10197/">CVE-2016-10197</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518781" comment="libevent-2_0-5-2.0.21-6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78313" version="1" class="patch">
	<metadata>
		<title>Security update for gdk-pixbuf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1053417" ref_url="https://bugzilla.suse.com/1053417" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004361.html" source="SUSE-SU"/>
		<description>
This update for gdk-pixbuf fixes the following issues:

Security issue fixed:

- CVE-2015-4491: Fix integer multiplication overflow that allows for DoS or potentially RCE (bsc#1053417).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-30"/>
	<updated date="2018-07-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1053417">SUSE bug 1053417</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519845" comment="gdk-pixbuf-lang-2.34.0-19.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519846" comment="gdk-pixbuf-query-loaders-2.34.0-19.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519847" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519848" comment="libgdk_pixbuf-2_0-0-2.34.0-19.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519849" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519850" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78314" version="1" class="patch">
	<metadata>
		<title>Security update for libcgroup (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1100365" ref_url="https://bugzilla.suse.com/1100365" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14348" ref_url="https://www.suse.com/security/cve/CVE-2018-14348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004359.html" source="SUSE-SU"/>
		<description>
This update for libcgroup fixes the following issues:

Security issue fixed:

- CVE-2018-14348: Fix daemon that creates /var/log/cgred with mode 0666 (bsc#1100365).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-30"/>
	<updated date="2018-07-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100365">SUSE bug 1100365</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14348/">CVE-2018-14348</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519851" comment="libcgroup1-0.41.rc1-10.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78315" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1099031" ref_url="https://bugzilla.suse.com/1099031" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1116" ref_url="https://www.suse.com/security/cve/CVE-2018-1116/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004365.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

Security issue fixed:

- CVE-2018-1116: Fix uid comparison lacking in polkit_backend_interactive_authority_check_authorization (bsc#1099031).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-01"/>
	<updated date="2018-08-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1099031">SUSE bug 1099031</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1116/">CVE-2018-1116</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519852" comment="libpolkit0-0.113-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519853" comment="libpolkit0-32bit-0.113-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519854" comment="polkit-0.113-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519855" comment="typelib-1_0-Polkit-1_0-0.113-5.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78316" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1050082" ref_url="https://bugzilla.suse.com/1050082" source="BUGZILLA"/>
		<reference ref_id="1061066" ref_url="https://bugzilla.suse.com/1061066" source="BUGZILLA"/>
		<reference ref_id="1087018" ref_url="https://bugzilla.suse.com/1087018" source="BUGZILLA"/>
		<reference ref_id="1096405" ref_url="https://bugzilla.suse.com/1096405" source="BUGZILLA"/>
		<reference ref_id="1096406" ref_url="https://bugzilla.suse.com/1096406" source="BUGZILLA"/>
		<reference ref_id="1096407" ref_url="https://bugzilla.suse.com/1096407" source="BUGZILLA"/>
		<reference ref_id="1096408" ref_url="https://bugzilla.suse.com/1096408" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18248" ref_url="https://www.suse.com/security/cve/CVE-2017-18248/" source="CVE"/>
		<reference ref_id="CVE-2018-4180" ref_url="https://www.suse.com/security/cve/CVE-2018-4180/" source="CVE"/>
		<reference ref_id="CVE-2018-4181" ref_url="https://www.suse.com/security/cve/CVE-2018-4181/" source="CVE"/>
		<reference ref_id="CVE-2018-4182" ref_url="https://www.suse.com/security/cve/CVE-2018-4182/" source="CVE"/>
		<reference ref_id="CVE-2018-4183" ref_url="https://www.suse.com/security/cve/CVE-2018-4183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004364.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

The following security vulnerabilities were fixed:

- CVE-2017-18248: Handle invalid characters properly in printing jobs. This fixes a problem that
  was causing the DBUS library to abort the calling process. (bsc#1061066 bsc#1087018)
- Fixed a local privilege escalation to root and sandbox bypasses in the
  scheduler
- CVE-2018-4180: Fixed a local privilege escalation to root in dnssd backend
  (bsc#1096405)
- CVE-2018-4181: Limited local file reads as root via cupsd.conf include
  directive (bsc#1096406)
- CVE-2018-4182: Fixed a sandbox bypass due to insecure error handling
  (bsc#1096407)
- CVE-2018-4183: Fixed a sandbox bypass due to profile misconfiguration
  (bsc#1096408)

The following other issue was fixed:

- Fixed authorization check for clients (like samba) connected through the
  local socket when Kerberos authentication is enabled (bsc#1050082)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-01"/>
	<updated date="2018-08-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050082">SUSE bug 1050082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061066">SUSE bug 1061066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087018">SUSE bug 1087018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096405">SUSE bug 1096405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096406">SUSE bug 1096406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096407">SUSE bug 1096407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096408">SUSE bug 1096408</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18248/">CVE-2017-18248</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4180/">CVE-2018-4180</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4181/">CVE-2018-4181</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4182/">CVE-2018-4182</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4183/">CVE-2018-4183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519856" comment="cups-1.7.5-20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519857" comment="cups-client-1.7.5-20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519858" comment="cups-libs-1.7.5-20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519859" comment="cups-libs-32bit-1.7.5-20.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78317" version="1" class="patch">
	<metadata>
		<title>Security update for libtirpc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1072183" ref_url="https://bugzilla.suse.com/1072183" source="BUGZILLA"/>
		<reference ref_id="968175" ref_url="https://bugzilla.suse.com/968175" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:2171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004367.html" source="SUSE-SU"/>
		<description>
This update for libtirpc fixes the following issues:

Security issue fixed:

- bsc#968175: Fix remote crash of RPC services.

Bug fixes:

- bsc#1072183: Send RPC getport call as specified via parameter.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-02"/>
	<updated date="2018-08-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1072183">SUSE bug 1072183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968175">SUSE bug 968175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519860" comment="libtirpc-netconfig-1.0.1-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519861" comment="libtirpc3-1.0.1-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519862" comment="libtirpc3-32bit-1.0.1-17.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78318" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1077001" ref_url="https://bugzilla.suse.com/1077001" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000007" ref_url="https://www.suse.com/security/cve/CVE-2018-1000007/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003632.html" source="SUSE-SU"/>
		<description>
This update for curl fixes one issues.

This security issue was fixed:

- CVE-2018-1000007: Prevent leaking authentication data to third parties when following redirects (bsc#1077001)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-25"/>
	<updated date="2018-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077001">SUSE bug 1077001</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000007/">CVE-2018-1000007</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518782" comment="curl-7.37.0-37.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518783" comment="libcurl4-7.37.0-37.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518784" comment="libcurl4-32bit-7.37.0-37.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78319" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1092874" ref_url="https://bugzilla.suse.com/1092874" source="BUGZILLA"/>
		<reference ref_id="1094932" ref_url="https://bugzilla.suse.com/1094932" source="BUGZILLA"/>
		<reference ref_id="1096748" ref_url="https://bugzilla.suse.com/1096748" source="BUGZILLA"/>
		<reference ref_id="1099162" ref_url="https://bugzilla.suse.com/1099162" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10861" ref_url="https://www.suse.com/security/cve/CVE-2018-10861/" source="CVE"/>
		<reference ref_id="CVE-2018-1128" ref_url="https://www.suse.com/security/cve/CVE-2018-1128/" source="CVE"/>
		<reference ref_id="CVE-2018-1129" ref_url="https://www.suse.com/security/cve/CVE-2018-1129/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004489.html" source="SUSE-SU"/>
		<description>
This update for ceph fixes the following issues:

- Update to version 12.2.7-420-gc0ef85b854:
    * https://ceph.com/releases/12-2-7-luminous-released/
    * luminous: osd: eternal stuck PG in 'unfound_recovery' (bsc#1094932)
    * bluestore: db.slow used when db is not full (bsc#1092874)

    * CVE-2018-10861: Ensure that ceph-mon does perform authorization on all OSD pool ops (bsc#1099162).
    * CVE-2018-1129: cephx signature check bypass (bsc#1096748).
    * CVE-2018-1128: cephx protocol was vulnerable to replay attack (bsc#1096748).

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-03"/>
	<updated date="2018-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092874">SUSE bug 1092874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094932">SUSE bug 1094932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096748">SUSE bug 1096748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099162">SUSE bug 1099162</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10861/">CVE-2018-10861</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-1128/">CVE-2018-1128</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1129/">CVE-2018-1129</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519863" comment="ceph-common-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519864" comment="libcephfs2-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519865" comment="librados2-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519866" comment="libradosstriper1-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519867" comment="librbd1-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519868" comment="librgw2-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519869" comment="python-cephfs-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519870" comment="python-rados-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519871" comment="python-rbd-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519872" comment="python-rgw-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78320" version="1" class="patch">
	<metadata>
		<title>Security update for libsoup (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1052916" ref_url="https://bugzilla.suse.com/1052916" source="BUGZILLA"/>
		<reference ref_id="1086036" ref_url="https://bugzilla.suse.com/1086036" source="BUGZILLA"/>
		<reference ref_id="1100097" ref_url="https://bugzilla.suse.com/1100097" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2885" ref_url="https://www.suse.com/security/cve/CVE-2017-2885/" source="CVE"/>
		<reference ref_id="CVE-2018-12910" ref_url="https://www.suse.com/security/cve/CVE-2018-12910/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004374.html" source="SUSE-SU"/>
		<description>
This update for libsoup fixes the following issues:

Security issue fixed:

- CVE-2018-12910: Fix crash when handling empty hostnames (bsc#1100097).
- CVE-2017-2885: Fix chunk decoding buffer overrun that could be exploited against either clients or servers (bsc#1052916).

Bug fixes:

- bsc#1086036: translation-update-upstream commented out for Leap
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-06"/>
	<updated date="2018-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1052916">SUSE bug 1052916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086036">SUSE bug 1086036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100097">SUSE bug 1100097</bugzilla>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2885/">CVE-2017-2885</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12910/">CVE-2018-12910</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519873" comment="libsoup-2_4-1-2.62.2-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519874" comment="libsoup-2_4-1-32bit-2.62.2-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519875" comment="libsoup-lang-2.62.2-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519876" comment="typelib-1_0-Soup-2_4-2.62.2-5.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78321" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1059809" ref_url="https://bugzilla.suse.com/1059809" source="BUGZILLA"/>
		<reference ref_id="1059811" ref_url="https://bugzilla.suse.com/1059811" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14632" ref_url="https://www.suse.com/security/cve/CVE-2017-14632/" source="CVE"/>
		<reference ref_id="CVE-2017-14633" ref_url="https://www.suse.com/security/cve/CVE-2017-14633/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003567.html" source="SUSE-SU"/>
		<description>
This update for libvorbis fixes the following issues:

- CVE-2017-14633: out-of-bounds array read vulnerability exists in
  function mapping0_forward() could lead to remote denial of service (bsc#1059811)
- CVE-2017-14632: Remote Code Execution upon freeing uninitialized
  memory in function vorbis_analysis_headerout(bsc#1059809)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1059809">SUSE bug 1059809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059811">SUSE bug 1059811</bugzilla>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14632/">CVE-2017-14632</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14633/">CVE-2017-14633</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518785" comment="libvorbis0-1.3.3-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518786" comment="libvorbis0-32bit-1.3.3-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518787" comment="libvorbisenc2-1.3.3-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518788" comment="libvorbisenc2-32bit-1.3.3-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518789" comment="libvorbisfile3-1.3.3-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518790" comment="libvorbisfile3-32bit-1.3.3-10.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78322" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1020950" ref_url="https://bugzilla.suse.com/1020950" source="BUGZILLA"/>
		<reference ref_id="1024749" ref_url="https://bugzilla.suse.com/1024749" source="BUGZILLA"/>
		<reference ref_id="1050469" ref_url="https://bugzilla.suse.com/1050469" source="BUGZILLA"/>
		<reference ref_id="1066892" ref_url="https://bugzilla.suse.com/1066892" source="BUGZILLA"/>
		<reference ref_id="1069925" ref_url="https://bugzilla.suse.com/1069925" source="BUGZILLA"/>
		<reference ref_id="1073654" ref_url="https://bugzilla.suse.com/1073654" source="BUGZILLA"/>
		<reference ref_id="1075419" ref_url="https://bugzilla.suse.com/1075419" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4692" ref_url="https://www.suse.com/security/cve/CVE-2016-4692/" source="CVE"/>
		<reference ref_id="CVE-2016-4743" ref_url="https://www.suse.com/security/cve/CVE-2016-4743/" source="CVE"/>
		<reference ref_id="CVE-2016-7586" ref_url="https://www.suse.com/security/cve/CVE-2016-7586/" source="CVE"/>
		<reference ref_id="CVE-2016-7587" ref_url="https://www.suse.com/security/cve/CVE-2016-7587/" source="CVE"/>
		<reference ref_id="CVE-2016-7589" ref_url="https://www.suse.com/security/cve/CVE-2016-7589/" source="CVE"/>
		<reference ref_id="CVE-2016-7592" ref_url="https://www.suse.com/security/cve/CVE-2016-7592/" source="CVE"/>
		<reference ref_id="CVE-2016-7598" ref_url="https://www.suse.com/security/cve/CVE-2016-7598/" source="CVE"/>
		<reference ref_id="CVE-2016-7599" ref_url="https://www.suse.com/security/cve/CVE-2016-7599/" source="CVE"/>
		<reference ref_id="CVE-2016-7610" ref_url="https://www.suse.com/security/cve/CVE-2016-7610/" source="CVE"/>
		<reference ref_id="CVE-2016-7623" ref_url="https://www.suse.com/security/cve/CVE-2016-7623/" source="CVE"/>
		<reference ref_id="CVE-2016-7632" ref_url="https://www.suse.com/security/cve/CVE-2016-7632/" source="CVE"/>
		<reference ref_id="CVE-2016-7635" ref_url="https://www.suse.com/security/cve/CVE-2016-7635/" source="CVE"/>
		<reference ref_id="CVE-2016-7639" ref_url="https://www.suse.com/security/cve/CVE-2016-7639/" source="CVE"/>
		<reference ref_id="CVE-2016-7641" ref_url="https://www.suse.com/security/cve/CVE-2016-7641/" source="CVE"/>
		<reference ref_id="CVE-2016-7645" ref_url="https://www.suse.com/security/cve/CVE-2016-7645/" source="CVE"/>
		<reference ref_id="CVE-2016-7652" ref_url="https://www.suse.com/security/cve/CVE-2016-7652/" source="CVE"/>
		<reference ref_id="CVE-2016-7654" ref_url="https://www.suse.com/security/cve/CVE-2016-7654/" source="CVE"/>
		<reference ref_id="CVE-2016-7656" ref_url="https://www.suse.com/security/cve/CVE-2016-7656/" source="CVE"/>
		<reference ref_id="CVE-2017-13788" ref_url="https://www.suse.com/security/cve/CVE-2017-13788/" source="CVE"/>
		<reference ref_id="CVE-2017-13798" ref_url="https://www.suse.com/security/cve/CVE-2017-13798/" source="CVE"/>
		<reference ref_id="CVE-2017-13803" ref_url="https://www.suse.com/security/cve/CVE-2017-13803/" source="CVE"/>
		<reference ref_id="CVE-2017-13856" ref_url="https://www.suse.com/security/cve/CVE-2017-13856/" source="CVE"/>
		<reference ref_id="CVE-2017-13866" ref_url="https://www.suse.com/security/cve/CVE-2017-13866/" source="CVE"/>
		<reference ref_id="CVE-2017-13870" ref_url="https://www.suse.com/security/cve/CVE-2017-13870/" source="CVE"/>
		<reference ref_id="CVE-2017-2350" ref_url="https://www.suse.com/security/cve/CVE-2017-2350/" source="CVE"/>
		<reference ref_id="CVE-2017-2354" ref_url="https://www.suse.com/security/cve/CVE-2017-2354/" source="CVE"/>
		<reference ref_id="CVE-2017-2355" ref_url="https://www.suse.com/security/cve/CVE-2017-2355/" source="CVE"/>
		<reference ref_id="CVE-2017-2356" ref_url="https://www.suse.com/security/cve/CVE-2017-2356/" source="CVE"/>
		<reference ref_id="CVE-2017-2362" ref_url="https://www.suse.com/security/cve/CVE-2017-2362/" source="CVE"/>
		<reference ref_id="CVE-2017-2363" ref_url="https://www.suse.com/security/cve/CVE-2017-2363/" source="CVE"/>
		<reference ref_id="CVE-2017-2364" ref_url="https://www.suse.com/security/cve/CVE-2017-2364/" source="CVE"/>
		<reference ref_id="CVE-2017-2365" ref_url="https://www.suse.com/security/cve/CVE-2017-2365/" source="CVE"/>
		<reference ref_id="CVE-2017-2366" ref_url="https://www.suse.com/security/cve/CVE-2017-2366/" source="CVE"/>
		<reference ref_id="CVE-2017-2369" ref_url="https://www.suse.com/security/cve/CVE-2017-2369/" source="CVE"/>
		<reference ref_id="CVE-2017-2371" ref_url="https://www.suse.com/security/cve/CVE-2017-2371/" source="CVE"/>
		<reference ref_id="CVE-2017-2373" ref_url="https://www.suse.com/security/cve/CVE-2017-2373/" source="CVE"/>
		<reference ref_id="CVE-2017-2496" ref_url="https://www.suse.com/security/cve/CVE-2017-2496/" source="CVE"/>
		<reference ref_id="CVE-2017-2510" ref_url="https://www.suse.com/security/cve/CVE-2017-2510/" source="CVE"/>
		<reference ref_id="CVE-2017-2539" ref_url="https://www.suse.com/security/cve/CVE-2017-2539/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2017-7006" ref_url="https://www.suse.com/security/cve/CVE-2017-7006/" source="CVE"/>
		<reference ref_id="CVE-2017-7011" ref_url="https://www.suse.com/security/cve/CVE-2017-7011/" source="CVE"/>
		<reference ref_id="CVE-2017-7012" ref_url="https://www.suse.com/security/cve/CVE-2017-7012/" source="CVE"/>
		<reference ref_id="CVE-2017-7018" ref_url="https://www.suse.com/security/cve/CVE-2017-7018/" source="CVE"/>
		<reference ref_id="CVE-2017-7019" ref_url="https://www.suse.com/security/cve/CVE-2017-7019/" source="CVE"/>
		<reference ref_id="CVE-2017-7020" ref_url="https://www.suse.com/security/cve/CVE-2017-7020/" source="CVE"/>
		<reference ref_id="CVE-2017-7030" ref_url="https://www.suse.com/security/cve/CVE-2017-7030/" source="CVE"/>
		<reference ref_id="CVE-2017-7034" ref_url="https://www.suse.com/security/cve/CVE-2017-7034/" source="CVE"/>
		<reference ref_id="CVE-2017-7037" ref_url="https://www.suse.com/security/cve/CVE-2017-7037/" source="CVE"/>
		<reference ref_id="CVE-2017-7038" ref_url="https://www.suse.com/security/cve/CVE-2017-7038/" source="CVE"/>
		<reference ref_id="CVE-2017-7039" ref_url="https://www.suse.com/security/cve/CVE-2017-7039/" source="CVE"/>
		<reference ref_id="CVE-2017-7040" ref_url="https://www.suse.com/security/cve/CVE-2017-7040/" source="CVE"/>
		<reference ref_id="CVE-2017-7041" ref_url="https://www.suse.com/security/cve/CVE-2017-7041/" source="CVE"/>
		<reference ref_id="CVE-2017-7042" ref_url="https://www.suse.com/security/cve/CVE-2017-7042/" source="CVE"/>
		<reference ref_id="CVE-2017-7043" ref_url="https://www.suse.com/security/cve/CVE-2017-7043/" source="CVE"/>
		<reference ref_id="CVE-2017-7046" ref_url="https://www.suse.com/security/cve/CVE-2017-7046/" source="CVE"/>
		<reference ref_id="CVE-2017-7048" ref_url="https://www.suse.com/security/cve/CVE-2017-7048/" source="CVE"/>
		<reference ref_id="CVE-2017-7049" ref_url="https://www.suse.com/security/cve/CVE-2017-7049/" source="CVE"/>
		<reference ref_id="CVE-2017-7052" ref_url="https://www.suse.com/security/cve/CVE-2017-7052/" source="CVE"/>
		<reference ref_id="CVE-2017-7055" ref_url="https://www.suse.com/security/cve/CVE-2017-7055/" source="CVE"/>
		<reference ref_id="CVE-2017-7056" ref_url="https://www.suse.com/security/cve/CVE-2017-7056/" source="CVE"/>
		<reference ref_id="CVE-2017-7059" ref_url="https://www.suse.com/security/cve/CVE-2017-7059/" source="CVE"/>
		<reference ref_id="CVE-2017-7061" ref_url="https://www.suse.com/security/cve/CVE-2017-7061/" source="CVE"/>
		<reference ref_id="CVE-2017-7064" ref_url="https://www.suse.com/security/cve/CVE-2017-7064/" source="CVE"/>
		<reference ref_id="CVE-2017-7081" ref_url="https://www.suse.com/security/cve/CVE-2017-7081/" source="CVE"/>
		<reference ref_id="CVE-2017-7087" ref_url="https://www.suse.com/security/cve/CVE-2017-7087/" source="CVE"/>
		<reference ref_id="CVE-2017-7089" ref_url="https://www.suse.com/security/cve/CVE-2017-7089/" source="CVE"/>
		<reference ref_id="CVE-2017-7090" ref_url="https://www.suse.com/security/cve/CVE-2017-7090/" source="CVE"/>
		<reference ref_id="CVE-2017-7091" ref_url="https://www.suse.com/security/cve/CVE-2017-7091/" source="CVE"/>
		<reference ref_id="CVE-2017-7092" ref_url="https://www.suse.com/security/cve/CVE-2017-7092/" source="CVE"/>
		<reference ref_id="CVE-2017-7093" ref_url="https://www.suse.com/security/cve/CVE-2017-7093/" source="CVE"/>
		<reference ref_id="CVE-2017-7094" ref_url="https://www.suse.com/security/cve/CVE-2017-7094/" source="CVE"/>
		<reference ref_id="CVE-2017-7095" ref_url="https://www.suse.com/security/cve/CVE-2017-7095/" source="CVE"/>
		<reference ref_id="CVE-2017-7096" ref_url="https://www.suse.com/security/cve/CVE-2017-7096/" source="CVE"/>
		<reference ref_id="CVE-2017-7098" ref_url="https://www.suse.com/security/cve/CVE-2017-7098/" source="CVE"/>
		<reference ref_id="CVE-2017-7099" ref_url="https://www.suse.com/security/cve/CVE-2017-7099/" source="CVE"/>
		<reference ref_id="CVE-2017-7100" ref_url="https://www.suse.com/security/cve/CVE-2017-7100/" source="CVE"/>
		<reference ref_id="CVE-2017-7102" ref_url="https://www.suse.com/security/cve/CVE-2017-7102/" source="CVE"/>
		<reference ref_id="CVE-2017-7104" ref_url="https://www.suse.com/security/cve/CVE-2017-7104/" source="CVE"/>
		<reference ref_id="CVE-2017-7107" ref_url="https://www.suse.com/security/cve/CVE-2017-7107/" source="CVE"/>
		<reference ref_id="CVE-2017-7109" ref_url="https://www.suse.com/security/cve/CVE-2017-7109/" source="CVE"/>
		<reference ref_id="CVE-2017-7111" ref_url="https://www.suse.com/security/cve/CVE-2017-7111/" source="CVE"/>
		<reference ref_id="CVE-2017-7117" ref_url="https://www.suse.com/security/cve/CVE-2017-7117/" source="CVE"/>
		<reference ref_id="CVE-2017-7120" ref_url="https://www.suse.com/security/cve/CVE-2017-7120/" source="CVE"/>
		<reference ref_id="CVE-2017-7142" ref_url="https://www.suse.com/security/cve/CVE-2017-7142/" source="CVE"/>
		<reference ref_id="CVE-2017-7156" ref_url="https://www.suse.com/security/cve/CVE-2017-7156/" source="CVE"/>
		<reference ref_id="CVE-2017-7157" ref_url="https://www.suse.com/security/cve/CVE-2017-7157/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<description>


This update for webkit2gtk3 fixes the following issues:

Update to version 2.18.5:

  + Disable SharedArrayBuffers from Web API.
  + Reduce the precision of 'high' resolution time to 1ms.
  + bsc#1075419 - Security fixes: includes improvements to mitigate
    the effects of Spectre and Meltdown (CVE-2017-5753 and CVE-2017-5715).

Update to version 2.18.4:

  + Make WebDriver implementation more spec compliant.
  + Fix a bug when trying to remove cookies before a web process is
    spawned.
  + WebKitWebDriver process no longer links to
    libjavascriptcoregtk.
  + Fix several memory leaks in GStreamer media backend.
  + bsc#1073654 - Security fixes: CVE-2017-13866, CVE-2017-13870,
    CVE-2017-7156, CVE-2017-13856.

Update to version 2.18.3:

  + Improve calculation of font metrics to prevent scrollbars from
    being shown unnecessarily in some cases.
  + Fix handling of null capabilities in WebDriver implementation.
  + Security fixes: CVE-2017-13798, CVE-2017-13788, CVE-2017-13803.

Update to version 2.18.2:

  + Fix rendering of arabic text.
  + Fix a crash in the web process when decoding GIF images.
  + Fix rendering of wind in Windy.com.
  + Fix several crashes and rendering issues.

Update to version 2.18.1:

  + Improve performance of GIF animations.
  + Fix garbled display in GMail.
  + Fix rendering of several material design icons when using the
    web font.
  + Fix flickering when resizing the window in Wayland.
  + Prevent default kerberos authentication credentials from being
    used in ephemeral sessions.
  + Fix a crash when webkit_web_resource_get_data() is cancelled.
  + Correctly handle touchmove and touchend events in
    WebKitWebView.
  + Fix the build with enchant 2.1.1.
  + Fix the build in HPPA and Alpha.
  + Fix several crashes and rendering issues.
  + Security fixes: CVE-2017-7081, CVE-2017-7087, CVE-2017-7089,
    CVE-2017-7090, CVE-2017-7091, CVE-2017-7092, CVE-2017-7093,
    CVE-2017-7094, CVE-2017-7095, CVE-2017-7096, CVE-2017-7098,
    CVE-2017-7099, CVE-2017-7100, CVE-2017-7102, CVE-2017-7104,
    CVE-2017-7107, CVE-2017-7109, CVE-2017-7111, CVE-2017-7117,
    CVE-2017-7120, CVE-2017-7142.

- Enable gold linker on s390/s390x on SLE15/Tumbleweed.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-25"/>
	<updated date="2018-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024749">SUSE bug 1024749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069925">SUSE bug 1069925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073654">SUSE bug 1073654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075419">SUSE bug 1075419</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4692/">CVE-2016-4692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4743/">CVE-2016-4743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7586/">CVE-2016-7586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7587/">CVE-2016-7587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7589/">CVE-2016-7589</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7592/">CVE-2016-7592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7598/">CVE-2016-7598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7599/">CVE-2016-7599</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7610/">CVE-2016-7610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7623/">CVE-2016-7623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7632/">CVE-2016-7632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7635/">CVE-2016-7635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7639/">CVE-2016-7639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7641/">CVE-2016-7641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7645/">CVE-2016-7645</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7652/">CVE-2016-7652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7654/">CVE-2016-7654</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7656/">CVE-2016-7656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13788/">CVE-2017-13788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13798/">CVE-2017-13798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13803/">CVE-2017-13803</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13856/">CVE-2017-13856</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13866/">CVE-2017-13866</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13870/">CVE-2017-13870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2350/">CVE-2017-2350</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2354/">CVE-2017-2354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2355/">CVE-2017-2355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2356/">CVE-2017-2356</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2362/">CVE-2017-2362</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2363/">CVE-2017-2363</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2364/">CVE-2017-2364</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2365/">CVE-2017-2365</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2366/">CVE-2017-2366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2369/">CVE-2017-2369</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2371/">CVE-2017-2371</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2373/">CVE-2017-2373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2496/">CVE-2017-2496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2510/">CVE-2017-2510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2539/">CVE-2017-2539</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7006/">CVE-2017-7006</cve>
	<cve impact="critical" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7011/">CVE-2017-7011</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7012/">CVE-2017-7012</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7018/">CVE-2017-7018</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7019/">CVE-2017-7019</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7020/">CVE-2017-7020</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7030/">CVE-2017-7030</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7034/">CVE-2017-7034</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7037/">CVE-2017-7037</cve>
	<cve impact="critical" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7038/">CVE-2017-7038</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7039/">CVE-2017-7039</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7040/">CVE-2017-7040</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7041/">CVE-2017-7041</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7042/">CVE-2017-7042</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7043/">CVE-2017-7043</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7046/">CVE-2017-7046</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7048/">CVE-2017-7048</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7049/">CVE-2017-7049</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7052/">CVE-2017-7052</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7055/">CVE-2017-7055</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7056/">CVE-2017-7056</cve>
	<cve impact="critical" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7059/">CVE-2017-7059</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7061/">CVE-2017-7061</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7064/">CVE-2017-7064</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7081/">CVE-2017-7081</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7087/">CVE-2017-7087</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7089/">CVE-2017-7089</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7090/">CVE-2017-7090</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7091/">CVE-2017-7091</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7092/">CVE-2017-7092</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7093/">CVE-2017-7093</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7094/">CVE-2017-7094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7095/">CVE-2017-7095</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7096/">CVE-2017-7096</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7098/">CVE-2017-7098</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7099/">CVE-2017-7099</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7100/">CVE-2017-7100</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7102/">CVE-2017-7102</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7104/">CVE-2017-7104</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7107/">CVE-2017-7107</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7109/">CVE-2017-7109</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7111/">CVE-2017-7111</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7117/">CVE-2017-7117</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7120/">CVE-2017-7120</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7142/">CVE-2017-7142</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7156/">CVE-2017-7156</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7157/">CVE-2017-7157</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518791" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518792" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518793" comment="libwebkit2gtk3-lang-2.18.5-2.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518794" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518795" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518796" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78323" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1069257" ref_url="https://bugzilla.suse.com/1069257" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16899" ref_url="https://www.suse.com/security/cve/CVE-2017-16899/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003635.html" source="SUSE-SU"/>
		<description>
This update for transfig fixes the following issues:

Security issue fixed:

- CVE-2017-16899: Fix array index error in the fig2dev program (bsc#1069257).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1069257">SUSE bug 1069257</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16899/">CVE-2017-16899</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518797" comment="transfig-3.2.5e-2.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78324" version="1" class="patch">
	<metadata>
		<title>Recommended update for NetworkManager-vpnc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1101147" ref_url="https://bugzilla.suse.com/1101147" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10900" ref_url="https://www.suse.com/security/cve/CVE-2018-10900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004399.html" source="SUSE-SU"/>
		<description>
This update for NetworkManager-vpnc fixes the following issues:

Security issue fixed:

- CVE-2018-10900: Check configurations that contain newline characters and invalidate them to avoid security attacks (bsc#1101147).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-10"/>
	<updated date="2018-08-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1101147">SUSE bug 1101147</bugzilla>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10900/">CVE-2018-10900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519877" comment="NetworkManager-vpnc-1.0.8-8.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519878" comment="NetworkManager-vpnc-gnome-1.0.8-8.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519879" comment="NetworkManager-vpnc-lang-1.0.8-8.4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78325" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1074014" ref_url="https://bugzilla.suse.com/1074014" source="BUGZILLA"/>
		<reference ref_id="1076861" ref_url="https://bugzilla.suse.com/1076861" source="BUGZILLA"/>
		<reference ref_id="1079150" ref_url="https://bugzilla.suse.com/1079150" source="BUGZILLA"/>
		<reference ref_id="1087416" ref_url="https://bugzilla.suse.com/1087416" source="BUGZILLA"/>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="1094325" ref_url="https://bugzilla.suse.com/1094325" source="BUGZILLA"/>
		<reference ref_id="1094480" ref_url="https://bugzilla.suse.com/1094480" source="BUGZILLA"/>
		<reference ref_id="1094725" ref_url="https://bugzilla.suse.com/1094725" source="BUGZILLA"/>
		<reference ref_id="1095556" ref_url="https://bugzilla.suse.com/1095556" source="BUGZILLA"/>
		<reference ref_id="959329" ref_url="https://bugzilla.suse.com/959329" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004404.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Security issue fixed:

- CVE-2018-3639: Add support for 'ssbd' and 'virt-ssbd' CPUID feature bits to address V4 Speculative Store Bypass aka 'Memory Disambiguation' (bsc#1092885).

Bug fixes:

- bsc#1094325: Enable virsh blockresize for XEN guests (FATE#325467).
- bsc#1095556: Fix qemu VM creating with --boot uefi due to missing AppArmor profile.
- bsc#1094725: Fix `virsh blockresize` to work with Xen qdisks.
- bsc#1094480: Fix `virsh list` to list domains with `xl list`.
- bsc#1087416: Fix missing video device within guest with default installation by virt-mamanger.
- bsc#1079150: Fix libvirt-guests start dependency.
- bsc#1076861: Fix locking of lockspace resource '/devcfs/disks/uatidmsvn1-xvda'.
- bsc#1074014: Fix KVM live migration when shutting down cluster node.
- bsc#959329: Fix wrong state of VMs in virtual manager.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-10"/>
	<updated date="2018-08-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074014">SUSE bug 1074014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076861">SUSE bug 1076861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079150">SUSE bug 1079150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087416">SUSE bug 1087416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094325">SUSE bug 1094325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094480">SUSE bug 1094480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094725">SUSE bug 1094725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095556">SUSE bug 1095556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959329">SUSE bug 959329</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519880" comment="libvirt-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519881" comment="libvirt-admin-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519882" comment="libvirt-client-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519883" comment="libvirt-daemon-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519884" comment="libvirt-daemon-config-network-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519885" comment="libvirt-daemon-config-nwfilter-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519886" comment="libvirt-daemon-driver-interface-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519887" comment="libvirt-daemon-driver-libxl-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519888" comment="libvirt-daemon-driver-lxc-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519889" comment="libvirt-daemon-driver-network-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519890" comment="libvirt-daemon-driver-nodedev-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519891" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519892" comment="libvirt-daemon-driver-qemu-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519893" comment="libvirt-daemon-driver-secret-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519894" comment="libvirt-daemon-driver-storage-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519895" comment="libvirt-daemon-driver-storage-core-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519896" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519897" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519898" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519899" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519900" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519901" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519902" comment="libvirt-daemon-lxc-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519903" comment="libvirt-daemon-qemu-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519904" comment="libvirt-daemon-xen-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519905" comment="libvirt-doc-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519906" comment="libvirt-libs-3.3.0-5.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78326" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1067700" ref_url="https://bugzilla.suse.com/1067700" source="BUGZILLA"/>
		<reference ref_id="1068059" ref_url="https://bugzilla.suse.com/1068059" source="BUGZILLA"/>
		<reference ref_id="1087303" ref_url="https://bugzilla.suse.com/1087303" source="BUGZILLA"/>
		<reference ref_id="1103411" ref_url="https://bugzilla.suse.com/1103411" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10858" ref_url="https://www.suse.com/security/cve/CVE-2018-10858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004408.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

The following security vulnerability was fixed:

- CVE-2018-10858: Fixed insufficient input validation on client directory
  listing in libsmbclient; (bsc#1103411);

The following other change was made:

- s3: winbind: Fix 'winbind normalize names' in wb_getpwsid();
- winbind: honor 'winbind use default domain' with empty domain (bsc#1087303)
- winbind: do not modify credentials in NTLM passthru (bsc#1068059)
- net: fix net ads keytab handling (bsc#1067700)
- fix vfs_ceph flock stub
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1067700">SUSE bug 1067700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068059">SUSE bug 1068059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087303">SUSE bug 1087303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103411">SUSE bug 1103411</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10858/">CVE-2018-10858</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519907" comment="libdcerpc-binding0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519908" comment="libdcerpc-binding0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519909" comment="libdcerpc0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519910" comment="libdcerpc0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519911" comment="libndr-krb5pac0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519912" comment="libndr-krb5pac0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519913" comment="libndr-nbt0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519914" comment="libndr-nbt0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519915" comment="libndr-standard0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519916" comment="libndr-standard0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519917" comment="libndr0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519918" comment="libndr0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519919" comment="libnetapi0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519920" comment="libnetapi0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519921" comment="libsamba-credentials0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519922" comment="libsamba-credentials0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519923" comment="libsamba-errors0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519924" comment="libsamba-errors0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519925" comment="libsamba-hostconfig0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519926" comment="libsamba-hostconfig0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519927" comment="libsamba-passdb0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519928" comment="libsamba-passdb0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519929" comment="libsamba-util0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519930" comment="libsamba-util0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519931" comment="libsamdb0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519932" comment="libsamdb0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519933" comment="libsmbclient0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519934" comment="libsmbclient0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519935" comment="libsmbconf0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519936" comment="libsmbconf0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519937" comment="libsmbldap0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519938" comment="libsmbldap0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519939" comment="libtevent-util0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519940" comment="libtevent-util0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519941" comment="libwbclient0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519942" comment="libwbclient0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519943" comment="samba-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519944" comment="samba-client-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519945" comment="samba-client-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519946" comment="samba-doc-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519947" comment="samba-libs-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519948" comment="samba-libs-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519949" comment="samba-winbind-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519950" comment="samba-winbind-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78327" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1098998" ref_url="https://bugzilla.suse.com/1098998" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12359" ref_url="https://www.suse.com/security/cve/CVE-2018-12359/" source="CVE"/>
		<reference ref_id="CVE-2018-12360" ref_url="https://www.suse.com/security/cve/CVE-2018-12360/" source="CVE"/>
		<reference ref_id="CVE-2018-12362" ref_url="https://www.suse.com/security/cve/CVE-2018-12362/" source="CVE"/>
		<reference ref_id="CVE-2018-12363" ref_url="https://www.suse.com/security/cve/CVE-2018-12363/" source="CVE"/>
		<reference ref_id="CVE-2018-12364" ref_url="https://www.suse.com/security/cve/CVE-2018-12364/" source="CVE"/>
		<reference ref_id="CVE-2018-12365" ref_url="https://www.suse.com/security/cve/CVE-2018-12365/" source="CVE"/>
		<reference ref_id="CVE-2018-12366" ref_url="https://www.suse.com/security/cve/CVE-2018-12366/" source="CVE"/>
		<reference ref_id="CVE-2018-12368" ref_url="https://www.suse.com/security/cve/CVE-2018-12368/" source="CVE"/>
		<reference ref_id="CVE-2018-5156" ref_url="https://www.suse.com/security/cve/CVE-2018-5156/" source="CVE"/>
		<reference ref_id="CVE-2018-5188" ref_url="https://www.suse.com/security/cve/CVE-2018-5188/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version ESR 52.9 fixes the following issues:

- CVE-2018-5188: Various memory safety bugs (bsc#1098998)
- CVE-2018-12368: No warning when opening executable SettingContent-ms files
- CVE-2018-12366: Invalid data handling during QCMS transformations
- CVE-2018-12365: Compromised IPC child process can list local filenames
- CVE-2018-12364: CSRF attacks through 307 redirects and NPAPI plugins
- CVE-2018-12363: Use-after-free when appending DOM nodes
- CVE-2018-12362: Integer overflow in SSSE3 scaler
- CVE-2018-12360: Use-after-free when using focus()
- CVE-2018-5156: Media recorder segmentation fault when track type is changed during capture
- CVE-2018-12359: Buffer overflow using computed size of canvas element
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12359/">CVE-2018-12359</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12360/">CVE-2018-12360</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12362/">CVE-2018-12362</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12363/">CVE-2018-12363</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12364/">CVE-2018-12364</cve>
	<cve impact="important" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12365/">CVE-2018-12365</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12366/">CVE-2018-12366</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12368/">CVE-2018-12368</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5156/">CVE-2018-5156</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5188/">CVE-2018-5188</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519951" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519952" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78328" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1082858" ref_url="https://bugzilla.suse.com/1082858" source="BUGZILLA"/>
		<reference ref_id="1101410" ref_url="https://bugzilla.suse.com/1101410" source="BUGZILLA"/>
		<reference ref_id="1101412" ref_url="https://bugzilla.suse.com/1101412" source="BUGZILLA"/>
		<reference ref_id="1101654" ref_url="https://bugzilla.suse.com/1101654" source="BUGZILLA"/>
		<reference ref_id="1103040" ref_url="https://bugzilla.suse.com/1103040" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0360" ref_url="https://www.suse.com/security/cve/CVE-2018-0360/" source="CVE"/>
		<reference ref_id="CVE-2018-0361" ref_url="https://www.suse.com/security/cve/CVE-2018-0361/" source="CVE"/>
		<reference ref_id="CVE-2018-1000085" ref_url="https://www.suse.com/security/cve/CVE-2018-1000085/" source="CVE"/>
		<reference ref_id="CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004412.html" source="SUSE-SU"/>
		<description>
This update for clamav to version 0.100.1 fixes the following issues:
  
The following security vulnerabilities were addressed:
  
- CVE-2018-0360: HWP integer overflow, infinite loop vulnerability (bsc#1101410)
- CVE-2018-0361: PDF object length check, unreasonably long time to parse relatively small file (bsc#1101412)
- CVE-2018-1000085: Fixed a out-of-bounds heap read in XAR parser (bsc#1082858)
- CVE-2018-14679: Libmspack heap buffer over-read in CHM parser (bsc#1103040)
- Buffer over-read in unRAR code due to missing max value checks in table initialization
- PDF parser bugs

The following other changes were made:

- Disable YARA support for licensing reasons (bsc#1101654).
- Add HTTPS support for clamsubmit
- Fix for DNS resolution for users on IPv4-only machines where IPv6 is not
  available or is link-local only
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1082858">SUSE bug 1082858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101410">SUSE bug 1101410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101412">SUSE bug 1101412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101654">SUSE bug 1101654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0360/">CVE-2018-0360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0361/">CVE-2018-0361</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000085/">CVE-2018-1000085</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519953" comment="clamav-0.100.1-33.15.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78329" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1082653" ref_url="https://bugzilla.suse.com/1082653" source="BUGZILLA"/>
		<reference ref_id="1085042" ref_url="https://bugzilla.suse.com/1085042" source="BUGZILLA"/>
		<reference ref_id="1085536" ref_url="https://bugzilla.suse.com/1085536" source="BUGZILLA"/>
		<reference ref_id="1087081" ref_url="https://bugzilla.suse.com/1087081" source="BUGZILLA"/>
		<reference ref_id="1089343" ref_url="https://bugzilla.suse.com/1089343" source="BUGZILLA"/>
		<reference ref_id="1090123" ref_url="https://bugzilla.suse.com/1090123" source="BUGZILLA"/>
		<reference ref_id="1090435" ref_url="https://bugzilla.suse.com/1090435" source="BUGZILLA"/>
		<reference ref_id="1092001" ref_url="https://bugzilla.suse.com/1092001" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1095643" ref_url="https://bugzilla.suse.com/1095643" source="BUGZILLA"/>
		<reference ref_id="1096978" ref_url="https://bugzilla.suse.com/1096978" source="BUGZILLA"/>
		<reference ref_id="1097771" ref_url="https://bugzilla.suse.com/1097771" source="BUGZILLA"/>
		<reference ref_id="1099858" ref_url="https://bugzilla.suse.com/1099858" source="BUGZILLA"/>
		<reference ref_id="1100132" ref_url="https://bugzilla.suse.com/1100132" source="BUGZILLA"/>
		<reference ref_id="1100930" ref_url="https://bugzilla.suse.com/1100930" source="BUGZILLA"/>
		<reference ref_id="1101658" ref_url="https://bugzilla.suse.com/1101658" source="BUGZILLA"/>
		<reference ref_id="1101789" ref_url="https://bugzilla.suse.com/1101789" source="BUGZILLA"/>
		<reference ref_id="1102188" ref_url="https://bugzilla.suse.com/1102188" source="BUGZILLA"/>
		<reference ref_id="1102197" ref_url="https://bugzilla.suse.com/1102197" source="BUGZILLA"/>
		<reference ref_id="1102203" ref_url="https://bugzilla.suse.com/1102203" source="BUGZILLA"/>
		<reference ref_id="1102205" ref_url="https://bugzilla.suse.com/1102205" source="BUGZILLA"/>
		<reference ref_id="1102207" ref_url="https://bugzilla.suse.com/1102207" source="BUGZILLA"/>
		<reference ref_id="1102211" ref_url="https://bugzilla.suse.com/1102211" source="BUGZILLA"/>
		<reference ref_id="1102214" ref_url="https://bugzilla.suse.com/1102214" source="BUGZILLA"/>
		<reference ref_id="1102215" ref_url="https://bugzilla.suse.com/1102215" source="BUGZILLA"/>
		<reference ref_id="1102340" ref_url="https://bugzilla.suse.com/1102340" source="BUGZILLA"/>
		<reference ref_id="1102394" ref_url="https://bugzilla.suse.com/1102394" source="BUGZILLA"/>
		<reference ref_id="1102683" ref_url="https://bugzilla.suse.com/1102683" source="BUGZILLA"/>
		<reference ref_id="1102851" ref_url="https://bugzilla.suse.com/1102851" source="BUGZILLA"/>
		<reference ref_id="1103119" ref_url="https://bugzilla.suse.com/1103119" source="BUGZILLA"/>
		<reference ref_id="1103580" ref_url="https://bugzilla.suse.com/1103580" source="BUGZILLA"/>
		<reference ref_id="1103745" ref_url="https://bugzilla.suse.com/1103745" source="BUGZILLA"/>
		<reference ref_id="1103884" ref_url="https://bugzilla.suse.com/1103884" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18344" ref_url="https://www.suse.com/security/cve/CVE-2017-18344/" source="CVE"/>
		<reference ref_id="CVE-2018-14734" ref_url="https://www.suse.com/security/cve/CVE-2018-14734/" source="CVE"/>
		<reference ref_id="CVE-2018-3620" ref_url="https://www.suse.com/security/cve/CVE-2018-3620/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004414.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.143 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-5390 aka 'SegmentSmack': Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102340).
- CVE-2018-14734: drivers/infiniband/core/ucma.c in the Linux kernel allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent-&gt;sigev_notify field, which lead to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bnc#1102851 bnc#1103580).
- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).

The following non-security bugs were fixed:

- Add support for 5,25,50, and 100G to 802.3ad bonding driver (bsc#1096978)
- ahci: Disable LPM on Lenovo 50 series laptops with a too old BIOS (bnc#1012382).
- arm64: do not open code page table entry creation (bsc#1102197).
- arm64: kpti: Use early_param for kpti= command-line option (bsc#1102188).
- arm64: Make sure permission updates happen for pmd/pud (bsc#1102197).
- atm: zatm: Fix potential Spectre v1 (bnc#1012382).
- bcm63xx_enet: correct clock usage (bnc#1012382).
- bcm63xx_enet: do not write to random DMA channel on BCM6345 (bnc#1012382).
- blacklist 9fb8d5dc4b64 ('stop_machine: Disable preemption when waking two stopper threads') Preemption is already disabled inside cpu_stop_queue_two_works() in SLE12-SP3 because it does not have commit 6a19005157c4 ('stop_machine: Do not disable preemption in stop_two_cpus()')
- block: copy ioprio in __bio_clone_fast() (bsc#1082653).
- bpf: fix loading of BPF_MAXINSNS sized programs (bsc#1012382).
- bpf, x64: fix memleak when not converging after image (bsc#1012382).
- cachefiles: Fix missing clear of the CACHEFILES_OBJECT_ACTIVE flag (bsc#1099858).
- cachefiles: Fix refcounting bug in backing-file read monitoring (bsc#1099858).
- cachefiles: Wait rather than BUG'ing on 'Unexpected object collision' (bsc#1099858).
- cifs: fix bad/NULL ptr dereferencing in SMB2_sess_setup() (bsc#1090123).
- compiler, clang: always inline when CONFIG_OPTIMIZE_INLINING is disabled (bnc#1012382).
- compiler, clang: properly override 'inline' for clang (bnc#1012382).
- compiler, clang: suppress warning for unused static inline functions (bnc#1012382).
- compiler-gcc.h: Add __attribute__((gnu_inline)) to all inline declarations (bnc#1012382).
- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- crypto: crypto4xx - fix crypto4xx_build_pdr, crypto4xx_build_sdr leak (bnc#1012382).
- crypto: crypto4xx - remove bad list_del (bnc#1012382).
- drm/msm: Fix possible null dereference on failure of get_pages() (bsc#1102394).
- drm: re-enable error handling (bsc#1103884).
- fscache: Allow cancelled operations to be enqueued (bsc#1099858).
- fscache: Fix reference overput in fscache_attach_object() error handling (bsc#1099858).
- hid: usbhid: add quirk for innomedia INNEX GENESIS/ATARI adapter (bnc#1012382).
- ibmasm: do not write out of bounds in read handler (bnc#1012382).
- ibmvnic: Fix error recovery on login failure (bsc#1101789).
- iw_cxgb4: correctly enforce the max reg_mr depth (bnc#1012382).
- kabi protect includes in include/linux/inet.h (bsc#1095643).
- KABI protect net/core/utils.c includes (bsc#1095643).
- kABI: protect struct loop_device (kabi).
- kABI: reintroduce __static_cpu_has_safe (kabi).
- kbuild: fix # escaping in .cmd files for future Make (bnc#1012382).
- keys: DNS: fix parsing multiple options (bnc#1012382).
- kvm: arm/arm64: Drop resource size check for GICV window (bsc#1102215).
- kvm: arm/arm64: Set dist-&gt;spis to NULL after kfree (bsc#1102214).
- loop: add recursion validation to LOOP_CHANGE_FD (bnc#1012382).
- loop: remember whether sysfs_create_group() was done (bnc#1012382).
- mmc: dw_mmc: fix card threshold control configuration (bsc#1102203).
- mm: check VMA flags to avoid invalid PROT_NONE NUMA balancing (bsc#1097771).
- net: cxgb3_main: fix potential Spectre v1 (bnc#1012382).
- net: dccp: avoid crash in ccid3_hc_rx_send_feedback() (bnc#1012382).
- net: dccp: switch rx_tstamp_last_feedback to monotonic clock (bnc#1012382).
- netfilter: ebtables: reject non-bridge targets (bnc#1012382).
- netfilter: nf_queue: augment nfqa_cfg_policy (bnc#1012382).
- netfilter: x_tables: initialise match/target check parameter struct (bnc#1012382).
- net/mlx5: Fix command interface race in polling mode (bnc#1012382).
- net/mlx5: Fix incorrect raw command length parsing (bnc#1012382).
- net: mvneta: fix the Rx desc DMA address in the Rx path (bsc#1102207).
- net/nfc: Avoid stalls when nfc_alloc_send_skb() returned NULL (bnc#1012382).
- net: off by one in inet6_pton() (bsc#1095643).
- net: phy: marvell: Use strlcpy() for ethtool::get_strings (bsc#1102205).
- net_sched: blackhole: tell upper qdisc about dropped packets (bnc#1012382).
- net: sungem: fix rx checksum support (bnc#1012382).
- net/utils: generic inet_pton_with_scope helper (bsc#1095643).
- nvme-rdma: Check remotely invalidated rkey matches our expected rkey (bsc#1092001).
- nvme-rdma: default MR page size to 4k (bsc#1092001).
- nvme-rdma: do not complete requests before a send work request has completed (bsc#1092001).
- nvme-rdma: do not suppress send completions (bsc#1092001).
- nvme-rdma: Fix command completion race at error recovery (bsc#1090435).
- nvme-rdma: make nvme_rdma_[create|destroy]_queue_ib symmetrical (bsc#1092001).
- nvme-rdma: use inet_pton_with_scope helper (bsc#1095643).
- nvme-rdma: Use mr pool (bsc#1092001).
- nvme-rdma: wait for local invalidation before completing a request (bsc#1092001).
- ocfs2: subsystem.su_mutex is required while accessing the item-&gt;ci_parent (bnc#1012382).
- pci: ibmphp: Fix use-before-set in get_max_bus_speed() (bsc#1100132).
- perf tools: Move syscall number fallbacks from perf-sys.h to tools/arch/x86/include/asm/ (bnc#1012382).
- pm / hibernate: Fix oops at snapshot_write() (bnc#1012382).
- powerpc/64: Initialise thread_info for emergency stacks (bsc#1094244, bsc#1100930, bsc#1102683).
- qed: Limit msix vectors in kdump kernel to the minimum required count (bnc#1012382).
- r8152: napi hangup fix after disconnect (bnc#1012382).
- rdma/ucm: Mark UCM interface as BROKEN (bnc#1012382).
- rds: avoid unenecessary cong_update in loop transport (bnc#1012382).
- Revert 'sit: reload iphdr in ipip6_rcv' (bnc#1012382).
- Revert 'x86/cpufeature: Move some of the scattered feature bits to x86_capability' (kabi).
- Revert 'x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6' (kabi).
- rtlwifi: rtl8821ae: fix firmware is not ready to run (bnc#1012382).
- s390/qeth: fix error handling in adapter command callbacks (bnc#1103745, LTC#169699).
- sched/smt: Update sched_smt_present at runtime (bsc#1089343).
- smsc75xx: Add workaround for gigabit link up hardware errata (bsc#1100132).
- smsc95xx: Configure pause time to 0xffff when tx flow control enabled (bsc#1085536).
- tcp: fix Fast Open key endianness (bnc#1012382).
- tcp: prevent bogus FRTO undos with non-SACK flows (bnc#1012382).
- tools build: fix # escaping in .cmd files for future Make (bnc#1012382).
- uprobes/x86: Remove incorrect WARN_ON() in uprobe_init_insn() (bnc#1012382).
- usb: core: handle hub C_PORT_OVER_CURRENT condition (bsc#1100132).
- usb: quirks: add delay quirks for Corsair Strafe (bnc#1012382).
- usb: serial: ch341: fix type promotion bug in ch341_control_in() (bnc#1012382).
- usb: serial: cp210x: add another USB ID for Qivicon ZigBee stick (bnc#1012382).
- usb: serial: keyspan_pda: fix modem-status error handling (bnc#1012382).
- usb: serial: mos7840: fix status-register error handling (bnc#1012382).
- usb: yurex: fix out-of-bounds uaccess in read handler (bnc#1012382).
- vfio: platform: Fix reset module leak in error path (bsc#1102211).
- vhost_net: validate sock before trying to put its fd (bnc#1012382).
- vmw_balloon: fix inflation with batching (bnc#1012382).
- x86/alternatives: Add an auxilary section (bnc#1012382).
- x86/alternatives: Discard dynamic check after init (bnc#1012382).
- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).
- x86/asm: Add _ASM_ARG* constants for argument registers to &lt;asm/asm.h&gt; (bnc#1012382).
- x86/boot: Simplify kernel load address alignment check (bnc#1012382).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343). Update config files.
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpufeature: Add helper macro for mask check macros (bnc#1012382).
- x86/cpufeature: Carve out X86_FEATURE_* (bnc#1012382).
- x86/cpufeature: Get rid of the non-asm goto variant (bnc#1012382).
- x86/cpufeature: Make sure DISABLED/REQUIRED macros are updated (bnc#1012382).
- x86/cpufeature: Move some of the scattered feature bits to x86_capability (bnc#1012382).
- x86/cpufeature: Replace the old static_cpu_has() with safe variant (bnc#1012382).
- x86/cpufeature: Speed up cpu_feature_enabled() (bnc#1012382).
- x86/cpufeature: Update cpufeaure macros (bnc#1012382).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6 (bnc#1012382).
- x86/cpu: Provide a config option to disable static_cpu_has (bnc#1012382).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/fpu: Add an XSTATE_OP() macro (bnc#1012382).
- x86/fpu: Get rid of xstate_fault() (bnc#1012382).
- x86/headers: Do not include asm/processor.h in asm/atomic.h (bnc#1012382).
- x86/mm/pkeys: Fix mismerge of protection keys CPUID bits (bnc#1012382).
- x86/mm: Simplify p[g4um]d_page() macros (1087081).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- x86/vdso: Use static_cpu_has() (bnc#1012382).
- xen/grant-table: log the lack of grants (bnc#1085042).
- xen-netfront: Fix mismatched rtnl_unlock (bnc#1101658).
- xen-netfront: Update features after registering netdev (bnc#1101658).
- xhci: xhci-mem: off by one in xhci_stream_id_to_ring() (bnc#1012382).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082653">SUSE bug 1082653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085042">SUSE bug 1085042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085536">SUSE bug 1085536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090123">SUSE bug 1090123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090435">SUSE bug 1090435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092001">SUSE bug 1092001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095643">SUSE bug 1095643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096978">SUSE bug 1096978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097771">SUSE bug 1097771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099858">SUSE bug 1099858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100132">SUSE bug 1100132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100930">SUSE bug 1100930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101658">SUSE bug 1101658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101789">SUSE bug 1101789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102188">SUSE bug 1102188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102197">SUSE bug 1102197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102203">SUSE bug 1102203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102205">SUSE bug 1102205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102207">SUSE bug 1102207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102211">SUSE bug 1102211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102214">SUSE bug 1102214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102215">SUSE bug 1102215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102340">SUSE bug 1102340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102394">SUSE bug 1102394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102683">SUSE bug 1102683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102851">SUSE bug 1102851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103119">SUSE bug 1103119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103580">SUSE bug 1103580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103745">SUSE bug 1103745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103884">SUSE bug 1103884</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-18344/">CVE-2017-18344</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14734/">CVE-2018-14734</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3620/">CVE-2018-3620</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519954" comment="kernel-default-4.4.143-94.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519955" comment="kernel-default-devel-4.4.143-94.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519956" comment="kernel-default-extra-4.4.143-94.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519957" comment="kernel-devel-4.4.143-94.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519958" comment="kernel-macros-4.4.143-94.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519959" comment="kernel-source-4.4.143-94.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519960" comment="kernel-syms-4.4.143-94.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78330" version="1" class="patch">
	<metadata>
		<title>Security update to ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087083" ref_url="https://bugzilla.suse.com/1087083" source="BUGZILLA"/>
		<reference ref_id="1089343" ref_url="https://bugzilla.suse.com/1089343" source="BUGZILLA"/>
		<reference ref_id="1104134" ref_url="https://bugzilla.suse.com/1104134" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004416.html" source="SUSE-SU"/>
		<description>

ucode-intel was updated to the 20180807 release.

For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a) and is
part of the mitigations for CVE-2018-3639 (Spectre v4) and CVE-2018-3646
(L1 Terminal fault).
(bsc#1104134 bsc#1087082 bsc#1087083 bsc#1089343)

 Processor             Identifier     Version       Products

 Model        Stepping F-MO-S/PI      Old-&gt;New

 ---- new platforms ----------------------------------------
 WSM-EP/WS    U1       6-2c-2/03           0000001f Xeon E/L/X56xx, W36xx
 NHM-EX       D0       6-2e-6/04           0000000d Xeon E/L/X65xx/75xx
 BXT          C0       6-5c-2/01           00000014 Atom T5500/5700
 APL          E0       6-5c-a/03           0000000c Atom x5-E39xx
 DVN          B0       6-5f-1/01           00000024 Atom C3xxx
 ---- updated platforms ------------------------------------
 NHM-EP/WS    D0       6-1a-5/03 00000019-&gt;0000001d Xeon E/L/X/W55xx
 NHM          B1       6-1e-5/13 00000007-&gt;0000000a Core i7-8xx, i5-7xx; Xeon L3426, X24xx
 WSM          B1       6-25-2/12 0000000e-&gt;00000011 Core i7-6xx, i5-6xx/4xxM, i3-5xx/3xxM, Pentium G69xx, Celeon P45xx; Xeon L3406
 WSM          K0       6-25-5/92 00000004-&gt;00000007 Core i7-6xx, i5-6xx/5xx/4xx, i3-5xx/3xx, Pentium G69xx/P6xxx/U5xxx, Celeron P4xxx/U3xxx
 SNB          D2       6-2a-7/12 0000002d-&gt;0000002e Core Gen2; Xeon E3
 WSM-EX       A2       6-2f-2/05 00000037-&gt;0000003b Xeon E7
 IVB          E2       6-3a-9/12 0000001f-&gt;00000020 Core Gen3 Mobile
 HSW-H/S/E3   Cx/Dx    6-3c-3/32 00000024-&gt;00000025 Core Gen4 Desktop; Xeon E3 v3
 BDW-U/Y      E/F      6-3d-4/c0 0000002a-&gt;0000002b Core Gen5 Mobile
 HSW-ULT      Cx/Dx    6-45-1/72 00000023-&gt;00000024 Core Gen4 Mobile and derived Pentium/Celeron
 HSW-H        Cx       6-46-1/32 00000019-&gt;0000001a Core Extreme i7-5xxxX
 BDW-H/E3     E/G      6-47-1/22 0000001d-&gt;0000001e Core i5-5xxxR/C, i7-5xxxHQ/EQ; Xeon E3 v4
 SKL-U/Y      D0       6-4e-3/c0 000000c2-&gt;000000c6 Core Gen6 Mobile
 BDX-DE       V1       6-56-2/10 00000015-&gt;00000017 Xeon D-1520/40
 BDX-DE       V2/3     6-56-3/10 07000012-&gt;07000013 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
 BDX-DE       Y0       6-56-4/10 0f000011-&gt;0f000012 Xeon D-1557/59/67/71/77/81/87
 APL          D0       6-5c-9/03 0000002c-&gt;00000032 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
 SKL-H/S/E3   R0       6-5e-3/36 000000c2-&gt;000000c6 Core Gen6; Xeon E3 v5
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-15"/>
	<updated date="2018-08-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087083">SUSE bug 1087083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104134">SUSE bug 1104134</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519961" comment="ucode-intel-20180807-13.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78331" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1072947" ref_url="https://bugzilla.suse.com/1072947" source="BUGZILLA"/>
		<reference ref_id="1078662" ref_url="https://bugzilla.suse.com/1078662" source="BUGZILLA"/>
		<reference ref_id="1080740" ref_url="https://bugzilla.suse.com/1080740" source="BUGZILLA"/>
		<reference ref_id="1084300" ref_url="https://bugzilla.suse.com/1084300" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7738" ref_url="https://www.suse.com/security/cve/CVE-2018-7738/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004898.html" source="SUSE-SU"/>
		<description>
This update for util-linux fixes the following issues:

This non-security issue was fixed:

- CVE-2018-7738: bash-completion/umount allowed local users to gain privileges
  by embedding shell commands in a mountpoint name, which was mishandled during a
  umount command by a different user (bsc#1084300).

These non-security issues were fixed:

- Fixed crash loop in lscpu (bsc#1072947).
- Fixed possible segfault of umount -a
- Fixed mount -a on NFS bind mounts (bsc#1080740).
- Fixed lsblk on NVMe (bsc#1078662).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-27"/>
	<updated date="2018-11-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1072947">SUSE bug 1072947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078662">SUSE bug 1078662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080740">SUSE bug 1080740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084300">SUSE bug 1084300</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7738/">CVE-2018-7738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519962" comment="libblkid1-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519963" comment="libblkid1-32bit-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519964" comment="libfdisk1-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519965" comment="libmount1-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519966" comment="libmount1-32bit-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519967" comment="libsmartcols1-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519968" comment="libuuid-devel-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519969" comment="libuuid1-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519970" comment="libuuid1-32bit-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519971" comment="python-libmount-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519972" comment="util-linux-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519973" comment="util-linux-lang-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519974" comment="util-linux-systemd-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519975" comment="uuidd-2.29.2-3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78332" version="1" class="patch">
	<metadata>
		<title>Security update for perl-Archive-Zip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1099497" ref_url="https://bugzilla.suse.com/1099497" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10860" ref_url="https://www.suse.com/security/cve/CVE-2018-10860/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004453.html" source="SUSE-SU"/>
		<description>
This update for perl-Archive-Zip fixes the following security issue:

- CVE-2018-10860: Prevent directory traversal caused by not properly sanitizing
  paths while extracting zip files. An attacker able to provide a specially
  crafted archive for processing could have used this flaw to write or overwrite
  arbitrary files in the context of the perl interpreter (bsc#1099497)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1099497">SUSE bug 1099497</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-10860/">CVE-2018-10860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519976" comment="perl-Archive-Zip-1.34-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78333" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1091107" ref_url="https://bugzilla.suse.com/1091107" source="BUGZILLA"/>
		<reference ref_id="1103276" ref_url="https://bugzilla.suse.com/1103276" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004461.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following security issues:

- CVE-2018-3646: Systems with microprocessors utilizing speculative execution
  and address translations may have allowed unauthorized disclosure of
  information residing in the L1 data cache to an attacker with local user access
  with guest OS privilege via a terminal page fault and a side-channel analysis
  (bsc#1091107, bsc#1027519).
- Incorrect MSR_DEBUGCTL handling let guests enable BTS allowing a malicious or
  buggy guest administrator can lock up the entire host (bsc#1103276)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091107">SUSE bug 1091107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103276">SUSE bug 1103276</bugzilla>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519977" comment="xen-4.9.2_10-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519978" comment="xen-libs-4.9.2_10-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519979" comment="xen-libs-32bit-4.9.2_10-3.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78334" version="1" class="patch">
	<metadata>
		<title>Security update for procps (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1092100" ref_url="https://bugzilla.suse.com/1092100" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1122" ref_url="https://www.suse.com/security/cve/CVE-2018-1122/" source="CVE"/>
		<reference ref_id="CVE-2018-1123" ref_url="https://www.suse.com/security/cve/CVE-2018-1123/" source="CVE"/>
		<reference ref_id="CVE-2018-1124" ref_url="https://www.suse.com/security/cve/CVE-2018-1124/" source="CVE"/>
		<reference ref_id="CVE-2018-1125" ref_url="https://www.suse.com/security/cve/CVE-2018-1125/" source="CVE"/>
		<reference ref_id="CVE-2018-1126" ref_url="https://www.suse.com/security/cve/CVE-2018-1126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2451-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004889.html" source="SUSE-SU"/>
		<description>
This update for procps fixes the following security issues:

- CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top
  with HOME unset in an attacker-controlled directory, the attacker could have
  achieved privilege escalation by exploiting one of several vulnerabilities in
  the config_file() function (bsc#1092100).
- CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow.
  Inbuilt protection in ps maped a guard page at the end of the overflowed
  buffer, ensuring that the impact of this flaw is limited to a crash (temporary
  denial of service) (bsc#1092100).
- CVE-2018-1124: Prevent multiple integer overflows leading to a heap
  corruption in file2strvec function. This allowed a privilege escalation for a
  local attacker who can create entries in procfs by starting processes, which
  could result in crashes or arbitrary code execution in proc utilities run by
  other users (bsc#1092100).
- CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was
  mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).
- CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent
  truncation/integer overflow issues (bsc#1092100).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-26"/>
	<updated date="2018-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1122/">CVE-2018-1122</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1123/">CVE-2018-1123</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1124/">CVE-2018-1124</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1125/">CVE-2018-1125</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1126/">CVE-2018-1126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519980" comment="libprocps3-3.3.9-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519981" comment="procps-3.3.9-11.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78335" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1064455" ref_url="https://bugzilla.suse.com/1064455" source="BUGZILLA"/>
		<reference ref_id="1090766" ref_url="https://bugzilla.suse.com/1090766" source="BUGZILLA"/>
		<reference ref_id="1097410" ref_url="https://bugzilla.suse.com/1097410" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2452-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004883.html" source="SUSE-SU"/>
		<description>
This update for libgcrypt fixes the following issues:

The following security vulnerability was addressed:

- CVE-2018-0495: Mitigate a novel side-channel attack by enabling blinding for
  ECDSA signatures (bsc#1097410).

The following other issues were fixed:

- Extended the fipsdrv dsa-sign and dsa-verify commands with the
  --algo parameter for the FIPS testing of DSA SigVer and SigGen (bsc#1064455).
- Ensure libgcrypt20-hmac and libgcrypt20 are installed in the correct order. (bsc#1090766)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-23"/>
	<updated date="2018-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064455">SUSE bug 1064455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090766">SUSE bug 1090766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097410">SUSE bug 1097410</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519982" comment="libgcrypt20-1.6.1-16.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519983" comment="libgcrypt20-32bit-1.6.1-16.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78336" version="1" class="patch">
	<metadata>
		<title>Security update for libcgroup (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1100365" ref_url="https://bugzilla.suse.com/1100365" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14348" ref_url="https://www.suse.com/security/cve/CVE-2018-14348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004482.html" source="SUSE-SU"/>
		<description>
This update for libcgroup fixes the following issues:

Security issue fixed:

- CVE-2018-14348: Fix daemon that creates /var/log/cgred with mode 0666 (bsc#1100365).

This updates also sets the permissions of already existing log files to proper values.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-21"/>
	<updated date="2018-08-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100365">SUSE bug 1100365</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14348/">CVE-2018-14348</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519984" comment="libcgroup1-0.41.rc1-10.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78337" version="1" class="patch">
	<metadata>
		<title>Security update for podofo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1023067" ref_url="https://bugzilla.suse.com/1023067" source="BUGZILLA"/>
		<reference ref_id="1023069" ref_url="https://bugzilla.suse.com/1023069" source="BUGZILLA"/>
		<reference ref_id="1023070" ref_url="https://bugzilla.suse.com/1023070" source="BUGZILLA"/>
		<reference ref_id="1023071" ref_url="https://bugzilla.suse.com/1023071" source="BUGZILLA"/>
		<reference ref_id="1023380" ref_url="https://bugzilla.suse.com/1023380" source="BUGZILLA"/>
		<reference ref_id="1027778" ref_url="https://bugzilla.suse.com/1027778" source="BUGZILLA"/>
		<reference ref_id="1027782" ref_url="https://bugzilla.suse.com/1027782" source="BUGZILLA"/>
		<reference ref_id="1027787" ref_url="https://bugzilla.suse.com/1027787" source="BUGZILLA"/>
		<reference ref_id="1032017" ref_url="https://bugzilla.suse.com/1032017" source="BUGZILLA"/>
		<reference ref_id="1032018" ref_url="https://bugzilla.suse.com/1032018" source="BUGZILLA"/>
		<reference ref_id="1032019" ref_url="https://bugzilla.suse.com/1032019" source="BUGZILLA"/>
		<reference ref_id="1035534" ref_url="https://bugzilla.suse.com/1035534" source="BUGZILLA"/>
		<reference ref_id="1035596" ref_url="https://bugzilla.suse.com/1035596" source="BUGZILLA"/>
		<reference ref_id="1037739" ref_url="https://bugzilla.suse.com/1037739" source="BUGZILLA"/>
		<reference ref_id="1075772" ref_url="https://bugzilla.suse.com/1075772" source="BUGZILLA"/>
		<reference ref_id="1084894" ref_url="https://bugzilla.suse.com/1084894" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5852" ref_url="https://www.suse.com/security/cve/CVE-2017-5852/" source="CVE"/>
		<reference ref_id="CVE-2017-5853" ref_url="https://www.suse.com/security/cve/CVE-2017-5853/" source="CVE"/>
		<reference ref_id="CVE-2017-5854" ref_url="https://www.suse.com/security/cve/CVE-2017-5854/" source="CVE"/>
		<reference ref_id="CVE-2017-5855" ref_url="https://www.suse.com/security/cve/CVE-2017-5855/" source="CVE"/>
		<reference ref_id="CVE-2017-5886" ref_url="https://www.suse.com/security/cve/CVE-2017-5886/" source="CVE"/>
		<reference ref_id="CVE-2017-6840" ref_url="https://www.suse.com/security/cve/CVE-2017-6840/" source="CVE"/>
		<reference ref_id="CVE-2017-6844" ref_url="https://www.suse.com/security/cve/CVE-2017-6844/" source="CVE"/>
		<reference ref_id="CVE-2017-6847" ref_url="https://www.suse.com/security/cve/CVE-2017-6847/" source="CVE"/>
		<reference ref_id="CVE-2017-7378" ref_url="https://www.suse.com/security/cve/CVE-2017-7378/" source="CVE"/>
		<reference ref_id="CVE-2017-7379" ref_url="https://www.suse.com/security/cve/CVE-2017-7379/" source="CVE"/>
		<reference ref_id="CVE-2017-7380" ref_url="https://www.suse.com/security/cve/CVE-2017-7380/" source="CVE"/>
		<reference ref_id="CVE-2017-7994" ref_url="https://www.suse.com/security/cve/CVE-2017-7994/" source="CVE"/>
		<reference ref_id="CVE-2017-8054" ref_url="https://www.suse.com/security/cve/CVE-2017-8054/" source="CVE"/>
		<reference ref_id="CVE-2017-8787" ref_url="https://www.suse.com/security/cve/CVE-2017-8787/" source="CVE"/>
		<reference ref_id="CVE-2018-5308" ref_url="https://www.suse.com/security/cve/CVE-2018-5308/" source="CVE"/>
		<reference ref_id="CVE-2018-8001" ref_url="https://www.suse.com/security/cve/CVE-2018-8001/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004491.html" source="SUSE-SU"/>
		<description>
This update for podofo fixes the following issues:

- CVE-2017-5852: The PoDoFo::PdfPage::GetInheritedKeyFromObject function
  allowed remote attackers to cause a denial of service (infinite loop) via a
  crafted file (bsc#1023067).
- CVE-2017-5853: Integer overflow allowed remote attackers to have unspecified
  impact via a crafted file (bsc#1023069).
- CVE-2017-5854: Prevent NULL pointer dereference that allowed remote attackers
  to cause a denial of service via a crafted file (bsc#1023070).
- CVE-2017-5855: The PoDoFo::PdfParser::ReadXRefSubsection function allowed
  remote attackers to cause a denial of service (NULL pointer dereference) via a
  crafted file (bsc#1023071).
- CVE-2017-5886: Prevent heap-based buffer overflow in the
  PoDoFo::PdfTokenizer::GetNextToken function that allowed remote attackers to
  have unspecified impact via a crafted file (bsc#1023380).
- CVE-2017-6847: The PoDoFo::PdfVariant::DelayedLoad function allowed remote
  attackers to cause a denial of service (NULL pointer dereference) via a crafted
  file (bsc#1027778).
- CVE-2017-6844: Buffer overflow in the PoDoFo::PdfParser::ReadXRefSubsection
  function allowed remote attackers to have unspecified impact via a crafted file
  (bsc#1027782).
- CVE-2017-6840: The ColorChanger::GetColorFromStack function allowed remote
  attackers to cause a denial of service (invalid read) via a crafted file
  (bsc#1027787).
- CVE-2017-7378: The PoDoFo::PdfPainter::ExpandTabs function allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) via a crafted PDF document (bsc#1032017).
- CVE-2017-7379: The PoDoFo::PdfSimpleEncoding::ConvertToEncoding function
  allowed remote attackers to cause a denial of service (heap-based buffer
  over-read and application crash) via a crafted PDF document (bsc#1032018).
- CVE-2017-7380: Prevent NULL pointer dereference that allowed remote attackers
  to cause a denial of service via a crafted PDF document (bsc#1032019).
- CVE-2017-7994: The function TextExtractor::ExtractText allowed remote
  attackers to cause a denial of service (NULL pointer dereference and
  application crash) via a crafted PDF document (bsc#1035534).
- CVE-2017-8054: The function PdfPagesTree::GetPageNodeFromArray allowed remote
  attackers to cause a denial of service (infinite recursion and application
  crash) via a crafted PDF document (bsc#1035596).
- CVE-2017-8787: The PoDoFo::PdfXRefStreamParserObject::ReadXRefStreamEntry
  function allowed remote attackers to cause a denial of service (heap-based
  buffer over-read) or possibly have unspecified other impact via a crafted PDF
  file (bsc#1037739).
- CVE-2018-5308: Properly validate memcpy arguments in the
  PdfMemoryOutputStream::Write function to prevent remote attackers from causing
  a denial-of-service or possibly have unspecified other impact via a crafted pdf
  file (bsc#1075772).
- CVE-2018-8001: Prevent heap-based buffer over-read vulnerability in
  UnescapeName() that allowed remote attackers to cause a denial-of-service or
  possibly unspecified other impact via a crafted pdf file (bsc#1084894).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-22"/>
	<updated date="2018-08-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023067">SUSE bug 1023067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023069">SUSE bug 1023069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023070">SUSE bug 1023070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023071">SUSE bug 1023071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023380">SUSE bug 1023380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027778">SUSE bug 1027778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027782">SUSE bug 1027782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027787">SUSE bug 1027787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032017">SUSE bug 1032017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032018">SUSE bug 1032018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032019">SUSE bug 1032019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035534">SUSE bug 1035534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035596">SUSE bug 1035596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037739">SUSE bug 1037739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075772">SUSE bug 1075772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084894">SUSE bug 1084894</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5852/">CVE-2017-5852</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5853/">CVE-2017-5853</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5854/">CVE-2017-5854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5855/">CVE-2017-5855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5886/">CVE-2017-5886</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6840/">CVE-2017-6840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6844/">CVE-2017-6844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6847/">CVE-2017-6847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7378/">CVE-2017-7378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7379/">CVE-2017-7379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7380/">CVE-2017-7380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7994/">CVE-2017-7994</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8054/">CVE-2017-8054</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8787/">CVE-2017-8787</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5308/">CVE-2018-5308</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-8001/">CVE-2018-8001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519985" comment="libpodofo0_9_2-0.9.2-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78338" version="1" class="patch">
	<metadata>
		<title>Security update for libreoffice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1050305" ref_url="https://bugzilla.suse.com/1050305" source="BUGZILLA"/>
		<reference ref_id="1088262" ref_url="https://bugzilla.suse.com/1088262" source="BUGZILLA"/>
		<reference ref_id="1088263" ref_url="https://bugzilla.suse.com/1088263" source="BUGZILLA"/>
		<reference ref_id="1091606" ref_url="https://bugzilla.suse.com/1091606" source="BUGZILLA"/>
		<reference ref_id="1091772" ref_url="https://bugzilla.suse.com/1091772" source="BUGZILLA"/>
		<reference ref_id="1092699" ref_url="https://bugzilla.suse.com/1092699" source="BUGZILLA"/>
		<reference ref_id="1094359" ref_url="https://bugzilla.suse.com/1094359" source="BUGZILLA"/>
		<reference ref_id="1095601" ref_url="https://bugzilla.suse.com/1095601" source="BUGZILLA"/>
		<reference ref_id="1095639" ref_url="https://bugzilla.suse.com/1095639" source="BUGZILLA"/>
		<reference ref_id="1096673" ref_url="https://bugzilla.suse.com/1096673" source="BUGZILLA"/>
		<reference ref_id="1098891" ref_url="https://bugzilla.suse.com/1098891" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10583" ref_url="https://www.suse.com/security/cve/CVE-2018-10583/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004494.html" source="SUSE-SU"/>
		<description>


This update for libreoffice to 6.0.5.2 fixes the following issues:

Security issues fixed:

- CVE-2018-10583: An information disclosure vulnerability occurs during
  automatic processing and initiating an SMB connection embedded in a malicious
  file, as demonstrated by xlink:href=file://192.168.0.2/test.jpg within an
  office:document-content element in a .odt XML document. (bsc#1091606)

Non security issues fixed:

- Bugfix: Table borders appear black in LibreOffice (while white in PowerPoint) (bsc#1088262)
- Bugfix: LibreOffice extension 'Language Tool' fails after Tumbleweed update (bsc#1050305)
- Bugfix: libreoffice-gnome can no longer be installed in parallel to libreoffice-gtk3 as there
  is a potential file conflict (bsc#1096673)
- Bugfix: LibreOffice Writer: Text in boxes were not visible (bsc#1094359)
- Use libreoffice-gtk3 if xfce is present (bsc#1092699)
- Various other bug fixes
- Exporting to PPTX results in vertical labels being shown horizontally (bsc#1095639)
- Table in PPTX misplaced and partly blue (bsc#1098891)
- Labels in chart change (from white and other colors) to black when saving as PPTX (bsc#1088263)
- Exporting to PPTX shifts arrow shapes quite a bit bsc#1095601 
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-23"/>
	<updated date="2018-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050305">SUSE bug 1050305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088262">SUSE bug 1088262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088263">SUSE bug 1088263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091606">SUSE bug 1091606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091772">SUSE bug 1091772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092699">SUSE bug 1092699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094359">SUSE bug 1094359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095601">SUSE bug 1095601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095639">SUSE bug 1095639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096673">SUSE bug 1096673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098891">SUSE bug 1098891</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10583/">CVE-2018-10583</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519986" comment="libreoffice-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519987" comment="libreoffice-base-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519988" comment="libreoffice-base-drivers-mysql-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519989" comment="libreoffice-base-drivers-postgresql-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519990" comment="libreoffice-branding-upstream-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519991" comment="libreoffice-calc-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519992" comment="libreoffice-calc-extensions-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519993" comment="libreoffice-draw-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519994" comment="libreoffice-filters-optional-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519995" comment="libreoffice-gnome-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519996" comment="libreoffice-gtk2-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519997" comment="libreoffice-icon-themes-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519998" comment="libreoffice-impress-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519999" comment="libreoffice-l10n-af-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520000" comment="libreoffice-l10n-ar-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520001" comment="libreoffice-l10n-ca-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520002" comment="libreoffice-l10n-cs-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520003" comment="libreoffice-l10n-da-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520004" comment="libreoffice-l10n-de-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520005" comment="libreoffice-l10n-en-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520006" comment="libreoffice-l10n-es-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520007" comment="libreoffice-l10n-fi-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520008" comment="libreoffice-l10n-fr-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520009" comment="libreoffice-l10n-gu-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520010" comment="libreoffice-l10n-hi-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520011" comment="libreoffice-l10n-hu-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520012" comment="libreoffice-l10n-it-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520013" comment="libreoffice-l10n-ja-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520014" comment="libreoffice-l10n-ko-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520015" comment="libreoffice-l10n-nb-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520016" comment="libreoffice-l10n-nl-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520017" comment="libreoffice-l10n-nn-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520018" comment="libreoffice-l10n-pl-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520019" comment="libreoffice-l10n-pt_BR-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520020" comment="libreoffice-l10n-pt_PT-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520021" comment="libreoffice-l10n-ro-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520022" comment="libreoffice-l10n-ru-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520023" comment="libreoffice-l10n-sk-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520024" comment="libreoffice-l10n-sv-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520025" comment="libreoffice-l10n-xh-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520026" comment="libreoffice-l10n-zh_CN-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520027" comment="libreoffice-l10n-zh_TW-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520028" comment="libreoffice-l10n-zu-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520029" comment="libreoffice-mailmerge-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520030" comment="libreoffice-math-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520031" comment="libreoffice-officebean-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520032" comment="libreoffice-pyuno-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520033" comment="libreoffice-writer-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520034" comment="libreoffice-writer-extensions-6.0.5.2-43.38.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78339" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1040662" ref_url="https://bugzilla.suse.com/1040662" source="BUGZILLA"/>
		<reference ref_id="1049423" ref_url="https://bugzilla.suse.com/1049423" source="BUGZILLA"/>
		<reference ref_id="1052448" ref_url="https://bugzilla.suse.com/1052448" source="BUGZILLA"/>
		<reference ref_id="1052449" ref_url="https://bugzilla.suse.com/1052449" source="BUGZILLA"/>
		<reference ref_id="1052466" ref_url="https://bugzilla.suse.com/1052466" source="BUGZILLA"/>
		<reference ref_id="1077732" ref_url="https://bugzilla.suse.com/1077732" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423/" source="CVE"/>
		<reference ref_id="CVE-2017-12374" ref_url="https://www.suse.com/security/cve/CVE-2017-12374/" source="CVE"/>
		<reference ref_id="CVE-2017-12375" ref_url="https://www.suse.com/security/cve/CVE-2017-12375/" source="CVE"/>
		<reference ref_id="CVE-2017-12376" ref_url="https://www.suse.com/security/cve/CVE-2017-12376/" source="CVE"/>
		<reference ref_id="CVE-2017-12377" ref_url="https://www.suse.com/security/cve/CVE-2017-12377/" source="CVE"/>
		<reference ref_id="CVE-2017-12378" ref_url="https://www.suse.com/security/cve/CVE-2017-12378/" source="CVE"/>
		<reference ref_id="CVE-2017-12379" ref_url="https://www.suse.com/security/cve/CVE-2017-12379/" source="CVE"/>
		<reference ref_id="CVE-2017-12380" ref_url="https://www.suse.com/security/cve/CVE-2017-12380/" source="CVE"/>
		<reference ref_id="CVE-2017-6418" ref_url="https://www.suse.com/security/cve/CVE-2017-6418/" source="CVE"/>
		<reference ref_id="CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419/" source="CVE"/>
		<reference ref_id="CVE-2017-6420" ref_url="https://www.suse.com/security/cve/CVE-2017-6420/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00075.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- Update to security release 0.99.3 (bsc#1077732)
  * CVE-2017-12376 (ClamAV Buffer Overflow in handle_pdfname Vulnerability)
  * CVE-2017-12377 (ClamAV Mew Packet Heap Overflow Vulnerability)
  * CVE-2017-12379 (ClamAV Buffer Overflow in messageAddArgument Vulnerability)
    - these vulnerabilities could have allowed an unauthenticated,
      remote attacker to cause a denial of service (DoS) condition
      or potentially execute arbitrary code on an affected device.
  * CVE-2017-12374 (ClamAV use-after-free Vulnerabilities)
  * CVE-2017-12375 (ClamAV Buffer Overflow Vulnerability)
  * CVE-2017-12378 (ClamAV Buffer Over Read Vulnerability)
  * CVE-2017-12380 (ClamAV Null Dereference Vulnerability)
    - these vulnerabilities could have allowed an unauthenticated,
      remote attacker to cause a denial of service (DoS) condition on an affected device.
  * CVE-2017-6420 (bsc#1052448)
    - this vulnerability could have allowed remote attackers to cause a denial of service
      (use-after-free) via a crafted PE file with WWPack compression.
  * CVE-2017-6419 (bsc#1052449)
    - ClamAV could have allowed remote attackers to cause a denial of service
      (heap-based buffer overflow and application crash) or possibly
      have unspecified other impact via a crafted CHM file.
  * CVE-2017-11423 (bsc#1049423)
    - ClamAV could have allowed remote attackers to cause a denial of service
      (stack-based buffer over-read and application crash) via a crafted CAB file.
  * CVE-2017-6418 (bsc#1052466)
    - ClamAV could have allowed remote attackers to cause a denial
      of service (out-of-bounds read) via a crafted e-mail message.
- update upstream keys in the keyring

- provide and obsolete clamav-nodb to trigger it's removal in Leap
  bsc#1040662
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-27"/>
	<updated date="2018-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049423">SUSE bug 1049423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052448">SUSE bug 1052448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052449">SUSE bug 1052449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052466">SUSE bug 1052466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077732">SUSE bug 1077732</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12374/">CVE-2017-12374</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12375/">CVE-2017-12375</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12376/">CVE-2017-12376</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12377/">CVE-2017-12377</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12378/">CVE-2017-12378</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12379/">CVE-2017-12379</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12380/">CVE-2017-12380</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6418/">CVE-2017-6418</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6420/">CVE-2017-6420</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518798" comment="clamav-0.99.3-33.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78340" version="1" class="patch">
	<metadata>
		<title>Security update for gdm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1103737" ref_url="https://bugzilla.suse.com/1103737" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14424" ref_url="https://www.suse.com/security/cve/CVE-2018-14424/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004498.html" source="SUSE-SU"/>
		<description>
This update for gdm fixes the following security issue:

- CVE-2018-14424: The daemon in GDM did not properly unexport display objects
  from its D-Bus interface when they are destroyed, which allowed a local
  attacker to trigger a use-after-free via a specially crafted sequence of D-Bus
  method calls, resulting in a denial of service or potential code execution
  (bsc#1103737).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-27"/>
	<updated date="2018-08-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103737">SUSE bug 1103737</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14424/">CVE-2018-14424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520035" comment="gdm-3.10.0.1-54.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520036" comment="gdm-lang-3.10.0.1-54.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520037" comment="gdmflexiserver-3.10.0.1-54.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520038" comment="libgdm1-3.10.0.1-54.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520039" comment="typelib-1_0-Gdm-1_0-3.10.0.1-54.6.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78341" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1076391" ref_url="https://bugzilla.suse.com/1076391" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5711" ref_url="https://www.suse.com/security/cve/CVE-2018-5711/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003656.html" source="SUSE-SU"/>
		<description>
This update for gd fixes one issues.

This security issue was fixed:

- CVE-2018-5711: Prevent integer signedness error that could have lead to an
  infinite loop via a crafted GIF file allowing for DoS (bsc#1076391)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-29"/>
	<updated date="2018-01-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076391">SUSE bug 1076391</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5711/">CVE-2018-5711</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518799" comment="gd-2.1.0-24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518800" comment="gd-32bit-2.1.0-24.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78342" version="1" class="patch">
	<metadata>
		<title>Security update for spice-gtk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1101295" ref_url="https://bugzilla.suse.com/1101295" source="BUGZILLA"/>
		<reference ref_id="1104448" ref_url="https://bugzilla.suse.com/1104448" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10873" ref_url="https://www.suse.com/security/cve/CVE-2018-10873/" source="CVE"/>
		<reference ref_id="CVE-2018-10893" ref_url="https://www.suse.com/security/cve/CVE-2018-10893/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004527.html" source="SUSE-SU"/>
		<description>
This update for spice-gtk fixes the following issues:

Security issues fixed:

- CVE-2018-10873: Fix potential heap corruption when demarshalling (bsc#1104448)
- CVE-2018-10893: Avoid buffer overflow on image lz checks (bsc#1101295)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-03"/>
	<updated date="2018-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101295">SUSE bug 1101295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104448">SUSE bug 1104448</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10873/">CVE-2018-10873</cve>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-10893/">CVE-2018-10893</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520040" comment="libspice-client-glib-2_0-8-0.33-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520041" comment="libspice-client-glib-helper-0.33-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520042" comment="libspice-client-gtk-3_0-5-0.33-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520043" comment="libspice-controller0-0.33-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520044" comment="typelib-1_0-SpiceClientGlib-2_0-0.33-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520045" comment="typelib-1_0-SpiceClientGtk-3_0-0.33-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78343" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1101295" ref_url="https://bugzilla.suse.com/1101295" source="BUGZILLA"/>
		<reference ref_id="1104448" ref_url="https://bugzilla.suse.com/1104448" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10873" ref_url="https://www.suse.com/security/cve/CVE-2018-10873/" source="CVE"/>
		<reference ref_id="CVE-2018-10893" ref_url="https://www.suse.com/security/cve/CVE-2018-10893/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004528.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

Security issues fixed:

- CVE-2018-10873: Fix potential heap corruption when demarshalling (bsc#1104448)
- CVE-2018-10893: Avoid buffer overflow on image lz checks (bsc#1101295)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-03"/>
	<updated date="2018-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101295">SUSE bug 1101295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104448">SUSE bug 1104448</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10873/">CVE-2018-10873</cve>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-10893/">CVE-2018-10893</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520046" comment="libspice-server1-0.12.8-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78344" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl098 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1087102" ref_url="https://bugzilla.suse.com/1087102" source="BUGZILLA"/>
		<reference ref_id="1089039" ref_url="https://bugzilla.suse.com/1089039" source="BUGZILLA"/>
		<reference ref_id="1097158" ref_url="https://bugzilla.suse.com/1097158" source="BUGZILLA"/>
		<reference ref_id="1097624" ref_url="https://bugzilla.suse.com/1097624" source="BUGZILLA"/>
		<reference ref_id="1098592" ref_url="https://bugzilla.suse.com/1098592" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737/" source="CVE"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004549.html" source="SUSE-SU"/>
		<description>
This update for compat-openssl098 fixes the following security issues:

- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based
  ciphersuite a malicious server could have sent a very large prime value to the
  client. This caused the client to spend an unreasonably long period of time
  generating a key for this prime resulting in a hang until the client has
  finished. This could be exploited in a Denial Of Service attack (bsc#1097158)
- Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)
- CVE-2018-0737: The RSA Key generation algorithm has been shown to be
  vulnerable to a cache timing side channel attack. An attacker with sufficient
  access to mount cache timing attacks during the RSA key generation process
  could have recovered the private key (bsc#1089039)
- CVE-2018-0739: Constructed ASN.1 types with a recursive definition (such as
  can be found in PKCS7) could eventually exceed the stack given malicious input
  with excessive recursion. This could have resulted in DoS (bsc#1087102).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-10"/>
	<updated date="2018-09-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1087102">SUSE bug 1087102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089039">SUSE bug 1089039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097624">SUSE bug 1097624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098592">SUSE bug 1098592</bugzilla>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520047" comment="libopenssl0_9_8-0.9.8j-106.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520048" comment="libopenssl0_9_8-32bit-0.9.8j-106.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78345" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1086001" ref_url="https://bugzilla.suse.com/1086001" source="BUGZILLA"/>
		<reference ref_id="1088004" ref_url="https://bugzilla.suse.com/1088004" source="BUGZILLA"/>
		<reference ref_id="1088009" ref_url="https://bugzilla.suse.com/1088009" source="BUGZILLA"/>
		<reference ref_id="1107030" ref_url="https://bugzilla.suse.com/1107030" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1060" ref_url="https://www.suse.com/security/cve/CVE-2018-1060/" source="CVE"/>
		<reference ref_id="CVE-2018-1061" ref_url="https://www.suse.com/security/cve/CVE-2018-1061/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004556.html" source="SUSE-SU"/>
		<description>
This update for python3 provides the following fixes:

These security issues were fixed:

- CVE-2018-1061: Prevent catastrophic backtracking in the difflib.IS_LINE_JUNK
  method. An attacker could have used this flaw to cause denial of service
  (bsc#1088004).
- CVE-2018-1060: Prevent catastrophic backtracking in pop3lib's apop() method.
  An attacker could have used this flaw to cause denial of service (bsc#1088009).

These non-security issues were fixed:

- Sort files and directories when creating tarfile archives so that they are created in a
  more predictable way. (bsc#1086001)
- Add -fwrapv to OPTS (bsc#1107030)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-12"/>
	<updated date="2018-09-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086001">SUSE bug 1086001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088004">SUSE bug 1088004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088009">SUSE bug 1088009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107030">SUSE bug 1107030</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1060/">CVE-2018-1060</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1061/">CVE-2018-1061</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520049" comment="libpython3_4m1_0-3.4.6-25.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520050" comment="python3-3.4.6-25.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520051" comment="python3-base-3.4.6-25.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520052" comment="python3-curses-3.4.6-25.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78346" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1089533" ref_url="https://bugzilla.suse.com/1089533" source="BUGZILLA"/>
		<reference ref_id="1106019" ref_url="https://bugzilla.suse.com/1106019" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14618" ref_url="https://www.suse.com/security/cve/CVE-2018-14618/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004561.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

This security issue was fixed:

- CVE-2018-14618: Prevent integer overflow in the NTLM authentication code (bsc#1106019)

This non-security issue was fixed:

- Fixed erroneous debug message when paired with OpenSSL (bsc#1089533)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-14"/>
	<updated date="2018-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089533">SUSE bug 1089533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106019">SUSE bug 1106019</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14618/">CVE-2018-14618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520053" comment="curl-7.37.0-37.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520054" comment="libcurl4-7.37.0-37.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520055" comment="libcurl4-32bit-7.37.0-37.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78347" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1015342" ref_url="https://bugzilla.suse.com/1015342" source="BUGZILLA"/>
		<reference ref_id="1015343" ref_url="https://bugzilla.suse.com/1015343" source="BUGZILLA"/>
		<reference ref_id="1017967" ref_url="https://bugzilla.suse.com/1017967" source="BUGZILLA"/>
		<reference ref_id="1019695" ref_url="https://bugzilla.suse.com/1019695" source="BUGZILLA"/>
		<reference ref_id="1019699" ref_url="https://bugzilla.suse.com/1019699" source="BUGZILLA"/>
		<reference ref_id="1020412" ref_url="https://bugzilla.suse.com/1020412" source="BUGZILLA"/>
		<reference ref_id="1021121" ref_url="https://bugzilla.suse.com/1021121" source="BUGZILLA"/>
		<reference ref_id="1022604" ref_url="https://bugzilla.suse.com/1022604" source="BUGZILLA"/>
		<reference ref_id="1024361" ref_url="https://bugzilla.suse.com/1024361" source="BUGZILLA"/>
		<reference ref_id="1024365" ref_url="https://bugzilla.suse.com/1024365" source="BUGZILLA"/>
		<reference ref_id="1024376" ref_url="https://bugzilla.suse.com/1024376" source="BUGZILLA"/>
		<reference ref_id="1027968" ref_url="https://bugzilla.suse.com/1027968" source="BUGZILLA"/>
		<reference ref_id="1030552" ref_url="https://bugzilla.suse.com/1030552" source="BUGZILLA"/>
		<reference ref_id="1031492" ref_url="https://bugzilla.suse.com/1031492" source="BUGZILLA"/>
		<reference ref_id="1033962" ref_url="https://bugzilla.suse.com/1033962" source="BUGZILLA"/>
		<reference ref_id="1042286" ref_url="https://bugzilla.suse.com/1042286" source="BUGZILLA"/>
		<reference ref_id="1048317" ref_url="https://bugzilla.suse.com/1048317" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1053685" ref_url="https://bugzilla.suse.com/1053685" source="BUGZILLA"/>
		<reference ref_id="1055014" ref_url="https://bugzilla.suse.com/1055014" source="BUGZILLA"/>
		<reference ref_id="1056596" ref_url="https://bugzilla.suse.com/1056596" source="BUGZILLA"/>
		<reference ref_id="1062604" ref_url="https://bugzilla.suse.com/1062604" source="BUGZILLA"/>
		<reference ref_id="1063646" ref_url="https://bugzilla.suse.com/1063646" source="BUGZILLA"/>
		<reference ref_id="1064232" ref_url="https://bugzilla.suse.com/1064232" source="BUGZILLA"/>
		<reference ref_id="1065364" ref_url="https://bugzilla.suse.com/1065364" source="BUGZILLA"/>
		<reference ref_id="1066223" ref_url="https://bugzilla.suse.com/1066223" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068075" ref_url="https://bugzilla.suse.com/1068075" source="BUGZILLA"/>
		<reference ref_id="1069138" ref_url="https://bugzilla.suse.com/1069138" source="BUGZILLA"/>
		<reference ref_id="1078921" ref_url="https://bugzilla.suse.com/1078921" source="BUGZILLA"/>
		<reference ref_id="1080157" ref_url="https://bugzilla.suse.com/1080157" source="BUGZILLA"/>
		<reference ref_id="1083663" ref_url="https://bugzilla.suse.com/1083663" source="BUGZILLA"/>
		<reference ref_id="1085042" ref_url="https://bugzilla.suse.com/1085042" source="BUGZILLA"/>
		<reference ref_id="1085536" ref_url="https://bugzilla.suse.com/1085536" source="BUGZILLA"/>
		<reference ref_id="1085539" ref_url="https://bugzilla.suse.com/1085539" source="BUGZILLA"/>
		<reference ref_id="1086457" ref_url="https://bugzilla.suse.com/1086457" source="BUGZILLA"/>
		<reference ref_id="1087092" ref_url="https://bugzilla.suse.com/1087092" source="BUGZILLA"/>
		<reference ref_id="1089066" ref_url="https://bugzilla.suse.com/1089066" source="BUGZILLA"/>
		<reference ref_id="1090888" ref_url="https://bugzilla.suse.com/1090888" source="BUGZILLA"/>
		<reference ref_id="1091171" ref_url="https://bugzilla.suse.com/1091171" source="BUGZILLA"/>
		<reference ref_id="1091860" ref_url="https://bugzilla.suse.com/1091860" source="BUGZILLA"/>
		<reference ref_id="1096254" ref_url="https://bugzilla.suse.com/1096254" source="BUGZILLA"/>
		<reference ref_id="1096748" ref_url="https://bugzilla.suse.com/1096748" source="BUGZILLA"/>
		<reference ref_id="1097105" ref_url="https://bugzilla.suse.com/1097105" source="BUGZILLA"/>
		<reference ref_id="1098253" ref_url="https://bugzilla.suse.com/1098253" source="BUGZILLA"/>
		<reference ref_id="1098822" ref_url="https://bugzilla.suse.com/1098822" source="BUGZILLA"/>
		<reference ref_id="1099597" ref_url="https://bugzilla.suse.com/1099597" source="BUGZILLA"/>
		<reference ref_id="1099810" ref_url="https://bugzilla.suse.com/1099810" source="BUGZILLA"/>
		<reference ref_id="1099811" ref_url="https://bugzilla.suse.com/1099811" source="BUGZILLA"/>
		<reference ref_id="1099813" ref_url="https://bugzilla.suse.com/1099813" source="BUGZILLA"/>
		<reference ref_id="1099832" ref_url="https://bugzilla.suse.com/1099832" source="BUGZILLA"/>
		<reference ref_id="1099844" ref_url="https://bugzilla.suse.com/1099844" source="BUGZILLA"/>
		<reference ref_id="1099845" ref_url="https://bugzilla.suse.com/1099845" source="BUGZILLA"/>
		<reference ref_id="1099846" ref_url="https://bugzilla.suse.com/1099846" source="BUGZILLA"/>
		<reference ref_id="1099849" ref_url="https://bugzilla.suse.com/1099849" source="BUGZILLA"/>
		<reference ref_id="1099863" ref_url="https://bugzilla.suse.com/1099863" source="BUGZILLA"/>
		<reference ref_id="1099864" ref_url="https://bugzilla.suse.com/1099864" source="BUGZILLA"/>
		<reference ref_id="1099922" ref_url="https://bugzilla.suse.com/1099922" source="BUGZILLA"/>
		<reference ref_id="1099999" ref_url="https://bugzilla.suse.com/1099999" source="BUGZILLA"/>
		<reference ref_id="1100000" ref_url="https://bugzilla.suse.com/1100000" source="BUGZILLA"/>
		<reference ref_id="1100001" ref_url="https://bugzilla.suse.com/1100001" source="BUGZILLA"/>
		<reference ref_id="1100132" ref_url="https://bugzilla.suse.com/1100132" source="BUGZILLA"/>
		<reference ref_id="1101822" ref_url="https://bugzilla.suse.com/1101822" source="BUGZILLA"/>
		<reference ref_id="1101841" ref_url="https://bugzilla.suse.com/1101841" source="BUGZILLA"/>
		<reference ref_id="1102346" ref_url="https://bugzilla.suse.com/1102346" source="BUGZILLA"/>
		<reference ref_id="1102486" ref_url="https://bugzilla.suse.com/1102486" source="BUGZILLA"/>
		<reference ref_id="1102517" ref_url="https://bugzilla.suse.com/1102517" source="BUGZILLA"/>
		<reference ref_id="1102715" ref_url="https://bugzilla.suse.com/1102715" source="BUGZILLA"/>
		<reference ref_id="1102797" ref_url="https://bugzilla.suse.com/1102797" source="BUGZILLA"/>
		<reference ref_id="1103269" ref_url="https://bugzilla.suse.com/1103269" source="BUGZILLA"/>
		<reference ref_id="1103445" ref_url="https://bugzilla.suse.com/1103445" source="BUGZILLA"/>
		<reference ref_id="1103717" ref_url="https://bugzilla.suse.com/1103717" source="BUGZILLA"/>
		<reference ref_id="1104319" ref_url="https://bugzilla.suse.com/1104319" source="BUGZILLA"/>
		<reference ref_id="1104485" ref_url="https://bugzilla.suse.com/1104485" source="BUGZILLA"/>
		<reference ref_id="1104494" ref_url="https://bugzilla.suse.com/1104494" source="BUGZILLA"/>
		<reference ref_id="1104495" ref_url="https://bugzilla.suse.com/1104495" source="BUGZILLA"/>
		<reference ref_id="1104683" ref_url="https://bugzilla.suse.com/1104683" source="BUGZILLA"/>
		<reference ref_id="1104897" ref_url="https://bugzilla.suse.com/1104897" source="BUGZILLA"/>
		<reference ref_id="1105271" ref_url="https://bugzilla.suse.com/1105271" source="BUGZILLA"/>
		<reference ref_id="1105292" ref_url="https://bugzilla.suse.com/1105292" source="BUGZILLA"/>
		<reference ref_id="1105322" ref_url="https://bugzilla.suse.com/1105322" source="BUGZILLA"/>
		<reference ref_id="1105323" ref_url="https://bugzilla.suse.com/1105323" source="BUGZILLA"/>
		<reference ref_id="1105392" ref_url="https://bugzilla.suse.com/1105392" source="BUGZILLA"/>
		<reference ref_id="1105396" ref_url="https://bugzilla.suse.com/1105396" source="BUGZILLA"/>
		<reference ref_id="1105524" ref_url="https://bugzilla.suse.com/1105524" source="BUGZILLA"/>
		<reference ref_id="1105536" ref_url="https://bugzilla.suse.com/1105536" source="BUGZILLA"/>
		<reference ref_id="1105769" ref_url="https://bugzilla.suse.com/1105769" source="BUGZILLA"/>
		<reference ref_id="1106016" ref_url="https://bugzilla.suse.com/1106016" source="BUGZILLA"/>
		<reference ref_id="1106105" ref_url="https://bugzilla.suse.com/1106105" source="BUGZILLA"/>
		<reference ref_id="1106185" ref_url="https://bugzilla.suse.com/1106185" source="BUGZILLA"/>
		<reference ref_id="1106229" ref_url="https://bugzilla.suse.com/1106229" source="BUGZILLA"/>
		<reference ref_id="1106271" ref_url="https://bugzilla.suse.com/1106271" source="BUGZILLA"/>
		<reference ref_id="1106275" ref_url="https://bugzilla.suse.com/1106275" source="BUGZILLA"/>
		<reference ref_id="1106276" ref_url="https://bugzilla.suse.com/1106276" source="BUGZILLA"/>
		<reference ref_id="1106278" ref_url="https://bugzilla.suse.com/1106278" source="BUGZILLA"/>
		<reference ref_id="1106281" ref_url="https://bugzilla.suse.com/1106281" source="BUGZILLA"/>
		<reference ref_id="1106283" ref_url="https://bugzilla.suse.com/1106283" source="BUGZILLA"/>
		<reference ref_id="1106369" ref_url="https://bugzilla.suse.com/1106369" source="BUGZILLA"/>
		<reference ref_id="1106509" ref_url="https://bugzilla.suse.com/1106509" source="BUGZILLA"/>
		<reference ref_id="1106511" ref_url="https://bugzilla.suse.com/1106511" source="BUGZILLA"/>
		<reference ref_id="1106697" ref_url="https://bugzilla.suse.com/1106697" source="BUGZILLA"/>
		<reference ref_id="1106929" ref_url="https://bugzilla.suse.com/1106929" source="BUGZILLA"/>
		<reference ref_id="1106934" ref_url="https://bugzilla.suse.com/1106934" source="BUGZILLA"/>
		<reference ref_id="1106995" ref_url="https://bugzilla.suse.com/1106995" source="BUGZILLA"/>
		<reference ref_id="1107060" ref_url="https://bugzilla.suse.com/1107060" source="BUGZILLA"/>
		<reference ref_id="1107078" ref_url="https://bugzilla.suse.com/1107078" source="BUGZILLA"/>
		<reference ref_id="1107319" ref_url="https://bugzilla.suse.com/1107319" source="BUGZILLA"/>
		<reference ref_id="1107320" ref_url="https://bugzilla.suse.com/1107320" source="BUGZILLA"/>
		<reference ref_id="1107689" ref_url="https://bugzilla.suse.com/1107689" source="BUGZILLA"/>
		<reference ref_id="1107735" ref_url="https://bugzilla.suse.com/1107735" source="BUGZILLA"/>
		<reference ref_id="1107966" ref_url="https://bugzilla.suse.com/1107966" source="BUGZILLA"/>
		<reference ref_id="963575" ref_url="https://bugzilla.suse.com/963575" source="BUGZILLA"/>
		<reference ref_id="966170" ref_url="https://bugzilla.suse.com/966170" source="BUGZILLA"/>
		<reference ref_id="966172" ref_url="https://bugzilla.suse.com/966172" source="BUGZILLA"/>
		<reference ref_id="969470" ref_url="https://bugzilla.suse.com/969470" source="BUGZILLA"/>
		<reference ref_id="969476" ref_url="https://bugzilla.suse.com/969476" source="BUGZILLA"/>
		<reference ref_id="969477" ref_url="https://bugzilla.suse.com/969477" source="BUGZILLA"/>
		<reference ref_id="970506" ref_url="https://bugzilla.suse.com/970506" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10876" ref_url="https://www.suse.com/security/cve/CVE-2018-10876/" source="CVE"/>
		<reference ref_id="CVE-2018-10877" ref_url="https://www.suse.com/security/cve/CVE-2018-10877/" source="CVE"/>
		<reference ref_id="CVE-2018-10878" ref_url="https://www.suse.com/security/cve/CVE-2018-10878/" source="CVE"/>
		<reference ref_id="CVE-2018-10879" ref_url="https://www.suse.com/security/cve/CVE-2018-10879/" source="CVE"/>
		<reference ref_id="CVE-2018-10880" ref_url="https://www.suse.com/security/cve/CVE-2018-10880/" source="CVE"/>
		<reference ref_id="CVE-2018-10881" ref_url="https://www.suse.com/security/cve/CVE-2018-10881/" source="CVE"/>
		<reference ref_id="CVE-2018-10882" ref_url="https://www.suse.com/security/cve/CVE-2018-10882/" source="CVE"/>
		<reference ref_id="CVE-2018-10883" ref_url="https://www.suse.com/security/cve/CVE-2018-10883/" source="CVE"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-10938" ref_url="https://www.suse.com/security/cve/CVE-2018-10938/" source="CVE"/>
		<reference ref_id="CVE-2018-1128" ref_url="https://www.suse.com/security/cve/CVE-2018-1128/" source="CVE"/>
		<reference ref_id="CVE-2018-1129" ref_url="https://www.suse.com/security/cve/CVE-2018-1129/" source="CVE"/>
		<reference ref_id="CVE-2018-12896" ref_url="https://www.suse.com/security/cve/CVE-2018-12896/" source="CVE"/>
		<reference ref_id="CVE-2018-13093" ref_url="https://www.suse.com/security/cve/CVE-2018-13093/" source="CVE"/>
		<reference ref_id="CVE-2018-13094" ref_url="https://www.suse.com/security/cve/CVE-2018-13094/" source="CVE"/>
		<reference ref_id="CVE-2018-13095" ref_url="https://www.suse.com/security/cve/CVE-2018-13095/" source="CVE"/>
		<reference ref_id="CVE-2018-15572" ref_url="https://www.suse.com/security/cve/CVE-2018-15572/" source="CVE"/>
		<reference ref_id="CVE-2018-16658" ref_url="https://www.suse.com/security/cve/CVE-2018-16658/" source="CVE"/>
		<reference ref_id="CVE-2018-6554" ref_url="https://www.suse.com/security/cve/CVE-2018-6554/" source="CVE"/>
		<reference ref_id="CVE-2018-6555" ref_url="https://www.suse.com/security/cve/CVE-2018-6555/" source="CVE"/>
		<reference ref_id="CVE-2018-9363" ref_url="https://www.suse.com/security/cve/CVE-2018-9363/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.155 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-13093: Prevent NULL pointer dereference and panic in lookup_slow()
  on a NULL inode-&gt;i_ops pointer when doing pathwalks on a corrupted xfs image.
  This occured because of a lack of proper validation that cached inodes are free
  during allocation (bnc#1100001).
- CVE-2018-13095: Prevent denial of service (memory corruption and BUG) that
  could have occurred for a corrupted xfs image upon encountering an inode that
  is in extent format, but has more extents than fit in the inode fork
  (bnc#1099999).
- CVE-2018-13094: Prevent OOPS that may have occured for a corrupted xfs image
  after xfs_da_shrink_inode() is called with a NULL bp (bnc#1100000).
- CVE-2018-12896: Prevent integer overflow in the POSIX timer code that was
  caused by the way the overrun accounting works. Depending on interval and
  expiry time values, the overrun can be larger than INT_MAX, but the accounting
  is int based. This basically made the accounting values, which are visible to
  user space via timer_getoverrun(2) and siginfo::si_overrun, random. This
  allowed a local user to cause a denial of service (signed integer overflow) via
  crafted mmap, futex, timer_create, and timer_settime system calls
  (bnc#1099922).
- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that
  could have been used by local attackers to read kernel memory (bnc#1107689).
- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a
  denial of service (ias_object use-after-free and system crash) or possibly have
  unspecified other impact via an AF_IRDA socket (bnc#1106511).
- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed
  local users to cause a denial of service (memory consumption) by repeatedly
  binding an AF_IRDA socket (bnc#1106509).
- CVE-2018-1129: A flaw was found in the way signature calculation was handled
  by cephx authentication protocol. An attacker having access to ceph cluster
  network who is able to alter the message payload was able to bypass signature
  checks done by cephx protocol (bnc#1096748).
- CVE-2018-1128: It was found that cephx authentication protocol did not verify
  ceph clients correctly and was vulnerable to replay attack. Any attacker having
  access to ceph cluster network who is able to sniff packets on network can use
  this vulnerability to authenticate with ceph service and perform actions
  allowed by ceph service (bnc#1096748).
- CVE-2018-10938: A crafted network packet sent remotely by an attacker forced
  the kernel to enter an infinite loop in the cipso_v4_optptr() function leading
  to a denial-of-service (bnc#1106016).
- CVE-2018-15572: The spectre_v2_select_mitigation function did not always fill
  RSB upon a context switch, which made it easier for attackers to conduct
  userspace-userspace spectreRSB attacks (bnc#1102517).
- CVE-2018-10902: Protect against concurrent access to prevent double realloc
  (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A
  malicious local attacker could have used this for privilege escalation
  (bnc#1105322 1105323).
- CVE-2018-9363: Prevent buffer overflow in hidp_process_report (bsc#1105292)
- CVE-2018-10883: A local user could have caused an out-of-bounds write in
  jbd2_journal_dirty_metadata(), a denial of service, and a system crash by
  mounting and operating on a crafted ext4 filesystem image (bsc#1099863).
- CVE-2018-10879: A local user could have caused a use-after-free in
  ext4_xattr_set_entry function and a denial of service or unspecified other
  impact by renaming a file in a crafted ext4 filesystem image (bsc#1099844).
- CVE-2018-10878: A local user could have caused an out-of-bounds write and a
  denial of service or unspecified other impact by mounting and operating a
  crafted ext4 filesystem image (bsc#1099813).
- CVE-2018-10876: A use-after-free was possible in ext4_ext_remove_space()
  function when mounting and operating a crafted ext4 image (bsc#1099811).
- CVE-2018-10877: Prevent out-of-bound access in the ext4_ext_drop_refs()
  function when operating on a crafted ext4 filesystem image (bsc#1099846).
- CVE-2018-10881: A local user could have caused an out-of-bound access in
  ext4_get_group_info function, a denial of service, and a system crash by
  mounting and operating on a crafted ext4 filesystem image (bsc#1099864).
- CVE-2018-10882: A local user could have caused an out-of-bound write, a
  denial of service, and a system crash by unmounting a crafted ext4 filesystem
  image (bsc#1099849).
- CVE-2018-10880: Prevent stack-out-of-bounds write in the ext4 filesystem code
  when mounting and writing to a crafted ext4 image in ext4_update_inline_data().
  An attacker could have used this to cause a system crash and a denial of
  service (bsc#1099845).

The following non-security bugs were fixed:

- 9p/net: Fix zero-copy path in the 9p virtio transport (bnc#1012382).
- 9p/virtio: fix off-by-one error in sg list bounds check (bnc#1012382).
- 9p: fix multiple NULL-pointer-dereferences (bnc#1012382).
- ACPI / LPSS: Add missing prv_offset setting for byt/cht PWM devices (bnc#1012382).
- ACPI / PCI: Bail early in acpi_pci_add_bus() if there is no ACPI handle (bnc#1012382).
- ACPI / PM: save NVS memory for ASUS 1025C laptop (bnc#1012382).
- ACPI: save NVS memory for Lenovo G50-45 (bnc#1012382).
- ALSA: cs5535audio: Fix invalid endian conversion (bnc#1012382).
- ALSA: emu10k1: Rate-limit error messages about page errors (bnc#1012382).
- ALSA: emu10k1: add error handling for snd_ctl_add (bnc#1012382).
- ALSA: fm801: add error handling for snd_ctl_add (bnc#1012382).
- ALSA: hda - Sleep for 10ms after entering D3 on Conexant codecs (bnc#1012382).
- ALSA: hda - Turn CX8200 into D3 as well upon reboot (bnc#1012382).
- ALSA: hda/ca0132: fix build failure when a local macro is defined (bnc#1012382).
- ALSA: hda: Correct Asrock B85M-ITX power_save blacklist entry (bnc#1012382).
- ALSA: memalloc: Do not exceed over the requested size (bnc#1012382).
- ALSA: rawmidi: Change resized buffers atomically (bnc#1012382).
- ALSA: snd-aoa: add of_node_put() in error path (bsc#1099810).
- ALSA: usb-audio: Apply rate limit to warning messages in URB complete callback (bnc#1012382).
- ALSA: virmidi: Fix too long output trigger loop (bnc#1012382).
- ALSA: vx222: Fix invalid endian conversions (bnc#1012382).
- ALSA: vxpocket: Fix invalid endian conversions (bnc#1012382).
- ARC: Enable machine_desc-&gt;init_per_cpu for !CONFIG_SMP (bnc#1012382).
- ARC: Explicitly add -mmedium-calls to CFLAGS (bnc#1012382).
- ARC: Fix CONFIG_SWAP (bnc#1012382).
- ARC: mm: allow mprotect to make stack mappings executable (bnc#1012382).
- ARM: 8780/1: ftrace: Only set kernel memory back to read-only after boot (bnc#1012382).
- ARM: dts: Cygnus: Fix I2C controller interrupt type (bnc#1012382).
- ARM: dts: am3517.dtsi: Disable reference to OMAP3 OTG controller (bnc#1012382).
- ARM: dts: am437x: make edt-ft5x06 a wakeup source (bnc#1012382).
- ARM: dts: da850: Fix interrups property for gpio (bnc#1012382).
- ARM: dts: imx6sx: fix irq for pcie bridge (bnc#1012382).
- ARM: fix put_user() for gcc-8 (bnc#1012382).
- ARM: imx_v4_v5_defconfig: Select ULPI support (bnc#1012382).
- ARM: imx_v6_v7_defconfig: Select ULPI support (bnc#1012382).
- ARM: pxa: irq: fix handling of ICMR registers in suspend/resume (bnc#1012382).
- ARM: tegra: Fix Tegra30 Cardhu PCA954x reset (bnc#1012382).
- ASoC: Intel: cht_bsw_max98090: remove useless code, align with ChromeOS driver.
- ASoC: Intel: cht_bsw_max98090_ti: Fix jack initialization (bnc#1012382).
- ASoC: dpcm: do not merge format from invalid codec dai (bnc#1012382).
- ASoC: dpcm: fix BE dai not hw_free and shutdown (bnc#1012382).
- ASoC: pxa: Fix module autoload for platform drivers (bnc#1012382).
- ASoC: sirf: Fix potential NULL pointer dereference (bnc#1012382).
- Add reference to bsc#1091171 (bnc#1012382; bsc#1091171).
- Bluetooth: avoid killing an already killed socket (bnc#1012382).
- Bluetooth: btusb: Add a new Realtek 8723DE ID 2ff8:b011 (bnc#1012382).
- Bluetooth: btusb: Remove Yoga 920 from the btusb_needs_reset_resume_table (bsc#1087092).
- Bluetooth: btusb: Use DMI matching for QCA reset_resume quirking (bsc#1087092).
- Bluetooth: hci_qca: Fix 'Sleep inside atomic section' warning (bnc#1012382).
- Documentation/spec_ctrl: Do some minor cleanups (bnc#1012382).
- HID: hid-plantronics: Re-resend Update to map button for PTT products (bnc#1012382).
- HID: i2c-hid: check if device is there before really probing (bnc#1012382).
- HID: wacom: Correct touch maximum XY of 2nd-gen Intuos (bnc#1012382).
- IB/core: Make testing MR flags for writability a static inline function (bnc#1012382).
- IB/core: Remove duplicate declaration of gid_cache_wq (bsc#1056596).
- IB/iser: Do not reduce max_sectors (bsc#1063646).
- IB/mlx4: Fix an error handling path in 'mlx4_ib_rereg_user_mr()'.
- IB/mlx4: Mark user MR as writable if actual virtual memory is writable (bnc#1012382).
- IB/mlx5: Fetch soft WQE's on fatal error state (bsc#1015342 bsc#1015343).
- IB/mlx5: Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1015342 bsc#1015343).
- IB/ocrdma: fix out of bounds access to local buffer (bnc#1012382).
- Input: elan_i2c - add ACPI ID for lenovo ideapad 330 (bnc#1012382).
- Input: elan_i2c - add another ACPI ID for Lenovo Ideapad 330-15AST (bnc#1012382).
- Input: i8042 - add Lenovo LaVie Z to the i8042 reset list (bnc#1012382).
- KVM/Eventfd: Avoid crash when assign and deassign specific eventfd in parallel (bnc#1012382).
- KVM: MMU: always terminate page walks at level 1 (bsc#1062604).
- KVM: MMU: simplify last_pte_bitmap (bsc#1062604).
- KVM: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).
- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).
- KVM: arm/arm64: Skip updating PMD entry if no change (bnc#1012382).
- KVM: arm/arm64: Skip updating PTE entry if no change (bnc#1012382).
- KVM: irqfd: fix race between EPOLLHUP and irq_bypass_register_consumer (bnc#1012382).
- KVM: nVMX: update last_nonleaf_level when initializing nested EPT (bsc#1062604).
- MIPS: Correct the 64-bit DSP accumulator register size (bnc#1012382).
- MIPS: Fix off-by-one in pci_resource_to_user() (bnc#1012382).
- MIPS: ath79: fix register address in ath79_ddr_wb_flush() (bnc#1012382).
- MIPS: lib: Provide MIPS64r6 __multi3() for GCC lower than &lt; 7 (bnc#1012382).
- NET: stmmac: align DMA stuff to largest cache line length (bnc#1012382).
- PCI: Prevent sysfs disable of device while driver is attached (bnc#1012382).
- PCI: Skip MPS logic for Virtual Functions (VFs) (bnc#1012382).
- PCI: hotplug: Do not leak pci_slot on registration failure (bnc#1012382).
- PCI: pciehp: Fix use-after-free on unplug (bnc#1012382).
- PCI: pciehp: Request control of native hotplug only if supported (bnc#1012382).
- PM / sleep: wakeup: Fix build error caused by missing SRCU support (bnc#1012382).
- RDMA/i40iw: Avoid panic when objects are being created and destroyed (bsc#969476 bsc#969477).
- RDMA/i40iw: Avoid panic when reading back the IRQ affinity hint (bsc#969476 bsc#969477).
- RDMA/i40iw: Avoid reference leaks when processing the AEQ (bsc#969476 bsc#969477).
- RDMA/i40w: Hold read semaphore while looking after VMA (bsc#1024376).
- RDMA/mad: Convert BUG_ONs to error flows (bnc#1012382).
- RDMA/mlx5: Use proper spec flow label type (bsc#1015342 bsc#1015343).
- Revert 'MIPS: BCM47XX: Enable 74K Core ExternalSync for PCIe erratum' (bnc#1012382).
- Revert 'UBIFS: Fix potential integer overflow in allocation' (bnc#1012382).
- Revert 'f2fs: handle dirty segments inside refresh_sit_entry' (bsc#1106281).
- Revert 'mm: page_alloc: skip over regions of invalid pfns where possible' (bnc#1107078).
- Revert 'block-cancel-workqueue-entries-on-blk_mq_freeze_queue' (bsc#1103717).
- Smack: Mark inode instant in smack_task_to_inode (bnc#1012382).
- USB: musb: fix external abort on suspend (bsc#1085536).
- USB: option: add support for DW5821e (bnc#1012382).
- USB: serial: metro-usb: stop I/O after failed open (bsc#1085539).
- USB: serial: sierra: fix potential deadlock at close (bnc#1012382).
- Workaround kABI breakage by __must_check drop of strscpy() (bsc#1107319).
- afs: Fix directory permissions check (bsc#1106283).
- arc: fix build errors in arc/include/asm/delay.h (bnc#1012382).
- arc: fix type warnings in arc/mm/cache.c (bnc#1012382).
- arm64: make secondary_start_kernel() notrace (bnc#1012382).
- arm64: mm: check for upper PAGE_SHIFT bits in pfn_valid() (bnc#1012382).
- ath: Add regulatory mapping for APL13_WORLD (bnc#1012382).
- ath: Add regulatory mapping for APL2_FCCA (bnc#1012382).
- ath: Add regulatory mapping for Bahamas (bnc#1012382).
- ath: Add regulatory mapping for Bermuda (bnc#1012382).
- ath: Add regulatory mapping for ETSI8_WORLD (bnc#1012382).
- ath: Add regulatory mapping for FCC3_ETSIC (bnc#1012382).
- ath: Add regulatory mapping for Serbia (bnc#1012382).
- ath: Add regulatory mapping for Tanzania (bnc#1012382).
- ath: Add regulatory mapping for Uganda (bnc#1012382).
- atl1c: reserve min skb headroom (bnc#1012382).
- atm: Preserve value of skb-&gt;truesize when accounting to vcc (bsc#1089066).
- audit: allow not equal op for audit by executable (bnc#1012382).
- backlight: as3711_bl: Fix Device Tree node leaks (bsc#1106929).
- backlight: lm3630a: Bump REG_MAX value to 0x50 instead of 0x1F (bsc#1106929).
- bcache: avoid unncessary cache prefetch bch_btree_node_get() (bsc#1064232).
- bcache: calculate the number of incremental GC nodes according to the total of btree nodes (bsc#1064232).
- bcache: display rate debug parameters to 0 when writeback is not running (bsc#1064232).
- bcache: do not check return value of debugfs_create_dir() (bsc#1064232).
- bcache: finish incremental GC (bsc#1064232).
- bcache: fix I/O significant decline while backend devices registering (bsc#1064232).
- bcache: fix error setting writeback_rate through sysfs interface (bsc#1064232).
- bcache: free heap cache_set-&gt;flush_btree in bch_journal_free (bsc#1064232).
- bcache: make the pr_err statement used for ENOENT only in sysfs_attatch section (bsc#1064232).
- bcache: release dc-&gt;writeback_lock properly in bch_writeback_thread() (bsc#1064232).
- bcache: set max writeback rate when I/O request is idle (bsc#1064232).
- bcache: simplify the calculation of the total amount of flash dirty data (bsc#1064232).
- be2net: remove unused old custom busy-poll fields (bsc#1021121 ).
- blkdev: __blkdev_direct_IO_simple: fix leak in error case (bsc#1083663).
- block: bio_iov_iter_get_pages: fix size of last iovec (bsc#1083663).
- block: bio_iov_iter_get_pages: pin more pages for multi-segment IOs (bsc#1083663).
- block: do not use interruptible wait anywhere (bnc#1012382).
- bnx2x: Fix invalid memory access in rss hash config path (bnc#1012382).
- bnx2x: Fix receiving tx-timeout in error or recovery state (bnc#1012382).
- bnxt_en: Always set output parameters in bnxt_get_max_rings() (bsc#963575).
- bnxt_en: Fix for system hang if request_irq fails (bnc#1012382).
- bnxt_en: Fix inconsistent BNXT_FLAG_AGG_RINGS logic (bsc#1020412 ).
- bpf: fix references to free_bpf_prog_info() in comments (bnc#1012382).
- brcmfmac: Add support for bcm43364 wireless chipset (bnc#1012382).
- brcmfmac: stop watchdog before detach and free everything (bnc#1012382).
- bridge: Propagate vlan add failure to user (bnc#1012382).
- btrfs: Do not remove block group still has pinned down bytes (bsc#1086457).
- btrfs: add barriers to btrfs_sync_log before log_commit_wait wakeups (bnc#1012382).
- btrfs: do not leak ret from do_chunk_alloc (bnc#1012382).
- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bnc#1012382).
- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf.
- btrfs: round down size diff when shrinking/growing device (bsc#1097105).
- can: ems_usb: Fix memory leak on ems_usb_disconnect() (bnc#1012382).
- can: mpc5xxx_can: check of_iomap return before use (bnc#1012382).
- can: xilinx_can: fix RX loop if RXNEMP is asserted without RXOK (bnc#1012382).
- can: xilinx_can: fix RX overflow interrupt not being enabled (bnc#1012382).
- can: xilinx_can: fix device dropping off bus on RX overrun (bnc#1012382).
- can: xilinx_can: fix incorrect clear of non-processed interrupts (bnc#1012382).
- can: xilinx_can: fix recovery from error states not being propagated (bnc#1012382).
- can: xilinx_can: keep only 1-2 frames in TX FIFO to fix TX accounting (bnc#1012382).
- cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status (bnc#1012382).
- ceph: fix incorrect use of strncpy (bsc#1107319).
- ceph: return errors from posix_acl_equiv_mode() correctly (bsc#1107320).
- cifs: Fix stack out-of-bounds in smb{2,3}_create_lease_buf() (bsc#1012382).
- cifs: add missing debug entries for kconfig options (bnc#1012382).
- cifs: check kmalloc before use (bsc#1012382).
- cifs: store the leaseKey in the fid on SMB2_open (bsc#1012382).
- clk: tegra: Fix PLL_U post divider and initial rate on Tegra30 (bnc#1012382).
- crypto: ablkcipher - fix crash flushing dcache in error path (bnc#1012382).
- crypto: authenc - do not leak pointers to authenc keys (bnc#1012382).
- crypto: authencesn - do not leak pointers to authenc keys (bnc#1012382).
- crypto: blkcipher - fix crash flushing dcache in error path (bnc#1012382).
- crypto: padlock-aes - Fix Nano workaround data corruption (bnc#1012382).
- crypto: vmac - require a block cipher with 128-bit block size (bnc#1012382).
- crypto: vmac - separate tfm and request context (bnc#1012382).
- crypto: vmx - Fix sleep-in-atomic bugs (bsc#1048317).
- cxgb4: when disabling dcb set txq dcb priority to 0 (bnc#1012382).
- cxl: Fix wrong comparison in cxl_adapter_context_get() (bsc#1055014).
- dccp: fix undefined behavior with 'cwnd' shift in ccid2_cwnd_restart() (bnc#1012382).
- disable loading f2fs module on PAGE_SIZE &gt; 4KB (bnc#1012382).
- dm cache metadata: save in-core policy_hint_size to on-disk superblock (bnc#1012382).
- dma-iommu: Fix compilation when !CONFIG_IOMMU_DMA (bnc#1012382).
- dmaengine: k3dma: Off by one in k3_of_dma_simple_xlate() (bnc#1012382).
- dmaengine: pxa_dma: remove duplicate const qualifier (bnc#1012382).
- driver core: Partially revert 'driver core: correct device's shutdown order' (bnc#1012382).
- drivers: net: lmc: fix case value for target abort error (bnc#1012382).
- drm/armada: fix colorkey mode property (bnc#1012382).
- drm/atmel-hlcdc: check stride values in the first plane (bsc#1106929).
- drm/atomic: Handling the case when setting old crtc for plane (bnc#1012382).
- drm/bridge: adv7511: Reset registers on hotplug (bnc#1012382).
- drm/cirrus: Use drm_framebuffer_put to avoid kernel oops in clean-up (bsc#1101822).
- drm/drivers: add support for using the arch wc mapping API.
- drm/exynos/dsi: mask frame-done interrupt (bsc#1106929).
- drm/exynos: decon5433: Fix WINCONx reset value (bnc#1012382).
- drm/exynos: decon5433: Fix per-plane global alpha for XRGB modes (bnc#1012382).
- drm/exynos: gsc: Fix support for NV16/61, YUV420/YVU420 and YUV422 modes (bnc#1012382).
- drm/gma500: fix psb_intel_lvds_mode_valid()'s return type (bnc#1012382).
- drm/i915/userptr: reject zero user_size (bsc#1090888).
- drm/i915: Correctly handle limited range YCbCr data on VLV/CHV (bsc#1087092).
- drm/imx: fix typo in ipu_plane_formats (bsc#1106929).
- drm/imx: imx-ldb: check if channel is enabled before printing warning (bnc#1012382).
- drm/imx: imx-ldb: disable LDB on driver bind (bnc#1012382).
- drm/msm/hdmi: Use bitwise operators when building register values (bsc#1106929).
- drm/nouveau/gem: off by one bugs in nouveau_gem_pushbuf_reloc_apply() (bnc#1012382).
- drm/panel: type promotion bug in s6e8aa0_read_mtp_id() (bsc#1105769).
- drm/radeon: fix mode_valid's return type (bnc#1012382).
- drm: Add DP PSR2 sink enable bit (bnc#1012382).
- drm: Reject getfb for multi-plane framebuffers (bsc#1106929).
- enic: do not call enic_change_mtu in enic_probe
- enic: handle mtu change for vf properly (bnc#1012382).
- enic: initialize enic-&gt;rfs_h.lock in enic_probe (bnc#1012382).
- esp6: fix memleak on error path in esp6_input
- ext4: check for NUL characters in extended attribute's name (bnc#1012382).
- ext4: check for allocation block validity with block group locked (bsc#1104495).
- ext4: do not update s_last_mounted of a frozen fs (bsc#1101841).
- ext4: factor out helper ext4_sample_last_mounted() (bsc#1101841).
- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).
- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).
- ext4: fix inline data updates with checksums enabled (bsc#1104494).
- ext4: fix spectre gadget in ext4_mb_regular_allocator() (bnc#1012382).
- ext4: reset error code in ext4_find_entry in fallback (bnc#1012382).
- ext4: sysfs: print ext4_super_block fields as little-endian (bsc#1106229).
- f2fs: fix to do not trigger writeback during recovery (bnc#1012382).
- fat: fix memory allocation failure handling of match_strdup() (bnc#1012382).
- fb: fix lost console when the user unplugs a USB adapter (bnc#1012382).
- fbdev: omapfb: off by one in omapfb_register_client() (bsc#1106929).
- fix __legitimize_mnt()/mntput() race (bnc#1012382).
- fix mntput/mntput race (bnc#1012382).
- fork: unconditionally clear stack on fork (bnc#1012382).
- fs/9p/xattr.c: catch the error of p9_client_clunk when setting xattr failed (bnc#1012382).
- fs/dax.c: fix inefficiency in dax_writeback_mapping_range() (bsc#1106185).
- fs/quota: Fix spectre gadget in do_quotactl (bnc#1012382).
- fs: aio: fix the increment of aio-nr and counting against aio-max-nr (bsc#1068075, bsc#1078921).
- fuse: Add missed unlock_page() to fuse_readpages_fill() (bnc#1012382).
- fuse: Do not access pipe-&gt;buffers without pipe_lock() (bnc#1012382).
- fuse: Fix oops at process_init_reply() (bnc#1012382).
- fuse: fix double request_end() (bnc#1012382).
- fuse: fix unlocked access to processing queue (bnc#1012382).
- fuse: umount should wait for all requests (bnc#1012382).
- genirq/proc: Return proper error code when irq_set_affinity() fails (bnc#1105392).
- getxattr: use correct xattr length (bnc#1012382).
- hfsplus: Do not clear SGID when inheriting ACLs (bsc#1030552).
- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bnc#1012382).
- hwrng: exynos - Disable runtime PM on driver unbind.
- i2c: davinci: Avoid zero value of CLKH (bnc#1012382).
- i2c: imx: Fix race condition in dma read (bnc#1012382).
- i2c: imx: Fix reinit_completion() use (bnc#1012382).
- i2c: ismt: fix wrong device address when unmap the data buffer (bnc#1012382).
- i40e: use cpumask_copy instead of direct assignment (bsc#1053685).
- i40iw: Fix memory leak in error path of create QP (bsc#969476 bsc#969477).
- i40iw: Use correct address in dst_neigh_lookup for IPv6 (bsc#969476 bsc#969477).
- ibmvnic: Include missing return code checks in reset function (bnc#1107966).
- ieee802154: at86rf230: switch from BUG_ON() to WARN_ON() on problem (bnc#1012382).
- ieee802154: at86rf230: use __func__ macro for debug messages (bnc#1012382).
- ieee802154: fakelb: switch from BUG_ON() to WARN_ON() on problem (bnc#1012382).
- igb: Fix not adding filter elements to the list (bsc#1024361 bsc#1024365).
- iio: ad9523: Fix displayed phase (bnc#1012382).
- iio: ad9523: Fix return value for ad952x_store() (bnc#1012382).
- inet: frag: enforce memory limits earlier (bnc#1012382 bsc#970506).
- iommu/amd: make sure TLB to be flushed before IOVA freed (bsc#1106105).
- iommu/vt-d: Add definitions for PFSID (bnc#1012382).
- iommu/vt-d: Fix dev iotlb pfsid use (bnc#1012382).
- iommu/vt-d: Ratelimit each dmar fault printing (bsc#1106105).
- ioremap: Update pgtable free interfaces with addr (bnc#1012382).
- ip: hash fragments consistently (bnc#1012382).
- ip: in cmsg IP(V6)_ORIGDSTADDR call pskb_may_pull (bnc#1012382).
- ipconfig: Correctly initialise ic_nameservers (bnc#1012382).
- ipv4+ipv6: Make INET*_ESP select CRYPTO_ECHAINIV (bnc#1012382).
- ipv4: Return EINVAL when ping_group_range sysctl does not map to user ns (bnc#1012382).
- ipv4: remove BUG_ON() from fib_compute_spec_dst (bnc#1012382).
- ipv6: fix useless rol32 call on hash (bnc#1012382).
- ipv6: mcast: fix unsolicited report interval after receiving querys (bnc#1012382).
- ipvlan: use ETH_MAX_MTU as max mtu (bsc#1033962).
- iscsi target: fix session creation failure handling (bnc#1012382).
- isdn: Disable IIOCDBGVAR (bnc#1012382).
- iw_cxgb4: remove duplicate memcpy() in c4iw_create_listen() (bsc#969476 bsc#969477).
- iwlwifi: pcie: fix race in Rx buffer allocator (bnc#1012382).
- ixgbe: Be more careful when modifying MAC filters (bnc#1012382).
- jfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- jump_label: Add RELEASE barrier after text changes (bsc#1105271).
- jump_label: Fix concurrent static_key_enable/disable() (bsc#1105271).
- jump_label: Move CPU hotplug locking (bsc#1105271).
- jump_label: Provide hotplug context variants (bsc#1105271).
- jump_label: Reduce the size of struct static_key (bsc#1105271).
- jump_label: Reorder hotplug lock and jump_label_lock (bsc#1105271).
- jump_label: Split out code under the hotplug lock (bsc#1105271).
- jump_label: remove bug.h, atomic.h dependencies for HAVE_JUMP_LABEL (bsc#1105271).
- kABI: protect enum tcp_ca_event (kabi).
- kABI: reexport tcp_send_ack (kabi).
- kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)
- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- kasan: do not emit builtin calls when sanitization is off (bnc#1012382).
- kasan: fix shadow_size calculation error in kasan_module_alloc (bnc#1012382).
- kbuild: verify that $DEPMOD is installed (bnc#1012382).
- kernel: improve spectre mitigation (bnc#1106934, LTC#171029).
- kprobes/x86: Fix %p uses in error messages (bnc#1012382).
- kprobes: Make list and blacklist root user read only (bnc#1012382).
- kthread, tracing: Do not expose half-written comm when creating kthreads (bsc#1104897).
- kvm: x86: vmx: fix vpid leak (bnc#1012382).
- l2tp: use sk_dst_check() to avoid race on sk-&gt;sk_dst_cache (bnc#1012382).
- lib/rhashtable: consider param-&gt;min_size when setting initial table size (bnc#1012382).
- libata: Fix command retry decision (bnc#1012382).
- libceph: check authorizer reply/challenge length before reading (bsc#1096748).
- libceph: factor out __ceph_x_decrypt() (bsc#1096748).
- libceph: factor out __prepare_write_connect() (bsc#1096748).
- libceph: factor out encrypt_authorizer() (bsc#1096748).
- libceph: store ceph_auth_handshake pointer in ceph_connection (bsc#1096748).
- libceph: weaken sizeof check in ceph_x_verify_authorizer_reply() (bsc#1096748).
- llc: use refcount_inc_not_zero() for llc_sap_find() (bnc#1012382).
- locking/lockdep: Do not record IRQ state within lockdep code (bnc#1012382).
- locks: pass inode pointer to locks_free_lock_context (bsc@1099832).
- locks: prink more detail when there are leaked locks (bsc#1099832).
- locks: restore a warn for leaked locks on close (bsc#1099832).
- m68k: fix 'bad page state' oops on ColdFire boot (bnc#1012382).
- mac80211: add stations tied to AP_VLANs during hw reconfig (bnc#1012382).
- md/raid10: fix that replacement cannot complete recovery after reassemble (bnc#1012382).
- md: fix NULL dereference of mddev-&gt;pers in remove_and_add_spares() (bnc#1012382).
- media: omap3isp: fix unbalanced dma_iommu_mapping (bnc#1012382).
- media: rcar_jpu: Add missing clk_disable_unprepare() on error in jpu_open() (bnc#1012382).
- media: rtl28xxu: be sure that it won't go past the array size (bsc#1050431).
- media: s5p-jpeg: fix number of components macro (bsc#1050431).
- media: saa7164: Fix driver name in debug output (bnc#1012382).
- media: si470x: fix __be16 annotations (bnc#1012382).
- media: siano: get rid of __le32/__le16 cast warnings (bnc#1012382).
- media: staging: omap4iss: Include asm/cacheflush.h after generic includes (bnc#1012382).
- media: videobuf2-core: do not call memop 'finish' when queueing (bnc#1012382).
- memory: tegra: Apply interrupts mask per SoC (bnc#1012382).
- memory: tegra: Do not handle spurious interrupts (bnc#1012382).
- mfd: cros_ec: Fail early if we cannot identify the EC (bnc#1012382).
- microblaze: Fix simpleImage format generation (bnc#1012382).
- mm/hugetlb: filter out hugetlb pages if HUGEPAGE migration is not supported (bnc#1106697).
- mm/memory.c: check return value of ioremap_prot (bnc#1012382).
- mm/slub.c: add __printf verification to slab_err() (bnc#1012382).
- mm/tlb: Remove tlb_remove_table() non-concurrent condition (bnc#1012382).
- mm: Add vm_insert_pfn_prot() (bnc#1012382).
- mm: fix cache mode tracking in vm_insert_mixed() (bnc#1012382).
- mm: memcg: fix use after free in mem_cgroup_iter() (bnc#1012382).
- mm: vmalloc: avoid racy handling of debugobjects in vunmap (bnc#1012382).
- mm: x86: move _PAGE_SWP_SOFT_DIRTY from bit 7 to bit 1 (bnc#1012382).
- mtd: rawnand: fsl_ifc: fix FSL NAND driver to read all ONFI parameter pages (bnc#1012382).
- mtd: ubi: wl: Fix error return code in ubi_wl_init().
- mwifiex: correct histogram data with appropriate index (bnc#1012382).
- mwifiex: handle race during mwifiex_usb_disconnect (bnc#1012382).
- net/9p/client.c: version pointer uninitialized (bnc#1012382).
- net/9p/trans_fd.c: fix race-condition by flushing workqueue before the kfree() (bnc#1012382).
- net/ethernet/freescale/fman: fix cross-build error (bnc#1012382).
- net/ipv4: Set oif in fib_compute_spec_dst (bnc#1012382).
- net/mlx4_core: Save the qpn from the input modifier in RST2INIT wrapper (bnc#1012382).
- net/mlx5: Add missing SET_DRIVER_VERSION command translation (bsc#1015342 bsc#1015343).
- net/mlx5: E-Switch, Include VF RDMA stats in vport statistics (bsc#966170 bsc#966172).
- net/mlx5: Eswitch, Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1015342 bsc#1015343).
- net/mlx5: Fix wrong size allocation for QoS ETC TC regitster (bsc#966170 bsc#966172).
- net/mlx5: Vport, Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#966170 bsc#966172).
- net/mlx5e: Do not allow aRFS for encapsulated packets (bsc#1015342 bsc#1015343).
- net/mlx5e: Err if asked to offload TC match on frag being first (bsc#1015342 bsc#1015343).
- net/mlx5e: Fix quota counting in aRFS expire flow (bsc#1015342 bsc#1015343).
- net/mlx5e: Refine ets validation function (bsc#966170 bsc#966172).
- net: 6lowpan: fix reserved space for single frames (bnc#1012382).
- net: Do not copy pfmemalloc flag in __copy_skb_header() (bnc#1012382).
- net: add skb_condense() helper (bsc#1089066).
- net: adjust skb-&gt;truesize in ___pskb_trim() (bsc#1089066).
- net: adjust skb-&gt;truesize in pskb_expand_head() (bsc#1089066).
- net: axienet: Fix double deregister of mdio (bnc#1012382).
- net: caif: Add a missing rcu_read_unlock() in caif_flow_cb (bnc#1012382).
- net: davinci_emac: match the mdio device against its compatible if possible (bnc#1012382).
- net: dsa: Do not suspend/resume closed slave_dev (bnc#1012382).
- net: ena: Fix use of uninitialized DMA address bits field (bsc#1027968).
- net: fix amd-xgbe flow-control issue (bnc#1012382).
- net: hamradio: use eth_broadcast_addr (bnc#1012382).
- net: lan78xx: Fix misplaced tasklet_schedule() call (bnc#1012382).
- net: lan78xx: fix rx handling before first packet is send (bnc#1012382).
- net: mac802154: tx: expand tailroom if necessary (bnc#1012382).
- net: phy: fix flag masking in __set_phy_supported (bnc#1012382).
- net: prevent ISA drivers from building on PPC32 (bnc#1012382).
- net: propagate dev_get_valid_name return code (bnc#1012382).
- net: qca_spi: Avoid packet drop during initial sync (bnc#1012382).
- net: qca_spi: Fix log level if probe fails (bnc#1012382).
- net: qca_spi: Make sure the QCA7000 reset is triggered (bnc#1012382).
- net: socket: fix potential spectre v1 gadget in socketcall (bnc#1012382).
- net: usb: rtl8150: demote allmulti message to dev_dbg() (bnc#1012382).
- net: vmxnet3: use new api ethtool_{get|set}_link_ksettings (bsc#1091860 bsc#1098253).
- net_sched: Fix missing res info when create new tc_index filter (bnc#1012382).
- net_sched: fix NULL pointer dereference when delete tcindex filter (bnc#1012382).
- netfilter: conntrack: dccp: treat SYNC/SYNCACK as invalid if no prior state (bnc#1012382).
- netfilter: ipset: List timing out entries with 'timeout 1' instead of zero (bnc#1012382).
- netfilter: ipv6: nf_defrag: reduce struct net memory waste (bnc#1012382).
- netfilter: ipvs: do not create conn for ABORT packet in sctp_conn_schedule (bsc#1102797).
- netfilter: ipvs: fix the issue that sctp_conn_schedule drops non-INIT packet (bsc#1102797).
- netfilter: x_tables: set module owner for icmp(6) matches (bnc#1012382).
- netlink: Do not shift on 64 for ngroups (bnc#1012382).
- netlink: Do not shift with UB on nlk-&gt;ngroups (bnc#1012382).
- netlink: Do not subscribe to non-existent groups (bnc#1012382).
- netlink: Fix spectre v1 gadget in netlink_create() (bnc#1012382).
- netlink: do not enter direct reclaim from netlink_trim() (bsc#1042286).
- nfsd: fix potential use-after-free in nfsd4_decode_getdeviceinfo (bnc#1012382).
- nl80211: Add a missing break in parse_station_flags (bnc#1012382).
- nohz: Fix local_timer_softirq_pending() (bnc#1012382).
- nvme-fc: release io queues to allow fast fail (bsc#1102486).
- nvme: if_ready checks to fail io to deleting controller (bsc#1102486).
- nvme: kABI-compliant version of nvmf_fail_nonready_command() (bsc#1102486).
- nvmet-fc: fix target sgl list on large transfers (bsc#1102486).
- osf_getdomainname(): use copy_to_user() (bnc#1012382).
- ovl: Do d_type check only if work dir creation was successful (bnc#1012382).
- ovl: Ensure upper filesystem supports d_type (bnc#1012382).
- ovl: warn instead of error if d_type is not supported (bnc#1012382).
- packet: refine ring v3 block size test to hold one frame (bnc#1012382).
- packet: reset network header if packet shorter than ll reserved space (bnc#1012382).
- parisc: Define mb() and add memory barriers to assembler unlock sequences (bnc#1012382).
- parisc: Enable CONFIG_MLONGCALLS by default (bnc#1012382).
- parisc: Remove ordered stores from syscall.S (bnc#1012382).
- parisc: Remove unnecessary barriers from spinlock.h (bnc#1012382).
- perf auxtrace: Fix queue resize (bnc#1012382).
- perf llvm-utils: Remove bashism from kernel include fetch script (bnc#1012382).
- perf report powerpc: Fix crash if callchain is empty (bnc#1012382).
- perf test session topology: Fix test on s390 (bnc#1012382).
- perf/x86/intel/uncore: Correct fixed counter index check for NHM (bnc#1012382).
- perf/x86/intel/uncore: Correct fixed counter index check in generic code (bnc#1012382).
- perf: fix invalid bit in diagnostic entry (bnc#1012382).
- pinctrl: at91-pio4: add missing of_node_put (bnc#1012382).
- pinctrl: freescale: off by one in imx1_pinconf_group_dbg_show() (bnc#1012382).
- pnfs/blocklayout: off by one in bl_map_stripe() (bnc#1012382).
- powerpc/32: Add a missing include header (bnc#1012382).
- powerpc/64s: Default l1d_size to 64K in RFI fallback flush (bsc#1068032).
- powerpc/64s: Fix compiler store ordering to SLB shadow area (bnc#1012382).
- powerpc/8xx: fix invalid register expression in head_8xx.S (bnc#1012382).
- powerpc/chrp/time: Make some functions static, add missing header include (bnc#1012382).
- powerpc/embedded6xx/hlwd-pic: Prevent interrupts from being handled by Starlet (bnc#1012382).
- powerpc/fadump: handle crash memory ranges array index overflow (bsc#1103269).
- powerpc/fadump: merge adjacent memory ranges to reduce PT_LOAD segements (bsc#1103269).
- powerpc/lib: Fix the feature fixup tests to actually work (bsc#1066223).
- powerpc/powermac: Add missing prototype for note_bootable_part() (bnc#1012382).
- powerpc/powermac: Mark variable x as unused (bnc#1012382).
- powerpc/pseries: Fix endianness while restoring of r3 in MCE handler (bnc#1012382).
- powerpc/topology: Get topology for shared processors at boot (bsc#1104683).
- powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 (bsc#1068032, bsc#1080157).
- powerpc: Avoid code patching freed init sections (bnc#1107735).
- powerpc: make feature-fixup tests fortify-safe (bsc#1066223).
- provide special timeout module parameters for EC2 (bsc#1065364).
- ptp: fix missing break in switch (bnc#1012382).
- pwm: tiehrpwm: Fix disabling of output of PWMs (bnc#1012382).
- qed: Add sanity check for SIMD fastpath handler (bnc#1012382).
- qed: Correct Multicast API to reflect existence of 256 approximate buckets (bsc#1019695 bsc#1019699 bsc#1022604).
- qed: Do not advertise DCBX_LLD_MANAGED capability (bsc#1019695 bsc#1019699 bsc#1022604).
- qed: Fix possible memory leak in Rx error path handling (bsc#1019695 bsc#1019699 bsc#1022604 ).
- qed: Fix possible race for the link state value (bnc#1012382).
- qed: Fix setting of incorrect eswitch mode (bsc#1019695 bsc#1019699 bsc#1022604).
- qed: Fix use of incorrect size in memcpy call (bsc#1019695 bsc#1019699 bsc#1022604).
- qede: Adverstise software timestamp caps when PHC is not available (bsc#1019695 bsc#1019699 bsc#1022604).
- qlge: Fix netdev features configuration (bsc#1098822).
- qlogic: check kstrtoul() for errors (bnc#1012382).
- random: mix rdrand with entropy sent in from userspace (bnc#1012382).
- readahead: stricter check for bdi io_pages (VM Functionality).
- regulator: pfuze100: add .is_enable() for pfuze100_swb_regulator_ops (bnc#1012382).
- reiserfs: fix broken xattr handling (heap corruption, bad retval) (bnc#1012382).
- ring_buffer: tracing: Inherit the tracing setting to next ring buffer (bnc#1012382).
- root dentries need RCU-delayed freeing (bnc#1012382).
- rsi: Fix 'invalid vdd' warning in mmc (bnc#1012382).
- rtc: ensure rtc_set_alarm fails when alarms are not supported (bnc#1012382).
- rtnetlink: add rtnl_link_state check in rtnl_configure_link (bnc#1012382).
- s390/cpum_sf: Add data entry sizes to sampling trailer entry (bnc#1012382).
- s390/kvm: fix deadlock when killed by oom (bnc#1012382).
- s390/lib: use expoline for all bcr instructions (bnc#1106934, LTC#171029).
- s390/pci: fix out of bounds access during irq setup (bnc#1012382).
- s390/qdio: reset old sbal_state flags (bnc#1012382).
- s390/qeth: do not clobber buffer on async TX completion (bnc#1104485, LTC#170349).
- s390/qeth: fix race when setting MAC address (bnc#1104485, LTC#170726).
- s390: add explicit &lt;linux/stringify.h&gt; for jump label (bsc#1105271).
- s390: detect etoken facility (bnc#1106934, LTC#171029).
- s390: fix br_r1_trampoline for machines without exrl (bnc#1012382 bnc#1106934 LTC#171029).
- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).
- scripts/tar-up.sh: Do not package gitlog-excludes file Also fix the evaluation of gitlog-excludes file, too
- scsi: 3w-xxxx: fix a missing-check bug (bnc#1012382).
- scsi: core: Avoid that SCSI device removal through sysfs triggers a deadlock (bnc#1012382).
- scsi: fcoe: drop frames in ELS LOGO error path (bnc#1012382).
- scsi: hpsa: limit transfer length to 1MB, not 512kB (bsc#1102346).
- scsi: libiscsi: fix possible NULL pointer dereference in case of TMF (bnc#1012382).
- scsi: megaraid: silence a static checker bug (bnc#1012382).
- scsi: megaraid_sas: Increase timeout by 1 sec for non-RAID fastpath IOs (bnc#1012382).
- scsi: qla2xxx: Fix ISP recovery on unload (bnc#1012382).
- scsi: qla2xxx: Return error when TMF returns (bnc#1012382).
- scsi: scsi_dh: replace too broad 'TP9' string with the exact models (bnc#1012382).
- scsi: sr: Avoid that opening a CD-ROM hangs with runtime power management enabled (bnc#1012382).
- scsi: sysfs: Introduce sysfs_{un,}break_active_protection() (bnc#1012382).
- scsi: ufs: fix exception event handling (bnc#1012382).
- scsi: vmw_pvscsi: Return DID_RESET for status SAM_STAT_COMMAND_TERMINATED (bnc#1012382).
- scsi: xen-scsifront: add error handling for xenbus_printf (bnc#1012382).
- scsi_debug: call resp_XXX function after setting host_scribble (bsc#1069138).
- scsi_debug: reset injection flags for every_nth &gt; 0 (bsc#1069138).
- selftest/seccomp: Fix the flag name SECCOMP_FILTER_FLAG_TSYNC (bnc#1012382).
- selftest/seccomp: Fix the seccomp(2) signature (bnc#1012382).
- selftests/ftrace: Add snapshot and tracing_on test case (bnc#1012382).
- selftests/x86/sigreturn/64: Fix spurious failures on AMD CPUs (bnc#1012382).
- selftests: pstore: return Kselftest Skip code for skipped tests (bnc#1012382).
- selftests: static_keys: return Kselftest Skip code for skipped tests (bnc#1012382).
- selftests: sync: add config fragment for testing sync framework (bnc#1012382).
- selftests: user: return Kselftest Skip code for skipped tests (bnc#1012382).
- selftests: zram: return Kselftest Skip code for skipped tests (bnc#1012382).
- serial: 8250_dw: always set baud rate in dw8250_set_termios (bnc#1012382).
- sfc: stop the TX queue before pushing new buffers (bsc#1017967 ).
- skbuff: Unconditionally copy pfmemalloc in __skb_clone() (bnc#1012382).
- slab: __GFP_ZERO is incompatible with a constructor (bnc#1107060).
- smb3: Do not send SMB3 SET_INFO if nothing changed (bnc#1012382).
- smb3: do not request leases in symlink creation and query (bnc#1012382).
- spi: davinci: fix a NULL pointer dereference (bnc#1012382).
- squashfs: be more careful about metadata corruption (bnc#1012382).
- squashfs: more metadata hardening (bnc#1012382).
- squashfs: more metadata hardenings (bnc#1012382).
- staging: android: ion: check for kref overflow (bnc#1012382).
- string: drop __must_check from strscpy() and restore strscpy() usages in cgroup (bsc#1107319).
- sys: do not hold uts_sem while accessing userspace memory (bnc#1106995).
- target_core_rbd: use RCU in free_device (bsc#1105524).
- tcp: Fix missing range_truesize enlargement in the backport (bnc#1012382).
- tcp: add max_quickacks param to tcp_incr_quickack and tcp_enter_quickack_mode (bnc#1012382).
- tcp: add one more quick ack after after ECN events (bnc#1012382).
- tcp: do not aggressively quick ack after ECN events (bnc#1012382).
- tcp: do not cancel delay-AcK on DCTCP special ACK (bnc#1012382).
- tcp: do not delay ACK in DCTCP upon CE status change (bnc#1012382).
- tcp: do not force quickack when receiving out-of-order packets (bnc#1012382).
- tcp: fix dctcp delayed ACK schedule (bnc#1012382).
- tcp: helpers to send special DCTCP ack (bnc#1012382).
- tcp: identify cryptic messages as TCP seq # bugs (bnc#1012382).
- tcp: refactor tcp_ecn_check_ce to remove sk type cast (bnc#1012382).
- tcp: remove DELAYED ACK events in DCTCP (bnc#1012382).
- tg3: Add higher cpu clock for 5762 (bnc#1012382).
- thermal: exynos: fix setting rising_threshold for Exynos5433 (bnc#1012382).
- timekeeping: Eliminate the stale declaration of ktime_get_raw_and_real_ts64() (bsc#969470).
- tools/power turbostat: Read extended processor family from CPUID (bnc#1012382).
- tools/power turbostat: fix -S on UP systems (bnc#1012382).
- tools: usb: ffs-test: Fix build on big endian systems (bnc#1012382).
- tpm: fix race condition in tpm_common_write() (bnc#1012382).
- tracing/blktrace: Fix to allow setting same value (bnc#1012382).
- tracing/kprobes: Fix trace_probe flags on enable_trace_kprobe() failure (bnc#1012382).
- tracing: Do not call start/stop() functions when tracing_on does not change (bnc#1012382).
- tracing: Fix double free of event_trigger_data (bnc#1012382).
- tracing: Fix possible double free in event_enable_trigger_func() (bnc#1012382).
- tracing: Quiet gcc warning about maybe unused link variable (bnc#1012382).
- tracing: Use __printf markup to silence compiler (bnc#1012382).
- tty: Fix data race in tty_insert_flip_string_fixed_flag (bnc#1012382).
- turn off -Wattribute-alias (bnc#1012382).
- ubi: Be more paranoid while seaching for the most recent Fastmap (bnc#1012382).
- ubi: Fix Fastmap's update_vol() (bnc#1012382).
- ubi: Fix races around ubi_refill_pools() (bnc#1012382).
- ubi: Introduce vol_ignored() (bnc#1012382).
- ubi: Rework Fastmap attach base code (bnc#1012382).
- ubi: fastmap: Erase outdated anchor PEBs during attach (bnc#1012382).
- ubifs: Check data node size before truncate (bsc#1106276).
- ubifs: Fix memory leak in lprobs self-check (bsc#1106278).
- ubifs: Fix synced_i_size calculation for xattr inodes (bsc#1106275).
- ubifs: xattr: Do not operate on deleted inodes (bsc#1106271).
- udl-kms: change down_interruptible to down (bnc#1012382).
- udl-kms: fix crash due to uninitialized memory (bnc#1012382).
- udl-kms: handle allocation failure (bnc#1012382).
- udlfb: set optimal write delay (bnc#1012382).
- uprobes: Use synchronize_rcu() not synchronize_sched() (bnc#1012382).
- usb/phy: fix PPC64 build errors in phy-fsl-usb.c (bnc#1012382).
- usb: audio-v2: Correct the comment for struct uac_clock_selector_descriptor (bsc#1099810).
- usb: cdc_acm: Add quirk for Castles VEGA3000 (bnc#1012382).
- usb: dwc2: debugfs: Do not touch RX FIFO during register dump (bsc#1100132).
- usb: dwc2: fix isoc split in transfer with no data (bnc#1012382).
- usb: gadget: composite: fix delayed_status race condition when set_interface (bnc#1012382).
- usb: gadget: dwc2: fix memory leak in gadget_init() (bnc#1012382).
- usb: gadget: f_fs: Only return delayed status when len is 0 (bnc#1012382).
- usb: gadget: f_uac2: fix endianness of 'struct cntrl_*_lay3' (bnc#1012382).
- usb: gadget: r8a66597: Fix a possible sleep-in-atomic-context bugs in r8a66597_queue() (bnc#1012382).
- usb: gadget: r8a66597: Fix two possible sleep-in-atomic-context bugs in init_controller() (bnc#1012382).
- usb: hub: Do not wait for connect state at resume for powered-off ports (bnc#1012382).
- usb: renesas_usbhs: gadget: fix spin_lock_init() for &amp;uep-&gt;lock (bsc#1085536).
- usb: xhci: increase CRS timeout value (bnc#1012382).
- usbip: usbip_detach: Fix memory, udev context and udev leak (bnc#1012382).
- userns: move user access out of the mutex (bnc#1012382).
- vfs: add the sb_start_intwrite_trylock() helper (bsc#1101841).
- virtio_balloon: fix another race between migration and ballooning (bnc#1012382).
- vmw_balloon: VMCI_DOORBELL_SET does not check status (bnc#1012382).
- vmw_balloon: do not use 2MB without batching (bnc#1012382).
- vmw_balloon: fix VMCI use when balloon built into kernel (bnc#1012382).
- vmw_balloon: fix inflation of 64-bit GFNs (bnc#1012382).
- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1091860 bsc#1098253).
- vmxnet3: add receive data ring support (bsc#1091860 bsc#1098253).
- vmxnet3: add support for get_coalesce, set_coalesce ethtool operations (bsc#1091860 bsc#1098253).
- vmxnet3: allow variable length transmit data ring buffer (bsc#1091860 bsc#1098253).
- vmxnet3: avoid assumption about invalid dma_pa in vmxnet3_set_mc() (bsc#1091860 bsc#1098253).
- vmxnet3: avoid format strint overflow warning (bsc#1091860 bsc#1098253).
- vmxnet3: avoid xmit reset due to a race in vmxnet3 (bsc#1091860 bsc#1098253).
- vmxnet3: fix incorrect dereference when rxvlan is disabled (bsc#1091860 bsc#1098253).
- vmxnet3: fix non static symbol warning (bsc#1091860 bsc#1098253).
- vmxnet3: fix tx data ring copy for variable size (bsc#1091860 bsc#1098253).
- vmxnet3: increase default rx ring sizes (bsc#1091860 bsc#1098253).
- vmxnet3: introduce command to register memory region (bsc#1091860 bsc#1098253).
- vmxnet3: introduce generalized command interface to configure the device (bsc#1091860 bsc#1098253).
- vmxnet3: prepare for version 3 changes (bsc#1091860 bsc#1098253).
- vmxnet3: remove redundant initialization of pointer 'rq' (bsc#1091860 bsc#1098253).
- vmxnet3: remove unused flag 'rxcsum' from struct vmxnet3_adapter (bsc#1091860 bsc#1098253).
- vmxnet3: set the DMA mask before the first DMA map operation (bsc#1091860 bsc#1098253).
- vmxnet3: update to version 3 (bsc#1091860 bsc#1098253).
- vmxnet3: use DMA memory barriers where required (bsc#1091860 bsc#1098253).
- vmxnet3: use correct flag to indicate LRO feature (bsc#1091860 bsc#1098253).
- vsock: split dwork to avoid reinitializations (bnc#1012382).
- vti6: Fix dev-&gt;max_mtu setting (bsc#1033962).
- vti6: fix PMTU caching and reporting on xmit (bnc#1012382).
- wlcore: sdio: check for valid platform device data before suspend (bnc#1012382).
- x86/MCE: Remove min interval polling limitation (bnc#1012382).
- x86/amd: do not set X86_BUG_SYSRET_SS_ATTRS when running under Xen (bnc#1012382).
- x86/asm/entry/32: Simplify pushes of zeroed pt_regs-&gt;REGs (bnc#1012382).
- x86/bugs: Move the l1tf function and define pr_fmt properly (bnc#1012382).
- x86/bugs: Respect nospec command line option (bsc#1068032).
- x86/cpu/AMD: Fix erratum 1076 (CPB bit) (bnc#1012382).
- x86/cpu: Make alternative_msr_write work for 32-bit code (bnc#1012382).
- x86/cpu: Re-apply forced caps every time CPU caps are re-read (bnc#1012382).
- x86/cpufeatures: Add CPUID_7_EDX CPUID leaf (bnc#1012382).
- x86/cpufeatures: Clean up Spectre v2 related CPUID flags (bnc#1012382).
- x86/entry/64/compat: Clear registers for compat syscalls, to reduce speculation attack surface (bnc#1012382).
- x86/entry/64: Remove %ebx handling from error_entry/exit (bnc#1102715).
- x86/init: fix build with CONFIG_SWAP=n (bnc#1012382).
- x86/irqflags: Mark native_restore_fl extern inline (bnc#1012382).
- x86/irqflags: Provide a declaration for native_save_fl.
- x86/mm/kmmio: Make the tracer robust against L1TF (bnc#1012382).
- x86/mm/pat: Fix L1TF stable backport for CPA (bnc#1012382).
- x86/mm/pat: Fix L1TF stable backport for CPA, 2nd call (bnc#1012382).
- x86/mm/pat: Make set_memory_np() L1TF safe (bnc#1012382).
- x86/mm: Add TLB purge to free pmd/pte page interfaces (bnc#1012382).
- x86/mm: Disable ioremap free page handling on x86-PAE (bnc#1012382).
- x86/mm: Give each mm TLB flush generation a unique ID (bnc#1012382).
- x86/paravirt: Fix spectre-v2 mitigations for paravirt guests (bnc#1012382).
- x86/paravirt: Make native_save_fl() extern inline (bnc#1012382).
- x86/process: Correct and optimize TIF_BLOCKSTEP switch (bnc#1012382).
- x86/process: Optimize TIF checks in __switch_to_xtra() (bnc#1012382).
- x86/process: Optimize TIF_NOTSC switch (bnc#1012382).
- x86/process: Re-export start_thread() (bnc#1012382).
- x86/spectre: Add missing family 6 check to microcode check (bnc#1012382).
- x86/spectre_v2: Do not check microcode versions when running under hypervisors (bnc#1012382).
- x86/speculation/l1tf: Exempt zeroed PTEs from inversion (bnc#1012382).
- x86/speculation/l1tf: Extend 64bit swap file size limit (bnc#1012382).
- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1012382).
- x86/speculation/l1tf: Fix up CPU feature flags (bnc#1012382).
- x86/speculation/l1tf: Fix up pte-&gt;pfn conversion for PAE (bnc#1012382).
- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- x86/speculation/l1tf: Invert all not present mappings (bnc#1012382).
- x86/speculation/l1tf: Make pmd/pud_mknotpresent() invert (bnc#1012382).
- x86/speculation/l1tf: Protect PAE swap entries against L1TF (bnc#1012382).
- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (bnc#1105536).
- x86/speculation/l1tf: Unbreak !__HAVE_ARCH_PFN_MODIFY_ALLOWED architectures (bnc#1012382).
- x86/speculation: Add &lt;asm/msr-index.h&gt; dependency (bnc#1012382).
- x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support (bnc#1012382).
- x86/speculation: Clean up various Spectre related details (bnc#1012382).
- x86/speculation: Correct Speculation Control microcode blacklist again (bnc#1012382).
- x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPP (bnc#1012382).
- x86/speculation: Update Speculation Control microcode blacklist (bnc#1012382).
- x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry (bsc#1106369).
- x86/speculation: Use IBRS if available before calling into firmware (bnc#1012382).
- x86/speculation: Use Indirect Branch Prediction Barrier in context switch (bnc#1012382).
- x86/xen: Add call of speculative_store_bypass_ht_init() to PV paths (bnc#1012382).
- xen-netfront: wait xenbus state change when load module manually (bnc#1012382).
- xen/blkback: do not keep persistent grants too long (bsc#1085042).
- xen/blkback: move persistent grants flags to bool (bsc#1085042).
- xen/blkfront: cleanup stale persistent grants (bsc#1085042).
- xen/blkfront: reorder tests in xlblk_init() (bsc#1085042).
- xen/netfront: do not cache skb_shinfo() (bnc#1012382).
- xen: set cpu capabilities from xen_start_kernel() (bnc#1012382).
- xfrm: fix missing dst_release() after policy blocking lbcast and multicast (bnc#1012382).
- xfrm: free skb if nlsk pointer is NULL (bnc#1012382).
- xfrm_user: prevent leaking 2 bytes of kernel memory (bnc#1012382).
- xfs: Remove dead code from inode recover function (bsc#1105396).
- xfs: repair malformed inode items during log recovery (bsc#1105396).
- xhci: Fix perceived dead host due to runtime suspend race with event handler (bnc#1012382).
- zswap: re-check zswap_is_full() after do zswap_shrink() (bnc#1012382).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-20"/>
	<updated date="2018-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015342">SUSE bug 1015342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015343">SUSE bug 1015343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017967">SUSE bug 1017967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019695">SUSE bug 1019695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019699">SUSE bug 1019699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020412">SUSE bug 1020412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021121">SUSE bug 1021121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022604">SUSE bug 1022604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024361">SUSE bug 1024361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024365">SUSE bug 1024365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024376">SUSE bug 1024376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027968">SUSE bug 1027968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030552">SUSE bug 1030552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031492">SUSE bug 1031492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033962">SUSE bug 1033962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042286">SUSE bug 1042286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048317">SUSE bug 1048317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053685">SUSE bug 1053685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055014">SUSE bug 1055014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056596">SUSE bug 1056596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062604">SUSE bug 1062604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063646">SUSE bug 1063646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064232">SUSE bug 1064232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065364">SUSE bug 1065364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066223">SUSE bug 1066223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068075">SUSE bug 1068075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069138">SUSE bug 1069138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078921">SUSE bug 1078921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080157">SUSE bug 1080157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083663">SUSE bug 1083663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085042">SUSE bug 1085042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085536">SUSE bug 1085536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085539">SUSE bug 1085539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086457">SUSE bug 1086457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087092">SUSE bug 1087092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089066">SUSE bug 1089066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090888">SUSE bug 1090888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091171">SUSE bug 1091171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091860">SUSE bug 1091860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096254">SUSE bug 1096254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096748">SUSE bug 1096748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097105">SUSE bug 1097105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098253">SUSE bug 1098253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098822">SUSE bug 1098822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099597">SUSE bug 1099597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099810">SUSE bug 1099810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099811">SUSE bug 1099811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099813">SUSE bug 1099813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099832">SUSE bug 1099832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099844">SUSE bug 1099844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099845">SUSE bug 1099845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099846">SUSE bug 1099846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099849">SUSE bug 1099849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099863">SUSE bug 1099863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099864">SUSE bug 1099864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099922">SUSE bug 1099922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099999">SUSE bug 1099999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100000">SUSE bug 1100000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100001">SUSE bug 1100001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100132">SUSE bug 1100132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101822">SUSE bug 1101822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101841">SUSE bug 1101841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102346">SUSE bug 1102346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102486">SUSE bug 1102486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102517">SUSE bug 1102517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102715">SUSE bug 1102715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102797">SUSE bug 1102797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103269">SUSE bug 1103269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103445">SUSE bug 1103445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103717">SUSE bug 1103717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104319">SUSE bug 1104319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104485">SUSE bug 1104485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104494">SUSE bug 1104494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104495">SUSE bug 1104495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104683">SUSE bug 1104683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104897">SUSE bug 1104897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105271">SUSE bug 1105271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105292">SUSE bug 1105292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105322">SUSE bug 1105322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105323">SUSE bug 1105323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105392">SUSE bug 1105392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105396">SUSE bug 1105396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105524">SUSE bug 1105524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105536">SUSE bug 1105536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105769">SUSE bug 1105769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106016">SUSE bug 1106016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106105">SUSE bug 1106105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106185">SUSE bug 1106185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106229">SUSE bug 1106229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106271">SUSE bug 1106271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106275">SUSE bug 1106275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106276">SUSE bug 1106276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106278">SUSE bug 1106278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106281">SUSE bug 1106281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106283">SUSE bug 1106283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106369">SUSE bug 1106369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106509">SUSE bug 1106509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106511">SUSE bug 1106511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106697">SUSE bug 1106697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106929">SUSE bug 1106929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106934">SUSE bug 1106934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106995">SUSE bug 1106995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107060">SUSE bug 1107060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107078">SUSE bug 1107078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107319">SUSE bug 1107319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107320">SUSE bug 1107320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107689">SUSE bug 1107689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107735">SUSE bug 1107735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107966">SUSE bug 1107966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963575">SUSE bug 963575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966170">SUSE bug 966170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966172">SUSE bug 966172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969470">SUSE bug 969470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969476">SUSE bug 969476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969477">SUSE bug 969477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970506">SUSE bug 970506</bugzilla>
	<cve impact="low" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10876/">CVE-2018-10876</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10877/">CVE-2018-10877</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10878/">CVE-2018-10878</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10879/">CVE-2018-10879</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10880/">CVE-2018-10880</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10881/">CVE-2018-10881</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10882/">CVE-2018-10882</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10883/">CVE-2018-10883</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10938/">CVE-2018-10938</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-1128/">CVE-2018-1128</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1129/">CVE-2018-1129</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12896/">CVE-2018-12896</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-13093/">CVE-2018-13093</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13094/">CVE-2018-13094</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-13095/">CVE-2018-13095</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15572/">CVE-2018-15572</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16658/">CVE-2018-16658</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6554/">CVE-2018-6554</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6555/">CVE-2018-6555</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9363/">CVE-2018-9363</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520056" comment="kernel-default-4.4.155-94.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520057" comment="kernel-default-devel-4.4.155-94.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520058" comment="kernel-default-extra-4.4.155-94.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520059" comment="kernel-devel-4.4.155-94.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520060" comment="kernel-macros-4.4.155-94.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520061" comment="kernel-source-4.4.155-94.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520062" comment="kernel-syms-4.4.155-94.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78348" version="1" class="patch">
	<metadata>
		<title>Security update for openslp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1090638" ref_url="https://bugzilla.suse.com/1090638" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004575.html" source="SUSE-SU"/>
		<description>
This update for openslp fixes the following issues:

- CVE-2017-17833: Prevent heap-related memory corruption issue which may have
  manifested itself as a denial-of-service or a remote code-execution
  vulnerability (bsc#1090638)
- Prevent out of bounds reads in message parsing
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-21"/>
	<updated date="2018-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090638">SUSE bug 1090638</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520063" comment="openslp-2.0.0-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520064" comment="openslp-32bit-2.0.0-18.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78349" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1102003" ref_url="https://bugzilla.suse.com/1102003" source="BUGZILLA"/>
		<reference ref_id="1102004" ref_url="https://bugzilla.suse.com/1102004" source="BUGZILLA"/>
		<reference ref_id="1102005" ref_url="https://bugzilla.suse.com/1102005" source="BUGZILLA"/>
		<reference ref_id="1102007" ref_url="https://bugzilla.suse.com/1102007" source="BUGZILLA"/>
		<reference ref_id="1105592" ref_url="https://bugzilla.suse.com/1105592" source="BUGZILLA"/>
		<reference ref_id="1106855" ref_url="https://bugzilla.suse.com/1106855" source="BUGZILLA"/>
		<reference ref_id="1106858" ref_url="https://bugzilla.suse.com/1106858" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14434" ref_url="https://www.suse.com/security/cve/CVE-2018-14434/" source="CVE"/>
		<reference ref_id="CVE-2018-14435" ref_url="https://www.suse.com/security/cve/CVE-2018-14435/" source="CVE"/>
		<reference ref_id="CVE-2018-14436" ref_url="https://www.suse.com/security/cve/CVE-2018-14436/" source="CVE"/>
		<reference ref_id="CVE-2018-14437" ref_url="https://www.suse.com/security/cve/CVE-2018-14437/" source="CVE"/>
		<reference ref_id="CVE-2018-16323" ref_url="https://www.suse.com/security/cve/CVE-2018-16323/" source="CVE"/>
		<reference ref_id="CVE-2018-16329" ref_url="https://www.suse.com/security/cve/CVE-2018-16329/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004574.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

The following security vulnerabilities were fixed:

- CVE-2018-16329: Prevent NULL pointer dereference in the GetMagickProperty
  function leading to DoS (bsc#1106858)
- CVE-2018-16323: ReadXBMImage left data uninitialized when processing an XBM
  file that has a negative pixel value. If the affected code was used as a
  library loaded into a process that includes sensitive information, that
  information sometimes can be leaked via the image data (bsc#1106855)
- CVE-2018-14434: Fixed a memory leak for a colormap in WriteMPCImage 
  (bsc#1102003)
- CVE-2018-14435: Fixed a memory leak in DecodeImage in coders/pcd.c
  (bsc#1102007)
- CVE-2018-14436: Fixed a memory leak in ReadMIFFImage in coders/miff.c
  (bsc#1102005)
- CVE-2018-14437: Fixed a memory leak in parse8BIM in coders/meta.c
  (bsc#1102004)
- Disable PS, PS2, PS3, XPS and PDF coders in default policy.xml (bsc#1105592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-21"/>
	<updated date="2018-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1102003">SUSE bug 1102003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102004">SUSE bug 1102004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102005">SUSE bug 1102005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102007">SUSE bug 1102007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106855">SUSE bug 1106855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106858">SUSE bug 1106858</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14434/">CVE-2018-14434</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14435/">CVE-2018-14435</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14436/">CVE-2018-14436</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14437/">CVE-2018-14437</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16323/">CVE-2018-16323</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16329/">CVE-2018-16329</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520065" comment="ImageMagick-6.8.8.1-71.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520066" comment="libMagick++-6_Q16-3-6.8.8.1-71.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520067" comment="libMagickCore-6_Q16-1-6.8.8.1-71.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520068" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520069" comment="libMagickWand-6_Q16-1-6.8.8.1-71.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78350" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1095189" ref_url="https://bugzilla.suse.com/1095189" source="BUGZILLA"/>
		<reference ref_id="1095825" ref_url="https://bugzilla.suse.com/1095825" source="BUGZILLA"/>
		<reference ref_id="1095826" ref_url="https://bugzilla.suse.com/1095826" source="BUGZILLA"/>
		<reference ref_id="1095827" ref_url="https://bugzilla.suse.com/1095827" source="BUGZILLA"/>
		<reference ref_id="1095945" ref_url="https://bugzilla.suse.com/1095945" source="BUGZILLA"/>
		<reference ref_id="1097103" ref_url="https://bugzilla.suse.com/1097103" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11440" ref_url="https://www.suse.com/security/cve/CVE-2018-11440/" source="CVE"/>
		<reference ref_id="CVE-2018-11577" ref_url="https://www.suse.com/security/cve/CVE-2018-11577/" source="CVE"/>
		<reference ref_id="CVE-2018-11683" ref_url="https://www.suse.com/security/cve/CVE-2018-11683/" source="CVE"/>
		<reference ref_id="CVE-2018-11684" ref_url="https://www.suse.com/security/cve/CVE-2018-11684/" source="CVE"/>
		<reference ref_id="CVE-2018-11685" ref_url="https://www.suse.com/security/cve/CVE-2018-11685/" source="CVE"/>
		<reference ref_id="CVE-2018-12085" ref_url="https://www.suse.com/security/cve/CVE-2018-12085/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004576.html" source="SUSE-SU"/>
		<description>
This update for liblouis, python-louis, python3-louis fixes the
following issues:

Security issues fixed:

- CVE-2018-11440: Fixed a stack-based buffer overflow in the function
  parseChars() in compileTranslationTable.c (bsc#1095189)
- CVE-2018-11577: Fixed a segmentation fault in lou_logPrint in logging.c
  (bsc#1095945)
- CVE-2018-11683: Fixed a stack-based buffer overflow in the function
  parseChars() in compileTranslationTable.c (different vulnerability than
  CVE-2018-11440) (bsc#1095827)
- CVE-2018-11684: Fixed stack-based buffer overflow in the function
  includeFile() in compileTranslationTable.c (bsc#1095826)
- CVE-2018-11685: Fixed a stack-based buffer overflow in the function
  compileHyphenation() in compileTranslationTable.c (bsc#1095825)
- CVE-2018-12085: Fixed a stack-based buffer overflow in the function
  parseChars() in compileTranslationTable.c (different vulnerability than
  CVE-2018-11440) (bsc#1097103)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-21"/>
	<updated date="2018-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1095189">SUSE bug 1095189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095825">SUSE bug 1095825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095826">SUSE bug 1095826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095827">SUSE bug 1095827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095945">SUSE bug 1095945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097103">SUSE bug 1097103</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11440/">CVE-2018-11440</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11577/">CVE-2018-11577</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11683/">CVE-2018-11683</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11684/">CVE-2018-11684</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11685/">CVE-2018-11685</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12085/">CVE-2018-12085</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520070" comment="liblouis-data-2.6.4-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520071" comment="liblouis9-2.6.4-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520072" comment="python3-louis-2.6.4-6.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78351" version="1" class="patch">
	<metadata>
		<title>Security update for libzypp, zypper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1036304" ref_url="https://bugzilla.suse.com/1036304" source="BUGZILLA"/>
		<reference ref_id="1045735" ref_url="https://bugzilla.suse.com/1045735" source="BUGZILLA"/>
		<reference ref_id="1049825" ref_url="https://bugzilla.suse.com/1049825" source="BUGZILLA"/>
		<reference ref_id="1070851" ref_url="https://bugzilla.suse.com/1070851" source="BUGZILLA"/>
		<reference ref_id="1076192" ref_url="https://bugzilla.suse.com/1076192" source="BUGZILLA"/>
		<reference ref_id="1088705" ref_url="https://bugzilla.suse.com/1088705" source="BUGZILLA"/>
		<reference ref_id="1091624" ref_url="https://bugzilla.suse.com/1091624" source="BUGZILLA"/>
		<reference ref_id="1092413" ref_url="https://bugzilla.suse.com/1092413" source="BUGZILLA"/>
		<reference ref_id="1096803" ref_url="https://bugzilla.suse.com/1096803" source="BUGZILLA"/>
		<reference ref_id="1099847" ref_url="https://bugzilla.suse.com/1099847" source="BUGZILLA"/>
		<reference ref_id="1100028" ref_url="https://bugzilla.suse.com/1100028" source="BUGZILLA"/>
		<reference ref_id="1101349" ref_url="https://bugzilla.suse.com/1101349" source="BUGZILLA"/>
		<reference ref_id="1102429" ref_url="https://bugzilla.suse.com/1102429" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9269" ref_url="https://www.suse.com/security/cve/CVE-2017-9269/" source="CVE"/>
		<reference ref_id="CVE-2018-7685" ref_url="https://www.suse.com/security/cve/CVE-2018-7685/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004582.html" source="SUSE-SU"/>
		<description>
This update for libzypp, zypper fixes the following issues:

Update libzypp to version 16.17.20:

Security issues fixed:

- PackageProvider: Validate deta rpms before caching (bsc#1091624,
  bsc#1088705, CVE-2018-7685)
- PackageProvider: Validate downloaded rpm package signatures before
  caching (bsc#1091624, bsc#1088705, CVE-2018-7685)

Other bugs fixed:

- lsof: use '-K i' if lsof supports it (bsc#1099847, bsc#1036304)
- Handle http error 502 Bad Gateway in curl backend (bsc#1070851)
- RepoManager: Explicitly request repo2solv to generate application
  pseudo packages.
- libzypp-devel should not require cmake (bsc#1101349)
- HardLocksFile: Prevent against empty commit without Target having
  been been loaded (bsc#1096803)
- Avoid zombie tar processes (bsc#1076192)

Update to zypper to version 1.13.45:

Security issues fixed:

- Improve signature check callback messages (bsc#1045735, CVE-2017-9269)
- add/modify repo: Add options to tune the GPG check settings
  (bsc#1045735, CVE-2017-9269)

Other bugs fixed:

- XML &lt;install-summary&gt; attribute `packages-to-change` added (bsc#1102429)
- man: Strengthen that `--config FILE' affects zypper.conf,
  not zypp.conf (bsc#1100028)
- Prevent nested calls to exit() if aborted by a signal (bsc#1092413)
- ansi.h: Prevent ESC sequence strings from going out of scope (bsc#1092413)
- Fix: zypper bash completion expands non-existing options (bsc#1049825)
- Improve signature check callback messages (bsc#1045735)
- add/modify repo: Add options to tune the GPG check settings (bsc#1045735)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1036304">SUSE bug 1036304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045735">SUSE bug 1045735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049825">SUSE bug 1049825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070851">SUSE bug 1070851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076192">SUSE bug 1076192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088705">SUSE bug 1088705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091624">SUSE bug 1091624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092413">SUSE bug 1092413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096803">SUSE bug 1096803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099847">SUSE bug 1099847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100028">SUSE bug 1100028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101349">SUSE bug 1101349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102429">SUSE bug 1102429</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2017-9269/">CVE-2017-9269</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7685/">CVE-2018-7685</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520073" comment="libzypp-16.17.20-2.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520074" comment="zypper-1.13.45-21.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520075" comment="zypper-log-1.13.45-21.21.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78352" version="1" class="patch">
	<metadata>
		<title>Security update for libXcursor (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1103511" ref_url="https://bugzilla.suse.com/1103511" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9262" ref_url="https://www.suse.com/security/cve/CVE-2015-9262/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004592.html" source="SUSE-SU"/>
		<description>
This update for libXcursor fixes the following security issue:

- CVE-2015-9262: _XcursorThemeInherits allowed remote attackers to cause denial
  of service or potentially code execution via a one-byte heap overflow
  (bsc#1103511).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103511">SUSE bug 1103511</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-9262/">CVE-2015-9262</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520076" comment="libXcursor1-1.1.14-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520077" comment="libXcursor1-32bit-1.1.14-4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78353" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1074186" ref_url="https://bugzilla.suse.com/1074186" source="BUGZILLA"/>
		<reference ref_id="1092480" ref_url="https://bugzilla.suse.com/1092480" source="BUGZILLA"/>
		<reference ref_id="983440" ref_url="https://bugzilla.suse.com/983440" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5319" ref_url="https://www.suse.com/security/cve/CVE-2016-5319/" source="CVE"/>
		<reference ref_id="CVE-2017-17942" ref_url="https://www.suse.com/security/cve/CVE-2017-17942/" source="CVE"/>
		<reference ref_id="CVE-2018-10779" ref_url="https://www.suse.com/security/cve/CVE-2018-10779/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004587.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

Security issues fixed:

- CVE-2018-10779: Fixed a heap-based buffer overflow in TIFFWriteScanline()
  in tif_write.c (bsc#1092480)
- CVE-2017-17942: Fixed a heap-based buffer overflow in the function
  PackBitsEncode in tif_packbits.c. (bsc#1074186)
- CVE-2016-5319: Fixed a beap-based buffer overflow in bmp2tiff (bsc#983440)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074186">SUSE bug 1074186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092480">SUSE bug 1092480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983440">SUSE bug 983440</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5319/">CVE-2016-5319</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17942/">CVE-2017-17942</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10779/">CVE-2018-10779</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520078" comment="libtiff5-4.0.9-44.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520079" comment="libtiff5-32bit-4.0.9-44.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78354" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1047002" ref_url="https://bugzilla.suse.com/1047002" source="BUGZILLA"/>
		<reference ref_id="1105437" ref_url="https://bugzilla.suse.com/1105437" source="BUGZILLA"/>
		<reference ref_id="1105459" ref_url="https://bugzilla.suse.com/1105459" source="BUGZILLA"/>
		<reference ref_id="1105460" ref_url="https://bugzilla.suse.com/1105460" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10790" ref_url="https://www.suse.com/security/cve/CVE-2017-10790/" source="CVE"/>
		<reference ref_id="CVE-2018-10844" ref_url="https://www.suse.com/security/cve/CVE-2018-10844/" source="CVE"/>
		<reference ref_id="CVE-2018-10845" ref_url="https://www.suse.com/security/cve/CVE-2018-10845/" source="CVE"/>
		<reference ref_id="CVE-2018-10846" ref_url="https://www.suse.com/security/cve/CVE-2018-10846/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004593.html" source="SUSE-SU"/>
		<description>
This update for gnutls fixes the following issues:

Security issues fixed:

- Improved mitigations against Lucky 13 class of attacks
  - 'Just in Time' PRIME + PROBE cache-based side channel attack can lead to plaintext recovery (CVE-2018-10846, bsc#1105460)
  - HMAC-SHA-384 vulnerable to Lucky thirteen attack due to use of wrong constant (CVE-2018-10845, bsc#1105459)
  - HMAC-SHA-256 vulnerable to Lucky thirteen attack due to not enough dummy function calls (CVE-2018-10844, bsc#1105437)
- The _asn1_check_identifier function in Libtasn1 caused a NULL pointer dereference and crash (CVE-2017-10790, bsc#1047002)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047002">SUSE bug 1047002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105437">SUSE bug 1105437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105459">SUSE bug 1105459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105460">SUSE bug 1105460</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10790/">CVE-2017-10790</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10844/">CVE-2018-10844</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10845/">CVE-2018-10845</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10846/">CVE-2018-10846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520080" comment="gnutls-3.3.27-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520081" comment="libgnutls28-3.3.27-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520082" comment="libgnutls28-32bit-3.3.27-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78355" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1105434" ref_url="https://bugzilla.suse.com/1105434" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000222" ref_url="https://www.suse.com/security/cve/CVE-2018-1000222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004588.html" source="SUSE-SU"/>
		<description>
This update for gd fixes the following issues:

Security issue fixed:

- CVE-2018-1000222: Fixed a double free vulnerability in gdImageBmpPtr() that
  could result in remote code execution. This could have been exploited via a
  specially crafted JPEG image files. (bsc#1105434)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1105434">SUSE bug 1105434</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000222/">CVE-2018-1000222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520083" comment="gd-2.1.0-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520084" comment="gd-32bit-2.1.0-24.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78356" version="1" class="patch">
	<metadata>
		<title>Security update for shadow (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1106914" ref_url="https://bugzilla.suse.com/1106914" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:2835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004586.html" source="SUSE-SU"/>
		<description>
This update for shadow fixes the following security issue:

- Prevent useradd from creating intermediate directories with mode 0777 (bsc#1106914)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106914">SUSE bug 1106914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520085" comment="shadow-4.2.1-27.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78357" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1035442" ref_url="https://bugzilla.suse.com/1035442" source="BUGZILLA"/>
		<reference ref_id="1052825" ref_url="https://bugzilla.suse.com/1052825" source="BUGZILLA"/>
		<reference ref_id="1062571" ref_url="https://bugzilla.suse.com/1062571" source="BUGZILLA"/>
		<reference ref_id="1062760" ref_url="https://bugzilla.suse.com/1062760" source="BUGZILLA"/>
		<reference ref_id="1064947" ref_url="https://bugzilla.suse.com/1064947" source="BUGZILLA"/>
		<reference ref_id="1065766" ref_url="https://bugzilla.suse.com/1065766" source="BUGZILLA"/>
		<reference ref_id="1070130" ref_url="https://bugzilla.suse.com/1070130" source="BUGZILLA"/>
		<reference ref_id="1072887" ref_url="https://bugzilla.suse.com/1072887" source="BUGZILLA"/>
		<reference ref_id="1073973" ref_url="https://bugzilla.suse.com/1073973" source="BUGZILLA"/>
		<reference ref_id="1076500" ref_url="https://bugzilla.suse.com/1076500" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5748" ref_url="https://www.suse.com/security/cve/CVE-2018-5748/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003674.html" source="SUSE-SU"/>
		<description>
This update for libvirt provides several fixes.

This security issue was fixed:

- CVE-2018-5748: Prevent resource exhaustion via qemuMonitorIORead() method which allowed to cause DoS (bsc#1076500).

These security issues were fixed:

- Add a qemu hook script providing functionality similar to Xen's block-dmmd script.
  (fate#324177)
- schema: Make disk driver name attribute optional. (bsc#1073973)
- virt-create-rootfs: Handle all SLE 12 versions. (bsc#1072887)
- libvirt-guests: Fix the 'stop' operation when action is 'suspend'. (bsc#1070130)
- s390: Fix missing host cpu model info. (bsc#1065766)
- cpu: Add new EPYC CPU model. (bsc#1052825, fate#324038)
- pci: Fix the detection of the link's maximum speed. (bsc#1064947)
- nodedev: Increase the netlink socket buffer size. (bsc#1035442)
- storage: Fix a race between the volume creation and the pool refresh. (bsc#1062571)
- daemon: Drop the minsize directive from hypervisor logrotate files. (bsc#1062760)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-30"/>
	<updated date="2018-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1035442">SUSE bug 1035442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052825">SUSE bug 1052825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062571">SUSE bug 1062571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062760">SUSE bug 1062760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064947">SUSE bug 1064947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065766">SUSE bug 1065766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070130">SUSE bug 1070130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072887">SUSE bug 1072887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073973">SUSE bug 1073973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076500">SUSE bug 1076500</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5748/">CVE-2018-5748</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520086" comment="libvirt-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520087" comment="libvirt-admin-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520088" comment="libvirt-client-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520089" comment="libvirt-daemon-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520090" comment="libvirt-daemon-config-network-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520091" comment="libvirt-daemon-config-nwfilter-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520092" comment="libvirt-daemon-driver-interface-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520093" comment="libvirt-daemon-driver-libxl-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520094" comment="libvirt-daemon-driver-lxc-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520095" comment="libvirt-daemon-driver-network-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520096" comment="libvirt-daemon-driver-nodedev-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520097" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520098" comment="libvirt-daemon-driver-qemu-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520099" comment="libvirt-daemon-driver-secret-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520100" comment="libvirt-daemon-driver-storage-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520101" comment="libvirt-daemon-driver-storage-core-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520102" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520103" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520104" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520105" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520106" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520107" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520108" comment="libvirt-daemon-lxc-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520109" comment="libvirt-daemon-qemu-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520110" comment="libvirt-daemon-xen-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520111" comment="libvirt-doc-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520112" comment="libvirt-libs-3.3.0-5.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78358" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1094301" ref_url="https://bugzilla.suse.com/1094301" source="BUGZILLA"/>
		<reference ref_id="1101776" ref_url="https://bugzilla.suse.com/1101776" source="BUGZILLA"/>
		<reference ref_id="1101777" ref_url="https://bugzilla.suse.com/1101777" source="BUGZILLA"/>
		<reference ref_id="1101786" ref_url="https://bugzilla.suse.com/1101786" source="BUGZILLA"/>
		<reference ref_id="1101788" ref_url="https://bugzilla.suse.com/1101788" source="BUGZILLA"/>
		<reference ref_id="1101791" ref_url="https://bugzilla.suse.com/1101791" source="BUGZILLA"/>
		<reference ref_id="1101794" ref_url="https://bugzilla.suse.com/1101794" source="BUGZILLA"/>
		<reference ref_id="1101800" ref_url="https://bugzilla.suse.com/1101800" source="BUGZILLA"/>
		<reference ref_id="1101802" ref_url="https://bugzilla.suse.com/1101802" source="BUGZILLA"/>
		<reference ref_id="1101804" ref_url="https://bugzilla.suse.com/1101804" source="BUGZILLA"/>
		<reference ref_id="1101810" ref_url="https://bugzilla.suse.com/1101810" source="BUGZILLA"/>
		<reference ref_id="1106514" ref_url="https://bugzilla.suse.com/1106514" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11354" ref_url="https://www.suse.com/security/cve/CVE-2018-11354/" source="CVE"/>
		<reference ref_id="CVE-2018-11355" ref_url="https://www.suse.com/security/cve/CVE-2018-11355/" source="CVE"/>
		<reference ref_id="CVE-2018-11356" ref_url="https://www.suse.com/security/cve/CVE-2018-11356/" source="CVE"/>
		<reference ref_id="CVE-2018-11357" ref_url="https://www.suse.com/security/cve/CVE-2018-11357/" source="CVE"/>
		<reference ref_id="CVE-2018-11358" ref_url="https://www.suse.com/security/cve/CVE-2018-11358/" source="CVE"/>
		<reference ref_id="CVE-2018-11359" ref_url="https://www.suse.com/security/cve/CVE-2018-11359/" source="CVE"/>
		<reference ref_id="CVE-2018-11360" ref_url="https://www.suse.com/security/cve/CVE-2018-11360/" source="CVE"/>
		<reference ref_id="CVE-2018-11361" ref_url="https://www.suse.com/security/cve/CVE-2018-11361/" source="CVE"/>
		<reference ref_id="CVE-2018-11362" ref_url="https://www.suse.com/security/cve/CVE-2018-11362/" source="CVE"/>
		<reference ref_id="CVE-2018-14339" ref_url="https://www.suse.com/security/cve/CVE-2018-14339/" source="CVE"/>
		<reference ref_id="CVE-2018-14340" ref_url="https://www.suse.com/security/cve/CVE-2018-14340/" source="CVE"/>
		<reference ref_id="CVE-2018-14341" ref_url="https://www.suse.com/security/cve/CVE-2018-14341/" source="CVE"/>
		<reference ref_id="CVE-2018-14342" ref_url="https://www.suse.com/security/cve/CVE-2018-14342/" source="CVE"/>
		<reference ref_id="CVE-2018-14343" ref_url="https://www.suse.com/security/cve/CVE-2018-14343/" source="CVE"/>
		<reference ref_id="CVE-2018-14344" ref_url="https://www.suse.com/security/cve/CVE-2018-14344/" source="CVE"/>
		<reference ref_id="CVE-2018-14367" ref_url="https://www.suse.com/security/cve/CVE-2018-14367/" source="CVE"/>
		<reference ref_id="CVE-2018-14368" ref_url="https://www.suse.com/security/cve/CVE-2018-14368/" source="CVE"/>
		<reference ref_id="CVE-2018-14369" ref_url="https://www.suse.com/security/cve/CVE-2018-14369/" source="CVE"/>
		<reference ref_id="CVE-2018-14370" ref_url="https://www.suse.com/security/cve/CVE-2018-14370/" source="CVE"/>
		<reference ref_id="CVE-2018-16056" ref_url="https://www.suse.com/security/cve/CVE-2018-16056/" source="CVE"/>
		<reference ref_id="CVE-2018-16057" ref_url="https://www.suse.com/security/cve/CVE-2018-16057/" source="CVE"/>
		<reference ref_id="CVE-2018-16058" ref_url="https://www.suse.com/security/cve/CVE-2018-16058/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<description>
This update for wireshark to version 2.4.9 fixes the following issues:

Wireshark was updated to 2.4.9 (bsc#1094301, bsc#1106514).

Security issues fixed:

- CVE-2018-16058: Bluetooth AVDTP dissector crash (wnpa-sec-2018-44)
- CVE-2018-16056: Bluetooth Attribute Protocol dissector crash (wnpa-sec-2018-45)
- CVE-2018-16057: Radiotap dissector crash (wnpa-sec-2018-46)
- CVE-2018-11355: Fix RTCP dissector crash (bsc#1094301).
- CVE-2018-14370: IEEE 802.11 dissector crash (wnpa-sec-2018-43, bsc#1101802)
- CVE-2018-14368: Bazaar dissector infinite loop (wnpa-sec-2018-40, bsc#1101794)
- CVE-2018-11362: Fix LDSS dissector crash (bsc#1094301).
- CVE-2018-11361: Fix IEEE 802.11 dissector crash (bsc#1094301).
- CVE-2018-11360: Fix GSM A DTAP dissector crash (bsc#1094301).
- CVE-2018-14342: BGP dissector large loop (wnpa-sec-2018-34, bsc#1101777)
- CVE-2018-14343: ASN.1 BER dissector crash (wnpa-sec-2018-37, bsc#1101786)
- CVE-2018-14340: Multiple dissectors could crash (wnpa-sec-2018-36, bsc#1101804)
- CVE-2018-14341: DICOM dissector crash (wnpa-sec-2018-39, bsc#1101776)
- CVE-2018-11358: Fix Q.931 dissector crash (bsc#1094301).
- CVE-2018-14344: ISMP dissector crash (wnpa-sec-2018-35, bsc#1101788)
- CVE-2018-11359: Fix multiple dissectors crashs (bsc#1094301).
- CVE-2018-11356: Fix DNS dissector crash (bsc#1094301).
- CVE-2018-14339: MMSE dissector infinite loop (wnpa-sec-2018-38, bsc#1101810)
- CVE-2018-11357: Fix multiple dissectors that could consume excessive memory (bsc#1094301).
- CVE-2018-14367: CoAP dissector crash (wnpa-sec-2018-42, bsc#1101791)
- CVE-2018-11354: Fix IEEE 1905.1a dissector crash (bsc#1094301).
- CVE-2018-14369: HTTP2 dissector crash (wnpa-sec-2018-41, bsc#1101800)

Further bug fixes and updated protocol support as listed in:
  https://www.wireshark.org/docs/relnotes/wireshark-2.4.9.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-27"/>
	<updated date="2018-09-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101776">SUSE bug 1101776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101777">SUSE bug 1101777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101786">SUSE bug 1101786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101788">SUSE bug 1101788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101791">SUSE bug 1101791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101794">SUSE bug 1101794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101800">SUSE bug 1101800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101802">SUSE bug 1101802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101804">SUSE bug 1101804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101810">SUSE bug 1101810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106514">SUSE bug 1106514</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11354/">CVE-2018-11354</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11355/">CVE-2018-11355</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11356/">CVE-2018-11356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11357/">CVE-2018-11357</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11358/">CVE-2018-11358</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11359/">CVE-2018-11359</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11360/">CVE-2018-11360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11361/">CVE-2018-11361</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11362/">CVE-2018-11362</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14339/">CVE-2018-14339</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14340/">CVE-2018-14340</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14341/">CVE-2018-14341</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14342/">CVE-2018-14342</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14343/">CVE-2018-14343</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14344/">CVE-2018-14344</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14367/">CVE-2018-14367</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14368/">CVE-2018-14368</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14369/">CVE-2018-14369</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14370/">CVE-2018-14370</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16056/">CVE-2018-16056</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16057/">CVE-2018-16057</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16058/">CVE-2018-16058</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78359" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1089039" ref_url="https://bugzilla.suse.com/1089039" source="BUGZILLA"/>
		<reference ref_id="1101246" ref_url="https://bugzilla.suse.com/1101246" source="BUGZILLA"/>
		<reference ref_id="1101470" ref_url="https://bugzilla.suse.com/1101470" source="BUGZILLA"/>
		<reference ref_id="1104789" ref_url="https://bugzilla.suse.com/1104789" source="BUGZILLA"/>
		<reference ref_id="1106197" ref_url="https://bugzilla.suse.com/1106197" source="BUGZILLA"/>
		<reference ref_id="997043" ref_url="https://bugzilla.suse.com/997043" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004619.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

These security issues were fixed:

- Prevent One&amp;Done side-channel attack on RSA that allowed physically near
  attackers to use EM emanations to recover information (bsc#1104789)
- CVE-2018-0737: The RSA Key generation algorithm has been shown to be
  vulnerable to a cache timing side channel attack. An attacker with sufficient
  access to mount cache timing attacks during the RSA key generation process
  could have recovered the private key (bsc#1089039)

These non-security issues were fixed:

- Add openssl(cli) Provide so the packages that require the openssl
  binary can require this instead of the new openssl meta package
  (bsc#1101470)
- Fixed path to the engines which are under /lib64 on SLE-12 (bsc#1101246,
  bsc#997043)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-28"/>
	<updated date="2018-09-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089039">SUSE bug 1089039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101246">SUSE bug 1101246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101470">SUSE bug 1101470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104789">SUSE bug 1104789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106197">SUSE bug 1106197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997043">SUSE bug 997043</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520119" comment="libopenssl-devel-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520120" comment="libopenssl1_0_0-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520121" comment="libopenssl1_0_0-32bit-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520122" comment="openssl-1.0.2j-60.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78360" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1056126" ref_url="https://bugzilla.suse.com/1056126" source="BUGZILLA"/>
		<reference ref_id="1056127" ref_url="https://bugzilla.suse.com/1056127" source="BUGZILLA"/>
		<reference ref_id="1056128" ref_url="https://bugzilla.suse.com/1056128" source="BUGZILLA"/>
		<reference ref_id="1056129" ref_url="https://bugzilla.suse.com/1056129" source="BUGZILLA"/>
		<reference ref_id="1056131" ref_url="https://bugzilla.suse.com/1056131" source="BUGZILLA"/>
		<reference ref_id="1056132" ref_url="https://bugzilla.suse.com/1056132" source="BUGZILLA"/>
		<reference ref_id="1056136" ref_url="https://bugzilla.suse.com/1056136" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13728" ref_url="https://www.suse.com/security/cve/CVE-2017-13728/" source="CVE"/>
		<reference ref_id="CVE-2017-13729" ref_url="https://www.suse.com/security/cve/CVE-2017-13729/" source="CVE"/>
		<reference ref_id="CVE-2017-13730" ref_url="https://www.suse.com/security/cve/CVE-2017-13730/" source="CVE"/>
		<reference ref_id="CVE-2017-13731" ref_url="https://www.suse.com/security/cve/CVE-2017-13731/" source="CVE"/>
		<reference ref_id="CVE-2017-13732" ref_url="https://www.suse.com/security/cve/CVE-2017-13732/" source="CVE"/>
		<reference ref_id="CVE-2017-13733" ref_url="https://www.suse.com/security/cve/CVE-2017-13733/" source="CVE"/>
		<reference ref_id="CVE-2017-13734" ref_url="https://www.suse.com/security/cve/CVE-2017-13734/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003678.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes several issues.

These security issues were fixed:

- CVE-2017-13734: Prevent illegal address access in the _nc_safe_strcat
  function in strings.c that might have lead to a remote denial of service attack
  (bsc#1056126).
- CVE-2017-13733: Prevent illegal address access in the fmt_entry function in
  progs/dump_entry.c that might have lead to a remote denial of service attack
  (bsc#1056127).
- CVE-2017-13732: Prevent illegal address access in the function dump_uses() in
  progs/dump_entry.c that might have lead to a remote denial of service attack
  (bsc#1056128).
- CVE-2017-13731: Prevent illegal address access in the function
  postprocess_termcap() in parse_entry.c that might have lead to a remote denial
  of service attack (bsc#1056129).
- CVE-2017-13730: Prevent illegal address access in the function
  _nc_read_entry_source() in progs/tic.c that might have lead to a remote denial
  of service attack (bsc#1056131).
- CVE-2017-13729: Prevent illegal address access in the _nc_save_str function
  in alloc_entry.c that might have lead to a remote denial of service attack
  (bsc#1056132).
- CVE-2017-13728: Prevent infinite loop in the next_char function in
  comp_scan.c that might have lead to a remote denial of service attack
  (bsc#1056136).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-30"/>
	<updated date="2018-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056126">SUSE bug 1056126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056127">SUSE bug 1056127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056128">SUSE bug 1056128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056129">SUSE bug 1056129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056131">SUSE bug 1056131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056132">SUSE bug 1056132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056136">SUSE bug 1056136</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13728/">CVE-2017-13728</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13729/">CVE-2017-13729</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13730/">CVE-2017-13730</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13731/">CVE-2017-13731</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13732/">CVE-2017-13732</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13733/">CVE-2017-13733</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13734/">CVE-2017-13734</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518801" comment="libncurses5-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518802" comment="libncurses5-32bit-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518803" comment="libncurses6-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518804" comment="libncurses6-32bit-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518805" comment="ncurses-devel-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518806" comment="ncurses-utils-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518807" comment="tack-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518808" comment="terminfo-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518809" comment="terminfo-base-5.9-58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78361" version="1" class="patch">
	<metadata>
		<title>Security update for unzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1013992" ref_url="https://bugzilla.suse.com/1013992" source="BUGZILLA"/>
		<reference ref_id="1013993" ref_url="https://bugzilla.suse.com/1013993" source="BUGZILLA"/>
		<reference ref_id="1080074" ref_url="https://bugzilla.suse.com/1080074" source="BUGZILLA"/>
		<reference ref_id="910683" ref_url="https://bugzilla.suse.com/910683" source="BUGZILLA"/>
		<reference ref_id="914442" ref_url="https://bugzilla.suse.com/914442" source="BUGZILLA"/>
		<reference ref_id="950110" ref_url="https://bugzilla.suse.com/950110" source="BUGZILLA"/>
		<reference ref_id="950111" ref_url="https://bugzilla.suse.com/950111" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9636" ref_url="https://www.suse.com/security/cve/CVE-2014-9636/" source="CVE"/>
		<reference ref_id="CVE-2014-9913" ref_url="https://www.suse.com/security/cve/CVE-2014-9913/" source="CVE"/>
		<reference ref_id="CVE-2015-7696" ref_url="https://www.suse.com/security/cve/CVE-2015-7696/" source="CVE"/>
		<reference ref_id="CVE-2015-7697" ref_url="https://www.suse.com/security/cve/CVE-2015-7697/" source="CVE"/>
		<reference ref_id="CVE-2016-9844" ref_url="https://www.suse.com/security/cve/CVE-2016-9844/" source="CVE"/>
		<reference ref_id="CVE-2018-1000035" ref_url="https://www.suse.com/security/cve/CVE-2018-1000035/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004635.html" source="SUSE-SU"/>
		<description>
This update for unzip fixes the following security issues:

- CVE-2014-9913: Specially crafted zip files could trigger invalid memory
  writes possibly resulting in DoS or corruption (bsc#1013993)
- CVE-2015-7696: Specially crafted zip files with password protection could
  trigger a crash and lead to denial of service (bsc#950110)
- CVE-2015-7697: Specially crafted zip files could trigger an endless loop and
  lead to denial of service (bsc#950111)
- CVE-2016-9844: Specially crafted zip files could trigger invalid memory
  writes possibly resulting in DoS or corruption (bsc#1013992)
- CVE-2018-1000035: Prevent heap-based buffer overflow in the processing of
  password-protected archives that allowed an attacker to perform a denial of
  service or to possibly achieve code execution (bsc#1080074).
- CVE-2014-9636: Prevent denial of service (out-of-bounds read or write and
  crash) via an extra field with an uncompressed size smaller than the compressed
  field size in a zip archive that advertises STORED method compression
  (bsc#914442).

This non-security issue was fixed:

+- Allow processing of Windows zip64 archives (Windows archivers set
  total_disks field to 0 but per standard, valid values are 1 and higher)
  (bnc#910683)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-02"/>
	<updated date="2018-10-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013992">SUSE bug 1013992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013993">SUSE bug 1013993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080074">SUSE bug 1080074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910683">SUSE bug 910683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914442">SUSE bug 914442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950110">SUSE bug 950110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950111">SUSE bug 950111</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9636/">CVE-2014-9636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9913/">CVE-2014-9913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7696/">CVE-2015-7696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7697/">CVE-2015-7697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9844/">CVE-2016-9844</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000035/">CVE-2018-1000035</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520123" comment="unzip-6.00-33.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78362" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1106171" ref_url="https://bugzilla.suse.com/1106171" source="BUGZILLA"/>
		<reference ref_id="1106172" ref_url="https://bugzilla.suse.com/1106172" source="BUGZILLA"/>
		<reference ref_id="1106173" ref_url="https://bugzilla.suse.com/1106173" source="BUGZILLA"/>
		<reference ref_id="1106195" ref_url="https://bugzilla.suse.com/1106195" source="BUGZILLA"/>
		<reference ref_id="1107410" ref_url="https://bugzilla.suse.com/1107410" source="BUGZILLA"/>
		<reference ref_id="1107411" ref_url="https://bugzilla.suse.com/1107411" source="BUGZILLA"/>
		<reference ref_id="1107412" ref_url="https://bugzilla.suse.com/1107412" source="BUGZILLA"/>
		<reference ref_id="1107413" ref_url="https://bugzilla.suse.com/1107413" source="BUGZILLA"/>
		<reference ref_id="1107420" ref_url="https://bugzilla.suse.com/1107420" source="BUGZILLA"/>
		<reference ref_id="1107421" ref_url="https://bugzilla.suse.com/1107421" source="BUGZILLA"/>
		<reference ref_id="1107422" ref_url="https://bugzilla.suse.com/1107422" source="BUGZILLA"/>
		<reference ref_id="1107423" ref_url="https://bugzilla.suse.com/1107423" source="BUGZILLA"/>
		<reference ref_id="1107426" ref_url="https://bugzilla.suse.com/1107426" source="BUGZILLA"/>
		<reference ref_id="1107581" ref_url="https://bugzilla.suse.com/1107581" source="BUGZILLA"/>
		<reference ref_id="1108027" ref_url="https://bugzilla.suse.com/1108027" source="BUGZILLA"/>
		<reference ref_id="1109105" ref_url="https://bugzilla.suse.com/1109105" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15908" ref_url="https://www.suse.com/security/cve/CVE-2018-15908/" source="CVE"/>
		<reference ref_id="CVE-2018-15909" ref_url="https://www.suse.com/security/cve/CVE-2018-15909/" source="CVE"/>
		<reference ref_id="CVE-2018-15910" ref_url="https://www.suse.com/security/cve/CVE-2018-15910/" source="CVE"/>
		<reference ref_id="CVE-2018-15911" ref_url="https://www.suse.com/security/cve/CVE-2018-15911/" source="CVE"/>
		<reference ref_id="CVE-2018-16509" ref_url="https://www.suse.com/security/cve/CVE-2018-16509/" source="CVE"/>
		<reference ref_id="CVE-2018-16510" ref_url="https://www.suse.com/security/cve/CVE-2018-16510/" source="CVE"/>
		<reference ref_id="CVE-2018-16511" ref_url="https://www.suse.com/security/cve/CVE-2018-16511/" source="CVE"/>
		<reference ref_id="CVE-2018-16513" ref_url="https://www.suse.com/security/cve/CVE-2018-16513/" source="CVE"/>
		<reference ref_id="CVE-2018-16539" ref_url="https://www.suse.com/security/cve/CVE-2018-16539/" source="CVE"/>
		<reference ref_id="CVE-2018-16540" ref_url="https://www.suse.com/security/cve/CVE-2018-16540/" source="CVE"/>
		<reference ref_id="CVE-2018-16541" ref_url="https://www.suse.com/security/cve/CVE-2018-16541/" source="CVE"/>
		<reference ref_id="CVE-2018-16542" ref_url="https://www.suse.com/security/cve/CVE-2018-16542/" source="CVE"/>
		<reference ref_id="CVE-2018-16543" ref_url="https://www.suse.com/security/cve/CVE-2018-16543/" source="CVE"/>
		<reference ref_id="CVE-2018-16585" ref_url="https://www.suse.com/security/cve/CVE-2018-16585/" source="CVE"/>
		<reference ref_id="CVE-2018-16802" ref_url="https://www.suse.com/security/cve/CVE-2018-16802/" source="CVE"/>
		<reference ref_id="CVE-2018-17183" ref_url="https://www.suse.com/security/cve/CVE-2018-17183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<description>
This update for ghostscript to version 9.25 fixes the following issues:

These security issues were fixed:

- CVE-2018-17183: Remote attackers were be able to supply crafted PostScript to
  potentially overwrite or replace error handlers to inject code (bsc#1109105)
- CVE-2018-15909: Prevent type confusion using the .shfill operator that could
  have been used by attackers able to supply crafted PostScript files to crash
  the interpreter or potentially execute code (bsc#1106172).
- CVE-2018-15908: Prevent attackers that are able to supply malicious
  PostScript files to bypass .tempfile restrictions and write files
  (bsc#1106171).
- CVE-2018-15910: Prevent a type confusion in the LockDistillerParams parameter
  that could have been used to crash the interpreter or execute code
  (bsc#1106173).
- CVE-2018-15911: Prevent use uninitialized memory access in the aesdecode
  operator that could have been used to crash the interpreter or potentially
  execute code (bsc#1106195).
- CVE-2018-16513: Prevent a type confusion in the setcolor function that could
  have been used to crash the interpreter or possibly have unspecified other
  impact (bsc#1107412).
- CVE-2018-16509: Incorrect 'restoration of privilege' checking during handling
  of /invalidaccess exceptions could be have been used by attackers able to
  supply crafted PostScript to execute code using the 'pipe' instruction
  (bsc#1107410).
- CVE-2018-16510: Incorrect exec stack handling in the 'CS' and 'SC' PDF
  primitives could have been used by remote attackers able to supply crafted PDFs
  to crash the interpreter or possibly have unspecified other impact
  (bsc#1107411).
- CVE-2018-16542: Prevent attackers able to supply crafted PostScript files
  from using insufficient interpreter stack-size checking during error handling
  to crash the interpreter (bsc#1107413).
- CVE-2018-16541: Prevent attackers able to supply crafted PostScript files
  from using incorrect free logic in pagedevice replacement to crash the
  interpreter (bsc#1107421).
- CVE-2018-16540: Prevent use-after-free in copydevice handling that could have
  been used to crash the interpreter or possibly have unspecified other impact
  (bsc#1107420).
- CVE-2018-16539: Prevent attackers able to supply crafted PostScript files
  from using incorrect access checking in temp file handling to disclose contents
  of files on the system otherwise not readable (bsc#1107422).
- CVE-2018-16543: gssetresolution and gsgetresolution allowed attackers to have
  an unspecified impact (bsc#1107423).
- CVE-2018-16511: A type confusion in 'ztype' could have been used by remote
  attackers able to supply crafted PostScript to crash the interpreter or
  possibly have unspecified other impact (bsc#1107426).
- CVE-2018-16585: The .setdistillerkeys PostScript command was accepted even
  though it is not intended for use during document processing (e.g., after the
  startup phase). This lead to memory corruption, allowing remote attackers able
  to supply crafted PostScript to crash the interpreter or possibly have
  unspecified other impact (bsc#1107581).
- CVE-2018-16802: Incorrect 'restoration of privilege' checking when running
  out of stack during exception handling could have been used by attackers able
  to supply crafted PostScript to execute code using the 'pipe' instruction. This
  is due to an incomplete fix for CVE-2018-16509 (bsc#1108027).

These non-security issues were fixed:

* Fixes problems with argument handling, some unintended results of the
  security fixes to the SAFER file access restrictions (specifically accessing
  ICC profile files).
* Avoid that ps2epsi fails with 'Error: /undefined in --setpagedevice--'

For additional changes please check http://www.ghostscript.com/doc/9.25/News.htm
and the changes file of the package.
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-02"/>
	<updated date="2018-10-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1106171">SUSE bug 1106171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106172">SUSE bug 1106172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106173">SUSE bug 1106173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106195">SUSE bug 1106195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107410">SUSE bug 1107410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107411">SUSE bug 1107411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107412">SUSE bug 1107412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107413">SUSE bug 1107413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107420">SUSE bug 1107420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107421">SUSE bug 1107421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107422">SUSE bug 1107422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107423">SUSE bug 1107423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107426">SUSE bug 1107426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107581">SUSE bug 1107581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15908/">CVE-2018-15908</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15909/">CVE-2018-15909</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15910/">CVE-2018-15910</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15911/">CVE-2018-15911</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16509/">CVE-2018-16509</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16510/">CVE-2018-16510</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16511/">CVE-2018-16511</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16513/">CVE-2018-16513</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16539/">CVE-2018-16539</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16540/">CVE-2018-16540</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16541/">CVE-2018-16541</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16542/">CVE-2018-16542</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16543/">CVE-2018-16543</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16585/">CVE-2018-16585</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16802/">CVE-2018-16802</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17183/">CVE-2018-17183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78363" version="1" class="patch">
	<metadata>
		<title>Security update for mgetty (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1108752" ref_url="https://bugzilla.suse.com/1108752" source="BUGZILLA"/>
		<reference ref_id="1108756" ref_url="https://bugzilla.suse.com/1108756" source="BUGZILLA"/>
		<reference ref_id="1108757" ref_url="https://bugzilla.suse.com/1108757" source="BUGZILLA"/>
		<reference ref_id="1108761" ref_url="https://bugzilla.suse.com/1108761" source="BUGZILLA"/>
		<reference ref_id="1108762" ref_url="https://bugzilla.suse.com/1108762" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16741" ref_url="https://www.suse.com/security/cve/CVE-2018-16741/" source="CVE"/>
		<reference ref_id="CVE-2018-16742" ref_url="https://www.suse.com/security/cve/CVE-2018-16742/" source="CVE"/>
		<reference ref_id="CVE-2018-16743" ref_url="https://www.suse.com/security/cve/CVE-2018-16743/" source="CVE"/>
		<reference ref_id="CVE-2018-16744" ref_url="https://www.suse.com/security/cve/CVE-2018-16744/" source="CVE"/>
		<reference ref_id="CVE-2018-16745" ref_url="https://www.suse.com/security/cve/CVE-2018-16745/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004636.html" source="SUSE-SU"/>
		<description>
This update for mgetty fixes the following security issues:

- CVE-2018-16741: The function do_activate() did not properly sanitize shell
  metacharacters to prevent command injection (bsc#1108752)
- CVE-2018-16745: The mail_to parameter was not sanitized, leading to a buffer
  overflow if long untrusted input reached it (bsc#1108756)
- CVE-2018-16744: The mail_to parameter was not sanitized, leading to command
  injection if untrusted input reached reach it (bsc#1108757)
- CVE-2018-16742: Prevent stack-based buffer overflow that could have been
  triggered via a command-line parameter (bsc#1108762)
- CVE-2018-16743: The command-line parameter username wsa passed unsanitized to
  strcpy(), which could have caused a stack-based buffer overflow (bsc#1108761)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-02"/>
	<updated date="2018-10-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1108752">SUSE bug 1108752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108756">SUSE bug 1108756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108757">SUSE bug 1108757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108761">SUSE bug 1108761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108762">SUSE bug 1108762</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16741/">CVE-2018-16741</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16742/">CVE-2018-16742</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16743/">CVE-2018-16743</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16744/">CVE-2018-16744</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16745/">CVE-2018-16745</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520126" comment="g3utils-1.1.36-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520127" comment="mgetty-1.1.36-58.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78364" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1048510" ref_url="https://bugzilla.suse.com/1048510" source="BUGZILLA"/>
		<reference ref_id="1065276" ref_url="https://bugzilla.suse.com/1065276" source="BUGZILLA"/>
		<reference ref_id="1066156" ref_url="https://bugzilla.suse.com/1066156" source="BUGZILLA"/>
		<reference ref_id="1068251" ref_url="https://bugzilla.suse.com/1068251" source="BUGZILLA"/>
		<reference ref_id="1070428" ref_url="https://bugzilla.suse.com/1070428" source="BUGZILLA"/>
		<reference ref_id="1071558" ref_url="https://bugzilla.suse.com/1071558" source="BUGZILLA"/>
		<reference ref_id="1074254" ref_url="https://bugzilla.suse.com/1074254" source="BUGZILLA"/>
		<reference ref_id="1075724" ref_url="https://bugzilla.suse.com/1075724" source="BUGZILLA"/>
		<reference ref_id="1076308" ref_url="https://bugzilla.suse.com/1076308" source="BUGZILLA"/>
		<reference ref_id="897422" ref_url="https://bugzilla.suse.com/897422" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15908" ref_url="https://www.suse.com/security/cve/CVE-2017-15908/" source="CVE"/>
		<reference ref_id="CVE-2018-1049" ref_url="https://www.suse.com/security/cve/CVE-2018-1049/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003686.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes several issues.

This security issue was fixed:

- CVE-2018-1049: Prevent race that can lead to DoS when using automounts (bsc#1076308).

These non-security issues were fixed:

- core: don't choke if a unit another unit triggers vanishes during reload
- delta: don't ignore PREFIX when the given argument is PREFIX/SUFFIX
- delta: extend skip logic to work on full directory paths (prefix+suffix) (bsc#1070428)
- delta: check if a prefix needs to be skipped only once
- delta: skip symlink paths when split-usr is enabled (#4591)
- sysctl: use raw file descriptor in sysctl_write (#7753)
- sd-netlink: don't take possesion of netlink fd from caller on failure (bsc#1074254)
- Fix the regexp used to detect broken by-id symlinks in /etc/crypttab
  It was missing the following case: '/dev/disk/by-id/cr_-xxx'.
- sysctl: disable buffer while writing to /proc (bsc#1071558)
- Use read_line() and LONG_LINE_MAX to read values configuration files. (bsc#1071558)
- sysctl: no need to check for eof twice
- def: add new constant LONG_LINE_MAX
- fileio: add new helper call read_line() as bounded getline() replacement
- service: Don't stop unneeded units needed by restarted service (#7526) (bsc#1066156)
- gpt-auto-generator: fix the handling of the value returned by fstab_has_fstype() in add_swap() (#6280)
- gpt-auto-generator: disable gpt auto logic for swaps if at least one is defined in fstab (bsc#897422)
- fstab-util: introduce fstab_has_fstype() helper
- fstab-generator: ignore root=/dev/nfs (#3591)
- fstab-generator: don't process root= if it happens to be 'gpt-auto' (#3452)
- virt: use XENFEAT_dom0 to detect the hardware domain (#6442, #6662) (#7581) (bsc#1048510)
- analyze: replace --no-man with --man=no in the man page (bsc#1068251)
- udev: net_setup_link: don't error out when we couldn't apply link config (#7328)
- Add missing /etc/systemd/network directory
- Fix parsing of features in detect_vm_xen_dom0 (#7890) (bsc#1048510)
- sd-bus: use -- when passing arguments to ssh (#6706)
- systemctl: make sure we terminate the bus connection first, and then close the pager (#3550)
- sd-bus: bump message queue size (bsc#1075724)
- tmpfiles: downgrade warning about duplicate line
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-30"/>
	<updated date="2018-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1048510">SUSE bug 1048510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065276">SUSE bug 1065276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066156">SUSE bug 1066156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068251">SUSE bug 1068251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070428">SUSE bug 1070428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071558">SUSE bug 1071558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074254">SUSE bug 1074254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075724">SUSE bug 1075724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076308">SUSE bug 1076308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897422">SUSE bug 897422</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15908/">CVE-2017-15908</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1049/">CVE-2018-1049</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518810" comment="libsystemd0-228-150.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518811" comment="libsystemd0-32bit-228-150.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518812" comment="libudev1-228-150.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518813" comment="libudev1-32bit-228-150.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518814" comment="systemd-228-150.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518815" comment="systemd-32bit-228-150.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518816" comment="systemd-bash-completion-228-150.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518817" comment="systemd-sysvinit-228-150.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518818" comment="udev-228-150.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78365" version="1" class="patch">
	<metadata>
		<title>Security update for openslp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1090638" ref_url="https://bugzilla.suse.com/1090638" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004639.html" source="SUSE-SU"/>
		<description>
This update for openslp fixes the following issues:

- CVE-2017-17833: Prevent heap-related memory corruption issue which may have
  manifested itself as a denial-of-service or a remote code-execution
  vulnerability (bsc#1090638)
- Prevent out of bounds reads in message parsing
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-04"/>
	<updated date="2018-10-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090638">SUSE bug 1090638</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520128" comment="openslp-2.0.0-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520129" comment="openslp-32bit-2.0.0-18.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78366" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1044189" ref_url="https://bugzilla.suse.com/1044189" source="BUGZILLA"/>
		<reference ref_id="1063026" ref_url="https://bugzilla.suse.com/1063026" source="BUGZILLA"/>
		<reference ref_id="1066223" ref_url="https://bugzilla.suse.com/1066223" source="BUGZILLA"/>
		<reference ref_id="1082863" ref_url="https://bugzilla.suse.com/1082863" source="BUGZILLA"/>
		<reference ref_id="1082979" ref_url="https://bugzilla.suse.com/1082979" source="BUGZILLA"/>
		<reference ref_id="1084427" ref_url="https://bugzilla.suse.com/1084427" source="BUGZILLA"/>
		<reference ref_id="1084536" ref_url="https://bugzilla.suse.com/1084536" source="BUGZILLA"/>
		<reference ref_id="1087209" ref_url="https://bugzilla.suse.com/1087209" source="BUGZILLA"/>
		<reference ref_id="1088087" ref_url="https://bugzilla.suse.com/1088087" source="BUGZILLA"/>
		<reference ref_id="1090535" ref_url="https://bugzilla.suse.com/1090535" source="BUGZILLA"/>
		<reference ref_id="1091815" ref_url="https://bugzilla.suse.com/1091815" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1094555" ref_url="https://bugzilla.suse.com/1094555" source="BUGZILLA"/>
		<reference ref_id="1094562" ref_url="https://bugzilla.suse.com/1094562" source="BUGZILLA"/>
		<reference ref_id="1095344" ref_url="https://bugzilla.suse.com/1095344" source="BUGZILLA"/>
		<reference ref_id="1095753" ref_url="https://bugzilla.suse.com/1095753" source="BUGZILLA"/>
		<reference ref_id="1096547" ref_url="https://bugzilla.suse.com/1096547" source="BUGZILLA"/>
		<reference ref_id="1099810" ref_url="https://bugzilla.suse.com/1099810" source="BUGZILLA"/>
		<reference ref_id="1102495" ref_url="https://bugzilla.suse.com/1102495" source="BUGZILLA"/>
		<reference ref_id="1102715" ref_url="https://bugzilla.suse.com/1102715" source="BUGZILLA"/>
		<reference ref_id="1102870" ref_url="https://bugzilla.suse.com/1102870" source="BUGZILLA"/>
		<reference ref_id="1102875" ref_url="https://bugzilla.suse.com/1102875" source="BUGZILLA"/>
		<reference ref_id="1102877" ref_url="https://bugzilla.suse.com/1102877" source="BUGZILLA"/>
		<reference ref_id="1102879" ref_url="https://bugzilla.suse.com/1102879" source="BUGZILLA"/>
		<reference ref_id="1102882" ref_url="https://bugzilla.suse.com/1102882" source="BUGZILLA"/>
		<reference ref_id="1102896" ref_url="https://bugzilla.suse.com/1102896" source="BUGZILLA"/>
		<reference ref_id="1103156" ref_url="https://bugzilla.suse.com/1103156" source="BUGZILLA"/>
		<reference ref_id="1103269" ref_url="https://bugzilla.suse.com/1103269" source="BUGZILLA"/>
		<reference ref_id="1106095" ref_url="https://bugzilla.suse.com/1106095" source="BUGZILLA"/>
		<reference ref_id="1106434" ref_url="https://bugzilla.suse.com/1106434" source="BUGZILLA"/>
		<reference ref_id="1106512" ref_url="https://bugzilla.suse.com/1106512" source="BUGZILLA"/>
		<reference ref_id="1106594" ref_url="https://bugzilla.suse.com/1106594" source="BUGZILLA"/>
		<reference ref_id="1106934" ref_url="https://bugzilla.suse.com/1106934" source="BUGZILLA"/>
		<reference ref_id="1107924" ref_url="https://bugzilla.suse.com/1107924" source="BUGZILLA"/>
		<reference ref_id="1108096" ref_url="https://bugzilla.suse.com/1108096" source="BUGZILLA"/>
		<reference ref_id="1108170" ref_url="https://bugzilla.suse.com/1108170" source="BUGZILLA"/>
		<reference ref_id="1108240" ref_url="https://bugzilla.suse.com/1108240" source="BUGZILLA"/>
		<reference ref_id="1108399" ref_url="https://bugzilla.suse.com/1108399" source="BUGZILLA"/>
		<reference ref_id="1108803" ref_url="https://bugzilla.suse.com/1108803" source="BUGZILLA"/>
		<reference ref_id="1108823" ref_url="https://bugzilla.suse.com/1108823" source="BUGZILLA"/>
		<reference ref_id="1109333" ref_url="https://bugzilla.suse.com/1109333" source="BUGZILLA"/>
		<reference ref_id="1109336" ref_url="https://bugzilla.suse.com/1109336" source="BUGZILLA"/>
		<reference ref_id="1109337" ref_url="https://bugzilla.suse.com/1109337" source="BUGZILLA"/>
		<reference ref_id="1109441" ref_url="https://bugzilla.suse.com/1109441" source="BUGZILLA"/>
		<reference ref_id="1110297" ref_url="https://bugzilla.suse.com/1110297" source="BUGZILLA"/>
		<reference ref_id="1110337" ref_url="https://bugzilla.suse.com/1110337" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14613" ref_url="https://www.suse.com/security/cve/CVE-2018-14613/" source="CVE"/>
		<reference ref_id="CVE-2018-14617" ref_url="https://www.suse.com/security/cve/CVE-2018-14617/" source="CVE"/>
		<reference ref_id="CVE-2018-16276" ref_url="https://www.suse.com/security/cve/CVE-2018-16276/" source="CVE"/>
		<reference ref_id="CVE-2018-16597" ref_url="https://www.suse.com/security/cve/CVE-2018-16597/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<reference ref_id="CVE-2018-7480" ref_url="https://www.suse.com/security/cve/CVE-2018-7480/" source="CVE"/>
		<reference ref_id="CVE-2018-7757" ref_url="https://www.suse.com/security/cve/CVE-2018-7757/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3003-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183003-1.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.156 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-16597: Incorrect access checking in overlayfs mounts could have been
  used by local attackers to modify or truncate files in the underlying
  filesystem (bnc#1106512).
- CVE-2018-14613: Prevent invalid pointer dereference in io_ctl_map_page() when
  mounting and operating a crafted btrfs image, caused by a lack of block group
  item validation in check_leaf_item (bsc#1102896)
- CVE-2018-14617: Prevent NULL pointer dereference and panic in
  hfsplus_lookup() when opening a file (that is purportedly a hard link) in an
  hfs+ filesystem that has malformed catalog data, and is mounted read-only
  without a metadata directory (bsc#1102870)
- CVE-2018-16276: Incorrect bounds checking in the yurex USB driver in
  yurex_read allowed local attackers to use user access read/writes to crash the
  kernel or potentially escalate privileges (bsc#1106095)
- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in
  drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of
  service (memory consumption) via many read accesses to files in the
  /sys/class/sas_phy directory, as demonstrated by the
  /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1084536)
- CVE-2018-7480: The blkcg_init_queue function allowed local users to cause a
  denial of service (double free) or possibly have unspecified other impact by
  triggering a creation failure (bsc#1082863).
- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c
  mishandled sequence number overflows. An attacker can trigger a
  use-after-free (and possibly gain privileges) via certain thread creation,
  map, unmap, invalidation, and dereference operations (bnc#1108399).

The following non-security bugs were fixed:

- asm/sections: add helpers to check for section data (bsc#1063026).
- ASoC: wm8994: Fix missing break in switch (bnc#1012382).
- block: bvec_nr_vecs() returns value for wrong slab (bsc#1082979).
- bpf: fix overflow in prog accounting (bsc#1012382).
- btrfs: Add checker for EXTENT_CSUM (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: Add sanity check for EXTENT_DATA when reading out leaf (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: Check if item pointer overlaps with the item itself (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: Check that each block group has corresponding chunk at mount time (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: Introduce mount time chunk &lt;-&gt; dev extent mapping check (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: Move leaf and node validation checker to tree-checker.c (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized (bnc#1012382).
- btrfs: replace: Reset on-disk dev stats value after replace (bnc#1012382).
- btrfs: scrub: Do not use inode page cache in scrub_handle_errored_block() (bsc#1108096).
- btrfs: tree-checker: Add checker for dir item (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Detect invalid and empty essential trees (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Enhance btrfs_check_node output (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Enhance output for btrfs_check_leaf (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Enhance output for check_csum_item (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Enhance output for check_extent_data_item (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Fix false panic for sanity test (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Replace root parameter with fs_info (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: use %zu format string for size_t (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: use %zu format string for size_t (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Verify block_group_item (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: use correct compare function of dirty_metadata_bytes (bnc#1012382).
- btrfs: Verify that every chunk has corresponding block group at mount time (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- cifs: check if SMB2 PDU size has been padded and suppress the warning (bnc#1012382).
- crypto: clarify licensing of OpenSSL asm code ().
- crypto: vmx - Remove overly verbose printk from AES XTS init (git-fixes).
- debugobjects: Make stack check warning more informative (bnc#1012382).
- dm kcopyd: avoid softlockup in run_complete_job (bnc#1012382).
- dm-mpath: do not try to access NULL rq (bsc#1110337).
- EDAC: Fix memleak in module init error path (bsc#1109441).
- EDAC, i7core: Fix memleaks and use-after-free on probe and remove (1109441).
- fat: validate -&gt;i_start before using (bnc#1012382).
- Fixes: Commit cdbf92675fad ('mm: numa: avoid waiting on freed migrated pages') (bnc#1012382).
- Follow-up fix for patches.arch/01-jump_label-reduce-the-size-of-struct-static_key-kabi.patch (bsc#1108803).
- fork: do not copy inconsistent signal handler state to child (bnc#1012382).
- fs/dcache.c: fix kmemcheck splat at take_dentry_name_snapshot() (bnc#1012382).
- genirq: Delay incrementing interrupt count if it's disabled/pending (bnc#1012382).
- grow_cache: we still have a code which uses both __GFP_ZERO and constructors. The code seems to be correct and the warning does more harm than good so revert for the the meantime until we catch offenders. (bnc#1110297) 
- hfsplus: do not return 0 when fill_super() failed (bnc#1012382).
- hfs: prevent crash on exit from failed search (bnc#1012382).
- ib_srp: Remove WARN_ON in srp_terminate_io() (bsc#1094562).
- ipvs: fix race between ip_vs_conn_new() and ip_vs_del_dest() (bnc#1012382).
- irqchip/bcm7038-l1: Hide cpu offline callback when building for !SMP (bnc#1012382).
- irqchip/gic-v3: Add missing barrier to 32bit version of gic_read_iar() (bnc#1012382).
- kabi protect hnae_ae_ops (bsc#1107924).
- kbuild: make missing $DEPMOD a Warning instead of an Error (bnc#1012382).
- l2tp: cast l2tp traffic counter to unsigned (bsc#1099810).
- mei: me: allow runtime pm for platform with D0i3 (bnc#1012382).
- mfd: sm501: Set coherent_dma_mask when creating subdevices (bnc#1012382).
- mm/fadvise.c: fix signed overflow UBSAN complaint (bnc#1012382).
- net/9p: fix error path of p9_virtio_probe (bnc#1012382).
- net: bcmgenet: use MAC link status for fixed phy (bnc#1012382).
- net: ena: Eliminate duplicate barriers on weakly-ordered archs (bsc#1108240).
- net: ena: fix device destruction to gracefully free resources (bsc#1108240).
- net: ena: fix driver when PAGE_SIZE == 64kB (bsc#1108240).
- net: ena: fix incorrect usage of memory barriers (bsc#1108240).
- net: ena: fix missing calls to READ_ONCE (bsc#1108240).
- net: ena: fix missing lock during device destruction (bsc#1108240).
- net: ena: fix potential double ena_destroy_device() (bsc#1108240).
- net: ena: fix surprise unplug NULL dereference kernel crash (bsc#1108240).
- net: hns: add netif_carrier_off before change speed and duplex (bsc#1107924).
- net: hns: add the code for cleaning pkt in chip (bsc#1107924).
- nvme_fc: add 'nvme_discovery' sysfs attribute to fc transport device (bsc#1044189).
- nvmet: fixup crash on NULL device path (bsc#1082979).
- ovl: modify ovl_permission() to do checks on two inodes (bsc#1106512)
- ovl: proper cleanup of workdir (bnc#1012382).
- ovl: rename is_merge to is_lowest (bnc#1012382).
- PCI: mvebu: Fix I/O space end address calculation (bnc#1012382).
- platform/x86: asus-nb-wmi: Add keymap entry for lid flip action on UX360 (bnc#1012382).
- powerpc/64: Do load of PACAKBASE in LOAD_HANDLER (bsc#1094244).
- powerpc/book3s: Fix MCE console messages for unrecoverable MCE (bsc#1094244).
- powerpc/fadump: cleanup crash memory ranges support (bsc#1103269).
- powerpc/fadump: re-register firmware-assisted dump if already registered (bsc#1108170, bsc#1108823).
- powerpc: Fix size calculation using resource_size() (bnc#1012382).
- powerpc/mce: Move 64-bit machine check code into mce.c (bsc#1094244).
- powerpc/perf/hv-24x7: Fix off-by-one error in request_buffer check (git-fixes).
- powerpc/powernv/ioda2: Reduce upper limit for DMA window size (bsc#1066223).
- powerpc/powernv: Rename machine_check_pSeries_early() to powernv (bsc#1094244).
- powerpc/pseries: Avoid using the size greater than RTAS_ERROR_LOG_MAX (bnc#1012382).
- powerpc/pseries: Disable CPU hotplug across migrations (bsc#1066223).
- powerpc/pseries: Remove prrn_work workqueue (bsc#1102495, bsc#1109337).
- powerpc/pseries: Remove unneeded uses of dlpar work queue (bsc#1102495, bsc#1109337).
- powerpc/tm: Fix userspace r13 corruption (bsc#1109333).
- RDMA/rw: Fix rdma_rw_ctx_signature_init() kernel-doc header (bsc#1082979).
- reiserfs: change j_timestamp type to time64_t (bnc#1012382).
- Revert 'ARM: imx_v6_v7_defconfig: Select ULPI support' (bnc#1012382).
- s390/dasd: fix hanging offline processing due to canceled worker (bnc#1012382).
- s390/lib: use expoline for all bcr instructions (LTC#171029 bnc#1012382 bnc#1106934).
- sch_hhf: fix null pointer dereference on init failure (bnc#1012382).
- sch_htb: fix crash on init failure (bnc#1012382).
- sch_multiq: fix double free on init failure (bnc#1012382).
- sch_netem: avoid null pointer deref on init failure (bnc#1012382).
- sch_tbf: fix two null pointer dereferences on init failure (bnc#1012382).
- scripts: modpost: check memory allocation results (bnc#1012382).
- scsi: aic94xx: fix an error code in aic94xx_init() (bnc#1012382).
- scsi: ipr: System hung while dlpar adding primary ipr adapter back (bsc#1109336).
- scsi: qla2xxx: Add changes for devloss timeout in driver (bsc#1084427).
- scsi: qla2xxx: Add FC-NVMe abort processing (bsc#1084427).
- scsi: qla2xxx: Add longer window for chip reset (bsc#1094555).
- scsi: qla2xxx: Avoid double completion of abort command (bsc#1094555).
- scsi: qla2xxx: Cleanup code to improve FC-NVMe error handling (bsc#1084427).
- scsi: qla2xxx: Cleanup for N2N code (bsc#1094555).
- scsi: qla2xxx: correctly shift host byte (bsc#1094555).
- scsi: qla2xxx: Correct setting of SAM_STAT_CHECK_CONDITION (bsc#1094555).
- scsi: qla2xxx: Delete session for nport id change (bsc#1094555).
- scsi: qla2xxx: Fix Async GPN_FT for FCP and FC-NVMe scan (bsc#1084427).
- scsi: qla2xxx: Fix crash on qla2x00_mailbox_command (bsc#1094555).
- scsi: qla2xxx: Fix double free bug after firmware timeout (bsc#1094555).
- scsi: qla2xxx: Fix driver unload by shutting down chip (bsc#1094555).
- scsi: qla2xxx: fix error message on &lt;qla2400 (bsc#1094555).
- scsi: qla2xxx: Fix FC-NVMe IO abort during driver reset (bsc#1084427).
- scsi: qla2xxx: Fix function argument descriptions (bsc#1094555).
- scsi: qla2xxx: Fix Inquiry command being dropped in Target mode (bsc#1094555).
- scsi: qla2xxx: Fix issue reported by static checker for qla2x00_els_dcmd2_sp_done() (bsc#1094555).
- scsi: qla2xxx: Fix login retry count (bsc#1094555).
- scsi: qla2xxx: Fix Management Server NPort handle reservation logic (bsc#1094555).
- scsi: qla2xxx: Fix memory leak for allocating abort IOCB (bsc#1094555).
- scsi: qla2xxx: Fix n2n_ae flag to prevent dev_loss on PDB change (bsc#1084427).
- scsi: qla2xxx: Fix N2N link re-connect (bsc#1094555).
- scsi: qla2xxx: Fix NPIV deletion by calling wait_for_sess_deletion (bsc#1094555).
- scsi: qla2xxx: Fix race between switch cmd completion and timeout (bsc#1094555).
- scsi: qla2xxx: Fix race condition between iocb timeout and initialisation (bsc#1094555).
- scsi: qla2xxx: Fix redundant fc_rport registration (bsc#1094555).
- scsi: qla2xxx: Fix retry for PRLI RJT with reason of BUSY (bsc#1084427).
- scsi: qla2xxx: Fix Rport and session state getting out of sync (bsc#1094555).
- scsi: qla2xxx: Fix sending ADISC command for login (bsc#1094555).
- scsi: qla2xxx: Fix session state stuck in Get Port DB (bsc#1094555).
- scsi: qla2xxx: Fix stalled relogin (bsc#1094555).
- scsi: qla2xxx: Fix TMF and Multi-Queue config (bsc#1094555).
- scsi: qla2xxx: Fix unintended Logout (bsc#1094555).
- scsi: qla2xxx: Fix unintialized List head crash (bsc#1094555).
- scsi: qla2xxx: Flush mailbox commands on chip reset (bsc#1094555).
- scsi: qla2xxx: fx00 copypaste typo (bsc#1094555).
- scsi: qla2xxx: Migrate NVME N2N handling into state machine (bsc#1094555).
- scsi: qla2xxx: Move GPSC and GFPNID out of session management (bsc#1094555).
- scsi: qla2xxx: Prevent relogin loop by removing stale code (bsc#1094555).
- scsi: qla2xxx: Prevent sysfs access when chip is down (bsc#1094555).
- scsi: qla2xxx: Reduce redundant ADISC command for RSCNs (bsc#1094555).
- scsi: qla2xxx: remove irq save in qla2x00_poll() (bsc#1094555).
- scsi: qla2xxx: Remove nvme_done_list (bsc#1084427).
- scsi: qla2xxx: Remove stale debug value for login_retry flag (bsc#1094555).
- scsi: qla2xxx: Remove unneeded message and minor cleanup for FC-NVMe (bsc#1084427).
- scsi: qla2xxx: Restore ZIO threshold setting (bsc#1084427).
- scsi: qla2xxx: Return busy if rport going away (bsc#1084427).
- scsi: qla2xxx: Save frame payload size from ICB (bsc#1094555).
- scsi: qla2xxx: Set IIDMA and fcport state before qla_nvme_register_remote() (bsc#1084427).
- scsi: qla2xxx: Silent erroneous message (bsc#1094555).
- scsi: qla2xxx: Update driver version to 10.00.00.06-k (bsc#1084427).
- scsi: qla2xxx: Update driver version to 10.00.00.07-k (bsc#1094555).
- scsi: qla2xxx: Update driver version to 10.00.00.08-k (bsc#1094555).
- scsi: qla2xxx: Use dma_pool_zalloc() (bsc#1094555).
- scsi: qla2xxx: Use predefined get_datalen_for_atio() inline function (bsc#1094555).
- selftests/powerpc: Kill child processes on SIGINT (bnc#1012382).
- smb3: fix reset of bytes read and written stats (bnc#1012382).
- SMB3: Number of requests sent should be displayed for SMB3 not just CIFS (bnc#1012382).
- staging: android: ion: fix ION_IOC_{MAP,SHARE} use-after-free (bnc#1012382).
- staging: comedi: ni_mio_common: fix subdevice flags for PFI subdevice (bnc#1012382).
- tcp: do not restart timewait timer on rst reception (bnc#1012382).
- Update patches.suse/dm-Always-copy-cmd_flags-when-cloning-a-request.patch (bsc#1088087, bsc#1103156).
- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1096547).
- vti6: remove !skb-&gt;ignore_df check from vti6_xmit() (bnc#1012382).
- watchdog: w83627hf_wdt: Add quirk for Inves system (bsc#1106434).
- x86/entry/64: Remove %ebx handling from error_entry/exit (bnc#1102715).
- x86/pae: use 64 bit atomic xchg function in native_ptep_get_and_clear (bnc#1012382).
- x86/speculation/l1tf: Fix up pte-&gt;pfn conversion for PAE (bnc#1012382).
- xen: avoid crash in disable_hotplug_cpu (bsc#1106594).
- xfs: add a new xfs_iext_lookup_extent_before helper (bsc#1095344).
- xfs: add asserts for the mmap lock in xfs_{insert,collapse}_file_space (bsc#1095344).
- xfs: add a xfs_bmap_fork_to_state helper (bsc#1095344).
- xfs: add a xfs_iext_update_extent helper (bsc#1095344).
- xfs: add comments documenting the rebalance algorithm (bsc#1095344).
- xfs: add some comments to xfs_iext_insert/xfs_iext_insert_node (bsc#1095344).
- xfs: add xfs_trim_extent (bsc#1095344).
- xfs: allow unaligned extent records in xfs_bmbt_disk_set_all (bsc#1095344).
- xfs: borrow indirect blocks from freed extent when available (bsc#1095344).
- xfs: cleanup xfs_bmap_last_before (bsc#1095344).
- xfs: do not create overlapping extents in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: do not rely on extent indices in xfs_bmap_collapse_extents (bsc#1095344).
- xfs: do not rely on extent indices in xfs_bmap_insert_extents (bsc#1095344).
- xfs: do not set XFS_BTCUR_BPRV_WASDEL in xfs_bunmapi (bsc#1095344).
- xfs: during btree split, save new block key and ptr for future insertion (bsc#1095344).
- xfs: factor out a helper to initialize a local format inode fork (bsc#1095344).
- xfs: fix memory leak in xfs_iext_free_last_leaf (bsc#1095344).
- xfs: fix number of records handling in xfs_iext_split_leaf (bsc#1095344).
- xfs: fix transaction allocation deadlock in IO path (bsc#1090535).
- xfs: handle indlen shortage on delalloc extent merge (bsc#1095344).
- xfs: handle zero entries case in xfs_iext_rebalance_leaf (bsc#1095344).
- xfs: improve kmem_realloc (bsc#1095344).
- xfs: inline xfs_shift_file_space into callers (bsc#1095344).
- xfs: introduce the xfs_iext_cursor abstraction (bsc#1095344).
- xfs: iterate over extents in xfs_bmap_extents_to_btree (bsc#1095344).
- xfs: iterate over extents in xfs_iextents_copy (bsc#1095344).
- xfs: make better use of the 'state' variable in xfs_bmap_del_extent_real (bsc#1095344).
- xfs: merge xfs_bmap_read_extents into xfs_iread_extents (bsc#1095344).
- xfs: move pre/post-bmap tracing into xfs_iext_update_extent (bsc#1095344).
- xfs: move some code around inside xfs_bmap_shift_extents (bsc#1095344).
- xfs: move some more code into xfs_bmap_del_extent_real (bsc#1095344).
- xfs: move xfs_bmbt_irec and xfs_exntst_t to xfs_types.h (bsc#1095344).
- xfs: move xfs_iext_insert tracepoint to report useful information (bsc#1095344).
- xfs: new inode extent list lookup helpers (bsc#1095344).
- xfs: only run torn log write detection on dirty logs (bsc#1095753).
- xfs: pass an on-disk extent to xfs_bmbt_validate_extent (bsc#1095344).
- xfs: pass a struct xfs_bmbt_irec to xfs_bmbt_lookup_eq (bsc#1095344).
- xfs: pass a struct xfs_bmbt_irec to xfs_bmbt_update (bsc#1095344).
- xfs: pass struct xfs_bmbt_irec to xfs_bmbt_validate_extent (bsc#1095344).
- xfs: provide helper for counting extents from if_bytes (bsc#1095344).
- xfs: refactor delalloc accounting in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: refactor delalloc indlen reservation split into helper (bsc#1095344).
- xfs: refactor dir2 leaf readahead shadow buffer cleverness (bsc#1095344).
- xfs: refactor in-core log state update to helper (bsc#1095753).
- xfs: refactor unmount record detection into helper (bsc#1095753).
- xfs: refactor xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_hole_delay (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_hole_real (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_unwritten_real (bsc#1095344).
- xfs: refactor xfs_bunmapi_cow (bsc#1095344).
- xfs: refactor xfs_del_extent_real (bsc#1095344).
- xfs: remove a duplicate assignment in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: remove all xfs_bmbt_set_* helpers except for xfs_bmbt_set_all (bsc#1095344).
- xfs: remove a superflous assignment in xfs_iext_remove_node (bsc#1095344).
- xfs: remove if_rdev (bsc#1095344).
- xfs: remove prev argument to xfs_bmapi_reserve_delalloc (bsc#1095344).
- xfs: remove support for inlining data/extents into the inode fork (bsc#1095344).
- xfs: remove the never fully implemented UUID fork format (bsc#1095344).
- xfs: remove the nr_extents argument to xfs_iext_insert (bsc#1095344).
- xfs: remove the nr_extents argument to xfs_iext_remove (bsc#1095344).
- xfs: remove XFS_BMAP_MAX_SHIFT_EXTENTS (bsc#1095344).
- xfs: remove XFS_BMAP_TRACE_EXLIST (bsc#1095344).
- xfs: remove xfs_bmbt_get_state (bsc#1095344).
- xfs: remove xfs_bmse_shift_one (bsc#1095344).
- xfs: rename bno to end in __xfs_bunmapi (bsc#1095344).
- xfs: replace xfs_bmbt_lookup_ge with xfs_bmbt_lookup_first (bsc#1095344).
- xfs: replace xfs_qm_get_rtblks with a direct call to xfs_bmap_count_leaves (bsc#1095344).
- xfs: rewrite getbmap using the xfs_iext_* helpers (bsc#1095344).
- xfs: rewrite xfs_bmap_count_leaves using xfs_iext_get_extent (bsc#1095344).
- xfs: rewrite xfs_bmap_first_unused to make better use of xfs_iext_get_extent (bsc#1095344).
- xfs: separate log head record discovery from verification (bsc#1095753).
- xfs: simplify the xfs_getbmap interface (bsc#1095344).
- xfs: simplify validation of the unwritten extent bit (bsc#1095344).
- xfs: split indlen reservations fairly when under reserved (bsc#1095344).
- xfs: split xfs_bmap_shift_extents (bsc#1095344).
- xfs: switch xfs_bmap_local_to_extents to use xfs_iext_insert (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_hole_delay (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_hole_real (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_unwritten_real (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_collapse_extents (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_del_extent_* (bsc#1095344).
- xfs: update freeblocks counter after extent deletion (bsc#1095344).
- xfs: update got in xfs_bmap_shift_update_extent (bsc#1095344).
- xfs: use a b+tree for the in-core extent list (bsc#1095344).
- xfs: use correct state defines in xfs_bmap_del_extent_{cow,delay} (bsc#1095344).
- xfs: use new extent lookup helpers in xfs_bmapi_read (bsc#1095344).
- xfs: use new extent lookup helpers in xfs_bmapi_write (bsc#1095344).
- xfs: use new extent lookup helpers in __xfs_bunmapi (bsc#1095344).
- xfs: use the state defines in xfs_bmap_del_extent_real (bsc#1095344).
- xfs: use xfs_bmap_del_extent_delay for the data fork as well (bsc#1095344).
- xfs: use xfs_iext_*_extent helpers in xfs_bmap_shift_extents (bsc#1095344).
- xfs: use xfs_iext_*_extent helpers in xfs_bmap_split_extent_at (bsc#1095344).
- xfs: use xfs_iext_get_extent instead of open coding it (bsc#1095344).
- xfs: use xfs_iext_get_extent in xfs_bmap_first_unused (bsc#1095344).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-04"/>
	<updated date="2018-10-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044189">SUSE bug 1044189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063026">SUSE bug 1063026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066223">SUSE bug 1066223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082863">SUSE bug 1082863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082979">SUSE bug 1082979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084427">SUSE bug 1084427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084536">SUSE bug 1084536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087209">SUSE bug 1087209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088087">SUSE bug 1088087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090535">SUSE bug 1090535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094555">SUSE bug 1094555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094562">SUSE bug 1094562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095344">SUSE bug 1095344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095753">SUSE bug 1095753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096547">SUSE bug 1096547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099810">SUSE bug 1099810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102495">SUSE bug 1102495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102715">SUSE bug 1102715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102870">SUSE bug 1102870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102875">SUSE bug 1102875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102877">SUSE bug 1102877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102879">SUSE bug 1102879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102882">SUSE bug 1102882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102896">SUSE bug 1102896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103156">SUSE bug 1103156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103269">SUSE bug 1103269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106095">SUSE bug 1106095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106434">SUSE bug 1106434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106512">SUSE bug 1106512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106594">SUSE bug 1106594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106934">SUSE bug 1106934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107924">SUSE bug 1107924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108096">SUSE bug 1108096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108170">SUSE bug 1108170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108240">SUSE bug 1108240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108399">SUSE bug 1108399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108803">SUSE bug 1108803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108823">SUSE bug 1108823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109333">SUSE bug 1109333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109336">SUSE bug 1109336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109337">SUSE bug 1109337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109441">SUSE bug 1109441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110297">SUSE bug 1110297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110337">SUSE bug 1110337</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14613/">CVE-2018-14613</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14617/">CVE-2018-14617</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16276/">CVE-2018-16276</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16597/">CVE-2018-16597</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7480/">CVE-2018-7480</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7757/">CVE-2018-7757</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520130" comment="kernel-default-4.4.156-94.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520131" comment="kernel-default-devel-4.4.156-94.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520132" comment="kernel-default-extra-4.4.156-94.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520133" comment="kernel-devel-4.4.156-94.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520134" comment="kernel-macros-4.4.156-94.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520135" comment="kernel-source-4.4.156-94.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520136" comment="kernel-syms-4.4.156-94.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78367" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1076832" ref_url="https://bugzilla.suse.com/1076832" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6003" ref_url="https://www.suse.com/security/cve/CVE-2018-6003/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003682.html" source="SUSE-SU"/>
		<description>
This update for libtasn1 fixes one issue.

This security issue was fixed:

- CVE-2018-6003: Prevent a stack exhaustion in  _asn1_decode_simple_ber
  (lib/decoding.c) when decoding BER encoded structure allowed for DoS
  (bsc#1076832).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-30"/>
	<updated date="2018-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076832">SUSE bug 1076832</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6003/">CVE-2018-6003</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520137" comment="libtasn1-4.9-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520138" comment="libtasn1-6-4.9-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520139" comment="libtasn1-6-32bit-4.9-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78368" version="1" class="patch">
	<metadata>
		<title>Security update for texlive (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1109673" ref_url="https://bugzilla.suse.com/1109673" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17407" ref_url="https://www.suse.com/security/cve/CVE-2018-17407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004647.html" source="SUSE-SU"/>
		<description>
This update for texlive fixes the following issue:

- CVE-2018-17407: Prevent buffer overflow when handling of Type 1 fonts allowed
  arbitrary code execution when a malicious font was loaded by one of the
  vulnerable tools: pdflatex, pdftex, dvips, or luatex (bsc#1109673)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-05"/>
	<updated date="2018-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109673">SUSE bug 1109673</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17407/">CVE-2018-17407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520140" comment="libkpathsea6-6.2.0dev-22.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78369" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1101644" ref_url="https://bugzilla.suse.com/1101644" source="BUGZILLA"/>
		<reference ref_id="1101645" ref_url="https://bugzilla.suse.com/1101645" source="BUGZILLA"/>
		<reference ref_id="1101651" ref_url="https://bugzilla.suse.com/1101651" source="BUGZILLA"/>
		<reference ref_id="1101656" ref_url="https://bugzilla.suse.com/1101656" source="BUGZILLA"/>
		<reference ref_id="1106812" ref_url="https://bugzilla.suse.com/1106812" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2938" ref_url="https://www.suse.com/security/cve/CVE-2018-2938/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004649.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to the jdk8u181 (icedtea 3.9.0) release fixes the following issues:

These security issues were fixed:

- CVE-2018-2938: Difficult to exploit vulnerability allowed unauthenticated
  attacker with network access via multiple protocols to compromise Java SE.
  Successful attacks of this vulnerability can result in takeover of Java SE
  (bsc#1101644).
- CVE-2018-2940: Vulnerability in subcomponent: Libraries. Easily exploitable
  vulnerability allowed unauthenticated attacker with network access via multiple
  protocols to compromise Java SE, Java SE Embedded. Successful attacks require
  human interaction from a person other than the attacker. Successful attacks of
  this vulnerability can result in unauthorized read access to a subset of Java
  SE, Java SE Embedded accessible data (bsc#1101645)
- CVE-2018-2952: Vulnerability in subcomponent: Concurrency. Difficult to
  exploit vulnerability allowed unauthenticated attacker with network access via
  multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful
  attacks of this vulnerability can result in unauthorized ability to cause a
  partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit
  (bsc#1101651)
- CVE-2018-2973: Vulnerability in subcomponent: JSSE. Difficult to exploit
  vulnerability allowed unauthenticated attacker with network access via SSL/TLS
  to compromise Java SE, Java SE Embedded. Successful attacks of this
  vulnerability can result in unauthorized creation, deletion or modification
  access to critical data or all Java SE, Java SE Embedded accessible data
  (bsc#1101656)

These non-security issues were fixed:

- Improve desktop file usage
- Better Internet address support
- speculative traps break when classes are redefined
- sun/security/pkcs11/ec/ReadCertificates.java fails intermittently
- Clean up code that saves the previous versions of redefined classes
- Prevent SIGSEGV in ReceiverTypeData::clean_weak_klass_links
- RedefineClasses() tests fail assert(((Metadata*)obj)-&gt;is_valid()) failed: obj is valid
- NMT is not enabled if NMT option is specified after class path specifiers
- EndEntityChecker should not process custom extensions after PKIX validation
- SupportedDSAParamGen.java failed with timeout
- Montgomery multiply intrinsic should use correct name
- When determining the ciphersuite lists, there is no debug output for disabled suites.
- sun/security/mscapi/SignedObjectChain.java fails on Windows
- On Windows Swing changes keyboard layout on a window activation
- IfNode::range_check_trap_proj() should handler dying subgraph with single if proj
- Even better Internet address support
- Newlines in JAXB string values of SOAP-requests are escaped to '&amp;#xa;'
- TestFlushableGZIPOutputStream failing with IndexOutOfBoundsException
- Unable to use JDWP API in JDK 8 to debug JDK 9 VM
- Hotspot crash on Cassandra 3.11.1 startup with libnuma 2.0.3
- Performance drop with Java JDK 1.8.0_162-b32
- Upgrade time-zone data to tzdata2018d
- Fix potential crash in BufImg_SetupICM
- JDK 8u181 l10n resource file update
- Remove debug print statements from RMI fix
- (tz) Upgrade time-zone data to tzdata2018e
- ObjectInputStream filterCheck method throws NullPointerException
- adjust reflective access checks
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-08"/>
	<updated date="2018-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101644">SUSE bug 1101644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101651">SUSE bug 1101651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106812">SUSE bug 1106812</bugzilla>
	<cve impact="low" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2938/">CVE-2018-2938</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520141" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520142" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78370" version="1" class="patch">
	<metadata>
		<title>Security update for qpdf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1040311" ref_url="https://bugzilla.suse.com/1040311" source="BUGZILLA"/>
		<reference ref_id="1040312" ref_url="https://bugzilla.suse.com/1040312" source="BUGZILLA"/>
		<reference ref_id="1040313" ref_url="https://bugzilla.suse.com/1040313" source="BUGZILLA"/>
		<reference ref_id="1050577" ref_url="https://bugzilla.suse.com/1050577" source="BUGZILLA"/>
		<reference ref_id="1050578" ref_url="https://bugzilla.suse.com/1050578" source="BUGZILLA"/>
		<reference ref_id="1050579" ref_url="https://bugzilla.suse.com/1050579" source="BUGZILLA"/>
		<reference ref_id="1050581" ref_url="https://bugzilla.suse.com/1050581" source="BUGZILLA"/>
		<reference ref_id="1055960" ref_url="https://bugzilla.suse.com/1055960" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11624" ref_url="https://www.suse.com/security/cve/CVE-2017-11624/" source="CVE"/>
		<reference ref_id="CVE-2017-11625" ref_url="https://www.suse.com/security/cve/CVE-2017-11625/" source="CVE"/>
		<reference ref_id="CVE-2017-11626" ref_url="https://www.suse.com/security/cve/CVE-2017-11626/" source="CVE"/>
		<reference ref_id="CVE-2017-11627" ref_url="https://www.suse.com/security/cve/CVE-2017-11627/" source="CVE"/>
		<reference ref_id="CVE-2017-12595" ref_url="https://www.suse.com/security/cve/CVE-2017-12595/" source="CVE"/>
		<reference ref_id="CVE-2017-9208" ref_url="https://www.suse.com/security/cve/CVE-2017-9208/" source="CVE"/>
		<reference ref_id="CVE-2017-9209" ref_url="https://www.suse.com/security/cve/CVE-2017-9209/" source="CVE"/>
		<reference ref_id="CVE-2017-9210" ref_url="https://www.suse.com/security/cve/CVE-2017-9210/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004650.html" source="SUSE-SU"/>
		<description>

  
This update for qpdf fixes the following issues:

qpdf was updated to 7.1.1.

Security issues fixed:

- CVE-2017-11627: A stack-consumption vulnerability which allows attackers to cause DoS (bsc#1050577).
- CVE-2017-11625: A stack-consumption vulnerability which allows attackers to cause DoS (bsc#1050579).
- CVE-2017-11626: A stack-consumption vulnerability which allows attackers to cause DoS (bsc#1050578).
- CVE-2017-11624: A stack-consumption vulnerability which allows attackers to cause DoS (bsc#1050581).
- CVE-2017-12595: Stack overflow when processing deeply nested arrays and dictionaries (bsc#1055960).
- CVE-2017-9209: Remote attackers can cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document (bsc#1040312).
- CVE-2017-9210: Remote attackers can cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document (bsc#1040313).
- CVE-2017-9208: Remote attackers can cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document (bsc#1040311).

  * Check release notes for detailed bug fixes.
  * http://qpdf.sourceforge.net/files/qpdf-manual.html#ref.release-notes

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-08"/>
	<updated date="2018-10-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040311">SUSE bug 1040311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040312">SUSE bug 1040312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040313">SUSE bug 1040313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050577">SUSE bug 1050577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050578">SUSE bug 1050578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050579">SUSE bug 1050579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050581">SUSE bug 1050581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055960">SUSE bug 1055960</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11624/">CVE-2017-11624</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11625/">CVE-2017-11625</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11626/">CVE-2017-11626</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11627/">CVE-2017-11627</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12595/">CVE-2017-12595</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9208/">CVE-2017-9208</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9209/">CVE-2017-9209</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9210/">CVE-2017-9210</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520143" comment="cups-filters-1.0.58-19.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520144" comment="cups-filters-cups-browsed-1.0.58-19.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520145" comment="cups-filters-foomatic-rip-1.0.58-19.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520146" comment="cups-filters-ghostscript-1.0.58-19.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520147" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78371" version="1" class="patch">
	<metadata>
		<title>Security update for soundtouch (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1103676" ref_url="https://bugzilla.suse.com/1103676" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000223" ref_url="https://www.suse.com/security/cve/CVE-2018-1000223/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004652.html" source="SUSE-SU"/>
		<description>
This update for soundtouch fixes the following security issue:

- CVE-2018-1000223: Prevent buffer overflow in WavInFile::readHeaderBlock()
  that could have resulted in arbitrary code execution when opening maliocius
  file in soundstretch utility (bsc#1103676)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-08"/>
	<updated date="2018-10-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103676">SUSE bug 1103676</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000223/">CVE-2018-1000223</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520148" comment="libSoundTouch0-1.7.1-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520149" comment="libSoundTouch0-32bit-1.7.1-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520150" comment="soundtouch-1.7.1-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78372" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1108308" ref_url="https://bugzilla.suse.com/1108308" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004655.html" source="SUSE-SU"/>
		<description>

This update for brings postgresql10 version 10.5 to SUSE Linux Enterprise 12 SP3. (FATE#325659 bnc#1108308)

This release marks the change of the versioning scheme for PostgreSQL
to a 'x.y' format. This means the next minor releases of PostgreSQL
will be 10.1, 10.2, ... and the next major release will be 11.

* Logical Replication

Logical replication extends the current replication features of
PostgreSQL with the ability to send modifications on a per-database
and per-table level to different PostgreSQL databases. Users can now
fine-tune the data replicated to various database clusters and will
have the ability to perform zero-downtime upgrades to future major
PostgreSQL versions.

* Declarative Table Partitioning

Table partitioning has existed for years in PostgreSQL but required a
user to maintain a nontrivial set of rules and triggers for the
partitioning to work. PostgreSQL 10 introduces a table partitioning
syntax that lets users easily create and maintain range and list
partitioned tables.

* Improved Query Parallelism

PostgreSQL 10 provides better support for parallelized queries by
allowing more parts of the query execution process to be
parallelized. Improvements include additional types of data scans that
are parallelized as well as optimizations when the data is recombined,
such as pre-sorting. These enhancements allow results to be returned
more quickly.

* Quorum Commit for Synchronous Replication

PostgreSQL 10 introduces quorum commit for synchronous replication,
which allows for flexibility in how a primary database receives
acknowledgement that changes were successfully written to remote
replicas.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-08"/>
	<updated date="2018-10-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1108308">SUSE bug 1108308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520151" comment="libecpg6-10.5-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520152" comment="libpq5-10.5-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520153" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520154" comment="postgresql10-10.5-1.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78373" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1088279" ref_url="https://bugzilla.suse.com/1088279" source="BUGZILLA"/>
		<reference ref_id="1088601" ref_url="https://bugzilla.suse.com/1088601" source="BUGZILLA"/>
		<reference ref_id="1102046" ref_url="https://bugzilla.suse.com/1102046" source="BUGZILLA"/>
		<reference ref_id="1105166" ref_url="https://bugzilla.suse.com/1105166" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18258" ref_url="https://www.suse.com/security/cve/CVE-2017-18258/" source="CVE"/>
		<reference ref_id="CVE-2018-14404" ref_url="https://www.suse.com/security/cve/CVE-2018-14404/" source="CVE"/>
		<reference ref_id="CVE-2018-14567" ref_url="https://www.suse.com/security/cve/CVE-2018-14567/" source="CVE"/>
		<reference ref_id="CVE-2018-9251" ref_url="https://www.suse.com/security/cve/CVE-2018-9251/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004657.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following security issues:

- CVE-2018-9251: The xz_decomp function allowed remote attackers to cause a
  denial of service (infinite loop) via a crafted XML file that triggers
  LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint (bsc#1088279).
- CVE-2018-14567: Prevent denial of service (infinite loop) via a crafted XML
  file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint
  (bsc#1105166).
- CVE-2018-14404: Prevent NULL pointer dereference in the xmlXPathCompOpEval()
  function when parsing an invalid XPath expression in the XPATH_OP_AND or
  XPATH_OP_OR case leading to a denial of service attack (bsc#1102046).
- CVE-2017-18258: The xz_head function allowed remote attackers to cause a
  denial of service (memory consumption) via a crafted LZMA file, because the
  decoder functionality did not restrict memory usage to what is required for a
  legitimate file (bsc#1088601).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-09"/>
	<updated date="2018-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1088279">SUSE bug 1088279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088601">SUSE bug 1088601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102046">SUSE bug 1102046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105166">SUSE bug 1105166</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18258/">CVE-2017-18258</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14404/">CVE-2018-14404</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14567/">CVE-2018-14567</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9251/">CVE-2018-9251</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520155" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520156" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520157" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520158" comment="python-libxml2-2.9.4-46.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78374" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1050129" ref_url="https://bugzilla.suse.com/1050129" source="BUGZILLA"/>
		<reference ref_id="1105592" ref_url="https://bugzilla.suse.com/1105592" source="BUGZILLA"/>
		<reference ref_id="1106989" ref_url="https://bugzilla.suse.com/1106989" source="BUGZILLA"/>
		<reference ref_id="1107604" ref_url="https://bugzilla.suse.com/1107604" source="BUGZILLA"/>
		<reference ref_id="1107609" ref_url="https://bugzilla.suse.com/1107609" source="BUGZILLA"/>
		<reference ref_id="1107612" ref_url="https://bugzilla.suse.com/1107612" source="BUGZILLA"/>
		<reference ref_id="1107616" ref_url="https://bugzilla.suse.com/1107616" source="BUGZILLA"/>
		<reference ref_id="1107619" ref_url="https://bugzilla.suse.com/1107619" source="BUGZILLA"/>
		<reference ref_id="1108282" ref_url="https://bugzilla.suse.com/1108282" source="BUGZILLA"/>
		<reference ref_id="1108283" ref_url="https://bugzilla.suse.com/1108283" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11532" ref_url="https://www.suse.com/security/cve/CVE-2017-11532/" source="CVE"/>
		<reference ref_id="CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413/" source="CVE"/>
		<reference ref_id="CVE-2018-16640" ref_url="https://www.suse.com/security/cve/CVE-2018-16640/" source="CVE"/>
		<reference ref_id="CVE-2018-16642" ref_url="https://www.suse.com/security/cve/CVE-2018-16642/" source="CVE"/>
		<reference ref_id="CVE-2018-16643" ref_url="https://www.suse.com/security/cve/CVE-2018-16643/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<reference ref_id="CVE-2018-16645" ref_url="https://www.suse.com/security/cve/CVE-2018-16645/" source="CVE"/>
		<reference ref_id="CVE-2018-16749" ref_url="https://www.suse.com/security/cve/CVE-2018-16749/" source="CVE"/>
		<reference ref_id="CVE-2018-16750" ref_url="https://www.suse.com/security/cve/CVE-2018-16750/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004662.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following security issues:

- CVE-2017-11532: Prevent a memory leak vulnerability in the WriteMPCImage()
  function in coders/mpc.c via a crafted file allowing for DoS (bsc#1050129)
- CVE-2018-16750: Prevent memory leak in the formatIPTCfromBuffer function
  (bsc#1108283)
- CVE-2018-16749: Added missing NULL check in ReadOneJNGImage that allowed an
  attacker to cause a denial of service (WriteBlob assertion failure and
  application exit) via a crafted file (bsc#1108282)
- CVE-2018-16642: The function InsertRow allowed remote attackers to cause a
  denial of service via a crafted image file due to an out-of-bounds write
  (bsc#1107616)
- CVE-2018-16640: Prevent memory leak in the function ReadOneJNGImage
  (bsc#1107619)
- CVE-2018-16643: The functions ReadDCMImage, ReadPWPImage, ReadCALSImage, and
  ReadPICTImage did check the return value of the fputc function, which allowed
  remote attackers to cause a denial of service via a crafted image file
  (bsc#1107612)
- CVE-2018-16644: Added missing check for length in the functions ReadDCMImage
  and ReadPICTImage, which allowed remote attackers to cause a denial of service
  via a crafted image (bsc#1107609)
- CVE-2018-16645: Prevent excessive memory allocation issue in the functions
  ReadBMPImage and ReadDIBImage, which allowed remote attackers to cause a denial
  of service via a crafted image file (bsc#1107604)
- CVE-2018-16413: Prevent heap-based buffer over-read in the PushShortPixel
  function leading to DoS (bsc#1106989)

This update also relaxes the restrictions of use of Postscript like formats to
'write' only. (bsc#1105592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-10"/>
	<updated date="2018-10-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050129">SUSE bug 1050129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107604">SUSE bug 1107604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107612">SUSE bug 1107612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107616">SUSE bug 1107616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107619">SUSE bug 1107619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108282">SUSE bug 1108282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108283">SUSE bug 1108283</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11532/">CVE-2017-11532</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16640/">CVE-2018-16640</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16642/">CVE-2018-16642</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16643/">CVE-2018-16643</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16645/">CVE-2018-16645</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16749/">CVE-2018-16749</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16750/">CVE-2018-16750</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520159" comment="ImageMagick-6.8.8.1-71.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520160" comment="libMagick++-6_Q16-3-6.8.8.1-71.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520161" comment="libMagickCore-6_Q16-1-6.8.8.1-71.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520162" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520163" comment="libMagickWand-6_Q16-1-6.8.8.1-71.79.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78375" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1040039" ref_url="https://bugzilla.suse.com/1040039" source="BUGZILLA"/>
		<reference ref_id="1047184" ref_url="https://bugzilla.suse.com/1047184" source="BUGZILLA"/>
		<reference ref_id="1076118" ref_url="https://bugzilla.suse.com/1076118" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3145" ref_url="https://www.suse.com/security/cve/CVE-2017-3145/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00102.html" source="SUSE-SU"/>
		<description>
This update for bind fixes several issues.

This security issue was fixed:

- CVE-2017-3145: Improper sequencing during cleanup could have lead to a
  use-after-free error that triggered an assertion failure and crash in named
  (bsc#1076118).

These non-security issues were fixed:

- Updated named.root file (bsc#1040039)
- Update bind.keys for DNSSEC root KSK rollover (bsc#1047184)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-30"/>
	<updated date="2018-01-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040039">SUSE bug 1040039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047184">SUSE bug 1047184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076118">SUSE bug 1076118</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3145/">CVE-2017-3145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518819" comment="bind-libs-9.9.9P1-63.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518820" comment="bind-libs-32bit-9.9.9P1-63.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518821" comment="bind-utils-9.9.9P1-63.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78376" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 and libxcb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1094327" ref_url="https://bugzilla.suse.com/1094327" source="BUGZILLA"/>
		<reference ref_id="1102062" ref_url="https://bugzilla.suse.com/1102062" source="BUGZILLA"/>
		<reference ref_id="1102068" ref_url="https://bugzilla.suse.com/1102068" source="BUGZILLA"/>
		<reference ref_id="1102073" ref_url="https://bugzilla.suse.com/1102073" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14598" ref_url="https://www.suse.com/security/cve/CVE-2018-14598/" source="CVE"/>
		<reference ref_id="CVE-2018-14599" ref_url="https://www.suse.com/security/cve/CVE-2018-14599/" source="CVE"/>
		<reference ref_id="CVE-2018-14600" ref_url="https://www.suse.com/security/cve/CVE-2018-14600/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004665.html" source="SUSE-SU"/>
		<description>
This update for libX11 and libxcb fixes the following issue:

libX11:

These security issues were fixed:

- CVE-2018-14599: The function XListExtensions was vulnerable to an off-by-one
  error caused by malicious server responses, leading to DoS or possibly
  unspecified other impact (bsc#1102062).
- CVE-2018-14600: The function XListExtensions interpreted a variable as signed
  instead of unsigned, resulting in an out-of-bounds write (of up to 128 bytes),
  leading to DoS or remote code execution (bsc#1102068).
- CVE-2018-14598: A malicious server could have sent a reply in which the first
  string overflows, causing a variable to be set to NULL that will be freed later
  on, leading to DoS (segmentation fault) (bsc#1102073).

This non-security issue was fixed:

- Make use of the new 64-bit sequence number API in XCB 1.11.1 to avoid the 32-bit
  sequence number wrap in libX11 (bsc#1094327).

libxcb:

- Expose 64-bit sequence number from XCB API so that Xlib and others can use it even
  on 32-bit environment. (bsc#1094327)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-11"/>
	<updated date="2018-10-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1094327">SUSE bug 1094327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102062">SUSE bug 1102062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102068">SUSE bug 1102068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102073">SUSE bug 1102073</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14598/">CVE-2018-14598</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14599/">CVE-2018-14599</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14600/">CVE-2018-14600</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520164" comment="libX11-6-1.6.2-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520165" comment="libX11-6-32bit-1.6.2-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520166" comment="libX11-data-1.6.2-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520167" comment="libX11-xcb1-1.6.2-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520168" comment="libX11-xcb1-32bit-1.6.2-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520169" comment="libxcb-dri2-0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520170" comment="libxcb-dri2-0-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520171" comment="libxcb-dri3-0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520172" comment="libxcb-dri3-0-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520173" comment="libxcb-glx0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520174" comment="libxcb-glx0-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520175" comment="libxcb-present0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520176" comment="libxcb-present0-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520177" comment="libxcb-randr0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520178" comment="libxcb-render0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520179" comment="libxcb-render0-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520180" comment="libxcb-shape0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520181" comment="libxcb-shm0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520182" comment="libxcb-shm0-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520183" comment="libxcb-sync1-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520184" comment="libxcb-sync1-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520185" comment="libxcb-xf86dri0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520186" comment="libxcb-xfixes0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520187" comment="libxcb-xfixes0-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520188" comment="libxcb-xinerama0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520189" comment="libxcb-xkb1-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520190" comment="libxcb-xkb1-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520191" comment="libxcb-xv0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520192" comment="libxcb1-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520193" comment="libxcb1-32bit-1.10-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78377" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1068059" ref_url="https://bugzilla.suse.com/1068059" source="BUGZILLA"/>
		<reference ref_id="1087931" ref_url="https://bugzilla.suse.com/1087931" source="BUGZILLA"/>
		<reference ref_id="1095057" ref_url="https://bugzilla.suse.com/1095057" source="BUGZILLA"/>
		<reference ref_id="1102230" ref_url="https://bugzilla.suse.com/1102230" source="BUGZILLA"/>
		<reference ref_id="1110943" ref_url="https://bugzilla.suse.com/1110943" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10919" ref_url="https://www.suse.com/security/cve/CVE-2018-10919/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004675.html" source="SUSE-SU"/>
		<description>


Samba was updated to 4.6.15, bringing bug and security fixes. (bsc#1110943)

Following security issues were fixed:

- CVE-2018-10919: Fix unauthorized attribute access via searches. (bsc#1095057);

Non-security bugs fixed:

- Fix ctdb_mutex_ceph_rados_helper deadlock (bsc#1102230).
- Allow idmap_rid to have primary group other than 'Domain Users' (bsc#1087931).
- winbind: avoid using fstrcpy in _dual_init_connection.
- Fix ntlm authentications with 'winbind use default domain = yes' (bsc#1068059).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-16"/>
	<updated date="2018-10-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068059">SUSE bug 1068059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087931">SUSE bug 1087931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095057">SUSE bug 1095057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102230">SUSE bug 1102230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110943">SUSE bug 1110943</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10919/">CVE-2018-10919</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520194" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520195" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520196" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520197" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520198" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520199" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520200" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520201" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520202" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520203" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520204" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520205" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520206" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520207" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520208" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520209" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520210" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520211" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520212" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520213" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520214" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520215" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520216" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520217" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520218" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520219" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520220" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520221" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520222" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520223" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520224" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520225" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520226" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520227" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520228" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520229" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520230" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520231" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520232" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520233" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520234" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520235" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520236" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520237" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78378" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1098545" ref_url="https://bugzilla.suse.com/1098545" source="BUGZILLA"/>
		<reference ref_id="1098546" ref_url="https://bugzilla.suse.com/1098546" source="BUGZILLA"/>
		<reference ref_id="1110746" ref_url="https://bugzilla.suse.com/1110746" source="BUGZILLA"/>
		<reference ref_id="1110747" ref_url="https://bugzilla.suse.com/1110747" source="BUGZILLA"/>
		<reference ref_id="1111069" ref_url="https://bugzilla.suse.com/1111069" source="BUGZILLA"/>
		<reference ref_id="1111072" ref_url="https://bugzilla.suse.com/1111072" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13058" ref_url="https://www.suse.com/security/cve/CVE-2017-13058/" source="CVE"/>
		<reference ref_id="CVE-2018-12599" ref_url="https://www.suse.com/security/cve/CVE-2018-12599/" source="CVE"/>
		<reference ref_id="CVE-2018-12600" ref_url="https://www.suse.com/security/cve/CVE-2018-12600/" source="CVE"/>
		<reference ref_id="CVE-2018-17965" ref_url="https://www.suse.com/security/cve/CVE-2018-17965/" source="CVE"/>
		<reference ref_id="CVE-2018-17966" ref_url="https://www.suse.com/security/cve/CVE-2018-17966/" source="CVE"/>
		<reference ref_id="CVE-2018-18016" ref_url="https://www.suse.com/security/cve/CVE-2018-18016/" source="CVE"/>
		<reference ref_id="CVE-2018-18024" ref_url="https://www.suse.com/security/cve/CVE-2018-18024/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004682.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2018-18024: Fixed an infinite loop in the ReadBMPImage function of
  the coders/bmp.c file. Remote attackers could leverage this vulnerability
  to cause a denial of service via a crafted bmp file. (bsc#1111069)
- CVE-2018-18016: Fixed a memory leak in WritePCXImage (bsc#1111072).
- CVE-2018-17965: Fixed a memory leak in WriteSGIImage (bsc#1110747).
- CVE-2018-17966: Fixed a memory leak in WritePDBImage (bsc#1110746).
- CVE-2018-12600: ReadDIBImage and WriteDIBImage allowed attackers to
  cause an out of bounds write via a crafted file. (bsc#1098545)
- CVE-2018-12599: ReadBMPImage and WriteBMPImage allowed attackers to
  cause an out of bounds write via a crafted file. (bsc#1098546)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-17"/>
	<updated date="2018-10-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1098545">SUSE bug 1098545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098546">SUSE bug 1098546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110746">SUSE bug 1110746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110747">SUSE bug 1110747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111069">SUSE bug 1111069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111072">SUSE bug 1111072</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13058/">CVE-2017-13058</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12599/">CVE-2018-12599</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12600/">CVE-2018-12600</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17965/">CVE-2018-17965</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17966/">CVE-2018-17966</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18016/">CVE-2018-18016</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18024/">CVE-2018-18024</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520238" comment="ImageMagick-6.8.8.1-71.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520239" comment="libMagick++-6_Q16-3-6.8.8.1-71.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520240" comment="libMagickCore-6_Q16-1-6.8.8.1-71.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520241" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520242" comment="libMagickWand-6_Q16-1-6.8.8.1-71.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78379" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1029907" ref_url="https://bugzilla.suse.com/1029907" source="BUGZILLA"/>
		<reference ref_id="1029908" ref_url="https://bugzilla.suse.com/1029908" source="BUGZILLA"/>
		<reference ref_id="1029909" ref_url="https://bugzilla.suse.com/1029909" source="BUGZILLA"/>
		<reference ref_id="1030296" ref_url="https://bugzilla.suse.com/1030296" source="BUGZILLA"/>
		<reference ref_id="1030297" ref_url="https://bugzilla.suse.com/1030297" source="BUGZILLA"/>
		<reference ref_id="1030298" ref_url="https://bugzilla.suse.com/1030298" source="BUGZILLA"/>
		<reference ref_id="1030584" ref_url="https://bugzilla.suse.com/1030584" source="BUGZILLA"/>
		<reference ref_id="1030585" ref_url="https://bugzilla.suse.com/1030585" source="BUGZILLA"/>
		<reference ref_id="1030588" ref_url="https://bugzilla.suse.com/1030588" source="BUGZILLA"/>
		<reference ref_id="1030589" ref_url="https://bugzilla.suse.com/1030589" source="BUGZILLA"/>
		<reference ref_id="1031590" ref_url="https://bugzilla.suse.com/1031590" source="BUGZILLA"/>
		<reference ref_id="1031593" ref_url="https://bugzilla.suse.com/1031593" source="BUGZILLA"/>
		<reference ref_id="1031595" ref_url="https://bugzilla.suse.com/1031595" source="BUGZILLA"/>
		<reference ref_id="1031638" ref_url="https://bugzilla.suse.com/1031638" source="BUGZILLA"/>
		<reference ref_id="1031644" ref_url="https://bugzilla.suse.com/1031644" source="BUGZILLA"/>
		<reference ref_id="1031656" ref_url="https://bugzilla.suse.com/1031656" source="BUGZILLA"/>
		<reference ref_id="1037052" ref_url="https://bugzilla.suse.com/1037052" source="BUGZILLA"/>
		<reference ref_id="1037057" ref_url="https://bugzilla.suse.com/1037057" source="BUGZILLA"/>
		<reference ref_id="1037061" ref_url="https://bugzilla.suse.com/1037061" source="BUGZILLA"/>
		<reference ref_id="1037066" ref_url="https://bugzilla.suse.com/1037066" source="BUGZILLA"/>
		<reference ref_id="1037273" ref_url="https://bugzilla.suse.com/1037273" source="BUGZILLA"/>
		<reference ref_id="1044891" ref_url="https://bugzilla.suse.com/1044891" source="BUGZILLA"/>
		<reference ref_id="1044897" ref_url="https://bugzilla.suse.com/1044897" source="BUGZILLA"/>
		<reference ref_id="1044901" ref_url="https://bugzilla.suse.com/1044901" source="BUGZILLA"/>
		<reference ref_id="1044909" ref_url="https://bugzilla.suse.com/1044909" source="BUGZILLA"/>
		<reference ref_id="1044925" ref_url="https://bugzilla.suse.com/1044925" source="BUGZILLA"/>
		<reference ref_id="1044927" ref_url="https://bugzilla.suse.com/1044927" source="BUGZILLA"/>
		<reference ref_id="1065643" ref_url="https://bugzilla.suse.com/1065643" source="BUGZILLA"/>
		<reference ref_id="1065689" ref_url="https://bugzilla.suse.com/1065689" source="BUGZILLA"/>
		<reference ref_id="1065693" ref_url="https://bugzilla.suse.com/1065693" source="BUGZILLA"/>
		<reference ref_id="1068640" ref_url="https://bugzilla.suse.com/1068640" source="BUGZILLA"/>
		<reference ref_id="1068643" ref_url="https://bugzilla.suse.com/1068643" source="BUGZILLA"/>
		<reference ref_id="1068887" ref_url="https://bugzilla.suse.com/1068887" source="BUGZILLA"/>
		<reference ref_id="1068888" ref_url="https://bugzilla.suse.com/1068888" source="BUGZILLA"/>
		<reference ref_id="1068950" ref_url="https://bugzilla.suse.com/1068950" source="BUGZILLA"/>
		<reference ref_id="1069176" ref_url="https://bugzilla.suse.com/1069176" source="BUGZILLA"/>
		<reference ref_id="1069202" ref_url="https://bugzilla.suse.com/1069202" source="BUGZILLA"/>
		<reference ref_id="1074741" ref_url="https://bugzilla.suse.com/1074741" source="BUGZILLA"/>
		<reference ref_id="1077745" ref_url="https://bugzilla.suse.com/1077745" source="BUGZILLA"/>
		<reference ref_id="1079103" ref_url="https://bugzilla.suse.com/1079103" source="BUGZILLA"/>
		<reference ref_id="1079741" ref_url="https://bugzilla.suse.com/1079741" source="BUGZILLA"/>
		<reference ref_id="1080556" ref_url="https://bugzilla.suse.com/1080556" source="BUGZILLA"/>
		<reference ref_id="1081527" ref_url="https://bugzilla.suse.com/1081527" source="BUGZILLA"/>
		<reference ref_id="1083528" ref_url="https://bugzilla.suse.com/1083528" source="BUGZILLA"/>
		<reference ref_id="1083532" ref_url="https://bugzilla.suse.com/1083532" source="BUGZILLA"/>
		<reference ref_id="1085784" ref_url="https://bugzilla.suse.com/1085784" source="BUGZILLA"/>
		<reference ref_id="1086608" ref_url="https://bugzilla.suse.com/1086608" source="BUGZILLA"/>
		<reference ref_id="1086784" ref_url="https://bugzilla.suse.com/1086784" source="BUGZILLA"/>
		<reference ref_id="1086786" ref_url="https://bugzilla.suse.com/1086786" source="BUGZILLA"/>
		<reference ref_id="1086788" ref_url="https://bugzilla.suse.com/1086788" source="BUGZILLA"/>
		<reference ref_id="1090997" ref_url="https://bugzilla.suse.com/1090997" source="BUGZILLA"/>
		<reference ref_id="1091015" ref_url="https://bugzilla.suse.com/1091015" source="BUGZILLA"/>
		<reference ref_id="1091365" ref_url="https://bugzilla.suse.com/1091365" source="BUGZILLA"/>
		<reference ref_id="1091368" ref_url="https://bugzilla.suse.com/1091368" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9939" ref_url="https://www.suse.com/security/cve/CVE-2014-9939/" source="CVE"/>
		<reference ref_id="CVE-2017-15938" ref_url="https://www.suse.com/security/cve/CVE-2017-15938/" source="CVE"/>
		<reference ref_id="CVE-2017-15939" ref_url="https://www.suse.com/security/cve/CVE-2017-15939/" source="CVE"/>
		<reference ref_id="CVE-2017-15996" ref_url="https://www.suse.com/security/cve/CVE-2017-15996/" source="CVE"/>
		<reference ref_id="CVE-2017-16826" ref_url="https://www.suse.com/security/cve/CVE-2017-16826/" source="CVE"/>
		<reference ref_id="CVE-2017-16827" ref_url="https://www.suse.com/security/cve/CVE-2017-16827/" source="CVE"/>
		<reference ref_id="CVE-2017-16828" ref_url="https://www.suse.com/security/cve/CVE-2017-16828/" source="CVE"/>
		<reference ref_id="CVE-2017-16829" ref_url="https://www.suse.com/security/cve/CVE-2017-16829/" source="CVE"/>
		<reference ref_id="CVE-2017-16830" ref_url="https://www.suse.com/security/cve/CVE-2017-16830/" source="CVE"/>
		<reference ref_id="CVE-2017-16831" ref_url="https://www.suse.com/security/cve/CVE-2017-16831/" source="CVE"/>
		<reference ref_id="CVE-2017-16832" ref_url="https://www.suse.com/security/cve/CVE-2017-16832/" source="CVE"/>
		<reference ref_id="CVE-2017-6965" ref_url="https://www.suse.com/security/cve/CVE-2017-6965/" source="CVE"/>
		<reference ref_id="CVE-2017-6966" ref_url="https://www.suse.com/security/cve/CVE-2017-6966/" source="CVE"/>
		<reference ref_id="CVE-2017-6969" ref_url="https://www.suse.com/security/cve/CVE-2017-6969/" source="CVE"/>
		<reference ref_id="CVE-2017-7209" ref_url="https://www.suse.com/security/cve/CVE-2017-7209/" source="CVE"/>
		<reference ref_id="CVE-2017-7210" ref_url="https://www.suse.com/security/cve/CVE-2017-7210/" source="CVE"/>
		<reference ref_id="CVE-2017-7223" ref_url="https://www.suse.com/security/cve/CVE-2017-7223/" source="CVE"/>
		<reference ref_id="CVE-2017-7224" ref_url="https://www.suse.com/security/cve/CVE-2017-7224/" source="CVE"/>
		<reference ref_id="CVE-2017-7225" ref_url="https://www.suse.com/security/cve/CVE-2017-7225/" source="CVE"/>
		<reference ref_id="CVE-2017-7226" ref_url="https://www.suse.com/security/cve/CVE-2017-7226/" source="CVE"/>
		<reference ref_id="CVE-2017-7299" ref_url="https://www.suse.com/security/cve/CVE-2017-7299/" source="CVE"/>
		<reference ref_id="CVE-2017-7300" ref_url="https://www.suse.com/security/cve/CVE-2017-7300/" source="CVE"/>
		<reference ref_id="CVE-2017-7301" ref_url="https://www.suse.com/security/cve/CVE-2017-7301/" source="CVE"/>
		<reference ref_id="CVE-2017-7302" ref_url="https://www.suse.com/security/cve/CVE-2017-7302/" source="CVE"/>
		<reference ref_id="CVE-2017-7303" ref_url="https://www.suse.com/security/cve/CVE-2017-7303/" source="CVE"/>
		<reference ref_id="CVE-2017-7304" ref_url="https://www.suse.com/security/cve/CVE-2017-7304/" source="CVE"/>
		<reference ref_id="CVE-2017-8392" ref_url="https://www.suse.com/security/cve/CVE-2017-8392/" source="CVE"/>
		<reference ref_id="CVE-2017-8393" ref_url="https://www.suse.com/security/cve/CVE-2017-8393/" source="CVE"/>
		<reference ref_id="CVE-2017-8394" ref_url="https://www.suse.com/security/cve/CVE-2017-8394/" source="CVE"/>
		<reference ref_id="CVE-2017-8396" ref_url="https://www.suse.com/security/cve/CVE-2017-8396/" source="CVE"/>
		<reference ref_id="CVE-2017-8421" ref_url="https://www.suse.com/security/cve/CVE-2017-8421/" source="CVE"/>
		<reference ref_id="CVE-2017-9746" ref_url="https://www.suse.com/security/cve/CVE-2017-9746/" source="CVE"/>
		<reference ref_id="CVE-2017-9747" ref_url="https://www.suse.com/security/cve/CVE-2017-9747/" source="CVE"/>
		<reference ref_id="CVE-2017-9748" ref_url="https://www.suse.com/security/cve/CVE-2017-9748/" source="CVE"/>
		<reference ref_id="CVE-2017-9750" ref_url="https://www.suse.com/security/cve/CVE-2017-9750/" source="CVE"/>
		<reference ref_id="CVE-2017-9755" ref_url="https://www.suse.com/security/cve/CVE-2017-9755/" source="CVE"/>
		<reference ref_id="CVE-2017-9756" ref_url="https://www.suse.com/security/cve/CVE-2017-9756/" source="CVE"/>
		<reference ref_id="CVE-2018-10372" ref_url="https://www.suse.com/security/cve/CVE-2018-10372/" source="CVE"/>
		<reference ref_id="CVE-2018-10373" ref_url="https://www.suse.com/security/cve/CVE-2018-10373/" source="CVE"/>
		<reference ref_id="CVE-2018-10534" ref_url="https://www.suse.com/security/cve/CVE-2018-10534/" source="CVE"/>
		<reference ref_id="CVE-2018-10535" ref_url="https://www.suse.com/security/cve/CVE-2018-10535/" source="CVE"/>
		<reference ref_id="CVE-2018-6323" ref_url="https://www.suse.com/security/cve/CVE-2018-6323/" source="CVE"/>
		<reference ref_id="CVE-2018-6543" ref_url="https://www.suse.com/security/cve/CVE-2018-6543/" source="CVE"/>
		<reference ref_id="CVE-2018-6759" ref_url="https://www.suse.com/security/cve/CVE-2018-6759/" source="CVE"/>
		<reference ref_id="CVE-2018-6872" ref_url="https://www.suse.com/security/cve/CVE-2018-6872/" source="CVE"/>
		<reference ref_id="CVE-2018-7208" ref_url="https://www.suse.com/security/cve/CVE-2018-7208/" source="CVE"/>
		<reference ref_id="CVE-2018-7568" ref_url="https://www.suse.com/security/cve/CVE-2018-7568/" source="CVE"/>
		<reference ref_id="CVE-2018-7569" ref_url="https://www.suse.com/security/cve/CVE-2018-7569/" source="CVE"/>
		<reference ref_id="CVE-2018-7570" ref_url="https://www.suse.com/security/cve/CVE-2018-7570/" source="CVE"/>
		<reference ref_id="CVE-2018-7642" ref_url="https://www.suse.com/security/cve/CVE-2018-7642/" source="CVE"/>
		<reference ref_id="CVE-2018-7643" ref_url="https://www.suse.com/security/cve/CVE-2018-7643/" source="CVE"/>
		<reference ref_id="CVE-2018-8945" ref_url="https://www.suse.com/security/cve/CVE-2018-8945/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<description>
This update for binutils to 2.31 fixes the following issues:

These security issues were fixed:

- CVE-2017-15996: readelf allowed remote attackers to cause a denial of service
  (excessive memory allocation) or possibly have unspecified other impact via a
  crafted ELF file that triggered a buffer overflow on fuzzed archive header
  (bsc#1065643).
- CVE-2017-15939: Binary File Descriptor (BFD) library (aka libbfd) mishandled
  NULL files in a .debug_line file table, which allowed remote attackers to cause
  a denial of service (NULL pointer dereference and application crash) via a
  crafted ELF file, related to concat_filename (bsc#1065689).
- CVE-2017-15938: the Binary File Descriptor (BFD) library (aka libbfd)
  miscalculated DW_FORM_ref_addr die refs in the case of a relocatable object
  file, which allowed remote attackers to cause a denial of service
  (find_abstract_instance_name invalid memory read, segmentation fault, and
  application crash) (bsc#1065693).
- CVE-2017-16826: The coff_slurp_line_table function the Binary File Descriptor
  (BFD) library (aka libbfd) allowed remote attackers to cause a denial of
  service (invalid memory access and application crash) or possibly have
  unspecified other impact via a crafted PE file (bsc#1068640).
- CVE-2017-16832: The pe_bfd_read_buildid function in the Binary File
  Descriptor (BFD) library (aka libbfd) did not validate size and offset values
  in the data dictionary, which allowed remote attackers to cause a denial of
  service (segmentation violation and application crash) or possibly have
  unspecified other impact via a crafted PE file (bsc#1068643).
- CVE-2017-16831: Binary File Descriptor (BFD) library (aka libbfd) did not
  validate the symbol count, which allowed remote attackers to cause a denial of
  service (integer overflow and application crash, or excessive memory
  allocation) or possibly have unspecified other impact via a crafted PE file
  (bsc#1068887).
- CVE-2017-16830: The print_gnu_property_note function did not have
  integer-overflow protection on 32-bit platforms, which allowed remote attackers
  to cause a denial of service (segmentation violation and application crash) or
  possibly have unspecified other impact via a crafted ELF file (bsc#1068888).
- CVE-2017-16829: The _bfd_elf_parse_gnu_properties function in the Binary File
  Descriptor (BFD) library (aka libbfd) did not prevent negative pointers, which
  allowed remote attackers to cause a denial of service (out-of-bounds read and
  application crash) or possibly have unspecified other impact via a crafted ELF
  file (bsc#1068950).
- CVE-2017-16828: The display_debug_frames function allowed remote attackers to
  cause a denial of service (integer overflow and heap-based buffer over-read,
  and application crash) or possibly have unspecified other impact via a crafted
  ELF file (bsc#1069176).
- CVE-2017-16827: The aout_get_external_symbols function in the Binary File
  Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a
  denial of service (slurp_symtab invalid free and application crash) or possibly
  have unspecified other impact via a crafted ELF file (bsc#1069202).
- CVE-2018-6323: The elf_object_p function in the Binary File Descriptor (BFD)
  library (aka libbfd) had an unsigned integer overflow because bfd_size_type
  multiplication is not used. A crafted ELF file allowed remote attackers to
  cause a denial of service (application crash) or possibly have unspecified
  other impact (bsc#1077745).
- CVE-2018-6543: Prevent integer overflow in the function
  load_specific_debug_section() which resulted in `malloc()` with 0 size. A
  crafted ELF file allowed remote attackers to cause a denial of service
  (application crash) or possibly have unspecified other impact (bsc#1079103).
- CVE-2018-6759: The bfd_get_debug_link_info_1 function in the Binary File
  Descriptor (BFD) library (aka libbfd) had an unchecked strnlen operation.
  Remote attackers could have leveraged this vulnerability to cause a denial of
  service (segmentation fault) via a crafted ELF file (bsc#1079741).
- CVE-2018-6872: The elf_parse_notes function in the Binary File Descriptor
  (BFD) library (aka libbfd) allowed remote attackers to cause a denial of
  service (out-of-bounds read and segmentation violation) via a note with a large
  alignment (bsc#1080556).
- CVE-2018-7208: In the coff_pointerize_aux function in the Binary File
  Descriptor (BFD) library (aka libbfd) an index was not validated, which allowed
  remote attackers to cause a denial of service (segmentation fault) or possibly
  have unspecified other impact via a crafted file, as demonstrated by objcopy of
  a COFF object (bsc#1081527).
- CVE-2018-7570: The assign_file_positions_for_non_load_sections function in
  the Binary File Descriptor (BFD) library (aka libbfd) allowed remote attackers
  to cause a denial of service (NULL pointer dereference and application crash)
  via an ELF file with a RELRO segment that lacks a matching LOAD segment, as
  demonstrated by objcopy (bsc#1083528).
- CVE-2018-7569: The Binary File Descriptor (BFD) library (aka libbfd) allowed
  remote attackers to cause a denial of service (integer underflow or overflow,
  and application crash) via an ELF file with a corrupt DWARF FORM block, as
  demonstrated by nm (bsc#1083532).
- CVE-2018-8945: The bfd_section_from_shdr function in the Binary File
  Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a
  denial of service (segmentation fault) via a large attribute section
  (bsc#1086608).
- CVE-2018-7643: The display_debug_ranges function allowed remote attackers to
  cause a denial of service (integer overflow and application crash) or possibly
  have unspecified other impact via a crafted ELF file, as demonstrated by
  objdump (bsc#1086784).
- CVE-2018-7642: The swap_std_reloc_in function in the Binary File Descriptor
  (BFD) library (aka libbfd) allowed remote attackers to cause a denial of
  service (aout_32_swap_std_reloc_out NULL pointer dereference and application
  crash) via a crafted ELF file, as demonstrated by objcopy (bsc#1086786).
- CVE-2018-7568: The parse_die function in the Binary File Descriptor (BFD)
  library (aka libbfd) allowed remote attackers to cause a denial of service
  (integer overflow and application crash) via an ELF file with corrupt dwarf1
  debug information, as demonstrated by nm (bsc#1086788).
- CVE-2018-10373: concat_filename in the Binary File Descriptor (BFD) library
  (aka libbfd) allowed remote attackers to cause a denial of service (NULL
  pointer dereference and application crash) via a crafted binary file, as
  demonstrated by nm-new (bsc#1090997).
- CVE-2018-10372: process_cu_tu_index allowed remote attackers to cause a
  denial of service (heap-based buffer over-read and application crash) via a
  crafted binary file, as demonstrated by readelf (bsc#1091015).
- CVE-2018-10535: The ignore_section_sym function in the Binary File Descriptor
  (BFD) library (aka libbfd) did not validate the output_section pointer in the
  case of a symtab entry with a 'SECTION' type that has a '0' value, which
  allowed remote attackers to cause a denial of service (NULL pointer dereference
  and application crash) via a crafted file, as demonstrated by objcopy
  (bsc#1091365).
- CVE-2018-10534: The _bfd_XX_bfd_copy_private_bfd_data_common function in the
  Binary File Descriptor (BFD) library (aka libbfd) processesed a negative Data
  Directory size with an unbounded loop that increased the value of
  (external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeded its own
  memory region, resulting in an out-of-bounds memory write, as demonstrated by
  objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common
  in pex64igen.c (bsc#1091368).

These non-security issues were fixed:

- The AArch64 port now supports showing disassembly notes which are emitted
  when inconsistencies are found with the instruction that may result in the
  instruction being invalid. These can be turned on with the option -M notes
  to objdump.
- The AArch64 port now emits warnings when a combination of an instruction and
  a named register could be invalid.
- Added O modifier to ar to display member offsets inside an archive
- The ADR and ADRL pseudo-instructions supported by the ARM assembler
  now only set the bottom bit of the address of thumb function symbols
  if the -mthumb-interwork command line option is active.
- Add --generate-missing-build-notes=[yes|no] option to create (or not) GNU
  Build Attribute notes if none are present in the input sources.  Add a
  --enable-generate-build-notes=[yes|no] configure time option to set the
  default behaviour.  Set the default if the configure option is not used
  to 'no'.
- Remove -mold-gcc command-line option for x86 targets.
- Add -O[2|s] command-line options to x86 assembler to enable alternate
  shorter instruction encoding.
- Add support for .nops directive.  It is currently supported only for
  x86 targets.
- Speed up direct linking with DLLs for Cygwin and Mingw targets.
- Add a configure option --enable-separate-code to decide whether
  -z separate-code should be enabled in ELF linker by default.  Default
  to yes for Linux/x86 targets. Note that -z separate-code can increase
  disk and memory size.
- RISC-V: Fix symbol address problem with versioned symbols 
- Restore riscv64-elf cross prefix via symlinks
- RISC-V: Don't enable relaxation in relocatable link
- Prevent linking faiures on i386 with assertion (bsc#1085784)
- Fix symbol size bug when relaxation deletes bytes
- Add --debug-dump=links option to readelf and --dwarf=links option to objdump
  which displays the contents of any .gnu_debuglink or .gnu_debugaltlink
  sections.
  Add a --debug-dump=follow-links option to readelf and a --dwarf=follow-links
  option to objdump which causes indirect links into separate debug info files
  to be followed when dumping other DWARF sections.
- Add support for loaction views in DWARF debug line information.
- Add -z separate-code to generate separate code PT_LOAD segment.
- Add '-z undefs' command line option as the inverse of the '-z defs' option.
- Add -z globalaudit command line option to force audit libraries to be run
  for every dynamic object loaded by an executable - provided that the loader
  supports this functionality.
- Tighten linker script grammar around file name specifiers to prevent the use
  of SORT_BY_ALIGNMENT and SORT_BY_INIT_PRIORITY on filenames.  These would
  previously be accepted but had no effect.
- The EXCLUDE_FILE directive can now be placed within any SORT_* directive
  within input section lists.
- Fix linker relaxation with --wrap
- Add arm-none-eabi symlinks (bsc#1074741)

Former updates of binutils also fixed the following security issues, for which
there was not CVE assigned at the time the update was released or no mapping
between code change and CVE existed:

- CVE-2014-9939: Prevent stack buffer overflow when printing bad bytes in Intel
  Hex objects (bsc#1030296).
- CVE-2017-7225: The find_nearest_line function in addr2line did not handle the
  case where the main file name and the directory name are both empty, triggering
  a NULL pointer dereference and an invalid write, and leading to a program crash
  (bsc#1030585).
- CVE-2017-7224: The find_nearest_line function in objdump was vulnerable to an
  invalid write (of size 1) while disassembling a corrupt binary that contains an
  empty function name, leading to a program crash (bsc#1030588).
- CVE-2017-7223: GNU assembler in was vulnerable to a global buffer overflow
  (of size 1) while attempting to unget an EOF character from the input stream,
  potentially leading to a program crash (bsc#1030589).
- CVE-2017-7226: The pe_ILF_object_p function in the Binary File Descriptor
  (BFD) library (aka libbfd) was vulnerable to a heap-based buffer over-read of
  size 4049 because it used the strlen function instead of strnlen, leading to
  program crashes in several utilities such as addr2line, size, and strings. It
  could lead to information disclosure as well (bsc#1030584).
- CVE-2017-7299: The Binary File Descriptor (BFD) library (aka libbfd) had an
  invalid read (of size 8) because the code to emit relocs (bfd_elf_final_link
  function in bfd/elflink.c) did not check the format of the input file trying to
  read the ELF reloc section header. The vulnerability leads to a GNU linker (ld)
  program crash (bsc#1031644).
- CVE-2017-7300: The Binary File Descriptor (BFD) library (aka libbfd) had an
  aout_link_add_symbols function in bfd/aoutx.h that is vulnerable to a
  heap-based buffer over-read (off-by-one) because of an incomplete check for
  invalid string offsets while loading symbols, leading to a GNU linker (ld)
  program crash (bsc#1031656).
- CVE-2017-7302: The Binary File Descriptor (BFD) library (aka libbfd) had a
  swap_std_reloc_out function in bfd/aoutx.h that is vulnerable to an invalid
  read (of size 4) because of missing checks for relocs that could not be
  recognised. This vulnerability caused Binutils utilities like strip to crash
  (bsc#1031595).
- CVE-2017-7303: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read (of size 4) because of missing a check (in the
  find_link function) for null headers attempting to match them. This
  vulnerability caused Binutils utilities like strip to crash (bsc#1031593).
- CVE-2017-7301: The Binary File Descriptor (BFD) library (aka libbfd) had an
  aout_link_add_symbols function in bfd/aoutx.h that has an off-by-one
  vulnerability because it did not carefully check the string offset. The
  vulnerability could lead to a GNU linker (ld) program crash (bsc#1031638).
- CVE-2017-7304: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read (of size 8) because of missing a check (in the
  copy_special_section_fields function) for an invalid sh_link field attempting
  to follow it. This vulnerability caused Binutils utilities like strip to crash
  (bsc#1031590).
- CVE-2017-8392: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read of size 8 because of missing a check to determine
  whether symbols are NULL in the _bfd_dwarf2_find_nearest_line function. This
  vulnerability caused programs that conduct an analysis of binary programs using
  the libbfd library, such as objdump, to crash (bsc#1037052).
- CVE-2017-8393: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to a global buffer over-read error because of an assumption made by
  code that runs for objcopy and strip, that SHT_REL/SHR_RELA sections are always
  named starting with a .rel/.rela prefix. This vulnerability caused programs
  that conduct an analysis of binary programs using the libbfd library, such as
  objcopy and strip, to crash (bsc#1037057).
- CVE-2017-8394: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read of size 4 due to NULL pointer dereferencing of
  _bfd_elf_large_com_section. This vulnerability caused programs that conduct an
  analysis of binary programs using the libbfd library, such as objcopy, to crash
  (bsc#1037061).
- CVE-2017-8396: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read of size 1 because the existing reloc offset range
  tests didn't catch small negative offsets less than the size of the reloc
  field. This vulnerability caused programs that conduct an analysis of binary
  programs using the libbfd library, such as objdump, to crash (bsc#1037066).
- CVE-2017-8421: The function coff_set_alignment_hook in Binary File Descriptor
  (BFD) library (aka libbfd) had a memory leak vulnerability which can cause
  memory exhaustion in objdump via a crafted PE file (bsc#1037273).
- CVE-2017-9746: The disassemble_bytes function in objdump.c allowed remote
  attackers to cause a denial of service (buffer overflow and application crash)
  or possibly have unspecified other impact via a crafted binary file, as
  demonstrated by mishandling of rae insns printing for this file during 'objdump
  -D' execution (bsc#1044891).
- CVE-2017-9747: The ieee_archive_p function in the Binary File Descriptor
  (BFD) library (aka libbfd) might have allowed remote attackers to cause a
  denial of service (buffer overflow and application crash) or possibly have
  unspecified other impact via a crafted binary file, as demonstrated by
  mishandling of this file during 'objdump -D' execution (bsc#1044897).
- CVE-2017-9748: The ieee_object_p function in the Binary File Descriptor (BFD)
  library (aka libbfd) might have allowed remote attackers to cause a denial of
  service (buffer overflow and application crash) or possibly have unspecified
  other impact via a crafted binary file, as demonstrated by mishandling of this
  file during 'objdump -D' execution (bsc#1044901).
- CVE-2017-9750: opcodes/rx-decode.opc lacked bounds checks for certain scale
  arrays, which allowed remote attackers to cause a denial of service (buffer
  overflow and application crash) or possibly have unspecified other impact via a
  crafted binary file, as demonstrated by mishandling of this file during
  'objdump -D' execution (bsc#1044909).
- CVE-2017-9755: Not considering the the number of registers for bnd mode
  allowed remote attackers to cause a denial of service (buffer overflow and
  application crash) or possibly have unspecified other impact via a crafted
  binary file, as demonstrated by mishandling of this file during 'objdump -D'
  execution (bsc#1044925).
- CVE-2017-9756: The aarch64_ext_ldst_reglist function allowed remote attackers
  to cause a denial of service (buffer overflow and application crash) or
  possibly have unspecified other impact via a crafted binary file, as
  demonstrated by mishandling of this file during 'objdump -D' execution
  (bsc#1044927).
- CVE-2017-7209: The dump_section_as_bytes function in readelf accessed a NULL
  pointer while reading section contents in a corrupt binary, leading to a
  program crash (bsc#1030298).
- CVE-2017-6965: readelf wrote to illegal addresses while processing corrupt
  input files containing symbol-difference relocations, leading to a heap-based
  buffer overflow (bsc#1029909).
- CVE-2017-6966: readelf had a use-after-free (specifically read-after-free)
  error while processing multiple, relocated sections in an MSP430 binary. This
  is caused by mishandling of an invalid symbol index, and mishandling of state
  across invocations (bsc#1029908).
- CVE-2017-6969: readelf was vulnerable to a heap-based buffer over-read while
  processing corrupt RL78 binaries. The vulnerability can trigger program
  crashes. It may lead to an information leak as well (bsc#1029907).
- CVE-2017-7210: objdump was vulnerable to multiple heap-based buffer
  over-reads (of size 1 and size 8) while handling corrupt STABS enum type
  strings in a crafted object file, leading to program crash (bsc#1030297).
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-17"/>
	<updated date="2018-10-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1029907">SUSE bug 1029907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029908">SUSE bug 1029908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029909">SUSE bug 1029909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030297">SUSE bug 1030297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030298">SUSE bug 1030298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030584">SUSE bug 1030584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030585">SUSE bug 1030585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030588">SUSE bug 1030588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030589">SUSE bug 1030589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031590">SUSE bug 1031590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031593">SUSE bug 1031593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031595">SUSE bug 1031595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031638">SUSE bug 1031638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031644">SUSE bug 1031644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031656">SUSE bug 1031656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037052">SUSE bug 1037052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037057">SUSE bug 1037057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037061">SUSE bug 1037061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037066">SUSE bug 1037066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037273">SUSE bug 1037273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044891">SUSE bug 1044891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044897">SUSE bug 1044897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044901">SUSE bug 1044901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044909">SUSE bug 1044909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044925">SUSE bug 1044925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044927">SUSE bug 1044927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065643">SUSE bug 1065643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065689">SUSE bug 1065689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065693">SUSE bug 1065693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068640">SUSE bug 1068640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068643">SUSE bug 1068643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068887">SUSE bug 1068887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068888">SUSE bug 1068888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068950">SUSE bug 1068950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069176">SUSE bug 1069176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069202">SUSE bug 1069202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074741">SUSE bug 1074741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077745">SUSE bug 1077745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079103">SUSE bug 1079103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079741">SUSE bug 1079741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080556">SUSE bug 1080556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081527">SUSE bug 1081527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083528">SUSE bug 1083528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083532">SUSE bug 1083532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085784">SUSE bug 1085784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086608">SUSE bug 1086608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086784">SUSE bug 1086784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086786">SUSE bug 1086786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086788">SUSE bug 1086788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090997">SUSE bug 1090997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091015">SUSE bug 1091015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091365">SUSE bug 1091365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091368">SUSE bug 1091368</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9939/">CVE-2014-9939</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15938/">CVE-2017-15938</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15939/">CVE-2017-15939</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15996/">CVE-2017-15996</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16826/">CVE-2017-16826</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16827/">CVE-2017-16827</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16828/">CVE-2017-16828</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16829/">CVE-2017-16829</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-16830/">CVE-2017-16830</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16831/">CVE-2017-16831</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16832/">CVE-2017-16832</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6965/">CVE-2017-6965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-6966/">CVE-2017-6966</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6969/">CVE-2017-6969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7209/">CVE-2017-7209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7210/">CVE-2017-7210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7223/">CVE-2017-7223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7224/">CVE-2017-7224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7225/">CVE-2017-7225</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7226/">CVE-2017-7226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7299/">CVE-2017-7299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7300/">CVE-2017-7300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7301/">CVE-2017-7301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7302/">CVE-2017-7302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7303/">CVE-2017-7303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7304/">CVE-2017-7304</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8392/">CVE-2017-8392</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8393/">CVE-2017-8393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8394/">CVE-2017-8394</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8396/">CVE-2017-8396</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8421/">CVE-2017-8421</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9746/">CVE-2017-9746</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9747/">CVE-2017-9747</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9748/">CVE-2017-9748</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9750/">CVE-2017-9750</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9755/">CVE-2017-9755</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9756/">CVE-2017-9756</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10372/">CVE-2018-10372</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10373/">CVE-2018-10373</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10534/">CVE-2018-10534</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10535/">CVE-2018-10535</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6323/">CVE-2018-6323</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6543/">CVE-2018-6543</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6759/">CVE-2018-6759</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6872/">CVE-2018-6872</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7208/">CVE-2018-7208</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7568/">CVE-2018-7568</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7569/">CVE-2018-7569</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7570/">CVE-2018-7570</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7642/">CVE-2018-7642</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7643/">CVE-2018-7643</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8945/">CVE-2018-8945</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78380" version="1" class="patch">
	<metadata>
		<title>Security update for fuse (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1101797" ref_url="https://bugzilla.suse.com/1101797" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10906" ref_url="https://www.suse.com/security/cve/CVE-2018-10906/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004684.html" source="SUSE-SU"/>
		<description>
This update for fuse fixes the following security issue:

- CVE-2018-10906: fusermount was vulnerable to a restriction bypass when
  SELinux is active. This allowed non-root users to mount a FUSE file system with
  the 'allow_other' mount option regardless of whether 'user_allow_other' is set
  in the fuse configuration. An attacker may use this flaw to mount a FUSE file
  system, accessible by other users, and trick them into accessing files on that
  file system, possibly causing Denial of Service or other unspecified effects
  (bsc#1101797)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1101797">SUSE bug 1101797</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10906/">CVE-2018-10906</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520244" comment="fuse-2.9.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520245" comment="libfuse2-2.9.3-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78381" version="1" class="patch">
	<metadata>
		<title>Security update for libXfont (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1049692" ref_url="https://bugzilla.suse.com/1049692" source="BUGZILLA"/>
		<reference ref_id="1050459" ref_url="https://bugzilla.suse.com/1050459" source="BUGZILLA"/>
		<reference ref_id="1054285" ref_url="https://bugzilla.suse.com/1054285" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13720" ref_url="https://www.suse.com/security/cve/CVE-2017-13720/" source="CVE"/>
		<reference ref_id="CVE-2017-13722" ref_url="https://www.suse.com/security/cve/CVE-2017-13722/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003693.html" source="SUSE-SU"/>
		<description>
This update for libXfont fixes several issues.

These security issues were fixed:

- CVE-2017-13720: Improper check for end of string in PatterMatch caused invalid reads (bsc#1054285)
- CVE-2017-13722: Malformed PCF file could have caused DoS or leak information (bsc#1049692)
- Prevent the X server from accessing arbitrary files as root. It is not possible to leak information, but special files can be touched allowing for causing side effects (bsc#1050459)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-01"/>
	<updated date="2018-02-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049692">SUSE bug 1049692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050459">SUSE bug 1050459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054285">SUSE bug 1054285</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-13720/">CVE-2017-13720</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13722/">CVE-2017-13722</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518822" comment="libXfont1-1.5.1-11.3.12 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78382" version="1" class="patch">
	<metadata>
		<title>Security update for libssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1108020" ref_url="https://bugzilla.suse.com/1108020" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10933" ref_url="https://www.suse.com/security/cve/CVE-2018-10933/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004747.html" source="SUSE-SU"/>
		<description>

This update for libssh fixes the following issues:

Security issue fixed:

- CVE-2018-10933: Fixed a server mode authentication bypass (bsc#1108020).

Non security issue fixed:

- Fix popd syntax to be compatible with newer versions of the bash shell.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-19"/>
	<updated date="2018-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1108020">SUSE bug 1108020</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10933/">CVE-2018-10933</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520246" comment="libssh4-0.6.3-12.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78383" version="1" class="patch">
	<metadata>
		<title>Security update for ecryptfs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="989121" ref_url="https://bugzilla.suse.com/989121" source="BUGZILLA"/>
		<reference ref_id="989122" ref_url="https://bugzilla.suse.com/989122" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8946" ref_url="https://www.suse.com/security/cve/CVE-2015-8946/" source="CVE"/>
		<reference ref_id="CVE-2016-6224" ref_url="https://www.suse.com/security/cve/CVE-2016-6224/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003694.html" source="SUSE-SU"/>
		<description>
This update for ecryptfs-utils fixes the following issues:

- CVE-2015-8946: ecryptfs-setup-swap improperly configures encrypted swap when using GPT partitioning (bsc#989121)
- CVE-2016-6224: ecryptfs-setup-swap improperly configures encrypted swap when using GPT partitioning on a NVMe or MMC drive (bsc#989122)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-01"/>
	<updated date="2018-02-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/989121">SUSE bug 989121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989122">SUSE bug 989122</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8946/">CVE-2015-8946</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6224/">CVE-2016-6224</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518823" comment="ecryptfs-utils-103-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518824" comment="ecryptfs-utils-32bit-103-8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78384" version="1" class="patch">
	<metadata>
		<title>Security update for libXdmcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1025046" ref_url="https://bugzilla.suse.com/1025046" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2625" ref_url="https://www.suse.com/security/cve/CVE-2017-2625/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003696.html" source="SUSE-SU"/>
		<description>
This update for libXdmcp fixes the following issues:

- CVE-2017-2625: The generation of session key in XDM using libXdmcp might have used weak entropy, making
  the session keys predictable (bsc#1025046)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-01"/>
	<updated date="2018-02-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025046">SUSE bug 1025046</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2625/">CVE-2017-2625</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520247" comment="libXdmcp6-1.1.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520248" comment="libXdmcp6-32bit-1.1.1-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78385" version="1" class="patch">
	<metadata>
		<title>Security update for libICE (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1025068" ref_url="https://bugzilla.suse.com/1025068" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2626" ref_url="https://www.suse.com/security/cve/CVE-2017-2626/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003695.html" source="SUSE-SU"/>
		<description>
This update for libICE fixes the following issues:

- CVE-2017-2626: Creation of the ICE auth session cookies used insufficient randomness, making these cookies
  predictable. A more random generation method has been implemented. (boo#1025068)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-01"/>
	<updated date="2018-02-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025068">SUSE bug 1025068</bugzilla>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-2626/">CVE-2017-2626</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520249" comment="libICE6-1.0.8-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520250" comment="libICE6-32bit-1.0.8-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78386" version="1" class="patch">
	<metadata>
		<title>Security update for rpm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1077692" ref_url="https://bugzilla.suse.com/1077692" source="BUGZILLA"/>
		<reference ref_id="943457" ref_url="https://bugzilla.suse.com/943457" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7500" ref_url="https://www.suse.com/security/cve/CVE-2017-7500/" source="CVE"/>
		<reference ref_id="CVE-2017-7501" ref_url="https://www.suse.com/security/cve/CVE-2017-7501/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004757.html" source="SUSE-SU"/>
		<description>
This update for rpm fixes the following issues:

These security issues were fixed:

- CVE-2017-7500: rpm did not properly handle RPM installations when a
  destination path was a symbolic link to a directory, possibly changing
  ownership and permissions of an arbitrary directory, and RPM files being placed
  in an arbitrary destination (bsc#943457).
- CVE-2017-7501: rpm used temporary files with predictable names when
  installing an RPM. An attacker with ability to write in a directory where files
  will be installed could create symbolic links to an arbitrary location and
  modify content, and possibly permissions to arbitrary files, which could be
  used for denial of service or possibly privilege escalation (bsc#943457)

This non-security issue was fixed:

- Use ksym-provides tool [bsc#1077692]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-22"/>
	<updated date="2018-10-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077692">SUSE bug 1077692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943457">SUSE bug 943457</bugzilla>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7500/">CVE-2017-7500</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7501/">CVE-2017-7501</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520251" comment="rpm-4.11.2-16.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520252" comment="rpm-32bit-4.11.2-16.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520253" comment="rpm-build-4.11.2-16.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520254" comment="rpm-python-4.11.2-16.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78387" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1106853" ref_url="https://bugzilla.suse.com/1106853" source="BUGZILLA"/>
		<reference ref_id="1108627" ref_url="https://bugzilla.suse.com/1108627" source="BUGZILLA"/>
		<reference ref_id="1108637" ref_url="https://bugzilla.suse.com/1108637" source="BUGZILLA"/>
		<reference ref_id="1110358" ref_url="https://bugzilla.suse.com/1110358" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11613" ref_url="https://www.suse.com/security/cve/CVE-2017-11613/" source="CVE"/>
		<reference ref_id="CVE-2017-9935" ref_url="https://www.suse.com/security/cve/CVE-2017-9935/" source="CVE"/>
		<reference ref_id="CVE-2018-16335" ref_url="https://www.suse.com/security/cve/CVE-2018-16335/" source="CVE"/>
		<reference ref_id="CVE-2018-17100" ref_url="https://www.suse.com/security/cve/CVE-2018-17100/" source="CVE"/>
		<reference ref_id="CVE-2018-17101" ref_url="https://www.suse.com/security/cve/CVE-2018-17101/" source="CVE"/>
		<reference ref_id="CVE-2018-17795" ref_url="https://www.suse.com/security/cve/CVE-2018-17795/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004759.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2018-17100: There is a int32 overflow in multiply_ms in tools/ppm2tiff.c, which can cause a denial of service (crash) or possibly have unspecified other impact via a crafted image file. (bsc#1108637)
- CVE-2018-17101: There are two out-of-bounds writes in cpTags in tools/tiff2bw.c and tools/pal2rgb.c, which can cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image file. (bsc#1108627)
- CVE-2018-17795: The function t2p_write_pdf in tiff2pdf.c allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, a similar issue to CVE-2017-9935. (bsc#1110358)
- CVE-2018-16335: newoffsets handling in ChopUpSingleUncompressedStrip in tif_dirread.c allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, as demonstrated by tiff2pdf. This is a different vulnerability than CVE-2018-15209. (bsc#1106853)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-22"/>
	<updated date="2018-10-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106853">SUSE bug 1106853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108627">SUSE bug 1108627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108637">SUSE bug 1108637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110358">SUSE bug 1110358</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11613/">CVE-2017-11613</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9935/">CVE-2017-9935</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16335/">CVE-2018-16335</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17100/">CVE-2018-17100</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-17101/">CVE-2018-17101</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17795/">CVE-2018-17795</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520255" comment="libtiff5-4.0.9-44.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520256" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78388" version="1" class="patch">
	<metadata>
		<title>Security update for pam_pkcs11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1049219" ref_url="https://bugzilla.suse.com/1049219" source="BUGZILLA"/>
		<reference ref_id="1105012" ref_url="https://bugzilla.suse.com/1105012" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004761.html" source="SUSE-SU"/>
		<description>
This update for pam_pkcs11 provides the following fixes:

Security issues fixed (bsc#1105012):

- Fixed a logic bug in pampkcs11.c, leading to an authentication replay vulnerability
- Fixed a stack-based buffer overflow in opensshmapper.c
- Make sure memory is properly cleaned before invoking free()

Other changes:

- Add a systemd service file. (bsc#1049219)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049219">SUSE bug 1049219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105012">SUSE bug 1105012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520257" comment="pam_pkcs11-0.6.8-7.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520258" comment="pam_pkcs11-32bit-0.6.8-7.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78389" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1009994" ref_url="https://bugzilla.suse.com/1009994" source="BUGZILLA"/>
		<reference ref_id="1010756" ref_url="https://bugzilla.suse.com/1010756" source="BUGZILLA"/>
		<reference ref_id="1010757" ref_url="https://bugzilla.suse.com/1010757" source="BUGZILLA"/>
		<reference ref_id="1010766" ref_url="https://bugzilla.suse.com/1010766" source="BUGZILLA"/>
		<reference ref_id="1010774" ref_url="https://bugzilla.suse.com/1010774" source="BUGZILLA"/>
		<reference ref_id="1010782" ref_url="https://bugzilla.suse.com/1010782" source="BUGZILLA"/>
		<reference ref_id="1010968" ref_url="https://bugzilla.suse.com/1010968" source="BUGZILLA"/>
		<reference ref_id="1010975" ref_url="https://bugzilla.suse.com/1010975" source="BUGZILLA"/>
		<reference ref_id="1047958" ref_url="https://bugzilla.suse.com/1047958" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9262" ref_url="https://www.suse.com/security/cve/CVE-2016-9262/" source="CVE"/>
		<reference ref_id="CVE-2016-9388" ref_url="https://www.suse.com/security/cve/CVE-2016-9388/" source="CVE"/>
		<reference ref_id="CVE-2016-9389" ref_url="https://www.suse.com/security/cve/CVE-2016-9389/" source="CVE"/>
		<reference ref_id="CVE-2016-9390" ref_url="https://www.suse.com/security/cve/CVE-2016-9390/" source="CVE"/>
		<reference ref_id="CVE-2016-9391" ref_url="https://www.suse.com/security/cve/CVE-2016-9391/" source="CVE"/>
		<reference ref_id="CVE-2016-9392" ref_url="https://www.suse.com/security/cve/CVE-2016-9392/" source="CVE"/>
		<reference ref_id="CVE-2016-9393" ref_url="https://www.suse.com/security/cve/CVE-2016-9393/" source="CVE"/>
		<reference ref_id="CVE-2016-9394" ref_url="https://www.suse.com/security/cve/CVE-2016-9394/" source="CVE"/>
		<reference ref_id="CVE-2017-1000050" ref_url="https://www.suse.com/security/cve/CVE-2017-1000050/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003697.html" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

Security issues fixed:
- CVE-2016-9262: Multiple integer overflows in the jas_realloc function in base/jas_malloc.c and
  mem_resize function in base/jas_stream.c allow remote attackers to cause a denial of service via
  a crafted image, which triggers use after free vulnerabilities. (bsc#1009994)
- CVE-2016-9388: The ras_getcmap function in ras_dec.c allows remote attackers to cause a denial
  of service (assertion failure) via a crafted image file. (bsc#1010975)
- CVE-2016-9389: The jpc_irct and jpc_iict functions in jpc_mct.c allow remote attackers to cause a
  denial of service (assertion failure). (bsc#1010968)
- CVE-2016-9390: The jas_seq2d_create function in jas_seq.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted image file. (bsc#1010774)
- CVE-2016-9391: The jpc_bitstream_getbits function in jpc_bs.c allows remote attackers to cause a
  denial of service (assertion failure) via a very large integer. (bsc#1010782)
- CVE-2017-1000050: The jp2_encode function in jp2_enc.c allows remote attackers to cause a denial
  of service. (bsc#1047958)

CVEs already fixed with previous update:
- CVE-2016-9392: The calcstepsizes function in jpc_dec.c allows remote attackers to cause a denial
  of service (assertion failure) via a crafted file. (bsc#1010757)
- CVE-2016-9393: The jpc_pi_nextrpcl function in jpc_t2cod.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted file. (bsc#1010766)
- CVE-2016-9394: The jas_seq2d_create function in jas_seq.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted file. (bsc#1010756)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-01"/>
	<updated date="2018-02-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009994">SUSE bug 1009994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010756">SUSE bug 1010756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010757">SUSE bug 1010757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010766">SUSE bug 1010766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010774">SUSE bug 1010774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010782">SUSE bug 1010782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010968">SUSE bug 1010968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010975">SUSE bug 1010975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047958">SUSE bug 1047958</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9262/">CVE-2016-9262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9388/">CVE-2016-9388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9389/">CVE-2016-9389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9390/">CVE-2016-9390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9391/">CVE-2016-9391</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9392/">CVE-2016-9392</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9393/">CVE-2016-9393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9394/">CVE-2016-9394</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000050/">CVE-2017-1000050</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520259" comment="libjasper1-1.900.14-195.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520260" comment="libjasper1-32bit-1.900.14-195.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78390" version="1" class="patch">
	<metadata>
		<title>Security update for libraw (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1084688" ref_url="https://bugzilla.suse.com/1084688" source="BUGZILLA"/>
		<reference ref_id="1084690" ref_url="https://bugzilla.suse.com/1084690" source="BUGZILLA"/>
		<reference ref_id="1084691" ref_url="https://bugzilla.suse.com/1084691" source="BUGZILLA"/>
		<reference ref_id="1103200" ref_url="https://bugzilla.suse.com/1103200" source="BUGZILLA"/>
		<reference ref_id="1103353" ref_url="https://bugzilla.suse.com/1103353" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5800" ref_url="https://www.suse.com/security/cve/CVE-2018-5800/" source="CVE"/>
		<reference ref_id="CVE-2018-5801" ref_url="https://www.suse.com/security/cve/CVE-2018-5801/" source="CVE"/>
		<reference ref_id="CVE-2018-5802" ref_url="https://www.suse.com/security/cve/CVE-2018-5802/" source="CVE"/>
		<reference ref_id="CVE-2018-5810" ref_url="https://www.suse.com/security/cve/CVE-2018-5810/" source="CVE"/>
		<reference ref_id="CVE-2018-5813" ref_url="https://www.suse.com/security/cve/CVE-2018-5813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004772.html" source="SUSE-SU"/>
		<description>
This update for libraw fixes the following issues:

Security issues fixed:

- CVE-2018-5800: Fixed heap-based buffer overflow in LibRaw::kodak_ycbcr_load_raw function (bsc#1084691).
- CVE-2018-5801: Fixed NULL pointer dereference in LibRaw::unpack function (bsc#1084690).
- CVE-2018-5802: Fixed out-of-bounds read in kodak_radc_load_raw function (bsc#1084688).
- CVE-2018-5813: Fixed infinite loop in the parse_minolta function (bsc#1103200)
- CVE-2018-5810: Fixed a heap-based buffer overflow in rollei_load_raw (bsc#1103353)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1084688">SUSE bug 1084688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084690">SUSE bug 1084690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084691">SUSE bug 1084691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103200">SUSE bug 1103200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103353">SUSE bug 1103353</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5800/">CVE-2018-5800</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5801/">CVE-2018-5801</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5802/">CVE-2018-5802</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5810/">CVE-2018-5810</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5813/">CVE-2018-5813</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520261" comment="libraw9-0.15.4-21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78391" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1083424" ref_url="https://bugzilla.suse.com/1083424" source="BUGZILLA"/>
		<reference ref_id="1098531" ref_url="https://bugzilla.suse.com/1098531" source="BUGZILLA"/>
		<reference ref_id="1111853" ref_url="https://bugzilla.suse.com/1111853" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12327" ref_url="https://www.suse.com/security/cve/CVE-2018-12327/" source="CVE"/>
		<reference ref_id="CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004771.html" source="SUSE-SU"/>
		<description>

  
NTP was updated to 4.2.8p12 (bsc#1111853):

- CVE-2018-12327: Fixed stack buffer overflow in the openhost() command-line call of NTPQ/NTPDC. (bsc#1098531)
- CVE-2018-7170: Add further tweaks to improve the fix for the ephemeral association time spoofing additional protection (bsc#1083424)

Please also see https://www.nwtime.org/network-time-foundation-publishes-ntp-4-2-8p12/ for more information.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098531">SUSE bug 1098531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111853">SUSE bug 1111853</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12327/">CVE-2018-12327</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520262" comment="ntp-4.2.8p12-64.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520263" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78392" version="1" class="patch">
	<metadata>
		<title>Security update for zziplib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1110687" ref_url="https://bugzilla.suse.com/1110687" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17828" ref_url="https://www.suse.com/security/cve/CVE-2018-17828/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004779.html" source="SUSE-SU"/>
		<description>
This update for zziplib fixes the following issues:

- CVE-2018-17828: Remove any '../' components from pathnames of extracted files to avoid path traversal during unpacking. (bsc#1110687)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-24"/>
	<updated date="2018-10-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1110687">SUSE bug 1110687</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-17828/">CVE-2018-17828</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520264" comment="libzzip-0-13-0.13.67-10.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78393" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1104199" ref_url="https://bugzilla.suse.com/1104199" source="BUGZILLA"/>
		<reference ref_id="1104202" ref_url="https://bugzilla.suse.com/1104202" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10915" ref_url="https://www.suse.com/security/cve/CVE-2018-10915/" source="CVE"/>
		<reference ref_id="CVE-2018-10925" ref_url="https://www.suse.com/security/cve/CVE-2018-10925/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004778.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 to 9.6.10 fixes the following issues:

These security issues were fixed:

- CVE-2018-10915: libpq failed to properly reset its internal state between
  connections. If an affected version of libpq was used with 'host' or 'hostaddr'
  connection parameters from untrusted input, attackers could have bypassed
  client-side connection security features, obtain access to higher privileged
  connections or potentially cause other impact SQL injection, by causing the
  PQescape() functions to malfunction (bsc#1104199)
- CVE-2018-10925: Add missing authorization check on certain statements
  involved with 'INSERT ... ON CONFLICT DO UPDATE'. An attacker with 'CREATE
  TABLE' privileges could have exploited this to read arbitrary bytes server
  memory. If the attacker also had certain 'INSERT' and limited 'UPDATE'
  privileges to a particular table, they could have exploited this to update
  other columns in the same table (bsc#1104202)

For addition details please see
https://www.postgresql.org/docs/current/static/release-9-6-10.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-24"/>
	<updated date="2018-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104199">SUSE bug 1104199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104202">SUSE bug 1104202</bugzilla>
	<cve impact="important" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10915/">CVE-2018-10915</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10925/">CVE-2018-10925</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520265" comment="postgresql96-9.6.10-3.22.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78394" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1075775" ref_url="https://bugzilla.suse.com/1075775" source="BUGZILLA"/>
		<reference ref_id="1077535" ref_url="https://bugzilla.suse.com/1077535" source="BUGZILLA"/>
		<reference ref_id="1079512" ref_url="https://bugzilla.suse.com/1079512" source="BUGZILLA"/>
		<reference ref_id="1088182" ref_url="https://bugzilla.suse.com/1088182" source="BUGZILLA"/>
		<reference ref_id="1088932" ref_url="https://bugzilla.suse.com/1088932" source="BUGZILLA"/>
		<reference ref_id="1092278" ref_url="https://bugzilla.suse.com/1092278" source="BUGZILLA"/>
		<reference ref_id="1092279" ref_url="https://bugzilla.suse.com/1092279" source="BUGZILLA"/>
		<reference ref_id="1092280" ref_url="https://bugzilla.suse.com/1092280" source="BUGZILLA"/>
		<reference ref_id="1095611" ref_url="https://bugzilla.suse.com/1095611" source="BUGZILLA"/>
		<reference ref_id="1096060" ref_url="https://bugzilla.suse.com/1096060" source="BUGZILLA"/>
		<reference ref_id="1096061" ref_url="https://bugzilla.suse.com/1096061" source="BUGZILLA"/>
		<reference ref_id="1097693" ref_url="https://bugzilla.suse.com/1097693" source="BUGZILLA"/>
		<reference ref_id="1101999" ref_url="https://bugzilla.suse.com/1101999" source="BUGZILLA"/>
		<reference ref_id="1102530" ref_url="https://bugzilla.suse.com/1102530" source="BUGZILLA"/>
		<reference ref_id="1104169" ref_url="https://bugzilla.suse.com/1104169" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13884" ref_url="https://www.suse.com/security/cve/CVE-2017-13884/" source="CVE"/>
		<reference ref_id="CVE-2017-13885" ref_url="https://www.suse.com/security/cve/CVE-2017-13885/" source="CVE"/>
		<reference ref_id="CVE-2017-7153" ref_url="https://www.suse.com/security/cve/CVE-2017-7153/" source="CVE"/>
		<reference ref_id="CVE-2017-7160" ref_url="https://www.suse.com/security/cve/CVE-2017-7160/" source="CVE"/>
		<reference ref_id="CVE-2017-7161" ref_url="https://www.suse.com/security/cve/CVE-2017-7161/" source="CVE"/>
		<reference ref_id="CVE-2017-7165" ref_url="https://www.suse.com/security/cve/CVE-2017-7165/" source="CVE"/>
		<reference ref_id="CVE-2018-11646" ref_url="https://www.suse.com/security/cve/CVE-2018-11646/" source="CVE"/>
		<reference ref_id="CVE-2018-11712" ref_url="https://www.suse.com/security/cve/CVE-2018-11712/" source="CVE"/>
		<reference ref_id="CVE-2018-11713" ref_url="https://www.suse.com/security/cve/CVE-2018-11713/" source="CVE"/>
		<reference ref_id="CVE-2018-12911" ref_url="https://www.suse.com/security/cve/CVE-2018-12911/" source="CVE"/>
		<reference ref_id="CVE-2018-4088" ref_url="https://www.suse.com/security/cve/CVE-2018-4088/" source="CVE"/>
		<reference ref_id="CVE-2018-4096" ref_url="https://www.suse.com/security/cve/CVE-2018-4096/" source="CVE"/>
		<reference ref_id="CVE-2018-4101" ref_url="https://www.suse.com/security/cve/CVE-2018-4101/" source="CVE"/>
		<reference ref_id="CVE-2018-4113" ref_url="https://www.suse.com/security/cve/CVE-2018-4113/" source="CVE"/>
		<reference ref_id="CVE-2018-4114" ref_url="https://www.suse.com/security/cve/CVE-2018-4114/" source="CVE"/>
		<reference ref_id="CVE-2018-4117" ref_url="https://www.suse.com/security/cve/CVE-2018-4117/" source="CVE"/>
		<reference ref_id="CVE-2018-4118" ref_url="https://www.suse.com/security/cve/CVE-2018-4118/" source="CVE"/>
		<reference ref_id="CVE-2018-4119" ref_url="https://www.suse.com/security/cve/CVE-2018-4119/" source="CVE"/>
		<reference ref_id="CVE-2018-4120" ref_url="https://www.suse.com/security/cve/CVE-2018-4120/" source="CVE"/>
		<reference ref_id="CVE-2018-4121" ref_url="https://www.suse.com/security/cve/CVE-2018-4121/" source="CVE"/>
		<reference ref_id="CVE-2018-4122" ref_url="https://www.suse.com/security/cve/CVE-2018-4122/" source="CVE"/>
		<reference ref_id="CVE-2018-4125" ref_url="https://www.suse.com/security/cve/CVE-2018-4125/" source="CVE"/>
		<reference ref_id="CVE-2018-4127" ref_url="https://www.suse.com/security/cve/CVE-2018-4127/" source="CVE"/>
		<reference ref_id="CVE-2018-4128" ref_url="https://www.suse.com/security/cve/CVE-2018-4128/" source="CVE"/>
		<reference ref_id="CVE-2018-4129" ref_url="https://www.suse.com/security/cve/CVE-2018-4129/" source="CVE"/>
		<reference ref_id="CVE-2018-4133" ref_url="https://www.suse.com/security/cve/CVE-2018-4133/" source="CVE"/>
		<reference ref_id="CVE-2018-4146" ref_url="https://www.suse.com/security/cve/CVE-2018-4146/" source="CVE"/>
		<reference ref_id="CVE-2018-4161" ref_url="https://www.suse.com/security/cve/CVE-2018-4161/" source="CVE"/>
		<reference ref_id="CVE-2018-4162" ref_url="https://www.suse.com/security/cve/CVE-2018-4162/" source="CVE"/>
		<reference ref_id="CVE-2018-4163" ref_url="https://www.suse.com/security/cve/CVE-2018-4163/" source="CVE"/>
		<reference ref_id="CVE-2018-4165" ref_url="https://www.suse.com/security/cve/CVE-2018-4165/" source="CVE"/>
		<reference ref_id="CVE-2018-4190" ref_url="https://www.suse.com/security/cve/CVE-2018-4190/" source="CVE"/>
		<reference ref_id="CVE-2018-4199" ref_url="https://www.suse.com/security/cve/CVE-2018-4199/" source="CVE"/>
		<reference ref_id="CVE-2018-4200" ref_url="https://www.suse.com/security/cve/CVE-2018-4200/" source="CVE"/>
		<reference ref_id="CVE-2018-4204" ref_url="https://www.suse.com/security/cve/CVE-2018-4204/" source="CVE"/>
		<reference ref_id="CVE-2018-4218" ref_url="https://www.suse.com/security/cve/CVE-2018-4218/" source="CVE"/>
		<reference ref_id="CVE-2018-4222" ref_url="https://www.suse.com/security/cve/CVE-2018-4222/" source="CVE"/>
		<reference ref_id="CVE-2018-4232" ref_url="https://www.suse.com/security/cve/CVE-2018-4232/" source="CVE"/>
		<reference ref_id="CVE-2018-4233" ref_url="https://www.suse.com/security/cve/CVE-2018-4233/" source="CVE"/>
		<reference ref_id="CVE-2018-4246" ref_url="https://www.suse.com/security/cve/CVE-2018-4246/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.20.3 fixes the issues:

The following security vulnerabilities were addressed:

- CVE-2018-12911: Fixed an off-by-one error in xdg_mime_get_simple_globs
  (boo#1101999)
- CVE-2017-13884: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1075775).
- CVE-2017-13885: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1075775).
- CVE-2017-7153: An unspecified issue allowed remote attackers to spoof
  user-interface information (about whether the entire content is derived from a
  valid TLS session) via a crafted web site that sends a 401 Unauthorized
  redirect (bsc#1077535).
- CVE-2017-7160: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1075775).
- CVE-2017-7161: An unspecified issue allowed remote attackers to execute
  arbitrary code via special characters that trigger command injection
  (bsc#1075775, bsc#1077535).
- CVE-2017-7165: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1075775).
- CVE-2018-4088: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1075775).
- CVE-2018-4096: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1075775).
- CVE-2018-4200: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site that triggers a
  WebCore::jsElementScrollHeightGetter use-after-free (bsc#1092280).
- CVE-2018-4204: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1092279).
- CVE-2018-4101: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4113: An issue in the JavaScriptCore function in the 'WebKit'
  component allowed attackers to trigger an assertion failure by leveraging
  improper array indexing (bsc#1088182)
- CVE-2018-4114: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182) 
- CVE-2018-4117: An unspecified issue allowed remote attackers to bypass the
  Same Origin Policy and obtain sensitive information via a crafted web site
  (bsc#1088182, bsc#1102530).
- CVE-2018-4118: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182) 
- CVE-2018-4119: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182) 
- CVE-2018-4120: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4121: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1092278).
- CVE-2018-4122: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4125: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4127: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4128: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4129: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4146: An unspecified issue allowed attackers to cause a denial of
  service (memory corruption) via a crafted web site (bsc#1088182).
- CVE-2018-4161: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4162: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4163: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4165: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4190: An unspecified issue allowed remote attackers to obtain
  sensitive credential information that is transmitted during a CSS mask-image
  fetch (bsc#1097693)
- CVE-2018-4199: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (buffer overflow and application
  crash) via a crafted web site (bsc#1097693)
- CVE-2018-4218: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site that triggers an @generatorState use-after-free
  (bsc#1097693)
- CVE-2018-4222: An unspecified issue allowed remote attackers to execute
  arbitrary code via a crafted web site that leverages a getWasmBufferFromValue
  out-of-bounds read during WebAssembly compilation (bsc#1097693) 
- CVE-2018-4232: An unspecified issue allowed remote attackers to overwrite
  cookies via a crafted web site (bsc#1097693) 
- CVE-2018-4233: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1097693) 
- CVE-2018-4246: An unspecified issue allowed remote attackers to execute
  arbitrary code via a crafted web site that leverages type confusion
  (bsc#1104169) 
- CVE-2018-11646: webkitFaviconDatabaseSetIconForPageURL and
  webkitFaviconDatabaseSetIconURLForPageURL mishandled an unset pageURL, leading
  to an application crash (bsc#1095611)
- CVE-2018-4133: A Safari cross-site scripting (XSS) vulnerability allowed
  remote attackers to inject arbitrary web script or HTML via a crafted URL
  (bsc#1088182).
- CVE-2018-11713: The libsoup network backend of WebKit unexpectedly failed to
  use system proxy settings for WebSocket connections. As a result, users could
  be deanonymized by crafted web sites via a WebSocket connection (bsc#1096060).
- CVE-2018-11712: The libsoup network backend of WebKit failed to perform TLS
  certificate verification for WebSocket connections (bsc#1096061).


This update for webkit2gtk3 fixes the following issues:

- Fixed a crash when atk_object_ref_state_set is called on an AtkObject that's
  being destroyed (bsc#1088932).
- Fixed crash when using Wayland with QXL/virtio (bsc#1079512)
- Disable Gigacage if mmap fails to allocate in Linux.
- Add user agent quirk for paypal website.
- Properly detect compiler flags, needed libs, and fallbacks for
  usage of 64-bit atomic operations.
- Fix a network process crash when trying to get cookies of
  about:blank page.
- Fix UI process crash when closing the window under Wayland.
- Fix several crashes and rendering issues.
- Do TLS error checking on GTlsConnection::accept-certificate to
  finish the load earlier in case of errors.
- Properly close the connection to the nested wayland compositor
  in the Web Process.
- Avoid painting backing stores for zero-opacity layers.
- Fix downloads started by context menu failing in some websites
  due to missing user agent HTTP header.
- Fix video unpause when GStreamerGL is disabled.
- Fix several GObject introspection annotations.
- Update user agent quiks to fix Outlook.com and Chase.com.
- Fix several crashes and rendering issues.
- Improve error message when Gigacage cannot allocate virtual memory.
- Add missing WebKitWebProcessEnumTypes.h to webkit-web-extension.h.
- Improve web process memory monitor thresholds.
- Fix a web process crash when the web view is created and destroyed quickly.
- Fix a network process crash when load is cancelled while searching for
  stored HTTP auth credentials.
- Fix the build when ENABLE_VIDEO, ENABLE_WEB_AUDIO and
  ENABLE_XSLT are disabled.
- New API to retrieve and delete cookies with WebKitCookieManager.
- New web process API to detect when form is submitted via JavaScript.
- Several improvements and fixes in the touch/gestures support.
- Support for the “system” CSS font family.
- Complex text rendering improvements and fixes.
- More complete and spec compliant WebDriver implementation.
- Ensure DNS prefetching cannot be re-enabled if disabled by settings.
- Fix seek sometimes not working.
- Fix rendering of emojis that were using the wrong scale factor
  in some cases.
- Fix rendering of combining enclosed keycap.
- Fix rendering scale of some layers in HiDPI.
- Fix a crash in Wayland when closing the web view.
- Fix crashes upower crashes when running inside a chroot or on
  systems with broken dbus/upower.
- Fix memory leaks in GStreamer media backend when using
  GStreamer 1.14.
- Fix several crashes and rendering issues.
- Add ENABLE_ADDRESS_SANITIZER to make it easier to build with
  asan support.
- Fix a crash a under Wayland when using mesa software
  rasterization.
- Make fullscreen video work again.
- Fix handling of missing GStreamer elements.
- Fix rendering when webm video is played twice.
- Fix kinetic scrolling sometimes jumping around.
- Fix build with ICU configured without collation support.
- WebSockets use system proxy settings now (requires libsoup 2.61.90).
- Show the context menu on long-press gesture.
- Add support for Shift + mouse scroll to scroll horizontally.
- Fix zoom gesture to actually zoom instead of changing the page
  scale.
- Implement support for Graphics ARIA roles.
- Make sleep inhibitors work under Flatpak.
- Add get element CSS value command to WebDriver.
- Fix a crash aftter a swipe gesture.
- Fix several crashes and rendering issues.
- Fix crashes due to duplicated symbols in libjavascriptcoregtk
  and libwebkit2gtk.
- Fix parsing of timeout values in WebDriver.
- Implement get timeouts command in WebDriver.
- Fix deadlock in GStreamer video sink during shutdown when
  accelerated compositing is disabled.
- Fix several crashes and rendering issues.
- Add web process API to detect when form is submitted via
  JavaScript.
- Add new API to replace
  webkit_form_submission_request_get_text_fields() that is now
  deprecated.
- Add WebKitWebView::web-process-terminated signal and deprecate
  web-process-crashed.
- Fix rendering issues when editing text areas.
- Use FastMalloc based GstAllocator for GStreamer.
- Fix web process crash at startup in bmalloc.
- Fix several memory leaks in GStreamer media backend.
- WebKitWebDriver process no longer links to
  libjavascriptcoregtk.
- Fix several crashes and rendering issues.
- Add new API to add, retrieve and delete cookies via
  WebKitCookieManager.
- Add functions to WebSettings to convert font sizes between
  points and pixels.
- Ensure cookie operations take effect when they happen before a
  web process has been spawned.
- Automatically adjust font size when GtkSettings:gtk-xft-dpi
  changes.
- Add initial resource load statistics support.
- Add API to expose availability of certain editing commands in
  WebKitEditorState.
- Add API to query whether a WebKitNavigationAction is a redirect
  or not.
- Improve complex text rendering.
- Add support for the 'system' CSS font family.
- Disable USE_GSTREAMER_GL
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-24"/>
	<updated date="2018-10-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1075775">SUSE bug 1075775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077535">SUSE bug 1077535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079512">SUSE bug 1079512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088182">SUSE bug 1088182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088932">SUSE bug 1088932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092278">SUSE bug 1092278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092279">SUSE bug 1092279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092280">SUSE bug 1092280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095611">SUSE bug 1095611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096060">SUSE bug 1096060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096061">SUSE bug 1096061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097693">SUSE bug 1097693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101999">SUSE bug 1101999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102530">SUSE bug 1102530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104169">SUSE bug 1104169</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13884/">CVE-2017-13884</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13885/">CVE-2017-13885</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7153/">CVE-2017-7153</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7160/">CVE-2017-7160</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7161/">CVE-2017-7161</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7165/">CVE-2017-7165</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-11646/">CVE-2018-11646</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11712/">CVE-2018-11712</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11713/">CVE-2018-11713</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12911/">CVE-2018-12911</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4088/">CVE-2018-4088</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4096/">CVE-2018-4096</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4101/">CVE-2018-4101</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-4113/">CVE-2018-4113</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4114/">CVE-2018-4114</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4117/">CVE-2018-4117</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4118/">CVE-2018-4118</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4119/">CVE-2018-4119</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4120/">CVE-2018-4120</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4121/">CVE-2018-4121</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4122/">CVE-2018-4122</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4125/">CVE-2018-4125</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4127/">CVE-2018-4127</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4128/">CVE-2018-4128</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4129/">CVE-2018-4129</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4133/">CVE-2018-4133</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-4146/">CVE-2018-4146</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4161/">CVE-2018-4161</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4162/">CVE-2018-4162</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4163/">CVE-2018-4163</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4165/">CVE-2018-4165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4190/">CVE-2018-4190</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4199/">CVE-2018-4199</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4200/">CVE-2018-4200</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4204/">CVE-2018-4204</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4218/">CVE-2018-4218</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4222/">CVE-2018-4222</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4232/">CVE-2018-4232</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4233/">CVE-2018-4233</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4246/">CVE-2018-4246</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520268" comment="libwebkit2gtk3-lang-2.20.3-2.23.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78395" version="1" class="patch">
	<metadata>
		<title>Security update for exempi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1085295" ref_url="https://bugzilla.suse.com/1085295" source="BUGZILLA"/>
		<reference ref_id="1085297" ref_url="https://bugzilla.suse.com/1085297" source="BUGZILLA"/>
		<reference ref_id="1085583" ref_url="https://bugzilla.suse.com/1085583" source="BUGZILLA"/>
		<reference ref_id="1085584" ref_url="https://bugzilla.suse.com/1085584" source="BUGZILLA"/>
		<reference ref_id="1085585" ref_url="https://bugzilla.suse.com/1085585" source="BUGZILLA"/>
		<reference ref_id="1085589" ref_url="https://bugzilla.suse.com/1085589" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18233" ref_url="https://www.suse.com/security/cve/CVE-2017-18233/" source="CVE"/>
		<reference ref_id="CVE-2017-18234" ref_url="https://www.suse.com/security/cve/CVE-2017-18234/" source="CVE"/>
		<reference ref_id="CVE-2017-18236" ref_url="https://www.suse.com/security/cve/CVE-2017-18236/" source="CVE"/>
		<reference ref_id="CVE-2017-18238" ref_url="https://www.suse.com/security/cve/CVE-2017-18238/" source="CVE"/>
		<reference ref_id="CVE-2018-7728" ref_url="https://www.suse.com/security/cve/CVE-2018-7728/" source="CVE"/>
		<reference ref_id="CVE-2018-7730" ref_url="https://www.suse.com/security/cve/CVE-2018-7730/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004783.html" source="SUSE-SU"/>
		<description>
This update for exempi fixes the following security issues:

- CVE-2017-18233: Prevent integer overflow in the Chunk class that allowed
  remote attackers to cause a denial of service (infinite loop) via crafted XMP
  data in a .avi file (bsc#1085584).
- CVE-2017-18238: The TradQT_Manager::ParseCachedBoxes function allowed remote
  attackers to cause a denial of service (infinite loop) via crafted XMP data in
  a .qt file (bsc#1085583).
- CVE-2018-7728: Fixed heap-based buffer overflow, which allowed denial of
  service via crafted TIFF image (bsc#1085297).
- CVE-2018-7730: Fixed heap-based buffer overflow in
  XMPFiles/source/FormatSupport/PSIR_FileWriter.cpp (bsc#1085295).
- CVE-2017-18236: The ASF_Support::ReadHeaderObject function allowed remote
  attackers to cause a denial of service (infinite loop) via a crafted .asf file
  (bsc#1085589).
- CVE-2017-18234: Prevent use-after-free that allowed remote attackers to cause
  a denial of service or possibly have unspecified other impact via a .pdf file
  containing JPEG data (bsc#1085585).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-24"/>
	<updated date="2018-10-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085295">SUSE bug 1085295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085297">SUSE bug 1085297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085583">SUSE bug 1085583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085584">SUSE bug 1085584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085589">SUSE bug 1085589</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18233/">CVE-2017-18233</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18234/">CVE-2017-18234</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18236/">CVE-2017-18236</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18238/">CVE-2017-18238</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7728/">CVE-2018-7728</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7730/">CVE-2018-7730</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520272" comment="libexempi3-2.2.1-5.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78396" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1043353" ref_url="https://bugzilla.suse.com/1043353" source="BUGZILLA"/>
		<reference ref_id="1043354" ref_url="https://bugzilla.suse.com/1043354" source="BUGZILLA"/>
		<reference ref_id="1047908" ref_url="https://bugzilla.suse.com/1047908" source="BUGZILLA"/>
		<reference ref_id="1050037" ref_url="https://bugzilla.suse.com/1050037" source="BUGZILLA"/>
		<reference ref_id="1050072" ref_url="https://bugzilla.suse.com/1050072" source="BUGZILLA"/>
		<reference ref_id="1050098" ref_url="https://bugzilla.suse.com/1050098" source="BUGZILLA"/>
		<reference ref_id="1050100" ref_url="https://bugzilla.suse.com/1050100" source="BUGZILLA"/>
		<reference ref_id="1050635" ref_url="https://bugzilla.suse.com/1050635" source="BUGZILLA"/>
		<reference ref_id="1051442" ref_url="https://bugzilla.suse.com/1051442" source="BUGZILLA"/>
		<reference ref_id="1052470" ref_url="https://bugzilla.suse.com/1052470" source="BUGZILLA"/>
		<reference ref_id="1052708" ref_url="https://bugzilla.suse.com/1052708" source="BUGZILLA"/>
		<reference ref_id="1052717" ref_url="https://bugzilla.suse.com/1052717" source="BUGZILLA"/>
		<reference ref_id="1052721" ref_url="https://bugzilla.suse.com/1052721" source="BUGZILLA"/>
		<reference ref_id="1052768" ref_url="https://bugzilla.suse.com/1052768" source="BUGZILLA"/>
		<reference ref_id="1052777" ref_url="https://bugzilla.suse.com/1052777" source="BUGZILLA"/>
		<reference ref_id="1052781" ref_url="https://bugzilla.suse.com/1052781" source="BUGZILLA"/>
		<reference ref_id="1054600" ref_url="https://bugzilla.suse.com/1054600" source="BUGZILLA"/>
		<reference ref_id="1055068" ref_url="https://bugzilla.suse.com/1055068" source="BUGZILLA"/>
		<reference ref_id="1055374" ref_url="https://bugzilla.suse.com/1055374" source="BUGZILLA"/>
		<reference ref_id="1055455" ref_url="https://bugzilla.suse.com/1055455" source="BUGZILLA"/>
		<reference ref_id="1055456" ref_url="https://bugzilla.suse.com/1055456" source="BUGZILLA"/>
		<reference ref_id="1057000" ref_url="https://bugzilla.suse.com/1057000" source="BUGZILLA"/>
		<reference ref_id="1060162" ref_url="https://bugzilla.suse.com/1060162" source="BUGZILLA"/>
		<reference ref_id="1062752" ref_url="https://bugzilla.suse.com/1062752" source="BUGZILLA"/>
		<reference ref_id="1072362" ref_url="https://bugzilla.suse.com/1072362" source="BUGZILLA"/>
		<reference ref_id="1072901" ref_url="https://bugzilla.suse.com/1072901" source="BUGZILLA"/>
		<reference ref_id="1074120" ref_url="https://bugzilla.suse.com/1074120" source="BUGZILLA"/>
		<reference ref_id="1074125" ref_url="https://bugzilla.suse.com/1074125" source="BUGZILLA"/>
		<reference ref_id="1074185" ref_url="https://bugzilla.suse.com/1074185" source="BUGZILLA"/>
		<reference ref_id="1074309" ref_url="https://bugzilla.suse.com/1074309" source="BUGZILLA"/>
		<reference ref_id="1075939" ref_url="https://bugzilla.suse.com/1075939" source="BUGZILLA"/>
		<reference ref_id="1076021" ref_url="https://bugzilla.suse.com/1076021" source="BUGZILLA"/>
		<reference ref_id="1076051" ref_url="https://bugzilla.suse.com/1076051" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10995" ref_url="https://www.suse.com/security/cve/CVE-2017-10995/" source="CVE"/>
		<reference ref_id="CVE-2017-11505" ref_url="https://www.suse.com/security/cve/CVE-2017-11505/" source="CVE"/>
		<reference ref_id="CVE-2017-11525" ref_url="https://www.suse.com/security/cve/CVE-2017-11525/" source="CVE"/>
		<reference ref_id="CVE-2017-11526" ref_url="https://www.suse.com/security/cve/CVE-2017-11526/" source="CVE"/>
		<reference ref_id="CVE-2017-11539" ref_url="https://www.suse.com/security/cve/CVE-2017-11539/" source="CVE"/>
		<reference ref_id="CVE-2017-11639" ref_url="https://www.suse.com/security/cve/CVE-2017-11639/" source="CVE"/>
		<reference ref_id="CVE-2017-11750" ref_url="https://www.suse.com/security/cve/CVE-2017-11750/" source="CVE"/>
		<reference ref_id="CVE-2017-12565" ref_url="https://www.suse.com/security/cve/CVE-2017-12565/" source="CVE"/>
		<reference ref_id="CVE-2017-12640" ref_url="https://www.suse.com/security/cve/CVE-2017-12640/" source="CVE"/>
		<reference ref_id="CVE-2017-12641" ref_url="https://www.suse.com/security/cve/CVE-2017-12641/" source="CVE"/>
		<reference ref_id="CVE-2017-12643" ref_url="https://www.suse.com/security/cve/CVE-2017-12643/" source="CVE"/>
		<reference ref_id="CVE-2017-12671" ref_url="https://www.suse.com/security/cve/CVE-2017-12671/" source="CVE"/>
		<reference ref_id="CVE-2017-12673" ref_url="https://www.suse.com/security/cve/CVE-2017-12673/" source="CVE"/>
		<reference ref_id="CVE-2017-12676" ref_url="https://www.suse.com/security/cve/CVE-2017-12676/" source="CVE"/>
		<reference ref_id="CVE-2017-12935" ref_url="https://www.suse.com/security/cve/CVE-2017-12935/" source="CVE"/>
		<reference ref_id="CVE-2017-13059" ref_url="https://www.suse.com/security/cve/CVE-2017-13059/" source="CVE"/>
		<reference ref_id="CVE-2017-13141" ref_url="https://www.suse.com/security/cve/CVE-2017-13141/" source="CVE"/>
		<reference ref_id="CVE-2017-13142" ref_url="https://www.suse.com/security/cve/CVE-2017-13142/" source="CVE"/>
		<reference ref_id="CVE-2017-13147" ref_url="https://www.suse.com/security/cve/CVE-2017-13147/" source="CVE"/>
		<reference ref_id="CVE-2017-14103" ref_url="https://www.suse.com/security/cve/CVE-2017-14103/" source="CVE"/>
		<reference ref_id="CVE-2017-14649" ref_url="https://www.suse.com/security/cve/CVE-2017-14649/" source="CVE"/>
		<reference ref_id="CVE-2017-15218" ref_url="https://www.suse.com/security/cve/CVE-2017-15218/" source="CVE"/>
		<reference ref_id="CVE-2017-17504" ref_url="https://www.suse.com/security/cve/CVE-2017-17504/" source="CVE"/>
		<reference ref_id="CVE-2017-17681" ref_url="https://www.suse.com/security/cve/CVE-2017-17681/" source="CVE"/>
		<reference ref_id="CVE-2017-17879" ref_url="https://www.suse.com/security/cve/CVE-2017-17879/" source="CVE"/>
		<reference ref_id="CVE-2017-17884" ref_url="https://www.suse.com/security/cve/CVE-2017-17884/" source="CVE"/>
		<reference ref_id="CVE-2017-17914" ref_url="https://www.suse.com/security/cve/CVE-2017-17914/" source="CVE"/>
		<reference ref_id="CVE-2017-18008" ref_url="https://www.suse.com/security/cve/CVE-2017-18008/" source="CVE"/>
		<reference ref_id="CVE-2017-18027" ref_url="https://www.suse.com/security/cve/CVE-2017-18027/" source="CVE"/>
		<reference ref_id="CVE-2017-18029" ref_url="https://www.suse.com/security/cve/CVE-2017-18029/" source="CVE"/>
		<reference ref_id="CVE-2017-9261" ref_url="https://www.suse.com/security/cve/CVE-2017-9261/" source="CVE"/>
		<reference ref_id="CVE-2017-9262" ref_url="https://www.suse.com/security/cve/CVE-2017-9262/" source="CVE"/>
		<reference ref_id="CVE-2018-5246" ref_url="https://www.suse.com/security/cve/CVE-2018-5246/" source="CVE"/>
		<reference ref_id="CVE-2018-5685" ref_url="https://www.suse.com/security/cve/CVE-2018-5685/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2017-18027: Prevent memory leak vulnerability in the function
  ReadMATImage which allowed remote attackers to cause a denial of service via a
  crafted file (bsc#1076051)
- CVE-2017-18029: Prevent memory leak in the function ReadMATImage which
  allowed remote attackers to cause a denial of service via a crafted file
  (bsc#1076021)
- CVE-2017-17681: Prevent infinite loop in the function ReadPSDChannelZip in
  coders/psd.c, which allowed attackers to cause a denial of service (CPU
  exhaustion) via a crafted psd image file (bsc#1072901).
- CVE-2017-18008: Prevent memory Leak in ReadPWPImage which allowed attackers
  to cause a denial of service via a PWP file (bsc#1074309).
- CVE-2018-5685: Prevent infinite loop and application hang in the ReadBMPImage
  function. Remote attackers could leverage this vulnerability to cause a denial
  of service via an image file with a crafted bit-field mask value (bsc#1075939)
- CVE-2017-11639: Prevent heap-based buffer over-read in the WriteCIPImage()
  function, related to the GetPixelLuma function in MagickCore/pixel-accessor.h
  (bsc#1050635)
- CVE-2017-11525: Prevent memory consumption in the ReadCINImage function that
  allowed remote attackers to cause a denial of service (bsc#1050098)
- CVE-2017-9262: The ReadJNGImage function in coders/png.c allowed attackers to
  cause a denial of service (memory leak) via a crafted file (bsc#1043353).
- CVE-2017-9261: The ReadMNGImage function in coders/png.c allowed attackers to
  cause a denial of service (memory leak) via a crafted file (bsc#1043354).
- CVE-2017-10995: The mng_get_long function in coders/png.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) via a crafted MNG image (bsc#1047908).
- CVE-2017-11539: Prevent memory leak in the ReadOnePNGImage() function in
  coders/png.c (bsc#1050037).
- CVE-2017-11505: The ReadOneJNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (large loop and CPU consumption) via a
  crafted file (bsc#1050072).
- CVE-2017-11526: The ReadOneMNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (large loop and CPU consumption) via a
  crafted file (bsc#1050100).
- CVE-2017-11750: The ReadOneJNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (NULL pointer dereference) via a crafted
  file (bsc#1051442).
- CVE-2017-12565: Prevent memory leak in the function ReadOneJNGImage in
  coders/png.c, which allowed attackers to cause a denial of service
  (bsc#1052470).
- CVE-2017-12676: Prevent memory leak in the function ReadOneJNGImage in
  coders/png.c, which allowed attackers to cause a denial of service
  (bsc#1052708).
- CVE-2017-12673: Prevent memory leak in the function ReadOneMNGImage in
  coders/png.c, which allowed attackers to cause a denial of service
  (bsc#1052717).
- CVE-2017-12671: Added NULL assignment in coders/png.c to prevent an invalid
  free in the function RelinquishMagickMemory in MagickCore/memory.c, which
  allowed attackers to cause a denial of service (bsc#1052721).
- CVE-2017-12643: Prevent a memory exhaustion vulnerability in ReadOneJNGImage
  in coders\png.c (bsc#1052768).
- CVE-2017-12641: Prevent a memory leak vulnerability in ReadOneJNGImage in
  coders\png.c (bsc#1052777).
- CVE-2017-12640: Prevent an out-of-bounds read vulnerability in
  ReadOneMNGImage in coders/png.c (bsc#1052781).
- CVE-2017-12935: The ReadMNGImage function in coders/png.c mishandled large
  MNG images, leading to an invalid memory read in the SetImageColorCallBack
  function in magick/image.c (bsc#1054600).
- CVE-2017-13059: Prevent memory leak in the function WriteOneJNGImage in
  coders/png.c, which allowed attackers to cause a denial of service
  (WriteJNGImage memory consumption) via a crafted file (bsc#1055068).
- CVE-2017-13147: Prevent allocation failure in the function ReadMNGImage in
  coders/png.c when a small MNG file has a MEND chunk with a large length value
  (bsc#1055374).
- CVE-2017-13142: Added additional checks for short files to prevent a crafted
  PNG file from triggering a crash (bsc#1055455).
- CVE-2017-13141: Prevent memory leak in ReadOnePNGImage in coders/png.c
  (bsc#1055456).
- CVE-2017-14103: The ReadJNGImage and ReadOneJNGImage functions in
  coders/png.c did not properly manage image pointers after certain error
  conditions, which allowed remote attackers to conduct use-after-free attacks
  via a crafted file, related to a ReadMNGImage out-of-order CloseBlob call
  (bsc#1057000).
- CVE-2017-14649: ReadOneJNGImage in coders/png.c did not properly validate JNG
  data, leading to a denial of service (assertion failure in
  magick/pixel_cache.c, and application crash) (bsc#1060162).
- CVE-2017-15218: Prevent memory leak in ReadOneJNGImage in coders/png.c
  (bsc#1062752).
- CVE-2017-17504: Prevent heap-based buffer over-read via a crafted file in
  Magick_png_read_raw_profile, related to ReadOneMNGImage (bsc#1072362).
- CVE-2017-17884: Prevent memory leak in the function WriteOnePNGImage in
  coders/png.c, which allowed attackers to cause a denial of service via a
  crafted PNG image file (bsc#1074120).
- CVE-2017-17879: Prevent heap-based buffer over-read in ReadOneMNGImage in
  coders/png.c, related to length calculation and caused by an off-by-one error
  (bsc#1074125).
- CVE-2017-17914: Prevent crafted files to cause a large loop in
  ReadOneMNGImage (bsc#1074185).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-02"/>
	<updated date="2018-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043353">SUSE bug 1043353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043354">SUSE bug 1043354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047908">SUSE bug 1047908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050037">SUSE bug 1050037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050072">SUSE bug 1050072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050098">SUSE bug 1050098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050100">SUSE bug 1050100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050635">SUSE bug 1050635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051442">SUSE bug 1051442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052470">SUSE bug 1052470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052708">SUSE bug 1052708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052717">SUSE bug 1052717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052721">SUSE bug 1052721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052768">SUSE bug 1052768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052777">SUSE bug 1052777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052781">SUSE bug 1052781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054600">SUSE bug 1054600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055068">SUSE bug 1055068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055374">SUSE bug 1055374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055455">SUSE bug 1055455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055456">SUSE bug 1055456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057000">SUSE bug 1057000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060162">SUSE bug 1060162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062752">SUSE bug 1062752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072362">SUSE bug 1072362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072901">SUSE bug 1072901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074120">SUSE bug 1074120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074125">SUSE bug 1074125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074185">SUSE bug 1074185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074309">SUSE bug 1074309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075939">SUSE bug 1075939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076021">SUSE bug 1076021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076051">SUSE bug 1076051</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10995/">CVE-2017-10995</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11505/">CVE-2017-11505</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11525/">CVE-2017-11525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11526/">CVE-2017-11526</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11539/">CVE-2017-11539</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11639/">CVE-2017-11639</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11750/">CVE-2017-11750</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12565/">CVE-2017-12565</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12640/">CVE-2017-12640</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12641/">CVE-2017-12641</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12643/">CVE-2017-12643</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12671/">CVE-2017-12671</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12673/">CVE-2017-12673</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12676/">CVE-2017-12676</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12935/">CVE-2017-12935</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13059/">CVE-2017-13059</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13141/">CVE-2017-13141</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13142/">CVE-2017-13142</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13147/">CVE-2017-13147</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14103/">CVE-2017-14103</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14649/">CVE-2017-14649</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15218/">CVE-2017-15218</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17504/">CVE-2017-17504</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17681/">CVE-2017-17681</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-17879/">CVE-2017-17879</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17884/">CVE-2017-17884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17914/">CVE-2017-17914</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18008/">CVE-2017-18008</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18027/">CVE-2017-18027</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18029/">CVE-2017-18029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9261/">CVE-2017-9261</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9262/">CVE-2017-9262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5246/">CVE-2018-5246</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5685/">CVE-2018-5685</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518825" comment="ImageMagick-6.8.8.1-71.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518826" comment="libMagick++-6_Q16-3-6.8.8.1-71.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518827" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518828" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518829" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78397" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1103040" ref_url="https://bugzilla.suse.com/1103040" source="BUGZILLA"/>
		<reference ref_id="1104457" ref_url="https://bugzilla.suse.com/1104457" source="BUGZILLA"/>
		<reference ref_id="1110723" ref_url="https://bugzilla.suse.com/1110723" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14680" ref_url="https://www.suse.com/security/cve/CVE-2018-14680/" source="CVE"/>
		<reference ref_id="CVE-2018-14681" ref_url="https://www.suse.com/security/cve/CVE-2018-14681/" source="CVE"/>
		<reference ref_id="CVE-2018-14682" ref_url="https://www.suse.com/security/cve/CVE-2018-14682/" source="CVE"/>
		<reference ref_id="CVE-2018-15378" ref_url="https://www.suse.com/security/cve/CVE-2018-15378/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004789.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

clamav was updated to version 0.100.2:

- CVE-2018-15378: Vulnerability in ClamAV's MEW unpacking feature that
  could allow an unauthenticated, remote attacker to cause a denial of
  service (DoS) condition on an affected device. (bsc#1110723)
- CVE-2018-14680, CVE-2018-14681, CVE-2018-14682: more fixes for embedded
  libmspack. (bsc#1103040)

- Make freshclam more robust against lagging signature mirrors.
- On-Access 'Extra Scanning', an opt-in minor feature of
  OnAccess scanning on Linux systems, has been disabled due to a
  known issue with resource cleanup OnAccessExtraScanning will
  be re-enabled in a future release when the issue is
  resolved. In the mean-time, users who enabled the feature in
  clamd.conf will see a warning informing them that the feature
  is not active. For details, see:
  https://bugzilla.clamav.net/show_bug.cgi?id=12048

- Restore exit code compatibility of freshclam with versions before
  0.100.0 when the virus database is already up to date
  (bsc#1104457).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104457">SUSE bug 1104457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110723">SUSE bug 1110723</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14680/">CVE-2018-14680</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14681/">CVE-2018-14681</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14682/">CVE-2018-14682</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15378/">CVE-2018-15378</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520273" comment="clamav-0.100.2-33.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78398" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1027353" ref_url="https://bugzilla.suse.com/1027353" source="BUGZILLA"/>
		<reference ref_id="1081164" ref_url="https://bugzilla.suse.com/1081164" source="BUGZILLA"/>
		<reference ref_id="1102775" ref_url="https://bugzilla.suse.com/1102775" source="BUGZILLA"/>
		<reference ref_id="1111122" ref_url="https://bugzilla.suse.com/1111122" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18065" ref_url="https://www.suse.com/security/cve/CVE-2018-18065/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004792.html" source="SUSE-SU"/>
		<description>
This update for net-snmp fixes the following issues:

Security issues fixed:

- CVE-2018-18065: _set_key in agent/helpers/table_container.c had a NULL Pointer Exception bug that can be used by an authenticated attacker to remotely cause the instance to crash via a crafted UDP packet, resulting in Denial of Service. (bsc#1111122)

Non-security issues fixed:

- swintst_rpm: Protect against unspecified Group name (bsc#1102775)
- Add tsm and tlstm MIBs and the USM security module. (bsc#1081164)
- Fix agentx freezing on timeout (bsc#1027353)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027353">SUSE bug 1027353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081164">SUSE bug 1081164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102775">SUSE bug 1102775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111122">SUSE bug 1111122</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18065/">CVE-2018-18065</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520274" comment="libsnmp30-5.7.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520275" comment="libsnmp30-32bit-5.7.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520276" comment="net-snmp-5.7.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520277" comment="perl-SNMP-5.7.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520278" comment="snmp-mibs-5.7.3-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78399" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1043978" ref_url="https://bugzilla.suse.com/1043978" source="BUGZILLA"/>
		<reference ref_id="1059911" ref_url="https://bugzilla.suse.com/1059911" source="BUGZILLA"/>
		<reference ref_id="1059912" ref_url="https://bugzilla.suse.com/1059912" source="BUGZILLA"/>
		<reference ref_id="1059913" ref_url="https://bugzilla.suse.com/1059913" source="BUGZILLA"/>
		<reference ref_id="1069874" ref_url="https://bugzilla.suse.com/1069874" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14245" ref_url="https://www.suse.com/security/cve/CVE-2017-14245/" source="CVE"/>
		<reference ref_id="CVE-2017-14246" ref_url="https://www.suse.com/security/cve/CVE-2017-14246/" source="CVE"/>
		<reference ref_id="CVE-2017-14634" ref_url="https://www.suse.com/security/cve/CVE-2017-14634/" source="CVE"/>
		<reference ref_id="CVE-2017-16942" ref_url="https://www.suse.com/security/cve/CVE-2017-16942/" source="CVE"/>
		<reference ref_id="CVE-2017-6892" ref_url="https://www.suse.com/security/cve/CVE-2017-6892/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003705.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2017-16942: Divide-by-zero in the function wav_w64_read_fmt_chunk(), which may lead to Denial of service (bsc#1069874). 
- CVE-2017-6892:  Fixed an out-of-bounds read memory access in the aiff_read_chanmap() (bsc#1043978).
- CVE-2017-14634: In libsndfile 1.0.28, a divide-by-zero error exists in the function double64_init() in double64.c, which may lead to DoS when playing a crafted audio file. (bsc#1059911)
- CVE-2017-14245: An out of bounds read in the function d2alaw_array() in alaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of 
                  the NAN and INFINITY floating-point values. (bsc#1059912)
- CVE-2017-14246: An out of bounds read in the function d2ulaw_array() in ulaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of 
                  the NAN and INFINITY floating-point values.(bsc#1059913)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-02"/>
	<updated date="2018-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043978">SUSE bug 1043978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059911">SUSE bug 1059911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059912">SUSE bug 1059912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059913">SUSE bug 1059913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069874">SUSE bug 1069874</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14245/">CVE-2017-14245</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14246/">CVE-2017-14246</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14634/">CVE-2017-14634</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16942/">CVE-2017-16942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6892/">CVE-2017-6892</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518830" comment="libsndfile1-1.0.25-36.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518831" comment="libsndfile1-32bit-1.0.25-36.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78400" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1107609" ref_url="https://bugzilla.suse.com/1107609" source="BUGZILLA"/>
		<reference ref_id="1112399" ref_url="https://bugzilla.suse.com/1112399" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14997" ref_url="https://www.suse.com/security/cve/CVE-2017-14997/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004794.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2017-14997: GraphicsMagick allowed remote attackers to cause a denial of service (excessive memory allocation) because of an integer underflow in ReadPICTImage in coders/pict.c.  [bsc#1112399]
- CVE-2018-16644: An regression in the security fix for the pict coder was fixed (bsc#1107609)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112399">SUSE bug 1112399</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14997/">CVE-2017-14997</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520279" comment="ImageMagick-6.8.8.1-71.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520280" comment="libMagick++-6_Q16-3-6.8.8.1-71.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520281" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520282" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520283" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78401" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1078292" ref_url="https://bugzilla.suse.com/1078292" source="BUGZILLA"/>
		<reference ref_id="1091107" ref_url="https://bugzilla.suse.com/1091107" source="BUGZILLA"/>
		<reference ref_id="1094508" ref_url="https://bugzilla.suse.com/1094508" source="BUGZILLA"/>
		<reference ref_id="1103275" ref_url="https://bugzilla.suse.com/1103275" source="BUGZILLA"/>
		<reference ref_id="1103276" ref_url="https://bugzilla.suse.com/1103276" source="BUGZILLA"/>
		<reference ref_id="1103279" ref_url="https://bugzilla.suse.com/1103279" source="BUGZILLA"/>
		<reference ref_id="1106263" ref_url="https://bugzilla.suse.com/1106263" source="BUGZILLA"/>
		<reference ref_id="1111014" ref_url="https://bugzilla.suse.com/1111014" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15468" ref_url="https://www.suse.com/security/cve/CVE-2018-15468/" source="CVE"/>
		<reference ref_id="CVE-2018-15469" ref_url="https://www.suse.com/security/cve/CVE-2018-15469/" source="CVE"/>
		<reference ref_id="CVE-2018-15470" ref_url="https://www.suse.com/security/cve/CVE-2018-15470/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004800.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

XEN was updated to the Xen 4.9.3 bug fix only release (bsc#1027519)

- CVE-2018-17963: qemu_deliver_packet_iov accepted packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact. (bsc#1111014)
- CVE-2018-15470: oxenstored might not have enforced the configured quota-maxentity. This allowed a malicious or buggy guest to write as many xenstore entries as it wishes, causing unbounded memory usage in oxenstored. This can lead to a system-wide DoS.  (XSA-272) (bsc#1103279)
- CVE-2018-15469: ARM never properly implemented grant table v2, either in the hypervisor or in Linux. Unfortunately, an ARM guest can still request v2 grant tables; they will simply not be properly set up, resulting in subsequent grant-related hypercalls hitting BUG() checks. An unprivileged guest can cause a BUG() check in the hypervisor, resulting in a denial-of-service (crash). (XSA-268) (bsc#1103275)
  Note that SUSE does not ship ARM Xen, so we are not affected.
- CVE-2018-15468: The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) can lock up the entire host, causing a Denial of Service. (XSA-269) (bsc#1103276)
- CVE-2018-3646: Systems with microprocessors utilizing speculative execution and address translations may have allowed unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis. (XSA-273) (bsc#1091107)

Non security issues fixed:

- The affinity reporting via 'xl vcpu-list' was broken (bsc#1106263)
- Kernel oops in fs/dcache.c called by d_materialise_unique() (bsc#1094508)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-26"/>
	<updated date="2018-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078292">SUSE bug 1078292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091107">SUSE bug 1091107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094508">SUSE bug 1094508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103275">SUSE bug 1103275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103276">SUSE bug 1103276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103279">SUSE bug 1103279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106263">SUSE bug 1106263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111014">SUSE bug 1111014</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15468/">CVE-2018-15468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-15469/">CVE-2018-15469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-15470/">CVE-2018-15470</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520284" comment="xen-4.9.3_03-3.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520285" comment="xen-libs-4.9.3_03-3.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520286" comment="xen-libs-32bit-4.9.3_03-3.44.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78402" version="1" class="patch">
	<metadata>
		<title>Security update for lcms2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1021364" ref_url="https://bugzilla.suse.com/1021364" source="BUGZILLA"/>
		<reference ref_id="1026649" ref_url="https://bugzilla.suse.com/1026649" source="BUGZILLA"/>
		<reference ref_id="1026650" ref_url="https://bugzilla.suse.com/1026650" source="BUGZILLA"/>
		<reference ref_id="1108813" ref_url="https://bugzilla.suse.com/1108813" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10165" ref_url="https://www.suse.com/security/cve/CVE-2016-10165/" source="CVE"/>
		<reference ref_id="CVE-2018-16435" ref_url="https://www.suse.com/security/cve/CVE-2018-16435/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004806.html" source="SUSE-SU"/>
		<description>
This update for lcms2 fixes the following security issues:

- CVE-2016-10165: The Type_MLU_Read function allowed remote attackers to obtain
  sensitive information or cause a denial of service via an image with a crafted
  ICC profile, which triggered an out-of-bounds heap read (bsc#1021364).
- CVE-2018-16435: A integer overflow was fixed in the AllocateDataSet
  function in cmscgats.c, that could lead to a heap-based buffer overflow
  in the SetData function via a crafted file in the second argument to
  cmsIT8LoadFromFile. (bsc#1108813)
- Ensure that LUT stages match channel count (bsc#1026649).
- sanitize input and output channels on MPE profiles (bsc#1026650).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-29"/>
	<updated date="2018-10-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1021364">SUSE bug 1021364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026649">SUSE bug 1026649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026650">SUSE bug 1026650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108813">SUSE bug 1108813</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10165/">CVE-2016-10165</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16435/">CVE-2018-16435</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520287" comment="lcms2-2.7-9.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520288" comment="liblcms2-2-2.7-9.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520289" comment="liblcms2-2-32bit-2.7-9.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78403" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="1094725" ref_url="https://bugzilla.suse.com/1094725" source="BUGZILLA"/>
		<reference ref_id="1096223" ref_url="https://bugzilla.suse.com/1096223" source="BUGZILLA"/>
		<reference ref_id="1098735" ref_url="https://bugzilla.suse.com/1098735" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12617" ref_url="https://www.suse.com/security/cve/CVE-2018-12617/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004810.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

These security issues were fixed:

- CVE-2018-12617: qmp_guest_file_read had an integer overflow that could have
  been exploited by sending a crafted QMP command (including guest-file-read with
  a large count value) to the agent via the listening socket causing DoS
  (bsc#1098735).
- CVE-2018-11806: Prevent heap-based buffer overflow via incoming fragmented
  datagrams (bsc#1096223).

With this release the mitigations for Spectre v4 are moved the the patches from
upstream (CVE-2018-3639, bsc#1092885).

This feature was added:

- Add support for block resize support for disks through the monitor (bsc#1094725).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-29"/>
	<updated date="2018-10-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094725">SUSE bug 1094725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096223">SUSE bug 1096223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098735">SUSE bug 1098735</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12617/">CVE-2018-12617</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520290" comment="qemu-2.9.1-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520291" comment="qemu-block-curl-2.9.1-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520292" comment="qemu-ipxe-1.0.0-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520293" comment="qemu-kvm-2.9.1-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520294" comment="qemu-seabios-1.10.2-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520295" comment="qemu-sgabios-8-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520296" comment="qemu-tools-2.9.1-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520297" comment="qemu-vgabios-1.10.2-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520298" comment="qemu-x86-2.9.1-6.19.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78404" version="1" class="patch">
	<metadata>
		<title>Security update for python, python-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1086001" ref_url="https://bugzilla.suse.com/1086001" source="BUGZILLA"/>
		<reference ref_id="1088004" ref_url="https://bugzilla.suse.com/1088004" source="BUGZILLA"/>
		<reference ref_id="1088009" ref_url="https://bugzilla.suse.com/1088009" source="BUGZILLA"/>
		<reference ref_id="1109663" ref_url="https://bugzilla.suse.com/1109663" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802/" source="CVE"/>
		<reference ref_id="CVE-2018-1060" ref_url="https://www.suse.com/security/cve/CVE-2018-1060/" source="CVE"/>
		<reference ref_id="CVE-2018-1061" ref_url="https://www.suse.com/security/cve/CVE-2018-1061/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004809.html" source="SUSE-SU"/>
		<description>
This update for python, python-base fixes the following issues:

Security issues fixed:

- CVE-2018-1000802: Prevent command injection in shutil module (make_archive
  function) via passage of unfiltered user input (bsc#1109663).
- CVE-2018-1061: Fixed DoS via regular expression backtracking in
  difflib.IS_LINE_JUNK method in difflib (bsc#1088004).
- CVE-2018-1060: Fixed DoS via regular expression catastrophic backtracking in
  apop() method in pop3lib (bsc#1088009).

Bug fixes:

- bsc#1086001: python tarfile uses random order.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-29"/>
	<updated date="2018-10-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086001">SUSE bug 1086001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088004">SUSE bug 1088004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088009">SUSE bug 1088009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109663">SUSE bug 1109663</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1060/">CVE-2018-1060</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1061/">CVE-2018-1061</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520299" comment="libpython2_7-1_0-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520300" comment="libpython2_7-1_0-32bit-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520301" comment="python-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520302" comment="python-base-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520303" comment="python-curses-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520304" comment="python-devel-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520305" comment="python-tk-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520306" comment="python-xml-2.7.13-28.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78405" version="1" class="patch">
	<metadata>
		<title>Security update for audiofile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1111586" ref_url="https://bugzilla.suse.com/1111586" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17095" ref_url="https://www.suse.com/security/cve/CVE-2018-17095/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004817.html" source="SUSE-SU"/>
		<description>
This update for audiofile fixes the following issues:

- CVE-2018-17095: A heap-based buffer overflow in Expand3To4Module::run could occurred when running sfconvert leading to crashes or code execution when handling untrusted soundfiles (bsc#1111586).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-31"/>
	<updated date="2018-10-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1111586">SUSE bug 1111586</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-17095/">CVE-2018-17095</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520307" comment="audiofile-0.3.6-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520308" comment="libaudiofile1-0.3.6-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520309" comment="libaudiofile1-32bit-0.3.6-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78406" version="1" class="patch">
	<metadata>
		<title>Security update for ntfs-3g_ntfsprogs (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1022500" ref_url="https://bugzilla.suse.com/1022500" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0358" ref_url="https://www.suse.com/security/cve/CVE-2017-0358/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004816.html" source="SUSE-SU"/>
		<description>
This update for ntfs-3g_ntfsprogs fixes the following issues:

- CVE-2017-0358: Missing sanitization of the environment during a call to
  modprobe allowed local users to escalate fo root privilege (bsc#1022500)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-31"/>
	<updated date="2018-10-31"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1022500">SUSE bug 1022500</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-0358/">CVE-2017-0358</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520310" comment="libntfs-3g84-2013.1.13-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520311" comment="ntfs-3g-2013.1.13-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520312" comment="ntfsprogs-2013.1.13-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78407" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1111647" ref_url="https://bugzilla.suse.com/1111647" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12086" ref_url="https://www.suse.com/security/cve/CVE-2018-12086/" source="CVE"/>
		<reference ref_id="CVE-2018-18227" ref_url="https://www.suse.com/security/cve/CVE-2018-18227/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004819.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Wireshark was updated to 2.4.10 (bsc#1111647).

Following security issues were fixed:

- CVE-2018-18227: MS-WSP dissector crash (wnpa-sec-2018-47)
- CVE-2018-12086: OpcUA dissector crash (wnpa-sec-2018-50)

Further bug fixes and updated protocol support that were done are listed in:

  https://www.wireshark.org/docs/relnotes/wireshark-2.4.10.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-31"/>
	<updated date="2018-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111647">SUSE bug 1111647</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12086/">CVE-2018-12086</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18227/">CVE-2018-18227</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520313" comment="libwireshark9-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520314" comment="libwiretap7-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520315" comment="libwscodecs1-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520316" comment="libwsutil8-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520317" comment="wireshark-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520318" comment="wireshark-gtk-2.4.10-48.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78408" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLE, llvm4, mozilla-nspr, mozilla-nss, apache2-mod_nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1012260" ref_url="https://bugzilla.suse.com/1012260" source="BUGZILLA"/>
		<reference ref_id="1021577" ref_url="https://bugzilla.suse.com/1021577" source="BUGZILLA"/>
		<reference ref_id="1026191" ref_url="https://bugzilla.suse.com/1026191" source="BUGZILLA"/>
		<reference ref_id="1041469" ref_url="https://bugzilla.suse.com/1041469" source="BUGZILLA"/>
		<reference ref_id="1041894" ref_url="https://bugzilla.suse.com/1041894" source="BUGZILLA"/>
		<reference ref_id="1049703" ref_url="https://bugzilla.suse.com/1049703" source="BUGZILLA"/>
		<reference ref_id="1061204" ref_url="https://bugzilla.suse.com/1061204" source="BUGZILLA"/>
		<reference ref_id="1064786" ref_url="https://bugzilla.suse.com/1064786" source="BUGZILLA"/>
		<reference ref_id="1065464" ref_url="https://bugzilla.suse.com/1065464" source="BUGZILLA"/>
		<reference ref_id="1066489" ref_url="https://bugzilla.suse.com/1066489" source="BUGZILLA"/>
		<reference ref_id="1073210" ref_url="https://bugzilla.suse.com/1073210" source="BUGZILLA"/>
		<reference ref_id="1078436" ref_url="https://bugzilla.suse.com/1078436" source="BUGZILLA"/>
		<reference ref_id="1091551" ref_url="https://bugzilla.suse.com/1091551" source="BUGZILLA"/>
		<reference ref_id="1092697" ref_url="https://bugzilla.suse.com/1092697" source="BUGZILLA"/>
		<reference ref_id="1094767" ref_url="https://bugzilla.suse.com/1094767" source="BUGZILLA"/>
		<reference ref_id="1096515" ref_url="https://bugzilla.suse.com/1096515" source="BUGZILLA"/>
		<reference ref_id="1107343" ref_url="https://bugzilla.suse.com/1107343" source="BUGZILLA"/>
		<reference ref_id="1108771" ref_url="https://bugzilla.suse.com/1108771" source="BUGZILLA"/>
		<reference ref_id="1108986" ref_url="https://bugzilla.suse.com/1108986" source="BUGZILLA"/>
		<reference ref_id="1109363" ref_url="https://bugzilla.suse.com/1109363" source="BUGZILLA"/>
		<reference ref_id="1109465" ref_url="https://bugzilla.suse.com/1109465" source="BUGZILLA"/>
		<reference ref_id="1110506" ref_url="https://bugzilla.suse.com/1110506" source="BUGZILLA"/>
		<reference ref_id="1110507" ref_url="https://bugzilla.suse.com/1110507" source="BUGZILLA"/>
		<reference ref_id="703591" ref_url="https://bugzilla.suse.com/703591" source="BUGZILLA"/>
		<reference ref_id="839074" ref_url="https://bugzilla.suse.com/839074" source="BUGZILLA"/>
		<reference ref_id="857131" ref_url="https://bugzilla.suse.com/857131" source="BUGZILLA"/>
		<reference ref_id="893359" ref_url="https://bugzilla.suse.com/893359" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16541" ref_url="https://www.suse.com/security/cve/CVE-2017-16541/" source="CVE"/>
		<reference ref_id="CVE-2018-12376" ref_url="https://www.suse.com/security/cve/CVE-2018-12376/" source="CVE"/>
		<reference ref_id="CVE-2018-12377" ref_url="https://www.suse.com/security/cve/CVE-2018-12377/" source="CVE"/>
		<reference ref_id="CVE-2018-12378" ref_url="https://www.suse.com/security/cve/CVE-2018-12378/" source="CVE"/>
		<reference ref_id="CVE-2018-12379" ref_url="https://www.suse.com/security/cve/CVE-2018-12379/" source="CVE"/>
		<reference ref_id="CVE-2018-12381" ref_url="https://www.suse.com/security/cve/CVE-2018-12381/" source="CVE"/>
		<reference ref_id="CVE-2018-12383" ref_url="https://www.suse.com/security/cve/CVE-2018-12383/" source="CVE"/>
		<reference ref_id="CVE-2018-12385" ref_url="https://www.suse.com/security/cve/CVE-2018-12385/" source="CVE"/>
		<reference ref_id="CVE-2018-12386" ref_url="https://www.suse.com/security/cve/CVE-2018-12386/" source="CVE"/>
		<reference ref_id="CVE-2018-12387" ref_url="https://www.suse.com/security/cve/CVE-2018-12387/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to ESR 60.2.2 fixes several issues.

These general changes are part of the version 60 release.

- New browser engine with speed improvements
- Redesigned graphical user interface elements
- Unified address and search bar for new installations
- New tab page listing top visited, recently visited and recommended pages
- Support for configuration policies in enterprise deployments via JSON files
- Support for Web Authentication, allowing the use of USB tokens for
  authentication to web sites

The following changes affect compatibility:
    
- Now exclusively supports extensions built using the WebExtension API.
- Unsupported legacy extensions will no longer work in Firefox 60 ESR
- TLS certificates issued by Symantec before June 1st, 2016 are no longer trusted 
  The 'security.pki.distrust_ca_policy' preference can be set to 0 to reinstate
  trust in those certificates

The following issues affect performance:

- new format for storing private keys, certificates and certificate trust
  If the user home or data directory is on a network file system, it is
  recommended that users set the following environment variable to avoid
  slowdowns: NSS_SDB_USE_CACHE=yes
  This setting is not recommended for local, fast file systems. 

These security issues were fixed:

- CVE-2018-12381: Dragging and dropping Outlook email message results in page navigation (bsc#1107343).
- CVE-2017-16541: Proxy bypass using automount and autofs (bsc#1107343).
- CVE-2018-12376: Various memory safety bugs (bsc#1107343).
- CVE-2018-12377: Use-after-free in refresh driver timers (bsc#1107343).
- CVE-2018-12378: Use-after-free in IndexedDB (bsc#1107343).
- CVE-2018-12379: Out-of-bounds write with malicious MAR file (bsc#1107343).
- CVE-2018-12386: Type confusion in JavaScript allowed remote code execution (bsc#1110506)
- CVE-2018-12387: Array.prototype.push stack pointer vulnerability may enable exploits in the sandboxed content process (bsc#1110507)
- CVE-2018-12385: Crash in TransportSecurityInfo due to cached data  (bsc#1109363)
- CVE-2018-12383: Setting a master password did not delete unencrypted previously stored passwords  (bsc#1107343)

This update for mozilla-nspr to version 4.19 fixes the follwing issues

- Added TCP Fast Open functionality
- A socket without PR_NSPR_IO_LAYER will no longer trigger
  an assertion when polling

This update for mozilla-nss to version 3.36.4 fixes the follwing issues

- Connecting to a server that was recently upgraded to TLS 1.3
  would result in a SSL_RX_MALFORMED_SERVER_HELLO error.
- Fix a rare bug with PKCS#12 files.
- Replaces existing vectorized ChaCha20 code with verified
  HACL* implementation.
- TLS 1.3 support has been updated to draft -23.
- Added formally verified implementations of non-vectorized Chacha20
  and non-vectorized Poly1305 64-bit.
- The following CA certificates were Removed:
  OU = Security Communication EV RootCA1
  CN = CA Disig Root R1
  CN = DST ACES CA X6
  Certum CA, O=Unizeto Sp. z o.o.
  StartCom Certification Authority
  StartCom Certification Authority G2
  T?BİTAK UEKAE K?k Sertifika Hizmet Sağlayıcısı - S?r?m 3
  ACEDICOM Root
  Certinomis - Autorit? Racine
  T?RKTRUST Elektronik Sertifika Hizmet Sağlayıcısı
  PSCProcert
  CA 沃通根证书, O=WoSign CA Limited
  Certification Authority of WoSign
  Certification Authority of WoSign G2
  CA WoSign ECC Root
  Subject CN = VeriSign Class 3 Secure Server CA - G2
  O = Japanese Government, OU = ApplicationCA
  CN = WellsSecure Public Root Certificate Authority
  CN = T?RKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H6
  CN = Microsec e-Szigno Root
* The following CA certificates were Removed:
  AddTrust Public CA Root
  AddTrust Qualified CA Root
  China Internet Network Information Center EV Certificates Root
  CNNIC ROOT
  ComSign Secured CA
  GeoTrust Global CA 2
  Secure Certificate Services
  Swisscom Root CA 1
  Swisscom Root EV CA 2
  Trusted Certificate Services
  UTN-USERFirst-Hardware
  UTN-USERFirst-Object
* The following CA certificates were Added
  CN = D-TRUST Root CA 3 2013
  CN = TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1
  GDCA TrustAUTH R5 ROOT
  SSL.com Root Certification Authority RSA
  SSL.com Root Certification Authority ECC
  SSL.com EV Root Certification Authority RSA R2
  SSL.com EV Root Certification Authority ECC
  TrustCor RootCert CA-1
  TrustCor RootCert CA-2
  TrustCor ECA-1
* The Websites (TLS/SSL) trust bit was turned off for the following
  CA certificates:
  CN = Chambers of Commerce Root
  CN = Global Chambersign Root
* TLS servers are able to handle a ClientHello statelessly, if the
  client supports TLS 1.3.  If the server sends a HelloRetryRequest,
  it is possible to discard the server socket, and make a new socket
  to handle any subsequent ClientHello. This better enables stateless
  server operation. (This feature is added in support of QUIC, but it
  also has utility for DTLS 1.3 servers.)

Due to the update of mozilla-nss apache2-mod_nss needs to be updated to 
change to the SQLite certificate database, which is now the default (bsc#1108771)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-31"/>
	<updated date="2018-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012260">SUSE bug 1012260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021577">SUSE bug 1021577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026191">SUSE bug 1026191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041469">SUSE bug 1041469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041894">SUSE bug 1041894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049703">SUSE bug 1049703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061204">SUSE bug 1061204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064786">SUSE bug 1064786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065464">SUSE bug 1065464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066489">SUSE bug 1066489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073210">SUSE bug 1073210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078436">SUSE bug 1078436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091551">SUSE bug 1091551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092697">SUSE bug 1092697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094767">SUSE bug 1094767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096515">SUSE bug 1096515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107343">SUSE bug 1107343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108771">SUSE bug 1108771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108986">SUSE bug 1108986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109363">SUSE bug 1109363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109465">SUSE bug 1109465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110506">SUSE bug 1110506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110507">SUSE bug 1110507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/703591">SUSE bug 703591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839074">SUSE bug 839074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857131">SUSE bug 857131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893359">SUSE bug 893359</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16541/">CVE-2017-16541</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-12376/">CVE-2018-12376</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12377/">CVE-2018-12377</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12378/">CVE-2018-12378</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12379/">CVE-2018-12379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-12381/">CVE-2018-12381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-12383/">CVE-2018-12383</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12385/">CVE-2018-12385</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12386/">CVE-2018-12386</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12387/">CVE-2018-12387</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520319" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520320" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520321" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520322" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520323" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520324" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520325" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520326" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520327" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520328" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520329" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520330" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520331" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520332" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520333" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520334" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78409" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1112758" ref_url="https://bugzilla.suse.com/1112758" source="BUGZILLA"/>
		<reference ref_id="1113660" ref_url="https://bugzilla.suse.com/1113660" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16840" ref_url="https://www.suse.com/security/cve/CVE-2018-16840/" source="CVE"/>
		<reference ref_id="CVE-2018-16842" ref_url="https://www.suse.com/security/cve/CVE-2018-16842/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004824.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2018-16840: A use after free in closing SASL handles was fixed (bsc#1112758)
- CVE-2018-16842: A Out-of-bounds Read in tool_msgs.c was fixed which could lead to crashes (bsc#1113660)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-02"/>
	<updated date="2018-11-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1112758">SUSE bug 1112758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113660">SUSE bug 1113660</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16840/">CVE-2018-16840</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16842/">CVE-2018-16842</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520335" comment="curl-7.37.0-37.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520336" comment="libcurl4-7.37.0-37.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520337" comment="libcurl4-32bit-7.37.0-37.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78410" version="1" class="patch">
	<metadata>
		<title>Security update for soundtouch (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1108630" ref_url="https://bugzilla.suse.com/1108630" source="BUGZILLA"/>
		<reference ref_id="1108631" ref_url="https://bugzilla.suse.com/1108631" source="BUGZILLA"/>
		<reference ref_id="1108632" ref_url="https://bugzilla.suse.com/1108632" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17096" ref_url="https://www.suse.com/security/cve/CVE-2018-17096/" source="CVE"/>
		<reference ref_id="CVE-2018-17097" ref_url="https://www.suse.com/security/cve/CVE-2018-17097/" source="CVE"/>
		<reference ref_id="CVE-2018-17098" ref_url="https://www.suse.com/security/cve/CVE-2018-17098/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004822.html" source="SUSE-SU"/>
		<description>
This update for soundtouch fixes the following issues:

- CVE-2018-17098: The WavFileBase class allowed remote attackers to cause a denial of service (heap corruption from size inconsistency) or possibly have unspecified other impact, as demonstrated by SoundStretch. (bsc#1108632)
- CVE-2018-17097: The WavFileBase class allowed remote attackers to cause a denial of service (double free) or possibly have unspecified other impact, as demonstrated by SoundStretch. (double free) (bsc#1108631)
- CVE-2018-17096: The BPMDetect class allowed remote attackers to cause a denial of service (assertion failure and application exit), as demonstrated by SoundStretch. (bsc#1108630)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-02"/>
	<updated date="2018-11-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1108630">SUSE bug 1108630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108631">SUSE bug 1108631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108632">SUSE bug 1108632</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-17096/">CVE-2018-17096</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-17097/">CVE-2018-17097</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-17098/">CVE-2018-17098</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520338" comment="libSoundTouch0-1.7.1-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520339" comment="libSoundTouch0-32bit-1.7.1-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520340" comment="soundtouch-1.7.1-5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78411" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1104812" ref_url="https://bugzilla.suse.com/1104812" source="BUGZILLA"/>
		<reference ref_id="1106998" ref_url="https://bugzilla.suse.com/1106998" source="BUGZILLA"/>
		<reference ref_id="1106999" ref_url="https://bugzilla.suse.com/1106999" source="BUGZILLA"/>
		<reference ref_id="1107033" ref_url="https://bugzilla.suse.com/1107033" source="BUGZILLA"/>
		<reference ref_id="1107034" ref_url="https://bugzilla.suse.com/1107034" source="BUGZILLA"/>
		<reference ref_id="1107037" ref_url="https://bugzilla.suse.com/1107037" source="BUGZILLA"/>
		<reference ref_id="1107038" ref_url="https://bugzilla.suse.com/1107038" source="BUGZILLA"/>
		<reference ref_id="1107039" ref_url="https://bugzilla.suse.com/1107039" source="BUGZILLA"/>
		<reference ref_id="1107097" ref_url="https://bugzilla.suse.com/1107097" source="BUGZILLA"/>
		<reference ref_id="1107107" ref_url="https://bugzilla.suse.com/1107107" source="BUGZILLA"/>
		<reference ref_id="1108318" ref_url="https://bugzilla.suse.com/1108318" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16391" ref_url="https://www.suse.com/security/cve/CVE-2018-16391/" source="CVE"/>
		<reference ref_id="CVE-2018-16392" ref_url="https://www.suse.com/security/cve/CVE-2018-16392/" source="CVE"/>
		<reference ref_id="CVE-2018-16393" ref_url="https://www.suse.com/security/cve/CVE-2018-16393/" source="CVE"/>
		<reference ref_id="CVE-2018-16418" ref_url="https://www.suse.com/security/cve/CVE-2018-16418/" source="CVE"/>
		<reference ref_id="CVE-2018-16419" ref_url="https://www.suse.com/security/cve/CVE-2018-16419/" source="CVE"/>
		<reference ref_id="CVE-2018-16420" ref_url="https://www.suse.com/security/cve/CVE-2018-16420/" source="CVE"/>
		<reference ref_id="CVE-2018-16422" ref_url="https://www.suse.com/security/cve/CVE-2018-16422/" source="CVE"/>
		<reference ref_id="CVE-2018-16423" ref_url="https://www.suse.com/security/cve/CVE-2018-16423/" source="CVE"/>
		<reference ref_id="CVE-2018-16426" ref_url="https://www.suse.com/security/cve/CVE-2018-16426/" source="CVE"/>
		<reference ref_id="CVE-2018-16427" ref_url="https://www.suse.com/security/cve/CVE-2018-16427/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004830.html" source="SUSE-SU"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2018-16391: Fixed a denial of service when handling responses from a Muscle Card (bsc#1106998)
- CVE-2018-16392: Fixed a denial of service when handling responses from a TCOS Card (bsc#1106999)
- CVE-2018-16393: Fixed buffer overflows when handling responses from Gemsafe V1 Smartcards (bsc#1108318)
- CVE-2018-16418: Fixed buffer overflow when handling string concatenation in util_acl_to_str (bsc#1107039)
- CVE-2018-16419: Fixed several buffer overflows when handling responses from a Cryptoflex card (bsc#1107107)
- CVE-2018-16420: Fixed buffer overflows when handling responses from an ePass 2003 Card (bsc#1107097)
- CVE-2018-16422: Fixed single byte buffer overflow when handling responses from an esteid Card (bsc#1107038)
- CVE-2018-16423: Fixed double free when handling responses from a smartcard (bsc#1107037)
- CVE-2018-16426: Fixed endless recursion when handling responses from an IAS-ECC card (bsc#1107034)
- CVE-2018-16427: Fixed out of bounds reads when handling responses in OpenSC (bsc#1107033)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-05"/>
	<updated date="2018-11-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104812">SUSE bug 1104812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106998">SUSE bug 1106998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106999">SUSE bug 1106999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107033">SUSE bug 1107033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107034">SUSE bug 1107034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107037">SUSE bug 1107037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107038">SUSE bug 1107038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107039">SUSE bug 1107039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107097">SUSE bug 1107097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107107">SUSE bug 1107107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108318">SUSE bug 1108318</bugzilla>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16391/">CVE-2018-16391</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16392/">CVE-2018-16392</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16393/">CVE-2018-16393</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16418/">CVE-2018-16418</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16419/">CVE-2018-16419</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16420/">CVE-2018-16420</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16422/">CVE-2018-16422</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16423/">CVE-2018-16423</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16426/">CVE-2018-16426</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16427/">CVE-2018-16427</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520341" comment="opensc-0.13.0-3.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78412" version="1" class="patch">
	<metadata>
		<title>Security update for libarchive (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1032089" ref_url="https://bugzilla.suse.com/1032089" source="BUGZILLA"/>
		<reference ref_id="1037008" ref_url="https://bugzilla.suse.com/1037008" source="BUGZILLA"/>
		<reference ref_id="1037009" ref_url="https://bugzilla.suse.com/1037009" source="BUGZILLA"/>
		<reference ref_id="1057514" ref_url="https://bugzilla.suse.com/1057514" source="BUGZILLA"/>
		<reference ref_id="1059100" ref_url="https://bugzilla.suse.com/1059100" source="BUGZILLA"/>
		<reference ref_id="1059134" ref_url="https://bugzilla.suse.com/1059134" source="BUGZILLA"/>
		<reference ref_id="1059139" ref_url="https://bugzilla.suse.com/1059139" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10209" ref_url="https://www.suse.com/security/cve/CVE-2016-10209/" source="CVE"/>
		<reference ref_id="CVE-2016-10349" ref_url="https://www.suse.com/security/cve/CVE-2016-10349/" source="CVE"/>
		<reference ref_id="CVE-2016-10350" ref_url="https://www.suse.com/security/cve/CVE-2016-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-14166" ref_url="https://www.suse.com/security/cve/CVE-2017-14166/" source="CVE"/>
		<reference ref_id="CVE-2017-14501" ref_url="https://www.suse.com/security/cve/CVE-2017-14501/" source="CVE"/>
		<reference ref_id="CVE-2017-14502" ref_url="https://www.suse.com/security/cve/CVE-2017-14502/" source="CVE"/>
		<reference ref_id="CVE-2017-14503" ref_url="https://www.suse.com/security/cve/CVE-2017-14503/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004833.html" source="SUSE-SU"/>
		<description>
This update for libarchive fixes the following issues:

- CVE-2016-10209: The archive_wstring_append_from_mbs function in archive_string.c allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted archive file. (bsc#1032089)
- CVE-2016-10349: The archive_le32dec function in archive_endian.h allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. (bsc#1037008)
- CVE-2016-10350: The archive_read_format_cab_read_header function in archive_read_support_format_cab.c allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. (bsc#1037009)
- CVE-2017-14166: libarchive allowed remote attackers to cause a denial of service (xml_data heap-based buffer over-read and application crash) via a crafted xar archive, related to the mishandling of empty strings in the atol8 function in archive_read_support_format_xar.c. (bsc#1057514)
- CVE-2017-14501: An out-of-bounds read flaw existed in parse_file_info in archive_read_support_format_iso9660.c when extracting a specially crafted iso9660 iso file, related to archive_read_format_iso9660_read_header. (bsc#1059139)
- CVE-2017-14502: read_header in archive_read_support_format_rar.c suffered from an off-by-one error for UTF-16 names in RAR archives, leading to an out-of-bounds read in archive_read_format_rar_read_header. (bsc#1059134)
- CVE-2017-14503: libarchive suffered from an out-of-bounds read within lha_read_data_none() in archive_read_support_format_lha.c when extracting a specially crafted lha archive, related to lha_crc16. (bsc#1059100)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-07"/>
	<updated date="2018-11-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1032089">SUSE bug 1032089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037008">SUSE bug 1037008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037009">SUSE bug 1037009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057514">SUSE bug 1057514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059100">SUSE bug 1059100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059134">SUSE bug 1059134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059139">SUSE bug 1059139</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10209/">CVE-2016-10209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10349/">CVE-2016-10349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10350/">CVE-2016-10350</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14166/">CVE-2017-14166</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14501/">CVE-2017-14501</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14502/">CVE-2017-14502</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14503/">CVE-2017-14503</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520342" comment="libarchive13-3.1.2-26.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78413" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1062937" ref_url="https://bugzilla.suse.com/1062937" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15232" ref_url="https://www.suse.com/security/cve/CVE-2017-15232/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003709.html" source="SUSE-SU"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

Feature update:

- Update from version 1.3.1 to version 1.5.2 (fate#324061).
  
Security issue fixed:

- CVE-2017-15232: Fix NULL pointer dereference in jdpostct.c and jquant1.c (bsc#1062937).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-06"/>
	<updated date="2018-02-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062937">SUSE bug 1062937</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15232/">CVE-2017-15232</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518832" comment="libjpeg-turbo-1.5.3-31.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518833" comment="libjpeg62-62.2.0-31.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518834" comment="libjpeg62-32bit-62.2.0-31.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518835" comment="libjpeg62-turbo-1.5.3-31.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518836" comment="libjpeg8-8.1.2-31.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518837" comment="libjpeg8-32bit-8.1.2-31.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518838" comment="libturbojpeg0-8.1.2-31.7.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78414" version="1" class="patch">
	<metadata>
		<title>security update for spice-vdagent (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1012215" ref_url="https://bugzilla.suse.com/1012215" source="BUGZILLA"/>
		<reference ref_id="1070724" ref_url="https://bugzilla.suse.com/1070724" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15108" ref_url="https://www.suse.com/security/cve/CVE-2017-15108/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003708.html" source="SUSE-SU"/>
		<description>
This update for spice-vdagent provides the following fixes:

This security issue was fixed:

- CVE-2017-15108: Properly escape save directory that is passed to the shell to
  prevent local attacker with access to the session the agent runs from injecting
  arbitrary commands to be executed (bsc#1070724).

This non-security issue was fixed:

- Implement endian swapping, required for big-endian guests to connect to the spice client
  successfully. (bsc#1012215)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-06"/>
	<updated date="2018-02-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1012215">SUSE bug 1012215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070724">SUSE bug 1070724</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15108/">CVE-2017-15108</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518839" comment="spice-vdagent-0.16.0-8.5.15 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78415" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1011920" ref_url="https://bugzilla.suse.com/1011920" source="BUGZILLA"/>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1012422" ref_url="https://bugzilla.suse.com/1012422" source="BUGZILLA"/>
		<reference ref_id="1020645" ref_url="https://bugzilla.suse.com/1020645" source="BUGZILLA"/>
		<reference ref_id="1031392" ref_url="https://bugzilla.suse.com/1031392" source="BUGZILLA"/>
		<reference ref_id="1035053" ref_url="https://bugzilla.suse.com/1035053" source="BUGZILLA"/>
		<reference ref_id="1042422" ref_url="https://bugzilla.suse.com/1042422" source="BUGZILLA"/>
		<reference ref_id="1043591" ref_url="https://bugzilla.suse.com/1043591" source="BUGZILLA"/>
		<reference ref_id="1048129" ref_url="https://bugzilla.suse.com/1048129" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1050549" ref_url="https://bugzilla.suse.com/1050549" source="BUGZILLA"/>
		<reference ref_id="1053043" ref_url="https://bugzilla.suse.com/1053043" source="BUGZILLA"/>
		<reference ref_id="1054239" ref_url="https://bugzilla.suse.com/1054239" source="BUGZILLA"/>
		<reference ref_id="1057199" ref_url="https://bugzilla.suse.com/1057199" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065726" ref_url="https://bugzilla.suse.com/1065726" source="BUGZILLA"/>
		<reference ref_id="1067906" ref_url="https://bugzilla.suse.com/1067906" source="BUGZILLA"/>
		<reference ref_id="1073579" ref_url="https://bugzilla.suse.com/1073579" source="BUGZILLA"/>
		<reference ref_id="1076393" ref_url="https://bugzilla.suse.com/1076393" source="BUGZILLA"/>
		<reference ref_id="1078788" ref_url="https://bugzilla.suse.com/1078788" source="BUGZILLA"/>
		<reference ref_id="1079524" ref_url="https://bugzilla.suse.com/1079524" source="BUGZILLA"/>
		<reference ref_id="1082519" ref_url="https://bugzilla.suse.com/1082519" source="BUGZILLA"/>
		<reference ref_id="1083215" ref_url="https://bugzilla.suse.com/1083215" source="BUGZILLA"/>
		<reference ref_id="1083527" ref_url="https://bugzilla.suse.com/1083527" source="BUGZILLA"/>
		<reference ref_id="1084760" ref_url="https://bugzilla.suse.com/1084760" source="BUGZILLA"/>
		<reference ref_id="1089343" ref_url="https://bugzilla.suse.com/1089343" source="BUGZILLA"/>
		<reference ref_id="1091158" ref_url="https://bugzilla.suse.com/1091158" source="BUGZILLA"/>
		<reference ref_id="1093118" ref_url="https://bugzilla.suse.com/1093118" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1094825" ref_url="https://bugzilla.suse.com/1094825" source="BUGZILLA"/>
		<reference ref_id="1095805" ref_url="https://bugzilla.suse.com/1095805" source="BUGZILLA"/>
		<reference ref_id="1096052" ref_url="https://bugzilla.suse.com/1096052" source="BUGZILLA"/>
		<reference ref_id="1098050" ref_url="https://bugzilla.suse.com/1098050" source="BUGZILLA"/>
		<reference ref_id="1098996" ref_url="https://bugzilla.suse.com/1098996" source="BUGZILLA"/>
		<reference ref_id="1099597" ref_url="https://bugzilla.suse.com/1099597" source="BUGZILLA"/>
		<reference ref_id="1101555" ref_url="https://bugzilla.suse.com/1101555" source="BUGZILLA"/>
		<reference ref_id="1103308" ref_url="https://bugzilla.suse.com/1103308" source="BUGZILLA"/>
		<reference ref_id="1103405" ref_url="https://bugzilla.suse.com/1103405" source="BUGZILLA"/>
		<reference ref_id="1104124" ref_url="https://bugzilla.suse.com/1104124" source="BUGZILLA"/>
		<reference ref_id="1105025" ref_url="https://bugzilla.suse.com/1105025" source="BUGZILLA"/>
		<reference ref_id="1105428" ref_url="https://bugzilla.suse.com/1105428" source="BUGZILLA"/>
		<reference ref_id="1105795" ref_url="https://bugzilla.suse.com/1105795" source="BUGZILLA"/>
		<reference ref_id="1105931" ref_url="https://bugzilla.suse.com/1105931" source="BUGZILLA"/>
		<reference ref_id="1106105" ref_url="https://bugzilla.suse.com/1106105" source="BUGZILLA"/>
		<reference ref_id="1106110" ref_url="https://bugzilla.suse.com/1106110" source="BUGZILLA"/>
		<reference ref_id="1106240" ref_url="https://bugzilla.suse.com/1106240" source="BUGZILLA"/>
		<reference ref_id="1106293" ref_url="https://bugzilla.suse.com/1106293" source="BUGZILLA"/>
		<reference ref_id="1106359" ref_url="https://bugzilla.suse.com/1106359" source="BUGZILLA"/>
		<reference ref_id="1106434" ref_url="https://bugzilla.suse.com/1106434" source="BUGZILLA"/>
		<reference ref_id="1106594" ref_url="https://bugzilla.suse.com/1106594" source="BUGZILLA"/>
		<reference ref_id="1106913" ref_url="https://bugzilla.suse.com/1106913" source="BUGZILLA"/>
		<reference ref_id="1106929" ref_url="https://bugzilla.suse.com/1106929" source="BUGZILLA"/>
		<reference ref_id="1107060" ref_url="https://bugzilla.suse.com/1107060" source="BUGZILLA"/>
		<reference ref_id="1107299" ref_url="https://bugzilla.suse.com/1107299" source="BUGZILLA"/>
		<reference ref_id="1107318" ref_url="https://bugzilla.suse.com/1107318" source="BUGZILLA"/>
		<reference ref_id="1107535" ref_url="https://bugzilla.suse.com/1107535" source="BUGZILLA"/>
		<reference ref_id="1107829" ref_url="https://bugzilla.suse.com/1107829" source="BUGZILLA"/>
		<reference ref_id="1107870" ref_url="https://bugzilla.suse.com/1107870" source="BUGZILLA"/>
		<reference ref_id="1108315" ref_url="https://bugzilla.suse.com/1108315" source="BUGZILLA"/>
		<reference ref_id="1108377" ref_url="https://bugzilla.suse.com/1108377" source="BUGZILLA"/>
		<reference ref_id="1108498" ref_url="https://bugzilla.suse.com/1108498" source="BUGZILLA"/>
		<reference ref_id="1109158" ref_url="https://bugzilla.suse.com/1109158" source="BUGZILLA"/>
		<reference ref_id="1109333" ref_url="https://bugzilla.suse.com/1109333" source="BUGZILLA"/>
		<reference ref_id="1109772" ref_url="https://bugzilla.suse.com/1109772" source="BUGZILLA"/>
		<reference ref_id="1109784" ref_url="https://bugzilla.suse.com/1109784" source="BUGZILLA"/>
		<reference ref_id="1109806" ref_url="https://bugzilla.suse.com/1109806" source="BUGZILLA"/>
		<reference ref_id="1109818" ref_url="https://bugzilla.suse.com/1109818" source="BUGZILLA"/>
		<reference ref_id="1109907" ref_url="https://bugzilla.suse.com/1109907" source="BUGZILLA"/>
		<reference ref_id="1109919" ref_url="https://bugzilla.suse.com/1109919" source="BUGZILLA"/>
		<reference ref_id="1109923" ref_url="https://bugzilla.suse.com/1109923" source="BUGZILLA"/>
		<reference ref_id="1110006" ref_url="https://bugzilla.suse.com/1110006" source="BUGZILLA"/>
		<reference ref_id="1110363" ref_url="https://bugzilla.suse.com/1110363" source="BUGZILLA"/>
		<reference ref_id="1110468" ref_url="https://bugzilla.suse.com/1110468" source="BUGZILLA"/>
		<reference ref_id="1110600" ref_url="https://bugzilla.suse.com/1110600" source="BUGZILLA"/>
		<reference ref_id="1110601" ref_url="https://bugzilla.suse.com/1110601" source="BUGZILLA"/>
		<reference ref_id="1110602" ref_url="https://bugzilla.suse.com/1110602" source="BUGZILLA"/>
		<reference ref_id="1110603" ref_url="https://bugzilla.suse.com/1110603" source="BUGZILLA"/>
		<reference ref_id="1110604" ref_url="https://bugzilla.suse.com/1110604" source="BUGZILLA"/>
		<reference ref_id="1110605" ref_url="https://bugzilla.suse.com/1110605" source="BUGZILLA"/>
		<reference ref_id="1110606" ref_url="https://bugzilla.suse.com/1110606" source="BUGZILLA"/>
		<reference ref_id="1110611" ref_url="https://bugzilla.suse.com/1110611" source="BUGZILLA"/>
		<reference ref_id="1110612" ref_url="https://bugzilla.suse.com/1110612" source="BUGZILLA"/>
		<reference ref_id="1110613" ref_url="https://bugzilla.suse.com/1110613" source="BUGZILLA"/>
		<reference ref_id="1110614" ref_url="https://bugzilla.suse.com/1110614" source="BUGZILLA"/>
		<reference ref_id="1110615" ref_url="https://bugzilla.suse.com/1110615" source="BUGZILLA"/>
		<reference ref_id="1110616" ref_url="https://bugzilla.suse.com/1110616" source="BUGZILLA"/>
		<reference ref_id="1110618" ref_url="https://bugzilla.suse.com/1110618" source="BUGZILLA"/>
		<reference ref_id="1110619" ref_url="https://bugzilla.suse.com/1110619" source="BUGZILLA"/>
		<reference ref_id="1111363" ref_url="https://bugzilla.suse.com/1111363" source="BUGZILLA"/>
		<reference ref_id="1111516" ref_url="https://bugzilla.suse.com/1111516" source="BUGZILLA"/>
		<reference ref_id="1111870" ref_url="https://bugzilla.suse.com/1111870" source="BUGZILLA"/>
		<reference ref_id="1112007" ref_url="https://bugzilla.suse.com/1112007" source="BUGZILLA"/>
		<reference ref_id="1112262" ref_url="https://bugzilla.suse.com/1112262" source="BUGZILLA"/>
		<reference ref_id="1112263" ref_url="https://bugzilla.suse.com/1112263" source="BUGZILLA"/>
		<reference ref_id="1112894" ref_url="https://bugzilla.suse.com/1112894" source="BUGZILLA"/>
		<reference ref_id="1112902" ref_url="https://bugzilla.suse.com/1112902" source="BUGZILLA"/>
		<reference ref_id="1112903" ref_url="https://bugzilla.suse.com/1112903" source="BUGZILLA"/>
		<reference ref_id="1112905" ref_url="https://bugzilla.suse.com/1112905" source="BUGZILLA"/>
		<reference ref_id="1113667" ref_url="https://bugzilla.suse.com/1113667" source="BUGZILLA"/>
		<reference ref_id="1113751" ref_url="https://bugzilla.suse.com/1113751" source="BUGZILLA"/>
		<reference ref_id="1113769" ref_url="https://bugzilla.suse.com/1113769" source="BUGZILLA"/>
		<reference ref_id="1114178" ref_url="https://bugzilla.suse.com/1114178" source="BUGZILLA"/>
		<reference ref_id="1114229" ref_url="https://bugzilla.suse.com/1114229" source="BUGZILLA"/>
		<reference ref_id="1114648" ref_url="https://bugzilla.suse.com/1114648" source="BUGZILLA"/>
		<reference ref_id="981083" ref_url="https://bugzilla.suse.com/981083" source="BUGZILLA"/>
		<reference ref_id="997172" ref_url="https://bugzilla.suse.com/997172" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-18281" ref_url="https://www.suse.com/security/cve/CVE-2018-18281/" source="CVE"/>
		<reference ref_id="CVE-2018-18386" ref_url="https://www.suse.com/security/cve/CVE-2018-18386/" source="CVE"/>
		<reference ref_id="CVE-2018-18690" ref_url="https://www.suse.com/security/cve/CVE-2018-18690/" source="CVE"/>
		<reference ref_id="CVE-2018-18710" ref_url="https://www.suse.com/security/cve/CVE-2018-18710/" source="CVE"/>
		<reference ref_id="CVE-2018-9516" ref_url="https://www.suse.com/security/cve/CVE-2018-9516/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004844.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.162 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bnc#1107829).
- CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).
- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).
- CVE-2018-18690: A local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandled ATTR_REPLACE operations with conversion of an attr from short to long form (bnc#1105025).
- CVE-2018-18710: An issue was discovered in the Linux kernel An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).
- CVE-2018-9516: A lack of certain checks in the hid_debug_events_read() function in the drivers/hid/hid-debug.c file might have resulted in receiving userspace buffer overflow and an out-of-bounds write or to the infinite loop. (bnc#1108498).

The following non-security bugs were fixed:

- 6lowpan: iphc: reset mac_header after decompress to fix panic (bnc#1012382).
- alsa: bebob: use address returned by kmalloc() instead of kernel stack for streaming DMA mapping (bnc#1012382).
- alsa: emu10k1: fix possible info leak to userspace on SNDRV_EMU10K1_IOCTL_INFO (bnc#1012382).
- alsa: hda: Add AZX_DCAPS_PM_RUNTIME for AMD Raven Ridge (bnc#1012382).
- alsa: hda - Fix cancel_work_sync() stall from jackpoll work (bnc#1012382).
- alsa: hda/realtek - Cannot adjust speaker's volume on Dell XPS 27 7760 (bnc#1012382).
- alsa: msnd: Fix the default sample sizes (bnc#1012382).
- alsa: pcm: Fix snd_interval_refine first/last with open min/max (bnc#1012382).
- alsa: usb-audio: Fix multiple definitions in AU0828_DEVICE() macro (bnc#1012382).
- apparmor: remove no-op permission check in policy_unpack (git-fixes).
- arc: build: Get rid of toolchain check (bnc#1012382).
- arc: clone syscall to setp r25 as thread pointer (bnc#1012382).
- arch/hexagon: fix kernel/dma.c build warning (bnc#1012382).
- arc: [plat-axs*]: Enable SWAP (bnc#1012382).
- arm64: bpf: jit JMP_JSET_{X,K} (bsc#1110613).
- arm64: Correct type for PUD macros (bsc#1110600).
- arm64: cpufeature: Track 32bit EL0 support (bnc#1012382).
- arm64: dts: qcom: db410c: Fix Bluetooth LED trigger (bnc#1012382).
- arm64: fix erroneous __raw_read_system_reg() cases (bsc#1110606).
- arm64: Fix potential race with hardware DBM in ptep_set_access_flags() (bsc#1110605).
- arm64: fpsimd: Avoid FPSIMD context leakage for the init task (bsc#1110603).
- arm64: jump_label.h: use asm_volatile_goto macro instead of 'asm goto' (bnc#1012382).
- arm64: kasan: avoid bad virt_to_pfn() (bsc#1110612).
- arm64: kasan: avoid pfn_to_nid() before page array is initialized (bsc#1110619).
- arm64/kasan: do not allocate extra shadow memory (bsc#1110611).
- arm64: kernel: Update kerneldoc for cpu_suspend() rename (bsc#1110602).
- arm64: kgdb: handle read-only text / modules (bsc#1110604).
- arm64: kvm: Sanitize PSTATE.M when being set from userspace (bnc#1012382).
- arm64: kvm: Tighten guest core register access from userspace (bnc#1012382).
- arm64/mm/kasan: do not use vmemmap_populate() to initialize shadow (bsc#1110618).
- arm64: ptrace: Avoid setting compat FP[SC]R to garbage if get_user fails (bsc#1110601).
- arm64: supported.conf: mark armmmci as not supported
- arm64 Update config files. (bsc#1110468) Set MMC_QCOM_DML to build-in and delete driver from supported.conf
- arm64: vdso: fix clock_getres for 4GiB-aligned res (bsc#1110614).
- arm: dts: at91: add new compatibility string for macb on sama5d3 (bnc#1012382).
- arm: dts: dra7: fix DCAN node addresses (bnc#1012382).
- arm: exynos: Clear global variable on init error path (bnc#1012382).
- arm: hisi: check of_iomap and fix missing of_node_put (bnc#1012382).
- arm: hisi: fix error handling and missing of_node_put (bnc#1012382).
- arm: hisi: handle of_iomap and fix missing of_node_put (bnc#1012382).
- arm: mvebu: declare asm symbols as character arrays in pmsu.c (bnc#1012382).
- ASoC: cs4265: fix MMTLR Data switch control (bnc#1012382).
- ASoC: dapm: Fix potential DAI widget pointer deref when linking DAIs (bnc#1012382).
- ASoC: sigmadsp: safeload should not have lower byte limit (bnc#1012382).
- ASoC: wm8804: Add ACPI support (bnc#1012382).
- ata: libahci: Correct setting of DEVSLP register (bnc#1012382).
- ath10k: disable bundle mgmt tx completion event support (bnc#1012382).
- ath10k: fix scan crash due to incorrect length calculation (bnc#1012382).
- ath10k: fix use-after-free in ath10k_wmi_cmd_send_nowait (bnc#1012382).
- ath10k: prevent active scans on potential unusable channels (bnc#1012382).
- ath10k: protect ath10k_htt_rx_ring_free with rx_ring.lock (bnc#1012382).
- audit: fix use-after-free in audit_add_watch (bnc#1012382).
- autofs: fix autofs_sbi() does not check super block type (bnc#1012382).
- binfmt_elf: Respect error return from `regset-&gt;active' (bnc#1012382).
- bluetooth: Add a new Realtek 8723DE ID 0bda:b009 (bnc#1012382).
- bluetooth: h5: Fix missing dependency on BT_HCIUART_SERDEV (bnc#1012382).
- bluetooth: hidp: Fix handling of strncpy for hid-&gt;name information (bnc#1012382).
- bnxt_en: Fix TX timeout during netpoll (bnc#1012382).
- bonding: avoid possible dead-lock (bnc#1012382).
- bpf: fix cb access in socket filter programs on tail calls (bsc#1012382).
- bpf: fix map not being uncharged during map creation failure (bsc#1012382).
- bpf, s390: fix potential memleak when later bpf_jit_prog fails (git-fixes).
- bpf, s390x: do not reload skb pointers in non-skb context (git-fixes).
- bsc#1106913: Replace with upstream variants
- btrfs: add a comp_refs() helper (dependency for bsc#1031392).
- btrfs: add missing initialization in btrfs_check_shared (Git-fixes bsc#1112262).
- btrfs: add tracepoints for outstanding extents mods (dependency for bsc#1031392).
- btrfs: add wrapper for counting BTRFS_MAX_EXTENT_SIZE (dependency for bsc#1031392).
- btrfs: cleanup extent locking sequence (dependency for bsc#1031392).
- btrfs: defrag: use btrfs_mod_outstanding_extents in cluster_pages_for_defrag (Follow up fixes for bsc#1031392).
- btrfs: delayed-inode: Remove wrong qgroup meta reservation calls (bsc#1031392).
- btrfs: delayed-inode: Use new qgroup meta rsv for delayed inode and item (bsc#1031392).
- btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency for bsc#1113667).
- btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667).
- btrfs: fix error handling in btrfs_dev_replace_start (bsc#1107535).
- btrfs: fix invalid attempt to free reserved space on failure to cow range (dependency for bsc#1031392).
- btrfs: fix missing error return in btrfs_drop_snapshot (Git-fixes bsc#1109919).
- btrfs: Fix race condition between delayed refs and blockgroup removal (Git-fixes bsc#1112263).
- btrfs: Fix wrong btrfs_delalloc_release_extents parameter (bsc#1031392).
- btrfs: kill trans in run_delalloc_nocow and btrfs_cross_ref_exist (dependency for bsc#1031392).
- btrfs: make the delalloc block rsv per inode (dependency for bsc#1031392).
- btrfs: pass delayed_refs directly to btrfs_find_delayed_ref_head (dependency for bsc#1031392).
- btrfs: qgroup: Add quick exit for non-fs extents (dependency for bsc#1031392).
- btrfs: qgroup: Cleanup btrfs_qgroup_prepare_account_extents function (dependency for bsc#1031392).
- btrfs: qgroup: Cleanup the remaining old reservation counters (bsc#1031392).
- btrfs: qgroup: Commit transaction in advance to reduce early EDQUOT (bsc#1031392).
- btrfs: qgroup: Do not use root-&gt;qgroup_meta_rsv for qgroup (bsc#1031392).
- btrfs: qgroup: Fix wrong qgroup reservation update for relationship modification (bsc#1031392).
- btrfs: qgroup: Introduce function to convert META_PREALLOC into META_PERTRANS (bsc#1031392).
- btrfs: qgroup: Introduce helpers to update and access new qgroup rsv (bsc#1031392).
- btrfs: qgroup: Make qgroup_reserve and its callers to use separate reservation type (bsc#1031392).
- btrfs: qgroup: Skeleton to support separate qgroup reservation type (bsc#1031392).
- btrfs: qgroups: opencode qgroup_free helper (dependency for bsc#1031392).
- btrfs: qgroup: Split meta rsv type into meta_prealloc and meta_pertrans (bsc#1031392).
- btrfs: qgroup: Update trace events for metadata reservation (bsc#1031392).
- btrfs: qgroup: Update trace events to use new separate rsv types (bsc#1031392).
- btrfs: qgroup: Use independent and accurate per inode qgroup rsv (bsc#1031392).
- btrfs: qgroup: Use root::qgroup_meta_rsv_* to record qgroup meta reserved space (bsc#1031392).
- btrfs: qgroup: Use separate meta reservation type for delalloc (bsc#1031392).
- btrfs: remove type argument from comp_tree_refs (dependency for bsc#1031392).
- btrfs: rework outstanding_extents (dependency for bsc#1031392).
- btrfs: switch args for comp_*_refs (dependency for bsc#1031392).
- btrfs: Take trans lock before access running trans in check_delayed_ref (Follow up fixes for bsc#1031392).
- ceph: avoid a use-after-free in ceph_destroy_options() (bsc#1112007).
- cfg80211: fix a type issue in ieee80211_chandef_to_operating_class() (bnc#1012382).
- cfg80211: nl80211_update_ft_ies() to validate NL80211_ATTR_IE (bnc#1012382).
- cfq: Give a chance for arming slice idle timer in case of group_idle (bnc#1012382).
- cgroup: Fix deadlock in cpu hotplug path (bnc#1012382).
- cgroup, netclassid: add a preemption point to write_classid (bnc#1098996).
- cifs: check for STATUS_USER_SESSION_DELETED (bsc#1112902).
- cifs: connect to servername instead of IP for IPC$ share (bsc#1106359).
- cifs: fix memory leak in SMB2_open() (bsc#1112894).
- cifs: Fix use after free of a mid_q_entry (bsc#1112903).
- cifs: fix wrapping bugs in num_entries() (bnc#1012382).
- cifs: integer overflow in in SMB2_ioctl() (bsc#1012382).
- cifs: prevent integer overflow in nxt_dir_entry() (bnc#1012382).
- cifs: read overflow in is_valid_oplock_break() (bnc#1012382).
- clk: imx6ul: fix missing of_node_put() (bnc#1012382).
- clocksource/drivers/ti-32k: Add CLOCK_SOURCE_SUSPEND_NONSTOP flag for non-am43 SoCs (bnc#1012382).
- config.sh: set BUGZILLA_PRODUCT for SLE12-SP3
- coresight: Handle errors in finding input/output ports (bnc#1012382).
- coresight: tpiu: Fix disabling timeouts (bnc#1012382).
- cpu/hotplug: Fix SMT supported evaluation (bsc#1089343).
- crypto: mxs-dcp - Fix wait logic on chan threads (bnc#1012382).
- crypto: sharah - Unregister correct algorithms for SAHARA 3 (bnc#1012382).
- crypto: skcipher - Fix -Wstringop-truncation warnings (bnc#1012382).
- Define dependencies of in-kernel KMPs statically This allows us to use rpm's internal dependency generator (bsc#981083).
- Define early_radix_enabled() (bsc#1094244).
- dmaengine: pl330: fix irq race with terminate_all (bnc#1012382).
- dm cache: fix resize crash if user does not reload cache table (bnc#1012382).
- dm thin metadata: fix __udivdi3 undefined on 32-bit (bnc#1012382).
- dm thin metadata: try to avoid ever aborting transactions (bnc#1012382).
- Do not ship firmware (bsc#1054239). Pull firmware from kernel-firmware instead.
- drivers: net: cpsw: fix parsing of phy-handle DT property in dual_emac config (bnc#1012382).
- drivers: net: cpsw: fix segfault in case of bad phy-handle (bnc#1012382).
- drivers/tty: add error handling for pcmcia_loop_config (bnc#1012382).
- drm/amdgpu: Fix SDMA HQD destroy error on gfx_v7 (bnc#1012382).
- drm/amdkfd: Fix error codes in kfd_get_process (bnc#1012382).
- drm/nouveau/drm/nouveau: Use pm_runtime_get_noresume() in connector_detect() (bnc#1012382).
- drm/nouveau/TBDdevinit: do not fail when PMU/PRE_OS is missing from VBIOS (bnc#1012382).
- drm/nouveau: tegra: Detach from ARM DMA/IOMMU mapping (bnc#1012382).
- drm/virtio: fix bounds check in virtio_gpu_cmd_get_capset() (bsc#1106929)
- Drop dtb-source.spec and move the sources to kernel-source (bsc#1011920)
- e1000: check on netif_running() before calling e1000_up() (bnc#1012382).
- e1000: ensure to free old tx/rx rings in set_ringparam() (bnc#1012382).
- ebtables: arpreply: Add the standard target sanity check (bnc#1012382).
- edac, thunderx: Fix memory leak in thunderx_l2c_threaded_isr() (bsc#1114648).
- ethernet: ti: davinci_emac: add missing of_node_put after calling of_parse_phandle (bnc#1012382).
- ethtool: Remove trailing semicolon for static inline (bnc#1012382).
- ethtool: restore erroneously removed break in dev_ethtool (bsc#1114229).
- ext4: avoid divide by zero fault when deleting corrupted inline directories (bnc#1012382).
- ext4: do not mark mmp buffer head dirty (bnc#1012382).
- ext4: fix online resize's handling of a too-small final block group (bnc#1012382).
- ext4: fix online resizing for bigalloc file systems with a 1k block size (bnc#1012382).
- ext4: recalucate superblock checksum after updating free blocks/inodes (bnc#1012382).
- f2fs: do not set free of current section (bnc#1012382).
- f2fs: fix to do sanity check with {sit,nat}_ver_bitmap_bytesize (bnc#1012382).
- fbdev: Distinguish between interlaced and progressive modes (bnc#1012382).
- fbdev: fix broken menu dependencies (bsc#1106929)
- fbdev/omapfb: fix omapfb_memory_read infoleak (bnc#1012382).
- fbdev/via: fix defined but not used warning (bnc#1012382).
- floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl (bnc#1012382).
- fs/cifs: do not translate SFM_SLASH (U+F026) to backslash (bnc#1012382).
- fs/cifs: suppress a string overflow warning (bnc#1012382).
- fs/eventpoll: loosen irq-safety when possible (bsc#1096052).
- gfs2: Special-case rindex for gfs2_grow (bnc#1012382).
- gpio: adp5588: Fix sleep-in-atomic-context bug (bnc#1012382).
- gpiolib: Mark gpio_suffixes array with __maybe_unused (bnc#1012382).
- gpio: ml-ioh: Fix buffer underwrite on probe error path (bnc#1012382).
- gpio: tegra: Move driver registration to subsys_init level (bnc#1012382).
- gso_segment: Reset skb-&gt;mac_len after modifying network header (bnc#1012382).
- hexagon: modify ffs() and fls() to return int (bnc#1012382).
- hid: hid-ntrig: add error handling for sysfs_create_group (bnc#1012382).
- hid: sony: Support DS4 dongle (bnc#1012382).
- hid: sony: Update device ids (bnc#1012382).
- hv: avoid crash in vmbus sysfs files (bnc#1108377).
- hwmon: (adt7475) Make adt7475_read_word() return errors (bnc#1012382).
- hwmon: (ina2xx) fix sysfs shunt resistor read access (bnc#1012382).
- i2c: i2c-scmi: fix for i2c_smbus_write_block_data (bnc#1012382).
- i2c: i801: Allow ACPI AML access I/O ports not reserved for SMBus (bnc#1012382).
- i2c: i801: fix DNV's SMBCTRL register offset (bnc#1012382).
- i2c: uniphier-f: issue STOP only for last message or I2C_M_STOP (bnc#1012382).
- i2c: uniphier: issue STOP only for last message or I2C_M_STOP (bnc#1012382).
- i2c: xiic: Make the start and the byte count write atomic (bnc#1012382).
- i2c: xlp9xx: Add support for SMBAlert (bsc#1103308).
- i2c: xlp9xx: Fix case where SSIF read transaction completes early (bsc#1103308).
- i2c: xlp9xx: Fix issue seen when updating receive length (bsc#1103308).
- i2c: xlp9xx: Make sure the transfer size is not more than I2C_SMBUS_BLOCK_SIZE (bsc#1103308).
- ib/ipoib: Avoid a race condition between start_xmit and cm_rep_handler (bnc#1012382).
- ib/srp: Avoid that sg_reset -d ${srp_device} triggers an infinite loop (bnc#1012382).
- input: atakbd - fix Atari CapsLock behaviour (bnc#1012382).
- input: atakbd - fix Atari keymap (bnc#1012382).
- input: atmel_mxt_ts - only use first T9 instance (bnc#1012382).
- input: elantech - enable middle button of touchpad on ThinkPad P72 (bnc#1012382).
- iommu/amd: Return devid as alias for ACPI HID devices (bsc#1106105).
- iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer register (bnc#1012382).
- iommu/ipmmu-vmsa: Fix allocation in atomic context (bnc#1012382).
- ip6_tunnel: be careful when accessing the inner header (bnc#1012382).
- ipmi:ssif: Add support for multi-part transmit messages &gt; 2 parts (bsc#1103308).
- ip_tunnel: be careful when accessing the inner header (bnc#1012382).
- ipv4: fix use-after-free in ip_cmsg_recv_dstaddr() (bnc#1012382).
- ipv6: fix possible use-after-free in ip6_xmit() (bnc#1012382).
- iw_cxgb4: only allow 1 flush on user qps (bnc#1012382).
- ixgbe: pci_set_drvdata must be called before register_netdev (Git-fixes bsc#1109923).
- jffs2: return -ERANGE when xattr buffer is too small (bnc#1012382).
- KABI: move the new handler to end of machdep_calls and hide it from genksyms (bsc#1094244).
- kABI: protect struct hnae_desc_cb (kabi).
- kbuild: add .DELETE_ON_ERROR special target (bnc#1012382).
- kernel-obs-build.spec.in: add --no-hostonly-cmdline to dracut invocation (boo#1062303). call dracut with --no-hostonly-cmdline to avoid the random rootfs UUID being added into the initrd's /etc/cmdline.d/95root-dev.conf
- kernel-obs-build: use pae and lpae kernels where available (bsc#1073579).
- kernel/params.c: downgrade warning for unsafe parameters (bsc#1050549).
- kprobes/x86: Release insn_slot in failure path (bsc#1110006).
- kthread: fix boot hang (regression) on MIPS/OpenRISC (bnc#1012382).
- kthread: Fix use-after-free if kthread fork fails (bnc#1012382).
- kvm: nVMX: Do not expose MPX VMX controls when guest MPX disabled (bsc#1106240).
- kvm: nVMX: Do not flush TLB when vmcs12 uses VPID (bsc#1106240).
- kvm: PPC: Book3S HV: Do not truncate HPTE index in xlate function (bnc#1012382).
- kvm: x86: Do not re-{try,execute} after failed emulation in L2 (bsc#1106240).
- kvm: x86: Do not use kvm_x86_ops-&gt;mpx_supported() directly (bsc#1106240).
- kvm: x86: fix APIC page invalidation (bsc#1106240).
- kvm: x86: remove eager_fpu field of struct kvm_vcpu_arch (bnc#1012382).
- kvm/x86: remove WARN_ON() for when vm_munmap() fails (bsc#1106240).
- kvm: x86: SVM: Call x86_spec_ctrl_set_guest/host() with interrupts disabled (bsc#1106240).
- lib/test_hexdump.c: fix failure on big endian cpu (bsc#1106110).
- locking/osq_lock: Fix osq_lock queue corruption (bnc#1012382).
- locking/rwsem-xadd: Fix missed wakeup due to reordering of load (bnc#1012382).
- lpfc: fixup crash in lpfc_els_unsol_buffer() (bsc#1107318).
- mac80211: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bnc#1012382).
- mac80211: fix a race between restart and CSA flows (bnc#1012382).
- mac80211: fix setting IEEE80211_KEY_FLAG_RX_MGMT for AP mode keys (bnc#1012382).
- mac80211: Fix station bandwidth setting after channel switch (bnc#1012382).
- mac80211_hwsim: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bnc#1012382).
- mac80211: mesh: fix HWMP sequence numbering to follow standard (bnc#1012382).
- mac80211: restrict delayed tailroom needed decrement (bnc#1012382).
- mac80211: shorten the IBSS debug messages (bnc#1012382).
- mach64: detect the dot clock divider correctly on sparc (bnc#1012382).
- macintosh/via-pmu: Add missing mmio accessors (bnc#1012382).
- macros.kernel-source: define linux_arch for KMPs (boo#1098050). CONFIG_64BIT is no longer defined so KMP spec files need to include %{?linux_make_arch} in any make call to build modules or descent into the kernel directory for any reason.
- macros.kernel-source: pass -b properly in kernel module package (bsc#1107870).
- macros.kernel-source: pass -f properly in module subpackage (boo#1076393).
- md-cluster: clear another node's suspend_area after the copy is finished (bnc#1012382).
- md/raid1: exit sync request if MD_RECOVERY_INTR is set (git-fixes).
- md/raid5: fix data corruption of replacements after originals dropped (bnc#1012382).
- media: af9035: prevent buffer overflow on write (bnc#1012382).
- media: exynos4-is: Prevent NULL pointer dereference in __isp_video_try_fmt() (bnc#1012382).
- media: fsl-viu: fix error handling in viu_of_probe() (bnc#1012382).
- media: omap3isp: zero-initialize the isp cam_xclk{a,b} initial data (bnc#1012382).
- media: omap_vout: Fix a possible null pointer dereference in omap_vout_open() (bsc#1050431).
- media: s3c-camif: ignore -ENOIOCTLCMD from v4l2_subdev_call for s_power (bnc#1012382).
- media: soc_camera: ov772x: correct setting of banding filter (bnc#1012382).
- media: tm6000: add error handling for dvb_register_adapter (bnc#1012382).
- media: uvcvideo: Support realtek's UVC 1.5 device (bnc#1012382).
- media: v4l: event: Prevent freeing event subscriptions while accessed (bnc#1012382).
- media: videobuf2-core: check for q-&gt;error in vb2_core_qbuf() (bnc#1012382).
- media: videobuf-dma-sg: Fix dma_{sync,unmap}_sg() calls (bsc#1050431).
- mei: bus: type promotion bug in mei_nfc_if_version() (bnc#1012382).
- memory_hotplug: cond_resched in __remove_pages (bnc#1114178).
- mfd: omap-usb-host: Fix dts probe of children (bnc#1012382).
- mfd: ti_am335x_tscadc: Fix struct clk memory leak (bnc#1012382).
- misc: hmc6352: fix potential Spectre v1 (bnc#1012382).
- misc: mic: SCIF Fix scif_get_new_port() error handling (bnc#1012382).
- misc: ti-st: Fix memory leak in the error path of probe() (bnc#1012382).
- mmc: mmci: stop building qcom dml as module (bsc#1110468).
- mm: fix devmem_is_allowed() for sub-page System RAM intersections (bsc#1110006).
- mm: get rid of vmacache_flush_all() entirely (bnc#1012382).
- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (bnc#1012382).
- mm: /proc/pid/pagemap: hide swap entries from unprivileged users (Git-fixes bsc#1109907).
- mm: shmem.c: Correctly annotate new inodes for lockdep (bnc#1012382).
- mm/vmstat.c: fix outdated vmstat_text (bnc#1012382).
- mm/vmstat.c: skip NR_TLB_REMOTE_FLUSH* properly (bnc#1012382).
- mm/vmstat.c: skip NR_TLB_REMOTE_FLUSH* properly (git fixes).
- module: exclude SHN_UNDEF symbols from kallsyms api (bnc#1012382).
- mtdchar: fix overflows in adjustment of `count` (bnc#1012382).
- mtd/maps: fix solutionengine.c printk format warnings (bnc#1012382).
- neighbour: confirm neigh entries when ARP packet is received (bnc#1012382).
- net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT (bnc#1012382).
- net: cadence: Fix a sleep-in-atomic-context bug in macb_halt_tx() (bnc#1012382).
- net: dcb: For wild-card lookups, use priority -1, not 0 (bnc#1012382).
- net: ethernet: mvneta: Fix napi structure mixup on armada 3700 (bsc#1110616).
- net: ethernet: ti: cpsw: fix mdio device reference leak (bnc#1012382).
- netfilter: x_tables: avoid stack-out-of-bounds read in xt_copy_counters_from_user (bnc#1012382).
- net: hns: fix length and page_offset overflow when CONFIG_ARM64_64K_PAGES (bnc#1012382).
- net: hp100: fix always-true check for link up state (bnc#1012382).
- net: ipv4: update fnhe_pmtu when first hop's MTU changes (bnc#1012382).
- net/ipv6: Display all addresses in output of /proc/net/if_inet6 (bnc#1012382).
- netlabel: check for IPV4MASK in addrinfo_get (bnc#1012382).
- net: macb: disable scatter-gather for macb on sama5d3 (bnc#1012382).
- net/mlx4: Use cpumask_available for eq-&gt;affinity_mask (bnc#1012382).
- net: mvneta: fix mtu change on port without link (bnc#1012382).
- net: mvneta: fix mvneta_config_rss on armada 3700 (bsc#1110615).
- net: mvpp2: Extract the correct ethtype from the skb for tx csum offload (bnc#1012382).
- net: systemport: Fix wake-up interrupt race during resume (bnc#1012382).
- net/usb: cancel pending work when unbinding smsc75xx (bnc#1012382).
- nfc: Fix possible memory corruption when handling SHDLC I-Frame commands (bnc#1012382).
- nfc: Fix the number of pipes (bnc#1012382).
- nfs: add nostatflush mount option (bsc#1065726).
- nfs: Avoid quadratic search when freeing delegations (bsc#1084760).
- nfsd: fix corrupted reply to badly ordered compound (bnc#1012382).
- nfs: Use an appropriate work queue for direct-write completion (bsc#1082519).
- nfsv4.0 fix client reference leak in callback (bnc#1012382).
- ocfs2: fix locking for res-&gt;tracking and dlm-&gt;tracking_list (bnc#1012382).
- ocfs2: fix ocfs2 read block panic (bnc#1012382).
- of: unittest: Disable interrupt node tests for old world MAC systems (bnc#1012382).
- ovl: Copy inode attributes after setting xattr (bsc#1107299).
- parport: sunbpp: fix error return code (bnc#1012382).
- partitions/aix: append null character to print data from disk (bnc#1012382).
- partitions/aix: fix usage of uninitialized lv_info and lvname structures (bnc#1012382).
- Pass x86 as architecture on x86_64 and i386 (bsc#1093118).
- pci: altera: Fix bool initialization in tlp_read_packet() (bsc#1109806).
- pci: designware: Fix I/O space page leak (bsc#1109806).
- pci: designware: Fix pci_remap_iospace() failure path (bsc#1109806).
- pci: hv: Use effective affinity mask (bsc#1109772).
- pci: OF: Fix I/O space page leak (bsc#1109806).
- pci: pciehp: Fix unprotected list iteration in IRQ handler (bsc#1109806).
- pci: Reprogram bridge prefetch registers on resume (bnc#1012382).
- pci: shpchp: Fix AMD POGO identification (bsc#1109806).
- pci: Supply CPU physical address (not bus address) to iomem_is_exclusive() (bsc#1109806).
- pci: versatile: Fix I/O space page leak (bsc#1109806).
- pci: versatile: Fix pci_remap_iospace() failure path (bsc#1109806).
- pci: xgene: Fix I/O space page leak (bsc#1109806).
- pci: xilinx: Add missing of_node_put() (bsc#1109806).
- perf powerpc: Fix callchain ip filtering (bnc#1012382).
- perf powerpc: Fix callchain ip filtering when return address is in a register (bnc#1012382).
- perf probe powerpc: Ignore SyS symbols irrespective of endianness (bnc#1012382).
- perf script python: Fix export-to-postgresql.py occasional failure (bnc#1012382).
- perf tools: Allow overriding MAX_NR_CPUS at compile time (bnc#1012382).
- phy: qcom-ufs: add MODULE_LICENSE tag (bsc#1110468).
- pinctrl: qcom: spmi-gpio: Fix pmic_gpio_config_get() to be compliant (bnc#1012382).
- pipe: actually allow root to exceed the pipe buffer limit (git-fixes).
- platform/x86: alienware-wmi: Correct a memory leak (bnc#1012382).
- platform/x86: toshiba_acpi: Fix defined but not used build warnings (bnc#1012382).
- pm / core: Clear the direct_complete flag on errors (bnc#1012382).
- powerpc/64s: move machine check SLB flushing to mm/slb.c (bsc#1094244).
- powerpc/kdump: Handle crashkernel memory reservation failure (bnc#1012382).
- powerpc/mce: Fix SLB rebolting during MCE recovery path (bsc#1094244).
- powerpc/numa: Skip onlining a offline node in kdump path (bsc#1109784).
- powerpc/numa: Use associativity if VPHN hcall is successful (bsc#1110363).
- powerpc/perf/hv-24x7: Fix passing of catalog version number (bsc#1053043).
- powerpc/powernv: opal_put_chars partial write fix (bnc#1012382).
- powerpc/pseries: Defer the logging of rtas error to irq work queue (bsc#1094244).
- powerpc/pseries: Define MCE error event section (bsc#1094244).
- powerpc/pseries: Display machine check error details (bsc#1094244).
- powerpc/pseries: Dump the SLB contents on SLB MCE errors (bsc#1094244).
- powerpc/pseries: Fix build break for SPLPAR=n and CPU hotplug (bsc#1079524, git-fixes).
- powerpc/pseries: Fix CONFIG_NUMA=n build (bsc#1067906, git-fixes).
- powerpc/pseries: Flush SLB contents on SLB MCE errors (bsc#1094244).
- powerpc/pseries/mm: call H_BLOCK_REMOVE (bsc#1109158).
- powerpc/pseries/mm: factorize PTE slot computation (bsc#1109158).
- powerpc/pseries/mm: Introducing FW_FEATURE_BLOCK_REMOVE (bsc#1109158).
- powerpc/rtas: Fix a potential race between CPU-Offline &amp; Migration (bsc#1111870).
- powerpc/tm: Avoid possible userspace r1 corruption on reclaim (bsc#1109333).
- power: vexpress: fix corruption in notifier registration (bnc#1012382).
- printk: do not spin in printk when in nmi (bsc#1094244).
- proc: restrict kernel stack dumps to root (bnc#1012382).
- pstore: Fix incorrect persistent ram buffer mapping (bnc#1012382).
- qlcnic: fix Tx descriptor corruption on 82xx devices (bnc#1012382).
- r8169: Clear RTL_FLAG_TASK_*_PENDING when clearing RTL_FLAG_TASK_ENABLED (bnc#1012382).
- raid10 BUG_ON in raise_barrier when force is true and conf-&gt;barrier is 0 (bnc#1012382).
- rculist: add list_for_each_entry_from_rcu() (bsc#1084760).
- rculist: Improve documentation for list_for_each_entry_from_rcu() (bsc#1084760).
- rdma/cma: Do not ignore net namespace for unbound cm_id (bnc#1012382).
- rdma/cma: Protect cma dev list with lock (bnc#1012382).
- rdma/ucma: check fd type in ucma_migrate_id() (bnc#1012382).
- reiserfs: add check to detect corrupted directory entry (bsc#1109818).
- reiserfs: do not panic on bad directory entries (bsc#1109818).
- resource: Include resource end in walk_*() interfaces (bsc#1114648).
- Revert 'btrfs: qgroups: Retry after commit on getting EDQUOT' (bsc#1031392).
- Revert 'dma-buf/sync-file: Avoid enable fence signaling if poll(.timeout=0)' (bsc#1111363).
- Revert 'drm: Do not pass negative delta to ktime_sub_ns()' (bsc#1106929)
- Revert 'drm/i915: Initialize HWS page address after GPU reset' (bsc#1106929)
- Revert 'Drop kernel trampoline stack.' This reverts commit 85dead31706c1c1755adff90405ff9861c39c704.
- Revert 'kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)' This reverts commit edde1f21880e3bfe244c6f98a3733b05b13533dc.
- Revert 'kvm: x86: remove eager_fpu field of struct kvm_vcpu_arch' (kabi).
- Revert 'media: v4l: event: Prevent freeing event subscriptions while accessed' (kabi).
- Revert 'mm: get rid of vmacache_flush_all() entirely' (kabi).
- Revert 'NFC: Fix the number of pipes' (kabi).
- Revert 'proc: restrict kernel stack dumps to root' (kabi).
- Revert 'Skip intel_crt_init for Dell XPS 8700' (bsc#1106929)
- Revert 'tcp: add tcp_ooo_try_coalesce() helper' (kabi).
- Revert 'tcp: call tcp_drop() from tcp_data_queue_ofo()' (kabi).
- Revert 'tcp: fix a stale ooo_last_skb after a replace' (kabi).
- Revert 'tcp: free batches of packets in tcp_prune_ofo_queue()' (kabi).
- Revert 'tcp: use an RB tree for ooo receive queue' (kabi).
- Revert 'usb: cdc-wdm: Fix a sleep-in-atomic-context bug in service_outstanding_interrupt()' (bnc#1012382).
- Revert 'x86/fpu: Finish excising 'eagerfpu'' (kabi).
- Revert 'x86/fpu: Remove struct fpu::counter' (kabi).
- Revert 'x86/fpu: Remove use_eager_fpu()' (kabi).
- ring-buffer: Allow for rescheduling when removing pages (bnc#1012382).
- rndis_wlan: potential buffer overflow in rndis_wlan_auth_indication() (bnc#1012382).
- rpm/kernel-binary.spec.in: Check module licenses (bsc#1083215,bsc#1083527)
- rpm/kernel-binary.spec.in: Do not sign modules if CONFIG_MODULE_SIG=n (bsc#1035053)
- rpm/kernel-binary.spec.in: Obsolete ftsteutates KMP (boo#997172)
- rpm/kernel-binary.spec.in: Only kernel-syzkaller needs gcc-devel (boo#1043591).
- rpm/kernel-docs.spec.in: Expand kernel tree directly from sources (bsc#1057199)
- rpm/kernel-docs.spec.in: Fix and cleanup for 4.13 doc build (bsc#1048129) The whole DocBook stuff has been deleted. The PDF build still non-working thus the sub-packaging disabled so far.
- rpm/kernel-docs.spec.in: refresh dependencies for PDF build (bsc#1048129) But it still does not work with Tex Live 2017, thus disabled yet. Also add texlive-anyfontsize for HTML math handling.
- rpm/kernel-module-subpackage: Generate proper supplements in the template ... instead of relying on find-provides.ksyms to do it (bsc#981083).
- rpm/kernel-source.spec.in: Do not list deleted depdendency helpers (bsc#981083).
- rpm/kernel-spec-macros: Try harder to detect Build Service environment (bsc#1078788)
- rtc: bq4802: add error handling for devm_ioremap (bnc#1012382).
- rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096 (bnc#1012382).
- s390/chsc: Add exception handler for CHSC instruction (git-fixes).
- s390/extmem: fix gcc 8 stringop-overflow warning (bnc#1012382).
- s390/facilites: use stfle_fac_list array size for MAX_FACILITY_BIT (bnc#1108315, LTC#171326).
- s390/kdump: Fix elfcorehdr size calculation (git-fixes).
- s390/kdump: Make elfcorehdr size calculation ABI compliant (git-fixes).
- s390/mm: correct allocate_pgste proc_handler callback (git-fixes).
- s390/qeth: do not dump past end of unknown HW header (bnc#1012382).
- s390/qeth: fix race in used-buffer accounting (bnc#1012382).
- s390/qeth: handle failure on workqueue creation (git-fixes).
- s390/qeth: reset layer2 attribute on layer switch (bnc#1012382).
- s390/qeth: use vzalloc for QUERY OAT buffer (bnc#1108315, LTC#171527).
- s390: revert ELF_ET_DYN_BASE base changes (git-fixes).
- s390/stacktrace: fix address ranges for asynchronous and panic stack (git-fixes).
- sched/fair: Fix bandwidth timer clock drift condition (Git-fixes).
- sched/fair: Fix vruntime_normalized() for remote non-migration wakeup (Git-fixes).
- scsi: 3ware: fix return 0 on the error path of probe (bnc#1012382).
- scsi: bnx2i: add error handling for ioremap_nocache (bnc#1012382).
- scsi: ibmvscsi: Improve strings handling (bnc#1012382).
- scsi: klist: Make it safe to use klists in atomic context (bnc#1012382).
- scsi: target: fix __transport_register_session locking (bnc#1012382).
- scsi: target/iscsi: Make iscsit_ta_authentication() respect the output buffer size (bnc#1012382).
- selftests/efivarfs: add required kernel configs (bnc#1012382).
- selftest: timers: Tweak raw_skew to SKIP when ADJ_OFFSET/other clock adjustments are in progress (bnc#1012382).
- selinux: use GFP_NOWAIT in the AVC kmem_caches (bnc#1012382).
- serial: cpm_uart: return immediately from console poll (bnc#1012382).
- serial: imx: restore handshaking irq for imx1 (bnc#1012382).
- signal: Properly deliver SIGSEGV from x86 uprobes (bsc#1110006).
- slub: make -&gt;cpu_partial unsigned int (bnc#1012382).
- smb2: fix missing files in root share directory listing (bnc#1012382).
- smb3: fill in statfs fsid and correct namelen (bsc#1112905).
- sound: enable interrupt after dma buffer initialization (bnc#1012382).
- spi: rspi: Fix interrupted DMA transfers (bnc#1012382).
- spi: rspi: Fix invalid SPI use during system suspend (bnc#1012382).
- spi: sh-msiof: Fix handling of write value for SISTR register (bnc#1012382).
- spi: sh-msiof: Fix invalid SPI use during system suspend (bnc#1012382).
- spi: tegra20-slink: explicitly enable/disable clock (bnc#1012382).
- srcu: Allow use of Tiny/Tree SRCU from both process and interrupt context (bsc#1050549).
- staging: android: ashmem: Fix mmap size validation (bnc#1012382).
- staging: rt5208: Fix a sleep-in-atomic bug in xd_copy_page (bnc#1012382).
- staging: rts5208: fix missing error check on call to rtsx_write_register (bnc#1012382).
- staging/rts5208: Fix read overflow in memcpy (bnc#1012382).
- stmmac: fix valid numbers of unicast filter entries (bnc#1012382).
- stop_machine: Atomically queue and wake stopper threads (git-fixes).
- target: log Data-Out timeouts as errors (bsc#1095805).
- target: log NOP ping timeouts as errors (bsc#1095805).
- target: split out helper for cxn timeout error stashing (bsc#1095805).
- target: stash sess_err_stats on Data-Out timeout (bsc#1095805).
- target: use ISCSI_IQN_LEN in iscsi_target_stat (bsc#1095805).
- tcp: add tcp_ooo_try_coalesce() helper (bnc#1012382).
- tcp: call tcp_drop() from tcp_data_queue_ofo() (bnc#1012382).
- tcp: fix a stale ooo_last_skb after a replace (bnc#1012382).
- tcp: free batches of packets in tcp_prune_ofo_queue() (bnc#1012382).
- tcp: increment sk_drops for dropped rx packets (bnc#1012382).
- tcp: use an RB tree for ooo receive queue (bnc#1012382).
- team: Forbid enslaving team device to itself (bnc#1012382).
- thermal: of-thermal: disable passive polling when thermal zone is disabled (bnc#1012382).
- Tools: hv: Fix a bug in the key delete code (bnc#1012382).
- tools/vm/page-types.c: fix 'defined but not used' warning (bnc#1012382).
- tools/vm/slabinfo.c: fix sign-compare warning (bnc#1012382).
- tpm: Restore functionality to xen vtpm driver (bsc#1020645, git-fixes).
- tsl2550: fix lux1_input error in low light (bnc#1012382).
- tty: Drop tty-&gt;count on tty_reopen() failure (bnc#1105428).
- tty: rocket: Fix possible buffer overwrite on register_PCI (bnc#1012382).
- tty: vt_ioctl: fix potential Spectre v1 (bnc#1012382).
- ubifs: Check for name being NULL while mounting (bnc#1012382).
- ucma: fix a use-after-free in ucma_resolve_ip() (bnc#1012382).
- uio: potential double frees if __uio_register_device() fails (bnc#1012382).
- usb: add quirk for WORLDE Controller KS49 or Prodipe MIDI 49C USB controller (bnc#1012382).
- usb: Add quirk to support DJI CineSSD (bnc#1012382).
- usb: Avoid use-after-free by flushing endpoints early in usb_set_interface() (bnc#1012382).
- usb: cdc-wdm: Fix a sleep-in-atomic-context bug in service_outstanding_interrupt() (bnc#1012382).
- usb: Do not die twice if PCI xhci host is not responding in resume (bnc#1012382).
- usb: fix error handling in usb_driver_claim_interface() (bnc#1012382).
- usb: gadget: fotg210-udc: Fix memory leak of fotg210-&gt;ep[i] (bnc#1012382).
- usb: gadget: serial: fix oops when data rx'd after close (bnc#1012382).
- usb: handle NULL config in usb_find_alt_setting() (bnc#1012382).
- usb: host: u132-hcd: Fix a sleep-in-atomic-context bug in u132_get_frame() (bnc#1012382).
- usb: misc: uss720: Fix two sleep-in-atomic-context bugs (bnc#1012382).
- usb: net2280: Fix erroneous synchronization change (bnc#1012382).
- usb: remove LPM management from usb_driver_claim_interface() (bnc#1012382).
- usb: serial: io_ti: fix array underflow in completion handler (bnc#1012382).
- usb: serial: kobil_sct: fix modem-status error handling (bnc#1012382).
- usb: serial: simple: add Motorola Tetra MTP6550 id (bnc#1012382).
- usb: serial: ti_usb_3410_5052: fix array underflow in completion handler (bnc#1012382).
- usb: usbdevfs: restore warning for nonsensical flags (bnc#1012382).
- usb: usbdevfs: sanitize flags more (bnc#1012382).
- usb: wusbcore: security: cast sizeof to int for comparison (bnc#1012382).
- usb: yurex: Check for truncation in yurex_read() (bnc#1012382).
- usb: yurex: Fix buffer over-read in yurex_write() (bnc#1012382).
- Use upstream version of pci-hyperv change 35a88a18d7
- uwb: hwa-rc: fix memory leak at probe (bnc#1012382).
- vfs: do not test owner for NFS in set_posix_acl() (bsc#1103405).
- video: goldfishfb: fix memory leak on driver remove (bnc#1012382).
- vmci: type promotion bug in qp_host_get_user_memory() (bnc#1012382).
- vmw_balloon: include asm/io.h (bnc#1012382).
- watchdog: w83627hf: Added NCT6102D support (bsc#1106434).
- wlcore: Add missing PM call for wlcore_cmd_wait_for_event_or_timeout() (bnc#1012382).
- wlcore: Fix memory leak in wlcore_cmd_wait_for_event_or_timeout (git-fixes).
- x86/apic: Fix restoring boot IRQ mode in reboot and kexec/kdump (bsc#1110006).
- x86/apic: Split disable_IO_APIC() into two functions to fix CONFIG_KEXEC_JUMP=y (bsc#1110006).
- x86/apic: Split out restore_boot_irq_mode() from disable_IO_APIC() (bsc#1110006).
- x86/boot: Fix 'run_size' calculation (bsc#1110006).
- x86/cpufeature: deduplicate X86_FEATURE_L1TF_PTEINV (kabi).
- x86/entry/64: Add two more instruction suffixes (bnc#1012382).
- x86/entry/64: Clear registers for exceptions/interrupts, to reduce speculation attack surface (bsc#1105931).
- x86/entry/64: sanitize extra registers on syscall entry (bsc#1105931).
- x86/fpu: Finish excising 'eagerfpu' (bnc#1012382).
- x86/fpu: Remove second definition of fpu in __fpu__restore_sig() (bsc#1110006).
- x86/fpu: Remove struct fpu::counter (bnc#1012382).
- x86/fpu: Remove use_eager_fpu() (bnc#1012382).
- x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12 (bsc#1109772).
- x86/kaiser: Avoid loosing NMIs when using trampoline stack (bsc#1106293 bsc#1099597).
- x86/mm: Remove in_nmi() warning from vmalloc_fault() (bnc#1012382).
- x86: msr-index.h: Correct SNB_C1/C3_AUTO_UNDEMOTE defines (bsc#1110006).
- x86/numa_emulation: Fix emulated-to-physical node mapping (bnc#1012382).
- x86/paravirt: Fix some warning messages (bnc#1065600).
- x86/percpu: Fix this_cpu_read() (bsc#1110006).
- x86,sched: Allow topologies where NUMA nodes share an LLC (bsc#1091158, bsc#1101555).
- x86/spec_ctrl: Fix spec_ctrl reporting (bsc#1106913, bsc#1111516).
- x86/speculation: Apply IBPB more strictly to avoid cross-process data leak (bsc#1106913).
- x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation (bsc#1106913).
- x86/speculation: Propagate information about RSB filling mitigation to sysfs (bsc#1106913).
- x86/time: Correct the attribute on jiffies' definition (bsc#1110006).
- x86/tsc: Add missing header to tsc_msr.c (bnc#1012382).
- x86/vdso: Fix asm constraints on vDSO syscall fallbacks (bsc#1110006).
- x86/vdso: Fix vDSO build if a retpoline is emitted (bsc#1110006).
- x86/vdso: Fix vDSO syscall fallback asm constraint regression (bsc#1110006).
- x86/vdso: Only enable vDSO retpolines when enabled and supported (bsc#1110006).
- xen: avoid crash in disable_hotplug_cpu (bnc#1012382 bsc#1106594 bsc#1042422).
- xen: fix GCC warning and remove duplicate EVTCHN_ROW/EVTCHN_COL usage (bnc#1012382).
- xen: issue warning message when out of grant maptrack entries (bsc#1105795).
- xen/manage: do not complain about an empty value in control/sysrq node (bnc#1012382).
- xen/netfront: do not bug in case of too many frags (bnc#1012382).
- xen-netfront: fix queue name setting (bnc#1012382).
- xen/netfront: fix waiting for xenbus state change (bnc#1012382).
- xen-netfront: fix warn message as irq device name has '/' (bnc#1012382).
- xen/x86/vpmu: Zero struct pt_regs before calling into sample handling code (bnc#1012382).
- xfrm: fix 'passing zero to ERR_PTR()' warning (bnc#1012382).
- xhci: Add missing CAS workaround for Intel Sunrise Point xHCI (bnc#1012382).
- xhci: Do not print a warning when setting link state for disabled ports (bnc#1012382).
- x86/kexec: Correct KEXEC_BACKUP_SRC_END off-by-one error (bsc#1114648).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-09"/>
	<updated date="2018-11-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1011920">SUSE bug 1011920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012422">SUSE bug 1012422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020645">SUSE bug 1020645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031392">SUSE bug 1031392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035053">SUSE bug 1035053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042422">SUSE bug 1042422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043591">SUSE bug 1043591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048129">SUSE bug 1048129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050549">SUSE bug 1050549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053043">SUSE bug 1053043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054239">SUSE bug 1054239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057199">SUSE bug 1057199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065726">SUSE bug 1065726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067906">SUSE bug 1067906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073579">SUSE bug 1073579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076393">SUSE bug 1076393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078788">SUSE bug 1078788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079524">SUSE bug 1079524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082519">SUSE bug 1082519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083215">SUSE bug 1083215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083527">SUSE bug 1083527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084760">SUSE bug 1084760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091158">SUSE bug 1091158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093118">SUSE bug 1093118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094825">SUSE bug 1094825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095805">SUSE bug 1095805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096052">SUSE bug 1096052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098050">SUSE bug 1098050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098996">SUSE bug 1098996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099597">SUSE bug 1099597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101555">SUSE bug 1101555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103308">SUSE bug 1103308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103405">SUSE bug 1103405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104124">SUSE bug 1104124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105025">SUSE bug 1105025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105428">SUSE bug 1105428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105795">SUSE bug 1105795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105931">SUSE bug 1105931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106105">SUSE bug 1106105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106110">SUSE bug 1106110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106240">SUSE bug 1106240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106293">SUSE bug 1106293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106359">SUSE bug 1106359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106434">SUSE bug 1106434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106594">SUSE bug 1106594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106913">SUSE bug 1106913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106929">SUSE bug 1106929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107060">SUSE bug 1107060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107299">SUSE bug 1107299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107318">SUSE bug 1107318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107535">SUSE bug 1107535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107829">SUSE bug 1107829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107870">SUSE bug 1107870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108315">SUSE bug 1108315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108377">SUSE bug 1108377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108498">SUSE bug 1108498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109158">SUSE bug 1109158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109333">SUSE bug 1109333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109772">SUSE bug 1109772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109784">SUSE bug 1109784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109806">SUSE bug 1109806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109818">SUSE bug 1109818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109907">SUSE bug 1109907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109919">SUSE bug 1109919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109923">SUSE bug 1109923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110006">SUSE bug 1110006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110363">SUSE bug 1110363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110468">SUSE bug 1110468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110600">SUSE bug 1110600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110601">SUSE bug 1110601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110602">SUSE bug 1110602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110603">SUSE bug 1110603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110604">SUSE bug 1110604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110605">SUSE bug 1110605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110606">SUSE bug 1110606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110611">SUSE bug 1110611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110612">SUSE bug 1110612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110613">SUSE bug 1110613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110614">SUSE bug 1110614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110615">SUSE bug 1110615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110616">SUSE bug 1110616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110618">SUSE bug 1110618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110619">SUSE bug 1110619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111363">SUSE bug 1111363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111516">SUSE bug 1111516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111870">SUSE bug 1111870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112007">SUSE bug 1112007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112262">SUSE bug 1112262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112263">SUSE bug 1112263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112894">SUSE bug 1112894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112902">SUSE bug 1112902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112903">SUSE bug 1112903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112905">SUSE bug 1112905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113667">SUSE bug 1113667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113751">SUSE bug 1113751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113769">SUSE bug 1113769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114178">SUSE bug 1114178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114229">SUSE bug 1114229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114648">SUSE bug 1114648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981083">SUSE bug 981083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997172">SUSE bug 997172</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18281/">CVE-2018-18281</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18386/">CVE-2018-18386</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18690/">CVE-2018-18690</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18710/">CVE-2018-18710</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9516/">CVE-2018-9516</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520343" comment="kernel-default-4.4.162-94.69.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520344" comment="kernel-default-devel-4.4.162-94.69.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520345" comment="kernel-default-extra-4.4.162-94.69.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520346" comment="kernel-devel-4.4.162-94.69.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520347" comment="kernel-macros-4.4.162-94.69.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520348" comment="kernel-source-4.4.162-94.69.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520349" comment="kernel-syms-4.4.162-94.69.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78416" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1077291" ref_url="https://bugzilla.suse.com/1077291" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5089" ref_url="https://www.suse.com/security/cve/CVE-2018-5089/" source="CVE"/>
		<reference ref_id="CVE-2018-5091" ref_url="https://www.suse.com/security/cve/CVE-2018-5091/" source="CVE"/>
		<reference ref_id="CVE-2018-5095" ref_url="https://www.suse.com/security/cve/CVE-2018-5095/" source="CVE"/>
		<reference ref_id="CVE-2018-5096" ref_url="https://www.suse.com/security/cve/CVE-2018-5096/" source="CVE"/>
		<reference ref_id="CVE-2018-5097" ref_url="https://www.suse.com/security/cve/CVE-2018-5097/" source="CVE"/>
		<reference ref_id="CVE-2018-5098" ref_url="https://www.suse.com/security/cve/CVE-2018-5098/" source="CVE"/>
		<reference ref_id="CVE-2018-5099" ref_url="https://www.suse.com/security/cve/CVE-2018-5099/" source="CVE"/>
		<reference ref_id="CVE-2018-5102" ref_url="https://www.suse.com/security/cve/CVE-2018-5102/" source="CVE"/>
		<reference ref_id="CVE-2018-5103" ref_url="https://www.suse.com/security/cve/CVE-2018-5103/" source="CVE"/>
		<reference ref_id="CVE-2018-5104" ref_url="https://www.suse.com/security/cve/CVE-2018-5104/" source="CVE"/>
		<reference ref_id="CVE-2018-5117" ref_url="https://www.suse.com/security/cve/CVE-2018-5117/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00007.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version 52.6 several issues.

These security issues were fixed:

- CVE-2018-5091: Use-after-free with DTMF timers (bsc#1077291).
- CVE-2018-5095: Integer overflow in Skia library during edge builder allocation (bsc#1077291).
- CVE-2018-5096: Use-after-free while editing form elements (bsc#1077291).
- CVE-2018-5097: Use-after-free when source document is manipulated during XSLT (bsc#1077291).
- CVE-2018-5098: Use-after-free while manipulating form input elements (bsc#1077291).
- CVE-2018-5099: Use-after-free with widget listener (bsc#1077291).
- CVE-2018-5104: Use-after-free during font face manipulation (bsc#1077291).
- CVE-2018-5089: Fixed several memory safety bugs (bsc#1077291).
- CVE-2018-5117: URL spoofing with right-to-left text aligned left-to-right (bsc#1077291).
- CVE-2018-5102: Use-after-free in HTML media elements (bsc#1077291).
- CVE-2018-5103: Use-after-free during mouse event handling (bsc#1077291).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-06"/>
	<updated date="2018-02-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5089/">CVE-2018-5089</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5091/">CVE-2018-5091</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5095/">CVE-2018-5095</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5096/">CVE-2018-5096</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5097/">CVE-2018-5097</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5098/">CVE-2018-5098</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5099/">CVE-2018-5099</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5102/">CVE-2018-5102</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5103/">CVE-2018-5103</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5104/">CVE-2018-5104</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5117/">CVE-2018-5117</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518840" comment="MozillaFirefox-52.6.0esr-109.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518841" comment="MozillaFirefox-translations-52.6.0esr-109.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78417" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1112852" ref_url="https://bugzilla.suse.com/1112852" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12389" ref_url="https://www.suse.com/security/cve/CVE-2018-12389/" source="CVE"/>
		<reference ref_id="CVE-2018-12390" ref_url="https://www.suse.com/security/cve/CVE-2018-12390/" source="CVE"/>
		<reference ref_id="CVE-2018-12392" ref_url="https://www.suse.com/security/cve/CVE-2018-12392/" source="CVE"/>
		<reference ref_id="CVE-2018-12393" ref_url="https://www.suse.com/security/cve/CVE-2018-12393/" source="CVE"/>
		<reference ref_id="CVE-2018-12395" ref_url="https://www.suse.com/security/cve/CVE-2018-12395/" source="CVE"/>
		<reference ref_id="CVE-2018-12396" ref_url="https://www.suse.com/security/cve/CVE-2018-12396/" source="CVE"/>
		<reference ref_id="CVE-2018-12397" ref_url="https://www.suse.com/security/cve/CVE-2018-12397/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004846.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed:

- Update to Mozilla Firefox 60.3.0esr: MFSA 2018-27 (bsc#1112852)
- CVE-2018-12392: Crash with nested event loops.
- CVE-2018-12393: Integer overflow during Unicode conversion while loading JavaScript.
- CVE-2018-12395: WebExtension bypass of domain restrictions through header rewriting.
- CVE-2018-12396: WebExtension content scripts can execute in disallowed contexts.
- CVE-2018-12397: WebExtension local file access vulnerability.
- CVE-2018-12389: Memory safety bugs fixed in Firefox ESR 60.3.
- CVE-2018-12390: Memory safety bugs fixed in Firefox 63 and Firefox ESR 60.3.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-13"/>
	<updated date="2018-11-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1112852">SUSE bug 1112852</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-12389/">CVE-2018-12389</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12390/">CVE-2018-12390</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12392/">CVE-2018-12392</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12393/">CVE-2018-12393</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12395/">CVE-2018-12395</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12396/">CVE-2018-12396</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12397/">CVE-2018-12397</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520350" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520351" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78418" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1106923" ref_url="https://bugzilla.suse.com/1106923" source="BUGZILLA"/>
		<reference ref_id="1108835" ref_url="https://bugzilla.suse.com/1108835" source="BUGZILLA"/>
		<reference ref_id="1109252" ref_url="https://bugzilla.suse.com/1109252" source="BUGZILLA"/>
		<reference ref_id="1110445" ref_url="https://bugzilla.suse.com/1110445" source="BUGZILLA"/>
		<reference ref_id="1111278" ref_url="https://bugzilla.suse.com/1111278" source="BUGZILLA"/>
		<reference ref_id="1112024" ref_url="https://bugzilla.suse.com/1112024" source="BUGZILLA"/>
		<reference ref_id="1113083" ref_url="https://bugzilla.suse.com/1113083" source="BUGZILLA"/>
		<reference ref_id="1113632" ref_url="https://bugzilla.suse.com/1113632" source="BUGZILLA"/>
		<reference ref_id="1113665" ref_url="https://bugzilla.suse.com/1113665" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15686" ref_url="https://www.suse.com/security/cve/CVE-2018-15686/" source="CVE"/>
		<reference ref_id="CVE-2018-15688" ref_url="https://www.suse.com/security/cve/CVE-2018-15688/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004849.html" source="SUSE-SU"/>
		<description>

This update for systemd fixes the following issues:

Security issues fixed:

- CVE-2018-15688: A buffer overflow vulnerability in the dhcp6 client of systemd allowed a malicious dhcp6 server to overwrite heap memory in systemd-networkd. (bsc#1113632)
- CVE-2018-15686: A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. (bsc#1113665)

Non-security issues fixed:

- dhcp6: split assert_return() to be more debuggable when hit
- core: skip unit deserialization and move to the next one when unit_deserialize() fails
- core: properly handle deserialization of unknown unit types (#6476)
- core: don't create Requires for workdir if 'missing ok' (bsc#1113083)
- logind: use manager_get_user_by_pid() where appropriate
- logind: rework manager_get_{user|session}_by_pid() a bit
- login: fix user@.service case, so we don't allow nested sessions (#8051) (bsc#1112024)
- core: be more defensive if we can't determine per-connection socket peer (#7329)
- socket-util: introduce port argument in sockaddr_port()
- service: fixup ExecStop for socket-activated shutdown (#4120)
- service: Continue shutdown on socket activated unit on termination (#4108) (bsc#1106923)
- cryptsetup: build fixes for 'add support for sector-size= option'
- udev-rules: IMPORT cmdline does not recognize keys with similar names (bsc#1111278)
- core: keep the kernel coredump defaults when systemd-coredump is disabled
- core: shorten main() a bit, split out coredump initialization
- core: set RLIMIT_CORE to unlimited by default (bsc#1108835)
- core/mount: fstype may be NULL
- journald: don't ship systemd-journald-audit.socket (bsc#1109252)
- core: make 'tmpfs' dependencies on swapfs a 'default' dep, not an 'implicit' (bsc#1110445)
- mount: make sure we unmount tmpfs mounts before we deactivate swaps (#7076)
- tmp.mount.hm4: After swap.target (#3087)

- Ship systemd-sysv-install helper via the main package
  This script was part of systemd-sysvinit sub-package but it was
  wrong since systemd-sysv-install is a script used to redirect
  enable/disable operations to chkconfig when the unit targets are
  sysv init scripts. Therefore it's never been a SySV init tool.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-14"/>
	<updated date="2018-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1106923">SUSE bug 1106923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108835">SUSE bug 1108835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109252">SUSE bug 1109252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110445">SUSE bug 1110445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111278">SUSE bug 1111278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112024">SUSE bug 1112024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113083">SUSE bug 1113083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113632">SUSE bug 1113632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113665">SUSE bug 1113665</bugzilla>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15686/">CVE-2018-15686</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15688/">CVE-2018-15688</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520352" comment="libsystemd0-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520353" comment="libsystemd0-32bit-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520354" comment="libudev1-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520355" comment="libudev1-32bit-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520356" comment="systemd-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520357" comment="systemd-32bit-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520358" comment="systemd-bash-completion-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520359" comment="systemd-sysvinit-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520360" comment="udev-228-150.53.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78419" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1114837" ref_url="https://bugzilla.suse.com/1114837" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16850" ref_url="https://www.suse.com/security/cve/CVE-2018-16850/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004852.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

Security issue fixed:

- CVE-2018-16850: Fixed improper quoting of transition table names when pg_dump emits CREATE TRIGGER could have caused privilege escalation (bsc#1114837).

Non-security issues fixed:

- Update to release 10.6:
  * https://www.postgresql.org/docs/current/static/release-10-6.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-15"/>
	<updated date="2018-11-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1114837">SUSE bug 1114837</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-16850/">CVE-2018-16850</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520361" comment="libecpg6-10.6-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520362" comment="libpq5-10.6-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520363" comment="libpq5-32bit-10.6-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520364" comment="postgresql10-10.6-1.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78420" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1058722" ref_url="https://bugzilla.suse.com/1058722" source="BUGZILLA"/>
		<reference ref_id="1064101" ref_url="https://bugzilla.suse.com/1064101" source="BUGZILLA"/>
		<reference ref_id="1064115" ref_url="https://bugzilla.suse.com/1064115" source="BUGZILLA"/>
		<reference ref_id="1076505" ref_url="https://bugzilla.suse.com/1076505" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10268" ref_url="https://www.suse.com/security/cve/CVE-2017-10268/" source="CVE"/>
		<reference ref_id="CVE-2017-10378" ref_url="https://www.suse.com/security/cve/CVE-2017-10378/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003712.html" source="SUSE-SU"/>
		<description>
This update for mariadb to version 10.0.33 fixes several issues.

These security issues were fixed:

- CVE-2017-10378: Vulnerability in subcomponent: Server: Optimizer. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server. Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server (bsc#1064115).
- CVE-2017-10268: Vulnerability in subcomponent: Server: Replication. Difficult
  to exploit vulnerability allowed high privileged attacker with logon to the
  infrastructure where MySQL Server executes to compromise MySQL Server.
  Successful attacks of this vulnerability can result in unauthorized access to
  critical data or complete access to all MySQL Server accessible data
  (bsc#1064101).

These non-security issues were fixed:

- CHECK TABLE no longer returns an error when run on a CONNECT table
- 'Undo log record is too big.' error occurring in very narrow range of string
  lengths
- Race condition between INFORMATION_SCHEMA.INNODB_SYS_TABLESTATS and
  ALTER/DROP/TRUNCATE TABLE
- Wrong result after altering a partitioned table fixed bugs in InnoDB FULLTEXT
  INDEX
- InnoDB FTS duplicate key error
- InnoDB crash after failed ADD INDEX and table_definition_cache eviction
- fts_create_doc_id() unnecessarily allocates 8 bytes for every inserted row
- IMPORT TABLESPACE may corrupt ROW_FORMAT=REDUNDANT tables

For additional details please see https://kb.askmonty.org/en/mariadb-10033-changelog
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-07"/>
	<updated date="2018-02-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1058722">SUSE bug 1058722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064101">SUSE bug 1064101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064115">SUSE bug 1064115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076505">SUSE bug 1076505</bugzilla>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10268/">CVE-2017-10268</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10378/">CVE-2017-10378</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518851" comment="libmysqlclient18-10.0.33-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518852" comment="libmysqlclient18-32bit-10.0.33-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518853" comment="libmysqlclient_r18-10.0.33-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518854" comment="libmysqlclient_r18-32bit-10.0.33-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518855" comment="mariadb-10.0.33-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518856" comment="mariadb-client-10.0.33-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518857" comment="mariadb-errormessages-10.0.33-29.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78421" version="1" class="patch">
	<metadata>
		<title>Security update for libwpd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1115713" ref_url="https://bugzilla.suse.com/1115713" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19208" ref_url="https://www.suse.com/security/cve/CVE-2018-19208/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004865.html" source="SUSE-SU"/>
		<description>
This update for libwpd fixes the following issues:

Security issue fixed:

- CVE-2018-19208: Fixed illegal address access inside libwpd at function WP6ContentListener:defineTable (bsc#1115713).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-19"/>
	<updated date="2018-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1115713">SUSE bug 1115713</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19208/">CVE-2018-19208</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520365" comment="libwpd-0_10-10-0.10.2-2.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78422" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1005778" ref_url="https://bugzilla.suse.com/1005778" source="BUGZILLA"/>
		<reference ref_id="1005780" ref_url="https://bugzilla.suse.com/1005780" source="BUGZILLA"/>
		<reference ref_id="1005781" ref_url="https://bugzilla.suse.com/1005781" source="BUGZILLA"/>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1012917" ref_url="https://bugzilla.suse.com/1012917" source="BUGZILLA"/>
		<reference ref_id="1015342" ref_url="https://bugzilla.suse.com/1015342" source="BUGZILLA"/>
		<reference ref_id="1015343" ref_url="https://bugzilla.suse.com/1015343" source="BUGZILLA"/>
		<reference ref_id="1019784" ref_url="https://bugzilla.suse.com/1019784" source="BUGZILLA"/>
		<reference ref_id="1022476" ref_url="https://bugzilla.suse.com/1022476" source="BUGZILLA"/>
		<reference ref_id="1022595" ref_url="https://bugzilla.suse.com/1022595" source="BUGZILLA"/>
		<reference ref_id="1022912" ref_url="https://bugzilla.suse.com/1022912" source="BUGZILLA"/>
		<reference ref_id="1024296" ref_url="https://bugzilla.suse.com/1024296" source="BUGZILLA"/>
		<reference ref_id="1024376" ref_url="https://bugzilla.suse.com/1024376" source="BUGZILLA"/>
		<reference ref_id="1031395" ref_url="https://bugzilla.suse.com/1031395" source="BUGZILLA"/>
		<reference ref_id="1031492" ref_url="https://bugzilla.suse.com/1031492" source="BUGZILLA"/>
		<reference ref_id="1031717" ref_url="https://bugzilla.suse.com/1031717" source="BUGZILLA"/>
		<reference ref_id="1037838" ref_url="https://bugzilla.suse.com/1037838" source="BUGZILLA"/>
		<reference ref_id="1038078" ref_url="https://bugzilla.suse.com/1038078" source="BUGZILLA"/>
		<reference ref_id="1038085" ref_url="https://bugzilla.suse.com/1038085" source="BUGZILLA"/>
		<reference ref_id="1040182" ref_url="https://bugzilla.suse.com/1040182" source="BUGZILLA"/>
		<reference ref_id="1043652" ref_url="https://bugzilla.suse.com/1043652" source="BUGZILLA"/>
		<reference ref_id="1048325" ref_url="https://bugzilla.suse.com/1048325" source="BUGZILLA"/>
		<reference ref_id="1048585" ref_url="https://bugzilla.suse.com/1048585" source="BUGZILLA"/>
		<reference ref_id="1053472" ref_url="https://bugzilla.suse.com/1053472" source="BUGZILLA"/>
		<reference ref_id="1060279" ref_url="https://bugzilla.suse.com/1060279" source="BUGZILLA"/>
		<reference ref_id="1062129" ref_url="https://bugzilla.suse.com/1062129" source="BUGZILLA"/>
		<reference ref_id="1066163" ref_url="https://bugzilla.suse.com/1066163" source="BUGZILLA"/>
		<reference ref_id="1066223" ref_url="https://bugzilla.suse.com/1066223" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068038" ref_url="https://bugzilla.suse.com/1068038" source="BUGZILLA"/>
		<reference ref_id="1068569" ref_url="https://bugzilla.suse.com/1068569" source="BUGZILLA"/>
		<reference ref_id="1068984" ref_url="https://bugzilla.suse.com/1068984" source="BUGZILLA"/>
		<reference ref_id="1069138" ref_url="https://bugzilla.suse.com/1069138" source="BUGZILLA"/>
		<reference ref_id="1069160" ref_url="https://bugzilla.suse.com/1069160" source="BUGZILLA"/>
		<reference ref_id="1070052" ref_url="https://bugzilla.suse.com/1070052" source="BUGZILLA"/>
		<reference ref_id="1070799" ref_url="https://bugzilla.suse.com/1070799" source="BUGZILLA"/>
		<reference ref_id="1072163" ref_url="https://bugzilla.suse.com/1072163" source="BUGZILLA"/>
		<reference ref_id="1072484" ref_url="https://bugzilla.suse.com/1072484" source="BUGZILLA"/>
		<reference ref_id="1073229" ref_url="https://bugzilla.suse.com/1073229" source="BUGZILLA"/>
		<reference ref_id="1073928" ref_url="https://bugzilla.suse.com/1073928" source="BUGZILLA"/>
		<reference ref_id="1074134" ref_url="https://bugzilla.suse.com/1074134" source="BUGZILLA"/>
		<reference ref_id="1074488" ref_url="https://bugzilla.suse.com/1074488" source="BUGZILLA"/>
		<reference ref_id="1074621" ref_url="https://bugzilla.suse.com/1074621" source="BUGZILLA"/>
		<reference ref_id="1074709" ref_url="https://bugzilla.suse.com/1074709" source="BUGZILLA"/>
		<reference ref_id="1074839" ref_url="https://bugzilla.suse.com/1074839" source="BUGZILLA"/>
		<reference ref_id="1074847" ref_url="https://bugzilla.suse.com/1074847" source="BUGZILLA"/>
		<reference ref_id="1075066" ref_url="https://bugzilla.suse.com/1075066" source="BUGZILLA"/>
		<reference ref_id="1075078" ref_url="https://bugzilla.suse.com/1075078" source="BUGZILLA"/>
		<reference ref_id="1075087" ref_url="https://bugzilla.suse.com/1075087" source="BUGZILLA"/>
		<reference ref_id="1075091" ref_url="https://bugzilla.suse.com/1075091" source="BUGZILLA"/>
		<reference ref_id="1075397" ref_url="https://bugzilla.suse.com/1075397" source="BUGZILLA"/>
		<reference ref_id="1075428" ref_url="https://bugzilla.suse.com/1075428" source="BUGZILLA"/>
		<reference ref_id="1075617" ref_url="https://bugzilla.suse.com/1075617" source="BUGZILLA"/>
		<reference ref_id="1075621" ref_url="https://bugzilla.suse.com/1075621" source="BUGZILLA"/>
		<reference ref_id="1075627" ref_url="https://bugzilla.suse.com/1075627" source="BUGZILLA"/>
		<reference ref_id="1075811" ref_url="https://bugzilla.suse.com/1075811" source="BUGZILLA"/>
		<reference ref_id="1075994" ref_url="https://bugzilla.suse.com/1075994" source="BUGZILLA"/>
		<reference ref_id="1076017" ref_url="https://bugzilla.suse.com/1076017" source="BUGZILLA"/>
		<reference ref_id="1076110" ref_url="https://bugzilla.suse.com/1076110" source="BUGZILLA"/>
		<reference ref_id="1076187" ref_url="https://bugzilla.suse.com/1076187" source="BUGZILLA"/>
		<reference ref_id="1076232" ref_url="https://bugzilla.suse.com/1076232" source="BUGZILLA"/>
		<reference ref_id="1076805" ref_url="https://bugzilla.suse.com/1076805" source="BUGZILLA"/>
		<reference ref_id="1076847" ref_url="https://bugzilla.suse.com/1076847" source="BUGZILLA"/>
		<reference ref_id="1076872" ref_url="https://bugzilla.suse.com/1076872" source="BUGZILLA"/>
		<reference ref_id="1076899" ref_url="https://bugzilla.suse.com/1076899" source="BUGZILLA"/>
		<reference ref_id="1077068" ref_url="https://bugzilla.suse.com/1077068" source="BUGZILLA"/>
		<reference ref_id="1077560" ref_url="https://bugzilla.suse.com/1077560" source="BUGZILLA"/>
		<reference ref_id="1077592" ref_url="https://bugzilla.suse.com/1077592" source="BUGZILLA"/>
		<reference ref_id="1077704" ref_url="https://bugzilla.suse.com/1077704" source="BUGZILLA"/>
		<reference ref_id="1077871" ref_url="https://bugzilla.suse.com/1077871" source="BUGZILLA"/>
		<reference ref_id="1078002" ref_url="https://bugzilla.suse.com/1078002" source="BUGZILLA"/>
		<reference ref_id="1078681" ref_url="https://bugzilla.suse.com/1078681" source="BUGZILLA"/>
		<reference ref_id="963844" ref_url="https://bugzilla.suse.com/963844" source="BUGZILLA"/>
		<reference ref_id="966170" ref_url="https://bugzilla.suse.com/966170" source="BUGZILLA"/>
		<reference ref_id="966172" ref_url="https://bugzilla.suse.com/966172" source="BUGZILLA"/>
		<reference ref_id="973818" ref_url="https://bugzilla.suse.com/973818" source="BUGZILLA"/>
		<reference ref_id="985025" ref_url="https://bugzilla.suse.com/985025" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15129" ref_url="https://www.suse.com/security/cve/CVE-2017-15129/" source="CVE"/>
		<reference ref_id="CVE-2017-17712" ref_url="https://www.suse.com/security/cve/CVE-2017-17712/" source="CVE"/>
		<reference ref_id="CVE-2017-17862" ref_url="https://www.suse.com/security/cve/CVE-2017-17862/" source="CVE"/>
		<reference ref_id="CVE-2017-17864" ref_url="https://www.suse.com/security/cve/CVE-2017-17864/" source="CVE"/>
		<reference ref_id="CVE-2017-18017" ref_url="https://www.suse.com/security/cve/CVE-2017-18017/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<reference ref_id="CVE-2018-5332" ref_url="https://www.suse.com/security/cve/CVE-2018-5332/" source="CVE"/>
		<reference ref_id="CVE-2018-5333" ref_url="https://www.suse.com/security/cve/CVE-2018-5333/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00008.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.114 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (bnc#1068032).

  The previous fix using CPU Microcode has been complemented by building the Linux Kernel with return trampolines aka 'retpolines'.

- CVE-2017-15129: A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel in the function get_net_ns_by_id() in net/core/net_namespace.c did not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely (bnc#1074839).
- CVE-2017-17712: The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel has a race condition in inet-&gt;hdrincl that leads to uninitialized stack pointer usage; this allowed a local user to execute code and gain privileges (bnc#1073229).
- CVE-2017-17862: kernel/bpf/verifier.c in the Linux kernel ignored unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service (bnc#1073928).
- CVE-2017-17864: kernel/bpf/verifier.c in the Linux kernel mishandled states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allowed local users to obtain potentially sensitive address information, aka a 'pointer leak (bnc#1073928).
- CVE-2017-18017: The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel allowed remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action (bnc#1074488).
- CVE-2018-5332: In the Linux kernel the rds_message_alloc_sgs() function did not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c) (bnc#1075621).
- CVE-2018-5333: In the Linux kernel the rds_cmsg_atomic function in net/rds/rdma.c mishandled cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference (bnc#1075617).
- CVE-2018-1000004: In the Linux kernel a race condition vulnerability existed in the sound system, this can lead to a deadlock and denial of service condition (bnc#1076017).

The following non-security bugs were fixed:

- 8021q: fix a memory leak for VLAN 0 device (bnc#1012382).
- acpi / scan: Prefer devices without _HID/_CID for _ADR matching (bnc#1012382).
- af_key: fix buffer overread in parse_exthdrs() (bnc#1012382).
- af_key: fix buffer overread in verify_address_len() (bnc#1012382).
- afs: Adjust mode bits processing (bnc#1012382).
- afs: Connect up the CB.ProbeUuid (bnc#1012382).
- afs: Fix afs_kill_pages() (bnc#1012382).
- afs: Fix missing put_page() (bnc#1012382).
- afs: Fix page leak in afs_write_begin() (bnc#1012382).
- afs: Fix the maths in afs_fs_store_data() (bnc#1012382).
- afs: Flush outstanding writes when an fd is closed (bnc#1012382).
- afs: Migrate vlocation fields to 64-bit (bnc#1012382).
- afs: Populate and use client modification time (bnc#1012382).
- afs: Populate group ID from vnode status (bnc#1012382).
- afs: Prevent callback expiry timer overflow (bnc#1012382).
- alpha: fix build failures (bnc#1012382).
- alsa: aloop: Fix inconsistent format due to incomplete rule (bsc#1031717).
- alsa: aloop: Fix racy hw constraints adjustment (bsc#1031717).
- alsa: aloop: Release cable upon open error path (bsc#1031717).
- alsa: hda - Add HP ZBook 15u G3 Conexant CX20724 GPIO mute leds (bsc#1031717).
- alsa: hda - Add MIC_NO_PRESENCE fixup for 2 HP machines (bsc#1031717).
- alsa: hda - Add mute led support for HP EliteBook 840 G3 (bsc#1031717).
- alsa: hda - Add mute led support for HP ProBook 440 G4 (bsc#1031717).
- alsa: hda - add support for docking station for HP 820 G2 (bsc#1031717).
- alsa: hda - add support for docking station for HP 840 G3 (bsc#1031717).
- alsa: hda - Apply headphone noise quirk for another Dell XPS 13 variant (bsc#1031717).
- alsa: hda - Apply the existing quirk to iMac 14,1 (bsc#1031717).
- alsa: hda - change the location for one mic on a Lenovo machine (bsc#1031717).
- alsa: hda: Drop useless WARN_ON() (bsc#1031717).
- alsa: hda - Fix click noises on Samsung Ativ Book 8 (bsc#1031717).
- alsa: hda - fix headset mic detection issue on a Dell machine (bsc#1031717).
- alsa: hda - fix headset mic problem for Dell machines with alc274 (bsc#1031717).
- alsa: hda - Fix headset microphone detection for ASUS N551 and N751 (bsc#1031717).
- alsa: hda - Fix mic regression by ASRock mobo fixup (bsc#1031717).
- alsa: hda - Fix missing COEF init for ALC225/295/299 (bsc#1031717).
- alsa: hda - Fix surround output pins for ASRock B150M mobo (bsc#1031717).
- alsa: hda - On-board speaker fixup on ACER Veriton (bsc#1031717).
- alsa: hda/realtek - Add ALC256 HP depop function (bsc#1031717).
- alsa: hda/realtek - Add default procedure for suspend and resume state (bsc#1031717).
- alsa: hda/realtek - Add support for Acer Aspire E5-475 headset mic (bsc#1031717).
- alsa: hda/realtek - Add support for ALC1220 (bsc#1031717).
- alsa: hda/realtek - Add support for headset MIC for ALC622 (bsc#1031717).
- alsa: hda/realtek - ALC891 headset mode for Dell (bsc#1031717).
- alsa: hda/realtek - change the location for one of two front microphones (bsc#1031717).
- alsa: hda/realtek - Enable jack detection function for Intel ALC700 (bsc#1031717).
- alsa: hda/realtek - Fix ALC275 no sound issue (bsc#1031717).
- alsa: hda/realtek - Fix Dell AIO LineOut issue (bsc#1031717).
- alsa: hda/realtek - Fix headset and mic on several Asus laptops with ALC256 (bsc#1031717).
- alsa: hda/realtek - Fix headset mic and speaker on Asus X441SA/X441UV (bsc#1031717).
- alsa: hda/realtek - fix headset mic detection for MSI MS-B120 (bsc#1031717).
- alsa: hda/realtek - Fix headset mic on several Asus laptops with ALC255 (bsc#1031717).
- alsa: hda/realtek - Fix pincfg for Dell XPS 13 9370 (bsc#1031717).
- alsa: hda/realtek - Fix speaker support for Asus AiO ZN270IE (bsc#1031717).
- alsa: hda/realtek - Fix typo of pincfg for Dell quirk (bsc#1031717).
- alsa: hda/realtek - New codec device ID for ALC1220 (bsc#1031717).
- alsa: hda/realtek - New codecs support for ALC215/ALC285/ALC289 (bsc#1031717).
- alsa: hda/realtek - New codec support for ALC257 (bsc#1031717).
- alsa: hda/realtek - New codec support of ALC1220 (bsc#1031717).
- alsa: hda/realtek - No loopback on ALC225/ALC295 codec (bsc#1031717).
- alsa: hda/realtek - Remove ALC285 device ID (bsc#1031717).
- alsa: hda/realtek - Support Dell headset mode for ALC3271 (bsc#1031717).
- alsa: hda/realtek - Support headset mode for ALC234/ALC274/ALC294 (bsc#1031717).
- alsa: hda/realtek - There is no loopback mixer in the ALC234/274/294 (bsc#1031717).
- alsa: hda/realtek - Update headset mode for ALC225 (bsc#1031717).
- alsa: hda/realtek - Update headset mode for ALC298 (bsc#1031717).
- alsa: hda - Skip Realtek SKU check for Lenovo machines (bsc#1031717).
- alsa: pcm: Abort properly at pending signal in OSS read/write loops (bsc#1031717).
- alsa: pcm: Add missing error checks in OSS emulation plugin builder (bsc#1031717).
- alsa: pcm: Allow aborting mutex lock at OSS read/write loops (bsc#1031717).
- alsa: pcm: prevent UAF in snd_pcm_info (bsc#1031717).
- alsa: pcm: Remove incorrect snd_BUG_ON() usages (bsc#1031717).
- alsa: pcm: Remove yet superfluous WARN_ON() (bsc#1031717).
- alsa: rawmidi: Avoid racy info ioctl via ctl device (bsc#1031717).
- alsa: seq: Remove spurious WARN_ON() at timer check (bsc#1031717).
- alsa: usb-audio: Add check return value for usb_string() (bsc#1031717).
- alsa: usb-audio: Fix out-of-bound error (bsc#1031717).
- alsa: usb-audio: Fix the missing ctl name suffix at parsing SU (bsc#1031717).
- arc: uaccess: dont use 'l' gcc inline asm constraint modifier (bnc#1012382).
- arm64: Add skeleton to harden the branch predictor against aliasing attacks (bsc#1068032).
- arm64: Add trace_hardirqs_off annotation in ret_to_user (bsc#1068032).
- arm64: Branch predictor hardening for Cavium ThunderX2 (bsc#1068032).
- arm64/cpufeature: do not use mutex in bringup path (bsc#1068032).
- arm64: cpufeature: Pass capability structure to -&gt;enable callback (bsc#1068032).
- arm64: cputype: Add MIDR values for Cavium ThunderX2 CPUs (bsc#1068032).
- arm64: cputype: Add missing MIDR values for Cortex-A72 and Cortex-A75 (bsc#1068032).
- arm64: debug: remove unused local_dbg_{enable, disable} macros (bsc#1068032).
- arm64: Define cputype macros for Falkor CPU (bsc#1068032).
- arm64: Disable TTBR0_EL1 during normal kernel execution (bsc#1068032).
- arm64: Do not force KPTI for CPUs that are not vulnerable (bsc#1076187).
- arm64: do not pull uaccess.h into *.S (bsc#1068032).
- arm64: Enable CONFIG_ARM64_SW_TTBR0_PAN (bsc#1068032).
- arm64: entry: Add exception trampoline page for exceptions from EL0 (bsc#1068032).
- arm64: entry: Add fake CPU feature for unmapping the kernel at EL0 (bsc#1068032).
- arm64: entry: Explicitly pass exception level to kernel_ventry macro (bsc#1068032).
- arm64: entry: Hook up entry trampoline to exception vectors (bsc#1068032).
- arm64: entry: remove pointless SPSR mode check (bsc#1068032).
- arm64: entry.S convert el0_sync (bsc#1068032).
- arm64: entry.S: convert el1_sync (bsc#1068032).
- arm64: entry.S: convert elX_irq (bsc#1068032).
- arm64: entry.S: move SError handling into a C function for future expansion (bsc#1068032).
- arm64: entry.S: Remove disable_dbg (bsc#1068032).
- arm64: erratum: Work around Falkor erratum #E1003 in trampoline code (bsc#1068032).
- arm64: explicitly mask all exceptions (bsc#1068032).
- arm64: factor out entry stack manipulation (bsc#1068032).
- arm64: factor out PAGE_* and CONT_* definitions (bsc#1068032).
- arm64: Factor out PAN enabling/disabling into separate uaccess_* macros (bsc#1068032).
- arm64: Factor out TTBR0_EL1 post-update workaround into a specific asm macro (bsc#1068032).
- arm64: factor work_pending state machine to C (bsc#1068032).
- arm64: fpsimd: Prevent registers leaking from dead tasks (bnc#1012382).
- arm64: Handle el1 synchronous instruction aborts cleanly (bsc#1068032).
- arm64: Handle faults caused by inadvertent user access with PAN enabled (bsc#1068032).
- arm64: head.S: get rid of x25 and x26 with 'global' scope (bsc#1068032).
- arm64: Implement branch predictor hardening for affected Cortex-A CPUs (bsc#1068032).
- arm64: Implement branch predictor hardening for Falkor (bsc#1068032).
- arm64: Initialise high_memory global variable earlier (bnc#1012382).
- arm64: introduce an order for exceptions (bsc#1068032).
- arm64: introduce mov_q macro to move a constant into a 64-bit register (bsc#1068032).
- arm64: Introduce uaccess_{disable,enable} functionality based on TTBR0_EL1 (bsc#1068032).
- arm64: kaslr: Put kernel vectors address in separate data page (bsc#1068032).
- arm64: Kconfig: Add CONFIG_UNMAP_KERNEL_AT_EL0 (bsc#1068032).
- arm64: Kconfig: Reword UNMAP_KERNEL_AT_EL0 kconfig entry (bsc#1068032).
- arm64: kill ESR_LNX_EXEC (bsc#1068032).
- arm64: kpti: Fix the interaction between ASID switching and software PAN (bsc#1068032).
- arm64: kvm: Fix SMCCC handling of unimplemented SMC/HVC calls (bsc#1076232).
- arm64: kvm: fix VTTBR_BADDR_MASK BUG_ON off-by-one (bnc#1012382).
- arm64: kvm: Make PSCI_VERSION a fast path (bsc#1068032).
- arm64: kvm: Use per-CPU vector when BP hardening is enabled (bsc#1068032).
- arm64: Mask all exceptions during kernel_exit (bsc#1068032).
- arm64: mm: Add arm64_kernel_unmapped_at_el0 helper (bsc#1068032).
- arm64: mm: Allocate ASIDs in pairs (bsc#1068032).
- arm64: mm: Fix and re-enable ARM64_SW_TTBR0_PAN (bsc#1068032).
- arm64: mm: hardcode rodata=true (bsc#1068032).
- arm64: mm: Introduce TTBR_ASID_MASK for getting at the ASID in the TTBR (bsc#1068032).
- arm64: mm: Invalidate both kernel and user ASIDs when performing TLBI (bsc#1068032).
- arm64: mm: Map entry trampoline into trampoline and kernel page tables (bsc#1068032).
- arm64: mm: Move ASID from TTBR0 to TTBR1 (bsc#1068032).
- arm64: mm: Remove pre_ttbr0_update_workaround for Falkor erratum #E1003 (bsc#1068032).
- arm64: mm: Rename post_ttbr0_update_workaround (bsc#1068032).
- arm64: mm: Temporarily disable ARM64_SW_TTBR0_PAN (bsc#1068032).
- arm64: mm: Use non-global mappings for kernel space (bsc#1068032).
- arm64: Move BP hardening to check_and_switch_context (bsc#1068032).
- arm64: Move post_ttbr_update_workaround to C code (bsc#1068032).
- arm64: Move the async/fiq helpers to explicitly set process context flags (bsc#1068032).
- arm64: SW PAN: Point saved ttbr0 at the zero page when switching to init_mm (bsc#1068032).
- arm64: SW PAN: Update saved ttbr0 value on enter_lazy_tlb (bsc#1068032).
- arm64: swp emulation: bound LL/SC retries before rescheduling (bsc#1068032).
- arm64: sysreg: Fix unprotected macro argmuent in write_sysreg (bsc#1068032).
- arm64: Take into account ID_AA64PFR0_EL1.CSV3 (bsc#1068032).
- arm64: thunderx2: remove branch predictor hardening References: bsc#1076232 This causes undefined instruction abort on the smc call from guest kernel. Disable until kvm is fixed.
- arm64: tls: Avoid unconditional zeroing of tpidrro_el0 for native tasks (bsc#1068032).
- arm64: Turn on KPTI only on CPUs that need it (bsc#1076187).
- arm64: use alternative auto-nop (bsc#1068032).
- arm64: use RET instruction for exiting the trampoline (bsc#1068032).
- arm64: xen: Enable user access before a privcmd hvc call (bsc#1068032).
- arm/arm64: kvm: Make default HYP mappings non-excutable (bsc#1068032).
- arm: avoid faulting on qemu (bnc#1012382).
- arm: BUG if jumping to usermode address in kernel mode (bnc#1012382).
- arm-ccn: perf: Prevent module unload while PMU is in use (bnc#1012382).
- arm: dma-mapping: disallow dma_get_sgtable() for non-kernel managed memory (bnc#1012382).
- arm: dts: am335x-evmsk: adjust mmc2 param to allow suspend (bnc#1012382).
- arm: dts: kirkwood: fix pin-muxing of MPP7 on OpenBlocks A7 (bnc#1012382).
- arm: dts: omap3: logicpd-torpedo-37xx-devkit: Fix MMC1 cd-gpio (bnc#1012382).
- arm: dts: ti: fix PCI bus dtc warnings (bnc#1012382).
- arm: kprobes: Align stack to 8-bytes in test code (bnc#1012382).
- arm: kprobes: Fix the return address of multiple kretprobes (bnc#1012382).
- arm: kvm: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bnc#1012382).
- arm: OMAP1: DMA: Correct the number of logical channels (bnc#1012382).
- arm: OMAP2+: Fix device node reference counts (bnc#1012382).
- arm: OMAP2+: gpmc-onenand: propagate error on initialization failure (bnc#1012382).
- arm: OMAP2+: Release device node after it is no longer needed (bnc#1012382).
- asm-prototypes: Clear any CPP defines before declaring the functions (git-fixes).
- asn.1: check for error from ASN1_OP_END__ACT actions (bnc#1012382).
- asn.1: fix out-of-bounds read when parsing indefinite length item (bnc#1012382).
- asoc: fsl_ssi: AC'97 ops need regmap, clock and cleaning up on failure (bsc#1031717).
- asoc: twl4030: fix child-node lookup (bsc#1031717).
- asoc: wm_adsp: Fix validation of firmware and coeff lengths (bsc#1031717).
- ath9k: fix tx99 potential info leak (bnc#1012382).
- atm: horizon: Fix irq release error (bnc#1012382).
- audit: ensure that 'audit=1' actually enables audit for PID 1 (bnc#1012382).
- axonram: Fix gendisk handling (bnc#1012382).
- backlight: pwm_bl: Fix overflow condition (bnc#1012382).
- bcache: add a comment in journal bucket reading (bsc#1076110).
- bcache: Avoid nested function definition (bsc#1076110).
- bcache: bch_allocator_thread() is not freezable (bsc#1076110).
- bcache: bch_writeback_thread() is not freezable (bsc#1076110).
- bcache: check return value of register_shrinker (bsc#1076110).
- bcache: documentation formatting, edited for clarity, stripe alignment notes (bsc#1076110).
- bcache: documentation updates and corrections (bsc#1076110).
- bcache: Do not reinvent the wheel but use existing llist API (bsc#1076110).
- bcache: do not write back data if reading it failed (bsc#1076110).
- bcache: explicitly destroy mutex while exiting (bnc#1012382).
- bcache: fix a comments typo in bch_alloc_sectors() (bsc#1076110).
- bcache: Fix building error on MIPS (bnc#1012382).
- bcache: fix sequential large write IO bypass (bsc#1076110).
- bcache: fix wrong cache_misses statistics (bnc#1012382).
- bcache: gc does not work when triggering by manual command (bsc#1076110, bsc#1038078).
- bcache: implement PI controller for writeback rate (bsc#1076110).
- bcache: increase the number of open buckets (bsc#1076110).
- bcache: only permit to recovery read error when cache device is clean (bnc#1012382 bsc#1043652).
- bcache: partition support: add 16 minors per bcacheN device (bsc#1076110, bsc#1019784).
- bcache: rearrange writeback main thread ratelimit (bsc#1076110).
- bcache: recover data from backing when data is clean (bnc#1012382 bsc#1043652).
- bcache: Remove redundant set_capacity (bsc#1076110).
- bcache: remove unused parameter (bsc#1076110).
- bcache: rewrite multiple partitions support (bsc#1076110, bsc#1038085).
- bcache: safeguard a dangerous addressing in closure_queue (bsc#1076110).
- bcache: silence static checker warning (bsc#1076110).
- bcache: smooth writeback rate control (bsc#1076110).
- bcache.txt: standardize document format (bsc#1076110).
- bcache: update bio-&gt;bi_opf bypass/writeback REQ_ flag hints (bsc#1076110).
- bcache: update bucket_in_use in real time (bsc#1076110).
- bcache: Update continue_at() documentation (bsc#1076110).
- bcache: use kmalloc to allocate bio in bch_data_verify() (bsc#1076110).
- bcache: use llist_for_each_entry_safe() in __closure_wake_up() (bsc#1076110).
- bcache: writeback rate clamping: make 32 bit safe (bsc#1076110).
- bcache: writeback rate shouldn't artifically clamp (bsc#1076110).
- be2net: restore properly promisc mode after queues reconfiguration (bsc#963844 FATE#320192).
- block: wake up all tasks blocked in get_request() (bnc#1012382).
- bluetooth: btusb: driver to enable the usb-wakeup feature (bnc#1012382).
- bnx2x: do not rollback VF MAC/VLAN filters we did not configure (bnc#1012382).
- bnx2x: fix possible overrun of VFPF multicast addresses array (bnc#1012382).
- bnx2x: prevent crash when accessing PTP with interface down (bnc#1012382).
- btrfs: add missing memset while reading compressed inline extents (bnc#1012382).
- btrfs: clear space cache inode generation always (bnc#1012382).
- btrfs: embed extent_changeset::range_changed to the structure (dependent patch, bsc#1031395).
- btrfs: qgroup: Fix qgroup reserved space underflow by only freeing reserved ranges (bsc#1031395).
- btrfs: qgroup: Fix qgroup reserved space underflow caused by buffered write and quotas being enabled (bsc#1031395).
- btrfs: qgroup: Introduce extent changeset for qgroup reserve functions (dependent patch, bsc#1031395).
- btrfs: qgroup: Return actually freed bytes for qgroup release or free data (bsc#1031395).
- btrfs: qgroup-test: Fix backport error in qgroup selftest (just to make CONFIG_BTRFS_FS_RUN_SANITY_TESTS pass compile).
- btrfs: ulist: make the finalization function public (dependent patch, bsc#1031395).
- btrfs: ulist: rename ulist_fini to ulist_release (dependent patch, bsc#1031395).
- can: af_can: canfd_rcv(): replace WARN_ONCE by pr_warn_once (bnc#1012382).
- can: af_can: can_rcv(): replace WARN_ONCE by pr_warn_once (bnc#1012382).
- can: ems_usb: cancel urb on -EPIPE and -EPROTO (bnc#1012382).
- can: esd_usb2: cancel urb on -EPIPE and -EPROTO (bnc#1012382).
- can: gs_usb: fix return value of the 'set_bittiming' callback (bnc#1012382).
- can: kvaser_usb: cancel urb on -EPIPE and -EPROTO (bnc#1012382).
- can: kvaser_usb: Fix comparison bug in kvaser_usb_read_bulk_callback() (bnc#1012382).
- can: kvaser_usb: free buf in error paths (bnc#1012382).
- can: kvaser_usb: ratelimit errors if incomplete messages are received (bnc#1012382).
- can: peak: fix potential bug in packet fragmentation (bnc#1012382).
- can: ti_hecc: Fix napi poll return value for repoll (bnc#1012382).
- can: usb_8dev: cancel urb on -EPIPE and -EPROTO (bnc#1012382).
- cdc-acm: apply quirk for card reader (bsc#1060279).
- cdrom: factor out common open_for_* code (bsc#1048585).
- cdrom: wait for tray to close (bsc#1048585).
- ceph: more accurate statfs (bsc#1077068).
- clk: imx6: refine hdmi_isfr's parent to make HDMI work on i.MX6 SoCs w/o VPU (bnc#1012382).
- clk: mediatek: add the option for determining PLL source clock (bnc#1012382).
- clk: tegra: Fix cclk_lp divisor register (bnc#1012382).
- config: arm64: enable HARDEN_BRANCH_PREDICTOR
- config: arm64: enable UNMAP_KERNEL_AT_EL0
- cpuidle: fix broadcast control when broadcast can not be entered (bnc#1012382).
- cpuidle: powernv: Pass correct drv-&gt;cpumask for registration (bnc#1012382).
- cpuidle: Validate cpu_dev in cpuidle_add_sysfs() (bnc#1012382).
- crypto: algapi - fix NULL dereference in crypto_remove_spawns() (bnc#1012382).
- crypto: chacha20poly1305 - validate the digest size (bnc#1012382).
- crypto: chelsio - select CRYPTO_GF128MUL (bsc#1048325).
- crypto: crypto4xx - increase context and scatter ring buffer elements (bnc#1012382).
- crypto: deadlock between crypto_alg_sem/rtnl_mutex/genl_mutex (bnc#1012382).
- crypto: mcryptd - protect the per-CPU queue with a lock (bnc#1012382).
- crypto: n2 - cure use after free (bnc#1012382).
- crypto: pcrypt - fix freeing pcrypt instances (bnc#1012382).
- crypto: s5p-sss - Fix completing crypto request in IRQ handler (bnc#1012382).
- crypto: tcrypt - fix buffer lengths in test_aead_speed() (bnc#1012382).
- cxl: Check if vphb exists before iterating over AFU devices (bsc#1066223).
- dax: Pass detailed error code from __dax_fault() (bsc#1072484).
- dccp: do not restart ccid2_hc_tx_rto_expire() if sk in closed state (bnc#1012382).
- delay: add poll_event_interruptible (bsc#1048585).
- dlm: fix malfunction of dlm_tool caused by debugfs changes (bsc#1077704).
- dmaengine: dmatest: move callback wait queue to thread context (bnc#1012382).
- dmaengine: Fix array index out of bounds warning in __get_unmap_pool() (bnc#1012382).
- dmaengine: pl330: fix double lock (bnc#1012382).
- dmaengine: ti-dma-crossbar: Correct am335x/am43xx mux value type (bnc#1012382).
- dm btree: fix serious bug in btree_split_beneath() (bnc#1012382).
- dm bufio: fix shrinker scans when (nr_to_scan &lt; retain_target) (bnc#1012382).
- dm thin metadata: THIN_MAX_CONCURRENT_LOCKS should be 6 (bnc#1012382).
- drivers/firmware: Expose psci_get_version through psci_ops structure (bsc#1068032).
- drm/amd/amdgpu: fix console deadlock if late init failed (bnc#1012382).
- drm: extra printk() wrapper macros (bnc#1012382).
- drm/exynos/decon5433: set STANDALONE_UPDATE_F on output enablement (bnc#1012382).
- drm/exynos: gem: Drop NONCONTIG flag for buffers allocated without IOMMU (bnc#1012382).
- drm/omap: fix dmabuf mmap for dma_alloc'ed buffers (bnc#1012382).
- drm/radeon: fix atombios on big endian (bnc#1012382).
- drm/radeon: reinstate oland workaround for sclk (bnc#1012382).
- drm/radeon/si: add dpm quirk for Oland (bnc#1012382).
- drm/vmwgfx: Potential off by one in vmw_view_add() (bnc#1012382).
- dynamic-debug-howto: fix optional/omitted ending line number to be LARGE instead of 0 (bnc#1012382).
- edac, i5000, i5400: Fix definition of NRECMEMB register (bnc#1012382).
- edac, i5000, i5400: Fix use of MTR_DRAM_WIDTH macro (bnc#1012382).
- edac, sb_edac: Fix missing break in switch (bnc#1012382).
- eeprom: at24: check at24_read/write arguments (bnc#1012382).
- efi/esrt: Cleanup bad memory map log messages (bnc#1012382).
- efi: Move some sysfs files to be read-only by root (bnc#1012382).
- eventpoll.h: add missing epoll event masks (bnc#1012382).
- ext4: fix crash when a directory's i_size is too small (bnc#1012382).
- ext4: Fix ENOSPC handling in DAX page fault handle (bsc#1072484).
- ext4: fix fdatasync(2) after fallocate(2) operation (bnc#1012382).
- fbdev: controlfb: Add missing modes to fix out of bounds access (bnc#1012382).
- Fix EX_SIZE. We do not have the patches that shave off parts of the exception data.
- Fix mishandling of cases with MSR not being present (writing to MSR even though _state == -1).
- Fix return value from ib[rs|pb]_enabled()
- Fixup hang when calling 'nvme list' on all paths down (bsc#1070052).
- fjes: Fix wrong netdevice feature flags (bnc#1012382).
- flow_dissector: properly cap thoff field (bnc#1012382).
- fm10k: ensure we process SM mbx when processing VF mbx (bnc#1012382).
- fork: clear thread stack upon allocation (bsc#1077560).
- fscache: Fix the default for fscache_maybe_release_page() (bnc#1012382).
- futex: Prevent overflow by strengthen input validation (bnc#1012382).
- gcov: disable for COMPILE_TEST (bnc#1012382).
- gfs2: Take inode off order_write list when setting jdata flag (bnc#1012382).
- gpio: altera: Use handle_level_irq when configured as a level_high (bnc#1012382).
- hid: chicony: Add support for another ASUS Zen AiO keyboard (bnc#1012382).
- hid: xinmo: fix for out of range for THT 2P arcade controller (bnc#1012382).
- hrtimer: Reset hrtimer cpu base proper on CPU hotplug (bnc#1012382).
- hv: kvp: Avoid reading past allocated blocks from KVP file (bnc#1012382).
- hwmon: (asus_atk0110) fix uninitialized data access (bnc#1012382).
- i40iw: Account for IPv6 header when setting MSS (bsc#1024376 FATE#321249).
- i40iw: Allocate a sdbuf per CQP WQE (bsc#1024376 FATE#321249).
- i40iw: Cleanup AE processing (bsc#1024376 FATE#321249).
- i40iw: Clear CQP Head/Tail during initialization (bsc#1024376 FATE#321249).
- i40iw: Correct ARP index mask (bsc#1024376 FATE#321249).
- i40iw: Do not allow posting WR after QP is flushed (bsc#1024376 FATE#321249).
- i40iw: Do not free sqbuf when event is I40IW_TIMER_TYPE_CLOSE (bsc#1024376 FATE#321249).
- i40iw: Do not generate CQE for RTR on QP flush (bsc#1024376 FATE#321249).
- i40iw: Do not retransmit MPA request after it is ACKed (bsc#1024376 FATE#321249).
- i40iw: Fixes for static checker warnings (bsc#1024376 FATE#321249).
- i40iw: Ignore AE source field in AEQE for some AEs (bsc#1024376 FATE#321249).
- i40iw: Move cqp_cmd_head init to CQP initialization (bsc#1024376 FATE#321249).
- i40iw: Move exception_lan_queue to VSI structure (bsc#1024376 FATE#321249).
- i40iw: Move MPA request event for loopback after connect (bsc#1024376 FATE#321249).
- i40iw: Notify user of established connection after QP in RTS (bsc#1024376 FATE#321249).
- i40iw: Reinitialize IEQ on MTU change (bsc#1024376 FATE#321249).
- ib/hfi1: Fix misspelling in comment (bsc#973818, fate#319242).
- ib/hfi1: Prevent kernel QP post send hard lockups (bsc#973818 FATE#319242).
- ib/ipoib: Fix lockdep issue found on ipoib_ib_dev_heavy_flush (git-fixes).
- ib/ipoib: Fix race condition in neigh creation (bsc#1022595 FATE#322350).
- ib/ipoib: Grab rtnl lock on heavy flush when calling ndo_open/stop (bnc#1012382).
- ib/mlx4: Increase maximal message size under UD QP (bnc#1012382).
- ib/mlx5: Assign send CQ and recv CQ of UMR QP (bnc#1012382).
- ib/mlx5: Serialize access to the VMA list (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- ibmvnic: Allocate and request vpd in init_resources (bsc#1076872).
- ibmvnic: Do not handle RX interrupts when not up (bsc#1075066).
- ibmvnic: Fix IP offload control buffer (bsc#1076899).
- ibmvnic: Fix IPv6 packet descriptors (bsc#1076899).
- ibmvnic: Fix pending MAC address changes (bsc#1075627).
- ibmvnic: Modify buffer size and number of queues on failover (bsc#1076872).
- ibmvnic: Revert to previous mtu when unsupported value requested (bsc#1076872).
- ibmvnic: Wait for device response when changing MAC (bsc#1078681).
- ib/rdmavt: restore IRQs on error path in rvt_create_ah() (bsc#973818, fate#319242).
- ib/srpt: Disable RDMA access by the initiator (bnc#1012382).
- ib/srpt: Fix ACL lookup during login (bsc#1024296 FATE#321265).
- ib/uverbs: Fix command checking as part of ib_uverbs_ex_modify_qp() (FATE#321231 FATE#321473 FATE#322153 FATE#322149).
- igb: check memory allocation failure (bnc#1012382).
- ima: fix hash algorithm initialization (bnc#1012382).
- inet: frag: release spinlock before calling icmp_send() (bnc#1012382).
- input: 88pm860x-ts - fix child-node lookup (bnc#1012382).
- input: elantech - add new icbody type 15 (bnc#1012382).
- input: i8042 - add TUXEDO BU1406 (N24_25BU) to the nomux list (bnc#1012382).
- input: trackpoint - force 3 buttons if 0 button is reported (bnc#1012382).
- input: twl4030-vibra - fix sibling-node lookup (bnc#1012382).
- input: twl6040-vibra - fix child-node lookup (bnc#1012382).
- input: twl6040-vibra - fix DT node memory management (bnc#1012382).
- intel_th: pci: Add Gemini Lake support (bnc#1012382).
- iommu/arm-smmu-v3: Do not free page table ops twice (bnc#1012382).
- iommu/vt-d: Fix scatterlist offset handling (bnc#1012382).
- ip6_gre: remove the incorrect mtu limit for ipgre tap (bsc#1022912 FATE#321246).
- ip6_tunnel: disable dst caching if tunnel is dual-stack (bnc#1012382).
- ip_gre: remove the incorrect mtu limit for ipgre tap (bsc#1022912 FATE#321246).
- ipmi: Stop timers before cleaning up the module (bnc#1012382).
- ipv4: Fix use-after-free when flushing FIB tables (bnc#1012382).
- ipv4: igmp: guard against silly MTU values (bnc#1012382).
- ipv4: Make neigh lookup keys for loopback/point-to-point devices be INADDR_ANY (bnc#1012382).
- ipv6: Fix getsockopt() for sockets with default IPV6_AUTOFLOWLABEL (bnc#1012382).
- ipv6: fix possible mem leaks in ipv6_make_skb() (bnc#1012382).
- ipv6: fix udpv6 sendmsg crash caused by too small MTU (bnc#1012382).
- ipv6: ip6_make_skb() needs to clear cork.base.dst (git-fixes).
- ipv6: mcast: better catch silly mtu values (bnc#1012382).
- ipv6: reorder icmpv6_init() and ip6_mr_init() (bnc#1012382).
- ipvlan: fix ipv6 outbound device (bnc#1012382).
- ipvlan: remove excessive packet scrubbing (bsc#1070799).
- irda: vlsi_ir: fix check for DMA mapping errors (bnc#1012382).
- irqchip/crossbar: Fix incorrect type of register size (bnc#1012382).
- iscsi_iser: Re-enable 'iser_pi_guard' module parameter (bsc#1062129).
- iscsi-target: fix memory leak in lio_target_tiqn_addtpg() (bnc#1012382).
- iscsi-target: Make TASK_REASSIGN use proper se_cmd-&gt;cmd_kref (bnc#1012382).
- isdn: kcapi: avoid uninitialized data (bnc#1012382).
- iser-target: Fix possible use-after-free in connection establishment error (FATE#321732).
- iw_cxgb4: Only validate the MSN for successful completions (bnc#1012382).
- iw_cxgb4: reflect the original WR opcode in drain cqes (bsc#321658 FATE#1005778 bsc#321660 FATE#1005780 bsc#321661 FATE#1005781).
- iw_cxgb4: when flushing, complete all wrs in a chain (bsc#321658 FATE#1005778 bsc#321660 FATE#1005780 bsc#321661 FATE#1005781).
- ixgbe: fix use of uninitialized padding (bnc#1012382).
- jump_label: Invoke jump_label_test() via early_initcall() (bnc#1012382).
- kabi fix for new hash_cred function (bsc#1012917).
- kabi: Keep KVM stable after enable s390 wire up bpb feature (bsc#1076805).
- kABI: protect struct bpf_map (kabi).
- kABI: protect struct ipv6_pinfo (kabi).
- kABI: protect struct t10_alua_tg_pt_gp (kabi).
- kABI: protect struct usbip_device (kabi).
- kabi/severities: arm64: ignore cpu capability array
- kabi/severities: do not care about stuff_RSB
- kaiser: Set _PAGE_NX only if supported (bnc#1012382).
- kaiser: Set _PAGE_NX only if supported (bnc#1012382).
- kbuild: add '-fno-stack-check' to kernel build options (bnc#1012382).
- kbuild: modversions for EXPORT_SYMBOL() for asm (bsc#1074621 bsc#1068032).
- kbuild: pkg: use --transform option to prefix paths in tar (bnc#1012382).
- kdb: Fix handling of kallsyms_symbol_next() return value (bnc#1012382).
- kernel/acct.c: fix the acct-&gt;needcheck check in check_free_space() (bnc#1012382).
- kernel: make groups_sort calling a responsibility group_info allocators (bnc#1012382).
- kernel/signal.c: protect the SIGNAL_UNKILLABLE tasks from !sig_kernel_only() signals (bnc#1012382).
- kernel/signal.c: protect the traced SIGNAL_UNKILLABLE tasks from SIGKILL (bnc#1012382).
- kernel/signal.c: remove the no longer needed SIGNAL_UNKILLABLE check in complete_signal() (bnc#1012382).
- keys: add missing permission check for request_key() destination (bnc#1012382).
- kprobes/x86: Disable preemption in ftrace-based jprobes (bnc#1012382).
- kpti: Rename to PAGE_TABLE_ISOLATION (bnc#1012382).
- kpti: Report when enabled (bnc#1012382).
- kvm: Fix stack-out-of-bounds read in write_mmio (bnc#1012382).
- kvm: nVMX: reset nested_run_pending if the vCPU is going to be reset (bnc#1012382).
- kvm: nVMX: VMCLEAR should not cause the vCPU to shut down (bnc#1012382).
- kvm: pci-assign: do not map smm memory slot pages in vt-d page tables (bnc#1012382).
- kvm: s390: Enable all facility bits that are known good for passthrough (bsc#1076805).
- kvm: s390: wire up bpb feature (bsc#1076805).
- kvm: VMX: Fix enable VPID conditions (bnc#1012382).
- kvm: VMX: remove I/O port 0x80 bypass on Intel hosts (bnc#1012382).
- kvm: vmx: Scrub hardware GPRs at VM-exit (bnc#1012382 bsc#1068032).
- kvm: x86: Add memory barrier on vmcs field lookup (bnc#1012382).
- kvm: x86: correct async page present tracepoint (bnc#1012382).
- kvm: x86: Exit to user-mode on #UD intercept when emulator requires (bnc#1012382).
- kvm: X86: Fix load RFLAGS w/o the fixed bit (bnc#1012382).
- kvm: x86: fix RSM when PCID is non-zero (bnc#1012382).
- kvm: x86: inject exceptions produced by x86_decode_insn (bnc#1012382).
- kvm: x86: pvclock: Handle first-time write to pvclock-page contains random junk (bnc#1012382).
- l2tp: cleanup l2tp_tunnel_delete calls (bnc#1012382).
- lan78xx: Fix failure in USB Full Speed (bnc#1012382).
- libata: apply MAX_SEC_1024 to all LITEON EP1 series devices (bnc#1012382).
- libata: drop WARN from protocol error in ata_sff_qc_issue() (bnc#1012382).
- lib/genalloc.c: make the avail variable an atomic_long_t (bnc#1012382).
- macvlan: Only deliver one copy of the frame to the macvlan interface (bnc#1012382).
- md: more open-coded offset_in_page() (bsc#1076110).
- media: dvb: i2c transfers over usb cannot be done from stack (bnc#1012382).
- mfd: cros ec: spi: Do not send first message too soon (bnc#1012382).
- mfd: twl4030-audio: Fix sibling-node lookup (bnc#1012382).
- mfd: twl6040: Fix child-node lookup (bnc#1012382).
- mlxsw: reg: Fix SPVMLR max record count (bnc#1012382).
- mlxsw: reg: Fix SPVM max record count (bnc#1012382).
- mm: avoid returning VM_FAULT_RETRY from -&gt;page_mkwrite handlers (bnc#1012382).
- mmc: core: Do not leave the block driver in a suspended state (bnc#1012382).
- mmc: mediatek: Fixed bug where clock frequency could be set wrong (bnc#1012382).
- mm: drop unused pmdp_huge_get_and_clear_notify() (bnc#1012382).
- mm: Handle 0 flags in _calc_vm_trans() macro (bnc#1012382).
- mm/mprotect: add a cond_resched() inside change_pmd_range() (bnc#1077871, bnc#1078002).
- mm/vmstat: Make NR_TLB_REMOTE_FLUSH_RECEIVED available even on UP (bnc#1012382).
- module: Add retpoline tag to VERMAGIC (bnc#1012382).
- module: set __jump_table alignment to 8 (bnc#1012382).
- more bio_map_user_iov() leak fixes (bnc#1012382).
- mtd: nand: Fix writing mtdoops to nand flash (bnc#1012382).
- net: Allow neigh contructor functions ability to modify the primary_key (bnc#1012382).
- net/appletalk: Fix kernel memory disclosure (bnc#1012382).
- net: bcmgenet: correct MIB access of UniMAC RUNT counters (bnc#1012382).
- net: bcmgenet: correct the RBUF_OVFL_CNT and RBUF_ERR_CNT MIB values (bnc#1012382).
- net: bcmgenet: power down internal phy if open or resume fails (bnc#1012382).
- net: bcmgenet: Power up the internal PHY before probing the MII (bnc#1012382).
- net: bcmgenet: reserved phy revisions must be checked first (bnc#1012382).
- net: bridge: fix early call to br_stp_change_bridge_id and plug newlink leaks (bnc#1012382).
- net: core: fix module type in sock_diag_bind (bnc#1012382).
- net: Do not allow negative values for busy_read and busy_poll sysctl interfaces (bnc#1012382).
- net: fec: fix multicast filtering hardware setup (bnc#1012382).
- netfilter: bridge: honor frag_max_size when refragmenting (bnc#1012382).
- netfilter: do not track fragmented packets (bnc#1012382).
- netfilter: ipvs: Fix inappropriate output of procfs (bnc#1012382).
- netfilter: nfnetlink_queue: fix secctx memory leak (bnc#1012382).
- netfilter: nfnetlink_queue: fix timestamp attribute (bsc#1074134).
- netfilter: nfnl_cthelper: fix a race when walk the nf_ct_helper_hash table (bnc#1012382).
- netfilter: nfnl_cthelper: Fix memory leak (bnc#1012382).
- netfilter: nfnl_cthelper: fix runtime expectation policy updates (bnc#1012382).
- net: Fix double free and memory corruption in get_net_ns_by_id() (bnc#1012382).
- net: igmp: fix source address check for IGMPv3 reports (bnc#1012382).
- net: igmp: Use correct source address on IGMPv3 reports (bnc#1012382).
- net: initialize msg.msg_flags in recvfrom (bnc#1012382).
- net: ipv4: fix for a race condition in raw_sendmsg (bnc#1012382).
- netlink: add a start callback for starting a netlink dump (bnc#1012382).
- net/mac80211/debugfs.c: prevent build failure with CONFIG_UBSAN=y (bnc#1012382).
- net/mlx5: Avoid NULL pointer dereference on steering cleanup (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5: Cleanup IRQs in case of unload failure (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5e: Add refcount to VXLAN structure (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5e: Fix ETS BW check (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5e: Fix features check of IPv6 traffic (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5e: Fix fixpoint divide exception in mlx5e_am_stats_compare (bsc#1015342).
- net/mlx5e: Fix possible deadlock of VXLAN lock (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5e: Prevent possible races in VXLAN control flow (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5: Fix error flow in CREATE_QP command (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5: Fix rate limit packet pacing naming and struct (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5: Stay in polling mode when command EQ destroy fails (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net: mvmdio: disable/unprepare clocks in EPROBE_DEFER case (bnc#1012382).
- net: mvneta: clear interface link status on port disable (bnc#1012382).
- net: mvneta: eliminate wrong call to handle rx descriptor error (fate#319899).
- net: mvneta: use proper rxq_number in loop on rx queues (fate#319899).
- net/packet: fix a race in packet_bind() and packet_notifier() (bnc#1012382).
- net: phy: at803x: Change error to EINVAL for invalid MAC (bnc#1012382).
- net: phy: micrel: ksz9031: reconfigure autoneg after phy autoneg workaround (bnc#1012382).
- net: qdisc_pkt_len_init() should be more robust (bnc#1012382).
- net: qmi_wwan: add Sierra EM7565 1199:9091 (bnc#1012382).
- net: qmi_wwan: Add USB IDs for MDM6600 modem on Motorola Droid 4 (bnc#1012382).
- net: reevalulate autoflowlabel setting after sysctl setting (bnc#1012382).
- net: Resend IGMP memberships upon peer notification (bnc#1012382).
- net: sctp: fix array overrun read on sctp_timer_tbl (bnc#1012382).
- net: stmmac: enable EEE in MII, GMII or RGMII only (bnc#1012382).
- net: systemport: Pad packet before inserting TSB (bnc#1012382).
- net: systemport: Utilize skb_put_padto() (bnc#1012382).
- net: tcp: close sock if net namespace is exiting (bnc#1012382).
- net: wimax/i2400m: fix NULL-deref at probe (bnc#1012382).
- nfsd: auth: Fix gid sorting when rootsquash enabled (bnc#1012382).
- nfsd: Fix another OPEN stateid race (bnc#1012382).
- nfsd: fix nfsd_minorversion(.., NFSD_AVAIL) (bnc#1012382).
- nfsd: fix nfsd_reset_versions for NFSv4 (bnc#1012382).
- nfsd: Fix stateid races between OPEN and CLOSE (bnc#1012382).
- nfsd: Make init_open_stateid() a bit more whole (bnc#1012382).
- nfs: Do not take a reference on fl-&gt;fl_file for LOCK operation (bnc#1012382).
- nfs: Fix a typo in nfs_rename() (bnc#1012382).
- nfs: improve shinking of access cache (bsc#1012917).
- nfsv4.1 respect server's max size in CREATE_SESSION (bnc#1012382).
- nfsv4: Fix client recovery when server reboots multiple times (bnc#1012382).
- nohz: Prevent a timer interrupt storm in tick_nohz_stop_sched_tick() (bnc#1012382).
- n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD) (bnc#1012382).
- nvme_fc: correct hang in nvme_ns_remove() (bsc#1075811).
- nvme_fc: fix rogue admin cmds stalling teardown (bsc#1075811).
- nvme-pci: Remove watchdog timer (bsc#1066163).
- openrisc: fix issue handling 8 byte get_user calls (bnc#1012382).
- packet: fix crash in fanout_demux_rollover() (bnc#1012382).
- parisc: Fix alignment of pa_tlb_lock in assembly on 32-bit SMP kernel (bnc#1012382).
- parisc: Hide Diva-built-in serial aux and graphics card (bnc#1012382).
- partially revert tipc improve link resiliency when rps is activated (bsc#1068038).
- pci/AER: Report non-fatal errors only to the affected endpoint (bnc#1012382).
- pci: Avoid bus reset if bridge itself is broken (bnc#1012382).
- pci: Create SR-IOV virtfn/physfn links before attaching driver (bnc#1012382).
- pci: Detach driver before procfs &amp; sysfs teardown on device remove (bnc#1012382).
- pci/PME: Handle invalid data when reading Root Status (bnc#1012382).
- pci / PM: Force devices to D0 in pci_pm_thaw_noirq() (bnc#1012382).
- perf symbols: Fix symbols__fixup_end heuristic for corner cases (bnc#1012382).
- perf test attr: Fix ignored test case result (bnc#1012382).
- phy: work around 'phys' references to usb-nop-xceiv devices (bnc#1012382).
- pinctrl: adi2: Fix Kconfig build problem (bnc#1012382).
- pinctrl: st: add irq_request/release_resources callbacks (bnc#1012382).
- pipe: avoid round_pipe_size() nr_pages overflow on 32-bit (bnc#1012382).
- powerpc/64: Add macros for annotating the destination of rfid/hrfid (bsc#1068032, bsc#1075087).
- powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075087).
- powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075087).
- powerpc/64s: Add EX_SIZE definition for paca exception save areas (bsc#1068032, bsc#1075087).
- powerpc/64s: Add support for RFI flush of L1-D cache (bsc#1068032,  bsc#1075087).
- powerpc/64s: Allow control of RFI flush via debugfs (bsc#1068032, bsc#1075087).
- powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075087).
- powerpc/64s: Simple RFI macro conversions (bsc#1068032, bsc#1075087).
- powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti (bsc#1068032, bsc#1075087).
- powerpc/64s: Wire up cpu_show_meltdown() (bsc#1068032).
- powerpc/asm: Allow including ppc_asm.h in asm files (bsc#1068032, bsc#1075087).
- powerpc/ipic: Fix status get and status clear (bnc#1012382).
- powerpc/perf: Dereference BHRB entries safely (bsc#1066223).
- powerpc/perf/hv-24x7: Fix incorrect comparison in memord (bnc#1012382).
- powerpc/powernv: Check device-tree for RFI flush settings (bsc#1068032,  bsc#1075087).
- powerpc/powernv/cpufreq: Fix the frequency read by /proc/cpuinfo (bnc#1012382).
- powerpc/powernv/ioda2: Gracefully fail if too many TCE levels requested (bnc#1012382).
- powerpc/pseries: include linux/types.h in asm/hvcall.h (bsc#1068032, bsc#1075087).
- powerpc/pseries: Introduce H_GET_CPU_CHARACTERISTICS (bsc#1068032, bsc#1075087).
- powerpc/pseries: Query hypervisor for RFI flush settings (bsc#1068032,  bsc#1075087).
- powerpc/pseries/rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075087).
- powerpc/rfi-flush: Add DEBUG_RFI config option (bsc#1068032, bsc#1075087).
- powerpc/rfi-flush: Make setup_rfi_flush() not __init (bsc#1068032, bsc#1075087).
- powerpc/rfi-flush: Move RFI flush fields out of the paca (unbreak kABI) (bsc#1068032, bsc#1075087).
- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code (bsc#1068032, bsc#1075087).
- powerpc/rfi-flush: prevent crash when changing flush type to fallback after system boot (bsc#1068032, bsc#1075087).
- ppp: Destroy the mutex when cleanup (bnc#1012382).
- pppoe: take -&gt;needed_headroom of lower device into account on xmit (bnc#1012382).
- pti: unbreak EFI (bsc#1074709).
- r8152: fix the list rx_done may be used without initialization (bnc#1012382).
- r8152: prevent the driver from transmitting packets with carrier off (bnc#1012382).
- r8169: fix memory corruption on retrieval of hardware statistics (bnc#1012382).
- raid5: Set R5_Expanded on parity devices as well as data (bnc#1012382).
- ravb: Remove Rx overflow log messages (bnc#1012382).
- rbd: set max_segments to USHRT_MAX (bnc#1012382).
- rdma/cma: Avoid triggering undefined behavior (bnc#1012382).
- rdma/i40iw: Remove MSS change support (bsc#1024376 FATE#321249).
- rds: Fix NULL pointer dereference in __rds_rdma_map (bnc#1012382).
- rds: Heap OOB write in rds_message_alloc_sgs() (bnc#1012382).
- rds: null pointer dereference in rds_atomic_free_op (bnc#1012382).
- Re-enable fixup detection by CPU type in case hypervisor call fails.
- regulator: core: Rely on regulator_dev_release to free constraints (bsc#1074847).
- regulator: da9063: Return an error code on probe failure (bsc#1074847).
- regulator: pwm: Fix regulator ramp delay for continuous mode (bsc#1074847).
- regulator: Try to resolve regulators supplies on registration (bsc#1074847).
- Revert 'Bluetooth: btusb: driver to enable the usb-wakeup feature' (bnc#1012382).
- Revert 'drm/armada: Fix compile fail' (bnc#1012382).
- Revert 'drm/radeon: dont switch vt on suspend' (bnc#1012382).
- Revert 'ipsec: Fix aborted xfrm policy dump crash' (kabi).
- Revert 'kaiser: vmstat show NR_KAISERTABLE as nr_overhead' (kabi).
- Revert 'lib/genalloc.c: make the avail variable an atomic_long_t' (kabi).
- Revert 'module: Add retpoline tag to VERMAGIC' (bnc#1012382 kabi).
- Revert 'module: Add retpoline tag to VERMAGIC' (kabi).
- Revert 'netlink: add a start callback for starting a netlink dump' (kabi).
- Revert 'ocfs2: should wait dio before inode lock in ocfs2_setattr()' (bnc#1012382).
- Revert 'Re-enable fixup detection by CPU type in case hypervisor call fails.' The firmware update is required for the existing instructions to also do the cache flush.
- Revert 's390/kbuild: enable modversions for symbols exported from asm' (bnc#1012382).
- Revert 'sched/deadline: Use the revised wakeup rule for suspending constrained dl tasks' (kabi).
- Revert 'scsi: libsas: align sata_device's rps_resp on a cacheline' (kabi).
- Revert 'spi: SPI_FSL_DSPI should depend on HAS_DMA' (bnc#1012382).
- Revert 'userfaultfd: selftest: vm: allow to build in vm/ directory' (bnc#1012382).
- Revert 'x86/efi: Build our own page table structures' (bnc#1012382).
- Revert 'x86/efi: Hoist page table switching code into efi_call_virt()' (bnc#1012382).
- Revert 'x86/mm/pat: Ensure cpa-&gt;pfn only contains page frame numbers' (bnc#1012382).
- rfi-flush: Make DEBUG_RFI a CONFIG option (bsc#1068032, bsc#1075087).
- ring-buffer: Mask out the info bits when returning buffer page length (bnc#1012382).
- route: also update fnhe_genid when updating a route cache (bnc#1012382).
- route: update fnhe_expires for redirect when the fnhe exists (bnc#1012382).
- rtc: cmos: Initialize hpet timer before irq is registered (bsc#1077592).
- rtc: pcf8563: fix output clock rate (bnc#1012382).
- rtc: pl031: make interrupt optional (bnc#1012382).
- rtc: set the alarm to the next expiring timer (bnc#1012382).
- s390: always save and restore all registers on context switch (bnc#1012382).
- s390/cpuinfo: show facilities as reported by stfle (bnc#1076847, LTC#163740).
- s390: fix compat system call table (bnc#1012382).
- s390/pci: do not require AIS facility (bnc#1012382).
- s390/qeth: no ETH header for outbound AF_IUCV (LTC#156276 bnc#1012382 bnc#1053472).
- s390/runtime instrumentation: simplify task exit handling (bnc#1012382).
- sch_dsmark: fix invalid skb_cow() usage (bnc#1012382).
- sched/deadline: Make sure the replenishment timer fires in the next period (bnc#1012382).
- sched/deadline: Throttle a constrained deadline task activated after the deadline (bnc#1012382).
- sched/deadline: Use deadline instead of period when calculating overflow (bnc#1012382).
- sched/deadline: Use the revised wakeup rule for suspending constrained dl tasks (bnc#1012382).
- sched/deadline: Zero out positive runtime after throttling constrained tasks (git-fixes).
- sched/rt: Do not pull from current CPU if only one CPU to pull (bnc#1022476).
- scsi: bfa: integer overflow in debugfs (bnc#1012382).
- scsi: cxgb4i: fix Tx skb leak (bnc#1012382).
- scsi: handle ABORTED_COMMAND on Fujitsu ETERNUS (bsc#1069138).
- scsi: hpsa: cleanup sas_phy structures in sysfs when unloading (bnc#1012382).
- scsi: hpsa: destroy sas transport properties before scsi_host (bnc#1012382).
- scsi: libsas: align sata_device's rps_resp on a cacheline (bnc#1012382).
- scsi: lpfc: Use after free in lpfc_rq_buf_free() (bsc#1037838).
- scsi: mpt3sas: Fix IO error occurs on pulling out a drive from RAID1 volume created on two SATA drive (bnc#1012382).
- scsi: sd: change allow_restart to bool in sysfs interface (bnc#1012382).
- scsi: sd: change manage_start_stop to bool in sysfs interface (bnc#1012382).
- scsi: sg: disable SET_FORCE_LOW_DMA (bnc#1012382).
- scsi: sr: wait for the medium to become ready (bsc#1048585).
- sctp: do not allow the v4 socket to bind a v4mapped v6 address (bnc#1012382).
- sctp: do not free asoc when it is already dead in sctp_sendmsg (bnc#1012382).
- sctp: Replace use of sockets_allocated with specified macro (bnc#1012382).
- sctp: return error if the asoc has been peeled off in sctp_wait_for_sndbuf (bnc#1012382).
- sctp: use the right sk after waking up from wait_buf sleep (bnc#1012382).
- selftest/powerpc: Fix false failures for skipped tests (bnc#1012382).
- selftests/x86: Add test_vsyscall (bnc#1012382).
- selftests/x86/ldt_get: Add a few additional tests for limits (bnc#1012382).
- serial: 8250_pci: Add Amazon PCI serial device ID (bnc#1012382).
- serial: 8250: Preserve DLD[7:4] for PORT_XR17V35X (bnc#1012382).
- series.conf: move core networking (including netfilter) into sorted section
- series.conf: whitespace cleanup
- Set supported_modules_check 1 (bsc#1072163).
- sfc: do not warn on successful change of MAC (bnc#1012382).
- sh_eth: fix SH7757 GEther initialization (bnc#1012382).
- sh_eth: fix TSU resource handling (bnc#1012382).
- sit: update frag_off info (bnc#1012382).
- sock: free skb in skb_complete_tx_timestamp on error (bnc#1012382).
- sparc64/mm: set fields in deferred pages (bnc#1012382).
- spi_ks8995: fix 'BUG: key accdaa28 not in .data!' (bnc#1012382).
- spi: sh-msiof: Fix DMA transfer size check (bnc#1012382).
- spi: xilinx: Detect stall with Unknown commands (bnc#1012382).
- staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl (bnc#1012382).
- sunrpc: add auth_unix hash_cred() function (bsc#1012917).
- sunrpc: add generic_auth hash_cred() function (bsc#1012917).
- sunrpc: add hash_cred() function to rpc_authops struct (bsc#1012917).
- sunrpc: add RPCSEC_GSS hash_cred() function (bsc#1012917).
- sunrpc: Fix rpc_task_begin trace point (bnc#1012382).
- sunrpc: replace generic auth_cred hash with auth-specific function (bsc#1012917).
- sunrpc: use supplimental groups in auth hash (bsc#1012917).
- sunxi-rsb: Include OF based modalias in device uevent (bnc#1012382).
- sysfs/cpu: Add vulnerability folder (bnc#1012382).
- sysfs/cpu: Fix typos in vulnerability documentation (bnc#1012382).
- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).
- sysrq : fix Show Regs call trace on ARM (bnc#1012382).
- target: Avoid early CMD_T_PRE_EXECUTE failures during ABORT_TASK (bnc#1012382).
- target/file: Do not return error for UNMAP if length is zero (bnc#1012382).
- target: fix ALUA transition timeout handling (bnc#1012382).
- target:fix condition return in core_pr_dump_initiator_port() (bnc#1012382).
- target: fix race during implicit transition work flushes (bnc#1012382).
- target/iscsi: Fix a race condition in iscsit_add_reject_from_cmd() (bnc#1012382).
- target: Use system workqueue for ALUA transitions (bnc#1012382).
- tcp: correct memory barrier usage in tcp_check_space() (bnc#1012382).
- tcp: fix under-evaluated ssthresh in TCP Vegas (bnc#1012382).
- tcp md5sig: Use skb's saddr when replying to an incoming segment (bnc#1012382).
- tcp: __tcp_hdrlen() helper (bnc#1012382).
- tg3: Fix rx hang on MTU change with 5717/5719 (bnc#1012382).
- thermal/drivers/step_wise: Fix temperature regulation misbehavior (bnc#1012382).
- thermal: hisilicon: Handle return value of clk_prepare_enable (bnc#1012382).
- tipc: fix cleanup at module unload (bnc#1012382).
- tipc: fix memory leak in tipc_accept_from_sock() (bnc#1012382).
- tipc: improve link resiliency when rps is activated (bsc#1068038).
- tracing: Allocate mask_str buffer dynamically (bnc#1012382).
- tracing: Fix converting enum's from the map in trace_event_eval_update() (bnc#1012382).
- tracing: Fix crash when it fails to alloc ring buffer (bnc#1012382).
- tracing: Fix possible double free on failure of allocating trace buffer (bnc#1012382).
- tracing: Remove extra zeroing out of the ring buffer page (bnc#1012382).
- tty fix oops when rmmod 8250 (bnc#1012382).
- uas: Always apply US_FL_NO_ATA_1X quirk to Seagate devices (bnc#1012382).
- uas: ignore UAS for Norelsys NS1068(X) chips (bnc#1012382).
- udf: Avoid overflow when session starts at large offset (bnc#1012382).
- um: link vmlinux with -no-pie (bnc#1012382).
- usb: Add device quirk for Logitech HD Pro Webcam C925e (bnc#1012382).
- usb: add RESET_RESUME for ELSA MicroLink 56K (bnc#1012382).
- usb: core: Add type-specific length check of BOS descriptors (bnc#1012382).
- usb: core: prevent malicious bNumInterfaces overflow (bnc#1012382).
- usb: devio: Prevent integer overflow in proc_do_submiturb() (bnc#1012382).
- usb: Fix off by one in type-specific length check of BOS SSP capability (git-fixes).
- usb: fix usbmon BUG trigger (bnc#1012382).
- usb: gadget: configs: plug memory leak (bnc#1012382).
- usb: gadget: ffs: Forbid usb_ep_alloc_request from sleeping (bnc#1012382).
- usb: gadgetfs: Fix a potential memory leak in 'dev_config()' (bnc#1012382).
- usb: gadget: f_uvc: Sanity check wMaxPacketSize for SuperSpeed (bnc#1012382).
- usb: gadget: udc: remove pointer dereference after free (bnc#1012382).
- usb: hub: Cycle HUB power when initialization fails (bnc#1012382).
- usb: Increase usbfs transfer limit (bnc#1012382).
- usbip: Fix implicit fallthrough warning (bnc#1012382).
- usbip: Fix potential format overflow in userspace tools (bnc#1012382).
- usbip: fix stub_rx: get_pipe() to validate endpoint number (bnc#1012382).
- usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input (bnc#1012382).
- usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer (bnc#1012382).
- usbip: fix usbip bind writing random string after command in match_busid (bnc#1012382).
- usbip: prevent leaking socket pointer address in messages (bnc#1012382).
- usbip: prevent vhci_hcd driver from leaking a socket pointer address (bnc#1012382).
- usbip: remove kernel addresses from usb device and urb debug msgs (bnc#1012382).
- usbip: stub: stop printing kernel pointer addresses in messages (bnc#1012382).
- usbip: vhci: stop printing kernel pointer addresses in messages (bnc#1012382).
- usb: misc: usb3503: make sure reset is low for at least 100us (bnc#1012382).
- usb: musb: da8xx: fix babble condition handling (bnc#1012382).
- usb: phy: isp1301: Add OF device ID table (bnc#1012382).
- usb: phy: isp1301: Fix build warning when CONFIG_OF is disabled (git-fixes).
- usb: phy: tahvo: fix error handling in tahvo_usb_probe() (bnc#1012382).
- usb: quirks: Add no-lpm quirk for KY-688 USB 3.1 Type-C Hub (bnc#1012382).
- usb: serial: cp210x: add IDs for LifeScan OneTouch Verio IQ (bnc#1012382).
- usb: serial: cp210x: add new device ID ELV ALC 8xxx (bnc#1012382).
- usb: serial: ftdi_sio: add id for Airbus DS P8GR (bnc#1012382).
- usb: serial: option: adding support for YUGA CLM920-NC5 (bnc#1012382).
- usb: serial: option: add Quectel BG96 id (bnc#1012382).
- usb: serial: option: add support for Telit ME910 PID 0x1101 (bnc#1012382).
- usb: serial: qcserial: add Sierra Wireless EM7565 (bnc#1012382).
- usb: uas and storage: Add US_FL_BROKEN_FUA for another JMicron JMS567 ID (bnc#1012382).
- usb: usbfs: Filter flags passed in from user space (bnc#1012382).
- usb: usbip: Fix possible deadlocks reported by lockdep (bnc#1012382).
- usb: xhci: Add XHCI_TRUST_TX_LENGTH for Renesas uPD720201 (bnc#1012382).
- usb: xhci: fix panic in xhci_free_virt_devices_depth_first (bnc#1012382).
- userfaultfd: selftest: vm: allow to build in vm/ directory (bnc#1012382).
- userfaultfd: shmem: __do_fault requires VM_FAULT_NOPAGE (bnc#1012382).
- video: fbdev: au1200fb: Release some resources if a memory allocation fails (bnc#1012382).
- video: fbdev: au1200fb: Return an error code if a memory allocation fails (bnc#1012382).
- virtio: release virtio index when fail to device_register (bnc#1012382).
- vmxnet3: repair memory leak (bnc#1012382).
- vsyscall: Fix permissions for emulate mode with KAISER/PTI (bnc#1012382).
- vt6655: Fix a possible sleep-in-atomic bug in vt6655_suspend (bnc#1012382).
- vti6: Do not report path MTU below IPV6_MIN_MTU (bnc#1012382).
- vti6: fix device register to report IFLA_INFO_KIND (bnc#1012382).
- workqueue: trigger WARN if queue_delayed_work() is called with NULL @wq (bnc#1012382).
- writeback: fix memory leak in wb_queue_work() (bnc#1012382).
- x.509: fix buffer overflow detection in sprint_oid() (bsc#1075078).
- x509: fix printing uninitialized stack memory when OID is empty (bsc#1075078).
- x.509: reject invalid BIT STRING for subjectPublicKey (bnc#1012382).
- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).
- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).
- x86/alternatives: Add missing '\n' at end of ALTERNATIVE inline asm (bnc#1012382).
- x86/alternatives: Fix optimize_nops() checking (bnc#1012382).
- x86/apic/vector: Fix off by one in error path (bnc#1012382).
- x86/asm/32: Make sync_core() handle missing CPUID on all 32-bit kernels (bnc#1012382).
- x86/boot: Fix early command-line parsing when matching at end (bsc#1068032).
- x86/cpu: Factor out application of forced CPU caps (bnc#1012382).
- x86/cpufeatures: Add X86_BUG_CPU_INSECURE (bnc#1012382).
- x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (bnc#1012382).
- x86/cpufeatures: Make CPU bugs sticky (bnc#1012382).
- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).
- x86/cpu: Merge bugs.c and bugs_64.c (bnc#1012382).
- x86/cpu: Rename Merrifield2 to Moorefield (bsc#985025).
- x86/cpu: Rename 'WESTMERE2' family to 'NEHALEM_G' (bsc#985025).
- x86/cpu, x86/pti: Do not enable PTI on AMD processors (bnc#1012382).
- x86/Documentation: Add PTI description (bnc#1012382).
- x86/efi-bgrt: Replace early_memremap() with memremap() (bnc#1012382).
- x86/efi: Build our own page table structures (fate#320512).
- x86/efi: Hoist page table switching code into efi_call_virt() (fate#320512).
- x86/entry: Use SYSCALL_DEFINE() macros for sys_modify_ldt() (bnc#1012382).
- x86/hpet: Prevent might sleep splat on resume (bnc#1012382).
- x86/kasan: Clear kasan_zero_page after TLB flush (bnc#1012382).
- x86/kasan: Write protect kasan zero shadow (bnc#1012382).
- x86/microcode/intel: Extend BDW late-loading further with LLC size check (bnc#1012382).
- x86/microcode/intel: Extend BDW late-loading with a revision check (bnc#1012382).
- x86/mm/32: Move setup_clear_cpu_cap(X86_FEATURE_PCID) earlier (git-fixes).
- x86/mm: Disable PCID on 32-bit kernels (bnc#1012382).
- x86/mm/pat: Ensure cpa-&gt;pfn only contains page frame numbers (fate#320588).
- x86/PCI: Make broadcom_postcore_init() check acpi_disabled (bnc#1012382).
- x86/pti: Document fix wrong index (bnc#1012382).
- x86/pti/efi: broken conversion from efi to kernel page table (bnc#1012382).
- x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN (bnc#1012382).
- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).
- x86/smpboot: Remove stale TLB flush invocations (bnc#1012382).
- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).
- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).
- x86/tlb: Drop the _GPL from the cpu_tlbstate export (bnc#1012382).
- x86/vm86/32: Switch to flush_tlb_mm_range() in mark_screen_rdonly() (bnc#1012382).
- xen-netfront: avoid crashing on resume after a failure in talk_to_netback() (bnc#1012382).
- xen-netfront: Improve error handling during initialization (bnc#1012382).
- xfrm: Copy policy family in clone_policy (bnc#1012382).
- xfs: add configurable error support to metadata buffers (bsc#1068569).
- xfs: add configuration handlers for specific errors (bsc#1068569).
- xfs: add configuration of error failure speed (bsc#1068569).
- xfs: add 'fail at unmount' error handling configuration (bsc#1068569).
- xfs: Add infrastructure needed for error propagation during buffer IO failure (bsc#1068569).
- xfs: address kabi for xfs buffer retry infrastructure (kabi).
- xfs: configurable error behavior via sysfs (bsc#1068569).
- xfs: fix incorrect extent state in xfs_bmap_add_extent_unwritten_real (bnc#1012382).
- xfs: fix log block underflow during recovery cycle verification (bnc#1012382).
- xfs: fix up inode32/64 (re)mount handling (bsc#1069160).
- xfs: introduce metadata IO error class (bsc#1068569).
- xfs: introduce table-based init for error behaviors (bsc#1068569).
- xfs: Properly retry failed inode items in case of error during buffer writeback (bsc#1068569).
- xfs: remove xfs_trans_ail_delete_bulk (bsc#1068569).
- xhci: Do not add a virt_dev to the devs array before it's fully allocated (bnc#1012382).
- xhci: Fix ring leak in failure path of xhci_alloc_virt_device() (bnc#1012382).
- xhci: plat: Register shutdown for xhci_plat (bnc#1012382).
- zram: set physical queue limits to avoid array out of bounds accesses (bnc#1012382).
- x86/microcode/intel: Fix BDW late-loading revision check (bnc#1012382).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-07"/>
	<updated date="2018-02-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005778">SUSE bug 1005778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005780">SUSE bug 1005780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005781">SUSE bug 1005781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012917">SUSE bug 1012917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015342">SUSE bug 1015342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015343">SUSE bug 1015343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019784">SUSE bug 1019784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022476">SUSE bug 1022476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022595">SUSE bug 1022595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022912">SUSE bug 1022912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024296">SUSE bug 1024296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024376">SUSE bug 1024376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031395">SUSE bug 1031395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031492">SUSE bug 1031492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031717">SUSE bug 1031717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037838">SUSE bug 1037838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038078">SUSE bug 1038078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038085">SUSE bug 1038085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040182">SUSE bug 1040182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043652">SUSE bug 1043652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048325">SUSE bug 1048325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048585">SUSE bug 1048585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053472">SUSE bug 1053472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060279">SUSE bug 1060279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062129">SUSE bug 1062129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066163">SUSE bug 1066163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066223">SUSE bug 1066223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068038">SUSE bug 1068038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068569">SUSE bug 1068569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068984">SUSE bug 1068984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069138">SUSE bug 1069138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069160">SUSE bug 1069160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070052">SUSE bug 1070052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070799">SUSE bug 1070799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072163">SUSE bug 1072163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072484">SUSE bug 1072484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073229">SUSE bug 1073229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073928">SUSE bug 1073928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074134">SUSE bug 1074134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074488">SUSE bug 1074488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074621">SUSE bug 1074621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074709">SUSE bug 1074709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074839">SUSE bug 1074839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074847">SUSE bug 1074847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075066">SUSE bug 1075066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075078">SUSE bug 1075078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075087">SUSE bug 1075087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075091">SUSE bug 1075091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075397">SUSE bug 1075397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075428">SUSE bug 1075428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075617">SUSE bug 1075617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075621">SUSE bug 1075621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075627">SUSE bug 1075627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075811">SUSE bug 1075811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075994">SUSE bug 1075994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076017">SUSE bug 1076017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076110">SUSE bug 1076110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076187">SUSE bug 1076187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076232">SUSE bug 1076232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076805">SUSE bug 1076805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076847">SUSE bug 1076847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076872">SUSE bug 1076872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076899">SUSE bug 1076899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077068">SUSE bug 1077068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077560">SUSE bug 1077560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077592">SUSE bug 1077592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077704">SUSE bug 1077704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077871">SUSE bug 1077871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078002">SUSE bug 1078002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078681">SUSE bug 1078681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963844">SUSE bug 963844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966170">SUSE bug 966170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966172">SUSE bug 966172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973818">SUSE bug 973818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985025">SUSE bug 985025</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-15129/">CVE-2017-15129</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17712/">CVE-2017-17712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17862/">CVE-2017-17862</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17864/">CVE-2017-17864</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18017/">CVE-2017-18017</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004</cve>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5332/">CVE-2018-5332</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5333/">CVE-2018-5333</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520366" comment="kernel-default-4.4.114-94.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520367" comment="kernel-default-devel-4.4.114-94.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520368" comment="kernel-default-extra-4.4.114-94.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520369" comment="kernel-devel-4.4.114-94.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520370" comment="kernel-macros-4.4.114-94.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520371" comment="kernel-source-4.4.114-94.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520372" comment="kernel-syms-4.4.114-94.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78423" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1077993" ref_url="https://bugzilla.suse.com/1077993" source="BUGZILLA"/>
		<reference ref_id="1078806" ref_url="https://bugzilla.suse.com/1078806" source="BUGZILLA"/>
		<reference ref_id="1078813" ref_url="https://bugzilla.suse.com/1078813" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5131" ref_url="https://www.suse.com/security/cve/CVE-2016-5131/" source="CVE"/>
		<reference ref_id="CVE-2017-15412" ref_url="https://www.suse.com/security/cve/CVE-2017-15412/" source="CVE"/>
		<reference ref_id="CVE-2017-5130" ref_url="https://www.suse.com/security/cve/CVE-2017-5130/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003716.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes one issue.

This security issue was fixed:

- CVE-2017-15412: Prevent use after free when calling XPath extension functions
  that allowed remote attackers to cause DoS or potentially RCE (bsc#1077993)
- CVE-2016-5131: Use-after-free vulnerability in libxml2 allowed
  remote attackers to cause a denial of service or possibly have
  unspecified other impact via vectors related to the XPointer range-to
  function. (bsc#1078813)
- CVE-2017-5130: Fixed a potential remote buffer overflow in function
  xmlMemoryStrdup() (bsc#1078806)

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-08"/>
	<updated date="2018-02-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077993">SUSE bug 1077993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078806">SUSE bug 1078806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078813">SUSE bug 1078813</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5131/">CVE-2016-5131</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15412/">CVE-2017-15412</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5130/">CVE-2017-5130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518877" comment="libxml2-2-2.9.4-46.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518878" comment="libxml2-2-32bit-2.9.4-46.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518879" comment="libxml2-tools-2.9.4-46.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518880" comment="python-libxml2-2.9.4-46.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78424" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1112209" ref_url="https://bugzilla.suse.com/1112209" source="BUGZILLA"/>
		<reference ref_id="1113534" ref_url="https://bugzilla.suse.com/1113534" source="BUGZILLA"/>
		<reference ref_id="1113652" ref_url="https://bugzilla.suse.com/1113652" source="BUGZILLA"/>
		<reference ref_id="1113742" ref_url="https://bugzilla.suse.com/1113742" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004875.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed:

- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).
- Add missing timing side channel patch for DSA signature generation (bsc#1113742).

Non-security issues fixed:

- Fixed infinite loop in DSA generation with incorrect parameters (bsc#1112209).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-22"/>
	<updated date="2018-11-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1112209">SUSE bug 1112209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113742">SUSE bug 1113742</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520373" comment="libopenssl-devel-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520374" comment="libopenssl1_0_0-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520375" comment="libopenssl1_0_0-32bit-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520376" comment="openssl-1.0.2j-60.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78425" version="1" class="patch">
	<metadata>
		<title>Security update for rpm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="943457" ref_url="https://bugzilla.suse.com/943457" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7500" ref_url="https://www.suse.com/security/cve/CVE-2017-7500/" source="CVE"/>
		<reference ref_id="CVE-2017-7501" ref_url="https://www.suse.com/security/cve/CVE-2017-7501/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004885.html" source="SUSE-SU"/>
		<description>
This update for rpm fixes the following issues:

These security issues were fixed:

- CVE-2017-7500: rpm did not properly handle RPM installations when a
  destination path was a symbolic link to a directory, possibly changing
  ownership and permissions of an arbitrary directory, and RPM files being placed
  in an arbitrary destination (bsc#943457).
- CVE-2017-7501: rpm used temporary files with predictable names when
  installing an RPM. An attacker with ability to write in a directory where files
  will be installed could create symbolic links to an arbitrary location and
  modify content, and possibly permissions to arbitrary files, which could be
  used for denial of service or possibly privilege escalation (bsc#943457)

This is a reissue of the above security fixes for SUSE Linux Enterprise 12 GA, SP1 and SP2 LTSS,
they have already been released for SUSE Linux Enterprise Server 12 SP3.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-23"/>
	<updated date="2018-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/943457">SUSE bug 943457</bugzilla>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7500/">CVE-2017-7500</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7501/">CVE-2017-7501</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520377" comment="rpm-4.11.2-16.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520378" comment="rpm-32bit-4.11.2-16.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520379" comment="rpm-build-4.11.2-16.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520380" comment="rpm-python-4.11.2-16.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78426" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1032138" ref_url="https://bugzilla.suse.com/1032138" source="BUGZILLA"/>
		<reference ref_id="1032230" ref_url="https://bugzilla.suse.com/1032230" source="BUGZILLA"/>
		<reference ref_id="1040643" ref_url="https://bugzilla.suse.com/1040643" source="BUGZILLA"/>
		<reference ref_id="1050879" ref_url="https://bugzilla.suse.com/1050879" source="BUGZILLA"/>
		<reference ref_id="1050887" ref_url="https://bugzilla.suse.com/1050887" source="BUGZILLA"/>
		<reference ref_id="1050888" ref_url="https://bugzilla.suse.com/1050888" source="BUGZILLA"/>
		<reference ref_id="1050889" ref_url="https://bugzilla.suse.com/1050889" source="BUGZILLA"/>
		<reference ref_id="1050891" ref_url="https://bugzilla.suse.com/1050891" source="BUGZILLA"/>
		<reference ref_id="1051184" ref_url="https://bugzilla.suse.com/1051184" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10219" ref_url="https://www.suse.com/security/cve/CVE-2016-10219/" source="CVE"/>
		<reference ref_id="CVE-2016-10317" ref_url="https://www.suse.com/security/cve/CVE-2016-10317/" source="CVE"/>
		<reference ref_id="CVE-2017-11714" ref_url="https://www.suse.com/security/cve/CVE-2017-11714/" source="CVE"/>
		<reference ref_id="CVE-2017-9216" ref_url="https://www.suse.com/security/cve/CVE-2017-9216/" source="CVE"/>
		<reference ref_id="CVE-2017-9612" ref_url="https://www.suse.com/security/cve/CVE-2017-9612/" source="CVE"/>
		<reference ref_id="CVE-2017-9726" ref_url="https://www.suse.com/security/cve/CVE-2017-9726/" source="CVE"/>
		<reference ref_id="CVE-2017-9727" ref_url="https://www.suse.com/security/cve/CVE-2017-9727/" source="CVE"/>
		<reference ref_id="CVE-2017-9739" ref_url="https://www.suse.com/security/cve/CVE-2017-9739/" source="CVE"/>
		<reference ref_id="CVE-2017-9835" ref_url="https://www.suse.com/security/cve/CVE-2017-9835/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003717.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes several issues.



These security issues were fixed: 

- CVE-2017-9835: The gs_alloc_ref_array function allowed remote attackers to
  cause a denial of service (heap-based buffer overflow and application crash) or
  possibly have unspecified other impact via a crafted PostScript document
  (bsc#1050879).
- CVE-2017-9216: Prevent NULL pointer dereference in the jbig2_huffman_get
  function in jbig2_huffman.c which allowed for DoS (bsc#1040643).
- CVE-2016-10317: The fill_threshhold_buffer function in base/gxht_thresh.c
  allowed remote attackers to cause a denial of service (heap-based buffer
  overflow and application crash) or possibly have unspecified other impact via a
  crafted PostScript document (bsc#1032230).
- CVE-2017-9612: The Ins_IP function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (use-after-free and application crash)
  or possibly have unspecified other impact via a crafted document (bsc#1050891).
- CVE-2017-9726: The Ins_MDRP function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050889).
- CVE-2017-9727: The gx_ttfReader__Read function in base/gxttfb.c allowed
  remote attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050888).
- CVE-2017-9739: The Ins_JMPR function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050887).
- CVE-2017-11714: psi/ztoken.c mishandled references to the scanner state
  structure, which allowed remote attackers to cause a denial of service
  (application crash) or possibly have unspecified other impact via a crafted
  PostScript document, related to an out-of-bounds read in the
  igc_reloc_struct_ptr function in psi/igc.c (bsc#1051184).
- CVE-2016-10219: The intersect function in base/gxfill.c allowed remote
  attackers to cause a denial of service (divide-by-zero error and application
  crash) via a crafted file (bsc#1032138).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-09"/>
	<updated date="2018-02-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1032138">SUSE bug 1032138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032230">SUSE bug 1032230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040643">SUSE bug 1040643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050879">SUSE bug 1050879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050887">SUSE bug 1050887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050888">SUSE bug 1050888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050889">SUSE bug 1050889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050891">SUSE bug 1050891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051184">SUSE bug 1051184</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10219/">CVE-2016-10219</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10317/">CVE-2016-10317</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11714/">CVE-2017-11714</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9216/">CVE-2017-9216</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9612/">CVE-2017-9612</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9726/">CVE-2017-9726</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9727/">CVE-2017-9727</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9739/">CVE-2017-9739</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9835/">CVE-2017-9835</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518881" comment="ghostscript-9.15-23.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518882" comment="ghostscript-x11-9.15-23.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78427" version="1" class="patch">
	<metadata>
		<title>Security update for exiv2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1050257" ref_url="https://bugzilla.suse.com/1050257" source="BUGZILLA"/>
		<reference ref_id="1051188" ref_url="https://bugzilla.suse.com/1051188" source="BUGZILLA"/>
		<reference ref_id="1060995" ref_url="https://bugzilla.suse.com/1060995" source="BUGZILLA"/>
		<reference ref_id="1060996" ref_url="https://bugzilla.suse.com/1060996" source="BUGZILLA"/>
		<reference ref_id="1061000" ref_url="https://bugzilla.suse.com/1061000" source="BUGZILLA"/>
		<reference ref_id="1072928" ref_url="https://bugzilla.suse.com/1072928" source="BUGZILLA"/>
		<reference ref_id="1092952" ref_url="https://bugzilla.suse.com/1092952" source="BUGZILLA"/>
		<reference ref_id="1093095" ref_url="https://bugzilla.suse.com/1093095" source="BUGZILLA"/>
		<reference ref_id="1095070" ref_url="https://bugzilla.suse.com/1095070" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11591" ref_url="https://www.suse.com/security/cve/CVE-2017-11591/" source="CVE"/>
		<reference ref_id="CVE-2017-11683" ref_url="https://www.suse.com/security/cve/CVE-2017-11683/" source="CVE"/>
		<reference ref_id="CVE-2017-14859" ref_url="https://www.suse.com/security/cve/CVE-2017-14859/" source="CVE"/>
		<reference ref_id="CVE-2017-14862" ref_url="https://www.suse.com/security/cve/CVE-2017-14862/" source="CVE"/>
		<reference ref_id="CVE-2017-14864" ref_url="https://www.suse.com/security/cve/CVE-2017-14864/" source="CVE"/>
		<reference ref_id="CVE-2017-17669" ref_url="https://www.suse.com/security/cve/CVE-2017-17669/" source="CVE"/>
		<reference ref_id="CVE-2018-10958" ref_url="https://www.suse.com/security/cve/CVE-2018-10958/" source="CVE"/>
		<reference ref_id="CVE-2018-10998" ref_url="https://www.suse.com/security/cve/CVE-2018-10998/" source="CVE"/>
		<reference ref_id="CVE-2018-11531" ref_url="https://www.suse.com/security/cve/CVE-2018-11531/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004884.html" source="SUSE-SU"/>
		<description>
This update for exiv2 fixes the following issues:

- CVE-2017-11591: A floating point exception in the Exiv2::ValueType function could lead to a remote denial of service attack via crafted input. (bsc#1050257)
- CVE-2017-14864: An invalid memory address dereference was discovered in Exiv2::getULong in types.cpp. The vulnerability caused a segmentation fault and application crash, which lead to denial of service. (bsc#1060995)
- CVE-2017-14862: An invalid memory address dereference was discovered in Exiv2::DataValue::read in value.cpp. The vulnerability caused a segmentation fault and application crash, which lead to denial of service. (bsc#1060996)
- CVE-2017-14859: An invalid memory address dereference was discovered in Exiv2::StringValueBase::read in value.cpp. The vulnerability caused a segmentation fault and application crash, which lead to denial of service. (bsc#1061000)
- CVE-2017-11683: There is a reachable assertion in the Internal::TiffReader::visitDirectory function in tiffvisitor.cpp that could lead to a remote denial of service attack via crafted input. (bsc#1051188)
- CVE-2017-17669: There is a heap-based buffer over-read in the Exiv2::Internal::PngChunk::keyTXTChunk function of pngchunk_int.cpp. A crafted PNG file would lead to a remote denial of service attack. (bsc#1072928)
- CVE-2018-10958: In types.cpp a large size value might have lead to a SIGABRT during an attempt at memory allocation for an Exiv2::Internal::PngChunk::zlibUncompress call. (bsc#1092952)
- CVE-2018-10998: readMetadata in jp2image.cpp allowed remote attackers to cause a denial of service (SIGABRT) by triggering an incorrect Safe::add call. (bsc#1093095)
- CVE-2018-11531: Exiv2 had a heap-based buffer overflow in getData in preview.cpp. (bsc#1095070)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-23"/>
	<updated date="2018-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050257">SUSE bug 1050257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051188">SUSE bug 1051188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060995">SUSE bug 1060995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060996">SUSE bug 1060996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061000">SUSE bug 1061000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072928">SUSE bug 1072928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092952">SUSE bug 1092952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093095">SUSE bug 1093095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095070">SUSE bug 1095070</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11591/">CVE-2017-11591</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11683/">CVE-2017-11683</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14859/">CVE-2017-14859</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14862/">CVE-2017-14862</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14864/">CVE-2017-14864</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17669/">CVE-2017-17669</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10958/">CVE-2018-10958</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-10998/">CVE-2018-10998</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11531/">CVE-2018-11531</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520381" comment="libexiv2-12-0.23-12.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78428" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1099257" ref_url="https://bugzilla.suse.com/1099257" source="BUGZILLA"/>
		<reference ref_id="1113094" ref_url="https://bugzilla.suse.com/1113094" source="BUGZILLA"/>
		<reference ref_id="1113672" ref_url="https://bugzilla.suse.com/1113672" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12900" ref_url="https://www.suse.com/security/cve/CVE-2018-12900/" source="CVE"/>
		<reference ref_id="CVE-2018-18557" ref_url="https://www.suse.com/security/cve/CVE-2018-18557/" source="CVE"/>
		<reference ref_id="CVE-2018-18661" ref_url="https://www.suse.com/security/cve/CVE-2018-18661/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004890.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

Security issues fixed:

- CVE-2018-12900: Fixed heap-based buffer overflow in the cpSeparateBufToContigBuf (bsc#1099257).                                                                                             
- CVE-2018-18661: Fixed NULL pointer dereference in the function LZWDecode in the file tif_lzw.c (bsc#1113672).                                                                               
- CVE-2018-18557: Fixed JBIG decode can lead to out-of-bounds write (bsc#1113094).

Non-security issues fixed:

- asan_build: build ASAN included
- debug_build: build more suitable for debugging
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-26"/>
	<updated date="2018-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1099257">SUSE bug 1099257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113094">SUSE bug 1113094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113672">SUSE bug 1113672</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12900/">CVE-2018-12900</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18557/">CVE-2018-18557</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18661/">CVE-2018-18661</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520382" comment="libtiff5-4.0.9-44.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520383" comment="libtiff5-32bit-4.0.9-44.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78429" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1091396" ref_url="https://bugzilla.suse.com/1091396" source="BUGZILLA"/>
		<reference ref_id="1105010" ref_url="https://bugzilla.suse.com/1105010" source="BUGZILLA"/>
		<reference ref_id="964336" ref_url="https://bugzilla.suse.com/964336" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15473" ref_url="https://www.suse.com/security/cve/CVE-2018-15473/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004888.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Following security issues have been fixed:

- CVE-2018-15473: OpenSSH was prone to a user existance oracle vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. (bsc#1105010)

The following non-security issues were fixed:

- Stop leaking File descriptors (bsc#964336)
- sftp-client.c returns wrong error code upon failure [bsc#1091396]

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-26"/>
	<updated date="2018-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091396">SUSE bug 1091396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105010">SUSE bug 1105010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964336">SUSE bug 964336</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15473/">CVE-2018-15473</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520384" comment="openssh-7.2p2-74.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520385" comment="openssh-askpass-gnome-7.2p2-74.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520386" comment="openssh-helpers-7.2p2-74.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78430" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1115929" ref_url="https://bugzilla.suse.com/1115929" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19211" ref_url="https://www.suse.com/security/cve/CVE-2018-19211/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3967-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183967-1.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issue:

Security issue fixed:

- CVE-2018-19211: Fixed denial of service issue that was triggered by a NULL pointer dereference at function _nc_parse_entry (bsc#1115929).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-03"/>
	<updated date="2018-12-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1115929">SUSE bug 1115929</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19211/">CVE-2018-19211</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520387" comment="libncurses5-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520388" comment="libncurses5-32bit-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520389" comment="libncurses6-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520390" comment="libncurses6-32bit-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520391" comment="ncurses-devel-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520392" comment="ncurses-utils-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520393" comment="tack-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520394" comment="terminfo-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520395" comment="terminfo-base-5.9-61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78431" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1028103" ref_url="https://bugzilla.suse.com/1028103" source="BUGZILLA"/>
		<reference ref_id="1035807" ref_url="https://bugzilla.suse.com/1035807" source="BUGZILLA"/>
		<reference ref_id="1036457" ref_url="https://bugzilla.suse.com/1036457" source="BUGZILLA"/>
		<reference ref_id="1079600" ref_url="https://bugzilla.suse.com/1079600" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10244" ref_url="https://www.suse.com/security/cve/CVE-2016-10244/" source="CVE"/>
		<reference ref_id="CVE-2017-7864" ref_url="https://www.suse.com/security/cve/CVE-2017-7864/" source="CVE"/>
		<reference ref_id="CVE-2017-8105" ref_url="https://www.suse.com/security/cve/CVE-2017-8105/" source="CVE"/>
		<reference ref_id="CVE-2017-8287" ref_url="https://www.suse.com/security/cve/CVE-2017-8287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0414-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00014.html" source="SUSE-SU"/>
		<description>

  
This update for freetype2 fixes the following security issues:

- CVE-2016-10244: Make sure that the parse_charstrings function in
  type1/t1load.c does ensure that a font contains a glyph name to prevent a DoS
  through a heap-based buffer over-read or possibly have unspecified other
  impact via a crafted file (bsc#1028103)
- CVE-2017-8105: Fix an out-of-bounds write caused by a heap-based
  buffer overflow related to the t1_decoder_parse_charstrings function in
  psaux/t1decode.ca (bsc#1035807)
- CVE-2017-8287: an out-of-bounds write caused by a heap-based buffer
  overflow related to the t1_builder_close_contour function in psaux/psobjs.c
  (bsc#1036457)
- Fix several integer overflow issues in truetype/ttinterp.c (bsc#1079600)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-09"/>
	<updated date="2018-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1028103">SUSE bug 1028103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035807">SUSE bug 1035807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036457">SUSE bug 1036457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079600">SUSE bug 1079600</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10244/">CVE-2016-10244</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7864/">CVE-2017-7864</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8105/">CVE-2017-8105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8287/">CVE-2017-8287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518890" comment="ft2demos-2.6.3-7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518891" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518892" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78432" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1057246" ref_url="https://bugzilla.suse.com/1057246" source="BUGZILLA"/>
		<reference ref_id="1113064" ref_url="https://bugzilla.suse.com/1113064" source="BUGZILLA"/>
		<reference ref_id="1117463" ref_url="https://bugzilla.suse.com/1117463" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18544" ref_url="https://www.suse.com/security/cve/CVE-2018-18544/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004938.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2018-18544: Fixed memory leak in the function WriteMSLImage (bsc#1113064).


Non-security issues fixed:

- Improve import documentation (bsc#1057246).
- Allow override system security policy (bsc#1117463).
- asan_build: build ASAN included
- debug_build: build more suitable for debugging
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-07"/>
	<updated date="2018-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1057246">SUSE bug 1057246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113064">SUSE bug 1113064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18544/">CVE-2018-18544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520396" comment="ImageMagick-6.8.8.1-71.93.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520397" comment="libMagick++-6_Q16-3-6.8.8.1-71.93.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520398" comment="libMagickCore-6_Q16-1-6.8.8.1-71.93.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520399" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.93.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520400" comment="libMagickWand-6_Q16-1-6.8.8.1-71.93.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78433" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography, python-pyOpenSSL (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1021578" ref_url="https://bugzilla.suse.com/1021578" source="BUGZILLA"/>
		<reference ref_id="1111634" ref_url="https://bugzilla.suse.com/1111634" source="BUGZILLA"/>
		<reference ref_id="1111635" ref_url="https://bugzilla.suse.com/1111635" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000807" ref_url="https://www.suse.com/security/cve/CVE-2018-1000807/" source="CVE"/>
		<reference ref_id="CVE-2018-1000808" ref_url="https://www.suse.com/security/cve/CVE-2018-1000808/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004944.html" source="SUSE-SU"/>
		<description>

This update for python-cryptography, python-pyOpenSSL fixes the following issues:

Security issues fixed:

- CVE-2018-1000808: A memory leak due to missing reference checking in PKCS#12 store handling was fixed (bsc#1111634)
- CVE-2018-1000807: A use-after-free in X509 object handling was fixed (bsc#1111635)

- avoid bad interaction with python-cryptography package. (bsc#1021578)

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-10"/>
	<updated date="2018-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1021578">SUSE bug 1021578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111634">SUSE bug 1111634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111635">SUSE bug 1111635</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000807/">CVE-2018-1000807</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000808/">CVE-2018-1000808</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520401" comment="python-cryptography-1.3.1-7.13.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520402" comment="python-pyOpenSSL-16.0.0-4.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520403" comment="python-setuptools-18.0.1-4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520404" comment="python3-setuptools-18.0.1-4.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78434" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl098 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1104789" ref_url="https://bugzilla.suse.com/1104789" source="BUGZILLA"/>
		<reference ref_id="1110018" ref_url="https://bugzilla.suse.com/1110018" source="BUGZILLA"/>
		<reference ref_id="1113534" ref_url="https://bugzilla.suse.com/1113534" source="BUGZILLA"/>
		<reference ref_id="1113652" ref_url="https://bugzilla.suse.com/1113652" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004950.html" source="SUSE-SU"/>
		<description>
This update for compat-openssl098 fixes the following issues:

Security issues fixed:

- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).
- CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018).
- Fixed the 'One and Done' side-channel attack on RSA (bsc#1104789).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-11"/>
	<updated date="2018-12-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104789">SUSE bug 1104789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110018">SUSE bug 1110018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520405" comment="libopenssl0_9_8-0.9.8j-106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520406" comment="libopenssl0_9_8-32bit-0.9.8j-106.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78435" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1108940" ref_url="https://bugzilla.suse.com/1108940" source="BUGZILLA"/>
		<reference ref_id="1114405" ref_url="https://bugzilla.suse.com/1114405" source="BUGZILLA"/>
		<reference ref_id="1114423" ref_url="https://bugzilla.suse.com/1114423" source="BUGZILLA"/>
		<reference ref_id="1115040" ref_url="https://bugzilla.suse.com/1115040" source="BUGZILLA"/>
		<reference ref_id="1115045" ref_url="https://bugzilla.suse.com/1115045" source="BUGZILLA"/>
		<reference ref_id="1115047" ref_url="https://bugzilla.suse.com/1115047" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="CVE-2018-18883" ref_url="https://www.suse.com/security/cve/CVE-2018-18883/" source="CVE"/>
		<reference ref_id="CVE-2018-19961" ref_url="https://www.suse.com/security/cve/CVE-2018-19961/" source="CVE"/>
		<reference ref_id="CVE-2018-19962" ref_url="https://www.suse.com/security/cve/CVE-2018-19962/" source="CVE"/>
		<reference ref_id="CVE-2018-19965" ref_url="https://www.suse.com/security/cve/CVE-2018-19965/" source="CVE"/>
		<reference ref_id="CVE-2018-19966" ref_url="https://www.suse.com/security/cve/CVE-2018-19966/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004952.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed:

- CVE-2018-18849: Fixed an out of bounds memory access issue was found in the LSI53C895A SCSI Host Bus Adapter emulation while writing a message in lsi_do_msgin (bsc#1114423).
- CVE-2018-18883: Fixed a NULL pointer dereference that could have been triggered by nested VT-x that where not properly restricted (XSA-278)(bsc#1114405).
- CVE-2018-19965: Fixed denial of service issue from attempting to use INVPCID with a non-canonical addresses (XSA-279)(bsc#1115045).
- CVE-2018-19966: Fixed issue introduced by XSA-240 that could have caused conflicts with shadow paging (XSA-280)(bsc#1115047).
- CVE-2018-19961 CVE-2018-19962: Fixed insufficient TLB flushing / improper large page mappings with AMD IOMMUs (XSA-275)(bsc#1115040).

Non-security issues fixed:

- Added upstream bug fixes (bsc#1027519).
- Fixed XEN SLE12-SP1 domU hang on SLE12-SP3 HV (bsc#1108940).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-11"/>
	<updated date="2018-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108940">SUSE bug 1108940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114405">SUSE bug 1114405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114423">SUSE bug 1114423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115040">SUSE bug 1115040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115045">SUSE bug 1115045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115047">SUSE bug 1115047</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18883/">CVE-2018-18883</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19961/">CVE-2018-19961</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19962/">CVE-2018-19962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19965/">CVE-2018-19965</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19966/">CVE-2018-19966</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520407" comment="xen-4.9.3_03-3.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520408" comment="xen-libs-4.9.3_03-3.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520409" comment="xen-libs-32bit-4.9.3_03-3.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78436" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1109105" ref_url="https://bugzilla.suse.com/1109105" source="BUGZILLA"/>
		<reference ref_id="1111479" ref_url="https://bugzilla.suse.com/1111479" source="BUGZILLA"/>
		<reference ref_id="1111480" ref_url="https://bugzilla.suse.com/1111480" source="BUGZILLA"/>
		<reference ref_id="1112229" ref_url="https://bugzilla.suse.com/1112229" source="BUGZILLA"/>
		<reference ref_id="1117022" ref_url="https://bugzilla.suse.com/1117022" source="BUGZILLA"/>
		<reference ref_id="1117274" ref_url="https://bugzilla.suse.com/1117274" source="BUGZILLA"/>
		<reference ref_id="1117313" ref_url="https://bugzilla.suse.com/1117313" source="BUGZILLA"/>
		<reference ref_id="1117327" ref_url="https://bugzilla.suse.com/1117327" source="BUGZILLA"/>
		<reference ref_id="1117331" ref_url="https://bugzilla.suse.com/1117331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17183" ref_url="https://www.suse.com/security/cve/CVE-2018-17183/" source="CVE"/>
		<reference ref_id="CVE-2018-17961" ref_url="https://www.suse.com/security/cve/CVE-2018-17961/" source="CVE"/>
		<reference ref_id="CVE-2018-18073" ref_url="https://www.suse.com/security/cve/CVE-2018-18073/" source="CVE"/>
		<reference ref_id="CVE-2018-18284" ref_url="https://www.suse.com/security/cve/CVE-2018-18284/" source="CVE"/>
		<reference ref_id="CVE-2018-19409" ref_url="https://www.suse.com/security/cve/CVE-2018-19409/" source="CVE"/>
		<reference ref_id="CVE-2018-19475" ref_url="https://www.suse.com/security/cve/CVE-2018-19475/" source="CVE"/>
		<reference ref_id="CVE-2018-19476" ref_url="https://www.suse.com/security/cve/CVE-2018-19476/" source="CVE"/>
		<reference ref_id="CVE-2018-19477" ref_url="https://www.suse.com/security/cve/CVE-2018-19477/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004959.html" source="SUSE-SU"/>
		<description>
This update for ghostscript to version 9.26 fixes the following issues:

Security issues fixed:

- CVE-2018-19475: Fixed bypass of an intended access restriction in psi/zdevice2.c (bsc#1117327)
- CVE-2018-19476: Fixed bypass of an intended access restriction in psi/zicc.c (bsc#1117313)
- CVE-2018-19477: Fixed bypass of an intended access restriction in psi/zfjbig2.c (bsc#1117274)
- CVE-2018-19409: Check if another device is used correctly in LockSafetyParams (bsc#1117022)
- CVE-2018-18284: Fixed potential sandbox escape through 1Policy operator (bsc#1112229)
- CVE-2018-18073: Fixed leaks through operator in saved execution stacks (bsc#1111480)
- CVE-2018-17961: Fixed a -dSAFER sandbox escape by bypassing executeonly (bsc#1111479)
- CVE-2018-17183: Fixed a potential code injection by specially crafted PostScript files (bsc#1109105)

Version update to 9.26 (bsc#1117331):

- Security issues have been the primary focus
- Minor bug fixes and improvements
- For release summary see: http://www.ghostscript.com/doc/9.26/News.htm
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-12"/>
	<updated date="2018-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117274">SUSE bug 1117274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117313">SUSE bug 1117313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117327">SUSE bug 1117327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117331">SUSE bug 1117331</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17183/">CVE-2018-17183</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-17961/">CVE-2018-17961</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18073/">CVE-2018-18073</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-18284/">CVE-2018-18284</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19409/">CVE-2018-19409</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19475/">CVE-2018-19475</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19476/">CVE-2018-19476</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19477/">CVE-2018-19477</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520410" comment="ghostscript-9.26-23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520411" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520412" comment="libspectre1-0.2.7-12.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78437" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1115750" ref_url="https://bugzilla.suse.com/1115750" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-4700" ref_url="https://www.suse.com/security/cve/CVE-2018-4700/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004958.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

Security issue fixed:

- CVE-2018-4700: Fixed extremely predictable cookie generation that is effectively breaking the CSRF protection of the CUPS web interface (bsc#1115750).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-12"/>
	<updated date="2018-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1115750">SUSE bug 1115750</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4700/">CVE-2018-4700</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520413" comment="cups-1.7.5-20.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520414" comment="cups-client-1.7.5-20.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520415" comment="cups-libs-1.7.5-20.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520416" comment="cups-libs-32bit-1.7.5-20.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78438" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1100408" ref_url="https://bugzilla.suse.com/1100408" source="BUGZILLA"/>
		<reference ref_id="1106222" ref_url="https://bugzilla.suse.com/1106222" source="BUGZILLA"/>
		<reference ref_id="1110910" ref_url="https://bugzilla.suse.com/1110910" source="BUGZILLA"/>
		<reference ref_id="1111006" ref_url="https://bugzilla.suse.com/1111006" source="BUGZILLA"/>
		<reference ref_id="1111010" ref_url="https://bugzilla.suse.com/1111010" source="BUGZILLA"/>
		<reference ref_id="1111013" ref_url="https://bugzilla.suse.com/1111013" source="BUGZILLA"/>
		<reference ref_id="1114422" ref_url="https://bugzilla.suse.com/1114422" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10839" ref_url="https://www.suse.com/security/cve/CVE-2018-10839/" source="CVE"/>
		<reference ref_id="CVE-2018-15746" ref_url="https://www.suse.com/security/cve/CVE-2018-15746/" source="CVE"/>
		<reference ref_id="CVE-2018-17958" ref_url="https://www.suse.com/security/cve/CVE-2018-17958/" source="CVE"/>
		<reference ref_id="CVE-2018-17962" ref_url="https://www.suse.com/security/cve/CVE-2018-17962/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004966.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2018-10839: Fixed NE2000 NIC emulation support that is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS (bsc#1110910).
- CVE-2018-15746: Fixed qemu-seccomp.c that might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy for threads other than the main thread (bsc#1106222).
- CVE-2018-17958: Fixed a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c because an incorrect integer data type is used (bsc#1111006).
- CVE-2018-17962: Fixed a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used (bsc#1111010).
- CVE-2018-17963: Fixed qemu_deliver_packet_iov in net/net.c that accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact. (bsc#1111013)
- CVE-2018-18849: Fixed an out of bounds memory access issue that was found in the LSI53C895A SCSI Host Bus Adapter emulation while writing a message in lsi_do_msgin. It could occur during migration if the 'msg_len' field has an invalid value. A user/process could use this flaw to crash the Qemu process resulting in DoS (bsc#1114422).

Non-security issues fixed:

- Improving disk performance for qemu on xen (bsc#1100408)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100408">SUSE bug 1100408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106222">SUSE bug 1106222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110910">SUSE bug 1110910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111006">SUSE bug 1111006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111010">SUSE bug 1111010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111013">SUSE bug 1111013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114422">SUSE bug 1114422</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10839/">CVE-2018-10839</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15746/">CVE-2018-15746</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17958/">CVE-2018-17958</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17962/">CVE-2018-17962</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520417" comment="qemu-2.9.1-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520418" comment="qemu-block-curl-2.9.1-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520419" comment="qemu-ipxe-1.0.0+-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520420" comment="qemu-kvm-2.9.1-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520421" comment="qemu-seabios-1.10.2-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520422" comment="qemu-sgabios-8-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520423" comment="qemu-tools-2.9.1-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520424" comment="qemu-vgabios-1.10.2-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520425" comment="qemu-x86-2.9.1-6.22.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78439" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1117267" ref_url="https://bugzilla.suse.com/1117267" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19519" ref_url="https://www.suse.com/security/cve/CVE-2018-19519/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004969.html" source="SUSE-SU"/>
		<description>
This update for tcpdump fixes the following issues:

Security issues fixed:

- CVE-2018-19519: Fixed a stack-based buffer over-read in the print_prefix function (bsc#1117267)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-17"/>
	<updated date="2018-12-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117267">SUSE bug 1117267</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19519/">CVE-2018-19519</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520426" comment="tcpdump-4.9.2-14.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78440" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1073313" ref_url="https://bugzilla.suse.com/1073313" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17740" ref_url="https://www.suse.com/security/cve/CVE-2017-17740/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004970.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

Security issue fixed:

- CVE-2017-17740: When both the nops module and the memberof overlay
  are enabled, attempts to free a buffer that was allocated on the stack,
  which allows remote attackers to cause a denial of service (slapd crash)
  via a member MODDN operation.  (bsc#1073313)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-17"/>
	<updated date="2018-12-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1073313">SUSE bug 1073313</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17740/">CVE-2017-17740</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520427" comment="libldap-2_4-2-2.4.41-18.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520428" comment="libldap-2_4-2-32bit-2.4.41-18.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520429" comment="openldap2-client-2.4.41-18.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78441" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1118595" ref_url="https://bugzilla.suse.com/1118595" source="BUGZILLA"/>
		<reference ref_id="1118596" ref_url="https://bugzilla.suse.com/1118596" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15518" ref_url="https://www.suse.com/security/cve/CVE-2018-15518/" source="CVE"/>
		<reference ref_id="CVE-2018-19873" ref_url="https://www.suse.com/security/cve/CVE-2018-19873/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004976.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

Security issues fixed:

- CVE-2018-15518: Fixed double free in QXmlStreamReader (bsc#1118595)
- CVE-2018-19873: Fixed Denial of Service on malformed BMP file in QBmpHandler (bsc#1118596)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-18"/>
	<updated date="2018-12-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118595">SUSE bug 1118595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118596">SUSE bug 1118596</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15518/">CVE-2018-15518</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19873/">CVE-2018-19873</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520430" comment="libQt5Concurrent5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520431" comment="libQt5Core5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520432" comment="libQt5DBus5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520433" comment="libQt5Gui5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520434" comment="libQt5Network5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520435" comment="libQt5OpenGL5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520436" comment="libQt5PrintSupport5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520437" comment="libQt5Sql5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520438" comment="libQt5Sql5-mysql-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520439" comment="libQt5Sql5-postgresql-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520440" comment="libQt5Sql5-sqlite-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520441" comment="libQt5Sql5-unixODBC-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520442" comment="libQt5Test5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520443" comment="libQt5Widgets5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520444" comment="libQt5Xml5-5.6.2-6.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78442" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1013721" ref_url="https://bugzilla.suse.com/1013721" source="BUGZILLA"/>
		<reference ref_id="1013732" ref_url="https://bugzilla.suse.com/1013732" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9800" ref_url="https://www.suse.com/security/cve/CVE-2016-9800/" source="CVE"/>
		<reference ref_id="CVE-2016-9801" ref_url="https://www.suse.com/security/cve/CVE-2016-9801/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004981.html" source="SUSE-SU"/>
		<description>
This update for bluez fixes the following issues:

Security issues fixed:

- CVE-2016-9800: Fixed a buffer overflow in the pin_code_reply_dump function (bsc#1013721)
- CVE-2016-9801: Fixed a buffer overflow in the set_ext_ctrl function (bsc#1013732)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-19"/>
	<updated date="2018-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013721">SUSE bug 1013721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013732">SUSE bug 1013732</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9800/">CVE-2016-9800</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9801/">CVE-2016-9801</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520445" comment="bluez-5.13-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520446" comment="bluez-cups-5.13-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520447" comment="libbluetooth3-5.13-5.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78443" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1017693" ref_url="https://bugzilla.suse.com/1017693" source="BUGZILLA"/>
		<reference ref_id="1054594" ref_url="https://bugzilla.suse.com/1054594" source="BUGZILLA"/>
		<reference ref_id="1115717" ref_url="https://bugzilla.suse.com/1115717" source="BUGZILLA"/>
		<reference ref_id="990460" ref_url="https://bugzilla.suse.com/990460" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10092" ref_url="https://www.suse.com/security/cve/CVE-2016-10092/" source="CVE"/>
		<reference ref_id="CVE-2016-10093" ref_url="https://www.suse.com/security/cve/CVE-2016-10093/" source="CVE"/>
		<reference ref_id="CVE-2016-10094" ref_url="https://www.suse.com/security/cve/CVE-2016-10094/" source="CVE"/>
		<reference ref_id="CVE-2016-6223" ref_url="https://www.suse.com/security/cve/CVE-2016-6223/" source="CVE"/>
		<reference ref_id="CVE-2017-12944" ref_url="https://www.suse.com/security/cve/CVE-2017-12944/" source="CVE"/>
		<reference ref_id="CVE-2018-19210" ref_url="https://www.suse.com/security/cve/CVE-2018-19210/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004984.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

Security issues fixed:                                   
    
- CVE-2018-19210: Fixed NULL pointer dereference in the TIFFWriteDirectorySec function (bsc#1115717).
- CVE-2017-12944: Fixed denial of service issue in the TIFFReadDirEntryArray function (bsc#1054594).
- CVE-2016-10094: Fixed heap-based buffer overflow in the _tiffWriteProc function (bsc#1017693).
- CVE-2016-10093: Fixed heap-based buffer overflow in the _TIFFmemcpy function (bsc#1017693).
- CVE-2016-10092: Fixed heap-based buffer overflow in the TIFFReverseBits function (bsc#1017693).
- CVE-2016-6223: Fixed out-of-bounds read on memory-mapped files in TIFFReadRawStrip1() and TIFFReadRawTile1() (bsc#990460).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-19"/>
	<updated date="2018-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017693">SUSE bug 1017693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054594">SUSE bug 1054594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115717">SUSE bug 1115717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990460">SUSE bug 990460</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10092/">CVE-2016-10092</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10093/">CVE-2016-10093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10094/">CVE-2016-10094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6223/">CVE-2016-6223</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12944/">CVE-2017-12944</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19210/">CVE-2018-19210</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520448" comment="libtiff5-4.0.9-44.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520449" comment="libtiff5-32bit-4.0.9-44.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78444" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1035442" ref_url="https://bugzilla.suse.com/1035442" source="BUGZILLA"/>
		<reference ref_id="1051729" ref_url="https://bugzilla.suse.com/1051729" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1067317" ref_url="https://bugzilla.suse.com/1067317" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1070158" ref_url="https://bugzilla.suse.com/1070158" source="BUGZILLA"/>
		<reference ref_id="1070159" ref_url="https://bugzilla.suse.com/1070159" source="BUGZILLA"/>
		<reference ref_id="1070160" ref_url="https://bugzilla.suse.com/1070160" source="BUGZILLA"/>
		<reference ref_id="1070163" ref_url="https://bugzilla.suse.com/1070163" source="BUGZILLA"/>
		<reference ref_id="1074562" ref_url="https://bugzilla.suse.com/1074562" source="BUGZILLA"/>
		<reference ref_id="1076116" ref_url="https://bugzilla.suse.com/1076116" source="BUGZILLA"/>
		<reference ref_id="1076180" ref_url="https://bugzilla.suse.com/1076180" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-17563" ref_url="https://www.suse.com/security/cve/CVE-2017-17563/" source="CVE"/>
		<reference ref_id="CVE-2017-17564" ref_url="https://www.suse.com/security/cve/CVE-2017-17564/" source="CVE"/>
		<reference ref_id="CVE-2017-17565" ref_url="https://www.suse.com/security/cve/CVE-2017-17565/" source="CVE"/>
		<reference ref_id="CVE-2017-17566" ref_url="https://www.suse.com/security/cve/CVE-2017-17566/" source="CVE"/>
		<reference ref_id="CVE-2017-18030" ref_url="https://www.suse.com/security/cve/CVE-2017-18030/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-5683" ref_url="https://www.suse.com/security/cve/CVE-2018-5683/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00023.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-5753, CVE-2017-5715, CVE-2017-5754: Prevent information leaks via
  side effects of speculative execution, aka 'Spectre' and 'Meltdown' attacks
  (bsc#1074562, bsc#1068032)
- CVE-2017-15595: x86 PV guest OS users were able to cause a DoS (unbounded
  recursion, stack consumption, and hypervisor crash) or possibly gain privileges
  via crafted page-table stacking (bsc#1061081)
- CVE-2017-17566: Prevent PV guest OS users to cause a denial of service (host
  OS crash) or gain host OS privileges in shadow mode by mapping a certain
  auxiliary page (bsc#1070158).
- CVE-2017-17563: Prevent guest OS users to cause a denial of service (host OS
  crash) or gain host OS privileges by leveraging an incorrect mask for
  reference-count overflow checking in shadow mode (bsc#1070159).
- CVE-2017-17564: Prevent guest OS users to cause a denial of service (host OS
  crash) or gain host OS privileges by leveraging incorrect error handling for
  reference counting in shadow mode (bsc#1070160).
- CVE-2017-17565: Prevent PV guest OS users to cause a denial of service (host
  OS crash) if shadow mode and log-dirty mode are in place, because of an
  incorrect assertion related to M2P (bsc#1070163).
- CVE-2018-5683: The vga_draw_text function allowed local OS guest privileged
  users to cause a denial of service (out-of-bounds read and QEMU process crash)
  by leveraging improper memory address validation (bsc#1076116).
- CVE-2017-18030: The cirrus_invalidate_region function allowed local OS guest
  privileged users to cause a denial of service (out-of-bounds array access and
  QEMU process crash) via vectors related to negative pitch (bsc#1076180).

These non-security issues were fixed:

- bsc#1067317: pass cache=writeback|unsafe|directsync to qemu depending on the
  libxl disk settings
- bsc#1051729: Prevent invalid symlinks after install of SLES 12 SP2
- bsc#1035442: Increased the value of LIBXL_DESTROY_TIMEOUT from 10 to 100
  seconds. If many domUs shutdown in parallel the backends couldn't keep up 
- bsc#1027519: Added several upstream patches
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-14"/>
	<updated date="2018-02-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035442">SUSE bug 1035442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051729">SUSE bug 1051729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067317">SUSE bug 1067317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070158">SUSE bug 1070158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070159">SUSE bug 1070159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070160">SUSE bug 1070160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070163">SUSE bug 1070163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076116">SUSE bug 1076116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076180">SUSE bug 1076180</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17563/">CVE-2017-17563</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17564/">CVE-2017-17564</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17565/">CVE-2017-17565</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17566/">CVE-2017-17566</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18030/">CVE-2017-18030</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5683/">CVE-2018-5683</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520450" comment="xen-4.9.1_08-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520451" comment="xen-libs-4.9.1_08-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520452" comment="xen-libs-32bit-4.9.1_08-3.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78445" version="1" class="patch">
	<metadata>
		<title>Security update for netatalk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1119540" ref_url="https://bugzilla.suse.com/1119540" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1160" ref_url="https://www.suse.com/security/cve/CVE-2018-1160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004996.html" source="SUSE-SU"/>
		<description>
This update for netatalk fixes the following issues:

Security issue fixed:

- CVE-2018-1160 Fixed a missing bounds check in the handling of the DSI
  OPEN SESSION request, which allowed an unauthenticated to overwrite memory
  with data of their choice leading to arbitrary code execution with root
  privileges. (bsc#1119540)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-21"/>
	<updated date="2018-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1119540">SUSE bug 1119540</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1160/">CVE-2018-1160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520453" comment="libatalk12-3.1.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520454" comment="netatalk-3.1.0-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78446" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr and mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1097410" ref_url="https://bugzilla.suse.com/1097410" source="BUGZILLA"/>
		<reference ref_id="1106873" ref_url="https://bugzilla.suse.com/1106873" source="BUGZILLA"/>
		<reference ref_id="1119069" ref_url="https://bugzilla.suse.com/1119069" source="BUGZILLA"/>
		<reference ref_id="1119105" ref_url="https://bugzilla.suse.com/1119105" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495/" source="CVE"/>
		<reference ref_id="CVE-2018-12384" ref_url="https://www.suse.com/security/cve/CVE-2018-12384/" source="CVE"/>
		<reference ref_id="CVE-2018-12404" ref_url="https://www.suse.com/security/cve/CVE-2018-12404/" source="CVE"/>
		<reference ref_id="CVE-2018-12405" ref_url="https://www.suse.com/security/cve/CVE-2018-12405/" source="CVE"/>
		<reference ref_id="CVE-2018-17466" ref_url="https://www.suse.com/security/cve/CVE-2018-17466/" source="CVE"/>
		<reference ref_id="CVE-2018-18492" ref_url="https://www.suse.com/security/cve/CVE-2018-18492/" source="CVE"/>
		<reference ref_id="CVE-2018-18493" ref_url="https://www.suse.com/security/cve/CVE-2018-18493/" source="CVE"/>
		<reference ref_id="CVE-2018-18494" ref_url="https://www.suse.com/security/cve/CVE-2018-18494/" source="CVE"/>
		<reference ref_id="CVE-2018-18498" ref_url="https://www.suse.com/security/cve/CVE-2018-18498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox, mozilla-nss and mozilla-nspr fixes the following issues:

Issues fixed in MozillaFirefox:

- Update to Firefox ESR 60.4 (bsc#1119105)
- CVE-2018-17466: Fixed a buffer overflow and out-of-bounds read in ANGLE library with TextureStorage11
- CVE-2018-18492: Fixed a use-after-free with select element
- CVE-2018-18493: Fixed a buffer overflow in accelerated 2D canvas with Skia
- CVE-2018-18494: Fixed a Same-origin policy violation using location attribute and performance.getEntries
  to steal cross-origin URLs
- CVE-2018-18498: Fixed a integer overflow when calculating buffer sizes for images
- CVE-2018-12405: Fixed a few memory safety bugs

Issues fixed in mozilla-nss:

- Update to NSS 3.40.1 (bsc#1119105)
- CVE-2018-12404: Fixed a cache side-channel variant of the Bleichenbacher attack (bsc#1119069)
- CVE-2018-12384: Fixed an issue in the SSL handshake. NSS responded to an
  SSLv2-compatible ClientHello with a ServerHello that had an all-zero random. (bsc#1106873)
- CVE-2018-0495: Fixed a memory-cache side-channel attack with ECDSA signatures (bsc#1097410)
- Fixed a decryption failure during FFDHE key exchange
- Various security fixes in the ASN.1 code

Issues fixed in mozilla-nspr:

- Update mozilla-nspr to 4.20 (bsc#1119105)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-21"/>
	<updated date="2018-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097410">SUSE bug 1097410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106873">SUSE bug 1106873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119069">SUSE bug 1119069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12384/">CVE-2018-12384</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12404/">CVE-2018-12404</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12405/">CVE-2018-12405</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17466/">CVE-2018-17466</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18492/">CVE-2018-18492</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18493/">CVE-2018-18493</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18494/">CVE-2018-18494</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18498/">CVE-2018-18498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520455" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520456" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520457" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520458" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520459" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520460" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520461" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520462" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520463" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520464" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520465" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520466" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520467" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520468" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520469" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78447" version="1" class="patch">
	<metadata>
		<title>Security update for libreoffice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1080249" ref_url="https://bugzilla.suse.com/1080249" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6871" ref_url="https://www.suse.com/security/cve/CVE-2018-6871/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0443-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00024.html" source="SUSE-SU"/>
		<description>
This update for libreoffice fixes the following issues:

LibreOffice was updated to 5.4.5.1:

- CVE-2018-6871: Fixes data exposure when using WEBSERVICE (bsc#1080249)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-14"/>
	<updated date="2018-02-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1080249">SUSE bug 1080249</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6871/">CVE-2018-6871</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520470" comment="libreoffice-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520471" comment="libreoffice-base-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520472" comment="libreoffice-base-drivers-mysql-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520473" comment="libreoffice-base-drivers-postgresql-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520474" comment="libreoffice-calc-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520475" comment="libreoffice-calc-extensions-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520476" comment="libreoffice-draw-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520477" comment="libreoffice-filters-optional-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520478" comment="libreoffice-gnome-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520479" comment="libreoffice-icon-theme-galaxy-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520480" comment="libreoffice-icon-theme-tango-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520481" comment="libreoffice-impress-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520482" comment="libreoffice-l10n-af-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520483" comment="libreoffice-l10n-ar-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520484" comment="libreoffice-l10n-ca-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520485" comment="libreoffice-l10n-cs-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520486" comment="libreoffice-l10n-da-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520487" comment="libreoffice-l10n-de-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520488" comment="libreoffice-l10n-en-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520489" comment="libreoffice-l10n-es-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520490" comment="libreoffice-l10n-fi-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520491" comment="libreoffice-l10n-fr-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520492" comment="libreoffice-l10n-gu-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520493" comment="libreoffice-l10n-hi-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520494" comment="libreoffice-l10n-hu-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520495" comment="libreoffice-l10n-it-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520496" comment="libreoffice-l10n-ja-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520497" comment="libreoffice-l10n-ko-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520498" comment="libreoffice-l10n-nb-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520499" comment="libreoffice-l10n-nl-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520500" comment="libreoffice-l10n-nn-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520501" comment="libreoffice-l10n-pl-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520502" comment="libreoffice-l10n-pt_BR-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520503" comment="libreoffice-l10n-pt_PT-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520504" comment="libreoffice-l10n-ro-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520505" comment="libreoffice-l10n-ru-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520506" comment="libreoffice-l10n-sk-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520507" comment="libreoffice-l10n-sv-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520508" comment="libreoffice-l10n-xh-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520509" comment="libreoffice-l10n-zh_CN-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520510" comment="libreoffice-l10n-zh_TW-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520511" comment="libreoffice-l10n-zu-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520512" comment="libreoffice-mailmerge-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520513" comment="libreoffice-math-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520514" comment="libreoffice-officebean-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520515" comment="libreoffice-pyuno-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520516" comment="libreoffice-writer-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520517" comment="libreoffice-writer-extensions-5.4.5.1-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520518" comment="libreofficekit-5.4.5.1-43.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78448" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1117740" ref_url="https://bugzilla.suse.com/1117740" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19622" ref_url="https://www.suse.com/security/cve/CVE-2018-19622/" source="CVE"/>
		<reference ref_id="CVE-2018-19623" ref_url="https://www.suse.com/security/cve/CVE-2018-19623/" source="CVE"/>
		<reference ref_id="CVE-2018-19624" ref_url="https://www.suse.com/security/cve/CVE-2018-19624/" source="CVE"/>
		<reference ref_id="CVE-2018-19625" ref_url="https://www.suse.com/security/cve/CVE-2018-19625/" source="CVE"/>
		<reference ref_id="CVE-2018-19626" ref_url="https://www.suse.com/security/cve/CVE-2018-19626/" source="CVE"/>
		<reference ref_id="CVE-2018-19627" ref_url="https://www.suse.com/security/cve/CVE-2018-19627/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005007.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Update to Wireshark 2.4.11 (bsc#1117740).

Security issues fixed:

- CVE-2018-19625: The Wireshark dissection engine could crash (wnpa-sec-2018-51)
- CVE-2018-19626: The DCOM dissector could crash (wnpa-sec-2018-52)
- CVE-2018-19623: The LBMPDM dissector could crash (wnpa-sec-2018-53) 
- CVE-2018-19622: The MMSE dissector could go into an infinite loop (wnpa-sec-2018-54)
- CVE-2018-19627: The IxVeriWave file parser could crash (wnpa-sec-2018-55) 
- CVE-2018-19624: The PVFS dissector could crash (wnpa-sec-2018-56)

Further bug fixes and updated protocol support as listed in:

- https://www.wireshark.org/docs/relnotes/wireshark-2.4.11.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-28"/>
	<updated date="2018-12-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117740">SUSE bug 1117740</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19622/">CVE-2018-19622</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19623/">CVE-2018-19623</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19624/">CVE-2018-19624</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19625/">CVE-2018-19625</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19626/">CVE-2018-19626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19627/">CVE-2018-19627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520519" comment="libwireshark9-2.4.11-48.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520520" comment="libwiretap7-2.4.11-48.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520521" comment="libwscodecs1-2.4.11-48.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520522" comment="libwsutil8-2.4.11-48.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520523" comment="wireshark-2.4.11-48.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520524" comment="wireshark-gtk-2.4.11-48.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78449" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1037930" ref_url="https://bugzilla.suse.com/1037930" source="BUGZILLA"/>
		<reference ref_id="1051791" ref_url="https://bugzilla.suse.com/1051791" source="BUGZILLA"/>
		<reference ref_id="1073990" ref_url="https://bugzilla.suse.com/1073990" source="BUGZILLA"/>
		<reference ref_id="1074293" ref_url="https://bugzilla.suse.com/1074293" source="BUGZILLA"/>
		<reference ref_id="1079036" ref_url="https://bugzilla.suse.com/1079036" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12132" ref_url="https://www.suse.com/security/cve/CVE-2017-12132/" source="CVE"/>
		<reference ref_id="CVE-2017-8804" ref_url="https://www.suse.com/security/cve/CVE-2017-8804/" source="CVE"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="CVE-2018-6485" ref_url="https://www.suse.com/security/cve/CVE-2018-6485/" source="CVE"/>
		<reference ref_id="CVE-2018-6551" ref_url="https://www.suse.com/security/cve/CVE-2018-6551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00026.html" source="SUSE-SU"/>
		<description>

  
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2017-8804: Fix memory leak after deserialization failure in xdr_bytes, xdr_string (bsc#1037930)
- CVE-2017-12132: Reduce EDNS payload size to 1200 bytes (bsc#1051791)
- CVE-2018-6485,CVE-2018-6551: Fix integer overflows in internal memalign and malloc functions (bsc#1079036)
- CVE-2018-1000001: Avoid underflow of malloced area (bsc#1074293)

Non security bugs fixed:

- Release read lock after resetting timeout (bsc#1073990)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-15"/>
	<updated date="2018-02-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037930">SUSE bug 1037930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051791">SUSE bug 1051791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073990">SUSE bug 1073990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074293">SUSE bug 1074293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079036">SUSE bug 1079036</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-12132/">CVE-2017-12132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8804/">CVE-2017-8804</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6485/">CVE-2018-6485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6551/">CVE-2018-6551</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518942" comment="glibc-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518943" comment="glibc-32bit-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518944" comment="glibc-devel-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518945" comment="glibc-devel-32bit-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518946" comment="glibc-i18ndata-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518947" comment="glibc-locale-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518948" comment="glibc-locale-32bit-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518949" comment="nscd-2.22-62.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78450" version="1" class="patch">
	<metadata>
		<title>Security update for p7zip (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1077724" ref_url="https://bugzilla.suse.com/1077724" source="BUGZILLA"/>
		<reference ref_id="1077725" ref_url="https://bugzilla.suse.com/1077725" source="BUGZILLA"/>
		<reference ref_id="1077978" ref_url="https://bugzilla.suse.com/1077978" source="BUGZILLA"/>
		<reference ref_id="984650" ref_url="https://bugzilla.suse.com/984650" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1372" ref_url="https://www.suse.com/security/cve/CVE-2016-1372/" source="CVE"/>
		<reference ref_id="CVE-2017-17969" ref_url="https://www.suse.com/security/cve/CVE-2017-17969/" source="CVE"/>
		<reference ref_id="CVE-2018-5996" ref_url="https://www.suse.com/security/cve/CVE-2018-5996/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00034.html" source="SUSE-SU"/>
		<description>

  
This update for p7zip fixes the following issues:

Security issues fixed:

- CVE-2016-1372: Fixed multiple vulnerabilities when processing crafted 7z files (bsc#984650)
- CVE-2017-17969: Fixed a heap-based buffer overflow in a shrink decoder (bsc#1077725)
- CVE-2018-5996: Fixed memory corruption in RAR decompression. The complete RAR decoder was removed as it also has license issues (bsc#1077724 bsc#1077978)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077724">SUSE bug 1077724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077725">SUSE bug 1077725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077978">SUSE bug 1077978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984650">SUSE bug 984650</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1372/">CVE-2016-1372</cve>
	<cve impact="important" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17969/">CVE-2017-17969</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5996/">CVE-2018-5996</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518950" comment="p7zip-9.20.1-7.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78451" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1077983" ref_url="https://bugzilla.suse.com/1077983" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1053" ref_url="https://www.suse.com/security/cve/CVE-2018-1053/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003746.html" source="SUSE-SU"/>
		<description>

  
This update for postgresql96 to version 9.6.7 fixes the following issues:

- CVE-2018-1053: Ensure that all temporary files made by pg_upgrade are non-world-readable. (bsc#1077983)

A full changelog is available here:

	https://www.postgresql.org/docs/9.6/static/release-9-6-7.html

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-21"/>
	<updated date="2018-02-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077983">SUSE bug 1077983</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1053/">CVE-2018-1053</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518954" comment="libecpg6-9.6.7-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518955" comment="libpq5-9.6.7-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518956" comment="libpq5-32bit-9.6.7-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518957" comment="postgresql96-9.6.7-3.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78452" version="1" class="patch">
	<metadata>
		<title>Security update for libdb-4_8 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1043886" ref_url="https://bugzilla.suse.com/1043886" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003748.html" source="SUSE-SU"/>
		<description>
This update for libdb-4_8 fixes the following issues:

- A DB_CONFIG file in the current working directory allowed local
  users to obtain sensitive information via a symlink attack
  involving a setgid or setuid application using libdb-4_8. (bsc#1043886)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-21"/>
	<updated date="2018-02-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043886">SUSE bug 1043886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518958" comment="db48-utils-4.8.30-29.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518959" comment="libdb-4_8-4.8.30-29.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518960" comment="libdb-4_8-32bit-4.8.30-29.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78453" version="1" class="patch">
	<metadata>
		<title>Security update for drm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1041744" ref_url="https://bugzilla.suse.com/1041744" source="BUGZILLA"/>
		<reference ref_id="1046821" ref_url="https://bugzilla.suse.com/1046821" source="BUGZILLA"/>
		<reference ref_id="1047277" ref_url="https://bugzilla.suse.com/1047277" source="BUGZILLA"/>
		<reference ref_id="1047729" ref_url="https://bugzilla.suse.com/1047729" source="BUGZILLA"/>
		<reference ref_id="1048155" ref_url="https://bugzilla.suse.com/1048155" source="BUGZILLA"/>
		<reference ref_id="1050256" ref_url="https://bugzilla.suse.com/1050256" source="BUGZILLA"/>
		<reference ref_id="1055493" ref_url="https://bugzilla.suse.com/1055493" source="BUGZILLA"/>
		<reference ref_id="1066175" ref_url="https://bugzilla.suse.com/1066175" source="BUGZILLA"/>
		<reference ref_id="1077885" ref_url="https://bugzilla.suse.com/1077885" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10810" ref_url="https://www.suse.com/security/cve/CVE-2017-10810/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003747.html" source="SUSE-SU"/>
		<description>
This update for drm provides the following fixes:

This security issue was fixed:

- CVE-2017-10810: Memory leak in the virtio_gpu_object_create function in
  drivers/gpu/drm/virtio/virtgpu_object.c allowed attackers to cause a denial of
  service (memory consumption) by triggering object-initialization failures
  (bnc#1047277)

These non-security issues were fixed:

- Backport upstream 4.9.x stable fixes up to 4.9.81 (bsc#1041744).
- Fixed crash at suspend/resume on old Intel chipsets (bsc#1047729, bsc#1050256)
- Fixed large topology support for vmwgfx (bsc#1048155)
- Workaround for BXT aperture vs GTT chip bug (bsc#1046821)
- Limit the supplements for the default hardware support to only
  Intel Skylake / Kabylake and AMDGPU (bsc#1077885)
  4.9.x i915 seems more buggy than expected for old chipsets.
- Conditionally build aarch64 as well (bsc#1066175)
- Build host1x module (taken from the kernel-source) as well for
  avoiding the unneeded dependency on kernel-default-extra on
  ARM64 (bsc#1066175)
- Enable AMDGPU CIK and SI (bsc#1066175):
- Add missing hisilicon hibmc driver (bsc#1066175):
- Add si_support and cik_support options to radeon and amdgpu
  (bsc#1066175):
- Update Module.supported and apply it properly;
  following SLE12-SP3 kernel status
- Backport the upstream DP-MST fixes, addressing a hang at S3
  resume (bsc#1055493):
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-21"/>
	<updated date="2018-02-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1041744">SUSE bug 1041744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046821">SUSE bug 1046821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047277">SUSE bug 1047277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047729">SUSE bug 1047729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048155">SUSE bug 1048155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050256">SUSE bug 1050256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055493">SUSE bug 1055493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066175">SUSE bug 1066175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077885">SUSE bug 1077885</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10810/">CVE-2017-10810</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520525" comment="drm-kmp-default-4.9.33_k4.4.114_94.11-4.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78454" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1023415" ref_url="https://bugzilla.suse.com/1023415" source="BUGZILLA"/>
		<reference ref_id="1059061" ref_url="https://bugzilla.suse.com/1059061" source="BUGZILLA"/>
		<reference ref_id="1073935" ref_url="https://bugzilla.suse.com/1073935" source="BUGZILLA"/>
		<reference ref_id="1076119" ref_url="https://bugzilla.suse.com/1076119" source="BUGZILLA"/>
		<reference ref_id="987170" ref_url="https://bugzilla.suse.com/987170" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3144" ref_url="https://www.suse.com/security/cve/CVE-2017-3144/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003752.html" source="SUSE-SU"/>
		<description>
 This update for dhcp fixes several issues.

This security issue was fixed:

- CVE-2017-3144: OMAPI code didn't free socket descriptors when empty message
  is received allowing DoS (bsc#1076119).

These non-security issues were fixed:

- Optimized if and when DNS client context and ports are initted (bsc#1073935)
- Relax permission of dhclient-script for libguestfs (bsc#987170)
- Modify dhclient-script to handle static route updates (bsc#1023415).
- Use only the 12 least significant bits of an inbound packet's TCI value as the VLAN ID
  to fix some packages being wrongly discarded by the Linux packet filter. (bsc#1059061)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-23"/>
	<updated date="2018-02-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023415">SUSE bug 1023415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059061">SUSE bug 1059061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073935">SUSE bug 1073935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076119">SUSE bug 1076119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987170">SUSE bug 987170</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3144/">CVE-2017-3144</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518961" comment="dhcp-4.3.3-10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518962" comment="dhcp-client-4.3.3-10.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78455" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1057974" ref_url="https://bugzilla.suse.com/1057974" source="BUGZILLA"/>
		<reference ref_id="1068588" ref_url="https://bugzilla.suse.com/1068588" source="BUGZILLA"/>
		<reference ref_id="1071224" ref_url="https://bugzilla.suse.com/1071224" source="BUGZILLA"/>
		<reference ref_id="1071311" ref_url="https://bugzilla.suse.com/1071311" source="BUGZILLA"/>
		<reference ref_id="1075801" ref_url="https://bugzilla.suse.com/1075801" source="BUGZILLA"/>
		<reference ref_id="1077925" ref_url="https://bugzilla.suse.com/1077925" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18078" ref_url="https://www.suse.com/security/cve/CVE-2017-18078/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003753.html" source="SUSE-SU"/>
		<description>

  
This update for systemd fixes the following issues:

Security issue fixed:

- CVE-2017-18078: tmpfiles: refuse to chown()/chmod() files which are
  hardlinked, unless protected_hardlinks sysctl is on. This could be used
  by local attackers to gain privileges (bsc#1077925)

Non Security issues fixed:

- core: use id unit when retrieving unit file state (#8038) (bsc#1075801)
- cryptsetup-generator: run cryptsetup service before swap unit (#5480)
- udev-rules: all values can contain escaped double quotes now (#6890)
- strv: fix buffer size calculation in strv_join_quoted()
- tmpfiles: change ownership of symlinks too
- stdio-bridge: Correctly propagate error
- stdio-bridge: remove dead code
- remove bus-proxyd (bsc#1057974)
- core/timer: Prevent timer looping when unit cannot start (bsc#1068588)

- Make systemd-timesyncd use the openSUSE NTP servers by default
  Previously systemd-timesyncd used the Google Public NTP servers
  time{1..4}.google.com

- Don't ship /usr/lib/systemd/system/tmp.mnt at all (bsc#1071224)
  But we still ship a copy in /var.
  Users who want to use tmpfs on /tmp are supposed to add a symlink in
  /etc/ pointing to the copy shipped in /var.
  To support the update path we automatically create the symlink if
  tmp.mount in use is located in /usr.

- Enable systemd-networkd on Leap distros only (bsc#1071311)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-26"/>
	<updated date="2018-02-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1057974">SUSE bug 1057974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068588">SUSE bug 1068588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071224">SUSE bug 1071224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071311">SUSE bug 1071311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075801">SUSE bug 1075801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077925">SUSE bug 1077925</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18078/">CVE-2017-18078</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518963" comment="libsystemd0-228-150.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518964" comment="libsystemd0-32bit-228-150.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518965" comment="libudev1-228-150.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518966" comment="libudev1-32bit-228-150.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518967" comment="systemd-228-150.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518968" comment="systemd-32bit-228-150.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518969" comment="systemd-bash-completion-228-150.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518970" comment="systemd-sysvinit-228-150.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518971" comment="udev-228-150.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78456" version="1" class="patch">
	<metadata>
		<title>Security update for zziplib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1024532" ref_url="https://bugzilla.suse.com/1024532" source="BUGZILLA"/>
		<reference ref_id="1024536" ref_url="https://bugzilla.suse.com/1024536" source="BUGZILLA"/>
		<reference ref_id="1034539" ref_url="https://bugzilla.suse.com/1034539" source="BUGZILLA"/>
		<reference ref_id="1078497" ref_url="https://bugzilla.suse.com/1078497" source="BUGZILLA"/>
		<reference ref_id="1078701" ref_url="https://bugzilla.suse.com/1078701" source="BUGZILLA"/>
		<reference ref_id="1079096" ref_url="https://bugzilla.suse.com/1079096" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6381" ref_url="https://www.suse.com/security/cve/CVE-2018-6381/" source="CVE"/>
		<reference ref_id="CVE-2018-6484" ref_url="https://www.suse.com/security/cve/CVE-2018-6484/" source="CVE"/>
		<reference ref_id="CVE-2018-6540" ref_url="https://www.suse.com/security/cve/CVE-2018-6540/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003754.html" source="SUSE-SU"/>
		<description>

  
This update for zziplib fixes the following issues:

Version update to 0.13.67 contains lots of bug- and security fixes.

- If an extension block is too small to hold an extension,
  do not use the information therein.
- CVE-2018-6540: If the End of central directory record (EOCD) contains an
  Offset of start of central directory which is beyond the end of
  the file, reject the file.  (bsc#1079096)
- CVE-2018-6484: Reject the ZIP file and report it as corrupt if the size of the
  central directory and/or the offset of start of central directory
  point beyond the end of the ZIP file. (bsc#1078701)
- CVE-2018-6381: If a file is uncompressed, compressed and uncompressed sizes
  should be identical. (bsc#1078497)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-27"/>
	<updated date="2018-02-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024532">SUSE bug 1024532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024536">SUSE bug 1024536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034539">SUSE bug 1034539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078497">SUSE bug 1078497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078701">SUSE bug 1078701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079096">SUSE bug 1079096</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6381/">CVE-2018-6381</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6484/">CVE-2018-6484</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6540/">CVE-2018-6540</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518972" comment="libzzip-0-13-0.13.67-10.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78457" version="1" class="patch">
	<metadata>
		<title>Security update for puppet (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1080288" ref_url="https://bugzilla.suse.com/1080288" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10689" ref_url="https://www.suse.com/security/cve/CVE-2017-10689/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003760.html" source="SUSE-SU"/>
		<description>
This update for puppet fixes the following issues:

- CVE-2017-10689: Reset permissions when unpacking tar in PMT.
  When using minitar, files were unpacked with whatever permissions are in the tarball.
  This is potentially unsafe, as tarballs can be easily created with weird permissions
  (bsc#1080288)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-01"/>
	<updated date="2018-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1080288">SUSE bug 1080288</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10689/">CVE-2017-10689</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518973" comment="puppet-3.8.5-15.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78458" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1042824" ref_url="https://bugzilla.suse.com/1042824" source="BUGZILLA"/>
		<reference ref_id="1042911" ref_url="https://bugzilla.suse.com/1042911" source="BUGZILLA"/>
		<reference ref_id="1048110" ref_url="https://bugzilla.suse.com/1048110" source="BUGZILLA"/>
		<reference ref_id="1048272" ref_url="https://bugzilla.suse.com/1048272" source="BUGZILLA"/>
		<reference ref_id="1049374" ref_url="https://bugzilla.suse.com/1049374" source="BUGZILLA"/>
		<reference ref_id="1049375" ref_url="https://bugzilla.suse.com/1049375" source="BUGZILLA"/>
		<reference ref_id="1050048" ref_url="https://bugzilla.suse.com/1050048" source="BUGZILLA"/>
		<reference ref_id="1050119" ref_url="https://bugzilla.suse.com/1050119" source="BUGZILLA"/>
		<reference ref_id="1050122" ref_url="https://bugzilla.suse.com/1050122" source="BUGZILLA"/>
		<reference ref_id="1050126" ref_url="https://bugzilla.suse.com/1050126" source="BUGZILLA"/>
		<reference ref_id="1050132" ref_url="https://bugzilla.suse.com/1050132" source="BUGZILLA"/>
		<reference ref_id="1050617" ref_url="https://bugzilla.suse.com/1050617" source="BUGZILLA"/>
		<reference ref_id="1052207" ref_url="https://bugzilla.suse.com/1052207" source="BUGZILLA"/>
		<reference ref_id="1052248" ref_url="https://bugzilla.suse.com/1052248" source="BUGZILLA"/>
		<reference ref_id="1052251" ref_url="https://bugzilla.suse.com/1052251" source="BUGZILLA"/>
		<reference ref_id="1052254" ref_url="https://bugzilla.suse.com/1052254" source="BUGZILLA"/>
		<reference ref_id="1052472" ref_url="https://bugzilla.suse.com/1052472" source="BUGZILLA"/>
		<reference ref_id="1052688" ref_url="https://bugzilla.suse.com/1052688" source="BUGZILLA"/>
		<reference ref_id="1052711" ref_url="https://bugzilla.suse.com/1052711" source="BUGZILLA"/>
		<reference ref_id="1052747" ref_url="https://bugzilla.suse.com/1052747" source="BUGZILLA"/>
		<reference ref_id="1052750" ref_url="https://bugzilla.suse.com/1052750" source="BUGZILLA"/>
		<reference ref_id="1052754" ref_url="https://bugzilla.suse.com/1052754" source="BUGZILLA"/>
		<reference ref_id="1052761" ref_url="https://bugzilla.suse.com/1052761" source="BUGZILLA"/>
		<reference ref_id="1055069" ref_url="https://bugzilla.suse.com/1055069" source="BUGZILLA"/>
		<reference ref_id="1055229" ref_url="https://bugzilla.suse.com/1055229" source="BUGZILLA"/>
		<reference ref_id="1056768" ref_url="https://bugzilla.suse.com/1056768" source="BUGZILLA"/>
		<reference ref_id="1057163" ref_url="https://bugzilla.suse.com/1057163" source="BUGZILLA"/>
		<reference ref_id="1058009" ref_url="https://bugzilla.suse.com/1058009" source="BUGZILLA"/>
		<reference ref_id="1072898" ref_url="https://bugzilla.suse.com/1072898" source="BUGZILLA"/>
		<reference ref_id="1074119" ref_url="https://bugzilla.suse.com/1074119" source="BUGZILLA"/>
		<reference ref_id="1074170" ref_url="https://bugzilla.suse.com/1074170" source="BUGZILLA"/>
		<reference ref_id="1075821" ref_url="https://bugzilla.suse.com/1075821" source="BUGZILLA"/>
		<reference ref_id="1076182" ref_url="https://bugzilla.suse.com/1076182" source="BUGZILLA"/>
		<reference ref_id="1078433" ref_url="https://bugzilla.suse.com/1078433" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11166" ref_url="https://www.suse.com/security/cve/CVE-2017-11166/" source="CVE"/>
		<reference ref_id="CVE-2017-11170" ref_url="https://www.suse.com/security/cve/CVE-2017-11170/" source="CVE"/>
		<reference ref_id="CVE-2017-11448" ref_url="https://www.suse.com/security/cve/CVE-2017-11448/" source="CVE"/>
		<reference ref_id="CVE-2017-11450" ref_url="https://www.suse.com/security/cve/CVE-2017-11450/" source="CVE"/>
		<reference ref_id="CVE-2017-11528" ref_url="https://www.suse.com/security/cve/CVE-2017-11528/" source="CVE"/>
		<reference ref_id="CVE-2017-11530" ref_url="https://www.suse.com/security/cve/CVE-2017-11530/" source="CVE"/>
		<reference ref_id="CVE-2017-11531" ref_url="https://www.suse.com/security/cve/CVE-2017-11531/" source="CVE"/>
		<reference ref_id="CVE-2017-11533" ref_url="https://www.suse.com/security/cve/CVE-2017-11533/" source="CVE"/>
		<reference ref_id="CVE-2017-11537" ref_url="https://www.suse.com/security/cve/CVE-2017-11537/" source="CVE"/>
		<reference ref_id="CVE-2017-11638" ref_url="https://www.suse.com/security/cve/CVE-2017-11638/" source="CVE"/>
		<reference ref_id="CVE-2017-11642" ref_url="https://www.suse.com/security/cve/CVE-2017-11642/" source="CVE"/>
		<reference ref_id="CVE-2017-12418" ref_url="https://www.suse.com/security/cve/CVE-2017-12418/" source="CVE"/>
		<reference ref_id="CVE-2017-12427" ref_url="https://www.suse.com/security/cve/CVE-2017-12427/" source="CVE"/>
		<reference ref_id="CVE-2017-12429" ref_url="https://www.suse.com/security/cve/CVE-2017-12429/" source="CVE"/>
		<reference ref_id="CVE-2017-12432" ref_url="https://www.suse.com/security/cve/CVE-2017-12432/" source="CVE"/>
		<reference ref_id="CVE-2017-12566" ref_url="https://www.suse.com/security/cve/CVE-2017-12566/" source="CVE"/>
		<reference ref_id="CVE-2017-12654" ref_url="https://www.suse.com/security/cve/CVE-2017-12654/" source="CVE"/>
		<reference ref_id="CVE-2017-12663" ref_url="https://www.suse.com/security/cve/CVE-2017-12663/" source="CVE"/>
		<reference ref_id="CVE-2017-12664" ref_url="https://www.suse.com/security/cve/CVE-2017-12664/" source="CVE"/>
		<reference ref_id="CVE-2017-12665" ref_url="https://www.suse.com/security/cve/CVE-2017-12665/" source="CVE"/>
		<reference ref_id="CVE-2017-12668" ref_url="https://www.suse.com/security/cve/CVE-2017-12668/" source="CVE"/>
		<reference ref_id="CVE-2017-12674" ref_url="https://www.suse.com/security/cve/CVE-2017-12674/" source="CVE"/>
		<reference ref_id="CVE-2017-13058" ref_url="https://www.suse.com/security/cve/CVE-2017-13058/" source="CVE"/>
		<reference ref_id="CVE-2017-13131" ref_url="https://www.suse.com/security/cve/CVE-2017-13131/" source="CVE"/>
		<reference ref_id="CVE-2017-14060" ref_url="https://www.suse.com/security/cve/CVE-2017-14060/" source="CVE"/>
		<reference ref_id="CVE-2017-14139" ref_url="https://www.suse.com/security/cve/CVE-2017-14139/" source="CVE"/>
		<reference ref_id="CVE-2017-14224" ref_url="https://www.suse.com/security/cve/CVE-2017-14224/" source="CVE"/>
		<reference ref_id="CVE-2017-17682" ref_url="https://www.suse.com/security/cve/CVE-2017-17682/" source="CVE"/>
		<reference ref_id="CVE-2017-17885" ref_url="https://www.suse.com/security/cve/CVE-2017-17885/" source="CVE"/>
		<reference ref_id="CVE-2017-17934" ref_url="https://www.suse.com/security/cve/CVE-2017-17934/" source="CVE"/>
		<reference ref_id="CVE-2017-18028" ref_url="https://www.suse.com/security/cve/CVE-2017-18028/" source="CVE"/>
		<reference ref_id="CVE-2017-9405" ref_url="https://www.suse.com/security/cve/CVE-2017-9405/" source="CVE"/>
		<reference ref_id="CVE-2017-9407" ref_url="https://www.suse.com/security/cve/CVE-2017-9407/" source="CVE"/>
		<reference ref_id="CVE-2018-5357" ref_url="https://www.suse.com/security/cve/CVE-2018-5357/" source="CVE"/>
		<reference ref_id="CVE-2018-6405" ref_url="https://www.suse.com/security/cve/CVE-2018-6405/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2017-9405: A memory leak in the ReadICONImage function was fixed that could lead to DoS via memory exhaustion (bsc#1042911)
- CVE-2017-9407: In ImageMagick, the ReadPALMImage function in palm.c allowed attackers to cause a denial of service (memory leak) via a crafted file.  (bsc#1042824)
- CVE-2017-11166: In ReadXWDImage in coders\xwd.c a memoryleak could have caused memory exhaustion via a crafted length (bsc#1048110)
- CVE-2017-11170: ReadTGAImage in coders\tga.c allowed for memory exhaustion via invalid colors data in the header of a TGA or VST file (bsc#1048272)
- CVE-2017-11448: The ReadJPEGImage function in coders/jpeg.c in ImageMagick allowed remote attackers to obtain sensitive information from uninitialized memory locations via a crafted file.  (bsc#1049375)
- CVE-2017-11450: A remote denial of service in coders/jpeg.c was fixed (bsc#1049374)
- CVE-2017-11528: ReadDIBImage in coders/dib.c allows remote attackers to cause DoS via memory exhaustion (bsc#1050119)
- CVE-2017-11530: ReadEPTImage in coders/ept.c allows remote attackers to cause DoS via memory exhaustion (bsc#1050122)
- CVE-2017-11531: When ImageMagick processed a crafted file in convert, it could lead to a Memory Leak in the WriteHISTOGRAMImage() function in coders/histogram.c.  (bsc#1050126)
- CVE-2017-11533: A information leak by 1 byte due to heap-based buffer over-read in the WriteUILImage() in coders/uil.c was fixed (bsc#1050132)
- CVE-2017-11537: When ImageMagick processed a crafted file in convert, it can lead to a Floating Point Exception (FPE) in the WritePALMImage() function in coders/palm.c, related to an incorrect bits-per-pixel calculation.  (bsc#1050048)
- CVE-2017-11638, CVE-2017-11642: A NULL pointer dereference in theWriteMAPImage() in coders/map.c was fixed which could lead to a crash (bsc#1050617)
- CVE-2017-12418: ImageMagick had memory leaks in the parse8BIMW and format8BIM functions in coders/meta.c, related to the WriteImage function in MagickCore/constitute.c.  (bsc#1052207)
- CVE-2017-12427: ProcessMSLScript coders/msl.c allowed remote attackers to cause a DoS (bsc#1052248)
- CVE-2017-12429: A memory exhaustion flaw in ReadMIFFImage in coders/miff.c was fixed, which allowed attackers to cause DoS (bsc#1052251)
- CVE-2017-12432: In ImageMagick, a memory exhaustion vulnerability was found in the function ReadPCXImage in coders/pcx.c, which allowed attackers to cause a denial of service.  (bsc#1052254)
- CVE-2017-12566: A memory leak in ReadMVGImage in coders/mvg.c, could have allowed attackers to cause DoS (bsc#1052472)
- CVE-2017-12654: The ReadPICTImage function in coders/pict.c in ImageMagick allowed attackers to cause a denial of service (memory leak) via a crafted file.  (bsc#1052761)
- CVE-2017-12663: A memory leak in WriteMAPImage in coders/map.c was fixed that could lead to a DoS via memory exhaustion (bsc#1052754)
- CVE-2017-12664: ImageMagick had a memory leak vulnerability in WritePALMImage in coders/palm.c.  (bsc#1052750)
- CVE-2017-12665: ImageMagick had a memory leak vulnerability in WritePICTImage in coders/pict.c.  (bsc#1052747)
- CVE-2017-12668: ImageMagick had a memory leak vulnerability in WritePCXImage in coders/pcx.c. (bsc#1052688)
- CVE-2017-12674: A CPU exhaustion in ReadPDBImage in coders/pdb.c was fixed, which allowed attackers to cause DoS (bsc#1052711)
- CVE-2017-13058: In ImageMagick, a memory leak vulnerability was found in the function WritePCXImage in coders/pcx.c, which allowed attackers to cause a denial of service via a crafted file.  (bsc#1055069)
- CVE-2017-13131: A memory leak vulnerability was found in thefunction ReadMIFFImage in coders/miff.c, which allowed attackers tocause a denial of service (memory consumption in NewL (bsc#1055229)
- CVE-2017-14060: A NULL Pointer Dereference issue in the ReadCUTImage function in coders/cut.c was fixed that could have caused a Denial of Service (bsc#1056768)
- CVE-2017-14139: A memory leak vulnerability in WriteMSLImage in coders/msl.c was fixed. (bsc#1057163)
- CVE-2017-14224: A heap-based buffer overflow in WritePCXImage in coders/pcx.c  could lead to  denial of service or code execution. (bsc#1058009)
- CVE-2017-17682: A large loop vulnerability was fixed in ExtractPostscript in coders/wpg.c, which allowed attackers to cause a denial of service (CPU exhaustion) (bsc#1072898)
- CVE-2017-17885: In ImageMagick, a memory leak vulnerability was found in the function ReadPICTImage in coders/pict.c, which allowed attackers to cause a denial of service via a crafted PICT image file. (bsc#1074119)
- CVE-2017-17934: A memory leak in the function MSLPopImage and ProcessMSLScript could have lead to a denial of service (bsc#1074170)
- CVE-2017-18028: A memory exhaustion in the function ReadTIFFImage in coders/tiff.c was fixed. (bsc#1076182)
- CVE-2018-5357: ImageMagick had memory leaks in the ReadDCMImage function in coders/dcm.c.  (bsc#1075821)
- CVE-2018-6405: In the ReadDCMImage function in coders/dcm.c in ImageMagick, each redmap, greenmap, and bluemap variable can be overwritten by a new pointer. The previous pointer is lost, which leads to a memory leak. This allowed remote attackers to cause a denial of service. (bsc#1078433)


		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-01"/>
	<updated date="2018-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042824">SUSE bug 1042824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042911">SUSE bug 1042911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048110">SUSE bug 1048110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048272">SUSE bug 1048272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049374">SUSE bug 1049374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049375">SUSE bug 1049375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050048">SUSE bug 1050048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050119">SUSE bug 1050119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050122">SUSE bug 1050122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050126">SUSE bug 1050126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050132">SUSE bug 1050132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050617">SUSE bug 1050617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052207">SUSE bug 1052207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052248">SUSE bug 1052248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052251">SUSE bug 1052251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052254">SUSE bug 1052254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052472">SUSE bug 1052472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052688">SUSE bug 1052688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052711">SUSE bug 1052711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052747">SUSE bug 1052747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052750">SUSE bug 1052750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052754">SUSE bug 1052754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052761">SUSE bug 1052761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055069">SUSE bug 1055069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055229">SUSE bug 1055229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056768">SUSE bug 1056768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057163">SUSE bug 1057163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058009">SUSE bug 1058009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072898">SUSE bug 1072898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074119">SUSE bug 1074119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074170">SUSE bug 1074170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075821">SUSE bug 1075821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076182">SUSE bug 1076182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078433">SUSE bug 1078433</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11166/">CVE-2017-11166</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11170/">CVE-2017-11170</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-11448/">CVE-2017-11448</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11450/">CVE-2017-11450</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11528/">CVE-2017-11528</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11530/">CVE-2017-11530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11531/">CVE-2017-11531</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11533/">CVE-2017-11533</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11537/">CVE-2017-11537</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11638/">CVE-2017-11638</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11642/">CVE-2017-11642</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12418/">CVE-2017-12418</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12427/">CVE-2017-12427</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12429/">CVE-2017-12429</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12432/">CVE-2017-12432</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12566/">CVE-2017-12566</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12654/">CVE-2017-12654</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12663/">CVE-2017-12663</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12664/">CVE-2017-12664</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12665/">CVE-2017-12665</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12668/">CVE-2017-12668</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12674/">CVE-2017-12674</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13058/">CVE-2017-13058</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13131/">CVE-2017-13131</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14060/">CVE-2017-14060</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14139/">CVE-2017-14139</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14224/">CVE-2017-14224</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17682/">CVE-2017-17682</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17885/">CVE-2017-17885</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17934/">CVE-2017-17934</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-18028/">CVE-2017-18028</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9405/">CVE-2017-9405</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9407/">CVE-2017-9407</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5357/">CVE-2018-5357</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6405/">CVE-2018-6405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518974" comment="ImageMagick-6.8.8.1-71.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518975" comment="libMagick++-6_Q16-3-6.8.8.1-71.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518976" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518977" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518978" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78459" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1040107" ref_url="https://bugzilla.suse.com/1040107" source="BUGZILLA"/>
		<reference ref_id="1040114" ref_url="https://bugzilla.suse.com/1040114" source="BUGZILLA"/>
		<reference ref_id="1052522" ref_url="https://bugzilla.suse.com/1052522" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12596" ref_url="https://www.suse.com/security/cve/CVE-2017-12596/" source="CVE"/>
		<reference ref_id="CVE-2017-9110" ref_url="https://www.suse.com/security/cve/CVE-2017-9110/" source="CVE"/>
		<reference ref_id="CVE-2017-9114" ref_url="https://www.suse.com/security/cve/CVE-2017-9114/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003772.html" source="SUSE-SU"/>
		<description>
This update for openexr fixes the following issues:

* CVE-2017-9110: In OpenEXR, an invalid read of size 2 in the hufDecode function in ImfHuf.cpp could cause the application to crash. (bsc#1040107)
* CVE-2017-9114: In OpenEXR, an invalid read of size 1 in the refill function in ImfFastHuf.cpp could cause the application to crash.  (bsc#1040114)
* CVE-2017-12596: In OpenEXR, a crafted image causes a heap-based buffer over-read in the hufDecode function in IlmImf/ImfHuf.cpp during exrmaketiled execution; it could have resulted in denial of service or possibly unspecified other impact.  (bsc#1052522)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-02"/>
	<updated date="2018-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040107">SUSE bug 1040107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040114">SUSE bug 1040114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052522">SUSE bug 1052522</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12596/">CVE-2017-12596</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9110/">CVE-2017-9110</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9114/">CVE-2017-9114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518979" comment="libIlmImf-Imf_2_1-21-2.1.0-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518980" comment="libIlmImf-Imf_2_1-21-32bit-2.1.0-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518981" comment="openexr-2.1.0-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78460" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1042948" ref_url="https://bugzilla.suse.com/1042948" source="BUGZILLA"/>
		<reference ref_id="1049373" ref_url="https://bugzilla.suse.com/1049373" source="BUGZILLA"/>
		<reference ref_id="1051412" ref_url="https://bugzilla.suse.com/1051412" source="BUGZILLA"/>
		<reference ref_id="1052252" ref_url="https://bugzilla.suse.com/1052252" source="BUGZILLA"/>
		<reference ref_id="1052771" ref_url="https://bugzilla.suse.com/1052771" source="BUGZILLA"/>
		<reference ref_id="1058082" ref_url="https://bugzilla.suse.com/1058082" source="BUGZILLA"/>
		<reference ref_id="1072902" ref_url="https://bugzilla.suse.com/1072902" source="BUGZILLA"/>
		<reference ref_id="1074122" ref_url="https://bugzilla.suse.com/1074122" source="BUGZILLA"/>
		<reference ref_id="1074425" ref_url="https://bugzilla.suse.com/1074425" source="BUGZILLA"/>
		<reference ref_id="1074610" ref_url="https://bugzilla.suse.com/1074610" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000445" ref_url="https://www.suse.com/security/cve/CVE-2017-1000445/" source="CVE"/>
		<reference ref_id="CVE-2017-1000476" ref_url="https://www.suse.com/security/cve/CVE-2017-1000476/" source="CVE"/>
		<reference ref_id="CVE-2017-11449" ref_url="https://www.suse.com/security/cve/CVE-2017-11449/" source="CVE"/>
		<reference ref_id="CVE-2017-11751" ref_url="https://www.suse.com/security/cve/CVE-2017-11751/" source="CVE"/>
		<reference ref_id="CVE-2017-12430" ref_url="https://www.suse.com/security/cve/CVE-2017-12430/" source="CVE"/>
		<reference ref_id="CVE-2017-12642" ref_url="https://www.suse.com/security/cve/CVE-2017-12642/" source="CVE"/>
		<reference ref_id="CVE-2017-14249" ref_url="https://www.suse.com/security/cve/CVE-2017-14249/" source="CVE"/>
		<reference ref_id="CVE-2017-17680" ref_url="https://www.suse.com/security/cve/CVE-2017-17680/" source="CVE"/>
		<reference ref_id="CVE-2017-17882" ref_url="https://www.suse.com/security/cve/CVE-2017-17882/" source="CVE"/>
		<reference ref_id="CVE-2017-9409" ref_url="https://www.suse.com/security/cve/CVE-2017-9409/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003582.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2017-1000476: A CPU exhaustion vulnerability was found in the function
  ReadDDSInfo in coders/dds.c, which allowed attackers to cause a denial of
  service (bsc#1074610).
- CVE-2017-9409: The ReadMPCImage function in mpc.c allowed attackers to cause
  a denial of service (memory leak) via a crafted file (bsc#1042948).
- CVE-2017-1000445: A NULL pointer dereference in the MagickCore component
  might have lead to denial of service (bsc#1074425).
- CVE-2017-17680: Prevent a memory leak in the function ReadXPMImage in
  coders/xpm.c, which allowed attackers to cause a denial of service via a
  crafted XPM image file (a different vulnerability than CVE-2017-17882)
  (bsc#1072902).
- CVE-2017-17882: Prevent a memory leak in the function ReadXPMImage in
  coders/xpm.c, which allowed attackers to cause a denial of service via a
  crafted XPM image file (a different vulnerability than CVE-2017-17680)
  (bsc#1074122).
- CVE-2017-11449: coders/mpc did not enable seekable streams and thus could not
  validate blob sizes, which allowed remote attackers to cause a denial of
  service (application crash) or possibly have unspecified other impact via an
  image received from stdin (bsc#1049373).
- CVE-2017-12430: A memory exhaustion in the function ReadMPCImage in
  coders/mpc.c allowed attackers to cause DoS (bsc#1052252).
- CVE-2017-12642: Prevent a memory leak vulnerability in ReadMPCImage in
  coders\mpc.c via crafted file allowing for DoS (bsc#1052771).
- CVE-2017-14249: A mishandled EOF check in ReadMPCImage in coders/mpc.c that
  lead to a division by zero in GetPixelCacheTileSize in MagickCore/cache.c
  allowed remote attackers to cause a denial of service via a crafted file
  (bsc#1058082).
- Prevent memory leak via crafted file in pwp.c allowing for DoS (bsc#1051412)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-09"/>
	<updated date="2018-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042948">SUSE bug 1042948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049373">SUSE bug 1049373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051412">SUSE bug 1051412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052252">SUSE bug 1052252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052771">SUSE bug 1052771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058082">SUSE bug 1058082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072902">SUSE bug 1072902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074122">SUSE bug 1074122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074425">SUSE bug 1074425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074610">SUSE bug 1074610</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000445/">CVE-2017-1000445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000476/">CVE-2017-1000476</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11449/">CVE-2017-11449</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11751/">CVE-2017-11751</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12430/">CVE-2017-12430</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12642/">CVE-2017-12642</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14249/">CVE-2017-14249</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17680/">CVE-2017-17680</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17882/">CVE-2017-17882</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9409/">CVE-2017-9409</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518982" comment="ImageMagick-6.8.8.1-71.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518983" comment="libMagick++-6_Q16-3-6.8.8.1-71.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518984" comment="libMagickCore-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518985" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518986" comment="libMagickWand-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78461" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1081557" ref_url="https://bugzilla.suse.com/1081557" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18190" ref_url="https://www.suse.com/security/cve/CVE-2017-18190/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00023.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2017-18190: Removed localhost.localdomain from list
  of trustworthy hosts in scheduler/client.c to avoid arbitrary IPP
  command execution in conjunction with DNS rebinding.
  (bsc#1081557)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-05"/>
	<updated date="2018-03-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1081557">SUSE bug 1081557</bugzilla>
	<cve impact="important" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18190/">CVE-2017-18190</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518987" comment="cups-1.7.5-20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518988" comment="cups-client-1.7.5-20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518989" comment="cups-libs-1.7.5-20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518990" comment="cups-libs-32bit-1.7.5-20.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78462" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1021483" ref_url="https://bugzilla.suse.com/1021483" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10169" ref_url="https://www.suse.com/security/cve/CVE-2016-10169/" source="CVE"/>
		<reference ref_id="CVE-2016-10170" ref_url="https://www.suse.com/security/cve/CVE-2016-10170/" source="CVE"/>
		<reference ref_id="CVE-2016-10171" ref_url="https://www.suse.com/security/cve/CVE-2016-10171/" source="CVE"/>
		<reference ref_id="CVE-2016-10172" ref_url="https://www.suse.com/security/cve/CVE-2016-10172/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003788.html" source="SUSE-SU"/>
		<description>
This update for wavpack fixes the following issues:

- CVE-2016-10169 CVE-2016-10170 CVE-2016-10171 CVE-2016-10172: Make sure upper and lower boundaries make sense, to avoid out of bounds memory reads that could lead to crashes or disclosing memory. (bsc#1021483)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-05"/>
	<updated date="2018-03-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1021483">SUSE bug 1021483</bugzilla>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10169/">CVE-2016-10169</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10170/">CVE-2016-10170</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10171/">CVE-2016-10171</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10172/">CVE-2016-10172</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518991" comment="libwavpack1-4.60.99-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78463" version="1" class="patch">
	<metadata>
		<title>Security update for yaml-cpp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1032144" ref_url="https://bugzilla.suse.com/1032144" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5950" ref_url="https://www.suse.com/security/cve/CVE-2017-5950/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003791.html" source="SUSE-SU"/>
		<description>
This update for yaml-cpp fixes the following issues:

- CVE-2017-5950: Stack overflow in SingleDocParser::HandleNode() function (bsc#1032144)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-07"/>
	<updated date="2018-03-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1032144">SUSE bug 1032144</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5950/">CVE-2017-5950</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518992" comment="libyaml-cpp0_5-0.5.3-3.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78464" version="1" class="patch">
	<metadata>
		<title>Security update for shotwell (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1054311" ref_url="https://bugzilla.suse.com/1054311" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000024" ref_url="https://www.suse.com/security/cve/CVE-2017-1000024/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003794.html" source="SUSE-SU"/>
		<description>
This update for shotwell fixes the following issues:

Security issue fixed:

- CVE-2017-1000024: Use HTTPS encryption all over the publishing plugins (bsc#1054311).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-08"/>
	<updated date="2018-03-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1054311">SUSE bug 1054311</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000024/">CVE-2017-1000024</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518993" comment="shotwell-0.22.0+git.20160103-15.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518994" comment="shotwell-lang-0.22.0+git.20160103-15.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78465" version="1" class="patch">
	<metadata>
		<title>Security update for augeas (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1054171" ref_url="https://bugzilla.suse.com/1054171" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7555" ref_url="https://www.suse.com/security/cve/CVE-2017-7555/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003799.html" source="SUSE-SU"/>
		<description>
This update for augeas fixes the following issues:

Security issue fixed:

- CVE-2017-7555: Fix a memory corruption bug could have lead to arbitrary code execution
  by passing crafted strings that would be mis-handled by parse_name() (bsc#1054171).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-09"/>
	<updated date="2018-03-09"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1054171">SUSE bug 1054171</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7555/">CVE-2017-7555</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520526" comment="augeas-1.2.0-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520527" comment="augeas-lenses-1.2.0-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520528" comment="libaugeas0-1.2.0-17.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78466" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1081556" ref_url="https://bugzilla.suse.com/1081556" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12133" ref_url="https://www.suse.com/security/cve/CVE-2017-12133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003802.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2017-12133: Avoid use-after-free read access in clntudp_call (bsc#1081556)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-09"/>
	<updated date="2018-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081556">SUSE bug 1081556</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12133/">CVE-2017-12133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518998" comment="glibc-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518999" comment="glibc-32bit-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519000" comment="glibc-devel-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519001" comment="glibc-devel-32bit-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519002" comment="glibc-i18ndata-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519003" comment="glibc-locale-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519004" comment="glibc-locale-32bit-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519005" comment="nscd-2.22-62.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78467" version="1" class="patch">
	<metadata>
		<title>Security update for shadow (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1081294" ref_url="https://bugzilla.suse.com/1081294" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7169" ref_url="https://www.suse.com/security/cve/CVE-2018-7169/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003805.html" source="SUSE-SU"/>
		<description>
This update for shadow fixes the following issues:

- CVE-2018-7169: Fixed an privilege escalation in newgidmap,
  which allowed an unprivileged user to be placed in a user namespace where
  setgroups(2) is allowed. (bsc#1081294)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-12"/>
	<updated date="2018-03-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081294">SUSE bug 1081294</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7169/">CVE-2018-7169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519006" comment="shadow-4.2.1-27.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78468" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1076366" ref_url="https://bugzilla.suse.com/1076366" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2579" ref_url="https://www.suse.com/security/cve/CVE-2018-2579/" source="CVE"/>
		<reference ref_id="CVE-2018-2588" ref_url="https://www.suse.com/security/cve/CVE-2018-2588/" source="CVE"/>
		<reference ref_id="CVE-2018-2599" ref_url="https://www.suse.com/security/cve/CVE-2018-2599/" source="CVE"/>
		<reference ref_id="CVE-2018-2602" ref_url="https://www.suse.com/security/cve/CVE-2018-2602/" source="CVE"/>
		<reference ref_id="CVE-2018-2603" ref_url="https://www.suse.com/security/cve/CVE-2018-2603/" source="CVE"/>
		<reference ref_id="CVE-2018-2618" ref_url="https://www.suse.com/security/cve/CVE-2018-2618/" source="CVE"/>
		<reference ref_id="CVE-2018-2629" ref_url="https://www.suse.com/security/cve/CVE-2018-2629/" source="CVE"/>
		<reference ref_id="CVE-2018-2633" ref_url="https://www.suse.com/security/cve/CVE-2018-2633/" source="CVE"/>
		<reference ref_id="CVE-2018-2634" ref_url="https://www.suse.com/security/cve/CVE-2018-2634/" source="CVE"/>
		<reference ref_id="CVE-2018-2637" ref_url="https://www.suse.com/security/cve/CVE-2018-2637/" source="CVE"/>
		<reference ref_id="CVE-2018-2641" ref_url="https://www.suse.com/security/cve/CVE-2018-2641/" source="CVE"/>
		<reference ref_id="CVE-2018-2663" ref_url="https://www.suse.com/security/cve/CVE-2018-2663/" source="CVE"/>
		<reference ref_id="CVE-2018-2677" ref_url="https://www.suse.com/security/cve/CVE-2018-2677/" source="CVE"/>
		<reference ref_id="CVE-2018-2678" ref_url="https://www.suse.com/security/cve/CVE-2018-2678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00031.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Security issues fixed in OpenJDK 7u171 (January 2018 CPU)(bsc#1076366):

- CVE-2018-2579: Improve key keying case
- CVE-2018-2588: Improve LDAP logins
- CVE-2018-2599: Improve reliability of DNS lookups
- CVE-2018-2602: Improve usage messages
- CVE-2018-2603: Improve PKCS usage
- CVE-2018-2618: Stricter key generation
- CVE-2018-2629: Improve GSS handling
- CVE-2018-2633: Improve LDAP lookup robustness
- CVE-2018-2634: Improve property negotiations
- CVE-2018-2637: Improve JMX supportive features
- CVE-2018-2641: Improve GTK initialization
- CVE-2018-2663: More refactoring for deserialization cases
- CVE-2018-2677: More refactoring for client deserialization cases
- CVE-2018-2678: More refactoring for naming
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-12"/>
	<updated date="2018-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2579/">CVE-2018-2579</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2588/">CVE-2018-2588</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2599/">CVE-2018-2599</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2602/">CVE-2018-2602</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2603/">CVE-2018-2603</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2618/">CVE-2018-2618</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2629/">CVE-2018-2629</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2633/">CVE-2018-2633</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2634/">CVE-2018-2634</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2637/">CVE-2018-2637</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2641/">CVE-2018-2641</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2663/">CVE-2018-2663</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2677/">CVE-2018-2677</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2678/">CVE-2018-2678</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519007" comment="java-1_7_0-openjdk-1.7.0.171-43.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519008" comment="java-1_7_0-openjdk-headless-1.7.0.171-43.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78469" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1076366" ref_url="https://bugzilla.suse.com/1076366" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2579" ref_url="https://www.suse.com/security/cve/CVE-2018-2579/" source="CVE"/>
		<reference ref_id="CVE-2018-2582" ref_url="https://www.suse.com/security/cve/CVE-2018-2582/" source="CVE"/>
		<reference ref_id="CVE-2018-2588" ref_url="https://www.suse.com/security/cve/CVE-2018-2588/" source="CVE"/>
		<reference ref_id="CVE-2018-2599" ref_url="https://www.suse.com/security/cve/CVE-2018-2599/" source="CVE"/>
		<reference ref_id="CVE-2018-2602" ref_url="https://www.suse.com/security/cve/CVE-2018-2602/" source="CVE"/>
		<reference ref_id="CVE-2018-2603" ref_url="https://www.suse.com/security/cve/CVE-2018-2603/" source="CVE"/>
		<reference ref_id="CVE-2018-2618" ref_url="https://www.suse.com/security/cve/CVE-2018-2618/" source="CVE"/>
		<reference ref_id="CVE-2018-2629" ref_url="https://www.suse.com/security/cve/CVE-2018-2629/" source="CVE"/>
		<reference ref_id="CVE-2018-2633" ref_url="https://www.suse.com/security/cve/CVE-2018-2633/" source="CVE"/>
		<reference ref_id="CVE-2018-2634" ref_url="https://www.suse.com/security/cve/CVE-2018-2634/" source="CVE"/>
		<reference ref_id="CVE-2018-2637" ref_url="https://www.suse.com/security/cve/CVE-2018-2637/" source="CVE"/>
		<reference ref_id="CVE-2018-2641" ref_url="https://www.suse.com/security/cve/CVE-2018-2641/" source="CVE"/>
		<reference ref_id="CVE-2018-2663" ref_url="https://www.suse.com/security/cve/CVE-2018-2663/" source="CVE"/>
		<reference ref_id="CVE-2018-2677" ref_url="https://www.suse.com/security/cve/CVE-2018-2677/" source="CVE"/>
		<reference ref_id="CVE-2018-2678" ref_url="https://www.suse.com/security/cve/CVE-2018-2678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Security issues fix in jdk8u161 (icedtea 3.7.0)(bsc#1076366):

- CVE-2018-2579: Improve key keying case
- CVE-2018-2582: Better interface invocations
- CVE-2018-2588: Improve LDAP logins
- CVE-2018-2599: Improve reliability of DNS lookups
- CVE-2018-2602: Improve usage messages
- CVE-2018-2603: Improve PKCS usage
- CVE-2018-2618: Stricter key generation
- CVE-2018-2629: Improve GSS handling
- CVE-2018-2633: Improve LDAP lookup robustness
- CVE-2018-2634: Improve property negotiations
- CVE-2018-2637: Improve JMX supportive features
- CVE-2018-2641: Improve GTK initialization
- CVE-2018-2663: More refactoring for deserialization cases
- CVE-2018-2677: More refactoring for client deserialization cases
- CVE-2018-2678: More refactoring for naming deserialization cases
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-12"/>
	<updated date="2018-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2579/">CVE-2018-2579</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2582/">CVE-2018-2582</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2588/">CVE-2018-2588</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2599/">CVE-2018-2599</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2602/">CVE-2018-2602</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2603/">CVE-2018-2603</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2618/">CVE-2018-2618</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2629/">CVE-2018-2629</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2633/">CVE-2018-2633</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2634/">CVE-2018-2634</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2637/">CVE-2018-2637</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2641/">CVE-2018-2641</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2663/">CVE-2018-2663</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2677/">CVE-2018-2677</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2678/">CVE-2018-2678</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519009" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519010" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78470" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1077355" ref_url="https://bugzilla.suse.com/1077355" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1142857" ref_url="https://www.suse.com/security/cve/CVE-2015-1142857/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003812.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

- CVE-2015-1142857: Add 7.13.1.0 bnx2x firmware files to fix a ethernet flow control
  vulnerability in SRIOV devices (bsc#1077355)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-14"/>
	<updated date="2018-03-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077355">SUSE bug 1077355</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-1142857/">CVE-2015-1142857</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519012" comment="kernel-firmware-20170530-21.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519013" comment="ucode-amd-20170530-21.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78471" version="1" class="patch">
	<metadata>
		<title>Security update for libcdio (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1082877" ref_url="https://bugzilla.suse.com/1082877" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18201" ref_url="https://www.suse.com/security/cve/CVE-2017-18201/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003811.html" source="SUSE-SU"/>
		<description>
This update for libcdio fixes the following issues:

- CVE-2017-18201: Fixed a double free vulnerability (bsc#1082877).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-14"/>
	<updated date="2018-03-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1082877">SUSE bug 1082877</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18201/">CVE-2017-18201</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519014" comment="libcdio14-0.90-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519015" comment="libcdio14-32bit-0.90-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519016" comment="libiso9660-8-0.90-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78472" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1078431" ref_url="https://bugzilla.suse.com/1078431" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2562" ref_url="https://www.suse.com/security/cve/CVE-2018-2562/" source="CVE"/>
		<reference ref_id="CVE-2018-2612" ref_url="https://www.suse.com/security/cve/CVE-2018-2612/" source="CVE"/>
		<reference ref_id="CVE-2018-2622" ref_url="https://www.suse.com/security/cve/CVE-2018-2622/" source="CVE"/>
		<reference ref_id="CVE-2018-2640" ref_url="https://www.suse.com/security/cve/CVE-2018-2640/" source="CVE"/>
		<reference ref_id="CVE-2018-2665" ref_url="https://www.suse.com/security/cve/CVE-2018-2665/" source="CVE"/>
		<reference ref_id="CVE-2018-2668" ref_url="https://www.suse.com/security/cve/CVE-2018-2668/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00040.html" source="SUSE-SU"/>
		<description>

  
This update for mariadb fixes the following issues:

MariaDB was updated to 10.0.34 (bsc#1078431)

The following security vulnerabilities are fixed:

- CVE-2018-2562: Vulnerability in the MySQL Server subcomponent: Server : Partition. Easily exploitable vulnerability allowed low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data.
- CVE-2018-2622: Vulnerability in the MySQL Server subcomponent: Server: DDL. Easily exploitable vulnerability allowed low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
- CVE-2018-2640: Vulnerability in the MySQL Server subcomponent: Server: Optimizer. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
- CVE-2018-2665: Vulnerability in the MySQL Server subcomponent: Server: Optimizer. Easily exploitable vulnerability allowed low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
- CVE-2018-2668: Vulnerability in the MySQL Server subcomponent: Server: Optimizer. Easily exploitable vulnerability allowed low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
- CVE-2018-2612: Vulnerability in the MySQL Server subcomponent: InnoDB. Easily exploitable vulnerability allowed high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.


The MariaDB external release notes and changelog for this release:

* https://kb.askmonty.org/en/mariadb-10034-release-notes
* https://kb.askmonty.org/en/mariadb-10034-changelog

		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-15"/>
	<updated date="2018-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1078431">SUSE bug 1078431</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-2562/">CVE-2018-2562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2612/">CVE-2018-2612</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2622/">CVE-2018-2622</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2640/">CVE-2018-2640</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2665/">CVE-2018-2665</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2668/">CVE-2018-2668</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519017" comment="libmysqlclient18-10.0.34-29.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519018" comment="libmysqlclient18-32bit-10.0.34-29.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519019" comment="libmysqlclient_r18-10.0.34-29.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519020" comment="libmysqlclient_r18-32bit-10.0.34-29.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519021" comment="mariadb-10.0.34-29.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519022" comment="mariadb-client-10.0.34-29.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519023" comment="mariadb-errormessages-10.0.34-29.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78473" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1085207" ref_url="https://bugzilla.suse.com/1085207" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0708-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00044.html" source="SUSE-SU"/>
		<description>

This update for ucode-intel fixes the following issues:

The Intel CPU microcode version was updated to version 20180312.

This update enables the IBPB+IBRS based mitigations of the Spectre v2 flaws (boo#1085207 CVE-2017-5715)

- New Platforms

  - BDX-DE EGW A0 6-56-5:10 e000009
  - SKX B1 6-55-3:97 1000140

- Updates

  - SNB D2 6-2a-7:12 29-&gt;2d
  - JKT C1 6-2d-6:6d 619-&gt;61c
  - JKT C2 6-2d-7:6d 710-&gt;713
  - IVB E2 6-3a-9:12 1c-&gt;1f
  - IVT C0 6-3e-4:ed 428-&gt;42c
  - IVT D1 6-3e-7:ed 70d-&gt;713
  - HSW Cx/Dx 6-3c-3:32 22-&gt;24
  - HSW-ULT Cx/Dx 6-45-1:72 20-&gt;23
  - CRW Cx 6-46-1:32 17-&gt;19
  - HSX C0 6-3f-2:6f 3a-&gt;3c
  - HSX-EX E0 6-3f-4:80 0f-&gt;11
  - BDW-U/Y E/F 6-3d-4:c0 25-&gt;2a
  - BDW-H E/G 6-47-1:22 17-&gt;1d
  - BDX-DE V0/V1 6-56-2:10 0f-&gt;15
  - BDW-DE V2 6-56-3:10 700000d-&gt;7000012
  - BDW-DE Y0 6-56-4:10 f00000a-&gt;f000011
  - SKL-U/Y D0 6-4e-3:c0 ba-&gt;c2
  - SKL R0 6-5e-3:36 ba-&gt;c2
  - KBL-U/Y H0 6-8e-9:c0 62-&gt;84
  - KBL B0 6-9e-9:2a 5e-&gt;84
  - CFL D0 6-8e-a:c0 70-&gt;84
  - CFL U0 6-9e-a:22 70-&gt;84
  - CFL B0 6-9e-b:02 72-&gt;84
  - SKX H0 6-55-4:b7 2000035-&gt;2000043
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-16"/>
	<updated date="2018-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085207">SUSE bug 1085207</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519024" comment="ucode-intel-20180312-13.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78474" version="1" class="patch">
	<metadata>
		<title>Security update for libid3tag (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1081959" ref_url="https://bugzilla.suse.com/1081959" source="BUGZILLA"/>
		<reference ref_id="1081961" ref_url="https://bugzilla.suse.com/1081961" source="BUGZILLA"/>
		<reference ref_id="1081962" ref_url="https://bugzilla.suse.com/1081962" source="BUGZILLA"/>
		<reference ref_id="387731" ref_url="https://bugzilla.suse.com/387731" source="BUGZILLA"/>
		<reference ref_id="CVE-2004-2779" ref_url="https://www.suse.com/security/cve/CVE-2004-2779/" source="CVE"/>
		<reference ref_id="CVE-2008-2109" ref_url="https://www.suse.com/security/cve/CVE-2008-2109/" source="CVE"/>
		<reference ref_id="CVE-2017-11550" ref_url="https://www.suse.com/security/cve/CVE-2017-11550/" source="CVE"/>
		<reference ref_id="CVE-2017-11551" ref_url="https://www.suse.com/security/cve/CVE-2017-11551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003823.html" source="SUSE-SU"/>
		<description>
This update for libid3tag fixes the following issues:

- CVE-2004-2779 CVE-2017-11551: Fixed id3_utf16_deserialize() in utf16.c,
  which previously misparsed ID3v2 tags encoded in UTF-16 with an odd
  number of bytes, triggering an endless loop allocating memory until
  OOM leading to DoS. (bsc#1081959 bsc#1081961)
- CVE-2017-11550 CVE-2008-2109: Fixed the handling of unknown
  encodings when parsing ID3 tags. (bsc#1081962 bsc#387731)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-16"/>
	<updated date="2018-03-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081959">SUSE bug 1081959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081961">SUSE bug 1081961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081962">SUSE bug 1081962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/387731">SUSE bug 387731</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2004-2779/">CVE-2004-2779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2109/">CVE-2008-2109</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11550/">CVE-2017-11550</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11551/">CVE-2017-11551</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519025" comment="libid3tag0-0.15.1b-184.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78475" version="1" class="patch">
	<metadata>
		<title>Security update for samba, talloc, tevent (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1069666" ref_url="https://bugzilla.suse.com/1069666" source="BUGZILLA"/>
		<reference ref_id="1081741" ref_url="https://bugzilla.suse.com/1081741" source="BUGZILLA"/>
		<reference ref_id="1084191" ref_url="https://bugzilla.suse.com/1084191" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1050" ref_url="https://www.suse.com/security/cve/CVE-2018-1050/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003827.html" source="SUSE-SU"/>
		<description>


Samba was updated to version 4.6.13 to fix several bugs. (bsc#1084191)

Security issue fixed:

- CVE-2018-1050: DOS vulnerability when SPOOLSS is run externally (bsc#1081741).

The library talloc was updated to version 2.1.10:

- build, documentation and python3 improvements

The library tevent was updated to version 0.9.34 (bsc#1069666);

- Remove unused select backend
- Fix a race condition in tevent_threaded_schedule_immediate(); (bso#13130);
- make tevent_req_print() more robust against crashes
- Fix mutex locking in tevent_threaded_context_destructor().
- Re-init threading in tevent_re_initialise().
- Include the finish location in tevent_req_default_print().

		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-21"/>
	<updated date="2018-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1069666">SUSE bug 1069666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081741">SUSE bug 1081741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084191">SUSE bug 1084191</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1050/">CVE-2018-1050</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520529" comment="libdcerpc-binding0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520530" comment="libdcerpc-binding0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520531" comment="libdcerpc0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520532" comment="libdcerpc0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520533" comment="libndr-krb5pac0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520534" comment="libndr-krb5pac0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520535" comment="libndr-nbt0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520536" comment="libndr-nbt0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520537" comment="libndr-standard0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520538" comment="libndr-standard0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520539" comment="libndr0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520540" comment="libndr0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520541" comment="libnetapi0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520542" comment="libnetapi0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520543" comment="libsamba-credentials0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520544" comment="libsamba-credentials0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520545" comment="libsamba-errors0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520546" comment="libsamba-errors0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520547" comment="libsamba-hostconfig0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520548" comment="libsamba-hostconfig0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520549" comment="libsamba-passdb0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520550" comment="libsamba-passdb0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520551" comment="libsamba-util0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520552" comment="libsamba-util0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520553" comment="libsamdb0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520554" comment="libsamdb0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520555" comment="libsmbclient0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520556" comment="libsmbclient0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520557" comment="libsmbconf0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520558" comment="libsmbconf0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520559" comment="libsmbldap0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520560" comment="libsmbldap0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520561" comment="libtalloc2-2.1.10-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520562" comment="libtalloc2-32bit-2.1.10-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520563" comment="libtevent-util0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520564" comment="libtevent-util0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520565" comment="libtevent0-0.9.34-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520566" comment="libtevent0-32bit-0.9.34-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520567" comment="libwbclient0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520568" comment="libwbclient0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520569" comment="python-talloc-2.1.10-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520570" comment="python-talloc-32bit-2.1.10-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520571" comment="samba-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520572" comment="samba-client-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520573" comment="samba-client-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520574" comment="samba-doc-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520575" comment="samba-libs-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520576" comment="samba-libs-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520577" comment="samba-winbind-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520578" comment="samba-winbind-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78476" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1081925" ref_url="https://bugzilla.suse.com/1081925" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1058" ref_url="https://www.suse.com/security/cve/CVE-2018-1058/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003829.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

Security issues fixed:

- CVE-2018-1058: Fixed uncontrolled search path element in pg_dump and other client applications (bsc#1081925).


Bug fixes:

- See release notes for details:
  * https://www.postgresql.org/docs/9.6/static/release-9-6-8.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-21"/>
	<updated date="2018-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081925">SUSE bug 1081925</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1058/">CVE-2018-1058</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519026" comment="libecpg6-9.6.8-3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519027" comment="libpq5-9.6.8-3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519028" comment="libpq5-32bit-9.6.8-3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519029" comment="postgresql96-9.6.8-3.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78477" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1040202" ref_url="https://bugzilla.suse.com/1040202" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068613" ref_url="https://bugzilla.suse.com/1068613" source="BUGZILLA"/>
		<reference ref_id="1070144" ref_url="https://bugzilla.suse.com/1070144" source="BUGZILLA"/>
		<reference ref_id="1071228" ref_url="https://bugzilla.suse.com/1071228" source="BUGZILLA"/>
		<reference ref_id="1073489" ref_url="https://bugzilla.suse.com/1073489" source="BUGZILLA"/>
		<reference ref_id="1074572" ref_url="https://bugzilla.suse.com/1074572" source="BUGZILLA"/>
		<reference ref_id="1076114" ref_url="https://bugzilla.suse.com/1076114" source="BUGZILLA"/>
		<reference ref_id="1076775" ref_url="https://bugzilla.suse.com/1076775" source="BUGZILLA"/>
		<reference ref_id="1076813" ref_url="https://bugzilla.suse.com/1076813" source="BUGZILLA"/>
		<reference ref_id="1082276" ref_url="https://bugzilla.suse.com/1082276" source="BUGZILLA"/>
		<reference ref_id="1083291" ref_url="https://bugzilla.suse.com/1083291" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15119" ref_url="https://www.suse.com/security/cve/CVE-2017-15119/" source="CVE"/>
		<reference ref_id="CVE-2017-15124" ref_url="https://www.suse.com/security/cve/CVE-2017-15124/" source="CVE"/>
		<reference ref_id="CVE-2017-16845" ref_url="https://www.suse.com/security/cve/CVE-2017-16845/" source="CVE"/>
		<reference ref_id="CVE-2017-17381" ref_url="https://www.suse.com/security/cve/CVE-2017-17381/" source="CVE"/>
		<reference ref_id="CVE-2017-18043" ref_url="https://www.suse.com/security/cve/CVE-2017-18043/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-5683" ref_url="https://www.suse.com/security/cve/CVE-2018-5683/" source="CVE"/>
		<reference ref_id="CVE-2018-7550" ref_url="https://www.suse.com/security/cve/CVE-2018-7550/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00051.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

This update has the next round of Spectre v2 related patches, which
now integrate with corresponding changes in libvirt. (CVE-2017-5715
bsc#1068032)

The January 2018 release of qemu initially addressed the Spectre v2
vulnerability for KVM guests by exposing the spec-ctrl feature
for all x86 vcpu types, which was the quick and dirty approach,
but not the proper solution.

We replaced our initial patch by the patches from upstream.

This update defines spec_ctrl and ibpb cpu feature flags as well as new
cpu models which are clones of existing models with either -IBRS or -IBPB
added to the end of the model name. These new vcpu models explicitly
include the new feature(s), whereas the feature flags can be added
to the cpu parameter as with other features. In short, for continued
Spectre v2 protection, ensure that either the appropriate cpu feature
flag is added to the QEMU command-line, or one of the new cpu models is
used.

Although migration from older versions is supported, the new cpu
features won't be properly exposed to the guest until it is restarted
with the cpu features explicitly added. A reboot is insufficient.

A warning patch is added which attempts to detect a migration
from a qemu version which had the quick and dirty fix (it only
detects certain cases, but hopefully is helpful.)
For additional information on Spectre v2 as it relates to QEMU,
see:
        https://www.qemu.org/2018/02/14/qemu-2-11-1-and-spectre-update/

A patch is added to continue to detect Spectre v2 mitigation
features (as shown by cpuid), and if found provide that feature
to guests, even if running on older KVM (kernel) versions which
do not yet expose that feature to QEMU. (bsc#1082276)

These two patches will be removed when we can reasonably assume
everyone is running with the appropriate updates.

Spectre fixes for IBM Z Series were included by providing more hw features
to guests (bsc#1076813)

Also security fixes for the following CVE issues are included:

- CVE-2017-17381: The Virtio Vring implementation in QEMU allowed local OS guest users to cause a denial of service (divide-by-zero error and QEMU process crash) by unsetting vring alignment while updating Virtio rings. (bsc#1071228)
- CVE-2017-16845: The PS2 driver in Qemu did not validate 'rptr' and 'count' values during guest migration, leading to out-of-bounds access. (bsc#1068613)
- CVE-2017-15119: The Network Block Device (NBD) server in Quick Emulator (QEMU), was vulnerable to a denial of service issue. It could occur if a client sent large option requests, making the server waste CPU time on reading up to 4GB per request. A client could use this flaw to keep the NBD server from serving other requests, resulting in DoS. (bsc#1070144)
- CVE-2017-18043: Integer overflow in the macro ROUND_UP (n, d) in Quick Emulator (Qemu) allowed a user to cause a denial of service (Qemu process crash). (bsc#1076775)
- CVE-2018-5683: The VGA driver in Qemu allowed local OS guest privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging improper memory address validation. (bsc#1076114)
- CVE-2018-7550: The multiboot functionality in Quick Emulator (aka QEMU) allowed local guest OS users to execute arbitrary code on the QEMU host via an out-of-bounds read or write memory access. (bsc#1083291)
- CVE-2017-15124: VNC server implementation in Quick Emulator (QEMU) was found to be vulnerable to an unbounded memory allocation issue, as it did not throttle the framebuffer updates sent to its client. If the client did not consume these updates, VNC server allocates growing memory to hold onto this data. A malicious remote VNC client could use this flaw to cause DoS to the server host. (bsc#1073489)

Additional bugs fixed:

- Fix pcihp for 1.6 and older machine types (bsc#1074572)
- Fix packaging dependencies (coreutils) for qemu-ksm package (bsc#1040202)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-21"/>
	<updated date="2018-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040202">SUSE bug 1040202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068613">SUSE bug 1068613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070144">SUSE bug 1070144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071228">SUSE bug 1071228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073489">SUSE bug 1073489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074572">SUSE bug 1074572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076114">SUSE bug 1076114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076775">SUSE bug 1076775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076813">SUSE bug 1076813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082276">SUSE bug 1082276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083291">SUSE bug 1083291</bugzilla>
	<cve impact="low" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15119/">CVE-2017-15119</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15124/">CVE-2017-15124</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16845/">CVE-2017-16845</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17381/">CVE-2017-17381</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18043/">CVE-2017-18043</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5683/">CVE-2018-5683</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7550/">CVE-2018-7550</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520579" comment="qemu-2.9.1-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520580" comment="qemu-block-curl-2.9.1-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520581" comment="qemu-ipxe-1.0.0-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520582" comment="qemu-kvm-2.9.1-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520583" comment="qemu-seabios-1.10.2-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520584" comment="qemu-sgabios-8-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520585" comment="qemu-tools-2.9.1-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520586" comment="qemu-vgabios-1.10.2-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520587" comment="qemu-x86-2.9.1-6.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78478" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1084521" ref_url="https://bugzilla.suse.com/1084521" source="BUGZILLA"/>
		<reference ref_id="1084524" ref_url="https://bugzilla.suse.com/1084524" source="BUGZILLA"/>
		<reference ref_id="1084532" ref_url="https://bugzilla.suse.com/1084532" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000120" ref_url="https://www.suse.com/security/cve/CVE-2018-1000120/" source="CVE"/>
		<reference ref_id="CVE-2018-1000121" ref_url="https://www.suse.com/security/cve/CVE-2018-1000121/" source="CVE"/>
		<reference ref_id="CVE-2018-1000122" ref_url="https://www.suse.com/security/cve/CVE-2018-1000122/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0769-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180769-1.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Following security issues were fixed:

- CVE-2018-1000120: A buffer overflow exists in the FTP URL handling that allowed an attacker to cause a denial of service or possible code execution (bsc#1084521).
- CVE-2018-1000121: A NULL pointer dereference exists in the LDAP code that allowed an attacker to cause a denial of service (bsc#1084524).
- CVE-2018-1000122: A buffer over-read exists in the RTSP+RTP handling code that allowed an attacker to cause a denial of service or information leakage (bsc#1084532).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-22"/>
	<updated date="2018-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1084521">SUSE bug 1084521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084524">SUSE bug 1084524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084532">SUSE bug 1084532</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000120/">CVE-2018-1000120</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000121/">CVE-2018-1000121</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000122/">CVE-2018-1000122</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519030" comment="curl-7.37.0-37.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519031" comment="libcurl4-7.37.0-37.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519032" comment="libcurl4-32bit-7.37.0-37.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78479" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1085687" ref_url="https://bugzilla.suse.com/1085687" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003834.html" source="SUSE-SU"/>
		<description>
This update for libvorbis fixes the following issues:

- CVE-2018-5146: Fixed out of bounds memory write while processing Vorbis audio data (bsc#1085687).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-23"/>
	<updated date="2018-03-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085687">SUSE bug 1085687</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519033" comment="libvorbis0-1.3.3-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519034" comment="libvorbis0-32bit-1.3.3-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519035" comment="libvorbisenc2-1.3.3-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519036" comment="libvorbisenc2-32bit-1.3.3-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519037" comment="libvorbisfile3-1.3.3-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519038" comment="libvorbisfile3-32bit-1.3.3-10.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78480" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1006867" ref_url="https://bugzilla.suse.com/1006867" source="BUGZILLA"/>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1015342" ref_url="https://bugzilla.suse.com/1015342" source="BUGZILLA"/>
		<reference ref_id="1015343" ref_url="https://bugzilla.suse.com/1015343" source="BUGZILLA"/>
		<reference ref_id="1020645" ref_url="https://bugzilla.suse.com/1020645" source="BUGZILLA"/>
		<reference ref_id="1022607" ref_url="https://bugzilla.suse.com/1022607" source="BUGZILLA"/>
		<reference ref_id="1024376" ref_url="https://bugzilla.suse.com/1024376" source="BUGZILLA"/>
		<reference ref_id="1027054" ref_url="https://bugzilla.suse.com/1027054" source="BUGZILLA"/>
		<reference ref_id="1031717" ref_url="https://bugzilla.suse.com/1031717" source="BUGZILLA"/>
		<reference ref_id="1033587" ref_url="https://bugzilla.suse.com/1033587" source="BUGZILLA"/>
		<reference ref_id="1034503" ref_url="https://bugzilla.suse.com/1034503" source="BUGZILLA"/>
		<reference ref_id="1042286" ref_url="https://bugzilla.suse.com/1042286" source="BUGZILLA"/>
		<reference ref_id="1043441" ref_url="https://bugzilla.suse.com/1043441" source="BUGZILLA"/>
		<reference ref_id="1043725" ref_url="https://bugzilla.suse.com/1043725" source="BUGZILLA"/>
		<reference ref_id="1043726" ref_url="https://bugzilla.suse.com/1043726" source="BUGZILLA"/>
		<reference ref_id="1062840" ref_url="https://bugzilla.suse.com/1062840" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065615" ref_url="https://bugzilla.suse.com/1065615" source="BUGZILLA"/>
		<reference ref_id="1066223" ref_url="https://bugzilla.suse.com/1066223" source="BUGZILLA"/>
		<reference ref_id="1067118" ref_url="https://bugzilla.suse.com/1067118" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068569" ref_url="https://bugzilla.suse.com/1068569" source="BUGZILLA"/>
		<reference ref_id="1069135" ref_url="https://bugzilla.suse.com/1069135" source="BUGZILLA"/>
		<reference ref_id="1070404" ref_url="https://bugzilla.suse.com/1070404" source="BUGZILLA"/>
		<reference ref_id="1071306" ref_url="https://bugzilla.suse.com/1071306" source="BUGZILLA"/>
		<reference ref_id="1071892" ref_url="https://bugzilla.suse.com/1071892" source="BUGZILLA"/>
		<reference ref_id="1072363" ref_url="https://bugzilla.suse.com/1072363" source="BUGZILLA"/>
		<reference ref_id="1072689" ref_url="https://bugzilla.suse.com/1072689" source="BUGZILLA"/>
		<reference ref_id="1072739" ref_url="https://bugzilla.suse.com/1072739" source="BUGZILLA"/>
		<reference ref_id="1072865" ref_url="https://bugzilla.suse.com/1072865" source="BUGZILLA"/>
		<reference ref_id="1073401" ref_url="https://bugzilla.suse.com/1073401" source="BUGZILLA"/>
		<reference ref_id="1073407" ref_url="https://bugzilla.suse.com/1073407" source="BUGZILLA"/>
		<reference ref_id="1074198" ref_url="https://bugzilla.suse.com/1074198" source="BUGZILLA"/>
		<reference ref_id="1074426" ref_url="https://bugzilla.suse.com/1074426" source="BUGZILLA"/>
		<reference ref_id="1075087" ref_url="https://bugzilla.suse.com/1075087" source="BUGZILLA"/>
		<reference ref_id="1076282" ref_url="https://bugzilla.suse.com/1076282" source="BUGZILLA"/>
		<reference ref_id="1076693" ref_url="https://bugzilla.suse.com/1076693" source="BUGZILLA"/>
		<reference ref_id="1076760" ref_url="https://bugzilla.suse.com/1076760" source="BUGZILLA"/>
		<reference ref_id="1076982" ref_url="https://bugzilla.suse.com/1076982" source="BUGZILLA"/>
		<reference ref_id="1077241" ref_url="https://bugzilla.suse.com/1077241" source="BUGZILLA"/>
		<reference ref_id="1077285" ref_url="https://bugzilla.suse.com/1077285" source="BUGZILLA"/>
		<reference ref_id="1077513" ref_url="https://bugzilla.suse.com/1077513" source="BUGZILLA"/>
		<reference ref_id="1077560" ref_url="https://bugzilla.suse.com/1077560" source="BUGZILLA"/>
		<reference ref_id="1077779" ref_url="https://bugzilla.suse.com/1077779" source="BUGZILLA"/>
		<reference ref_id="1078583" ref_url="https://bugzilla.suse.com/1078583" source="BUGZILLA"/>
		<reference ref_id="1078672" ref_url="https://bugzilla.suse.com/1078672" source="BUGZILLA"/>
		<reference ref_id="1078673" ref_url="https://bugzilla.suse.com/1078673" source="BUGZILLA"/>
		<reference ref_id="1078787" ref_url="https://bugzilla.suse.com/1078787" source="BUGZILLA"/>
		<reference ref_id="1079029" ref_url="https://bugzilla.suse.com/1079029" source="BUGZILLA"/>
		<reference ref_id="1079038" ref_url="https://bugzilla.suse.com/1079038" source="BUGZILLA"/>
		<reference ref_id="1079195" ref_url="https://bugzilla.suse.com/1079195" source="BUGZILLA"/>
		<reference ref_id="1079313" ref_url="https://bugzilla.suse.com/1079313" source="BUGZILLA"/>
		<reference ref_id="1079384" ref_url="https://bugzilla.suse.com/1079384" source="BUGZILLA"/>
		<reference ref_id="1079609" ref_url="https://bugzilla.suse.com/1079609" source="BUGZILLA"/>
		<reference ref_id="1079886" ref_url="https://bugzilla.suse.com/1079886" source="BUGZILLA"/>
		<reference ref_id="1079989" ref_url="https://bugzilla.suse.com/1079989" source="BUGZILLA"/>
		<reference ref_id="1080014" ref_url="https://bugzilla.suse.com/1080014" source="BUGZILLA"/>
		<reference ref_id="1080263" ref_url="https://bugzilla.suse.com/1080263" source="BUGZILLA"/>
		<reference ref_id="1080321" ref_url="https://bugzilla.suse.com/1080321" source="BUGZILLA"/>
		<reference ref_id="1080344" ref_url="https://bugzilla.suse.com/1080344" source="BUGZILLA"/>
		<reference ref_id="1080364" ref_url="https://bugzilla.suse.com/1080364" source="BUGZILLA"/>
		<reference ref_id="1080384" ref_url="https://bugzilla.suse.com/1080384" source="BUGZILLA"/>
		<reference ref_id="1080464" ref_url="https://bugzilla.suse.com/1080464" source="BUGZILLA"/>
		<reference ref_id="1080533" ref_url="https://bugzilla.suse.com/1080533" source="BUGZILLA"/>
		<reference ref_id="1080656" ref_url="https://bugzilla.suse.com/1080656" source="BUGZILLA"/>
		<reference ref_id="1080774" ref_url="https://bugzilla.suse.com/1080774" source="BUGZILLA"/>
		<reference ref_id="1080813" ref_url="https://bugzilla.suse.com/1080813" source="BUGZILLA"/>
		<reference ref_id="1080851" ref_url="https://bugzilla.suse.com/1080851" source="BUGZILLA"/>
		<reference ref_id="1081134" ref_url="https://bugzilla.suse.com/1081134" source="BUGZILLA"/>
		<reference ref_id="1081431" ref_url="https://bugzilla.suse.com/1081431" source="BUGZILLA"/>
		<reference ref_id="1081436" ref_url="https://bugzilla.suse.com/1081436" source="BUGZILLA"/>
		<reference ref_id="1081437" ref_url="https://bugzilla.suse.com/1081437" source="BUGZILLA"/>
		<reference ref_id="1081491" ref_url="https://bugzilla.suse.com/1081491" source="BUGZILLA"/>
		<reference ref_id="1081498" ref_url="https://bugzilla.suse.com/1081498" source="BUGZILLA"/>
		<reference ref_id="1081500" ref_url="https://bugzilla.suse.com/1081500" source="BUGZILLA"/>
		<reference ref_id="1081512" ref_url="https://bugzilla.suse.com/1081512" source="BUGZILLA"/>
		<reference ref_id="1081514" ref_url="https://bugzilla.suse.com/1081514" source="BUGZILLA"/>
		<reference ref_id="1081681" ref_url="https://bugzilla.suse.com/1081681" source="BUGZILLA"/>
		<reference ref_id="1081735" ref_url="https://bugzilla.suse.com/1081735" source="BUGZILLA"/>
		<reference ref_id="1082089" ref_url="https://bugzilla.suse.com/1082089" source="BUGZILLA"/>
		<reference ref_id="1082223" ref_url="https://bugzilla.suse.com/1082223" source="BUGZILLA"/>
		<reference ref_id="1082299" ref_url="https://bugzilla.suse.com/1082299" source="BUGZILLA"/>
		<reference ref_id="1082373" ref_url="https://bugzilla.suse.com/1082373" source="BUGZILLA"/>
		<reference ref_id="1082478" ref_url="https://bugzilla.suse.com/1082478" source="BUGZILLA"/>
		<reference ref_id="1082632" ref_url="https://bugzilla.suse.com/1082632" source="BUGZILLA"/>
		<reference ref_id="1082795" ref_url="https://bugzilla.suse.com/1082795" source="BUGZILLA"/>
		<reference ref_id="1082864" ref_url="https://bugzilla.suse.com/1082864" source="BUGZILLA"/>
		<reference ref_id="1082897" ref_url="https://bugzilla.suse.com/1082897" source="BUGZILLA"/>
		<reference ref_id="1082979" ref_url="https://bugzilla.suse.com/1082979" source="BUGZILLA"/>
		<reference ref_id="1082993" ref_url="https://bugzilla.suse.com/1082993" source="BUGZILLA"/>
		<reference ref_id="1083048" ref_url="https://bugzilla.suse.com/1083048" source="BUGZILLA"/>
		<reference ref_id="1083086" ref_url="https://bugzilla.suse.com/1083086" source="BUGZILLA"/>
		<reference ref_id="1083223" ref_url="https://bugzilla.suse.com/1083223" source="BUGZILLA"/>
		<reference ref_id="1083387" ref_url="https://bugzilla.suse.com/1083387" source="BUGZILLA"/>
		<reference ref_id="1083409" ref_url="https://bugzilla.suse.com/1083409" source="BUGZILLA"/>
		<reference ref_id="1083494" ref_url="https://bugzilla.suse.com/1083494" source="BUGZILLA"/>
		<reference ref_id="1083548" ref_url="https://bugzilla.suse.com/1083548" source="BUGZILLA"/>
		<reference ref_id="1083750" ref_url="https://bugzilla.suse.com/1083750" source="BUGZILLA"/>
		<reference ref_id="1083770" ref_url="https://bugzilla.suse.com/1083770" source="BUGZILLA"/>
		<reference ref_id="1084041" ref_url="https://bugzilla.suse.com/1084041" source="BUGZILLA"/>
		<reference ref_id="1084397" ref_url="https://bugzilla.suse.com/1084397" source="BUGZILLA"/>
		<reference ref_id="1084427" ref_url="https://bugzilla.suse.com/1084427" source="BUGZILLA"/>
		<reference ref_id="1084610" ref_url="https://bugzilla.suse.com/1084610" source="BUGZILLA"/>
		<reference ref_id="1084772" ref_url="https://bugzilla.suse.com/1084772" source="BUGZILLA"/>
		<reference ref_id="1084888" ref_url="https://bugzilla.suse.com/1084888" source="BUGZILLA"/>
		<reference ref_id="1084926" ref_url="https://bugzilla.suse.com/1084926" source="BUGZILLA"/>
		<reference ref_id="1084928" ref_url="https://bugzilla.suse.com/1084928" source="BUGZILLA"/>
		<reference ref_id="1084967" ref_url="https://bugzilla.suse.com/1084967" source="BUGZILLA"/>
		<reference ref_id="1085011" ref_url="https://bugzilla.suse.com/1085011" source="BUGZILLA"/>
		<reference ref_id="1085015" ref_url="https://bugzilla.suse.com/1085015" source="BUGZILLA"/>
		<reference ref_id="1085045" ref_url="https://bugzilla.suse.com/1085045" source="BUGZILLA"/>
		<reference ref_id="1085047" ref_url="https://bugzilla.suse.com/1085047" source="BUGZILLA"/>
		<reference ref_id="1085050" ref_url="https://bugzilla.suse.com/1085050" source="BUGZILLA"/>
		<reference ref_id="1085053" ref_url="https://bugzilla.suse.com/1085053" source="BUGZILLA"/>
		<reference ref_id="1085054" ref_url="https://bugzilla.suse.com/1085054" source="BUGZILLA"/>
		<reference ref_id="1085056" ref_url="https://bugzilla.suse.com/1085056" source="BUGZILLA"/>
		<reference ref_id="1085107" ref_url="https://bugzilla.suse.com/1085107" source="BUGZILLA"/>
		<reference ref_id="1085224" ref_url="https://bugzilla.suse.com/1085224" source="BUGZILLA"/>
		<reference ref_id="1085239" ref_url="https://bugzilla.suse.com/1085239" source="BUGZILLA"/>
		<reference ref_id="863764" ref_url="https://bugzilla.suse.com/863764" source="BUGZILLA"/>
		<reference ref_id="966170" ref_url="https://bugzilla.suse.com/966170" source="BUGZILLA"/>
		<reference ref_id="966172" ref_url="https://bugzilla.suse.com/966172" source="BUGZILLA"/>
		<reference ref_id="966328" ref_url="https://bugzilla.suse.com/966328" source="BUGZILLA"/>
		<reference ref_id="969476" ref_url="https://bugzilla.suse.com/969476" source="BUGZILLA"/>
		<reference ref_id="969477" ref_url="https://bugzilla.suse.com/969477" source="BUGZILLA"/>
		<reference ref_id="975772" ref_url="https://bugzilla.suse.com/975772" source="BUGZILLA"/>
		<reference ref_id="983145" ref_url="https://bugzilla.suse.com/983145" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2017-15951" ref_url="https://www.suse.com/security/cve/CVE-2017-15951/" source="CVE"/>
		<reference ref_id="CVE-2017-16644" ref_url="https://www.suse.com/security/cve/CVE-2017-16644/" source="CVE"/>
		<reference ref_id="CVE-2017-16912" ref_url="https://www.suse.com/security/cve/CVE-2017-16912/" source="CVE"/>
		<reference ref_id="CVE-2017-16913" ref_url="https://www.suse.com/security/cve/CVE-2017-16913/" source="CVE"/>
		<reference ref_id="CVE-2017-17975" ref_url="https://www.suse.com/security/cve/CVE-2017-17975/" source="CVE"/>
		<reference ref_id="CVE-2017-18174" ref_url="https://www.suse.com/security/cve/CVE-2017-18174/" source="CVE"/>
		<reference ref_id="CVE-2017-18208" ref_url="https://www.suse.com/security/cve/CVE-2017-18208/" source="CVE"/>
		<reference ref_id="CVE-2018-1000026" ref_url="https://www.suse.com/security/cve/CVE-2018-1000026/" source="CVE"/>
		<reference ref_id="CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068/" source="CVE"/>
		<reference ref_id="CVE-2018-8087" ref_url="https://www.suse.com/security/cve/CVE-2018-8087/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00056.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.120 to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2017-13166: An elevation of privilege vulnerability in the v4l2 video driver. (bnc#1072865).
- CVE-2017-15951: The KEYS subsystem did not correctly synchronize the actions of updating versus finding a key in the 'negative' state to avoid a race condition, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls (bnc#1062840 bnc#1065615).
- CVE-2017-16644: The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c allowed local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067118).
- CVE-2017-16912: The 'get_pipe()' function (drivers/usb/usbip/stub_rx.c) allowed attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet (bnc#1078673).
- CVE-2017-16913: The 'stub_recv_cmd_submit()' function (drivers/usb/usbip/stub_rx.c) when handling CMD_SUBMIT packets allowed attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet (bnc#1078672).
- CVE-2017-17975: Use-after-free in the usbtv_probe function in drivers/media/usb/usbtv/usbtv-core.c allowed attackers to cause a denial of service (system crash) or possibly have unspecified other impact by triggering failure of audio registration, because a kfree of the usbtv data structure occurs during a usbtv_video_free call, but the usbtv_video_fail label's code attempts to both access and free this data structure (bnc#1074426).
- CVE-2017-18174: The amd_gpio_remove function in drivers/pinctrl/pinctrl-amd.c calls the pinctrl_unregister function, leading to a double free (bnc#1080533).
- CVE-2017-18208: The madvise_willneed function in mm/madvise.c allowed local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping (bnc#1083494).
- CVE-2018-1000026: A insufficient input validation vulnerability in bnx2x network card driver could result in DoS: Network card firmware assertion takes card off-line. This attack appear to be exploitable via An attacker on a must pass a very large, specially crafted packet to the bnx2x card. This can be done from an untrusted guest VM. (bnc#1079384).
- CVE-2018-8087: Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c allowed local users to cause a denial of service (memory consumption) by triggering an out-of-array error case (bnc#1085053).
- CVE-2018-1068: Insufficient user provided offset checking in the ebtables compat code allowed local attackers to overwrite kernel memory and potentially execute code. (bsc#1085107)

The following non-security bugs were fixed:

- acpi / bus: Leave modalias empty for devices which are not present (bnc#1012382).
- acpi, nfit: fix health event notification (FATE#321135, FATE#321217, FATE#321256, FATE#321391, FATE#321393).
- acpi, nfit: fix register dimm error handling (FATE#321135, FATE#321217, FATE#321256, FATE#321391, FATE#321393).
- acpi: sbshc: remove raw pointer from printk() message (bnc#1012382).
- Add delay-init quirk for Corsair K70 RGB keyboards (bnc#1012382).
- add ip6_make_flowinfo helper (bsc#1042286).
- ahci: Add Intel Cannon Lake PCH-H PCI ID (bnc#1012382).
- ahci: Add PCI ids for Intel Bay Trail, Cherry Trail and Apollo Lake AHCI (bnc#1012382).
- ahci: Annotate PCI ids for mobile Intel chipsets as such (bnc#1012382).
- alpha: fix crash if pthread_create races with signal delivery (bnc#1012382).
- alpha: fix reboot on Avanti platform (bnc#1012382).
- alsa: hda/ca0132 - fix possible NULL pointer use (bnc#1012382).
- alsa: hda - Fix headset mic detection problem for two Dell machines (bnc#1012382).
- alsa: hda/realtek - Add headset mode support for Dell laptop (bsc#1031717).
- alsa: hda/realtek: PCI quirk for Fujitsu U7x7 (bnc#1012382).
- alsa: hda - Reduce the suspend time consumption for ALC256 (bsc#1031717).
- alsa: hda - Use IS_REACHABLE() for dependency on input (bsc#1031717).
- alsa: seq: Fix racy pool initializations (bnc#1012382).
- alsa: seq: Fix regression by incorrect ioctl_mutex usages (bnc#1012382).
- alsa: usb-audio: add implicit fb quirk for Behringer UFX1204 (bnc#1012382).
- alsa: usb-audio: Fix UAC2 get_ctl request with a RANGE attribute (bnc#1012382).
- amd-xgbe: Fix unused suspend handlers build warning (bnc#1012382).
- arm64: add PTE_ADDR_MASK (bsc#1068032).
- arm64: barrier: Add CSDB macros to control data-value prediction (bsc#1068032).
- arm64: define BUG() instruction without CONFIG_BUG (bnc#1012382).
- arm64: Disable unhandled signal log messages by default (bnc#1012382).
- arm64: dts: add #cooling-cells to CPU nodes (bnc#1012382).
- arm64: entry: Apply BP hardening for high-priority synchronous exceptions (bsc#1068032).
- arm64: entry: Apply BP hardening for suspicious interrupts from EL0 (bsc#1068032).
- arm64: entry: Ensure branch through syscall table is bounded under speculation (bsc#1068032).
- arm64: entry: Reword comment about post_ttbr_update_workaround (bsc#1068032).
- arm64: Force KPTI to be disabled on Cavium ThunderX (bsc#1068032).
- arm64: futex: Mask __user pointers prior to dereference (bsc#1068032).
- arm64: idmap: Use 'awx' flags for .idmap.text .pushsection directives (bsc#1068032).
- arm64: Implement array_index_mask_nospec() (bsc#1068032).
- arm64: Kconfig: select COMPAT_BINFMT_ELF only when BINFMT_ELF is set (bnc#1012382).
- arm64: kpti: Add -&amp;gt;enable callback to remap swapper using nG mappings (bsc#1068032).
- arm64: kpti: Make use of nG dependent on arm64_kernel_unmapped_at_el0() (bsc#1068032).
- arm64: Make USER_DS an inclusive limit (bsc#1068032).
- arm64: mm: Permit transitioning from Global to Non-Global without BBM (bsc#1068032).
- arm64: move TASK_* definitions to &amp;lt;asm/processor.h&amp;gt; (bsc#1068032).
- arm64: Run enable method for errata work arounds on late CPUs (bsc#1085045).
- arm64: uaccess: Do not bother eliding access_ok checks in __{get, put}_user (bsc#1068032).
- arm64: uaccess: Mask __user pointers for __arch_{clear, copy_*}_user (bsc#1068032).
- arm64: uaccess: Prevent speculative use of the current addr_limit (bsc#1068032).
- arm64: Use pointer masking to limit uaccess speculation (bsc#1068032).
- arm: 8731/1: Fix csum_partial_copy_from_user() stack mismatch (bnc#1012382).
- arm: AM33xx: PRM: Remove am33xx_pwrdm_read_prev_pwrst function (bnc#1012382).
- arm: dts: am4372: Correct the interrupts_properties of McASP (bnc#1012382).
- arm: dts: Fix omap4 hang with GPS connected to USB by using wakeupgen (bnc#1012382).
- arm: dts: ls1021a: fix incorrect clock references (bnc#1012382).
- arm: dts: s5pv210: add interrupt-parent for ohci (bnc#1012382).
- arm: dts: STi: Add gpio polarity for 'hdmi,hpd-gpio' property (bnc#1012382).
- arm: kvm: Fix SMCCC handling of unimplemented SMC/HVC calls (bnc#1012382).
- arm: OMAP2+: Fix SRAM virt to phys translation for save_secure_ram_context (bnc#1012382).
- arm: omap2: hide omap3_save_secure_ram on non-OMAP3 builds (git-fixes).
- arm: pxa/tosa-bt: add MODULE_LICENSE tag (bnc#1012382).
- arm: spear13xx: Fix dmas cells (bnc#1012382).
- arm: spear13xx: Fix spics gpio controller's warning (bnc#1012382).
- arm: spear600: Add missing interrupt-parent of rtc (bnc#1012382).
- arm: tegra: select USB_ULPI from EHCI rather than platform (bnc#1012382).
- asoc: au1x: Fix timeout tests in au1xac97c_ac97_read() (bsc#1031717).
- asoc: Intel: Kconfig: fix build when ACPI is not enabled (bnc#1012382).
- asoc: Intel: sst: Fix the return value of 'sst_send_byte_stream_mrfld()' (bsc#1031717).
- asoc: mediatek: add i2c dependency (bnc#1012382).
- asoc: nuc900: Fix a loop timeout test (bsc#1031717).
- asoc: pcm512x: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bnc#1012382).
- asoc: rockchip: disable clock on error (bnc#1012382).
- asoc: rsnd: avoid duplicate free_irq() (bnc#1012382).
- asoc: rsnd: do not call free_irq() on Parent SSI (bnc#1012382).
- asoc: simple-card: Fix misleading error message (bnc#1012382).
- asoc: ux500: add MODULE_LICENSE tag (bnc#1012382).
- ata: ahci_xgene: free structure returned by acpi_get_object_info() (bsc#1082979).
- ata: pata_artop: remove redundant initialization of pio (bsc#1082979).
- ata: sata_dwc_460ex: remove incorrect locking (bsc#1082979).
- b2c2: flexcop: avoid unused function warnings (bnc#1012382).
- binder: add missing binder_unlock() (bnc#1012382).
- binder: check for binder_thread allocation failure in binder_poll() (bnc#1012382).
- binfmt_elf: compat: avoid unused function warning (bnc#1012382).
- blk-mq: add warning to __blk_mq_run_hw_queue() for ints disabled (bsc#1084772).
- blk-mq: stop 'delayed_run_work' in blk_mq_stop_hw_queue() (bsc#1084967).
- blk-mq: turn WARN_ON in __blk_mq_run_hw_queue into printk (bsc#1084772).
- blktrace: fix unlocked registration of tracepoints (bnc#1012382).
- block: fix an error code in add_partition() (bsc#1082979).
- block: Fix __bio_integrity_endio() documentation (bsc#1082979).
- bluetooth: btsdio: Do not bind to non-removable BCM43341 (bnc#1012382).
- bluetooth: btusb: Restore QCA Rome suspend/resume fix with a 'rewritten' version (bnc#1012382).
- bnx2x: Improve reliability in case of nested PCI errors (bnc#1012382).
- bnxt_en: Fix the 'Invalid VF' id check in bnxt_vf_ndo_prep routine (bnc#1012382).
- bpf: arsh is not supported in 32 bit alu thus reject it (bnc#1012382).
- bpf: avoid false sharing of map refcount with max_entries (bnc#1012382).
- bpf: fix 32-bit divide by zero (bnc#1012382).
- bpf: fix bpf_tail_call() x64 JIT (bnc#1012382).
- bpf: fix divides by zero (bnc#1012382).
- bpf: introduce BPF_JIT_ALWAYS_ON config (bnc#1012382).
- bpf: reject stores into ctx via st and xadd (bnc#1012382).
- bridge: implement missing ndo_uninit() (bsc#1042286).
- bridge: move bridge multicast cleanup to ndo_uninit (bsc#1042286).
- btrfs: copy fsid to super_block s_uuid (bsc#1080774).
- btrfs: fix crash due to not cleaning up tree log block's dirty bits (bnc#1012382).
- btrfs: fix deadlock in run_delalloc_nocow (bnc#1012382).
- btrfs: fix deadlock when writing out space cache (bnc#1012382).
- btrfs: Fix possible off-by-one in btrfs_search_path_in_tree (bnc#1012382).
- btrfs: Fix quota reservation leak on preallocated files (bsc#1079989).
- btrfs: fix unexpected -EEXIST when creating new inode (bnc#1012382).
- btrfs: Handle btrfs_set_extent_delalloc failure in fixup worker (bnc#1012382).
- can: flex_can: Correct the checking for frame length in flexcan_start_xmit() (bnc#1012382).
- cdrom: turn off autoclose by default (bsc#1080813).
- ceph: fix incorrect snaprealm when adding caps (bsc#1081735).
- ceph: fix un-balanced fsc-&amp;gt;writeback_count update (bsc#1081735).
- cfg80211: check dev_set_name() return value (bnc#1012382).
- cfg80211: fix cfg80211_beacon_dup (bnc#1012382).
- cifs: dump IPC tcon in debug proc file (bsc#1071306).
- cifs: Fix autonegotiate security settings mismatch (bnc#1012382).
- cifs: Fix missing put_xid in cifs_file_strict_mmap (bnc#1012382).
- cifs: make IPC a regular tcon (bsc#1071306).
- cifs: use tcon_ipc instead of use_ipc parameter of SMB2_ioctl (bsc#1071306).
- cifs: zero sensitive data when freeing (bnc#1012382).
- clk: fix a panic error caused by accessing NULL pointer (bnc#1012382).
- console/dummy: leave .con_font_get set to NULL (bnc#1012382).
- cpufreq: Add Loongson machine dependencies (bnc#1012382).
- crypto: aesni - handle zero length dst buffer (bnc#1012382).
- crypto: af_alg - whitelist mask and type (bnc#1012382).
- crypto: caam - fix endless loop when DECO acquire fails (bnc#1012382).
- crypto: cryptd - pass through absence of -&amp;gt;setkey() (bnc#1012382).
- crypto: hash - introduce crypto_hash_alg_has_setkey() (bnc#1012382).
- crypto: poly1305 - remove -&amp;gt;setkey() method (bnc#1012382).
- crypto: s5p-sss - Fix kernel Oops in AES-ECB mode (bnc#1012382).
- crypto: tcrypt - fix S/G table for test_aead_speed() (bnc#1012382). (bnc#1012382).
- crypto: x86/twofish-3way - Fix %rbp usage (bnc#1012382).
- cw1200: fix bogus maybe-uninitialized warning (bnc#1012382).
- dccp: limit sk_filter trim to payload (bsc#1042286).
- dell-wmi, dell-laptop: depends DMI (bnc#1012382).
- direct-io: Fix sleep in atomic due to sync AIO (bsc#1084888).
- dlm: fix double list_del() (bsc#1082795).
- dlm: fix NULL pointer dereference in send_to_sock() (bsc#1082795).
- dmaengine: at_hdmac: fix potential NULL pointer dereference in atc_prep_dma_interleaved (bnc#1012382).
- dmaengine: dmatest: fix container_of member in dmatest_callback (bnc#1012382).
- dmaengine: ioat: Fix error handling path (bnc#1012382).
- dmaengine: jz4740: disable/unprepare clk if probe fails (bnc#1012382).
- dmaengine: zx: fix build warning (bnc#1012382).
- dm: correctly handle chained bios in dec_pending() (bnc#1012382).
- dn_getsockoptdecnet: move nf_{get/set}sockopt outside sock lock (bnc#1012382).
- do not put symlink bodies in pagecache into highmem (bnc#1012382).
- dpt_i2o: fix build warning (bnc#1012382).
- driver-core: use 'dev' argument in dev_dbg_ratelimited stub (bnc#1012382).
- drivers: hv: balloon: Correctly update onlined page count (fate#315887, bsc#1082632).
- drivers: hv: balloon: Initialize last_post_time on startup (fate#315887, bsc#1082632).
- drivers: hv: balloon: Show the max dynamic memory assigned (fate#315887, bsc#1082632).
- drivers: hv: kvp: Use MAX_ADAPTER_ID_SIZE for translating adapter id (fate#315887, bsc#1082632).
- drivers: hv: Turn off write permission on the hypercall page (fate#315887, bsc#1082632).
- drivers: hv: vmbus: Fix rescind handling (fate#315887, bsc#1082632).
- drivers: hv: vmbus: Fix rescind handling issues (fate#315887, bsc#1082632).
- drivers/net: fix eisa_driver probe section mismatch (bnc#1012382).
- drm/amdgpu: Avoid leaking PM domain on driver unbind (v2) (bnc#1012382).
- drm/amdgpu: Fix SDMA load/unload sequence on HWS disabled mode (bnc#1012382).
- drm/amdkfd: Fix SDMA oversubsription handling (bnc#1012382).
- drm/amdkfd: Fix SDMA ring buffer size calculation (bnc#1012382).
- drm/armada: fix leak of crtc structure (bnc#1012382).
- drm/edid: Add 6 bpc quirk for CPT panel in Asus UX303LA (bnc#1012382).
- drm/gma500: remove helper function (bnc#1012382).
- drm/gma500: Sanity-check pipe index (bnc#1012382).
- drm/nouveau: hide gcc-4.9 -Wmaybe-uninitialized (bnc#1012382).
- drm/nouveau/pci: do a msi rearm on init (bnc#1012382).
- drm/radeon: adjust tested variable (bnc#1012382).
- drm: rcar-du: Fix race condition when disabling planes at CRTC stop (bnc#1012382).
- drm: rcar-du: Use the VBK interrupt for vblank events (bnc#1012382).
- drm: Require __GFP_NOFAIL for the legacy drm_modeset_lock_all (bnc#1012382).
- drm/ttm: check the return value of kzalloc (bnc#1012382).
- drm/vmwgfx: use *_32_bits() macros (bnc#1012382).
- Drop SUSE-specific qla2xxx patches (bsc#1043726)
- e1000: fix disabling already-disabled warning (bnc#1012382).
- edac, octeon: Fix an uninitialized variable warning (bnc#1012382).
- em28xx: only use mt9v011 if camera support is enabled (bnc#1012382).
- enable DST_CACHE in non-vanilla configs except s390x/zfcpdump
- ext4: correct documentation for grpid mount option (bnc#1012382).
- ext4: do not unnecessarily allocate buffer in recently_deleted() (bsc#1080344).
- ext4: Fix data exposure after failed AIO DIO (bsc#1069135 bsc#1082864).
- ext4: save error to disk in __ext4_grp_locked_error() (bnc#1012382).
- f2fs: fix a bug caused by NULL extent tree (bsc#1082478). Does not affect SLE release but should be merged into leap updates
- fbdev: auo_k190x: avoid unused function warnings (bnc#1012382).
- fbdev: s6e8ax0: avoid unused function warnings (bnc#1012382).
- fbdev: sis: enforce selection of at least one backend (bnc#1012382).
- fbdev: sm712fb: avoid unused function warnings (bnc#1012382).
- fs: Avoid invalidation in interrupt context in dio_complete() (bsc#1073407 bsc#1069135).
- fs: Fix page cache inconsistency when mixing buffered and AIO DIO (bsc#1073407 bsc#1069135).
- fs: invalidate page cache after end_io() in dio completion (bsc#1073407 bsc#1069135).
- ftrace: Remove incorrect setting of glob search field (bnc#1012382).
- geneve: fix populating tclass in geneve_get_v6_dst (bsc#1042286).
- genirq/msi: Add stubs for get_cached_msi_msg/pci_write_msi_msg (bnc#1012382).
- genirq/msi: Fix populating multiple interrupts (bsc#1085047).
- genirq: Restore trigger settings in irq_modify_status() (bsc#1085056).
- genksyms: Fix segfault with invalid declarations (bnc#1012382).
- gianfar: fix a flooded alignment reports because of padding issue (bnc#1012382).
- go7007: add MEDIA_CAMERA_SUPPORT dependency (bnc#1012382).
- gpio: ath79: add missing MODULE_DESCRIPTION/LICENSE (bnc#1012382).
- gpio: intel-mid: Fix build warning when !CONFIG_PM (bnc#1012382).
- gpio: iop: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bnc#1012382).
- gpio: xgene: mark PM functions as __maybe_unused (bnc#1012382).
- grace: replace BUG_ON by WARN_ONCE in exit_net hook (bnc#1012382).
- gre: build header correctly for collect metadata tunnels (bsc#1042286).
- gre: do not assign header_ops in collect metadata mode (bsc#1042286).
- gre: do not keep the GRE header around in collect medata mode (bsc#1042286).
- gre: reject GUE and FOU in collect metadata mode (bsc#1042286).
- hdpvr: hide unused variable (bnc#1012382).
- hid: quirks: Fix keyboard + touchpad on Toshiba Click Mini not working (bnc#1012382).
- hippi: Fix a Fix a possible sleep-in-atomic bug in rr_close (bnc#1012382).
- hrtimer: Ensure POSIX compliance (relative CLOCK_REALTIME hrtimers) (bnc#1012382).
- hv_netvsc: Add ethtool handler to set and get TCP hash levels (fate#315887, bsc#1082632).
- hv_netvsc: Add ethtool handler to set and get UDP hash levels (fate#315887, bsc#1082632).
- hv_netvsc: Add initialization of tx_table in netvsc_device_add() (fate#315887, bsc#1082632).
- hv_netvsc: Change the hash level variable to bit flags (fate#315887, bsc#1082632).
- hv_netvsc: Clean up an unused parameter in rndis_filter_set_rss_param() (fate#315887, bsc#1082632).
- hv_netvsc: Clean up unused parameter from netvsc_get_hash() (fate#315887, bsc#1082632).
- hv_netvsc: Clean up unused parameter from netvsc_get_rss_hash_opts() (fate#315887, bsc#1082632).
- hv_netvsc: copy_to_send buf can be void (fate#315887, bsc#1082632).
- hv_netvsc: do not need local xmit_more (fate#315887, bsc#1082632).
- hv_netvsc: drop unused macros (fate#315887, bsc#1082632).
- hv_netvsc: empty current transmit aggregation if flow blocked (fate#315887, bsc#1082632).
- hv_netvsc: Fix rndis_filter_close error during netvsc_remove (fate#315887, bsc#1082632).
- hv_netvsc: fix send buffer failure on MTU change (fate#315887, bsc#1082632).
- hv_netvsc: Fix the channel limit in netvsc_set_rxfh() (fate#315887, bsc#1082632).
- hv_netvsc: Fix the real number of queues of non-vRSS cases (fate#315887, bsc#1082632).
- hv_netvsc: Fix the receive buffer size limit (fate#315887, bsc#1082632).
- hv_netvsc: Fix the TX/RX buffer default sizes (fate#315887, bsc#1082632).
- hv_netvsc: hide warnings about uninitialized/missing rndis device (fate#315887, bsc#1082632).
- hv_netvsc: make const array ver_list static, reduces object code size (fate#315887, bsc#1082632).
- hv_netvsc: optimize initialization of RNDIS header (fate#315887, bsc#1082632).
- hv_netvsc: pass netvsc_device to receive callback (fate#315887, bsc#1082632).
- hv_netvsc: remove open_cnt reference count (fate#315887, bsc#1082632).
- hv_netvsc: Rename ind_table to rx_table (fate#315887, bsc#1082632).
- hv_netvsc: Rename tx_send_table to tx_table (fate#315887, bsc#1082632).
- hv_netvsc: replace divide with mask when computing padding (fate#315887, bsc#1082632).
- hv_netvsc: report stop_queue and wake_queue (fate#315887, bsc#1082632).
- hv_netvsc: simplify function args in receive status path (fate#315887, bsc#1082632).
- hv_netvsc: Simplify the limit check in netvsc_set_channels() (fate#315887, bsc#1082632).
- hv_netvsc: track memory allocation failures in ethtool stats (fate#315887, bsc#1082632).
- hv: preserve kabi by keeping hv_do_hypercall (bnc#1082632).
- hwmon: (pmbus) Use 64bit math for DIRECT format values (bnc#1012382).
- hwrng: exynos - use __maybe_unused to hide pm functions (bnc#1012382).
- hyper-v: trace vmbus_ongpadl_created() (fate#315887, bsc#1082632).
- hyper-v: trace vmbus_ongpadl_torndown() (fate#315887, bsc#1082632).
- hyper-v: trace vmbus_on_message() (fate#315887, bsc#1082632).
- hyper-v: trace vmbus_on_msg_dpc() (fate#315887, bsc#1082632).
- hyper-v: trace vmbus_onoffer() (fate#315887, bsc#1082632).
- hyper-v: trace vmbus_onoffer_rescind() (fate#315887, bsc#1082632).
- hyper-v: trace vmbus_onopen_result() (fate#315887, bsc#1082632).
- hyper-v: trace vmbus_onversion_response() (fate#315887, bsc#1082632).
- hyper-v: Use fast hypercall for HVCALL_SIGNAL_EVENT (fate#315887, bsc#1082632).
- i2c: remove __init from i2c_register_board_info() (bnc#1012382).
- i40iw: Correct Q1/XF object count equation (bsc#969476 FATE#319648 bsc#969477 FATE#319816).
- i40iw: Fix sequence number for the first partial FPDU (bsc#969476 FATE#319648 bsc#969477 FATE#319816).
- i40iw: Fix the connection ORD value for loopback (bsc#969476 FATE#319648 bsc#969477 FATE#319816).
- i40iw: Remove limit on re-posting AEQ entries to HW (bsc#969476 FATE#319648 bsc#969477 FATE#319816).
- i40iw: Selectively teardown QPs on IP addr change event (bsc#1024376 FATE#321249).
- i40iw: Validate correct IRD/ORD connection parameters (bsc#969476 FATE#319648 bsc#969477 FATE#319816).
- ib/hfi1: Fix for potential refcount leak in hfi1_open_file() (FATE#321231 FATE#321473).
- ib/iser: Handle lack of memory management extentions correctly (bsc#1082979).
- ib/mlx4: Fix incorrectly releasing steerable UD QPs when have only ETH ports (bnc#1012382).
- ib/mlx4: Fix mlx4_ib_alloc_mr error flow (bnc#1012382).
- ibmvnic: Account for VLAN header length in TX buffers (bsc#1085239).
- ibmvnic: Account for VLAN tag in L2 Header descriptor (bsc#1085239).
- ibmvnic: Allocate max queues stats buffers (bsc#1081498).
- ibmvnic: Allocate statistics buffers during probe (bsc#1082993).
- ibmvnic: Check for NULL skb's in NAPI poll routine (bsc#1081134, git-fixes).
- ibmvnic: Clean RX pool buffers during device close (bsc#1081134).
- ibmvnic: Clean up device close (bsc#1084610).
- ibmvnic: Correct goto target for tx irq initialization failure (bsc#1082223).
- ibmvnic: Do not attempt to login if RX or TX queues are not allocated (bsc#1082993).
- ibmvnic: Do not disable device during failover or partition migration (bsc#1084610).
- ibmvnic: Ensure that buffers are NULL after free (bsc#1080014).
- ibmvnic: Fix early release of login buffer (bsc#1081134, git-fixes).
- ibmvnic: fix empty firmware version and errors cleanup (bsc#1079038).
- ibmvnic: fix firmware version when no firmware level has been provided by the VIOS server (bsc#1079038).
- ibmvnic: Fix login buffer memory leaks (bsc#1081134).
- ibmvnic: Fix NAPI structures memory leak (bsc#1081134).
- ibmvnic: Fix recent errata commit (bsc#1085239).
- ibmvnic: Fix rx queue cleanup for non-fatal resets (bsc#1080014).
- ibmvnic: Fix TX descriptor tracking again (bsc#1082993).
- ibmvnic: Fix TX descriptor tracking (bsc#1081491).
- ibmvnic: Free and re-allocate scrqs when tx/rx scrqs change (bsc#1081498).
- ibmvnic: Free RX socket buffer in case of adapter error (bsc#1081134).
- ibmvnic: Generalize TX pool structure (bsc#1085224).
- ibmvnic: Handle TSO backing device errata (bsc#1085239).
- ibmvnic: Harden TX/RX pool cleaning (bsc#1082993).
- ibmvnic: Improve TX buffer accounting (bsc#1085224).
- ibmvnic: Keep track of supplementary TX descriptors (bsc#1081491).
- ibmvnic: Make napi usage dynamic (bsc#1081498).
- ibmvnic: Move active sub-crq count settings (bsc#1081498).
- ibmvnic: Pad small packets to minimum MTU size (bsc#1085239).
- ibmvnic: queue reset when CRQ gets closed during reset (bsc#1080263).
- ibmvnic: Remove skb-&gt;protocol checks in ibmvnic_xmit (bsc#1080384).
- ibmvnic: Rename active queue count variables (bsc#1081498).
- ibmvnic: Reorganize device close (bsc#1084610).
- ibmvnic: Report queue stops and restarts as debug output (bsc#1082993).
- ibmvnic: Reset long term map ID counter (bsc#1080364).
- ibmvnic: Split counters for scrq/pools/napi (bsc#1082223).
- ibmvnic: Update and clean up reset TX pool routine (bsc#1085224).
- ibmvnic: Update release RX pool routine (bsc#1085224).
- ibmvnic: Update TX and TX completion routines (bsc#1085224).
- ibmvnic: Update TX pool initialization routine (bsc#1085224).
- ibmvnic: Wait until reset is complete to set carrier on (bsc#1081134).
- ib/qib: Fix comparison error with qperf compare/swap test (FATE#321231 FATE#321473).
- ib/srpt: Remove an unused structure member (bsc#1082979).
- idle: i7300: add PCI dependency (bnc#1012382).
- igb: Free IRQs when device is hotplugged (bnc#1012382).
- iio: adc: axp288: remove redundant duplicate const on axp288_adc_channels (bnc#1012382).
- iio: adis_lib: Initialize trigger before requesting interrupt (bnc#1012382).
- iio: buffer: check if a buffer has been set up when poll is called (bnc#1012382).
- input: tca8418_keypad - hide gcc-4.9 -Wmaybe-uninitialized warning (bnc#1012382).
- input: tca8418_keypad - remove double read of key event register (git-fixes).
- iommu/amd: Add align parameter to alloc_irq_index() (bsc#975772).
- iommu/amd: Enforce alignment for MSI IRQs (bsc#975772).
- iommu/amd: Fix alloc_irq_index() increment (bsc#975772).
- iommu/amd: Limit the IOVA page range to the specified addresses (fate#321026).
- iommu/arm-smmu-v3: Cope with duplicated Stream IDs (bsc#1084926).
- iommu/iova: Fix underflow bug in __alloc_and_insert_iova_range (bsc#1084928).
- iommu/vt-d: Use domain instead of cache fetching (bsc#975772).
- ip6mr: fix stale iterator (bnc#1012382).
- ipc/msg: introduce msgctl(MSG_STAT_ANY) (bsc#1072689).
- ipc/sem: introduce semctl(SEM_STAT_ANY) (bsc#1072689).
- ipc/shm: introduce shmctl(SHM_STAT_ANY) (bsc#1072689).
- ip_tunnel: fix preempt warning in ip tunnel creation/updating (bnc#1012382).
- ip_tunnel: replace dst_cache with generic implementation (bnc#1012382).
- ipv4: allow local fragmentation in ip_finish_output_gso() (bsc#1042286).
- ipv4: fix checksum annotation in udp4_csum_init (bsc#1042286).
- ipv4: ipconfig: avoid unused ic_proto_used symbol (bnc#1012382).
- ipv4: update comment to document GSO fragmentation cases (bsc#1042286).
- ipv6: datagram: Refactor dst lookup and update codes to a new function (bsc#1042286).
- ipv6: datagram: Refactor flowi6 init codes to a new function (bsc#1042286).
- ipv6: datagram: Update dst cache of a connected datagram sk during pmtu update (bsc#1042286).
- ipv6: fix checksum annotation in udp6_csum_init (bsc#1042286).
- ipv6: icmp6: Allow icmp messages to be looped back (bnc#1012382).
- ipv6/ila: fix nlsize calculation for lwtunnel (bsc#1042286).
- ipv6: remove unused in6_addr struct (bsc#1042286).
- ipv6: tcp: fix endianness annotation in tcp_v6_send_response (bsc#1042286).
- ipv6: udp: Do a route lookup and update during release_cb (bsc#1042286).
- ipvlan: Add the skb-&gt;mark as flow4's member to lookup route (bnc#1012382).
- ipvlan: fix multicast processing (bsc#1042286).
- ipvlan: fix various issues in ipvlan_process_multicast() (bsc#1042286).
- irqchip/gic-v3: Use wmb() instead of smb_wmb() in gic_raise_softirq() (bnc#1012382).
- isdn: eicon: reduce stack size of sig_ind function (bnc#1012382).
- isdn: icn: remove a #warning (bnc#1012382).
- isdn: sc: work around type mismatch warning (bnc#1012382).
- jffs2: Fix use-after-free bug in jffs2_iget()'s error handling path (git-fixes).
- kABI: protect struct cpuinfo_x86 (kabi).
- kABI: protect struct ethtool_link_settings (bsc#1085050).
- kABI: protect struct ip_tunnel and reintroduce ip_tunnel_dst_reset_all (kabi).
- kABI: reintroduce crypto_poly1305_setkey (kabi).
- kabi: restore kabi after 'net: replace dst_cache ip6_tunnel implementation with the generic one' (bsc#1082897).
- kabi: restore nft_set_elem_destroy() signature (bsc#1042286).
- kabi: restore rhashtable_insert_slow() signature (bsc#1042286).
- kabi/severities: add sclp to KABI ignore list
- kabi/severities: add __x86_indirect_thunk_rsp
- kabi/severities: as per bsc#1068569 we can ignore XFS kabi The gods have spoken, let there be light.
- kabi/severities: Ignore kvm for KABI severities
- kabi: uninline sk_receive_skb() (bsc#1042286).
- kaiser: fix compile error without vsyscall (bnc#1012382).
- kaiser: fix intel_bts perf crashes (bnc#1012382).
- kasan: rework Kconfig settings (bnc#1012382).
- kernel/async.c: revert 'async: simplify lowest_in_progress()' (bnc#1012382).
- kernel: fix rwlock implementation (bnc#1079886, LTC#164371).
- kernfs: fix regression in kernfs_fop_write caused by wrong type (bnc#1012382).
- keys: encrypted: fix buffer overread in valid_master_desc() (bnc#1012382).
- kmemleak: add scheduling point to kmemleak_scan() (bnc#1012382).
- kvm: add X86_LOCAL_APIC dependency (bnc#1012382).
- kvm: ARM64: fix phy counter access failure in guest (bsc#1085015).
- kvm: arm/arm64: Check pagesize when allocating a hugepage at Stage 2 (bsc#1079029).
- kvm: nVMX: Fix kernel panics induced by illegal INVEPT/INVVPID types (bnc#1012382).
- kvm: nVMX: Fix races when sending nested PI while dest enters/leaves L2 (bnc#1012382).
- kvm: nVMX: invvpid handling improvements (bnc#1012382).
- kvm: nVMX: kmap() can't fail (bnc#1012382).
- kvm: nVMX: vmx_complete_nested_posted_interrupt() can't fail (bnc#1012382).
- kvm: PPC: Book3S PR: Fix svcpu copying with preemption enabled (bsc#1066223).
- kvm: s390: Add operation exception interception handler (FATE#324070, LTC#158959).
- kvm: s390: Add sthyi emulation (FATE#324070, LTC#158959).
- kvm: s390: Enable all facility bits that are known good for passthrough (FATE#324071, LTC#158956).
- kvm: s390: Extend diag 204 fields (FATE#324070, LTC#158959).
- kvm: s390: Fix STHYI buffer alignment for diag224 (FATE#324070, LTC#158959).
- kvm: s390: instruction-execution-protection support (LTC#162428).
- kvm: s390: Introduce BCD Vector Instructions to the guest (FATE#324072, LTC#158953).
- kvm: s390: Introduce Vector Enhancements facility 1 to the guest (FATE#324072, LTC#158953).
- kvm: s390: Limit sthyi execution (FATE#324070, LTC#158959).
- kvm: s390: Populate mask of non-hypervisor managed facility bits (FATE#324071, LTC#158956).
- kvm: VMX: clean up declaration of VPID/EPT invalidation types (bnc#1012382).
- kvm: VMX: Fix rflags cache during vCPU reset (bnc#1012382).
- kvm: VMX: Make indirect call speculation safe (bnc#1012382).
- kvm: x86: Do not re-execute instruction when not passing CR2 value (bnc#1012382).
- kvm: x86: emulator: Return to user-mode on L1 CPL=0 emulation failure (bnc#1012382).
- kvm: x86: fix escape of guest dr6 to the host (bnc#1012382).
- kvm: X86: Fix operand/address-size during instruction decoding (bnc#1012382).
- kvm: x86: ioapic: Clear Remote IRR when entry is switched to edge-triggered (bnc#1012382).
- kvm: x86: ioapic: Fix level-triggered EOI and IOAPIC reconfigure race (bnc#1012382).
- kvm: x86: ioapic: Preserve read-only values in the redirection table (bnc#1012382).
- kvm: x86: Make indirect calls in emulator speculation safe (bnc#1012382).
- kvm/x86: Reduce retpoline performance impact in slot_handle_level_range(), by always inlining iterator helper methods (bnc#1012382).
- l2tp: fix use-after-free during module unload (bsc#1042286).
- led: core: Fix brightness setting when setting delay_off=0 (bnc#1012382).
- leds: do not overflow sysfs buffer in led_trigger_show (bsc#1080464).
- libceph: check kstrndup() return value (bsc#1081735).
- lib/mpi: Fix umul_ppmm() for MIPS64r6 (bnc#1012382).
- lib/uuid.c: introduce a few more generic helpers (fate#315887, bsc#1082632).
- lib/uuid.c: use correct offset in uuid parser (fate#315887, bsc#1082632).
- livepatch: introduce shadow variable API (bsc#1082299 fate#313296). Shadow variables support.
- livepatch: __kgr_shadow_get_or_alloc() is local to shadow.c (bsc#1082299 fate#313296). Shadow variables support.
- lockd: fix 'list_add double add' caused by legacy signal interface (bnc#1012382).
- loop: fix concurrent lo_open/lo_release (bnc#1012382).
- mac80211: fix the update of path metric for RANN frame (bnc#1012382).
- mac80211: mesh: drop frames appearing to be from us (bnc#1012382).
- Make DST_CACHE a silent config option (bnc#1012382).
- mdio-sun4i: Fix a memory leak (bnc#1012382).
- md/raid1: Use a new variable to count flighting sync requests(bsc#1083048)
- media: cxusb, dib0700: ignore XC2028_I2C_FLUSH (bnc#1012382).
- media: dvb-usb-v2: lmedm04: Improve logic checking of warm start (bnc#1012382).
- media: dvb-usb-v2: lmedm04: move ts2020 attach to dm04_lme2510_tuner (bnc#1012382).
- media: r820t: fix r820t_write_reg for KASAN (bnc#1012382).
- media: s5k6aa: describe some function parameters (bnc#1012382).
- media: soc_camera: soc_scale_crop: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bnc#1012382).
- media: ts2020: avoid integer overflows on 32 bit machines (bnc#1012382).
- media: usbtv: add a new usbid (bnc#1012382).
- media: v4l2-compat-ioctl32.c: add missing VIDIOC_PREPARE_BUF (bnc#1012382).
- media: v4l2-compat-ioctl32.c: avoid sizeof(type) (bnc#1012382).
- media: v4l2-compat-ioctl32.c: copy clip list in put_v4l2_window32 (bnc#1012382).
- media: v4l2-compat-ioctl32.c: copy m.userptr in put_v4l2_plane32 (bnc#1012382).
- media: v4l2-compat-ioctl32.c: do not copy back the result for certain errors (bnc#1012382).
- media: v4l2-compat-ioctl32.c: drop pr_info for unknown buffer type (bnc#1012382).
- media: v4l2-compat-ioctl32.c: fix ctrl_is_pointer (bnc#1012382).
- media: v4l2-compat-ioctl32.c: fix the indentation (bnc#1012382).
- media: v4l2-compat-ioctl32.c: make ctrl_is_pointer work for subdevs (bnc#1012382).
- media: v4l2-compat-ioctl32.c: move 'helper' functions to __get/put_v4l2_format32 (bnc#1012382).
- media: v4l2-compat-ioctl32: Copy v4l2_window-&gt;global_alpha (bnc#1012382).
- media: v4l2-compat-ioctl32.c: refactor compat ioctl32 logic (bnc#1012382).
- media: v4l2-ioctl.c: do not copy back the result for -ENOTTY (bnc#1012382).
- mmc: bcm2835: Do not overwrite max frequency unconditionally (bsc#983145, git-fixes).
- mm/early_ioremap: Fix boot hang with earlyprintk=efi,keep (bnc#1012382).
- mm: hide a #warning for COMPILE_TEST (bnc#1012382).
- mm/kmemleak.c: make cond_resched() rate-limiting more efficient (git-fixes).
- mm: pin address_space before dereferencing it while isolating an LRU page (bnc#1081500).
- mm,vmscan: Make unregister_shrinker() no-op if register_shrinker() failed (bnc#1012382).
- mn10300/misalignment: Use SIGSEGV SEGV_MAPERR to report a failed user copy (bnc#1012382).
- modsign: hide openssl output in silent builds (bnc#1012382).
- module/retpoline: Warn about missing retpoline in module (bnc#1012382).
- mpt3sas: Do not mark fw_event workqueue as WQ_MEM_RECLAIM (bsc#1078583).
- mptfusion: hide unused seq_mpt_print_ioc_summary function (bnc#1012382).
- mtd: cfi: convert inline functions to macros (bnc#1012382).
- mtd: cfi: enforce valid geometry configuration (bnc#1012382).
- mtd: ichxrom: maybe-uninitialized with gcc-4.9 (bnc#1012382).
- mtd: maps: add __init attribute (bnc#1012382).
- mtd: nand: brcmnand: Disable prefetch by default (bnc#1012382).
- mtd: nand: denali_pci: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bnc#1012382).
- mtd: nand: Fix nand_do_read_oob() return value (bnc#1012382).
- mtd: nand: gpmi: Fix failure when a erased page has a bitflip at BBM (bnc#1012382).
- mtd: nand: sunxi: Fix ECC strength choice (bnc#1012382).
- mtd: sh_flctl: pass FIFO as physical address (bnc#1012382).
- mvpp2: fix multicast address filter (bnc#1012382).
- ncpfs: fix unused variable warning (bnc#1012382).
- ncr5380: shut up gcc indentation warning (bnc#1012382).
- net: add dst_cache support (bnc#1012382).
- net: arc_emac: fix arc_emac_rx() error paths (bnc#1012382).
- net: avoid skb_warn_bad_offload on IS_ERR (bnc#1012382).
- net: cdc_ncm: initialize drvflags before usage (bnc#1012382).
- net: dst_cache_per_cpu_dst_set() can be static (bnc#1012382).
- net: ena: add detection and recovery mechanism for handling missed/misrouted MSI-X (bsc#1083548).
- net: ena: add new admin define for future support of IPv6 RSS (bsc#1083548).
- net: ena: add power management ops to the ENA driver (bsc#1083548).
- net: ena: add statistics for missed tx packets (bsc#1083548).
- net: ena: fix error handling in ena_down() sequence (bsc#1083548).
- net: ena: fix race condition between device reset and link up setup (bsc#1083548).
- net: ena: fix rare kernel crash when bar memory remap fails (bsc#1083548).
- net: ena: fix wrong max Tx/Rx queues on ethtool (bsc#1083548).
- net: ena: improve ENA driver boot time (bsc#1083548).
- net: ena: increase ena driver version to 1.3.0 (bsc#1083548).
- net: ena: increase ena driver version to 1.5.0 (bsc#1083548).
- net: ena: reduce the severity of some printouts (bsc#1083548).
- net: ena: remove legacy suspend suspend/resume support (bsc#1083548).
- net: ena: Remove redundant unlikely() (bsc#1083548).
- net: ena: unmask MSI-X only after device initialization is completed (bsc#1083548).
- net: ethernet: cavium: Correct Cavium Thunderx NIC driver names accordingly to module name (bsc#1085011).
- net: ethernet: xilinx: Mark XILINX_LL_TEMAC broken on 64-bit (bnc#1012382).
- net: ethtool: Add back transceiver type (bsc#1085050).
- net: ethtool: remove error check for legacy setting transceiver type (bsc#1085050).
- netfilter: drop outermost socket lock in getsockopt() (bnc#1012382).
- netfilter: ebtables: CONFIG_COMPAT: do not trust userland offsets (bsc#1085107).
- netfilter: ebtables: fix erroneous reject of last rule (bsc#1085107).
- netfilter: ipt_CLUSTERIP: fix out-of-bounds accesses in clusterip_tg_check() (bnc#1012382).
- netfilter: ipvs: avoid unused variable warnings (bnc#1012382).
- netfilter: nf_queue: Make the queue_handler pernet (bnc#1012382).
- netfilter: nf_tables: fix a wrong check to skip the inactive rules (bsc#1042286).
- netfilter: nf_tables: fix inconsistent element expiration calculation (bsc#1042286).
- netfilter: nf_tables: fix *leak* when expr clone fail (bsc#1042286).
- netfilter: nf_tables: fix race when create new element in dynset (bsc#1042286).
- netfilter: on sockopt() acquire sock lock only in the required scope (bnc#1012382).
- netfilter: tee: select NF_DUP_IPV6 unconditionally (bsc#1042286).
- netfilter: x_tables: avoid out-of-bounds reads in xt_request_find_{match|target} (bnc#1012382).
- netfilter: x_tables: fix int overflow in xt_alloc_table_info() (bnc#1012382).
- netfilter: xt_RATEEST: acquire xt_rateest_mutex for hash insert (bnc#1012382).
- netfilter: xt_socket: fix transparent match for IPv6 request sockets (bsc#1042286).
- net: gianfar_ptp: move set_fipers() to spinlock protecting area (bnc#1012382).
- net: hns: add ACPI mode support for ethtool -p (bsc#1084041).
- net: hp100: remove unnecessary #ifdefs (bnc#1012382).
- net: igmp: add a missing rcu locking section (bnc#1012382).
- net/ipv4: Introduce IPSKB_FRAG_SEGS bit to inet_skb_parm.flags (bsc#1042286).
- netlink: fix nla_put_{u8,u16,u32} for KASAN (bnc#1012382).
- net/mlx5e: Fix loopback self test when GRO is off (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5e: Fix wrong delay calculation for overflow check scheduling (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5e: Verify inline header size do not exceed SKB linear size (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5: Use 128B cacheline size for 128B or larger cachelines (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net: phy: Keep reporting transceiver type (bsc#1085050).
- net: replace dst_cache ip6_tunnel implementation with the generic one (bnc#1012382).
- net_sched: red: Avoid devision by zero (bnc#1012382).
- net_sched: red: Avoid illegal values (bnc#1012382).
- net/smc: fix NULL pointer dereference on sock_create_kern() error path (bsc#1082979).
- netvsc: allow controlling send/recv buffer size (fate#315887, bsc#1082632).
- netvsc: allow driver to be removed even if VF is present (fate#315887, bsc#1082632).
- netvsc: check error return when restoring channels and mtu (fate#315887, bsc#1082632).
- netvsc: cleanup datapath switch (fate#315887, bsc#1082632).
- netvsc: do not signal host twice if empty (fate#315887, bsc#1082632).
- netvsc: fix deadlock betwen link status and removal (fate#315887, bsc#1082632).
- netvsc: increase default receive buffer size (fate#315887, bsc#1082632).
- netvsc: keep track of some non-fatal overload conditions (fate#315887, bsc#1082632).
- netvsc: no need to allocate send/receive on numa node (fate#315887, bsc#1082632).
- netvsc: propagate MAC address change to VF slave (fate#315887, bsc#1082632).
- netvsc: remove unnecessary cast of void pointer (fate#315887, bsc#1082632).
- netvsc: remove unnecessary check for NULL hdr (fate#315887, bsc#1082632).
- netvsc: whitespace cleanup (fate#315887, bsc#1082632).
- net: vxlan: lwt: Fix vxlan local traffic (bsc#1042286).
- net: vxlan: lwt: Use source ip address during route lookup (bsc#1042286).
- nfs: Add a cond_resched() to nfs_commit_release_pages() (bsc#1077779).
- nfs: commit direct writes even if they fail partially (bnc#1012382).
- nfsd: check for use of the closed special stateid (bnc#1012382).
- nfsd: CLOSE SHOULD return the invalid special stateid for NFSv4.x (x&gt;0) (bnc#1012382).
- nfsd: Ensure we check stateid validity in the seqid operation checks (bnc#1012382).
- nfs: Do not convert nfs_idmap_cache_timeout to jiffies (git-fixes).
- nfs: fix a deadlock in nfs client initialization (bsc#1074198).
- nfs/pnfs: fix nfs_direct_req ref leak when i/o falls back to the mds (bnc#1012382).
- nfs: reject request for id_legacy key without auxdata (bnc#1012382).
- nfs: Trunking detection should handle ERESTARTSYS/EINTR (bsc#1074198).
- nvme_fc: cleanup io completion (bsc#1079609).
- nvme_fc: correct abort race condition on resets (bsc#1079609).
- nvme_fc: fix abort race on teardown with lld reject (bsc#1083750).
- nvme_fc: fix ctrl create failures racing with workq items (bsc#1076982).
- nvme_fc: io timeout should defer abort to ctrl reset (bsc#1085054).
- nvme-fc: kick admin requeue list on disconnect (bsc#1077241).
- nvme-fc: merge error on sles12sp3 for reset_work (bsc#1079195).
- nvme_fc: minor fixes on sqsize (bsc#1076760).
- nvme_fc: on remoteport reuse, set new nport_id and role (bsc#1076760).
- nvme_fc: rework sqsize handling (bsc#1076760).
- nvme: Fix managing degraded controllers (bnc#1012382).
- nvme: Fix setting logical block format when revalidating (bsc#1079313).
- nvme: only start KATO if the controller is live (bsc#1083387).
- nvme-pci: clean up CMB initialization (bsc#1082979).
- nvme-pci: clean up SMBSZ bit definitions (bsc#1082979).
- nvme-pci: consistencly use ctrl-&gt;device for logging (bsc#1082979).
- nvme-pci: fix typos in comments (bsc#1082979).
- nvme-pci: Remap CMB SQ entries on every controller reset (bsc#1082979).
- nvme-pci: Use PCI bus address for data/queues in CMB (bsc#1082979).
- nvme: Quirks for PM1725 controllers (bsc#1082979).
- nvme_rdma: clear NVME_RDMA_Q_LIVE bit if reconnect fails (bsc#1083770).
- nvme-rdma: fix concurrent reset and reconnect (bsc#1082979).
- nvme: remove nvme_revalidate_ns (bsc#1079313).
- ocfs2: return error when we attempt to access a dirty bh in jbd2 (bsc#1070404).
- openvswitch: fix the incorrect flow action alloc size (bnc#1012382).
- ovl: fix failure to fsync lower dir (bnc#1012382).
- ovs/geneve: fix rtnl notifications on iface deletion (bsc#1042286).
- ovs/gre: fix rtnl notifications on iface deletion (bsc#1042286).
- ovs/gre,geneve: fix error path when creating an iface (bsc#1042286).
- ovs/vxlan: fix rtnl notifications on iface deletion (bsc#1042286).
- pci/ASPM: Do not retrain link if ASPM not possible (bnc#1071892).
- pci: hv: Do not sleep in compose_msi_msg() (fate#315887, bsc#1082632).
- pci: keystone: Fix interrupt-controller-node lookup (bnc#1012382).
- pci/MSI: Fix msi_desc-&gt;affinity memory leak when freeing MSI IRQs (bsc#1082979).
- perf bench numa: Fixup discontiguous/sparse numa nodes (bnc#1012382).
- perf top: Fix window dimensions change handling (bnc#1012382).
- perf/x86: Shut up false-positive -Wmaybe-uninitialized warning (bnc#1012382).
- pinctrl: sunxi: Fix A80 interrupt pin bank (bnc#1012382).
- pktcdvd: Fix pkt_setup_dev() error path (bnc#1012382).
- platform/x86: intel_mid_thermal: Fix suspend handlers unused warning (bnc#1012382).
- pm / devfreq: Propagate error from devfreq_add_device() (bnc#1012382).
- pm / wakeirq: Fix unbalanced IRQ enable for wakeirq (bsc#1031717).
- posix-timer: Properly check sigevent-&gt;sigev_notify (bnc#1012382).
- power: bq27xxx_battery: mark some symbols __maybe_unused (bnc#1012382).
- powerpc/64: Fix flush_(d|i)cache_range() called from modules (FATE#315275 LTC#103998 bnc#1012382 bnc#863764).
- powerpc/64s: Fix RFI flush dependency on HARDLOCKUP_DETECTOR (bnc#1012382).
- powerpc/64s: Improve RFI L1-D cache flush fallback (bsc#1068032, bsc#1075087).
- powerpc: Do not preempt_disable() in show_cpuinfo() (bsc#1066223).
- powerpc/numa: Ensure nodes initialized for hotplug (FATE#322022, bsc#1081514).
- powerpc/numa: Invalidate numa_cpu_lookup_table on cpu remove (bsc#1081512).
- powerpc/numa: Use ibm,max-associativity-domains to discover possible nodes (FATE#322022, bsc#1081514).
- powerpc/perf: Fix oops when grouping different pmu events (bnc#1012382).
- powerpc/powernv: Fix MCE handler to avoid trashing CR0/CR1 registers (bsc#1066223).
- powerpc/powernv: Move IDLE_STATE_ENTER_SEQ macro to cpuidle.h (bsc#1066223).
- powerpc/powernv: Support firmware disable of RFI flush (bsc#1068032, bsc#1075087).
- powerpc/pseries: Fix cpu hotplug crash with memoryless nodes (FATE#322022, bsc#1081514).
- powerpc/pseries: Support firmware disable of RFI flush (bsc#1068032, bsc#1075087).
- powerpc: Simplify module TOC handling (bnc#1012382).
- power: reset: zx-reboot: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bnc#1012382).
- profile: hide unused functions when !CONFIG_PROC_FS (bnc#1012382).
- Provide a function to create a NUL-terminated string from unterminated data (bnc#1012382).
- pwc: hide unused label (bnc#1012382).
- qla2xxx: Add changes for devloss timeout in driver (bsc#1084427).
- qla2xxx: Add FC-NVMe abort processing (bsc#1084427).
- qla2xxx: asynchronous pci probing (bsc#1034503).
- qla2xxx: Cleanup code to improve FC-NVMe error handling (bsc#1084427).
- qla2xxx: Convert QLA_TGT_ABTS to TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1043726,FATE#324770).
- qla2xxx: do not check login_state if no loop id is assigned (bsc#1081681).
- qla2xxx: ensure async flags are reset correctly (bsc#1081681).
- qla2xxx: Fix Async GPN_FT for FCP and FC-NVMe scan (bsc#1084427).
- qla2xxx: Fix FC-NVMe IO abort during driver reset (bsc#1084427).
- qla2xxx: Fix incorrect tcm_qla2xxx_free_cmd use during TMR ABORT (v2) (bsc#1043726,FATE#324770).
- qla2xxx: Fix n2n_ae flag to prevent dev_loss on PDB change (bsc#1084427).
- qla2xxx: Fix NVMe entry_type for iocb packet on BE system (bsc#1043726,FATE#324770).
- qla2xxx: Fix retry for PRLI RJT with reason of BUSY (bsc#1084427).
- qla2xxx: Fixup locking for session deletion (bsc#1081681).
- qla2xxx: Remove nvme_done_list (bsc#1084427).
- qla2xxx: Remove unneeded message and minor cleanup for FC-NVMe (bsc#1084427).
- qla2xxx: remove use of FC-specific error codes (bsc#1043726,FATE#324770).
- qla2xxx: Restore ZIO threshold setting (bsc#1084427).
- qla2xxx: Return busy if rport going away (bsc#1084427).
- qla2xxx: Set IIDMA and fcport state before qla_nvme_register_remote() (bsc#1084427).
- qla2xxx: Update driver version to 10.00.00.06-k (bsc#1084427).
- qlcnic: fix deadlock bug (bnc#1012382).
- r8169: fix RTL8168EP take too long to complete driver initialization (bnc#1012382).
- rdma/cma: Make sure that PSN is not over max allowed (bnc#1012382).
- rdma/uverbs: Protect from command mask overflow (bsc#1082979).
- reiserfs: avoid a -Wmaybe-uninitialized warning (bnc#1012382).
- Revert 'Bluetooth: btusb: fix QCA Rome suspend/resume' (bnc#1012382).
- Revert 'bpf: avoid false sharing of map refcount with max_entries' (kabi).
- Revert 'netfilter: nf_queue: Make the queue_handler pernet' (kabi).
- Revert 'net: replace dst_cache ip6_tunnel implementation with the generic one' (kabi bnc#1082897).
- Revert 'power: bq27xxx_battery: Remove unneeded dependency in Kconfig' (bnc#1012382).
- Revert 'powerpc: Simplify module TOC handling' (kabi).
- Revert SUSE-specific qla2xxx patch 'Add module parameter for interrupt mode' (bsc#1043726)
- Revert 'x86/entry/64: Separate cpu_current_top_of_stack from TSS.sp0'
- Revert 'x86/entry/64: Use a per-CPU trampoline stack for IDT entries'
- rfi-flush: Move the logic to avoid a redo into the debugfs code (bsc#1068032, bsc#1075087).
- rfi-flush: Switch to new linear fallback flush (bsc#1068032, bsc#1075087).
- rhashtable: add rhashtable_lookup_get_insert_key() (bsc#1042286).
- rtc-opal: Fix handling of firmware error codes, prevent busy loops (bnc#1012382).
- rtlwifi: fix gcc-6 indentation warning (bnc#1012382).
- rtlwifi: rtl8821ae: Fix connection lost problem correctly (bnc#1012382).
- s390: add no-execute support (FATE#324087, LTC#158827).
- s390/dasd: fix handling of internal requests (bsc#1080321).
- s390/dasd: fix wrongly assigned configuration data (bnc#1012382).
- s390/dasd: prevent prefix I/O error (bnc#1012382).
- s390: fix handling of -1 in set{,fs}[gu]id16 syscalls (bnc#1012382).
- s390: hypfs: Move diag implementation and data definitions (FATE#324070, LTC#158959).
- s390: kvm: Cpu model support for msa6, msa7 and msa8 (FATE#324069, LTC#159031).
- s390: Make cpc_name accessible (FATE#324070, LTC#158959).
- s390: Make diag224 public (FATE#324070, LTC#158959).
- s390/mem_detect: use unsigned longs (FATE#324071, LTC#158956).
- s390/mm: align swapper_pg_dir to 16k (FATE#324087, LTC#158827).
- s390/mm: always use PAGE_KERNEL when mapping pages (FATE#324087, LTC#158827).
- s390/noexec: execute kexec datamover without DAT (FATE#324087, LTC#158827).
- s390/oprofile: fix address range for asynchronous stack (bsc#1082979).
- s390/pageattr: allow kernel page table splitting (FATE#324087, LTC#158827).
- s390/pageattr: avoid unnecessary page table splitting (FATE#324087, LTC#158827).
- s390/pageattr: handle numpages parameter correctly (FATE#324087, LTC#158827).
- s390/pci_dma: improve lazy flush for unmap (bnc#1079886, LTC#163393).
- s390/pci_dma: improve map_sg (bnc#1079886, LTC#163393).
- s390/pci_dma: make lazy flush independent from the tlb_refresh bit (bnc#1079886, LTC#163393).
- s390/pci_dma: remove dma address range check (bnc#1079886, LTC#163393).
- s390/pci_dma: simplify dma address calculation (bnc#1079886, LTC#163393).
- s390/pci_dma: split dma_update_trans (bnc#1079886, LTC#163393).
- s390/pci: fix dma address calculation in map_sg (bnc#1079886, LTC#163393).
- s390/pci: handle insufficient resources during dma tlb flush (bnc#1079886, LTC#163393).
- s390/pgtable: introduce and use generic csp inline asm (FATE#324087, LTC#158827).
- s390/pgtable: make pmd and pud helper functions available (FATE#324087, LTC#158827).
- s390/qeth: fix underestimated count of buffer elements (bnc#1082089, LTC#164529).
- s390: report new vector facilities (FATE#324088, LTC#158828).
- s390/sclp: Add hmfai field (FATE#324071, LTC#158956).
- s390/vmem: align segment and region tables to 16k (FATE#324087, LTC#158827).
- s390/vmem: introduce and use SEGMENT_KERNEL and REGION3_KERNEL (FATE#324087, LTC#158827).
- s390/vmem: simplify vmem code for read-only mappings (FATE#324087, LTC#158827).
- sched/rt: Up the root domain ref count when passing it around via IPIs (bnc#1012382).
- sched/rt: Use container_of() to get root domain in rto_push_irq_work_func() (bnc#1012382).
- scripts/kernel-doc: Do not fail with status != 0 if error encountered with -none (bnc#1012382).
- scsi: aacraid: Fix hang in kdump (bsc#1022607, FATE#321673).
- scsi: aacraid: Prevent crash in case of free interrupt during scsi EH path (bnc#1012382).
- scsi: advansys: fix build warning for PCI=n (bnc#1012382).
- scsi: advansys: fix uninitialized data access (bnc#1012382).
- scsi: do not look for NULL devices handlers by name (bsc#1082373).
- scsi: fas216: fix sense buffer initialization (bsc#1082979).
- scsi: fdomain: drop fdomain_pci_tbl when built-in (bnc#1012382).
- scsi: hisi_sas: directly attached disk LED feature for v2 hw (bsc#1083409).
- scsi: ibmvfc: fix misdefined reserved field in ibmvfc_fcp_rsp_info (bnc#1012382).
- scsi: initio: remove duplicate module device table (bnc#1012382 bsc#1082979).
- scsi: initio: remove duplicate module device table (bsc#1082979).
- scsi: libsas: fix error when getting phy events (bsc#1082979).
- scsi: libsas: fix memory leak in sas_smp_get_phy_events() (bsc#1082979).
- scsi: lpfc: Add WQ Full Logic for NVME Target (bsc#1080656).
- scsi: lpfc: Allow set of maximum outstanding SCSI cmd limit for a target (bsc#1080656).
- scsi: lpfc: Beef up stat counters for debug (bsc#1076693).
- scsi: lpfc: correct debug counters for abort (bsc#1080656).
- scsi: lpfc: do not dereference localport before it has been null checked (bsc#1076693).
- scsi: lpfc: Do not return internal MBXERR_ERROR code from probe function (bsc#1082979).
- scsi: lpfc: fix a couple of minor indentation issues (bsc#1076693).
- scsi: lpfc: Fix -EOVERFLOW behavior for NVMET and defer_rcv (bsc#1076693).
- scsi: lpfc: Fix header inclusion in lpfc_nvmet (bsc#1080656).
- scsi: lpfc: Fix infinite wait when driver unregisters a remote NVME port (bsc#1076693).
- scsi: lpfc: Fix IO failure during hba reset testing with nvme io (bsc#1080656).
- scsi: lpfc: Fix issue_lip if link is disabled (bsc#1080656).
- scsi: lpfc: Fix issues connecting with nvme initiator (bsc#1076693).
- scsi: lpfc: Fix nonrecovery of NVME controller after cable swap (bsc#1080656).
- scsi: lpfc: Fix PRLI handling when topology type changes (bsc#1080656).
- scsi: lpfc: Fix receive PRLI handling (bsc#1076693).
- scsi: lpfc: Fix RQ empty firmware trap (bsc#1080656).
- scsi: lpfc: Fix SCSI io host reset causing kernel crash (bsc#1080656).
- scsi: lpfc: Fix SCSI LUN discovery when SCSI and NVME enabled (bsc#1076693).
- scsi: lpfc: Fix soft lockup in lpfc worker thread during LIP testing (bsc#1080656).
- scsi: lpfc: Increase CQ and WQ sizes for SCSI (bsc#1080656).
- scsi: lpfc: Increase SCSI CQ and WQ sizes (bsc#1076693).
- scsi: lpfc: Indicate CONF support in NVMe PRLI (bsc#1080656).
- scsi: lpfc: move placement of target destroy on driver detach (bsc#1080656).
- scsi: lpfc: Treat SCSI Write operation Underruns as an error (bsc#1080656).
- scsi: lpfc: Update 11.4.0.7 modified files for 2018 Copyright (bsc#1080656).
- scsi: lpfc: update driver version to 11.4.0.6 (bsc#1076693).
- scsi: lpfc: update driver version to 11.4.0.7 (bsc#1080656).
- scsi: lpfc: Validate adapter support for SRIU option (bsc#1080656).
- scsi: mvumi: use __maybe_unused to hide pm functions (bnc#1012382).
- scsi: qla2xxx: Ability to process multiple SGEs in Command SGL for CT passthrough commands (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Accelerate SCSI BUSY status generation in target mode (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Add ability to autodetect SFP type (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add ability to send PRLO (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add ability to use GPNFT/GNNFT for RSCN handling (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add ATIO-Q processing for INTx mode (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add boundary checks for exchanges to be offloaded (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add command completion for error path (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add debug knob for user control workload (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Add debug logging routine for qpair (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Added change to enable ZIO for FC-NVMe devices (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add FC-NVMe command handling (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add FC-NVMe F/W initialization and transport registration (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add FC-NVMe port discovery and PRLI handling (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add function call to qpair for door bell (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Add fw_started flags to qpair (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Add lock protection around host lookup (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add LR distance support from nvram bit (bsc#1043726,FATE#324770).
- scsi: qla2xxx: add missing includes for qla_isr (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add option for use reserve exch for ELS (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add ql2xiniexchg parameter (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Add retry limit for fabric scan logic (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add support for minimum link speed (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add switch command to simplify fabric discovery (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add timeout ability to wait_for_sess_deletion() (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add XCB counters to debugfs (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Allow ABTS, PURX, RIDA on ATIOQ for ISP83XX/27XX (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Allow MBC_GET_PORT_DATABASE to query and save the port states (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Allow relogin and session creation after reset (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Allow SNS fabric login to be retried (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Allow target mode to accept PRLI in dual mode (bsc#1043726,FATE#324770).
- scsi: qla2xxx: avoid unused-function warning (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Change ha-&gt;wq max_active value to default (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Changes to support N2N logins (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Chip reset uses wrong lock during IO flush (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Cleanup FC-NVMe code (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Cleanup NPIV host in target mode during config teardown (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Clear fc4f_nvme flag (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Clear loop id after delete (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Combine Active command arrays (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Convert 32-bit LUN usage to 64-bit (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Defer processing of GS IOCB calls (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Delay loop id allocation at login (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Do not call abort handler function during chip reset (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Do not call dma_free_coherent with IRQ disabled (bsc#1043726,FATE#324770).
- scsi: qla2xxx: do not include &lt;generated/utsrelease.h&gt; (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Enable Async TMF processing (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Enable ATIO interrupt handshake for ISP27XX (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Enable Target Multi Queue (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Fix abort command deadlock due to spinlock (FATE#320146, bsc#966328).
- scsi: qla2xxx: fix a bunch of typos and spelling mistakes (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix a locking imbalance in qlt_24xx_handle_els() (bsc#1082979).
- scsi: qla2xxx: Fix compile warning (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Fix FC-NVMe LUN discovery (bsc#1083223).
- scsi: qla2xxx: Fix Firmware dump size for Extended login and Exchange Offload (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix GPNFT/GNNFT error handling (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix gpnid error processing (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix incorrect handle for abort IOCB (bsc#1082979).
- scsi: qla2xxx: Fix login state machine freeze (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix login state machine stuck at GPDB (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix logo flag for qlt_free_session_done() (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix mailbox failure while deleting Queue pairs (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Fix memory leak in dual/target mode (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix NPIV host cleanup in target mode (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix NPIV host enable after chip reset (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix NULL pointer access for fcport structure (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix NULL pointer crash due to active timer for ABTS (bsc#1082979).
- scsi: qla2xxx: Fix NULL pointer crash due to probe failure (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix oops in qla2x00_probe_one error path (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix PRLI state check (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix queue ID for async abort with Multiqueue (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix recursion while sending terminate exchange (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix Relogin being triggered too fast (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix re-login for Nport Handle in use (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix remoteport disconnect for FC-NVMe (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix scan state field for fcport (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix session cleanup for N2N (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix slow mem alloc behind lock (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix smatch warning in qla25xx_delete_{rsp|req}_que (bsc#1043726,FATE#324770).
- scsi: qla2xxx: fix spelling mistake of variable sfp_additonal_info (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix system crash for Notify ack timeout handling (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix system crash in qlt_plogi_ack_unref (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix system crash while triggering FW dump (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix system panic due to pointer access problem (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix target multiqueue configuration (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix task mgmt handling for NPIV (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix warning during port_name debug print (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix warning for code intentation in __qla24xx_handle_gpdb_event() (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix warning in qla2x00_async_iocb_timeout() (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix WWPN/WWNN in debug message (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Handle PCIe error for driver (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Include Exchange offload/Extended Login into FW dump (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Increase ql2xmaxqdepth to 64 (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Increase verbosity of debug messages logged (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Migrate switch registration commands away from mailbox interface (bsc#1043726,FATE#324770).
- scsi: qla2xxx: move fields from qla_hw_data to qla_qpair (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Move function prototype to correct header (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Move logging default mask to execute once only (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Move session delete to driver work queue (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Move target stat counters from vha to qpair (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Move work element processing out of DPC thread (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Off by one in qlt_ctio_to_cmd() (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Preparation for Target MQ (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Prevent multiple active discovery commands per session (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Prevent relogin trigger from sending too many commands (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Prevent sp-&gt;free null/uninitialized pointer dereference (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Print correct mailbox registers in failed summary (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Properly extract ADISC error codes (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Protect access to qpair members with qpair-&gt;qp_lock (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Query FC4 type during RSCN processing (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Recheck session state after RSCN (bsc#1043726,FATE#324770)
- scsi: qla2xxx: Reduce the use of terminate exchange (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Reduce trace noise for Async Events (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Reinstate module parameter ql2xenablemsix (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Relogin to target port on a cable swap (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Remove aborting ELS IOCB call issued as part of timeout (FATE#320146, bsc#966328).
- scsi: qla2xxx: Remove an unused structure member (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Remove datasegs_per_cmd and datasegs_per_cont field (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Remove extra register read (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Remove extra register read (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Remove FC_NO_LOOP_ID for FCP and FC-NVMe Discovery (bsc#1084397).
- scsi: qla2xxx: Remove potential macro parameter side-effect in ql_dump_regs() (bsc#1043726,FATE#324770).
- scsi: qla2xxx: remove redundant assignment of d (bsc#1043726,FATE#324770).
- scsi: qla2xxx: remove redundant null check on tgt (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Remove redundant wait when target is stopped (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Remove session creation redundant code (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Remove unused argument from qlt_schedule_sess_for_deletion() (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Remove unused irq_cmd_count field (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Remove unused tgt_enable_64bit_addr flag (bsc#1043725,FATE#324770).
- scsi: qla2xxx: remove writeq/readq function definitions (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Replace fcport alloc with qla2x00_alloc_fcport (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Replace GPDB with async ADISC command (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Reset the logo flag, after target re-login (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Retry switch command on time out (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Send FC4 type NVMe to the management server (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Serialize GPNID for multiple RSCN (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Serialize session deletion by using work_lock (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Serialize session free in qlt_free_session_done (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Simpify unregistration of FC-NVMe local/remote ports (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Skip IRQ affinity for Target QPairs (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Skip zero queue count entry during FW dump capture (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Suppress a kernel complaint in qla_init_base_qpair() (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Tweak resource count dump (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Update Driver version to 10.00.00.00-k (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Update driver version to 10.00.00.01-k (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Update driver version to 10.00.00.02-k (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Update driver version to 10.00.00.03-k (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Update driver version to 10.00.00.04-k (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Update driver version to 10.00.00.05-k (bsc#1081681).
- scsi: qla2xxx: Update driver version to 9.01.00.00-k (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Update fw_started flags at qpair creation (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Use BIT_6 to acquire FAWWPN from switch (bsc#1043726,FATE#324770)
- scsi: qla2xxx: Use chip reset to bring down laser on unload (bsc#1043726,FATE#324770).
- scsi: qla2xxx: use dma_mapping_error to check map errors (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Use FC-NVMe FC4 type for FDMI registration (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Use IOCB path to submit Control VP MBX command (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Use known NPort ID for Management Server login (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Use ql2xnvmeenable to enable Q-Pair for FC-NVMe (bsc#1043726,FATE#324770).
- scsi: qla2xxx: use shadow register for ISP27XX (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Use shadow register for ISP27XX (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Use sp-&gt;free instead of hard coded call (bsc#1043726,FATE#324770).
- scsi: ses: do not get power status of SES device slot on probe (bsc#1082979).
- scsi: sim710: fix build warning (bnc#1012382).
- scsi: sr: workaround VMware ESXi cdrom emulation bug (bsc#1080813).
- scsi: storvsc: Fix scsi_cmd error assignments in storvsc_handle_error (bnc#1012382).
- scsi: storvsc: remove unnecessary channel inbound lock (fate#315887, bsc#1082632).
- scsi: sun_esp: fix device reference leaks (bsc#1082979).
- scsi: tcm_qla2xxx: Do not allow aborted cmd to advance (bsc#1043725,FATE#324770).
- scsi: ufs: ufshcd: fix potential NULL pointer dereference in ufshcd_config_vreg (bnc#1012382).
- sctp: make use of pre-calculated len (bnc#1012382).
- selinux: ensure the context is NUL terminated in security_context_to_sid_core() (bnc#1012382).
- selinux: general protection fault in sock_has_perm (bnc#1012382).
- selinux: skip bounded transition processing if the policy isn't loaded (bnc#1012382).
- serial: 8250_mid: fix broken DMA dependency (bnc#1012382).
- serial: 8250_uniphier: fix error return code in uniphier_uart_probe() (bsc#1031717).
- serial: imx: Only wakeup via RTSDEN bit if the system has RTS/CTS (bnc#1012382).
- series.conf: disable qla2xxx patches (bsc#1043725)
- sget(): handle failures of register_shrinker() (bnc#1012382).
- signal/openrisc: Fix do_unaligned_access to send the proper signal (bnc#1012382).
- signal/sh: Ensure si_signo is initialized in do_divide_error (bnc#1012382).
- SolutionEngine771x: fix Ether platform data (bnc#1012382).
- spi: atmel: fixed spin_lock usage inside atmel_spi_remove (bnc#1012382).
- spi: imx: do not access registers while clocks disabled (bnc#1012382).
- spi: sun4i: disable clocks in the remove function (bnc#1012382).
- ssb: mark ssb_bus_register as __maybe_unused (bnc#1012382).
- staging: android: ashmem: Fix a race condition in pin ioctls (bnc#1012382).
- staging: iio: adc: ad7192: fix external frequency setting (bnc#1012382).
- staging: rtl8188eu: Fix incorrect response to SIOCGIWESSID (bnc#1012382).
- staging: ste_rmi4: avoid unused function warnings (bnc#1012382).
- staging: unisys: visorinput depends on INPUT (bnc#1012382).
- staging: wilc1000: fix kbuild test robot error (bnc#1012382).
- sunrpc: Allow connect to return EHOSTUNREACH (bnc#1012382).
- target: Add support for TMR percpu reference counting (bsc#1043726,FATE#324770).
- target: Add TARGET_SCF_LOOKUP_LUN_FROM_TAG support for ABORT_TASK (bsc#1043726,FATE#324770).
- tc1100-wmi: fix build warning when CONFIG_PM not enabled (bnc#1012382).
- tc358743: fix register i2c_rd/wr function fix (git-fixes).
- tc358743: fix register i2c_rd/wr functions (bnc#1012382).
- tcp: do not set rtt_min to 1 (bsc#1042286).
- tcp: release sk_frag.page in tcp_disconnect (bnc#1012382).
- test_bpf: fix the dummy skb after dissector changes (bsc#1042286).
- tg3: Add workaround to restrict 5762 MRRS to 2048 (bnc#1012382).
- tg3: Enable PHY reset in MTU change path for 5720 (bnc#1012382).
- thermal: fix INTEL_SOC_DTS_IOSF_CORE dependencies (bnc#1012382).
- thermal: spear: use __maybe_unused for PM functions (bnc#1012382).
- tlan: avoid unused label with PCI=n (bnc#1012382).
- tools build: Add tools tree support for 'make -s' (bnc#1012382).
- tpm-dev-common: Reject too short writes (bsc#1020645, git-fixes).
- tpm: fix potential buffer overruns caused by bit glitches on the bus (bsc#1020645, git-fixes).
- tpm_i2c_infineon: fix potential buffer overruns caused by bit glitches on the bus (bsc#1020645, git-fixes).
- tpm_i2c_nuvoton: fix potential buffer overruns caused by bit glitches on the bus (bsc#1020645, git-fixes).
- tpm: st33zp24: fix potential buffer overruns caused by bit glitches on the bus (bsc#1020645, git-fixes).
- tpm_tis: fix potential buffer overruns caused by bit glitches on the bus (bsc#1020645, git-fixes).
- tty: cyclades: cyz_interrupt is only used for PCI (bnc#1012382).
- tty: hvc_xen: hide xen_console_remove when unused (bnc#1012382).
- tty: mxser: Remove ASYNC_CLOSING (bnc#1072363).
- ubi: block: Fix locking for idr_alloc/idr_remove (bnc#1012382).
- udp: restore UDPlite many-cast delivery (bsc#1042286).
- usb: build drivers/usb/common/ when USB_SUPPORT is set (bnc#1012382).
- usb: cdc-acm: Do not log urb submission errors on disconnect (bnc#1012382).
- usb: cdc_subset: only build when one driver is enabled (bnc#1012382).
- usb: dwc3: gadget: Set maxpacket size for ep0 IN (bnc#1012382).
- usb: f_fs: Prevent gadget unbind if it is already unbound (bnc#1012382).
- usb: gadget: do not dereference g until after it has been null checked (bnc#1012382).
- usb: gadget: f_fs: Process all descriptors during bind (bnc#1012382).
- usb: gadget: uvc: Missing files for configfs interface (bnc#1012382).
- usbip: fix 3eee23c3ec14 tcp_socket address still in the status file (bnc#1012382).
- usbip: keep usbip_device sockfd state in sync with tcp_socket (bnc#1012382).
- usbip: list: do not list devices attached to vhci_hcd (bnc#1012382).
- usbip: prevent bind loops on devices attached to vhci_hcd (bnc#1012382).
- usbip: vhci_hcd: clear just the USB_PORT_STAT_POWER bit (bnc#1012382).
- usb: ldusb: add PIDs for new CASSY devices supported by this driver (bnc#1012382).
- usb: musb/ux500: remove duplicate check for dma_is_compatible (bnc#1012382).
- usb: ohci: Proper handling of ed_rm_list to handle race condition between usb_kill_urb() and finish_unlinks() (bnc#1012382).
- usb: option: Add support for FS040U modem (bnc#1012382).
- usb: phy: msm add regulator dependency (bnc#1012382).
- usb: renesas_usbhs: missed the 'running' flag in usb_dmac with rx path (bnc#1012382).
- usb: serial: io_edgeport: fix possible sleep-in-atomic (bnc#1012382).
- usb: serial: pl2303: new device id for Chilitag (bnc#1012382).
- usb: serial: simple: add Motorola Tetra driver (bnc#1012382).
- usb: uas: unconditionally bring back host after reset (bnc#1012382).
- v4l: remove MEDIA_TUNER dependency for VIDEO_TUNER (bnc#1012382).
- vb2: V4L2_BUF_FLAG_DONE is set after DQBUF (bnc#1012382).
- vfs: do not do RCU lookup of empty pathnames (bnc#1012382).
- vhost_net: stop device during reset owner (bnc#1012382).
- video: fbdev: atmel_lcdfb: fix display-timings lookup (bnc#1012382).
- video: fbdev/mmp: add MODULE_LICENSE (bnc#1012382).
- video: fbdev: sis: remove unused variable (bnc#1012382).
- video: fbdev: via: remove possibly unused variables (bnc#1012382).
- video: Use bool instead int pointer for get_opt_bool() argument (bnc#1012382).
- virtio_balloon: prevent uninitialized variable use (bnc#1012382).
- vmbus: add per-channel sysfs info (fate#315887, bsc#1082632).
- vmbus: add prefetch to ring buffer iterator (fate#315887, bsc#1082632).
- vmbus: do not acquire the mutex in vmbus_hvsock_device_unregister() (fate#315887, bsc#1082632).
- vmbus: drop unused ring_buffer_info elements (fate#315887, bsc#1082632).
- vmbus: eliminate duplicate cached index (fate#315887, bsc#1082632).
- vmbus: hvsock: add proper sync for vmbus_hvsock_device_unregister() (fate#315887, bsc#1082632).
- vmbus: initialize reserved fields in messages (fate#315887, bsc#1082632).
- vmbus: make channel_message table constant (fate#315887, bsc#1082632).
- vmbus: more host signalling avoidance (fate#315887, bsc#1082632).
- vmbus: refactor hv_signal_on_read (fate#315887, bsc#1082632).
- vmbus: remove unused vmbus_sendpacket_ctl (fate#315887, bsc#1082632).
- vmbus: remove unused vmbus_sendpacket_multipagebuffer (fate#315887, bsc#1082632).
- vmbus: remove unused vmubs_sendpacket_pagebuffer_ctl (fate#315887, bsc#1082632).
- vmbus: Reuse uuid_le_to_bin() helper (fate#315887, bsc#1082632).
- vmbus: simplify hv_ringbuffer_read (fate#315887, bsc#1082632).
- vmbus: unregister device_obj-&gt;channels_kset (fate#315887, bsc#1082632).
- vmxnet3: prevent building with 64K pages (bnc#1012382).
- vxlan: consolidate csum flag handling (bsc#1042286).
- vxlan: consolidate output route calculation (bsc#1042286).
- vxlan: consolidate vxlan_xmit_skb and vxlan6_xmit_skb (bsc#1042286).
- vxlan: do not allow overwrite of config src addr (bsc#1042286).
- watchdog: imx2_wdt: restore previous timeout after suspend+resume (bnc#1012382).
- wireless: cw1200: use __maybe_unused to hide pm functions_ (bnc#1012382).
- x86: add MULTIUSER dependency for KVM (bnc#1012382).
- x86/asm: Fix inline asm call constraints for GCC 4.4 (bnc#1012382).
- x86/boot: Avoid warning for zero-filling .bss (bnc#1012382).
- x86: bpf_jit: small optimization in emit_bpf_tail_call() (bnc#1012382).
- x86/bugs: Drop one 'mitigation' from dmesg (bnc#1012382).
- x86/build: Silence the build with 'make -s' (bnc#1012382).
- x86/cpu/bugs: Make retpoline module warning conditional (bnc#1012382).
- x86/cpu: Change type of x86_cache_size variable to unsigned int (bnc#1012382).
- x86/entry/64: Separate cpu_current_top_of_stack from TSS.sp0 (bsc#1077560).
- x86/entry/64: Use a per-CPU trampoline stack for IDT entries (bsc#1077560).
- x86: fix build warnign with 32-bit PAE (bnc#1012382).
- x86/fpu/math-emu: Fix possible uninitialized variable use (bnc#1012382).
- x86/hyperv: Implement hv_get_tsc_page() (fate#315887, bsc#1082632).
- x86/hyper-v: include hyperv/ only when CONFIG_HYPERV is set (fate#315887, bsc#1082632).
- x86/hyper-v: Introduce fast hypercall implementation (fate#315887, bsc#1082632).
- x86/hyper-v: Make hv_do_hypercall() inline (fate#315887, bsc#1082632).
- x86/hyperv: Move TSC reading method to asm/mshyperv.h (fate#315887, bsc#1082632).
- x86/kaiser: fix build error with KASAN &amp;&amp; !FUNCTION_GRAPH_TRACER (bnc#1012382).
- x86/kvm/vmx: do not use vm-exit instruction length for fast MMIO when running nested (bsc#1081431).
- x86/mce: Pin the timer when modifying (bsc#1080851,1076282).
- x86/microcode/AMD: Change load_microcode_amd()'s param to bool to fix preemptibility bug (bnc#1012382).
- x86/microcode/AMD: Do not load when running on a hypervisor (bsc#1081436 bsc#1081437).
- x86/microcode: Do the family check first (bnc#1012382).
- x86/microcode: Do the family check first (bsc#1081436 bsc#1081437).
- x86/mm/kmmio: Fix mmiotrace for page unaligned addresses (bnc#1012382).
- x86/mm/pkeys: Fix fill_sig_info_pkey (fate#321300).
- x86/nospec: Fix header guards names (bnc#1012382).
- x86/oprofile: Fix bogus GCC-8 warning in nmi_setup() (bnc#1012382).
- x86/paravirt: Remove 'noreplace-paravirt' cmdline option (bnc#1012382).
- x86/platform: Add PCI dependency for PUNIT_ATOM_DEBUG (bnc#1012382).
- x86/platform/olpc: Fix resume handler build warning (bnc#1012382).
- x86/pti: Make unpoison of pgd for trusted boot work for real (bnc#1012382).
- x86/ras/inject: Make it depend on X86_LOCAL_APIC=y (bnc#1012382).
- x86/retpoline: Avoid retpolines for built-in __init functions (bnc#1012382).
- x86/retpoline/hyperv: Convert assembler indirect jumps (fate#315887, bsc#1082632).
- x86/retpoline: Remove the esp/rsp thunk (bnc#1012382).
- x86/spectre: Check CONFIG_RETPOLINE in command line parser (bnc#1012382).
- x86/spectre: Fix an error message (git-fixes).
- x86/spectre: Fix spelling mistake: 'vunerable'-&gt; 'vulnerable' (bnc#1012382).
- x86/spectre: Remove the out-of-tree RSB stuffing
- x86/spectre: Simplify spectre_v2 command line parsing (bnc#1012382).
- x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL (bnc#1012382).
- x86/xen: Zero MSR_IA32_SPEC_CTRL before suspend (bnc#1065600).
- xen/gntdev: Fix off-by-one error when unmapping with holes (bnc#1012382).
- xen/gntdev: Fix partial gntdev_mmap() cleanup (bnc#1012382).
- xen-netfront: enable device after manual module load (bnc#1012382).
- xen-netfront: remove warning when unloading module (bnc#1012382).
- xen: XEN_ACPI_PROCESSOR is Dom0-only (bnc#1012382).
- xfrm: check id proto in validate_tmpl() (bnc#1012382).
- xfrm: Fix stack-out-of-bounds read on socket policy lookup (bnc#1012382).
- xfrm: Fix stack-out-of-bounds with misconfigured transport mode policies (bnc#1012382).
- xfrm_user: propagate sec ctx allocation errors (bsc#1042286).
- xfs: do not chain ioends during writepage submission (bsc#1077285 bsc#1043441).
- xfs: factor mapping out of xfs_do_writepage (bsc#1077285 bsc#1043441).
- xfs: Introduce writeback context for writepages (bsc#1077285 bsc#1043441).
- xfs: ioends require logically contiguous file offsets (bsc#1077285 bsc#1043441).
- xfs: quota: check result of register_shrinker() (bnc#1012382).
- xfs: quota: fix missed destroy of qi_tree_lock (bnc#1012382).
- xfs: reinit btree pointer on attr tree inactivation walk (bsc#1078787).
- xfs: remove nonblocking mode from xfs_vm_writepage (bsc#1077285 bsc#1043441).
- xfs: remove xfs_cancel_ioend (bsc#1077285 bsc#1043441).
- xfs: stop searching for free slots in an inode chunk when there are none (bsc#1072739).
- xfs: toggle readonly state around xfs_log_mount_finish (bsc#1073401).
- xfs: ubsan fixes (bnc#1012382).
- xfs: validate sb_logsunit is a multiple of the fs blocksize (bsc#1077513).
- xfs: write unmount record for ro mounts (bsc#1073401).
- xfs: xfs_cluster_write is redundant (bsc#1077285 bsc#1043441).
- xtensa: fix futex_atomic_cmpxchg_inatomic (bnc#1012382).
- zram: fix operator precedence to get offset (bsc#1082979).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-23"/>
	<updated date="2018-03-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1006867">SUSE bug 1006867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015342">SUSE bug 1015342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015343">SUSE bug 1015343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020645">SUSE bug 1020645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022607">SUSE bug 1022607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024376">SUSE bug 1024376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027054">SUSE bug 1027054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031717">SUSE bug 1031717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033587">SUSE bug 1033587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034503">SUSE bug 1034503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042286">SUSE bug 1042286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043441">SUSE bug 1043441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043725">SUSE bug 1043725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043726">SUSE bug 1043726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062840">SUSE bug 1062840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065615">SUSE bug 1065615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066223">SUSE bug 1066223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067118">SUSE bug 1067118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068569">SUSE bug 1068569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069135">SUSE bug 1069135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070404">SUSE bug 1070404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071306">SUSE bug 1071306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071892">SUSE bug 1071892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072363">SUSE bug 1072363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072689">SUSE bug 1072689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072739">SUSE bug 1072739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072865">SUSE bug 1072865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073401">SUSE bug 1073401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073407">SUSE bug 1073407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074198">SUSE bug 1074198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074426">SUSE bug 1074426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075087">SUSE bug 1075087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076282">SUSE bug 1076282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076693">SUSE bug 1076693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076760">SUSE bug 1076760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076982">SUSE bug 1076982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077241">SUSE bug 1077241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077285">SUSE bug 1077285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077513">SUSE bug 1077513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077560">SUSE bug 1077560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077779">SUSE bug 1077779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078583">SUSE bug 1078583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078672">SUSE bug 1078672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078673">SUSE bug 1078673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078787">SUSE bug 1078787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079029">SUSE bug 1079029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079038">SUSE bug 1079038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079195">SUSE bug 1079195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079313">SUSE bug 1079313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079384">SUSE bug 1079384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079609">SUSE bug 1079609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079886">SUSE bug 1079886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079989">SUSE bug 1079989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080014">SUSE bug 1080014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080263">SUSE bug 1080263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080321">SUSE bug 1080321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080344">SUSE bug 1080344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080364">SUSE bug 1080364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080384">SUSE bug 1080384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080464">SUSE bug 1080464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080533">SUSE bug 1080533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080656">SUSE bug 1080656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080774">SUSE bug 1080774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080813">SUSE bug 1080813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080851">SUSE bug 1080851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081134">SUSE bug 1081134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081431">SUSE bug 1081431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081436">SUSE bug 1081436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081437">SUSE bug 1081437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081491">SUSE bug 1081491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081498">SUSE bug 1081498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081500">SUSE bug 1081500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081512">SUSE bug 1081512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081514">SUSE bug 1081514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081681">SUSE bug 1081681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081735">SUSE bug 1081735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082089">SUSE bug 1082089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082223">SUSE bug 1082223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082299">SUSE bug 1082299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082373">SUSE bug 1082373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082478">SUSE bug 1082478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082632">SUSE bug 1082632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082795">SUSE bug 1082795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082864">SUSE bug 1082864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082897">SUSE bug 1082897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082979">SUSE bug 1082979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082993">SUSE bug 1082993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083048">SUSE bug 1083048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083086">SUSE bug 1083086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083223">SUSE bug 1083223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083387">SUSE bug 1083387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083409">SUSE bug 1083409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083494">SUSE bug 1083494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083548">SUSE bug 1083548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083750">SUSE bug 1083750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083770">SUSE bug 1083770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084041">SUSE bug 1084041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084397">SUSE bug 1084397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084427">SUSE bug 1084427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084610">SUSE bug 1084610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084772">SUSE bug 1084772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084888">SUSE bug 1084888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084926">SUSE bug 1084926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084928">SUSE bug 1084928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084967">SUSE bug 1084967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085011">SUSE bug 1085011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085015">SUSE bug 1085015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085045">SUSE bug 1085045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085047">SUSE bug 1085047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085050">SUSE bug 1085050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085053">SUSE bug 1085053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085054">SUSE bug 1085054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085056">SUSE bug 1085056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085107">SUSE bug 1085107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085224">SUSE bug 1085224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085239">SUSE bug 1085239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863764">SUSE bug 863764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966170">SUSE bug 966170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966172">SUSE bug 966172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966328">SUSE bug 966328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969476">SUSE bug 969476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969477">SUSE bug 969477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975772">SUSE bug 975772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983145">SUSE bug 983145</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15951/">CVE-2017-15951</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16644/">CVE-2017-16644</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16912/">CVE-2017-16912</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16913/">CVE-2017-16913</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17975/">CVE-2017-17975</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18174/">CVE-2017-18174</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18208/">CVE-2017-18208</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000026/">CVE-2018-1000026</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8087/">CVE-2018-8087</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520588" comment="kernel-default-4.4.120-94.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520589" comment="kernel-default-devel-4.4.120-94.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520590" comment="kernel-default-extra-4.4.120-94.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520591" comment="kernel-devel-4.4.120-94.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520592" comment="kernel-macros-4.4.120-94.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520593" comment="kernel-source-4.4.120-94.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520594" comment="kernel-syms-4.4.120-94.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78481" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1045315" ref_url="https://bugzilla.suse.com/1045315" source="BUGZILLA"/>
		<reference ref_id="1049423" ref_url="https://bugzilla.suse.com/1049423" source="BUGZILLA"/>
		<reference ref_id="1052449" ref_url="https://bugzilla.suse.com/1052449" source="BUGZILLA"/>
		<reference ref_id="1082858" ref_url="https://bugzilla.suse.com/1082858" source="BUGZILLA"/>
		<reference ref_id="1083915" ref_url="https://bugzilla.suse.com/1083915" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423/" source="CVE"/>
		<reference ref_id="CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419/" source="CVE"/>
		<reference ref_id="CVE-2018-0202" ref_url="https://www.suse.com/security/cve/CVE-2018-0202/" source="CVE"/>
		<reference ref_id="CVE-2018-1000085" ref_url="https://www.suse.com/security/cve/CVE-2018-1000085/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00060.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

Security issues fixed:

- CVE-2012-6706: VMSF_DELTA filter inside the unrar implementation allows an arbitrary memory write (bsc#1045315).
- CVE-2017-6419: A heap-based buffer overflow that can lead to a denial of service in libmspack via a crafted CHM file (bsc#1052449).
- CVE-2017-11423: A stack-based buffer over-read that can lead to a denial of service in mspack via a crafted CAB file (bsc#1049423).
- CVE-2018-1000085: An out-of-bounds heap read vulnerability was found in XAR parser that can lead to a denial of service (bsc#1082858).
- CVE-2018-0202: Fixed two vulnerabilities in the PDF parsing code (bsc#1083915).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-26"/>
	<updated date="2018-03-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045315">SUSE bug 1045315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049423">SUSE bug 1049423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052449">SUSE bug 1052449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082858">SUSE bug 1082858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083915">SUSE bug 1083915</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0202/">CVE-2018-0202</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000085/">CVE-2018-1000085</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519046" comment="clamav-0.99.4-33.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78482" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1083302" ref_url="https://bugzilla.suse.com/1083302" source="BUGZILLA"/>
		<reference ref_id="1083303" ref_url="https://bugzilla.suse.com/1083303" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5732" ref_url="https://www.suse.com/security/cve/CVE-2018-5732/" source="CVE"/>
		<reference ref_id="CVE-2018-5733" ref_url="https://www.suse.com/security/cve/CVE-2018-5733/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003843.html" source="SUSE-SU"/>
		<description>
This update for dhcp fixes the following issues:

Security issues fixed:

- CVE-2018-5733: reference count overflow in dhcpd (bsc#1083303).
- CVE-2018-5732: buffer overflow in dhclient (bsc#1083302).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-26"/>
	<updated date="2018-03-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083302">SUSE bug 1083302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083303">SUSE bug 1083303</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5732/">CVE-2018-5732</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5733/">CVE-2018-5733</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519047" comment="dhcp-4.3.3-10.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519048" comment="dhcp-client-4.3.3-10.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78483" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1077080" ref_url="https://bugzilla.suse.com/1077080" source="BUGZILLA"/>
		<reference ref_id="1082692" ref_url="https://bugzilla.suse.com/1082692" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17997" ref_url="https://www.suse.com/security/cve/CVE-2017-17997/" source="CVE"/>
		<reference ref_id="CVE-2018-7320" ref_url="https://www.suse.com/security/cve/CVE-2018-7320/" source="CVE"/>
		<reference ref_id="CVE-2018-7321" ref_url="https://www.suse.com/security/cve/CVE-2018-7321/" source="CVE"/>
		<reference ref_id="CVE-2018-7322" ref_url="https://www.suse.com/security/cve/CVE-2018-7322/" source="CVE"/>
		<reference ref_id="CVE-2018-7323" ref_url="https://www.suse.com/security/cve/CVE-2018-7323/" source="CVE"/>
		<reference ref_id="CVE-2018-7324" ref_url="https://www.suse.com/security/cve/CVE-2018-7324/" source="CVE"/>
		<reference ref_id="CVE-2018-7325" ref_url="https://www.suse.com/security/cve/CVE-2018-7325/" source="CVE"/>
		<reference ref_id="CVE-2018-7326" ref_url="https://www.suse.com/security/cve/CVE-2018-7326/" source="CVE"/>
		<reference ref_id="CVE-2018-7327" ref_url="https://www.suse.com/security/cve/CVE-2018-7327/" source="CVE"/>
		<reference ref_id="CVE-2018-7328" ref_url="https://www.suse.com/security/cve/CVE-2018-7328/" source="CVE"/>
		<reference ref_id="CVE-2018-7329" ref_url="https://www.suse.com/security/cve/CVE-2018-7329/" source="CVE"/>
		<reference ref_id="CVE-2018-7330" ref_url="https://www.suse.com/security/cve/CVE-2018-7330/" source="CVE"/>
		<reference ref_id="CVE-2018-7331" ref_url="https://www.suse.com/security/cve/CVE-2018-7331/" source="CVE"/>
		<reference ref_id="CVE-2018-7332" ref_url="https://www.suse.com/security/cve/CVE-2018-7332/" source="CVE"/>
		<reference ref_id="CVE-2018-7333" ref_url="https://www.suse.com/security/cve/CVE-2018-7333/" source="CVE"/>
		<reference ref_id="CVE-2018-7334" ref_url="https://www.suse.com/security/cve/CVE-2018-7334/" source="CVE"/>
		<reference ref_id="CVE-2018-7335" ref_url="https://www.suse.com/security/cve/CVE-2018-7335/" source="CVE"/>
		<reference ref_id="CVE-2018-7336" ref_url="https://www.suse.com/security/cve/CVE-2018-7336/" source="CVE"/>
		<reference ref_id="CVE-2018-7337" ref_url="https://www.suse.com/security/cve/CVE-2018-7337/" source="CVE"/>
		<reference ref_id="CVE-2018-7417" ref_url="https://www.suse.com/security/cve/CVE-2018-7417/" source="CVE"/>
		<reference ref_id="CVE-2018-7418" ref_url="https://www.suse.com/security/cve/CVE-2018-7418/" source="CVE"/>
		<reference ref_id="CVE-2018-7419" ref_url="https://www.suse.com/security/cve/CVE-2018-7419/" source="CVE"/>
		<reference ref_id="CVE-2018-7420" ref_url="https://www.suse.com/security/cve/CVE-2018-7420/" source="CVE"/>
		<reference ref_id="CVE-2018-7421" ref_url="https://www.suse.com/security/cve/CVE-2018-7421/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Security issue fixed (bsc#1082692):

- CVE-2018-7335: The IEEE 802.11 dissector could crash (wnpa-sec-2018-05)
- CVE-2018-7321: thrift long dissector loop (dissect_thrift_map)
- CVE-2018-7322: DICOM: inifinite loop (dissect_dcm_tag)
- CVE-2018-7323: WCCP: very long loop (dissect_wccp2_alternate_mask_value_set_element)
- CVE-2018-7324: SCCP: infinite loop (dissect_sccp_optional_parameters)
- CVE-2018-7325: RPKI-Router Protocol: infinite loop (dissect_rpkirtr_pdu)
- CVE-2018-7326: LLTD: infinite loop (dissect_lltd_tlv)
- CVE-2018-7327: openflow_v6: infinite loop (dissect_openflow_bundle_control_v6)
- CVE-2018-7328: USB-DARWIN: long loop (dissect_darwin_usb_iso_transfer)
- CVE-2018-7329: S7COMM: infinite loop (s7comm_decode_ud_cpu_alarm_main)
- CVE-2018-7330: thread_meshcop: infinite loop (get_chancount)
- CVE-2018-7331: GTP: infinite loop (dissect_gprscdr_GGSNPDPRecord, dissect_ber_set)
- CVE-2018-7332: RELOAD: infinite loop (dissect_statans)
- CVE-2018-7333: RPCoRDMA: infinite loop in get_write_list_chunk_count
- CVE-2018-7421: Multiple dissectors could go into large infinite loops (wnpa-sec-2018-06)
- CVE-2018-7334: The UMTS MAC dissector could crash (wnpa-sec-2018-07)
- CVE-2018-7337: The DOCSIS dissector could crash (wnpa-sec-2018-08)
- CVE-2018-7336: The FCP dissector could crash (wnpa-sec-2018-09)
- CVE-2018-7320: The SIGCOMP dissector could crash (wnpa-sec-2018-10)
- CVE-2018-7420: The pcapng file parser could crash (wnpa-sec-2018-11)
- CVE-2018-7417: The IPMI dissector could crash (wnpa-sec-2018-12)
- CVE-2018-7418: The SIGCOMP dissector could crash (wnpa-sec-2018-13)
- CVE-2018-7419: The NBAP disssector could crash (wnpa-sec-2018-14)
- CVE-2017-17997: Misuse of NULL pointer in MRDISC dissector (bsc#1077080).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-26"/>
	<updated date="2018-03-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077080">SUSE bug 1077080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17997/">CVE-2017-17997</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7320/">CVE-2018-7320</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7321/">CVE-2018-7321</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7322/">CVE-2018-7322</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7323/">CVE-2018-7323</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7324/">CVE-2018-7324</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7325/">CVE-2018-7325</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7326/">CVE-2018-7326</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7327/">CVE-2018-7327</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7328/">CVE-2018-7328</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7329/">CVE-2018-7329</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7330/">CVE-2018-7330</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7331/">CVE-2018-7331</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7332/">CVE-2018-7332</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7333/">CVE-2018-7333</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7334/">CVE-2018-7334</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7335/">CVE-2018-7335</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7336/">CVE-2018-7336</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7337/">CVE-2018-7337</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7417/">CVE-2018-7417</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7418/">CVE-2018-7418</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7419/">CVE-2018-7419</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7420/">CVE-2018-7420</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7421/">CVE-2018-7421</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519049" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519050" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519051" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519052" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519053" comment="wireshark-2.2.13-48.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519054" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78484" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1051042" ref_url="https://bugzilla.suse.com/1051042" source="BUGZILLA"/>
		<reference ref_id="1053188" ref_url="https://bugzilla.suse.com/1053188" source="BUGZILLA"/>
		<reference ref_id="1063675" ref_url="https://bugzilla.suse.com/1063675" source="BUGZILLA"/>
		<reference ref_id="1064569" ref_url="https://bugzilla.suse.com/1064569" source="BUGZILLA"/>
		<reference ref_id="1064580" ref_url="https://bugzilla.suse.com/1064580" source="BUGZILLA"/>
		<reference ref_id="1064583" ref_url="https://bugzilla.suse.com/1064583" source="BUGZILLA"/>
		<reference ref_id="1070905" ref_url="https://bugzilla.suse.com/1070905" source="BUGZILLA"/>
		<reference ref_id="1071319" ref_url="https://bugzilla.suse.com/1071319" source="BUGZILLA"/>
		<reference ref_id="1073231" ref_url="https://bugzilla.suse.com/1073231" source="BUGZILLA"/>
		<reference ref_id="1074293" ref_url="https://bugzilla.suse.com/1074293" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000408" ref_url="https://www.suse.com/security/cve/CVE-2017-1000408/" source="CVE"/>
		<reference ref_id="CVE-2017-1000409" ref_url="https://www.suse.com/security/cve/CVE-2017-1000409/" source="CVE"/>
		<reference ref_id="CVE-2017-15670" ref_url="https://www.suse.com/security/cve/CVE-2017-15670/" source="CVE"/>
		<reference ref_id="CVE-2017-15671" ref_url="https://www.suse.com/security/cve/CVE-2017-15671/" source="CVE"/>
		<reference ref_id="CVE-2017-15804" ref_url="https://www.suse.com/security/cve/CVE-2017-15804/" source="CVE"/>
		<reference ref_id="CVE-2017-16997" ref_url="https://www.suse.com/security/cve/CVE-2017-16997/" source="CVE"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00037.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- A privilege escalation bug in the realpath() function has been fixed.
  [CVE-2018-1000001, bsc#1074293]

- A memory leak and a buffer overflow in the dynamic ELF loader has been fixed.
  [CVE-2017-1000408, CVE-2017-1000409, bsc#1071319]

- An issue in the code handling RPATHs was fixed that could have been exploited
  by an attacker to execute code loaded from arbitrary libraries.
  [CVE-2017-16997, bsc#1073231]

- A potential crash caused by a use-after-free bug in pthread_create() has been
  fixed. [bsc#1053188]

- A bug that prevented users to build shared objects which use the optimized
  libmvec.so API has been fixed. [bsc#1070905]

- A memory leak in the glob() function has been fixed. [CVE-2017-15670,
  CVE-2017-15671, CVE-2017-15804, bsc#1064569, bsc#1064580, bsc#1064583]

- A bug that would lose the syscall error code value in case of crashes has
  been fixed. [bsc#1063675]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051042">SUSE bug 1051042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053188">SUSE bug 1053188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063675">SUSE bug 1063675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064569">SUSE bug 1064569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064580">SUSE bug 1064580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064583">SUSE bug 1064583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070905">SUSE bug 1070905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071319">SUSE bug 1071319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073231">SUSE bug 1073231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074293">SUSE bug 1074293</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000408/">CVE-2017-1000408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000409/">CVE-2017-1000409</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15670/">CVE-2017-15670</cve>
	<cve impact="important" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15671/">CVE-2017-15671</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15804/">CVE-2017-15804</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16997/">CVE-2017-16997</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519055" comment="glibc-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519056" comment="glibc-32bit-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519057" comment="glibc-devel-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519058" comment="glibc-devel-32bit-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519059" comment="glibc-i18ndata-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519060" comment="glibc-locale-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519061" comment="glibc-locale-32bit-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519062" comment="nscd-2.22-62.3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78485" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1057662" ref_url="https://bugzilla.suse.com/1057662" source="BUGZILLA"/>
		<reference ref_id="1081725" ref_url="https://bugzilla.suse.com/1081725" source="BUGZILLA"/>
		<reference ref_id="1083926" ref_url="https://bugzilla.suse.com/1083926" source="BUGZILLA"/>
		<reference ref_id="1083927" ref_url="https://bugzilla.suse.com/1083927" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5729" ref_url="https://www.suse.com/security/cve/CVE-2018-5729/" source="CVE"/>
		<reference ref_id="CVE-2018-5730" ref_url="https://www.suse.com/security/cve/CVE-2018-5730/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003856.html" source="SUSE-SU"/>
		<description>
This update for krb5 provides the following fixes:

Security issues fixed:

- CVE-2018-5730: DN container check bypass by supplying special crafted data (bsc#1083927).
- CVE-2018-5729: Null pointer dereference in kadmind or DN container check bypass by supplying special crafted data (bsc#1083926).

Non-security issues fixed:

- Make it possible for legacy applications (e.g. SAP Netweaver) to remain compatible with
  newer Kerberos. System administrators who are experiencing this kind of compatibility
  issues may set the environment variable GSSAPI_ASSUME_MECH_MATCH to a non-empty value,
  and make sure the environment variable is visible and effective to the application
  startup script. (bsc#1057662)
- Fix a GSS failure in legacy applications by not indicating deprecated GSS mechanisms in
  gss_indicate_mech() list. (bsc#1081725)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-29"/>
	<updated date="2018-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1057662">SUSE bug 1057662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081725">SUSE bug 1081725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083926">SUSE bug 1083926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083927">SUSE bug 1083927</bugzilla>
	<cve impact="moderate" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5729/">CVE-2018-5729</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5730/">CVE-2018-5730</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519116" comment="krb5-1.12.5-40.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519117" comment="krb5-32bit-1.12.5-40.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519118" comment="krb5-client-1.12.5-40.23.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78486" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1085130" ref_url="https://bugzilla.suse.com/1085130" source="BUGZILLA"/>
		<reference ref_id="1085671" ref_url="https://bugzilla.suse.com/1085671" source="BUGZILLA"/>
		<reference ref_id="1087059" ref_url="https://bugzilla.suse.com/1087059" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5125" ref_url="https://www.suse.com/security/cve/CVE-2018-5125/" source="CVE"/>
		<reference ref_id="CVE-2018-5127" ref_url="https://www.suse.com/security/cve/CVE-2018-5127/" source="CVE"/>
		<reference ref_id="CVE-2018-5129" ref_url="https://www.suse.com/security/cve/CVE-2018-5129/" source="CVE"/>
		<reference ref_id="CVE-2018-5130" ref_url="https://www.suse.com/security/cve/CVE-2018-5130/" source="CVE"/>
		<reference ref_id="CVE-2018-5131" ref_url="https://www.suse.com/security/cve/CVE-2018-5131/" source="CVE"/>
		<reference ref_id="CVE-2018-5144" ref_url="https://www.suse.com/security/cve/CVE-2018-5144/" source="CVE"/>
		<reference ref_id="CVE-2018-5145" ref_url="https://www.suse.com/security/cve/CVE-2018-5145/" source="CVE"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<reference ref_id="CVE-2018-5147" ref_url="https://www.suse.com/security/cve/CVE-2018-5147/" source="CVE"/>
		<reference ref_id="CVE-2018-5148" ref_url="https://www.suse.com/security/cve/CVE-2018-5148/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed in Firefox ESR 52.7.3 (bsc#1085130):

- CVE-2018-5125: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7
- CVE-2018-5127: Buffer overflow manipulating SVG animatedPathSegList
- CVE-2018-5129: Out-of-bounds write with malformed IPC messages
- CVE-2018-5130: Mismatched RTP payload type can trigger memory corruption
- CVE-2018-5131: Fetch API improperly returns cached copies of no-store/no-cache resources
- CVE-2018-5144: Integer overflow during Unicode conversion
- CVE-2018-5145: Memory safety bugs fixed in Firefox ESR 52.7
- CVE-2018-5146: Out of bounds memory write in libvorbis (bsc#1085671)
- CVE-2018-5147: Out of bounds memory write in libtremor (bsc#1085671)
- CVE-2018-5148: Use-after-free in compositor (MFSA 2018-10) (bsc#1087059)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-29"/>
	<updated date="2018-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085671">SUSE bug 1085671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087059">SUSE bug 1087059</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5125/">CVE-2018-5125</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5127/">CVE-2018-5127</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5129/">CVE-2018-5129</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5130/">CVE-2018-5130</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5131/">CVE-2018-5131</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5144/">CVE-2018-5144</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5145/">CVE-2018-5145</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5147/">CVE-2018-5147</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5148/">CVE-2018-5148</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519119" comment="MozillaFirefox-52.7.3esr-109.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519120" comment="MozillaFirefox-translations-52.7.3esr-109.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78487" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1043290" ref_url="https://bugzilla.suse.com/1043290" source="BUGZILLA"/>
		<reference ref_id="1050087" ref_url="https://bugzilla.suse.com/1050087" source="BUGZILLA"/>
		<reference ref_id="1056434" ref_url="https://bugzilla.suse.com/1056434" source="BUGZILLA"/>
		<reference ref_id="1058630" ref_url="https://bugzilla.suse.com/1058630" source="BUGZILLA"/>
		<reference ref_id="1059735" ref_url="https://bugzilla.suse.com/1059735" source="BUGZILLA"/>
		<reference ref_id="1060382" ref_url="https://bugzilla.suse.com/1060382" source="BUGZILLA"/>
		<reference ref_id="1066168" ref_url="https://bugzilla.suse.com/1066168" source="BUGZILLA"/>
		<reference ref_id="1066170" ref_url="https://bugzilla.suse.com/1066170" source="BUGZILLA"/>
		<reference ref_id="1082283" ref_url="https://bugzilla.suse.com/1082283" source="BUGZILLA"/>
		<reference ref_id="1082291" ref_url="https://bugzilla.suse.com/1082291" source="BUGZILLA"/>
		<reference ref_id="1082348" ref_url="https://bugzilla.suse.com/1082348" source="BUGZILLA"/>
		<reference ref_id="1082362" ref_url="https://bugzilla.suse.com/1082362" source="BUGZILLA"/>
		<reference ref_id="1082792" ref_url="https://bugzilla.suse.com/1082792" source="BUGZILLA"/>
		<reference ref_id="1082837" ref_url="https://bugzilla.suse.com/1082837" source="BUGZILLA"/>
		<reference ref_id="1083628" ref_url="https://bugzilla.suse.com/1083628" source="BUGZILLA"/>
		<reference ref_id="1083634" ref_url="https://bugzilla.suse.com/1083634" source="BUGZILLA"/>
		<reference ref_id="1086011" ref_url="https://bugzilla.suse.com/1086011" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11524" ref_url="https://www.suse.com/security/cve/CVE-2017-11524/" source="CVE"/>
		<reference ref_id="CVE-2017-12692" ref_url="https://www.suse.com/security/cve/CVE-2017-12692/" source="CVE"/>
		<reference ref_id="CVE-2017-12693" ref_url="https://www.suse.com/security/cve/CVE-2017-12693/" source="CVE"/>
		<reference ref_id="CVE-2017-13768" ref_url="https://www.suse.com/security/cve/CVE-2017-13768/" source="CVE"/>
		<reference ref_id="CVE-2017-14314" ref_url="https://www.suse.com/security/cve/CVE-2017-14314/" source="CVE"/>
		<reference ref_id="CVE-2017-14505" ref_url="https://www.suse.com/security/cve/CVE-2017-14505/" source="CVE"/>
		<reference ref_id="CVE-2017-14739" ref_url="https://www.suse.com/security/cve/CVE-2017-14739/" source="CVE"/>
		<reference ref_id="CVE-2017-15016" ref_url="https://www.suse.com/security/cve/CVE-2017-15016/" source="CVE"/>
		<reference ref_id="CVE-2017-15017" ref_url="https://www.suse.com/security/cve/CVE-2017-15017/" source="CVE"/>
		<reference ref_id="CVE-2017-16352" ref_url="https://www.suse.com/security/cve/CVE-2017-16352/" source="CVE"/>
		<reference ref_id="CVE-2017-16353" ref_url="https://www.suse.com/security/cve/CVE-2017-16353/" source="CVE"/>
		<reference ref_id="CVE-2017-18209" ref_url="https://www.suse.com/security/cve/CVE-2017-18209/" source="CVE"/>
		<reference ref_id="CVE-2017-18211" ref_url="https://www.suse.com/security/cve/CVE-2017-18211/" source="CVE"/>
		<reference ref_id="CVE-2017-9500" ref_url="https://www.suse.com/security/cve/CVE-2017-9500/" source="CVE"/>
		<reference ref_id="CVE-2018-7443" ref_url="https://www.suse.com/security/cve/CVE-2018-7443/" source="CVE"/>
		<reference ref_id="CVE-2018-7470" ref_url="https://www.suse.com/security/cve/CVE-2018-7470/" source="CVE"/>
		<reference ref_id="CVE-2018-8804" ref_url="https://www.suse.com/security/cve/CVE-2018-8804/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2018-8804: The WriteEPTImage function allowed remote attackers to cause a
  denial of service (double free and application crash) or possibly have
  unspecified other impact via a crafted file (bsc#1086011).
- CVE-2017-11524: The WriteBlob function allowed remote attackers to cause a
  denial of service (assertion failure and application exit) via a crafted file
  (bsc#1050087).
- CVE-2017-18209: Prevent NULL pointer dereference in the
  GetOpenCLCachedFilesDirectory function caused by a memory allocation result
  that was not checked, related to GetOpenCLCacheDirectory (bsc#1083628).
- CVE-2017-18211: Prevent NULL pointer dereference in the function
  saveBinaryCLProgram caused by a program-lookup result not being checked,
  related to CacheOpenCLKernel (bsc#1083634).
- CVE-2017-9500: Prevent assertion failure in the function
  ResetImageProfileIterator, which allowed attackers to cause a denial of service
  via a crafted file (bsc#1043290).
- CVE-2017-14739: The AcquireResampleFilterThreadSet function mishandled failed
  memory allocation, which allowed remote attackers to cause a denial of service
  (NULL Pointer Dereference in DistortImage in MagickCore/distort.c, and
  application crash) via unspecified vectors (bsc#1060382).
- CVE-2017-16353: Prevent memory information disclosure in the DescribeImage
  function caused by a heap-based buffer over-read. The portion of the code
  containing the vulnerability is responsible for printing the IPTC Profile
  information contained in the image. This vulnerability can be triggered with a
  specially crafted MIFF file. There is an out-of-bounds buffer dereference
  because certain increments were never checked (bsc#1066170).
- CVE-2017-16352: Prevent a heap-based buffer overflow in the 'Display visual
  image directory' feature of the DescribeImage() function. One possible way to
  trigger the vulnerability is to run the identify command on a specially crafted
  MIFF format file with the verbose flag (bsc#1066168).
- CVE-2017-14314: Prevent off-by-one error in the DrawImage function that
  allowed remote attackers to cause a denial of service (DrawDashPolygon
  heap-based buffer over-read and application crash) via a crafted file
  (bsc#1058630).
- CVE-2017-13768: Prevent NULL pointer dereference in the IdentifyImage
  function that allowed an attacker to perform denial of service by sending a
  crafted image file (bsc#1056434).
- CVE-2017-14505: Fixed handling of NULL arrays, which allowed attackers to
  perform Denial of Service (NULL pointer dereference and application crash in
  AcquireQuantumMemory within MagickCore/memory.c) by providing a crafted Image
  File as input (bsc#1059735).
- CVE-2018-7470: The IsWEBPImageLossless function allowed attackers to cause a
  denial of service (segmentation violation) via a crafted file (bsc#1082837).
- CVE-2018-7443: The ReadTIFFImage function did not properly validate the
  amount of image data in a file, which allowed remote attackers to cause a
  denial of service (memory allocation failure in the AcquireMagickMemory
  function in MagickCore/memory.c) (bsc#1082792).
- CVE-2017-15016: Prevent NULL pointer dereference vulnerability in
  ReadEnhMetaFile allowing for denial of service (bsc#1082291).
- CVE-2017-15017: Prevent NULL pointer dereference vulnerability in
  ReadOneMNGImage allowing for denial of service (bsc#1082283).
- CVE-2017-12692: The ReadVIFFImage function allowed remote attackers to cause
  a denial of service (memory consumption) via a crafted VIFF file (bsc#1082362).
- CVE-2017-12693: The ReadBMPImage function allowed remote attackers to cause a
  denial of service (memory consumption) via a crafted BMP file (bsc#1082348).
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043290">SUSE bug 1043290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050087">SUSE bug 1050087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056434">SUSE bug 1056434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058630">SUSE bug 1058630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059735">SUSE bug 1059735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060382">SUSE bug 1060382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066168">SUSE bug 1066168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066170">SUSE bug 1066170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082283">SUSE bug 1082283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082291">SUSE bug 1082291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082348">SUSE bug 1082348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082362">SUSE bug 1082362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082792">SUSE bug 1082792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082837">SUSE bug 1082837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083628">SUSE bug 1083628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083634">SUSE bug 1083634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086011">SUSE bug 1086011</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11524/">CVE-2017-11524</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12692/">CVE-2017-12692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12693/">CVE-2017-12693</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13768/">CVE-2017-13768</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14314/">CVE-2017-14314</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14505/">CVE-2017-14505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14739/">CVE-2017-14739</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15016/">CVE-2017-15016</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15017/">CVE-2017-15017</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-16352/">CVE-2017-16352</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16353/">CVE-2017-16353</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18209/">CVE-2017-18209</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18211/">CVE-2017-18211</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9500/">CVE-2017-9500</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7443/">CVE-2018-7443</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7470/">CVE-2018-7470</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8804/">CVE-2018-8804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519121" comment="ImageMagick-6.8.8.1-71.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519122" comment="libMagick++-6_Q16-3-6.8.8.1-71.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519123" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519124" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519125" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78488" version="1" class="patch">
	<metadata>
		<title>Security update for graphite2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1084850" ref_url="https://bugzilla.suse.com/1084850" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7999" ref_url="https://www.suse.com/security/cve/CVE-2018-7999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003860.html" source="SUSE-SU"/>
		<description>
This update for graphite2 fixes the following issues:

- CVE-2018-7999: Fixed a NULL pointer dereference vulnerability in Segment.cpp that may cause a denial of serivce (bsc#1084850).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1084850">SUSE bug 1084850</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7999/">CVE-2018-7999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519126" comment="libgraphite2-3-1.3.1-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519127" comment="libgraphite2-3-32bit-1.3.1-10.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78489" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1017690" ref_url="https://bugzilla.suse.com/1017690" source="BUGZILLA"/>
		<reference ref_id="1069213" ref_url="https://bugzilla.suse.com/1069213" source="BUGZILLA"/>
		<reference ref_id="960341" ref_url="https://bugzilla.suse.com/960341" source="BUGZILLA"/>
		<reference ref_id="969783" ref_url="https://bugzilla.suse.com/969783" source="BUGZILLA"/>
		<reference ref_id="983436" ref_url="https://bugzilla.suse.com/983436" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2016-10095" ref_url="https://www.suse.com/security/cve/CVE-2016-10095/" source="CVE"/>
		<reference ref_id="CVE-2016-5318" ref_url="https://www.suse.com/security/cve/CVE-2016-5318/" source="CVE"/>
		<reference ref_id="CVE-2017-16232" ref_url="https://www.suse.com/security/cve/CVE-2017-16232/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html" source="SUSE-SU"/>
		<description>
This update for tiff to version 4.0.9 fixes the following issues:

Security issues fixed:

- CVE-2014-8128: Fix out-of-bounds read with malformed TIFF image in multiple tools (bsc#969783).
- CVE-2015-7554: Fix invalid write in tiffsplit / _TIFFVGetField (bsc#960341).
- CVE-2016-10095: Fix stack-based buffer overflow in _TIFFVGetField (tif_dir.c) (bsc#1017690).
- CVE-2016-5318: Fix stackoverflow in thumbnail (bsc#983436).
- CVE-2017-16232: Fix memory-based DoS in tiff2bw (bsc#1069213).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069213">SUSE bug 1069213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969783">SUSE bug 969783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983436">SUSE bug 983436</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10095/">CVE-2016-10095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5318/">CVE-2016-5318</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16232/">CVE-2017-16232</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519147" comment="libtiff5-4.0.9-44.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519148" comment="libtiff5-32bit-4.0.9-44.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78490" version="1" class="patch">
	<metadata>
		<title>Security update for spice-gtk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1085415" ref_url="https://bugzilla.suse.com/1085415" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12194" ref_url="https://www.suse.com/security/cve/CVE-2017-12194/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003873.html" source="SUSE-SU"/>
		<description>
This update for spice-gtk fixes the following issues:

- CVE-2017-12194: A flaw was found in the way spice-client processed certain messages sent from the server. An attacker, having control of malicious spice-server, could use this flaw to crash the client or execute arbitrary code with permissions of the user running the client. spice-gtk versions through 0.34 are believed to be vulnerable. (bsc#1085415)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-05"/>
	<updated date="2018-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085415">SUSE bug 1085415</bugzilla>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12194/">CVE-2017-12194</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520595" comment="libspice-client-glib-2_0-8-0.33-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520596" comment="libspice-client-glib-helper-0.33-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520597" comment="libspice-client-gtk-3_0-5-0.33-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520598" comment="libspice-controller0-0.33-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520599" comment="typelib-1_0-SpiceClientGlib-2_0-0.33-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520600" comment="typelib-1_0-SpiceClientGtk-3_0-0.33-3.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78491" version="1" class="patch">
	<metadata>
		<title>Security update for libidn (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1056450" ref_url="https://bugzilla.suse.com/1056450" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14062" ref_url="https://www.suse.com/security/cve/CVE-2017-14062/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003874.html" source="SUSE-SU"/>
		<description>
This update for libidn fixes one issues.

This security issue was fixed:

- CVE-2017-14062: Prevent integer overflow in the decode_digit function that
  allowed remote attackers to cause a denial of service or possibly have
  unspecified other impact (bsc#1056450).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-05"/>
	<updated date="2018-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056450">SUSE bug 1056450</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14062/">CVE-2017-14062</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520601" comment="libidn11-1.28-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520602" comment="libidn11-32bit-1.28-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78492" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1049305" ref_url="https://bugzilla.suse.com/1049305" source="BUGZILLA"/>
		<reference ref_id="1049306" ref_url="https://bugzilla.suse.com/1049306" source="BUGZILLA"/>
		<reference ref_id="1049307" ref_url="https://bugzilla.suse.com/1049307" source="BUGZILLA"/>
		<reference ref_id="1049309" ref_url="https://bugzilla.suse.com/1049309" source="BUGZILLA"/>
		<reference ref_id="1049310" ref_url="https://bugzilla.suse.com/1049310" source="BUGZILLA"/>
		<reference ref_id="1049311" ref_url="https://bugzilla.suse.com/1049311" source="BUGZILLA"/>
		<reference ref_id="1049312" ref_url="https://bugzilla.suse.com/1049312" source="BUGZILLA"/>
		<reference ref_id="1049313" ref_url="https://bugzilla.suse.com/1049313" source="BUGZILLA"/>
		<reference ref_id="1049314" ref_url="https://bugzilla.suse.com/1049314" source="BUGZILLA"/>
		<reference ref_id="1049315" ref_url="https://bugzilla.suse.com/1049315" source="BUGZILLA"/>
		<reference ref_id="1049316" ref_url="https://bugzilla.suse.com/1049316" source="BUGZILLA"/>
		<reference ref_id="1049317" ref_url="https://bugzilla.suse.com/1049317" source="BUGZILLA"/>
		<reference ref_id="1049318" ref_url="https://bugzilla.suse.com/1049318" source="BUGZILLA"/>
		<reference ref_id="1049319" ref_url="https://bugzilla.suse.com/1049319" source="BUGZILLA"/>
		<reference ref_id="1049320" ref_url="https://bugzilla.suse.com/1049320" source="BUGZILLA"/>
		<reference ref_id="1049321" ref_url="https://bugzilla.suse.com/1049321" source="BUGZILLA"/>
		<reference ref_id="1049322" ref_url="https://bugzilla.suse.com/1049322" source="BUGZILLA"/>
		<reference ref_id="1049323" ref_url="https://bugzilla.suse.com/1049323" source="BUGZILLA"/>
		<reference ref_id="1049324" ref_url="https://bugzilla.suse.com/1049324" source="BUGZILLA"/>
		<reference ref_id="1049325" ref_url="https://bugzilla.suse.com/1049325" source="BUGZILLA"/>
		<reference ref_id="1049326" ref_url="https://bugzilla.suse.com/1049326" source="BUGZILLA"/>
		<reference ref_id="1049327" ref_url="https://bugzilla.suse.com/1049327" source="BUGZILLA"/>
		<reference ref_id="1049328" ref_url="https://bugzilla.suse.com/1049328" source="BUGZILLA"/>
		<reference ref_id="1049329" ref_url="https://bugzilla.suse.com/1049329" source="BUGZILLA"/>
		<reference ref_id="1049330" ref_url="https://bugzilla.suse.com/1049330" source="BUGZILLA"/>
		<reference ref_id="1049331" ref_url="https://bugzilla.suse.com/1049331" source="BUGZILLA"/>
		<reference ref_id="1049332" ref_url="https://bugzilla.suse.com/1049332" source="BUGZILLA"/>
		<reference ref_id="1052318" ref_url="https://bugzilla.suse.com/1052318" source="BUGZILLA"/>
		<reference ref_id="1064071" ref_url="https://bugzilla.suse.com/1064071" source="BUGZILLA"/>
		<reference ref_id="1064072" ref_url="https://bugzilla.suse.com/1064072" source="BUGZILLA"/>
		<reference ref_id="1064073" ref_url="https://bugzilla.suse.com/1064073" source="BUGZILLA"/>
		<reference ref_id="1064075" ref_url="https://bugzilla.suse.com/1064075" source="BUGZILLA"/>
		<reference ref_id="1064077" ref_url="https://bugzilla.suse.com/1064077" source="BUGZILLA"/>
		<reference ref_id="1064078" ref_url="https://bugzilla.suse.com/1064078" source="BUGZILLA"/>
		<reference ref_id="1064079" ref_url="https://bugzilla.suse.com/1064079" source="BUGZILLA"/>
		<reference ref_id="1064080" ref_url="https://bugzilla.suse.com/1064080" source="BUGZILLA"/>
		<reference ref_id="1064081" ref_url="https://bugzilla.suse.com/1064081" source="BUGZILLA"/>
		<reference ref_id="1064082" ref_url="https://bugzilla.suse.com/1064082" source="BUGZILLA"/>
		<reference ref_id="1064083" ref_url="https://bugzilla.suse.com/1064083" source="BUGZILLA"/>
		<reference ref_id="1064084" ref_url="https://bugzilla.suse.com/1064084" source="BUGZILLA"/>
		<reference ref_id="1064085" ref_url="https://bugzilla.suse.com/1064085" source="BUGZILLA"/>
		<reference ref_id="1064086" ref_url="https://bugzilla.suse.com/1064086" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10165" ref_url="https://www.suse.com/security/cve/CVE-2016-10165/" source="CVE"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-10053" ref_url="https://www.suse.com/security/cve/CVE-2017-10053/" source="CVE"/>
		<reference ref_id="CVE-2017-10067" ref_url="https://www.suse.com/security/cve/CVE-2017-10067/" source="CVE"/>
		<reference ref_id="CVE-2017-10074" ref_url="https://www.suse.com/security/cve/CVE-2017-10074/" source="CVE"/>
		<reference ref_id="CVE-2017-10081" ref_url="https://www.suse.com/security/cve/CVE-2017-10081/" source="CVE"/>
		<reference ref_id="CVE-2017-10086" ref_url="https://www.suse.com/security/cve/CVE-2017-10086/" source="CVE"/>
		<reference ref_id="CVE-2017-10087" ref_url="https://www.suse.com/security/cve/CVE-2017-10087/" source="CVE"/>
		<reference ref_id="CVE-2017-10089" ref_url="https://www.suse.com/security/cve/CVE-2017-10089/" source="CVE"/>
		<reference ref_id="CVE-2017-10090" ref_url="https://www.suse.com/security/cve/CVE-2017-10090/" source="CVE"/>
		<reference ref_id="CVE-2017-10096" ref_url="https://www.suse.com/security/cve/CVE-2017-10096/" source="CVE"/>
		<reference ref_id="CVE-2017-10101" ref_url="https://www.suse.com/security/cve/CVE-2017-10101/" source="CVE"/>
		<reference ref_id="CVE-2017-10102" ref_url="https://www.suse.com/security/cve/CVE-2017-10102/" source="CVE"/>
		<reference ref_id="CVE-2017-10105" ref_url="https://www.suse.com/security/cve/CVE-2017-10105/" source="CVE"/>
		<reference ref_id="CVE-2017-10107" ref_url="https://www.suse.com/security/cve/CVE-2017-10107/" source="CVE"/>
		<reference ref_id="CVE-2017-10108" ref_url="https://www.suse.com/security/cve/CVE-2017-10108/" source="CVE"/>
		<reference ref_id="CVE-2017-10109" ref_url="https://www.suse.com/security/cve/CVE-2017-10109/" source="CVE"/>
		<reference ref_id="CVE-2017-10110" ref_url="https://www.suse.com/security/cve/CVE-2017-10110/" source="CVE"/>
		<reference ref_id="CVE-2017-10111" ref_url="https://www.suse.com/security/cve/CVE-2017-10111/" source="CVE"/>
		<reference ref_id="CVE-2017-10114" ref_url="https://www.suse.com/security/cve/CVE-2017-10114/" source="CVE"/>
		<reference ref_id="CVE-2017-10115" ref_url="https://www.suse.com/security/cve/CVE-2017-10115/" source="CVE"/>
		<reference ref_id="CVE-2017-10116" ref_url="https://www.suse.com/security/cve/CVE-2017-10116/" source="CVE"/>
		<reference ref_id="CVE-2017-10118" ref_url="https://www.suse.com/security/cve/CVE-2017-10118/" source="CVE"/>
		<reference ref_id="CVE-2017-10125" ref_url="https://www.suse.com/security/cve/CVE-2017-10125/" source="CVE"/>
		<reference ref_id="CVE-2017-10135" ref_url="https://www.suse.com/security/cve/CVE-2017-10135/" source="CVE"/>
		<reference ref_id="CVE-2017-10176" ref_url="https://www.suse.com/security/cve/CVE-2017-10176/" source="CVE"/>
		<reference ref_id="CVE-2017-10193" ref_url="https://www.suse.com/security/cve/CVE-2017-10193/" source="CVE"/>
		<reference ref_id="CVE-2017-10198" ref_url="https://www.suse.com/security/cve/CVE-2017-10198/" source="CVE"/>
		<reference ref_id="CVE-2017-10243" ref_url="https://www.suse.com/security/cve/CVE-2017-10243/" source="CVE"/>
		<reference ref_id="CVE-2017-10274" ref_url="https://www.suse.com/security/cve/CVE-2017-10274/" source="CVE"/>
		<reference ref_id="CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281/" source="CVE"/>
		<reference ref_id="CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285/" source="CVE"/>
		<reference ref_id="CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295/" source="CVE"/>
		<reference ref_id="CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345/" source="CVE"/>
		<reference ref_id="CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346/" source="CVE"/>
		<reference ref_id="CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347/" source="CVE"/>
		<reference ref_id="CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348/" source="CVE"/>
		<reference ref_id="CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349/" source="CVE"/>
		<reference ref_id="CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355/" source="CVE"/>
		<reference ref_id="CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356/" source="CVE"/>
		<reference ref_id="CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357/" source="CVE"/>
		<reference ref_id="CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Security issues fixed:

- CVE-2017-10356: Fix issue inside subcomponent Security (bsc#1064084).
- CVE-2017-10274: Fix issue inside subcomponent Smart Card IO (bsc#1064071).
- CVE-2017-10281: Fix issue inside subcomponent Serialization (bsc#1064072).
- CVE-2017-10285: Fix issue inside subcomponent RMI (bsc#1064073).
- CVE-2017-10295: Fix issue inside subcomponent Networking (bsc#1064075).
- CVE-2017-10388: Fix issue inside subcomponent Libraries (bsc#1064086).
- CVE-2017-10346: Fix issue inside subcomponent Hotspot (bsc#1064078).
- CVE-2017-10350: Fix issue inside subcomponent JAX-WS (bsc#1064082).
- CVE-2017-10347: Fix issue inside subcomponent Serialization (bsc#1064079).
- CVE-2017-10349: Fix issue inside subcomponent JAXP (bsc#1064081).
- CVE-2017-10345: Fix issue inside subcomponent Serialization (bsc#1064077).
- CVE-2017-10348: Fix issue inside subcomponent Libraries (bsc#1064080).
- CVE-2017-10357: Fix issue inside subcomponent Serialization (bsc#1064085).
- CVE-2017-10355: Fix issue inside subcomponent Networking (bsc#1064083).
- CVE-2017-10102: Fix incorrect handling of references in DGC (bsc#1049316).
- CVE-2017-10053: Fix reading of unprocessed image data in JPEGImageReader (bsc#1049305).
- CVE-2017-10067: Fix JAR verifier incorrect handling of missing digest (bsc#1049306).
- CVE-2017-10081: Fix incorrect bracket processing in function signature handling (bsc#1049309).
- CVE-2017-10087: Fix insufficient access control checks in ThreadPoolExecutor (bsc#1049311).
- CVE-2017-10089: Fix insufficient access control checks in ServiceRegistry (bsc#1049312).
- CVE-2017-10090: Fix insufficient access control checks in AsynchronousChannelGroupImpl (bsc#1049313).
- CVE-2017-10096: Fix insufficient access control checks in XML transformations (bsc#1049314).
- CVE-2017-10101: Fix unrestricted access to com.sun.org.apache.xml.internal.resolver (bsc#1049315).
- CVE-2017-10107: Fix insufficient access control checks in ActivationID (bsc#1049318).
- CVE-2017-10074: Fix integer overflows in range check loop predicates (bsc#1049307).
- CVE-2017-10110: Fix insufficient access control checks in ImageWatched (bsc#1049321).
- CVE-2017-10108: Fix unbounded memory allocation in BasicAttribute deserialization (bsc#1049319).
- CVE-2017-10109: Fix unbounded memory allocation in CodeSource deserialization (bsc#1049320).
- CVE-2017-10115: Fix unspecified vulnerability in subcomponent JCE (bsc#1049324).
- CVE-2017-10118: Fix ECDSA implementation timing attack (bsc#1049326).
- CVE-2017-10116: Fix LDAPCertStore following referrals to non-LDAP URL (bsc#1049325).
- CVE-2017-10135: Fix PKCS#8 implementation timing attack (bsc#1049328).
- CVE-2017-10176: Fix incorrect handling of certain EC points (bsc#1049329).
- CVE-2017-10074: Fix integer overflows in range check loop predicates (bsc#1049307).
- CVE-2017-10074: Fix integer overflows in range check loop predicates (bsc#1049307).
- CVE-2017-10111: Fix checks in LambdaFormEditor (bsc#1049322).
- CVE-2017-10243: Fix unspecified vulnerability in subcomponent JAX-WS (bsc#1049332).
- CVE-2017-10125: Fix unspecified vulnerability in subcomponent deployment (bsc#1049327).
- CVE-2017-10114: Fix unspecified vulnerability in subcomponent JavaFX (bsc#1049323).
- CVE-2017-10105: Fix unspecified vulnerability in subcomponent deployment (bsc#1049317).
- CVE-2017-10086: Fix unspecified in subcomponent JavaFX (bsc#1049310).
- CVE-2017-10198: Fix incorrect enforcement of certificate path restrictions (bsc#1049331).
- CVE-2017-10193: Fix incorrect key size constraint check (bsc#1049330).

Bug fixes:

- Drop Exec Shield workaround to fix crashes on recent kernels, where Exec Shield is gone (bsc#1052318).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-03"/>
	<updated date="2018-01-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1049305">SUSE bug 1049305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049306">SUSE bug 1049306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049307">SUSE bug 1049307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049309">SUSE bug 1049309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049310">SUSE bug 1049310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049311">SUSE bug 1049311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049312">SUSE bug 1049312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049313">SUSE bug 1049313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049314">SUSE bug 1049314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049315">SUSE bug 1049315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049316">SUSE bug 1049316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049317">SUSE bug 1049317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049318">SUSE bug 1049318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049319">SUSE bug 1049319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049320">SUSE bug 1049320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049321">SUSE bug 1049321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049322">SUSE bug 1049322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049323">SUSE bug 1049323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049324">SUSE bug 1049324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049325">SUSE bug 1049325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049326">SUSE bug 1049326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049327">SUSE bug 1049327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049328">SUSE bug 1049328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049329">SUSE bug 1049329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049330">SUSE bug 1049330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049331">SUSE bug 1049331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049332">SUSE bug 1049332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052318">SUSE bug 1052318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064071">SUSE bug 1064071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064072">SUSE bug 1064072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064073">SUSE bug 1064073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064075">SUSE bug 1064075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064077">SUSE bug 1064077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064078">SUSE bug 1064078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064079">SUSE bug 1064079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064080">SUSE bug 1064080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064081">SUSE bug 1064081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064082">SUSE bug 1064082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064083">SUSE bug 1064083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064084">SUSE bug 1064084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064085">SUSE bug 1064085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064086">SUSE bug 1064086</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10165/">CVE-2016-10165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10053/">CVE-2017-10053</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10067/">CVE-2017-10067</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10074/">CVE-2017-10074</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10081/">CVE-2017-10081</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10086/">CVE-2017-10086</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10087/">CVE-2017-10087</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10089/">CVE-2017-10089</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10090/">CVE-2017-10090</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10096/">CVE-2017-10096</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10101/">CVE-2017-10101</cve>
	<cve impact="important" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10102/">CVE-2017-10102</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10105/">CVE-2017-10105</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10107/">CVE-2017-10107</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10108/">CVE-2017-10108</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10109/">CVE-2017-10109</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10110/">CVE-2017-10110</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10111/">CVE-2017-10111</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10114/">CVE-2017-10114</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-10115/">CVE-2017-10115</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10116/">CVE-2017-10116</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10118/">CVE-2017-10118</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10125/">CVE-2017-10125</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10135/">CVE-2017-10135</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10176/">CVE-2017-10176</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10193/">CVE-2017-10193</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10198/">CVE-2017-10198</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10243/">CVE-2017-10243</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10274/">CVE-2017-10274</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519150" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519151" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78493" version="1" class="patch">
	<metadata>
		<title>Security update for gwenhywfar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="958331" ref_url="https://bugzilla.suse.com/958331" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7542" ref_url="https://www.suse.com/security/cve/CVE-2015-7542/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003590.html" source="SUSE-SU"/>
		<description>
This update for gwenhywfar fixes the following issues:

Security issue fixed:

- CVE-2015-7542: Make use of the system's default trusted CAs. Also remove the upstream provided ca-bundle.crt
  file and require ca-certificates so the /etc/ssl/certs directory is populated (bsc#958331).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958331">SUSE bug 958331</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7542/">CVE-2015-7542</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519152" comment="gwenhywfar-lang-4.9.0beta-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519153" comment="gwenhywfar-tools-4.9.0beta-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519154" comment="libgwengui-gtk2-0-4.9.0beta-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519155" comment="libgwenhywfar60-4.9.0beta-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519156" comment="libgwenhywfar60-plugins-4.9.0beta-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78494" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1054986" ref_url="https://bugzilla.suse.com/1054986" source="BUGZILLA"/>
		<reference ref_id="1067018" ref_url="https://bugzilla.suse.com/1067018" source="BUGZILLA"/>
		<reference ref_id="1070615" ref_url="https://bugzilla.suse.com/1070615" source="BUGZILLA"/>
		<reference ref_id="1079869" ref_url="https://bugzilla.suse.com/1079869" source="BUGZILLA"/>
		<reference ref_id="1080042" ref_url="https://bugzilla.suse.com/1080042" source="BUGZILLA"/>
		<reference ref_id="1082041" ref_url="https://bugzilla.suse.com/1082041" source="BUGZILLA"/>
		<reference ref_id="1082161" ref_url="https://bugzilla.suse.com/1082161" source="BUGZILLA"/>
		<reference ref_id="1083625" ref_url="https://bugzilla.suse.com/1083625" source="BUGZILLA"/>
		<reference ref_id="1085757" ref_url="https://bugzilla.suse.com/1085757" source="BUGZILLA"/>
		<reference ref_id="1086038" ref_url="https://bugzilla.suse.com/1086038" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-1064" ref_url="https://www.suse.com/security/cve/CVE-2018-1064/" source="CVE"/>
		<reference ref_id="CVE-2018-6764" ref_url="https://www.suse.com/security/cve/CVE-2018-6764/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00010.html" source="SUSE-SU"/>
		<description>
This update for libvirt and virt-manager fixes the following issues:

Security issues fixed:

- CVE-2017-5715: Fixes for speculative side channel attacks aka 'SpectreAttack' (var2) (bsc#1079869).
- CVE-2018-6764: Fixed guest executable code injection via libnss_dns.so loaded by libvirt_lxc before init (bsc#1080042).
- CVE-2018-1064: Fixed denial of service when reading from guest agent (bsc#1083625).


Non-security issues fixed in libvirt:

- bsc#1070615: Fixed TPM device passthrough failure on kernels &gt;= 4.0.
- bsc#1082041: SUSE Linux Enterprise 11 SP4 hvm converted to pvhvm. Unless vm memory is on gig boundary, vm won't boot.
- bsc#1082161: Unable to change RTC basis or adjustment for Xen HVM guests using libvirt.

Non-security issues fixed in virt-manager:

- bsc#1086038: VM guests cannot be properly installed with virt-install
- bsc#1067018: KVM Guest creation failed - Property .cmt not found
- bsc#1054986: Fix openSUSE 15.0 detection. It has no content file or .treeinfo file
- bsc#1085757: Fallback to latest version of openSUSE when opensuse-unknown is detected for the ISO

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-11"/>
	<updated date="2018-04-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1054986">SUSE bug 1054986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067018">SUSE bug 1067018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070615">SUSE bug 1070615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079869">SUSE bug 1079869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080042">SUSE bug 1080042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082041">SUSE bug 1082041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082161">SUSE bug 1082161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083625">SUSE bug 1083625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085757">SUSE bug 1085757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086038">SUSE bug 1086038</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1064/">CVE-2018-1064</cve>
	<cve impact="low" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6764/">CVE-2018-6764</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520603" comment="libvirt-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520604" comment="libvirt-admin-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520605" comment="libvirt-client-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520606" comment="libvirt-daemon-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520607" comment="libvirt-daemon-config-network-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520608" comment="libvirt-daemon-config-nwfilter-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520609" comment="libvirt-daemon-driver-interface-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520610" comment="libvirt-daemon-driver-libxl-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520611" comment="libvirt-daemon-driver-lxc-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520612" comment="libvirt-daemon-driver-network-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520613" comment="libvirt-daemon-driver-nodedev-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520614" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520615" comment="libvirt-daemon-driver-qemu-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520616" comment="libvirt-daemon-driver-secret-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520617" comment="libvirt-daemon-driver-storage-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520618" comment="libvirt-daemon-driver-storage-core-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520619" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520620" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520621" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520622" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520623" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520624" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520625" comment="libvirt-daemon-lxc-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520626" comment="libvirt-daemon-qemu-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520627" comment="libvirt-daemon-xen-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520628" comment="libvirt-doc-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520629" comment="libvirt-libs-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520630" comment="virt-install-1.4.1-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520631" comment="virt-manager-1.4.1-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520632" comment="virt-manager-common-1.4.1-5.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78495" version="1" class="patch">
	<metadata>
		<title>Security update for zziplib (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1084517" ref_url="https://bugzilla.suse.com/1084517" source="BUGZILLA"/>
		<reference ref_id="1084519" ref_url="https://bugzilla.suse.com/1084519" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7725" ref_url="https://www.suse.com/security/cve/CVE-2018-7725/" source="CVE"/>
		<reference ref_id="CVE-2018-7726" ref_url="https://www.suse.com/security/cve/CVE-2018-7726/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003884.html" source="SUSE-SU"/>
		<description>
This update for zziplib fixes the following issues:

Security issues fixed:

- CVE-2018-7726: There is a bus error caused by the__zzip_parse_root_directory function of zip.c. Attackers could leverage thisvulnerability to cause a denial of service (bsc#1084517).
- CVE-2018-7725: An invalid memory address dereference was discovered in zzip_disk_fread in mmapped.c. The vulnerability causes an application crash, which leads to denial of service (bsc#1084519).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-11"/>
	<updated date="2018-04-11"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1084517">SUSE bug 1084517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084519">SUSE bug 1084519</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7725/">CVE-2018-7725</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7726/">CVE-2018-7726</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520633" comment="libzzip-0-13-0.13.67-10.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78496" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1087102" ref_url="https://bugzilla.suse.com/1087102" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003886.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

    - CVE-2018-0739: Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) 
    could eventually exceed the stack given malicious input with excessive recursion. This could result 
    in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from 
    untrusted sources so this is considered safe. (bsc#1087102).

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-11"/>
	<updated date="2018-04-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1087102">SUSE bug 1087102</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519160" comment="libopenssl-devel-1.0.2j-60.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519161" comment="libopenssl1_0_0-1.0.2j-60.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519162" comment="libopenssl1_0_0-32bit-1.0.2j-60.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519163" comment="openssl-1.0.2j-60.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78497" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1083507" ref_url="https://bugzilla.suse.com/1083507" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003890.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

Security issue fixed:

- CVE-2017-18207: Fixed possible denial of service vulnerability by adding a check to Lib/wave.py that verifies that at least one channel is provided (bsc#1083507).

Bug fixes:

- Require python-Sphinx-latex for building on Leap 42.3 or newer.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-12"/>
	<updated date="2018-04-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083507">SUSE bug 1083507</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520634" comment="libpython3_4m1_0-3.4.6-25.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520635" comment="python3-3.4.6-25.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520636" comment="python3-base-3.4.6-25.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520637" comment="python3-curses-3.4.6-25.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78498" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1070046" ref_url="https://bugzilla.suse.com/1070046" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000159" ref_url="https://www.suse.com/security/cve/CVE-2017-1000159/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003891.html" source="SUSE-SU"/>
		<description>
This update for evince fixes the following issues:

- CVE-2017-1000159: Command injection in evince via filename when printing to PDF could lead to command execution (bsc#1070046)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-16"/>
	<updated date="2018-04-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1070046">SUSE bug 1070046</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000159/">CVE-2017-1000159</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520638" comment="evince-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520639" comment="evince-browser-plugin-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520640" comment="evince-lang-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520641" comment="evince-plugin-djvudocument-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520642" comment="evince-plugin-dvidocument-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520643" comment="evince-plugin-pdfdocument-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520644" comment="evince-plugin-psdocument-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520645" comment="evince-plugin-tiffdocument-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520646" comment="evince-plugin-xpsdocument-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520647" comment="libevdocument3-4-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520648" comment="libevview3-3-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520649" comment="nautilus-evince-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520650" comment="typelib-1_0-EvinceDocument-3_0-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520651" comment="typelib-1_0-EvinceView-3_0-3.20.2-6.22.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78499" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1039034" ref_url="https://bugzilla.suse.com/1039034" source="BUGZILLA"/>
		<reference ref_id="1049399" ref_url="https://bugzilla.suse.com/1049399" source="BUGZILLA"/>
		<reference ref_id="1049404" ref_url="https://bugzilla.suse.com/1049404" source="BUGZILLA"/>
		<reference ref_id="1049417" ref_url="https://bugzilla.suse.com/1049417" source="BUGZILLA"/>
		<reference ref_id="1054591" ref_url="https://bugzilla.suse.com/1054591" source="BUGZILLA"/>
		<reference ref_id="1072665" ref_url="https://bugzilla.suse.com/1072665" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3636" ref_url="https://www.suse.com/security/cve/CVE-2017-3636/" source="CVE"/>
		<reference ref_id="CVE-2017-3641" ref_url="https://www.suse.com/security/cve/CVE-2017-3641/" source="CVE"/>
		<reference ref_id="CVE-2017-3653" ref_url="https://www.suse.com/security/cve/CVE-2017-3653/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003596.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes several issues.

These security issues were fixed:

- CVE-2017-3636: Client programs had an unspecified vulnerability that could
  lead to unauthorized access and denial of service (bsc#1049399)
- CVE-2017-3641: DDL unspecified vulnerability could lead to denial of service
  (bsc#1049404)
- CVE-2017-3653: DML Unspecified vulnerability could lead to unauthorized
  database access (bsc#1049417)

This non-security issues was fixed:

- Add ODBC support for Connect engine (bsc#1039034)
- Relax required version for mariadb-errormessages (bsc#1072665)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1039034">SUSE bug 1039034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049399">SUSE bug 1049399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049404">SUSE bug 1049404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049417">SUSE bug 1049417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054591">SUSE bug 1054591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072665">SUSE bug 1072665</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-3636/">CVE-2017-3636</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3641/">CVE-2017-3641</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3653/">CVE-2017-3653</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519165" comment="libmysqlclient18-10.0.32-29.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519166" comment="libmysqlclient18-32bit-10.0.32-29.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519167" comment="libmysqlclient_r18-10.0.32-29.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519168" comment="libmysqlclient_r18-32bit-10.0.32-29.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519169" comment="mariadb-10.0.32-29.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519170" comment="mariadb-client-10.0.32-29.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519171" comment="mariadb-errormessages-10.0.32-29.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78500" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1077445" ref_url="https://bugzilla.suse.com/1077445" source="BUGZILLA"/>
		<reference ref_id="1082063" ref_url="https://bugzilla.suse.com/1082063" source="BUGZILLA"/>
		<reference ref_id="1082210" ref_url="https://bugzilla.suse.com/1082210" source="BUGZILLA"/>
		<reference ref_id="1083417" ref_url="https://bugzilla.suse.com/1083417" source="BUGZILLA"/>
		<reference ref_id="1083420" ref_url="https://bugzilla.suse.com/1083420" source="BUGZILLA"/>
		<reference ref_id="1083422" ref_url="https://bugzilla.suse.com/1083422" source="BUGZILLA"/>
		<reference ref_id="1083424" ref_url="https://bugzilla.suse.com/1083424" source="BUGZILLA"/>
		<reference ref_id="1083426" ref_url="https://bugzilla.suse.com/1083426" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549/" source="CVE"/>
		<reference ref_id="CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170/" source="CVE"/>
		<reference ref_id="CVE-2018-7182" ref_url="https://www.suse.com/security/cve/CVE-2018-7182/" source="CVE"/>
		<reference ref_id="CVE-2018-7183" ref_url="https://www.suse.com/security/cve/CVE-2018-7183/" source="CVE"/>
		<reference ref_id="CVE-2018-7184" ref_url="https://www.suse.com/security/cve/CVE-2018-7184/" source="CVE"/>
		<reference ref_id="CVE-2018-7185" ref_url="https://www.suse.com/security/cve/CVE-2018-7185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003894.html" source="SUSE-SU"/>
		<description>
This update for ntp fixes the following issues:

- Update to 4.2.8p11 (bsc#1082210):
  * CVE-2016-1549: Sybil vulnerability: ephemeral association
    attack. While fixed in ntp-4.2.8p7, there are significant
    additional protections for this issue in 4.2.8p11.
  * CVE-2018-7182: ctl_getitem(): buffer read overrun
    leads to undefined behavior and information leak. (bsc#1083426)
  * CVE-2018-7170: Multiple authenticated ephemeral
    associations. (bsc#1083424)
  * CVE-2018-7184: Interleaved symmetric mode cannot
    recover from bad state. (bsc#1083422)
  * CVE-2018-7185: Unauthenticated packet can reset
    authenticated interleaved association. (bsc#1083420)
  * CVE-2018-7183: ntpq:decodearr() can write beyond its
    buffer limit.(bsc#1083417)
- Don't use libevent's cached time stamps in sntp. (bsc#1077445)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-16"/>
	<updated date="2018-04-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077445">SUSE bug 1077445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082063">SUSE bug 1082063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082210">SUSE bug 1082210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083417">SUSE bug 1083417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083420">SUSE bug 1083420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083422">SUSE bug 1083422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083426">SUSE bug 1083426</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7182/">CVE-2018-7182</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-7183/">CVE-2018-7183</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7184/">CVE-2018-7184</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7185/">CVE-2018-7185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520652" comment="ntp-4.2.8p11-64.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520653" comment="ntp-doc-4.2.8p11-64.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78501" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1088200" ref_url="https://bugzilla.suse.com/1088200" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-9256" ref_url="https://www.suse.com/security/cve/CVE-2018-9256/" source="CVE"/>
		<reference ref_id="CVE-2018-9259" ref_url="https://www.suse.com/security/cve/CVE-2018-9259/" source="CVE"/>
		<reference ref_id="CVE-2018-9260" ref_url="https://www.suse.com/security/cve/CVE-2018-9260/" source="CVE"/>
		<reference ref_id="CVE-2018-9261" ref_url="https://www.suse.com/security/cve/CVE-2018-9261/" source="CVE"/>
		<reference ref_id="CVE-2018-9262" ref_url="https://www.suse.com/security/cve/CVE-2018-9262/" source="CVE"/>
		<reference ref_id="CVE-2018-9263" ref_url="https://www.suse.com/security/cve/CVE-2018-9263/" source="CVE"/>
		<reference ref_id="CVE-2018-9264" ref_url="https://www.suse.com/security/cve/CVE-2018-9264/" source="CVE"/>
		<reference ref_id="CVE-2018-9265" ref_url="https://www.suse.com/security/cve/CVE-2018-9265/" source="CVE"/>
		<reference ref_id="CVE-2018-9266" ref_url="https://www.suse.com/security/cve/CVE-2018-9266/" source="CVE"/>
		<reference ref_id="CVE-2018-9267" ref_url="https://www.suse.com/security/cve/CVE-2018-9267/" source="CVE"/>
		<reference ref_id="CVE-2018-9268" ref_url="https://www.suse.com/security/cve/CVE-2018-9268/" source="CVE"/>
		<reference ref_id="CVE-2018-9269" ref_url="https://www.suse.com/security/cve/CVE-2018-9269/" source="CVE"/>
		<reference ref_id="CVE-2018-9270" ref_url="https://www.suse.com/security/cve/CVE-2018-9270/" source="CVE"/>
		<reference ref_id="CVE-2018-9271" ref_url="https://www.suse.com/security/cve/CVE-2018-9271/" source="CVE"/>
		<reference ref_id="CVE-2018-9272" ref_url="https://www.suse.com/security/cve/CVE-2018-9272/" source="CVE"/>
		<reference ref_id="CVE-2018-9273" ref_url="https://www.suse.com/security/cve/CVE-2018-9273/" source="CVE"/>
		<reference ref_id="CVE-2018-9274" ref_url="https://www.suse.com/security/cve/CVE-2018-9274/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003900.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

- Update to wireshark 2.2.14, fix such issues:
  * bsc#1088200 VUL-0: wireshark: multiple vulnerabilities
    fixed in 2.2.14, 2.4.6
  * CVE-2018-9256: LWAPP dissector crash
  * CVE-2018-9260: IEEE 802.15.4 dissector crash
  * CVE-2018-9261: NBAP dissector crash
  * CVE-2018-9262: VLAN dissector crash
  * CVE-2018-9263: Kerberos dissector crash
  * CVE-2018-9264: ADB dissector crash
  * CVE-2018-9265: tn3270 dissector has a memory leak
  * CVE-2018-9266: ISUP dissector memory leak
  * CVE-2018-9267: LAPD dissector memory leak
  * CVE-2018-9268: SMB2 dissector memory leak
  * CVE-2018-9269: GIOP dissector memory leak
  * CVE-2018-9270: OIDS dissector memory leak
  * CVE-2018-9271: multipart dissector memory leak
  * CVE-2018-9272: h223 dissector memory leak
  * CVE-2018-9273: pcp dissector memory leak
  * CVE-2018-9274: failure message memory leak
  * CVE-2018-9259: MP4 dissector crash
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-19"/>
	<updated date="2018-04-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9256/">CVE-2018-9256</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9259/">CVE-2018-9259</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9260/">CVE-2018-9260</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9261/">CVE-2018-9261</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9262/">CVE-2018-9262</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9263/">CVE-2018-9263</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9264/">CVE-2018-9264</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9265/">CVE-2018-9265</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9266/">CVE-2018-9266</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9267/">CVE-2018-9267</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9268/">CVE-2018-9268</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9269/">CVE-2018-9269</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9270/">CVE-2018-9270</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9271/">CVE-2018-9271</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9272/">CVE-2018-9272</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9273/">CVE-2018-9273</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9274/">CVE-2018-9274</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520654" comment="libwireshark8-2.2.14-48.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520655" comment="libwiretap6-2.2.14-48.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520656" comment="libwscodecs1-2.2.14-48.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520657" comment="libwsutil7-2.2.14-48.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520658" comment="wireshark-2.2.14-48.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520659" comment="wireshark-gtk-2.2.14-48.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78502" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1019695" ref_url="https://bugzilla.suse.com/1019695" source="BUGZILLA"/>
		<reference ref_id="1019699" ref_url="https://bugzilla.suse.com/1019699" source="BUGZILLA"/>
		<reference ref_id="1022604" ref_url="https://bugzilla.suse.com/1022604" source="BUGZILLA"/>
		<reference ref_id="1031717" ref_url="https://bugzilla.suse.com/1031717" source="BUGZILLA"/>
		<reference ref_id="1046610" ref_url="https://bugzilla.suse.com/1046610" source="BUGZILLA"/>
		<reference ref_id="1060799" ref_url="https://bugzilla.suse.com/1060799" source="BUGZILLA"/>
		<reference ref_id="1064206" ref_url="https://bugzilla.suse.com/1064206" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1073059" ref_url="https://bugzilla.suse.com/1073059" source="BUGZILLA"/>
		<reference ref_id="1073069" ref_url="https://bugzilla.suse.com/1073069" source="BUGZILLA"/>
		<reference ref_id="1075428" ref_url="https://bugzilla.suse.com/1075428" source="BUGZILLA"/>
		<reference ref_id="1076033" ref_url="https://bugzilla.suse.com/1076033" source="BUGZILLA"/>
		<reference ref_id="1077560" ref_url="https://bugzilla.suse.com/1077560" source="BUGZILLA"/>
		<reference ref_id="1083574" ref_url="https://bugzilla.suse.com/1083574" source="BUGZILLA"/>
		<reference ref_id="1083745" ref_url="https://bugzilla.suse.com/1083745" source="BUGZILLA"/>
		<reference ref_id="1083836" ref_url="https://bugzilla.suse.com/1083836" source="BUGZILLA"/>
		<reference ref_id="1084223" ref_url="https://bugzilla.suse.com/1084223" source="BUGZILLA"/>
		<reference ref_id="1084310" ref_url="https://bugzilla.suse.com/1084310" source="BUGZILLA"/>
		<reference ref_id="1084328" ref_url="https://bugzilla.suse.com/1084328" source="BUGZILLA"/>
		<reference ref_id="1084353" ref_url="https://bugzilla.suse.com/1084353" source="BUGZILLA"/>
		<reference ref_id="1084452" ref_url="https://bugzilla.suse.com/1084452" source="BUGZILLA"/>
		<reference ref_id="1084610" ref_url="https://bugzilla.suse.com/1084610" source="BUGZILLA"/>
		<reference ref_id="1084699" ref_url="https://bugzilla.suse.com/1084699" source="BUGZILLA"/>
		<reference ref_id="1084829" ref_url="https://bugzilla.suse.com/1084829" source="BUGZILLA"/>
		<reference ref_id="1084889" ref_url="https://bugzilla.suse.com/1084889" source="BUGZILLA"/>
		<reference ref_id="1084898" ref_url="https://bugzilla.suse.com/1084898" source="BUGZILLA"/>
		<reference ref_id="1084914" ref_url="https://bugzilla.suse.com/1084914" source="BUGZILLA"/>
		<reference ref_id="1084918" ref_url="https://bugzilla.suse.com/1084918" source="BUGZILLA"/>
		<reference ref_id="1084967" ref_url="https://bugzilla.suse.com/1084967" source="BUGZILLA"/>
		<reference ref_id="1085042" ref_url="https://bugzilla.suse.com/1085042" source="BUGZILLA"/>
		<reference ref_id="1085058" ref_url="https://bugzilla.suse.com/1085058" source="BUGZILLA"/>
		<reference ref_id="1085224" ref_url="https://bugzilla.suse.com/1085224" source="BUGZILLA"/>
		<reference ref_id="1085383" ref_url="https://bugzilla.suse.com/1085383" source="BUGZILLA"/>
		<reference ref_id="1085402" ref_url="https://bugzilla.suse.com/1085402" source="BUGZILLA"/>
		<reference ref_id="1085404" ref_url="https://bugzilla.suse.com/1085404" source="BUGZILLA"/>
		<reference ref_id="1085487" ref_url="https://bugzilla.suse.com/1085487" source="BUGZILLA"/>
		<reference ref_id="1085507" ref_url="https://bugzilla.suse.com/1085507" source="BUGZILLA"/>
		<reference ref_id="1085511" ref_url="https://bugzilla.suse.com/1085511" source="BUGZILLA"/>
		<reference ref_id="1085679" ref_url="https://bugzilla.suse.com/1085679" source="BUGZILLA"/>
		<reference ref_id="1085981" ref_url="https://bugzilla.suse.com/1085981" source="BUGZILLA"/>
		<reference ref_id="1086015" ref_url="https://bugzilla.suse.com/1086015" source="BUGZILLA"/>
		<reference ref_id="1086162" ref_url="https://bugzilla.suse.com/1086162" source="BUGZILLA"/>
		<reference ref_id="1086194" ref_url="https://bugzilla.suse.com/1086194" source="BUGZILLA"/>
		<reference ref_id="1086357" ref_url="https://bugzilla.suse.com/1086357" source="BUGZILLA"/>
		<reference ref_id="1086499" ref_url="https://bugzilla.suse.com/1086499" source="BUGZILLA"/>
		<reference ref_id="1086518" ref_url="https://bugzilla.suse.com/1086518" source="BUGZILLA"/>
		<reference ref_id="1086607" ref_url="https://bugzilla.suse.com/1086607" source="BUGZILLA"/>
		<reference ref_id="1087088" ref_url="https://bugzilla.suse.com/1087088" source="BUGZILLA"/>
		<reference ref_id="1087211" ref_url="https://bugzilla.suse.com/1087211" source="BUGZILLA"/>
		<reference ref_id="1087231" ref_url="https://bugzilla.suse.com/1087231" source="BUGZILLA"/>
		<reference ref_id="1087260" ref_url="https://bugzilla.suse.com/1087260" source="BUGZILLA"/>
		<reference ref_id="1087274" ref_url="https://bugzilla.suse.com/1087274" source="BUGZILLA"/>
		<reference ref_id="1087659" ref_url="https://bugzilla.suse.com/1087659" source="BUGZILLA"/>
		<reference ref_id="1087845" ref_url="https://bugzilla.suse.com/1087845" source="BUGZILLA"/>
		<reference ref_id="1087906" ref_url="https://bugzilla.suse.com/1087906" source="BUGZILLA"/>
		<reference ref_id="1087999" ref_url="https://bugzilla.suse.com/1087999" source="BUGZILLA"/>
		<reference ref_id="1088050" ref_url="https://bugzilla.suse.com/1088050" source="BUGZILLA"/>
		<reference ref_id="1088087" ref_url="https://bugzilla.suse.com/1088087" source="BUGZILLA"/>
		<reference ref_id="1088241" ref_url="https://bugzilla.suse.com/1088241" source="BUGZILLA"/>
		<reference ref_id="1088267" ref_url="https://bugzilla.suse.com/1088267" source="BUGZILLA"/>
		<reference ref_id="1088313" ref_url="https://bugzilla.suse.com/1088313" source="BUGZILLA"/>
		<reference ref_id="1088324" ref_url="https://bugzilla.suse.com/1088324" source="BUGZILLA"/>
		<reference ref_id="1088600" ref_url="https://bugzilla.suse.com/1088600" source="BUGZILLA"/>
		<reference ref_id="1088684" ref_url="https://bugzilla.suse.com/1088684" source="BUGZILLA"/>
		<reference ref_id="1088871" ref_url="https://bugzilla.suse.com/1088871" source="BUGZILLA"/>
		<reference ref_id="802154" ref_url="https://bugzilla.suse.com/802154" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18257" ref_url="https://www.suse.com/security/cve/CVE-2017-18257/" source="CVE"/>
		<reference ref_id="CVE-2018-1091" ref_url="https://www.suse.com/security/cve/CVE-2018-1091/" source="CVE"/>
		<reference ref_id="CVE-2018-7740" ref_url="https://www.suse.com/security/cve/CVE-2018-7740/" source="CVE"/>
		<reference ref_id="CVE-2018-8043" ref_url="https://www.suse.com/security/cve/CVE-2018-8043/" source="CVE"/>
		<reference ref_id="CVE-2018-8822" ref_url="https://www.suse.com/security/cve/CVE-2018-8822/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00065.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.126 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-1091: In the flush_tmregs_to_thread function in arch/powerpc/kernel/ptrace.c, a guest kernel crash can be triggered from unprivileged userspace during a core dump on a POWER host due to a missing processor feature check and an erroneous use of transactional memory (TM) instructions in the core dump path, leading to a denial of service (bnc#1087231).
- CVE-2018-7740: The resv_map_release function in mm/hugetlb.c allowed local users to cause a denial of service (BUG) via a crafted application that made mmap system calls and has a large pgoff argument to the remap_file_pages system call (bnc#1084353).
- CVE-2018-8043: The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c did not validate certain resource availability, which allowed local users to cause a denial of service (NULL pointer dereference) (bnc#1084829).
- CVE-2017-18257: The __get_data_block function in fs/f2fs/data.c allowed local users to cause a denial of service (integer overflow and loop) via crafted use of the open and fallocate system calls with an FS_IOC_FIEMAP ioctl. (bnc#1088241)
- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).


The following non-security bugs were fixed:

- acpica: Add header support for TPM2 table changes (bsc#1084452).
- acpica: Add support for new SRAT subtable (bsc#1085981).
- acpica: iasl: Update to IORT SMMUv3 disassembling (bsc#1085981).
- acpi/iort: numa: Add numa node mapping for smmuv3 devices (bsc#1085981).
- acpi, numa: fix pxm to online numa node associations (bnc#1012382).
- acpi / pmic: xpower: Fix power_table addresses (bnc#1012382).
- acpi/processor: Fix error handling in __acpi_processor_start() (bnc#1012382).
- acpi/processor: Replace racy task affinity logic (bnc#1012382).
- add mainline tag to various patches to be able to get further work done
- af_iucv: enable control sends in case of SEND_SHUTDOWN (bnc#1085507, LTC#165135).
- agp/intel: Flush all chipset writes after updating the GGTT (bnc#1012382).
- ahci: Add PCI-id for the Highpoint Rocketraid 644L card (bnc#1012382).
- alsa: aloop: Fix access to not-yet-ready substream via cable (bnc#1012382).
- alsa: aloop: Sync stale timer before release (bnc#1012382).
- alsa: firewire-digi00x: handle all MIDI messages on streaming packets (bnc#1012382).
- alsa: hda: Add a power_save blacklist (bnc#1012382).
- alsa: hda: add dock and led support for HP EliteBook 820 G3 (bnc#1012382).
- alsa: hda: add dock and led support for HP ProBook 640 G2 (bnc#1012382).
- alsa: hda/realtek - Always immediately update mute LED with pin VREF (bnc#1012382).
- alsa: hda/realtek - Fix dock line-out volume on Dell Precision 7520 (bnc#1012382).
- alsa: hda/realtek - Fix speaker no sound after system resume (bsc#1031717).
- alsa: hda - Revert power_save option default value (git-fixes).
- alsa: pcm: Fix UAF in snd_pcm_oss_get_formats() (bnc#1012382).
- alsa: usb-audio: Add a quirck for B&amp;W PX headphones (bnc#1012382).
- alsa: usb-audio: Fix parsing descriptor of UAC2 processing unit (bnc#1012382).
- apparmor: Make path_max parameter readonly (bnc#1012382).
- arm64: Add ARM_SMCCC_ARCH_WORKAROUND_1 BP hardening support (bsc#1068032).
- arm64: Add missing Falkor part number for branch predictor hardening (bsc#1068032).
- arm64: capabilities: Handle duplicate entries for a capability (bsc#1068032).
- arm64: cpufeature: __this_cpu_has_cap() shouldn't stop early (bsc#1068032).
- arm64 / cpuidle: Use new cpuidle macro for entering retention state (bsc#1084328).
- arm64: Enforce BBM for huge IO/VMAP mappings (bsc#1088313).
- arm64: fix smccc compilation (bsc#1068032).
- arm64: Kill PSCI_GET_VERSION as a variant-2 workaround (bsc#1068032).
- arm64: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling (bsc#1068032).
- arm64: KVM: Increment PC after handling an SMC trap (bsc#1068032).
- arm64: KVM: Report SMCCC_ARCH_WORKAROUND_1 BP hardening support (bsc#1068032).
- arm64: mm: do not write garbage into TTBR1_EL1 register (bsc#1085487).
- arm64: mm: fix thinko in non-global page table attribute check (bsc#1088050).
- arm64: Relax ARM_SMCCC_ARCH_WORKAROUND_1 discovery (bsc#1068032).
- arm: 8668/1: ftrace: Fix dynamic ftrace with DEBUG_RODATA and !FRAME_POINTER (bnc#1012382).
- arm/arm64: KVM: Add PSCI_VERSION helper (bsc#1068032).
- arm/arm64: KVM: Add smccc accessors to PSCI code (bsc#1068032).
- arm/arm64: KVM: Advertise SMCCC v1.1 (bsc#1068032).
- arm/arm64: KVM: Consolidate the PSCI include files (bsc#1068032).
- arm/arm64: KVM: Implement PSCI 1.0 support (bsc#1068032).
- arm/arm64: KVM: Turn kvm_psci_version into a static inline (bsc#1068032).
- arm/arm64: smccc: Implement SMCCC v1.1 inline primitive (bsc#1068032).
- arm/arm64: smccc: Make function identifiers an unsigned quantity (bsc#1068032).
- arm: DRA7: clockdomain: Change the CLKTRCTRL of CM_PCIE_CLKSTCTRL to SW_WKUP (bnc#1012382).
- arm: dts: Adjust moxart IRQ controller and flags (bnc#1012382).
- arm: dts: am335x-pepper: Fix the audio CODEC's reset pin (bnc#1012382).
- arm: dts: exynos: Correct Trats2 panel reset line (bnc#1012382).
- arm: dts: koelsch: Correct clock frequency of X2 DU clock input (bnc#1012382).
- arm: dts: LogicPD Torpedo: Fix I2C1 pinmux (bnc#1012382).
- arm: dts: LogicPD Torpedo: Fix I2C1 pinmux (bnc#1012382).
- arm: dts: omap3-n900: Fix the audio CODEC's reset pin (bnc#1012382).
- arm: dts: r8a7790: Correct parent of SSI[0-9] clocks (bnc#1012382).
- arm: dts: r8a7791: Correct parent of SSI[0-9] clocks (bnc#1012382).
- arm: mvebu: Fix broken PL310_ERRATA_753970 selects (bnc#1012382).
- asoc: rcar: ssi: do not set SSICR.CKDV = 000 with SSIWSR.CONT (bnc#1012382).
- ath10k: disallow DFS simulation if DFS channel is not enabled (bnc#1012382).
- ath10k: fix invalid STS_CAP_OFFSET_MASK (bnc#1012382).
- ath10k: update tdls teardown state to target (bnc#1012382).
- ath: Fix updating radar flags for coutry code India (bnc#1012382).
- batman-adv: handle race condition for claims between gateways (bnc#1012382).
- bcache: do not attach backing with duplicate UUID (bnc#1012382).
- blkcg: fix double free of new_blkg in blkcg_init_queue (bnc#1012382).
- blk-throttle: make sure expire time isn't too big (bnc#1012382).
- block: do not assign cmd_flags in __blk_rq_prep_clone (bsc#1088087).
- block-mq: stop workqueue items in blk_mq_stop_hw_queue() (bsc#1084967).
- bluetooth: btusb: Fix quirk for Atheros 1525/QCA6174 (bnc#1012382).
- bluetooth: hci_qca: Avoid setup failure on missing rampatch (bnc#1012382).
- bnx2x: Align RX buffers (bnc#1012382).
- bonding: refine bond_fold_stats() wrap detection (bnc#1012382).
- bpf: fix incorrect sign extension in check_alu_op() (bnc#1012382).
- bpf: skip unnecessary capability check (bnc#1012382).
- bpf, x64: implement retpoline for tail call (bnc#1012382).
- bpf, x64: increase number of passes (bnc#1012382).
- braille-console: Fix value returned by _braille_console_setup (bnc#1012382).
- brcmfmac: fix P2P_DEVICE ethernet address generation (bnc#1012382).
- bridge: check brport attr show in brport_show (bnc#1012382).
- btrfs: alloc_chunk: fix DUP stripe size handling (bnc#1012382).
- btrfs: Fix use-after-free when cleaning up fs_devs with a single stale device (bnc#1012382).
- btrfs: improve delayed refs iterations (bsc#1076033).
- btrfs: incremental send, fix invalid memory access (git-fixes).
- btrfs: preserve i_mode if __btrfs_set_acl() fails (bnc#1012382).
- btrfs: send, fix file hole not being preserved due to inline extent (bnc#1012382).
- can: cc770: Fix queue stall &amp; dropped RTR reply (bnc#1012382).
- can: cc770: Fix stalls on rt-linux, remove redundant IRQ ack (bnc#1012382).
- can: cc770: Fix use after free in cc770_tx_interrupt() (bnc#1012382).
- ceph: only dirty ITER_IOVEC pages for direct read (bsc#1084898).
- ch9200: use skb_cow_head() to deal with cloned skbs (bsc#1088684).
- clk: bcm2835: Protect sections updating shared registers (bnc#1012382).
- clk: ns2: Correct SDIO bits (bnc#1012382).
- clk: qcom: msm8916: fix mnd_width for codec_digcodec (bnc#1012382).
- clk: si5351: Rename internal plls to avoid name collisions (bnc#1012382).
- coresight: Fix disabling of CoreSight TPIU (bnc#1012382).
- coresight: Fixes coresight DT parse to get correct output port ID (bnc#1012382).
- cpufreq: Fix governor module removal race (bnc#1012382).
- cpufreq: s3c24xx: Fix broken s3c_cpufreq_init() (bnc#1012382).
- cpufreq/sh: Replace racy task affinity logic (bnc#1012382).
- cpuidle: Add new macro to enter a retention idle state (bsc#1084328).
- cros_ec: fix nul-termination for firmware build info (bnc#1012382).
- crypto: cavium - fix memory leak on info (bsc#1086518).
- dcache: Add cond_resched in shrink_dentry_list (bsc#1086194).
- dccp: check sk for closed state in dccp_sendmsg() (bnc#1012382).
- dmaengine: imx-sdma: add 1ms delay to ensure SDMA channel is stopped (bnc#1012382).
- dmaengine: ti-dma-crossbar: Fix event mapping for TPCC_EVT_MUX_60_63 (bnc#1012382).
- dm: Always copy cmd_flags when cloning a request (bsc#1088087).
- driver: (adm1275) set the m,b and R coefficients correctly for power (bnc#1012382).
- drm: Allow determining if current task is output poll worker (bnc#1012382).
- drm/amdgpu/dce: Do not turn off DP sink when disconnected (bnc#1012382).
- drm/amdgpu: Fail fb creation from imported dma-bufs. (v2) (bnc#1012382).
- drm/amdgpu: Fix deadlock on runtime suspend (bnc#1012382).
- drm/amdgpu: fix KV harvesting (bnc#1012382).
- drm/amdgpu: Notify sbios device ready before send request (bnc#1012382).
- drm/amdkfd: Fix memory leaks in kfd topology (bnc#1012382).
- drm: Defer disabling the vblank IRQ until the next interrupt (for instant-off) (bnc#1012382).
- drm/edid: set ELD connector type in drm_edid_to_eld() (bnc#1012382).
- drm/i915/cmdparser: Do not check past the cmd length (bsc#1031717).
- drm/i915/psr: Check for the specific AUX_FRAME_SYNC cap bit (bsc#1031717).
- drm/msm: fix leak in failed get_pages (bnc#1012382).
- drm/nouveau: Fix deadlock on runtime suspend (bnc#1012382).
- drm/nouveau/kms: Increase max retries in scanout position queries (bnc#1012382).
- drm/omap: DMM: Check for DMM readiness after successful transaction commit (bnc#1012382).
- drm: qxl: Do not alloc fbdev if emulation is not supported (bnc#1012382).
- drm/radeon: Do not turn off DP sink when disconnected (bnc#1012382).
- drm/radeon: Fail fb creation from imported dma-bufs (bnc#1012382).
- drm/radeon: Fix deadlock on runtime suspend (bnc#1012382).
- drm/radeon: fix KV harvesting (bnc#1012382).
- drm: udl: Properly check framebuffer mmap offsets (bnc#1012382).
- drm/vmwgfx: Fix a destoy-while-held mutex problem (bnc#1012382).
- drm/vmwgfx: Fixes to vmwgfx_fb (bnc#1012382).
- e1000e: Avoid missed interrupts following ICR read (bsc#1075428).
- e1000e: Avoid receiver overrun interrupt bursts (bsc#1075428).
- e1000e: Fix check_for_link return value with autoneg off (bsc#1075428).
- e1000e: Fix link check race condition (bsc#1075428).
- e1000e: Fix queue interrupt re-raising in Other interrupt (bsc#1075428).
- e1000e: fix timing for 82579 Gigabit Ethernet controller (bnc#1012382).
- e1000e: Remove Other from EIAC (bsc#1075428).
- edac, sb_edac: Fix out of bound writes during DIMM configuration on KNL (git-fixes 3286d3eb906c).
- ext4: inplace xattr block update fails to deduplicate blocks (bnc#1012382).
- f2fs: relax node version check for victim data in gc (bnc#1012382).
- fib_semantics: Do not match route with mismatching tclassid (bnc#1012382).
- firmware/psci: Expose PSCI conduit (bsc#1068032).
- firmware/psci: Expose SMCCC version through psci_ops (bsc#1068032).
- fixup: sctp: verify size of a new chunk in _sctp_make_chunk() (bnc#1012382).
- fs/aio: Add explicit RCU grace period when freeing kioctx (bnc#1012382).
- fs/aio: Use RCU accessors for kioctx_table-&gt;table[] (bnc#1012382).
- fs/hugetlbfs/inode.c: change put_page/unlock_page order in hugetlbfs_fallocate() (git-fixes, bsc#1083745).
- fs: Teach path_connected to handle nfs filesystems with multiple roots (bnc#1012382).
- genirq: Track whether the trigger type has been set (git-fixes).
- genirq: Use irqd_get_trigger_type to compare the trigger type for shared IRQs (bnc#1012382).
- hdlc_ppp: carrier detect ok, do not turn off negotiation (bnc#1012382).
- hid: clamp input to logical range if no null state (bnc#1012382).
- hid: reject input outside logical range only if null state is set (bnc#1012382).
- hugetlbfs: fix offset overflow in hugetlbfs mmap (bnc#1084353).
- hv_balloon: fix bugs in num_pages_onlined accounting (fate#323887).
- hv_balloon: fix printk loglevel (fate#323887).
- hv_balloon: simplify hv_online_page()/hv_page_online_one() (fate#323887).
- i2c: i2c-scmi: add a MS HID (bnc#1012382).
- i2c: xlp9xx: Check for Bus state before every transfer (bsc#1084310).
- i2c: xlp9xx: Handle NACK on DATA properly (bsc#1084310).
- i2c: xlp9xx: Handle transactions with I2C_M_RECV_LEN properly (bsc#1060799).
- i2c: xlp9xx: return ENXIO on slave address NACK (bsc#1060799).
- i40e: Acquire NVM lock before reads on all devices (bnc#1012382).
- i40e: avoid NVM acquire deadlock during NVM update (git-fixes).
- ia64: fix module loading for gcc-5.4 (bnc#1012382).
- ib/ipoib: Avoid memory leak if the SA returns a different DGID (bnc#1012382).
- ib/ipoib: Update broadcast object if PKey value was changed in index 0 (bnc#1012382).
- ib/mlx4: Change vma from shared to private (bnc#1012382).
- ib/mlx4: Take write semaphore when changing the vma struct (bnc#1012382).
- ibmvfc: Avoid unnecessary port relogin (bsc#1085404).
- ibmvnic: Disable irqs before exiting reset from closed state (bsc#1084610).
- ibmvnic: Do not reset CRQ for Mobility driver resets (bsc#1088600).
- ibmvnic: Fix DMA mapping mistakes (bsc#1088600).
- ibmvnic: Fix failover case for non-redundant configuration (bsc#1088600).
- ibmvnic: Fix reset return from closed state (bsc#1084610).
- ibmvnic: Fix reset scheduler error handling (bsc#1088600).
- ibmvnic: Potential NULL dereference in clean_one_tx_pool() (bsc#1085224, git-fixes).
- ibmvnic: Remove unused TSO resources in TX pool structure (bsc#1085224).
- ibmvnic: Update TX pool cleaning routine (bsc#1085224).
- ibmvnic: Zero used TX descriptor counter on reset (bsc#1088600).
- ib/umem: Fix use of npages/nmap fields (bnc#1012382).
- ieee802154: 6lowpan: fix possible NULL deref in lowpan_device_event() (bnc#1012382).
- iio: st_pressure: st_accel: Initialise sensor platform data properly (bnc#1012382).
- iio: st_pressure: st_accel: pass correct platform data to init (git-fixes).
- ima: relax requiring a file signature for new files with zero length (bnc#1012382).
- infiniband/uverbs: Fix integer overflows (bnc#1012382).
- input: matrix_keypad - fix race when disabling interrupts (bnc#1012382).
- input: qt1070 - add OF device ID table (bnc#1012382).
- input: tsc2007 - check for presence and power down tsc2007 during probe (bnc#1012382).
- iommu/omap: Register driver before setting IOMMU ops (bnc#1012382).
- iommu/vt-d: clean up pr_irq if request_threaded_irq fails (bnc#1012382).
- ip6_vti: adjust vti mtu according to mtu of lower device (bnc#1012382).
- ipmi: do not probe ACPI devices if si_tryacpi is unset (bsc#1060799).
- ipmi: Fix the I2C address extraction from SPMI tables (bsc#1060799).
- ipmi_ssif: Fix kernel panic at msg_done_handler (bsc#1088871).
- ipmi_ssif: Fix logic around alert handling (bsc#1060799).
- ipmi_ssif: remove redundant null check on array client-&gt;adapter-&gt;name (bsc#1060799).
- ipmi_ssif: unlock on allocation failure (bsc#1060799).
- ipmi:ssif: Use i2c_adapter_id instead of adapter-&gt;nr (bsc#1060799).
- ipmi: Use the proper default value for register size in ACPI (bsc#1060799).
- ipmi/watchdog: fix wdog hang on panic waiting for ipmi response (bnc#1012382).
- ipv6: fix access to non-linear packet in ndisc_fill_redirect_hdr_option() (bnc#1012382).
- ipv6 sit: work around bogus gcc-8 -Wrestrict warning (bnc#1012382).
- ipvlan: add L2 check for packets arriving via virtual devices (bnc#1012382).
- irqchip/gic-v3-its: Add ACPI NUMA node mapping (bsc#1085981).
- irqchip/gic-v3-its: Allow GIC ITS number more than MAX_NUMNODES (bsc#1085981).
- irqchip/gic-v3-its: Ensure nr_ites &gt;= nr_lpis (bnc#1012382).
- irqchip/gic-v3-its: Remove ACPICA version check for ACPI NUMA (bsc#1085981).
- kbuild: disable clang's default use of -fmerge-all-constants (bnc#1012382).
- kbuild: Handle builtin dtb file names containing hyphens (bnc#1012382).
- kprobes/x86: Fix kprobe-booster not to boost far call instructions (bnc#1012382).
- kprobes/x86: Fix to set RWX bits correctly before releasing trampoline (git-fixes).
- kprobes/x86: Set kprobes pages read-only (bnc#1012382).
- kvm: arm/arm64: Handle CPU_PM_ENTER_FAILED (bsc#1086499).
- kvm: arm/arm64: vgic: Add missing irq_lock to vgic_mmio_read_pending (bsc#1086499).
- kvm: arm/arm64: vgic: Do not populate multiple LRs with the same vintid (bsc#1086499).
- kvm: arm/arm64: vgic-its: Check result of allocation before use (bsc#).
- kvm: arm/arm64: vgic-its: Preserve the revious read from the pending table (bsc#1086499).
- kvm: arm/arm64: vgic-v3: Tighten synchronization for guests using v2 on v3 (bsc#1086499).
- kvm: mmu: Fix overlap between public and private memslots (bnc#1012382).
- kvm: nVMX: fix nested tsc scaling (bsc1087999).
- kvm: PPC: Book3S PR: Exit KVM on failed mapping (bnc#1012382).
- kvm/x86: fix icebp instruction handling (bnc#1012382).
- l2tp: do not accept arbitrary sockets (bnc#1012382).
- libata: Apply NOLPM quirk to Crucial M500 480 and 960GB SSDs (bnc#1012382).
- libata: Apply NOLPM quirk to Crucial MX100 512GB SSDs (bnc#1012382).
- libata: disable LPM for Crucial BX100 SSD 500GB drive (bnc#1012382).
- libata: Enable queued TRIM for Samsung SSD 860 (bnc#1012382).
- libata: fix length validation of ATAPI-relayed SCSI commands (bnc#1012382).
- libata: Make Crucial BX100 500GB LPM quirk apply to all firmware versions (bnc#1012382).
- libata: Modify quirks for MX100 to limit NCQ_TRIM quirk to MU01 version (bnc#1012382).
- libata: remove WARN() for DMA or PIO command without data (bnc#1012382).
- lock_parent() needs to recheck if dentry got __dentry_kill'ed under it (bnc#1012382).
- loop: Fix lost writes caused by missing flag (bnc#1012382).
- lpfc: update version to 11.4.0.7-1 (bsc#1085383).
- mac80211: do not parse encrypted management frames in ieee80211_frame_acked (bnc#1012382).
- mac80211: do not WARN on bad WMM parameters from buggy APs (bsc#1031717).
- mac80211_hwsim: enforce PS_MANUAL_POLL to be set after PS_ENABLED (bnc#1012382).
- mac80211: remove BUG() when interface type is invalid (bnc#1012382).
- md-cluster: fix wrong condition check in raid1_write_request (bsc#1085402).
- md/raid10: skip spare disk as 'first' disk (bnc#1012382).
- md/raid10: wait up frozen array in handle_write_completed (bnc#1012382).
- md/raid6: Fix anomily when recovering a single device in RAID6 (bnc#1012382).
- media: au0828: fix VIDEO_V4L2 dependency (bsc#1031717).
- media: bt8xx: Fix err 'bt878_probe()' (bnc#1012382).
- media: c8sectpfe: fix potential NULL pointer dereference in c8sectpfe_timer_interrupt (bnc#1012382).
- media: cpia2: Fix a couple off by one bugs (bnc#1012382).
- media: cx25821: prevent out-of-bounds read on array card (bsc#1031717).
- media/dvb-core: Race condition when writing to CAM (bnc#1012382).
- media: i2c/soc_camera: fix ov6650 sensor getting wrong clock (bnc#1012382).
- media: m88ds3103: do not call a non-initalized function (bnc#1012382).
- media: [RESEND] media: dvb-frontends: Add delay to Si2168 restart (bnc#1012382).
- media: s3c-camif: fix out-of-bounds array access (bsc#1031717).
- mfd: palmas: Reset the POWERHOLD mux during power off (bnc#1012382).
- mmc: avoid removing non-removable hosts during suspend (bnc#1012382).
- mmc: dw_mmc: fix falling from idmac to PIO mode when dw_mci_reset occurs (bnc#1012382).
- mmc: dw_mmc: Fix the DTO/CTO timeout overflow calculation for 32-bit systems (bsc#1088267).
- mmc: sdhci-of-esdhc: limit SD clock for ls1012a/ls1046a (bnc#1012382).
- mm: Fix false-positive VM_BUG_ON() in page_cache_{get,add}_speculative() (bnc#1012382).
- mm/hugetlb.c: do not call region_abort if region_chg fails (bnc#1084353).
- mm/vmalloc: add interfaces to free unmapped page table (bnc#1012382).
- mpls, nospec: Sanitize array index in mpls_label_ok() (bnc#1012382).
- mt7601u: check return value of alloc_skb (bnc#1012382).
- mtd: nand: fix interpretation of NAND_CMD_NONE in nand_command[_lp]() (bnc#1012382).
- mtd: nand: fsl_ifc: Fix nand waitfunc return value (bnc#1012382).
- mtip32xx: use runtime tag to initialize command header (bnc#1012382).
- net/8021q: create device with all possible features in wanted_features (bnc#1012382).
- net: ethernet: arc: Fix a potential memory leak if an optional regulator is deferred (bnc#1012382).
- net: ethernet: ti: cpsw: add check for in-band mode setting with RGMII PHY interface (bnc#1012382).
- net/faraday: Add missing include of of.h (bnc#1012382).
- net: fec: Fix unbalanced PM runtime calls (bnc#1012382).
- netfilter: add back stackpointer size checks (bnc#1012382).
- netfilter: bridge: ebt_among: add missing match size checks (bnc#1012382).
- netfilter: IDLETIMER: be syzkaller friendly (bnc#1012382).
- netfilter: ipv6: fix use-after-free Write in nf_nat_ipv6_manip_pkt (bnc#1012382).
- netfilter: nat: cope with negative port range (bnc#1012382).
- netfilter: use skb_to_full_sk in ip_route_me_harder (bnc#1012382).
- netfilter: x_tables: fix missing timer initialization in xt_LED (bnc#1012382).
- netfilter: xt_CT: fix refcnt leak on error path (bnc#1012382).
- net: Fix hlist corruptions in inet_evict_bucket() (bnc#1012382).
- net: fix race on decreasing number of TX queues (bnc#1012382).
- net: hns: Fix ethtool private flags (bsc#1085511).
- net: ipv4: avoid unused variable warning for sysctl (git-fixes).
- net: ipv4: do not allow setting net.ipv4.route.min_pmtu below 68 (bnc#1012382).
- net: ipv6: send unsolicited NA after DAD (git-fixes).
- net: ipv6: send unsolicited NA on admin up (bnc#1012382).
- net/iucv: Free memory obtained by kzalloc (bnc#1012382).
- netlink: avoid a double skb free in genlmsg_mcast() (bnc#1012382).
- netlink: ensure to loop over all netns in genlmsg_multicast_allns() (bnc#1012382).
- net: mpls: Pull common label check into helper (bnc#1012382).
- net: Only honor ifindex in IP_PKTINFO if non-0 (bnc#1012382).
- net: systemport: Rewrite __bcm_sysport_tx_reclaim() (bnc#1012382).
- net: xfrm: allow clearing socket xfrm policies (bnc#1012382).
- nfc: nfcmrvl: double free on error path (bnc#1012382).
- nfc: nfcmrvl: Include unaligned.h instead of access_ok.h (bnc#1012382).
- nfsd4: permit layoutget of executable-only files (bnc#1012382).
- nfs: Fix an incorrect type in struct nfs_direct_req (bnc#1012382).
- nospec: Allow index argument to have const-qualified type (bnc#1012382).
- nospec: Include &lt;asm/barrier.h&gt; dependency (bnc#1012382).
- nvme: do not send keep-alive frames during reset (bsc#1084223).
- nvme: do not send keep-alives to the discovery controller (bsc#1086607).
- nvme: expand nvmf_check_if_ready checks (bsc#1085058).
- nvme/rdma: do no start error recovery twice (bsc#1084967).
- nvmet_fc: prevent new io rqsts in possible isr completions (bsc#1083574).
- of: fix of_device_get_modalias returned length when truncating buffers (bnc#1012382).
- openvswitch: Delete conntrack entry clashing with an expectation (bnc#1012382).
- Partial revert 'e1000e: Avoid receiver overrun interrupt bursts' (bsc#1075428).
- pci/ACPI: Fix bus range comparison in pci_mcfg_lookup() (bsc#1084699).
- pci: Add function 1 DMA alias quirk for Highpoint RocketRAID 644L (bnc#1012382).
- pci: Add pci_reset_function_locked() (bsc#1084889).
- pci: Apply Cavium ACS quirk only to CN81xx/CN83xx/CN88xx devices (bsc#1084914).
- pci: Avoid FLR for Intel 82579 NICs (bsc#1084889).
- pci: Avoid slot reset if bridge itself is broken (bsc#1084918).
- pci: Export pcie_flr() (bsc#1084889).
- pci: hv: Fix 2 hang issues in hv_compose_msi_msg() (fate#323887, bsc#1087659, bsc#1087906).
- pci: hv: Fix a comment typo in _hv_pcifront_read_config() (fate#323887, bsc#1087659).
- pci: hv: Only queue new work items in hv_pci_devices_present() if necessary (fate#323887, bsc#1087659).
- pci: hv: Remove the bogus test in hv_eject_device_work() (fate#323887, bsc#1087659).
- pci: hv: Serialize the present and eject work items (fate#323887, bsc#1087659).
- pci: Mark Haswell Power Control Unit as having non-compliant BARs (bsc#1086015).
- pci/MSI: Stop disabling MSI/MSI-X in pci_device_shutdown() (bnc#1012382).
- pci: Probe for device reset support during enumeration (bsc#1084889).
- pci: Protect pci_error_handlers-&gt;reset_notify() usage with device_lock() (bsc#1084889).
- pci: Protect restore with device lock to be consistent (bsc#1084889).
- pci: Remove __pci_dev_reset() and pci_dev_reset() (bsc#1084889).
- pci: Remove redundant probes for device reset support (bsc#1084889).
- pci: Wait for up to 1000ms after FLR reset (bsc#1084889).
- perf inject: Copy events when reordering events in pipe mode (bnc#1012382).
- perf probe: Return errno when not hitting any event (bnc#1012382).
- perf session: Do not rely on evlist in pipe mode (bnc#1012382).
- perf sort: Fix segfault with basic block 'cycles' sort dimension (bnc#1012382).
- perf tests kmod-path: Do not fail if compressed modules are not supported (bnc#1012382).
- perf tools: Make perf_event__synthesize_mmap_events() scale (bnc#1012382).
- perf/x86/intel: Do not accidentally clear high bits in bdw_limit_period() (bnc#1012382).
- perf/x86/intel/uncore: Fix multi-domain PCI CHA enumeration bug on Skylake servers (bsc#1086357).
- pinctrl: Really force states during suspend/resume (bnc#1012382).
- platform/chrome: Use proper protocol transfer function (bnc#1012382).
- platform/x86: asus-nb-wmi: Add wapf4 quirk for the X302UA (bnc#1012382).
- power: supply: pda_power: move from timer to delayed_work (bnc#1012382).
- ppp: prevent unregistered channels from connecting to PPP units (bnc#1012382).
- pty: cancel pty slave port buf's work in tty_release (bnc#1012382).
- pwm: tegra: Increase precision in PWM rate calculation (bnc#1012382).
- qed: Free RoCE ILT Memory on rmmod qedr (bsc#1019695 FATE#321703 bsc#1019699 FATE#321702 bsc#1022604 FATE#321747).
- qed: Use after free in qed_rdma_free() (bsc#1019695 FATE#321703 bsc#1019699 FATE#321702 bsc#1022604 FATE#321747).
- qeth: repair SBAL elements calculation (bnc#1085507, LTC#165484).
- qlcnic: fix unchecked return value (bnc#1012382).
- rcutorture/configinit: Fix build directory error message (bnc#1012382).
- rdma/cma: Use correct size when writing netlink stats (bnc#1012382).
- rdma/core: Do not use invalid destination in determining port reuse (FATE#321231 FATE#321473 FATE#322153 FATE#322149).
- rdma/iwpm: Fix uninitialized error code in iwpm_send_mapinfo() (bnc#1012382).
- rdma/mlx5: Fix integer overflow while resizing CQ (bnc#1012382).
- rdma/ocrdma: Fix permissions for OCRDMA_RESET_STATS (bnc#1012382).
- rdma/ucma: Check that user does not overflow QP state (bnc#1012382).
- rdma/ucma: Fix access to non-initialized CM_ID object (bnc#1012382).
- rdma/ucma: Limit possible option size (bnc#1012382).
- regmap: Do not use format_val in regmap_bulk_read (bsc#1031717).
- regmap: Fix reversed bounds check in regmap_raw_write() (bsc#1031717).
- regmap: Format data for raw write in regmap_bulk_write (bsc#1031717).
- regmap-i2c: Off by one in regmap_i2c_smbus_i2c_read/write() (bsc#1031717).
- regulator: anatop: set default voltage selector for pcie (bnc#1012382).
- reiserfs: Make cancel_old_flush() reliable (bnc#1012382).
- Revert 'ARM: dts: LogicPD Torpedo: Fix I2C1 pinmux' (bnc#1012382).
- Revert 'e1000e: Separate signaling for link check/link up' (bsc#1075428).
- Revert 'genirq: Use irqd_get_trigger_type to compare the trigger type for shared IRQs' (bnc#1012382).
- Revert 'ipvlan: add L2 check for packets arriving via virtual devices' (reverted in upstream).
- Revert 'led: core: Fix brightness setting when setting delay_off=0' (bnc#1012382).
- rndis_wlan: add return value validation (bnc#1012382).
- rtc: cmos: Do not assume irq 8 for rtc when there are no legacy irqs (bnc#1012382).
- rtlwifi: rtl8723be: Fix loss of signal (bnc#1012382).
- rtlwifi: rtl_pci: Fix the bug when inactiveps is enabled (bnc#1012382).
- s390/mm: fix local TLB flushing vs. detach of an mm address space (bnc#1088324, LTC#166470).
- s390/mm: fix race on mm-&gt;context.flush_mm (bnc#1088324, LTC#166470).
- s390/mm: no local TLB flush for clearing-by-ASCE IDTE (bnc#1088324, LTC#166470).
- s390/qeth: apply takeover changes when mode is toggled (bnc#1085507, LTC#165490).
- s390/qeth: do not apply takeover changes to RXIP (bnc#1085507, LTC#165490).
- s390/qeth: fix double-free on IP add/remove race (bnc#1085507, LTC#165491).
- s390/qeth: fix IPA command submission race (bnc#1012382).
- s390/qeth: fix IP address lookup for L3 devices (bnc#1085507, LTC#165491).
- s390/qeth: fix IP removal on offline cards (bnc#1085507, LTC#165491).
- s390/qeth: fix SETIP command handling (bnc#1012382).
- s390/qeth: free netdevice when removing a card (bnc#1012382).
- s390/qeth: improve error reporting on IP add/removal (bnc#1085507, LTC#165491).
- s390/qeth: lock IP table while applying takeover changes (bnc#1085507, LTC#165490).
- s390/qeth: lock read device while queueing next buffer (bnc#1012382).
- s390/qeth: on channel error, reject further cmd requests (bnc#1012382).
- s390/qeth: update takeover IPs after configuration change (bnc#1085507, LTC#165490).
- s390/qeth: when thread completes, wake up all waiters (bnc#1012382).
- sched: act_csum: do not mangle TCP and UDP GSO packets (bnc#1012382).
- sched: Stop resched_cpu() from sending IPIs to offline CPUs (bnc#1012382).
- sched: Stop switched_to_rt() from sending IPIs to offline CPUs (bnc#1012382).
- scsi: core: scsi_get_device_flags_keyed(): Always return device flags (bnc#1012382).
- scsi: devinfo: apply to HP XP the same flags as Hitachi VSP (bnc#1012382).
- scsi: dh: add new rdac devices (bnc#1012382).
- scsi: lpfc: Add missing unlock in WQ full logic (bsc#1085383).
- scsi: lpfc: Code cleanup for 128byte wqe data type (bsc#1085383).
- scsi: lpfc: Fix mailbox wait for POST_SGL mbox command (bsc#1085383).
- scsi: lpfc: Fix NVME Initiator FirstBurst (bsc#1085383).
- scsi: lpfc: Fix SCSI lun discovery when port configured for both SCSI and NVME (bsc#1085383).
- scsi: lpfc: Memory allocation error during driver start-up on power8 (bsc#1085383).
- scsi: mac_esp: Replace bogus memory barrier with spinlock (bnc#1012382).
- scsi: sg: check for valid direction before starting the request (bnc#1012382).
- scsi: sg: fix SG_DXFER_FROM_DEV transfers (bnc#1012382).
- scsi: sg: fix static checker warning in sg_is_valid_dxfer (bnc#1012382).
- scsi: sg: only check for dxfer_len greater than 256M (bnc#1012382 bsc#1064206).
- scsi: virtio_scsi: always read VPD pages for multiqueue too (git-fixes).
- scsi: virtio_scsi: Always try to read VPD pages (bnc#1012382).
- sctp: fix dst refcnt leak in sctp_v4_get_dst (bnc#1012382).
- sctp: fix dst refcnt leak in sctp_v6_get_dst() (bnc#1012382).
- sctp: verify size of a new chunk in _sctp_make_chunk() (bnc#1012382).
- selftests/x86: Add tests for the STR and SLDT instructions (bnc#1012382).
- selftests/x86: Add tests for User-Mode Instruction Prevention (bnc#1012382).
- selftests/x86/entry_from_vm86: Add test cases for POPF (bnc#1012382).
- selftests/x86/entry_from_vm86: Exit with 1 if we fail (bnc#1012382).
- selinux: check for address length in selinux_socket_bind() (bnc#1012382).
- serial: 8250_pci: Add Brainboxes UC-260 4 port serial device (bnc#1012382).
- serial: sh-sci: prevent lockup on full TTY buffers (bnc#1012382).
- skbuff: Fix not waking applications when errors are enqueued (bnc#1012382).
- sm501fb: do not return zero on failure path in sm501fb_start() (bnc#1012382).
- solo6x10: release vb2 buffers in solo_stop_streaming() (bnc#1012382).
- spi: dw: Disable clock after unregistering the host (bnc#1012382).
- spi: omap2-mcspi: poll OMAP2_MCSPI_CHSTAT_RXS for PIO transfer (bnc#1012382).
- spi: sun6i: disable/unprepare clocks on remove (bnc#1012382).
- staging: android: ashmem: Fix lockdep issue during llseek (bnc#1012382).
- staging: android: ashmem: Fix possible deadlock in ashmem_ioctl (bnc#1012382).
- staging: comedi: fix comedi_nsamples_left (bnc#1012382).
- staging: lustre: ptlrpc: kfree used instead of kvfree (bnc#1012382).
- staging: ncpfs: memory corruption in ncp_read_kernel() (bnc#1012382).
- staging: speakup: Replace BUG_ON() with WARN_ON() (bnc#1012382).
- staging: unisys: visorhba: fix s-Par to boot with option CONFIG_VMAP_STACK set to y (bnc#1012382).
- staging: wilc1000: add check for kmalloc allocation failure (bnc#1012382).
- staging: wilc1000: fix unchecked return value (bnc#1012382).
- sysrq: Reset the watchdog timers while displaying high-resolution timers (bnc#1012382).
- target: prefer dbroot of /etc/target over /var/target (bsc#1087274).
- tcm_fileio: Prevent information leak for short reads (bnc#1012382).
- tcp: remove poll() flakes with FastOpen (bnc#1012382).
- tcp: sysctl: Fix a race to avoid unexpected 0 window from space (bnc#1012382).
- team: Fix double free in error path (bnc#1012382).
- test_firmware: fix setting old custom fw path back on exit (bnc#1012382).
- time: Change posix clocks ops interfaces to use timespec64 (bnc#1012382).
- timers, sched_clock: Update timeout for clock wrap (bnc#1012382).
- tools/usbip: fixes build with musl libc toolchain (bnc#1012382).
- tpm_i2c_infineon: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).
- tpm_i2c_nuvoton: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).
- tpm: st33zp24: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).
- tpm/tpm_crb: Use start method value from ACPI table directly (bsc#1084452).
- tracing: probeevent: Fix to support minus offset from symbol (bnc#1012382).
- tty/serial: atmel: add new version check for usart (bnc#1012382).
- tty: vt: fix up tabstops properly (bnc#1012382).
- uas: fix comparison for error code (bnc#1012382).
- ubi: Fix race condition between ubi volume creation and udev (bnc#1012382).
- udplite: fix partial checksum initialization (bnc#1012382).
- usb: Do not print a warning if interface driver rebind is deferred at resume (bsc#1087211).
- usb: dwc2: Make sure we disconnect the gadget state (bnc#1012382).
- usb: gadget: bdc: 64-bit pointer capability check (bnc#1012382).
- usb: gadget: dummy_hcd: Fix wrong power status bit clear/reset in dummy_hub_control() (bnc#1012382).
- usb: gadget: f_fs: Fix use-after-free in ffs_fs_kill_sb() (bnc#1012382).
- usb: gadget: udc: Add missing platform_device_put() on error in bdc_pci_probe() (bnc#1012382).
- usb: quirks: add control message delay for 1b1c:1b20 (bnc#1012382).
- usb: storage: Add JMicron bridge 152d:2567 to unusual_devs.h (bnc#1012382).
- usb: usbmon: Read text within supplied buffer size (bnc#1012382).
- usb: usbmon: remove assignment from IS_ERR argument (bnc#1012382).
- veth: set peer GSO values (bnc#1012382).
- vgacon: Set VGA struct resource types (bnc#1012382).
- video: ARM CLCD: fix dma allocation size (bnc#1012382).
- video: fbdev: udlfb: Fix buffer on stack (bnc#1012382).
- video/hdmi: Allow 'empty' HDMI infoframes (bnc#1012382).
- vxlan: vxlan dev should inherit lowerdev's gso_max_size (bnc#1012382).
- wan: pc300too: abort path on failure (bnc#1012382).
- watchdog: hpwdt: Check source of NMI (bnc#1012382).
- watchdog: hpwdt: fix unused variable warning (bnc#1012382).
- watchdog: hpwdt: SMBIOS check (bnc#1012382).
- watchdog: sbsa: use 32-bit read for WCV (bsc#1085679).
- wil6210: fix memory access violation in wil_memcpy_from/toio_32 (bnc#1012382).
- workqueue: Allow retrieval of current task's work struct (bnc#1012382).
- x86/apic/vector: Handle legacy irq data correctly (bnc#1012382).
- x86/boot/64: Verify alignment of the LOAD segment (bnc#1012382).
- x86/build/64: Force the linker to use 2MB page size (bnc#1012382).
- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).
- x86: i8259: export legacy_pic symbol (bnc#1012382).
- x86/kaiser: Duplicate cpu_tss for an entry trampoline usage (bsc#1077560 bsc#1083836).
- x86/kaiser: enforce trampoline stack alignment (bsc#1087260).
- x86/kaiser: Remove a user mapping of cpu_tss structure (bsc#1077560 bsc#1083836).
- x86/kaiser: Use a per-CPU trampoline stack for kernel entry (bsc#1077560).
- x86/MCE: Serialize sysfs changes (bnc#1012382).
- x86/mm: Fix vmalloc_fault to use pXd_large (bnc#1012382).
- x86/mm: implement free pmd/pte page interfaces (bnc#1012382).
- x86/module: Detect and skip invalid relocations (bnc#1012382).
- x86/speculation: Remove Skylake C2 from Speculation Control microcode blacklist (bsc#1087845).
- x86: Treat R_X86_64_PLT32 as R_X86_64_PC32 (bnc#1012382).
- x86/vm86/32: Fix POPF emulation (bnc#1012382).
- xen-blkfront: fix mq start/stop race (bsc#1085042).
- xen-netback: use skb to determine number of required guest Rx requests (bsc#1046610).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-23"/>
	<updated date="2018-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019695">SUSE bug 1019695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019699">SUSE bug 1019699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022604">SUSE bug 1022604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031717">SUSE bug 1031717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046610">SUSE bug 1046610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060799">SUSE bug 1060799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064206">SUSE bug 1064206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073059">SUSE bug 1073059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073069">SUSE bug 1073069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075428">SUSE bug 1075428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076033">SUSE bug 1076033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077560">SUSE bug 1077560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083574">SUSE bug 1083574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083745">SUSE bug 1083745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083836">SUSE bug 1083836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084223">SUSE bug 1084223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084310">SUSE bug 1084310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084328">SUSE bug 1084328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084353">SUSE bug 1084353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084452">SUSE bug 1084452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084610">SUSE bug 1084610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084699">SUSE bug 1084699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084829">SUSE bug 1084829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084889">SUSE bug 1084889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084898">SUSE bug 1084898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084914">SUSE bug 1084914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084918">SUSE bug 1084918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084967">SUSE bug 1084967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085042">SUSE bug 1085042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085058">SUSE bug 1085058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085224">SUSE bug 1085224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085383">SUSE bug 1085383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085402">SUSE bug 1085402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085404">SUSE bug 1085404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085487">SUSE bug 1085487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085507">SUSE bug 1085507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085511">SUSE bug 1085511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085679">SUSE bug 1085679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085981">SUSE bug 1085981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086015">SUSE bug 1086015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086162">SUSE bug 1086162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086194">SUSE bug 1086194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086357">SUSE bug 1086357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086499">SUSE bug 1086499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086518">SUSE bug 1086518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086607">SUSE bug 1086607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087088">SUSE bug 1087088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087211">SUSE bug 1087211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087231">SUSE bug 1087231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087260">SUSE bug 1087260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087274">SUSE bug 1087274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087659">SUSE bug 1087659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087845">SUSE bug 1087845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087906">SUSE bug 1087906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087999">SUSE bug 1087999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088050">SUSE bug 1088050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088087">SUSE bug 1088087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088241">SUSE bug 1088241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088267">SUSE bug 1088267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088313">SUSE bug 1088313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088324">SUSE bug 1088324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088600">SUSE bug 1088600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088684">SUSE bug 1088684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088871">SUSE bug 1088871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802154">SUSE bug 802154</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18257/">CVE-2017-18257</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1091/">CVE-2018-1091</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7740/">CVE-2018-7740</cve>
	<cve impact="low" cvss3="0/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-8043/">CVE-2018-8043</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8822/">CVE-2018-8822</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520660" comment="kernel-default-4.4.126-94.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520661" comment="kernel-default-devel-4.4.126-94.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520662" comment="kernel-default-extra-4.4.126-94.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520663" comment="kernel-devel-4.4.126-94.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520664" comment="kernel-macros-4.4.126-94.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520665" comment="kernel-source-4.4.126-94.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520666" comment="kernel-syms-4.4.126-94.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78503" version="1" class="patch">
	<metadata>
		<title>Security update for PackageKit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1086936" ref_url="https://bugzilla.suse.com/1086936" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1106" ref_url="https://www.suse.com/security/cve/CVE-2018-1106/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00064.html" source="SUSE-SU"/>
		<description>

    
- CVE-2018-1106: Drop the polkit rule which could allow users in wheel group to install 
                 packages without root password (bsc#1086936).
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-23"/>
	<updated date="2018-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1086936">SUSE bug 1086936</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1106/">CVE-2018-1106</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520667" comment="PackageKit-1.1.3-24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520668" comment="PackageKit-backend-zypp-1.1.3-24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520669" comment="PackageKit-gstreamer-plugin-1.1.3-24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520670" comment="PackageKit-gtk3-module-1.1.3-24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520671" comment="PackageKit-lang-1.1.3-24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520672" comment="libpackagekit-glib2-18-1.1.3-24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520673" comment="typelib-1_0-PackageKitGlib-1_0-1.1.3-24.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78504" version="1" class="patch">
	<metadata>
		<title>Security update for rzsz (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1076576" ref_url="https://bugzilla.suse.com/1076576" source="BUGZILLA"/>
		<reference ref_id="1086416" ref_url="https://bugzilla.suse.com/1086416" source="BUGZILLA"/>
		<reference ref_id="1090051" ref_url="https://bugzilla.suse.com/1090051" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10195" ref_url="https://www.suse.com/security/cve/CVE-2018-10195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003955.html" source="SUSE-SU"/>
		<description>
This update for rzsz fixes the following issues:

- Update to 0.12.21~rc to fix bsc#1086416 and bsc#1090051 

- CVE-2018-10195: segmentation fault in zsdata function could lead to denial of service (bsc#1090051)

 		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-24"/>
	<updated date="2018-04-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076576">SUSE bug 1076576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086416">SUSE bug 1086416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090051">SUSE bug 1090051</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10195/">CVE-2018-10195</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520674" comment="rzsz-0.12.21~rc-1001.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78505" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1082216" ref_url="https://bugzilla.suse.com/1082216" source="BUGZILLA"/>
		<reference ref_id="1082233" ref_url="https://bugzilla.suse.com/1082233" source="BUGZILLA"/>
		<reference ref_id="1082234" ref_url="https://bugzilla.suse.com/1082234" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6797" ref_url="https://www.suse.com/security/cve/CVE-2018-6797/" source="CVE"/>
		<reference ref_id="CVE-2018-6798" ref_url="https://www.suse.com/security/cve/CVE-2018-6798/" source="CVE"/>
		<reference ref_id="CVE-2018-6913" ref_url="https://www.suse.com/security/cve/CVE-2018-6913/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003958.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

Security issues fixed:

- CVE-2018-6913: Fixed space calculation issues in pp_pack.c (bsc#1082216).
- CVE-2018-6798: Fixed heap buffer overflow in regexec.c (bsc#1082233).
- CVE-2018-6797: Fixed sharp-s regexp overflow (bsc#1082234).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-25"/>
	<updated date="2018-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1082216">SUSE bug 1082216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082233">SUSE bug 1082233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082234">SUSE bug 1082234</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6797/">CVE-2018-6797</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-6798/">CVE-2018-6798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6913/">CVE-2018-6913</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520675" comment="perl-5.18.2-12.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520676" comment="perl-32bit-5.18.2-12.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520677" comment="perl-base-5.18.2-12.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520678" comment="perl-doc-5.18.2-12.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78506" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1082885" ref_url="https://bugzilla.suse.com/1082885" source="BUGZILLA"/>
		<reference ref_id="1082975" ref_url="https://bugzilla.suse.com/1082975" source="BUGZILLA"/>
		<reference ref_id="1082977" ref_url="https://bugzilla.suse.com/1082977" source="BUGZILLA"/>
		<reference ref_id="1082991" ref_url="https://bugzilla.suse.com/1082991" source="BUGZILLA"/>
		<reference ref_id="1082998" ref_url="https://bugzilla.suse.com/1082998" source="BUGZILLA"/>
		<reference ref_id="1083002" ref_url="https://bugzilla.suse.com/1083002" source="BUGZILLA"/>
		<reference ref_id="1083250" ref_url="https://bugzilla.suse.com/1083250" source="BUGZILLA"/>
		<reference ref_id="1084656" ref_url="https://bugzilla.suse.com/1084656" source="BUGZILLA"/>
		<reference ref_id="1087026" ref_url="https://bugzilla.suse.com/1087026" source="BUGZILLA"/>
		<reference ref_id="896914" ref_url="https://bugzilla.suse.com/896914" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-10070" ref_url="https://www.suse.com/security/cve/CVE-2014-10070/" source="CVE"/>
		<reference ref_id="CVE-2014-10071" ref_url="https://www.suse.com/security/cve/CVE-2014-10071/" source="CVE"/>
		<reference ref_id="CVE-2014-10072" ref_url="https://www.suse.com/security/cve/CVE-2014-10072/" source="CVE"/>
		<reference ref_id="CVE-2016-10714" ref_url="https://www.suse.com/security/cve/CVE-2016-10714/" source="CVE"/>
		<reference ref_id="CVE-2017-18205" ref_url="https://www.suse.com/security/cve/CVE-2017-18205/" source="CVE"/>
		<reference ref_id="CVE-2017-18206" ref_url="https://www.suse.com/security/cve/CVE-2017-18206/" source="CVE"/>
		<reference ref_id="CVE-2018-1071" ref_url="https://www.suse.com/security/cve/CVE-2018-1071/" source="CVE"/>
		<reference ref_id="CVE-2018-1083" ref_url="https://www.suse.com/security/cve/CVE-2018-1083/" source="CVE"/>
		<reference ref_id="CVE-2018-7549" ref_url="https://www.suse.com/security/cve/CVE-2018-7549/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00070.html" source="SUSE-SU"/>
		<description>
This update for zsh fixes the following issues:

  - CVE-2014-10070: environment variable injection could lead to local privilege escalation (bnc#1082885)

  - CVE-2014-10071: buffer overflow in exec.c could lead to denial of service. (bnc#1082977)

  - CVE-2014-10072: buffer overflow In utils.c when scanning 
very long directory paths for symbolic links. (bnc#1082975)

  - CVE-2016-10714: In zsh before 5.3, an off-by-one error resulted in 
undersized buffers that were intended to support PATH_MAX characters. (bnc#1083250)

  - CVE-2017-18205: In builtin.c when sh compatibility mode is used, a NULL pointer dereference 
could lead to denial of service (bnc#1082998)

  - CVE-2018-1071: exec.c:hashcmd() function vulnerability could lead to denial of service. (bnc#1084656)
 
  - CVE-2018-1083: Autocomplete vulnerability could lead to privilege escalation. (bnc#1087026)

  - CVE-2018-7549: In params.c in zsh through 5.4.2, there is a crash during a copy of an empty hash table, 
as demonstrated by typeset -p. (bnc#1082991)
  
  - CVE-2017-18206: buffer overrun in xsymlinks could lead to denial of service (bnc#1083002)
    
  - Autocomplete and REPORTTIME broken (bsc#896914)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-25"/>
	<updated date="2018-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082885">SUSE bug 1082885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082975">SUSE bug 1082975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082977">SUSE bug 1082977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082991">SUSE bug 1082991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082998">SUSE bug 1082998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083002">SUSE bug 1083002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083250">SUSE bug 1083250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084656">SUSE bug 1084656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087026">SUSE bug 1087026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896914">SUSE bug 896914</bugzilla>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-10070/">CVE-2014-10070</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-10071/">CVE-2014-10071</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-10072/">CVE-2014-10072</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10714/">CVE-2016-10714</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18205/">CVE-2017-18205</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18206/">CVE-2017-18206</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1071/">CVE-2018-1071</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1083/">CVE-2018-1083</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7549/">CVE-2018-7549</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520679" comment="zsh-5.0.5-6.7.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78507" version="1" class="patch">
	<metadata>
		<title>Recommended update for LibreOffice (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1042829" ref_url="https://bugzilla.suse.com/1042829" source="BUGZILLA"/>
		<reference ref_id="1077375" ref_url="https://bugzilla.suse.com/1077375" source="BUGZILLA"/>
		<reference ref_id="1080249" ref_url="https://bugzilla.suse.com/1080249" source="BUGZILLA"/>
		<reference ref_id="1083213" ref_url="https://bugzilla.suse.com/1083213" source="BUGZILLA"/>
		<reference ref_id="1083993" ref_url="https://bugzilla.suse.com/1083993" source="BUGZILLA"/>
		<reference ref_id="1088662" ref_url="https://bugzilla.suse.com/1088662" source="BUGZILLA"/>
		<reference ref_id="1089124" ref_url="https://bugzilla.suse.com/1089124" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9432" ref_url="https://www.suse.com/security/cve/CVE-2017-9432/" source="CVE"/>
		<reference ref_id="CVE-2017-9433" ref_url="https://www.suse.com/security/cve/CVE-2017-9433/" source="CVE"/>
		<reference ref_id="CVE-2018-1055" ref_url="https://www.suse.com/security/cve/CVE-2018-1055/" source="CVE"/>
		<reference ref_id="CVE-2018-6871" ref_url="https://www.suse.com/security/cve/CVE-2018-6871/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003960.html" source="SUSE-SU"/>
		<description>

LibreOffice was updated to version 6.0.3.

Following new features were added:

- The Notebookbar, although still an experimental feature, has been
  enriched with two new variants: Grouped Bar Full for Writer, Calc and
  Impress, and Tabbed Compact for Writer. The Special Characters dialog
  has been reworked, with the addition of lists for Recent and Favorite
  characters, along with a Search field. The Customize dialog has also
  been redesigned, and is now more modern and intuitive.
- In Writer, a Form menu has been added, making it easier to access one
  of the most powerful – and often unknown – LibreOffice features: the
  ability to design forms, and create standards-compliant PDF forms. The
  Find toolbar has been enhanced with a drop-down list of search types, to
  speed up navigation. A new default table style has been added, together
  with a new collection of table styles to reflect evolving visual trends.
- The Mail Merge function has been improved, and it is now possible to
  use either a Writer document or an XLSX file as data source.
- In Calc, ODF 1.2-compliant functions SEARCHB, FINDB and REPLACEB have
  been added, to improve support for the ISO standard format. Also, a
  cell range selection or a selected group of shapes (images) can be now
  exported in PNG or JPG format.
- In Impress, the default slide size has been switched to 16:9, to support
  the most recent form factors of screens and projectors. As a consequence,
  10 new Impress templates have been added, and a couple of old templates
  have been updated.

Changes in components:

- The old WikiHelp has been replaced by the new Help Online system, with
  attractive web pages that can also be displayed on mobile devices. In
  general, LibreOffice Help has been updated both in terms of contents and
  code, with other improvements due all along the life of the LibreOffice
  6 family.
- User dictionaries now allow automatic affixation or compounding. This
  is a general spell checking improvement in LibreOffice which can speed
  up work for Writer users. Instead of manually handling several forms of a
  new word in a language with rich morphology or compounding, the Hunspell
  spell checker can automatically recognize a new word with affixes or
  compounds, based on a “Grammar By” model.

Security features and changes:

- OpenPGP keys can be used to sign ODF documents on all desktop operating
  systems, with experimental support for OpenPGP-based encryption. To enable
  this feature, users will have to install the specific GPG software for
  their operating systems.

- Document classification has also been improved, and allows multiple
  policies (which are now exported to OOXML files). In Writer, marking
  and signing are now supported at paragraph level.

Interoperability changes:

- OOXML interoperability has been improved in several areas: import of
  SmartArt and import/export of ActiveX controls, support of embedded text
  documents and spreadsheets, export of embedded videos to PPTX, export
  of cross-references to DOCX, export of MailMerge fields to DOCX, and
  improvements to the PPTX filter to prevent the creation of broken files.
- New filters for exporting Writer documents to ePub and importing
  QuarkXPress files have also been added, together with an improved filter
  for importing EMF+ (Enhanced Metafile Format Plus) files as used by
  Microsoft Office documents. Some improvements have also been added
  to the ODF export filter, making it easier for other ODF readers to
  display visuals.

The full blog entry for the 6.0 release can be found here:

	https://blog.documentfoundation.org/blog/2018/01/31/libreoffice-6/

The full release notes can be found here:

	https://wiki.documentfoundation.org/ReleaseNotes/6.0

The libraries that LibreOffice depends on also have been udpated to their current versions.
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-25"/>
	<updated date="2018-04-25"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1042829">SUSE bug 1042829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077375">SUSE bug 1077375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080249">SUSE bug 1080249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083213">SUSE bug 1083213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083993">SUSE bug 1083993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088662">SUSE bug 1088662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089124">SUSE bug 1089124</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9432/">CVE-2017-9432</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9433/">CVE-2017-9433</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1055/">CVE-2018-1055</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6871/">CVE-2018-6871</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520680" comment="boost-license1_54_0-1.54.0-26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520681" comment="gnome-documents-3.20.1-10.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520682" comment="gnome-documents-lang-3.20.1-10.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520683" comment="gnome-documents_books-common-3.20.1-10.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520684" comment="gnome-shell-search-provider-documents-3.20.1-10.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520685" comment="libboost_atomic1_54_0-1.54.0-26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520686" comment="libboost_date_time1_54_0-1.54.0-26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520687" comment="libboost_filesystem1_54_0-1.54.0-26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520688" comment="libboost_iostreams1_54_0-1.54.0-26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520689" comment="libboost_locale1_54_0-1.54.0-26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520690" comment="libboost_program_options1_54_0-1.54.0-26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520691" comment="libboost_random1_54_0-1.54.0-26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520692" comment="libboost_regex1_54_0-1.54.0-26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520693" comment="libboost_signals1_54_0-1.54.0-26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520694" comment="libboost_system1_54_0-1.54.0-26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520695" comment="libboost_thread1_54_0-1.54.0-26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520696" comment="libepubgen-0_1-1-0.1.0-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520697" comment="libixion-0_13-0-0.13.0-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520698" comment="libmwaw-0_3-3-0.3.13-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520699" comment="liborcus-0_13-0-0.13.4-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520700" comment="libqxp-0_0-0-0.0.1-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520701" comment="libreoffice-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520702" comment="libreoffice-base-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520703" comment="libreoffice-base-drivers-mysql-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520704" comment="libreoffice-base-drivers-postgresql-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520705" comment="libreoffice-branding-upstream-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520706" comment="libreoffice-calc-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520707" comment="libreoffice-calc-extensions-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520708" comment="libreoffice-draw-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520709" comment="libreoffice-filters-optional-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520710" comment="libreoffice-gnome-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520711" comment="libreoffice-gtk2-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520712" comment="libreoffice-icon-themes-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520713" comment="libreoffice-impress-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520714" comment="libreoffice-l10n-af-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520715" comment="libreoffice-l10n-ar-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520716" comment="libreoffice-l10n-ca-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520717" comment="libreoffice-l10n-cs-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520718" comment="libreoffice-l10n-da-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520719" comment="libreoffice-l10n-de-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520720" comment="libreoffice-l10n-en-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520721" comment="libreoffice-l10n-es-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520722" comment="libreoffice-l10n-fi-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520723" comment="libreoffice-l10n-fr-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520724" comment="libreoffice-l10n-gu-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520725" comment="libreoffice-l10n-hi-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520726" comment="libreoffice-l10n-hu-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520727" comment="libreoffice-l10n-it-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520728" comment="libreoffice-l10n-ja-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520729" comment="libreoffice-l10n-ko-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520730" comment="libreoffice-l10n-nb-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520731" comment="libreoffice-l10n-nl-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520732" comment="libreoffice-l10n-nn-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520733" comment="libreoffice-l10n-pl-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520734" comment="libreoffice-l10n-pt_BR-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520735" comment="libreoffice-l10n-pt_PT-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520736" comment="libreoffice-l10n-ro-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520737" comment="libreoffice-l10n-ru-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520738" comment="libreoffice-l10n-sk-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520739" comment="libreoffice-l10n-sv-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520740" comment="libreoffice-l10n-xh-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520741" comment="libreoffice-l10n-zh_CN-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520742" comment="libreoffice-l10n-zh_TW-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520743" comment="libreoffice-l10n-zu-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520744" comment="libreoffice-mailmerge-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520745" comment="libreoffice-math-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520746" comment="libreoffice-officebean-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520747" comment="libreoffice-pyuno-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520748" comment="libreoffice-writer-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520749" comment="libreoffice-writer-extensions-6.0.3.2-43.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520750" comment="libstaroffice-0_0-0-0.0.5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520751" comment="libwps-0_4-4-0.4.7-10.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520752" comment="myspell-af_NA-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520753" comment="myspell-af_ZA-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520754" comment="myspell-ar-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520755" comment="myspell-ar_AE-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520756" comment="myspell-ar_BH-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520757" comment="myspell-ar_DZ-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520758" comment="myspell-ar_EG-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520759" comment="myspell-ar_IQ-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520760" comment="myspell-ar_JO-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520761" comment="myspell-ar_KW-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520762" comment="myspell-ar_LB-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520763" comment="myspell-ar_LY-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520764" comment="myspell-ar_MA-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520765" comment="myspell-ar_OM-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520766" comment="myspell-ar_QA-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520767" comment="myspell-ar_SA-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520768" comment="myspell-ar_SD-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520769" comment="myspell-ar_SY-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520770" comment="myspell-ar_TN-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520771" comment="myspell-ar_YE-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520772" comment="myspell-be_BY-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520773" comment="myspell-bg_BG-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520774" comment="myspell-bn_BD-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520775" comment="myspell-bn_IN-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520776" comment="myspell-bs-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520777" comment="myspell-bs_BA-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520778" comment="myspell-ca-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520779" comment="myspell-ca_AD-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520780" comment="myspell-ca_ES-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520781" comment="myspell-ca_ES_valencia-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520782" comment="myspell-ca_FR-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520783" comment="myspell-ca_IT-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520784" comment="myspell-cs_CZ-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520785" comment="myspell-da_DK-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520786" comment="myspell-de-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520787" comment="myspell-de_AT-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520788" comment="myspell-de_CH-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520789" comment="myspell-de_DE-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520790" comment="myspell-dictionaries-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520791" comment="myspell-el_GR-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520792" comment="myspell-en-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520793" comment="myspell-en_AU-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520794" comment="myspell-en_BS-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520795" comment="myspell-en_BZ-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520796" comment="myspell-en_CA-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520797" comment="myspell-en_GB-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520798" comment="myspell-en_GH-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520799" comment="myspell-en_IE-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520800" comment="myspell-en_IN-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520801" comment="myspell-en_JM-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520802" comment="myspell-en_MW-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520803" comment="myspell-en_NA-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520804" comment="myspell-en_NZ-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520805" comment="myspell-en_PH-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520806" comment="myspell-en_TT-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520807" comment="myspell-en_US-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520808" comment="myspell-en_ZA-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520809" comment="myspell-en_ZW-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520810" comment="myspell-es-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520811" comment="myspell-es_AR-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520812" comment="myspell-es_BO-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520813" comment="myspell-es_CL-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520814" comment="myspell-es_CO-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520815" comment="myspell-es_CR-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520816" comment="myspell-es_CU-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520817" comment="myspell-es_DO-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520818" comment="myspell-es_EC-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520819" comment="myspell-es_ES-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520820" comment="myspell-es_GT-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520821" comment="myspell-es_HN-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520822" comment="myspell-es_MX-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520823" comment="myspell-es_NI-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520824" comment="myspell-es_PA-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520825" comment="myspell-es_PE-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520826" comment="myspell-es_PR-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520827" comment="myspell-es_PY-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520828" comment="myspell-es_SV-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520829" comment="myspell-es_UY-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520830" comment="myspell-es_VE-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520831" comment="myspell-et_EE-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520832" comment="myspell-fr_BE-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520833" comment="myspell-fr_CA-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520834" comment="myspell-fr_CH-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520835" comment="myspell-fr_FR-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520836" comment="myspell-fr_LU-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520837" comment="myspell-fr_MC-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520838" comment="myspell-gu_IN-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520839" comment="myspell-he_IL-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520840" comment="myspell-hi_IN-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520841" comment="myspell-hr_HR-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520842" comment="myspell-hu_HU-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520843" comment="myspell-id-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520844" comment="myspell-id_ID-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520845" comment="myspell-it_IT-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520846" comment="myspell-lightproof-en-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520847" comment="myspell-lightproof-hu_HU-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520848" comment="myspell-lightproof-pt_BR-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520849" comment="myspell-lightproof-ru_RU-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520850" comment="myspell-lo_LA-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520851" comment="myspell-lt_LT-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520852" comment="myspell-lv_LV-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520853" comment="myspell-nb_NO-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520854" comment="myspell-nl_BE-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520855" comment="myspell-nl_NL-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520856" comment="myspell-nn_NO-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520857" comment="myspell-no-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520858" comment="myspell-pl_PL-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520859" comment="myspell-pt_AO-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520860" comment="myspell-pt_BR-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520861" comment="myspell-pt_PT-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520862" comment="myspell-ro-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520863" comment="myspell-ro_RO-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520864" comment="myspell-ru_RU-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520865" comment="myspell-sk_SK-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520866" comment="myspell-sl_SI-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520867" comment="myspell-sr-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520868" comment="myspell-sr_CS-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520869" comment="myspell-sr_Latn_CS-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520870" comment="myspell-sr_Latn_RS-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520871" comment="myspell-sr_RS-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520872" comment="myspell-sv_FI-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520873" comment="myspell-sv_SE-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520874" comment="myspell-te-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520875" comment="myspell-te_IN-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520876" comment="myspell-th_TH-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520877" comment="myspell-uk_UA-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520878" comment="myspell-vi-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520879" comment="myspell-vi_VN-20180403-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520880" comment="myspell-zu_ZA-20180403-16.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78508" version="1" class="patch">
	<metadata>
		<title>Security update for patch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1080918" ref_url="https://bugzilla.suse.com/1080918" source="BUGZILLA"/>
		<reference ref_id="1080951" ref_url="https://bugzilla.suse.com/1080951" source="BUGZILLA"/>
		<reference ref_id="1088420" ref_url="https://bugzilla.suse.com/1088420" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10713" ref_url="https://www.suse.com/security/cve/CVE-2016-10713/" source="CVE"/>
		<reference ref_id="CVE-2018-1000156" ref_url="https://www.suse.com/security/cve/CVE-2018-1000156/" source="CVE"/>
		<reference ref_id="CVE-2018-6951" ref_url="https://www.suse.com/security/cve/CVE-2018-6951/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00001.html" source="SUSE-SU"/>
		<description>
This update for patch fixes the following issues:

Security issues fixed:

- CVE-2018-1000156: Malicious patch files cause ed to execute arbitrary commands (bsc#1088420).
- CVE-2018-6951: Fixed NULL pointer dereference in the intuit_diff_type function in pch.c (bsc#1080918).
- CVE-2016-10713: Fixed out-of-bounds access within pch_write_line() in pch.c (bsc#1080918).

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-02"/>
	<updated date="2018-05-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1080918">SUSE bug 1080918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080951">SUSE bug 1080951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088420">SUSE bug 1088420</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10713/">CVE-2016-10713</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000156/">CVE-2018-1000156</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6951/">CVE-2018-6951</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520881" comment="patch-2.7.5-8.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78509" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

- Add microcode_amd_fam17h.bin (bsc#1068032 CVE-2017-5715)

This new firmware disables branch prediction on AMD family 17h
processor to mitigate a attack on the branch predictor that could
lead to information disclosure from e.g. kernel memory (bsc#1068032
CVE-2017-5715).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519174" comment="kernel-firmware-20170530-21.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519175" comment="ucode-amd-20170530-21.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78510" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1047356" ref_url="https://bugzilla.suse.com/1047356" source="BUGZILLA"/>
		<reference ref_id="1058635" ref_url="https://bugzilla.suse.com/1058635" source="BUGZILLA"/>
		<reference ref_id="1074117" ref_url="https://bugzilla.suse.com/1074117" source="BUGZILLA"/>
		<reference ref_id="1086773" ref_url="https://bugzilla.suse.com/1086773" source="BUGZILLA"/>
		<reference ref_id="1086782" ref_url="https://bugzilla.suse.com/1086782" source="BUGZILLA"/>
		<reference ref_id="1087027" ref_url="https://bugzilla.suse.com/1087027" source="BUGZILLA"/>
		<reference ref_id="1087033" ref_url="https://bugzilla.suse.com/1087033" source="BUGZILLA"/>
		<reference ref_id="1087037" ref_url="https://bugzilla.suse.com/1087037" source="BUGZILLA"/>
		<reference ref_id="1087039" ref_url="https://bugzilla.suse.com/1087039" source="BUGZILLA"/>
		<reference ref_id="1087825" ref_url="https://bugzilla.suse.com/1087825" source="BUGZILLA"/>
		<reference ref_id="1089781" ref_url="https://bugzilla.suse.com/1089781" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000476" ref_url="https://www.suse.com/security/cve/CVE-2017-1000476/" source="CVE"/>
		<reference ref_id="CVE-2017-10928" ref_url="https://www.suse.com/security/cve/CVE-2017-10928/" source="CVE"/>
		<reference ref_id="CVE-2017-11450" ref_url="https://www.suse.com/security/cve/CVE-2017-11450/" source="CVE"/>
		<reference ref_id="CVE-2017-14325" ref_url="https://www.suse.com/security/cve/CVE-2017-14325/" source="CVE"/>
		<reference ref_id="CVE-2017-17887" ref_url="https://www.suse.com/security/cve/CVE-2017-17887/" source="CVE"/>
		<reference ref_id="CVE-2017-18250" ref_url="https://www.suse.com/security/cve/CVE-2017-18250/" source="CVE"/>
		<reference ref_id="CVE-2017-18251" ref_url="https://www.suse.com/security/cve/CVE-2017-18251/" source="CVE"/>
		<reference ref_id="CVE-2017-18252" ref_url="https://www.suse.com/security/cve/CVE-2017-18252/" source="CVE"/>
		<reference ref_id="CVE-2017-18254" ref_url="https://www.suse.com/security/cve/CVE-2017-18254/" source="CVE"/>
		<reference ref_id="CVE-2018-10177" ref_url="https://www.suse.com/security/cve/CVE-2018-10177/" source="CVE"/>
		<reference ref_id="CVE-2018-8960" ref_url="https://www.suse.com/security/cve/CVE-2018-8960/" source="CVE"/>
		<reference ref_id="CVE-2018-9018" ref_url="https://www.suse.com/security/cve/CVE-2018-9018/" source="CVE"/>
		<reference ref_id="CVE-2018-9135" ref_url="https://www.suse.com/security/cve/CVE-2018-9135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003983.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2017-14325: In ImageMagick, a memory leak vulnerability was found in
  the function PersistPixelCache in magick/cache.c, which allowed attackers
  to cause a denial of service (memory consumption in ReadMPCImage in
  coders/mpc.c) via a crafted file.  [bsc#1058635]
- CVE-2017-17887: In ImageMagick, a memory leak vulnerability was found
  in the function GetImagePixelCache in magick/cache.c, which allowed
  attackers to cause a denial of service via a crafted MNG image file that
  is processed by ReadOneMNGImage.  [bsc#1074117]
- CVE-2017-18250: A NULL pointer dereference vulnerability was found in the function 
  LogOpenCLBuildFailure in MagickCore/opencl.c, which could lead to a denial of service 
  via a crafted file. [bsc#1087039]
- CVE-2017-18251: A memory leak vulnerability was found in the function ReadPCDImage in coders/pcd.c, 
  which could lead to a denial of service via a crafted file. [bsc#1087037]
- CVE-2017-18252: The MogrifyImageList function in MagickWand/mogrify.c could allow 
  attackers to cause a denial of service via a crafted file. [bsc#1087033]
- CVE-2017-18254: A memory leak vulnerability was found in the function WriteGIFImage in coders/gif.c, 
  which could lead to  denial of service via a crafted file. [bsc#1087027]
- CVE-2018-8960: The ReadTIFFImage function in coders/tiff.c in
  ImageMagick did not properly restrict memory allocation, leading to a
  heap-based buffer over-read.  [bsc#1086782]
- CVE-2018-9018: divide-by-zero in the ReadMNGImage function of coders/png.c. 
  Attackers could leverage this vulnerability to cause a crash and denial of service 
  via a crafted mng file. [bsc#1086773]
- CVE-2018-9135: heap-based buffer over-read in IsWEBPImageLossless in coders/webp.c 
  could lead to denial of service. [bsc#1087825]
- CVE-2018-10177: In ImageMagick, there was an infinite loop in the
  ReadOneMNGImage function of the coders/png.c file. Remote attackers
  could leverage this vulnerability to cause a denial of service via a
  crafted mng file.  [bsc#1089781]
- CVE-2017-10928: a heap-based buffer over-read in the GetNextToken function in token.c 
  could allow attackers to obtain sensitive information from process memory or possibly have 
  unspecified other impact via a crafted SVG document that is mishandled in the 
  GetUserSpaceCoordinateValue function in coders/svg.c. [bsc#1047356]

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-09"/>
	<updated date="2018-05-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047356">SUSE bug 1047356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058635">SUSE bug 1058635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074117">SUSE bug 1074117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086773">SUSE bug 1086773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086782">SUSE bug 1086782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087027">SUSE bug 1087027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087033">SUSE bug 1087033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087037">SUSE bug 1087037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087039">SUSE bug 1087039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087825">SUSE bug 1087825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089781">SUSE bug 1089781</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000476/">CVE-2017-1000476</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10928/">CVE-2017-10928</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11450/">CVE-2017-11450</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14325/">CVE-2017-14325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17887/">CVE-2017-17887</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18250/">CVE-2017-18250</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18251/">CVE-2017-18251</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18252/">CVE-2017-18252</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18254/">CVE-2017-18254</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10177/">CVE-2018-10177</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8960/">CVE-2018-8960</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9018/">CVE-2018-9018</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-9135/">CVE-2018-9135</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520882" comment="ImageMagick-6.8.8.1-71.54.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520883" comment="libMagick++-6_Q16-3-6.8.8.1-71.54.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520884" comment="libMagickCore-6_Q16-1-6.8.8.1-71.54.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520885" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.54.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520886" comment="libMagickWand-6_Q16-1-6.8.8.1-71.54.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78511" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1046077" ref_url="https://bugzilla.suse.com/1046077" source="BUGZILLA"/>
		<reference ref_id="1074318" ref_url="https://bugzilla.suse.com/1074318" source="BUGZILLA"/>
		<reference ref_id="1081690" ref_url="https://bugzilla.suse.com/1081690" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17973" ref_url="https://www.suse.com/security/cve/CVE-2017-17973/" source="CVE"/>
		<reference ref_id="CVE-2017-9935" ref_url="https://www.suse.com/security/cve/CVE-2017-9935/" source="CVE"/>
		<reference ref_id="CVE-2018-5784" ref_url="https://www.suse.com/security/cve/CVE-2018-5784/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003985.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2017-9935: There was a heap-based buffer overflow in the t2p_write_pdf function in tools/tiff2pdf.c. This heap overflow could lead to different damages. For example, a crafted TIFF document can lead to an out-of-bounds read in TIFFCleanup, an invalid free in TIFFClose or t2p_free, memory corruption in t2p_readwrite_pdf_image, or a double free in t2p_free. Given these possibilities, it probably could cause arbitrary code execution (bsc#1046077)
- CVE-2017-17973: There is a heap-based use-after-free in the t2p_writeproc function in tiff2pdf.c. (bsc#1074318)
- CVE-2018-5784: There is an uncontrolled resource consumption in the TIFFSetDirectory function of tif_dir.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted tif file. This occurs because the declared number of directory entries is not validated against the actual number of directory entries (bsc#1081690)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-09"/>
	<updated date="2018-05-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046077">SUSE bug 1046077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074318">SUSE bug 1074318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081690">SUSE bug 1081690</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17973/">CVE-2017-17973</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9935/">CVE-2017-9935</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5784/">CVE-2018-5784</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520887" comment="libtiff5-4.0.9-44.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520888" comment="libtiff5-32bit-4.0.9-44.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78512" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1072834" ref_url="https://bugzilla.suse.com/1072834" source="BUGZILLA"/>
		<reference ref_id="1080634" ref_url="https://bugzilla.suse.com/1080634" source="BUGZILLA"/>
		<reference ref_id="1080635" ref_url="https://bugzilla.suse.com/1080635" source="BUGZILLA"/>
		<reference ref_id="1080662" ref_url="https://bugzilla.suse.com/1080662" source="BUGZILLA"/>
		<reference ref_id="1087251" ref_url="https://bugzilla.suse.com/1087251" source="BUGZILLA"/>
		<reference ref_id="1087252" ref_url="https://bugzilla.suse.com/1087252" source="BUGZILLA"/>
		<reference ref_id="1089152" ref_url="https://bugzilla.suse.com/1089152" source="BUGZILLA"/>
		<reference ref_id="1089635" ref_url="https://bugzilla.suse.com/1089635" source="BUGZILLA"/>
		<reference ref_id="1090820" ref_url="https://bugzilla.suse.com/1090820" source="BUGZILLA"/>
		<reference ref_id="1090822" ref_url="https://bugzilla.suse.com/1090822" source="BUGZILLA"/>
		<reference ref_id="1090823" ref_url="https://bugzilla.suse.com/1090823" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10471" ref_url="https://www.suse.com/security/cve/CVE-2018-10471/" source="CVE"/>
		<reference ref_id="CVE-2018-10472" ref_url="https://www.suse.com/security/cve/CVE-2018-10472/" source="CVE"/>
		<reference ref_id="CVE-2018-7540" ref_url="https://www.suse.com/security/cve/CVE-2018-7540/" source="CVE"/>
		<reference ref_id="CVE-2018-7541" ref_url="https://www.suse.com/security/cve/CVE-2018-7541/" source="CVE"/>
		<reference ref_id="CVE-2018-7542" ref_url="https://www.suse.com/security/cve/CVE-2018-7542/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00013.html" source="SUSE-SU"/>
		<description>
This update for xen to version 4.9.2 fixes several issues.

This feature was added:

- Added script, udev rule and systemd service to watch for vcpu online/offline
  events in a HVM domU. They are triggered via 'xl vcpu-set domU N'

These security issues were fixed:

- CVE-2018-8897: Prevent mishandling of debug exceptions on x86 (XSA-260, bsc#1090820)
- Handle HPET timers in IO-APIC mode correctly to prevent malicious or buggy
  HVM guests from causing a hypervisor crash or potentially privilege
  escalation/information leaks (XSA-261, bsc#1090822)
- Prevent unbounded loop, induced by qemu allowing an attacker to permanently
  keep a physical CPU core busy (XSA-262, bsc#1090823)
- CVE-2018-10472: x86 HVM guest OS users (in certain configurations) were able
  to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction
  with specifying the target file as the backing file of a snapshot
  (bsc#1089152).
- CVE-2018-10471: x86 PV guest OS users were able to cause a denial of service
  (out-of-bounds zero write and hypervisor crash) via unexpected INT 80
  processing, because of an incorrect fix for CVE-2017-5754 (bsc#1089635).
- CVE-2018-7540: x86 PV guest OS users were able to cause a denial of service
  (host OS CPU hang) via non-preemptable L3/L4 pagetable freeing (bsc#1080635).
- CVE-2018-7541: Guest OS users were able to cause a denial of service
  (hypervisor crash) or gain privileges by triggering a grant-table transition
  from v2 to v1 (bsc#1080662).
- CVE-2018-7542: x86 PVH guest OS users were able to cause a denial of service
  (NULL pointer dereference and hypervisor crash) by leveraging the mishandling
  of configurations that lack a Local APIC (bsc#1080634).

These non-security issues were fixed:

- bsc#1087252: Update built-in defaults for xenstored in stubdom, keep default
  to run xenstored as daemon in dom0
- bsc#1087251: Preserve xen-syms from xen-dbg.gz to allow processing vmcores
  with crash(1) 
- bsc#1072834: Prevent unchecked MSR access error
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-09"/>
	<updated date="2018-05-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072834">SUSE bug 1072834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080634">SUSE bug 1080634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080635">SUSE bug 1080635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080662">SUSE bug 1080662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087251">SUSE bug 1087251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087252">SUSE bug 1087252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089152">SUSE bug 1089152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089635">SUSE bug 1089635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090820">SUSE bug 1090820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090822">SUSE bug 1090822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090823">SUSE bug 1090823</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10471/">CVE-2018-10471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10472/">CVE-2018-10472</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7540/">CVE-2018-7540</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7541/">CVE-2018-7541</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7542/">CVE-2018-7542</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520889" comment="xen-4.9.2_04-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520890" comment="xen-libs-4.9.2_04-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520891" comment="xen-libs-32bit-4.9.2_04-3.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78513" version="1" class="patch">
	<metadata>
		<title>Security update for cairo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1049092" ref_url="https://bugzilla.suse.com/1049092" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9814" ref_url="https://www.suse.com/security/cve/CVE-2017-9814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003991.html" source="SUSE-SU"/>
		<description>
This update for cairo fixes the following issues:

  - CVE-2017-9814: out-of-bounds read in cairo-truetype-subset.c could lead to denial of service (bsc#1049092).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-09"/>
	<updated date="2018-05-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049092">SUSE bug 1049092</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9814/">CVE-2017-9814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520892" comment="libcairo-gobject2-1.15.2-25.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520893" comment="libcairo-gobject2-32bit-1.15.2-25.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520894" comment="libcairo-script-interpreter2-1.15.2-25.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520895" comment="libcairo2-1.15.2-25.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520896" comment="libcairo2-32bit-1.15.2-25.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78514" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1028842" ref_url="https://bugzilla.suse.com/1028842" source="BUGZILLA"/>
		<reference ref_id="1062063" ref_url="https://bugzilla.suse.com/1062063" source="BUGZILLA"/>
		<reference ref_id="1066644" ref_url="https://bugzilla.suse.com/1066644" source="BUGZILLA"/>
		<reference ref_id="1071459" ref_url="https://bugzilla.suse.com/1071459" source="BUGZILLA"/>
		<reference ref_id="1071460" ref_url="https://bugzilla.suse.com/1071460" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16548" ref_url="https://www.suse.com/security/cve/CVE-2017-16548/" source="CVE"/>
		<reference ref_id="CVE-2017-17433" ref_url="https://www.suse.com/security/cve/CVE-2017-17433/" source="CVE"/>
		<reference ref_id="CVE-2017-17434" ref_url="https://www.suse.com/security/cve/CVE-2017-17434/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003604.html" source="SUSE-SU"/>
		<description>
This update for rsync fixes several issues.

These security issues were fixed:

- CVE-2017-17434: The daemon in rsync did not check for fnamecmp filenames in
  the daemon_filter_list data structure (in the recv_files function in
  receiver.c) and also did not apply the sanitize_paths protection mechanism to
  pathnames found in 'xname follows' strings (in the read_ndx_and_attrs function
  in rsync.c), which allowed remote attackers to bypass intended access
  restrictions' (bsc#1071460).
- CVE-2017-17433: The recv_files function in receiver.c in the daemon in rsync,
  proceeded with certain file metadata updates before checking for a filename in
  the daemon_filter_list data structure, which allowed remote attackers to bypass
  intended access restrictions (bsc#1071459).
- CVE-2017-16548: The receive_xattr function in xattrs.c in rsync did not check
  for a trailing '\\0' character in an xattr name, which allowed remote attackers
  to cause a denial of service (heap-based buffer over-read and application
  crash) or possibly have unspecified other impact by sending crafted data to the
  daemon (bsc#1066644).

This non-security issue was fixed:

- Stop file upload after errors like a full disk (bsc#1062063)
- Ensure -X flag works even when setting owner/group (bsc#1028842)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-17"/>
	<updated date="2018-01-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1028842">SUSE bug 1028842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062063">SUSE bug 1062063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066644">SUSE bug 1066644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071459">SUSE bug 1071459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071460">SUSE bug 1071460</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16548/">CVE-2017-16548</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17433/">CVE-2017-17433</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17434/">CVE-2017-17434</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519176" comment="rsync-3.1.0-13.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78515" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1056127" ref_url="https://bugzilla.suse.com/1056127" source="BUGZILLA"/>
		<reference ref_id="1056128" ref_url="https://bugzilla.suse.com/1056128" source="BUGZILLA"/>
		<reference ref_id="1056129" ref_url="https://bugzilla.suse.com/1056129" source="BUGZILLA"/>
		<reference ref_id="1056131" ref_url="https://bugzilla.suse.com/1056131" source="BUGZILLA"/>
		<reference ref_id="1056132" ref_url="https://bugzilla.suse.com/1056132" source="BUGZILLA"/>
		<reference ref_id="1056136" ref_url="https://bugzilla.suse.com/1056136" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13728" ref_url="https://www.suse.com/security/cve/CVE-2017-13728/" source="CVE"/>
		<reference ref_id="CVE-2017-13729" ref_url="https://www.suse.com/security/cve/CVE-2017-13729/" source="CVE"/>
		<reference ref_id="CVE-2017-13730" ref_url="https://www.suse.com/security/cve/CVE-2017-13730/" source="CVE"/>
		<reference ref_id="CVE-2017-13731" ref_url="https://www.suse.com/security/cve/CVE-2017-13731/" source="CVE"/>
		<reference ref_id="CVE-2017-13732" ref_url="https://www.suse.com/security/cve/CVE-2017-13732/" source="CVE"/>
		<reference ref_id="CVE-2017-13733" ref_url="https://www.suse.com/security/cve/CVE-2017-13733/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003606.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:

- CVE-2017-13728: Fix infinite loop in the next_char function in comp_scan.c (bsc#1056136).
- CVE-2017-13730: Fix illegal address access in the function _nc_read_entry_source() (bsc#1056131).
- CVE-2017-13733: Fix illegal address access in the fmt_entry function (bsc#1056127).
- CVE-2017-13729: Fix illegal address access in the _nc_save_str (bsc#1056132).
- CVE-2017-13732: Fix illegal address access in the function dump_uses() (bsc#1056128).
- CVE-2017-13731: Fix illegal address access in the function postprocess_termcap() (bsc#1056129).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-17"/>
	<updated date="2018-01-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056127">SUSE bug 1056127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056128">SUSE bug 1056128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056129">SUSE bug 1056129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056131">SUSE bug 1056131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056132">SUSE bug 1056132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056136">SUSE bug 1056136</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13728/">CVE-2017-13728</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13729/">CVE-2017-13729</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13730/">CVE-2017-13730</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13731/">CVE-2017-13731</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13732/">CVE-2017-13732</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13733/">CVE-2017-13733</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519177" comment="libncurses5-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519178" comment="libncurses5-32bit-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519179" comment="libncurses6-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519180" comment="libncurses6-32bit-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519181" comment="ncurses-devel-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519182" comment="ncurses-utils-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519183" comment="tack-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519184" comment="terminfo-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519185" comment="terminfo-base-5.9-55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78516" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1069222" ref_url="https://bugzilla.suse.com/1069222" source="BUGZILLA"/>
		<reference ref_id="1069226" ref_url="https://bugzilla.suse.com/1069226" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8816" ref_url="https://www.suse.com/security/cve/CVE-2017-8816/" source="CVE"/>
		<reference ref_id="CVE-2017-8817" ref_url="https://www.suse.com/security/cve/CVE-2017-8817/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003607.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issues fixed:

- CVE-2017-8816: Buffer overrun flaw in the NTLM authentication code (bsc#1069226).
- CVE-2017-8817: Read out of bounds flaw in the FTP wildcard function (bsc#1069222).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-17"/>
	<updated date="2018-01-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1069222">SUSE bug 1069222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069226">SUSE bug 1069226</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8816/">CVE-2017-8816</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-8817/">CVE-2017-8817</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519186" comment="curl-7.37.0-37.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519187" comment="libcurl4-7.37.0-37.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519188" comment="libcurl4-32bit-7.37.0-37.11.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78517" version="1" class="patch">
	<metadata>
		<title>Security update for perl-XML-LibXML (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1046848" ref_url="https://bugzilla.suse.com/1046848" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10672" ref_url="https://www.suse.com/security/cve/CVE-2017-10672/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003608.html" source="SUSE-SU"/>
		<description>
This update for perl-XML-LibXML fixes the following issues:

Security issue fixed:

- CVE-2017-10672: Fix use-after-free that allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call (bsc#1046848).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-17"/>
	<updated date="2018-01-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046848">SUSE bug 1046848</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-10672/">CVE-2017-10672</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519189" comment="perl-XML-LibXML-2.0019-6.3.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78518" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1052825" ref_url="https://bugzilla.suse.com/1052825" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html" source="SUSE-SU"/>
		<description>

  
This update for qemu fixes the following issues:

A new feature was added:

- Support EPYC vCPU type (bsc#1052825 fate#324038)

Also a mitigation for a security problem has been applied:

- CVE-2017-5715: QEMU was updated to allow passing through new MSR and CPUID flags from 
  the host VM to the CPU, to allow enabling/disabling branch prediction features in the
  Intel CPU. (bsc#1068032)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1052825">SUSE bug 1052825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520897" comment="qemu-2.9.1-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520898" comment="qemu-block-curl-2.9.1-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520899" comment="qemu-ipxe-1.0.0-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520900" comment="qemu-kvm-2.9.1-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520901" comment="qemu-seabios-1.10.2-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520902" comment="qemu-sgabios-8-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520903" comment="qemu-tools-2.9.1-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520904" comment="qemu-vgabios-1.10.2-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520905" comment="qemu-x86-2.9.1-6.9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78519" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1083232" ref_url="https://bugzilla.suse.com/1083232" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000041" ref_url="https://www.suse.com/security/cve/CVE-2018-1000041/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004049.html" source="SUSE-SU"/>
		<description>
This update for librsvg fixes the following issues:

- CVE-2018-1000041: Input validation issue could lead to credentials leak. (bsc#1083232)

Update to version 2.40.20:

  + Except for emergencies, this will be the LAST RELEASE of the
    librsvg-2.40.x series.  We are moving to 2.41, which is vastly
    improved over the 2.40 series.  The API/ABI there remain unchaged,
    so we strongly encourage you to upgrade your sources and binaries to
    librsvg-2.41.x.
  + bgo#761175 - Allow masks and clips to reuse a node being drawn.
  + Don't access the file system when deciding whether to load a remote
    file with a UNC path for a paint server (i.e. don't try to load it at all).
  + Vistual Studio: fixed and integrated introspection builds, so
    introspection data is built directly from the Visual Studio project
    (Chun-wei Fan).
  + Visual Studio: We now use HIGHENTROPYVA linker option on x64 builds,
    to enhance the security of built binaries (Chun-wei Fan).
  + Fix generation of Vala bindings when compiling in read-only source
    directories (Emmanuele Bassi).

Update to version 2.40.19:

  + bgo#621088: Using text objects as clipping paths is now supported.
  + bgo#587721: Fix rendering of text elements with transformations (Massimo).
  + bgo#777833 - Fix memory leaks when an RsvgHandle is disposed before
    being closed (Philip Withnall).
  + bgo#782098 - Don't pass deprecated options to gtk-doc (Ting-Wei Lan).
  + bgo#786372 - Fix the default for the 'type' attribute of the &lt;style&gt; element.
  + bgo#785276 - Don't crash on single-byte files.
  + bgo#634514: Don't render unknown elements and their sub-elements.
  + bgo#777155 - Ignore patterns that have close-to-zero dimensions.
  + bgo#634324 - Fix Gaussian blurs with negative scaling.
  + Fix the &lt;switch&gt; element; it wasn't working at all.
  + Fix loading when rsvg_handle_write() is called one byte at a time.
  + bgo#787895 - Fix incorrect usage of libxml2.  Thanks to Nick Wellnhofer
    for advice on this.
  + Backported the test suite machinery from the master branch (Chun-wei Fan,
    Federico Mena).
  + We now require Pango 1.38.0 or later (released in 2015).
  + We now require libxml2 2.9.0 or later (released in 2012).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-15"/>
	<updated date="2018-05-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083232">SUSE bug 1083232</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000041/">CVE-2018-1000041</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520906" comment="gdk-pixbuf-loader-rsvg-2.40.20-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520907" comment="librsvg-2-2-2.40.20-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520908" comment="librsvg-2-2-32bit-2.40.20-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520909" comment="rsvg-view-2.40.20-5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78520" version="1" class="patch">
	<metadata>
		<title>Security update for libreoffice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1089705" ref_url="https://bugzilla.suse.com/1089705" source="BUGZILLA"/>
		<reference ref_id="1089706" ref_url="https://bugzilla.suse.com/1089706" source="BUGZILLA"/>
		<reference ref_id="1090737" ref_url="https://bugzilla.suse.com/1090737" source="BUGZILLA"/>
		<reference ref_id="1091772" ref_url="https://bugzilla.suse.com/1091772" source="BUGZILLA"/>
		<reference ref_id="915996" ref_url="https://bugzilla.suse.com/915996" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10119" ref_url="https://www.suse.com/security/cve/CVE-2018-10119/" source="CVE"/>
		<reference ref_id="CVE-2018-10120" ref_url="https://www.suse.com/security/cve/CVE-2018-10120/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004053.html" source="SUSE-SU"/>
		<description>


This update for libreoffice to 6.0.4.2 fixes lots of bugs and also the following issues:

Security issues fixed:

- CVE-2018-10120: The SwCTBWrapper::Read function in sw/source/filter/ww8/ww8toolbar.cxx did not validate a customizations index, which allowed remote attackers to cause a denial of service (heap-based buffer overflow with write access) or possibly have unspecified other impact via a crafted document that contains a certain Microsoft Word record. (bsc#1089706)
- CVE-2018-10119: sot/source/sdstor/stgstrms.cxx used an incorrect integer data type in the StgSmallStrm class, which allowed remote attackers to cause a denial of service (use-after-free with write access) or possibly have unspecified other impact via a crafted document that uses the structured storage ole2 wrapper file format.  (bsc#1089705)

Other issues fixed:

- DOCX import: missing table background color
- Bring back offline help per popular demand as lto saves space
  we could use with it bsc#915996

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-15"/>
	<updated date="2018-05-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089705">SUSE bug 1089705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089706">SUSE bug 1089706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090737">SUSE bug 1090737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091772">SUSE bug 1091772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915996">SUSE bug 915996</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10119/">CVE-2018-10119</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10120/">CVE-2018-10120</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520910" comment="libreoffice-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520911" comment="libreoffice-base-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520912" comment="libreoffice-base-drivers-mysql-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520913" comment="libreoffice-base-drivers-postgresql-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520914" comment="libreoffice-branding-upstream-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520915" comment="libreoffice-calc-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520916" comment="libreoffice-calc-extensions-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520917" comment="libreoffice-draw-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520918" comment="libreoffice-filters-optional-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520919" comment="libreoffice-gnome-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520920" comment="libreoffice-gtk2-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520921" comment="libreoffice-icon-themes-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520922" comment="libreoffice-impress-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520923" comment="libreoffice-l10n-af-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520924" comment="libreoffice-l10n-ar-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520925" comment="libreoffice-l10n-ca-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520926" comment="libreoffice-l10n-cs-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520927" comment="libreoffice-l10n-da-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520928" comment="libreoffice-l10n-de-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520929" comment="libreoffice-l10n-en-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520930" comment="libreoffice-l10n-es-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520931" comment="libreoffice-l10n-fi-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520932" comment="libreoffice-l10n-fr-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520933" comment="libreoffice-l10n-gu-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520934" comment="libreoffice-l10n-hi-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520935" comment="libreoffice-l10n-hu-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520936" comment="libreoffice-l10n-it-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520937" comment="libreoffice-l10n-ja-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520938" comment="libreoffice-l10n-ko-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520939" comment="libreoffice-l10n-nb-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520940" comment="libreoffice-l10n-nl-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520941" comment="libreoffice-l10n-nn-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520942" comment="libreoffice-l10n-pl-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520943" comment="libreoffice-l10n-pt_BR-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520944" comment="libreoffice-l10n-pt_PT-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520945" comment="libreoffice-l10n-ro-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520946" comment="libreoffice-l10n-ru-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520947" comment="libreoffice-l10n-sk-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520948" comment="libreoffice-l10n-sv-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520949" comment="libreoffice-l10n-xh-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520950" comment="libreoffice-l10n-zh_CN-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520951" comment="libreoffice-l10n-zh_TW-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520952" comment="libreoffice-l10n-zu-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520953" comment="libreoffice-mailmerge-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520954" comment="libreoffice-math-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520955" comment="libreoffice-officebean-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520956" comment="libreoffice-pyuno-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520957" comment="libreoffice-writer-6.0.4.2-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520958" comment="libreoffice-writer-extensions-6.0.4.2-43.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78521" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1059812" ref_url="https://bugzilla.suse.com/1059812" source="BUGZILLA"/>
		<reference ref_id="1091072" ref_url="https://bugzilla.suse.com/1091072" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14160" ref_url="https://www.suse.com/security/cve/CVE-2017-14160/" source="CVE"/>
		<reference ref_id="CVE-2018-10393" ref_url="https://www.suse.com/security/cve/CVE-2018-10393/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004060.html" source="SUSE-SU"/>
		<description>
This update for libvorbis fixes the following issues:

Security issues fixed:

- CVE-2018-10393: Fixed stack-based buffer over-read in bark_noise_hybridm (bsc#1091072).
- CVE-2017-14160: Fixed out-of-bounds access inside bark_noise_hybridmp function (bsc#1059812).

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1059812">SUSE bug 1059812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091072">SUSE bug 1091072</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14160/">CVE-2017-14160</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10393/">CVE-2018-10393</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520959" comment="libvorbis0-1.3.3-10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520960" comment="libvorbis0-32bit-1.3.3-10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520961" comment="libvorbisenc2-1.3.3-10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520962" comment="libvorbisenc2-32bit-1.3.3-10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520963" comment="libvorbisfile3-1.3.3-10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520964" comment="libvorbisfile3-32bit-1.3.3-10.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78522" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1086825" ref_url="https://bugzilla.suse.com/1086825" source="BUGZILLA"/>
		<reference ref_id="1092098" ref_url="https://bugzilla.suse.com/1092098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000301" ref_url="https://www.suse.com/security/cve/CVE-2018-1000301/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004062.html" source="SUSE-SU"/>
		<description>
This update for curl fixes several issues:

Security issues fixed:

- CVE-2018-1000301: Fixed a RTSP bad headers buffer over-read could crash the curl client (bsc#1092098)

Non security issues fixed:

- If the DEFAULT_SUSE cipher list is not available use the HIGH cipher alias before failing.
  (bsc#1086825)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-17"/>
	<updated date="2018-05-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086825">SUSE bug 1086825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092098">SUSE bug 1092098</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000301/">CVE-2018-1000301</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520965" comment="curl-7.37.0-37.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520966" comment="libcurl4-7.37.0-37.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520967" comment="libcurl4-32bit-7.37.0-37.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78523" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1090099" ref_url="https://bugzilla.suse.com/1090099" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10194" ref_url="https://www.suse.com/security/cve/CVE-2018-10194/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004063.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

- CVE-2018-10194: A stack-based buffer overflow was fixed in gdevpdts.c (bsc#1090099)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-18"/>
	<updated date="2018-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1090099">SUSE bug 1090099</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10194/">CVE-2018-10194</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520968" comment="ghostscript-9.15-23.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520969" comment="ghostscript-x11-9.15-23.10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78524" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1092548" ref_url="https://bugzilla.suse.com/1092548" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157/" source="CVE"/>
		<reference ref_id="CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to the ESR 52.8 release fixes the following issues:

Mozil to Firefox ESR 52.8 (bsc#1092548)

Security issues fixed:

- MFSA 2018-12/CVE-2018-5159: Integer overflow and out-of-bounds write in Skia
- MFSA 2018-12/CVE-2018-5158: Malicious PDF can inject JavaScript into PDF Viewer
- MFSA 2018-12/CVE-2018-5168: Lightweight themes can be installed without user interaction
- MFSA 2018-12/CVE-2018-5150: Memory safety bugs fixed in Firefox 60 and Firefox ESR 52.8
- MFSA 2018-12/CVE-2018-5155: Use-after-free with SVG animations and text paths
- MFSA 2018-12/CVE-2018-5183: Backport critical security fixes in Skia
- MFSA 2018-12/CVE-2018-5157: Same-origin bypass of PDF Viewer to view protected PDF files
- MFSA 2018-12/CVE-2018-5154: Use-after-free with SVG animations and clip paths
- MFSA 2018-12/CVE-2018-5178: Buffer overflow during UTF-8 to Unicode string conversion through legacy extension
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-18"/>
	<updated date="2018-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520970" comment="MozillaFirefox-52.8.0esr-109.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520971" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78525" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1066713" ref_url="https://bugzilla.suse.com/1066713" source="BUGZILLA"/>
		<reference ref_id="1072124" ref_url="https://bugzilla.suse.com/1072124" source="BUGZILLA"/>
		<reference ref_id="1072125" ref_url="https://bugzilla.suse.com/1072125" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1239" ref_url="https://www.suse.com/security/cve/CVE-2015-1239/" source="CVE"/>
		<reference ref_id="CVE-2017-17479" ref_url="https://www.suse.com/security/cve/CVE-2017-17479/" source="CVE"/>
		<reference ref_id="CVE-2017-17480" ref_url="https://www.suse.com/security/cve/CVE-2017-17480/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004068.html" source="SUSE-SU"/>
		<description>
This update for openjpeg2 fixes the following security issues:

- CVE-2015-1239: A double free vulnerability in the j2k_read_ppm_v3 function allowed remote attackers to cause a denial of service (crash) (bsc#1066713)
- CVE-2017-17479: A stack-based buffer overflow in the pgxtoimage function in jpwl/convert.c could crash the converter. (bsc#1072125)
- CVE-2017-17480: A stack-based buffer overflow in the pgxtovolume function in jp3d/convert.c could crash the converter. (bsc#1072124)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1066713">SUSE bug 1066713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072124">SUSE bug 1072124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072125">SUSE bug 1072125</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-1239/">CVE-2015-1239</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17479/">CVE-2017-17479</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17480/">CVE-2017-17480</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520972" comment="libopenjp2-7-2.1.0-4.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78526" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1070615" ref_url="https://bugzilla.suse.com/1070615" source="BUGZILLA"/>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004080.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes several issues.

This security issue was fixed:

- CVE-2018-3639: Spectre v4 vulnerability mitigation support for KVM guests (bsc#1092885).

  Systems with microprocessors utilizing speculative execution and speculative
  execution of memory reads before the addresses of all prior memory writes are
  known may allow unauthorized disclosure of information to an attacker with
  local user access via a side-channel analysis.

  This patch permits the new x86 cpu feature flag named 'ssbd' to be
  presented to the guest, given that the host has this feature, and
  KVM exposes it to the guest as well.

  For this feature to be enabled please use the qemu commandline
  -cpu $MODEL,+spec-ctrl,+ssbd
  so the guest OS can take advantage of the feature.

  spec-ctrl and ssbd support is also required in the host.

This non-security issue was fixed:

- bsc#1070615: Add new look up path 'sys/class/tpm' for tpm cancel path
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1070615">SUSE bug 1070615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520973" comment="qemu-2.9.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520974" comment="qemu-block-curl-2.9.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520975" comment="qemu-ipxe-1.0.0-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520976" comment="qemu-kvm-2.9.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520977" comment="qemu-seabios-1.10.2-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520978" comment="qemu-sgabios-8-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520979" comment="qemu-tools-2.9.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520980" comment="qemu-vgabios-1.10.2-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520981" comment="qemu-x86-2.9.1-6.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78527" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1005778" ref_url="https://bugzilla.suse.com/1005778" source="BUGZILLA"/>
		<reference ref_id="1005780" ref_url="https://bugzilla.suse.com/1005780" source="BUGZILLA"/>
		<reference ref_id="1005781" ref_url="https://bugzilla.suse.com/1005781" source="BUGZILLA"/>
		<reference ref_id="1009062" ref_url="https://bugzilla.suse.com/1009062" source="BUGZILLA"/>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1015336" ref_url="https://bugzilla.suse.com/1015336" source="BUGZILLA"/>
		<reference ref_id="1015337" ref_url="https://bugzilla.suse.com/1015337" source="BUGZILLA"/>
		<reference ref_id="1015340" ref_url="https://bugzilla.suse.com/1015340" source="BUGZILLA"/>
		<reference ref_id="1015342" ref_url="https://bugzilla.suse.com/1015342" source="BUGZILLA"/>
		<reference ref_id="1015343" ref_url="https://bugzilla.suse.com/1015343" source="BUGZILLA"/>
		<reference ref_id="1022604" ref_url="https://bugzilla.suse.com/1022604" source="BUGZILLA"/>
		<reference ref_id="1022743" ref_url="https://bugzilla.suse.com/1022743" source="BUGZILLA"/>
		<reference ref_id="1024296" ref_url="https://bugzilla.suse.com/1024296" source="BUGZILLA"/>
		<reference ref_id="1031492" ref_url="https://bugzilla.suse.com/1031492" source="BUGZILLA"/>
		<reference ref_id="1036215" ref_url="https://bugzilla.suse.com/1036215" source="BUGZILLA"/>
		<reference ref_id="1043598" ref_url="https://bugzilla.suse.com/1043598" source="BUGZILLA"/>
		<reference ref_id="1044596" ref_url="https://bugzilla.suse.com/1044596" source="BUGZILLA"/>
		<reference ref_id="1056415" ref_url="https://bugzilla.suse.com/1056415" source="BUGZILLA"/>
		<reference ref_id="1056427" ref_url="https://bugzilla.suse.com/1056427" source="BUGZILLA"/>
		<reference ref_id="1060799" ref_url="https://bugzilla.suse.com/1060799" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1075087" ref_url="https://bugzilla.suse.com/1075087" source="BUGZILLA"/>
		<reference ref_id="1075091" ref_url="https://bugzilla.suse.com/1075091" source="BUGZILLA"/>
		<reference ref_id="1075994" ref_url="https://bugzilla.suse.com/1075994" source="BUGZILLA"/>
		<reference ref_id="1076263" ref_url="https://bugzilla.suse.com/1076263" source="BUGZILLA"/>
		<reference ref_id="1080157" ref_url="https://bugzilla.suse.com/1080157" source="BUGZILLA"/>
		<reference ref_id="1082153" ref_url="https://bugzilla.suse.com/1082153" source="BUGZILLA"/>
		<reference ref_id="1082299" ref_url="https://bugzilla.suse.com/1082299" source="BUGZILLA"/>
		<reference ref_id="1082485" ref_url="https://bugzilla.suse.com/1082485" source="BUGZILLA"/>
		<reference ref_id="1082962" ref_url="https://bugzilla.suse.com/1082962" source="BUGZILLA"/>
		<reference ref_id="1083125" ref_url="https://bugzilla.suse.com/1083125" source="BUGZILLA"/>
		<reference ref_id="1083635" ref_url="https://bugzilla.suse.com/1083635" source="BUGZILLA"/>
		<reference ref_id="1083650" ref_url="https://bugzilla.suse.com/1083650" source="BUGZILLA"/>
		<reference ref_id="1083900" ref_url="https://bugzilla.suse.com/1083900" source="BUGZILLA"/>
		<reference ref_id="1084721" ref_url="https://bugzilla.suse.com/1084721" source="BUGZILLA"/>
		<reference ref_id="1085058" ref_url="https://bugzilla.suse.com/1085058" source="BUGZILLA"/>
		<reference ref_id="1085185" ref_url="https://bugzilla.suse.com/1085185" source="BUGZILLA"/>
		<reference ref_id="1085511" ref_url="https://bugzilla.suse.com/1085511" source="BUGZILLA"/>
		<reference ref_id="1085958" ref_url="https://bugzilla.suse.com/1085958" source="BUGZILLA"/>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1088242" ref_url="https://bugzilla.suse.com/1088242" source="BUGZILLA"/>
		<reference ref_id="1088865" ref_url="https://bugzilla.suse.com/1088865" source="BUGZILLA"/>
		<reference ref_id="1089023" ref_url="https://bugzilla.suse.com/1089023" source="BUGZILLA"/>
		<reference ref_id="1089115" ref_url="https://bugzilla.suse.com/1089115" source="BUGZILLA"/>
		<reference ref_id="1089198" ref_url="https://bugzilla.suse.com/1089198" source="BUGZILLA"/>
		<reference ref_id="1089393" ref_url="https://bugzilla.suse.com/1089393" source="BUGZILLA"/>
		<reference ref_id="1089608" ref_url="https://bugzilla.suse.com/1089608" source="BUGZILLA"/>
		<reference ref_id="1089644" ref_url="https://bugzilla.suse.com/1089644" source="BUGZILLA"/>
		<reference ref_id="1089752" ref_url="https://bugzilla.suse.com/1089752" source="BUGZILLA"/>
		<reference ref_id="1089895" ref_url="https://bugzilla.suse.com/1089895" source="BUGZILLA"/>
		<reference ref_id="1089925" ref_url="https://bugzilla.suse.com/1089925" source="BUGZILLA"/>
		<reference ref_id="1090225" ref_url="https://bugzilla.suse.com/1090225" source="BUGZILLA"/>
		<reference ref_id="1090643" ref_url="https://bugzilla.suse.com/1090643" source="BUGZILLA"/>
		<reference ref_id="1090658" ref_url="https://bugzilla.suse.com/1090658" source="BUGZILLA"/>
		<reference ref_id="1090663" ref_url="https://bugzilla.suse.com/1090663" source="BUGZILLA"/>
		<reference ref_id="1090708" ref_url="https://bugzilla.suse.com/1090708" source="BUGZILLA"/>
		<reference ref_id="1090718" ref_url="https://bugzilla.suse.com/1090718" source="BUGZILLA"/>
		<reference ref_id="1090734" ref_url="https://bugzilla.suse.com/1090734" source="BUGZILLA"/>
		<reference ref_id="1090953" ref_url="https://bugzilla.suse.com/1090953" source="BUGZILLA"/>
		<reference ref_id="1091041" ref_url="https://bugzilla.suse.com/1091041" source="BUGZILLA"/>
		<reference ref_id="1091325" ref_url="https://bugzilla.suse.com/1091325" source="BUGZILLA"/>
		<reference ref_id="1091728" ref_url="https://bugzilla.suse.com/1091728" source="BUGZILLA"/>
		<reference ref_id="1091925" ref_url="https://bugzilla.suse.com/1091925" source="BUGZILLA"/>
		<reference ref_id="1091960" ref_url="https://bugzilla.suse.com/1091960" source="BUGZILLA"/>
		<reference ref_id="1092289" ref_url="https://bugzilla.suse.com/1092289" source="BUGZILLA"/>
		<reference ref_id="1092497" ref_url="https://bugzilla.suse.com/1092497" source="BUGZILLA"/>
		<reference ref_id="1092566" ref_url="https://bugzilla.suse.com/1092566" source="BUGZILLA"/>
		<reference ref_id="1092904" ref_url="https://bugzilla.suse.com/1092904" source="BUGZILLA"/>
		<reference ref_id="1093008" ref_url="https://bugzilla.suse.com/1093008" source="BUGZILLA"/>
		<reference ref_id="1093144" ref_url="https://bugzilla.suse.com/1093144" source="BUGZILLA"/>
		<reference ref_id="1093215" ref_url="https://bugzilla.suse.com/1093215" source="BUGZILLA"/>
		<reference ref_id="1094019" ref_url="https://bugzilla.suse.com/1094019" source="BUGZILLA"/>
		<reference ref_id="802154" ref_url="https://bugzilla.suse.com/802154" source="BUGZILLA"/>
		<reference ref_id="966170" ref_url="https://bugzilla.suse.com/966170" source="BUGZILLA"/>
		<reference ref_id="966172" ref_url="https://bugzilla.suse.com/966172" source="BUGZILLA"/>
		<reference ref_id="966186" ref_url="https://bugzilla.suse.com/966186" source="BUGZILLA"/>
		<reference ref_id="966191" ref_url="https://bugzilla.suse.com/966191" source="BUGZILLA"/>
		<reference ref_id="969476" ref_url="https://bugzilla.suse.com/969476" source="BUGZILLA"/>
		<reference ref_id="969477" ref_url="https://bugzilla.suse.com/969477" source="BUGZILLA"/>
		<reference ref_id="981348" ref_url="https://bugzilla.suse.com/981348" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199/" source="CVE"/>
		<reference ref_id="CVE-2018-10087" ref_url="https://www.suse.com/security/cve/CVE-2018-10087/" source="CVE"/>
		<reference ref_id="CVE-2018-10124" ref_url="https://www.suse.com/security/cve/CVE-2018-10124/" source="CVE"/>
		<reference ref_id="CVE-2018-1065" ref_url="https://www.suse.com/security/cve/CVE-2018-1065/" source="CVE"/>
		<reference ref_id="CVE-2018-1130" ref_url="https://www.suse.com/security/cve/CVE-2018-1130/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-5803" ref_url="https://www.suse.com/security/cve/CVE-2018-5803/" source="CVE"/>
		<reference ref_id="CVE-2018-7492" ref_url="https://www.suse.com/security/cve/CVE-2018-7492/" source="CVE"/>
		<reference ref_id="CVE-2018-8781" ref_url="https://www.suse.com/security/cve/CVE-2018-8781/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004070.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.131 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-3639: Information leaks using 'Memory Disambiguation' feature
  in modern CPUs were mitigated, aka 'Spectre Variant 4' (bnc#1087082).

  A new boot commandline option was introduced,
  'spec_store_bypass_disable', which can have following values:

  - auto: Kernel detects whether your CPU model contains an implementation
    of Speculative Store Bypass and picks the most appropriate mitigation.
  - on: disable Speculative Store Bypass
  - off: enable Speculative Store Bypass
  - prctl: Control Speculative Store Bypass per thread via
    prctl. Speculative Store Bypass is enabled for a process by default. The
    state of the control is inherited on fork.
  - seccomp: Same as 'prctl' above, but all seccomp threads will disable
    SSB unless they explicitly opt out.

  The default is 'seccomp', meaning programs need explicit opt-in into the mitigation.

  Status can be queried via the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing:

  - 'Vulnerable'
  - 'Mitigation: Speculative Store Bypass disabled'
  - 'Mitigation: Speculative Store Bypass disabled via prctl'
  - 'Mitigation: Speculative Store Bypass disabled via prctl and seccomp'


- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c
  had an integer-overflow vulnerability allowing local users with access
  to the udldrmfb driver to obtain full read and write permissions on
  kernel physical pages, resulting in a code execution in kernel space
  (bnc#1090643).
- CVE-2018-10124: The kill_something_info function in kernel/signal.c
  might have allowed local users to cause a denial of service via an
  INT_MIN argument (bnc#1089752).
- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might
  have allowed local users to cause a denial of service by triggering an
  attempted use of the -INT_MIN value (bnc#1089608).
- CVE-2018-1000199: An address corruption flaw was discovered while
  modifying a h/w breakpoint via 'modify_user_hw_breakpoint' routine, an
  unprivileged user/process could use this flaw to crash the system kernel
  resulting in DoS OR to potentially escalate privileges on a the system. (bsc#1089895)
- CVE-2018-1130: The Linux kernel was vulnerable to a null pointer
  dereference in dccp_write_xmit() function in net/dccp/output.c in that
  allowed a local user to cause a denial of service by a number of certain
  crafted system calls (bnc#1092904).
- CVE-2018-5803: An error in the _sctp_make_chunk() function when handling
  SCTP, packet length could have been exploited by a malicious local user
  to cause a kernel crash and a DoS. (bnc#1083900).
- CVE-2018-1065: The netfilter subsystem mishandled the case of
  a rule blob that contains a jump but lacks a user-defined chain,
  which allowed local users to cause a denial of service (NULL
  pointer dereference) by leveraging the CAP_NET_RAW or CAP_NET_ADMIN
  capability, related to arpt_do_table in net/ipv4/netfilter/arp_tables.c,
  ipt_do_table in net/ipv4/netfilter/ip_tables.c, and ip6t_do_table in
  net/ipv6/netfilter/ip6_tables.c (bnc#1083650 1091925).
- CVE-2018-7492: A NULL pointer dereference was found in the
  net/rds/rdma.c __rds_rdma_map() function allowing local attackers to
  cause a system panic and a denial-of-service, related to RDS_GET_MR and
  RDS_GET_MR_FOR_DEST (bnc#1082962).

The following non-security bugs were fixed:

- acpica: Disassembler: Abort on an invalid/unknown AML opcode (bnc#1012382).
- acpica: Events: Add runtime stub support for event APIs (bnc#1012382).
- acpi / hotplug / PCI: Check presence of slot itself in get_slot_status() (bnc#1012382).
- acpi, PCI, irq: remove redundant check for null string pointer (bnc#1012382).
- acpi / scan: Send change uevent with offine environmental data (bsc#1082485).
- acpi / video: Add quirk to force acpi-video backlight on Samsung 670Z5E (bnc#1012382).
- alsa: asihpi: Hardening for potential Spectre v1 (bnc#1012382).
- alsa: control: Hardening for potential Spectre v1 (bnc#1012382).
- alsa: core: Report audio_tstamp in snd_pcm_sync_ptr (bnc#1012382).
- alsa: hda: Hardening for potential Spectre v1 (bnc#1012382).
- alsa: hda - New VIA controller suppor no-snoop path (bnc#1012382).
- alsa: hda/realtek - Add some fixes for ALC233 (bnc#1012382).
- alsa: hdspm: Hardening for potential Spectre v1 (bnc#1012382).
- alsa: line6: Use correct endpoint type for midi output (bnc#1012382).
- alsa: opl3: Hardening for potential Spectre v1 (bnc#1012382).
- alsa: oss: consolidate kmalloc/memset 0 call to kzalloc (bnc#1012382).
- alsa: pcm: Avoid potential races between OSS ioctls and read/write (bnc#1012382).
- alsa: pcm: Fix endless loop for XRUN recovery in OSS emulation (bnc#1012382).
- alsa: pcm: Fix mutex unbalance in OSS emulation ioctls (bnc#1012382).
- alsa: pcm: Fix UAF at PCM release via PCM timer access (bnc#1012382).
- alsa: pcm: potential uninitialized return values (bnc#1012382).
- alsa: pcm: Return -EBUSY for OSS ioctls changing busy streams (bnc#1012382).
- alsa: pcm: Use dma_bytes as size parameter in dma_mmap_coherent() (bnc#1012382).
- alsa: pcm: Use ERESTARTSYS instead of EINTR in OSS emulation (bnc#1012382).
- alsa: rawmidi: Fix missing input substream checks in compat ioctls (bnc#1012382).
- alsa: rme9652: Hardening for potential Spectre v1 (bnc#1012382).
- alsa: seq: oss: Fix unbalanced use lock for synth MIDI device (bnc#1012382).
- alsa: seq: oss: Hardening for potential Spectre v1 (bnc#1012382).
- alsa: usb-audio: Skip broken EU on Dell dock USB-audio (bsc#1090658).
- arm64: avoid overflow in VA_START and PAGE_OFFSET (bnc#1012382).
- arm64: futex: Fix undefined behaviour with FUTEX_OP_OPARG_SHIFT usage (bnc#1012382).
- arm: amba: Do not read past the end of sysfs 'driver_override' buffer (bnc#1012382).
- arm: amba: Fix race condition with driver_override (bnc#1012382).
- arm: amba: Make driver_override output consistent with other buses (bnc#1012382).
- arm: davinci: da8xx: Create DSP device only when assigned memory (bnc#1012382).
- arm: dts: am57xx-beagle-x15-common: Add overide powerhold property (bnc#1012382).
- arm: dts: at91: at91sam9g25: fix mux-mask pinctrl property (bnc#1012382).
- arm: dts: at91: sama5d4: fix pinctrl compatible string (bnc#1012382).
- arm: dts: dra7: Add power hold and power controller properties to palmas (bnc#1012382).
- arm: dts: imx53-qsrb: Pulldown PMIC IRQ pin (bnc#1012382).
- arm: dts: imx6qdl-wandboard: Fix audio channel swap (bnc#1012382).
- arm: dts: ls1021a: add 'fsl,ls1021a-esdhc' compatible string to esdhc node (bnc#1012382).
- arm: imx: Add MXC_CPU_IMX6ULL and cpu_is_imx6ull (bnc#1012382).
- arp: fix arp_filter on l3slave devices (bnc#1012382).
- arp: honour gratuitous ARP _replies_ (bnc#1012382).
- asoc: fsl_esai: Fix divisor calculation failure at lower ratio (bnc#1012382).
- asoc: Intel: cht_bsw_rt5645: Analog Mic support (bnc#1012382).
- asoc: rsnd: SSI PIO adjust to 24bit mode (bnc#1012382).
- asoc: ssm2602: Replace reg_default_raw with reg_default (bnc#1012382).
- async_tx: Fix DMA_PREP_FENCE usage in do_async_gen_syndrome() (bnc#1012382).
- ata: libahci: properly propagate return value of platform_get_irq() (bnc#1012382).
- ath5k: fix memory leak on buf on failed eeprom read (bnc#1012382).
- ath9k_hw: check if the chip failed to wake up (bnc#1012382).
- audit: add tty field to LOGIN event (bnc#1012382).
- autofs: mount point create should honour passed in mode (bnc#1012382).
- bcache: segregate flash only volume write streams (bnc#1012382).
- bcache: stop writeback thread after detaching (bnc#1012382).
- blacklist.conf: Add an omapdrm entry (bsc#1090708, bsc#1090718)
- blk-mq: fix bad clear of RQF_MQ_INFLIGHT in blk_mq_ct_ctx_init() (bsc#1085058).
- blk-mq: fix kernel oops in blk_mq_tag_idle() (bnc#1012382).
- block: correctly mask out flags in blk_rq_append_bio() (bsc#1085058).
- block/loop: fix deadlock after loop_set_status (bnc#1012382).
- block: sanity check for integrity intervals (bsc#1091728).
- bluetooth: Fix missing encryption refresh on Security Request (bnc#1012382).
- bluetooth: Send HCI Set Event Mask Page 2 command only when needed (bnc#1012382).
- bna: Avoid reading past end of buffer (bnc#1012382).
- bnx2x: Allow vfs to disable txvlan offload (bnc#1012382).
- bonding: do not set slave_dev npinfo before slave_enable_netpoll in bond_enslave (bnc#1012382).
- bonding: Do not update slave-&gt;link until ready to commit (bnc#1012382).
- bonding: fix the err path for dev hwaddr sync in bond_enslave (bnc#1012382).
- bonding: move dev_mc_sync after master_upper_dev_link in bond_enslave (bnc#1012382).
- bonding: process the err returned by dev_set_allmulti properly in bond_enslave (bnc#1012382).
- btrfs: fix incorrect error return ret being passed to mapping_set_error (bnc#1012382).
- btrfs: Fix wrong first_key parameter in replace_path (Followup fix for bsc#1084721).
- btrfs: Only check first key for committed tree blocks (bsc#1084721).
- btrfs: Validate child tree block's level and first key (bsc#1084721).
- bus: brcmstb_gisb: correct support for 64-bit address output (bnc#1012382).
- bus: brcmstb_gisb: Use register offsets with writes too (bnc#1012382).
- cdc_ether: flag the Cinterion AHS8 modem by gemalto as WWAN (bnc#1012382).
- cdrom: information leak in cdrom_ioctl_media_changed() (bnc#1012382).
- ceph: adding protection for showing cap reservation info (bsc#1089115).
- ceph: always update atime/mtime/ctime for new inode (bsc#1089115).
- ceph: check if mds create snaprealm when setting quota (fate#324665 bsc#1089115).
- ceph: do not check quota for snap inode (fate#324665 bsc#1089115).
- ceph: fix invalid point dereference for error case in mdsc destroy (bsc#1089115).
- ceph: fix root quota realm check (fate#324665 bsc#1089115).
- ceph: fix rsize/wsize capping in ceph_direct_read_write() (bsc#1089115).
- ceph: quota: add counter for snaprealms with quota (fate#324665 bsc#1089115).
- ceph: quota: add initial infrastructure to support cephfs quotas (fate#324665 bsc#1089115).
- ceph: quota: cache inode pointer in ceph_snap_realm (fate#324665 bsc#1089115).
- ceph: quota: do not allow cross-quota renames (fate#324665 bsc#1089115).
- ceph: quota: report root dir quota usage in statfs (fate#324665 bsc#1089115).
- ceph: quota: support for ceph.quota.max_bytes (fate#324665 bsc#1089115).
- ceph: quota: support for ceph.quota.max_files (fate#324665 bsc#1089115).
- ceph: quota: update MDS when max_bytes is approaching (fate#324665 bsc#1089115).
- cfg80211: make RATE_INFO_BW_20 the default (bnc#1012382).
- cifs: do not allow creating sockets except with SMB1 posix exensions (bnc#1012382).
- cifs: silence compiler warnings showing up with gcc-8.0.0 (bsc#1090734).
- cifs: silence lockdep splat in cifs_relock_file() (bnc#1012382).
- cifs: Use file_dentry() (bsc#1093008).
- clk: bcm2835: De-assert/assert PLL reset signal when appropriate (bnc#1012382).
- clk: Fix __set_clk_rates error print-string (bnc#1012382).
- clk: mvebu: armada-38x: add support for 1866MHz variants (bnc#1012382).
- clk: mvebu: armada-38x: add support for missing clocks (bnc#1012382).
- clk: scpi: fix return type of __scpi_dvfs_round_rate (bnc#1012382).
- clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled (bsc#1090225).
- cpumask: Add helper cpumask_available() (bnc#1012382).
- crypto: ahash - Fix early termination in hash walk (bnc#1012382).
- crypto: x86/cast5-avx - fix ECB encryption when long sg follows short one (bnc#1012382).
- cx25840: fix unchecked return values (bnc#1012382).
- cxgb4: fix incorrect cim_la output for T6 (bnc#1012382).
- cxgb4: Fix queue free path of ULD drivers (bsc#1022743 FATE#322540).
- cxgb4: FW upgrade fixes (bnc#1012382).
- cxgb4vf: Fix SGE FL buffer initialization logic for 64K pages (bnc#1012382).
- dmaengine: at_xdmac: fix rare residue corruption (bnc#1012382).
- dmaengine: imx-sdma: Handle return value of clk_prepare_enable (bnc#1012382).
- dm ioctl: remove double parentheses (bnc#1012382).
- Documentation: pinctrl: palmas: Add ti,palmas-powerhold-override property definition (bnc#1012382).
- Do not leak MNT_INTERNAL away from internal mounts (bnc#1012382).
- drivers/infiniband/core/verbs.c: fix build with gcc-4.4.4 (FATE#321732).
- drivers/infiniband/ulp/srpt/ib_srpt.c: fix build with gcc-4.4.4 (bnc#1024296,FATE#321265).
- drivers/misc/vmw_vmci/vmci_queue_pair.c: fix a couple integer overflow tests (bnc#1012382).
- drm/omap: fix tiled buffer stride calculations (bnc#1012382).
- drm/radeon: Fix PCIe lane width calculation (bnc#1012382).
- drm/virtio: fix vq wait_event condition (bnc#1012382).
- e1000e: fix race condition around skb_tstamp_tx() (bnc#1012382).
- e1000e: Undo e1000e_pm_freeze if __e1000_shutdown fails (bnc#1012382).
- edac, mv64x60: Fix an error handling path (bnc#1012382).
- Enable uinput driver (bsc#1092566).
- esp: Fix memleaks on error paths (git-fixes).
- ext4: add validity checks for bitmap block numbers (bnc#1012382).
- ext4: bugfix for mmaped pages in mpage_release_unused_pages() (bnc#1012382).
- ext4: do not allow r/w mounts if metadata blocks overlap the superblock (bnc#1012382).
- ext4: do not update checksum of new initialized bitmaps (bnc#1012382).
- ext4: fail ext4_iget for root directory if unallocated (bnc#1012382).
- ext4: fix bitmap position validation (bnc#1012382).
- ext4: fix deadlock between inline_data and ext4_expand_extra_isize_ea() (bnc#1012382).
- ext4: Fix hole length detection in ext4_ind_map_blocks() (bsc#1090953).
- ext4: fix off-by-one on max nr_pages in ext4_find_unwritten_pgoff() (bnc#1012382).
- ext4: prevent right-shifting extents beyond EXT_MAX_BLOCKS (bnc#1012382).
- ext4: set h_journal if there is a failure starting a reserved handle (bnc#1012382).
- fanotify: fix logic of events on child (bnc#1012382).
- fix race in drivers/char/random.c:get_reg() (bnc#1012382).
- frv: declare jiffies to be located in the .data section (bnc#1012382).
- fs: compat: Remove warning from COMPATIBLE_IOCTL (bnc#1012382).
- fs/proc: Stop trying to report thread stacks (bnc#1012382).
- fs/reiserfs/journal.c: add missing resierfs_warning() arg (bnc#1012382).
- genirq: Use cpumask_available() for check of cpumask variable (bnc#1012382).
- getname_kernel() needs to make sure that -&gt;name != -&gt;iname in long case (bnc#1012382).
- gpio: label descriptors using the device name (bnc#1012382).
- hdlcdrv: Fix divide by zero in hdlcdrv_ioctl (bnc#1012382).
- hid: core: Fix size as type u32 (bnc#1012382).
- hid: Fix hid_report_len usage (bnc#1012382).
- hid: hidraw: Fix crash on HIDIOCGFEATURE with a destroyed device (bnc#1012382).
- hid: i2c-hid: fix size check and type usage (bnc#1012382).
- hwmon: (ina2xx) Fix access to uninitialized mutex (git-fixes).
- hwmon: (ina2xx) Make calibration register value fixed (bnc#1012382).
- hypfs_kill_super(): deal with failed allocations (bnc#1012382).
- i40iw: Free IEQ resources (bsc#969476 FATE#319648 bsc#969477 FATE#319816).
- ib/core: Fix possible crash to access NULL netdev (bsc#966191 FATE#320230 bsc#966186 FATE#320228).
- ib/core: Generate GID change event regardless of RoCE GID table property (bsc#966191 FATE#320230 bsc#966186 FATE#320228).
- ib/mlx4: Fix corruption of RoCEv2 IPv4 GIDs (bsc#966191 FATE#320230 bsc#966186 FATE#320228).
- ib/mlx4: Include GID type when deleting GIDs from HW table under RoCE (bsc#966191 FATE#320230 bsc#966186 FATE#320228).
- ib/mlx5: Avoid passing an invalid QP type to firmware (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- ib/mlx5: Fix an error code in __mlx5_ib_modify_qp() (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- ib/mlx5: Fix incorrect size of klms in the memory region (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- ib/mlx5: Fix out-of-bounds read in create_raw_packet_qp_rq (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- ib/mlx5: revisit -Wmaybe-uninitialized warning (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- ib/mlx5: Set the default active rate and width to QDR and 4X (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- ibmvnic: Clean actual number of RX or TX pools (bsc#1092289).
- ibmvnic: Clear pending interrupt after device reset (bsc#1089644).
- ibmvnic: Define vnic_login_client_data name field as unsized array (bsc#1089198).
- ibmvnic: Do not notify peers on parameter change resets (bsc#1089198).
- ibmvnic: Handle all login error conditions (bsc#1089198).
- ib/srp: Fix completion vector assignment algorithm (bnc#1012382).
- ib/srp: Fix srp_abort() (bnc#1012382).
- ib/srpt: Fix abort handling (bnc#1012382).
- ib/srpt: Fix an out-of-bounds stack access in srpt_zerolength_write() (bnc#1024296,FATE#321265).
- iio: hi8435: avoid garbage event at first enable (bnc#1012382).
- iio: hi8435: cleanup reset gpio (bnc#1012382).
- iio: magnetometer: st_magn_spi: fix spi_device_id table (bnc#1012382).
- input: ALPS - fix multi-touch decoding on SS4 plus touchpads (git-fixes).
- input: ALPS - fix trackstick button handling on V8 devices (git-fixes).
- input: ALPS - fix TrackStick support for SS5 hardware (git-fixes).
- input: ALPS - fix two-finger scroll breakage in right side on ALPS touchpad (git-fixes).
- input: drv260x - fix initializing overdrive voltage (bnc#1012382).
- input: elan_i2c - check if device is there before really probing (bnc#1012382).
- input: elan_i2c - clear INT before resetting controller (bnc#1012382).
- input: elantech - force relative mode on a certain module (bnc#1012382).
- input: i8042 - add Lenovo ThinkPad L460 to i8042 reset list (bnc#1012382).
- input: i8042 - enable MUX on Sony VAIO VGN-CS series to fix touchpad (bnc#1012382).
- input: mousedev - fix implicit conversion warning (bnc#1012382).
- iommu/vt-d: Fix a potential memory leak (bnc#1012382).
- ip6_gre: better validate user provided tunnel names (bnc#1012382).
- ip6_tunnel: better validate user provided tunnel names (bnc#1012382).
- ipc/shm: fix use-after-free of shm file via remap_file_pages() (bnc#1012382).
- ipmi: create hardware-independent softdep for ipmi_devintf (bsc#1009062, bsc#1060799). Refresh patch to mainline version.
- ipsec: check return value of skb_to_sgvec always (bnc#1012382).
- ip_tunnel: better validate user provided tunnel names (bnc#1012382).
- ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policy (bnc#1012382).
- ipv6: avoid dad-failures for addresses with NODAD (bnc#1012382).
- ipv6: sit: better validate user provided tunnel names (bnc#1012382).
- ipv6: the entire IPv6 header chain must fit the first fragment (bnc#1012382).
- iw_cxgb4: print mapped ports correctly (bsc#321658 FATE#1005778 bsc#321660 FATE#1005780 bsc#321661 FATE#1005781).
- jbd2: fix use after free in kjournald2() (bnc#1012382).
- jbd2: if the journal is aborted then do not allow update of the log tail (bnc#1012382).
- jffs2_kill_sb(): deal with failed allocations (bnc#1012382).
- jiffies.h: declare jiffies and jiffies_64 with ____cacheline_aligned_in_smp (bnc#1012382).
- kABI: add tty include to audit.c (kabi).
- kABI: protect hid report functions (kabi).
- kABI: protect jiffies types (kabi).
- kABI: protect skb_to_sgvec* (kabi).
- kABI: protect sound/timer.h include in sound pcm.c (kabi).
- kABI: protect struct cstate (kabi).
- kABI: protect struct _lowcore (kabi).
- kABI: protect tty include in audit.h (kabi).
- kabi/severities: Ignore kgr_shadow_* kABI changes
- kbuild: provide a __UNIQUE_ID for clang (bnc#1012382).
- kexec_file: do not add extra alignment to efi memmap (bsc#1044596).
- keys: DNS: limit the length of option strings (bnc#1012382).
- kGraft: fix small race in reversion code (bsc#1083125).
- kobject: do not use WARN for registration failures (bnc#1012382).
- kvm: Fix nopvspin static branch init usage (bsc#1056427).
- kvm: Introduce nopvspin kernel parameter (bsc#1056427).
- kvm: nVMX: Fix handling of lmsw instruction (bnc#1012382).
- kvm: PPC: Book3S PR: Check copy_to/from_user return values (bnc#1012382).
- kvm: SVM: do not zero out segment attributes if segment is unusable or not present (bnc#1012382).
- l2tp: check sockaddr length in pppol2tp_connect() (bnc#1012382).
- l2tp: fix missing print session offset info (bnc#1012382).
- lan78xx: Correctly indicate invalid OTP (bnc#1012382).
- leds: pca955x: Correct I2C Functionality (bnc#1012382).
- libceph, ceph: change permission for readonly debugfs entries (bsc#1089115).
- libceph: fix misjudgement of maximum monitor number (bsc#1089115).
- libceph: reschedule a tick in finish_hunting() (bsc#1089115).
- libceph: un-backoff on tick when we have a authenticated session (bsc#1089115).
- libceph: validate con-&gt;state at the top of try_write() (bsc#1089115).
- livepatch: Allow to call a custom callback when freeing shadow variables (bsc#1082299 fate#313296).
- livepatch: Initialize shadow variables safely by a custom callback (bsc#1082299 fate#313296).
- llc: delete timers synchronously in llc_sk_free() (bnc#1012382).
- llc: fix NULL pointer deref for SOCK_ZAPPED (bnc#1012382).
- llc: hold llc_sap before release_sock() (bnc#1012382).
- llist: clang: introduce member_address_is_nonnull() (bnc#1012382).
- lockd: fix lockd shutdown race (bnc#1012382).
- lockd: lost rollback of set_grace_period() in lockd_down_net() (git-fixes).
- mac80211: bail out from prep_connection() if a reconfig is ongoing (bnc#1012382).
- mceusb: sporadic RX truncation corruption fix (bnc#1012382).
- md: document lifetime of internal rdev pointer (bsc#1056415).
- md: fix two problems with setting the 're-add' device state (bsc#1089023).
- md: only allow remove_and_add_spares when no sync_thread running (bsc#1056415).
- md raid10: fix NULL deference in handle_write_completed() (git-fixes).
- md/raid10: reset the 'first' at the end of loop (bnc#1012382).
- md/raid5: make use of spin_lock_irq over local_irq_disable + spin_lock (bnc#1012382).
- media: v4l2-compat-ioctl32: do not oops on overlay (bnc#1012382).
- media: videobuf2-core: do not go out of the buffer range (bnc#1012382).
- mei: remove dev_err message on an unsupported ioctl (bnc#1012382).
- mISDN: Fix a sleep-in-atomic bug (bnc#1012382).
- mlx5: fix bug reading rss_hash_type from CQE (bnc#1012382).
- mmc: jz4740: Fix race condition in IRQ mask update (bnc#1012382).
- mm/filemap.c: fix NULL pointer in page_cache_tree_insert() (bnc#1012382).
- mm, slab: reschedule cache_reap() on the same CPU (bnc#1012382).
- mtd: cfi: cmdset_0001: Do not allow read/write to suspend erase block (bnc#1012382).
- mtd: cfi: cmdset_0001: Workaround Micron Erase suspend bug (bnc#1012382).
- mtd: cfi: cmdset_0002: Do not allow read/write to suspend erase block (bnc#1012382).
- mtd: jedec_probe: Fix crash in jedec_read_mfr() (bnc#1012382).
- neighbour: update neigh timestamps iff update is effective (bnc#1012382).
- net: af_packet: fix race in PACKET_{R|T}X_RING (bnc#1012382).
- net: cavium: liquidio: fix up 'Avoid dma_unmap_single on uninitialized ndata' (bnc#1012382).
- net: cdc_ncm: Fix TX zero padding (bnc#1012382).
- net: emac: fix reset timeout with AR8035 phy (bnc#1012382).
- net: ethernet: ti: cpsw: adjust cpsw fifos depth for fullduplex flow control (bnc#1012382).
- netfilter: bridge: ebt_among: add more missing match size checks (bnc#1012382).
- netfilter: ctnetlink: fix incorrect nf_ct_put during hash resize (bnc#1012382).
- netfilter: ctnetlink: Make some parameters integer to avoid enum mismatch (bnc#1012382).
- netfilter: nf_nat_h323: fix logical-not-parentheses warning (bnc#1012382).
- netfilter: x_tables: add and use xt_check_proc_name (bnc#1012382).
- net: fix deadlock while clearing neighbor proxy table (bnc#1012382).
- net: fix possible out-of-bound read in skb_network_protocol() (bnc#1012382).
- net: fool proof dev_valid_name() (bnc#1012382).
- net: freescale: fix potential null pointer dereference (bnc#1012382).
- net: hns: Fix ethtool private flags (bnc#1012382 bsc#1085511).
- net: ieee802154: fix net_device reference release too early (bnc#1012382).
- net/ipv6: Fix route leaking between VRFs (bnc#1012382).
- net/ipv6: Increment OUTxxx counters after netfilter hook (bnc#1012382).
- netlink: make sure nladdr has correct size in netlink_connect() (bnc#1012382).
- net: llc: add lock_sock in llc_ui_bind to avoid a race condition (bnc#1012382).
- net/mlx4: Check if Granular QoS per VF has been enabled before updating QP qos_vport (bnc#1012382).
- net/mlx4_core: Fix memory leak while delete slave's resources (bsc#966191 FATE#320230 bsc#966186 FATE#320228).
- net/mlx4_en: Avoid adding steering rules with invalid ring (bnc#1012382).
- net/mlx4_en: Fix mixed PFC and Global pause user control requests (bsc#1015336 FATE#321685 bsc#1015337 FATE#321686 bsc#1015340 FATE#321687).
- net/mlx4: Fix the check in attaching steering rules (bnc#1012382).
- net/mlx5: avoid build warning for uniprocessor (bnc#1012382).
- net/mlx5e: Add error print in ETS init (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5e: Check support before TC swap in ETS init (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5e: E-Switch, Use the name of static array instead of its address (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5e: Remove unused define MLX5_MPWRQ_STRIDES_PER_PAGE (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5: Fix error handling in load one (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5: Fix ingress/egress naming mistake (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5: Tolerate irq_set_affinity_hint() failures (bnc#1012382).
- net: move somaxconn init from sysctl code (bnc#1012382).
- net: phy: avoid genphy_aneg_done() for PHYs without clause 22 support (bnc#1012382).
- net: qca_spi: Fix alignment issues in rx path (bnc#1012382).
- net sched actions: fix dumping which requires several messages to user space (bnc#1012382).
- net/sched: fix NULL dereference in the error path of tcf_bpf_init() (bnc#1012382).
- net: validate attribute sizes in neigh_dump_table() (bnc#1012382).
- net: x25: fix one potential use-after-free issue (bnc#1012382).
- net: xfrm: use preempt-safe this_cpu_read() in ipcomp_alloc_tfms() (bnc#1012382).
- nfsv4.1: RECLAIM_COMPLETE must handle NFS4ERR_CONN_NOT_BOUND_TO_SESSION (bnc#1012382).
- nfsv4.1: Work around a Linux server bug.. (bnc#1012382).
- nospec: Kill array_index_nospec_mask_check() (bnc#1012382).
- nospec: Move array_index_nospec() parameter checking into separate macro (bnc#1012382).
- ovl: filter trusted xattr for non-admin (bnc#1012382).
- packet: fix bitfield update race (bnc#1012382).
- parisc: Fix out of array access in match_pci_device() (bnc#1012382).
- parport_pc: Add support for WCH CH382L PCI-E single parallel port card (bnc#1012382).
- partitions/msdos: Unable to mount UFS 44bsd partitions (bnc#1012382).
- pci/cxgb4: Extend T3 PCI quirk to T4+ devices (bsc#981348).
- pci: Make PCI_ROM_ADDRESS_MASK a 32-bit constant (bnc#1012382).
- perf/core: Correct event creation with PERF_FORMAT_GROUP (bnc#1012382).
- perf/core: Fix locking for children siblings group read (git-fixes).
- perf header: Set proper module name when build-id event found (bnc#1012382).
- perf/hwbp: Simplify the perf-hwbp code, fix documentation (bnc#1012382).
- perf intel-pt: Fix error recovery from missing TIP packet (bnc#1012382).
- perf intel-pt: Fix overlap detection to identify consecutive buffers correctly (bnc#1012382).
- perf intel-pt: Fix sync_switch (bnc#1012382).
- perf intel-pt: Fix timestamp following overflow (bnc#1012382).
- perf probe: Add warning message if there is unexpected event name (bnc#1012382).
- perf report: Ensure the perf DSO mapping matches what libdw sees (bnc#1012382).
- perf: Return proper values for user stack errors (bnc#1012382).
- perf tests: Decompress kernel module before objdump (bnc#1012382).
- perf tools: Fix copyfile_offset update of output offset (bnc#1012382).
- perf trace: Add mmap alias for s390 (bnc#1012382).
- pidns: disable pid allocation if pid_ns_prepare_proc() is failed in alloc_pid() (bnc#1012382).
- pNFS/flexfiles: missing error code in ff_layout_alloc_lseg() (bnc#1012382).
- powerpc/64: Fix smp_wmb barrier definition use use lwsync consistently (bnc#1012382).
- powerpc/64s: Add barrier_nospec (bsc#1068032, bsc#1080157).
- powerpc/64s: Add support for ori barrier_nospec patching (bsc#1068032, bsc#1080157).
- powerpc/64s: Enable barrier_nospec based on firmware settings (bsc#1068032, bsc#1080157).
- powerpc/64s: Enhance the information in cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Enhance the information in cpu_show_spectre_v1() (bsc#1068032).
- powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Move cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Patch barrier_nospec in modules (bsc#1068032, bsc#1080157).
- powerpc/64s: Wire up cpu_show_spectre_v1() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Wire up cpu_show_spectre_v2() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64: Use barrier_nospec in syscall entry (bsc#1068032, bsc#1080157).
- powerpc: Add security feature flags for Spectre/Meltdown (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/[booke|4xx]: Do not clobber TCR[WP] when setting TCR[DIE] (bnc#1012382).
- powerpc/crash: Remove the test for cpu_online in the IPI callback (bsc#1088242).
- powerpc: Do not send system reset request through the oops path (bsc#1088242).
- powerpc/eeh: Fix enabling bridge MMIO windows (bnc#1012382).
- powerpc/lib: Fix off-by-one in alternate feature patching (bnc#1012382).
- powerpc/mm: allow memory hotplug into a memoryless node (bsc#1090663).
- powerpc/mm: Allow memory hotplug into an offline node (bsc#1090663).
- powerpc: Move default security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/powernv: define a standard delay for OPAL_BUSY type retry loops (bnc#1012382).
- powerpc/powernv: Fix OPAL NVRAM driver OPAL_BUSY loops (bnc#1012382).
- powerpc/powernv: Handle unknown OPAL errors in opal_nvram_write() (bnc#1012382).
- powerpc/powernv: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/powernv: Use the security flags in pnv_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Fix clearing of security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Restore default security feature flags on setup (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/rfi-flush: Always enable fallback flush on pseries (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/rfi-flush: Differentiate enabled and patched flush types (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again (bsc#1068032, bsc#1075087, bsc#1091041). Update patches.suse/powerpc-pseries-rfi-flush-Call-setup_rfi_flush-after.patch (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/spufs: Fix coredump of SPU contexts (bnc#1012382).
- powerpc: System reset avoid interleaving oops using die synchronisation (bsc#1088242).
- powerpc: Use barrier_nospec in copy_from_user() (bsc#1068032, bsc#1080157).
- pppoe: check sockaddr length in pppoe_connect() (bnc#1012382).
- pptp: remove a buggy dst release in pptp_connect() (bnc#1012382).
- qlge: Avoid reading past end of buffer (bnc#1012382).
- r8152: add Linksys USB3GIGV1 id (bnc#1012382).
- r8169: fix setting driver_data after register_netdev (bnc#1012382).
- radeon: hide pointless #warning when compile testing (bnc#1012382).
- random: use a tighter cap in credit_entropy_bits_safe() (bnc#1012382).
- random: use lockless method of accessing and updating f-&gt;reg_idx (bnc#1012382).
- ray_cs: Avoid reading past end of buffer (bnc#1012382).
- rdma/core: Avoid that ib_drain_qp() triggers an out-of-bounds stack access (FATE#321732).
- rdma/mlx5: Protect from NULL pointer derefence (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- rdma/qedr: fix QP's ack timeout configuration (bsc#1022604 FATE#321747).
- rdma/qedr: Fix QP state initialization race (bsc#1022604 FATE#321747).
- rdma/qedr: Fix rc initialization on CNQ allocation failure (bsc#1022604 FATE#321747).
- rdma/rxe: Fix an out-of-bounds read (FATE#322149).
- rdma/ucma: Check AF family prior resolving address (bnc#1012382).
- rdma/ucma: Check that device exists prior to accessing it (bnc#1012382).
- rdma/ucma: Check that device is connected prior to access it (bnc#1012382).
- rdma/ucma: Do not allow join attempts for unsupported AF family (bnc#1012382).
- rdma/ucma: Do not allow setting RDMA_OPTION_IB_PATH without an RDMA device (bnc#1012382).
- rdma/ucma: Ensure that CM_ID exists prior to access it (bnc#1012382).
- rdma/ucma: Fix use-after-free access in ucma_close (bnc#1012382).
- rdma/ucma: Introduce safer rdma_addr_size() variants (bnc#1012382).
- rds; Reset rs-&gt;rs_bound_addr in rds_add_bound() failure path (bnc#1012382).
- regulator: gpio: Fix some error handling paths in 'gpio_regulator_probe()' (bsc#1091960).
- resource: fix integer overflow at reallocation (bnc#1012382).
- Revert 'alsa: pcm: Fix mutex unbalance in OSS emulation ioctls' (kabi).
- Revert 'alsa: pcm: Return -EBUSY for OSS ioctls changing busy streams' (kabi).
- Revert 'arm: dts: am335x-pepper: Fix the audio CODEC's reset pin' (bnc#1012382).
- Revert 'arm: dts: omap3-n900: Fix the audio CODEC's reset pin' (bnc#1012382).
- Revert 'ath10k: send (re)assoc peer command when NSS changed' (bnc#1012382).
- Revert 'cpufreq: Fix governor module removal race' (bnc#1012382).
- Revert 'ip6_vti: adjust vti mtu according to mtu of lower device' (bnc#1012382).
- Revert 'KVM: Fix stack-out-of-bounds read in write_mmio' (bnc#1083635).
- Revert 'mtd: cfi: cmdset_0001: Do not allow read/write to suspend erase block.' (kabi).
- Revert 'mtd: cfi: cmdset_0001: Workaround Micron Erase suspend bug.' (kabi).
- Revert 'mtd: cfi: cmdset_0002: Do not allow read/write to suspend erase block.' (kabi).
- Revert 'mtip32xx: use runtime tag to initialize command header' (bnc#1012382).
- Revert 'PCI/MSI: Stop disabling MSI/MSI-X in pci_device_shutdown()' (bnc#1012382).
- Revert 'perf tests: Decompress kernel module before objdump' (bnc#1012382).
- Revert 'xhci: plat: Register shutdown for xhci_plat' (bnc#1012382).
- rpc_pipefs: fix double-dput() (bnc#1012382).
- rpm/config.sh: build against SP3 in OBS as well.
- rpm/config.sh: ensure sorted patches.
- rtc: interface: Validate alarm-time before handling rollover (bnc#1012382).
- rtc: opal: Handle disabled TPO in opal_get_tpo_time() (bnc#1012382).
- rtc: snvs: fix an incorrect check of return value (bnc#1012382).
- rtl8187: Fix NULL pointer dereference in priv-&gt;conf_mutex (bnc#1012382).
- rxrpc: check return value of skb_to_sgvec always (bnc#1012382).
- s390: add automatic detection of the spectre defense (bnc#1012382).
- s390: add optimized array_index_mask_nospec (bnc#1012382).
- s390: add options to change branch prediction behaviour for the kernel (bnc#1012382 bsc#1068032).
- s390: add sysfs attributes for spectre (bnc#1012382).
- s390/alternative: use a copy of the facility bit mask (bnc#1012382).
- s390/cio: update chpid descriptor after resource accessibility event (bnc#1012382).
- s390: correct module section names for expoline code revert (bnc#1012382).
- s390: correct nospec auto detection init order (bnc#1012382).
- s390/dasd: fix hanging safe offline (bnc#1012382).
- s390/dasd: fix IO error for newly defined devices (bnc#1093144, LTC#167398).
- s390: do not bypass BPENTER for interrupt system calls (bnc#1012382).
- s390: enable CPU alternatives unconditionally (bnc#1012382).
- s390/entry.S: fix spurious zeroing of r0 (bnc#1012382).
- s390: introduce execute-trampolines for branches (bnc#1012382).
- s390/ipl: ensure loadparm valid flag is set (bnc#1012382).
- s390: move nobp parameter functions to nospec-branch.c (bnc#1012382).
- s390: move _text symbol to address higher than zero (bnc#1012382).
- s390/qdio: do not merge ERROR output buffers (bnc#1012382).
- s390/qdio: do not retry EQBS after CCQ 96 (bnc#1012382).
- s390/qeth: consolidate errno translation (bnc#1093144, LTC#167507).
- s390/qeth: fix MAC address update sequence (bnc#1093144, LTC#167609).
- s390/qeth: translate SETVLAN/DELVLAN errors (bnc#1093144, LTC#167507).
- s390: Replace IS_ENABLED(EXPOLINE_*) with IS_ENABLED(CONFIG_EXPOLINE_*) (bnc#1012382).
- s390: report spectre mitigation via syslog (bnc#1012382).
- s390: run user space and KVM guests with modified branch prediction (bnc#1012382).
- s390: scrub registers on kernel entry and KVM exit (bnc#1012382).
- s390/uprobes: implement arch_uretprobe_is_alive() (bnc#1012382).
- sched/numa: Use down_read_trylock() for the mmap_sem (bnc#1012382).
- scsi: bnx2fc: fix race condition in bnx2fc_get_host_stats() (bnc#1012382).
- scsi: libiscsi: Allow sd_shutdown on bad transport (bnc#1012382).
- scsi: libsas: initialize sas_phy status according to response of DISCOVER (bnc#1012382).
- scsi: lpfc: Add per io channel NVME IO statistics (bsc#1088865).
- scsi: lpfc: Correct missing remoteport registration during link bounces (bsc#1088865).
- scsi: lpfc: Correct target queue depth application changes (bsc#1088865).
- scsi: lpfc: Enlarge nvmet asynchronous receive buffer counts (bsc#1088865).
- scsi: lpfc: Fix Abort request WQ selection (bsc#1088865).
- scsi: lpfc: Fix driver not recovering NVME rports during target link faults (bsc#1088865).
- scsi: lpfc: Fix lingering lpfc_wq resource after driver unload (bsc#1088865).
- scsi: lpfc: Fix multiple PRLI completion error path (bsc#1088865).
- scsi: lpfc: Fix NULL pointer access in lpfc_nvme_info_show (bsc#1088865).
- scsi: lpfc: Fix NULL pointer reference when resetting adapter (bsc#1088865).
- scsi: lpfc: Fix nvme remoteport registration race conditions (bsc#1088865).
- scsi: lpfc: Fix WQ/CQ creation for older asic's (bsc#1088865).
- scsi: lpfc: update driver version to 11.4.0.7-2 (bsc#1088865).
- scsi: mpt3sas: Proper handling of set/clear of 'ATA command pending' flag (bnc#1012382).
- scsi: mptsas: Disable WRITE SAME (bnc#1012382).
- scsi: sd: Defer spinning up drive while SANITIZE is in progress (bnc#1012382).
- sctp: do not check port in sctp_inet6_cmp_addr (bnc#1012382).
- sctp: do not leak kernel memory to user space (bnc#1012382).
- sctp: fix recursive locking warning in sctp_do_peeloff (bnc#1012382).
- sctp: sctp_sockaddr_af must check minimal addr length for AF_INET6 (bnc#1012382).
- selftests/powerpc: Fix TM resched DSCR test with some compilers (bnc#1012382).
- selinux: do not check open permission on sockets (bnc#1012382).
- selinux: Remove redundant check for unknown labeling behavior (bnc#1012382).
- selinux: Remove unnecessary check of array base in selinux_set_mapping() (bnc#1012382).
- serial: 8250: omap: Disable DMA for console UART (bnc#1012382).
- serial: mctrl_gpio: Add missing module license (bnc#1012382).
- serial: mctrl_gpio: export mctrl_gpio_disable_ms and mctrl_gpio_init (bnc#1012382).
- serial: sh-sci: Fix race condition causing garbage during shutdown (bnc#1012382).
- sh_eth: Use platform device for printing before register_netdev() (bnc#1012382).
- sit: reload iphdr in ipip6_rcv (bnc#1012382).
- skbuff: only inherit relevant tx_flags (bnc#1012382).
- skbuff: return -EMSGSIZE in skb_to_sgvec to prevent overflow (bnc#1012382).
- sky2: Increase D3 delay to sky2 stops working after suspend (bnc#1012382).
- slip: Check if rstate is initialized before uncompressing (bnc#1012382).
- sparc64: ldc abort during vds iso boot (bnc#1012382).
- spi: davinci: fix up dma_mapping_error() incorrect patch (bnc#1012382).
- staging: comedi: ni_mio_common: ack ai fifo error interrupts (bnc#1012382).
- staging: ion : Donnot wakeup kswapd in ion system alloc (bnc#1012382).
- staging: wlan-ng: prism2mgmt.c: fixed a double endian conversion before calling hfa384x_drvr_setconfig16, also fixes relative sparse warning (bnc#1012382).
- swap: divide-by-zero when zero length swap file on ssd (bsc#1082153).
- tags: honor COMPILED_SOURCE with apart output directory (bnc#1012382).
- tcp: better validation of received ack sequences (bnc#1012382).
- tcp: do not read out-of-bounds opsize (bnc#1012382).
- tcp: md5: reject TCP_MD5SIG or TCP_MD5SIG_EXT on established sockets (bnc#1012382).
- team: avoid adding twice the same option to the event list (bnc#1012382).
- team: fix netconsole setup over team (bnc#1012382).
- thermal: imx: Fix race condition in imx_thermal_probe() (bnc#1012382).
- thermal: power_allocator: fix one race condition issue for thermal_instances list (bnc#1012382).
- thunderbolt: Resume control channel after hibernation image is created (bnc#1012382).
- tipc: add policy for TIPC_NLA_NET_ADDR (bnc#1012382).
- tty: Do not call panic() at tty_ldisc_init() (bnc#1012382).
- tty: make n_tty_read() always abort if hangup is in progress (bnc#1012382).
- tty: n_gsm: Allow ADM response in addition to UA for control dlci (bnc#1012382).
- tty: n_gsm: Fix DLCI handling for ADM mode if debug &amp; 2 is not set (bnc#1012382).
- tty: n_gsm: Fix long delays with control frame timeouts in ADM mode (bnc#1012382).
- tty: provide tty_name() even without CONFIG_TTY (bnc#1012382).
- tty: Use __GFP_NOFAIL for tty_ldisc_get() (bnc#1012382).
- ubi: fastmap: Do not flush fastmap work on detach (bnc#1012382).
- ubi: Fix error for write access (bnc#1012382).
- ubifs: Check ubifs_wbuf_sync() return code (bnc#1012382).
- ubi: Reject MLC NAND (bnc#1012382).
- um: Use POSIX ucontext_t instead of struct ucontext (bnc#1012382).
- Update config files, add expoline for s390x (bsc#1089393).
- Update patches.suse/x86-nospectre_v2-means-nospec-too.patch (bsc#1075994 bsc#1075091 bnc#1085958).
- usb: chipidea: properly handle host or gadget initialization failure (bnc#1012382).
- usb: core: Add quirk for HP v222w 16GB Mini (bnc#1012382).
- usb: dwc2: Improve gadget state disconnection handling (bnc#1012382).
- usb: dwc3: keystone: check return value (bnc#1012382).
- usb: dwc3: pci: Properly cleanup resource (bnc#1012382).
- usb: ene_usb6250: fix first command execution (bnc#1012382).
- usb: ene_usb6250: fix SCSI residue overwriting (bnc#1012382).
- usb:fix USB3 devices behind USB3 hubs not resuming at hibernate thaw (bnc#1012382).
- usb: gadget: align buffer size when allocating for OUT endpoint (bnc#1012382).
- usb: gadget: change len to size_t on alloc_ep_req() (bnc#1012382).
- usb: gadget: define free_ep_req as universal function (bnc#1012382).
- usb: gadget: f_hid: fix: Prevent accessing released memory (bnc#1012382).
- usb: gadget: fix request length error for isoc transfer (git-fixes).
- usb: gadget: fix usb_ep_align_maybe endianness and new usb_ep_align (bnc#1012382).
- usb: Increment wakeup count on remote wakeup (bnc#1012382).
- usbip: usbip_host: fix to hold parent lock for device_attach() calls (bnc#1012382).
- usbip: vhci_hcd: Fix usb device and sockfd leaks (bnc#1012382).
- usb: musb: gadget: misplaced out of bounds check (bnc#1012382).
- usb: serial: cp210x: add ELDAT Easywave RX09 id (bnc#1012382).
- usb: serial: cp210x: add ID for NI USB serial console (bnc#1012382).
- usb: serial: ftdi_sio: add RT Systems VX-8 cable (bnc#1012382).
- usb: serial: ftdi_sio: add support for Harman FirmwareHubEmulator (bnc#1012382).
- usb: serial: ftdi_sio: use jtag quirk for Arrow USB Blaster (bnc#1012382).
- usb: serial: simple: add libtransistor console (bnc#1012382).
- vfb: fix video mode and line_length being set when loaded (bnc#1012382).
- vfio/pci: Virtualize Maximum Payload Size (bnc#1012382).
- vfio/pci: Virtualize Maximum Read Request Size (bnc#1012382).
- vfio-pci: Virtualize PCIe &amp; AF FLR (bnc#1012382).
- vhost: correctly remove wait queue during poll failure (bnc#1012382).
- virtio: add ability to iterate over vqs (bnc#1012382).
- virtio_console: free buffers after reset (bnc#1012382).
- virtio_net: check return value of skb_to_sgvec always (bnc#1012382).
- virtio_net: check return value of skb_to_sgvec in one more location (bnc#1012382).
- vlan: also check phy_driver ts_info for vlan's real device (bnc#1012382).
- vlan: Fix reading memory beyond skb-&gt;tail in skb_vlan_tagged_multi (bnc#1012382).
- vmxnet3: ensure that adapter is in proper state during force_close (bnc#1012382).
- vrf: Fix use after free and double free in vrf_finish_output (bnc#1012382).
- vt: change SGR 21 to follow the standards (bnc#1012382).
- vti6: better validate user provided tunnel names (bnc#1012382).
- vxlan: dont migrate permanent fdb entries during learn (bnc#1012382).
- watchdog: f71808e_wdt: Fix WD_EN register read (bnc#1012382).
- watchdog: hpwdt: Remove legacy NMI sourcing (bsc#1085185).
- wl1251: check return from call to wl1251_acx_arp_ip_filter (bnc#1012382).
- writeback: fix the wrong congested state variable definition (bnc#1012382).
- writeback: safer lock nesting (bnc#1012382).
- x86/asm: Do not use RBP as a temporary register in csum_partial_copy_generic() (bnc#1012382).
- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1092497).
- x86/bugs: Make sure that _TIF_SSBD does not end up in _TIF_ALLWORK_MASK (bsc#1093215).
- x86/hweight: Do not clobber %rdi (bnc#1012382).
- x86/hweight: Get rid of the special calling convention (bnc#1012382).
- x86/ipc: Fix x32 version of shmid64_ds and msqid64_ds (bnc#1012382).
- x86/platform/UV: Add references to access fixed UV4A HUB MMRs (bsc#1076263 #fate#322814).
- x86/platform/uv/BAU: Replace hard-coded values with MMR definitions (bsc#1076263 #fate#322814).
- x86/platform/UV: Fix critical UV MMR address error (bsc#1076263
- x86/platform/UV: Fix GAM MMR changes in UV4A (bsc#1076263 #fate#322814).
- x86/platform/UV: Fix GAM MMR references in the UV x2apic code (bsc#1076263 #fate#322814).
- x86/platform/UV: Fix GAM Range Table entries less than 1GB (bsc#1091325).
- x86/platform/UV: Fix UV4A BAU MMRs (bsc#1076263 #fate#322814).
- x86/platform/UV: Fix UV4A support on new Intel Processors (bsc#1076263 #fate#322814).
- x86/platform/uv: Skip UV runtime services mapping in the efi_runtime_disabled case (bsc#1089925).
- x86/platform/UV: Update uv_mmrs.h to prepare for UV4A fixes (bsc#1076263 #fate#322814).
- x86/smpboot: Do not use mwait_play_dead() on AMD systems (bnc#1012382).
- x86/tsc: Prevent 32bit truncation in calc_hpet_ref() (bnc#1012382).
- x86/tsc: Provide 'tsc=unstable' boot parameter (bnc#1012382).
- xen: avoid type warning in xchg_xen_ulong (bnc#1012382).
- xen-netfront: Fix hang on device removal (bnc#1012382).
- xfrm: fix state migration copy replay sequence numbers (bnc#1012382).
- xfrm: Refuse to insert 32 bit userspace socket policies on 64 bit systems (bnc#1012382).
- xfrm_user: uncoditionally validate esn replay attribute struct (bnc#1012382).
- xfs: always verify the log tail during recovery (bsc#1036215).
- xfs: detect and handle invalid iclog size set by mkfs (bsc#1043598).
- xfs: detect and trim torn writes during log recovery (bsc#1036215).
- xfs: fix log recovery corruption error due to tail overwrite (bsc#1036215).
- xfs: fix recovery failure when log record header wraps log end (bsc#1036215).
- xfs: handle -EFSCORRUPTED during head/tail verification (bsc#1036215).
- xfs: refactor and open code log record crc check (bsc#1036215).
- xfs: refactor log record start detection into a new helper (bsc#1036215).
- xfs: return start block of first bad log record during recovery (bsc#1036215).
- xfs: support a crc verification only log record pass (bsc#1036215).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005778">SUSE bug 1005778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005780">SUSE bug 1005780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005781">SUSE bug 1005781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009062">SUSE bug 1009062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015336">SUSE bug 1015336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015337">SUSE bug 1015337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015340">SUSE bug 1015340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015342">SUSE bug 1015342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015343">SUSE bug 1015343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022604">SUSE bug 1022604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022743">SUSE bug 1022743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024296">SUSE bug 1024296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031492">SUSE bug 1031492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036215">SUSE bug 1036215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043598">SUSE bug 1043598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044596">SUSE bug 1044596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056415">SUSE bug 1056415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056427">SUSE bug 1056427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060799">SUSE bug 1060799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075087">SUSE bug 1075087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075091">SUSE bug 1075091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075994">SUSE bug 1075994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076263">SUSE bug 1076263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080157">SUSE bug 1080157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082153">SUSE bug 1082153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082299">SUSE bug 1082299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082485">SUSE bug 1082485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082962">SUSE bug 1082962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083125">SUSE bug 1083125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083635">SUSE bug 1083635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083650">SUSE bug 1083650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083900">SUSE bug 1083900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084721">SUSE bug 1084721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085058">SUSE bug 1085058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085185">SUSE bug 1085185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085511">SUSE bug 1085511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085958">SUSE bug 1085958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088242">SUSE bug 1088242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088865">SUSE bug 1088865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089023">SUSE bug 1089023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089115">SUSE bug 1089115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089198">SUSE bug 1089198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089393">SUSE bug 1089393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089608">SUSE bug 1089608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089644">SUSE bug 1089644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089752">SUSE bug 1089752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089895">SUSE bug 1089895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089925">SUSE bug 1089925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090225">SUSE bug 1090225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090643">SUSE bug 1090643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090658">SUSE bug 1090658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090663">SUSE bug 1090663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090708">SUSE bug 1090708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090718">SUSE bug 1090718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090734">SUSE bug 1090734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090953">SUSE bug 1090953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091041">SUSE bug 1091041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091325">SUSE bug 1091325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091728">SUSE bug 1091728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091925">SUSE bug 1091925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091960">SUSE bug 1091960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092289">SUSE bug 1092289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092497">SUSE bug 1092497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092566">SUSE bug 1092566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092904">SUSE bug 1092904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093008">SUSE bug 1093008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093144">SUSE bug 1093144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093215">SUSE bug 1093215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094019">SUSE bug 1094019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802154">SUSE bug 802154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966170">SUSE bug 966170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966172">SUSE bug 966172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966186">SUSE bug 966186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966191">SUSE bug 966191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969476">SUSE bug 969476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969477">SUSE bug 969477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981348">SUSE bug 981348</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10087/">CVE-2018-10087</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10124/">CVE-2018-10124</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1065/">CVE-2018-1065</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1130/">CVE-2018-1130</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5803/">CVE-2018-5803</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7492/">CVE-2018-7492</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8781/">CVE-2018-8781</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520982" comment="kernel-default-4.4.131-94.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520983" comment="kernel-default-devel-4.4.131-94.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520984" comment="kernel-default-extra-4.4.131-94.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520985" comment="kernel-devel-4.4.131-94.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520986" comment="kernel-macros-4.4.131-94.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520987" comment="kernel-source-4.4.131-94.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520988" comment="kernel-syms-4.4.131-94.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78528" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1092061" ref_url="https://bugzilla.suse.com/1092061" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0494" ref_url="https://www.suse.com/security/cve/CVE-2018-0494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004075.html" source="SUSE-SU"/>
		<description>
This update for wget fixes the following issues:

- CVE-2018-0494: Fixed a cookie injection vulnerability by checking for
  and joining continuation lines. (bsc#1092061)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092061">SUSE bug 1092061</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0494/">CVE-2018-0494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520989" comment="wget-1.14-21.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78529" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1068664" ref_url="https://bugzilla.suse.com/1068664" source="BUGZILLA"/>
		<reference ref_id="1079300" ref_url="https://bugzilla.suse.com/1079300" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000158" ref_url="https://www.suse.com/security/cve/CVE-2017-1000158/" source="CVE"/>
		<reference ref_id="CVE-2018-1000030" ref_url="https://www.suse.com/security/cve/CVE-2018-1000030/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004074.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

Security issues fixed:

- CVE-2017-1000158: Fixed integer overflows in PyString_DecodeEscape that could have resulted in
  heap-based buffer overflow attacks and possible arbitrary code execution (bsc#1068664).
- CVE-2018-1000030: Fixed crash inside the Python interpreter when multiple threads used the same
  I/O stream concurrently (bsc#1079300).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068664">SUSE bug 1068664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079300">SUSE bug 1079300</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000158/">CVE-2017-1000158</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000030/">CVE-2018-1000030</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520990" comment="libpython2_7-1_0-2.7.13-28.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520991" comment="libpython2_7-1_0-32bit-2.7.13-28.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520992" comment="python-2.7.13-28.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520993" comment="python-base-2.7.13-28.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520994" comment="python-curses-2.7.13-28.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520995" comment="python-devel-2.7.13-28.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520996" comment="python-tk-2.7.13-28.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520997" comment="python-xml-2.7.13-28.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78530" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1047044" ref_url="https://bugzilla.suse.com/1047044" source="BUGZILLA"/>
		<reference ref_id="1047898" ref_url="https://bugzilla.suse.com/1047898" source="BUGZILLA"/>
		<reference ref_id="1050120" ref_url="https://bugzilla.suse.com/1050120" source="BUGZILLA"/>
		<reference ref_id="1050606" ref_url="https://bugzilla.suse.com/1050606" source="BUGZILLA"/>
		<reference ref_id="1051446" ref_url="https://bugzilla.suse.com/1051446" source="BUGZILLA"/>
		<reference ref_id="1052468" ref_url="https://bugzilla.suse.com/1052468" source="BUGZILLA"/>
		<reference ref_id="1052550" ref_url="https://bugzilla.suse.com/1052550" source="BUGZILLA"/>
		<reference ref_id="1052710" ref_url="https://bugzilla.suse.com/1052710" source="BUGZILLA"/>
		<reference ref_id="1052720" ref_url="https://bugzilla.suse.com/1052720" source="BUGZILLA"/>
		<reference ref_id="1052731" ref_url="https://bugzilla.suse.com/1052731" source="BUGZILLA"/>
		<reference ref_id="1052732" ref_url="https://bugzilla.suse.com/1052732" source="BUGZILLA"/>
		<reference ref_id="1055065" ref_url="https://bugzilla.suse.com/1055065" source="BUGZILLA"/>
		<reference ref_id="1055323" ref_url="https://bugzilla.suse.com/1055323" source="BUGZILLA"/>
		<reference ref_id="1055434" ref_url="https://bugzilla.suse.com/1055434" source="BUGZILLA"/>
		<reference ref_id="1055855" ref_url="https://bugzilla.suse.com/1055855" source="BUGZILLA"/>
		<reference ref_id="1058640" ref_url="https://bugzilla.suse.com/1058640" source="BUGZILLA"/>
		<reference ref_id="1059751" ref_url="https://bugzilla.suse.com/1059751" source="BUGZILLA"/>
		<reference ref_id="1074123" ref_url="https://bugzilla.suse.com/1074123" source="BUGZILLA"/>
		<reference ref_id="1074969" ref_url="https://bugzilla.suse.com/1074969" source="BUGZILLA"/>
		<reference ref_id="1074973" ref_url="https://bugzilla.suse.com/1074973" source="BUGZILLA"/>
		<reference ref_id="1074975" ref_url="https://bugzilla.suse.com/1074975" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10800" ref_url="https://www.suse.com/security/cve/CVE-2017-10800/" source="CVE"/>
		<reference ref_id="CVE-2017-11141" ref_url="https://www.suse.com/security/cve/CVE-2017-11141/" source="CVE"/>
		<reference ref_id="CVE-2017-11529" ref_url="https://www.suse.com/security/cve/CVE-2017-11529/" source="CVE"/>
		<reference ref_id="CVE-2017-11644" ref_url="https://www.suse.com/security/cve/CVE-2017-11644/" source="CVE"/>
		<reference ref_id="CVE-2017-11724" ref_url="https://www.suse.com/security/cve/CVE-2017-11724/" source="CVE"/>
		<reference ref_id="CVE-2017-12434" ref_url="https://www.suse.com/security/cve/CVE-2017-12434/" source="CVE"/>
		<reference ref_id="CVE-2017-12564" ref_url="https://www.suse.com/security/cve/CVE-2017-12564/" source="CVE"/>
		<reference ref_id="CVE-2017-12667" ref_url="https://www.suse.com/security/cve/CVE-2017-12667/" source="CVE"/>
		<reference ref_id="CVE-2017-12670" ref_url="https://www.suse.com/security/cve/CVE-2017-12670/" source="CVE"/>
		<reference ref_id="CVE-2017-12672" ref_url="https://www.suse.com/security/cve/CVE-2017-12672/" source="CVE"/>
		<reference ref_id="CVE-2017-12675" ref_url="https://www.suse.com/security/cve/CVE-2017-12675/" source="CVE"/>
		<reference ref_id="CVE-2017-13060" ref_url="https://www.suse.com/security/cve/CVE-2017-13060/" source="CVE"/>
		<reference ref_id="CVE-2017-13146" ref_url="https://www.suse.com/security/cve/CVE-2017-13146/" source="CVE"/>
		<reference ref_id="CVE-2017-13648" ref_url="https://www.suse.com/security/cve/CVE-2017-13648/" source="CVE"/>
		<reference ref_id="CVE-2017-13658" ref_url="https://www.suse.com/security/cve/CVE-2017-13658/" source="CVE"/>
		<reference ref_id="CVE-2017-14326" ref_url="https://www.suse.com/security/cve/CVE-2017-14326/" source="CVE"/>
		<reference ref_id="CVE-2017-14533" ref_url="https://www.suse.com/security/cve/CVE-2017-14533/" source="CVE"/>
		<reference ref_id="CVE-2017-17881" ref_url="https://www.suse.com/security/cve/CVE-2017-17881/" source="CVE"/>
		<reference ref_id="CVE-2017-18022" ref_url="https://www.suse.com/security/cve/CVE-2017-18022/" source="CVE"/>
		<reference ref_id="CVE-2018-5246" ref_url="https://www.suse.com/security/cve/CVE-2018-5246/" source="CVE"/>
		<reference ref_id="CVE-2018-5247" ref_url="https://www.suse.com/security/cve/CVE-2018-5247/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2018-5246: Fixed memory leak vulnerability in ReadPATTERNImage in
  coders/pattern.c (bsc#1074973)
- CVE-2017-18022: Fixed memory leak vulnerability in MontageImageCommand in
  MagickWand/montage.c (bsc#1074975)
- CVE-2018-5247: Fixed memory leak vulnerability in ReadRLAImage in
  coders/rla.c (bsc#1074969)
- CVE-2017-12672: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial
  of service (bsc#1052720)
- CVE-2017-13060: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial
  of service via a crafted file (bsc#1055065)
- CVE-2017-11724: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c involving the quantum_info and clone_info
  data structures (bsc#1051446)
- CVE-2017-12670: Added validation in coders/mat.c to prevent an assertion
  failure in the function DestroyImage in MagickCore/image.c, which
  allowed attackers to cause a denial of service (bsc#1052731)
- CVE-2017-12667: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1052732)
- CVE-2017-13146: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1055323)
- CVE-2017-10800: Processing MATLAB images in coders/mat.c could have lead to a
  denial of service (OOM) in ReadMATImage() if the size specified for a
  MAT Object was larger than the actual amount of data (bsc#1047044)
- CVE-2017-13648: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1055434)
- CVE-2017-11141: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders\mat.c that could have caused memory exhaustion
  via a crafted MAT file, related to incorrect ordering of a
  SetImageExtent call (bsc#1047898)
- CVE-2017-11529: The ReadMATImage function in coders/mat.c allowed remote
  attackers to cause a denial of service (memory leak) via a crafted file
  (bsc#1050120)
- CVE-2017-12564: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial
  of service (bsc#1052468)
- CVE-2017-12434: Added a missing NULL check in the function ReadMATImage in
  coders/mat.c, which allowed attackers to cause a denial of service
  (assertion failure) in DestroyImageInfo in image.c (bsc#1052550)
- CVE-2017-12675: Added a missing check for multidimensional data coders/mat.c,
  that could have lead to a memory leak in the function ReadImage in
  MagickCore/constitute.c, which allowed attackers to cause a denial of
  service (bsc#1052710)
- CVE-2017-14326: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial
  of service via a crafted file (bsc#1058640)
- CVE-2017-11644: Processesing a crafted file in convert could have lead to a
  memory leak in the ReadMATImage() function in coders/mat.c
  (bsc#1050606)
- CVE-2017-13658: Added a missing NULL check in the ReadMATImage function in
  coders/mat.c, which could have lead to a denial of service (assertion
  failure and application exit) in the DestroyImageInfo function in
  MagickCore/image.c (bsc#1055855)
- CVE-2017-14533: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1059751)
- CVE-2017-17881: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service via a crafted MAT image file (bsc#1074123)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-18"/>
	<updated date="2018-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047044">SUSE bug 1047044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047898">SUSE bug 1047898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050120">SUSE bug 1050120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050606">SUSE bug 1050606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051446">SUSE bug 1051446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052468">SUSE bug 1052468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052550">SUSE bug 1052550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052710">SUSE bug 1052710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052720">SUSE bug 1052720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052731">SUSE bug 1052731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052732">SUSE bug 1052732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055065">SUSE bug 1055065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055323">SUSE bug 1055323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055434">SUSE bug 1055434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055855">SUSE bug 1055855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058640">SUSE bug 1058640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059751">SUSE bug 1059751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074123">SUSE bug 1074123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074969">SUSE bug 1074969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074973">SUSE bug 1074973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074975">SUSE bug 1074975</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10800/">CVE-2017-10800</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11141/">CVE-2017-11141</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11529/">CVE-2017-11529</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11644/">CVE-2017-11644</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11724/">CVE-2017-11724</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12434/">CVE-2017-12434</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12564/">CVE-2017-12564</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12667/">CVE-2017-12667</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12670/">CVE-2017-12670</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12672/">CVE-2017-12672</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12675/">CVE-2017-12675</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13060/">CVE-2017-13060</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13146/">CVE-2017-13146</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13648/">CVE-2017-13648</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13658/">CVE-2017-13658</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14326/">CVE-2017-14326</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14533/">CVE-2017-14533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17881/">CVE-2017-17881</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18022/">CVE-2017-18022</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5246/">CVE-2018-5246</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5247/">CVE-2018-5247</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519190" comment="ImageMagick-6.8.8.1-71.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519191" comment="libMagick++-6_Q16-3-6.8.8.1-71.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519192" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519193" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519194" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78531" version="1" class="patch">
	<metadata>
		<title>Security update for bash (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1000396" ref_url="https://bugzilla.suse.com/1000396" source="BUGZILLA"/>
		<reference ref_id="1001299" ref_url="https://bugzilla.suse.com/1001299" source="BUGZILLA"/>
		<reference ref_id="1086247" ref_url="https://bugzilla.suse.com/1086247" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0634" ref_url="https://www.suse.com/security/cve/CVE-2016-0634/" source="CVE"/>
		<reference ref_id="CVE-2016-7543" ref_url="https://www.suse.com/security/cve/CVE-2016-7543/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004084.html" source="SUSE-SU"/>
		<description>
This update for bash fixes the following issues:

Security issues fixed:

- CVE-2016-7543: A code execution possibility via SHELLOPTS+PS4 variable was fixed (bsc#1001299)
- CVE-2016-0634: Arbitrary code execution via malicious hostname was fixed (bsc#1000396)

Non-security issues fixed:

- Fix repeating self-calling of traps due the combination of a non-interactive shell, a trap handler for SIGINT, an
  external process in the trap handler, and a SIGINT within the trap after the external process runs. (bsc#1086247)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-23"/>
	<updated date="2018-05-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000396">SUSE bug 1000396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001299">SUSE bug 1001299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086247">SUSE bug 1086247</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0634/">CVE-2016-0634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7543/">CVE-2016-7543</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520998" comment="bash-4.3-83.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520999" comment="bash-doc-4.3-83.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521000" comment="bash-lang-4.3-83.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521001" comment="libreadline6-6.3-83.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521002" comment="libreadline6-32bit-6.3-83.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521003" comment="readline-doc-6.3-83.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78532" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1034674" ref_url="https://bugzilla.suse.com/1034674" source="BUGZILLA"/>
		<reference ref_id="1034678" ref_url="https://bugzilla.suse.com/1034678" source="BUGZILLA"/>
		<reference ref_id="1067203" ref_url="https://bugzilla.suse.com/1067203" source="BUGZILLA"/>
		<reference ref_id="1072193" ref_url="https://bugzilla.suse.com/1072193" source="BUGZILLA"/>
		<reference ref_id="1077999" ref_url="https://bugzilla.suse.com/1077999" source="BUGZILLA"/>
		<reference ref_id="1087932" ref_url="https://bugzilla.suse.com/1087932" source="BUGZILLA"/>
		<reference ref_id="929629" ref_url="https://bugzilla.suse.com/929629" source="BUGZILLA"/>
		<reference ref_id="990636" ref_url="https://bugzilla.suse.com/990636" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8146" ref_url="https://www.suse.com/security/cve/CVE-2014-8146/" source="CVE"/>
		<reference ref_id="CVE-2014-8147" ref_url="https://www.suse.com/security/cve/CVE-2014-8147/" source="CVE"/>
		<reference ref_id="CVE-2016-6293" ref_url="https://www.suse.com/security/cve/CVE-2016-6293/" source="CVE"/>
		<reference ref_id="CVE-2017-14952" ref_url="https://www.suse.com/security/cve/CVE-2017-14952/" source="CVE"/>
		<reference ref_id="CVE-2017-15422" ref_url="https://www.suse.com/security/cve/CVE-2017-15422/" source="CVE"/>
		<reference ref_id="CVE-2017-17484" ref_url="https://www.suse.com/security/cve/CVE-2017-17484/" source="CVE"/>
		<reference ref_id="CVE-2017-7867" ref_url="https://www.suse.com/security/cve/CVE-2017-7867/" source="CVE"/>
		<reference ref_id="CVE-2017-7868" ref_url="https://www.suse.com/security/cve/CVE-2017-7868/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004085.html" source="SUSE-SU"/>
		<description>
icu was updated to fix two security issues.

These security issues were fixed:
- CVE-2014-8147: The resolveImplicitLevels function in common/ubidi.c
  in the Unicode Bidirectional Algorithm implementation in ICU4C in
  International Components for Unicode (ICU) used an integer data type
  that is inconsistent with a header file, which allowed remote attackers
  to cause a denial of service (incorrect malloc followed by invalid free)
  or possibly execute arbitrary code via crafted text (bsc#929629).
- CVE-2014-8146: The resolveImplicitLevels function in common/ubidi.c
  in the Unicode Bidirectional Algorithm implementation in ICU4C in
  International Components for Unicode (ICU) did not properly track
  directionally isolated pieces of text, which allowed remote attackers
  to cause a denial of service (heap-based buffer overflow) or possibly
  execute arbitrary code via crafted text (bsc#929629).
- CVE-2016-6293: The uloc_acceptLanguageFromHTTP function in
  common/uloc.cpp in International Components for Unicode (ICU) for C/C++
  did not ensure that there is a '\0' character at the end of a certain
  temporary array, which allowed remote attackers to cause a denial of
  service (out-of-bounds read) or possibly have unspecified other impact
  via a call with a long httpAcceptLanguage argument (bsc#990636).
- CVE-2017-7868: International Components for Unicode (ICU) for C/C++
  2017-02-13 has an out-of-bounds write caused by a heap-based buffer
  overflow related to the utf8TextAccess function in common/utext.cpp and
  the utext_moveIndex32* function (bsc#1034674)
- CVE-2017-7867: International Components for Unicode (ICU) for C/C++
  2017-02-13 has an out-of-bounds write caused by a heap-based buffer
  overflow related to the utf8TextAccess function in common/utext.cpp and
  the utext_setNativeIndex* function (bsc#1034678)
- CVE-2017-14952: Double free in i18n/zonemeta.cpp in International
  Components for Unicode (ICU) for C/C++ allowed remote attackers to
  execute arbitrary code via a crafted string, aka a 'redundant UVector
  entry clean up function call' issue (bnc#1067203)
- CVE-2017-17484: The ucnv_UTF8FromUTF8 function in ucnv_u8.cpp
  in International Components for Unicode (ICU) for C/C++ mishandled
  ucnv_convertEx calls for UTF-8 to UTF-8 conversion, which allowed remote
  attackers to cause a denial of service (stack-based buffer overflow
  and application crash) or possibly have unspecified other impact via a
  crafted string, as demonstrated by ZNC  (bnc#1072193)
- CVE-2017-15422: An integer overflow in icu during persian calendar
  date processing could lead to incorrect years shown (bnc#1077999)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-23"/>
	<updated date="2018-05-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034674">SUSE bug 1034674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034678">SUSE bug 1034678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067203">SUSE bug 1067203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072193">SUSE bug 1072193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077999">SUSE bug 1077999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087932">SUSE bug 1087932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929629">SUSE bug 929629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990636">SUSE bug 990636</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8146/">CVE-2014-8146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8147/">CVE-2014-8147</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6293/">CVE-2016-6293</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14952/">CVE-2017-14952</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15422/">CVE-2017-15422</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17484/">CVE-2017-17484</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7867/">CVE-2017-7867</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7868/">CVE-2017-7868</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521004" comment="icu-52.1-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521005" comment="libicu52_1-52.1-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521006" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521007" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78533" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1051598" ref_url="https://bugzilla.suse.com/1051598" source="BUGZILLA"/>
		<reference ref_id="1054061" ref_url="https://bugzilla.suse.com/1054061" source="BUGZILLA"/>
		<reference ref_id="1056125" ref_url="https://bugzilla.suse.com/1056125" source="BUGZILLA"/>
		<reference ref_id="1056967" ref_url="https://bugzilla.suse.com/1056967" source="BUGZILLA"/>
		<reference ref_id="1059458" ref_url="https://bugzilla.suse.com/1059458" source="BUGZILLA"/>
		<reference ref_id="1060904" ref_url="https://bugzilla.suse.com/1060904" source="BUGZILLA"/>
		<reference ref_id="1061461" ref_url="https://bugzilla.suse.com/1061461" source="BUGZILLA"/>
		<reference ref_id="1063014" ref_url="https://bugzilla.suse.com/1063014" source="BUGZILLA"/>
		<reference ref_id="1066182" ref_url="https://bugzilla.suse.com/1066182" source="BUGZILLA"/>
		<reference ref_id="1066502" ref_url="https://bugzilla.suse.com/1066502" source="BUGZILLA"/>
		<reference ref_id="1067088" ref_url="https://bugzilla.suse.com/1067088" source="BUGZILLA"/>
		<reference ref_id="1067119" ref_url="https://bugzilla.suse.com/1067119" source="BUGZILLA"/>
		<reference ref_id="1067705" ref_url="https://bugzilla.suse.com/1067705" source="BUGZILLA"/>
		<reference ref_id="1070357" ref_url="https://bugzilla.suse.com/1070357" source="BUGZILLA"/>
		<reference ref_id="1071386" ref_url="https://bugzilla.suse.com/1071386" source="BUGZILLA"/>
		<reference ref_id="1074301" ref_url="https://bugzilla.suse.com/1074301" source="BUGZILLA"/>
		<reference ref_id="1079076" ref_url="https://bugzilla.suse.com/1079076" source="BUGZILLA"/>
		<reference ref_id="1080788" ref_url="https://bugzilla.suse.com/1080788" source="BUGZILLA"/>
		<reference ref_id="1081379" ref_url="https://bugzilla.suse.com/1081379" source="BUGZILLA"/>
		<reference ref_id="1081600" ref_url="https://bugzilla.suse.com/1081600" source="BUGZILLA"/>
		<reference ref_id="1086340" ref_url="https://bugzilla.suse.com/1086340" source="BUGZILLA"/>
		<reference ref_id="1087269" ref_url="https://bugzilla.suse.com/1087269" source="BUGZILLA"/>
		<reference ref_id="1087493" ref_url="https://bugzilla.suse.com/1087493" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16818" ref_url="https://www.suse.com/security/cve/CVE-2017-16818/" source="CVE"/>
		<reference ref_id="CVE-2018-7262" ref_url="https://www.suse.com/security/cve/CVE-2018-7262/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004086.html" source="SUSE-SU"/>
		<description>
This update for ceph fixes the following issues:

Security issues fixed:

- CVE-2018-7262: rgw: malformed http headers can crash rgw (bsc#1081379).
- CVE-2017-16818: User reachable asserts allow for DoS (bsc#1063014).

Bug fixes:

- bsc#1061461: OSDs keep generating coredumps after adding new OSD node to cluster.
- bsc#1079076: RGW openssl fixes.
- bsc#1067088: Upgrade to SES5 restarted all nodes, majority of OSDs aborts during start.
- bsc#1056125: Some OSDs are down when doing performance testing on rbd image in EC Pool.
- bsc#1087269: allow_ec_overwrites option not in command options list.
- bsc#1051598: Fix mountpoint check for systemctl enable --runtime.
- bsc#1070357: Zabbix mgr module doesn't recover from HEALTH_ERR.
- bsc#1066502: After upgrading a single OSD from SES 4 to SES 5 the OSDs do not rejoin the cluster.
- bsc#1067119: Crushtool decompile creates wrong device entries (device 20 device20) for not existing / deleted OSDs.
- bsc#1060904: Loglevel misleading during keystone authentication.
- bsc#1056967: Monitors goes down after pool creation on cluster with 120 OSDs.
- bsc#1067705: Issues with RGW Multi-Site Federation between SES5 and RH Ceph Storage 2.
- bsc#1059458: Stopping / restarting rados gateway as part of deepsea stage.4 executions causes core-dump of radosgw.
- bsc#1087493: Commvault cannot reconnect to storage after restarting haproxy.
- bsc#1066182: Container synchronization between two Ceph clusters failed.
- bsc#1081600: Crash in civetweb/RGW.
- bsc#1054061: NFS-GANESHA service failing while trying to list mountpoint on client.
- bsc#1074301: OSDs keep aborting: SnapMapper failed asserts.
- bsc#1086340: XFS metadata corruption on rbd-nbd mapped image with journaling feature enabled.
- bsc#1080788: fsid mismatch when creating additional OSDs.
- bsc#1071386: Metadata spill onto block.slow.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-07"/>
	<updated date="2018-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051598">SUSE bug 1051598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054061">SUSE bug 1054061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056125">SUSE bug 1056125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056967">SUSE bug 1056967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059458">SUSE bug 1059458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060904">SUSE bug 1060904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061461">SUSE bug 1061461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063014">SUSE bug 1063014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066182">SUSE bug 1066182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066502">SUSE bug 1066502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067088">SUSE bug 1067088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067119">SUSE bug 1067119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067705">SUSE bug 1067705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070357">SUSE bug 1070357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071386">SUSE bug 1071386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074301">SUSE bug 1074301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079076">SUSE bug 1079076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080788">SUSE bug 1080788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081379">SUSE bug 1081379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081600">SUSE bug 1081600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086340">SUSE bug 1086340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087269">SUSE bug 1087269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087493">SUSE bug 1087493</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16818/">CVE-2017-16818</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-7262/">CVE-2018-7262</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521008" comment="ceph-common-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521009" comment="libcephfs2-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521010" comment="librados2-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521011" comment="libradosstriper1-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521012" comment="librbd1-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521013" comment="librgw2-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521014" comment="python-cephfs-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521015" comment="python-rados-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521016" comment="python-rbd-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521017" comment="python-rgw-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78534" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1087020" ref_url="https://bugzilla.suse.com/1087020" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-9055" ref_url="https://www.suse.com/security/cve/CVE-2018-9055/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004087.html" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

   - CVE-2018-9055: denial of service via
      a reachable assertion in the function jpc_firstone in
      libjasper/jpc/jpc_math.c could lead to denial of service. (bsc#1087020)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-25"/>
	<updated date="2018-05-25"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1087020">SUSE bug 1087020</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9055/">CVE-2018-9055</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521018" comment="libjasper1-1.900.14-195.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521019" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78535" version="1" class="patch">
	<metadata>
		<title>Security update for libmodplug (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1022032" ref_url="https://bugzilla.suse.com/1022032" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4233" ref_url="https://www.suse.com/security/cve/CVE-2013-4233/" source="CVE"/>
		<reference ref_id="CVE-2013-4234" ref_url="https://www.suse.com/security/cve/CVE-2013-4234/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004089.html" source="SUSE-SU"/>
		<description>
This update for libmodplug fixes the following issues:

- Update to version 0.8.9.0+git20170610.f6dd59a bsc#1022032:
  * PSM: add missing line to commit
  * ABC: prevent possible increment of p past end
  * ABC: ensure read pointer is valid before incrementing
  * ABC: terminate early when things don't work in substitute
  * OKT: add one more bound check
  * FAR: out by one on check
  * ABC: 10 digit ints require null termination
  * PSM: make sure reads occur of only valid ins
  * ABC: cleanup tracks correctly.
  * WAV: check that there is space for both headers
  * OKT: ensure file size is enough to contain data
  * ABC: initialize earlier
  * ABC: ensure array access is bounded correctly.
  * ABC: clean up loop exiting code
  * ABC: avoid possibility of incrementing *p
  * ABC: abort early if macro would be blank
  * ABC: Use blankline more often
  * ABC: Ensure for loop does not increment past end of loop
  * Initialize nPatterns to 0 earlier
  * Check memory position isn't over the memory length
  * ABC: transpose only needs to look at notes (&lt;26)

- Update to version 0.8.9.0+git20171024.e9fc46e:
  * Spelling fixes
  * Bump version number to 0.8.9.0
  * MMCMP: Check that end pointer is within the file size
  * WAV: ensure integer doesn't overflow
  * XM: additional mempos check
  * sndmix: Don't process row if its empty.
  * snd_fx: dont include patterns of zero size in length calc
  * MT2,AMF: prevent OOB reads

- Add patch for broken pc file where quite some upstream refer to
  modplug directly without specifying the subdir it is in.

- Update to version 0.8.8.5
  * Some security issues: CVE-2013-4233, CVE-2013-4234, as well as
    many fixes suggested by static analyzers: clang build-scan, and coverity.
- Stop using dos2unix
- Run through spec-cleaner
- Use full URL in Source tag
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-28"/>
	<updated date="2018-05-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022032">SUSE bug 1022032</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4233/">CVE-2013-4233</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4234/">CVE-2013-4234</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521020" comment="libmodplug1-0.8.9.0+git20170610.f6dd59a-15.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78536" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1074562" ref_url="https://bugzilla.suse.com/1074562" source="BUGZILLA"/>
		<reference ref_id="1090296" ref_url="https://bugzilla.suse.com/1090296" source="BUGZILLA"/>
		<reference ref_id="1090822" ref_url="https://bugzilla.suse.com/1090822" source="BUGZILLA"/>
		<reference ref_id="1090823" ref_url="https://bugzilla.suse.com/1090823" source="BUGZILLA"/>
		<reference ref_id="1092631" ref_url="https://bugzilla.suse.com/1092631" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10981" ref_url="https://www.suse.com/security/cve/CVE-2018-10981/" source="CVE"/>
		<reference ref_id="CVE-2018-10982" ref_url="https://www.suse.com/security/cve/CVE-2018-10982/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004096.html" source="SUSE-SU"/>
		<description>

This update for xen fixes the following issues:

Security issues fixed:

- CVE-2018-3639: Spectre V4 – Speculative Store Bypass aka 'Memory Disambiguation' (bsc#1092631)

  This feature can be controlled by the 'ssbd=on/off' commandline flag for the XEN hypervisor.
- CVE-2018-10982: x86 vHPET interrupt injection errors (XSA-261 bsc#1090822)
- CVE-2018-10981: qemu may drive Xen into unbounded loop (XSA-262 bsc#1090823) 

Other bugfixes:

- Upstream patches from Jan (bsc#1027519)
- additional fixes related to Page Table Isolation (XPTI). (bsc#1074562 XSA-254)
- qemu-system-i386 cannot handle more than 4 HW NICs (bsc#1090296)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-29"/>
	<updated date="2018-05-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090296">SUSE bug 1090296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090822">SUSE bug 1090822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090823">SUSE bug 1090823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092631">SUSE bug 1092631</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10981/">CVE-2018-10981</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-10982/">CVE-2018-10982</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521021" comment="xen-4.9.2_06-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521022" comment="xen-libs-4.9.2_06-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521023" comment="xen-libs-32bit-4.9.2_06-3.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78537" version="1" class="patch">
	<metadata>
		<title>Security update for ntfs-3g_ntfsprogs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1130165" ref_url="https://bugzilla.suse.com/1130165" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9755" ref_url="https://www.suse.com/security/cve/CVE-2019-9755/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005359.html" source="SUSE-SU"/>
		<description>
This update for ntfs-3g_ntfsprogs fixes the following issues:

Security issues fixed:

- CVE-2019-9755: Fixed a heap-based buffer overflow which could lead to local privilege escalation (bsc#1130165).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-24"/>
	<updated date="2019-04-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1130165">SUSE bug 1130165</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9755/">CVE-2019-9755</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521024" comment="libntfs-3g84-2013.1.13-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521025" comment="ntfs-3g-2013.1.13-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521026" comment="ntfsprogs-2013.1.13-5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78538" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1126768" ref_url="https://bugzilla.suse.com/1126768" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8375" ref_url="https://www.suse.com/security/cve/CVE-2019-8375/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005360.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Security issue fixed: 

- CVE-2019-8375: Fixed an issue in UIProcess subsystem which could allow the script dialog
  size to exceed the web view size leading to Buffer Overflow or other unspecified impact (bsc#1126768).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-25"/>
	<updated date="2019-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1126768">SUSE bug 1126768</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8375/">CVE-2019-8375</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521027" comment="libjavascriptcoregtk-4_0-18-2.24.0-2.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521028" comment="libwebkit2gtk-4_0-37-2.24.0-2.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521029" comment="libwebkit2gtk3-lang-2.24.0-2.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521030" comment="typelib-1_0-JavaScriptCore-4_0-2.24.0-2.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521031" comment="typelib-1_0-WebKit2-4_0-2.24.0-2.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521032" comment="webkit2gtk-4_0-injected-bundles-2.24.0-2.38.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78539" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1106989" ref_url="https://bugzilla.suse.com/1106989" source="BUGZILLA"/>
		<reference ref_id="1106996" ref_url="https://bugzilla.suse.com/1106996" source="BUGZILLA"/>
		<reference ref_id="1107609" ref_url="https://bugzilla.suse.com/1107609" source="BUGZILLA"/>
		<reference ref_id="1120381" ref_url="https://bugzilla.suse.com/1120381" source="BUGZILLA"/>
		<reference ref_id="1122033" ref_url="https://bugzilla.suse.com/1122033" source="BUGZILLA"/>
		<reference ref_id="1124365" ref_url="https://bugzilla.suse.com/1124365" source="BUGZILLA"/>
		<reference ref_id="1124366" ref_url="https://bugzilla.suse.com/1124366" source="BUGZILLA"/>
		<reference ref_id="1124368" ref_url="https://bugzilla.suse.com/1124368" source="BUGZILLA"/>
		<reference ref_id="1128649" ref_url="https://bugzilla.suse.com/1128649" source="BUGZILLA"/>
		<reference ref_id="1130330" ref_url="https://bugzilla.suse.com/1130330" source="BUGZILLA"/>
		<reference ref_id="1131317" ref_url="https://bugzilla.suse.com/1131317" source="BUGZILLA"/>
		<reference ref_id="1132053" ref_url="https://bugzilla.suse.com/1132053" source="BUGZILLA"/>
		<reference ref_id="1132054" ref_url="https://bugzilla.suse.com/1132054" source="BUGZILLA"/>
		<reference ref_id="1132060" ref_url="https://bugzilla.suse.com/1132060" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16412" ref_url="https://www.suse.com/security/cve/CVE-2018-16412/" source="CVE"/>
		<reference ref_id="CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<reference ref_id="CVE-2018-20467" ref_url="https://www.suse.com/security/cve/CVE-2018-20467/" source="CVE"/>
		<reference ref_id="CVE-2019-10650" ref_url="https://www.suse.com/security/cve/CVE-2019-10650/" source="CVE"/>
		<reference ref_id="CVE-2019-11007" ref_url="https://www.suse.com/security/cve/CVE-2019-11007/" source="CVE"/>
		<reference ref_id="CVE-2019-11008" ref_url="https://www.suse.com/security/cve/CVE-2019-11008/" source="CVE"/>
		<reference ref_id="CVE-2019-11009" ref_url="https://www.suse.com/security/cve/CVE-2019-11009/" source="CVE"/>
		<reference ref_id="CVE-2019-7175" ref_url="https://www.suse.com/security/cve/CVE-2019-7175/" source="CVE"/>
		<reference ref_id="CVE-2019-7395" ref_url="https://www.suse.com/security/cve/CVE-2019-7395/" source="CVE"/>
		<reference ref_id="CVE-2019-7397" ref_url="https://www.suse.com/security/cve/CVE-2019-7397/" source="CVE"/>
		<reference ref_id="CVE-2019-7398" ref_url="https://www.suse.com/security/cve/CVE-2019-7398/" source="CVE"/>
		<reference ref_id="CVE-2019-9956" ref_url="https://www.suse.com/security/cve/CVE-2019-9956/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-9956: Fixed a stack-based buffer overflow in PopHexPixel() (bsc#1130330).
- CVE-2019-10650: Fixed a heap-based buffer over-read in WriteTIFFImage() (bsc#1131317).
- CVE-2019-7175: Fixed multiple memory leaks in DecodeImage function (bsc#1128649).
- CVE-2018-20467: Fixed infinite loop in coders/bmp.c (bsc#1120381).
- CVE-2019-7398: Fixed a memory leak in the function WriteDIBImage (bsc#1124365).
- CVE-2019-7397: Fixed a memory leak in the function WritePDFImage (bsc#1124366).
- CVE-2019-7395: Fixed a memory leak in the function WritePSDChannel (bsc#1124368).
- CVE-2018-16413: Fixed a heap-based buffer over-read in PushShortPixel() (bsc#1106989).
- CVE-2018-16412: Fixed a heap-based buffer over-read in ParseImageResourceBlocks() (bsc#1106996).
- CVE-2018-16644: Fixed a regression in dcm coder (bsc#1107609).
- CVE-2019-11007: Fixed a heap-based buffer overflow in ReadMNGImage() (bsc#1132060).
- CVE-2019-11008: Fixed a heap-based buffer overflow in WriteXWDImage() (bsc#1132054).
- CVE-2019-11009: Fixed a heap-based buffer over-read in ReadXWDImage() (bsc#1132053).

- Added extra -config- packages with Postscript/EPS/PDF readers still enabled.

  Removing the PS decoders is used to harden ImageMagick against security issues within
  ghostscript. Enabling them might impact security. (bsc#1122033)

  These are two packages that can be selected:

  - ImageMagick-config-6-SUSE: This has the PS decoders disabled.
  - ImageMagick-config-6-upstream: This has the PS decoders enabled.

  Depending on your local needs install either one of them. The default is the -SUSE configuration.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-25"/>
	<updated date="2019-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106996">SUSE bug 1106996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120381">SUSE bug 1120381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122033">SUSE bug 1122033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124365">SUSE bug 1124365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124366">SUSE bug 1124366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124368">SUSE bug 1124368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128649">SUSE bug 1128649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130330">SUSE bug 1130330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131317">SUSE bug 1131317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132053">SUSE bug 1132053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132054">SUSE bug 1132054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132060">SUSE bug 1132060</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16412/">CVE-2018-16412</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20467/">CVE-2018-20467</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10650/">CVE-2019-10650</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11007/">CVE-2019-11007</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11008/">CVE-2019-11008</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11009/">CVE-2019-11009</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7175/">CVE-2019-7175</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-7395/">CVE-2019-7395</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7397/">CVE-2019-7397</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7398/">CVE-2019-7398</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9956/">CVE-2019-9956</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521033" comment="ImageMagick-6.8.8.1-71.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521034" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521035" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521036" comment="libMagick++-6_Q16-3-6.8.8.1-71.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521037" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521038" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521039" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78540" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1099590" ref_url="https://bugzilla.suse.com/1099590" source="BUGZILLA"/>
		<reference ref_id="1123755" ref_url="https://bugzilla.suse.com/1123755" source="BUGZILLA"/>
		<reference ref_id="1124223" ref_url="https://bugzilla.suse.com/1124223" source="BUGZILLA"/>
		<reference ref_id="1127153" ref_url="https://bugzilla.suse.com/1127153" source="BUGZILLA"/>
		<reference ref_id="1131060" ref_url="https://bugzilla.suse.com/1131060" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3880" ref_url="https://www.suse.com/security/cve/CVE-2019-3880/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005365.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

Security issue fixed:

- CVE-2019-3880: Fixed a path/symlink traversal vulnerability, which allowed an unprivileged user to save registry files outside a share (bsc#1131060).

Non-security issues fixed:

- Fix vfs_ceph ftruncate and fallocate handling (bsc#1127153).
- Abide by load_printers smb.conf parameter (bsc#1124223).
- s3:winbindd: let normalize_name_map() call find_domain_from_name_noinit() (bsc#1123755).
- s3:passdb: Do not return OK if we don't have pinfo set up (bsc#1099590).
- s3:winbind: Fix regression (bsc#1123755).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-25"/>
	<updated date="2019-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1099590">SUSE bug 1099590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123755">SUSE bug 1123755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124223">SUSE bug 1124223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127153">SUSE bug 1127153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131060">SUSE bug 1131060</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3880/">CVE-2019-3880</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521040" comment="libdcerpc-binding0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521041" comment="libdcerpc-binding0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521042" comment="libdcerpc0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521043" comment="libdcerpc0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521044" comment="libndr-krb5pac0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521045" comment="libndr-krb5pac0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521046" comment="libndr-nbt0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521047" comment="libndr-nbt0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521048" comment="libndr-standard0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521049" comment="libndr-standard0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521050" comment="libndr0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521051" comment="libndr0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521052" comment="libnetapi0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521053" comment="libnetapi0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521054" comment="libsamba-credentials0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521055" comment="libsamba-credentials0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521056" comment="libsamba-errors0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521057" comment="libsamba-errors0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521058" comment="libsamba-hostconfig0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521059" comment="libsamba-hostconfig0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521060" comment="libsamba-passdb0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521061" comment="libsamba-passdb0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521062" comment="libsamba-util0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521063" comment="libsamba-util0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521064" comment="libsamdb0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521065" comment="libsamdb0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521066" comment="libsmbclient0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521067" comment="libsmbclient0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521068" comment="libsmbconf0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521069" comment="libsmbconf0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521070" comment="libsmbldap0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521071" comment="libsmbldap0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521072" comment="libtevent-util0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521073" comment="libtevent-util0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521074" comment="libwbclient0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521075" comment="libwbclient0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521076" comment="samba-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521077" comment="samba-client-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521078" comment="samba-client-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521079" comment="samba-doc-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521080" comment="samba-libs-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521081" comment="samba-libs-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521082" comment="samba-winbind-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521083" comment="samba-winbind-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78541" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1131945" ref_url="https://bugzilla.suse.com/1131945" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10894" ref_url="https://www.suse.com/security/cve/CVE-2019-10894/" source="CVE"/>
		<reference ref_id="CVE-2019-10895" ref_url="https://www.suse.com/security/cve/CVE-2019-10895/" source="CVE"/>
		<reference ref_id="CVE-2019-10896" ref_url="https://www.suse.com/security/cve/CVE-2019-10896/" source="CVE"/>
		<reference ref_id="CVE-2019-10899" ref_url="https://www.suse.com/security/cve/CVE-2019-10899/" source="CVE"/>
		<reference ref_id="CVE-2019-10901" ref_url="https://www.suse.com/security/cve/CVE-2019-10901/" source="CVE"/>
		<reference ref_id="CVE-2019-10903" ref_url="https://www.suse.com/security/cve/CVE-2019-10903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005364.html" source="SUSE-SU"/>
		<description>
This update for wireshark to version 2.4.14 fixes the following issues:

Security issues fixed:

- CVE-2019-10895: NetScaler file parser crash.
- CVE-2019-10899: SRVLOC dissector crash.
- CVE-2019-10894: GSS-API dissector crash.
- CVE-2019-10896: DOF dissector crash.
- CVE-2019-10901: LDSS dissector crash.
- CVE-2019-10903: DCERPC SPOOLSS dissector crash.

Non-security issue fixed:

- Update to version 2.4.14 (bsc#1131945).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-25"/>
	<updated date="2019-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1131945">SUSE bug 1131945</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10894/">CVE-2019-10894</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10895/">CVE-2019-10895</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10896/">CVE-2019-10896</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10899/">CVE-2019-10899</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10901/">CVE-2019-10901</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10903/">CVE-2019-10903</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521084" comment="libwireshark9-2.4.14-48.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521085" comment="libwiretap7-2.4.14-48.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521086" comment="libwscodecs1-2.4.14-48.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521087" comment="libwsutil8-2.4.14-48.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521088" comment="wireshark-2.4.14-48.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521089" comment="wireshark-gtk-2.4.14-48.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78542" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1120813" ref_url="https://bugzilla.suse.com/1120813" source="BUGZILLA"/>
		<reference ref_id="1126325" ref_url="https://bugzilla.suse.com/1126325" source="BUGZILLA"/>
		<reference ref_id="1127458" ref_url="https://bugzilla.suse.com/1127458" source="BUGZILLA"/>
		<reference ref_id="1131595" ref_url="https://bugzilla.suse.com/1131595" source="BUGZILLA"/>
		<reference ref_id="1131955" ref_url="https://bugzilla.suse.com/1131955" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3840" ref_url="https://www.suse.com/security/cve/CVE-2019-3840/" source="CVE"/>
		<reference ref_id="CVE-2019-3886" ref_url="https://www.suse.com/security/cve/CVE-2019-3886/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005368.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Security issues fixed: 

- CVE-2019-3840: Fixed a null pointer dereference vulnerability in virJSONValueObjectHasKey function which could 
  have resulted in a remote denial of service via the guest agent (bsc#1127458).  
- CVE-2019-3886: Fixed an information leak which allowed to retrieve the guest
  hostname under readonly mode (bsc#1131595).

Other issue addressed: 

- cpu: add Skylake-Server and Skylake-Server-IBRS CPU models (FATE#327261, bsc#1131955)
- libxl: save current memory value after successful balloon (bsc#1120813).
- libxl: support Xen's max_grant_frames setting with maxGrantFrames attribute on the xenbus controller (bsc#1126325).
- conf: add new 'xenbus' controller type
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-26"/>
	<updated date="2019-04-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120813">SUSE bug 1120813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126325">SUSE bug 1126325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127458">SUSE bug 1127458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131595">SUSE bug 1131595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131955">SUSE bug 1131955</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3840/">CVE-2019-3840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-3886/">CVE-2019-3886</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521090" comment="libvirt-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521091" comment="libvirt-admin-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521092" comment="libvirt-client-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521093" comment="libvirt-daemon-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521094" comment="libvirt-daemon-config-network-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521095" comment="libvirt-daemon-config-nwfilter-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521096" comment="libvirt-daemon-driver-interface-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521097" comment="libvirt-daemon-driver-libxl-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521098" comment="libvirt-daemon-driver-lxc-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521099" comment="libvirt-daemon-driver-network-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521100" comment="libvirt-daemon-driver-nodedev-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521101" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521102" comment="libvirt-daemon-driver-qemu-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521103" comment="libvirt-daemon-driver-secret-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521104" comment="libvirt-daemon-driver-storage-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521105" comment="libvirt-daemon-driver-storage-core-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521106" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521107" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521108" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521109" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521110" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521111" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521112" comment="libvirt-daemon-lxc-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521113" comment="libvirt-daemon-qemu-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521114" comment="libvirt-daemon-xen-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521115" comment="libvirt-doc-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521116" comment="libvirt-libs-3.3.0-5.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78543" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1130103" ref_url="https://bugzilla.suse.com/1130103" source="BUGZILLA"/>
		<reference ref_id="1133528" ref_url="https://bugzilla.suse.com/1133528" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005377.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

 - Incorrect upstream fix for CVE-2019-3859 broke public key authentication [bsc#1133528, bsc#1130103]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-27"/>
	<updated date="2019-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130103">SUSE bug 1130103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133528">SUSE bug 1133528</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521117" comment="libssh2-1-1.4.3-20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521118" comment="libssh2-1-32bit-1.4.3-20.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78544" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1104205" ref_url="https://bugzilla.suse.com/1104205" source="BUGZILLA"/>
		<reference ref_id="1109209" ref_url="https://bugzilla.suse.com/1109209" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14526" ref_url="https://www.suse.com/security/cve/CVE-2018-14526/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005409.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

This security issue was fixed:

- CVE-2018-14526: Under certain conditions, the integrity of EAPOL-Key messages
  was not checked, leading to a decryption oracle. An attacker within range of
  the Access Point and client could have abused the vulnerability to recover
  sensitive information (bsc#1104205).

This non-security issue was fixed:

- Enabled PWD as EAP method. This allows for password-based authentication,
  which is easier to setup than most of the other methods, and is used by the
  Eduroam network (bsc#1109209).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-29"/>
	<updated date="2019-04-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104205">SUSE bug 1104205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109209">SUSE bug 1109209</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14526/">CVE-2018-14526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521119" comment="wpa_supplicant-2.6-15.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78545" version="1" class="patch">
	<metadata>
		<title>Security update for atftp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1133114" ref_url="https://bugzilla.suse.com/1133114" source="BUGZILLA"/>
		<reference ref_id="1133145" ref_url="https://bugzilla.suse.com/1133145" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11365" ref_url="https://www.suse.com/security/cve/CVE-2019-11365/" source="CVE"/>
		<reference ref_id="CVE-2019-11366" ref_url="https://www.suse.com/security/cve/CVE-2019-11366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005408.html" source="SUSE-SU"/>
		<description>
This update for atftp fixes the following issues:

Security issues fixed:

- CVE-2019-11366: Fixed a denial of service caused by a NULL pointer dereference because thread_list_mutex was not locked (bsc#1133145).
- CVE-2019-11365: Fixed a buffer overflow which could lead to remote code execution caused by an insecure use of strncpy() (bsc#1133114).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-29"/>
	<updated date="2019-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133114">SUSE bug 1133114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133145">SUSE bug 1133145</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11365/">CVE-2019-11365</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11366/">CVE-2019-11366</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521120" comment="atftp-0.7.0-160.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78546" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1120489" ref_url="https://bugzilla.suse.com/1120489" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20217" ref_url="https://www.suse.com/security/cve/CVE-2018-20217/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005038.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following issues:

Security issue fixed:

- CVE-2018-20217: Fixed an assertion issue with older encryption types (bsc#1120489)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-17"/>
	<updated date="2019-01-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120489">SUSE bug 1120489</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20217/">CVE-2018-20217</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521121" comment="krb5-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521122" comment="krb5-32bit-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521123" comment="krb5-client-1.12.5-40.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78547" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1096209" ref_url="https://bugzilla.suse.com/1096209" source="BUGZILLA"/>
		<reference ref_id="1098155" ref_url="https://bugzilla.suse.com/1098155" source="BUGZILLA"/>
		<reference ref_id="1128712" ref_url="https://bugzilla.suse.com/1128712" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1152" ref_url="https://www.suse.com/security/cve/CVE-2018-1152/" source="CVE"/>
		<reference ref_id="CVE-2018-11813" ref_url="https://www.suse.com/security/cve/CVE-2018-11813/" source="CVE"/>
		<reference ref_id="CVE-2018-14498" ref_url="https://www.suse.com/security/cve/CVE-2018-14498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005415.html" source="SUSE-SU"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

The following security vulnerabilities were addressed:

- CVE-2018-14498: Fixed a heap-based buffer over read in get_8bit_row function
  which could allow to an attacker to cause denial of service (bsc#1128712).
- CVE-2018-11813: Fixed the end-of-file mishandling in read_pixel in rdtarga.c,
  which allowed remote attackers to cause a denial-of-service via crafted JPG
  files due to a large loop (bsc#1096209)
- CVE-2018-1152: Fixed a denial of service in start_input_bmp() rdbmp.c caused
  by a divide by zero when processing a crafted BMP image (bsc#1098155)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-30"/>
	<updated date="2019-04-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1096209">SUSE bug 1096209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098155">SUSE bug 1098155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128712">SUSE bug 1128712</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1152/">CVE-2018-1152</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11813/">CVE-2018-11813</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14498/">CVE-2018-14498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521124" comment="libjpeg-turbo-1.5.3-31.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521125" comment="libjpeg62-62.2.0-31.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521126" comment="libjpeg62-32bit-62.2.0-31.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521127" comment="libjpeg62-turbo-1.5.3-31.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521128" comment="libjpeg8-8.1.2-31.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521129" comment="libjpeg8-32bit-8.1.2-31.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521130" comment="libturbojpeg0-8.1.2-31.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78548" version="1" class="patch">
	<metadata>
		<title>Security update for hostinfo, supportutils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1054979" ref_url="https://bugzilla.suse.com/1054979" source="BUGZILLA"/>
		<reference ref_id="1099498" ref_url="https://bugzilla.suse.com/1099498" source="BUGZILLA"/>
		<reference ref_id="1115245" ref_url="https://bugzilla.suse.com/1115245" source="BUGZILLA"/>
		<reference ref_id="1117751" ref_url="https://bugzilla.suse.com/1117751" source="BUGZILLA"/>
		<reference ref_id="1117776" ref_url="https://bugzilla.suse.com/1117776" source="BUGZILLA"/>
		<reference ref_id="1118460" ref_url="https://bugzilla.suse.com/1118460" source="BUGZILLA"/>
		<reference ref_id="1118462" ref_url="https://bugzilla.suse.com/1118462" source="BUGZILLA"/>
		<reference ref_id="1118463" ref_url="https://bugzilla.suse.com/1118463" source="BUGZILLA"/>
		<reference ref_id="1125623" ref_url="https://bugzilla.suse.com/1125623" source="BUGZILLA"/>
		<reference ref_id="1125666" ref_url="https://bugzilla.suse.com/1125666" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19636" ref_url="https://www.suse.com/security/cve/CVE-2018-19636/" source="CVE"/>
		<reference ref_id="CVE-2018-19637" ref_url="https://www.suse.com/security/cve/CVE-2018-19637/" source="CVE"/>
		<reference ref_id="CVE-2018-19638" ref_url="https://www.suse.com/security/cve/CVE-2018-19638/" source="CVE"/>
		<reference ref_id="CVE-2018-19639" ref_url="https://www.suse.com/security/cve/CVE-2018-19639/" source="CVE"/>
		<reference ref_id="CVE-2018-19640" ref_url="https://www.suse.com/security/cve/CVE-2018-19640/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005417.html" source="SUSE-SU"/>
		<description>
This update for hostinfo, supportutils fixes the following issues:
	  
Security issues fixed for supportutils:

- CVE-2018-19640: Fixed an issue where  users could kill arbitrary processes (bsc#1118463).
- CVE-2018-19638: Fixed an issue where users could overwrite arbitrary log files (bsc#1118460).
- CVE-2018-19639: Fixed a code execution if run with -v (bsc#1118462).
- CVE-2018-19637: Fixed an issue where static temporary filename could allow overwriting of files (bsc#1117776).
- CVE-2018-19636: Fixed a local root exploit via inclusion of attacker controlled shell script (bsc#1117751).

Other issues fixed for supportutils:

- Fixed invalid exit code commands (bsc#1125666)
- SUSE separation in supportconfig (bsc#1125623)
- Clarified supportconfig(8) -x option (bsc#1115245)
- supportconfig: 3.0.127
- btrfs filesystem usage
- List products.d
- Dump lsof errors
- Added ha commands for corosync
- Dumped find errors in ib_info

Issues fixed in hostinfo:
- Removed extra kernel install dates (bsc#1099498)
- Resolved network bond issue (bsc#1054979)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-30"/>
	<updated date="2019-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1054979">SUSE bug 1054979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099498">SUSE bug 1099498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115245">SUSE bug 1115245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117751">SUSE bug 1117751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117776">SUSE bug 1117776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118460">SUSE bug 1118460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118462">SUSE bug 1118462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118463">SUSE bug 1118463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125623">SUSE bug 1125623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125666">SUSE bug 1125666</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19636/">CVE-2018-19636</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19637/">CVE-2018-19637</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19638/">CVE-2018-19638</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19639/">CVE-2018-19639</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19640/">CVE-2018-19640</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521131" comment="supportutils-3.0-95.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78549" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1131291" ref_url="https://bugzilla.suse.com/1131291" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2019:1136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005421.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- Reject invalid EC point coordinates (bsc#1131291)

  This helps openssl using services that do not do this verification on their own.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-03"/>
	<updated date="2019-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1131291">SUSE bug 1131291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521132" comment="libopenssl-devel-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521133" comment="libopenssl1_0_0-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521134" comment="libopenssl1_0_0-32bit-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521135" comment="openssl-1.0.2j-60.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78550" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1132256" ref_url="https://bugzilla.suse.com/1132256" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11070" ref_url="https://www.suse.com/security/cve/CVE-2019-11070/" source="CVE"/>
		<reference ref_id="CVE-2019-6201" ref_url="https://www.suse.com/security/cve/CVE-2019-6201/" source="CVE"/>
		<reference ref_id="CVE-2019-6251" ref_url="https://www.suse.com/security/cve/CVE-2019-6251/" source="CVE"/>
		<reference ref_id="CVE-2019-7285" ref_url="https://www.suse.com/security/cve/CVE-2019-7285/" source="CVE"/>
		<reference ref_id="CVE-2019-7292" ref_url="https://www.suse.com/security/cve/CVE-2019-7292/" source="CVE"/>
		<reference ref_id="CVE-2019-8503" ref_url="https://www.suse.com/security/cve/CVE-2019-8503/" source="CVE"/>
		<reference ref_id="CVE-2019-8506" ref_url="https://www.suse.com/security/cve/CVE-2019-8506/" source="CVE"/>
		<reference ref_id="CVE-2019-8515" ref_url="https://www.suse.com/security/cve/CVE-2019-8515/" source="CVE"/>
		<reference ref_id="CVE-2019-8524" ref_url="https://www.suse.com/security/cve/CVE-2019-8524/" source="CVE"/>
		<reference ref_id="CVE-2019-8535" ref_url="https://www.suse.com/security/cve/CVE-2019-8535/" source="CVE"/>
		<reference ref_id="CVE-2019-8536" ref_url="https://www.suse.com/security/cve/CVE-2019-8536/" source="CVE"/>
		<reference ref_id="CVE-2019-8544" ref_url="https://www.suse.com/security/cve/CVE-2019-8544/" source="CVE"/>
		<reference ref_id="CVE-2019-8551" ref_url="https://www.suse.com/security/cve/CVE-2019-8551/" source="CVE"/>
		<reference ref_id="CVE-2019-8558" ref_url="https://www.suse.com/security/cve/CVE-2019-8558/" source="CVE"/>
		<reference ref_id="CVE-2019-8559" ref_url="https://www.suse.com/security/cve/CVE-2019-8559/" source="CVE"/>
		<reference ref_id="CVE-2019-8563" ref_url="https://www.suse.com/security/cve/CVE-2019-8563/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.24.1 fixes the following issues:

Security issues fixed:

- CVE-2019-6201, CVE-2019-6251, CVE-2019-7285, CVE-2019-7292, CVE-2019-8503, CVE-2019-8506,
  CVE-2019-8515, CVE-2019-8524, CVE-2019-8535, CVE-2019-8536, CVE-2019-8544, CVE-2019-8551,
  CVE-2019-8558, CVE-2019-8559, CVE-2019-8563, CVE-2019-11070 (bsc#1132256).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-06"/>
	<updated date="2019-05-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11070/">CVE-2019-11070</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6201/">CVE-2019-6201</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-6251/">CVE-2019-6251</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7285/">CVE-2019-7285</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7292/">CVE-2019-7292</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8503/">CVE-2019-8503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8506/">CVE-2019-8506</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8515/">CVE-2019-8515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8524/">CVE-2019-8524</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8535/">CVE-2019-8535</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8536/">CVE-2019-8536</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8544/">CVE-2019-8544</cve>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8551/">CVE-2019-8551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8558/">CVE-2019-8558</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8559/">CVE-2019-8559</cve>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8563/">CVE-2019-8563</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78551" version="1" class="patch">
	<metadata>
		<title>Security update for audit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1042781" ref_url="https://bugzilla.suse.com/1042781" source="BUGZILLA"/>
		<reference ref_id="1085003" ref_url="https://bugzilla.suse.com/1085003" source="BUGZILLA"/>
		<reference ref_id="1125535" ref_url="https://bugzilla.suse.com/1125535" source="BUGZILLA"/>
		<reference ref_id="941922" ref_url="https://bugzilla.suse.com/941922" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5186" ref_url="https://www.suse.com/security/cve/CVE-2015-5186/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005428.html" source="SUSE-SU"/>
		<description>

This update for audit fixes the following issues:

Audit on SUSE Linux Enterprise 12 SP3 was updated to 2.8.1 to bring
new features and bugfixes.  (bsc#1125535 FATE#326346)

* Many features were added to auparse_normalize
* cli option added to auditd and audispd for setting config dir
* In auditd, restore the umask after creating a log file
* Option added to auditd for skipping email verification

The full changelog can be found here: http://people.redhat.com/sgrubb/audit/ChangeLog


- Change openldap dependency to client only (bsc#1085003)

Minor security issue fixed:

- CVE-2015-5186: Audit: log terminal emulator escape sequences handling (bsc#941922)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-07"/>
	<updated date="2019-05-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042781">SUSE bug 1042781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085003">SUSE bug 1085003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125535">SUSE bug 1125535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941922">SUSE bug 941922</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5186/">CVE-2015-5186</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521142" comment="audit-2.8.1-8.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521143" comment="libaudit1-2.8.1-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521144" comment="libaudit1-32bit-2.8.1-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521145" comment="libauparse0-2.8.1-8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78552" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1061343" ref_url="https://bugzilla.suse.com/1061343" source="BUGZILLA"/>
		<reference ref_id="1094717" ref_url="https://bugzilla.suse.com/1094717" source="BUGZILLA"/>
		<reference ref_id="1101428" ref_url="https://bugzilla.suse.com/1101428" source="BUGZILLA"/>
		<reference ref_id="1101566" ref_url="https://bugzilla.suse.com/1101566" source="BUGZILLA"/>
		<reference ref_id="1101567" ref_url="https://bugzilla.suse.com/1101567" source="BUGZILLA"/>
		<reference ref_id="1101568" ref_url="https://bugzilla.suse.com/1101568" source="BUGZILLA"/>
		<reference ref_id="1101569" ref_url="https://bugzilla.suse.com/1101569" source="BUGZILLA"/>
		<reference ref_id="1101570" ref_url="https://bugzilla.suse.com/1101570" source="BUGZILLA"/>
		<reference ref_id="1101571" ref_url="https://bugzilla.suse.com/1101571" source="BUGZILLA"/>
		<reference ref_id="1101573" ref_url="https://bugzilla.suse.com/1101573" source="BUGZILLA"/>
		<reference ref_id="1101576" ref_url="https://bugzilla.suse.com/1101576" source="BUGZILLA"/>
		<reference ref_id="1101577" ref_url="https://bugzilla.suse.com/1101577" source="BUGZILLA"/>
		<reference ref_id="1101578" ref_url="https://bugzilla.suse.com/1101578" source="BUGZILLA"/>
		<reference ref_id="1101581" ref_url="https://bugzilla.suse.com/1101581" source="BUGZILLA"/>
		<reference ref_id="1101582" ref_url="https://bugzilla.suse.com/1101582" source="BUGZILLA"/>
		<reference ref_id="1101583" ref_url="https://bugzilla.suse.com/1101583" source="BUGZILLA"/>
		<reference ref_id="1101588" ref_url="https://bugzilla.suse.com/1101588" source="BUGZILLA"/>
		<reference ref_id="1101589" ref_url="https://bugzilla.suse.com/1101589" source="BUGZILLA"/>
		<reference ref_id="980830" ref_url="https://bugzilla.suse.com/980830" source="BUGZILLA"/>
		<reference ref_id="982129" ref_url="https://bugzilla.suse.com/982129" source="BUGZILLA"/>
		<reference ref_id="986534" ref_url="https://bugzilla.suse.com/986534" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9116" ref_url="https://www.suse.com/security/cve/CVE-2014-9116/" source="CVE"/>
		<reference ref_id="CVE-2018-14349" ref_url="https://www.suse.com/security/cve/CVE-2018-14349/" source="CVE"/>
		<reference ref_id="CVE-2018-14350" ref_url="https://www.suse.com/security/cve/CVE-2018-14350/" source="CVE"/>
		<reference ref_id="CVE-2018-14351" ref_url="https://www.suse.com/security/cve/CVE-2018-14351/" source="CVE"/>
		<reference ref_id="CVE-2018-14352" ref_url="https://www.suse.com/security/cve/CVE-2018-14352/" source="CVE"/>
		<reference ref_id="CVE-2018-14353" ref_url="https://www.suse.com/security/cve/CVE-2018-14353/" source="CVE"/>
		<reference ref_id="CVE-2018-14354" ref_url="https://www.suse.com/security/cve/CVE-2018-14354/" source="CVE"/>
		<reference ref_id="CVE-2018-14355" ref_url="https://www.suse.com/security/cve/CVE-2018-14355/" source="CVE"/>
		<reference ref_id="CVE-2018-14356" ref_url="https://www.suse.com/security/cve/CVE-2018-14356/" source="CVE"/>
		<reference ref_id="CVE-2018-14357" ref_url="https://www.suse.com/security/cve/CVE-2018-14357/" source="CVE"/>
		<reference ref_id="CVE-2018-14358" ref_url="https://www.suse.com/security/cve/CVE-2018-14358/" source="CVE"/>
		<reference ref_id="CVE-2018-14359" ref_url="https://www.suse.com/security/cve/CVE-2018-14359/" source="CVE"/>
		<reference ref_id="CVE-2018-14360" ref_url="https://www.suse.com/security/cve/CVE-2018-14360/" source="CVE"/>
		<reference ref_id="CVE-2018-14361" ref_url="https://www.suse.com/security/cve/CVE-2018-14361/" source="CVE"/>
		<reference ref_id="CVE-2018-14362" ref_url="https://www.suse.com/security/cve/CVE-2018-14362/" source="CVE"/>
		<reference ref_id="CVE-2018-14363" ref_url="https://www.suse.com/security/cve/CVE-2018-14363/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005432.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

Security issues fixed:

- bsc#1101428: Mutt 1.10.1 security release update.
- CVE-2018-14351: Fix imap/command.c that mishandles long IMAP status mailbox literal count size (bsc#1101583).
- CVE-2018-14353: Fix imap_quote_string in imap/util.c that has an integer underflow (bsc#1101581).
- CVE-2018-14362: Fix pop.c that does not forbid characters that may have unsafe interaction with message-cache pathnames (bsc#1101567).
- CVE-2018-14354: Fix arbitrary command execution from remote IMAP servers via backquote characters (bsc#1101578).
- CVE-2018-14352: Fix imap_quote_string in imap/util.c that does not leave room for quote characters (bsc#1101582).
- CVE-2018-14356: Fix pop.c that mishandles a zero-length UID (bsc#1101576).
- CVE-2018-14355: Fix imap/util.c that mishandles '..' directory traversal in a mailbox name (bsc#1101577).
- CVE-2018-14349: Fix imap/command.c that mishandles a NO response without a message (bsc#1101589).
- CVE-2018-14350: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along INTERNALDATE field (bsc#1101588).
- CVE-2018-14363: Fix newsrc.c that does not properlyrestrict '/' characters that may have unsafe interaction with cache pathnames (bsc#1101566).
- CVE-2018-14359: Fix buffer overflow via base64 data (bsc#1101570).
- CVE-2018-14358: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along RFC822.SIZE field (bsc#1101571).
- CVE-2018-14360: Fix nntp_add_group in newsrc.c that has a stack-based buffer overflow because of incorrect sscanf usage (bsc#1101569).
- CVE-2018-14357: Fix that remote IMAP servers are allowed to execute arbitrary commands via backquote characters (bsc#1101573).
- CVE-2018-14361: Fix that nntp.c proceeds even if memory allocation fails for messages data (bsc#1101568).

Bug fixes:

- mutt reports as neomutt and incorrect version (bsc#1094717)
- No sidebar available in mutt 1.6.1 from Tumbleweed snapshot 20160517 (bsc#980830)
- mutt-1.6.1 unusable when built with --enable-sidebar (bsc#982129)
- (neo)mutt displaying times in Zulu time (bsc#1061343)
- mutt unconditionally segfaults when displaying a message (bsc#986534)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-09"/>
	<updated date="2019-05-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1061343">SUSE bug 1061343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094717">SUSE bug 1094717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101566">SUSE bug 1101566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101567">SUSE bug 1101567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101568">SUSE bug 1101568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101569">SUSE bug 1101569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101570">SUSE bug 1101570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101571">SUSE bug 1101571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101573">SUSE bug 1101573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101576">SUSE bug 1101576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101577">SUSE bug 1101577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101578">SUSE bug 1101578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101581">SUSE bug 1101581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101582">SUSE bug 1101582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101583">SUSE bug 1101583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101588">SUSE bug 1101588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101589">SUSE bug 1101589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980830">SUSE bug 980830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982129">SUSE bug 982129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986534">SUSE bug 986534</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9116/">CVE-2014-9116</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14349/">CVE-2018-14349</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14350/">CVE-2018-14350</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14351/">CVE-2018-14351</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14352/">CVE-2018-14352</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14353/">CVE-2018-14353</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14354/">CVE-2018-14354</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14355/">CVE-2018-14355</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14356/">CVE-2018-14356</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14357/">CVE-2018-14357</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14358/">CVE-2018-14358</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14359/">CVE-2018-14359</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-14360/">CVE-2018-14360</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-14361/">CVE-2018-14361</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14362/">CVE-2018-14362</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-14363/">CVE-2018-14363</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521146" comment="mutt-1.10.1-55.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78553" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1085790" ref_url="https://bugzilla.suse.com/1085790" source="BUGZILLA"/>
		<reference ref_id="1132045" ref_url="https://bugzilla.suse.com/1132045" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10989" ref_url="https://www.suse.com/security/cve/CVE-2017-10989/" source="CVE"/>
		<reference ref_id="CVE-2018-8740" ref_url="https://www.suse.com/security/cve/CVE-2018-8740/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005442.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

Security issue fixed:

- CVE-2018-8740: Fixed a NULL pointer dereference related to corrupted databases schemas (bsc#1085790).
- CVE-2017-10989: Fixed a heap-based buffer over-read in getNodeSize() (bsc#1132045).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-10"/>
	<updated date="2019-05-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085790">SUSE bug 1085790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132045">SUSE bug 1132045</bugzilla>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10989/">CVE-2017-10989</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8740/">CVE-2018-8740</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521147" comment="libsqlite3-0-3.8.10.2-9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521148" comment="libsqlite3-0-32bit-3.8.10.2-9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521149" comment="sqlite3-3.8.10.2-9.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78554" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1132728" ref_url="https://bugzilla.suse.com/1132728" source="BUGZILLA"/>
		<reference ref_id="1132729" ref_url="https://bugzilla.suse.com/1132729" source="BUGZILLA"/>
		<reference ref_id="1132732" ref_url="https://bugzilla.suse.com/1132732" source="BUGZILLA"/>
		<reference ref_id="1133135" ref_url="https://bugzilla.suse.com/1133135" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="CVE-2019-2426" ref_url="https://www.suse.com/security/cve/CVE-2019-2426/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005446.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version 8u212 fixes the following issues:

Security issues fixed:

- CVE-2019-2602: Better String parsing (bsc#1132728).
- CVE-2019-2684: More dynamic RMI interactions (bsc#1132732).
- CVE-2019-2698: Fuzzing TrueType fonts - setCurrGlyphID() (bsc#1132729).
- CVE-2019-2422: Better FileChannel (bsc#1122293).
- CVE-2018-11212: Improve JPEG (bsc#1122299).

Non-Security issue fixed:

- Disable LTO (bsc#1133135).
- Added Japanese new era name.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-13"/>
	<updated date="2019-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133135">SUSE bug 1133135</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2426/">CVE-2019-2426</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521150" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521151" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78555" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1132160" ref_url="https://bugzilla.suse.com/1132160" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005448.html" source="SUSE-SU"/>
		<description>
This update for libxslt fixes the following issues:

- CVE-2019-11068: Fixed a protection mechanism bypass where callers of 
  xsltCheckRead() and xsltCheckWrite() would permit access upon receiving an
  error (bsc#1132160).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-14"/>
	<updated date="2019-05-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1132160">SUSE bug 1132160</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521152" comment="libxslt-tools-1.1.28-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521153" comment="libxslt1-1.1.28-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521154" comment="libxslt1-32bit-1.1.28-17.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78556" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005459.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the CPU Microcode adjustments for the software mitigations.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Release notes:

- Processor             Identifier     Version       Products
- Model        Stepping F-MO-S/PI      Old-&gt;New
- ---- new platforms ----------------------------------------
- CLX-SP       B1       6-55-7/bf           05000021 Xeon Scalable Gen2
- ---- updated platforms ------------------------------------
- SNB          D2/G1/Q0 6-2a-7/12 0000002e-&gt;0000002f Core Gen2
- IVB          E1/L1    6-3a-9/12 00000020-&gt;00000021 Core Gen3
- HSW          C0       6-3c-3/32 00000025-&gt;00000027 Core Gen4
- BDW-U/Y      E0/F0    6-3d-4/c0 0000002b-&gt;0000002d Core Gen5
- IVB-E/EP     C1/M1/S1 6-3e-4/ed 0000042e-&gt;0000042f Core Gen3 X Series; Xeon E5 v2
- IVB-EX       D1       6-3e-7/ed 00000714-&gt;00000715 Xeon E7 v2
- HSX-E/EP     Cx/M1    6-3f-2/6f 00000041-&gt;00000043 Core Gen4 X series; Xeon E5 v3
- HSX-EX       E0       6-3f-4/80 00000013-&gt;00000014 Xeon E7 v3
- HSW-U        C0/D0    6-45-1/72 00000024-&gt;00000025 Core Gen4
- HSW-H        C0       6-46-1/32 0000001a-&gt;0000001b Core Gen4
- BDW-H/E3     E0/G0    6-47-1/22 0000001e-&gt;00000020 Core Gen5
- SKL-U/Y      D0/K1    6-4e-3/c0 000000c6-&gt;000000cc Core Gen6      
- SKX-SP       H0/M0/U0 6-55-4/b7 0200005a-&gt;0000005e Xeon Scalable
- SKX-D        M1       6-55-4/b7 0200005a-&gt;0000005e Xeon D-21xx
- BDX-DE       V1       6-56-2/10 00000019-&gt;0000001a Xeon D-1520/40
- BDX-DE       V2/3     6-56-3/10 07000016-&gt;07000017 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
- BDX-DE       Y0       6-56-4/10 0f000014-&gt;0f000015 Xeon D-1557/59/67/71/77/81/87
- BDX-NS       A0       6-56-5/10 0e00000c-&gt;0e00000d Xeon D-1513N/23/33/43/53
- APL          D0       6-5c-9/03 00000036-&gt;00000038 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
- SKL-H/S      R0/N0    6-5e-3/36 000000c6-&gt;000000cc Core Gen6; Xeon E3 v5
- DNV          B0       6-5f-1/01 00000024-&gt;0000002e Atom Processor C Series
- GLK          B0       6-7a-1/01 0000002c-&gt;0000002e Pentium Silver N/J5xxx, Celeron N/J4xxx
- AML-Y22      H0       6-8e-9/10 0000009e-&gt;000000b4 Core Gen8 Mobile
- KBL-U/Y      H0       6-8e-9/c0 0000009a-&gt;000000b4 Core Gen7 Mobile
- CFL-U43e     D0       6-8e-a/c0 0000009e-&gt;000000b4 Core Gen8 Mobile
- WHL-U        W0       6-8e-b/d0 000000a4-&gt;000000b8 Core Gen8 Mobile
- WHL-U        V0       6-8e-d/94 000000b2-&gt;000000b8 Core Gen8 Mobile
- KBL-G/H/S/E3 B0       6-9e-9/2a 0000009a-&gt;000000b4 Core Gen7; Xeon E3 v6
- CFL-H/S/E3   U0       6-9e-a/22 000000aa-&gt;000000b4 Core Gen8 Desktop, Mobile, Xeon E
- CFL-S        B0       6-9e-b/02 000000aa-&gt;000000b4 Core Gen8
- CFL-H/S      P0       6-9e-c/22 000000a2-&gt;000000ae Core Gen9
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-14"/>
	<updated date="2019-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521155" comment="ucode-intel-20190507-13.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78557" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005461.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091: Added x86 cpu feature 'md-clear' (bsc#1111331)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-14"/>
	<updated date="2019-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521156" comment="qemu-2.9.1-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521157" comment="qemu-block-curl-2.9.1-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521158" comment="qemu-ipxe-1.0.0+-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521159" comment="qemu-kvm-2.9.1-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521160" comment="qemu-seabios-1.10.2-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521161" comment="qemu-sgabios-8-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521162" comment="qemu-tools-2.9.1-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521163" comment="qemu-vgabios-1.10.2-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521164" comment="qemu-x86-2.9.1-6.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78558" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1020645" ref_url="https://bugzilla.suse.com/1020645" source="BUGZILLA"/>
		<reference ref_id="1020989" ref_url="https://bugzilla.suse.com/1020989" source="BUGZILLA"/>
		<reference ref_id="1031492" ref_url="https://bugzilla.suse.com/1031492" source="BUGZILLA"/>
		<reference ref_id="1047487" ref_url="https://bugzilla.suse.com/1047487" source="BUGZILLA"/>
		<reference ref_id="1051510" ref_url="https://bugzilla.suse.com/1051510" source="BUGZILLA"/>
		<reference ref_id="1053043" ref_url="https://bugzilla.suse.com/1053043" source="BUGZILLA"/>
		<reference ref_id="1062056" ref_url="https://bugzilla.suse.com/1062056" source="BUGZILLA"/>
		<reference ref_id="1063638" ref_url="https://bugzilla.suse.com/1063638" source="BUGZILLA"/>
		<reference ref_id="1066223" ref_url="https://bugzilla.suse.com/1066223" source="BUGZILLA"/>
		<reference ref_id="1070872" ref_url="https://bugzilla.suse.com/1070872" source="BUGZILLA"/>
		<reference ref_id="1085539" ref_url="https://bugzilla.suse.com/1085539" source="BUGZILLA"/>
		<reference ref_id="1087092" ref_url="https://bugzilla.suse.com/1087092" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1096480" ref_url="https://bugzilla.suse.com/1096480" source="BUGZILLA"/>
		<reference ref_id="1096728" ref_url="https://bugzilla.suse.com/1096728" source="BUGZILLA"/>
		<reference ref_id="1097104" ref_url="https://bugzilla.suse.com/1097104" source="BUGZILLA"/>
		<reference ref_id="1100132" ref_url="https://bugzilla.suse.com/1100132" source="BUGZILLA"/>
		<reference ref_id="1105348" ref_url="https://bugzilla.suse.com/1105348" source="BUGZILLA"/>
		<reference ref_id="1106110" ref_url="https://bugzilla.suse.com/1106110" source="BUGZILLA"/>
		<reference ref_id="1106913" ref_url="https://bugzilla.suse.com/1106913" source="BUGZILLA"/>
		<reference ref_id="1106929" ref_url="https://bugzilla.suse.com/1106929" source="BUGZILLA"/>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1112178" ref_url="https://bugzilla.suse.com/1112178" source="BUGZILLA"/>
		<reference ref_id="1113399" ref_url="https://bugzilla.suse.com/1113399" source="BUGZILLA"/>
		<reference ref_id="1114542" ref_url="https://bugzilla.suse.com/1114542" source="BUGZILLA"/>
		<reference ref_id="1114638" ref_url="https://bugzilla.suse.com/1114638" source="BUGZILLA"/>
		<reference ref_id="1114648" ref_url="https://bugzilla.suse.com/1114648" source="BUGZILLA"/>
		<reference ref_id="1114893" ref_url="https://bugzilla.suse.com/1114893" source="BUGZILLA"/>
		<reference ref_id="1118338" ref_url="https://bugzilla.suse.com/1118338" source="BUGZILLA"/>
		<reference ref_id="1118506" ref_url="https://bugzilla.suse.com/1118506" source="BUGZILLA"/>
		<reference ref_id="1119086" ref_url="https://bugzilla.suse.com/1119086" source="BUGZILLA"/>
		<reference ref_id="1120902" ref_url="https://bugzilla.suse.com/1120902" source="BUGZILLA"/>
		<reference ref_id="1122822" ref_url="https://bugzilla.suse.com/1122822" source="BUGZILLA"/>
		<reference ref_id="1125580" ref_url="https://bugzilla.suse.com/1125580" source="BUGZILLA"/>
		<reference ref_id="1126356" ref_url="https://bugzilla.suse.com/1126356" source="BUGZILLA"/>
		<reference ref_id="1127445" ref_url="https://bugzilla.suse.com/1127445" source="BUGZILLA"/>
		<reference ref_id="1129278" ref_url="https://bugzilla.suse.com/1129278" source="BUGZILLA"/>
		<reference ref_id="1129326" ref_url="https://bugzilla.suse.com/1129326" source="BUGZILLA"/>
		<reference ref_id="1129770" ref_url="https://bugzilla.suse.com/1129770" source="BUGZILLA"/>
		<reference ref_id="1130130" ref_url="https://bugzilla.suse.com/1130130" source="BUGZILLA"/>
		<reference ref_id="1130343" ref_url="https://bugzilla.suse.com/1130343" source="BUGZILLA"/>
		<reference ref_id="1130344" ref_url="https://bugzilla.suse.com/1130344" source="BUGZILLA"/>
		<reference ref_id="1130345" ref_url="https://bugzilla.suse.com/1130345" source="BUGZILLA"/>
		<reference ref_id="1130346" ref_url="https://bugzilla.suse.com/1130346" source="BUGZILLA"/>
		<reference ref_id="1130347" ref_url="https://bugzilla.suse.com/1130347" source="BUGZILLA"/>
		<reference ref_id="1130356" ref_url="https://bugzilla.suse.com/1130356" source="BUGZILLA"/>
		<reference ref_id="1130425" ref_url="https://bugzilla.suse.com/1130425" source="BUGZILLA"/>
		<reference ref_id="1130567" ref_url="https://bugzilla.suse.com/1130567" source="BUGZILLA"/>
		<reference ref_id="1130737" ref_url="https://bugzilla.suse.com/1130737" source="BUGZILLA"/>
		<reference ref_id="1131107" ref_url="https://bugzilla.suse.com/1131107" source="BUGZILLA"/>
		<reference ref_id="1131416" ref_url="https://bugzilla.suse.com/1131416" source="BUGZILLA"/>
		<reference ref_id="1131427" ref_url="https://bugzilla.suse.com/1131427" source="BUGZILLA"/>
		<reference ref_id="1131587" ref_url="https://bugzilla.suse.com/1131587" source="BUGZILLA"/>
		<reference ref_id="1131659" ref_url="https://bugzilla.suse.com/1131659" source="BUGZILLA"/>
		<reference ref_id="1131857" ref_url="https://bugzilla.suse.com/1131857" source="BUGZILLA"/>
		<reference ref_id="1131900" ref_url="https://bugzilla.suse.com/1131900" source="BUGZILLA"/>
		<reference ref_id="1131934" ref_url="https://bugzilla.suse.com/1131934" source="BUGZILLA"/>
		<reference ref_id="1131935" ref_url="https://bugzilla.suse.com/1131935" source="BUGZILLA"/>
		<reference ref_id="1131980" ref_url="https://bugzilla.suse.com/1131980" source="BUGZILLA"/>
		<reference ref_id="1132227" ref_url="https://bugzilla.suse.com/1132227" source="BUGZILLA"/>
		<reference ref_id="1132534" ref_url="https://bugzilla.suse.com/1132534" source="BUGZILLA"/>
		<reference ref_id="1132589" ref_url="https://bugzilla.suse.com/1132589" source="BUGZILLA"/>
		<reference ref_id="1132618" ref_url="https://bugzilla.suse.com/1132618" source="BUGZILLA"/>
		<reference ref_id="1132619" ref_url="https://bugzilla.suse.com/1132619" source="BUGZILLA"/>
		<reference ref_id="1132634" ref_url="https://bugzilla.suse.com/1132634" source="BUGZILLA"/>
		<reference ref_id="1132635" ref_url="https://bugzilla.suse.com/1132635" source="BUGZILLA"/>
		<reference ref_id="1132636" ref_url="https://bugzilla.suse.com/1132636" source="BUGZILLA"/>
		<reference ref_id="1132637" ref_url="https://bugzilla.suse.com/1132637" source="BUGZILLA"/>
		<reference ref_id="1132638" ref_url="https://bugzilla.suse.com/1132638" source="BUGZILLA"/>
		<reference ref_id="1132727" ref_url="https://bugzilla.suse.com/1132727" source="BUGZILLA"/>
		<reference ref_id="1132828" ref_url="https://bugzilla.suse.com/1132828" source="BUGZILLA"/>
		<reference ref_id="1133308" ref_url="https://bugzilla.suse.com/1133308" source="BUGZILLA"/>
		<reference ref_id="1133584" ref_url="https://bugzilla.suse.com/1133584" source="BUGZILLA"/>
		<reference ref_id="994770" ref_url="https://bugzilla.suse.com/994770" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000204" ref_url="https://www.suse.com/security/cve/CVE-2018-1000204/" source="CVE"/>
		<reference ref_id="CVE-2018-10853" ref_url="https://www.suse.com/security/cve/CVE-2018-10853/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-15594" ref_url="https://www.suse.com/security/cve/CVE-2018-15594/" source="CVE"/>
		<reference ref_id="CVE-2018-5814" ref_url="https://www.suse.com/security/cve/CVE-2018-5814/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-3882" ref_url="https://www.suse.com/security/cve/CVE-2019-3882/" source="CVE"/>
		<reference ref_id="CVE-2019-9503" ref_url="https://www.suse.com/security/cve/CVE-2019-9503/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.178 to receive various security and bugfixes.

Four new speculative execution issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

This kernel update contains software mitigations, utilizing CPU microcode updates shipped in parallel.

For more information on this set of information leaks, check out https://www.suse.com/support/kb/doc/?id=7023736

The following security issues fixed:

- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations could be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).
- CVE-2018-1000204: Prevent infoleak caused by incorrect handling of the SG_IO ioctl (bsc#1096728)
- CVE-2018-10853: A flaw was found in the way the KVM hypervisor emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest (bnc#1097104).
- CVE-2018-15594: arch/x86/kernel/paravirt.c mishandled certain indirect calls, which made it easier for attackers to conduct Spectre-v2 attacks against paravirtual guests (bnc#1105348).
- CVE-2019-9503: A brcmfmac frame validation bypass was fixed (bnc#1132828).
- CVE-2019-3882: A flaw was fixed in the vfio interface implementation that permitted violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable (bnc#1131416 bnc#1131427).

The following non-security bugs were fixed:

- 9p/net: fix memory leak in p9_client_create (bnc#1012382).
- 9p: use inode-&gt;i_lock to protect i_size_write() under 32-bit (bnc#1012382).
- acpi: acpi_pad: Do not launch acpi_pad threads on idle cpus (bsc#1113399).
- acpi / bus: Only call dmi_check_system() on X86 (git-fixes).
- acpi / button: make module loadable when booted in non-ACPI mode (bsc#1051510).
- acpi / device_sysfs: Avoid OF modalias creation for removed device (bnc#1012382).
- acpi: include ACPI button driver in base kernel (bsc#1062056).
- Add hlist_add_tail_rcu() (Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net) (bnc#1012382).
- alsa: bebob: use more identical mod_alias for Saffire Pro 10 I/O against Liquid Saffire 56 (bnc#1012382).
- alsa: compress: add support for 32bit calls in a 64bit kernel (bnc#1012382).
- alsa: compress: prevent potential divide by zero bugs (bnc#1012382).
- alsa: hda - Enforces runtime_resume after S3 and S4 for each codec (bnc#1012382).
- alsa: hda - Record the current power state before suspend/resume calls (bnc#1012382).
- alsa: pcm: Do not suspend stream in unrecoverable PCM state (bnc#1012382).
- alsa: pcm: Fix possible OOB access in PCM oss plugins (bnc#1012382).
- alsa: rawmidi: Fix potential Spectre v1 vulnerability (bnc#1012382).
- alsa: seq: oss: Fix Spectre v1 vulnerability (bnc#1012382).
- applicom: Fix potential Spectre v1 vulnerabilities (bnc#1012382).
- arc: fix __ffs return value to avoid build warnings (bnc#1012382).
- arc: uacces: remove lp_start, lp_end from clobber list (bnc#1012382).
- arcv2: Enable unaligned access in early ASM code (bnc#1012382).
- arm64: fix COMPAT_SHMLBA definition for large pages (bnc#1012382).
- arm64: Fix NUMA build error when !CONFIG_ACPI (fate#319981,  git-fixes).
- arm64: Fix NUMA build error when !CONFIG_ACPI (git-fixes).
- arm64: hide __efistub_ aliases from kallsyms (bnc#1012382).
- arm64: kconfig: drop CONFIG_RTC_LIB dependency (bnc#1012382).
- arm64/kernel: fix incorrect EL0 check in inv_entry macro (bnc#1012382).
- arm64: mm: Add trace_irqflags annotations to do_debug_exception() (bnc#1012382).
- arm64: Relax GIC version check during early boot (bnc#1012382).
- arm64: support keyctl() system call in 32-bit mode (bnc#1012382).
- arm64: traps: disable irq in die() (bnc#1012382).
- arm: 8458/1: bL_switcher: add GIC dependency (bnc#1012382).
- arm: 8494/1: mm: Enable PXN when running non-LPAE kernel on LPAE processor (bnc#1012382).
- arm: 8510/1: rework ARM_CPU_SUSPEND dependencies (bnc#1012382).
- arm: 8824/1: fix a migrating irq bug when hotplug cpu (bnc#1012382).
- arm: dts: exynos: Add minimal clkout parameters to Exynos3250 PMU (bnc#1012382).
- arm: dts: exynos: Do not ignore real-world fuse values for thermal zone 0 on Exynos5420 (bnc#1012382).
- arm: imx6q: cpuidle: fix bug that CPU might not wake up at expected time (bnc#1012382).
- arm: OMAP2+: Variable 'reg' in function omap4_dsi_mux_pads() could be uninitialized (bnc#1012382).
- arm: pxa: ssp: unneeded to free devm_ allocated data (bnc#1012382).
- arm: s3c24xx: Fix boolean expressions in osiris_dvs_notify (bnc#1012382).
- ASoC: dapm: change snprintf to scnprintf for possible overflow (bnc#1012382).
- ASoC: fsl_esai: fix register setting issue in RIGHT_J mode (bnc#1012382).
- ASoC: imx-audmux: change snprintf to scnprintf for possible overflow (bnc#1012382).
- ASoC: Intel: Haswell/Broadwell: fix setting for .dynamic field (bnc#1012382).
- ASoC: topology: free created components in tplg load error (bnc#1012382).
- assoc_array: Fix shortcut creation (bnc#1012382).
- ath10k: avoid possible string overflow (bnc#1012382).
- ath9k_htc: Add a sanity check in ath9k_htc_ampdu_action() (bsc#1087092).
- atm: he: fix sign-extension overflow on large shift (bnc#1012382).
- autofs: drop dentry reference only when it is never used (bnc#1012382).
- autofs: fix error return in autofs_fill_super() (bnc#1012382).
- batman-adv: Avoid endless loop in bat-on-bat netdevice check (git-fixes).
- batman-adv: Fix lockdep annotation of batadv_tlv_container_remove (git-fixes).
- batman-adv: fix uninit-value in batadv_interface_tx() (bnc#1012382).
- batman-adv: Only put gw_node list reference when removed (git-fixes).
- batman-adv: Only put orig_node_vlan list reference when removed (git-fixes).
- bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt (bnc#1012382).
- bnxt_en: Drop oversize TX packets to prevent errors (bnc#1012382).
- btrfs: Avoid possible qgroup_rsv_size overflow in btrfs_calculate_inode_block_rsv_size (git-fixes).
- btrfs: Fix bound checking in qgroup_trace_new_subtree_blocks (pending fix for bsc#1063638).
- btrfs: fix corruption reading shared and compressed extents after hole punching (bnc#1012382).
- btrfs: qgroup: Cleanup old subtree swap code (bsc#1063638).
- btrfs: qgroup: Do not trace subtree if we're dropping reloc tree (bsc#1063638).
- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1063638).
- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1063638).
- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1063638).
- btrfs: qgroup: Introduce trace event to analyse the number of dirty extents accounted (bsc#1063638 dependency).
- btrfs: qgroup: Only trace data extents in leaves if we're relocating data block group (bsc#1063638).
- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1063638).
- btrfs: qgroup: Search commit root for rescan to avoid missing extent (bsc#1129326).
- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1063638).
- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1063638).
- btrfs: raid56: properly unmap parity page in finish_parity_scrub() (bnc#1012382).
- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1063638).
- btrfs: remove WARN_ON in log_dir_items (bnc#1012382).
- cdc-wdm: pass return value of recover_from_urb_loss (bsc#1129770).
- cfg80211: extend range deviation for DMG (bnc#1012382).
- cfg80211: size various nl80211 messages correctly (bnc#1012382).
- cifs: fix computation for MAX_SMB2_HDR_SIZE (bnc#1012382).
- cifs: fix POSIX lock leak and invalid ptr deref (bsc#1114542).
- cifs: Fix read after write for files with read caching (bnc#1012382).
- clk: ingenic: Fix round_rate misbehaving with non-integer dividers (bnc#1012382).
- clocksource/drivers/exynos_mct: Clear timer interrupt when shutdown (bnc#1012382).
- clocksource/drivers/exynos_mct: Move one-shot check from tick clear to ISR (bnc#1012382).
- cls_bpf: reset class and reuse major in da (git-fixes).
- coresight: coresight_unregister() function cleanup (bnc#1012382).
- coresight: 'DEVICE_ATTR_RO' should defined as static (bnc#1012382).
- coresight: etm4x: Check every parameter used by dma_xx_coherent (bnc#1012382).
- coresight: fixing lockdep error (bnc#1012382).
- coresight: release reference taken by 'bus_find_device()' (bnc#1012382).
- coresight: remove csdev's link from topology (bnc#1012382).
- coresight: removing bind/unbind options from sysfs (bnc#1012382).
- cpufreq: pxa2xx: remove incorrect __init annotation (bnc#1012382).
- cpufreq: tegra124: add missing of_node_put() (bnc#1012382).
- cpufreq: Use struct kobj_attribute instead of struct global_attr (bnc#1012382).
- cpu/hotplug: Handle unbalanced hotplug enable/disable (bnc#1012382).
- cpu/speculation: Add 'mitigations=' cmdline option (bsc#1112178).
- crypto: ahash - fix another early termination in hash walk (bnc#1012382).
- crypto: arm64/aes-ccm - fix logical bug in AAD MAC handling (bnc#1012382).
- crypto: caam - fixed handling of sg list (bnc#1012382).
- crypto: pcbc - remove bogus memcpy()s with src == dest (bnc#1012382).
- crypto: qat - remove unused and redundant pointer vf_info (bsc#1085539).
- crypto: tgr192 - fix unaligned memory access (bsc#1129770).
- cw1200: fix missing unlock on error in cw1200_hw_scan() (bsc#1129770).
- dccp: do not use ipv6 header for ipv4 flow (bnc#1012382).
- disable kgdboc failed by echo space to /sys/module/kgdboc/parameters/kgdboc (bnc#1012382).
- dmaengine: at_xdmac: Fix wrongfull report of a channel as in use (bnc#1012382).
- dmaengine: dmatest: Abort test in case of mapping error (bnc#1012382).
- dmaengine: usb-dmac: Make DMAC system sleep callbacks explicit (bnc#1012382).
- dm: disable DISCARD if the underlying storage no longer supports it (bsc#1114638).
- dm: fix to_sector() for 32bit (bnc#1012382).
- drivers: hv: vmbus: Fix bugs in rescind handling (bsc#1130567).
- drivers: hv: vmbus: Fix ring buffer signaling (bsc#1118506).
- drivers: hv: vmbus: Fix the offer_in_progress in vmbus_process_offer() (bsc#1130567).
- drivers: hv: vmbus: Offload the handling of channels to two workqueues (bsc#1130567).
- drivers: hv: vmbus: Reset the channel callback in vmbus_onoffer_rescind() (bsc#1130567).
- drm/msm: Unblock writer if reader closes file (bnc#1012382).
- drm/vmwgfx: Do not double-free the mode stored in par-&gt;set_mode (bsc#1106929)
- efi: stub: define DISABLE_BRANCH_PROFILING for all architectures (bnc#1012382).
- ext2: Fix underflow in ext2_max_size() (bnc#1012382).
- ext4: Avoid panic during forced reboot (bsc#1126356).
- ext4: brelse all indirect buffer in ext4_ind_remove_space() (bnc#1012382).
- ext4: fix data corruption caused by unaligned direct AIO (bnc#1012382).
- ext4: fix NULL pointer dereference while journal is aborted (bnc#1012382).
- extcon: usb-gpio: Do not miss event during suspend/resume (bnc#1012382).
- firmware: dmi: Optimize dmi_matches (git-fixes).
- floppy: check_events callback should not return a negative number (git-fixes).
- flow_dissector: Check for IP fragmentation even if not using IPv4 address (git-fixes).
- fs/9p: use fscache mutex rather than spinlock (bnc#1012382).
- fs/nfs: Fix nfs_parse_devname to not modify it's argument (git-fixes).
- fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links (bnc#1012382).
- fuse: continue to send FUSE_RELEASEDIR when FUSE_OPEN returns ENOSYS (git-fixes).
- fuse: fix possibly missed wake-up after abort (git-fixes).
- futex: Ensure that futex address is aligned in handle_futex_death() (bnc#1012382).
- futex,rt_mutex: Fix rt_mutex_cleanup_proxy_lock() (git-fixes).
- futex,rt_mutex: Restructure rt_mutex_finish_proxy_lock() (bnc#1012382).
- gpio: adnp: Fix testing wrong value in adnp_gpio_direction_input (bnc#1012382).
- gpio: vf610: Mask all GPIO interrupts (bnc#1012382).
- gro_cells: make sure device is up in gro_cells_receive() (bnc#1012382).
- hid-sensor-hub.c: fix wrong do_div() usage (bnc#1012382).
- hpet: Fix missing '=' character in the __setup() code of hpet_mmap_enable (bsc#1129770).
- hugetlbfs: fix races and page leaks during migration (bnc#1012382).
- hv_netvsc: Fix napi reschedule while receive completion is busy (bsc#1118506).
- hv_netvsc: fix race in napi poll when rescheduling (bsc#1118506).
- hv_netvsc: Fix the return status in RX path (bsc#1118506).
- hv_netvsc: use napi_schedule_irqoff (bsc#1118506).
- hv: v4.12 API for hyperv-iommu (bsc#1122822).
- hv: v4.12 API for hyperv-iommu (fate#327171, bsc#1122822).
- i2c: cadence: Fix the hold bit setting (bnc#1012382).
- i2c: tegra: fix maximum transfer size (bnc#1012382).
- ib/{hfi1, qib}: Fix WC.byte_len calculation for UD_SEND_WITH_IMM (bnc#1012382).
- ibmvnic: Enable GRO (bsc#1132227).
- ibmvnic: Fix completion structure initialization (bsc#1131659).
- ibmvnic: Fix netdev feature clobbering during a reset (bsc#1132227).
- input: elan_i2c - add id for touchpad found in Lenovo s21e-20 (bnc#1012382).
- input: matrix_keypad - use flush_delayed_work() (bnc#1012382).
- input: st-keyscan - fix potential zalloc NULL dereference (bnc#1012382).
- input: wacom_serial4 - add support for Wacom ArtPad II tablet (bnc#1012382).
- intel_th: Do not reference unassigned outputs (bnc#1012382).
- intel_th: gth: Fix an off-by-one in output unassigning (git-fixes).
- iommu/amd: Fix NULL dereference bug in match_hid_uid (bsc#1130345).
- iommu/amd: fix sg-&gt;dma_address for sg-&gt;offset bigger than PAGE_SIZE (bsc#1130346).
- iommu/amd: Reserve exclusion range in iova-domain (bsc#1130425).
- iommu/amd: Set exclusion range correctly (bsc#1130425).
- iommu: Do not print warning when IOMMU driver only supports unmanaged domains (bsc#1130130).
- iommu/hyper-v: Add Hyper-V stub IOMMU driver (bsc#1122822).
- iommu/hyper-v: Add Hyper-V stub IOMMU driver (fate#327171,  bsc#1122822).
- iommu/vt-d: Check capability before disabling protected memory (bsc#1130347).
- ip6: fix PMTU discovery when using /127 subnets (git-fixes).
- ip6mr: Do not call __IP6_INC_STATS() from preemptible context (bnc#1012382).
- ip_tunnel: fix ip tunnel lookup in collect_md mode (git-fixes).
- ipvlan: disallow userns cap_net_admin to change global mode/flags (bnc#1012382).
- ipvs: Fix signed integer overflow when setsockopt timeout (bnc#1012382).
- irqchip/mmp: Only touch the PJ4 IRQ &amp; FIQ bits on enable/disable (bnc#1012382).
- iscsi_ibft: Fix missing break in switch statement (bnc#1012382).
- isdn: avm: Fix string plus integer warning from Clang (bnc#1012382).
- isdn: i4l: isdn_tty: Fix some concurrency double-free bugs (bnc#1012382).
- isdn: isdn_tty: fix build warning of strncpy (bnc#1012382).
- iwlwifi: dbg: do not crash if the firmware crashes in the middle of a debug dump (bsc#1119086).
- jbd2: clear dirty flag when revoking a buffer from an older transaction (bnc#1012382).
- jbd2: fix compile warning when using JBUFFER_TRACE (bnc#1012382).
- kabi fixup gendisk disk_devt revert (bsc#1020989).
- kbuild: setlocalversion: print error to STDERR (bnc#1012382).
- kernel/sysctl.c: add missing range check in do_proc_dointvec_minmax_conv (bnc#1012382).
- keys: allow reaching the keys quotas exactly (bnc#1012382).
- keys: always initialize keyring_index_key::desc_len (bnc#1012382).
- keys: restrict /proc/keys by credentials at open time (bnc#1012382).
- keys: user: Align the payload buffer (bnc#1012382).
- kvm: Call kvm_arch_memslots_updated() before updating memslots (bsc#1132634).
- kvm: nSVM: clear events pending from svm_complete_interrupts() when exiting to L1 (bnc#1012382).
- kvm: nVMX: Apply addr size mask to effective address for VMX instructions (bsc#1132635).
- kvm: nVMX: Ignore limit checks on VMX instructions using flat segments (bnc#1012382).
- kvm: nVMX: Sign extend displacements of VMX instr's mem operands (bnc#1012382).
- kvm: Reject device ioctls from processes other than the VM's creator (bnc#1012382).
- kvm: VMX: Compare only a single byte for VMCS' 'launched' in vCPU-run (bsc#1132636).
- kvm: VMX: Zero out *all* general purpose registers after VM-Exit (bsc#1132637).
- kvm: x86: Emulate MSR_IA32_ARCH_CAPABILITIES on AMD hosts (bsc#1132534).
- kvm: X86: Fix residual mmio emulation request to userspace (bnc#1012382).
- kvm: x86/mmu: Do not cache MMIO accesses while memslots are in flux (bsc#1132638).
- l2tp: fix infoleak in l2tp_ip6_recvmsg() (git-fixes).
- leds: lp5523: fix a missing check of return value of lp55xx_read (bnc#1012382).
- libertas: call into generic suspend code before turning off power (bsc#1106110).
- libertas: fix suspend and resume for SDIO connected cards (bsc#1106110).
- lib/int_sqrt: optimize small argument (bnc#1012382).
- libnvdimm/pmem: Honor force_raw for legacy pmem regions (bsc#1131857).
- locking/lockdep: Add debug_locks check in __lock_downgrade() (bnc#1012382).
- locking/static_keys: Improve uninitialized key warning (bsc#1106913).
- m68k: Add -ffreestanding to CFLAGS (bnc#1012382).
- mac80211: do not initiate TDLS connection if station is not associated to AP (bnc#1012382).
- mac80211: fix miscounting of ttl-dropped frames (bnc#1012382).
- mac80211: fix 'warning: target metric may be used uninitialized' (bnc#1012382).
- mac80211_hwsim: propagate genlmsg_reply return code (bnc#1012382).
- mac8390: Fix mmio access size probe (bnc#1012382).
- md: Fix failed allocation of md_register_thread (bnc#1012382).
- mdio_bus: Fix use-after-free on device_register fails (bnc#1012382 git-fixes).
- md/raid1: do not clear bitmap bits on interrupted recovery (git-fixes).
- media: cx88: Get rid of spurious call to cx8800_start_vbi_dma() (bsc#1100132).
- media: uvcvideo: Avoid NULL pointer dereference at the end of streaming (bnc#1012382).
- media: uvcvideo: Fix 'type' check leading to overflow (bnc#1012382).
- media: uvcvideo: Fix uvc_alloc_entity() allocation alignment (bsc#1119086).
- media: v4l2-ctrls.c/uvc: zero v4l2_event (bnc#1012382).
- media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused() (bnc#1012382).
- media: vivid: potential integer overflow in vidioc_g_edid() (bsc#11001132).
- mfd: ab8500-core: Return zero in get_register_interruptible() (bnc#1012382).
- mfd: db8500-prcmu: Fix some section annotations (bnc#1012382).
- mfd: mc13xxx: Fix a missing check of a register-read failure (bnc#1012382).
- mfd: qcom_rpm: write fw_version to CTRL_REG (bnc#1012382).
- mfd: ti_am335x_tscadc: Use PLATFORM_DEVID_AUTO while registering mfd cells (bnc#1012382).
- mfd: twl-core: Fix section annotations on {,un}protect_pm_master (bnc#1012382).
- mfd: wm5110: Add missing ASRC rate register (bnc#1012382).
- mips: loongson64: lemote-2f: Add IRQF_NO_SUSPEND to 'cascade' irqaction (bnc#1012382).
- mISDN: hfcpci: Test both vendor &amp; device ID for Digium HFC4S (bnc#1012382).
- missing barriers in some of unix_sock -&gt;addr and -&gt;path accesses (bnc#1012382).
- mmc: bcm2835: reset host on timeout (bsc#1070872).
- mmc: block: Allow more than 8 partitions per card (bnc#1012382).
- mmc: core: fix using wrong io voltage if mmc_select_hs200 fails (bnc#1012382).
- mmc: core: shut up 'voltage-ranges unspecified' pr_info() (bnc#1012382).
- mmc: debugfs: Add a restriction to mmc debugfs clock setting (bnc#1012382).
- mmc: make MAN_BKOPS_EN message a debug (bnc#1012382).
- mmc: mmc: fix switch timeout issue caused by jiffies precision (bnc#1012382).
- mmc: pwrseq_simple: Make reset-gpios optional to match doc (bnc#1012382).
- mmc: pxamci: fix enum type confusion (bnc#1012382).
- mmc: sanitize 'bus width' in debug output (bnc#1012382).
- mmc: spi: Fix card detection during probe (bnc#1012382).
- mmc: tmio_mmc_core: do not claim spurious interrupts (bnc#1012382).
- mm/debug.c: fix __dump_page when mapping-&gt;host is not set (bsc#1131934).
- mm, memory_hotplug: fix off-by-one in is_pageblock_removable (git-fixes).
- mm, memory_hotplug: is_mem_section_removable do not pass the end of a zone (bnc#1012382).
- mm, memory_hotplug: test_pages_in_a_zone do not pass the end of zone (bnc#1012382).
- mm: move is_pageblock_removable_nolock() to mm/memory_hotplug.c (git-fixes prerequisity).
- mm/page_isolation.c: fix a wrong flag in set_migratetype_isolate() (bsc#1131935)
- mm/rmap: replace BUG_ON(anon_vma-&gt;degree) with VM_WARN_ON (bnc#1012382).
- mm/vmalloc: fix size check for remap_vmalloc_range_partial() (bnc#1012382).
- move power_up_on_resume flag to end of structure for kABI (bsc#1106110).
- mwifiex: pcie: tighten a check in mwifiex_pcie_process_event_ready() (bsc#1100132).
- ncpfs: fix build warning of strncpy (bnc#1012382).
- net: add description for len argument of dev_get_phys_port_name (git-fixes).
- net: Add __icmp_send helper (bnc#1012382).
- net: altera_tse: fix connect_local_phy error path (bnc#1012382).
- net: altera_tse: fix msgdma_tx_completion on non-zero fill_level case (bnc#1012382).
- net: avoid use IPCB in cipso_v4_error (bnc#1012382).
- net: diag: support v4mapped sockets in inet_diag_find_one_icsk() (bnc#1012382).
- net: do not decrement kobj reference count on init failure (git-fixes).
- net: dsa: mv88e6xxx: Fix u64 statistics (bnc#1012382).
- net: ena: fix race between link up and device initalization (bsc#1129278).
- net: ena: update driver version from 2.0.2 to 2.0.3 (bsc#1129278).
- netfilter: ipt_CLUSTERIP: fix use-after-free of proc entry (git-fixes).
- netfilter: nf_conntrack_tcp: Fix stack out of bounds when parsing TCP options (bnc#1012382).
- netfilter: nfnetlink_acct: validate NFACCT_FILTER parameters (bnc#1012382).
- netfilter: nfnetlink_log: just returns error for unknown command (bnc#1012382).
- netfilter: nfnetlink: use original skbuff when acking batches (git-fixes).
- netfilter: x_tables: enforce nul-terminated table name from getsockopt GET_ENTRIES (bnc#1012382).
- net: hns: Fix use after free identified by SLUB debug (bnc#1012382).
- net: hns: Fix wrong read accesses via Clause 45 MDIO protocol (bnc#1012382).
- net: hsr: fix memory leak in hsr_dev_finalize() (bnc#1012382).
- net/hsr: fix possible crash in add_timer() (bnc#1012382).
- netlabel: fix out-of-bounds memory accesses (bnc#1012382).
- net/mlx4_en: Force CHECKSUM_NONE for short ethernet frames (bnc#1012382).
- net: mv643xx_eth: disable clk on error path in mv643xx_eth_shared_probe() (bnc#1012382).
- net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails (bnc#1012382).
- net/packet: fix 4gb buffer limit due to overflow check (bnc#1012382).
- net/packet: Set __GFP_NOWARN upon allocation in alloc_pg_vec (bnc#1012382).
- net: phy: Micrel KSZ8061: link failure after cable connect (bnc#1012382).
- net: rose: fix a possible stack overflow (bnc#1012382).
- net: Set rtm_table to RT_TABLE_COMPAT for ipv6 for tables &gt; 255 (bnc#1012382).
- net: set static variable an initial value in atl2_probe() (bnc#1012382).
- net: sit: fix UBSAN Undefined behaviour in check_6rd (bnc#1012382).
- net: stmmac: dwmac-rk: fix error handling in rk_gmac_powerup() (bnc#1012382).
- net-sysfs: call dev_hold if kobject_init_and_add success (git-fixes).
- net-sysfs: Fix mem leak in netdev_register_kobject (bnc#1012382).
- net: systemport: Fix reception of BPDUs (bnc#1012382).
- net: tcp_memcontrol: properly detect ancestor socket pressure (git-fixes).
- net/x25: fix a race in x25_bind() (bnc#1012382).
- net/x25: fix use-after-free in x25_device_event() (bnc#1012382).
- net/x25: reset state in x25_connect() (bnc#1012382).
- nfc: nci: memory leak in nci_core_conn_create() (git-fixes).
- nfs41: pop some layoutget errors to application (bnc#1012382).
- nfsd: fix memory corruption caused by readdir (bsc#1127445).
- nfsd: fix wrong check in write_v4_end_grace() (git-fixes).
- nfs: Do not recoalesce on error in nfs_pageio_complete_mirror() (git-fixes).
- nfs: Fix an I/O request leakage in nfs_do_recoalesce (git-fixes).
- nfs: Fix dentry revalidation on NFSv4 lookup (bsc#1132618).
- nfs: fix mount/umount race in nlmclnt (git-fixes).
- nfs: Fix NULL pointer dereference of dev_name (bnc#1012382).
- nfsv4.x: always serialize open/close operations (bsc#1114893).
- numa: change get_mempolicy() to use nr_node_ids instead of MAX_NUMNODES (bnc#1012382).
- packets: Always register packet sk in the same order (bnc#1012382).
- parport_pc: fix find_superio io compare code, should use equal test (bnc#1012382).
- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).
- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792  vcpus (fate#327171, bsc#1122822).
- perf auxtrace: Define auxtrace record alignment (bnc#1012382).
- perf bench: Copy kernel files needed to build mem{cpy,set} x86_64 benchmarks (bnc#1012382).
- perf intel-pt: Fix CYC timestamp calculation after OVF (bnc#1012382).
- perf intel-pt: Fix overlap calculation for padding (bnc#1012382).
- perf intel-pt: Fix TSC slip (bnc#1012382).
- perf/ring_buffer: Refuse to begin AUX transaction after rb-&gt;aux_mmap_count drops (bnc#1012382).
- perf symbols: Filter out hidden symbols from labels (bnc#1012382).
- perf: Synchronously free aux pages in case of allocation failure (bnc#1012382).
- perf tools: Handle TOPOLOGY headers with no CPU (bnc#1012382).
- perf/x86/amd: Add event map for AMD Family 17h (bsc#1114648).
- phonet: fix building with clang (bnc#1012382).
- pinctrl: meson: meson8b: fix the sdxc_a data 1..3 pins (bnc#1012382).
- platform/x86: Fix unmet dependency warning for SAMSUNG_Q10 (bnc#1012382).
- pm / Hibernate: Call flush_icache_range() on pages restored in-place (bnc#1012382).
- pm / wakeup: Rework wakeup source timer cancellation (bnc#1012382).
- powerpc/32: Clear on-stack exception marker upon exception return (bnc#1012382).
- powerpc/64: Call setup_barrier_nospec() from setup_arch() (bsc#1131107).
- powerpc/64: Disable the speculation barrier from the command line (bsc#1131107).
- powerpc/64: Make stf barrier PPC_BOOK3S_64 specific (bsc#1131107).
- powerpc/64s: Add new security feature flags for count cache flush (bsc#1131107).
- powerpc/64s: Add support for software count cache flush (bsc#1131107).
- powerpc/83xx: Also save/restore SPRG4-7 during suspend (bnc#1012382).
- powerpc: Always initialize input array when calling epapr_hypercall() (bnc#1012382).
- powerpc/asm: Add a patch_site macro &amp; helpers for patching instructions (bsc#1131107).
- powerpc/fsl: Fix spectre_v2 mitigations reporting (bsc#1131107).
- powerpc/mm/hash: Handle mmap_min_addr correctly in get_unmapped_area topdown search (bsc#1131900).
- powerpc/numa: document topology_updates_enabled, disable by default (bsc#1133584).
- powerpc/numa: improve control of topology updates (bsc#1133584).
- powerpc/perf: Fix unit_sel/cache_sel checks (bsc#1053043).
- powerpc/perf: Remove l2 bus events from HW cache event array (bsc#1053043).
- powerpc/perf: Update raw-event code encoding comment for power8 (bsc#1053043, git-fixes).
- powerpc/powernv/cpuidle: Init all present cpus for deep states (bsc#1066223).
- powerpc/powernv: Make opal log only readable by root (bnc#1012382).
- powerpc/powernv: Query firmware for count cache flush settings (bsc#1131107).
- powerpc/pseries/mce: Fix misleading print for TLB mutlihit (bsc#1094244, git-fixes).
- powerpc/pseries: Query hypervisor for count cache flush settings (bsc#1131107).
- powerpc/security: Fix spectre_v2 reporting (bsc#1131107).
- powerpc/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- powerpc/tm: Add commandline option to disable hardware transactional memory (bsc#1118338).
- powerpc/tm: Add TM Unavailable Exception (bsc#1118338).
- powerpc/tm: Flip the HTM switch default to disabled (bsc#1125580).
- powerpc/vdso32: fix CLOCK_MONOTONIC on PPC64 (bsc#1131587).
- powerpc/vdso64: Fix CLOCK_MONOTONIC inconsistencies across Y2038 (bsc#1131587).
- powerpc/wii: properly disable use of BATs when requested (bnc#1012382).
- raid10: It's wrong to add len to sector_nr in raid10 reshape twice (bnc#1012382).
- ravb: Decrease TxFIFO depth of Q3 and Q2 to one (bnc#1012382).
- rcu: Do RCU GP kthread self-wakeup from softirq and interrupt (bnc#1012382).
- rdma/core: Do not expose unsupported counters (bsc#994770).
- rdma/srp: Rework SCSI device reset handling (bnc#1012382).
- Refresh patches.fixes/0001-net-mlx4-Fix-endianness-issue-in-qp-context-params.patch. (bsc#1132619)
- regulator: s2mpa01: Fix step values for some LDOs (bnc#1012382).
- regulator: s2mps11: Fix steps for buck7, buck8 and LDO35 (bnc#1012382).
- Revert 'bridge: do not add port to router list when receives query with source 0.0.0.0' (bnc#1012382).
- Revert 'mmc: block: do not use parameter prefix if built as module' (bnc#1012382).
- Revert 'scsi, block: fix duplicate bdi name registration crashes' (bsc#1020989).
- Revert 'USB: core: only clean up what we allocated' (bnc#1012382).
- route: set the deleted fnhe fnhe_daddr to 0 in ip_del_fnhe to fix a race (bnc#1012382).
- rsi: fix a dereference on adapter before it has been null checked (bsc#1085539).
- rtc: Fix overflow when converting time64_t to rtc_time (bnc#1012382).
- rtl8xxxu: Fix missing break in switch (bsc#1120902).
- s390/dasd: fix panic for failed online processing (bsc#1132589).
- s390/dasd: fix using offset into zero size array error (bnc#1012382).
- s390: Prevent hotplug rwsem recursion (bsc#1131980).
- s390/qeth: fix use-after-free in error path (bnc#1012382).
- s390/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- s390/virtio: handle find on invalid queue gracefully (bnc#1012382).
- sched/core: Fix cpu.max vs. cpuhotplug deadlock (bsc#1106913).
- sched/smt: Expose sched_smt_present static key (bsc#1106913).
- sched/smt: Make sched_smt_present track topology (bsc#1106913).
- scripts/git_sort/git_sort.py: Add fixes branch from mkp/scsi.git.
- scsi: csiostor: fix NULL pointer dereference in csio_vport_set_state() (bnc#1012382).
- scsi: isci: initialize shost fully before calling scsi_add_host() (bnc#1012382).
- scsi: libfc: free skb when receiving invalid flogi resp (bnc#1012382).
- scsi: libiscsi: Fix race between iscsi_xmit_task and iscsi_complete_task (bnc#1012382).
- scsi: libsas: Fix rphy phy_identifier for PHYs with end devices attached (bnc#1012382).
- scsi: qla4xxx: check return code of qla4xxx_copy_from_fwddb_param (bnc#1012382).
- scsi: sd: Fix a race between closing an sd device and sd I/O (bnc#1012382).
- scsi: storvsc: Fix a race in sub-channel creation that can cause panic ().
- scsi: storvsc: Fix a race in sub-channel creation that can  cause panic (fate#323887).
- scsi: storvsc: Reduce default ring buffer size to 128 Kbytes ().
- scsi: storvsc: Reduce default ring buffer size to 128 Kbytes  (fate#323887).
- scsi: target/iscsi: Avoid iscsit_release_commands_from_conn() deadlock (bnc#1012382).
- scsi: virtio_scsi: do not send sc payload with tmfs (bnc#1012382).
- scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (bnc#1012382).
- scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices (bnc#1012382).
- sctp: fix the transports round robin issue when init is retransmitted (git-fixes).
- sctp: get sctphdr by offset in sctp_compute_cksum (bnc#1012382).
- serial: 8250_pci: Fix number of ports for ACCES serial cards (bnc#1012382).
- serial: 8250_pci: Have ACCES cards that use the four port Pericom PI7C9X7954 chip use the pci_pericom_setup() (bnc#1012382).
- serial: fsl_lpuart: fix maximum acceptable baud rate with over-sampling (bnc#1012382).
- serial: max310x: Fix to avoid potential NULL pointer dereference (bnc#1012382).
- serial: sh-sci: Fix setting SCSCR_TIE while transferring data (bnc#1012382).
- serial: sprd: adjust TIMEOUT to a big value (bnc#1012382).
- serial: sprd: clear timeout interrupt only rather than all interrupts (bnc#1012382).
- sit: check if IPv6 enabled before calling ip6_err_gen_icmpv6_unreach() (bnc#1012382).
- sky2: Disable MSI on Dell Inspiron 1545 and Gateway P-79 (bnc#1012382).
- sockfs: getxattr: Fail with -EOPNOTSUPP for invalid attribute names (bnc#1012382).
- staging: ashmem: Add missing include (bnc#1012382).
- staging: ashmem: Avoid deadlock with mmap/shrink (bnc#1012382).
- staging: goldfish: audio: fix compiliation on arm (bnc#1012382).
- staging: ion: Set minimum carveout heap allocation order to PAGE_SHIFT (bnc#1012382).
- staging: lustre: fix buffer overflow of string buffer (bnc#1012382).
- staging: rtl8188eu: avoid a null dereference on pmlmepriv (bsc#1085539).
- staging: vt6655: Fix interrupt race condition on device start up (bnc#1012382).
- staging: vt6655: Remove vif check from vnt_interrupt (bnc#1012382).
- stm class: Do not leak the chrdev in error path (bnc#1012382).
- stm class: Fix an endless loop in channel allocation (bnc#1012382).
- stm class: Fix a race in unlinking (bnc#1012382).
- stm class: Fix link list locking (bnc#1012382).
- stm class: Fix locking in unbinding policy path (bnc#1012382).
- stm class: Fix stm device initialization order (bnc#1012382).
- stm class: Fix unbalanced module/device refcounting (bnc#1012382).
- stm class: Fix unlocking braino in the error path (bnc#1012382).
- stm class: Guard output assignment against concurrency (bnc#1012382).
- stm class: Hide STM-specific options if STM is disabled (bnc#1012382).
- stm class: Prevent division by zero (bnc#1012382).
- stm class: Prevent user-controllable allocations (bnc#1012382).
- stm class: Support devices with multiple instances (bnc#1012382).
- stmmac: copy unicast mac address to MAC registers (bnc#1012382).
- stop_machine: Provide stop_machine_cpuslocked() (bsc#1131980).
- sunrpc: do not mark uninitialised items as VALID (bsc#1130737).
- sunrpc: init xdr_stream for zero iov_len, page_len (bsc#11303356).
- svm/avic: Fix invalidate logical APIC id entry (bsc#1132727).
- svm: Fix AVIC DFR and LDR handling (bsc#1130343).
- svm: Fix improper check when deactivate AVIC (bsc#1130344).
- tcp/dccp: drop SYN packets if accept queue is full (bnc#1012382).
- tcp/dccp: remove reqsk_put() from inet_child_forget() (git-fixes).
- tcp: do not use ipv6 header for ipv4 flow (bnc#1012382).
- tcp: handle inet_csk_reqsk_queue_add() failures (git-fixes).
- thermal: int340x_thermal: Fix a NULL vs IS_ERR() check (bnc#1012382).
- time: Introduce jiffies64_to_nsecs() (bsc#1113399).
- tmpfs: fix link accounting when a tmpfile is linked in (bnc#1012382).
- tmpfs: fix uninitialized return value in shmem_link (bnc#1012382).
- tpm: fix kdoc for tpm2_flush_context_cmd() (bsc#1020645).
- tpm: Fix the type of the return value in calc_tpm2_event_size() (bsc#1020645, git-fixes).
- tpm: tpm-interface.c drop unused macros (bsc#1020645).
- tty: atmel_serial: fix a potential NULL pointer dereference (bnc#1012382).
- udf: Fix crash on IO error during truncate (bnc#1012382).
- Update patches.fixes/SUNRPC-init-xdr_stream-for-zero-iov_len-page_len.patch (bsc#1130356).
- usb: core: only clean up what we allocated (bnc#1012382).
- usb: dwc2: Fix DMA alignment to start at allocated boundary (bsc#1100132).
- usb: dwc2: fix the incorrect bitmaps for the ports of multi_tt hub (bsc#1100132).
- usb: dwc3: gadget: Fix suspend/resume during device mode (bnc#1012382).
- usb: dwc3: gadget: Fix the uninitialized link_state when udc starts (bnc#1012382).
- usb: gadget: Add the gserial port checking in gs_start_tx() (bnc#1012382).
- usb: gadget: composite: fix dereference after null check coverify warning (bnc#1012382).
- usb: gadget: configfs: add mutex lock before unregister gadget (bnc#1012382).
- usb: gadget: Potential NULL dereference on allocation error (bnc#1012382).
- usb: gadget: rndis: free response queue during REMOTE_NDIS_RESET_MSG (bnc#1012382).
- usb: renesas_usbhs: gadget: fix unused-but-set-variable warning (bnc#1012382).
- usb: serial: cp210x: add ID for Ingenico 3070 (bnc#1012382).
- usb: serial: cp210x: add new device id (bnc#1012382).
- usb: serial: cypress_m8: fix interrupt-out transfer length (bsc#1119086).
- usb: serial: ftdi_sio: add additional NovaTech products (bnc#1012382).
- usb: serial: ftdi_sio: add ID for Hjelmslund Electronics USB485 (bnc#1012382).
- usb: serial: mos7720: fix mos_parport refcount imbalance on error path (bsc#1129770).
- usb: serial: option: add Olicard 600 (bnc#1012382).
- usb: serial: option: add Telit ME910 ECM composition (bnc#1012382).
- usb: serial: option: set driver_info for SIM5218 and compatibles (bsc#1129770).
- video: fbdev: Set pixclock = 0 in goldfishfb (bnc#1012382).
- vti4: Fix a ipip packet processing bug in 'IPCOMP' virtual tunnel (bnc#1012382).
- vxlan: Do not call gro_cells_destroy() before device is unregistered (bnc#1012382).
- vxlan: Fix GRO cells race condition between receive and link delete (bnc#1012382).
- vxlan: test dev-&gt;flags &amp; IFF_UP before calling gro_cells_receive() (bnc#1012382).
- wlcore: Fix the return value in case of error in 'wlcore_vendor_cmd_smart_config_start()' (bsc#1120902).
- x86_64: increase stack size for KASAN_EXTRA (bnc#1012382).
- x86/apic: Provide apic_ack_irq() (bsc#1122822).
- x86/apic: Provide apic_ack_irq() (fate#327171, bsc#1122822).
- x86/CPU/AMD: Set the CPB bit unconditionally on F17h (bnc#1012382).
- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).
- x86/Hyper-V: Set x2apic destination mode to physical when  x2apic is available (fate#327171, bsc#1122822).
- x86/kexec: Do not setup EFI info if EFI runtime is not enabled (bnc#1012382).
- x86/mce: Improve error message when kernel cannot recover, p2 (bsc#1114648).
- x86/smp: Enforce CONFIG_HOTPLUG_CPU when SMP=y (bnc#1012382).
- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1111331).
- x86/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- x86/uaccess: Do not leak the AC flag into __put_user() value evaluation (bsc#1114648).
- x86/vdso: Add VCLOCK_HVCLOCK vDSO clock read method (bsc#1133308).
- xen-netback: fix occasional leak of grant ref mappings under memory pressure (bnc#1012382).
- xfrm_user: fix info leak in build_aevent() (git-fixes).
- xfrm_user: fix info leak in xfrm_notify_sa() (git-fixes).
- xhci: Do not let USB3 ports stuck in polling state prevent suspend (bsc#1047487).
- xhci: Fix port resume done detection for SS ports with LPM enabled (bnc#1012382).
- xtensa: SMP: fix ccount_timer_shutdown (bnc#1012382).
- xtensa: SMP: fix secondary CPU initialization (bnc#1012382).
- xtensa: SMP: limit number of possible CPUs by NR_CPUS (bnc#1012382).
- xtensa: smp_lx200_defconfig: fix vectors clash (bnc#1012382).
- xtensa: SMP: mark each possible CPU as present (bnc#1012382).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-14"/>
	<updated date="2019-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020645">SUSE bug 1020645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020989">SUSE bug 1020989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031492">SUSE bug 1031492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047487">SUSE bug 1047487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051510">SUSE bug 1051510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053043">SUSE bug 1053043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062056">SUSE bug 1062056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063638">SUSE bug 1063638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066223">SUSE bug 1066223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070872">SUSE bug 1070872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085539">SUSE bug 1085539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087092">SUSE bug 1087092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096480">SUSE bug 1096480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096728">SUSE bug 1096728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097104">SUSE bug 1097104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100132">SUSE bug 1100132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105348">SUSE bug 1105348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106110">SUSE bug 1106110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106913">SUSE bug 1106913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106929">SUSE bug 1106929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112178">SUSE bug 1112178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113399">SUSE bug 1113399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114542">SUSE bug 1114542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114638">SUSE bug 1114638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114648">SUSE bug 1114648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114893">SUSE bug 1114893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118338">SUSE bug 1118338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118506">SUSE bug 1118506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119086">SUSE bug 1119086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120902">SUSE bug 1120902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122822">SUSE bug 1122822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125580">SUSE bug 1125580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126356">SUSE bug 1126356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127445">SUSE bug 1127445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129278">SUSE bug 1129278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129326">SUSE bug 1129326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129770">SUSE bug 1129770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130130">SUSE bug 1130130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130343">SUSE bug 1130343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130344">SUSE bug 1130344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130345">SUSE bug 1130345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130346">SUSE bug 1130346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130347">SUSE bug 1130347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130356">SUSE bug 1130356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130425">SUSE bug 1130425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130567">SUSE bug 1130567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130737">SUSE bug 1130737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131107">SUSE bug 1131107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131416">SUSE bug 1131416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131427">SUSE bug 1131427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131587">SUSE bug 1131587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131659">SUSE bug 1131659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131857">SUSE bug 1131857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131900">SUSE bug 1131900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131934">SUSE bug 1131934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131935">SUSE bug 1131935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131980">SUSE bug 1131980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132227">SUSE bug 1132227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132534">SUSE bug 1132534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132589">SUSE bug 1132589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132618">SUSE bug 1132618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132619">SUSE bug 1132619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132634">SUSE bug 1132634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132635">SUSE bug 1132635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132636">SUSE bug 1132636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132637">SUSE bug 1132637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132638">SUSE bug 1132638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132727">SUSE bug 1132727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132828">SUSE bug 1132828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133308">SUSE bug 1133308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133584">SUSE bug 1133584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994770">SUSE bug 994770</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000204/">CVE-2018-1000204</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10853/">CVE-2018-10853</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15594/">CVE-2018-15594</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5814/">CVE-2018-5814</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3882/">CVE-2019-3882</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9503/">CVE-2019-9503</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521165" comment="kernel-default-4.4.178-94.91.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521166" comment="kernel-default-devel-4.4.178-94.91.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521167" comment="kernel-default-extra-4.4.178-94.91.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521168" comment="kernel-devel-4.4.178-94.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521169" comment="kernel-macros-4.4.178-94.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521170" comment="kernel-source-4.4.178-94.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521171" comment="kernel-syms-4.4.178-94.91.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78559" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1120095" ref_url="https://bugzilla.suse.com/1120095" source="BUGZILLA"/>
		<reference ref_id="1130680" ref_url="https://bugzilla.suse.com/1130680" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the XEN Hypervisor adjustments, that additionaly also use CPU Microcode updates.

The mitigation can be controlled via the 'mds' commandline option, see the documentation.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Security issue fixed:

- CVE-2018-20815: Fixed a heap buffer overflow while loading device tree blob (bsc#1130680)

Other fixes:

- Added code to change LIBXL_HOTPLUG_TIMEOUT at runtime.

  The included README has details about the impact of this change (bsc#1120095)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-14"/>
	<updated date="2019-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120095">SUSE bug 1120095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130680">SUSE bug 1130680</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521172" comment="xen-4.9.4_04-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521173" comment="xen-libs-4.9.4_04-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521174" comment="xen-libs-32bit-4.9.4_04-3.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78560" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1080919" ref_url="https://bugzilla.suse.com/1080919" source="BUGZILLA"/>
		<reference ref_id="1121563" ref_url="https://bugzilla.suse.com/1121563" source="BUGZILLA"/>
		<reference ref_id="1125352" ref_url="https://bugzilla.suse.com/1125352" source="BUGZILLA"/>
		<reference ref_id="1126056" ref_url="https://bugzilla.suse.com/1126056" source="BUGZILLA"/>
		<reference ref_id="1127557" ref_url="https://bugzilla.suse.com/1127557" source="BUGZILLA"/>
		<reference ref_id="1128657" ref_url="https://bugzilla.suse.com/1128657" source="BUGZILLA"/>
		<reference ref_id="1130230" ref_url="https://bugzilla.suse.com/1130230" source="BUGZILLA"/>
		<reference ref_id="1132348" ref_url="https://bugzilla.suse.com/1132348" source="BUGZILLA"/>
		<reference ref_id="1132400" ref_url="https://bugzilla.suse.com/1132400" source="BUGZILLA"/>
		<reference ref_id="1132721" ref_url="https://bugzilla.suse.com/1132721" source="BUGZILLA"/>
		<reference ref_id="955942" ref_url="https://bugzilla.suse.com/955942" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6954" ref_url="https://www.suse.com/security/cve/CVE-2018-6954/" source="CVE"/>
		<reference ref_id="CVE-2019-3842" ref_url="https://www.suse.com/security/cve/CVE-2019-3842/" source="CVE"/>
		<reference ref_id="CVE-2019-6454" ref_url="https://www.suse.com/security/cve/CVE-2019-6454/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005467.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

Security issues fixed:

- CVE-2018-6954: Fixed a vulnerability in the symlink handling of systemd-tmpfiles 
  which allowed a local user to obtain ownership of arbitrary files (bsc#1080919).
- CVE-2019-3842: Fixed a vulnerability in pam_systemd which allowed a local user to escalate privileges (bsc#1132348).
- CVE-2019-6454: Fixed a denial of service caused by long dbus messages (bsc#1125352).

Non-security issues fixed:

- systemd-coredump: generate a stack trace of all core dumps (jsc#SLE-5933)
- udevd: notify when max number value of children is reached only once per batch of events (bsc#1132400)
- sd-bus: bump message queue size again (bsc#1132721)
- core: only watch processes when it's really necessary (bsc#955942 bsc#1128657)
- rules: load drivers only on 'add' events (bsc#1126056)
- sysctl: Don't pass null directive argument to '%s' (bsc#1121563)
- Do not automatically online memory on s390x (bsc#1127557)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-16"/>
	<updated date="2019-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1080919">SUSE bug 1080919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121563">SUSE bug 1121563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125352">SUSE bug 1125352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126056">SUSE bug 1126056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127557">SUSE bug 1127557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128657">SUSE bug 1128657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130230">SUSE bug 1130230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132348">SUSE bug 1132348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132400">SUSE bug 1132400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132721">SUSE bug 1132721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955942">SUSE bug 955942</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6954/">CVE-2018-6954</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3842/">CVE-2019-3842</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6454/">CVE-2019-6454</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521175" comment="libsystemd0-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521176" comment="libsystemd0-32bit-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521177" comment="libudev1-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521178" comment="libudev1-32bit-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521179" comment="systemd-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521180" comment="systemd-32bit-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521181" comment="systemd-bash-completion-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521182" comment="systemd-sysvinit-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521183" comment="udev-228-150.66.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78561" version="1" class="patch">
	<metadata>
		<title>Security update for libraw (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1120498" ref_url="https://bugzilla.suse.com/1120498" source="BUGZILLA"/>
		<reference ref_id="1120499" ref_url="https://bugzilla.suse.com/1120499" source="BUGZILLA"/>
		<reference ref_id="1120500" ref_url="https://bugzilla.suse.com/1120500" source="BUGZILLA"/>
		<reference ref_id="1120515" ref_url="https://bugzilla.suse.com/1120515" source="BUGZILLA"/>
		<reference ref_id="1120516" ref_url="https://bugzilla.suse.com/1120516" source="BUGZILLA"/>
		<reference ref_id="1120517" ref_url="https://bugzilla.suse.com/1120517" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20363" ref_url="https://www.suse.com/security/cve/CVE-2018-20363/" source="CVE"/>
		<reference ref_id="CVE-2018-20364" ref_url="https://www.suse.com/security/cve/CVE-2018-20364/" source="CVE"/>
		<reference ref_id="CVE-2018-20365" ref_url="https://www.suse.com/security/cve/CVE-2018-20365/" source="CVE"/>
		<reference ref_id="CVE-2018-5817" ref_url="https://www.suse.com/security/cve/CVE-2018-5817/" source="CVE"/>
		<reference ref_id="CVE-2018-5818" ref_url="https://www.suse.com/security/cve/CVE-2018-5818/" source="CVE"/>
		<reference ref_id="CVE-2018-5819" ref_url="https://www.suse.com/security/cve/CVE-2018-5819/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005044.html" source="SUSE-SU"/>
		<description>
This update for libraw fixes the following issues:

Security issues fixed:                                                                                                                               
                                                                                                            
- CVE-2018-20365: Fixed a heap-based buffer overflow in the raw2image function of libraw_cxx.cpp (bsc#1120500)     
- CVE-2018-20364: Fixed a NULL pointer dereference in the copy_bayer function of libraw_cxx.cpp (bsc#1120499)          
- CVE-2018-20363: Fixed a NULL pointer dereference in the raw2image function of libraw_cxx.cpp (bsc#1120498)       
- CVE-2018-5817: Fixed an infinite loop in the unpacked_load_raw function of dcraw_common.cpp (bsc#1120515)
- CVE-2018-5818: Fixed an infinite loop in the parse_rollei function of dcraw_common.cpp (bsc#1120516)
- CVE-2018-5819: Fixed a denial of service in the parse_sinar_ia function of dcraw_common.cpp (bsc#1120517)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-18"/>
	<updated date="2019-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120498">SUSE bug 1120498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120499">SUSE bug 1120499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120500">SUSE bug 1120500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120515">SUSE bug 1120515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120516">SUSE bug 1120516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120517">SUSE bug 1120517</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20363/">CVE-2018-20363</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20364/">CVE-2018-20364</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-20365/">CVE-2018-20365</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5817/">CVE-2018-5817</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5818/">CVE-2018-5818</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5819/">CVE-2018-5819</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521184" comment="libraw9-0.15.4-30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78562" version="1" class="patch">
	<metadata>
		<title>Security update for PackageKit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1038425" ref_url="https://bugzilla.suse.com/1038425" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2019:0128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005047.html" source="SUSE-SU"/>
		<description>
This update for PackageKit fixes the following issues:

- Fixed displaying the license agreement pop up window during package update (bsc#1038425).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-18"/>
	<updated date="2019-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1038425">SUSE bug 1038425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521185" comment="PackageKit-1.1.3-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521186" comment="PackageKit-backend-zypp-1.1.3-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521187" comment="PackageKit-gstreamer-plugin-1.1.3-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521188" comment="PackageKit-gtk3-module-1.1.3-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521189" comment="PackageKit-lang-1.1.3-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521190" comment="libpackagekit-glib2-18-1.1.3-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521191" comment="typelib-1_0-PackageKitGlib-1_0-1.1.3-24.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78563" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005481.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

ucode-intel was updated to official QSR 2019.1 microcode release (bsc#1111331
  CVE-2018-12126 CVE-2018-12130 CVE-2018-12127 CVE-2019-11091)

---- new platforms ----------------------------------------
VLV          C0       6-37-8/02           00000838 Atom Z series
VLV          C0       6-37-8/0C           00000838 Celeron N2xxx, Pentium N35xx
VLV          D0       6-37-9/0F           0000090c Atom E38xx
CHV          C0       6-4c-3/01           00000368 Atom X series
CHV          D0       6-4c-4/01           00000411 Atom X series

Readded Broadwell CPU ucode that was missing in last update:

BDX-ML       B0/M0/R0 6-4f-1/ef 0b00002e-&gt;00000036 Xeon E5/E7 v4; Core i7-69xx/68xx
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-21"/>
	<updated date="2019-05-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521192" comment="ucode-intel-20190514-13.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78564" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1121571" ref_url="https://bugzilla.suse.com/1121571" source="BUGZILLA"/>
		<reference ref_id="1121816" ref_url="https://bugzilla.suse.com/1121816" source="BUGZILLA"/>
		<reference ref_id="1121818" ref_url="https://bugzilla.suse.com/1121818" source="BUGZILLA"/>
		<reference ref_id="1121821" ref_url="https://bugzilla.suse.com/1121821" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20685" ref_url="https://www.suse.com/security/cve/CVE-2018-20685/" source="CVE"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6110" ref_url="https://www.suse.com/security/cve/CVE-2019-6110/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005051.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Security issue fixed:

- CVE-2018-20685: Fixed an issue where scp client allows remote SSH servers to bypass intended access restrictions (bsc#1121571)
- CVE-2019-6109: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate terminal output via the object name, e.g. by inserting ANSI escape sequences (bsc#1121816)
- CVE-2019-6110: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate stderr output, e.g. by inserting ANSI escape sequences (bsc#1121818)
- CVE-2019-6111: Fixed an issue where the scp client would allow malicious remote SSH servers to execute directory traversal attacks and overwrite files (bsc#1121821)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-21"/>
	<updated date="2019-01-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121818">SUSE bug 1121818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20685/">CVE-2018-20685</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6110/">CVE-2019-6110</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521193" comment="openssh-7.2p2-74.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521194" comment="openssh-askpass-gnome-7.2p2-74.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521195" comment="openssh-helpers-7.2p2-74.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78565" version="1" class="patch">
	<metadata>
		<title>Security update for sysstat (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1117001" ref_url="https://bugzilla.suse.com/1117001" source="BUGZILLA"/>
		<reference ref_id="1117260" ref_url="https://bugzilla.suse.com/1117260" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19416" ref_url="https://www.suse.com/security/cve/CVE-2018-19416/" source="CVE"/>
		<reference ref_id="CVE-2018-19517" ref_url="https://www.suse.com/security/cve/CVE-2018-19517/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005490.html" source="SUSE-SU"/>
		<description>
This update for sysstat fixes the following issues:

Security issues fixed:

- CVE-2018-19416: Fixed out-of-bounds read during a memmove call inside the remap_struct function (bsc#1117001).
- CVE-2018-19517: Fixed out-of-bounds read during a memset call inside the remap_struct function (bsc#1117260).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-23"/>
	<updated date="2019-05-23"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1117001">SUSE bug 1117001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117260">SUSE bug 1117260</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19416/">CVE-2018-19416</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19517/">CVE-2018-19517</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521196" comment="sysstat-12.0.2-10.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78566" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1013708" ref_url="https://bugzilla.suse.com/1013708" source="BUGZILLA"/>
		<reference ref_id="1013712" ref_url="https://bugzilla.suse.com/1013712" source="BUGZILLA"/>
		<reference ref_id="1013893" ref_url="https://bugzilla.suse.com/1013893" source="BUGZILLA"/>
		<reference ref_id="1015171" ref_url="https://bugzilla.suse.com/1015171" source="BUGZILLA"/>
		<reference ref_id="1015173" ref_url="https://bugzilla.suse.com/1015173" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9797" ref_url="https://www.suse.com/security/cve/CVE-2016-9797/" source="CVE"/>
		<reference ref_id="CVE-2016-9798" ref_url="https://www.suse.com/security/cve/CVE-2016-9798/" source="CVE"/>
		<reference ref_id="CVE-2016-9802" ref_url="https://www.suse.com/security/cve/CVE-2016-9802/" source="CVE"/>
		<reference ref_id="CVE-2016-9917" ref_url="https://www.suse.com/security/cve/CVE-2016-9917/" source="CVE"/>
		<reference ref_id="CVE-2016-9918" ref_url="https://www.suse.com/security/cve/CVE-2016-9918/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005494.html" source="SUSE-SU"/>
		<description>
This update for bluez fixes the following issues:

Security vulnerability addressed:

- CVE-2016-9797: Fixed a buffer over-read in l2cap_dump() (bsc#1013708).
- CVE-2016-9798: Fixed a use-after-free in conf_opt() (bsc#1013712).
- CVE-2016-9917: Fixed a heap-based buffer overflow in read_n() (bsc#1015171).
- CVE-2016-9802: Fixed a buffer over-read in l2cap_packet() (bsc#1013893).
- CVE-2016-9918: Fixed an out-of-bounds stack read in packet_hexdump(),
  which could be triggered by processing a corrupted dump file and will result
  in a crash of the hcidump tool (bsc#1015173)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-24"/>
	<updated date="2019-05-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013708">SUSE bug 1013708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013712">SUSE bug 1013712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013893">SUSE bug 1013893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015171">SUSE bug 1015171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015173">SUSE bug 1015173</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9797/">CVE-2016-9797</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9798/">CVE-2016-9798</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9802/">CVE-2016-9802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9917/">CVE-2016-9917</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-9918/">CVE-2016-9918</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521197" comment="bluez-5.13-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521198" comment="bluez-cups-5.13-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521199" comment="libbluetooth3-5.13-5.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78567" version="1" class="patch">
	<metadata>
		<title>Security update for freerdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1085416" ref_url="https://bugzilla.suse.com/1085416" source="BUGZILLA"/>
		<reference ref_id="1087240" ref_url="https://bugzilla.suse.com/1087240" source="BUGZILLA"/>
		<reference ref_id="1104918" ref_url="https://bugzilla.suse.com/1104918" source="BUGZILLA"/>
		<reference ref_id="1116708" ref_url="https://bugzilla.suse.com/1116708" source="BUGZILLA"/>
		<reference ref_id="1117963" ref_url="https://bugzilla.suse.com/1117963" source="BUGZILLA"/>
		<reference ref_id="1117964" ref_url="https://bugzilla.suse.com/1117964" source="BUGZILLA"/>
		<reference ref_id="1117965" ref_url="https://bugzilla.suse.com/1117965" source="BUGZILLA"/>
		<reference ref_id="1117966" ref_url="https://bugzilla.suse.com/1117966" source="BUGZILLA"/>
		<reference ref_id="1117967" ref_url="https://bugzilla.suse.com/1117967" source="BUGZILLA"/>
		<reference ref_id="1120507" ref_url="https://bugzilla.suse.com/1120507" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0886" ref_url="https://www.suse.com/security/cve/CVE-2018-0886/" source="CVE"/>
		<reference ref_id="CVE-2018-1000852" ref_url="https://www.suse.com/security/cve/CVE-2018-1000852/" source="CVE"/>
		<reference ref_id="CVE-2018-8784" ref_url="https://www.suse.com/security/cve/CVE-2018-8784/" source="CVE"/>
		<reference ref_id="CVE-2018-8785" ref_url="https://www.suse.com/security/cve/CVE-2018-8785/" source="CVE"/>
		<reference ref_id="CVE-2018-8786" ref_url="https://www.suse.com/security/cve/CVE-2018-8786/" source="CVE"/>
		<reference ref_id="CVE-2018-8787" ref_url="https://www.suse.com/security/cve/CVE-2018-8787/" source="CVE"/>
		<reference ref_id="CVE-2018-8788" ref_url="https://www.suse.com/security/cve/CVE-2018-8788/" source="CVE"/>
		<reference ref_id="CVE-2018-8789" ref_url="https://www.suse.com/security/cve/CVE-2018-8789/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005053.html" source="SUSE-SU"/>
		<description>
This update for freerdp fixes the following issues:

Security issues fixed:

- CVE-2018-0886: Fix a remote code execution vulnerability (CredSSP) (bsc#1085416, bsc#1087240, bsc#1104918)
- CVE-2018-8789: Fix several denial of service vulnerabilities in the in the NTLM Authentication module (bsc#1117965)
- CVE-2018-8785: Fix a potential remote code execution vulnerability in the zgfx_decompress function (bsc#1117967)
- CVE-2018-8786: Fix a potential remote code execution vulnerability in the update_read_bitmap_update function (bsc#1117966)
- CVE-2018-8787: Fix a potential remote code execution vulnerability in the gdi_Bitmap_Decompress function (bsc#1117964)
- CVE-2018-8788: Fix a potential remote code execution vulnerability in the nsc_rle_decode function (bsc#1117963)
- CVE-2018-8784: Fix a potential remote code execution vulnerability in the zgfx_decompress_segment function (bsc#1116708)
- CVE-2018-1000852: Fixed a remote memory access in the drdynvc_process_capability_request function (bsc#1120507)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-21"/>
	<updated date="2019-01-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085416">SUSE bug 1085416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087240">SUSE bug 1087240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104918">SUSE bug 1104918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116708">SUSE bug 1116708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117963">SUSE bug 1117963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117964">SUSE bug 1117964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117965">SUSE bug 1117965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117966">SUSE bug 1117966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117967">SUSE bug 1117967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120507">SUSE bug 1120507</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-0886/">CVE-2018-0886</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000852/">CVE-2018-1000852</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8784/">CVE-2018-8784</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8785/">CVE-2018-8785</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8786/">CVE-2018-8786</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8787/">CVE-2018-8787</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8788/">CVE-2018-8788</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8789/">CVE-2018-8789</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521200" comment="freerdp-2.0.0~git.1463131968.4e66df7-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521201" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78568" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1005023" ref_url="https://bugzilla.suse.com/1005023" source="BUGZILLA"/>
		<reference ref_id="1076696" ref_url="https://bugzilla.suse.com/1076696" source="BUGZILLA"/>
		<reference ref_id="1101591" ref_url="https://bugzilla.suse.com/1101591" source="BUGZILLA"/>
		<reference ref_id="1114981" ref_url="https://bugzilla.suse.com/1114981" source="BUGZILLA"/>
		<reference ref_id="1115518" ref_url="https://bugzilla.suse.com/1115518" source="BUGZILLA"/>
		<reference ref_id="1119971" ref_url="https://bugzilla.suse.com/1119971" source="BUGZILLA"/>
		<reference ref_id="1120323" ref_url="https://bugzilla.suse.com/1120323" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16864" ref_url="https://www.suse.com/security/cve/CVE-2018-16864/" source="CVE"/>
		<reference ref_id="CVE-2018-16865" ref_url="https://www.suse.com/security/cve/CVE-2018-16865/" source="CVE"/>
		<reference ref_id="CVE-2018-16866" ref_url="https://www.suse.com/security/cve/CVE-2018-16866/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005052.html" source="SUSE-SU"/>
		<description>
This update for systemd provides the following fixes:

Security issues fixed:

- CVE-2018-16864, CVE-2018-16865: Fixed two memory corruptions through attacker-controlled alloca()s (bsc#1120323)
- CVE-2018-16866: Fixed an information leak in journald (bsc#1120323)
- Fixed an issue during system startup in relation to encrypted swap disks (bsc#1119971)

Non-security issues fixed:

- core: Queue loading transient units after setting their properties. (bsc#1115518)
- logind: Stop managing VT switches if no sessions are registered on that VT. (bsc#1101591)
- terminal-util: introduce vt_release() and vt_restore() helpers.
- terminal: Unify code for resetting kbd utf8 mode a bit.
- terminal Reset should honour default_utf8 kernel setting.
- logind: Make session_restore_vt() static.
- udev: Downgrade message when settting inotify watch up fails. (bsc#1005023)
- log: Never log into foreign fd #2 in PID 1 or its pre-execve() children. (bsc#1114981)
- udev: Ignore the exit code of systemd-detect-virt for memory hot-add.  In SLE-12-SP3,
  80-hotplug-cpu-mem.rules has a memory hot-add rule that uses systemd-detect-virt to
  detect non-zvm environment. The systemd-detect-virt returns exit failure code when it
  detected _none_ state.  The exit failure code causes that the hot-add memory block can
  not be set to online. (bsc#1076696)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-21"/>
	<updated date="2019-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005023">SUSE bug 1005023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076696">SUSE bug 1076696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101591">SUSE bug 1101591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114981">SUSE bug 1114981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115518">SUSE bug 1115518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119971">SUSE bug 1119971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120323">SUSE bug 1120323</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16864/">CVE-2018-16864</cve>
	<cve impact="important" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16865/">CVE-2018-16865</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16866/">CVE-2018-16866</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521202" comment="libsystemd0-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521203" comment="libsystemd0-32bit-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521204" comment="libudev1-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521205" comment="libudev1-32bit-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521206" comment="systemd-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521207" comment="systemd-32bit-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521208" comment="systemd-bash-completion-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521209" comment="systemd-sysvinit-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521210" comment="udev-228-150.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78569" version="1" class="patch">
	<metadata>
		<title>Security update for screen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1130831" ref_url="https://bugzilla.suse.com/1130831" source="BUGZILLA"/>
		<reference ref_id="944458" ref_url="https://bugzilla.suse.com/944458" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6806" ref_url="https://www.suse.com/security/cve/CVE-2015-6806/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005502.html" source="SUSE-SU"/>
		<description>
This update for screen fixes the following issues:

Security issue fixed:

- CVE-2015-6806: Fixed a stack overflow due to deep recursion (bsc#944458).

Non-security issue fixed:

- Fixed segmentation faults related to altscreen and resizing screen (bsc#1130831).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-24"/>
	<updated date="2019-05-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1130831">SUSE bug 1130831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944458">SUSE bug 944458</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-6806/">CVE-2015-6806</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521211" comment="screen-4.0.4-23.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78570" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1135170" ref_url="https://bugzilla.suse.com/1135170" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5436" ref_url="https://www.suse.com/security/cve/CVE-2019-5436/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005506.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5436: Fixed a heap buffer overflow exists in tftp_receive_packet that receives data from a TFTP server (bsc#1135170).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-28"/>
	<updated date="2019-05-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135170">SUSE bug 1135170</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5436/">CVE-2019-5436</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521212" comment="curl-7.37.0-37.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521213" comment="libcurl4-7.37.0-37.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521214" comment="libcurl4-32bit-7.37.0-37.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78571" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1040621" ref_url="https://bugzilla.suse.com/1040621" source="BUGZILLA"/>
		<reference ref_id="1105435" ref_url="https://bugzilla.suse.com/1105435" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6891" ref_url="https://www.suse.com/security/cve/CVE-2017-6891/" source="CVE"/>
		<reference ref_id="CVE-2018-1000654" ref_url="https://www.suse.com/security/cve/CVE-2018-1000654/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005515.html" source="SUSE-SU"/>
		<description>
This update for libtasn1 fixes the following issues:

Security issues fixed:

- CVE-2018-1000654: Fixed a denial of service in the asn1 parser (bsc#1105435).
- CVE-2017-6891: Fixed a stack overflow in asn1_find_node() (bsc#1040621).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-29"/>
	<updated date="2019-05-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040621">SUSE bug 1040621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105435">SUSE bug 1105435</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6891/">CVE-2017-6891</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000654/">CVE-2018-1000654</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521215" comment="libtasn1-4.9-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521216" comment="libtasn1-6-4.9-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521217" comment="libtasn1-6-32bit-4.9-3.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78572" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1121232" ref_url="https://bugzilla.suse.com/1121232" source="BUGZILLA"/>
		<reference ref_id="1121233" ref_url="https://bugzilla.suse.com/1121233" source="BUGZILLA"/>
		<reference ref_id="1121234" ref_url="https://bugzilla.suse.com/1121234" source="BUGZILLA"/>
		<reference ref_id="1121235" ref_url="https://bugzilla.suse.com/1121235" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5717" ref_url="https://www.suse.com/security/cve/CVE-2019-5717/" source="CVE"/>
		<reference ref_id="CVE-2019-5718" ref_url="https://www.suse.com/security/cve/CVE-2019-5718/" source="CVE"/>
		<reference ref_id="CVE-2019-5719" ref_url="https://www.suse.com/security/cve/CVE-2019-5719/" source="CVE"/>
		<reference ref_id="CVE-2019-5721" ref_url="https://www.suse.com/security/cve/CVE-2019-5721/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005055.html" source="SUSE-SU"/>
		<description>
This update for wireshark to version 2.4.12 fixes the following issues:

Security issues fixed:

- CVE-2019-5717: Fixed a denial of service in the P_MUL dissector (bsc#1121232)
- CVE-2019-5718: Fixed a denial of service in the RTSE dissector and other dissectors (bsc#1121233)
- CVE-2019-5719: Fixed a denial of service in the ISAKMP dissector (bsc#1121234)
- CVE-2019-5721: Fixed a denial of service in the ISAKMP dissector (bsc#1121235)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-21"/>
	<updated date="2019-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1121232">SUSE bug 1121232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121233">SUSE bug 1121233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121234">SUSE bug 1121234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121235">SUSE bug 1121235</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5717/">CVE-2019-5717</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5718/">CVE-2019-5718</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5719/">CVE-2019-5719</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5721/">CVE-2019-5721</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521218" comment="libwireshark9-2.4.12-48.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521219" comment="libwiretap7-2.4.12-48.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521220" comment="libwscodecs1-2.4.12-48.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521221" comment="libwsutil8-2.4.12-48.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521222" comment="wireshark-2.4.12-48.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521223" comment="wireshark-gtk-2.4.12-48.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78573" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1135824" ref_url="https://bugzilla.suse.com/1135824" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11691" ref_url="https://www.suse.com/security/cve/CVE-2019-11691/" source="CVE"/>
		<reference ref_id="CVE-2019-11692" ref_url="https://www.suse.com/security/cve/CVE-2019-11692/" source="CVE"/>
		<reference ref_id="CVE-2019-11693" ref_url="https://www.suse.com/security/cve/CVE-2019-11693/" source="CVE"/>
		<reference ref_id="CVE-2019-11694" ref_url="https://www.suse.com/security/cve/CVE-2019-11694/" source="CVE"/>
		<reference ref_id="CVE-2019-11698" ref_url="https://www.suse.com/security/cve/CVE-2019-11698/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="CVE-2019-9800" ref_url="https://www.suse.com/security/cve/CVE-2019-9800/" source="CVE"/>
		<reference ref_id="CVE-2019-9815" ref_url="https://www.suse.com/security/cve/CVE-2019-9815/" source="CVE"/>
		<reference ref_id="CVE-2019-9816" ref_url="https://www.suse.com/security/cve/CVE-2019-9816/" source="CVE"/>
		<reference ref_id="CVE-2019-9817" ref_url="https://www.suse.com/security/cve/CVE-2019-9817/" source="CVE"/>
		<reference ref_id="CVE-2019-9818" ref_url="https://www.suse.com/security/cve/CVE-2019-9818/" source="CVE"/>
		<reference ref_id="CVE-2019-9819" ref_url="https://www.suse.com/security/cve/CVE-2019-9819/" source="CVE"/>
		<reference ref_id="CVE-2019-9820" ref_url="https://www.suse.com/security/cve/CVE-2019-9820/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed:

- CVE-2019-11691: Use-after-free in XMLHttpRequest
- CVE-2019-11692: Use-after-free removing listeners in the event listener manager
- CVE-2019-11693: Buffer overflow in WebGL bufferdata on Linux
- CVE-2019-11694: Uninitialized memory memory leakage in Windows sandbox
- CVE-2019-11698: Theft of user history data through drag and drop of hyperlinks to and from bookmarks
- CVE-2019-7317: Use-after-free in png_image_free of libpng library
- CVE-2019-9800: Memory safety bugs fixed in Firefox 67 and Firefox ESR 60.7
- CVE-2019-9815: Disable hyperthreading on content JavaScript threads on macOS
- CVE-2019-9816: Type confusion with object groups and UnboxedObjects
- CVE-2019-9817: Stealing of cross-domain images using canvas
- CVE-2019-9818: Use-after-free in crash generation server
- CVE-2019-9819: Compartment mismatch with fetch API
- CVE-2019-9820: Use-after-free of ChromeEventHandler by DocShell

Non-security issues fixed:

- Font and date adjustments to accommodate the new Reiwa era in Japan
- Update to Firefox ESR 60.7 (bsc#1135824)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11691/">CVE-2019-11691</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11692/">CVE-2019-11692</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11693/">CVE-2019-11693</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11694/">CVE-2019-11694</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11698/">CVE-2019-11698</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9800/">CVE-2019-9800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-9815/">CVE-2019-9815</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9816/">CVE-2019-9816</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9817/">CVE-2019-9817</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9818/">CVE-2019-9818</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9819/">CVE-2019-9819</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9820/">CVE-2019-9820</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521224" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521225" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78574" version="1" class="patch">
	<metadata>
		<title>Security update for gnome-shell (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1124493" ref_url="https://bugzilla.suse.com/1124493" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3820" ref_url="https://www.suse.com/security/cve/CVE-2019-3820/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005523.html" source="SUSE-SU"/>
		<description>
This update for gnome-shell fixes the following issues:

Security issue fixed:

- CVE-2019-3820: Fixed a partial lock screen bypass (bsc#1124493).

Fixed bugs:

- Remove sessionList of endSessionDialog for security reasons (jsc#SLE-6660).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124493">SUSE bug 1124493</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3820/">CVE-2019-3820</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521226" comment="gnome-shell-3.20.4-77.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521227" comment="gnome-shell-browser-plugin-3.20.4-77.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521228" comment="gnome-shell-calendar-3.20.4-77.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521229" comment="gnome-shell-lang-3.20.4-77.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78575" version="1" class="patch">
	<metadata>
		<title>Security update for evolution (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1125230" ref_url="https://bugzilla.suse.com/1125230" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15587" ref_url="https://www.suse.com/security/cve/CVE-2018-15587/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005522.html" source="SUSE-SU"/>
		<description>
This update for evolution fixes the following issue:

Security issue fixed:

- CVE-2018-15587: Fixed OpenPGP signatures spoofing via specially crafted email that contains a valid signature (bsc#1125230).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1125230">SUSE bug 1125230</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15587/">CVE-2018-15587</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521230" comment="evolution-3.22.6-19.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521231" comment="evolution-lang-3.22.6-19.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78576" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1132728" ref_url="https://bugzilla.suse.com/1132728" source="BUGZILLA"/>
		<reference ref_id="1132729" ref_url="https://bugzilla.suse.com/1132729" source="BUGZILLA"/>
		<reference ref_id="1132732" ref_url="https://bugzilla.suse.com/1132732" source="BUGZILLA"/>
		<reference ref_id="1134297" ref_url="https://bugzilla.suse.com/1134297" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="CVE-2019-2426" ref_url="https://www.suse.com/security/cve/CVE-2019-2426/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005521.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Update to 2.6.18 - OpenJDK 7u221 (April 2019 CPU)

Security issues fixed:

- CVE-2019-2602: Fixed flaw inside BigDecimal implementation (Component: Libraries) (bsc#1132728).
- CVE-2019-2684: Fixed flaw inside the RMI registry implementation (bsc#1132732).
- CVE-2019-2698: Fixed out of bounds access flaw in the 2D component (bsc#1132729).
- CVE-2019-2422: Fixed memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed a Divide By Zero in alloc_sarray function in jmemmgr.c (bsc#1122299).
- CVE-2019-2426: Improve web server connections (bsc#1134297).

Bug fixes:

- Please check the package Changelog for detailed information.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134297">SUSE bug 1134297</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2426/">CVE-2019-2426</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521232" comment="java-1_7_0-openjdk-1.7.0.221-43.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521233" comment="java-1_7_0-openjdk-headless-1.7.0.221-43.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78577" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1104129" ref_url="https://bugzilla.suse.com/1104129" source="BUGZILLA"/>
		<reference ref_id="1126068" ref_url="https://bugzilla.suse.com/1126068" source="BUGZILLA"/>
		<reference ref_id="1126069" ref_url="https://bugzilla.suse.com/1126069" source="BUGZILLA"/>
		<reference ref_id="1133185" ref_url="https://bugzilla.suse.com/1133185" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5740" ref_url="https://www.suse.com/security/cve/CVE-2018-5740/" source="CVE"/>
		<reference ref_id="CVE-2018-5743" ref_url="https://www.suse.com/security/cve/CVE-2018-5743/" source="CVE"/>
		<reference ref_id="CVE-2018-5745" ref_url="https://www.suse.com/security/cve/CVE-2018-5745/" source="CVE"/>
		<reference ref_id="CVE-2019-6465" ref_url="https://www.suse.com/security/cve/CVE-2019-6465/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

Security issues fixed:

- CVE-2018-5740: Fixed a denial of service vulnerability in the 'deny-answer-aliases' feature (bsc#1104129).
- CVE-2019-6465: Fixed an issue where controls for zone transfers may not be properly applied to Dynamically Loadable Zones (bsc#1126069).
- CVE-2018-5745: An assertion failure can occur if a trust anchor rolls over to an unsupported key algorithm when using managed-keys. (bsc#1126068)
- CVE-2018-5743: Limiting simultaneous TCP clients is ineffective. (bsc#1133185)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-03"/>
	<updated date="2019-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104129">SUSE bug 1104129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126068">SUSE bug 1126068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126069">SUSE bug 1126069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133185">SUSE bug 1133185</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5740/">CVE-2018-5740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5743/">CVE-2018-5743</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5745/">CVE-2018-5745</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6465/">CVE-2019-6465</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521234" comment="bind-libs-9.9.9P1-63.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521235" comment="bind-utils-9.9.9P1-63.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78578" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="1130847" ref_url="https://bugzilla.suse.com/1130847" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9948" ref_url="https://www.suse.com/security/cve/CVE-2019-9948/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005534.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

Security issues fixed:

- CVE-2019-9948: Fixed a 'file:' blacklist bypass in URIs by using the 'local-file:' scheme instead (bsc#1130847).
- CVE-2019-9636: Fixed an information disclosure because of incorrect handling of Unicode encoding during NFKC normalization (bsc#1129346).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-06"/>
	<updated date="2019-06-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130847">SUSE bug 1130847</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9948/">CVE-2019-9948</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521236" comment="libpython2_7-1_0-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521237" comment="libpython2_7-1_0-32bit-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521238" comment="python-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521239" comment="python-base-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521240" comment="python-curses-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521241" comment="python-devel-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521242" comment="python-tk-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521243" comment="python-xml-2.7.13-28.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78579" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1122319" ref_url="https://bugzilla.suse.com/1122319" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6116" ref_url="https://www.suse.com/security/cve/CVE-2019-6116/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005061.html" source="SUSE-SU"/>
		<description>
This update for ghostscript to version 9.26a fixes the following issues:

Security issue fixed:

- CVE-2019-6116: subroutines within pseudo-operators must themselves be pseudo-operators (bsc#1122319)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-23"/>
	<updated date="2019-01-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122319">SUSE bug 1122319</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6116/">CVE-2019-6116</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521244" comment="ghostscript-9.26a-23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521245" comment="ghostscript-x11-9.26a-23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521246" comment="libspectre1-0.2.7-12.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78580" version="1" class="patch">
	<metadata>
		<title>Security update for LibreOffice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1089811" ref_url="https://bugzilla.suse.com/1089811" source="BUGZILLA"/>
		<reference ref_id="1116451" ref_url="https://bugzilla.suse.com/1116451" source="BUGZILLA"/>
		<reference ref_id="1121874" ref_url="https://bugzilla.suse.com/1121874" source="BUGZILLA"/>
		<reference ref_id="1123131" ref_url="https://bugzilla.suse.com/1123131" source="BUGZILLA"/>
		<reference ref_id="1123455" ref_url="https://bugzilla.suse.com/1123455" source="BUGZILLA"/>
		<reference ref_id="1124062" ref_url="https://bugzilla.suse.com/1124062" source="BUGZILLA"/>
		<reference ref_id="1124869" ref_url="https://bugzilla.suse.com/1124869" source="BUGZILLA"/>
		<reference ref_id="1127760" ref_url="https://bugzilla.suse.com/1127760" source="BUGZILLA"/>
		<reference ref_id="1127857" ref_url="https://bugzilla.suse.com/1127857" source="BUGZILLA"/>
		<reference ref_id="1128845" ref_url="https://bugzilla.suse.com/1128845" source="BUGZILLA"/>
		<reference ref_id="1135189" ref_url="https://bugzilla.suse.com/1135189" source="BUGZILLA"/>
		<reference ref_id="1135228" ref_url="https://bugzilla.suse.com/1135228" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16858" ref_url="https://www.suse.com/security/cve/CVE-2018-16858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1448-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191448-1.html" source="SUSE-SU"/>
		<description>
This update for libreoffice and libraries fixes the following issues:

LibreOffice was updated to 6.2.3.2 (fate#327121 bsc#1128845 bsc#1123455),
bringing lots of bug and stability fixes.

Additional bugfixes:

- If there is no firebird engine we still need java to run hsqldb (bsc#1135189)
- PPTX: Rectangle turns from green to blue and loses transparency when transparency is set (bsc#1135228)
- Slide deck compression doesn't, hmm, compress too much (bsc#1127760)
- Psychedelic graphics in LibreOffice (but not PowerPoint) (bsc#1124869)
- Image from PPTX shown in a square, not a circle (bsc#1121874)

libixion was updated to 0.14.1:

* Updated for new orcus

liborcus was updated to 0.14.1:

* Boost 1.67 support
* Various cell handling issues fixed



libwps was updated to 0.4.10:

* QuattroPro: add parser of .qwp files
* all: support complex encoding

mdds was updated to 1.4.3:

* Api change to 1.4
* More multivector opreations and tweaks
* Various multi vector fixes
* flat_segment_tree: add segment iterator and functions
* fix to handle out-of-range insertions on flat_segment_tree
* Another api version -&gt; rename to mdds-1_2

myspell-dictionaries was updated to 20190423:

* Serbian dictionary updated
* Update af_ZA hunspell
* Update Spanish dictionary
* Update Slovenian dictionary
* Update Breton dictionary
* Update Galician dictionary
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-07"/>
	<updated date="2019-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089811">SUSE bug 1089811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116451">SUSE bug 1116451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121874">SUSE bug 1121874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123131">SUSE bug 1123131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123455">SUSE bug 1123455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124062">SUSE bug 1124062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124869">SUSE bug 1124869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127760">SUSE bug 1127760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127857">SUSE bug 1127857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128845">SUSE bug 1128845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135189">SUSE bug 1135189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135228">SUSE bug 1135228</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16858/">CVE-2018-16858</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521247" comment="libixion-0_14-0-0.14.1-13.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521248" comment="liborcus-0_14-0-0.14.1-10.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521249" comment="libreoffice-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521250" comment="libreoffice-base-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521251" comment="libreoffice-base-drivers-postgresql-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521252" comment="libreoffice-branding-upstream-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521253" comment="libreoffice-calc-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521254" comment="libreoffice-calc-extensions-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521255" comment="libreoffice-draw-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521256" comment="libreoffice-filters-optional-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521257" comment="libreoffice-gnome-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521258" comment="libreoffice-gtk2-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521259" comment="libreoffice-icon-themes-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521260" comment="libreoffice-impress-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521261" comment="libreoffice-l10n-af-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521262" comment="libreoffice-l10n-ar-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521263" comment="libreoffice-l10n-ca-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521264" comment="libreoffice-l10n-cs-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521265" comment="libreoffice-l10n-da-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521266" comment="libreoffice-l10n-de-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521267" comment="libreoffice-l10n-en-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521268" comment="libreoffice-l10n-es-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521269" comment="libreoffice-l10n-fi-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521270" comment="libreoffice-l10n-fr-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521271" comment="libreoffice-l10n-gu-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521272" comment="libreoffice-l10n-hi-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521273" comment="libreoffice-l10n-hu-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521274" comment="libreoffice-l10n-it-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521275" comment="libreoffice-l10n-ja-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521276" comment="libreoffice-l10n-ko-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521277" comment="libreoffice-l10n-nb-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521278" comment="libreoffice-l10n-nl-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521279" comment="libreoffice-l10n-nn-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521280" comment="libreoffice-l10n-pl-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521281" comment="libreoffice-l10n-pt_BR-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521282" comment="libreoffice-l10n-pt_PT-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521283" comment="libreoffice-l10n-ro-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521284" comment="libreoffice-l10n-ru-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521285" comment="libreoffice-l10n-sk-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521286" comment="libreoffice-l10n-sv-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521287" comment="libreoffice-l10n-xh-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521288" comment="libreoffice-l10n-zh_CN-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521289" comment="libreoffice-l10n-zh_TW-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521290" comment="libreoffice-l10n-zu-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521291" comment="libreoffice-mailmerge-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521292" comment="libreoffice-math-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521293" comment="libreoffice-officebean-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521294" comment="libreoffice-pyuno-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521295" comment="libreoffice-writer-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521296" comment="libreoffice-writer-extensions-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521297" comment="libwps-0_4-4-0.4.10-10.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521298" comment="myspell-af_NA-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521299" comment="myspell-af_ZA-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521300" comment="myspell-ar-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521301" comment="myspell-ar_AE-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521302" comment="myspell-ar_BH-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521303" comment="myspell-ar_DZ-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521304" comment="myspell-ar_EG-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521305" comment="myspell-ar_IQ-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521306" comment="myspell-ar_JO-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521307" comment="myspell-ar_KW-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521308" comment="myspell-ar_LB-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521309" comment="myspell-ar_LY-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521310" comment="myspell-ar_MA-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521311" comment="myspell-ar_OM-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521312" comment="myspell-ar_QA-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521313" comment="myspell-ar_SA-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521314" comment="myspell-ar_SD-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521315" comment="myspell-ar_SY-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521316" comment="myspell-ar_TN-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521317" comment="myspell-ar_YE-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521318" comment="myspell-be_BY-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521319" comment="myspell-bg_BG-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521320" comment="myspell-bn_BD-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521321" comment="myspell-bn_IN-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521322" comment="myspell-bs-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521323" comment="myspell-bs_BA-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521324" comment="myspell-ca-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521325" comment="myspell-ca_AD-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521326" comment="myspell-ca_ES-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521327" comment="myspell-ca_ES_valencia-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521328" comment="myspell-ca_FR-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521329" comment="myspell-ca_IT-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521330" comment="myspell-cs_CZ-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521331" comment="myspell-da_DK-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521332" comment="myspell-de-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521333" comment="myspell-de_AT-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521334" comment="myspell-de_CH-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521335" comment="myspell-de_DE-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521336" comment="myspell-dictionaries-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521337" comment="myspell-el_GR-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521338" comment="myspell-en-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521339" comment="myspell-en_AU-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521340" comment="myspell-en_BS-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521341" comment="myspell-en_BZ-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521342" comment="myspell-en_CA-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521343" comment="myspell-en_GB-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521344" comment="myspell-en_GH-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521345" comment="myspell-en_IE-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521346" comment="myspell-en_IN-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521347" comment="myspell-en_JM-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521348" comment="myspell-en_MW-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521349" comment="myspell-en_NA-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521350" comment="myspell-en_NZ-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521351" comment="myspell-en_PH-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521352" comment="myspell-en_TT-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521353" comment="myspell-en_US-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521354" comment="myspell-en_ZA-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521355" comment="myspell-en_ZW-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521356" comment="myspell-es-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521357" comment="myspell-es_AR-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521358" comment="myspell-es_BO-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521359" comment="myspell-es_CL-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521360" comment="myspell-es_CO-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521361" comment="myspell-es_CR-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521362" comment="myspell-es_CU-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521363" comment="myspell-es_DO-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521364" comment="myspell-es_EC-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521365" comment="myspell-es_ES-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521366" comment="myspell-es_GT-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521367" comment="myspell-es_HN-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521368" comment="myspell-es_MX-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521369" comment="myspell-es_NI-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521370" comment="myspell-es_PA-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521371" comment="myspell-es_PE-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521372" comment="myspell-es_PR-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521373" comment="myspell-es_PY-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521374" comment="myspell-es_SV-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521375" comment="myspell-es_UY-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521376" comment="myspell-es_VE-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521377" comment="myspell-et_EE-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521378" comment="myspell-fr_BE-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521379" comment="myspell-fr_CA-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521380" comment="myspell-fr_CH-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521381" comment="myspell-fr_FR-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521382" comment="myspell-fr_LU-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521383" comment="myspell-fr_MC-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521384" comment="myspell-gu_IN-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521385" comment="myspell-he_IL-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521386" comment="myspell-hi_IN-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521387" comment="myspell-hr_HR-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521388" comment="myspell-hu_HU-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521389" comment="myspell-id-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521390" comment="myspell-id_ID-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521391" comment="myspell-it_IT-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521392" comment="myspell-lightproof-en-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521393" comment="myspell-lightproof-hu_HU-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521394" comment="myspell-lightproof-pt_BR-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521395" comment="myspell-lightproof-ru_RU-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521396" comment="myspell-lo_LA-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521397" comment="myspell-lt_LT-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521398" comment="myspell-lv_LV-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521399" comment="myspell-nb_NO-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521400" comment="myspell-nl_BE-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521401" comment="myspell-nl_NL-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521402" comment="myspell-nn_NO-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521403" comment="myspell-no-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521404" comment="myspell-pl_PL-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521405" comment="myspell-pt_AO-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521406" comment="myspell-pt_BR-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521407" comment="myspell-pt_PT-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521408" comment="myspell-ro-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521409" comment="myspell-ro_RO-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521410" comment="myspell-ru_RU-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521411" comment="myspell-sk_SK-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521412" comment="myspell-sl_SI-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521413" comment="myspell-sr-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521414" comment="myspell-sr_CS-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521415" comment="myspell-sr_Latn_CS-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521416" comment="myspell-sr_Latn_RS-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521417" comment="myspell-sr_RS-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521418" comment="myspell-sv_FI-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521419" comment="myspell-sv_SE-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521420" comment="myspell-te-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521421" comment="myspell-te_IN-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521422" comment="myspell-th_TH-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521423" comment="myspell-uk_UA-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521424" comment="myspell-vi-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521425" comment="myspell-vi_VN-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521426" comment="myspell-zu_ZA-20190423-16.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78581" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1137443" ref_url="https://bugzilla.suse.com/1137443" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12735" ref_url="https://www.suse.com/security/cve/CVE-2019-12735/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005543.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issue:

Security issue fixed: 

- CVE-2019-12735: Fixed a potential arbitrary code execution vulnerability in getchar.c (bsc#1137443).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-11"/>
	<updated date="2019-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137443">SUSE bug 1137443</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12735/">CVE-2019-12735</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521427" comment="gvim-7.4.326-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521428" comment="vim-7.4.326-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521429" comment="vim-data-7.4.326-17.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78582" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1119553" ref_url="https://bugzilla.suse.com/1119553" source="BUGZILLA"/>
		<reference ref_id="1119554" ref_url="https://bugzilla.suse.com/1119554" source="BUGZILLA"/>
		<reference ref_id="1119555" ref_url="https://bugzilla.suse.com/1119555" source="BUGZILLA"/>
		<reference ref_id="1119556" ref_url="https://bugzilla.suse.com/1119556" source="BUGZILLA"/>
		<reference ref_id="1119557" ref_url="https://bugzilla.suse.com/1119557" source="BUGZILLA"/>
		<reference ref_id="1119558" ref_url="https://bugzilla.suse.com/1119558" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-4437" ref_url="https://www.suse.com/security/cve/CVE-2018-4437/" source="CVE"/>
		<reference ref_id="CVE-2018-4438" ref_url="https://www.suse.com/security/cve/CVE-2018-4438/" source="CVE"/>
		<reference ref_id="CVE-2018-4441" ref_url="https://www.suse.com/security/cve/CVE-2018-4441/" source="CVE"/>
		<reference ref_id="CVE-2018-4442" ref_url="https://www.suse.com/security/cve/CVE-2018-4442/" source="CVE"/>
		<reference ref_id="CVE-2018-4443" ref_url="https://www.suse.com/security/cve/CVE-2018-4443/" source="CVE"/>
		<reference ref_id="CVE-2018-4464" ref_url="https://www.suse.com/security/cve/CVE-2018-4464/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005058.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.22.5 fixes the following issues:

Security issues fixed:

- CVE-2018-4438: Fixed a logic issue which lead to memory corruption (bsc#1119554)
- CVE-2018-4437, CVE-2018-4441, CVE-2018-4442, CVE-2018-4443, CVE-2018-4464: 
  Fixed multiple memory corruption issues with improved memory handling 
  (bsc#1119553, bsc#1119555, bsc#1119556, bsc#1119557, bsc#1119558)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-23"/>
	<updated date="2019-01-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1119553">SUSE bug 1119553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119554">SUSE bug 1119554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119555">SUSE bug 1119555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119556">SUSE bug 1119556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119557">SUSE bug 1119557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119558">SUSE bug 1119558</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4437/">CVE-2018-4437</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4438/">CVE-2018-4438</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4441/">CVE-2018-4441</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4442/">CVE-2018-4442</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4443/">CVE-2018-4443</cve>
	<cve impact="critical" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4464/">CVE-2018-4464</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521430" comment="libjavascriptcoregtk-4_0-18-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521431" comment="libwebkit2gtk-4_0-37-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521432" comment="libwebkit2gtk3-lang-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521433" comment="typelib-1_0-JavaScriptCore-4_0-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521434" comment="typelib-1_0-WebKit2-4_0-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521435" comment="webkit2gtk-4_0-injected-bundles-2.22.5-2.32.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78583" version="1" class="patch">
	<metadata>
		<title>Security update for libcroco (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1034481" ref_url="https://bugzilla.suse.com/1034481" source="BUGZILLA"/>
		<reference ref_id="1034482" ref_url="https://bugzilla.suse.com/1034482" source="BUGZILLA"/>
		<reference ref_id="1043898" ref_url="https://bugzilla.suse.com/1043898" source="BUGZILLA"/>
		<reference ref_id="1043899" ref_url="https://bugzilla.suse.com/1043899" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7960" ref_url="https://www.suse.com/security/cve/CVE-2017-7960/" source="CVE"/>
		<reference ref_id="CVE-2017-7961" ref_url="https://www.suse.com/security/cve/CVE-2017-7961/" source="CVE"/>
		<reference ref_id="CVE-2017-8834" ref_url="https://www.suse.com/security/cve/CVE-2017-8834/" source="CVE"/>
		<reference ref_id="CVE-2017-8871" ref_url="https://www.suse.com/security/cve/CVE-2017-8871/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005549.html" source="SUSE-SU"/>
		<description>
This update for libcroco fixes the following issues:

Security issues fixed:

- CVE-2017-7960: Fixed heap overflow (input: check end of input before reading a byte) (bsc#1034481).                                                                    
- CVE-2017-7961: Fixed undefined behavior (tknzr: support only max long rgb values) (bsc#1034482).                                                                       
- CVE-2017-8834: Fixed denial of service (memory allocation error) via a crafted CSS file (bsc#1043898).
- CVE-2017-8871: Fixed denial of service (infinite loop and CPU consumption) via a crafted CSS file (bsc#1043899).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-12"/>
	<updated date="2019-06-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034481">SUSE bug 1034481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034482">SUSE bug 1034482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043898">SUSE bug 1043898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043899">SUSE bug 1043899</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7960/">CVE-2017-7960</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-7961/">CVE-2017-7961</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8834/">CVE-2017-8834</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8871/">CVE-2017-8871</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521436" comment="libcroco-0_6-3-0.6.11-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521437" comment="libcroco-0_6-3-32bit-0.6.11-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78584" version="1" class="patch">
	<metadata>
		<title>Security update for sssd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1124194" ref_url="https://bugzilla.suse.com/1124194" source="BUGZILLA"/>
		<reference ref_id="1132879" ref_url="https://bugzilla.suse.com/1132879" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16838" ref_url="https://www.suse.com/security/cve/CVE-2018-16838/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005550.html" source="SUSE-SU"/>
		<description>
This update for sssd fixes the following issues:

Security issue fixed:

- CVE-2018-16838: Fixed an authentication bypass related to the Group Policy Objects implementation (bsc#1124194).

Non-security issue fixed:

- Create directory to download and cache GPOs (bsc#1132879)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-12"/>
	<updated date="2019-06-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124194">SUSE bug 1124194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132879">SUSE bug 1132879</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16838/">CVE-2018-16838</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521438" comment="libipa_hbac0-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521439" comment="libsss_idmap0-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521440" comment="libsss_nss_idmap0-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521441" comment="libsss_sudo-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521442" comment="python-sssd-config-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521443" comment="sssd-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521444" comment="sssd-ad-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521445" comment="sssd-ipa-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521446" comment="sssd-krb5-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521447" comment="sssd-krb5-common-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521448" comment="sssd-ldap-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521449" comment="sssd-proxy-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521450" comment="sssd-tools-1.13.4-34.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78585" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1134689" ref_url="https://bugzilla.suse.com/1134689" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10130" ref_url="https://www.suse.com/security/cve/CVE-2019-10130/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005561.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

Security issue fixed:

- CVE-2019-10130: Prevent row-level security policies from being bypassed via selectivity estimators (bsc#1134689).

Bug fixes:

- For a complete list of fixes check the release notes.
  * https://www.postgresql.org/docs/10/release-10-8.html
  * https://www.postgresql.org/docs/10/release-10-7.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-14"/>
	<updated date="2019-06-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1134689">SUSE bug 1134689</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10130/">CVE-2019-10130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521451" comment="libecpg6-10.8-1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521452" comment="libpq5-10.8-1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521453" comment="libpq5-32bit-10.8-1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521454" comment="postgresql10-10.8-1.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78586" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1065237" ref_url="https://bugzilla.suse.com/1065237" source="BUGZILLA"/>
		<reference ref_id="1090671" ref_url="https://bugzilla.suse.com/1090671" source="BUGZILLA"/>
		<reference ref_id="1119183" ref_url="https://bugzilla.suse.com/1119183" source="BUGZILLA"/>
		<reference ref_id="1121816" ref_url="https://bugzilla.suse.com/1121816" source="BUGZILLA"/>
		<reference ref_id="1121821" ref_url="https://bugzilla.suse.com/1121821" source="BUGZILLA"/>
		<reference ref_id="1131709" ref_url="https://bugzilla.suse.com/1131709" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005565.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Security vulnerabilities addressed:

- CVE-2019-6109: Fixed an character encoding issue in the progress display of
  the scp client that could be used to manipulate client output, allowing
  for spoofing during file transfers (bsc#1121816).
- CVE-2019-6111: Properly validate object names received by the scp client to
  prevent arbitrary file overwrites when interacting with a malicious SSH server
  (bsc#1121821).

Other issues fixed: 

- Fixed two race conditions in sshd relating to SIGHUP (bsc#1119183).
- Returned proper reason for port forwarding failures (bsc#1090671).
- Fixed a double free() in the KDF CAVS testing tool (bsc#1065237).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-17"/>
	<updated date="2019-06-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1065237">SUSE bug 1065237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090671">SUSE bug 1090671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119183">SUSE bug 1119183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131709">SUSE bug 1131709</bugzilla>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521455" comment="openssh-7.2p2-74.42.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521456" comment="openssh-askpass-gnome-7.2p2-74.42.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521457" comment="openssh-helpers-7.2p2-74.42.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78587" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1005778" ref_url="https://bugzilla.suse.com/1005778" source="BUGZILLA"/>
		<reference ref_id="1005780" ref_url="https://bugzilla.suse.com/1005780" source="BUGZILLA"/>
		<reference ref_id="1005781" ref_url="https://bugzilla.suse.com/1005781" source="BUGZILLA"/>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1019695" ref_url="https://bugzilla.suse.com/1019695" source="BUGZILLA"/>
		<reference ref_id="1019696" ref_url="https://bugzilla.suse.com/1019696" source="BUGZILLA"/>
		<reference ref_id="1022604" ref_url="https://bugzilla.suse.com/1022604" source="BUGZILLA"/>
		<reference ref_id="1063638" ref_url="https://bugzilla.suse.com/1063638" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1085535" ref_url="https://bugzilla.suse.com/1085535" source="BUGZILLA"/>
		<reference ref_id="1085539" ref_url="https://bugzilla.suse.com/1085539" source="BUGZILLA"/>
		<reference ref_id="1090888" ref_url="https://bugzilla.suse.com/1090888" source="BUGZILLA"/>
		<reference ref_id="1099658" ref_url="https://bugzilla.suse.com/1099658" source="BUGZILLA"/>
		<reference ref_id="1100132" ref_url="https://bugzilla.suse.com/1100132" source="BUGZILLA"/>
		<reference ref_id="1106110" ref_url="https://bugzilla.suse.com/1106110" source="BUGZILLA"/>
		<reference ref_id="1106284" ref_url="https://bugzilla.suse.com/1106284" source="BUGZILLA"/>
		<reference ref_id="1106929" ref_url="https://bugzilla.suse.com/1106929" source="BUGZILLA"/>
		<reference ref_id="1108293" ref_url="https://bugzilla.suse.com/1108293" source="BUGZILLA"/>
		<reference ref_id="1108838" ref_url="https://bugzilla.suse.com/1108838" source="BUGZILLA"/>
		<reference ref_id="1110785" ref_url="https://bugzilla.suse.com/1110785" source="BUGZILLA"/>
		<reference ref_id="1110946" ref_url="https://bugzilla.suse.com/1110946" source="BUGZILLA"/>
		<reference ref_id="1112063" ref_url="https://bugzilla.suse.com/1112063" source="BUGZILLA"/>
		<reference ref_id="1112178" ref_url="https://bugzilla.suse.com/1112178" source="BUGZILLA"/>
		<reference ref_id="1116803" ref_url="https://bugzilla.suse.com/1116803" source="BUGZILLA"/>
		<reference ref_id="1117562" ref_url="https://bugzilla.suse.com/1117562" source="BUGZILLA"/>
		<reference ref_id="1119086" ref_url="https://bugzilla.suse.com/1119086" source="BUGZILLA"/>
		<reference ref_id="1120642" ref_url="https://bugzilla.suse.com/1120642" source="BUGZILLA"/>
		<reference ref_id="1120843" ref_url="https://bugzilla.suse.com/1120843" source="BUGZILLA"/>
		<reference ref_id="1120902" ref_url="https://bugzilla.suse.com/1120902" source="BUGZILLA"/>
		<reference ref_id="1122776" ref_url="https://bugzilla.suse.com/1122776" source="BUGZILLA"/>
		<reference ref_id="1126040" ref_url="https://bugzilla.suse.com/1126040" source="BUGZILLA"/>
		<reference ref_id="1126356" ref_url="https://bugzilla.suse.com/1126356" source="BUGZILLA"/>
		<reference ref_id="1128052" ref_url="https://bugzilla.suse.com/1128052" source="BUGZILLA"/>
		<reference ref_id="1129138" ref_url="https://bugzilla.suse.com/1129138" source="BUGZILLA"/>
		<reference ref_id="1129770" ref_url="https://bugzilla.suse.com/1129770" source="BUGZILLA"/>
		<reference ref_id="1130972" ref_url="https://bugzilla.suse.com/1130972" source="BUGZILLA"/>
		<reference ref_id="1131107" ref_url="https://bugzilla.suse.com/1131107" source="BUGZILLA"/>
		<reference ref_id="1131488" ref_url="https://bugzilla.suse.com/1131488" source="BUGZILLA"/>
		<reference ref_id="1131565" ref_url="https://bugzilla.suse.com/1131565" source="BUGZILLA"/>
		<reference ref_id="1132212" ref_url="https://bugzilla.suse.com/1132212" source="BUGZILLA"/>
		<reference ref_id="1132472" ref_url="https://bugzilla.suse.com/1132472" source="BUGZILLA"/>
		<reference ref_id="1133188" ref_url="https://bugzilla.suse.com/1133188" source="BUGZILLA"/>
		<reference ref_id="1133874" ref_url="https://bugzilla.suse.com/1133874" source="BUGZILLA"/>
		<reference ref_id="1134160" ref_url="https://bugzilla.suse.com/1134160" source="BUGZILLA"/>
		<reference ref_id="1134162" ref_url="https://bugzilla.suse.com/1134162" source="BUGZILLA"/>
		<reference ref_id="1134338" ref_url="https://bugzilla.suse.com/1134338" source="BUGZILLA"/>
		<reference ref_id="1134537" ref_url="https://bugzilla.suse.com/1134537" source="BUGZILLA"/>
		<reference ref_id="1134564" ref_url="https://bugzilla.suse.com/1134564" source="BUGZILLA"/>
		<reference ref_id="1134565" ref_url="https://bugzilla.suse.com/1134565" source="BUGZILLA"/>
		<reference ref_id="1134566" ref_url="https://bugzilla.suse.com/1134566" source="BUGZILLA"/>
		<reference ref_id="1134651" ref_url="https://bugzilla.suse.com/1134651" source="BUGZILLA"/>
		<reference ref_id="1134760" ref_url="https://bugzilla.suse.com/1134760" source="BUGZILLA"/>
		<reference ref_id="1134806" ref_url="https://bugzilla.suse.com/1134806" source="BUGZILLA"/>
		<reference ref_id="1134813" ref_url="https://bugzilla.suse.com/1134813" source="BUGZILLA"/>
		<reference ref_id="1134848" ref_url="https://bugzilla.suse.com/1134848" source="BUGZILLA"/>
		<reference ref_id="1135013" ref_url="https://bugzilla.suse.com/1135013" source="BUGZILLA"/>
		<reference ref_id="1135014" ref_url="https://bugzilla.suse.com/1135014" source="BUGZILLA"/>
		<reference ref_id="1135015" ref_url="https://bugzilla.suse.com/1135015" source="BUGZILLA"/>
		<reference ref_id="1135100" ref_url="https://bugzilla.suse.com/1135100" source="BUGZILLA"/>
		<reference ref_id="1135120" ref_url="https://bugzilla.suse.com/1135120" source="BUGZILLA"/>
		<reference ref_id="1135281" ref_url="https://bugzilla.suse.com/1135281" source="BUGZILLA"/>
		<reference ref_id="1135603" ref_url="https://bugzilla.suse.com/1135603" source="BUGZILLA"/>
		<reference ref_id="1135642" ref_url="https://bugzilla.suse.com/1135642" source="BUGZILLA"/>
		<reference ref_id="1135661" ref_url="https://bugzilla.suse.com/1135661" source="BUGZILLA"/>
		<reference ref_id="1135878" ref_url="https://bugzilla.suse.com/1135878" source="BUGZILLA"/>
		<reference ref_id="1136424" ref_url="https://bugzilla.suse.com/1136424" source="BUGZILLA"/>
		<reference ref_id="1136438" ref_url="https://bugzilla.suse.com/1136438" source="BUGZILLA"/>
		<reference ref_id="1136448" ref_url="https://bugzilla.suse.com/1136448" source="BUGZILLA"/>
		<reference ref_id="1136449" ref_url="https://bugzilla.suse.com/1136449" source="BUGZILLA"/>
		<reference ref_id="1136451" ref_url="https://bugzilla.suse.com/1136451" source="BUGZILLA"/>
		<reference ref_id="1136452" ref_url="https://bugzilla.suse.com/1136452" source="BUGZILLA"/>
		<reference ref_id="1136455" ref_url="https://bugzilla.suse.com/1136455" source="BUGZILLA"/>
		<reference ref_id="1136458" ref_url="https://bugzilla.suse.com/1136458" source="BUGZILLA"/>
		<reference ref_id="1136539" ref_url="https://bugzilla.suse.com/1136539" source="BUGZILLA"/>
		<reference ref_id="1136573" ref_url="https://bugzilla.suse.com/1136573" source="BUGZILLA"/>
		<reference ref_id="1136575" ref_url="https://bugzilla.suse.com/1136575" source="BUGZILLA"/>
		<reference ref_id="1136586" ref_url="https://bugzilla.suse.com/1136586" source="BUGZILLA"/>
		<reference ref_id="1136590" ref_url="https://bugzilla.suse.com/1136590" source="BUGZILLA"/>
		<reference ref_id="1136623" ref_url="https://bugzilla.suse.com/1136623" source="BUGZILLA"/>
		<reference ref_id="1136810" ref_url="https://bugzilla.suse.com/1136810" source="BUGZILLA"/>
		<reference ref_id="1136935" ref_url="https://bugzilla.suse.com/1136935" source="BUGZILLA"/>
		<reference ref_id="1136990" ref_url="https://bugzilla.suse.com/1136990" source="BUGZILLA"/>
		<reference ref_id="1137142" ref_url="https://bugzilla.suse.com/1137142" source="BUGZILLA"/>
		<reference ref_id="1137162" ref_url="https://bugzilla.suse.com/1137162" source="BUGZILLA"/>
		<reference ref_id="1137586" ref_url="https://bugzilla.suse.com/1137586" source="BUGZILLA"/>
		<reference ref_id="843419" ref_url="https://bugzilla.suse.com/843419" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17972" ref_url="https://www.suse.com/security/cve/CVE-2018-17972/" source="CVE"/>
		<reference ref_id="CVE-2018-7191" ref_url="https://www.suse.com/security/cve/CVE-2018-7191/" source="CVE"/>
		<reference ref_id="CVE-2019-11190" ref_url="https://www.suse.com/security/cve/CVE-2019-11190/" source="CVE"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11479" ref_url="https://www.suse.com/security/cve/CVE-2019-11479/" source="CVE"/>
		<reference ref_id="CVE-2019-11486" ref_url="https://www.suse.com/security/cve/CVE-2019-11486/" source="CVE"/>
		<reference ref_id="CVE-2019-11815" ref_url="https://www.suse.com/security/cve/CVE-2019-11815/" source="CVE"/>
		<reference ref_id="CVE-2019-11833" ref_url="https://www.suse.com/security/cve/CVE-2019-11833/" source="CVE"/>
		<reference ref_id="CVE-2019-11884" ref_url="https://www.suse.com/security/cve/CVE-2019-11884/" source="CVE"/>
		<reference ref_id="CVE-2019-12382" ref_url="https://www.suse.com/security/cve/CVE-2019-12382/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<reference ref_id="CVE-2019-5489" ref_url="https://www.suse.com/security/cve/CVE-2019-5489/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.180 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-11477: A sequence of SACKs may have been crafted such that one can trigger an integer overflow, leading to a kernel panic.
- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which will
fragment the TCP retransmission queue. An attacker may have been able to further exploit the fragmented queue to cause an
expensive linked-list walk for subsequent SACKs received for that same TCP connection.
- CVE-2019-11479: An attacker could force the Linux kernel to segment its responses into multiple TCP segments. This would drastically increased the bandwidth required to deliver the same amount of data. Further, it would consume additional resources such as CPU and NIC processing power.
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network. (bnc#1136424)
- CVE-2019-12382: An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel, there was an unchecked kstrdup of fwstr, which might have allowed an attacker to cause a denial of service (NULL pointer dereference and system crash). (bnc#1136586)
- CVE-2019-5489: The mincore() implementation in mm/mincore.c in the Linux kernel allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may have been possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server. (bnc#1120843)
- CVE-2019-11833: fs/ext4/extents.c in the Linux kernel did not zero out the unused memory region in the extent tree block, which might have allowed local users to obtain sensitive information by reading uninitialized data in the filesystem. (bnc#1135281)
- CVE-2018-7191: In the tun subsystem in the Linux kernel, dev_get_valid_name was not called before register_netdevice. This allowed local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. (bnc#1135603)
- CVE-2019-11190: The Linux kernel allowed local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() was called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check had a race condition when reading /proc/pid/stat. (bnc#1132472)
- CVE-2019-11815: An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel There was a race condition leading to a use-after-free, related to net namespace cleanup. (bnc#1134537)
- CVE-2019-11884: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel allowed a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a '\0' character. (bnc#1134848)
- CVE-2018-17972: An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel It did not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents. (bnc#1110785)
- CVE-2019-11486: The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel had multiple race conditions. (bnc#1133188)

The following non-security bugs were fixed:

- 9p locks: add mount option for lock retry interval (bnc#1012382).
- 9p: do not trust pdu content for stat item size (bnc#1012382).
- X.509: unpack RSA signatureValue field from BIT STRING (git-fixes).
- acpi / sbs: Fix GPE storm on recent MacBookPro's (bnc#1012382).
- alsa: core: Fix card races between register and disconnect (bnc#1012382).
- alsa: echoaudio: add a check for ioremap_nocache (bnc#1012382).
- alsa: info: Fix racy addition/deletion of nodes (bnc#1012382).
- alsa: line6: use dynamic buffers (bnc#1012382).
- alsa: opl3: fix mismatch between snd_opl3_drum_switch definition and declaration (bnc#1012382).
- alsa: pcm: check if ops are defined before suspending PCM (bnc#1012382).
- alsa: sb8: add a check for request_region (bnc#1012382).
- alsa: seq: Fix OOB-reads from strlcpy (bnc#1012382).
- appletalk: Fix compile regression (bnc#1012382).
- appletalk: Fix use-after-free in atalk_proc_exit (bnc#1012382).
- arm64/kernel: do not ban ADRP to work around Cortex-A53 erratum #843419 (bsc#1126040).
- arm64/kernel: rename module_emit_adrp_veneer-&gt;module_emit_veneer_for_adrp (bsc#1126040).
- arm64: Add helper to decode register from instruction (bsc#1126040).
- arm64: debug: Do not propagate UNKNOWN FAR into si_code for debug signals (bnc#1012382).
- arm64: debug: Ensure debug handlers check triggering exception level (bnc#1012382).
- arm64: futex: Fix FUTEX_WAKE_OP atomic ops with non-zero result value (bnc#1012382).
- arm64: futex: Restore oldval initialization to work around buggy compilers (bnc#1012382).
- arm64: module-plts: factor out PLT generation code for ftrace (bsc#1126040).
- arm64: module: do not BUG when exceeding preallocated PLT count (bsc#1126040).
- arm64: module: split core and init PLT sections (bsc#1126040).
- arm: 8833/1: Ensure that NEON code always compiles with Clang (bnc#1012382).
- arm: 8839/1: kprobe: make patch_lock a raw_spinlock_t (bnc#1012382).
- arm: 8840/1: use a raw_spinlock_t in unwind (bnc#1012382).
- arm: avoid Cortex-A9 livelock on tight dmb loops (bnc#1012382).
- arm: dts: at91: Fix typo in ISC_D0 on PC9 (bnc#1012382).
- arm: dts: pfla02: increase phy reset duration (bnc#1012382).
- arm: iop: do not use using 64-bit DMA masks (bnc#1012382).
- arm: orion: do not use using 64-bit DMA masks (bnc#1012382).
- arm: samsung: Limit SAMSUNG_PM_CHECK config option to non-Exynos platforms (bnc#1012382).
- asoc: Intel: avoid Oops if DMA setup fails (bnc#1012382).
- asoc: cs4270: Set auto-increment bit for register writes (bnc#1012382).
- asoc: fsl-asoc-card: fix object reference leaks in fsl_asoc_card_probe (bnc#1012382).
- asoc: fsl_esai: fix channel swap issue when stream starts (bnc#1012382).
- asoc: tlv320aic32x4: Fix Common Pins (bnc#1012382).
- asoc:soc-pcm:fix a codec fixup issue in TDM case (bnc#1012382).
- backlight: lm3630a: Return 0 on success in update_status functions (bsc#1106929)
- bcache: Move couple of functions to sysfs.c (bsc#1130972).
- bcache: Move couple of string arrays to sysfs.c (bsc#1130972).
- bcache: Populate writeback_rate_minimum attribute (bsc#1130972).
- bcache: account size of buckets used in uuid write to ca-&gt;meta_sectors_written (bsc#1130972).
- bcache: add MODULE_DESCRIPTION information (bsc#1130972).
- bcache: add a comment in super.c (bsc#1130972).
- bcache: add code comments for bset.c (bsc#1130972).
- bcache: add comment for cache_set-&gt;fill_iter (bsc#1130972).
- bcache: add identifier names to arguments of function definitions (bsc#1130972).
- bcache: add missing SPDX header (bsc#1130972).
- bcache: add separate workqueue for journal_write to avoid deadlock (bsc#1130972).
- bcache: add static const prefix to char * array declarations (bsc#1130972).
- bcache: add sysfs_strtoul_bool() for setting bit-field variables (bsc#1130972).
- bcache: add the missing comments for smp_mb()/smp_wmb() (bsc#1130972).
- bcache: cannot set writeback_running via sysfs if no writeback kthread created (bsc#1130972).
- bcache: comment on direct access to bvec table (bsc#1130972).
- bcache: correct dirty data statistics (bsc#1130972).
- bcache: do not assign in if condition in bcache_device_init() (bsc#1130972).
- bcache: do not assign in if condition in bcache_init() (bsc#1130972).
- bcache: do not assign in if condition register_bcache() (bsc#1130972).
- bcache: do not check NULL pointer before calling kmem_cache_destroy (bsc#1130972).
- bcache: do not check if debug dentry is ERR or NULL explicitly on remove (bsc#1130972).
- bcache: do not clone bio in bch_data_verify (bsc#1130972).
- bcache: do not mark writeback_running too early (bsc#1130972).
- bcache: export backing_dev_name via sysfs (bsc#1130972).
- bcache: export backing_dev_uuid via sysfs (bsc#1130972).
- bcache: fix code comments style (bsc#1130972).
- bcache: fix indent by replacing blank by tabs (bsc#1130972).
- bcache: fix indentation issue, remove tabs on a hunk of code (bsc#1130972).
- bcache: fix input integer overflow of congested threshold (bsc#1130972).
- bcache: fix input overflow to cache set sysfs file io_error_halflife (bnc#1012382).
- bcache: fix input overflow to journal_delay_ms (bsc#1130972).
- bcache: fix input overflow to sequential_cutoff (bnc#1012382).
- bcache: fix input overflow to writeback_delay (bsc#1130972).
- bcache: fix input overflow to writeback_rate_minimum (bsc#1130972).
- bcache: fix ioctl in flash device (bsc#1130972).
- bcache: fix mistaken code comments in bcache.h (bsc#1130972).
- bcache: fix mistaken comments in request.c (bsc#1130972).
- bcache: fix potential div-zero error of writeback_rate_i_term_inverse (bsc#1130972).
- bcache: fix potential div-zero error of writeback_rate_p_term_inverse (bsc#1130972).
- bcache: fix typo 'succesfully' to 'successfully' (bsc#1130972).
- bcache: fix typo in code comments of closure_return_with_destructor() (bsc#1130972).
- bcache: improve sysfs_strtoul_clamp() (bnc#1012382).
- bcache: introduce force_wake_up_gc() (bsc#1130972).
- bcache: make cutoff_writeback and cutoff_writeback_sync tunable (bsc#1130972).
- bcache: move open brace at end of function definitions to next line (bsc#1130972).
- bcache: never writeback a discard operation (bsc#1130972).
- bcache: not use hard coded memset size in bch_cache_accounting_clear() (bsc#1130972).
- bcache: option to automatically run gc thread after writeback (bsc#1130972).
- bcache: panic fix for making cache device (bsc#1130972).
- bcache: prefer 'help' in Kconfig (bsc#1130972).
- bcache: print number of keys in trace_bcache_journal_write (bsc#1130972).
- bcache: recal cached_dev_sectors on detach (bsc#1130972).
- bcache: remove unnecessary space before ioctl function pointer arguments (bsc#1130972).
- bcache: remove unused bch_passthrough_cache (bsc#1130972).
- bcache: remove useless parameter of bch_debug_init() (bsc#1130972).
- bcache: replace '%pF' by '%pS' in seq_printf() (bsc#1130972).
- bcache: replace Symbolic permissions by octal permission numbers (bsc#1130972).
- bcache: replace hard coded number with BUCKET_GC_GEN_MAX (bsc#1130972).
- bcache: replace printk() by pr_*() routines (bsc#1130972).
- bcache: set writeback_percent in a flexible range (bsc#1130972).
- bcache: split combined if-condition code into separate ones (bsc#1130972).
- bcache: stop using the deprecated get_seconds() (bsc#1130972).
- bcache: style fix to add a blank line after declarations (bsc#1130972).
- bcache: style fix to replace 'unsigned' by 'unsigned int' (bsc#1130972).
- bcache: style fixes for lines over 80 characters (bsc#1130972).
- bcache: trace missed reading by cache_missed (bsc#1130972).
- bcache: treat stale and dirty keys as bad keys (bsc#1130972).
- bcache: trivial - remove tailing backslash in macro BTREE_FLAG (bsc#1130972).
- bcache: update comment for bch_data_insert (bsc#1130972).
- bcache: use (REQ_META|REQ_PRIO) to indicate bio for metadata (bsc#1130972).
- bcache: use MAX_CACHES_PER_SET instead of magic number 8 in __bch_bucket_alloc_set (bsc#1130972).
- bcache: use REQ_PRIO to indicate bio for metadata (bsc#1130972).
- bcache: use routines from lib/crc64.c for CRC64 calculation (bsc#1130972).
- bcache: use sysfs_strtoul_bool() to set bit-field variables (bsc#1130972).
- bcache: writeback: properly order backing device IO (bsc#1130972).
- binfmt_elf: switch to new creds when switching to new mm (bnc#1012382).
- bitops: avoid integer overflow in GENMASK(_ULL) (bnc#1012382).
- block: check_events: do not bother with events if unsupported (bsc#1110946).
- block: disk_events: introduce event flags (bsc#1110946).
- block: do not leak memory in bio_copy_user_iov() (bnc#1012382).
- block: fix use-after-free on gendisk (bsc#1136448).
- bluetooth: Align minimum encryption key size for LE and BR/EDR connections (bnc#1012382).
- bluetooth: Fix decrementing reference count twice in releasing socket (bnc#1012382).
- bnxt_en: Improve multicast address setup logic (bnc#1012382).
- bonding: fix arp_validate toggling in active-backup mode (bnc#1012382).
- bonding: fix event handling for stacked bonds (bnc#1012382).
- bonding: show full hw address in sysfs for slave entries (bnc#1012382).
- bpf: reject wrong sized filters earlier (bnc#1012382).
- bridge: Fix error path for kobject_init_and_add() (bnc#1012382).
- btrfs: Do not panic when we can't find a root key (bsc#1112063).
- btrfs: Factor out common delayed refs init code (bsc#1134813).
- btrfs: Introduce init_delayed_ref_head (bsc#1134813).
- btrfs: Open-code add_delayed_data_ref (bsc#1134813).
- btrfs: Open-code add_delayed_tree_ref (bsc#1134813).
- btrfs: Use init_delayed_ref_common in add_delayed_data_ref (bsc#1134813).
- btrfs: Use init_delayed_ref_common in add_delayed_tree_ref (bsc#1134813).
- btrfs: Use init_delayed_ref_head in add_delayed_ref_head (bsc#1134813).
- btrfs: add a helper to return a head ref (bsc#1134813).
- btrfs: breakout empty head cleanup to a helper (bsc#1134813).
- btrfs: delayed-ref: Introduce better documented delayed ref structures (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_data_ref() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_tree_ref() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Fix a bug that btrfs is unable to add pinned bytes (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Open-code process_func in __btrfs_mod_ref (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Use btrfs_ref to refactor add_pinned_bytes() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_free_extent() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_inc_extent_ref() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: move all ref head cleanup to the helper function (bsc#1134813).
- btrfs: move extent_op cleanup to a helper (bsc#1134813).
- btrfs: move ref_mod modification into the if (ref) logic (bsc#1134813).
- btrfs: qgroup: Check bg while resuming relocation to avoid NULL pointer dereference (bsc#1134806).
- btrfs: qgroup: Do not scan leaf if we're modifying reloc tree (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: qgroup: Move reserved data accounting from btrfs_delayed_ref_head to btrfs_qgroup_extent_record (bsc#1134162).
- btrfs: qgroup: Remove duplicated trace points for qgroup_rsv_add/release (bsc#1134160).
- btrfs: reloc: Also queue orphan reloc tree for cleanup to avoid BUG_ON() (bsc#1134338).
- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1134651).
- btrfs: remove delayed_ref_node from ref_head (bsc#1134813).
- btrfs: split delayed ref head initialization and addition (bsc#1134813).
- btrfs: track refs in a rb_tree instead of a list (bsc#1134813).
- cdc-acm: cleaning up debug in data submission path (bsc#1136539).
- cdc-acm: fix race between reset and control messaging (bsc#1106110).
- cdc-acm: handle read pipe errors (bsc#1135878).
- cdc-acm: reassemble fragmented notifications (bsc#1136590).
- cdc-acm: store in and out pipes in acm structure (bsc#1136575).
- cdrom: Fix race condition in cdrom_sysctl_register (bnc#1012382).
- ceph: ensure d_name stability in ceph_dentry_hash() (bsc#1134564).
- ceph: fix ci-&gt;i_head_snapc leak (bsc#1122776).
- ceph: fix use-after-free on symlink traversal (bsc#1134565).
- ceph: only use d_name directly when parent is locked (bsc#1134566).
- cifs: Fix NULL pointer dereference of devname (bnc#1012382).
- cifs: do not attempt cifs operation on smb2+ rename error (bnc#1012382).
- cifs: fallback to older infolevels on findfirst queryinfo retry (bnc#1012382).
- cifs: keep FileInfo handle live during oplock break (bsc#1106284, bsc#1131565).
- cifs: use correct format characters (bnc#1012382).
- clk: fix mux clock documentation (bsc#1090888).
- coresight: etm4x: Add support to enable ETMv4.2 (bnc#1012382).
- cpu/speculation: Add 'mitigations=' cmdline option (bnc#1012382 bsc#1112178).
- cpupower: remove stringop-truncation waring (bsc#1119086).
- crypto: crypto4xx - properly set IV after de- and encrypt (bnc#1012382).
- crypto: sha256/arm - fix crash bug in Thumb2 build (bnc#1012382).
- crypto: sha512/arm - fix crash bug in Thumb2 build (bnc#1012382).
- crypto: vmx - CTR: always increment IV as quadword (bsc#1135661, bsc#1137162).
- crypto: vmx - fix copy-paste error in CTR mode (bsc#1135661, bsc#1137162).
- crypto: vmx - ghash: do nosimd fallback manually (bsc#1135661, bsc#1137162).
- crypto: vmx - return correct error code on failed setkey (bsc#1135661, bsc#1137162).
- crypto: vmx: Only call enable_kernel_vsx() (bsc#1135661, bsc#1137162).
- crypto: x86/poly1305 - fix overflow during partial reduction (bnc#1012382).
- debugfs: fix use-after-free on symlink traversal (bnc#1012382).
- device_cgroup: fix RCU imbalance in error case (bnc#1012382).
- dm thin: add sanity checks to thin-pool and external snapshot creation (bnc#1012382).
- dmaengine: imx-dma: fix warning comparison of distinct pointer types (bnc#1012382).
- dmaengine: tegra: avoid overflow of byte tracking (bnc#1012382).
- documentation: Add MDS vulnerability documentation (bnc#1012382).
- documentation: Add nospectre_v1 parameter (bnc#1012382).
- documentation: Correct the possible MDS sysfs values (bnc#1012382).
- documentation: Move L1TF to separate directory (bnc#1012382).
- drivers/virt/fsl_hypervisor.c: dereferencing error pointers in ioctl (bnc#1012382).
- drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl (bnc#1012382).
- drm/bridge: adv7511: Fix low refresh rate selection (bsc#1106929)
- drm/dp/mst: Configure no_stop_bit correctly for remote i2c xfers (bnc#1012382).
- drm/fb-helper: dpms_legacy(): Only set on connectors in use (bnc#1106929)
- drm/i915: Fix I915_EXEC_RING_MASK (bnc#1106929)
- drm/rockchip: shutdown drm subsystem on shutdown (bsc#1106929)
- drm/ttm: Remove warning about inconsistent mapping information (bnc#1131488)
- drm/vc4: -&gt;x_scaling[1] should never be set to VC4_SCALING_NONE (bsc#1106929)
- drm/vc4: Account for interrupts in flight (bsc#1106929)
- drm/vc4: Allocate the right amount of space for boot-time CRTC state. (bsc#1106929)
- drm/vc4: Fix NULL pointer dereference in vc4_save_hang_state() (bsc#1106929)
- drm/vc4: Fix OOPSes from trying to cache a partially constructed BO. (bsc#1106929)
- drm/vc4: Fix a couple error codes in vc4_cl_lookup_bos() (bsc#1106929)
- drm/vc4: Fix compilation error reported by kbuild test bot (bsc#1106929)
- drm/vc4: Fix memory leak during gpu reset. (bsc#1106929)
- drm/vc4: Fix memory leak of the CRTC state. (bsc#1106929)
- drm/vc4: Fix oops when userspace hands in a bad BO. (bsc#1106929)
- drm/vc4: Fix overflow mem unreferencing when the binner runs dry. (bsc#1106929)
- drm/vc4: Fix races when the CS reads from render targets. (bsc#1106929)
- drm/vc4: Fix scaling of uni-planar formats (bsc#1106929)
- drm/vc4: Fix the 'no scaling' case on multi-planar YUV formats (bsc#1106929)
- drm/vc4: Flush the caches before the bin jobs, as well. (bsc#1106929)
- drm/vc4: Free hang state before destroying BO cache. (bsc#1106929)
- drm/vc4: Move IRQ enable to PM path (bsc#1106929)
- drm/vc4: Reset -&gt;{x, y}_scaling[1] when dealing with uniplanar (bsc#1106929)
- drm/vc4: Set -&gt;is_yuv to false when num_planes == 1 (bsc#1106929)
- drm/vc4: Use drm_free_large() on handles to match its allocation. (bsc#1106929)
- drm/vc4: fix a bounds check (bsc#1106929)
- drm/vmwgfx: NULL pointer dereference from vmw_cmd_dx_view_define() (bsc#1106929)
- drm/vmwgfx: integer underflow in vmw_cmd_dx_set_shader() leading to (bsc#1106929)
- dt-bindings: rcar-dmac: Document missing error interrupt (bsc#1085535).
- e1000e: Add Support for 38.4MHZ frequency (bsc#1108293 ).
- e1000e: Add Support for CannonLake (bsc#1108293).
- e1000e: Fix -Wformat-truncation warnings (bnc#1012382).
- e1000e: Initial Support for CannonLake (bsc#1108293 ).
- enic: fix build warning without CONFIG_CPUMASK_OFFSTACK (bnc#1012382).
- exportfs: fix 'passing zero to ERR_PTR()' warning (bsc#1136458).
- ext4: Return EAGAIN in case of DIO is beyond end of file (bsc#1136810).
- ext4: actually request zeroing of inode table after grow (bsc#1136451).
- ext4: add missing brelse() in add_new_gdb_meta_bg() (bnc#1012382).
- ext4: avoid panic during forced reboot due to aborted journal (bsc#1126356).
- ext4: cleanup bh release code in ext4_ind_remove_space() (bnc#1012382).
- ext4: fix ext4_show_options for file systems w/o journal (bsc#1136452).
- ext4: fix use-after-free race with debug_want_extra_isize (bsc#1136449).
- ext4: make sure enough credits are reserved for dioread_nolock writes (bsc#1136623).
- ext4: prohibit fstrim in norecovery mode (bnc#1012382).
- ext4: report real fs size after failed resize (bnc#1012382).
- ext4: wait for outstanding dio during truncate in nojournal mode (bsc#1136438).
- f2fs: do not use mutex lock in atomic context (bnc#1012382).
- f2fs: fix to do sanity check with current segment number (bnc#1012382).
- fbdev: fbmem: fix memory access if logo is bigger than the screen (bnc#1012382).
- fix incorrect error code mapping for OBJECTID_NOT_FOUND (bnc#1012382).
- fs/file.c: initialize init_files.resize_wait (bnc#1012382).
- fs/proc/proc_sysctl.c: Fix a NULL pointer dereference (bnc#1012382).
- fs: fix guard_bio_eod to check for real EOD errors (bnc#1012382).
- ftrace/x86_64: Emulate call function while updating in breakpoint handler (bsc#1099658).
- genirq: Prevent use-after-free and work list corruption (bnc#1012382).
- genirq: Respect IRQCHIP_SKIP_SET_WAKE in irq_chip_set_wake_parent() (bnc#1012382).
- gpio: gpio-omap: fix level interrupt idling (bnc#1012382).
- gpu: ipu-v3: dp: fix CSC handling (bnc#1012382).
- h8300: use cc-cross-prefix instead of hardcoding h8300-unknown-linux- (bnc#1012382).
- hid: debug: fix race condition with between rdesc_show() and device removal (bnc#1012382).
- hid: input: add mapping for Expose/Overview key (bnc#1012382).
- hid: input: add mapping for keyboard Brightness Up/Down/Toggle keys (bnc#1012382).
- hugetlbfs: fix memory leak for resv_map (bnc#1012382).
- hwrng: virtio - Avoid repeated init of completion (bnc#1012382).
- i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA (bnc#1012382).
- ib/hfi1: Eliminate opcode tests on mr deref ().
- ib/hfi1: Unreserve a reserved request when it is completed ().
- ib/mlx4: Fix race condition between catas error reset and aliasguid flows (bnc#1012382).
- ib/mlx4: Increase the timeout for CM cache (bnc#1012382).
- ib/rdmavt: Add wc_flags and wc_immdata to cq entry trace ().
- ib/rdmavt: Fix frwr memory registration ().
- igb: Fix WARN_ONCE on runtime suspend (bnc#1012382).
- iio/gyro/bmg160: Use millidegrees for temperature scale (bnc#1012382).
- iio: ad_sigma_delta: select channel when reading register (bnc#1012382).
- iio: adc: at91: disable adc channel interrupt in timeout case (bnc#1012382).
- iio: adc: xilinx: fix potential use-after-free on remove (bnc#1012382).
- include/linux/bitrev.h: fix constant bitrev (bnc#1012382).
- include/linux/swap.h: use offsetof() instead of custom __swapoffset macro (bnc#1012382).
- init: initialize jump labels before command line option parsing (bnc#1012382).
- input: snvs_pwrkey - initialize necessary driver data before enabling IRQ (bnc#1012382).
- io: accel: kxcjk1013: restore the range after resume (bnc#1012382).
- iommu/vt-d: Do not request page request irq under dmar_global_lock (bsc#1135013).
- iommu/vt-d: Make kernel parameter igfx_off work with vIOMMU (bsc#1135014).
- iommu/vt-d: Set intel_iommu_gfx_mapped correctly (bsc#1135015).
- ip6_tunnel: Match to ARPHRD_TUNNEL6 for dev type (bnc#1012382).
- ipmi:ssif: compare block number correctly for multi-part return messages (bsc#1135120).
- ipv4: Fix raw socket lookup for local traffic (bnc#1012382).
- ipv4: add sanity checks in ipv4_link_failure() (git-fixes).
- ipv4: ensure rcu_read_lock() in ipv4_link_failure() (bnc#1012382).
- ipv4: ip_do_fragment: Preserve skb_iif during fragmentation (bnc#1012382).
- ipv4: recompile ip options in ipv4_link_failure (bnc#1012382).
- ipv4: set the tcp_min_rtt_wlen range from 0 to one day (bnc#1012382).
- ipv6/flowlabel: wait rcu grace period before put_pid() (bnc#1012382).
- ipv6: Fix dangling pointer when ipv6 fragment (bnc#1012382).
- ipv6: fix a potential deadlock in do_ipv6_setsockopt() (bnc#1012382).
- ipv6: invert flowlabel sharing check in process and user mode (bnc#1012382).
- ipv6: sit: reset ip header pointer in ipip6_rcv (bnc#1012382).
- ipvs: do not schedule icmp errors from tunnels (bnc#1012382).
- jffs2: fix use-after-free on symlink traversal (bnc#1012382).
- kABI: protect ring_buffer_read_prepare (kabi).
- kABI: protect struct tlb_state (kabi).
- kABI: protect struct usb_interface (kabi).
- kABI: restore ___ptrace_may_access (kabi).
- kABI: restore icmp_send (kabi).
- kabi: arm64: fix kabi breakage on arch specific module (bsc#1126040)
- kabi: drop LINUX_Mib_TCPWQUEUETOOBIG snmp counter (bsc#1137586).
- kabi: move sysctl_tcp_min_snd_mss to preserve struct net layout (bsc#1137586).
- kbuild: clang: choose GCC_TOOLCHAIN_DIR not on LD (bnc#1012382).
- kbuild: simplify ld-option implementation (bnc#1012382).
- kconfig/[mn]conf: handle backspace (^H) key (bnc#1012382).
- kconfig: display recursive dependency resolution hint just once (bsc#1100132).
- kernel/sysctl.c: fix out-of-bounds access when setting file-max (bnc#1012382).
- keys: Timestamp new keys (bsc#1120902).
- kprobes: Fix error check when reusing optimized probes (bnc#1012382).
- kprobes: Mark ftrace mcount handler functions nokprobe (bnc#1012382).
- kprobes: Prohibit probing on bsearch() (bnc#1012382).
- kvm: fail KVM_SET_VCPU_EVENTS with invalid exception number (bnc#1012382).
- kvm: x86: Do not clear EFER during SMM transitions for 32-bit vCPU (bnc#1012382).
- kvm: x86: avoid misreporting level-triggered irqs as edge-triggered in tracing (bnc#1012382).
- leds: lp55xx: fix null deref on firmware load failure (bnc#1012382).
- lib/div64.c: off by one in shift (bnc#1012382).
- lib/int_sqrt: optimize initial value compute (bnc#1012382).
- lib/string.c: implement a basic bcmp (bnc#1012382).
- lib: add crc64 calculation routines (bsc#1130972).
- lib: do not depend on linux headers being installed (bsc#1130972).
- libata: fix using DMA buffers on stack (bnc#1012382).
- libnvdimm/btt: Fix a kmemdup failure check (bnc#1012382).
- lpfc: validate command in lpfc_sli4_scmd_to_wqidx_distr() (bsc#1129138).
- mac80211: do not call driver wake_tx_queue op during reconfig (bnc#1012382).
- mac80211_hwsim: validate number of different channels (bsc#1085539).
- md: use mddev_suspend/resume instead of -&gt;quiesce() (bsc#1132212).
- media: mt9m111: set initial frame size other than 0x0 (bnc#1012382).
- media: mx2_emmaprp: Correct return type for mem2mem buffer helpers (bnc#1012382).
- media: pvrusb2: Prevent a buffer overflow (bsc#1135642).
- media: s5p-g2d: Correct return type for mem2mem buffer helpers (bnc#1012382).
- media: s5p-jpeg: Check for fmt_ver_flag when doing fmt enumeration (bnc#1012382).
- media: s5p-jpeg: Correct return type for mem2mem buffer helpers (bnc#1012382).
- media: sh_veu: Correct return type for mem2mem buffer helpers (bnc#1012382).
- media: v4l2: i2c: ov7670: Fix PLL bypass register values (bnc#1012382).
- media: vb2: do not call __vb2_queue_cancel if vb2_start_streaming failed (bsc#1120902).
- mips: scall64-o32: Fix indirect syscall number load (bnc#1012382).
- mm/cma.c: cma_declare_contiguous: correct err handling (bnc#1012382).
- mm/page_ext.c: fix an imbalance with kmemleak (bnc#1012382).
- mm/slab.c: kmemleak no scan alien caches (bnc#1012382).
- mm/vmalloc.c: fix kernel BUG at mm/vmalloc.c:512! (bnc#1012382).
- mm/vmstat.c: fix /proc/vmstat format for CONFIG_DEBUG_TLBFLUSH=y CONFIG_SMP=n (bnc#1012382).
- mm: mempolicy: make mbind() return -EIO when MPOL_MF_STRICT is specified (bnc#1012382).
- mmc: davinci: remove extraneous __init annotation (bnc#1012382).
- mmc: omap: fix the maximum timeout setting (bnc#1012382).
- modpost: file2alias: check prototype of handler (bnc#1012382).
- modpost: file2alias: go back to simple devtable lookup (bnc#1012382).
- mount: copy the port field into the cloned nfs_server structure (bsc#1136990).
- mt7601u: bump supported EEPROM version (bnc#1012382).
- mtd: Fix comparison in map_word_andequal() (git-fixes).
- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).
- net/ibmvnic: Update MAC address settings after adapter reset (bsc#1134760).
- net/ibmvnic: Update carrier state after link state change (bsc#1135100).
- net: atm: Fix potential Spectre v1 vulnerabilities (bnc#1012382).
- net: bridge: multicast: use rcu to access port list from br_multicast_start_querier (bnc#1012382).
- net: ena: fix return value of ena_com_config_llq_info() (bsc#1117562).
- net: ethernet: ti: fix possible object reference leak (bnc#1012382).
- net: ethtool: not call vzalloc for zero sized memory request (bnc#1012382).
- net: fou: do not use guehdr after iptunnel_pull_offloads in gue_udp_recv (bnc#1012382).
- net: hns: Fix WARNING when remove HNS driver with SMMU enabled (bnc#1012382).
- net: hns: Use NAPI_POLL_WEIGHT for hns driver (bnc#1012382).
- net: ibm: fix possible object reference leak (bnc#1012382).
- net: ks8851: Delay requesting IRQ until opened (bnc#1012382).
- net: ks8851: Dequeue RX packets explicitly (bnc#1012382).
- net: ks8851: Reassert reset pin if chip ID check fails (bnc#1012382).
- net: ks8851: Set initial carrier state to down (bnc#1012382).
- net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock() (bnc#1012382).
- net: stmmac: move stmmac_check_ether_addr() to driver probe (bnc#1012382).
- net: ucc_geth - fix Oops when changing number of buffers in the ring (bnc#1012382).
- net: xilinx: fix possible object reference leak (bnc#1012382).
- netfilter: bridge: set skb transport_header before entering NF_INET_PRE_ROUTING (bnc#1012382).
- netfilter: compat: initialize all fields in xt_init (bnc#1012382).
- netfilter: ebtables: CONFIG_COMPAT: drop a bogus WARN_ON (bnc#1012382).
- netfilter: physdev: relax br_netfilter dependency (bnc#1012382).
- netns: provide pure entropy for net_hash_mix() (bnc#1012382).
- nfs/pnfs: Bulk destroy of layouts needs to be safe w.r.t. umount (git-fixes).
- nfs: Add missing encode / decode sequence_maxsz to v4.2 operations (git-fixes).
- nfs: Fix I/O request leakages (git-fixes).
- nfs: Forbid setting AF_INET6 to 'struct sockaddr_in'-&gt;sin_family (bnc#1012382).
- nfs: clean up rest of reqs when failing to add one (git-fixes).
- nfsd: Do not release the callback slot unless it was actually held (bnc#1012382).
- ntp: Allow TAI-UTC offset to be set to zero (bsc#1135642).
- nvme-fc: resolve io failures during connect (bsc#1116803).
- nvme: Do not allow to reset a reconnecting controller (bsc#1133874).
- ocfs2: fix a panic problem caused by o2cb_ctl (bnc#1012382).
- openvswitch: fix flow actions reallocation (bnc#1012382).
- pNFS: Skip invalid stateids when doing a bulk destroy (git-fixes).
- packet: Fix error path in packet_init (bnc#1012382).
- packet: validate msg_namelen in send directly (bnc#1012382).
- pci: Add function 1 DMA alias quirk for Marvell 9170 SATA controller (bnc#1012382).
- pci: Mark AMD Stoney Radeon R7 GPU ATS as broken (bsc#1137142).
- pci: Mark Atheros AR9462 to avoid bus reset (bsc#1135642).
- pci: xilinx-nwl: Add missing of_node_put() (bsc#1100132).
- perf evsel: Free evsel-&gt;counts in perf_evsel__exit() (bnc#1012382).
- perf test: Fix failure of 'evsel-tp-sched' test on s390 (bnc#1012382).
- perf tests: Fix a memory leak in test__perf_evsel__tp_sched_test() (bnc#1012382).
- perf tests: Fix a memory leak of cpu_map object in the openat_syscall_event_on_all_cpus test (bnc#1012382).
- perf top: Fix error handling in cmd_top() (bnc#1012382).
- perf/core: Restore mmap record type correctly (bnc#1012382).
- perf/x86/intel: Allow PEBS multi-entry in watermark mode (git-fixes).
- perf/x86/intel: Fix handling of wakeup_events for multi-entry PEBS (bnc#1012382).
- platform/x86: sony-laptop: Fix unintentional fall-through (bnc#1012382).
- powerpc/64: Add CONFIG_PPC_BARRIER_NOSPEC (bnc#1012382).
- powerpc/64: Call setup_barrier_nospec() from setup_arch() (bnc#1012382 bsc#1131107).
- powerpc/64: Make meltdown reporting Book3S 64 specific (bnc#1012382).
- powerpc/64s: Include cpu header (bnc#1012382).
- powerpc/booke64: set RI in default MSR (bnc#1012382).
- powerpc/fsl: Add FSL_PPC_BOOK3E as supported arch for nospectre_v2 boot arg (bnc#1012382).
- powerpc/fsl: Add barrier_nospec implementation for NXP PowerPC Book3E (bnc#1012382).
- powerpc/fsl: Add infrastructure to fixup branch predictor flush (bnc#1012382).
- powerpc/fsl: Add macro to flush the branch predictor (bnc#1012382).
- powerpc/fsl: Add nospectre_v2 command line argument (bnc#1012382).
- powerpc/fsl: Emulate SPRN_BUCSR register (bnc#1012382).
- powerpc/fsl: Enable runtime patching if nospectre_v2 boot arg is used (bnc#1012382).
- powerpc/fsl: Fix the flush of branch predictor (bnc#1012382).
- powerpc/fsl: Fixed warning: orphan section `__btb_flush_fixup' (bnc#1012382).
- powerpc/fsl: Flush branch predictor when entering KVM (bnc#1012382).
- powerpc/fsl: Flush the branch predictor at each kernel entry (32 bit) (bnc#1012382).
- powerpc/fsl: Flush the branch predictor at each kernel entry (64bit) (bnc#1012382).
- powerpc/fsl: Sanitize the syscall table for NXP PowerPC 32 bit platforms (bnc#1012382).
- powerpc/fsl: Update Spectre v2 reporting (bnc#1012382).
- powerpc/lib: fix book3s/32 boot failure due to code patching (bnc#1012382).
- powerpc/xmon: Add RFI flush related fields to paca dump (bnc#1012382).
- qede: fix write to free'd pointer error and double free of ptp (bsc#1019695 bsc#1019696).
- qlcnic: Avoid potential NULL pointer dereference (bnc#1012382).
- qmi_wwan: add Olicard 600 (bnc#1012382).
- rdma/iw_cxgb4: Fix the unchecked ep dereference (bsc#1005778 bsc#1005780 bsc#1005781).
- rdma/qedr: Fix out of bounds index check in query pkey (bsc#1022604).
- regulator: act8865: Fix act8600_sudcdc_voltage_ranges setting (bnc#1012382).
- rsi: improve kernel thread handling to fix kernel panic (bnc#1012382).
- rtc: da9063: set uie_unsupported when relevant (bnc#1012382).
- rtc: sh: Fix invalid alarm warning for non-enabled alarm (bnc#1012382).
- s390/3270: fix lockdep false positive on view-&gt;lock (bnc#1012382).
- s390/dasd: Fix capacity calculation for large volumes (bnc#1012382).
- s390: ctcm: fix ctcm_new_device error return code (bnc#1012382).
- sc16is7xx: missing unregister/delete driver on error in sc16is7xx_init() (bnc#1012382).
- sc16is7xx: move label 'err_spi' to correct section (git-fixes).
- sched/fair: Do not re-read -&gt;h_load_next during hierarchical load calculation (bnc#1012382).
- sched/fair: Limit sched_cfs_period_timer() loop to avoid hard lockup (bnc#1012382).
- sched/numa: Fix a possible divide-by-zero (bnc#1012382).
- sched: Add sched_smt_active() (bnc#1012382).
- scsi: core: replace GFP_ATOMIC with GFP_KERNEL in scsi_scan.c (bnc#1012382).
- scsi: csiostor: fix missing data copy in csio_scsi_err_handler() (bnc#1012382).
- scsi: libsas: fix a race condition when smp task timeout (bnc#1012382).
- scsi: megaraid_sas: return error when create DMA pool failed (bnc#1012382).
- scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bnc#1012382).
- scsi: qla4xxx: fix a potential NULL pointer dereference (bnc#1012382).
- scsi: storvsc: Fix calculation of sub-channel count (bnc#1012382).
- scsi: zfcp: reduce flood of fcrscn1 trace records on multi-element RSCN (bnc#1012382).
- sctp: initialize _pad of sockaddr_in before copying to user memory (bnc#1012382).
- selftests/net: correct the return value for run_netsocktests (bnc#1012382).
- selinux: never allow relabeling on context mounts (bnc#1012382).
- serial: uartps: console_setup() can't be placed to init section (bnc#1012382).
- slip: make slhc_free() silently accept an error pointer (bnc#1012382).
- soc/tegra: fuse: Fix illegal free of IO base address (bnc#1012382).
- soc: imx-sgtl5000: add missing put_device() (bnc#1012382).
- soc: qcom: gsbi: Fix error handling in gsbi_probe() (bnc#1012382).
- staging: comedi: ni_usb6501: Fix possible double-free of -&gt;usb_rx_buf (bnc#1012382).
- staging: comedi: ni_usb6501: Fix use of uninitialized mutex (bnc#1012382).
- staging: comedi: vmk80xx: Fix possible double-free of -&gt;usb_rx_buf (bnc#1012382).
- staging: comedi: vmk80xx: Fix use of uninitialized semaphore (bnc#1012382).
- staging: iio: adt7316: allow adt751x to use internal vref for all dacs (bnc#1012382).
- staging: iio: adt7316: fix the dac read calculation (bnc#1012382).
- staging: iio: adt7316: fix the dac write calculation (bnc#1012382).
- supported.conf: add lib/crc64 because bcache uses it
- sysctl: handle overflow for file-max (bnc#1012382).
- tcp: Ensure DCTCP reacts to losses (bnc#1012382).
- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).
- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).
- tcp: limit payload size of sacked skbs (bsc#1137586).
- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).
- tcp: tcp_grow_window() needs to respect tcp_space() (bnc#1012382).
- team: fix possible recursive locking when add slaves (bnc#1012382).
- thermal/int340x_thermal: Add additional UUIDs (bnc#1012382).
- thermal/int340x_thermal: fix mode setting (bnc#1012382).
- timer/debug: Change /proc/timer_stats from 0644 to 0600 (bnc#1012382).
- tipc: check bearer name with right length in tipc_nl_compat_bearer_enable (bnc#1012382).
- tipc: check link name with right length in tipc_nl_compat_link_set (bnc#1012382).
- tipc: handle the err returned from cmd header function (bnc#1012382).
- tools lib traceevent: Fix buffer overflow in arg_eval (bnc#1012382).
- tools lib traceevent: Fix missing equality check for strcmp (bsc#1129770).
- tools/power turbostat: return the exit status of a command (bnc#1012382).
- tpm/tpm_crb: Avoid unaligned reads in crb_recv() (bnc#1012382).
- tpm/tpm_i2c_atmel: Return -E2BIG when the transfer is incomplete (bnc#1012382).
- trace: Fix preempt_enable_no_resched() abuse (bnc#1012382).
- tracing: Fix partial reading of trace event's id file (bsc#1136573).
- tracing: kdb: Fix ftdump to not sleep (bnc#1012382).
- tty/serial: atmel: Add is_half_duplex helper (bnc#1012382).
- tty/serial: atmel: RS485 HD w/DMA: enable RX after TX is stopped (bnc#1012382).
- tty: increase the default flip buffer limit to 2*640K (bnc#1012382).
- tty: ldisc: add sysctl to prevent autoloading of ldiscs (bnc#1012382).
- uas: fix alignment of scatter/gather segments (bnc#1012382 bsc#1129770).
- uas: fix alignment of scatter/gather segments (bsc#1129770).
- ufs: fix braino in ufs_get_inode_gid() for solaris UFS flavour (bsc#1136455).
- usb: Add new USB LPM helpers (bsc#1129770).
- usb: Consolidate LPM checks to avoid enabling LPM twice (bsc#1129770).
- usb: cdc-acm: fix race during wakeup blocking TX traffic (bsc#1129770).
- usb: cdc-acm: fix unthrottle races (bsc#1135642).
- usb: chipidea: Grab the (legacy) usb PHY by phandle first (bnc#1012382).
- usb: core: Fix bug caused by duplicate interface PM usage counter (bnc#1012382).
- usb: core: Fix unterminated string returned by usb_string() (bnc#1012382).
- usb: dwc3: Fix default lpm_nyet_threshold value (bnc#1012382).
- usb: gadget: net2272: Fix net2272_dequeue() (bnc#1012382).
- usb: gadget: net2280: Fix net2280_dequeue() (bnc#1012382).
- usb: gadget: net2280: Fix overrun of OUT messages (bnc#1012382).
- usb: serial: fix unthrottle races (bnc#1012382).
- usb: serial: use variable for status (bnc#1012382).
- usb: u132-hcd: fix resource leak (bnc#1012382).
- usb: usbip: fix isoc packet num validation in get_pipe (bnc#1012382).
- usb: w1 ds2490: Fix bug caused by improper use of altsetting array (bnc#1012382).
- usb: yurex: Fix protection fault after device removal (bnc#1012382).
- usbnet: ipheth: fix potential null pointer dereference in ipheth_carrier_set (bnc#1012382).
- usbnet: ipheth: prevent TX queue timeouts when device not ready (bnc#1012382).
- vfio/pci: use correct format characters (bnc#1012382).
- vlan: disable SIOCSHWTSTAMP in container (bnc#1012382).
- vrf: sit mtu should not be updated when vrf netdev is the link (bnc#1012382).
- wlcore: Fix memory leak in case wl12xx_fetch_firmware failure (bnc#1012382).
- x86/Kconfig: Select SCHED_SMT if SMP enabled (bnc#1012382).
- x86/MCE: Save microcode revision in machine check records (bnc#1012382).
- x86/bugs: Add AMD's SPEC_CTRL MSR usage (bnc#1012382).
- x86/bugs: Change L1TF mitigation string to match upstream (bnc#1012382).
- x86/bugs: Fix the AMD SSBD usage of the SPEC_CTRL MSR (bnc#1012382).
- x86/bugs: Switch the selection of mitigation from CPU vendor to CPU features (bnc#1012382).
- x86/build: Mark per-CPU symbols as absolute explicitly for LLD (bnc#1012382).
- x86/build: Specify elf_i386 linker emulation explicitly for i386 objects (bnc#1012382).
- x86/cpu/bugs: Use __initconst for 'const' init data (bnc#1012382).
- x86/cpu/cyrix: Use correct macros for Cyrix calls on Geode processors (bnc#1012382).
- x86/cpufeatures: Hide AMD-specific speculation flags (bnc#1012382).
- x86/hpet: Prevent potential NULL pointer dereference (bnc#1012382).
- x86/hw_breakpoints: Make default case in hw_breakpoint_arch_parse() return an error (bnc#1012382).
- x86/kprobes: Verify stack frame on kretprobe (bnc#1012382).
- x86/mds: Add MDSUM variant to the MDS documentation (bnc#1012382).
- x86/microcode/intel: Add a helper which gives the microcode revision (bnc#1012382).
- x86/microcode/intel: Check microcode revision before updating sibling threads (bnc#1012382).
- x86/microcode: Make sure boot_cpu_data.microcode is up-to-date (bnc#1012382).
- x86/microcode: Update the new microcode revision unconditionally (bnc#1012382).
- x86/mm: Use WRITE_ONCE() when setting PTEs (bnc#1012382).
- x86/process: Consolidate and simplify switch_to_xtra() code (bnc#1012382).
- x86/speculataion: Mark command line parser data __initdata (bnc#1012382).
- x86/speculation/l1tf: Document l1tf in sysfs (bnc#1012382).
- x86/speculation/mds: Fix comment (bnc#1012382).
- x86/speculation/mds: Fix documentation typo (bnc#1012382).
- x86/speculation: Add command line control for indirect branch speculation (bnc#1012382).
- x86/speculation: Add prctl() control for indirect branch speculation (bnc#1012382).
- x86/speculation: Add seccomp Spectre v2 user space protection mode (bnc#1012382).
- x86/speculation: Avoid __switch_to_xtra() calls (bnc#1012382).
- x86/speculation: Clean up spectre_v2_parse_cmdline() (bnc#1012382).
- x86/speculation: Disable STibP when enhanced IBRS is in use (bnc#1012382).
- x86/speculation: Enable prctl mode for spectre_v2_user (bnc#1012382).
- x86/speculation: Mark string arrays const correctly (bnc#1012382).
- x86/speculation: Move STIPB/ibPB string conditionals out of cpu_show_common() (bnc#1012382).
- x86/speculation: Prepare arch_smt_update() for PRCTL mode (bnc#1012382).
- x86/speculation: Prepare for conditional ibPB in switch_mm() (bnc#1012382).
- x86/speculation: Prepare for per task indirect branch speculation control (bnc#1012382).
- x86/speculation: Prevent stale SPEC_CTRL msr content (bnc#1012382).
- x86/speculation: Provide ibPB always command line options (bnc#1012382).
- x86/speculation: Remove SPECTRE_V2_ibRS in enum spectre_v2_mitigation (bnc#1012382).
- x86/speculation: Remove unnecessary ret variable in cpu_show_common() (bnc#1012382).
- x86/speculation: Rename SSBD update functions (bnc#1012382).
- x86/speculation: Reorder the spec_v2 code (bnc#1012382).
- x86/speculation: Reorganize speculation control MSRs update (bnc#1012382).
- x86/speculation: Split out TIF update (bnc#1012382).
- x86/speculation: Support 'mitigations=' cmdline option (bnc#1012382 bsc#1112178).
- x86/speculation: Support Enhanced ibRS on future CPUs (bnc#1012382).
- x86/speculation: Unify conditional spectre v2 print functions (bnc#1012382).
- x86/speculation: Update the TIF_SSBD comment (bnc#1012382).
- x86/vdso: Drop implicit common-page-size linker flag (bnc#1012382).
- x86/vdso: Pass --eh-frame-hdr to the linker (git-fixes).
- x86: vdso: Use $LD instead of $CC to link (bnc#1012382).
- x86_64: Add gap to int3 to allow for call emulation (bsc#1099658).
- x86_64: Allow breakpoints to emulate call instructions (bsc#1099658).
- xen: Prevent buffer overflow in privcmd ioctl (bnc#1012382).
- xenbus: drop useless LIST_HEAD in xenbus_write_watch() and xenbus_file_write() (bsc#1065600).
- xsysace: Fix error handling in ace_setup (bnc#1012382).
- xtensa: fix return_address (bnc#1012382).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-17"/>
	<updated date="2019-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005778">SUSE bug 1005778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005780">SUSE bug 1005780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005781">SUSE bug 1005781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019695">SUSE bug 1019695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019696">SUSE bug 1019696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022604">SUSE bug 1022604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063638">SUSE bug 1063638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085535">SUSE bug 1085535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085539">SUSE bug 1085539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090888">SUSE bug 1090888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099658">SUSE bug 1099658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100132">SUSE bug 1100132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106110">SUSE bug 1106110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106284">SUSE bug 1106284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106929">SUSE bug 1106929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108293">SUSE bug 1108293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108838">SUSE bug 1108838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110785">SUSE bug 1110785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110946">SUSE bug 1110946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112063">SUSE bug 1112063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112178">SUSE bug 1112178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116803">SUSE bug 1116803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117562">SUSE bug 1117562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119086">SUSE bug 1119086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120642">SUSE bug 1120642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120843">SUSE bug 1120843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120902">SUSE bug 1120902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122776">SUSE bug 1122776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126040">SUSE bug 1126040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126356">SUSE bug 1126356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128052">SUSE bug 1128052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129138">SUSE bug 1129138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129770">SUSE bug 1129770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130972">SUSE bug 1130972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131107">SUSE bug 1131107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131488">SUSE bug 1131488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131565">SUSE bug 1131565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132212">SUSE bug 1132212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132472">SUSE bug 1132472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133188">SUSE bug 1133188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133874">SUSE bug 1133874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134160">SUSE bug 1134160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134162">SUSE bug 1134162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134338">SUSE bug 1134338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134537">SUSE bug 1134537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134564">SUSE bug 1134564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134565">SUSE bug 1134565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134566">SUSE bug 1134566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134651">SUSE bug 1134651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134760">SUSE bug 1134760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134806">SUSE bug 1134806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134813">SUSE bug 1134813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134848">SUSE bug 1134848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135013">SUSE bug 1135013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135014">SUSE bug 1135014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135015">SUSE bug 1135015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135100">SUSE bug 1135100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135120">SUSE bug 1135120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135281">SUSE bug 1135281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135603">SUSE bug 1135603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135642">SUSE bug 1135642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135661">SUSE bug 1135661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135878">SUSE bug 1135878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136424">SUSE bug 1136424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136438">SUSE bug 1136438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136448">SUSE bug 1136448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136449">SUSE bug 1136449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136451">SUSE bug 1136451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136452">SUSE bug 1136452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136455">SUSE bug 1136455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136458">SUSE bug 1136458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136539">SUSE bug 1136539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136573">SUSE bug 1136573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136575">SUSE bug 1136575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136586">SUSE bug 1136586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136590">SUSE bug 1136590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136623">SUSE bug 1136623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136810">SUSE bug 1136810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136990">SUSE bug 1136990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137142">SUSE bug 1137142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137162">SUSE bug 1137162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843419">SUSE bug 843419</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-17972/">CVE-2018-17972</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7191/">CVE-2018-7191</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11190/">CVE-2019-11190</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11479/">CVE-2019-11479</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11486/">CVE-2019-11486</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11815/">CVE-2019-11815</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11833/">CVE-2019-11833</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11884/">CVE-2019-11884</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12382/">CVE-2019-12382</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5489/">CVE-2019-5489</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521458" comment="kernel-default-4.4.180-94.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521459" comment="kernel-default-devel-4.4.180-94.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521460" comment="kernel-default-extra-4.4.180-94.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521461" comment="kernel-devel-4.4.180-94.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521462" comment="kernel-macros-4.4.180-94.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521463" comment="kernel-source-4.4.180-94.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521464" comment="kernel-syms-4.4.180-94.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78588" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1135273" ref_url="https://bugzilla.suse.com/1135273" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005580.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Sampling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the libvirt adjustments, that pass through the new 'md-clear' CPU flag (bsc#1135273).

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-18"/>
	<updated date="2019-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135273">SUSE bug 1135273</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521465" comment="libvirt-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521466" comment="libvirt-admin-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521467" comment="libvirt-client-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521468" comment="libvirt-daemon-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521469" comment="libvirt-daemon-config-network-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521470" comment="libvirt-daemon-config-nwfilter-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521471" comment="libvirt-daemon-driver-interface-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521472" comment="libvirt-daemon-driver-libxl-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521473" comment="libvirt-daemon-driver-lxc-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521474" comment="libvirt-daemon-driver-network-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521475" comment="libvirt-daemon-driver-nodedev-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521476" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521477" comment="libvirt-daemon-driver-qemu-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521478" comment="libvirt-daemon-driver-secret-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521479" comment="libvirt-daemon-driver-storage-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521480" comment="libvirt-daemon-driver-storage-core-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521481" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521482" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521483" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521484" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521485" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521486" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521487" comment="libvirt-daemon-lxc-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521488" comment="libvirt-daemon-qemu-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521489" comment="libvirt-daemon-xen-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521490" comment="libvirt-doc-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521491" comment="libvirt-libs-3.3.0-5.33.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78589" version="1" class="patch">
	<metadata>
		<title>Security update for doxygen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1136364" ref_url="https://bugzilla.suse.com/1136364" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10245" ref_url="https://www.suse.com/security/cve/CVE-2016-10245/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005588.html" source="SUSE-SU"/>
		<description>
This update for doxygen fixes the following issues:

- CVE-2016-10245: XSS was possible via insufficient sanitization of the query parameter in templates/html/search_opensearch.php  (bsc#1136364)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-19"/>
	<updated date="2019-06-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1136364">SUSE bug 1136364</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10245/">CVE-2016-10245</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521492" comment="doxygen-1.8.6-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78590" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1133375" ref_url="https://bugzilla.suse.com/1133375" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9928" ref_url="https://www.suse.com/security/cve/CVE-2019-9928/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005593.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-plugins-base fixes the following issue:
Security issue fixed:

- CVE-2019-9928: Fixed a heap-based overflow in the rtsp connection parser (bsc#1133375).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133375">SUSE bug 1133375</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9928/">CVE-2019-9928</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521493" comment="gstreamer-plugins-base-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521494" comment="gstreamer-plugins-base-lang-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521495" comment="libgstallocators-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521496" comment="libgstapp-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521497" comment="libgstapp-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521498" comment="libgstaudio-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521499" comment="libgstaudio-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521500" comment="libgstfft-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521501" comment="libgstfft-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521502" comment="libgstpbutils-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521503" comment="libgstpbutils-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521504" comment="libgstriff-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521505" comment="libgstrtp-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521506" comment="libgstrtsp-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521507" comment="libgstsdp-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521508" comment="libgsttag-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521509" comment="libgsttag-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521510" comment="libgstvideo-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521511" comment="libgstvideo-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521512" comment="typelib-1_0-GstAudio-1_0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521513" comment="typelib-1_0-GstPbutils-1_0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521514" comment="typelib-1_0-GstTag-1_0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521515" comment="typelib-1_0-GstVideo-1_0-1.8.3-13.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78591" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1136976" ref_url="https://bugzilla.suse.com/1136976" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8457" ref_url="https://www.suse.com/security/cve/CVE-2019-8457/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005603.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

Security issue fixed:	  

- CVE-2019-8457: Fixed a Heap out-of-bound read in rtreenode() when handling invalid rtree tables (bsc#1136976).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136976">SUSE bug 1136976</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8457/">CVE-2019-8457</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521516" comment="libsqlite3-0-3.8.10.2-9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521517" comment="libsqlite3-0-32bit-3.8.10.2-9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521518" comment="sqlite3-3.8.10.2-9.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78592" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1133375" ref_url="https://bugzilla.suse.com/1133375" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9928" ref_url="https://www.suse.com/security/cve/CVE-2019-9928/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005598.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-0_10-plugins-base fixes the following issues:

Security issue fixed:

- CVE-2019-9928: Fixed a heap-based overflow in the rtsp connection parser (bsc#1133375).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133375">SUSE bug 1133375</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9928/">CVE-2019-9928</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521519" comment="gstreamer-0_10-plugins-base-0.10.36-18.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521520" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-18.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521521" comment="gstreamer-0_10-plugins-base-lang-0.10.36-18.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521522" comment="libgstapp-0_10-0-0.10.36-18.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521523" comment="libgstapp-0_10-0-32bit-0.10.36-18.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521524" comment="libgstinterfaces-0_10-0-0.10.36-18.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521525" comment="libgstinterfaces-0_10-0-32bit-0.10.36-18.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78593" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1136570" ref_url="https://bugzilla.suse.com/1136570" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005608.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

- Fix the previous fix for CVE-2019-3860 (bsc#1136570, bsc#1128481)
  (Out-of-bounds reads with specially crafted SFTP packets)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136570">SUSE bug 1136570</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521526" comment="libssh2-1-1.4.3-20.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78594" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl098 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1127080" ref_url="https://bugzilla.suse.com/1127080" source="BUGZILLA"/>
		<reference ref_id="1131291" ref_url="https://bugzilla.suse.com/1131291" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1559" ref_url="https://www.suse.com/security/cve/CVE-2019-1559/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005602.html" source="SUSE-SU"/>
		<description>
This update for compat-openssl098 fixes the following issues:

- CVE-2019-1559: Fix 0-byte record padding oracle via SSL_shutdown (bsc#1127080)
- Reject invalid EC point coordinates (bsc#1131291)
- Fixed 'The 9 Lives of Bleichenbacher's CAT: Cache ATtacks on TLS Implementations' (bsc#1117951)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127080">SUSE bug 1127080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131291">SUSE bug 1131291</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1559/">CVE-2019-1559</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521527" comment="libopenssl0_9_8-0.9.8j-106.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78595" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1136021" ref_url="https://bugzilla.suse.com/1136021" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2019:1610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005604.html" source="SUSE-SU"/>
		<description>
This update for wireshark to version 2.4.15 fixes the following issues:

Security issue fixed:

- Fixed a denial of service in the dissection engine (bsc#1136021). 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1136021">SUSE bug 1136021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521528" comment="libwireshark9-2.4.15-48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521529" comment="libwiretap7-2.4.15-48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521530" comment="libwscodecs1-2.4.15-48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521531" comment="libwsutil8-2.4.15-48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521532" comment="wireshark-2.4.15-48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521533" comment="wireshark-gtk-2.4.15-48.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78596" version="1" class="patch">
	<metadata>
		<title>Security update for netpbm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1024288" ref_url="https://bugzilla.suse.com/1024288" source="BUGZILLA"/>
		<reference ref_id="1024291" ref_url="https://bugzilla.suse.com/1024291" source="BUGZILLA"/>
		<reference ref_id="1086777" ref_url="https://bugzilla.suse.com/1086777" source="BUGZILLA"/>
		<reference ref_id="1136936" ref_url="https://bugzilla.suse.com/1136936" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2579" ref_url="https://www.suse.com/security/cve/CVE-2017-2579/" source="CVE"/>
		<reference ref_id="CVE-2017-2580" ref_url="https://www.suse.com/security/cve/CVE-2017-2580/" source="CVE"/>
		<reference ref_id="CVE-2018-8975" ref_url="https://www.suse.com/security/cve/CVE-2018-8975/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005619.html" source="SUSE-SU"/>
		<description>
This update for netpbm fixes the following issues:

Security issues fixed:

- CVE-2018-8975: The pm_mallocarray2 function allowed remote attackers to cause
  a denial of service (heap-based buffer over-read) via a crafted image file (bsc#1086777).
- CVE-2017-2579: Fixed out-of-bounds read in expandCodeOntoStack() (bsc#1024288).
- CVE-2017-2580: Fixed out-of-bounds write of heap data in addPixelToRaster() function (bsc#1024291).

- create netpbm-vulnerable subpackage and move pstopnm there (bsc#1136936)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024288">SUSE bug 1024288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024291">SUSE bug 1024291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086777">SUSE bug 1086777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136936">SUSE bug 1136936</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2579/">CVE-2017-2579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2580/">CVE-2017-2580</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8975/">CVE-2018-8975</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521534" comment="libnetpbm11-10.66.3-8.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521535" comment="libnetpbm11-32bit-10.66.3-8.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521536" comment="netpbm-10.66.3-8.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78597" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1138872" ref_url="https://bugzilla.suse.com/1138872" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11708" ref_url="https://www.suse.com/security/cve/CVE-2019-11708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005624.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Mozilla Firefox Firefox 60.7.2
  MFSA 2019-19 (bsc#1138872)

- CVE-2019-11708: Fix sandbox escape using Prompt:Open.
  * Insufficient vetting of parameters passed with the Prompt:Open IPC
    message between child and parent processes could result in the non-sandboxed
    parent process opening web content chosen by a compromised child process.
    When combined with additional vulnerabilities this could result in executing
    arbitrary code on the user's computer.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-22"/>
	<updated date="2019-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138872">SUSE bug 1138872</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11708/">CVE-2019-11708</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521537" comment="MozillaFirefox-60.7.2-109.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521538" comment="MozillaFirefox-translations-common-60.7.2-109.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78598" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1134689" ref_url="https://bugzilla.suse.com/1134689" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10130" ref_url="https://www.suse.com/security/cve/CVE-2019-10130/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005627.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

Security issue fixed:

- CVE-2019-10130: Prevent row-level security policies from being bypassed via selectivity estimators (bsc#1134689).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-24"/>
	<updated date="2019-06-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1134689">SUSE bug 1134689</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10130/">CVE-2019-10130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521539" comment="postgresql96-9.6.13-3.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78599" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1133204" ref_url="https://bugzilla.suse.com/1133204" source="BUGZILLA"/>
		<reference ref_id="1133205" ref_url="https://bugzilla.suse.com/1133205" source="BUGZILLA"/>
		<reference ref_id="1133498" ref_url="https://bugzilla.suse.com/1133498" source="BUGZILLA"/>
		<reference ref_id="1133501" ref_url="https://bugzilla.suse.com/1133501" source="BUGZILLA"/>
		<reference ref_id="1134075" ref_url="https://bugzilla.suse.com/1134075" source="BUGZILLA"/>
		<reference ref_id="1135232" ref_url="https://bugzilla.suse.com/1135232" source="BUGZILLA"/>
		<reference ref_id="1135236" ref_url="https://bugzilla.suse.com/1135236" source="BUGZILLA"/>
		<reference ref_id="1136183" ref_url="https://bugzilla.suse.com/1136183" source="BUGZILLA"/>
		<reference ref_id="1136732" ref_url="https://bugzilla.suse.com/1136732" source="BUGZILLA"/>
		<reference ref_id="1138425" ref_url="https://bugzilla.suse.com/1138425" source="BUGZILLA"/>
		<reference ref_id="1138464" ref_url="https://bugzilla.suse.com/1138464" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12805" ref_url="https://www.suse.com/security/cve/CVE-2017-12805/" source="CVE"/>
		<reference ref_id="CVE-2017-12806" ref_url="https://www.suse.com/security/cve/CVE-2017-12806/" source="CVE"/>
		<reference ref_id="CVE-2019-10131" ref_url="https://www.suse.com/security/cve/CVE-2019-10131/" source="CVE"/>
		<reference ref_id="CVE-2019-11470" ref_url="https://www.suse.com/security/cve/CVE-2019-11470/" source="CVE"/>
		<reference ref_id="CVE-2019-11472" ref_url="https://www.suse.com/security/cve/CVE-2019-11472/" source="CVE"/>
		<reference ref_id="CVE-2019-11505" ref_url="https://www.suse.com/security/cve/CVE-2019-11505/" source="CVE"/>
		<reference ref_id="CVE-2019-11506" ref_url="https://www.suse.com/security/cve/CVE-2019-11506/" source="CVE"/>
		<reference ref_id="CVE-2019-11597" ref_url="https://www.suse.com/security/cve/CVE-2019-11597/" source="CVE"/>
		<reference ref_id="CVE-2019-11598" ref_url="https://www.suse.com/security/cve/CVE-2019-11598/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-11597: Fixed a heap-based buffer over-read in the WriteTIFFImage() (bsc#1138464).
- Fixed a file content disclosure via SVG and WMF decoding (bsc#1138425).- CVE-2019-11472: Fixed a denial of service in ReadXWDImage() (bsc#1133204).
- CVE-2019-11470: Fixed a denial of service in ReadCINImage() (bsc#1133205).
- CVE-2019-11506: Fixed a heap-based buffer overflow in the WriteMATLABImage() (bsc#1133498).
- CVE-2019-11505: Fixed a heap-based buffer overflow in the WritePDBImage() (bsc#1133501).
- CVE-2019-10131: Fixed a off-by-one read in formatIPTCfromBuffer function in coders/meta.c (bsc#1134075).
- CVE-2017-12806: Fixed a denial of service through memory exhaustion in format8BIM() (bsc#1135232).
- CVE-2017-12805: Fixed a denial of service through memory exhaustion in ReadTIFFImage() (bsc#1135236).
- CVE-2019-11598: Fixed a heap-based buffer over-read in WritePNMImage() (bsc#1136732)
    
We also now disable PCL in the -SUSE configuration, as it also uses ghostscript for decoding (bsc#1136183)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-25"/>
	<updated date="2019-06-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1133204">SUSE bug 1133204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133205">SUSE bug 1133205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133498">SUSE bug 1133498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133501">SUSE bug 1133501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134075">SUSE bug 1134075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135232">SUSE bug 1135232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135236">SUSE bug 1135236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136183">SUSE bug 1136183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136732">SUSE bug 1136732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138425">SUSE bug 1138425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138464">SUSE bug 1138464</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12805/">CVE-2017-12805</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12806/">CVE-2017-12806</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10131/">CVE-2019-10131</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11470/">CVE-2019-11470</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11472/">CVE-2019-11472</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11505/">CVE-2019-11505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11506/">CVE-2019-11506</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11597/">CVE-2019-11597</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11598/">CVE-2019-11598</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521540" comment="ImageMagick-6.8.8.1-71.123.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521541" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.123.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521542" comment="ImageMagick-config-6-upstream-6.8.8.1-71.123.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521543" comment="libMagick++-6_Q16-3-6.8.8.1-71.123.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521544" comment="libMagickCore-6_Q16-1-6.8.8.1-71.123.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521545" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.123.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521546" comment="libMagickWand-6_Q16-1-6.8.8.1-71.123.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78600" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1054429" ref_url="https://bugzilla.suse.com/1054429" source="BUGZILLA"/>
		<reference ref_id="1076958" ref_url="https://bugzilla.suse.com/1076958" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15107" ref_url="https://www.suse.com/security/cve/CVE-2017-15107/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005642.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

Security issue fixed:

- CVE-2017-15107: Fixed a vulnerability in DNSSEC implementation. Processing of
  wildcard synthesized NSEC records may result improper validation for non-existance. (bsc#1076958)

Non-security issue fixed:

- Reload system dbus to pick up policy change on install (bsc#1054429).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-02"/>
	<updated date="2019-07-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1054429">SUSE bug 1054429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076958">SUSE bug 1076958</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15107/">CVE-2017-15107</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521547" comment="dnsmasq-2.78-18.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78601" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1061599" ref_url="https://bugzilla.suse.com/1061599" source="BUGZILLA"/>
		<reference ref_id="1107116" ref_url="https://bugzilla.suse.com/1107116" source="BUGZILLA"/>
		<reference ref_id="1107121" ref_url="https://bugzilla.suse.com/1107121" source="BUGZILLA"/>
		<reference ref_id="1137001" ref_url="https://bugzilla.suse.com/1137001" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16428" ref_url="https://www.suse.com/security/cve/CVE-2018-16428/" source="CVE"/>
		<reference ref_id="CVE-2018-16429" ref_url="https://www.suse.com/security/cve/CVE-2018-16429/" source="CVE"/>
		<reference ref_id="CVE-2019-12450" ref_url="https://www.suse.com/security/cve/CVE-2019-12450/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005644.html" source="SUSE-SU"/>
		<description>
This update for glib2 provides the following fix:


Security issues fixed:

- CVE-2019-12450: Fixed an improper file permission when copy operation
  takes place (bsc#1137001).     
- CVE-2018-16428: Avoid a null pointer dereference that could crash glib2 users in markup processing (bnc#1107121).
- CVE-2018-16429: Fixed out-of-bounds read vulnerability ing_markup_parse_context_parse() (bsc#1107116).

Non-security issues fixed:

- Install dummy *-mimeapps.list files to prevent dead symlinks. (bsc#1061599)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-02"/>
	<updated date="2019-07-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1061599">SUSE bug 1061599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107116">SUSE bug 1107116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107121">SUSE bug 1107121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137001">SUSE bug 1137001</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16428/">CVE-2018-16428</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16429/">CVE-2018-16429</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12450/">CVE-2019-12450</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521548" comment="glib2-lang-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521549" comment="glib2-tools-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521550" comment="libgio-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521551" comment="libgio-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521552" comment="libgio-fam-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521553" comment="libglib-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521554" comment="libglib-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521555" comment="libgmodule-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521556" comment="libgmodule-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521557" comment="libgobject-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521558" comment="libgobject-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521559" comment="libgthread-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521560" comment="libgthread-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78602" version="1" class="patch">
	<metadata>
		<title>Security update for elfutils (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1030472" ref_url="https://bugzilla.suse.com/1030472" source="BUGZILLA"/>
		<reference ref_id="1030476" ref_url="https://bugzilla.suse.com/1030476" source="BUGZILLA"/>
		<reference ref_id="1033084" ref_url="https://bugzilla.suse.com/1033084" source="BUGZILLA"/>
		<reference ref_id="1033085" ref_url="https://bugzilla.suse.com/1033085" source="BUGZILLA"/>
		<reference ref_id="1033087" ref_url="https://bugzilla.suse.com/1033087" source="BUGZILLA"/>
		<reference ref_id="1033088" ref_url="https://bugzilla.suse.com/1033088" source="BUGZILLA"/>
		<reference ref_id="1033089" ref_url="https://bugzilla.suse.com/1033089" source="BUGZILLA"/>
		<reference ref_id="1033090" ref_url="https://bugzilla.suse.com/1033090" source="BUGZILLA"/>
		<reference ref_id="1106390" ref_url="https://bugzilla.suse.com/1106390" source="BUGZILLA"/>
		<reference ref_id="1107067" ref_url="https://bugzilla.suse.com/1107067" source="BUGZILLA"/>
		<reference ref_id="1111973" ref_url="https://bugzilla.suse.com/1111973" source="BUGZILLA"/>
		<reference ref_id="1112723" ref_url="https://bugzilla.suse.com/1112723" source="BUGZILLA"/>
		<reference ref_id="1112726" ref_url="https://bugzilla.suse.com/1112726" source="BUGZILLA"/>
		<reference ref_id="1123685" ref_url="https://bugzilla.suse.com/1123685" source="BUGZILLA"/>
		<reference ref_id="1125007" ref_url="https://bugzilla.suse.com/1125007" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10254" ref_url="https://www.suse.com/security/cve/CVE-2016-10254/" source="CVE"/>
		<reference ref_id="CVE-2016-10255" ref_url="https://www.suse.com/security/cve/CVE-2016-10255/" source="CVE"/>
		<reference ref_id="CVE-2017-7607" ref_url="https://www.suse.com/security/cve/CVE-2017-7607/" source="CVE"/>
		<reference ref_id="CVE-2017-7608" ref_url="https://www.suse.com/security/cve/CVE-2017-7608/" source="CVE"/>
		<reference ref_id="CVE-2017-7610" ref_url="https://www.suse.com/security/cve/CVE-2017-7610/" source="CVE"/>
		<reference ref_id="CVE-2017-7611" ref_url="https://www.suse.com/security/cve/CVE-2017-7611/" source="CVE"/>
		<reference ref_id="CVE-2017-7612" ref_url="https://www.suse.com/security/cve/CVE-2017-7612/" source="CVE"/>
		<reference ref_id="CVE-2017-7613" ref_url="https://www.suse.com/security/cve/CVE-2017-7613/" source="CVE"/>
		<reference ref_id="CVE-2018-16062" ref_url="https://www.suse.com/security/cve/CVE-2018-16062/" source="CVE"/>
		<reference ref_id="CVE-2018-16403" ref_url="https://www.suse.com/security/cve/CVE-2018-16403/" source="CVE"/>
		<reference ref_id="CVE-2018-18310" ref_url="https://www.suse.com/security/cve/CVE-2018-18310/" source="CVE"/>
		<reference ref_id="CVE-2018-18520" ref_url="https://www.suse.com/security/cve/CVE-2018-18520/" source="CVE"/>
		<reference ref_id="CVE-2018-18521" ref_url="https://www.suse.com/security/cve/CVE-2018-18521/" source="CVE"/>
		<reference ref_id="CVE-2019-7150" ref_url="https://www.suse.com/security/cve/CVE-2019-7150/" source="CVE"/>
		<reference ref_id="CVE-2019-7665" ref_url="https://www.suse.com/security/cve/CVE-2019-7665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<description>
This update for elfutils fixes the following issues:

Security issues fixed: 	  

- CVE-2018-16403: Fixed a heap-based buffer over-read that could have led to Denial of Service (bsc#1107067).  
- CVE-2016-10254: Fixed a memory allocation failure in alloxate_elf (bsc#1030472).
- CVE-2019-7665: NT_PLATFORM core file note should be a zero terminated string (bsc#1125007).
- CVE-2016-10255: Fixed a memory allocation failure in libelf_set_rawdata_wrlock (bsc#1030476).
- CVE-2019-7150: Added a missing check in dwfl_segment_report_module which could have allowed truncated files 
  to be read (bsc#1123685).
- CVE-2018-16062: Fixed a heap-buffer-overflow (bsc#1106390).
- CVE-2017-7611: Fixed a heap-based buffer over-read that could have led to Denial of Service (bsc#1033088).
- CVE-2017-7613: Fixed denial of service caused by the missing validation of the number of sections 
  and the number of segments in a crafted ELF file (bsc#1033090).
- CVE-2017-7607: Fixed a heap-based buffer overflow in handle_gnu_hash (bsc#1033084).
- CVE-2017-7608: Fixed a heap-based buffer overflow in ebl_object_note_type_name() (bsc#1033085).
- CVE-2017-7610: Fixed a heap-based buffer overflow in check_group (bsc#1033087).
- CVE-2018-18521: Fixed multiple divide-by-zero vulnerabilities in function arlib_add_symbols() (bsc#1112723).
- CVE-2017-7612: Fixed a denial of service in check_sysv_hash() via a crafted ELF file (bsc#1033089).
- CVE-2018-18310: Fixed an invalid address read in dwfl_segment_report_module.c (bsc#1111973).
- CVE-2018-18520: Fixed bad handling of ar files inside are files (bsc#1112726).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-03"/>
	<updated date="2019-07-03"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1030472">SUSE bug 1030472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030476">SUSE bug 1030476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033084">SUSE bug 1033084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033085">SUSE bug 1033085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033087">SUSE bug 1033087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033088">SUSE bug 1033088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033089">SUSE bug 1033089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033090">SUSE bug 1033090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106390">SUSE bug 1106390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107067">SUSE bug 1107067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111973">SUSE bug 1111973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112723">SUSE bug 1112723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112726">SUSE bug 1112726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123685">SUSE bug 1123685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125007">SUSE bug 1125007</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10254/">CVE-2016-10254</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10255/">CVE-2016-10255</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7607/">CVE-2017-7607</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7608/">CVE-2017-7608</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7610/">CVE-2017-7610</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7611/">CVE-2017-7611</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7612/">CVE-2017-7612</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7613/">CVE-2017-7613</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16062/">CVE-2018-16062</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16403/">CVE-2018-16403</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18310/">CVE-2018-18310</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18520/">CVE-2018-18520</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18521/">CVE-2018-18521</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7150/">CVE-2019-7150</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7665/">CVE-2019-7665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78603" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1120281" ref_url="https://bugzilla.suse.com/1120281" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000845" ref_url="https://www.suse.com/security/cve/CVE-2018-1000845/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005065.html" source="SUSE-SU"/>
		<description>
This update for avahi fixes the following issues:

Security issue fixed:

- CVE-2018-1000845: Fixed DNS amplification and reflection to spoofed addresses (DOS) (bsc#1120281)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-25"/>
	<updated date="2019-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120281">SUSE bug 1120281</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000845/">CVE-2018-1000845</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521569" comment="avahi-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521570" comment="avahi-lang-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521571" comment="libavahi-client3-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521572" comment="libavahi-client3-32bit-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521573" comment="libavahi-common3-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521574" comment="libavahi-common3-32bit-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521575" comment="libavahi-core7-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521576" comment="libavahi-glib1-0.6.32-32.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521577" comment="libavahi-glib1-32bit-0.6.32-32.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521578" comment="libavahi-gobject0-0.6.32-32.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521579" comment="libavahi-ui-gtk3-0-0.6.32-32.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521580" comment="libavahi-ui0-0.6.32-32.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521581" comment="libdns_sd-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521582" comment="libdns_sd-32bit-0.6.32-32.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78604" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1053043" ref_url="https://bugzilla.suse.com/1053043" source="BUGZILLA"/>
		<reference ref_id="1066223" ref_url="https://bugzilla.suse.com/1066223" source="BUGZILLA"/>
		<reference ref_id="1094555" ref_url="https://bugzilla.suse.com/1094555" source="BUGZILLA"/>
		<reference ref_id="1108382" ref_url="https://bugzilla.suse.com/1108382" source="BUGZILLA"/>
		<reference ref_id="1109137" ref_url="https://bugzilla.suse.com/1109137" source="BUGZILLA"/>
		<reference ref_id="1111188" ref_url="https://bugzilla.suse.com/1111188" source="BUGZILLA"/>
		<reference ref_id="1119086" ref_url="https://bugzilla.suse.com/1119086" source="BUGZILLA"/>
		<reference ref_id="1120902" ref_url="https://bugzilla.suse.com/1120902" source="BUGZILLA"/>
		<reference ref_id="1121263" ref_url="https://bugzilla.suse.com/1121263" source="BUGZILLA"/>
		<reference ref_id="1125580" ref_url="https://bugzilla.suse.com/1125580" source="BUGZILLA"/>
		<reference ref_id="1126961" ref_url="https://bugzilla.suse.com/1126961" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1129770" ref_url="https://bugzilla.suse.com/1129770" source="BUGZILLA"/>
		<reference ref_id="1131335" ref_url="https://bugzilla.suse.com/1131335" source="BUGZILLA"/>
		<reference ref_id="1131336" ref_url="https://bugzilla.suse.com/1131336" source="BUGZILLA"/>
		<reference ref_id="1131645" ref_url="https://bugzilla.suse.com/1131645" source="BUGZILLA"/>
		<reference ref_id="1132390" ref_url="https://bugzilla.suse.com/1132390" source="BUGZILLA"/>
		<reference ref_id="1133140" ref_url="https://bugzilla.suse.com/1133140" source="BUGZILLA"/>
		<reference ref_id="1133190" ref_url="https://bugzilla.suse.com/1133190" source="BUGZILLA"/>
		<reference ref_id="1133191" ref_url="https://bugzilla.suse.com/1133191" source="BUGZILLA"/>
		<reference ref_id="1133738" ref_url="https://bugzilla.suse.com/1133738" source="BUGZILLA"/>
		<reference ref_id="1134395" ref_url="https://bugzilla.suse.com/1134395" source="BUGZILLA"/>
		<reference ref_id="1135642" ref_url="https://bugzilla.suse.com/1135642" source="BUGZILLA"/>
		<reference ref_id="1136598" ref_url="https://bugzilla.suse.com/1136598" source="BUGZILLA"/>
		<reference ref_id="1136889" ref_url="https://bugzilla.suse.com/1136889" source="BUGZILLA"/>
		<reference ref_id="1136922" ref_url="https://bugzilla.suse.com/1136922" source="BUGZILLA"/>
		<reference ref_id="1136935" ref_url="https://bugzilla.suse.com/1136935" source="BUGZILLA"/>
		<reference ref_id="1137004" ref_url="https://bugzilla.suse.com/1137004" source="BUGZILLA"/>
		<reference ref_id="1137194" ref_url="https://bugzilla.suse.com/1137194" source="BUGZILLA"/>
		<reference ref_id="1137739" ref_url="https://bugzilla.suse.com/1137739" source="BUGZILLA"/>
		<reference ref_id="1137749" ref_url="https://bugzilla.suse.com/1137749" source="BUGZILLA"/>
		<reference ref_id="1137752" ref_url="https://bugzilla.suse.com/1137752" source="BUGZILLA"/>
		<reference ref_id="1137915" ref_url="https://bugzilla.suse.com/1137915" source="BUGZILLA"/>
		<reference ref_id="1138291" ref_url="https://bugzilla.suse.com/1138291" source="BUGZILLA"/>
		<reference ref_id="1138293" ref_url="https://bugzilla.suse.com/1138293" source="BUGZILLA"/>
		<reference ref_id="1138374" ref_url="https://bugzilla.suse.com/1138374" source="BUGZILLA"/>
		<reference ref_id="1138681" ref_url="https://bugzilla.suse.com/1138681" source="BUGZILLA"/>
		<reference ref_id="1139751" ref_url="https://bugzilla.suse.com/1139751" source="BUGZILLA"/>
		<reference ref_id="1140575" ref_url="https://bugzilla.suse.com/1140575" source="BUGZILLA"/>
		<reference ref_id="1140577" ref_url="https://bugzilla.suse.com/1140577" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20836" ref_url="https://www.suse.com/security/cve/CVE-2018-20836/" source="CVE"/>
		<reference ref_id="CVE-2019-10126" ref_url="https://www.suse.com/security/cve/CVE-2019-10126/" source="CVE"/>
		<reference ref_id="CVE-2019-10638" ref_url="https://www.suse.com/security/cve/CVE-2019-10638/" source="CVE"/>
		<reference ref_id="CVE-2019-10639" ref_url="https://www.suse.com/security/cve/CVE-2019-10639/" source="CVE"/>
		<reference ref_id="CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487/" source="CVE"/>
		<reference ref_id="CVE-2019-11599" ref_url="https://www.suse.com/security/cve/CVE-2019-11599/" source="CVE"/>
		<reference ref_id="CVE-2019-12380" ref_url="https://www.suse.com/security/cve/CVE-2019-12380/" source="CVE"/>
		<reference ref_id="CVE-2019-12456" ref_url="https://www.suse.com/security/cve/CVE-2019-12456/" source="CVE"/>
		<reference ref_id="CVE-2019-12614" ref_url="https://www.suse.com/security/cve/CVE-2019-12614/" source="CVE"/>
		<reference ref_id="CVE-2019-12818" ref_url="https://www.suse.com/security/cve/CVE-2019-12818/" source="CVE"/>
		<reference ref_id="CVE-2019-12819" ref_url="https://www.suse.com/security/cve/CVE-2019-12819/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-10638: In the Linux kernel, a device could be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may have been conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses (bnc#1140575 1140577).
- CVE-2019-10639: The Linux kernel allowed Information Exposure (partial kernel address disclosure), that lead to a KASLR bypass. Specifically, it was possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack could be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visited the attacker's web page, then WebRTC or gQUIC could be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable because IP ID generation was changed to have a dependency on an address associated with a network namespace (bnc#1140577).
- CVE-2019-10126: A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might have lead to memory corruption and possibly other consequences (bnc#1136935).
- CVE-2018-20836: An issue was discovered in the Linux kernel There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free (bnc#1134395).
- CVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it ran, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm call. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c (bnc#1131645 1133738).
- CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel There was an unchecked kstrdup of prop-name, which might have allowed an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1137194).
- CVE-2019-12819: An issue was discovered in the Linux kernel The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which would trigger a fixed_mdio_bus_init use-after-free. This would cause a denial of service (bnc#1138291).
- CVE-2019-12818: An issue was discovered in the Linux kernel The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller did not check for this, it would trigger a NULL pointer dereference. This would cause a denial of service. This affected nfc_llcp_build_gb in net/nfc/llcp_core.c (bnc#1138293).
- CVE-2019-12456: A double-fetch bug in _ctl_ioctl_main() could lead to a local denial of service attack (bsc#1136922 CVE-2019-12456).
- CVE-2019-12380: An issue was discovered in the efi subsystem in the Linux kernel phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because ;All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it (bnc#1136598).
- CVE-2019-11487: The Linux kernel before allowed page-_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It could occur with FUSE requests (bnc#1133190 1133191).

The following non-security bugs were fixed:

- Drop multiversion(kernel) from the KMP template (bsc#1127155).
- Fix ixgbe backport (bsc#1133140)
- Revert 'KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).' This reverts commit 4cc83da426b53d47f1fde9328112364eab1e9a19.
- Update 'TCP SACK Panic' series
- ACPI / CPPC: Check for valid PCC subspace only if PCC is used (bsc#1126961).
- ACPI / CPPC: Fix KASAN global out of bounds warning (bsc#1126961).
- ACPI / CPPC: Make CPPC ACPI driver aware of PCC subspace IDs (bsc#1126961).
- ACPI / CPPC: Update all pr_(debug/err) messages to log the susbspace id (bsc#1126961).
- ACPI / CPPC: Use 64-bit arithmetic instead of 32-bit (bsc#1126961).
- ACPI / CPPC: fix build issue with ktime_t used in logical operation (bsc#1126961).
- ACPI: CPPC: remove initial assignment of pcc_ss_data (bsc#1126961).
- at76c50x-usb: Do not register led_trigger if usb_register_driver failed (bsc#1135642).
- ath6kl: Only use match sets when firmware supports it (bsc#1120902).
- btrfs: check for refs on snapshot delete resume (bsc#1131335, bsc#1137004).
- btrfs: run delayed items before dropping the snapshot (bsc#1121263, bsc#1111188, bsc#1137004).
- btrfs: save drop_progress if we drop refs at all (bsc#1131336, bsc#1137004).
- ceph: fix potential use-after-free in ceph_mdsc_build_path (bsc#1138681).
- ceph: flush dirty inodes before proceeding with remount (bsc#1138681).
- ceph: print inode number in __caps_issued_mask debugging messages (bsc#1138681).
- cpu/hotplug: Provide cpus_read|write_[un]lock() (bsc#1138374, LTC#178199).
- cpu/hotplug: Provide lockdep_assert_cpus_held() (bsc#1138374, LTC#178199).
- cpufreq / CPPC: Add cpuinfo_cur_freq support for CPPC (bsc#1126961).
- cpufreq: CPPC: fix build in absence of v3 support (bsc#1126961).
- cpufreq: Replace 'max_transition_latency' with 'dynamic_switching' (bsc#1126961).
- cpufreq: cn99xx: set platform specific sampling rate (bsc#1126961).
- ibmvnic: Add device identification to requested IRQs (bsc#1137739).
- ibmvnic: Do not close unopened driver during reset (bsc#1137752).
- ibmvnic: Fix unchecked return codes of memory allocations (bsc#1137752).
- ibmvnic: Refresh device multicast list after reset (bsc#1137752).
- ibmvnic: remove set but not used variable 'netdev' (bsc#1137739).
- iwiwifi: fix bad monitor buffer register addresses (bsc#1129770).
- kabi: cpufreq: rename dynamic_switching to max_transition_latency (bsc#1126961).
- kernel/sys.c: prctl: fix false positive in validate_prctl_map() (bsc#1137749).
- libertas_tf: prevent underflow in process_cmdrequest() (bsc#1119086).
- mailbox: PCC: Move the MAX_PCC_SUBSPACES definition to header file (bsc#1126961).
- mailbox: pcc: Drop uninformative output during boot (bsc#1126961).
- mailbox: pcc: Fix crash when request PCC channel 0 (bsc#1126961).
- mwl8k: Fix rate_idx underflow (bsc#1135642).
- net/ibmvnic: Remove tests of member address (bsc#1137739).
- net: Remove NO_IRQ from powerpc-only network drivers (bsc#1137739).
- nvmet-fc: bring Disconnect into compliance with FC-NVME spec (bsc#1136889).
- nvmet-fc: fix issues with targetport assoc_list list walking (bsc#1136889).
- nvmet: fix fatal_err_work deadlock (bsc#1136889).
- nvmet_fc: support target port removal with nvmet layer (bsc#1136889).
- powerpc/cacheinfo: add cacheinfo_teardown, cacheinfo_rebuild (bsc#1138374, LTC#178199).
- powerpc/eeh: Fix race with driver un/bind (bsc#1066223).
- powerpc/perf: Add blacklisted events for Power9 DD2.1 (bsc#1053043).
- powerpc/perf: Add blacklisted events for Power9 DD2.2 (bsc#1053043).
- powerpc/perf: Fix MMCRA corruption by bhrb_filter (bsc#1053043).
- powerpc/perf: Infrastructure to support addition of blacklisted events (bsc#1053043).
- powerpc/process: Fix sparse address space warnings (bsc#1066223).
- powerpc/pseries/mobility: prevent cpu hotplug during DT update (bsc#1138374, LTC#178199).
- powerpc/pseries/mobility: rebuild cacheinfo hierarchy post-migration (bsc#1138374, LTC#178199).
- rtlwifi: fix false rates in _rtl8821ae_mrate_idx_to_arfr_id() (bsc#1120902).
- scsi: core: add new RDAC LENOVO/DE_Series device (bsc#1132390).
- scsi: qla2xxx: Fix FC-AL connection target discovery (bsc#1094555).
- scsi: qla2xxx: Fix N2N target discovery with Local loop (bsc#1094555).
- signals: avoid random wakeups in sigsuspend() (bsc#1137915)
- treewide: Use DEVICE_ATTR_WO (bsc#1137739).
- x86/entry/64/compat: Fix stack switching for XEN PV (bsc#1108382).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-24"/>
	<updated date="2019-07-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1053043">SUSE bug 1053043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066223">SUSE bug 1066223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094555">SUSE bug 1094555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108382">SUSE bug 1108382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109137">SUSE bug 1109137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111188">SUSE bug 1111188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119086">SUSE bug 1119086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120902">SUSE bug 1120902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121263">SUSE bug 1121263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125580">SUSE bug 1125580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126961">SUSE bug 1126961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129770">SUSE bug 1129770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131335">SUSE bug 1131335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131336">SUSE bug 1131336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131645">SUSE bug 1131645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132390">SUSE bug 1132390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133140">SUSE bug 1133140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133190">SUSE bug 1133190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133191">SUSE bug 1133191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133738">SUSE bug 1133738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134395">SUSE bug 1134395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135642">SUSE bug 1135642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136598">SUSE bug 1136598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136889">SUSE bug 1136889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136922">SUSE bug 1136922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137004">SUSE bug 1137004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137194">SUSE bug 1137194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137739">SUSE bug 1137739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137749">SUSE bug 1137749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137752">SUSE bug 1137752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137915">SUSE bug 1137915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138291">SUSE bug 1138291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138293">SUSE bug 1138293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138374">SUSE bug 1138374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138681">SUSE bug 1138681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139751">SUSE bug 1139751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140575">SUSE bug 1140575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140577">SUSE bug 1140577</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20836/">CVE-2018-20836</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10126/">CVE-2019-10126</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10638/">CVE-2019-10638</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10639/">CVE-2019-10639</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11599/">CVE-2019-11599</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12380/">CVE-2019-12380</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12456/">CVE-2019-12456</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12614/">CVE-2019-12614</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12818/">CVE-2019-12818</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-12819/">CVE-2019-12819</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521583" comment="kernel-default-4.4.180-94.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521584" comment="kernel-default-devel-4.4.180-94.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521585" comment="kernel-default-extra-4.4.180-94.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521586" comment="kernel-devel-4.4.180-94.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521587" comment="kernel-macros-4.4.180-94.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521588" comment="kernel-source-4.4.180-94.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521589" comment="kernel-syms-4.4.180-94.100.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78605" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1118277" ref_url="https://bugzilla.suse.com/1118277" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19788" ref_url="https://www.suse.com/security/cve/CVE-2018-19788/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005017.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

Security issue fixed:

- CVE-2018-19788: Fixed handling of UIDs over MAX_UINT (bsc#1118277)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-04"/>
	<updated date="2019-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118277">SUSE bug 1118277</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19788/">CVE-2018-19788</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521590" comment="libpolkit0-0.113-5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521591" comment="libpolkit0-32bit-0.113-5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521592" comment="polkit-0.113-5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521593" comment="typelib-1_0-Polkit-1_0-0.113-5.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78606" version="1" class="patch">
	<metadata>
		<title>Security update for libraw (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1097973" ref_url="https://bugzilla.suse.com/1097973" source="BUGZILLA"/>
		<reference ref_id="1097974" ref_url="https://bugzilla.suse.com/1097974" source="BUGZILLA"/>
		<reference ref_id="1118894" ref_url="https://bugzilla.suse.com/1118894" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5805" ref_url="https://www.suse.com/security/cve/CVE-2018-5805/" source="CVE"/>
		<reference ref_id="CVE-2018-5806" ref_url="https://www.suse.com/security/cve/CVE-2018-5806/" source="CVE"/>
		<reference ref_id="CVE-2018-5808" ref_url="https://www.suse.com/security/cve/CVE-2018-5808/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190002-1.html" source="SUSE-SU"/>
		<description>
This update for libraw fixes the following issues:

Security issues fixed:

- CVE-2018-5808: Fixed a stack-based buffer overflow and code execution
  vulnerability in find_green() function internal/dcraw_common.cpp (bsc#1118894).
- CVE-2018-5805: Fixed a boundary error within the quicktake_100_load_raw function (bsc#1097973)
- CVE-2018-5806: Fixed a a NULL pointer dereference in the leaf_hdr_load_raw function (bsc#1097974)
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-02"/>
	<updated date="2019-01-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1097973">SUSE bug 1097973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097974">SUSE bug 1097974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118894">SUSE bug 1118894</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5805/">CVE-2018-5805</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5806/">CVE-2018-5806</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5808/">CVE-2018-5808</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521594" comment="libraw9-0.15.4-27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78607" version="1" class="patch">
	<metadata>
		<title>Security update for rsyslog (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1123164" ref_url="https://bugzilla.suse.com/1123164" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16881" ref_url="https://www.suse.com/security/cve/CVE-2018-16881/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0209-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190209-1.html" source="SUSE-SU"/>
		<description>
This update for rsyslog fixes the following issues:

Security issue fixed:

- CVE-2018-16881: Fixed a denial of service when both the imtcp module and Octet-Counted TCP Framing is enabled (bsc#1123164).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-31"/>
	<updated date="2019-01-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1123164">SUSE bug 1123164</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16881/">CVE-2018-16881</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521595" comment="rsyslog-8.24.0-3.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78608" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1122706" ref_url="https://bugzilla.suse.com/1122706" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3813" ref_url="https://www.suse.com/security/cve/CVE-2019-3813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005084.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

Security issue fixed:

- CVE-2019-3813: Fixed a out-of-bounds read in the memslot_get_virt function that could lead to denial-of-service or code-execution (bsc#1122706).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-05"/>
	<updated date="2019-02-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122706">SUSE bug 1122706</bugzilla>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3813/">CVE-2019-3813</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521596" comment="libspice-server1-0.12.8-12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78609" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1120644" ref_url="https://bugzilla.suse.com/1120644" source="BUGZILLA"/>
		<reference ref_id="1122191" ref_url="https://bugzilla.suse.com/1122191" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20406" ref_url="https://www.suse.com/security/cve/CVE-2018-20406/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005085.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

Security issue fixed:

- CVE-2019-5010: Fixed a denial-of-service vulnerability in the X509 certificate parser (bsc#1122191)
- CVE-2018-20406: Fixed a integer overflow via a large LONG_BINPUT (bsc#1120644)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-05"/>
	<updated date="2019-02-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120644">SUSE bug 1120644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20406/">CVE-2018-20406</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521597" comment="libpython3_4m1_0-3.4.6-25.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521598" comment="python3-3.4.6-25.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521599" comment="python3-base-3.4.6-25.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521600" comment="python3-curses-3.4.6-25.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78610" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1123371" ref_url="https://bugzilla.suse.com/1123371" source="BUGZILLA"/>
		<reference ref_id="1123377" ref_url="https://bugzilla.suse.com/1123377" source="BUGZILLA"/>
		<reference ref_id="1123378" ref_url="https://bugzilla.suse.com/1123378" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16890" ref_url="https://www.suse.com/security/cve/CVE-2018-16890/" source="CVE"/>
		<reference ref_id="CVE-2019-3822" ref_url="https://www.suse.com/security/cve/CVE-2019-3822/" source="CVE"/>
		<reference ref_id="CVE-2019-3823" ref_url="https://www.suse.com/security/cve/CVE-2019-3823/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005088.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issues fixed:

- CVE-2019-3823: Fixed a heap out-of-bounds read in the code handling the end-of-response for SMTP (bsc#1123378).
- CVE-2019-3822: Fixed a stack based buffer overflow in the function creating an outgoing NTLM type-3 message (bsc#1123377).
- CVE-2018-16890: Fixed a heap buffer out-of-bounds read in the function handling incoming NTLM type-2 messages (bsc#1123371).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-06"/>
	<updated date="2019-02-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1123371">SUSE bug 1123371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123377">SUSE bug 1123377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123378">SUSE bug 1123378</bugzilla>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16890/">CVE-2018-16890</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3822/">CVE-2019-3822</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3823/">CVE-2019-3823</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521601" comment="curl-7.37.0-37.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521602" comment="libcurl4-7.37.0-37.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521603" comment="libcurl4-32bit-7.37.0-37.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78611" version="1" class="patch">
	<metadata>
		<title>Security update for libunwind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1122012" ref_url="https://bugzilla.suse.com/1122012" source="BUGZILLA"/>
		<reference ref_id="936786" ref_url="https://bugzilla.suse.com/936786" source="BUGZILLA"/>
		<reference ref_id="976955" ref_url="https://bugzilla.suse.com/976955" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3239" ref_url="https://www.suse.com/security/cve/CVE-2015-3239/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005095.html" source="SUSE-SU"/>
		<description>
This update for libunwind fixes the following issues:

Security issues fixed:

- CVE-2015-3239: Fixed a off-by-one in the dwarf_to_unw_regnum function (bsc#936786)

Non-security issues fixed:

- Fixed a dependency issue with libzmq5 (bsc#1122012)
- Fixed build on armv7 (bsc#976955)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-07"/>
	<updated date="2019-02-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1122012">SUSE bug 1122012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936786">SUSE bug 936786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976955">SUSE bug 976955</bugzilla>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-3239/">CVE-2015-3239</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521604" comment="libunwind-1.1-11.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78612" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1120374" ref_url="https://bugzilla.suse.com/1120374" source="BUGZILLA"/>
		<reference ref_id="1122983" ref_url="https://bugzilla.suse.com/1122983" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18500" ref_url="https://www.suse.com/security/cve/CVE-2018-18500/" source="CVE"/>
		<reference ref_id="CVE-2018-18501" ref_url="https://www.suse.com/security/cve/CVE-2018-18501/" source="CVE"/>
		<reference ref_id="CVE-2018-18505" ref_url="https://www.suse.com/security/cve/CVE-2018-18505/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005108.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed:

CVE-2018-18500: Fixed a use-after-free parsing HTML5 stream (boo#1122983).
CVE-2018-18501: Fixed multiple memory safety bugs (boo#1122983).
CVE-2018-18505: Fixed a privilege escalation through IPC channel messages (boo#1122983).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-12"/>
	<updated date="2019-02-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120374">SUSE bug 1120374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122983">SUSE bug 1122983</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18500/">CVE-2018-18500</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18501/">CVE-2018-18501</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18505/">CVE-2018-18505</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521605" comment="MozillaFirefox-60.5.0esr-109.58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521606" comment="MozillaFirefox-branding-SLE-60-32.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521607" comment="MozillaFirefox-translations-common-60.5.0esr-109.58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521608" comment="libfreebl3-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521609" comment="libfreebl3-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521610" comment="libsoftokn3-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521611" comment="libsoftokn3-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521612" comment="mozilla-nss-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521613" comment="mozilla-nss-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521614" comment="mozilla-nss-certs-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521615" comment="mozilla-nss-certs-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521616" comment="mozilla-nss-sysinit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521617" comment="mozilla-nss-sysinit-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521618" comment="mozilla-nss-tools-3.41.1-58.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78613" version="1" class="patch">
	<metadata>
		<title>Security update for podofo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1027779" ref_url="https://bugzilla.suse.com/1027779" source="BUGZILLA"/>
		<reference ref_id="1032020" ref_url="https://bugzilla.suse.com/1032020" source="BUGZILLA"/>
		<reference ref_id="1032021" ref_url="https://bugzilla.suse.com/1032021" source="BUGZILLA"/>
		<reference ref_id="1032022" ref_url="https://bugzilla.suse.com/1032022" source="BUGZILLA"/>
		<reference ref_id="1075021" ref_url="https://bugzilla.suse.com/1075021" source="BUGZILLA"/>
		<reference ref_id="1075026" ref_url="https://bugzilla.suse.com/1075026" source="BUGZILLA"/>
		<reference ref_id="1075322" ref_url="https://bugzilla.suse.com/1075322" source="BUGZILLA"/>
		<reference ref_id="1075772" ref_url="https://bugzilla.suse.com/1075772" source="BUGZILLA"/>
		<reference ref_id="1076962" ref_url="https://bugzilla.suse.com/1076962" source="BUGZILLA"/>
		<reference ref_id="1096889" ref_url="https://bugzilla.suse.com/1096889" source="BUGZILLA"/>
		<reference ref_id="1096890" ref_url="https://bugzilla.suse.com/1096890" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6845" ref_url="https://www.suse.com/security/cve/CVE-2017-6845/" source="CVE"/>
		<reference ref_id="CVE-2017-7381" ref_url="https://www.suse.com/security/cve/CVE-2017-7381/" source="CVE"/>
		<reference ref_id="CVE-2017-7382" ref_url="https://www.suse.com/security/cve/CVE-2017-7382/" source="CVE"/>
		<reference ref_id="CVE-2017-7383" ref_url="https://www.suse.com/security/cve/CVE-2017-7383/" source="CVE"/>
		<reference ref_id="CVE-2017-8054" ref_url="https://www.suse.com/security/cve/CVE-2017-8054/" source="CVE"/>
		<reference ref_id="CVE-2018-11256" ref_url="https://www.suse.com/security/cve/CVE-2018-11256/" source="CVE"/>
		<reference ref_id="CVE-2018-5295" ref_url="https://www.suse.com/security/cve/CVE-2018-5295/" source="CVE"/>
		<reference ref_id="CVE-2018-5296" ref_url="https://www.suse.com/security/cve/CVE-2018-5296/" source="CVE"/>
		<reference ref_id="CVE-2018-5308" ref_url="https://www.suse.com/security/cve/CVE-2018-5308/" source="CVE"/>
		<reference ref_id="CVE-2018-5309" ref_url="https://www.suse.com/security/cve/CVE-2018-5309/" source="CVE"/>
		<reference ref_id="CVE-2018-5783" ref_url="https://www.suse.com/security/cve/CVE-2018-5783/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005117.html" source="SUSE-SU"/>
		<description>
This update for podofo fixes the following issues:

These security issues were fixed:

- CVE-2017-6845: The PoDoFo::PdfColor::operator function allowed remote
  attackers to cause a denial of service (NULL pointer dereference) via a crafted
  file (bsc#1027779).
- CVE-2018-5308: Properly validate memcpy arguments in the
  PdfMemoryOutputStream::Write function to prevent remote attackers from causing
  a denial-of-service or possibly have unspecified other impact via a crafted pdf
  file (bsc#1075772)
- CVE-2018-5295: Prevent integer overflow in the
  PdfXRefStreamParserObject::ParseStream function that allowed remote attackers
  to cause a denial-of-service via a crafted pdf file (bsc#1075026).
- CVE-2017-6845: The PoDoFo::PdfColor::operator function allowed remote
  attackers to cause a denial of service (NULL pointer dereference) via a crafted
  file (bsc#1027779).
- CVE-2018-5309: Prevent integer overflow in the
  PdfObjectStreamParserObject::ReadObjectsFromStream function that allowed remote
  attackers to cause a denial-of-service via a crafted pdf file (bsc#1075322).
- CVE-2018-5296: Prevent uncontrolled memory allocation in the
  PdfParser::ReadXRefSubsection function that allowed remote attackers to cause a
  denial-of-service via a crafted pdf file (bsc#1075021).
- CVE-2017-7381: Prevent NULL pointer dereference that allowed remote attackers
  to cause a denial of service via a crafted PDF document (bsc#1032020).
- CVE-2017-7382: Prevent NULL pointer dereference that allowed remote attackers
  to cause a denial of service via a crafted PDF document (bsc#1032021).
- CVE-2017-7383: Prevent NULL pointer dereference that allowed remote attackers
  to cause a denial of service via a crafted PDF document (bsc#1032022).
- CVE-2018-11256: Prevent NULL pointer dereference that allowed remote
  attackers to cause a denial of service via a crafted PDF document
  (bsc#1096889).
- CVE-2018-5783: Prevent uncontrolled memory allocation in the
  PoDoFo::PdfVecObjects::Reserve function that allowed remote attackers to cause
  a denial of service via a crafted pdf file (bsc#1076962).

These non-security issues were fixed:

- Prevent regression caused by the fix for CVE-2017-8054.
- Prevent NULL dereferences when 'Kids' array is missing (bsc#1096890)
- Added to detect cycles and recursions in XRef tables
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-14"/>
	<updated date="2019-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027779">SUSE bug 1027779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032020">SUSE bug 1032020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032021">SUSE bug 1032021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032022">SUSE bug 1032022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075021">SUSE bug 1075021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075026">SUSE bug 1075026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075322">SUSE bug 1075322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075772">SUSE bug 1075772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076962">SUSE bug 1076962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096889">SUSE bug 1096889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096890">SUSE bug 1096890</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6845/">CVE-2017-6845</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7381/">CVE-2017-7381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7382/">CVE-2017-7382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7383/">CVE-2017-7383</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8054/">CVE-2017-8054</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11256/">CVE-2018-11256</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5295/">CVE-2018-5295</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5296/">CVE-2018-5296</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5308/">CVE-2018-5308</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5309/">CVE-2018-5309</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5783/">CVE-2018-5783</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521619" comment="libpodofo0_9_2-0.9.2-3.6.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78614" version="1" class="patch">
	<metadata>
		<title>Security update for python-numpy (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1122208" ref_url="https://bugzilla.suse.com/1122208" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6446" ref_url="https://www.suse.com/security/cve/CVE-2019-6446/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005128.html" source="SUSE-SU"/>
		<description>
This update for python-numpy fixes the following issue:

Security issue fixed:

- CVE-2019-6446: Set allow_pickle to false by default to restrict loading untrusted content (bsc#1122208).
  With this update we decrease the possibility of allowing remote attackers to execute arbitrary code by
  misusing numpy.load(). A warning during runtime will show-up when the allow_pickle is not explicitly set.  

NOTE: By applying this update the behavior of python-numpy changes, which might break your application.
In order to get the old behaviour back, you have to explicitly set `allow_pickle` to True. Be aware
that this should only be done for trusted input, as loading untrusted input might lead to arbitrary code
execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-18"/>
	<updated date="2019-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122208">SUSE bug 1122208</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6446/">CVE-2019-6446</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521620" comment="python-numpy-1.8.0-5.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78615" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1111498" ref_url="https://bugzilla.suse.com/1111498" source="BUGZILLA"/>
		<reference ref_id="1117025" ref_url="https://bugzilla.suse.com/1117025" source="BUGZILLA"/>
		<reference ref_id="1117382" ref_url="https://bugzilla.suse.com/1117382" source="BUGZILLA"/>
		<reference ref_id="1120658" ref_url="https://bugzilla.suse.com/1120658" source="BUGZILLA"/>
		<reference ref_id="1122000" ref_url="https://bugzilla.suse.com/1122000" source="BUGZILLA"/>
		<reference ref_id="1122344" ref_url="https://bugzilla.suse.com/1122344" source="BUGZILLA"/>
		<reference ref_id="1123333" ref_url="https://bugzilla.suse.com/1123333" source="BUGZILLA"/>
		<reference ref_id="1123892" ref_url="https://bugzilla.suse.com/1123892" source="BUGZILLA"/>
		<reference ref_id="1125352" ref_url="https://bugzilla.suse.com/1125352" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6454" ref_url="https://www.suse.com/security/cve/CVE-2019-6454/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005135.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

Security vulnerability fixed:

- CVE-2019-6454: Fixed a crash of PID1 by sending specially crafted D-BUS
  message on the system bus by an unprivileged user (bsc#1125352)

Other bug fixes and changes:

- journal-remote: set a limit on the number of fields in a message
- journal-remote: verify entry length from header
- journald: set a limit on the number of fields (1k)
- journald: do not store the iovec entry for process commandline on stack
- core: include Found state in device dumps
- device: fix serialization and deserialization of DeviceFound
- fix path in btrfs rule (#6844)
- assemble multidevice btrfs volumes without external tools (#6607) (bsc#1117025)
- Update systemd-system.conf.xml (bsc#1122000)
- units: inform user that the default target is started after exiting from rescue or emergency mode
- manager: don't skip sigchld handler for main and control pid for services (#3738)
- core: Add helper functions unit_{main, control}_pid
- manager: Fixing a debug printf formatting mistake (#3640)
- manager: Only invoke a single sigchld per unit within a cleanup cycle (bsc#1117382)
- core: update invoke_sigchld_event() to handle NULL -&gt;sigchld_event()
- sd-event: expose the event loop iteration counter via sd_event_get_iteration() (#3631)
- unit: rework a bit how we keep the service fdstore from being destroyed during service restart (bsc#1122344)
- core: when restarting services, don't close fds
- cryptsetup: Add dependency on loopback setup to generated units
- journal-gateway: use localStorage['cursor'] only when it has valid value
- journal-gateway: explicitly declare local variables
- analyze: actually select longest activated-time of services
- sd-bus: fix implicit downcast of bitfield reported by LGTM
- core: free lines after reading them (bsc#1123892)
- pam_systemd: reword message about not creating a session (bsc#1111498)
- pam_systemd: suppress LOG_DEBUG log messages if debugging is off (bsc#1111498)
- main: improve RLIMIT_NOFILE handling (#5795) (bsc#1120658)
- sd-bus: if we receive an invalid dbus message, ignore and proceeed
- automount: don't pass non-blocking pipe to kernel.
- units: make sure initrd-cleanup.service terminates before switching to rootfs (bsc#1123333)
- units: add Wants=initrd-cleanup.service to initrd-switch-root.target (#4345) (bsc#1123333)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-19"/>
	<updated date="2019-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111498">SUSE bug 1111498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117025">SUSE bug 1117025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117382">SUSE bug 1117382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120658">SUSE bug 1120658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122000">SUSE bug 1122000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122344">SUSE bug 1122344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123333">SUSE bug 1123333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123892">SUSE bug 1123892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125352">SUSE bug 1125352</bugzilla>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6454/">CVE-2019-6454</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521621" comment="libsystemd0-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521622" comment="libsystemd0-32bit-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521623" comment="libudev1-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521624" comment="libudev1-32bit-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521625" comment="systemd-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521626" comment="systemd-32bit-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521627" comment="systemd-bash-completion-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521628" comment="systemd-sysvinit-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521629" comment="udev-228-150.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78616" version="1" class="patch">
	<metadata>
		<title>Security update for procps (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1092100" ref_url="https://bugzilla.suse.com/1092100" source="BUGZILLA"/>
		<reference ref_id="1121753" ref_url="https://bugzilla.suse.com/1121753" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1122" ref_url="https://www.suse.com/security/cve/CVE-2018-1122/" source="CVE"/>
		<reference ref_id="CVE-2018-1123" ref_url="https://www.suse.com/security/cve/CVE-2018-1123/" source="CVE"/>
		<reference ref_id="CVE-2018-1124" ref_url="https://www.suse.com/security/cve/CVE-2018-1124/" source="CVE"/>
		<reference ref_id="CVE-2018-1125" ref_url="https://www.suse.com/security/cve/CVE-2018-1125/" source="CVE"/>
		<reference ref_id="CVE-2018-1126" ref_url="https://www.suse.com/security/cve/CVE-2018-1126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005142.html" source="SUSE-SU"/>
		<description>

  
This update for procps fixes the following security issues:

- CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top
  with HOME unset in an attacker-controlled directory, the attacker could have
  achieved privilege escalation by exploiting one of several vulnerabilities in
  the config_file() function (bsc#1092100).
- CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow.
  Inbuilt protection in ps maped a guard page at the end of the overflowed
  buffer, ensuring that the impact of this flaw is limited to a crash (temporary
  denial of service) (bsc#1092100).
- CVE-2018-1124: Prevent multiple integer overflows leading to a heap
  corruption in file2strvec function. This allowed a privilege escalation for a
  local attacker who can create entries in procfs by starting processes, which
  could result in crashes or arbitrary code execution in proc utilities run by
  other users (bsc#1092100).
- CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was
  mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).
- CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent
  truncation/integer overflow issues (bsc#1092100).

(These issues were previously released for SUSE Linux Enterprise 12 SP3 and SP4.)

Also the following non-security issue was fixed:

- Fix CPU summary showing old data. (bsc#1121753)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-20"/>
	<updated date="2019-02-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121753">SUSE bug 1121753</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1122/">CVE-2018-1122</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1123/">CVE-2018-1123</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1124/">CVE-2018-1124</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1125/">CVE-2018-1125</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1126/">CVE-2018-1126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521630" comment="libprocps3-3.3.9-11.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521631" comment="procps-3.3.9-11.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78617" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1104301" ref_url="https://bugzilla.suse.com/1104301" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5383" ref_url="https://www.suse.com/security/cve/CVE-2018-5383/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005145.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:
  
Security issue fixed:

- CVE-2018-5383: Fixed an implementation issue in Bluetooth where the eliptic curve parameters 
  were not sufficiently validated during Diffie-Hellman key exchange (bsc#1104301).
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-22"/>
	<updated date="2019-02-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104301">SUSE bug 1104301</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5383/">CVE-2018-5383</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521632" comment="kernel-firmware-20170530-21.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521633" comment="ucode-amd-20170530-21.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78618" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1073748" ref_url="https://bugzilla.suse.com/1073748" source="BUGZILLA"/>
		<reference ref_id="1109847" ref_url="https://bugzilla.suse.com/1109847" source="BUGZILLA"/>
		<reference ref_id="1122191" ref_url="https://bugzilla.suse.com/1122191" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005150.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

Security issues fixed:

- CVE-2019-5010: Fixed a denial-of-service vulnerability in the X509 certificate parser (bsc#1122191).
- CVE-2018-14647: Fixed a denial-of-service vulnerability in Expat (bsc#1109847).

Non-security issue fixed:

- Fixed a bug where PyWeakReference struct was not initialized correctly leading to a crash (bsc#1073748).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-25"/>
	<updated date="2019-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1073748">SUSE bug 1073748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521634" comment="libpython2_7-1_0-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521635" comment="libpython2_7-1_0-32bit-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521636" comment="python-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521637" comment="python-base-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521638" comment="python-curses-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521639" comment="python-devel-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521640" comment="python-tk-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521641" comment="python-xml-2.7.13-28.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78619" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1101644" ref_url="https://bugzilla.suse.com/1101644" source="BUGZILLA"/>
		<reference ref_id="1101645" ref_url="https://bugzilla.suse.com/1101645" source="BUGZILLA"/>
		<reference ref_id="1101651" ref_url="https://bugzilla.suse.com/1101651" source="BUGZILLA"/>
		<reference ref_id="1101656" ref_url="https://bugzilla.suse.com/1101656" source="BUGZILLA"/>
		<reference ref_id="1112142" ref_url="https://bugzilla.suse.com/1112142" source="BUGZILLA"/>
		<reference ref_id="1112143" ref_url="https://bugzilla.suse.com/1112143" source="BUGZILLA"/>
		<reference ref_id="1112144" ref_url="https://bugzilla.suse.com/1112144" source="BUGZILLA"/>
		<reference ref_id="1112146" ref_url="https://bugzilla.suse.com/1112146" source="BUGZILLA"/>
		<reference ref_id="1112147" ref_url="https://bugzilla.suse.com/1112147" source="BUGZILLA"/>
		<reference ref_id="1112152" ref_url="https://bugzilla.suse.com/1112152" source="BUGZILLA"/>
		<reference ref_id="1112153" ref_url="https://bugzilla.suse.com/1112153" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-16435" ref_url="https://www.suse.com/security/cve/CVE-2018-16435/" source="CVE"/>
		<reference ref_id="CVE-2018-2938" ref_url="https://www.suse.com/security/cve/CVE-2018-2938/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk to version 7u201 fixes the following issues:

Security issues fixed:

- CVE-2018-3136: Manifest better support (bsc#1112142)
- CVE-2018-3139: Better HTTP Redirection (bsc#1112143)
- CVE-2018-3149: Enhance JNDI lookups (bsc#1112144)
- CVE-2018-3169: Improve field accesses (bsc#1112146)
- CVE-2018-3180: Improve TLS connections stability (bsc#1112147)
- CVE-2018-3214: Better RIFF reading support (bsc#1112152)
- CVE-2018-13785: Upgrade JDK 8u to libpng 1.6.35 (bsc#1112153)
- CVE-2018-16435: heap-based buffer overflow in SetData function in cmsIT8LoadFromFile
- CVE-2018-2938: Support Derby connections (bsc#1101644)
- CVE-2018-2940: Better stack walking (bsc#1101645)
- CVE-2018-2952: Exception to Pattern Syntax (bsc#1101651)
- CVE-2018-2973: Improve LDAP support (bsc#1101656)
- CVE-2018-3639 cpu speculative store bypass mitigation
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-09"/>
	<updated date="2019-01-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101644">SUSE bug 1101644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101651">SUSE bug 1101651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112147">SUSE bug 1112147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112153">SUSE bug 1112153</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16435/">CVE-2018-16435</cve>
	<cve impact="low" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2938/">CVE-2018-2938</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78620" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1111177" ref_url="https://bugzilla.suse.com/1111177" source="BUGZILLA"/>
		<reference ref_id="1113246" ref_url="https://bugzilla.suse.com/1113246" source="BUGZILLA"/>
		<reference ref_id="1114710" ref_url="https://bugzilla.suse.com/1114710" source="BUGZILLA"/>
		<reference ref_id="1121567" ref_url="https://bugzilla.suse.com/1121567" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14662" ref_url="https://www.suse.com/security/cve/CVE-2018-14662/" source="CVE"/>
		<reference ref_id="CVE-2018-16846" ref_url="https://www.suse.com/security/cve/CVE-2018-16846/" source="CVE"/>
		<reference ref_id="CVE-2018-16889" ref_url="https://www.suse.com/security/cve/CVE-2018-16889/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005154.html" source="SUSE-SU"/>
		<description>
This update for ceph fixes the following issues:

Security issues fixed:

- CVE-2018-14662: mon: limit caps allowed to access the config store (bsc#1111177)
- CVE-2018-16846: rgw: enforce bounds on max-keys/max-uploads/max-parts (bsc#1114710)
- CVE-2018-16889: rgw: sanitize customer encryption keys from log output in v4 auth (bsc#1121567)

Non-security issue fixed:

- os/bluestore: avoid frequent allocator dump on bluefs rebalance failure (bsc#1113246)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-26"/>
	<updated date="2019-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111177">SUSE bug 1111177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113246">SUSE bug 1113246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114710">SUSE bug 1114710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121567">SUSE bug 1121567</bugzilla>
	<cve impact="low" cvss3="1.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-14662/">CVE-2018-14662</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16846/">CVE-2018-16846</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16889/">CVE-2018-16889</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521644" comment="ceph-common-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521645" comment="libcephfs2-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521646" comment="librados2-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521647" comment="libradosstriper1-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521648" comment="librbd1-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521649" comment="librgw2-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521650" comment="python-cephfs-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521651" comment="python-rados-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521652" comment="python-rbd-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521653" comment="python-rgw-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78621" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1124937" ref_url="https://bugzilla.suse.com/1124937" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6212" ref_url="https://www.suse.com/security/cve/CVE-2019-6212/" source="CVE"/>
		<reference ref_id="CVE-2019-6215" ref_url="https://www.suse.com/security/cve/CVE-2019-6215/" source="CVE"/>
		<reference ref_id="CVE-2019-6216" ref_url="https://www.suse.com/security/cve/CVE-2019-6216/" source="CVE"/>
		<reference ref_id="CVE-2019-6217" ref_url="https://www.suse.com/security/cve/CVE-2019-6217/" source="CVE"/>
		<reference ref_id="CVE-2019-6226" ref_url="https://www.suse.com/security/cve/CVE-2019-6226/" source="CVE"/>
		<reference ref_id="CVE-2019-6227" ref_url="https://www.suse.com/security/cve/CVE-2019-6227/" source="CVE"/>
		<reference ref_id="CVE-2019-6229" ref_url="https://www.suse.com/security/cve/CVE-2019-6229/" source="CVE"/>
		<reference ref_id="CVE-2019-6233" ref_url="https://www.suse.com/security/cve/CVE-2019-6233/" source="CVE"/>
		<reference ref_id="CVE-2019-6234" ref_url="https://www.suse.com/security/cve/CVE-2019-6234/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005162.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.22.6 fixes the following issues:

Security issues fixed:

- CVE-2019-6212: Fixed multiple memory corruption vulnerabilities which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6215: Fixed a type confusion vulnerability which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6216: Fixed multiple memory corruption vulnerabilities which could allow arbitrary code execution during the processing
  of special crafted web-content. 
- CVE-2019-6217: Fixed multiple memory corruption vulnerabilities which could allow arbitrary code execution during the processing
  of special crafted web-content. 
- CVE-2019-6226: Fixed multiple memory corruption vulnerabilities which could allow arbitrary code execution during the processing
  of special crafted web-content.  
- CVE-2019-6227: Fixed a memory corruption vulnerability which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6229: Fixed a logic issue by improving validation which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6233: Fixed a memory corruption vulnerability which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6234: Fixed a memory corruption vulnerability which could allow arbitrary code execution during the processing
  of special crafted web-content.

Other issues addressed:   
- Update to version 2.22.6 (bsc#1124937).
- Kinetic scrolling slow down smoothly when reaching the ends of pages, instead of abruptly, to better match the GTK+ behaviour.
- Fixed Web inspector magnifier under Wayland.
- Fixed garbled rendering of some websites (e.g. YouTube) while scrolling under X11.
- Fixed several crashes, race conditions, and rendering issues.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-28"/>
	<updated date="2019-02-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1124937">SUSE bug 1124937</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6212/">CVE-2019-6212</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6215/">CVE-2019-6215</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6216/">CVE-2019-6216</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6217/">CVE-2019-6217</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6226/">CVE-2019-6226</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6227/">CVE-2019-6227</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6229/">CVE-2019-6229</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6233/">CVE-2019-6233</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6234/">CVE-2019-6234</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521654" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521655" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521657" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521658" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521659" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78622" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1015336" ref_url="https://bugzilla.suse.com/1015336" source="BUGZILLA"/>
		<reference ref_id="1015337" ref_url="https://bugzilla.suse.com/1015337" source="BUGZILLA"/>
		<reference ref_id="1015340" ref_url="https://bugzilla.suse.com/1015340" source="BUGZILLA"/>
		<reference ref_id="1019683" ref_url="https://bugzilla.suse.com/1019683" source="BUGZILLA"/>
		<reference ref_id="1019695" ref_url="https://bugzilla.suse.com/1019695" source="BUGZILLA"/>
		<reference ref_id="1020413" ref_url="https://bugzilla.suse.com/1020413" source="BUGZILLA"/>
		<reference ref_id="1020645" ref_url="https://bugzilla.suse.com/1020645" source="BUGZILLA"/>
		<reference ref_id="1023175" ref_url="https://bugzilla.suse.com/1023175" source="BUGZILLA"/>
		<reference ref_id="1027260" ref_url="https://bugzilla.suse.com/1027260" source="BUGZILLA"/>
		<reference ref_id="1027457" ref_url="https://bugzilla.suse.com/1027457" source="BUGZILLA"/>
		<reference ref_id="1031492" ref_url="https://bugzilla.suse.com/1031492" source="BUGZILLA"/>
		<reference ref_id="1042286" ref_url="https://bugzilla.suse.com/1042286" source="BUGZILLA"/>
		<reference ref_id="1043083" ref_url="https://bugzilla.suse.com/1043083" source="BUGZILLA"/>
		<reference ref_id="1046264" ref_url="https://bugzilla.suse.com/1046264" source="BUGZILLA"/>
		<reference ref_id="1047487" ref_url="https://bugzilla.suse.com/1047487" source="BUGZILLA"/>
		<reference ref_id="1048916" ref_url="https://bugzilla.suse.com/1048916" source="BUGZILLA"/>
		<reference ref_id="1050549" ref_url="https://bugzilla.suse.com/1050549" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1066223" ref_url="https://bugzilla.suse.com/1066223" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1070805" ref_url="https://bugzilla.suse.com/1070805" source="BUGZILLA"/>
		<reference ref_id="1078355" ref_url="https://bugzilla.suse.com/1078355" source="BUGZILLA"/>
		<reference ref_id="1079935" ref_url="https://bugzilla.suse.com/1079935" source="BUGZILLA"/>
		<reference ref_id="1086095" ref_url="https://bugzilla.suse.com/1086095" source="BUGZILLA"/>
		<reference ref_id="1086423" ref_url="https://bugzilla.suse.com/1086423" source="BUGZILLA"/>
		<reference ref_id="1086652" ref_url="https://bugzilla.suse.com/1086652" source="BUGZILLA"/>
		<reference ref_id="1091405" ref_url="https://bugzilla.suse.com/1091405" source="BUGZILLA"/>
		<reference ref_id="1093158" ref_url="https://bugzilla.suse.com/1093158" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1094823" ref_url="https://bugzilla.suse.com/1094823" source="BUGZILLA"/>
		<reference ref_id="1094973" ref_url="https://bugzilla.suse.com/1094973" source="BUGZILLA"/>
		<reference ref_id="1096242" ref_url="https://bugzilla.suse.com/1096242" source="BUGZILLA"/>
		<reference ref_id="1096281" ref_url="https://bugzilla.suse.com/1096281" source="BUGZILLA"/>
		<reference ref_id="1099523" ref_url="https://bugzilla.suse.com/1099523" source="BUGZILLA"/>
		<reference ref_id="1099810" ref_url="https://bugzilla.suse.com/1099810" source="BUGZILLA"/>
		<reference ref_id="1100105" ref_url="https://bugzilla.suse.com/1100105" source="BUGZILLA"/>
		<reference ref_id="1101557" ref_url="https://bugzilla.suse.com/1101557" source="BUGZILLA"/>
		<reference ref_id="1102439" ref_url="https://bugzilla.suse.com/1102439" source="BUGZILLA"/>
		<reference ref_id="1102660" ref_url="https://bugzilla.suse.com/1102660" source="BUGZILLA"/>
		<reference ref_id="1102875" ref_url="https://bugzilla.suse.com/1102875" source="BUGZILLA"/>
		<reference ref_id="1102877" ref_url="https://bugzilla.suse.com/1102877" source="BUGZILLA"/>
		<reference ref_id="1102879" ref_url="https://bugzilla.suse.com/1102879" source="BUGZILLA"/>
		<reference ref_id="1102882" ref_url="https://bugzilla.suse.com/1102882" source="BUGZILLA"/>
		<reference ref_id="1102896" ref_url="https://bugzilla.suse.com/1102896" source="BUGZILLA"/>
		<reference ref_id="1103097" ref_url="https://bugzilla.suse.com/1103097" source="BUGZILLA"/>
		<reference ref_id="1103156" ref_url="https://bugzilla.suse.com/1103156" source="BUGZILLA"/>
		<reference ref_id="1103257" ref_url="https://bugzilla.suse.com/1103257" source="BUGZILLA"/>
		<reference ref_id="1103624" ref_url="https://bugzilla.suse.com/1103624" source="BUGZILLA"/>
		<reference ref_id="1104098" ref_url="https://bugzilla.suse.com/1104098" source="BUGZILLA"/>
		<reference ref_id="1104731" ref_url="https://bugzilla.suse.com/1104731" source="BUGZILLA"/>
		<reference ref_id="1105428" ref_url="https://bugzilla.suse.com/1105428" source="BUGZILLA"/>
		<reference ref_id="1106061" ref_url="https://bugzilla.suse.com/1106061" source="BUGZILLA"/>
		<reference ref_id="1106105" ref_url="https://bugzilla.suse.com/1106105" source="BUGZILLA"/>
		<reference ref_id="1106237" ref_url="https://bugzilla.suse.com/1106237" source="BUGZILLA"/>
		<reference ref_id="1106240" ref_url="https://bugzilla.suse.com/1106240" source="BUGZILLA"/>
		<reference ref_id="1106929" ref_url="https://bugzilla.suse.com/1106929" source="BUGZILLA"/>
		<reference ref_id="1107385" ref_url="https://bugzilla.suse.com/1107385" source="BUGZILLA"/>
		<reference ref_id="1107866" ref_url="https://bugzilla.suse.com/1107866" source="BUGZILLA"/>
		<reference ref_id="1108145" ref_url="https://bugzilla.suse.com/1108145" source="BUGZILLA"/>
		<reference ref_id="1108240" ref_url="https://bugzilla.suse.com/1108240" source="BUGZILLA"/>
		<reference ref_id="1109272" ref_url="https://bugzilla.suse.com/1109272" source="BUGZILLA"/>
		<reference ref_id="1109330" ref_url="https://bugzilla.suse.com/1109330" source="BUGZILLA"/>
		<reference ref_id="1109695" ref_url="https://bugzilla.suse.com/1109695" source="BUGZILLA"/>
		<reference ref_id="1109806" ref_url="https://bugzilla.suse.com/1109806" source="BUGZILLA"/>
		<reference ref_id="1110286" ref_url="https://bugzilla.suse.com/1110286" source="BUGZILLA"/>
		<reference ref_id="1111062" ref_url="https://bugzilla.suse.com/1111062" source="BUGZILLA"/>
		<reference ref_id="1111174" ref_url="https://bugzilla.suse.com/1111174" source="BUGZILLA"/>
		<reference ref_id="1111809" ref_url="https://bugzilla.suse.com/1111809" source="BUGZILLA"/>
		<reference ref_id="1112246" ref_url="https://bugzilla.suse.com/1112246" source="BUGZILLA"/>
		<reference ref_id="1112963" ref_url="https://bugzilla.suse.com/1112963" source="BUGZILLA"/>
		<reference ref_id="1113412" ref_url="https://bugzilla.suse.com/1113412" source="BUGZILLA"/>
		<reference ref_id="1113766" ref_url="https://bugzilla.suse.com/1113766" source="BUGZILLA"/>
		<reference ref_id="1114190" ref_url="https://bugzilla.suse.com/1114190" source="BUGZILLA"/>
		<reference ref_id="1114417" ref_url="https://bugzilla.suse.com/1114417" source="BUGZILLA"/>
		<reference ref_id="1114475" ref_url="https://bugzilla.suse.com/1114475" source="BUGZILLA"/>
		<reference ref_id="1114648" ref_url="https://bugzilla.suse.com/1114648" source="BUGZILLA"/>
		<reference ref_id="1114763" ref_url="https://bugzilla.suse.com/1114763" source="BUGZILLA"/>
		<reference ref_id="1114839" ref_url="https://bugzilla.suse.com/1114839" source="BUGZILLA"/>
		<reference ref_id="1114871" ref_url="https://bugzilla.suse.com/1114871" source="BUGZILLA"/>
		<reference ref_id="1114893" ref_url="https://bugzilla.suse.com/1114893" source="BUGZILLA"/>
		<reference ref_id="1115431" ref_url="https://bugzilla.suse.com/1115431" source="BUGZILLA"/>
		<reference ref_id="1115433" ref_url="https://bugzilla.suse.com/1115433" source="BUGZILLA"/>
		<reference ref_id="1115440" ref_url="https://bugzilla.suse.com/1115440" source="BUGZILLA"/>
		<reference ref_id="1115482" ref_url="https://bugzilla.suse.com/1115482" source="BUGZILLA"/>
		<reference ref_id="1115709" ref_url="https://bugzilla.suse.com/1115709" source="BUGZILLA"/>
		<reference ref_id="1116027" ref_url="https://bugzilla.suse.com/1116027" source="BUGZILLA"/>
		<reference ref_id="1116183" ref_url="https://bugzilla.suse.com/1116183" source="BUGZILLA"/>
		<reference ref_id="1116285" ref_url="https://bugzilla.suse.com/1116285" source="BUGZILLA"/>
		<reference ref_id="1116336" ref_url="https://bugzilla.suse.com/1116336" source="BUGZILLA"/>
		<reference ref_id="1116345" ref_url="https://bugzilla.suse.com/1116345" source="BUGZILLA"/>
		<reference ref_id="1116497" ref_url="https://bugzilla.suse.com/1116497" source="BUGZILLA"/>
		<reference ref_id="1116653" ref_url="https://bugzilla.suse.com/1116653" source="BUGZILLA"/>
		<reference ref_id="1116841" ref_url="https://bugzilla.suse.com/1116841" source="BUGZILLA"/>
		<reference ref_id="1116924" ref_url="https://bugzilla.suse.com/1116924" source="BUGZILLA"/>
		<reference ref_id="1116950" ref_url="https://bugzilla.suse.com/1116950" source="BUGZILLA"/>
		<reference ref_id="1116962" ref_url="https://bugzilla.suse.com/1116962" source="BUGZILLA"/>
		<reference ref_id="1117108" ref_url="https://bugzilla.suse.com/1117108" source="BUGZILLA"/>
		<reference ref_id="1117162" ref_url="https://bugzilla.suse.com/1117162" source="BUGZILLA"/>
		<reference ref_id="1117165" ref_url="https://bugzilla.suse.com/1117165" source="BUGZILLA"/>
		<reference ref_id="1117186" ref_url="https://bugzilla.suse.com/1117186" source="BUGZILLA"/>
		<reference ref_id="1117562" ref_url="https://bugzilla.suse.com/1117562" source="BUGZILLA"/>
		<reference ref_id="1117645" ref_url="https://bugzilla.suse.com/1117645" source="BUGZILLA"/>
		<reference ref_id="1117744" ref_url="https://bugzilla.suse.com/1117744" source="BUGZILLA"/>
		<reference ref_id="1118152" ref_url="https://bugzilla.suse.com/1118152" source="BUGZILLA"/>
		<reference ref_id="1118316" ref_url="https://bugzilla.suse.com/1118316" source="BUGZILLA"/>
		<reference ref_id="1118319" ref_url="https://bugzilla.suse.com/1118319" source="BUGZILLA"/>
		<reference ref_id="1118505" ref_url="https://bugzilla.suse.com/1118505" source="BUGZILLA"/>
		<reference ref_id="1118790" ref_url="https://bugzilla.suse.com/1118790" source="BUGZILLA"/>
		<reference ref_id="1118798" ref_url="https://bugzilla.suse.com/1118798" source="BUGZILLA"/>
		<reference ref_id="1118915" ref_url="https://bugzilla.suse.com/1118915" source="BUGZILLA"/>
		<reference ref_id="1118922" ref_url="https://bugzilla.suse.com/1118922" source="BUGZILLA"/>
		<reference ref_id="1118926" ref_url="https://bugzilla.suse.com/1118926" source="BUGZILLA"/>
		<reference ref_id="1118930" ref_url="https://bugzilla.suse.com/1118930" source="BUGZILLA"/>
		<reference ref_id="1118936" ref_url="https://bugzilla.suse.com/1118936" source="BUGZILLA"/>
		<reference ref_id="1119204" ref_url="https://bugzilla.suse.com/1119204" source="BUGZILLA"/>
		<reference ref_id="1119680" ref_url="https://bugzilla.suse.com/1119680" source="BUGZILLA"/>
		<reference ref_id="1119714" ref_url="https://bugzilla.suse.com/1119714" source="BUGZILLA"/>
		<reference ref_id="1119877" ref_url="https://bugzilla.suse.com/1119877" source="BUGZILLA"/>
		<reference ref_id="1119946" ref_url="https://bugzilla.suse.com/1119946" source="BUGZILLA"/>
		<reference ref_id="1119967" ref_url="https://bugzilla.suse.com/1119967" source="BUGZILLA"/>
		<reference ref_id="1119970" ref_url="https://bugzilla.suse.com/1119970" source="BUGZILLA"/>
		<reference ref_id="1120017" ref_url="https://bugzilla.suse.com/1120017" source="BUGZILLA"/>
		<reference ref_id="1120046" ref_url="https://bugzilla.suse.com/1120046" source="BUGZILLA"/>
		<reference ref_id="1120722" ref_url="https://bugzilla.suse.com/1120722" source="BUGZILLA"/>
		<reference ref_id="1120743" ref_url="https://bugzilla.suse.com/1120743" source="BUGZILLA"/>
		<reference ref_id="1120758" ref_url="https://bugzilla.suse.com/1120758" source="BUGZILLA"/>
		<reference ref_id="1120902" ref_url="https://bugzilla.suse.com/1120902" source="BUGZILLA"/>
		<reference ref_id="1120950" ref_url="https://bugzilla.suse.com/1120950" source="BUGZILLA"/>
		<reference ref_id="1121239" ref_url="https://bugzilla.suse.com/1121239" source="BUGZILLA"/>
		<reference ref_id="1121240" ref_url="https://bugzilla.suse.com/1121240" source="BUGZILLA"/>
		<reference ref_id="1121241" ref_url="https://bugzilla.suse.com/1121241" source="BUGZILLA"/>
		<reference ref_id="1121242" ref_url="https://bugzilla.suse.com/1121242" source="BUGZILLA"/>
		<reference ref_id="1121275" ref_url="https://bugzilla.suse.com/1121275" source="BUGZILLA"/>
		<reference ref_id="1121621" ref_url="https://bugzilla.suse.com/1121621" source="BUGZILLA"/>
		<reference ref_id="1121726" ref_url="https://bugzilla.suse.com/1121726" source="BUGZILLA"/>
		<reference ref_id="1122650" ref_url="https://bugzilla.suse.com/1122650" source="BUGZILLA"/>
		<reference ref_id="1122651" ref_url="https://bugzilla.suse.com/1122651" source="BUGZILLA"/>
		<reference ref_id="1122779" ref_url="https://bugzilla.suse.com/1122779" source="BUGZILLA"/>
		<reference ref_id="1122885" ref_url="https://bugzilla.suse.com/1122885" source="BUGZILLA"/>
		<reference ref_id="1123321" ref_url="https://bugzilla.suse.com/1123321" source="BUGZILLA"/>
		<reference ref_id="1123323" ref_url="https://bugzilla.suse.com/1123323" source="BUGZILLA"/>
		<reference ref_id="1123357" ref_url="https://bugzilla.suse.com/1123357" source="BUGZILLA"/>
		<reference ref_id="1123933" ref_url="https://bugzilla.suse.com/1123933" source="BUGZILLA"/>
		<reference ref_id="1124166" ref_url="https://bugzilla.suse.com/1124166" source="BUGZILLA"/>
		<reference ref_id="1124728" ref_url="https://bugzilla.suse.com/1124728" source="BUGZILLA"/>
		<reference ref_id="1124732" ref_url="https://bugzilla.suse.com/1124732" source="BUGZILLA"/>
		<reference ref_id="1124735" ref_url="https://bugzilla.suse.com/1124735" source="BUGZILLA"/>
		<reference ref_id="1124775" ref_url="https://bugzilla.suse.com/1124775" source="BUGZILLA"/>
		<reference ref_id="1124777" ref_url="https://bugzilla.suse.com/1124777" source="BUGZILLA"/>
		<reference ref_id="1124780" ref_url="https://bugzilla.suse.com/1124780" source="BUGZILLA"/>
		<reference ref_id="1124811" ref_url="https://bugzilla.suse.com/1124811" source="BUGZILLA"/>
		<reference ref_id="1125000" ref_url="https://bugzilla.suse.com/1125000" source="BUGZILLA"/>
		<reference ref_id="1125014" ref_url="https://bugzilla.suse.com/1125014" source="BUGZILLA"/>
		<reference ref_id="1125446" ref_url="https://bugzilla.suse.com/1125446" source="BUGZILLA"/>
		<reference ref_id="1125794" ref_url="https://bugzilla.suse.com/1125794" source="BUGZILLA"/>
		<reference ref_id="1125796" ref_url="https://bugzilla.suse.com/1125796" source="BUGZILLA"/>
		<reference ref_id="1125808" ref_url="https://bugzilla.suse.com/1125808" source="BUGZILLA"/>
		<reference ref_id="1125809" ref_url="https://bugzilla.suse.com/1125809" source="BUGZILLA"/>
		<reference ref_id="1125810" ref_url="https://bugzilla.suse.com/1125810" source="BUGZILLA"/>
		<reference ref_id="1125892" ref_url="https://bugzilla.suse.com/1125892" source="BUGZILLA"/>
		<reference ref_id="985031" ref_url="https://bugzilla.suse.com/985031" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1120" ref_url="https://www.suse.com/security/cve/CVE-2018-1120/" source="CVE"/>
		<reference ref_id="CVE-2018-16862" ref_url="https://www.suse.com/security/cve/CVE-2018-16862/" source="CVE"/>
		<reference ref_id="CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884/" source="CVE"/>
		<reference ref_id="CVE-2018-19407" ref_url="https://www.suse.com/security/cve/CVE-2018-19407/" source="CVE"/>
		<reference ref_id="CVE-2018-19824" ref_url="https://www.suse.com/security/cve/CVE-2018-19824/" source="CVE"/>
		<reference ref_id="CVE-2018-19985" ref_url="https://www.suse.com/security/cve/CVE-2018-19985/" source="CVE"/>
		<reference ref_id="CVE-2018-20169" ref_url="https://www.suse.com/security/cve/CVE-2018-20169/" source="CVE"/>
		<reference ref_id="CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391/" source="CVE"/>
		<reference ref_id="CVE-2018-9568" ref_url="https://www.suse.com/security/cve/CVE-2018-9568/" source="CVE"/>
		<reference ref_id="CVE-2019-3459" ref_url="https://www.suse.com/security/cve/CVE-2019-3459/" source="CVE"/>
		<reference ref_id="CVE-2019-3460" ref_url="https://www.suse.com/security/cve/CVE-2019-3460/" source="CVE"/>
		<reference ref_id="CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974/" source="CVE"/>
		<reference ref_id="CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221/" source="CVE"/>
		<reference ref_id="CVE-2019-7222" ref_url="https://www.suse.com/security/cve/CVE-2019-7222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.175 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free. (bnc#1124728)
- CVE-2019-7221: Fixed a user-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124732).
- CVE-2019-7222: Fixed an information leakage in the KVM hypervisor related to handling page fault exceptions, which allowed a guest user/process to use this flaw to leak the host's stack memory contents to a guest (bsc#1124735).
- CVE-2018-1120: By mmap()ing a FUSE-backed file onto a process's memory containing command line arguments (or environment strings), an attacker could have caused utilities from psutils or procps (such as ps, w) or any other program which made a read() call to the /proc/&lt;pid&gt;/cmdline (or /proc/&lt;pid&gt;/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks) (bnc#1093158).
- CVE-2018-16862: A security flaw was found in a way that the cleancache subsystem clears an inode after the final file truncation (removal). The new file created with the same inode may contain leftover pages from cleancache and the old file data instead of the new one (bnc#1117186).
- CVE-2018-16884: NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bnc#1119946).
- CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c allowed local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized (bnc#1116841).
- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).
- CVE-2018-19985: The function hso_probe read if_num from the USB device (as an u8) and used it without a length check to index an array, resulting in an OOB memory read in hso_probe or hso_get_config_data that could be used by local attackers (bnc#1120743).
- CVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).
- CVE-2018-5391: The Linux kernel was vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size (bnc#1103097).
- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bnc#1118319).
- CVE-2019-3459,CVE-2019-3460: Two remote information leak vulnerabilities in the Bluetooth stack were fixed that could potentially leak kernel information (bsc#1120758)

The following non-security bugs were fixed:

- 9p: clear dangling pointers in p9stat_free (bnc#1012382).
- 9p locks: fix glock.client_id leak in do_lock (bnc#1012382).
- 9p/net: put a lower bound on msize (bnc#1012382).
- acpi/iort: Fix iort_get_platform_device_domain() uninitialized pointer value (bsc#1121239).
- acpi/lpss: Add alternative ACPI HIDs for Cherry Trail DMA controllers (bnc#1012382).
- acpi/nfit: Block function zero DSMs (bsc#1123321).
- acpi/nfit: Fix ARS overflow continuation (bsc#1125000).
- acpi/nfit: fix cmd_rc for acpi_nfit_ctl to always return a value (bsc#1124775).
- acpi/nfit: Fix command-supported detection (bsc#1123323).
- acpi/nfit, x86/mce: Handle only uncorrectable machine checks (bsc#1114648).
- acpi/nfit, x86/mce: Validate a MCE's address before using it (bsc#1114648).
- acpi/platform: Add SMB0001 HID to forbidden_id_list (bnc#1012382).
- acpi/power: Skip duplicate power resource references in _PRx (bnc#1012382).
- acpi/processor: Fix the return value of acpi_processor_ids_walk() (git fixes (acpi)).
- af_iucv: Move sockaddr length checks to before accessing sa_family in bind and connect handlers (bnc#1012382).
- ahci: do not ignore result code of ahci_reset_controller() (bnc#1012382).
- aio: fix spectre gadget in lookup_ioctx (bnc#1012382).
- aio: hold an extra file reference over AIO read/write operations (bsc#1116027).
- alpha: Fix Eiger NR_IRQS to 128 (bnc#1012382).
- alpha: fix page fault handling for r16-r18 targets (bnc#1012382).
- ALSA: ac97: Fix incorrect bit shift at AC97-SPSA control write (bnc#1012382).
- ALSA: bebob: fix model-id of unit for Apogee Ensemble (bnc#1012382).
- ALSA: ca0106: Disable IZD on SB0570 DAC to fix audio pops (bnc#1012382).
- ALSA: compress: Fix stop handling on compressed capture streams (bnc#1012382).
- ALSA: control: Fix race between adding and removing a user element (bnc#1012382).
- ALSA: cs46xx: Potential NULL dereference in probe (bnc#1012382).
- ALSA: emu10k1: Fix potential Spectre v1 vulnerabilities (bnc#1012382).
- ALSA: emux: Fix potential Spectre v1 vulnerabilities (bnc#1012382).
- ALSA: hda - Add mic quirk for the Lenovo G50-30 (17aa:3905) (bnc#1012382).
- ALSA: hda: add mute LED support for HP EliteBook 840 G4 (bnc#1012382).
- ALSA: hda - Add quirk for HP EliteBook 840 G5 (bnc#1012382).
- ALSA: hda: Add support for AMD Stoney Ridge (bnc#1012382).
- ALSA: hda: Check the non-cached stream buffers more explicitly (bnc#1012382).
- ALSA: hda/realtek - Disable headset Mic VREF for headset mode of ALC225 (bnc#1012382).
- ALSA: hda - Serialize codec registrations (bnc#1012382).
- ALSA: hda/tegra: clear pending irq handlers (bnc#1012382).
- ALSA: isa/wavefront: prevent some out of bound writes (bnc#1012382).
- ALSA: pcm: Call snd_pcm_unlink() conditionally at closing (bnc#1012382).
- ALSA: pcm: Fix interval evaluation with openmin/max (bnc#1012382).
- ALSA: pcm: Fix potential Spectre v1 vulnerability (bnc#1012382).
- ALSA: pcm: Fix starvation on down_write_nonblock() (bnc#1012382).
- ALSA: pcm: remove SNDRV_PCM_IOCTL1_INFO internal command (bnc#1012382).
- ALSA: rme9652: Fix potential Spectre v1 vulnerability (bnc#1012382).
- ALSA: sparc: Fix invalid snd_free_pages() at error path (bnc#1012382).
- ALSA: timer: Fix zero-division by continue of uninitialized instance (bnc#1012382).
- ALSA: trident: Suppress gcc string warning (bnc#1012382).
- ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit() (bnc#1012382).
- ALSA: usb-audio: Fix an out-of-bound read in create_composite_quirks (bnc#1012382).
- ALSA: usb-audio: Fix implicit fb endpoint setup by quirk (bnc#1012382).
- ALSA: wss: Fix invalid snd_free_pages() at error path (bnc#1012382).
- amd/iommu: Fix Guest Virtual APIC Log Tail Address Register (bsc#1106105).
- arc: change defconfig defaults to ARCv2 (bnc#1012382).
- arc: [devboards] Add support of NFSv3 ACL (bnc#1012382).
- arch/alpha, termios: implement BOTHER, IBSHIFT and termios2 (bnc#1012382).
- arc: io.h: Implement reads{x}()/writes{x}() (bnc#1012382).
- arc: perf: map generic branches to correct hardware condition (bnc#1012382).
- arm64: Disable asm-operand-width warning for clang (bnc#1012382).
- arm64: Do not trap host pointer auth use to EL2 (bnc#1012382).
- arm64: dts: stratix10: Correct System Manager register size (bnc#1012382).
- arm64: Enabled ENA (Amazon network driver) for arm64
- arm64: ftrace: do not adjust the LR value (bnc#1012382).
- arm64: hardcode rodata_enabled=true earlier in the series (bsc#1114763).
- arm64: hyp-stub: Forbid kprobing of the hyp-stub (bnc#1012382).
- arm64/kvm: consistently handle host HCR_EL2 flags (bnc#1012382).
- arm64: kvm: Skip MMIO insn after emulation (bnc#1012382).
- arm64: PCI: ACPI support for legacy IRQs parsing and consolidation with DT code (bsc#985031).
- arm64: percpu: Initialize ret in the default case (bnc#1012382).
- arm64: perf: set suppress_bind_attrs flag to true (bnc#1012382).
- arm64: remove no-op -p linker flag (bnc#1012382).
- arm: 8799/1: mm: fix pci_ioremap_io() offset check (bnc#1012382).
- arm: 8808/1: kexec:offline panic_smp_self_stop CPU (bnc#1012382).
- arm: 8814/1: mm: improve/fix ARM v7_dma_inv_range() unaligned address handling (bnc#1012382).
- arm: cns3xxx: Fix writing to wrong PCI config registers after alignment (bnc#1012382).
- arm: dts: apq8064: add ahci ports-implemented mask (bnc#1012382).
- arm: dts: da850-evm: Correct the sound card name (bnc#1012382).
- arm: dts: Fix OMAP4430 SDP Ethernet startup (bnc#1012382).
- arm: dts: imx53-qsb: disable 1.2GHz OPP (bnc#1012382).
- arm: dts: kirkwood: Fix polarity of GPIO fan lines (bnc#1012382).
- arm: dts: mmp2: fix TWSI2 (bnc#1012382).
- arm: fix mis-applied iommu identity check (bsc#1116924).
- arm: imx: update the cpu power up timing setting on i.mx6sx (bnc#1012382).
- arm: iop32x/n2100: fix PCI IRQ mapping (bnc#1012382).
- arm: kvm: fix building with gcc-8 (bsc#1121241).
- arm: OMAP1: ams-delta: Fix possible use of uninitialized field (bnc#1012382).
- arm: OMAP2+: hwmod: Fix some section annotations (bnc#1012382).
- arm: OMAP2+: prm44xx: Fix section annotation on omap44xx_prm_enable_io_wakeup (bnc#1012382).
- arm: pxa: avoid section mismatch warning (bnc#1012382).
- asix: Check for supported Wake-on-LAN modes (bnc#1012382).
- ASoC: ak4613: Enable cache usage to fix crashes on resume (bnc#1012382).
- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bnc#1012382).
- ASoC: dapm: Recalculate audio map forcely when card instantiated (bnc#1012382).
- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bnc#1012382).
- ASoC: Intel: mrfld: fix uninitialized variable access (bnc#1012382).
- ASoC: omap-dmic: Add pm_qos handling to avoid overruns with CPU_IDLE (bnc#1012382).
- ASoC: omap-mcpdm: Add pm_qos handling to avoid under/overruns with CPU_IDLE (bnc#1012382).
- ASoC: spear: fix error return code in spdif_in_probe() (bnc#1012382).
- ASoC: wm8940: Enable cache usage to fix crashes on resume (bnc#1012382).
- ata: Fix racy link clearance (bsc#1107866).
- ataflop: fix error handling during setup (bnc#1012382).
- ath10k: fix kernel panic due to race in accessing arvif list (bnc#1012382).
- ath10k: schedule hardware restart if WMI command times out (bnc#1012382).
- ax25: fix a use-after-free in ax25_fillin_cb() (bnc#1012382).
- ax88179_178a: Check for supported Wake-on-LAN modes (bnc#1012382).
- b43: Fix error in cordic routine (bnc#1012382).
- batman-adv: Avoid WARN on net_device without parent in netns (bnc#1012382).
- batman-adv: Expand merged fragment buffer for full packet (bnc#1012382).
- batman-adv: Force mac header to start of data on xmit (bnc#1012382).
- bcache: fix miss key refill-&gt;end in writeback (bnc#1012382).
- bfs: add sanity check at bfs_fill_super() (bnc#1012382).
- binfmt_elf: fix calculations for bss padding (bnc#1012382).
- bitops: protect variables in bit_clear_unless() macro (bsc#1116285).
- block: fix inheriting request priority from bio (bsc#1116924).
- block/loop: Use global lock for ioctl() operation (bnc#1012382).
- block: respect virtual boundary mask in bvecs (bsc#1113412).
- block/swim3: Fix -EBUSY error when re-opening device after unmount (Git-fixes).
- Bluetooth: btbcm: Add entry for BCM4335C0 UART bluetooth (bnc#1012382).
- Bluetooth: Fix unnecessary error message for HCI request completion (bnc#1012382).
- Bluetooth: SMP: fix crash in unpairing (bnc#1012382).
- bna: ethtool: Avoid reading past end of buffer (bnc#1012382).
- bnx2x: Assign unique DMAE channel number for FW DMAE transactions (bnc#1012382).
- bnxt_re: Fix couple of memory leaks that could lead to IOMMU call traces (bsc#1020413).
- bonding: fix 802.3ad state sent to partner when unbinding slave (bnc#1012382).
- bpf: fix check of allowed specifiers in bpf_trace_printk (bnc#1012382).
- bpf: generally move prog destruction to RCU deferral (bnc#1012382).
- bpf: support 8-byte metafield access (bnc#1012382).
- bpf, trace: check event type in bpf_perf_event_read (bsc#1119970).
- bpf, trace: use READ_ONCE for retrieving file ptr (bsc#1119967).
- bpf/verifier: Add spi variable to check_stack_write() (bnc#1012382).
- bpf/verifier: Pass instruction index to check_mem_access() and check_xadd() (bnc#1012382).
- bridge: do not add port to router list when receives query with source 0.0.0.0 (bnc#1012382).
- btrfs: Always try all copies when reading extent buffers (bnc#1012382).
- btrfs: do not attempt to trim devices that do not support it (bnc#1012382).
- btrfs: ensure path name is null terminated at btrfs_control_ioctl (bnc#1012382).
- btrfs: fix backport error in submit_stripe_bio (bsc#1114763).
- btrfs: fix data corruption due to cloning of eof block (bnc#1012382).
- btrfs: Fix memory barriers usage with device stats counters (git-fixes).
- btrfs: fix null pointer dereference on compressed write path error (bnc#1012382).
- btrfs: fix pinned underflow after transaction aborted (bnc#1012382).
- btrfs: fix use-after-free when dumping free space (bnc#1012382).
- btrfs: fix wrong dentries after fsync of file that got its parent replaced (bnc#1012382).
- btrfs: Handle error from btrfs_uuid_tree_rem call in _btrfs_ioctl_set_received_subvol (git-fixes).
- btrfs: Handle owner mismatch gracefully when walking up tree (bnc#1012382).
- btrfs: iterate all devices during trim, instead of fs_devices::alloc_list (bnc#1012382).
- btrfs: locking: Add extra check in btrfs_init_new_buffer() to avoid deadlock (bnc#1012382).
- btrfs: make sure we create all new block groups (bnc#1012382).
- btrfs: qgroup: Dirty all qgroups before rescan (bnc#1012382).
- btrfs: release metadata before running delayed refs (bnc#1012382).
- btrfs: reset max_extent_size on clear in a bitmap (bnc#1012382).
- btrfs: send, fix infinite loop due to directory rename dependencies (bnc#1012382).
- btrfs: set max_extent_size properly (bnc#1012382).
- btrfs: tree-checker: Check level for leaves and nodes (bnc#1012382).
- btrfs: tree-checker: Do not check max block group size as current max chunk size limit is unreliable (fixes for bnc#1012382 bsc#1102875 bsc#1102877 bsc#1102879 bsc#1102882 bsc#1102896).
- btrfs: tree-checker: Fix misleading group system information (bnc#1012382).
- btrfs: tree-check: reduce stack consumption in check_dir_item (bnc#1012382).
- btrfs: validate type when reading a chunk (bnc#1012382).
- btrfs: wait on caching when putting the bg cache (bnc#1012382).
- btrfs: wait on ordered extents on abort cleanup (bnc#1012382).
- cachefiles: fix the race between cachefiles_bury_object() and rmdir(2) (bnc#1012382).
- can: bcm: check timer values before ktime conversion (bnc#1012382).
- can: dev: __can_get_echo_skb(): Do not crash the kernel if can_priv::echo_skb is accessed out of bounds (bnc#1012382).
- can: dev: can_get_echo_skb(): factor out non sending code to __can_get_echo_skb() (bnc#1012382).
- can: dev: __can_get_echo_skb(): fix bogous check for non-existing skb by removing it (bnc#1012382).
- can: dev: __can_get_echo_skb(): print error message, if trying to echo non existing skb (bnc#1012382).
- can: dev: __can_get_echo_skb(): replace struct can_frame by canfd_frame to access frame length (bnc#1012382).
- can: gw: ensure DLC boundaries after CAN frame modification (bnc#1012382).
- can: rcar_can: Fix erroneous registration (bnc#1012382).
- cdc-acm: correct counting of UART states in serial state notification (bnc#1012382).
- cdc-acm: fix abnormal DATA RX issue for Mediatek Preloader (bnc#1012382).
- ceph: call setattr_prepare from ceph_setattr instead of inode_change_ok (bsc#1114763).
- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125809).
- ceph: do not update importing cap's mseq when handing cap export (bsc#1121275).
- ceph: fix dentry leak in ceph_readdir_prepopulate (bsc#1114839).
- ceph: quota: fix null pointer dereference in quota check (bsc#1114839).
- cfg80211: reg: Init wiphy_idx in regulatory_hint_core() (bnc#1012382).
- char/mwave: fix potential Spectre v1 vulnerability (bnc#1012382).
- checkstack.pl: fix for aarch64 (bnc#1012382).
- cifs: Always resolve hostname before reconnecting (bnc#1012382).
- cifs: check ntwrk_buf_start for NULL before dereferencing it (bnc#1012382).
- cifs: Do not count -ENODATA as failure for query directory (bnc#1012382).
- cifs: Do not hide EINTR after sending network packets (bnc#1012382).
- cifs: Fix error mapping for SMB2_LOCK command which caused OFD lock problem (bnc#1012382).
- cifs: Fix possible hang during async MTU reads and writes (bnc#1012382).
- cifs: Fix potential OOB access of lock element array (bnc#1012382).
- cifs: Fix separator when building path from dentry (bnc#1012382).
- cifs: handle guest access errors to Windows shares (bnc#1012382).
- cifs: In Kconfig CONFIG_CIFS_POSIX needs depends on legacy (insecure cifs) (bnc#1012382).
- cifs: Limit memory used by lock request calls to a page (bnc#1012382).
- clk: imx6q: reset exclusive gates on init (bnc#1012382).
- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bnc#1012382).
- clk: mmp: Off by one in mmp_clk_add() (bnc#1012382).
- clk: s2mps11: Add used attribute to s2mps11_dt_match (git-fixes).
- clk: s2mps11: Fix matching when built as module and DT node contains compatible (bnc#1012382).
- clk: samsung: exynos5420: Enable PERIS clocks for suspend (bnc#1012382).
- clockevents/drivers/i8253: Add support for PIT shutdown quirk (bnc#1012382).
- configfs: replace strncpy with memcpy (bnc#1012382).
- cpufeature: avoid warning when compiling with clang (Git-fixes).
- cpufreq: imx6q: add return value check for voltage scale (bnc#1012382).
- cpufreq: intel_pstate: Fix HWP on boot CPU after system resume (bsc#1120017).
- cpuidle: big.LITTLE: fix refcount leak (bnc#1012382).
- cpuidle: Do not access cpuidle_devices when !CONFIG_CPU_IDLE (bnc#1012382).
- cramfs: fix abad comparison when wrap-arounds occur (bnc#1012382).
- crypto: arm64/sha - avoid non-standard inline asm tricks (bnc#1012382).
- crypto: authencesn - Avoid twice completion call in decrypt path (bnc#1012382).
- crypto: authenc - fix parsing key with misaligned rta_len (bnc#1012382).
- crypto: cts - fix crash on short inputs (bnc#1012382).
- crypto: lrw - Fix out-of bounds access on counter overflow (bnc#1012382).
- crypto: shash - Fix a sleep-in-atomic bug in shash_setkey_unaligned (bnc#1012382).
- crypto: user - support incremental algorithm dumps (bsc#1120902).
- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bnc#1012382).
- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bnc#1012382).
- crypto, x86: aesni - fix token pasting for clang (bnc#1012382).
- crypto: x86/chacha20 - avoid sleeping with preemption disabled (bnc#1012382).
- cw1200: Do not leak memory if krealloc failes (bnc#1012382).
- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bnc#1012382).
- cxgb4: Add support for new flash parts (bsc#1102439).
- cxgb4: assume flash part size to be 4MB, if it can't be determined (bsc#1102439).
- cxgb4: Fix FW flash errors (bsc#1102439).
- cxgb4: fix missing break in switch and indent return statements (bsc#1102439).
- cxgb4: support new ISSI flash parts (bsc#1102439).
- dccp: fool proof ccid_hc_[rt]x_parse_options() (bnc#1012382).
- debugfs: fix debugfs_rename parameter checking (bnc#1012382).
- debugobjects: avoid recursive calls with kmemleak (bnc#1012382).
- disable stringop truncation warnings for now (bnc#1012382).
- dlm: Do not swamp the CPU with callbacks queued during recovery (bnc#1012382).
- dlm: fixed memory leaks after failed ls_remove_names allocation (bnc#1012382).
- dlm: lost put_lkb on error path in receive_convert() and receive_unlock() (bnc#1012382).
- dlm: memory leaks on error path in dlm_user_request() (bnc#1012382).
- dlm: possible memory leak on error path in create_lkb() (bnc#1012382).
- dmaengine: at_hdmac: fix memory leak in at_dma_xlate() (bnc#1012382).
- dmaengine: at_hdmac: fix module unloading (bnc#1012382).
- dmaengine: dma-jz4780: Return error if not probed from DT (bnc#1012382).
- dmaengine: imx-dma: fix wrong callback invoke (bnc#1012382).
- dm cache metadata: ignore hints array being too small during resize (Git-fixes).
- dm crypt: add cryptographic data integrity protection (authenticated encryption) (Git-fixes).
- dm crypt: factor IV constructor out to separate function (Git-fixes).
- dm crypt: fix crash by adding missing check for auth key size (git-fixes).
- dm crypt: fix error return code in crypt_ctr() (git-fixes).
- dm crypt: fix memory leak in crypt_ctr_cipher_old() (git-fixes).
- dm crypt: introduce new format of cipher with 'capi:' prefix (Git-fixes).
- dm crypt: wipe kernel key copy after IV initialization (Git-fixes).
- dm: do not allow readahead to limit IO size (git fixes (readahead)).
- dm ioctl: harden copy_params()'s copy_from_user() from malicious users (bnc#1012382).
- dm kcopyd: Fix bug causing workqueue stalls (bnc#1012382).
- dm-multipath: do not assign cmd_flags in setup_clone() (bsc#1103156).
- dm raid: stop using BUG() in __rdev_sectors() (bsc#1046264).
- dm snapshot: Fix excessive memory usage and workqueue stalls (bnc#1012382).
- dm thin: fix bug where bio that overwrites thin block ignores FUA (bnc#1012382).
- dm thin: stop no_space_timeout worker when switching to write-mode (Git-fixes).
- Documentation/network: reword kernel version reference (bnc#1012382).
- dpaa_eth: fix dpaa_get_stats64 to match prototype (bsc#1114763).
- drbd: Avoid Clang warning about pointless switch statment (bnc#1012382).
- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bnc#1012382).
- drbd: narrow rcu_read_lock in drbd_sync_handshake (bnc#1012382).
- drbd: skip spurious timeout (ping-timeo) when failing promote (bnc#1012382).
- driver/dma/ioat: Call del_timer_sync() without holding prep_lock (bnc#1012382).
- drivers: core: Remove glue dirs from sysfs earlier (bnc#1012382).
- drivers: hv: vmbus: check the creation_status in vmbus_establish_gpadl() (bsc#1104098).
- drivers: hv: vmbus: Return -EINVAL for the sys files for unopened channels (bnc#1012382).
- drivers/misc/sgi-gru: fix Spectre v1 vulnerability (bnc#1012382).
- drivers/sbus/char: add of_node_put() (bnc#1012382).
- drivers/tty: add missing of_node_put() (bnc#1012382).
- drm/ast: change resolution may cause screen blurred (bnc#1012382).
- drm/ast: fixed cursor may disappear sometimes (bnc#1012382).
- drm/ast: fixed reading monitor EDID not stable issue (bnc#1012382).
- drm/ast: Fix incorrect free on ioregs (bsc#1106929)
- drm/ast: Remove existing framebuffers before loading driver (boo#1112963)
- drm/bufs: Fix Spectre v1 vulnerability (bnc#1012382).
- drm/dp_mst: Check if primary mstb is null (bnc#1012382).
- drm/fb-helper: Ignore the value of fb_var_screeninfo.pixclock (bsc#1106929)
- drm/hisilicon: hibmc: Do not carry error code in HiBMC framebuffer (bsc#1113766)
- drm/hisilicon: hibmc: Do not overwrite fb helper surface depth (bsc#1113766)
- drm/i915: Block fbdev HPD processing during suspend (bsc#1106929)
- drm/i915/hdmi: Add HDMI 2.0 audio clock recovery N values (bnc#1012382).
- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1106929)
- drm/ioctl: Fix Spectre v1 vulnerabilities (bnc#1012382).
- drm/modes: Prevent division by zero htotal (bnc#1012382).
- drm/msm: Grab a vblank reference when waiting for commit_done (bnc#1012382).
- drm/nouveau/fbcon: fix oops without fbdev emulation (bnc#1012382).
- drm/omap: fix memory barrier bug in DMM driver (bnc#1012382).
- drm: rcar-du: Fix external clock error checks (bsc#1106929)
- drm: rcar-du: Fix vblank initialization (bsc#1106929)
- drm/rockchip: Allow driver to be shutdown on reboot/kexec (bnc#1012382).
- drm/vmwgfx: Fix setting of dma masks (bsc#1106929)
- drm/vmwgfx: Return error code from vmw_execbuf_copy_fence_user (bsc#1106929)
- e1000: avoid null pointer dereference on invalid stat type (bnc#1012382).
- e1000e: allow non-monotonic SYSTIM readings (bnc#1012382).
- e1000: fix race condition between e1000_down() and e1000_watchdog (bnc#1012382).
- edac: Raise the maximum number of memory controllers (bsc#1120722).
- efi/libstub/arm64: Force 'hidden' visibility for section markers (bnc#1012382).
- efi/libstub/arm64: Set -fpie when building the EFI stub (bnc#1012382).
- efi/libstub/arm64: Use hidden attribute for struct screen_info reference (bsc#1122650).
- enic: fix checksum validation for IPv6 (bnc#1012382).
- exec: avoid gcc-8 warning for get_task_comm (bnc#1012382).
- exec: load_script: do not blindly truncate shebang string (bnc#1012382).
- exportfs: do not read dentry after free (bnc#1012382).
- ext2: fix potential use after free (bnc#1012382).
- ext4: add missing brelse() add_new_gdb_meta_bg()'s error path (bnc#1012382).
- ext4: add missing brelse() in set_flexbg_block_bitmap()'s error path (bnc#1012382).
- ext4: add missing brelse() update_backups()'s error path (bnc#1012382).
- ext4: avoid buffer leak in ext4_orphan_add() after prior errors (bnc#1012382).
- ext4: avoid possible double brelse() in add_new_gdb() on error path (bnc#1012382).
- ext4: avoid potential extra brelse in setup_new_flex_group_blocks() (bnc#1012382).
- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bnc#1012382).
- ext4: fix argument checking in EXT4_IOC_MOVE_EXT (bnc#1012382).
- ext4: fix buffer leak in __ext4_read_dirblock() on error path (bnc#1012382).
- ext4: fix buffer leak in ext4_xattr_move_to_block() on error path (bnc#1012382).
- ext4: Fix crash during online resizing (bsc#1122779).
- ext4: fix EXT4_IOC_GROUP_ADD ioctl (bnc#1012382).
- ext4: fix missing cleanup if ext4_alloc_flex_bg_array() fails while resizing (bnc#1012382).
- ext4: fix possible inode leak in the retry loop of ext4_resize_fs() (bnc#1012382).
- ext4: fix possible leak of sbi-&gt;s_group_desc_leak in error path (bnc#1012382).
- ext4: fix possible use after free in ext4_quota_enable (bnc#1012382).
- ext4: force inode writes when nfsd calls commit_metadata() (bnc#1012382).
- ext4: initialize retries variable in ext4_da_write_inline_data_begin() (bnc#1012382).
- ext4: missing unlock/put_page() in ext4_try_to_write_inline_data() (bnc#1012382).
- ext4: release bs.bh before re-using in ext4_xattr_block_find() (bnc#1012382).
- f2fs: Add sanity_check_inode() function (bnc#1012382).
- f2fs: avoid unneeded loop in build_sit_entries (bnc#1012382).
- f2fs: check blkaddr more accuratly before issue a bio (bnc#1012382).
- f2fs: clean up argument of recover_data (bnc#1012382).
- f2fs: clean up with is_valid_blkaddr() (bnc#1012382).
- f2fs: detect wrong layout (bnc#1012382).
- f2fs: enhance sanity_check_raw_super() to avoid potential overflow (bnc#1012382).
- f2fs: factor out fsync inode entry operations (bnc#1012382).
- f2fs: fix inode cache leak (bnc#1012382).
- f2fs: fix invalid memory access (bnc#1012382).
- f2fs: fix missing up_read (bnc#1012382).
- f2fs: fix to avoid reading out encrypted data in page cache (bnc#1012382).
- f2fs: fix to convert inline directory correctly (bnc#1012382).
- f2fs: fix to determine start_cp_addr by sbi-&gt;cur_cp_pack (bnc#1012382).
- f2fs: fix to do sanity check with block address in main area (bnc#1012382).
- f2fs: fix to do sanity check with block address in main area v2 (bnc#1012382).
- f2fs: fix to do sanity check with cp_pack_start_sum (bnc#1012382).
- f2fs: fix to do sanity check with node footer and iblocks (bnc#1012382).
- f2fs: fix to do sanity check with reserved blkaddr of inline inode (bnc#1012382).
- f2fs: fix to do sanity check with secs_per_zone (bnc#1012382).
- f2fs: fix to do sanity check with user_block_count (bnc#1012382).
- f2fs: fix validation of the block count in sanity_check_raw_super (bnc#1012382).
- f2fs: fix wrong return value of f2fs_acl_create (bnc#1012382).
- f2fs: free meta pages if sanity check for ckpt is failed (bnc#1012382).
- f2fs: give -EINVAL for norecovery and rw mount (bnc#1012382).
- f2fs: introduce and spread verify_blkaddr (bnc#1012382).
- f2fs: introduce get_checkpoint_version for cleanup (bnc#1012382).
- f2fs: move dir data flush to write checkpoint process (bnc#1012382).
- f2fs: move sanity checking of cp into get_valid_checkpoint (bnc#1012382).
- f2fs: not allow to write illegal blkaddr (bnc#1012382).
- f2fs: put directory inodes before checkpoint in roll-forward recovery (bnc#1012382).
- f2fs: read page index before freeing (bnc#1012382).
- f2fs: remove an obsolete variable (bnc#1012382).
- f2fs: return error during fill_super (bnc#1012382).
- f2fs: sanity check on sit entry (bnc#1012382).
- f2fs: use crc and cp version to determine roll-forward recovery (bnc#1012382).
- fbdev: fbcon: Fix unregister crash when more than one framebuffer (bsc#1106929)
- fbdev: fbmem: behave better with small rotated displays and many CPUs (bsc#1106929)
- fcoe: remove duplicate debugging message in fcoe_ctlr_vn_add (bsc#1114763).
- Fix kabi for 'Ensure we commit after writeback is complete' (bsc#1111809).
- Fix problem with sharetransport= and NFSv4 (bsc#1114893).
- floppy: fix race condition in __floppy_read_block_0() (Git-fixes).
- flow_dissector: do not dissect l4 ports for fragments (bnc#1012382).
- fork: record start_time late (bnc#1012382).
- fs: add the fsnotify call to vfs_iter_write (bnc#1012382).
- fscache, cachefiles: remove redundant variable 'cache' (bnc#1012382).
- fscache: fix race between enablement and dropping of object (bsc#1107385).
- fscache: Fix race in fscache_op_complete() due to split atomic_sub &amp; read (Git-fixes).
- fscache: Pass the correct cancelled indications to fscache_op_complete() (Git-fixes).
- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (bnc#1012382).
- fs: do not scan the inode cache before SB_BORN is set (bnc#1012382).
- fs, elf: make sure to page align bss in load_elf_library (bnc#1012382).
- fs/epoll: drop ovflist branch prediction (bnc#1012382).
- fs/exofs: fix potential memory leak in mount option parsing (bnc#1012382).
- fs/fat/fatent.c: add cond_resched() to fat_count_free_clusters() (bnc#1012382).
- fs: fix lost error code in dio_complete (bsc#1117744).
- fuse: call pipe_buf_release() under pipe lock (bnc#1012382).
- fuse: decrement NR_WRITEBACK_TEMP on the right page (bnc#1012382).
- fuse: Dont call set_page_dirty_lock() for ITER_BVEC pages for async_dio (bnc#1012382).
- fuse: fix blocked_waitq wakeup (bnc#1012382).
- fuse: fix leaked notify reply (bnc#1012382).
- fuse: Fix use-after-free in fuse_dev_do_read() (bnc#1012382).
- fuse: Fix use-after-free in fuse_dev_do_write() (bnc#1012382).
- fuse: handle zero sized retrieve correctly (bnc#1012382).
- fuse: set FR_SENT while locked (bnc#1012382).
- futex: Fix (possible) missed wakeup (bsc#1050549).
- gdrom: fix a memory leak bug (bnc#1012382).
- genirq: Fix race on spurious interrupt detection (bnc#1012382).
- genwqe: Fix size check (bnc#1012382).
- gfs2: Do not leave s_fs_info pointing to freed memory in init_sbd (bnc#1012382).
- gfs2: Fix loop in gfs2_rbm_find (bnc#1012382).
- gfs2_meta: -&gt;mount() can get NULL dev_name (bnc#1012382).
- gfs2: Put bitmap buffers in put_super (bnc#1012382).
- gfs2: Revert 'Fix loop in gfs2_rbm_find' (bnc#1012382).
- git_sort.py: Remove non-existent remote tj/libata
- gpiolib: Fix return value of gpio_to_desc() stub if !GPIOLIB (Git-fixes).
- gpio: max7301: fix driver for use with CONFIG_VMAP_STACK (bnc#1012382).
- gpio: msic: fix error return code in platform_msic_gpio_probe() (bnc#1012382).
- gpio: pl061: handle failed allocations (bnc#1012382).
- gpu: host1x: fix error return code in host1x_probe() (bnc#1012382).
- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1106929)
- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1106929)
- gro_cell: add napi_disable in gro_cells_destroy (bnc#1012382).
- hfs: do not free node before using (bnc#1012382).
- hfsplus: do not free node before using (bnc#1012382).
- hfsplus: prevent btree data loss on root split (bnc#1012382).
- hfs: prevent btree data loss on root split (bnc#1012382).
- hid: debug: fix the ring buffer implementation (bnc#1012382).
- hid: hiddev: fix potential Spectre v1 (bnc#1012382).
- hid: lenovo: Add checks to fix of_led_classdev_register (bnc#1012382).
- hid: uhid: forbid UHID_CREATE under KERNEL_DS or elevated privileges (bnc#1012382).
- hpwdt add dynamic debugging (bsc#1114417).
- hpwdt calculate reload value on each use (bsc#1114417).
- hugetlbfs: dirty pages as they are added to pagecache (bnc#1012382).
- hugetlbfs: fix bug in pgoff overflow checking (bnc#1012382).
- hugetlbfs: fix kernel BUG at fs/hugetlbfs/inode.c:444! (bnc#1012382).
- hwmon: (ibmpowernv) Remove bogus __init annotations (bnc#1012382).
- hwmon: (ina2xx) Fix current value calculation (bnc#1012382).
- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bnc#1012382).
- hwmon: (lm80) fix a missing check of the status of SMBus read (bnc#1012382).
- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (git-fixes).
- hwmon: (pmbus) Fix page count auto-detection (bnc#1012382).
- hwmon: (w83795) temp4_type has writable permission (bnc#1012382).
- hwpoison, memory_hotplug: allow hwpoisoned pages to be offlined (bnc#1116336).
- i2c-axxia: check for error conditions first (bnc#1012382).
- i2c: axxia: properly handle master timeout (bnc#1012382).
- i2c: dev: prevent adapter retries and timeout being set as minus value (bnc#1012382).
- i2c: scmi: Fix probe error on devices with an empty SMB0001 ACPI device node (bnc#1012382).
- IB/core: type promotion bug in rdma_rw_init_one_mr() ().
- IB/hfi1: Fix an out-of-bounds access in get_hw_stats ().
- ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357).
- ibmveth: fix DMA unmap error in ibmveth_xmit_start error path (bnc#1012382).
- ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726).
- ibmvnic: Convert reset work item mutex to spin lock ().
- ibmvnic: fix accelerated VLAN handling ().
- ibmvnic: fix index in release_rx_pools (bsc#1115440).
- ibmvnic: Fix non-atomic memory allocation in IRQ context ().
- ibmvnic: Increase maximum queue size limit (bsc#1121726).
- ibmvnic: Introduce driver limits for ring sizes (bsc#1121726).
- ibmvnic: remove ndo_poll_controller ().
- ibmvnic: Update driver queues after change in ring size support ().
- ib/rxe: Fix incorrect cache cleanup in error flow ().
- ib/rxe: replace kvfree with vfree ().
- ib/ucm: Fix Spectre v1 vulnerability (bnc#1012382).
- ide: pmac: add of_node_put() (bnc#1012382).
- ieee802154: lowpan_header_create check must check daddr (bnc#1012382).
- igb: Fix an issue that PME is not enabled during runtime suspend (bnc#1012382).
- igb: Remove superfluous reset to PHY and page 0 selection (bnc#1012382).
- iio: adc: at91: fix acking DRDY irq on simple conversions (bnc#1012382).
- iio: adc: at91: fix wrong channel number in triggered buffer mode (bnc#1012382).
- ima: fix showing large 'violations' or 'runtime_measurements_count' (bnc#1012382).
- inet: frags: add a pointer to struct netns_frags (bnc#1012382).
- inet: frags: better deal with smp races (bnc#1012382).
- inet: frags: break the 2GB limit for frags storage (bnc#1012382).
- inet: frags: change inet_frags_init_net() return value (bnc#1012382).
- inet: frags: do not clone skb in ip_expire() (bnc#1012382).
- inet: frags: fix ip6frag_low_thresh boundary (bnc#1012382).
- inet: frags: get rid of ipfrag_skb_cb/FRAG_CB (bnc#1012382).
- inet: frags: get rif of inet_frag_evicting() (bnc#1012382).
- inet: frags: refactor ipfrag_init() (bnc#1012382).
- inet: frags: refactor ipv6_frag_init() (bnc#1012382).
- inet: frags: refactor lowpan_net_frag_init() (bnc#1012382).
- inet: frags: remove inet_frag_maybe_warn_overflow() (bnc#1012382).
- inet: frags: remove some helpers (bnc#1012382).
- inet: frags: reorganize struct netns_frags (bnc#1012382).
- inet: frags: use rhashtables for reassembly units (bnc#1012382).
- Input: bma150 - register input device after setting private data (bnc#1012382).
- Input: elan_i2c - add ACPI ID for Lenovo IdeaPad 330-15ARR (bnc#1012382).
- Input: elan_i2c - add ACPI ID for Lenovo IdeaPad 330-15IGM (bnc#1012382).
- Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G (bnc#1012382).
- Input: elan_i2c - add ACPI ID for touchpad in Lenovo V330-15ISK (bnc#1012382).
- Input: elan_i2c - add ELAN0620 to the ACPI table (bnc#1012382).
- Input: elan_i2c - add support for ELAN0621 touchpad (bnc#1012382).
- Input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bnc#1012382).
- Input: matrix_keypad - check for errors from of_get_named_gpio() (bnc#1012382).
- Input: omap-keypad - fix idle configuration to not block SoC idle states (bnc#1012382).
- Input: omap-keypad - fix keyboard debounce configuration (bnc#1012382).
- Input: restore EV_ABS ABS_RESERVED (bnc#1012382).
- Input: xpad - add GPD Win 2 Controller USB IDs (bnc#1012382).
- Input: xpad - add Mad Catz FightStick TE 2 VID/PID (bnc#1012382).
- Input: xpad - add more third-party controllers (bnc#1012382).
- Input: xpad - add PDP device id 0x02a4 (bnc#1012382).
- Input: xpad - add product ID for Xbox One S pad (bnc#1012382).
- Input: xpad - add support for PDP Xbox One controllers (bnc#1012382).
- Input: xpad - add support for SteelSeries Stratus Duo (bnc#1012382).
- Input: xpad - add support for Xbox1 PDP Camo series gamepad (bnc#1012382).
- Input: xpad - add USB IDs for Mad Catz Brawlstick and Razer Sabertooth (bnc#1012382).
- Input: xpad - avoid using __set_bit() for capabilities (bnc#1012382).
- Input: xpad - constify usb_device_id (bnc#1012382).
- Input: xpad - correctly sort vendor id's (bnc#1012382).
- Input: xpad - correct xbox one pad device name (bnc#1012382).
- Input: xpad - do not depend on endpoint order (bnc#1012382).
- Input: xpad - fix GPD Win 2 controller name (bnc#1012382).
- Input: xpad - fix PowerA init quirk for some gamepad models (bnc#1012382).
- Input: xpad - fix rumble on Xbox One controllers with 2015 firmware (bnc#1012382).
- Input: xpad - fix some coding style issues (bnc#1012382).
- Input: xpad - fix stuck mode button on Xbox One S pad (bnc#1012382).
- Input: xpad - fix Xbox One rumble stopping after 2.5 secs (bnc#1012382).
- Input: xpad - handle 'present' and 'gone' correctly (bnc#1012382).
- Input: xpad - move reporting xbox one home button to common function (bnc#1012382).
- Input: xpad - power off wireless 360 controllers on suspend (bnc#1012382).
- Input: xpad - prevent spurious input from wired Xbox 360 controllers (bnc#1012382).
- Input: xpad - quirk all PDP Xbox One gamepads (bnc#1012382).
- Input: xpad - remove spurious events of wireless xpad 360 controller (bnc#1012382).
- Input: xpad - remove unused function (bnc#1012382).
- Input: xpad - restore LED state after device resume (bnc#1012382).
- Input: xpad - simplify error condition in init_output (bnc#1012382).
- Input: xpad - sort supported devices by USB ID (bnc#1012382).
- Input: xpad - support some quirky Xbox One pads (bnc#1012382).
- Input: xpad - sync supported devices with 360Controller (bnc#1012382).
- Input: xpad - sync supported devices with XBCD (bnc#1012382).
- Input: xpad - sync supported devices with xboxdrv (bnc#1012382).
- Input: xpad - update Xbox One Force Feedback Support (bnc#1012382).
- Input: xpad - use LED API when identifying wireless controllers (bnc#1012382).
- Input: xpad - validate USB endpoint type during probe (bnc#1012382).
- Input: xpad - workaround dead irq_out after suspend/ resume (bnc#1012382).
- Input: xpad - xbox one elite controller support (bnc#1012382).
- intel_pstate: Update frequencies of policy-&gt;cpus only from -&gt;set_policy() (bsc#1120017).
- intel_th: msu: Fix an off-by-one in attribute store (bnc#1012382).
- iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105).
- iommu/amd: Fix amd_iommu=force_isolation (bsc#1106105).
- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).
- iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105).
- iommu/arm-smmu: Ensure that page-table updates are visible before TLBI (bsc#1106237).
- iommu/arm-smmu-v3: Use explicit mb() when moving cons pointer (bnc#1012382).
- iommu/ipmmu-vmsa: Fix crash on early domain free (bsc#1106105).
- iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105).
- iommu/vt-d: Fix NULL pointer dereference in prq_event_thread() (bsc#1106105).
- iommu/vt-d: Handle domain agaw being less than iommu agaw (bsc#1106105).
- iommu/vt-d: Use memunmap to free memremap (bsc#1106105).
- ip6mr: Fix potential Spectre v1 vulnerability (bnc#1012382).
- ip: add helpers to process in-order fragments faster (bnc#1012382).
- ipfrag: really prevent allocation on netns exit (bnc#1012382).
- ip: frags: fix crash in ip_do_fragment() (bnc#1012382).
- ipmi: Fix timer race with module unload (bnc#1012382).
- ipmi:ssif: Fix handling of multi-part return messages (bnc#1012382).
- ip: on queued skb use skb_header_pointer instead of pskb_may_pull (bnc#1012382).
- ip: process in-order fragments efficiently (bnc#1012382).
- ip_tunnel: do not force DF when MTU is locked (bnc#1012382).
- ip_tunnel: Fix name string concatenate in __ip_tunnel_create() (bnc#1012382).
- ip: use rb trees for IP frag queue (bnc#1012382).
- ipv4: Fix potential Spectre v1 vulnerability (bnc#1012382).
- ipv4: frags: precedence bug in ip_expire() (bnc#1012382).
- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (bsc#1110286).
- ipv6: Check available headroom in ip6_xmit() even without options (bnc#1012382).
- ipv6: Consider sk_bound_dev_if when binding a socket to an address (bnc#1012382).
- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (bnc#1012382).
- ipv6: explicitly initialize udp6_addr in udp_sock_create6() (bnc#1012382).
- ipv6: fix kernel-infoleak in ipv6_local_error() (bnc#1012382).
- ipv6: Fix PMTU updates for UDP/raw sockets in presence of VRF (bnc#1012382).
- ipv6: frags: rewrite ip6_expire_frag_queue() (bnc#1012382).
- ipv6: mcast: fix a use-after-free in inet6_mc_check (bnc#1012382).
- ipv6/ndisc: Preserve IPv6 control buffer if protocol error handlers are called (bnc#1012382).
- ipv6: orphan skbs in reassembly unit (bnc#1012382).
- ipv6: set rt6i_protocol properly in the route when it is installed (bsc#1114190).
- ipv6: suppress sparse warnings in IP6_ECN_set_ce() (bnc#1012382).
- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (bnc#1012382).
- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bnc#1012382).
- isdn: fix kernel-infoleak in capi_unlocked_ioctl (bnc#1012382).
- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bnc#1012382).
- iser: set sector for ambiguous mr status errors (bnc#1012382).
- iwlwifi: mvm: fix regulatory domain update when the firmware starts (bnc#1012382).
- iwlwifi: mvm: support sta_statistics() even on older firmware (bnc#1012382).
- ixgbe: Add function for checking to see if we can reuse page (bsc#1100105).
- ixgbe: Add support for build_skb (bsc#1100105).
- ixgbe: Add support for padding packet (bsc#1100105).
- ixgbe: Break out Rx buffer page management (bsc#1100105).
- ixgbe: Fix output from ixgbe_dump (bsc#1100105).
- ixgbe: fix possible race in reset subtask (bsc#1101557).
- ixgbe: Make use of order 1 pages and 3K buffers independent of FCoE (bsc#1100105).
- ixgbe: Only DMA sync frame length (bsc#1100105).
- ixgbe: recognize 1000BaseLX SFP modules as 1Gbps (bnc#1012382).
- ixgbe: Refactor queue disable logic to take completion time into account (bsc#1101557).
- ixgbe: Reorder Tx/Rx shutdown to reduce time needed to stop device (bsc#1101557).
- ixgbe: Update code to better handle incrementing page count (bsc#1100105).
- ixgbe: Update driver to make use of DMA attributes in Rx path (bsc#1100105).
- ixgbe: Use length to determine if descriptor is done (bsc#1100105).
- jbd2: fix use after free in jbd2_log_do_checkpoint() (bnc#1012382).
- jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bnc#1012382).
- jffs2: free jffs2_sb_info through jffs2_kill_sb() (bnc#1012382).
- kabi: hwpoison, memory_hotplug: allow hwpoisoned pages to be offlined (bnc#1116336).
- kabi: protect get_vaddr_frames (kabi).
- kabi: protect linux/kfifo.h include in hid-debug (kabi).
- kabi: protect struct azx (kabi).
- kabi: protect struct cfs_bandwidth (kabi).
- kabi: protect struct esp (kabi).
- kabi: protect struct fuse_io_priv (kabi).
- kabi: protect struct hda_bus (kabi).
- kabi: protect __usb_get_extra_descriptor (kabi).
- kabi: protect xen/xen-ops.h include in xlate_mmu.c (kabi).
- kabi: reorder new slabinfo fields in struct kmem_cache_node (bnc#1116653).
- kabi: revert sig change on pnfs_read_resend_pnfs (git-fixes).
- kaweth: use skb_cow_head() to deal with cloned skbs (bnc#1012382).
- kbuild: Add better clang cross build support (bnc#1012382).
- kbuild: Add __cc-option macro (bnc#1012382).
- kbuild: Add support to generate LLVM assembly files (bnc#1012382).
- kbuild: allow to use GCC toolchain not in Clang search path (bnc#1012382).
- kbuild: clang: add -no-integrated-as to KBUILD_[AC]FLAGS (bnc#1012382).
- kbuild: clang: Disable 'address-of-packed-member' warning (bnc#1012382).
- kbuild: clang: disable unused variable warnings only when constant (bnc#1012382).
- kbuild: clang: fix build failures with sparse check (bnc#1012382).
- kbuild: clang: remove crufty HOSTCFLAGS (bnc#1012382).
- kbuild: Consolidate header generation from ASM offset information (bnc#1012382).
- kbuild: consolidate redundant sed script ASM offset generation (bnc#1012382).
- kbuild: drop -Wno-unknown-warning-option from clang options (bnc#1012382).
- kbuild: fix asm-offset generation to work with clang (bnc#1012382).
- kbuild: fix kernel/bounds.c 'W=1' warning (bnc#1012382).
- kbuild: fix linker feature test macros when cross compiling with Clang (bnc#1012382).
- kbuild, LLVMLinux: Add -Werror to cc-option to support clang (bnc#1012382).
- kbuild: move cc-option and cc-disable-warning after incl. arch Makefile (bnc#1012382).
- kbuild: Set KBUILD_CFLAGS before incl. arch Makefile (bnc#1012382).
- kbuild: set no-integrated-as before incl. arch Makefile (bnc#1012382).
- kbuild: suppress packed-not-aligned warning for default setting only (bnc#1012382).
- kbuild: use -Oz instead of -Os when using clang (bnc#1012382).
- kconfig: fix file name and line number of warn_ignored_character() (bnc#1012382).
- kconfig: fix memory leak when EOF is encountered in quotation (bnc#1012382).
- kdb: use memmove instead of overlapping memcpy (bnc#1012382).
- kdb: Use strscpy with destination buffer size (bnc#1012382).
- kernel/exit.c: release ptraced tasks before zap_pid_ns_processes (bnc#1012382).
- kernel/hung_task.c: break RCU locks based on jiffies (bnc#1012382).
- kernel-source.spec: Align source numbering.
- kernfs: Replace strncpy with memcpy (bnc#1012382).
- keys: put keyring if install_session_keyring_to_cred() fails (bnc#1012382).
- kgdboc: fix KASAN global-out-of-bounds bug in param_set_kgdboc_var() (bnc#1012382).
- kgdboc: Fix restrict error (bnc#1012382).
- kgdboc: Fix warning with module build (bnc#1012382).
- kgdboc: Passing ekgdboc to command line causes panic (bnc#1012382).
- kobject: Replace strncpy with memcpy (bnc#1012382).
- kprobes: Return error if we fail to reuse kprobe instead of BUG_ON() (bnc#1012382).
- kvm/arm64: Fix caching of host MDCR_EL2 value (bsc#1121242).
- kvm/arm: Restore banked registers and physical timer access on hyp_panic() (bsc#1121240).
- kvm/mmu: Fix race in emulated page table writes (bnc#1012382).
- kvm/nvmx: Always reflect #NM VM-exits to L1 (bsc#1106240).
- kvm/nvmx: Eliminate vmcs02 pool (bnc#1012382).
- kvm/nvmx: mark vmcs12 pages dirty on L2 exit (bnc#1012382).
- kvm/ppc: Move and undef TRACE_INCLUDE_PATH/FILE (bnc#1012382).
- kvm/svm: Allow direct access to MSR_IA32_SPEC_CTRL (bnc#1012382 bsc#1068032).
- kvm/svm: Ensure an IBPB on all affected CPUs when freeing a vmcb (bsc#1114648).
- kvm/vmx: Allow direct access to MSR_IA32_SPEC_CTRL (bnc#1012382 bsc#1068032 bsc#1096242 bsc#1096281).
- kvm/vmx: Emulate MSR_IA32_ARCH_CAPABILITIES (bnc#1012382).
- kvm/vmx: Fix x2apic check in vmx_msr_bitmap_mode() (bsc#1124166).
- kvm/vmx: introduce alloc_loaded_vmcs (bnc#1012382).
- kvm/vmx: make MSR bitmaps per-VCPU (bnc#1012382).
- kvm/vmx: Missing part of upstream commit 904e14fb7cb9 (bsc#1124166).
- kvm/x86: Add IBPB support (bnc#1012382 bsc#1068032 bsc#1068032).
- kvm/x86: fix empty-body warnings (bnc#1012382).
- kvm/x86: Fix single-step debugging (bnc#1012382).
- kvm/x86: Remove indirect MSR op calls from SPEC_CTRL (bnc#1012382).
- kvm/x86: svm: report MSR_IA32_MCG_EXT_CTL as unsupported (bnc#1012382).
- kvm/x86: Use jmp to invoke kvm_spurious_fault() from .fixup (bnc#1012382).
- l2tp: copy 4 more bytes to linear part if necessary (bnc#1012382).
- l2tp: fix reading optional fields of L2TPv3 (bnc#1012382).
- l2tp: remove l2specific_len dependency in l2tp_core (bnc#1012382).
- lan78xx: Check for supported Wake-on-LAN modes (bnc#1012382).
- leds: call led_pwm_set() in leds-pwm to enforce default LED_OFF (bnc#1012382).
- leds: leds-gpio: Fix return value check in create_gpio_led() (bnc#1012382).
- leds: turn off the LED and wait for completion on unregistering LED class device (bnc#1012382).
- libata: whitelist all SAMSUNG MZ7KM* solid-state disks (bnc#1012382).
- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125810).
- libceph: bump CEPH_MSG_MAX_DATA_LEN (bsc#1114839).
- libceph: fall back to sendmsg for slab pages (bsc#1118316).
- libfc: sync strings with upstream versions (bsc#1114763).
- lib/interval_tree_test.c: allow full tree search (bnc#1012382).
- lib/interval_tree_test.c: allow users to limit scope of endpoint (bnc#1012382).
- lib/interval_tree_test.c: make test options module parameters (bnc#1012382).
- libnvdimm, {btt, blk}: do integrity setup before add_disk() (bsc#1118926).
- libnvdimm, dimm: fix dpa reservation vs uninitialized label area (bsc#1118936).
- libnvdimm: fix ars_status output length calculation (bsc#1124777).
- libnvdimm: fix integer overflow static analysis warning (bsc#1118922).
- libnvdimm: fix nvdimm_bus_lock() vs device_lock() ordering (bsc#1118915).
- libnvdimm: Hold reference on parent while scheduling async init (bnc#1012382).
- libnvdimm, pfn: Pad pfn namespaces relative to other regions (bsc#1124811).
- libnvdimm: Use max contiguous area for namespace size (bsc#1124780).
- lib/raid6: Fix arm64 test build (bnc#1012382).
- lib/rbtree_test.c: make input module parameters (bnc#1012382).
- lib/rbtree-test: lower default params (bnc#1012382).
- llc: do not use sk_eat_skb() (bnc#1012382).
- lockd: fix access beyond unterminated strings in prints (bnc#1012382).
- locking/lockdep: Fix debug_locks off performance problem (bnc#1012382).
- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).
- loop: Fix double mutex_unlock(&amp;loop_ctl_mutex) in loop_control_ioctl() (bnc#1012382).
- loop: Fold __loop_release into loop_release (bnc#1012382).
- loop: Get rid of loop_index_mutex (bnc#1012382).
- lsm: Check for NULL cred-security on free (bnc#1012382).
- mac80211: Always report TX status (bnc#1012382).
- mac80211: Clear beacon_int in ieee80211_do_stop (bnc#1012382).
- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bnc#1012382).
- mac80211: fix radiotap vendor presence bitmap handling (bnc#1012382).
- mac80211: fix reordering of buffered broadcast packets (bnc#1012382).
- mac80211_hwsim: do not omit multicast announce of first added radio (bnc#1012382).
- mac80211_hwsim: fix module init error paths for netlink (bnc#1012382).
- mac80211_hwsim: Timer should be initialized before device registered (bnc#1012382).
- mac80211: ignore NullFunc frames in the duplicate detection (bnc#1012382).
- mac80211: ignore tx status for PS stations in ieee80211_tx_status_ext (bnc#1012382).
- mach64: fix display corruption on big endian machines (bnc#1012382).
- mach64: fix image corruption due to reading accelerator registers (bnc#1012382).
- matroxfb: fix size of memcpy (bnc#1012382).
- md: batch flush requests (bsc#1119680).
- md: do not check MD_SB_CHANGE_CLEAN in md_allow_write (Git-fixes).
- md: fix invalid stored role for a disk (bnc#1012382).
- md: fix invalid stored role for a disk - try2 (bnc#1012382).
- md: reorder flag_bits to match upstream commits
- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bnc#1012382).
- media: dvb-frontends: fix i2c access helpers for KASAN (bnc#1012382).
- media: em28xx: fix input name for Terratec AV 350 (bnc#1012382).
- media: em28xx: Fix misplaced reset of dev-&gt;v4l::field_count (bnc#1012382).
- media: em28xx: Fix use-after-free when disconnecting (bnc#1012382).
- media: em28xx: make v4l2-compliance happier by starting sequence on zero (bnc#1012382).
- media: em28xx: use a default format if TRY_FMT fails (bnc#1012382).
- media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bnc#1012382).
- media: pci: cx23885: handle adding to list failure (bnc#1012382).
- media: tvp5150: fix width alignment during set_selection() (bnc#1012382).
- media: v4l: event: Add subscription to list before calling 'add' operation (bnc#1012382).
- media: vb2: be sure to unlock mutex on errors (bnc#1012382).
- media: vb2: vb2_mmap: move lock up (bnc#1012382).
- media: vivid: fix error handling of kthread_run (bnc#1012382).
- media: vivid: free bitmap_cap when updating std/timings/etc (bnc#1012382).
- media: vivid: set min width/height to a value &gt; 0 (bnc#1012382).
- memstick: Prevent memstick host from getting runtime suspended during card detection (bnc#1012382).
- mfd: tps6586x: Handle interrupts on suspend (bnc#1012382).
- mips: bpf: fix encoding bug for mm_srlv32_op (bnc#1012382).
- mips: cm: reprime error cause (bnc#1012382).
- mips: fix n32 compat_ipc_parse_version (bnc#1012382).
- mips: OCTEON: do not set octeon_dma_bar_type if PCI is disabled (bnc#1012382).
- mips: SiByte: Enable swiotlb for SWARM, LittleSur and BigSur (bnc#1012382).
- mips: VDSO: Include $(ccflags-vdso) in o32,n32 .lds builds (bnc#1012382).
- misc: atmel-ssc: Fix section annotation on atmel_ssc_get_driver_data (bnc#1012382).
- misc: mic/scif: fix copy-paste error in scif_create_remote_lookup (bnc#1012382).
- misc: vexpress: Off by one in vexpress_syscfg_exec() (bnc#1012382).
- mmc: atmel-mci: do not assume idle after atmci_request_end (bnc#1012382).
- mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1120902).
- mmc: core: Reset HPI enabled state during re-init and in case of errors (bnc#1012382).
- mm: cleancache: fix corruption on missed inode invalidation (bnc#1012382).
- mmc: OMAP: fix broken MMC on OMAP15XX/OMAP5910/OMAP310 (bnc#1012382).
- mmc: omap_hsmmc: fix DMA API warning (bnc#1012382).
- mmc: sdhci-iproc: handle mmc_of_parse() errors during probe (bnc#1012382).
- mmc: sdhci-pci-o2micro: Add quirk for O2 Micro dev 0x8620 rev 0x01 (bnc#1012382).
- mm, devm_memremap_pages: kill mapping 'System RAM' support (bnc#1012382).
- mm: do not bug_on on incorrect length in __mm_populate() (bnc#1012382).
- mm: do not miss the last page because of round-off error (bnc#1118798).
- mm, elf: handle vm_brk error (bnc#1012382).
- mm, hugetlb: fix huge_pte_alloc BUG_ON (bsc#1119204).
- mm: hwpoison: call shake_page() after try_to_unmap() for mlocked page (bnc#1116336).
- mm: lower the printk loglevel for __dump_page messages (generic hotplug debugability).
- mm, memory_hotplug: be more verbose for memory offline failures (generic hotplug debugability).
- mm, memory_hotplug: drop pointless block alignment checks from __offline_pages (generic hotplug debugability).
- mm, memory_hotplug: print reason for the offlining failure (generic hotplug debugability).
- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (bnc#1012382).
- mm: migration: fix migration of huge PMD shared pages (bnc#1012382).
- mm: mlock: avoid increase mm-&gt;locked_vm on mlock() when already mlock2(,MLOCK_ONFAULT) (bnc#1012382).
- mm/nommu.c: Switch __get_user_pages_unlocked() to use __get_user_pages() (bnc#1012382).
- mm: only report isolation failures when offlining memory (generic hotplug debugability).
- mm, oom: fix use-after-free in oom_kill_process (bnc#1012382).
- mm, page_alloc: drop should_suppress_show_mem (bnc#1125892, bnc#1106061).
- mm/page-writeback.c: do not break integrity writeback on -&gt;writepage() error (bnc#1012382).
- mm: Preserve _PAGE_DEVMAP across mprotect() calls (bsc#1118790).
- mm: print more information about mapping in __dump_page (generic hotplug debugability).
- mm, proc: be more verbose about unstable VMA flags in /proc/&amp;lt;pid&gt;/smaps (bnc#1012382).
- mm: put_and_wait_on_page_locked() while page is migrated (bnc#1109272).
- mm: refuse wrapped vm_brk requests (bnc#1012382).
- mm: remove write/force parameters from __get_user_pages_locked() (bnc#1012382 bsc#1027260).
- mm: remove write/force parameters from __get_user_pages_unlocked() (bnc#1012382 bsc#1027260).
- mm: replace __access_remote_vm() write parameter with gup_flags (bnc#1012382).
- mm: replace access_remote_vm() write parameter with gup_flags (bnc#1012382).
- mm: replace get_user_pages_locked() write/force parameters with gup_flags (bnc#1012382 bsc#1027260).
- mm: replace get_user_pages_unlocked() write/force parameters with gup_flags (bnc#1012382 bsc#1027260).
- mm: replace get_user_pages() write/force parameters with gup_flags (bnc#1012382 bsc#1027260).
- mm: replace get_vaddr_frames() write/force parameters with gup_flags (bnc#1012382).
- mm, slab: faster active and free stats (bsc#1116653, VM Performance).
- mm/slab: improve performance of gathering slabinfo stats (bsc#1116653, VM Performance).
- mm, slab: maintain total slab count instead of active count (bsc#1116653, VM Performance).
- mm: thp: relax __GFP_THISNODE for MADV_HUGEPAGE mappings (bnc#1012382).
- modpost: validate symbol names also in find_elf_symbol (bnc#1012382).
- modules: mark __inittest/__exittest as __maybe_unused (bnc#1012382).
- mount: Do not allow copying MNT_UNBINDABLE|MNT_LOCKED mounts (bnc#1012382).
- mount: Prevent MNT_DETACH from disconnecting locked mounts (bnc#1012382).
- mount: Retest MNT_LOCKED in do_umount (bnc#1012382).
- Move patches to sorted range, p1
- Move /proc/sys/vm/procfs-drop-fd-dentries to /proc/sys/fs/procfs-drop-fd-dentries (bsc#1086652) This was incorrectly put in /proc/sys/vm.
- msi: Disable MSI also when pcie-octeon.pcie_disable on (bnc#1012382).
- mtd: docg3: do not set conflicting BCH_CONST_PARAMS option (bnc#1012382).
- mtd: rawnand: gpmi: fix MX28 bus master lockup problem (bnc#1012382).
- mtd: spi-nor: Add support for is25wp series chips (bnc#1012382).
- mv88e6060: disable hardware level MAC learning (bnc#1012382).
- mwifiex: Fix NULL pointer dereference in skb_dequeue() (bnc#1012382).
- mwifiex: fix p2p device does not find in scan problem (bnc#1012382).
- namei: allow restricted O_CREAT of FIFOs and regular files (bnc#1012382).
- neighbour: Avoid writing before skb-&gt;head in neigh_hh_output() (bnc#1012382).
- net: 8139cp: fix a BUG triggered by changing mtu with network traffic (bnc#1012382).
- net/af_iucv: drop inbound packets with invalid flags (bnc#1114475, LTC#172679).
- net/af_iucv: fix skb handling on HiperTransport xmit error (bnc#1114475, LTC#172679).
- net: amd: add missing of_node_put() (bnc#1012382).
- net: bcmgenet: fix OF child-node lookup (bnc#1012382).
- net: bridge: fix a bug on using a neighbour cache entry without checking its state (bnc#1012382).
- net: bridge: Fix ethernet header pointer before check skb forwardable (bnc#1012382).
- net: bridge: remove ipv6 zero address check in mcast queries (bnc#1012382).
- net: call sk_dst_reset when set SO_DONTROUTE (bnc#1012382).
- net: cxgb3_main: fix a missing-check bug (bnc#1012382).
- net: dp83640: expire old TX-skb (bnc#1012382).
- net: drop skb on failure in ip_check_defrag() (bnc#1012382).
- net: drop write-only stack variable (bnc#1012382).
- net: dsa: slave: Do not propagate flag changes on down slave interfaces (bnc#1012382).
- net: ena: add functions for handling Low Latency Queues in ena_com (bsc#1117562).
- net: ena: add functions for handling Low Latency Queues in ena_netdev (bsc#1117562).
- net: ena: change rx copybreak default to reduce kernel memory pressure (bsc#1117562).
- net: ena: complete host info to match latest ENA spec (bsc#1117562).
- net: ena: enable Low Latency Queues (bsc#1117562).
- net: ena: explicit casting and initialization, and clearer error handling (bsc#1117562).
- net: ena: fix auto casting to boolean (bsc#1117562).
- net: ena: fix compilation error in xtensa architecture (bsc#1117562).
- net: ena: fix crash during ena_remove() (bsc#1108240).
- net: ena: fix crash during failed resume from hibernation (bsc#1117562).
- net: ena: fix indentations in ena_defs for better readability (bsc#1117562).
- net: ena: Fix Kconfig dependency on X86 (bsc#1117562).
- net: ena: fix NULL dereference due to untimely napi initialization (bsc#1117562).
- net: ena: fix rare bug when failed restart/resume is followed by driver removal (bsc#1117562).
- net: ena: fix warning in rmmod caused by double iounmap (bsc#1117562).
- net: ena: introduce Low Latency Queues data structures according to ENA spec (bsc#1117562).
- net: ena: limit refill Rx threshold to 256 to avoid latency issues (bsc#1117562).
- net: ena: minor performance improvement (bsc#1117562).
- net: ena: remove ndo_poll_controller (bsc#1117562).
- net: ena: remove redundant parameter in ena_com_admin_init() (bsc#1117562).
- net: ena: update driver version from 2.0.1 to 2.0.2 (bsc#1108240).
- net: ena: update driver version to 2.0.1 (bsc#1117562).
- net: ena: use CSUM_CHECKED device indication to report skb's checksum status (bsc#1117562).
- net: faraday: ftmac100: remove netif_running(netdev) check before disabling interrupts (bnc#1012382).
- netfilter: ipset: actually allow allowable CIDR 0 in hash:net,port,net (bnc#1012382).
- netfilter: ipset: Correct rcu_dereference() call in ip_set_put_comment() (bnc#1012382).
- netfilter: nf_tables: fix oops when inserting an element into a verdict map (bnc#1012382).
- netfilter: xt_IDLETIMER: add sysfs filename checking routine (bnc#1012382).
- net: fix pskb_trim_rcsum_slow() with odd trim offset (bnc#1012382).
- net: Fix usage of pskb_trim_rcsum (bnc#1012382).
- net-gro: reset skb-&gt;pkt_type in napi_reuse_skb() (bnc#1012382).
- net: hisilicon: remove unexpected free_netdev (bnc#1012382).
- net: ibm: fix return type of ndo_start_xmit function ().
- net/ibmnvic: Fix deadlock problem in reset ().
- net/ibmvnic: Fix RTNL deadlock during device reset (bnc#1115431).
- net: ieee802154: 6lowpan: fix frag reassembly (bnc#1012382).
- net/ipv4: defensive cipso option parsing (bnc#1012382).
- net: ipv4: do not handle duplicate fragments as overlapping (bnc#1012382 bsc#1116345).
- net: ipv4: do not handle duplicate fragments as overlapping (bsc#1116345).
- net: ipv4: Fix memory leak in network namespace dismantle (bnc#1012382).
- net/ipv6: Fix index counter for unicast addresses in in6_dump_addrs (bnc#1012382).
- net/mlx4_core: Add masking for a few queries on HCA caps (bnc#1012382).
- net/mlx4_core: Correctly set PFC param if global pause is turned off (bsc#1015336 bsc#1015337 bsc#1015340).
- net/mlx4_core: Fix uninitialized variable compilation warning (bnc#1012382).
- net/mlx4_core: Zero out lkey field in SW2HW_MPT fw command (bnc#1012382).
- net/mlx4: Fix UBSAN warning of signed integer overflow (bnc#1012382).
- net: modify skb_rbtree_purge to return the truesize of all purged skbs (bnc#1012382).
- net: phy: do not allow __set_phy_supported to add unsupported modes (bnc#1012382).
- net: Prevent invalid access to skb-&gt;prev in __qdisc_drop_all (bnc#1012382).
- net: pskb_trim_rcsum() and CHECKSUM_COMPLETE are friends (bnc#1012382).
- net: qla3xxx: Remove overflowing shift statement (bnc#1012382).
- netrom: fix locking in nr_find_socket() (bnc#1012382).
- netrom: switch to sock timer API (bnc#1012382).
- net/rose: fix NULL ax25_cb kernel panic (bnc#1012382).
- net: sched: gred: pass the right attribute to gred_change_table_def() (bnc#1012382).
- net_sched: refetch skb protocol for each filter (bnc#1012382).
- net: socket: fix a missing-check bug (bnc#1012382).
- net: speed up skb_rbtree_purge() (bnc#1012382).
- net: stmmac: Fix stmmac_mdio_reset() when building stmmac as modules (bnc#1012382).
- net: systemport: Fix WoL with password after deep sleep (bnc#1012382).
- net: thunderx: fix NULL pointer dereference in nic_remove (bnc#1012382).
- new helper: uaccess_kernel() (bnc#1012382).
- nfc: nfcmrvl_uart: fix OF child-node lookup (bnc#1012382).
- nfc: nxp-nci: Include unaligned.h instead of access_ok.h (bnc#1012382).
- nfit: fix unchecked dereference in acpi_nfit_ctl (bsc#1125014).
- nfit: skip region registration for incomplete control regions (bsc#1118930).
- nfsd4: fix crash on writing v4_end_grace before nfsd startup (bnc#1012382).
- nfsd: Fix an Oops in free_session() (bnc#1012382).
- nfs: Ensure we commit after writeback is complete (bsc#1111809).
- nfs: nfs_compare_mount_options always compare auth flavors (bnc#1012382).
- nfsv4.1: Fix the r/wsize checking (bnc#1012382).
- nfsv4: Do not exit the state manager without clearing NFS4CLNT_MANAGER_RUNNING (git-fixes).
- niu: fix missing checks of niu_pci_eeprom_read (bnc#1012382).
- nvme: validate controller state before rescheduling keep alive (bsc#1103257).
- ocfs2: do not clear bh uptodate for block read (bnc#1012382).
- ocfs2: fix a misuse a of brelse after failing ocfs2_check_dir_entry (bnc#1012382).
- ocfs2: fix deadlock caused by ocfs2_defrag_extent() (bnc#1012382).
- ocfs2: fix panic due to unrecovered local alloc (bnc#1012382).
- ocfs2: fix potential use after free (bnc#1012382).
- of: add helper to lookup compatible child node (bnc#1012382).
- omap2fb: Fix stack memory disclosure (bsc#1106929)
- openvswitch: Avoid OOB read when parsing flow nlattrs (bnc#1012382).
- packet: Do not leak dev refcounts on error exit (bnc#1012382).
- packet: validate address length (bnc#1012382).
- packet: validate address length if non-zero (bnc#1012382).
- parisc: Fix address in HPMC IVA (bnc#1012382).
- parisc: Fix map_pages() to not overwrite existing pte entries (bnc#1012382).
- pci: Add Device IDs for Intel GPU 'spurious interrupt' quirk (bnc#1012382).
- pci: altera: Check link status before retrain link (bnc#1012382).
- pci: altera: Fix altera_pcie_link_is_up() (bnc#1012382).
- pci: altera: Move retrain from fixup to altera_pcie_host_init() (bnc#1012382).
- pci: altera: Poll for link training status after retraining the link (bnc#1012382).
- pci: altera: Poll for link up status after retraining the link (bnc#1012382).
- pci: altera: Reorder read/write functions (bnc#1012382).
- pci: altera: Rework config accessors for use without a struct pci_bus (bnc#1012382).
- pci/ASPM: Do not initialize link state when aspm_disabled is set (bsc#1109806).
- pci/ASPM: Fix link_state teardown on device removal (bsc#1109806).
- pci: vmd: Detach resources after stopping root bus (bsc#1106105).
- pcmcia: Implement CLKRUN protocol disabling for Ricoh bridges (bnc#1012382).
- perf/bpf: Convert perf_event_array to use struct file (bsc#1119967).
- perf/core: Do not leak event in the syscall error path (bnc#1012382).
- perf/core: Do not WARN() for impossible ring-buffer sizes (bnc#1012382).
- perf/core: Fix impossible ring-buffer sizes warning (bnc#1012382).
- perf intel-pt: Fix error with config term 'pt=0' (bnc#1012382).
- perf parse-events: Fix unchecked usage of strncpy() (bnc#1012382).
- perf pmu: Suppress potential format-truncation warning (bnc#1012382).
- perf/ring_buffer: Prevent concurent ring buffer access (bnc#1012382).
- perf svghelper: Fix unchecked usage of strncpy() (bnc#1012382).
- perf tests evsel-tp-sched: Fix bitwise operator (bnc#1012382).
- perf tools: Add Hygon Dhyana support (bnc#1012382).
- perf tools: Cleanup trace-event-info 'tdata' leak (bnc#1012382).
- perf tools: Disable parallelism for 'make clean' (bnc#1012382).
- perf tools: Free temporary 'sys' string in read_event_files() (bnc#1012382).
- perf unwind: Take pgoff into account when reporting elf to libdwfl (bnc#1012382).
- perf unwind: Unwind with libdw does not take symfs into account (bnc#1012382).
- perf/x86/intel/uncore: Add Node ID mask (bnc#1012382).
- pinctrl: msm: fix gpio-hog related boot issues (bnc#1012382).
- pinctrl: qcom: spmi-mpp: Fix drive strength setting (bnc#1012382).
- pinctrl: qcom: spmi-mpp: Fix err handling of pmic_mpp_set_mux (bnc#1012382).
- pinctrl: spmi-mpp: Fix pmic_mpp_config_get() to be compliant (bnc#1012382).
- pinctrl: ssbi-gpio: Fix pm8xxx_pin_config_get() to be compliant (bnc#1012382).
- pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11 (bnc#1012382).
- platform/x86: acerhdf: Add BIOS entry for Gateway LT31 v1.3307 (bnc#1012382).
- platform/x86: asus-nb-wmi: Drop mapping of 0x33 and 0x34 scan codes (bnc#1012382).
- platform/x86: asus-nb-wmi: Map 0x35 to KEY_SCREENLOCK (bnc#1012382).
- platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bnc#1012382).
- platform/x86: thinkpad_acpi: Proper model/release matching (bsc#1099810).
- pm / devfreq: tegra: fix error return code in tegra_devfreq_probe() (bnc#1012382).
- pNFS: Fix a deadlock between read resends and layoutreturn (git-fixes).
- pNFS/flexfiles: Fix up the ff_layout_write_pagelist failure path (git-fixes).
- pNFS/flexfiles: When checking for available DSes, conditionally check for MDS io (git-fixes).
- pnfs: set NFS_IOHDR_REDO in pnfs_read_resend_pnfs (git-fixes).
- powerpc/64s: consolidate MCE counter increment (bsc#1094244).
- powerpc/boot: Ensure _zimage_start is a weak symbol (bnc#1012382).
- powerpc/boot: Fix random libfdt related build errors (bnc#1012382).
- powerpc/boot: Request no dynamic linker for boot wrapper (bsc#1070805).
- powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695).
- powerpc: Detect the presence of big-cores via 'ibm, thread-groups' (bsc#1109695).
- powerpc: Fix COFF zImage booting on old powermacs (bnc#1012382).
- powerpc: handle RFI (exrfi and fallback area) and STF (exrfi).
- powerpc, hotplug: Avoid to touch non-existent cpumasks (bsc#1109695).
- powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695).
- powerpc/mm/radix: Use mm-&gt;task_size for boundary checking instead of addr_limit (bsc#1027457).
- powerpc/msi: Fix compile error on mpc83xx (bnc#1012382).
- powerpc/msi: Fix NULL pointer access in teardown code (bnc#1012382).
- powerpc/nohash: fix undefined behaviour when testing page size support (bnc#1012382).
- powerpc/numa: Suppress 'VPHN is not supported' messages (bnc#1012382).
- powerpc/powernv: Do not select the cpufreq governors (bsc#1066223).
- powerpc/powernv: Fix opal_event_shutdown() called with interrupts disabled (bsc#1066223).
- powerpc/powernv/pci: Work around races in PCI bridge enabling (bsc#1066223).
- powerpc/pseries: add of_node_put() in dlpar_detach_node() (bnc#1012382).
- powerpc/pseries/cpuidle: Fix preempt warning (bnc#1012382).
- powerpc/pseries: Fix DTL buffer registration (bsc#1066223).
- powerpc/pseries: Fix how we iterate over the DTL entries (bsc#1066223).
- powerpc/pseries/mobility: Extend start/stop topology update scope (bsc#1116950, bsc#1115709).
- powerpc/setup: Add cpu_to_phys_id array (bsc#1109695).
- powerpc/smp: Add cpu_l2_cache_map (bsc#1109695).
- powerpc/smp: Add Power9 scheduler topology (bsc#1109695).
- powerpc/smp: Rework CPU topology construction (bsc#1109695).
- powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695).
- powerpc/traps: restore recoverability of machine_check interrupts (bsc#1094244).
- powerpc/uaccess: fix warning/error with access_ok() (bnc#1012382).
- powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695).
- powerpc/xmon: Fix invocation inside lock region (bsc#1122885).
- power: supply: olpc_battery: correct the temperature units (bnc#1012382).
- printk: Fix panic caused by passing log_buf_len to command line (bnc#1012382).
- proc: Remove empty line in /proc/self/status (bnc#1012382 bsc#1094823).
- Provide a temporary fix for STIBP on-by-default See bsc#1116497 for details.
- pstore: Convert console write to use -&gt;write_buf (bnc#1012382).
- pstore/ram: Do not treat empty buffers as valid (bnc#1012382).
- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bnc#1012382).
- ptp: fix Spectre v1 vulnerability (bnc#1012382).
- pxa168fb: prepare the clock (bnc#1012382).
- qed: Fix bitmap_weight() check (bsc#1019695).
- qed: Fix PTT leak in qed_drain() (bnc#1012382).
- qed: Fix QM getters to always return a valid pq (bsc#1019695 ).
- qed: Fix reading wrong value in loop condition (bnc#1012382).
- r8152: Check for supported Wake-on-LAN Modes (bnc#1012382).
- r8169: Add support for new Realtek Ethernet (bnc#1012382).
- r8169: fix NAPI handling under high load (bnc#1012382).
- rapidio/rionet: do not free skb before reading its length (bnc#1012382).
- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125808).
- rcu: Force boolean subscript for expedited stall warnings (bnc#1012382).
- RDMA/bnxt_re: Fix a couple off by one bugs (bsc#1020413, ).
- RDMA/bnxt_re: Synchronize destroy_qp with poll_cq (bsc#1125446).
- RDMA/ucma: Fix Spectre v1 vulnerability (bnc#1012382).
- Refresh patches.kabi/x86-cpufeature-preserve-numbers.patch. (bsc#1122651)
- reiserfs: propagate errors from fill_with_dentries() properly (bnc#1012382).
- Revert 'Bluetooth: h5: Fix missing dependency on BT_HCIUART_SERDEV' (bnc#1012382).
- Revert 'ceph: fix dentry leak in splice_dentry()' (bsc#1114839).
- Revert 'cifs: In Kconfig CONFIG_CIFS_POSIX needs depends on legacy (insecure cifs)' (bnc#1012382).
- Revert 'drm/rockchip: Allow driver to be shutdown on reboot/kexec' (bsc#1106929)
- Revert 'exec: load_script: do not blindly truncate shebang string' (bnc#1012382).
- Revert 'Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G' (bnc#1012382).
- Revert 'iommu/io-pgtable-arm: Check for v7s-incapable systems' (bsc#1106105).
- Revert 'loop: Fix double mutex_unlock(&amp;loop_ctl_mutex) in loop_control_ioctl()' (bnc#1012382).
- Revert 'loop: Fold __loop_release into loop_release' (bnc#1012382).
- Revert 'loop: Get rid of loop_index_mutex' (bnc#1012382).
- Revert 'media: videobuf2-core: do not call memop 'finish' when queueing' (bnc#1012382).
- Revert 'mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1120902).' The backport patch does not built properly.
- Revert 'PCI/ASPM: Do not initialize link state when aspm_disabled is set' (bsc#1106105).
- Revert 'usb: musb: musb_host: Enable HCD_BH flag to handle urb return in bottom half' (bsc#1047487).
- Revert 'wlcore: Add missing PM call for wlcore_cmd_wait_for_event_or_timeout()' (bnc#1012382).
- rhashtable: Add rhashtable_lookup() (bnc#1012382).
- rhashtable: add rhashtable_lookup_get_insert_key() (bnc#1012382 bsc#1042286).
- rhashtable: add schedule points (bnc#1012382).
- rhashtable: reorganize struct rhashtable layout (bnc#1012382).
- rocker: fix rocker_tlv_put_* functions for KASAN (bnc#1012382).
- rpcrdma: Add RPCRDMA_HDRLEN_ERR (git-fixes).
- rps: flow_dissector: Fix uninitialized flow_keys used in __skb_get_hash possibly (bsc#1042286 bsc#1108145).
- rtc: hctosys: Add missing range error reporting (bnc#1012382).
- rtc: snvs: add a missing write sync (bnc#1012382).
- rtc: snvs: Add timeouts to avoid kernel lockups (bnc#1012382).
- rtnetlink: Disallow FDB configuration for non-Ethernet device (bnc#1012382).
- rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices (bnc#1012382).
- s390/cpum_cf: Reject request for sampling in event initialization (bnc#1012382).
- s390/early: improve machine detection (bnc#1012382).
- s390/mm: Check for valid vma before zapping in gmap_discard (bnc#1012382).
- s390/mm: Fix ERROR: '__node_distance' undefined! (bnc#1012382).
- s390: qeth_core_mpc: Use ARRAY_SIZE instead of reimplementing its function (bnc#1114475, LTC#172682).
- s390/qeth: fix HiperSockets sniffer (bnc#1114475, LTC#172953).
- s390/qeth: fix length check in SNMP processing (bnc#1012382).
- s390: qeth: Fix potential array overrun in cmd/rc lookup (bnc#1114475, LTC#172682).
- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (bnc#1012382).
- s390/smp: fix CPU hotplug deadlock with CPU rescan (bnc#1012382).
- s390/vdso: add missing FORCE to build targets (bnc#1012382).
- sata_rcar: fix deferred probing (bnc#1012382).
- sbus: char: add of_node_put() (bnc#1012382).
- sc16is7xx: Fix for multi-channel stall (bnc#1012382).
- sched/cgroup: Fix cgroup entity load tracking tear-down (bnc#1012382).
- sched/fair: Fix throttle_list starvation with low CFS quota (bnc#1012382).
- sched/wake_q: Document wake_q_add() (bsc#1050549).
- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).
- sched/wake_q: Reduce reference counting for special users (bsc#1050549).
- sch_red: update backlog as well (bnc#1012382).
- scripts/decode_stacktrace: only strip base path when a prefix of the path (bnc#1012382).
- scripts/git_sort/git_sort.py: Add mkp/scsi 5.0/scsi-fixes
- scsi: aacraid: Fix typo in blink status (bnc#1012382).
- scsi: bfa: convert to strlcpy/strlcat (bnc#1012382 bsc#1019683, ).
- scsi: bnx2fc: Fix NULL dereference in error handling (bnc#1012382).
- scsi: core: Allow state transitions from OFFLINE to BLOCKED (bsc#1112246).
- scsi: Create two versions of scsi_internal_device_unblock() (bsc#1119877).
- scsi: csiostor: Avoid content leaks and casts (bnc#1012382).
- scsi: esp_scsi: Track residual for PIO transfers (bnc#1012382).
- scsi: Introduce scsi_start_queue() (bsc#1119877).
- scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1103624, bsc#1104731).
- scsi: libfc: retry PRLI if we cannot analyse the payload (bsc#1104731).
- scsi: libiscsi: Fix NULL pointer dereference in iscsi_eh_session_reset (bnc#1012382).
- scsi: lpfc: Add Buffer overflow check, when nvme_info larger than PAGE_SIZE (bsc#1102660).
- scsi: lpfc: Correct LCB RJT handling (bnc#1012382).
- scsi: lpfc: Correct MDS diag and nvmet configuration (bsc#1125796).
- scsi: lpfc: Correct soft lockup when running mds diagnostics (bnc#1012382).
- scsi: lpfc: devloss timeout race condition caused null pointer reference (bsc#1102660).
- scsi: lpfc: Fix abort error path for NVMET (bsc#1102660).
- scsi: lpfc: fix block guard enablement on SLI3 adapters (bsc#1079935).
- scsi: lpfc: Fix driver crash when re-registering NVME rports (bsc#1102660).
- scsi: lpfc: Fix ELS abort on SLI-3 adapters (bsc#1102660).
- scsi: lpfc: Fix list corruption on the completion queue (bsc#1102660).
- scsi: lpfc: Fix NVME Target crash in defer rcv logic (bsc#1102660).
- scsi: lpfc: Fix panic if driver unloaded when port is offline (bsc#1102660).
- scsi: lpfc: update driver version to 11.4.0.7-5 (bsc#1102660).
- scsi: Make __scsi_remove_device go straight from BLOCKED to DEL (bsc#1119877).
- scsi: megaraid: fix out-of-bound array accesses (bnc#1012382).
- scsi: megaraid_sas: fix a missing-check bug (bnc#1012382).
- scsi: mpt3sas: Add an I/O barrier (bsc#1117108).
- scsi: mpt3sas: Added support for nvme encapsulated request message (bsc#1117108).
- scsi: mpt3sas: Added support for SAS Device Discovery Error Event (bsc#1117108).
- scsi: mpt3sas: Adding support for SAS3616 HBA device (bsc#1117108).
- scsi: mpt3sas: Add ioc_&lt;level&gt; logging macros (bsc#1117108).
- scsi: mpt3sas: Add nvme device support in slave alloc, target alloc and probe (bsc#1117108).
- scsi: mpt3sas: Add PCI device ID for Andromeda (bsc#1117108).
- scsi: mpt3sas: Add-Task-management-debug-info-for-NVMe-drives (bsc#1117108).
- scsi: mpt3sas: Allow processing of events during driver unload (bsc#1117108).
- scsi: mpt3sas: always use first reserved smid for ioctl passthrough (bsc#1117108).
- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).
- scsi: mpt3sas: API's to remove nvme drive from sml (bsc#1117108).
- scsi: mpt3sas: API 's to support NVMe drive addition to SML (bsc#1117108).
- scsi: mpt3sas: As per MPI-spec, use combined reply queue for SAS3.5 controllers when HBA supports more than 16 MSI-x vectors (bsc#1117108).
- scsi: mpt3sas: Bug fix for big endian systems (bsc#1117108).
- scsi: mpt3sas: Bump mpt3sas driver version to v16.100.00.00 (bsc#1117108).
- scsi: mpt3sas: Cache enclosure pages during enclosure add (bsc#1117108).
- scsi: mpt3sas: check command status before attempting abort (bsc#1117108).
- scsi: mpt3sas: clarify mmio pointer types (bsc#1117108).
- scsi: mpt3sas: cleanup _scsih_pcie_enumeration_event() (bsc#1117108).
- scsi: mpt3sas: Configure reply post queue depth, DMA and sgl tablesize (bsc#1117108).
- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).
- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).
- scsi: mpt3sas: Convert mlsleading uses of pr_&lt;level&gt; with MPT3SAS_FMT (bsc#1117108).
- scsi: mpt3sas: Convert uses of pr_&lt;level&gt; with MPT3SAS_FMT to ioc_&lt;level&gt; (bsc#1117108).
- scsi: mpt3sas: Display chassis slot information of the drive (bsc#1117108).
- scsi: mpt3sas: Do not abort I/Os issued to NVMe drives while processing Async Broadcast primitive event (bsc#1117108).
- scsi: mpt3sas: Do not access the structure after decrementing it's instance reference count (bsc#1117108).
- scsi: mpt3sas: Do not use 32-bit atomic request descriptor for Ventura controllers (bsc#1117108).
- scsi: mpt3sas: Enhanced handling of Sense Buffer (bsc#1117108).
- scsi: mpt3sas: fix an out of bound write (bsc#1117108).
- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).
- scsi: mpt3sas: Fix calltrace observed while running IO &amp; reset (bsc#1117108).
- scsi: mpt3sas: fix dma_addr_t casts (bsc#1117108).
- scsi: mpt3sas: Fixed memory leaks in driver (bsc#1117108).
- scsi: mpt3sas: Fix, False timeout prints for ioctl and other internal commands during controller reset (bsc#1117108).
- scsi: mpt3sas: fix format overflow warning (bsc#1117108).
- scsi: mpt3sas: Fix indentation (bsc#1117108).
- scsi: mpt3sas: Fix memory allocation failure test in 'mpt3sas_base_attach()' (bsc#1117108).
- scsi: mpt3sas: Fix nvme drives checking for tlr (bsc#1117108).
- scsi: mpt3sas: fix oops in error handlers after shutdown/unload (bsc#1117108).
- scsi: mpt3sas: Fix possibility of using invalid Enclosure Handle for SAS device after host reset (bsc#1117108).
- scsi: mpt3sas: fix possible memory leak (bsc#1117108).
- scsi: mpt3sas: fix pr_info message continuation (bsc#1117108).
- scsi: mpt3sas: Fix removal and addition of vSES device during host reset (bsc#1117108).
- scsi: mpt3sas: Fix sparse warnings (bsc#1117108).
- scsi: mpt3sas: fix spelling mistake: 'disbale' -&gt; 'disable' (bsc#1117108).
- scsi: mpt3sas: For NVME device, issue a protocol level reset (bsc#1117108).
- scsi: mpt3sas: Handle NVMe PCIe device related events generated from firmware (bsc#1117108).
- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).
- scsi: mpt3sas: Incorrect command status was set/marked as not used (bsc#1117108).
- scsi: mpt3sas: Increase event log buffer to support 24 port HBA's (bsc#1117108).
- scsi: mpt3sas: Introduce API to get BAR0 mapped buffer address (bsc#1117108).
- scsi: mpt3sas: Introduce Base function for cloning (bsc#1117108).
- scsi: mpt3sas: Introduce function to clone mpi reply (bsc#1117108).
- scsi: mpt3sas: Introduce function to clone mpi request (bsc#1117108).
- scsi: mpt3sas: Introduce mpt3sas_get_st_from_smid() (bsc#1117108).
- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).
- scsi: mpt3sas: Lockless access for chain buffers (bsc#1117108).
- scsi: mpt3sas: lockless command submission (bsc#1117108).
- scsi: mpt3sas: make function _get_st_from_smid static (bsc#1117108).
- scsi: mpt3sas: NVMe drive support for BTDHMAPPING ioctl command and log info (bsc#1117108).
- scsi: mpt3sas: open-code _scsih_scsi_lookup_get() (bsc#1117108).
- scsi: mpt3sas: Optimize I/O memory consumption in driver (bsc#1117108).
- scsi: mpt3sas: Pre-allocate RDPQ Array at driver boot time (bsc#1117108).
- scsi: mpt3sas: Processing of Cable Exception events (bsc#1117108).
- scsi: mpt3sas: Reduce memory footprint in kdump kernel (bsc#1117108).
- scsi: mpt3sas: remove a stray KERN_INFO (bsc#1117108).
- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).
- scsi: mpt3sas: remove redundant copy_from_user in _ctl_getiocinfo (bsc#1117108).
- scsi: mpt3sas: remove redundant wmb (bsc#1117108).
- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).
- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).
- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).
- scsi: mpt3sas: Remove unused variable requeue_event (bsc#1117108).
- scsi: mpt3sas: Replace PCI pool old API (bsc#1117108).
- scsi: mpt3sas: Replace PCI pool old API (bsc#1117108).
- scsi: mpt3sas: Report Firmware Package Version from HBA Driver (bsc#1117108).
- scsi: mpt3sas: scan and add nvme device after controller reset (bsc#1117108).
- scsi: mpt3sas: separate out _base_recovery_check() (bsc#1117108).
- scsi: mpt3sas: set default value for cb_idx (bsc#1117108).
- scsi: mpt3sas: Set NVMe device queue depth as 128 (bsc#1117108).
- scsi: mpt3sas: SGL to PRP Translation for I/Os to NVMe devices (bsc#1117108).
- scsi: mpt3sas: simplify mpt3sas_scsi_issue_tm() (bsc#1117108).
- scsi: mpt3sas: simplify task management functions (bsc#1117108).
- scsi: mpt3sas: simplify _wait_for_commands_to_complete() (bsc#1117108).
- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).
- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).
- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).
- scsi: mpt3sas: switch to pci_alloc_irq_vectors (bsc#1117108).
- scsi: mpt3sas: Updated MPI headers to v2.00.48 (bsc#1117108).
- scsi: mpt3sas: Update driver version '25.100.00.00' (bsc#1117108).
- scsi: mpt3sas: Update driver version '26.100.00.00' (bsc#1117108).
- scsi: mpt3sas: Update MPI Headers (bsc#1117108).
- scsi: mpt3sas: Update mpt3sas driver version (bsc#1117108).
- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).
- scsi: mpt3sas: use list_splice_init() (bsc#1117108).
- scsi: mpt3sas: wait for and flush running commands on shutdown/unload (bsc#1117108).
- scsi: Protect SCSI device state changes with a mutex (bsc#1119877).
- scsi: qedi: Add ISCSI_BOOT_SYSFS to Kconfig (bsc#1043083).
- scsi: qla2xxx: Fix crashes in qla2x00_probe_one on probe failure (bsc#1094973).
- scsi: qla2xxx: Fix deadlock between ATIO and HW lock (bsc#1125794).
- scsi: qla2xxx: Fix incorrect port speed being set for FC adapters (bnc#1012382).
- scsi: qla2xxx: Fix small memory leak in qla2x00_probe_one on probe failure (bsc#1094973).
- scsi: Re-export scsi_internal_device_{,un}_block() (bsc#1119877).
- scsi: sd: Fix cache_type_store() (bnc#1012382).
- scsi: Split scsi_internal_device_block() (bsc#1119877).
- scsi: target: add emulate_pr backstore attr to toggle PR support (bsc#1091405).
- scsi: target: drop unused pi_prot_format attribute storage (bsc#1091405).
- scsi: target: make the pi_prot_format ConfigFS path readable (bsc#1123933).
- scsi: target: use consistent left-aligned ASCII INQUIRY data (bnc#1012382).
- scsi: ufs: fix bugs related to null pointer access and array size (bnc#1012382).
- scsi: ufs: fix race between clock gating and devfreq scaling work (bnc#1012382).
- scsi: ufshcd: Fix race between clk scaling and ungate work (bnc#1012382).
- scsi: ufshcd: release resources if probe fails (bnc#1012382).
- scsi: use 'inquiry_mutex' instead of 'state_mutex' (bsc#1119877).
- scsi: vmw_pscsi: Rearrange code to avoid multiple calls to free_irq during unload (bnc#1012382).
- scsi: zfcp: fix posting too many status read buffers leading to adapter shutdown (bnc#1012382).
- sctp: allocate sctp_sockaddr_entry with kzalloc (bnc#1012382).
- sctp: clear the transport of some out_chunk_list chunks in sctp_assoc_rm_peer (bnc#1012382).
- sctp: fix race on sctp_id2asoc (bnc#1012382).
- sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event (bnc#1012382).
- sd: disable logical block provisioning if 'lbpme' is not set (bsc#1086095 bsc#1078355).
- selftests: ftrace: Add synthetic event syntax testcase (bnc#1012382).
- selftests: Move networking/timestamping from Documentation (bnc#1012382).
- selinux: fix GPF on invalid policy (bnc#1012382).
- seq_buf: Make seq_buf_puts() null-terminate the buffer (bnc#1012382).
- seq_file: fix incomplete reset on read from zero offset (Git-fixes).
- ser_gigaset: use container_of() instead of detour (bnc#1012382).
- serial: fsl_lpuart: clear parity enable bit when disable parity (bnc#1012382).
- signal: Always deliver the kernel's SIGKILL and SIGSTOP to a pid namespace init (bnc#1012382).
- signal: Always notice exiting tasks (bnc#1012382).
- signal: Better detection of synchronous signals (bnc#1012382).
- signal/GenWQE: Fix sending of SIGKILL (bnc#1012382).
- signal: Restore the stop PTRACE_EVENT_EXIT (bnc#1012382).
- skge: potential memory corruption in skge_get_regs() (bnc#1012382).
- slab: alien caches must not be initialized if the allocation of the alien cache failed (bnc#1012382).
- smack: fix access permissions for keyring (bnc#1012382).
- smb3: allow stats which track session and share reconnects to be reset (bnc#1012382).
- smb3: do not attempt cifs operation in smb3 query info error path (bnc#1012382).
- smb3: on kerberos mount if server does not specify auth type use krb5 (bnc#1012382).
- smsc75xx: Check for Wake-on-LAN modes (bnc#1012382).
- smsc95xx: Check for Wake-on-LAN modes (bnc#1012382).
- smsc95xx: Use skb_cow_head to deal with cloned skbs (bnc#1012382).
- sock: Make sock-&gt;sk_stamp thread-safe (bnc#1012382).
- soc/tegra: Do not leak device tree node reference (bnc#1012382).
- soc/tegra: pmc: Fix child-node lookup (bnc#1012382).
- sparc64: Fix exception handling in UltraSPARC-III memcpy (bnc#1012382).
- sparc64 mm: Fix more TSB sizing issues (bnc#1012382).
- sparc: Fix single-pcr perf event counter management (bnc#1012382).
- sparc/pci: Refactor dev_archdata initialization into pci_init_dev_archdata (bnc#1012382).
- spi: bcm2835: Avoid finishing transfer prematurely in IRQ mode (bnc#1012382).
- spi: bcm2835: Fix book-keeping of DMA termination (bnc#1012382).
- spi: bcm2835: Fix race on DMA termination (bnc#1012382).
- spi: bcm2835: Unbreak the build of esoteric configs (bnc#1012382).
- spi/bcm63xx: fix error return code in bcm63xx_spi_probe() (bnc#1012382).
- spi/bcm63xx-hspi: fix error return code in bcm63xx_hsspi_probe() (bnc#1012382).
- spi: xlp: fix error return code in xlp_spi_probe() (bnc#1012382).
- sr9800: Check for supported Wake-on-LAN modes (bnc#1012382).
- sr: pass down correctly sized SCSI sense buffer (bnc#1012382).
- staging:iio:ad2s90: Make probe handle spi_setup failure (bnc#1012382).
- staging: iio: ad7780: update voltage on read (bnc#1012382).
- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bnc#1012382).
- staging: lustre: remove two build warnings (bnc#1012382).
- staging: rtl8188eu: Add device code for D-Link DWA-121 rev B1 (bnc#1012382).
- staging: rts5208: fix gcc-8 logic error warning (bnc#1012382).
- staging: speakup: Replace strncpy with memcpy (bnc#1012382).
- sunrpc: correct the computation for page_ptr when truncating (bnc#1012382).
- sunrpc: drop pointless static qualifier in xdr_get_next_encode_buffer() (bnc#1012382).
- sunrpc: Fix a bogus get/put in generic_key_to_expire() (bnc#1012382).
- sunrpc: Fix a potential race in xprt_connect() (git-fixes).
- sunrpc: fix cache_head leak due to queued request (bnc#1012382).
- sunrpc: Fix leak of krb5p encode pages (bnc#1012382).
- sunrpc: handle ENOMEM in rpcb_getport_async (bnc#1012382).
- sunvdc: Do not spin in an infinite loop when vio_ldc_send() returns EAGAIN (bnc#1012382).
- svcrdma: Remove unused variable in rdma_copy_tail() (git-fixes).
- swim: fix cleanup on setup error (bnc#1012382).
- swiotlb: clean up reporting (bnc#1012382).
- sysfs: Disable lockdep for driver bind/unbind files (bnc#1012382).
- sysv: return 'err' instead of 0 in __sysv_write_inode (bnc#1012382).
- target/iscsi: avoid NULL dereference in CHAP auth error path (bsc#1117165).
- target: se_dev_attrib.emulate_pr ABI stability (bsc#1091405).
- tcp: fix NULL ref in tail loss probe (bnc#1012382).
- TC: Set DMA masks for devices (bnc#1012382).
- termios, tty/tty_baudrate.c: fix buffer overrun (bnc#1012382).
- test_hexdump: use memcpy instead of strncpy (bnc#1012382).
- tg3: Add PHY reset for 5717/5719/5720 in change ring and flow control paths (bnc#1012382).
- thermal: allow spear-thermal driver to be a module (bnc#1012382).
- thermal: allow u8500-thermal driver to be a module (bnc#1012382).
- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bnc#1012382).
- timekeeping: Use proper seqcount initializer (bnc#1012382).
- timer/debug: Change /proc/timer_list from 0444 to 0400 (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_doit (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_link_set (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bnc#1012382).
- tipc: use destination length for copy string (bnc#1012382).
- tmpfs: make lseek(SEEK_DATA/SEK_HOLE) return ENXIO with a negative offset (bnc#1012382).
- tpm: fix response size validation in tpm_get_random() (bsc#1020645, git-fixes).
- tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated (bnc#1012382).
- tracing: Fix bad use of igrab in trace_uprobe.c (bsc#1120046).
- tracing: Fix memory leak in set_trigger_filter() (bnc#1012382).
- tracing: Fix memory leak of instance function hash filters (bnc#1012382).
- tracing: Skip more functions when doing stack tracing of events (bnc#1012382).
- tracing/uprobes: Fix output for multiple string arguments (bnc#1012382).
- tty: check name length in tty_find_polling_driver() (bnc#1012382).
- tty: Do not block on IO when ldisc change is pending (bnc#1105428).
- tty: Do not hold ldisc lock in tty_reopen() if ldisc present (bnc#1105428).
- tty: fix data race between tty_init_dev and flush of buf (bnc#1105428).
- tty: Handle problem if line discipline does not have receive_buf (bnc#1012382).
- tty: Hold tty_ldisc_lock() during tty_reopen() (bnc#1105428).
- tty/ldsem: Add lockdep asserts for ldisc_sem (bnc#1105428).
- tty/ldsem: Convert to regular lockdep annotations (bnc#1105428).
- tty/ldsem: Decrement wait_readers on timeouted down_read() (bnc#1105428).
- tty/ldsem: Wake up readers after timed out down_write() (bnc#1012382).
- tty/n_hdlc: fix __might_sleep warning (bnc#1012382).
- tty: serial: 8250_mtk: always resume the device in probe (bnc#1012382).
- tty: serial: samsung: Properly set flags in autoCTS mode (bnc#1012382).
- tty: serial: sprd: fix error return code in sprd_probe() (bnc#1012382).
- tty: Simplify tty-&gt;count math in tty_reopen() (bnc#1105428).
- tty: wipe buffer (bnc#1012382).
- tty: wipe buffer if not echoing data (bnc#1012382).
- tun: Consistently configure generic netdev params via rtnetlink (bnc#1012382).
- tun: forbid iface creation with rtnl ops (bnc#1012382).
- uapi/if_ether.h: move __UAPI_DEF_ETHHDR libc define (bnc#1012382).
- uapi/if_ether.h: prevent redefinition of struct ethhdr (bnc#1012382).
- ucc_geth: Reset BQL queue when stopping device (bnc#1012382).
- udf: Fix BUG on corrupted inode (bnc#1012382).
- uio: ensure class is registered before devices (bnc#1012382).
- uio: Fix an Oops on load (bnc#1012382).
- uio: make symbol 'uio_class_registered' static (git-fixes).
- um: Avoid longjmp/setjmp symbol clashes with libpthread.a (bnc#1012382).
- um: Avoid marking pages with 'changed protection' (bnc#1012382).
- um: Give start_idle_thread() a return code (bnc#1012382).
- unifdef: use memcpy instead of strncpy (bnc#1012382).
- Update ibmvnic: Fix RX queue buffer cleanup (bsc#1115440, bsc#1115433).
- uprobes: Fix handle_swbp() vs. unregister() + register() race once more (bnc#1012382).
- usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bnc#1012382).
- usb: appledisplay: Add 27' Apple Cinema Display (bnc#1012382).
- usb: cdc-acm: add entry for Hiro (Conexant) modem (bnc#1012382).
- usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bnc#1012382).
- usb: check usb_get_extra_descriptor for proper size (bnc#1012382).
- usb: chipidea: Prevent unbalanced IRQ disable (bnc#1012382).
- usb: core: Fix hub port connection events lost (bnc#1012382).
- usb: core: quirks: add RESET_RESUME quirk for Cherry G230 Stream series (bnc#1012382).
- usb: dwc2: Remove unnecessary kfree (bnc#1012382).
- usb: dwc3: omap: fix error return code in dwc3_omap_probe() (bnc#1012382).
- usb: ehci-omap: fix error return code in ehci_hcd_omap_probe() (bnc#1012382).
- usb: fix the usbfs flag sanitization for control transfers (bnc#1012382).
- usb: gadget: dummy: fix nonsensical comparisons (bnc#1012382).
- usb: gadget: storage: Fix Spectre v1 vulnerability (bnc#1012382).
- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bnc#1012382).
- usb: hub: delay hub autosuspend if USB3 port is still link training (bnc#1012382).
- usb: imx21-hcd: fix error return code in imx21_probe() (bnc#1012382).
- usb: misc: appledisplay: add 20' Apple Cinema Display (bnc#1012382).
- usbnet: ipheth: fix potential recvmsg bug and recvmsg bug 2 (bnc#1012382).
- usb: omap_udc: fix crashes on probe error and module removal (bnc#1012382).
- usb: omap_udc: fix omap_udc_start() on 15xx machines (bnc#1012382).
- usb: omap_udc: fix USB gadget functionality on Palm Tungsten E (bnc#1012382).
- usb: omap_udc: use devm_request_irq() (bnc#1012382).
- usb: phy: am335x: fix race condition in _probe (bnc#1012382).
- usb: quirk: add no-LPM quirk on SanDisk Ultra Flair device (bnc#1012382).
- usb: quirks: Add delay-init quirk for Corsair K70 LUX RGB (bnc#1012382).
- usb: quirks: Add no-lpm quirk for Raydium touchscreens (bnc#1012382).
- usb: r8a66597: Fix a possible concurrency use-after-free bug in r8a66597_endpoint_disable() (bnc#1012382).
- usb: serial: option: add Fibocom NL668 series (bnc#1012382).
- usb: serial: option: add Fibocom NL678 series (bnc#1012382).
- usb: serial: option: add GosunCn ZTE WeLink ME3630 (bnc#1012382).
- usb: serial: option: add HP lt4132 (bnc#1012382).
- usb: serial: option: add Simcom SIM7500/SIM7600 (MBIM mode) (bnc#1012382).
- usb: serial: option: add Telit LN940 series (bnc#1012382).
- usb: serial: pl2303: add ids for Hewlett-Packard HP POS pole displays (bnc#1012382).
- usb: serial: pl2303: add new PID to support PL2303TB (bnc#1012382).
- usb: serial: simple: add Motorola Tetra TPG2200 device id (bnc#1012382).
- usb: storage: add quirk for SMI SM3350 (bnc#1012382).
- usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bnc#1012382).
- usb-storage: fix bogus hardware error messages for ATA pass-thru devices (bnc#1012382).
- usb: usb-storage: Add new IDs to ums-realtek (bnc#1012382).
- usb: xhci: fix timeout for transition from RExit to U0 (bnc#1012382).
- usb: xhci: fix uninitialized completion when USB3 port got wrong status (bnc#1012382).
- usb: xhci: Prevent bus suspend if a port connect change or polling state is detected (bnc#1012382).
- v9fs_dir_readdir: fix double-free on p9stat_read error (bnc#1012382).
- vfs: Avoid softlockups in drop_pagecache_sb() (bsc#1118505).
- vhost: Fix Spectre V1 vulnerability (bnc#1012382).
- vhost: make sure used idx is seen before log in vhost_add_used_n() (bnc#1012382).
- vhost/scsi: truncate T10 PI iov_iter to prot_bytes (bnc#1012382).
- video: clps711x-fb: release disp device node in probe() (bnc#1012382).
- video: fbdev: pxa3xx_gcu: fix error return code in pxa3xx_gcu_probe() (bnc#1012382).
- virtio/s390: avoid race on vcdev-&gt;config (bnc#1012382).
- virtio/s390: fix race in ccw_io_helper() (bnc#1012382).
- VSOCK: Send reset control packet when socket is partially bound (bnc#1012382).
- vti6: flush x-netns xfrm cache when vti interface is removed (bnc#1012382).
- vt: invoke notifier on screen size change (bnc#1012382).
- w1: omap-hdq: fix missing bus unregister at removal (bnc#1012382).
- writeback: do not decrement wb-&gt;refcnt if !wb-&gt;bdi (git fixes (writeback)).
- x86/a.out: Clear the dump structure initially (bnc#1012382).
- x86: boot: Fix EFI stub alignment (bnc#1012382).
- x86/boot: #undef memcpy() et al in string.c (bnc#1012382).
- x86/build: Fix stack alignment for CLang (bnc#1012382).
- x86/build: Specify stack alignment for clang (bnc#1012382).
- x86/build: Use __cc-option for boot code compiler options (bnc#1012382).
- x86/build: Use cc-option to validate stack alignment parameter (bnc#1012382).
- x86/corruption-check: Fix panic in memory_corruption_check() when boot option without value is provided (bnc#1012382).
- x86/earlyprintk/efi: Fix infinite loop on some screen widths (bnc#1012382).
- x86/entry: spell EBX register correctly in documentation (bnc#1012382).
- x86/fpu: Add might_fault() to user_insn() (bnc#1012382).
- x86/kaslr: Fix incorrect i8254 outb() parameters (bnc#1012382).
- x86/kbuild: Use cc-option to enable -falign-{jumps/loops} (bnc#1012382).
- x86/kconfig: Fall back to ticket spinlocks (bnc#1012382).
- x86/MCE: Export memory_error() (bsc#1114648).
- x86/MCE: Initialize mce.bank in the case of a fatal error in mce_no_way_out() (bnc#1012382).
- x86/MCE: Make correctable error detection look at the Deferred bit (bsc#1114648).
- x86/mm/kaslr: Use the _ASM_MUL macro for multiplication to work around Clang incompatibility (bnc#1012382).
- x86/mm/pat: Prevent hang during boot when mapping pages (bnc#1012382).
- x86/mtrr: Do not copy uninitialized gentry fields back to userspace (bnc#1012382).
- x86/PCI: Fix Broadcom CNB20LE unintended sign extension (redux) (bnc#1012382).
- x86/pkeys: Properly copy pkey state at fork() (bsc#1106105).
- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bnc#1012382).
- x86: respect memory size limiting via mem= parameter (bsc#1117645).
- x86/speculation/l1tf: Drop the swap storage limit restriction when l1tf=off (bnc#1114871).
- x86/speculation: Use synthetic bits for IBRS/IBPB/STIBP (bnc#1012382).
- x86/xen: dont add memory above max allowed allocation (bsc#1117645).
- xen/balloon: Support xend-based toolstack (bnc#1065600).
- xen/blkfront: avoid NULL blkfront_info dereference on device removal (bsc#1111062).
- xen: fix race in xen_qlock_wait() (bnc#1012382).
- xen: fix xen_qlock_wait() (bnc#1012382).
- xen: make xen_qlock_wait() nestable (bnc#1012382).
- xen/netback: dont overflow meta array (bnc#1099523).
- xen/netfront: tolerate frags with no data (bnc#1012382).
- xen-swiotlb: use actually allocated size on check physical continuous (bnc#1012382).
- xen/x86: add diagnostic printout to xen_mc_flush() in case of error (bnc#1116183).
- xen: xlate_mmu: add missing header to fix 'W=1' warning (bnc#1012382).
- xfrm6: call kfree_skb when skb is toobig (bnc#1012382).
- xfrm6_tunnel: Fix spi check in __xfrm6_tunnel_alloc_spi (bnc#1012382).
- xfrm: Clear sk_dst_cache when applying per-socket policy (bnc#1012382).
- xfrm: Fix bucket count reported to userspace (bnc#1012382).
- xfrm: use complete IPv6 addresses for hash (bsc#1109330).
- xfrm: Validate address prefix lengths in the xfrm selector (bnc#1012382).
- xfrm: validate template mode (bnc#1012382).
- xfs: Align compat attrlist_by_handle with native implementation (git-fixes).
- xfs/dmapi: restore event in xfs_getbmap (bsc#1114763).
- xfs: Fix error code in 'xfs_ioc_getbmap()' (git-fixes).
- xfs: fix quotacheck dquot id overflow infinite loop (bsc#1121621).
- xhci: Add quirk to workaround the errata seen on Cavium Thunder-X2 Soc (bsc#1117162).
- xhci: Do not prevent USB2 bus suspend in state check intended for USB3 only (bnc#1012382).
- xhci: Prevent U1/U2 link pm states if exit latency is too long (bnc#1012382).
- xprtrdma: checking for NULL instead of IS_ERR() (git-fixes).
- xprtrdma: Disable pad optimization by default (git-fixes).
- xprtrdma: Disable RPC/RDMA backchannel debugging messages (git-fixes).
- xprtrdma: Fix additional uses of spin_lock_irqsave(rb_lock) (git-fixes).
- xprtrdma: Fix backchannel allocation of extra rpcrdma_reps (git-fixes).
- xprtrdma: Fix Read chunk padding (git-fixes).
- xprtrdma: Fix receive buffer accounting (git-fixes).
- xprtrdma: Reset credit grant properly after a disconnect (git-fixes).
- xprtrdma: rpcrdma_bc_receive_call() should init rq_private_buf.len (git-fixes).
- xprtrdma: Serialize credit accounting again (git-fixes).
- xprtrdma: xprt_rdma_free() must not release backchannel reqs (git-fixes).
- xtensa: add NOTES section to the linker script (bnc#1012382).
- xtensa: enable coprocessors that are being flushed (bnc#1012382).
- xtensa: fix boot parameters address translation (bnc#1012382).
- xtensa: fix coprocessor context offset definitions (bnc#1012382).
- xtensa: make sure bFLT stack is 16 byte aligned (bnc#1012382).
- yama: Check for pid death before checking ancestry (bnc#1012382).
- zram: close udev startup race condition as default groups (bnc#1012382).
- xfrm: refine validation of template and selector families (bnc#1012382).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-04"/>
	<updated date="2019-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015336">SUSE bug 1015336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015337">SUSE bug 1015337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015340">SUSE bug 1015340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019683">SUSE bug 1019683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019695">SUSE bug 1019695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020413">SUSE bug 1020413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020645">SUSE bug 1020645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023175">SUSE bug 1023175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027260">SUSE bug 1027260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027457">SUSE bug 1027457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031492">SUSE bug 1031492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042286">SUSE bug 1042286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043083">SUSE bug 1043083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046264">SUSE bug 1046264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047487">SUSE bug 1047487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048916">SUSE bug 1048916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050549">SUSE bug 1050549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066223">SUSE bug 1066223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070805">SUSE bug 1070805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078355">SUSE bug 1078355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079935">SUSE bug 1079935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086095">SUSE bug 1086095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086423">SUSE bug 1086423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086652">SUSE bug 1086652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091405">SUSE bug 1091405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094823">SUSE bug 1094823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094973">SUSE bug 1094973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096242">SUSE bug 1096242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096281">SUSE bug 1096281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099523">SUSE bug 1099523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099810">SUSE bug 1099810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100105">SUSE bug 1100105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101557">SUSE bug 1101557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102439">SUSE bug 1102439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102660">SUSE bug 1102660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102875">SUSE bug 1102875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102877">SUSE bug 1102877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102879">SUSE bug 1102879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102882">SUSE bug 1102882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102896">SUSE bug 1102896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103097">SUSE bug 1103097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103156">SUSE bug 1103156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103257">SUSE bug 1103257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103624">SUSE bug 1103624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104098">SUSE bug 1104098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104731">SUSE bug 1104731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105428">SUSE bug 1105428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106061">SUSE bug 1106061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106105">SUSE bug 1106105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106237">SUSE bug 1106237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106240">SUSE bug 1106240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106929">SUSE bug 1106929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107385">SUSE bug 1107385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107866">SUSE bug 1107866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108145">SUSE bug 1108145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108240">SUSE bug 1108240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109272">SUSE bug 1109272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109330">SUSE bug 1109330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109695">SUSE bug 1109695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109806">SUSE bug 1109806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110286">SUSE bug 1110286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111062">SUSE bug 1111062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111174">SUSE bug 1111174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111809">SUSE bug 1111809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112246">SUSE bug 1112246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112963">SUSE bug 1112963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113412">SUSE bug 1113412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113766">SUSE bug 1113766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114190">SUSE bug 1114190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114417">SUSE bug 1114417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114475">SUSE bug 1114475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114648">SUSE bug 1114648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114763">SUSE bug 1114763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114839">SUSE bug 1114839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114871">SUSE bug 1114871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114893">SUSE bug 1114893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115431">SUSE bug 1115431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115433">SUSE bug 1115433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115440">SUSE bug 1115440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115482">SUSE bug 1115482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115709">SUSE bug 1115709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116027">SUSE bug 1116027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116183">SUSE bug 1116183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116285">SUSE bug 1116285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116336">SUSE bug 1116336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116345">SUSE bug 1116345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116497">SUSE bug 1116497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116653">SUSE bug 1116653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116841">SUSE bug 1116841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116924">SUSE bug 1116924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116950">SUSE bug 1116950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116962">SUSE bug 1116962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117108">SUSE bug 1117108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117162">SUSE bug 1117162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117165">SUSE bug 1117165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117186">SUSE bug 1117186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117562">SUSE bug 1117562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117645">SUSE bug 1117645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117744">SUSE bug 1117744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118152">SUSE bug 1118152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118316">SUSE bug 1118316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118319">SUSE bug 1118319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118505">SUSE bug 1118505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118790">SUSE bug 1118790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118798">SUSE bug 1118798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118915">SUSE bug 1118915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118922">SUSE bug 1118922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118926">SUSE bug 1118926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118930">SUSE bug 1118930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118936">SUSE bug 1118936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119204">SUSE bug 1119204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119680">SUSE bug 1119680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119714">SUSE bug 1119714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119877">SUSE bug 1119877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119946">SUSE bug 1119946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119967">SUSE bug 1119967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119970">SUSE bug 1119970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120017">SUSE bug 1120017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120046">SUSE bug 1120046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120722">SUSE bug 1120722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120743">SUSE bug 1120743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120758">SUSE bug 1120758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120902">SUSE bug 1120902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120950">SUSE bug 1120950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121239">SUSE bug 1121239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121240">SUSE bug 1121240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121241">SUSE bug 1121241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121242">SUSE bug 1121242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121275">SUSE bug 1121275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121621">SUSE bug 1121621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121726">SUSE bug 1121726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122650">SUSE bug 1122650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122651">SUSE bug 1122651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122779">SUSE bug 1122779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122885">SUSE bug 1122885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123321">SUSE bug 1123321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123323">SUSE bug 1123323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123357">SUSE bug 1123357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123933">SUSE bug 1123933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124166">SUSE bug 1124166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124728">SUSE bug 1124728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124732">SUSE bug 1124732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124735">SUSE bug 1124735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124775">SUSE bug 1124775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124777">SUSE bug 1124777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124780">SUSE bug 1124780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124811">SUSE bug 1124811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125000">SUSE bug 1125000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125014">SUSE bug 1125014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125446">SUSE bug 1125446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125794">SUSE bug 1125794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125796">SUSE bug 1125796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125808">SUSE bug 1125808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125809">SUSE bug 1125809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125810">SUSE bug 1125810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125892">SUSE bug 1125892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985031">SUSE bug 985031</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1120/">CVE-2018-1120</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16862/">CVE-2018-16862</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19407/">CVE-2018-19407</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19824/">CVE-2018-19824</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19985/">CVE-2018-19985</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20169/">CVE-2018-20169</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9568/">CVE-2018-9568</cve>
	<cve impact="moderate" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3459/">CVE-2019-3459</cve>
	<cve impact="moderate" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3460/">CVE-2019-3460</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7222/">CVE-2019-7222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521660" comment="kernel-default-4.4.175-94.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521661" comment="kernel-default-devel-4.4.175-94.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521662" comment="kernel-default-extra-4.4.175-94.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521663" comment="kernel-devel-4.4.175-94.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521664" comment="kernel-macros-4.4.175-94.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521665" comment="kernel-source-4.4.175-94.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521666" comment="kernel-syms-4.4.175-94.79.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78623" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1112142" ref_url="https://bugzilla.suse.com/1112142" source="BUGZILLA"/>
		<reference ref_id="1112143" ref_url="https://bugzilla.suse.com/1112143" source="BUGZILLA"/>
		<reference ref_id="1112144" ref_url="https://bugzilla.suse.com/1112144" source="BUGZILLA"/>
		<reference ref_id="1112146" ref_url="https://bugzilla.suse.com/1112146" source="BUGZILLA"/>
		<reference ref_id="1112147" ref_url="https://bugzilla.suse.com/1112147" source="BUGZILLA"/>
		<reference ref_id="1112148" ref_url="https://bugzilla.suse.com/1112148" source="BUGZILLA"/>
		<reference ref_id="1112152" ref_url="https://bugzilla.suse.com/1112152" source="BUGZILLA"/>
		<reference ref_id="1112153" ref_url="https://bugzilla.suse.com/1112153" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-16435" ref_url="https://www.suse.com/security/cve/CVE-2018-16435/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3183" ref_url="https://www.suse.com/security/cve/CVE-2018-3183/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version 8u191 fixes the following issues:

Security issues fixed:

- CVE-2018-3136: Manifest better support (bsc#1112142)
- CVE-2018-3139: Better HTTP Redirection (bsc#1112143)
- CVE-2018-3149: Enhance JNDI lookups (bsc#1112144)
- CVE-2018-3169: Improve field accesses (bsc#1112146)
- CVE-2018-3180: Improve TLS connections stability (bsc#1112147)
- CVE-2018-3214: Better RIFF reading support (bsc#1112152)
- CVE-2018-13785: Upgrade JDK 8u to libpng 1.6.35 (bsc#1112153)
- CVE-2018-3183: Improve script engine support (bsc#1112148)
- CVE-2018-16435: heap-based buffer overflow in SetData function in cmsIT8LoadFromFile
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-10"/>
	<updated date="2019-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112147">SUSE bug 1112147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112153">SUSE bug 1112153</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16435/">CVE-2018-16435</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180</cve>
	<cve impact="moderate" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3183/">CVE-2018-3183</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521667" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521668" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78624" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1056334" ref_url="https://bugzilla.suse.com/1056334" source="BUGZILLA"/>
		<reference ref_id="1056386" ref_url="https://bugzilla.suse.com/1056386" source="BUGZILLA"/>
		<reference ref_id="1084604" ref_url="https://bugzilla.suse.com/1084604" source="BUGZILLA"/>
		<reference ref_id="1113231" ref_url="https://bugzilla.suse.com/1113231" source="BUGZILLA"/>
		<reference ref_id="1114957" ref_url="https://bugzilla.suse.com/1114957" source="BUGZILLA"/>
		<reference ref_id="1116717" ref_url="https://bugzilla.suse.com/1116717" source="BUGZILLA"/>
		<reference ref_id="1117275" ref_url="https://bugzilla.suse.com/1117275" source="BUGZILLA"/>
		<reference ref_id="1119493" ref_url="https://bugzilla.suse.com/1119493" source="BUGZILLA"/>
		<reference ref_id="1121600" ref_url="https://bugzilla.suse.com/1121600" source="BUGZILLA"/>
		<reference ref_id="1123156" ref_url="https://bugzilla.suse.com/1123156" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672/" source="CVE"/>
		<reference ref_id="CVE-2017-13673" ref_url="https://www.suse.com/security/cve/CVE-2017-13673/" source="CVE"/>
		<reference ref_id="CVE-2018-16872" ref_url="https://www.suse.com/security/cve/CVE-2018-16872/" source="CVE"/>
		<reference ref_id="CVE-2018-18954" ref_url="https://www.suse.com/security/cve/CVE-2018-18954/" source="CVE"/>
		<reference ref_id="CVE-2018-19364" ref_url="https://www.suse.com/security/cve/CVE-2018-19364/" source="CVE"/>
		<reference ref_id="CVE-2018-19489" ref_url="https://www.suse.com/security/cve/CVE-2018-19489/" source="CVE"/>
		<reference ref_id="CVE-2018-7858" ref_url="https://www.suse.com/security/cve/CVE-2018-7858/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005184.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security vulnerabilities addressed:

- CVE-2019-6778: Fixed an out-of-bounds access in slirp (bsc#1123156)
- CVE-2018-16872: Fixed a host security vulnerability related to handling symlinks in usb-mtp (bsc#1119493)
- CVE-2018-19489: Fixed a Denial-of-Service in virtfs (bsc#1117275)
- CVE-2018-19364: Fixed an use-after-free vulnerability if virtfs interface is deliberately abused (bsc#1116717)
- CVE-2018-18954: Fixed an out-of-bounds access performing PowerNV memory operations (bsc#1114957)
- CVE-2017-13673: Fixed a reachable assert failure during during display update (bsc#1056386)
- CVE-2017-13672: Fixed an out-of-bounds read access during display update (bsc#1056334)
- CVE-2018-7858: Fixed an out-of-bounds access in cirrus when updating vga display allowing for Denial-of-Service (bsc#1084604)

Other bug fixes and changes:

- Fix pwrite64/pread64/write to return 0 over -1 for a zero length NULL buffer in qemu (bsc#1121600)
- Fix bad guest time after migration (bsc#1113231)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-11"/>
	<updated date="2019-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056334">SUSE bug 1056334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056386">SUSE bug 1056386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084604">SUSE bug 1084604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113231">SUSE bug 1113231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114957">SUSE bug 1114957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116717">SUSE bug 1116717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117275">SUSE bug 1117275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119493">SUSE bug 1119493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121600">SUSE bug 1121600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13673/">CVE-2017-13673</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16872/">CVE-2018-16872</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18954/">CVE-2018-18954</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19364/">CVE-2018-19364</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19489/">CVE-2018-19489</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7858/">CVE-2018-7858</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521669" comment="qemu-2.9.1-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521670" comment="qemu-block-curl-2.9.1-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521671" comment="qemu-ipxe-1.0.0+-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521672" comment="qemu-kvm-2.9.1-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521673" comment="qemu-seabios-1.10.2-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521674" comment="qemu-sgabios-8-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521675" comment="qemu-tools-2.9.1-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521676" comment="qemu-vgabios-1.10.2-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521677" comment="qemu-x86-2.9.1-6.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78625" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1110279" ref_url="https://bugzilla.suse.com/1110279" source="BUGZILLA"/>
		<reference ref_id="1116998" ref_url="https://bugzilla.suse.com/1116998" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-4191" ref_url="https://www.suse.com/security/cve/CVE-2018-4191/" source="CVE"/>
		<reference ref_id="CVE-2018-4197" ref_url="https://www.suse.com/security/cve/CVE-2018-4197/" source="CVE"/>
		<reference ref_id="CVE-2018-4207" ref_url="https://www.suse.com/security/cve/CVE-2018-4207/" source="CVE"/>
		<reference ref_id="CVE-2018-4208" ref_url="https://www.suse.com/security/cve/CVE-2018-4208/" source="CVE"/>
		<reference ref_id="CVE-2018-4209" ref_url="https://www.suse.com/security/cve/CVE-2018-4209/" source="CVE"/>
		<reference ref_id="CVE-2018-4210" ref_url="https://www.suse.com/security/cve/CVE-2018-4210/" source="CVE"/>
		<reference ref_id="CVE-2018-4212" ref_url="https://www.suse.com/security/cve/CVE-2018-4212/" source="CVE"/>
		<reference ref_id="CVE-2018-4213" ref_url="https://www.suse.com/security/cve/CVE-2018-4213/" source="CVE"/>
		<reference ref_id="CVE-2018-4261" ref_url="https://www.suse.com/security/cve/CVE-2018-4261/" source="CVE"/>
		<reference ref_id="CVE-2018-4262" ref_url="https://www.suse.com/security/cve/CVE-2018-4262/" source="CVE"/>
		<reference ref_id="CVE-2018-4263" ref_url="https://www.suse.com/security/cve/CVE-2018-4263/" source="CVE"/>
		<reference ref_id="CVE-2018-4264" ref_url="https://www.suse.com/security/cve/CVE-2018-4264/" source="CVE"/>
		<reference ref_id="CVE-2018-4265" ref_url="https://www.suse.com/security/cve/CVE-2018-4265/" source="CVE"/>
		<reference ref_id="CVE-2018-4266" ref_url="https://www.suse.com/security/cve/CVE-2018-4266/" source="CVE"/>
		<reference ref_id="CVE-2018-4267" ref_url="https://www.suse.com/security/cve/CVE-2018-4267/" source="CVE"/>
		<reference ref_id="CVE-2018-4270" ref_url="https://www.suse.com/security/cve/CVE-2018-4270/" source="CVE"/>
		<reference ref_id="CVE-2018-4272" ref_url="https://www.suse.com/security/cve/CVE-2018-4272/" source="CVE"/>
		<reference ref_id="CVE-2018-4273" ref_url="https://www.suse.com/security/cve/CVE-2018-4273/" source="CVE"/>
		<reference ref_id="CVE-2018-4278" ref_url="https://www.suse.com/security/cve/CVE-2018-4278/" source="CVE"/>
		<reference ref_id="CVE-2018-4284" ref_url="https://www.suse.com/security/cve/CVE-2018-4284/" source="CVE"/>
		<reference ref_id="CVE-2018-4299" ref_url="https://www.suse.com/security/cve/CVE-2018-4299/" source="CVE"/>
		<reference ref_id="CVE-2018-4306" ref_url="https://www.suse.com/security/cve/CVE-2018-4306/" source="CVE"/>
		<reference ref_id="CVE-2018-4309" ref_url="https://www.suse.com/security/cve/CVE-2018-4309/" source="CVE"/>
		<reference ref_id="CVE-2018-4312" ref_url="https://www.suse.com/security/cve/CVE-2018-4312/" source="CVE"/>
		<reference ref_id="CVE-2018-4314" ref_url="https://www.suse.com/security/cve/CVE-2018-4314/" source="CVE"/>
		<reference ref_id="CVE-2018-4315" ref_url="https://www.suse.com/security/cve/CVE-2018-4315/" source="CVE"/>
		<reference ref_id="CVE-2018-4316" ref_url="https://www.suse.com/security/cve/CVE-2018-4316/" source="CVE"/>
		<reference ref_id="CVE-2018-4317" ref_url="https://www.suse.com/security/cve/CVE-2018-4317/" source="CVE"/>
		<reference ref_id="CVE-2018-4318" ref_url="https://www.suse.com/security/cve/CVE-2018-4318/" source="CVE"/>
		<reference ref_id="CVE-2018-4319" ref_url="https://www.suse.com/security/cve/CVE-2018-4319/" source="CVE"/>
		<reference ref_id="CVE-2018-4323" ref_url="https://www.suse.com/security/cve/CVE-2018-4323/" source="CVE"/>
		<reference ref_id="CVE-2018-4328" ref_url="https://www.suse.com/security/cve/CVE-2018-4328/" source="CVE"/>
		<reference ref_id="CVE-2018-4345" ref_url="https://www.suse.com/security/cve/CVE-2018-4345/" source="CVE"/>
		<reference ref_id="CVE-2018-4358" ref_url="https://www.suse.com/security/cve/CVE-2018-4358/" source="CVE"/>
		<reference ref_id="CVE-2018-4359" ref_url="https://www.suse.com/security/cve/CVE-2018-4359/" source="CVE"/>
		<reference ref_id="CVE-2018-4361" ref_url="https://www.suse.com/security/cve/CVE-2018-4361/" source="CVE"/>
		<reference ref_id="CVE-2018-4372" ref_url="https://www.suse.com/security/cve/CVE-2018-4372/" source="CVE"/>
		<reference ref_id="CVE-2018-4373" ref_url="https://www.suse.com/security/cve/CVE-2018-4373/" source="CVE"/>
		<reference ref_id="CVE-2018-4375" ref_url="https://www.suse.com/security/cve/CVE-2018-4375/" source="CVE"/>
		<reference ref_id="CVE-2018-4376" ref_url="https://www.suse.com/security/cve/CVE-2018-4376/" source="CVE"/>
		<reference ref_id="CVE-2018-4378" ref_url="https://www.suse.com/security/cve/CVE-2018-4378/" source="CVE"/>
		<reference ref_id="CVE-2018-4382" ref_url="https://www.suse.com/security/cve/CVE-2018-4382/" source="CVE"/>
		<reference ref_id="CVE-2018-4386" ref_url="https://www.suse.com/security/cve/CVE-2018-4386/" source="CVE"/>
		<reference ref_id="CVE-2018-4392" ref_url="https://www.suse.com/security/cve/CVE-2018-4392/" source="CVE"/>
		<reference ref_id="CVE-2018-4416" ref_url="https://www.suse.com/security/cve/CVE-2018-4416/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.22.4 fixes the following issues:

Security issues fixed:

  CVE-2018-4191, CVE-2018-4197, CVE-2018-4299, CVE-2018-4306, CVE-2018-4309, CVE-2018-4392,
  CVE-2018-4312, CVE-2018-4314, CVE-2018-4315, CVE-2018-4316, CVE-2018-4317, CVE-2018-4318,
  CVE-2018-4319, CVE-2018-4323, CVE-2018-4328, CVE-2018-4358, CVE-2018-4359, CVE-2018-4361,
  CVE-2018-4345, CVE-2018-4372, CVE-2018-4373, CVE-2018-4375, CVE-2018-4376, CVE-2018-4416,
  CVE-2018-4378, CVE-2018-4382, CVE-2018-4386 (bsc#1110279, bsc#1116998). 
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-10"/>
	<updated date="2019-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116998">SUSE bug 1116998</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4191/">CVE-2018-4191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4197/">CVE-2018-4197</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4207/">CVE-2018-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4208/">CVE-2018-4208</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4209/">CVE-2018-4209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4210/">CVE-2018-4210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4212/">CVE-2018-4212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4213/">CVE-2018-4213</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4261/">CVE-2018-4261</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4262/">CVE-2018-4262</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4263/">CVE-2018-4263</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4264/">CVE-2018-4264</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4265/">CVE-2018-4265</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-4266/">CVE-2018-4266</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4267/">CVE-2018-4267</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4270/">CVE-2018-4270</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4272/">CVE-2018-4272</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4273/">CVE-2018-4273</cve>
	<cve impact="important" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4278/">CVE-2018-4278</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4284/">CVE-2018-4284</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4299/">CVE-2018-4299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4306/">CVE-2018-4306</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4309/">CVE-2018-4309</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4312/">CVE-2018-4312</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4314/">CVE-2018-4314</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4315/">CVE-2018-4315</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4316/">CVE-2018-4316</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4317/">CVE-2018-4317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4318/">CVE-2018-4318</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4319/">CVE-2018-4319</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4323/">CVE-2018-4323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4328/">CVE-2018-4328</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4345/">CVE-2018-4345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4358/">CVE-2018-4358</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4359/">CVE-2018-4359</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4361/">CVE-2018-4361</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4372/">CVE-2018-4372</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4373/">CVE-2018-4373</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4375/">CVE-2018-4375</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4376/">CVE-2018-4376</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4378/">CVE-2018-4378</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4382/">CVE-2018-4382</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4386/">CVE-2018-4386</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4392/">CVE-2018-4392</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4416/">CVE-2018-4416</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78626" version="1" class="patch">
	<metadata>
		<title>Security update for lftp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1103367" ref_url="https://bugzilla.suse.com/1103367" source="BUGZILLA"/>
		<reference ref_id="1120946" ref_url="https://bugzilla.suse.com/1120946" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10916" ref_url="https://www.suse.com/security/cve/CVE-2018-10916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0642-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190642-1.html" source="SUSE-SU"/>
		<description>
This update for lftp fixes the following issues:

Security issue fixed: 

- CVE-2018-10916: Fixed an improper file name sanitization which could lead to loss of integrity of 
  the local system (bsc#1103367).
  
Other issue addressed:

- The SSH login handling code detects password prompts more reliably (bsc#1120946).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-19"/>
	<updated date="2019-03-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103367">SUSE bug 1103367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120946">SUSE bug 1120946</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10916/">CVE-2018-10916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521684" comment="lftp-4.7.4-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78627" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1091236" ref_url="https://bugzilla.suse.com/1091236" source="BUGZILLA"/>
		<reference ref_id="1128471" ref_url="https://bugzilla.suse.com/1128471" source="BUGZILLA"/>
		<reference ref_id="1128472" ref_url="https://bugzilla.suse.com/1128472" source="BUGZILLA"/>
		<reference ref_id="1128474" ref_url="https://bugzilla.suse.com/1128474" source="BUGZILLA"/>
		<reference ref_id="1128476" ref_url="https://bugzilla.suse.com/1128476" source="BUGZILLA"/>
		<reference ref_id="1128480" ref_url="https://bugzilla.suse.com/1128480" source="BUGZILLA"/>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1128490" ref_url="https://bugzilla.suse.com/1128490" source="BUGZILLA"/>
		<reference ref_id="1128492" ref_url="https://bugzilla.suse.com/1128492" source="BUGZILLA"/>
		<reference ref_id="1128493" ref_url="https://bugzilla.suse.com/1128493" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3855" ref_url="https://www.suse.com/security/cve/CVE-2019-3855/" source="CVE"/>
		<reference ref_id="CVE-2019-3856" ref_url="https://www.suse.com/security/cve/CVE-2019-3856/" source="CVE"/>
		<reference ref_id="CVE-2019-3857" ref_url="https://www.suse.com/security/cve/CVE-2019-3857/" source="CVE"/>
		<reference ref_id="CVE-2019-3858" ref_url="https://www.suse.com/security/cve/CVE-2019-3858/" source="CVE"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="CVE-2019-3861" ref_url="https://www.suse.com/security/cve/CVE-2019-3861/" source="CVE"/>
		<reference ref_id="CVE-2019-3862" ref_url="https://www.suse.com/security/cve/CVE-2019-3862/" source="CVE"/>
		<reference ref_id="CVE-2019-3863" ref_url="https://www.suse.com/security/cve/CVE-2019-3863/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

Security issues fixed: 	  

- CVE-2019-3861: Fixed Out-of-bounds reads with specially crafted SSH packets (bsc#1128490).
- CVE-2019-3862: Fixed Out-of-bounds memory comparison with specially crafted message channel request packet (bsc#1128492).
- CVE-2019-3860: Fixed Out-of-bounds reads with specially crafted SFTP packets (bsc#1128481).
- CVE-2019-3863: Fixed an Integer overflow in user authenticate keyboard interactive which could allow out-of-bounds writes 
  with specially crafted keyboard responses (bsc#1128493).
- CVE-2019-3856: Fixed a potential Integer overflow in keyboard interactive handling which could allow out-of-bounds write 
  with specially crafted payload (bsc#1128472).
- CVE-2019-3859: Fixed Out-of-bounds reads with specially crafted payloads due to unchecked use of _libssh2_packet_require 
  and _libssh2_packet_requirev (bsc#1128480).
- CVE-2019-3855: Fixed a potential Integer overflow in transport read which could allow out-of-bounds write with specially 
  crafted payload (bsc#1128471).
- CVE-2019-3858: Fixed a potential zero-byte allocation which could lead to an out-of-bounds read with a specially crafted 
  SFTP packet (bsc#1128476).
- CVE-2019-3857: Fixed a potential Integer overflow which could lead to zero-byte allocation and out-of-bounds with specially 
  crafted message channel request SSH packet (bsc#1128474).

Other issue addressed: 

- Libbssh2 will stop using keys unsupported types in the known_hosts file (bsc#1091236).
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-20"/>
	<updated date="2019-03-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091236">SUSE bug 1091236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128471">SUSE bug 1128471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128472">SUSE bug 1128472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128474">SUSE bug 1128474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128476">SUSE bug 1128476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128480">SUSE bug 1128480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128490">SUSE bug 1128490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128492">SUSE bug 1128492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128493">SUSE bug 1128493</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3855/">CVE-2019-3855</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3856/">CVE-2019-3856</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3857/">CVE-2019-3857</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3858/">CVE-2019-3858</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3861/">CVE-2019-3861</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3862/">CVE-2019-3862</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3863/">CVE-2019-3863</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521685" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521686" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78628" version="1" class="patch">
	<metadata>
		<title>Security update for openwsman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1122623" ref_url="https://bugzilla.suse.com/1122623" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3816" ref_url="https://www.suse.com/security/cve/CVE-2019-3816/" source="CVE"/>
		<reference ref_id="CVE-2019-3833" ref_url="https://www.suse.com/security/cve/CVE-2019-3833/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005211.html" source="SUSE-SU"/>
		<description>
This update for openwsman fixes the following issues:

Security issues fixed:

- CVE-2019-3816: Fixed a vulnerability in openwsmand deamon which could lead to arbitary file disclosure (bsc#1122623).
- CVE-2019-3833: Fixed a vulnerability in process_connection() which could allow an attacker to trigger an infinite
  loop which leads to Denial of Service (bsc#1122623).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-20"/>
	<updated date="2019-03-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122623">SUSE bug 1122623</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3816/">CVE-2019-3816</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3833/">CVE-2019-3833</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521687" comment="libwsman1-2.4.11-21.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521688" comment="libwsman_clientpp1-2.4.11-21.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521689" comment="openwsman-server-2.4.11-21.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78629" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1127367" ref_url="https://bugzilla.suse.com/1127367" source="BUGZILLA"/>
		<reference ref_id="1127369" ref_url="https://bugzilla.suse.com/1127369" source="BUGZILLA"/>
		<reference ref_id="1127370" ref_url="https://bugzilla.suse.com/1127370" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9208" ref_url="https://www.suse.com/security/cve/CVE-2019-9208/" source="CVE"/>
		<reference ref_id="CVE-2019-9209" ref_url="https://www.suse.com/security/cve/CVE-2019-9209/" source="CVE"/>
		<reference ref_id="CVE-2019-9214" ref_url="https://www.suse.com/security/cve/CVE-2019-9214/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005216.html" source="SUSE-SU"/>
		<description>
This update for wireshark to version 2.4.13 fixes the following issues:

Security issues fixed:

- CVE-2019-9214: Avoided a dereference of a null coversation which could make RPCAP 
  dissector crash (bsc#1127367).
- CVE-2019-9209: Fixed a buffer overflow in time values which could make ASN.1 BER 
  and related dissectors crash (bsc#1127369).
- CVE-2019-9208: Fixed a null pointer dereference which could make TCAP dissector 
  crash (bsc#1127370).

Release notes: https://www.wireshark.org/docs/relnotes/wireshark-2.4.13.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-21"/>
	<updated date="2019-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1127367">SUSE bug 1127367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127369">SUSE bug 1127369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127370">SUSE bug 1127370</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9208/">CVE-2019-9208</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9209/">CVE-2019-9209</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9214/">CVE-2019-9214</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521690" comment="libwireshark9-2.4.13-48.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521691" comment="libwiretap7-2.4.13-48.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521692" comment="libwscodecs1-2.4.13-48.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521693" comment="libwsutil8-2.4.13-48.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521694" comment="wireshark-2.4.13-48.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521695" comment="wireshark-gtk-2.4.13-48.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78630" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1129186" ref_url="https://bugzilla.suse.com/1129186" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3838" ref_url="https://www.suse.com/security/cve/CVE-2019-3838/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005228.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issue:
	  
Security issue fixed:

- CVE-2019-3838: Fixed a vulnerability which made forceput operator in DefineResource to be still accessible
  which could allow access to file system outside of the constraints of -dSAFER (bsc#1129186).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-22"/>
	<updated date="2019-03-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129186">SUSE bug 1129186</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3838/">CVE-2019-3838</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521696" comment="ghostscript-9.26a-23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521697" comment="ghostscript-x11-9.26a-23.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78631" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1129231" ref_url="https://bugzilla.suse.com/1129231" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2019:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005232.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to the 20190312 bundle release (bsc#1129231)

New Platforms:

- AML-Y22      H0       6-8e-9/10           0000009e Core Gen8 Mobile
- WHL-U        W0       6-8e-b/d0           000000a4 Core Gen8 Mobile
- WHL-U        V0       6-8e-d/94           000000b2 Core Gen8 Mobile
- CFL-S        P0       6-9e-c/22           000000a2 Core Gen9 Desktop
- CFL-H        R0       6-9e-d/22           000000b0 Core Gen9 Mobile

Updated Platforms:

- HSX-E/EP     Cx/M1    6-3f-2/6f 0000003d-&gt;00000041 Core Gen4 X series; Xeon E5 v3
- HSX-EX       E0       6-3f-4/80 00000012-&gt;00000013 Xeon E7 v3
- SKX-SP       H0/M0/U0 6-55-4/b7 0200004d-&gt;0000005a Xeon Scalable
- SKX-D        M1       6-55-4/b7 0200004d-&gt;0000005a Xeon D-21xx
- BDX-DE       V1       6-56-2/10 00000017-&gt;00000019 Xeon D-1520/40
- BDX-DE       V2/3     6-56-3/10 07000013-&gt;07000016 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
- BDX-DE       Y0       6-56-4/10 0f000012-&gt;0f000014 Xeon D-1557/59/67/71/77/81/87
- BDX-NS       A0       6-56-5/10 0e00000a-&gt;0e00000c Xeon D-1513N/23/33/43/53
- APL          D0       6-5c-9/03 00000032-&gt;00000036 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
- APL          E0       6-5c-a/03 0000000c-&gt;00000010 Atom x5/7-E39xx
- GLK          B0       6-7a-1/01 00000028-&gt;0000002c Pentium Silver N/J5xxx, Celeron N/J4xxx
- KBL-U/Y      H0       6-8e-9/c0 0000008e-&gt;0000009a Core Gen7 Mobile
- CFL-U43e     D0       6-8e-a/c0 00000096-&gt;0000009e Core Gen8 Mobile
- KBL-H/S/E3   B0       6-9e-9/2a 0000008e-&gt;0000009a Core Gen7; Xeon E3 v6
- CFL-H/S/E3   U0       6-9e-a/22 00000096-&gt;000000aa Core Gen8 Desktop, Mobile, Xeon E
- CFL-S B0 6-9e-b/02 0000008e-&gt;000000aa Core Gen8

		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-25"/>
	<updated date="2019-03-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1129231">SUSE bug 1129231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521698" comment="ucode-intel-20190312-13.38.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78632" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1123361" ref_url="https://bugzilla.suse.com/1123361" source="BUGZILLA"/>
		<reference ref_id="1123522" ref_url="https://bugzilla.suse.com/1123522" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6977" ref_url="https://www.suse.com/security/cve/CVE-2019-6977/" source="CVE"/>
		<reference ref_id="CVE-2019-6978" ref_url="https://www.suse.com/security/cve/CVE-2019-6978/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005236.html" source="SUSE-SU"/>
		<description>
This update for gd fixes the following issues:

Security issues fixed:

- CVE-2019-6977: Fixed a heap-based buffer overflow the GD Graphics Library used in the imagecolormatch function (bsc#1123361).
- CVE-2019-6978: Fixed a double free in the gdImage*Ptr() functions (bsc#1123522).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-26"/>
	<updated date="2019-03-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123361">SUSE bug 1123361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123522">SUSE bug 1123522</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6977/">CVE-2019-6977</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6978/">CVE-2019-6978</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521699" comment="gd-2.1.0-24.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521700" comment="gd-32bit-2.1.0-24.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78633" version="1" class="patch">
	<metadata>
		<title>Security update for w3m (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1077559" ref_url="https://bugzilla.suse.com/1077559" source="BUGZILLA"/>
		<reference ref_id="1077568" ref_url="https://bugzilla.suse.com/1077568" source="BUGZILLA"/>
		<reference ref_id="1077572" ref_url="https://bugzilla.suse.com/1077572" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6196" ref_url="https://www.suse.com/security/cve/CVE-2018-6196/" source="CVE"/>
		<reference ref_id="CVE-2018-6197" ref_url="https://www.suse.com/security/cve/CVE-2018-6197/" source="CVE"/>
		<reference ref_id="CVE-2018-6198" ref_url="https://www.suse.com/security/cve/CVE-2018-6198/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005254.html" source="SUSE-SU"/>
		<description>
This update for w3m fixes several issues.

These security issues were fixed:

- CVE-2018-6196: Prevent infinite recursion in HTMLlineproc0 caused by the feed_table_block_tag function which did not prevent a negative indent value (bsc#1077559)
- CVE-2018-6197: Prevent NULL pointer dereference in formUpdateBuffer (bsc#1077568)
- CVE-2018-6198: w3m did not properly handle temporary files when the ~/.w3m directory is unwritable, which allowed a local attacker to craft a symlink attack to overwrite arbitrary files (bsc#1077572)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-27"/>
	<updated date="2019-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077559">SUSE bug 1077559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077568">SUSE bug 1077568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077572">SUSE bug 1077572</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6196/">CVE-2018-6196</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6197/">CVE-2018-6197</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6198/">CVE-2018-6198</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521701" comment="w3m-0.5.3.git20161120-161.3.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78634" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1125401" ref_url="https://bugzilla.suse.com/1125401" source="BUGZILLA"/>
		<reference ref_id="1128525" ref_url="https://bugzilla.suse.com/1128525" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8936" ref_url="https://www.suse.com/security/cve/CVE-2019-8936/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005258.html" source="SUSE-SU"/>
		<description>
This update for ntp fixes the following issues:

Security issue fixed: 	  

- CVE-2019-8936: Fixed a null pointer exception which could allow an authenticated attcker to cause 
  segmentation fault to ntpd (bsc#1128525).

Other isses addressed:

- Fixed an issue which caused openSSL mismatch (bsc#1125401)
- Fixed several bugs in the BANCOMM reclock driver.
- Fixed ntp_loopfilter.c snprintf compilation warnings.
- Fixed spurious initgroups() error message.
- Fixed STA_NANO struct timex units.
- Fixed GPS week rollover in libparse.
- Fixed incorrect poll interval in packet.
- Added a missing check for ENABLE_CMAC.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-28"/>
	<updated date="2019-03-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1125401">SUSE bug 1125401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128525">SUSE bug 1128525</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8936/">CVE-2019-8936</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521702" comment="ntp-4.2.8p13-85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521703" comment="ntp-doc-4.2.8p13-85.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78635" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1020413" ref_url="https://bugzilla.suse.com/1020413" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1070767" ref_url="https://bugzilla.suse.com/1070767" source="BUGZILLA"/>
		<reference ref_id="1075697" ref_url="https://bugzilla.suse.com/1075697" source="BUGZILLA"/>
		<reference ref_id="1082943" ref_url="https://bugzilla.suse.com/1082943" source="BUGZILLA"/>
		<reference ref_id="1087092" ref_url="https://bugzilla.suse.com/1087092" source="BUGZILLA"/>
		<reference ref_id="1090435" ref_url="https://bugzilla.suse.com/1090435" source="BUGZILLA"/>
		<reference ref_id="1102959" ref_url="https://bugzilla.suse.com/1102959" source="BUGZILLA"/>
		<reference ref_id="1103429" ref_url="https://bugzilla.suse.com/1103429" source="BUGZILLA"/>
		<reference ref_id="1106929" ref_url="https://bugzilla.suse.com/1106929" source="BUGZILLA"/>
		<reference ref_id="1109137" ref_url="https://bugzilla.suse.com/1109137" source="BUGZILLA"/>
		<reference ref_id="1109248" ref_url="https://bugzilla.suse.com/1109248" source="BUGZILLA"/>
		<reference ref_id="1119019" ref_url="https://bugzilla.suse.com/1119019" source="BUGZILLA"/>
		<reference ref_id="1119843" ref_url="https://bugzilla.suse.com/1119843" source="BUGZILLA"/>
		<reference ref_id="1120691" ref_url="https://bugzilla.suse.com/1120691" source="BUGZILLA"/>
		<reference ref_id="1120902" ref_url="https://bugzilla.suse.com/1120902" source="BUGZILLA"/>
		<reference ref_id="1121713" ref_url="https://bugzilla.suse.com/1121713" source="BUGZILLA"/>
		<reference ref_id="1121805" ref_url="https://bugzilla.suse.com/1121805" source="BUGZILLA"/>
		<reference ref_id="1124235" ref_url="https://bugzilla.suse.com/1124235" source="BUGZILLA"/>
		<reference ref_id="1125315" ref_url="https://bugzilla.suse.com/1125315" source="BUGZILLA"/>
		<reference ref_id="1125446" ref_url="https://bugzilla.suse.com/1125446" source="BUGZILLA"/>
		<reference ref_id="1126389" ref_url="https://bugzilla.suse.com/1126389" source="BUGZILLA"/>
		<reference ref_id="1126772" ref_url="https://bugzilla.suse.com/1126772" source="BUGZILLA"/>
		<reference ref_id="1126773" ref_url="https://bugzilla.suse.com/1126773" source="BUGZILLA"/>
		<reference ref_id="1126805" ref_url="https://bugzilla.suse.com/1126805" source="BUGZILLA"/>
		<reference ref_id="1127082" ref_url="https://bugzilla.suse.com/1127082" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1127561" ref_url="https://bugzilla.suse.com/1127561" source="BUGZILLA"/>
		<reference ref_id="1127725" ref_url="https://bugzilla.suse.com/1127725" source="BUGZILLA"/>
		<reference ref_id="1127731" ref_url="https://bugzilla.suse.com/1127731" source="BUGZILLA"/>
		<reference ref_id="1127961" ref_url="https://bugzilla.suse.com/1127961" source="BUGZILLA"/>
		<reference ref_id="1128166" ref_url="https://bugzilla.suse.com/1128166" source="BUGZILLA"/>
		<reference ref_id="1128452" ref_url="https://bugzilla.suse.com/1128452" source="BUGZILLA"/>
		<reference ref_id="1128565" ref_url="https://bugzilla.suse.com/1128565" source="BUGZILLA"/>
		<reference ref_id="1128696" ref_url="https://bugzilla.suse.com/1128696" source="BUGZILLA"/>
		<reference ref_id="1128756" ref_url="https://bugzilla.suse.com/1128756" source="BUGZILLA"/>
		<reference ref_id="1128893" ref_url="https://bugzilla.suse.com/1128893" source="BUGZILLA"/>
		<reference ref_id="1129080" ref_url="https://bugzilla.suse.com/1129080" source="BUGZILLA"/>
		<reference ref_id="1129179" ref_url="https://bugzilla.suse.com/1129179" source="BUGZILLA"/>
		<reference ref_id="1129237" ref_url="https://bugzilla.suse.com/1129237" source="BUGZILLA"/>
		<reference ref_id="1129238" ref_url="https://bugzilla.suse.com/1129238" source="BUGZILLA"/>
		<reference ref_id="1129239" ref_url="https://bugzilla.suse.com/1129239" source="BUGZILLA"/>
		<reference ref_id="1129240" ref_url="https://bugzilla.suse.com/1129240" source="BUGZILLA"/>
		<reference ref_id="1129241" ref_url="https://bugzilla.suse.com/1129241" source="BUGZILLA"/>
		<reference ref_id="1129413" ref_url="https://bugzilla.suse.com/1129413" source="BUGZILLA"/>
		<reference ref_id="1129414" ref_url="https://bugzilla.suse.com/1129414" source="BUGZILLA"/>
		<reference ref_id="1129415" ref_url="https://bugzilla.suse.com/1129415" source="BUGZILLA"/>
		<reference ref_id="1129416" ref_url="https://bugzilla.suse.com/1129416" source="BUGZILLA"/>
		<reference ref_id="1129417" ref_url="https://bugzilla.suse.com/1129417" source="BUGZILLA"/>
		<reference ref_id="1129418" ref_url="https://bugzilla.suse.com/1129418" source="BUGZILLA"/>
		<reference ref_id="1129419" ref_url="https://bugzilla.suse.com/1129419" source="BUGZILLA"/>
		<reference ref_id="1129581" ref_url="https://bugzilla.suse.com/1129581" source="BUGZILLA"/>
		<reference ref_id="1129770" ref_url="https://bugzilla.suse.com/1129770" source="BUGZILLA"/>
		<reference ref_id="1129923" ref_url="https://bugzilla.suse.com/1129923" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2024" ref_url="https://www.suse.com/security/cve/CVE-2019-2024/" source="CVE"/>
		<reference ref_id="CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005261.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.176 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).
- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).

The following non-security bugs were fixed:

- ax25: fix possible use-after-free (bnc#1012382).
- block_dev: fix crash on chained bios with O_DIRECT (bsc#1090435).
- block: do not use bio-&gt;bi_vcnt to figure out segment number (bsc#1128893).
- bnxt_re: Fix couple of memory leaks that could lead to IOMMU call traces (bsc#1020413).
- bpf: fix replace_map_fd_with_map_ptr's ldimm64 second imm field (bsc#1012382).
- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128452).
- ceph: avoid repeatedly adding inode to mdsc-&gt;snap_flush_list (bsc#1126773).
- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).
- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).
- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).
- device property: Fix the length used in PROPERTY_ENTRY_STRING() (bsc#1129770).
- drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389).
- drm: Fix error handling in drm_legacy_addctx (bsc#1106929)
- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1106929)
- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1106929)
- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1106929)
- drm/vmwgfx: Do not double-free the mode stored in par-&gt;set_mode (bsc#1103429)
- enic: add wq clean up budget (bsc#1075697, bsc#1120691. bsc#1102959).
- enic: do not overwrite error code (bnc#1012382).
- fbdev: chipsfb: remove set but not used variable 'size' (bsc#1106929)
- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).
- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- input: mms114 - fix license module information (bsc#1087092).
- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129237).
- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129238).
- iommu/vt-d: Check identity map for hot-added devices (bsc#1129239).
- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129240).
- ixgbe: fix crash in build_skb Rx code path (git-fixes).
- kabi: protect struct inet_peer (kabi).
- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).
- KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).
- kvm: arm/arm64: vgic-its: Check CBASER/BASER validity before enabling the ITS (bsc#1109248).
- kvm: arm/arm64: vgic-its: Check GITS_BASER Valid bit before saving tables (bsc#1109248).
- kvm: arm/arm64: vgic-its: Fix return value for device table restore (bsc#1109248).
- kvm: arm/arm64: vgic-its: Fix vgic_its_restore_collection_table returned value (bsc#1109248).
- kvm: nVMX: Do not halt vcpu when L1 is injecting events to L2 (bsc#1129413).
- kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129414).
- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129415).
- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129416).
- kvm: VMX: Do not allow reexecute_instruction() when skipping MMIO instr (bsc#1129417).
- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129418).
- kvm: x86: Add AMD's EX_CFG to the list of ignored MSRs (bsc#1127082).
- kvm: x86: IA32_ARCH_CAPABILITIES is always supported (bsc#1129419).
- libceph: handle an empty authorize reply (bsc#1126772).
- mdio_bus: Fix use-after-free on device_register fails (git-fixes).
- mfd: as3722: Handle interrupts on suspend (bnc#1012382).
- mfd: as3722: Mark PM functions as __maybe_unused (bnc#1012382).
- mISDN: fix a race in dev_expire_timer() (bnc#1012382).
- mlxsw: pci: Correctly determine if descriptor queue is full (git-fixes).
- mlxsw: reg: Use correct offset in field definiton (git-fixes).
- mm, devm_memremap_pages: mark devm_memremap_pages() EXPORT_SYMBOL_GPL (bnc#1012382).
- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).
- net: Add header for usage of fls64() (bnc#1012382).
- net: Do not allocate page fragments that are not skb aligned (bnc#1012382).
- net: dsa: bcm_sf2: Do not assume DSA master supports WoL (git-fixes).
- net: dsa: mv88e6xxx: fix port VLAN maps (git-fixes).
- net: Fix for_each_netdev_feature on Big endian (bnc#1012382).
- net: fix IPv6 prefix route residue (bnc#1012382).
- net/hamradio/6pack: Convert timers to use timer_setup() (git-fixes).
- net/hamradio/6pack: use mod_timer() to rearm timers (git-fixes).
- net: ipv4: use a dedicated counter for icmp_v4 redirect packets (bnc#1012382).
- net: lan78xx: Fix race in tx pending skb size calculation (git-fixes).
- net/mlx4_core: drop useless LIST_HEAD (git-fixes).
- net/mlx4_core: Fix qp mtt size calculation (git-fixes).
- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).
- net/mlx4: Fix endianness issue in qp context params (git-fixes).
- net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).
- net/mlx5e: Fix TCP checksum in LRO buffers (git-fixes).
- net/mlx5: Fix driver load bad flow when having fw initializing timeout (git-fixes).
- net/mlx5: fix uaccess beyond 'count' in debugfs read/write handlers (git-fixes).
- net/mlx5: Fix use-after-free in self-healing flow (git-fixes).
- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).
- net: mv643xx_eth: fix packet corruption with TSO and tiny unaligned packets (git-fixes).
- net: phy: Avoid polling PHY with PHY_IGNORE_INTERRUPTS (git-fixes).
- net: phy: bcm7xxx: Fix shadow mode 2 disabling (git-fixes).
- net: qca_spi: Fix race condition in spi transfers (git-fixes).
- net: stmmac: Fix a race in EEE enable callback (bnc#1012382).
- net: stmmac: Fix a race in EEE enable callback (git-fixes).
- net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (git-fixes).
- net/x25: do not hold the cpu too long in x25_new_lci() (bnc#1012382).
- PCI/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1129241).
- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).
- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).
- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).
- perf/x86/intel: Fix memory corruption (bsc#1121805).
- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).
- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).
- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).
- phy: micrel: Ensure interrupts are reenabled on resume (git-fixes).
- powerpc/pseries: Add CPU dlpar remove functionality (bsc#1128756).
- powerpc/pseries: Consolidate CPU hotplug code to hotplug-cpu.c (bsc#1128756).
- powerpc/pseries: Factor out common cpu hotplug code (bsc#1128756).
- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1128756).
- pppoe: fix reception of frames with no mac header (git-fixes).
- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).
- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).
- rdma/bnxt_re: Synchronize destroy_qp with poll_cq (bsc#1125446).
- Revert 'mm, devm_memremap_pages: mark devm_memremap_pages() EXPORT_SYMBOL_GPL' (bnc#1012382).
- Revert 'x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls' (bsc#1128565).
- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).
- scsi: aacraid: Fix missing break in switch statement (bsc#1128696).
- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- scsi: lpfc: do not set queue-&gt;page_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1127725).
- scsi: qla2xxx: Fix early srb free on abort (bsc#1121713).
- scsi: qla2xxx: Fix for double free of SRB structure (bsc#1121713).
- scsi: qla2xxx: Increase abort timeout value (bsc#1121713).
- scsi: qla2xxx: Move {get|rel}_sp to base_qpair struct (bsc#1121713).
- scsi: qla2xxx: Return switch command on a timeout (bsc#1121713).
- scsi: qla2xxx: Turn off IOCB timeout timer on IOCB completion (bsc#1121713).
- scsi: qla2xxx: Use correct qpair for ABTS/CMD (bsc#1121713).
- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).
- sky2: Increase D3 delay again (bnc#1012382).
- tcp: clear icsk_backoff in tcp_write_queue_purge() (bnc#1012382).
- tcp: tcp_v4_err() should be more careful (bnc#1012382).
- team: avoid complex list operations in team_nl_cmd_options_set() (bnc#1012382).
- team: Free BPF filter when unregistering netdev (git-fixes).
- tracing: Do not free iter-&gt;trace in fail path of tracing_open_pipe() (bsc#1129581).
- vsock: cope with memory allocation failure at socket creation time (bnc#1012382).
- vxlan: test dev-&gt;flags &amp; IFF_UP before calling netif_rx() (bnc#1012382).
- wireless: airo: potential buffer overflow in sprintf() (bsc#1120902).
- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).
- x86: Fix incorrect value for X86_FEATURE_TSX_FORCE_ABORT
- x86: livepatch: Treat R_X86_64_PLT32 as R_X86_64_PC32 (bnc#1012382).
- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).
- xen: remove pre-xen3 fallback handlers (bsc#1065600).
- xfs: remove filestream item xfs_inode reference (bsc#1127961).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020413">SUSE bug 1020413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070767">SUSE bug 1070767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075697">SUSE bug 1075697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082943">SUSE bug 1082943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087092">SUSE bug 1087092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090435">SUSE bug 1090435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102959">SUSE bug 1102959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103429">SUSE bug 1103429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106929">SUSE bug 1106929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109137">SUSE bug 1109137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109248">SUSE bug 1109248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119019">SUSE bug 1119019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119843">SUSE bug 1119843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120691">SUSE bug 1120691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120902">SUSE bug 1120902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121713">SUSE bug 1121713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121805">SUSE bug 1121805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124235">SUSE bug 1124235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125315">SUSE bug 1125315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125446">SUSE bug 1125446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126389">SUSE bug 1126389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126772">SUSE bug 1126772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126773">SUSE bug 1126773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126805">SUSE bug 1126805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127082">SUSE bug 1127082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127561">SUSE bug 1127561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127725">SUSE bug 1127725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127731">SUSE bug 1127731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127961">SUSE bug 1127961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128166">SUSE bug 1128166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128452">SUSE bug 1128452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128565">SUSE bug 1128565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128696">SUSE bug 1128696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128756">SUSE bug 1128756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128893">SUSE bug 1128893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129080">SUSE bug 1129080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129179">SUSE bug 1129179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129237">SUSE bug 1129237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129238">SUSE bug 1129238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129239">SUSE bug 1129239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129240">SUSE bug 1129240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129241">SUSE bug 1129241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129413">SUSE bug 1129413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129414">SUSE bug 1129414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129415">SUSE bug 1129415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129416">SUSE bug 1129416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129417">SUSE bug 1129417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129418">SUSE bug 1129418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129419">SUSE bug 1129419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129581">SUSE bug 1129581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129770">SUSE bug 1129770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129923">SUSE bug 1129923</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2024/">CVE-2019-2024</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521704" comment="kernel-default-4.4.176-94.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521705" comment="kernel-default-devel-4.4.176-94.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521706" comment="kernel-default-extra-4.4.176-94.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521707" comment="kernel-devel-4.4.176-94.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521708" comment="kernel-macros-4.4.176-94.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521709" comment="kernel-source-4.4.176-94.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521710" comment="kernel-syms-4.4.176-94.88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78636" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1100078" ref_url="https://bugzilla.suse.com/1100078" source="BUGZILLA"/>
		<reference ref_id="1113975" ref_url="https://bugzilla.suse.com/1113975" source="BUGZILLA"/>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1127080" ref_url="https://bugzilla.suse.com/1127080" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1559" ref_url="https://www.suse.com/security/cve/CVE-2019-1559/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005266.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed: 

- The 9 Lives of Bleichenbacher's CAT: Cache Attacks on TLS Implementations (bsc#1117951)
- CVE-2019-1559: Fixed OpenSSL 0-byte Record Padding Oracle which under certain circumstances
  a TLS server can be forced to respond differently to a client and lead to the decryption of the data (bsc#1127080).

Other issues addressed: 

- Fixed IV handling in SHAEXT paths: aes/asm/aesni-sha*-x86_64.pl (bsc#1113975).
- Set TLS version to 0 in msg_callback for record messages to avoid confusing applications (bsc#1100078).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100078">SUSE bug 1100078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113975">SUSE bug 1113975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127080">SUSE bug 1127080</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1559/">CVE-2019-1559</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521711" comment="libopenssl-devel-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521712" comment="libopenssl1_0_0-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521713" comment="libopenssl1_0_0-32bit-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521714" comment="openssl-1.0.2j-60.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78637" version="1" class="patch">
	<metadata>
		<title>Recommended update for adcli, sssd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1109849" ref_url="https://bugzilla.suse.com/1109849" source="BUGZILLA"/>
		<reference ref_id="1110121" ref_url="https://bugzilla.suse.com/1110121" source="BUGZILLA"/>
		<reference ref_id="1121759" ref_url="https://bugzilla.suse.com/1121759" source="BUGZILLA"/>
		<reference ref_id="1125617" ref_url="https://bugzilla.suse.com/1125617" source="BUGZILLA"/>
		<reference ref_id="1127670" ref_url="https://bugzilla.suse.com/1127670" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3811" ref_url="https://www.suse.com/security/cve/CVE-2019-3811/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005264.html" source="SUSE-SU"/>
		<description>

This update for adcli and sssd provides the following improvement:

Security vulnerability fixed:

- CVE-2019-3811: Fix fallback_homedir returning '/' for empty home directories
  (bsc#1121759)

Other fixes:

- Add an option to disable checking for trusted domains in the subdomains provider (bsc#1125617)
- Clear pid file in corner cases (bsc#1127670)
- Fix child unable to write to log file after SIGHUP (bsc#1127670)
- Include adcli in SUSE Linux Enterprise 12 SP3 for sssd-ad. (fate#326619, bsc#1109849)

The adcli enables sssd to do password renewal when using Active Directory.
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1109849">SUSE bug 1109849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110121">SUSE bug 1110121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121759">SUSE bug 1121759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125617">SUSE bug 1125617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127670">SUSE bug 1127670</bugzilla>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3811/">CVE-2019-3811</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521715" comment="adcli-0.8.2-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521716" comment="libipa_hbac0-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521717" comment="libsss_idmap0-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521718" comment="libsss_nss_idmap0-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521719" comment="libsss_sudo-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521720" comment="python-sssd-config-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521721" comment="sssd-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521722" comment="sssd-32bit-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521723" comment="sssd-ad-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521724" comment="sssd-ipa-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521725" comment="sssd-krb5-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521726" comment="sssd-krb5-common-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521727" comment="sssd-ldap-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521728" comment="sssd-proxy-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521729" comment="sssd-tools-1.13.4-34.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78638" version="1" class="patch">
	<metadata>
		<title>Security update for sssd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1010700" ref_url="https://bugzilla.suse.com/1010700" source="BUGZILLA"/>
		<reference ref_id="1072728" ref_url="https://bugzilla.suse.com/1072728" source="BUGZILLA"/>
		<reference ref_id="1080156" ref_url="https://bugzilla.suse.com/1080156" source="BUGZILLA"/>
		<reference ref_id="1087320" ref_url="https://bugzilla.suse.com/1087320" source="BUGZILLA"/>
		<reference ref_id="1098377" ref_url="https://bugzilla.suse.com/1098377" source="BUGZILLA"/>
		<reference ref_id="1101877" ref_url="https://bugzilla.suse.com/1101877" source="BUGZILLA"/>
		<reference ref_id="1110299" ref_url="https://bugzilla.suse.com/1110299" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10852" ref_url="https://www.suse.com/security/cve/CVE-2018-10852/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005031.html" source="SUSE-SU"/>
		<description>
This update for sssd provides the following fixes:

This security issue was fixed:

- CVE-2018-10852: Set stricter permissions on /var/lib/sss/pipes/sudo to prevent the disclosure of sudo rules for arbitrary users (bsc#1098377)

These non-security issues were fixed:

- Fix a segmentation fault in sss_cache command. (bsc#1072728)
- Fix a failure in autofs initialisation sequence upon system boot. (bsc#1010700)
- Fix race condition on boot between SSSD and autofs. (bsc#1010700)
- Fix a bug where file descriptors were not closed (bsc#1080156)
- Fix an issue where sssd logs were not rotated properly (bsc#1080156)
- Remove whitespaces from netgroup entries (bsc#1087320)
- Remove misleading log messages (bsc#1101877)
- exit() the forked process if exec()-ing a child process fails (bsc#1110299)
- Do not schedule the machine renewal task if adcli is not executable (bsc#1110299)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-11"/>
	<updated date="2019-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010700">SUSE bug 1010700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072728">SUSE bug 1072728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080156">SUSE bug 1080156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087320">SUSE bug 1087320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098377">SUSE bug 1098377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101877">SUSE bug 1101877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110299">SUSE bug 1110299</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10852/">CVE-2018-10852</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521730" comment="libipa_hbac0-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521731" comment="libsss_idmap0-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521732" comment="libsss_nss_idmap0-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521733" comment="libsss_sudo-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521734" comment="python-sssd-config-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521735" comment="sssd-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521736" comment="sssd-32bit-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521737" comment="sssd-ad-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521738" comment="sssd-ipa-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521739" comment="sssd-krb5-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521740" comment="sssd-krb5-common-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521741" comment="sssd-ldap-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521742" comment="sssd-proxy-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521743" comment="sssd-tools-1.13.4-34.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78639" version="1" class="patch">
	<metadata>
		<title>Security update for bash (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1130324" ref_url="https://bugzilla.suse.com/1130324" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9924" ref_url="https://www.suse.com/security/cve/CVE-2019-9924/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005282.html" source="SUSE-SU"/>
		<description>
This update for bash fixes the following issues:
	  
Security issue fixed: 

- CVE-2019-9924: Fixed a vulnerability in which shell did not prevent user BASH_CMDS 
  allowing the user to execute any command with the permissions of the shell (bsc#1130324).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-02"/>
	<updated date="2019-04-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130324">SUSE bug 1130324</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9924/">CVE-2019-9924</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521744" comment="bash-4.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521745" comment="bash-doc-4.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521746" comment="bash-lang-4.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521747" comment="libreadline6-6.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521748" comment="libreadline6-32bit-6.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521749" comment="readline-doc-6.3-83.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78640" version="1" class="patch">
	<metadata>
		<title>Security update for file (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1096974" ref_url="https://bugzilla.suse.com/1096974" source="BUGZILLA"/>
		<reference ref_id="1096984" ref_url="https://bugzilla.suse.com/1096984" source="BUGZILLA"/>
		<reference ref_id="1126117" ref_url="https://bugzilla.suse.com/1126117" source="BUGZILLA"/>
		<reference ref_id="1126118" ref_url="https://bugzilla.suse.com/1126118" source="BUGZILLA"/>
		<reference ref_id="1126119" ref_url="https://bugzilla.suse.com/1126119" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10360" ref_url="https://www.suse.com/security/cve/CVE-2018-10360/" source="CVE"/>
		<reference ref_id="CVE-2019-8905" ref_url="https://www.suse.com/security/cve/CVE-2019-8905/" source="CVE"/>
		<reference ref_id="CVE-2019-8906" ref_url="https://www.suse.com/security/cve/CVE-2019-8906/" source="CVE"/>
		<reference ref_id="CVE-2019-8907" ref_url="https://www.suse.com/security/cve/CVE-2019-8907/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005284.html" source="SUSE-SU"/>
		<description>
This update for file fixes the following issues:

The following security vulnerabilities were addressed:

- Fixed an out-of-bounds read in the function do_core_note in readelf.c, which
  allowed remote attackers to cause a denial of service (application crash) via
  a crafted ELF file (bsc#1096974 CVE-2018-10360).
- CVE-2019-8905: Fixed a stack-based buffer over-read in do_core_note in readelf.c
  (bsc#1126118)
- CVE-2019-8906: Fixed an out-of-bounds read in do_core_note in readelf. c
  (bsc#1126119)
- CVE-2019-8907: Fixed a stack corruption in do_core_note in readelf.c
  (bsc#1126117)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-02"/>
	<updated date="2019-04-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1096974">SUSE bug 1096974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096984">SUSE bug 1096984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126117">SUSE bug 1126117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126118">SUSE bug 1126118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126119">SUSE bug 1126119</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10360/">CVE-2018-10360</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8905/">CVE-2019-8905</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8906/">CVE-2019-8906</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8907/">CVE-2019-8907</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521750" comment="file-5.22-10.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521751" comment="file-magic-5.22-10.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521752" comment="libmagic1-5.22-10.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521753" comment="libmagic1-32bit-5.22-10.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78641" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1125330" ref_url="https://bugzilla.suse.com/1125330" source="BUGZILLA"/>
		<reference ref_id="1127987" ref_url="https://bugzilla.suse.com/1127987" source="BUGZILLA"/>
		<reference ref_id="1129821" ref_url="https://bugzilla.suse.com/1129821" source="BUGZILLA"/>
		<reference ref_id="1130262" ref_url="https://bugzilla.suse.com/1130262" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18335" ref_url="https://www.suse.com/security/cve/CVE-2018-18335/" source="CVE"/>
		<reference ref_id="CVE-2018-18356" ref_url="https://www.suse.com/security/cve/CVE-2018-18356/" source="CVE"/>
		<reference ref_id="CVE-2018-18506" ref_url="https://www.suse.com/security/cve/CVE-2018-18506/" source="CVE"/>
		<reference ref_id="CVE-2019-5785" ref_url="https://www.suse.com/security/cve/CVE-2019-5785/" source="CVE"/>
		<reference ref_id="CVE-2019-9788" ref_url="https://www.suse.com/security/cve/CVE-2019-9788/" source="CVE"/>
		<reference ref_id="CVE-2019-9790" ref_url="https://www.suse.com/security/cve/CVE-2019-9790/" source="CVE"/>
		<reference ref_id="CVE-2019-9791" ref_url="https://www.suse.com/security/cve/CVE-2019-9791/" source="CVE"/>
		<reference ref_id="CVE-2019-9792" ref_url="https://www.suse.com/security/cve/CVE-2019-9792/" source="CVE"/>
		<reference ref_id="CVE-2019-9793" ref_url="https://www.suse.com/security/cve/CVE-2019-9793/" source="CVE"/>
		<reference ref_id="CVE-2019-9794" ref_url="https://www.suse.com/security/cve/CVE-2019-9794/" source="CVE"/>
		<reference ref_id="CVE-2019-9795" ref_url="https://www.suse.com/security/cve/CVE-2019-9795/" source="CVE"/>
		<reference ref_id="CVE-2019-9796" ref_url="https://www.suse.com/security/cve/CVE-2019-9796/" source="CVE"/>
		<reference ref_id="CVE-2019-9801" ref_url="https://www.suse.com/security/cve/CVE-2019-9801/" source="CVE"/>
		<reference ref_id="CVE-2019-9810" ref_url="https://www.suse.com/security/cve/CVE-2019-9810/" source="CVE"/>
		<reference ref_id="CVE-2019-9813" ref_url="https://www.suse.com/security/cve/CVE-2019-9813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issuess addressed:	  

- update to Firefox ESR 60.6.1 (bsc#1130262):

- CVE-2019-9813: Fixed Ionmonkey type confusion with __proto__ mutations
- CVE-2019-9810: Fixed IonMonkey MArraySlice incorrect alias information

- Update to Firefox ESR 60.6 (bsc#1129821):

- CVE-2018-18506: Fixed an issue with Proxy Auto-Configuration file 
- CVE-2019-9801: Fixed an issue which could allow Windows programs to be exposed to web content
- CVE-2019-9788: Fixed multiple memory safety bugs
- CVE-2019-9790: Fixed a Use-after-free vulnerability when removing in-use DOM elements
- CVE-2019-9791: Fixed an incorrect Type inference for constructors entered through on-stack replacement 
  with IonMonkey
- CVE-2019-9792: Fixed an issue where IonMonkey leaks JS_OPTIMIZED_OUT magic value to script
- CVE-2019-9793: Fixed multiple improper bounds checks when Spectre mitigations are disabled
- CVE-2019-9794: Fixed an issue where command line arguments not discarded during execution
- CVE-2019-9795: Fixed a Type-confusion vulnerability in IonMonkey JIT compiler
- CVE-2019-9796: Fixed a Use-after-free vulnerability in SMIL animation controller


- Update to Firefox ESR 60.5.1 (bsc#1125330):

- CVE-2018-18356: Fixed a use-after-free vulnerability in the Skia library which can occur when
    creating a path, leading to a potentially exploitable crash.
- CVE-2019-5785: Fixed an integer overflow vulnerability in the Skia library which can occur
  after specific transform operations, leading to a potentially exploitable crash.
- CVE-2018-18335: Fixed a buffer overflow vulnerability in the Skia library which can occur with
  Canvas 2D acceleration on macOS. This issue was addressed by disabling Canvas 2D acceleration 
  in Firefox ESR.  Note: this does not affect other versions and platforms where Canvas 2D
  acceleration is already disabled by default.

Other issue addressed: 

- Fixed an issue with MozillaFirefox-translations-common which was causing error on update (bsc#1127987).

Release notes: https://www.mozilla.org/en-US/security/advisories/mfsa2019-12/
Release notes: https://www.mozilla.org/en-US/security/advisories/mfsa2019-08/
Release notes: https://www.mozilla.org/en-US/security/advisories/mfsa2019-05/	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-03"/>
	<updated date="2019-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1125330">SUSE bug 1125330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127987">SUSE bug 1127987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130262">SUSE bug 1130262</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18335/">CVE-2018-18335</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18356/">CVE-2018-18356</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18506/">CVE-2018-18506</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5785/">CVE-2019-5785</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9788/">CVE-2019-9788</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9790/">CVE-2019-9790</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9791/">CVE-2019-9791</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9792/">CVE-2019-9792</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9793/">CVE-2019-9793</cve>
	<cve impact="important" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9794/">CVE-2019-9794</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9795/">CVE-2019-9795</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9796/">CVE-2019-9796</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-9801/">CVE-2019-9801</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9810/">CVE-2019-9810</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9813/">CVE-2019-9813</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78642" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1130721" ref_url="https://bugzilla.suse.com/1130721" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1787" ref_url="https://www.suse.com/security/cve/CVE-2019-1787/" source="CVE"/>
		<reference ref_id="CVE-2019-1788" ref_url="https://www.suse.com/security/cve/CVE-2019-1788/" source="CVE"/>
		<reference ref_id="CVE-2019-1789" ref_url="https://www.suse.com/security/cve/CVE-2019-1789/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005308.html" source="SUSE-SU"/>
		<description>
This update for clamav to version 0.100.3 fixes the following issues:

Security issues fixed (bsc#1130721): 	  

- CVE-2019-1787: Fixed an out-of-bounds heap read condition which may occur
  when scanning PDF documents.   
- CVE-2019-1789: Fixed an out-of-bounds heap read condition which may occur
  when scanning PE files (i.e. Windows EXE and DLL files).
- CVE-2019-1788: Fixed an out-of-bounds heap write condition which may occur
  when scanning OLE2 files such as Microsoft Office 97-2003 documents. 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-08"/>
	<updated date="2019-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1787/">CVE-2019-1787</cve>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-1788/">CVE-2019-1788</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1789/">CVE-2019-1789</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521756" comment="clamav-0.100.3-33.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78643" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1124799" ref_url="https://bugzilla.suse.com/1124799" source="BUGZILLA"/>
		<reference ref_id="1124800" ref_url="https://bugzilla.suse.com/1124800" source="BUGZILLA"/>
		<reference ref_id="1124802" ref_url="https://bugzilla.suse.com/1124802" source="BUGZILLA"/>
		<reference ref_id="1124803" ref_url="https://bugzilla.suse.com/1124803" source="BUGZILLA"/>
		<reference ref_id="1124805" ref_url="https://bugzilla.suse.com/1124805" source="BUGZILLA"/>
		<reference ref_id="1124806" ref_url="https://bugzilla.suse.com/1124806" source="BUGZILLA"/>
		<reference ref_id="1124824" ref_url="https://bugzilla.suse.com/1124824" source="BUGZILLA"/>
		<reference ref_id="1124825" ref_url="https://bugzilla.suse.com/1124825" source="BUGZILLA"/>
		<reference ref_id="1124826" ref_url="https://bugzilla.suse.com/1124826" source="BUGZILLA"/>
		<reference ref_id="1124827" ref_url="https://bugzilla.suse.com/1124827" source="BUGZILLA"/>
		<reference ref_id="1125099" ref_url="https://bugzilla.suse.com/1125099" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-7572" ref_url="https://www.suse.com/security/cve/CVE-2019-7572/" source="CVE"/>
		<reference ref_id="CVE-2019-7573" ref_url="https://www.suse.com/security/cve/CVE-2019-7573/" source="CVE"/>
		<reference ref_id="CVE-2019-7574" ref_url="https://www.suse.com/security/cve/CVE-2019-7574/" source="CVE"/>
		<reference ref_id="CVE-2019-7575" ref_url="https://www.suse.com/security/cve/CVE-2019-7575/" source="CVE"/>
		<reference ref_id="CVE-2019-7576" ref_url="https://www.suse.com/security/cve/CVE-2019-7576/" source="CVE"/>
		<reference ref_id="CVE-2019-7577" ref_url="https://www.suse.com/security/cve/CVE-2019-7577/" source="CVE"/>
		<reference ref_id="CVE-2019-7578" ref_url="https://www.suse.com/security/cve/CVE-2019-7578/" source="CVE"/>
		<reference ref_id="CVE-2019-7635" ref_url="https://www.suse.com/security/cve/CVE-2019-7635/" source="CVE"/>
		<reference ref_id="CVE-2019-7636" ref_url="https://www.suse.com/security/cve/CVE-2019-7636/" source="CVE"/>
		<reference ref_id="CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637/" source="CVE"/>
		<reference ref_id="CVE-2019-7638" ref_url="https://www.suse.com/security/cve/CVE-2019-7638/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005311.html" source="SUSE-SU"/>
		<description>
This update for SDL fixes the following issues:
	  
Security issues fixed:	  

- CVE-2019-7572: Fixed a buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c.(bsc#1124806).
- CVE-2019-7578: Fixed a heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c (bsc#1125099).
- CVE-2019-7576: Fixed heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (bsc#1124799).
- CVE-2019-7573: Fixed a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (bsc#1124805).
- CVE-2019-7635: Fixed a heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c. (bsc#1124827).
- CVE-2019-7636: Fixed a heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c (bsc#1124826).
- CVE-2019-7638: Fixed a heap-based buffer over-read in Map1toN in video/SDL_pixels.c (bsc#1124824).
- CVE-2019-7574: Fixed a heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c (bsc#1124803).
- CVE-2019-7575: Fixed a heap-based buffer overflow in MS_ADPCM_decode in audio/SDL_wave.c (bsc#1124802).
- CVE-2019-7637: Fixed a heap-based buffer overflow in SDL_FillRect function in SDL_surface.c (bsc#1124825).
- CVE-2019-7577: Fixed a buffer over read in SDL_LoadWAV_RW in audio/SDL_wave.c (bsc#1124800). 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-08"/>
	<updated date="2019-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124799">SUSE bug 1124799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124800">SUSE bug 1124800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124802">SUSE bug 1124802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124803">SUSE bug 1124803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124805">SUSE bug 1124805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124806">SUSE bug 1124806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124824">SUSE bug 1124824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124825">SUSE bug 1124825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124826">SUSE bug 1124826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124827">SUSE bug 1124827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125099">SUSE bug 1125099</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-7572/">CVE-2019-7572</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7573/">CVE-2019-7573</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7574/">CVE-2019-7574</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7575/">CVE-2019-7575</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7576/">CVE-2019-7576</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7577/">CVE-2019-7577</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7578/">CVE-2019-7578</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7635/">CVE-2019-7635</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7636/">CVE-2019-7636</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7638/">CVE-2019-7638</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521757" comment="libSDL-1_2-0-1.2.15-15.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78644" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1119687" ref_url="https://bugzilla.suse.com/1119687" source="BUGZILLA"/>
		<reference ref_id="1131576" ref_url="https://bugzilla.suse.com/1131576" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20346" ref_url="https://www.suse.com/security/cve/CVE-2018-20346/" source="CVE"/>
		<reference ref_id="CVE-2018-20506" ref_url="https://www.suse.com/security/cve/CVE-2018-20506/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005313.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

Security issues fixed: 

- CVE-2018-20346: Fixed a remote code execution vulnerability in FTS3 (Magellan) (bsc#1119687).
- CVE-2018-20506: Fixed an integer overflow when FTS3 extension is enabled (bsc#1131576).    
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-09"/>
	<updated date="2019-04-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1119687">SUSE bug 1119687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131576">SUSE bug 1131576</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20346/">CVE-2018-20346</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20506/">CVE-2018-20506</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521758" comment="libsqlite3-0-3.8.10.2-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521759" comment="libsqlite3-0-32bit-3.8.10.2-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521760" comment="sqlite3-3.8.10.2-9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78645" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1026236" ref_url="https://bugzilla.suse.com/1026236" source="BUGZILLA"/>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1069468" ref_url="https://bugzilla.suse.com/1069468" source="BUGZILLA"/>
		<reference ref_id="1105528" ref_url="https://bugzilla.suse.com/1105528" source="BUGZILLA"/>
		<reference ref_id="1114988" ref_url="https://bugzilla.suse.com/1114988" source="BUGZILLA"/>
		<reference ref_id="1115040" ref_url="https://bugzilla.suse.com/1115040" source="BUGZILLA"/>
		<reference ref_id="1115045" ref_url="https://bugzilla.suse.com/1115045" source="BUGZILLA"/>
		<reference ref_id="1115047" ref_url="https://bugzilla.suse.com/1115047" source="BUGZILLA"/>
		<reference ref_id="1116380" ref_url="https://bugzilla.suse.com/1116380" source="BUGZILLA"/>
		<reference ref_id="1117756" ref_url="https://bugzilla.suse.com/1117756" source="BUGZILLA"/>
		<reference ref_id="1119161" ref_url="https://bugzilla.suse.com/1119161" source="BUGZILLA"/>
		<reference ref_id="1123157" ref_url="https://bugzilla.suse.com/1123157" source="BUGZILLA"/>
		<reference ref_id="1126140" ref_url="https://bugzilla.suse.com/1126140" source="BUGZILLA"/>
		<reference ref_id="1126141" ref_url="https://bugzilla.suse.com/1126141" source="BUGZILLA"/>
		<reference ref_id="1126192" ref_url="https://bugzilla.suse.com/1126192" source="BUGZILLA"/>
		<reference ref_id="1126195" ref_url="https://bugzilla.suse.com/1126195" source="BUGZILLA"/>
		<reference ref_id="1126196" ref_url="https://bugzilla.suse.com/1126196" source="BUGZILLA"/>
		<reference ref_id="1126197" ref_url="https://bugzilla.suse.com/1126197" source="BUGZILLA"/>
		<reference ref_id="1126198" ref_url="https://bugzilla.suse.com/1126198" source="BUGZILLA"/>
		<reference ref_id="1126201" ref_url="https://bugzilla.suse.com/1126201" source="BUGZILLA"/>
		<reference ref_id="1126325" ref_url="https://bugzilla.suse.com/1126325" source="BUGZILLA"/>
		<reference ref_id="1127400" ref_url="https://bugzilla.suse.com/1127400" source="BUGZILLA"/>
		<reference ref_id="1129623" ref_url="https://bugzilla.suse.com/1129623" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19665" ref_url="https://www.suse.com/security/cve/CVE-2018-19665/" source="CVE"/>
		<reference ref_id="CVE-2018-19961" ref_url="https://www.suse.com/security/cve/CVE-2018-19961/" source="CVE"/>
		<reference ref_id="CVE-2018-19962" ref_url="https://www.suse.com/security/cve/CVE-2018-19962/" source="CVE"/>
		<reference ref_id="CVE-2018-19965" ref_url="https://www.suse.com/security/cve/CVE-2018-19965/" source="CVE"/>
		<reference ref_id="CVE-2018-19966" ref_url="https://www.suse.com/security/cve/CVE-2018-19966/" source="CVE"/>
		<reference ref_id="CVE-2018-19967" ref_url="https://www.suse.com/security/cve/CVE-2018-19967/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed: 

- CVE-2018-19967: Fixed HLE constructs that allowed guests to lock up the host,
  resulting in a Denial of Service (DoS). (XSA-282) (bsc#1114988)
- CVE-2019-6778: Fixed a heap buffer overflow in tcp_emu() found in slirp (bsc#1123157).
- Fixed an issue which could allow malicious or buggy guests with passed through PCI devices to  be able to 
  escalate their privileges, crash the host, or access data belonging to other guests. Additionally memory 
  leaks were also possible (bsc#1126140).
- Fixed a race condition issue which could allow malicious PV guests to escalate their privilege to that 
  of the hypervisor (bsc#1126141).
- Fixed an issue which could allow a malicious unprivileged guest userspace process to escalate its privilege 
  to that of other userspace processes in the same guest and potentially thereby to that 
  of the guest operating system (bsc#1126201).
- CVE-2019-9824: Fixed an information leak in SLiRP networking implementation which could allow a user/process 
  to read uninitialised stack memory contents (bsc#1129623).
- CVE-2018-19961 CVE-2018-19962: Fixed insufficient TLB flushing / improper large page mappings with AMD IOMMUs (XSA-275)(bsc#1115040).
- CVE-2018-19965: Fixed denial of service issue from attempting to use INVPCID with a non-canonical addresses (XSA-279)(bsc#1115045).
- CVE-2018-19966: Fixed issue introduced by XSA-240 that could have caused conflicts with shadow paging (XSA-280)(bsc#1115047).
- Fixed an issue which could allow malicious PV guests may cause a host crash or
  gain access to data pertaining to other guests.Additionally, vulnerable configurations
  are likely to be unstable even in the absence of an attack (bsc#1126198).
- Fixed multiple access violations introduced by XENMEM_exchange hypercall which could allow
  a single PV guest to leak arbitrary amounts of memory, leading to a denial of service (bsc#1126192).
- Fixed an issue which could allow malicious 64bit PV guests to cause a host crash (bsc#1127400).
- Fixed an issue which could allow malicious or buggy x86 PV guest kernels to mount a Denial of Service
  attack affecting the whole system (bsc#1126197).
- Fixed an issue which could allow an untrusted PV domain with access to a physical device to DMA into its own 
  pagetables leading to privilege escalation (bsc#1126195).
- Fixed an issue which could allow a malicious or buggy x86 PV guest kernels can mount a Denial of Service
  attack affecting the whole system (bsc#1126196).

Other issues addressed: 

- Upstream bug fixes (bsc#1027519)
- Fixed an issue where live migrations were failing when spectre was enabled on xen boot cmdline (bsc#1116380).
- Fixed an issue where setup of grant_tables and other variables may fail (bsc#1126325).
- Fixed a building issue (bsc#1119161).
- Fixed an issue where xpti=no-dom0 was not working as expected (bsc#1105528).
- Packages should no longer use /var/adm/fillup-templates (bsc#1069468). 
- Added Xen cmdline option 'suse_vtsc_tolerance' to avoid TSC emulation for HVM domUs (bsc#1026236).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-09"/>
	<updated date="2019-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1026236">SUSE bug 1026236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069468">SUSE bug 1069468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105528">SUSE bug 1105528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114988">SUSE bug 1114988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115040">SUSE bug 1115040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115045">SUSE bug 1115045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115047">SUSE bug 1115047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116380">SUSE bug 1116380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117756">SUSE bug 1117756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119161">SUSE bug 1119161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123157">SUSE bug 1123157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126197">SUSE bug 1126197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126198">SUSE bug 1126198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126201">SUSE bug 1126201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126325">SUSE bug 1126325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127400">SUSE bug 1127400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129623">SUSE bug 1129623</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19665/">CVE-2018-19665</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19961/">CVE-2018-19961</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19962/">CVE-2018-19962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19965/">CVE-2018-19965</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19966/">CVE-2018-19966</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19967/">CVE-2018-19967</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521761" comment="xen-4.9.4_02-3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521762" comment="xen-libs-4.9.4_02-3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521763" comment="xen-libs-32bit-4.9.4_02-3.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78646" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1131493" ref_url="https://bugzilla.suse.com/1131493" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5953" ref_url="https://www.suse.com/security/cve/CVE-2019-5953/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005343.html" source="SUSE-SU"/>
		<description>
This update for wget fixes the following issues:

Security issue fixed:

- CVE-2019-5953: Fixed a buffer overflow vulnerability which might cause code execution (bsc#1131493).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-16"/>
	<updated date="2019-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131493">SUSE bug 1131493</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5953/">CVE-2019-5953</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521764" comment="wget-1.14-21.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78647" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1118900" ref_url="https://bugzilla.suse.com/1118900" source="BUGZILLA"/>
		<reference ref_id="1125721" ref_url="https://bugzilla.suse.com/1125721" source="BUGZILLA"/>
		<reference ref_id="1126455" ref_url="https://bugzilla.suse.com/1126455" source="BUGZILLA"/>
		<reference ref_id="1129622" ref_url="https://bugzilla.suse.com/1129622" source="BUGZILLA"/>
		<reference ref_id="1130675" ref_url="https://bugzilla.suse.com/1130675" source="BUGZILLA"/>
		<reference ref_id="1131955" ref_url="https://bugzilla.suse.com/1131955" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2019-3812" ref_url="https://www.suse.com/security/cve/CVE-2019-3812/" source="CVE"/>
		<reference ref_id="CVE-2019-8934" ref_url="https://www.suse.com/security/cve/CVE-2019-8934/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2019-9824: Fixed information leak in slirp (bsc#1129622).
- CVE-2019-8934: Added method to specify whether or not to expose certain ppc64 hostinformation (bsc#1126455).
- CVE-2019-3812: Fixed Out-of-bounds memory access and information leak in virtual monitor interface (bsc#1125721).
- CVE-2018-20815: Fixed a denial of service possibility in device tree processing (bsc#1130675).

Non-security issue fixed:

- Backported Skylake-Server vcpu model support from qemu v2.11 (FATE#327261 bsc#1131955).
- Added ability to set virtqueue size using virtqueue_size parameter (FATE#327255 bsc#1118900).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-16"/>
	<updated date="2019-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118900">SUSE bug 1118900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125721">SUSE bug 1125721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126455">SUSE bug 1126455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129622">SUSE bug 1129622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130675">SUSE bug 1130675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131955">SUSE bug 1131955</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3812/">CVE-2019-3812</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8934/">CVE-2019-8934</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521765" comment="qemu-2.9.1-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521766" comment="qemu-block-curl-2.9.1-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521767" comment="qemu-ipxe-1.0.0+-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521768" comment="qemu-kvm-2.9.1-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521769" comment="qemu-seabios-1.10.2-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521770" comment="qemu-sgabios-8-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521771" comment="qemu-tools-2.9.1-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521772" comment="qemu-vgabios-1.10.2-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521773" comment="qemu-x86-2.9.1-6.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78648" version="1" class="patch">
	<metadata>
		<title>Security update for soundtouch (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1108631" ref_url="https://bugzilla.suse.com/1108631" source="BUGZILLA"/>
		<reference ref_id="1108632" ref_url="https://bugzilla.suse.com/1108632" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17097" ref_url="https://www.suse.com/security/cve/CVE-2018-17097/" source="CVE"/>
		<reference ref_id="CVE-2018-17098" ref_url="https://www.suse.com/security/cve/CVE-2018-17098/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005036.html" source="SUSE-SU"/>
		<description>
This update for soundtouch fixes the following issues:

Security issues fixed:

- CVE-2018-17098: Fixed a heap corruption from size inconsistency, which
  allowed remote attackers to cause a denial of service or possibly have
  other unspecified impact (bsc#1108632)
- CVE-2018-17097: Fixed a double free, which allowed remote attackers to cause
  a denial of service or possibly have other unspecified impact  (bsc#1108631)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-15"/>
	<updated date="2019-01-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1108631">SUSE bug 1108631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108632">SUSE bug 1108632</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-17097/">CVE-2018-17097</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-17098/">CVE-2018-17098</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521774" comment="libSoundTouch0-1.7.1-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521775" comment="libSoundTouch0-32bit-1.7.1-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521776" comment="soundtouch-1.7.1-5.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78649" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005344.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

Security issue fixed:

- CVE-2019-9636: Fixed an information disclosure because of incorrect handling of Unicode encoding during NFKC normalization (bsc#1129346).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-16"/>
	<updated date="2019-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521777" comment="libpython3_4m1_0-3.4.6-25.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521778" comment="python3-3.4.6-25.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521779" comment="python3-base-3.4.6-25.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521780" comment="python3-curses-3.4.6-25.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78650" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP3</platform>
		</affected>
		<reference ref_id="1112758" ref_url="https://bugzilla.suse.com/1112758" source="BUGZILLA"/>
		<reference ref_id="1131886" ref_url="https://bugzilla.suse.com/1131886" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16839" ref_url="https://www.suse.com/security/cve/CVE-2018-16839/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005352.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2018-16839: Fixed a buffer overflow in the SASL authentication code (bsc#1112758).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-23"/>
	<updated date="2019-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1112758">SUSE bug 1112758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131886">SUSE bug 1131886</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16839/">CVE-2018-16839</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009159517" comment="SUSE Linux Enterprise Desktop 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521781" comment="curl-7.37.0-37.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521782" comment="libcurl4-7.37.0-37.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521783" comment="libcurl4-32bit-7.37.0-37.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78651" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1064455" ref_url="https://bugzilla.suse.com/1064455" source="BUGZILLA"/>
		<reference ref_id="1090766" ref_url="https://bugzilla.suse.com/1090766" source="BUGZILLA"/>
		<reference ref_id="1097410" ref_url="https://bugzilla.suse.com/1097410" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2452-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004883.html" source="SUSE-SU"/>
		<description>
This update for libgcrypt fixes the following issues:

The following security vulnerability was addressed:

- CVE-2018-0495: Mitigate a novel side-channel attack by enabling blinding for
  ECDSA signatures (bsc#1097410).

The following other issues were fixed:

- Extended the fipsdrv dsa-sign and dsa-verify commands with the
  --algo parameter for the FIPS testing of DSA SigVer and SigGen (bsc#1064455).
- Ensure libgcrypt20-hmac and libgcrypt20 are installed in the correct order. (bsc#1090766)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-23"/>
	<updated date="2018-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064455">SUSE bug 1064455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090766">SUSE bug 1090766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097410">SUSE bug 1097410</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519982" comment="libgcrypt20-1.6.1-16.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519983" comment="libgcrypt20-32bit-1.6.1-16.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78652" version="1" class="patch">
	<metadata>
		<title>Security update for libreoffice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1050305" ref_url="https://bugzilla.suse.com/1050305" source="BUGZILLA"/>
		<reference ref_id="1088262" ref_url="https://bugzilla.suse.com/1088262" source="BUGZILLA"/>
		<reference ref_id="1088263" ref_url="https://bugzilla.suse.com/1088263" source="BUGZILLA"/>
		<reference ref_id="1091606" ref_url="https://bugzilla.suse.com/1091606" source="BUGZILLA"/>
		<reference ref_id="1091772" ref_url="https://bugzilla.suse.com/1091772" source="BUGZILLA"/>
		<reference ref_id="1092699" ref_url="https://bugzilla.suse.com/1092699" source="BUGZILLA"/>
		<reference ref_id="1094359" ref_url="https://bugzilla.suse.com/1094359" source="BUGZILLA"/>
		<reference ref_id="1095601" ref_url="https://bugzilla.suse.com/1095601" source="BUGZILLA"/>
		<reference ref_id="1095639" ref_url="https://bugzilla.suse.com/1095639" source="BUGZILLA"/>
		<reference ref_id="1096673" ref_url="https://bugzilla.suse.com/1096673" source="BUGZILLA"/>
		<reference ref_id="1098891" ref_url="https://bugzilla.suse.com/1098891" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10583" ref_url="https://www.suse.com/security/cve/CVE-2018-10583/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2485-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004933.html" source="SUSE-SU"/>
		<description>


This update for libreoffice to 6.0.5.2 fixes the following issues:

Security issues fixed:

- CVE-2018-10583: An information disclosure vulnerability occurs during
  automatic processing and initiating an SMB connection embedded in a malicious
  file, as demonstrated by xlink:href=file://192.168.0.2/test.jpg within an
  office:document-content element in a .odt XML document. (bsc#1091606)

Non security issues fixed:

- Bugfix: Table borders appear black in LibreOffice (while white in PowerPoint) (bsc#1088262)
- Bugfix: LibreOffice extension 'Language Tool' fails after Tumbleweed update (bsc#1050305)
- Bugfix: libreoffice-gnome can no longer be installed in parallel to libreoffice-gtk3 as there
  is a potential file conflict (bsc#1096673)
- Bugfix: LibreOffice Writer: Text in boxes were not visible (bsc#1094359)
- Use libreoffice-gtk3 if xfce is present (bsc#1092699)
- Various other bug fixes
- Exporting to PPTX results in vertical labels being shown horizontally (bsc#1095639)
- Table in PPTX misplaced and partly blue (bsc#1098891)
- Labels in chart change (from white and other colors) to black when saving as PPTX (bsc#1088263)
- Exporting to PPTX shifts arrow shapes quite a bit bsc#1095601 
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-06"/>
	<updated date="2018-12-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050305">SUSE bug 1050305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088262">SUSE bug 1088262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088263">SUSE bug 1088263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091606">SUSE bug 1091606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091772">SUSE bug 1091772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092699">SUSE bug 1092699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094359">SUSE bug 1094359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095601">SUSE bug 1095601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095639">SUSE bug 1095639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096673">SUSE bug 1096673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098891">SUSE bug 1098891</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10583/">CVE-2018-10583</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519986" comment="libreoffice-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519987" comment="libreoffice-base-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519988" comment="libreoffice-base-drivers-mysql-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519989" comment="libreoffice-base-drivers-postgresql-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519990" comment="libreoffice-branding-upstream-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519991" comment="libreoffice-calc-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519992" comment="libreoffice-calc-extensions-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519993" comment="libreoffice-draw-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519994" comment="libreoffice-filters-optional-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519995" comment="libreoffice-gnome-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519996" comment="libreoffice-gtk2-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519997" comment="libreoffice-icon-themes-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519998" comment="libreoffice-impress-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519999" comment="libreoffice-l10n-af-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520000" comment="libreoffice-l10n-ar-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520001" comment="libreoffice-l10n-ca-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520002" comment="libreoffice-l10n-cs-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520003" comment="libreoffice-l10n-da-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520004" comment="libreoffice-l10n-de-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520005" comment="libreoffice-l10n-en-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520006" comment="libreoffice-l10n-es-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520007" comment="libreoffice-l10n-fi-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520008" comment="libreoffice-l10n-fr-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520009" comment="libreoffice-l10n-gu-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520010" comment="libreoffice-l10n-hi-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520011" comment="libreoffice-l10n-hu-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520012" comment="libreoffice-l10n-it-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520013" comment="libreoffice-l10n-ja-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520014" comment="libreoffice-l10n-ko-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520015" comment="libreoffice-l10n-nb-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520016" comment="libreoffice-l10n-nl-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520017" comment="libreoffice-l10n-nn-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520018" comment="libreoffice-l10n-pl-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520019" comment="libreoffice-l10n-pt_BR-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520020" comment="libreoffice-l10n-pt_PT-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520021" comment="libreoffice-l10n-ro-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520022" comment="libreoffice-l10n-ru-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520023" comment="libreoffice-l10n-sk-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520024" comment="libreoffice-l10n-sv-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520025" comment="libreoffice-l10n-xh-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520026" comment="libreoffice-l10n-zh_CN-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520027" comment="libreoffice-l10n-zh_TW-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520028" comment="libreoffice-l10n-zu-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520029" comment="libreoffice-mailmerge-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520030" comment="libreoffice-math-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520031" comment="libreoffice-officebean-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520032" comment="libreoffice-pyuno-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520033" comment="libreoffice-writer-6.0.5.2-43.38.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520034" comment="libreoffice-writer-extensions-6.0.5.2-43.38.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78653" version="1" class="patch">
	<metadata>
		<title>Security update for python, python-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1086001" ref_url="https://bugzilla.suse.com/1086001" source="BUGZILLA"/>
		<reference ref_id="1088004" ref_url="https://bugzilla.suse.com/1088004" source="BUGZILLA"/>
		<reference ref_id="1088009" ref_url="https://bugzilla.suse.com/1088009" source="BUGZILLA"/>
		<reference ref_id="1109663" ref_url="https://bugzilla.suse.com/1109663" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802/" source="CVE"/>
		<reference ref_id="CVE-2018-1060" ref_url="https://www.suse.com/security/cve/CVE-2018-1060/" source="CVE"/>
		<reference ref_id="CVE-2018-1061" ref_url="https://www.suse.com/security/cve/CVE-2018-1061/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3554-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004946.html" source="SUSE-SU"/>
		<description>
This update for python, python-base fixes the following issues:

Security issues fixed:

- CVE-2018-1000802: Prevent command injection in shutil module (make_archive
  function) via passage of unfiltered user input (bsc#1109663).
- CVE-2018-1061: Fixed DoS via regular expression backtracking in
  difflib.IS_LINE_JUNK method in difflib (bsc#1088004).
- CVE-2018-1060: Fixed DoS via regular expression catastrophic backtracking in
  apop() method in pop3lib (bsc#1088009).

Bug fixes:

- bsc#1086001: python tarfile uses random order.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-10"/>
	<updated date="2018-12-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086001">SUSE bug 1086001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088004">SUSE bug 1088004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088009">SUSE bug 1088009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109663">SUSE bug 1109663</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1060/">CVE-2018-1060</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1061/">CVE-2018-1061</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520299" comment="libpython2_7-1_0-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520300" comment="libpython2_7-1_0-32bit-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520301" comment="python-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520302" comment="python-base-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520303" comment="python-curses-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520304" comment="python-devel-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520305" comment="python-tk-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520306" comment="python-xml-2.7.13-28.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78654" version="1" class="patch">
	<metadata>
		<title>Security update for audiofile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1111586" ref_url="https://bugzilla.suse.com/1111586" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17095" ref_url="https://www.suse.com/security/cve/CVE-2018-17095/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3588-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004942.html" source="SUSE-SU"/>
		<description>
This update for audiofile fixes the following issues:

- CVE-2018-17095: A heap-based buffer overflow in Expand3To4Module::run could occurred when running sfconvert leading to crashes or code execution when handling untrusted soundfiles (bsc#1111586).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-10"/>
	<updated date="2018-12-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1111586">SUSE bug 1111586</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-17095/">CVE-2018-17095</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520307" comment="audiofile-0.3.6-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520308" comment="libaudiofile1-0.3.6-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520309" comment="libaudiofile1-32bit-0.3.6-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78655" version="1" class="patch">
	<metadata>
		<title>Security update for ntfs-3g_ntfsprogs (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1022500" ref_url="https://bugzilla.suse.com/1022500" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0358" ref_url="https://www.suse.com/security/cve/CVE-2017-0358/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3587-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004961.html" source="SUSE-SU"/>
		<description>
This update for ntfs-3g_ntfsprogs fixes the following issues:

- CVE-2017-0358: Missing sanitization of the environment during a call to
  modprobe allowed local users to escalate fo root privilege (bsc#1022500)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-13"/>
	<updated date="2018-12-13"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1022500">SUSE bug 1022500</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-0358/">CVE-2017-0358</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520310" comment="libntfs-3g84-2013.1.13-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520311" comment="ntfs-3g-2013.1.13-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520312" comment="ntfsprogs-2013.1.13-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78656" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1111647" ref_url="https://bugzilla.suse.com/1111647" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12086" ref_url="https://www.suse.com/security/cve/CVE-2018-12086/" source="CVE"/>
		<reference ref_id="CVE-2018-18227" ref_url="https://www.suse.com/security/cve/CVE-2018-18227/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3590-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004919.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Wireshark was updated to 2.4.10 (bsc#1111647).

Following security issues were fixed:

- CVE-2018-18227: MS-WSP dissector crash (wnpa-sec-2018-47)
- CVE-2018-12086: OpcUA dissector crash (wnpa-sec-2018-50)

Further bug fixes and updated protocol support that were done are listed in:

  https://www.wireshark.org/docs/relnotes/wireshark-2.4.10.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-05"/>
	<updated date="2018-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111647">SUSE bug 1111647</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12086/">CVE-2018-12086</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18227/">CVE-2018-18227</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520313" comment="libwireshark9-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520314" comment="libwiretap7-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520315" comment="libwscodecs1-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520316" comment="libwsutil8-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520317" comment="wireshark-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520318" comment="wireshark-gtk-2.4.10-48.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78657" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLE, llvm4, mozilla-nspr, mozilla-nss, apache2-mod_nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1012260" ref_url="https://bugzilla.suse.com/1012260" source="BUGZILLA"/>
		<reference ref_id="1021577" ref_url="https://bugzilla.suse.com/1021577" source="BUGZILLA"/>
		<reference ref_id="1026191" ref_url="https://bugzilla.suse.com/1026191" source="BUGZILLA"/>
		<reference ref_id="1041469" ref_url="https://bugzilla.suse.com/1041469" source="BUGZILLA"/>
		<reference ref_id="1041894" ref_url="https://bugzilla.suse.com/1041894" source="BUGZILLA"/>
		<reference ref_id="1049703" ref_url="https://bugzilla.suse.com/1049703" source="BUGZILLA"/>
		<reference ref_id="1061204" ref_url="https://bugzilla.suse.com/1061204" source="BUGZILLA"/>
		<reference ref_id="1064786" ref_url="https://bugzilla.suse.com/1064786" source="BUGZILLA"/>
		<reference ref_id="1065464" ref_url="https://bugzilla.suse.com/1065464" source="BUGZILLA"/>
		<reference ref_id="1066489" ref_url="https://bugzilla.suse.com/1066489" source="BUGZILLA"/>
		<reference ref_id="1073210" ref_url="https://bugzilla.suse.com/1073210" source="BUGZILLA"/>
		<reference ref_id="1078436" ref_url="https://bugzilla.suse.com/1078436" source="BUGZILLA"/>
		<reference ref_id="1091551" ref_url="https://bugzilla.suse.com/1091551" source="BUGZILLA"/>
		<reference ref_id="1092697" ref_url="https://bugzilla.suse.com/1092697" source="BUGZILLA"/>
		<reference ref_id="1094767" ref_url="https://bugzilla.suse.com/1094767" source="BUGZILLA"/>
		<reference ref_id="1096515" ref_url="https://bugzilla.suse.com/1096515" source="BUGZILLA"/>
		<reference ref_id="1107343" ref_url="https://bugzilla.suse.com/1107343" source="BUGZILLA"/>
		<reference ref_id="1108771" ref_url="https://bugzilla.suse.com/1108771" source="BUGZILLA"/>
		<reference ref_id="1108986" ref_url="https://bugzilla.suse.com/1108986" source="BUGZILLA"/>
		<reference ref_id="1109363" ref_url="https://bugzilla.suse.com/1109363" source="BUGZILLA"/>
		<reference ref_id="1109465" ref_url="https://bugzilla.suse.com/1109465" source="BUGZILLA"/>
		<reference ref_id="1110506" ref_url="https://bugzilla.suse.com/1110506" source="BUGZILLA"/>
		<reference ref_id="1110507" ref_url="https://bugzilla.suse.com/1110507" source="BUGZILLA"/>
		<reference ref_id="703591" ref_url="https://bugzilla.suse.com/703591" source="BUGZILLA"/>
		<reference ref_id="839074" ref_url="https://bugzilla.suse.com/839074" source="BUGZILLA"/>
		<reference ref_id="857131" ref_url="https://bugzilla.suse.com/857131" source="BUGZILLA"/>
		<reference ref_id="893359" ref_url="https://bugzilla.suse.com/893359" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16541" ref_url="https://www.suse.com/security/cve/CVE-2017-16541/" source="CVE"/>
		<reference ref_id="CVE-2018-12376" ref_url="https://www.suse.com/security/cve/CVE-2018-12376/" source="CVE"/>
		<reference ref_id="CVE-2018-12377" ref_url="https://www.suse.com/security/cve/CVE-2018-12377/" source="CVE"/>
		<reference ref_id="CVE-2018-12378" ref_url="https://www.suse.com/security/cve/CVE-2018-12378/" source="CVE"/>
		<reference ref_id="CVE-2018-12379" ref_url="https://www.suse.com/security/cve/CVE-2018-12379/" source="CVE"/>
		<reference ref_id="CVE-2018-12381" ref_url="https://www.suse.com/security/cve/CVE-2018-12381/" source="CVE"/>
		<reference ref_id="CVE-2018-12383" ref_url="https://www.suse.com/security/cve/CVE-2018-12383/" source="CVE"/>
		<reference ref_id="CVE-2018-12385" ref_url="https://www.suse.com/security/cve/CVE-2018-12385/" source="CVE"/>
		<reference ref_id="CVE-2018-12386" ref_url="https://www.suse.com/security/cve/CVE-2018-12386/" source="CVE"/>
		<reference ref_id="CVE-2018-12387" ref_url="https://www.suse.com/security/cve/CVE-2018-12387/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004918.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to ESR 60.2.2 fixes several issues.

These general changes are part of the version 60 release.

- New browser engine with speed improvements
- Redesigned graphical user interface elements
- Unified address and search bar for new installations
- New tab page listing top visited, recently visited and recommended pages
- Support for configuration policies in enterprise deployments via JSON files
- Support for Web Authentication, allowing the use of USB tokens for
  authentication to web sites

The following changes affect compatibility:
    
- Now exclusively supports extensions built using the WebExtension API.
- Unsupported legacy extensions will no longer work in Firefox 60 ESR
- TLS certificates issued by Symantec before June 1st, 2016 are no longer trusted 
  The 'security.pki.distrust_ca_policy' preference can be set to 0 to reinstate
  trust in those certificates

The following issues affect performance:

- new format for storing private keys, certificates and certificate trust
  If the user home or data directory is on a network file system, it is
  recommended that users set the following environment variable to avoid
  slowdowns: NSS_SDB_USE_CACHE=yes
  This setting is not recommended for local, fast file systems. 

These security issues were fixed:

- CVE-2018-12381: Dragging and dropping Outlook email message results in page navigation (bsc#1107343).
- CVE-2017-16541: Proxy bypass using automount and autofs (bsc#1107343).
- CVE-2018-12376: Various memory safety bugs (bsc#1107343).
- CVE-2018-12377: Use-after-free in refresh driver timers (bsc#1107343).
- CVE-2018-12378: Use-after-free in IndexedDB (bsc#1107343).
- CVE-2018-12379: Out-of-bounds write with malicious MAR file (bsc#1107343).
- CVE-2018-12386: Type confusion in JavaScript allowed remote code execution (bsc#1110506)
- CVE-2018-12387: Array.prototype.push stack pointer vulnerability may enable exploits in the sandboxed content process (bsc#1110507)
- CVE-2018-12385: Crash in TransportSecurityInfo due to cached data  (bsc#1109363)
- CVE-2018-12383: Setting a master password did not delete unencrypted previously stored passwords  (bsc#1107343)

This update for mozilla-nspr to version 4.19 fixes the follwing issues

- Added TCP Fast Open functionality
- A socket without PR_NSPR_IO_LAYER will no longer trigger
  an assertion when polling

This update for mozilla-nss to version 3.36.4 fixes the follwing issues

- Connecting to a server that was recently upgraded to TLS 1.3
  would result in a SSL_RX_MALFORMED_SERVER_HELLO error.
- Fix a rare bug with PKCS#12 files.
- Replaces existing vectorized ChaCha20 code with verified
  HACL* implementation.
- TLS 1.3 support has been updated to draft -23.
- Added formally verified implementations of non-vectorized Chacha20
  and non-vectorized Poly1305 64-bit.
- The following CA certificates were Removed:
  OU = Security Communication EV RootCA1
  CN = CA Disig Root R1
  CN = DST ACES CA X6
  Certum CA, O=Unizeto Sp. z o.o.
  StartCom Certification Authority
  StartCom Certification Authority G2
  T?BİTAK UEKAE K?k Sertifika Hizmet Sağlayıcısı - S?r?m 3
  ACEDICOM Root
  Certinomis - Autorit? Racine
  T?RKTRUST Elektronik Sertifika Hizmet Sağlayıcısı
  PSCProcert
  CA 沃通根证书, O=WoSign CA Limited
  Certification Authority of WoSign
  Certification Authority of WoSign G2
  CA WoSign ECC Root
  Subject CN = VeriSign Class 3 Secure Server CA - G2
  O = Japanese Government, OU = ApplicationCA
  CN = WellsSecure Public Root Certificate Authority
  CN = T?RKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H6
  CN = Microsec e-Szigno Root
* The following CA certificates were Removed:
  AddTrust Public CA Root
  AddTrust Qualified CA Root
  China Internet Network Information Center EV Certificates Root
  CNNIC ROOT
  ComSign Secured CA
  GeoTrust Global CA 2
  Secure Certificate Services
  Swisscom Root CA 1
  Swisscom Root EV CA 2
  Trusted Certificate Services
  UTN-USERFirst-Hardware
  UTN-USERFirst-Object
* The following CA certificates were Added
  CN = D-TRUST Root CA 3 2013
  CN = TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1
  GDCA TrustAUTH R5 ROOT
  SSL.com Root Certification Authority RSA
  SSL.com Root Certification Authority ECC
  SSL.com EV Root Certification Authority RSA R2
  SSL.com EV Root Certification Authority ECC
  TrustCor RootCert CA-1
  TrustCor RootCert CA-2
  TrustCor ECA-1
* The Websites (TLS/SSL) trust bit was turned off for the following
  CA certificates:
  CN = Chambers of Commerce Root
  CN = Global Chambersign Root
* TLS servers are able to handle a ClientHello statelessly, if the
  client supports TLS 1.3.  If the server sends a HelloRetryRequest,
  it is possible to discard the server socket, and make a new socket
  to handle any subsequent ClientHello. This better enables stateless
  server operation. (This feature is added in support of QUIC, but it
  also has utility for DTLS 1.3 servers.)

Due to the update of mozilla-nss apache2-mod_nss needs to be updated to 
change to the SQLite certificate database, which is now the default (bsc#1108771)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-05"/>
	<updated date="2018-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012260">SUSE bug 1012260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021577">SUSE bug 1021577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026191">SUSE bug 1026191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041469">SUSE bug 1041469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041894">SUSE bug 1041894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049703">SUSE bug 1049703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061204">SUSE bug 1061204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064786">SUSE bug 1064786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065464">SUSE bug 1065464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066489">SUSE bug 1066489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073210">SUSE bug 1073210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078436">SUSE bug 1078436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091551">SUSE bug 1091551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092697">SUSE bug 1092697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094767">SUSE bug 1094767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096515">SUSE bug 1096515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107343">SUSE bug 1107343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108771">SUSE bug 1108771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108986">SUSE bug 1108986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109363">SUSE bug 1109363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109465">SUSE bug 1109465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110506">SUSE bug 1110506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110507">SUSE bug 1110507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/703591">SUSE bug 703591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839074">SUSE bug 839074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857131">SUSE bug 857131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893359">SUSE bug 893359</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16541/">CVE-2017-16541</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-12376/">CVE-2018-12376</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12377/">CVE-2018-12377</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12378/">CVE-2018-12378</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12379/">CVE-2018-12379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-12381/">CVE-2018-12381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-12383/">CVE-2018-12383</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12385/">CVE-2018-12385</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12386/">CVE-2018-12386</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12387/">CVE-2018-12387</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520319" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520320" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520321" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520322" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520323" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520324" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520325" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520326" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520327" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520328" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520329" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520330" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520331" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520332" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520333" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520334" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78658" version="1" class="patch">
	<metadata>
		<title>Security update for soundtouch (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1108630" ref_url="https://bugzilla.suse.com/1108630" source="BUGZILLA"/>
		<reference ref_id="1108631" ref_url="https://bugzilla.suse.com/1108631" source="BUGZILLA"/>
		<reference ref_id="1108632" ref_url="https://bugzilla.suse.com/1108632" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17096" ref_url="https://www.suse.com/security/cve/CVE-2018-17096/" source="CVE"/>
		<reference ref_id="CVE-2018-17097" ref_url="https://www.suse.com/security/cve/CVE-2018-17097/" source="CVE"/>
		<reference ref_id="CVE-2018-17098" ref_url="https://www.suse.com/security/cve/CVE-2018-17098/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3606-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004945.html" source="SUSE-SU"/>
		<description>
This update for soundtouch fixes the following issues:

- CVE-2018-17098: The WavFileBase class allowed remote attackers to cause a denial of service (heap corruption from size inconsistency) or possibly have unspecified other impact, as demonstrated by SoundStretch. (bsc#1108632)
- CVE-2018-17097: The WavFileBase class allowed remote attackers to cause a denial of service (double free) or possibly have unspecified other impact, as demonstrated by SoundStretch. (double free) (bsc#1108631)
- CVE-2018-17096: The BPMDetect class allowed remote attackers to cause a denial of service (assertion failure and application exit), as demonstrated by SoundStretch. (bsc#1108630)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-10"/>
	<updated date="2018-12-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1108630">SUSE bug 1108630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108631">SUSE bug 1108631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108632">SUSE bug 1108632</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-17096/">CVE-2018-17096</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-17097/">CVE-2018-17097</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-17098/">CVE-2018-17098</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520338" comment="libSoundTouch0-1.7.1-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520339" comment="libSoundTouch0-32bit-1.7.1-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520340" comment="soundtouch-1.7.1-5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78659" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1104812" ref_url="https://bugzilla.suse.com/1104812" source="BUGZILLA"/>
		<reference ref_id="1106998" ref_url="https://bugzilla.suse.com/1106998" source="BUGZILLA"/>
		<reference ref_id="1106999" ref_url="https://bugzilla.suse.com/1106999" source="BUGZILLA"/>
		<reference ref_id="1107033" ref_url="https://bugzilla.suse.com/1107033" source="BUGZILLA"/>
		<reference ref_id="1107034" ref_url="https://bugzilla.suse.com/1107034" source="BUGZILLA"/>
		<reference ref_id="1107037" ref_url="https://bugzilla.suse.com/1107037" source="BUGZILLA"/>
		<reference ref_id="1107038" ref_url="https://bugzilla.suse.com/1107038" source="BUGZILLA"/>
		<reference ref_id="1107039" ref_url="https://bugzilla.suse.com/1107039" source="BUGZILLA"/>
		<reference ref_id="1107097" ref_url="https://bugzilla.suse.com/1107097" source="BUGZILLA"/>
		<reference ref_id="1107107" ref_url="https://bugzilla.suse.com/1107107" source="BUGZILLA"/>
		<reference ref_id="1108318" ref_url="https://bugzilla.suse.com/1108318" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16391" ref_url="https://www.suse.com/security/cve/CVE-2018-16391/" source="CVE"/>
		<reference ref_id="CVE-2018-16392" ref_url="https://www.suse.com/security/cve/CVE-2018-16392/" source="CVE"/>
		<reference ref_id="CVE-2018-16393" ref_url="https://www.suse.com/security/cve/CVE-2018-16393/" source="CVE"/>
		<reference ref_id="CVE-2018-16418" ref_url="https://www.suse.com/security/cve/CVE-2018-16418/" source="CVE"/>
		<reference ref_id="CVE-2018-16419" ref_url="https://www.suse.com/security/cve/CVE-2018-16419/" source="CVE"/>
		<reference ref_id="CVE-2018-16420" ref_url="https://www.suse.com/security/cve/CVE-2018-16420/" source="CVE"/>
		<reference ref_id="CVE-2018-16422" ref_url="https://www.suse.com/security/cve/CVE-2018-16422/" source="CVE"/>
		<reference ref_id="CVE-2018-16423" ref_url="https://www.suse.com/security/cve/CVE-2018-16423/" source="CVE"/>
		<reference ref_id="CVE-2018-16426" ref_url="https://www.suse.com/security/cve/CVE-2018-16426/" source="CVE"/>
		<reference ref_id="CVE-2018-16427" ref_url="https://www.suse.com/security/cve/CVE-2018-16427/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3622-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004943.html" source="SUSE-SU"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2018-16391: Fixed a denial of service when handling responses from a Muscle Card (bsc#1106998)
- CVE-2018-16392: Fixed a denial of service when handling responses from a TCOS Card (bsc#1106999)
- CVE-2018-16393: Fixed buffer overflows when handling responses from Gemsafe V1 Smartcards (bsc#1108318)
- CVE-2018-16418: Fixed buffer overflow when handling string concatenation in util_acl_to_str (bsc#1107039)
- CVE-2018-16419: Fixed several buffer overflows when handling responses from a Cryptoflex card (bsc#1107107)
- CVE-2018-16420: Fixed buffer overflows when handling responses from an ePass 2003 Card (bsc#1107097)
- CVE-2018-16422: Fixed single byte buffer overflow when handling responses from an esteid Card (bsc#1107038)
- CVE-2018-16423: Fixed double free when handling responses from a smartcard (bsc#1107037)
- CVE-2018-16426: Fixed endless recursion when handling responses from an IAS-ECC card (bsc#1107034)
- CVE-2018-16427: Fixed out of bounds reads when handling responses in OpenSC (bsc#1107033)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-10"/>
	<updated date="2018-12-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104812">SUSE bug 1104812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106998">SUSE bug 1106998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106999">SUSE bug 1106999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107033">SUSE bug 1107033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107034">SUSE bug 1107034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107037">SUSE bug 1107037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107038">SUSE bug 1107038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107039">SUSE bug 1107039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107097">SUSE bug 1107097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107107">SUSE bug 1107107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108318">SUSE bug 1108318</bugzilla>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16391/">CVE-2018-16391</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16392/">CVE-2018-16392</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16393/">CVE-2018-16393</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16418/">CVE-2018-16418</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16419/">CVE-2018-16419</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16420/">CVE-2018-16420</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16422/">CVE-2018-16422</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16423/">CVE-2018-16423</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16426/">CVE-2018-16426</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16427/">CVE-2018-16427</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520341" comment="opensc-0.13.0-3.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78660" version="1" class="patch">
	<metadata>
		<title>Security update for libarchive (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1032089" ref_url="https://bugzilla.suse.com/1032089" source="BUGZILLA"/>
		<reference ref_id="1037008" ref_url="https://bugzilla.suse.com/1037008" source="BUGZILLA"/>
		<reference ref_id="1037009" ref_url="https://bugzilla.suse.com/1037009" source="BUGZILLA"/>
		<reference ref_id="1057514" ref_url="https://bugzilla.suse.com/1057514" source="BUGZILLA"/>
		<reference ref_id="1059100" ref_url="https://bugzilla.suse.com/1059100" source="BUGZILLA"/>
		<reference ref_id="1059134" ref_url="https://bugzilla.suse.com/1059134" source="BUGZILLA"/>
		<reference ref_id="1059139" ref_url="https://bugzilla.suse.com/1059139" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10209" ref_url="https://www.suse.com/security/cve/CVE-2016-10209/" source="CVE"/>
		<reference ref_id="CVE-2016-10349" ref_url="https://www.suse.com/security/cve/CVE-2016-10349/" source="CVE"/>
		<reference ref_id="CVE-2016-10350" ref_url="https://www.suse.com/security/cve/CVE-2016-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-14166" ref_url="https://www.suse.com/security/cve/CVE-2017-14166/" source="CVE"/>
		<reference ref_id="CVE-2017-14501" ref_url="https://www.suse.com/security/cve/CVE-2017-14501/" source="CVE"/>
		<reference ref_id="CVE-2017-14502" ref_url="https://www.suse.com/security/cve/CVE-2017-14502/" source="CVE"/>
		<reference ref_id="CVE-2017-14503" ref_url="https://www.suse.com/security/cve/CVE-2017-14503/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3640-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004927.html" source="SUSE-SU"/>
		<description>
This update for libarchive fixes the following issues:

- CVE-2016-10209: The archive_wstring_append_from_mbs function in archive_string.c allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted archive file. (bsc#1032089)
- CVE-2016-10349: The archive_le32dec function in archive_endian.h allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. (bsc#1037008)
- CVE-2016-10350: The archive_read_format_cab_read_header function in archive_read_support_format_cab.c allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. (bsc#1037009)
- CVE-2017-14166: libarchive allowed remote attackers to cause a denial of service (xml_data heap-based buffer over-read and application crash) via a crafted xar archive, related to the mishandling of empty strings in the atol8 function in archive_read_support_format_xar.c. (bsc#1057514)
- CVE-2017-14501: An out-of-bounds read flaw existed in parse_file_info in archive_read_support_format_iso9660.c when extracting a specially crafted iso9660 iso file, related to archive_read_format_iso9660_read_header. (bsc#1059139)
- CVE-2017-14502: read_header in archive_read_support_format_rar.c suffered from an off-by-one error for UTF-16 names in RAR archives, leading to an out-of-bounds read in archive_read_format_rar_read_header. (bsc#1059134)
- CVE-2017-14503: libarchive suffered from an out-of-bounds read within lha_read_data_none() in archive_read_support_format_lha.c when extracting a specially crafted lha archive, related to lha_crc16. (bsc#1059100)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-06"/>
	<updated date="2018-12-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1032089">SUSE bug 1032089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037008">SUSE bug 1037008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037009">SUSE bug 1037009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057514">SUSE bug 1057514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059100">SUSE bug 1059100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059134">SUSE bug 1059134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059139">SUSE bug 1059139</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10209/">CVE-2016-10209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10349/">CVE-2016-10349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10350/">CVE-2016-10350</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14166/">CVE-2017-14166</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14501/">CVE-2017-14501</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14502/">CVE-2017-14502</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14503/">CVE-2017-14503</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520342" comment="libarchive13-3.1.2-26.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78661" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1112852" ref_url="https://bugzilla.suse.com/1112852" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12389" ref_url="https://www.suse.com/security/cve/CVE-2018-12389/" source="CVE"/>
		<reference ref_id="CVE-2018-12390" ref_url="https://www.suse.com/security/cve/CVE-2018-12390/" source="CVE"/>
		<reference ref_id="CVE-2018-12392" ref_url="https://www.suse.com/security/cve/CVE-2018-12392/" source="CVE"/>
		<reference ref_id="CVE-2018-12393" ref_url="https://www.suse.com/security/cve/CVE-2018-12393/" source="CVE"/>
		<reference ref_id="CVE-2018-12395" ref_url="https://www.suse.com/security/cve/CVE-2018-12395/" source="CVE"/>
		<reference ref_id="CVE-2018-12396" ref_url="https://www.suse.com/security/cve/CVE-2018-12396/" source="CVE"/>
		<reference ref_id="CVE-2018-12397" ref_url="https://www.suse.com/security/cve/CVE-2018-12397/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004932.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed:

- Update to Mozilla Firefox 60.3.0esr: MFSA 2018-27 (bsc#1112852)
- CVE-2018-12392: Crash with nested event loops.
- CVE-2018-12393: Integer overflow during Unicode conversion while loading JavaScript.
- CVE-2018-12395: WebExtension bypass of domain restrictions through header rewriting.
- CVE-2018-12396: WebExtension content scripts can execute in disallowed contexts.
- CVE-2018-12397: WebExtension local file access vulnerability.
- CVE-2018-12389: Memory safety bugs fixed in Firefox ESR 60.3.
- CVE-2018-12390: Memory safety bugs fixed in Firefox 63 and Firefox ESR 60.3.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-06"/>
	<updated date="2018-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1112852">SUSE bug 1112852</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-12389/">CVE-2018-12389</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12390/">CVE-2018-12390</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12392/">CVE-2018-12392</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12393/">CVE-2018-12393</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12395/">CVE-2018-12395</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12396/">CVE-2018-12396</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12397/">CVE-2018-12397</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520350" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520351" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78662" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1106923" ref_url="https://bugzilla.suse.com/1106923" source="BUGZILLA"/>
		<reference ref_id="1108835" ref_url="https://bugzilla.suse.com/1108835" source="BUGZILLA"/>
		<reference ref_id="1109252" ref_url="https://bugzilla.suse.com/1109252" source="BUGZILLA"/>
		<reference ref_id="1110445" ref_url="https://bugzilla.suse.com/1110445" source="BUGZILLA"/>
		<reference ref_id="1111278" ref_url="https://bugzilla.suse.com/1111278" source="BUGZILLA"/>
		<reference ref_id="1112024" ref_url="https://bugzilla.suse.com/1112024" source="BUGZILLA"/>
		<reference ref_id="1113083" ref_url="https://bugzilla.suse.com/1113083" source="BUGZILLA"/>
		<reference ref_id="1113632" ref_url="https://bugzilla.suse.com/1113632" source="BUGZILLA"/>
		<reference ref_id="1113665" ref_url="https://bugzilla.suse.com/1113665" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15686" ref_url="https://www.suse.com/security/cve/CVE-2018-15686/" source="CVE"/>
		<reference ref_id="CVE-2018-15688" ref_url="https://www.suse.com/security/cve/CVE-2018-15688/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3767-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004941.html" source="SUSE-SU"/>
		<description>

This update for systemd fixes the following issues:

Security issues fixed:

- CVE-2018-15688: A buffer overflow vulnerability in the dhcp6 client of systemd allowed a malicious dhcp6 server to overwrite heap memory in systemd-networkd. (bsc#1113632)
- CVE-2018-15686: A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. (bsc#1113665)

Non-security issues fixed:

- dhcp6: split assert_return() to be more debuggable when hit
- core: skip unit deserialization and move to the next one when unit_deserialize() fails
- core: properly handle deserialization of unknown unit types (#6476)
- core: don't create Requires for workdir if 'missing ok' (bsc#1113083)
- logind: use manager_get_user_by_pid() where appropriate
- logind: rework manager_get_{user|session}_by_pid() a bit
- login: fix user@.service case, so we don't allow nested sessions (#8051) (bsc#1112024)
- core: be more defensive if we can't determine per-connection socket peer (#7329)
- socket-util: introduce port argument in sockaddr_port()
- service: fixup ExecStop for socket-activated shutdown (#4120)
- service: Continue shutdown on socket activated unit on termination (#4108) (bsc#1106923)
- cryptsetup: build fixes for 'add support for sector-size= option'
- udev-rules: IMPORT cmdline does not recognize keys with similar names (bsc#1111278)
- core: keep the kernel coredump defaults when systemd-coredump is disabled
- core: shorten main() a bit, split out coredump initialization
- core: set RLIMIT_CORE to unlimited by default (bsc#1108835)
- core/mount: fstype may be NULL
- journald: don't ship systemd-journald-audit.socket (bsc#1109252)
- core: make 'tmpfs' dependencies on swapfs a 'default' dep, not an 'implicit' (bsc#1110445)
- mount: make sure we unmount tmpfs mounts before we deactivate swaps (#7076)
- tmp.mount.hm4: After swap.target (#3087)

- Ship systemd-sysv-install helper via the main package
  This script was part of systemd-sysvinit sub-package but it was
  wrong since systemd-sysv-install is a script used to redirect
  enable/disable operations to chkconfig when the unit targets are
  sysv init scripts. Therefore it's never been a SySV init tool.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-10"/>
	<updated date="2018-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1106923">SUSE bug 1106923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108835">SUSE bug 1108835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109252">SUSE bug 1109252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110445">SUSE bug 1110445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111278">SUSE bug 1111278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112024">SUSE bug 1112024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113083">SUSE bug 1113083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113632">SUSE bug 1113632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113665">SUSE bug 1113665</bugzilla>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15686/">CVE-2018-15686</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15688/">CVE-2018-15688</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520352" comment="libsystemd0-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520353" comment="libsystemd0-32bit-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520354" comment="libudev1-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520355" comment="libudev1-32bit-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520356" comment="systemd-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520357" comment="systemd-32bit-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520358" comment="systemd-bash-completion-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520359" comment="systemd-sysvinit-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520360" comment="udev-228-150.53.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78663" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1114837" ref_url="https://bugzilla.suse.com/1114837" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16850" ref_url="https://www.suse.com/security/cve/CVE-2018-16850/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3770-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004954.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

Security issue fixed:

- CVE-2018-16850: Fixed improper quoting of transition table names when pg_dump emits CREATE TRIGGER could have caused privilege escalation (bsc#1114837).

Non-security issues fixed:

- Update to release 10.6:
  * https://www.postgresql.org/docs/current/static/release-10-6.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-12"/>
	<updated date="2018-12-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1114837">SUSE bug 1114837</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-16850/">CVE-2018-16850</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520361" comment="libecpg6-10.6-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520362" comment="libpq5-10.6-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520363" comment="libpq5-32bit-10.6-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520364" comment="postgresql10-10.6-1.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78664" version="1" class="patch">
	<metadata>
		<title>Security update for libwpd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1115713" ref_url="https://bugzilla.suse.com/1115713" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19208" ref_url="https://www.suse.com/security/cve/CVE-2018-19208/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3812-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004939.html" source="SUSE-SU"/>
		<description>
This update for libwpd fixes the following issues:

Security issue fixed:

- CVE-2018-19208: Fixed illegal address access inside libwpd at function WP6ContentListener:defineTable (bsc#1115713).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-10"/>
	<updated date="2018-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1115713">SUSE bug 1115713</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19208/">CVE-2018-19208</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520365" comment="libwpd-0_10-10-0.10.2-2.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78665" version="1" class="patch">
	<metadata>
		<title>Security update for rpm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="943457" ref_url="https://bugzilla.suse.com/943457" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7500" ref_url="https://www.suse.com/security/cve/CVE-2017-7500/" source="CVE"/>
		<reference ref_id="CVE-2017-7501" ref_url="https://www.suse.com/security/cve/CVE-2017-7501/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004885.html" source="SUSE-SU"/>
		<description>
This update for rpm fixes the following issues:

These security issues were fixed:

- CVE-2017-7500: rpm did not properly handle RPM installations when a
  destination path was a symbolic link to a directory, possibly changing
  ownership and permissions of an arbitrary directory, and RPM files being placed
  in an arbitrary destination (bsc#943457).
- CVE-2017-7501: rpm used temporary files with predictable names when
  installing an RPM. An attacker with ability to write in a directory where files
  will be installed could create symbolic links to an arbitrary location and
  modify content, and possibly permissions to arbitrary files, which could be
  used for denial of service or possibly privilege escalation (bsc#943457)

This is a reissue of the above security fixes for SUSE Linux Enterprise 12 GA, SP1 and SP2 LTSS,
they have already been released for SUSE Linux Enterprise Server 12 SP3.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-23"/>
	<updated date="2018-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/943457">SUSE bug 943457</bugzilla>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7500/">CVE-2017-7500</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7501/">CVE-2017-7501</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521784" comment="python3-rpm-4.11.2-16.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520377" comment="rpm-4.11.2-16.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520378" comment="rpm-32bit-4.11.2-16.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520379" comment="rpm-build-4.11.2-16.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520380" comment="rpm-python-4.11.2-16.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78666" version="1" class="patch">
	<metadata>
		<title>Security update for exiv2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1050257" ref_url="https://bugzilla.suse.com/1050257" source="BUGZILLA"/>
		<reference ref_id="1051188" ref_url="https://bugzilla.suse.com/1051188" source="BUGZILLA"/>
		<reference ref_id="1060995" ref_url="https://bugzilla.suse.com/1060995" source="BUGZILLA"/>
		<reference ref_id="1060996" ref_url="https://bugzilla.suse.com/1060996" source="BUGZILLA"/>
		<reference ref_id="1061000" ref_url="https://bugzilla.suse.com/1061000" source="BUGZILLA"/>
		<reference ref_id="1072928" ref_url="https://bugzilla.suse.com/1072928" source="BUGZILLA"/>
		<reference ref_id="1092952" ref_url="https://bugzilla.suse.com/1092952" source="BUGZILLA"/>
		<reference ref_id="1093095" ref_url="https://bugzilla.suse.com/1093095" source="BUGZILLA"/>
		<reference ref_id="1095070" ref_url="https://bugzilla.suse.com/1095070" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11591" ref_url="https://www.suse.com/security/cve/CVE-2017-11591/" source="CVE"/>
		<reference ref_id="CVE-2017-11683" ref_url="https://www.suse.com/security/cve/CVE-2017-11683/" source="CVE"/>
		<reference ref_id="CVE-2017-14859" ref_url="https://www.suse.com/security/cve/CVE-2017-14859/" source="CVE"/>
		<reference ref_id="CVE-2017-14862" ref_url="https://www.suse.com/security/cve/CVE-2017-14862/" source="CVE"/>
		<reference ref_id="CVE-2017-14864" ref_url="https://www.suse.com/security/cve/CVE-2017-14864/" source="CVE"/>
		<reference ref_id="CVE-2017-17669" ref_url="https://www.suse.com/security/cve/CVE-2017-17669/" source="CVE"/>
		<reference ref_id="CVE-2018-10958" ref_url="https://www.suse.com/security/cve/CVE-2018-10958/" source="CVE"/>
		<reference ref_id="CVE-2018-10998" ref_url="https://www.suse.com/security/cve/CVE-2018-10998/" source="CVE"/>
		<reference ref_id="CVE-2018-11531" ref_url="https://www.suse.com/security/cve/CVE-2018-11531/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3882-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004960.html" source="SUSE-SU"/>
		<description>
This update for exiv2 fixes the following issues:

- CVE-2017-11591: A floating point exception in the Exiv2::ValueType function could lead to a remote denial of service attack via crafted input. (bsc#1050257)
- CVE-2017-14864: An invalid memory address dereference was discovered in Exiv2::getULong in types.cpp. The vulnerability caused a segmentation fault and application crash, which lead to denial of service. (bsc#1060995)
- CVE-2017-14862: An invalid memory address dereference was discovered in Exiv2::DataValue::read in value.cpp. The vulnerability caused a segmentation fault and application crash, which lead to denial of service. (bsc#1060996)
- CVE-2017-14859: An invalid memory address dereference was discovered in Exiv2::StringValueBase::read in value.cpp. The vulnerability caused a segmentation fault and application crash, which lead to denial of service. (bsc#1061000)
- CVE-2017-11683: There is a reachable assertion in the Internal::TiffReader::visitDirectory function in tiffvisitor.cpp that could lead to a remote denial of service attack via crafted input. (bsc#1051188)
- CVE-2017-17669: There is a heap-based buffer over-read in the Exiv2::Internal::PngChunk::keyTXTChunk function of pngchunk_int.cpp. A crafted PNG file would lead to a remote denial of service attack. (bsc#1072928)
- CVE-2018-10958: In types.cpp a large size value might have lead to a SIGABRT during an attempt at memory allocation for an Exiv2::Internal::PngChunk::zlibUncompress call. (bsc#1092952)
- CVE-2018-10998: readMetadata in jp2image.cpp allowed remote attackers to cause a denial of service (SIGABRT) by triggering an incorrect Safe::add call. (bsc#1093095)
- CVE-2018-11531: Exiv2 had a heap-based buffer overflow in getData in preview.cpp. (bsc#1095070)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-12"/>
	<updated date="2018-12-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050257">SUSE bug 1050257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051188">SUSE bug 1051188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060995">SUSE bug 1060995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060996">SUSE bug 1060996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061000">SUSE bug 1061000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072928">SUSE bug 1072928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092952">SUSE bug 1092952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093095">SUSE bug 1093095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095070">SUSE bug 1095070</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11591/">CVE-2017-11591</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11683/">CVE-2017-11683</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14859/">CVE-2017-14859</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14862/">CVE-2017-14862</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14864/">CVE-2017-14864</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17669/">CVE-2017-17669</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10958/">CVE-2018-10958</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-10998/">CVE-2018-10998</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11531/">CVE-2018-11531</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520381" comment="libexiv2-12-0.23-12.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78667" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1099257" ref_url="https://bugzilla.suse.com/1099257" source="BUGZILLA"/>
		<reference ref_id="1113094" ref_url="https://bugzilla.suse.com/1113094" source="BUGZILLA"/>
		<reference ref_id="1113672" ref_url="https://bugzilla.suse.com/1113672" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12900" ref_url="https://www.suse.com/security/cve/CVE-2018-12900/" source="CVE"/>
		<reference ref_id="CVE-2018-18557" ref_url="https://www.suse.com/security/cve/CVE-2018-18557/" source="CVE"/>
		<reference ref_id="CVE-2018-18661" ref_url="https://www.suse.com/security/cve/CVE-2018-18661/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3911-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004931.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

Security issues fixed:

- CVE-2018-12900: Fixed heap-based buffer overflow in the cpSeparateBufToContigBuf (bsc#1099257).                                                                                             
- CVE-2018-18661: Fixed NULL pointer dereference in the function LZWDecode in the file tif_lzw.c (bsc#1113672).                                                                               
- CVE-2018-18557: Fixed JBIG decode can lead to out-of-bounds write (bsc#1113094).

Non-security issues fixed:

- asan_build: build ASAN included
- debug_build: build more suitable for debugging
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-06"/>
	<updated date="2018-12-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1099257">SUSE bug 1099257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113094">SUSE bug 1113094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113672">SUSE bug 1113672</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12900/">CVE-2018-12900</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18557/">CVE-2018-18557</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18661/">CVE-2018-18661</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520382" comment="libtiff5-4.0.9-44.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520383" comment="libtiff5-32bit-4.0.9-44.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78668" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1091396" ref_url="https://bugzilla.suse.com/1091396" source="BUGZILLA"/>
		<reference ref_id="1105010" ref_url="https://bugzilla.suse.com/1105010" source="BUGZILLA"/>
		<reference ref_id="964336" ref_url="https://bugzilla.suse.com/964336" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15473" ref_url="https://www.suse.com/security/cve/CVE-2018-15473/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004888.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Following security issues have been fixed:

- CVE-2018-15473: OpenSSH was prone to a user existance oracle vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. (bsc#1105010)

The following non-security issues were fixed:

- Stop leaking File descriptors (bsc#964336)
- sftp-client.c returns wrong error code upon failure [bsc#1091396]

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-26"/>
	<updated date="2018-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091396">SUSE bug 1091396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105010">SUSE bug 1105010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964336">SUSE bug 964336</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15473/">CVE-2018-15473</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520384" comment="openssh-7.2p2-74.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520385" comment="openssh-askpass-gnome-7.2p2-74.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520386" comment="openssh-helpers-7.2p2-74.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78669" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1112209" ref_url="https://bugzilla.suse.com/1112209" source="BUGZILLA"/>
		<reference ref_id="1113651" ref_url="https://bugzilla.suse.com/1113651" source="BUGZILLA"/>
		<reference ref_id="1113652" ref_url="https://bugzilla.suse.com/1113652" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-0735" ref_url="https://www.suse.com/security/cve/CVE-2018-0735/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3945-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183945-1.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:

Security issues fixed:

- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
- CVE-2018-0735: Fixed timing vulnerability in ECDSA signature generation (bsc#1113651).

Non-security issues fixed:

- Fixed infinite loop in DSA generation with incorrect parameters (bsc#1112209).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-29"/>
	<updated date="2018-11-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1112209">SUSE bug 1112209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113651">SUSE bug 1113651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0735/">CVE-2018-0735</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521785" comment="libopenssl1_1-1.1.1-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521786" comment="libopenssl1_1-32bit-1.1.1-2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78670" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1115929" ref_url="https://bugzilla.suse.com/1115929" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19211" ref_url="https://www.suse.com/security/cve/CVE-2018-19211/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3967-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183967-1.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issue:

Security issue fixed:

- CVE-2018-19211: Fixed denial of service issue that was triggered by a NULL pointer dereference at function _nc_parse_entry (bsc#1115929).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-03"/>
	<updated date="2018-12-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1115929">SUSE bug 1115929</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19211/">CVE-2018-19211</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520387" comment="libncurses5-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520388" comment="libncurses5-32bit-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520389" comment="libncurses6-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520390" comment="libncurses6-32bit-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520391" comment="ncurses-devel-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520392" comment="ncurses-utils-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520393" comment="tack-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520394" comment="terminfo-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520395" comment="terminfo-base-5.9-61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78671" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_0_0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1100078" ref_url="https://bugzilla.suse.com/1100078" source="BUGZILLA"/>
		<reference ref_id="1112209" ref_url="https://bugzilla.suse.com/1112209" source="BUGZILLA"/>
		<reference ref_id="1113534" ref_url="https://bugzilla.suse.com/1113534" source="BUGZILLA"/>
		<reference ref_id="1113652" ref_url="https://bugzilla.suse.com/1113652" source="BUGZILLA"/>
		<reference ref_id="1113742" ref_url="https://bugzilla.suse.com/1113742" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004923.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_0_0 fixes the following issues:


Security issues fixed:

- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).
- Add missing timing side channel patch for DSA signature generation (bsc#1113742).

Non-security issues fixed:

- Fixed infinite loop in DSA generation with incorrect parameters (bsc#1112209).
- Set TLS version to 0 in msg_callback for record messages to avoid confusing applications (bsc#1100078).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-05"/>
	<updated date="2018-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100078">SUSE bug 1100078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112209">SUSE bug 1112209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113742">SUSE bug 1113742</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521787" comment="libopenssl-1_0_0-devel-1.0.2p-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521788" comment="libopenssl1_0_0-1.0.2p-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521789" comment="libopenssl1_0_0-32bit-1.0.2p-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521790" comment="openssl-1_0_0-1.0.2p-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78672" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1057246" ref_url="https://bugzilla.suse.com/1057246" source="BUGZILLA"/>
		<reference ref_id="1113064" ref_url="https://bugzilla.suse.com/1113064" source="BUGZILLA"/>
		<reference ref_id="1117463" ref_url="https://bugzilla.suse.com/1117463" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18544" ref_url="https://www.suse.com/security/cve/CVE-2018-18544/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004938.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2018-18544: Fixed memory leak in the function WriteMSLImage (bsc#1113064).


Non-security issues fixed:

- Improve import documentation (bsc#1057246).
- Allow override system security policy (bsc#1117463).
- asan_build: build ASAN included
- debug_build: build more suitable for debugging
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-07"/>
	<updated date="2018-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1057246">SUSE bug 1057246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113064">SUSE bug 1113064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18544/">CVE-2018-18544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520396" comment="ImageMagick-6.8.8.1-71.93.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520397" comment="libMagick++-6_Q16-3-6.8.8.1-71.93.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520398" comment="libMagickCore-6_Q16-1-6.8.8.1-71.93.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520399" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.93.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520400" comment="libMagickWand-6_Q16-1-6.8.8.1-71.93.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78673" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography, python-pyOpenSSL (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1021578" ref_url="https://bugzilla.suse.com/1021578" source="BUGZILLA"/>
		<reference ref_id="1111634" ref_url="https://bugzilla.suse.com/1111634" source="BUGZILLA"/>
		<reference ref_id="1111635" ref_url="https://bugzilla.suse.com/1111635" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000807" ref_url="https://www.suse.com/security/cve/CVE-2018-1000807/" source="CVE"/>
		<reference ref_id="CVE-2018-1000808" ref_url="https://www.suse.com/security/cve/CVE-2018-1000808/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004944.html" source="SUSE-SU"/>
		<description>

This update for python-cryptography, python-pyOpenSSL fixes the following issues:

Security issues fixed:

- CVE-2018-1000808: A memory leak due to missing reference checking in PKCS#12 store handling was fixed (bsc#1111634)
- CVE-2018-1000807: A use-after-free in X509 object handling was fixed (bsc#1111635)

- avoid bad interaction with python-cryptography package. (bsc#1021578)

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-10"/>
	<updated date="2018-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1021578">SUSE bug 1021578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111634">SUSE bug 1111634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111635">SUSE bug 1111635</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000807/">CVE-2018-1000807</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000808/">CVE-2018-1000808</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520401" comment="python-cryptography-1.3.1-7.13.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520402" comment="python-pyOpenSSL-16.0.0-4.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520403" comment="python-setuptools-18.0.1-4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521791" comment="python3-cryptography-1.3.1-7.13.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521792" comment="python3-pyOpenSSL-16.0.0-4.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520404" comment="python3-setuptools-18.0.1-4.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78674" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl098 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1104789" ref_url="https://bugzilla.suse.com/1104789" source="BUGZILLA"/>
		<reference ref_id="1110018" ref_url="https://bugzilla.suse.com/1110018" source="BUGZILLA"/>
		<reference ref_id="1113534" ref_url="https://bugzilla.suse.com/1113534" source="BUGZILLA"/>
		<reference ref_id="1113652" ref_url="https://bugzilla.suse.com/1113652" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004950.html" source="SUSE-SU"/>
		<description>
This update for compat-openssl098 fixes the following issues:

Security issues fixed:

- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).
- CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018).
- Fixed the 'One and Done' side-channel attack on RSA (bsc#1104789).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-11"/>
	<updated date="2018-12-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104789">SUSE bug 1104789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110018">SUSE bug 1110018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520405" comment="libopenssl0_9_8-0.9.8j-106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520406" comment="libopenssl0_9_8-32bit-0.9.8j-106.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78675" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1051510" ref_url="https://bugzilla.suse.com/1051510" source="BUGZILLA"/>
		<reference ref_id="1055120" ref_url="https://bugzilla.suse.com/1055120" source="BUGZILLA"/>
		<reference ref_id="1061840" ref_url="https://bugzilla.suse.com/1061840" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1066674" ref_url="https://bugzilla.suse.com/1066674" source="BUGZILLA"/>
		<reference ref_id="1067906" ref_url="https://bugzilla.suse.com/1067906" source="BUGZILLA"/>
		<reference ref_id="1068273" ref_url="https://bugzilla.suse.com/1068273" source="BUGZILLA"/>
		<reference ref_id="1076830" ref_url="https://bugzilla.suse.com/1076830" source="BUGZILLA"/>
		<reference ref_id="1078248" ref_url="https://bugzilla.suse.com/1078248" source="BUGZILLA"/>
		<reference ref_id="1079524" ref_url="https://bugzilla.suse.com/1079524" source="BUGZILLA"/>
		<reference ref_id="1082555" ref_url="https://bugzilla.suse.com/1082555" source="BUGZILLA"/>
		<reference ref_id="1082653" ref_url="https://bugzilla.suse.com/1082653" source="BUGZILLA"/>
		<reference ref_id="1083647" ref_url="https://bugzilla.suse.com/1083647" source="BUGZILLA"/>
		<reference ref_id="1084760" ref_url="https://bugzilla.suse.com/1084760" source="BUGZILLA"/>
		<reference ref_id="1084831" ref_url="https://bugzilla.suse.com/1084831" source="BUGZILLA"/>
		<reference ref_id="1085535" ref_url="https://bugzilla.suse.com/1085535" source="BUGZILLA"/>
		<reference ref_id="1086196" ref_url="https://bugzilla.suse.com/1086196" source="BUGZILLA"/>
		<reference ref_id="1089350" ref_url="https://bugzilla.suse.com/1089350" source="BUGZILLA"/>
		<reference ref_id="1091800" ref_url="https://bugzilla.suse.com/1091800" source="BUGZILLA"/>
		<reference ref_id="1094825" ref_url="https://bugzilla.suse.com/1094825" source="BUGZILLA"/>
		<reference ref_id="1095805" ref_url="https://bugzilla.suse.com/1095805" source="BUGZILLA"/>
		<reference ref_id="1097755" ref_url="https://bugzilla.suse.com/1097755" source="BUGZILLA"/>
		<reference ref_id="1100132" ref_url="https://bugzilla.suse.com/1100132" source="BUGZILLA"/>
		<reference ref_id="1103356" ref_url="https://bugzilla.suse.com/1103356" source="BUGZILLA"/>
		<reference ref_id="1103925" ref_url="https://bugzilla.suse.com/1103925" source="BUGZILLA"/>
		<reference ref_id="1104124" ref_url="https://bugzilla.suse.com/1104124" source="BUGZILLA"/>
		<reference ref_id="1104731" ref_url="https://bugzilla.suse.com/1104731" source="BUGZILLA"/>
		<reference ref_id="1104824" ref_url="https://bugzilla.suse.com/1104824" source="BUGZILLA"/>
		<reference ref_id="1105025" ref_url="https://bugzilla.suse.com/1105025" source="BUGZILLA"/>
		<reference ref_id="1105428" ref_url="https://bugzilla.suse.com/1105428" source="BUGZILLA"/>
		<reference ref_id="1106105" ref_url="https://bugzilla.suse.com/1106105" source="BUGZILLA"/>
		<reference ref_id="1106110" ref_url="https://bugzilla.suse.com/1106110" source="BUGZILLA"/>
		<reference ref_id="1106237" ref_url="https://bugzilla.suse.com/1106237" source="BUGZILLA"/>
		<reference ref_id="1106240" ref_url="https://bugzilla.suse.com/1106240" source="BUGZILLA"/>
		<reference ref_id="1107256" ref_url="https://bugzilla.suse.com/1107256" source="BUGZILLA"/>
		<reference ref_id="1107385" ref_url="https://bugzilla.suse.com/1107385" source="BUGZILLA"/>
		<reference ref_id="1107866" ref_url="https://bugzilla.suse.com/1107866" source="BUGZILLA"/>
		<reference ref_id="1108377" ref_url="https://bugzilla.suse.com/1108377" source="BUGZILLA"/>
		<reference ref_id="1108468" ref_url="https://bugzilla.suse.com/1108468" source="BUGZILLA"/>
		<reference ref_id="1109330" ref_url="https://bugzilla.suse.com/1109330" source="BUGZILLA"/>
		<reference ref_id="1109739" ref_url="https://bugzilla.suse.com/1109739" source="BUGZILLA"/>
		<reference ref_id="1109772" ref_url="https://bugzilla.suse.com/1109772" source="BUGZILLA"/>
		<reference ref_id="1109806" ref_url="https://bugzilla.suse.com/1109806" source="BUGZILLA"/>
		<reference ref_id="1109818" ref_url="https://bugzilla.suse.com/1109818" source="BUGZILLA"/>
		<reference ref_id="1109907" ref_url="https://bugzilla.suse.com/1109907" source="BUGZILLA"/>
		<reference ref_id="1109911" ref_url="https://bugzilla.suse.com/1109911" source="BUGZILLA"/>
		<reference ref_id="1109915" ref_url="https://bugzilla.suse.com/1109915" source="BUGZILLA"/>
		<reference ref_id="1109919" ref_url="https://bugzilla.suse.com/1109919" source="BUGZILLA"/>
		<reference ref_id="1109951" ref_url="https://bugzilla.suse.com/1109951" source="BUGZILLA"/>
		<reference ref_id="1110006" ref_url="https://bugzilla.suse.com/1110006" source="BUGZILLA"/>
		<reference ref_id="1110998" ref_url="https://bugzilla.suse.com/1110998" source="BUGZILLA"/>
		<reference ref_id="1111040" ref_url="https://bugzilla.suse.com/1111040" source="BUGZILLA"/>
		<reference ref_id="1111062" ref_url="https://bugzilla.suse.com/1111062" source="BUGZILLA"/>
		<reference ref_id="1111174" ref_url="https://bugzilla.suse.com/1111174" source="BUGZILLA"/>
		<reference ref_id="1111506" ref_url="https://bugzilla.suse.com/1111506" source="BUGZILLA"/>
		<reference ref_id="1111696" ref_url="https://bugzilla.suse.com/1111696" source="BUGZILLA"/>
		<reference ref_id="1111809" ref_url="https://bugzilla.suse.com/1111809" source="BUGZILLA"/>
		<reference ref_id="1111921" ref_url="https://bugzilla.suse.com/1111921" source="BUGZILLA"/>
		<reference ref_id="1111983" ref_url="https://bugzilla.suse.com/1111983" source="BUGZILLA"/>
		<reference ref_id="1112128" ref_url="https://bugzilla.suse.com/1112128" source="BUGZILLA"/>
		<reference ref_id="1112170" ref_url="https://bugzilla.suse.com/1112170" source="BUGZILLA"/>
		<reference ref_id="1112173" ref_url="https://bugzilla.suse.com/1112173" source="BUGZILLA"/>
		<reference ref_id="1112208" ref_url="https://bugzilla.suse.com/1112208" source="BUGZILLA"/>
		<reference ref_id="1112219" ref_url="https://bugzilla.suse.com/1112219" source="BUGZILLA"/>
		<reference ref_id="1112221" ref_url="https://bugzilla.suse.com/1112221" source="BUGZILLA"/>
		<reference ref_id="1112246" ref_url="https://bugzilla.suse.com/1112246" source="BUGZILLA"/>
		<reference ref_id="1112372" ref_url="https://bugzilla.suse.com/1112372" source="BUGZILLA"/>
		<reference ref_id="1112514" ref_url="https://bugzilla.suse.com/1112514" source="BUGZILLA"/>
		<reference ref_id="1112554" ref_url="https://bugzilla.suse.com/1112554" source="BUGZILLA"/>
		<reference ref_id="1112708" ref_url="https://bugzilla.suse.com/1112708" source="BUGZILLA"/>
		<reference ref_id="1112710" ref_url="https://bugzilla.suse.com/1112710" source="BUGZILLA"/>
		<reference ref_id="1112711" ref_url="https://bugzilla.suse.com/1112711" source="BUGZILLA"/>
		<reference ref_id="1112712" ref_url="https://bugzilla.suse.com/1112712" source="BUGZILLA"/>
		<reference ref_id="1112713" ref_url="https://bugzilla.suse.com/1112713" source="BUGZILLA"/>
		<reference ref_id="1112731" ref_url="https://bugzilla.suse.com/1112731" source="BUGZILLA"/>
		<reference ref_id="1112732" ref_url="https://bugzilla.suse.com/1112732" source="BUGZILLA"/>
		<reference ref_id="1112733" ref_url="https://bugzilla.suse.com/1112733" source="BUGZILLA"/>
		<reference ref_id="1112734" ref_url="https://bugzilla.suse.com/1112734" source="BUGZILLA"/>
		<reference ref_id="1112735" ref_url="https://bugzilla.suse.com/1112735" source="BUGZILLA"/>
		<reference ref_id="1112736" ref_url="https://bugzilla.suse.com/1112736" source="BUGZILLA"/>
		<reference ref_id="1112738" ref_url="https://bugzilla.suse.com/1112738" source="BUGZILLA"/>
		<reference ref_id="1112739" ref_url="https://bugzilla.suse.com/1112739" source="BUGZILLA"/>
		<reference ref_id="1112740" ref_url="https://bugzilla.suse.com/1112740" source="BUGZILLA"/>
		<reference ref_id="1112741" ref_url="https://bugzilla.suse.com/1112741" source="BUGZILLA"/>
		<reference ref_id="1112743" ref_url="https://bugzilla.suse.com/1112743" source="BUGZILLA"/>
		<reference ref_id="1112745" ref_url="https://bugzilla.suse.com/1112745" source="BUGZILLA"/>
		<reference ref_id="1112746" ref_url="https://bugzilla.suse.com/1112746" source="BUGZILLA"/>
		<reference ref_id="1112878" ref_url="https://bugzilla.suse.com/1112878" source="BUGZILLA"/>
		<reference ref_id="1112894" ref_url="https://bugzilla.suse.com/1112894" source="BUGZILLA"/>
		<reference ref_id="1112899" ref_url="https://bugzilla.suse.com/1112899" source="BUGZILLA"/>
		<reference ref_id="1112902" ref_url="https://bugzilla.suse.com/1112902" source="BUGZILLA"/>
		<reference ref_id="1112903" ref_url="https://bugzilla.suse.com/1112903" source="BUGZILLA"/>
		<reference ref_id="1112905" ref_url="https://bugzilla.suse.com/1112905" source="BUGZILLA"/>
		<reference ref_id="1112906" ref_url="https://bugzilla.suse.com/1112906" source="BUGZILLA"/>
		<reference ref_id="1112907" ref_url="https://bugzilla.suse.com/1112907" source="BUGZILLA"/>
		<reference ref_id="1112963" ref_url="https://bugzilla.suse.com/1112963" source="BUGZILLA"/>
		<reference ref_id="1113257" ref_url="https://bugzilla.suse.com/1113257" source="BUGZILLA"/>
		<reference ref_id="1113284" ref_url="https://bugzilla.suse.com/1113284" source="BUGZILLA"/>
		<reference ref_id="1113295" ref_url="https://bugzilla.suse.com/1113295" source="BUGZILLA"/>
		<reference ref_id="1113408" ref_url="https://bugzilla.suse.com/1113408" source="BUGZILLA"/>
		<reference ref_id="1113412" ref_url="https://bugzilla.suse.com/1113412" source="BUGZILLA"/>
		<reference ref_id="1113501" ref_url="https://bugzilla.suse.com/1113501" source="BUGZILLA"/>
		<reference ref_id="1113667" ref_url="https://bugzilla.suse.com/1113667" source="BUGZILLA"/>
		<reference ref_id="1113677" ref_url="https://bugzilla.suse.com/1113677" source="BUGZILLA"/>
		<reference ref_id="1113722" ref_url="https://bugzilla.suse.com/1113722" source="BUGZILLA"/>
		<reference ref_id="1113751" ref_url="https://bugzilla.suse.com/1113751" source="BUGZILLA"/>
		<reference ref_id="1113769" ref_url="https://bugzilla.suse.com/1113769" source="BUGZILLA"/>
		<reference ref_id="1113780" ref_url="https://bugzilla.suse.com/1113780" source="BUGZILLA"/>
		<reference ref_id="1113972" ref_url="https://bugzilla.suse.com/1113972" source="BUGZILLA"/>
		<reference ref_id="1114015" ref_url="https://bugzilla.suse.com/1114015" source="BUGZILLA"/>
		<reference ref_id="1114178" ref_url="https://bugzilla.suse.com/1114178" source="BUGZILLA"/>
		<reference ref_id="1114279" ref_url="https://bugzilla.suse.com/1114279" source="BUGZILLA"/>
		<reference ref_id="1114385" ref_url="https://bugzilla.suse.com/1114385" source="BUGZILLA"/>
		<reference ref_id="1114576" ref_url="https://bugzilla.suse.com/1114576" source="BUGZILLA"/>
		<reference ref_id="1114577" ref_url="https://bugzilla.suse.com/1114577" source="BUGZILLA"/>
		<reference ref_id="1114578" ref_url="https://bugzilla.suse.com/1114578" source="BUGZILLA"/>
		<reference ref_id="1114579" ref_url="https://bugzilla.suse.com/1114579" source="BUGZILLA"/>
		<reference ref_id="1114580" ref_url="https://bugzilla.suse.com/1114580" source="BUGZILLA"/>
		<reference ref_id="1114581" ref_url="https://bugzilla.suse.com/1114581" source="BUGZILLA"/>
		<reference ref_id="1114582" ref_url="https://bugzilla.suse.com/1114582" source="BUGZILLA"/>
		<reference ref_id="1114583" ref_url="https://bugzilla.suse.com/1114583" source="BUGZILLA"/>
		<reference ref_id="1114584" ref_url="https://bugzilla.suse.com/1114584" source="BUGZILLA"/>
		<reference ref_id="1114585" ref_url="https://bugzilla.suse.com/1114585" source="BUGZILLA"/>
		<reference ref_id="1114839" ref_url="https://bugzilla.suse.com/1114839" source="BUGZILLA"/>
		<reference ref_id="1115074" ref_url="https://bugzilla.suse.com/1115074" source="BUGZILLA"/>
		<reference ref_id="1115269" ref_url="https://bugzilla.suse.com/1115269" source="BUGZILLA"/>
		<reference ref_id="1115431" ref_url="https://bugzilla.suse.com/1115431" source="BUGZILLA"/>
		<reference ref_id="1115433" ref_url="https://bugzilla.suse.com/1115433" source="BUGZILLA"/>
		<reference ref_id="1115440" ref_url="https://bugzilla.suse.com/1115440" source="BUGZILLA"/>
		<reference ref_id="1115567" ref_url="https://bugzilla.suse.com/1115567" source="BUGZILLA"/>
		<reference ref_id="1115709" ref_url="https://bugzilla.suse.com/1115709" source="BUGZILLA"/>
		<reference ref_id="1115976" ref_url="https://bugzilla.suse.com/1115976" source="BUGZILLA"/>
		<reference ref_id="1116183" ref_url="https://bugzilla.suse.com/1116183" source="BUGZILLA"/>
		<reference ref_id="1116692" ref_url="https://bugzilla.suse.com/1116692" source="BUGZILLA"/>
		<reference ref_id="1116693" ref_url="https://bugzilla.suse.com/1116693" source="BUGZILLA"/>
		<reference ref_id="1116698" ref_url="https://bugzilla.suse.com/1116698" source="BUGZILLA"/>
		<reference ref_id="1116699" ref_url="https://bugzilla.suse.com/1116699" source="BUGZILLA"/>
		<reference ref_id="1116700" ref_url="https://bugzilla.suse.com/1116700" source="BUGZILLA"/>
		<reference ref_id="1116701" ref_url="https://bugzilla.suse.com/1116701" source="BUGZILLA"/>
		<reference ref_id="1116862" ref_url="https://bugzilla.suse.com/1116862" source="BUGZILLA"/>
		<reference ref_id="1116863" ref_url="https://bugzilla.suse.com/1116863" source="BUGZILLA"/>
		<reference ref_id="1116876" ref_url="https://bugzilla.suse.com/1116876" source="BUGZILLA"/>
		<reference ref_id="1116877" ref_url="https://bugzilla.suse.com/1116877" source="BUGZILLA"/>
		<reference ref_id="1116878" ref_url="https://bugzilla.suse.com/1116878" source="BUGZILLA"/>
		<reference ref_id="1116891" ref_url="https://bugzilla.suse.com/1116891" source="BUGZILLA"/>
		<reference ref_id="1116895" ref_url="https://bugzilla.suse.com/1116895" source="BUGZILLA"/>
		<reference ref_id="1116899" ref_url="https://bugzilla.suse.com/1116899" source="BUGZILLA"/>
		<reference ref_id="1116950" ref_url="https://bugzilla.suse.com/1116950" source="BUGZILLA"/>
		<reference ref_id="1117168" ref_url="https://bugzilla.suse.com/1117168" source="BUGZILLA"/>
		<reference ref_id="1117172" ref_url="https://bugzilla.suse.com/1117172" source="BUGZILLA"/>
		<reference ref_id="1117174" ref_url="https://bugzilla.suse.com/1117174" source="BUGZILLA"/>
		<reference ref_id="1117181" ref_url="https://bugzilla.suse.com/1117181" source="BUGZILLA"/>
		<reference ref_id="1117184" ref_url="https://bugzilla.suse.com/1117184" source="BUGZILLA"/>
		<reference ref_id="1117188" ref_url="https://bugzilla.suse.com/1117188" source="BUGZILLA"/>
		<reference ref_id="1117189" ref_url="https://bugzilla.suse.com/1117189" source="BUGZILLA"/>
		<reference ref_id="1117349" ref_url="https://bugzilla.suse.com/1117349" source="BUGZILLA"/>
		<reference ref_id="1117561" ref_url="https://bugzilla.suse.com/1117561" source="BUGZILLA"/>
		<reference ref_id="1117788" ref_url="https://bugzilla.suse.com/1117788" source="BUGZILLA"/>
		<reference ref_id="1117789" ref_url="https://bugzilla.suse.com/1117789" source="BUGZILLA"/>
		<reference ref_id="1117790" ref_url="https://bugzilla.suse.com/1117790" source="BUGZILLA"/>
		<reference ref_id="1117791" ref_url="https://bugzilla.suse.com/1117791" source="BUGZILLA"/>
		<reference ref_id="1117792" ref_url="https://bugzilla.suse.com/1117792" source="BUGZILLA"/>
		<reference ref_id="1117794" ref_url="https://bugzilla.suse.com/1117794" source="BUGZILLA"/>
		<reference ref_id="1117795" ref_url="https://bugzilla.suse.com/1117795" source="BUGZILLA"/>
		<reference ref_id="1117796" ref_url="https://bugzilla.suse.com/1117796" source="BUGZILLA"/>
		<reference ref_id="1117798" ref_url="https://bugzilla.suse.com/1117798" source="BUGZILLA"/>
		<reference ref_id="1117799" ref_url="https://bugzilla.suse.com/1117799" source="BUGZILLA"/>
		<reference ref_id="1117801" ref_url="https://bugzilla.suse.com/1117801" source="BUGZILLA"/>
		<reference ref_id="1117802" ref_url="https://bugzilla.suse.com/1117802" source="BUGZILLA"/>
		<reference ref_id="1117803" ref_url="https://bugzilla.suse.com/1117803" source="BUGZILLA"/>
		<reference ref_id="1117804" ref_url="https://bugzilla.suse.com/1117804" source="BUGZILLA"/>
		<reference ref_id="1117805" ref_url="https://bugzilla.suse.com/1117805" source="BUGZILLA"/>
		<reference ref_id="1117806" ref_url="https://bugzilla.suse.com/1117806" source="BUGZILLA"/>
		<reference ref_id="1117807" ref_url="https://bugzilla.suse.com/1117807" source="BUGZILLA"/>
		<reference ref_id="1117808" ref_url="https://bugzilla.suse.com/1117808" source="BUGZILLA"/>
		<reference ref_id="1117815" ref_url="https://bugzilla.suse.com/1117815" source="BUGZILLA"/>
		<reference ref_id="1117816" ref_url="https://bugzilla.suse.com/1117816" source="BUGZILLA"/>
		<reference ref_id="1117817" ref_url="https://bugzilla.suse.com/1117817" source="BUGZILLA"/>
		<reference ref_id="1117818" ref_url="https://bugzilla.suse.com/1117818" source="BUGZILLA"/>
		<reference ref_id="1117819" ref_url="https://bugzilla.suse.com/1117819" source="BUGZILLA"/>
		<reference ref_id="1117820" ref_url="https://bugzilla.suse.com/1117820" source="BUGZILLA"/>
		<reference ref_id="1117821" ref_url="https://bugzilla.suse.com/1117821" source="BUGZILLA"/>
		<reference ref_id="1117822" ref_url="https://bugzilla.suse.com/1117822" source="BUGZILLA"/>
		<reference ref_id="1118102" ref_url="https://bugzilla.suse.com/1118102" source="BUGZILLA"/>
		<reference ref_id="1118136" ref_url="https://bugzilla.suse.com/1118136" source="BUGZILLA"/>
		<reference ref_id="1118137" ref_url="https://bugzilla.suse.com/1118137" source="BUGZILLA"/>
		<reference ref_id="1118138" ref_url="https://bugzilla.suse.com/1118138" source="BUGZILLA"/>
		<reference ref_id="1118140" ref_url="https://bugzilla.suse.com/1118140" source="BUGZILLA"/>
		<reference ref_id="1118152" ref_url="https://bugzilla.suse.com/1118152" source="BUGZILLA"/>
		<reference ref_id="1118316" ref_url="https://bugzilla.suse.com/1118316" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16533" ref_url="https://www.suse.com/security/cve/CVE-2017-16533/" source="CVE"/>
		<reference ref_id="CVE-2017-18224" ref_url="https://www.suse.com/security/cve/CVE-2017-18224/" source="CVE"/>
		<reference ref_id="CVE-2018-18281" ref_url="https://www.suse.com/security/cve/CVE-2018-18281/" source="CVE"/>
		<reference ref_id="CVE-2018-18386" ref_url="https://www.suse.com/security/cve/CVE-2018-18386/" source="CVE"/>
		<reference ref_id="CVE-2018-18445" ref_url="https://www.suse.com/security/cve/CVE-2018-18445/" source="CVE"/>
		<reference ref_id="CVE-2018-18710" ref_url="https://www.suse.com/security/cve/CVE-2018-18710/" source="CVE"/>
		<reference ref_id="CVE-2018-19824" ref_url="https://www.suse.com/security/cve/CVE-2018-19824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004951.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).
- CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removed entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry could remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).
- CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).
- CVE-2018-18445: Faulty computation of numeric bounds in the BPF verifier permitted out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandled 32-bit right shifts (bnc#1112372).
- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).
- CVE-2017-18224: fs/ocfs2/aops.c omitted use of a semaphore and consequently had a race condition for access to the extent tree during read operations in DIRECT mode, which allowed local users to cause a denial of service (BUG) by modifying a certain e_cpos field (bnc#1084831).
- CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674).

The following non-security bugs were fixed:

- ACPI/APEI: Handle GSIV and GPIO notification types (bsc#1115567).
- ACPICA: Tables: Add WSMT support (bsc#1089350).
- ACPI/IORT: Fix iort_get_platform_device_domain() uninitialized pointer value (bsc#1051510).
- ACPI / LPSS: Add alternative ACPI HIDs for Cherry Trail DMA controllers (bsc#1051510).
- ACPI, nfit: Fix ARS overflow continuation (bsc#1116895).
- ACPI, nfit: Prefer _DSM over _LSR for namespace label reads (bsc#1112128).
- ACPI/nfit, x86/mce: Handle only uncorrectable machine checks (bsc#1114279).
- ACPI/nfit, x86/mce: Validate a MCE's address before using it (bsc#1114279).
- ACPI / platform: Add SMB0001 HID to forbidden_id_list (bsc#1051510).
- ACPI / processor: Fix the return value of acpi_processor_ids_walk() (bsc#1051510).
- ACPI / watchdog: Prefer iTCO_wdt always when WDAT table uses RTC SRAM (bsc#1051510).
- act_ife: fix a potential use-after-free (networking-stable-18_09_11).
- Add the cherry-picked dup id for PCI dwc fix
- Add version information to KLP_SYMBOLS file
- ALSA: ac97: Fix incorrect bit shift at AC97-SPSA control write (bsc#1051510).
- ALSA: ca0106: Disable IZD on SB0570 DAC to fix audio pops (bsc#1051510).
- ALSA: control: Fix race between adding and removing a user element (bsc#1051510).
- ALSA: hda: Add 2 more models to the power_save blacklist (bsc#1051510).
- ALSA: hda: Add ASRock N68C-S UCC the power_save blacklist (bsc#1051510).
- ALSA: hda - Add mic quirk for the Lenovo G50-30 (17aa:3905) (bsc#1051510).
- ALSA: hda - Add quirk for ASUS G751 laptop (bsc#1051510).
- ALSA: hda/ca0132 - Call pci_iounmap() instead of iounmap() (bsc#1051510).
- ALSA: hda - Fix headphone pin config for ASUS G751 (bsc#1051510).
- ALSA: hda: fix unused variable warning (bsc#1051510).
- ALSA: hda/realtek - Add auto-mute quirk for HP Spectre x360 laptop (bsc#1051510).
- ALSA: hda/realtek - Add GPIO data update helper (bsc#1051510).
- ALSA: hda/realtek - Allow skipping spec-&gt;init_amp detection (bsc#1051510).
- ALSA: hda/realtek - fix headset mic detection for MSI MS-B171 (bsc#1051510).
- ALSA: hda/realtek - Fix HP Headset Mic can't record (bsc#1051510).
- ALSA: hda/realtek - fix the pop noise on headphone for lenovo laptops (bsc#1051510).
- ALSA: hda/realtek - Fix the problem of the front MIC on the Lenovo M715 (bsc#1051510).
- ALSA: hda/realtek - Manage GPIO bits commonly (bsc#1051510).
- ALSA: hda/realtek - Simplify Dell XPS13 GPIO handling (bsc#1051510).
- ALSA: hda/realtek - Support ALC300 (bsc#1051510).
- ALSA: oss: Use kvzalloc() for local buffer allocations (bsc#1051510).
- ALSA: sparc: Fix invalid snd_free_pages() at error path (bsc#1051510).
- ALSA: usb-audio: Add vendor and product name for Dell WD19 Dock (bsc#1051510).
- ALSA: usb-audio: update quirk for B&amp;W PX to remove microphone (bsc#1051510).
- ALSA: wss: Fix invalid snd_free_pages() at error path (bsc#1051510).
- amd/iommu: Fix Guest Virtual APIC Log Tail Address Register (bsc#1106105).
- arm64: KVM: Move CPU ID reg trap setup off the world switch path (bsc#1110998).
- arm64: KVM: Sanitize PSTATE.M when being set from userspace (bsc#1110998).
- arm64: KVM: Tighten guest core register access from userspace (bsc#1110998).
- ARM: dts: at91: add new compatibility string for macb on sama5d3 (bsc#1051510).
- ASoC: dwc: Added a quirk DW_I2S_QUIRK_16BIT_IDX_OVERRIDE to dwc (bsc#1085535)
- ASoC: Intel: cht_bsw_max98090: add support for Baytrail (bsc#1051510).
- ASoC: intel: cht_bsw_max98090_ti: Add quirk for boards using pmc_plt_clk_0 (bsc#1051510).
- ASoC: intel: skylake: Add missing break in skl_tplg_get_token() (bsc#1051510).
- ASoC: Intel: Skylake: Reset the controller in probe (bsc#1051510).
- ASoC: rsnd: adg: care clock-frequency size (bsc#1051510).
- ASoC: rsnd: do not fallback to PIO mode when -EPROBE_DEFER (bsc#1051510).
- ASoC: rt5514: Fix the issue of the delay volume applied again (bsc#1051510).
- ASoC: sigmadsp: safeload should not have lower byte limit (bsc#1051510).
- ASoC: sun8i-codec: fix crash on module removal (bsc#1051510).
- ASoC: wm8804: Add ACPI support (bsc#1051510).
- ata: Fix racy link clearance (bsc#1107866).
- ataflop: fix error handling during setup (bsc#1051510).
- ath10k: fix kernel panic issue during pci probe (bsc#1051510).
- ath10k: fix scan crash due to incorrect length calculation (bsc#1051510).
- ath10k: fix use-after-free in ath10k_wmi_cmd_send_nowait (bsc#1051510).
- ath10k: schedule hardware restart if WMI command times out (bsc#1051510).
- autofs: fix autofs_sbi() does not check super block type (git-fixes).
- autofs: fix slab out of bounds read in getname_kernel() (git-fixes).
- autofs: mount point create should honour passed in mode (git-fixes).
- badblocks: fix wrong return value in badblocks_set if badblocks are disabled (git-fixes).
- batman-adv: Avoid probe ELP information leak (bsc#1051510).
- batman-adv: Expand merged fragment buffer for full packet (bsc#1051510).
- batman-adv: fix backbone_gw refcount on queue_work() failure (bsc#1051510).
- batman-adv: fix hardif_neigh refcount on queue_work() failure (bsc#1051510).
- batman-adv: Use explicit tvlv padding for ELP packets (bsc#1051510).
- bdi: Fix another oops in wb_workfn() (bsc#1112746).
- bdi: Preserve kabi when adding cgwb_release_mutex (bsc#1112746).
- bitops: protect variables in bit_clear_unless() macro (bsc#1051510).
- bitops: protect variables in set_mask_bits() macro (bsc#1051510).
- Blacklist commit that modifies Scsi_Host/kabi (bsc#1114579)
- Blacklist sd_zbc patch that is too invasive (bsc#1114583)
- Blacklist virtio patch that uses bio_integrity_bytes() (bsc#1114585)
- blk-mq: I/O and timer unplugs are inverted in blktrace (bsc#1112713).
- block, bfq: fix wrong init of saved start time for weight raising (bsc#1112708).
- block: bfq: swap puts in bfqg_and_blkg_put (bsc#1112712).
- block: copy ioprio in __bio_clone_fast() (bsc#1082653).
- block: respect virtual boundary mask in bvecs (bsc#1113412).
- Bluetooth: btbcm: Add entry for BCM4335C0 UART bluetooth (bsc#1051510).
- Bluetooth: SMP: fix crash in unpairing (bsc#1051510).
- bnxt_en: Fix TX timeout during netpoll (networking-stable-18_10_16).
- bnxt_en: free hwrm resources, if driver probe fails (networking-stable-18_10_16).
- bonding: avoid possible dead-lock (networking-stable-18_10_16).
- bonding: fix length of actor system (networking-stable-18_11_02).
- bonding: fix warning message (networking-stable-18_10_16).
- bonding: pass link-local packets to bonding master also (networking-stable-18_10_16).
- bpf: fix partial copy of map_ptr when dst is scalar (bsc#1083647).
- bpf, net: add skb_mac_header_len helper (networking-stable-18_09_24).
- bpf/verifier: disallow pointer subtraction (bsc#1083647).
- bpf: wait for running BPF programs when updating map-in-map (bsc#1083647).
- brcmfmac: fix for proper support of 160MHz bandwidth (bsc#1051510).
- brcmfmac: fix reporting support for 160 MHz channels (bsc#1051510).
- brcmutil: really fix decoding channel info for 160 MHz bandwidth (bsc#1051510).
- bridge: do not add port to router list when receives query with source 0.0.0.0 (networking-stable-18_11_02).
- Btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency for bsc#1113667).
- Btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667).
- Btrfs: fix assertion failure during fsync in no-holes mode (bsc#1118136).
- Btrfs: fix assertion on fsync of regular file when using no-holes feature (bsc#1118137).
- Btrfs: fix cur_offset in the error case for nocow (bsc#1118140).
- Btrfs: fix data corruption due to cloning of eof block (bsc#1116878).
- Btrfs: fix deadlock on tree root leaf when finding free extent (bsc#1116876).
- Btrfs: fix deadlock when writing out free space caches (bsc#1116700).
- Btrfs: fix infinite loop on inode eviction after deduplication of eof block (bsc#1116877).
- Btrfs: fix missing error return in btrfs_drop_snapshot (Git-fixes bsc#1109919).
- Btrfs: fix null pointer dereference on compressed write path error (bsc#1116698).
- Btrfs: fix use-after-free during inode eviction (bsc#1116701).
- Btrfs: fix use-after-free when dumping free space (bsc#1116862).
- Btrfs: fix warning when replaying log after fsync of a tmpfile (bsc#1116692).
- Btrfs: fix wrong dentries after fsync of file that got its parent replaced (bsc#1116693).
- Btrfs: handle errors while updating refcounts in update_ref_for_cow (Git-fixes bsc#1109915).
- Btrfs: make sure we create all new block groups (bsc#1116699).
- Btrfs: protect space cache inode alloc with GFP_NOFS (bsc#1116863).
- Btrfs: send, fix infinite loop due to directory rename dependencies (bsc#1118138).
- cachefiles: fix the race between cachefiles_bury_object() and rmdir(2) (bsc#1051510).
- can: dev: __can_get_echo_skb(): Do not crash the kernel if can_priv::echo_skb is accessed out of bounds (bsc#1051510).
- can: dev: can_get_echo_skb(): factor out non sending code to __can_get_echo_skb() (bsc#1051510).
- can: dev: __can_get_echo_skb(): print error message, if trying to echo non existing skb (bsc#1051510).
- can: dev: __can_get_echo_skb(): replace struct can_frame by canfd_frame to access frame length (bsc#1051510).
- can: hi311x: Use level-triggered interrupt (bsc#1051510).
- can: raw: check for CAN FD capable netdev in raw_sendmsg() (bsc#1051510).
- can: rcar_can: Fix erroneous registration (bsc#1051510).
- can: rx-offload: introduce can_rx_offload_get_echo_skb() and can_rx_offload_queue_sorted() functions (bsc#1051510).
- cdc-acm: correct counting of UART states in serial state notification (bsc#1051510).
- cdc-acm: do not reset notification buffer index upon urb unlinking (bsc#1051510).
- cdc-acm: fix race between reset and control messaging (bsc#1051510).
- ceph: avoid a use-after-free in ceph_destroy_options() (bsc#1111983).
- ceph: fix dentry leak in ceph_readdir_prepopulate (bsc#1114839).
- ceph: quota: fix null pointer dereference in quota check (bsc#1114839).
- cfg80211: Address some corner cases in scan result channel updating (bsc#1051510).
- cfg80211: fix use-after-free in reg_process_hint() (bsc#1051510).
- cifs: check for STATUS_USER_SESSION_DELETED (bsc#1112902).
- cifs: fix memory leak in SMB2_open() (bsc#1112894).
- cifs: Fix use after free of a mid_q_entry (bsc#1112903).
- clk: at91: Fix division by zero in PLL recalc_rate() (bsc#1051510).
- clk: fixed-factor: fix of_node_get-put imbalance (bsc#1051510).
- clk: fixed-rate: fix of_node_get-put imbalance (bsc#1051510).
- clk: mmp2: fix the clock id for sdh2_clk and sdh3_clk (bsc#1051510).
- clk: rockchip: Fix static checker warning in rockchip_ddrclk_get_parent call (bsc#1051510).
- clk: s2mps11: Add used attribute to s2mps11_dt_match (bsc#1051510).
- clk: s2mps11: Fix matching when built as module and DT node contains compatible (bsc#1051510).
- clk: samsung: exynos5420: Enable PERIS clocks for suspend (bsc#1051510).
- clk: x86: add 'ether_clk' alias for Bay Trail / Cherry Trail (bsc#1051510).
- clk: x86: Stop marking clocks as CLK_IS_CRITICAL (bsc#1051510).
- clockevents/drivers/i8253: Add support for PIT shutdown quirk (bsc#1051510).
- clocksource/drivers/ti-32k: Add CLOCK_SOURCE_SUSPEND_NONSTOP flag for non-am43 SoCs (bsc#1051510).
- clocksource/drivers/timer-atmel-pit: Properly handle error cases (bsc#1051510).
- coda: fix 'kernel memory exposure attempt' in fsync (bsc#1051510).
- configfs: replace strncpy with memcpy (bsc#1051510).
- crypto: caam - fix implicit casts in endianness helpers (bsc#1051510).
- crypto: chelsio - Fix memory corruption in DMA Mapped buffers (bsc#1051510).
- crypto: lrw - Fix out-of bounds access on counter overflow (bsc#1051510).
- crypto: simd - correctly take reqsize of wrapped skcipher into account (bsc#1051510).
- crypto: tcrypt - fix ghash-generic speed test (bsc#1051510).
- dax: Fix deadlock in dax_lock_mapping_entry() (bsc#1109951).
- debugobjects: Make stack check warning more informative (bsc#1051510).
- Documentation/l1tf: Fix small spelling typo (bsc#1051510).
- Documentation/l1tf: Fix typos (bsc#1051510).
- Documentation/l1tf: Remove Yonah processors from not vulnerable list (bsc#1051510).
- do d_instantiate/unlock_new_inode combinations safely (git-fixes).
- Do not leak MNT_INTERNAL away from internal mounts (git-fixes).
- driver/dma/ioat: Call del_timer_sync() without holding prep_lock (bsc#1051510).
- drm/amdgpu: add missing CHIP_HAINAN in amdgpu_ucode_get_load_type (bsc#1051510).
- drm/amdgpu: Fix SDMA HQD destroy error on gfx_v7 (bsc#1051510).
- drm/amdgpu: Fix vce work queue was not cancelled when suspend (bsc#1106110)
- drm/amdgpu/powerplay: fix missing break in switch statements (bsc#1113722)
- drm/ast: change resolution may cause screen blurred (boo#1112963).
- drm/ast: fixed cursor may disappear sometimes (bsc#1051510).
- drm/ast: Fix incorrect free on ioregs (bsc#1051510).
- drm/ast: Remove existing framebuffers before loading driver (boo#1112963)
- drm/dp_mst: Check if primary mstb is null (bsc#1051510).
- drm/dp_mst: Skip validating ports during destruction, just ref (bsc#1051510).
- drm/edid: Add 6 bpc quirk for BOE panel (bsc#1051510).
- drm/edid: Add 6 bpc quirk for BOE panel in HP Pavilion 15-n233sl (bsc#1113722)
- drm/edid: VSDB yCBCr420 Deep Color mode bit definitions (bsc#1051510).
- drm: fb-helper: Reject all pixel format changing requests (bsc#1113722)
- drm/hisilicon: hibmc: Do not carry error code in HiBMC framebuffer (bsc#1113722)
- drm/hisilicon: hibmc: Do not overwrite fb helper surface depth (bsc#1113722)
- drm/i915/audio: Hook up component bindings even if displays are (bsc#1113722)
- drm/i915: Do not oops during modeset shutdown after lpe audio deinit (bsc#1051510).
- drm/i915: Do not unset intel_connector-&gt;mst_port (bsc#1051510).
- drm/i915/dp: Link train Fallback on eDP only if fallback link BW can fit panel's native mode (bsc#1051510).
- drm/i915/execlists: Force write serialisation into context image vs execution (bsc#1051510).
- drm/i915: Fix ilk+ watermarks when disabling pipes (bsc#1051510).
- drm/i915/gen9+: Fix initial readout for Y tiled framebuffers (bsc#1113722)
- drm/i915/glk: Add Quirk for GLK NUC HDMI port issues (bsc#1051510).
- drm/i915/glk: Remove 99% limitation (bsc#1051510).
- drm/i915/hdmi: Add HDMI 2.0 audio clock recovery N values (bsc#1051510).
- drm/i915: Large page offsets for pread/pwrite (bsc#1051510).
- drm/i915: Mark pin flags as u64 (bsc#1051510).
- drm/i915: Restore vblank interrupts earlier (bsc#1051510).
- drm/i915: Skip vcpi allocation for MSTB ports that are gone (bsc#1051510).
- drm/i915: Write GPU relocs harder with gen3 (bsc#1051510).
- drm: mali-dp: Call drm_crtc_vblank_reset on device init (bsc#1051510).
- drm/mediatek: fix OF sibling-node lookup (bsc#1106110)
- drm/meson: add support for 1080p25 mode (bsc#1051510).
- drm/meson: Enable fast_io in meson_dw_hdmi_regmap_config (bsc#1051510).
- drm/meson: Fix OOB memory accesses in meson_viu_set_osd_lut() (bsc#1051510).
- drm/msm: fix OF child-node lookup (bsc#1106110)
- drm/nouveau: Check backlight IDs are &gt;= 0, not &gt; 0 (bsc#1051510).
- drm/nouveau: Do not disable polling in fallback mode (bsc#1103356).
- drm/omap: fix memory barrier bug in DMM driver (bsc#1051510).
- drm/rockchip: Allow driver to be shutdown on reboot/kexec (bsc#1051510).
- drm/sti: do not remove the drm_bridge that was never added (bsc#1100132)
- drm/sun4i: Fix an ulong overflow in the dotclock driver (bsc#1106110)
- drm/virtio: fix bounds check in virtio_gpu_cmd_get_capset() (bsc#1113722)
- e1000: check on netif_running() before calling e1000_up() (bsc#1051510).
- e1000: ensure to free old tx/rx rings in set_ringparam() (bsc#1051510).
- EDAC, {i7core,sb,skx}_edac: Fix uncorrected error counting (bsc#1114279).
- EDAC: Raise the maximum number of memory controllers (bsc#1113780).
- EDAC, skx_edac: Fix logical channel intermediate decoding (bsc#1114279).
- EDAC, thunderx: Fix memory leak in thunderx_l2c_threaded_isr() (bsc#1114279).
- eeprom: at24: change nvmem stride to 1 (bsc#1051510).
- eeprom: at24: check at24_read/write arguments (bsc#1051510).
- eeprom: at24: correctly set the size for at24mac402 (bsc#1051510).
- Enable LSPCON instead of blindly disabling HDMI
- enic: do not call enic_change_mtu in enic_probe (bsc#1051510).
- enic: handle mtu change for vf properly (bsc#1051510).
- enic: initialize enic-&gt;rfs_h.lock in enic_probe (bsc#1051510).
- ethtool: fix a privilege escalation bug (bsc#1076830).
- ext2, dax: set ext2_dax_aops for dax files (bsc#1112554).
- ext4: add missing brelse() add_new_gdb_meta_bg()'s error path (bsc#1117795).
- ext4: add missing brelse() in set_flexbg_block_bitmap()'s error path (bsc#1117794).
- ext4: add missing brelse() update_backups()'s error path (bsc#1117796).
- ext4: avoid arithemetic overflow that can trigger a BUG (bsc#1112736).
- ext4: avoid buffer leak in ext4_orphan_add() after prior errors (bsc#1117802).
- ext4: avoid buffer leak on shutdown in ext4_mark_iloc_dirty() (bsc#1117801).
- ext4: avoid divide by zero fault when deleting corrupted inline directories (bsc#1112735).
- ext4: avoid potential extra brelse in setup_new_flex_group_blocks() (bsc#1117792).
- ext4: check for NUL characters in extended attribute's name (bsc#1112732).
- ext4: check to make sure the rename(2)'s destination is not freed (bsc#1112734).
- ext4: do not mark mmp buffer head dirty (bsc#1112743).
- ext4: fix buffer leak in __ext4_read_dirblock() on error path (bsc#1117807).
- ext4: fix buffer leak in ext4_xattr_move_to_block() on error path (bsc#1117806).
- ext4: fix missing cleanup if ext4_alloc_flex_bg_array() fails while resizing (bsc#1117798).
- ext4: fix online resize's handling of a too-small final block group (bsc#1112739).
- ext4: fix online resizing for bigalloc file systems with a 1k block size (bsc#1112740).
- ext4: fix possible inode leak in the retry loop of ext4_resize_fs() (bsc#1117799).
- ext4: fix possible leak of sbi-&gt;s_group_desc_leak in error path (bsc#1117803).
- ext4: fix possible leak of s_journal_flag_rwsem in error path (bsc#1117804).
- ext4: fix setattr project check in fssetxattr ioctl (bsc#1117789).
- ext4: fix spectre gadget in ext4_mb_regular_allocator() (bsc#1112733).
- ext4: fix use-after-free race in ext4_remount()'s error path (bsc#1117791).
- ext4: initialize retries variable in ext4_da_write_inline_data_begin() (bsc#1117788).
- ext4: propagate error from dquot_initialize() in EXT4_IOC_FSSETXATTR (bsc#1117790).
- ext4: recalucate superblock checksum after updating free blocks/inodes (bsc#1112738).
- ext4: release bs.bh before re-using in ext4_xattr_block_find() (bsc#1117805).
- ext4: reset error code in ext4_find_entry in fallback (bsc#1112731).
- ext4: show test_dummy_encryption mount option in /proc/mounts (bsc#1112741).
- fbdev: fix broken menu dependencies (bsc#1113722)
- fbdev/omapfb: fix omapfb_memory_read infoleak (bsc#1051510).
- firmware: dcdbas: Add support for WSMT ACPI table (bsc#1089350 ).
- firmware: dcdbas: include linux/io.h (bsc#1089350).
- Fix kABI for 'Ensure we commit after writeback is complete' (bsc#1111809).
- floppy: fix race condition in __floppy_read_block_0() (bsc#1051510).
- flow_dissector: do not dissect l4 ports for fragments (networking-stable-18_11_21).
- fscache: fix race between enablement and dropping of object (bsc#1107385).
- fs: dcache: Avoid livelock between d_alloc_parallel and __d_add (git-fixes).
- fs/dcache.c: fix kmemcheck splat at take_dentry_name_snapshot() (git-fixes).
- fs: dcache: Use READ_ONCE when accessing i_dir_seq (git-fixes).
- fs: Make extension of struct super_block transparent (bsc#1117822).
- fsnotify: Fix busy inodes during unmount (bsc#1117822).
- fsnotify: fix ignore mask logic in fsnotify() (bsc#1115074).
- fs/quota: Fix spectre gadget in do_quotactl (bsc#1112745).
- ftrace: Fix debug preempt config name in stack_tracer_{en,dis}able (bsc#1117172).
- ftrace: Fix kmemleak in unregister_ftrace_graph (bsc#1117181).
- ftrace: Fix memleak when unregistering dynamic ops when tracing disabled (bsc#1117174).
- ftrace: Remove incorrect setting of glob search field (bsc#1117184).
- genirq: Fix race on spurious interrupt detection (bsc#1051510).
- getname_kernel() needs to make sure that -&gt;name != -&gt;iname in long case (git-fixes).
- gpio: do not free unallocated ida on gpiochip_add_data_with_key() error path (bsc#1051510).
- grace: replace BUG_ON by WARN_ONCE in exit_net hook (git-fixes).
- gso_segment: Reset skb-&gt;mac_len after modifying network header (networking-stable-18_09_24).
- hfsplus: do not return 0 when fill_super() failed (bsc#1051510).
- hfsplus: stop workqueue when fill_super() failed (bsc#1051510).
- hfs: prevent crash on exit from failed search (bsc#1051510).
- HID: hiddev: fix potential Spectre v1 (bsc#1051510).
- HID: hid-sensor-hub: Force logical minimum to 1 for power and report state (bsc#1051510).
- HID: quirks: fix support for Apple Magic Keyboards (bsc#1051510).
- HID: sensor-hub: Restore fixup for Lenovo ThinkPad Helix 2 sensor hub report (bsc#1051510).
- HID: uhid: forbid UHID_CREATE under KERNEL_DS or elevated privileges (bsc#1051510).
- hv: avoid crash in vmbus sysfs files (bnc#1108377).
- hv_netvsc: fix schedule in RCU context ().
- hv_netvsc: ignore devices that are not PCI (networking-stable-18_09_11).
- hwmon: (core) Fix double-free in __hwmon_device_register() (bsc#1051510).
- hwmon: (ibmpowernv) Remove bogus __init annotations (bsc#1051510).
- hwmon: (ina2xx) Fix current value calculation (bsc#1051510).
- hwmon (ina2xx) Fix NULL id pointer in probe() (bsc#1051510).
- hwmon: (nct6775) Fix potential Spectre v1 (bsc#1051510).
- hwmon: (pmbus) Fix page count auto-detection (bsc#1051510).
- hwmon: (pwm-fan) Set fan speed to 0 on suspend (bsc#1051510).
- hwmon: (raspberrypi) Fix initial notify (bsc#1051510).
- hwmon: (w83795) temp4_type has writable permission (bsc#1051510).
- hwrng: core - document the quality field (bsc#1051510).
- hypfs_kill_super(): deal with failed allocations (bsc#1051510).
- i2c: i2c-scmi: fix for i2c_smbus_write_block_data (bsc#1051510).
- i2c: rcar: cleanup DMA for all kinds of failure (bsc#1051510).
- ibmvnic: fix accelerated VLAN handling ().
- ibmvnic: fix index in release_rx_pools (bsc#1115440, bsc#1115433).
- ibmvnic: remove ndo_poll_controller ().
- ibmvnic: Update driver queues after change in ring size support ().
- iio: accel: adxl345: convert address field usage in iio_chan_spec (bsc#1051510).
- iio: ad5064: Fix regulator handling (bsc#1051510).
- iio: adc: at91: fix acking DRDY irq on simple conversions (bsc#1051510).
- iio: adc: at91: fix wrong channel number in triggered buffer mode (bsc#1051510).
- iio: adc: imx25-gcq: Fix leak of device_node in mx25_gcq_setup_cfgs() (bsc#1051510).
- iio:st_magn: Fix enable device after trigger (bsc#1051510).
- ima: fix showing large 'violations' or 'runtime_measurements_count' (bsc#1051510).
- include/linux/pfn_t.h: force '~' to be parsed as an unary operator (bsc#1051510).
- inet: make sure to grab rcu_read_lock before using ireq-&gt;ireq_opt (networking-stable-18_10_16).
- Input: atakbd - fix Atari CapsLock behaviour (bsc#1051510).
- Input: atakbd - fix Atari keymap (bsc#1051510).
- Input: elan_i2c - add ACPI ID for Lenovo IdeaPad 330-15IGM (bsc#1051510).
- Input: synaptics - avoid using uninitialized variable when probing (bsc#1051510).
- Input: xpad - add PDP device id 0x02a4 (bsc#1051510).
- Input: xpad - add support for Xbox1 PDP Camo series gamepad (bsc#1051510).
- Input: xpad - avoid using __set_bit() for capabilities (bsc#1051510).
- Input: xpad - fix some coding style issues (bsc#1051510).
- intel_th: pci: Add Ice Lake PCH support (bsc#1051510).
- iommu/arm-smmu: Ensure that page-table updates are visible before TLBI (bsc#1106237).
- iommu/arm-smmu: Error out only if not enough context interrupts (bsc#1106237).
- iommu/ipmmu-vmsa: Fix crash on early domain free (bsc#1106105).
- iommu/vt-d: Add definitions for PFSID (bsc#1106237).
- iommu/vt-d: Fix dev iotlb pfsid use (bsc#1106237).
- iommu/vt-d: Fix NULL pointer dereference in prq_event_thread() (bsc#1106105).
- iommu/vt-d: Fix scatterlist offset handling (bsc#1106237).
- iommu/vt-d: Use memunmap to free memremap (bsc#1106105).
- ip6_tunnel: be careful when accessing the inner header (networking-stable-18_10_16).
- ip6_tunnel: Fix encapsulation layout (networking-stable-18_11_02).
- ip6_vti: fix a null pointer deference when destroy vti6 tunnel (networking-stable-18_09_11).
- ipmi: Fix timer race with module unload (bsc#1051510).
- ip_tunnel: be careful when accessing the inner header (networking-stable-18_10_16).
- ip_tunnel: do not force DF when MTU is locked (networking-stable-18_11_21).
- ipv4: lock mtu in fnhe when received PMTU &lt; net.ipv4.route.min_pmtu (networking-stable-18_11_21).
- ipv4: tcp: send zero IPID for RST and ACK sent in SYN-RECV and TIME-WAIT state (networking-stable-18_09_11).
- ipv6: Fix PMTU updates for UDP/raw sockets in presence of VRF (networking-stable-18_11_21).
- ipv6: fix possible use-after-free in ip6_xmit() (networking-stable-18_09_24).
- ipv6: mcast: fix a use-after-free in inet6_mc_check (networking-stable-18_11_02).
- ipv6/ndisc: Preserve IPv6 control buffer if protocol error handlers are called (networking-stable-18_11_02).
- ipv6: take rcu lock in rawv6_send_hdrinc() (networking-stable-18_10_16).
- iwlwifi: dbg: allow wrt collection before ALIVE (bsc#1051510).
- iwlwifi: dbg: do not crash if the firmware crashes in the middle of a debug dump (bsc#1051510).
- iwlwifi: do not WARN on trying to dump dead firmware (bsc#1051510).
- iwlwifi: mvm: Allow TKIP for AP mode (bsc#1051510).
- iwlwifi: mvm: check for n_profiles validity in EWRD ACPI (bsc#1051510).
- iwlwifi: mvm: check for short GI only for OFDM (bsc#1051510).
- iwlwifi: mvm: check return value of rs_rate_from_ucode_rate() (bsc#1051510).
- iwlwifi: mvm: clear HW_RESTART_REQUESTED when stopping the interface (bsc#1051510).
- iwlwifi: mvm: do not use SAR Geo if basic SAR is not used (bsc#1051510).
- iwlwifi: mvm: fix BAR seq ctrl reporting (bsc#1051510).
- iwlwifi: mvm: fix regulatory domain update when the firmware starts (bsc#1051510).
- iwlwifi: mvm: open BA session only when sta is authorized (bsc#1051510).
- iwlwifi: mvm: send BCAST management frames to the right station (bsc#1051510).
- iwlwifi: mvm: support sta_statistics() even on older firmware (bsc#1051510).
- iwlwifi: pcie: avoid empty free RB queue (bsc#1051510).
- iwlwifi: pcie: gen2: build A-MSDU only for GSO (bsc#1051510).
- iwlwifi: pcie gen2: check iwl_pcie_gen2_set_tb() return value (bsc#1051510).
- jbd2: fix use after free in jbd2_log_do_checkpoint() (bsc#1113257).
- KABI fix for 'NFSv4.1: Fix up replays of interrupted requests' (git-fixes).
- kABI: Hide get_msr_feature() in kvm_x86_ops (bsc#1106240).
- KABI: hide new member in struct iommu_table from genksyms (bsc#1061840).
- KABI: mask raw in struct bpf_reg_state (bsc#1083647).
- KABI: powerpc: export __find_linux_pte as __find_linux_pte_or_hugepte (bsc#1061840).
- KABI: powerpc: Revert npu callback signature change (bsc#1055120).
- KABI: protect struct fib_nh_exception (kabi).
- KABI: protect struct rtable (kabi).
- KABI/severities: ignore __xive_vm_h_* KVM internal symbols.
- Kbuild: fix # escaping in .cmd files for future Make (git-fixes).
- kbuild: fix kernel/bounds.c 'W=1' warning (bsc#1051510).
- kbuild: move '_all' target out of $(KBUILD_SRC) conditional (bsc#1114279).
- kernfs: update comment about kernfs_path() return value (bsc#1051510).
- kgdboc: Passing ekgdboc to command line causes panic (bsc#1051510).
- kprobes/x86: Fix %p uses in error messages (bsc#1110006).
- KVM: arm/arm64: Introduce vcpu_el1_is_32bit (bsc#1110998).
- KVM: Make VM ioctl do valloc for some archs (bsc#1111506).
- KVM: nVMX: Always reflect #NM VM-exits to L1 (bsc#1106240).
- KVM: nVMX: move check_vmentry_postreqs() call to nested_vmx_enter_non_root_mode() (bsc#1106240).
- KVM: PPC: Add pt_regs into kvm_vcpu_arch and move vcpu-&gt;arch.gpr[] into it (bsc#1061840).
- KVM: PPC: Avoid marking DMA-mapped pages dirty in real mode (bsc#1061840).
- KVM: PPC: Book3S: Add MMIO emulation for VMX instructions (bsc#1061840).
- KVM: PPC: Book3S: Allow backing bigger guest IOMMU pages with smaller physical pages (bsc#1061840).
- KVM: PPC: Book3S: Check KVM_CREATE_SPAPR_TCE_64 parameters (bsc#1061840).
- KVM: PPC: Book3S: Eliminate some unnecessary checks (bsc#1061840).
- KVM: PPC: Book3S: Fix compile error that occurs with some gcc versions (bsc#1061840).
- KVM: PPC: Book3S: Fix matching of hardware and emulated TCE tables (bsc#1061840).
- KVM: PPC: Book3S HV: Add of_node_put() in success path (bsc#1061840).
- KVM: PPC: Book3S HV: Add 'online' register to ONE_REG interface (bsc#1061840).
- KVM: PPC: Book3S HV: Allow creating max number of VCPUs on POWER9 (bsc#1061840).
- KVM: PPC: Book3S HV: Allow HPT and radix on the same core for POWER9 v2.2 (bsc#1061840).
- KVM: PPC: Book3S HV: Avoid crash from THP collapse during radix page fault (bsc#1061840).
- KVM: PPC: Book3S HV: Avoid shifts by negative amounts (bsc#1061840).
- KVM: PPC: Book3S HV: Check DR not IR to chose real vs virt mode MMIOs (bsc#1061840).
- KVM: PPC: Book3S HV: Do not truncate HPTE index in xlate function (bsc#1061840).
- KVM: PPC: Book3S HV: Do not use compound_order to determine host mapping size (bsc#1061840).
- KVM: PPC: Book3S HV: Do not use existing 'prodded' flag for XIVE escalations (bsc#1061840).
- KVM: PPC: Book 3S HV: Do ptesync in radix guest exit path (bsc#1061840).
- KVM: PPC: Book3S HV: Do SLB load/unload with guest LPCR value loaded (bsc#1061840).
- KVM: PPC: Book3S HV: Enable migration of decrementer register (bsc#1061840).
- KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm (bsc#1061840).
- KVM: PPC: Book3S HV: Fix conditions for starting vcpu (bsc#1061840).
- KVM: PPC: Book3S HV: Fix constant size warning (bsc#1061840).
- KVM: PPC: Book3S HV: Fix duplication of host SLB entries (bsc#1061840).
- KVM: PPC: Book3S HV: Fix guest r11 corruption with POWER9 TM workarounds (bsc#1061840).
- KVM: PPC: Book3S HV: Fix handling of large pages in radix page fault handler (bsc#1061840).
- KVM: PPC: Book3S HV: Fix handling of secondary HPTEG in HPT resizing code (bsc#1061840).
- KVM: PPC: Book3S HV: Fix inaccurate comment (bsc#1061840).
- KVM: PPC: Book3S HV: Fix kvmppc_bad_host_intr for real mode interrupts (bsc#1061840).
- KVM: PPC: Book3S HV: Fix trap number return from __kvmppc_vcore_entry (bsc#1061840).
- KVM: PPC: Book3S HV: Fix typo in kvmppc_hv_get_dirty_log_radix() (bsc#1061840).
- KVM: PPC: Book3S HV: Fix VRMA initialization with 2MB or 1GB memory backing (bsc#1061840).
- KVM: PPC: Book3S HV: Handle 1GB pages in radix page fault handler (bsc#1061840).
- KVM: PPC: Book3S HV: Improve handling of debug-trigger HMIs on POWER9 (bsc#1061840).
- KVM: PPC: Book3S HV: Keep XIVE escalation interrupt masked unless ceded (bsc#1061840).
- KVM: PPC: Book3S HV: Lockless tlbie for HPT hcalls (bsc#1061840).
- KVM: PPC: Book3S HV: Make HPT resizing work on POWER9 (bsc#1061840).
- KVM: PPC: Book3S HV: Make radix clear pte when unmapping (bsc#1061840).
- KVM: PPC: Book3S HV: Make radix use correct tlbie sequence in kvmppc_radix_tlbie_page (bsc#1061840).
- KVM: PPC: Book3S HV: Make xive_pushed a byte, not a word (bsc#1061840).
- KVM: PPC: Book3S HV: Pack VCORE IDs to access full VCPU ID space (bsc#1061840).
- KVM: PPC: Book3S HV: radix: Do not clear partition PTE when RC or write bits do not match (bsc#1061840).
- KVM: PPC: Book3S HV: Radix page fault handler optimizations (bsc#1061840).
- KVM: PPC: Book3S HV: radix: Refine IO region partition scope attributes (bsc#1061840).
- KVM: PPC: Book3S HV: Read kvm-&gt;arch.emul_smt_mode under kvm-&gt;lock (bsc#1061840).
- KVM: PPC: Book3S HV: Recursively unmap all page table entries when unmapping (bsc#1061840).
- KVM: PPC: Book3S HV: Remove useless statement (bsc#1061840).
- KVM: PPC: Book3S HV: Remove vcpu-&gt;arch.dec usage (bsc#1061840).
- KVM: PPC: Book3S HV: Send kvmppc_bad_interrupt NMIs to Linux handlers (bsc#1061840).
- KVM: PPC: Book3S HV: Set RWMR on POWER8 so PURR/SPURR count correctly (bsc#1061840).
- KVM: PPC: Book3S HV: Snapshot timebase offset on guest entry (bsc#1061840).
- KVM: PPC: Book3S HV: Streamline setting of reference and change bits (bsc#1061840).
- KVM: PPC: Book3S HV: Use a helper to unmap ptes in the radix fault path (bsc#1061840).
- KVM: PPC: Book3S HV: Use __gfn_to_pfn_memslot() in page fault handler (bsc#1061840).
- KVM: PPC: Book3S HV: XIVE: Resend re-routed interrupts on CPU priority change (bsc#1061840).
- KVM: PPC: Book3S PR: Add guest MSR parameter for kvmppc_save_tm()/kvmppc_restore_tm() (bsc#1061840).
- KVM: PPC: Book3S PR: Move kvmppc_save_tm/kvmppc_restore_tm to separate file (bsc#1061840).
- KVM: PPC: Book3S: Use correct page shift in H_STUFF_TCE (bsc#1061840).
- KVM: PPC: Fix a mmio_host_swabbed uninitialized usage issue (bsc#1061840).
- KVM: PPC: Make iommu_table::it_userspace big endian (bsc#1061840).
- KVM: PPC: Move nip/ctr/lr/xer registers to pt_regs in kvm_vcpu_arch (bsc#1061840).
- KVM: PPC: Use seq_puts() in kvmppc_exit_timing_show() (bsc#1061840).
- KVM: s390: vsie: copy wrapping keys to right place (git-fixes).
- KVM: SVM: Add MSR-based feature support for serializing LFENCE (bsc#1106240).
- KVM: svm: Ensure an IBPB on all affected CPUs when freeing a vmcb (bsc#1114279).
- KVM: VMX: re-add ple_gap module parameter (bsc#1106240).
- KVM: VMX: support MSR_IA32_ARCH_CAPABILITIES as a feature MSR (bsc#1106240).
- KVM: VMX: Tell the nested hypervisor to skip L1D flush on vmentry (bsc#1106240).
- KVM: x86: Add a framework for supporting MSR-based features (bsc#1106240).
- KVM: x86: define SVM/VMX specific kvm_arch_[alloc|free]_vm (bsc#1111506).
- KVM: x86: Fix kernel info-leak in KVM_HC_CLOCK_PAIRING hypercall (bsc#1106240).
- KVM: X86: Introduce kvm_get_msr_feature() (bsc#1106240).
- KVM/x86: kABI fix for vm_alloc/vm_free changes (bsc#1111506).
- KVM: x86: Set highest physical address bits in non-present/reserved SPTEs (bsc#1106240).
- libceph: bump CEPH_MSG_MAX_DATA_LEN (bsc#1114839).
- libceph: fall back to sendmsg for slab pages (bsc#1118316).
- libertas: call into generic suspend code before turning off power (bsc#1051510).
- libertas: do not set URB_ZERO_PACKET on IN USB transfer (bsc#1051510).
- libnvdimm, badrange: remove a WARN for list_empty (bsc#1112128).
- libnvdimm, dimm: Maximize label transfer size (bsc#1111921, bsc#1113408, bsc#1113972).
- libnvdimm: Hold reference on parent while scheduling async init (bsc#1116891).
- libnvdimm: Introduce locked DIMM capacity support (bsc#1112128).
- libnvdimm, label: change nvdimm_num_label_slots per UEFI 2.7 (bsc#1111921, bsc#1113408, bsc#1113972).
- libnvdimm, label: Fix sparse warning (bsc#1111921, bsc#1113408, bsc#1113972).
- libnvdimm: move poison list functions to a new 'badrange' file (bsc#1112128).
- libnvdimm/nfit_test: add firmware download emulation (bsc#1112128).
- libnvdimm/nfit_test: adding support for unit testing enable LSS status (bsc#1112128).
- libnvdimm, region: Fail badblocks listing for inactive regions (bsc#1116899).
- libnvdimm, testing: Add emulation for smart injection commands (bsc#1112128).
- libnvdimm, testing: update the default smart ctrl_temperature (bsc#1112128).
- lib/ubsan: add type mismatch handler for new GCC/Clang (bsc#1051510).
- lib/ubsan.c: s/missaligned/misaligned/ (bsc#1051510).
- livepatch: create and include UAPI headers ().
- llc: set SOCK_RCU_FREE in llc_sap_add_socket() (networking-stable-18_11_02).
- lockd: fix 'list_add double add' caused by legacy signal interface (git-fixes).
- loop: add recursion validation to LOOP_CHANGE_FD (bsc#1112711).
- loop: do not call into filesystem while holding lo_ctl_mutex (bsc#1112710).
- loop: fix LOOP_GET_STATUS lock imbalance (bsc#1113284).
- mac80211: Always report TX status (bsc#1051510).
- mac80211: fix TX status reporting for ieee80211s (bsc#1051510).
- mac80211_hwsim: do not omit multicast announce of first added radio (bsc#1051510).
- mac80211: minstrel: fix using short preamble CCK rates on HT clients (bsc#1051510).
- mac80211: TDLS: fix skb queue/priority assignment (bsc#1051510).
- mach64: detect the dot clock divider correctly on sparc (bsc#1051510).
- mach64: fix display corruption on big endian machines (bsc#1113722)
- mach64: fix image corruption due to reading accelerator registers (bsc#1113722)
- mailbox: PCC: handle parse error (bsc#1051510).
- make sure that __dentry_kill() always invalidates d_seq, unhashed or not (git-fixes).
- md: allow metadata updates while suspending an array - fix (git-fixes).
- MD: fix invalid stored role for a disk - try2 (git-fixes).
- md: fix NULL dereference of mddev-&gt;pers in remove_and_add_spares() (git-fixes).
- md/raid10: fix that replacement cannot complete recovery after reassemble (git-fixes).
- md/raid1: add error handling of read error from FailFast device (git-fixes).
- md/raid5-cache: disable reshape completely (git-fixes).
- md/raid5: fix data corruption of replacements after originals dropped (git-fixes).
- media: af9035: prevent buffer overflow on write (bsc#1051510).
- media: cx231xx: fix potential sign-extension overflow on large shift (bsc#1051510).
- media: dvb: fix compat ioctl translation (bsc#1051510).
- media: em28xx: fix input name for Terratec AV 350 (bsc#1051510).
- media: em28xx: use a default format if TRY_FMT fails (bsc#1051510).
- media: pci: cx23885: handle adding to list failure (bsc#1051510).
- media: tvp5150: avoid going past array on v4l2_querymenu() (bsc#1051510).
- media: tvp5150: fix switch exit in set control handler (bsc#1051510).
- media: tvp5150: fix width alignment during set_selection() (bsc#1051510).
- media: uvcvideo: Fix uvc_alloc_entity() allocation alignment (bsc#1051510).
- media: v4l2-tpg: fix kernel oops when enabling HFLIP and OSD (bsc#1051510).
- media: vsp1: Fix YCbCr planar formats pitch calculation (bsc#1051510).
- memory_hotplug: cond_resched in __remove_pages (bnc#1114178).
- mfd: arizona: Correct calling of runtime_put_sync (bsc#1051510).
- mfd: menelaus: Fix possible race condition and leak (bsc#1051510).
- mfd: omap-usb-host: Fix dts probe of children (bsc#1051510).
- mlxsw: spectrum: Fix IP2ME CPU policer configuration (networking-stable-18_11_21).
- mmc: block: avoid multiblock reads for the last sector in SPI mode (bsc#1051510).
- mmc: dw_mmc-rockchip: correct property names in debug (bsc#1051510).
- mmc: sdhci-pci-o2micro: Add quirk for O2 Micro dev 0x8620 rev 0x01 (bsc#1051510).
- mm: handle no memcg case in memcg_kmem_charge() properly (bnc#1113677).
- mm/migrate: Use spin_trylock() while resetting rate limit ().
- mm: /proc/pid/pagemap: hide swap entries from unprivileged users (Git-fixes bsc#1109907).
- mm: rework memcg kernel stack accounting (bnc#1113677).
- modpost: ignore livepatch unresolved relocations ().
- mount: Do not allow copying MNT_UNBINDABLE|MNT_LOCKED mounts (bsc#1117819).
- mount: Prevent MNT_DETACH from disconnecting locked mounts (bsc#1117820).
- mount: Retest MNT_LOCKED in do_umount (bsc#1117818).
- move changes without Git-commit out of sorted section
- neighbour: confirm neigh entries when ARP packet is received (networking-stable-18_09_24).
- net/af_iucv: drop inbound packets with invalid flags (bnc#1113501, LTC#172679).
- net/af_iucv: fix skb handling on HiperTransport xmit error (bnc#1113501, LTC#172679).
- net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT (networking-stable-18_09_24).
- net: aquantia: memory corruption on jumbo frames (networking-stable-18_10_16).
- net: bcmgenet: Poll internal PHY for GENETv5 (networking-stable-18_11_02).
- net: bcmgenet: protect stop from timeout (networking-stable-18_11_21).
- net: bcmgenet: use MAC link status for fixed phy (networking-stable-18_09_11).
- net: bridge: remove ipv6 zero address check in mcast queries (git-fixes).
- net: dsa: bcm_sf2: Call setup during switch resume (networking-stable-18_10_16).
- net: dsa: bcm_sf2: Fix unbind ordering (networking-stable-18_10_16).
- net: ena: add functions for handling Low Latency Queues in ena_com (bsc#1111696 bsc#1117561).
- net: ena: add functions for handling Low Latency Queues in ena_netdev (bsc#1111696 bsc#1117561).
- net: ena: change rx copybreak default to reduce kernel memory pressure (bsc#1111696 bsc#1117561).
- net: ena: complete host info to match latest ENA spec (bsc#1111696 bsc#1117561).
- net: ena: enable Low Latency Queues (bsc#1111696 bsc#1117561).
- net: ena: explicit casting and initialization, and clearer error handling (bsc#1111696 bsc#1117561).
- net: ena: fix auto casting to boolean (bsc#1111696 bsc#1117561).
- net: ena: fix compilation error in xtensa architecture (bsc#1111696 bsc#1117561).
- net: ena: fix crash during failed resume from hibernation (bsc#1111696 bsc#1117561).
- net: ena: fix indentations in ena_defs for better readability (bsc#1111696 bsc#1117561).
- net: ena: Fix Kconfig dependency on X86 (bsc#1111696 bsc#1117561).
- net: ena: fix NULL dereference due to untimely napi initialization (bsc#1111696 bsc#1117561).
- net: ena: fix rare bug when failed restart/resume is followed by driver removal (bsc#1111696 bsc#1117561).
- net: ena: fix warning in rmmod caused by double iounmap (bsc#1111696 bsc#1117561).
- net: ena: introduce Low Latency Queues data structures according to ENA spec (bsc#1111696 bsc#1117561).
- net: ena: limit refill Rx threshold to 256 to avoid latency issues (bsc#1111696 bsc#1117561).
- net: ena: minor performance improvement (bsc#1111696 bsc#1117561).
- net: ena: remove ndo_poll_controller (bsc#1111696 bsc#1117561).
- net: ena: remove redundant parameter in ena_com_admin_init() (bsc#1111696 bsc#1117561).
- net: ena: update driver version to 2.0.1 (bsc#1111696 bsc#1117561).
- net: ena: use CSUM_CHECKED device indication to report skb's checksum status (bsc#1111696 bsc#1117561).
- net: fec: do not dump RX FIFO register when not available (networking-stable-18_11_02).
- net-gro: reset skb-&gt;pkt_type in napi_reuse_skb() (networking-stable-18_11_21).
- net: hns: fix for unmapping problem when SMMU is on (networking-stable-18_10_16).
- net: hp100: fix always-true check for link up state (networking-stable-18_09_24).
- net: ibm: fix return type of ndo_start_xmit function ().
- net/ibmnvic: Fix deadlock problem in reset ().
- net/ibmvnic: Fix RTNL deadlock during device reset (bnc#1115431).
- net: ipmr: fix unresolved entry dumps (networking-stable-18_11_02).
- net: ipv4: do not let PMTU updates increase route MTU (git-fixes).
- net/ipv6: Display all addresses in output of /proc/net/if_inet6 (networking-stable-18_10_16).
- net/ipv6: Fix index counter for unicast addresses in in6_dump_addrs (networking-stable-18_11_02).
- netlabel: check for IPV4MASK in addrinfo_get (networking-stable-18_10_16).
- net: macb: do not disable MDIO bus at open/close time (networking-stable-18_09_11).
- net/mlx5: Check for error in mlx5_attach_interface (networking-stable-18_09_18).
- net/mlx5e: Fix selftest for small MTUs (networking-stable-18_11_21).
- net/mlx5e: Set vlan masks for all offloaded TC rules (networking-stable-18_10_16).
- net/mlx5: E-Switch, Fix memory leak when creating switchdev mode FDB tables (networking-stable-18_09_18).
- net/mlx5: E-Switch, Fix out of bound access when setting vport rate (networking-stable-18_10_16).
- net/mlx5: Fix debugfs cleanup in the device init/remove flow (networking-stable-18_09_18).
- net/mlx5: Fix use-after-free in self-healing flow (networking-stable-18_09_18).
- net/mlx5: Take only bit 24-26 of wqe.pftype_wq for page fault type (networking-stable-18_11_02).
- net: mvpp2: Extract the correct ethtype from the skb for tx csum offload (networking-stable-18_10_16).
- net: mvpp2: fix a txq_done race condition (networking-stable-18_10_16).
- net/packet: fix packet drop as of virtio gso (networking-stable-18_10_16).
- net: phy: mdio-gpio: Fix working over slow can_sleep GPIOs (networking-stable-18_11_21).
- net: qca_spi: Fix race condition in spi transfers (networking-stable-18_09_18).
- net: qmi_wwan: add Wistron Neweb D19Q1 (bsc#1051510).
- net: sched: action_ife: take reference to meta module (networking-stable-18_09_11).
- net/sched: act_pedit: fix dump of extended layered op (networking-stable-18_09_11).
- net/sched: act_sample: fix NULL dereference in the data path (networking-stable-18_09_24).
- net: sched: Fix for duplicate class dump (networking-stable-18_11_02).
- net: sched: Fix memory exposure from short TCA_U32_SEL (networking-stable-18_09_11).
- net: sched: gred: pass the right attribute to gred_change_table_def() (networking-stable-18_11_02).
- net: smsc95xx: Fix MTU range (networking-stable-18_11_21).
- net: socket: fix a missing-check bug (networking-stable-18_11_02).
- net: stmmac: Fix stmmac_mdio_reset() when building stmmac as modules (networking-stable-18_11_02).
- net: stmmac: Fixup the tail addr setting in xmit path (networking-stable-18_10_16).
- net: systemport: Fix wake-up interrupt race during resume (networking-stable-18_10_16).
- net: systemport: Protect stop from timeout (networking-stable-18_11_21).
- net: udp: fix handling of CHECKSUM_COMPLETE packets (networking-stable-18_11_02).
- net/usb: cancel pending work when unbinding smsc75xx (networking-stable-18_10_16).
- NFC: nfcmrvl_uart: fix OF child-node lookup (bsc#1051510).
- nfit_test: add error injection DSMs (bsc#1112128).
- nfit_test: fix buffer overrun, add sanity check (bsc#1112128).
- nfit_test: improve structure offset handling (bsc#1112128).
- nfit_test: prevent parsing error of nfit_test.0 (bsc#1112128).
- nfit_test: when clearing poison, also remove badrange entries (bsc#1112128).
- nfp: wait for posted reconfigs when disabling the device (networking-stable-18_09_11).
- NFS: Avoid quadratic search when freeing delegations (bsc#1084760).
- NFS: Avoid RCU usage in tracepoints (git-fixes).
- NFS: commit direct writes even if they fail partially (git-fixes).
- nfsd4: permit layoutget of executable-only files (git-fixes).
- nfsd: check for use of the closed special stateid (git-fixes).
- nfsd: CLOSE SHOULD return the invalid special stateid for NFSv4.x (x&gt;0) (git-fixes).
- nfsd: deal with revoked delegations appropriately (git-fixes).
- nfsd: Ensure we check stateid validity in the seqid operation checks (git-fixes).
- nfsd: Fix another OPEN stateid race (git-fixes).
- nfsd: fix corrupted reply to badly ordered compound (git-fixes).
- nfsd: fix potential use-after-free in nfsd4_decode_getdeviceinfo (git-fixes).
- nfsd: Fix stateid races between OPEN and CLOSE (git-fixes).
- NFS: do not wait on commit in nfs_commit_inode() if there were no commit requests (git-fixes).
- nfsd: restrict rd_maxcount to svc_max_payload in nfsd_encode_readdir (git-fixes).
- NFS: Ensure we commit after writeback is complete (bsc#1111809).
- NFS: Fix an incorrect type in struct nfs_direct_req (git-fixes).
- NFS: Fix a typo in nfs_rename() (git-fixes).
- NFS: Fix typo in nomigration mount option (git-fixes).
- NFS: Fix unstable write completion (git-fixes).
- NFSv4.0 fix client reference leak in callback (git-fixes).
- NFSv4.1: Fix a potential layoutget/layoutrecall deadlock (git-fixes).
- NFSv4.1 fix infinite loop on I/O (git-fixes).
- NFSv4.1: Fix the client behaviour on NFS4ERR_SEQ_FALSE_RETRY (git-fixes).
- NFSv4.1: Fix up replays of interrupted requests (git-fixes).
- NFSv4: Fix a typo in nfs41_sequence_process (git-fixes).
- nl80211: Fix possible Spectre-v1 for CQM RSSI thresholds (bsc#1051510).
- nl80211: Fix possible Spectre-v1 for NL80211_TXRATE_HT (bsc#1051510).
- nospec: Include &lt;asm/barrier.h&gt; dependency (bsc#1114279).
- nvdimm: Clarify comment in sizeof_namespace_index (bsc#1111921, bsc#1113408, bsc#1113972).
- nvdimm: Remove empty if statement (bsc#1111921, bsc#1113408, bsc#1113972).
- nvdimm: Sanity check labeloff (bsc#1111921, bsc#1113408, bsc#1113972).
- nvdimm: Split label init out from the logic for getting config data (bsc#1111921, bsc#1113408, bsc#1113972).
- nvdimm: Use namespace index data to reduce number of label reads needed (bsc#1111921, bsc#1113408, bsc#1113972).
- nvme: Free ctrl device name on init failure ().
- ocfs2: fix a misuse a of brelse after failing ocfs2_check_dir_entry (bsc#1117817).
- ocfs2: fix locking for res-&gt;tracking and dlm-&gt;tracking_list (bsc#1117816).
- ocfs2: fix ocfs2 read block panic (bsc#1117815).
- ocfs2: free up write context when direct IO failed (bsc#1117821).
- ocfs2: subsystem.su_mutex is required while accessing the item-&gt;ci_parent (bsc#1117808).
- of: add helper to lookup compatible child node (bsc#1106110)
- openvswitch: Fix push/pop ethernet validation (networking-stable-18_11_02).
- orangefs: fix deadlock; do not write i_size in read_iter (bsc#1051510).
- orangefs: initialize op on loop restart in orangefs_devreq_read (bsc#1051510).
- orangefs_kill_sb(): deal with allocation failures (bsc#1051510).
- orangefs: use list_for_each_entry_safe in purge_waiting_ops (bsc#1051510).
- PCI: Add Device IDs for Intel GPU 'spurious interrupt' quirk (bsc#1051510).
- PCI/ASPM: Do not initialize link state when aspm_disabled is set (bsc#1051510).
- PCI/ASPM: Fix link_state teardown on device removal (bsc#1051510).
- PCI: dwc: remove duplicate fix References: bsc#1115269 Patch has been already applied by the following commit: 9f73db8b7c PCI: dwc: Fix enumeration end when reaching root subordinate (bsc#1051510)
- PCI: hv: Do not wait forever on a device that has disappeared (bsc#1109806).
- PCI: hv: Use effective affinity mask (bsc#1109772).
- PCI: imx6: Fix link training status detection in link up check (bsc#1109806).
- PCI: iproc: Remove PAXC slot check to allow VF support (bsc#1109806).
- PCI/MSI: Warn and return error if driver enables MSI/MSI-X twice (bsc#1051510).
- PCI: Reprogram bridge prefetch registers on resume (bsc#1051510).
- PCI: vmd: Assign vector zero to all bridges (bsc#1109806).
- PCI: vmd: Detach resources after stopping root bus (bsc#1109806).
- PCI: vmd: White list for fast interrupt handlers (bsc#1109806).
- pcmcia: Implement CLKRUN protocol disabling for Ricoh bridges (bsc#1051510).
- percpu: make this_cpu_generic_read() atomic w.r.t. interrupts (bsc#1114279).
- perf: fix invalid bit in diagnostic entry (git-fixes).
- pinctrl: at91-pio4: fix has_config check in atmel_pctl_dt_subnode_to_map() (bsc#1051510).
- pinctrl: meson: fix pinconf bias disable (bsc#1051510).
- pinctrl: qcom: spmi-mpp: Fix drive strength setting (bsc#1051510).
- pinctrl: qcom: spmi-mpp: Fix err handling of pmic_mpp_set_mux (bsc#1051510).
- pinctrl: spmi-mpp: Fix pmic_mpp_config_get() to be compliant (bsc#1051510).
- pinctrl: ssbi-gpio: Fix pm8xxx_pin_config_get() to be compliant (bsc#1051510).
- pipe: match pipe_max_size data type with procfs (git-fixes).
- platform/x86: acerhdf: Add BIOS entry for Gateway LT31 v1.3307 (bsc#1051510).
- platform/x86: intel_telemetry: report debugfs failure (bsc#1051510).
- pNFS: Always free the session slot on error in nfs4_layoutget_handle_exception (git-fixes).
- pNFS: Do not release the sequence slot until we've processed layoutget on open (git-fixes).
- pNFS: Prevent the layout header refcount going to zero in pnfs_roc() (git-fixes).
- powerpc/64s/hash: Do not use PPC_INVALIDATE_ERAT on CPUs before POWER9 (bsc#1065729).
- powerpc/boot: Fix opal console in boot wrapper (bsc#1065729).
- powerpc/kvm/booke: Fix altivec related build break (bsc#1061840).
- powerpc/kvm: Switch kvm pmd allocator to custom allocator (bsc#1061840).
- powerpc/mm: Fix typo in comments (bsc#1065729).
- powerpc/mm/hugetlb: initialize the pagetable cache correctly for hugetlb (bsc#1091800).
- powerpc/mm/keys: Move pte bits to correct headers (bsc#1078248).
- powerpc/mm: Rename find_linux_pte_or_hugepte() (bsc#1061840).
- powerpc/npu-dma.c: Fix crash after __mmu_notifier_register failure (bsc#1055120).
- powerpc/perf: Update raw-event code encoding comment for power8 (bsc#1065729).
- powerpc/powernv: Add indirect levels to it_userspace (bsc#1061840).
- powerpc/powernv: Do not select the cpufreq governors (bsc#1065729).
- powerpc/powernv: Fix concurrency issue with npu-&gt;mmio_atsd_usage (bsc#1055120).
- powerpc/powernv: Fix opal_event_shutdown() called with interrupts disabled (bsc#1065729).
- powerpc/powernv/ioda2: Reduce upper limit for DMA window size (bsc#1055120).
- powerpc/powernv/ioda: Allocate indirect TCE levels on demand (bsc#1061840).
- powerpc/powernv/ioda: Finish removing explicit max window size check (bsc#1061840).
- powerpc/powernv/ioda: Remove explicit max window size check (bsc#1061840).
- powerpc/powernv: Move TCE manupulation code to its own file (bsc#1061840).
- powerpc/powernv/npu: Add lock to prevent race in concurrent context init/destroy (bsc#1055120).
- powerpc/powernv/npu: Do not explicitly flush nmmu tlb (bsc#1055120).
- powerpc/powernv/npu: Fix deadlock in mmio_invalidate() (bsc#1055120).
- powerpc/powernv/npu: Prevent overwriting of pnv_npu2_init_contex() callback parameters (bsc#1055120).
- powerpc/powernv/npu: Use flush_all_mm() instead of flush_tlb_mm() (bsc#1055120).
- powerpc/powernv/pci: Work around races in PCI bridge enabling (bsc#1055120).
- powerpc/powernv: Rework TCE level allocation (bsc#1061840).
- powerpc/pseries: Fix build break for SPLPAR=n and CPU hotplug (bsc#1079524, git-fixes).
- powerpc/pseries: Fix CONFIG_NUMA=n build (bsc#1067906, git-fixes).
- powerpc/pseries: Fix DTL buffer registration (bsc#1065729).
- powerpc/pseries: Fix how we iterate over the DTL entries (bsc#1065729).
- powerpc/pseries: Fix 'OF: ERROR: Bad of_node_put() on /cpus' during DLPAR (bsc#1113295).
- powerpc/pseries/mobility: Extend start/stop topology update scope (bsc#1116950, bsc#1115709).
- powerpc: pseries: remove dlpar_attach_node dependency on full path (bsc#1113295).
- powerpc/xive: Move definition of ESB bits (bsc#1061840).
- powerpc/xmon: Add ISA v3.0 SPRs to SPR dump (bsc#1061840).
- power: supply: max8998-charger: Fix platform data retrieval (bsc#1051510).
- pppoe: fix reception of frames with no mac header (networking-stable-18_09_24).
- printk: drop in_nmi check from printk_safe_flush_on_panic() (bsc#1112170).
- printk: Fix panic caused by passing log_buf_len to command line (bsc#1117168).
- printk/tracing: Do not trace printk_nmi_enter() (bsc#1112208).
- provide linux/set_memory.h (bsc#1113295).
- ptp: fix Spectre v1 vulnerability (bsc#1051510).
- pwm: lpss: Release runtime-pm reference from the driver's remove callback (bsc#1051510).
- pxa168fb: prepare the clock (bsc#1051510).
- qmi_wwan: Added support for Gemalto's Cinterion ALASxx WWAN interface (bsc#1051510).
- qmi_wwan: apply SET_DTR quirk to the SIMCOM shared device ID (bsc#1051510).
- qmi_wwan: Support dynamic config on Quectel EP06 (bsc#1051510).
- qrtr: add MODULE_ALIAS macro to smd (bsc#1051510).
- r8169: Clear RTL_FLAG_TASK_*_PENDING when clearing RTL_FLAG_TASK_ENABLED (bsc#1051510).
- r8169: fix NAPI handling under high load (networking-stable-18_11_02).
- race of lockd inetaddr notifiers vs nlmsvc_rqst change (git-fixes).
- RAID10 BUG_ON in raise_barrier when force is true and conf-&gt;barrier is 0 (git-fixes).
- random: rate limit unseeded randomness warnings (git-fixes).
- rculist: add list_for_each_entry_from_rcu() (bsc#1084760).
- rculist: Improve documentation for list_for_each_entry_from_rcu() (bsc#1084760).
- rds: fix two RCU related problems (networking-stable-18_09_18).
- README: Clean-up trailing whitespace
- reiserfs: add check to detect corrupted directory entry (bsc#1109818).
- reiserfs: do not panic on bad directory entries (bsc#1109818).
- remoteproc: qcom: Fix potential device node leaks (bsc#1051510).
- rename a hv patch to reduce conflicts in -AZURE
- reset: hisilicon: fix potential NULL pointer dereference (bsc#1051510).
- reset: imx7: Fix always writing bits as 0 (bsc#1051510).
- resource: Include resource end in walk_*() interfaces (bsc#1114279).
- Revert 'ceph: fix dentry leak in splice_dentry()' (bsc#1114839).
- Revert 'powerpc/64: Fix checksum folding in csum_add()' (bsc#1065729).
- Revert 'rpm/kernel-binary.spec.in: allow unsupported modules for -extra'
- Revert 'usb: dwc3: gadget: skip Set/Clear Halt when invalid' (bsc#1051510).
- rpmsg: Correct support for MODULE_DEVICE_TABLE() (git-fixes).
- rtnetlink: Disallow FDB configuration for non-Ethernet device (networking-stable-18_11_02).
- rtnetlink: fix rtnl_fdb_dump() for ndmsg header (networking-stable-18_10_16).
- rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096 (networking-stable-18_10_16).
- s390/cpum_sf: Add data entry sizes to sampling trailer entry (git-fixes).
- s390/kvm: fix deadlock when killed by oom (bnc#1113501, LTC#172235).
- s390/mm: Check for valid vma before zapping in gmap_discard (git-fixes).
- s390/mm: correct allocate_pgste proc_handler callback (git-fixes).
- s390: qeth_core_mpc: Use ARRAY_SIZE instead of reimplementing its function (bnc#1113501, LTC#172682).
- s390/qeth: fix HiperSockets sniffer (bnc#1113501, LTC#172953).
- s390: qeth: Fix potential array overrun in cmd/rc lookup (bnc#1113501, LTC#172682).
- s390/qeth: handle failure on workqueue creation (git-fixes).
- s390/qeth: report 25Gbit link speed (bnc#1113501, LTC#172959).
- s390: revert ELF_ET_DYN_BASE base changes (git-fixes).
- s390/sclp_tty: enable line mode tty even if there is an ascii console (git-fixes).
- s390/sthyi: add cache to store hypervisor info (LTC#160415, bsc#1068273).
- s390/sthyi: add s390_sthyi system call (LTC#160415, bsc#1068273).
- s390/sthyi: reorganize sthyi implementation (LTC#160415, bsc#1068273).
- sched/numa: Limit the conditions where scan period is reset ().
- scsi: core: Allow state transitions from OFFLINE to BLOCKED (bsc#1112246).
- scsi: core: Allow state transitions from OFFLINE to BLOCKED (bsc#1112246).
- scsi: core: Avoid that SCSI device removal through sysfs triggers a deadlock (bsc#1114578).
- scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1104731).
- scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1104731).
- scsi: libfc: retry PRLI if we cannot analyse the payload (bsc#1104731).
- scsi: libfc: retry PRLI if we cannot analyse the payload (bsc#1104731).
- scsi: libsas: remove irq save in sas_ata_qc_issue() (bsc#1114580).
- scsi: lpfc: add support to retrieve firmware logs (bsc#1114015).
- scsi: lpfc: add Trunking support (bsc#1114015).
- scsi: lpfc: Correct errors accessing fw log (bsc#1114015).
- scsi: lpfc: Correct invalid EQ doorbell write on if_type=6 (bsc#1114015).
- scsi: lpfc: Correct irq handling via locks when taking adapter offline (bsc#1114015).
- scsi: lpfc: Correct LCB RJT handling (bsc#1114015).
- scsi: lpfc: Correct loss of fc4 type on remote port address change (bsc#1114015).
- scsi: lpfc: Correct race with abort on completion path (bsc#1114015).
- scsi: lpfc: Correct soft lockup when running mds diagnostics (bsc#1114015).
- scsi: lpfc: Correct speeds on SFP swap (bsc#1114015).
- scsi: lpfc: fcoe: Fix link down issue after 1000+ link bounces (bsc#1114015).
- scsi: lpfc: Fix errors in log messages (bsc#1114015).
- scsi: lpfc: Fix GFT_ID and PRLI logic for RSCN (bsc#1114015).
- scsi: lpfc: Fix LOGO/PLOGI handling when triggerd by ABTS Timeout event (bsc#1114015).
- scsi: lpfc: Fix lpfc_sli4_read_config return value check (bsc#1114015).
- scsi: lpfc: Fix odd recovery in duplicate FLOGIs in point-to-point (bsc#1114015).
- scsi: lpfc: Implement GID_PT on Nameserver query to support faster failover (bsc#1114015).
- scsi: lpfc: Raise nvme defaults to support a larger io and more connectivity (bsc#1114015).
- scsi: lpfc: raise sg count for nvme to use available sg resources (bsc#1114015).
- scsi: lpfc: reduce locking when updating statistics (bsc#1114015).
- scsi: lpfc: Remove set but not used variable 'sgl_size' (bsc#1114015).
- scsi: lpfc: Reset link or adapter instead of doing infinite nameserver PLOGI retry (bsc#1114015).
- scsi: lpfc: Synchronize access to remoteport via rport (bsc#1114015).
- scsi: lpfc: update driver version to 12.0.0.7 (bsc#1114015).
- scsi: lpfc: update driver version to 12.0.0.8 (bsc#1114015).
- scsi: qlogicpti: Fix an error handling path in 'qpti_sbus_probe()' (bsc#1114581).
- scsi: scsi_transport_srp: Fix shost to rport translation (bsc#1114582).
- scsi: sg: fix minor memory leak in error path (bsc#1114584).
- scsi: sysfs: Introduce sysfs_{un,}break_active_protection() (bsc#1114578).
- scsi: target: Fix fortify_panic kernel exception (bsc#1114576).
- scsi: target/tcm_loop: Avoid that static checkers warn about dead code (bsc#1114577).
- scsi: target: tcmu: add read length support (bsc#1097755).
- sctp: fix race on sctp_id2asoc (networking-stable-18_11_02).
- sctp: fix strchange_flags name for Stream Change Event (networking-stable-18_11_21).
- sctp: hold transport before accessing its asoc in sctp_transport_get_next (networking-stable-18_09_11).
- sctp: not allow to set asoc prsctp_enable by sockopt (networking-stable-18_11_21).
- sctp: not increase stream's incnt before sending addstrm_in request (networking-stable-18_11_21).
- sctp: update dst pmtu with the correct daddr (networking-stable-18_10_16).
- serial: 8250: Fix clearing FIFOs in RS485 mode again (bsc#1051510).
- signal: Properly deliver SIGSEGV from x86 uprobes (bsc#1110006).
- skip LAYOUTRETURN if layout is invalid (git-fixes).
- smb2: fix missing files in root share directory listing (bsc#1112907).
- smb2: fix missing files in root share directory listing (bsc#1112907).
- smb3: fill in statfs fsid and correct namelen (bsc#1112905).
- smb3: fill in statfs fsid and correct namelen (bsc#1112905).
- smb3: fix reset of bytes read and written stats (bsc#1112906).
- smb3: fix reset of bytes read and written stats (bsc#1112906).
- smb3: on reconnect set PreviousSessionId field (bsc#1112899).
- smb3: on reconnect set PreviousSessionId field (bsc#1112899).
- soc: fsl: qbman: qman: avoid allocating from non existing gen_pool (bsc#1051510).
- soc/tegra: pmc: Fix child-node lookup (bsc#1051510).
- soc: ti: QMSS: Fix usage of irq_set_affinity_hint (bsc#1051510).
- sound: do not call skl_init_chip() to reset intel skl soc (bsc#1051510).
- sound: enable interrupt after dma buffer initialization (bsc#1051510).
- spi/bcm63xx-hsspi: keep pll clk enabled (bsc#1051510).
- spi: bcm-qspi: switch back to reading flash using smaller chunks (bsc#1051510).
- spi: sh-msiof: fix deferred probing (bsc#1051510).
- staging: comedi: ni_mio_common: protect register write overflow (bsc#1051510).
- staging:iio:ad7606: fix voltage scales (bsc#1051510).
- staging: rtl8723bs: Fix the return value in case of error in 'rtw_wx_read32()' (bsc#1051510).
- staging: vchiq_arm: fix compat VCHIQ_IOC_AWAIT_COMPLETION (bsc#1051510).
- sunrpc: Allow connect to return EHOSTUNREACH (git-fixes).
- sunrpc: Do not use stack buffer with scatterlist (git-fixes).
- sunrpc: Fix rpc_task_begin trace point (git-fixes).
- sunrpc: Fix tracepoint storage issues with svc_recv and svc_rqst_status (git-fixes).
- target: fix buffer offset in core_scsi3_pri_read_full_status (bsc1117349).
- target: log Data-Out timeouts as errors (bsc#1095805).
- target: log NOP ping timeouts as errors (bsc#1095805).
- target: split out helper for cxn timeout error stashing (bsc#1095805).
- target: stash sess_err_stats on Data-Out timeout (bsc#1095805).
- target: use ISCSI_IQN_LEN in iscsi_target_stat (bsc#1095805).
- tcp: do not restart timewait timer on rst reception (networking-stable-18_09_11).
- test_firmware: fix error return getting clobbered (bsc#1051510).
- tg3: Add PHY reset for 5717/5719/5720 in change ring and flow control paths (networking-stable-18_11_21).
- thermal: bcm2835: enable hwmon explicitly (bsc#1108468).
- thermal: da9062/61: Prevent hardware access during system suspend (bsc#1051510).
- thermal: rcar_thermal: Prevent hardware access during system suspend (bsc#1051510).
- tipc: do not assume linear buffer when reading ancillary data (networking-stable-18_11_21).
- tipc: fix a missing rhashtable_walk_exit() (networking-stable-18_09_11).
- tipc: fix flow control accounting for implicit connect (networking-stable-18_10_16).
- tools build: fix # escaping in .cmd files for future Make (git-fixes).
- tools/testing/nvdimm: advertise a write cache for nfit_test (bsc#1112128).
- tools/testing/nvdimm: allow custom error code injection (bsc#1112128).
- tools/testing/nvdimm: disable labels for nfit_test.1 (bsc#1112128).
- tools/testing/nvdimm: enable labels for nfit_test.1 dimms (bsc#1112128).
- tools/testing/nvdimm: fix missing newline in nfit_test_dimm 'handle' attribute (bsc#1112128).
- tools/testing/nvdimm: Fix support for emulating controller temperature (bsc#1112128).
- tools/testing/nvdimm: force nfit_test to depend on instrumented modules (bsc#1112128).
- tools/testing/nvdimm: improve emulation of smart injection (bsc#1112128).
- tools/testing/nvdimm: kaddr and pfn can be NULL to -&gt;direct_access() (bsc#1112128).
- tools/testing/nvdimm: Make DSM failure code injection an override (bsc#1112128).
- tools/testing/nvdimm: smart alarm/threshold control (bsc#1112128).
- tools/testing/nvdimm: stricter bounds checking for error injection commands (bsc#1112128).
- tools/testing/nvdimm: support nfit_test_dimm attributes under nfit_test.1 (bsc#1112128).
- tools/testing/nvdimm: unit test clear-error commands (bsc#1112128).
- tools/vm/page-types.c: fix 'defined but not used' warning (bsc#1051510).
- tools/vm/slabinfo.c: fix sign-compare warning (bsc#1051510).
- tpm2-cmd: allow more attempts for selftest execution (bsc#1082555).
- tpm: add retry logic (bsc#1082555).
- tpm: consolidate the TPM startup code (bsc#1082555).
- tpm: do not suspend/resume if power stays on (bsc#1082555).
- tpm: fix intermittent failure with self tests (bsc#1082555).
- tpm: fix response size validation in tpm_get_random() (bsc#1082555).
- tpm: move endianness conversion of ordinals to tpm_input_header (bsc#1082555).
- tpm: move endianness conversion of TPM_TAG_RQU_COMMAND to tpm_input_header (bsc#1082555).
- tpm: move the delay_msec increment after sleep in tpm_transmit() (bsc#1082555).
- tpm: React correctly to RC_TESTING from TPM 2.0 self tests (bsc#1082555).
- tpm: replace msleep() with usleep_range() in TPM 1.2/2.0 generic drivers (bsc#1082555).
- tpm: Restore functionality to xen vtpm driver (bsc#1082555).
- tpm: self test failure should not cause suspend to fail (bsc#1082555).
- tpm: tpm-interface: fix tpm_transmit/_cmd kdoc (bsc#1082555).
- tpm: Trigger only missing TPM 2.0 self tests (bsc#1082555).
- tpm: Use dynamic delay to wait for TPM 2.0 self test result (bsc#1082555).
- tpm: use tpm2_pcr_read() in tpm2_do_selftest() (bsc#1082555).
- tpm: use tpm_buf functions in tpm2_pcr_read() (bsc#1082555).
- tracing: Add barrier to trace_printk() buffer nesting modification (bsc#1112219).
- tracing: Apply trace_clock changes to instance max buffer (bsc#1117188).
- tracing: Erase irqsoff trace with empty write (bsc#1117189).
- tty: check name length in tty_find_polling_driver() (bsc#1051510).
- tty: Do not block on IO when ldisc change is pending (bnc#1105428).
- tty: fix data race between tty_init_dev and flush of buf (bnc#1105428).
- tty: Hold tty_ldisc_lock() during tty_reopen() (bnc#1105428).
- tty/ldsem: Add lockdep asserts for ldisc_sem (bnc#1105428).
- tty/ldsem: Convert to regular lockdep annotations (bnc#1105428).
- tty/ldsem: Decrement wait_readers on timeouted down_read() (bnc#1105428).
- tty/ldsem: Wake up readers after timed out down_write() (bnc#1105428).
- tty: Simplify tty-&gt;count math in tty_reopen() (bnc#1105428).
- tty: wipe buffer (bsc#1051510).
- tty: wipe buffer if not echoing data (bsc#1051510).
- tun: Consistently configure generic netdev params via rtnetlink (bsc#1051510).
- tuntap: fix multiqueue rx (networking-stable-18_11_21).
- udp4: fix IP_CMSG_CHECKSUM for connected sockets (networking-stable-18_09_24).
- udp6: add missing checks on edumux packet processing (networking-stable-18_09_24).
- udp6: fix encap return code for resubmitting (git-fixes).
- uio: ensure class is registered before devices (bsc#1051510).
- uio: Fix an Oops on load (bsc#1051510).
- uio: make symbol 'uio_class_registered' static (bsc#1051510).
- Update config files. Enabled ENA (Amazon network driver) for arm64.
- usb: cdc-acm: add entry for Hiro (Conexant) modem (bsc#1051510).
- usb: chipidea: Prevent unbalanced IRQ disable (bsc#1051510).
- usb: core: Fix hub port connection events lost (bsc#1051510).
- usb: dwc2: host: do not delay retries for CONTROL IN transfers (bsc#1114385).
- usb: dwc2: host: Do not retry NAKed transactions right away (bsc#1114385).
- usb: dwc3: core: Clean up ULPI device (bsc#1051510).
- usb: dwc3: gadget: fix ISOC TRB type on unaligned transfers (bsc#1051510).
- usb: dwc3: gadget: Properly check last unaligned/zero chain TRB (bsc#1051510).
- usb: gadget: fsl_udc_core: check allocation return value and cleanup on failure (bsc#1051510).
- usb: gadget: fsl_udc_core: fixup struct_udc_setup documentation (bsc#1051510).
- usb: gadget: storage: Fix Spectre v1 vulnerability (bsc#1051510).
- usb: gadget: udc: atmel: handle at91sam9rl PMC (bsc#1051510).
- usb: gadget: u_ether: fix unsafe list iteration (bsc#1051510).
- usb: host: ohci-at91: fix request of irq for optional gpio (bsc#1051510).
- usbip: tools: fix atoi() on non-null terminated string (bsc#1051510).
- usbip:vudc: BUG kmalloc-2048 (Not tainted): Poison overwritten (bsc#1051510).
- usb: misc: appledisplay: add 20' Apple Cinema Display (bsc#1051510).
- usbnet: smsc95xx: disable carrier check while suspending (bsc#1051510).
- usb: omap_udc: fix rejection of out transfers when DMA is used (bsc#1051510).
- usb: quirks: Add delay-init quirk for Corsair K70 LUX RGB (bsc#1051510).
- usb: quirks: Add no-lpm quirk for Raydium touchscreens (bsc#1051510).
- usb: remove LPM management from usb_driver_claim_interface() (bsc#1051510).
- usb: serial: cypress_m8: fix interrupt-out transfer length (bsc#1051510).
- usb: serial: option: add two-endpoints device-id flag (bsc#1051510).
- usb: serial: option: drop redundant interface-class test (bsc#1051510).
- usb: serial: option: improve Quectel EP06 detection (bsc#1051510).
- usb: xhci: fix timeout for transition from RExit to U0 (bsc#1051510).
- userfaultfd: hugetlbfs: fix userfaultfd_huge_must_wait() pte access (bsc#1109739).
- Use upstream version of pci-hyperv patch (35a88a1)
- VFS: close race between getcwd() and d_move() (git-fixes).
- VFS: fix freeze protection in mnt_want_write_file() for overlayfs (git-fixes).
- vhost: Fix Spectre V1 vulnerability (bsc#1051510).
- vhost/scsi: truncate T10 PI iov_iter to prot_bytes (bsc#1051510).
- virtio_net: avoid using netif_tx_disable() for serializing tx routine (networking-stable-18_11_02).
- VMCI: Resource wildcard match fixed (bsc#1051510).
- w1: omap-hdq: fix missing bus unregister at removal (bsc#1051510).
- Workaround for mysterious NVMe breakage with i915 CFL (bsc#1111040).
- x86/acpi: Prevent X2APIC id 0xffffffff from being accounted (bsc#1110006).
- x86/boot/KASLR: Work around firmware bugs by excluding EFI_BOOT_SERVICES_* and EFI_LOADER_* from KASLR's choice (bnc#1112878).
- x86/boot: Move EISA setup to a separate file (bsc#1110006).
- x86/corruption-check: Fix panic in memory_corruption_check() when boot option without value is provided (bsc#1110006).
- x86/cpufeature: Add User-Mode Instruction Prevention definitions (bsc#1110006).
- x86/cpufeatures: Add Intel Total Memory Encryption cpufeature (bsc#1110006).
- x86/cpu/vmware: Do not trace vmware_sched_clock() (bsc#1114279).
- x86/eisa: Add missing include (bsc#1110006).
- x86/EISA: Do not probe EISA bus for Xen PV guests (bsc#1110006).
- x86/fpu: Remove second definition of fpu in __fpu__restore_sig() (bsc#1110006).
- x86, hibernate: Fix nosave_regions setup for hibernation (bsc#1110006).
- x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12 (bsc#1109772).
- x86/kasan: Panic if there is not enough memory to boot (bsc#1110006).
- x86/kexec: Correct KEXEC_BACKUP_SRC_END off-by-one error (bsc#1114279).
- x86/ldt: Remove unused variable in map_ldt_struct() (bsc#1114279).
- x86/ldt: Split out sanity check in map_ldt_struct() (bsc#1114279).
- x86/ldt: Unmap PTEs for the slot before freeing LDT pages (bsc#1114279).
- x86/MCE/AMD: Fix the thresholding machinery initialization order (bsc#1114279).
- x86/MCE: Fix stack out-of-bounds write in mce-inject.c: Flags_read() (bsc#1110006).
- x86/MCE: Make correctable error detection look at the Deferred bit (bsc#1114279).
- x86/mm/pat: Disable preemption around __flush_tlb_all() (bsc#1114279).
- x86, nfit_test: Add unit test for memcpy_mcsafe() (bsc#1112128).
- x86/paravirt: Fix some warning messages (bnc#1065600).
- x86/percpu: Fix this_cpu_read() (bsc#1110006).
- x86/speculation: Support Enhanced IBRS on future CPUs ().
- x86/time: Correct the attribute on jiffies' definition (bsc#1110006).
- x86/xen: Fix boot loader version reported for PVH guests (bnc#1065600).
- xen/balloon: Support xend-based toolstack (bnc#1065600).
- xen/blkfront: avoid NULL blkfront_info dereference on device removal (bsc#1111062).
- xen: fix race in xen_qlock_wait() (bnc#1107256).
- xen: fix xen_qlock_wait() (bnc#1107256).
- xen/gntdev: avoid out of bounds access in case of partial gntdev_mmap() (bnc#1065600).
- xen: make xen_qlock_wait() nestable (bnc#1107256).
- xen/netfront: do not bug in case of too many frags (bnc#1104824).
- xen/pvh: do not try to unplug emulated devices (bnc#1065600).
- xen/pvh: increase early stack size (bnc#1065600).
- xen: Remove unnecessary BUG_ON from __unbind_from_irq() (bnc#1065600).
- xen-swiotlb: fix the check condition for xen_swiotlb_free_coherent (bnc#1065600).
- xen-swiotlb: use actually allocated size on check physical continuous (bnc#1065600).
- xen/x86: add diagnostic printout to xen_mc_flush() in case of error (bnc#1116183).
- xfrm: use complete IPv6 addresses for hash (bsc#1109330).
- xfs: do not fail when converting shortform attr to long form during ATTR_REPLACE (bsc#1105025).
- xfs: Fix error code in 'xfs_ioc_getbmap()' (git-fixes).
- xfs: Properly detect when DAX won't be used on any device (bsc#1115976).
- xhci: Add check for invalid byte size error when UAS devices are connected (bsc#1051510).
- xhci: Do not print a warning when setting link state for disabled ports (bsc#1051510).
- xhci: Fix leaking USB3 shared_hcd at xhci removal (bsc#1051510).
- xprtrdma: Do not defer fencing an async RPC's chunks (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-11"/>
	<updated date="2018-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051510">SUSE bug 1051510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055120">SUSE bug 1055120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061840">SUSE bug 1061840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066674">SUSE bug 1066674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067906">SUSE bug 1067906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068273">SUSE bug 1068273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076830">SUSE bug 1076830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078248">SUSE bug 1078248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079524">SUSE bug 1079524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082555">SUSE bug 1082555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082653">SUSE bug 1082653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083647">SUSE bug 1083647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084760">SUSE bug 1084760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084831">SUSE bug 1084831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085535">SUSE bug 1085535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086196">SUSE bug 1086196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089350">SUSE bug 1089350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091800">SUSE bug 1091800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094825">SUSE bug 1094825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095805">SUSE bug 1095805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097755">SUSE bug 1097755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100132">SUSE bug 1100132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103356">SUSE bug 1103356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103925">SUSE bug 1103925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104124">SUSE bug 1104124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104731">SUSE bug 1104731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104824">SUSE bug 1104824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105025">SUSE bug 1105025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105428">SUSE bug 1105428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106105">SUSE bug 1106105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106110">SUSE bug 1106110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106237">SUSE bug 1106237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106240">SUSE bug 1106240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107256">SUSE bug 1107256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107385">SUSE bug 1107385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107866">SUSE bug 1107866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108377">SUSE bug 1108377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108468">SUSE bug 1108468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109330">SUSE bug 1109330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109739">SUSE bug 1109739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109772">SUSE bug 1109772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109806">SUSE bug 1109806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109818">SUSE bug 1109818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109907">SUSE bug 1109907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109911">SUSE bug 1109911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109915">SUSE bug 1109915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109919">SUSE bug 1109919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109951">SUSE bug 1109951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110006">SUSE bug 1110006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110998">SUSE bug 1110998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111040">SUSE bug 1111040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111062">SUSE bug 1111062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111174">SUSE bug 1111174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111506">SUSE bug 1111506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111696">SUSE bug 1111696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111809">SUSE bug 1111809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111921">SUSE bug 1111921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111983">SUSE bug 1111983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112128">SUSE bug 1112128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112170">SUSE bug 1112170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112173">SUSE bug 1112173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112208">SUSE bug 1112208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112219">SUSE bug 1112219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112221">SUSE bug 1112221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112246">SUSE bug 1112246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112372">SUSE bug 1112372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112514">SUSE bug 1112514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112554">SUSE bug 1112554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112708">SUSE bug 1112708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112710">SUSE bug 1112710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112711">SUSE bug 1112711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112712">SUSE bug 1112712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112713">SUSE bug 1112713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112731">SUSE bug 1112731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112732">SUSE bug 1112732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112733">SUSE bug 1112733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112734">SUSE bug 1112734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112735">SUSE bug 1112735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112736">SUSE bug 1112736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112738">SUSE bug 1112738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112739">SUSE bug 1112739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112740">SUSE bug 1112740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112741">SUSE bug 1112741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112743">SUSE bug 1112743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112745">SUSE bug 1112745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112746">SUSE bug 1112746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112878">SUSE bug 1112878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112894">SUSE bug 1112894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112899">SUSE bug 1112899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112902">SUSE bug 1112902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112903">SUSE bug 1112903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112905">SUSE bug 1112905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112906">SUSE bug 1112906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112907">SUSE bug 1112907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112963">SUSE bug 1112963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113257">SUSE bug 1113257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113284">SUSE bug 1113284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113295">SUSE bug 1113295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113408">SUSE bug 1113408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113412">SUSE bug 1113412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113501">SUSE bug 1113501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113667">SUSE bug 1113667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113677">SUSE bug 1113677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113722">SUSE bug 1113722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113751">SUSE bug 1113751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113769">SUSE bug 1113769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113780">SUSE bug 1113780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113972">SUSE bug 1113972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114015">SUSE bug 1114015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114178">SUSE bug 1114178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114279">SUSE bug 1114279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114385">SUSE bug 1114385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114576">SUSE bug 1114576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114577">SUSE bug 1114577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114578">SUSE bug 1114578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114579">SUSE bug 1114579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114580">SUSE bug 1114580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114581">SUSE bug 1114581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114582">SUSE bug 1114582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114583">SUSE bug 1114583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114584">SUSE bug 1114584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114585">SUSE bug 1114585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114839">SUSE bug 1114839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115074">SUSE bug 1115074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115269">SUSE bug 1115269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115431">SUSE bug 1115431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115433">SUSE bug 1115433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115440">SUSE bug 1115440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115567">SUSE bug 1115567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115709">SUSE bug 1115709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115976">SUSE bug 1115976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116183">SUSE bug 1116183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116692">SUSE bug 1116692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116693">SUSE bug 1116693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116698">SUSE bug 1116698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116699">SUSE bug 1116699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116700">SUSE bug 1116700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116701">SUSE bug 1116701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116862">SUSE bug 1116862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116863">SUSE bug 1116863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116876">SUSE bug 1116876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116877">SUSE bug 1116877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116878">SUSE bug 1116878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116891">SUSE bug 1116891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116895">SUSE bug 1116895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116899">SUSE bug 1116899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116950">SUSE bug 1116950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117168">SUSE bug 1117168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117172">SUSE bug 1117172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117174">SUSE bug 1117174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117181">SUSE bug 1117181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117184">SUSE bug 1117184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117188">SUSE bug 1117188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117189">SUSE bug 1117189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117349">SUSE bug 1117349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117561">SUSE bug 1117561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117788">SUSE bug 1117788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117789">SUSE bug 1117789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117790">SUSE bug 1117790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117791">SUSE bug 1117791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117792">SUSE bug 1117792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117794">SUSE bug 1117794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117795">SUSE bug 1117795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117796">SUSE bug 1117796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117798">SUSE bug 1117798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117799">SUSE bug 1117799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117801">SUSE bug 1117801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117802">SUSE bug 1117802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117803">SUSE bug 1117803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117804">SUSE bug 1117804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117805">SUSE bug 1117805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117806">SUSE bug 1117806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117807">SUSE bug 1117807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117808">SUSE bug 1117808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117815">SUSE bug 1117815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117816">SUSE bug 1117816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117817">SUSE bug 1117817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117818">SUSE bug 1117818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117819">SUSE bug 1117819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117820">SUSE bug 1117820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117821">SUSE bug 1117821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117822">SUSE bug 1117822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118102">SUSE bug 1118102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118136">SUSE bug 1118136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118137">SUSE bug 1118137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118138">SUSE bug 1118138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118140">SUSE bug 1118140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118152">SUSE bug 1118152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118316">SUSE bug 1118316</bugzilla>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16533/">CVE-2017-16533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18224/">CVE-2017-18224</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18281/">CVE-2018-18281</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18386/">CVE-2018-18386</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18445/">CVE-2018-18445</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18710/">CVE-2018-18710</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19824/">CVE-2018-19824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521793" comment="kernel-default-4.12.14-95.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521794" comment="kernel-default-devel-4.12.14-95.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521795" comment="kernel-default-extra-4.12.14-95.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521796" comment="kernel-devel-4.12.14-95.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521797" comment="kernel-macros-4.12.14-95.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521798" comment="kernel-source-4.12.14-95.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521799" comment="kernel-syms-4.12.14-95.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78676" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1109105" ref_url="https://bugzilla.suse.com/1109105" source="BUGZILLA"/>
		<reference ref_id="1111479" ref_url="https://bugzilla.suse.com/1111479" source="BUGZILLA"/>
		<reference ref_id="1111480" ref_url="https://bugzilla.suse.com/1111480" source="BUGZILLA"/>
		<reference ref_id="1112229" ref_url="https://bugzilla.suse.com/1112229" source="BUGZILLA"/>
		<reference ref_id="1117022" ref_url="https://bugzilla.suse.com/1117022" source="BUGZILLA"/>
		<reference ref_id="1117274" ref_url="https://bugzilla.suse.com/1117274" source="BUGZILLA"/>
		<reference ref_id="1117313" ref_url="https://bugzilla.suse.com/1117313" source="BUGZILLA"/>
		<reference ref_id="1117327" ref_url="https://bugzilla.suse.com/1117327" source="BUGZILLA"/>
		<reference ref_id="1117331" ref_url="https://bugzilla.suse.com/1117331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17183" ref_url="https://www.suse.com/security/cve/CVE-2018-17183/" source="CVE"/>
		<reference ref_id="CVE-2018-17961" ref_url="https://www.suse.com/security/cve/CVE-2018-17961/" source="CVE"/>
		<reference ref_id="CVE-2018-18073" ref_url="https://www.suse.com/security/cve/CVE-2018-18073/" source="CVE"/>
		<reference ref_id="CVE-2018-18284" ref_url="https://www.suse.com/security/cve/CVE-2018-18284/" source="CVE"/>
		<reference ref_id="CVE-2018-19409" ref_url="https://www.suse.com/security/cve/CVE-2018-19409/" source="CVE"/>
		<reference ref_id="CVE-2018-19475" ref_url="https://www.suse.com/security/cve/CVE-2018-19475/" source="CVE"/>
		<reference ref_id="CVE-2018-19476" ref_url="https://www.suse.com/security/cve/CVE-2018-19476/" source="CVE"/>
		<reference ref_id="CVE-2018-19477" ref_url="https://www.suse.com/security/cve/CVE-2018-19477/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004959.html" source="SUSE-SU"/>
		<description>
This update for ghostscript to version 9.26 fixes the following issues:

Security issues fixed:

- CVE-2018-19475: Fixed bypass of an intended access restriction in psi/zdevice2.c (bsc#1117327)
- CVE-2018-19476: Fixed bypass of an intended access restriction in psi/zicc.c (bsc#1117313)
- CVE-2018-19477: Fixed bypass of an intended access restriction in psi/zfjbig2.c (bsc#1117274)
- CVE-2018-19409: Check if another device is used correctly in LockSafetyParams (bsc#1117022)
- CVE-2018-18284: Fixed potential sandbox escape through 1Policy operator (bsc#1112229)
- CVE-2018-18073: Fixed leaks through operator in saved execution stacks (bsc#1111480)
- CVE-2018-17961: Fixed a -dSAFER sandbox escape by bypassing executeonly (bsc#1111479)
- CVE-2018-17183: Fixed a potential code injection by specially crafted PostScript files (bsc#1109105)

Version update to 9.26 (bsc#1117331):

- Security issues have been the primary focus
- Minor bug fixes and improvements
- For release summary see: http://www.ghostscript.com/doc/9.26/News.htm
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-12"/>
	<updated date="2018-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117274">SUSE bug 1117274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117313">SUSE bug 1117313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117327">SUSE bug 1117327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117331">SUSE bug 1117331</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17183/">CVE-2018-17183</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-17961/">CVE-2018-17961</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18073/">CVE-2018-18073</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-18284/">CVE-2018-18284</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19409/">CVE-2018-19409</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19475/">CVE-2018-19475</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19476/">CVE-2018-19476</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19477/">CVE-2018-19477</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520410" comment="ghostscript-9.26-23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520411" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520412" comment="libspectre1-0.2.7-12.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78677" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1115750" ref_url="https://bugzilla.suse.com/1115750" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-4700" ref_url="https://www.suse.com/security/cve/CVE-2018-4700/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004958.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

Security issue fixed:

- CVE-2018-4700: Fixed extremely predictable cookie generation that is effectively breaking the CSRF protection of the CUPS web interface (bsc#1115750).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-12"/>
	<updated date="2018-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1115750">SUSE bug 1115750</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4700/">CVE-2018-4700</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520413" comment="cups-1.7.5-20.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520414" comment="cups-client-1.7.5-20.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520415" comment="cups-libs-1.7.5-20.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520416" comment="cups-libs-32bit-1.7.5-20.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78678" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1117267" ref_url="https://bugzilla.suse.com/1117267" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19519" ref_url="https://www.suse.com/security/cve/CVE-2018-19519/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004969.html" source="SUSE-SU"/>
		<description>
This update for tcpdump fixes the following issues:

Security issues fixed:

- CVE-2018-19519: Fixed a stack-based buffer over-read in the print_prefix function (bsc#1117267)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-17"/>
	<updated date="2018-12-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117267">SUSE bug 1117267</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19519/">CVE-2018-19519</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520426" comment="tcpdump-4.9.2-14.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78679" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1073313" ref_url="https://bugzilla.suse.com/1073313" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17740" ref_url="https://www.suse.com/security/cve/CVE-2017-17740/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004970.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

Security issue fixed:

- CVE-2017-17740: When both the nops module and the memberof overlay
  are enabled, attempts to free a buffer that was allocated on the stack,
  which allows remote attackers to cause a denial of service (slapd crash)
  via a member MODDN operation.  (bsc#1073313)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-17"/>
	<updated date="2018-12-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1073313">SUSE bug 1073313</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17740/">CVE-2017-17740</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520427" comment="libldap-2_4-2-2.4.41-18.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520428" comment="libldap-2_4-2-32bit-2.4.41-18.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520429" comment="openldap2-client-2.4.41-18.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78680" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1118595" ref_url="https://bugzilla.suse.com/1118595" source="BUGZILLA"/>
		<reference ref_id="1118596" ref_url="https://bugzilla.suse.com/1118596" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15518" ref_url="https://www.suse.com/security/cve/CVE-2018-15518/" source="CVE"/>
		<reference ref_id="CVE-2018-19873" ref_url="https://www.suse.com/security/cve/CVE-2018-19873/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004976.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

Security issues fixed:

- CVE-2018-15518: Fixed double free in QXmlStreamReader (bsc#1118595)
- CVE-2018-19873: Fixed Denial of Service on malformed BMP file in QBmpHandler (bsc#1118596)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-18"/>
	<updated date="2018-12-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118595">SUSE bug 1118595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118596">SUSE bug 1118596</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15518/">CVE-2018-15518</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19873/">CVE-2018-19873</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520430" comment="libQt5Concurrent5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520431" comment="libQt5Core5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520432" comment="libQt5DBus5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520433" comment="libQt5Gui5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520434" comment="libQt5Network5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520435" comment="libQt5OpenGL5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520436" comment="libQt5PrintSupport5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520437" comment="libQt5Sql5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520438" comment="libQt5Sql5-mysql-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520439" comment="libQt5Sql5-postgresql-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520440" comment="libQt5Sql5-sqlite-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520441" comment="libQt5Sql5-unixODBC-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520442" comment="libQt5Test5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520443" comment="libQt5Widgets5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520444" comment="libQt5Xml5-5.6.2-6.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78681" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1106222" ref_url="https://bugzilla.suse.com/1106222" source="BUGZILLA"/>
		<reference ref_id="1108474" ref_url="https://bugzilla.suse.com/1108474" source="BUGZILLA"/>
		<reference ref_id="1110910" ref_url="https://bugzilla.suse.com/1110910" source="BUGZILLA"/>
		<reference ref_id="1111006" ref_url="https://bugzilla.suse.com/1111006" source="BUGZILLA"/>
		<reference ref_id="1111010" ref_url="https://bugzilla.suse.com/1111010" source="BUGZILLA"/>
		<reference ref_id="1111013" ref_url="https://bugzilla.suse.com/1111013" source="BUGZILLA"/>
		<reference ref_id="1114422" ref_url="https://bugzilla.suse.com/1114422" source="BUGZILLA"/>
		<reference ref_id="1114529" ref_url="https://bugzilla.suse.com/1114529" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10839" ref_url="https://www.suse.com/security/cve/CVE-2018-10839/" source="CVE"/>
		<reference ref_id="CVE-2018-15746" ref_url="https://www.suse.com/security/cve/CVE-2018-15746/" source="CVE"/>
		<reference ref_id="CVE-2018-16847" ref_url="https://www.suse.com/security/cve/CVE-2018-16847/" source="CVE"/>
		<reference ref_id="CVE-2018-17958" ref_url="https://www.suse.com/security/cve/CVE-2018-17958/" source="CVE"/>
		<reference ref_id="CVE-2018-17962" ref_url="https://www.suse.com/security/cve/CVE-2018-17962/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004979.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2018-10839: Fixed NE2000 NIC emulation support that is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS (bsc#1110910).
- CVE-2018-15746: Fixed qemu-seccomp.c that might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy for threads other than the main thread (bsc#1106222).
- CVE-2018-17958: Fixed a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c because an incorrect integer data type is used (bsc#1111006).
- CVE-2018-17962: Fixed a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used (bsc#1111010).
- CVE-2018-17963: Fixed qemu_deliver_packet_iov in net/net.c that accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact. (bsc#1111013)
- CVE-2018-18849: Fixed an out of bounds memory access issue that was found in the LSI53C895A SCSI Host Bus Adapter emulation while writing a message in lsi_do_msgin. It could occur during migration if the 'msg_len' field has an invalid value. A user/process could use this flaw to crash the Qemu process resulting in DoS (bsc#1114422).
- CVE-2018-16847: Fixed an out of bounds r/w buffer access in cmb operations (bsc#1114529).

Non-security issue fixed:

- Fixed a condition when retry logic does not have been executed in case of data transmit failure or connection hungup (bsc#1108474).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-19"/>
	<updated date="2018-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106222">SUSE bug 1106222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108474">SUSE bug 1108474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110910">SUSE bug 1110910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111006">SUSE bug 1111006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111010">SUSE bug 1111010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111013">SUSE bug 1111013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114422">SUSE bug 1114422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114529">SUSE bug 1114529</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10839/">CVE-2018-10839</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15746/">CVE-2018-15746</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16847/">CVE-2018-16847</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17958/">CVE-2018-17958</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17962/">CVE-2018-17962</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521800" comment="qemu-2.11.2-5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521801" comment="qemu-block-curl-2.11.2-5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521802" comment="qemu-ipxe-1.0.0+-5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521803" comment="qemu-kvm-2.11.2-5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521804" comment="qemu-seabios-1.11.0-5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521805" comment="qemu-sgabios-8-5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521806" comment="qemu-tools-2.11.2-5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521807" comment="qemu-vgabios-1.11.0-5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521808" comment="qemu-x86-2.11.2-5.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78682" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1013721" ref_url="https://bugzilla.suse.com/1013721" source="BUGZILLA"/>
		<reference ref_id="1013732" ref_url="https://bugzilla.suse.com/1013732" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9800" ref_url="https://www.suse.com/security/cve/CVE-2016-9800/" source="CVE"/>
		<reference ref_id="CVE-2016-9801" ref_url="https://www.suse.com/security/cve/CVE-2016-9801/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004981.html" source="SUSE-SU"/>
		<description>
This update for bluez fixes the following issues:

Security issues fixed:

- CVE-2016-9800: Fixed a buffer overflow in the pin_code_reply_dump function (bsc#1013721)
- CVE-2016-9801: Fixed a buffer overflow in the set_ext_ctrl function (bsc#1013732)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-19"/>
	<updated date="2018-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013721">SUSE bug 1013721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013732">SUSE bug 1013732</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9800/">CVE-2016-9800</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9801/">CVE-2016-9801</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520445" comment="bluez-5.13-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520446" comment="bluez-cups-5.13-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520447" comment="libbluetooth3-5.13-5.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78683" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1115916" ref_url="https://bugzilla.suse.com/1115916" source="BUGZILLA"/>
		<reference ref_id="1115917" ref_url="https://bugzilla.suse.com/1115917" source="BUGZILLA"/>
		<reference ref_id="1117998" ref_url="https://bugzilla.suse.com/1117998" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5731" ref_url="https://www.suse.com/security/cve/CVE-2017-5731/" source="CVE"/>
		<reference ref_id="CVE-2017-5732" ref_url="https://www.suse.com/security/cve/CVE-2017-5732/" source="CVE"/>
		<reference ref_id="CVE-2017-5733" ref_url="https://www.suse.com/security/cve/CVE-2017-5733/" source="CVE"/>
		<reference ref_id="CVE-2017-5734" ref_url="https://www.suse.com/security/cve/CVE-2017-5734/" source="CVE"/>
		<reference ref_id="CVE-2017-5735" ref_url="https://www.suse.com/security/cve/CVE-2017-5735/" source="CVE"/>
		<reference ref_id="CVE-2018-3613" ref_url="https://www.suse.com/security/cve/CVE-2018-3613/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004986.html" source="SUSE-SU"/>
		<description>
This update for ovmf fixes the following issues:

Security issues fixed:

- CVE-2018-3613: Fixed AuthVariable Timestamp zeroing issue on APPEND_WRITE (bsc#1115916).
- CVE-2017-5731: Fixed privilege escalation via processing of malformed files in TianoCompress.c (bsc#1115917).
- CVE-2017-5732: Fixed privilege escalation via processing of malformed files in BaseUefiDecompressLib.c (bsc#1115917).
- CVE-2017-5733: Fixed privilege escalation via heap-based buffer overflow in MakeTable() function (bsc#1115917).
- CVE-2017-5734: Fixed privilege escalation via stack-based buffer overflow in MakeTable() function (bsc#1115917).
- CVE-2017-5735: Fixed privilege escalation via heap-based buffer overflow in Decode() function (bsc#1115917).


Non security issues fixed:

- Fixed an issue with the default owner of PK/KEK/db/dbx and make the
  auto-enrollment only happen at the very first time. (bsc#1117998)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-19"/>
	<updated date="2018-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1115916">SUSE bug 1115916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115917">SUSE bug 1115917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117998">SUSE bug 1117998</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5731/">CVE-2017-5731</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5732/">CVE-2017-5732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5733/">CVE-2017-5733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5734/">CVE-2017-5734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5735/">CVE-2017-5735</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3613/">CVE-2018-3613</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521809" comment="qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78684" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1017693" ref_url="https://bugzilla.suse.com/1017693" source="BUGZILLA"/>
		<reference ref_id="1054594" ref_url="https://bugzilla.suse.com/1054594" source="BUGZILLA"/>
		<reference ref_id="1115717" ref_url="https://bugzilla.suse.com/1115717" source="BUGZILLA"/>
		<reference ref_id="990460" ref_url="https://bugzilla.suse.com/990460" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10092" ref_url="https://www.suse.com/security/cve/CVE-2016-10092/" source="CVE"/>
		<reference ref_id="CVE-2016-10093" ref_url="https://www.suse.com/security/cve/CVE-2016-10093/" source="CVE"/>
		<reference ref_id="CVE-2016-10094" ref_url="https://www.suse.com/security/cve/CVE-2016-10094/" source="CVE"/>
		<reference ref_id="CVE-2016-6223" ref_url="https://www.suse.com/security/cve/CVE-2016-6223/" source="CVE"/>
		<reference ref_id="CVE-2017-12944" ref_url="https://www.suse.com/security/cve/CVE-2017-12944/" source="CVE"/>
		<reference ref_id="CVE-2018-19210" ref_url="https://www.suse.com/security/cve/CVE-2018-19210/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004984.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

Security issues fixed:                                   
    
- CVE-2018-19210: Fixed NULL pointer dereference in the TIFFWriteDirectorySec function (bsc#1115717).
- CVE-2017-12944: Fixed denial of service issue in the TIFFReadDirEntryArray function (bsc#1054594).
- CVE-2016-10094: Fixed heap-based buffer overflow in the _tiffWriteProc function (bsc#1017693).
- CVE-2016-10093: Fixed heap-based buffer overflow in the _TIFFmemcpy function (bsc#1017693).
- CVE-2016-10092: Fixed heap-based buffer overflow in the TIFFReverseBits function (bsc#1017693).
- CVE-2016-6223: Fixed out-of-bounds read on memory-mapped files in TIFFReadRawStrip1() and TIFFReadRawTile1() (bsc#990460).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-19"/>
	<updated date="2018-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017693">SUSE bug 1017693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054594">SUSE bug 1054594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115717">SUSE bug 1115717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990460">SUSE bug 990460</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10092/">CVE-2016-10092</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10093/">CVE-2016-10093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10094/">CVE-2016-10094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6223/">CVE-2016-6223</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12944/">CVE-2017-12944</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19210/">CVE-2018-19210</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520448" comment="libtiff5-4.0.9-44.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520449" comment="libtiff5-32bit-4.0.9-44.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78685" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1013882" ref_url="https://bugzilla.suse.com/1013882" source="BUGZILLA"/>
		<reference ref_id="1101676" ref_url="https://bugzilla.suse.com/1101676" source="BUGZILLA"/>
		<reference ref_id="1101677" ref_url="https://bugzilla.suse.com/1101677" source="BUGZILLA"/>
		<reference ref_id="1101678" ref_url="https://bugzilla.suse.com/1101678" source="BUGZILLA"/>
		<reference ref_id="1103342" ref_url="https://bugzilla.suse.com/1103342" source="BUGZILLA"/>
		<reference ref_id="1112368" ref_url="https://bugzilla.suse.com/1112368" source="BUGZILLA"/>
		<reference ref_id="1112397" ref_url="https://bugzilla.suse.com/1112397" source="BUGZILLA"/>
		<reference ref_id="1112417" ref_url="https://bugzilla.suse.com/1112417" source="BUGZILLA"/>
		<reference ref_id="1112421" ref_url="https://bugzilla.suse.com/1112421" source="BUGZILLA"/>
		<reference ref_id="1112432" ref_url="https://bugzilla.suse.com/1112432" source="BUGZILLA"/>
		<reference ref_id="1116686" ref_url="https://bugzilla.suse.com/1116686" source="BUGZILLA"/>
		<reference ref_id="1118754" ref_url="https://bugzilla.suse.com/1118754" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2018-3058" ref_url="https://www.suse.com/security/cve/CVE-2018-3058/" source="CVE"/>
		<reference ref_id="CVE-2018-3063" ref_url="https://www.suse.com/security/cve/CVE-2018-3063/" source="CVE"/>
		<reference ref_id="CVE-2018-3064" ref_url="https://www.suse.com/security/cve/CVE-2018-3064/" source="CVE"/>
		<reference ref_id="CVE-2018-3066" ref_url="https://www.suse.com/security/cve/CVE-2018-3066/" source="CVE"/>
		<reference ref_id="CVE-2018-3143" ref_url="https://www.suse.com/security/cve/CVE-2018-3143/" source="CVE"/>
		<reference ref_id="CVE-2018-3156" ref_url="https://www.suse.com/security/cve/CVE-2018-3156/" source="CVE"/>
		<reference ref_id="CVE-2018-3174" ref_url="https://www.suse.com/security/cve/CVE-2018-3174/" source="CVE"/>
		<reference ref_id="CVE-2018-3251" ref_url="https://www.suse.com/security/cve/CVE-2018-3251/" source="CVE"/>
		<reference ref_id="CVE-2018-3282" ref_url="https://www.suse.com/security/cve/CVE-2018-3282/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004993.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

Update to MariaDB 10.0.37 GA (bsc#1116686).

Security issues fixed:

- CVE-2018-3282: Server Storage Engines unspecified vulnerability (CPU Oct 2018) (bsc#1112432)
- CVE-2018-3251: InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112397)
- CVE-2018-3174: Client programs unspecified vulnerability (CPU Oct 2018) (bsc#1112368)
- CVE-2018-3156: InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112417)
- CVE-2018-3143: InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112421)
- CVE-2018-3066: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent Server Options). (bsc#1101678)
- CVE-2018-3064: InnoDB unspecified vulnerability (CPU Jul 2018) (bsc#1103342)
- CVE-2018-3063: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent Server Security Privileges). (bsc#1101677)
- CVE-2018-3058: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent MyISAM). (bsc#1101676)
- CVE-2016-9843: Big-endian out-of-bounds pointer (bsc#1013882)

Non-security changes:

- Remove PerconaFT from the package as it has AGPL licence (bsc#1118754)
- do not just remove tokudb plugin but don't build it at all (missing jemalloc dependency)

Release notes and changelog:

- https://kb.askmonty.org/en/mariadb-10037-release-notes
- https://kb.askmonty.org/en/mariadb-10037-changelog
- https://kb.askmonty.org/en/mariadb-10036-release-notes
- https://kb.askmonty.org/en/mariadb-10036-changelog
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-20"/>
	<updated date="2018-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013882">SUSE bug 1013882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101676">SUSE bug 1101676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101677">SUSE bug 1101677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101678">SUSE bug 1101678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103342">SUSE bug 1103342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112368">SUSE bug 1112368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112397">SUSE bug 1112397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112417">SUSE bug 1112417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112421">SUSE bug 1112421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112432">SUSE bug 1112432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118754">SUSE bug 1118754</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3058/">CVE-2018-3058</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3063/">CVE-2018-3063</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-3064/">CVE-2018-3064</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3066/">CVE-2018-3066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3143/">CVE-2018-3143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3156/">CVE-2018-3156</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3174/">CVE-2018-3174</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3251/">CVE-2018-3251</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3282/">CVE-2018-3282</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521810" comment="libmysqlclient18-10.0.37-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521811" comment="libmysqlclient18-32bit-10.0.37-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521812" comment="libmysqlclient_r18-10.0.37-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521813" comment="libmysqlclient_r18-32bit-10.0.37-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521814" comment="mariadb-100-errormessages-10.0.37-2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78686" version="1" class="patch">
	<metadata>
		<title>Security update for netatalk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1119540" ref_url="https://bugzilla.suse.com/1119540" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1160" ref_url="https://www.suse.com/security/cve/CVE-2018-1160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004996.html" source="SUSE-SU"/>
		<description>
This update for netatalk fixes the following issues:

Security issue fixed:

- CVE-2018-1160 Fixed a missing bounds check in the handling of the DSI
  OPEN SESSION request, which allowed an unauthenticated to overwrite memory
  with data of their choice leading to arbitrary code execution with root
  privileges. (bsc#1119540)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-21"/>
	<updated date="2018-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1119540">SUSE bug 1119540</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1160/">CVE-2018-1160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520453" comment="libatalk12-3.1.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520454" comment="netatalk-3.1.0-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78687" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr and mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1097410" ref_url="https://bugzilla.suse.com/1097410" source="BUGZILLA"/>
		<reference ref_id="1106873" ref_url="https://bugzilla.suse.com/1106873" source="BUGZILLA"/>
		<reference ref_id="1119069" ref_url="https://bugzilla.suse.com/1119069" source="BUGZILLA"/>
		<reference ref_id="1119105" ref_url="https://bugzilla.suse.com/1119105" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495/" source="CVE"/>
		<reference ref_id="CVE-2018-12384" ref_url="https://www.suse.com/security/cve/CVE-2018-12384/" source="CVE"/>
		<reference ref_id="CVE-2018-12404" ref_url="https://www.suse.com/security/cve/CVE-2018-12404/" source="CVE"/>
		<reference ref_id="CVE-2018-12405" ref_url="https://www.suse.com/security/cve/CVE-2018-12405/" source="CVE"/>
		<reference ref_id="CVE-2018-17466" ref_url="https://www.suse.com/security/cve/CVE-2018-17466/" source="CVE"/>
		<reference ref_id="CVE-2018-18492" ref_url="https://www.suse.com/security/cve/CVE-2018-18492/" source="CVE"/>
		<reference ref_id="CVE-2018-18493" ref_url="https://www.suse.com/security/cve/CVE-2018-18493/" source="CVE"/>
		<reference ref_id="CVE-2018-18494" ref_url="https://www.suse.com/security/cve/CVE-2018-18494/" source="CVE"/>
		<reference ref_id="CVE-2018-18498" ref_url="https://www.suse.com/security/cve/CVE-2018-18498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox, mozilla-nss and mozilla-nspr fixes the following issues:

Issues fixed in MozillaFirefox:

- Update to Firefox ESR 60.4 (bsc#1119105)
- CVE-2018-17466: Fixed a buffer overflow and out-of-bounds read in ANGLE library with TextureStorage11
- CVE-2018-18492: Fixed a use-after-free with select element
- CVE-2018-18493: Fixed a buffer overflow in accelerated 2D canvas with Skia
- CVE-2018-18494: Fixed a Same-origin policy violation using location attribute and performance.getEntries
  to steal cross-origin URLs
- CVE-2018-18498: Fixed a integer overflow when calculating buffer sizes for images
- CVE-2018-12405: Fixed a few memory safety bugs

Issues fixed in mozilla-nss:

- Update to NSS 3.40.1 (bsc#1119105)
- CVE-2018-12404: Fixed a cache side-channel variant of the Bleichenbacher attack (bsc#1119069)
- CVE-2018-12384: Fixed an issue in the SSL handshake. NSS responded to an
  SSLv2-compatible ClientHello with a ServerHello that had an all-zero random. (bsc#1106873)
- CVE-2018-0495: Fixed a memory-cache side-channel attack with ECDSA signatures (bsc#1097410)
- Fixed a decryption failure during FFDHE key exchange
- Various security fixes in the ASN.1 code

Issues fixed in mozilla-nspr:

- Update mozilla-nspr to 4.20 (bsc#1119105)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-21"/>
	<updated date="2018-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097410">SUSE bug 1097410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106873">SUSE bug 1106873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119069">SUSE bug 1119069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12384/">CVE-2018-12384</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12404/">CVE-2018-12404</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12405/">CVE-2018-12405</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17466/">CVE-2018-17466</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18492/">CVE-2018-18492</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18493/">CVE-2018-18493</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18494/">CVE-2018-18494</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18498/">CVE-2018-18498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520455" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520456" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520457" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520458" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520459" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520460" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520461" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520462" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520463" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520464" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520465" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520466" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520467" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520468" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520469" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78688" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1117740" ref_url="https://bugzilla.suse.com/1117740" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19622" ref_url="https://www.suse.com/security/cve/CVE-2018-19622/" source="CVE"/>
		<reference ref_id="CVE-2018-19623" ref_url="https://www.suse.com/security/cve/CVE-2018-19623/" source="CVE"/>
		<reference ref_id="CVE-2018-19624" ref_url="https://www.suse.com/security/cve/CVE-2018-19624/" source="CVE"/>
		<reference ref_id="CVE-2018-19625" ref_url="https://www.suse.com/security/cve/CVE-2018-19625/" source="CVE"/>
		<reference ref_id="CVE-2018-19626" ref_url="https://www.suse.com/security/cve/CVE-2018-19626/" source="CVE"/>
		<reference ref_id="CVE-2018-19627" ref_url="https://www.suse.com/security/cve/CVE-2018-19627/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005007.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Update to Wireshark 2.4.11 (bsc#1117740).

Security issues fixed:

- CVE-2018-19625: The Wireshark dissection engine could crash (wnpa-sec-2018-51)
- CVE-2018-19626: The DCOM dissector could crash (wnpa-sec-2018-52)
- CVE-2018-19623: The LBMPDM dissector could crash (wnpa-sec-2018-53) 
- CVE-2018-19622: The MMSE dissector could go into an infinite loop (wnpa-sec-2018-54)
- CVE-2018-19627: The IxVeriWave file parser could crash (wnpa-sec-2018-55) 
- CVE-2018-19624: The PVFS dissector could crash (wnpa-sec-2018-56)

Further bug fixes and updated protocol support as listed in:

- https://www.wireshark.org/docs/relnotes/wireshark-2.4.11.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-28"/>
	<updated date="2018-12-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117740">SUSE bug 1117740</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19622/">CVE-2018-19622</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19623/">CVE-2018-19623</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19624/">CVE-2018-19624</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19625/">CVE-2018-19625</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19626/">CVE-2018-19626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19627/">CVE-2018-19627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520519" comment="libwireshark9-2.4.11-48.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520520" comment="libwiretap7-2.4.11-48.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520521" comment="libwscodecs1-2.4.11-48.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520522" comment="libwsutil8-2.4.11-48.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520523" comment="wireshark-2.4.11-48.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520524" comment="wireshark-gtk-2.4.11-48.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78689" version="1" class="patch">
	<metadata>
		<title>Security update for ntfs-3g_ntfsprogs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1130165" ref_url="https://bugzilla.suse.com/1130165" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9755" ref_url="https://www.suse.com/security/cve/CVE-2019-9755/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005359.html" source="SUSE-SU"/>
		<description>
This update for ntfs-3g_ntfsprogs fixes the following issues:

Security issues fixed:

- CVE-2019-9755: Fixed a heap-based buffer overflow which could lead to local privilege escalation (bsc#1130165).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-24"/>
	<updated date="2019-04-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1130165">SUSE bug 1130165</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9755/">CVE-2019-9755</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521024" comment="libntfs-3g84-2013.1.13-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521025" comment="ntfs-3g-2013.1.13-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521026" comment="ntfsprogs-2013.1.13-5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78690" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1126768" ref_url="https://bugzilla.suse.com/1126768" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8375" ref_url="https://www.suse.com/security/cve/CVE-2019-8375/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005360.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Security issue fixed: 

- CVE-2019-8375: Fixed an issue in UIProcess subsystem which could allow the script dialog
  size to exceed the web view size leading to Buffer Overflow or other unspecified impact (bsc#1126768).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-25"/>
	<updated date="2019-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1126768">SUSE bug 1126768</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8375/">CVE-2019-8375</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521027" comment="libjavascriptcoregtk-4_0-18-2.24.0-2.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521028" comment="libwebkit2gtk-4_0-37-2.24.0-2.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521029" comment="libwebkit2gtk3-lang-2.24.0-2.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521030" comment="typelib-1_0-JavaScriptCore-4_0-2.24.0-2.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521031" comment="typelib-1_0-WebKit2-4_0-2.24.0-2.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521032" comment="webkit2gtk-4_0-injected-bundles-2.24.0-2.38.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78691" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1106989" ref_url="https://bugzilla.suse.com/1106989" source="BUGZILLA"/>
		<reference ref_id="1106996" ref_url="https://bugzilla.suse.com/1106996" source="BUGZILLA"/>
		<reference ref_id="1107609" ref_url="https://bugzilla.suse.com/1107609" source="BUGZILLA"/>
		<reference ref_id="1120381" ref_url="https://bugzilla.suse.com/1120381" source="BUGZILLA"/>
		<reference ref_id="1122033" ref_url="https://bugzilla.suse.com/1122033" source="BUGZILLA"/>
		<reference ref_id="1124365" ref_url="https://bugzilla.suse.com/1124365" source="BUGZILLA"/>
		<reference ref_id="1124366" ref_url="https://bugzilla.suse.com/1124366" source="BUGZILLA"/>
		<reference ref_id="1124368" ref_url="https://bugzilla.suse.com/1124368" source="BUGZILLA"/>
		<reference ref_id="1128649" ref_url="https://bugzilla.suse.com/1128649" source="BUGZILLA"/>
		<reference ref_id="1130330" ref_url="https://bugzilla.suse.com/1130330" source="BUGZILLA"/>
		<reference ref_id="1131317" ref_url="https://bugzilla.suse.com/1131317" source="BUGZILLA"/>
		<reference ref_id="1132053" ref_url="https://bugzilla.suse.com/1132053" source="BUGZILLA"/>
		<reference ref_id="1132054" ref_url="https://bugzilla.suse.com/1132054" source="BUGZILLA"/>
		<reference ref_id="1132060" ref_url="https://bugzilla.suse.com/1132060" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16412" ref_url="https://www.suse.com/security/cve/CVE-2018-16412/" source="CVE"/>
		<reference ref_id="CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<reference ref_id="CVE-2018-20467" ref_url="https://www.suse.com/security/cve/CVE-2018-20467/" source="CVE"/>
		<reference ref_id="CVE-2019-10650" ref_url="https://www.suse.com/security/cve/CVE-2019-10650/" source="CVE"/>
		<reference ref_id="CVE-2019-11007" ref_url="https://www.suse.com/security/cve/CVE-2019-11007/" source="CVE"/>
		<reference ref_id="CVE-2019-11008" ref_url="https://www.suse.com/security/cve/CVE-2019-11008/" source="CVE"/>
		<reference ref_id="CVE-2019-11009" ref_url="https://www.suse.com/security/cve/CVE-2019-11009/" source="CVE"/>
		<reference ref_id="CVE-2019-7175" ref_url="https://www.suse.com/security/cve/CVE-2019-7175/" source="CVE"/>
		<reference ref_id="CVE-2019-7395" ref_url="https://www.suse.com/security/cve/CVE-2019-7395/" source="CVE"/>
		<reference ref_id="CVE-2019-7397" ref_url="https://www.suse.com/security/cve/CVE-2019-7397/" source="CVE"/>
		<reference ref_id="CVE-2019-7398" ref_url="https://www.suse.com/security/cve/CVE-2019-7398/" source="CVE"/>
		<reference ref_id="CVE-2019-9956" ref_url="https://www.suse.com/security/cve/CVE-2019-9956/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-9956: Fixed a stack-based buffer overflow in PopHexPixel() (bsc#1130330).
- CVE-2019-10650: Fixed a heap-based buffer over-read in WriteTIFFImage() (bsc#1131317).
- CVE-2019-7175: Fixed multiple memory leaks in DecodeImage function (bsc#1128649).
- CVE-2018-20467: Fixed infinite loop in coders/bmp.c (bsc#1120381).
- CVE-2019-7398: Fixed a memory leak in the function WriteDIBImage (bsc#1124365).
- CVE-2019-7397: Fixed a memory leak in the function WritePDFImage (bsc#1124366).
- CVE-2019-7395: Fixed a memory leak in the function WritePSDChannel (bsc#1124368).
- CVE-2018-16413: Fixed a heap-based buffer over-read in PushShortPixel() (bsc#1106989).
- CVE-2018-16412: Fixed a heap-based buffer over-read in ParseImageResourceBlocks() (bsc#1106996).
- CVE-2018-16644: Fixed a regression in dcm coder (bsc#1107609).
- CVE-2019-11007: Fixed a heap-based buffer overflow in ReadMNGImage() (bsc#1132060).
- CVE-2019-11008: Fixed a heap-based buffer overflow in WriteXWDImage() (bsc#1132054).
- CVE-2019-11009: Fixed a heap-based buffer over-read in ReadXWDImage() (bsc#1132053).

- Added extra -config- packages with Postscript/EPS/PDF readers still enabled.

  Removing the PS decoders is used to harden ImageMagick against security issues within
  ghostscript. Enabling them might impact security. (bsc#1122033)

  These are two packages that can be selected:

  - ImageMagick-config-6-SUSE: This has the PS decoders disabled.
  - ImageMagick-config-6-upstream: This has the PS decoders enabled.

  Depending on your local needs install either one of them. The default is the -SUSE configuration.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-25"/>
	<updated date="2019-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106996">SUSE bug 1106996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120381">SUSE bug 1120381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122033">SUSE bug 1122033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124365">SUSE bug 1124365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124366">SUSE bug 1124366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124368">SUSE bug 1124368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128649">SUSE bug 1128649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130330">SUSE bug 1130330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131317">SUSE bug 1131317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132053">SUSE bug 1132053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132054">SUSE bug 1132054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132060">SUSE bug 1132060</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16412/">CVE-2018-16412</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20467/">CVE-2018-20467</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10650/">CVE-2019-10650</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11007/">CVE-2019-11007</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11008/">CVE-2019-11008</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11009/">CVE-2019-11009</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7175/">CVE-2019-7175</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-7395/">CVE-2019-7395</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7397/">CVE-2019-7397</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7398/">CVE-2019-7398</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9956/">CVE-2019-9956</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521033" comment="ImageMagick-6.8.8.1-71.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521034" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521035" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521036" comment="libMagick++-6_Q16-3-6.8.8.1-71.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521037" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521038" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521039" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78692" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1099590" ref_url="https://bugzilla.suse.com/1099590" source="BUGZILLA"/>
		<reference ref_id="1123755" ref_url="https://bugzilla.suse.com/1123755" source="BUGZILLA"/>
		<reference ref_id="1124223" ref_url="https://bugzilla.suse.com/1124223" source="BUGZILLA"/>
		<reference ref_id="1127153" ref_url="https://bugzilla.suse.com/1127153" source="BUGZILLA"/>
		<reference ref_id="1131060" ref_url="https://bugzilla.suse.com/1131060" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3880" ref_url="https://www.suse.com/security/cve/CVE-2019-3880/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005365.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

Security issue fixed:

- CVE-2019-3880: Fixed a path/symlink traversal vulnerability, which allowed an unprivileged user to save registry files outside a share (bsc#1131060).

Non-security issues fixed:

- Fix vfs_ceph ftruncate and fallocate handling (bsc#1127153).
- Abide by load_printers smb.conf parameter (bsc#1124223).
- s3:winbindd: let normalize_name_map() call find_domain_from_name_noinit() (bsc#1123755).
- s3:passdb: Do not return OK if we don't have pinfo set up (bsc#1099590).
- s3:winbind: Fix regression (bsc#1123755).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-25"/>
	<updated date="2019-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1099590">SUSE bug 1099590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123755">SUSE bug 1123755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124223">SUSE bug 1124223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127153">SUSE bug 1127153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131060">SUSE bug 1131060</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3880/">CVE-2019-3880</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521040" comment="libdcerpc-binding0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521041" comment="libdcerpc-binding0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521042" comment="libdcerpc0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521043" comment="libdcerpc0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521044" comment="libndr-krb5pac0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521045" comment="libndr-krb5pac0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521046" comment="libndr-nbt0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521047" comment="libndr-nbt0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521048" comment="libndr-standard0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521049" comment="libndr-standard0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521050" comment="libndr0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521051" comment="libndr0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521052" comment="libnetapi0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521053" comment="libnetapi0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521054" comment="libsamba-credentials0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521055" comment="libsamba-credentials0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521056" comment="libsamba-errors0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521057" comment="libsamba-errors0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521058" comment="libsamba-hostconfig0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521059" comment="libsamba-hostconfig0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521060" comment="libsamba-passdb0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521061" comment="libsamba-passdb0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521062" comment="libsamba-util0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521063" comment="libsamba-util0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521064" comment="libsamdb0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521065" comment="libsamdb0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521066" comment="libsmbclient0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521067" comment="libsmbclient0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521068" comment="libsmbconf0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521069" comment="libsmbconf0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521070" comment="libsmbldap0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521071" comment="libsmbldap0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521072" comment="libtevent-util0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521073" comment="libtevent-util0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521074" comment="libwbclient0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521075" comment="libwbclient0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521076" comment="samba-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521077" comment="samba-client-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521078" comment="samba-client-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521079" comment="samba-doc-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521080" comment="samba-libs-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521081" comment="samba-libs-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521082" comment="samba-winbind-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521083" comment="samba-winbind-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78693" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1131945" ref_url="https://bugzilla.suse.com/1131945" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10894" ref_url="https://www.suse.com/security/cve/CVE-2019-10894/" source="CVE"/>
		<reference ref_id="CVE-2019-10895" ref_url="https://www.suse.com/security/cve/CVE-2019-10895/" source="CVE"/>
		<reference ref_id="CVE-2019-10896" ref_url="https://www.suse.com/security/cve/CVE-2019-10896/" source="CVE"/>
		<reference ref_id="CVE-2019-10899" ref_url="https://www.suse.com/security/cve/CVE-2019-10899/" source="CVE"/>
		<reference ref_id="CVE-2019-10901" ref_url="https://www.suse.com/security/cve/CVE-2019-10901/" source="CVE"/>
		<reference ref_id="CVE-2019-10903" ref_url="https://www.suse.com/security/cve/CVE-2019-10903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005364.html" source="SUSE-SU"/>
		<description>
This update for wireshark to version 2.4.14 fixes the following issues:

Security issues fixed:

- CVE-2019-10895: NetScaler file parser crash.
- CVE-2019-10899: SRVLOC dissector crash.
- CVE-2019-10894: GSS-API dissector crash.
- CVE-2019-10896: DOF dissector crash.
- CVE-2019-10901: LDSS dissector crash.
- CVE-2019-10903: DCERPC SPOOLSS dissector crash.

Non-security issue fixed:

- Update to version 2.4.14 (bsc#1131945).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-25"/>
	<updated date="2019-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1131945">SUSE bug 1131945</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10894/">CVE-2019-10894</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10895/">CVE-2019-10895</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10896/">CVE-2019-10896</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10899/">CVE-2019-10899</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10901/">CVE-2019-10901</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10903/">CVE-2019-10903</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521084" comment="libwireshark9-2.4.14-48.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521085" comment="libwiretap7-2.4.14-48.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521086" comment="libwscodecs1-2.4.14-48.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521087" comment="libwsutil8-2.4.14-48.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521088" comment="wireshark-2.4.14-48.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521089" comment="wireshark-gtk-2.4.14-48.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78694" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1130103" ref_url="https://bugzilla.suse.com/1130103" source="BUGZILLA"/>
		<reference ref_id="1133528" ref_url="https://bugzilla.suse.com/1133528" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005377.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

 - Incorrect upstream fix for CVE-2019-3859 broke public key authentication [bsc#1133528, bsc#1130103]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-27"/>
	<updated date="2019-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130103">SUSE bug 1130103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133528">SUSE bug 1133528</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521117" comment="libssh2-1-1.4.3-20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521118" comment="libssh2-1-32bit-1.4.3-20.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78695" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1104205" ref_url="https://bugzilla.suse.com/1104205" source="BUGZILLA"/>
		<reference ref_id="1109209" ref_url="https://bugzilla.suse.com/1109209" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14526" ref_url="https://www.suse.com/security/cve/CVE-2018-14526/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005409.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

This security issue was fixed:

- CVE-2018-14526: Under certain conditions, the integrity of EAPOL-Key messages
  was not checked, leading to a decryption oracle. An attacker within range of
  the Access Point and client could have abused the vulnerability to recover
  sensitive information (bsc#1104205).

This non-security issue was fixed:

- Enabled PWD as EAP method. This allows for password-based authentication,
  which is easier to setup than most of the other methods, and is used by the
  Eduroam network (bsc#1109209).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-29"/>
	<updated date="2019-04-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104205">SUSE bug 1104205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109209">SUSE bug 1109209</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14526/">CVE-2018-14526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521119" comment="wpa_supplicant-2.6-15.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78696" version="1" class="patch">
	<metadata>
		<title>Security update for atftp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1133114" ref_url="https://bugzilla.suse.com/1133114" source="BUGZILLA"/>
		<reference ref_id="1133145" ref_url="https://bugzilla.suse.com/1133145" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11365" ref_url="https://www.suse.com/security/cve/CVE-2019-11365/" source="CVE"/>
		<reference ref_id="CVE-2019-11366" ref_url="https://www.suse.com/security/cve/CVE-2019-11366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005408.html" source="SUSE-SU"/>
		<description>
This update for atftp fixes the following issues:

Security issues fixed:

- CVE-2019-11366: Fixed a denial of service caused by a NULL pointer dereference because thread_list_mutex was not locked (bsc#1133145).
- CVE-2019-11365: Fixed a buffer overflow which could lead to remote code execution caused by an insecure use of strncpy() (bsc#1133114).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-29"/>
	<updated date="2019-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133114">SUSE bug 1133114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133145">SUSE bug 1133145</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11365/">CVE-2019-11365</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11366/">CVE-2019-11366</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521120" comment="atftp-0.7.0-160.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78697" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1100396" ref_url="https://bugzilla.suse.com/1100396" source="BUGZILLA"/>
		<reference ref_id="1110661" ref_url="https://bugzilla.suse.com/1110661" source="BUGZILLA"/>
		<reference ref_id="1122729" ref_url="https://bugzilla.suse.com/1122729" source="BUGZILLA"/>
		<reference ref_id="1127223" ref_url="https://bugzilla.suse.com/1127223" source="BUGZILLA"/>
		<reference ref_id="1127308" ref_url="https://bugzilla.suse.com/1127308" source="BUGZILLA"/>
		<reference ref_id="1128574" ref_url="https://bugzilla.suse.com/1128574" source="BUGZILLA"/>
		<reference ref_id="1131994" ref_url="https://bugzilla.suse.com/1131994" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-5155" ref_url="https://www.suse.com/security/cve/CVE-2009-5155/" source="CVE"/>
		<reference ref_id="CVE-2016-10739" ref_url="https://www.suse.com/security/cve/CVE-2016-10739/" source="CVE"/>
		<reference ref_id="CVE-2019-9169" ref_url="https://www.suse.com/security/cve/CVE-2019-9169/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005411.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2019-9169: regex: fix read overrun (bsc#1127308, BZ #24114)
- CVE-2016-10739: Fully parse IPv4 address strings (bsc#1122729, BZ #20018)
- CVE-2009-5155: ERE '0|()0|\1|0' causes regexec undefined behavior (bsc#1127223, BZ #18986)

Non-security issues fixed:

- Enable TLE only if GLIBC_ELISION_ENABLE=yes is defined (bsc#1131994, fate#322271)
- Add more checks for valid ld.so.cache file (bsc#1110661, BZ #18093)
- Added cfi information for start routines in order to stop unwinding (bsc#1128574)
- ja_JP locale: Add entry for the new Japanese era (bsc#1100396, fate#325570, BZ #22964)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-30"/>
	<updated date="2019-04-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100396">SUSE bug 1100396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110661">SUSE bug 1110661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122729">SUSE bug 1122729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127223">SUSE bug 1127223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127308">SUSE bug 1127308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128574">SUSE bug 1128574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131994">SUSE bug 1131994</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2009-5155/">CVE-2009-5155</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10739/">CVE-2016-10739</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9169/">CVE-2019-9169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521815" comment="glibc-2.22-100.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521816" comment="glibc-32bit-2.22-100.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521817" comment="glibc-devel-2.22-100.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521818" comment="glibc-devel-32bit-2.22-100.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521819" comment="glibc-i18ndata-2.22-100.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521820" comment="glibc-locale-2.22-100.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521821" comment="glibc-locale-32bit-2.22-100.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521822" comment="nscd-2.22-100.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78698" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1120489" ref_url="https://bugzilla.suse.com/1120489" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20217" ref_url="https://www.suse.com/security/cve/CVE-2018-20217/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005038.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following issues:

Security issue fixed:

- CVE-2018-20217: Fixed an assertion issue with older encryption types (bsc#1120489)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-17"/>
	<updated date="2019-01-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120489">SUSE bug 1120489</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20217/">CVE-2018-20217</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521121" comment="krb5-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521122" comment="krb5-32bit-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521123" comment="krb5-client-1.12.5-40.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78699" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1096209" ref_url="https://bugzilla.suse.com/1096209" source="BUGZILLA"/>
		<reference ref_id="1098155" ref_url="https://bugzilla.suse.com/1098155" source="BUGZILLA"/>
		<reference ref_id="1128712" ref_url="https://bugzilla.suse.com/1128712" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1152" ref_url="https://www.suse.com/security/cve/CVE-2018-1152/" source="CVE"/>
		<reference ref_id="CVE-2018-11813" ref_url="https://www.suse.com/security/cve/CVE-2018-11813/" source="CVE"/>
		<reference ref_id="CVE-2018-14498" ref_url="https://www.suse.com/security/cve/CVE-2018-14498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005415.html" source="SUSE-SU"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

The following security vulnerabilities were addressed:

- CVE-2018-14498: Fixed a heap-based buffer over read in get_8bit_row function
  which could allow to an attacker to cause denial of service (bsc#1128712).
- CVE-2018-11813: Fixed the end-of-file mishandling in read_pixel in rdtarga.c,
  which allowed remote attackers to cause a denial-of-service via crafted JPG
  files due to a large loop (bsc#1096209)
- CVE-2018-1152: Fixed a denial of service in start_input_bmp() rdbmp.c caused
  by a divide by zero when processing a crafted BMP image (bsc#1098155)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-30"/>
	<updated date="2019-04-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1096209">SUSE bug 1096209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098155">SUSE bug 1098155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128712">SUSE bug 1128712</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1152/">CVE-2018-1152</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11813/">CVE-2018-11813</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14498/">CVE-2018-14498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521124" comment="libjpeg-turbo-1.5.3-31.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521125" comment="libjpeg62-62.2.0-31.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521126" comment="libjpeg62-32bit-62.2.0-31.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521127" comment="libjpeg62-turbo-1.5.3-31.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521128" comment="libjpeg8-8.1.2-31.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521129" comment="libjpeg8-32bit-8.1.2-31.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521130" comment="libturbojpeg0-8.1.2-31.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78700" version="1" class="patch">
	<metadata>
		<title>Security update for hostinfo, supportutils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1054979" ref_url="https://bugzilla.suse.com/1054979" source="BUGZILLA"/>
		<reference ref_id="1099498" ref_url="https://bugzilla.suse.com/1099498" source="BUGZILLA"/>
		<reference ref_id="1115245" ref_url="https://bugzilla.suse.com/1115245" source="BUGZILLA"/>
		<reference ref_id="1117751" ref_url="https://bugzilla.suse.com/1117751" source="BUGZILLA"/>
		<reference ref_id="1117776" ref_url="https://bugzilla.suse.com/1117776" source="BUGZILLA"/>
		<reference ref_id="1118460" ref_url="https://bugzilla.suse.com/1118460" source="BUGZILLA"/>
		<reference ref_id="1118462" ref_url="https://bugzilla.suse.com/1118462" source="BUGZILLA"/>
		<reference ref_id="1118463" ref_url="https://bugzilla.suse.com/1118463" source="BUGZILLA"/>
		<reference ref_id="1125623" ref_url="https://bugzilla.suse.com/1125623" source="BUGZILLA"/>
		<reference ref_id="1125666" ref_url="https://bugzilla.suse.com/1125666" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19636" ref_url="https://www.suse.com/security/cve/CVE-2018-19636/" source="CVE"/>
		<reference ref_id="CVE-2018-19637" ref_url="https://www.suse.com/security/cve/CVE-2018-19637/" source="CVE"/>
		<reference ref_id="CVE-2018-19638" ref_url="https://www.suse.com/security/cve/CVE-2018-19638/" source="CVE"/>
		<reference ref_id="CVE-2018-19639" ref_url="https://www.suse.com/security/cve/CVE-2018-19639/" source="CVE"/>
		<reference ref_id="CVE-2018-19640" ref_url="https://www.suse.com/security/cve/CVE-2018-19640/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005417.html" source="SUSE-SU"/>
		<description>
This update for hostinfo, supportutils fixes the following issues:
	  
Security issues fixed for supportutils:

- CVE-2018-19640: Fixed an issue where  users could kill arbitrary processes (bsc#1118463).
- CVE-2018-19638: Fixed an issue where users could overwrite arbitrary log files (bsc#1118460).
- CVE-2018-19639: Fixed a code execution if run with -v (bsc#1118462).
- CVE-2018-19637: Fixed an issue where static temporary filename could allow overwriting of files (bsc#1117776).
- CVE-2018-19636: Fixed a local root exploit via inclusion of attacker controlled shell script (bsc#1117751).

Other issues fixed for supportutils:

- Fixed invalid exit code commands (bsc#1125666)
- SUSE separation in supportconfig (bsc#1125623)
- Clarified supportconfig(8) -x option (bsc#1115245)
- supportconfig: 3.0.127
- btrfs filesystem usage
- List products.d
- Dump lsof errors
- Added ha commands for corosync
- Dumped find errors in ib_info

Issues fixed in hostinfo:
- Removed extra kernel install dates (bsc#1099498)
- Resolved network bond issue (bsc#1054979)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-30"/>
	<updated date="2019-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1054979">SUSE bug 1054979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099498">SUSE bug 1099498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115245">SUSE bug 1115245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117751">SUSE bug 1117751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117776">SUSE bug 1117776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118460">SUSE bug 1118460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118462">SUSE bug 1118462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118463">SUSE bug 1118463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125623">SUSE bug 1125623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125666">SUSE bug 1125666</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19636/">CVE-2018-19636</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19637/">CVE-2018-19637</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19638/">CVE-2018-19638</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19639/">CVE-2018-19639</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19640/">CVE-2018-19640</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521131" comment="supportutils-3.0-95.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78701" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1133925" ref_url="https://bugzilla.suse.com/1133925" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2019:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005422.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 to version 1.1.1b fixes the following issues:

- Changed the info callback signals for the start and end of a post-handshake
  message exchange in TLSv1.3.
- Fixed a bug in DTLS over SCTP. This breaks interoperability with older versions
  of OpenSSL like OpenSSL 1.1.0 and OpenSSL 1.0.2.
- Fixed the handling of strerror_r with glibc.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-03"/>
	<updated date="2019-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1133925">SUSE bug 1133925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521823" comment="libopenssl1_1-1.1.1b-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521824" comment="libopenssl1_1-32bit-1.1.1b-2.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78702" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1132256" ref_url="https://bugzilla.suse.com/1132256" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11070" ref_url="https://www.suse.com/security/cve/CVE-2019-11070/" source="CVE"/>
		<reference ref_id="CVE-2019-6201" ref_url="https://www.suse.com/security/cve/CVE-2019-6201/" source="CVE"/>
		<reference ref_id="CVE-2019-6251" ref_url="https://www.suse.com/security/cve/CVE-2019-6251/" source="CVE"/>
		<reference ref_id="CVE-2019-7285" ref_url="https://www.suse.com/security/cve/CVE-2019-7285/" source="CVE"/>
		<reference ref_id="CVE-2019-7292" ref_url="https://www.suse.com/security/cve/CVE-2019-7292/" source="CVE"/>
		<reference ref_id="CVE-2019-8503" ref_url="https://www.suse.com/security/cve/CVE-2019-8503/" source="CVE"/>
		<reference ref_id="CVE-2019-8506" ref_url="https://www.suse.com/security/cve/CVE-2019-8506/" source="CVE"/>
		<reference ref_id="CVE-2019-8515" ref_url="https://www.suse.com/security/cve/CVE-2019-8515/" source="CVE"/>
		<reference ref_id="CVE-2019-8524" ref_url="https://www.suse.com/security/cve/CVE-2019-8524/" source="CVE"/>
		<reference ref_id="CVE-2019-8535" ref_url="https://www.suse.com/security/cve/CVE-2019-8535/" source="CVE"/>
		<reference ref_id="CVE-2019-8536" ref_url="https://www.suse.com/security/cve/CVE-2019-8536/" source="CVE"/>
		<reference ref_id="CVE-2019-8544" ref_url="https://www.suse.com/security/cve/CVE-2019-8544/" source="CVE"/>
		<reference ref_id="CVE-2019-8551" ref_url="https://www.suse.com/security/cve/CVE-2019-8551/" source="CVE"/>
		<reference ref_id="CVE-2019-8558" ref_url="https://www.suse.com/security/cve/CVE-2019-8558/" source="CVE"/>
		<reference ref_id="CVE-2019-8559" ref_url="https://www.suse.com/security/cve/CVE-2019-8559/" source="CVE"/>
		<reference ref_id="CVE-2019-8563" ref_url="https://www.suse.com/security/cve/CVE-2019-8563/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.24.1 fixes the following issues:

Security issues fixed:

- CVE-2019-6201, CVE-2019-6251, CVE-2019-7285, CVE-2019-7292, CVE-2019-8503, CVE-2019-8506,
  CVE-2019-8515, CVE-2019-8524, CVE-2019-8535, CVE-2019-8536, CVE-2019-8544, CVE-2019-8551,
  CVE-2019-8558, CVE-2019-8559, CVE-2019-8563, CVE-2019-11070 (bsc#1132256).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-06"/>
	<updated date="2019-05-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11070/">CVE-2019-11070</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6201/">CVE-2019-6201</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-6251/">CVE-2019-6251</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7285/">CVE-2019-7285</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7292/">CVE-2019-7292</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8503/">CVE-2019-8503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8506/">CVE-2019-8506</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8515/">CVE-2019-8515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8524/">CVE-2019-8524</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8535/">CVE-2019-8535</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8536/">CVE-2019-8536</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8544/">CVE-2019-8544</cve>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8551/">CVE-2019-8551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8558/">CVE-2019-8558</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8559/">CVE-2019-8559</cve>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8563/">CVE-2019-8563</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78703" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1131361" ref_url="https://bugzilla.suse.com/1131361" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0161" ref_url="https://www.suse.com/security/cve/CVE-2019-0161/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005425.html" source="SUSE-SU"/>
		<description>
This update for ovmf fixes the following issues:

Security issue fixed:

- CVE-2019-0161: Fixed a stack overflow in UsbBusDxe and UsbBusPei, which could 
  potentially be triggered by a local unauthenticated user (bsc#1131361).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-06"/>
	<updated date="2019-05-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1131361">SUSE bug 1131361</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0161/">CVE-2019-0161</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521825" comment="qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78704" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1013882" ref_url="https://bugzilla.suse.com/1013882" source="BUGZILLA"/>
		<reference ref_id="1111858" ref_url="https://bugzilla.suse.com/1111858" source="BUGZILLA"/>
		<reference ref_id="1111859" ref_url="https://bugzilla.suse.com/1111859" source="BUGZILLA"/>
		<reference ref_id="1112368" ref_url="https://bugzilla.suse.com/1112368" source="BUGZILLA"/>
		<reference ref_id="1112377" ref_url="https://bugzilla.suse.com/1112377" source="BUGZILLA"/>
		<reference ref_id="1112384" ref_url="https://bugzilla.suse.com/1112384" source="BUGZILLA"/>
		<reference ref_id="1112386" ref_url="https://bugzilla.suse.com/1112386" source="BUGZILLA"/>
		<reference ref_id="1112391" ref_url="https://bugzilla.suse.com/1112391" source="BUGZILLA"/>
		<reference ref_id="1112397" ref_url="https://bugzilla.suse.com/1112397" source="BUGZILLA"/>
		<reference ref_id="1112404" ref_url="https://bugzilla.suse.com/1112404" source="BUGZILLA"/>
		<reference ref_id="1112415" ref_url="https://bugzilla.suse.com/1112415" source="BUGZILLA"/>
		<reference ref_id="1112417" ref_url="https://bugzilla.suse.com/1112417" source="BUGZILLA"/>
		<reference ref_id="1112421" ref_url="https://bugzilla.suse.com/1112421" source="BUGZILLA"/>
		<reference ref_id="1112432" ref_url="https://bugzilla.suse.com/1112432" source="BUGZILLA"/>
		<reference ref_id="1116686" ref_url="https://bugzilla.suse.com/1116686" source="BUGZILLA"/>
		<reference ref_id="1118754" ref_url="https://bugzilla.suse.com/1118754" source="BUGZILLA"/>
		<reference ref_id="1120041" ref_url="https://bugzilla.suse.com/1120041" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2018-3143" ref_url="https://www.suse.com/security/cve/CVE-2018-3143/" source="CVE"/>
		<reference ref_id="CVE-2018-3156" ref_url="https://www.suse.com/security/cve/CVE-2018-3156/" source="CVE"/>
		<reference ref_id="CVE-2018-3162" ref_url="https://www.suse.com/security/cve/CVE-2018-3162/" source="CVE"/>
		<reference ref_id="CVE-2018-3173" ref_url="https://www.suse.com/security/cve/CVE-2018-3173/" source="CVE"/>
		<reference ref_id="CVE-2018-3174" ref_url="https://www.suse.com/security/cve/CVE-2018-3174/" source="CVE"/>
		<reference ref_id="CVE-2018-3185" ref_url="https://www.suse.com/security/cve/CVE-2018-3185/" source="CVE"/>
		<reference ref_id="CVE-2018-3200" ref_url="https://www.suse.com/security/cve/CVE-2018-3200/" source="CVE"/>
		<reference ref_id="CVE-2018-3251" ref_url="https://www.suse.com/security/cve/CVE-2018-3251/" source="CVE"/>
		<reference ref_id="CVE-2018-3277" ref_url="https://www.suse.com/security/cve/CVE-2018-3277/" source="CVE"/>
		<reference ref_id="CVE-2018-3282" ref_url="https://www.suse.com/security/cve/CVE-2018-3282/" source="CVE"/>
		<reference ref_id="CVE-2018-3284" ref_url="https://www.suse.com/security/cve/CVE-2018-3284/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005041.html" source="SUSE-SU"/>
		<description>
This update for mariadb to version 10.2.19 fixes the following issues: (bsc#1116686)

Security issues fixed:

- CVE-2016-9843: Big-endian out-of-bounds pointer (bsc#1013882)
- CVE-2018-3282, CVE-2018-3174, CVE-2018-3143, CVE-2018-3156, 
  CVE-2018-3251, CVE-2018-3185, CVE-2018-3277, CVE-2018-3162, 
  CVE-2018-3173, CVE-2018-3200, CVE-2018-3284:
            Fixed multiple denial of service vulnerabilities 
  (bsc#1112432, bsc#1112368, bsc#1112421, bsc#1112417, 
   bsc#1112397, bsc#1112391, bsc#1112415, bsc#1112386,
   bsc#1112404, bsc#1112377, bsc#1112384)

Non-security issues fixed:

- Fixed database corruption after renaming a prefix-indexed column (bsc#1120041)
- Remove PerconaFT from the package as it has a AGPL license (bsc#1118754)
- Enable testing for client plugins (bsc#1111859)
- Improve test coverage by keeping debug_key_management.so (bsc#1111858)
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-18"/>
	<updated date="2019-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013882">SUSE bug 1013882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111858">SUSE bug 1111858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111859">SUSE bug 1111859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112368">SUSE bug 1112368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112377">SUSE bug 1112377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112384">SUSE bug 1112384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112386">SUSE bug 1112386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112391">SUSE bug 1112391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112397">SUSE bug 1112397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112404">SUSE bug 1112404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112415">SUSE bug 1112415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112417">SUSE bug 1112417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112421">SUSE bug 1112421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112432">SUSE bug 1112432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118754">SUSE bug 1118754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120041">SUSE bug 1120041</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3143/">CVE-2018-3143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3156/">CVE-2018-3156</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3162/">CVE-2018-3162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3173/">CVE-2018-3173</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3174/">CVE-2018-3174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3185/">CVE-2018-3185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3200/">CVE-2018-3200</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3251/">CVE-2018-3251</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3277/">CVE-2018-3277</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3282/">CVE-2018-3282</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3284/">CVE-2018-3284</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521826" comment="mariadb-10.2.21-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521827" comment="mariadb-client-10.2.21-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521828" comment="mariadb-errormessages-10.2.21-3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78705" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1085790" ref_url="https://bugzilla.suse.com/1085790" source="BUGZILLA"/>
		<reference ref_id="1132045" ref_url="https://bugzilla.suse.com/1132045" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10989" ref_url="https://www.suse.com/security/cve/CVE-2017-10989/" source="CVE"/>
		<reference ref_id="CVE-2018-8740" ref_url="https://www.suse.com/security/cve/CVE-2018-8740/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005442.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

Security issue fixed:

- CVE-2018-8740: Fixed a NULL pointer dereference related to corrupted databases schemas (bsc#1085790).
- CVE-2017-10989: Fixed a heap-based buffer over-read in getNodeSize() (bsc#1132045).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-10"/>
	<updated date="2019-05-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085790">SUSE bug 1085790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132045">SUSE bug 1132045</bugzilla>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10989/">CVE-2017-10989</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8740/">CVE-2018-8740</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521147" comment="libsqlite3-0-3.8.10.2-9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521148" comment="libsqlite3-0-32bit-3.8.10.2-9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521149" comment="sqlite3-3.8.10.2-9.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78706" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1132728" ref_url="https://bugzilla.suse.com/1132728" source="BUGZILLA"/>
		<reference ref_id="1132729" ref_url="https://bugzilla.suse.com/1132729" source="BUGZILLA"/>
		<reference ref_id="1132732" ref_url="https://bugzilla.suse.com/1132732" source="BUGZILLA"/>
		<reference ref_id="1133135" ref_url="https://bugzilla.suse.com/1133135" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="CVE-2019-2426" ref_url="https://www.suse.com/security/cve/CVE-2019-2426/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005446.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version 8u212 fixes the following issues:

Security issues fixed:

- CVE-2019-2602: Better String parsing (bsc#1132728).
- CVE-2019-2684: More dynamic RMI interactions (bsc#1132732).
- CVE-2019-2698: Fuzzing TrueType fonts - setCurrGlyphID() (bsc#1132729).
- CVE-2019-2422: Better FileChannel (bsc#1122293).
- CVE-2018-11212: Improve JPEG (bsc#1122299).

Non-Security issue fixed:

- Disable LTO (bsc#1133135).
- Added Japanese new era name.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-13"/>
	<updated date="2019-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133135">SUSE bug 1133135</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2426/">CVE-2019-2426</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521150" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521151" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78707" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1132160" ref_url="https://bugzilla.suse.com/1132160" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005448.html" source="SUSE-SU"/>
		<description>
This update for libxslt fixes the following issues:

- CVE-2019-11068: Fixed a protection mechanism bypass where callers of 
  xsltCheckRead() and xsltCheckWrite() would permit access upon receiving an
  error (bsc#1132160).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-14"/>
	<updated date="2019-05-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1132160">SUSE bug 1132160</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521152" comment="libxslt-tools-1.1.28-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521153" comment="libxslt1-1.1.28-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521154" comment="libxslt1-32bit-1.1.28-17.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78708" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005459.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the CPU Microcode adjustments for the software mitigations.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Release notes:

- Processor             Identifier     Version       Products
- Model        Stepping F-MO-S/PI      Old-&gt;New
- ---- new platforms ----------------------------------------
- CLX-SP       B1       6-55-7/bf           05000021 Xeon Scalable Gen2
- ---- updated platforms ------------------------------------
- SNB          D2/G1/Q0 6-2a-7/12 0000002e-&gt;0000002f Core Gen2
- IVB          E1/L1    6-3a-9/12 00000020-&gt;00000021 Core Gen3
- HSW          C0       6-3c-3/32 00000025-&gt;00000027 Core Gen4
- BDW-U/Y      E0/F0    6-3d-4/c0 0000002b-&gt;0000002d Core Gen5
- IVB-E/EP     C1/M1/S1 6-3e-4/ed 0000042e-&gt;0000042f Core Gen3 X Series; Xeon E5 v2
- IVB-EX       D1       6-3e-7/ed 00000714-&gt;00000715 Xeon E7 v2
- HSX-E/EP     Cx/M1    6-3f-2/6f 00000041-&gt;00000043 Core Gen4 X series; Xeon E5 v3
- HSX-EX       E0       6-3f-4/80 00000013-&gt;00000014 Xeon E7 v3
- HSW-U        C0/D0    6-45-1/72 00000024-&gt;00000025 Core Gen4
- HSW-H        C0       6-46-1/32 0000001a-&gt;0000001b Core Gen4
- BDW-H/E3     E0/G0    6-47-1/22 0000001e-&gt;00000020 Core Gen5
- SKL-U/Y      D0/K1    6-4e-3/c0 000000c6-&gt;000000cc Core Gen6      
- SKX-SP       H0/M0/U0 6-55-4/b7 0200005a-&gt;0000005e Xeon Scalable
- SKX-D        M1       6-55-4/b7 0200005a-&gt;0000005e Xeon D-21xx
- BDX-DE       V1       6-56-2/10 00000019-&gt;0000001a Xeon D-1520/40
- BDX-DE       V2/3     6-56-3/10 07000016-&gt;07000017 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
- BDX-DE       Y0       6-56-4/10 0f000014-&gt;0f000015 Xeon D-1557/59/67/71/77/81/87
- BDX-NS       A0       6-56-5/10 0e00000c-&gt;0e00000d Xeon D-1513N/23/33/43/53
- APL          D0       6-5c-9/03 00000036-&gt;00000038 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
- SKL-H/S      R0/N0    6-5e-3/36 000000c6-&gt;000000cc Core Gen6; Xeon E3 v5
- DNV          B0       6-5f-1/01 00000024-&gt;0000002e Atom Processor C Series
- GLK          B0       6-7a-1/01 0000002c-&gt;0000002e Pentium Silver N/J5xxx, Celeron N/J4xxx
- AML-Y22      H0       6-8e-9/10 0000009e-&gt;000000b4 Core Gen8 Mobile
- KBL-U/Y      H0       6-8e-9/c0 0000009a-&gt;000000b4 Core Gen7 Mobile
- CFL-U43e     D0       6-8e-a/c0 0000009e-&gt;000000b4 Core Gen8 Mobile
- WHL-U        W0       6-8e-b/d0 000000a4-&gt;000000b8 Core Gen8 Mobile
- WHL-U        V0       6-8e-d/94 000000b2-&gt;000000b8 Core Gen8 Mobile
- KBL-G/H/S/E3 B0       6-9e-9/2a 0000009a-&gt;000000b4 Core Gen7; Xeon E3 v6
- CFL-H/S/E3   U0       6-9e-a/22 000000aa-&gt;000000b4 Core Gen8 Desktop, Mobile, Xeon E
- CFL-S        B0       6-9e-b/02 000000aa-&gt;000000b4 Core Gen8
- CFL-H/S      P0       6-9e-c/22 000000a2-&gt;000000ae Core Gen9
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-14"/>
	<updated date="2019-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521155" comment="ucode-intel-20190507-13.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78709" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1125721" ref_url="https://bugzilla.suse.com/1125721" source="BUGZILLA"/>
		<reference ref_id="1126455" ref_url="https://bugzilla.suse.com/1126455" source="BUGZILLA"/>
		<reference ref_id="1129622" ref_url="https://bugzilla.suse.com/1129622" source="BUGZILLA"/>
		<reference ref_id="1129962" ref_url="https://bugzilla.suse.com/1129962" source="BUGZILLA"/>
		<reference ref_id="1130675" ref_url="https://bugzilla.suse.com/1130675" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-3812" ref_url="https://www.suse.com/security/cve/CVE-2019-3812/" source="CVE"/>
		<reference ref_id="CVE-2019-8934" ref_url="https://www.suse.com/security/cve/CVE-2019-8934/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005453.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- CVE-2019-9824: Fixed an information leak in slirp (bsc#1129622)
- CVE-2019-8934: Added method to specify whether or not to expose certain ppc64 host
  information, which can be considered a security issue (bsc#1126455)
- CVE-2019-3812: Fixed OOB memory access and information leak in virtual monitor interface (bsc#1125721)
- CVE-2018-20815: Fix DOS possibility in device tree processing (bsc#1130675)
- Adjust fix for CVE-2019-8934 (bsc#1126455) to match the latest
  upstream adjustments for the same. Basically now the security fix
  is to provide a dummy host-model and host-serial value, which
  overrides getting that value from the host
- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091: Added x86 cpu feature 'md-clear' (bsc#1111331)

Other bugs fixed:

- Use a new approach to handling the file input to -smbios option,
  which accepts either legacy or per-spec formats regardless of the
  machine type.
- Drop the 'ampersand 0x25 shift altgr' line in pt-br keymap file (bsc#1129962)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-14"/>
	<updated date="2019-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125721">SUSE bug 1125721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126455">SUSE bug 1126455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129622">SUSE bug 1129622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129962">SUSE bug 1129962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130675">SUSE bug 1130675</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3812/">CVE-2019-3812</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8934/">CVE-2019-8934</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521829" comment="qemu-2.11.2-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521830" comment="qemu-block-curl-2.11.2-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521831" comment="qemu-ipxe-1.0.0+-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521832" comment="qemu-kvm-2.11.2-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521833" comment="qemu-seabios-1.11.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521834" comment="qemu-sgabios-8-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521835" comment="qemu-tools-2.11.2-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521836" comment="qemu-vgabios-1.11.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521837" comment="qemu-x86-2.11.2-5.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78710" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1050549" ref_url="https://bugzilla.suse.com/1050549" source="BUGZILLA"/>
		<reference ref_id="1051510" ref_url="https://bugzilla.suse.com/1051510" source="BUGZILLA"/>
		<reference ref_id="1052904" ref_url="https://bugzilla.suse.com/1052904" source="BUGZILLA"/>
		<reference ref_id="1053043" ref_url="https://bugzilla.suse.com/1053043" source="BUGZILLA"/>
		<reference ref_id="1055117" ref_url="https://bugzilla.suse.com/1055117" source="BUGZILLA"/>
		<reference ref_id="1055121" ref_url="https://bugzilla.suse.com/1055121" source="BUGZILLA"/>
		<reference ref_id="1055186" ref_url="https://bugzilla.suse.com/1055186" source="BUGZILLA"/>
		<reference ref_id="1061840" ref_url="https://bugzilla.suse.com/1061840" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1070872" ref_url="https://bugzilla.suse.com/1070872" source="BUGZILLA"/>
		<reference ref_id="1082555" ref_url="https://bugzilla.suse.com/1082555" source="BUGZILLA"/>
		<reference ref_id="1083647" ref_url="https://bugzilla.suse.com/1083647" source="BUGZILLA"/>
		<reference ref_id="1085535" ref_url="https://bugzilla.suse.com/1085535" source="BUGZILLA"/>
		<reference ref_id="1085536" ref_url="https://bugzilla.suse.com/1085536" source="BUGZILLA"/>
		<reference ref_id="1088804" ref_url="https://bugzilla.suse.com/1088804" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1097583" ref_url="https://bugzilla.suse.com/1097583" source="BUGZILLA"/>
		<reference ref_id="1097584" ref_url="https://bugzilla.suse.com/1097584" source="BUGZILLA"/>
		<reference ref_id="1097585" ref_url="https://bugzilla.suse.com/1097585" source="BUGZILLA"/>
		<reference ref_id="1097586" ref_url="https://bugzilla.suse.com/1097586" source="BUGZILLA"/>
		<reference ref_id="1097587" ref_url="https://bugzilla.suse.com/1097587" source="BUGZILLA"/>
		<reference ref_id="1097588" ref_url="https://bugzilla.suse.com/1097588" source="BUGZILLA"/>
		<reference ref_id="1100132" ref_url="https://bugzilla.suse.com/1100132" source="BUGZILLA"/>
		<reference ref_id="1103186" ref_url="https://bugzilla.suse.com/1103186" source="BUGZILLA"/>
		<reference ref_id="1103259" ref_url="https://bugzilla.suse.com/1103259" source="BUGZILLA"/>
		<reference ref_id="1108193" ref_url="https://bugzilla.suse.com/1108193" source="BUGZILLA"/>
		<reference ref_id="1108937" ref_url="https://bugzilla.suse.com/1108937" source="BUGZILLA"/>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1112128" ref_url="https://bugzilla.suse.com/1112128" source="BUGZILLA"/>
		<reference ref_id="1112178" ref_url="https://bugzilla.suse.com/1112178" source="BUGZILLA"/>
		<reference ref_id="1113399" ref_url="https://bugzilla.suse.com/1113399" source="BUGZILLA"/>
		<reference ref_id="1113722" ref_url="https://bugzilla.suse.com/1113722" source="BUGZILLA"/>
		<reference ref_id="1114279" ref_url="https://bugzilla.suse.com/1114279" source="BUGZILLA"/>
		<reference ref_id="1114542" ref_url="https://bugzilla.suse.com/1114542" source="BUGZILLA"/>
		<reference ref_id="1114638" ref_url="https://bugzilla.suse.com/1114638" source="BUGZILLA"/>
		<reference ref_id="1119086" ref_url="https://bugzilla.suse.com/1119086" source="BUGZILLA"/>
		<reference ref_id="1119680" ref_url="https://bugzilla.suse.com/1119680" source="BUGZILLA"/>
		<reference ref_id="1120318" ref_url="https://bugzilla.suse.com/1120318" source="BUGZILLA"/>
		<reference ref_id="1120902" ref_url="https://bugzilla.suse.com/1120902" source="BUGZILLA"/>
		<reference ref_id="1122767" ref_url="https://bugzilla.suse.com/1122767" source="BUGZILLA"/>
		<reference ref_id="1123105" ref_url="https://bugzilla.suse.com/1123105" source="BUGZILLA"/>
		<reference ref_id="1125342" ref_url="https://bugzilla.suse.com/1125342" source="BUGZILLA"/>
		<reference ref_id="1126221" ref_url="https://bugzilla.suse.com/1126221" source="BUGZILLA"/>
		<reference ref_id="1126356" ref_url="https://bugzilla.suse.com/1126356" source="BUGZILLA"/>
		<reference ref_id="1126704" ref_url="https://bugzilla.suse.com/1126704" source="BUGZILLA"/>
		<reference ref_id="1126740" ref_url="https://bugzilla.suse.com/1126740" source="BUGZILLA"/>
		<reference ref_id="1127175" ref_url="https://bugzilla.suse.com/1127175" source="BUGZILLA"/>
		<reference ref_id="1127371" ref_url="https://bugzilla.suse.com/1127371" source="BUGZILLA"/>
		<reference ref_id="1127372" ref_url="https://bugzilla.suse.com/1127372" source="BUGZILLA"/>
		<reference ref_id="1127374" ref_url="https://bugzilla.suse.com/1127374" source="BUGZILLA"/>
		<reference ref_id="1127378" ref_url="https://bugzilla.suse.com/1127378" source="BUGZILLA"/>
		<reference ref_id="1127445" ref_url="https://bugzilla.suse.com/1127445" source="BUGZILLA"/>
		<reference ref_id="1128415" ref_url="https://bugzilla.suse.com/1128415" source="BUGZILLA"/>
		<reference ref_id="1128544" ref_url="https://bugzilla.suse.com/1128544" source="BUGZILLA"/>
		<reference ref_id="1129273" ref_url="https://bugzilla.suse.com/1129273" source="BUGZILLA"/>
		<reference ref_id="1129276" ref_url="https://bugzilla.suse.com/1129276" source="BUGZILLA"/>
		<reference ref_id="1129770" ref_url="https://bugzilla.suse.com/1129770" source="BUGZILLA"/>
		<reference ref_id="1130130" ref_url="https://bugzilla.suse.com/1130130" source="BUGZILLA"/>
		<reference ref_id="1130154" ref_url="https://bugzilla.suse.com/1130154" source="BUGZILLA"/>
		<reference ref_id="1130195" ref_url="https://bugzilla.suse.com/1130195" source="BUGZILLA"/>
		<reference ref_id="1130335" ref_url="https://bugzilla.suse.com/1130335" source="BUGZILLA"/>
		<reference ref_id="1130336" ref_url="https://bugzilla.suse.com/1130336" source="BUGZILLA"/>
		<reference ref_id="1130337" ref_url="https://bugzilla.suse.com/1130337" source="BUGZILLA"/>
		<reference ref_id="1130338" ref_url="https://bugzilla.suse.com/1130338" source="BUGZILLA"/>
		<reference ref_id="1130425" ref_url="https://bugzilla.suse.com/1130425" source="BUGZILLA"/>
		<reference ref_id="1130427" ref_url="https://bugzilla.suse.com/1130427" source="BUGZILLA"/>
		<reference ref_id="1130518" ref_url="https://bugzilla.suse.com/1130518" source="BUGZILLA"/>
		<reference ref_id="1130527" ref_url="https://bugzilla.suse.com/1130527" source="BUGZILLA"/>
		<reference ref_id="1130567" ref_url="https://bugzilla.suse.com/1130567" source="BUGZILLA"/>
		<reference ref_id="1130579" ref_url="https://bugzilla.suse.com/1130579" source="BUGZILLA"/>
		<reference ref_id="1131062" ref_url="https://bugzilla.suse.com/1131062" source="BUGZILLA"/>
		<reference ref_id="1131107" ref_url="https://bugzilla.suse.com/1131107" source="BUGZILLA"/>
		<reference ref_id="1131167" ref_url="https://bugzilla.suse.com/1131167" source="BUGZILLA"/>
		<reference ref_id="1131168" ref_url="https://bugzilla.suse.com/1131168" source="BUGZILLA"/>
		<reference ref_id="1131169" ref_url="https://bugzilla.suse.com/1131169" source="BUGZILLA"/>
		<reference ref_id="1131170" ref_url="https://bugzilla.suse.com/1131170" source="BUGZILLA"/>
		<reference ref_id="1131171" ref_url="https://bugzilla.suse.com/1131171" source="BUGZILLA"/>
		<reference ref_id="1131172" ref_url="https://bugzilla.suse.com/1131172" source="BUGZILLA"/>
		<reference ref_id="1131173" ref_url="https://bugzilla.suse.com/1131173" source="BUGZILLA"/>
		<reference ref_id="1131174" ref_url="https://bugzilla.suse.com/1131174" source="BUGZILLA"/>
		<reference ref_id="1131175" ref_url="https://bugzilla.suse.com/1131175" source="BUGZILLA"/>
		<reference ref_id="1131176" ref_url="https://bugzilla.suse.com/1131176" source="BUGZILLA"/>
		<reference ref_id="1131177" ref_url="https://bugzilla.suse.com/1131177" source="BUGZILLA"/>
		<reference ref_id="1131178" ref_url="https://bugzilla.suse.com/1131178" source="BUGZILLA"/>
		<reference ref_id="1131179" ref_url="https://bugzilla.suse.com/1131179" source="BUGZILLA"/>
		<reference ref_id="1131180" ref_url="https://bugzilla.suse.com/1131180" source="BUGZILLA"/>
		<reference ref_id="1131290" ref_url="https://bugzilla.suse.com/1131290" source="BUGZILLA"/>
		<reference ref_id="1131326" ref_url="https://bugzilla.suse.com/1131326" source="BUGZILLA"/>
		<reference ref_id="1131335" ref_url="https://bugzilla.suse.com/1131335" source="BUGZILLA"/>
		<reference ref_id="1131336" ref_url="https://bugzilla.suse.com/1131336" source="BUGZILLA"/>
		<reference ref_id="1131416" ref_url="https://bugzilla.suse.com/1131416" source="BUGZILLA"/>
		<reference ref_id="1131427" ref_url="https://bugzilla.suse.com/1131427" source="BUGZILLA"/>
		<reference ref_id="1131442" ref_url="https://bugzilla.suse.com/1131442" source="BUGZILLA"/>
		<reference ref_id="1131467" ref_url="https://bugzilla.suse.com/1131467" source="BUGZILLA"/>
		<reference ref_id="1131574" ref_url="https://bugzilla.suse.com/1131574" source="BUGZILLA"/>
		<reference ref_id="1131587" ref_url="https://bugzilla.suse.com/1131587" source="BUGZILLA"/>
		<reference ref_id="1131659" ref_url="https://bugzilla.suse.com/1131659" source="BUGZILLA"/>
		<reference ref_id="1131673" ref_url="https://bugzilla.suse.com/1131673" source="BUGZILLA"/>
		<reference ref_id="1131847" ref_url="https://bugzilla.suse.com/1131847" source="BUGZILLA"/>
		<reference ref_id="1131848" ref_url="https://bugzilla.suse.com/1131848" source="BUGZILLA"/>
		<reference ref_id="1131851" ref_url="https://bugzilla.suse.com/1131851" source="BUGZILLA"/>
		<reference ref_id="1131900" ref_url="https://bugzilla.suse.com/1131900" source="BUGZILLA"/>
		<reference ref_id="1131934" ref_url="https://bugzilla.suse.com/1131934" source="BUGZILLA"/>
		<reference ref_id="1131935" ref_url="https://bugzilla.suse.com/1131935" source="BUGZILLA"/>
		<reference ref_id="1132083" ref_url="https://bugzilla.suse.com/1132083" source="BUGZILLA"/>
		<reference ref_id="1132219" ref_url="https://bugzilla.suse.com/1132219" source="BUGZILLA"/>
		<reference ref_id="1132226" ref_url="https://bugzilla.suse.com/1132226" source="BUGZILLA"/>
		<reference ref_id="1132227" ref_url="https://bugzilla.suse.com/1132227" source="BUGZILLA"/>
		<reference ref_id="1132365" ref_url="https://bugzilla.suse.com/1132365" source="BUGZILLA"/>
		<reference ref_id="1132368" ref_url="https://bugzilla.suse.com/1132368" source="BUGZILLA"/>
		<reference ref_id="1132369" ref_url="https://bugzilla.suse.com/1132369" source="BUGZILLA"/>
		<reference ref_id="1132370" ref_url="https://bugzilla.suse.com/1132370" source="BUGZILLA"/>
		<reference ref_id="1132372" ref_url="https://bugzilla.suse.com/1132372" source="BUGZILLA"/>
		<reference ref_id="1132373" ref_url="https://bugzilla.suse.com/1132373" source="BUGZILLA"/>
		<reference ref_id="1132384" ref_url="https://bugzilla.suse.com/1132384" source="BUGZILLA"/>
		<reference ref_id="1132397" ref_url="https://bugzilla.suse.com/1132397" source="BUGZILLA"/>
		<reference ref_id="1132402" ref_url="https://bugzilla.suse.com/1132402" source="BUGZILLA"/>
		<reference ref_id="1132403" ref_url="https://bugzilla.suse.com/1132403" source="BUGZILLA"/>
		<reference ref_id="1132404" ref_url="https://bugzilla.suse.com/1132404" source="BUGZILLA"/>
		<reference ref_id="1132405" ref_url="https://bugzilla.suse.com/1132405" source="BUGZILLA"/>
		<reference ref_id="1132407" ref_url="https://bugzilla.suse.com/1132407" source="BUGZILLA"/>
		<reference ref_id="1132411" ref_url="https://bugzilla.suse.com/1132411" source="BUGZILLA"/>
		<reference ref_id="1132412" ref_url="https://bugzilla.suse.com/1132412" source="BUGZILLA"/>
		<reference ref_id="1132413" ref_url="https://bugzilla.suse.com/1132413" source="BUGZILLA"/>
		<reference ref_id="1132414" ref_url="https://bugzilla.suse.com/1132414" source="BUGZILLA"/>
		<reference ref_id="1132426" ref_url="https://bugzilla.suse.com/1132426" source="BUGZILLA"/>
		<reference ref_id="1132527" ref_url="https://bugzilla.suse.com/1132527" source="BUGZILLA"/>
		<reference ref_id="1132531" ref_url="https://bugzilla.suse.com/1132531" source="BUGZILLA"/>
		<reference ref_id="1132555" ref_url="https://bugzilla.suse.com/1132555" source="BUGZILLA"/>
		<reference ref_id="1132558" ref_url="https://bugzilla.suse.com/1132558" source="BUGZILLA"/>
		<reference ref_id="1132561" ref_url="https://bugzilla.suse.com/1132561" source="BUGZILLA"/>
		<reference ref_id="1132562" ref_url="https://bugzilla.suse.com/1132562" source="BUGZILLA"/>
		<reference ref_id="1132563" ref_url="https://bugzilla.suse.com/1132563" source="BUGZILLA"/>
		<reference ref_id="1132564" ref_url="https://bugzilla.suse.com/1132564" source="BUGZILLA"/>
		<reference ref_id="1132570" ref_url="https://bugzilla.suse.com/1132570" source="BUGZILLA"/>
		<reference ref_id="1132571" ref_url="https://bugzilla.suse.com/1132571" source="BUGZILLA"/>
		<reference ref_id="1132572" ref_url="https://bugzilla.suse.com/1132572" source="BUGZILLA"/>
		<reference ref_id="1132589" ref_url="https://bugzilla.suse.com/1132589" source="BUGZILLA"/>
		<reference ref_id="1132618" ref_url="https://bugzilla.suse.com/1132618" source="BUGZILLA"/>
		<reference ref_id="1132681" ref_url="https://bugzilla.suse.com/1132681" source="BUGZILLA"/>
		<reference ref_id="1132726" ref_url="https://bugzilla.suse.com/1132726" source="BUGZILLA"/>
		<reference ref_id="1132828" ref_url="https://bugzilla.suse.com/1132828" source="BUGZILLA"/>
		<reference ref_id="1132943" ref_url="https://bugzilla.suse.com/1132943" source="BUGZILLA"/>
		<reference ref_id="1133005" ref_url="https://bugzilla.suse.com/1133005" source="BUGZILLA"/>
		<reference ref_id="1133094" ref_url="https://bugzilla.suse.com/1133094" source="BUGZILLA"/>
		<reference ref_id="1133095" ref_url="https://bugzilla.suse.com/1133095" source="BUGZILLA"/>
		<reference ref_id="1133115" ref_url="https://bugzilla.suse.com/1133115" source="BUGZILLA"/>
		<reference ref_id="1133149" ref_url="https://bugzilla.suse.com/1133149" source="BUGZILLA"/>
		<reference ref_id="1133486" ref_url="https://bugzilla.suse.com/1133486" source="BUGZILLA"/>
		<reference ref_id="1133529" ref_url="https://bugzilla.suse.com/1133529" source="BUGZILLA"/>
		<reference ref_id="1133584" ref_url="https://bugzilla.suse.com/1133584" source="BUGZILLA"/>
		<reference ref_id="1133667" ref_url="https://bugzilla.suse.com/1133667" source="BUGZILLA"/>
		<reference ref_id="1133668" ref_url="https://bugzilla.suse.com/1133668" source="BUGZILLA"/>
		<reference ref_id="1133672" ref_url="https://bugzilla.suse.com/1133672" source="BUGZILLA"/>
		<reference ref_id="1133674" ref_url="https://bugzilla.suse.com/1133674" source="BUGZILLA"/>
		<reference ref_id="1133675" ref_url="https://bugzilla.suse.com/1133675" source="BUGZILLA"/>
		<reference ref_id="1133698" ref_url="https://bugzilla.suse.com/1133698" source="BUGZILLA"/>
		<reference ref_id="1133702" ref_url="https://bugzilla.suse.com/1133702" source="BUGZILLA"/>
		<reference ref_id="1133731" ref_url="https://bugzilla.suse.com/1133731" source="BUGZILLA"/>
		<reference ref_id="1133769" ref_url="https://bugzilla.suse.com/1133769" source="BUGZILLA"/>
		<reference ref_id="1133772" ref_url="https://bugzilla.suse.com/1133772" source="BUGZILLA"/>
		<reference ref_id="1133774" ref_url="https://bugzilla.suse.com/1133774" source="BUGZILLA"/>
		<reference ref_id="1133778" ref_url="https://bugzilla.suse.com/1133778" source="BUGZILLA"/>
		<reference ref_id="1133779" ref_url="https://bugzilla.suse.com/1133779" source="BUGZILLA"/>
		<reference ref_id="1133780" ref_url="https://bugzilla.suse.com/1133780" source="BUGZILLA"/>
		<reference ref_id="1133825" ref_url="https://bugzilla.suse.com/1133825" source="BUGZILLA"/>
		<reference ref_id="1133850" ref_url="https://bugzilla.suse.com/1133850" source="BUGZILLA"/>
		<reference ref_id="1133851" ref_url="https://bugzilla.suse.com/1133851" source="BUGZILLA"/>
		<reference ref_id="1133852" ref_url="https://bugzilla.suse.com/1133852" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-16880" ref_url="https://www.suse.com/security/cve/CVE-2018-16880/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-3882" ref_url="https://www.suse.com/security/cve/CVE-2019-3882/" source="CVE"/>
		<reference ref_id="CVE-2019-9003" ref_url="https://www.suse.com/security/cve/CVE-2019-9003/" source="CVE"/>
		<reference ref_id="CVE-2019-9500" ref_url="https://www.suse.com/security/cve/CVE-2019-9500/" source="CVE"/>
		<reference ref_id="CVE-2019-9503" ref_url="https://www.suse.com/security/cve/CVE-2019-9503/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

This kernel update contains software mitigations for these issues, which also utilize CPU microcode updates shipped in parallel.


For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

The following security bugs were fixed:

- CVE-2018-16880: A flaw was found in the handle_rx() function in the vhost_net driver. A malicious virtual guest, under specific conditions, could trigger an out-of-bounds write in a kmalloc-8 slab on a virtual host which may lead to a kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out. (bnc#1122767).
- CVE-2019-3882: A flaw was found in the vfio interface implementation that permitted violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). (bnc#1131416 bnc#1131427).
- CVE-2019-9003: Attackers could trigger a drivers/char/ipmi/ipmi_msghandler.c use-after-free and OOPS by arranging for certain simultaneous execution of the code, as demonstrated by a 'service ipmievd restart' loop (bnc#1126704).
- CVE-2019-9500: A brcmfmac heap buffer overflow in brcmf_wowl_nd_results was fixed. (bnc#1132681).
- CVE-2019-9503: A brcmfmac frame validation bypass was fixed. (bnc#1132828).

The following non-security bugs were fixed:

- 9p: do not trust pdu content for stat item size (bsc#1051510).
- ACPI: acpi_pad: Do not launch acpi_pad threads on idle cpus (bsc#1113399).
- acpi, nfit: Prefer _DSM over _LSR for namespace label reads (bsc#1112128) (bsc#1132426).
- ACPI / SBS: Fix GPE storm on recent MacBookPro's (bsc#1051510).
- alsa: core: Fix card races between register and disconnect (bsc#1051510).
- alsa: echoaudio: add a check for ioremap_nocache (bsc#1051510).
- alsa: firewire: add const qualifier to identifiers for read-only symbols (bsc#1051510).
- alsa: firewire-motu: add a flag for AES/EBU on XLR interface (bsc#1051510).
- alsa: firewire-motu: add specification flag for position of flag for MIDI messages (bsc#1051510).
- alsa: firewire-motu: add support for MOTU Audio Express (bsc#1051510).
- alsa: firewire-motu: add support for Motu Traveler (bsc#1051510).
- alsa: firewire-motu: use 'version' field of unit directory to identify model (bsc#1051510).
- alsa: hda - add Lenovo IdeaCentre B550 to the power_save_blacklist (bsc#1051510).
- alsa: hda - Add two more machines to the power_save_blacklist (bsc#1051510).
- alsa: hda - Enforces runtime_resume after S3 and S4 for each codec (bsc#1051510).
- alsa: hda: Initialize power_state field properly (bsc#1051510).
- alsa: hda/realtek - Add new Dell platform for headset mode (bsc#1051510).
- alsa: hda/realtek - Add quirk for Tuxedo XC 1509 (bsc#1131442).
- alsa: hda/realtek - Add support for Acer Aspire E5-523G/ES1-432 headset mic (bsc#1051510).
- alsa: hda/realtek - Add support headset mode for DELL WYSE AIO (bsc#1051510).
- alsa: hda/realtek - Add support headset mode for New DELL WYSE NB (bsc#1051510).
- alsa: hda/realtek - add two more pin configuration sets to quirk table (bsc#1051510).
- alsa: hda/realtek - Apply the fixup for ASUS Q325UAR (bsc#1051510).
- alsa: hda/realtek: Enable ASUS X441MB and X705FD headset MIC with ALC256 (bsc#1051510).
- alsa: hda/realtek: Enable headset MIC of Acer AIO with ALC286 (bsc#1051510).
- alsa: hda/realtek: Enable headset MIC of Acer Aspire Z24-890 with ALC286 (bsc#1051510).
- alsa: hda/realtek: Enable headset mic of ASUS P5440FF with ALC256 (bsc#1051510).
- alsa: hda/realtek - Fixed Dell AIO speaker noise (bsc#1051510).
- alsa: hda - Record the current power state before suspend/resume calls (bsc#1051510).
- alsa: info: Fix racy addition/deletion of nodes (bsc#1051510).
- alsa: line6: use dynamic buffers (bsc#1051510).
- alsa: opl3: fix mismatch between snd_opl3_drum_switch definition and declaration (bsc#1051510).
- alsa: PCM: check if ops are defined before suspending PCM (bsc#1051510).
- alsa: pcm: Do not suspend stream in unrecoverable PCM state (bsc#1051510).
- alsa: pcm: Fix possible OOB access in PCM oss plugins (bsc#1051510).
- alsa: rawmidi: Fix potential Spectre v1 vulnerability (bsc#1051510).
- alsa: sb8: add a check for request_region (bsc#1051510).
- alsa: seq: Fix OOB-reads from strlcpy (bsc#1051510).
- alsa: seq: oss: Fix Spectre v1 vulnerability (bsc#1051510).
- ASoC: fsl-asoc-card: fix object reference leaks in fsl_asoc_card_probe (bsc#1051510).
- ASoC: fsl_esai: fix channel swap issue when stream starts (bsc#1051510).
- ASoC: topology: free created components in tplg load error (bsc#1051510).
- assume flash part size to be 4MB, if it can't be determined (bsc#1127371).
- ath10k: avoid possible string overflow (bsc#1051510).
- auxdisplay: hd44780: Fix memory leak on -&gt;remove() (bsc#1051510).
- auxdisplay: ht16k33: fix potential user-after-free on module unload (bsc#1051510).
- batman-adv: Reduce claim hash refcnt only for removed entry (bsc#1051510).
- batman-adv: Reduce tt_global hash refcnt only for removed entry (bsc#1051510).
- batman-adv: Reduce tt_local hash refcnt only for removed entry (bsc#1051510).
- bcm2835 MMC issues (bsc#1070872).
- blkcg: Introduce blkg_root_lookup() (bsc#1131673).
- blkcg: Make blkg_root_lookup() work for queues in bypass mode (bsc#1131673).
- blk-mq: adjust debugfs and sysfs register when updating nr_hw_queues (bsc#1131673).
- blk-mq: Avoid that submitting a bio concurrently with device removal triggers a crash (bsc#1131673).
- blk-mq: change gfp flags to GFP_NOIO in blk_mq_realloc_hw_ctxs (bsc#1131673).
- blk-mq: fallback to previous nr_hw_queues when updating fails (bsc#1131673).
- blk-mq: init hctx sched after update ctx and hctx mapping (bsc#1131673).
- blk-mq: realloc hctx when hw queue is mapped to another node (bsc#1131673).
- blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter (bsc#1131673).
- block: Ensure that a request queue is dissociated from the cgroup controller (bsc#1131673).
- block: Fix a race between request queue removal and the block cgroup controller (bsc#1131673).
- block: Introduce blk_exit_queue() (bsc#1131673).
- block: kABI fixes for bio_rewind_iter() removal (bsc#1131673).
- block: remove bio_rewind_iter() (bsc#1131673).
- bluetooth: btusb: request wake pin with NOAUTOEN (bsc#1051510).
- bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt (bsc#1051510).
- bluetooth: Fix decrementing reference count twice in releasing socket (bsc#1051510).
- bluetooth: hci_ldisc: Initialize hci_dev before open() (bsc#1051510).
- bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto() (bsc#1051510).
- bluetooth: hci_uart: Check if socket buffer is ERR_PTR in h4_recv_buf() (bsc#1133731).
- bnxt_en: Drop oversize TX packets to prevent errors (networking-stable-19_03_07).
- bonding: fix PACKET_ORIGDEV regression (git-fixes).
- bpf: fix use after free in bpf_evict_inode (bsc#1083647).
- btrfs: Avoid possible qgroup_rsv_size overflow in btrfs_calculate_inode_block_rsv_size (git-fixes).
- btrfs: check for refs on snapshot delete resume (bsc#1131335).
- btrfs: fix assertion failure on fsync with NO_HOLES enabled (bsc#1131848).
- btrfs: Fix bound checking in qgroup_trace_new_subtree_blocks (git-fixes).
- btrfs: fix deadlock between clone/dedupe and rename (bsc#1130518).
- btrfs: fix incorrect file size after shrinking truncate and fsync (bsc#1130195).
- btrfs: remove WARN_ON in log_dir_items (bsc#1131847).
- btrfs: save drop_progress if we drop refs at all (bsc#1131336).
- cdrom: Fix race condition in cdrom_sysctl_register (bsc#1051510).
- cgroup: fix parsing empty mount option string (bsc#1133094).
- cifs: allow guest mounts to work for smb3.11 (bsc#1051510).
- cifs: Do not count -ENODATA as failure for query directory (bsc#1051510).
- cifs: do not dereference smb_file_target before null check (bsc#1051510).
- cifs: Do not hide EINTR after sending network packets (bsc#1051510).
- cifs: Do not reconnect TCP session in add_credits() (bsc#1051510).
- cifs: Do not reset lease state to NONE on lease break (bsc#1051510).
- cifs: Fix adjustment of credits for MTU requests (bsc#1051510).
- cifs: Fix credit calculation for encrypted reads with errors (bsc#1051510).
- cifs: Fix credits calculations for reads with errors (bsc#1051510).
- cifs: fix POSIX lock leak and invalid ptr deref (bsc#1114542).
- cifs: Fix possible hang during async MTU reads and writes (bsc#1051510).
- cifs: Fix potential OOB access of lock element array (bsc#1051510).
- cifs: Fix read after write for files with read caching (bsc#1051510).
- clk: clk-twl6040: Fix imprecise external abort for pdmclk (bsc#1051510).
- clk: fractional-divider: check parent rate only if flag is set (bsc#1051510).
- clk: ingenic: Fix doc of ingenic_cgu_div_info (bsc#1051510).
- clk: ingenic: Fix round_rate misbehaving with non-integer dividers (bsc#1051510).
- clk: rockchip: fix frac settings of GPLL clock for rk3328 (bsc#1051510).
- clk: sunxi-ng: v3s: Fix TCON reset de-assert bit (bsc#1051510).
- clk: vc5: Abort clock configuration without upstream clock (bsc#1051510).
- clk: x86: Add system specific quirk to mark clocks as critical (bsc#1051510).
- clocksource/drivers/exynos_mct: Clear timer interrupt when shutdown (bsc#1051510).
- clocksource/drivers/exynos_mct: Move one-shot check from tick clear to ISR (bsc#1051510).
- cpcap-charger: generate events for userspace (bsc#1051510).
- cpufreq: pxa2xx: remove incorrect __init annotation (bsc#1051510).
- cpufreq: tegra124: add missing of_node_put() (bsc#1051510).
- cpupowerutils: bench - Fix cpu online check (bsc#1051510).
- cpu/speculation: Add 'mitigations=' cmdline option (bsc#1112178).
- crypto: caam - add missing put_device() call (bsc#1129770).
- crypto: crypto4xx - properly set IV after de- and encrypt (bsc#1051510).
- crypto: pcbc - remove bogus memcpy()s with src == dest (bsc#1051510).
- crypto: sha256/arm - fix crash bug in Thumb2 build (bsc#1051510).
- crypto: sha512/arm - fix crash bug in Thumb2 build (bsc#1051510).
- crypto: x86/poly1305 - fix overflow during partial reduction (bsc#1051510).
- cxgb4: Add capability to get/set SGE Doorbell Queue Timer Tick (bsc#1127371).
- cxgb4: Added missing break in ndo_udp_tunnel_{add/del} (bsc#1127371).
- cxgb4: Add flag tc_flower_initialized (bsc#1127371).
- cxgb4: Add new T5 PCI device id 0x50ae (bsc#1127371).
- cxgb4: Add new T5 PCI device ids 0x50af and 0x50b0 (bsc#1127371).
- cxgb4: Add new T6 PCI device ids 0x608a (bsc#1127371).
- cxgb4: add per rx-queue counter for packet errors (bsc#1127371).
- cxgb4: Add support for FW_ETH_TX_PKT_VM_WR (bsc#1127371).
- cxgb4: add support to display DCB info (bsc#1127371).
- cxgb4: Add support to read actual provisioned resources (bsc#1127371).
- cxgb4: collect ASIC LA dumps from ULP TX (bsc#1127371).
- cxgb4: collect hardware queue descriptors (bsc#1127371).
- cxgb4: collect number of free PSTRUCT page pointers (bsc#1127371).
- cxgb4: convert flower table to use rhashtable (bsc#1127371).
- cxgb4: cxgb4: use FW_PORT_ACTION_L1_CFG32 for 32 bit capability (bsc#1127371).
- cxgb4/cxgb4vf: Add support for SGE doorbell queue timer (bsc#1127371).
- cxgb4/cxgb4vf: Fix mac_hlist initialization and free (bsc#1127374).
- cxgb4/cxgb4vf: Link management changes (bsc#1127371).
- cxgb4/cxgb4vf: Program hash region for {t4/t4vf}_change_mac() (bsc#1127371).
- cxgb4: display number of rx and tx pages free (bsc#1127371).
- cxgb4: do not return DUPLEX_UNKNOWN when link is down (bsc#1127371).
- cxgb4: Export sge_host_page_size to ulds (bsc#1127371).
- cxgb4: fix the error path of cxgb4_uld_register() (bsc#1127371).
- cxgb4: impose mandatory VLAN usage when non-zero TAG ID (bsc#1127371).
- cxgb4: Mask out interrupts that are not enabled (bsc#1127175).
- cxgb4: move Tx/Rx free pages collection to common code (bsc#1127371).
- cxgb4: remove redundant assignment to vlan_cmd.dropnovlan_fm (bsc#1127371).
- cxgb4: Remove SGE_HOST_PAGE_SIZE dependency on page size (bsc#1127371).
- cxgb4: remove the unneeded locks (bsc#1127371).
- cxgb4: specify IQTYPE in fw_iq_cmd (bsc#1127371).
- cxgb4: Support ethtool private flags (bsc#1127371).
- cxgb4: update supported DCB version (bsc#1127371).
- cxgb4: use new fw interface to get the VIN and smt index (bsc#1127371).
- cxgb4vf: Few more link management changes (bsc#1127374).
- cxgb4vf: fix memleak in mac_hlist initialization (bsc#1127374).
- cxgb4vf: Update port information in cxgb4vf_open() (bsc#1127374).
- device_cgroup: fix RCU imbalance in error case (bsc#1051510).
- device property: Fix the length used in PROPERTY_ENTRY_STRING() (bsc#1051510).
- Disable kgdboc failed by echo space to /sys/module/kgdboc/parameters/kgdboc (bsc#1051510).
- dmaengine: imx-dma: fix warning comparison of distinct pointer types (bsc#1051510).
- dmaengine: qcom_hidma: assign channel cookie correctly (bsc#1051510).
- dmaengine: sh: rcar-dmac: With cyclic DMA residue 0 is valid (bsc#1051510).
- dmaengine: tegra: avoid overflow of byte tracking (bsc#1051510).
- dm: disable DISCARD if the underlying storage no longer supports it (bsc#1114638).
- Drivers: hv: vmbus: Offload the handling of channels to two workqueues (bsc#1130567).
- Drivers: hv: vmbus: Reset the channel callback in vmbus_onoffer_rescind() (bsc#1130567).
- drm: Auto-set allow_fb_modifiers when given modifiers at plane init (bsc#1051510).
- drm: bridge: dw-hdmi: Fix overflow workaround for Rockchip SoCs (bsc#1113722)
- drm/dp/mst: Configure no_stop_bit correctly for remote i2c xfers (bsc#1051510).
- drm/i915/bios: assume eDP is present on port A when there is no VBT (bsc#1051510).
- drm/i915/gvt: Add in context mmio 0x20D8 to gen9 mmio list (bsc#1113722)
- drm/i915/gvt: Annotate iomem usage (bsc#1051510).
- drm/i915/gvt: do not deliver a workload if its creation fails (bsc#1051510).
- drm/i915/gvt: do not let pin count of shadow mm go negative (bsc#1113722)
- drm/i915/gvt: Fix MI_FLUSH_DW parsing with correct index check (bsc#1051510).
- drm/i915: Relax mmap VMA check (bsc#1051510).
- drm/imx: ignore plane updates on disabled crtcs (bsc#1051510).
- drm/imx: imx-ldb: add missing of_node_puts (bsc#1051510).
- drm/mediatek: Fix an error code in mtk_hdmi_dt_parse_pdata() (bsc#1113722)
- drm/meson: Fix invalid pointer in meson_drv_unbind() (bsc#1051510).
- drm/meson: Uninstall IRQ handler (bsc#1051510).
- drm/nouveau/debugfs: Fix check of pm_runtime_get_sync failure (bsc#1051510).
- drm/nouveau: Stop using drm_crtc_force_disable (bsc#1051510).
- drm/nouveau/volt/gf117: fix speedo readout register (bsc#1051510).
- drm/rockchip: vop: reset scale mode when win is disabled (bsc#1113722)
- drm/sun4i: Add missing drm_atomic_helper_shutdown at driver unbind (bsc#1113722)
- drm/sun4i: Fix component unbinding and component master deletion (bsc#1113722)
- drm/sun4i: Set device driver data at bind time for use in unbind (bsc#1113722)
- drm/sun4i: Unbind components before releasing DRM and memory (bsc#1113722)
- drm/udl: add a release method and delay modeset teardown (bsc#1085536)
- drm/vc4: Fix memory leak during gpu reset. (bsc#1113722)
- dsa: mv88e6xxx: Ensure all pending interrupts are handled prior to exit (networking-stable-19_02_20).
- e1000e: fix cyclic resets at link up with active tx (bsc#1051510).
- e1000e: Fix -Wformat-truncation warnings (bsc#1051510).
- ext2: Fix underflow in ext2_max_size() (bsc#1131174).
- ext4: add mask of ext4 flags to swap (bsc#1131170).
- ext4: add missing brelse() in add_new_gdb_meta_bg() (bsc#1131176).
- ext4: Avoid panic during forced reboot (bsc#1126356).
- ext4: brelse all indirect buffer in ext4_ind_remove_space() (bsc#1131173).
- ext4: cleanup bh release code in ext4_ind_remove_space() (bsc#1131851).
- ext4: cleanup pagecache before swap i_data (bsc#1131178).
- ext4: fix check of inode in swap_inode_boot_loader (bsc#1131177).
- ext4: fix data corruption caused by unaligned direct AIO (bsc#1131172).
- ext4: fix EXT4_IOC_SWAP_BOOT (bsc#1131180).
- ext4: fix NULL pointer dereference while journal is aborted (bsc#1131171).
- ext4: update quota information while swapping boot loader inode (bsc#1131179).
- fbdev: fbmem: fix memory access if logo is bigger than the screen (bsc#1051510).
- fix cgroup_do_mount() handling of failure exits (bsc#1133095).
- Fix kabi after 'md: batch flush requests.' (bsc#1119680).
- Fix struct page kABI after adding atomic for ppc (bsc#1131326, bsc#1108937).
- fm10k: Fix a potential NULL pointer dereference (bsc#1051510).
- fs: avoid fdput() after failed fdget() in vfs_dedupe_file_range() (bsc#1132384, bsc#1132219).
- fs/dax: deposit pagetable even when installing zero page (bsc#1126740).
- fs/nfs: Fix nfs_parse_devname to not modify it's argument (git-fixes).
- futex: Cure exit race (bsc#1050549).
- futex: Ensure that futex address is aligned in handle_futex_death() (bsc#1050549).
- futex: Handle early deadlock return correctly (bsc#1050549).
- gpio: adnp: Fix testing wrong value in adnp_gpio_direction_input (bsc#1051510).
- gpio: gpio-omap: fix level interrupt idling (bsc#1051510).
- gpio: of: Fix of_gpiochip_add() error path (bsc#1051510).
- gre6: use log_ecn_error module parameter in ip6_tnl_rcv() (git-fixes).
- hid: i2c-hid: Ignore input report if there's no data present on Elan touchpanels (bsc#1133486).
- hid: intel-ish-hid: avoid binding wrong ishtp_cl_device (bsc#1051510).
- hid: intel-ish: ipc: handle PIMR before ish_wakeup also clear PISR busy_clear bit (bsc#1051510).
- hv_netvsc: Fix IP header checksum for coalesced packets (networking-stable-19_03_07).
- hv: reduce storvsc_ringbuffer_size from 1M to 128K to simplify booting with 1k vcpus ().
- hv: reduce storvsc_ringbuffer_size from 1M to 128K to simplify  booting with 1k vcpus (fate#323887).
- hwrng: virtio - Avoid repeated init of completion (bsc#1051510).
- i2c: Make i2c_unregister_device() NULL-aware (bsc#1108193).
- i2c: tegra: fix maximum transfer size (bsc#1051510).
- ibmvnic: Enable GRO (bsc#1132227).
- ibmvnic: Fix completion structure initialization (bsc#1131659).
- ibmvnic: Fix netdev feature clobbering during a reset (bsc#1132227).
- iio: adc: at91: disable adc channel interrupt in timeout case (bsc#1051510).
- iio: adc: fix warning in Qualcomm PM8xxx HK/XOADC driver (bsc#1051510).
- iio: ad_sigma_delta: select channel when reading register (bsc#1051510).
- iio: core: fix a possible circular locking dependency (bsc#1051510).
- iio: cros_ec: Fix the maths for gyro scale calculation (bsc#1051510).
- iio: dac: mcp4725: add missing powerdown bits in store eeprom (bsc#1051510).
- iio: Fix scan mask selection (bsc#1051510).
- iio/gyro/bmg160: Use millidegrees for temperature scale (bsc#1051510).
- iio: gyro: mpu3050: fix chip ID reading (bsc#1051510).
- input: cap11xx - switch to using set_brightness_blocking() (bsc#1051510).
- input: matrix_keypad - use flush_delayed_work() (bsc#1051510).
- input: snvs_pwrkey - initialize necessary driver data before enabling IRQ (bsc#1051510).
- input: st-keyscan - fix potential zalloc NULL dereference (bsc#1051510).
- input: synaptics-rmi4 - write config register values to the right offset (bsc#1051510).
- input: uinput - fix undefined behavior in uinput_validate_absinfo() (bsc#1120902).
- intel_idle: add support for Jacobsville (jsc#SLE-5394).
- io: accel: kxcjk1013: restore the range after resume (bsc#1051510).
- iommu/amd: Fix NULL dereference bug in match_hid_uid (bsc#1130336).
- iommu/amd: fix sg-&gt;dma_address for sg-&gt;offset bigger than PAGE_SIZE (bsc#1130337).
- iommu/amd: Reserve exclusion range in iova-domain (bsc#1130425).
- iommu/amd: Set exclusion range correctly (bsc#1130425).
- iommu: Do not print warning when IOMMU driver only supports unmanaged domains (bsc#1130130).
- iommu/vt-d: Check capability before disabling protected memory (bsc#1130338).
- ip6: fix PMTU discovery when using /127 subnets (git-fixes).
- ip6mr: Do not call __IP6_INC_STATS() from preemptible context (git-fixes).
- ip6_tunnel: fix ip6 tunnel lookup in collect_md mode (git-fixes).
- ipmi: Fix I2C client removal in the SSIF driver (bsc#1108193).
- ipmi_ssif: Remove duplicate NULL check (bsc#1108193).
- ipv4: Return error for RTA_VIA attribute (networking-stable-19_03_07).
- ipv4/route: fail early when inet dev is missing (git-fixes).
- ipv6: Fix dangling pointer when ipv6 fragment (git-fixes).
- ipv6: propagate genlmsg_reply return code (networking-stable-19_02_24).
- ipv6: Return error for RTA_VIA attribute (networking-stable-19_03_07).
- ipv6: sit: reset ip header pointer in ipip6_rcv (git-fixes).
- ipvlan: disallow userns cap_net_admin to change global mode/flags (networking-stable-19_03_15).
- ipvs: remove IPS_NAT_MASK check to fix passive FTP (git-fixes).
- irqchip/gic-v3-its: Avoid parsing _indirect_ twice for Device table (bsc#1051510).
- irqchip/mmp: Only touch the PJ4 IRQ &amp; FIQ bits on enable/disable (bsc#1051510).
- iscsi_ibft: Fix missing break in switch statement (bsc#1051510).
- iw_cxgb4: cq/qp mask depends on bar2 pages in a host page (bsc#1127371).
- iwiwifi: fix bad monitor buffer register addresses (bsc#1129770).
- iwlwifi: fix send hcmd timeout recovery flow (bsc#1129770).
- iwlwifi: mvm: fix firmware statistics usage (bsc#1129770).
- jbd2: clear dirty flag when revoking a buffer from an older transaction (bsc#1131167).
- jbd2: fix compile warning when using JBUFFER_TRACE (bsc#1131168).
- kABI: restore icmp_send (kabi).
- kabi/severities: add cxgb4 and cxgb4vf shared data to the whitelis (bsc#1127372)
- kabi/severities: add libcxgb to cxgb intra module symbols as well
- kabi/severities: exclude cxgb4 inter-module symbols
- kasan: fix shadow_size calculation error in kasan_module_alloc (bsc#1051510).
- kbuild: fix false positive warning/error about missing libelf (bsc#1051510).
- kbuild: modversions: Fix relative CRC byte order interpretation (bsc#1131290).
- kbuild: strip whitespace in cmd_record_mcount findstring (bsc#1065729).
- kcm: switch order of device registration to fix a crash (bnc#1130527).
- kernfs: do not set dentry-&gt;d_fsdata (boo#1133115).
- keys: always initialize keyring_index_key::desc_len (bsc#1051510).
- keys: user: Align the payload buffer (bsc#1051510).
- kvm: Call kvm_arch_memslots_updated() before updating memslots (bsc#1132563).
- kvm: Fix kABI for AMD SMAP Errata workaround (bsc#1133149).
- kvm: nVMX: Apply addr size mask to effective address for VMX instructions (bsc#1132561).
- kvm: nVMX: Ignore limit checks on VMX instructions using flat segments (bsc#1132564).
- kvm: nVMX: Sign extend displacements of VMX instr's mem operands (bsc#1132562).
- kvm: PPC: Book3S HV: Fix race between kvm_unmap_hva_range and MMU mode switch (bsc#1061840).
- kvm: SVM: Workaround errata#1096 (insn_len maybe zero on SMAP violation) (bsc#1133149).
- kvm: VMX: Compare only a single byte for VMCS' 'launched' in vCPU-run (bsc#1132555).
- kvm: x86: Emulate MSR_IA32_ARCH_CAPABILITIES on AMD hosts (bsc#1114279).
- kvm: x86/mmu: Detect MMIO generation wrap in any address space (bsc#1132570).
- kvm: x86/mmu: Do not cache MMIO accesses while memslots are in flux (bsc#1132571).
- kvm: x86: Report STIBP on GET_SUPPORTED_CPUID (bsc#1111331).
- leds: pca9532: fix a potential NULL pointer dereference (bsc#1051510).
- libceph: wait for latest osdmap in ceph_monc_blacklist_add() (bsc#1130427).
- libertas_tf: do not set URB_ZERO_PACKET on IN USB transfer (bsc#1051510).
- lightnvm: if LUNs are already allocated fix return (bsc#1085535).
- locking/atomics, asm-generic: Move some macros from &lt;linux/bitops.h&gt; to a new &lt;linux/bits.h&gt; file (bsc#1111331).
- mac80211: do not call driver wake_tx_queue op during reconfig (bsc#1051510).
- mac80211: Fix Tx aggregation session tear down with ITXQs (bsc#1051510).
- mac80211_hwsim: propagate genlmsg_reply return code (bsc#1051510).
- md: batch flush requests (bsc#1119680).
- md: Fix failed allocation of md_register_thread (git-fixes).
- md/raid1: do not clear bitmap bits on interrupted recovery (git-fixes).
- md/raid5: fix 'out of memory' during raid cache recovery (git-fixes).
- media: mt9m111: set initial frame size other than 0x0 (bsc#1051510).
- media: mtk-jpeg: Correct return type for mem2mem buffer helpers (bsc#1051510).
- media: mx2_emmaprp: Correct return type for mem2mem buffer helpers (bsc#1051510).
- media: rc: mce_kbd decoder: fix stuck keys (bsc#1100132).
- media: s5p-g2d: Correct return type for mem2mem buffer helpers (bsc#1051510).
- media: s5p-jpeg: Correct return type for mem2mem buffer helpers (bsc#1051510).
- media: sh_veu: Correct return type for mem2mem buffer helpers (bsc#1051510).
- media: v4l2-ctrls.c/uvc: zero v4l2_event (bsc#1051510).
- media: vb2: do not call __vb2_queue_cancel if vb2_start_streaming failed (bsc#1119086).
- memremap: fix softlockup reports at teardown (bnc#1130154).
- mISDN: hfcpci: Test both vendor &amp; device ID for Digium HFC4S (bsc#1051510).
- missing barriers in some of unix_sock -&gt;addr and -&gt;path accesses (networking-stable-19_03_15).
- mmc: davinci: remove extraneous __init annotation (bsc#1051510).
- mmc: pxamci: fix enum type confusion (bsc#1051510).
- mmc: sdhci: Fix data command CRC error handling (bsc#1051510).
- mmc: sdhci: Handle auto-command errors (bsc#1051510).
- mmc: sdhci: Rename SDHCI_ACMD12_ERR and SDHCI_INT_ACMD12ERR (bsc#1051510).
- mmc: tmio_mmc_core: do not claim spurious interrupts (bsc#1051510).
- mm/debug.c: fix __dump_page when mapping-&gt;host is not set (bsc#1131934).
- mm: Fix modifying of page protection by insert_pfn() (bsc#1126740).
- mm: Fix warning in insert_pfn() (bsc#1126740).
- mm/huge_memory.c: fix modifying of page protection by insert_pfn_pmd() (bsc#1126740).
- mm/page_isolation.c: fix a wrong flag in set_migratetype_isolate() (bsc#1131935).
- mm/vmalloc: fix size check for remap_vmalloc_range_partial() (bsc#1133825).
- mpls: Return error for RTA_GATEWAY attribute (networking-stable-19_03_07).
- mt7601u: bump supported EEPROM version (bsc#1051510).
- mwifiex: do not advertise IBSS features without FW support (bsc#1129770).
- net: Add header for usage of fls64() (networking-stable-19_02_20).
- net: Add __icmp_send helper (networking-stable-19_03_07).
- net: avoid false positives in untrusted gso validation (git-fixes).
- net: avoid use IPCB in cipso_v4_error (networking-stable-19_03_07).
- net: bridge: add vlan_tunnel to bridge port policies (git-fixes).
- net: bridge: fix per-port af_packet sockets (git-fixes).
- net: bridge: multicast: use rcu to access port list from br_multicast_start_querier (git-fixes).
- net: datagram: fix unbounded loop in __skb_try_recv_datagram() (git-fixes).
- net: Do not allocate page fragments that are not skb aligned (networking-stable-19_02_20).
- net: dsa: mv88e6xxx: Fix u64 statistics (networking-stable-19_03_07).
- net: ena: update driver version from 2.0.2 to 2.0.3 (bsc#1129276 bsc#1125342).
- netfilter: bridge: set skb transport_header before entering NF_INET_PRE_ROUTING (git-fixes).
- netfilter: check for seqadj ext existence before adding it in nf_nat_setup_info (git-fixes).
- netfilter: ip6t_MASQUERADE: add dependency on conntrack module (git-fixes).
- netfilter: ipset: Missing nfnl_lock()/nfnl_unlock() is added to ip_set_net_exit() (git-fixes).
- netfilter: ipv6: fix use-after-free Write in nf_nat_ipv6_manip_pkt (git-fixes).
- netfilter: x_tables: avoid out-of-bounds reads in xt_request_find_{match|target} (git-fixes).
- netfilter: x_tables: fix int overflow in xt_alloc_table_info() (git-fixes).
- net: Fix for_each_netdev_feature on Big endian (networking-stable-19_02_20).
- net: fix IPv6 prefix route residue (networking-stable-19_02_20).
- net: Fix untag for vlan packets without ethernet header (git-fixes).
- net: Fix vlan untag for bridge and vlan_dev with reorder_hdr off (git-fixes).
- net/hsr: Check skb_put_padto() return value (git-fixes).
- net: hsr: fix memory leak in hsr_dev_finalize() (networking-stable-19_03_15).
- net/hsr: fix possible crash in add_timer() (networking-stable-19_03_15).
- netlabel: fix out-of-bounds memory accesses (networking-stable-19_03_07).
- netlink: fix nla_put_{u8,u16,u32} for KASAN (git-fixes).
- net/mlx5e: Do not overwrite pedit action when multiple pedit used (networking-stable-19_02_24).
- net/ncsi: Fix AEN HNCDSC packet length (git-fixes).
- net/ncsi: Stop monitor if channel times out or is inactive (git-fixes).
- net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails (networking-stable-19_03_07).
- net/packet: fix 4gb buffer limit due to overflow check (networking-stable-19_02_24).
- net/packet: Set __GFP_NOWARN upon allocation in alloc_pg_vec (git-fixes).
- net_sched: acquire RTNL in tc_action_net_exit() (git-fixes).
- net_sched: fix two more memory leaks in cls_tcindex (networking-stable-19_02_24).
- net: Set rtm_table to RT_TABLE_COMPAT for ipv6 for tables &gt; 255 (networking-stable-19_03_15).
- net: sit: fix memory leak in sit_init_net() (networking-stable-19_03_07).
- net: sit: fix UBSAN Undefined behaviour in check_6rd (networking-stable-19_03_15).
- net: socket: set sock-&gt;sk to NULL after calling proto_ops::release() (networking-stable-19_03_07).
- net-sysfs: Fix mem leak in netdev_register_kobject (git-fixes).
- net: validate untrusted gso packets without csum offload (networking-stable-19_02_20).
- net/x25: fix a race in x25_bind() (networking-stable-19_03_15).
- net/x25: fix use-after-free in x25_device_event() (networking-stable-19_03_15).
- net/x25: reset state in x25_connect() (networking-stable-19_03_15).
- net: xfrm: use preempt-safe this_cpu_read() in ipcomp_alloc_tfms() (git-fixes).
- nfc: nci: Add some bounds checking in nci_hci_cmd_received() (bsc#1051510).
- nfs: Add missing encode / decode sequence_maxsz to v4.2 operations (git-fixes).
- nfsd4: catch some false session retries (git-fixes).
- nfsd4: fix cached replies to solo SEQUENCE compounds (git-fixes).
- nfsd: fix memory corruption caused by readdir (bsc#1127445).
- nfsd: fix memory corruption caused by readdir (bsc#1127445).
- nfs: Do not recoalesce on error in nfs_pageio_complete_mirror() (git-fixes).
- nfs: Do not use page_file_mapping after removing the page (git-fixes).
- nfs: Fix an I/O request leakage in nfs_do_recoalesce (git-fixes).
- nfs: Fix a soft lockup in the delegation recovery code (git-fixes).
- nfs: Fix a typo in nfs_init_timeout_values() (git-fixes).
- nfs: Fix dentry revalidation on NFSv4 lookup (bsc#1132618).
- nfs: Fix I/O request leakages (git-fixes).
- nfs: fix mount/umount race in nlmclnt (git-fixes).
- nfs/pnfs: Bulk destroy of layouts needs to be safe w.r.t. umount (git-fixes).
- nfsv4.1 do not free interrupted slot on open (git-fixes).
- nfsv4.1: Reinitialise sequence results before retransmitting a request (git-fixes).
- nfsv4/flexfiles: Fix invalid deref in FF_LAYOUT_DEVID_NODE() (git-fixes).
- nvme: add proper discard setup for the multipath device (bsc#1114638).
- nvme: fix the dangerous reference of namespaces list (bsc#1131673).
- nvme: make sure ns head inherits underlying device limits (bsc#1131673).
- nvme-multipath: avoid crash on invalid subsystem cntlid enumeration (bsc#1129273).
- nvme-multipath: split bios with the ns_head bio_set before submitting (bsc#1103259, bsc#1131673).
- nvme: only reconfigure discard if necessary (bsc#1114638).
- nvme: schedule requeue whenever a LIVE state is entered (bsc#1123105).
- ocfs2: fix inode bh swapping mixup in ocfs2_reflink_inodes_lock (bsc#1131169).
- pci: Add function 1 DMA alias quirk for Marvell 9170 SATA controller (bsc#1051510).
- pci: designware-ep: dw_pcie_ep_set_msi() should only set MMC bits (bsc#1051510).
- pci: designware-ep: Read-only registers need DBI_RO_WR_EN to be writable (bsc#1051510).
- pci: pciehp: Convert to threaded IRQ (bsc#1133005).
- pci: pciehp: Ignore Link State Changes after powering off a slot (bsc#1133005).
- phy: sun4i-usb: Support set_mode to USB_HOST for non-OTG PHYs (bsc#1051510).
- pM / wakeup: Rework wakeup source timer cancellation (bsc#1051510).
- powercap: intel_rapl: add support for Jacobsville ().
- powercap: intel_rapl: add support for Jacobsville (FATE#327454).
- powerpc/64: Call setup_barrier_nospec() from setup_arch() (bsc#1131107).
- powerpc/64: Disable the speculation barrier from the command line (bsc#1131107).
- powerpc64/ftrace: Include ftrace.h needed for enable/disable calls (bsc#1088804, git-fixes).
- powerpc/64: Make stf barrier PPC_BOOK3S_64 specific (bsc#1131107).
- powerpc/64s: Add new security feature flags for count cache flush (bsc#1131107).
- powerpc/64s: Add support for software count cache flush (bsc#1131107).
- powerpc/64s: Fix logic when handling unknown CPU features (bsc#1055117).
- powerpc/64s: Fix page table fragment refcount race vs speculative references (bsc#1131326, bsc#1108937).
- powerpc/asm: Add a patch_site macro &amp; helpers for patching instructions (bsc#1131107).
- powerpc: avoid -mno-sched-epilog on GCC 4.9 and newer (bsc#1065729).
- powerpc: consolidate -mno-sched-epilog into FTRACE flags (bsc#1065729).
- powerpc: Fix 32-bit KVM-PR lockup and host crash with MacOS guest (bsc#1061840).
- powerpc/fsl: Fix spectre_v2 mitigations reporting (bsc#1131107).
- powerpc/hugetlb: Handle mmap_min_addr correctly in get_unmapped_area callback (bsc#1131900).
- powerpc/kvm: Save and restore host AMR/IAMR/UAMOR (bsc#1061840).
- powerpc/mm: Add missing tracepoint for tlbie (bsc#1055117, git-fixes).
- powerpc/mm: Check secondary hash page table (bsc#1065729).
- powerpc/mm: Fix page table dump to work on Radix (bsc#1055186,  fate#323286, git-fixes).
- powerpc/mm: Fix page table dump to work on Radix (bsc#1055186, git-fixes).
- powerpc/mm/hash: Handle mmap_min_addr correctly in get_unmapped_area topdown search (bsc#1131900).
- powerpc/mm/radix: Display if mappings are exec or not  (bsc#1055186, fate#323286, git-fixes).
- powerpc/mm/radix: Display if mappings are exec or not (bsc#1055186, git-fixes).
- powerpc/mm/radix: Prettify mapped memory range print out  (bsc#1055186, fate#323286, git-fixes).
- powerpc/mm/radix: Prettify mapped memory range print out (bsc#1055186, git-fixes).
- powerpc/numa: document topology_updates_enabled, disable by default (bsc#1133584).
- powerpc/numa: improve control of topology updates (bsc#1133584).
- powerpc/perf: Fix unit_sel/cache_sel checks (bsc#1053043).
- powerpc/perf: Remove l2 bus events from HW cache event array (bsc#1053043).
- powerpc/powernv/cpuidle: Init all present cpus for deep states (bsc#1055121).
- powerpc/powernv: Do not reprogram SLW image on every KVM guest entry/exit (bsc#1061840).
- powerpc/powernv/ioda2: Remove redundant free of TCE pages (bsc#1061840).
- powerpc/powernv/ioda: Allocate indirect TCE levels of cached userspace addresses on demand (bsc#1061840).
- powerpc/powernv/ioda: Fix locked_vm counting for memory used by IOMMU tables (bsc#1061840).
- powerpc/powernv: Make opal log only readable by root (bsc#1065729).
- powerpc/powernv: Query firmware for count cache flush settings (bsc#1131107).
- powerpc/powernv: Remove never used pnv_power9_force_smt4 (bsc#1061840).
- powerpc/pseries/mce: Fix misleading print for TLB mutlihit (bsc#1094244, git-fixes).
- powerpc/pseries: Query hypervisor for count cache flush settings (bsc#1131107).
- powerpc/security: Fix spectre_v2 reporting (bsc#1131107).
- powerpc/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- powerpc/vdso32: fix CLOCK_MONOTONIC on PPC64 (bsc#1131587).
- powerpc/vdso64: Fix CLOCK_MONOTONIC inconsistencies across Y2038 (bsc#1131587).
- power: supply: charger-manager: Fix incorrect return value (bsc#1051510).
- pwm-backlight: Enable/disable the PWM before/after LCD enable toggle (bsc#1051510).
- qmi_wwan: Add support for Quectel EG12/EM12 (networking-stable-19_03_07).
- qmi_wwan: apply SET_DTR quirk to Sierra WP7607 (bsc#1051510).
- qmi_wwan: Fix qmap header retrieval in qmimux_rx_fixup (bsc#1051510).
- raid10: It's wrong to add len to sector_nr in raid10 reshape twice (git-fixes).
- ras/cec: Check the correct variable in the debugfs error handling (bsc#1085535).
- ravb: Decrease TxFIFO depth of Q3 and Q2 to one (networking-stable-19_03_15).
- rdma/cxgb4: Add support for 64Byte cqes (bsc#1127371).
- rdma/cxgb4: Add support for kernel mode SRQ's (bsc#1127371).
- rdma/cxgb4: Add support for srq functions &amp; structs (bsc#1127371).
- rdma/cxgb4: fix some info leaks (bsc#1127371).
- rdma/cxgb4: Make c4iw_poll_cq_one() easier to analyze (bsc#1127371).
- rdma/cxgb4: Remove a set-but-not-used variable (bsc#1127371).
- rdma/iw_cxgb4: Drop __GFP_NOFAIL (bsc#1127371).
- rds: fix refcount bug in rds_sock_addref (git-fixes).
- rds: tcp: atomically purge entries from rds_tcp_conn_list during netns delete (git-fixes).
- regulator: max77620: Initialize values for DT properties (bsc#1051510).
- regulator: s2mpa01: Fix step values for some LDOs (bsc#1051510).
- Revert drm/i915 patches that caused regressions (bsc#1131062) 
- Revert 'ipv4: keep skb-&gt;dst around in presence of IP options' (git-fixes).
- rhashtable: Still do rehash when we get EEXIST (bsc#1051510).
- ring-buffer: Check if memory is available before allocation (bsc#1132531).
- rpm/config.sh: Fix build project and bugzilla product.
- rtc: 88pm80x: fix unintended sign extension (bsc#1051510).
- rtc: 88pm860x: fix unintended sign extension (bsc#1051510).
- rtc: cmos: ignore bogus century byte (bsc#1051510).
- rtc: ds1672: fix unintended sign extension (bsc#1051510).
- rtc: Fix overflow when converting time64_t to rtc_time (bsc#1051510).
- rtc: pm8xxx: fix unintended sign extension (bsc#1051510).
- rtnetlink: bring NETDEV_CHANGE_TX_QUEUE_LEN event process back in rtnetlink_event (git-fixes).
- rtnetlink: bring NETDEV_CHANGEUPPER event process back in rtnetlink_event (git-fixes).
- rtnetlink: bring NETDEV_POST_TYPE_CHANGE event process back in rtnetlink_event (git-fixes).
- rtnetlink: check DO_SETLINK_NOTIFY correctly in do_setlink (git-fixes).
- rxrpc: Do not release call mutex on error pointer (git-fixes).
- rxrpc: Do not treat call aborts as conn aborts (git-fixes).
- rxrpc: Fix client call queueing, waiting for channel (networking-stable-19_03_15).
- rxrpc: Fix Tx ring annotation after initial Tx failure (git-fixes).
- s390/dasd: fix panic for failed online processing (bsc#1132589).
- s390/pkey: move pckmo subfunction available checks away from module init (bsc#1128544).
- s390/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- scsi: libiscsi: fix possible NULL pointer dereference in case of TMF (bsc#1127378).
- scsi: libsas: allocate sense buffer for bsg queue (bsc#1131467).
- scsi: qla2xxx: Add new FC-NVMe enable BIT to enable FC-NVMe feature (bsc#1130579).
- sctp: call gso_reset_checksum when computing checksum in sctp_gso_segment (networking-stable-19_02_24).
- serial: 8250_of: assume reg-shift of 2 for mrvl,mmp-uart (bsc#1051510).
- serial: fsl_lpuart: fix maximum acceptable baud rate with over-sampling (bsc#1051510).
- serial: imx: Update cached mctrl value when changing RTS (bsc#1051510).
- serial: max310x: Fix to avoid potential NULL pointer dereference (bsc#1051510).
- serial: sh-sci: Fix setting SCSCR_TIE while transferring data (bsc#1051510).
- sit: check if IPv6 enabled before calling ip6_err_gen_icmpv6_unreach() (networking-stable-19_02_24).
- smb3: Fix SMB3.1.1 guest mounts to Samba (bsc#1051510).
- soc: fsl: qbman: avoid race in clearing QMan interrupt (bsc#1051510).
- SoC: imx-sgtl5000: add missing put_device() (bsc#1051510).
- soc: qcom: gsbi: Fix error handling in gsbi_probe() (bsc#1051510).
- soc/tegra: fuse: Fix illegal free of IO base address (bsc#1051510).
- spi: pxa2xx: Setup maximum supported DMA transfer length (bsc#1051510).
- spi: ti-qspi: Fix mmap read when more than one CS in use (bsc#1051510).
- spi/topcliff_pch: Fix potential NULL dereference on allocation error (bsc#1051510).
- staging: comedi: ni_usb6501: Fix possible double-free of -&gt;usb_rx_buf (bsc#1051510).
- staging: comedi: ni_usb6501: Fix use of uninitialized mutex (bsc#1051510).
- staging: comedi: vmk80xx: Fix possible double-free of -&gt;usb_rx_buf (bsc#1051510).
- staging: comedi: vmk80xx: Fix use of uninitialized semaphore (bsc#1051510).
- staging: iio: ad7192: Fix ad7193 channel address (bsc#1051510).
- staging: rtl8712: uninitialized memory in read_bbreg_hdl() (bsc#1051510).
- staging: vt6655: Fix interrupt race condition on device start up (bsc#1051510).
- staging: vt6655: Remove vif check from vnt_interrupt (bsc#1051510).
- sunrpc/cache: handle missing listeners better (bsc#1126221).
- sunrpc: fix 4 more call sites that were using stack memory with a scatterlist (git-fixes).
- supported.conf: Add vxlan to kernel-default-base (bsc#1132083).
- supported.conf: dw_mmc-bluefield is not needed in kernel-default-base (bsc#1131574).
- svm/avic: Fix invalidate logical APIC id entry (bsc#1132726).
- svm: Fix AVIC DFR and LDR handling (bsc#1132558).
- svm: Fix improper check when deactivate AVIC (bsc#1130335).
- sysctl: handle overflow for file-max (bsc#1051510).
- tcp: fix TCP_REPAIR_QUEUE bound checking (git-fixes).
- tcp: tcp_v4_err() should be more careful (networking-stable-19_02_20).
- thermal: bcm2835: Fix crash in bcm2835_thermal_debugfs (bsc#1051510).
- thermal/intel_powerclamp: fix truncated kthread name ().
- thermal/intel_powerclamp: fix truncated kthread name  (FATE#326597).
- tipc: fix race condition causing hung sendto (networking-stable-19_03_07).
- tpm: Fix some name collisions with drivers/char/tpm.h (bsc#1051510).
- tpm: Fix the type of the return value in calc_tpm2_event_size() (bsc#1082555).
- tpm_tis_spi: Pass the SPI IRQ down to the driver (bsc#1051510).
- tpm/tpm_crb: Avoid unaligned reads in crb_recv() (bsc#1051510).
- tracing: Fix a memory leak by early error exit in trace_pid_write() (bsc#1133702).
- tracing: Fix buffer_ref pipe ops (bsc#1133698).
- tracing/hrtimer: Fix tracing bugs by taking all clock bases and modes into account (bsc#1132527).
- tty: atmel_serial: fix a potential NULL pointer dereference (bsc#1051510).
- tun: fix blocking read (networking-stable-19_03_07).
- tun: remove unnecessary memory barrier (networking-stable-19_03_07).
- udf: Fix crash on IO error during truncate (bsc#1131175).
- uio: Reduce return paths from uio_write() (bsc#1051510).
- Update patches.kabi/kabi-cxgb4-MU.patch (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584 bsc#1127371).
- usb: cdc-acm: fix race during wakeup blocking TX traffic (bsc#1129770).
- usb: chipidea: Grab the (legacy) USB PHY by phandle first (bsc#1051510).
- usb: common: Consider only available nodes for dr_mode (bsc#1129770).
- usb: core: only clean up what we allocated (bsc#1051510).
- usb: dwc3: gadget: Fix the uninitialized link_state when udc starts (bsc#1051510).
- usb: dwc3: gadget: synchronize_irq dwc irq in suspend (bsc#1051510).
- usb: f_fs: Avoid crash due to out-of-scope stack ptr access (bsc#1051510).
- usb: gadget: f_hid: fix deadlock in f_hidg_write() (bsc#1129770).
- usb: gadget: Potential NULL dereference on allocation error (bsc#1051510).
- usb: host: xhci-rcar: Add XHCI_TRUST_TX_LENGTH quirk (bsc#1051510).
- usb: mtu3: fix EXTCON dependency (bsc#1051510).
- usb: phy: fix link errors (bsc#1051510).
- usb: phy: twl6030-usb: fix possible use-after-free on remove (bsc#1051510).
- usb: serial: cp210x: add ID for Ingenico 3070 (bsc#1129770).
- usb: serial: cp210x: add new device id (bsc#1051510).
- usb: serial: cp210x: fix GPIO in autosuspend (bsc#1120902).
- usb: serial: ftdi_sio: add additional NovaTech products (bsc#1051510).
- usb: serial: ftdi_sio: add ID for Hjelmslund Electronics USB485 (bsc#1129770).
- usb: serial: mos7720: fix mos_parport refcount imbalance on error path (bsc#1129770).
- usb: serial: option: add Olicard 600 (bsc#1051510).
- usb: serial: option: add support for Quectel EM12 (bsc#1051510).
- usb: serial: option: add Telit ME910 ECM composition (bsc#1129770).
- usb: serial: option: set driver_info for SIM5218 and compatibles (bsc#1129770).
- vfs: allow dedupe of user owned read-only files (bsc#1133778, bsc#1132219).
- vfs: avoid problematic remapping requests into partial EOF block (bsc#1133850, bsc#1132219).
- vfs: dedupe: extract helper for a single dedup (bsc#1133769, bsc#1132219).
- vfs: dedupe should return EPERM if permission is not granted (bsc#1133779, bsc#1132219).
- vfs: exit early from zero length remap operations (bsc#1132411, bsc#1132219).
- vfs: export vfs_dedupe_file_range_one() to modules (bsc#1133772, bsc#1132219).
- vfs: limit size of dedupe (bsc#1132397, bsc#1132219).
- vfs: rename clone_verify_area to remap_verify_area (bsc#1133852, bsc#1132219).
- vfs: skip zero-length dedupe requests (bsc#1133851, bsc#1132219).
- vfs: swap names of {do,vfs}_clone_file_range() (bsc#1133774, bsc#1132219).
- vfs: vfs_clone_file_prep_inodes should return EINVAL for a clone from beyond EOF (bsc#1133780, bsc#1132219).
- video: fbdev: Set pixclock = 0 in goldfishfb (bsc#1051510).
- vxlan: test dev-&gt;flags &amp; IFF_UP before calling netif_rx() (networking-stable-19_02_20).
- wil6210: check null pointer in _wil_cfg80211_merge_extra_ies (bsc#1051510).
- wlcore: Fix memory leak in case wl12xx_fetch_firmware failure (bsc#1051510).
- x86/cpu: Add Atom Tremont (Jacobsville) ().
- x86/cpu: Add Atom Tremont (Jacobsville) (FATE#327454).
- x86/CPU/AMD: Set the CPB bit unconditionally on F17h (bsc#1114279).
- x86/cpu: Sanitize FAM6_ATOM naming (bsc#1111331).
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bsc#1111331).
- x86/kvm/hyper-v: avoid spurious pending stimer on vCPU init (bsc#1132572).
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active (bsc#1111331).
- x86/MCE/AMD, EDAC/mce_amd: Add new error descriptions for some SMCA bank types (bsc#1128415).
- x86/MCE/AMD, EDAC/mce_amd: Add new McaTypes for CS, PSP, and SMU units (bsc#1128415).
- x86/MCE/AMD, EDAC/mce_amd: Add new MP5, NBIO, and PCIE SMCA bank types (bsc#1128415).
- x86/mce/AMD, EDAC/mce_amd: Enumerate Reserved SMCA bank type (bsc#1128415).
- x86/mce/AMD: Pass the bank number to smca_get_bank_type() (bsc#1128415).
- x86/MCE: Fix kABI for new AMD bank names (bsc#1128415).
- x86/mce: Handle varying MCA bank counts (bsc#1128415).
- x86/mce: Improve error message when kernel cannot recover, p2 (bsc#1114279).
- x86/msr-index: Cleanup bit defines (bsc#1111331).
- x86/PCI: Fixup RTIT_BAR of Intel Denverton Trace Hub (bsc#1120318).
- x86/speculation: Consolidate CPU whitelists (bsc#1111331).
- x86/speculation/mds: Add basic bug infrastructure for MDS (bsc#1111331).
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bsc#1111331).
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bsc#1111331).
- x86/speculation/mds: Add mds=full,nosmt cmdline option (bsc#1111331).
- x86/speculation/mds: Add mitigation control for MDS (bsc#1111331).
- x86/speculation/mds: Add mitigation mode VMWERV (bsc#1111331).
- x86/speculation/mds: Add 'mitigations=' support for MDS (bsc#1111331).
- x86/speculation/mds: Add SMT warning message (bsc#1111331).
- x86/speculation/mds: Add sysfs reporting for MDS (bsc#1111331).
- x86/speculation/mds: Clear CPU buffers on exit to user (bsc#1111331).
- x86/speculation/mds: Conditionally clear CPU buffers on idle entry (bsc#1111331).
- x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off (bsc#1111331).
- x86/speculation: Move arch_smt_update() call to after mitigation decisions (bsc#1111331).
- x86/speculation: Prevent deadlock on ssb_state::lock (bsc#1114279).
- x86/speculation: Simplify the CPU bug detection logic (bsc#1111331).
- x86/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- x86/tsc: Force inlining of cyc2ns bits (bsc#1052904).
- x86/uaccess: Do not leak the AC flag into __put_user() value evaluation (bsc#1114279).
- xen-netback: do not populate the hash cache on XenBus disconnect (networking-stable-19_03_07).
- xen-netback: fix occasional leak of grant ref mappings under memory pressure (networking-stable-19_03_07).
- xen: Prevent buffer overflow in privcmd ioctl (bsc#1065600).
- xfrm: do not call rcu_read_unlock when afinfo is NULL in xfrm_get_tos (git-fixes).
- xfrm: Fix ESN sequence number handling for IPsec GSO packets (git-fixes).
- xfrm: fix rcu_read_unlock usage in xfrm_local_error (git-fixes).
- xfs: add the ability to join a held buffer to a defer_ops (bsc#1133674).
- xfs: allow xfs_lock_two_inodes to take different EXCL/SHARED modes (bsc#1132370, bsc#1132219).
- xfs: call xfs_qm_dqattach before performing reflink operations (bsc#1132368, bsc#1132219).
- xfs: cap the length of deduplication requests (bsc#1132373, bsc#1132219).
- xfs: clean up xfs_reflink_remap_blocks call site (bsc#1132413, bsc#1132219).
- xfs: fix data corruption w/ unaligned dedupe ranges (bsc#1132405, bsc#1132219).
- xfs: fix data corruption w/ unaligned reflink ranges (bsc#1132407, bsc#1132219).
- xfs: fix pagecache truncation prior to reflink (bsc#1132412, bsc#1132219).
- xfs: fix reporting supported extra file attributes for statx() (bsc#1133529).
- xfs: flush removing page cache in xfs_reflink_remap_prep (bsc#1132414, bsc#1132219).
- xfs: hold xfs_buf locked between shortform-&gt;leaf conversion and the addition of an attribute (bsc#1133675).
- xfs: only grab shared inode locks for source file during reflink (bsc#1132372, bsc#1132219).
- xfs: refactor clonerange preparation into a separate helper (bsc#1132402, bsc#1132219).
- xfs: refactor xfs_trans_roll (bsc#1133667).
- xfs: reflink find shared should take a transaction (bsc#1132226, bsc#1132219).
- xfs: reflink should break pnfs leases before sharing blocks (bsc#1132369, bsc#1132219).
- xfs: remove dest file's post-eof preallocations before reflinking (bsc#1132365, bsc#1132219).
- xfs: remove the ip argument to xfs_defer_finish (bsc#1133672).
- xfs: rename xfs_defer_join to xfs_defer_ijoin (bsc#1133668).
- xfs: update ctime and remove suid before cloning files (bsc#1132404, bsc#1132219).
- xfs: zero posteof blocks when cloning above eof (bsc#1132403, bsc#1132219).
- xhci: Do not let USB3 ports stuck in polling state prevent suspend (bsc#1051510).
- xhci: Fix port resume done detection for SS ports with LPM enabled (bsc#1051510).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-14"/>
	<updated date="2019-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1050549">SUSE bug 1050549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051510">SUSE bug 1051510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052904">SUSE bug 1052904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053043">SUSE bug 1053043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055117">SUSE bug 1055117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055121">SUSE bug 1055121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055186">SUSE bug 1055186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061840">SUSE bug 1061840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070872">SUSE bug 1070872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082555">SUSE bug 1082555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083647">SUSE bug 1083647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085535">SUSE bug 1085535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085536">SUSE bug 1085536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088804">SUSE bug 1088804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097583">SUSE bug 1097583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097584">SUSE bug 1097584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097585">SUSE bug 1097585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097586">SUSE bug 1097586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097587">SUSE bug 1097587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097588">SUSE bug 1097588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100132">SUSE bug 1100132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103259">SUSE bug 1103259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108193">SUSE bug 1108193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108937">SUSE bug 1108937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112128">SUSE bug 1112128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112178">SUSE bug 1112178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113399">SUSE bug 1113399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113722">SUSE bug 1113722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114279">SUSE bug 1114279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114542">SUSE bug 1114542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114638">SUSE bug 1114638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119086">SUSE bug 1119086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119680">SUSE bug 1119680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120318">SUSE bug 1120318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120902">SUSE bug 1120902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122767">SUSE bug 1122767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123105">SUSE bug 1123105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125342">SUSE bug 1125342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126221">SUSE bug 1126221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126356">SUSE bug 1126356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126704">SUSE bug 1126704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126740">SUSE bug 1126740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127175">SUSE bug 1127175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127371">SUSE bug 1127371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127372">SUSE bug 1127372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127374">SUSE bug 1127374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127378">SUSE bug 1127378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127445">SUSE bug 1127445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128415">SUSE bug 1128415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128544">SUSE bug 1128544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129273">SUSE bug 1129273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129276">SUSE bug 1129276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129770">SUSE bug 1129770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130130">SUSE bug 1130130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130154">SUSE bug 1130154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130195">SUSE bug 1130195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130335">SUSE bug 1130335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130336">SUSE bug 1130336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130337">SUSE bug 1130337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130338">SUSE bug 1130338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130425">SUSE bug 1130425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130427">SUSE bug 1130427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130518">SUSE bug 1130518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130527">SUSE bug 1130527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130567">SUSE bug 1130567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130579">SUSE bug 1130579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131062">SUSE bug 1131062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131107">SUSE bug 1131107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131167">SUSE bug 1131167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131168">SUSE bug 1131168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131169">SUSE bug 1131169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131170">SUSE bug 1131170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131171">SUSE bug 1131171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131172">SUSE bug 1131172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131173">SUSE bug 1131173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131174">SUSE bug 1131174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131175">SUSE bug 1131175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131176">SUSE bug 1131176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131177">SUSE bug 1131177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131178">SUSE bug 1131178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131179">SUSE bug 1131179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131180">SUSE bug 1131180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131290">SUSE bug 1131290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131326">SUSE bug 1131326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131335">SUSE bug 1131335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131336">SUSE bug 1131336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131416">SUSE bug 1131416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131427">SUSE bug 1131427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131442">SUSE bug 1131442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131467">SUSE bug 1131467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131574">SUSE bug 1131574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131587">SUSE bug 1131587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131659">SUSE bug 1131659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131673">SUSE bug 1131673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131847">SUSE bug 1131847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131848">SUSE bug 1131848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131851">SUSE bug 1131851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131900">SUSE bug 1131900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131934">SUSE bug 1131934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131935">SUSE bug 1131935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132083">SUSE bug 1132083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132219">SUSE bug 1132219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132226">SUSE bug 1132226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132227">SUSE bug 1132227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132365">SUSE bug 1132365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132368">SUSE bug 1132368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132369">SUSE bug 1132369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132370">SUSE bug 1132370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132372">SUSE bug 1132372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132373">SUSE bug 1132373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132384">SUSE bug 1132384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132397">SUSE bug 1132397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132402">SUSE bug 1132402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132403">SUSE bug 1132403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132404">SUSE bug 1132404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132405">SUSE bug 1132405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132407">SUSE bug 1132407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132411">SUSE bug 1132411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132412">SUSE bug 1132412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132413">SUSE bug 1132413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132414">SUSE bug 1132414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132426">SUSE bug 1132426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132527">SUSE bug 1132527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132531">SUSE bug 1132531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132555">SUSE bug 1132555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132558">SUSE bug 1132558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132561">SUSE bug 1132561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132562">SUSE bug 1132562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132563">SUSE bug 1132563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132564">SUSE bug 1132564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132570">SUSE bug 1132570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132571">SUSE bug 1132571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132572">SUSE bug 1132572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132589">SUSE bug 1132589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132618">SUSE bug 1132618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132681">SUSE bug 1132681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132726">SUSE bug 1132726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132828">SUSE bug 1132828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132943">SUSE bug 1132943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133005">SUSE bug 1133005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133094">SUSE bug 1133094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133095">SUSE bug 1133095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133115">SUSE bug 1133115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133149">SUSE bug 1133149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133486">SUSE bug 1133486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133529">SUSE bug 1133529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133584">SUSE bug 1133584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133667">SUSE bug 1133667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133668">SUSE bug 1133668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133672">SUSE bug 1133672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133674">SUSE bug 1133674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133675">SUSE bug 1133675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133698">SUSE bug 1133698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133702">SUSE bug 1133702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133731">SUSE bug 1133731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133769">SUSE bug 1133769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133772">SUSE bug 1133772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133774">SUSE bug 1133774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133778">SUSE bug 1133778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133779">SUSE bug 1133779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133780">SUSE bug 1133780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133825">SUSE bug 1133825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133850">SUSE bug 1133850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133851">SUSE bug 1133851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133852">SUSE bug 1133852</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16880/">CVE-2018-16880</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3882/">CVE-2019-3882</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9003/">CVE-2019-9003</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9500/">CVE-2019-9500</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9503/">CVE-2019-9503</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521838" comment="kernel-default-4.12.14-95.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521839" comment="kernel-default-devel-4.12.14-95.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521840" comment="kernel-default-extra-4.12.14-95.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521841" comment="kernel-devel-4.12.14-95.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521842" comment="kernel-macros-4.12.14-95.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521843" comment="kernel-source-4.12.14-95.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521844" comment="kernel-syms-4.12.14-95.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78711" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1079730" ref_url="https://bugzilla.suse.com/1079730" source="BUGZILLA"/>
		<reference ref_id="1098403" ref_url="https://bugzilla.suse.com/1098403" source="BUGZILLA"/>
		<reference ref_id="1111025" ref_url="https://bugzilla.suse.com/1111025" source="BUGZILLA"/>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1120095" ref_url="https://bugzilla.suse.com/1120095" source="BUGZILLA"/>
		<reference ref_id="1130680" ref_url="https://bugzilla.suse.com/1130680" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the XEN Hypervisor adjustments, that additionaly also use CPU Microcode updates.

The mitigation can be controlled via the 'mds' commandline option, see the documentation.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Security issue fixed:

- CVE-2018-20815: Fixed a heap buffer overflow while loading device tree blob (bsc#1130680)

Other fixes:

- Added code to change LIBXL_HOTPLUG_TIMEOUT at runtime.

  The included README has details about the impact of this change (bsc#1120095)

- Fixes in Live migrating PV domUs

  An earlier change broke live migration of PV domUs without a device
  model. The migration would stall for 10 seconds while the domU was
  paused, which caused network connections to drop.  Fix this by tracking
  the need for a device model within libxl. (bsc#1079730, bsc#1098403, bsc#1111025)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-14"/>
	<updated date="2019-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079730">SUSE bug 1079730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098403">SUSE bug 1098403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111025">SUSE bug 1111025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120095">SUSE bug 1120095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130680">SUSE bug 1130680</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521845" comment="xen-4.11.1_06-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521846" comment="xen-libs-4.11.1_06-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521847" comment="xen-libs-32bit-4.11.1_06-2.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78712" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1080919" ref_url="https://bugzilla.suse.com/1080919" source="BUGZILLA"/>
		<reference ref_id="1121563" ref_url="https://bugzilla.suse.com/1121563" source="BUGZILLA"/>
		<reference ref_id="1125352" ref_url="https://bugzilla.suse.com/1125352" source="BUGZILLA"/>
		<reference ref_id="1126056" ref_url="https://bugzilla.suse.com/1126056" source="BUGZILLA"/>
		<reference ref_id="1127557" ref_url="https://bugzilla.suse.com/1127557" source="BUGZILLA"/>
		<reference ref_id="1128657" ref_url="https://bugzilla.suse.com/1128657" source="BUGZILLA"/>
		<reference ref_id="1130230" ref_url="https://bugzilla.suse.com/1130230" source="BUGZILLA"/>
		<reference ref_id="1132348" ref_url="https://bugzilla.suse.com/1132348" source="BUGZILLA"/>
		<reference ref_id="1132400" ref_url="https://bugzilla.suse.com/1132400" source="BUGZILLA"/>
		<reference ref_id="1132721" ref_url="https://bugzilla.suse.com/1132721" source="BUGZILLA"/>
		<reference ref_id="955942" ref_url="https://bugzilla.suse.com/955942" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6954" ref_url="https://www.suse.com/security/cve/CVE-2018-6954/" source="CVE"/>
		<reference ref_id="CVE-2019-3842" ref_url="https://www.suse.com/security/cve/CVE-2019-3842/" source="CVE"/>
		<reference ref_id="CVE-2019-6454" ref_url="https://www.suse.com/security/cve/CVE-2019-6454/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005467.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

Security issues fixed:

- CVE-2018-6954: Fixed a vulnerability in the symlink handling of systemd-tmpfiles 
  which allowed a local user to obtain ownership of arbitrary files (bsc#1080919).
- CVE-2019-3842: Fixed a vulnerability in pam_systemd which allowed a local user to escalate privileges (bsc#1132348).
- CVE-2019-6454: Fixed a denial of service caused by long dbus messages (bsc#1125352).

Non-security issues fixed:

- systemd-coredump: generate a stack trace of all core dumps (jsc#SLE-5933)
- udevd: notify when max number value of children is reached only once per batch of events (bsc#1132400)
- sd-bus: bump message queue size again (bsc#1132721)
- core: only watch processes when it's really necessary (bsc#955942 bsc#1128657)
- rules: load drivers only on 'add' events (bsc#1126056)
- sysctl: Don't pass null directive argument to '%s' (bsc#1121563)
- Do not automatically online memory on s390x (bsc#1127557)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-16"/>
	<updated date="2019-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1080919">SUSE bug 1080919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121563">SUSE bug 1121563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125352">SUSE bug 1125352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126056">SUSE bug 1126056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127557">SUSE bug 1127557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128657">SUSE bug 1128657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130230">SUSE bug 1130230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132348">SUSE bug 1132348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132400">SUSE bug 1132400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132721">SUSE bug 1132721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955942">SUSE bug 955942</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6954/">CVE-2018-6954</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3842/">CVE-2019-3842</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6454/">CVE-2019-6454</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521175" comment="libsystemd0-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521176" comment="libsystemd0-32bit-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521177" comment="libudev1-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521178" comment="libudev1-32bit-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521179" comment="systemd-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521180" comment="systemd-32bit-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521181" comment="systemd-bash-completion-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521182" comment="systemd-sysvinit-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521183" comment="udev-228-150.66.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78713" version="1" class="patch">
	<metadata>
		<title>Security update for libraw (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1120498" ref_url="https://bugzilla.suse.com/1120498" source="BUGZILLA"/>
		<reference ref_id="1120499" ref_url="https://bugzilla.suse.com/1120499" source="BUGZILLA"/>
		<reference ref_id="1120500" ref_url="https://bugzilla.suse.com/1120500" source="BUGZILLA"/>
		<reference ref_id="1120515" ref_url="https://bugzilla.suse.com/1120515" source="BUGZILLA"/>
		<reference ref_id="1120516" ref_url="https://bugzilla.suse.com/1120516" source="BUGZILLA"/>
		<reference ref_id="1120517" ref_url="https://bugzilla.suse.com/1120517" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20363" ref_url="https://www.suse.com/security/cve/CVE-2018-20363/" source="CVE"/>
		<reference ref_id="CVE-2018-20364" ref_url="https://www.suse.com/security/cve/CVE-2018-20364/" source="CVE"/>
		<reference ref_id="CVE-2018-20365" ref_url="https://www.suse.com/security/cve/CVE-2018-20365/" source="CVE"/>
		<reference ref_id="CVE-2018-5817" ref_url="https://www.suse.com/security/cve/CVE-2018-5817/" source="CVE"/>
		<reference ref_id="CVE-2018-5818" ref_url="https://www.suse.com/security/cve/CVE-2018-5818/" source="CVE"/>
		<reference ref_id="CVE-2018-5819" ref_url="https://www.suse.com/security/cve/CVE-2018-5819/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005044.html" source="SUSE-SU"/>
		<description>
This update for libraw fixes the following issues:

Security issues fixed:                                                                                                                               
                                                                                                            
- CVE-2018-20365: Fixed a heap-based buffer overflow in the raw2image function of libraw_cxx.cpp (bsc#1120500)     
- CVE-2018-20364: Fixed a NULL pointer dereference in the copy_bayer function of libraw_cxx.cpp (bsc#1120499)          
- CVE-2018-20363: Fixed a NULL pointer dereference in the raw2image function of libraw_cxx.cpp (bsc#1120498)       
- CVE-2018-5817: Fixed an infinite loop in the unpacked_load_raw function of dcraw_common.cpp (bsc#1120515)
- CVE-2018-5818: Fixed an infinite loop in the parse_rollei function of dcraw_common.cpp (bsc#1120516)
- CVE-2018-5819: Fixed a denial of service in the parse_sinar_ia function of dcraw_common.cpp (bsc#1120517)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-18"/>
	<updated date="2019-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120498">SUSE bug 1120498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120499">SUSE bug 1120499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120500">SUSE bug 1120500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120515">SUSE bug 1120515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120516">SUSE bug 1120516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120517">SUSE bug 1120517</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20363/">CVE-2018-20363</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20364/">CVE-2018-20364</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-20365/">CVE-2018-20365</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5817/">CVE-2018-5817</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5818/">CVE-2018-5818</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5819/">CVE-2018-5819</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521184" comment="libraw9-0.15.4-30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78714" version="1" class="patch">
	<metadata>
		<title>Security update for PackageKit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1038425" ref_url="https://bugzilla.suse.com/1038425" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2019:0128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005047.html" source="SUSE-SU"/>
		<description>
This update for PackageKit fixes the following issues:

- Fixed displaying the license agreement pop up window during package update (bsc#1038425).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-18"/>
	<updated date="2019-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1038425">SUSE bug 1038425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521185" comment="PackageKit-1.1.3-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521186" comment="PackageKit-backend-zypp-1.1.3-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521187" comment="PackageKit-gstreamer-plugin-1.1.3-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521188" comment="PackageKit-gtk3-module-1.1.3-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521189" comment="PackageKit-lang-1.1.3-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521190" comment="libpackagekit-glib2-18-1.1.3-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521191" comment="typelib-1_0-PackageKitGlib-1_0-1.1.3-24.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78715" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005481.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

ucode-intel was updated to official QSR 2019.1 microcode release (bsc#1111331
  CVE-2018-12126 CVE-2018-12130 CVE-2018-12127 CVE-2019-11091)

---- new platforms ----------------------------------------
VLV          C0       6-37-8/02           00000838 Atom Z series
VLV          C0       6-37-8/0C           00000838 Celeron N2xxx, Pentium N35xx
VLV          D0       6-37-9/0F           0000090c Atom E38xx
CHV          C0       6-4c-3/01           00000368 Atom X series
CHV          D0       6-4c-4/01           00000411 Atom X series

Readded Broadwell CPU ucode that was missing in last update:

BDX-ML       B0/M0/R0 6-4f-1/ef 0b00002e-&gt;00000036 Xeon E5/E7 v4; Core i7-69xx/68xx
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-21"/>
	<updated date="2019-05-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521192" comment="ucode-intel-20190514-13.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78716" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1121571" ref_url="https://bugzilla.suse.com/1121571" source="BUGZILLA"/>
		<reference ref_id="1121816" ref_url="https://bugzilla.suse.com/1121816" source="BUGZILLA"/>
		<reference ref_id="1121818" ref_url="https://bugzilla.suse.com/1121818" source="BUGZILLA"/>
		<reference ref_id="1121821" ref_url="https://bugzilla.suse.com/1121821" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20685" ref_url="https://www.suse.com/security/cve/CVE-2018-20685/" source="CVE"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6110" ref_url="https://www.suse.com/security/cve/CVE-2019-6110/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005051.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Security issue fixed:

- CVE-2018-20685: Fixed an issue where scp client allows remote SSH servers to bypass intended access restrictions (bsc#1121571)
- CVE-2019-6109: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate terminal output via the object name, e.g. by inserting ANSI escape sequences (bsc#1121816)
- CVE-2019-6110: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate stderr output, e.g. by inserting ANSI escape sequences (bsc#1121818)
- CVE-2019-6111: Fixed an issue where the scp client would allow malicious remote SSH servers to execute directory traversal attacks and overwrite files (bsc#1121821)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-21"/>
	<updated date="2019-01-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121818">SUSE bug 1121818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20685/">CVE-2018-20685</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6110/">CVE-2019-6110</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521193" comment="openssh-7.2p2-74.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521194" comment="openssh-askpass-gnome-7.2p2-74.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521195" comment="openssh-helpers-7.2p2-74.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78717" version="1" class="patch">
	<metadata>
		<title>Security update for sysstat (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1117001" ref_url="https://bugzilla.suse.com/1117001" source="BUGZILLA"/>
		<reference ref_id="1117260" ref_url="https://bugzilla.suse.com/1117260" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19416" ref_url="https://www.suse.com/security/cve/CVE-2018-19416/" source="CVE"/>
		<reference ref_id="CVE-2018-19517" ref_url="https://www.suse.com/security/cve/CVE-2018-19517/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005490.html" source="SUSE-SU"/>
		<description>
This update for sysstat fixes the following issues:

Security issues fixed:

- CVE-2018-19416: Fixed out-of-bounds read during a memmove call inside the remap_struct function (bsc#1117001).
- CVE-2018-19517: Fixed out-of-bounds read during a memset call inside the remap_struct function (bsc#1117260).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-23"/>
	<updated date="2019-05-23"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1117001">SUSE bug 1117001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117260">SUSE bug 1117260</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19416/">CVE-2018-19416</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19517/">CVE-2018-19517</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521196" comment="sysstat-12.0.2-10.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78718" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1013708" ref_url="https://bugzilla.suse.com/1013708" source="BUGZILLA"/>
		<reference ref_id="1013712" ref_url="https://bugzilla.suse.com/1013712" source="BUGZILLA"/>
		<reference ref_id="1013893" ref_url="https://bugzilla.suse.com/1013893" source="BUGZILLA"/>
		<reference ref_id="1015171" ref_url="https://bugzilla.suse.com/1015171" source="BUGZILLA"/>
		<reference ref_id="1015173" ref_url="https://bugzilla.suse.com/1015173" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9797" ref_url="https://www.suse.com/security/cve/CVE-2016-9797/" source="CVE"/>
		<reference ref_id="CVE-2016-9798" ref_url="https://www.suse.com/security/cve/CVE-2016-9798/" source="CVE"/>
		<reference ref_id="CVE-2016-9802" ref_url="https://www.suse.com/security/cve/CVE-2016-9802/" source="CVE"/>
		<reference ref_id="CVE-2016-9917" ref_url="https://www.suse.com/security/cve/CVE-2016-9917/" source="CVE"/>
		<reference ref_id="CVE-2016-9918" ref_url="https://www.suse.com/security/cve/CVE-2016-9918/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005494.html" source="SUSE-SU"/>
		<description>
This update for bluez fixes the following issues:

Security vulnerability addressed:

- CVE-2016-9797: Fixed a buffer over-read in l2cap_dump() (bsc#1013708).
- CVE-2016-9798: Fixed a use-after-free in conf_opt() (bsc#1013712).
- CVE-2016-9917: Fixed a heap-based buffer overflow in read_n() (bsc#1015171).
- CVE-2016-9802: Fixed a buffer over-read in l2cap_packet() (bsc#1013893).
- CVE-2016-9918: Fixed an out-of-bounds stack read in packet_hexdump(),
  which could be triggered by processing a corrupted dump file and will result
  in a crash of the hcidump tool (bsc#1015173)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-24"/>
	<updated date="2019-05-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013708">SUSE bug 1013708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013712">SUSE bug 1013712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013893">SUSE bug 1013893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015171">SUSE bug 1015171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015173">SUSE bug 1015173</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9797/">CVE-2016-9797</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9798/">CVE-2016-9798</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9802/">CVE-2016-9802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9917/">CVE-2016-9917</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-9918/">CVE-2016-9918</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521197" comment="bluez-5.13-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521198" comment="bluez-cups-5.13-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521199" comment="libbluetooth3-5.13-5.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78719" version="1" class="patch">
	<metadata>
		<title>Security update for freerdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1085416" ref_url="https://bugzilla.suse.com/1085416" source="BUGZILLA"/>
		<reference ref_id="1087240" ref_url="https://bugzilla.suse.com/1087240" source="BUGZILLA"/>
		<reference ref_id="1104918" ref_url="https://bugzilla.suse.com/1104918" source="BUGZILLA"/>
		<reference ref_id="1116708" ref_url="https://bugzilla.suse.com/1116708" source="BUGZILLA"/>
		<reference ref_id="1117963" ref_url="https://bugzilla.suse.com/1117963" source="BUGZILLA"/>
		<reference ref_id="1117964" ref_url="https://bugzilla.suse.com/1117964" source="BUGZILLA"/>
		<reference ref_id="1117965" ref_url="https://bugzilla.suse.com/1117965" source="BUGZILLA"/>
		<reference ref_id="1117966" ref_url="https://bugzilla.suse.com/1117966" source="BUGZILLA"/>
		<reference ref_id="1117967" ref_url="https://bugzilla.suse.com/1117967" source="BUGZILLA"/>
		<reference ref_id="1120507" ref_url="https://bugzilla.suse.com/1120507" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0886" ref_url="https://www.suse.com/security/cve/CVE-2018-0886/" source="CVE"/>
		<reference ref_id="CVE-2018-1000852" ref_url="https://www.suse.com/security/cve/CVE-2018-1000852/" source="CVE"/>
		<reference ref_id="CVE-2018-8784" ref_url="https://www.suse.com/security/cve/CVE-2018-8784/" source="CVE"/>
		<reference ref_id="CVE-2018-8785" ref_url="https://www.suse.com/security/cve/CVE-2018-8785/" source="CVE"/>
		<reference ref_id="CVE-2018-8786" ref_url="https://www.suse.com/security/cve/CVE-2018-8786/" source="CVE"/>
		<reference ref_id="CVE-2018-8787" ref_url="https://www.suse.com/security/cve/CVE-2018-8787/" source="CVE"/>
		<reference ref_id="CVE-2018-8788" ref_url="https://www.suse.com/security/cve/CVE-2018-8788/" source="CVE"/>
		<reference ref_id="CVE-2018-8789" ref_url="https://www.suse.com/security/cve/CVE-2018-8789/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005053.html" source="SUSE-SU"/>
		<description>
This update for freerdp fixes the following issues:

Security issues fixed:

- CVE-2018-0886: Fix a remote code execution vulnerability (CredSSP) (bsc#1085416, bsc#1087240, bsc#1104918)
- CVE-2018-8789: Fix several denial of service vulnerabilities in the in the NTLM Authentication module (bsc#1117965)
- CVE-2018-8785: Fix a potential remote code execution vulnerability in the zgfx_decompress function (bsc#1117967)
- CVE-2018-8786: Fix a potential remote code execution vulnerability in the update_read_bitmap_update function (bsc#1117966)
- CVE-2018-8787: Fix a potential remote code execution vulnerability in the gdi_Bitmap_Decompress function (bsc#1117964)
- CVE-2018-8788: Fix a potential remote code execution vulnerability in the nsc_rle_decode function (bsc#1117963)
- CVE-2018-8784: Fix a potential remote code execution vulnerability in the zgfx_decompress_segment function (bsc#1116708)
- CVE-2018-1000852: Fixed a remote memory access in the drdynvc_process_capability_request function (bsc#1120507)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-21"/>
	<updated date="2019-01-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085416">SUSE bug 1085416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087240">SUSE bug 1087240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104918">SUSE bug 1104918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116708">SUSE bug 1116708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117963">SUSE bug 1117963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117964">SUSE bug 1117964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117965">SUSE bug 1117965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117966">SUSE bug 1117966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117967">SUSE bug 1117967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120507">SUSE bug 1120507</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-0886/">CVE-2018-0886</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000852/">CVE-2018-1000852</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8784/">CVE-2018-8784</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8785/">CVE-2018-8785</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8786/">CVE-2018-8786</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8787/">CVE-2018-8787</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8788/">CVE-2018-8788</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8789/">CVE-2018-8789</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521200" comment="freerdp-2.0.0~git.1463131968.4e66df7-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521201" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78720" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1135273" ref_url="https://bugzilla.suse.com/1135273" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005495.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Sampling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the libvirt adjustments, that pass through the new 'md-clear' CPU flag (bsc#1135273).

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-24"/>
	<updated date="2019-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135273">SUSE bug 1135273</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521848" comment="libvirt-4.0.0-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521849" comment="libvirt-admin-4.0.0-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521850" comment="libvirt-client-4.0.0-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521851" comment="libvirt-daemon-4.0.0-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521852" comment="libvirt-daemon-config-network-4.0.0-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521853" comment="libvirt-daemon-config-nwfilter-4.0.0-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521854" comment="libvirt-daemon-driver-interface-4.0.0-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521855" comment="libvirt-daemon-driver-libxl-4.0.0-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521856" comment="libvirt-daemon-driver-lxc-4.0.0-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521857" comment="libvirt-daemon-driver-network-4.0.0-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521858" comment="libvirt-daemon-driver-nodedev-4.0.0-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521859" comment="libvirt-daemon-driver-nwfilter-4.0.0-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521860" comment="libvirt-daemon-driver-qemu-4.0.0-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521861" comment="libvirt-daemon-driver-secret-4.0.0-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521862" comment="libvirt-daemon-driver-storage-4.0.0-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521863" comment="libvirt-daemon-driver-storage-core-4.0.0-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521864" comment="libvirt-daemon-driver-storage-disk-4.0.0-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521865" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521866" comment="libvirt-daemon-driver-storage-logical-4.0.0-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521867" comment="libvirt-daemon-driver-storage-mpath-4.0.0-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521868" comment="libvirt-daemon-driver-storage-rbd-4.0.0-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521869" comment="libvirt-daemon-driver-storage-scsi-4.0.0-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521870" comment="libvirt-daemon-lxc-4.0.0-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521871" comment="libvirt-daemon-qemu-4.0.0-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521872" comment="libvirt-daemon-xen-4.0.0-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521873" comment="libvirt-doc-4.0.0-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521874" comment="libvirt-libs-4.0.0-8.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78721" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1005023" ref_url="https://bugzilla.suse.com/1005023" source="BUGZILLA"/>
		<reference ref_id="1076696" ref_url="https://bugzilla.suse.com/1076696" source="BUGZILLA"/>
		<reference ref_id="1101591" ref_url="https://bugzilla.suse.com/1101591" source="BUGZILLA"/>
		<reference ref_id="1114981" ref_url="https://bugzilla.suse.com/1114981" source="BUGZILLA"/>
		<reference ref_id="1115518" ref_url="https://bugzilla.suse.com/1115518" source="BUGZILLA"/>
		<reference ref_id="1119971" ref_url="https://bugzilla.suse.com/1119971" source="BUGZILLA"/>
		<reference ref_id="1120323" ref_url="https://bugzilla.suse.com/1120323" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16864" ref_url="https://www.suse.com/security/cve/CVE-2018-16864/" source="CVE"/>
		<reference ref_id="CVE-2018-16865" ref_url="https://www.suse.com/security/cve/CVE-2018-16865/" source="CVE"/>
		<reference ref_id="CVE-2018-16866" ref_url="https://www.suse.com/security/cve/CVE-2018-16866/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005052.html" source="SUSE-SU"/>
		<description>
This update for systemd provides the following fixes:

Security issues fixed:

- CVE-2018-16864, CVE-2018-16865: Fixed two memory corruptions through attacker-controlled alloca()s (bsc#1120323)
- CVE-2018-16866: Fixed an information leak in journald (bsc#1120323)
- Fixed an issue during system startup in relation to encrypted swap disks (bsc#1119971)

Non-security issues fixed:

- core: Queue loading transient units after setting their properties. (bsc#1115518)
- logind: Stop managing VT switches if no sessions are registered on that VT. (bsc#1101591)
- terminal-util: introduce vt_release() and vt_restore() helpers.
- terminal: Unify code for resetting kbd utf8 mode a bit.
- terminal Reset should honour default_utf8 kernel setting.
- logind: Make session_restore_vt() static.
- udev: Downgrade message when settting inotify watch up fails. (bsc#1005023)
- log: Never log into foreign fd #2 in PID 1 or its pre-execve() children. (bsc#1114981)
- udev: Ignore the exit code of systemd-detect-virt for memory hot-add.  In SLE-12-SP3,
  80-hotplug-cpu-mem.rules has a memory hot-add rule that uses systemd-detect-virt to
  detect non-zvm environment. The systemd-detect-virt returns exit failure code when it
  detected _none_ state.  The exit failure code causes that the hot-add memory block can
  not be set to online. (bsc#1076696)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-21"/>
	<updated date="2019-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005023">SUSE bug 1005023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076696">SUSE bug 1076696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101591">SUSE bug 1101591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114981">SUSE bug 1114981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115518">SUSE bug 1115518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119971">SUSE bug 1119971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120323">SUSE bug 1120323</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16864/">CVE-2018-16864</cve>
	<cve impact="important" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16865/">CVE-2018-16865</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16866/">CVE-2018-16866</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521202" comment="libsystemd0-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521203" comment="libsystemd0-32bit-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521204" comment="libudev1-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521205" comment="libudev1-32bit-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521206" comment="systemd-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521207" comment="systemd-32bit-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521208" comment="systemd-bash-completion-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521209" comment="systemd-sysvinit-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521210" comment="udev-228-150.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78722" version="1" class="patch">
	<metadata>
		<title>Security update for screen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1130831" ref_url="https://bugzilla.suse.com/1130831" source="BUGZILLA"/>
		<reference ref_id="944458" ref_url="https://bugzilla.suse.com/944458" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6806" ref_url="https://www.suse.com/security/cve/CVE-2015-6806/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005502.html" source="SUSE-SU"/>
		<description>
This update for screen fixes the following issues:

Security issue fixed:

- CVE-2015-6806: Fixed a stack overflow due to deep recursion (bsc#944458).

Non-security issue fixed:

- Fixed segmentation faults related to altscreen and resizing screen (bsc#1130831).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-24"/>
	<updated date="2019-05-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1130831">SUSE bug 1130831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944458">SUSE bug 944458</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-6806/">CVE-2015-6806</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521211" comment="screen-4.0.4-23.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78723" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1040621" ref_url="https://bugzilla.suse.com/1040621" source="BUGZILLA"/>
		<reference ref_id="1105435" ref_url="https://bugzilla.suse.com/1105435" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6891" ref_url="https://www.suse.com/security/cve/CVE-2017-6891/" source="CVE"/>
		<reference ref_id="CVE-2018-1000654" ref_url="https://www.suse.com/security/cve/CVE-2018-1000654/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005515.html" source="SUSE-SU"/>
		<description>
This update for libtasn1 fixes the following issues:

Security issues fixed:

- CVE-2018-1000654: Fixed a denial of service in the asn1 parser (bsc#1105435).
- CVE-2017-6891: Fixed a stack overflow in asn1_find_node() (bsc#1040621).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-29"/>
	<updated date="2019-05-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040621">SUSE bug 1040621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105435">SUSE bug 1105435</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6891/">CVE-2017-6891</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000654/">CVE-2018-1000654</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521215" comment="libtasn1-4.9-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521216" comment="libtasn1-6-4.9-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521217" comment="libtasn1-6-32bit-4.9-3.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78724" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1121232" ref_url="https://bugzilla.suse.com/1121232" source="BUGZILLA"/>
		<reference ref_id="1121233" ref_url="https://bugzilla.suse.com/1121233" source="BUGZILLA"/>
		<reference ref_id="1121234" ref_url="https://bugzilla.suse.com/1121234" source="BUGZILLA"/>
		<reference ref_id="1121235" ref_url="https://bugzilla.suse.com/1121235" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5717" ref_url="https://www.suse.com/security/cve/CVE-2019-5717/" source="CVE"/>
		<reference ref_id="CVE-2019-5718" ref_url="https://www.suse.com/security/cve/CVE-2019-5718/" source="CVE"/>
		<reference ref_id="CVE-2019-5719" ref_url="https://www.suse.com/security/cve/CVE-2019-5719/" source="CVE"/>
		<reference ref_id="CVE-2019-5721" ref_url="https://www.suse.com/security/cve/CVE-2019-5721/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005055.html" source="SUSE-SU"/>
		<description>
This update for wireshark to version 2.4.12 fixes the following issues:

Security issues fixed:

- CVE-2019-5717: Fixed a denial of service in the P_MUL dissector (bsc#1121232)
- CVE-2019-5718: Fixed a denial of service in the RTSE dissector and other dissectors (bsc#1121233)
- CVE-2019-5719: Fixed a denial of service in the ISAKMP dissector (bsc#1121234)
- CVE-2019-5721: Fixed a denial of service in the ISAKMP dissector (bsc#1121235)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-21"/>
	<updated date="2019-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1121232">SUSE bug 1121232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121233">SUSE bug 1121233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121234">SUSE bug 1121234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121235">SUSE bug 1121235</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5717/">CVE-2019-5717</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5718/">CVE-2019-5718</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5719/">CVE-2019-5719</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5721/">CVE-2019-5721</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521218" comment="libwireshark9-2.4.12-48.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521219" comment="libwiretap7-2.4.12-48.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521220" comment="libwscodecs1-2.4.12-48.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521221" comment="libwsutil8-2.4.12-48.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521222" comment="wireshark-2.4.12-48.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521223" comment="wireshark-gtk-2.4.12-48.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78725" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1135824" ref_url="https://bugzilla.suse.com/1135824" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11691" ref_url="https://www.suse.com/security/cve/CVE-2019-11691/" source="CVE"/>
		<reference ref_id="CVE-2019-11692" ref_url="https://www.suse.com/security/cve/CVE-2019-11692/" source="CVE"/>
		<reference ref_id="CVE-2019-11693" ref_url="https://www.suse.com/security/cve/CVE-2019-11693/" source="CVE"/>
		<reference ref_id="CVE-2019-11694" ref_url="https://www.suse.com/security/cve/CVE-2019-11694/" source="CVE"/>
		<reference ref_id="CVE-2019-11698" ref_url="https://www.suse.com/security/cve/CVE-2019-11698/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="CVE-2019-9800" ref_url="https://www.suse.com/security/cve/CVE-2019-9800/" source="CVE"/>
		<reference ref_id="CVE-2019-9815" ref_url="https://www.suse.com/security/cve/CVE-2019-9815/" source="CVE"/>
		<reference ref_id="CVE-2019-9816" ref_url="https://www.suse.com/security/cve/CVE-2019-9816/" source="CVE"/>
		<reference ref_id="CVE-2019-9817" ref_url="https://www.suse.com/security/cve/CVE-2019-9817/" source="CVE"/>
		<reference ref_id="CVE-2019-9818" ref_url="https://www.suse.com/security/cve/CVE-2019-9818/" source="CVE"/>
		<reference ref_id="CVE-2019-9819" ref_url="https://www.suse.com/security/cve/CVE-2019-9819/" source="CVE"/>
		<reference ref_id="CVE-2019-9820" ref_url="https://www.suse.com/security/cve/CVE-2019-9820/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed:

- CVE-2019-11691: Use-after-free in XMLHttpRequest
- CVE-2019-11692: Use-after-free removing listeners in the event listener manager
- CVE-2019-11693: Buffer overflow in WebGL bufferdata on Linux
- CVE-2019-11694: Uninitialized memory memory leakage in Windows sandbox
- CVE-2019-11698: Theft of user history data through drag and drop of hyperlinks to and from bookmarks
- CVE-2019-7317: Use-after-free in png_image_free of libpng library
- CVE-2019-9800: Memory safety bugs fixed in Firefox 67 and Firefox ESR 60.7
- CVE-2019-9815: Disable hyperthreading on content JavaScript threads on macOS
- CVE-2019-9816: Type confusion with object groups and UnboxedObjects
- CVE-2019-9817: Stealing of cross-domain images using canvas
- CVE-2019-9818: Use-after-free in crash generation server
- CVE-2019-9819: Compartment mismatch with fetch API
- CVE-2019-9820: Use-after-free of ChromeEventHandler by DocShell

Non-security issues fixed:

- Font and date adjustments to accommodate the new Reiwa era in Japan
- Update to Firefox ESR 60.7 (bsc#1135824)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11691/">CVE-2019-11691</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11692/">CVE-2019-11692</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11693/">CVE-2019-11693</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11694/">CVE-2019-11694</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11698/">CVE-2019-11698</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9800/">CVE-2019-9800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-9815/">CVE-2019-9815</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9816/">CVE-2019-9816</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9817/">CVE-2019-9817</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9818/">CVE-2019-9818</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9819/">CVE-2019-9819</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9820/">CVE-2019-9820</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521224" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521225" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78726" version="1" class="patch">
	<metadata>
		<title>Security update for gnome-shell (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1124493" ref_url="https://bugzilla.suse.com/1124493" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3820" ref_url="https://www.suse.com/security/cve/CVE-2019-3820/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005523.html" source="SUSE-SU"/>
		<description>
This update for gnome-shell fixes the following issues:

Security issue fixed:

- CVE-2019-3820: Fixed a partial lock screen bypass (bsc#1124493).

Fixed bugs:

- Remove sessionList of endSessionDialog for security reasons (jsc#SLE-6660).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124493">SUSE bug 1124493</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3820/">CVE-2019-3820</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521226" comment="gnome-shell-3.20.4-77.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521227" comment="gnome-shell-browser-plugin-3.20.4-77.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521228" comment="gnome-shell-calendar-3.20.4-77.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521229" comment="gnome-shell-lang-3.20.4-77.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78727" version="1" class="patch">
	<metadata>
		<title>Security update for evolution (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1125230" ref_url="https://bugzilla.suse.com/1125230" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15587" ref_url="https://www.suse.com/security/cve/CVE-2018-15587/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005522.html" source="SUSE-SU"/>
		<description>
This update for evolution fixes the following issue:

Security issue fixed:

- CVE-2018-15587: Fixed OpenPGP signatures spoofing via specially crafted email that contains a valid signature (bsc#1125230).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1125230">SUSE bug 1125230</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15587/">CVE-2018-15587</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521230" comment="evolution-3.22.6-19.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521231" comment="evolution-lang-3.22.6-19.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78728" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1132728" ref_url="https://bugzilla.suse.com/1132728" source="BUGZILLA"/>
		<reference ref_id="1132729" ref_url="https://bugzilla.suse.com/1132729" source="BUGZILLA"/>
		<reference ref_id="1132732" ref_url="https://bugzilla.suse.com/1132732" source="BUGZILLA"/>
		<reference ref_id="1134297" ref_url="https://bugzilla.suse.com/1134297" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="CVE-2019-2426" ref_url="https://www.suse.com/security/cve/CVE-2019-2426/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005521.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Update to 2.6.18 - OpenJDK 7u221 (April 2019 CPU)

Security issues fixed:

- CVE-2019-2602: Fixed flaw inside BigDecimal implementation (Component: Libraries) (bsc#1132728).
- CVE-2019-2684: Fixed flaw inside the RMI registry implementation (bsc#1132732).
- CVE-2019-2698: Fixed out of bounds access flaw in the 2D component (bsc#1132729).
- CVE-2019-2422: Fixed memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed a Divide By Zero in alloc_sarray function in jmemmgr.c (bsc#1122299).
- CVE-2019-2426: Improve web server connections (bsc#1134297).

Bug fixes:

- Please check the package Changelog for detailed information.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134297">SUSE bug 1134297</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2426/">CVE-2019-2426</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521232" comment="java-1_7_0-openjdk-1.7.0.221-43.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521233" comment="java-1_7_0-openjdk-headless-1.7.0.221-43.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78729" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="1130847" ref_url="https://bugzilla.suse.com/1130847" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9948" ref_url="https://www.suse.com/security/cve/CVE-2019-9948/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005534.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

Security issues fixed:

- CVE-2019-9948: Fixed a 'file:' blacklist bypass in URIs by using the 'local-file:' scheme instead (bsc#1130847).
- CVE-2019-9636: Fixed an information disclosure because of incorrect handling of Unicode encoding during NFKC normalization (bsc#1129346).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-06"/>
	<updated date="2019-06-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130847">SUSE bug 1130847</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9948/">CVE-2019-9948</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521236" comment="libpython2_7-1_0-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521237" comment="libpython2_7-1_0-32bit-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521238" comment="python-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521239" comment="python-base-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521240" comment="python-curses-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521241" comment="python-devel-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521242" comment="python-tk-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521243" comment="python-xml-2.7.13-28.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78730" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1122319" ref_url="https://bugzilla.suse.com/1122319" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6116" ref_url="https://www.suse.com/security/cve/CVE-2019-6116/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005061.html" source="SUSE-SU"/>
		<description>
This update for ghostscript to version 9.26a fixes the following issues:

Security issue fixed:

- CVE-2019-6116: subroutines within pseudo-operators must themselves be pseudo-operators (bsc#1122319)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-23"/>
	<updated date="2019-01-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122319">SUSE bug 1122319</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6116/">CVE-2019-6116</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521244" comment="ghostscript-9.26a-23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521245" comment="ghostscript-x11-9.26a-23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521246" comment="libspectre1-0.2.7-12.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78731" version="1" class="patch">
	<metadata>
		<title>Security update for LibreOffice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1089811" ref_url="https://bugzilla.suse.com/1089811" source="BUGZILLA"/>
		<reference ref_id="1116451" ref_url="https://bugzilla.suse.com/1116451" source="BUGZILLA"/>
		<reference ref_id="1121874" ref_url="https://bugzilla.suse.com/1121874" source="BUGZILLA"/>
		<reference ref_id="1123131" ref_url="https://bugzilla.suse.com/1123131" source="BUGZILLA"/>
		<reference ref_id="1123455" ref_url="https://bugzilla.suse.com/1123455" source="BUGZILLA"/>
		<reference ref_id="1124062" ref_url="https://bugzilla.suse.com/1124062" source="BUGZILLA"/>
		<reference ref_id="1124869" ref_url="https://bugzilla.suse.com/1124869" source="BUGZILLA"/>
		<reference ref_id="1127760" ref_url="https://bugzilla.suse.com/1127760" source="BUGZILLA"/>
		<reference ref_id="1127857" ref_url="https://bugzilla.suse.com/1127857" source="BUGZILLA"/>
		<reference ref_id="1128845" ref_url="https://bugzilla.suse.com/1128845" source="BUGZILLA"/>
		<reference ref_id="1135189" ref_url="https://bugzilla.suse.com/1135189" source="BUGZILLA"/>
		<reference ref_id="1135228" ref_url="https://bugzilla.suse.com/1135228" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16858" ref_url="https://www.suse.com/security/cve/CVE-2018-16858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1448-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191448-1.html" source="SUSE-SU"/>
		<description>
This update for libreoffice and libraries fixes the following issues:

LibreOffice was updated to 6.2.3.2 (fate#327121 bsc#1128845 bsc#1123455),
bringing lots of bug and stability fixes.

Additional bugfixes:

- If there is no firebird engine we still need java to run hsqldb (bsc#1135189)
- PPTX: Rectangle turns from green to blue and loses transparency when transparency is set (bsc#1135228)
- Slide deck compression doesn't, hmm, compress too much (bsc#1127760)
- Psychedelic graphics in LibreOffice (but not PowerPoint) (bsc#1124869)
- Image from PPTX shown in a square, not a circle (bsc#1121874)

libixion was updated to 0.14.1:

* Updated for new orcus

liborcus was updated to 0.14.1:

* Boost 1.67 support
* Various cell handling issues fixed



libwps was updated to 0.4.10:

* QuattroPro: add parser of .qwp files
* all: support complex encoding

mdds was updated to 1.4.3:

* Api change to 1.4
* More multivector opreations and tweaks
* Various multi vector fixes
* flat_segment_tree: add segment iterator and functions
* fix to handle out-of-range insertions on flat_segment_tree
* Another api version -&gt; rename to mdds-1_2

myspell-dictionaries was updated to 20190423:

* Serbian dictionary updated
* Update af_ZA hunspell
* Update Spanish dictionary
* Update Slovenian dictionary
* Update Breton dictionary
* Update Galician dictionary
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-07"/>
	<updated date="2019-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089811">SUSE bug 1089811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116451">SUSE bug 1116451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121874">SUSE bug 1121874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123131">SUSE bug 1123131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123455">SUSE bug 1123455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124062">SUSE bug 1124062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124869">SUSE bug 1124869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127760">SUSE bug 1127760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127857">SUSE bug 1127857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128845">SUSE bug 1128845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135189">SUSE bug 1135189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135228">SUSE bug 1135228</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16858/">CVE-2018-16858</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521247" comment="libixion-0_14-0-0.14.1-13.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521248" comment="liborcus-0_14-0-0.14.1-10.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521249" comment="libreoffice-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521250" comment="libreoffice-base-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521251" comment="libreoffice-base-drivers-postgresql-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521252" comment="libreoffice-branding-upstream-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521253" comment="libreoffice-calc-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521254" comment="libreoffice-calc-extensions-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521255" comment="libreoffice-draw-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521256" comment="libreoffice-filters-optional-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521257" comment="libreoffice-gnome-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521258" comment="libreoffice-gtk2-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521259" comment="libreoffice-icon-themes-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521260" comment="libreoffice-impress-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521261" comment="libreoffice-l10n-af-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521262" comment="libreoffice-l10n-ar-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521263" comment="libreoffice-l10n-ca-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521264" comment="libreoffice-l10n-cs-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521265" comment="libreoffice-l10n-da-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521266" comment="libreoffice-l10n-de-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521267" comment="libreoffice-l10n-en-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521268" comment="libreoffice-l10n-es-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521269" comment="libreoffice-l10n-fi-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521270" comment="libreoffice-l10n-fr-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521271" comment="libreoffice-l10n-gu-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521272" comment="libreoffice-l10n-hi-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521273" comment="libreoffice-l10n-hu-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521274" comment="libreoffice-l10n-it-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521275" comment="libreoffice-l10n-ja-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521276" comment="libreoffice-l10n-ko-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521277" comment="libreoffice-l10n-nb-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521278" comment="libreoffice-l10n-nl-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521279" comment="libreoffice-l10n-nn-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521280" comment="libreoffice-l10n-pl-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521281" comment="libreoffice-l10n-pt_BR-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521282" comment="libreoffice-l10n-pt_PT-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521283" comment="libreoffice-l10n-ro-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521284" comment="libreoffice-l10n-ru-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521285" comment="libreoffice-l10n-sk-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521286" comment="libreoffice-l10n-sv-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521287" comment="libreoffice-l10n-xh-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521288" comment="libreoffice-l10n-zh_CN-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521289" comment="libreoffice-l10n-zh_TW-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521290" comment="libreoffice-l10n-zu-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521291" comment="libreoffice-mailmerge-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521292" comment="libreoffice-math-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521293" comment="libreoffice-officebean-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521294" comment="libreoffice-pyuno-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521295" comment="libreoffice-writer-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521296" comment="libreoffice-writer-extensions-6.2.3.2-43.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521297" comment="libwps-0_4-4-0.4.10-10.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521298" comment="myspell-af_NA-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521299" comment="myspell-af_ZA-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521300" comment="myspell-ar-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521301" comment="myspell-ar_AE-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521302" comment="myspell-ar_BH-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521303" comment="myspell-ar_DZ-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521304" comment="myspell-ar_EG-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521305" comment="myspell-ar_IQ-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521306" comment="myspell-ar_JO-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521307" comment="myspell-ar_KW-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521308" comment="myspell-ar_LB-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521309" comment="myspell-ar_LY-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521310" comment="myspell-ar_MA-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521311" comment="myspell-ar_OM-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521312" comment="myspell-ar_QA-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521313" comment="myspell-ar_SA-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521314" comment="myspell-ar_SD-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521315" comment="myspell-ar_SY-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521316" comment="myspell-ar_TN-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521317" comment="myspell-ar_YE-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521318" comment="myspell-be_BY-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521319" comment="myspell-bg_BG-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521320" comment="myspell-bn_BD-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521321" comment="myspell-bn_IN-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521322" comment="myspell-bs-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521323" comment="myspell-bs_BA-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521324" comment="myspell-ca-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521325" comment="myspell-ca_AD-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521326" comment="myspell-ca_ES-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521327" comment="myspell-ca_ES_valencia-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521328" comment="myspell-ca_FR-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521329" comment="myspell-ca_IT-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521330" comment="myspell-cs_CZ-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521331" comment="myspell-da_DK-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521332" comment="myspell-de-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521333" comment="myspell-de_AT-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521334" comment="myspell-de_CH-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521335" comment="myspell-de_DE-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521336" comment="myspell-dictionaries-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521337" comment="myspell-el_GR-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521338" comment="myspell-en-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521339" comment="myspell-en_AU-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521340" comment="myspell-en_BS-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521341" comment="myspell-en_BZ-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521342" comment="myspell-en_CA-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521343" comment="myspell-en_GB-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521344" comment="myspell-en_GH-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521345" comment="myspell-en_IE-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521346" comment="myspell-en_IN-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521347" comment="myspell-en_JM-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521348" comment="myspell-en_MW-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521349" comment="myspell-en_NA-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521350" comment="myspell-en_NZ-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521351" comment="myspell-en_PH-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521352" comment="myspell-en_TT-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521353" comment="myspell-en_US-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521354" comment="myspell-en_ZA-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521355" comment="myspell-en_ZW-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521356" comment="myspell-es-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521357" comment="myspell-es_AR-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521358" comment="myspell-es_BO-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521359" comment="myspell-es_CL-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521360" comment="myspell-es_CO-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521361" comment="myspell-es_CR-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521362" comment="myspell-es_CU-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521363" comment="myspell-es_DO-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521364" comment="myspell-es_EC-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521365" comment="myspell-es_ES-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521366" comment="myspell-es_GT-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521367" comment="myspell-es_HN-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521368" comment="myspell-es_MX-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521369" comment="myspell-es_NI-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521370" comment="myspell-es_PA-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521371" comment="myspell-es_PE-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521372" comment="myspell-es_PR-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521373" comment="myspell-es_PY-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521374" comment="myspell-es_SV-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521375" comment="myspell-es_UY-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521376" comment="myspell-es_VE-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521377" comment="myspell-et_EE-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521378" comment="myspell-fr_BE-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521379" comment="myspell-fr_CA-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521380" comment="myspell-fr_CH-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521381" comment="myspell-fr_FR-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521382" comment="myspell-fr_LU-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521383" comment="myspell-fr_MC-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521384" comment="myspell-gu_IN-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521385" comment="myspell-he_IL-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521386" comment="myspell-hi_IN-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521387" comment="myspell-hr_HR-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521388" comment="myspell-hu_HU-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521389" comment="myspell-id-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521390" comment="myspell-id_ID-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521391" comment="myspell-it_IT-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521392" comment="myspell-lightproof-en-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521393" comment="myspell-lightproof-hu_HU-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521394" comment="myspell-lightproof-pt_BR-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521395" comment="myspell-lightproof-ru_RU-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521396" comment="myspell-lo_LA-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521397" comment="myspell-lt_LT-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521398" comment="myspell-lv_LV-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521399" comment="myspell-nb_NO-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521400" comment="myspell-nl_BE-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521401" comment="myspell-nl_NL-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521402" comment="myspell-nn_NO-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521403" comment="myspell-no-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521404" comment="myspell-pl_PL-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521405" comment="myspell-pt_AO-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521406" comment="myspell-pt_BR-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521407" comment="myspell-pt_PT-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521408" comment="myspell-ro-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521409" comment="myspell-ro_RO-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521410" comment="myspell-ru_RU-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521411" comment="myspell-sk_SK-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521412" comment="myspell-sl_SI-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521413" comment="myspell-sr-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521414" comment="myspell-sr_CS-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521415" comment="myspell-sr_Latn_CS-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521416" comment="myspell-sr_Latn_RS-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521417" comment="myspell-sr_RS-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521418" comment="myspell-sv_FI-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521419" comment="myspell-sv_SE-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521420" comment="myspell-te-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521421" comment="myspell-te_IN-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521422" comment="myspell-th_TH-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521423" comment="myspell-uk_UA-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521424" comment="myspell-vi-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521425" comment="myspell-vi_VN-20190423-16.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521426" comment="myspell-zu_ZA-20190423-16.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78732" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1137443" ref_url="https://bugzilla.suse.com/1137443" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12735" ref_url="https://www.suse.com/security/cve/CVE-2019-12735/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005543.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issue:

Security issue fixed: 

- CVE-2019-12735: Fixed a potential arbitrary code execution vulnerability in getchar.c (bsc#1137443).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-11"/>
	<updated date="2019-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137443">SUSE bug 1137443</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12735/">CVE-2019-12735</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521427" comment="gvim-7.4.326-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521428" comment="vim-7.4.326-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521429" comment="vim-data-7.4.326-17.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78733" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1119553" ref_url="https://bugzilla.suse.com/1119553" source="BUGZILLA"/>
		<reference ref_id="1119554" ref_url="https://bugzilla.suse.com/1119554" source="BUGZILLA"/>
		<reference ref_id="1119555" ref_url="https://bugzilla.suse.com/1119555" source="BUGZILLA"/>
		<reference ref_id="1119556" ref_url="https://bugzilla.suse.com/1119556" source="BUGZILLA"/>
		<reference ref_id="1119557" ref_url="https://bugzilla.suse.com/1119557" source="BUGZILLA"/>
		<reference ref_id="1119558" ref_url="https://bugzilla.suse.com/1119558" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-4437" ref_url="https://www.suse.com/security/cve/CVE-2018-4437/" source="CVE"/>
		<reference ref_id="CVE-2018-4438" ref_url="https://www.suse.com/security/cve/CVE-2018-4438/" source="CVE"/>
		<reference ref_id="CVE-2018-4441" ref_url="https://www.suse.com/security/cve/CVE-2018-4441/" source="CVE"/>
		<reference ref_id="CVE-2018-4442" ref_url="https://www.suse.com/security/cve/CVE-2018-4442/" source="CVE"/>
		<reference ref_id="CVE-2018-4443" ref_url="https://www.suse.com/security/cve/CVE-2018-4443/" source="CVE"/>
		<reference ref_id="CVE-2018-4464" ref_url="https://www.suse.com/security/cve/CVE-2018-4464/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005058.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.22.5 fixes the following issues:

Security issues fixed:

- CVE-2018-4438: Fixed a logic issue which lead to memory corruption (bsc#1119554)
- CVE-2018-4437, CVE-2018-4441, CVE-2018-4442, CVE-2018-4443, CVE-2018-4464: 
  Fixed multiple memory corruption issues with improved memory handling 
  (bsc#1119553, bsc#1119555, bsc#1119556, bsc#1119557, bsc#1119558)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-23"/>
	<updated date="2019-01-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1119553">SUSE bug 1119553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119554">SUSE bug 1119554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119555">SUSE bug 1119555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119556">SUSE bug 1119556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119557">SUSE bug 1119557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119558">SUSE bug 1119558</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4437/">CVE-2018-4437</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4438/">CVE-2018-4438</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4441/">CVE-2018-4441</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4442/">CVE-2018-4442</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4443/">CVE-2018-4443</cve>
	<cve impact="critical" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4464/">CVE-2018-4464</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521430" comment="libjavascriptcoregtk-4_0-18-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521431" comment="libwebkit2gtk-4_0-37-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521432" comment="libwebkit2gtk3-lang-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521433" comment="typelib-1_0-JavaScriptCore-4_0-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521434" comment="typelib-1_0-WebKit2-4_0-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521435" comment="webkit2gtk-4_0-injected-bundles-2.22.5-2.32.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78734" version="1" class="patch">
	<metadata>
		<title>Security update for libcroco (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1034481" ref_url="https://bugzilla.suse.com/1034481" source="BUGZILLA"/>
		<reference ref_id="1034482" ref_url="https://bugzilla.suse.com/1034482" source="BUGZILLA"/>
		<reference ref_id="1043898" ref_url="https://bugzilla.suse.com/1043898" source="BUGZILLA"/>
		<reference ref_id="1043899" ref_url="https://bugzilla.suse.com/1043899" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7960" ref_url="https://www.suse.com/security/cve/CVE-2017-7960/" source="CVE"/>
		<reference ref_id="CVE-2017-7961" ref_url="https://www.suse.com/security/cve/CVE-2017-7961/" source="CVE"/>
		<reference ref_id="CVE-2017-8834" ref_url="https://www.suse.com/security/cve/CVE-2017-8834/" source="CVE"/>
		<reference ref_id="CVE-2017-8871" ref_url="https://www.suse.com/security/cve/CVE-2017-8871/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005549.html" source="SUSE-SU"/>
		<description>
This update for libcroco fixes the following issues:

Security issues fixed:

- CVE-2017-7960: Fixed heap overflow (input: check end of input before reading a byte) (bsc#1034481).                                                                    
- CVE-2017-7961: Fixed undefined behavior (tknzr: support only max long rgb values) (bsc#1034482).                                                                       
- CVE-2017-8834: Fixed denial of service (memory allocation error) via a crafted CSS file (bsc#1043898).
- CVE-2017-8871: Fixed denial of service (infinite loop and CPU consumption) via a crafted CSS file (bsc#1043899).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-12"/>
	<updated date="2019-06-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034481">SUSE bug 1034481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034482">SUSE bug 1034482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043898">SUSE bug 1043898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043899">SUSE bug 1043899</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7960/">CVE-2017-7960</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-7961/">CVE-2017-7961</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8834/">CVE-2017-8834</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8871/">CVE-2017-8871</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521436" comment="libcroco-0_6-3-0.6.11-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521437" comment="libcroco-0_6-3-32bit-0.6.11-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78735" version="1" class="patch">
	<metadata>
		<title>Security update for sssd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1124194" ref_url="https://bugzilla.suse.com/1124194" source="BUGZILLA"/>
		<reference ref_id="1132657" ref_url="https://bugzilla.suse.com/1132657" source="BUGZILLA"/>
		<reference ref_id="1132879" ref_url="https://bugzilla.suse.com/1132879" source="BUGZILLA"/>
		<reference ref_id="1135247" ref_url="https://bugzilla.suse.com/1135247" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16838" ref_url="https://www.suse.com/security/cve/CVE-2018-16838/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005552.html" source="SUSE-SU"/>
		<description>
This update for sssd fixes the following issues:

Security issue fixed:

- CVE-2018-16838: Fixed an authentication bypass related to the Group Policy Objects implementation (bsc#1124194)

Non-security issues fixed:

- Missing GPOs directory could have led to login problems (bsc#1132879)
- Fix a crash by adding a netgroup counter to struct nss_enum_index (bsc#1132657)
- Allow defaults sudoRole without sudoUser attribute (bsc#1135247)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-12"/>
	<updated date="2019-06-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124194">SUSE bug 1124194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132657">SUSE bug 1132657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132879">SUSE bug 1132879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135247">SUSE bug 1135247</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16838/">CVE-2018-16838</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521875" comment="libipa_hbac0-1.16.1-4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521876" comment="libsss_certmap0-1.16.1-4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521877" comment="libsss_idmap0-1.16.1-4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521878" comment="libsss_nss_idmap0-1.16.1-4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521879" comment="libsss_simpleifp0-1.16.1-4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521880" comment="python-sssd-config-1.16.1-4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521881" comment="sssd-1.16.1-4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521882" comment="sssd-32bit-1.16.1-4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521883" comment="sssd-ad-1.16.1-4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521884" comment="sssd-ipa-1.16.1-4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521885" comment="sssd-krb5-1.16.1-4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521886" comment="sssd-krb5-common-1.16.1-4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521887" comment="sssd-ldap-1.16.1-4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521888" comment="sssd-proxy-1.16.1-4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521889" comment="sssd-tools-1.16.1-4.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78736" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1134689" ref_url="https://bugzilla.suse.com/1134689" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10130" ref_url="https://www.suse.com/security/cve/CVE-2019-10130/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005561.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

Security issue fixed:

- CVE-2019-10130: Prevent row-level security policies from being bypassed via selectivity estimators (bsc#1134689).

Bug fixes:

- For a complete list of fixes check the release notes.
  * https://www.postgresql.org/docs/10/release-10-8.html
  * https://www.postgresql.org/docs/10/release-10-7.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-14"/>
	<updated date="2019-06-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1134689">SUSE bug 1134689</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10130/">CVE-2019-10130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521451" comment="libecpg6-10.8-1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521452" comment="libpq5-10.8-1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521453" comment="libpq5-32bit-10.8-1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521454" comment="postgresql10-10.8-1.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78737" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1065237" ref_url="https://bugzilla.suse.com/1065237" source="BUGZILLA"/>
		<reference ref_id="1090671" ref_url="https://bugzilla.suse.com/1090671" source="BUGZILLA"/>
		<reference ref_id="1119183" ref_url="https://bugzilla.suse.com/1119183" source="BUGZILLA"/>
		<reference ref_id="1121816" ref_url="https://bugzilla.suse.com/1121816" source="BUGZILLA"/>
		<reference ref_id="1121821" ref_url="https://bugzilla.suse.com/1121821" source="BUGZILLA"/>
		<reference ref_id="1131709" ref_url="https://bugzilla.suse.com/1131709" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005565.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Security vulnerabilities addressed:

- CVE-2019-6109: Fixed an character encoding issue in the progress display of
  the scp client that could be used to manipulate client output, allowing
  for spoofing during file transfers (bsc#1121816).
- CVE-2019-6111: Properly validate object names received by the scp client to
  prevent arbitrary file overwrites when interacting with a malicious SSH server
  (bsc#1121821).

Other issues fixed: 

- Fixed two race conditions in sshd relating to SIGHUP (bsc#1119183).
- Returned proper reason for port forwarding failures (bsc#1090671).
- Fixed a double free() in the KDF CAVS testing tool (bsc#1065237).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-17"/>
	<updated date="2019-06-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1065237">SUSE bug 1065237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090671">SUSE bug 1090671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119183">SUSE bug 1119183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131709">SUSE bug 1131709</bugzilla>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521455" comment="openssh-7.2p2-74.42.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521456" comment="openssh-askpass-gnome-7.2p2-74.42.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521457" comment="openssh-helpers-7.2p2-74.42.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78738" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1050242" ref_url="https://bugzilla.suse.com/1050242" source="BUGZILLA"/>
		<reference ref_id="1051510" ref_url="https://bugzilla.suse.com/1051510" source="BUGZILLA"/>
		<reference ref_id="1053043" ref_url="https://bugzilla.suse.com/1053043" source="BUGZILLA"/>
		<reference ref_id="1056787" ref_url="https://bugzilla.suse.com/1056787" source="BUGZILLA"/>
		<reference ref_id="1058115" ref_url="https://bugzilla.suse.com/1058115" source="BUGZILLA"/>
		<reference ref_id="1063638" ref_url="https://bugzilla.suse.com/1063638" source="BUGZILLA"/>
		<reference ref_id="1064802" ref_url="https://bugzilla.suse.com/1064802" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1066129" ref_url="https://bugzilla.suse.com/1066129" source="BUGZILLA"/>
		<reference ref_id="1068546" ref_url="https://bugzilla.suse.com/1068546" source="BUGZILLA"/>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1075020" ref_url="https://bugzilla.suse.com/1075020" source="BUGZILLA"/>
		<reference ref_id="1082387" ref_url="https://bugzilla.suse.com/1082387" source="BUGZILLA"/>
		<reference ref_id="1083647" ref_url="https://bugzilla.suse.com/1083647" source="BUGZILLA"/>
		<reference ref_id="1085535" ref_url="https://bugzilla.suse.com/1085535" source="BUGZILLA"/>
		<reference ref_id="1099658" ref_url="https://bugzilla.suse.com/1099658" source="BUGZILLA"/>
		<reference ref_id="1103992" ref_url="https://bugzilla.suse.com/1103992" source="BUGZILLA"/>
		<reference ref_id="1104353" ref_url="https://bugzilla.suse.com/1104353" source="BUGZILLA"/>
		<reference ref_id="1104427" ref_url="https://bugzilla.suse.com/1104427" source="BUGZILLA"/>
		<reference ref_id="1106011" ref_url="https://bugzilla.suse.com/1106011" source="BUGZILLA"/>
		<reference ref_id="1106284" ref_url="https://bugzilla.suse.com/1106284" source="BUGZILLA"/>
		<reference ref_id="1108838" ref_url="https://bugzilla.suse.com/1108838" source="BUGZILLA"/>
		<reference ref_id="1110946" ref_url="https://bugzilla.suse.com/1110946" source="BUGZILLA"/>
		<reference ref_id="1111696" ref_url="https://bugzilla.suse.com/1111696" source="BUGZILLA"/>
		<reference ref_id="1112063" ref_url="https://bugzilla.suse.com/1112063" source="BUGZILLA"/>
		<reference ref_id="1113722" ref_url="https://bugzilla.suse.com/1113722" source="BUGZILLA"/>
		<reference ref_id="1114427" ref_url="https://bugzilla.suse.com/1114427" source="BUGZILLA"/>
		<reference ref_id="1114893" ref_url="https://bugzilla.suse.com/1114893" source="BUGZILLA"/>
		<reference ref_id="1115688" ref_url="https://bugzilla.suse.com/1115688" source="BUGZILLA"/>
		<reference ref_id="1117158" ref_url="https://bugzilla.suse.com/1117158" source="BUGZILLA"/>
		<reference ref_id="1117561" ref_url="https://bugzilla.suse.com/1117561" source="BUGZILLA"/>
		<reference ref_id="1118139" ref_url="https://bugzilla.suse.com/1118139" source="BUGZILLA"/>
		<reference ref_id="1119843" ref_url="https://bugzilla.suse.com/1119843" source="BUGZILLA"/>
		<reference ref_id="1120091" ref_url="https://bugzilla.suse.com/1120091" source="BUGZILLA"/>
		<reference ref_id="1120423" ref_url="https://bugzilla.suse.com/1120423" source="BUGZILLA"/>
		<reference ref_id="1120566" ref_url="https://bugzilla.suse.com/1120566" source="BUGZILLA"/>
		<reference ref_id="1120843" ref_url="https://bugzilla.suse.com/1120843" source="BUGZILLA"/>
		<reference ref_id="1120902" ref_url="https://bugzilla.suse.com/1120902" source="BUGZILLA"/>
		<reference ref_id="1122776" ref_url="https://bugzilla.suse.com/1122776" source="BUGZILLA"/>
		<reference ref_id="1123454" ref_url="https://bugzilla.suse.com/1123454" source="BUGZILLA"/>
		<reference ref_id="1123663" ref_url="https://bugzilla.suse.com/1123663" source="BUGZILLA"/>
		<reference ref_id="1124503" ref_url="https://bugzilla.suse.com/1124503" source="BUGZILLA"/>
		<reference ref_id="1124839" ref_url="https://bugzilla.suse.com/1124839" source="BUGZILLA"/>
		<reference ref_id="1126356" ref_url="https://bugzilla.suse.com/1126356" source="BUGZILLA"/>
		<reference ref_id="1127616" ref_url="https://bugzilla.suse.com/1127616" source="BUGZILLA"/>
		<reference ref_id="1128052" ref_url="https://bugzilla.suse.com/1128052" source="BUGZILLA"/>
		<reference ref_id="1128904" ref_url="https://bugzilla.suse.com/1128904" source="BUGZILLA"/>
		<reference ref_id="1128905" ref_url="https://bugzilla.suse.com/1128905" source="BUGZILLA"/>
		<reference ref_id="1128979" ref_url="https://bugzilla.suse.com/1128979" source="BUGZILLA"/>
		<reference ref_id="1129138" ref_url="https://bugzilla.suse.com/1129138" source="BUGZILLA"/>
		<reference ref_id="1129497" ref_url="https://bugzilla.suse.com/1129497" source="BUGZILLA"/>
		<reference ref_id="1129693" ref_url="https://bugzilla.suse.com/1129693" source="BUGZILLA"/>
		<reference ref_id="1129770" ref_url="https://bugzilla.suse.com/1129770" source="BUGZILLA"/>
		<reference ref_id="1129848" ref_url="https://bugzilla.suse.com/1129848" source="BUGZILLA"/>
		<reference ref_id="1129857" ref_url="https://bugzilla.suse.com/1129857" source="BUGZILLA"/>
		<reference ref_id="1130409" ref_url="https://bugzilla.suse.com/1130409" source="BUGZILLA"/>
		<reference ref_id="1130699" ref_url="https://bugzilla.suse.com/1130699" source="BUGZILLA"/>
		<reference ref_id="1130972" ref_url="https://bugzilla.suse.com/1130972" source="BUGZILLA"/>
		<reference ref_id="1131451" ref_url="https://bugzilla.suse.com/1131451" source="BUGZILLA"/>
		<reference ref_id="1131488" ref_url="https://bugzilla.suse.com/1131488" source="BUGZILLA"/>
		<reference ref_id="1131565" ref_url="https://bugzilla.suse.com/1131565" source="BUGZILLA"/>
		<reference ref_id="1131673" ref_url="https://bugzilla.suse.com/1131673" source="BUGZILLA"/>
		<reference ref_id="1132044" ref_url="https://bugzilla.suse.com/1132044" source="BUGZILLA"/>
		<reference ref_id="1132894" ref_url="https://bugzilla.suse.com/1132894" source="BUGZILLA"/>
		<reference ref_id="1133176" ref_url="https://bugzilla.suse.com/1133176" source="BUGZILLA"/>
		<reference ref_id="1133188" ref_url="https://bugzilla.suse.com/1133188" source="BUGZILLA"/>
		<reference ref_id="1133190" ref_url="https://bugzilla.suse.com/1133190" source="BUGZILLA"/>
		<reference ref_id="1133320" ref_url="https://bugzilla.suse.com/1133320" source="BUGZILLA"/>
		<reference ref_id="1133612" ref_url="https://bugzilla.suse.com/1133612" source="BUGZILLA"/>
		<reference ref_id="1133616" ref_url="https://bugzilla.suse.com/1133616" source="BUGZILLA"/>
		<reference ref_id="1134160" ref_url="https://bugzilla.suse.com/1134160" source="BUGZILLA"/>
		<reference ref_id="1134162" ref_url="https://bugzilla.suse.com/1134162" source="BUGZILLA"/>
		<reference ref_id="1134199" ref_url="https://bugzilla.suse.com/1134199" source="BUGZILLA"/>
		<reference ref_id="1134200" ref_url="https://bugzilla.suse.com/1134200" source="BUGZILLA"/>
		<reference ref_id="1134201" ref_url="https://bugzilla.suse.com/1134201" source="BUGZILLA"/>
		<reference ref_id="1134202" ref_url="https://bugzilla.suse.com/1134202" source="BUGZILLA"/>
		<reference ref_id="1134203" ref_url="https://bugzilla.suse.com/1134203" source="BUGZILLA"/>
		<reference ref_id="1134204" ref_url="https://bugzilla.suse.com/1134204" source="BUGZILLA"/>
		<reference ref_id="1134205" ref_url="https://bugzilla.suse.com/1134205" source="BUGZILLA"/>
		<reference ref_id="1134354" ref_url="https://bugzilla.suse.com/1134354" source="BUGZILLA"/>
		<reference ref_id="1134393" ref_url="https://bugzilla.suse.com/1134393" source="BUGZILLA"/>
		<reference ref_id="1134459" ref_url="https://bugzilla.suse.com/1134459" source="BUGZILLA"/>
		<reference ref_id="1134460" ref_url="https://bugzilla.suse.com/1134460" source="BUGZILLA"/>
		<reference ref_id="1134461" ref_url="https://bugzilla.suse.com/1134461" source="BUGZILLA"/>
		<reference ref_id="1134537" ref_url="https://bugzilla.suse.com/1134537" source="BUGZILLA"/>
		<reference ref_id="1134591" ref_url="https://bugzilla.suse.com/1134591" source="BUGZILLA"/>
		<reference ref_id="1134597" ref_url="https://bugzilla.suse.com/1134597" source="BUGZILLA"/>
		<reference ref_id="1134607" ref_url="https://bugzilla.suse.com/1134607" source="BUGZILLA"/>
		<reference ref_id="1134651" ref_url="https://bugzilla.suse.com/1134651" source="BUGZILLA"/>
		<reference ref_id="1134671" ref_url="https://bugzilla.suse.com/1134671" source="BUGZILLA"/>
		<reference ref_id="1134760" ref_url="https://bugzilla.suse.com/1134760" source="BUGZILLA"/>
		<reference ref_id="1134806" ref_url="https://bugzilla.suse.com/1134806" source="BUGZILLA"/>
		<reference ref_id="1134810" ref_url="https://bugzilla.suse.com/1134810" source="BUGZILLA"/>
		<reference ref_id="1134813" ref_url="https://bugzilla.suse.com/1134813" source="BUGZILLA"/>
		<reference ref_id="1134848" ref_url="https://bugzilla.suse.com/1134848" source="BUGZILLA"/>
		<reference ref_id="1134936" ref_url="https://bugzilla.suse.com/1134936" source="BUGZILLA"/>
		<reference ref_id="1135006" ref_url="https://bugzilla.suse.com/1135006" source="BUGZILLA"/>
		<reference ref_id="1135007" ref_url="https://bugzilla.suse.com/1135007" source="BUGZILLA"/>
		<reference ref_id="1135008" ref_url="https://bugzilla.suse.com/1135008" source="BUGZILLA"/>
		<reference ref_id="1135056" ref_url="https://bugzilla.suse.com/1135056" source="BUGZILLA"/>
		<reference ref_id="1135100" ref_url="https://bugzilla.suse.com/1135100" source="BUGZILLA"/>
		<reference ref_id="1135120" ref_url="https://bugzilla.suse.com/1135120" source="BUGZILLA"/>
		<reference ref_id="1135278" ref_url="https://bugzilla.suse.com/1135278" source="BUGZILLA"/>
		<reference ref_id="1135281" ref_url="https://bugzilla.suse.com/1135281" source="BUGZILLA"/>
		<reference ref_id="1135309" ref_url="https://bugzilla.suse.com/1135309" source="BUGZILLA"/>
		<reference ref_id="1135312" ref_url="https://bugzilla.suse.com/1135312" source="BUGZILLA"/>
		<reference ref_id="1135314" ref_url="https://bugzilla.suse.com/1135314" source="BUGZILLA"/>
		<reference ref_id="1135315" ref_url="https://bugzilla.suse.com/1135315" source="BUGZILLA"/>
		<reference ref_id="1135316" ref_url="https://bugzilla.suse.com/1135316" source="BUGZILLA"/>
		<reference ref_id="1135320" ref_url="https://bugzilla.suse.com/1135320" source="BUGZILLA"/>
		<reference ref_id="1135323" ref_url="https://bugzilla.suse.com/1135323" source="BUGZILLA"/>
		<reference ref_id="1135330" ref_url="https://bugzilla.suse.com/1135330" source="BUGZILLA"/>
		<reference ref_id="1135492" ref_url="https://bugzilla.suse.com/1135492" source="BUGZILLA"/>
		<reference ref_id="1135542" ref_url="https://bugzilla.suse.com/1135542" source="BUGZILLA"/>
		<reference ref_id="1135556" ref_url="https://bugzilla.suse.com/1135556" source="BUGZILLA"/>
		<reference ref_id="1135603" ref_url="https://bugzilla.suse.com/1135603" source="BUGZILLA"/>
		<reference ref_id="1135642" ref_url="https://bugzilla.suse.com/1135642" source="BUGZILLA"/>
		<reference ref_id="1135661" ref_url="https://bugzilla.suse.com/1135661" source="BUGZILLA"/>
		<reference ref_id="1135758" ref_url="https://bugzilla.suse.com/1135758" source="BUGZILLA"/>
		<reference ref_id="1136206" ref_url="https://bugzilla.suse.com/1136206" source="BUGZILLA"/>
		<reference ref_id="1136424" ref_url="https://bugzilla.suse.com/1136424" source="BUGZILLA"/>
		<reference ref_id="1136428" ref_url="https://bugzilla.suse.com/1136428" source="BUGZILLA"/>
		<reference ref_id="1136430" ref_url="https://bugzilla.suse.com/1136430" source="BUGZILLA"/>
		<reference ref_id="1136432" ref_url="https://bugzilla.suse.com/1136432" source="BUGZILLA"/>
		<reference ref_id="1136434" ref_url="https://bugzilla.suse.com/1136434" source="BUGZILLA"/>
		<reference ref_id="1136435" ref_url="https://bugzilla.suse.com/1136435" source="BUGZILLA"/>
		<reference ref_id="1136438" ref_url="https://bugzilla.suse.com/1136438" source="BUGZILLA"/>
		<reference ref_id="1136439" ref_url="https://bugzilla.suse.com/1136439" source="BUGZILLA"/>
		<reference ref_id="1136477" ref_url="https://bugzilla.suse.com/1136477" source="BUGZILLA"/>
		<reference ref_id="1136478" ref_url="https://bugzilla.suse.com/1136478" source="BUGZILLA"/>
		<reference ref_id="1136573" ref_url="https://bugzilla.suse.com/1136573" source="BUGZILLA"/>
		<reference ref_id="1136586" ref_url="https://bugzilla.suse.com/1136586" source="BUGZILLA"/>
		<reference ref_id="1136881" ref_url="https://bugzilla.suse.com/1136881" source="BUGZILLA"/>
		<reference ref_id="1136935" ref_url="https://bugzilla.suse.com/1136935" source="BUGZILLA"/>
		<reference ref_id="1136990" ref_url="https://bugzilla.suse.com/1136990" source="BUGZILLA"/>
		<reference ref_id="1137151" ref_url="https://bugzilla.suse.com/1137151" source="BUGZILLA"/>
		<reference ref_id="1137152" ref_url="https://bugzilla.suse.com/1137152" source="BUGZILLA"/>
		<reference ref_id="1137153" ref_url="https://bugzilla.suse.com/1137153" source="BUGZILLA"/>
		<reference ref_id="1137162" ref_url="https://bugzilla.suse.com/1137162" source="BUGZILLA"/>
		<reference ref_id="1137372" ref_url="https://bugzilla.suse.com/1137372" source="BUGZILLA"/>
		<reference ref_id="1137444" ref_url="https://bugzilla.suse.com/1137444" source="BUGZILLA"/>
		<reference ref_id="1137586" ref_url="https://bugzilla.suse.com/1137586" source="BUGZILLA"/>
		<reference ref_id="1137739" ref_url="https://bugzilla.suse.com/1137739" source="BUGZILLA"/>
		<reference ref_id="1137752" ref_url="https://bugzilla.suse.com/1137752" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7191" ref_url="https://www.suse.com/security/cve/CVE-2018-7191/" source="CVE"/>
		<reference ref_id="CVE-2019-10124" ref_url="https://www.suse.com/security/cve/CVE-2019-10124/" source="CVE"/>
		<reference ref_id="CVE-2019-11085" ref_url="https://www.suse.com/security/cve/CVE-2019-11085/" source="CVE"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11479" ref_url="https://www.suse.com/security/cve/CVE-2019-11479/" source="CVE"/>
		<reference ref_id="CVE-2019-11486" ref_url="https://www.suse.com/security/cve/CVE-2019-11486/" source="CVE"/>
		<reference ref_id="CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487/" source="CVE"/>
		<reference ref_id="CVE-2019-11815" ref_url="https://www.suse.com/security/cve/CVE-2019-11815/" source="CVE"/>
		<reference ref_id="CVE-2019-11833" ref_url="https://www.suse.com/security/cve/CVE-2019-11833/" source="CVE"/>
		<reference ref_id="CVE-2019-11884" ref_url="https://www.suse.com/security/cve/CVE-2019-11884/" source="CVE"/>
		<reference ref_id="CVE-2019-12382" ref_url="https://www.suse.com/security/cve/CVE-2019-12382/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<reference ref_id="CVE-2019-5489" ref_url="https://www.suse.com/security/cve/CVE-2019-5489/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2019-11477: A sequence of SACKs may have been crafted such that one can trigger an integer overflow, leading to a kernel panic.
- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which will
fragment the TCP retransmission queue. An attacker may have been able to further exploit the fragmented queue to cause an
expensive linked-list walk for subsequent SACKs received for that same TCP connection.
- CVE-2019-11479: An attacker could force the Linux kernel to segment its responses into multiple TCP segments. This would drastically increased the bandwidth required to deliver the same amount of data. Further, it would consume additional resources such as CPU and NIC processing power.
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network. (bnc#1136424)
- CVE-2019-12382: An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel, there was an unchecked kstrdup of fwstr, which might have allowed an attacker to cause a denial of service (NULL pointer dereference and system crash). (bnc#1136586)
- CVE-2019-5489: The mincore() implementation in mm/mincore.c in the Linux kernel allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may have been possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server. (bnc#1120843)
- CVE-2019-11487: The Linux kernel allowed page reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM existed. It could have occured with FUSE requests. (bnc#1133190)
- CVE-2019-11833: fs/ext4/extents.c in the Linux kernel did not zero out the unused memory region in the extent tree block, which might have allowed local users to obtain sensitive information by reading uninitialized data in the filesystem. (bnc#1135281)
- CVE-2018-7191: In the tun subsystem in the Linux kernel, dev_get_valid_name was not called before register_netdevice. This allowed local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. (bnc#1135603)
- CVE-2019-11085: Insufficient input validation in Kernel Mode Driver in i915 Graphics for Linux may have allowed an authenticated user to potentially enable escalation of privilege via local access. (bnc#1135278)
- CVE-2019-11815: An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel There was a race condition leading to a use-after-free, related to net namespace cleanup. (bnc#1134537)
- CVE-2019-11884: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel allowed a local user to obtain potentially sensitive information from kernel stack memory via a hidPCONNADD command, because a name field may not end with a '\0' character. (bnc#1134848)
- CVE-2019-11486: The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel had multiple race conditions. (bnc#1133188)

The following non-security bugs were fixed:

- 9p locks: add mount option for lock retry interval (bsc#1051510).
- Update config files. Debug kernel is not supported (bsc#1135492).
- acpi / utils: Drop reference in test for device presence (bsc#1051510).
- acpi: button: reinitialize button state upon resume (bsc#1051510).
- acpi: fix menuconfig presentation of acpi submenu (bsc#1117158).
- acpica: AML interpreter: add region addresses in global list during initialization (bsc#1051510).
- acpica: Namespace: remove address node from global list after method termination (bsc#1051510).
- alsa: core: Do not refer to snd_cards array directly (bsc#1051510).
- alsa: emu10k1: Drop superfluous id-uniquification behavior (bsc#1051510).
- alsa: hda - Register irq handler after the chip initialization (bsc#1051510).
- alsa: hda - Use a macro for snd_array iteration loops (bsc#1051510).
- alsa: hda/hdmi - Consider eld_valid when reporting jack event (bsc#1051510).
- alsa: hda/hdmi - Read the pin sense from register when repolling (bsc#1051510).
- alsa: hda/realtek - Avoid superfluous COEF EAPD setups (bsc#1051510).
- alsa: hda/realtek - Corrected fixup for System76 Gazelle (gaze14) (bsc#1051510).
- alsa: hda/realtek - EAPD turn on later (bsc#1051510).
- alsa: hda/realtek - Fix for Lenovo B50-70 inverted internal microphone bug (bsc#1051510).
- alsa: hda/realtek - Fixup headphone noise via runtime suspend (bsc#1051510).
- alsa: hda/realtek - Improve the headset mic for Acer Aspire laptops (bsc#1051510).
- alsa: hdea/realtek - Headset fixup for System76 Gazelle (gaze14) (bsc#1051510).
- alsa: line6: Avoid polluting led_* namespace (bsc#1051510).
- alsa: seq: Align temporary re-locking with irqsave version (bsc#1051510).
- alsa: seq: Correct unlock sequence at snd_seq_client_ioctl_unlock() (bsc#1051510).
- alsa: seq: Cover unsubscribe_port() in list_mutex (bsc#1051510).
- alsa: seq: Fix race of get-subscription call vs port-delete ioctls (bsc#1051510).
- alsa: seq: Protect in-kernel ioctl calls with mutex (bsc#1051510).
- alsa: seq: Protect racy pool manipulation from OSS sequencer (bsc#1051510).
- alsa: seq: Remove superfluous irqsave flags (bsc#1051510).
- alsa: seq: Simplify snd_seq_kernel_client_enqueue() helper (bsc#1051510).
- alsa: timer: Check ack_list emptiness instead of bit flag (bsc#1051510).
- alsa: timer: Coding style fixes (bsc#1051510).
- alsa: timer: Make snd_timer_close() really kill pending actions (bsc#1051510).
- alsa: timer: Make sure to clear pending ack list (bsc#1051510).
- alsa: timer: Revert active callback sync check at close (bsc#1051510).
- alsa: timer: Simplify error path in snd_timer_open() (bsc#1051510).
- alsa: timer: Unify timer callback process code (bsc#1051510).
- alsa: usb-audio: Fix a memory leak bug (bsc#1051510).
- alsa: usb-audio: Handle the error from snd_usb_mixer_apply_create_quirk() (bsc#1051510).
- alsa: usx2y: fix a double free bug (bsc#1051510).
- appletalk: Fix compile regression (bsc#1051510).
- appletalk: Fix use-after-free in atalk_proc_exit (bsc#1051510).
- arch: arm64: acpi: KABI ginore includes (bsc#1117158 bsc#1134671).
- arm64, mm, efi: Account for GICv3 LPI tables in static memblock reserve table (bsc#1117158).
- arm64/x86: Update config files. Use CONFIG_ARCH_SUPPORTS_acpi
- arm64: Export save_stack_trace_tsk() (jsc#SLE-4214).
- arm64: acpi: fix alignment fault in accessing acpi (bsc#1117158).
- arm64: fix acpi dependencies (bsc#1117158).
- arm: 8824/1: fix a migrating irq bug when hotplug cpu (bsc#1051510).
- arm: 8833/1: Ensure that NEON code always compiles with Clang (bsc#1051510).
- arm: 8839/1: kprobe: make patch_lock a raw_spinlock_t (bsc#1051510).
- arm: 8840/1: use a raw_spinlock_t in unwind (bsc#1051510).
- arm: OMAP2+: Variable 'reg' in function omap4_dsi_mux_pads() could be uninitialized (bsc#1051510).
- arm: OMAP2+: fix lack of timer interrupts on CPU1 after hotplug (bsc#1051510).
- arm: avoid Cortex-A9 livelock on tight dmb loops (bsc#1051510).
- arm: imx6q: cpuidle: fix bug that CPU might not wake up at expected time (bsc#1051510).
- arm: iop: do not use using 64-bit DMA masks (bsc#1051510).
- arm: orion: do not use using 64-bit DMA masks (bsc#1051510).
- arm: pxa: ssp: unneeded to free devm_ allocated data (bsc#1051510).
- arm: s3c24xx: Fix boolean expressions in osiris_dvs_notify (bsc#1051510).
- arm: samsung: Limit SAMSUNG_PM_CHECK config option to non-Exynos platforms (bsc#1051510).
- asoc: Intel: avoid Oops if DMA setup fails (bsc#1051510).
- asoc: RT5677-SPI: Disable 16Bit SPI Transfers (bsc#1051510).
- asoc: cs4270: Set auto-increment bit for register writes (bsc#1051510).
- asoc: fix valid stream condition (bsc#1051510).
- asoc: fsl_esai: Fix missing break in switch statement (bsc#1051510).
- asoc: hdmi-codec: fix S/PDIF DAI (bsc#1051510).
- asoc: max98090: Fix restore of DAPM Muxes (bsc#1051510).
- asoc: nau8810: fix the issue of widget with prefixed name (bsc#1051510).
- asoc: nau8824: fix the issue of the widget with prefix name (bsc#1051510).
- asoc: samsung: odroid: Fix clock configuration for 44100 sample rate (bsc#1051510).
- asoc: stm32: fix sai driver name initialisation (bsc#1051510).
- asoc: tlv320aic32x4: Fix Common Pins (bsc#1051510).
- asoc: wm_adsp: Add locking to wm_adsp2_bus_error (bsc#1051510).
- asoc:soc-pcm:fix a codec fixup issue in TDM case (bsc#1051510).
- at76c50x-usb: Do not register led_trigger if usb_register_driver failed (bsc#1051510).
- audit: fix a memleak caused by auditing load module (bsc#1051510).
- b43: shut up clang -Wuninitialized variable warning (bsc#1051510).
- backlight: lm3630a: Return 0 on success in update_status functions (bsc#1051510).
- bcache: Move couple of functions to sysfs.c (bsc#1130972).
- bcache: Move couple of string arrays to sysfs.c (bsc#1130972).
- bcache: Populate writeback_rate_minimum attribute (bsc#1130972).
- bcache: Replace bch_read_string_list() by __sysfs_match_string() (bsc#1130972).
- bcache: account size of buckets used in uuid write to ca-&gt;meta_sectors_written (bsc#1130972).
- bcache: add MODULE_DESCRIPTION information (bsc#1130972).
- bcache: add a comment in super.c (bsc#1130972).
- bcache: add code comments for bset.c (bsc#1130972).
- bcache: add comment for cache_set-&gt;fill_iter (bsc#1130972).
- bcache: add identifier names to arguments of function definitions (bsc#1130972).
- bcache: add missing SPDX header (bsc#1130972).
- bcache: add separate workqueue for journal_write to avoid deadlock (bsc#1130972).
- bcache: add static const prefix to char * array declarations (bsc#1130972).
- bcache: add sysfs_strtoul_bool() for setting bit-field variables (bsc#1130972).
- bcache: add the missing comments for smp_mb()/smp_wmb() (bsc#1130972).
- bcache: cannot set writeback_running via sysfs if no writeback kthread created (bsc#1130972).
- bcache: correct dirty data statistics (bsc#1130972).
- bcache: do not assign in if condition in bcache_init() (bsc#1130972).
- bcache: do not assign in if condition register_bcache() (bsc#1130972).
- bcache: do not check NULL pointer before calling kmem_cache_destroy (bsc#1130972).
- bcache: do not check if debug dentry is ERR or NULL explicitly on remove (bsc#1130972).
- bcache: do not clone bio in bch_data_verify (bsc#1130972).
- bcache: do not mark writeback_running too early (bsc#1130972).
- bcache: export backing_dev_name via sysfs (bsc#1130972).
- bcache: export backing_dev_uuid via sysfs (bsc#1130972).
- bcache: fix code comments style (bsc#1130972).
- bcache: fix indent by replacing blank by tabs (bsc#1130972).
- bcache: fix indentation issue, remove tabs on a hunk of code (bsc#1130972).
- bcache: fix input integer overflow of congested threshold (bsc#1130972).
- bcache: fix input overflow to cache set io_error_limit (bsc#1130972).
- bcache: fix input overflow to cache set sysfs file io_error_halflife (bsc#1130972).
- bcache: fix input overflow to journal_delay_ms (bsc#1130972).
- bcache: fix input overflow to sequential_cutoff (bsc#1130972).
- bcache: fix input overflow to writeback_delay (bsc#1130972).
- bcache: fix input overflow to writeback_rate_minimum (bsc#1130972).
- bcache: fix ioctl in flash device (bsc#1130972).
- bcache: fix mistaken code comments in bcache.h (bsc#1130972).
- bcache: fix mistaken comments in request.c (bsc#1130972).
- bcache: fix potential div-zero error of writeback_rate_i_term_inverse (bsc#1130972).
- bcache: fix potential div-zero error of writeback_rate_p_term_inverse (bsc#1130972).
- bcache: fix typo 'succesfully' to 'successfully' (bsc#1130972).
- bcache: fix typo in code comments of closure_return_with_destructor() (bsc#1130972).
- bcache: improve sysfs_strtoul_clamp() (bsc#1130972).
- bcache: introduce force_wake_up_gc() (bsc#1130972).
- bcache: make cutoff_writeback and cutoff_writeback_sync tunable (bsc#1130972).
- bcache: move open brace at end of function definitions to next line (bsc#1130972).
- bcache: never writeback a discard operation (bsc#1130972).
- bcache: not use hard coded memset size in bch_cache_accounting_clear() (bsc#1130972).
- bcache: option to automatically run gc thread after writeback (bsc#1130972).
- bcache: panic fix for making cache device (bsc#1130972).
- bcache: prefer 'help' in Kconfig (bsc#1130972).
- bcache: print number of keys in trace_bcache_journal_write (bsc#1130972).
- bcache: recal cached_dev_sectors on detach (bsc#1130972).
- bcache: remove unnecessary space before ioctl function pointer arguments (bsc#1130972).
- bcache: remove unused bch_passthrough_cache (bsc#1130972).
- bcache: remove useless parameter of bch_debug_init() (bsc#1130972).
- bcache: replace '%pF' by '%pS' in seq_printf() (bsc#1130972).
- bcache: replace Symbolic permissions by octal permission numbers (bsc#1130972).
- bcache: replace hard coded number with BUCKET_GC_GEN_MAX (bsc#1130972).
- bcache: replace printk() by pr_*() routines (bsc#1130972).
- bcache: set writeback_percent in a flexible range (bsc#1130972).
- bcache: split combined if-condition code into separate ones (bsc#1130972).
- bcache: stop bcache device when backing device is offline (bsc#1130972).
- bcache: stop using the deprecated get_seconds() (bsc#1130972).
- bcache: style fix to add a blank line after declarations (bsc#1130972).
- bcache: style fix to replace 'unsigned' by 'unsigned int' (bsc#1130972).
- bcache: style fixes for lines over 80 characters (bsc#1130972).
- bcache: treat stale and dirty keys as bad keys (bsc#1130972).
- bcache: trivial - remove tailing backslash in macro BTREE_FLAG (bsc#1130972).
- bcache: update comment for bch_data_insert (bsc#1130972).
- bcache: update comment in sysfs.c (bsc#1130972).
- bcache: use (REQ_META|REQ_PRIO) to indicate bio for metadata (bsc#1130972).
- bcache: use MAX_CACHES_PER_SET instead of magic number 8 in __bch_bucket_alloc_set (bsc#1130972).
- bcache: use REQ_PRIO to indicate bio for metadata (bsc#1130972).
- bcache: use routines from lib/crc64.c for CRC64 calculation (bsc#1130972).
- bcache: use sysfs_strtoul_bool() to set bit-field variables (bsc#1130972).
- block: Do not revalidate bdev of hidden gendisk (bsc#1120091).
- block: check_events: do not bother with events if unsupported (bsc#1110946, bsc#1119843).
- block: disk_events: introduce event flags (bsc#1110946, bsc#1119843).
- block: do not leak memory in bio_copy_user_iov() (bsc#1135309).
- block: fix the return errno for direct IO (bsc#1135320).
- block: fix use-after-free on gendisk (bsc#1135312).
- bluetooth: Align minimum encryption key size for LE and BR/EDR connections (bsc#1051510).
- bluetooth: Check key sizes only when Secure Simple Pairing is enabled (bsc#1135556).
- bluetooth: hidp: fix buffer overflow (bsc#1051510).
- bnxt_en: Free short FW command HWRM memory in error path in bnxt_init_one() (bsc#1050242).
- bnxt_en: Improve RX consumer index validity check (networking-stable-19_04_10).
- bnxt_en: Improve multicast address setup logic (networking-stable-19_05_04).
- bnxt_en: Reset device on RX buffer errors (networking-stable-19_04_10).
- bonding: fix event handling for stacked bonds (networking-stable-19_04_19).
- bpf, lru: avoid messing with eviction heuristics upon syscall lookup (bsc#1083647).
- bpf: Add missed newline in verifier verbose log (bsc#1056787).
- bpf: add map_lookup_elem_sys_only for lookups from syscall side (bsc#1083647).
- brcm80211: potential NULL dereference in brcmf_cfg80211_vndr_cmds_dcmd_handler() (bsc#1051510).
- btrfs: Do not panic when we can't find a root key (bsc#1112063).
- btrfs: Factor out common delayed refs init code (bsc#1134813).
- btrfs: Introduce init_delayed_ref_head (bsc#1134813).
- btrfs: Open-code add_delayed_data_ref (bsc#1134813).
- btrfs: Open-code add_delayed_tree_ref (bsc#1134813).
- btrfs: Use init_delayed_ref_common in add_delayed_data_ref (bsc#1134813).
- btrfs: Use init_delayed_ref_common in add_delayed_tree_ref (bsc#1134813).
- btrfs: Use init_delayed_ref_head in add_delayed_ref_head (bsc#1134813).
- btrfs: add a helper to return a head ref (bsc#1134813).
- btrfs: breakout empty head cleanup to a helper (bsc#1134813).
- btrfs: delayed-ref: Introduce better documented delayed ref structures (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_data_ref() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_tree_ref() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: do not allow trimming when a fs is mounted with the nologreplay option (bsc#1135758).
- btrfs: do not double unlock on error in btrfs_punch_hole (bsc#1136881).
- btrfs: extent-tree: Fix a bug that btrfs is unable to add pinned bytes (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Open-code process_func in __btrfs_mod_ref (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Use btrfs_ref to refactor add_pinned_bytes() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_free_extent() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_inc_extent_ref() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: fix fsync not persisting changed attributes of a directory (bsc#1137151).
- btrfs: fix race between ranged fsync and writeback of adjacent ranges (bsc#1136477).
- btrfs: fix race updating log root item during fsync (bsc#1137153).
- btrfs: fix wrong ctime and mtime of a directory after log replay (bsc#1137152).
- btrfs: improve performance on fsync of files with multiple hardlinks (bsc#1123454).
- btrfs: move all ref head cleanup to the helper function (bsc#1134813).
- btrfs: move extent_op cleanup to a helper (bsc#1134813).
- btrfs: move ref_mod modification into the if (ref) logic (bsc#1134813).
- btrfs: qgroup: Check bg while resuming relocation to avoid NULL pointer dereference (bsc#1134806).
- btrfs: qgroup: Do not scan leaf if we're modifying reloc tree (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: qgroup: Move reserved data accounting from btrfs_delayed_ref_head to btrfs_qgroup_extent_record (bsc#1134162).
- btrfs: qgroup: Remove duplicated trace points for qgroup_rsv_add/release (bsc#1134160).
- btrfs: reloc: Also queue orphan reloc tree for cleanup to avoid BUG_ON() (bsc#1133612).
- btrfs: remove delayed_ref_node from ref_head (bsc#1134813).
- btrfs: send, flush dellaloc in order to avoid data loss (bsc#1133320).
- btrfs: split delayed ref head initialization and addition (bsc#1134813).
- btrfs: track refs in a rb_tree instead of a list (bsc#1134813).
- btrfs: tree-checker: detect file extent items with overlapping ranges (bsc#1136478).
- ceph: ensure d_name stability in ceph_dentry_hash() (bsc#1134461).
- ceph: fix ci-&gt;i_head_snapc leak (bsc#1122776).
- ceph: fix use-after-free on symlink traversal (bsc#1134459).
- ceph: only use d_name directly when parent is locked (bsc#1134460).
- cifs: keep FileInfo handle live during oplock break (bsc#1106284, bsc#1131565).
- clk: rockchip: Fix video codec clocks on rk3288 (bsc#1051510).
- clk: rockchip: fix wrong clock definitions for rk3328 (bsc#1051510).
- configfs: Fix use-after-free when accessing sd-&gt;s_dentry (bsc#1051510).
- configfs: fix possible use-after-free in configfs_register_group (bsc#1051510).
- crypto: arm/aes-neonbs - do not access already-freed walk.iv (bsc#1051510).
- crypto: caam - fix caam_dump_sg that iterates through scatterlist (bsc#1051510).
- crypto: ccm - fix incompatibility between 'ccm' and 'ccm_base' (bsc#1051510).
- crypto: ccp - Do not free psp_master when PLATFORM_INIT fails (bsc#1051510).
- crypto: chacha20poly1305 - set cra_name correctly (bsc#1051510).
- crypto: crct10dif-generic - fix use via crypto_shash_digest() (bsc#1051510).
- crypto: fips - Grammar s/options/option/, s/to/the/ (bsc#1051510).
- crypto: gcm - fix incompatibility between 'gcm' and 'gcm_base' (bsc#1051510).
- crypto: skcipher - do not WARN on unprocessed data after slow walk step (bsc#1051510).
- crypto: sun4i-ss - Fix invalid calculation of hash end (bsc#1051510).
- crypto: vmx - CTR: always increment IV as quadword (bsc#1051510).
- crypto: vmx - fix copy-paste error in CTR mode (bsc#1051510).
- crypto: vmx - ghash: do nosimd fallback manually (bsc#1135661, bsc#1137162).
- crypto: vmx - return correct error code on failed setkey (bsc#1135661, bsc#1137162).
- crypto: x86/crct10dif-pcl - fix use via crypto_shash_digest() (bsc#1051510).
- dccp: Fix memleak in __feat_register_sp (bsc#1051510).
- dccp: do not use ipv6 header for ipv4 flow (networking-stable-19_03_28).
- debugfs: fix use-after-free on symlink traversal (bsc#1051510).
- devres: Align data[] to ARCH_KMALLOC_MINALIGN (bsc#1051510).
- dmaengine: axi-dmac: Do not check the number of frames for alignment (bsc#1051510).
- dmaengine: tegra210-dma: free dma controller in remove() (bsc#1051510).
- documentation: Add MDS vulnerability documentation (bsc#1135642).
- drivers: acpi: add dependency of EFI for arm64 (bsc#1117158).
- drm/bridge: adv7511: Fix low refresh rate selection (bsc#1051510).
- drm/etnaviv: lock MMU while dumping core (bsc#1113722)
- drm/fb-helper: dpms_legacy(): Only set on connectors in use (bsc#1051510).
- drm/i915/fbc: disable framebuffer compression on GeminiLake (bsc#1051510).
- drm/i915/gvt: Fix cmd length of VEB_DI_IECP (bsc#1113722)
- drm/i915/gvt: Fix incorrect mask of mmio 0x22028 in gen8/9 mmio list (bnc#1113722)
- drm/i915/gvt: Tiled Resources mmios are in-context mmios for gen9+ (bsc#1113722)
- drm/i915/gvt: add 0x4dfc to gen9 save-restore list (bsc#1113722)
- drm/i915/gvt: do not let TRTTE and 0x4dfc write passthrough to hardware (bsc#1051510).
- drm/i915/gvt: refine ggtt range validation (bsc#1113722)
- drm/i915: Disable LP3 watermarks on all SNB machines (bsc#1051510).
- drm/i915: Downgrade Gen9 Plane WM latency error (bsc#1051510).
- drm/i915: Fix I915_EXEC_RING_MASK (bsc#1051510).
- drm/imx: do not skip DP channel disable for background plane (bsc#1051510).
- drm/mediatek: fix possible object reference leak (bsc#1051510).
- drm/meson: add size and alignment requirements for dumb buffers (bnc#1113722)
- drm/nouveau/i2c: Disable i2c bus access after -&gt;fini() (bsc#1113722)
- drm/rockchip: fix for mailbox read validation (bsc#1051510).
- drm/rockchip: shutdown drm subsystem on shutdown (bsc#1051510).
- drm/sun4i: rgb: Change the pixel clock validation check (bnc#1113722)
- drm/ttm: Remove warning about inconsistent mapping information (bnc#1131488)
- drm/vmwgfx: Do not send drm sysfs hotplug events on initial master set (bsc#1051510).
- drm/vmwgfx: NULL pointer dereference from vmw_cmd_dx_view_define() (bsc#1113722)
- drm/vmwgfx: integer underflow in vmw_cmd_dx_set_shader() leading to an invalid read (bsc#1051510).
- dt-bindings: clock: r8a7795: Remove CSIREF clock (bsc#1120902).
- dt-bindings: clock: r8a7796: Remove CSIREF clock (bsc#1120902).
- dt-bindings: net: Add binding for the external clock for TI WiLink (bsc#1085535).
- dt-bindings: net: Fix a typo in the phy-mode list for ethernet bindings (bsc#1129770).
- dt-bindings: rtc: sun6i-rtc: Fix register range in example (bsc#1120902).
- dwc2: gadget: Fix completed transfer size calculation in DDMA (bsc#1051510).
- efi/arm: Defer persistent reservations until after paging_init() (bsc#1117158).
- efi/arm: Do not mark acpi reclaim memory as MEMBLOCK_NOMAP (bsc#1117158 bsc#1115688 bsc#1120566).
- efi/arm: Revert 'Defer persistent reservations until after paging_init()' (bsc#1117158).
- efi/arm: Revert deferred unmap of early memmap mapping (bsc#1117158).
- efi/arm: libstub: add a root memreserve config table (bsc#1117158).
- efi/arm: map UEFI memory map even w/o runtime services enabled (bsc#1117158).
- efi/arm: preserve early mapping of UEFI memory map longer for BGRT (bsc#1117158).
- efi: Permit calling efi_mem_reserve_persistent() from atomic context (bsc#1117158).
- efi: Permit multiple entries in persistent memreserve data structure (bsc#1117158).
- efi: Prevent GICv3 WARN() by mapping the memreserve table before first use (bsc#1117158).
- efi: Reduce the amount of memblock reservations for persistent allocations (bsc#1117158).
- efi: add API to reserve memory persistently across kexec reboot (bsc#1117158).
- efi: honour memory reservations passed via a linux specific config table (bsc#1117158).
- ext4: Do not warn when enabling DAX (bsc#1132894).
- ext4: actually request zeroing of inode table after grow (bsc#1135315).
- ext4: avoid panic during forced reboot due to aborted journal (bsc#1126356).
- ext4: fix data corruption caused by overlapping unaligned and aligned IO (bsc#1136428).
- ext4: fix ext4_show_options for file systems w/o journal (bsc#1135316).
- ext4: fix use-after-free race with debug_want_extra_isize (bsc#1135314).
- ext4: make sanity check in mballoc more strict (bsc#1136439).
- ext4: wait for outstanding dio during truncate in nojournal mode (bsc#1136438).
- fbdev: fix WARNING in __alloc_pages_nodemask bug (bsc#1113722)
- fbdev: fix divide error in fb_var_to_videomode (bsc#1113722)
- firmware: efi: factor out mem_reserve (bsc#1117158 bsc#1134671).
- fix rtnh_ok() (git-fixes).
- fs/sync.c: sync_file_range(2) may use WB_SYNC_ALL writeback (bsc#1136432).
- fs/writeback.c: use rcu_barrier() to wait for inflight wb switches going into workqueue when umount (bsc#1136435).
- ftrace/x86_64: Emulate call function while updating in breakpoint handler (bsc#1099658).
- genetlink: Fix a memory leak on error path (networking-stable-19_03_28).
- ghes, EDAC: Fix ghes_edac registration (bsc#1133176).
- gpio: aspeed: fix a potential NULL pointer dereference (bsc#1051510).
- gpu: ipu-v3: dp: fix CSC handling (bsc#1051510).
- hid: debug: fix race condition with between rdesc_show() and device removal (bsc#1051510).
- hid: input: add mapping for 'Toggle Display' key (bsc#1051510).
- hid: input: add mapping for Assistant key (bsc#1051510).
- hid: input: add mapping for Expose/Overview key (bsc#1051510).
- hid: input: add mapping for keyboard Brightness Up/Down/Toggle keys (bsc#1051510).
- hid: logitech: check the return value of create_singlethread_workqueue (bsc#1051510).
- hwmon: (f71805f) Use request_muxed_region for Super-IO accesses (bsc#1051510).
- hwmon: (pc87427) Use request_muxed_region for Super-IO accesses (bsc#1051510).
- hwmon: (smsc47b397) Use request_muxed_region for Super-IO accesses (bsc#1051510).
- hwmon: (smsc47m1) Use request_muxed_region for Super-IO accesses (bsc#1051510).
- hwmon: (vt1211) Use request_muxed_region for Super-IO accesses (bsc#1051510).
- hwmon: (w83627hf) Use request_muxed_region for Super-IO accesses (bsc#1051510).
- ibmvnic: Add device identification to requested IRQs (bsc#1137739).
- ibmvnic: Do not close unopened driver during reset (bsc#1137752).
- ibmvnic: Fix unchecked return codes of memory allocations (bsc#1137752).
- ibmvnic: Refresh device multicast list after reset (bsc#1137752).
- ibmvnic: remove set but not used variable 'netdev' (bsc#1137739).
- igmp: fix incorrect unsolicit report count when join group (git-fixes).
- iio: adc: xilinx: fix potential use-after-free on remove (bsc#1051510).
- indirect call wrappers: helpers to speed-up indirect calls of builtin (bsc#1124503).
- inetpeer: fix uninit-value in inet_getpeer (git-fixes).
- input: elan_i2c - add hardware ID for multiple Lenovo laptops (bsc#1051510).
- input: introduce KEY_ASSISTANT (bsc#1051510).
- input: synaptics-rmi4 - fix possible double free (bsc#1051510).
- intel_th: msu: Fix single mode with IOMMU (bsc#1051510).
- intel_th: pci: Add Comet Lake support (bsc#1051510).
- iommu/arm-smmu-v3: Abort all transactions if SMMU is enabled in kdump kernel (bsc#1117158).
- iommu/arm-smmu-v3: Do not disable SMMU in kdump kernel (bsc#1117158 bsc#1134671).
- iommu/vt-d: Do not request page request irq under dmar_global_lock (bsc#1135006).
- iommu/vt-d: Make kernel parameter igfx_off work with vIOMMU (bsc#1135007).
- iommu/vt-d: Set intel_iommu_gfx_mapped correctly (bsc#1135008).
- ip6_tunnel: Match to ARPHRD_TUNNEL6 for dev type (networking-stable-19_04_10).
- ip6_tunnel: collect_md xmit: Use ip_tunnel_key's provided src address (git-fixes).
- ip_gre: fix parsing gre header in ipgre_err (git-fixes).
- ip_tunnel: Fix name string concatenate in __ip_tunnel_create() (git-fixes).
- ipconfig: Correctly initialise ic_nameservers (bsc#1051510).
- ipmi:ssif: compare block number correctly for multi-part return messages (bsc#1051510).
- ipv4: Define __ipv4_neigh_lookup_noref when CONFIG_INET is disabled (git-fixes).
- ipv4: add sanity checks in ipv4_link_failure() (git-fixes).
- ipv4: ensure rcu_read_lock() in ipv4_link_failure() (networking-stable-19_04_19).
- ipv4: ip_do_fragment: Preserve skb_iif during fragmentation (networking-stable-19_05_04).
- ipv4: recompile ip options in ipv4_link_failure (networking-stable-19_04_19).
- ipv4: set the tcp_min_rtt_wlen range from 0 to one day (networking-stable-19_04_30).
- ipv6/flowlabel: wait rcu grace period before put_pid() (git-fixes).
- ipv6: fix cleanup ordering for ip6_mr failure (git-fixes).
- ipv6: fix cleanup ordering for pingv6 registration (git-fixes).
- ipv6: invert flowlabel sharing check in process and user mode (git-fixes).
- ipv6: mcast: fix unsolicited report interval after receiving querys (git-fixes).
- ipvlan: Add the skb-&gt;mark as flow4's member to lookup route (bsc#1051510).
- ipvlan: fix ipv6 outbound device (bsc#1051510).
- ipvlan: use ETH_MAX_MTU as max mtu (bsc#1051510).
- ipvs: Fix signed integer overflow when setsockopt timeout (bsc#1051510).
- ipvs: call ip_vs_dst_notifier earlier than ipv6_dev_notf (git-fixes).
- ipvs: fix buffer overflow with sync daemon and service (git-fixes).
- ipvs: fix check on xmit to non-local addresses (git-fixes).
- ipvs: fix race between ip_vs_conn_new() and ip_vs_del_dest() (bsc#1051510).
- ipvs: fix rtnl_lock lockups caused by start_sync_thread (git-fixes).
- ipvs: fix stats update from local clients (git-fixes).
- iw_cxgb4: only allow 1 flush on user qps (bsc#1051510).
- jbd2: check superblock mapped prior to committing (bsc#1136430).
- kABI workaround for removed usb_interface.pm_usage_cnt field (bsc#1051510).
- kABI workaround for snd_seq_kernel_client_enqueue() API changes (bsc#1051510).
- kABI: protect dma-mapping.h include (kabi).
- kABI: protect functions using struct net_generic (bsc#1130409 LTC#176346).
- kABI: protect ip_options_rcv_srr (kabi).
- kABI: protect struct mlx5_td (kabi).
- kABI: protect struct pci_dev (kabi).
- kABI: protect struct smc_ib_device (bsc#1130409 LTC#176346).
- kABI: protect struct smc_link (bsc#1129857 LTC#176247).
- kABI: protect struct smcd_dev (bsc#1130409 LTC#176346).
- kabi: drop LINUX_Mib_TCPWQUEUETOOBIG snmp counter (bsc#1137586).
- kabi: implement map_lookup_elem_sys_only in another way (bsc#1083647).
- kabi: move sysctl_tcp_min_snd_mss to preserve struct net layout (bsc#1137586).
- kernel/signal.c: trace_signal_deliver when signal_group_exit (git-fixes).
- kernel/sys.c: prctl: fix false positive in validate_prctl_map() (git-fixes).
- kernel/sysctl.c: add missing range check in do_proc_dointvec_minmax_conv (bsc#1051510).
- kernel/sysctl.c: fix out-of-bounds access when setting file-max (bsc#1051510).
- keys: safe concurrent user-&gt;{session,uid}_keyring access (bsc#1135642).
- kmsg: Update message catalog to latest ibM level (2019/03/08) (bsc#1128904 LTC#176078).
- kmsg: Update message catalog to latest ibM level (2019/03/08) (bsc#1128905 LTC#176077).
- kvm: Fix UAF in nested posted interrupt processing (bsc#1134199).
- kvm: VMX: Zero out *all* general purpose registers after VM-Exit (bsc#1134202).
- kvm: nVMX: Clear reserved bits of #DB exit qualification (bsc#1134200).
- kvm: nVMX: restore host state in nested_vmx_vmexit for VMFail (bsc#1134201).
- kvm: s390: fix memory overwrites when not using SCA entries (bsc#1136206).
- kvm: s390: provide io interrupt kvm_stat (bsc#1136206).
- kvm: s390: use created_vcpus in more places (bsc#1136206).
- kvm: s390: vsie: fix 8k check for the itdba (bsc#1136206).
- kvm: x86: Always use 32-bit SMRAM save state for 32-bit kernels (bsc#1134203).
- kvm: x86: Do not clear EFER during SMM transitions for 32-bit vCPU (bsc#1134204).
- kvm: x86: svm: make sure NMI is injected after nmi_singlestep (bsc#1134205).
- l2tp: cleanup l2tp_tunnel_delete calls (bsc#1051510).
- l2tp: filter out non-PPP sessions in pppol2tp_tunnel_ioctl() (git-fixes).
- l2tp: fix missing refcount drop in pppol2tp_tunnel_ioctl() (git-fixes).
- l2tp: only accept PPP sessions in pppol2tp_connect() (git-fixes).
- l2tp: prevent pppol2tp_connect() from creating kernel sockets (git-fixes).
- l2tp: revert 'l2tp: fix missing print session offset info' (bsc#1051510).
- leds: avoid races with workqueue (bsc#1051510).
- leds: pwm: silently error out on EPROBE_DEFER (bsc#1051510).
- lib: add crc64 calculation routines (bsc#1130972).
- lib: do not depend on linux headers being installed (bsc#1130972).
- libata: fix using DMA buffers on stack (bsc#1051510).
- linux/kernel.h: Use parentheses around argument in u64_to_user_ptr() (bsc#1051510).
- livepatch: Convert error about unsupported reliable stacktrace into a warning (bsc#1071995).
- livepatch: Remove custom kobject state handling (bsc#1071995).
- livepatch: Remove duplicated code for early initialization (bsc#1071995).
- lpfc: validate command in lpfc_sli4_scmd_to_wqidx_distr() (bsc#1129138).
- mISDN: Check address length before reading address family (bsc#1051510).
- mac80211: fix memory accounting with A-MSDU aggregation (bsc#1051510).
- mac80211: fix unaligned access in mesh table hash function (bsc#1051510).
- mac8390: Fix mmio access size probe (bsc#1051510).
- md: fix invalid stored role for a disk (bsc#1051510).
- media: atmel: atmel-isc: fix INIT_WORK misplacement (bsc#1051510).
- media: cx18: update *pos correctly in cx18_read_pos() (bsc#1051510).
- media: cx23885: check allocation return (bsc#1051510).
- media: davinci-isif: avoid uninitialized variable use (bsc#1051510).
- media: davinci/vpbe: array underflow in vpbe_enum_outputs() (bsc#1051510).
- media: ivtv: update *pos correctly in ivtv_read_pos() (bsc#1051510).
- media: omap_vout: potential buffer overflow in vidioc_dqbuf() (bsc#1051510).
- media: ov2659: fix unbalanced mutex_lock/unlock (bsc#1051510).
- media: pvrusb2: Prevent a buffer overflow (bsc#1129770).
- media: serial_ir: Fix use-after-free in serial_ir_init_module (bsc#1051510).
- media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame (bsc#1051510).
- media: vivid: use vfree() instead of kfree() for dev-&gt;bitmap_cap (bsc#1051510).
- media: wl128x: Fix an error code in fm_download_firmware() (bsc#1051510).
- media: wl128x: prevent two potential buffer overflows (bsc#1051510).
- memcg: make it work on sparse non-0-node systems (bnc#1133616).
- memcg: make it work on sparse non-0-node systems kabi (bnc#1133616).
- mlxsw: spectrum: Fix autoneg status in ethtool (networking-stable-19_04_30).
- mm/huge_memory: fix vmf_insert_pfn_{pmd, pud}() crash, handle unaligned addresses (bsc#1135330).
- mm: Fix buggy backport leading to MAP_SYNC failures (bsc#1137372)
- mm: thp: relax __GFP_THISNODE for MADV_HUGEPAGE mappings (bnc#1012382).
- mmc: block: Delete gendisk before cleaning up the request queue (bsc#1127616).
- mmc: core: fix possible use after free of host (bsc#1051510).
- mount: copy the port field into the cloned nfs_server structure (bsc#1136990).
- mtd: docg3: Fix passing zero to 'PTR_ERR' warning in doc_probe_device (bsc#1051510).
- mtd: docg3: fix a possible memory leak of mtd-&gt;name (bsc#1051510).
- mtd: nand: omap: Fix comment in platform data using wrong Kconfig symbol (bsc#1051510).
- mtd: part: fix incorrect format specifier for an unsigned long long (bsc#1051510).
- mtd: spi-nor: intel-spi: Avoid crossing 4K address boundary on read/write (bsc#1129770).
- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).
- mwifiex: Fix mem leak in mwifiex_tm_cmd (bsc#1051510).
- mwifiex: Fix possible buffer overflows at parsing bss descriptor
- mwifiex: prevent an array overflow (bsc#1051510).
- mwl8k: Fix rate_idx underflow (bsc#1051510).
- neighbor: Call __ipv4_neigh_lookup_noref in neigh_xmit (git-fixes).
- net-gro: Fix GRO flush when receiving a GSO packet (networking-stable-19_04_10).
- net/ibmvnic: Remove tests of member address (bsc#1137739).
- net/ibmvnic: Update MAC address settings after adapter reset (bsc#1134760).
- net/ibmvnic: Update carrier state after link state change (bsc#1135100).
- net/ipv4: defensive cipso option parsing (git-fixes).
- net/ipv6: do not reinitialize ndev-&gt;cnf.addr_gen_mode on new inet6_dev (git-fixes).
- net/ipv6: fix addrconf_sysctl_addr_gen_mode (git-fixes).
- net/ipv6: propagate net.ipv6.conf.all.addr_gen_mode to devices (git-fixes).
- net/ipv6: reserve room for IFLA_INET6_ADDR_GEN_MODE (git-fixes).
- net/mlx5: Decrease default mr cache size (networking-stable-19_04_10).
- net/mlx5e: Add a lock on tir list (networking-stable-19_04_10).
- net/mlx5e: Fix error handling when refreshing TIRs (networking-stable-19_04_10).
- net/mlx5e: Fix trailing semicolon (bsc#1075020).
- net/mlx5e: IPoib, Reset QP after channels are closed (bsc#1075020).
- net/mlx5e: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_04_30).
- net/rose: fix unbound loop in rose_loopback_timer() (networking-stable-19_04_30).
- net/sched: act_sample: fix divide by zero in the traffic path (networking-stable-19_04_10).
- net/sched: do not dereference a-&gt;goto_chain to read the chain index (bsc#1064802 bsc#1066129).
- net/sched: fix -&gt;get helper of the matchall cls (networking-stable-19_04_10).
- net/smc: add pnet table namespace support (bsc#1130409 LTC#176346).
- net/smc: add smcd support to the pnet table (bsc#1130409 LTC#176346).
- net/smc: allow 16 byte pnetids in netlink policy (bsc#1129857 LTC#176247).
- net/smc: allow pci IDs as ib device names in the pnet table (bsc#1130409 LTC#176346).
- net/smc: allow pnetid-less configuration (bsc#1130409 LTC#176346).
- net/smc: call smc_cdc_msg_send() under send_lock (bsc#1129857 LTC#176247).
- net/smc: check connections in smc_lgr_free_work (bsc#1129857 LTC#176247).
- net/smc: check for ip prefix and subnet (bsc#1134607 LTC#177518).
- net/smc: check port_idx of ib event (bsc#1129857 LTC#176247).
- net/smc: cleanup for smcr_tx_sndbuf_nonempty (bsc#1130409 LTC#176346).
- net/smc: cleanup of get vlan id (bsc#1134607 LTC#177518).
- net/smc: code cleanup smc_listen_work (bsc#1134607 LTC#177518).
- net/smc: consolidate function parameters (bsc#1134607 LTC#177518).
- net/smc: correct state change for peer closing (bsc#1129857 LTC#176247).
- net/smc: delete rkey first before switching to unused (bsc#1129857 LTC#176247).
- net/smc: do not wait for send buffer space when data was already sent (bsc#1129857 LTC#176247).
- net/smc: do not wait under send_lock (bsc#1129857 LTC#176247).
- net/smc: fallback to TCP after connect problems (bsc#1134607 LTC#177518).
- net/smc: fix a NULL pointer dereference (bsc#1134607 LTC#177518).
- net/smc: fix another sizeof to int comparison (bsc#1129857 LTC#176247).
- net/smc: fix byte_order for rx_curs_confirmed (bsc#1129848 LTC#176249).
- net/smc: fix return code from FLUSH command (bsc#1134607 LTC#177518).
- net/smc: fix sender_free computation (bsc#1129857 LTC#176247).
- net/smc: fix smc_poll in SMC_INIT state (bsc#1129848 LTC#176249).
- net/smc: fix use of variable in cleared area (bsc#1129857 LTC#176247).
- net/smc: improve smc_conn_create reason codes (bsc#1134607 LTC#177518).
- net/smc: improve smc_listen_work reason codes (bsc#1134607 LTC#177518).
- net/smc: move code to clear the conn-&gt;lgr field (bsc#1129857 LTC#176247).
- net/smc: move unhash before release of clcsock (bsc#1134607 LTC#177518).
- net/smc: move wake up of close waiter (bsc#1129857 LTC#176247).
- net/smc: no delay for free tx buffer wait (bsc#1129857 LTC#176247).
- net/smc: nonblocking connect rework (bsc#1134607 LTC#177518).
- net/smc: postpone release of clcsock (bsc#1129857 LTC#176247).
- net/smc: preallocated memory for rdma work requests (bsc#1129857 LTC#176247).
- net/smc: prevent races between smc_lgr_terminate() and smc_conn_free() (bsc#1129857 LTC#176247).
- net/smc: propagate file from SMC to TCP socket (bsc#1134607 LTC#177518).
- net/smc: recvmsg and splice_read should return 0 after shutdown (bsc#1129857 LTC#176247).
- net/smc: reduce amount of status updates to peer (bsc#1129857 LTC#176247).
- net/smc: reset cursor update required flag (bsc#1129857 LTC#176247).
- net/smc: rework pnet table (bsc#1130409 LTC#176346).
- net/smc: unlock LGR pending lock earlier for SMC-D (bsc#1129857 LTC#176247).
- net/smc: use client and server LGR pending locks for SMC-R (bsc#1129857 LTC#176247).
- net/smc: use device link provided in qp_context (bsc#1129857 LTC#176247).
- net/smc: use smc_curs_copy() for SMC-D (bsc#1129857 LTC#176247).
- net/smc: wait for pending work before clcsock release_sock (bsc#1134607 LTC#177518).
- net: Fix a bug in removing queues from XPS map (git-fixes).
- net: aquantia: fix rx checksum offload for UDP/TCP over IPv6 (networking-stable-19_03_28).
- net: atm: Fix potential Spectre v1 vulnerabilities (networking-stable-19_04_19).
- net: avoid skb_warn_bad_offload on IS_ERR (git-fixes).
- net: do not keep lonely packets forever in the gro hash (git-fixes).
- net: dsa: bcm_sf2: fix buffer overflow doing set_rxnfc (networking-stable-19_05_04).
- net: dsa: legacy: do not unmask port bitmaps (git-fixes).
- net: dsa: mv88e6xxx: fix handling of upper half of STATS_TYPE_PORT (git-fixes).
- net: ena: fix return value of ena_com_config_llq_info() (bsc#1111696 bsc#1117561).
- net: ethtool: not call vzalloc for zero sized memory request (networking-stable-19_04_10).
- net: fix uninit-value in __hw_addr_add_ex() (git-fixes).
- net: fou: do not use guehdr after iptunnel_pull_offloads in gue_udp_recv (networking-stable-19_04_19).
- net: hns3: remove resetting check in hclgevf_reset_task_schedule (bsc#1104353 bsc#1135056).
- net: initialize skb-&gt;peeked when cloning (git-fixes).
- net: make skb_partial_csum_set() more robust against overflows (git-fixes).
- net: phy: marvell: Fix buffer overrun with stats counters (networking-stable-19_05_04).
- net: rds: exchange of 8K and 1M pool (networking-stable-19_04_30).
- net: rose: fix a possible stack overflow (networking-stable-19_03_28).
- net: socket: fix potential spectre v1 gadget in socketcall (git-fixes).
- net: stmmac: fix memory corruption with large MTUs (networking-stable-19_03_28).
- net: stmmac: move stmmac_check_ether_addr() to driver probe (networking-stable-19_04_30).
- net: test tailroom before appending to linear skb (git-fixes).
- net: thunderx: do not allow jumbo frames with XDP (networking-stable-19_04_19).
- net: thunderx: raise XDP MTU to 1508 (networking-stable-19_04_19).
- net: unbreak CONFIG_RETPOLINE=n builds (bsc#1124503).
- net: use indirect call wrappers at GRO network layer (bsc#1124503).
- net: use indirect call wrappers at GRO transport layer (bsc#1124503).
- netfilter: bridge: Do not sabotage nf_hook calls from an l3mdev (git-fixes).
- netfilter: bridge: ebt_among: add missing match size checks (git-fixes).
- netfilter: bridge: ebt_among: add more missing match size checks (git-fixes).
- netfilter: drop template ct when conntrack is skipped (git-fixes).
- netfilter: ebtables: CONFIG_COMPAT: reject trailing data after last rule (git-fixes).
- netfilter: ebtables: handle string from userspace with care (git-fixes).
- netfilter: ebtables: reject non-bridge targets (git-fixes).
- netfilter: ipset: do not call ipset_nest_end after nla_nest_cancel (git-fixes).
- netfilter: nf_log: do not hold nf_log_mutex during user access (git-fixes).
- netfilter: nf_log: fix uninit read in nf_log_proc_dostring (git-fixes).
- netfilter: nf_socket: Fix out of bounds access in nf_sk_lookup_slow_v{4,6} (git-fixes).
- netfilter: nf_tables: can't fail after linking rule into active rule list (git-fixes).
- netfilter: nf_tables: check msg_type before nft_trans_set(trans) (git-fixes).
- netfilter: nf_tables: fix NULL pointer dereference on nft_ct_helper_obj_dump() (git-fixes).
- netfilter: nf_tables: fix leaking object reference count (git-fixes).
- netfilter: nf_tables: release chain in flushing set (git-fixes).
- netfilter: nft_compat: do not dump private area (git-fixes).
- netfilter: x_tables: initialise match/target check parameter struct (git-fixes).
- netlink: fix uninit-value in netlink_sendmsg (git-fixes).
- nfs add module option to limit nfsv4 minor version (jsc#PM-231).
- nfs: Enable nfsv4.2 support - jsc@PM-231 This requires a module parameter for nfsv4.2 to actually be available on SLE12 and SLE15-SP0
- nfsv4.x: always serialize open/close operations (bsc#1114893).
- nl80211: Add NL80211_FLAG_CLEAR_SKB flag for other NL commands (bsc#1051510).
- nvme-rdma: fix possible free of a non-allocated async event buffer (bsc#1120423).
- nvme: Do not remove namespaces during reset (bsc#1131673).
- nvme: flush scan_work when resetting controller (bsc#1131673).
- objtool: Fix function fallthrough detection (bsc#1058115).
- ocfs2: fix ocfs2 read inode data panic in ocfs2_iget (bsc#1136434).
- ocfs2: turn on OCFS2_FS_STATS setting(bsc#1134393) We need to turn on OCFS2_FS_STATS kernel configuration setting, to fix bsc#1134393.
- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).
- omapfb: add missing of_node_put after of_device_is_available (bsc#1051510).
- openvswitch: add seqadj extension when NAT is used (bsc#1051510).
- openvswitch: fix flow actions reallocation (bsc#1051510).
- p54: drop device reference count if fails to enable device (bsc#1135642).
- packet: fix reserve calculation (git-fixes).
- packet: in packet_snd start writing at link layer allocation (git-fixes).
- packet: refine ring v3 block size test to hold one frame (git-fixes).
- packet: reset network header if packet shorter than ll reserved space (git-fixes).
- packet: validate msg_namelen in send directly (git-fixes).
- packets: Always register packet sk in the same order (networking-stable-19_03_28).
- pci: Factor out pcie_retrain_link() function (git-fixes).
- pci: Mark AMD Stoney Radeon R7 GPU ATS as broken (bsc#1051510).
- pci: Mark Atheros AR9462 to avoid bus reset (bsc#1051510).
- pci: Work around Pericom pcie-to-pci bridge Retrain Link erratum (git-fixes).
- pci: endpoint: Use EPC's device in dma_alloc_coherent()/dma_free_coherent() (git-fixes).
- phy: sun4i-usb: Make sure to disable PHY0 passby for peripheral mode (bsc#1051510).
- platform/x86: alienware-wmi: printing the wrong error code (bsc#1051510).
- platform/x86: dell-rbtn: Add missing #include (bsc#1051510).
- platform/x86: intel_pmc_ipc: adding error handling (bsc#1051510).
- platform/x86: intel_punit_ipc: Revert 'Fix resource ioremap warning' (bsc#1051510).
- platform/x86: pmc_atom: Add Lex 3I380D industrial PC to critclk_systems DMI table (bsc#1051510).
- platform/x86: pmc_atom: Add several Beckhoff Automation boards to critclk_systems DMI table (bsc#1051510).
- platform/x86: pmc_atom: Drop __initconst on dmi table (bsc#1051510).
- platform/x86: sony-laptop: Fix unintentional fall-through (bsc#1051510).
- power: supply: axp20x_usb_power: Fix typo in VBUS current limit macros (bsc#1051510).
- power: supply: axp288_charger: Fix unchecked return value (bsc#1051510).
- powerpc/eeh: Fix race with driver un/bind (bsc#1065729).
- powerpc/msi: Fix NULL pointer access in teardown code (bsc#1065729).
- powerpc/perf: Fix MMCRA corruption by bhrb_filter (bsc#1053043).
- powerpc/powernv/idle: Restore IAMR after idle (bsc#1065729).
- powerpc/process: Fix sparse address space warnings (bsc#1065729).
- powerpc: Always initialize input array when calling epapr_hypercall() (bsc#1065729).
- powerpc: Fix HMIs on big-endian with CONFIG_RELOCATABLE=y (bsc#1065729).
- proc/kcore: do not bounds check against address 0 (bsc#1051510).
- proc/sysctl: fix return error for proc_doulongvec_minmax() (bsc#1051510).
- proc: revalidate kernel thread inodes to root:root (bsc#1051510).
- ptrace: take into account saved_sigmask in PTRACE{GET,SET}SIGMASK (git-fixes).
- pwm: Fix deadlock warning when removing PWM device (bsc#1051510).
- pwm: meson: Consider 128 a valid pre-divider (bsc#1051510).
- pwm: meson: Do not disable PWM when setting duty repeatedly (bsc#1051510).
- pwm: meson: Use the spin-lock only to protect register modifications (bsc#1051510).
- pwm: tiehrpwm: Update shadow register for disabling PWMs (bsc#1051510).
- qla2xxx: allow irqbalance control in non-MQ mode (bsc#1128979).
- qla2xxx: always allocate qla_tgt_wq (bsc#1131451).
- qmi_wwan: add Olicard 600 (bsc#1051510).
- rdma/hns: Fix bug that caused srq creation to fail (bsc#1104427 ).
- rdma/rxe: Consider skb reserve space based on netdev of GID (bsc#1082387, bsc#1103992).
- regulator: tps65086: Fix tps65086_ldoa1_ranges for selector 0xB (bsc#1051510).
- rt2x00: do not increment sequence number while re-transmitting (bsc#1051510).
- rtc: da9063: set uie_unsupported when relevant (bsc#1051510).
- rtc: sh: Fix invalid alarm warning for non-enabled alarm (bsc#1051510).
- rtlwifi: rtl8723ae: Fix missing break in switch statement (bsc#1051510).
- rxrpc: Fix error reception on AF_INET6 sockets (git-fixes).
- rxrpc: Fix transport sockopts to get IPv4 errors on an IPv6 socket (git-fixes).
- s390/ism: ignore some errors during deregistration (bsc#1129857 LTC#176247).
- s390/qdio: clear intparm during shutdown (bsc#1134597 LTC#177516).
- sc16is7xx: missing unregister/delete driver on error in sc16is7xx_init() (bsc#1051510).
- sc16is7xx: move label 'err_spi' to correct section (bsc#1051510).
- sc16is7xx: put err_spi and err_i2c into correct #ifdef (bsc#1051510).
- scripts: override locale from environment when running recordmcount.pl (bsc#1134354).
- scsi: qedf: fixup bit operations (bsc#1135542).
- scsi: qedf: fixup locking in qedf_restart_rport() (bsc#1135542).
- scsi: qedf: missing kref_put in qedf_xmit() (bsc#1135542).
- scsi: qla2xxx: Declare local functions 'static' (bsc#1137444).
- scsi: qla2xxx: Fix function argument descriptions (bsc#1118139).
- scsi: qla2xxx: Fix memory corruption during hba reset test (bsc#1118139).
- scsi: qla2xxx: Fix panic in qla_dfs_tgt_counters_show (bsc#1132044).
- scsi: qla2xxx: Improve several kernel-doc headers (bsc#1137444).
- scsi: qla2xxx: Introduce a switch/case statement in qlt_xmit_tm_rsp() (bsc#1137444).
- scsi: qla2xxx: Make qla2x00_sysfs_write_nvram() easier to analyze (bsc#1137444).
- scsi: qla2xxx: Make sure that qlafx00_ioctl_iosb_entry() initializes 'res' (bsc#1137444).
- scsi: qla2xxx: NULL check before some freeing functions is not needed (bsc#1137444).
- scsi: qla2xxx: Remove a set-but-not-used variable (bsc#1137444).
- scsi: qla2xxx: Remove two arguments from qlafx00_error_entry() (bsc#1137444).
- scsi: qla2xxx: Remove unused symbols (bsc#1118139).
- scsi: qla2xxx: Split the __qla2x00_abort_all_cmds() function (bsc#1137444).
- scsi: qla2xxx: Use %p for printing pointers (bsc#1118139).
- scsi: qla2xxx: fix error message on qla2400 (bsc#1118139).
- scsi: qla2xxx: fix spelling mistake: 'existant' -&gt; 'existent' (bsc#1118139).
- scsi: qla2xxx: fully convert to the generic DMA API (bsc#1137444).
- scsi: qla2xxx: fx00 copypaste typo (bsc#1118139).
- scsi: qla2xxx: remove the unused tcm_qla2xxx_cmd_wq (bsc#1118139).
- scsi: qla2xxx: use lower_32_bits and upper_32_bits instead of reinventing them (bsc#1137444).
- sctp: avoid running the sctp state machine recursively (networking-stable-19_05_04).
- sctp: fix identification of new acks for SFR-CACC (git-fixes).
- sctp: get sctphdr by offset in sctp_compute_cksum (networking-stable-19_03_28).
- sctp: initialize _pad of sockaddr_in before copying to user memory (networking-stable-19_04_10).
- sctp: only update outstanding_bytes for transmitted queue when doing prsctp_prune (git-fixes).
- sctp: set frag_point in sctp_setsockopt_maxseg correctly` (git-fixes).
- selinux: use kernel linux/socket.h for genheaders and mdp (bsc#1134810).
- serial: 8250_pxa: honor the port number from devicetree (bsc#1051510).
- serial: ar933x_uart: Fix build failure with disabled console (bsc#1051510).
- serial: uartps: console_setup() can't be placed to init section (bsc#1051510).
- signal: Always notice exiting tasks (git-fixes).
- signal: Better detection of synchronous signals (git-fixes).
- signal: Restore the stop PTRACE_EVENT_EXIT (git-fixes).
- smc: move unhash as early as possible in smc_release() (bsc#1129857 LTC#176247).
- soc/fsl/qe: Fix an error code in qe_pin_request() (bsc#1051510).
- soc/tegra: pmc: Drop locking from tegra_powergate_is_powered() (bsc#1051510).
- spi: Micrel eth switch: declare missing of table (bsc#1051510).
- spi: ST ST95HF NFC: declare missing of table (bsc#1051510).
- spi: a3700: Clear DATA_OUT when performing a read (bsc#1051510).
- spi: bcm2835aux: fix driver to not allow 65535 (=-1) cs-gpios (bsc#1051510).
- spi: bcm2835aux: setup gpio-cs to output and correct level during setup (bsc#1051510).
- spi: bcm2835aux: warn in dmesg that native cs is not really supported (bsc#1051510).
- spi: rspi: Fix sequencer reset during initialization (bsc#1051510).
- ssb: Fix possible NULL pointer dereference in ssb_host_pcmcia_exit (bsc#1051510).
- staging: rtl8188eu: Fix potential NULL pointer dereference of kcalloc (bsc#1051510).
- stm class: Fix an endless loop in channel allocation (bsc#1051510).
- stm class: Fix channel free in stm output free path (bsc#1051510).
- stm class: Prevent division by zero (bsc#1051510).
- stmmac: pci: Adjust IOT2000 matching (networking-stable-19_04_30).
- supported.conf: Add openvswitch to kernel-default-base (bsc#1124839).
- supported.conf: Add openvswitch to kernel-default-base (bsc#1124839).
- switchtec: Fix unintended mask of MRPC event (git-fixes).
- tcp: Ensure DCTCP reacts to losses (networking-stable-19_04_10).
- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).
- tcp: do not use ipv6 header for ipv4 flow (networking-stable-19_03_28).
- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).
- tcp: limit payload size of sacked skbs (bsc#1137586).
- tcp: purge write queue in tcp_connect_init() (git-fixes).
- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).
- tcp: tcp_grow_window() needs to respect tcp_space() (networking-stable-19_04_19).
- team: fix possible recursive locking when add slaves (networking-stable-19_04_30).
- team: set slave to promisc if team is already in promisc mode (bsc#1051510).
- thermal/int340x_thermal: Add additional UUIDs (bsc#1051510).
- thermal/int340x_thermal: fix mode setting (bsc#1051510).
- thermal: cpu_cooling: Actually trace CPU load in thermal_power_cpu_get_power (bsc#1051510).
- thunderx: eliminate extra calls to put_page() for pages held for recycling (networking-stable-19_03_28).
- thunderx: enable page recycling for non-XDP case (networking-stable-19_03_28).
- tipc: fix hanging clients using poll with EPOLLOUT flag (git-fixes).
- tipc: missing entries in name table of publications (networking-stable-19_04_19).
- tools lib traceevent: Fix missing equality check for strcmp (bsc#1129770).
- tracing: Fix partial reading of trace event's id file (bsc#1136573).
- treewide: Use DEVICE_ATTR_WO (bsc#1137739).
- tty: increase the default flip buffer limit to 2*640K (bsc#1051510).
- tty: pty: Fix race condition between release_one_tty and pty_write (bsc#1051510).
- tty: serial_core, add -&gt;install (bnc#1129693).
- tty: vt.c: Fix TIOCL_BLANKSCREEN console blanking if blankinterval == 0 (bsc#1051510).
- tun: add a missing rcu_read_unlock() in error path (networking-stable-19_03_28).
- tun: properly test for IFF_UP (networking-stable-19_03_28).
- uas: fix alignment of scatter/gather segments (bsc#1129770).
- udp: use indirect call wrappers for GRO socket lookup (bsc#1124503).
- ufs: fix braino in ufs_get_inode_gid() for solaris UFS flavour (bsc#1135323).
- usb-storage: Set virt_boundary_mask to avoid SG overflows (bsc#1051510).
- usb: cdc-acm: fix unthrottle races (bsc#1051510).
- usb: core: Fix bug caused by duplicate interface PM usage counter (bsc#1051510).
- usb: core: Fix unterminated string returned by usb_string() (bsc#1051510).
- usb: dwc3: Fix default lpm_nyet_threshold value (bsc#1051510).
- usb: gadget: net2272: Fix net2272_dequeue() (bsc#1051510).
- usb: gadget: net2280: Fix net2280_dequeue() (bsc#1051510).
- usb: gadget: net2280: Fix overrun of OUT messages (bsc#1051510).
- usb: serial: f81232: fix interrupt worker not stop (bsc#1051510).
- usb: serial: fix unthrottle races (bsc#1051510).
- usb: u132-hcd: fix resource leak (bsc#1051510).
- usb: usb251xb: fix to avoid potential NULL pointer dereference (bsc#1051510).
- usb: usbip: fix isoc packet num validation in get_pipe (bsc#1051510).
- usb: w1 ds2490: Fix bug caused by improper use of altsetting array (bsc#1051510).
- usb: yurex: Fix protection fault after device removal (bsc#1051510).
- userfaultfd: use RCU to free the task struct when fork fails (git-fixes).
- vfio/mdev: Avoid release parent reference during error path (bsc#1051510).
- vfio/mdev: Fix aborting mdev child device removal if one fails (bsc#1051510).
- vfio/pci: use correct format characters (bsc#1051510).
- vfio_pci: Enable memory accesses before calling pci_map_rom (bsc#1051510).
- vhost/vsock: fix reset orphans race with close timeout (bsc#1051510).
- vhost: reject zero size iova range (networking-stable-19_04_19).
- virtio-blk: limit number of hw queues by nr_cpu_ids (bsc#1051510).
- virtio: Honour 'may_reduce_num' in vring_create_virtqueue (bsc#1051510).
- virtio_pci: fix a NULL pointer reference in vp_del_vqs (bsc#1051510).
- vrf: check accept_source_route on the original netdevice (networking-stable-19_04_10).
- vsock/virtio: Initialize core virtio vsock before registering the driver (bsc#1051510).
- vsock/virtio: fix kernel panic after device hot-unplug (bsc#1051510).
- vsock/virtio: fix kernel panic from virtio_transport_reset_no_sock (bsc#1051510).
- vsock/virtio: reset connected sockets on device removal (bsc#1051510).
- vt: always call notifier with the console lock held (bsc#1051510).
- vxlan: Do not call gro_cells_destroy() before device is unregistered (networking-stable-19_03_28).
- x86/speculation/mds: Fix documentation typo (bsc#1135642).
- x86_64: Add gap to int3 to allow for call emulation (bsc#1099658).
- x86_64: Allow breakpoints to emulate call instructions (bsc#1099658).
- xenbus: drop useless LIST_HEAD in xenbus_write_watch() and xenbus_file_write() (bsc#1065600).
- xfrm6: avoid potential infinite loop in _decode_session6() (git-fixes).
- xfrm6: call kfree_skb when skb is toobig (git-fixes).
- xfrm: Fix stack-out-of-bounds read on socket policy lookup (git-fixes).
- xfrm: Return error on unknown encap_type in init_state (git-fixes).
- xfrm: Validate address prefix lengths in the xfrm selector (git-fixes).
- xfrm: fix 'passing zero to ERR_PTR()' warning (git-fixes).
- xfrm: fix missing dst_release() after policy blocking lbcast and multicast (git-fixes).
- xfrm: fix xfrm_do_migrate() with AEAD e.g(AES-GCM) (git-fixes).
- xfrm: reset crypto_done when iterating over multiple input xfrms (git-fixes).
- xfrm: reset transport header back to network header after all input transforms ahave been applied (git-fixes).
- xfrm_user: prevent leaking 2 bytes of kernel memory (git-fixes).
- xfs: add log item pinning error injection tag (bsc#1114427).
- xfs: buffer lru reference count error injection tag (bsc#1114427).
- xfs: check _btree_check_block value (bsc#1123663).
- xfs: convert drop_writes to use the errortag mechanism (bsc#1114427).
- xfs: create block pointer check functions (bsc#1123663).
- xfs: create inode pointer verifiers (bsc#1114427).
- xfs: detect and fix bad summary counts at mount (bsc#1114427).
- xfs: export _inobt_btrec_to_irec and _ialloc_cluster_alignment for scrub (bsc#1114427).
- xfs: export various function for the online scrubber (bsc#1123663).
- xfs: expose errortag knobs via sysfs (bsc#1114427).
- xfs: fix unused variable warning in xfs_buf_set_ref() (bsc#1114427).
- xfs: force summary counter recalc at next mount (bsc#1114427).
- xfs: kill meaningless variable 'zero' (bsc#1106011).
- xfs: make errortag a per-mountpoint structure (bsc#1123663).
- xfs: move error injection tags into their own file (bsc#1114427).
- xfs: prepare xfs_break_layouts() for another layout type (bsc#1106011).
- xfs: prepare xfs_break_layouts() to be called with XFS_MMAPLOCK_EXCL (bsc#1106011).
- xfs: refactor btree block header checking functions (bsc#1123663).
- xfs: refactor btree pointer checks (bsc#1123663).
- xfs: refactor unmount record write (bsc#1114427).
- xfs: remove unneeded parameter from XFS_TEST_ERROR (bsc#1123663).
- xfs: remove xfs_zero_range (bsc#1106011).
- xfs: rename MAXPATHLEN to XFS_SYMLINK_MAXLEN (bsc#1123663).
- xfs: replace log_badcrc_factor knob with error injection tag (bsc#1114427).
- xfs: sanity-check the unused space before trying to use it (bsc#1123663).
- xfs: serialize unaligned dio writes against all other dio writes (bsc#1134936).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-17"/>
	<updated date="2019-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050242">SUSE bug 1050242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051510">SUSE bug 1051510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053043">SUSE bug 1053043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056787">SUSE bug 1056787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058115">SUSE bug 1058115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063638">SUSE bug 1063638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064802">SUSE bug 1064802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066129">SUSE bug 1066129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068546">SUSE bug 1068546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075020">SUSE bug 1075020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082387">SUSE bug 1082387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083647">SUSE bug 1083647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085535">SUSE bug 1085535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099658">SUSE bug 1099658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103992">SUSE bug 1103992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104353">SUSE bug 1104353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104427">SUSE bug 1104427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106011">SUSE bug 1106011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106284">SUSE bug 1106284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108838">SUSE bug 1108838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110946">SUSE bug 1110946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111696">SUSE bug 1111696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112063">SUSE bug 1112063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113722">SUSE bug 1113722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114427">SUSE bug 1114427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114893">SUSE bug 1114893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115688">SUSE bug 1115688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117158">SUSE bug 1117158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117561">SUSE bug 1117561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118139">SUSE bug 1118139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119843">SUSE bug 1119843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120091">SUSE bug 1120091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120423">SUSE bug 1120423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120566">SUSE bug 1120566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120843">SUSE bug 1120843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120902">SUSE bug 1120902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122776">SUSE bug 1122776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123454">SUSE bug 1123454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123663">SUSE bug 1123663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124503">SUSE bug 1124503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124839">SUSE bug 1124839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126356">SUSE bug 1126356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127616">SUSE bug 1127616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128052">SUSE bug 1128052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128904">SUSE bug 1128904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128905">SUSE bug 1128905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128979">SUSE bug 1128979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129138">SUSE bug 1129138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129497">SUSE bug 1129497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129693">SUSE bug 1129693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129770">SUSE bug 1129770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129848">SUSE bug 1129848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129857">SUSE bug 1129857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130409">SUSE bug 1130409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130699">SUSE bug 1130699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130972">SUSE bug 1130972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131451">SUSE bug 1131451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131488">SUSE bug 1131488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131565">SUSE bug 1131565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131673">SUSE bug 1131673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132044">SUSE bug 1132044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132894">SUSE bug 1132894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133176">SUSE bug 1133176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133188">SUSE bug 1133188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133190">SUSE bug 1133190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133320">SUSE bug 1133320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133612">SUSE bug 1133612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133616">SUSE bug 1133616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134160">SUSE bug 1134160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134162">SUSE bug 1134162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134199">SUSE bug 1134199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134200">SUSE bug 1134200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134201">SUSE bug 1134201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134202">SUSE bug 1134202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134203">SUSE bug 1134203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134204">SUSE bug 1134204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134205">SUSE bug 1134205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134354">SUSE bug 1134354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134393">SUSE bug 1134393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134459">SUSE bug 1134459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134460">SUSE bug 1134460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134461">SUSE bug 1134461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134537">SUSE bug 1134537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134591">SUSE bug 1134591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134597">SUSE bug 1134597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134607">SUSE bug 1134607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134651">SUSE bug 1134651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134671">SUSE bug 1134671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134760">SUSE bug 1134760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134806">SUSE bug 1134806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134810">SUSE bug 1134810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134813">SUSE bug 1134813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134848">SUSE bug 1134848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134936">SUSE bug 1134936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135006">SUSE bug 1135006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135007">SUSE bug 1135007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135008">SUSE bug 1135008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135056">SUSE bug 1135056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135100">SUSE bug 1135100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135120">SUSE bug 1135120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135278">SUSE bug 1135278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135281">SUSE bug 1135281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135309">SUSE bug 1135309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135312">SUSE bug 1135312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135314">SUSE bug 1135314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135315">SUSE bug 1135315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135316">SUSE bug 1135316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135320">SUSE bug 1135320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135323">SUSE bug 1135323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135330">SUSE bug 1135330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135492">SUSE bug 1135492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135542">SUSE bug 1135542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135556">SUSE bug 1135556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135603">SUSE bug 1135603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135642">SUSE bug 1135642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135661">SUSE bug 1135661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135758">SUSE bug 1135758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136206">SUSE bug 1136206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136424">SUSE bug 1136424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136428">SUSE bug 1136428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136430">SUSE bug 1136430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136432">SUSE bug 1136432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136434">SUSE bug 1136434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136435">SUSE bug 1136435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136438">SUSE bug 1136438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136439">SUSE bug 1136439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136477">SUSE bug 1136477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136478">SUSE bug 1136478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136573">SUSE bug 1136573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136586">SUSE bug 1136586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136881">SUSE bug 1136881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136990">SUSE bug 1136990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137151">SUSE bug 1137151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137152">SUSE bug 1137152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137153">SUSE bug 1137153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137162">SUSE bug 1137162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137372">SUSE bug 1137372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137444">SUSE bug 1137444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137739">SUSE bug 1137739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137752">SUSE bug 1137752</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7191/">CVE-2018-7191</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10124/">CVE-2019-10124</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11085/">CVE-2019-11085</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11479/">CVE-2019-11479</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11486/">CVE-2019-11486</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11815/">CVE-2019-11815</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11833/">CVE-2019-11833</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11884/">CVE-2019-11884</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12382/">CVE-2019-12382</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5489/">CVE-2019-5489</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521890" comment="kernel-default-4.12.14-95.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521891" comment="kernel-default-devel-4.12.14-95.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521892" comment="kernel-default-extra-4.12.14-95.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521893" comment="kernel-devel-4.12.14-95.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521894" comment="kernel-macros-4.12.14-95.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521895" comment="kernel-source-4.12.14-95.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521896" comment="kernel-syms-4.12.14-95.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78739" version="1" class="patch">
	<metadata>
		<title>Security update for doxygen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1136364" ref_url="https://bugzilla.suse.com/1136364" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10245" ref_url="https://www.suse.com/security/cve/CVE-2016-10245/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005588.html" source="SUSE-SU"/>
		<description>
This update for doxygen fixes the following issues:

- CVE-2016-10245: XSS was possible via insufficient sanitization of the query parameter in templates/html/search_opensearch.php  (bsc#1136364)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-19"/>
	<updated date="2019-06-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1136364">SUSE bug 1136364</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10245/">CVE-2016-10245</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521492" comment="doxygen-1.8.6-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78740" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1138301" ref_url="https://bugzilla.suse.com/1138301" source="BUGZILLA"/>
		<reference ref_id="1138302" ref_url="https://bugzilla.suse.com/1138302" source="BUGZILLA"/>
		<reference ref_id="1138303" ref_url="https://bugzilla.suse.com/1138303" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10161" ref_url="https://www.suse.com/security/cve/CVE-2019-10161/" source="CVE"/>
		<reference ref_id="CVE-2019-10166" ref_url="https://www.suse.com/security/cve/CVE-2019-10166/" source="CVE"/>
		<reference ref_id="CVE-2019-10167" ref_url="https://www.suse.com/security/cve/CVE-2019-10167/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005605.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Security issues fixed:

- CVE-2019-10161: Fixed virDomainSaveImageGetXMLDesc API which could accept a path
  parameter pointing anywhere on the system and potentially leading to execution
  of a malicious file with root privileges by libvirtd (bsc#1138301).
- CVE-2019-10166: Fixed an issue with virDomainManagedSaveDefineXML which could have
  been used to alter the domain's config used for managedsave or execute arbitrary
  emulator binaries (bsc#1138302).
- CVE-2019-10167: Fixed an issue with virConnectGetDomainCapabilities API which
  could have been used to execute arbitrary emulators (bsc#1138303).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138301">SUSE bug 1138301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138302">SUSE bug 1138302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138303">SUSE bug 1138303</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10161/">CVE-2019-10161</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10166/">CVE-2019-10166</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10167/">CVE-2019-10167</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521897" comment="libvirt-4.0.0-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521898" comment="libvirt-admin-4.0.0-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521899" comment="libvirt-client-4.0.0-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521900" comment="libvirt-daemon-4.0.0-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521901" comment="libvirt-daemon-config-network-4.0.0-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521902" comment="libvirt-daemon-config-nwfilter-4.0.0-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521903" comment="libvirt-daemon-driver-interface-4.0.0-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521904" comment="libvirt-daemon-driver-libxl-4.0.0-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521905" comment="libvirt-daemon-driver-lxc-4.0.0-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521906" comment="libvirt-daemon-driver-network-4.0.0-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521907" comment="libvirt-daemon-driver-nodedev-4.0.0-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521908" comment="libvirt-daemon-driver-nwfilter-4.0.0-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521909" comment="libvirt-daemon-driver-qemu-4.0.0-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521910" comment="libvirt-daemon-driver-secret-4.0.0-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521911" comment="libvirt-daemon-driver-storage-4.0.0-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521912" comment="libvirt-daemon-driver-storage-core-4.0.0-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521913" comment="libvirt-daemon-driver-storage-disk-4.0.0-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521914" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521915" comment="libvirt-daemon-driver-storage-logical-4.0.0-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521916" comment="libvirt-daemon-driver-storage-mpath-4.0.0-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521917" comment="libvirt-daemon-driver-storage-rbd-4.0.0-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521918" comment="libvirt-daemon-driver-storage-scsi-4.0.0-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521919" comment="libvirt-daemon-lxc-4.0.0-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521920" comment="libvirt-daemon-qemu-4.0.0-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521921" comment="libvirt-daemon-xen-4.0.0-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521922" comment="libvirt-doc-4.0.0-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521923" comment="libvirt-libs-4.0.0-8.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78741" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1133375" ref_url="https://bugzilla.suse.com/1133375" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9928" ref_url="https://www.suse.com/security/cve/CVE-2019-9928/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005593.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-plugins-base fixes the following issue:
Security issue fixed:

- CVE-2019-9928: Fixed a heap-based overflow in the rtsp connection parser (bsc#1133375).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133375">SUSE bug 1133375</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9928/">CVE-2019-9928</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521493" comment="gstreamer-plugins-base-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521494" comment="gstreamer-plugins-base-lang-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521495" comment="libgstallocators-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521496" comment="libgstapp-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521497" comment="libgstapp-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521498" comment="libgstaudio-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521499" comment="libgstaudio-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521500" comment="libgstfft-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521501" comment="libgstfft-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521502" comment="libgstpbutils-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521503" comment="libgstpbutils-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521504" comment="libgstriff-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521505" comment="libgstrtp-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521506" comment="libgstrtsp-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521507" comment="libgstsdp-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521508" comment="libgsttag-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521509" comment="libgsttag-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521510" comment="libgstvideo-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521511" comment="libgstvideo-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521512" comment="typelib-1_0-GstAudio-1_0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521513" comment="typelib-1_0-GstPbutils-1_0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521514" comment="typelib-1_0-GstTag-1_0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521515" comment="typelib-1_0-GstVideo-1_0-1.8.3-13.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78742" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1136976" ref_url="https://bugzilla.suse.com/1136976" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8457" ref_url="https://www.suse.com/security/cve/CVE-2019-8457/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005603.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

Security issue fixed:	  

- CVE-2019-8457: Fixed a Heap out-of-bound read in rtreenode() when handling invalid rtree tables (bsc#1136976).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136976">SUSE bug 1136976</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8457/">CVE-2019-8457</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521516" comment="libsqlite3-0-3.8.10.2-9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521517" comment="libsqlite3-0-32bit-3.8.10.2-9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521518" comment="sqlite3-3.8.10.2-9.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78743" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1133375" ref_url="https://bugzilla.suse.com/1133375" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9928" ref_url="https://www.suse.com/security/cve/CVE-2019-9928/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005598.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-0_10-plugins-base fixes the following issues:

Security issue fixed:

- CVE-2019-9928: Fixed a heap-based overflow in the rtsp connection parser (bsc#1133375).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133375">SUSE bug 1133375</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9928/">CVE-2019-9928</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521519" comment="gstreamer-0_10-plugins-base-0.10.36-18.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521520" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-18.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521521" comment="gstreamer-0_10-plugins-base-lang-0.10.36-18.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521522" comment="libgstapp-0_10-0-0.10.36-18.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521523" comment="libgstapp-0_10-0-32bit-0.10.36-18.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521524" comment="libgstinterfaces-0_10-0-0.10.36-18.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521525" comment="libgstinterfaces-0_10-0-32bit-0.10.36-18.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78744" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1136570" ref_url="https://bugzilla.suse.com/1136570" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005608.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

- Fix the previous fix for CVE-2019-3860 (bsc#1136570, bsc#1128481)
  (Out-of-bounds reads with specially crafted SFTP packets)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-21"/>
	<updated date="2019-08-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136570">SUSE bug 1136570</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521526" comment="libssh2-1-1.4.3-20.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521924" comment="libssh2-1-32bit-1.4.3-20.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78745" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl098 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1127080" ref_url="https://bugzilla.suse.com/1127080" source="BUGZILLA"/>
		<reference ref_id="1131291" ref_url="https://bugzilla.suse.com/1131291" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1559" ref_url="https://www.suse.com/security/cve/CVE-2019-1559/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005602.html" source="SUSE-SU"/>
		<description>
This update for compat-openssl098 fixes the following issues:

- CVE-2019-1559: Fix 0-byte record padding oracle via SSL_shutdown (bsc#1127080)
- Reject invalid EC point coordinates (bsc#1131291)
- Fixed 'The 9 Lives of Bleichenbacher's CAT: Cache ATtacks on TLS Implementations' (bsc#1117951)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127080">SUSE bug 1127080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131291">SUSE bug 1131291</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1559/">CVE-2019-1559</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521527" comment="libopenssl0_9_8-0.9.8j-106.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78746" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1136021" ref_url="https://bugzilla.suse.com/1136021" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2019:1610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005604.html" source="SUSE-SU"/>
		<description>
This update for wireshark to version 2.4.15 fixes the following issues:

Security issue fixed:

- Fixed a denial of service in the dissection engine (bsc#1136021). 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1136021">SUSE bug 1136021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521528" comment="libwireshark9-2.4.15-48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521529" comment="libwiretap7-2.4.15-48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521530" comment="libwscodecs1-2.4.15-48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521531" comment="libwsutil8-2.4.15-48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521532" comment="wireshark-2.4.15-48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521533" comment="wireshark-gtk-2.4.15-48.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78747" version="1" class="patch">
	<metadata>
		<title>Security update for netpbm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1024288" ref_url="https://bugzilla.suse.com/1024288" source="BUGZILLA"/>
		<reference ref_id="1024291" ref_url="https://bugzilla.suse.com/1024291" source="BUGZILLA"/>
		<reference ref_id="1086777" ref_url="https://bugzilla.suse.com/1086777" source="BUGZILLA"/>
		<reference ref_id="1136936" ref_url="https://bugzilla.suse.com/1136936" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2579" ref_url="https://www.suse.com/security/cve/CVE-2017-2579/" source="CVE"/>
		<reference ref_id="CVE-2017-2580" ref_url="https://www.suse.com/security/cve/CVE-2017-2580/" source="CVE"/>
		<reference ref_id="CVE-2018-8975" ref_url="https://www.suse.com/security/cve/CVE-2018-8975/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005619.html" source="SUSE-SU"/>
		<description>
This update for netpbm fixes the following issues:

Security issues fixed:

- CVE-2018-8975: The pm_mallocarray2 function allowed remote attackers to cause
  a denial of service (heap-based buffer over-read) via a crafted image file (bsc#1086777).
- CVE-2017-2579: Fixed out-of-bounds read in expandCodeOntoStack() (bsc#1024288).
- CVE-2017-2580: Fixed out-of-bounds write of heap data in addPixelToRaster() function (bsc#1024291).

- create netpbm-vulnerable subpackage and move pstopnm there (bsc#1136936)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024288">SUSE bug 1024288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024291">SUSE bug 1024291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086777">SUSE bug 1086777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136936">SUSE bug 1136936</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2579/">CVE-2017-2579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2580/">CVE-2017-2580</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8975/">CVE-2018-8975</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521534" comment="libnetpbm11-10.66.3-8.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521535" comment="libnetpbm11-32bit-10.66.3-8.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521536" comment="netpbm-10.66.3-8.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78748" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1138872" ref_url="https://bugzilla.suse.com/1138872" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11708" ref_url="https://www.suse.com/security/cve/CVE-2019-11708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005624.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Mozilla Firefox Firefox 60.7.2
  MFSA 2019-19 (bsc#1138872)

- CVE-2019-11708: Fix sandbox escape using Prompt:Open.
  * Insufficient vetting of parameters passed with the Prompt:Open IPC
    message between child and parent processes could result in the non-sandboxed
    parent process opening web content chosen by a compromised child process.
    When combined with additional vulnerabilities this could result in executing
    arbitrary code on the user's computer.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-22"/>
	<updated date="2019-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138872">SUSE bug 1138872</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11708/">CVE-2019-11708</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521537" comment="MozillaFirefox-60.7.2-109.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521538" comment="MozillaFirefox-translations-common-60.7.2-109.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78749" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1133204" ref_url="https://bugzilla.suse.com/1133204" source="BUGZILLA"/>
		<reference ref_id="1133205" ref_url="https://bugzilla.suse.com/1133205" source="BUGZILLA"/>
		<reference ref_id="1133498" ref_url="https://bugzilla.suse.com/1133498" source="BUGZILLA"/>
		<reference ref_id="1133501" ref_url="https://bugzilla.suse.com/1133501" source="BUGZILLA"/>
		<reference ref_id="1134075" ref_url="https://bugzilla.suse.com/1134075" source="BUGZILLA"/>
		<reference ref_id="1135232" ref_url="https://bugzilla.suse.com/1135232" source="BUGZILLA"/>
		<reference ref_id="1135236" ref_url="https://bugzilla.suse.com/1135236" source="BUGZILLA"/>
		<reference ref_id="1136183" ref_url="https://bugzilla.suse.com/1136183" source="BUGZILLA"/>
		<reference ref_id="1136732" ref_url="https://bugzilla.suse.com/1136732" source="BUGZILLA"/>
		<reference ref_id="1138425" ref_url="https://bugzilla.suse.com/1138425" source="BUGZILLA"/>
		<reference ref_id="1138464" ref_url="https://bugzilla.suse.com/1138464" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12805" ref_url="https://www.suse.com/security/cve/CVE-2017-12805/" source="CVE"/>
		<reference ref_id="CVE-2017-12806" ref_url="https://www.suse.com/security/cve/CVE-2017-12806/" source="CVE"/>
		<reference ref_id="CVE-2019-10131" ref_url="https://www.suse.com/security/cve/CVE-2019-10131/" source="CVE"/>
		<reference ref_id="CVE-2019-11470" ref_url="https://www.suse.com/security/cve/CVE-2019-11470/" source="CVE"/>
		<reference ref_id="CVE-2019-11472" ref_url="https://www.suse.com/security/cve/CVE-2019-11472/" source="CVE"/>
		<reference ref_id="CVE-2019-11505" ref_url="https://www.suse.com/security/cve/CVE-2019-11505/" source="CVE"/>
		<reference ref_id="CVE-2019-11506" ref_url="https://www.suse.com/security/cve/CVE-2019-11506/" source="CVE"/>
		<reference ref_id="CVE-2019-11597" ref_url="https://www.suse.com/security/cve/CVE-2019-11597/" source="CVE"/>
		<reference ref_id="CVE-2019-11598" ref_url="https://www.suse.com/security/cve/CVE-2019-11598/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-11597: Fixed a heap-based buffer over-read in the WriteTIFFImage() (bsc#1138464).
- Fixed a file content disclosure via SVG and WMF decoding (bsc#1138425).- CVE-2019-11472: Fixed a denial of service in ReadXWDImage() (bsc#1133204).
- CVE-2019-11470: Fixed a denial of service in ReadCINImage() (bsc#1133205).
- CVE-2019-11506: Fixed a heap-based buffer overflow in the WriteMATLABImage() (bsc#1133498).
- CVE-2019-11505: Fixed a heap-based buffer overflow in the WritePDBImage() (bsc#1133501).
- CVE-2019-10131: Fixed a off-by-one read in formatIPTCfromBuffer function in coders/meta.c (bsc#1134075).
- CVE-2017-12806: Fixed a denial of service through memory exhaustion in format8BIM() (bsc#1135232).
- CVE-2017-12805: Fixed a denial of service through memory exhaustion in ReadTIFFImage() (bsc#1135236).
- CVE-2019-11598: Fixed a heap-based buffer over-read in WritePNMImage() (bsc#1136732)
    
We also now disable PCL in the -SUSE configuration, as it also uses ghostscript for decoding (bsc#1136183)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-25"/>
	<updated date="2019-06-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1133204">SUSE bug 1133204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133205">SUSE bug 1133205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133498">SUSE bug 1133498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133501">SUSE bug 1133501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134075">SUSE bug 1134075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135232">SUSE bug 1135232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135236">SUSE bug 1135236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136183">SUSE bug 1136183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136732">SUSE bug 1136732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138425">SUSE bug 1138425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138464">SUSE bug 1138464</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12805/">CVE-2017-12805</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12806/">CVE-2017-12806</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10131/">CVE-2019-10131</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11470/">CVE-2019-11470</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11472/">CVE-2019-11472</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11505/">CVE-2019-11505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11506/">CVE-2019-11506</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11597/">CVE-2019-11597</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11598/">CVE-2019-11598</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521540" comment="ImageMagick-6.8.8.1-71.123.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521541" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.123.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521542" comment="ImageMagick-config-6-upstream-6.8.8.1-71.123.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521543" comment="libMagick++-6_Q16-3-6.8.8.1-71.123.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521544" comment="libMagickCore-6_Q16-1-6.8.8.1-71.123.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521545" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.123.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521546" comment="libMagickWand-6_Q16-1-6.8.8.1-71.123.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78750" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1117993" ref_url="https://bugzilla.suse.com/1117993" source="BUGZILLA"/>
		<reference ref_id="1132678" ref_url="https://bugzilla.suse.com/1132678" source="BUGZILLA"/>
		<reference ref_id="941234" ref_url="https://bugzilla.suse.com/941234" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5180" ref_url="https://www.suse.com/security/cve/CVE-2015-5180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005635.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issue fixed:

- CVE-2015-5180: Fixed a NULL pointer dereference with internal QTYPE (bsc#941234).

Feature work:

- IBM zSeries arch13 hardware support in glibc added (fate#327072, bsc#1132678)

Other issue addressed: 

- Fixed a concurrency issue with ldconfig (bsc#1117993).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-27"/>
	<updated date="2019-06-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117993">SUSE bug 1117993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132678">SUSE bug 1132678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941234">SUSE bug 941234</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5180/">CVE-2015-5180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521925" comment="glibc-2.22-100.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521926" comment="glibc-32bit-2.22-100.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521927" comment="glibc-devel-2.22-100.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521928" comment="glibc-devel-32bit-2.22-100.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521929" comment="glibc-i18ndata-2.22-100.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521930" comment="glibc-locale-2.22-100.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521931" comment="glibc-locale-32bit-2.22-100.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521932" comment="nscd-2.22-100.15.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78751" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1054429" ref_url="https://bugzilla.suse.com/1054429" source="BUGZILLA"/>
		<reference ref_id="1076958" ref_url="https://bugzilla.suse.com/1076958" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15107" ref_url="https://www.suse.com/security/cve/CVE-2017-15107/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005642.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

Security issue fixed:

- CVE-2017-15107: Fixed a vulnerability in DNSSEC implementation. Processing of
  wildcard synthesized NSEC records may result improper validation for non-existance. (bsc#1076958)

Non-security issue fixed:

- Reload system dbus to pick up policy change on install (bsc#1054429).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-02"/>
	<updated date="2019-07-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1054429">SUSE bug 1054429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076958">SUSE bug 1076958</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15107/">CVE-2017-15107</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521547" comment="dnsmasq-2.78-18.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78752" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1061599" ref_url="https://bugzilla.suse.com/1061599" source="BUGZILLA"/>
		<reference ref_id="1107116" ref_url="https://bugzilla.suse.com/1107116" source="BUGZILLA"/>
		<reference ref_id="1107121" ref_url="https://bugzilla.suse.com/1107121" source="BUGZILLA"/>
		<reference ref_id="1137001" ref_url="https://bugzilla.suse.com/1137001" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16428" ref_url="https://www.suse.com/security/cve/CVE-2018-16428/" source="CVE"/>
		<reference ref_id="CVE-2018-16429" ref_url="https://www.suse.com/security/cve/CVE-2018-16429/" source="CVE"/>
		<reference ref_id="CVE-2019-12450" ref_url="https://www.suse.com/security/cve/CVE-2019-12450/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005644.html" source="SUSE-SU"/>
		<description>
This update for glib2 provides the following fix:


Security issues fixed:

- CVE-2019-12450: Fixed an improper file permission when copy operation
  takes place (bsc#1137001).     
- CVE-2018-16428: Avoid a null pointer dereference that could crash glib2 users in markup processing (bnc#1107121).
- CVE-2018-16429: Fixed out-of-bounds read vulnerability ing_markup_parse_context_parse() (bsc#1107116).

Non-security issues fixed:

- Install dummy *-mimeapps.list files to prevent dead symlinks. (bsc#1061599)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-02"/>
	<updated date="2019-07-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1061599">SUSE bug 1061599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107116">SUSE bug 1107116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107121">SUSE bug 1107121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137001">SUSE bug 1137001</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16428/">CVE-2018-16428</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16429/">CVE-2018-16429</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12450/">CVE-2019-12450</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521548" comment="glib2-lang-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521549" comment="glib2-tools-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521550" comment="libgio-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521551" comment="libgio-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521552" comment="libgio-fam-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521553" comment="libglib-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521554" comment="libglib-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521555" comment="libgmodule-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521556" comment="libgmodule-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521557" comment="libgobject-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521558" comment="libgobject-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521559" comment="libgthread-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521560" comment="libgthread-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78753" version="1" class="patch">
	<metadata>
		<title>Security update for elfutils (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1030472" ref_url="https://bugzilla.suse.com/1030472" source="BUGZILLA"/>
		<reference ref_id="1030476" ref_url="https://bugzilla.suse.com/1030476" source="BUGZILLA"/>
		<reference ref_id="1033084" ref_url="https://bugzilla.suse.com/1033084" source="BUGZILLA"/>
		<reference ref_id="1033085" ref_url="https://bugzilla.suse.com/1033085" source="BUGZILLA"/>
		<reference ref_id="1033087" ref_url="https://bugzilla.suse.com/1033087" source="BUGZILLA"/>
		<reference ref_id="1033088" ref_url="https://bugzilla.suse.com/1033088" source="BUGZILLA"/>
		<reference ref_id="1033089" ref_url="https://bugzilla.suse.com/1033089" source="BUGZILLA"/>
		<reference ref_id="1033090" ref_url="https://bugzilla.suse.com/1033090" source="BUGZILLA"/>
		<reference ref_id="1106390" ref_url="https://bugzilla.suse.com/1106390" source="BUGZILLA"/>
		<reference ref_id="1107067" ref_url="https://bugzilla.suse.com/1107067" source="BUGZILLA"/>
		<reference ref_id="1111973" ref_url="https://bugzilla.suse.com/1111973" source="BUGZILLA"/>
		<reference ref_id="1112723" ref_url="https://bugzilla.suse.com/1112723" source="BUGZILLA"/>
		<reference ref_id="1112726" ref_url="https://bugzilla.suse.com/1112726" source="BUGZILLA"/>
		<reference ref_id="1123685" ref_url="https://bugzilla.suse.com/1123685" source="BUGZILLA"/>
		<reference ref_id="1125007" ref_url="https://bugzilla.suse.com/1125007" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10254" ref_url="https://www.suse.com/security/cve/CVE-2016-10254/" source="CVE"/>
		<reference ref_id="CVE-2016-10255" ref_url="https://www.suse.com/security/cve/CVE-2016-10255/" source="CVE"/>
		<reference ref_id="CVE-2017-7607" ref_url="https://www.suse.com/security/cve/CVE-2017-7607/" source="CVE"/>
		<reference ref_id="CVE-2017-7608" ref_url="https://www.suse.com/security/cve/CVE-2017-7608/" source="CVE"/>
		<reference ref_id="CVE-2017-7610" ref_url="https://www.suse.com/security/cve/CVE-2017-7610/" source="CVE"/>
		<reference ref_id="CVE-2017-7611" ref_url="https://www.suse.com/security/cve/CVE-2017-7611/" source="CVE"/>
		<reference ref_id="CVE-2017-7612" ref_url="https://www.suse.com/security/cve/CVE-2017-7612/" source="CVE"/>
		<reference ref_id="CVE-2017-7613" ref_url="https://www.suse.com/security/cve/CVE-2017-7613/" source="CVE"/>
		<reference ref_id="CVE-2018-16062" ref_url="https://www.suse.com/security/cve/CVE-2018-16062/" source="CVE"/>
		<reference ref_id="CVE-2018-16403" ref_url="https://www.suse.com/security/cve/CVE-2018-16403/" source="CVE"/>
		<reference ref_id="CVE-2018-18310" ref_url="https://www.suse.com/security/cve/CVE-2018-18310/" source="CVE"/>
		<reference ref_id="CVE-2018-18520" ref_url="https://www.suse.com/security/cve/CVE-2018-18520/" source="CVE"/>
		<reference ref_id="CVE-2018-18521" ref_url="https://www.suse.com/security/cve/CVE-2018-18521/" source="CVE"/>
		<reference ref_id="CVE-2019-7150" ref_url="https://www.suse.com/security/cve/CVE-2019-7150/" source="CVE"/>
		<reference ref_id="CVE-2019-7665" ref_url="https://www.suse.com/security/cve/CVE-2019-7665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<description>
This update for elfutils fixes the following issues:

Security issues fixed: 	  

- CVE-2018-16403: Fixed a heap-based buffer over-read that could have led to Denial of Service (bsc#1107067).  
- CVE-2016-10254: Fixed a memory allocation failure in alloxate_elf (bsc#1030472).
- CVE-2019-7665: NT_PLATFORM core file note should be a zero terminated string (bsc#1125007).
- CVE-2016-10255: Fixed a memory allocation failure in libelf_set_rawdata_wrlock (bsc#1030476).
- CVE-2019-7150: Added a missing check in dwfl_segment_report_module which could have allowed truncated files 
  to be read (bsc#1123685).
- CVE-2018-16062: Fixed a heap-buffer-overflow (bsc#1106390).
- CVE-2017-7611: Fixed a heap-based buffer over-read that could have led to Denial of Service (bsc#1033088).
- CVE-2017-7613: Fixed denial of service caused by the missing validation of the number of sections 
  and the number of segments in a crafted ELF file (bsc#1033090).
- CVE-2017-7607: Fixed a heap-based buffer overflow in handle_gnu_hash (bsc#1033084).
- CVE-2017-7608: Fixed a heap-based buffer overflow in ebl_object_note_type_name() (bsc#1033085).
- CVE-2017-7610: Fixed a heap-based buffer overflow in check_group (bsc#1033087).
- CVE-2018-18521: Fixed multiple divide-by-zero vulnerabilities in function arlib_add_symbols() (bsc#1112723).
- CVE-2017-7612: Fixed a denial of service in check_sysv_hash() via a crafted ELF file (bsc#1033089).
- CVE-2018-18310: Fixed an invalid address read in dwfl_segment_report_module.c (bsc#1111973).
- CVE-2018-18520: Fixed bad handling of ar files inside are files (bsc#1112726).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-03"/>
	<updated date="2019-07-03"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1030472">SUSE bug 1030472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030476">SUSE bug 1030476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033084">SUSE bug 1033084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033085">SUSE bug 1033085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033087">SUSE bug 1033087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033088">SUSE bug 1033088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033089">SUSE bug 1033089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033090">SUSE bug 1033090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106390">SUSE bug 1106390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107067">SUSE bug 1107067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111973">SUSE bug 1111973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112723">SUSE bug 1112723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112726">SUSE bug 1112726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123685">SUSE bug 1123685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125007">SUSE bug 1125007</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10254/">CVE-2016-10254</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10255/">CVE-2016-10255</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7607/">CVE-2017-7607</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7608/">CVE-2017-7608</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7610/">CVE-2017-7610</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7611/">CVE-2017-7611</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7612/">CVE-2017-7612</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7613/">CVE-2017-7613</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16062/">CVE-2018-16062</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16403/">CVE-2018-16403</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18310/">CVE-2018-18310</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18520/">CVE-2018-18520</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18521/">CVE-2018-18521</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7150/">CVE-2019-7150</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7665/">CVE-2019-7665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521933" comment="libelf-devel-0.158-7.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78754" version="1" class="patch">
	<metadata>
		<title>Security update for libu2f-host (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1124781" ref_url="https://bugzilla.suse.com/1124781" source="BUGZILLA"/>
		<reference ref_id="1128140" ref_url="https://bugzilla.suse.com/1128140" source="BUGZILLA"/>
		<reference ref_id="1135727" ref_url="https://bugzilla.suse.com/1135727" source="BUGZILLA"/>
		<reference ref_id="1135729" ref_url="https://bugzilla.suse.com/1135729" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20340" ref_url="https://www.suse.com/security/cve/CVE-2018-20340/" source="CVE"/>
		<reference ref_id="CVE-2019-12209" ref_url="https://www.suse.com/security/cve/CVE-2019-12209/" source="CVE"/>
		<reference ref_id="CVE-2019-12210" ref_url="https://www.suse.com/security/cve/CVE-2019-12210/" source="CVE"/>
		<reference ref_id="CVE-2019-9578" ref_url="https://www.suse.com/security/cve/CVE-2019-9578/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005663.html" source="SUSE-SU"/>
		<description>
This update for libu2f-host and pam_u2f to version 1.0.8 fixes the following issues:
	  
Security issues fixed for libu2f-host: 

- CVE-2019-9578: Fixed a memory leak due to a wrong parse of init's response (bsc#1128140).
- CVE-2018-20340: Fixed an unchecked buffer, which could allow a buffer overflow 
  with a custom made malicious USB device (bsc#1124781).

Security issues fixed for pam_u2f:

- CVE-2019-12209: Fixed an issue where symlinks in the user's directory were followed (bsc#1135729).
- CVE-2019-12210: Fixed file descriptor leaks (bsc#1135727).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-04"/>
	<updated date="2019-07-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124781">SUSE bug 1124781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128140">SUSE bug 1128140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135727">SUSE bug 1135727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135729">SUSE bug 1135729</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20340/">CVE-2018-20340</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12209/">CVE-2019-12209</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12210/">CVE-2019-12210</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9578/">CVE-2019-9578</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521934" comment="libu2f-host0-1.1.6-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521935" comment="pam_u2f-1.0.8-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78755" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1138034" ref_url="https://bugzilla.suse.com/1138034" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10164" ref_url="https://www.suse.com/security/cve/CVE-2019-10164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005674.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 to version 10.9 fixes the following issue:

Security issue fixed:	  

- CVE-2019-10164: Fixed buffer-overflow vulnerabilities in SCRAM verifier parsing (bsc#1138034).

More information at https://www.postgresql.org/docs/10/release-10-9.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-09"/>
	<updated date="2019-07-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138034">SUSE bug 1138034</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-10164/">CVE-2019-10164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521936" comment="libecpg6-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521937" comment="libpq5-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521938" comment="libpq5-32bit-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521939" comment="postgresql10-10.9-1.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78756" version="1" class="patch">
	<metadata>
		<title>Security update for zeromq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1140255" ref_url="https://bugzilla.suse.com/1140255" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13132" ref_url="https://www.suse.com/security/cve/CVE-2019-13132/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005675.html" source="SUSE-SU"/>
		<description>
This update for zeromq fixes the following issues:

  - CVE-2019-13132: An unauthenticated remote attacker could have exploited
  a stack overflow vulnerability on a server that is supposed to be protected
  by encryption and authentication to potentially gain a remote code execution.
  (bsc#1140255)

  		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-09"/>
	<updated date="2019-07-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140255">SUSE bug 1140255</bugzilla>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13132/">CVE-2019-13132</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521940" comment="libzmq3-4.0.4-15.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78757" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1120281" ref_url="https://bugzilla.suse.com/1120281" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000845" ref_url="https://www.suse.com/security/cve/CVE-2018-1000845/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005065.html" source="SUSE-SU"/>
		<description>
This update for avahi fixes the following issues:

Security issue fixed:

- CVE-2018-1000845: Fixed DNS amplification and reflection to spoofed addresses (DOS) (bsc#1120281)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-25"/>
	<updated date="2019-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120281">SUSE bug 1120281</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000845/">CVE-2018-1000845</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521569" comment="avahi-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521570" comment="avahi-lang-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521571" comment="libavahi-client3-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521572" comment="libavahi-client3-32bit-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521573" comment="libavahi-common3-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521574" comment="libavahi-common3-32bit-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521575" comment="libavahi-core7-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521576" comment="libavahi-glib1-0.6.32-32.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521577" comment="libavahi-glib1-32bit-0.6.32-32.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521578" comment="libavahi-gobject0-0.6.32-32.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521579" comment="libavahi-ui-gtk3-0-0.6.32-32.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521580" comment="libavahi-ui0-0.6.32-32.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521581" comment="libdns_sd-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521582" comment="libdns_sd-32bit-0.6.32-32.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78758" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1091203" ref_url="https://bugzilla.suse.com/1091203" source="BUGZILLA"/>
		<reference ref_id="1104289" ref_url="https://bugzilla.suse.com/1104289" source="BUGZILLA"/>
		<reference ref_id="1110720" ref_url="https://bugzilla.suse.com/1110720" source="BUGZILLA"/>
		<reference ref_id="1122456" ref_url="https://bugzilla.suse.com/1122456" source="BUGZILLA"/>
		<reference ref_id="1128292" ref_url="https://bugzilla.suse.com/1128292" source="BUGZILLA"/>
		<reference ref_id="1132303" ref_url="https://bugzilla.suse.com/1132303" source="BUGZILLA"/>
		<reference ref_id="1136334" ref_url="https://bugzilla.suse.com/1136334" source="BUGZILLA"/>
		<reference ref_id="1136498" ref_url="https://bugzilla.suse.com/1136498" source="BUGZILLA"/>
		<reference ref_id="1139383" ref_url="https://bugzilla.suse.com/1139383" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005686.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware aligns the firmware code with
SUSE Linux Enterprise Server 15. The version is now at 20190618.
  
Please refer to the kernel-firmware rpm changelog file to see the full history of changes.		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-10"/>
	<updated date="2019-07-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091203">SUSE bug 1091203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104289">SUSE bug 1104289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110720">SUSE bug 1110720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122456">SUSE bug 1122456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128292">SUSE bug 1128292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132303">SUSE bug 1132303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136334">SUSE bug 1136334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136498">SUSE bug 1136498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139383">SUSE bug 1139383</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521941" comment="kernel-firmware-20190618-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521942" comment="ucode-amd-20190618-5.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78759" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1139959" ref_url="https://bugzilla.suse.com/1139959" source="BUGZILLA"/>
		<reference ref_id="1140122" ref_url="https://bugzilla.suse.com/1140122" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13012" ref_url="https://www.suse.com/security/cve/CVE-2019-13012/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005704.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

Security issue fixed:

- CVE-2019-13012: Fixed improper restriction of file permissions when creating directories (bsc#1139959).

Non-security issue fixed:

- Added explicit requires between libglib2 and libgio2 (bsc#1140122).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-12"/>
	<updated date="2019-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139959">SUSE bug 1139959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140122">SUSE bug 1140122</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-13012/">CVE-2019-13012</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521943" comment="glib2-lang-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521944" comment="glib2-tools-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521945" comment="libgio-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521946" comment="libgio-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521947" comment="libgio-fam-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521948" comment="libglib-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521949" comment="libglib-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521950" comment="libgmodule-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521951" comment="libgmodule-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521952" comment="libgobject-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521953" comment="libgobject-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521954" comment="libgthread-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521955" comment="libgthread-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78760" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1139937" ref_url="https://bugzilla.suse.com/1139937" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20843" ref_url="https://www.suse.com/security/cve/CVE-2018-20843/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005703.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

Security issue fixed:

- CVE-2018-20843: Fixed a denial of service triggered by high resource consumption 
  in the XML parser when XML names contain a large amount of colons (bsc#1139937).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-12"/>
	<updated date="2019-07-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1139937">SUSE bug 1139937</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20843/">CVE-2018-20843</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521956" comment="expat-2.1.0-21.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521957" comment="libexpat1-2.1.0-21.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521958" comment="libexpat1-32bit-2.1.0-21.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78761" version="1" class="patch">
	<metadata>
		<title>Security update for xrdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1014524" ref_url="https://bugzilla.suse.com/1014524" source="BUGZILLA"/>
		<reference ref_id="1015567" ref_url="https://bugzilla.suse.com/1015567" source="BUGZILLA"/>
		<reference ref_id="1029912" ref_url="https://bugzilla.suse.com/1029912" source="BUGZILLA"/>
		<reference ref_id="1060644" ref_url="https://bugzilla.suse.com/1060644" source="BUGZILLA"/>
		<reference ref_id="1069591" ref_url="https://bugzilla.suse.com/1069591" source="BUGZILLA"/>
		<reference ref_id="1090174" ref_url="https://bugzilla.suse.com/1090174" source="BUGZILLA"/>
		<reference ref_id="1100453" ref_url="https://bugzilla.suse.com/1100453" source="BUGZILLA"/>
		<reference ref_id="1101506" ref_url="https://bugzilla.suse.com/1101506" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1430" ref_url="https://www.suse.com/security/cve/CVE-2013-1430/" source="CVE"/>
		<reference ref_id="CVE-2017-16927" ref_url="https://www.suse.com/security/cve/CVE-2017-16927/" source="CVE"/>
		<reference ref_id="CVE-2017-6967" ref_url="https://www.suse.com/security/cve/CVE-2017-6967/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005708.html" source="SUSE-SU"/>
		<description>
This update for xrdp fixes the following issues:

These security issues were fixed:

- CVE-2013-1430:  When successfully logging in using RDP into an xrdp session, 
  the file ~/.vnc/sesman_${username}_passwd was created. Its content was the equivalent 
  of the user's cleartext password, DES encrypted with a known key (bsc#1015567).
- CVE-2017-16927: The scp_v0s_accept function in sesman/libscp/libscp_v0.c in the session manager 
  in xrdp through used an untrusted integer as a write length, which could lead to a 
  local denial of service (bsc#1069591).
- CVE-2017-6967: Fixed call of the PAM function auth_start_session(). This lead
  to to PAM session modules not being properly initialized, with a potential
  consequence of incorrect configurations or elevation of privileges, aka a
  pam_limits.so bypass (bsc#1029912).

These non-security issues were fixed:

- The KillDisconnected option for TigerVNC Xvnc sessions is now supported (bsc#1101506)
- Fixed an issue with delayed X KeyRelease events (bsc#1100453)    
- Force xrdp-sesman.service to start after xrdp.service. (bsc#1014524)
- Avoid use of hard-coded sesman port. (bsc#1060644)
- Fixed a regression connecting from Windows 10. (bsc#1090174)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-15"/>
	<updated date="2019-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1014524">SUSE bug 1014524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015567">SUSE bug 1015567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029912">SUSE bug 1029912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060644">SUSE bug 1060644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069591">SUSE bug 1069591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090174">SUSE bug 1090174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100453">SUSE bug 1100453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101506">SUSE bug 1101506</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2013-1430/">CVE-2013-1430</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16927/">CVE-2017-16927</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6967/">CVE-2017-6967</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521959" comment="xrdp-0.9.0~git.1456906198.f422461-21.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78762" version="1" class="patch">
	<metadata>
		<title>Security update for podofo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1035596" ref_url="https://bugzilla.suse.com/1035596" source="BUGZILLA"/>
		<reference ref_id="1076962" ref_url="https://bugzilla.suse.com/1076962" source="BUGZILLA"/>
		<reference ref_id="1096890" ref_url="https://bugzilla.suse.com/1096890" source="BUGZILLA"/>
		<reference ref_id="1099720" ref_url="https://bugzilla.suse.com/1099720" source="BUGZILLA"/>
		<reference ref_id="1124357" ref_url="https://bugzilla.suse.com/1124357" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8054" ref_url="https://www.suse.com/security/cve/CVE-2017-8054/" source="CVE"/>
		<reference ref_id="CVE-2018-11255" ref_url="https://www.suse.com/security/cve/CVE-2018-11255/" source="CVE"/>
		<reference ref_id="CVE-2018-12982" ref_url="https://www.suse.com/security/cve/CVE-2018-12982/" source="CVE"/>
		<reference ref_id="CVE-2018-20751" ref_url="https://www.suse.com/security/cve/CVE-2018-20751/" source="CVE"/>
		<reference ref_id="CVE-2018-5783" ref_url="https://www.suse.com/security/cve/CVE-2018-5783/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005711.html" source="SUSE-SU"/>
		<description>
This update for podofo fixes the following issues:

Security issues fixed:

- CVE-2017-8054: Fixed a vulnerability in PdfPagesTree::GetPageNodeFromArray function which could allow 
  remote attackers to cause Denial of Service (bsc#1035596).
- CVE-2018-5783: Fixed an uncontrolled memory allocation in PdfVecObjects::Reserve function (bsc#1076962). 
- CVE-2018-11255: Fixed a null pointer dereference in PdfPage::GetPageNumber() function which could lead
  to Denial of Service (bsc#1096890).
- CVE-2018-20751: Fixed a null pointer dereference in crop_page function (bsc#1124357).
- CVE-2018-12982: Fixed an invalid memory read in PdfVariant::DelayedLoad() function which could allow 
  remote attackers to cause Denial of Service (bsc#1099720).
- Fixed a buffer overflow in TestEncrypt function.
- Fixed a null pointer dereference in PdfTranslator-setTarget function.
- Fixed a heap based buffer overflow PdfVariant:DelayedLoad function.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-15"/>
	<updated date="2019-07-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1035596">SUSE bug 1035596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076962">SUSE bug 1076962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096890">SUSE bug 1096890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099720">SUSE bug 1099720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124357">SUSE bug 1124357</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8054/">CVE-2017-8054</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11255/">CVE-2018-11255</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12982/">CVE-2018-12982</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-20751/">CVE-2018-20751</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5783/">CVE-2018-5783</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521960" comment="libpodofo0_9_2-0.9.2-3.9.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78763" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1133291" ref_url="https://bugzilla.suse.com/1133291" source="BUGZILLA"/>
		<reference ref_id="1135715" ref_url="https://bugzilla.suse.com/1135715" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6237" ref_url="https://www.suse.com/security/cve/CVE-2019-6237/" source="CVE"/>
		<reference ref_id="CVE-2019-8571" ref_url="https://www.suse.com/security/cve/CVE-2019-8571/" source="CVE"/>
		<reference ref_id="CVE-2019-8583" ref_url="https://www.suse.com/security/cve/CVE-2019-8583/" source="CVE"/>
		<reference ref_id="CVE-2019-8584" ref_url="https://www.suse.com/security/cve/CVE-2019-8584/" source="CVE"/>
		<reference ref_id="CVE-2019-8586" ref_url="https://www.suse.com/security/cve/CVE-2019-8586/" source="CVE"/>
		<reference ref_id="CVE-2019-8587" ref_url="https://www.suse.com/security/cve/CVE-2019-8587/" source="CVE"/>
		<reference ref_id="CVE-2019-8594" ref_url="https://www.suse.com/security/cve/CVE-2019-8594/" source="CVE"/>
		<reference ref_id="CVE-2019-8595" ref_url="https://www.suse.com/security/cve/CVE-2019-8595/" source="CVE"/>
		<reference ref_id="CVE-2019-8596" ref_url="https://www.suse.com/security/cve/CVE-2019-8596/" source="CVE"/>
		<reference ref_id="CVE-2019-8597" ref_url="https://www.suse.com/security/cve/CVE-2019-8597/" source="CVE"/>
		<reference ref_id="CVE-2019-8601" ref_url="https://www.suse.com/security/cve/CVE-2019-8601/" source="CVE"/>
		<reference ref_id="CVE-2019-8607" ref_url="https://www.suse.com/security/cve/CVE-2019-8607/" source="CVE"/>
		<reference ref_id="CVE-2019-8608" ref_url="https://www.suse.com/security/cve/CVE-2019-8608/" source="CVE"/>
		<reference ref_id="CVE-2019-8609" ref_url="https://www.suse.com/security/cve/CVE-2019-8609/" source="CVE"/>
		<reference ref_id="CVE-2019-8610" ref_url="https://www.suse.com/security/cve/CVE-2019-8610/" source="CVE"/>
		<reference ref_id="CVE-2019-8611" ref_url="https://www.suse.com/security/cve/CVE-2019-8611/" source="CVE"/>
		<reference ref_id="CVE-2019-8615" ref_url="https://www.suse.com/security/cve/CVE-2019-8615/" source="CVE"/>
		<reference ref_id="CVE-2019-8619" ref_url="https://www.suse.com/security/cve/CVE-2019-8619/" source="CVE"/>
		<reference ref_id="CVE-2019-8622" ref_url="https://www.suse.com/security/cve/CVE-2019-8622/" source="CVE"/>
		<reference ref_id="CVE-2019-8623" ref_url="https://www.suse.com/security/cve/CVE-2019-8623/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.24.2 fixes the following issues:

Security issues fixed:

- CVE-2019-6237, CVE-2019-8571, CVE-2019-8583, CVE-2019-8584, CVE-2019-8586,
  CVE-2019-8587, CVE-2019-8594, CVE-2019-8595, CVE-2019-8596, CVE-2019-8597,
  CVE-2019-8601, CVE-2019-8607, CVE-2019-8608, CVE-2019-8609, CVE-2019-8610,
  CVE-2019-8615, CVE-2019-8611, CVE-2019-8619, CVE-2019-8622, CVE-2019-8623 (bsc#1135715).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-15"/>
	<updated date="2019-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133291">SUSE bug 1133291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-6237/">CVE-2019-6237</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8571/">CVE-2019-8571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8583/">CVE-2019-8583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8584/">CVE-2019-8584</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8586/">CVE-2019-8586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8587/">CVE-2019-8587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8594/">CVE-2019-8594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8595/">CVE-2019-8595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8596/">CVE-2019-8596</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8597/">CVE-2019-8597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8601/">CVE-2019-8601</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8607/">CVE-2019-8607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8608/">CVE-2019-8608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8609/">CVE-2019-8609</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8610/">CVE-2019-8610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8611/">CVE-2019-8611</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8615/">CVE-2019-8615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8619/">CVE-2019-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8622/">CVE-2019-8622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8623/">CVE-2019-8623</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521961" comment="libjavascriptcoregtk-4_0-18-2.24.2-2.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521962" comment="libwebkit2gtk-4_0-37-2.24.2-2.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521963" comment="libwebkit2gtk3-lang-2.24.2-2.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521964" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-2.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521965" comment="typelib-1_0-WebKit2-4_0-2.24.2-2.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521966" comment="webkit2gtk-4_0-injected-bundles-2.24.2-2.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78764" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1051510" ref_url="https://bugzilla.suse.com/1051510" source="BUGZILLA"/>
		<reference ref_id="1061840" ref_url="https://bugzilla.suse.com/1061840" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1088047" ref_url="https://bugzilla.suse.com/1088047" source="BUGZILLA"/>
		<reference ref_id="1094555" ref_url="https://bugzilla.suse.com/1094555" source="BUGZILLA"/>
		<reference ref_id="1098633" ref_url="https://bugzilla.suse.com/1098633" source="BUGZILLA"/>
		<reference ref_id="1106383" ref_url="https://bugzilla.suse.com/1106383" source="BUGZILLA"/>
		<reference ref_id="1106751" ref_url="https://bugzilla.suse.com/1106751" source="BUGZILLA"/>
		<reference ref_id="1109137" ref_url="https://bugzilla.suse.com/1109137" source="BUGZILLA"/>
		<reference ref_id="1114279" ref_url="https://bugzilla.suse.com/1114279" source="BUGZILLA"/>
		<reference ref_id="1119532" ref_url="https://bugzilla.suse.com/1119532" source="BUGZILLA"/>
		<reference ref_id="1120423" ref_url="https://bugzilla.suse.com/1120423" source="BUGZILLA"/>
		<reference ref_id="1124167" ref_url="https://bugzilla.suse.com/1124167" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1128432" ref_url="https://bugzilla.suse.com/1128432" source="BUGZILLA"/>
		<reference ref_id="1128902" ref_url="https://bugzilla.suse.com/1128902" source="BUGZILLA"/>
		<reference ref_id="1128910" ref_url="https://bugzilla.suse.com/1128910" source="BUGZILLA"/>
		<reference ref_id="1132154" ref_url="https://bugzilla.suse.com/1132154" source="BUGZILLA"/>
		<reference ref_id="1132390" ref_url="https://bugzilla.suse.com/1132390" source="BUGZILLA"/>
		<reference ref_id="1133401" ref_url="https://bugzilla.suse.com/1133401" source="BUGZILLA"/>
		<reference ref_id="1133738" ref_url="https://bugzilla.suse.com/1133738" source="BUGZILLA"/>
		<reference ref_id="1134303" ref_url="https://bugzilla.suse.com/1134303" source="BUGZILLA"/>
		<reference ref_id="1134395" ref_url="https://bugzilla.suse.com/1134395" source="BUGZILLA"/>
		<reference ref_id="1135296" ref_url="https://bugzilla.suse.com/1135296" source="BUGZILLA"/>
		<reference ref_id="1135556" ref_url="https://bugzilla.suse.com/1135556" source="BUGZILLA"/>
		<reference ref_id="1135642" ref_url="https://bugzilla.suse.com/1135642" source="BUGZILLA"/>
		<reference ref_id="1136157" ref_url="https://bugzilla.suse.com/1136157" source="BUGZILLA"/>
		<reference ref_id="1136811" ref_url="https://bugzilla.suse.com/1136811" source="BUGZILLA"/>
		<reference ref_id="1136922" ref_url="https://bugzilla.suse.com/1136922" source="BUGZILLA"/>
		<reference ref_id="1137103" ref_url="https://bugzilla.suse.com/1137103" source="BUGZILLA"/>
		<reference ref_id="1137194" ref_url="https://bugzilla.suse.com/1137194" source="BUGZILLA"/>
		<reference ref_id="1137221" ref_url="https://bugzilla.suse.com/1137221" source="BUGZILLA"/>
		<reference ref_id="1137366" ref_url="https://bugzilla.suse.com/1137366" source="BUGZILLA"/>
		<reference ref_id="1137429" ref_url="https://bugzilla.suse.com/1137429" source="BUGZILLA"/>
		<reference ref_id="1137625" ref_url="https://bugzilla.suse.com/1137625" source="BUGZILLA"/>
		<reference ref_id="1137728" ref_url="https://bugzilla.suse.com/1137728" source="BUGZILLA"/>
		<reference ref_id="1137884" ref_url="https://bugzilla.suse.com/1137884" source="BUGZILLA"/>
		<reference ref_id="1137995" ref_url="https://bugzilla.suse.com/1137995" source="BUGZILLA"/>
		<reference ref_id="1137996" ref_url="https://bugzilla.suse.com/1137996" source="BUGZILLA"/>
		<reference ref_id="1137998" ref_url="https://bugzilla.suse.com/1137998" source="BUGZILLA"/>
		<reference ref_id="1137999" ref_url="https://bugzilla.suse.com/1137999" source="BUGZILLA"/>
		<reference ref_id="1138000" ref_url="https://bugzilla.suse.com/1138000" source="BUGZILLA"/>
		<reference ref_id="1138002" ref_url="https://bugzilla.suse.com/1138002" source="BUGZILLA"/>
		<reference ref_id="1138003" ref_url="https://bugzilla.suse.com/1138003" source="BUGZILLA"/>
		<reference ref_id="1138005" ref_url="https://bugzilla.suse.com/1138005" source="BUGZILLA"/>
		<reference ref_id="1138006" ref_url="https://bugzilla.suse.com/1138006" source="BUGZILLA"/>
		<reference ref_id="1138007" ref_url="https://bugzilla.suse.com/1138007" source="BUGZILLA"/>
		<reference ref_id="1138008" ref_url="https://bugzilla.suse.com/1138008" source="BUGZILLA"/>
		<reference ref_id="1138009" ref_url="https://bugzilla.suse.com/1138009" source="BUGZILLA"/>
		<reference ref_id="1138010" ref_url="https://bugzilla.suse.com/1138010" source="BUGZILLA"/>
		<reference ref_id="1138011" ref_url="https://bugzilla.suse.com/1138011" source="BUGZILLA"/>
		<reference ref_id="1138012" ref_url="https://bugzilla.suse.com/1138012" source="BUGZILLA"/>
		<reference ref_id="1138013" ref_url="https://bugzilla.suse.com/1138013" source="BUGZILLA"/>
		<reference ref_id="1138014" ref_url="https://bugzilla.suse.com/1138014" source="BUGZILLA"/>
		<reference ref_id="1138015" ref_url="https://bugzilla.suse.com/1138015" source="BUGZILLA"/>
		<reference ref_id="1138016" ref_url="https://bugzilla.suse.com/1138016" source="BUGZILLA"/>
		<reference ref_id="1138017" ref_url="https://bugzilla.suse.com/1138017" source="BUGZILLA"/>
		<reference ref_id="1138018" ref_url="https://bugzilla.suse.com/1138018" source="BUGZILLA"/>
		<reference ref_id="1138019" ref_url="https://bugzilla.suse.com/1138019" source="BUGZILLA"/>
		<reference ref_id="1138291" ref_url="https://bugzilla.suse.com/1138291" source="BUGZILLA"/>
		<reference ref_id="1138293" ref_url="https://bugzilla.suse.com/1138293" source="BUGZILLA"/>
		<reference ref_id="1138374" ref_url="https://bugzilla.suse.com/1138374" source="BUGZILLA"/>
		<reference ref_id="1138375" ref_url="https://bugzilla.suse.com/1138375" source="BUGZILLA"/>
		<reference ref_id="1138589" ref_url="https://bugzilla.suse.com/1138589" source="BUGZILLA"/>
		<reference ref_id="1138719" ref_url="https://bugzilla.suse.com/1138719" source="BUGZILLA"/>
		<reference ref_id="1139751" ref_url="https://bugzilla.suse.com/1139751" source="BUGZILLA"/>
		<reference ref_id="1139771" ref_url="https://bugzilla.suse.com/1139771" source="BUGZILLA"/>
		<reference ref_id="1139782" ref_url="https://bugzilla.suse.com/1139782" source="BUGZILLA"/>
		<reference ref_id="1139865" ref_url="https://bugzilla.suse.com/1139865" source="BUGZILLA"/>
		<reference ref_id="1140133" ref_url="https://bugzilla.suse.com/1140133" source="BUGZILLA"/>
		<reference ref_id="1140328" ref_url="https://bugzilla.suse.com/1140328" source="BUGZILLA"/>
		<reference ref_id="1140405" ref_url="https://bugzilla.suse.com/1140405" source="BUGZILLA"/>
		<reference ref_id="1140424" ref_url="https://bugzilla.suse.com/1140424" source="BUGZILLA"/>
		<reference ref_id="1140428" ref_url="https://bugzilla.suse.com/1140428" source="BUGZILLA"/>
		<reference ref_id="1140575" ref_url="https://bugzilla.suse.com/1140575" source="BUGZILLA"/>
		<reference ref_id="1140577" ref_url="https://bugzilla.suse.com/1140577" source="BUGZILLA"/>
		<reference ref_id="1140637" ref_url="https://bugzilla.suse.com/1140637" source="BUGZILLA"/>
		<reference ref_id="1140658" ref_url="https://bugzilla.suse.com/1140658" source="BUGZILLA"/>
		<reference ref_id="1140715" ref_url="https://bugzilla.suse.com/1140715" source="BUGZILLA"/>
		<reference ref_id="1140719" ref_url="https://bugzilla.suse.com/1140719" source="BUGZILLA"/>
		<reference ref_id="1140726" ref_url="https://bugzilla.suse.com/1140726" source="BUGZILLA"/>
		<reference ref_id="1140727" ref_url="https://bugzilla.suse.com/1140727" source="BUGZILLA"/>
		<reference ref_id="1140728" ref_url="https://bugzilla.suse.com/1140728" source="BUGZILLA"/>
		<reference ref_id="1140814" ref_url="https://bugzilla.suse.com/1140814" source="BUGZILLA"/>
		<reference ref_id="1140948" ref_url="https://bugzilla.suse.com/1140948" source="BUGZILLA"/>
		<reference ref_id="821419" ref_url="https://bugzilla.suse.com/821419" source="BUGZILLA"/>
		<reference ref_id="945811" ref_url="https://bugzilla.suse.com/945811" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16871" ref_url="https://www.suse.com/security/cve/CVE-2018-16871/" source="CVE"/>
		<reference ref_id="CVE-2018-20836" ref_url="https://www.suse.com/security/cve/CVE-2018-20836/" source="CVE"/>
		<reference ref_id="CVE-2019-10126" ref_url="https://www.suse.com/security/cve/CVE-2019-10126/" source="CVE"/>
		<reference ref_id="CVE-2019-10638" ref_url="https://www.suse.com/security/cve/CVE-2019-10638/" source="CVE"/>
		<reference ref_id="CVE-2019-10639" ref_url="https://www.suse.com/security/cve/CVE-2019-10639/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11599" ref_url="https://www.suse.com/security/cve/CVE-2019-11599/" source="CVE"/>
		<reference ref_id="CVE-2019-12456" ref_url="https://www.suse.com/security/cve/CVE-2019-12456/" source="CVE"/>
		<reference ref_id="CVE-2019-12614" ref_url="https://www.suse.com/security/cve/CVE-2019-12614/" source="CVE"/>
		<reference ref_id="CVE-2019-12818" ref_url="https://www.suse.com/security/cve/CVE-2019-12818/" source="CVE"/>
		<reference ref_id="CVE-2019-12819" ref_url="https://www.suse.com/security/cve/CVE-2019-12819/" source="CVE"/>
		<description>


The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2019-10638: A device could have been tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may have been conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses. (bnc#1140575)
- CVE-2019-10639: Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it was possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image was exposed. This attack could have been carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic was trivial if the server answered ICMP Echo requests (ping). For client targets, if the target visited the attacker's web page, then WebRTC or gQUIC could be used to force UDP traffic to attacker-controlled IP addresses. (bnc#1140577)
- CVE-2018-20836: A race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, could have lead to a use-after-free. (bnc#1134395)
- CVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c. (bnc#1133738)
- CVE-2019-12614: An unchecked kstrdup might have allowed an attacker to cause denial of service (a NULL pointer dereference and system crash). (bnc#1137194)
- CVE-2019-12819: The function __mdiobus_register() in drivers/net/phy/mdio_bus.c called put_device() which would trigger a fixed_mdio_bus_init use-after-free. This would cause a denial of service. (bnc#1138291)
- CVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may have returned NULL. If the caller did not check for this, it would trigger a NULL pointer dereference. This would cause denial of service. (bnc#1138293)

The following non-security bugs were fixed:

- 6lowpan: Off by one handling -&gt;nexthdr (bsc#1051510).
- acpi / property: fix handling of data_nodes in acpi_get_next_subnode() (bsc#1051510).
- acpi: Add Hygon Dhyana support
- af_key: unconditionally clone on broadcast (bsc#1051510).
- alsa: firewire-lib/fireworks: fix miss detection of received MIDI messages (bsc#1051510).
- alsa: firewire-motu: fix destruction of data for isochronous resources (bsc#1051510).
- alsa: hda - Force polling mode on CNL for fixing codec communication (bsc#1051510).
- alsa: hda/realtek - Change front mic location for Lenovo M710q (bsc#1051510).
- alsa: hda/realtek - Set default power save node to 0 (bsc#1051510).
- alsa: hda/realtek - Update headset mode for ALC256 (bsc#1051510).
- alsa: hda/realtek: Add quirks for several Clevo notebook barebones (bsc#1051510).
- alsa: line6: Fix write on zero-sized buffer (bsc#1051510).
- alsa: oxfw: allow PCM capture for Stanton SCS.1m (bsc#1051510).
- alsa: seq: fix incorrect order of dest_client/dest_ports arguments (bsc#1051510).
- alsa: usb-audio: fix sign unintended sign extension on left shifts (bsc#1051510).
- apparmor: enforce nullbyte at end of tag string (bsc#1051510).
- asoc: cs42xx8: Add regcache mask dirty (bsc#1051510).
- asoc: eukrea-tlv320: fix a leaked reference by adding missing of_node_put (bsc#1051510).
- asoc: fsl_asrc: Fix the issue about unsupported rate (bsc#1051510).
- asoc: fsl_sai: Update is_slave_mode with correct value (bsc#1051510).
- asoc: fsl_utils: fix a leaked reference by adding missing of_node_put (bsc#1051510).
- asoc: hdmi-codec: unlock the device on startup errors (bsc#1051510).
- audit: fix a memory leak bug (bsc#1051510).
- ax25: fix inconsistent lock state in ax25_destroy_timer (bsc#1051510).
- batman-adv: allow updating DAT entry timeouts on incoming ARP Replies (bsc#1051510).
- blk-mq: fix hang caused by freeze/unfreeze sequence (bsc#1128432).
- blk-mq: free hw queue's resource in hctx's release handler (bsc#1140637).
- block: Fix a NULL pointer dereference in generic_make_request() (bsc#1139771).
- bluetooth: Fix faulty expression for minimum encryption key size check (bsc#1140328).
- bluetooth: Replace the bluetooth fix with the upstream commit (bsc#1135556)
- brcmfmac: convert dev_init_lock mutex to completion (bsc#1051510).
- brcmfmac: fix Oops when bringing up interface during USB disconnect (bsc#1051510).
- brcmfmac: fix WARNING during USB disconnect in case of unempty psq (bsc#1051510).
- brcmfmac: fix missing checks for kmemdup (bsc#1051510).
- brcmfmac: fix race during disconnect when USB completion is in progress (bsc#1051510).
- can: af_can: Fix error path of can_init() (bsc#1051510).
- can: flexcan: fix timeout when set small bitrate (bsc#1051510).
- can: purge socket error queue on sock destruct (bsc#1051510).
- ceph: flush dirty inodes before proceeding with remount (bsc#1140405).
- cfg80211: fix memory leak of wiphy device name (bsc#1051510).
- chardev: add additional check for minor range overlap (bsc#1051510).
- clk: rockchip: Turn on 'aclk_dmac1' for suspend on rk3288 (bsc#1051510).
- clk: tegra: Fix PLLM programming on Tegra124+ when PMC overrides divider (bsc#1051510).
- coresight: etb10: Fix handling of perf mode (bsc#1051510).
- coresight: etm4x: Add support to enable ETMv4.2 (bsc#1051510).
- cpu/topology: Export die_id (jsc#SLE-5454).
- cpufreq: AMD: Ignore the check for ProcFeedback in ST/CZ ().
- cpufreq: Add Hygon Dhyana support ().
- crypto: algapi - guard against uninitialized spawn list in crypto_remove_spawns (bsc#1133401).
- crypto: cryptd - Fix skcipher instance memory leak (bsc#1051510).
- crypto: user - prevent operating on larval algorithms (bsc#1133401).
- device core: Consolidate locking and unlocking of parent and device (bsc#1106383).
- dm, dax: Fix detection of DAX support (bsc#1139782).
- dmaengine: imx-sdma: remove BD_INTR for channel0 (bsc#1051510).
- doc: Cope with the deprecation of AutoReporter (bsc#1051510).
- docs: Fix conf.py for Sphinx 2.0 (bsc#1135642).
- documentation: Correct the possible MDS sysfs values (bsc#1135642).
- drbd: Avoid Clang warning about pointless switch statment (bsc#1051510).
- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bsc#1051510).
- drbd: narrow rcu_read_lock in drbd_sync_handshake (bsc#1051510).
- drbd: skip spurious timeout (ping-timeo) when failing promote (bsc#1051510).
- driver core: Establish order of operations for device_add and device_del via bitflag (bsc#1106383).
- driver core: Probe devices asynchronously instead of the driver (bsc#1106383).
- drivers/base: Introduce kill_device() (bsc#1139865).
- drivers/base: kABI fixes for struct device_private (bsc#1106383).
- drivers/rapidio/devices/rio_mport_cdev.c: fix resource leak in error handling path in 'rio_dma_transfer()' (bsc#1051510).
- drivers/rapidio/rio_cm.c: fix potential oops in riocm_ch_listen() (bsc#1051510).
- drivers: misc: fix out-of-bounds access in function param_set_kgdbts_var (bsc#1051510).
- drivers: thermal: tsens: Do not print error message on -EPROBE_DEFER (bsc#1051510).
- drm/amdgpu: fix old fence check in amdgpu_fence_emit (bsc#1051510).
- drm/arm/hdlcd: Allow a bit of clock tolerance (bsc#1051510).
- drm/drv: Hold ref on parent device during drm_device lifetime (bsc#1051510).
- drm/gma500/cdv: Check vbt config bits when detecting lvds panels (bsc#1051510).
- drm/i915/gvt: ignore unexpected pvinfo write (bsc#1051510).
- drm/i915/perf: fix whitelist on Gen10+ (bsc#1051510).
- drm/i915/sdvo: Implement proper HDMI audio support for SDVO (bsc#1051510).
- drm/nouveau/disp/dp: respect sink limits when selecting failsafe link configuration (bsc#1051510).
- drm/radeon: prefer lower reference dividers (bsc#1051510).
- drm: Wake up next in drm_read() chain if we are forced to putback the event (bsc#1051510).
- edac, amd64: Add Hygon Dhyana support ().
- edac/mc: Fix edac_mc_find() in case no device is found (bsc#1114279).
- extcon: arizona: Disable mic detect if running when driver is removed (bsc#1051510).
- ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995).
- fuse: fallocate: fix return with locked inode (bsc#1051510).
- fuse: fix writepages on 32bit (bsc#1051510).
- fuse: honor RLIMIT_FSIZE in fuse_file_fallocate (bsc#1051510).
- genirq: Prevent use-after-free and work list corruption (bsc#1051510).
- genirq: Respect IRQCHIP_SKIP_SET_WAKE in irq_chip_set_wake_parent() (bsc#1051510).
- genwqe: Prevent an integer overflow in the ioctl (bsc#1051510).
- gpio: Remove obsolete comment about gpiochip_free_hogs() usage (bsc#1051510).
- gpio: fix gpio-adp5588 build errors (bsc#1051510).
- hid: Wacom: switch Dell canvas into highres mode (bsc#1051510).
- hid: input: fix a4tech horizontal wheel custom usage (bsc#1137429).
- hid: logitech-hidpp: change low battery level threshold from 31 to 30 percent (bsc#1051510).
- hid: logitech-hidpp: use RAP instead of FAP to get the protocol version (bsc#1051510).
- hid: wacom: Add ability to provide explicit battery status info (bsc#1051510).
- hid: wacom: Add support for 3rd generation Intuos BT (bsc#1051510).
- hid: wacom: Add support for Pro Pen slim (bsc#1051510).
- hid: wacom: Correct button numbering 2nd-gen Intuos Pro over Bluetooth (bsc#1051510).
- hid: wacom: Do not report anything prior to the tool entering range (bsc#1051510).
- hid: wacom: Do not set tool type until we're in range (bsc#1051510).
- hid: wacom: Mark expected switch fall-through (bsc#1051510).
- hid: wacom: Move HID fix for AES serial number into wacom_hid_usage_quirk (bsc#1051510).
- hid: wacom: Move handling of HID quirks into a dedicated function (bsc#1051510).
- hid: wacom: Properly handle AES serial number and tool type (bsc#1051510).
- hid: wacom: Queue events with missing type/serial data for later processing (bsc#1051510).
- hid: wacom: Remove comparison of u8 mode with zero and simplify (bsc#1051510).
- hid: wacom: Replace touch_max fixup code with static touch_max definitions (bsc#1051510).
- hid: wacom: Send BTN_TOUCH in response to INTUOSP2_BT eraser contact (bsc#1051510).
- hid: wacom: Support 'in range' for Intuos/Bamboo tablets where possible (bsc#1051510).
- hid: wacom: Sync INTUOSP2_BT touch state after each frame if necessary (bsc#1051510).
- hid: wacom: Work around HID descriptor bug in DTK-2451 and DTH-2452 (bsc#1051510).
- hid: wacom: convert Wacom custom usages to standard HID usages (bsc#1051510).
- hid: wacom: fix mistake in printk (bsc#1051510).
- hid: wacom: generic: Ignore HID_DG_BATTERYSTRENTH == 0 (bsc#1051510).
- hid: wacom: generic: Leave tool in prox until it completely leaves sense (bsc#1051510).
- hid: wacom: generic: Refactor generic battery handling (bsc#1051510).
- hid: wacom: generic: Report AES battery information (bsc#1051510).
- hid: wacom: generic: Reset events back to zero when pen leaves (bsc#1051510).
- hid: wacom: generic: Scale battery capacity measurements to percentages (bsc#1051510).
- hid: wacom: generic: Send BTN_STYLUS3 when both barrel switches are set (bsc#1051510).
- hid: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range (bsc#1051510).
- hid: wacom: generic: Support multiple tools per report (bsc#1051510).
- hid: wacom: generic: Use generic codepath terminology in wacom_wac_pen_report (bsc#1051510).
- hid: wacom: generic: add the 'Report Valid' usage (bsc#1051510).
- hid: wacom: wacom_wac_collection() is local to wacom_wac.c (bsc#1051510).
- hwmon/coretemp: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).
- hwmon/coretemp: Support multi-die/package (jsc#SLE-5454).
- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs ().
- hwmon: (core) add thermal sensors only if dev-&gt;of_node is present (bsc#1051510).
- hwmon: (k10temp) 27C Offset needed for Threadripper2 ().
- hwmon: (k10temp) Add Hygon Dhyana support ().
- hwmon: (k10temp) Add support for AMD Ryzen w/ Vega graphics ().
- hwmon: (k10temp) Add support for Stoney Ridge and Bristol Ridge CPUs ().
- hwmon: (k10temp) Add support for family 17h ().
- hwmon: (k10temp) Add support for temperature offsets ().
- hwmon: (k10temp) Add temperature offset for Ryzen 1900X ().
- hwmon: (k10temp) Add temperature offset for Ryzen 2700X ().
- hwmon: (k10temp) Correct model name for Ryzen 1600X ().
- hwmon: (k10temp) Display both Tctl and Tdie ().
- hwmon: (k10temp) Fix reading critical temperature register ().
- hwmon: (k10temp) Make function get_raw_temp static ().
- hwmon: (k10temp) Move chip specific code into probe function ().
- hwmon: (k10temp) Only apply temperature offset if result is positive ().
- hwmon: (k10temp) Support all Family 15h Model 6xh and Model 7xh processors ().
- hwmon: (k10temp) Use API function to access System Management Network ().
- hwmon: (pmbus/core) Treat parameters as paged if on multiple pages (bsc#1051510).
- hwmon: k10temp: Support Threadripper 2920X, 2970WX; simplify offset table ().
- hwrng: omap - Set default quality (bsc#1051510).
- i2c-piix4: Add Hygon Dhyana SMBus support ().
- i2c: acorn: fix i2c warning (bsc#1135642).
- i2c: dev: fix potential memory leak in i2cdev_ioctl_rdwr (bsc#1051510).
- i2c: i801: Add support for Intel Comet Lake (jsc#SLE-5331).
- ibmveth: Update ethtool settings to reflect virtual properties (bsc#1136157, LTC#177197).
- iio: ad_sigma_delta: Properly handle SPI bus locking vs CS assertion (bsc#1051510).
- iio: common: ssp_sensors: Initialize calculated_time in ssp_common_process_data (bsc#1051510).
- iio: hmc5843: fix potential NULL pointer dereferences (bsc#1051510).
- input: synaptics - enable SMBus on ThinkPad E480 and E580 (bsc#1051510).
- input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD (bsc#1051510).
- iwlwifi: mvm: check for length correctness in iwl_mvm_create_skb() (bsc#1051510).
- iwlwifi: pcie: do not crash on invalid RX interrupt (bsc#1051510).
- kABI workaround for the new pci_dev.skip_bus_pm field addition (bsc#1051510).
- kabi: x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).
- kabi: x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).
- kernel-binary: Use -c grep option in klp project detection.
- kernel-binary: fix missing \
- kernel-binary: rpm does not support multiline condition
- kernel-subpackage-spec: Add dummy package to ensure subpackages are rebuilt with kernel update (bsc#1106751). In factory packages are not rebuilt automatically so a dependency is needed on the old kernel to get a rebuild with the new kernel. THe subpackage itself cannot depend on the kernel so add another empty pacakge that does depend on it.
- kmps: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).
- kmps: provide and conflict a kernel version specific KMP name (bsc#1127155, bsc#1109137).
- kvm: PPC: Book3S HV: Avoid lockdep debugging in TCE realmode handlers (bsc#1061840).
- kvm: PPC: Book3S HV: XIVE: Do not clear IRQ data of passthrough interrupts (bsc#1061840).
- kvm: PPC: Book3S: Protect memslots while validating user address (bsc#1061840).
- kvm: PPC: Release all hardware TCE tables attached to a group (bsc#1061840).
- kvm: PPC: Remove redundand permission bits removal (bsc#1061840).
- kvm: PPC: Validate TCEs against preregistered memory page sizes (bsc#1061840).
- kvm: PPC: Validate all tces before updating tables (bsc#1061840).
- kvm: x86: Include CPUID leaf 0x8000001e in kvm's supported CPUID (bsc#1114279).
- kvm: x86: Include multiple indices with CPUID leaf 0x8000001d (bsc#1114279).
- leds: avoid flush_work in atomic context (bsc#1051510).
- libata: Extend quirks for the ST1000LM024 drives with NOLPM quirk (bsc#1051510).
- libnvdimm, pfn: Fix over-trim in trim_pfn_device() (bsc#1140719).
- libnvdimm/bus: Prevent duplicate device_unregister() calls (bsc#1139865).
- mISDN: make sure device name is NUL terminated (bsc#1051510).
- mac80211/cfg80211: update bss channel on channel switch (bsc#1051510).
- mac80211: Do not use stack memory with scatterlist for GMAC (bsc#1051510).
- mac80211: Fix kernel panic due to use of txq after free (bsc#1051510).
- mac80211: drop robust management frames from unknown TA (bsc#1051510).
- mac80211: handle deauthentication/disassociation from TDLS peer (bsc#1051510).
- media: au0828: Fix NULL pointer dereference in au0828_analog_stream_enable() (bsc#1051510).
- media: au0828: stop video streaming only when last user stops (bsc#1051510).
- media: coda: clear error return value before picture run (bsc#1051510).
- media: cpia2: Fix use-after-free in cpia2_exit (bsc#1051510).
- media: go7007: avoid clang frame overflow warning with KASAN (bsc#1051510).
- media: m88ds3103: serialize reset messages in m88ds3103_set_frontend (bsc#1051510).
- media: ov2659: make S_FMT succeed even if requested format does not match (bsc#1051510).
- media: saa7146: avoid high stack usage with clang (bsc#1051510).
- media: smsusb: better handle optional alignment (bsc#1051510).
- media: usb: siano: Fix false-positive 'uninitialized variable' warning (bsc#1051510).
- media: usb: siano: Fix general protection fault in smsusb (bsc#1051510).
- media: v4l2-ioctl: clear fields in s_parm (bsc#1051510).
- mfd: da9063: Fix OTP control register names to match datasheets for DA9063/63L (bsc#1051510).
- mfd: intel-lpss: Set the device in reset state when init (bsc#1051510).
- mfd: max77620: Fix swapped FPS_PERIOD_MAX_US values (bsc#1051510).
- mfd: tps65912-spi: Add missing of table registration (bsc#1051510).
- mfd: twl6040: Fix device init errors for ACCCTL register (bsc#1051510).
- mm: pagechage-limit: Calculate pagecache-limit based on node state (bsc#1136811)
- mmc: core: Prevent processing SDIO IRQs when the card is suspended (bsc#1051510).
- mmc: core: Verify SD bus width (bsc#1051510).
- mmc: core: make pwrseq_emmc (partially) support sleepy GPIO controllers (bsc#1051510).
- mmc: mmci: Prevent polling for busy detection in IRQ context (bsc#1051510).
- mmc: sdhci-iproc: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).
- mmc: sdhci-iproc: cygnus: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).
- mmc: sdhci-of-esdhc: add erratum A-009204 support (bsc#1051510).
- mmc: sdhci-of-esdhc: add erratum eSDHC-A001 and A-008358 support (bsc#1051510).
- mmc: sdhci-of-esdhc: add erratum eSDHC5 support (bsc#1051510).
- mmc_spi: add a status check for spi_sync_locked (bsc#1051510).
- module: Fix livepatch/ftrace module text permissions race (bsc#1071995).
- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).
- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).
- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).
- nfit/ars: Allow root to busy-poll the ARS state machine (bsc#1140814).
- nfit/ars: Avoid stale ARS results (jsc#SLE-5433).
- nfit/ars: Introduce scrub_flags (jsc#SLE-5433).
- ntp: Allow TAI-UTC offset to be set to zero (bsc#1135642).
- nvme-rdma: fix double freeing of async event data (bsc#1120423).
- nvme-rdma: fix possible double free of controller async event buffer (bsc#1120423).
- nvme: copy MTFA field from identify controller (bsc#1140715).
- nvme: skip nvme_update_disk_info() if the controller is not live (bsc#1128432).
- nvmem: Do not let a NULL cell_id for nvmem_cell_get() crash us (bsc#1051510).
- nvmem: allow to select i.MX nvmem driver for i.MX 7D (bsc#1051510).
- nvmem: core: fix read buffer in place (bsc#1051510).
- nvmem: correct Broadcom OTP controller driver writes (bsc#1051510).
- nvmem: imx-ocotp: Add i.MX7D timing write clock setup support (bsc#1051510).
- nvmem: imx-ocotp: Add support for banked OTP addressing (bsc#1051510).
- nvmem: imx-ocotp: Enable i.MX7D OTP write support (bsc#1051510).
- nvmem: imx-ocotp: Move i.MX6 write clock setup to dedicated function (bsc#1051510).
- nvmem: imx-ocotp: Pass parameters via a struct (bsc#1051510).
- nvmem: imx-ocotp: Restrict OTP write to IMX6 processors (bsc#1051510).
- nvmem: imx-ocotp: Update module description (bsc#1051510).
- nvmem: properly handle returned value nvmem_reg_read (bsc#1051510).
- ocfs2: try to reuse extent block in dealloc without meta_alloc (bsc#1128902).
- parport: Fix mem leak in parport_register_dev_model (bsc#1051510).
- pci: PM: Avoid possible suspend-to-idle issue (bsc#1051510).
- pci: PM: Skip devices in D0 for suspend-to-idle (bsc#1051510).
- pci: rpadlpar: Fix leaked device_node references in add/remove paths (bsc#1051510).
- perf tools: Add Hygon Dhyana support ().
- perf/x86/intel/cstate: Support multi-die/package (jsc#SLE-5454).
- perf/x86/intel/rapl: Cosmetic rename internal variables in response to multi-die/pkg support (jsc#SLE-5454).
- perf/x86/intel/rapl: Support multi-die/package (jsc#SLE-5454).
- perf/x86/intel/uncore: Cosmetic renames in response to multi-die/pkg support (jsc#SLE-5454).
- perf/x86/intel/uncore: Support multi-die/package (jsc#SLE-5454).
- platform/chrome: cros_ec_proto: check for NULL transfer function (bsc#1051510).
- platform/x86: mlx-platform: Fix parent device in i2c-mux-reg device registration (bsc#1051510).
- pm/core: Propagate dev-&gt;power.wakeup_path when no callbacks (bsc#1051510).
- power: supply: max14656: fix potential use-before-alloc (bsc#1051510).
- power: supply: sysfs: prevent endless uevent loop with CONFIG_POWER_SUPPLY_DEBUG (bsc#1051510).
- powercap/intel_rapl: Simplify rapl_find_package() (jsc#SLE-5454).
- powercap/intel_rapl: Support multi-die/package (jsc#SLE-5454).
- powercap/intel_rapl: Update RAPL domain name and debug messages (jsc#SLE-5454).
- powerpc/cacheinfo: add cacheinfo_teardown, cacheinfo_rebuild (bsc#1138374, LTC#178199).
- powerpc/perf: Add PM_LD_MISS_L1 and PM_BR_2PATH to power9 event list (bsc#1137728, LTC#178106).
- powerpc/perf: Add POWER9 alternate PM_RUN_CYC and PM_RUN_INST_CMPL events (bsc#1137728, LTC#178106).
- powerpc/pseries/mobility: prevent cpu hotplug during DT update (bsc#1138374, LTC#178199).
- powerpc/pseries/mobility: rebuild cacheinfo hierarchy post-migration (bsc#1138374, LTC#178199).
- powerpc/pseries: Fix oops in hotplug memory notifier (bsc#1138375, LTC#178204).
- powerpc/rtas: retry when cpu offline races with suspend/migration (bsc#1140428, LTC#178808).
- ppp: mppe: Add softdep to arc4 (bsc#1088047).
- qlcnic: Avoid potential NULL pointer dereference (bsc#1051510).
- qmi_wwan: Add quirk for Quectel dynamic config (bsc#1051510).
- qmi_wwan: add network device usage statistics for qmimux devices (bsc#1051510).
- qmi_wwan: add support for QMAP padding in the RX path (bsc#1051510).
- qmi_wwan: avoid RCU stalls on device disconnect when in QMAP mode (bsc#1051510).
- qmi_wwan: extend permitted QMAP mux_id value range (bsc#1051510).
- rapidio: fix a NULL pointer dereference when create_workqueue() fails (bsc#1051510).
- ras/cec: Convert the timer callback to a workqueue (bsc#1114279).
- ras/cec: Fix binary search function (bsc#1114279).
- rpm/dtb.spec.in.in: Fix new include path Commit 89de3db69113d58cdab14d2c777de6080eac49dc ('rpm/dtb.spec.in.in: Update include path for dt-bindings') introduced an additional include path for 4.12. The commit message had it correct, but the spec file template lacked a path component, breaking the aarch64 build while succeeding on armv7hl. Fix that.
- rpm/dtb.spec.in.in: Update include path for dt-bindings Kernels before 4.12 had arch/{arm,arm64}/boot/dts/include/ directories with a symlink to include/dt-bindings/. In 4.12 those include/ directories were dropped. Therefore use include/ directly. Additionally some cross-architecture .dtsi reuse was introduced, which requires scripts/dtc/include-prefixes/ that didn't exist on older kernels.
- rpm/kernel-binary.spec.in: Add back kernel-binary-base subpackage (jsc#SLE-3853).
- rpm/kernel-binary.spec.in: Build livepatch support in SUSE release projects (bsc#1124167).
- rpm/kernel-subpackage-build: handle arm kernel zImage.
- rpm/kernel-subpackage-spec: only provide firmware actually present in subpackage.
- rpm/package-descriptions: fix typo in kernel-azure
- rpm/post.sh: correct typo in err msg (bsc#1137625)
- rpm: Add arm64 dtb-allwinner subpackage 4.10 added arch/arm64/boot/dts/allwinner/.
- rpm: Add arm64 dtb-zte subpackage 4.9 added arch/arm64/boot/dts/zte/.
- rtc: 88pm860x: prevent use-after-free on device remove (bsc#1051510).
- rtc: do not reference bogus function pointer in kdoc (bsc#1051510).
- rtlwifi: fix a potential NULL pointer dereference (bsc#1051510).
- s390: fix booting problem (bsc#1140948).
- s390/dasd: fix using offset into zero size array error (bsc#1051510).
- s390/jump_label: Use 'jdd' constraint on gcc9 (bsc#1138589).
- s390/qeth: fix VLAN attribute in bridge_hostnotify udev event (bsc#1051510).
- s390/qeth: fix race when initializing the IP address table (bsc#1051510).
- s390/setup: fix early warning messages (bsc#1051510).
- s390/virtio: handle find on invalid queue gracefully (bsc#1051510).
- sbitmap: fix improper use of smp_mb__before_atomic() (bsc#1140658).
- sched/topology: Improve load balancing on AMD EPYC (bsc#1137366).
- scripts/git_sort/git_sort.py: add djbw/nvdimm nvdimm-pending.
- scripts/git_sort/git_sort.py: add nvdimm/libnvdimm-fixes
- scsi: core: add new RDAC LENOVO/DE_Series device (bsc#1132390).
- scsi: qla2xxx: Fix FC-AL connection target discovery (bsc#1094555).
- scsi: qla2xxx: Fix N2N target discovery with Local loop (bsc#1094555).
- scsi: qla2xxx: Fix abort handling in tcm_qla2xxx_write_pending() (bsc#1140727).
- scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bsc#1140728).
- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).
- scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() (bsc#1135296).
- scsi: zfcp: fix missing zfcp_port reference put on -EBUSY from port_remove (bsc#1051510).
- scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (bsc#1051510).
- scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices (bsc#1051510).
- scsi: zfcp: fix to prevent port_remove with pure auto scan LUNs (only sdevs) (bsc#1051510).
- serial: sh-sci: disable DMA for uart_console (bsc#1051510).
- smb3: Fix endian warning (bsc#1137884).
- soc: mediatek: pwrap: Zero initialize rdata in pwrap_init_cipher (bsc#1051510).
- soc: rockchip: Set the proper PWM for rk3288 (bsc#1051510).
- spi : spi-topcliff-pch: Fix to handle empty DMA buffers (bsc#1051510).
- spi: Fix zero length xfer bug (bsc#1051510).
- spi: bitbang: Fix NULL pointer dereference in spi_unregister_master (bsc#1051510).
- spi: pxa2xx: Add support for Intel Comet Lake (jsc#SLE-5331).
- spi: pxa2xx: fix SCR (divisor) calculation (bsc#1051510).
- spi: spi-fsl-spi: call spi_finalize_current_message() at the end (bsc#1051510).
- spi: tegra114: reset controller on probe (bsc#1051510).
- staging: comedi: ni_mio_common: Fix divide-by-zero for DIO cmdtest (bsc#1051510).
- staging: vc04_services: prevent integer overflow in create_pagelist() (bsc#1051510).
- staging: wlan-ng: fix adapter initialization failure (bsc#1051510).
- svm: Add warning message for AVIC IPI invalid target (bsc#1140133).
- svm: Fix AVIC incomplete IPI emulation (bsc#1140133).
- sysctl: handle overflow in proc_get_long (bsc#1051510).
- test_firmware: Use correct snprintf() limit (bsc#1135642).
- thermal/x86_pkg_temp_thermal: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).
- thermal/x86_pkg_temp_thermal: Support multi-die/package (jsc#SLE-5454).
- thermal: rcar_gen3_thermal: disable interrupt in .remove (bsc#1051510).
- thunderbolt: Fix to check for kmemdup failure (bsc#1051510).
- tmpfs: fix link accounting when a tmpfile is linked in (bsc#1051510).
- tmpfs: fix uninitialized return value in shmem_link (bsc#1051510).
- tools/cpupower: Add Hygon Dhyana support ().
- topology: Create core_cpus and die_cpus sysfs attributes (jsc#SLE-5454).
- topology: Create package_cpus sysfs attribute (jsc#SLE-5454).
- tracing/snapshot: Resize spare buffer if size changed (bsc#1140726).
- tty/vt: fix write/write race in ioctl(KDSKBSENT) handler (bsc#1051510).
- tty: ipwireless: fix missing checks for ioremap (bsc#1051510).
- tty: max310x: Fix external crystal register setup (bsc#1051510).
- tty: serial: msm_serial: Fix XON/XOFF (bsc#1051510).
- usb: Add LPM quirk for Surface Dock GigE adapter (bsc#1051510).
- usb: Fix chipmunk-like voice when using Logitech C270 for recording audio (bsc#1051510).
- usb: Fix slab-out-of-bounds write in usb_get_bos_descriptor (bsc#1051510).
- usb: chipidea: udc: workaround for endpoint conflict issue (bsc#1135642).
- usb: core: Add PM runtime calls to usb_hcd_platform_shutdown (bsc#1051510).
- usb: core: Do not unbind interfaces following device reset failure (bsc#1051510).
- usb: dwc2: Fix DMA cache alignment issues (bsc#1051510).
- usb: dwc2: host: Fix wMaxPacketSize handling (fix webcam regression) (bsc#1135642).
- usb: rio500: fix memory leak in close after disconnect (bsc#1051510).
- usb: rio500: refuse more than one device at a time (bsc#1051510).
- usb: serial: fix initial-termios handling (bsc#1135642).
- usb: serial: option: add Telit 0x1260 and 0x1261 compositions (bsc#1051510).
- usb: serial: option: add support for Simcom SIM7500/SIM7600 RNDIS mode (bsc#1051510).
- usb: serial: pl2303: add Allied Telesis VT-Kit3 (bsc#1051510).
- usb: serial: pl2303: fix tranceiver suspend mode (bsc#1135642).
- usb: sisusbvga: fix oops in error path of sisusb_probe (bsc#1051510).
- usb: usb-storage: Add new ID to ums-realtek (bsc#1051510).
- usb: xhci: avoid null pointer deref when bos field is NULL (bsc#1135642).
- usbip: usbip_host: fix BUG: sleeping function called from invalid context (bsc#1051510).
- usbip: usbip_host: fix stub_dev lock context imbalance regression (bsc#1051510).
- usbnet: fix kernel crash after disconnect (bsc#1051510).
- usbnet: ipheth: fix racing condition (bsc#1051510).
- vfio: ccw: only free cp on final interrupt (bsc#1051510).
- video: hgafb: fix potential NULL pointer dereference (bsc#1051510).
- video: imsttfb: fix potential NULL pointer dereferences (bsc#1051510).
- virtio_console: initialize vtermno value for ports (bsc#1051510).
- vlan: disable SIOCSHWTSTAMP in container (bsc#1051510).
- vxlan: trivial indenting fix (bsc#1051510).
- vxlan: use __be32 type for the param vni in __vxlan_fdb_delete (bsc#1051510).
- w1: fix the resume command API (bsc#1051510).
- watchdog: imx2_wdt: Fix set_timeout for big timeout values (bsc#1051510).
- x86/CPU/AMD: Do not force the CPB cap when running under a hypervisor (bsc#1114279).
- x86/CPU/hygon: Fix phys_proc_id calculation logic for multi-die processors ().
- x86/alternative: Init ideal_nops for Hygon Dhyana ().
- x86/amd_nb: Add support for Raven Ridge CPUs ().
- x86/amd_nb: Check vendor in AMD-only functions ().
- x86/apic: Add Hygon Dhyana support ().
- x86/bugs: Add Hygon Dhyana to the respective mitigation machinery ().
- x86/cpu/mtrr: Support TOP_MEM2 and get MTRR number ().
- x86/cpu: Create Hygon Dhyana architecture support file ().
- x86/cpu: Get cache info and setup cache cpumap for Hygon Dhyana ().
- x86/cpufeatures: Carve out CQM features retrieval (jsc#SLE-5382).
- x86/cpufeatures: Combine word 11 and 12 into a new scattered features word (jsc#SLE-5382). This changes definitions of some bits, but they are intended to be used only by the core, so hopefully, no KMP uses the definitions.
- x86/cpufeatures: Enumerate the new AVX512 BFLOAT16 instructions (jsc#SLE-5382).
- x86/events: Add Hygon Dhyana support to PMU infrastructure ().
- x86/kvm: Add Hygon Dhyana support to KVM ().
- x86/mce: Add Hygon Dhyana support to the MCA infrastructure ().
- x86/mce: Do not disable MCA banks when offlining a CPU on AMD ().
- x86/mce: Fix machine_check_poll() tests for error types (bsc#1114279).
- x86/microcode, cpuhotplug: Add a microcode loader CPU hotplug callback (bsc#1114279).
- x86/microcode: Fix microcode hotplug state (bsc#1114279).
- x86/microcode: Fix the ancient deprecated microcode loading method (bsc#1114279).
- x86/mm/mem_encrypt: Disable all instrumentation for early SME setup (bsc#1114279).
- x86/pci, x86/amd_nb: Add Hygon Dhyana support to PCI and northbridge ().
- x86/smpboot: Do not use BSP INIT delay and MWAIT to idle on Dhyana ().
- x86/smpboot: Rename match_die() to match_pkg() (jsc#SLE-5454).
- x86/speculation/mds: Revert CPU buffer clear on double fault exit (bsc#1114279).
- x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).
- x86/topology: Create topology_max_die_per_package() (jsc#SLE-5454).
- x86/topology: Define topology_die_id() (jsc#SLE-5454).
- x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).
- x86/xen: Add Hygon Dhyana support to Xen ().
- xen/pciback: Do not disable PCI_COMMAND on PCI device reset (bsc#1065600).
- xfs: do not clear imap_valid for a non-uptodate buffers (bsc#1138018).
- xfs: do not look at buffer heads in xfs_add_to_ioend (bsc#1138013).
- xfs: do not set the page uptodate in xfs_writepage_map (bsc#1138003).
- xfs: do not use XFS_BMAPI_ENTRIRE in xfs_get_blocks (bsc#1137999).
- xfs: do not use XFS_BMAPI_IGSTATE in xfs_map_blocks (bsc#1138005).
- xfs: eof trim writeback mapping as soon as it is cached (bsc#1138019).
- xfs: fix s_maxbytes overflow problems (bsc#1137996).
- xfs: make xfs_writepage_map extent map centric (bsc#1138009).
- xfs: minor cleanup for xfs_get_blocks (bsc#1138000).
- xfs: move all writeback buffer_head manipulation into xfs_map_at_offset (bsc#1138014).
- xfs: refactor the tail of xfs_writepage_map (bsc#1138016).
- xfs: remove XFS_IO_INVALID (bsc#1138017).
- xfs: remove the imap_valid flag (bsc#1138012).
- xfs: remove unused parameter from xfs_writepage_map (bsc#1137995).
- xfs: remove xfs_map_cow (bsc#1138007).
- xfs: remove xfs_reflink_find_cow_mapping (bsc#1138010).
- xfs: remove xfs_reflink_trim_irec_to_next_cow (bsc#1138006).
- xfs: remove xfs_start_page_writeback (bsc#1138015).
- xfs: rename the offset variable in xfs_writepage_map (bsc#1138008).
- xfs: simplify xfs_map_blocks by using xfs_iext_lookup_extent directly (bsc#1138011).
- xfs: skip CoW writes past EOF when writeback races with truncate (bsc#1137998).
- xfs: xfs_reflink_convert_cow() memory allocation deadlock (bsc#1138002).
- xhci: Convert xhci_handshake() to use readl_poll_timeout_atomic() (bsc#1051510).
- xhci: Use %zu for printing size_t type (bsc#1051510).
- xhci: update bounce buffer with correct sg num (bsc#1051510).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-15"/>
	<updated date="2019-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051510">SUSE bug 1051510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061840">SUSE bug 1061840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088047">SUSE bug 1088047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094555">SUSE bug 1094555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098633">SUSE bug 1098633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106383">SUSE bug 1106383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106751">SUSE bug 1106751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109137">SUSE bug 1109137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114279">SUSE bug 1114279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119532">SUSE bug 1119532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120423">SUSE bug 1120423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124167">SUSE bug 1124167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128432">SUSE bug 1128432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128902">SUSE bug 1128902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128910">SUSE bug 1128910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132154">SUSE bug 1132154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132390">SUSE bug 1132390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133401">SUSE bug 1133401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133738">SUSE bug 1133738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134303">SUSE bug 1134303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134395">SUSE bug 1134395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135296">SUSE bug 1135296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135556">SUSE bug 1135556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135642">SUSE bug 1135642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136157">SUSE bug 1136157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136811">SUSE bug 1136811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136922">SUSE bug 1136922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137103">SUSE bug 1137103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137194">SUSE bug 1137194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137221">SUSE bug 1137221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137366">SUSE bug 1137366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137429">SUSE bug 1137429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137625">SUSE bug 1137625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137728">SUSE bug 1137728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137884">SUSE bug 1137884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137995">SUSE bug 1137995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137996">SUSE bug 1137996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137998">SUSE bug 1137998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137999">SUSE bug 1137999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138000">SUSE bug 1138000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138002">SUSE bug 1138002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138003">SUSE bug 1138003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138005">SUSE bug 1138005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138006">SUSE bug 1138006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138007">SUSE bug 1138007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138008">SUSE bug 1138008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138009">SUSE bug 1138009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138010">SUSE bug 1138010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138011">SUSE bug 1138011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138012">SUSE bug 1138012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138013">SUSE bug 1138013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138014">SUSE bug 1138014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138015">SUSE bug 1138015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138016">SUSE bug 1138016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138017">SUSE bug 1138017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138018">SUSE bug 1138018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138019">SUSE bug 1138019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138291">SUSE bug 1138291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138293">SUSE bug 1138293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138374">SUSE bug 1138374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138375">SUSE bug 1138375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138589">SUSE bug 1138589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138719">SUSE bug 1138719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139751">SUSE bug 1139751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139771">SUSE bug 1139771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139782">SUSE bug 1139782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139865">SUSE bug 1139865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140133">SUSE bug 1140133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140328">SUSE bug 1140328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140405">SUSE bug 1140405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140424">SUSE bug 1140424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140428">SUSE bug 1140428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140575">SUSE bug 1140575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140577">SUSE bug 1140577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140637">SUSE bug 1140637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140658">SUSE bug 1140658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140715">SUSE bug 1140715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140719">SUSE bug 1140719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140726">SUSE bug 1140726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140727">SUSE bug 1140727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140728">SUSE bug 1140728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140814">SUSE bug 1140814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140948">SUSE bug 1140948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821419">SUSE bug 821419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945811">SUSE bug 945811</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16871/">CVE-2018-16871</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20836/">CVE-2018-20836</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10126/">CVE-2019-10126</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10638/">CVE-2019-10638</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10639/">CVE-2019-10639</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11599/">CVE-2019-11599</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12456/">CVE-2019-12456</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12614/">CVE-2019-12614</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12818/">CVE-2019-12818</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-12819/">CVE-2019-12819</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521967" comment="kernel-default-4.12.14-95.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521968" comment="kernel-default-devel-4.12.14-95.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521969" comment="kernel-default-extra-4.12.14-95.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521970" comment="kernel-devel-4.12.14-95.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521971" comment="kernel-macros-4.12.14-95.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521972" comment="kernel-source-4.12.14-95.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521973" comment="kernel-syms-4.12.14-95.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78765" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox, mozilla-nss fixes the following issues:

MozillaFirefox to version ESR 60.8:

- CVE-2019-9811: Sandbox escape via installation of malicious language pack (bsc#1140868).
- CVE-2019-11711: Script injection within domain through inner window reuse (bsc#1140868).
- CVE-2019-11712: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects (bsc#1140868).
- CVE-2019-11713: Use-after-free with HTTP/2 cached stream (bsc#1140868).
- CVE-2019-11729: Empty or malformed p256-ECDH public keys may trigger a segmentation fault (bsc#1140868).
- CVE-2019-11715: HTML parsing error can contribute to content XSS (bsc#1140868).
- CVE-2019-11717: Caret character improperly escaped in origins (bsc#1140868).
- CVE-2019-11719: Out-of-bounds read when importing curve25519 private key (bsc#1140868).
- CVE-2019-11730: Same-origin policy treats all files in a directory as having the same-origin (bsc#1140868).
- CVE-2019-11709: Multiple Memory safety bugs fixed (bsc#1140868).

mozilla-nss to version 3.44.1:

* Added IPSEC IKE support to softoken 
* Many new FIPS test cases
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-17"/>
	<updated date="2019-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521974" comment="MozillaFirefox-60.8.0-109.83.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521975" comment="MozillaFirefox-translations-common-60.8.0-109.83.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521976" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521977" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521978" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521979" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521980" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521981" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521982" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521983" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521984" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521985" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521986" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78766" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1140095" ref_url="https://bugzilla.suse.com/1140095" source="BUGZILLA"/>
		<reference ref_id="1140101" ref_url="https://bugzilla.suse.com/1140101" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13117" ref_url="https://www.suse.com/security/cve/CVE-2019-13117/" source="CVE"/>
		<reference ref_id="CVE-2019-13118" ref_url="https://www.suse.com/security/cve/CVE-2019-13118/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005726.html" source="SUSE-SU"/>
		<description>
This update for libxslt fixes the following issues:

Security issues fixed:

- CVE-2019-13118: Fixed a read of uninitialized stack data (bsc#1140101).
- CVE-2019-13117: Fixed a uninitialized read which allowed to discern whether a byte on the stack contains certain special characters (bsc#1140095).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-17"/>
	<updated date="2019-07-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1140095">SUSE bug 1140095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140101">SUSE bug 1140101</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13117/">CVE-2019-13117</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13118/">CVE-2019-13118</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521987" comment="libxslt-tools-1.1.28-17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521988" comment="libxslt1-1.1.28-17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521989" comment="libxslt1-32bit-1.1.28-17.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78767" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1010675" ref_url="https://bugzilla.suse.com/1010675" source="BUGZILLA"/>
		<reference ref_id="1110146" ref_url="https://bugzilla.suse.com/1110146" source="BUGZILLA"/>
		<reference ref_id="1126613" ref_url="https://bugzilla.suse.com/1126613" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005735.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

Issue fixed:

- Fixed a bug related to the fix for CVE-2016-9318 which allowed xsltproc to access 
  the internet even when --nonet was given and also was making docbook-xsl-stylesheets to have 
  incomplete xml catalog file (bsc#1010675, bsc#1126613 and bsc#1110146).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-18"/>
	<updated date="2019-07-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110146">SUSE bug 1110146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126613">SUSE bug 1126613</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521990" comment="libxml2-2-2.9.4-46.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521991" comment="libxml2-2-32bit-2.9.4-46.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521992" comment="libxml2-tools-2.9.4-46.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521993" comment="python-libxml2-2.9.4-46.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78768" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1118277" ref_url="https://bugzilla.suse.com/1118277" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19788" ref_url="https://www.suse.com/security/cve/CVE-2018-19788/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005017.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

Security issue fixed:

- CVE-2018-19788: Fixed handling of UIDs over MAX_UINT (bsc#1118277)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-04"/>
	<updated date="2019-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118277">SUSE bug 1118277</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19788/">CVE-2018-19788</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521590" comment="libpolkit0-0.113-5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521591" comment="libpolkit0-32bit-0.113-5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521592" comment="polkit-0.113-5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521593" comment="typelib-1_0-Polkit-1_0-0.113-5.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78769" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005740.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the CPU Microcode adjustments for the software mitigations.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Release notes:

---- updated platforms ------------------------------------
SNB-E/EN/EP  C1/M0    6-2d-6/6d 0000061d-&gt;0000061f Xeon E3/E5, Core X
SNB-E/EN/EP  C2/M1    6-2d-7/6d 00000714-&gt;00000718 Xeon E3/E5, Core X
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521994" comment="ucode-intel-20190618-13.47.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78770" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="985657" ref_url="https://bugzilla.suse.com/985657" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3189" ref_url="https://www.suse.com/security/cve/CVE-2016-3189/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005739.html" source="SUSE-SU"/>
		<description>
This update for bzip2 fixes the following issues:

Security issue fixed:

- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1139083).
- CVE-2016-3189: Fixed a use-after-free in bzip2recover (bsc#985657).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985657">SUSE bug 985657</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3189/">CVE-2016-3189</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521995" comment="bzip2-1.0.6-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521996" comment="libbz2-1-1.0.6-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521997" comment="libbz2-1-32bit-1.0.6-30.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78771" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1024718" ref_url="https://bugzilla.suse.com/1024718" source="BUGZILLA"/>
		<reference ref_id="1046299" ref_url="https://bugzilla.suse.com/1046299" source="BUGZILLA"/>
		<reference ref_id="1050242" ref_url="https://bugzilla.suse.com/1050242" source="BUGZILLA"/>
		<reference ref_id="1050244" ref_url="https://bugzilla.suse.com/1050244" source="BUGZILLA"/>
		<reference ref_id="1051510" ref_url="https://bugzilla.suse.com/1051510" source="BUGZILLA"/>
		<reference ref_id="1055121" ref_url="https://bugzilla.suse.com/1055121" source="BUGZILLA"/>
		<reference ref_id="1055186" ref_url="https://bugzilla.suse.com/1055186" source="BUGZILLA"/>
		<reference ref_id="1058115" ref_url="https://bugzilla.suse.com/1058115" source="BUGZILLA"/>
		<reference ref_id="1060463" ref_url="https://bugzilla.suse.com/1060463" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1078248" ref_url="https://bugzilla.suse.com/1078248" source="BUGZILLA"/>
		<reference ref_id="1079935" ref_url="https://bugzilla.suse.com/1079935" source="BUGZILLA"/>
		<reference ref_id="1082387" ref_url="https://bugzilla.suse.com/1082387" source="BUGZILLA"/>
		<reference ref_id="1083647" ref_url="https://bugzilla.suse.com/1083647" source="BUGZILLA"/>
		<reference ref_id="1086282" ref_url="https://bugzilla.suse.com/1086282" source="BUGZILLA"/>
		<reference ref_id="1086283" ref_url="https://bugzilla.suse.com/1086283" source="BUGZILLA"/>
		<reference ref_id="1086423" ref_url="https://bugzilla.suse.com/1086423" source="BUGZILLA"/>
		<reference ref_id="1087084" ref_url="https://bugzilla.suse.com/1087084" source="BUGZILLA"/>
		<reference ref_id="1087978" ref_url="https://bugzilla.suse.com/1087978" source="BUGZILLA"/>
		<reference ref_id="1088386" ref_url="https://bugzilla.suse.com/1088386" source="BUGZILLA"/>
		<reference ref_id="1090888" ref_url="https://bugzilla.suse.com/1090888" source="BUGZILLA"/>
		<reference ref_id="1091405" ref_url="https://bugzilla.suse.com/1091405" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1097593" ref_url="https://bugzilla.suse.com/1097593" source="BUGZILLA"/>
		<reference ref_id="1102875" ref_url="https://bugzilla.suse.com/1102875" source="BUGZILLA"/>
		<reference ref_id="1102877" ref_url="https://bugzilla.suse.com/1102877" source="BUGZILLA"/>
		<reference ref_id="1102879" ref_url="https://bugzilla.suse.com/1102879" source="BUGZILLA"/>
		<reference ref_id="1102882" ref_url="https://bugzilla.suse.com/1102882" source="BUGZILLA"/>
		<reference ref_id="1102896" ref_url="https://bugzilla.suse.com/1102896" source="BUGZILLA"/>
		<reference ref_id="1103257" ref_url="https://bugzilla.suse.com/1103257" source="BUGZILLA"/>
		<reference ref_id="1104353" ref_url="https://bugzilla.suse.com/1104353" source="BUGZILLA"/>
		<reference ref_id="1104427" ref_url="https://bugzilla.suse.com/1104427" source="BUGZILLA"/>
		<reference ref_id="1104967" ref_url="https://bugzilla.suse.com/1104967" source="BUGZILLA"/>
		<reference ref_id="1105168" ref_url="https://bugzilla.suse.com/1105168" source="BUGZILLA"/>
		<reference ref_id="1106105" ref_url="https://bugzilla.suse.com/1106105" source="BUGZILLA"/>
		<reference ref_id="1106110" ref_url="https://bugzilla.suse.com/1106110" source="BUGZILLA"/>
		<reference ref_id="1106615" ref_url="https://bugzilla.suse.com/1106615" source="BUGZILLA"/>
		<reference ref_id="1106913" ref_url="https://bugzilla.suse.com/1106913" source="BUGZILLA"/>
		<reference ref_id="1108270" ref_url="https://bugzilla.suse.com/1108270" source="BUGZILLA"/>
		<reference ref_id="1109272" ref_url="https://bugzilla.suse.com/1109272" source="BUGZILLA"/>
		<reference ref_id="1110558" ref_url="https://bugzilla.suse.com/1110558" source="BUGZILLA"/>
		<reference ref_id="1111188" ref_url="https://bugzilla.suse.com/1111188" source="BUGZILLA"/>
		<reference ref_id="1111469" ref_url="https://bugzilla.suse.com/1111469" source="BUGZILLA"/>
		<reference ref_id="1111696" ref_url="https://bugzilla.suse.com/1111696" source="BUGZILLA"/>
		<reference ref_id="1111795" ref_url="https://bugzilla.suse.com/1111795" source="BUGZILLA"/>
		<reference ref_id="1112128" ref_url="https://bugzilla.suse.com/1112128" source="BUGZILLA"/>
		<reference ref_id="1113722" ref_url="https://bugzilla.suse.com/1113722" source="BUGZILLA"/>
		<reference ref_id="1114648" ref_url="https://bugzilla.suse.com/1114648" source="BUGZILLA"/>
		<reference ref_id="1114871" ref_url="https://bugzilla.suse.com/1114871" source="BUGZILLA"/>
		<reference ref_id="1116040" ref_url="https://bugzilla.suse.com/1116040" source="BUGZILLA"/>
		<reference ref_id="1116336" ref_url="https://bugzilla.suse.com/1116336" source="BUGZILLA"/>
		<reference ref_id="1116803" ref_url="https://bugzilla.suse.com/1116803" source="BUGZILLA"/>
		<reference ref_id="1116841" ref_url="https://bugzilla.suse.com/1116841" source="BUGZILLA"/>
		<reference ref_id="1117115" ref_url="https://bugzilla.suse.com/1117115" source="BUGZILLA"/>
		<reference ref_id="1117162" ref_url="https://bugzilla.suse.com/1117162" source="BUGZILLA"/>
		<reference ref_id="1117165" ref_url="https://bugzilla.suse.com/1117165" source="BUGZILLA"/>
		<reference ref_id="1117186" ref_url="https://bugzilla.suse.com/1117186" source="BUGZILLA"/>
		<reference ref_id="1117561" ref_url="https://bugzilla.suse.com/1117561" source="BUGZILLA"/>
		<reference ref_id="1117656" ref_url="https://bugzilla.suse.com/1117656" source="BUGZILLA"/>
		<reference ref_id="1117953" ref_url="https://bugzilla.suse.com/1117953" source="BUGZILLA"/>
		<reference ref_id="1118215" ref_url="https://bugzilla.suse.com/1118215" source="BUGZILLA"/>
		<reference ref_id="1118319" ref_url="https://bugzilla.suse.com/1118319" source="BUGZILLA"/>
		<reference ref_id="1118428" ref_url="https://bugzilla.suse.com/1118428" source="BUGZILLA"/>
		<reference ref_id="1118484" ref_url="https://bugzilla.suse.com/1118484" source="BUGZILLA"/>
		<reference ref_id="1118505" ref_url="https://bugzilla.suse.com/1118505" source="BUGZILLA"/>
		<reference ref_id="1118752" ref_url="https://bugzilla.suse.com/1118752" source="BUGZILLA"/>
		<reference ref_id="1118760" ref_url="https://bugzilla.suse.com/1118760" source="BUGZILLA"/>
		<reference ref_id="1118761" ref_url="https://bugzilla.suse.com/1118761" source="BUGZILLA"/>
		<reference ref_id="1118762" ref_url="https://bugzilla.suse.com/1118762" source="BUGZILLA"/>
		<reference ref_id="1118766" ref_url="https://bugzilla.suse.com/1118766" source="BUGZILLA"/>
		<reference ref_id="1118767" ref_url="https://bugzilla.suse.com/1118767" source="BUGZILLA"/>
		<reference ref_id="1118768" ref_url="https://bugzilla.suse.com/1118768" source="BUGZILLA"/>
		<reference ref_id="1118769" ref_url="https://bugzilla.suse.com/1118769" source="BUGZILLA"/>
		<reference ref_id="1118771" ref_url="https://bugzilla.suse.com/1118771" source="BUGZILLA"/>
		<reference ref_id="1118772" ref_url="https://bugzilla.suse.com/1118772" source="BUGZILLA"/>
		<reference ref_id="1118773" ref_url="https://bugzilla.suse.com/1118773" source="BUGZILLA"/>
		<reference ref_id="1118774" ref_url="https://bugzilla.suse.com/1118774" source="BUGZILLA"/>
		<reference ref_id="1118775" ref_url="https://bugzilla.suse.com/1118775" source="BUGZILLA"/>
		<reference ref_id="1118787" ref_url="https://bugzilla.suse.com/1118787" source="BUGZILLA"/>
		<reference ref_id="1118788" ref_url="https://bugzilla.suse.com/1118788" source="BUGZILLA"/>
		<reference ref_id="1118798" ref_url="https://bugzilla.suse.com/1118798" source="BUGZILLA"/>
		<reference ref_id="1118809" ref_url="https://bugzilla.suse.com/1118809" source="BUGZILLA"/>
		<reference ref_id="1118962" ref_url="https://bugzilla.suse.com/1118962" source="BUGZILLA"/>
		<reference ref_id="1119017" ref_url="https://bugzilla.suse.com/1119017" source="BUGZILLA"/>
		<reference ref_id="1119086" ref_url="https://bugzilla.suse.com/1119086" source="BUGZILLA"/>
		<reference ref_id="1119212" ref_url="https://bugzilla.suse.com/1119212" source="BUGZILLA"/>
		<reference ref_id="1119322" ref_url="https://bugzilla.suse.com/1119322" source="BUGZILLA"/>
		<reference ref_id="1119410" ref_url="https://bugzilla.suse.com/1119410" source="BUGZILLA"/>
		<reference ref_id="1119714" ref_url="https://bugzilla.suse.com/1119714" source="BUGZILLA"/>
		<reference ref_id="1119749" ref_url="https://bugzilla.suse.com/1119749" source="BUGZILLA"/>
		<reference ref_id="1119804" ref_url="https://bugzilla.suse.com/1119804" source="BUGZILLA"/>
		<reference ref_id="1119946" ref_url="https://bugzilla.suse.com/1119946" source="BUGZILLA"/>
		<reference ref_id="1119962" ref_url="https://bugzilla.suse.com/1119962" source="BUGZILLA"/>
		<reference ref_id="1119968" ref_url="https://bugzilla.suse.com/1119968" source="BUGZILLA"/>
		<reference ref_id="1120036" ref_url="https://bugzilla.suse.com/1120036" source="BUGZILLA"/>
		<reference ref_id="1120046" ref_url="https://bugzilla.suse.com/1120046" source="BUGZILLA"/>
		<reference ref_id="1120053" ref_url="https://bugzilla.suse.com/1120053" source="BUGZILLA"/>
		<reference ref_id="1120054" ref_url="https://bugzilla.suse.com/1120054" source="BUGZILLA"/>
		<reference ref_id="1120055" ref_url="https://bugzilla.suse.com/1120055" source="BUGZILLA"/>
		<reference ref_id="1120058" ref_url="https://bugzilla.suse.com/1120058" source="BUGZILLA"/>
		<reference ref_id="1120088" ref_url="https://bugzilla.suse.com/1120088" source="BUGZILLA"/>
		<reference ref_id="1120092" ref_url="https://bugzilla.suse.com/1120092" source="BUGZILLA"/>
		<reference ref_id="1120094" ref_url="https://bugzilla.suse.com/1120094" source="BUGZILLA"/>
		<reference ref_id="1120096" ref_url="https://bugzilla.suse.com/1120096" source="BUGZILLA"/>
		<reference ref_id="1120097" ref_url="https://bugzilla.suse.com/1120097" source="BUGZILLA"/>
		<reference ref_id="1120173" ref_url="https://bugzilla.suse.com/1120173" source="BUGZILLA"/>
		<reference ref_id="1120214" ref_url="https://bugzilla.suse.com/1120214" source="BUGZILLA"/>
		<reference ref_id="1120223" ref_url="https://bugzilla.suse.com/1120223" source="BUGZILLA"/>
		<reference ref_id="1120228" ref_url="https://bugzilla.suse.com/1120228" source="BUGZILLA"/>
		<reference ref_id="1120230" ref_url="https://bugzilla.suse.com/1120230" source="BUGZILLA"/>
		<reference ref_id="1120232" ref_url="https://bugzilla.suse.com/1120232" source="BUGZILLA"/>
		<reference ref_id="1120234" ref_url="https://bugzilla.suse.com/1120234" source="BUGZILLA"/>
		<reference ref_id="1120235" ref_url="https://bugzilla.suse.com/1120235" source="BUGZILLA"/>
		<reference ref_id="1120238" ref_url="https://bugzilla.suse.com/1120238" source="BUGZILLA"/>
		<reference ref_id="1120594" ref_url="https://bugzilla.suse.com/1120594" source="BUGZILLA"/>
		<reference ref_id="1120598" ref_url="https://bugzilla.suse.com/1120598" source="BUGZILLA"/>
		<reference ref_id="1120600" ref_url="https://bugzilla.suse.com/1120600" source="BUGZILLA"/>
		<reference ref_id="1120601" ref_url="https://bugzilla.suse.com/1120601" source="BUGZILLA"/>
		<reference ref_id="1120602" ref_url="https://bugzilla.suse.com/1120602" source="BUGZILLA"/>
		<reference ref_id="1120603" ref_url="https://bugzilla.suse.com/1120603" source="BUGZILLA"/>
		<reference ref_id="1120604" ref_url="https://bugzilla.suse.com/1120604" source="BUGZILLA"/>
		<reference ref_id="1120606" ref_url="https://bugzilla.suse.com/1120606" source="BUGZILLA"/>
		<reference ref_id="1120612" ref_url="https://bugzilla.suse.com/1120612" source="BUGZILLA"/>
		<reference ref_id="1120613" ref_url="https://bugzilla.suse.com/1120613" source="BUGZILLA"/>
		<reference ref_id="1120614" ref_url="https://bugzilla.suse.com/1120614" source="BUGZILLA"/>
		<reference ref_id="1120615" ref_url="https://bugzilla.suse.com/1120615" source="BUGZILLA"/>
		<reference ref_id="1120616" ref_url="https://bugzilla.suse.com/1120616" source="BUGZILLA"/>
		<reference ref_id="1120617" ref_url="https://bugzilla.suse.com/1120617" source="BUGZILLA"/>
		<reference ref_id="1120618" ref_url="https://bugzilla.suse.com/1120618" source="BUGZILLA"/>
		<reference ref_id="1120620" ref_url="https://bugzilla.suse.com/1120620" source="BUGZILLA"/>
		<reference ref_id="1120621" ref_url="https://bugzilla.suse.com/1120621" source="BUGZILLA"/>
		<reference ref_id="1120632" ref_url="https://bugzilla.suse.com/1120632" source="BUGZILLA"/>
		<reference ref_id="1120633" ref_url="https://bugzilla.suse.com/1120633" source="BUGZILLA"/>
		<reference ref_id="1120743" ref_url="https://bugzilla.suse.com/1120743" source="BUGZILLA"/>
		<reference ref_id="1120954" ref_url="https://bugzilla.suse.com/1120954" source="BUGZILLA"/>
		<reference ref_id="1121017" ref_url="https://bugzilla.suse.com/1121017" source="BUGZILLA"/>
		<reference ref_id="1121058" ref_url="https://bugzilla.suse.com/1121058" source="BUGZILLA"/>
		<reference ref_id="1121263" ref_url="https://bugzilla.suse.com/1121263" source="BUGZILLA"/>
		<reference ref_id="1121273" ref_url="https://bugzilla.suse.com/1121273" source="BUGZILLA"/>
		<reference ref_id="1121477" ref_url="https://bugzilla.suse.com/1121477" source="BUGZILLA"/>
		<reference ref_id="1121483" ref_url="https://bugzilla.suse.com/1121483" source="BUGZILLA"/>
		<reference ref_id="1121599" ref_url="https://bugzilla.suse.com/1121599" source="BUGZILLA"/>
		<reference ref_id="1121621" ref_url="https://bugzilla.suse.com/1121621" source="BUGZILLA"/>
		<reference ref_id="1121714" ref_url="https://bugzilla.suse.com/1121714" source="BUGZILLA"/>
		<reference ref_id="1121715" ref_url="https://bugzilla.suse.com/1121715" source="BUGZILLA"/>
		<reference ref_id="1121973" ref_url="https://bugzilla.suse.com/1121973" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12232" ref_url="https://www.suse.com/security/cve/CVE-2018-12232/" source="CVE"/>
		<reference ref_id="CVE-2018-14625" ref_url="https://www.suse.com/security/cve/CVE-2018-14625/" source="CVE"/>
		<reference ref_id="CVE-2018-16862" ref_url="https://www.suse.com/security/cve/CVE-2018-16862/" source="CVE"/>
		<reference ref_id="CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884/" source="CVE"/>
		<reference ref_id="CVE-2018-18397" ref_url="https://www.suse.com/security/cve/CVE-2018-18397/" source="CVE"/>
		<reference ref_id="CVE-2018-19407" ref_url="https://www.suse.com/security/cve/CVE-2018-19407/" source="CVE"/>
		<reference ref_id="CVE-2018-19854" ref_url="https://www.suse.com/security/cve/CVE-2018-19854/" source="CVE"/>
		<reference ref_id="CVE-2018-19985" ref_url="https://www.suse.com/security/cve/CVE-2018-19985/" source="CVE"/>
		<reference ref_id="CVE-2018-20169" ref_url="https://www.suse.com/security/cve/CVE-2018-20169/" source="CVE"/>
		<reference ref_id="CVE-2018-9568" ref_url="https://www.suse.com/security/cve/CVE-2018-9568/" source="CVE"/>
		<description>


The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bnc#1118319).
- CVE-2018-12232: In net/socket.c in the there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat did not increment the file descriptor reference count, which allowed close to set the socket to NULL during fchownat's execution, leading to a NULL pointer dereference and system crash (bnc#1097593).
- CVE-2018-14625: A flaw was found where an attacker may be able to have an uncontrolled read to kernel-memory from within a vm guest. A race condition between connect() and close() function may allow an attacker using the AF_VSOCK protocol to gather a 4 byte information leak or possibly intercept or corrupt AF_VSOCK messages destined to other clients (bnc#1106615).
- CVE-2018-16862: A security flaw was found in a way that the cleancache subsystem clears an inode after the final file truncation (removal). The new file created with the same inode may contain leftover pages from cleancache and the old file data instead of the new one (bnc#1117186).
- CVE-2018-16884: NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bnc#1119946).
- CVE-2018-18397: The userfaultfd implementation mishandled access control for certain UFFDIO_ ioctl calls, as demonstrated by allowing local users to write data into holes in a tmpfs file (if the user has read-only access to that file, and that file contains holes), related to fs/userfaultfd.c and mm/userfaultfd.c (bnc#1117656).
- CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c allowed local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized (bnc#1116841).
- CVE-2018-19854: An issue was discovered in the crypto_report_one() and related functions in crypto/crypto_user.c (the crypto user configuration API) do not fully initialize structures that are copied to userspace, potentially leaking sensitive memory to user programs. NOTE: this is a CVE-2013-2547 regression but with easier exploitability because the attacker did not need a capability (however, the system must have the CONFIG_CRYPTO_USER kconfig option) (bnc#1118428).
- CVE-2018-19985: The function hso_probe read if_num from the USB device (as an u8) and used it without a length check to index an array, resulting in an OOB memory read in hso_probe or hso_get_config_data that could be used by local attackers (bnc#1120743).
- CVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).

The following non-security bugs were fixed:

- acpi / CPPC: Check for valid PCC subspace only if PCC is used (bsc#1117115).
- acpi / CPPC: Update all pr_(debug/err) messages to log the susbspace id (bsc#1117115).
- aio: fix spectre gadget in lookup_ioctx (bsc#1120594).
- alsa: cs46xx: Potential NULL dereference in probe (bsc#1051510).
- alsa: emu10k1: Fix potential Spectre v1 vulnerabilities (bsc#1051510).
- alsa: emux: Fix potential Spectre v1 vulnerabilities (bsc#1051510).
- alsa: fireface: fix for state to fetch PCM frames (bsc#1051510).
- alsa: fireface: fix reference to wrong register for clock configuration (bsc#1051510).
- alsa: firewire-lib: fix wrong assignment for 'out_packet_without_header' tracepoint (bsc#1051510).
- alsa: firewire-lib: fix wrong handling payload_length as payload_quadlet (bsc#1051510).
- alsa: firewire-lib: use the same print format for 'without_header' tracepoints (bsc#1051510).
- alsa: hda: add mute LED support for HP EliteBook 840 G4 (bsc#1051510).
- alsa: hda: Add support for AMD Stoney Ridge (bsc#1051510).
- alsa: hda/ca0132 - make pci_iounmap() call conditional (bsc#1051510).
- alsa: hda: fix front speakers on Huawei MBXP (bsc#1051510).
- alsa: hda/realtek - Add support for Acer Aspire C24-860 headset mic (bsc#1051510).
- alsa: hda/realtek - Add unplug function into unplug state of Headset Mode for ALC225 (bsc#1051510).
- alsa: hda/realtek: ALC286 mic and headset-mode fixups for Acer Aspire U27-880 (bsc#1051510).
- alsa: hda/realtek: ALC294 mic and headset-mode fixups for ASUS X542UN (bsc#1051510).
- alsa: hda/realtek - Disable headset Mic VREF for headset mode of ALC225 (bsc#1051510).
- alsa: hda/realtek: Enable audio jacks of ASUS UX391UA with ALC294 (bsc#1051510).
- alsa: hda/realtek: Enable audio jacks of ASUS UX433FN/UX333FA with ALC294 (bsc#1051510).
- alsa: hda/realtek: Enable audio jacks of ASUS UX533FD with ALC294 (bsc#1051510).
- alsa: hda/realtek: Enable the headset mic auto detection for ASUS laptops (bsc#1051510).
- alsa: hda/realtek - Fixed headphone issue for ALC700 (bsc#1051510).
- alsa: hda/realtek: Fix mic issue on Acer AIO Veriton Z4660G (bsc#1051510).
- alsa: hda/realtek: Fix mic issue on Acer AIO Veriton Z4860G/Z6860G (bsc#1051510).
- alsa: hda/realtek - Fix speaker output regression on Thinkpad T570 (bsc#1051510).
- alsa: hda/realtek - Fix the mute LED regresion on Lenovo X1 Carbon (bsc#1051510).
- alsa: hda/realtek - Support Dell headset mode for New AIO platform (bsc#1051510).
- alsa: hda/tegra: clear pending irq handlers (bsc#1051510).
- alsa: pcm: Call snd_pcm_unlink() conditionally at closing (bsc#1051510).
- alsa: pcm: Fix interval evaluation with openmin/max (bsc#1051510).
- alsa: pcm: Fix potential Spectre v1 vulnerability (bsc#1051510).
- alsa: pcm: Fix starvation on down_write_nonblock() (bsc#1051510).
- alsa: rme9652: Fix potential Spectre v1 vulnerability (bsc#1051510).
- alsa: trident: Suppress gcc string warning (bsc#1051510).
- alsa: usb-audio: Add SMSL D1 to quirks for native DSD support (bsc#1051510).
- alsa: usb-audio: Add support for Encore mDSD USB DAC (bsc#1051510).
- alsa: usb-audio: Avoid access before bLength check in build_audio_procunit() (bsc#1051510).
- alsa: usb-audio: Fix an out-of-bound read in create_composite_quirks (bsc#1051510).
- alsa: x86: Fix runtime PM for hdmi-lpe-audio (bsc#1051510).
- apparmor: do not try to replace stale label in ptrace access check (git-fixes).
- apparmor: do not try to replace stale label in ptraceme check (git-fixes).
- apparmor: Fix uninitialized value in aa_split_fqname (git-fixes).
- arm64: Add work around for Arm Cortex-A55 Erratum 1024718 (bsc#1120612).
- arm64: atomics: Remove '&amp;' from '+&amp;' asm constraint in lse atomics (bsc#1120613).
- arm64: cpu_errata: include required headers (bsc#1120615).
- arm64: dma-mapping: Fix FORCE_CONTIGUOUS buffer clearing (bsc#1120633).
- arm64: Fix /proc/iomem for reserved but not memory regions (bsc#1120632).
- arm64: lse: Add early clobbers to some input/output asm operands (bsc#1120614).
- arm64: lse: remove -fcall-used-x0 flag (bsc#1120618).
- arm64: mm: always enable CONFIG_HOLES_IN_ZONE (bsc#1120617).
- arm64/numa: Report correct memblock range for the dummy node (bsc#1120620).
- arm64/numa: Unify common error path in numa_init() (bsc#1120621).
- arm64: remove no-op -p linker flag (bsc#1120616).
- ASoC: dapm: Recalculate audio map forcely when card instantiated (bsc#1051510).
- ASoC: intel: cht_bsw_max98090_ti: Add pmc_plt_clk_0 quirk for Chromebook Clapper (bsc#1051510).
- ASoC: intel: cht_bsw_max98090_ti: Add pmc_plt_clk_0 quirk for Chromebook Gnawty (bsc#1051510).
- ASoC: Intel: mrfld: fix uninitialized variable access (bsc#1051510).
- ASoC: omap-abe-twl6040: Fix missing audio card caused by deferred probing (bsc#1051510).
- ASoC: omap-dmic: Add pm_qos handling to avoid overruns with CPU_IDLE (bsc#1051510).
- ASoC: omap-mcbsp: Fix latency value calculation for pm_qos (bsc#1051510).
- ASoC: omap-mcpdm: Add pm_qos handling to avoid under/overruns with CPU_IDLE (bsc#1051510).
- ASoC: rsnd: fixup clock start checker (bsc#1051510).
- ASoC: wm_adsp: Fix dma-unsafe read of scratch registers (bsc#1051510).
- ath10k: do not assume this is a PCI dev in generic code (bsc#1051510).
- ath6kl: Only use match sets when firmware supports it (bsc#1051510).
- b43: Fix error in cordic routine (bsc#1051510).
- bcache: fix miss key refill-&gt;end in writeback (Git-fixes).
- bcache: trace missed reading by cache_missed (Git-fixes).
- Blacklist 5182f26f6f74 crypto: ccp - Make function sev_get_firmware() static
- blk-mq: remove synchronize_rcu() from blk_mq_del_queue_tag_set() (Git-fixes).
- block: allow max_discard_segments to be stacked (Git-fixes).
- block: blk_init_allocated_queue() set q-&gt;fq as NULL in the fail case (Git-fixes).
- block: really disable runtime-pm for blk-mq (Git-fixes).
- block: reset bi_iter.bi_done after splitting bio (Git-fixes).
- block/swim: Fix array bounds check (Git-fixes).
- bnxt_en: do not try to offload VLAN 'modify' action (bsc#1050242 ).
- bnxt_en: Fix enables field in HWRM_QUEUE_COS2BW_CFG request (bsc#1086282).
- bnxt_en: Fix VNIC reservations on the PF (bsc#1086282 ).
- bnxt_en: get the reduced max_irqs by the ones used by RDMA (bsc#1050242).
- bpf: fix check of allowed specifiers in bpf_trace_printk (bsc#1083647).
- bpf: use per htab salt for bucket hash (git-fixes).
- btrfs: Always try all copies when reading extent buffers (git-fixes).
- btrfs: delete dead code in btrfs_orphan_add() (bsc#1111469).
- btrfs: delete dead code in btrfs_orphan_commit_root() (bsc#1111469).
- btrfs: do not BUG_ON() in btrfs_truncate_inode_items() (bsc#1111469).
- btrfs: do not check inode's runtime flags under root-&gt;orphan_lock (bsc#1111469).
- btrfs: do not return ino to ino cache if inode item removal fails (bsc#1111469).
- btrfs: fix ENOSPC caused by orphan items reservations (bsc#1111469).
- btrfs: Fix error handling in btrfs_cleanup_ordered_extents (git-fixes).
- btrfs: fix error handling in btrfs_truncate() (bsc#1111469).
- btrfs: fix error handling in btrfs_truncate_inode_items() (bsc#1111469).
- btrfs: fix fsync of files with multiple hard links in new directories (1120173).
- btrfs: Fix memory barriers usage with device stats counters (git-fixes).
- btrfs: fix use-after-free on root-&gt;orphan_block_rsv  (bsc#1111469).
- btrfs: get rid of BTRFS_INODE_HAS_ORPHAN_ITEM (bsc#1111469).
- btrfs: get rid of unused orphan infrastructure (bsc#1111469).
- btrfs: move btrfs_truncate_block out of trans handle (bsc#1111469).
- btrfs: qgroup: Dirty all qgroups before rescan (bsc#1120036).
- btrfs: refactor btrfs_evict_inode() reserve refill dance (bsc#1111469).
- btrfs: renumber BTRFS_INODE_ runtime flags and switch to enums (bsc#1111469).
- btrfs: reserve space for O_TMPFILE orphan item deletion (bsc#1111469).
- btrfs: run delayed items before dropping the snapshot (bsc#1121263, bsc#1111188).
- btrfs: stop creating orphan items for truncate (bsc#1111469).
- btrfs: tree-checker: Do not check max block group size as current max chunk size limit is unreliable (fixes for bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875).
- btrfs: update stale comments referencing vmtruncate() (bsc#1111469).
- can: flexcan: flexcan_irq(): fix indention (bsc#1051510).
- cdrom: do not attempt to fiddle with cdo-&gt;capability (bsc#1051510).
- ceph: do not update importing cap's mseq when handing cap export (bsc#1121273).
- char_dev: extend dynamic allocation of majors into a higher range (bsc#1121058).
- char_dev: Fix off-by-one bugs in find_dynamic_major() (bsc#1121058).
- clk: mmp: Off by one in mmp_clk_add() (bsc#1051510).
- clk: mvebu: Off by one bugs in cp110_of_clk_get() (bsc#1051510).
- compiler-gcc.h: Add __attribute__((gnu_inline)) to all inline declarations (git-fixes).
- config: arm64: enable erratum 1024718
- cpufeature: avoid warning when compiling with clang (Git-fixes).
- cpufreq / CPPC: Add cpuinfo_cur_freq support for CPPC (bsc#1117115).
- cpufreq: CPPC: fix build in absence of v3 support (bsc#1117115).
- cpupower: remove stringop-truncation waring (git-fixes).
- crypto: bcm - fix normal/non key hash algorithm failure (bsc#1051510).
- crypto: ccp - Add DOWNLOAD_FIRMWARE SEV command ().
- crypto: ccp - Add GET_ID SEV command ().
- crypto: ccp - Add psp enabled message when initialization succeeds ().
- crypto: ccp - Add support for new CCP/PSP device ID ().
- crypto: ccp - Allow SEV firmware to be chosen based on Family and Model ().
- crypto: ccp - Fix static checker warning ().
- crypto: ccp - Remove unused #defines ().
- crypto: ccp - Support register differences between PSP devices ().
- dasd: fix deadlock in dasd_times_out (bsc#1121477, LTC#174111).
- dax: Check page-&gt;mapping isn't NULL (bsc#1120054).
- dax: Do not access a freed inode (bsc#1120055).
- device property: Define type of PROPERTY_ENRTY_*() macros (bsc#1051510).
- device property: fix fwnode_graph_get_next_endpoint() documentation (bsc#1051510).
- disable stringop truncation warnings for now (git-fixes).
- dm: allocate struct mapped_device with kvzalloc (Git-fixes).
- dm cache: destroy migration_cache if cache target registration failed (Git-fixes).
- dm cache: fix resize crash if user does not reload cache table (Git-fixes).
- dm cache metadata: ignore hints array being too small during resize (Git-fixes).
- dm cache metadata: save in-core policy_hint_size to on-disk superblock (Git-fixes).
- dm cache metadata: set dirty on all cache blocks after a crash (Git-fixes).
- dm cache: only allow a single io_mode cache feature to be requested (Git-fixes).
- dm crypt: do not decrease device limits (Git-fixes).
- dm: fix report zone remapping to account for partition offset (Git-fixes).
- dm integrity: change 'suspending' variable from bool to int (Git-fixes).
- dm ioctl: harden copy_params()'s copy_from_user() from malicious users (Git-fixes).
- dm linear: eliminate linear_end_io call if CONFIG_DM_ZONED disabled (Git-fixes).
- dm linear: fix linear_end_io conditional definition (Git-fixes).
- dm thin: handle running out of data space vs concurrent discard (Git-fixes).
- dm thin metadata: remove needless work from __commit_transaction (Git-fixes).
- dm thin: stop no_space_timeout worker when switching to write-mode (Git-fixes).
- dm writecache: fix a crash due to reading past end of dirty_bitmap (Git-fixes).
- dm writecache: report start_sector in status line (Git-fixes).
- dm zoned: fix metadata block ref counting (Git-fixes).
- dm zoned: fix various dmz_get_mblock() issues (Git-fixes).
- doc/README.SUSE: correct GIT url No more gitorious, github we use.
- drivers/net/usb: add device id for TP-LINK UE300 USB 3.0 Ethernet (bsc#1119749).
- drivers/net/usb/r8152: remove the unneeded variable 'ret' in rtl8152_system_suspend (bsc#1119749).
- drivers/tty: add missing of_node_put() (bsc#1051510).
- drm/amdgpu/gmc8: update MC firmware for polaris (bsc#1113722)
- drm/amdgpu: update mc firmware image for polaris12 variants (bsc#1113722)
- drm/amdgpu: update SMC firmware image for polaris10 variants (bsc#1113722)
- drm/fb-helper: Ignore the value of fb_var_screeninfo.pixclock (bsc#1113722)
- drm/i915/execlists: Apply a full mb before execution for Braswell (bsc#1113722)
- drm/ioctl: Fix Spectre v1 vulnerabilities (bsc#1113722)
- drm/nouveau/kms: Fix memory leak in nv50_mstm_del() (bsc#1113722)
- drm: rcar-du: Fix external clock error checks (bsc#1113722)
- drm: rcar-du: Fix vblank initialization (bsc#1113722)
- drm/rockchip: psr: do not dereference encoder before it is null (bsc#1113722)
- drm: set is_master to 0 upon drm_new_set_master() failure (bsc#1113722)
- drm/vc4: Set -&gt;is_yuv to false when num_planes == 1 (bsc#1113722)
- drm/vc4: -&gt;x_scaling[1] should never be set to VC4_SCALING_NONE (bsc#1113722)
- dt-bindings: add compatible string for Allwinner V3s SoC (git-fixes).
- dt-bindings: arm: Document SoC compatible value for Armadillo-800 EVA (git-fixes).
- dt-bindings: clock: add rk3399 DDR3 standard speed bins (git-fixes).
- dt-bindings: clock: mediatek: add binding for fixed-factor clock axisel_d4 (git-fixes).
- dt-bindings: iio: update STM32 timers clock names (git-fixes).
- dt-bindings: mfd: axp20x: Add AXP806 to supported list of chips (git-fixes).
- dt-bindings: net: Remove duplicate NSP Ethernet MAC binding document (git-fixes).
- dt-bindings: panel: lvds: Fix path to display timing bindings (git-fixes).
- dt-bindings: phy: sun4i-usb-phy: Add property descriptions for H3 (git-fixes).
- dt-bindings: pwm: renesas: tpu: Fix 'compatible' prop description (git-fixes).
- dt-bindings: pwm: Update STM32 timers clock names (git-fixes).
- dt-bindings: rcar-dmac: Document missing error interrupt (git-fixes).
- efi: Move some sysfs files to be read-only by root (bsc#1051510).
- ethernet: fman: fix wrong of_node_put() in probe function (bsc#1119017).
- exportfs: fix 'passing zero to ERR_PTR()' warning (bsc#1118773).
- ext2: fix potential use after free (bsc#1118775).
- ext4: avoid possible double brelse() in add_new_gdb() on error path (bsc#1118760).
- ext4: fix EXT4_IOC_GROUP_ADD ioctl (bsc#1120604).
- ext4: fix possible use after free in ext4_quota_enable (bsc#1120602).
- ext4: missing unlock/put_page() in ext4_try_to_write_inline_data() (bsc#1120603).
- extable: Consolidate *kernel_text_address() functions (bsc#1120092).
- extable: Enable RCU if it is not watching in kernel_text_address() (bsc#1120092).
- fbdev: fbcon: Fix unregister crash when more than one framebuffer (bsc#1113722)
- fbdev: fbmem: behave better with small rotated displays and many CPUs (bsc#1113722)
- filesystem-dax: Fix dax_layout_busy_page() livelock (bsc#1118787).
- firmware: add firmware_request_nowarn() - load firmware without warnings ().
- Fix tracing sample code warning (git-fixes).
- fscache: Fix race in fscache_op_complete() due to split atomic_sub &amp; read (Git-fixes).
- fscache: Pass the correct cancelled indications to fscache_op_complete() (Git-fixes).
- fs: fix lost error code in dio_complete (bsc#1118762).
- fs/xfs: Use %pS printk format for direct addresses (git-fixes).
- fuse: fix blocked_waitq wakeup (git-fixes).
- fuse: fix leaked notify reply (git-fixes).
- fuse: fix possibly missed wake-up after abort (git-fixes).
- fuse: Fix use-after-free in fuse_dev_do_read() (git-fixes).
- fuse: Fix use-after-free in fuse_dev_do_write() (git-fixes).
- fuse: fix use-after-free in fuse_direct_IO() (git-fixes).
- fuse: set FR_SENT while locked (git-fixes).
- gcc-plugins: Add include required by GCC release 8 (git-fixes).
- gcc-plugins: Use dynamic initializers (git-fixes).
- gfs2: Do not leave s_fs_info pointing to freed memory in init_sbd (bsc#1118769).
- gfs2: Fix loop in gfs2_rbm_find (bsc#1120601).
- gfs2: Get rid of potential double-freeing in gfs2_create_inode (bsc#1120600).
- gfs2_meta: -&gt;mount() can get NULL dev_name (bsc#1118768).
- gfs2: Put bitmap buffers in put_super (bsc#1118772).
- gpio: davinci: Remove unused member of davinci_gpio_controller (git-fixes).
- gpiolib-acpi: Only defer request_irq for GpioInt ACPI event handlers (bsc#1051510).
- gpiolib: Fix return value of gpio_to_desc() stub if !GPIOLIB (bsc#1051510).
- gpio: max7301: fix driver for use with CONFIG_VMAP_STACK (bsc#1051510).
- gpio: mvebu: only fail on missing clk if pwm is actually to be used (bsc#1051510).
- hid: Add quirk for Primax PIXART OEM mice (bsc#1119410).
- hid: input: Ignore battery reported by Symbol DS4308 (bsc#1051510).
- hid: multitouch: Add pointstick support for Cirque Touchpad (bsc#1051510).
- hwpoison, memory_hotplug: allow hwpoisoned pages to be offlined (bnc#1116336).
- i2c: axxia: properly handle master timeout (bsc#1051510).
- i2c: scmi: Fix probe error on devices with an empty SMB0001 ACPI device node (bsc#1051510).
- ib/hfi1: Add mtu check for operational data VLs (bsc#1060463 ).
- ibmvnic: Convert reset work item mutex to spin lock ().
- ibmvnic: Fix non-atomic memory allocation in IRQ context ().
- ib/rxe: support for 802.1q VLAN on the listener (bsc#1082387).
- ieee802154: 6lowpan: set IFLA_LINK (bsc#1051510).
- ieee802154: at86rf230: switch from BUG_ON() to WARN_ON() on problem (bsc#1051510).
- ieee802154: at86rf230: use __func__ macro for debug messages (bsc#1051510).
- ieee802154: fakelb: switch from BUG_ON() to WARN_ON() on problem (bsc#1051510).
- Include modules.fips in kernel-binary as well as kernel-binary-base ().
- initramfs: fix initramfs rebuilds w/ compression after disabling (git-fixes).
- Input: add official Raspberry Pi's touchscreen driver ().
- Input: cros_ec_keyb - fix button/switch capability reports (bsc#1051510).
- Input: elan_i2c - add ACPI ID for Lenovo IdeaPad 330-15ARR (bsc#1051510).
- Input: elan_i2c - add ELAN0620 to the ACPI table (bsc#1051510).
- Input: elan_i2c - add support for ELAN0621 touchpad (bsc#1051510).
- Input: hyper-v - fix wakeup from suspend-to-idle (bsc#1051510).
- Input: matrix_keypad - check for errors from of_get_named_gpio() (bsc#1051510).
- Input: nomadik-ske-keypad - fix a loop timeout test (bsc#1051510).
- Input: omap-keypad - fix keyboard debounce configuration (bsc#1051510).
- Input: synaptics - add PNP ID for ThinkPad P50 to SMBus (bsc#1051510).
- Input: synaptics - enable SMBus for HP 15-ay000 (bsc#1051510).
- Input: xpad - quirk all PDP Xbox One gamepads (bsc#1051510).
- integrity/security: fix digsig.c build error with header file (bsc#1051510).
- intel_th: msu: Fix an off-by-one in attribute store (bsc#1051510).
- iommu/amd: Fix amd_iommu=force_isolation (bsc#1106105).
- iommu/vt-d: Handle domain agaw being less than iommu agaw (bsc#1106105).
- iwlwifi: add new cards for 9560, 9462, 9461 and killer series (bsc#1051510).
- iwlwifi: fix LED command capability bit (bsc#1119086).
- iwlwifi: fix non_shared_ant for 22000 devices (bsc#1119086).
- iwlwifi: fix wrong WGDS_WIFI_DATA_SIZE (bsc#1119086).
- iwlwifi: mvm: do not send GEO_TX_POWER_LIMIT to old firmwares (bsc#1119086).
- iwlwifi: nvm: get num of hw addresses from firmware (bsc#1119086).
- iwlwifi: pcie: do not reset TXQ write pointer (bsc#1051510).
- jffs2: free jffs2_sb_info through jffs2_kill_sb() (bsc#1118767).
- jump_label: Split out code under the hotplug lock (bsc#1106913).
- kabi: hwpoison, memory_hotplug: allow hwpoisoned pages to be offlined (bnc#1116336).
- kabi protect hnae_ae_ops (bsc#1104353).
- kbuild: allow to use GCC toolchain not in Clang search path (git-fixes).
- kbuild: fix linker feature test macros when cross compiling with Clang (git-fixes).
- kbuild: make missing $DEPMOD a Warning instead of an Error (git-fixes).
- kbuild: rpm-pkg: keep spec file until make mrproper (git-fixes).
- kbuild: suppress packed-not-aligned warning for default setting only (git-fixes).
- kbuild: verify that $DEPMOD is installed (git-fixes).
- kdb: use memmove instead of overlapping memcpy (bsc#1120954).
- kernfs: Replace strncpy with memcpy (bsc#1120053).
- keys: Fix the use of the C++ keyword 'private' in uapi/linux/keyctl.h (Git-fixes).
- kobject: Replace strncpy with memcpy (git-fixes).
- kprobes: Make list and blacklist root user read only (git-fixes).
- kvm: PPC: Book3S PR: Enable use on POWER9 inside HPT-mode guests (bsc#1118484).
- libata: whitelist all SAMSUNG MZ7KM* solid-state disks (bsc#1051510).
- libertas_tf: prevent underflow in process_cmdrequest() (bsc#1119086).
- libnvdimm, pfn: Pad pfn namespaces relative to other regions (bsc#1118962).
- libnvdimm, pmem: Fix badblocks population for 'raw' namespaces (bsc#1118788).
- lib/raid6: Fix arm64 test build (bsc#1051510).
- lib/ubsan.c: do not mark __ubsan_handle_builtin_unreachable as noreturn (bsc#1051510).
- Limit max FW API version for QCA9377 (bsc#1121714, bsc#1121715).
- linux/bitmap.h: fix type of nbits in bitmap_shift_right() (bsc#1051510).
- locking/barriers: Convert users of lockless_dereference() to READ_ONCE() (Git-fixes).
- locking/static_keys: Improve uninitialized key warning (bsc#1106913).
- mac80211: Clear beacon_int in ieee80211_do_stop (bsc#1051510).
- mac80211: fix reordering of buffered broadcast packets (bsc#1051510).
- mac80211_hwsim: fix module init error paths for netlink (bsc#1051510).
- mac80211_hwsim: Timer should be initialized before device registered (bsc#1051510).
- mac80211: ignore NullFunc frames in the duplicate detection (bsc#1051510).
- mac80211: ignore tx status for PS stations in ieee80211_tx_status_ext (bsc#1051510).
- Mark HI and TASKLET softirq synchronous (git-fixes).
- md: fix raid10 hang issue caused by barrier (git-fixes).
- media: em28xx: Fix use-after-free when disconnecting (bsc#1051510).
- media: em28xx: make v4l2-compliance happier by starting sequence on zero (bsc#1051510).
- media: omap3isp: Unregister media device as first (bsc#1051510).
- mmc: bcm2835: reset host on timeout (bsc#1051510).
- mmc: core: Allow BKOPS and CACHE ctrl even if no HPI support (bsc#1051510).
- mmc: core: Reset HPI enabled state during re-init and in case of errors (bsc#1051510).
- mmc: core: Use a minimum 1600ms timeout when enabling CACHE ctrl (bsc#1051510).
- mmc: dw_mmc-bluefield: Add driver extension (bsc#1118752).
- mmc: dw_mmc-k3: add sd support for hi3660 (bsc#1118752).
- MMC: OMAP: fix broken MMC on OMAP15XX/OMAP5910/OMAP310 (bsc#1051510).
- mmc: omap_hsmmc: fix DMA API warning (bsc#1051510).
- mmc: sdhci: fix the timeout check window for clock and reset (bsc#1051510).
- mm: do not miss the last page because of round-off error (bnc#1118798).
- mm: do not warn about large allocations for slab (git fixes (slab)).
- mm/huge_memory.c: reorder operations in __split_huge_page_tail() (VM Functionality bsc#1119962).
- mm/huge_memory: fix lockdep complaint on 32-bit i_size_read() (VM Functionality, bsc#1121599).
- mm/huge_memory: rename freeze_page() to unmap_page() (VM Functionality, bsc#1121599).
- mm/huge_memory: splitting set mapping+index before unfreeze (VM Functionality, bsc#1121599).
- mm: hugetlb: yield when prepping struct pages (git fixes (memory initialisation)).
- mm/khugepaged: collapse_shmem() do not crash on Compound (VM Functionality, bsc#1121599).
- mm/khugepaged: collapse_shmem() remember to clear holes (VM Functionality, bsc#1121599).
- mm/khugepaged: collapse_shmem() stop if punched or truncated (VM Functionality, bsc#1121599).
- mm/khugepaged: collapse_shmem() without freezing new_page (VM Functionality, bsc#1121599).
- mm/khugepaged: fix crashes due to misaccounted holes (VM Functionality, bsc#1121599).
- mm/khugepaged: minor reorderings in collapse_shmem() (VM Functionality, bsc#1121599).
- mm: lower the printk loglevel for __dump_page messages (generic hotplug debugability).
- mm, memory_hotplug: be more verbose for memory offline failures (generic hotplug debugability).
- mm, memory_hotplug: drop pointless block alignment checks from __offline_pages (generic hotplug debugability).
- mm, memory_hotplug: print reason for the offlining failure (generic hotplug debugability).
- mm: migration: fix migration of huge PMD shared pages (bnc#1086423).
- mm: only report isolation failures when offlining memory (generic hotplug debugability).
- mm: print more information about mapping in __dump_page (generic hotplug debugability).
- mm: put_and_wait_on_page_locked() while page is migrated (bnc#1109272).
- mm: sections are not offlined during memory hotremove (bnc#1119968).
- mm: shmem.c: Correctly annotate new inodes for lockdep (Git fixes: shmem).
- mm/vmstat.c: fix NUMA statistics updates (git fixes).
- Move dell_rbu fix to sorted section (bsc#1087978).
- mtd: cfi: convert inline functions to macros (git-fixes).
- mtd: Fix comparison in map_word_andequal() (git-fixes).
- namei: allow restricted O_CREAT of FIFOs and regular files (bsc#1118766).
- nbd: do not allow invalid blocksize settings (Git-fixes).
- net: bgmac: Fix endian access in bgmac_dma_tx_ring_free() (bsc#1051510).
- net: dsa: mv88e6xxx: Fix binding documentation for MDIO busses (git-fixes).
- net: dsa: qca8k: Add QCA8334 binding documentation (git-fixes).
- net: ena: fix crash during ena_remove() (bsc#1111696 bsc#1117561).
- net: ena: update driver version from 2.0.1 to 2.0.2 (bsc#1111696 bsc#1117561).
- net: hns3: Add nic state check before calling netif_tx_wake_queue (bsc#1104353).
- net: hns3: Add support for hns3_nic_netdev_ops.ndo_do_ioctl (bsc#1104353).
- net: hns3: bugfix for buffer not free problem during resetting (bsc#1104353).
- net: hns3: bugfix for handling mailbox while the command queue reinitialized (bsc#1104353).
- net: hns3: bugfix for hclge_mdio_write and hclge_mdio_read (bsc#1104353).
- net: hns3: bugfix for is_valid_csq_clean_head() (bsc#1104353 ).
- net: hns3: bugfix for reporting unknown vector0 interrupt repeatly problem (bsc#1104353).
- net: hns3: bugfix for rtnl_lock's range in the hclgevf_reset() (bsc#1104353).
- net: hns3: bugfix for the initialization of command queue's spin lock (bsc#1104353).
- net: hns3: Check hdev state when getting link status (bsc#1104353).
- net: hns3: Clear client pointer when initialize client failed or unintialize finished (bsc#1104353).
- net: hns3: Fix cmdq registers initialization issue for vf (bsc#1104353).
- net: hns3: Fix error of checking used vlan id (bsc#1104353 ).
- net: hns3: Fix ets validate issue (bsc#1104353).
- net: hns3: Fix for netdev not up problem when setting mtu (bsc#1104353).
- net: hns3: Fix for out-of-bounds access when setting pfc back pressure (bsc#1104353).
- net: hns3: Fix for packet buffer setting bug (bsc#1104353 ).
- net: hns3: Fix for rx vlan id handle to support Rev 0x21 hardware (bsc#1104353).
- net: hns3: Fix for setting speed for phy failed problem (bsc#1104353).
- net: hns3: Fix for vf vlan delete failed problem (bsc#1104353 ).
- net: hns3: Fix loss of coal configuration while doing reset (bsc#1104353).
- net: hns3: Fix parameter type for q_id in hclge_tm_q_to_qs_map_cfg() (bsc#1104353).
- net: hns3: Fix ping exited problem when doing lp selftest (bsc#1104353).
- net: hns3: Preserve vlan 0 in hardware table (bsc#1104353 ).
- net: hns3: remove unnecessary queue reset in the hns3_uninit_all_ring() (bsc#1104353).
- net: hns3: Set STATE_DOWN bit of hdev state when stopping net (bsc#1104353).
- net/mlx4_core: Correctly set PFC param if global pause is turned off (bsc#1046299).
- net: usb: r8152: constify usb_device_id (bsc#1119749).
- net: usb: r8152: use irqsave() in USB's complete callback (bsc#1119749).
- nospec: Allow index argument to have const-qualified type (git-fixes)
- nospec: Kill array_index_nospec_mask_check() (git-fixes).
- nvme-fc: resolve io failures during connect (bsc#1116803).
- nvme-multipath: zero out ANA log buffer (bsc#1105168).
- nvme: validate controller state before rescheduling keep alive (bsc#1103257).
- objtool: Detect RIP-relative switch table references (bsc#1058115).
- objtool: Detect RIP-relative switch table references, part 2 (bsc#1058115).
- objtool: Fix another switch table detection issue (bsc#1058115).
- objtool: Fix double-free in .cold detection error path (bsc#1058115).
- objtool: Fix GCC 8 cold subfunction detection for aliased functions (bsc#1058115).
- objtool: Fix 'noreturn' detection for recursive sibling calls (bsc#1058115).
- objtool: Fix segfault in .cold detection with -ffunction-sections (bsc#1058115).
- objtool: Support GCC 8's cold subfunctions (bsc#1058115).
- objtool: Support GCC 8 switch tables (bsc#1058115).
- panic: avoid deadlocks in re-entrant console drivers (bsc#1088386).
- pci: Add ACS quirk for Ampere root ports (bsc#1120058).
- pci: Add ACS quirk for APM X-Gene devices (bsc#1120058).
- pci: Convert device-specific ACS quirks from NULL termination to ARRAY_SIZE (bsc#1120058).
- pci: Delay after FLR of Intel DC P3700 NVMe (bsc#1120058).
- pci: Disable Samsung SM961/PM961 NVMe before FLR (bsc#1120058).
- pci: Export pcie_has_flr() (bsc#1120058).
- pci: iproc: Activate PAXC bridge quirk for more devices (bsc#1120058).
- pci: Mark Ceton InfiniTV4 INTx masking as broken (bsc#1120058).
- pci: Mark fall-through switch cases before enabling -Wimplicit-fallthrough (bsc#1120058).
- pci: Mark Intel XXV710 NIC INTx masking as broken (bsc#1120058).
- perf tools: Fix tracing_path_mount proper path (git-fixes).
- platform-msi: Free descriptors in platform_msi_domain_free() (bsc#1051510).
- powerpc/64s: consolidate MCE counter increment (bsc#1094244).
- powerpc/64s/radix: Fix process table entry cache invalidation (bsc#1055186, git-fixes).
- powerpc/boot: Expose Kconfig symbols to wrapper (bsc#1065729).
- powerpc/boot: Fix build failures with -j 1 (bsc#1065729).
- powerpc/pkeys: Fix handling of pkey state across fork() (bsc#1078248, git-fixes).
- powerpc/powernv: Fix save/restore of SPRG3 on entry/exit from stop (idle) (bsc#1055121).
- powerpc/pseries: Track LMB nid instead of using device tree (bsc#1108270).
- powerpc/traps: restore recoverability of machine_check interrupts (bsc#1094244).
- power: supply: olpc_battery: correct the temperature units (bsc#1051510).
- ptrace: Remove unused ptrace_may_access_sched() and MODE_IBRS (bsc#1106913).
- qed: Add driver support for 20G link speed (bsc#1110558).
- qed: Add support for virtual link (bsc#1111795).
- qede: Add driver support for 20G link speed (bsc#1110558).
- r8152: add byte_enable for ocp_read_word function (bsc#1119749).
- r8152: add Linksys USB3GIGV1 id (bsc#1119749).
- r8152: add r8153_phy_status function (bsc#1119749).
- r8152: adjust lpm settings for RTL8153 (bsc#1119749).
- r8152: adjust rtl8153_runtime_enable function (bsc#1119749).
- r8152: adjust the settings about MAC clock speed down for RTL8153 (bsc#1119749).
- r8152: adjust U2P3 for RTL8153 (bsc#1119749).
- r8152: avoid rx queue more than 1000 packets (bsc#1119749).
- r8152: check if disabling ALDPS is finished (bsc#1119749).
- r8152: correct the definition (bsc#1119749).
- r8152: disable RX aggregation on Dell TB16 dock (bsc#1119749).
- r8152: disable RX aggregation on new Dell TB16 dock (bsc#1119749).
- r8152: fix wrong checksum status for received IPv4 packets (bsc#1119749).
- r8152: move calling delay_autosuspend function (bsc#1119749).
- r8152: move the default coalesce setting for RTL8153 (bsc#1119749).
- r8152: move the initialization to reset_resume function (bsc#1119749).
- r8152: move the setting of rx aggregation (bsc#1119749).
- r8152: replace napi_complete with napi_complete_done (bsc#1119749).
- r8152: set rx mode early when linking on (bsc#1119749).
- r8152: split rtl8152_resume function (bsc#1119749).
- r8152: support new chip 8050 (bsc#1119749).
- r8152: support RTL8153B (bsc#1119749).
- rbd: whitelist RBD_FEATURE_OPERATIONS feature bit (Git-fixes).
- rcu: Allow for page faults in NMI handlers (bsc#1120092).
- rdma/bnxt_re: Add missing spin lock initialization (bsc#1050244 ).
- rdma/bnxt_re: Avoid accessing the device structure after it is freed (bsc#1050244).
- rdma/bnxt_re: Avoid NULL check after accessing the pointer (bsc#1086283).
- rdma/bnxt_re: Fix system hang when registration with L2 driver fails (bsc#1086283).
- rdma/hns: Bugfix pbl configuration for rereg mr (bsc#1104427 ).
- rdma_rxe: make rxe work over 802.1q VLAN devices (bsc#1082387).
- reset: remove remaining WARN_ON() in &lt;linux/reset.h&gt; (Git-fixes).
- Revert commit ef9209b642f 'staging: rtl8723bs: Fix indenting errors and an off-by-one mistake in core/rtw_mlme_ext.c' (bsc#1051510).
- Revert 'iommu/io-pgtable-arm: Check for v7s-incapable systems' (bsc#1106105).
- Revert 'PCI/ASPM: Do not initialize link state when aspm_disabled is set' (bsc#1051510).
- Revert 'scsi: lpfc: ls_rjt erroneus FLOGIs' (bsc#1119322).
- ring-buffer: Allow for rescheduling when removing pages (bsc#1120238).
- ring-buffer: Do no reuse reader page if still in use (bsc#1120096).
- ring-buffer: Mask out the info bits when returning buffer page length (bsc#1120094).
- rtc: hctosys: Add missing range error reporting (bsc#1051510).
- rtc: m41t80: Correct alarm month range with RTC reads (bsc#1051510).
- rtc: pcf2127: fix a kmemleak caused in pcf2127_i2c_gather_write (bsc#1051510).
- rtc: snvs: Add timeouts to avoid kernel lockups (bsc#1051510).
- rtl8xxxu: Fix missing break in switch (bsc#1051510).
- s390/dasd: simplify locking in dasd_times_out (bsc#1104967,).
- s390/kdump: Fix elfcorehdr size calculation (bsc#1117953, LTC#171112).
- s390/kdump: Make elfcorehdr size calculation ABI compliant (bsc#1117953, LTC#171112).
- s390/qeth: fix length check in SNMP processing (bsc#1117953, LTC#173657).
- s390/qeth: remove outdated portname debug msg (bsc#1117953, LTC#172960).
- s390/qeth: sanitize strings in debug messages (bsc#1117953, LTC#172960).
- sbitmap: fix race in wait batch accounting (Git-fixes).
- sched/core: Fix cpu.max vs. cpuhotplug deadlock (bsc#1106913).
- sched/smt: Expose sched_smt_present static key (bsc#1106913).
- sched/smt: Make sched_smt_present track topology (bsc#1106913).
- sched, tracing: Fix trace_sched_pi_setprio() for deboosting (bsc#1120228).
- scsi: lpfc: Cap NPIV vports to 256 (bsc#1118215).
- scsi: lpfc: Correct code setting non existent bits in sli4 ABORT WQE (bsc#1118215).
- scsi: lpfc: Correct topology type reporting on G7 adapters (bsc#1118215).
- scsi: lpfc: Defer LS_ACC to FLOGI on point to point logins (bsc#1118215).
- scsi: lpfc: Enable Management features for IF_TYPE=6 (bsc#1119322).
- scsi: lpfc: Fix a duplicate 0711 log message number (bsc#1118215).
- scsi: lpfc: fix block guard enablement on SLI3 adapters (bsc#1079935).
- scsi: lpfc: Fix dif and first burst use in write commands (bsc#1118215).
- scsi: lpfc: Fix discovery failures during port failovers with lots of vports (bsc#1118215).
- scsi: lpfc: Fix driver release of fw-logging buffers (bsc#1118215).
- scsi: lpfc: Fix kernel Oops due to null pring pointers (bsc#1118215).
- scsi: lpfc: Fix panic when FW-log buffsize is not initialized (bsc#1118215).
- scsi: lpfc: ls_rjt erroneus FLOGIs (bsc#1118215).
- scsi: lpfc: refactor mailbox structure context fields (bsc#1118215).
- scsi: lpfc: rport port swap discovery issue (bsc#1118215).
- scsi: lpfc: update driver version to 12.0.0.9 (bsc#1118215).
- scsi: lpfc: update manufacturer attribute to reflect Broadcom (bsc#1118215).
- scsi: target: add emulate_pr backstore attr to toggle PR support (bsc#1091405).
- scsi: target: drop unused pi_prot_format attribute storage (bsc#1091405).
- scsi: zfcp: fix posting too many status read buffers leading to adapter shutdown (bsc#1121483, LTC#174588).
- shmem: introduce shmem_inode_acct_block (VM Functionality, bsc#1121599).
- shmem: shmem_charge: verify max_block is not exceeded before inode update (VM Functionality, bsc#1121599).
- skd: Avoid that module unloading triggers a use-after-free (Git-fixes).
- skd: Submit requests to firmware before triggering the doorbell (Git-fixes).
- soc: bcm2835: sync firmware properties with downstream ()
- spi: bcm2835: Avoid finishing transfer prematurely in IRQ mode (bsc#1051510).
- spi: bcm2835: Fix book-keeping of DMA termination (bsc#1051510).
- spi: bcm2835: Fix race on DMA termination (bsc#1051510).
- spi: bcm2835: Unbreak the build of esoteric configs (bsc#1051510).
- splice: do not read more than available pipe space (bsc#1119212).
- staging: bcm2835-camera: Abort probe if there is no camera (bsc#1051510).
- staging: rtl8712: Fix possible buffer overrun (bsc#1051510).
- staging: rtl8723bs: Add missing return for cfg80211_rtw_get_station (bsc#1051510).
- staging: rts5208: fix gcc-8 logic error warning (bsc#1051510).
- staging: wilc1000: fix missing read_write setting when reading data (bsc#1051510).
- supported.conf: add raspberrypi-ts driver
- supported.conf: whitelist bluefield eMMC driver
- target/iscsi: avoid NULL dereference in CHAP auth error path (bsc#1117165).
- target: se_dev_attrib.emulate_pr ABI stability (bsc#1091405).
- team: no need to do team_notify_peers or team_mcast_rejoin when disabling port (bsc#1051510).
- termios, tty/tty_baudrate.c: fix buffer overrun (bsc#1051510).
- test_hexdump: use memcpy instead of strncpy (bsc#1051510).
- tmpfs: make lseek(SEEK_DATA/SEK_HOLE) return ENXIO with a negative offset (bsc#1051510).
- tools: hv: fcopy: set 'error' in case an unknown operation was requested (git-fixes).
- Tools: hv: Fix a bug in the key delete code (git-fixes).
- tools: hv: include string.h in hv_fcopy_daemon (git-fixes).
- tools/lib/lockdep: Rename 'trywlock' into 'trywrlock' (bsc#1121973).
- tools/power/cpupower: fix compilation with STATIC=true (git-fixes).
- tools/power turbostat: fix possible sprintf buffer overflow (git-fixes).
- tracing/blktrace: Fix to allow setting same value (Git-fixes).
- tracing: Fix bad use of igrab in trace_uprobe.c (bsc#1120046).
- tracing: Fix crash when freeing instances with event triggers (bsc#1120230).
- tracing: Fix crash when it fails to alloc ring buffer (bsc#1120097).
- tracing: Fix double free of event_trigger_data (bsc#1120234).
- tracing: Fix missing return symbol in function_graph output (bsc#1120232).
- tracing: Fix possible double free in event_enable_trigger_func() (bsc#1120235).
- tracing: Fix possible double free on failure of allocating trace buffer (bsc#1120214).
- tracing: Fix regex_match_front() to not over compare the test string (bsc#1120223).
- tracing: Fix trace_pipe behavior for instance traces (bsc#1120088).
- tracing: Remove RCU work arounds from stack tracer (bsc#1120092).
- tracing/samples: Fix creation and deletion of simple_thread_fn creation (git-fixes).
- tty: Do not hold ldisc lock in tty_reopen() if ldisc present (bsc#1051510).
- tty: Do not return -EAGAIN in blocking read (bsc#1116040).
- tty: do not set TTY_IO_ERROR flag if console port (bsc#1051510).
- tty: serial: 8250_mtk: always resume the device in probe (bsc#1051510).
- ubifs: Handle re-linking of inodes correctly while recovery (bsc#1120598).
- ubifs-Handle-re-linking-of-inodes-correctly-while-re.patch: Fixup compilation failure due to different ubifs_assert() prototype.
- udf: Allow mounting volumes with incorrect identification strings (bsc#1118774).
- unifdef: use memcpy instead of strncpy (bsc#1051510).
- usb: appledisplay: Add 27' Apple Cinema Display (bsc#1051510).
- usb: core: quirks: add RESET_RESUME quirk for Cherry G230 Stream series (bsc#1051510).
- usb: dwc2: host: use hrtimer for NAK retries (git-fixes).
- usb: hso: Fix OOB memory access in hso_probe/hso_get_config_data (bsc#1051510).
- usbip: vhci_hcd: check rhport before using in vhci_hub_control() (bsc#1090888).
- usb: omap_udc: fix crashes on probe error and module removal (bsc#1051510).
- usb: omap_udc: fix omap_udc_start() on 15xx machines (bsc#1051510).
- usb: omap_udc: fix USB gadget functionality on Palm Tungsten E (bsc#1051510).
- usb: omap_udc: use devm_request_irq() (bsc#1051510).
- usb: quirk: add no-LPM quirk on SanDisk Ultra Flair device (bsc#1051510).
- usb: serial: option: add Fibocom NL668 series (bsc#1051510).
- usb: serial: option: add GosunCn ZTE WeLink ME3630 (bsc#1051510).
- usb: serial: option: add HP lt4132 (bsc#1051510).
- usb: serial: option: add Simcom SIM7500/SIM7600 (MBIM mode) (bsc#1051510).
- usb: serial: option: add Telit LN940 series (bsc#1051510).
- usb: usbip: Fix BUG: KASAN: slab-out-of-bounds in vhci_hub_control() (bsc#1106110).
- usb: usb-storage: Add new IDs to ums-realtek (bsc#1051510).
- usb: xhci: fix uninitialized completion when USB3 port got wrong status (bsc#1051510).
- usb: xhci: Prevent bus suspend if a port connect change or polling state is detected (bsc#1051510).
- userfaultfd: clear the vma-&gt;vm_userfaultfd_ctx if UFFD_EVENT_FORK fails (bsc#1118761).
- userfaultfd: remove uffd flags from vma-&gt;vm_flags if UFFD_EVENT_FORK fails (bsc#1118809).
- v9fs_dir_readdir: fix double-free on p9stat_read error (bsc#1118771).
- vfs: Avoid softlockups in drop_pagecache_sb() (bsc#1118505).
- watchdog/core: Add missing prototypes for weak functions (git-fixes).
- wireless: airo: potential buffer overflow in sprintf() (bsc#1051510).
- wlcore: Fix the return value in case of error in 'wlcore_vendor_cmd_smart_config_start()' (bsc#1051510).
- x86/bugs: Add AMD's SPEC_CTRL MSR usage (bsc#1106913).
- x86/bugs: Fix the AMD SSBD usage of the SPEC_CTRL MSR (bsc#1106913).
- x86/bugs: Switch the selection of mitigation from CPU vendor to CPU features (bsc#1106913).
- x86/decoder: Fix and update the opcodes map (bsc#1058115).
- x86/kabi: Fix cpu_tlbstate issue (bsc#1106913).
- x86/l1tf: Show actual SMT state (bsc#1106913).
- x86/mm: Fix decoy address handling vs 32-bit builds (bsc#1120606).
- x86/pci: Add additional VMD device root ports to VMD AER quirk (bsc#1120058).
- x86/pci: Add 'pci=big_root_window' option for AMD 64-bit windows (bsc#1120058).
- x86/pci: Apply VMD's AERSID fixup generically (bsc#1120058).
- x86/pci: Avoid AMD SB7xx EHCI USB wakeup defect (bsc#1120058).
- x86/pci: Enable a 64bit BAR on AMD Family 15h (Models 00-1f, 30-3f, 60-7f) (bsc#1120058).
- x86/pci: Enable AMD 64-bit window on resume (bsc#1120058).
- x86/pci: Fix infinite loop in search for 64bit BAR placement (bsc#1120058).
- x86/pci: Move and shrink AMD 64-bit window to avoid conflict (bsc#1120058).
- x86/pci: Move VMD quirk to x86 fixups (bsc#1120058).
- x86/pci: Only enable a 64bit BAR on single-socket AMD Family 15h (bsc#1120058).
- x86/pci: Use is_vmd() rather than relying on the domain number (bsc#1120058).
- x86/process: Consolidate and simplify switch_to_xtra() code (bsc#1106913).
- x86/pti: Document fix wrong index (git-fixes).
- x86/retpoline: Make CONFIG_RETPOLINE depend on compiler support (bsc#1106913).
- x86/retpoline: Remove minimal retpoline support (bsc#1106913).
- x86/speculataion: Mark command line parser data __initdata (bsc#1106913).
- x86/speculation: Add command line control for indirect branch speculation (bsc#1106913).
- x86/speculation: Add prctl() control for indirect branch speculation (bsc#1106913).
- x86/speculation: Add seccomp Spectre v2 user space protection mode (bsc#1106913).
- x86/speculation: Apply IBPB more strictly to avoid cross-process data leak (bsc#1106913).
- x86/speculation: Avoid __switch_to_xtra() calls (bsc#1106913).
- x86/speculation: Clean up spectre_v2_parse_cmdline() (bsc#1106913).
- x86/speculation: Disable STIBP when enhanced IBRS is in use (bsc#1106913).
- x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation (bsc#1106913).
- x86/speculation: Enable prctl mode for spectre_v2_user (bsc#1106913).
- x86/speculation/l1tf: Drop the swap storage limit restriction when l1tf=off (bnc#1114871).
- x86/speculation: Mark string arrays const correctly (bsc#1106913).
- x86/speculation: Move STIPB/IBPB string conditionals out of cpu_show_common() (bsc#1106913).
- x86/speculation: Prepare arch_smt_update() for PRCTL mode (bsc#1106913).
- x86/speculation: Prepare for conditional IBPB in switch_mm() (bsc#1106913).
- x86/speculation: Prepare for per task indirect branch speculation control (bsc#1106913).
- x86/speculation: Prevent stale SPEC_CTRL msr content (bsc#1106913).
- x86/speculation: Propagate information about RSB filling mitigation to sysfs (bsc#1106913).
- x86/speculation: Provide IBPB always command line options (bsc#1106913).
- x86/speculation: Remove unnecessary ret variable in cpu_show_common() (bsc#1106913).
- x86/speculation: Rename SSBD update functions (bsc#1106913).
- x86/speculation: Reorder the spec_v2 code (bsc#1106913).
- x86/speculation: Reorganize speculation control MSRs update (bsc#1106913).
- x86/speculation: Rework SMT state change (bsc#1106913).
- x86/speculation: Split out TIF update (bsc#1106913).
- x86/speculation: Unify conditional spectre v2 print functions (bsc#1106913).
- x86/speculation: Update the TIF_SSBD comment (bsc#1106913).
- xen/netfront: tolerate frags with no data (bnc#1119804).
- xfs: Align compat attrlist_by_handle with native implementation (git-fixes).
- xfs: fix quotacheck dquot id overflow infinite loop (bsc#1121621).
- xfs: Fix xqmstats offsets in /proc/fs/xfs/xqmstat (git-fixes).
- xfs: xfs_buf: drop useless LIST_HEAD (git-fixes).
- xhci: Add quirk to workaround the errata seen on Cavium Thunder-X2 Soc (bsc#1117162).
- xhci: Do not prevent USB2 bus suspend in state check intended for USB3 only (bsc#1051510).
- xhci: Prevent U1/U2 link pm states if exit latency is too long (bsc#1051510).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-29"/>
	<updated date="2019-01-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1024718">SUSE bug 1024718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046299">SUSE bug 1046299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050242">SUSE bug 1050242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050244">SUSE bug 1050244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051510">SUSE bug 1051510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055121">SUSE bug 1055121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055186">SUSE bug 1055186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058115">SUSE bug 1058115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060463">SUSE bug 1060463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078248">SUSE bug 1078248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079935">SUSE bug 1079935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082387">SUSE bug 1082387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083647">SUSE bug 1083647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086282">SUSE bug 1086282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086283">SUSE bug 1086283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086423">SUSE bug 1086423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087084">SUSE bug 1087084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087978">SUSE bug 1087978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088386">SUSE bug 1088386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090888">SUSE bug 1090888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091405">SUSE bug 1091405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097593">SUSE bug 1097593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102875">SUSE bug 1102875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102877">SUSE bug 1102877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102879">SUSE bug 1102879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102882">SUSE bug 1102882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102896">SUSE bug 1102896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103257">SUSE bug 1103257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104353">SUSE bug 1104353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104427">SUSE bug 1104427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104967">SUSE bug 1104967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105168">SUSE bug 1105168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106105">SUSE bug 1106105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106110">SUSE bug 1106110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106615">SUSE bug 1106615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106913">SUSE bug 1106913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108270">SUSE bug 1108270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109272">SUSE bug 1109272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110558">SUSE bug 1110558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111188">SUSE bug 1111188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111469">SUSE bug 1111469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111696">SUSE bug 1111696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111795">SUSE bug 1111795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112128">SUSE bug 1112128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113722">SUSE bug 1113722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114648">SUSE bug 1114648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114871">SUSE bug 1114871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116040">SUSE bug 1116040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116336">SUSE bug 1116336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116803">SUSE bug 1116803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116841">SUSE bug 1116841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117115">SUSE bug 1117115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117162">SUSE bug 1117162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117165">SUSE bug 1117165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117186">SUSE bug 1117186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117561">SUSE bug 1117561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117656">SUSE bug 1117656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117953">SUSE bug 1117953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118215">SUSE bug 1118215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118319">SUSE bug 1118319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118428">SUSE bug 1118428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118484">SUSE bug 1118484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118505">SUSE bug 1118505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118752">SUSE bug 1118752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118760">SUSE bug 1118760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118761">SUSE bug 1118761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118762">SUSE bug 1118762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118766">SUSE bug 1118766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118767">SUSE bug 1118767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118768">SUSE bug 1118768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118769">SUSE bug 1118769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118771">SUSE bug 1118771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118772">SUSE bug 1118772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118773">SUSE bug 1118773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118774">SUSE bug 1118774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118775">SUSE bug 1118775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118787">SUSE bug 1118787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118788">SUSE bug 1118788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118798">SUSE bug 1118798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118809">SUSE bug 1118809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118962">SUSE bug 1118962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119017">SUSE bug 1119017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119086">SUSE bug 1119086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119212">SUSE bug 1119212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119322">SUSE bug 1119322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119410">SUSE bug 1119410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119714">SUSE bug 1119714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119749">SUSE bug 1119749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119804">SUSE bug 1119804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119946">SUSE bug 1119946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119962">SUSE bug 1119962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119968">SUSE bug 1119968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120036">SUSE bug 1120036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120046">SUSE bug 1120046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120053">SUSE bug 1120053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120054">SUSE bug 1120054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120055">SUSE bug 1120055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120058">SUSE bug 1120058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120088">SUSE bug 1120088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120092">SUSE bug 1120092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120094">SUSE bug 1120094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120096">SUSE bug 1120096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120097">SUSE bug 1120097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120173">SUSE bug 1120173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120214">SUSE bug 1120214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120223">SUSE bug 1120223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120228">SUSE bug 1120228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120230">SUSE bug 1120230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120232">SUSE bug 1120232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120234">SUSE bug 1120234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120235">SUSE bug 1120235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120238">SUSE bug 1120238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120594">SUSE bug 1120594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120598">SUSE bug 1120598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120600">SUSE bug 1120600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120601">SUSE bug 1120601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120602">SUSE bug 1120602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120603">SUSE bug 1120603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120604">SUSE bug 1120604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120606">SUSE bug 1120606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120612">SUSE bug 1120612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120613">SUSE bug 1120613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120614">SUSE bug 1120614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120615">SUSE bug 1120615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120616">SUSE bug 1120616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120617">SUSE bug 1120617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120618">SUSE bug 1120618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120620">SUSE bug 1120620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120621">SUSE bug 1120621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120632">SUSE bug 1120632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120633">SUSE bug 1120633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120743">SUSE bug 1120743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120954">SUSE bug 1120954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121017">SUSE bug 1121017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121058">SUSE bug 1121058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121263">SUSE bug 1121263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121273">SUSE bug 1121273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121477">SUSE bug 1121477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121483">SUSE bug 1121483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121599">SUSE bug 1121599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121621">SUSE bug 1121621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121714">SUSE bug 1121714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121715">SUSE bug 1121715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121973">SUSE bug 1121973</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12232/">CVE-2018-12232</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-14625/">CVE-2018-14625</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16862/">CVE-2018-16862</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-18397/">CVE-2018-18397</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19407/">CVE-2018-19407</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19854/">CVE-2018-19854</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19985/">CVE-2018-19985</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20169/">CVE-2018-20169</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9568/">CVE-2018-9568</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521998" comment="kernel-default-4.12.14-95.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521999" comment="kernel-default-devel-4.12.14-95.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522000" comment="kernel-default-extra-4.12.14-95.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522001" comment="kernel-devel-4.12.14-95.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522002" comment="kernel-macros-4.12.14-95.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522003" comment="kernel-source-4.12.14-95.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522004" comment="kernel-syms-4.12.14-95.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78772" version="1" class="patch">
	<metadata>
		<title>Security update for spamassassin (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1108745" ref_url="https://bugzilla.suse.com/1108745" source="BUGZILLA"/>
		<reference ref_id="1108748" ref_url="https://bugzilla.suse.com/1108748" source="BUGZILLA"/>
		<reference ref_id="1108750" ref_url="https://bugzilla.suse.com/1108750" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238/" source="CVE"/>
		<reference ref_id="CVE-2017-15705" ref_url="https://www.suse.com/security/cve/CVE-2017-15705/" source="CVE"/>
		<reference ref_id="CVE-2018-11780" ref_url="https://www.suse.com/security/cve/CVE-2018-11780/" source="CVE"/>
		<reference ref_id="CVE-2018-11781" ref_url="https://www.suse.com/security/cve/CVE-2018-11781/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005748.html" source="SUSE-SU"/>
		<description>
This update for spamassassin to version 3.4.2 fixes the following issues:

Security issues fixed:

- CVE-2017-15705: Fixed denial of service via unclosed tags in crafted emails (bsc#1108745).
- CVE-2018-11781: Fixed a code injection in the meta rule syntax by local users (bsc#1108748).
- CVE-2018-11780: Fixed a potential remote code execution vulnerability in PDFInfo plugin (bsc#1108750).

Non-security issues fixed:

- Added four new plugins (disabled by default): HashBL, ResourceLimits, FromNameSpoof, Phishing
- sa-update script: optional support for SHA-256 / SHA-512 been added for better validation of rules
- GeoIP2 support has been added to RelayCountry and URILocalBL plugins
- Several new or enhanced configuration options
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-24"/>
	<updated date="2019-07-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1108745">SUSE bug 1108745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108748">SUSE bug 1108748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108750">SUSE bug 1108750</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15705/">CVE-2017-15705</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11780/">CVE-2018-11780</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11781/">CVE-2018-11781</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522005" comment="perl-Mail-SpamAssassin-3.4.2-44.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522006" comment="spamassassin-3.4.2-44.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78773" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1040109" ref_url="https://bugzilla.suse.com/1040109" source="BUGZILLA"/>
		<reference ref_id="1040112" ref_url="https://bugzilla.suse.com/1040112" source="BUGZILLA"/>
		<reference ref_id="1040113" ref_url="https://bugzilla.suse.com/1040113" source="BUGZILLA"/>
		<reference ref_id="1040115" ref_url="https://bugzilla.suse.com/1040115" source="BUGZILLA"/>
		<reference ref_id="1113455" ref_url="https://bugzilla.suse.com/1113455" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9111" ref_url="https://www.suse.com/security/cve/CVE-2017-9111/" source="CVE"/>
		<reference ref_id="CVE-2017-9112" ref_url="https://www.suse.com/security/cve/CVE-2017-9112/" source="CVE"/>
		<reference ref_id="CVE-2017-9113" ref_url="https://www.suse.com/security/cve/CVE-2017-9113/" source="CVE"/>
		<reference ref_id="CVE-2017-9115" ref_url="https://www.suse.com/security/cve/CVE-2017-9115/" source="CVE"/>
		<reference ref_id="CVE-2018-18444" ref_url="https://www.suse.com/security/cve/CVE-2018-18444/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005747.html" source="SUSE-SU"/>
		<description>
This update for openexr fixes the following issues:

Security issue fixed:

- CVE-2017-9111: Fixed an invalid write of size 8 in the storeSSE function in ImfOptimizedPixelReading.h (bsc#1040109).
- CVE-2017-9113: Fixed an invalid write of size 1 in the bufferedReadPixels function in ImfInputFile.cpp (bsc#1040113).
- CVE-2017-9115: Fixed an invalid write of size 2 in the = operator function inhalf.h (bsc#1040115).
- CVE-2018-18444: Fixed Out-of-bounds write in makeMultiView.cpp (bsc#1113455).
- CVE-2017-9112: Fixed invalid read of size 1 in the getBits function in ImfHuf.cpp (bsc#1040112).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-24"/>
	<updated date="2019-07-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040109">SUSE bug 1040109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040112">SUSE bug 1040112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040113">SUSE bug 1040113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040115">SUSE bug 1040115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113455">SUSE bug 1113455</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9111/">CVE-2017-9111</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9112/">CVE-2017-9112</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9113/">CVE-2017-9113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9115/">CVE-2017-9115</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18444/">CVE-2018-18444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522007" comment="libIlmImf-Imf_2_1-21-2.1.0-6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522008" comment="libIlmImf-Imf_2_1-21-32bit-2.1.0-6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522009" comment="openexr-2.1.0-6.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78774" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv, libzypp, zypper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1109893" ref_url="https://bugzilla.suse.com/1109893" source="BUGZILLA"/>
		<reference ref_id="1110542" ref_url="https://bugzilla.suse.com/1110542" source="BUGZILLA"/>
		<reference ref_id="1111319" ref_url="https://bugzilla.suse.com/1111319" source="BUGZILLA"/>
		<reference ref_id="1112911" ref_url="https://bugzilla.suse.com/1112911" source="BUGZILLA"/>
		<reference ref_id="1113296" ref_url="https://bugzilla.suse.com/1113296" source="BUGZILLA"/>
		<reference ref_id="1120629" ref_url="https://bugzilla.suse.com/1120629" source="BUGZILLA"/>
		<reference ref_id="1120630" ref_url="https://bugzilla.suse.com/1120630" source="BUGZILLA"/>
		<reference ref_id="1120631" ref_url="https://bugzilla.suse.com/1120631" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1131823" ref_url="https://bugzilla.suse.com/1131823" source="BUGZILLA"/>
		<reference ref_id="1134226" ref_url="https://bugzilla.suse.com/1134226" source="BUGZILLA"/>
		<reference ref_id="1137977" ref_url="https://bugzilla.suse.com/1137977" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532/" source="CVE"/>
		<reference ref_id="CVE-2018-20533" ref_url="https://www.suse.com/security/cve/CVE-2018-20533/" source="CVE"/>
		<reference ref_id="CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005752.html" source="SUSE-SU"/>
		<description>
This update for libsolv, libzypp and zypper fixes the following issues:

libsolv was updated to version 0.6.36 fixes the following issues:

Security issues fixed:

- CVE-2018-20532: Fixed a NULL pointer dereference in testcase_read() (bsc#1120629).
- CVE-2018-20533: Fixed a NULL pointer dereference in testcase_str2dep_complex() (bsc#1120630).
- CVE-2018-20534: Fixed a NULL pointer dereference in pool_whatprovides() (bsc#1120631).

Non-security issues fixed:

- Made cleandeps jobs on patterns work (bsc#1137977).
- Fixed an issue multiversion packages that obsolete their own name (bsc#1127155).
- Keep consistent package name if there are multiple alternatives (bsc#1131823).

libzypp received following fixes:

- Fixes a bug where locking the kernel was not possible (bsc#1113296)

zypper received following fixes:

- Fixes a bug where the wrong exit code was set when refreshing
  repos if --root was used (bsc#1134226)
- Improved the displaying of locks (bsc#1112911)
- Fixes an issue where `https` repository urls caused an error prompt to
   appear twice (bsc#1110542)
- zypper will now always warn when no repositories are defined (bsc#1109893)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-25"/>
	<updated date="2019-07-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1109893">SUSE bug 1109893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110542">SUSE bug 1110542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111319">SUSE bug 1111319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112911">SUSE bug 1112911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113296">SUSE bug 1113296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120629">SUSE bug 1120629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120630">SUSE bug 1120630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120631">SUSE bug 1120631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131823">SUSE bug 1131823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134226">SUSE bug 1134226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137977">SUSE bug 1137977</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20533/">CVE-2018-20533</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522010" comment="libsolv-tools-0.6.36-2.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522011" comment="libzypp-16.20.0-2.39.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522012" comment="python-solv-0.6.36-2.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522013" comment="zypper-1.13.51-21.26.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522014" comment="zypper-log-1.13.51-21.26.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78775" version="1" class="patch">
	<metadata>
		<title>Security update for cronie (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1128935" ref_url="https://bugzilla.suse.com/1128935" source="BUGZILLA"/>
		<reference ref_id="1128937" ref_url="https://bugzilla.suse.com/1128937" source="BUGZILLA"/>
		<reference ref_id="1130746" ref_url="https://bugzilla.suse.com/1130746" source="BUGZILLA"/>
		<reference ref_id="1133100" ref_url="https://bugzilla.suse.com/1133100" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9704" ref_url="https://www.suse.com/security/cve/CVE-2019-9704/" source="CVE"/>
		<reference ref_id="CVE-2019-9705" ref_url="https://www.suse.com/security/cve/CVE-2019-9705/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005754.html" source="SUSE-SU"/>
		<description>
This update for cronie fixes the following issues:
	  
Security issues fixed:

- CVE-2019-9704: Fixed an insufficient check in the return value of calloc which
  could allow a local user to create Denial of Service by crashing the deamon (bsc#1128937).
- CVE-2019-9705: Fixed an implementation vulnerability which could allow a local user to
  exhaust the memory resulting in Denial of Service (bsc#1128935).  

Bug fixes:

- Manual start of cron is possible even when it's already started using systemd (bsc#1133100).
- Cron schedules only one job of crontab (bsc#1130746).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-26"/>
	<updated date="2019-07-26"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1128935">SUSE bug 1128935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128937">SUSE bug 1128937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130746">SUSE bug 1130746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133100">SUSE bug 1133100</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9704/">CVE-2019-9704</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9705/">CVE-2019-9705</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522015" comment="cron-4.2-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522016" comment="cronie-1.4.11-59.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78776" version="1" class="patch">
	<metadata>
		<title>Security update for libraw (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1097973" ref_url="https://bugzilla.suse.com/1097973" source="BUGZILLA"/>
		<reference ref_id="1097974" ref_url="https://bugzilla.suse.com/1097974" source="BUGZILLA"/>
		<reference ref_id="1118894" ref_url="https://bugzilla.suse.com/1118894" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5805" ref_url="https://www.suse.com/security/cve/CVE-2018-5805/" source="CVE"/>
		<reference ref_id="CVE-2018-5806" ref_url="https://www.suse.com/security/cve/CVE-2018-5806/" source="CVE"/>
		<reference ref_id="CVE-2018-5808" ref_url="https://www.suse.com/security/cve/CVE-2018-5808/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190002-1.html" source="SUSE-SU"/>
		<description>
This update for libraw fixes the following issues:

Security issues fixed:

- CVE-2018-5808: Fixed a stack-based buffer overflow and code execution
  vulnerability in find_green() function internal/dcraw_common.cpp (bsc#1118894).
- CVE-2018-5805: Fixed a boundary error within the quicktake_100_load_raw function (bsc#1097973)
- CVE-2018-5806: Fixed a a NULL pointer dereference in the leaf_hdr_load_raw function (bsc#1097974)
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-02"/>
	<updated date="2019-01-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1097973">SUSE bug 1097973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097974">SUSE bug 1097974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118894">SUSE bug 1118894</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5805/">CVE-2018-5805</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5806/">CVE-2018-5806</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5808/">CVE-2018-5808</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521594" comment="libraw9-0.15.4-27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78777" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1135170" ref_url="https://bugzilla.suse.com/1135170" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5436" ref_url="https://www.suse.com/security/cve/CVE-2019-5436/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2009-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192009-1.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5436: Fixed a heap buffer overflow in tftp_receive_packet() (bsc#1135170).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-29"/>
	<updated date="2019-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135170">SUSE bug 1135170</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5436/">CVE-2019-5436</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522017" comment="curl-7.60.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522018" comment="libcurl4-7.60.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522019" comment="libcurl4-32bit-7.60.0-4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78778" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1139885" ref_url="https://bugzilla.suse.com/1139885" source="BUGZILLA"/>
		<reference ref_id="1139886" ref_url="https://bugzilla.suse.com/1139886" source="BUGZILLA"/>
		<reference ref_id="1140100" ref_url="https://bugzilla.suse.com/1140100" source="BUGZILLA"/>
		<reference ref_id="1140102" ref_url="https://bugzilla.suse.com/1140102" source="BUGZILLA"/>
		<reference ref_id="1140103" ref_url="https://bugzilla.suse.com/1140103" source="BUGZILLA"/>
		<reference ref_id="1140106" ref_url="https://bugzilla.suse.com/1140106" source="BUGZILLA"/>
		<reference ref_id="1140110" ref_url="https://bugzilla.suse.com/1140110" source="BUGZILLA"/>
		<reference ref_id="1140111" ref_url="https://bugzilla.suse.com/1140111" source="BUGZILLA"/>
		<reference ref_id="1140501" ref_url="https://bugzilla.suse.com/1140501" source="BUGZILLA"/>
		<reference ref_id="1140513" ref_url="https://bugzilla.suse.com/1140513" source="BUGZILLA"/>
		<reference ref_id="1140534" ref_url="https://bugzilla.suse.com/1140534" source="BUGZILLA"/>
		<reference ref_id="1140538" ref_url="https://bugzilla.suse.com/1140538" source="BUGZILLA"/>
		<reference ref_id="1140554" ref_url="https://bugzilla.suse.com/1140554" source="BUGZILLA"/>
		<reference ref_id="1140664" ref_url="https://bugzilla.suse.com/1140664" source="BUGZILLA"/>
		<reference ref_id="1140666" ref_url="https://bugzilla.suse.com/1140666" source="BUGZILLA"/>
		<reference ref_id="1140669" ref_url="https://bugzilla.suse.com/1140669" source="BUGZILLA"/>
		<reference ref_id="1140673" ref_url="https://bugzilla.suse.com/1140673" source="BUGZILLA"/>
		<reference ref_id="1141171" ref_url="https://bugzilla.suse.com/1141171" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12974" ref_url="https://www.suse.com/security/cve/CVE-2019-12974/" source="CVE"/>
		<reference ref_id="CVE-2019-12975" ref_url="https://www.suse.com/security/cve/CVE-2019-12975/" source="CVE"/>
		<reference ref_id="CVE-2019-12976" ref_url="https://www.suse.com/security/cve/CVE-2019-12976/" source="CVE"/>
		<reference ref_id="CVE-2019-12978" ref_url="https://www.suse.com/security/cve/CVE-2019-12978/" source="CVE"/>
		<reference ref_id="CVE-2019-12979" ref_url="https://www.suse.com/security/cve/CVE-2019-12979/" source="CVE"/>
		<reference ref_id="CVE-2019-13133" ref_url="https://www.suse.com/security/cve/CVE-2019-13133/" source="CVE"/>
		<reference ref_id="CVE-2019-13134" ref_url="https://www.suse.com/security/cve/CVE-2019-13134/" source="CVE"/>
		<reference ref_id="CVE-2019-13135" ref_url="https://www.suse.com/security/cve/CVE-2019-13135/" source="CVE"/>
		<reference ref_id="CVE-2019-13295" ref_url="https://www.suse.com/security/cve/CVE-2019-13295/" source="CVE"/>
		<reference ref_id="CVE-2019-13297" ref_url="https://www.suse.com/security/cve/CVE-2019-13297/" source="CVE"/>
		<reference ref_id="CVE-2019-13300" ref_url="https://www.suse.com/security/cve/CVE-2019-13300/" source="CVE"/>
		<reference ref_id="CVE-2019-13301" ref_url="https://www.suse.com/security/cve/CVE-2019-13301/" source="CVE"/>
		<reference ref_id="CVE-2019-13307" ref_url="https://www.suse.com/security/cve/CVE-2019-13307/" source="CVE"/>
		<reference ref_id="CVE-2019-13308" ref_url="https://www.suse.com/security/cve/CVE-2019-13308/" source="CVE"/>
		<reference ref_id="CVE-2019-13310" ref_url="https://www.suse.com/security/cve/CVE-2019-13310/" source="CVE"/>
		<reference ref_id="CVE-2019-13311" ref_url="https://www.suse.com/security/cve/CVE-2019-13311/" source="CVE"/>
		<reference ref_id="CVE-2019-13391" ref_url="https://www.suse.com/security/cve/CVE-2019-13391/" source="CVE"/>
		<reference ref_id="CVE-2019-13454" ref_url="https://www.suse.com/security/cve/CVE-2019-13454/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2019-13301: Fixed a memory leak in AcquireMagickMemory() (bsc#1140554).
- CVE-2019-13310: Fixed a memory leak at AcquireMagickMemory because of an error in MagickWand/mogrify.c (bsc#1140501).
- CVE-2019-13311: Fixed a memory leak at AcquireMagickMemory because of a wand/mogrify.c error (bsc#1140513).
- CVE-2019-13454: Fixed a division by zero in RemoveDuplicateLayers in MagickCore/layer.c (bsc#1141171).
- CVE-2019-13295: Fixed a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage (bsc#1140664).
- CVE-2019-13297: Fixed a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage (bsc#1140666).
- CVE-2019-12979: Fixed the use of uninitialized values in SyncImageSettings() (bsc#1139886).
- CVE-2019-13391: Fixed a heap-based buffer over-read in MagickCore/fourier.c (bsc#1140673).
- CVE-2019-13308: Fixed a heap-based buffer overflow in MagickCore/fourier.c (bsc#1140534).
- CVE-2019-13300: Fixed a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages (bsc#1140669).
- CVE-2019-13307: Fixed a heap-based buffer overflow at MagickCore/statistic.c (bsc#1140538).
- CVE-2019-12975: Fixed a memory leak in the WriteDPXImage() in coders/dpx.c (bsc#1140106).
- CVE-2019-13135: Fixed the use of uninitialized values in ReadCUTImage() (bsc#1140103).
- CVE-2019-12978: Fixed the use of uninitialized values in ReadPANGOImage() (bsc#1139885).
- CVE-2019-12974: Fixed a NULL pointer dereference in the ReadPANGOImage() (bsc#1140111).
- CVE-2019-13133: Fixed a memory leak in the ReadBMPImage() (bsc#1140100).
- CVE-2019-13134: Fixed a memory leak in the ReadVIFFImage() (bsc#1140102).
- CVE-2019-12976: Fixed a memory leak in the ReadPCLImage() in coders/pcl.c(bsc#1140110).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-29"/>
	<updated date="2019-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1139885">SUSE bug 1139885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139886">SUSE bug 1139886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140100">SUSE bug 1140100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140102">SUSE bug 1140102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140103">SUSE bug 1140103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140106">SUSE bug 1140106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140110">SUSE bug 1140110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140111">SUSE bug 1140111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140501">SUSE bug 1140501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140513">SUSE bug 1140513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140534">SUSE bug 1140534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140538">SUSE bug 1140538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140554">SUSE bug 1140554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140664">SUSE bug 1140664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140666">SUSE bug 1140666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140669">SUSE bug 1140669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140673">SUSE bug 1140673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141171">SUSE bug 1141171</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12974/">CVE-2019-12974</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12975/">CVE-2019-12975</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12976/">CVE-2019-12976</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12978/">CVE-2019-12978</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12979/">CVE-2019-12979</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13133/">CVE-2019-13133</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13134/">CVE-2019-13134</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13135/">CVE-2019-13135</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13295/">CVE-2019-13295</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13297/">CVE-2019-13297</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13300/">CVE-2019-13300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13301/">CVE-2019-13301</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13307/">CVE-2019-13307</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13308/">CVE-2019-13308</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13310/">CVE-2019-13310</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13311/">CVE-2019-13311</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13391/">CVE-2019-13391</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13454/">CVE-2019-13454</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522020" comment="ImageMagick-6.8.8.1-71.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522021" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522022" comment="ImageMagick-config-6-upstream-6.8.8.1-71.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522023" comment="libMagick++-6_Q16-3-6.8.8.1-71.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522024" comment="libMagickCore-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522025" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522026" comment="libMagickWand-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78779" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005756.html" source="SUSE-SU"/>
		<description>
This update for bzip2 fixes the following issues:

- Fixed a regression with the fix for CVE-2019-12900, which caused incompatibilities
  with files that used many selectors (bsc#1139083).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-29"/>
	<updated date="2019-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522027" comment="bzip2-1.0.6-30.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522028" comment="libbz2-1-1.0.6-30.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522029" comment="libbz2-1-32bit-1.0.6-30.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78780" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1061305" ref_url="https://bugzilla.suse.com/1061305" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14988" ref_url="https://www.suse.com/security/cve/CVE-2017-14988/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005757.html" source="SUSE-SU"/>
		<description>
This update for openexr fixes the following issues:

- CVE-2017-14988: Fixed a denial of service in Header::readfrom() (bsc#1061305).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-29"/>
	<updated date="2019-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1061305">SUSE bug 1061305</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14988/">CVE-2017-14988</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522030" comment="libIlmImf-Imf_2_1-21-2.1.0-6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522031" comment="libIlmImf-Imf_2_1-21-32bit-2.1.0-6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522032" comment="openexr-2.1.0-6.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78781" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1134297" ref_url="https://bugzilla.suse.com/1134297" source="BUGZILLA"/>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141784" ref_url="https://bugzilla.suse.com/1141784" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141786" ref_url="https://bugzilla.suse.com/1141786" source="BUGZILLA"/>
		<reference ref_id="1141787" ref_url="https://bugzilla.suse.com/1141787" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2019-2426" ref_url="https://www.suse.com/security/cve/CVE-2019-2426/" source="CVE"/>
		<reference ref_id="CVE-2019-2745" ref_url="https://www.suse.com/security/cve/CVE-2019-2745/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-2842" ref_url="https://www.suse.com/security/cve/CVE-2019-2842/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk to version 7u231 fixes the following issues:

Security issues fixed:

- CVE_2019-2426: Improve web server connections (bsc#1134297).
- CVE-2019-2745: Improved ECC Implementation (bsc#1141784).
- CVE-2019-2762: Exceptional throw cases (bsc#1141782).
- CVE-2019-2766: Improve file protocol handling (bsc#1141789).
- CVE-2019-2769: Better copies of CopiesList (bsc#1141783).
- CVE-2019-2786: More limited privilege usage (bsc#1141787).
- CVE-2019-2816: Normalize normalization (bsc#1141785).
- CVE-2019-2842: Extended AES support (bsc#1141786).
- CVE-2019-7317: Improve PNG support (bsc#1141780).
- CVE-2018-3639: fix revision to prefer PR_SPEC_DISABLE_NOEXEC to PR_SPEC_DISABLE (bsc#1087082).
- Certificate validation improvements
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-31"/>
	<updated date="2019-07-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134297">SUSE bug 1134297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141784">SUSE bug 1141784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141786">SUSE bug 1141786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141787">SUSE bug 1141787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2426/">CVE-2019-2426</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2745/">CVE-2019-2745</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2842/">CVE-2019-2842</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522033" comment="java-1_7_0-openjdk-1.7.0.231-43.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522034" comment="java-1_7_0-openjdk-headless-1.7.0.231-43.27.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78782" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1121826" ref_url="https://bugzilla.suse.com/1121826" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005768.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

Security issue fixed:

- CVE-2019-6133: Fixed improper caching of auth decisions, which could bypass 
  uid checking in the interactive backend (bsc#1121826).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-01"/>
	<updated date="2019-08-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1121826">SUSE bug 1121826</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522035" comment="libpolkit0-0.113-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522036" comment="libpolkit0-32bit-0.113-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522037" comment="polkit-0.113-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522038" comment="typelib-1_0-Polkit-1_0-0.113-5.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78783" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1115375" ref_url="https://bugzilla.suse.com/1115375" source="BUGZILLA"/>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141784" ref_url="https://bugzilla.suse.com/1141784" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141786" ref_url="https://bugzilla.suse.com/1141786" source="BUGZILLA"/>
		<reference ref_id="1141787" ref_url="https://bugzilla.suse.com/1141787" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2745" ref_url="https://www.suse.com/security/cve/CVE-2019-2745/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-2842" ref_url="https://www.suse.com/security/cve/CVE-2019-2842/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version 8u222 fixes the following issues:

Security issues fixed:

- CVE-2019-2745: Improved ECC Implementation (bsc#1141784).
- CVE-2019-2762: Exceptional throw cases (bsc#1141782).
- CVE-2019-2766: Improve file protocol handling (bsc#1141789).
- CVE-2019-2769: Better copies of CopiesList (bsc#1141783).
- CVE-2019-2786: More limited privilege usage (bsc#1141787).
- CVE-2019-2816: Normalize normalization (bsc#1141785).
- CVE-2019-2842: Extended AES support (bsc#1141786).
- CVE-2019-7317: Improve PNG support (bsc#1141780).
- Certificate validation improvements

Non-security issue fixed:

- Fixed an issue where the installation failed when the manpages are not present (bsc#1115375)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-01"/>
	<updated date="2019-08-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1115375">SUSE bug 1115375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141784">SUSE bug 1141784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141786">SUSE bug 1141786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141787">SUSE bug 1141787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2745/">CVE-2019-2745</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2842/">CVE-2019-2842</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522039" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522040" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78784" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1109663" ref_url="https://bugzilla.suse.com/1109663" source="BUGZILLA"/>
		<reference ref_id="1109847" ref_url="https://bugzilla.suse.com/1109847" source="BUGZILLA"/>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802/" source="CVE"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005780.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2019-10160: Fixed a regression in urlparse() and urlsplit() introduced by the fix for CVE-2019-9636 (bsc#1138459).
- CVE-2018-14647: Fixed a denial of service vulnerability caused by a crafted XML document (bsc#1109847).
- CVE-2018-1000802: Fixed a command injection in the shutil module (bsc#1109663).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-06"/>
	<updated date="2019-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109663">SUSE bug 1109663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522041" comment="libpython3_4m1_0-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522042" comment="python3-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522043" comment="python3-base-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522044" comment="python3-curses-3.4.6-25.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78785" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1051510" ref_url="https://bugzilla.suse.com/1051510" source="BUGZILLA"/>
		<reference ref_id="1055117" ref_url="https://bugzilla.suse.com/1055117" source="BUGZILLA"/>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1083647" ref_url="https://bugzilla.suse.com/1083647" source="BUGZILLA"/>
		<reference ref_id="1083710" ref_url="https://bugzilla.suse.com/1083710" source="BUGZILLA"/>
		<reference ref_id="1102247" ref_url="https://bugzilla.suse.com/1102247" source="BUGZILLA"/>
		<reference ref_id="1111666" ref_url="https://bugzilla.suse.com/1111666" source="BUGZILLA"/>
		<reference ref_id="1119222" ref_url="https://bugzilla.suse.com/1119222" source="BUGZILLA"/>
		<reference ref_id="1123080" ref_url="https://bugzilla.suse.com/1123080" source="BUGZILLA"/>
		<reference ref_id="1127034" ref_url="https://bugzilla.suse.com/1127034" source="BUGZILLA"/>
		<reference ref_id="1127315" ref_url="https://bugzilla.suse.com/1127315" source="BUGZILLA"/>
		<reference ref_id="1129770" ref_url="https://bugzilla.suse.com/1129770" source="BUGZILLA"/>
		<reference ref_id="1130972" ref_url="https://bugzilla.suse.com/1130972" source="BUGZILLA"/>
		<reference ref_id="1133021" ref_url="https://bugzilla.suse.com/1133021" source="BUGZILLA"/>
		<reference ref_id="1134097" ref_url="https://bugzilla.suse.com/1134097" source="BUGZILLA"/>
		<reference ref_id="1134390" ref_url="https://bugzilla.suse.com/1134390" source="BUGZILLA"/>
		<reference ref_id="1134399" ref_url="https://bugzilla.suse.com/1134399" source="BUGZILLA"/>
		<reference ref_id="1135335" ref_url="https://bugzilla.suse.com/1135335" source="BUGZILLA"/>
		<reference ref_id="1135642" ref_url="https://bugzilla.suse.com/1135642" source="BUGZILLA"/>
		<reference ref_id="1136896" ref_url="https://bugzilla.suse.com/1136896" source="BUGZILLA"/>
		<reference ref_id="1137458" ref_url="https://bugzilla.suse.com/1137458" source="BUGZILLA"/>
		<reference ref_id="1137534" ref_url="https://bugzilla.suse.com/1137534" source="BUGZILLA"/>
		<reference ref_id="1137535" ref_url="https://bugzilla.suse.com/1137535" source="BUGZILLA"/>
		<reference ref_id="1137584" ref_url="https://bugzilla.suse.com/1137584" source="BUGZILLA"/>
		<reference ref_id="1137609" ref_url="https://bugzilla.suse.com/1137609" source="BUGZILLA"/>
		<reference ref_id="1137811" ref_url="https://bugzilla.suse.com/1137811" source="BUGZILLA"/>
		<reference ref_id="1137827" ref_url="https://bugzilla.suse.com/1137827" source="BUGZILLA"/>
		<reference ref_id="1139358" ref_url="https://bugzilla.suse.com/1139358" source="BUGZILLA"/>
		<reference ref_id="1140133" ref_url="https://bugzilla.suse.com/1140133" source="BUGZILLA"/>
		<reference ref_id="1140139" ref_url="https://bugzilla.suse.com/1140139" source="BUGZILLA"/>
		<reference ref_id="1140322" ref_url="https://bugzilla.suse.com/1140322" source="BUGZILLA"/>
		<reference ref_id="1140652" ref_url="https://bugzilla.suse.com/1140652" source="BUGZILLA"/>
		<reference ref_id="1140887" ref_url="https://bugzilla.suse.com/1140887" source="BUGZILLA"/>
		<reference ref_id="1140888" ref_url="https://bugzilla.suse.com/1140888" source="BUGZILLA"/>
		<reference ref_id="1140889" ref_url="https://bugzilla.suse.com/1140889" source="BUGZILLA"/>
		<reference ref_id="1140891" ref_url="https://bugzilla.suse.com/1140891" source="BUGZILLA"/>
		<reference ref_id="1140893" ref_url="https://bugzilla.suse.com/1140893" source="BUGZILLA"/>
		<reference ref_id="1140903" ref_url="https://bugzilla.suse.com/1140903" source="BUGZILLA"/>
		<reference ref_id="1140945" ref_url="https://bugzilla.suse.com/1140945" source="BUGZILLA"/>
		<reference ref_id="1140954" ref_url="https://bugzilla.suse.com/1140954" source="BUGZILLA"/>
		<reference ref_id="1140955" ref_url="https://bugzilla.suse.com/1140955" source="BUGZILLA"/>
		<reference ref_id="1140956" ref_url="https://bugzilla.suse.com/1140956" source="BUGZILLA"/>
		<reference ref_id="1140957" ref_url="https://bugzilla.suse.com/1140957" source="BUGZILLA"/>
		<reference ref_id="1140958" ref_url="https://bugzilla.suse.com/1140958" source="BUGZILLA"/>
		<reference ref_id="1140959" ref_url="https://bugzilla.suse.com/1140959" source="BUGZILLA"/>
		<reference ref_id="1140960" ref_url="https://bugzilla.suse.com/1140960" source="BUGZILLA"/>
		<reference ref_id="1140961" ref_url="https://bugzilla.suse.com/1140961" source="BUGZILLA"/>
		<reference ref_id="1140962" ref_url="https://bugzilla.suse.com/1140962" source="BUGZILLA"/>
		<reference ref_id="1140964" ref_url="https://bugzilla.suse.com/1140964" source="BUGZILLA"/>
		<reference ref_id="1140971" ref_url="https://bugzilla.suse.com/1140971" source="BUGZILLA"/>
		<reference ref_id="1140972" ref_url="https://bugzilla.suse.com/1140972" source="BUGZILLA"/>
		<reference ref_id="1140992" ref_url="https://bugzilla.suse.com/1140992" source="BUGZILLA"/>
		<reference ref_id="1141401" ref_url="https://bugzilla.suse.com/1141401" source="BUGZILLA"/>
		<reference ref_id="1141402" ref_url="https://bugzilla.suse.com/1141402" source="BUGZILLA"/>
		<reference ref_id="1141452" ref_url="https://bugzilla.suse.com/1141452" source="BUGZILLA"/>
		<reference ref_id="1141453" ref_url="https://bugzilla.suse.com/1141453" source="BUGZILLA"/>
		<reference ref_id="1141454" ref_url="https://bugzilla.suse.com/1141454" source="BUGZILLA"/>
		<reference ref_id="1141478" ref_url="https://bugzilla.suse.com/1141478" source="BUGZILLA"/>
		<reference ref_id="1142023" ref_url="https://bugzilla.suse.com/1142023" source="BUGZILLA"/>
		<reference ref_id="1142112" ref_url="https://bugzilla.suse.com/1142112" source="BUGZILLA"/>
		<reference ref_id="1142220" ref_url="https://bugzilla.suse.com/1142220" source="BUGZILLA"/>
		<reference ref_id="1142221" ref_url="https://bugzilla.suse.com/1142221" source="BUGZILLA"/>
		<reference ref_id="1142254" ref_url="https://bugzilla.suse.com/1142254" source="BUGZILLA"/>
		<reference ref_id="1142350" ref_url="https://bugzilla.suse.com/1142350" source="BUGZILLA"/>
		<reference ref_id="1142351" ref_url="https://bugzilla.suse.com/1142351" source="BUGZILLA"/>
		<reference ref_id="1142354" ref_url="https://bugzilla.suse.com/1142354" source="BUGZILLA"/>
		<reference ref_id="1142359" ref_url="https://bugzilla.suse.com/1142359" source="BUGZILLA"/>
		<reference ref_id="1142450" ref_url="https://bugzilla.suse.com/1142450" source="BUGZILLA"/>
		<reference ref_id="1142701" ref_url="https://bugzilla.suse.com/1142701" source="BUGZILLA"/>
		<reference ref_id="1142868" ref_url="https://bugzilla.suse.com/1142868" source="BUGZILLA"/>
		<reference ref_id="1143003" ref_url="https://bugzilla.suse.com/1143003" source="BUGZILLA"/>
		<reference ref_id="1143045" ref_url="https://bugzilla.suse.com/1143045" source="BUGZILLA"/>
		<reference ref_id="1143105" ref_url="https://bugzilla.suse.com/1143105" source="BUGZILLA"/>
		<reference ref_id="1143185" ref_url="https://bugzilla.suse.com/1143185" source="BUGZILLA"/>
		<reference ref_id="1143189" ref_url="https://bugzilla.suse.com/1143189" source="BUGZILLA"/>
		<reference ref_id="1143191" ref_url="https://bugzilla.suse.com/1143191" source="BUGZILLA"/>
		<reference ref_id="1143507" ref_url="https://bugzilla.suse.com/1143507" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20855" ref_url="https://www.suse.com/security/cve/CVE-2018-20855/" source="CVE"/>
		<reference ref_id="CVE-2019-1125" ref_url="https://www.suse.com/security/cve/CVE-2019-1125/" source="CVE"/>
		<reference ref_id="CVE-2019-11810" ref_url="https://www.suse.com/security/cve/CVE-2019-11810/" source="CVE"/>
		<reference ref_id="CVE-2019-13631" ref_url="https://www.suse.com/security/cve/CVE-2019-13631/" source="CVE"/>
		<reference ref_id="CVE-2019-13648" ref_url="https://www.suse.com/security/cve/CVE-2019-13648/" source="CVE"/>
		<reference ref_id="CVE-2019-14283" ref_url="https://www.suse.com/security/cve/CVE-2019-14283/" source="CVE"/>
		<reference ref_id="CVE-2019-14284" ref_url="https://www.suse.com/security/cve/CVE-2019-14284/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005786.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2018-20855: An issue was discovered in the Linux kernel In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace(bsc#1143045).
- CVE-2019-1125: Exclude ATOMs from speculation through  SWAPGS (bsc#1139358).
- CVE-2019-14283: In the Linux kernel, set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It could be triggered by an unprivileged local user when a floppy disk was inserted. NOTE: QEMU creates the floppy device by default. (bnc#1143191)
- CVE-2019-11810: An issue was discovered in the Linux kernel A NULL pointer dereference could occur when megasas_create_frame_pool() failed in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This caused a Denial of Service, related to a use-after-free (bnc#1134399).
- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory was disabled, a local user could cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sent a crafted signal frame. (bnc#1142254)
- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel, a malicious USB device could send an HID report that triggered an out-of-bounds write during generation of debugging messages. (bnc#1142023)


The following non-security bugs were fixed:
- Correct the CVE and bug reference for a floppy security fix (CVE-2019-14284,bsc#1143189)  A dedicated CVE was already assigned
- acpi/nfit: Always dump _DSM output payload (bsc#1142351).
- Add back sibling paca poiter to paca (bsc#1055117).
- Add support for crct10dif-vpmsum ().
- af_unix: remove redundant lockdep class (git-fixes).
- alsa: compress: Be more restrictive about when a drain is allowed (bsc#1051510).
- alsa: compress: Do not allow paritial drain operations on capture streams (bsc#1051510).
- alsa: compress: Fix regression on compressed capture streams (bsc#1051510).
- alsa: compress: Prevent bypasses of set_params (bsc#1051510).
- alsa: hda - Add a conexant codec entry to let mute led work (bsc#1051510).
- alsa: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).
- alsa: hda/realtek - Fixed Headphone Mic can't record on Dell platform (bsc#1051510).
- alsa: hda/realtek - Headphone Mic can't record after S3 (bsc#1051510).
- alsa: line6: Fix a typo (bsc#1051510).
- alsa: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).
- alsa: seq: Break too long mutex context in the write loop (bsc#1051510).
- alsa: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).
- alsa: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).
- alsa: usb-audio: Cleanup DSD whitelist (bsc#1051510).
- alsa: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).
- alsa: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).
- asoc : cs4265 : readable register too low (bsc#1051510).
- asoc: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).
- asoc: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).
- ath6kl: add some bounds checking (bsc#1051510).
- batman-adv: fix for leaked TVLV handler (bsc#1051510).
- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).
- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).
- bcache: add code comments for journal_read_bucket() (bsc#1140652).
- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).
- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).
- bcache: add comments for kobj release callback routine (bsc#1140652).
- bcache: add comments for mutex_lock(&amp;b-&gt;write_lock) (bsc#1140652).
- bcache: add error check for calling register_bdev() (bsc#1140652).
- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).
- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).
- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).
- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).
- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).
- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).
- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).
- bcache: avoid clang -Wunintialized warning (bsc#1140652).
- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).
- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).
- bcache: check c-&gt;gc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).
- bcache: Clean up bch_get_congested() (bsc#1140652).
- bcache: destroy dc-&gt;writeback_write_wq if failed to create dc-&gt;writeback_thread (bsc#1140652).
- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).
- bcache: do not set max writeback rate if gc is running (bsc#1140652).
- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).
- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).
- bcache: fix failure in journal relplay (bsc#1140652).
- bcache: fix inaccurate result of unused buckets (bsc#1140652).
- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).
- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).
- bcache: fix race in btree_flush_write() (bsc#1140652).
- bcache: fix return value error in bch_journal_read() (bsc#1140652).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).
- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).
- bcache: ignore read-ahead request failure on backing device (bsc#1140652).
- bcache: improve bcache_reboot() (bsc#1140652).
- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).
- bcache: make bset_search_tree() be more understandable (bsc#1140652).
- bcache: make is_discard_enabled() static (bsc#1140652).
- bcache: more detailed error message to bcache_device_link() (bsc#1140652).
- bcache: move definition of 'int ret' out of macro read_bucket() (bsc#1140652).
- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).
- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).
- bcache: performance improvement for btree_flush_write() (bsc#1140652).
- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).
- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).
- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).
- bcache: remove 'XXX:' comment line from run_cache_set() (bsc#1140652).
- bcache: return error immediately in bch_journal_replay() (bsc#1140652).
- bcache: Revert 'bcache: fix high CPU occupancy during journal' (bsc#1140652).
- bcache: Revert 'bcache: free heap cache_set-&gt;flush_btree in bch_journal_free' (bsc#1140652).
- bcache: set largest seq to ja-&gt;seq[bucket_index] in journal_read_bucket() (bsc#1140652).
- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).
- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).
- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).
- be2net: Fix number of Rx queues used for flow hashing (networking-stable-19_06_18).
- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).
- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).
- block, bfq: NULL out the bic when it's no longer valid (bsc#1142359).
- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).
- bnxt_en: Fix aggregation buffer leak under OOM condition (networking-stable-19_05_31).
- bonding: fix arp_validate toggling in active-backup mode (networking-stable-19_05_14).
- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).
- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).
- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).
- bridge: Fix error path for kobject_init_and_add() (networking-stable-19_05_14).
- btrfs: fix race between block group removal and block group allocation (bsc#1143003).
- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).
- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).
- clk: rockchip: Do not yell about bad mmc phases when getting (bsc#1051510).
- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).
- cpufreq: acpi-cpufreq: Report if CPU does not support boost technologies (bsc#1051510).
- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).
- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).
- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).
- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).
- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).
- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).
- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).
- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).
- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).
- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).
- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).
- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).
- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).
- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).
- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).
- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).
- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).
- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).
- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).
- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).
- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).
- crypto: talitos - fix CTR alg blocksize (bsc#1051510).
- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).
- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).
- crypto: talitos - properly handle split ICV (bsc#1051510).
- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).
- crypto: talitos - rename alternative AEAD algos (bsc#1051510).
- dasd_fba: Display '00000000' for zero page when dumping sense (bsc#1123080).
- dmaengine: hsu: Revert 'set HSU_CH_MTSR to memory width' (bsc#1051510).
- dpaa_eth: fix SG frame cleanup (networking-stable-19_05_14).
- drm/meson: Add support for XBGR8888 &amp; ABGR8888 formats (bsc#1051510).
- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).
- drm/nouveau/i2c: Enable i2c pads &amp; busses during preinit (bsc#1051510).
- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).
- e1000e: start network tx queue only when link is up (bsc#1051510).
- ethtool: check the return value of get_regs_len (git-fixes).
- ethtool: fix potential userspace buffer overflow (networking-stable-19_06_09).
- Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).
- Fix memory leak in sctp_process_init (networking-stable-19_06_09).
- fork, memcg: fix cached_stacks case (bsc#1134097).
- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).
- hid: wacom: correct touch resolution x/y typo (bsc#1051510).
- hid: wacom: generic: Correct pad syncing (bsc#1051510).
- hid: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).
- hid: wacom: generic: read HID_DG_CONTACTMAX from any feature report (bsc#1051510).
- input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).
- input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).
- input: psmouse - fix build error of multiple definition (bsc#1051510).
- input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).
- input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).
- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).
- ipv4: Fix raw socket lookup for local traffic (networking-stable-19_05_14).
- ipv4/igmp: fix another memory leak in igmpv3_del_delrec() (networking-stable-19_05_31).
- ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST (networking-stable-19_05_31).
- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop (git-fixes).
- ipv6: Consider sk_bound_dev_if when binding a raw socket to an address (networking-stable-19_05_31).
- ipv6: fix EFAULT on sendto with icmpv6 and hdrincl (networking-stable-19_06_09).
- ipv6: flowlabel: fl6_sock_lookup() must use atomic_inc_not_zero (networking-stable-19_06_18).
- ipv6: use READ_ONCE() for inet-&gt;hdrincl as in ipv4 (networking-stable-19_06_09).
- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995).
- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 			LTC#178058 LTC#178059).
- kvm: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).
- kvm: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).
- kvm: fix Guest installation fails by 'Invalid value '0-31' for 'cpuset.cpus': Invalid argument' (bsc#1143507)
- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).
- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).
- kvm: polling: add architecture backend to disable polling (bsc#1119222).
- kvm: s390: change default halt poll time to 50us (bsc#1119222).
- kvm: s390: enable CONFIG_HAVE_KVM_NO_POLL (bsc#1119222) We need to enable CONFIG_HAVE_KVM_NO_POLL for bsc#1119222
- kvm: s390: fix typo in parameter description (bsc#1119222).
- kvm: s390: kABI Workaround for 'kvm_vcpu_stat' Add halt_no_poll_steal to kvm_vcpu_stat. Hide it from the kABI checker.
- kvm: s390: kABI Workaround for 'lowcore' (bsc#1119222).
- kvm: s390: provide kvm_arch_no_poll function (bsc#1119222).
- kvm: svm/avic: Do not send AVIC doorbell to self (bsc#1140133).
- kvm: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).
- lapb: fixed leak of control-blocks (networking-stable-19_06_18).
- lib: fix stall in __bitmap_parselist() (bsc#1051510).
- libnvdimm/namespace: Fix label tracking error (bsc#1142350).
- lib/scatterlist: Fix mapping iterator when sg-&gt;offset is greater than PAGE_SIZE (bsc#1051510).
- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995).
- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995).
- llc: fix skb leak in llc_build_and_send_ui_pkt() (networking-stable-19_05_31).
- media: cpia2_usb: first wake up, then free in disconnect (bsc#1135642).
- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).
- media: s5p-mfc: Make additional clocks optional (bsc#1051510).
- media: v4l2: Test type instead of cfg-&gt;type in v4l2_ctrl_new_custom() (bsc#1051510).
- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).
- mei: bus: need to unlink client before freeing (bsc#1051510).
- mei: me: add denverton innovation engine device IDs (bsc#1051510).
- mei: me: add gemini lake devices id (bsc#1051510).
- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).
- memstick: Fix error cleanup path of memstick_init (bsc#1051510).
- mfd: intel-lpss: Release IDA resources (bsc#1051510).
- mmc: sdhci-pci: Try 'cd' for card-detect lookup before using NULL (bsc#1051510).
- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).
- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).
- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).
- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).
- neigh: fix use-after-free read in pneigh_get_next (networking-stable-19_06_18).
- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).
- net: avoid weird emergency message (networking-stable-19_05_21).
- net: fec: fix the clk mismatch in failed_reset path (networking-stable-19_05_31).
- netfilter: conntrack: fix calculation of next bucket number in early_drop (git-fixes).
- net-gro: fix use-after-free read in napi_gro_frags() (networking-stable-19_05_31).
- net/mlx4_core: Change the error print to info print (networking-stable-19_05_21).
- net/mlx4_en: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_06_09).
- net/mlx5: Allocate root ns memory using kzalloc to match kfree (networking-stable-19_05_31).
- net/mlx5: Avoid double free in fs init error unwinding path (networking-stable-19_05_31).
- net: mvneta: Fix err code path of probe (networking-stable-19_05_31).
- net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value (networking-stable-19_05_31).
- net: openvswitch: do not free vport if register_netdevice() is failed (networking-stable-19_06_18).
- net/packet: fix memory leak in packet_set_ring() (git-fixes).
- net: rds: fix memory leak in rds_ib_flush_mr_pool (networking-stable-19_06_09).
- net: seeq: fix crash caused by not set dev.parent (networking-stable-19_05_14).
- net: stmmac: fix reset gpio free missing (networking-stable-19_05_31).
- net: usb: qmi_wwan: add Telit 0x1260 and 0x1261 compositions (networking-stable-19_05_21).
- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).
- ocfs2: add first lock wait time in locking_state (bsc#1134390).
- ocfs2: add last unlock times in locking_state (bsc#1134390).
- ocfs2: add locking filter debugfs file (bsc#1134390).
- packet: Fix error path in packet_init (networking-stable-19_05_14).
- packet: in recvmsg msg_name return at least sizeof sockaddr_ll (git-fixes).
- pci: Always allow probing with driver_override (bsc#1051510).
- pci: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).
- pci: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).
- pci: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).
- pci: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).
- pci: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).
- pci: hv: Remove unused reason for refcount handler (bsc#1142701).
- pci: hv: support reporting serial number as slot information (bsc#1142701).
- pci: Return error if cannot probe VF (bsc#1051510).
- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).
- pktgen: do not sleep with the thread lock held (git-fixes).
- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).
- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).
- platform/x86: intel_turbo_max_3: Remove restriction for HWP platforms (jsc#SLE-5439).
- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).
- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, git-fixes).
- powerpc/crypto: Use cheaper random numbers for crc-vpmsum self-test ().
- powerpc/mm: Change function prototype (bsc#1055117).
- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).
- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).
- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).
- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).
- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).
- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).
- ppp: deflate: Fix possible crash in deflate_init (networking-stable-19_05_21).
- rds: ib: fix 'passing zero to ERR_PTR()' warning (git-fixes).
- Revert 'bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error()' (bsc#1140652).
- Revert 'e1000e: fix cyclic resets at link up with active tx' (bsc#1051510).
- Revert 'livepatch: Remove reliable stacktrace check in klp_try_switch_task()' (bsc#1071995).
- Revert 'serial: 8250: Do not service RX FIFO if interrupts are disabled' (bsc#1051510).
- rtnetlink: always put IFLA_LINK for links with a link-netnsid (networking-stable-19_05_21).
- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).
- s390/vtime: steal time exponential moving average (bsc#1119222).
- scripts/git_sort/git_sort.py: Add mmots tree.
- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).
- sctp: Free cookie before we memdup a new one (networking-stable-19_06_18).
- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).
- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).
- serial: uartps: Fix long line over 80 chars (bsc#1051510).
- serial: uartps: Fix multiple line dereference (bsc#1051510).
- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).
- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).
- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).
- staging: rtl8712: reduce stack usage, again (bsc#1051510).
- sunhv: Fix device naming inconsistency between sunhv_console and sunhv_reg (networking-stable-19_06_18).
- tcp: reduce tcp_fastretrans_alert() verbosity (git-fixes).
- team: Always enable vlan tx offload (bsc#1051510).
- tty: rocket: fix incorrect forward declaration of 'rp_init()' (bsc#1051510).
- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).
- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).
- tuntap: synchronize through tfiles array instead of tun-&gt;numqueues (networking-stable-19_05_14).
- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).
- usb: gadget: fusb300_udc: Fix memory leak of fusb300-&gt;ep[i] (bsc#1051510).
- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).
- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).
- usb: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).
- usb: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).
- vmci: Fix integer overflow in VMCI handle arrays (bsc#1051510).
- vsock/virtio: free packets during the socket release (networking-stable-19_05_21).
- vsock/virtio: set SOCK_DONE on peer shutdown (networking-stable-19_06_18).
- wil6210: fix potential out-of-bounds read (bsc#1051510).
- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).
- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).
- xfs: do not overflow xattr listent buffer (bsc#1143105).

		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-07"/>
	<updated date="2019-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051510">SUSE bug 1051510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055117">SUSE bug 1055117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083647">SUSE bug 1083647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083710">SUSE bug 1083710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102247">SUSE bug 1102247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111666">SUSE bug 1111666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119222">SUSE bug 1119222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123080">SUSE bug 1123080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127034">SUSE bug 1127034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127315">SUSE bug 1127315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129770">SUSE bug 1129770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130972">SUSE bug 1130972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133021">SUSE bug 1133021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134097">SUSE bug 1134097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134390">SUSE bug 1134390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134399">SUSE bug 1134399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135335">SUSE bug 1135335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135642">SUSE bug 1135642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136896">SUSE bug 1136896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137458">SUSE bug 1137458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137534">SUSE bug 1137534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137535">SUSE bug 1137535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137584">SUSE bug 1137584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137609">SUSE bug 1137609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137811">SUSE bug 1137811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137827">SUSE bug 1137827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139358">SUSE bug 1139358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140133">SUSE bug 1140133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140139">SUSE bug 1140139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140322">SUSE bug 1140322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140652">SUSE bug 1140652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140887">SUSE bug 1140887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140888">SUSE bug 1140888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140889">SUSE bug 1140889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140891">SUSE bug 1140891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140893">SUSE bug 1140893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140903">SUSE bug 1140903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140945">SUSE bug 1140945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140954">SUSE bug 1140954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140955">SUSE bug 1140955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140956">SUSE bug 1140956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140957">SUSE bug 1140957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140958">SUSE bug 1140958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140959">SUSE bug 1140959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140960">SUSE bug 1140960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140961">SUSE bug 1140961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140962">SUSE bug 1140962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140964">SUSE bug 1140964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140971">SUSE bug 1140971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140972">SUSE bug 1140972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140992">SUSE bug 1140992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141401">SUSE bug 1141401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141402">SUSE bug 1141402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141452">SUSE bug 1141452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141453">SUSE bug 1141453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141454">SUSE bug 1141454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141478">SUSE bug 1141478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142023">SUSE bug 1142023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142112">SUSE bug 1142112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142220">SUSE bug 1142220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142221">SUSE bug 1142221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142254">SUSE bug 1142254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142350">SUSE bug 1142350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142351">SUSE bug 1142351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142354">SUSE bug 1142354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142359">SUSE bug 1142359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142450">SUSE bug 1142450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142701">SUSE bug 1142701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142868">SUSE bug 1142868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143003">SUSE bug 1143003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143045">SUSE bug 1143045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143105">SUSE bug 1143105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143185">SUSE bug 1143185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143189">SUSE bug 1143189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143191">SUSE bug 1143191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143507">SUSE bug 1143507</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20855/">CVE-2018-20855</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1125/">CVE-2019-1125</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11810/">CVE-2019-11810</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13631/">CVE-2019-13631</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13648/">CVE-2019-13648</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14283/">CVE-2019-14283</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14284/">CVE-2019-14284</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522045" comment="kernel-default-4.12.14-95.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522046" comment="kernel-default-devel-4.12.14-95.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522047" comment="kernel-default-extra-4.12.14-95.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522048" comment="kernel-devel-4.12.14-95.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522049" comment="kernel-macros-4.12.14-95.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522050" comment="kernel-source-4.12.14-95.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522051" comment="kernel-syms-4.12.14-95.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78786" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1133037" ref_url="https://bugzilla.suse.com/1133037" source="BUGZILLA"/>
		<reference ref_id="1141619" ref_url="https://bugzilla.suse.com/1141619" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010006" ref_url="https://www.suse.com/security/cve/CVE-2019-1010006/" source="CVE"/>
		<reference ref_id="CVE-2019-11459" ref_url="https://www.suse.com/security/cve/CVE-2019-11459/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005797.html" source="SUSE-SU"/>
		<description>
This update for evince fixes the following issues:

Security issues fixed: 	  

- CVE-2019-11459: Fixed an improper error handling in which could have led to use of uninitialized use of memory (bsc#1133037).
- CVE-2019-1010006: Fixed a buffer overflow in backend/tiff/tiff-document.c (bsc#1141619).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-07"/>
	<updated date="2019-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133037">SUSE bug 1133037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141619">SUSE bug 1141619</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010006/">CVE-2019-1010006</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11459/">CVE-2019-11459</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522052" comment="evince-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522053" comment="evince-browser-plugin-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522054" comment="evince-lang-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522055" comment="evince-plugin-djvudocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522056" comment="evince-plugin-dvidocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522057" comment="evince-plugin-pdfdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522058" comment="evince-plugin-psdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522059" comment="evince-plugin-tiffdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522060" comment="evince-plugin-xpsdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522061" comment="libevdocument3-4-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522062" comment="libevview3-3-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522063" comment="nautilus-evince-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522064" comment="typelib-1_0-EvinceDocument-3_0-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522065" comment="typelib-1_0-EvinceView-3_0-3.20.2-6.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78787" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1068716" ref_url="https://bugzilla.suse.com/1068716" source="BUGZILLA"/>
		<reference ref_id="1142439" ref_url="https://bugzilla.suse.com/1142439" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16808" ref_url="https://www.suse.com/security/cve/CVE-2017-16808/" source="CVE"/>
		<reference ref_id="CVE-2019-1010220" ref_url="https://www.suse.com/security/cve/CVE-2019-1010220/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005799.html" source="SUSE-SU"/>
		<description>
This update for tcpdump fixes the following issues:

Security issues fixed:

- CVE-2019-1010220: Fixed a buffer over-read in print_prefix() which may expose data (bsc#1142439).
- CVE-2017-16808: Fixed a heap-based buffer over-read related to aoe_print() and lookup_emem() (bsc#1068716).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-07"/>
	<updated date="2019-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068716">SUSE bug 1068716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142439">SUSE bug 1142439</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16808/">CVE-2017-16808</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1010220/">CVE-2019-1010220</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522066" comment="tcpdump-4.9.2-14.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78788" version="1" class="patch">
	<metadata>
		<title>Security update for rsyslog (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1123164" ref_url="https://bugzilla.suse.com/1123164" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16881" ref_url="https://www.suse.com/security/cve/CVE-2018-16881/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0209-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190209-1.html" source="SUSE-SU"/>
		<description>
This update for rsyslog fixes the following issues:

Security issue fixed:

- CVE-2018-16881: Fixed a denial of service when both the imtcp module and Octet-Counted TCP Framing is enabled (bsc#1123164).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-31"/>
	<updated date="2019-01-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1123164">SUSE bug 1123164</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16881/">CVE-2018-16881</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521595" comment="rsyslog-8.24.0-3.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78789" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005803.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2019-10160: Fixed a regression in urlparse() and urlsplit() introduced by the fix for CVE-2019-9636 (bsc#1138459).
- CVE-2018-20852: Fixed an information leak where cookies could be send to the wrong server because of incorrect domain validation (bsc#1141853).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-23"/>
	<updated date="2019-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522067" comment="libpython2_7-1_0-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522068" comment="libpython2_7-1_0-32bit-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522069" comment="python-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522070" comment="python-base-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522071" comment="python-curses-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522072" comment="python-devel-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522073" comment="python-tk-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522074" comment="python-xml-2.7.13-28.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78790" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1141980" ref_url="https://bugzilla.suse.com/1141980" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13619" ref_url="https://www.suse.com/security/cve/CVE-2019-13619/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005807.html" source="SUSE-SU"/>
		<description>
This update for wireshark to version 2.4.16 fixes the following issues:

Security issue fixed:

- CVE-2019-13619: ASN.1 BER and related dissectors crash (bsc#1141980).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-09"/>
	<updated date="2019-08-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141980">SUSE bug 1141980</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13619/">CVE-2019-13619</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522075" comment="libwireshark9-2.4.16-48.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522076" comment="libwiretap7-2.4.16-48.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522077" comment="libwscodecs1-2.4.16-48.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522078" comment="libwsutil8-2.4.16-48.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522079" comment="wireshark-2.4.16-48.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522080" comment="wireshark-gtk-2.4.16-48.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78791" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb-100 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1136037" ref_url="https://bugzilla.suse.com/1136037" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2529" ref_url="https://www.suse.com/security/cve/CVE-2019-2529/" source="CVE"/>
		<reference ref_id="CVE-2019-2537" ref_url="https://www.suse.com/security/cve/CVE-2019-2537/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005813.html" source="SUSE-SU"/>
		<description>
This update for mariadb-100 to version 10.0.38 fixes the following issues:

- CVE-2019-2537: Fixed a denial of service vulnerability which can lead to MySQL compromise (bsc#1136037).
- CVE-2019-2529: Fixed a denial of service vulnerability by an privileged attacker via a protocol compromise (bsc#1136037).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-13"/>
	<updated date="2019-08-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136037">SUSE bug 1136037</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2529/">CVE-2019-2529</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2537/">CVE-2019-2537</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522081" comment="libmysqlclient18-10.0.38-2.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522082" comment="libmysqlclient18-32bit-10.0.38-2.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522083" comment="libmysqlclient_r18-10.0.38-2.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522084" comment="libmysqlclient_r18-32bit-10.0.38-2.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522085" comment="mariadb-100-errormessages-10.0.38-2.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78792" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="962522" ref_url="https://bugzilla.suse.com/962522" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1923" ref_url="https://www.suse.com/security/cve/CVE-2016-1923/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005816.html" source="SUSE-SU"/>
		<description>
This update for openjpeg2 fixes the following issues:

Security issue fixed:

- CVE-2016-1923: Fixed anout of bounds read int opj_j2k_update_image_data() and opj_tgt_reset () (bsc#962522).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-15"/>
	<updated date="2019-08-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/962522">SUSE bug 962522</bugzilla>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1923/">CVE-2016-1923</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522086" comment="libopenjp2-7-2.1.0-4.12.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78793" version="1" class="patch">
	<metadata>
		<title>Recommended update for NetworkManager (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="990204" ref_url="https://bugzilla.suse.com/990204" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2019:2258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005866.html" source="SUSE-SU"/>
		<description>
This update for NetworkManager fixes the following issues:

Security issue fixed:

- Fixed that passwords are not echoed on terminal when asking for them (bsc#990204).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/990204">SUSE bug 990204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522087" comment="NetworkManager-1.0.12-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522088" comment="NetworkManager-lang-1.0.12-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522089" comment="libnm-glib-vpn1-1.0.12-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522090" comment="libnm-glib4-1.0.12-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522091" comment="libnm-util2-1.0.12-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522092" comment="libnm0-1.0.12-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522093" comment="typelib-1_0-NM-1_0-1.0.12-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522094" comment="typelib-1_0-NMClient-1_0-1.0.12-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522095" comment="typelib-1_0-NetworkManager-1_0-1.0.12-13.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78794" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1114674" ref_url="https://bugzilla.suse.com/1114674" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18311" ref_url="https://www.suse.com/security/cve/CVE-2018-18311/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2264-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192264-1.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

Security issue fixed:

- CVE-2018-18311: Fixed integer overflow with oversize environment (bsc#1114674).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1114674">SUSE bug 1114674</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18311/">CVE-2018-18311</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522096" comment="perl-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522097" comment="perl-32bit-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522098" comment="perl-base-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522099" comment="perl-doc-5.18.2-12.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78795" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv, libzypp, zypper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1049825" ref_url="https://bugzilla.suse.com/1049825" source="BUGZILLA"/>
		<reference ref_id="1109893" ref_url="https://bugzilla.suse.com/1109893" source="BUGZILLA"/>
		<reference ref_id="1110542" ref_url="https://bugzilla.suse.com/1110542" source="BUGZILLA"/>
		<reference ref_id="1111319" ref_url="https://bugzilla.suse.com/1111319" source="BUGZILLA"/>
		<reference ref_id="1112911" ref_url="https://bugzilla.suse.com/1112911" source="BUGZILLA"/>
		<reference ref_id="1113296" ref_url="https://bugzilla.suse.com/1113296" source="BUGZILLA"/>
		<reference ref_id="1116995" ref_url="https://bugzilla.suse.com/1116995" source="BUGZILLA"/>
		<reference ref_id="1120629" ref_url="https://bugzilla.suse.com/1120629" source="BUGZILLA"/>
		<reference ref_id="1120630" ref_url="https://bugzilla.suse.com/1120630" source="BUGZILLA"/>
		<reference ref_id="1120631" ref_url="https://bugzilla.suse.com/1120631" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1131823" ref_url="https://bugzilla.suse.com/1131823" source="BUGZILLA"/>
		<reference ref_id="1134226" ref_url="https://bugzilla.suse.com/1134226" source="BUGZILLA"/>
		<reference ref_id="1137977" ref_url="https://bugzilla.suse.com/1137977" source="BUGZILLA"/>
		<reference ref_id="1140039" ref_url="https://bugzilla.suse.com/1140039" source="BUGZILLA"/>
		<reference ref_id="1145521" ref_url="https://bugzilla.suse.com/1145521" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532/" source="CVE"/>
		<reference ref_id="CVE-2018-20533" ref_url="https://www.suse.com/security/cve/CVE-2018-20533/" source="CVE"/>
		<reference ref_id="CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2265-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192265-1.html" source="SUSE-SU"/>
		<description>
This update for libsolv, libzypp and zypper fixes the following issues:

libsolv was updated to version 0.6.36 and fixes the following issues:

Security issues fixed:

- CVE-2018-20532: Fixed a NULL pointer dereference in testcase_read() (bsc#1120629).
- CVE-2018-20533: Fixed a NULL pointer dereference in testcase_str2dep_complex() (bsc#1120630).
- CVE-2018-20534: Fixed a NULL pointer dereference in pool_whatprovides() (bsc#1120631).

Non-security issues fixed:

- Made cleandeps jobs on patterns work (bsc#1137977).
- Fixed an issue multiversion packages that obsolete their own name (bsc#1127155).
- Keep consistent package name if there are multiple alternatives (bsc#1131823).

Fixes for libzypp:

- Fixes a bug where locking the kernel was not possible (bsc#1113296)
- Fixes a file descriptor leak (bsc#1116995)
- Will now run file conflict check on dry-run (best with download-only) (bsc#1140039)

Fixes for zypper:

- Fixes a bug where the wrong exit code was set when refreshing repos if --root was used (bsc#1134226)
- Improved the displaying of locks (bsc#1112911)
- Fixes an issue where `https` repository urls caused an error prompt to appear twice (bsc#1110542)
- zypper will now always warn when no repositories are defined (bsc#1109893)
- Fixes bash completion option detection (bsc#1049825)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049825">SUSE bug 1049825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109893">SUSE bug 1109893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110542">SUSE bug 1110542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111319">SUSE bug 1111319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112911">SUSE bug 1112911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113296">SUSE bug 1113296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116995">SUSE bug 1116995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120629">SUSE bug 1120629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120630">SUSE bug 1120630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120631">SUSE bug 1120631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131823">SUSE bug 1131823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134226">SUSE bug 1134226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137977">SUSE bug 1137977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140039">SUSE bug 1140039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145521">SUSE bug 1145521</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20533/">CVE-2018-20533</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522100" comment="libsolv-tools-0.6.36-2.27.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522101" comment="libzypp-16.20.2-27.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522102" comment="python-solv-0.6.36-2.27.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522103" comment="zypper-1.13.54-18.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522104" comment="zypper-log-1.13.54-18.40.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78796" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1145092" ref_url="https://bugzilla.suse.com/1145092" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

Security issue fixed:

- CVE-2019-10208: Fixed arbitrary SQL execution via suitable SECURITY DEFINER function under the identity of the function owner (bsc#1145092).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145092">SUSE bug 1145092</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522105" comment="libecpg6-10.10-1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522106" comment="libpq5-10.10-1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522107" comment="libpq5-32bit-10.10-1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522108" comment="postgresql10-10.10-1.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78797" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb, mariadb-connector-c (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1126088" ref_url="https://bugzilla.suse.com/1126088" source="BUGZILLA"/>
		<reference ref_id="1132666" ref_url="https://bugzilla.suse.com/1132666" source="BUGZILLA"/>
		<reference ref_id="1136035" ref_url="https://bugzilla.suse.com/1136035" source="BUGZILLA"/>
		<reference ref_id="1143215" ref_url="https://bugzilla.suse.com/1143215" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2614" ref_url="https://www.suse.com/security/cve/CVE-2019-2614/" source="CVE"/>
		<reference ref_id="CVE-2019-2627" ref_url="https://www.suse.com/security/cve/CVE-2019-2627/" source="CVE"/>
		<reference ref_id="CVE-2019-2628" ref_url="https://www.suse.com/security/cve/CVE-2019-2628/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005890.html" source="SUSE-SU"/>
		<description>
This update for mariadb and mariadb-connector-c fixes the following issues:

mariadb:

- Update to version 10.2.25 (bsc#1136035)
- CVE-2019-2628: Fixed a remote denial of service by an privileged attacker (bsc#1136035).
- CVE-2019-2627: Fixed another remote denial of service by an privileged attacker (bsc#1136035).
- CVE-2019-2614: Fixed a potential remote denial of service by an privileged attacker (bsc#1136035).
- Fixed reading options for multiple instances if my${INSTANCE}.cnf is used (bsc#1132666).
- Adjust mysql-systemd-helper ('shutdown protected MySQL' section) so it checks both ping response
  and the pid in a process list as it can take some time till the process is terminated. Otherwise
  it can lead to 'found left-over process' situation when regular mariadb is started (bsc#1143215).

mariadb-connector-c:

- Update to version 3.1.2 (bsc#1136035)
- Moved libmariadb.pc from /usr/lib/pkgconfig to /usr/lib64/pkgconfig for x86_64 (bsc#1126088) 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-06"/>
	<updated date="2019-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1126088">SUSE bug 1126088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132666">SUSE bug 1132666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136035">SUSE bug 1136035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143215">SUSE bug 1143215</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2614/">CVE-2019-2614</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2627/">CVE-2019-2627</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2628/">CVE-2019-2628</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522109" comment="libmariadb3-3.1.2-2.6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522110" comment="libmariadb_plugins-3.1.2-2.6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522111" comment="mariadb-10.2.25-3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522112" comment="mariadb-client-10.2.25-3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522113" comment="mariadb-errormessages-10.2.25-3.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78798" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1135715" ref_url="https://bugzilla.suse.com/1135715" source="BUGZILLA"/>
		<reference ref_id="1148931" ref_url="https://bugzilla.suse.com/1148931" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8595" ref_url="https://www.suse.com/security/cve/CVE-2019-8595/" source="CVE"/>
		<reference ref_id="CVE-2019-8607" ref_url="https://www.suse.com/security/cve/CVE-2019-8607/" source="CVE"/>
		<reference ref_id="CVE-2019-8615" ref_url="https://www.suse.com/security/cve/CVE-2019-8615/" source="CVE"/>
		<reference ref_id="CVE-2019-8644" ref_url="https://www.suse.com/security/cve/CVE-2019-8644/" source="CVE"/>
		<reference ref_id="CVE-2019-8649" ref_url="https://www.suse.com/security/cve/CVE-2019-8649/" source="CVE"/>
		<reference ref_id="CVE-2019-8658" ref_url="https://www.suse.com/security/cve/CVE-2019-8658/" source="CVE"/>
		<reference ref_id="CVE-2019-8666" ref_url="https://www.suse.com/security/cve/CVE-2019-8666/" source="CVE"/>
		<reference ref_id="CVE-2019-8669" ref_url="https://www.suse.com/security/cve/CVE-2019-8669/" source="CVE"/>
		<reference ref_id="CVE-2019-8671" ref_url="https://www.suse.com/security/cve/CVE-2019-8671/" source="CVE"/>
		<reference ref_id="CVE-2019-8672" ref_url="https://www.suse.com/security/cve/CVE-2019-8672/" source="CVE"/>
		<reference ref_id="CVE-2019-8673" ref_url="https://www.suse.com/security/cve/CVE-2019-8673/" source="CVE"/>
		<reference ref_id="CVE-2019-8676" ref_url="https://www.suse.com/security/cve/CVE-2019-8676/" source="CVE"/>
		<reference ref_id="CVE-2019-8677" ref_url="https://www.suse.com/security/cve/CVE-2019-8677/" source="CVE"/>
		<reference ref_id="CVE-2019-8678" ref_url="https://www.suse.com/security/cve/CVE-2019-8678/" source="CVE"/>
		<reference ref_id="CVE-2019-8679" ref_url="https://www.suse.com/security/cve/CVE-2019-8679/" source="CVE"/>
		<reference ref_id="CVE-2019-8680" ref_url="https://www.suse.com/security/cve/CVE-2019-8680/" source="CVE"/>
		<reference ref_id="CVE-2019-8681" ref_url="https://www.suse.com/security/cve/CVE-2019-8681/" source="CVE"/>
		<reference ref_id="CVE-2019-8683" ref_url="https://www.suse.com/security/cve/CVE-2019-8683/" source="CVE"/>
		<reference ref_id="CVE-2019-8684" ref_url="https://www.suse.com/security/cve/CVE-2019-8684/" source="CVE"/>
		<reference ref_id="CVE-2019-8686" ref_url="https://www.suse.com/security/cve/CVE-2019-8686/" source="CVE"/>
		<reference ref_id="CVE-2019-8687" ref_url="https://www.suse.com/security/cve/CVE-2019-8687/" source="CVE"/>
		<reference ref_id="CVE-2019-8688" ref_url="https://www.suse.com/security/cve/CVE-2019-8688/" source="CVE"/>
		<reference ref_id="CVE-2019-8689" ref_url="https://www.suse.com/security/cve/CVE-2019-8689/" source="CVE"/>
		<reference ref_id="CVE-2019-8690" ref_url="https://www.suse.com/security/cve/CVE-2019-8690/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Updated to version 2.24.4 (bsc#1148931).

Security issues fixed:
	  
- CVE-2019-8644, CVE-2019-8649, CVE-2019-8658, CVE-2019-8669, CVE-2019-8678,
  CVE-2019-8680, CVE-2019-8683, CVE-2019-8684, CVE-2019-8688, CVE-2019-8595,
  CVE-2019-8607, CVE-2019-8615, CVE-2019-8644, CVE-2019-8649, CVE-2019-8658,
  CVE-2019-8666, CVE-2019-8669, CVE-2019-8671, CVE-2019-8672, CVE-2019-8673,
  CVE-2019-8676, CVE-2019-8677, CVE-2019-8678, CVE-2019-8679, CVE-2019-8680,
  CVE-2019-8681, CVE-2019-8683, CVE-2019-8684, CVE-2019-8686, CVE-2019-8687,
  CVE-2019-8688, CVE-2019-8689, CVE-2019-8690

Non-security issues fixed:
	  
- Improved loading of multimedia streams to avoid memory exhaustion due to excessive caching.
- Updated the user agent string to make happy certain websites which would claim that the browser being used was unsupported.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-10"/>
	<updated date="2019-09-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8595/">CVE-2019-8595</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8607/">CVE-2019-8607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8615/">CVE-2019-8615</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8644/">CVE-2019-8644</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8649/">CVE-2019-8649</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8658/">CVE-2019-8658</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8666/">CVE-2019-8666</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8669/">CVE-2019-8669</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8671/">CVE-2019-8671</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8672/">CVE-2019-8672</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8673/">CVE-2019-8673</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8676/">CVE-2019-8676</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8677/">CVE-2019-8677</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8678/">CVE-2019-8678</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8679/">CVE-2019-8679</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8680/">CVE-2019-8680</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8681/">CVE-2019-8681</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8683/">CVE-2019-8683</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8684/">CVE-2019-8684</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8686/">CVE-2019-8686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8687/">CVE-2019-8687</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8688/">CVE-2019-8688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8689/">CVE-2019-8689</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8690/">CVE-2019-8690</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78799" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1144621" ref_url="https://bugzilla.suse.com/1144621" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10216" ref_url="https://www.suse.com/security/cve/CVE-2019-10216/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005900.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

Security issue fixed:

- CVE-2019-10216: Fix privilege escalation via specially crafted PostScript file (bsc#1144621).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-10"/>
	<updated date="2019-09-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144621">SUSE bug 1144621</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10216/">CVE-2019-10216</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522120" comment="ghostscript-9.26a-23.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522121" comment="ghostscript-x11-9.26a-23.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78800" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1079730" ref_url="https://bugzilla.suse.com/1079730" source="BUGZILLA"/>
		<reference ref_id="1098403" ref_url="https://bugzilla.suse.com/1098403" source="BUGZILLA"/>
		<reference ref_id="1111025" ref_url="https://bugzilla.suse.com/1111025" source="BUGZILLA"/>
		<reference ref_id="1127077" ref_url="https://bugzilla.suse.com/1127077" source="BUGZILLA"/>
		<reference ref_id="1134880" ref_url="https://bugzilla.suse.com/1134880" source="BUGZILLA"/>
		<reference ref_id="1135902" ref_url="https://bugzilla.suse.com/1135902" source="BUGZILLA"/>
		<reference ref_id="1136528" ref_url="https://bugzilla.suse.com/1136528" source="BUGZILLA"/>
		<reference ref_id="1136777" ref_url="https://bugzilla.suse.com/1136777" source="BUGZILLA"/>
		<reference ref_id="1139926" ref_url="https://bugzilla.suse.com/1139926" source="BUGZILLA"/>
		<reference ref_id="1140402" ref_url="https://bugzilla.suse.com/1140402" source="BUGZILLA"/>
		<reference ref_id="1141043" ref_url="https://bugzilla.suse.com/1141043" source="BUGZILLA"/>
		<reference ref_id="1143794" ref_url="https://bugzilla.suse.com/1143794" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12155" ref_url="https://www.suse.com/security/cve/CVE-2019-12155/" source="CVE"/>
		<reference ref_id="CVE-2019-13164" ref_url="https://www.suse.com/security/cve/CVE-2019-13164/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005906.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2019-14378: Security fix for heap overflow in ip_reass on big packet input (bsc#1143794).
- CVE-2019-12155: Security fix for null pointer dereference while releasing spice resources (bsc#1135902).
- CVE-2019-13164: Security fix for qemu-bridge-helper ACL can be bypassed when names are too long (bsc#1140402).

Bug fixes and enhancements:

- Add vcpu features needed for Cascadelake-Server, Icelake-Client and Icelake-Server, especially the foundational
  arch-capabilities to help with security and performance on Intel hosts (bsc#1134880) (fate#327764).
- Add support for one more security/performance related vcpu feature (bsc#1136777) (fate#327795).
- Disable file locking in the Xen PV disk backend to avoid locking issues with PV domUs during migration. The
  issues triggered by the locking can not be properly handled in libxl. The locking introduced in qemu-2.10 was
  removed again in qemu-4.0 (bsc#1079730, bsc#1098403, bsc#1111025).
- Ignore csske for expanding the cpu model (bsc#1136528).
- Provide qcow2 L2 caching improvements, which allows for better storage performance in certain configurations (bsc#1139926, ECO-130).
- Fixed virsh migrate-setspeed (bsc#1127077, bsc#1141043).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-11"/>
	<updated date="2019-09-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1079730">SUSE bug 1079730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098403">SUSE bug 1098403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111025">SUSE bug 1111025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127077">SUSE bug 1127077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134880">SUSE bug 1134880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135902">SUSE bug 1135902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136528">SUSE bug 1136528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136777">SUSE bug 1136777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139926">SUSE bug 1139926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140402">SUSE bug 1140402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141043">SUSE bug 1141043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143794">SUSE bug 1143794</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12155/">CVE-2019-12155</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13164/">CVE-2019-13164</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522122" comment="qemu-2.11.2-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522123" comment="qemu-block-curl-2.11.2-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522124" comment="qemu-ipxe-1.0.0+-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522125" comment="qemu-kvm-2.11.2-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522126" comment="qemu-seabios-1.11.0-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522127" comment="qemu-sgabios-8-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522128" comment="qemu-tools-2.11.2-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522129" comment="qemu-vgabios-1.11.0-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522130" comment="qemu-x86-2.11.2-5.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78801" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1121567" ref_url="https://bugzilla.suse.com/1121567" source="BUGZILLA"/>
		<reference ref_id="1149961" ref_url="https://bugzilla.suse.com/1149961" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16889" ref_url="https://www.suse.com/security/cve/CVE-2018-16889/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005910.html" source="SUSE-SU"/>
		<description>
This update for ceph to version 12.2.12-594-g02236657ca fixes the following issues:

Security issues fixed:

- CVE-2018-16889: Fixed missing sanitation of customer encryption keys from log output in v4 auth. (bsc#1121567)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-12"/>
	<updated date="2019-09-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1121567">SUSE bug 1121567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149961">SUSE bug 1149961</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16889/">CVE-2018-16889</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522131" comment="ceph-common-12.2.12+git.1568024032.02236657ca-2.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522132" comment="libcephfs2-12.2.12+git.1568024032.02236657ca-2.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522133" comment="librados2-12.2.12+git.1568024032.02236657ca-2.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522134" comment="libradosstriper1-12.2.12+git.1568024032.02236657ca-2.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522135" comment="librbd1-12.2.12+git.1568024032.02236657ca-2.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522136" comment="librgw2-12.2.12+git.1568024032.02236657ca-2.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522137" comment="python-cephfs-12.2.12+git.1568024032.02236657ca-2.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522138" comment="python-rados-12.2.12+git.1568024032.02236657ca-2.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522139" comment="python-rbd-12.2.12+git.1568024032.02236657ca-2.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522140" comment="python-rgw-12.2.12+git.1568024032.02236657ca-2.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78802" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1149495" ref_url="https://bugzilla.suse.com/1149495" source="BUGZILLA"/>
		<reference ref_id="1149496" ref_url="https://bugzilla.suse.com/1149496" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5481" ref_url="https://www.suse.com/security/cve/CVE-2019-5481/" source="CVE"/>
		<reference ref_id="CVE-2019-5482" ref_url="https://www.suse.com/security/cve/CVE-2019-5482/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005919.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issues fixed:

- CVE-2019-5481: Fixed a double-free during kerberos FTP data transfer. (bsc#1149495)
- CVE-2019-5482: Fixed a TFTP small block size heap buffer overflow (bsc#1149496).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-16"/>
	<updated date="2019-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149495">SUSE bug 1149495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149496">SUSE bug 1149496</bugzilla>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5481/">CVE-2019-5481</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5482/">CVE-2019-5482</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522141" comment="curl-7.60.0-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522142" comment="libcurl4-7.60.0-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522143" comment="libcurl4-32bit-7.60.0-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78803" version="1" class="patch">
	<metadata>
		<title>Security update for ibus (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1150011" ref_url="https://bugzilla.suse.com/1150011" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14822" ref_url="https://www.suse.com/security/cve/CVE-2019-14822/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005925.html" source="SUSE-SU"/>
		<description>
This update for ibus fixes the following issues:

Security issue fixed:

- CVE-2019-14822: Fixed a misconfiguration of the DBus server that allowed an unprivileged user to monitor and send method calls to the ibus bus of another user. (bsc#1150011)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1150011">SUSE bug 1150011</bugzilla>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14822/">CVE-2019-14822</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522144" comment="ibus-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522145" comment="ibus-gtk-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522146" comment="ibus-gtk3-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522147" comment="ibus-gtk3-32bit-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522148" comment="ibus-lang-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522149" comment="libibus-1_0-5-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522150" comment="libibus-1_0-5-32bit-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522151" comment="python-ibus-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522152" comment="typelib-1_0-IBus-1_0-1.5.13-15.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78804" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1143194" ref_url="https://bugzilla.suse.com/1143194" source="BUGZILLA"/>
		<reference ref_id="1143273" ref_url="https://bugzilla.suse.com/1143273" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13057" ref_url="https://www.suse.com/security/cve/CVE-2019-13057/" source="CVE"/>
		<reference ref_id="CVE-2019-13565" ref_url="https://www.suse.com/security/cve/CVE-2019-13565/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005924.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

Security issues fixed:

- CVE-2019-13565: Fixed ssf memory reuse that leads to incorrect authorization of another connection, granting excess connection rights (ssf) (bsc#1143194).
- CVE-2019-13057: Fixed rootDN of a backend that may proxyauth incorrectly to another backend, violating multi-tenant isolation (bsc#1143273).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1143194">SUSE bug 1143194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143273">SUSE bug 1143273</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13057/">CVE-2019-13057</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13565/">CVE-2019-13565</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522153" comment="libldap-2_4-2-2.4.41-18.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522154" comment="libldap-2_4-2-32bit-2.4.41-18.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522155" comment="openldap2-client-2.4.41-18.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522156" comment="openldap2-doc-2.4.41-18.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78805" version="1" class="patch">
	<metadata>
		<title>Security update for libreoffice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1133534" ref_url="https://bugzilla.suse.com/1133534" source="BUGZILLA"/>
		<reference ref_id="1141861" ref_url="https://bugzilla.suse.com/1141861" source="BUGZILLA"/>
		<reference ref_id="1141862" ref_url="https://bugzilla.suse.com/1141862" source="BUGZILLA"/>
		<reference ref_id="1146098" ref_url="https://bugzilla.suse.com/1146098" source="BUGZILLA"/>
		<reference ref_id="1146105" ref_url="https://bugzilla.suse.com/1146105" source="BUGZILLA"/>
		<reference ref_id="1146107" ref_url="https://bugzilla.suse.com/1146107" source="BUGZILLA"/>
		<reference ref_id="1149943" ref_url="https://bugzilla.suse.com/1149943" source="BUGZILLA"/>
		<reference ref_id="1149944" ref_url="https://bugzilla.suse.com/1149944" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9848" ref_url="https://www.suse.com/security/cve/CVE-2019-9848/" source="CVE"/>
		<reference ref_id="CVE-2019-9849" ref_url="https://www.suse.com/security/cve/CVE-2019-9849/" source="CVE"/>
		<reference ref_id="CVE-2019-9850" ref_url="https://www.suse.com/security/cve/CVE-2019-9850/" source="CVE"/>
		<reference ref_id="CVE-2019-9851" ref_url="https://www.suse.com/security/cve/CVE-2019-9851/" source="CVE"/>
		<reference ref_id="CVE-2019-9852" ref_url="https://www.suse.com/security/cve/CVE-2019-9852/" source="CVE"/>
		<reference ref_id="CVE-2019-9854" ref_url="https://www.suse.com/security/cve/CVE-2019-9854/" source="CVE"/>
		<reference ref_id="CVE-2019-9855" ref_url="https://www.suse.com/security/cve/CVE-2019-9855/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005932.html" source="SUSE-SU"/>
		<description>
This update for libreoffice to version 6.2.7.1 fixes the following issues:

Security issues fixed:

- CVE-2019-9849: Disabled fetching remote bullet graphics in 'stealth mode' (bsc#1141861).
- CVE-2019-9848: Fixed an arbitrary script execution via LibreLogo (bsc#1141862).
- CVE-2019-9851: Fixed LibreLogo global-event script execution issue (bsc#1146105).
- CVE-2019-9852: Fixed insufficient URL encoding flaw in allowed script location check (bsc#1146107).
- CVE-2019-9850: Fixed insufficient URL validation that allowed LibreLogo script execution (bsc#1146098).
- CVE-2019-9854: Fixed unsafe URL assembly flaw (bsc#1149944).
- CVE-2019-9855: Fixed path equivalence handling flaw (bsc#1149943)

Non-security issue fixed:

- SmartArt: Basic rendering of Trapezoid List (bsc#1133534)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-18"/>
	<updated date="2019-09-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1133534">SUSE bug 1133534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141861">SUSE bug 1141861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141862">SUSE bug 1141862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146098">SUSE bug 1146098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146105">SUSE bug 1146105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146107">SUSE bug 1146107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149943">SUSE bug 1149943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149944">SUSE bug 1149944</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9848/">CVE-2019-9848</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9849/">CVE-2019-9849</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9850/">CVE-2019-9850</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9851/">CVE-2019-9851</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9852/">CVE-2019-9852</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9854/">CVE-2019-9854</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-9855/">CVE-2019-9855</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522157" comment="libreoffice-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522158" comment="libreoffice-base-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522159" comment="libreoffice-base-drivers-postgresql-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522160" comment="libreoffice-branding-upstream-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522161" comment="libreoffice-calc-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522162" comment="libreoffice-calc-extensions-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522163" comment="libreoffice-draw-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522164" comment="libreoffice-filters-optional-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522165" comment="libreoffice-gnome-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522166" comment="libreoffice-gtk2-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522167" comment="libreoffice-icon-themes-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522168" comment="libreoffice-impress-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522169" comment="libreoffice-l10n-af-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522170" comment="libreoffice-l10n-ar-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522171" comment="libreoffice-l10n-ca-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522172" comment="libreoffice-l10n-cs-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522173" comment="libreoffice-l10n-da-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522174" comment="libreoffice-l10n-de-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522175" comment="libreoffice-l10n-en-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522176" comment="libreoffice-l10n-es-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522177" comment="libreoffice-l10n-fi-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522178" comment="libreoffice-l10n-fr-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522179" comment="libreoffice-l10n-gu-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522180" comment="libreoffice-l10n-hi-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522181" comment="libreoffice-l10n-hu-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522182" comment="libreoffice-l10n-it-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522183" comment="libreoffice-l10n-ja-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522184" comment="libreoffice-l10n-ko-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522185" comment="libreoffice-l10n-nb-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522186" comment="libreoffice-l10n-nl-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522187" comment="libreoffice-l10n-nn-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522188" comment="libreoffice-l10n-pl-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522189" comment="libreoffice-l10n-pt_BR-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522190" comment="libreoffice-l10n-pt_PT-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522191" comment="libreoffice-l10n-ro-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522192" comment="libreoffice-l10n-ru-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522193" comment="libreoffice-l10n-sk-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522194" comment="libreoffice-l10n-sv-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522195" comment="libreoffice-l10n-xh-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522196" comment="libreoffice-l10n-zh_CN-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522197" comment="libreoffice-l10n-zh_TW-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522198" comment="libreoffice-l10n-zu-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522199" comment="libreoffice-mailmerge-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522200" comment="libreoffice-math-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522201" comment="libreoffice-officebean-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522202" comment="libreoffice-pyuno-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522203" comment="libreoffice-writer-6.2.7.1-43.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522204" comment="libreoffice-writer-extensions-6.2.7.1-43.56.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78806" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1122706" ref_url="https://bugzilla.suse.com/1122706" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3813" ref_url="https://www.suse.com/security/cve/CVE-2019-3813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005084.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

Security issue fixed:

- CVE-2019-3813: Fixed a out-of-bounds read in the memslot_get_virt function that could lead to denial-of-service or code-execution (bsc#1122706).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-05"/>
	<updated date="2019-02-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122706">SUSE bug 1122706</bugzilla>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3813/">CVE-2019-3813</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521596" comment="libspice-server1-0.12.8-12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78807" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1047238" ref_url="https://bugzilla.suse.com/1047238" source="BUGZILLA"/>
		<reference ref_id="1050911" ref_url="https://bugzilla.suse.com/1050911" source="BUGZILLA"/>
		<reference ref_id="1051510" ref_url="https://bugzilla.suse.com/1051510" source="BUGZILLA"/>
		<reference ref_id="1054914" ref_url="https://bugzilla.suse.com/1054914" source="BUGZILLA"/>
		<reference ref_id="1055117" ref_url="https://bugzilla.suse.com/1055117" source="BUGZILLA"/>
		<reference ref_id="1056686" ref_url="https://bugzilla.suse.com/1056686" source="BUGZILLA"/>
		<reference ref_id="1060662" ref_url="https://bugzilla.suse.com/1060662" source="BUGZILLA"/>
		<reference ref_id="1061840" ref_url="https://bugzilla.suse.com/1061840" source="BUGZILLA"/>
		<reference ref_id="1061843" ref_url="https://bugzilla.suse.com/1061843" source="BUGZILLA"/>
		<reference ref_id="1064597" ref_url="https://bugzilla.suse.com/1064597" source="BUGZILLA"/>
		<reference ref_id="1064701" ref_url="https://bugzilla.suse.com/1064701" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1066369" ref_url="https://bugzilla.suse.com/1066369" source="BUGZILLA"/>
		<reference ref_id="1071009" ref_url="https://bugzilla.suse.com/1071009" source="BUGZILLA"/>
		<reference ref_id="1071306" ref_url="https://bugzilla.suse.com/1071306" source="BUGZILLA"/>
		<reference ref_id="1078248" ref_url="https://bugzilla.suse.com/1078248" source="BUGZILLA"/>
		<reference ref_id="1082555" ref_url="https://bugzilla.suse.com/1082555" source="BUGZILLA"/>
		<reference ref_id="1085030" ref_url="https://bugzilla.suse.com/1085030" source="BUGZILLA"/>
		<reference ref_id="1085536" ref_url="https://bugzilla.suse.com/1085536" source="BUGZILLA"/>
		<reference ref_id="1085539" ref_url="https://bugzilla.suse.com/1085539" source="BUGZILLA"/>
		<reference ref_id="1086103" ref_url="https://bugzilla.suse.com/1086103" source="BUGZILLA"/>
		<reference ref_id="1087092" ref_url="https://bugzilla.suse.com/1087092" source="BUGZILLA"/>
		<reference ref_id="1090734" ref_url="https://bugzilla.suse.com/1090734" source="BUGZILLA"/>
		<reference ref_id="1091171" ref_url="https://bugzilla.suse.com/1091171" source="BUGZILLA"/>
		<reference ref_id="1093205" ref_url="https://bugzilla.suse.com/1093205" source="BUGZILLA"/>
		<reference ref_id="1102097" ref_url="https://bugzilla.suse.com/1102097" source="BUGZILLA"/>
		<reference ref_id="1104902" ref_url="https://bugzilla.suse.com/1104902" source="BUGZILLA"/>
		<reference ref_id="1106061" ref_url="https://bugzilla.suse.com/1106061" source="BUGZILLA"/>
		<reference ref_id="1106284" ref_url="https://bugzilla.suse.com/1106284" source="BUGZILLA"/>
		<reference ref_id="1106434" ref_url="https://bugzilla.suse.com/1106434" source="BUGZILLA"/>
		<reference ref_id="1108382" ref_url="https://bugzilla.suse.com/1108382" source="BUGZILLA"/>
		<reference ref_id="1112178" ref_url="https://bugzilla.suse.com/1112178" source="BUGZILLA"/>
		<reference ref_id="1112894" ref_url="https://bugzilla.suse.com/1112894" source="BUGZILLA"/>
		<reference ref_id="1112899" ref_url="https://bugzilla.suse.com/1112899" source="BUGZILLA"/>
		<reference ref_id="1112902" ref_url="https://bugzilla.suse.com/1112902" source="BUGZILLA"/>
		<reference ref_id="1112903" ref_url="https://bugzilla.suse.com/1112903" source="BUGZILLA"/>
		<reference ref_id="1112905" ref_url="https://bugzilla.suse.com/1112905" source="BUGZILLA"/>
		<reference ref_id="1112906" ref_url="https://bugzilla.suse.com/1112906" source="BUGZILLA"/>
		<reference ref_id="1112907" ref_url="https://bugzilla.suse.com/1112907" source="BUGZILLA"/>
		<reference ref_id="1113722" ref_url="https://bugzilla.suse.com/1113722" source="BUGZILLA"/>
		<reference ref_id="1114279" ref_url="https://bugzilla.suse.com/1114279" source="BUGZILLA"/>
		<reference ref_id="1114542" ref_url="https://bugzilla.suse.com/1114542" source="BUGZILLA"/>
		<reference ref_id="1118689" ref_url="https://bugzilla.suse.com/1118689" source="BUGZILLA"/>
		<reference ref_id="1119086" ref_url="https://bugzilla.suse.com/1119086" source="BUGZILLA"/>
		<reference ref_id="1120876" ref_url="https://bugzilla.suse.com/1120876" source="BUGZILLA"/>
		<reference ref_id="1120902" ref_url="https://bugzilla.suse.com/1120902" source="BUGZILLA"/>
		<reference ref_id="1120937" ref_url="https://bugzilla.suse.com/1120937" source="BUGZILLA"/>
		<reference ref_id="1123105" ref_url="https://bugzilla.suse.com/1123105" source="BUGZILLA"/>
		<reference ref_id="1123959" ref_url="https://bugzilla.suse.com/1123959" source="BUGZILLA"/>
		<reference ref_id="1124370" ref_url="https://bugzilla.suse.com/1124370" source="BUGZILLA"/>
		<reference ref_id="1129424" ref_url="https://bugzilla.suse.com/1129424" source="BUGZILLA"/>
		<reference ref_id="1129519" ref_url="https://bugzilla.suse.com/1129519" source="BUGZILLA"/>
		<reference ref_id="1129664" ref_url="https://bugzilla.suse.com/1129664" source="BUGZILLA"/>
		<reference ref_id="1131107" ref_url="https://bugzilla.suse.com/1131107" source="BUGZILLA"/>
		<reference ref_id="1131281" ref_url="https://bugzilla.suse.com/1131281" source="BUGZILLA"/>
		<reference ref_id="1131565" ref_url="https://bugzilla.suse.com/1131565" source="BUGZILLA"/>
		<reference ref_id="1133021" ref_url="https://bugzilla.suse.com/1133021" source="BUGZILLA"/>
		<reference ref_id="1134291" ref_url="https://bugzilla.suse.com/1134291" source="BUGZILLA"/>
		<reference ref_id="1134881" ref_url="https://bugzilla.suse.com/1134881" source="BUGZILLA"/>
		<reference ref_id="1134882" ref_url="https://bugzilla.suse.com/1134882" source="BUGZILLA"/>
		<reference ref_id="1135219" ref_url="https://bugzilla.suse.com/1135219" source="BUGZILLA"/>
		<reference ref_id="1135642" ref_url="https://bugzilla.suse.com/1135642" source="BUGZILLA"/>
		<reference ref_id="1135897" ref_url="https://bugzilla.suse.com/1135897" source="BUGZILLA"/>
		<reference ref_id="1136261" ref_url="https://bugzilla.suse.com/1136261" source="BUGZILLA"/>
		<reference ref_id="1137069" ref_url="https://bugzilla.suse.com/1137069" source="BUGZILLA"/>
		<reference ref_id="1137884" ref_url="https://bugzilla.suse.com/1137884" source="BUGZILLA"/>
		<reference ref_id="1138539" ref_url="https://bugzilla.suse.com/1138539" source="BUGZILLA"/>
		<reference ref_id="1139020" ref_url="https://bugzilla.suse.com/1139020" source="BUGZILLA"/>
		<reference ref_id="1139021" ref_url="https://bugzilla.suse.com/1139021" source="BUGZILLA"/>
		<reference ref_id="1139101" ref_url="https://bugzilla.suse.com/1139101" source="BUGZILLA"/>
		<reference ref_id="1139500" ref_url="https://bugzilla.suse.com/1139500" source="BUGZILLA"/>
		<reference ref_id="1140012" ref_url="https://bugzilla.suse.com/1140012" source="BUGZILLA"/>
		<reference ref_id="1140426" ref_url="https://bugzilla.suse.com/1140426" source="BUGZILLA"/>
		<reference ref_id="1140487" ref_url="https://bugzilla.suse.com/1140487" source="BUGZILLA"/>
		<reference ref_id="1141013" ref_url="https://bugzilla.suse.com/1141013" source="BUGZILLA"/>
		<reference ref_id="1141450" ref_url="https://bugzilla.suse.com/1141450" source="BUGZILLA"/>
		<reference ref_id="1141543" ref_url="https://bugzilla.suse.com/1141543" source="BUGZILLA"/>
		<reference ref_id="1141554" ref_url="https://bugzilla.suse.com/1141554" source="BUGZILLA"/>
		<reference ref_id="1142019" ref_url="https://bugzilla.suse.com/1142019" source="BUGZILLA"/>
		<reference ref_id="1142076" ref_url="https://bugzilla.suse.com/1142076" source="BUGZILLA"/>
		<reference ref_id="1142109" ref_url="https://bugzilla.suse.com/1142109" source="BUGZILLA"/>
		<reference ref_id="1142117" ref_url="https://bugzilla.suse.com/1142117" source="BUGZILLA"/>
		<reference ref_id="1142118" ref_url="https://bugzilla.suse.com/1142118" source="BUGZILLA"/>
		<reference ref_id="1142119" ref_url="https://bugzilla.suse.com/1142119" source="BUGZILLA"/>
		<reference ref_id="1142496" ref_url="https://bugzilla.suse.com/1142496" source="BUGZILLA"/>
		<reference ref_id="1142541" ref_url="https://bugzilla.suse.com/1142541" source="BUGZILLA"/>
		<reference ref_id="1142635" ref_url="https://bugzilla.suse.com/1142635" source="BUGZILLA"/>
		<reference ref_id="1142685" ref_url="https://bugzilla.suse.com/1142685" source="BUGZILLA"/>
		<reference ref_id="1142701" ref_url="https://bugzilla.suse.com/1142701" source="BUGZILLA"/>
		<reference ref_id="1142857" ref_url="https://bugzilla.suse.com/1142857" source="BUGZILLA"/>
		<reference ref_id="1143300" ref_url="https://bugzilla.suse.com/1143300" source="BUGZILLA"/>
		<reference ref_id="1143466" ref_url="https://bugzilla.suse.com/1143466" source="BUGZILLA"/>
		<reference ref_id="1143765" ref_url="https://bugzilla.suse.com/1143765" source="BUGZILLA"/>
		<reference ref_id="1143841" ref_url="https://bugzilla.suse.com/1143841" source="BUGZILLA"/>
		<reference ref_id="1143843" ref_url="https://bugzilla.suse.com/1143843" source="BUGZILLA"/>
		<reference ref_id="1144123" ref_url="https://bugzilla.suse.com/1144123" source="BUGZILLA"/>
		<reference ref_id="1144333" ref_url="https://bugzilla.suse.com/1144333" source="BUGZILLA"/>
		<reference ref_id="1144474" ref_url="https://bugzilla.suse.com/1144474" source="BUGZILLA"/>
		<reference ref_id="1144518" ref_url="https://bugzilla.suse.com/1144518" source="BUGZILLA"/>
		<reference ref_id="1144718" ref_url="https://bugzilla.suse.com/1144718" source="BUGZILLA"/>
		<reference ref_id="1144813" ref_url="https://bugzilla.suse.com/1144813" source="BUGZILLA"/>
		<reference ref_id="1144880" ref_url="https://bugzilla.suse.com/1144880" source="BUGZILLA"/>
		<reference ref_id="1144886" ref_url="https://bugzilla.suse.com/1144886" source="BUGZILLA"/>
		<reference ref_id="1144912" ref_url="https://bugzilla.suse.com/1144912" source="BUGZILLA"/>
		<reference ref_id="1144920" ref_url="https://bugzilla.suse.com/1144920" source="BUGZILLA"/>
		<reference ref_id="1144979" ref_url="https://bugzilla.suse.com/1144979" source="BUGZILLA"/>
		<reference ref_id="1145010" ref_url="https://bugzilla.suse.com/1145010" source="BUGZILLA"/>
		<reference ref_id="1145024" ref_url="https://bugzilla.suse.com/1145024" source="BUGZILLA"/>
		<reference ref_id="1145051" ref_url="https://bugzilla.suse.com/1145051" source="BUGZILLA"/>
		<reference ref_id="1145059" ref_url="https://bugzilla.suse.com/1145059" source="BUGZILLA"/>
		<reference ref_id="1145189" ref_url="https://bugzilla.suse.com/1145189" source="BUGZILLA"/>
		<reference ref_id="1145235" ref_url="https://bugzilla.suse.com/1145235" source="BUGZILLA"/>
		<reference ref_id="1145300" ref_url="https://bugzilla.suse.com/1145300" source="BUGZILLA"/>
		<reference ref_id="1145302" ref_url="https://bugzilla.suse.com/1145302" source="BUGZILLA"/>
		<reference ref_id="1145388" ref_url="https://bugzilla.suse.com/1145388" source="BUGZILLA"/>
		<reference ref_id="1145389" ref_url="https://bugzilla.suse.com/1145389" source="BUGZILLA"/>
		<reference ref_id="1145390" ref_url="https://bugzilla.suse.com/1145390" source="BUGZILLA"/>
		<reference ref_id="1145391" ref_url="https://bugzilla.suse.com/1145391" source="BUGZILLA"/>
		<reference ref_id="1145392" ref_url="https://bugzilla.suse.com/1145392" source="BUGZILLA"/>
		<reference ref_id="1145393" ref_url="https://bugzilla.suse.com/1145393" source="BUGZILLA"/>
		<reference ref_id="1145394" ref_url="https://bugzilla.suse.com/1145394" source="BUGZILLA"/>
		<reference ref_id="1145395" ref_url="https://bugzilla.suse.com/1145395" source="BUGZILLA"/>
		<reference ref_id="1145396" ref_url="https://bugzilla.suse.com/1145396" source="BUGZILLA"/>
		<reference ref_id="1145397" ref_url="https://bugzilla.suse.com/1145397" source="BUGZILLA"/>
		<reference ref_id="1145408" ref_url="https://bugzilla.suse.com/1145408" source="BUGZILLA"/>
		<reference ref_id="1145409" ref_url="https://bugzilla.suse.com/1145409" source="BUGZILLA"/>
		<reference ref_id="1145661" ref_url="https://bugzilla.suse.com/1145661" source="BUGZILLA"/>
		<reference ref_id="1145678" ref_url="https://bugzilla.suse.com/1145678" source="BUGZILLA"/>
		<reference ref_id="1145687" ref_url="https://bugzilla.suse.com/1145687" source="BUGZILLA"/>
		<reference ref_id="1145920" ref_url="https://bugzilla.suse.com/1145920" source="BUGZILLA"/>
		<reference ref_id="1145922" ref_url="https://bugzilla.suse.com/1145922" source="BUGZILLA"/>
		<reference ref_id="1145934" ref_url="https://bugzilla.suse.com/1145934" source="BUGZILLA"/>
		<reference ref_id="1145937" ref_url="https://bugzilla.suse.com/1145937" source="BUGZILLA"/>
		<reference ref_id="1145940" ref_url="https://bugzilla.suse.com/1145940" source="BUGZILLA"/>
		<reference ref_id="1145941" ref_url="https://bugzilla.suse.com/1145941" source="BUGZILLA"/>
		<reference ref_id="1145942" ref_url="https://bugzilla.suse.com/1145942" source="BUGZILLA"/>
		<reference ref_id="1146074" ref_url="https://bugzilla.suse.com/1146074" source="BUGZILLA"/>
		<reference ref_id="1146084" ref_url="https://bugzilla.suse.com/1146084" source="BUGZILLA"/>
		<reference ref_id="1146163" ref_url="https://bugzilla.suse.com/1146163" source="BUGZILLA"/>
		<reference ref_id="1146285" ref_url="https://bugzilla.suse.com/1146285" source="BUGZILLA"/>
		<reference ref_id="1146346" ref_url="https://bugzilla.suse.com/1146346" source="BUGZILLA"/>
		<reference ref_id="1146351" ref_url="https://bugzilla.suse.com/1146351" source="BUGZILLA"/>
		<reference ref_id="1146352" ref_url="https://bugzilla.suse.com/1146352" source="BUGZILLA"/>
		<reference ref_id="1146361" ref_url="https://bugzilla.suse.com/1146361" source="BUGZILLA"/>
		<reference ref_id="1146368" ref_url="https://bugzilla.suse.com/1146368" source="BUGZILLA"/>
		<reference ref_id="1146376" ref_url="https://bugzilla.suse.com/1146376" source="BUGZILLA"/>
		<reference ref_id="1146378" ref_url="https://bugzilla.suse.com/1146378" source="BUGZILLA"/>
		<reference ref_id="1146381" ref_url="https://bugzilla.suse.com/1146381" source="BUGZILLA"/>
		<reference ref_id="1146391" ref_url="https://bugzilla.suse.com/1146391" source="BUGZILLA"/>
		<reference ref_id="1146399" ref_url="https://bugzilla.suse.com/1146399" source="BUGZILLA"/>
		<reference ref_id="1146413" ref_url="https://bugzilla.suse.com/1146413" source="BUGZILLA"/>
		<reference ref_id="1146425" ref_url="https://bugzilla.suse.com/1146425" source="BUGZILLA"/>
		<reference ref_id="1146516" ref_url="https://bugzilla.suse.com/1146516" source="BUGZILLA"/>
		<reference ref_id="1146519" ref_url="https://bugzilla.suse.com/1146519" source="BUGZILLA"/>
		<reference ref_id="1146524" ref_url="https://bugzilla.suse.com/1146524" source="BUGZILLA"/>
		<reference ref_id="1146526" ref_url="https://bugzilla.suse.com/1146526" source="BUGZILLA"/>
		<reference ref_id="1146529" ref_url="https://bugzilla.suse.com/1146529" source="BUGZILLA"/>
		<reference ref_id="1146531" ref_url="https://bugzilla.suse.com/1146531" source="BUGZILLA"/>
		<reference ref_id="1146543" ref_url="https://bugzilla.suse.com/1146543" source="BUGZILLA"/>
		<reference ref_id="1146547" ref_url="https://bugzilla.suse.com/1146547" source="BUGZILLA"/>
		<reference ref_id="1146550" ref_url="https://bugzilla.suse.com/1146550" source="BUGZILLA"/>
		<reference ref_id="1146575" ref_url="https://bugzilla.suse.com/1146575" source="BUGZILLA"/>
		<reference ref_id="1146589" ref_url="https://bugzilla.suse.com/1146589" source="BUGZILLA"/>
		<reference ref_id="1146678" ref_url="https://bugzilla.suse.com/1146678" source="BUGZILLA"/>
		<reference ref_id="1146938" ref_url="https://bugzilla.suse.com/1146938" source="BUGZILLA"/>
		<reference ref_id="1148031" ref_url="https://bugzilla.suse.com/1148031" source="BUGZILLA"/>
		<reference ref_id="1148032" ref_url="https://bugzilla.suse.com/1148032" source="BUGZILLA"/>
		<reference ref_id="1148033" ref_url="https://bugzilla.suse.com/1148033" source="BUGZILLA"/>
		<reference ref_id="1148034" ref_url="https://bugzilla.suse.com/1148034" source="BUGZILLA"/>
		<reference ref_id="1148035" ref_url="https://bugzilla.suse.com/1148035" source="BUGZILLA"/>
		<reference ref_id="1148093" ref_url="https://bugzilla.suse.com/1148093" source="BUGZILLA"/>
		<reference ref_id="1148133" ref_url="https://bugzilla.suse.com/1148133" source="BUGZILLA"/>
		<reference ref_id="1148192" ref_url="https://bugzilla.suse.com/1148192" source="BUGZILLA"/>
		<reference ref_id="1148196" ref_url="https://bugzilla.suse.com/1148196" source="BUGZILLA"/>
		<reference ref_id="1148198" ref_url="https://bugzilla.suse.com/1148198" source="BUGZILLA"/>
		<reference ref_id="1148202" ref_url="https://bugzilla.suse.com/1148202" source="BUGZILLA"/>
		<reference ref_id="1148303" ref_url="https://bugzilla.suse.com/1148303" source="BUGZILLA"/>
		<reference ref_id="1148363" ref_url="https://bugzilla.suse.com/1148363" source="BUGZILLA"/>
		<reference ref_id="1148379" ref_url="https://bugzilla.suse.com/1148379" source="BUGZILLA"/>
		<reference ref_id="1148394" ref_url="https://bugzilla.suse.com/1148394" source="BUGZILLA"/>
		<reference ref_id="1148527" ref_url="https://bugzilla.suse.com/1148527" source="BUGZILLA"/>
		<reference ref_id="1148574" ref_url="https://bugzilla.suse.com/1148574" source="BUGZILLA"/>
		<reference ref_id="1148616" ref_url="https://bugzilla.suse.com/1148616" source="BUGZILLA"/>
		<reference ref_id="1148617" ref_url="https://bugzilla.suse.com/1148617" source="BUGZILLA"/>
		<reference ref_id="1148619" ref_url="https://bugzilla.suse.com/1148619" source="BUGZILLA"/>
		<reference ref_id="1148698" ref_url="https://bugzilla.suse.com/1148698" source="BUGZILLA"/>
		<reference ref_id="1148859" ref_url="https://bugzilla.suse.com/1148859" source="BUGZILLA"/>
		<reference ref_id="1148868" ref_url="https://bugzilla.suse.com/1148868" source="BUGZILLA"/>
		<reference ref_id="1149053" ref_url="https://bugzilla.suse.com/1149053" source="BUGZILLA"/>
		<reference ref_id="1149083" ref_url="https://bugzilla.suse.com/1149083" source="BUGZILLA"/>
		<reference ref_id="1149104" ref_url="https://bugzilla.suse.com/1149104" source="BUGZILLA"/>
		<reference ref_id="1149105" ref_url="https://bugzilla.suse.com/1149105" source="BUGZILLA"/>
		<reference ref_id="1149106" ref_url="https://bugzilla.suse.com/1149106" source="BUGZILLA"/>
		<reference ref_id="1149197" ref_url="https://bugzilla.suse.com/1149197" source="BUGZILLA"/>
		<reference ref_id="1149214" ref_url="https://bugzilla.suse.com/1149214" source="BUGZILLA"/>
		<reference ref_id="1149224" ref_url="https://bugzilla.suse.com/1149224" source="BUGZILLA"/>
		<reference ref_id="1149325" ref_url="https://bugzilla.suse.com/1149325" source="BUGZILLA"/>
		<reference ref_id="1149376" ref_url="https://bugzilla.suse.com/1149376" source="BUGZILLA"/>
		<reference ref_id="1149413" ref_url="https://bugzilla.suse.com/1149413" source="BUGZILLA"/>
		<reference ref_id="1149418" ref_url="https://bugzilla.suse.com/1149418" source="BUGZILLA"/>
		<reference ref_id="1149424" ref_url="https://bugzilla.suse.com/1149424" source="BUGZILLA"/>
		<reference ref_id="1149522" ref_url="https://bugzilla.suse.com/1149522" source="BUGZILLA"/>
		<reference ref_id="1149527" ref_url="https://bugzilla.suse.com/1149527" source="BUGZILLA"/>
		<reference ref_id="1149539" ref_url="https://bugzilla.suse.com/1149539" source="BUGZILLA"/>
		<reference ref_id="1149552" ref_url="https://bugzilla.suse.com/1149552" source="BUGZILLA"/>
		<reference ref_id="1149591" ref_url="https://bugzilla.suse.com/1149591" source="BUGZILLA"/>
		<reference ref_id="1149602" ref_url="https://bugzilla.suse.com/1149602" source="BUGZILLA"/>
		<reference ref_id="1149612" ref_url="https://bugzilla.suse.com/1149612" source="BUGZILLA"/>
		<reference ref_id="1149626" ref_url="https://bugzilla.suse.com/1149626" source="BUGZILLA"/>
		<reference ref_id="1149652" ref_url="https://bugzilla.suse.com/1149652" source="BUGZILLA"/>
		<reference ref_id="1149713" ref_url="https://bugzilla.suse.com/1149713" source="BUGZILLA"/>
		<reference ref_id="1149940" ref_url="https://bugzilla.suse.com/1149940" source="BUGZILLA"/>
		<reference ref_id="1149959" ref_url="https://bugzilla.suse.com/1149959" source="BUGZILLA"/>
		<reference ref_id="1149963" ref_url="https://bugzilla.suse.com/1149963" source="BUGZILLA"/>
		<reference ref_id="1149976" ref_url="https://bugzilla.suse.com/1149976" source="BUGZILLA"/>
		<reference ref_id="1150025" ref_url="https://bugzilla.suse.com/1150025" source="BUGZILLA"/>
		<reference ref_id="1150033" ref_url="https://bugzilla.suse.com/1150033" source="BUGZILLA"/>
		<reference ref_id="1150112" ref_url="https://bugzilla.suse.com/1150112" source="BUGZILLA"/>
		<reference ref_id="1150562" ref_url="https://bugzilla.suse.com/1150562" source="BUGZILLA"/>
		<reference ref_id="1150727" ref_url="https://bugzilla.suse.com/1150727" source="BUGZILLA"/>
		<reference ref_id="1150860" ref_url="https://bugzilla.suse.com/1150860" source="BUGZILLA"/>
		<reference ref_id="1150861" ref_url="https://bugzilla.suse.com/1150861" source="BUGZILLA"/>
		<reference ref_id="1150933" ref_url="https://bugzilla.suse.com/1150933" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18551" ref_url="https://www.suse.com/security/cve/CVE-2017-18551/" source="CVE"/>
		<reference ref_id="CVE-2018-20976" ref_url="https://www.suse.com/security/cve/CVE-2018-20976/" source="CVE"/>
		<reference ref_id="CVE-2018-21008" ref_url="https://www.suse.com/security/cve/CVE-2018-21008/" source="CVE"/>
		<reference ref_id="CVE-2019-10207" ref_url="https://www.suse.com/security/cve/CVE-2019-10207/" source="CVE"/>
		<reference ref_id="CVE-2019-14814" ref_url="https://www.suse.com/security/cve/CVE-2019-14814/" source="CVE"/>
		<reference ref_id="CVE-2019-14815" ref_url="https://www.suse.com/security/cve/CVE-2019-14815/" source="CVE"/>
		<reference ref_id="CVE-2019-14816" ref_url="https://www.suse.com/security/cve/CVE-2019-14816/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<reference ref_id="CVE-2019-15030" ref_url="https://www.suse.com/security/cve/CVE-2019-15030/" source="CVE"/>
		<reference ref_id="CVE-2019-15031" ref_url="https://www.suse.com/security/cve/CVE-2019-15031/" source="CVE"/>
		<reference ref_id="CVE-2019-15090" ref_url="https://www.suse.com/security/cve/CVE-2019-15090/" source="CVE"/>
		<reference ref_id="CVE-2019-15098" ref_url="https://www.suse.com/security/cve/CVE-2019-15098/" source="CVE"/>
		<reference ref_id="CVE-2019-15099" ref_url="https://www.suse.com/security/cve/CVE-2019-15099/" source="CVE"/>
		<reference ref_id="CVE-2019-15117" ref_url="https://www.suse.com/security/cve/CVE-2019-15117/" source="CVE"/>
		<reference ref_id="CVE-2019-15118" ref_url="https://www.suse.com/security/cve/CVE-2019-15118/" source="CVE"/>
		<reference ref_id="CVE-2019-15211" ref_url="https://www.suse.com/security/cve/CVE-2019-15211/" source="CVE"/>
		<reference ref_id="CVE-2019-15212" ref_url="https://www.suse.com/security/cve/CVE-2019-15212/" source="CVE"/>
		<reference ref_id="CVE-2019-15214" ref_url="https://www.suse.com/security/cve/CVE-2019-15214/" source="CVE"/>
		<reference ref_id="CVE-2019-15215" ref_url="https://www.suse.com/security/cve/CVE-2019-15215/" source="CVE"/>
		<reference ref_id="CVE-2019-15216" ref_url="https://www.suse.com/security/cve/CVE-2019-15216/" source="CVE"/>
		<reference ref_id="CVE-2019-15217" ref_url="https://www.suse.com/security/cve/CVE-2019-15217/" source="CVE"/>
		<reference ref_id="CVE-2019-15218" ref_url="https://www.suse.com/security/cve/CVE-2019-15218/" source="CVE"/>
		<reference ref_id="CVE-2019-15219" ref_url="https://www.suse.com/security/cve/CVE-2019-15219/" source="CVE"/>
		<reference ref_id="CVE-2019-15220" ref_url="https://www.suse.com/security/cve/CVE-2019-15220/" source="CVE"/>
		<reference ref_id="CVE-2019-15221" ref_url="https://www.suse.com/security/cve/CVE-2019-15221/" source="CVE"/>
		<reference ref_id="CVE-2019-15222" ref_url="https://www.suse.com/security/cve/CVE-2019-15222/" source="CVE"/>
		<reference ref_id="CVE-2019-15239" ref_url="https://www.suse.com/security/cve/CVE-2019-15239/" source="CVE"/>
		<reference ref_id="CVE-2019-15290" ref_url="https://www.suse.com/security/cve/CVE-2019-15290/" source="CVE"/>
		<reference ref_id="CVE-2019-15292" ref_url="https://www.suse.com/security/cve/CVE-2019-15292/" source="CVE"/>
		<reference ref_id="CVE-2019-15538" ref_url="https://www.suse.com/security/cve/CVE-2019-15538/" source="CVE"/>
		<reference ref_id="CVE-2019-15666" ref_url="https://www.suse.com/security/cve/CVE-2019-15666/" source="CVE"/>
		<reference ref_id="CVE-2019-15902" ref_url="https://www.suse.com/security/cve/CVE-2019-15902/" source="CVE"/>
		<reference ref_id="CVE-2019-15917" ref_url="https://www.suse.com/security/cve/CVE-2019-15917/" source="CVE"/>
		<reference ref_id="CVE-2019-15919" ref_url="https://www.suse.com/security/cve/CVE-2019-15919/" source="CVE"/>
		<reference ref_id="CVE-2019-15920" ref_url="https://www.suse.com/security/cve/CVE-2019-15920/" source="CVE"/>
		<reference ref_id="CVE-2019-15921" ref_url="https://www.suse.com/security/cve/CVE-2019-15921/" source="CVE"/>
		<reference ref_id="CVE-2019-15924" ref_url="https://www.suse.com/security/cve/CVE-2019-15924/" source="CVE"/>
		<reference ref_id="CVE-2019-15926" ref_url="https://www.suse.com/security/cve/CVE-2019-15926/" source="CVE"/>
		<reference ref_id="CVE-2019-15927" ref_url="https://www.suse.com/security/cve/CVE-2019-15927/" source="CVE"/>
		<reference ref_id="CVE-2019-9456" ref_url="https://www.suse.com/security/cve/CVE-2019-9456/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.

The following new features were implemented:

- jsc#SLE-4875: [CML] New device IDs for CML
- jsc#SLE-7294: Add cpufreq driver for Raspberry Pi
- fate#322438: Integrate P9 XIVE support (on PowerVM only)
- fate#322447: Add memory protection keys (MPK) support on POWER (on PowerVM only)
- fate#322448, fate#321438: P9 hardware counter (performance counters) support (on PowerVM only)
- fate#325306, fate#321840: Reduce memory required to boot capture kernel while using fadump
- fate#326869: perf: pmu mem_load/store event support

The following security bugs were fixed:

- CVE-2017-18551: There was an out of bounds write in the function i2c_smbus_xfer_emulated. (bsc#1146163).
- CVE-2018-20976: A use after free existed, related to xfs_fs_fill_super failure. (bsc#1146285)
- CVE-2018-21008: A use-after-free can be caused by the function rsi_mac80211_detach (bsc#1149591).
- CVE-2019-9456: In Pixel C USB monitor driver there was a possible OOB write due to a missing bounds check. This could have lead to local escalation of privilege with System execution privileges needed. (bsc#1150025 CVE-2019-9456).
- CVE-2019-10207: Fix a NULL pointer dereference in hci_uart bluetooth driver (bsc#1142857 bsc#1123959).
- CVE-2019-14814, CVE-2019-14815, CVE-2019-14816: Fix three heap-based buffer overflows in marvell wifi chip driver kernel, that allowed local users to cause a denial of service (system crash) or possibly execute arbitrary code. (bnc#1146516)
- CVE-2019-14835: Fix QEMU-KVM Guest to Host Kernel Escape. (bsc#1150112).
- CVE-2019-15030, CVE-2019-15031: On the powerpc platform, a local user could read vector registers of other users' processes via an interrupt. (bsc#1149713)
- CVE-2019-15090: In the qedi_dbg_* family of functions, there was an out-of-bounds read. (bsc#1146399)
- CVE-2019-15098: USB driver net/wireless/ath/ath6kl/usb.c had a NULL pointer dereference via an incomplete address in an endpoint descriptor. (bsc#1146378).
- CVE-2019-15099: drivers/net/wireless/ath/ath10k/usb.c had a NULL pointer dereference via an incomplete address in an endpoint descriptor. (bsc#1146368)
- CVE-2019-15117: parse_audio_mixer_unit in sound/usb/mixer.c in the Linux kernel mishandled a short descriptor, leading to out-of-bounds memory access. (bsc#1145920).
- CVE-2019-15118: check_input_term in sound/usb/mixer.c in the Linux kernel mishandled recursion, leading to kernel stack exhaustion. (bsc#1145922).
- CVE-2019-15211: There was a use-after-free caused by a malicious USB device in the drivers/media/v4l2-core/v4l2-dev.c driver because drivers/media/radio/radio-raremono.c did not properly allocate memory. (bsc#1146519).
- CVE-2019-15212: There was a double-free caused by a malicious USB device in the drivers/usb/misc/rio500.c driver. (bsc#1051510 bsc#1146391).
- CVE-2019-15214: There was a use-after-free in the sound subsystem because card disconnection causes certain data structures to be deleted too early. (bsc#1146550)
- CVE-2019-15215: There was a use-after-free caused by a malicious USB device in the drivers/media/usb/cpia2/cpia2_usb.c driver. (bsc#1135642 bsc#1146425)
- CVE-2019-15216: Fix a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/yurex.c driver. (bsc#1146361).
- CVE-2019-15217: There was a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/zr364xx/zr364xx.c driver. (bsc#1146547).
- CVE-2019-15218: There was a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/siano/smsusb.c driver. (bsc#1051510 bsc#1146413)
- CVE-2019-15219: There was a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/sisusbvga/sisusb.c driver. (bsc#1146524)
- CVE-2019-15220: There was a use-after-free caused by a malicious USB device in the drivers/net/wireless/intersil/p54/p54usb.c driver. (bsc#1146526)
- CVE-2019-15221, CVE-2019-15222: There was a NULL pointer dereference caused by a malicious USB device in the sound/usb/line6/pcm.c driver. (bsc#1146529, bsc#1146531)
- CVE-2019-15239: An incorrect backport of a certain net/ipv4/tcp_output.c fix allowed a local attacker to trigger multiple use-after-free conditions. This could result in a kernel crash, or potentially in privilege escalation. (bsc#1146589)
- CVE-2019-15290: There was a NULL pointer dereference caused by a malicious USB device in the ath6kl_usb_alloc_urb_from_pipe function (bsc#1146543).
- CVE-2019-15292: There was a use-after-free in atalk_proc_exit (bsc#1146678)
- CVE-2019-15538: XFS partially wedged when a chgrp failed on account of being out of disk quota. This was primarily a local DoS attack vector, but it could result as well in remote DoS if the XFS filesystem was exported for instance via NFS. (bsc#1148032, bsc#1148093)
- CVE-2019-15666: There was an out-of-bounds array access in __xfrm_policy_unlink, which would cause denial of service, because verify_newpolicy_info mishandled directory validation. (bsc#1148394).
- CVE-2019-15902: A backporting error reintroduced the Spectre vulnerability that it aimed to eliminate. (bnc#1149376)
- CVE-2019-15917: There was a use-after-free issue when hci_uart_register_dev() failed in hci_uart_set_proto() (bsc#1149539)
- CVE-2019-15919: SMB2_write in fs/cifs/smb2pdu.c had a use-after-free. (bsc#1149552)
- CVE-2019-15920: SMB2_read in fs/cifs/smb2pdu.c had a use-after-free. (bsc#1149626)
- CVE-2019-15921: There was a memory leak issue when idr_alloc() failed (bsc#1149602)
- CVE-2019-15924: Fix a NULL pointer dereference because there was no -ENOMEM upon an alloc_workqueue failure. (bsc#1149612).
- CVE-2019-15926: Out of bounds access existed in the functions ath6kl_wmi_pstream_timeout_event_rx and ath6kl_wmi_cac_event_rx (bsc#1149527)
- CVE-2019-15927: An out-of-bounds access existed in the function build_audio_procunit (bsc#1149522)

The following non-security bugs were fixed:

- 9p/rdma: do not disconnect on down_interruptible EAGAIN (bsc#1051510).
- 9p/rdma: remove useless check in cm_event_handler (bsc#1051510).
- 9p/virtio: Add cleanup path in p9_virtio_init (bsc#1051510).
- 9p/xen: Add cleanup path in p9_trans_xen_init (bsc#1051510).
- 9p/xen: fix check for xenbus_read error in front_probe (bsc#1051510).
- 9p: acl: fix uninitialized iattr access (bsc#1051510).
- 9p: p9dirent_read: check network-provided name length (bsc#1051510).
- 9p: pass the correct prototype to read_cache_page (bsc#1051510).
- acpi/arm64: ignore 5.1 FADTs that are reported as 5.0 (bsc#1051510).
- acpi/iort: Fix off-by-one check in iort_dev_find_its_id() (bsc#1051510).
- acpi: PM: Fix regression in acpi_device_set_power() (bsc#1051510).
- acpi: fix false-positive -Wuninitialized warning (bsc#1051510).
- acpica: Increase total number of possible Owner IDs (bsc#1148859).
- acpica: Increase total number of possible Owner IDs (bsc#1148859).
- add some missing definitions (bsc#1144333).
- address lock imbalance warnings in smbdirect.c (bsc#1144333).
- af_key: fix leaks in key_pol_get_resp and dump_sp (bsc#1051510).
- af_packet: Block execution of tasks waiting for transmit to complete in AF_PACKET (networking-stable-19_07_02).
- alsa: firewire: fix a memory leak bug (bsc#1051510).
- alsa: hda - Add a generic reboot_notify (bsc#1051510).
- alsa: hda - Apply workaround for another AMD chip 1022:1487 (bsc#1051510).
- alsa: hda - Do not override global PCM hw info flag (bsc#1051510).
- alsa: hda - Fix a memory leak bug (bsc#1051510).
- alsa: hda - Fix potential endless loop at applying quirks (bsc#1051510).
- alsa: hda - Let all conexant codec enter D3 when rebooting (bsc#1051510).
- alsa: hda - Workaround for crackled sound on AMD controller (1022:1457) (bsc#1051510).
- alsa: hda/realtek - Fix overridden device-specific initialization (bsc#1051510).
- alsa: hda/realtek - Fix the problem of two front mics on a ThinkCentre (bsc#1051510).
- alsa: hda: kabi workaround for generic parser flag (bsc#1051510).
- alsa: hiface: fix multiple memory leak bugs (bsc#1051510).
- alsa: line6: Fix memory leak at line6_init_pcm() error path (bsc#1051510).
- alsa: pcm: fix lost wakeup event scenarios in snd_pcm_drain (bsc#1051510).
- alsa: seq: Fix potential concurrent access to the deleted pool (bsc#1051510).
- alsa: usb-audio: Fix gpf in snd_usb_pipe_sanity_check (bsc#1051510).
- arm64: KVM: Fix architecturally invalid reset value for FPEXC32_EL2 (bsc#1133021).
- arm: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling (bsc#1133021).
- arm: KVM: report support for SMCCC_ARCH_WORKAROUND_1 (bsc#1133021).
- asoc: Fail card instantiation if DAI format setup fails (bsc#1051510).
- asoc: dapm: Fix handling of custom_stop_condition on DAPM graph walks (bsc#1051510).
- ata: libahci: do not complain in case of deferred probe (bsc#1051510).
- batman-adv: Only read OGM tvlv_len after buffer len check (bsc#1051510).
- batman-adv: Only read OGM2 tvlv_len after buffer len check (bsc#1051510).
- batman-adv: fix uninit-value in batadv_netlink_get_ifindex() (bsc#1051510).
- bcache: fix possible memory leak in bch_cached_dev_run() (git fixes).
- bio: fix improper use of smp_mb__before_atomic() (git fixes).
- blk-mq: Fix spelling in a source code comment (git fixes).
- blk-mq: backport fixes for blk_mq_complete_e_request_sync() (bsc#1145661).
- blk-mq: introduce blk_mq_complete_request_sync() (bsc#1145661).
- blk-wbt: Avoid lock contention and thundering herd issue in wbt_wait (bsc#1141543).
- blk-wbt: Avoid lock contention and thundering herd issue in wbt_wait (bsc#1141543).
- block, documentation: Fix wbt_lat_usec documentation (git fixes).
- bluetooth: 6lowpan: search for destination address in all peers (bsc#1051510).
- bluetooth: Add SMP workaround Microsoft Surface Precision Mouse bug (bsc#1051510).
- bluetooth: Check state in l2cap_disconnect_rsp (bsc#1051510).
- bluetooth: btqca: Add a short delay before downloading the NVM (bsc#1051510).
- bluetooth: hci_bcsp: Fix memory leak in rx_skb (bsc#1051510).
- bluetooth: revert 'validate BLE connection interval updates' (bsc#1051510).
- bluetooth: validate BLE connection interval updates (bsc#1051510).
- bnx2x: Prevent ptp_task to be rescheduled indefinitely (networking-stable-19_07_25).
- bonding/802.3ad: fix link_failure_count tracking (bsc#1137069 bsc#1141013).
- bonding/802.3ad: fix slave link initialization transition states (bsc#1137069 bsc#1141013).
- bonding: Always enable vlan tx offload (networking-stable-19_07_02).
- bonding: set default miimon value for non-arp modes if not set (bsc#1137069 bsc#1141013).
- bonding: speed/duplex update at NETDEV_UP event (bsc#1137069 bsc#1141013).
- bonding: validate ip header before check IPPROTO_IGMP (networking-stable-19_07_25).
- btrfs: Fix delalloc inodes invalidation during transaction abort (bsc#1050911).
- btrfs: Split btrfs_del_delalloc_inode into 2 functions (bsc#1050911).
- btrfs: add a helper to retrive extent inline ref type (bsc#1149325).
- btrfs: add cleanup_ref_head_accounting helper (bsc#1050911).
- btrfs: add missing inode version, ctime and mtime updates when punching hole (bsc#1140487).
- btrfs: add one more sanity check for shared ref type (bsc#1149325).
- btrfs: clean up pending block groups when transaction commit aborts (bsc#1050911).
- btrfs: convert to use btrfs_get_extent_inline_ref_type (bsc#1149325).
- btrfs: do not abort transaction at btrfs_update_root() after failure to COW path (bsc#1150933).
- btrfs: fix assertion failure during fsync and use of stale transaction (bsc#1150562).
- btrfs: fix data loss after inode eviction, renaming it, and fsync it (bsc#1145941).
- btrfs: fix fsync not persisting dentry deletions due to inode evictions (bsc#1145942).
- btrfs: fix incremental send failure after deduplication (bsc#1145940).
- btrfs: fix pinned underflow after transaction aborted (bsc#1050911).
- btrfs: fix race between send and deduplication that lead to failures and crashes (bsc#1145059).
- btrfs: fix race leading to fs corruption after transaction abort (bsc#1145937).
- btrfs: handle delayed ref head accounting cleanup in abort (bsc#1050911).
- btrfs: prevent send failures and crashes due to concurrent relocation (bsc#1145059).
- btrfs: remove BUG() in add_data_reference (bsc#1149325).
- btrfs: remove BUG() in btrfs_extent_inline_ref_size (bsc#1149325).
- btrfs: remove BUG() in print_extent_item (bsc#1149325).
- btrfs: remove BUG_ON in __add_tree_block (bsc#1149325).
- btrfs: scrub: add memalloc_nofs protection around init_ipath (bsc#1086103).
- btrfs: start readahead also in seed devices (bsc#1144886).
- btrfs: track running balance in a simpler way (bsc#1145059).
- btrfs: use GFP_KERNEL in init_ipath (bsc#1086103).
- caif-hsi: fix possible deadlock in cfhsi_exit_module() (networking-stable-19_07_25).
- can: m_can: implement errata 'Needless activation of MRAF irq' (bsc#1051510).
- can: mcp251x: add support for mcp25625 (bsc#1051510).
- can: peak_usb: fix potential double kfree_skb() (bsc#1051510).
- can: peak_usb: force the string buffer NULL-terminated (bsc#1051510).
- can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices (bsc#1051510).
- can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices (bsc#1051510).
- can: rcar_canfd: fix possible IRQ storm on high load (bsc#1051510).
- can: sja1000: force the string buffer NULL-terminated (bsc#1051510).
- carl9170: fix misuse of device driver API (bsc#1142635).
- ceph: always get rstat from auth mds (bsc#1146346).
- ceph: clean up ceph.dir.pin vxattr name sizeof() (bsc#1146346).
- ceph: decode feature bits in session message (bsc#1146346).
- ceph: do not blindly unregister session that is in opening state (bsc#1148133).
- ceph: do not try fill file_lock on unsuccessful GETFILELOCK reply (bsc#1148133).
- ceph: fix 'ceph.dir.rctime' vxattr value (bsc#1148133 bsc#1135219).
- ceph: fix buffer free while holding i_ceph_lock in __ceph_build_xattrs_blob() (bsc#1148133).
- ceph: fix buffer free while holding i_ceph_lock in __ceph_setxattr() (bsc#1148133).
- ceph: fix buffer free while holding i_ceph_lock in fill_inode() (bsc#1148133).
- ceph: fix improper use of smp_mb__before_atomic() (bsc#1148133).
- ceph: fix iov_iter issues in ceph_direct_read_write() (bsc#1141450).
- ceph: hold i_ceph_lock when removing caps for freeing inode (bsc#1148133).
- ceph: remove request from waiting list before unregister (bsc#1148133).
- ceph: silence a checker warning in mdsc_show() (bsc#1148133).
- ceph: support cephfs' own feature bits (bsc#1146346).
- ceph: support getting ceph.dir.pin vxattr (bsc#1146346).
- ceph: support versioned reply (bsc#1146346).
- ceph: use bit flags to define vxattr attributes (bsc#1146346).
- cfg80211: revert 'fix processing world regdomain when non modular' (bsc#1051510).
- cifs: Accept validate negotiate if server return NT_STATUS_NOT_SUPPORTED (bsc#1144333).
- cifs: Add DFS cache routines (bsc#1144333).
- cifs: Add direct I/O functions to file_operations (bsc#1144333).
- cifs: Add minor debug message during negprot (bsc#1144333).
- cifs: Add smb2_send_recv (bsc#1144333).
- cifs: Add support for FSCTL passthrough that write data to the server (bsc#1144333).
- cifs: Add support for direct I/O read (bsc#1144333).
- cifs: Add support for direct I/O write (bsc#1144333).
- cifs: Add support for direct pages in rdata (bsc#1144333).
- cifs: Add support for direct pages in wdata (bsc#1144333).
- cifs: Add support for failover in cifs_mount() (bsc#1144333).
- cifs: Add support for failover in cifs_reconnect() (bsc#1144333).
- cifs: Add support for failover in cifs_reconnect_tcon() (bsc#1144333).
- cifs: Add support for failover in smb2_reconnect() (bsc#1144333).
- cifs: Add support for reading attributes on SMB2+ (bsc#1051510, bsc#1144333).
- cifs: Add support for writing attributes on SMB2+ (bsc#1051510, bsc#1144333).
- cifs: Adds information-level logging function (bsc#1144333).
- cifs: Adjust MTU credits before reopening a file (bsc#1144333).
- cifs: Allocate memory for all iovs in smb2_ioctl (bsc#1144333).
- cifs: Allocate validate negotiation request through kmalloc (bsc#1144333).
- cifs: Always reset read error to -EIO if no response (bsc#1144333).
- cifs: Always resolve hostname before reconnecting (bsc#1051510, bsc#1144333).
- cifs: Avoid returning EBUSY to upper layer VFS (bsc#1144333).
- cifs: Calculate the correct request length based on page offset and tail size (bsc#1144333).
- cifs: Call MID callback before destroying transport (bsc#1144333).
- cifs: Change SMB2_open to return an iov for the error parameter (bsc#1144333).
- cifs: Check for reconnects before sending async requests (bsc#1144333).
- cifs: Check for reconnects before sending compound requests (bsc#1144333).
- cifs: Check for timeout on Negotiate stage (bsc#1091171, bsc#1144333).
- cifs: Count SMB3 credits for malformed pending responses (bsc#1144333).
- cifs: Display SMB2 error codes in the hex format (bsc#1144333).
- cifs: Do not assume one credit for async responses (bsc#1144333).
- cifs: Do not consider -ENODATA as stat failure for reads (bsc#1144333).
- cifs: Do not count -ENODATA as failure for query directory (bsc#1051510, bsc#1144333).
- cifs: Do not hide EINTR after sending network packets (bsc#1051510, bsc#1144333).
- cifs: Do not log credits when unmounting a share (bsc#1144333).
- cifs: Do not match port on SMBDirect transport (bsc#1144333).
- cifs: Do not modify mid entry after submitting I/O in cifs_call_async (bsc#1051510, bsc#1144333).
- cifs: Do not reconnect TCP session in add_credits() (bsc#1051510, bsc#1144333).
- cifs: Do not reset lease state to NONE on lease break (bsc#1051510, bsc#1144333).
- cifs: Do not set credits to 1 if the server didn't grant anything (bsc#1144333).
- cifs: Do not skip SMB2 message IDs on send failures (bsc#1144333).
- cifs: Find and reopen a file before get MTU credits in writepages (bsc#1144333).
- cifs: Fix DFS cache refresher for DFS links (bsc#1144333).
- cifs: Fix NULL pointer deref on SMB2_tcon() failure (bsc#1071009, bsc#1144333).
- cifs: Fix NULL pointer dereference of devname (bnc#1129519).
- cifs: Fix NULL ptr deref (bsc#1144333).
- cifs: Fix a debug message (bsc#1144333).
- cifs: Fix a race condition with cifs_echo_request (bsc#1144333).
- cifs: Fix a tiny potential memory leak (bsc#1144333).
- cifs: Fix adjustment of credits for MTU requests (bsc#1051510, bsc#1144333).
- cifs: Fix an issue with re-sending rdata when transport returning -EAGAIN (bsc#1144333).
- cifs: Fix an issue with re-sending wdata when transport returning -EAGAIN (bsc#1144333).
- cifs: Fix autonegotiate security settings mismatch (bsc#1087092, bsc#1144333).
- cifs: Fix check for matching with existing mount (bsc#1144333).
- cifs: Fix credit calculation for encrypted reads with errors (bsc#1051510, bsc#1144333).
- cifs: Fix credit calculations in compound mid callback (bsc#1144333).
- cifs: Fix credit computation for compounded requests (bsc#1144333).
- cifs: Fix credits calculation for cancelled requests (bsc#1144333).
- cifs: Fix credits calculations for reads with errors (bsc#1051510, bsc#1144333).
- cifs: Fix encryption/signing (bsc#1144333).
- cifs: Fix error mapping for SMB2_LOCK command which caused OFD lock problem (bsc#1051510, bsc#1144333).
- cifs: Fix error paths in writeback code (bsc#1144333).
- cifs: Fix infinite loop when using hard mount option (bsc#1091171, bsc#1144333).
- cifs: Fix invalid check in __cifs_calc_signature() (bsc#1144333).
- cifs: Fix kernel oops when traceSMB is enabled (bsc#1144333).
- cifs: Fix leaking locked VFS cache pages in writeback retry (bsc#1144333).
- cifs: Fix lease buffer length error (bsc#1144333).
- cifs: Fix memory leak in smb2_set_ea() (bsc#1051510, bsc#1144333).
- cifs: Fix missing put_xid in cifs_file_strict_mmap (bsc#1087092, bsc#1144333).
- cifs: Fix module dependency (bsc#1144333).
- cifs: Fix mounts if the client is low on credits (bsc#1144333).
- cifs: Fix possible hang during async MTU reads and writes (bsc#1051510, bsc#1144333).
- cifs: Fix possible oops and memory leaks in async IO (bsc#1144333).
- cifs: Fix potential OOB access of lock element array (bsc#1051510, bsc#1144333).
- cifs: Fix read after write for files with read caching (bsc#1051510, bsc#1144333).
- cifs: Fix separator when building path from dentry (bsc#1051510, bsc#1144333).
- cifs: Fix signing for SMB2/3 (bsc#1144333).
- cifs: Fix slab-out-of-bounds in send_set_info() on SMB2 ACE setting (bsc#1144333).
- cifs: Fix slab-out-of-bounds when tracing SMB tcon (bsc#1144333).
- cifs: Fix stack out-of-bounds in smb{2,3}_create_lease_buf() (bsc#1051510, bsc#1144333).
- cifs: Fix to use kmem_cache_free() instead of kfree() (bsc#1144333).
- cifs: Fix trace command logging for SMB2 reads and writes (bsc#1144333).
- cifs: Fix use after free of a mid_q_entry (bsc#1112903, bsc#1144333).
- cifs: Fix use-after-free in SMB2_read (bsc#1144333).
- cifs: Fix use-after-free in SMB2_write (bsc#1144333).
- cifs: Fix validation of signed data in smb2 (bsc#1144333).
- cifs: Fix validation of signed data in smb3+ (bsc#1144333).
- cifs: For SMB2 security informaion query, check for minimum sized security descriptor instead of sizeof FileAllInformation class (bsc#1051510, bsc#1144333).
- cifs: In Kconfig CONFIG_CIFS_POSIX needs depends on legacy (insecure cifs) (bsc#1144333).
- cifs: Introduce helper function to get page offset and length in smb_rqst (bsc#1144333).
- cifs: Introduce offset for the 1st page in data transfer structures (bsc#1144333).
- cifs: Limit memory used by lock request calls to a page (bsc#1144333).
- cifs: Make devname param optional in cifs_compose_mount_options() (bsc#1144333).
- cifs: Make sure all data pages are signed correctly (bsc#1144333).
- cifs: Make use of DFS cache to get new DFS referrals (bsc#1144333).
- cifs: Mask off signals when sending SMB packets (bsc#1144333).
- cifs: Minor Kconfig clarification (bsc#1144333).
- cifs: Move credit processing to mid callbacks for SMB3 (bsc#1144333).
- cifs: Move open file handling to writepages (bsc#1144333).
- cifs: Move unlocking pages from wdata_send_pages() (bsc#1144333).
- cifs: OFD locks do not conflict with eachothers (bsc#1051510, bsc#1144333).
- cifs: Only free DFS target list if we actually got one (bsc#1144333).
- cifs: Only send SMB2_NEGOTIATE command on new TCP connections (bsc#1144333).
- cifs: Pass page offset for calculating signature (bsc#1144333).
- cifs: Pass page offset for encrypting (bsc#1144333).
- cifs: Print message when attempting a mount (bsc#1144333).
- cifs: Properly handle auto disabling of serverino option (bsc#1144333).
- cifs: Reconnect expired SMB sessions (bnc#1060662).
- cifs: Refactor out cifs_mount() (bsc#1144333).
- cifs: Remove custom credit adjustments for SMB2 async IO (bsc#1144333).
- cifs: Reopen file before get SMB2 MTU credits for async IO (bsc#1144333).
- cifs: Respect SMB2 hdr preamble size in read responses (bsc#1144333).
- cifs: Respect reconnect in MTU credits calculations (bsc#1144333).
- cifs: Respect reconnect in non-MTU credits calculations (bsc#1144333).
- cifs: Return -EAGAIN instead of -ENOTSOCK (bsc#1144333).
- cifs: Return error code when getting file handle for writeback (bsc#1144333).
- cifs: SMBD: Add SMB Direct debug counters (bsc#1144333).
- cifs: SMBD: Add SMB Direct protocol initial values and constants (bsc#1144333).
- cifs: SMBD: Add parameter rdata to smb2_new_read_req (bsc#1144333).
- cifs: SMBD: Add rdma mount option (bsc#1144333).
- cifs: SMBD: Disable signing on SMB direct transport (bsc#1144333).
- cifs: SMBD: Do not call ib_dereg_mr on invalidated memory registration (bsc#1144333).
- cifs: SMBD: Establish SMB Direct connection (bsc#1144333).
- cifs: SMBD: Fix the definition for SMB2_CHANNEL_RDMA_V1_INVALIDATE (bsc#1144333).
- cifs: SMBD: Implement RDMA memory registration (bsc#1144333).
- cifs: SMBD: Implement function to create a SMB Direct connection (bsc#1144333).
- cifs: SMBD: Implement function to destroy a SMB Direct connection (bsc#1144333).
- cifs: SMBD: Implement function to receive data via RDMA receive (bsc#1144333).
- cifs: SMBD: Implement function to reconnect to a SMB Direct transport (bsc#1144333).
- cifs: SMBD: Implement function to send data via RDMA send (bsc#1144333).
- cifs: SMBD: Read correct returned data length for RDMA write (SMB read) I/O (bsc#1144333).
- cifs: SMBD: Set SMB Direct maximum read or write size for I/O (bsc#1144333).
- cifs: SMBD: Support page offset in RDMA recv (bsc#1144333).
- cifs: SMBD: Support page offset in RDMA send (bsc#1144333).
- cifs: SMBD: Support page offset in memory registration (bsc#1144333).
- cifs: SMBD: Upper layer connects to SMBDirect session (bsc#1144333).
- cifs: SMBD: Upper layer destroys SMB Direct session on shutdown or umount (bsc#1144333).
- cifs: SMBD: Upper layer performs SMB read via RDMA write through memory registration (bsc#1144333).
- cifs: SMBD: Upper layer performs SMB write via RDMA read through memory registration (bsc#1144333).
- cifs: SMBD: Upper layer receives data via RDMA receive (bsc#1144333).
- cifs: SMBD: Upper layer reconnects to SMB Direct session (bsc#1144333).
- cifs: SMBD: Upper layer sends data via RDMA send (bsc#1144333).
- cifs: SMBD: _smbd_get_connection() can be static (bsc#1144333).
- cifs: SMBD: export protocol initial values (bsc#1144333).
- cifs: SMBD: fix spelling mistake: faield and legnth (bsc#1144333).
- cifs: SMBD: work around gcc -Wmaybe-uninitialized warning (bsc#1144333).
- cifs: Save TTL value when parsing DFS referrals (bsc#1144333).
- cifs: Select all required crypto modules (bsc#1085536, bsc#1144333).
- cifs: Set reconnect instance to one initially (bsc#1144333).
- cifs: Show locallease in /proc/mounts for cifs shares mounted with locallease feature (bsc#1144333).
- cifs: Silence uninitialized variable warning (bsc#1144333).
- cifs: Skip any trailing backslashes from UNC (bsc#1144333).
- cifs: Try to acquire credits at once for compound requests (bsc#1144333).
- cifs: Use GFP_ATOMIC when a lock is held in cifs_mount() (bsc#1144333).
- cifs: Use ULL suffix for 64-bit constant (bsc#1051510, bsc#1144333).
- cifs: Use correct packet length in SMB2_TRANSFORM header (bsc#1144333).
- cifs: Use kmemdup in SMB2_ioctl_init() (bsc#1144333).
- cifs: Use kmemdup rather than duplicating its implementation in smb311_posix_mkdir() (bsc#1144333).
- cifs: Use kzfree() to free password (bsc#1144333).
- cifs: Use offset when reading pages (bsc#1144333).
- cifs: Use smb 2 - 3 and cifsacl mount options getacl functions (bsc#1051510, bsc#1144333).
- cifs: Use smb 2 - 3 and cifsacl mount options setacl function (bsc#1051510, bsc#1144333).
- cifs: When sending data on socket, pass the correct page offset (bsc#1144333).
- cifs: a smb2_validate_and_copy_iov failure does not mean the handle is invalid (bsc#1144333).
- cifs: add .splice_write (bsc#1144333).
- cifs: add IOCTL for QUERY_INFO passthrough to userspace (bsc#1144333).
- cifs: add ONCE flag for cifs_dbg type (bsc#1144333).
- cifs: add SFM mapping for 0x01-0x1F (bsc#1144333).
- cifs: add SMB2_close_init()/SMB2_close_free() (bsc#1144333).
- cifs: add SMB2_ioctl_init/free helpers to be used with compounding (bsc#1144333).
- cifs: add SMB2_query_info_[init|free]() (bsc#1144333).
- cifs: add a new SMB2_close_flags function (bsc#1144333).
- cifs: add a smb2_compound_op and change QUERY_INFO to use it (bsc#1144333).
- cifs: add a timeout argument to wait_for_free_credits (bsc#1144333).
- cifs: add a warning if we try to to dequeue a deleted mid (bsc#1144333).
- cifs: add compound_send_recv() (bsc#1144333).
- cifs: add credits from unmatched responses/messages (bsc#1144333).
- cifs: add debug output to show nocase mount option (bsc#1144333).
- cifs: add fiemap support (bsc#1144333).
- cifs: add iface info to struct cifs_ses (bsc#1144333).
- cifs: add lease tracking to the cached root fid (bsc#1144333).
- cifs: add missing GCM module dependency (bsc#1144333).
- cifs: add missing debug entries for kconfig options (bsc#1051510, bsc#1144333).
- cifs: add missing support for ACLs in SMB 3.11 (bsc#1051510, bsc#1144333).
- cifs: add pdu_size to the TCP_Server_Info structure (bsc#1144333).
- cifs: add resp_buf_size to the mid_q_entry structure (bsc#1144333).
- cifs: add server argument to the dump_detail method (bsc#1144333).
- cifs: add server-&gt;vals-&gt;header_preamble_size (bsc#1144333).
- cifs: add sha512 secmech (bsc#1051510, bsc#1144333).
- cifs: add spinlock for the openFileList to cifsInodeInfo (bsc#1144333).
- cifs: add support for SEEK_DATA and SEEK_HOLE (bsc#1144333).
- cifs: add support for ioctl on directories (bsc#1144333).
- cifs: address trivial coverity warning (bsc#1144333).
- cifs: allow calling SMB2_xxx_free(NULL) (bsc#1144333).
- cifs: allow disabling less secure legacy dialects (bsc#1144333).
- cifs: allow guest mounts to work for smb3.11 (bsc#1051510, bsc#1144333).
- cifs: always add credits back for unsolicited PDUs (bsc#1144333).
- cifs: auto disable 'serverino' in dfs mounts (bsc#1144333).
- cifs: avoid a kmalloc in smb2_send_recv/SendReceive2 for the common case (bsc#1144333).
- cifs: cache FILE_ALL_INFO for the shared root handle (bsc#1144333).
- cifs: change SMB2_OP_RENAME and SMB2_OP_HARDLINK to use compounding (bsc#1144333).
- cifs: change SMB2_OP_SET_EOF to use compounding (bsc#1144333).
- cifs: change SMB2_OP_SET_INFO to use compounding (bsc#1144333).
- cifs: change mkdir to use a compound (bsc#1144333).
- cifs: change smb2_get_data_area_len to take a smb2_sync_hdr as argument (bsc#1144333).
- cifs: change smb2_query_eas to use the compound query-info helper (bsc#1144333).
- cifs: change unlink to use a compound (bsc#1144333).
- cifs: change validate_buf to validate_iov (bsc#1144333).
- cifs: change wait_for_free_request() to take flags as argument (bsc#1144333).
- cifs: check CIFS_MOUNT_NO_DFS when trying to reuse existing sb (bsc#1144333).
- cifs: check MaxPathNameComponentLength != 0 before using it (bsc#1085536, bsc#1144333).
- cifs: check for STATUS_USER_SESSION_DELETED (bsc#1112902, bsc#1144333).
- cifs: check if SMB2 PDU size has been padded and suppress the warning (bsc#1144333).
- cifs: check kmalloc before use (bsc#1051510, bsc#1144333).
- cifs: check kzalloc return (bsc#1144333).
- cifs: check ntwrk_buf_start for NULL before dereferencing it (bsc#1144333).
- cifs: check rsp for NULL before dereferencing in SMB2_open (bsc#1085536, bsc#1144333).
- cifs: cifs_read_allocate_pages: do not iterate through whole page array on ENOMEM (bsc#1144333).
- cifs: clean up indentation, replace spaces with tab (bsc#1144333).
- cifs: cleanup smb2ops.c and normalize strings (bsc#1144333).
- cifs: complete PDU definitions for interface queries (bsc#1144333).
- cifs: connect to servername instead of IP for IPC$ share (bsc#1051510, bsc#1144333).
- cifs: create SMB2_open_init()/SMB2_open_free() helpers (bsc#1144333).
- cifs: create a define for how many iovs we need for an SMB2_open() (bsc#1144333).
- cifs: create a define for the max number of iov we need for a SMB2 set_info (bsc#1144333).
- cifs: create a helper function for compound query_info (bsc#1144333).
- cifs: create helpers for SMB2_set_info_init/free() (bsc#1144333).
- cifs: do not allow creating sockets except with SMB1 posix exensions (bsc#1102097, bsc#1144333).
- cifs: do not attempt cifs operation on smb2+ rename error (bsc#1144333).
- cifs: do not dereference smb_file_target before null check (bsc#1051510, bsc#1144333).
- cifs: do not log STATUS_NOT_FOUND errors for DFS (bsc#1051510, bsc#1144333).
- cifs: do not return atime less than mtime (bsc#1144333).
- cifs: do not send invalid input buffer on QUERY_INFO requests (bsc#1144333).
- cifs: do not show domain= in mount output when domain is empty (bsc#1144333).
- cifs: do not use __constant_cpu_to_le32() (bsc#1144333).
- cifs: document tcon/ses/server refcount dance (bsc#1144333).
- cifs: dump IPC tcon in debug proc file (bsc#1071306, bsc#1144333).
- cifs: dump every session iface info (bsc#1144333).
- cifs: fallback to older infolevels on findfirst queryinfo retry (bsc#1144333).
- cifs: fix GlobalMid_Lock bug in cifs_reconnect (bsc#1144333).
- cifs: fix NULL deref in SMB2_read (bsc#1085539, bsc#1144333).
- cifs: fix POSIX lock leak and invalid ptr deref (bsc#1114542, bsc#1144333).
- cifs: fix SMB1 breakage (bsc#1144333).
- cifs: fix a buffer leak in smb2_query_symlink (bsc#1144333).
- cifs: fix a credits leak for compund commands (bsc#1144333).
- cifs: fix bi-directional fsctl passthrough calls (bsc#1144333).
- cifs: fix build break when CONFIG_CIFS_DEBUG2 enabled (bsc#1144333).
- cifs: fix build errors for SMB_DIRECT (bsc#1144333).
- cifs: fix circular locking dependency (bsc#1064701, bsc#1144333).
- cifs: fix computation for MAX_SMB2_HDR_SIZE (bsc#1144333).
- cifs: fix confusing warning message on reconnect (bsc#1144333).
- cifs: fix crash in cifs_dfs_do_automount (bsc#1144333).
- cifs: fix crash in smb2_compound_op()/smb2_set_next_command() (bsc#1144333).
- cifs: fix crash querying symlinks stored as reparse-points (bsc#1144333).
- cifs: fix credits leak for SMB1 oplock breaks (bsc#1144333).
- cifs: fix deadlock in cached root handling (bsc#1144333).
- cifs: fix encryption in SMB3.1.1 (bsc#1144333).
- cifs: fix handle leak in smb2_query_symlink() (bsc#1144333).
- cifs: fix incorrect handling of smb2_set_sparse() return in smb3_simple_falloc (bsc#1144333).
- cifs: fix kref underflow in close_shroot() (bsc#1144333).
- cifs: fix memory leak and remove dead code (bsc#1144333).
- cifs: fix memory leak in SMB2_open() (bsc#1112894, bsc#1144333).
- cifs: fix memory leak in SMB2_read (bsc#1144333).
- cifs: fix memory leak of an allocated cifs_ntsd structure (bsc#1144333).
- cifs: fix memory leak of pneg_inbuf on -EOPNOTSUPP ioctl case (bsc#1144333).
- cifs: fix page reference leak with readv/writev (bsc#1144333).
- cifs: fix panic in smb2_reconnect (bsc#1144333).
- cifs: fix parsing of symbolic link error response (bsc#1144333).
- cifs: fix return value for cifs_listxattr (bsc#1051510, bsc#1144333).
- cifs: fix rmmod regression in cifs.ko caused by force_sig changes (bsc#1144333).
- cifs: fix sha512 check in cifs_crypto_secmech_release (bsc#1051510, bsc#1144333).
- cifs: fix signed/unsigned mismatch on aio_read patch (bsc#1144333).
- cifs: fix smb3_zero_range for Azure (bsc#1144333).
- cifs: fix smb3_zero_range so it can expand the file-size when required (bsc#1144333).
- cifs: fix sparse warning on previous patch in a few printks (bsc#1144333).
- cifs: fix spelling mistake, EACCESS -&gt; EACCES (bsc#1144333).
- cifs: fix strcat buffer overflow and reduce raciness in smb21_set_oplock_level() (bsc#1144333).
- cifs: fix typo in cifs_dbg (bsc#1144333).
- cifs: fix typo in debug message with struct field ia_valid (bsc#1144333).
- cifs: fix uninitialized ptr deref in smb2 signing (bsc#1144333).
- cifs: fix use-after-free of the lease keys (bsc#1144333).
- cifs: fix wrapping bugs in num_entries() (bsc#1051510, bsc#1144333).
- cifs: flush before set-info if we have writeable handles (bsc#1144333).
- cifs: handle large EA requests more gracefully in smb2+ (bsc#1144333).
- cifs: handle netapp error codes (bsc#1136261).
- cifs: hide unused functions (bsc#1051510, bsc#1144333).
- cifs: hide unused functions (bsc#1051510, bsc#1144333).
- cifs: implement v3.11 preauth integrity (bsc#1051510, bsc#1144333).
- cifs: integer overflow in in SMB2_ioctl() (bsc#1051510, bsc#1144333).
- cifs: invalidate cache when we truncate a file (bsc#1051510, bsc#1144333).
- cifs: keep FileInfo handle live during oplock break (bsc#1106284, bsc#1131565, bsc#1144333).
- cifs: limit amount of data we request for xattrs to CIFSMaxBufSize (bsc#1144333).
- cifs: make 'nodfs' mount opt a superblock flag (bsc#1051510, bsc#1144333).
- cifs: make IPC a regular tcon (bsc#1071306, bsc#1144333).
- cifs: make arrays static const, reduces object code size (bsc#1144333).
- cifs: make minor clarifications to module params for cifs.ko (bsc#1144333).
- cifs: make mknod() an smb_version_op (bsc#1144333).
- cifs: make rmdir() use compounding (bsc#1144333).
- cifs: make smb_send_rqst take an array of requests (bsc#1144333).
- cifs: minor clarification in comments (bsc#1144333).
- cifs: minor updates to module description for cifs.ko (bsc#1144333).
- cifs: move default port definitions to cifsglob.h (bsc#1144333).
- cifs: move large array from stack to heap (bsc#1144333).
- cifs: only wake the thread for the very last PDU in a compound (bsc#1144333).
- cifs: parse and store info on iface queries (bsc#1144333).
- cifs: pass flags down into wait_for_free_credits() (bsc#1144333).
- cifs: pass page offsets on SMB1 read/write (bsc#1144333).
- cifs: prevent integer overflow in nxt_dir_entry() (bsc#1051510, bsc#1144333).
- cifs: prevent starvation in wait_for_free_credits for multi-credit requests (bsc#1144333).
- cifs: print CIFSMaxBufSize as part of /proc/fs/cifs/DebugData (bsc#1144333).
- cifs: protect against server returning invalid file system block size (bsc#1144333).
- cifs: prototype declaration and definition for smb 2 - 3 and cifsacl mount options (bsc#1051510, bsc#1144333).
- cifs: prototype declaration and definition to set acl for smb 2 - 3 and cifsacl mount options (bsc#1051510, bsc#1144333).
- cifs: push rfc1002 generation down the stack (bsc#1144333).
- cifs: read overflow in is_valid_oplock_break() (bsc#1144333).
- cifs: refactor and clean up arguments in the reparse point parsing (bsc#1144333).
- cifs: refactor crypto shash/sdesc allocation&amp;free (bsc#1051510, bsc#1144333).
- cifs: release auth_key.response for reconnect (bsc#1085536, bsc#1144333).
- cifs: release cifs root_cred after exit_cifs (bsc#1085536, bsc#1144333).
- cifs: remove coverity warning in calc_lanman_hash (bsc#1144333).
- cifs: remove header_preamble_size where it is always 0 (bsc#1144333).
- cifs: remove redundant duplicated assignment of pointer 'node' (bsc#1144333).
- cifs: remove rfc1002 hardcoded constants from cifs_discard_remaining_data() (bsc#1144333).
- cifs: remove rfc1002 header from all SMB2 response structures (bsc#1144333).
- cifs: remove rfc1002 header from smb2 read/write requests (bsc#1144333).
- cifs: remove rfc1002 header from smb2_close_req (bsc#1144333).
- cifs: remove rfc1002 header from smb2_create_req (bsc#1144333).
- cifs: remove rfc1002 header from smb2_echo_req (bsc#1144333).
- cifs: remove rfc1002 header from smb2_flush_req (bsc#1144333).
- cifs: remove rfc1002 header from smb2_ioctl_req (bsc#1144333).
- cifs: remove rfc1002 header from smb2_lease_ack (bsc#1144333).
- cifs: remove rfc1002 header from smb2_lock_req (bsc#1144333).
- cifs: remove rfc1002 header from smb2_logoff_req (bsc#1144333).
- cifs: remove rfc1002 header from smb2_negotiate_req (bsc#1144333).
- cifs: remove rfc1002 header from smb2_oplock_break we get from server (bsc#1144333).
- cifs: remove rfc1002 header from smb2_query_directory_req (bsc#1144333).
- cifs: remove rfc1002 header from smb2_query_info_req (bsc#1144333).
- cifs: remove rfc1002 header from smb2_sess_setup_req (bsc#1144333).
- cifs: remove rfc1002 header from smb2_set_info_req (bsc#1144333).
- cifs: remove rfc1002 header from smb2_tree_connect_req (bsc#1144333).
- cifs: remove rfc1002 header from smb2_tree_disconnect_req (bsc#1144333).
- cifs: remove set but not used variable 'cifs_sb' (bsc#1144333).
- cifs: remove set but not used variable 'sep' (bsc#1144333).
- cifs: remove set but not used variable 'server' (bsc#1144333).
- cifs: remove set but not used variable 'smb_buf' (bsc#1144333).
- cifs: remove small_smb2_init (bsc#1144333).
- cifs: remove smb2_send_recv() (bsc#1144333).
- cifs: remove struct smb2_hdr (bsc#1144333).
- cifs: remove struct smb2_oplock_break_rsp (bsc#1144333).
- cifs: remove the is_falloc argument to SMB2_set_eof (bsc#1144333).
- cifs: remove unused stats (bsc#1144333).
- cifs: remove unused value pointed out by Coverity (bsc#1144333).
- cifs: remove unused variable from SMB2_read (bsc#1144333).
- cifs: rename and clarify CIFS_ASYNC_OP and CIFS_NO_RESP (bsc#1144333).
- cifs: replace a 4 with server-&gt;vals-&gt;header_preamble_size (bsc#1144333).
- cifs: replace snprintf with scnprintf (bsc#1144333).
- cifs: return -ENODATA when deleting an xattr that does not exist (bsc#1144333).
- cifs: return correct errors when pinning memory failed for direct I/O (bsc#1144333).
- cifs: return error on invalid value written to cifsFYI (bsc#1144333).
- cifs: set *resp_buf_type to NO_BUFFER on error (bsc#1144333).
- cifs: set mapping error when page writeback fails in writepage or launder_pages (bsc#1144333).
- cifs: set oparms.create_options rather than or'ing in CREATE_OPEN_BACKUP_INTENT (bsc#1144333).
- cifs: show 'soft' in the mount options for hard mounts (bsc#1144333).
- cifs: show the w bit for writeable /proc/fs/cifs/* files (bsc#1144333).
- cifs: silence compiler warnings showing up with gcc-8.0.0 (bsc#1090734, bsc#1144333).
- cifs: simple stats should always be enabled (bsc#1144333).
- cifs: simplify code by removing CONFIG_CIFS_ACL ifdef  (bsc#1144333). - Update config files.
- cifs: simplify how we handle credits in compound_send_recv() (bsc#1144333).
- cifs: smb2 commands can not be negative, remove confusing check (bsc#1144333).
- cifs: smb2ops: Fix NULL check in smb2_query_symlink (bsc#1144333).
- cifs: smb2ops: Fix listxattr() when there are no EAs (bsc#1051510, bsc#1144333).
- cifs: smb2pdu: Fix potential NULL pointer dereference (bsc#1144333).
- cifs: smbd: Avoid allocating iov on the stack (bsc#1144333).
- cifs: smbd: Check for iov length on sending the last iov (bsc#1144333).
- cifs: smbd: Do not destroy transport on RDMA disconnect (bsc#1144333).
- cifs: smbd: Do not use RDMA read/write when signing is used (bsc#1144333).
- cifs: smbd: Dump SMB packet when configured (bsc#1144333).
- cifs: smbd: Enable signing with smbdirect (bsc#1144333).
- cifs: smbd: Indicate to retry on transport sending failure (bsc#1144333).
- cifs: smbd: Retry on memory registration failure (bsc#1144333).
- cifs: smbd: Return EINTR when interrupted (bsc#1144333).
- cifs: smbd: avoid reconnect lockup (bsc#1144333).
- cifs: smbd: depend on INFINIBAND_ADDR_TRANS (bsc#1144333).
- cifs: smbd: disconnect transport on RDMA errors (bsc#1144333).
- cifs: smbd: take an array of reqeusts when sending upper layer data (bsc#1144333).
- cifs: start DFS cache refresher in cifs_mount() (bsc#1144333).
- cifs: store the leaseKey in the fid on SMB2_open (bsc#1051510, bsc#1144333).
- cifs: suppress some implicit-fallthrough warnings (bsc#1144333).
- cifs: track writepages in vfs operation counters (bsc#1144333).
- cifs: update __smb_send_rqst() to take an array of requests (bsc#1144333).
- cifs: update calc_size to take a server argument (bsc#1144333).
- cifs: update init_sg, crypt_message to take an array of rqst (bsc#1144333).
- cifs: update internal module number (bsc#1144333).
- cifs: update internal module version number (bsc#1144333).
- cifs: update internal module version number (bsc#1144333).
- cifs: update internal module version number (bsc#1144333).
- cifs: update internal module version number (bsc#1144333).
- cifs: update internal module version number (bsc#1144333).
- cifs: update internal module version number for cifs.ko to 2.12 (bsc#1144333).
- cifs: update internal module version number for cifs.ko to 2.12 (bsc#1144333).
- cifs: update internal module version number for cifs.ko to 2.14 (bsc#1144333).
- cifs: update module internal version number (bsc#1144333).
- cifs: update multiplex loop to handle compounded responses (bsc#1144333).
- cifs: update receive_encrypted_standard to handle compounded responses (bsc#1144333).
- cifs: update smb2_calc_size to use smb2_sync_hdr instead of smb2_hdr (bsc#1144333).
- cifs: update smb2_check_message to handle PDUs without a 4 byte length header (bsc#1144333).
- cifs: update smb2_queryfs() to use compounding (bsc#1144333).
- cifs: use a compound for setting an xattr (bsc#1144333).
- cifs: use a refcount to protect open/closing the cached file handle (bsc#1144333).
- cifs: use correct format characters (bsc#1144333).
- cifs: use tcon_ipc instead of use_ipc parameter of SMB2_ioctl (bsc#1071306, bsc#1144333).
- cifs: use the correct length when pinning memory for direct I/O for write (bsc#1144333).
- cifs: wait_for_free_credits() make it possible to wait for &gt;=1 credits (bsc#1144333).
- cifs: we can not use small padding iovs together with encryption (bsc#1144333).
- cifs: zero sensitive data when freeing (bsc#1087092, bsc#1144333).
- cifs: zero-range does not require the file is sparse (bsc#1144333).
- cifs:smbd Use the correct DMA direction when sending data (bsc#1144333).
- cifs:smbd When reconnecting to server, call smbd_destroy() after all MIDs have been called (bsc#1144333).
- cifs_lookup(): cifs_get_inode_...() never returns 0 with *inode left NULL (bsc#1144333).
- cifs_lookup(): switch to d_splice_alias() (bsc#1144333).
- clk: Export clk_bulk_prepare() (bsc#1144813).
- clk: add clk_bulk_get accessories (bsc#1144813).
- clk: bcm2835: remove pllb (jsc#SLE-7294).
- clk: bcm283x: add driver interfacing with Raspberry Pi's firmware (jsc#SLE-7294).
- clk: bulk: silently error out on EPROBE_DEFER (bsc#1144718,bsc#1144813).
- clk: raspberrypi: register platform device for raspberrypi-cpufreq (jsc#SLE-7294).
- clk: renesas: cpg-mssr: Fix reset control race condition (bsc#1051510).
- clk: rockchip: Add 1.6GHz PLL rate for rk3399 (bsc#1144718,bsc#1144813).
- clk: rockchip: assign correct id for pclk_ddr and hclk_sd in rk3399 (bsc#1144718,bsc#1144813).
- compat_ioctl: pppoe: fix PPPOEIOCSFWD handling (bsc#1051510).
- coredump: split pipe command whitespace before expanding template (bsc#1051510).
- cpu/speculation: Warn on unsupported mitigations= parameter (bsc#1114279).
- cpufreq: dt: Try freeing static OPPs only if we have added them (jsc#SLE-7294).
- crypto: ccp - Add support for valid authsize values less than 16 (bsc#1051510).
- crypto: ccp - Fix oops by properly managing allocated structures (bsc#1051510).
- crypto: ccp - Ignore tag length when decrypting GCM ciphertext (bsc#1051510).
- crypto: ccp - Ignore unconfigured CCP device on suspend/resume (bnc#1145934).
- crypto: ccp - Validate buffer lengths for copy operations (bsc#1051510).
- crypto: talitos - fix skcipher failure due to wrong output IV (bsc#1051510).
- cx82310_eth: fix a memory leak bug (bsc#1051510).
- dax: dax_layout_busy_page() should not unmap cow pages (bsc#1148698).
- devres: always use dev_name() in devm_ioremap_resource() (git fixes).
- dfs_cache: fix a wrong use of kfree in flush_cache_ent() (bsc#1144333).
- dm btree: fix order of block initialization in btree_split_beneath (git fixes).
- dm bufio: fix deadlock with loop device (git fixes).
- dm cache metadata: Fix loading discard bitset (git fixes).
- dm crypt: do not overallocate the integrity tag space (git fixes).
- dm crypt: fix parsing of extended IV arguments (git fixes).
- dm delay: fix a crash when invalid device is specified (git fixes).
- dm integrity: change memcmp to strncmp in dm_integrity_ctr (git fixes).
- dm integrity: limit the rate of error messages (git fixes).
- dm kcopyd: always complete failed jobs (git fixes).
- dm raid: add missing cleanup in raid_ctr() (git fixes).
- dm space map metadata: fix missing store of apply_bops() return value (git fixes).
- dm table: fix invalid memory accesses with too high sector number (git fixes).
- dm table: propagate BDI_CAP_STABLE_WRITES to fix sporadic checksum errors (git fixes).
- dm thin: fix bug where bio that overwrites thin block ignores FUA (git fixes).
- dm thin: fix passdown_double_checking_shared_status() (git fixes).
- dm zoned: Fix zone report handling (git fixes).
- dm zoned: Silence a static checker warning (git fixes).
- dm zoned: fix potential NULL dereference in dmz_do_reclaim() (git fixes).
- dm zoned: fix zone state management race (git fixes).
- dm zoned: improve error handling in i/o map code (git fixes).
- dm zoned: improve error handling in reclaim (git fixes).
- dm zoned: properly handle backing device failure (git fixes).
- dm: bufio: revert: 'fix deadlock with loop device' (git fixes).
- dm: fix to_sector() for 32bit (git fixes).
- dm: revert 8f50e358153d ('dm: limit the max bio size as BIO_MAX_PAGES * PAGE_SIZE') (git fixes).
- dma-buf: balance refcount inbalance (bsc#1051510).
- dmaengine: rcar-dmac: Reject zero-length slave DMA requests (bsc#1051510).
- documentation/networking: fix default_ttl typo in mpls-sysctl (bsc#1051510).
- documentation: Add nospectre_v1 parameter (bsc#1051510).
- driver core: Fix use-after-free and double free on glue directory (bsc#1131281).
- drivers/pps/pps.c: clear offset flags in PPS_SETPARAMS ioctl (bsc#1051510).
- drivers/rapidio/devices/rio_mport_cdev.c: NUL terminate some strings (bsc#1051510).
- drm/amdgpu/psp: move psp version specific function pointers to (bsc#1135642)
- drm/bridge: sii902x: pixel clock unit is 10kHz instead of 1kHz (bsc#1051510).
- drm/bridge: tc358767: read display_props in get_modes() (bsc#1051510).
- drm/crc-debugfs: User irqsafe spinlock in drm_crtc_add_crc_entry (bsc#1051510).
- drm/etnaviv: add missing failure path to destroy suballoc (bsc#1135642)
- drm/i915/perf: ensure we keep a reference on the driver (bsc#1142635)
- drm/i915/userptr: Acquire the page lock around set_page_dirty() (bsc#1051510).
- drm/i915: Do not deballoon unused ggtt drm_mm_node in linux guest (bsc#1142635)
- drm/i915: Fix wrong escape clock divisor init for GLK (bsc#1142635)
- drm/i915: Restore relaxed padding (OCL_OOB_SUPPRES_ENABLE) for skl+ (bsc#1142635)
- drm/imx: notify drm core before sending event during crtc disable (bsc#1135642)
- drm/imx: only send event on crtc disable if kept disabled (bsc#1135642)
- drm/mediatek: call drm_atomic_helper_shutdown() when unbinding driver (bsc#1135642)
- drm/mediatek: call mtk_dsi_stop() after mtk_drm_crtc_atomic_disable() (bsc#1135642)
- drm/mediatek: clear num_pipes when unbind driver (bsc#1135642)
- drm/mediatek: fix unbind functions (bsc#1135642)
- drm/mediatek: mtk_drm_drv.c: Add of_node_put() before goto (bsc#1142635)
- drm/mediatek: unbind components in mtk_drm_unbind() (bsc#1135642)
- drm/mediatek: use correct device to import PRIME buffers (bsc#1142635)
- drm/msm/mdp5: Fix mdp5_cfg_init error return (bsc#1142635)
- drm/msm: Depopulate platform on probe failure (bsc#1051510).
- drm/nouveau: Do not retry infinitely when receiving no data on i2c (bsc#1142635)
- drm/nouveau: fix memory leak in nouveau_conn_reset() (bsc#1051510).
- drm/panel: simple: Fix panel_simple_dsi_probe (bsc#1051510).
- drm/rockchip: Suspend DP late (bsc#1142635)
- drm/udl: introduce a macro to convert dev to udl. (bsc#1113722)
- drm/udl: move to embedding drm device inside udl device. (bsc#1113722)
- drm/virtio: Add memory barriers for capset cache (bsc#1051510).
- drm/vmwgfx: Use the backdoor port if the HB port is not available (bsc#1135642)
- drm/vmwgfx: fix a warning due to missing dma_parms (bsc#1135642)
- drm/vmwgfx: fix memory leak when too many retries have occurred (bsc#1051510).
- drm: msm: Fix add_gpu_components (bsc#1051510).
- drm: silence variable 'conn' set but not used (bsc#1051510).
- ecryptfs: fix a couple type promotion bugs (bsc#1051510).
- edac, amd64: Add Family 17h, models 10h-2fh support (bsc#1112178).
- edac/amd64: Add Family 17h Model 30h PCI IDs (bsc#1112178).
- edac: Fix global-out-of-bounds write when setting edac_mc_poll_msec (bsc#1114279).
- efi/bgrt: Drop BGRT status field reserved bits check (bsc#1051510).
- ehea: Fix a copy-paste err in ehea_init_port_res (bsc#1051510).
- ext4: use jbd2_inode dirty range scoping (bsc#1148616).
- firmware: raspberrypi: register clk device (jsc#SLE-7294).
- firmware: ti_sci: Always request response from firmware (bsc#1051510).
- fix incorrect error code mapping for OBJECTID_NOT_FOUND (bsc#1144333).
- fix smb3-encryption breakage when CONFIG_DEBUG_SG=y (bsc#1051510, bsc#1144333).
- fix struct ufs_req removal of unused field (git-fixes).
- fixed https://bugzilla.kernel.org/show_bug.cgi?id=202935 allow write on the same file (bsc#1144333).
- fs/*/kconfig: drop links to 404-compliant http://acl.bestbits.at (bsc#1144333).
- fs/cifs/cifsacl.c Fixes typo in a comment (bsc#1144333).
- fs/cifs/smb2pdu.c: fix buffer free in SMB2_ioctl_free (bsc#1144333).
- fs/cifs: Simplify ib_post_(send|recv|srq_recv)() calls (bsc#1144333).
- fs/cifs: do not translate SFM_SLASH (U+F026) to backslash (bsc#1144333).
- fs/cifs: fix uninitialised variable warnings (bsc#1144333).
- fs/cifs: require sha512 (bsc#1051510, bsc#1144333).
- fs/cifs: suppress a string overflow warning (bsc#1144333).
- fs/xfs: Fix return code of xfs_break_leased_layouts() (bsc#1148031).
- fs: cifs: Drop unlikely before IS_ERR(_OR_NULL) (bsc#1144333).
- fs: cifs: Kconfig: pedantic formatting (bsc#1144333).
- fs: cifs: Replace _free_xid call in cifs_root_iget function (bsc#1144333).
- fs: cifs: cifsssmb: Change return type of convert_ace_to_cifs_ace (bsc#1144333).
- fs: xfs: xfs_log: Do not use KM_MAYFAIL at xfs_log_reserve() (bsc#1148033).
- fsl/fman: Use GFP_ATOMIC in {memac,tgec}_add_hash_mac_address() (bsc#1051510).
- ftrace: Check for empty hash and comment the race with registering probes (bsc#1149418).
- ftrace: Check for successful allocation of hash (bsc#1149424).
- ftrace: Fix NULL pointer dereference in t_probe_next() (bsc#1149413).
- gpio: Fix build error of function redefinition (bsc#1051510).
- gpio: gpio-omap: add check for off wake capable gpios (bsc#1051510).
- gpio: mxs: Get rid of external API call (bsc#1051510).
- gpio: omap: ensure irq is enabled before wakeup (bsc#1051510).
- gpio: pxa: handle corner case of unprobed device (bsc#1051510).
- gpiolib: fix incorrect IRQ requesting of an active-low lineevent (bsc#1051510).
- gpiolib: never report open-drain/source lines as 'input' to user-space (bsc#1051510).
- gpu: ipu-v3: ipu-ic: Fix saturation bit offset in TPMEM (bsc#1142635)
- hid: Add 044f:b320 ThrustMaster, Inc. 2 in 1 DT (bsc#1051510).
- hid: Add quirk for HP X1200 PIXART OEM mouse (bsc#1051510).
- hid: cp2112: prevent sleeping function called from invalid context (bsc#1051510).
- hid: hiddev: avoid opening a disconnected device (bsc#1051510).
- hid: hiddev: do cleanup in failure of opening a device (bsc#1051510).
- hid: holtek: test for sanity of intfdata (bsc#1051510).
- hid: sony: Fix race condition between rumble and device remove (bsc#1051510).
- hid: wacom: Correct distance scale for 2nd-gen Intuos devices (bsc#1142635).
- hid: wacom: correct misreported EKR ring values (bsc#1142635).
- hid: wacom: fix bit shift for Cintiq Companion 2 (bsc#1051510).
- hpet: Fix division by zero in hpet_time_div() (bsc#1051510).
- hwmon: (nct6775) Fix register address and added missed tolerance for nct6106 (bsc#1051510).
- hwmon: (nct7802) Fix wrong detection of in4 presence (bsc#1051510).
- i2c: emev2: avoid race when unregistering slave client (bsc#1051510).
- i2c: piix4: Fix port selection for AMD Family 16h Model 30h (bsc#1051510).
- i2c: qup: fixed releasing dma without flush operation completion (bsc#1051510).
- ib/mlx5: Fix MR registration flow to use UMR properly (bsc#1093205 bsc#1145678).
- ibmveth: Convert multicast list size for little-endian system (bsc#1061843).
- ibmvnic: Do not process reset during or after device removal (bsc#1149652 ltc#179635).
- ibmvnic: Unmap DMA address of TX descriptor buffers after use (bsc#1146351 ltc#180726).
- igmp: fix memory leak in igmpv3_del_delrec() (networking-stable-19_07_25).
- iio: adc: max9611: Fix misuse of GENMASK macro (bsc#1051510).
- iio: adc: max9611: Fix temperature reading in probe (bsc#1051510).
- iio: iio-utils: Fix possible incorrect mask calculation (bsc#1051510).
- include/linux/bitops.h: sanitize rotate primitives (git fixes).
- input: alps - do not handle ALPS cs19 trackpoint-only device (bsc#1051510).
- input: alps - fix a mismatch between a condition check and its comment (bsc#1051510).
- input: iforce - add sanity checks (bsc#1051510).
- input: kbtab - sanity check for endpoint type (bsc#1051510).
- input: synaptics - enable RMI mode for HP Spectre X360 (bsc#1051510).
- input: synaptics - whitelist Lenovo T580 SMBus intertouch (bsc#1051510).
- input: trackpoint - only expose supported controls for Elan, ALPS and NXP (bsc#1051510).
- intel_th: pci: Add Ice Lake NNPI support (bsc#1051510).
- intel_th: pci: Add Tiger Lake support (bsc#1051510).
- intel_th: pci: Add support for another Lewisburg PCH (bsc#1051510).
- iommu/amd: Add support for X2APIC IOMMU interrupts (bsc#1145010).
- iommu/amd: Fix race in increase_address_space() (bsc#1150860).
- iommu/amd: Flush old domains in kdump kernel (bsc#1150861).
- iommu/amd: Move iommu_init_pci() to .init section (bsc#1149105).
- iommu/dma: Handle SG length overflow better (bsc#1146084).
- iommu/iova: Fix compilation error with !CONFIG_IOMMU_IOVA (bsc#1145024).
- iommu/vt-d: Do not queue_iova() if there is no flush queue (bsc#1145024).
- ipip: validate header length in ipip_tunnel_xmit (git-fixes).
- ipv4: do not set IPv6 only flags to IPv4 addresses (networking-stable-19_07_25).
- irqchip/gic-v3-its: fix build warnings (bsc#1144880).
- isdn: hfcsusb: Fix mISDN driver crash caused by transfer buffer on the stack (bsc#1051510).
- isdn: hfcsusb: checking idx of ep configuration (bsc#1051510).
- isdn: mISDN: hfcsusb: Fix possible null-pointer dereferences in start_isoc_chain() (bsc#1051510).
- iwlwifi: dbg: split iwl_fw_error_dump to two functions (bsc#1119086).
- iwlwifi: do not unmap as page memory that was mapped as single (bsc#1051510).
- iwlwifi: fix bad dma handling in page_mem dumping flow (bsc#1120902).
- iwlwifi: fw: use helper to determine whether to dump paging (bsc#1106434). Patch needed to be adjusted, because our tree does not have the global variable IWL_FW_ERROR_DUMP_PAGING
- iwlwifi: mvm: do not send GEO_TX_POWER_LIMIT on version &amp;&lt; 41 (bsc#1142635).
- iwlwifi: mvm: fix an out-of-bound access (bsc#1051510).
- iwlwifi: mvm: fix version check for GEO_TX_POWER_LIMIT support (bsc#1142635).
- iwlwifi: pcie: do not service an interrupt that was masked (bsc#1142635).
- iwlwifi: pcie: fix ALIVE interrupt handling for gen2 devices w/o MSI-X (bsc#1142635).
- jbd2: flush_descriptor(): Do not decrease buffer head's ref count (bsc#1143843).
- jbd2: introduce jbd2_inode dirty range scoping (bsc#1148616).
- kabi: Fix kABI for 'struct amd_iommu' (bsc#1145010).
- kasan: remove redundant initialization of variable 'real_size' (git fixes).
- kconfig/[mn]conf: handle backspace (^H) key (bsc#1051510).
- keys: Fix missing null pointer check in request_key_auth_describe() (bsc#1051510).
- kvm/eventfd: Avoid crash when assign and deassign specific eventfd in parallel (bsc#1133021).
- kvm/x86: Move MSR_IA32_ARCH_CAPABILITIES to array emulated_msrs (bsc#1134881 bsc#1134882).
- kvm: Disallow wraparound in kvm_gfn_to_hva_cache_init (bsc#1133021).
- kvm: Fix leak vCPU's VMCS value into other pCPU (bsc#1145388).
- kvm: LAPIC: Fix pending interrupt in IRR blocked by software disable LAPIC (bsc#1145408).
- kvm: PPC: Book3S HV: Fix CR0 setting in TM emulation (bsc#1061840).
- kvm: Reject device ioctls from processes other than the VM's creator (bsc#1133021).
- kvm: VMX: Always signal #GP on WRMSR to MSR_IA32_CR_PAT with bad value (bsc#1145393).
- kvm: VMX: Fix handling of #MC that occurs during VM-Entry (bsc#1145395).
- kvm: VMX: check CPUID before allowing read/write of IA32_XSS (bsc#1145394).
- kvm: X86: Reduce the overhead when lapic_timer_advance is disabled (bsc#1149083).
- kvm: X86: Reduce the overhead when lapic_timer_advance is disabled (bsc#1149083).
- kvm: arm/arm64: Close VMID generation race (bsc#1133021).
- kvm: arm/arm64: Convert kvm_host_cpu_state to a static per-cpu allocation (bsc#1133021).
- kvm: arm/arm64: Drop resource size check for GICV window (bsc#1133021).
- kvm: arm/arm64: Fix VMID alloc race by reverting to lock-less (bsc#1133021).
- kvm: arm/arm64: Fix lost IRQs from emulated physcial timer when blocked (bsc#1133021).
- kvm: arm/arm64: Handle CPU_PM_ENTER_FAILED (bsc#1133021).
- kvm: arm/arm64: Reduce verbosity of KVM init log (bsc#1133021).
- kvm: arm/arm64: Set dist-&gt;spis to NULL after kfree (bsc#1133021).
- kvm: arm/arm64: Skip updating PMD entry if no change (bsc#1133021).
- kvm: arm/arm64: Skip updating PTE entry if no change (bsc#1133021).
- kvm: arm/arm64: vgic-its: Fix potential overrun in vgic_copy_lpi_list (bsc#1133021).
- kvm: arm/arm64: vgic-v3: Tighten synchronization for guests using v2 on v3 (bsc#1133021).
- kvm: arm/arm64: vgic: Add missing irq_lock to vgic_mmio_read_pending (bsc#1133021).
- kvm: arm/arm64: vgic: Fix kvm_device leak in vgic_its_destroy (bsc#1133021).
- kvm: arm64: Fix caching of host MDCR_EL2 value (bsc#1133021).
- kvm: mmu: Fix overlap between public and private memslots (bsc#1133021).
- kvm: nVMX: Remove unnecessary sync_roots from handle_invept (bsc#1145391).
- kvm: nVMX: Use adjusted pin controls for vmcs02 (bsc#1145392).
- kvm: nVMX: allow setting the VMFUNC controls MSR (bsc#1145389).
- kvm: nVMX: do not use dangling shadow VMCS after guest reset (bsc#1145390).
- kvm: x86/vPMU: refine kvm_pmu err msg when event creation failed (bsc#1145397).
- kvm: x86: Do not update RIP or do single-step on faulting emulation (bsc#1149104).
- kvm: x86: Unconditionally enable irqs in guest context (bsc#1145396).
- kvm: x86: degrade WARN to pr_warn_ratelimited (bsc#1145409).
- kvm: x86: fix backward migration with async_PF (bsc#1146074).
- lan78xx: Fix memory leaks (bsc#1051510).
- libata: add SG safety checks in SFF pio transfers (bsc#1051510).
- libata: do not request sense data on !ZAC ATA devices (bsc#1051510).
- libata: have ata_scsi_rw_xlat() fail invalid passthrough requests (bsc#1051510).
- libata: zpodd: Fix small read overflow in zpodd_get_mech_type() (bsc#1051510).
- libceph, rbd, ceph: move ceph_osdc_alloc_messages() calls (bsc#1135897).
- libceph, rbd: add error handling for osd_req_op_cls_init() (bsc#1135897).
- libceph, rbd: new bio handling code (aka do not clone bios) (bsc#1141450).
- libceph: add osd_req_op_extent_osd_data_bvecs() (bsc#1141450).
- libceph: allow ceph_buffer_put() to receive a NULL ceph_buffer (bsc#1148133).
- libceph: assign cookies in linger_submit() (bsc#1135897).
- libceph: check reply num_data_items in setup_request_data() (bsc#1135897).
- libceph: do not consume a ref on pagelist in ceph_msg_data_add_pagelist() (bsc#1135897).
- libceph: enable fallback to ceph_msg_new() in ceph_msgpool_get() (bsc#1135897).
- libceph: fix PG split vs OSD (re)connect race (bsc#1148133).
- libceph: handle zero-length data items (bsc#1141450).
- libceph: introduce BVECS data type (bsc#1141450).
- libceph: introduce alloc_watch_request() (bsc#1135897).
- libceph: introduce ceph_pagelist_alloc() (bsc#1135897).
- libceph: preallocate message data items (bsc#1135897).
- libceph: use single request data item for cmp/setxattr (bsc#1139101).
- libnvdimm/pfn: Store correct value of npfns in namespace superblock (bsc#1146381 ltc#180720).
- liquidio: add cleanup in octeon_setup_iq() (bsc#1051510).
- loop: set PF_MEMALLOC_NOIO for the worker thread (git fixes).
- mac80211: do not WARN on short WMM parameters from AP (bsc#1051510).
- mac80211: do not warn about CW params when not using them (bsc#1051510).
- mac80211: fix possible memory leak in ieee80211_assign_beacon (bsc#1142635).
- mac80211: fix possible sta leak (bsc#1051510).
- macsec: fix checksumming after decryption (bsc#1051510).
- macsec: fix use-after-free of skb during RX (bsc#1051510).
- macsec: let the administrator set UP state even if lowerdev is down (bsc#1051510).
- macsec: update operstate when lower device changes (bsc#1051510).
- mailbox: handle failed named mailbox channel request (bsc#1051510).
- md/raid: raid5 preserve the writeback action after the parity check (git fixes).
- md: add mddev-&gt;pers to avoid potential NULL pointer dereference (git fixes).
- media: au0828: fix null dereference in error path (bsc#1051510).
- media: coda: Remove unbalanced and unneeded mutex unlock (bsc#1051510).
- media: coda: fix last buffer handling in V4L2_ENC_CMD_STOP (bsc#1051510).
- media: coda: fix mpeg2 sequence number handling (bsc#1051510).
- media: coda: increment sequence offset for the last returned frame (bsc#1051510).
- media: dvb: usb: fix use after free in dvb_usb_device_exit (bsc#1051510).
- media: hdpvr: fix locking and a missing msleep (bsc#1051510).
- media: media_device_enum_links32: clean a reserved field (bsc#1051510).
- media: pvrusb2: use a different format for warnings (bsc#1051510).
- media: spi: IR LED: add missing of table registration (bsc#1051510).
- media: staging: media: davinci_vpfe: - Fix for memory leak if decoder initialization fails (bsc#1051510).
- media: vpss: fix a potential NULL pointer dereference (bsc#1051510).
- media: wl128x: Fix some error handling in fm_v4l2_init_video_device() (bsc#1051510).
- mfd: arizona: Fix undefined behavior (bsc#1051510).
- mfd: core: Set fwnode for created devices (bsc#1051510).
- mfd: hi655x-pmic: Fix missing return value check for devm_regmap_init_mmio_clk (bsc#1051510).
- mfd: intel-lpss: Add Intel Comet Lake PCI IDs (jsc#SLE-4875).
- mm, page_owner: handle THP splits correctly (bsc#1149197, VM Debugging Functionality).
- mm/hmm: fix bad subpage pointer in try_to_unmap_one (bsc#1148202, HMM, VM Functionality).
- mm/hotplug: fix offline undo_isolate_page_range() (bsc#1148196, VM Functionality).
- mm/list_lru.c: fix memory leak in __memcg_init_list_lru_node (bsc#1148379, VM Functionality).
- mm/memcontrol.c: fix use after free in mem_cgroup_iter() (bsc#1149224, VM Functionality).
- mm/memory.c: recheck page table entry with page table lock held (bsc#1148363, VM Functionality).
- mm/migrate.c: initialize pud_entry in migrate_vma() (bsc#1148198, HMM, VM Functionality).
- mm/mlock.c: change count_mm_mlocked_page_nr return type (bsc#1148527, VM Functionality).
- mm/mlock.c: mlockall error for flag MCL_ONFAULT (bsc#1148527, VM Functionality).
- mm/page_alloc.c: fix calculation of pgdat-&gt;nr_zones (bsc#1148192, VM Functionality).
- mm/vmalloc: Sync unmappings in __purge_vmap_area_lazy() (bsc#1118689).
- mm/vmscan.c: fix trying to reclaim unevictable LRU page (bsc#1149214, VM Functionality).
- mm: add filemap_fdatawait_range_keep_errors() (bsc#1148616).
- mm: do not stall register_shrinker() (bsc#1104902, VM Performance).
- mm: page_mapped: do not assume compound page is huge or THP (bsc#1148574, VM Functionality).
- mmc: cavium: Add the missing dma unmap when the dma has finished (bsc#1051510).
- mmc: cavium: Set the correct dma max segment size for mmc_host (bsc#1051510).
- mmc: core: Fix init of SD cards reporting an invalid VDD range (bsc#1051510).
- mmc: dw_mmc: Fix occasional hang after tuning on eMMC (bsc#1051510).
- mmc: sdhci-of-at91: add quirk for broken HS200 (bsc#1051510).
- mmc: sdhci-pci: Add support for Intel CML (jsc#SLE-4875).
- mmc: sdhci-pci: Add support for Intel ICP (jsc#SLE-4875).
- move a few externs to smbdirect.h to eliminate warning (bsc#1144333).
- move core networking kabi patches to the end of the section
- move irq_data_get_effective_affinity_mask prior the sorted section
- mpls: fix warning with multi-label encap (bsc#1051510).
- nbd: replace kill_bdev() with __invalidate_device() again (git fixes).
- net/9p: include trans_common.h to fix missing prototype warning (bsc#1051510).
- net/ibmvnic: Fix missing { in __ibmvnic_reset (bsc#1149652 ltc#179635).
- net/ibmvnic: free reset work of removed device from queue (bsc#1149652 ltc#179635).
- net/mlx4_core: Zero out lkey field in SW2HW_MPT fw command (bsc#1145678).
- net/mlx5e: IPoIB, Add error path in mlx5_rdma_setup_rn (networking-stable-19_07_25).
- net/smc: do not schedule tx_work in SMC_CLOSED state (bsc#1149963).
- net/smc: original socket family in inet_sock_diag (bsc#1149959).
- net: Fix netdev_WARN_ONCE macro (git-fixes).
- net: Introduce netdev_*_once functions (networking-stable-19_07_25).
- net: bcmgenet: use promisc for unsupported filters (networking-stable-19_07_25).
- net: bridge: mcast: fix stale ipv6 hdr pointer when handling v6 query (networking-stable-19_07_25).
- net: bridge: mcast: fix stale nsrcs pointer in igmp3/mld2 report handling (networking-stable-19_07_25).
- net: bridge: stp: do not cache eth dest pointer before skb pull (networking-stable-19_07_25).
- net: dsa: mv88e6xxx: wait after reset deactivation (networking-stable-19_07_25).
- net: ena: Fix bug where ring allocation backoff stopped too late (bsc#1139020 bsc#1139021).
- net: ena: add MAX_QUEUES_EXT get feature admin command (bsc#1139020 bsc#1139021).
- net: ena: add ethtool function for changing io queue sizes (bsc#1139020 bsc#1139021).
- net: ena: add good checksum counter (bsc#1139020 bsc#1139021).
- net: ena: add handling of llq max tx burst size (bsc#1139020 bsc#1139021).
- net: ena: add newline at the end of pr_err prints (bsc#1139020 bsc#1139021).
- net: ena: add support for changing max_header_size in LLQ mode (bsc#1139020 bsc#1139021).
- net: ena: allow automatic fallback to polling mode (bsc#1139020 bsc#1139021).
- net: ena: allow queue allocation backoff when low on memory (bsc#1139020 bsc#1139021).
- net: ena: arrange ena_probe() function variables in reverse christmas tree (bsc#1139020 bsc#1139021).
- net: ena: enable negotiating larger Rx ring size (bsc#1139020 bsc#1139021).
- net: ena: ethtool: add extra properties retrieval via get_priv_flags (bsc#1139020 bsc#1139021).
- net: ena: ethtool: revert 'add extra properties retrieval via get_priv_flags' (bsc#1139020 bsc#1139021).
- net: ena: fix ena_com_fill_hash_function() implementation (bsc#1139020 bsc#1139021).
- net: ena: fix incorrect test of supported hash function (bsc#1139020 bsc#1139021).
- net: ena: fix swapped parameters when calling ena_com_indirect_table_fill_entry (bsc#1139020 bsc#1139021).
- net: ena: fix: Free napi resources when ena_up() fails (bsc#1139020 bsc#1139021).
- net: ena: fix: set freed objects to NULL to avoid failing future allocations (bsc#1139020 bsc#1139021).
- net: ena: gcc 8: fix compilation warning (bsc#1139020 bsc#1139021).
- net: ena: improve latency by disabling adaptive interrupt moderation by default (bsc#1139020 bsc#1139021).
- net: ena: make ethtool show correct current and max queue sizes (bsc#1139020 bsc#1139021).
- net: ena: optimise calculations for CQ doorbell (bsc#1139020 bsc#1139021).
- net: ena: remove inline keyword from functions in *.c (bsc#1139020 bsc#1139021).
- net: ena: replace free_tx/rx_ids union with single free_ids field in ena_ring (bsc#1139020 bsc#1139021).
- net: ena: update driver version from 2.0.3 to 2.1.0 (bsc#1139020 bsc#1139021).
- net: ena: use dev_info_once instead of static variable (bsc#1139020 bsc#1139021).
- net: make skb_dst_force return true when dst is refcounted (networking-stable-19_07_25).
- net: neigh: fix multiple neigh timer scheduling (networking-stable-19_07_25).
- net: remove duplicate fetch in sock_getsockopt (networking-stable-19_07_02).
- net: sched: verify that q!=NULL before setting q-&gt;flags (git-fixes).
- net: stmmac: fixed new system time seconds value calculation (networking-stable-19_07_02).
- net: stmmac: set IC bit when transmitting frames with HW timestamp (networking-stable-19_07_02).
- net: usb: pegasus: fix improper read if get_registers() fail (bsc#1051510).
- net_sched: unset TCQ_F_CAN_BYPASS when adding filters (networking-stable-19_07_25).
- netrom: fix a memory leak in nr_rx_frame() (networking-stable-19_07_25).
- netrom: hold sock when setting skb-&gt;destructor (networking-stable-19_07_25).
- nfc: fix potential illegal memory access (bsc#1051510).
- nfs: Cleanup if nfs_match_client is interrupted (bsc#1134291).
- nfs: Fix a double unlock from nfs_match,get_client (bsc#1134291).
- nfs: Fix the inode request accounting when pages have subrequests (bsc#1140012).
- nfs: make nfs_match_client killable (bsc#1134291).
- nilfs2: do not use unexported cpu_to_le32()/le32_to_cpu() in uapi header (git fixes).
- nvme-core: Fix extra device_put() call on error path (bsc#1142541).
- nvme-fc: fix module unloads while lports still pending (bsc#1150033).
- nvme-multipath: fix ana log nsid lookup when nsid is not found (bsc#1141554).
- nvme-multipath: relax ANA state check (bsc#1123105).
- nvme-multipath: revalidate nvme_ns_head gendisk in nvme_validate_ns (bsc#1120876).
- nvme: Return BLK_STS_TARGET if the DNR bit is set (bsc#1142076).
- nvme: cancel request synchronously (bsc#1145661).
- nvme: change locking for the per-subsystem controller list (bsc#1142541).
- nvme: fix possible use-after-free in connect error flow (bsc#1139500, bsc#1140426)
- nvme: introduce NVME_QUIRK_IGNORE_DEV_SUBNQN (bsc#1146938).
- objtool: Add rewind_stack_do_exit() to the noreturn list (bsc#1145302).
- objtool: Support GCC 9 cold subfunction naming scheme (bsc#1145300).
- octeon_mgmt: Fix MIX registers configuration on MTU setup (bsc#1051510).
- pci: PM/ACPI: Refresh all stale power state data in pci_pm_complete() (bsc#1149106).
- pci: Restore Resizable BAR size bits correctly for 1MB BARs (bsc#1143841).
- pci: hv: Fix panic by calling hv_pci_remove_slots() earlier (bsc#1142701).
- pci: qcom: Ensure that PERST is asserted for at least 100 ms (bsc#1142635).
- pci: xilinx-nwl: Fix Multi MSI data programming (bsc#1142635).
- phy: qcom-qusb2: Fix crash if nvmem cell not specified (bsc#1051510).
- phy: renesas: rcar-gen2: Fix memory leak at error paths (bsc#1051510).
- pinctrl: pistachio: fix leaked of_node references (bsc#1051510).
- pinctrl: rockchip: fix leaked of_node references (bsc#1051510).
- pm / devfreq: rk3399_dmc: Pass ODT and auto power down parameters to TF-A (bsc#1144718,bsc#1144813).
- pm / devfreq: rk3399_dmc: do not print error when get supply and clk defer (bsc#1144718,bsc#1144813).
- pm / devfreq: rk3399_dmc: fix spelling mistakes (bsc#1144718,bsc#1144813).
- pm / devfreq: rk3399_dmc: remove unneeded semicolon (bsc#1144718,bsc#1144813).
- pm / devfreq: rk3399_dmc: remove wait for dcf irq event (bsc#1144718,bsc#1144813).
- pm / devfreq: rockchip-dfi: Move GRF definitions to a common place (bsc#1144718,bsc#1144813).
- pm / opp: OF: Use pr_debug() instead of pr_err() while adding OPP table (jsc#SLE-7294).
- powerpc/64s: Include cpu header (bsc#1065729).
- powerpc/64s: support nospectre_v2 cmdline option (bsc#1131107).
- powerpc/book3s/64: check for NULL pointer in pgd_alloc() (bsc#1078248, git-fixes).
- powerpc/fadump: Do not allow hot-remove memory from fadump reserved area (bsc#1120937).
- powerpc/fadump: Reservationless firmware assisted dump (bsc#1120937).
- powerpc/fadump: Throw proper error message on fadump registration failure (bsc#1120937).
- powerpc/fadump: use kstrtoint to handle sysfs store (bsc#1146376).
- powerpc/fadump: when fadump is supported register the fadump sysfs files (bsc#1146352).
- powerpc/fsl: Add nospectre_v2 command line argument (bsc#1131107).
- powerpc/fsl: Update Spectre v2 reporting (bsc#1131107).
- powerpc/kdump: Handle crashkernel memory reservation failure (bsc#1143466 LTC#179600).
- powerpc/lib: Fix feature fixup test of external branch (bsc#1065729).
- powerpc/mm/hash/4k: Do not use 64K page size for vmemmap with 4K pagesize (bsc#1142685 LTC#179509).
- powerpc/mm/radix: Use the right page size for vmemmap mapping (bsc#1055117 bsc#1142685 LTC#179509).
- powerpc/mm: Handle page table allocation failures (bsc#1065729).
- powerpc/perf: Add constraints for power9 l2/l3 bus events (bsc#1056686).
- powerpc/perf: Add mem access events to sysfs (bsc#1124370).
- powerpc/perf: Cleanup cache_sel bits comment (bsc#1056686).
- powerpc/perf: Fix thresholding counter data for unknown type (bsc#1056686).
- powerpc/perf: Remove PM_BR_CMPL_ALT from power9 event list (bsc#1047238, bsc#1056686).
- powerpc/perf: Update perf_regs structure to include SIER (bsc#1056686).
- powerpc/powernv/opal-dump : Use IRQ_HANDLED instead of numbers in interrupt handler (bsc#1065729).
- powerpc/powernv: Flush console before platform error reboot (bsc#1149940 ltc#179958).
- powerpc/powernv: Return for invalid IMC domain (bsc1054914, git-fixes).
- powerpc/powernv: Use kernel crash path for machine checks (bsc#1149940 ltc#179958).
- powerpc/pseries, ps3: panic flush kernel messages before halting system (bsc#1149940 ltc#179958).
- powerpc/pseries: Fix xive=off command line (bsc#1085030, git-fixes).
- powerpc/pseries: add missing cpumask.h include file (bsc#1065729).
- powerpc/pseries: correctly track irq state in default idle (bsc#1150727 ltc#178925).
- powerpc/rtas: use device model APIs and serialization during LPM (bsc#1144123 ltc#178840).
- powerpc/security: Show powerpc_security_features in debugfs (bsc#1131107).
- powerpc/xive: Fix dump of XIVE interrupt under pseries (bsc#1142019).
- powerpc/xive: Fix loop exit-condition in xive_find_target_in_mask() (bsc#1085030, bsc#1145189, LTC#179762).
- powerpc/xmon: Add a dump of all XIVE interrupts (bsc#1142019).
- powerpc/xmon: Check for HV mode when dumping XIVE info from OPAL (bsc#1142019).
- powerpc: Allow flush_(inval_)dcache_range to work across ranges &gt;4GB (bsc#1146575 ltc#180764).
- powerpc: dump kernel log before carrying out fadump or kdump (bsc#1149940 ltc#179958).
- qede: fix write to free'd pointer error and double free of ptp (bsc#1051510).
- qlge: Deduplicate lbq_buf_size (bsc#1106061).
- qlge: Deduplicate rx buffer queue management (bsc#1106061).
- qlge: Factor out duplicated expression (bsc#1106061).
- qlge: Fix dma_sync_single calls (bsc#1106061).
- qlge: Fix irq masking in INTx mode (bsc#1106061).
- qlge: Refill empty buffer queues from wq (bsc#1106061).
- qlge: Refill rx buffers up to multiple of 16 (bsc#1106061).
- qlge: Remove bq_desc.maplen (bsc#1106061).
- qlge: Remove irq_cnt (bsc#1106061).
- qlge: Remove page_chunk.last_flag (bsc#1106061).
- qlge: Remove qlge_bq.len &amp; size (bsc#1106061).
- qlge: Remove rx_ring.sbq_buf_size (bsc#1106061).
- qlge: Remove rx_ring.type (bsc#1106061).
- qlge: Remove useless dma synchronization calls (bsc#1106061).
- qlge: Remove useless memset (bsc#1106061).
- qlge: Replace memset with assignment (bsc#1106061).
- qlge: Update buffer queue prod index despite oom (bsc#1106061).
- rbd: do not (ab)use obj_req-&gt;pages for stat requests (bsc#1141450).
- rbd: do not NULL out -&gt;obj_request in rbd_img_obj_parent_read_full() (bsc#1141450).
- rbd: get rid of img_req-&gt;copyup_pages (bsc#1141450).
- rbd: move from raw pages to bvec data descriptors (bsc#1141450).
- rbd: remove bio cloning helpers (bsc#1141450).
- rbd: start enums at 1 instead of 0 (bsc#1141450).
- rbd: use kmem_cache_zalloc() in rbd_img_request_create() (bsc#1141450).
- regmap: fix bulk writes on paged registers (bsc#1051510).
- regulator: qcom_spmi: Fix math of spmi_regulator_set_voltage_time_sel (bsc#1051510).
- rename patches according to their names in SLE15-SP1.
- rpm/kernel-binary.spec.in: Enable missing modules check.
- rpm/kernel-binary.spec.in: Enable missing modules check.
- rpmsg: added MODULE_ALIAS for rpmsg_char (bsc#1051510).
- rpmsg: smd: do not use mananged resources for endpoints and channels (bsc#1051510).
- rpmsg: smd: fix memory leak on channel create (bsc#1051510).
- rsi: improve kernel thread handling to fix kernel panic (bsc#1051510).
- rslib: Fix decoding of shortened codes (bsc#1051510).
- rslib: Fix handling of of caller provided syndrome (bsc#1051510).
- rtc: pcf8523: do not return invalid date when battery is low (bsc#1051510).
- rxrpc: Fix send on a connected, but unbound socket (networking-stable-19_07_25).
- s390/cio: fix ccw_device_start_timeout API (bsc#1142109 LTC#179339).
- s390/dasd: fix endless loop after read unit address configuration (bsc#1144912 LTC#179907).
- s390/qdio: handle PENDING state for QEBSM devices (bsc#1142117 bsc#1142118 bsc#1142119 LTC#179329 LTC#179330 LTC#179331).
- s390/qeth: avoid control IO completion stalls (bsc#1142109 LTC#179339).
- s390/qeth: cancel cmd on early error (bsc#1142109 LTC#179339).
- s390/qeth: fix request-side race during cmd IO timeout (bsc#1142109 LTC#179339).
- s390/qeth: release cmd buffer in error paths (bsc#1142109 LTC#179339).
- s390/qeth: simplify reply object handling (bsc#1142109 LTC#179339).
- samples, bpf: fix to change the buffer size for read() (bsc#1051510).
- samples: mei: use /dev/mei0 instead of /dev/mei (bsc#1051510).
- sched/fair: Do not free p-&gt;numa_faults with concurrent readers (bsc#1144920).
- sched/fair: Use RCU accessors consistently for -&gt;numa_group (bsc#1144920).
- scripts/checkstack.pl: Fix arm64 wrong or unknown architecture (bsc#1051510).
- scripts/decode_stacktrace.sh: prefix addr2line with $CROSS_COMPILE (bsc#1051510).
- scripts/decode_stacktrace: only strip base path when a prefix of the path (bsc#1051510).
- scripts/gdb: fix lx-version string output (bsc#1051510).
- scripts/git_sort/git_sort.py:
- scsi: NCR5380: Always re-enable reselection interrupt (git-fixes).
- scsi: aacraid: Fix missing break in switch statement (git-fixes).
- scsi: aacraid: Fix performance issue on logical drives (git-fixes).
- scsi: aic94xx: fix an error code in aic94xx_init() (git-fixes).
- scsi: aic94xx: fix module loading (git-fixes).
- scsi: bfa: convert to strlcpy/strlcat (git-fixes).
- scsi: bnx2fc: Fix NULL dereference in error handling (git-fixes).
- scsi: bnx2fc: fix incorrect cast to u64 on shift operation (git-fixes).
- scsi: core: Fix race on creating sense cache (git-fixes).
- scsi: core: Synchronize request queue PM status only on successful resume (git-fixes).
- scsi: core: set result when the command cannot be dispatched (git-fixes).
- scsi: cxlflash: Mark expected switch fall-throughs (bsc#1148868).
- scsi: cxlflash: Prevent deadlock when adapter probe fails (git-fixes).
- scsi: esp_scsi: Track residual for PIO transfers (git-fixes) Also, mitigate kABI changes.
- scsi: fas216: fix sense buffer initialization (git-fixes).
- scsi: isci: initialize shost fully before calling scsi_add_host() (git-fixes).
- scsi: libfc: fix null pointer dereference on a null lport (git-fixes).
- scsi: libsas: Fix rphy phy_identifier for PHYs with end devices attached (git-fixes).
- scsi: mac_scsi: Fix pseudo DMA implementation, take 2 (git-fixes).
- scsi: mac_scsi: Increase PIO/PDMA transfer length threshold (git-fixes).
- scsi: megaraid: fix out-of-bound array accesses (git-fixes).
- scsi: megaraid_sas: Fix calculation of target ID (git-fixes).
- scsi: ncr5380: revert 'Increase register polling limit' (git-fixes).
- scsi: qedf: Add debug information for unsolicited processing (bsc#1149976).
- scsi: qedf: Add shutdown callback handler (bsc#1149976).
- scsi: qedf: Add support for 20 Gbps speed (bsc#1149976).
- scsi: qedf: Check both the FCF and fabric ID before servicing clear virtual link (bsc#1149976).
- scsi: qedf: Check for link state before processing LL2 packets and send fipvlan retries (bsc#1149976).
- scsi: qedf: Check for module unloading bit before processing link update AEN (bsc#1149976).
- scsi: qedf: Decrease the LL2 MTU size to 2500 (bsc#1149976).
- scsi: qedf: Fix race betwen fipvlan request and response path (bsc#1149976).
- scsi: qedf: Initiator fails to re-login to switch after link down (bsc#1149976).
- scsi: qedf: Print message during bailout conditions (bsc#1149976).
- scsi: qedf: Stop sending fipvlan request on unload (bsc#1149976).
- scsi: qedf: Update module description string (bsc#1149976).
- scsi: qedf: Update the driver version to 8.37.25.20 (bsc#1149976).
- scsi: qedf: Update the version to 8.42.3.0 (bsc#1149976).
- scsi: qedf: Use discovery list to traverse rports (bsc#1149976).
- scsi: qedf: remove memset/memcpy to nfunc and use func instead (git-fixes).
- scsi: qedf: remove set but not used variables (bsc#1149976).
- scsi: qedi: remove declaration of nvm_image from stack (git-fixes).
- scsi: qla2xxx: Add cleanup for PCI EEH recovery (bsc#1129424).
- scsi: qla2xxx: Avoid that qlt_send_resp_ctio() corrupts memory (git-fixes).
- scsi: qla2xxx: Fix a format specifier (git-fixes).
- scsi: qla2xxx: Fix an endian bug in fcpcmd_is_corrupted() (git-fixes).
- scsi: qla2xxx: Fix device staying in blocked state (git-fixes).
- scsi: qla2xxx: Fix error handling in qlt_alloc_qfull_cmd() (git-fixes).
- scsi: qla2xxx: Unregister chrdev if module initialization fails (git-fixes).
- scsi: qla4xxx: avoid freeing unallocated dma memory (git-fixes).
- scsi: raid_attrs: fix unused variable warning (git-fixes).
- scsi: scsi_dh_alua: Fix possible null-ptr-deref (git-fixes).
- scsi: sd: Defer spinning up drive while SANITIZE is in progress (git-fixes).
- scsi: sd: Fix a race between closing an sd device and sd I/O (git-fixes).
- scsi: sd: Fix cache_type_store() (git-fixes).
- scsi: sd: Optimal I/O size should be a multiple of physical block size (git-fixes).
- scsi: sd: Quiesce warning if device does not report optimal I/O size (git-fixes).
- scsi: sd: use mempool for discard special page (git-fixes).
- scsi: sd_zbc: Fix potential memory leak (git-fixes).
- scsi: smartpqi: unlock on error in pqi_submit_raid_request_synchronous() (git-fixes).
- scsi: sr: Avoid that opening a CD-ROM hangs with runtime power management enabled (git-fixes).
- scsi: ufs: Avoid runtime suspend possibly being blocked forever (git-fixes).
- scsi: ufs: Check that space was properly alloced in copy_query_response (git-fixes).
- scsi: ufs: Fix NULL pointer dereference in ufshcd_config_vreg_hpm() (git-fixes).
- scsi: ufs: Fix RX_TERMINATION_FORCE_ENABLE define value (git-fixes).
- scsi: ufs: fix wrong command type of UTRD for UFSHCI v2.1 (git-fixes).
- scsi: ufs: revert 'disable vccq if it's not needed by UFS device' (git-fixes).
- scsi: use dma_get_cache_alignment() as minimum DMA alignment (git-fixes).
- scsi: virtio_scsi: do not send sc payload with tmfs (git-fixes).
- sctp: change to hold sk after auth shkey is created successfully (networking-stable-19_07_02).
- serial: 8250: Fix TX interrupt handling condition (bsc#1051510).
- signal/cifs: Fix cifs_put_tcp_session to call send_sig instead of force_sig (bsc#1144333).
- sis900: fix TX completion (bsc#1051510).
- sky2: Disable MSI on ASUS P6T (bsc#1142496).
- smb2: fix missing files in root share directory listing (bsc#1112907, bsc#1144333).
- smb2: fix typo in definition of a few error flags (bsc#1144333).
- smb2: fix uninitialized variable bug in smb2_ioctl_query_info (bsc#1144333).
- smb3 - clean up debug output displaying network interfaces (bsc#1144333).
- smb3.1.1: Add GCM crypto to the encrypt and decrypt functions (bsc#1144333).
- smb3.11: replace a 4 with server-&gt;vals-&gt;header_preamble_size (bsc#1144333).
- smb311: Fix reconnect (bsc#1051510, bsc#1144333).
- smb311: Improve checking of negotiate security contexts (bsc#1051510, bsc#1144333).
- smb3: Add SMB3.1.1 GCM to negotiated crypto algorigthms (bsc#1144333).
- smb3: Add debug message later in smb2/smb3 reconnect path (bsc#1144333).
- smb3: Add defines for new negotiate contexts (bsc#1144333).
- smb3: Add dynamic trace points for various compounded smb3 ops (bsc#1144333).
- smb3: Add ftrace tracepoints for improved SMB3 debugging (bsc#1144333).
- smb3: Add handling for different FSCTL access flags (bsc#1144333).
- smb3: Add posix create context for smb3.11 posix mounts (bsc#1144333).
- smb3: Add protocol structs for change notify support (bsc#1144333).
- smb3: Add support for multidialect negotiate (SMB2.1 and later) (bsc#1051510, bsc#1144333).
- smb3: Add tracepoints for read, write and query_dir enter (bsc#1144333).
- smb3: Allow SMB3 FSCTL queries to be sent to server from tools (bsc#1144333).
- smb3: Allow persistent handle timeout to be configurable on mount (bsc#1144333).
- smb3: Allow query of symlinks stored as reparse points (bsc#1144333).
- smb3: Backup intent flag missing for directory opens with backupuid mounts (bsc#1051510, bsc#1144333).
- smb3: Backup intent flag missing from compounded ops (bsc#1144333).
- smb3: Clean up query symlink when reparse point (bsc#1144333).
- smb3: Cleanup license mess (bsc#1144333).
- smb3: Do not ignore O_SYNC/O_DSYNC and O_DIRECT flags (bsc#1085536, bsc#1144333).
- smb3: Do not send SMB3 SET_INFO if nothing changed (bsc#1051510, bsc#1144333).
- smb3: Fix 3.11 encryption to Windows and handle encrypted smb3 tcon (bsc#1051510, bsc#1144333).
- smb3: Fix SMB3.1.1 guest mounts to Samba (bsc#1051510, bsc#1144333).
- smb3: Fix deadlock in validate negotiate hits reconnect (bsc#1144333).
- smb3: Fix endian warning (bsc#1144333, bsc#1137884).
- smb3: Fix enumerating snapshots to Azure (bsc#1144333).
- smb3: Fix length checking of SMB3.11 negotiate request (bsc#1051510, bsc#1144333).
- smb3: Fix mode on mkdir on smb311 mounts (bsc#1144333).
- smb3: Fix potential memory leak when processing compound chain (bsc#1144333).
- smb3: Fix rmdir compounding regression to strict servers (bsc#1144333).
- smb3: Fix root directory when server returns inode number of zero (bsc#1051510, bsc#1144333).
- smb3: Kernel oops mounting a encryptData share with CONFIG_DEBUG_VIRTUAL (bsc#1144333).
- smb3: Log at least once if tree connect fails during reconnect (bsc#1144333).
- smb3: Number of requests sent should be displayed for SMB3 not just CIFS (bsc#1144333).
- smb3: Send netname context during negotiate protocol (bsc#1144333).
- smb3: Track total time spent on roundtrips for each SMB3 command (bsc#1144333).
- smb3: Update POSIX negotiate context with POSIX ctxt GUID (bsc#1144333).
- smb3: Validate negotiate request must always be signed (bsc#1064597, bsc#1144333).
- smb3: Warn user if trying to sign connection that authenticated as guest (bsc#1085536, bsc#1144333).
- smb3: add additional ftrace entry points for entry/exit to cifs.ko (bsc#1144333).
- smb3: add credits we receive from oplock/break PDUs (bsc#1144333).
- smb3: add debug for unexpected mid cancellation (bsc#1144333).
- smb3: add define for id for posix create context and corresponding struct (bsc#1144333).
- smb3: add dynamic trace point for query_info_enter/done (bsc#1144333).
- smb3: add dynamic trace point for smb3_cmd_enter (bsc#1144333).
- smb3: add dynamic tracepoint for timeout waiting for credits (bsc#1144333).
- smb3: add dynamic tracepoints for simple fallocate and zero range (bsc#1144333).
- smb3: add missing read completion trace point (bsc#1144333).
- smb3: add module alias for smb3 to cifs.ko (bsc#1144333).
- smb3: add new mount option to retrieve mode from special ACE (bsc#1144333).
- smb3: add reconnect tracepoints (bsc#1144333).
- smb3: add smb3.1.1 to default dialect list (bsc#1144333).
- smb3: add support for posix negotiate context (bsc#1144333).
- smb3: add support for statfs for smb3.1.1 posix extensions (bsc#1144333).
- smb3: add trace point for tree connection (bsc#1144333).
- smb3: add tracepoint for sending lease break responses to server (bsc#1144333).
- smb3: add tracepoint for session expired or deleted (bsc#1144333).
- smb3: add tracepoint for slow responses (bsc#1144333).
- smb3: add tracepoint to catch cases where credit refund of failed op overlaps reconnect (bsc#1144333).
- smb3: add tracepoints for query dir (bsc#1144333).
- smb3: add tracepoints for smb2/smb3 open (bsc#1144333).
- smb3: add way to control slow response threshold for logging and stats (bsc#1144333).
- smb3: allow more detailed protocol info on open files for debugging (bsc#1144333).
- smb3: allow posix mount option to enable new SMB311 protocol extensions (bsc#1144333).
- smb3: allow previous versions to be mounted with snapshot= mount parm (bsc#1144333).
- smb3: allow stats which track session and share reconnects to be reset (bsc#1051510, bsc#1144333).
- smb3: check for and properly advertise directory lease support (bsc#1051510, bsc#1144333).
- smb3: create smb3 equivalent alias for cifs pseudo-xattrs (bsc#1144333).
- smb3: directory sync should not return an error (bsc#1051510, bsc#1144333).
- smb3: display bytes_read and bytes_written in smb3 stats (bsc#1144333).
- smb3: display security information in /proc/fs/cifs/DebugData more accurately (bsc#1144333).
- smb3: display session id in debug data (bsc#1144333).
- smb3: display stats counters for number of slow commands (bsc#1144333).
- smb3: display volume serial number for shares in /proc/fs/cifs/DebugData (bsc#1144333).
- smb3: do not allow insecure cifs mounts when using smb3 (bsc#1144333).
- smb3: do not attempt cifs operation in smb3 query info error path (bsc#1051510, bsc#1144333).
- smb3: do not display confusing message on mount to Azure servers (bsc#1144333).
- smb3: do not display empty interface list (bsc#1144333).
- smb3: do not request leases in symlink creation and query (bsc#1051510, bsc#1144333).
- smb3: do not send compression info by default (bsc#1144333).
- smb3: enumerating snapshots was leaving part of the data off end (bsc#1051510, bsc#1144333).
- smb3: fill in statfs fsid and correct namelen (bsc#1112905, bsc#1144333).
- smb3: fix bytes_read statistics (bsc#1144333).
- smb3: fix corrupt path in subdirs on smb311 with posix (bsc#1144333).
- smb3: fix large reads on encrypted connections (bsc#1144333).
- smb3: fix lease break problem introduced by compounding (bsc#1144333).
- smb3: fix minor debug output for CONFIG_CIFS_STATS (bsc#1144333).
- smb3: fix redundant opens on root (bsc#1144333).
- smb3: fix reset of bytes read and written stats (bsc#1112906, bsc#1144333).
- smb3: fix various xid leaks (bsc#1051510, bsc#1144333).
- smb3: for kerberos mounts display the credential uid used (bsc#1144333).
- smb3: handle new statx fields (bsc#1085536, bsc#1144333).
- smb3: if max_credits is specified then display it in /proc/mounts (bsc#1144333).
- smb3: if server does not support posix do not allow posix mount option (bsc#1144333).
- smb3: improve dynamic tracing of open and posix mkdir (bsc#1144333).
- smb3: increase initial number of credits requested to allow write (bsc#1144333).
- smb3: make default i/o size for smb3 mounts larger (bsc#1144333).
- smb3: minor cleanup of compound_send_recv (bsc#1144333).
- smb3: minor debugging clarifications in rfc1001 len processing (bsc#1144333).
- smb3: minor missing defines relating to reparse points (bsc#1144333).
- smb3: missing defines and structs for reparse point handling (bsc#1144333).
- smb3: note that smb3.11 posix extensions mount option is experimental (bsc#1144333).
- smb3: on kerberos mount if server does not specify auth type use krb5 (bsc#1051510, bsc#1144333).
- smb3: on reconnect set PreviousSessionId field (bsc#1112899, bsc#1144333).
- smb3: optimize open to not send query file internal info (bsc#1144333).
- smb3: passthru query info does not check for SMB3 FSCTL passthru (bsc#1144333).
- smb3: print tree id in debugdata in proc to be able to help logging (bsc#1144333).
- smb3: query inode number on open via create context (bsc#1144333).
- smb3: remove noisy warning message on mount (bsc#1129664, bsc#1144333).
- smb3: remove per-session operations from per-tree connection stats (bsc#1144333).
- smb3: rename encryption_required to smb3_encryption_required (bsc#1144333).
- smb3: request more credits on normal (non-large read/write) ops (bsc#1144333).
- smb3: request more credits on tree connect (bsc#1144333).
- smb3: retry on STATUS_INSUFFICIENT_RESOURCES instead of failing write (bsc#1144333).
- smb3: send CAP_DFS capability during session setup (bsc#1144333).
- smb3: send backup intent on compounded query info (bsc#1144333).
- smb3: show number of current open files in /proc/fs/cifs/Stats (bsc#1144333).
- smb3: simplify code by removing CONFIG_CIFS_SMB311 (bsc#1051510, bsc#1144333).
- smb3: smbdirect no longer experimental (bsc#1144333).
- smb3: snapshot mounts are read-only and make sure info is displayable about the mount (bsc#1144333).
- smb3: track the instance of each session for debugging (bsc#1144333).
- smb3: trivial cleanup to smb2ops.c (bsc#1144333).
- smb3: update comment to clarify enumerating snapshots (bsc#1144333).
- smb3: update default requested iosize to 4MB from 1MB for recent dialects (bsc#1144333).
- smb: Validate negotiate (to protect against downgrade) even if signing off (bsc#1085536, bsc#1144333).
- smb: fix leak of validate negotiate info response buffer (bsc#1064597, bsc#1144333).
- smb: fix validate negotiate info uninitialised memory use (bsc#1064597, bsc#1144333).
- smbd: Make upper layer decide when to destroy the transport (bsc#1144333).
- smpboot: Place the __percpu annotation correctly (git fixes).
- soc: rockchip: power-domain: Add a sanity check on pd-&gt;num_clks (bsc#1144718,bsc#1144813).
- soc: rockchip: power-domain: Use of_clk_get_parent_count() instead of open coding (bsc#1144718,bsc#1144813).
- soc: rockchip: power-domain: use clk_bulk APIs (bsc#1144718,bsc#1144813).
- sound: fix a memory leak bug (bsc#1051510).
- spi: bcm2835aux: fix corruptions for longer spi transfers (bsc#1051510).
- spi: bcm2835aux: remove dangerous uncontrolled read of fifo (bsc#1051510).
- spi: bcm2835aux: unifying code between polling and interrupt driven code (bsc#1051510).
- st21nfca_connectivity_event_received: null check the allocation (bsc#1051510).
- st_nci_hci_connectivity_event_received: null check the allocation (bsc#1051510).
- staging: comedi: dt3000: Fix rounding up of timer divisor (bsc#1051510).
- staging: comedi: dt3000: Fix signed integer overflow 'divider * base' (bsc#1051510).
- supported.conf: Add missing modules (bsc#1066369).
- supported.conf: Add missing modules (bsc#1066369).
- supported.conf: Add raspberrypi-cpufreq (jsc#SLE-7294).
- supported.conf: Remove duplicate drivers/ata/libahci_platform
- supported.conf: Sort alphabetically, align comments.
- supported.conf: Sort alphabetically, align comments.
- tcp: Reset bytes_acked and bytes_received when disconnecting (networking-stable-19_07_25).
- test_firmware: fix a memory leak bug (bsc#1051510).
- tipc: change to use register_pernet_device (networking-stable-19_07_02).
- tpm/tpm_i2c_atmel: Return -E2BIG when the transfer is incomplete (bsc#1082555).
- tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations (bsc#1082555).
- tpm: Fix off-by-one when reading binary_bios_measurements (bsc#1082555).
- tpm: Unify the send callback behaviour (bsc#1082555).
- tpm: vtpm_proxy: Suppress error logging when in closed state (bsc#1082555).
- tracing: Fix header include guards in trace event headers (bsc#1144474).
- treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 231 (bsc#1144333).
- tty/ldsem, locking/rwsem: Add missing ACQUIRE to read_failed sleep loop (bsc#1051510).
- tty/serial: digicolor: Fix digicolor-usart already registered warning (bsc#1051510).
- tty: max310x: Fix invalid baudrate divisors calculator (bsc#1051510).
- tty: serial: msm_serial: avoid system lockup condition (bsc#1051510).
- tua6100: Avoid build warnings (bsc#1051510).
- tun: wake up waitqueues after IFF_UP is set (networking-stable-19_07_02).
- udf: Fix incorrect final NOT_ALLOCATED (hole) extent length (bsc#1148617).
- update internal version number for cifs.ko (bsc#1144333).
- usb-storage: Add new JMS567 revision to unusual_devs (bsc#1051510).
- usb: CDC: fix sanity checks in CDC union parser (bsc#1142635).
- usb: Handle USB3 remote wakeup for LPM enabled devices correctly (bsc#1051510).
- usb: cdc-acm: make sure a refcount is taken early enough (bsc#1142635).
- usb: cdc-wdm: fix race between write and disconnect due to flag abuse (bsc#1051510).
- usb: chipidea: udc: do not do hardware access if gadget has stopped (bsc#1051510).
- usb: core: Fix races in character device registration and deregistraion (bsc#1051510).
- usb: core: hub: Disable hub-initiated U1/U2 (bsc#1051510).
- usb: gadget: composite: Clear 'suspended' on reset/disconnect (bsc#1051510).
- usb: gadget: udc: renesas_usb3: Fix sysfs interface of 'role' (bsc#1142635).
- usb: host: fotg2: restart hcd after port reset (bsc#1051510).
- usb: host: ohci: fix a race condition between shutdown and irq (bsc#1051510).
- usb: host: xhci-rcar: Fix timeout in xhci_suspend() (bsc#1051510).
- usb: host: xhci: rcar: Fix typo in compatible string matching (bsc#1051510).
- usb: iowarrior: fix deadlock on disconnect (bsc#1051510).
- usb: serial: option: Add Motorola modem UARTs (bsc#1051510).
- usb: serial: option: Add support for ZTE MF871A (bsc#1051510).
- usb: serial: option: add D-Link DWM-222 device ID (bsc#1051510).
- usb: serial: option: add the BroadMobi BM818 card (bsc#1051510).
- usb: storage: ums-realtek: Update module parameter description for auto_delink_en (bsc#1051510).
- usb: storage: ums-realtek: Whitelist auto-delink support (bsc#1051510).
- usb: usbfs: fix double-free of usb memory upon submiturb error (bsc#1051510).
- usb: wusbcore: fix unbalanced get/put cluster_id (bsc#1051510).
- usb: yurex: Fix use-after-free in yurex_delete (bsc#1051510).
- vfs: fix page locking deadlocks when deduping files (bsc#1148619).
- vmci: Release resource if the work is already queued (bsc#1051510).
- vrf: make sure skb-&gt;data contains ip header to make routing (networking-stable-19_07_25).
- watchdog: bcm2835_wdt: Fix module autoload (bsc#1051510).
- watchdog: core: fix null pointer dereference when releasing cdev (bsc#1051510).
- watchdog: f71808e_wdt: fix F81866 bit operation (bsc#1051510).
- watchdog: fix compile time error of pretimeout governors (bsc#1051510).
- wimax/i2400m: fix a memory leak bug (bsc#1051510).
- x86/boot: Fix memory leak in default_get_smp_config() (bsc#1114279).
- x86/entry/64/compat: Fix stack switching for XEN PV (bsc#1108382).
- x86/microcode: Fix the microcode load on CPU hotplug for real (bsc#1114279).
- x86/mm: Check for pfn instead of page in vmalloc_sync_one() (bsc#1118689).
- x86/mm: Sync also unmappings in vmalloc_sync_all() (bsc#1118689).
- x86/speculation/mds: Apply more accurate check on hypervisor platform (bsc#1114279).
- x86/speculation: Allow guests to use SSBD even if host does not (bsc#1114279).
- x86/unwind: Add hardcoded ORC entry for NULL (bsc#1114279).
- x86/unwind: Handle NULL pointer calls better in frame unwinder (bsc#1114279).
- xen/swiotlb: fix condition for calling xen_destroy_contiguous_region() (bsc#1065600).
- xfrm: Fix NULL pointer dereference in xfrm_input when skb_dst_force clears the dst_entry (bsc#1143300).
- xfrm: Fix NULL pointer dereference when skb_dst_force clears the dst_entry (bsc#1143300).
- xfrm: Fix bucket count reported to userspace (bsc#1143300).
- xfrm: Fix error return code in xfrm_output_one() (bsc#1143300).
- xfs: do not crash on null attr fork xfs_bmapi_read (bsc#1148035).
- xfs: do not trip over uninitialized buffer on extent read of corrupted inode (bsc#1149053).
- xfs: dump transaction usage details on log reservation overrun (bsc#1145235).
- xfs: eliminate duplicate icreate tx reservation functions (bsc#1145235).
- xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT (bsc#1148032).
- xfs: fix semicolon.cocci warnings (bsc#1145235).
- xfs: fix up agi unlinked list reservations (bsc#1145235).
- xfs: include an allocfree res for inobt modifications (bsc#1145235).
- xfs: include inobt buffers in ifree tx log reservation (bsc#1145235).
- xfs: print transaction log reservation on overrun (bsc#1145235).
- xfs: refactor inode chunk alloc/free tx reservation (bsc#1145235).
- xfs: refactor xlog_cil_insert_items() to facilitate transaction dump (bsc#1145235).
- xfs: remove more ondisk directory corruption asserts (bsc#1148034).
- xfs: separate shutdown from ticket reservation print helper (bsc#1145235).
- xfs: truncate transaction does not modify the inobt (bsc#1145235).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-20"/>
	<updated date="2019-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1047238">SUSE bug 1047238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050911">SUSE bug 1050911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051510">SUSE bug 1051510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054914">SUSE bug 1054914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055117">SUSE bug 1055117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056686">SUSE bug 1056686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060662">SUSE bug 1060662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061840">SUSE bug 1061840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061843">SUSE bug 1061843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064597">SUSE bug 1064597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064701">SUSE bug 1064701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066369">SUSE bug 1066369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071009">SUSE bug 1071009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071306">SUSE bug 1071306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078248">SUSE bug 1078248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082555">SUSE bug 1082555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085030">SUSE bug 1085030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085536">SUSE bug 1085536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085539">SUSE bug 1085539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086103">SUSE bug 1086103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087092">SUSE bug 1087092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090734">SUSE bug 1090734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091171">SUSE bug 1091171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093205">SUSE bug 1093205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102097">SUSE bug 1102097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104902">SUSE bug 1104902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106061">SUSE bug 1106061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106284">SUSE bug 1106284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106434">SUSE bug 1106434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108382">SUSE bug 1108382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112178">SUSE bug 1112178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112894">SUSE bug 1112894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112899">SUSE bug 1112899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112902">SUSE bug 1112902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112903">SUSE bug 1112903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112905">SUSE bug 1112905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112906">SUSE bug 1112906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112907">SUSE bug 1112907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113722">SUSE bug 1113722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114279">SUSE bug 1114279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114542">SUSE bug 1114542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118689">SUSE bug 1118689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119086">SUSE bug 1119086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120876">SUSE bug 1120876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120902">SUSE bug 1120902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120937">SUSE bug 1120937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123105">SUSE bug 1123105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123959">SUSE bug 1123959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124370">SUSE bug 1124370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129424">SUSE bug 1129424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129519">SUSE bug 1129519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129664">SUSE bug 1129664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131107">SUSE bug 1131107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131281">SUSE bug 1131281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131565">SUSE bug 1131565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133021">SUSE bug 1133021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134291">SUSE bug 1134291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134881">SUSE bug 1134881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134882">SUSE bug 1134882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135219">SUSE bug 1135219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135642">SUSE bug 1135642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135897">SUSE bug 1135897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136261">SUSE bug 1136261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137069">SUSE bug 1137069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137884">SUSE bug 1137884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138539">SUSE bug 1138539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139020">SUSE bug 1139020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139021">SUSE bug 1139021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139101">SUSE bug 1139101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139500">SUSE bug 1139500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140012">SUSE bug 1140012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140426">SUSE bug 1140426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140487">SUSE bug 1140487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141013">SUSE bug 1141013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141450">SUSE bug 1141450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141543">SUSE bug 1141543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141554">SUSE bug 1141554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142019">SUSE bug 1142019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142076">SUSE bug 1142076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142109">SUSE bug 1142109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142117">SUSE bug 1142117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142118">SUSE bug 1142118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142119">SUSE bug 1142119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142496">SUSE bug 1142496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142541">SUSE bug 1142541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142635">SUSE bug 1142635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142685">SUSE bug 1142685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142701">SUSE bug 1142701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142857">SUSE bug 1142857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143300">SUSE bug 1143300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143466">SUSE bug 1143466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143765">SUSE bug 1143765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143841">SUSE bug 1143841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143843">SUSE bug 1143843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144123">SUSE bug 1144123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144333">SUSE bug 1144333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144474">SUSE bug 1144474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144518">SUSE bug 1144518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144718">SUSE bug 1144718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144813">SUSE bug 1144813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144880">SUSE bug 1144880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144886">SUSE bug 1144886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144912">SUSE bug 1144912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144920">SUSE bug 1144920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144979">SUSE bug 1144979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145010">SUSE bug 1145010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145024">SUSE bug 1145024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145051">SUSE bug 1145051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145059">SUSE bug 1145059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145189">SUSE bug 1145189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145235">SUSE bug 1145235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145300">SUSE bug 1145300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145302">SUSE bug 1145302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145388">SUSE bug 1145388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145389">SUSE bug 1145389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145390">SUSE bug 1145390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145391">SUSE bug 1145391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145392">SUSE bug 1145392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145393">SUSE bug 1145393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145394">SUSE bug 1145394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145395">SUSE bug 1145395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145396">SUSE bug 1145396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145397">SUSE bug 1145397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145408">SUSE bug 1145408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145409">SUSE bug 1145409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145661">SUSE bug 1145661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145678">SUSE bug 1145678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145687">SUSE bug 1145687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145920">SUSE bug 1145920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145922">SUSE bug 1145922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145934">SUSE bug 1145934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145937">SUSE bug 1145937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145940">SUSE bug 1145940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145941">SUSE bug 1145941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145942">SUSE bug 1145942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146074">SUSE bug 1146074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146084">SUSE bug 1146084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146163">SUSE bug 1146163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146285">SUSE bug 1146285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146346">SUSE bug 1146346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146351">SUSE bug 1146351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146352">SUSE bug 1146352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146361">SUSE bug 1146361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146368">SUSE bug 1146368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146376">SUSE bug 1146376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146378">SUSE bug 1146378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146381">SUSE bug 1146381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146391">SUSE bug 1146391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146399">SUSE bug 1146399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146413">SUSE bug 1146413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146425">SUSE bug 1146425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146516">SUSE bug 1146516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146524">SUSE bug 1146524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146526">SUSE bug 1146526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146529">SUSE bug 1146529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146531">SUSE bug 1146531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146543">SUSE bug 1146543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146547">SUSE bug 1146547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146550">SUSE bug 1146550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146575">SUSE bug 1146575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146589">SUSE bug 1146589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146678">SUSE bug 1146678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146938">SUSE bug 1146938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148031">SUSE bug 1148031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148032">SUSE bug 1148032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148033">SUSE bug 1148033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148034">SUSE bug 1148034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148035">SUSE bug 1148035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148093">SUSE bug 1148093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148133">SUSE bug 1148133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148192">SUSE bug 1148192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148196">SUSE bug 1148196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148198">SUSE bug 1148198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148202">SUSE bug 1148202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148303">SUSE bug 1148303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148363">SUSE bug 1148363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148379">SUSE bug 1148379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148394">SUSE bug 1148394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148527">SUSE bug 1148527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148574">SUSE bug 1148574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148616">SUSE bug 1148616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148617">SUSE bug 1148617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148619">SUSE bug 1148619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148698">SUSE bug 1148698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148859">SUSE bug 1148859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148868">SUSE bug 1148868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149053">SUSE bug 1149053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149083">SUSE bug 1149083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149104">SUSE bug 1149104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149105">SUSE bug 1149105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149106">SUSE bug 1149106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149197">SUSE bug 1149197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149214">SUSE bug 1149214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149224">SUSE bug 1149224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149325">SUSE bug 1149325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149376">SUSE bug 1149376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149413">SUSE bug 1149413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149418">SUSE bug 1149418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149424">SUSE bug 1149424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149522">SUSE bug 1149522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149527">SUSE bug 1149527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149539">SUSE bug 1149539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149552">SUSE bug 1149552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149591">SUSE bug 1149591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149602">SUSE bug 1149602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149612">SUSE bug 1149612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149626">SUSE bug 1149626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149652">SUSE bug 1149652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149713">SUSE bug 1149713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149940">SUSE bug 1149940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149959">SUSE bug 1149959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149963">SUSE bug 1149963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149976">SUSE bug 1149976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150025">SUSE bug 1150025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150033">SUSE bug 1150033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150112">SUSE bug 1150112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150562">SUSE bug 1150562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150727">SUSE bug 1150727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150860">SUSE bug 1150860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150861">SUSE bug 1150861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150933">SUSE bug 1150933</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-18551/">CVE-2017-18551</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20976/">CVE-2018-20976</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-21008/">CVE-2018-21008</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10207/">CVE-2019-10207</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14814/">CVE-2019-14814</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14815/">CVE-2019-14815</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14816/">CVE-2019-14816</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15030/">CVE-2019-15030</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15031/">CVE-2019-15031</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15090/">CVE-2019-15090</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15098/">CVE-2019-15098</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15099/">CVE-2019-15099</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15117/">CVE-2019-15117</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15118/">CVE-2019-15118</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15211/">CVE-2019-15211</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15212/">CVE-2019-15212</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15214/">CVE-2019-15214</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15215/">CVE-2019-15215</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15216/">CVE-2019-15216</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15217/">CVE-2019-15217</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15218/">CVE-2019-15218</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15219/">CVE-2019-15219</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15220/">CVE-2019-15220</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15221/">CVE-2019-15221</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15222/">CVE-2019-15222</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15239/">CVE-2019-15239</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15290/">CVE-2019-15290</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15292/">CVE-2019-15292</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15538/">CVE-2019-15538</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15666/">CVE-2019-15666</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15902/">CVE-2019-15902</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15917/">CVE-2019-15917</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15919/">CVE-2019-15919</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15920/">CVE-2019-15920</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15921/">CVE-2019-15921</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15924/">CVE-2019-15924</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15926/">CVE-2019-15926</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15927/">CVE-2019-15927</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9456/">CVE-2019-9456</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522205" comment="kernel-default-4.12.14-95.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522206" comment="kernel-default-devel-4.12.14-95.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522207" comment="kernel-default-extra-4.12.14-95.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522208" comment="kernel-devel-4.12.14-95.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522209" comment="kernel-macros-4.12.14-95.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522210" comment="kernel-source-4.12.14-95.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522211" comment="kernel-syms-4.12.14-95.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78808" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1120644" ref_url="https://bugzilla.suse.com/1120644" source="BUGZILLA"/>
		<reference ref_id="1122191" ref_url="https://bugzilla.suse.com/1122191" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20406" ref_url="https://www.suse.com/security/cve/CVE-2018-20406/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005085.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

Security issue fixed:

- CVE-2019-5010: Fixed a denial-of-service vulnerability in the X509 certificate parser (bsc#1122191)
- CVE-2018-20406: Fixed a integer overflow via a large LONG_BINPUT (bsc#1120644)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-05"/>
	<updated date="2019-02-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120644">SUSE bug 1120644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20406/">CVE-2018-20406</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521597" comment="libpython3_4m1_0-3.4.6-25.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521598" comment="python3-3.4.6-25.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521599" comment="python3-base-3.4.6-25.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521600" comment="python3-curses-3.4.6-25.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78809" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1149294" ref_url="https://bugzilla.suse.com/1149294" source="BUGZILLA"/>
		<reference ref_id="1149295" ref_url="https://bugzilla.suse.com/1149295" source="BUGZILLA"/>
		<reference ref_id="1149296" ref_url="https://bugzilla.suse.com/1149296" source="BUGZILLA"/>
		<reference ref_id="1149297" ref_url="https://bugzilla.suse.com/1149297" source="BUGZILLA"/>
		<reference ref_id="1149298" ref_url="https://bugzilla.suse.com/1149298" source="BUGZILLA"/>
		<reference ref_id="1149299" ref_url="https://bugzilla.suse.com/1149299" source="BUGZILLA"/>
		<reference ref_id="1149303" ref_url="https://bugzilla.suse.com/1149303" source="BUGZILLA"/>
		<reference ref_id="1149304" ref_url="https://bugzilla.suse.com/1149304" source="BUGZILLA"/>
		<reference ref_id="1149324" ref_url="https://bugzilla.suse.com/1149324" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to ESR 60.9 fixes the following issues:

Security issues fixed:

- CVE-2019-11742: Fixed a same-origin policy violation involving SVG filters and canvas to steal cross-origin images. (bsc#1149303)
- CVE-2019-11746: Fixed a use-after-free while manipulating video. (bsc#1149297)
- CVE-2019-11744: Fixed an XSS caused by breaking out of title and textarea elements using innerHTML. (bsc#1149304)
- CVE-2019-11753: Fixed a privilege escalation with Mozilla Maintenance Service in custom Firefox installation location. (bsc#1149295)
- CVE-2019-11752: Fixed a use-after-free while extracting a key value in IndexedDB. (bsc#1149296)
- CVE-2019-11743: Fixed a timing side-channel attack on cross-origin information, utilizing unload event attributes. (bsc#1149298)
- CVE-2019-11740: Fixed several memory safety bugs. (bsc#1149299)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-23"/>
	<updated date="2019-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149294">SUSE bug 1149294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149295">SUSE bug 1149295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149296">SUSE bug 1149296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149297">SUSE bug 1149297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149298">SUSE bug 1149298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149299">SUSE bug 1149299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149303">SUSE bug 1149303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149304">SUSE bug 1149304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522212" comment="MozillaFirefox-60.9.0-109.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522213" comment="MozillaFirefox-translations-common-60.9.0-109.86.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78810" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1149429" ref_url="https://bugzilla.suse.com/1149429" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005955.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

Security issue fixed:

- CVE-2019-15903: Fixed a heap-based buffer over-read caused by crafted XML documents. (bsc#1149429)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-23"/>
	<updated date="2019-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149429">SUSE bug 1149429</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522214" comment="expat-2.1.0-21.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522215" comment="libexpat1-2.1.0-21.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522216" comment="libexpat1-32bit-2.1.0-21.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78811" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1146569" ref_url="https://bugzilla.suse.com/1146569" source="BUGZILLA"/>
		<reference ref_id="1146571" ref_url="https://bugzilla.suse.com/1146571" source="BUGZILLA"/>
		<reference ref_id="1146572" ref_url="https://bugzilla.suse.com/1146572" source="BUGZILLA"/>
		<reference ref_id="1146702" ref_url="https://bugzilla.suse.com/1146702" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15142" ref_url="https://www.suse.com/security/cve/CVE-2019-15142/" source="CVE"/>
		<reference ref_id="CVE-2019-15143" ref_url="https://www.suse.com/security/cve/CVE-2019-15143/" source="CVE"/>
		<reference ref_id="CVE-2019-15144" ref_url="https://www.suse.com/security/cve/CVE-2019-15144/" source="CVE"/>
		<reference ref_id="CVE-2019-15145" ref_url="https://www.suse.com/security/cve/CVE-2019-15145/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005957.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

Security issues fixed:

- CVE-2019-15142: Fixed heap-based buffer over-read (bsc#1146702).
- CVE-2019-15143: Fixed resource exhaustion caused by corrupted image files (bsc#1146569).
- CVE-2019-15144: Fixed denial-of-service caused by crafted PBM image files (bsc#1146571).
- CVE-2019-15145: Fixed out-of-bounds read caused by corrupted JB2 image files (bsc#1146572).
- Fixed segfault when libtiff encounters corrupted TIFF (upstream issue #295).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-24"/>
	<updated date="2019-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1146569">SUSE bug 1146569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146571">SUSE bug 1146571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146572">SUSE bug 1146572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146702">SUSE bug 1146702</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15142/">CVE-2019-15142</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15143/">CVE-2019-15143</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15144/">CVE-2019-15144</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15145/">CVE-2019-15145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522217" comment="libdjvulibre21-3.5.25.3-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78812" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1129180" ref_url="https://bugzilla.suse.com/1129180" source="BUGZILLA"/>
		<reference ref_id="1131863" ref_url="https://bugzilla.suse.com/1131863" source="BUGZILLA"/>
		<reference ref_id="1134156" ref_url="https://bugzilla.suse.com/1134156" source="BUGZILLA"/>
		<reference ref_id="1140359" ref_url="https://bugzilla.suse.com/1140359" source="BUGZILLA"/>
		<reference ref_id="1146882" ref_url="https://bugzilla.suse.com/1146882" source="BUGZILLA"/>
		<reference ref_id="1146884" ref_url="https://bugzilla.suse.com/1146884" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12973" ref_url="https://www.suse.com/security/cve/CVE-2019-12973/" source="CVE"/>
		<reference ref_id="CVE-2019-14811" ref_url="https://www.suse.com/security/cve/CVE-2019-14811/" source="CVE"/>
		<reference ref_id="CVE-2019-14812" ref_url="https://www.suse.com/security/cve/CVE-2019-14812/" source="CVE"/>
		<reference ref_id="CVE-2019-14813" ref_url="https://www.suse.com/security/cve/CVE-2019-14813/" source="CVE"/>
		<reference ref_id="CVE-2019-14817" ref_url="https://www.suse.com/security/cve/CVE-2019-14817/" source="CVE"/>
		<reference ref_id="CVE-2019-3835" ref_url="https://www.suse.com/security/cve/CVE-2019-3835/" source="CVE"/>
		<reference ref_id="CVE-2019-3839" ref_url="https://www.suse.com/security/cve/CVE-2019-3839/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<description>
This update for ghostscript to 9.27 fixes the following issues:

Security issues fixed:

- CVE-2019-3835: Fixed an unauthorized file system access caused by an available superexec operator.  (bsc#1129180)
- CVE-2019-3839: Fixed an unauthorized file system access caused by available privileged operators. (bsc#1134156)
- CVE-2019-12973: Fixed a denial-of-service vulnerability in the OpenJPEG function opj_t1_encode_cblks. (bsc#1140359)
- CVE-2019-14811: Fixed a safer mode bypass by .forceput exposure in .pdf_hook_DSC_Creator. (bsc#1146882)
- CVE-2019-14812: Fixed a safer mode bypass by .forceput exposure in setuserparams. (bsc#1146882)
- CVE-2019-14813: Fixed a safer mode bypass by .forceput exposure in setsystemparams. (bsc#1146882)
- CVE-2019-14817: Fixed a safer mode bypass by .forceput exposure in .pdfexectoken and other procedures. (bsc#1146884)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-26"/>
	<updated date="2019-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129180">SUSE bug 1129180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131863">SUSE bug 1131863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134156">SUSE bug 1134156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140359">SUSE bug 1140359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146882">SUSE bug 1146882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146884">SUSE bug 1146884</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12973/">CVE-2019-12973</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14811/">CVE-2019-14811</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14812/">CVE-2019-14812</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14813/">CVE-2019-14813</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14817/">CVE-2019-14817</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3835/">CVE-2019-3835</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3839/">CVE-2019-3839</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522218" comment="ghostscript-9.27-23.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522219" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78813" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1124847" ref_url="https://bugzilla.suse.com/1124847" source="BUGZILLA"/>
		<reference ref_id="1141093" ref_url="https://bugzilla.suse.com/1141093" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13050" ref_url="https://www.suse.com/security/cve/CVE-2019-13050/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005971.html" source="SUSE-SU"/>
		<description>
This update for gpg2 fixes the following issues:

Security issue fixed:

- CVE-2019-13050: Fixed denial-of-service attacks via big keys. (bsc#1141093)

Non-security issue fixed:

- Allow coredumps in X11 desktop sessions (bsc#1124847).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-27"/>
	<updated date="2019-09-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124847">SUSE bug 1124847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141093">SUSE bug 1141093</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13050/">CVE-2019-13050</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522220" comment="gpg2-2.0.24-9.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522221" comment="gpg2-lang-2.0.24-9.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78814" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1104129" ref_url="https://bugzilla.suse.com/1104129" source="BUGZILLA"/>
		<reference ref_id="1118367" ref_url="https://bugzilla.suse.com/1118367" source="BUGZILLA"/>
		<reference ref_id="1118368" ref_url="https://bugzilla.suse.com/1118368" source="BUGZILLA"/>
		<reference ref_id="1126068" ref_url="https://bugzilla.suse.com/1126068" source="BUGZILLA"/>
		<reference ref_id="1126069" ref_url="https://bugzilla.suse.com/1126069" source="BUGZILLA"/>
		<reference ref_id="1128220" ref_url="https://bugzilla.suse.com/1128220" source="BUGZILLA"/>
		<reference ref_id="1133185" ref_url="https://bugzilla.suse.com/1133185" source="BUGZILLA"/>
		<reference ref_id="1138687" ref_url="https://bugzilla.suse.com/1138687" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5740" ref_url="https://www.suse.com/security/cve/CVE-2018-5740/" source="CVE"/>
		<reference ref_id="CVE-2018-5743" ref_url="https://www.suse.com/security/cve/CVE-2018-5743/" source="CVE"/>
		<reference ref_id="CVE-2018-5745" ref_url="https://www.suse.com/security/cve/CVE-2018-5745/" source="CVE"/>
		<reference ref_id="CVE-2019-6465" ref_url="https://www.suse.com/security/cve/CVE-2019-6465/" source="CVE"/>
		<reference ref_id="CVE-2019-6471" ref_url="https://www.suse.com/security/cve/CVE-2019-6471/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005975.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

Security issues fixed:

- CVE-2019-6465: Fixed an issue where controls for zone transfers may not be properly applied to Dynamically Loadable Zones (bsc#1126069).
- CVE-2019-6471: Fixed a reachable assert in dispatch.c. (bsc#1138687)
- CVE-2018-5745: Fixed a denial of service vulnerability if a trust anchor rolls over to an unsupported key algorithm when using managed-keys (bsc#1126068).
- CVE-2018-5743: Fixed a denial of service vulnerability which could be caused by to many simultaneous TCP connections (bsc#1133185).
- CVE-2018-5740: Fixed a denial of service vulnerability in the 'deny-answer-aliases' feature (bsc#1104129).

Non-security issues fixed:

- Don't rely on /etc/insserv.conf anymore for proper dependencies against 
  nss-lookup.target in named.service and lwresd.service (bsc#1118367, bsc#1118368).
- Fix FIPS related regression (bsc#1128220).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-01"/>
	<updated date="2019-10-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104129">SUSE bug 1104129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118367">SUSE bug 1118367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118368">SUSE bug 1118368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126068">SUSE bug 1126068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126069">SUSE bug 1126069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128220">SUSE bug 1128220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133185">SUSE bug 1133185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138687">SUSE bug 1138687</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5740/">CVE-2018-5740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5743/">CVE-2018-5743</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5745/">CVE-2018-5745</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6465/">CVE-2019-6465</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6471/">CVE-2019-6471</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522222" comment="bind-utils-9.11.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522223" comment="libbind9-160-9.11.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522224" comment="libdns169-9.11.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522225" comment="libirs160-9.11.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522226" comment="libisc166-9.11.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522227" comment="libisc166-32bit-9.11.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522228" comment="libisccc160-9.11.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522229" comment="libisccfg160-9.11.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522230" comment="liblwres160-9.11.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522231" comment="python-bind-9.11.2-3.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78815" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_0_0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1131291" ref_url="https://bugzilla.suse.com/1131291" source="BUGZILLA"/>
		<reference ref_id="1150003" ref_url="https://bugzilla.suse.com/1150003" source="BUGZILLA"/>
		<reference ref_id="1150250" ref_url="https://bugzilla.suse.com/1150250" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005974.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_0_0 fixes the following issues:

OpenSSL Security Advisory [10 September 2019]

* CVE-2019-1547: Added EC_GROUP_set_generator side channel attack avoidance. (bsc#1150003)
* CVE-2019-1563: Fixed Bleichenbacher attack against cms/pkcs7 encryption transported key (bsc#1150250)

In addition fixed invalid curve attacks by validating that an EC point lies on the curve (bsc#1131291).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-01"/>
	<updated date="2019-10-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1131291">SUSE bug 1131291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150003">SUSE bug 1150003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150250">SUSE bug 1150250</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522232" comment="libopenssl-1_0_0-devel-1.0.2p-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522233" comment="libopenssl1_0_0-1.0.2p-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522234" comment="libopenssl1_0_0-32bit-1.0.2p-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522235" comment="openssl-1_0_0-1.0.2p-3.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78816" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1148987" ref_url="https://bugzilla.suse.com/1148987" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13627" ref_url="https://www.suse.com/security/cve/CVE-2019-13627/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005976.html" source="SUSE-SU"/>
		<description>
This update for libgcrypt fixes the following issues:

Security issues fixed:
	  
- CVE-2019-13627: Mitigated ECDSA timing attack. (bsc#1148987)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-01"/>
	<updated date="2019-10-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1148987">SUSE bug 1148987</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13627/">CVE-2019-13627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522236" comment="libgcrypt20-1.6.1-16.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522237" comment="libgcrypt20-32bit-1.6.1-16.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78817" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1010783" ref_url="https://bugzilla.suse.com/1010783" source="BUGZILLA"/>
		<reference ref_id="1117505" ref_url="https://bugzilla.suse.com/1117505" source="BUGZILLA"/>
		<reference ref_id="1117507" ref_url="https://bugzilla.suse.com/1117507" source="BUGZILLA"/>
		<reference ref_id="1117508" ref_url="https://bugzilla.suse.com/1117508" source="BUGZILLA"/>
		<reference ref_id="1117511" ref_url="https://bugzilla.suse.com/1117511" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9396" ref_url="https://www.suse.com/security/cve/CVE-2016-9396/" source="CVE"/>
		<reference ref_id="CVE-2018-19539" ref_url="https://www.suse.com/security/cve/CVE-2018-19539/" source="CVE"/>
		<reference ref_id="CVE-2018-19540" ref_url="https://www.suse.com/security/cve/CVE-2018-19540/" source="CVE"/>
		<reference ref_id="CVE-2018-19541" ref_url="https://www.suse.com/security/cve/CVE-2018-19541/" source="CVE"/>
		<reference ref_id="CVE-2018-19542" ref_url="https://www.suse.com/security/cve/CVE-2018-19542/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005977.html" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

Security issues fixed:

- CVE-2018-19540: Fixed  a heap based overflow in jas_icctxtdesc_input (bsc#1117508).
- CVE-2018-19541: Fix heap based overread in jas_image_depalettize (bsc#1117507).
- CVE-2018-19542: Fixed a denial of service in jp2_decode (bsc#1117505).
- CVE-2018-19539: Fixed a denial of service in jas_image_readcmpt (bsc#1117511).
- CVE-2016-9396: Fixed a denial of service in jpc_cox_getcompparms (bsc#1010783).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-02"/>
	<updated date="2019-10-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010783">SUSE bug 1010783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117505">SUSE bug 1117505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117507">SUSE bug 1117507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117508">SUSE bug 1117508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117511">SUSE bug 1117511</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9396/">CVE-2016-9396</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19539/">CVE-2018-19539</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19540/">CVE-2018-19540</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19541/">CVE-2018-19541</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19542/">CVE-2018-19542</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522238" comment="libjasper1-1.900.14-195.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522239" comment="libjasper1-32bit-1.900.14-195.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78818" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1150137" ref_url="https://bugzilla.suse.com/1150137" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16168" ref_url="https://www.suse.com/security/cve/CVE-2019-16168/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005984.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

Security issue fixed:

- CVE-2019-16168: Fixed improper validation of sqlite_stat1 field that could lead to denial of service (bsc#1150137).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-03"/>
	<updated date="2019-10-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150137">SUSE bug 1150137</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16168/">CVE-2019-16168</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522240" comment="libsqlite3-0-3.8.10.2-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522241" comment="libsqlite3-0-32bit-3.8.10.2-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522242" comment="sqlite3-3.8.10.2-9.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78819" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl098 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1150003" ref_url="https://bugzilla.suse.com/1150003" source="BUGZILLA"/>
		<reference ref_id="1150250" ref_url="https://bugzilla.suse.com/1150250" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005992.html" source="SUSE-SU"/>
		<description>
This update for compat-openssl098 fixes the following issues:

OpenSSL Security Advisory [10 September 2019]

- CVE-2019-1547: Added EC_GROUP_set_generator side channel attack avoidance (bsc#1150003).
- CVE-2019-1563: Fixed Bleichenbacher attack against cms/pkcs7 encryption transported key (bsc#1150250).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-04"/>
	<updated date="2019-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150003">SUSE bug 1150003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150250">SUSE bug 1150250</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522243" comment="libopenssl0_9_8-0.9.8j-106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522244" comment="libopenssl0_9_8-32bit-0.9.8j-106.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78820" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1087200" ref_url="https://bugzilla.suse.com/1087200" source="BUGZILLA"/>
		<reference ref_id="1109465" ref_url="https://bugzilla.suse.com/1109465" source="BUGZILLA"/>
		<reference ref_id="1117473" ref_url="https://bugzilla.suse.com/1117473" source="BUGZILLA"/>
		<reference ref_id="1123482" ref_url="https://bugzilla.suse.com/1123482" source="BUGZILLA"/>
		<reference ref_id="1124525" ref_url="https://bugzilla.suse.com/1124525" source="BUGZILLA"/>
		<reference ref_id="1133810" ref_url="https://bugzilla.suse.com/1133810" source="BUGZILLA"/>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="1145665" ref_url="https://bugzilla.suse.com/1145665" source="BUGZILLA"/>
		<reference ref_id="1149323" ref_url="https://bugzilla.suse.com/1149323" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11710" ref_url="https://www.suse.com/security/cve/CVE-2019-11710/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11714" ref_url="https://www.suse.com/security/cve/CVE-2019-11714/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11716" ref_url="https://www.suse.com/security/cve/CVE-2019-11716/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11718" ref_url="https://www.suse.com/security/cve/CVE-2019-11718/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11720" ref_url="https://www.suse.com/security/cve/CVE-2019-11720/" source="CVE"/>
		<reference ref_id="CVE-2019-11721" ref_url="https://www.suse.com/security/cve/CVE-2019-11721/" source="CVE"/>
		<reference ref_id="CVE-2019-11723" ref_url="https://www.suse.com/security/cve/CVE-2019-11723/" source="CVE"/>
		<reference ref_id="CVE-2019-11724" ref_url="https://www.suse.com/security/cve/CVE-2019-11724/" source="CVE"/>
		<reference ref_id="CVE-2019-11725" ref_url="https://www.suse.com/security/cve/CVE-2019-11725/" source="CVE"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11728" ref_url="https://www.suse.com/security/cve/CVE-2019-11728/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-11733" ref_url="https://www.suse.com/security/cve/CVE-2019-11733/" source="CVE"/>
		<reference ref_id="CVE-2019-11735" ref_url="https://www.suse.com/security/cve/CVE-2019-11735/" source="CVE"/>
		<reference ref_id="CVE-2019-11736" ref_url="https://www.suse.com/security/cve/CVE-2019-11736/" source="CVE"/>
		<reference ref_id="CVE-2019-11738" ref_url="https://www.suse.com/security/cve/CVE-2019-11738/" source="CVE"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11747" ref_url="https://www.suse.com/security/cve/CVE-2019-11747/" source="CVE"/>
		<reference ref_id="CVE-2019-11748" ref_url="https://www.suse.com/security/cve/CVE-2019-11748/" source="CVE"/>
		<reference ref_id="CVE-2019-11749" ref_url="https://www.suse.com/security/cve/CVE-2019-11749/" source="CVE"/>
		<reference ref_id="CVE-2019-11750" ref_url="https://www.suse.com/security/cve/CVE-2019-11750/" source="CVE"/>
		<reference ref_id="CVE-2019-11751" ref_url="https://www.suse.com/security/cve/CVE-2019-11751/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Updated to new ESR version 68.1 (bsc#1149323).

In addition to the already fixed vulnerabilities released in previous ESR updates,
the following were also fixed:
    CVE-2019-11751, CVE-2019-11736, CVE-2019-9812, CVE-2019-11748, CVE-2019-11749,
    CVE-2019-11750, CVE-2019-11738, CVE-2019-11747, CVE-2019-11735.

Several run-time issues were also resolved (bsc#1117473, bsc#1124525, bsc#1133810).

The version displayed in Help &gt; About is now correct (bsc#1087200).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-09"/>
	<updated date="2019-10-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087200">SUSE bug 1087200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109465">SUSE bug 1109465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117473">SUSE bug 1117473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123482">SUSE bug 1123482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124525">SUSE bug 1124525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133810">SUSE bug 1133810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145665">SUSE bug 1145665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11710/">CVE-2019-11710</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11714/">CVE-2019-11714</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11716/">CVE-2019-11716</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11718/">CVE-2019-11718</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11720/">CVE-2019-11720</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11721/">CVE-2019-11721</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11723/">CVE-2019-11723</cve>
	<cve impact="important" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11724/">CVE-2019-11724</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11725/">CVE-2019-11725</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11728/">CVE-2019-11728</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11733/">CVE-2019-11733</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11735/">CVE-2019-11735</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11736/">CVE-2019-11736</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11738/">CVE-2019-11738</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11747/">CVE-2019-11747</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11748/">CVE-2019-11748</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11749/">CVE-2019-11749</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11750/">CVE-2019-11750</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11751/">CVE-2019-11751</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78821" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1109412" ref_url="https://bugzilla.suse.com/1109412" source="BUGZILLA"/>
		<reference ref_id="1109413" ref_url="https://bugzilla.suse.com/1109413" source="BUGZILLA"/>
		<reference ref_id="1109414" ref_url="https://bugzilla.suse.com/1109414" source="BUGZILLA"/>
		<reference ref_id="1111996" ref_url="https://bugzilla.suse.com/1111996" source="BUGZILLA"/>
		<reference ref_id="1112534" ref_url="https://bugzilla.suse.com/1112534" source="BUGZILLA"/>
		<reference ref_id="1112535" ref_url="https://bugzilla.suse.com/1112535" source="BUGZILLA"/>
		<reference ref_id="1113247" ref_url="https://bugzilla.suse.com/1113247" source="BUGZILLA"/>
		<reference ref_id="1113252" ref_url="https://bugzilla.suse.com/1113252" source="BUGZILLA"/>
		<reference ref_id="1113255" ref_url="https://bugzilla.suse.com/1113255" source="BUGZILLA"/>
		<reference ref_id="1116827" ref_url="https://bugzilla.suse.com/1116827" source="BUGZILLA"/>
		<reference ref_id="1118830" ref_url="https://bugzilla.suse.com/1118830" source="BUGZILLA"/>
		<reference ref_id="1118831" ref_url="https://bugzilla.suse.com/1118831" source="BUGZILLA"/>
		<reference ref_id="1120640" ref_url="https://bugzilla.suse.com/1120640" source="BUGZILLA"/>
		<reference ref_id="1121034" ref_url="https://bugzilla.suse.com/1121034" source="BUGZILLA"/>
		<reference ref_id="1121035" ref_url="https://bugzilla.suse.com/1121035" source="BUGZILLA"/>
		<reference ref_id="1121056" ref_url="https://bugzilla.suse.com/1121056" source="BUGZILLA"/>
		<reference ref_id="1133131" ref_url="https://bugzilla.suse.com/1133131" source="BUGZILLA"/>
		<reference ref_id="1133232" ref_url="https://bugzilla.suse.com/1133232" source="BUGZILLA"/>
		<reference ref_id="1141913" ref_url="https://bugzilla.suse.com/1141913" source="BUGZILLA"/>
		<reference ref_id="1142772" ref_url="https://bugzilla.suse.com/1142772" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000876" ref_url="https://www.suse.com/security/cve/CVE-2018-1000876/" source="CVE"/>
		<reference ref_id="CVE-2018-17358" ref_url="https://www.suse.com/security/cve/CVE-2018-17358/" source="CVE"/>
		<reference ref_id="CVE-2018-17359" ref_url="https://www.suse.com/security/cve/CVE-2018-17359/" source="CVE"/>
		<reference ref_id="CVE-2018-17360" ref_url="https://www.suse.com/security/cve/CVE-2018-17360/" source="CVE"/>
		<reference ref_id="CVE-2018-17985" ref_url="https://www.suse.com/security/cve/CVE-2018-17985/" source="CVE"/>
		<reference ref_id="CVE-2018-18309" ref_url="https://www.suse.com/security/cve/CVE-2018-18309/" source="CVE"/>
		<reference ref_id="CVE-2018-18483" ref_url="https://www.suse.com/security/cve/CVE-2018-18483/" source="CVE"/>
		<reference ref_id="CVE-2018-18484" ref_url="https://www.suse.com/security/cve/CVE-2018-18484/" source="CVE"/>
		<reference ref_id="CVE-2018-18605" ref_url="https://www.suse.com/security/cve/CVE-2018-18605/" source="CVE"/>
		<reference ref_id="CVE-2018-18606" ref_url="https://www.suse.com/security/cve/CVE-2018-18606/" source="CVE"/>
		<reference ref_id="CVE-2018-18607" ref_url="https://www.suse.com/security/cve/CVE-2018-18607/" source="CVE"/>
		<reference ref_id="CVE-2018-19931" ref_url="https://www.suse.com/security/cve/CVE-2018-19931/" source="CVE"/>
		<reference ref_id="CVE-2018-19932" ref_url="https://www.suse.com/security/cve/CVE-2018-19932/" source="CVE"/>
		<reference ref_id="CVE-2018-20623" ref_url="https://www.suse.com/security/cve/CVE-2018-20623/" source="CVE"/>
		<reference ref_id="CVE-2018-20651" ref_url="https://www.suse.com/security/cve/CVE-2018-20651/" source="CVE"/>
		<reference ref_id="CVE-2018-20671" ref_url="https://www.suse.com/security/cve/CVE-2018-20671/" source="CVE"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:

binutils was updated to current 2.32 branch @7b468db3 [jsc#ECO-368]:

Includes the following security fixes:

- CVE-2018-17358: Fixed invalid memory access in _bfd_stab_section_find_nearest_line in syms.c (bsc#1109412)
- CVE-2018-17359: Fixed invalid memory access exists in bfd_zalloc in opncls.c (bsc#1109413)
- CVE-2018-17360: Fixed heap-based buffer over-read in bfd_getl32 in libbfd.c (bsc#1109414)
- CVE-2018-17985: Fixed a stack consumption problem caused by the cplus_demangle_type (bsc#1116827)
- CVE-2018-18309: Fixed an invalid memory address dereference was discovered in read_reloc in reloc.c (bsc#1111996)
- CVE-2018-18483: Fixed get_count function provided by libiberty that allowed attackers to cause a denial of service or other unspecified impact (bsc#1112535)
- CVE-2018-18484: Fixed stack exhaustion in the C++ demangling functions provided by libiberty, caused by recursive stack frames (bsc#1112534)
- CVE-2018-18605: Fixed a heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup causing a denial of service (bsc#1113255)
- CVE-2018-18606: Fixed a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments, causing denial of service (bsc#1113252)
- CVE-2018-18607: Fixed a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section, causing denial of service (bsc#1113247)
- CVE-2018-19931: Fixed a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h (bsc#1118831)
- CVE-2018-19932: Fixed an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA (bsc#1118830)
- CVE-2018-20623: Fixed a use-after-free in the error function in elfcomm.c (bsc#1121035)
- CVE-2018-20651: Fixed a denial of service via a NULL pointer dereference in elf_link_add_object_symbols in elflink.c (bsc#1121034)
- CVE-2018-20671: Fixed an integer overflow that can trigger a heap-based buffer overflow in  load_specific_debug_section in objdump.c (bsc#1121056)
- CVE-2018-1000876: Fixed integer overflow in bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc in objdump (bsc#1120640)
- CVE-2019-1010180: Fixed an out of bound memory access that could lead to crashes (bsc#1142772)

- Enable xtensa architecture (Tensilica lc6 and related)
- Use -ffat-lto-objects in order to provide assembly for static libs
  (bsc#1141913).
- Fixed some LTO problems (bsc#1133131 bsc#1133232).
- riscv: Don't check ABI flags if no code section

Update to binutils 2.32:

* The binutils now support for the C-SKY processor series.
* The x86 assembler now supports a -mvexwig=[0|1] option to control
  encoding of VEX.W-ignored (WIG) VEX instructions.
  It also has a new -mx86-used-note=[yes|no] option to generate (or
  not) x86 GNU property notes.
* The MIPS assembler now supports the Loongson EXTensions R2 (EXT2),
  the Loongson EXTensions (EXT) instructions, the Loongson Content
  Address Memory (CAM) ASE and the Loongson MultiMedia extensions
  Instructions (MMI) ASE.
* The addr2line, c++filt, nm and objdump tools now have a default
  limit on the maximum amount of recursion that is allowed whilst
  demangling strings.  This limit can be disabled if necessary.
* Objdump's --disassemble option can now take a parameter,
  specifying the starting symbol for disassembly.  Disassembly will
  continue from this symbol up to the next symbol or the end of the
  function.
* The BFD linker will now report property change in linker map file
  when merging GNU properties.
* The BFD linker's -t option now doesn't report members within
  archives, unless -t is given twice.  This makes it more useful
  when generating a list of files that should be packaged for a
  linker bug report.
* The GOLD linker has improved warning messages for relocations that
  refer to discarded sections.

- Improve relro support on s390 [fate#326356]
- Handle ELF compressed header alignment correctly.

  		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-14"/>
	<updated date="2019-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1109412">SUSE bug 1109412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109413">SUSE bug 1109413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109414">SUSE bug 1109414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111996">SUSE bug 1111996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112534">SUSE bug 1112534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112535">SUSE bug 1112535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113247">SUSE bug 1113247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113252">SUSE bug 1113252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113255">SUSE bug 1113255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116827">SUSE bug 1116827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118830">SUSE bug 1118830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118831">SUSE bug 1118831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120640">SUSE bug 1120640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121034">SUSE bug 1121034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121035">SUSE bug 1121035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121056">SUSE bug 1121056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133131">SUSE bug 1133131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133232">SUSE bug 1133232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141913">SUSE bug 1141913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142772">SUSE bug 1142772</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000876/">CVE-2018-1000876</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17358/">CVE-2018-17358</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17359/">CVE-2018-17359</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17360/">CVE-2018-17360</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17985/">CVE-2018-17985</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18309/">CVE-2018-18309</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18483/">CVE-2018-18483</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18484/">CVE-2018-18484</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18605/">CVE-2018-18605</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18606/">CVE-2018-18606</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18607/">CVE-2018-18607</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19931/">CVE-2018-19931</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19932/">CVE-2018-19932</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-20623/">CVE-2018-20623</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20651/">CVE-2018-20651</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20671/">CVE-2018-20671</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78822" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1153674" ref_url="https://bugzilla.suse.com/1153674" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14287" ref_url="https://www.suse.com/security/cve/CVE-2019-14287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006015.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

Security issue fixed: 	  

- CVE-2019-14287: Fixed an issue where a user with sudo privileges
  that allowed them to run commands with an arbitrary uid, could
  run commands as root, despite being forbidden to do so in sudoers
  (bsc#1153674).

		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153674">SUSE bug 1153674</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14287/">CVE-2019-14287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522249" comment="sudo-1.8.20p2-3.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78823" version="1" class="patch">
	<metadata>
		<title>Security update for libpcap (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1153332" ref_url="https://bugzilla.suse.com/1153332" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="CVE-2019-15165" ref_url="https://www.suse.com/security/cve/CVE-2019-15165/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006016.html" source="SUSE-SU"/>
		<description>
This update for libpcap fixes the following issues:

- CVE-2019-15165: Added sanity checks for PHB header length before allocating memory (bsc#1153332).
- CVE-2018-16301: Fixed a buffer overflow (bsc#1153332).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153332">SUSE bug 1153332</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15165/">CVE-2019-15165</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522250" comment="libpcap1-1.8.1-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522251" comment="libpcap1-32bit-1.8.1-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522252" comment="tcpdump-4.9.2-14.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78824" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb-100 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1132826" ref_url="https://bugzilla.suse.com/1132826" source="BUGZILLA"/>
		<reference ref_id="1141798" ref_url="https://bugzilla.suse.com/1141798" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2614" ref_url="https://www.suse.com/security/cve/CVE-2019-2614/" source="CVE"/>
		<reference ref_id="CVE-2019-2627" ref_url="https://www.suse.com/security/cve/CVE-2019-2627/" source="CVE"/>
		<reference ref_id="CVE-2019-2737" ref_url="https://www.suse.com/security/cve/CVE-2019-2737/" source="CVE"/>
		<reference ref_id="CVE-2019-2739" ref_url="https://www.suse.com/security/cve/CVE-2019-2739/" source="CVE"/>
		<reference ref_id="CVE-2019-2740" ref_url="https://www.suse.com/security/cve/CVE-2019-2740/" source="CVE"/>
		<reference ref_id="CVE-2019-2805" ref_url="https://www.suse.com/security/cve/CVE-2019-2805/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006023.html" source="SUSE-SU"/>
		<description>
This update for mariadb-100 fixes the following issues:

Updated to MariaDB 10.0.40-1.

Security issues fixed:

- CVE-2019-2805, CVE-2019-2740, CVE-2019-2739, CVE-2019-2737, 
  CVE-2019-2614, CVE-2019-2627. (bsc#1132826) (bsc#1141798).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-16"/>
	<updated date="2019-10-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1132826">SUSE bug 1132826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2614/">CVE-2019-2614</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2627/">CVE-2019-2627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2737/">CVE-2019-2737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2739/">CVE-2019-2739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2740/">CVE-2019-2740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2805/">CVE-2019-2805</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522253" comment="libmysqlclient18-10.0.40.1-2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522254" comment="libmysqlclient18-32bit-10.0.40.1-2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522255" comment="libmysqlclient_r18-10.0.40.1-2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522256" comment="libmysqlclient_r18-32bit-10.0.40.1-2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522257" comment="mariadb-100-errormessages-10.0.40.1-2.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78825" version="1" class="patch">
	<metadata>
		<title>Security update for python-xdg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="859835" ref_url="https://bugzilla.suse.com/859835" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1624" ref_url="https://www.suse.com/security/cve/CVE-2014-1624/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006030.html" source="SUSE-SU"/>
		<description>
This update for python-xdg fixes the following issues:

Security issue fixed:

- CVE-2014-1624: Fixed a TOCTOU race condition in get_runtime_dir(). (bsc#859835)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-18"/>
	<updated date="2019-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/859835">SUSE bug 859835</bugzilla>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-1624/">CVE-2014-1624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522258" comment="python-xdg-0.25-9.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78826" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1089524" ref_url="https://bugzilla.suse.com/1089524" source="BUGZILLA"/>
		<reference ref_id="1134078" ref_url="https://bugzilla.suse.com/1134078" source="BUGZILLA"/>
		<reference ref_id="1136572" ref_url="https://bugzilla.suse.com/1136572" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6470" ref_url="https://www.suse.com/security/cve/CVE-2019-6470/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006034.html" source="SUSE-SU"/>
		<description>
This update for dhcp fixes the following issues:

Secuirty issue fixed:

- CVE-2019-6470: Fixed DHCPv6 server crashes (bsc#1134078).

Bug fixes:

- Add compile option --enable-secs-byteorder to avoid duplicate lease warnings (bsc#1089524).
- Use IPv6 when called as dhclient6, dhcpd6, and dhcrelay6 (bsc#1136572).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-21"/>
	<updated date="2019-10-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089524">SUSE bug 1089524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134078">SUSE bug 1134078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136572">SUSE bug 1136572</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-6470/">CVE-2019-6470</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522259" comment="dhcp-4.3.3-10.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522260" comment="dhcp-client-4.3.3-10.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78827" version="1" class="patch">
	<metadata>
		<title>Security update for openconnect (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1151178" ref_url="https://bugzilla.suse.com/1151178" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16239" ref_url="https://www.suse.com/security/cve/CVE-2019-16239/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006039.html" source="SUSE-SU"/>
		<description>
This update for openconnect fixes the following issues:
  
- CVE-2019-16239: Fixed a buffer overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes. (bsc#1151178)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-22"/>
	<updated date="2019-10-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1151178">SUSE bug 1151178</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16239/">CVE-2019-16239</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522261" comment="openconnect-7.08-3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522262" comment="openconnect-lang-7.08-3.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78828" version="1" class="patch">
	<metadata>
		<title>Security update for libcaca (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1120470" ref_url="https://bugzilla.suse.com/1120470" source="BUGZILLA"/>
		<reference ref_id="1120502" ref_url="https://bugzilla.suse.com/1120502" source="BUGZILLA"/>
		<reference ref_id="1120503" ref_url="https://bugzilla.suse.com/1120503" source="BUGZILLA"/>
		<reference ref_id="1120504" ref_url="https://bugzilla.suse.com/1120504" source="BUGZILLA"/>
		<reference ref_id="1120584" ref_url="https://bugzilla.suse.com/1120584" source="BUGZILLA"/>
		<reference ref_id="1120589" ref_url="https://bugzilla.suse.com/1120589" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20544" ref_url="https://www.suse.com/security/cve/CVE-2018-20544/" source="CVE"/>
		<reference ref_id="CVE-2018-20545" ref_url="https://www.suse.com/security/cve/CVE-2018-20545/" source="CVE"/>
		<reference ref_id="CVE-2018-20546" ref_url="https://www.suse.com/security/cve/CVE-2018-20546/" source="CVE"/>
		<reference ref_id="CVE-2018-20547" ref_url="https://www.suse.com/security/cve/CVE-2018-20547/" source="CVE"/>
		<reference ref_id="CVE-2018-20548" ref_url="https://www.suse.com/security/cve/CVE-2018-20548/" source="CVE"/>
		<reference ref_id="CVE-2018-20549" ref_url="https://www.suse.com/security/cve/CVE-2018-20549/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006040.html" source="SUSE-SU"/>
		<description>
This update for libcaca fixes the following issues:

Security issues fixed:

- CVE-2018-20544: Fixed a floating point exception at caca/dither.c (bsc#1120502)
- CVE-2018-20545: Fixed a WRITE memory access in the load_image function at common-image.c for 4bpp (bsc#1120584)
- CVE-2018-20546: Fixed a READ memory access in the get_rgba_default function at caca/dither.c for bpp (bsc#1120503)
- CVE-2018-20547: Fixed a READ memory access in the get_rgba_default function at caca/dither.c for 24bpp (bsc#1120504)
- CVE-2018-20548: Fixed a WRITE memory access in the load_image function at common-image.c for 1bpp (bsc#1120589)
- CVE-2018-20549: Fixed a WRITE memory access in the caca_file_read function at caca/file.c (bsc#1120470)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-22"/>
	<updated date="2019-10-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120470">SUSE bug 1120470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120502">SUSE bug 1120502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120503">SUSE bug 1120503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120504">SUSE bug 1120504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120584">SUSE bug 1120584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120589">SUSE bug 1120589</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20544/">CVE-2018-20544</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20545/">CVE-2018-20545</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20546/">CVE-2018-20546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-20547/">CVE-2018-20547</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20548/">CVE-2018-20548</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20549/">CVE-2018-20549</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522263" comment="libcaca0-0.99.beta18-14.3.27 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78829" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1149955" ref_url="https://bugzilla.suse.com/1149955" source="BUGZILLA"/>
		<reference ref_id="1153238" ref_url="https://bugzilla.suse.com/1153238" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006042.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

Security issue fixed:

- CVE-2019-16056: Fixed a parser issue in the email module (bsc#1149955).
- CVE-2019-16935: Fixed a reflected XSS in python/Lib/DocXMLRPCServer.py (bsc#1153238).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-23"/>
	<updated date="2019-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149955">SUSE bug 1149955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153238">SUSE bug 1153238</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522264" comment="libpython2_7-1_0-2.7.13-28.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522265" comment="libpython2_7-1_0-32bit-2.7.13-28.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522266" comment="python-2.7.13-28.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522267" comment="python-base-2.7.13-28.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522268" comment="python-curses-2.7.13-28.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522269" comment="python-devel-2.7.13-28.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522270" comment="python-tk-2.7.13-28.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522271" comment="python-xml-2.7.13-28.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78830" version="1" class="patch">
	<metadata>
		<title>Security update for sysstat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1150114" ref_url="https://bugzilla.suse.com/1150114" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16167" ref_url="https://www.suse.com/security/cve/CVE-2019-16167/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006044.html" source="SUSE-SU"/>
		<description>
This update for sysstat fixes the following issue:

- CVE-2019-16167: Fixed a memory corruption due to an integer overflow. (bsc#1150114)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-23"/>
	<updated date="2019-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150114">SUSE bug 1150114</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16167/">CVE-2019-16167</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522272" comment="sysstat-12.0.2-10.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78831" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1126140" ref_url="https://bugzilla.suse.com/1126140" source="BUGZILLA"/>
		<reference ref_id="1126141" ref_url="https://bugzilla.suse.com/1126141" source="BUGZILLA"/>
		<reference ref_id="1126192" ref_url="https://bugzilla.suse.com/1126192" source="BUGZILLA"/>
		<reference ref_id="1126195" ref_url="https://bugzilla.suse.com/1126195" source="BUGZILLA"/>
		<reference ref_id="1126196" ref_url="https://bugzilla.suse.com/1126196" source="BUGZILLA"/>
		<reference ref_id="1126197" ref_url="https://bugzilla.suse.com/1126197" source="BUGZILLA"/>
		<reference ref_id="1126198" ref_url="https://bugzilla.suse.com/1126198" source="BUGZILLA"/>
		<reference ref_id="1126201" ref_url="https://bugzilla.suse.com/1126201" source="BUGZILLA"/>
		<reference ref_id="1127400" ref_url="https://bugzilla.suse.com/1127400" source="BUGZILLA"/>
		<reference ref_id="1129642" ref_url="https://bugzilla.suse.com/1129642" source="BUGZILLA"/>
		<reference ref_id="1131811" ref_url="https://bugzilla.suse.com/1131811" source="BUGZILLA"/>
		<reference ref_id="1137717" ref_url="https://bugzilla.suse.com/1137717" source="BUGZILLA"/>
		<reference ref_id="1138294" ref_url="https://bugzilla.suse.com/1138294" source="BUGZILLA"/>
		<reference ref_id="1143797" ref_url="https://bugzilla.suse.com/1143797" source="BUGZILLA"/>
		<reference ref_id="1145240" ref_url="https://bugzilla.suse.com/1145240" source="BUGZILLA"/>
		<reference ref_id="1145774" ref_url="https://bugzilla.suse.com/1145774" source="BUGZILLA"/>
		<reference ref_id="1146874" ref_url="https://bugzilla.suse.com/1146874" source="BUGZILLA"/>
		<reference ref_id="1149813" ref_url="https://bugzilla.suse.com/1149813" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-17340" ref_url="https://www.suse.com/security/cve/CVE-2019-17340/" source="CVE"/>
		<reference ref_id="CVE-2019-17341" ref_url="https://www.suse.com/security/cve/CVE-2019-17341/" source="CVE"/>
		<reference ref_id="CVE-2019-17342" ref_url="https://www.suse.com/security/cve/CVE-2019-17342/" source="CVE"/>
		<reference ref_id="CVE-2019-17343" ref_url="https://www.suse.com/security/cve/CVE-2019-17343/" source="CVE"/>
		<reference ref_id="CVE-2019-17344" ref_url="https://www.suse.com/security/cve/CVE-2019-17344/" source="CVE"/>
		<reference ref_id="CVE-2019-17345" ref_url="https://www.suse.com/security/cve/CVE-2019-17345/" source="CVE"/>
		<reference ref_id="CVE-2019-17346" ref_url="https://www.suse.com/security/cve/CVE-2019-17346/" source="CVE"/>
		<reference ref_id="CVE-2019-17347" ref_url="https://www.suse.com/security/cve/CVE-2019-17347/" source="CVE"/>
		<reference ref_id="CVE-2019-17348" ref_url="https://www.suse.com/security/cve/CVE-2019-17348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<description>
This update for xen to version 4.11.2 fixes the following issues:

Security issues fixed: 	  

- CVE-2019-15890: Fixed a use-after-free in SLiRP networking implementation of QEMU emulator
  which could have led to Denial of Service (bsc#1149813).
- CVE-2019-12068: Fixed an issue in lsi which could lead to an infinite loop and denial of 
  service (bsc#1146874).
- CVE-2019-14378: Fixed a heap buffer overflow in SLiRp networking implementation of QEMU 
  emulator which could have led to execution of  arbitrary code with privileges of the 
  QEMU process (bsc#1143797).

Other issues fixed: 

- Fixed an HPS bug which did not allow to install Windows Server 2016 with 2 CPUs setting or above
  (bsc#1137717).
- Fixed a segmentation fault in Libvrtd during live migration to a VM (bsc#1145774). 
- Fixed an issue where libxenlight could not create new domain (bsc#1131811).
- Fixed an issue where attached pci devices were lost after reboot (bsc#1129642).
- Fixed an issue where Xen could not pre-allocate 1 shadow page (bsc#1145240).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-23"/>
	<updated date="2019-10-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126197">SUSE bug 1126197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126198">SUSE bug 1126198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126201">SUSE bug 1126201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127400">SUSE bug 1127400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129642">SUSE bug 1129642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131811">SUSE bug 1131811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137717">SUSE bug 1137717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138294">SUSE bug 1138294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143797">SUSE bug 1143797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145240">SUSE bug 1145240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145774">SUSE bug 1145774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146874">SUSE bug 1146874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17340/">CVE-2019-17340</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17341/">CVE-2019-17341</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17342/">CVE-2019-17342</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17343/">CVE-2019-17343</cve>
	<cve impact="important" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17344/">CVE-2019-17344</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17345/">CVE-2019-17345</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17346/">CVE-2019-17346</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17347/">CVE-2019-17347</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17348/">CVE-2019-17348</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522273" comment="xen-4.11.2_02-2.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522274" comment="xen-libs-4.11.2_02-2.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522275" comment="xen-libs-32bit-4.11.2_02-2.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78832" version="1" class="patch">
	<metadata>
		<title>Security update for accountsservice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1099699" ref_url="https://bugzilla.suse.com/1099699" source="BUGZILLA"/>
		<reference ref_id="1139487" ref_url="https://bugzilla.suse.com/1139487" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14036" ref_url="https://www.suse.com/security/cve/CVE-2018-14036/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2778-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192778-1.html" source="SUSE-SU"/>
		<description>
This update for accountsservice fixes the following issues:

Security issue fixed:

- CVE-2018-14036: Prevent directory traversal caused by an insufficient path
  check in user_change_icon_file_authorized_cb() (bsc#1099699).

Non-security issue fixed:

- Improved wtmp io performance (bsc#1139487).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-24"/>
	<updated date="2019-10-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1099699">SUSE bug 1099699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139487">SUSE bug 1139487</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14036/">CVE-2018-14036</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522276" comment="accountsservice-0.6.42-16.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522277" comment="accountsservice-lang-0.6.42-16.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522278" comment="libaccountsservice0-0.6.42-16.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522279" comment="typelib-1_0-AccountsService-1_0-0.6.42-16.8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78833" version="1" class="patch">
	<metadata>
		<title>Security update for nfs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1150733" ref_url="https://bugzilla.suse.com/1150733" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3689" ref_url="https://www.suse.com/security/cve/CVE-2019-3689/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2781-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192781-1.html" source="SUSE-SU"/>
		<description>
This update for nfs-utils fixes the following issues:

- CVE-2019-3689: Fixed root-owned files stored in insecure /var/lib/nfs. (bsc#1150733)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-25"/>
	<updated date="2019-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150733">SUSE bug 1150733</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3689/">CVE-2019-3689</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522280" comment="nfs-client-1.3.0-34.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522281" comment="nfs-kernel-server-1.3.0-34.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78834" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1146068" ref_url="https://bugzilla.suse.com/1146068" source="BUGZILLA"/>
		<reference ref_id="1146211" ref_url="https://bugzilla.suse.com/1146211" source="BUGZILLA"/>
		<reference ref_id="1146212" ref_url="https://bugzilla.suse.com/1146212" source="BUGZILLA"/>
		<reference ref_id="1146213" ref_url="https://bugzilla.suse.com/1146213" source="BUGZILLA"/>
		<reference ref_id="1151781" ref_url="https://bugzilla.suse.com/1151781" source="BUGZILLA"/>
		<reference ref_id="1151782" ref_url="https://bugzilla.suse.com/1151782" source="BUGZILLA"/>
		<reference ref_id="1151783" ref_url="https://bugzilla.suse.com/1151783" source="BUGZILLA"/>
		<reference ref_id="1151784" ref_url="https://bugzilla.suse.com/1151784" source="BUGZILLA"/>
		<reference ref_id="1151785" ref_url="https://bugzilla.suse.com/1151785" source="BUGZILLA"/>
		<reference ref_id="1151786" ref_url="https://bugzilla.suse.com/1151786" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14980" ref_url="https://www.suse.com/security/cve/CVE-2019-14980/" source="CVE"/>
		<reference ref_id="CVE-2019-15139" ref_url="https://www.suse.com/security/cve/CVE-2019-15139/" source="CVE"/>
		<reference ref_id="CVE-2019-15140" ref_url="https://www.suse.com/security/cve/CVE-2019-15140/" source="CVE"/>
		<reference ref_id="CVE-2019-15141" ref_url="https://www.suse.com/security/cve/CVE-2019-15141/" source="CVE"/>
		<reference ref_id="CVE-2019-16708" ref_url="https://www.suse.com/security/cve/CVE-2019-16708/" source="CVE"/>
		<reference ref_id="CVE-2019-16709" ref_url="https://www.suse.com/security/cve/CVE-2019-16709/" source="CVE"/>
		<reference ref_id="CVE-2019-16710" ref_url="https://www.suse.com/security/cve/CVE-2019-16710/" source="CVE"/>
		<reference ref_id="CVE-2019-16711" ref_url="https://www.suse.com/security/cve/CVE-2019-16711/" source="CVE"/>
		<reference ref_id="CVE-2019-16712" ref_url="https://www.suse.com/security/cve/CVE-2019-16712/" source="CVE"/>
		<reference ref_id="CVE-2019-16713" ref_url="https://www.suse.com/security/cve/CVE-2019-16713/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-15139: Fixed a denial-of-service vulnerability in ReadXWDImage. (bsc#1146213)
- CVE-2019-15140: Fixed a use-after-free bug in the Matlab image parser. (bsc#1146212)
- CVE-2019-15141: Fixed a divide-by-zero vulnerability in the MeanShiftImage function. (bsc#1146211)
- CVE-2019-14980: Fixed an application crash resulting from a heap-based buffer over-read in WriteTIFFImage. (bsc#1146068)
- CVE-2019-16708: Fixed a memory leak in magick/xwindow.c (bsc#1151781).
- CVE-2019-16709: Fixed a memory leak in coders/dps.c (bsc#1151782).
- CVE-2019-16710: Fixed a memory leak in coders/dot.c (bsc#1151783).
- CVE-2019-16711: Fixed a memory leak in Huffman2DEncodeImage in coders/ps2.c (bsc#1151784).
- CVE-2019-16712: Fixed a memory leak in Huffman2DEncodeImage in coders/ps3.c (bsc#1151785).
- CVE-2019-16713: Fixed a memory leak in coders/dot.c (bsc#1151786).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-25"/>
	<updated date="2019-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1146068">SUSE bug 1146068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146211">SUSE bug 1146211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146212">SUSE bug 1146212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146213">SUSE bug 1146213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151781">SUSE bug 1151781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151782">SUSE bug 1151782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151783">SUSE bug 1151783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151784">SUSE bug 1151784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151785">SUSE bug 1151785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151786">SUSE bug 1151786</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14980/">CVE-2019-14980</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15139/">CVE-2019-15139</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15140/">CVE-2019-15140</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15141/">CVE-2019-15141</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16708/">CVE-2019-16708</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16709/">CVE-2019-16709</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16710/">CVE-2019-16710</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16711/">CVE-2019-16711</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16712/">CVE-2019-16712</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16713/">CVE-2019-16713</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522282" comment="ImageMagick-6.8.8.1-71.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522283" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522284" comment="ImageMagick-config-6-upstream-6.8.8.1-71.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522285" comment="libMagick++-6_Q16-3-6.8.8.1-71.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522286" comment="libMagickCore-6_Q16-1-6.8.8.1-71.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522287" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522288" comment="libMagickWand-6_Q16-1-6.8.8.1-71.131.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78835" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="1149955" ref_url="https://bugzilla.suse.com/1149955" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006064.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2019-16056: Fixed a parser issue in the email module. (bsc#1149955)
- CVE-2018-20852: Fixed an incorrect domain validation that could lead to cookies being sent to the wrong server. (bsc#1141853)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-28"/>
	<updated date="2019-10-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149955">SUSE bug 1149955</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522289" comment="libpython3_4m1_0-3.4.6-25.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522290" comment="python3-3.4.6-25.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522291" comment="python3-base-3.4.6-25.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522292" comment="python3-curses-3.4.6-25.34.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78836" version="1" class="patch">
	<metadata>
		<title>Security update for libunwind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1122012" ref_url="https://bugzilla.suse.com/1122012" source="BUGZILLA"/>
		<reference ref_id="936786" ref_url="https://bugzilla.suse.com/936786" source="BUGZILLA"/>
		<reference ref_id="976955" ref_url="https://bugzilla.suse.com/976955" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3239" ref_url="https://www.suse.com/security/cve/CVE-2015-3239/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005095.html" source="SUSE-SU"/>
		<description>
This update for libunwind fixes the following issues:

Security issues fixed:

- CVE-2015-3239: Fixed a off-by-one in the dwarf_to_unw_regnum function (bsc#936786)

Non-security issues fixed:

- Fixed a dependency issue with libzmq5 (bsc#1122012)
- Fixed build on armv7 (bsc#976955)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-07"/>
	<updated date="2019-02-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1122012">SUSE bug 1122012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936786">SUSE bug 936786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976955">SUSE bug 976955</bugzilla>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-3239/">CVE-2015-3239</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521604" comment="libunwind-1.1-11.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78837" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1010399" ref_url="https://bugzilla.suse.com/1010399" source="BUGZILLA"/>
		<reference ref_id="1010405" ref_url="https://bugzilla.suse.com/1010405" source="BUGZILLA"/>
		<reference ref_id="1010406" ref_url="https://bugzilla.suse.com/1010406" source="BUGZILLA"/>
		<reference ref_id="1010408" ref_url="https://bugzilla.suse.com/1010408" source="BUGZILLA"/>
		<reference ref_id="1010409" ref_url="https://bugzilla.suse.com/1010409" source="BUGZILLA"/>
		<reference ref_id="1010421" ref_url="https://bugzilla.suse.com/1010421" source="BUGZILLA"/>
		<reference ref_id="1010423" ref_url="https://bugzilla.suse.com/1010423" source="BUGZILLA"/>
		<reference ref_id="1010424" ref_url="https://bugzilla.suse.com/1010424" source="BUGZILLA"/>
		<reference ref_id="1010425" ref_url="https://bugzilla.suse.com/1010425" source="BUGZILLA"/>
		<reference ref_id="1010426" ref_url="https://bugzilla.suse.com/1010426" source="BUGZILLA"/>
		<reference ref_id="1025108" ref_url="https://bugzilla.suse.com/1025108" source="BUGZILLA"/>
		<reference ref_id="1043008" ref_url="https://bugzilla.suse.com/1043008" source="BUGZILLA"/>
		<reference ref_id="1047281" ref_url="https://bugzilla.suse.com/1047281" source="BUGZILLA"/>
		<reference ref_id="1074235" ref_url="https://bugzilla.suse.com/1074235" source="BUGZILLA"/>
		<reference ref_id="1092611" ref_url="https://bugzilla.suse.com/1092611" source="BUGZILLA"/>
		<reference ref_id="1120374" ref_url="https://bugzilla.suse.com/1120374" source="BUGZILLA"/>
		<reference ref_id="1137990" ref_url="https://bugzilla.suse.com/1137990" source="BUGZILLA"/>
		<reference ref_id="1149429" ref_url="https://bugzilla.suse.com/1149429" source="BUGZILLA"/>
		<reference ref_id="1154738" ref_url="https://bugzilla.suse.com/1154738" source="BUGZILLA"/>
		<reference ref_id="959933" ref_url="https://bugzilla.suse.com/959933" source="BUGZILLA"/>
		<reference ref_id="983922" ref_url="https://bugzilla.suse.com/983922" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-5289" ref_url="https://www.suse.com/security/cve/CVE-2016-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-5292" ref_url="https://www.suse.com/security/cve/CVE-2016-5292/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2016-9067" ref_url="https://www.suse.com/security/cve/CVE-2016-9067/" source="CVE"/>
		<reference ref_id="CVE-2016-9068" ref_url="https://www.suse.com/security/cve/CVE-2016-9068/" source="CVE"/>
		<reference ref_id="CVE-2016-9069" ref_url="https://www.suse.com/security/cve/CVE-2016-9069/" source="CVE"/>
		<reference ref_id="CVE-2016-9071" ref_url="https://www.suse.com/security/cve/CVE-2016-9071/" source="CVE"/>
		<reference ref_id="CVE-2016-9073" ref_url="https://www.suse.com/security/cve/CVE-2016-9073/" source="CVE"/>
		<reference ref_id="CVE-2016-9075" ref_url="https://www.suse.com/security/cve/CVE-2016-9075/" source="CVE"/>
		<reference ref_id="CVE-2016-9076" ref_url="https://www.suse.com/security/cve/CVE-2016-9076/" source="CVE"/>
		<reference ref_id="CVE-2016-9077" ref_url="https://www.suse.com/security/cve/CVE-2016-9077/" source="CVE"/>
		<reference ref_id="CVE-2017-7789" ref_url="https://www.suse.com/security/cve/CVE-2017-7789/" source="CVE"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5151" ref_url="https://www.suse.com/security/cve/CVE-2018-5151/" source="CVE"/>
		<reference ref_id="CVE-2018-5152" ref_url="https://www.suse.com/security/cve/CVE-2018-5152/" source="CVE"/>
		<reference ref_id="CVE-2018-5153" ref_url="https://www.suse.com/security/cve/CVE-2018-5153/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157/" source="CVE"/>
		<reference ref_id="CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5160" ref_url="https://www.suse.com/security/cve/CVE-2018-5160/" source="CVE"/>
		<reference ref_id="CVE-2018-5163" ref_url="https://www.suse.com/security/cve/CVE-2018-5163/" source="CVE"/>
		<reference ref_id="CVE-2018-5164" ref_url="https://www.suse.com/security/cve/CVE-2018-5164/" source="CVE"/>
		<reference ref_id="CVE-2018-5165" ref_url="https://www.suse.com/security/cve/CVE-2018-5165/" source="CVE"/>
		<reference ref_id="CVE-2018-5166" ref_url="https://www.suse.com/security/cve/CVE-2018-5166/" source="CVE"/>
		<reference ref_id="CVE-2018-5167" ref_url="https://www.suse.com/security/cve/CVE-2018-5167/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5169" ref_url="https://www.suse.com/security/cve/CVE-2018-5169/" source="CVE"/>
		<reference ref_id="CVE-2018-5172" ref_url="https://www.suse.com/security/cve/CVE-2018-5172/" source="CVE"/>
		<reference ref_id="CVE-2018-5173" ref_url="https://www.suse.com/security/cve/CVE-2018-5173/" source="CVE"/>
		<reference ref_id="CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174/" source="CVE"/>
		<reference ref_id="CVE-2018-5175" ref_url="https://www.suse.com/security/cve/CVE-2018-5175/" source="CVE"/>
		<reference ref_id="CVE-2018-5176" ref_url="https://www.suse.com/security/cve/CVE-2018-5176/" source="CVE"/>
		<reference ref_id="CVE-2018-5177" ref_url="https://www.suse.com/security/cve/CVE-2018-5177/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5179" ref_url="https://www.suse.com/security/cve/CVE-2018-5179/" source="CVE"/>
		<reference ref_id="CVE-2018-5180" ref_url="https://www.suse.com/security/cve/CVE-2018-5180/" source="CVE"/>
		<reference ref_id="CVE-2018-5181" ref_url="https://www.suse.com/security/cve/CVE-2018-5181/" source="CVE"/>
		<reference ref_id="CVE-2018-5182" ref_url="https://www.suse.com/security/cve/CVE-2018-5182/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<reference ref_id="CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757/" source="CVE"/>
		<reference ref_id="CVE-2019-11758" ref_url="https://www.suse.com/security/cve/CVE-2019-11758/" source="CVE"/>
		<reference ref_id="CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759/" source="CVE"/>
		<reference ref_id="CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760/" source="CVE"/>
		<reference ref_id="CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761/" source="CVE"/>
		<reference ref_id="CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762/" source="CVE"/>
		<reference ref_id="CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763/" source="CVE"/>
		<reference ref_id="CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to 68.2.0 ESR fixes the following issues:

Mozilla Firefox was updated to version 68.2.0 ESR (bsc#1154738).

Security issues fixed:

-  CVE-2019-15903: Fixed a heap overflow in the expat library (bsc#1149429).
-  CVE-2019-11757: Fixed a use-after-free when creating index updates in IndexedDB (bsc#1154738).
-  CVE-2019-11758: Fixed a potentially exploitable crash due to 360 Total Security (bsc#1154738).
-  CVE-2019-11759: Fixed a stack buffer overflow in HKDF output (bsc#1154738).
-  CVE-2019-11760: Fixed a stack buffer overflow in WebRTC networking (bsc#1154738).
-  CVE-2019-11761: Fixed an unintended access to a privileged JSONView object (bsc#1154738).
-  CVE-2019-11762: Fixed a same-origin-property violation (bsc#1154738).
-  CVE-2019-11763: Fixed an XSS bypass (bsc#1154738).
-  CVE-2019-11764: Fixed several memory safety bugs (bsc#1154738).

Non-security issues fixed:

- Firefox 60.7 ESR changed the user interface language (bsc#1137990).
- Wrong Firefox GUI Language (bsc#1120374).
- Fixed an inadvertent crash report transmission without user opt-in (bsc#1074235).
- Firefox hangs randomly when browsing and scrolling (bsc#1043008).
- Firefox stops loading page until mouse is moved (bsc#1025108).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-31"/>
	<updated date="2019-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010399">SUSE bug 1010399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010405">SUSE bug 1010405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010406">SUSE bug 1010406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010408">SUSE bug 1010408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010409">SUSE bug 1010409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010421">SUSE bug 1010421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010423">SUSE bug 1010423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010424">SUSE bug 1010424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010425">SUSE bug 1010425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010426">SUSE bug 1010426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025108">SUSE bug 1025108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043008">SUSE bug 1043008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047281">SUSE bug 1047281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074235">SUSE bug 1074235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120374">SUSE bug 1120374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137990">SUSE bug 1137990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149429">SUSE bug 1149429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959933">SUSE bug 959933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983922">SUSE bug 983922</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5289/">CVE-2016-5289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5292/">CVE-2016-5292</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9067/">CVE-2016-9067</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9068/">CVE-2016-9068</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9069/">CVE-2016-9069</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9071/">CVE-2016-9071</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9073/">CVE-2016-9073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9075/">CVE-2016-9075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9076/">CVE-2016-9076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9077/">CVE-2016-9077</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7789/">CVE-2017-7789</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5151/">CVE-2018-5151</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5152/">CVE-2018-5152</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5153/">CVE-2018-5153</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5160/">CVE-2018-5160</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5163/">CVE-2018-5163</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5164/">CVE-2018-5164</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5165/">CVE-2018-5165</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5166/">CVE-2018-5166</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5167/">CVE-2018-5167</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5169/">CVE-2018-5169</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5172/">CVE-2018-5172</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5173/">CVE-2018-5173</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5175/">CVE-2018-5175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5176/">CVE-2018-5176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5177/">CVE-2018-5177</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5179/">CVE-2018-5179</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5180/">CVE-2018-5180</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5181/">CVE-2018-5181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5182/">CVE-2018-5182</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11758/">CVE-2019-11758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78838" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1046299" ref_url="https://bugzilla.suse.com/1046299" source="BUGZILLA"/>
		<reference ref_id="1046303" ref_url="https://bugzilla.suse.com/1046303" source="BUGZILLA"/>
		<reference ref_id="1046305" ref_url="https://bugzilla.suse.com/1046305" source="BUGZILLA"/>
		<reference ref_id="1050244" ref_url="https://bugzilla.suse.com/1050244" source="BUGZILLA"/>
		<reference ref_id="1050536" ref_url="https://bugzilla.suse.com/1050536" source="BUGZILLA"/>
		<reference ref_id="1050545" ref_url="https://bugzilla.suse.com/1050545" source="BUGZILLA"/>
		<reference ref_id="1051510" ref_url="https://bugzilla.suse.com/1051510" source="BUGZILLA"/>
		<reference ref_id="1054914" ref_url="https://bugzilla.suse.com/1054914" source="BUGZILLA"/>
		<reference ref_id="1055117" ref_url="https://bugzilla.suse.com/1055117" source="BUGZILLA"/>
		<reference ref_id="1055186" ref_url="https://bugzilla.suse.com/1055186" source="BUGZILLA"/>
		<reference ref_id="1061840" ref_url="https://bugzilla.suse.com/1061840" source="BUGZILLA"/>
		<reference ref_id="1064802" ref_url="https://bugzilla.suse.com/1064802" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1066129" ref_url="https://bugzilla.suse.com/1066129" source="BUGZILLA"/>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1073513" ref_url="https://bugzilla.suse.com/1073513" source="BUGZILLA"/>
		<reference ref_id="1082555" ref_url="https://bugzilla.suse.com/1082555" source="BUGZILLA"/>
		<reference ref_id="1086323" ref_url="https://bugzilla.suse.com/1086323" source="BUGZILLA"/>
		<reference ref_id="1087092" ref_url="https://bugzilla.suse.com/1087092" source="BUGZILLA"/>
		<reference ref_id="1089644" ref_url="https://bugzilla.suse.com/1089644" source="BUGZILLA"/>
		<reference ref_id="1093205" ref_url="https://bugzilla.suse.com/1093205" source="BUGZILLA"/>
		<reference ref_id="1097583" ref_url="https://bugzilla.suse.com/1097583" source="BUGZILLA"/>
		<reference ref_id="1097584" ref_url="https://bugzilla.suse.com/1097584" source="BUGZILLA"/>
		<reference ref_id="1097585" ref_url="https://bugzilla.suse.com/1097585" source="BUGZILLA"/>
		<reference ref_id="1097586" ref_url="https://bugzilla.suse.com/1097586" source="BUGZILLA"/>
		<reference ref_id="1097587" ref_url="https://bugzilla.suse.com/1097587" source="BUGZILLA"/>
		<reference ref_id="1097588" ref_url="https://bugzilla.suse.com/1097588" source="BUGZILLA"/>
		<reference ref_id="1098291" ref_url="https://bugzilla.suse.com/1098291" source="BUGZILLA"/>
		<reference ref_id="1101674" ref_url="https://bugzilla.suse.com/1101674" source="BUGZILLA"/>
		<reference ref_id="1104967" ref_url="https://bugzilla.suse.com/1104967" source="BUGZILLA"/>
		<reference ref_id="1109158" ref_url="https://bugzilla.suse.com/1109158" source="BUGZILLA"/>
		<reference ref_id="1113722" ref_url="https://bugzilla.suse.com/1113722" source="BUGZILLA"/>
		<reference ref_id="1114279" ref_url="https://bugzilla.suse.com/1114279" source="BUGZILLA"/>
		<reference ref_id="1117665" ref_url="https://bugzilla.suse.com/1117665" source="BUGZILLA"/>
		<reference ref_id="1119086" ref_url="https://bugzilla.suse.com/1119086" source="BUGZILLA"/>
		<reference ref_id="1122363" ref_url="https://bugzilla.suse.com/1122363" source="BUGZILLA"/>
		<reference ref_id="1123034" ref_url="https://bugzilla.suse.com/1123034" source="BUGZILLA"/>
		<reference ref_id="1123080" ref_url="https://bugzilla.suse.com/1123080" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1127988" ref_url="https://bugzilla.suse.com/1127988" source="BUGZILLA"/>
		<reference ref_id="1131304" ref_url="https://bugzilla.suse.com/1131304" source="BUGZILLA"/>
		<reference ref_id="1133140" ref_url="https://bugzilla.suse.com/1133140" source="BUGZILLA"/>
		<reference ref_id="1134303" ref_url="https://bugzilla.suse.com/1134303" source="BUGZILLA"/>
		<reference ref_id="1135642" ref_url="https://bugzilla.suse.com/1135642" source="BUGZILLA"/>
		<reference ref_id="1135854" ref_url="https://bugzilla.suse.com/1135854" source="BUGZILLA"/>
		<reference ref_id="1135873" ref_url="https://bugzilla.suse.com/1135873" source="BUGZILLA"/>
		<reference ref_id="1137799" ref_url="https://bugzilla.suse.com/1137799" source="BUGZILLA"/>
		<reference ref_id="1137861" ref_url="https://bugzilla.suse.com/1137861" source="BUGZILLA"/>
		<reference ref_id="1137865" ref_url="https://bugzilla.suse.com/1137865" source="BUGZILLA"/>
		<reference ref_id="1137959" ref_url="https://bugzilla.suse.com/1137959" source="BUGZILLA"/>
		<reference ref_id="1140155" ref_url="https://bugzilla.suse.com/1140155" source="BUGZILLA"/>
		<reference ref_id="1140729" ref_url="https://bugzilla.suse.com/1140729" source="BUGZILLA"/>
		<reference ref_id="1140845" ref_url="https://bugzilla.suse.com/1140845" source="BUGZILLA"/>
		<reference ref_id="1140883" ref_url="https://bugzilla.suse.com/1140883" source="BUGZILLA"/>
		<reference ref_id="1141600" ref_url="https://bugzilla.suse.com/1141600" source="BUGZILLA"/>
		<reference ref_id="1142076" ref_url="https://bugzilla.suse.com/1142076" source="BUGZILLA"/>
		<reference ref_id="1142635" ref_url="https://bugzilla.suse.com/1142635" source="BUGZILLA"/>
		<reference ref_id="1142667" ref_url="https://bugzilla.suse.com/1142667" source="BUGZILLA"/>
		<reference ref_id="1144375" ref_url="https://bugzilla.suse.com/1144375" source="BUGZILLA"/>
		<reference ref_id="1144449" ref_url="https://bugzilla.suse.com/1144449" source="BUGZILLA"/>
		<reference ref_id="1145099" ref_url="https://bugzilla.suse.com/1145099" source="BUGZILLA"/>
		<reference ref_id="1146042" ref_url="https://bugzilla.suse.com/1146042" source="BUGZILLA"/>
		<reference ref_id="1146519" ref_url="https://bugzilla.suse.com/1146519" source="BUGZILLA"/>
		<reference ref_id="1146540" ref_url="https://bugzilla.suse.com/1146540" source="BUGZILLA"/>
		<reference ref_id="1146664" ref_url="https://bugzilla.suse.com/1146664" source="BUGZILLA"/>
		<reference ref_id="1148133" ref_url="https://bugzilla.suse.com/1148133" source="BUGZILLA"/>
		<reference ref_id="1148410" ref_url="https://bugzilla.suse.com/1148410" source="BUGZILLA"/>
		<reference ref_id="1148712" ref_url="https://bugzilla.suse.com/1148712" source="BUGZILLA"/>
		<reference ref_id="1148868" ref_url="https://bugzilla.suse.com/1148868" source="BUGZILLA"/>
		<reference ref_id="1149313" ref_url="https://bugzilla.suse.com/1149313" source="BUGZILLA"/>
		<reference ref_id="1149446" ref_url="https://bugzilla.suse.com/1149446" source="BUGZILLA"/>
		<reference ref_id="1149555" ref_url="https://bugzilla.suse.com/1149555" source="BUGZILLA"/>
		<reference ref_id="1149651" ref_url="https://bugzilla.suse.com/1149651" source="BUGZILLA"/>
		<reference ref_id="1150381" ref_url="https://bugzilla.suse.com/1150381" source="BUGZILLA"/>
		<reference ref_id="1150423" ref_url="https://bugzilla.suse.com/1150423" source="BUGZILLA"/>
		<reference ref_id="1150452" ref_url="https://bugzilla.suse.com/1150452" source="BUGZILLA"/>
		<reference ref_id="1150465" ref_url="https://bugzilla.suse.com/1150465" source="BUGZILLA"/>
		<reference ref_id="1150875" ref_url="https://bugzilla.suse.com/1150875" source="BUGZILLA"/>
		<reference ref_id="1151350" ref_url="https://bugzilla.suse.com/1151350" source="BUGZILLA"/>
		<reference ref_id="1151508" ref_url="https://bugzilla.suse.com/1151508" source="BUGZILLA"/>
		<reference ref_id="1151610" ref_url="https://bugzilla.suse.com/1151610" source="BUGZILLA"/>
		<reference ref_id="1151667" ref_url="https://bugzilla.suse.com/1151667" source="BUGZILLA"/>
		<reference ref_id="1151671" ref_url="https://bugzilla.suse.com/1151671" source="BUGZILLA"/>
		<reference ref_id="1151680" ref_url="https://bugzilla.suse.com/1151680" source="BUGZILLA"/>
		<reference ref_id="1151891" ref_url="https://bugzilla.suse.com/1151891" source="BUGZILLA"/>
		<reference ref_id="1151955" ref_url="https://bugzilla.suse.com/1151955" source="BUGZILLA"/>
		<reference ref_id="1152024" ref_url="https://bugzilla.suse.com/1152024" source="BUGZILLA"/>
		<reference ref_id="1152025" ref_url="https://bugzilla.suse.com/1152025" source="BUGZILLA"/>
		<reference ref_id="1152026" ref_url="https://bugzilla.suse.com/1152026" source="BUGZILLA"/>
		<reference ref_id="1152161" ref_url="https://bugzilla.suse.com/1152161" source="BUGZILLA"/>
		<reference ref_id="1152325" ref_url="https://bugzilla.suse.com/1152325" source="BUGZILLA"/>
		<reference ref_id="1152457" ref_url="https://bugzilla.suse.com/1152457" source="BUGZILLA"/>
		<reference ref_id="1152460" ref_url="https://bugzilla.suse.com/1152460" source="BUGZILLA"/>
		<reference ref_id="1152466" ref_url="https://bugzilla.suse.com/1152466" source="BUGZILLA"/>
		<reference ref_id="1152788" ref_url="https://bugzilla.suse.com/1152788" source="BUGZILLA"/>
		<reference ref_id="1152791" ref_url="https://bugzilla.suse.com/1152791" source="BUGZILLA"/>
		<reference ref_id="1152972" ref_url="https://bugzilla.suse.com/1152972" source="BUGZILLA"/>
		<reference ref_id="1152974" ref_url="https://bugzilla.suse.com/1152974" source="BUGZILLA"/>
		<reference ref_id="1152975" ref_url="https://bugzilla.suse.com/1152975" source="BUGZILLA"/>
		<reference ref_id="1153112" ref_url="https://bugzilla.suse.com/1153112" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153236" ref_url="https://bugzilla.suse.com/1153236" source="BUGZILLA"/>
		<reference ref_id="1153263" ref_url="https://bugzilla.suse.com/1153263" source="BUGZILLA"/>
		<reference ref_id="1153646" ref_url="https://bugzilla.suse.com/1153646" source="BUGZILLA"/>
		<reference ref_id="1153713" ref_url="https://bugzilla.suse.com/1153713" source="BUGZILLA"/>
		<reference ref_id="1153717" ref_url="https://bugzilla.suse.com/1153717" source="BUGZILLA"/>
		<reference ref_id="1153718" ref_url="https://bugzilla.suse.com/1153718" source="BUGZILLA"/>
		<reference ref_id="1153719" ref_url="https://bugzilla.suse.com/1153719" source="BUGZILLA"/>
		<reference ref_id="1153811" ref_url="https://bugzilla.suse.com/1153811" source="BUGZILLA"/>
		<reference ref_id="1154108" ref_url="https://bugzilla.suse.com/1154108" source="BUGZILLA"/>
		<reference ref_id="1154189" ref_url="https://bugzilla.suse.com/1154189" source="BUGZILLA"/>
		<reference ref_id="1154354" ref_url="https://bugzilla.suse.com/1154354" source="BUGZILLA"/>
		<reference ref_id="1154372" ref_url="https://bugzilla.suse.com/1154372" source="BUGZILLA"/>
		<reference ref_id="1154578" ref_url="https://bugzilla.suse.com/1154578" source="BUGZILLA"/>
		<reference ref_id="1154607" ref_url="https://bugzilla.suse.com/1154607" source="BUGZILLA"/>
		<reference ref_id="1154608" ref_url="https://bugzilla.suse.com/1154608" source="BUGZILLA"/>
		<reference ref_id="1154610" ref_url="https://bugzilla.suse.com/1154610" source="BUGZILLA"/>
		<reference ref_id="1154611" ref_url="https://bugzilla.suse.com/1154611" source="BUGZILLA"/>
		<reference ref_id="1154651" ref_url="https://bugzilla.suse.com/1154651" source="BUGZILLA"/>
		<reference ref_id="1154747" ref_url="https://bugzilla.suse.com/1154747" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18595" ref_url="https://www.suse.com/security/cve/CVE-2017-18595/" source="CVE"/>
		<reference ref_id="CVE-2019-14821" ref_url="https://www.suse.com/security/cve/CVE-2019-14821/" source="CVE"/>
		<reference ref_id="CVE-2019-15291" ref_url="https://www.suse.com/security/cve/CVE-2019-15291/" source="CVE"/>
		<reference ref_id="CVE-2019-16232" ref_url="https://www.suse.com/security/cve/CVE-2019-16232/" source="CVE"/>
		<reference ref_id="CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234/" source="CVE"/>
		<reference ref_id="CVE-2019-17056" ref_url="https://www.suse.com/security/cve/CVE-2019-17056/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="CVE-2019-17666" ref_url="https://www.suse.com/security/cve/CVE-2019-17666/" source="CVE"/>
		<reference ref_id="CVE-2019-9506" ref_url="https://www.suse.com/security/cve/CVE-2019-9506/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2017-18595: A double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c (bnc#1149555).
- CVE-2019-14821: An out-of-bounds access issue was found in the way Linux kernel's KVM hypervisor implements the coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring-&gt;first' and 'ring-&gt;last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system (bnc#1151350).
- CVE-2019-15291: There was a NULL pointer dereference caused by a malicious USB device in the flexcop_usb_probe function in the drivers/media/usb/b2c2/flexcop-usb.c driver (bnc#1146540).
- CVE-2019-9506: The Bluetooth BR/EDR specification up to and including version 5.1 permitted sufficiently low encryption key length and did not prevent an attacker from influencing the key length negotiation. This allowed practical brute-force attacks (aka 'KNOB') that could decrypt traffic and injected arbitrary ciphertext without the victim noticing (bnc#1137865 bnc#1146042).
- CVE-2019-16232: Fixed a NULL pointer dereference in drivers/net/wireless/marvell/libertas/if_sdio.c, which did not check the alloc_workqueue return value (bnc#1150465).
- CVE-2019-16234: Fixed a NULL pointer dereference in drivers/net/wireless/intel/iwlwifi/pcie/trans.c, which did not check the alloc_workqueue return value (bnc#1150452).
- CVE-2019-17056: Added enforcement of CAP_NET_RAW in llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module, the lack of which allowed unprivileged users to create a raw socket, aka CID-3a359798b176 (bnc#1152788).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
- CVE-2019-17666: Added an upper-bound check in rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c, the lack of which could have led to a buffer overflow (bnc#1154372).

The following non-security bugs were fixed:

- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).
- ACPI / CPPC: do not require the _PSD method (bsc#1051510).
- ACPI: CPPC: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).
- ACPI: custom_method: fix memory leaks (bsc#1051510).
- ACPI / PCI: fix acpi_pci_irq_enable() memory leak (bsc#1051510).
- ACPI / processor: do not print errors for processorIDs == 0xff (bsc#1051510).
- ACPI / property: Fix acpi_graph_get_remote_endpoint() name in kerneldoc (bsc#1051510).
- act_mirred: Fix mirred_init_module error handling (bsc#1051510).
- Add kernel module compression support (bsc#1135854) For enabling the kernel module compress, add the item COMPRESS_MODULES='xz' in config.sh, then mkspec will pass it to the spec file.
- alarmtimer: Use EOPNOTSUPP instead of ENOTSUPP (bsc#1151680).
- ALSA: aoa: onyx: always initialize register read value (bsc#1051510).
- ALSA: firewire-tascam: check intermediate state of clock status and retry (bsc#1051510).
- ALSA: firewire-tascam: handle error code when getting current source of clock (bsc#1051510).
- ALSA: hda - Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).
- ALSA: hda: Add support of Zhaoxin controller (bsc#1051510).
- ALSA: hda - Apply AMD controller workaround for Raven platform (bsc#1051510).
- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).
- ALSA: hda - Drop unsol event handler for Intel HDMI codecs (bsc#1051510).
- ALSA: hda - Expand pin_match function to match upcoming new tbls (bsc#1051510).
- ALSA: hda: Flush interrupts on disabling (bsc#1051510).
- ALSA: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).
- ALSA: hda - Inform too slow responses (bsc#1051510).
- ALSA: hda/realtek - Blacklist PC beep for Lenovo ThinkCentre M73/93 (bsc#1051510).
- ALSA: hda/realtek - Check beep whitelist before assigning in all codecs (bsc#1051510).
- ALSA: hda/realtek - Fix alienware headset mic (bsc#1051510).
- ALSA: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).
- ALSA: hda: Set fifo_size for both playback and capture streams (bsc#1051510).
- ALSA: hda - Show the fatal CORB/RIRB error more clearly (bsc#1051510).
- ALSA: hda/sigmatel - remove unused variable 'stac9200_core_init' (bsc#1051510).
- ALSA: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).
- ALSA: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).
- ALSA: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).
- ALSA: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).
- ALSA: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).
- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- ASoC: Define a set of DAPM pre/post-up events (bsc#1051510).
- ASoC: dmaengine: Make the pcm-&gt;name equal to pcm-&gt;id if the name is not set (bsc#1051510).
- ASoC: es8328: Fix copy-paste error in es8328_right_line_controls (bsc#1051510).
- ASoC: Intel: Baytrail: Fix implicit fallthrough warning (bsc#1051510).
- ASoC: Intel: Fix use of potentially uninitialized variable (bsc#1051510).
- ASoC: Intel: NHLT: Fix debug print format (bsc#1051510).
- ASoC: sgtl5000: Fix charge pump source assignment (bsc#1051510).
- ASoC: sun4i-i2s: RX and TX counter registers are swapped (bsc#1051510).
- ASoC: wm8737: Fix copy-paste error in wm8737_snd_controls (bsc#1051510).
- ASoC: wm8988: fix typo in wm8988_right_line_controls (bsc#1051510).
- ath9k: dynack: fix possible deadlock in ath_dynack_node_{de}init (bsc#1051510).
- atm: iphase: Fix Spectre v1 vulnerability (networking-stable-19_08_08).
- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).
- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- bcma: fix incorrect update of BCMA_CORE_PCI_MDIO_DATA (bsc#1051510).
- blk-flush: do not run queue for requests bypassing flush (bsc#1137959).
- blk-flush: use blk_mq_request_bypass_insert() (bsc#1137959).
- blk-mq: do not allocate driver tag upfront for flush rq (bsc#1137959).
- blk-mq: Fix memory leak in blk_mq_init_allocated_queue error handling (bsc#1151610).
- blk-mq: insert rq with DONTPREP to hctx dispatch list when requeue (bsc#1137959).
- blk-mq: kABI fixes for blk-mq.h (bsc#1137959).
- blk-mq: move blk_mq_put_driver_tag*() into blk-mq.h (bsc#1137959).
- blk-mq: punt failed direct issue to dispatch list (bsc#1137959).
- blk-mq: put the driver tag of nxt rq before first one is requeued (bsc#1137959).
- blk-mq-sched: decide how to handle flush rq via RQF_FLUSH_SEQ (bsc#1137959).
- blk-wbt: abstract out end IO completion handler (bsc#1135873).
- blk-wbt: fix has-sleeper queueing check (bsc#1135873).
- blk-wbt: improve waking of tasks (bsc#1135873).
- blk-wbt: move disable check into get_limit() (bsc#1135873).
- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).
- block: add io timeout to sysfs (bsc#1148410).
- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).
- block: fix timeout changes for legacy request drivers (bsc#1149446).
- block: kABI fixes for BLK_EH_DONE renaming (bsc#1142076).
- block: rename BLK_EH_NOT_HANDLED to BLK_EH_DONE (bsc#1142076).
- Bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).
- bnx2x: Disable multi-cos feature (networking-stable-19_08_08).
- bnx2x: Fix VF's VLAN reconfiguration in reload (bsc#1086323 ).
- bonding: Add vlan tx offload to hw_enc_features (networking-stable-19_08_21).
- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).
- btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).
- btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).
- btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).
- btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).
- btrfs: fix use-after-free when using the tree modification log (bsc#1151891).
- btrfs: qgroup: Fix reserved data space leak if we have multiple reserve calls (bsc#1152975).
- btrfs: qgroup: Fix the wrong target io_tree when freeing reserved data space (bsc#1152974).
- btrfs: relocation: fix use-after-free on dead relocation roots (bsc#1152972).
- btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).
- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).
- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).
- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).
- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).
- ceph: fix directories inode i_blkbits initialization (bsc#1153717).
- ceph: reconnect connection if session hang in opening state (bsc#1153718).
- ceph: update the mtime when truncating up (bsc#1153719).
- ceph: use ceph_evict_inode to cleanup inode's resource (bsc#1148133).
- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).
- cfg80211: Purge frame registrations on iftype change (bsc#1051510).
- clk: at91: fix update bit maps on CFG_MOR write (bsc#1051510).
- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).
- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).
- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).
- clk: sunxi-ng: v3s: add missing clock slices for MMC2 module clocks (bsc#1051510).
- clk: sunxi-ng: v3s: add the missing PLL_DDR1 (bsc#1051510).
- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).
- crypto: caam - fix concurrency issue in givencrypt descriptor (bsc#1051510).
- crypto: caam - free resources in case caam_rng registration failed (bsc#1051510).
- crypto: cavium/zip - Add missing single_release() (bsc#1051510).
- crypto: ccp - Reduce maximum stack usage (bsc#1051510).
- crypto: qat - Silence smp_processor_id() warning (bsc#1051510).
- crypto: skcipher - Unmap pages after an external error (bsc#1051510).
- crypto: talitos - fix missing break in switch statement (bsc#1142635).
- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).
- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).
- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).
- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).
- dasd_fba: Display '00000000' for zero page when dumping sense (bsc#1123080).
- /dev/mem: Bail out upon SIGKILL (git-fixes).
- dmaengine: dw: platform: Switch to acpi_dma_controller_register() (bsc#1051510).
- dmaengine: iop-adma.c: fix printk format warning (bsc#1051510).
- drivers: thermal: int340x_thermal: Fix sysfs race condition (bsc#1051510).
- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).
- drm/amdgpu/si: fix ASIC tests (git-fixes).
- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).
- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).
- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).
- drm: Flush output polling on shutdown (bsc#1051510).
- drm/i915: Fix various tracepoints for gen2 (bsc#1113722)
- drm/imx: Drop unused imx-ipuv3-crtc.o build (bsc#1113722)
- drm/msm/dsi: Implement reset correctly (bsc#1051510).
- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).
- drm/radeon: Fix EEH during kexec (bsc#1051510).
- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).
- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).
- Drop multiversion(kernel) from the KMP template (bsc#1127155).
- e1000e: add workaround for possible stalled packet (bsc#1051510).
- EDAC/amd64: Decode syndrome before translating address (bsc#1114279).
- eeprom: at24: make spd world-readable again (git-fixes).
- ext4: fix warning inside ext4_convert_unwritten_extents_endio (bsc#1152025).
- ext4: set error return correctly when ext4_htree_store_dirent fails (bsc#1152024).
- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).
- Fix AMD IOMMU kABI (bsc#1154610).
- Fix kabi for: NFSv4: Fix OPEN / CLOSE race (git-fixes).
- Fix KVM kABI after x86 mmu backports (bsc#1117665).
- gpio: fix line flag validation in lineevent_create (bsc#1051510).
- gpio: fix line flag validation in linehandle_create (bsc#1051510).
- gpiolib: acpi: Add gpiolib_acpi_run_edge_events_on_boot option and blacklist (bsc#1051510).
- gpiolib: only check line handle flags once (bsc#1051510).
- gpio: Move gpiochip_lock/unlock_as_irq to gpio/driver.h (bsc#1051510).
- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).
- HID: apple: Fix stuck function keys when using FN (bsc#1051510).
- HID: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).
- HID: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).
- HID: prodikeys: Fix general protection fault during probe (bsc#1051510).
- HID: sony: Fix memory corruption issue on cleanup (bsc#1051510).
- hwmon: (acpi_power_meter) Change log level for 'unsafe software power cap' (bsc#1051510).
- hwmon: (lm75) Fix write operations for negative temperatures (bsc#1051510).
- hwmon: (shtc1) fix shtc1 and shtw1 id mask (bsc#1051510).
- hwrng: core - do not wait on add_early_randomness() (git-fixes).
- i2c: riic: Clear NACK in tend isr (bsc#1051510).
- IB/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)
- IB/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).
- IB/mlx5: Consolidate use_umr checks into single function (bsc#1093205).
- IB/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).
- IB/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).
- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).
- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- ife: error out when nla attributes are empty (networking-stable-19_08_08).
- iio: adc: ad799x: fix probe error handling (bsc#1051510).
- iio: dac: ad5380: fix incorrect assignment to val (bsc#1051510).
- iio: light: opt3001: fix mutex unlock race (bsc#1051510).
- ima: always return negative code for error (bsc#1051510).
- Input: da9063 - fix capability and drop KEY_SLEEP (bsc#1051510).
- Input: elan_i2c - remove Lenovo Legion Y7000 PnpID (bsc#1051510).
- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).
- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).
- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).
- iommu/amd: Remove domain-&gt;updated (bsc#1154610).
- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).
- iommu/dma: Fix for dereferencing before null checking (bsc#1151667).
- iommu/iova: Avoid false sharing on fq_timer_on (bsc#1151671).
- ip6_tunnel: fix possible use-after-free on xmit (networking-stable-19_08_08).
- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).
- ipv6/addrconf: allow adding multicast addr if IFA_F_MCAUTOJOIN is set (networking-stable-19_08_28).
- ipv6: Fix the link time qualifier of 'ping_v6_proc_exit_net()' (networking-stable-19_09_15).
- isdn/capi: check message length in capi_write() (bsc#1051510).
- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).
- ixgbe: sync the first fragment unconditionally (bsc#1133140).
- kABI: media: em28xx: fix handler for vidioc_s_input() (bsc#1051510). fixes kABI
- kABI: media: em28xx: stop rewriting device's struct (bsc#1051510). fixes kABI
- kABI: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).
- kABI/severities: Whitelist functions internal to radix mm. To call these functions you have to first detect if you are running in radix mm mode which can't be expected of OOT code.
- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).
- kernel-subpackage-build: create zero size ghost for uncompressed vmlinux (bsc#1154354). It is not strictly necessary to uncompress it so maybe the ghost file can be 0 size in this case.
- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).
- KVM: Convert kvm_lock to a mutex (bsc#1117665).
- KVM: MMU: drop vcpu param in gpte_access (bsc#1117665).
- KVM: PPC: Book3S: Fix incorrect guest-to-user-translation error handling (bsc#1061840).
- KVM: PPC: Book3S HV: Check for MMU ready on piggybacked virtual cores (bsc#1061840).
- KVM: PPC: Book3S HV: Do not lose pending doorbell request on migration on P9 (bsc#1061840).
- KVM: PPC: Book3S HV: Do not push XIVE context when not using XIVE device (bsc#1061840).
- KVM: PPC: Book3S HV: Fix lockdep warning when entering the guest (bsc#1061840).
- KVM: PPC: Book3S HV: Fix race in re-enabling XIVE escalation interrupts (bsc#1061840).
- KVM: PPC: Book3S HV: Handle virtual mode in XIVE VCPU push code (bsc#1061840).
- KVM: PPC: Book3S HV: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).
- KVM: PPC: Book3S HV: XIVE: Free escalation interrupts before disabling the VP (bsc#1061840).
- KVM: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).
- KVM: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).
- KVM: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).
- KVM: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).
- KVM: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).
- KVM: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).
- KVM: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).
- leds: leds-lp5562 allow firmware files up to the maximum length (bsc#1051510).
- leds: trigger: gpio: GPIO 0 is valid (bsc#1051510).
- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).
- libertas_tf: Use correct channel range in lbtf_geo_init (bsc#1051510).
- libiscsi: do not try to bypass SCSI EH (bsc#1142076).
- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).
- livepatch: Nullify obj-&gt;mod in klp_module_coming()'s error path (bsc#1071995).
- mac80211: accept deauth frames in IBSS mode (bsc#1051510).
- mac80211: minstrel_ht: fix per-group max throughput rate initialization (bsc#1051510).
- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).
- md: do not report active array_state until after revalidate_disk() completes (git-fixes).
- md: only call set_in_sync() when it is expected to succeed (git-fixes).
- md/raid6: Set R5_ReadError when there is read failure on parity disk (git-fixes).
- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).
- media: atmel: atmel-isi: fix timeout value for stop streaming (bsc#1051510).
- media: cpia2_usb: fix memory leaks (bsc#1051510).
- media: dib0700: fix link error for dibx000_i2c_set_speed (bsc#1051510).
- media: dvb-core: fix a memory leak bug (bsc#1051510).
- media: em28xx: fix handler for vidioc_s_input() (bsc#1051510).
- media: em28xx: stop rewriting device's struct (bsc#1051510).
- media: exynos4-is: fix leaked of_node references (bsc#1051510).
- media: fdp1: Reduce FCP not found message level to debug (bsc#1051510).
- media: gspca: zero usb_buf on error (bsc#1051510).
- media: hdpvr: Add device num check and handling (bsc#1051510).
- media: hdpvr: add terminating 0 at end of string (bsc#1051510).
- media: i2c: ov5645: Fix power sequence (bsc#1051510).
- media: iguanair: add sanity checks (bsc#1051510).
- media: marvell-ccic: do not generate EOF on parallel bus (bsc#1051510).
- media: mc-device.c: do not memset __user pointer contents (bsc#1051510).
- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).
- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).
- media: ov6650: Fix sensor possibly not detected on probe (bsc#1051510).
- media: ov6650: Move v4l2_clk_get() to ov6650_video_probe() helper (bsc#1051510).
- media: ov9650: add a sanity check (bsc#1051510).
- media: radio/si470x: kill urb on error (bsc#1051510).
- media: replace strcpy() by strscpy() (bsc#1051510).
- media: Revert '[media] marvell-ccic: reset ccic phy when stop streaming for stability' (bsc#1051510).
- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).
- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).
- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).
- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).
- media: technisat-usb2: break out of loop at end of buffer (bsc#1051510).
- media: tm6000: double free if usb disconnect while streaming (bsc#1051510).
- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).
- media: vb2: Fix videobuf2 to map correct area (bsc#1051510).
- memstick: jmb38x_ms: Fix an error handling path in 'jmb38x_ms_probe()' (bsc#1051510).
- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).
- mic: avoid statically declaring a 'struct device' (bsc#1051510).
- mISDN: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).
- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).
- mmc: sdhci: improve ADMA error reporting (bsc#1051510).
- mmc: sdhci-msm: fix mutex while in spinlock (bsc#1142635).
- mmc: sdhci-of-arasan: Do now show error message in case of deffered probe (bsc#1119086).
- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).
- mtd: spi-nor: Fix Cadence QSPI RCU Schedule Stall (bsc#1051510).
- mvpp2: refactor MTU change code (networking-stable-19_08_08).
- net: bridge: delete local fdb on device init failure (networking-stable-19_08_08).
- net: bridge: mcast: do not delete permanent entries when fast leave is enabled (networking-stable-19_08_08).
- net: fix ifindex collision during namespace removal (networking-stable-19_08_08).
- net: Fix null de-reference of device refcount (networking-stable-19_09_15).
- net: fix skb use after free in netpoll (networking-stable-19_09_05).
- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).
- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).
- net/ibmvnic: prevent more than one thread from running in reset (bsc#1152457 ltc#174432).
- net/ibmvnic: unlock rtnl_lock in reset so linkwatch_event can run (bsc#1152457 ltc#174432).
- net/mlx4_en: fix a memory leak bug (bsc#1046299).
- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).
- net/mlx5e: Only support tx/rx pause setting for port owner (networking-stable-19_08_21).
- net/mlx5e: Prevent encap flow counter update async to user query (networking-stable-19_08_08).
- net/mlx5e: Use flow keys dissector to parse packets for ARFS (networking-stable-19_08_21).
- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).
- net/mlx5: Use reversed order when unregister devices (networking-stable-19_08_08).
- net/packet: fix race in tpacket_snd() (networking-stable-19_08_21).
- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).
- net: sched: Fix a possible null-pointer dereference in dequeue_func() (networking-stable-19_08_08).
- net/smc: make sure EPOLLOUT is raised (networking-stable-19_08_28).
- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).
- nfc: fix attrs checks in netlink interface (bsc#1051510).
- nfc: fix memory leak in llcp_sock_bind() (bsc#1051510).
- nfc: pn533: fix use-after-free and memleaks (bsc#1051510).
- NFS4: Fix v4.0 client state corruption when mount (git-fixes).
- nfsd: degraded slot-count more gracefully as allocation nears exhaustion (bsc#1150381).
- nfsd: Do not release the callback slot unless it was actually held (git-fixes).
- nfsd: Fix overflow causing non-working mounts on 1 TB machines (bsc#1150381).
- nfsd: fix performance-limiting session calculation (bsc#1150381).
- nfsd: give out fewer session slots as limit approaches (bsc#1150381).
- nfsd: handle drc over-allocation gracefully (bsc#1150381).
- nfsd: increase DRC cache limit (bsc#1150381).
- NFS: Do not interrupt file writeout due to fatal errors (git-fixes).
- NFS: Do not open code clearing of delegation state (git-fixes).
- NFS: Ensure O_DIRECT reports an error if the bytes read/written is 0 (git-fixes).
- NFS: Fix regression whereby fscache errors are appearing on 'nofsc' mounts (git-fixes).
- NFS: Forbid setting AF_INET6 to 'struct sockaddr_in'-&gt;sin_family (git-fixes).
- NFS: Refactor nfs_lookup_revalidate() (git-fixes).
- NFS: Remove redundant semicolon (git-fixes).
- NFSv4.1: Again fix a race where CB_NOTIFY_LOCK fails to wake a waiter (git-fixes).
- NFSv4.1: Fix open stateid recovery (git-fixes).
- NFSv4.1: Only reap expired delegations (git-fixes).
- NFSv4: Check the return value of update_open_stateid() (git-fixes).
- NFSv4: Fix an Oops in nfs4_do_setattr (git-fixes).
- NFSv4: Fix a potential sleep while atomic in nfs4_do_reclaim() (git-fixes).
- NFSv4: Fix delegation state recovery (git-fixes).
- NFSv4: Fix lookup revalidate of regular files (git-fixes).
- NFSv4: Fix OPEN / CLOSE race (git-fixes).
- NFSv4: Handle the special Linux file open access mode (git-fixes).
- NFSv4: Only pass the delegation to setattr if we're sending a truncate (git-fixes).
- NFSv4/pnfs: Fix a page lock leak in nfs_pageio_resend() (git-fixes).
- nl80211: Fix possible Spectre-v1 for CQM RSSI thresholds (bsc#1051510).
- null_blk: complete requests from -&gt;timeout (bsc#1149446).
- null_blk: wire up timeouts (bsc#1149446).
- nvme: fix multipath crash when ANA is deactivated (bsc#1149446).
- nvmem: Use the same permissions for eeprom as for nvmem (git-fixes).
- nvme-rdma: Allow DELETING state change failure in (bsc#1104967,).
- nvme-rdma: centralize admin/io queue teardown sequence (bsc#1142076).
- nvme-rdma: centralize controller setup sequence (bsc#1142076).
- nvme-rdma: fix a NULL deref when an admin connect times out (bsc#1149446).
- nvme-rdma: fix timeout handler (bsc#1149446).
- nvme-rdma: stop admin queue before freeing it (bsc#1140155).
- nvme-rdma: support up to 4 segments of inline data (bsc#1142076).
- nvme-rdma: unquiesce queues when deleting the controller (bsc#1142076).
- nvme: remove ns sibling before clearing path (bsc#1140155).
- nvme: return BLK_EH_DONE from -&gt;timeout (bsc#1142076).
- objtool: Clobber user CFLAGS variable (bsc#1153236).
- PCI: Correct pci=resource_alignment parameter example (bsc#1051510).
- PCI: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).
- PCI: hv: Detect and fix Hyper-V PCI domain number collision (bsc#1150423).
- PCI: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263).
- PCI: PM: Fix pci_power_up() (bsc#1051510).
- phy: renesas: rcar-gen3-usb2: Disable clearing VBUS in over-current (bsc#1051510).
- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).
- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).
- platform/x86: pmc_atom: Add Siemens SIMATIC IPC227E to critclk_systems DMI table (bsc#1051510).
- platform/x86: pmc_atom: Add Siemens SIMATIC IPC277E to critclk_systems DMI table (bsc#1051510).
- PM: sleep: Fix possible overflow in pm_system_cancel_wakeup() (bsc#1051510).
- PNFS fallback to MDS if no deviceid found (git-fixes).
- pNFS/flexfiles: Fix PTR_ERR() dereferences in ff_layout_track_ds_error (git-fixes).
- pNFS/flexfiles: Turn off soft RPC calls (git-fixes).
- powerpc/64: Make sys_switch_endian() traceable (bsc#1065729).
- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).
- powerpc/64s/radix: Fix MADV_[FREE|DONTNEED] TLB flush miss problem with THP (bsc#1152161 ltc#181664).
- powerpc/64s/radix: Fix memory hotplug section page table creation (bsc#1065729).
- powerpc/64s/radix: Fix memory hot-unplug page table split (bsc#1065729).
- powerpc/64s/radix: Implement _tlbie(l)_va_range flush functions (bsc#1152161 ltc#181664).
- powerpc/64s/radix: Improve preempt handling in TLB code (bsc#1152161 ltc#181664).
- powerpc/64s/radix: Improve TLB flushing for page table freeing (bsc#1152161 ltc#181664).
- powerpc/64s/radix: Introduce local single page ceiling for TLB range flush (bsc#1055117 bsc#1152161 ltc#181664).
- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).
- powerpc/64s/radix: Optimize flush_tlb_range (bsc#1152161 ltc#181664).
- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).
- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).
- powerpc/book3s64/mm: Do not do tlbie fixup for some hardware revisions (bsc#1152161 ltc#181664).
- powerpc/book3s64/radix: Rename CPU_FTR_P9_TLBIE_BUG feature flag (bsc#1152161 ltc#181664).
- powerpc: bpf: Fix generation of load/store DW instructions (bsc#1065729).
- powerpc/bpf: use unsigned division instruction for 64-bit operations (bsc#1065729).
- powerpc: Drop page_is_ram() and walk_system_ram_range() (bsc#1065729).
- powerpc/irq: Do not WARN continuously in arch_local_irq_restore() (bsc#1065729).
- powerpc/irq: drop arch_early_irq_init() (bsc#1065729).
- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).
- powerpc/mm: Fixup tlbie vs mtpidr/mtlpidr ordering issue on POWER9 (bsc#1152161 ltc#181664).
- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).
- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).
- powerpc/mm/radix: Drop unneeded NULL check (bsc#1152161 ltc#181664).
- powerpc/mm/radix: implement LPID based TLB flushes to be used by KVM (bsc#1152161 ltc#181664).
- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).
- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).
- powerpc/mm: Simplify page_is_ram by using memblock_is_memory (bsc#1065729).
- powerpc/mm: Use memblock API for PPC32 page_is_ram (bsc#1065729).
- powerpc/module64: Fix comment in R_PPC64_ENTRY handling (bsc#1065729).
- powerpc/powernv: Fix compile without CONFIG_TRACEPOINTS (bsc#1065729).
- powerpc/powernv/ioda2: Allocate TCE table levels on demand for default DMA window (bsc#1061840).
- powerpc/powernv/ioda: Fix race in TCE level allocation (bsc#1061840).
- powerpc/powernv: move OPAL call wrapper tracing and interrupt handling to C (bsc#1065729).
- powerpc/powernv/npu: Remove obsolete comment about TCE_KILL_INVAL_ALL (bsc#1065729).
- powerpc/pseries: Call H_BLOCK_REMOVE when supported (bsc#1109158).
- powerpc/pseries: Export maximum memory value (bsc#1122363).
- powerpc/pseries: Export raw per-CPU VPA data via debugfs ().
- powerpc/pseries: Fix cpu_hotplug_lock acquisition in resize_hpt() (bsc#1065729).
- powerpc/pseries/memory-hotplug: Fix return value type of find_aa_index (bsc#1065729).
- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).
- powerpc/pseries: Read TLB Block Invalidate Characteristics (bsc#1109158).
- powerpc/pseries: Remove confusing warning message (bsc#1109158).
- powerpc/ptrace: Simplify vr_get/set() to avoid GCC warning (bsc#1148868).
- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).
- powerpc/xive: Fix bogus error code returned by OPAL (bsc#1065729).
- powerpc/xive: Implement get_irqchip_state method for XIVE to fix shutdown race (bsc#1065729).
- powerpc/xmon: Fix opcode being uninitialized in print_insn_powerpc (bsc#1065729).
- power: reset: gpio-restart: Fix typo when gpio reset is not found (bsc#1051510).
- power: supply: Init device wakeup after device_add() (bsc#1051510).
- power: supply: sysfs: ratelimit property read error message (bsc#1051510).
- ppp: Fix memory leak in ppp_write (git-fixes).
- printk: Do not lose last line in kmsg buffer dump (bsc#1152460).
- printk: fix printk_time race (bsc#1152466).
- printk/panic: Avoid deadlock in printk() after stopping CPUs by NMI (bsc#1148712).
- qed: iWARP - Fix default window size to be based on chip (bsc#1050536 bsc#1050545).
- qed: iWARP - Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).
- qed: iWARP - fix uninitialized callback (bsc#1050536 bsc#1050545).
- qed: iWARP - Use READ_ONCE and smp_store_release to access ep-&gt;state (bsc#1050536 bsc#1050545).
- qla2xxx: kABI fixes for v10.01.00.18-k (bsc#1123034 bsc#1131304 bsc#1127988).
- qla2xxx: remove SGI SN2 support (bsc#1123034 bsc#1131304 bsc#1127988).
- quota: fix wrong condition in is_quota_modification() (bsc#1152026).
- r8152: Set memory to all 0xFFs on failed reg reads (bsc#1051510).
- RDMA/bnxt_re: Fix spelling mistake 'missin_resp' -&gt; 'missing_resp' (bsc#1050244).
- RDMA: Fix goto target to release the allocated memory (bsc#1050244).
- regulator: lm363x: Fix off-by-one n_voltages for lm3632 ldo_vpos/ldo_vneg (bsc#1051510).
- Revert 'mwifiex: fix system hang problem after resume' (bsc#1051510).
- Revert 'Revert 'rpm/kernel-binary.spec.in: rename kGraft to KLP ()'' This reverts commit 468af43c8fd8509820798b6d8ed363fc417ca939 Should get this rename again with next SLE15 merge.
- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).
- s390/crypto: fix gcm-aes-s390 selftest failures (bsc#1137861 LTC#178091).
- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).
- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).
- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).
- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).
- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).
- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).
- scsi: qla2xxx: Add 28xx flash primary/secondary status/image mechanism (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Add Device ID for ISP28XX (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Add First Burst support for FC-NVMe devices (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Add fw_attr and port_no SysFS node (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Add new FW dump template entry types (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Add pci function reset support (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Add protection mask module parameters (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Add Serdes support for ISP28XX (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Add support for multiple fwdump templates/segments (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Add support for setting port speed (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Allow NVMe IO to resume with short cable pull (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: allow session delete to finish before create (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Always check the qla2x00_wait_for_hba_online() return value (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Avoid PCI IRQ affinity mapping when multiqueue is not supported (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: avoid printf format warning (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Avoid that Coverity complains about dereferencing a NULL rport pointer (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Avoid that lockdep complains about unsafe locking in tcm_qla2xxx_close_session() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Avoid that qla2x00_mem_free() crashes if called twice (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Change abort wait_loop from msleep to wait_event_timeout (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Change data_dsd into an array (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Change default ZIO threshold (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Change the return type of qla24xx_read_flash_data() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Change the return type of qla2x00_update_ms_fdmi_iocb() into void (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Check for FW started flag before aborting (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: check for kstrtol() failure (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Check secondary image if reading the primary image fails (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Check the PCI info string output buffer size (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Check the size of firmware data structures at compile time (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Cleanup fcport memory to prevent leak (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Cleanup redundant qla2x00_abort_all_cmds during unload (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Cleanups for NVRAM/Flash read/write path (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: cleanup trace buffer initialization (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Complain if a command is released that is owned by the firmware (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Complain if a mailbox command times out (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Complain if a soft reset fails (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Complain if parsing the version string fails (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Complain if sp-&gt;done() is not called from the completion path (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Complain if waiting for pending commands times out (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Complain loudly about reference count underflow (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Correct error handling during initialization failures (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Correction and improvement to fwdt processing (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Correctly report max/min supported speeds (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: deadlock by configfs_depend_item (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Declare fourth qla2x00_set_model_info() argument const (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Declare local symbols static (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Declare qla24xx_build_scsi_crc_2_iocbs() static (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Declare qla2x00_find_new_loop_id() static (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Declare qla_tgt_cmd.cdb const (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Declare the fourth ql_dump_buffer() argument const (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Do not corrupt vha-&gt;plogi_ack_list (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Downgrade driver to 10.01.00.19-k There are upstream bug reports against 10.01.00.19-k which haven't been resolved. Also the newer version failed to get a proper review. For time being it's better to got with the older version and do not introduce new bugs.
- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Enable type checking for the SRB free and done callback functions (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix abort timeout race condition (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix a NULL pointer dereference (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix a qla24xx_enable_msix() error path (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix a race condition between aborting and completing a SCSI command (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix a recently introduced kernel warning (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix a small typo in qla_bsg.c (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix code indentation for qla27xx_fwdt_entry (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix comment alignment in qla_bsg.c (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix comment in MODULE_PARM_DESC in qla2xxx (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix different size DMA Alloc/Unmap (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix DMA error when the DIF sg buffer crosses 4GB boundary (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix DMA unmap leak (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix driver reload for ISP82xx (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix driver unload when FC-NVMe LUNs are connected (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: fix fcport null pointer access (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix flash read for Qlogic ISPs (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix formatting of pointer types (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix fw dump corruption (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix fw options handle eh_bus_reset() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix gnl.l memory leak on adapter init failure (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix hang in fcport delete path (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix hardirq-unsafe locking (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix hardlockup in abort command during driver remove (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix kernel crash after disconnecting NVMe devices (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix LUN discovery if loop id is not assigned yet by firmware (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix message indicating vectors used by driver (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix N2N link reset (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix N2N link up fail (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix Nport ID display value (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix NULL pointer crash due to stale CPUID (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix NVME cmd and LS cmd timeout race condition (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix NVMe port discovery after a short device port loss (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix panic from use after free in qla2x00_async_tm_cmd (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix possible fcport null-pointer dereferences (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix premature timer expiration (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix qla24xx_process_bidir_cmd() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix race conditions in the code for aborting SCSI commands (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix read offset in qla24xx_load_risc_flash() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix Relogin to prevent modifying scan_state flag (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix routine qla27xx_dump_{mpi|ram}() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix session cleanup hang (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix session lookup in qlt_abort_work() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: fix spelling mistake 'alredy' -&gt; 'already' (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: fix spelling mistake 'initializatin' -&gt; 'initialization' (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix SRB allocation flag to avoid sleeping in IRQ context (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix stale session (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix stuck login session (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix unload when NVMe devices are configured (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix use-after-free issues in qla2xxx_qpair_sp_free_dma() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: flush IO on chip reset or sess delete (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Further limit FLASH region write access from SysFS (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Improve Linux kernel coding style conformance (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Improve logging for scan thread (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Include the &lt;asm/unaligned.h&gt; header file from qla_dsd.h (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Increase the max_sgl_segments to 1024 (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Increase the size of the mailbox arrays from 4 to 8 (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Inline the qla2x00_fcport_event_handler() function (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Insert spaces where required (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Introduce qla2x00_els_dcmd2_free() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Introduce qla2xxx_get_next_handle() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Introduce the be_id_t and le_id_t data types for FC src/dst IDs (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Introduce the dsd32 and dsd64 data structures (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Introduce the function qla2xxx_init_sp() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Leave a blank line after declarations (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Let the compiler check the type of the SCSI command context pointer (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Log the status code if a firmware command fails (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Make it explicit that ELS pass-through IOCBs use little endian (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Make qla24xx_async_abort_cmd() static (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Make qla2x00_abort_srb() again decrease the sp reference count (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Make qla2x00_mem_free() easier to verify (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Make qla2x00_process_response_queue() easier to read (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Make qlt_handle_abts_completion() more robust (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Make sure that aborted commands are freed (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Modify NVMe include directives (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Move debug messages before sending srb preventing panic (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: move IO flush to the front of NVME rport unregistration (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Move marker request behind QPair (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Move qla2x00_clear_loop_id() from qla_inline.h into qla_init.c (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Move qla2x00_is_reserved_id() from qla_inline.h into qla_init.c (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Move qla2x00_set_fcport_state() from a .h into a .c file (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Move qla2x00_set_reserved_loop_ids() definition (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Move the &lt;linux/io-64-nonatomic-lo-hi.h&gt; include directive (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Move the port_state_str definition from a .h to a .c file (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: no need to check return value of debugfs_create functions (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: on session delete, return nvme cmd (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Pass little-endian values to the firmware (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Prevent memory leak for CT req/rsp allocation (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Prevent multiple ADISC commands per session (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Prevent SysFS access when chip is down (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: qla2x00_alloc_fw_dump: set ha-&gt;eft (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Really fix qla2xxx_eh_abort() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Reduce the number of casts in GID list code (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Reduce the number of forward declarations (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Reduce the scope of three local variables in qla2xxx_queuecommand() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Reject EH_{abort|device_reset|target_request} (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove a comment that refers to the SCSI host lock (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove an include directive from qla_mr.c (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove a set-but-not-used variable (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove a superfluous forward declaration (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove a superfluous pointer check (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove dead code (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: remove double assignment in qla2x00_update_fcport (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove FW default template (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove qla_tgt_cmd.data_work and qla_tgt_cmd.data_work_free (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove qla_tgt_cmd.released (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: remove redundant null check on pointer sess (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove set but not used variable 'ptr_dma' (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove superfluous sts_entry_* casts (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove the fcport test from qla_nvme_abort_work() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove two superfluous casts (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove two superfluous if-tests (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove two superfluous tests (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove unnecessary locking from the target code (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove unnecessary null check (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove unreachable code from qla83xx_idc_lock() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove useless set memory to zero use memset() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove WARN_ON_ONCE in qla2x00_status_cont_entry() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Replace vmalloc + memset with vzalloc (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Report invalid mailbox status codes (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Report the firmware status code if a mailbox command fails (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Reset the FCF_ASYNC_{SENT|ACTIVE} flags (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Restore FAWWPN of Physical Port only for loop down (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Retry fabric Scan on IOCB queue full (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Rework key encoding in qlt_find_host_by_d_id() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Secure flash update support for ISP28XX (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Set remote port devloss timeout to 0 (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Set remove flag for all VP (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Set the qpair in SRB to NULL when SRB is released (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Set the responder mode if appropriate for ELS pass-through IOCBs (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Set the SCSI command result before calling the command done (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Silence fwdump template message (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Silence Successful ELS IOCB message (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Simplification of register address used in qla_tmpl.c (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Simplify a debug statement (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Simplify conditional check again (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Simplify qla24xx_abort_sp_done() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Simplify qla24xx_async_abort_cmd() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Simplify qlt_lport_dump() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Simplify qlt_send_term_imm_notif() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Skip FW dump on LOOP initialization error (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Suppress a Coveritiy complaint about integer overflow (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Suppress multiple Coverity complaint about out-of-bounds accesses (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: target: Fix offline port handling and host reset handling (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Uninline qla2x00_init_timer() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Unregister resources in the opposite order of the registration order (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Update driver version to 10.00.00.13-k (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Update driver version to 10.00.00.14-k (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Update driver version to 10.01.00.15-k (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Update driver version to 10.01.00.16-k (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Update driver version to 10.01.00.18-k (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Update driver version to 10.01.00.19-k (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Update flash read/write routine (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Use an on-stack completion in qla24xx_control_vp() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Use ARRAY_SIZE() in the definition of QLA_LAST_SPEED (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Use common update-firmware-options routine for ISP27xx+ (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Use complete switch scan for RSCN events (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Use Correct index for Q-Pair array (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Use dma_pool_zalloc() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Use get/put_unaligned where appropriate (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Use __le64 instead of uint32_t for sending DMA addresses to firmware (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Use memcpy() and strlcpy() instead of strcpy() and strncpy() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Use mutex protection during qla2x00_sysfs_read_fw_dump() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Use strlcpy() instead of strncpy() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Use tabs instead of spaces for indentation (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Use tabs to indent code (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Verify locking assumptions at runtime (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: scsi_dh_rdac: zero cdb in send_mode_select() (bsc#1149313).
- scsi: scsi_transport_fc: nvme: display FC-NVMe port roles (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).
- scsi: tcm_qla2xxx: Minimize #include directives (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi_transport_fc: complete requests from -&gt;timeout (bsc#1142076).
- sctp: Fix the link time qualifier of 'sctp_ctrlsock_exit()' (networking-stable-19_09_15).
- sctp: fix the transport error_count check (networking-stable-19_08_21).
- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).
- secure boot lockdown: Fix-up backport of /dev/mem access restriction The upstream-submitted patch set has evolved over time, align our patches (contents and description) to reflect the current status as far as /dev/mem access is concerned.
- Sign non-x86 kernels when possible (boo#1134303)
- sky2: Disable MSI on yet another ASUS boards (P6Xxxx) (bsc#1051510).
- slip: make slhc_free() silently accept an error pointer (bsc#1051510).
- slip: sl_alloc(): remove unused parameter 'dev_t line' (bsc#1051510).
- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).
- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).
- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).
- SUNRPC fix regression in umount of a secure mount (git-fixes).
- SUNRPC: Handle connection breakages correctly in call_status() (git-fixes).
- SUNRPC/nfs: Fix return value for nfs4_callback_compound() (git-fixes).
- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).
- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).
- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).
- tcp: make sure EPOLLOUT wont be missed (networking-stable-19_08_28).
- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).
- team: Add vlan tx offload to hw_enc_features (networking-stable-19_08_21).
- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).
- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).
- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).
- tpm_tis_core: Set TPM_CHIP_FLAG_IRQ before probing for interrupts (bsc#1082555).
- tracing: Initialize iter-&gt;seq after zeroing in tracing_read_pipe() (bsc#1151508).
- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).
- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).
- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).
- usb: adutux: fix NULL-derefs on disconnect (bsc#1142635).
- usb: adutux: fix use-after-free on disconnect (bsc#1142635).
- usb: adutux: fix use-after-free on release (bsc#1051510).
- usb: chaoskey: fix use-after-free on release (bsc#1051510).
- usb: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).
- usb: iowarrior: fix use-after-free after driver unbind (bsc#1051510).
- usb: iowarrior: fix use-after-free on disconnect (bsc#1051510).
- usb: iowarrior: fix use-after-free on release (bsc#1051510).
- usb: legousbtower: fix deadlock on disconnect (bsc#1142635).
- usb: legousbtower: fix open after failed reset request (bsc#1142635).
- usb: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).
- usb: legousbtower: fix slab info leak at probe (bsc#1142635).
- usb: legousbtower: fix use-after-free on release (bsc#1051510).
- usb: microtek: fix info-leak at probe (bsc#1142635).
- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).
- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).
- usb: serial: fix runtime PM after driver unbind (bsc#1051510).
- usb: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).
- usb: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).
- usb: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).
- usb: serial: option: add Telit FN980 compositions (bsc#1051510).
- usb: usbcore: Fix slab-out-of-bounds bug during device reset (bsc#1051510).
- usb: usblcd: fix I/O after disconnect (bsc#1142635).
- usb: usblp: fix runtime PM after driver unbind (bsc#1051510).
- usb: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).
- usb: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).
- usb: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).
- usb: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).
- usb: yurex: Do not retry on unexpected errors (bsc#1051510).
- usb: yurex: fix NULL-derefs on disconnect (bsc#1051510).
- vfio_pci: Restore original state on release (bsc#1051510).
- vhost_net: conditionally enable tx polling (bsc#1145099).
- vhost_net: conditionally enable tx polling (bsc#1145099).
- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).
- video: ssd1307fb: Start page range at page_offset (bsc#1113722)
- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).
- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).
- x86/CPU/AMD: Clear RDRAND CPUID bit on AMD family 15h/16h (bsc#1114279).
- x86/fpu: Add FPU state copying quirk to handle XRSTOR failure on Intel Skylake CPUs (bsc#1151955).
- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).
- x86/tls: Fix possible spectre-v1 in do_get_thread_area() (bsc#1114279).
- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).
- xen/netback: Reset nr_frags before freeing skb (networking-stable-19_08_21).
- xen-netfront: do not assume sk_buff_head list is empty in error handling (bsc#1065600).
- xen-netfront: do not use ~0U as error return value for xennet_fill_frags() (bsc#1065600).
- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).
- xen/xenbus: fix self-deadlock after killing user process (bsc#1065600).
- xhci: Check all endpoints for LPM timeout (bsc#1051510).
- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).
- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).
- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-31"/>
	<updated date="2019-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046299">SUSE bug 1046299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046303">SUSE bug 1046303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046305">SUSE bug 1046305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050244">SUSE bug 1050244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050536">SUSE bug 1050536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050545">SUSE bug 1050545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051510">SUSE bug 1051510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054914">SUSE bug 1054914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055117">SUSE bug 1055117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055186">SUSE bug 1055186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061840">SUSE bug 1061840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064802">SUSE bug 1064802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066129">SUSE bug 1066129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073513">SUSE bug 1073513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082555">SUSE bug 1082555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086323">SUSE bug 1086323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087092">SUSE bug 1087092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089644">SUSE bug 1089644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093205">SUSE bug 1093205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097583">SUSE bug 1097583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097584">SUSE bug 1097584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097585">SUSE bug 1097585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097586">SUSE bug 1097586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097587">SUSE bug 1097587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097588">SUSE bug 1097588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098291">SUSE bug 1098291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101674">SUSE bug 1101674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104967">SUSE bug 1104967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109158">SUSE bug 1109158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113722">SUSE bug 1113722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114279">SUSE bug 1114279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117665">SUSE bug 1117665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119086">SUSE bug 1119086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122363">SUSE bug 1122363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123034">SUSE bug 1123034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123080">SUSE bug 1123080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127988">SUSE bug 1127988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131304">SUSE bug 1131304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133140">SUSE bug 1133140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134303">SUSE bug 1134303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135642">SUSE bug 1135642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135854">SUSE bug 1135854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135873">SUSE bug 1135873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137799">SUSE bug 1137799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137861">SUSE bug 1137861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137865">SUSE bug 1137865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137959">SUSE bug 1137959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140155">SUSE bug 1140155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140729">SUSE bug 1140729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140845">SUSE bug 1140845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140883">SUSE bug 1140883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141600">SUSE bug 1141600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142076">SUSE bug 1142076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142635">SUSE bug 1142635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142667">SUSE bug 1142667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144375">SUSE bug 1144375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144449">SUSE bug 1144449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145099">SUSE bug 1145099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146042">SUSE bug 1146042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146540">SUSE bug 1146540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146664">SUSE bug 1146664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148133">SUSE bug 1148133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148410">SUSE bug 1148410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148712">SUSE bug 1148712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148868">SUSE bug 1148868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149313">SUSE bug 1149313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149446">SUSE bug 1149446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149555">SUSE bug 1149555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149651">SUSE bug 1149651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150381">SUSE bug 1150381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150423">SUSE bug 1150423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150452">SUSE bug 1150452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150465">SUSE bug 1150465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150875">SUSE bug 1150875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151350">SUSE bug 1151350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151508">SUSE bug 1151508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151610">SUSE bug 1151610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151667">SUSE bug 1151667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151671">SUSE bug 1151671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151680">SUSE bug 1151680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151891">SUSE bug 1151891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151955">SUSE bug 1151955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152024">SUSE bug 1152024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152025">SUSE bug 1152025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152026">SUSE bug 1152026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152161">SUSE bug 1152161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152325">SUSE bug 1152325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152457">SUSE bug 1152457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152460">SUSE bug 1152460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152466">SUSE bug 1152466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152788">SUSE bug 1152788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152791">SUSE bug 1152791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152972">SUSE bug 1152972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152974">SUSE bug 1152974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152975">SUSE bug 1152975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153112">SUSE bug 1153112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153236">SUSE bug 1153236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153263">SUSE bug 1153263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153646">SUSE bug 1153646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153713">SUSE bug 1153713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153717">SUSE bug 1153717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153718">SUSE bug 1153718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153719">SUSE bug 1153719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153811">SUSE bug 1153811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154108">SUSE bug 1154108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154189">SUSE bug 1154189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154354">SUSE bug 1154354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154372">SUSE bug 1154372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154578">SUSE bug 1154578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154607">SUSE bug 1154607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154608">SUSE bug 1154608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154610">SUSE bug 1154610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154611">SUSE bug 1154611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154651">SUSE bug 1154651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154747">SUSE bug 1154747</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18595/">CVE-2017-18595</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-14821/">CVE-2019-14821</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15291/">CVE-2019-15291</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16232/">CVE-2019-16232</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17056/">CVE-2019-17056</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17666/">CVE-2019-17666</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9506/">CVE-2019-9506</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522295" comment="kernel-default-4.12.14-95.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522296" comment="kernel-default-devel-4.12.14-95.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522297" comment="kernel-default-extra-4.12.14-95.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522298" comment="kernel-devel-4.12.14-95.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522299" comment="kernel-macros-4.12.14-95.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522300" comment="kernel-source-4.12.14-95.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522301" comment="kernel-syms-4.12.14-95.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78839" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1144902" ref_url="https://bugzilla.suse.com/1144902" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006085.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2019-10218: Client code can return filenames containing path separators (bsc#1144902).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-04"/>
	<updated date="2019-11-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522302" comment="libdcerpc-binding0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522303" comment="libdcerpc-binding0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522304" comment="libdcerpc0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522305" comment="libdcerpc0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522306" comment="libndr-krb5pac0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522307" comment="libndr-krb5pac0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522308" comment="libndr-nbt0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522309" comment="libndr-nbt0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522310" comment="libndr-standard0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522311" comment="libndr-standard0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522312" comment="libndr0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522313" comment="libndr0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522314" comment="libnetapi0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522315" comment="libnetapi0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522316" comment="libsamba-credentials0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522317" comment="libsamba-credentials0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522318" comment="libsamba-errors0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522319" comment="libsamba-errors0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522320" comment="libsamba-hostconfig0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522321" comment="libsamba-hostconfig0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522322" comment="libsamba-passdb0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522323" comment="libsamba-passdb0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522324" comment="libsamba-util0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522325" comment="libsamba-util0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522326" comment="libsamdb0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522327" comment="libsamdb0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522328" comment="libsmbclient0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522329" comment="libsmbclient0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522330" comment="libsmbconf0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522331" comment="libsmbconf0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522332" comment="libsmbldap0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522333" comment="libsmbldap0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522334" comment="libtevent-util0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522335" comment="libtevent-util0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522336" comment="libwbclient0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522337" comment="libwbclient0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522338" comment="samba-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522339" comment="samba-client-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522340" comment="samba-client-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522341" comment="samba-doc-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522342" comment="samba-libs-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522343" comment="samba-libs-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522344" comment="samba-winbind-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522345" comment="samba-winbind-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78840" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1013712" ref_url="https://bugzilla.suse.com/1013712" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9798" ref_url="https://www.suse.com/security/cve/CVE-2016-9798/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006097.html" source="SUSE-SU"/>
		<description>
This update for bluez fixes the following issue:

- CVE-2016-9798: Fixed a use-after-free in conf_opt (bsc#1013712).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-07"/>
	<updated date="2019-11-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013712">SUSE bug 1013712</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9798/">CVE-2016-9798</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522346" comment="bluez-5.13-5.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522347" comment="bluez-cups-5.13-5.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522348" comment="libbluetooth3-5.13-5.15.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78841" version="1" class="patch">
	<metadata>
		<title>Security update for gdb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1115034" ref_url="https://bugzilla.suse.com/1115034" source="BUGZILLA"/>
		<reference ref_id="1142772" ref_url="https://bugzilla.suse.com/1142772" source="BUGZILLA"/>
		<reference ref_id="1145692" ref_url="https://bugzilla.suse.com/1145692" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006098.html" source="SUSE-SU"/>
		<description>
This update for gdb fixes the following issues:

Update to gdb 8.3.1: (jsc#ECO-368)

Security issues fixed:

- CVE-2019-1010180: Fixed a potential buffer overflow when loading ELF sections larger than the file. (bsc#1142772)

Upgrade libipt from v2.0 to v2.0.1.

- Enable librpm for version &gt; librpm.so.3 [bsc#1145692]:
  * Allow any librpm.so.x
  * Add %build test to check for 'zypper install &lt;rpm-packagename&gt;'
    message

- Copy gdbinit from fedora master @ 25caf28.  Add
  gdbinit.without-python, and use it for --without=python.

Rebase to 8.3 release (as in fedora 30 @ 1e222a3).

* DWARF index cache: GDB can now automatically save indices of DWARF
  symbols on disk to speed up further loading of the same binaries.
* Ada task switching is now supported on aarch64-elf targets when
  debugging a program using the Ravenscar Profile.
* Terminal styling is now available for the CLI and the TUI.
* Removed support for old demangling styles arm, edg, gnu, hp and
  lucid.
* Support for new native configuration RISC-V GNU/Linux (riscv*-*-linux*).

- Implemented access to more POWER8 registers.  [fate#326120, fate#325178]
- Also handle most new s390 arch13 instructions.  [fate#327369, jsc#ECO-368]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-07"/>
	<updated date="2019-11-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1115034">SUSE bug 1115034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142772">SUSE bug 1142772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145692">SUSE bug 1145692</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522349" comment="gdb-8.3.1-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78842" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1154862" ref_url="https://bugzilla.suse.com/1154862" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2936-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192936-1.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issue:

- CVE-2019-17498: Fixed an integer overflow in a bounds check that might have led to the disclosure of sensitive information or a denial of service (bsc#1154862).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-08"/>
	<updated date="2019-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154862">SUSE bug 1154862</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522350" comment="libssh2-1-1.4.3-20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522351" comment="libssh2-1-32bit-1.4.3-20.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78843" version="1" class="patch">
	<metadata>
		<title>Security update for libseccomp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1128828" ref_url="https://bugzilla.suse.com/1128828" source="BUGZILLA"/>
		<reference ref_id="1142614" ref_url="https://bugzilla.suse.com/1142614" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9893" ref_url="https://www.suse.com/security/cve/CVE-2019-9893/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006108.html" source="SUSE-SU"/>
		<description>
This update for libseccomp fixes the following issues:

Update to new upstream release 2.4.1:

* Fix a BPF generation bug where the optimizer mistakenly
  identified duplicate BPF code blocks.

Updated to 2.4.0 (bsc#1128828 CVE-2019-9893):

* Update the syscall table for Linux v5.0-rc5
* Added support for the SCMP_ACT_KILL_PROCESS action
* Added support for the SCMP_ACT_LOG action and SCMP_FLTATR_CTL_LOG attribute
* Added explicit 32-bit (SCMP_AX_32(...)) and 64-bit (SCMP_AX_64(...)) argument comparison macros to help protect against unexpected sign extension
* Added support for the parisc and parisc64 architectures
* Added the ability to query and set the libseccomp API level via seccomp_api_get(3) and seccomp_api_set(3)
* Return -EDOM on an endian mismatch when adding an architecture to a filter
* Renumber the pseudo syscall number for subpage_prot() so it no longer conflicts with spu_run()
* Fix PFC generation when a syscall is prioritized, but no rule exists
* Numerous fixes to the seccomp-bpf filter generation code
* Switch our internal hashing function to jhash/Lookup3 to MurmurHash3
* Numerous tests added to the included test suite, coverage now at ~92%
* Update our Travis CI configuration to use Ubuntu 16.04
* Numerous documentation fixes and updates

Update to release 2.3.3:

* Updated the syscall table for Linux v4.15-rc7

Update to release 2.3.2:

* Achieved full compliance with the CII Best Practices program
* Added Travis CI builds to the GitHub repository
* Added code coverage reporting with the '--enable-code-coverage' configure
  flag and added Coveralls to the GitHub repository
* Updated the syscall tables to match Linux v4.10-rc6+
* Support for building with Python v3.x
* Allow rules with the -1 syscall if the SCMP\_FLTATR\_API\_TSKIP attribute is
  set to true
* Several small documentation fixes

- ignore make check error for ppc64/ppc64le, bypass bsc#1142614
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-12"/>
	<updated date="2019-11-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128828">SUSE bug 1128828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142614">SUSE bug 1142614</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9893/">CVE-2019-9893</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522352" comment="libseccomp2-2.4.1-11.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522353" comment="libseccomp2-32bit-2.4.1-11.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78844" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1051510" ref_url="https://bugzilla.suse.com/1051510" source="BUGZILLA"/>
		<reference ref_id="1082635" ref_url="https://bugzilla.suse.com/1082635" source="BUGZILLA"/>
		<reference ref_id="1083647" ref_url="https://bugzilla.suse.com/1083647" source="BUGZILLA"/>
		<reference ref_id="1090631" ref_url="https://bugzilla.suse.com/1090631" source="BUGZILLA"/>
		<reference ref_id="1096254" ref_url="https://bugzilla.suse.com/1096254" source="BUGZILLA"/>
		<reference ref_id="1117665" ref_url="https://bugzilla.suse.com/1117665" source="BUGZILLA"/>
		<reference ref_id="1119461" ref_url="https://bugzilla.suse.com/1119461" source="BUGZILLA"/>
		<reference ref_id="1119465" ref_url="https://bugzilla.suse.com/1119465" source="BUGZILLA"/>
		<reference ref_id="1123034" ref_url="https://bugzilla.suse.com/1123034" source="BUGZILLA"/>
		<reference ref_id="1135966" ref_url="https://bugzilla.suse.com/1135966" source="BUGZILLA"/>
		<reference ref_id="1135967" ref_url="https://bugzilla.suse.com/1135967" source="BUGZILLA"/>
		<reference ref_id="1137040" ref_url="https://bugzilla.suse.com/1137040" source="BUGZILLA"/>
		<reference ref_id="1138190" ref_url="https://bugzilla.suse.com/1138190" source="BUGZILLA"/>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1140090" ref_url="https://bugzilla.suse.com/1140090" source="BUGZILLA"/>
		<reference ref_id="1143706" ref_url="https://bugzilla.suse.com/1143706" source="BUGZILLA"/>
		<reference ref_id="1144338" ref_url="https://bugzilla.suse.com/1144338" source="BUGZILLA"/>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1146612" ref_url="https://bugzilla.suse.com/1146612" source="BUGZILLA"/>
		<reference ref_id="1149119" ref_url="https://bugzilla.suse.com/1149119" source="BUGZILLA"/>
		<reference ref_id="1150457" ref_url="https://bugzilla.suse.com/1150457" source="BUGZILLA"/>
		<reference ref_id="1151225" ref_url="https://bugzilla.suse.com/1151225" source="BUGZILLA"/>
		<reference ref_id="1152624" ref_url="https://bugzilla.suse.com/1152624" source="BUGZILLA"/>
		<reference ref_id="1153476" ref_url="https://bugzilla.suse.com/1153476" source="BUGZILLA"/>
		<reference ref_id="1153509" ref_url="https://bugzilla.suse.com/1153509" source="BUGZILLA"/>
		<reference ref_id="1153969" ref_url="https://bugzilla.suse.com/1153969" source="BUGZILLA"/>
		<reference ref_id="1154737" ref_url="https://bugzilla.suse.com/1154737" source="BUGZILLA"/>
		<reference ref_id="1154848" ref_url="https://bugzilla.suse.com/1154848" source="BUGZILLA"/>
		<reference ref_id="1154858" ref_url="https://bugzilla.suse.com/1154858" source="BUGZILLA"/>
		<reference ref_id="1154905" ref_url="https://bugzilla.suse.com/1154905" source="BUGZILLA"/>
		<reference ref_id="1154959" ref_url="https://bugzilla.suse.com/1154959" source="BUGZILLA"/>
		<reference ref_id="1155178" ref_url="https://bugzilla.suse.com/1155178" source="BUGZILLA"/>
		<reference ref_id="1155179" ref_url="https://bugzilla.suse.com/1155179" source="BUGZILLA"/>
		<reference ref_id="1155184" ref_url="https://bugzilla.suse.com/1155184" source="BUGZILLA"/>
		<reference ref_id="1155186" ref_url="https://bugzilla.suse.com/1155186" source="BUGZILLA"/>
		<reference ref_id="1155671" ref_url="https://bugzilla.suse.com/1155671" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2019-0154" ref_url="https://www.suse.com/security/cve/CVE-2019-0154/" source="CVE"/>
		<reference ref_id="CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233/" source="CVE"/>
		<description>


The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine Exception during Page Size Change, causing the CPU core to be non-functional.

The Linux Kernel KVM hypervisor was adjusted to avoid page size changes in executable pages by splitting / merging huge pages into small pages as needed.
More information can be found on https://www.suse.com/support/kb/doc/?id=7023735

CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with
Transactional Memory support could be used to facilitate sidechannel
information leaks out of microarchitectural buffers, similar to the previously
described 'Microarchitectural Data Sampling' attack.

The Linux kernel was supplemented with the option to disable TSX operation
altogether (requiring CPU Microcode updates on older systems) and better
flushing of microarchitectural buffers (VERW).

The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251

Other security fixes:

- CVE-2019-0154: Fixed a local denial of service via read of unprotected i915 registers. (bsc#1135966)
- CVE-2019-0155: Fixed privilege escalation in the i915 driver. Batch buffers from usermode could have escalated privileges via blitter command stream. (bsc#1135967)
- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference. (bsc#1150457).
- CVE-2019-10220: Added sanity checks on the pathnames passed to the user space. (bsc#1144903).

The following non-security bugs were fixed:

- alsa: bebob: Fix prototype of helper function to return negative value (bsc#1051510).
- alsa: hda/realtek - Add support for ALC623 (bsc#1051510).
- alsa: hda/realtek - Add support for ALC711 (bsc#1051510).
- alsa: hda/realtek - Fix 2 front mics of codec 0x623 (bsc#1051510).
- alsa: hda: Add Elkhart Lake PCI ID (bsc#1051510).
- alsa: hda: Add Tigerlake/Jasperlake PCI ID (bsc#1051510).
- alsa: timer: Fix mutex deadlock at releasing card (bsc#1051510).
- arcnet: provide a buffer big enough to actually receive packets (networking-stable-19_09_30).
- asoc: rockchip: i2s: Fix RPM imbalance (bsc#1051510).
- asoc: rsnd: Reinitialize bit clock inversion flag for every format setting (bsc#1051510).
- bpf: fix use after free in prog symbol exposure (bsc#1083647).
- btrfs: block-group: Fix a memory leak due to missing btrfs_put_block_group() (bsc#1155178).
- btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).
- btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).
- btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).
- crypto: af_alg - Fix race around ctx-&gt;rcvused by making it atomic_t (bsc#1154737).
- crypto: af_alg - Initialize sg_num_bytes in error code path (bsc#1051510).
- crypto: af_alg - consolidation of duplicate code (bsc#1154737).
- crypto: af_alg - fix race accessing cipher request (bsc#1154737).
- crypto: af_alg - remove locking in async callback (bsc#1154737).
- crypto: af_alg - update correct dst SGL entry (bsc#1051510).
- crypto: af_alg - wait for data at beginning of recvmsg (bsc#1154737).
- crypto: algif - return error code when no data was processed (bsc#1154737).
- crypto: algif_aead - copy AAD from src to dst (bsc#1154737).
- crypto: algif_aead - fix reference counting of null skcipher (bsc#1154737).
- crypto: algif_aead - overhaul memory management (bsc#1154737).
- crypto: algif_aead - skip SGL entries with NULL page (bsc#1154737).
- crypto: algif_skcipher - overhaul memory management (bsc#1154737).
- cxgb4:Fix out-of-bounds MSI-X info array access (networking-stable-19_10_05).
- drm/edid: Add 6 bpc quirk for SDC panel in Lenovo G50 (bsc#1051510).
- drm/i915/cmdparser: Add support for backward jumps (bsc#1135967)
- drm/i915/cmdparser: Ignore Length operands during command matching (bsc#1135967)
- drm/i915/cmdparser: Use explicit goto for error paths (bsc#1135967)
- drm/i915/gen8+: Add RC6 CTX corruption WA (bsc#1135967)
- drm/i915/gtt: Add read only pages to gen8_pte_encode (bsc#1135967)
- drm/i915/gtt: Disable read-only support under GVT (bsc#1135967)
- drm/i915/gtt: Read-only pages for insert_entries on bdw (bsc#1135967)
- drm/i915: Add gen9 BCS cmdparsing (bsc#1135967)
- drm/i915: Add support for mandatory cmdparsing (bsc#1135967)
- drm/i915: Allow parsing of unsized batches (bsc#1135967)
- drm/i915: Disable Secure Batches for gen6+
- drm/i915: Lower RM timeout to avoid DSI hard hangs (bsc#1135967)
- drm/i915: Prevent writing into a read-only object via a GGTT mmap (bsc#1135967)
- drm/i915: Remove Master tables from cmdparser
- drm/i915: Rename gen7 cmdparser tables (bsc#1135967)
- drm/i915: Support ro ppgtt mapped cmdparser shadow buffers (bsc#1135967)
- efi/memattr: Do not bail on zero VA if it equals the region's PA (bsc#1051510).
- efi: cper: print AER info of PCIe fatal error (bsc#1051510).
- efivar/ssdt: Do not iterate over EFI vars if no SSDT override was specified (bsc#1051510).
- hid: fix error message in hid_open_report() (bsc#1051510).
- hid: logitech-hidpp: do all FF cleanup in hidpp_ff_destroy() (bsc#1051510).
- hso: fix NULL-deref on tty open (bsc#1051510).
- hyperv: set nvme msi interrupts to unmanaged (jsc#SLE-8953, jsc#SLE-9221, jsc#SLE-4941, bsc#1119461, bsc#1119465, bsc#1138190, bsc#1154905).
- ib/core: Add mitigation for Spectre V1 (bsc#1155671)
- ieee802154: ca8210: prevent memory leak (bsc#1051510).
- input: synaptics-rmi4 - avoid processing unknown IRQs (bsc#1051510).
- integrity: prevent deadlock during digsig verification (bsc#1090631).
- ipv6: Handle missing host route in __ipv6_ifa_notify (networking-stable-19_10_05).
- ipv6: drop incoming packets having a v4mapped source address (networking-stable-19_10_05).
- kABI workaround for crypto/af_alg changes (bsc#1154737).
- kABI workaround for drm_vma_offset_node readonly field addition (bsc#1135967)
- ksm: cleanup stable_node chain collapse case (bnc#1144338).
- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).
- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).
- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).
- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).
- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).
- kvm: x86: mmu: Recovery of shattered NX large pages  (bsc#1117665, CVE-2018-12207).
- mac80211: Reject malformed SSID elements (bsc#1051510).
- mac80211: fix txq null pointer dereference (bsc#1051510).
- md/raid0: avoid RAID0 data corruption due to layout confusion (bsc#1140090).
- md/raid0: fix warning message for parameter default_layout (bsc#1140090).
- net/phy: fix DP83865 10 Mbps HDX loopback disable function (networking-stable-19_09_30).
- net/rds: Fix error handling in rds_ib_add_one() (networking-stable-19_10_05).
- net/rds: fix warn in rds_message_alloc_sgs (bsc#1154848).
- net/rds: remove user triggered WARN_ON in rds_sendmsg (bsc#1154848).
- net/sched: act_sample: do not push mac header on ip6gre ingress (networking-stable-19_09_30).
- net/smc: fix SMCD link group creation with VLAN id (bsc#1154959).
- net: Replace NF_CT_ASSERT() with WARN_ON() (bsc#1146612).
- net: Unpublish sk from sk_reuseport_cb before call_rcu (networking-stable-19_10_05).
- net: openvswitch: free vport unless register_netdevice() succeeds (git-fixes).
- net: qlogic: Fix memory leak in ql_alloc_large_buffers (networking-stable-19_10_05).
- net: qrtr: Stop rx_worker before freeing node (networking-stable-19_09_30).
- net_sched: add policy validation for action attributes (networking-stable-19_09_30).
- net_sched: fix backward compatibility for TCA_ACT_KIND (git-fixes).
- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).
- nfsv4.1 - backchannel request should hold ref on xprt (bsc#1152624).
- nl80211: fix null pointer dereference (bsc#1051510).
- openvswitch: change type of UPCALL_PID attribute to NLA_UNSPEC (networking-stable-19_09_30).
- qmi_wwan: add support for Cinterion CLS8 devices (networking-stable-19_10_05).
- r8152: Set macpassthru in reset_resume callback (bsc#1051510).
- rds: Fix warning (bsc#1154848).
- reiserfs: fix extended attributes on the root directory (bsc#1151225).
- rpm/kernel-subpackage-spec: Mention debuginfo in the subpackage description (bsc#1149119).
- s390/cmf: set_schib_wait add timeout (bsc#1153509, bsc#1153476).
- sch_cbq: validate TCA_CBQ_WRROPT to avoid crash (networking-stable-19_10_05).
- sch_dsmark: fix potential NULL deref in dsmark_init() (networking-stable-19_10_05).
- sch_netem: fix a divide by zero in tabledist() (networking-stable-19_09_30).
- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).
- scsi: lpfc: Fix devices that do not return after devloss followed by rediscovery (bsc#1137040).
- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix partial flash write of MBI (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix wait condition in loop (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Initialized mailbox to prevent driver load failure (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: fix a potential NULL pointer dereference  (bsc#1150457 CVE-2019-16233).
- scsi: qla2xxx: fixup incorrect usage of host_byte (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: stop timer in shutdown path (bsc#1143706 bsc#1082635 bsc#1123034).
- skge: fix checksum byte order (networking-stable-19_09_30).
- staging: wlan-ng: fix exit return when sme-&gt;key_idx &gt;= NUM_WEPKEYS (bsc#1051510).
- supporte.conf: add efivarfs to kernel-default-base (bsc#1154858).
- tipc: fix unlimited bundling of small messages (networking-stable-19_10_05).
- usb: ldusb: fix NULL-derefs on driver unbind (bsc#1051510).
- usb: ldusb: fix memleak on disconnect (bsc#1051510).
- usb: ldusb: fix read info leaks (bsc#1051510).
- usb: legousbtower: fix a signedness bug in tower_probe() (bsc#1051510).
- usb: legousbtower: fix memleak on disconnect (bsc#1051510).
- usb: serial: ti_usb_3410_5052: fix port-close races (bsc#1051510).
- usb: udc: lpc32xx: fix bad bit shift operation (bsc#1051510).
- usb: usblp: fix use-after-free on disconnect (bsc#1051510).
- vfs: Make filldir[64]() verify the directory entry filename is valid  (bsc#1144903, CVE-2019-10220).
- vsock: Fix a lockdep warning in __vsock_release() (networking-stable-19_10_05).
- x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel area (bnc#1153969).
- x86/boot/64: Round memory hole size up to next PMD page (bnc#1153969).
- x86/tsx: Add config options to set tsx=on|off|auto (bsc#1139073,  CVE-2019-11135).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-12"/>
	<updated date="2019-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051510">SUSE bug 1051510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082635">SUSE bug 1082635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083647">SUSE bug 1083647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090631">SUSE bug 1090631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096254">SUSE bug 1096254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117665">SUSE bug 1117665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119461">SUSE bug 1119461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119465">SUSE bug 1119465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123034">SUSE bug 1123034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135966">SUSE bug 1135966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135967">SUSE bug 1135967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137040">SUSE bug 1137040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138190">SUSE bug 1138190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140090">SUSE bug 1140090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143706">SUSE bug 1143706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144338">SUSE bug 1144338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146612">SUSE bug 1146612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149119">SUSE bug 1149119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150457">SUSE bug 1150457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151225">SUSE bug 1151225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152624">SUSE bug 1152624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153476">SUSE bug 1153476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153509">SUSE bug 1153509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153969">SUSE bug 1153969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154737">SUSE bug 1154737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154848">SUSE bug 1154848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154858">SUSE bug 1154858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154905">SUSE bug 1154905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154959">SUSE bug 1154959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155178">SUSE bug 1155178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155179">SUSE bug 1155179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155184">SUSE bug 1155184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155186">SUSE bug 1155186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155671">SUSE bug 1155671</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0154/">CVE-2019-0154</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522354" comment="kernel-default-4.12.14-95.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522355" comment="kernel-default-devel-4.12.14-95.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522356" comment="kernel-default-extra-4.12.14-95.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522357" comment="kernel-devel-4.12.14-95.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522358" comment="kernel-macros-4.12.14-95.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522359" comment="kernel-source-4.12.14-95.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522360" comment="kernel-syms-4.12.14-95.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78845" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1119991" ref_url="https://bugzilla.suse.com/1119991" source="BUGZILLA"/>
		<reference ref_id="1146873" ref_url="https://bugzilla.suse.com/1146873" source="BUGZILLA"/>
		<reference ref_id="1152506" ref_url="https://bugzilla.suse.com/1152506" source="BUGZILLA"/>
		<reference ref_id="1153358" ref_url="https://bugzilla.suse.com/1153358" source="BUGZILLA"/>
		<reference ref_id="1155812" ref_url="https://bugzilla.suse.com/1155812" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2018-20126" ref_url="https://www.suse.com/security/cve/CVE-2018-20126/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006129.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- Remove a backslash '\' escape character from 80-qemu-ga.rules (bsc#1153358)
  Unlike sles 15 or newer guests, The udev rule file of qemu guest agent in
  sles 12 sp4 or newer guest only needs one escape character.

- Fix use-after-free in slirp (CVE-2018-20126 bsc#1119991)
- Fix potential DOS in lsi scsi controller emulation (CVE-2019-12068
  bsc#1146873)
- Expose taa-no 'feature', indicating CPU does not have the
  TSX Async Abort vulnerability. (CVE-2019-11135 bsc#1152506)
- Expose pschange-mc-no 'feature', indicating CPU does not have
  the page size change machine check vulnerability (CVE-2018-12207
  bsc#1155812)
- Patch queue updated from https://gitlab.suse.de/virtualization/qemu.git SLE12-SP4

		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-12"/>
	<updated date="2019-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1119991">SUSE bug 1119991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146873">SUSE bug 1146873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152506">SUSE bug 1152506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153358">SUSE bug 1153358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155812">SUSE bug 1155812</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20126/">CVE-2018-20126</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522361" comment="qemu-2.11.2-5.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522362" comment="qemu-block-curl-2.11.2-5.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522363" comment="qemu-ipxe-1.0.0+-5.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522364" comment="qemu-kvm-2.11.2-5.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522365" comment="qemu-seabios-1.11.0-5.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522366" comment="qemu-sgabios-8-5.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522367" comment="qemu-tools-2.11.2-5.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522368" comment="qemu-vgabios-1.11.0-5.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522369" comment="qemu-x86-2.11.2-5.23.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78846" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1141035" ref_url="https://bugzilla.suse.com/1141035" source="BUGZILLA"/>
		<reference ref_id="1154043" ref_url="https://bugzilla.suse.com/1154043" source="BUGZILLA"/>
		<reference ref_id="1155988" ref_url="https://bugzilla.suse.com/1155988" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2959-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192959-1.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to 20191112 security release (bsc#1155988)
  - Processor             Identifier     Version       Products
  - Model        Stepping F-MO-S/PI      Old-&gt;New
  - ---- new platforms ----------------------------------------
  - CML-U62      A0       6-a6-0/80           000000c6 Core Gen10 Mobile
  - CNL-U        D0       6-66-3/80           0000002a Core Gen8 Mobile
  - SKX-SP       B1       6-55-3/97           01000150 Xeon Scalable
  - ICL U/Y      D1       6-7e-5/80           00000046 Core Gen10 Mobile
  - ---- updated platforms ------------------------------------
  - SKL U/Y      D0       6-4e-3/c0 000000cc-&gt;000000d4 Core Gen6 Mobile
  - SKL H/S/E3   R0/N0    6-5e-3/36 000000cc-&gt;000000d4 Core Gen6
  - AML-Y22      H0       6-8e-9/10 000000b4-&gt;000000c6 Core Gen8 Mobile
  - KBL-U/Y      H0       6-8e-9/c0 000000b4-&gt;000000c6 Core Gen7 Mobile
  - CFL-U43e     D0       6-8e-a/c0 000000b4-&gt;000000c6 Core Gen8 Mobile
  - WHL-U        W0       6-8e-b/d0 000000b8-&gt;000000c6 Core Gen8 Mobile
  - AML-Y        V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen10 Mobile
  - CML-U42      V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen10 Mobile
  - WHL-U        V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen8 Mobile
  - KBL-G/X      H0       6-9e-9/2a 000000b4-&gt;000000c6 Core Gen7/Gen8
  - KBL-H/S/E3   B0       6-9e-9/2a 000000b4-&gt;000000c6 Core Gen7; Xeon E3 v6
  - CFL-H/S/E3   U0       6-9e-a/22 000000b4-&gt;000000c6 Core Gen8 Desktop, Mobile, Xeon E
  - CFL-S        B0       6-9e-b/02 000000b4-&gt;000000c6 Core Gen8
  - CFL-H        R0       6-9e-d/22 000000b8-&gt;000000c6 Core Gen9 Mobile
- Includes security fixes for:
  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)

- requires coreutils for the %post script (bsc#1154043)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-12"/>
	<updated date="2019-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154043">SUSE bug 1154043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155988">SUSE bug 1155988</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522370" comment="ucode-intel-20191112-13.53.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78847" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1152497" ref_url="https://bugzilla.suse.com/1152497" source="BUGZILLA"/>
		<reference ref_id="1154448" ref_url="https://bugzilla.suse.com/1154448" source="BUGZILLA"/>
		<reference ref_id="1154456" ref_url="https://bugzilla.suse.com/1154456" source="BUGZILLA"/>
		<reference ref_id="1154458" ref_url="https://bugzilla.suse.com/1154458" source="BUGZILLA"/>
		<reference ref_id="1154461" ref_url="https://bugzilla.suse.com/1154461" source="BUGZILLA"/>
		<reference ref_id="1155945" ref_url="https://bugzilla.suse.com/1155945" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-18420" ref_url="https://www.suse.com/security/cve/CVE-2019-18420/" source="CVE"/>
		<reference ref_id="CVE-2019-18421" ref_url="https://www.suse.com/security/cve/CVE-2019-18421/" source="CVE"/>
		<reference ref_id="CVE-2019-18424" ref_url="https://www.suse.com/security/cve/CVE-2019-18424/" source="CVE"/>
		<reference ref_id="CVE-2019-18425" ref_url="https://www.suse.com/security/cve/CVE-2019-18425/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006127.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race
  condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine
  Exception during Page Size Change, causing the CPU core to be non-functional.
  (bsc#1155945)
- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with
  Transactional Memory support could be used to facilitate sidechannel
  information leaks out of microarchitectural buffers, similar to the
  previously described 'Microarchitectural Data Sampling' attack. (bsc#1152497).
- CVE-2019-18424: An untrusted domain with access to a physical device can DMA 
  into host memory, leading to privilege escalation. (bsc#1154461).
- CVE-2019-18421: A malicious PV guest administrator may have been able to
  escalate their privilege to that of the host. (bsc#1154458).
- CVE-2019-18425: 32-bit PV guest user mode could elevate its privileges to that 
  of the guest kernel. (bsc#1154456).
- CVE-2019-18420: Malicious x86 PV guests may have caused a hypervisor crash, 
  resulting in a Denial of Service (Dos). (bsc#1154448)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-12"/>
	<updated date="2019-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152497">SUSE bug 1152497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154448">SUSE bug 1154448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154456">SUSE bug 1154456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154458">SUSE bug 1154458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154461">SUSE bug 1154461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155945">SUSE bug 1155945</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18420/">CVE-2019-18420</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18421/">CVE-2019-18421</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18424/">CVE-2019-18424</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18425/">CVE-2019-18425</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522371" comment="xen-4.11.2_04-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522372" comment="xen-libs-4.11.2_04-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522373" comment="xen-libs-32bit-4.11.2_04-2.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78848" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1156402" ref_url="https://bugzilla.suse.com/1156402" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2201" ref_url="https://www.suse.com/security/cve/CVE-2019-2201/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006137.html" source="SUSE-SU"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

- CVE-2019-2201: Several integer overflow issues and subsequent segfaults occurred in libjpeg-turbo,
  when attempting to compress or decompress gigapixel images. [bsc#1156402]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-14"/>
	<updated date="2019-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156402">SUSE bug 1156402</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2201/">CVE-2019-2201</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522374" comment="libjpeg-turbo-1.5.3-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522375" comment="libjpeg62-62.2.0-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522376" comment="libjpeg62-32bit-62.2.0-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522377" comment="libjpeg62-turbo-1.5.3-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522378" comment="libjpeg8-8.1.2-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522379" comment="libjpeg8-32bit-8.1.2-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522380" comment="libturbojpeg0-8.1.2-31.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78849" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1156275" ref_url="https://bugzilla.suse.com/1156275" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14869" ref_url="https://www.suse.com/security/cve/CVE-2019-14869/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006145.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issue:
	  
- CVE-2019-14869: Fixed a possible  dSAFER escape which could have allowed 
  an attacker to gain high privileges by a specially crafted Postscript 
  code (bsc#1156275).
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156275">SUSE bug 1156275</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14869/">CVE-2019-14869</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522381" comment="ghostscript-9.27-23.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522382" comment="ghostscript-x11-9.27-23.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78850" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1141035" ref_url="https://bugzilla.suse.com/1141035" source="BUGZILLA"/>
		<reference ref_id="1155988" ref_url="https://bugzilla.suse.com/1155988" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006148.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to 20191112 official security release (bsc#1155988)
- Includes security fixes for:
  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155988">SUSE bug 1155988</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522383" comment="ucode-intel-20191112a-13.56.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78851" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1108940" ref_url="https://bugzilla.suse.com/1108940" source="BUGZILLA"/>
		<reference ref_id="1111014" ref_url="https://bugzilla.suse.com/1111014" source="BUGZILLA"/>
		<reference ref_id="1114405" ref_url="https://bugzilla.suse.com/1114405" source="BUGZILLA"/>
		<reference ref_id="1114423" ref_url="https://bugzilla.suse.com/1114423" source="BUGZILLA"/>
		<reference ref_id="1114988" ref_url="https://bugzilla.suse.com/1114988" source="BUGZILLA"/>
		<reference ref_id="1115040" ref_url="https://bugzilla.suse.com/1115040" source="BUGZILLA"/>
		<reference ref_id="1115043" ref_url="https://bugzilla.suse.com/1115043" source="BUGZILLA"/>
		<reference ref_id="1115044" ref_url="https://bugzilla.suse.com/1115044" source="BUGZILLA"/>
		<reference ref_id="1115045" ref_url="https://bugzilla.suse.com/1115045" source="BUGZILLA"/>
		<reference ref_id="1115047" ref_url="https://bugzilla.suse.com/1115047" source="BUGZILLA"/>
		<reference ref_id="1117756" ref_url="https://bugzilla.suse.com/1117756" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="CVE-2018-18883" ref_url="https://www.suse.com/security/cve/CVE-2018-18883/" source="CVE"/>
		<reference ref_id="CVE-2018-19665" ref_url="https://www.suse.com/security/cve/CVE-2018-19665/" source="CVE"/>
		<reference ref_id="CVE-2018-19961" ref_url="https://www.suse.com/security/cve/CVE-2018-19961/" source="CVE"/>
		<reference ref_id="CVE-2018-19962" ref_url="https://www.suse.com/security/cve/CVE-2018-19962/" source="CVE"/>
		<reference ref_id="CVE-2018-19963" ref_url="https://www.suse.com/security/cve/CVE-2018-19963/" source="CVE"/>
		<reference ref_id="CVE-2018-19964" ref_url="https://www.suse.com/security/cve/CVE-2018-19964/" source="CVE"/>
		<reference ref_id="CVE-2018-19965" ref_url="https://www.suse.com/security/cve/CVE-2018-19965/" source="CVE"/>
		<reference ref_id="CVE-2018-19966" ref_url="https://www.suse.com/security/cve/CVE-2018-19966/" source="CVE"/>
		<reference ref_id="CVE-2018-19967" ref_url="https://www.suse.com/security/cve/CVE-2018-19967/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005011.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- Update to Xen 4.11.1 bug fix release (bsc#1027519)

- CVE-2018-17963: Fixed an integer overflow issue in the QEMU emulator, which
  could occur when a packet with large packet size is processed. A user inside
  a guest could have used this flaw to crash the qemu process resulting in a
  Denial of Service (DoS). (bsc#1111014)
- CVE-2018-18849: Fixed an out of bounds memory access in the LSI53C895A SCSI
  host bus adapter emulation, which allowed a user and/or process to crash the
  qemu process resulting in a Denial of Service (DoS). (bsc#1114423)
- CVE-2018-18883: Fixed an issue related to inproper restriction of nested
  VT-x, which allowed a guest to cause Xen to crash, resulting in a Denial of
  Service (DoS). (XSA-278) (bsc#1114405)
- CVE-2018-19961, CVE-2018-19962: Fixed an issue related to insufficient TLB
  flushing with AMD IOMMUs, which potentially allowed a guest to escalate its
  privileges, may cause a Denial of Service (DoS) affecting the entire host, or
  may be able to access data it is not supposed to access. (XSA-275)
  (bsc#1115040)
- CVE-2018-19963: Fixed the allocation of pages used to communicate with
  external emulators, which may have cuased Xen to crash, resulting in a Denial
  of Service (DoS). (XSA-276) (bsc#1115043)
- CVE-2018-19965: Fixed an issue related to the INVPCID instruction in case
  non-canonical addresses are accessed, which may allow a guest to cause Xen to
  crash, resulting in a Denial of Service (DoS) affecting the entire host.
  (XSA-279) (bsc#1115045)
- CVE-2018-19966: Fixed an issue related to a previous fix for XSA-240, which
  conflicted with shadow paging and allowed a guest to cause Xen to crash,
  resulting in a Denial of Service (DoS) (XSA-280) (bsc#1115047)
- CVE-2018-19967: Fixed HLE constructs that allowed guests to lock up the host,
  resulting in a Denial of Service (DoS). (XSA-282) (bsc#1114988)
- CVE-2018-19964: Fixed the incorrect error handling of p2m page removals,
  which allowed a guest to cause a deadlock, resulting in a Denial of Service
  (DoS) affecting the entire host. (XSA-277) (bsc#1115044)
- CVE-2018-19665: Fixed an integer overflow resulting in memory corruption in
  various Bluetooth functions, allowing this to crash qemu process resulting in
  Denial of Service (DoS). (bsc#1117756).

Other bugs fixed:

- Fixed an issue related to a domU hang on SLE12-SP3 HV (bsc#1108940)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-02"/>
	<updated date="2019-01-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108940">SUSE bug 1108940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111014">SUSE bug 1111014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114405">SUSE bug 1114405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114423">SUSE bug 1114423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114988">SUSE bug 1114988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115040">SUSE bug 1115040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115043">SUSE bug 1115043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115044">SUSE bug 1115044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115045">SUSE bug 1115045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115047">SUSE bug 1115047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117756">SUSE bug 1117756</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18883/">CVE-2018-18883</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19665/">CVE-2018-19665</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19961/">CVE-2018-19961</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19962/">CVE-2018-19962</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19963/">CVE-2018-19963</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19964/">CVE-2018-19964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19965/">CVE-2018-19965</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19966/">CVE-2018-19966</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19967/">CVE-2018-19967</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522384" comment="xen-4.11.1_02-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522385" comment="xen-libs-4.11.1_02-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522386" comment="xen-libs-32bit-4.11.1_02-2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78852" version="1" class="patch">
	<metadata>
		<title>Security update for aspell (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1153892" ref_url="https://bugzilla.suse.com/1153892" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17544" ref_url="https://www.suse.com/security/cve/CVE-2019-17544/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006160.html" source="SUSE-SU"/>
		<description>
This update for aspell fixes the following issues:

- CVE-2019-17544: Fixed a stack-based buffer over-read in acommon:unescape in common/getdata.cpp via an isolated backslash (bsc#1153892).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-21"/>
	<updated date="2019-11-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1153892">SUSE bug 1153892</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-17544/">CVE-2019-17544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522387" comment="aspell-0.60.6.1-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522388" comment="libaspell15-0.60.6.1-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522389" comment="libaspell15-32bit-0.60.6.1-18.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78853" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1155787" ref_url="https://bugzilla.suse.com/1155787" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2518" ref_url="https://www.suse.com/security/cve/CVE-2017-2518/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006167.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

- CVE-2017-2518: Fixed a use-after-free vulnerability which could have 
  led to buffer overflow via a crafted SQL statement (bsc#1155787).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155787">SUSE bug 1155787</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2518/">CVE-2017-2518</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522390" comment="libsqlite3-0-3.8.10.2-9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522391" comment="libsqlite3-0-32bit-3.8.10.2-9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522392" comment="sqlite3-3.8.10.2-9.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78854" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1146358" ref_url="https://bugzilla.suse.com/1146358" source="BUGZILLA"/>
		<reference ref_id="1146359" ref_url="https://bugzilla.suse.com/1146359" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8675" ref_url="https://www.suse.com/security/cve/CVE-2019-8675/" source="CVE"/>
		<reference ref_id="CVE-2019-8696" ref_url="https://www.suse.com/security/cve/CVE-2019-8696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006170.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2019-8675: Fixed a stack buffer overflow in libcups's asn1_get_type function(bsc#1146358). 
- CVE-2019-8696: Fixed a stack buffer overflow in libcups's asn1_get_packed function (bsc#1146359).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1146358">SUSE bug 1146358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146359">SUSE bug 1146359</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8675/">CVE-2019-8675</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8696/">CVE-2019-8696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522393" comment="cups-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522394" comment="cups-client-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522395" comment="cups-libs-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522396" comment="cups-libs-32bit-1.7.5-20.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78855" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1108606" ref_url="https://bugzilla.suse.com/1108606" source="BUGZILLA"/>
		<reference ref_id="1121626" ref_url="https://bugzilla.suse.com/1121626" source="BUGZILLA"/>
		<reference ref_id="1125113" ref_url="https://bugzilla.suse.com/1125113" source="BUGZILLA"/>
		<reference ref_id="1146608" ref_url="https://bugzilla.suse.com/1146608" source="BUGZILLA"/>
		<reference ref_id="983268" ref_url="https://bugzilla.suse.com/983268" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5102" ref_url="https://www.suse.com/security/cve/CVE-2016-5102/" source="CVE"/>
		<reference ref_id="CVE-2018-17000" ref_url="https://www.suse.com/security/cve/CVE-2018-17000/" source="CVE"/>
		<reference ref_id="CVE-2019-14973" ref_url="https://www.suse.com/security/cve/CVE-2019-14973/" source="CVE"/>
		<reference ref_id="CVE-2019-6128" ref_url="https://www.suse.com/security/cve/CVE-2019-6128/" source="CVE"/>
		<reference ref_id="CVE-2019-7663" ref_url="https://www.suse.com/security/cve/CVE-2019-7663/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006177.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

Security issues fixed:

- CVE-2019-14973: Fixed an improper check which was depended on the compiler
  which could have led to integer overflow (bsc#1146608).
- CVE-2016-5102: Fixed a buffer overflow in readgifimage() (bsc#983268)
- CVE-2018-17000: Fixed a NULL pointer dereference in the _TIFFmemcmp function (bsc#1108606).
- CVE-2019-6128: Fixed a memory leak in the TIFFFdOpen function in tif_unix.c (bsc#1121626).
- CVE-2019-7663: Fixed an invalid address dereference in the
  TIFFWriteDirectoryTagTransfer function in libtiff/tif_dirwrite.c (bsc#1125113)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1108606">SUSE bug 1108606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121626">SUSE bug 1121626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125113">SUSE bug 1125113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146608">SUSE bug 1146608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983268">SUSE bug 983268</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5102/">CVE-2016-5102</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17000/">CVE-2018-17000</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14973/">CVE-2019-14973</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6128/">CVE-2019-6128</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7663/">CVE-2019-7663</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522397" comment="libtiff5-4.0.9-44.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522398" comment="libtiff5-32bit-4.0.9-44.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78856" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1155199" ref_url="https://bugzilla.suse.com/1155199" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14866" ref_url="https://www.suse.com/security/cve/CVE-2019-14866/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006178.html" source="SUSE-SU"/>
		<description>
This update for cpio fixes the following issues:
	  
- CVE-2019-14866: Fixed an improper validation of the values written 
  in the header of a TAR file through the to_oct() function which could 
  have led to unexpected TAR generation (bsc#1155199).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1155199">SUSE bug 1155199</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14866/">CVE-2019-14866</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522399" comment="cpio-2.11-36.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522400" comment="cpio-lang-2.11-36.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78857" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1144504" ref_url="https://bugzilla.suse.com/1144504" source="BUGZILLA"/>
		<reference ref_id="1149458" ref_url="https://bugzilla.suse.com/1149458" source="BUGZILLA"/>
		<reference ref_id="1151839" ref_url="https://bugzilla.suse.com/1151839" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12625" ref_url="https://www.suse.com/security/cve/CVE-2019-12625/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006180.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

Security issue fixed:

- CVE-2019-12625: Fixed a ZIP bomb issue by adding detection and heuristics for zips with overlapping files (bsc#1144504).
- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1149458).

Non-security issues fixed:

- Added the --max-scantime clamscan option and MaxScanTime clamd configuration option (bsc#1144504).
- Increased the startup timeout of clamd to 5 minutes to cater for the grown virus database as a workaround until clamd has learned to talk to systemd to extend the timeout as long as needed (bsc#1151839).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151839">SUSE bug 1151839</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12625/">CVE-2019-12625</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522401" comment="clamav-0.100.3-33.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78858" version="1" class="patch">
	<metadata>
		<title>Security update for freerdp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1153163" ref_url="https://bugzilla.suse.com/1153163" source="BUGZILLA"/>
		<reference ref_id="1153164" ref_url="https://bugzilla.suse.com/1153164" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17177" ref_url="https://www.suse.com/security/cve/CVE-2019-17177/" source="CVE"/>
		<reference ref_id="CVE-2019-17178" ref_url="https://www.suse.com/security/cve/CVE-2019-17178/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006183.html" source="SUSE-SU"/>
		<description>
This update for freerdp fixes the following issues:

- CVE-2019-17177: Fixed multiple memory leaks in libfreerdp/codec/region.c (bsc#1153163).
- CVE-2019-17178: Fixed a memory leak in HuffmanTree_makeFromFrequencies (bsc#1153164).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1153163">SUSE bug 1153163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153164">SUSE bug 1153164</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17177/">CVE-2019-17177</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17178/">CVE-2019-17178</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522402" comment="freerdp-2.0.0~git.1463131968.4e66df7-12.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522403" comment="libfreerdp2-2.0.0~git.1463131968.4e66df7-12.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78859" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1152856" ref_url="https://bugzilla.suse.com/1152856" source="BUGZILLA"/>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2894" ref_url="https://www.suse.com/security/cve/CVE-2019-2894/" source="CVE"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2987" ref_url="https://www.suse.com/security/cve/CVE-2019-2987/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Security issues fixed (October 2019 CPU  bsc#1154212):	  

- CVE-2019-2933: Windows file handling redux
- CVE-2019-2945: Better socket support
- CVE-2019-2949: Better Kerberos ccache handling
- CVE-2019-2958: Build Better Processes
- CVE-2019-2964: Better support for patterns
- CVE-2019-2962: Better Glyph Images
- CVE-2019-2973: Better pattern compilation
- CVE-2019-2978: Improved handling of jar files
- CVE-2019-2981: Better Path supports
- CVE-2019-2983: Better serial attributes
- CVE-2019-2987: Better rendering of native glyphs
- CVE-2019-2988: Better Graphics2D drawing
- CVE-2019-2989: Improve TLS connection support
- CVE-2019-2992: Enhance font glyph mapping
- CVE-2019-2999: Commentary on Javadoc comments
- CVE-2019-2894: Enhance ECDSA operations (bsc#1152856).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-27"/>
	<updated date="2019-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152856">SUSE bug 1152856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2894/">CVE-2019-2894</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2987/">CVE-2019-2987</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78860" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1123919" ref_url="https://bugzilla.suse.com/1123919" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2019:3085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006192.html" source="SUSE-SU"/>
		<description>
This update for libxml2 doesn't fix any additional security issues, but correct the rpm changelog to reflect
all CVEs that have been fixed over the past.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-28"/>
	<updated date="2019-11-28"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522406" comment="libxml2-2-2.9.4-46.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522407" comment="libxml2-2-32bit-2.9.4-46.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522408" comment="libxml2-tools-2.9.4-46.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522409" comment="python-libxml2-2.9.4-46.23.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78861" version="1" class="patch">
	<metadata>
		<title>Security update for libarchive (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1032089" ref_url="https://bugzilla.suse.com/1032089" source="BUGZILLA"/>
		<reference ref_id="1037008" ref_url="https://bugzilla.suse.com/1037008" source="BUGZILLA"/>
		<reference ref_id="1037009" ref_url="https://bugzilla.suse.com/1037009" source="BUGZILLA"/>
		<reference ref_id="1059134" ref_url="https://bugzilla.suse.com/1059134" source="BUGZILLA"/>
		<reference ref_id="1059139" ref_url="https://bugzilla.suse.com/1059139" source="BUGZILLA"/>
		<reference ref_id="1120653" ref_url="https://bugzilla.suse.com/1120653" source="BUGZILLA"/>
		<reference ref_id="1120654" ref_url="https://bugzilla.suse.com/1120654" source="BUGZILLA"/>
		<reference ref_id="1124341" ref_url="https://bugzilla.suse.com/1124341" source="BUGZILLA"/>
		<reference ref_id="1124342" ref_url="https://bugzilla.suse.com/1124342" source="BUGZILLA"/>
		<reference ref_id="1155079" ref_url="https://bugzilla.suse.com/1155079" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10209" ref_url="https://www.suse.com/security/cve/CVE-2016-10209/" source="CVE"/>
		<reference ref_id="CVE-2016-10349" ref_url="https://www.suse.com/security/cve/CVE-2016-10349/" source="CVE"/>
		<reference ref_id="CVE-2016-10350" ref_url="https://www.suse.com/security/cve/CVE-2016-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-14501" ref_url="https://www.suse.com/security/cve/CVE-2017-14501/" source="CVE"/>
		<reference ref_id="CVE-2017-14502" ref_url="https://www.suse.com/security/cve/CVE-2017-14502/" source="CVE"/>
		<reference ref_id="CVE-2018-1000877" ref_url="https://www.suse.com/security/cve/CVE-2018-1000877/" source="CVE"/>
		<reference ref_id="CVE-2018-1000878" ref_url="https://www.suse.com/security/cve/CVE-2018-1000878/" source="CVE"/>
		<reference ref_id="CVE-2019-1000019" ref_url="https://www.suse.com/security/cve/CVE-2019-1000019/" source="CVE"/>
		<reference ref_id="CVE-2019-1000020" ref_url="https://www.suse.com/security/cve/CVE-2019-1000020/" source="CVE"/>
		<reference ref_id="CVE-2019-18408" ref_url="https://www.suse.com/security/cve/CVE-2019-18408/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006201.html" source="SUSE-SU"/>
		<description>
This update for libarchive fixes the following issues:

Security issues fixed:

- CVE-2018-1000877: Fixed a double free vulnerability in RAR decoder (bsc#1120653).
- CVE-2018-1000878: Fixed a Use-After-Free vulnerability in RAR decoder (bsc#1120654).
- CVE-2019-1000019: Fixed an Out-Of-Bounds Read vulnerability in 7zip decompression (bsc#1124341).
- CVE-2019-1000020: Fixed an Infinite Loop vulnerability in ISO9660 parser (bsc#1124342).
- CVE-2019-18408: Fixed a use-after-free in RAR format support (bsc#1155079).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-28"/>
	<updated date="2019-11-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1032089">SUSE bug 1032089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037008">SUSE bug 1037008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037009">SUSE bug 1037009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059134">SUSE bug 1059134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059139">SUSE bug 1059139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120653">SUSE bug 1120653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120654">SUSE bug 1120654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124341">SUSE bug 1124341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124342">SUSE bug 1124342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155079">SUSE bug 1155079</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10209/">CVE-2016-10209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10349/">CVE-2016-10349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10350/">CVE-2016-10350</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14501/">CVE-2017-14501</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14502/">CVE-2017-14502</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000877/">CVE-2018-1000877</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000878/">CVE-2018-1000878</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1000019/">CVE-2019-1000019</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1000020/">CVE-2019-1000020</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18408/">CVE-2019-18408</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522410" comment="libarchive13-3.1.2-26.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78862" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1131830" ref_url="https://bugzilla.suse.com/1131830" source="BUGZILLA"/>
		<reference ref_id="1134550" ref_url="https://bugzilla.suse.com/1134550" source="BUGZILLA"/>
		<reference ref_id="1154036" ref_url="https://bugzilla.suse.com/1154036" source="BUGZILLA"/>
		<reference ref_id="1154037" ref_url="https://bugzilla.suse.com/1154037" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10754" ref_url="https://www.suse.com/security/cve/CVE-2018-10754/" source="CVE"/>
		<reference ref_id="CVE-2019-17594" ref_url="https://www.suse.com/security/cve/CVE-2019-17594/" source="CVE"/>
		<reference ref_id="CVE-2019-17595" ref_url="https://www.suse.com/security/cve/CVE-2019-17595/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006199.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

Security issue fixed:

- CVE-2018-10754: Fixed a denial of service caused by a NULL Pointer Dereference in the _nc_parse_entry() (bsc#1131830).
- CVE-2019-17594: Fixed a heap-based buffer over-read in _nc_find_entry function in tinfo/comp_hash.c (bsc#1154036).
- CVE-2019-17595: Fixed a heap-based buffer over-read in fmt_entry function in tinfo/comp_hash.c (bsc#1154037).

Bug fixes:

- Fixed ppc64le build configuration (bsc#1134550).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-28"/>
	<updated date="2019-11-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1131830">SUSE bug 1131830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134550">SUSE bug 1134550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154036">SUSE bug 1154036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154037">SUSE bug 1154037</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10754/">CVE-2018-10754</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17594/">CVE-2019-17594</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17595/">CVE-2019-17595</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522411" comment="libncurses5-5.9-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522412" comment="libncurses5-32bit-5.9-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522413" comment="libncurses6-5.9-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522414" comment="libncurses6-32bit-5.9-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522415" comment="ncurses-devel-5.9-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522416" comment="ncurses-utils-5.9-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522417" comment="tack-5.9-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522418" comment="terminfo-5.9-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522419" comment="terminfo-base-5.9-69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78863" version="1" class="patch">
	<metadata>
		<title>Security update for libtomcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1153433" ref_url="https://bugzilla.suse.com/1153433" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17362" ref_url="https://www.suse.com/security/cve/CVE-2019-17362/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006200.html" source="SUSE-SU"/>
		<description>
This update for libtomcrypt fixes the following issues:

- CVE-2019-17362: Fixed an improper detection of invalid UTF-8 sequences that could have led to DoS or information disclosure via crafted DER-encoded data (bsc#1153433).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-28"/>
	<updated date="2019-11-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1153433">SUSE bug 1153433</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17362/">CVE-2019-17362</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522420" comment="libtomcrypt0-1.17-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78864" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1157763" ref_url="https://bugzilla.suse.com/1157763" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006210.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:
	  
- CVE-2019-15961: Fixed a denial of service which might occur when 
  scanning a specially crafted email file as (bsc#1157763).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522421" comment="clamav-0.100.3-33.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78865" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1047247" ref_url="https://bugzilla.suse.com/1047247" source="BUGZILLA"/>
		<reference ref_id="1093414" ref_url="https://bugzilla.suse.com/1093414" source="BUGZILLA"/>
		<reference ref_id="1097665" ref_url="https://bugzilla.suse.com/1097665" source="BUGZILLA"/>
		<reference ref_id="1150734" ref_url="https://bugzilla.suse.com/1150734" source="BUGZILLA"/>
		<reference ref_id="1157198" ref_url="https://bugzilla.suse.com/1157198" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3688" ref_url="https://www.suse.com/security/cve/CVE-2019-3688/" source="CVE"/>
		<reference ref_id="CVE-2019-3690" ref_url="https://www.suse.com/security/cve/CVE-2019-3690/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006218.html" source="SUSE-SU"/>
		<description>
This update for permissions fixes the following issues:

Security issues fixed: 

- CVE-2019-3688: Changed wrong ownership in /usr/sbin/pinger to root:squid
  which could have allowed a squid user to gain persistence by changing the 
  binary (bsc#1093414).
- CVE-2019-3690: Fixed a privilege escalation through untrusted symbolic 
  links (bsc#1150734).	  

Other issue addressed: 

- Corrected a badly constracted file which could have allowed treating of the
  shell environment as permissions files (bsc#1097665,bsc#1047247).
- Fixed a regression which caused sagmentation fault (bsc#1157198). 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047247">SUSE bug 1047247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093414">SUSE bug 1093414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097665">SUSE bug 1097665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150734">SUSE bug 1150734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157198">SUSE bug 1157198</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3688/">CVE-2019-3688</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3690/">CVE-2019-3690</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522422" comment="permissions-20170707-3.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78866" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1009254" ref_url="https://bugzilla.suse.com/1009254" source="BUGZILLA"/>
		<reference ref_id="1071853" ref_url="https://bugzilla.suse.com/1071853" source="BUGZILLA"/>
		<reference ref_id="1093536" ref_url="https://bugzilla.suse.com/1093536" source="BUGZILLA"/>
		<reference ref_id="1094462" ref_url="https://bugzilla.suse.com/1094462" source="BUGZILLA"/>
		<reference ref_id="1107874" ref_url="https://bugzilla.suse.com/1107874" source="BUGZILLA"/>
		<reference ref_id="1109845" ref_url="https://bugzilla.suse.com/1109845" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10811" ref_url="https://www.suse.com/security/cve/CVE-2018-10811/" source="CVE"/>
		<reference ref_id="CVE-2018-16151" ref_url="https://www.suse.com/security/cve/CVE-2018-16151/" source="CVE"/>
		<reference ref_id="CVE-2018-16152" ref_url="https://www.suse.com/security/cve/CVE-2018-16152/" source="CVE"/>
		<reference ref_id="CVE-2018-17540" ref_url="https://www.suse.com/security/cve/CVE-2018-17540/" source="CVE"/>
		<reference ref_id="CVE-2018-5388" ref_url="https://www.suse.com/security/cve/CVE-2018-5388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006239.html" source="SUSE-SU"/>
		<description>
This update for strongswan provides the following fixes:
	  
Security issues fixed: 

- CVE-2018-5388: Fixed a buffer underflow which may allow to a remote attacker 
  with local user credentials to resource exhaustion and denial of service while 
  reading from the socket (bsc#1094462).
- CVE-2018-10811: Fixed a denial of service during  the IKEv2 key derivation if 
  the openssl plugin is used in FIPS mode and HMAC-MD5 is negotiated as PRF 
  (bsc#1093536).
- CVE-2018-16151,CVE-2018-16152: Fixed multiple flaws in the gmp plugin which 
  might lead to authorization bypass (bsc#1107874).
- CVE-2018-17540: Fixed an improper input validation in gmp plugin (bsc#1109845).  

Other issues addressed:

- Fixed some client fails when the scep server URL is used with HTTPS protocol (bsc#1071853).
- Reject Diffie-Hellman key exchanges using primes smaller than 1024 bit.
- Handle unexpected informational message from SonicWall. (bsc#1009254)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-11"/>
	<updated date="2019-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009254">SUSE bug 1009254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071853">SUSE bug 1071853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093536">SUSE bug 1093536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094462">SUSE bug 1094462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109845">SUSE bug 1109845</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10811/">CVE-2018-10811</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16151/">CVE-2018-16151</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16152/">CVE-2018-16152</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17540/">CVE-2018-17540</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5388/">CVE-2018-5388</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522423" comment="strongswan-5.1.3-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522424" comment="strongswan-doc-5.1.3-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522425" comment="strongswan-ipsec-5.1.3-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522426" comment="strongswan-libs0-5.1.3-26.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78867" version="1" class="patch">
	<metadata>
		<title>Security update for libssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1158095" ref_url="https://bugzilla.suse.com/1158095" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14889" ref_url="https://www.suse.com/security/cve/CVE-2019-14889/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006263.html" source="SUSE-SU"/>
		<description>
This update for libssh fixes the following issues:

- CVE-2019-14889: Fixed an arbitrary command execution (bsc#1158095).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-16"/>
	<updated date="2019-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1158095">SUSE bug 1158095</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14889/">CVE-2019-14889</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522427" comment="libssh4-0.6.3-12.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522428" comment="libssh4-32bit-0.6.3-12.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78868" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1154460" ref_url="https://bugzilla.suse.com/1154460" source="BUGZILLA"/>
		<reference ref_id="1154461" ref_url="https://bugzilla.suse.com/1154461" source="BUGZILLA"/>
		<reference ref_id="1154464" ref_url="https://bugzilla.suse.com/1154464" source="BUGZILLA"/>
		<reference ref_id="1157888" ref_url="https://bugzilla.suse.com/1157888" source="BUGZILLA"/>
		<reference ref_id="1158003" ref_url="https://bugzilla.suse.com/1158003" source="BUGZILLA"/>
		<reference ref_id="1158004" ref_url="https://bugzilla.suse.com/1158004" source="BUGZILLA"/>
		<reference ref_id="1158005" ref_url="https://bugzilla.suse.com/1158005" source="BUGZILLA"/>
		<reference ref_id="1158006" ref_url="https://bugzilla.suse.com/1158006" source="BUGZILLA"/>
		<reference ref_id="1158007" ref_url="https://bugzilla.suse.com/1158007" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18422" ref_url="https://www.suse.com/security/cve/CVE-2019-18422/" source="CVE"/>
		<reference ref_id="CVE-2019-18423" ref_url="https://www.suse.com/security/cve/CVE-2019-18423/" source="CVE"/>
		<reference ref_id="CVE-2019-18424" ref_url="https://www.suse.com/security/cve/CVE-2019-18424/" source="CVE"/>
		<reference ref_id="CVE-2019-19577" ref_url="https://www.suse.com/security/cve/CVE-2019-19577/" source="CVE"/>
		<reference ref_id="CVE-2019-19578" ref_url="https://www.suse.com/security/cve/CVE-2019-19578/" source="CVE"/>
		<reference ref_id="CVE-2019-19579" ref_url="https://www.suse.com/security/cve/CVE-2019-19579/" source="CVE"/>
		<reference ref_id="CVE-2019-19580" ref_url="https://www.suse.com/security/cve/CVE-2019-19580/" source="CVE"/>
		<reference ref_id="CVE-2019-19581" ref_url="https://www.suse.com/security/cve/CVE-2019-19581/" source="CVE"/>
		<reference ref_id="CVE-2019-19582" ref_url="https://www.suse.com/security/cve/CVE-2019-19582/" source="CVE"/>
		<reference ref_id="CVE-2019-19583" ref_url="https://www.suse.com/security/cve/CVE-2019-19583/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006259.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2019-19581: Fixed a potential out of bounds on 32-bit Arm (bsc#1158003 XSA-307).
- CVE-2019-19582: Fixed a potential infinite loop when x86 accesses to bitmaps with 
  a compile time known size of 64 (bsc#1158003 XSA-307).
- CVE-2019-19583: Fixed improper checks which could have allowed HVM/PVH guest userspace 
  code to crash the guest,leading to a guest denial of service (bsc#1158004 XSA-308).
- CVE-2019-19578: Fixed an issue where a malicious or buggy PV guest could have caused
  hypervisor crash resulting in denial of service affecting the entire host (bsc#1158005 XSA-309).
- CVE-2019-19580: Fixed a privilege escalation where a malicious PV guest administrator 
  could have been able to escalate their privilege to that of the host (bsc#1158006 XSA-310).
- CVE-2019-19577: Fixed an issue where a malicious guest administrator could have caused Xen 
  to access data structures while they are being modified leading to a crash (bsc#1158007 XSA-311). 
- CVE-2019-19579: Fixed a privilege escaltion where an untrusted domain with access 
  to a physical device can DMA into host memory (bsc#1157888 XSA-306).
- CVE-2019-18423: A malicious guest administrator may cause a hypervisor crash,
  resulting in a Denial of Service (DoS). (bsc#1154460).
- CVE-2019-18424: An untrusted domain with access to a physical device can DMA 
  into host memory, leading to privilege escalation. (bsc#1154461).
- CVE-2019-18422: A malicious ARM guest might contrive to arrange for critical 
  Xen code to run with interrupts erroneously enabled. This could lead to data
  corruption, denial of service, or possibly even privilege escalation. However
  a precise attack technique has not been identified. (bsc#1154464)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-16"/>
	<updated date="2019-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154460">SUSE bug 1154460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154461">SUSE bug 1154461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154464">SUSE bug 1154464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157888">SUSE bug 1157888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158003">SUSE bug 1158003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158004">SUSE bug 1158004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158005">SUSE bug 1158005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158006">SUSE bug 1158006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158007">SUSE bug 1158007</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-18422/">CVE-2019-18422</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-18423/">CVE-2019-18423</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18424/">CVE-2019-18424</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19577/">CVE-2019-19577</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19578/">CVE-2019-19578</cve>
	<cve impact="moderate" cvss3="6.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19579/">CVE-2019-19579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19580/">CVE-2019-19580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19581/">CVE-2019-19581</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19582/">CVE-2019-19582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19583/">CVE-2019-19583</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522429" comment="xen-4.11.3_02-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522430" comment="xen-libs-4.11.3_02-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522431" comment="xen-libs-32bit-4.11.3_02-2.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78869" version="1" class="patch">
	<metadata>
		<title>Security update for zziplib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1084515" ref_url="https://bugzilla.suse.com/1084515" source="BUGZILLA"/>
		<reference ref_id="1107424" ref_url="https://bugzilla.suse.com/1107424" source="BUGZILLA"/>
		<reference ref_id="1129403" ref_url="https://bugzilla.suse.com/1129403" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16548" ref_url="https://www.suse.com/security/cve/CVE-2018-16548/" source="CVE"/>
		<reference ref_id="CVE-2018-7727" ref_url="https://www.suse.com/security/cve/CVE-2018-7727/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006273.html" source="SUSE-SU"/>
		<description>
This update for zziplib fixes the following issues:

Security issues fixed:

- CVE-2018-16548: Avoid a memory leak from __zzip_parse_root_directory() which could lead to denial of service. (bsc#1107424)
- CVE-2018-7727: Fixed a memory leak in unzzip_cat() (bsc#1084515).

Non-security issue fixed:

- Prevented division by zero by first checking if uncompressed size
  is 0. This may happen with directories which have a compressed
  and uncompressed size of 0. (bsc#1129403)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-19"/>
	<updated date="2019-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1084515">SUSE bug 1084515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107424">SUSE bug 1107424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129403">SUSE bug 1129403</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16548/">CVE-2018-16548</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7727/">CVE-2018-7727</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522432" comment="libzzip-0-13-0.13.67-10.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78870" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1158328" ref_url="https://bugzilla.suse.com/1158328" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-13722" ref_url="https://www.suse.com/security/cve/CVE-2019-13722/" source="CVE"/>
		<reference ref_id="CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005/" source="CVE"/>
		<reference ref_id="CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008/" source="CVE"/>
		<reference ref_id="CVE-2019-17009" ref_url="https://www.suse.com/security/cve/CVE-2019-17009/" source="CVE"/>
		<reference ref_id="CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010/" source="CVE"/>
		<reference ref_id="CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011/" source="CVE"/>
		<reference ref_id="CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Mozilla Firefox was updated to 68.3esr (MFSA 2019-37 bsc#1158328)	  
	  
Security issues fixed: 

- CVE-2019-17008: Fixed a use-after-free in worker destruction (bmo#1546331)
- CVE-2019-13722: Fixed a stack corruption due to incorrect number of arguments 
  in WebRTC code (bmo#1580156)
- CVE-2019-11745: Fixed an out of bounds write in NSS when encrypting with a 
  block cipher (bmo#1586176)
- CVE-2019-17009: Fixed an issue where updater temporary files accessible to 
  unprivileged processes (bmo#1510494)
- CVE-2019-17010: Fixed a use-after-free when performing device orientation 
  checks (bmo#1581084)
- CVE-2019-17005: Fixed a buffer overflow in plain text serializer (bmo#1584170)
- CVE-2019-17011: Fixed a use-after-free when retrieving a document 
  in antitracking (bmo#1591334)
- CVE-2019-17012: Fixed multiple memmory issues
  (bmo#1449736, bmo#1533957, bmo#1560667,bmo#1567209, bmo#1580288, bmo#1585760, 
  bmo#1592502)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-19"/>
	<updated date="2019-12-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13722/">CVE-2019-13722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17009/">CVE-2019-17009</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522433" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522434" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78871" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1120374" ref_url="https://bugzilla.suse.com/1120374" source="BUGZILLA"/>
		<reference ref_id="1122983" ref_url="https://bugzilla.suse.com/1122983" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18500" ref_url="https://www.suse.com/security/cve/CVE-2018-18500/" source="CVE"/>
		<reference ref_id="CVE-2018-18501" ref_url="https://www.suse.com/security/cve/CVE-2018-18501/" source="CVE"/>
		<reference ref_id="CVE-2018-18505" ref_url="https://www.suse.com/security/cve/CVE-2018-18505/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005108.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed:

CVE-2018-18500: Fixed a use-after-free parsing HTML5 stream (boo#1122983).
CVE-2018-18501: Fixed multiple memory safety bugs (boo#1122983).
CVE-2018-18505: Fixed a privilege escalation through IPC channel messages (boo#1122983).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-12"/>
	<updated date="2019-02-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120374">SUSE bug 1120374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122983">SUSE bug 1122983</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18500/">CVE-2018-18500</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18501/">CVE-2018-18501</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18505/">CVE-2018-18505</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521605" comment="MozillaFirefox-60.5.0esr-109.58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521606" comment="MozillaFirefox-branding-SLE-60-32.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521607" comment="MozillaFirefox-translations-common-60.5.0esr-109.58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521608" comment="libfreebl3-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521609" comment="libfreebl3-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521610" comment="libsoftokn3-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521611" comment="libsoftokn3-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521612" comment="mozilla-nss-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521613" comment="mozilla-nss-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521614" comment="mozilla-nss-certs-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521615" comment="mozilla-nss-certs-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521616" comment="mozilla-nss-sysinit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521617" comment="mozilla-nss-sysinit-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521618" comment="mozilla-nss-tools-3.41.1-58.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78872" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1156669" ref_url="https://bugzilla.suse.com/1156669" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2737" ref_url="https://www.suse.com/security/cve/CVE-2019-2737/" source="CVE"/>
		<reference ref_id="CVE-2019-2739" ref_url="https://www.suse.com/security/cve/CVE-2019-2739/" source="CVE"/>
		<reference ref_id="CVE-2019-2740" ref_url="https://www.suse.com/security/cve/CVE-2019-2740/" source="CVE"/>
		<reference ref_id="CVE-2019-2758" ref_url="https://www.suse.com/security/cve/CVE-2019-2758/" source="CVE"/>
		<reference ref_id="CVE-2019-2805" ref_url="https://www.suse.com/security/cve/CVE-2019-2805/" source="CVE"/>
		<reference ref_id="CVE-2019-2938" ref_url="https://www.suse.com/security/cve/CVE-2019-2938/" source="CVE"/>
		<reference ref_id="CVE-2019-2974" ref_url="https://www.suse.com/security/cve/CVE-2019-2974/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3369-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193369-1.html" source="SUSE-SU"/>
		<description>
This update for mariadb to version 10.2.29 fixes the following issues:

MariaDB was updated to 10.2.29 (bsc#1156669)

Security issues fixed:
- CVE-2019-2737: Fixed an issue where could lead a remote attacker to cause denial of service 
- CVE-2019-2938: Fixed an issue where could lead a remote attacker to cause denial of service 
- CVE-2019-2740: Fixed an issue where could lead a local attacker to cause denial of service
- CVE-2019-2805: Fixed an issue where could lead a local attacker to cause denial of service
- CVE-2019-2974: Fixed an issue where could lead a remote attacker to cause denial of service
- CVE-2019-2758: Fixed an issue where could lead a local attacker to cause denial of service
  or data corruption
- CVE-2019-2739: Fixed an issue where could lead a local attacker to cause denial of service 
  or data corruption
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-20"/>
	<updated date="2019-12-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1156669">SUSE bug 1156669</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2737/">CVE-2019-2737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2739/">CVE-2019-2739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2740/">CVE-2019-2740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2758/">CVE-2019-2758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2805/">CVE-2019-2805</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2938/">CVE-2019-2938</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2974/">CVE-2019-2974</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522435" comment="mariadb-10.2.29-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522436" comment="mariadb-client-10.2.29-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522437" comment="mariadb-errormessages-10.2.29-3.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78873" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb-100 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1154162" ref_url="https://bugzilla.suse.com/1154162" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2974" ref_url="https://www.suse.com/security/cve/CVE-2019-2974/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006279.html" source="SUSE-SU"/>
		<description>
This update for mariadb-100 fixes the following issues:

Security issue fixed:

- CVE-2019-2974: Fixed Server Optimizer (bsc#1154162).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-20"/>
	<updated date="2019-12-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2974/">CVE-2019-2974</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522438" comment="libmysqlclient18-10.0.40.2-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522439" comment="libmysqlclient18-32bit-10.0.40.2-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522440" comment="libmysqlclient_r18-10.0.40.2-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522441" comment="libmysqlclient_r18-32bit-10.0.40.2-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522442" comment="mariadb-100-errormessages-10.0.40.2-2.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78874" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1048942" ref_url="https://bugzilla.suse.com/1048942" source="BUGZILLA"/>
		<reference ref_id="1051510" ref_url="https://bugzilla.suse.com/1051510" source="BUGZILLA"/>
		<reference ref_id="1078248" ref_url="https://bugzilla.suse.com/1078248" source="BUGZILLA"/>
		<reference ref_id="1082635" ref_url="https://bugzilla.suse.com/1082635" source="BUGZILLA"/>
		<reference ref_id="1089644" ref_url="https://bugzilla.suse.com/1089644" source="BUGZILLA"/>
		<reference ref_id="1091041" ref_url="https://bugzilla.suse.com/1091041" source="BUGZILLA"/>
		<reference ref_id="1108043" ref_url="https://bugzilla.suse.com/1108043" source="BUGZILLA"/>
		<reference ref_id="1113722" ref_url="https://bugzilla.suse.com/1113722" source="BUGZILLA"/>
		<reference ref_id="1114279" ref_url="https://bugzilla.suse.com/1114279" source="BUGZILLA"/>
		<reference ref_id="1117169" ref_url="https://bugzilla.suse.com/1117169" source="BUGZILLA"/>
		<reference ref_id="1131107" ref_url="https://bugzilla.suse.com/1131107" source="BUGZILLA"/>
		<reference ref_id="1138039" ref_url="https://bugzilla.suse.com/1138039" source="BUGZILLA"/>
		<reference ref_id="1140948" ref_url="https://bugzilla.suse.com/1140948" source="BUGZILLA"/>
		<reference ref_id="1143706" ref_url="https://bugzilla.suse.com/1143706" source="BUGZILLA"/>
		<reference ref_id="1144333" ref_url="https://bugzilla.suse.com/1144333" source="BUGZILLA"/>
		<reference ref_id="1149448" ref_url="https://bugzilla.suse.com/1149448" source="BUGZILLA"/>
		<reference ref_id="1150466" ref_url="https://bugzilla.suse.com/1150466" source="BUGZILLA"/>
		<reference ref_id="1151548" ref_url="https://bugzilla.suse.com/1151548" source="BUGZILLA"/>
		<reference ref_id="1151900" ref_url="https://bugzilla.suse.com/1151900" source="BUGZILLA"/>
		<reference ref_id="1152782" ref_url="https://bugzilla.suse.com/1152782" source="BUGZILLA"/>
		<reference ref_id="1153628" ref_url="https://bugzilla.suse.com/1153628" source="BUGZILLA"/>
		<reference ref_id="1153681" ref_url="https://bugzilla.suse.com/1153681" source="BUGZILLA"/>
		<reference ref_id="1153811" ref_url="https://bugzilla.suse.com/1153811" source="BUGZILLA"/>
		<reference ref_id="1154043" ref_url="https://bugzilla.suse.com/1154043" source="BUGZILLA"/>
		<reference ref_id="1154058" ref_url="https://bugzilla.suse.com/1154058" source="BUGZILLA"/>
		<reference ref_id="1154124" ref_url="https://bugzilla.suse.com/1154124" source="BUGZILLA"/>
		<reference ref_id="1154355" ref_url="https://bugzilla.suse.com/1154355" source="BUGZILLA"/>
		<reference ref_id="1154526" ref_url="https://bugzilla.suse.com/1154526" source="BUGZILLA"/>
		<reference ref_id="1154956" ref_url="https://bugzilla.suse.com/1154956" source="BUGZILLA"/>
		<reference ref_id="1155021" ref_url="https://bugzilla.suse.com/1155021" source="BUGZILLA"/>
		<reference ref_id="1155689" ref_url="https://bugzilla.suse.com/1155689" source="BUGZILLA"/>
		<reference ref_id="1155692" ref_url="https://bugzilla.suse.com/1155692" source="BUGZILLA"/>
		<reference ref_id="1155836" ref_url="https://bugzilla.suse.com/1155836" source="BUGZILLA"/>
		<reference ref_id="1155897" ref_url="https://bugzilla.suse.com/1155897" source="BUGZILLA"/>
		<reference ref_id="1155921" ref_url="https://bugzilla.suse.com/1155921" source="BUGZILLA"/>
		<reference ref_id="1155982" ref_url="https://bugzilla.suse.com/1155982" source="BUGZILLA"/>
		<reference ref_id="1156187" ref_url="https://bugzilla.suse.com/1156187" source="BUGZILLA"/>
		<reference ref_id="1156258" ref_url="https://bugzilla.suse.com/1156258" source="BUGZILLA"/>
		<reference ref_id="1156429" ref_url="https://bugzilla.suse.com/1156429" source="BUGZILLA"/>
		<reference ref_id="1156466" ref_url="https://bugzilla.suse.com/1156466" source="BUGZILLA"/>
		<reference ref_id="1156471" ref_url="https://bugzilla.suse.com/1156471" source="BUGZILLA"/>
		<reference ref_id="1156494" ref_url="https://bugzilla.suse.com/1156494" source="BUGZILLA"/>
		<reference ref_id="1156609" ref_url="https://bugzilla.suse.com/1156609" source="BUGZILLA"/>
		<reference ref_id="1156700" ref_url="https://bugzilla.suse.com/1156700" source="BUGZILLA"/>
		<reference ref_id="1156729" ref_url="https://bugzilla.suse.com/1156729" source="BUGZILLA"/>
		<reference ref_id="1156882" ref_url="https://bugzilla.suse.com/1156882" source="BUGZILLA"/>
		<reference ref_id="1157038" ref_url="https://bugzilla.suse.com/1157038" source="BUGZILLA"/>
		<reference ref_id="1157042" ref_url="https://bugzilla.suse.com/1157042" source="BUGZILLA"/>
		<reference ref_id="1157070" ref_url="https://bugzilla.suse.com/1157070" source="BUGZILLA"/>
		<reference ref_id="1157143" ref_url="https://bugzilla.suse.com/1157143" source="BUGZILLA"/>
		<reference ref_id="1157145" ref_url="https://bugzilla.suse.com/1157145" source="BUGZILLA"/>
		<reference ref_id="1157158" ref_url="https://bugzilla.suse.com/1157158" source="BUGZILLA"/>
		<reference ref_id="1157162" ref_url="https://bugzilla.suse.com/1157162" source="BUGZILLA"/>
		<reference ref_id="1157171" ref_url="https://bugzilla.suse.com/1157171" source="BUGZILLA"/>
		<reference ref_id="1157173" ref_url="https://bugzilla.suse.com/1157173" source="BUGZILLA"/>
		<reference ref_id="1157178" ref_url="https://bugzilla.suse.com/1157178" source="BUGZILLA"/>
		<reference ref_id="1157180" ref_url="https://bugzilla.suse.com/1157180" source="BUGZILLA"/>
		<reference ref_id="1157182" ref_url="https://bugzilla.suse.com/1157182" source="BUGZILLA"/>
		<reference ref_id="1157183" ref_url="https://bugzilla.suse.com/1157183" source="BUGZILLA"/>
		<reference ref_id="1157184" ref_url="https://bugzilla.suse.com/1157184" source="BUGZILLA"/>
		<reference ref_id="1157191" ref_url="https://bugzilla.suse.com/1157191" source="BUGZILLA"/>
		<reference ref_id="1157193" ref_url="https://bugzilla.suse.com/1157193" source="BUGZILLA"/>
		<reference ref_id="1157197" ref_url="https://bugzilla.suse.com/1157197" source="BUGZILLA"/>
		<reference ref_id="1157298" ref_url="https://bugzilla.suse.com/1157298" source="BUGZILLA"/>
		<reference ref_id="1157307" ref_url="https://bugzilla.suse.com/1157307" source="BUGZILLA"/>
		<reference ref_id="1157324" ref_url="https://bugzilla.suse.com/1157324" source="BUGZILLA"/>
		<reference ref_id="1157333" ref_url="https://bugzilla.suse.com/1157333" source="BUGZILLA"/>
		<reference ref_id="1157424" ref_url="https://bugzilla.suse.com/1157424" source="BUGZILLA"/>
		<reference ref_id="1157463" ref_url="https://bugzilla.suse.com/1157463" source="BUGZILLA"/>
		<reference ref_id="1157499" ref_url="https://bugzilla.suse.com/1157499" source="BUGZILLA"/>
		<reference ref_id="1157678" ref_url="https://bugzilla.suse.com/1157678" source="BUGZILLA"/>
		<reference ref_id="1157698" ref_url="https://bugzilla.suse.com/1157698" source="BUGZILLA"/>
		<reference ref_id="1157778" ref_url="https://bugzilla.suse.com/1157778" source="BUGZILLA"/>
		<reference ref_id="1157908" ref_url="https://bugzilla.suse.com/1157908" source="BUGZILLA"/>
		<reference ref_id="1158049" ref_url="https://bugzilla.suse.com/1158049" source="BUGZILLA"/>
		<reference ref_id="1158063" ref_url="https://bugzilla.suse.com/1158063" source="BUGZILLA"/>
		<reference ref_id="1158064" ref_url="https://bugzilla.suse.com/1158064" source="BUGZILLA"/>
		<reference ref_id="1158065" ref_url="https://bugzilla.suse.com/1158065" source="BUGZILLA"/>
		<reference ref_id="1158066" ref_url="https://bugzilla.suse.com/1158066" source="BUGZILLA"/>
		<reference ref_id="1158067" ref_url="https://bugzilla.suse.com/1158067" source="BUGZILLA"/>
		<reference ref_id="1158068" ref_url="https://bugzilla.suse.com/1158068" source="BUGZILLA"/>
		<reference ref_id="1158082" ref_url="https://bugzilla.suse.com/1158082" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-15916" ref_url="https://www.suse.com/security/cve/CVE-2019-15916/" source="CVE"/>
		<reference ref_id="CVE-2019-16231" ref_url="https://www.suse.com/security/cve/CVE-2019-16231/" source="CVE"/>
		<reference ref_id="CVE-2019-17055" ref_url="https://www.suse.com/security/cve/CVE-2019-17055/" source="CVE"/>
		<reference ref_id="CVE-2019-18660" ref_url="https://www.suse.com/security/cve/CVE-2019-18660/" source="CVE"/>
		<reference ref_id="CVE-2019-18683" ref_url="https://www.suse.com/security/cve/CVE-2019-18683/" source="CVE"/>
		<reference ref_id="CVE-2019-18805" ref_url="https://www.suse.com/security/cve/CVE-2019-18805/" source="CVE"/>
		<reference ref_id="CVE-2019-18809" ref_url="https://www.suse.com/security/cve/CVE-2019-18809/" source="CVE"/>
		<reference ref_id="CVE-2019-19049" ref_url="https://www.suse.com/security/cve/CVE-2019-19049/" source="CVE"/>
		<reference ref_id="CVE-2019-19052" ref_url="https://www.suse.com/security/cve/CVE-2019-19052/" source="CVE"/>
		<reference ref_id="CVE-2019-19056" ref_url="https://www.suse.com/security/cve/CVE-2019-19056/" source="CVE"/>
		<reference ref_id="CVE-2019-19057" ref_url="https://www.suse.com/security/cve/CVE-2019-19057/" source="CVE"/>
		<reference ref_id="CVE-2019-19058" ref_url="https://www.suse.com/security/cve/CVE-2019-19058/" source="CVE"/>
		<reference ref_id="CVE-2019-19060" ref_url="https://www.suse.com/security/cve/CVE-2019-19060/" source="CVE"/>
		<reference ref_id="CVE-2019-19062" ref_url="https://www.suse.com/security/cve/CVE-2019-19062/" source="CVE"/>
		<reference ref_id="CVE-2019-19063" ref_url="https://www.suse.com/security/cve/CVE-2019-19063/" source="CVE"/>
		<reference ref_id="CVE-2019-19065" ref_url="https://www.suse.com/security/cve/CVE-2019-19065/" source="CVE"/>
		<reference ref_id="CVE-2019-19067" ref_url="https://www.suse.com/security/cve/CVE-2019-19067/" source="CVE"/>
		<reference ref_id="CVE-2019-19068" ref_url="https://www.suse.com/security/cve/CVE-2019-19068/" source="CVE"/>
		<reference ref_id="CVE-2019-19073" ref_url="https://www.suse.com/security/cve/CVE-2019-19073/" source="CVE"/>
		<reference ref_id="CVE-2019-19074" ref_url="https://www.suse.com/security/cve/CVE-2019-19074/" source="CVE"/>
		<reference ref_id="CVE-2019-19075" ref_url="https://www.suse.com/security/cve/CVE-2019-19075/" source="CVE"/>
		<reference ref_id="CVE-2019-19077" ref_url="https://www.suse.com/security/cve/CVE-2019-19077/" source="CVE"/>
		<reference ref_id="CVE-2019-19227" ref_url="https://www.suse.com/security/cve/CVE-2019-19227/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2019-14895: A heap-based buffer overflow was discovered in the Linux kernel in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could have allowed the remote device to cause a denial of service (system crash) or possibly execute arbitrary code (bnc#1157158).
- CVE-2019-18660: The Linux kernel on powerpc allowed Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c (bnc#1157038).
- CVE-2019-18683: An issue was discovered in drivers/media/platform/vivid in the Linux kernel. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free (bnc#1155897).
- CVE-2019-18809: A memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1156258).
- CVE-2019-19062: A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures (bnc#1157333).
- CVE-2019-19057: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures (bnc#1157197).
- CVE-2019-19056: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures (bnc#1157197).
- CVE-2019-19068: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157307).
- CVE-2019-19063: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157298).
- CVE-2019-19227: In the AppleTalk subsystem in the Linux kernel there was a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client (bnc#1157678).
- CVE-2019-19065: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures (bnc#1157191).
- CVE-2019-19077: A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering copy to udata failures (bnc#1157171).
- CVE-2019-19052: A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157324).
- CVE-2019-19067: Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures (bsc#1157180).
- CVE-2019-19060: A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157178).
- CVE-2019-19049: A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures (bsc#1157173).
- CVE-2019-19075: A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures (bnc#1157162).
- CVE-2019-19058: A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures (bnc#1157145).
- CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157143).
- CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function (bnc#1157070).
- CVE-2019-15916: An issue was discovered in the Linux kernel There was a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause denial of service (bnc#1149448).
- CVE-2019-16231: drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150466).
- CVE-2019-18805: An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel There was a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact (bnc#1156187).
- CVE-2019-17055: base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel did not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket (bnc#1152782).


The following non-security bugs were fixed:

- ACPI / LPSS: Exclude I2C busses shared with PUNIT from pmc_atom_d3_mask (bsc#1051510).
- ACPI / SBS: Fix rare oops when removing modules (bsc#1051510).
- ACPICA: Never run _REG on system_memory and system_IO (bsc#1051510).
- ACPICA: Use %d for signed int print formatting instead of %u (bsc#1051510).
- ALSA: 6fire: Drop the dead code (git-fixes).
- ALSA: bebob: fix to detect configured source of sampling clock for Focusrite Saffire Pro i/o series (git-fixes).
- ALSA: cs4236: fix error return comparison of an unsigned integer (git-fixes).
- ALSA: firewire-motu: Correct a typo in the clock proc string (git-fixes).
- ALSA: hda - Add mute led support for HP ProBook 645 G4 (git-fixes).
- ALSA: hda - Fix pending unsol events at shutdown (git-fixes).
- ALSA: hda/ca0132 - Fix possible workqueue stall (bsc#1155836).
- ALSA: hda/intel: add CometLake PCI IDs (bsc#1156729).
- ALSA: hda/realtek - Move some alc236 pintbls to fallback table (git-fixes).
- ALSA: hda/realtek - Move some alc256 pintbls to fallback table (git-fixes).
- ALSA: hda: Add Cometlake-S PCI ID (git-fixes).
- ALSA: i2c/cs8427: Fix int to char conversion (bsc#1051510).
- ALSA: intel8x0m: Register irq handler after register initializations (bsc#1051510).
- ALSA: pcm: Fix stream lock usage in snd_pcm_period_elapsed() (git-fixes).
- ALSA: pcm: signedness bug in snd_pcm_plug_alloc() (bsc#1051510).
- ALSA: seq: Do error checks at creating system ports (bsc#1051510).
- ALSA: timer: Fix incorrectly assigned timer instance (git-fixes).
- ALSA: usb-audio: Fix Focusrite Scarlett 6i6 gen1 - input handling (git-fixes).
- ALSA: usb-audio: Fix missing error check at mixer resolution test (git-fixes).
- ALSA: usb-audio: not submit urb for stopped endpoint (git-fixes).
- ASoC: Intel: hdac_hdmi: Limit sampling rates at dai creation (bsc#1051510).
- ASoC: davinci-mcasp: Handle return value of devm_kasprintf (stable 4.14.y).
- ASoC: davinci: Kill BUG_ON() usage (stable 4.14.y).
- ASoC: dpcm: Properly initialise hw-&gt;rate_max (bsc#1051510).
- ASoC: kirkwood: fix external clock probe defer (git-fixes).
- ASoC: msm8916-wcd-analog: Fix RX1 selection in RDAC2 MUX (git-fixes).
- ASoC: sgtl5000: avoid division by zero if lo_vag is zero (bsc#1051510).
- ASoC: tegra_sgtl5000: fix device_node refcounting (bsc#1051510).
- ASoC: tlv320aic31xx: Handle inverted BCLK in non-DSP modes (stable 4.14.y).
- ASoC: tlv320dac31xx: mark expected switch fall-through (stable 4.14.y).
- Bluetooth: Fix invalid-free in bcsp_close() (git-fixes).
- Bluetooth: Fix memory leak in hci_connect_le_scan (bsc#1051510).
- Bluetooth: L2CAP: Detect if remote is not able to use the whole MPS (bsc#1051510).
- Bluetooth: btusb: fix PM leak in error case of setup (bsc#1051510).
- Bluetooth: delete a stray unlock (bsc#1051510).
- Bluetooth: hci_core: fix init for HCI_USER_CHANNEL (bsc#1051510).
- Btrfs: fix log context list corruption after rename exchange operation (bsc#1156494).
- CIFS: Fix SMB2 oplock break processing (bsc#1144333, bsc#1154355).
- CIFS: Fix oplock handling for SMB 2.1+ protocols (bsc#1144333, bsc#1154355).
- CIFS: Fix retry mid list corruption on reconnects (bsc#1144333, bsc#1154355).
- CIFS: Fix use after free of file info structures (bsc#1144333, bsc#1154355).
- CIFS: Force reval dentry if LOOKUP_REVAL flag is set (bsc#1144333, bsc#1154355).
- CIFS: Force revalidate inode when dentry is stale (bsc#1144333, bsc#1154355).
- CIFS: Gracefully handle QueryInfo errors during open (bsc#1144333, bsc#1154355).
- CIFS: avoid using MID 0xFFFF (bsc#1144333, bsc#1154355).
- CIFS: fix max ea value size (bsc#1144333, bsc#1154355).
- Documentation: debugfs: Document debugfs helper for unsigned long values (git-fixes).
- Documentation: x86: convert protection-keys.txt to reST (bsc#1078248).
- EDAC/ghes: Fix Use after free in ghes_edac remove path (bsc#1114279).
- HID: Add ASUS T100CHI keyboard dock battery quirks (bsc#1051510).
- HID: Add quirk for Microsoft PIXART OEM mouse (bsc#1051510).
- HID: Fix assumption that devices have inputs (git-fixes).
- HID: asus: Add T100CHI bluetooth keyboard dock special keys mapping (bsc#1051510).
- HID: wacom: generic: Treat serial number and related fields as unsigned (git-fixes).
- Input: ff-memless - kill timer in destroy() (bsc#1051510).
- Input: silead - try firmware reload after unsuccessful resume (bsc#1051510).
- Input: st1232 - set INPUT_PROP_DIRECT property (bsc#1051510).
- Input: synaptics-rmi4 - clear IRQ enables for F54 (bsc#1051510).
- Input: synaptics-rmi4 - destroy F54 poller workqueue when removing (bsc#1051510).
- Input: synaptics-rmi4 - disable the relative position IRQ in the F12 driver (bsc#1051510).
- Input: synaptics-rmi4 - do not consume more data than we have (F11, F12) (bsc#1051510).
- Input: synaptics-rmi4 - fix video buffer size (git-fixes).
- KVM: VMX: Consider PID.PIR to determine if vCPU has pending interrupts (bsc#1158064).
- KVM: VMX: Fix conditions for guest IA32_XSS support (bsc#1158065).
- KVM: x86/mmu: Take slots_lock when using kvm_mmu_zap_all_fast() (bsc#1158067).
- KVM: x86: Introduce vcpu-&gt;arch.xsaves_enabled (bsc#1158066).
- NFC: nxp-nci: Fix NULL pointer dereference after I2C communication error (git-fixes).
- PCI/ACPI: Correct error message for ASPM disabling (bsc#1051510).
- PCI/PME: Fix possible use-after-free on remove (git-fixes).
- PCI: sysfs: Ignore lockdep for remove attribute (git-fixes).
- PM / devfreq: Check NULL governor in available_governors_show (git-fixes).
- PM / devfreq: Lock devfreq in trans_stat_show (git-fixes).
- PM / devfreq: exynos-bus: Correct clock enable sequence (bsc#1051510).
- PM / devfreq: passive: Use non-devm notifiers (bsc#1051510).
- PM / devfreq: passive: fix compiler warning (bsc#1051510).
- PM / hibernate: Check the success of generating md5 digest before hibernation (bsc#1051510).
- README.BRANCH: Add Denis as branch maintainer
- Revert synaptics-rmi4 patch due to regression (bsc#1155982) Also blacklisting it
- UAS: Revert commit 3ae62a42090f ('UAS: fix alignment of scatter/gather segments').
- USB: chaoskey: fix error case of a timeout (git-fixes).
- USB: gadget: Reject endpoints with 0 maxpacket value (bsc#1051510).
- USB: ldusb: fix control-message timeout (bsc#1051510).
- USB: ldusb: fix ring-buffer locking (bsc#1051510).
- USB: serial: mos7720: fix remote wakeup (git-fixes).
- USB: serial: mos7840: add USB ID to support Moxa UPort 2210 (bsc#1051510).
- USB: serial: mos7840: fix remote wakeup (git-fixes).
- USB: serial: option: add support for DW5821e with eSIM support (bsc#1051510).
- USB: serial: option: add support for Foxconn T77W968 LTE modules (bsc#1051510).
- USB: serial: whiteheat: fix line-speed endianness (bsc#1051510).
- USB: serial: whiteheat: fix potential slab corruption (bsc#1051510).
- USBIP: add config dependency for SGL_ALLOC (git-fixes).
- appledisplay: fix error handling in the scheduled work (git-fixes).
- arm64: Update config files. (bsc#1156466) Enable HW_RANDOM_OMAP driver and mark driver omap-rng as supported.
- ata: ep93xx: Use proper enums for directions (bsc#1051510).
- ath10k: fix kernel panic by moving pci flush after napi_disable (bsc#1051510).
- ath10k: fix vdev-start timeout on error (bsc#1051510).
- ath10k: limit available channels via DT ieee80211-freq-limit (bsc#1051510).
- ath10k: wmi: disable softirq's while calling ieee80211_rx (bsc#1051510).
- ath9k: Fix a locking bug in ath9k_add_interface() (bsc#1051510).
- ath9k: add back support for using active monitor interfaces for tx99 (bsc#1051510).
- ath9k: fix reporting calculated new FFT upper max (bsc#1051510).
- ath9k: fix tx99 with monitor mode interface (bsc#1051510).
- ath9k_hw: fix uninitialized variable data (bsc#1051510).
- ax88172a: fix information leak on short answers (bsc#1051510).
- backlight: lm3639: Unconditionally call led_classdev_unregister (bsc#1051510).
- brcmfmac: fix full timeout waiting for action frame on-channel tx (bsc#1051510).
- brcmfmac: reduce timeout for action frame scan (bsc#1051510).
- brcmsmac: AP mode: update beacon when TIM changes (bsc#1051510).
- brcmsmac: never log 'tid x is not agg'able' by default (bsc#1051510).
- can: c_can: c_can_poll(): only read status register after status IRQ (git-fixes).
- can: dev: call netif_carrier_off() in register_candev() (bsc#1051510).
- can: mcba_usb: fix use-after-free on disconnect (git-fixes).
- can: peak_usb: fix a potential out-of-sync while decoding packets (git-fixes).
- can: peak_usb: fix slab info leak (git-fixes).
- can: rx-offload: can_rx_offload_offload_one(): do not increase the skb_queue beyond skb_queue_len_max (git-fixes).
- can: rx-offload: can_rx_offload_queue_sorted(): fix error handling, avoid skb mem leak (git-fixes).
- can: rx-offload: can_rx_offload_queue_tail(): fix error handling, avoid skb mem leak (git-fixes).
- can: usb_8dev: fix use-after-free on disconnect (git-fixes).
- ceph: add missing check in d_revalidate snapdir handling (bsc#1157183).
- ceph: do not try to handle hashed dentries in non-O_CREAT atomic_open (bsc#1157184).
- ceph: fix use-after-free in __ceph_remove_cap() (bsc#1154058).
- ceph: just skip unrecognized info in ceph_reply_info_extra (bsc#1157182).
- cfg80211: Avoid regulatory restore when COUNTRY_IE_IGNORE is set (bsc#1051510).
- cfg80211: Prevent regulatory restore during STA disconnect in concurrent interfaces (bsc#1051510).
- cfg80211: call disconnect_wk when AP stops (bsc#1051510).
- cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs (bsc#1144333, bsc#1154355).
- cifs: Fix missed free operations (bsc#1144333, bsc#1154355).
- cifs: Use kzfree() to zero out the password (bsc#1144333, bsc#1154355).
- cifs: add a helper to find an existing readable handle to a file (bsc#1144333, bsc#1154355).
- cifs: create a helper to find a writeable handle by path name (bsc#1144333, bsc#1154355).
- cifs: move cifsFileInfo_put logic into a work-queue (bsc#1144333, bsc#1154355).
- cifs: prepare SMB2_Flush to be usable in compounds (bsc#1144333, bsc#1154355).
- cifs: set domainName when a domain-key is used in multiuser (bsc#1144333, bsc#1154355).
- cifs: use cifsInodeInfo-&gt;open_file_lock while iterating to avoid a panic (bsc#1144333, bsc#1154355).
- cifs: use existing handle for compound_op(OP_SET_INFO) when possible (bsc#1144333, bsc#1154355).
- clk: at91: avoid sleeping early (git-fixes).
- clk: pxa: fix one of the pxa RTC clocks (bsc#1051510).
- clk: samsung: Use clk_hw API for calling clk framework from clk notifiers (bsc#1051510).
- clk: samsung: exynos5420: Preserve CPU clocks configuration during suspend/resume (bsc#1051510).
- clk: samsung: exynos5420: Preserve PLL configuration during suspend/resume (git-fixes).
- clk: sunxi-ng: a80: fix the zero'ing of bits 16 and 18 (git-fixes).
- clocksource/drivers/sh_cmt: Fix clocksource width for 32-bit machines (bsc#1051510).
- clocksource/drivers/sh_cmt: Fixup for 64-bit machines (bsc#1051510).
- component: fix loop condition to call unbind() if bind() fails (bsc#1051510).
- cpufreq/pasemi: fix use-after-free in pas_cpufreq_cpu_init() (bsc#1051510).
- cpufreq: Skip cpufreq resume if it's not suspended (bsc#1051510).
- cpufreq: intel_pstate: Register when ACPI PCCH is present (bsc#1051510).
- cpufreq: powernv: fix stack bloat and hard limit on number of CPUs (bsc#1051510).
- cpufreq: ti-cpufreq: add missing of_node_put() (bsc#1051510).
- cpupower : Fix cpupower working when cpu0 is offline (bsc#1051510).
- cpupower : frequency-set -r option misses the last cpu in related cpu list (bsc#1051510).
- cpupower: Fix coredump on VMWare (bsc#1051510).
- crypto: af_alg - cast ki_complete ternary op to int (bsc#1051510).
- crypto: crypto4xx - fix double-free in crypto4xx_destroy_sdr (bsc#1051510).
- crypto: ecdh - fix big endian bug in ECC library (bsc#1051510).
- crypto: fix a memory leak in rsa-kcs1pad's encryption mode (bsc#1051510).
- crypto: geode-aes - switch to skcipher for cbc(aes) fallback (bsc#1051510).
- crypto: mxs-dcp - Fix AES issues (bsc#1051510).
- crypto: mxs-dcp - Fix SHA null hashes and output length (bsc#1051510).
- crypto: mxs-dcp - make symbols 'sha1_null_hash' and 'sha256_null_hash' static (bsc#1051510).
- crypto: s5p-sss: Fix Fix argument list alignment (bsc#1051510).
- crypto: tgr192 - remove unneeded semicolon (bsc#1051510).
- cw1200: Fix a signedness bug in cw1200_load_firmware() (bsc#1051510).
- cxgb4: fix panic when attaching to ULD fail (networking-stable-19_11_05).
- dccp: do not leak jiffies on the wire (networking-stable-19_11_05).
- dlm: do not leak kernel pointer to userspace (bsc#1051510).
- dlm: fix invalid free (bsc#1051510).
- dmaengine: bcm2835: Print error in case setting DMA mask fails (bsc#1051510).
- dmaengine: dma-jz4780: Do not depend on MACH_JZ4780 (bsc#1051510).
- dmaengine: dma-jz4780: Further residue status fix (bsc#1051510).
- dmaengine: ep93xx: Return proper enum in ep93xx_dma_chan_direction (bsc#1051510).
- dmaengine: imx-sdma: fix size check for sdma script_number (bsc#1051510).
- dmaengine: imx-sdma: fix use-after-free on probe error path (bsc#1051510).
- dmaengine: rcar-dmac: set scatter/gather max segment size (bsc#1051510).
- dmaengine: timb_dma: Use proper enum in td_prep_slave_sg (bsc#1051510).
- docs: move protection-keys.rst to the core-api book (bsc#1078248).
- drm/etnaviv: fix dumping of iommuv2 (bsc#1113722)
- drm/omap: fix max fclk divider for omap36xx (bsc#1113722)
- drm/radeon: fix bad DMA from INTERRUPT_CNTL2 (git-fixes).
- drm/radeon: fix si_enable_smc_cac() failed issue (bsc#1113722)
- e1000e: Drop unnecessary __E1000_DOWN bit twiddling (bsc#1158049).
- e1000e: Use dev_get_drvdata where possible (bsc#1158049).
- e1000e: Use rtnl_lock to prevent race conditions between net and pci/pm (bsc#1158049).
- extcon: cht-wc: Return from default case to avoid warnings (bsc#1051510).
- fbdev: sbuslib: integer overflow in sbusfb_ioctl_helper() (bsc#1051510).
- fbdev: sbuslib: use checked version of put_user() (bsc#1051510).
- gpio: mpc8xxx: Do not overwrite default irq_set_type callback (bsc#1051510).
- gpio: syscon: Fix possible NULL ptr usage (bsc#1051510).
- gpiolib: acpi: Add Terra Pad 1061 to the run_edge_events_on_boot_blacklist (bsc#1051510).
- gsmi: Fix bug in append_to_eventlog sysfs handler (bsc#1051510).
- hwmon: (ina3221) Fix INA3221_CONFIG_MODE macros (bsc#1051510).
- hwmon: (pwm-fan) Silence error on probe deferral (bsc#1051510).
- hwrng: omap - Fix RNG wait loop timeout (bsc#1051510).
- hwrng: omap3-rom - Call clk_disable_unprepare() on exit only if not idled (bsc#1051510).
- hypfs: Fix error number left in struct pointer member (bsc#1051510).
- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).
- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).
- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).
- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).
- iio: adc: max9611: explicitly cast gain_selectors (bsc#1051510).
- iio: adc: stm32-adc: fix stopping dma (git-fixes).
- iio: dac: mcp4922: fix error handling in mcp4922_write_raw (bsc#1051510).
- iio: imu: adis16480: assign bias value only if operation succeeded (git-fixes).
- iio: imu: adis16480: make sure provided frequency is positive (git-fixes).
- iio: imu: adis: assign read val in debugfs hook only if op successful (git-fixes).
- iio: imu: adis: assign value only if return code zero in read funcs (git-fixes).
- include/linux/bitrev.h: fix constant bitrev (bsc#1114279).
- inet: stop leaking jiffies on the wire (networking-stable-19_11_05).
- intel_th: Fix a double put_device() in error path (git-fixes).
- iommu/vt-d: Fix QI_DEV_IOTLB_PFSID and QI_DEV_EIOTLB_PFSID macros (bsc#1158063).
- ipmi:dmi: Ignore IPMI SMBIOS entries with a zero base address (bsc#1051510).
- ipv4: Return -ENETUNREACH if we can't create route but saddr is valid (networking-stable-19_10_24).
- iwlwifi: api: annotate compressed BA notif array sizes (bsc#1051510).
- iwlwifi: check kasprintf() return value (bsc#1051510).
- iwlwifi: do not panic in error path on non-msix systems (bsc#1155692).
- iwlwifi: exclude GEO SAR support for 3168 (git-fixes).
- iwlwifi: mvm: avoid sending too many BARs (bsc#1051510).
- iwlwifi: mvm: do not send keys when entering D3 (bsc#1051510).
- kABI workaround for ath10k last_wmi_vdev_start_status field (bsc#1051510).
- kABI workaround for struct mwifiex_power_cfg change (bsc#1051510).
- kABI: Fix for 'KVM: x86: Introduce vcpu-&gt;arch.xsaves_enabled' (bsc#1158066).
- lib/scatterlist: Fix chaining support in sgl_alloc_order() (git-fixes).
- lib/scatterlist: Introduce sgl_alloc() and sgl_free() (git-fixes).
- liquidio: fix race condition in instruction completion processing (bsc#1051510).
- loop: add ioctl for changing logical block size (bsc#1108043).
- mISDN: Fix type of switch control variable in ctrl_teimanager (bsc#1051510).
- mac80211: consider QoS Null frames for STA_NULLFUNC_ACKED (bsc#1051510).
- mac80211: minstrel: fix CCK rate group streams value (bsc#1051510).
- mac80211: minstrel: fix sampling/reporting of CCK rates in HT mode (bsc#1051510).
- macvlan: schedule bc_work even if error (bsc#1051510).
- mailbox: reset txdone_method TXDONE_BY_POLL if client knows_txdone (git-fixes).
- media: au0828: Fix incorrect error messages (bsc#1051510).
- media: bdisp: fix memleak on release (git-fixes).
- media: cxusb: detect cxusb_ctrl_msg error in query (bsc#1051510).
- media: davinci: Fix implicit enum conversion warning (bsc#1051510).
- media: exynos4-is: Fix recursive locking in isp_video_release() (git-fixes).
- media: fix: media: pci: meye: validate offset to avoid arbitrary access (bsc#1051510).
- media: flexcop-usb: ensure -EIO is returned on error condition (git-fixes).
- media: imon: invalid dereference in imon_touch_event (bsc#1051510).
- media: isif: fix a NULL pointer dereference bug (bsc#1051510).
- media: pci: ivtv: Fix a sleep-in-atomic-context bug in ivtv_yuv_init() (bsc#1051510).
- media: pxa_camera: Fix check for pdev-&gt;dev.of_node (bsc#1051510).
- media: radio: wl1273: fix interrupt masking on release (git-fixes).
- media: ti-vpe: vpe: Fix Motion Vector vpdma stride (git-fixes).
- media: usbvision: Fix races among open, close, and disconnect (bsc#1051510).
- media: vim2m: Fix abort issue (git-fixes).
- media: vivid: Set vid_cap_streaming and vid_out_streaming to true (bsc#1051510).
- mei: fix modalias documentation (git-fixes).
- mei: samples: fix a signedness bug in amt_host_if_call() (bsc#1051510).
- mfd: intel-lpss: Add default I2C device properties for Gemini Lake (bsc#1051510).
- mfd: max8997: Enale irq-wakeup unconditionally (bsc#1051510).
- mfd: mc13xxx-core: Fix PMIC shutdown when reading ADC values (bsc#1051510).
- mfd: palmas: Assign the right powerhold mask for tps65917 (git-fixes).
- mfd: ti_am335x_tscadc: Keep ADC interface on if child is wakeup capable (bsc#1051510).
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d() (git fixes (mm/gup)).
- mm/compaction.c: clear total_{migrate,free}_scanned before scanning a new zone (git fixes (mm/compaction)).
- mm/debug.c: PageAnon() is true for PageKsm() pages (git fixes (mm/debug)).
- mmc: core: fix wl1251 sdio quirks (git-fixes).
- mmc: host: omap_hsmmc: add code for special init of wl1251 to get rid of pandora_wl1251_init_card (git-fixes).
- mmc: mediatek: fix cannot receive new request when msdc_cmd_is_ready fail (bsc#1051510).
- mmc: sdhci-esdhc-imx: correct the fix of ERR004536 (git-fixes).
- mmc: sdhci-of-at91: fix quirk2 overwrite (git-fixes).
- mmc: sdio: fix wl1251 vendor id (git-fixes).
- mt7601u: fix bbp version check in mt7601u_wait_bbp_ready (bsc#1051510).
- mtd: nand: mtk: fix incorrect register setting order about ecc irq.
- mtd: spear_smi: Fix Write Burst mode (bsc#1051510).
- mtd: spi-nor: fix silent truncation in spi_nor_read() (bsc#1051510).
- mwifiex: Fix NL80211_TX_POWER_LIMITED (bsc#1051510).
- net/ibmvnic: Ignore H_FUNCTION return from H_EOI to tolerate XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).
- net/mlx4_core: Dynamically set guaranteed amount of counters per VF (networking-stable-19_11_05).
- net/mlx5e: Fix handling of compressed CQEs in case of low NAPI budget (networking-stable-19_11_05).
- net/smc: Fix error path in smc_init (git-fixes).
- net/smc: avoid fallback in case of non-blocking connect (git-fixes).
- net/smc: fix closing of fallback SMC sockets (git-fixes).
- net/smc: fix ethernet interface refcounting (git-fixes).
- net/smc: fix refcounting for non-blocking connect() (git-fixes).
- net/smc: keep vlan_id for SMC-R in smc_listen_work() (git-fixes).
- net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol() (networking-stable-19_11_05).
- net: add READ_ONCE() annotation in __skb_wait_for_more_packets() (networking-stable-19_11_05).
- net: add skb_queue_empty_lockless() (networking-stable-19_11_05).
- net: annotate accesses to sk-&gt;sk_incoming_cpu (networking-stable-19_11_05).
- net: annotate lockless accesses to sk-&gt;sk_napi_id (networking-stable-19_11_05).
- net: avoid potential infinite loop in tc_ctl_action() (networking-stable-19_10_24).
- net: bcmgenet: Fix RGMII_MODE_EN value for GENET v1/2/3 (networking-stable-19_10_24).
- net: bcmgenet: Set phydev-&gt;dev_flags only for internal PHYs (networking-stable-19_10_24).
- net: bcmgenet: reset 40nm EPHY on energy detect (networking-stable-19_11_05).
- net: dsa: b53: Do not clear existing mirrored port mask (networking-stable-19_11_05).
- net: dsa: bcm_sf2: Fix IMP setup for port different than 8 (networking-stable-19_11_05).
- net: dsa: fix switch tree list (networking-stable-19_11_05).
- net: ethernet: ftgmac100: Fix DMA coherency issue with SW checksum (networking-stable-19_11_05).
- net: fix sk_page_frag() recursion from memory reclaim (networking-stable-19_11_05).
- net: hisilicon: Fix ping latency when deal with high throughput (networking-stable-19_11_05).
- net: stmmac: disable/enable ptp_ref_clk in suspend/resume flow (networking-stable-19_10_24).
- net: use skb_queue_empty_lockless() in busy poll contexts (networking-stable-19_11_05).
- net: use skb_queue_empty_lockless() in poll() handlers (networking-stable-19_11_05).
- net: wireless: ti: remove local VENDOR_ID and DEVICE_ID definitions (git-fixes).
- net: wireless: ti: wl1251 use new SDIO_VENDOR_ID_TI_WL1251 definition (git-fixes).
- netns: fix GFP flags in rtnl_net_notifyid() (networking-stable-19_11_05).
- nfc: netlink: fix double device reference drop (git-fixes).
- nfc: port100: handle command failure cleanly (git-fixes).
- nl80211: Fix a GET_KEY reply attribute (bsc#1051510).
- openvswitch: fix flow command message size (git-fixes).
- padata: use smp_mb in padata_reorder to avoid orphaned padata jobs (git-fixes).
- phy: phy-twl4030-usb: fix denied runtime access (git-fixes).
- pinctl: ti: iodelay: fix error checking on pinctrl_count_index_with_args call (git-fixes).
- pinctrl: at91: do not use the same irqchip with multiple gpiochips (git-fixes).
- pinctrl: cherryview: Allocate IRQ chip dynamic (git-fixes).
- pinctrl: lewisburg: Update pin list according to v1.1v6 (bsc#1051510).
- pinctrl: lpc18xx: Use define directive for PIN_CONFIG_GPIO_PIN_INT (bsc#1051510).
- pinctrl: qcom: spmi-gpio: fix gpio-hog related boot issues (bsc#1051510).
- pinctrl: samsung: Fix device node refcount leaks in S3C24xx wakeup controller init (bsc#1051510).
- pinctrl: samsung: Fix device node refcount leaks in S3C64xx wakeup controller init (bsc#1051510).
- pinctrl: samsung: Fix device node refcount leaks in init code (bsc#1051510).
- pinctrl: sunxi: Fix a memory leak in 'sunxi_pinctrl_build_state()' (bsc#1051510).
- pinctrl: zynq: Use define directive for PIN_CONFIG_IO_STANDARD (bsc#1051510).
- power: reset: at91-poweroff: do not procede if at91_shdwc is allocated (bsc#1051510).
- power: supply: ab8500_fg: silence uninitialized variable warnings (bsc#1051510).
- power: supply: max14656: fix potential use-after-free (bsc#1051510).
- power: supply: twl4030_charger: disable eoc interrupt on linear charge (bsc#1051510).
- power: supply: twl4030_charger: fix charging current out-of-bounds (bsc#1051510).
- powerpc/64: Make meltdown reporting Book3S 64 specific (bsc#1091041).
- powerpc/book3s64/hash: Use secondary hash for bolted mapping if the primary is full (bsc#1157778 ltc#182520).
- powerpc/bpf: Fix tail call implementation (bsc#1157698).
- powerpc/pseries: Do not fail hash page table insert for bolted mapping (bsc#1157778 ltc#182520).
- powerpc/pseries: Do not opencode HPTE_V_BOLTED (bsc#1157778 ltc#182520).
- powerpc/pseries: address checkpatch warnings in dlpar_offline_cpu (bsc#1156700 ltc#182459).
- powerpc/pseries: safely roll back failed DLPAR cpu add (bsc#1156700 ltc#182459).
- powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).
- powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).
- powerpc/xive: Prevent page fault issues in the machine crash handler (bsc#1156882 ltc#182435).
- ppdev: fix PPGETTIME/PPSETTIME ioctls (bsc#1051510).
- pwm: bcm-iproc: Prevent unloading the driver module while in use (git-fixes).
- pwm: lpss: Only set update bit if we are actually changing the settings (bsc#1051510).
- r8152: add device id for Lenovo ThinkPad USB-C Dock Gen 2 (networking-stable-19_11_05).
- regulator: ab8500: Remove AB8505 USB regulator (bsc#1051510).
- regulator: ab8500: Remove SYSCLKREQ from enum ab8505_regulator_id (bsc#1051510).
- remoteproc: Check for NULL firmwares in sysfs interface (git-fixes).
- reset: Fix potential use-after-free in __of_reset_control_get() (bsc#1051510).
- reset: fix of_reset_simple_xlate kerneldoc comment (bsc#1051510).
- reset: fix reset_control_get_exclusive kerneldoc comment (bsc#1051510).
- rpm/kernel-binary.spec.in: add COMPRESS_VMLINUX (bnc#1155921) Let COMPRESS_VMLINUX determine the compression used for vmlinux. By default (historically), it is gz.
- rpm/kernel-source.spec.in: Fix dependency of kernel-devel (bsc#1154043)
- rtl8187: Fix warning generated when strncpy() destination length matches the sixe argument (bsc#1051510).
- rtlwifi: Remove unnecessary NULL check in rtl_regd_init (bsc#1051510).
- rtlwifi: rtl8192de: Fix misleading REG_MCUFWDL information (bsc#1051510).
- rtlwifi: rtl8192de: Fix missing code to retrieve RX buffer address (bsc#1051510).
- rtlwifi: rtl8192de: Fix missing enable interrupt flag (bsc#1051510).
- s390/bpf: fix lcgr instruction encoding (bsc#1051510).
- s390/bpf: use 32-bit index for tail calls (bsc#1051510).
- s390/cio: avoid calling strlen on null pointer (bsc#1051510).
- s390/cio: exclude subchannels with no parent from pseudo check (bsc#1051510).
- s390/cmm: fix information leak in cmm_timeout_handler() (bsc#1051510).
- s390/cpumsf: Check for CPU Measurement sampling (bsc#1153681 LTC#181855).
- s390/idle: fix cpu idle time calculation (bsc#1051510).
- s390/process: avoid potential reading of freed stack (bsc#1051510).
- s390/qdio: (re-)initialize tiqdio list entries (bsc#1051510).
- s390/qdio: do not touch the dsci in tiqdio_add_input_queues() (bsc#1051510).
- s390/qeth: return proper errno on IO error (bsc#1051510).
- s390/setup: fix boot crash for machine without EDAT-1 (bsc#1051510 bsc#1140948).
- s390/setup: fix early warning messages (bsc#1051510 bsc#1140948).
- s390/topology: avoid firing events before kobjs are created (bsc#1051510).
- s390: fix stfle zero padding (bsc#1051510).
- sc16is7xx: Fix for 'Unexpected interrupt: 8' (bsc#1051510).
- scsi: lpfc: Fix Oops in nvme_register with target logout/login (bsc#1151900).
- scsi: lpfc: Honor module parameter lpfc_use_adisc (bsc#1153628).
- scsi: lpfc: Limit xri count for kdump environment (bsc#1154124).
- scsi: qla2xxx: Add debug dump of LOGO payload and ELS IOCB (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).
- scsi: qla2xxx: Allow PLOGI in target mode (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).
- scsi: qla2xxx: Change discovery state before PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).
- scsi: qla2xxx: Configure local loop for N2N target (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).
- scsi: qla2xxx: Do command completion on abort timeout (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).
- scsi: qla2xxx: Do not call qlt_async_event twice (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).
- scsi: qla2xxx: Do not defer relogin unconditonally (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).
- scsi: qla2xxx: Drop superfluous INIT_WORK of del_work (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).
- scsi: qla2xxx: Fix PLOGI payload and ELS IOCB dump length (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).
- scsi: qla2xxx: Fix SRB leak on switch command timeout (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).
- scsi: qla2xxx: Fix a dma_pool_free() call (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).
- scsi: qla2xxx: Fix device connect issues in P2P configuration (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).
- scsi: qla2xxx: Fix double scsi_done for abort path (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).
- scsi: qla2xxx: Fix driver unload hang (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).
- scsi: qla2xxx: Fix memory leak when sending I/O fails (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).
- scsi: qla2xxx: Fix qla2x00_request_irqs() for MSI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).
- scsi: qla2xxx: Ignore NULL pointer in tcm_qla2xxx_free_mcmd (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).
- scsi: qla2xxx: Ignore PORT UPDATE after N2N PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).
- scsi: qla2xxx: Initialize free_work before flushing it (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).
- scsi: qla2xxx: Remove an include directive (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).
- scsi: qla2xxx: Retry PLOGI on FC-NVMe PRLI failure (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).
- scsi: qla2xxx: Send Notify ACK after N2N PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).
- scsi: qla2xxx: Update driver version to 10.01.00.21-k (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).
- scsi: qla2xxx: Use explicit LOGO in target mode (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).
- scsi: qla2xxx: do not use zero for FC4_PRIORITY_NVME (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).
- scsi: qla2xxx: fix rports not being mark as lost in sync fabric scan (bsc#1138039).
- scsi: qla2xxx: initialize fc4_type_priority (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).
- scsi: qla2xxx: unregister ports after GPN_FT failure (bsc#1138039).
- scsi: sd: Ignore a failure to sync cache due to lack of authorization (git-fixes).
- scsi: storvsc: Add ability to change scsi queue depth (bsc#1155021).
- scsi: zfcp: fix reaction on bit error threshold notification (bsc#1154956 LTC#182054).
- scsi: zfcp: fix request object use-after-free in send path causing wrong traces (bsc#1051510).
- sctp: change sctp_prot .no_autobind with true (networking-stable-19_10_24).
- sctp: Fixed a regression (bsc#1158082).
- selftests: net: reuseport_dualstack: fix uninitalized parameter (networking-stable-19_11_05).
- serial: fix kernel-doc warning in comments (bsc#1051510).
- serial: mctrl_gpio: Check for NULL pointer (bsc#1051510).
- serial: mxs-auart: Fix potential infinite loop (bsc#1051510).
- serial: samsung: Enable baud clock for UART reset procedure in resume (bsc#1051510).
- serial: uartlite: fix exit path null pointer (bsc#1051510).
- serial: uartps: Fix suspend functionality (bsc#1051510).
- signal: Properly set TRACE_SIGNAL_LOSE_INFO in __send_signal (bsc#1157463).
- slcan: Fix memory leak in error path (bsc#1051510).
- slip: Fix memory leak in slip_open error path (bsc#1051510).
- slip: Fix use-after-free Read in slip_open (bsc#1051510).
- smb3: Incorrect size for netname negotiate context (bsc#1144333, bsc#1154355).
- smb3: fix leak in 'open on server' perf counter (bsc#1144333, bsc#1154355).
- smb3: fix signing verification of large reads (bsc#1144333, bsc#1154355).
- smb3: fix unmount hang in open_shroot (bsc#1144333, bsc#1154355).
- smb3: improve handling of share deleted (and share recreated) (bsc#1144333, bsc#1154355).
- soc: imx: gpc: fix PDN delay (bsc#1051510).
- soc: qcom: wcnss_ctrl: Avoid string overflow (bsc#1051510).
- spi: atmel: Fix CS high support (bsc#1051510).
- spi: atmel: fix handling of cs_change set on non-last xfer (bsc#1051510).
- spi: fsl-lpspi: Prevent FIFO under/overrun by default (bsc#1051510).
- spi: mediatek: Do not modify spi_transfer when transfer (bsc#1051510).
- spi: mediatek: use correct mata-&gt;xfer_len when in fifo transfer (bsc#1051510).
- spi: pic32: Use proper enum in dmaengine_prep_slave_rg (bsc#1051510).
- spi: rockchip: initialize dma_slave_config properly (bsc#1051510).
- spi: spidev: Fix OF tree warning logic (bsc#1051510).
- staging: rtl8188eu: fix null dereference when kzalloc fails (bsc#1051510).
- thunderbolt: Fix lockdep circular locking depedency warning (git-fixes).
- tpm: add check after commands attribs tab allocation (bsc#1051510).
- tracing: Get trace_array reference for available_tracers files (bsc#1156429).
- udp: use skb_queue_empty_lockless() (networking-stable-19_11_05).
- usb-serial: cp201x: support Mark-10 digital force gauge (bsc#1051510).
- usb-storage: Revert commit 747668dbc061 ('usb-storage: Set virt_boundary_mask to avoid SG overflows') (bsc#1051510).
- usb: chipidea: Fix otg event handler (bsc#1051510).
- usb: chipidea: imx: enable OTG overcurrent in case USB subsystem is already started (bsc#1051510).
- usb: dwc3: gadget: Check ENBLSLPM before sending ep command (bsc#1051510).
- usb: gadget: udc: atmel: Fix interrupt storm in FIFO mode (bsc#1051510).
- usb: gadget: udc: fotg210-udc: Fix a sleep-in-atomic-context bug in fotg210_get_status() (bsc#1051510).
- usb: gadget: uvc: Factor out video USB request queueing (bsc#1051510).
- usb: gadget: uvc: Only halt video streaming endpoint in bulk mode (bsc#1051510).
- usb: gadget: uvc: configfs: Drop leaked references to config items (bsc#1051510).
- usb: gadget: uvc: configfs: Prevent format changes after linking header (bsc#1051510).
- usb: handle warm-reset port requests on hub resume (bsc#1051510).
- usb: xhci-mtk: fix ISOC error when interval is zero (bsc#1051510).
- usbip: Fix free of unallocated memory in vhci tx (git-fixes).
- usbip: Fix vhci_urb_enqueue() URB null transfer buffer error path (git-fixes).
- usbip: Implement SG support to vhci-hcd and stub driver (git-fixes).
- usbip: tools: fix fd leakage in the function of read_attr_usbip_status (git-fixes).
- vfio-ccw: Fix misleading comment when setting orb.cmd.c64 (bsc#1051510).
- vfio-ccw: Set pa_nr to 0 if memory allocation fails for pa_iova_pfn (bsc#1051510).
- vfio: ccw: push down unsupported IDA check (bsc#1156471 LTC#182362).
- video/hdmi: Fix AVI bar unpack (git-fixes).
- virtio/s390: fix race on airq_areas (bsc#1051510).
- virtio_console: allocate inbufs in add_port() only if it is needed (git-fixes).
- virtio_ring: fix return code on DMA mapping fails (git-fixes).
- vmxnet3: turn off lro when rxcsum is disabled (bsc#1157499).
- watchdog: meson: Fix the wrong value of left time (bsc#1051510).
- x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811).
- x86/alternatives: Fix int3_emulate_call() selftest stack corruption (bsc#1153811).
- x86/mm/pkeys: Fix typo in Documentation/x86/protection-keys.txt (bsc#1078248).
- x86/pkeys: Update documentation about availability (bsc#1078248).
- x86/resctrl: Fix potential lockdep warning (bsc#1114279).
- x86/resctrl: Prevent NULL pointer dereference when reading mondata (bsc#1114279).
- x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs (bsc#1158068).
- xfrm: Fix xfrm sel prefix length validation (git-fixes).
- xfrm: fix sa selector validation (bsc#1156609).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-20"/>
	<updated date="2019-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1048942">SUSE bug 1048942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051510">SUSE bug 1051510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078248">SUSE bug 1078248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082635">SUSE bug 1082635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089644">SUSE bug 1089644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091041">SUSE bug 1091041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108043">SUSE bug 1108043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113722">SUSE bug 1113722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114279">SUSE bug 1114279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117169">SUSE bug 1117169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131107">SUSE bug 1131107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138039">SUSE bug 1138039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140948">SUSE bug 1140948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143706">SUSE bug 1143706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144333">SUSE bug 1144333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149448">SUSE bug 1149448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150466">SUSE bug 1150466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151548">SUSE bug 1151548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151900">SUSE bug 1151900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152782">SUSE bug 1152782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153628">SUSE bug 1153628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153681">SUSE bug 1153681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153811">SUSE bug 1153811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154043">SUSE bug 1154043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154058">SUSE bug 1154058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154124">SUSE bug 1154124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154355">SUSE bug 1154355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154526">SUSE bug 1154526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154956">SUSE bug 1154956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155021">SUSE bug 1155021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155689">SUSE bug 1155689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155692">SUSE bug 1155692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155836">SUSE bug 1155836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155897">SUSE bug 1155897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155921">SUSE bug 1155921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155982">SUSE bug 1155982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156187">SUSE bug 1156187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156258">SUSE bug 1156258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156429">SUSE bug 1156429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156466">SUSE bug 1156466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156471">SUSE bug 1156471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156494">SUSE bug 1156494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156609">SUSE bug 1156609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156700">SUSE bug 1156700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156729">SUSE bug 1156729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156882">SUSE bug 1156882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157038">SUSE bug 1157038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157042">SUSE bug 1157042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157070">SUSE bug 1157070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157143">SUSE bug 1157143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157145">SUSE bug 1157145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157158">SUSE bug 1157158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157162">SUSE bug 1157162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157171">SUSE bug 1157171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157173">SUSE bug 1157173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157178">SUSE bug 1157178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157180">SUSE bug 1157180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157182">SUSE bug 1157182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157183">SUSE bug 1157183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157184">SUSE bug 1157184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157191">SUSE bug 1157191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157193">SUSE bug 1157193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157197">SUSE bug 1157197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157298">SUSE bug 1157298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157307">SUSE bug 1157307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157324">SUSE bug 1157324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157333">SUSE bug 1157333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157424">SUSE bug 1157424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157463">SUSE bug 1157463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157499">SUSE bug 1157499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157678">SUSE bug 1157678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157698">SUSE bug 1157698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157778">SUSE bug 1157778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157908">SUSE bug 1157908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158049">SUSE bug 1158049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158063">SUSE bug 1158063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158064">SUSE bug 1158064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158065">SUSE bug 1158065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158066">SUSE bug 1158066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158067">SUSE bug 1158067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158068">SUSE bug 1158068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158082">SUSE bug 1158082</bugzilla>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15916/">CVE-2019-15916</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16231/">CVE-2019-16231</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17055/">CVE-2019-17055</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18660/">CVE-2019-18660</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18683/">CVE-2019-18683</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18805/">CVE-2019-18805</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18809/">CVE-2019-18809</cve>
	<cve impact="moderate" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19049/">CVE-2019-19049</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19052/">CVE-2019-19052</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19056/">CVE-2019-19056</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19057/">CVE-2019-19057</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19058/">CVE-2019-19058</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19060/">CVE-2019-19060</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19062/">CVE-2019-19062</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19063/">CVE-2019-19063</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19065/">CVE-2019-19065</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19067/">CVE-2019-19067</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19068/">CVE-2019-19068</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19073/">CVE-2019-19073</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19074/">CVE-2019-19074</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19075/">CVE-2019-19075</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19077/">CVE-2019-19077</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19227/">CVE-2019-19227</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522443" comment="kernel-default-4.12.14-95.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522444" comment="kernel-default-devel-4.12.14-95.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522445" comment="kernel-default-extra-4.12.14-95.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522446" comment="kernel-devel-4.12.14-95.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522447" comment="kernel-macros-4.12.14-95.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522448" comment="kernel-source-4.12.14-95.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522449" comment="kernel-syms-4.12.14-95.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78875" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1112758" ref_url="https://bugzilla.suse.com/1112758" source="BUGZILLA"/>
		<reference ref_id="1113029" ref_url="https://bugzilla.suse.com/1113029" source="BUGZILLA"/>
		<reference ref_id="1113660" ref_url="https://bugzilla.suse.com/1113660" source="BUGZILLA"/>
		<reference ref_id="1123371" ref_url="https://bugzilla.suse.com/1123371" source="BUGZILLA"/>
		<reference ref_id="1123377" ref_url="https://bugzilla.suse.com/1123377" source="BUGZILLA"/>
		<reference ref_id="1123378" ref_url="https://bugzilla.suse.com/1123378" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16839" ref_url="https://www.suse.com/security/cve/CVE-2018-16839/" source="CVE"/>
		<reference ref_id="CVE-2018-16840" ref_url="https://www.suse.com/security/cve/CVE-2018-16840/" source="CVE"/>
		<reference ref_id="CVE-2018-16842" ref_url="https://www.suse.com/security/cve/CVE-2018-16842/" source="CVE"/>
		<reference ref_id="CVE-2018-16890" ref_url="https://www.suse.com/security/cve/CVE-2018-16890/" source="CVE"/>
		<reference ref_id="CVE-2019-3822" ref_url="https://www.suse.com/security/cve/CVE-2019-3822/" source="CVE"/>
		<reference ref_id="CVE-2019-3823" ref_url="https://www.suse.com/security/cve/CVE-2019-3823/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005111.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issues fixed:

- CVE-2019-3822: Fixed a NTLMv2 type-3 header stack buffer overflow (bsc#1123377).
- CVE-2019-3823: Fixed an out-of-bounds read in the SMTP end-of-response (bsc#1123378).
- CVE-2018-16890: Fixed an out-of-bounds buffer read in NTLM type2 (bsc#1123371). 
- CVE-2018-16842: Fixed an out-of-bounds read in tool_msgs.c (bsc#1113660).
- CVE-2018-16840: Fixed a use-after-free in handle close  (bsc#1113029).
- CVE-2018-16839: Fixed an SASL password overflow caused by an integer overflow (bsc#1112758).

		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-13"/>
	<updated date="2019-02-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1112758">SUSE bug 1112758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113029">SUSE bug 1113029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113660">SUSE bug 1113660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123371">SUSE bug 1123371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123377">SUSE bug 1123377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123378">SUSE bug 1123378</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16839/">CVE-2018-16839</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16840/">CVE-2018-16840</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16842/">CVE-2018-16842</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16890/">CVE-2018-16890</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3822/">CVE-2019-3822</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3823/">CVE-2019-3823</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522450" comment="curl-7.60.0-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522451" comment="libcurl4-7.60.0-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522452" comment="libcurl4-32bit-7.60.0-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78876" version="1" class="patch">
	<metadata>
		<title>Security update for dia (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1158194" ref_url="https://bugzilla.suse.com/1158194" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19451" ref_url="https://www.suse.com/security/cve/CVE-2019-19451/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006289.html" source="SUSE-SU"/>
		<description>
This update for dia fixes the following issue:
  
- CVE-2019-19451: Fixed an endless loop on filenames with invalid encoding (bsc#1158194).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-27"/>
	<updated date="2019-12-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1158194">SUSE bug 1158194</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19451/">CVE-2019-19451</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522453" comment="dia-0.97.3-17.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522454" comment="dia-lang-0.97.3-17.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78877" version="1" class="patch">
	<metadata>
		<title>Security update for podofo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1027779" ref_url="https://bugzilla.suse.com/1027779" source="BUGZILLA"/>
		<reference ref_id="1032020" ref_url="https://bugzilla.suse.com/1032020" source="BUGZILLA"/>
		<reference ref_id="1032021" ref_url="https://bugzilla.suse.com/1032021" source="BUGZILLA"/>
		<reference ref_id="1032022" ref_url="https://bugzilla.suse.com/1032022" source="BUGZILLA"/>
		<reference ref_id="1075021" ref_url="https://bugzilla.suse.com/1075021" source="BUGZILLA"/>
		<reference ref_id="1075026" ref_url="https://bugzilla.suse.com/1075026" source="BUGZILLA"/>
		<reference ref_id="1075322" ref_url="https://bugzilla.suse.com/1075322" source="BUGZILLA"/>
		<reference ref_id="1075772" ref_url="https://bugzilla.suse.com/1075772" source="BUGZILLA"/>
		<reference ref_id="1076962" ref_url="https://bugzilla.suse.com/1076962" source="BUGZILLA"/>
		<reference ref_id="1096889" ref_url="https://bugzilla.suse.com/1096889" source="BUGZILLA"/>
		<reference ref_id="1096890" ref_url="https://bugzilla.suse.com/1096890" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6845" ref_url="https://www.suse.com/security/cve/CVE-2017-6845/" source="CVE"/>
		<reference ref_id="CVE-2017-7381" ref_url="https://www.suse.com/security/cve/CVE-2017-7381/" source="CVE"/>
		<reference ref_id="CVE-2017-7382" ref_url="https://www.suse.com/security/cve/CVE-2017-7382/" source="CVE"/>
		<reference ref_id="CVE-2017-7383" ref_url="https://www.suse.com/security/cve/CVE-2017-7383/" source="CVE"/>
		<reference ref_id="CVE-2017-8054" ref_url="https://www.suse.com/security/cve/CVE-2017-8054/" source="CVE"/>
		<reference ref_id="CVE-2018-11256" ref_url="https://www.suse.com/security/cve/CVE-2018-11256/" source="CVE"/>
		<reference ref_id="CVE-2018-5295" ref_url="https://www.suse.com/security/cve/CVE-2018-5295/" source="CVE"/>
		<reference ref_id="CVE-2018-5296" ref_url="https://www.suse.com/security/cve/CVE-2018-5296/" source="CVE"/>
		<reference ref_id="CVE-2018-5308" ref_url="https://www.suse.com/security/cve/CVE-2018-5308/" source="CVE"/>
		<reference ref_id="CVE-2018-5309" ref_url="https://www.suse.com/security/cve/CVE-2018-5309/" source="CVE"/>
		<reference ref_id="CVE-2018-5783" ref_url="https://www.suse.com/security/cve/CVE-2018-5783/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005117.html" source="SUSE-SU"/>
		<description>
This update for podofo fixes the following issues:

These security issues were fixed:

- CVE-2017-6845: The PoDoFo::PdfColor::operator function allowed remote
  attackers to cause a denial of service (NULL pointer dereference) via a crafted
  file (bsc#1027779).
- CVE-2018-5308: Properly validate memcpy arguments in the
  PdfMemoryOutputStream::Write function to prevent remote attackers from causing
  a denial-of-service or possibly have unspecified other impact via a crafted pdf
  file (bsc#1075772)
- CVE-2018-5295: Prevent integer overflow in the
  PdfXRefStreamParserObject::ParseStream function that allowed remote attackers
  to cause a denial-of-service via a crafted pdf file (bsc#1075026).
- CVE-2017-6845: The PoDoFo::PdfColor::operator function allowed remote
  attackers to cause a denial of service (NULL pointer dereference) via a crafted
  file (bsc#1027779).
- CVE-2018-5309: Prevent integer overflow in the
  PdfObjectStreamParserObject::ReadObjectsFromStream function that allowed remote
  attackers to cause a denial-of-service via a crafted pdf file (bsc#1075322).
- CVE-2018-5296: Prevent uncontrolled memory allocation in the
  PdfParser::ReadXRefSubsection function that allowed remote attackers to cause a
  denial-of-service via a crafted pdf file (bsc#1075021).
- CVE-2017-7381: Prevent NULL pointer dereference that allowed remote attackers
  to cause a denial of service via a crafted PDF document (bsc#1032020).
- CVE-2017-7382: Prevent NULL pointer dereference that allowed remote attackers
  to cause a denial of service via a crafted PDF document (bsc#1032021).
- CVE-2017-7383: Prevent NULL pointer dereference that allowed remote attackers
  to cause a denial of service via a crafted PDF document (bsc#1032022).
- CVE-2018-11256: Prevent NULL pointer dereference that allowed remote
  attackers to cause a denial of service via a crafted PDF document
  (bsc#1096889).
- CVE-2018-5783: Prevent uncontrolled memory allocation in the
  PoDoFo::PdfVecObjects::Reserve function that allowed remote attackers to cause
  a denial of service via a crafted pdf file (bsc#1076962).

These non-security issues were fixed:

- Prevent regression caused by the fix for CVE-2017-8054.
- Prevent NULL dereferences when 'Kids' array is missing (bsc#1096890)
- Added to detect cycles and recursions in XRef tables
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-14"/>
	<updated date="2019-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027779">SUSE bug 1027779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032020">SUSE bug 1032020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032021">SUSE bug 1032021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032022">SUSE bug 1032022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075021">SUSE bug 1075021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075026">SUSE bug 1075026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075322">SUSE bug 1075322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075772">SUSE bug 1075772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076962">SUSE bug 1076962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096889">SUSE bug 1096889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096890">SUSE bug 1096890</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6845/">CVE-2017-6845</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7381/">CVE-2017-7381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7382/">CVE-2017-7382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7383/">CVE-2017-7383</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8054/">CVE-2017-8054</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11256/">CVE-2018-11256</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5295/">CVE-2018-5295</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5296/">CVE-2018-5296</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5308/">CVE-2018-5308</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5309/">CVE-2018-5309</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5783/">CVE-2018-5783</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521619" comment="libpodofo0_9_2-0.9.2-3.6.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78878" version="1" class="patch">
	<metadata>
		<title>Security update for python-numpy (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1122208" ref_url="https://bugzilla.suse.com/1122208" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6446" ref_url="https://www.suse.com/security/cve/CVE-2019-6446/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005128.html" source="SUSE-SU"/>
		<description>
This update for python-numpy fixes the following issue:

Security issue fixed:

- CVE-2019-6446: Set allow_pickle to false by default to restrict loading untrusted content (bsc#1122208).
  With this update we decrease the possibility of allowing remote attackers to execute arbitrary code by
  misusing numpy.load(). A warning during runtime will show-up when the allow_pickle is not explicitly set.  

NOTE: By applying this update the behavior of python-numpy changes, which might break your application.
In order to get the old behaviour back, you have to explicitly set `allow_pickle` to True. Be aware
that this should only be done for trusted input, as loading untrusted input might lead to arbitrary code
execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-18"/>
	<updated date="2019-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122208">SUSE bug 1122208</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6446/">CVE-2019-6446</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521620" comment="python-numpy-1.8.0-5.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78879" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1111498" ref_url="https://bugzilla.suse.com/1111498" source="BUGZILLA"/>
		<reference ref_id="1117025" ref_url="https://bugzilla.suse.com/1117025" source="BUGZILLA"/>
		<reference ref_id="1117382" ref_url="https://bugzilla.suse.com/1117382" source="BUGZILLA"/>
		<reference ref_id="1120658" ref_url="https://bugzilla.suse.com/1120658" source="BUGZILLA"/>
		<reference ref_id="1122000" ref_url="https://bugzilla.suse.com/1122000" source="BUGZILLA"/>
		<reference ref_id="1122344" ref_url="https://bugzilla.suse.com/1122344" source="BUGZILLA"/>
		<reference ref_id="1123333" ref_url="https://bugzilla.suse.com/1123333" source="BUGZILLA"/>
		<reference ref_id="1123892" ref_url="https://bugzilla.suse.com/1123892" source="BUGZILLA"/>
		<reference ref_id="1125352" ref_url="https://bugzilla.suse.com/1125352" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6454" ref_url="https://www.suse.com/security/cve/CVE-2019-6454/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005135.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

Security vulnerability fixed:

- CVE-2019-6454: Fixed a crash of PID1 by sending specially crafted D-BUS
  message on the system bus by an unprivileged user (bsc#1125352)

Other bug fixes and changes:

- journal-remote: set a limit on the number of fields in a message
- journal-remote: verify entry length from header
- journald: set a limit on the number of fields (1k)
- journald: do not store the iovec entry for process commandline on stack
- core: include Found state in device dumps
- device: fix serialization and deserialization of DeviceFound
- fix path in btrfs rule (#6844)
- assemble multidevice btrfs volumes without external tools (#6607) (bsc#1117025)
- Update systemd-system.conf.xml (bsc#1122000)
- units: inform user that the default target is started after exiting from rescue or emergency mode
- manager: don't skip sigchld handler for main and control pid for services (#3738)
- core: Add helper functions unit_{main, control}_pid
- manager: Fixing a debug printf formatting mistake (#3640)
- manager: Only invoke a single sigchld per unit within a cleanup cycle (bsc#1117382)
- core: update invoke_sigchld_event() to handle NULL -&gt;sigchld_event()
- sd-event: expose the event loop iteration counter via sd_event_get_iteration() (#3631)
- unit: rework a bit how we keep the service fdstore from being destroyed during service restart (bsc#1122344)
- core: when restarting services, don't close fds
- cryptsetup: Add dependency on loopback setup to generated units
- journal-gateway: use localStorage['cursor'] only when it has valid value
- journal-gateway: explicitly declare local variables
- analyze: actually select longest activated-time of services
- sd-bus: fix implicit downcast of bitfield reported by LGTM
- core: free lines after reading them (bsc#1123892)
- pam_systemd: reword message about not creating a session (bsc#1111498)
- pam_systemd: suppress LOG_DEBUG log messages if debugging is off (bsc#1111498)
- main: improve RLIMIT_NOFILE handling (#5795) (bsc#1120658)
- sd-bus: if we receive an invalid dbus message, ignore and proceeed
- automount: don't pass non-blocking pipe to kernel.
- units: make sure initrd-cleanup.service terminates before switching to rootfs (bsc#1123333)
- units: add Wants=initrd-cleanup.service to initrd-switch-root.target (#4345) (bsc#1123333)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-19"/>
	<updated date="2019-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111498">SUSE bug 1111498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117025">SUSE bug 1117025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117382">SUSE bug 1117382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120658">SUSE bug 1120658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122000">SUSE bug 1122000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122344">SUSE bug 1122344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123333">SUSE bug 1123333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123892">SUSE bug 1123892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125352">SUSE bug 1125352</bugzilla>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6454/">CVE-2019-6454</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521621" comment="libsystemd0-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521622" comment="libsystemd0-32bit-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521623" comment="libudev1-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521624" comment="libudev1-32bit-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521625" comment="systemd-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521626" comment="systemd-32bit-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521627" comment="systemd-bash-completion-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521628" comment="systemd-sysvinit-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521629" comment="udev-228-150.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78880" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1063993" ref_url="https://bugzilla.suse.com/1063993" source="BUGZILLA"/>
		<reference ref_id="1079730" ref_url="https://bugzilla.suse.com/1079730" source="BUGZILLA"/>
		<reference ref_id="1100408" ref_url="https://bugzilla.suse.com/1100408" source="BUGZILLA"/>
		<reference ref_id="1101982" ref_url="https://bugzilla.suse.com/1101982" source="BUGZILLA"/>
		<reference ref_id="1112646" ref_url="https://bugzilla.suse.com/1112646" source="BUGZILLA"/>
		<reference ref_id="1114957" ref_url="https://bugzilla.suse.com/1114957" source="BUGZILLA"/>
		<reference ref_id="1116717" ref_url="https://bugzilla.suse.com/1116717" source="BUGZILLA"/>
		<reference ref_id="1117275" ref_url="https://bugzilla.suse.com/1117275" source="BUGZILLA"/>
		<reference ref_id="1119493" ref_url="https://bugzilla.suse.com/1119493" source="BUGZILLA"/>
		<reference ref_id="1121600" ref_url="https://bugzilla.suse.com/1121600" source="BUGZILLA"/>
		<reference ref_id="1123156" ref_url="https://bugzilla.suse.com/1123156" source="BUGZILLA"/>
		<reference ref_id="1123179" ref_url="https://bugzilla.suse.com/1123179" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16872" ref_url="https://www.suse.com/security/cve/CVE-2018-16872/" source="CVE"/>
		<reference ref_id="CVE-2018-18954" ref_url="https://www.suse.com/security/cve/CVE-2018-18954/" source="CVE"/>
		<reference ref_id="CVE-2018-19364" ref_url="https://www.suse.com/security/cve/CVE-2018-19364/" source="CVE"/>
		<reference ref_id="CVE-2018-19489" ref_url="https://www.suse.com/security/cve/CVE-2018-19489/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005136.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2019-6778: Fixed a heap buffer overflow issue in the SLiRP networking implementation (bsc#1123156).
- CVE-2018-16872: Fixed a host security vulnerability related to handling symlinks in usb-mtp (bsc#1119493).
- CVE-2018-19489: Fixed a denial of service vulnerability in virtfs (bsc#1117275).
- CVE-2018-19364: Fixed a use-after-free if the virtfs interface resulting in a denial of service (bsc#1116717).
- CVE-2018-18954: Fixed a denial of service vulnerability related to PowerPC PowerNV memory operations (bsc#1114957).

Non-security issues fixed:

- Improved disk performance for qemu on xen (bsc#1100408).
- Fixed xen offline migration (bsc#1079730, bsc#1101982, bsc#1063993).
- Fixed pwrite64/pread64/write to return 0 over -1 for a zero length NULL buffer in qemu (bsc#1121600).
- Use /bin/bash to echo value into sys fs for ksm control (bsc#1112646).
- Return specification exception for unimplemented diag 308 subcodes rather than a hardware error (bsc#1123179).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-19"/>
	<updated date="2019-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1063993">SUSE bug 1063993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079730">SUSE bug 1079730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100408">SUSE bug 1100408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101982">SUSE bug 1101982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112646">SUSE bug 1112646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114957">SUSE bug 1114957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116717">SUSE bug 1116717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117275">SUSE bug 1117275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119493">SUSE bug 1119493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121600">SUSE bug 1121600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123179">SUSE bug 1123179</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16872/">CVE-2018-16872</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18954/">CVE-2018-18954</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19364/">CVE-2018-19364</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19489/">CVE-2018-19489</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522455" comment="qemu-2.11.2-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522456" comment="qemu-block-curl-2.11.2-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522457" comment="qemu-ipxe-1.0.0+-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522458" comment="qemu-kvm-2.11.2-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522459" comment="qemu-seabios-1.11.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522460" comment="qemu-sgabios-8-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522461" comment="qemu-tools-2.11.2-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522462" comment="qemu-vgabios-1.11.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522463" comment="qemu-x86-2.11.2-5.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78881" version="1" class="patch">
	<metadata>
		<title>Security update for procps (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1092100" ref_url="https://bugzilla.suse.com/1092100" source="BUGZILLA"/>
		<reference ref_id="1121753" ref_url="https://bugzilla.suse.com/1121753" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1122" ref_url="https://www.suse.com/security/cve/CVE-2018-1122/" source="CVE"/>
		<reference ref_id="CVE-2018-1123" ref_url="https://www.suse.com/security/cve/CVE-2018-1123/" source="CVE"/>
		<reference ref_id="CVE-2018-1124" ref_url="https://www.suse.com/security/cve/CVE-2018-1124/" source="CVE"/>
		<reference ref_id="CVE-2018-1125" ref_url="https://www.suse.com/security/cve/CVE-2018-1125/" source="CVE"/>
		<reference ref_id="CVE-2018-1126" ref_url="https://www.suse.com/security/cve/CVE-2018-1126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005142.html" source="SUSE-SU"/>
		<description>

  
This update for procps fixes the following security issues:

- CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top
  with HOME unset in an attacker-controlled directory, the attacker could have
  achieved privilege escalation by exploiting one of several vulnerabilities in
  the config_file() function (bsc#1092100).
- CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow.
  Inbuilt protection in ps maped a guard page at the end of the overflowed
  buffer, ensuring that the impact of this flaw is limited to a crash (temporary
  denial of service) (bsc#1092100).
- CVE-2018-1124: Prevent multiple integer overflows leading to a heap
  corruption in file2strvec function. This allowed a privilege escalation for a
  local attacker who can create entries in procfs by starting processes, which
  could result in crashes or arbitrary code execution in proc utilities run by
  other users (bsc#1092100).
- CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was
  mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).
- CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent
  truncation/integer overflow issues (bsc#1092100).

(These issues were previously released for SUSE Linux Enterprise 12 SP3 and SP4.)

Also the following non-security issue was fixed:

- Fix CPU summary showing old data. (bsc#1121753)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-20"/>
	<updated date="2019-02-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121753">SUSE bug 1121753</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1122/">CVE-2018-1122</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1123/">CVE-2018-1123</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1124/">CVE-2018-1124</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1125/">CVE-2018-1125</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1126/">CVE-2018-1126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521630" comment="libprocps3-3.3.9-11.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521631" comment="procps-3.3.9-11.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78882" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1073748" ref_url="https://bugzilla.suse.com/1073748" source="BUGZILLA"/>
		<reference ref_id="1109847" ref_url="https://bugzilla.suse.com/1109847" source="BUGZILLA"/>
		<reference ref_id="1122191" ref_url="https://bugzilla.suse.com/1122191" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005150.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

Security issues fixed:

- CVE-2019-5010: Fixed a denial-of-service vulnerability in the X509 certificate parser (bsc#1122191).
- CVE-2018-14647: Fixed a denial-of-service vulnerability in Expat (bsc#1109847).

Non-security issue fixed:

- Fixed a bug where PyWeakReference struct was not initialized correctly leading to a crash (bsc#1073748).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-25"/>
	<updated date="2019-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1073748">SUSE bug 1073748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521634" comment="libpython2_7-1_0-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521635" comment="libpython2_7-1_0-32bit-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521636" comment="python-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521637" comment="python-base-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521638" comment="python-curses-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521639" comment="python-devel-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521640" comment="python-tk-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521641" comment="python-xml-2.7.13-28.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78883" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1101644" ref_url="https://bugzilla.suse.com/1101644" source="BUGZILLA"/>
		<reference ref_id="1101645" ref_url="https://bugzilla.suse.com/1101645" source="BUGZILLA"/>
		<reference ref_id="1101651" ref_url="https://bugzilla.suse.com/1101651" source="BUGZILLA"/>
		<reference ref_id="1101656" ref_url="https://bugzilla.suse.com/1101656" source="BUGZILLA"/>
		<reference ref_id="1112142" ref_url="https://bugzilla.suse.com/1112142" source="BUGZILLA"/>
		<reference ref_id="1112143" ref_url="https://bugzilla.suse.com/1112143" source="BUGZILLA"/>
		<reference ref_id="1112144" ref_url="https://bugzilla.suse.com/1112144" source="BUGZILLA"/>
		<reference ref_id="1112146" ref_url="https://bugzilla.suse.com/1112146" source="BUGZILLA"/>
		<reference ref_id="1112147" ref_url="https://bugzilla.suse.com/1112147" source="BUGZILLA"/>
		<reference ref_id="1112152" ref_url="https://bugzilla.suse.com/1112152" source="BUGZILLA"/>
		<reference ref_id="1112153" ref_url="https://bugzilla.suse.com/1112153" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-16435" ref_url="https://www.suse.com/security/cve/CVE-2018-16435/" source="CVE"/>
		<reference ref_id="CVE-2018-2938" ref_url="https://www.suse.com/security/cve/CVE-2018-2938/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk to version 7u201 fixes the following issues:

Security issues fixed:

- CVE-2018-3136: Manifest better support (bsc#1112142)
- CVE-2018-3139: Better HTTP Redirection (bsc#1112143)
- CVE-2018-3149: Enhance JNDI lookups (bsc#1112144)
- CVE-2018-3169: Improve field accesses (bsc#1112146)
- CVE-2018-3180: Improve TLS connections stability (bsc#1112147)
- CVE-2018-3214: Better RIFF reading support (bsc#1112152)
- CVE-2018-13785: Upgrade JDK 8u to libpng 1.6.35 (bsc#1112153)
- CVE-2018-16435: heap-based buffer overflow in SetData function in cmsIT8LoadFromFile
- CVE-2018-2938: Support Derby connections (bsc#1101644)
- CVE-2018-2940: Better stack walking (bsc#1101645)
- CVE-2018-2952: Exception to Pattern Syntax (bsc#1101651)
- CVE-2018-2973: Improve LDAP support (bsc#1101656)
- CVE-2018-3639 cpu speculative store bypass mitigation
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-09"/>
	<updated date="2019-01-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101644">SUSE bug 1101644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101651">SUSE bug 1101651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112147">SUSE bug 1112147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112153">SUSE bug 1112153</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16435/">CVE-2018-16435</cve>
	<cve impact="low" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2938/">CVE-2018-2938</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78884" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1111177" ref_url="https://bugzilla.suse.com/1111177" source="BUGZILLA"/>
		<reference ref_id="1113246" ref_url="https://bugzilla.suse.com/1113246" source="BUGZILLA"/>
		<reference ref_id="1114710" ref_url="https://bugzilla.suse.com/1114710" source="BUGZILLA"/>
		<reference ref_id="1121567" ref_url="https://bugzilla.suse.com/1121567" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14662" ref_url="https://www.suse.com/security/cve/CVE-2018-14662/" source="CVE"/>
		<reference ref_id="CVE-2018-16846" ref_url="https://www.suse.com/security/cve/CVE-2018-16846/" source="CVE"/>
		<reference ref_id="CVE-2018-16889" ref_url="https://www.suse.com/security/cve/CVE-2018-16889/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005154.html" source="SUSE-SU"/>
		<description>
This update for ceph fixes the following issues:

Security issues fixed:

- CVE-2018-14662: mon: limit caps allowed to access the config store (bsc#1111177)
- CVE-2018-16846: rgw: enforce bounds on max-keys/max-uploads/max-parts (bsc#1114710)
- CVE-2018-16889: rgw: sanitize customer encryption keys from log output in v4 auth (bsc#1121567)

Non-security issue fixed:

- os/bluestore: avoid frequent allocator dump on bluefs rebalance failure (bsc#1113246)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-26"/>
	<updated date="2019-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111177">SUSE bug 1111177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113246">SUSE bug 1113246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114710">SUSE bug 1114710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121567">SUSE bug 1121567</bugzilla>
	<cve impact="low" cvss3="1.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-14662/">CVE-2018-14662</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16846/">CVE-2018-16846</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16889/">CVE-2018-16889</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521644" comment="ceph-common-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521645" comment="libcephfs2-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521646" comment="librados2-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521647" comment="libradosstriper1-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521648" comment="librbd1-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521649" comment="librgw2-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521650" comment="python-cephfs-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521651" comment="python-rados-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521652" comment="python-rbd-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521653" comment="python-rgw-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78885" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1124937" ref_url="https://bugzilla.suse.com/1124937" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6212" ref_url="https://www.suse.com/security/cve/CVE-2019-6212/" source="CVE"/>
		<reference ref_id="CVE-2019-6215" ref_url="https://www.suse.com/security/cve/CVE-2019-6215/" source="CVE"/>
		<reference ref_id="CVE-2019-6216" ref_url="https://www.suse.com/security/cve/CVE-2019-6216/" source="CVE"/>
		<reference ref_id="CVE-2019-6217" ref_url="https://www.suse.com/security/cve/CVE-2019-6217/" source="CVE"/>
		<reference ref_id="CVE-2019-6226" ref_url="https://www.suse.com/security/cve/CVE-2019-6226/" source="CVE"/>
		<reference ref_id="CVE-2019-6227" ref_url="https://www.suse.com/security/cve/CVE-2019-6227/" source="CVE"/>
		<reference ref_id="CVE-2019-6229" ref_url="https://www.suse.com/security/cve/CVE-2019-6229/" source="CVE"/>
		<reference ref_id="CVE-2019-6233" ref_url="https://www.suse.com/security/cve/CVE-2019-6233/" source="CVE"/>
		<reference ref_id="CVE-2019-6234" ref_url="https://www.suse.com/security/cve/CVE-2019-6234/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005162.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.22.6 fixes the following issues:

Security issues fixed:

- CVE-2019-6212: Fixed multiple memory corruption vulnerabilities which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6215: Fixed a type confusion vulnerability which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6216: Fixed multiple memory corruption vulnerabilities which could allow arbitrary code execution during the processing
  of special crafted web-content. 
- CVE-2019-6217: Fixed multiple memory corruption vulnerabilities which could allow arbitrary code execution during the processing
  of special crafted web-content. 
- CVE-2019-6226: Fixed multiple memory corruption vulnerabilities which could allow arbitrary code execution during the processing
  of special crafted web-content.  
- CVE-2019-6227: Fixed a memory corruption vulnerability which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6229: Fixed a logic issue by improving validation which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6233: Fixed a memory corruption vulnerability which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6234: Fixed a memory corruption vulnerability which could allow arbitrary code execution during the processing
  of special crafted web-content.

Other issues addressed:   
- Update to version 2.22.6 (bsc#1124937).
- Kinetic scrolling slow down smoothly when reaching the ends of pages, instead of abruptly, to better match the GTK+ behaviour.
- Fixed Web inspector magnifier under Wayland.
- Fixed garbled rendering of some websites (e.g. YouTube) while scrolling under X11.
- Fixed several crashes, race conditions, and rendering issues.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-28"/>
	<updated date="2019-02-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1124937">SUSE bug 1124937</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6212/">CVE-2019-6212</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6215/">CVE-2019-6215</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6216/">CVE-2019-6216</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6217/">CVE-2019-6217</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6226/">CVE-2019-6226</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6227/">CVE-2019-6227</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6229/">CVE-2019-6229</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6233/">CVE-2019-6233</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6234/">CVE-2019-6234</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521654" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521655" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521657" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521658" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521659" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78886" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2019:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005163.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:

- The 9 Lives of Bleichenbacher's CAT: Cache ATtacks on TLS Implementations (bsc#1117951)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-28"/>
	<updated date="2019-02-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522464" comment="libopenssl1_1-1.1.1-2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522465" comment="libopenssl1_1-32bit-1.1.1-2.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78887" version="1" class="patch">
	<metadata>
		<title>Security update for sssd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1004220" ref_url="https://bugzilla.suse.com/1004220" source="BUGZILLA"/>
		<reference ref_id="1087320" ref_url="https://bugzilla.suse.com/1087320" source="BUGZILLA"/>
		<reference ref_id="1098377" ref_url="https://bugzilla.suse.com/1098377" source="BUGZILLA"/>
		<reference ref_id="1120852" ref_url="https://bugzilla.suse.com/1120852" source="BUGZILLA"/>
		<reference ref_id="1121759" ref_url="https://bugzilla.suse.com/1121759" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10852" ref_url="https://www.suse.com/security/cve/CVE-2018-10852/" source="CVE"/>
		<reference ref_id="CVE-2019-3811" ref_url="https://www.suse.com/security/cve/CVE-2019-3811/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0556-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190556-1.html" source="SUSE-SU"/>
		<description>
This update for sssd fixes the following issues:

Security vulnerabilities addressed:

- Fix fallback_homedir returning '/' for empty home directories
  (CVE-2019-3811) (bsc#1121759)
- Create sockets with right permissions (bsc#1098377, CVE-2018-10852)

Other bug fixes and changes:

- Install logrotate configuration (bsc#1004220)
- Strip whitespaces in netgroup triples (bsc#1087320)
- Align systemd service file with upstream
  * Run interactive and change service type to notify (bsc#1120852)
  * Replace deprecated '-f' and use '--logger'
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-06"/>
	<updated date="2019-03-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1004220">SUSE bug 1004220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087320">SUSE bug 1087320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098377">SUSE bug 1098377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120852">SUSE bug 1120852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121759">SUSE bug 1121759</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10852/">CVE-2018-10852</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3811/">CVE-2019-3811</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522466" comment="libipa_hbac0-1.16.1-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522467" comment="libsss_certmap0-1.16.1-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522468" comment="libsss_idmap0-1.16.1-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522469" comment="libsss_nss_idmap0-1.16.1-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522470" comment="libsss_simpleifp0-1.16.1-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522471" comment="python-sssd-config-1.16.1-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522472" comment="sssd-1.16.1-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522473" comment="sssd-32bit-1.16.1-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522474" comment="sssd-ad-1.16.1-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522475" comment="sssd-ipa-1.16.1-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522476" comment="sssd-krb5-1.16.1-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522477" comment="sssd-krb5-common-1.16.1-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522478" comment="sssd-ldap-1.16.1-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522479" comment="sssd-proxy-1.16.1-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522480" comment="sssd-tools-1.16.1-4.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78888" version="1" class="patch">
	<metadata>
		<title>Security update for audit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1042781" ref_url="https://bugzilla.suse.com/1042781" source="BUGZILLA"/>
		<reference ref_id="1085003" ref_url="https://bugzilla.suse.com/1085003" source="BUGZILLA"/>
		<reference ref_id="1125535" ref_url="https://bugzilla.suse.com/1125535" source="BUGZILLA"/>
		<reference ref_id="941922" ref_url="https://bugzilla.suse.com/941922" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5186" ref_url="https://www.suse.com/security/cve/CVE-2015-5186/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0563-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190563-1.html" source="SUSE-SU"/>
		<description>

This update for audit fixes the following issues:

Audit on SUSE Linux Enterprise 12 SP4 was updated to 2.8.1 to bring
new features and bugfixes.  (bsc#1125535 FATE#326346)

* Many features were added to auparse_normalize
* cli option added to auditd and audispd for setting config dir
* In auditd, restore the umask after creating a log file
* Option added to auditd for skipping email verification

The full changelog can be found here: http://people.redhat.com/sgrubb/audit/ChangeLog


- Change openldap dependency to client only (bsc#1085003)

Minor security issue fixed:

- CVE-2015-5186: Audit: log terminal emulator escape sequences handling (bsc#941922)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-06"/>
	<updated date="2019-03-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042781">SUSE bug 1042781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085003">SUSE bug 1085003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125535">SUSE bug 1125535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941922">SUSE bug 941922</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5186/">CVE-2015-5186</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522481" comment="audit-2.8.1-10.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522482" comment="libaudit1-2.8.1-10.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522483" comment="libaudit1-32bit-2.8.1-10.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522484" comment="libauparse0-2.8.1-10.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78889" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1112142" ref_url="https://bugzilla.suse.com/1112142" source="BUGZILLA"/>
		<reference ref_id="1112143" ref_url="https://bugzilla.suse.com/1112143" source="BUGZILLA"/>
		<reference ref_id="1112144" ref_url="https://bugzilla.suse.com/1112144" source="BUGZILLA"/>
		<reference ref_id="1112146" ref_url="https://bugzilla.suse.com/1112146" source="BUGZILLA"/>
		<reference ref_id="1112147" ref_url="https://bugzilla.suse.com/1112147" source="BUGZILLA"/>
		<reference ref_id="1112148" ref_url="https://bugzilla.suse.com/1112148" source="BUGZILLA"/>
		<reference ref_id="1112152" ref_url="https://bugzilla.suse.com/1112152" source="BUGZILLA"/>
		<reference ref_id="1112153" ref_url="https://bugzilla.suse.com/1112153" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-16435" ref_url="https://www.suse.com/security/cve/CVE-2018-16435/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3183" ref_url="https://www.suse.com/security/cve/CVE-2018-3183/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version 8u191 fixes the following issues:

Security issues fixed:

- CVE-2018-3136: Manifest better support (bsc#1112142)
- CVE-2018-3139: Better HTTP Redirection (bsc#1112143)
- CVE-2018-3149: Enhance JNDI lookups (bsc#1112144)
- CVE-2018-3169: Improve field accesses (bsc#1112146)
- CVE-2018-3180: Improve TLS connections stability (bsc#1112147)
- CVE-2018-3214: Better RIFF reading support (bsc#1112152)
- CVE-2018-13785: Upgrade JDK 8u to libpng 1.6.35 (bsc#1112153)
- CVE-2018-3183: Improve script engine support (bsc#1112148)
- CVE-2018-16435: heap-based buffer overflow in SetData function in cmsIT8LoadFromFile
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-10"/>
	<updated date="2019-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112147">SUSE bug 1112147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112153">SUSE bug 1112153</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16435/">CVE-2018-16435</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180</cve>
	<cve impact="moderate" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3183/">CVE-2018-3183</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521667" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521668" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78890" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_0_0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1127080" ref_url="https://bugzilla.suse.com/1127080" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1559" ref_url="https://www.suse.com/security/cve/CVE-2019-1559/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005177.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_0_0 fixes the following issues:

Security issues fixed: 

- The 9 Lives of Bleichenbacher's CAT: Cache Attacks on TLS Implementations (bsc#1117951)
- CVE-2019-1559: Fixed OpenSSL 0-byte Record Padding Oracle which under certain circumstances
  a TLS server can be forced to respond differently to a client and lead to the decryption of the data (bsc#1127080).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-08"/>
	<updated date="2019-03-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127080">SUSE bug 1127080</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1559/">CVE-2019-1559</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522485" comment="libopenssl-1_0_0-devel-1.0.2p-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522486" comment="libopenssl1_0_0-1.0.2p-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522487" comment="libopenssl1_0_0-32bit-1.0.2p-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522488" comment="openssl-1_0_0-1.0.2p-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78891" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1127820" ref_url="https://bugzilla.suse.com/1127820" source="BUGZILLA"/>
		<reference ref_id="1127821" ref_url="https://bugzilla.suse.com/1127821" source="BUGZILLA"/>
		<reference ref_id="1127822" ref_url="https://bugzilla.suse.com/1127822" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12178" ref_url="https://www.suse.com/security/cve/CVE-2018-12178/" source="CVE"/>
		<reference ref_id="CVE-2018-12180" ref_url="https://www.suse.com/security/cve/CVE-2018-12180/" source="CVE"/>
		<reference ref_id="CVE-2018-3630" ref_url="https://www.suse.com/security/cve/CVE-2018-3630/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005183.html" source="SUSE-SU"/>
		<description>
This update for ovmf fixes the following issues:

Security issues fixed: 

- CVE-2018-12180: Fixed a buffer overflow in BlockIo service, which could lead 
  to memory read/write overrun (bsc#1127820).
- CVE-2018-12178: Fixed an improper DNS check upon receiving a new DNS packet (bsc#1127821).
- CVE-2018-3630: Fixed a logic error in FV parsing which could allow a local attacker to 
  bypass the chain of trust checks (bsc#1127822).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-11"/>
	<updated date="2019-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1127820">SUSE bug 1127820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127821">SUSE bug 1127821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127822">SUSE bug 1127822</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-12178/">CVE-2018-12178</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12180/">CVE-2018-12180</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3630/">CVE-2018-3630</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522489" comment="qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.8.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78892" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1110279" ref_url="https://bugzilla.suse.com/1110279" source="BUGZILLA"/>
		<reference ref_id="1116998" ref_url="https://bugzilla.suse.com/1116998" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-4191" ref_url="https://www.suse.com/security/cve/CVE-2018-4191/" source="CVE"/>
		<reference ref_id="CVE-2018-4197" ref_url="https://www.suse.com/security/cve/CVE-2018-4197/" source="CVE"/>
		<reference ref_id="CVE-2018-4207" ref_url="https://www.suse.com/security/cve/CVE-2018-4207/" source="CVE"/>
		<reference ref_id="CVE-2018-4208" ref_url="https://www.suse.com/security/cve/CVE-2018-4208/" source="CVE"/>
		<reference ref_id="CVE-2018-4209" ref_url="https://www.suse.com/security/cve/CVE-2018-4209/" source="CVE"/>
		<reference ref_id="CVE-2018-4210" ref_url="https://www.suse.com/security/cve/CVE-2018-4210/" source="CVE"/>
		<reference ref_id="CVE-2018-4212" ref_url="https://www.suse.com/security/cve/CVE-2018-4212/" source="CVE"/>
		<reference ref_id="CVE-2018-4213" ref_url="https://www.suse.com/security/cve/CVE-2018-4213/" source="CVE"/>
		<reference ref_id="CVE-2018-4261" ref_url="https://www.suse.com/security/cve/CVE-2018-4261/" source="CVE"/>
		<reference ref_id="CVE-2018-4262" ref_url="https://www.suse.com/security/cve/CVE-2018-4262/" source="CVE"/>
		<reference ref_id="CVE-2018-4263" ref_url="https://www.suse.com/security/cve/CVE-2018-4263/" source="CVE"/>
		<reference ref_id="CVE-2018-4264" ref_url="https://www.suse.com/security/cve/CVE-2018-4264/" source="CVE"/>
		<reference ref_id="CVE-2018-4265" ref_url="https://www.suse.com/security/cve/CVE-2018-4265/" source="CVE"/>
		<reference ref_id="CVE-2018-4266" ref_url="https://www.suse.com/security/cve/CVE-2018-4266/" source="CVE"/>
		<reference ref_id="CVE-2018-4267" ref_url="https://www.suse.com/security/cve/CVE-2018-4267/" source="CVE"/>
		<reference ref_id="CVE-2018-4270" ref_url="https://www.suse.com/security/cve/CVE-2018-4270/" source="CVE"/>
		<reference ref_id="CVE-2018-4272" ref_url="https://www.suse.com/security/cve/CVE-2018-4272/" source="CVE"/>
		<reference ref_id="CVE-2018-4273" ref_url="https://www.suse.com/security/cve/CVE-2018-4273/" source="CVE"/>
		<reference ref_id="CVE-2018-4278" ref_url="https://www.suse.com/security/cve/CVE-2018-4278/" source="CVE"/>
		<reference ref_id="CVE-2018-4284" ref_url="https://www.suse.com/security/cve/CVE-2018-4284/" source="CVE"/>
		<reference ref_id="CVE-2018-4299" ref_url="https://www.suse.com/security/cve/CVE-2018-4299/" source="CVE"/>
		<reference ref_id="CVE-2018-4306" ref_url="https://www.suse.com/security/cve/CVE-2018-4306/" source="CVE"/>
		<reference ref_id="CVE-2018-4309" ref_url="https://www.suse.com/security/cve/CVE-2018-4309/" source="CVE"/>
		<reference ref_id="CVE-2018-4312" ref_url="https://www.suse.com/security/cve/CVE-2018-4312/" source="CVE"/>
		<reference ref_id="CVE-2018-4314" ref_url="https://www.suse.com/security/cve/CVE-2018-4314/" source="CVE"/>
		<reference ref_id="CVE-2018-4315" ref_url="https://www.suse.com/security/cve/CVE-2018-4315/" source="CVE"/>
		<reference ref_id="CVE-2018-4316" ref_url="https://www.suse.com/security/cve/CVE-2018-4316/" source="CVE"/>
		<reference ref_id="CVE-2018-4317" ref_url="https://www.suse.com/security/cve/CVE-2018-4317/" source="CVE"/>
		<reference ref_id="CVE-2018-4318" ref_url="https://www.suse.com/security/cve/CVE-2018-4318/" source="CVE"/>
		<reference ref_id="CVE-2018-4319" ref_url="https://www.suse.com/security/cve/CVE-2018-4319/" source="CVE"/>
		<reference ref_id="CVE-2018-4323" ref_url="https://www.suse.com/security/cve/CVE-2018-4323/" source="CVE"/>
		<reference ref_id="CVE-2018-4328" ref_url="https://www.suse.com/security/cve/CVE-2018-4328/" source="CVE"/>
		<reference ref_id="CVE-2018-4345" ref_url="https://www.suse.com/security/cve/CVE-2018-4345/" source="CVE"/>
		<reference ref_id="CVE-2018-4358" ref_url="https://www.suse.com/security/cve/CVE-2018-4358/" source="CVE"/>
		<reference ref_id="CVE-2018-4359" ref_url="https://www.suse.com/security/cve/CVE-2018-4359/" source="CVE"/>
		<reference ref_id="CVE-2018-4361" ref_url="https://www.suse.com/security/cve/CVE-2018-4361/" source="CVE"/>
		<reference ref_id="CVE-2018-4372" ref_url="https://www.suse.com/security/cve/CVE-2018-4372/" source="CVE"/>
		<reference ref_id="CVE-2018-4373" ref_url="https://www.suse.com/security/cve/CVE-2018-4373/" source="CVE"/>
		<reference ref_id="CVE-2018-4375" ref_url="https://www.suse.com/security/cve/CVE-2018-4375/" source="CVE"/>
		<reference ref_id="CVE-2018-4376" ref_url="https://www.suse.com/security/cve/CVE-2018-4376/" source="CVE"/>
		<reference ref_id="CVE-2018-4378" ref_url="https://www.suse.com/security/cve/CVE-2018-4378/" source="CVE"/>
		<reference ref_id="CVE-2018-4382" ref_url="https://www.suse.com/security/cve/CVE-2018-4382/" source="CVE"/>
		<reference ref_id="CVE-2018-4386" ref_url="https://www.suse.com/security/cve/CVE-2018-4386/" source="CVE"/>
		<reference ref_id="CVE-2018-4392" ref_url="https://www.suse.com/security/cve/CVE-2018-4392/" source="CVE"/>
		<reference ref_id="CVE-2018-4416" ref_url="https://www.suse.com/security/cve/CVE-2018-4416/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.22.4 fixes the following issues:

Security issues fixed:

  CVE-2018-4191, CVE-2018-4197, CVE-2018-4299, CVE-2018-4306, CVE-2018-4309, CVE-2018-4392,
  CVE-2018-4312, CVE-2018-4314, CVE-2018-4315, CVE-2018-4316, CVE-2018-4317, CVE-2018-4318,
  CVE-2018-4319, CVE-2018-4323, CVE-2018-4328, CVE-2018-4358, CVE-2018-4359, CVE-2018-4361,
  CVE-2018-4345, CVE-2018-4372, CVE-2018-4373, CVE-2018-4375, CVE-2018-4376, CVE-2018-4416,
  CVE-2018-4378, CVE-2018-4382, CVE-2018-4386 (bsc#1110279, bsc#1116998). 
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-10"/>
	<updated date="2019-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116998">SUSE bug 1116998</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4191/">CVE-2018-4191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4197/">CVE-2018-4197</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4207/">CVE-2018-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4208/">CVE-2018-4208</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4209/">CVE-2018-4209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4210/">CVE-2018-4210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4212/">CVE-2018-4212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4213/">CVE-2018-4213</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4261/">CVE-2018-4261</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4262/">CVE-2018-4262</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4263/">CVE-2018-4263</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4264/">CVE-2018-4264</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4265/">CVE-2018-4265</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-4266/">CVE-2018-4266</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4267/">CVE-2018-4267</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4270/">CVE-2018-4270</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4272/">CVE-2018-4272</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4273/">CVE-2018-4273</cve>
	<cve impact="important" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4278/">CVE-2018-4278</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4284/">CVE-2018-4284</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4299/">CVE-2018-4299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4306/">CVE-2018-4306</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4309/">CVE-2018-4309</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4312/">CVE-2018-4312</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4314/">CVE-2018-4314</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4315/">CVE-2018-4315</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4316/">CVE-2018-4316</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4317/">CVE-2018-4317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4318/">CVE-2018-4318</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4319/">CVE-2018-4319</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4323/">CVE-2018-4323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4328/">CVE-2018-4328</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4345/">CVE-2018-4345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4358/">CVE-2018-4358</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4359/">CVE-2018-4359</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4361/">CVE-2018-4361</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4372/">CVE-2018-4372</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4373/">CVE-2018-4373</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4375/">CVE-2018-4375</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4376/">CVE-2018-4376</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4378/">CVE-2018-4378</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4382/">CVE-2018-4382</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4386/">CVE-2018-4386</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4392/">CVE-2018-4392</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4416/">CVE-2018-4416</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521680" comment="libwebkit2gtk3-lang-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78893" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1112767" ref_url="https://bugzilla.suse.com/1112767" source="BUGZILLA"/>
		<reference ref_id="1122198" ref_url="https://bugzilla.suse.com/1122198" source="BUGZILLA"/>
		<reference ref_id="1122475" ref_url="https://bugzilla.suse.com/1122475" source="BUGZILLA"/>
		<reference ref_id="1127027" ref_url="https://bugzilla.suse.com/1127027" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2510" ref_url="https://www.suse.com/security/cve/CVE-2019-2510/" source="CVE"/>
		<reference ref_id="CVE-2019-2537" ref_url="https://www.suse.com/security/cve/CVE-2019-2537/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005192.html" source="SUSE-SU"/>
		<description>
This update for mariadb to version 10.2.22 fixes the following issues:

Security issues fixed (bsc#1122198):

- CVE-2019-2510: Fixed a vulnerability which can lead to MySQL compromise and lead to Denial of Service.
- CVE-2019-2537: Fixed a vulnerability which can lead to MySQL compromise and lead to Denial of Service.

Other issues fixed:

- Fixed an issue where mysl_install_db fails due to incorrect basedir (bsc#1127027).
- Fixed an issue where the lograte was not working (bsc#1112767).
- Backport Information Schema CHECK_CONSTRAINTS Table.
- Maximum value of table_definition_cache is now 2097152.
- InnoDB ALTER TABLE fixes.
- Galera crash recovery fixes.
- Encryption fixes.
- Remove xtrabackup dependency  as MariaDB ships a build in mariabackup so xtrabackup is not needed (bsc#1122475).

The complete changelog can be found at:  https://mariadb.com/kb/en/library/mariadb-10222-changelog/
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-13"/>
	<updated date="2019-03-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1112767">SUSE bug 1112767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122198">SUSE bug 1122198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122475">SUSE bug 1122475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127027">SUSE bug 1127027</bugzilla>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2510/">CVE-2019-2510</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2537/">CVE-2019-2537</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522490" comment="mariadb-10.2.22-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522491" comment="mariadb-client-10.2.22-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499000" comment="mariadb-errormessages-10.2.22-3.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78894" version="1" class="patch">
	<metadata>
		<title>Security update for lftp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1103367" ref_url="https://bugzilla.suse.com/1103367" source="BUGZILLA"/>
		<reference ref_id="1120946" ref_url="https://bugzilla.suse.com/1120946" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10916" ref_url="https://www.suse.com/security/cve/CVE-2018-10916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0642-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190642-1.html" source="SUSE-SU"/>
		<description>
This update for lftp fixes the following issues:

Security issue fixed: 

- CVE-2018-10916: Fixed an improper file name sanitization which could lead to loss of integrity of 
  the local system (bsc#1103367).
  
Other issue addressed:

- The SSH login handling code detects password prompts more reliably (bsc#1120946).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-19"/>
	<updated date="2019-03-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103367">SUSE bug 1103367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120946">SUSE bug 1120946</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10916/">CVE-2018-10916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521684" comment="lftp-4.7.4-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78895" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1091236" ref_url="https://bugzilla.suse.com/1091236" source="BUGZILLA"/>
		<reference ref_id="1128471" ref_url="https://bugzilla.suse.com/1128471" source="BUGZILLA"/>
		<reference ref_id="1128472" ref_url="https://bugzilla.suse.com/1128472" source="BUGZILLA"/>
		<reference ref_id="1128474" ref_url="https://bugzilla.suse.com/1128474" source="BUGZILLA"/>
		<reference ref_id="1128476" ref_url="https://bugzilla.suse.com/1128476" source="BUGZILLA"/>
		<reference ref_id="1128480" ref_url="https://bugzilla.suse.com/1128480" source="BUGZILLA"/>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1128490" ref_url="https://bugzilla.suse.com/1128490" source="BUGZILLA"/>
		<reference ref_id="1128492" ref_url="https://bugzilla.suse.com/1128492" source="BUGZILLA"/>
		<reference ref_id="1128493" ref_url="https://bugzilla.suse.com/1128493" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3855" ref_url="https://www.suse.com/security/cve/CVE-2019-3855/" source="CVE"/>
		<reference ref_id="CVE-2019-3856" ref_url="https://www.suse.com/security/cve/CVE-2019-3856/" source="CVE"/>
		<reference ref_id="CVE-2019-3857" ref_url="https://www.suse.com/security/cve/CVE-2019-3857/" source="CVE"/>
		<reference ref_id="CVE-2019-3858" ref_url="https://www.suse.com/security/cve/CVE-2019-3858/" source="CVE"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="CVE-2019-3861" ref_url="https://www.suse.com/security/cve/CVE-2019-3861/" source="CVE"/>
		<reference ref_id="CVE-2019-3862" ref_url="https://www.suse.com/security/cve/CVE-2019-3862/" source="CVE"/>
		<reference ref_id="CVE-2019-3863" ref_url="https://www.suse.com/security/cve/CVE-2019-3863/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

Security issues fixed: 	  

- CVE-2019-3861: Fixed Out-of-bounds reads with specially crafted SSH packets (bsc#1128490).
- CVE-2019-3862: Fixed Out-of-bounds memory comparison with specially crafted message channel request packet (bsc#1128492).
- CVE-2019-3860: Fixed Out-of-bounds reads with specially crafted SFTP packets (bsc#1128481).
- CVE-2019-3863: Fixed an Integer overflow in user authenticate keyboard interactive which could allow out-of-bounds writes 
  with specially crafted keyboard responses (bsc#1128493).
- CVE-2019-3856: Fixed a potential Integer overflow in keyboard interactive handling which could allow out-of-bounds write 
  with specially crafted payload (bsc#1128472).
- CVE-2019-3859: Fixed Out-of-bounds reads with specially crafted payloads due to unchecked use of _libssh2_packet_require 
  and _libssh2_packet_requirev (bsc#1128480).
- CVE-2019-3855: Fixed a potential Integer overflow in transport read which could allow out-of-bounds write with specially 
  crafted payload (bsc#1128471).
- CVE-2019-3858: Fixed a potential zero-byte allocation which could lead to an out-of-bounds read with a specially crafted 
  SFTP packet (bsc#1128476).
- CVE-2019-3857: Fixed a potential Integer overflow which could lead to zero-byte allocation and out-of-bounds with specially 
  crafted message channel request SSH packet (bsc#1128474).

Other issue addressed: 

- Libbssh2 will stop using keys unsupported types in the known_hosts file (bsc#1091236).
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-20"/>
	<updated date="2019-03-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091236">SUSE bug 1091236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128471">SUSE bug 1128471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128472">SUSE bug 1128472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128474">SUSE bug 1128474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128476">SUSE bug 1128476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128480">SUSE bug 1128480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128490">SUSE bug 1128490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128492">SUSE bug 1128492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128493">SUSE bug 1128493</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3855/">CVE-2019-3855</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3856/">CVE-2019-3856</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3857/">CVE-2019-3857</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3858/">CVE-2019-3858</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3861/">CVE-2019-3861</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3862/">CVE-2019-3862</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3863/">CVE-2019-3863</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521685" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521686" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78896" version="1" class="patch">
	<metadata>
		<title>Security update for openwsman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1122623" ref_url="https://bugzilla.suse.com/1122623" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3816" ref_url="https://www.suse.com/security/cve/CVE-2019-3816/" source="CVE"/>
		<reference ref_id="CVE-2019-3833" ref_url="https://www.suse.com/security/cve/CVE-2019-3833/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005211.html" source="SUSE-SU"/>
		<description>
This update for openwsman fixes the following issues:

Security issues fixed:

- CVE-2019-3816: Fixed a vulnerability in openwsmand deamon which could lead to arbitary file disclosure (bsc#1122623).
- CVE-2019-3833: Fixed a vulnerability in process_connection() which could allow an attacker to trigger an infinite
  loop which leads to Denial of Service (bsc#1122623).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-20"/>
	<updated date="2019-03-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122623">SUSE bug 1122623</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3816/">CVE-2019-3816</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3833/">CVE-2019-3833</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521687" comment="libwsman1-2.4.11-21.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521688" comment="libwsman_clientpp1-2.4.11-21.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521689" comment="openwsman-server-2.4.11-21.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78897" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1127367" ref_url="https://bugzilla.suse.com/1127367" source="BUGZILLA"/>
		<reference ref_id="1127369" ref_url="https://bugzilla.suse.com/1127369" source="BUGZILLA"/>
		<reference ref_id="1127370" ref_url="https://bugzilla.suse.com/1127370" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9208" ref_url="https://www.suse.com/security/cve/CVE-2019-9208/" source="CVE"/>
		<reference ref_id="CVE-2019-9209" ref_url="https://www.suse.com/security/cve/CVE-2019-9209/" source="CVE"/>
		<reference ref_id="CVE-2019-9214" ref_url="https://www.suse.com/security/cve/CVE-2019-9214/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005216.html" source="SUSE-SU"/>
		<description>
This update for wireshark to version 2.4.13 fixes the following issues:

Security issues fixed:

- CVE-2019-9214: Avoided a dereference of a null coversation which could make RPCAP 
  dissector crash (bsc#1127367).
- CVE-2019-9209: Fixed a buffer overflow in time values which could make ASN.1 BER 
  and related dissectors crash (bsc#1127369).
- CVE-2019-9208: Fixed a null pointer dereference which could make TCAP dissector 
  crash (bsc#1127370).

Release notes: https://www.wireshark.org/docs/relnotes/wireshark-2.4.13.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-21"/>
	<updated date="2019-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1127367">SUSE bug 1127367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127369">SUSE bug 1127369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127370">SUSE bug 1127370</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9208/">CVE-2019-9208</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9209/">CVE-2019-9209</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9214/">CVE-2019-9214</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521690" comment="libwireshark9-2.4.13-48.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521691" comment="libwiretap7-2.4.13-48.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521692" comment="libwscodecs1-2.4.13-48.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521693" comment="libwsutil8-2.4.13-48.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521694" comment="wireshark-2.4.13-48.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521695" comment="wireshark-gtk-2.4.13-48.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78898" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1129186" ref_url="https://bugzilla.suse.com/1129186" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3838" ref_url="https://www.suse.com/security/cve/CVE-2019-3838/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005228.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issue:
	  
Security issue fixed:

- CVE-2019-3838: Fixed a vulnerability which made forceput operator in DefineResource to be still accessible
  which could allow access to file system outside of the constraints of -dSAFER (bsc#1129186).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-22"/>
	<updated date="2019-03-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129186">SUSE bug 1129186</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3838/">CVE-2019-3838</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521696" comment="ghostscript-9.26a-23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521697" comment="ghostscript-x11-9.26a-23.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78899" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1129231" ref_url="https://bugzilla.suse.com/1129231" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2019:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005232.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to the 20190312 bundle release (bsc#1129231)

New Platforms:

- AML-Y22      H0       6-8e-9/10           0000009e Core Gen8 Mobile
- WHL-U        W0       6-8e-b/d0           000000a4 Core Gen8 Mobile
- WHL-U        V0       6-8e-d/94           000000b2 Core Gen8 Mobile
- CFL-S        P0       6-9e-c/22           000000a2 Core Gen9 Desktop
- CFL-H        R0       6-9e-d/22           000000b0 Core Gen9 Mobile

Updated Platforms:

- HSX-E/EP     Cx/M1    6-3f-2/6f 0000003d-&gt;00000041 Core Gen4 X series; Xeon E5 v3
- HSX-EX       E0       6-3f-4/80 00000012-&gt;00000013 Xeon E7 v3
- SKX-SP       H0/M0/U0 6-55-4/b7 0200004d-&gt;0000005a Xeon Scalable
- SKX-D        M1       6-55-4/b7 0200004d-&gt;0000005a Xeon D-21xx
- BDX-DE       V1       6-56-2/10 00000017-&gt;00000019 Xeon D-1520/40
- BDX-DE       V2/3     6-56-3/10 07000013-&gt;07000016 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
- BDX-DE       Y0       6-56-4/10 0f000012-&gt;0f000014 Xeon D-1557/59/67/71/77/81/87
- BDX-NS       A0       6-56-5/10 0e00000a-&gt;0e00000c Xeon D-1513N/23/33/43/53
- APL          D0       6-5c-9/03 00000032-&gt;00000036 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
- APL          E0       6-5c-a/03 0000000c-&gt;00000010 Atom x5/7-E39xx
- GLK          B0       6-7a-1/01 00000028-&gt;0000002c Pentium Silver N/J5xxx, Celeron N/J4xxx
- KBL-U/Y      H0       6-8e-9/c0 0000008e-&gt;0000009a Core Gen7 Mobile
- CFL-U43e     D0       6-8e-a/c0 00000096-&gt;0000009e Core Gen8 Mobile
- KBL-H/S/E3   B0       6-9e-9/2a 0000008e-&gt;0000009a Core Gen7; Xeon E3 v6
- CFL-H/S/E3   U0       6-9e-a/22 00000096-&gt;000000aa Core Gen8 Desktop, Mobile, Xeon E
- CFL-S B0 6-9e-b/02 0000008e-&gt;000000aa Core Gen8

		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-25"/>
	<updated date="2019-03-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1129231">SUSE bug 1129231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521698" comment="ucode-intel-20190312-13.38.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78900" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1123361" ref_url="https://bugzilla.suse.com/1123361" source="BUGZILLA"/>
		<reference ref_id="1123522" ref_url="https://bugzilla.suse.com/1123522" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6977" ref_url="https://www.suse.com/security/cve/CVE-2019-6977/" source="CVE"/>
		<reference ref_id="CVE-2019-6978" ref_url="https://www.suse.com/security/cve/CVE-2019-6978/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005236.html" source="SUSE-SU"/>
		<description>
This update for gd fixes the following issues:

Security issues fixed:

- CVE-2019-6977: Fixed a heap-based buffer overflow the GD Graphics Library used in the imagecolormatch function (bsc#1123361).
- CVE-2019-6978: Fixed a double free in the gdImage*Ptr() functions (bsc#1123522).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-26"/>
	<updated date="2019-03-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123361">SUSE bug 1123361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123522">SUSE bug 1123522</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6977/">CVE-2019-6977</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6978/">CVE-2019-6978</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521699" comment="gd-2.1.0-24.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521700" comment="gd-32bit-2.1.0-24.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78901" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1046305" ref_url="https://bugzilla.suse.com/1046305" source="BUGZILLA"/>
		<reference ref_id="1046306" ref_url="https://bugzilla.suse.com/1046306" source="BUGZILLA"/>
		<reference ref_id="1050252" ref_url="https://bugzilla.suse.com/1050252" source="BUGZILLA"/>
		<reference ref_id="1050549" ref_url="https://bugzilla.suse.com/1050549" source="BUGZILLA"/>
		<reference ref_id="1051510" ref_url="https://bugzilla.suse.com/1051510" source="BUGZILLA"/>
		<reference ref_id="1054610" ref_url="https://bugzilla.suse.com/1054610" source="BUGZILLA"/>
		<reference ref_id="1055121" ref_url="https://bugzilla.suse.com/1055121" source="BUGZILLA"/>
		<reference ref_id="1056658" ref_url="https://bugzilla.suse.com/1056658" source="BUGZILLA"/>
		<reference ref_id="1056662" ref_url="https://bugzilla.suse.com/1056662" source="BUGZILLA"/>
		<reference ref_id="1056787" ref_url="https://bugzilla.suse.com/1056787" source="BUGZILLA"/>
		<reference ref_id="1060463" ref_url="https://bugzilla.suse.com/1060463" source="BUGZILLA"/>
		<reference ref_id="1063638" ref_url="https://bugzilla.suse.com/1063638" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1070995" ref_url="https://bugzilla.suse.com/1070995" source="BUGZILLA"/>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1074562" ref_url="https://bugzilla.suse.com/1074562" source="BUGZILLA"/>
		<reference ref_id="1074578" ref_url="https://bugzilla.suse.com/1074578" source="BUGZILLA"/>
		<reference ref_id="1074701" ref_url="https://bugzilla.suse.com/1074701" source="BUGZILLA"/>
		<reference ref_id="1075006" ref_url="https://bugzilla.suse.com/1075006" source="BUGZILLA"/>
		<reference ref_id="1075419" ref_url="https://bugzilla.suse.com/1075419" source="BUGZILLA"/>
		<reference ref_id="1075748" ref_url="https://bugzilla.suse.com/1075748" source="BUGZILLA"/>
		<reference ref_id="1078355" ref_url="https://bugzilla.suse.com/1078355" source="BUGZILLA"/>
		<reference ref_id="1080039" ref_url="https://bugzilla.suse.com/1080039" source="BUGZILLA"/>
		<reference ref_id="1082943" ref_url="https://bugzilla.suse.com/1082943" source="BUGZILLA"/>
		<reference ref_id="1083548" ref_url="https://bugzilla.suse.com/1083548" source="BUGZILLA"/>
		<reference ref_id="1083647" ref_url="https://bugzilla.suse.com/1083647" source="BUGZILLA"/>
		<reference ref_id="1084216" ref_url="https://bugzilla.suse.com/1084216" source="BUGZILLA"/>
		<reference ref_id="1086095" ref_url="https://bugzilla.suse.com/1086095" source="BUGZILLA"/>
		<reference ref_id="1086282" ref_url="https://bugzilla.suse.com/1086282" source="BUGZILLA"/>
		<reference ref_id="1086301" ref_url="https://bugzilla.suse.com/1086301" source="BUGZILLA"/>
		<reference ref_id="1086313" ref_url="https://bugzilla.suse.com/1086313" source="BUGZILLA"/>
		<reference ref_id="1086314" ref_url="https://bugzilla.suse.com/1086314" source="BUGZILLA"/>
		<reference ref_id="1086323" ref_url="https://bugzilla.suse.com/1086323" source="BUGZILLA"/>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087084" ref_url="https://bugzilla.suse.com/1087084" source="BUGZILLA"/>
		<reference ref_id="1087092" ref_url="https://bugzilla.suse.com/1087092" source="BUGZILLA"/>
		<reference ref_id="1087939" ref_url="https://bugzilla.suse.com/1087939" source="BUGZILLA"/>
		<reference ref_id="1088133" ref_url="https://bugzilla.suse.com/1088133" source="BUGZILLA"/>
		<reference ref_id="1094555" ref_url="https://bugzilla.suse.com/1094555" source="BUGZILLA"/>
		<reference ref_id="1098382" ref_url="https://bugzilla.suse.com/1098382" source="BUGZILLA"/>
		<reference ref_id="1098425" ref_url="https://bugzilla.suse.com/1098425" source="BUGZILLA"/>
		<reference ref_id="1098995" ref_url="https://bugzilla.suse.com/1098995" source="BUGZILLA"/>
		<reference ref_id="1102055" ref_url="https://bugzilla.suse.com/1102055" source="BUGZILLA"/>
		<reference ref_id="1103429" ref_url="https://bugzilla.suse.com/1103429" source="BUGZILLA"/>
		<reference ref_id="1104353" ref_url="https://bugzilla.suse.com/1104353" source="BUGZILLA"/>
		<reference ref_id="1106105" ref_url="https://bugzilla.suse.com/1106105" source="BUGZILLA"/>
		<reference ref_id="1106434" ref_url="https://bugzilla.suse.com/1106434" source="BUGZILLA"/>
		<reference ref_id="1106811" ref_url="https://bugzilla.suse.com/1106811" source="BUGZILLA"/>
		<reference ref_id="1107078" ref_url="https://bugzilla.suse.com/1107078" source="BUGZILLA"/>
		<reference ref_id="1107665" ref_url="https://bugzilla.suse.com/1107665" source="BUGZILLA"/>
		<reference ref_id="1108101" ref_url="https://bugzilla.suse.com/1108101" source="BUGZILLA"/>
		<reference ref_id="1108870" ref_url="https://bugzilla.suse.com/1108870" source="BUGZILLA"/>
		<reference ref_id="1109695" ref_url="https://bugzilla.suse.com/1109695" source="BUGZILLA"/>
		<reference ref_id="1110096" ref_url="https://bugzilla.suse.com/1110096" source="BUGZILLA"/>
		<reference ref_id="1110705" ref_url="https://bugzilla.suse.com/1110705" source="BUGZILLA"/>
		<reference ref_id="1111666" ref_url="https://bugzilla.suse.com/1111666" source="BUGZILLA"/>
		<reference ref_id="1113042" ref_url="https://bugzilla.suse.com/1113042" source="BUGZILLA"/>
		<reference ref_id="1113712" ref_url="https://bugzilla.suse.com/1113712" source="BUGZILLA"/>
		<reference ref_id="1113722" ref_url="https://bugzilla.suse.com/1113722" source="BUGZILLA"/>
		<reference ref_id="1113769" ref_url="https://bugzilla.suse.com/1113769" source="BUGZILLA"/>
		<reference ref_id="1113939" ref_url="https://bugzilla.suse.com/1113939" source="BUGZILLA"/>
		<reference ref_id="1114279" ref_url="https://bugzilla.suse.com/1114279" source="BUGZILLA"/>
		<reference ref_id="1114585" ref_url="https://bugzilla.suse.com/1114585" source="BUGZILLA"/>
		<reference ref_id="1114893" ref_url="https://bugzilla.suse.com/1114893" source="BUGZILLA"/>
		<reference ref_id="1117108" ref_url="https://bugzilla.suse.com/1117108" source="BUGZILLA"/>
		<reference ref_id="1117155" ref_url="https://bugzilla.suse.com/1117155" source="BUGZILLA"/>
		<reference ref_id="1117645" ref_url="https://bugzilla.suse.com/1117645" source="BUGZILLA"/>
		<reference ref_id="1117947" ref_url="https://bugzilla.suse.com/1117947" source="BUGZILLA"/>
		<reference ref_id="1118338" ref_url="https://bugzilla.suse.com/1118338" source="BUGZILLA"/>
		<reference ref_id="1119019" ref_url="https://bugzilla.suse.com/1119019" source="BUGZILLA"/>
		<reference ref_id="1119086" ref_url="https://bugzilla.suse.com/1119086" source="BUGZILLA"/>
		<reference ref_id="1119766" ref_url="https://bugzilla.suse.com/1119766" source="BUGZILLA"/>
		<reference ref_id="1119843" ref_url="https://bugzilla.suse.com/1119843" source="BUGZILLA"/>
		<reference ref_id="1120008" ref_url="https://bugzilla.suse.com/1120008" source="BUGZILLA"/>
		<reference ref_id="1120318" ref_url="https://bugzilla.suse.com/1120318" source="BUGZILLA"/>
		<reference ref_id="1120601" ref_url="https://bugzilla.suse.com/1120601" source="BUGZILLA"/>
		<reference ref_id="1120758" ref_url="https://bugzilla.suse.com/1120758" source="BUGZILLA"/>
		<reference ref_id="1120854" ref_url="https://bugzilla.suse.com/1120854" source="BUGZILLA"/>
		<reference ref_id="1120902" ref_url="https://bugzilla.suse.com/1120902" source="BUGZILLA"/>
		<reference ref_id="1120909" ref_url="https://bugzilla.suse.com/1120909" source="BUGZILLA"/>
		<reference ref_id="1120955" ref_url="https://bugzilla.suse.com/1120955" source="BUGZILLA"/>
		<reference ref_id="1121317" ref_url="https://bugzilla.suse.com/1121317" source="BUGZILLA"/>
		<reference ref_id="1121726" ref_url="https://bugzilla.suse.com/1121726" source="BUGZILLA"/>
		<reference ref_id="1121789" ref_url="https://bugzilla.suse.com/1121789" source="BUGZILLA"/>
		<reference ref_id="1121805" ref_url="https://bugzilla.suse.com/1121805" source="BUGZILLA"/>
		<reference ref_id="1122019" ref_url="https://bugzilla.suse.com/1122019" source="BUGZILLA"/>
		<reference ref_id="1122159" ref_url="https://bugzilla.suse.com/1122159" source="BUGZILLA"/>
		<reference ref_id="1122192" ref_url="https://bugzilla.suse.com/1122192" source="BUGZILLA"/>
		<reference ref_id="1122292" ref_url="https://bugzilla.suse.com/1122292" source="BUGZILLA"/>
		<reference ref_id="1122324" ref_url="https://bugzilla.suse.com/1122324" source="BUGZILLA"/>
		<reference ref_id="1122554" ref_url="https://bugzilla.suse.com/1122554" source="BUGZILLA"/>
		<reference ref_id="1122662" ref_url="https://bugzilla.suse.com/1122662" source="BUGZILLA"/>
		<reference ref_id="1122764" ref_url="https://bugzilla.suse.com/1122764" source="BUGZILLA"/>
		<reference ref_id="1122779" ref_url="https://bugzilla.suse.com/1122779" source="BUGZILLA"/>
		<reference ref_id="1122822" ref_url="https://bugzilla.suse.com/1122822" source="BUGZILLA"/>
		<reference ref_id="1122885" ref_url="https://bugzilla.suse.com/1122885" source="BUGZILLA"/>
		<reference ref_id="1122927" ref_url="https://bugzilla.suse.com/1122927" source="BUGZILLA"/>
		<reference ref_id="1122944" ref_url="https://bugzilla.suse.com/1122944" source="BUGZILLA"/>
		<reference ref_id="1122971" ref_url="https://bugzilla.suse.com/1122971" source="BUGZILLA"/>
		<reference ref_id="1122982" ref_url="https://bugzilla.suse.com/1122982" source="BUGZILLA"/>
		<reference ref_id="1123060" ref_url="https://bugzilla.suse.com/1123060" source="BUGZILLA"/>
		<reference ref_id="1123061" ref_url="https://bugzilla.suse.com/1123061" source="BUGZILLA"/>
		<reference ref_id="1123161" ref_url="https://bugzilla.suse.com/1123161" source="BUGZILLA"/>
		<reference ref_id="1123317" ref_url="https://bugzilla.suse.com/1123317" source="BUGZILLA"/>
		<reference ref_id="1123348" ref_url="https://bugzilla.suse.com/1123348" source="BUGZILLA"/>
		<reference ref_id="1123357" ref_url="https://bugzilla.suse.com/1123357" source="BUGZILLA"/>
		<reference ref_id="1123456" ref_url="https://bugzilla.suse.com/1123456" source="BUGZILLA"/>
		<reference ref_id="1123538" ref_url="https://bugzilla.suse.com/1123538" source="BUGZILLA"/>
		<reference ref_id="1123697" ref_url="https://bugzilla.suse.com/1123697" source="BUGZILLA"/>
		<reference ref_id="1123882" ref_url="https://bugzilla.suse.com/1123882" source="BUGZILLA"/>
		<reference ref_id="1123933" ref_url="https://bugzilla.suse.com/1123933" source="BUGZILLA"/>
		<reference ref_id="1124055" ref_url="https://bugzilla.suse.com/1124055" source="BUGZILLA"/>
		<reference ref_id="1124204" ref_url="https://bugzilla.suse.com/1124204" source="BUGZILLA"/>
		<reference ref_id="1124235" ref_url="https://bugzilla.suse.com/1124235" source="BUGZILLA"/>
		<reference ref_id="1124579" ref_url="https://bugzilla.suse.com/1124579" source="BUGZILLA"/>
		<reference ref_id="1124589" ref_url="https://bugzilla.suse.com/1124589" source="BUGZILLA"/>
		<reference ref_id="1124728" ref_url="https://bugzilla.suse.com/1124728" source="BUGZILLA"/>
		<reference ref_id="1124732" ref_url="https://bugzilla.suse.com/1124732" source="BUGZILLA"/>
		<reference ref_id="1124735" ref_url="https://bugzilla.suse.com/1124735" source="BUGZILLA"/>
		<reference ref_id="1124969" ref_url="https://bugzilla.suse.com/1124969" source="BUGZILLA"/>
		<reference ref_id="1124974" ref_url="https://bugzilla.suse.com/1124974" source="BUGZILLA"/>
		<reference ref_id="1124975" ref_url="https://bugzilla.suse.com/1124975" source="BUGZILLA"/>
		<reference ref_id="1124976" ref_url="https://bugzilla.suse.com/1124976" source="BUGZILLA"/>
		<reference ref_id="1124978" ref_url="https://bugzilla.suse.com/1124978" source="BUGZILLA"/>
		<reference ref_id="1124979" ref_url="https://bugzilla.suse.com/1124979" source="BUGZILLA"/>
		<reference ref_id="1124980" ref_url="https://bugzilla.suse.com/1124980" source="BUGZILLA"/>
		<reference ref_id="1124981" ref_url="https://bugzilla.suse.com/1124981" source="BUGZILLA"/>
		<reference ref_id="1124982" ref_url="https://bugzilla.suse.com/1124982" source="BUGZILLA"/>
		<reference ref_id="1124984" ref_url="https://bugzilla.suse.com/1124984" source="BUGZILLA"/>
		<reference ref_id="1124985" ref_url="https://bugzilla.suse.com/1124985" source="BUGZILLA"/>
		<reference ref_id="1125109" ref_url="https://bugzilla.suse.com/1125109" source="BUGZILLA"/>
		<reference ref_id="1125125" ref_url="https://bugzilla.suse.com/1125125" source="BUGZILLA"/>
		<reference ref_id="1125252" ref_url="https://bugzilla.suse.com/1125252" source="BUGZILLA"/>
		<reference ref_id="1125315" ref_url="https://bugzilla.suse.com/1125315" source="BUGZILLA"/>
		<reference ref_id="1125614" ref_url="https://bugzilla.suse.com/1125614" source="BUGZILLA"/>
		<reference ref_id="1125728" ref_url="https://bugzilla.suse.com/1125728" source="BUGZILLA"/>
		<reference ref_id="1125780" ref_url="https://bugzilla.suse.com/1125780" source="BUGZILLA"/>
		<reference ref_id="1125797" ref_url="https://bugzilla.suse.com/1125797" source="BUGZILLA"/>
		<reference ref_id="1125799" ref_url="https://bugzilla.suse.com/1125799" source="BUGZILLA"/>
		<reference ref_id="1125800" ref_url="https://bugzilla.suse.com/1125800" source="BUGZILLA"/>
		<reference ref_id="1125907" ref_url="https://bugzilla.suse.com/1125907" source="BUGZILLA"/>
		<reference ref_id="1125947" ref_url="https://bugzilla.suse.com/1125947" source="BUGZILLA"/>
		<reference ref_id="1126131" ref_url="https://bugzilla.suse.com/1126131" source="BUGZILLA"/>
		<reference ref_id="1126209" ref_url="https://bugzilla.suse.com/1126209" source="BUGZILLA"/>
		<reference ref_id="1126389" ref_url="https://bugzilla.suse.com/1126389" source="BUGZILLA"/>
		<reference ref_id="1126393" ref_url="https://bugzilla.suse.com/1126393" source="BUGZILLA"/>
		<reference ref_id="1126476" ref_url="https://bugzilla.suse.com/1126476" source="BUGZILLA"/>
		<reference ref_id="1126480" ref_url="https://bugzilla.suse.com/1126480" source="BUGZILLA"/>
		<reference ref_id="1126481" ref_url="https://bugzilla.suse.com/1126481" source="BUGZILLA"/>
		<reference ref_id="1126488" ref_url="https://bugzilla.suse.com/1126488" source="BUGZILLA"/>
		<reference ref_id="1126495" ref_url="https://bugzilla.suse.com/1126495" source="BUGZILLA"/>
		<reference ref_id="1126555" ref_url="https://bugzilla.suse.com/1126555" source="BUGZILLA"/>
		<reference ref_id="1126579" ref_url="https://bugzilla.suse.com/1126579" source="BUGZILLA"/>
		<reference ref_id="1126789" ref_url="https://bugzilla.suse.com/1126789" source="BUGZILLA"/>
		<reference ref_id="1126790" ref_url="https://bugzilla.suse.com/1126790" source="BUGZILLA"/>
		<reference ref_id="1126802" ref_url="https://bugzilla.suse.com/1126802" source="BUGZILLA"/>
		<reference ref_id="1126803" ref_url="https://bugzilla.suse.com/1126803" source="BUGZILLA"/>
		<reference ref_id="1126804" ref_url="https://bugzilla.suse.com/1126804" source="BUGZILLA"/>
		<reference ref_id="1126805" ref_url="https://bugzilla.suse.com/1126805" source="BUGZILLA"/>
		<reference ref_id="1126806" ref_url="https://bugzilla.suse.com/1126806" source="BUGZILLA"/>
		<reference ref_id="1126807" ref_url="https://bugzilla.suse.com/1126807" source="BUGZILLA"/>
		<reference ref_id="1127042" ref_url="https://bugzilla.suse.com/1127042" source="BUGZILLA"/>
		<reference ref_id="1127062" ref_url="https://bugzilla.suse.com/1127062" source="BUGZILLA"/>
		<reference ref_id="1127082" ref_url="https://bugzilla.suse.com/1127082" source="BUGZILLA"/>
		<reference ref_id="1127154" ref_url="https://bugzilla.suse.com/1127154" source="BUGZILLA"/>
		<reference ref_id="1127285" ref_url="https://bugzilla.suse.com/1127285" source="BUGZILLA"/>
		<reference ref_id="1127286" ref_url="https://bugzilla.suse.com/1127286" source="BUGZILLA"/>
		<reference ref_id="1127307" ref_url="https://bugzilla.suse.com/1127307" source="BUGZILLA"/>
		<reference ref_id="1127363" ref_url="https://bugzilla.suse.com/1127363" source="BUGZILLA"/>
		<reference ref_id="1127493" ref_url="https://bugzilla.suse.com/1127493" source="BUGZILLA"/>
		<reference ref_id="1127494" ref_url="https://bugzilla.suse.com/1127494" source="BUGZILLA"/>
		<reference ref_id="1127495" ref_url="https://bugzilla.suse.com/1127495" source="BUGZILLA"/>
		<reference ref_id="1127496" ref_url="https://bugzilla.suse.com/1127496" source="BUGZILLA"/>
		<reference ref_id="1127497" ref_url="https://bugzilla.suse.com/1127497" source="BUGZILLA"/>
		<reference ref_id="1127498" ref_url="https://bugzilla.suse.com/1127498" source="BUGZILLA"/>
		<reference ref_id="1127534" ref_url="https://bugzilla.suse.com/1127534" source="BUGZILLA"/>
		<reference ref_id="1127561" ref_url="https://bugzilla.suse.com/1127561" source="BUGZILLA"/>
		<reference ref_id="1127567" ref_url="https://bugzilla.suse.com/1127567" source="BUGZILLA"/>
		<reference ref_id="1127595" ref_url="https://bugzilla.suse.com/1127595" source="BUGZILLA"/>
		<reference ref_id="1127603" ref_url="https://bugzilla.suse.com/1127603" source="BUGZILLA"/>
		<reference ref_id="1127682" ref_url="https://bugzilla.suse.com/1127682" source="BUGZILLA"/>
		<reference ref_id="1127731" ref_url="https://bugzilla.suse.com/1127731" source="BUGZILLA"/>
		<reference ref_id="1127750" ref_url="https://bugzilla.suse.com/1127750" source="BUGZILLA"/>
		<reference ref_id="1127836" ref_url="https://bugzilla.suse.com/1127836" source="BUGZILLA"/>
		<reference ref_id="1127961" ref_url="https://bugzilla.suse.com/1127961" source="BUGZILLA"/>
		<reference ref_id="1128094" ref_url="https://bugzilla.suse.com/1128094" source="BUGZILLA"/>
		<reference ref_id="1128166" ref_url="https://bugzilla.suse.com/1128166" source="BUGZILLA"/>
		<reference ref_id="1128351" ref_url="https://bugzilla.suse.com/1128351" source="BUGZILLA"/>
		<reference ref_id="1128451" ref_url="https://bugzilla.suse.com/1128451" source="BUGZILLA"/>
		<reference ref_id="1128895" ref_url="https://bugzilla.suse.com/1128895" source="BUGZILLA"/>
		<reference ref_id="1129046" ref_url="https://bugzilla.suse.com/1129046" source="BUGZILLA"/>
		<reference ref_id="1129080" ref_url="https://bugzilla.suse.com/1129080" source="BUGZILLA"/>
		<reference ref_id="1129163" ref_url="https://bugzilla.suse.com/1129163" source="BUGZILLA"/>
		<reference ref_id="1129179" ref_url="https://bugzilla.suse.com/1129179" source="BUGZILLA"/>
		<reference ref_id="1129181" ref_url="https://bugzilla.suse.com/1129181" source="BUGZILLA"/>
		<reference ref_id="1129182" ref_url="https://bugzilla.suse.com/1129182" source="BUGZILLA"/>
		<reference ref_id="1129183" ref_url="https://bugzilla.suse.com/1129183" source="BUGZILLA"/>
		<reference ref_id="1129184" ref_url="https://bugzilla.suse.com/1129184" source="BUGZILLA"/>
		<reference ref_id="1129205" ref_url="https://bugzilla.suse.com/1129205" source="BUGZILLA"/>
		<reference ref_id="1129281" ref_url="https://bugzilla.suse.com/1129281" source="BUGZILLA"/>
		<reference ref_id="1129284" ref_url="https://bugzilla.suse.com/1129284" source="BUGZILLA"/>
		<reference ref_id="1129285" ref_url="https://bugzilla.suse.com/1129285" source="BUGZILLA"/>
		<reference ref_id="1129291" ref_url="https://bugzilla.suse.com/1129291" source="BUGZILLA"/>
		<reference ref_id="1129292" ref_url="https://bugzilla.suse.com/1129292" source="BUGZILLA"/>
		<reference ref_id="1129293" ref_url="https://bugzilla.suse.com/1129293" source="BUGZILLA"/>
		<reference ref_id="1129294" ref_url="https://bugzilla.suse.com/1129294" source="BUGZILLA"/>
		<reference ref_id="1129295" ref_url="https://bugzilla.suse.com/1129295" source="BUGZILLA"/>
		<reference ref_id="1129296" ref_url="https://bugzilla.suse.com/1129296" source="BUGZILLA"/>
		<reference ref_id="1129326" ref_url="https://bugzilla.suse.com/1129326" source="BUGZILLA"/>
		<reference ref_id="1129327" ref_url="https://bugzilla.suse.com/1129327" source="BUGZILLA"/>
		<reference ref_id="1129330" ref_url="https://bugzilla.suse.com/1129330" source="BUGZILLA"/>
		<reference ref_id="1129363" ref_url="https://bugzilla.suse.com/1129363" source="BUGZILLA"/>
		<reference ref_id="1129366" ref_url="https://bugzilla.suse.com/1129366" source="BUGZILLA"/>
		<reference ref_id="1129497" ref_url="https://bugzilla.suse.com/1129497" source="BUGZILLA"/>
		<reference ref_id="1129519" ref_url="https://bugzilla.suse.com/1129519" source="BUGZILLA"/>
		<reference ref_id="1129543" ref_url="https://bugzilla.suse.com/1129543" source="BUGZILLA"/>
		<reference ref_id="1129547" ref_url="https://bugzilla.suse.com/1129547" source="BUGZILLA"/>
		<reference ref_id="1129551" ref_url="https://bugzilla.suse.com/1129551" source="BUGZILLA"/>
		<reference ref_id="1129581" ref_url="https://bugzilla.suse.com/1129581" source="BUGZILLA"/>
		<reference ref_id="1129625" ref_url="https://bugzilla.suse.com/1129625" source="BUGZILLA"/>
		<reference ref_id="1129664" ref_url="https://bugzilla.suse.com/1129664" source="BUGZILLA"/>
		<reference ref_id="1129739" ref_url="https://bugzilla.suse.com/1129739" source="BUGZILLA"/>
		<reference ref_id="1129923" ref_url="https://bugzilla.suse.com/1129923" source="BUGZILLA"/>
		<reference ref_id="807502" ref_url="https://bugzilla.suse.com/807502" source="BUGZILLA"/>
		<reference ref_id="824948" ref_url="https://bugzilla.suse.com/824948" source="BUGZILLA"/>
		<reference ref_id="828192" ref_url="https://bugzilla.suse.com/828192" source="BUGZILLA"/>
		<reference ref_id="925178" ref_url="https://bugzilla.suse.com/925178" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2018-20669" ref_url="https://www.suse.com/security/cve/CVE-2018-20669/" source="CVE"/>
		<reference ref_id="CVE-2019-2024" ref_url="https://www.suse.com/security/cve/CVE-2019-2024/" source="CVE"/>
		<reference ref_id="CVE-2019-3459" ref_url="https://www.suse.com/security/cve/CVE-2019-3459/" source="CVE"/>
		<reference ref_id="CVE-2019-3460" ref_url="https://www.suse.com/security/cve/CVE-2019-3460/" source="CVE"/>
		<reference ref_id="CVE-2019-3819" ref_url="https://www.suse.com/security/cve/CVE-2019-3819/" source="CVE"/>
		<reference ref_id="CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974/" source="CVE"/>
		<reference ref_id="CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221/" source="CVE"/>
		<reference ref_id="CVE-2019-7222" ref_url="https://www.suse.com/security/cve/CVE-2019-7222/" source="CVE"/>
		<reference ref_id="CVE-2019-7308" ref_url="https://www.suse.com/security/cve/CVE-2019-7308/" source="CVE"/>
		<reference ref_id="CVE-2019-8912" ref_url="https://www.suse.com/security/cve/CVE-2019-8912/" source="CVE"/>
		<reference ref_id="CVE-2019-8980" ref_url="https://www.suse.com/security/cve/CVE-2019-8980/" source="CVE"/>
		<reference ref_id="CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2018-20669: Missing access control checks in ioctl of gpu/drm/i915 driver were fixed which might have lead to information leaks.  (bnc#1122971).
- CVE-2019-3459, CVE-2019-3460: The Bluetooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).
- CVE-2019-3819: A flaw was found in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user ('root') can cause a system lock up and a denial of service. (bnc#1123161).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bnc#1124728 ).
- CVE-2019-7221: Fixed a use-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124732).
- CVE-2019-7222: Fixed an information leakage in the KVM hypervisor related to handling page fault exceptions, which allowed a guest user/process to use this flaw to leak the host's stack memory contents to a guest (bsc#1124735).
- CVE-2019-7308: kernel/bpf/verifier.c performed undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks (bnc#1124055).
- CVE-2019-8912: af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr (bnc#1125907).
- CVE-2019-8980: A memory leak in the kernel_read_file function in fs/exec.c allowed attackers to cause a denial of service (memory consumption) by triggering vfs_read failures (bnc#1126209).
- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).
- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).

The following non-security bugs were fixed:

- 6lowpan: iphc: reset mac_header after decompress to fix panic (bsc#1051510).
- 9p: clear dangling pointers in p9stat_free (bsc#1051510).
- 9p locks: fix glock.client_id leak in do_lock (bsc#1051510).
- 9p/net: fix memory leak in p9_client_create (bsc#1051510).
- 9p/net: put a lower bound on msize (bsc#1051510).
- 9p: use inode-&gt;i_lock to protect i_size_write() under 32-bit (bsc#1051510).
- acpi/APEI: Clear GHES block_status before panic() (bsc#1051510).
- acpi/device_sysfs: Avoid OF modalias creation for removed device (bsc#1051510).
- acpi/nfit: Block function zero DSMs (bsc#1051510).
- acpi, nfit: Fix Address Range Scrub completion tracking (bsc#1124969).
- acpi/nfit: Fix bus command validation (bsc#1051510).
- acpi/nfit: Fix command-supported detection (bsc#1051510).
- acpi/nfit: Fix race accessing memdev in nfit_get_smbios_id() (bsc#1122662).
- acpi/nfit: Fix user-initiated ARS to be 'ARS-long' rather than 'ARS-short' (bsc#1124969).
- acpi: NUMA: Use correct type for printing addresses on i386-PAE (bsc#1051510).
- acpi: power: Skip duplicate power resource references in _PRx (bsc#1051510).
- acpi / video: Extend chassis-type detection with a 'Lunch Box' check (bsc#1051510).
- acpi / video: Refactor and fix dmi_is_desktop() (bsc#1051510).
- add 1 entry 2bcbd406715dca256912b9c5ae449c7968f15705
- Add delay-init quirk for Corsair K70 RGB keyboards (bsc#1087092).
- af_iucv: Move sockaddr length checks to before accessing sa_family in bind and connect handlers (bsc#1051510).
- alsa: bebob: fix model-id of unit for Apogee Ensemble (bsc#1051510).
- alsa: bebob: use more identical mod_alias for Saffire Pro 10 I/O against Liquid Saffire 56 (bsc#1051510).
- alsa: compress: Fix stop handling on compressed capture streams (bsc#1051510).
- alsa: compress: prevent potential divide by zero bugs (bsc#1051510).
- alsa: firewire-motu: fix construction of PCM frame for capture direction (bsc#1051510).
- alsa: hda - Add mute LED support for HP ProBook 470 G5 (bsc#1051510).
- alsa: hda - Add quirk for HP EliteBook 840 G5 (bsc#1051510).
- alsa: hda/ca0132 - Fix build error without CONFIG_PCI (bsc#1051510).
- alsa: hda/realtek: Disable PC beep in passthrough on alc285 (bsc#1051510).
- alsa: hda/realtek: Enable audio jacks of ASUS UX362FA with ALC294 (bsc#1051510).
- alsa: hda/realtek - Fixed hp_pin no value (bsc#1051510).
- alsa: hda/realtek - Fix lose hp_pins for disable auto mute (bsc#1051510).
- alsa: hda/realtek - Headset microphone and internal speaker support for System76 oryp5 (bsc#1051510).
- alsa: hda/realtek - Headset microphone support for System76 darp5 (bsc#1051510).
- alsa: hda/realtek - Reduce click noise on Dell Precision 5820 headphone (bsc#1126131).
- alsa: hda/realtek - Use a common helper for hp pin reference (bsc#1051510).
- alsa: hda - Serialize codec registrations (bsc#1122944).
- alsa: hda - Use standard device registration for beep (bsc#1122944).
- alsa: oxfw: add support for APOGEE duet FireWire (bsc#1051510).
- alsa: usb-audio: Add Opus #3 to quirks for native DSD support (bsc#1051510).
- alsa: usb-audio: Add support for new T+A USB DAC (bsc#1051510).
- alsa: usb-audio: Fix implicit fb endpoint setup by quirk (bsc#1051510).
- altera-stapl: check for a null key before strcasecmp'ing it (bsc#1051510).
- amd-xgbe: Fix mdio access for non-zero ports and clause 45 PHYs (bsc#1122927).
- apparmor: Fix aa_label_build() error handling for failed merges (bsc#1051510).
- applicom: Fix potential Spectre v1 vulnerabilities (bsc#1051510).
- aquantia: Setup max_mtu in ndev to enable jumbo frames (bsc#1051510).
- arm64: fault: avoid send SIGBUS two times (bsc#1126393).
- arm: 8802/1: Call syscall_trace_exit even when system call skipped (bsc#1051510).
- arm: 8808/1: kexec:offline panic_smp_self_stop CPU (bsc#1051510).
- arm: 8814/1: mm: improve/fix ARM v7_dma_inv_range() unaligned address handling (bsc#1051510).
- arm: 8815/1: V7M: align v7m_dma_inv_range() with v7 counterpart (bsc#1051510).
- arm/arm64: kvm: Rename function kvm_arch_dev_ioctl_check_extension() (bsc#1126393).
- arm/arm64: kvm: vgic: Force VM halt when changing the active state of GICv3 PPIs/SGIs (bsc#1051510).
- arm: cns3xxx: Fix writing to wrong PCI config registers after alignment (bsc#1051510).
- arm: cns3xxx: Use actual size reads for PCIe (bsc#1051510).
- arm: imx: update the cpu power up timing setting on i.mx6sx (bsc#1051510).
- arm: iop32x/n2100: fix PCI IRQ mapping (bsc#1051510).
- arm: kvm: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1051510).
- arm: mmp/mmp2: fix cpu_is_mmp2() on mmp2-dt (bsc#1051510).
- arm: OMAP1: ams-delta: Fix possible use of uninitialized field (bsc#1051510).
- arm: OMAP2+: hwmod: Fix some section annotations (bsc#1051510).
- arm: OMAP2+: prm44xx: Fix section annotation on omap44xx_prm_enable_io_wakeup (bsc#1051510).
- arm: pxa: avoid section mismatch warning (bsc#1051510).
- arm: tango: Improve ARCH_MULTIPLATFORM compatibility (bsc#1051510).
- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bsc#1051510).
- ASoC: dapm: change snprintf to scnprintf for possible overflow (bsc#1051510).
- ASoC: dma-sh7760: cleanup a debug printk (bsc#1051510).
- ASoC: fsl_esai: fix register setting issue in RIGHT_J mode (bsc#1051510).
- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bsc#1051510).
- ASoC: imx-audmux: change snprintf to scnprintf for possible overflow (bsc#1051510).
- ASoC: imx-sgtl5000: put of nodes if finding codec fails (bsc#1051510).
- ASoC: Intel: Haswell/Broadwell: fix setting for .dynamic field (bsc#1051510).
- ASoC: msm8916-wcd-analog: add missing license information (bsc#1051510).
- ASoC: qcom: Fix of-node refcount unbalance in apq8016_sbc_parse_of() (bsc#1051510).
- ASoC: rsnd: fixup rsnd_ssi_master_clk_start() user count check (bsc#1051510).
- ASoC: rt5514-spi: Fix potential NULL pointer dereference (bsc#1051510).
- assoc_array: Fix shortcut creation (bsc#1051510).
- ata: ahci: mvebu: remove stale comment (bsc#1051510).
- ath9k: Avoid OF no-EEPROM quirks without qca,no-eeprom (bsc#1051510).
- ath9k: dynack: check da-&gt;enabled first in sampling routines (bsc#1051510).
- ath9k: dynack: make ewma estimation faster (bsc#1051510).
- ath9k: dynack: use authentication messages for 'late' ack (bsc#1051510).
- atm: he: fix sign-extension overflow on large shift (bsc#1051510).
- ax25: fix a use-after-free in ax25_fillin_cb() (networking-stable-19_01_04).
- ax25: fix possible use-after-free (bsc#1051510).
- backlight: pwm_bl: Use gpiod_get_value_cansleep() to get initial (bsc#1113722)
- batman-adv: Avoid WARN on net_device without parent in netns (bsc#1051510).
- batman-adv: fix uninit-value in batadv_interface_tx() (bsc#1051510).
- batman-adv: Force mac header to start of data on xmit (bsc#1051510).
- be2net: do not flip hw_features when VXLANs are added/deleted (bsc#1050252).
- bio: Introduce BIO_ALLOCED flag and check it in bio_free (bsc#1128094).
- blkdev: avoid migration stalls for blkdev pages (bsc#1084216).
- blk-mq: fix a hung issue when fsync (bsc#1125252).
- blk-mq: fix kernel oops in blk_mq_tag_idle() (bsc#1051510).
- block: break discard submissions into the user defined size (git-fixes).
- block: cleanup __blkdev_issue_discard() (git-fixes).
- block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).
- blockdev: Fix livelocks on loop device (bsc#1124984).
- block: do not deal with discard limit in blkdev_issue_discard() (git-fixes).
- block: do not use bio-&gt;bi_vcnt to figure out segment number (bsc#1128895).
- block: do not warn when doing fsync on read-only devices (bsc#1125252).
- block: fix 32 bit overflow in __blkdev_issue_discard() (git-fixes).
- block: fix infinite loop if the device loses discard capability (git-fixes).
- block/loop: Use global lock for ioctl() operation (bsc#1124974).
- block: make sure discard bio is aligned with logical block size (git-fixes).
- block: make sure writesame bio is aligned with logical block size (git-fixes).
- block: move bio_integrity_{intervals,bytes} into blkdev.h (bsc#1114585).
- block/swim3: Fix -EBUSY error when re-opening device after unmount (git-fixes).
- bluetooth: Fix locking in bt_accept_enqueue() for BH context (bsc#1051510).
- bluetooth: Fix unnecessary error message for HCI request completion (bsc#1051510).
- bnx2x: Assign unique DMAE channel number for FW DMAE transactions (bsc#1086323).
- bnx2x: Clear fip MAC when fcoe offload support is disabled (bsc#1086323).
- bnx2x: Fix NULL pointer dereference in bnx2x_del_all_vlans() on some hw (bsc#1086323).
- bnx2x: Remove configured vlans as part of unload sequence (bsc#1086323).
- bnx2x: Send update-svid ramrod with retry/poll flags enabled (bsc#1086323).
- bnxt_en: Fix typo in firmware message timeout logic (bsc#1086282 ).
- bnxt_en: Wait longer for the firmware message response to complete (bsc#1086282).
- bonding: update nest level on unlink (git-fixes).
- bpf: decrease usercnt if bpf_map_new_fd() fails in bpf_map_get_fd_by_id() (bsc#1083647).
- bpf: drop refcount if bpf_map_new_fd() fails in map_create() (bsc#1083647).
- bpf: fix lockdep false positive in percpu_freelist (bsc#1083647).
- bpf: fix replace_map_fd_with_map_ptr's ldimm64 second imm field (bsc#1083647).
- bpf: fix sanitation rewrite in case of non-pointers (bsc#1083647).
- bpf: Fix syscall's stackmap lookup potential deadlock (bsc#1083647).
- bpf, lpm: fix lookup bug in map_delete_elem (bsc#1083647).
- bpf/verifier: fix verifier instability (bsc#1056787).
- bsg: allocate sense buffer if requested (bsc#1106811).
- bsg: Do not copy sense if no response buffer is allocated (bsc#1106811,bsc#1126555).
- btrfs: dedupe_file_range ioctl: remove 16MiB restriction (bsc#1127494).
- btrfs: do not unnecessarily pass write_lock_level when processing leaf (bsc#1126802).
- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128451).
- btrfs: fix clone vs chattr NODATASUM race (bsc#1127497).
- btrfs: fix corruption reading shared and compressed extents after hole punching (bsc#1126476).
- btrfs: fix deadlock when allocating tree block during leaf/node split (bsc#1126806).
- btrfs: fix deadlock when using free space tree due to block group creation (bsc#1126804).
- btrfs: fix fsync after succession of renames and unlink/rmdir (bsc#1126488).
- btrfs: fix fsync after succession of renames of different files (bsc#1126481).
- btrfs: fix invalid-free in btrfs_extent_same (bsc#1127498).
- btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bsc#1126803).
- btrfs: fix use-after-free of cmp workspace pages (bsc#1127603).
- btrfs: grab write lock directly if write_lock_level is the max level (bsc#1126802).
- btrfs: Improve btrfs_search_slot description (bsc#1126802).
- btrfs: move get root out of btrfs_search_slot to a helper (bsc#1126802).
- btrfs: qgroup: Cleanup old subtree swap code (bsc#1063638).
- btrfs: qgroup: Do not trace subtree if we're dropping reloc tree (bsc#1063638).
- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bsc#1129327).
- btrfs: qgroup: Fix root item corruption when multiple same source snapshots are created with quota enabled (bsc#1122324).
- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1063638).
- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1063638).
- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1063638).
- btrfs: qgroup: Introduce trace event to analyse the number of dirty extents accounted (bsc#1063638 dependency).
- btrfs: qgroup: Make qgroup async transaction commit more aggressive (bsc#1113042).
- btrfs: qgroup: Only trace data extents in leaves if we're relocating data block group (bsc#1063638).
- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1063638).
- btrfs: qgroup: Search commit root for rescan to avoid missing extent (bsc#1129326).
- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1063638).
- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1063638).
- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf (bsc#1129327).
- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1063638).
- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1129497).
- btrfs: remove always true check in unlock_up (bsc#1126802).
- btrfs: remove superfluous free_extent_buffer in read_block_for_search (bsc#1126802).
- btrfs: remove unnecessary level check in balance_level (bsc#1126802).
- btrfs: remove unused check of skip_locking (bsc#1126802).
- btrfs: reuse cmp workspace in EXTENT_SAME ioctl (bsc#1127495).
- btrfs: send, fix race with transaction commits that create snapshots (bsc#1126802).
- btrfs: simplify IS_ERR/PTR_ERR checks (bsc#1126481).
- btrfs: split btrfs_extent_same (bsc#1127493).
- btrfs: use kvzalloc for EXTENT_SAME temporary data (bsc#1127496).
- btrfs: use more straightforward extent_buffer_uptodate check (bsc#1126802).
- can: bcm: check timer values before ktime conversion (bsc#1051510).
- can: dev: __can_get_echo_skb(): fix bogous check for non-existing skb by removing it (bsc#1051510).
- can: gw: ensure DLC boundaries after CAN frame modification (bsc#1051510).
- cdc-acm: fix abnormal DATA RX issue for Mediatek Preloader (bsc#1051510).
- cdc-wdm: pass return value of recover_from_urb_loss (bsc#1051510).
- ceph: avoid repeatedly adding inode to mdsc-&gt;snap_flush_list (bsc#1126790).
- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125799).
- cfg80211: extend range deviation for DMG (bsc#1051510).
- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).
- char/mwave: fix potential Spectre v1 vulnerability (bsc#1051510).
- checkstack.pl: fix for aarch64 (bsc#1051510).
- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).
- cifs: add missing debug entries for kconfig options (bsc#1051510).
- cifs: add missing support for ACLs in smb 3.11 (bsc#1051510).
- cifs: add sha512 secmech (bsc#1051510).
- cifs: Add support for reading attributes on smb2+ (bsc#1051510).
- cifs: Add support for writing attributes on smb2+ (bsc#1051510).
- cifs: Always resolve hostname before reconnecting (bsc#1051510).
- cifs: connect to servername instead of IP for IPC$ share (bsc#1051510).
- cifs: do not log STATUS_NOT_FOUND errors for DFS (bsc#1051510).
- cifs: Do not modify mid entry after submitting I/O in cifs_call_async (bsc#1051510).
- cifs: Fix error mapping for smb2_LOCK command which caused OFD lock problem (bsc#1051510).
- cifs: Fix memory leak in smb2_set_ea() (bsc#1051510).
- cifs: Fix NULL pointer dereference of devname (bnc#1129519).
- cifs: fix return value for cifs_listxattr (bsc#1051510).
- cifs: Fix separator when building path from dentry (bsc#1051510).
- cifs: fix set info (bsc#1051510).
- cifs: fix sha512 check in cifs_crypto_secmech_release (bsc#1051510).
- cifs: fix wrapping bugs in num_entries() (bsc#1051510).
- cifs: For smb2 security informaion query, check for minimum sized security descriptor instead of sizeof FileAllInformation class (bsc#1051510).
- cifs: hide unused functions (bsc#1051510).
- cifs: hide unused functions (bsc#1051510).
- cifs: implement v3.11 preauth integrity (bsc#1051510).
- cifs: invalidate cache when we truncate a file (bsc#1051510).
- cifs: make 'nodfs' mount opt a superblock flag (bsc#1051510).
- cifs: OFD locks do not conflict with eachothers (bsc#1051510).
- cifs: prevent integer overflow in nxt_dir_entry() (bsc#1051510).
- cifs: prototype declaration and definition for smb 2 - 3 and cifsacl mount options (bsc#1051510).
- cifs: prototype declaration and definition to set acl for smb 2 - 3 and cifsacl mount options (bsc#1051510).
- cifs: refactor crypto shash/sdesc allocation&amp;free (bsc#1051510).
- cifs: smb2ops: Fix listxattr() when there are no EAs (bsc#1051510).
- cifs: Use smb 2 - 3 and cifsacl mount options getacl functions (bsc#1051510).
- cifs: Use smb 2 - 3 and cifsacl mount options setacl function (bsc#1051510).
- cifs: Use ULL suffix for 64-bit constant (bsc#1051510).
- clk: armada-370: fix refcount leak in a370_clk_init() (bsc#1051510).
- clk: armada-xp: fix refcount leak in axp_clk_init() (bsc#1051510).
- clk: dove: fix refcount leak in dove_clk_init() (bsc#1051510).
- clk: highbank: fix refcount leak in hb_clk_init() (bsc#1051510).
- clk: imx6q: fix refcount leak in imx6q_clocks_init() (bsc#1051510).
- clk: imx6q: reset exclusive gates on init (bsc#1051510).
- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bsc#1051510).
- clk: imx6sx: fix refcount leak in imx6sx_clocks_init() (bsc#1051510).
- clk: imx7d: fix refcount leak in imx7d_clocks_init() (bsc#1051510).
- clk: kirkwood: fix refcount leak in kirkwood_clk_init() (bsc#1051510).
- clk: mv98dx3236: fix refcount leak in mv98dx3236_clk_init() (bsc#1051510).
- clk: qoriq: fix refcount leak in clockgen_init() (bsc#1051510).
- clk: rockchip: fix typo in rk3188 spdif_frac parent (bsc#1051510).
- clk: samsung: exynos4: fix refcount leak in exynos4_get_xom() (bsc#1051510).
- clk: socfpga: fix refcount leak (bsc#1051510).
- clk: sunxi: A31: Fix wrong AHB gate number (bsc#1051510).
- clk: sunxi-ng: a33: Set CLK_SET_RATE_PARENT for all audio module clocks (bsc#1051510).
- clk: sunxi-ng: enable so-said LDOs for A64 SoC's pll-mipi clock (bsc#1051510).
- clk: sunxi-ng: h3/h5: Fix CSI_MCLK parent (bsc#1051510).
- clk: sunxi-ng: sun8i-a23: Enable PLL-MIPI LDOs when ungating it (bsc#1051510).
- clk: uniphier: Fix update register for CPU-gear (bsc#1051510).
- clk: vf610: fix refcount leak in vf610_clocks_init() (bsc#1051510).
- clocksource/drivers/exynos_mct: Fix error path in timer resources initialization (bsc#1051510).
- clocksource/drivers/integrator-ap: Add missing of_node_put() (bsc#1051510).
- clocksource/drivers/sun5i: Fail gracefully when clock rate is unavailable (bsc#1051510).
- configfs: fix registered group removal (bsc#1051510).
- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).
- cpufreq: Cap the default transition delay value to 10 ms (bsc#1127042).
- cpufreq: conservative: Take limits changes into account properly (bsc#1051510).
- cpufreq: governor: Avoid accessing invalid governor_data (bsc#1051510).
- cpufreq: governor: Drop min_sampling_rate (bsc#1127042).
- cpufreq: governor: Ensure sufficiently large sampling intervals (bsc#1127042).
- cpufreq: imx6q: add return value check for voltage scale (bsc#1051510).
- cpufreq: Use transition_delay_us for legacy governors as well (bsc#1127042).
- cpuidle: big.LITTLE: fix refcount leak (bsc#1051510).
- cramfs: fix abad comparison when wrap-arounds occur (bsc#1051510).
- crypto: aes_ti - disable interrupts while accessing S-box (bsc#1051510).
- crypto: ahash - fix another early termination in hash walk (bsc#1051510).
- crypto: arm64/aes-ccm - fix logical bug in AAD MAC handling (bsc#1051510).
- crypto: arm/crct10dif - revert to C code for short inputs (bsc#1051510).
- crypto: authencesn - Avoid twice completion call in decrypt path (bsc#1051510).
- crypto: authenc - fix parsing key with misaligned rta_len (bsc#1051510).
- crypto: bcm - convert to use crypto_authenc_extractkeys() (bsc#1051510).
- crypto: brcm - Fix some set-but-not-used warning (bsc#1051510).
- crypto: caam - fixed handling of sg list (bsc#1051510).
- crypto: caam - fix zero-length buffer DMA mapping (bsc#1051510).
- crypto: cavium/zip - fix collision with generic cra_driver_name (bsc#1051510).
- crypto: crypto4xx - add missing of_node_put after of_device_is_available (bsc#1051510).
- crypto: crypto4xx - Fix wrong ppc4xx_trng_probe()/ppc4xx_trng_remove() arguments (bsc#1051510).
- crypto: hash - set CRYPTO_TFM_NEED_KEY if -&gt;setkey() fails (bsc#1051510).
- crypto: testmgr - skip crc32c context test for ahash algorithms (bsc#1051510).
- crypto: tgr192 - fix unaligned memory access (bsc#1051510).
- crypto: user - support incremental algorithm dumps (bsc#1120902).
- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bsc#1051510).
- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bsc#1051510).
- cw1200: drop useless LIST_HEAD (bsc#1051510).
- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bsc#1051510).
- cw1200: fix missing unlock on error in cw1200_hw_scan() (bsc#1051510).
- dccp: fool proof ccid_hc_[rt]x_parse_options() (bsc#1051510).
- debugfs: fix debugfs_rename parameter checking (bsc#1051510).
- dlm: Do not swamp the CPU with callbacks queued during recovery (bsc#1051510).
- dlm: fixed memory leaks after failed ls_remove_names allocation (bsc#1051510).
- dlm: lost put_lkb on error path in receive_convert() and receive_unlock() (bsc#1051510).
- dlm: memory leaks on error path in dlm_user_request() (bsc#1051510).
- dlm: possible memory leak on error path in create_lkb() (bsc#1051510).
- dmaengine: at_hdmac: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: at_hdmac: fix memory leak in at_dma_xlate() (bsc#1051510).
- dmaengine: at_hdmac: fix module unloading (bsc#1051510).
- dmaengine: at_xdmac: Fix wrongfull report of a channel as in use (bsc#1051510).
- dmaengine: bcm2835: Fix abort of transactions (bsc#1051510).
- dmaengine: bcm2835: Fix interrupt race on RT (bsc#1051510).
- dmaengine: dma-jz4780: Return error if not probed from DT (bsc#1051510).
- dmaengine: dmatest: Abort test in case of mapping error (bsc#1051510).
- dmaengine: dw: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: dw: Fix FIFO size for Intel Merrifield (bsc#1051510).
- dmaengine: imx-dma: fix wrong callback invoke (bsc#1051510).
- dmaengine: mv_xor: Use correct device for DMA API (bsc#1051510).
- dmaengine: pl330: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: sa11x0: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: st_fdma: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: stm32-dma: fix incomplete configuration in cyclic mode (bsc#1051510).
- dmaengine: xilinx_dma: Remove __aligned attribute on zynqmp_dma_desc_ll (bsc#1051510).
- dma: Introduce dma_max_mapping_size() (bsc#1120008).
- dm cache metadata: verify cache has blocks in blocks_are_clean_separate_dirty() (git-fixes).
- dm: call blk_queue_split() to impose device limits on bios (git-fixes).
- dm: do not allow readahead to limit IO size (git-fixes).
- dm thin: send event about thin-pool state change _after_ making it (git-fixes).
- dm zoned: Fix target BIO completion handling (git-fixes).
- doc: rcu: Suspicious RCU usage is a warning (bsc#1051510).
- doc/README.SUSE: Correct description for building a kernel (bsc#1123348)
- Do not log confusing message on reconnect by default (bsc#1129664).
- Do not log expected error on DFS referral request (bsc#1051510).
- driver core: Do not resume suppliers under device_links_write_lock() (bsc#1051510).
- driver core: Move async_synchronize_full call (bsc#1051510).
- drivers: core: Remove glue dirs from sysfs earlier (bsc#1051510).
- drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389, bsc#1126579).
- drivers: hv: vmbus: preserve hv_ringbuffer_get_debuginfo kABI (bsc#1126389, bsc#1126579).
- drivers: hv: vmbus: Return -EINVAL for the sys files for unopened channels (bsc#1126389, bsc#1126579).
- drivers/misc/sgi-gru: fix Spectre v1 vulnerability (bsc#1051510).
- drivers/net/ethernet/qlogic/qed/qed_rdma.h: fix typo (bsc#1086314 bsc#1086313 bsc#1086301 ).
- drivers/sbus/char: add of_node_put() (bsc#1051510).
- drm/amdgpu: Add delay after enable RLC ucode (bsc#1051510).
- drm/ast: Fix connector leak during driver unload (bsc#1051510).
- drm/ast: fixed reading monitor EDID not stable issue (bsc#1051510).
- drm/atomic-helper: Complete fake_commit-&gt;flip_done potentially earlier (bsc#1051510).
- drm: Block fb changes for async plane updates (bsc#1051510).
- drm/bridge: tc358767: add defines for DP1_SRCCTRL &amp; PHY_2LANE (bsc#1051510).
- drm/bridge: tc358767: fix initial DP0/1_SRCCTRL value (bsc#1051510).
- drm/bridge: tc358767: fix output H/V syncs (bsc#1051510).
- drm/bridge: tc358767: fix single lane configuration (bsc#1051510).
- drm/bridge: tc358767: reject modes which require too much BW (bsc#1051510).
- drm/bufs: Fix Spectre v1 vulnerability (bsc#1051510).
- drm: Clear state-&gt;acquire_ctx before leaving drm_atomic_helper_commit_duplicated_state() (bsc#1051510).
- drm: disable uncached DMA optimization for ARM and arm64 (bsc#1051510).
- drm/etnaviv: NULL vs IS_ERR() buf in etnaviv_core_dump() (bsc#1113722)
- drm/etnaviv: potential NULL dereference (bsc#1113722)
- drm/fb-helper: Partially bring back workaround for bugs of SDL 1.2 (bsc#1113722)
- drm: Fix error handling in drm_legacy_addctx (bsc#1113722)
- drm/i915: Block fbdev HPD processing during suspend (bsc#1113722)
- drm/i915/fbdev: Actually configure untiled displays (bsc#1113722)
- drm/i915: Flush GPU relocs harder for gen3 (bsc#1113722)
- drm/i915/gvt: Fix mmap range check (bsc#1120902)
- drm/i915/gvt: free VFIO region space in vgpu detach (bsc#1113722)
- drm/i915/gvt: release shadow batch buffer and wa_ctx before destroy one workload (bsc#1051510).
- drm/i915/opregion: fix version check (bsc#1113722)
- drm/i915/opregion: rvda is relative from opregion base in opregion (bsc#1113722)
- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1113722)
- drm/i915: Redefine some Whiskey Lake SKUs (bsc#1051510).
- drm/i915: Use the correct crtc when sanitizing plane mapping (bsc#1113722)
- drm/meson: add missing of_node_put (bsc#1051510).
- drm/modes: Prevent division by zero htotal (bsc#1051510).
- drm/msm: Fix error return checking (bsc#1051510).
- drm/msm: Grab a vblank reference when waiting for commit_done (bsc#1051510).
- drm/msm: Unblock writer if reader closes file (bsc#1051510).
- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1113722)
- drm/nouveau: Do not spew kernel WARNING for each timeout (bsc#1126480).
- drm/nouveau: Do not WARN_ON VCPI allocation failures (bsc#1113722)
- drm/nouveau/falcon: avoid touching registers if engine is off (bsc#1051510).
- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1113722)
- drm/nouveau/tmr: detect stalled gpu timer and break out of waits (bsc#1123538).
- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1113722)
- drm: Reorder set_property_atomic to avoid returning with an active ww_ctx (bsc#1051510).
- drm/rockchip: fix for mailbox read size (bsc#1051510).
- drm/shmob: Fix return value check in shmob_drm_probe (bsc#1113722)
- drm/sun4i: tcon: Prepare and enable TCON channel 0 clock at init (bsc#1051510).
- drm/vmwgfx: Do not double-free the mode stored in par-&gt;set_mode (bsc#1103429)
- drm/vmwgfx: Fix setting of dma masks (bsc#1120902)
- drm/vmwgfx: Return error code from vmw_execbuf_copy_fence_user (bsc#1120902)
- e1000e: allow non-monotonic SYSTIM readings (bsc#1051510).
- earlycon: Initialize port-&gt;uartclk based on clock-frequency property (bsc#1051510).
- earlycon: Remove hardcoded port-&gt;uartclk initialization in of_setup_earlycon (bsc#1051510).
- Enable CONFIG_RDMA_RXE=m also for ppc64le (bsc#1107665,)
- enic: fix build warning without CONFIG_CPUMASK_OFFSTACK (bsc#1051510).
- enic: fix checksum validation for IPv6 (bsc#1051510).
- esp6: fix memleak on error path in esp6_input (bsc#1051510).
- esp: Fix locking on page fragment allocation (bsc#1051510).
- esp: Fix memleaks on error paths (bsc#1051510).
- esp: Fix skb tailroom calculation (bsc#1051510).
- exportfs: do not read dentry after free (bsc#1051510).
- ext4: avoid kernel warning when writing the superblock to a dead device (bsc#1124981).
- ext4: check for shutdown and r/o file system in ext4_write_inode() (bsc#1124978).
- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bsc#1124980).
- ext4: Fix crash during online resizing (bsc#1122779).
- ext4: force inode writes when nfsd calls commit_metadata() (bsc#1125125).
- ext4: include terminating u32 in size of xattr entries when expanding inodes (bsc#1124976).
- ext4: make sure enough credits are reserved for dioread_nolock writes (bsc#1124979).
- ext4: track writeback errors using the generic tracking infrastructure (bsc#1124982).
- fanotify: fix handling of events on child sub-directory (bsc#1122019).
- fat: validate -&gt;i_start before using (bsc#1051510).
- fbdev: chipsfb: remove set but not used variable 'size' (bsc#1113722)
- firmware/efi: Add NULL pointer checks in efivars API functions (bsc#1051510).
- Fix kabi issues with new transport sharing code (bsc#1114893).
- Fix problem with sharetransport= and NFSv4 (bsc#1114893).
- fix smb3-encryption breakage when CONFIG_DEBUG_SG=y (bsc#1051510).
- floppy: check_events callback should not return a negative number (bsc#1051510).
- fork: do not copy inconsistent signal handler state to child (bsc#1051510).
- fork: record start_time late (git-fixes).
- fork: unconditionally clear stack on fork (git-fixes).
- fs/cifs: require sha512 (bsc#1051510).
- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (git-fixes).
- fs/devpts: always delete dcache dentry-s in dput() (git-fixes).
- fuse: call pipe_buf_release() under pipe lock (bsc#1051510).
- fuse: continue to send FUSE_RELEASEDIR when FUSE_OPEN returns ENOSYS (bsc#1051510).
- fuse: decrement NR_WRITEBACK_TEMP on the right page (bsc#1051510).
- fuse: handle zero sized retrieve correctly (bsc#1051510).
- futex: Fix (possible) missed wakeup (bsc#1050549).
- gdrom: fix a memory leak bug (bsc#1051510).
- geneve: cleanup hard coded value for Ethernet header length (bsc#1123456).
- geneve: correctly handle ipv6.disable module parameter (bsc#1051510).
- geneve, vxlan: Do not check skb_dst() twice (bsc#1123456).
- geneve, vxlan: Do not set exceptions if skb-&gt;len &lt; mtu (bsc#1123456).
- genwqe: Fix size check (bsc#1051510).
- gfs2: Revert 'Fix loop in gfs2_rbm_find' (bsc#1120601).
- gianfar: fix a flooded alignment reports because of padding issue (bsc#1051510).
- gianfar: Fix Rx byte accounting for ndev stats (bsc#1051510).
- gianfar: prevent integer wrapping in the rx handler (bsc#1051510).
- gpio: altera-a10sr: Set proper output level for direction_output (bsc#1051510).
- gpio: pcf857x: Fix interrupts on multiple instances (bsc#1051510).
- gpio: pl061: handle failed allocations (bsc#1051510).
- gpio: pl061: Move irq_chip definition inside struct pl061 (bsc#1051510).
- gpio: vf610: Mask all GPIO interrupts (bsc#1051510).
- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1113722)
- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1113722)
- gpu: ipu-v3: image-convert: Prevent race between run and unprepare (bsc#1051510).
- gro_cell: add napi_disable in gro_cells_destroy (networking-stable-19_01_04).
- gro_cells: make sure device is up in gro_cells_receive() (git-fixes).
- hfs: do not free node before using (bsc#1051510).
- hfsplus: do not free node before using (bsc#1051510).
- hfsplus: prevent btree data loss on root split (bsc#1051510).
- hfs: prevent btree data loss on root split (bsc#1051510).
- hid: lenovo: Add checks to fix of_led_classdev_register (bsc#1051510).
- hpet: Fix missing '=' character in the __setup() code of hpet_mmap_enable (git-fixes).
- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bsc#1051510).
- hv: v4.12 API for hyperv-iommu (bsc#1122822).
- hwmon/k10temp: Add support for AMD family 17h, model 30h CPUs ().
- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs ().
- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bsc#1051510).
- hwmon: (lm80) fix a missing check of the status of smbus read (bsc#1051510).
- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (bsc#1051510).
- hwmon: (tmp421) Correct the misspelling of the tmp442 compatible attribute in OF device ID table (bsc#1051510).
- HYPERV/IOMMU: Add Hyper-V stub IOMMU driver (bsc#1122822).
- i2c-axxia: check for error conditions first (bsc#1051510).
- i2c: bcm2835: Clear current buffer pointers and counts after a transfer (bsc#1051510).
- i2c: cadence: Fix the hold bit setting (bsc#1051510).
- i2c: dev: prevent adapter retries and timeout being set as minus value (bsc#1051510).
- i2c: omap: Use noirq system sleep pm ops to idle device for suspend (bsc#1051510).
- i2c: sh_mobile: add support for r8a77990 (R-Car E3) (bsc#1051510).
- i40e: fix mac filter delete when setting mac address (bsc#1056658 bsc#1056662).
- i40e: report correct statistics when XDP is enabled (bsc#1056658 bsc#1056662).
- i40e: restore NETIF_F_GSO_IPXIP to netdev features (bsc#1056658 bsc#1056662).
- IB/core: Destroy QP if XRC QP fails (bsc#1046306).
- IB/core: Fix potential memory leak while creating MAD agents (bsc#1046306).
- IB/core: Unregister notifier before freeing MAD security (bsc#1046306).
- IB/hfi1: Close race condition on user context disable and close (bsc#1060463).
- IB/mlx5: Unmap DMA addr from HCA before IOMMU (bsc#1046305 ).
- ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357).
- ibmveth: fix DMA unmap error in ibmveth_xmit_start error path (networking-stable-19_01_04).
- ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726).
- ibmvnic: Increase maximum queue size limit (bsc#1121726).
- ibmvnic: Introduce driver limits for ring sizes (bsc#1121726).
- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).
- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).
- ide: pmac: add of_node_put() (bsc#1051510).
- ieee802154: ca8210: fix possible u8 overflow in ca8210_rx_done (bsc#1051510).
- ieee802154: lowpan_header_create check must check daddr (networking-stable-19_01_04).
- igb: Fix an issue that PME is not enabled during runtime suspend (bsc#1051510).
- iio: accel: kxcjk1013: Add KIOX010A acpi Hardware-ID (bsc#1051510).
- iio: adc: exynos-adc: Fix NULL pointer exception on unbind (bsc#1051510).
- iio: chemical: atlas-ph-sensor: correct IIO_TEMP values to millicelsius (bsc#1051510).
- input: bma150 - register input device after setting private data (bsc#1051510).
- input: elan_i2c - add acpi ID for touchpad in ASUS Aspire F5-573G (bsc#1051510).
- input: elan_i2c - add acpi ID for touchpad in Lenovo V330-15ISK (bsc#1051510).
- input: elan_i2c - add id for touchpad found in Lenovo s21e-20 (bsc#1051510).
- input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bsc#1051510).
- input: omap-keypad - fix idle configuration to not block SoC idle states (bsc#1051510).
- input: raspberrypi-ts - fix link error (git-fixes).
- input: raspberrypi-ts - select CONFIG_INPUT_POLLDEV (git-fixes).
- input: restore EV_ABS ABS_RESERVED (bsc#1051510).
- input: synaptics - enable RMI on ThinkPad T560 (bsc#1051510).
- input: synaptics - enable smbus for HP EliteBook 840 G4 (bsc#1051510).
- input: wacom_serial4 - add support for Wacom ArtPad II tablet (bsc#1051510).
- input: xpad - add support for SteelSeries Stratus Duo (bsc#1111666).
- intel_th: Do not reference unassigned outputs (bsc#1051510).
- intel_th: gth: Fix an off-by-one in output unassigning (bsc#1051510).
- iomap: fix integer truncation issues in the zeroing and dirtying helpers (bsc#1125947).
- iomap: warn on zero-length mappings (bsc#1127062).
- iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105).
- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).
- iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105).
- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129181).
- iommu: Document iommu_ops.is_attach_deferred() (bsc#1129182).
- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129205).
- iommu/vt-d: Check identity map for hot-added devices (bsc#1129183).
- iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105).
- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129184).
- ip6mr: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).
- ip6_tunnel: get the min mtu properly in ip6_tnl_xmit (bsc#1123456).
- ip6_tunnel: use the right value for ipv4 min mtu check in ip6_tnl_xmit (bsc#1123456).
- ipmi:pci: Blacklist a Realtek 'IPMI' device (git-fixes).
- ipmi:ssif: Fix handling of multi-part return messages (bsc#1051510).
- ip: on queued skb use skb_header_pointer instead of pskb_may_pull (git-fixes).
- ipsec: check return value of skb_to_sgvec always (bsc#1051510).
- ipv4: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).
- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (networking-stable-18_12_12).
- ipv4: speedup ipv6 tunnels dismantle (bsc#1122982).
- ipv6: addrlabel: per netns list (bsc#1122982).
- ipv6: Check available headroom in ip6_xmit() even without options (networking-stable-18_12_12).
- ipv6: Consider sk_bound_dev_if when binding a socket to an address (networking-stable-19_02_01).
- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (networking-stable-19_01_22).
- ipv6: explicitly initialize udp6_addr in udp_sock_create6() (networking-stable-19_01_04).
- ipv6: fix kernel-infoleak in ipv6_local_error() (networking-stable-19_01_20).
- ipv6: speedup ipv6 tunnels dismantle (bsc#1122982). Refresh patches.suse/ip6_vti-fix-a-null-pointer-deference-when-destroy-vt.patch
- ipv6: sr: properly initialize flowi6 prior passing to ip6_route_output (networking-stable-18_12_12).
- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (networking-stable-19_01_22).
- ipv6: tunnels: fix two use-after-free (networking-stable-19_01_04).
- ip: validate header length on virtual device xmit (networking-stable-19_01_04).
- ipvlan, l3mdev: fix broken l3s mode wrt local routes (networking-stable-19_02_01).
- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bsc#1051510).
- irqchip/gic-v3-its: Do not bind LPI to unavailable NUMA node (bsc#1051510).
- irqchip/gic-v3-its: Fix ITT_entry_size accessor (bsc#1051510).
- iscsi target: fix session creation failure handling (bsc#1051510).
- isdn: avm: Fix string plus integer warning from Clang (bsc#1051510).
- isdn: fix kernel-infoleak in capi_unlocked_ioctl (bsc#1051510).
- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bsc#1051510).
- isdn: i4l: isdn_tty: Fix some concurrency double-free bugs (bsc#1051510).
- iser: set sector for ambiguous mr status errors (bsc#1051510).
- iwlwifi: mvm: avoid possible access out of array (bsc#1051510).
- iwlwifi: mvm: fix A-MPDU reference assignment (bsc#1051510).
- iwlwifi: mvm: fix RSS config command (bsc#1051510).
- iwlwifi: pcie: fix emergency path (bsc#1051510).
- iwlwifi: pcie: fix TX while flushing (bsc#1120902).
- ixgbe: Be more careful when modifying MAC filters (bsc#1051510).
- ixgbe: check return value of napi_complete_done() (bsc#1051510).
- ixgbe: recognize 1000BaseLX SFP modules as 1Gbps (bsc#1051510).
- jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bsc#1051510).
- kabi: cpufreq: keep min_sampling_rate in struct dbs_data (bsc#1127042).
- kabi: fix xhci kABI stability (bsc#1119086).
- kabi: handle addition of ip6addrlbl_table into struct netns_ipv6 (bsc#1122982).
- kabi: handle addition of uevent_sock into struct net (bsc#1122982).
- kabi: Preserve kABI for dma_max_mapping_size() (bsc#1120008).
- kabi: protect struct sctp_association (kabi).
- kabi: protect struct smc_buf_desc (bnc#1117947, LTC#173662).
- kabi: protect struct smc_link (bnc#1117947, LTC#173662).
- kabi: protect vhost_log_write (kabi).
- kabi: restore ip_tunnel_delete_net() (bsc#1122982).
- kABI workaroudn for ath9k ath_node.ackto type change (bsc#1051510).
- kABI workaround for bt_accept_enqueue() change (bsc#1051510).
- kABI workaround for deleted snd_hda_register_beep_device() (bsc#1122944).
- kABI workaround for snd_hda_bus.bus_probing addition (bsc#1122944).
- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).
- kconfig: fix file name and line number of warn_ignored_character() (bsc#1051510).
- kconfig: fix line numbers for if-entries in menu tree (bsc#1051510).
- kconfig: fix memory leak when EOF is encountered in quotation (bsc#1051510).
- kconfig: fix the rule of mainmenu_stmt symbol (bsc#1051510).
- kernel/exit.c: release ptraced tasks before zap_pid_ns_processes (git-fixes).
- keys: allow reaching the keys quotas exactly (bsc#1051510).
- keys: Timestamp new keys (bsc#1051510).
- kgdboc: fix KASAN global-out-of-bounds bug in param_set_kgdboc_var() (bsc#1051510).
- kgdboc: Fix restrict error (bsc#1051510).
- kgdboc: Fix warning with module build (bsc#1051510).
- kobject: add kobject_uevent_net_broadcast() (bsc#1122982).
- kobject: copy env blob in one go (bsc#1122982).
- kobject: factorize skb setup in kobject_uevent_net_broadcast() (bsc#1122982).
- kprobes: Return error if we fail to reuse kprobe instead of BUG_ON() (bsc#1051510).
- kvm: arm/arm64: Properly protect VGIC locks from IRQs (bsc#1117155).
- kvm: arm/arm64: VGIC/ITS: Promote irq_lock() in update_affinity (bsc#1117155).
- kvm: arm/arm64: VGIC/ITS: protect kvm_read_guest() calls with SRCU lock (bsc#1117155).
- kvm: arm/arm64: VGIC/ITS save/restore: protect kvm_read_guest() calls (bsc#1117155).
- kvm: mmu: Fix race in emulated page table writes (bsc#1129284).
- kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129291).
- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129292).
- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129293).
- kvm: PPC: Book3S PR: Set hflag to indicate that POWER9 supports 1T segments (bsc#1124589).
- kvm: sev: Fail KVM_SEV_INIT if already initialized (bsc#1114279).
- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129294).
- kvm: x86: Add AMD's EX_CFG to the list of ignored MSRs (bsc#1127082).
- kvm: x86: fix L1TF's MMIO GFN calculation (bsc#1124204).
- kvm: x86: Fix single-step debugging (bsc#1129295).
- kvm: x86: Use jmp to invoke kvm_spurious_fault() from .fixup (bsc#1129296).
- l2tp: copy 4 more bytes to linear part if necessary (networking-stable-19_02_01).
- l2tp: fix infoleak in l2tp_ip6_recvmsg() (git-fixes).
- l2tp: fix reading optional fields of L2TPv3 (networking-stable-19_02_01).
- lan78xx: Resolve issue with changing MAC address (bsc#1051510).
- leds: lp5523: fix a missing check of return value of lp55xx_read (bsc#1051510).
- leds: lp55xx: fix null deref on firmware load failure (bsc#1051510).
- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125800).
- libceph: handle an empty authorize reply (bsc#1126789).
- lib/div64.c: off by one in shift (bsc#1051510).
- libnvdimm: Fix altmap reservation size calculation (bsc#1127682).
- libnvdimm/label: Clear 'updating' flag after label-set update (bsc#1129543).
- libnvdimm/pmem: Honor force_raw for legacy pmem regions (bsc#1129551).
- lib/rbtree-test: lower default params (git-fixes).
- lightnvm: fail fast on passthrough commands (bsc#1125780).
- livepatch: Change unsigned long old_addr -&gt; void *old_func in struct klp_func (bsc#1071995).
- livepatch: Consolidate klp_free functions (bsc#1071995 ).
- livepatch: core: Return EOPNOTSUPP instead of ENOSYS (bsc#1071995).
- livepatch: Define a macro for new API identification (bsc#1071995).
- livepatch: Do not block the removal of patches loaded after a forced transition (bsc#1071995).
- livepatch: Introduce klp_for_each_patch macro (bsc#1071995 ).
- livepatch: Module coming and going callbacks can proceed with all listed patches (bsc#1071995).
- livepatch: Proper error handling in the shadow variables selftest (bsc#1071995).
- livepatch: Remove ordering (stacking) of the livepatches (bsc#1071995).
- livepatch: Remove signal sysfs attribute (bsc#1071995 ).
- livepatch: return -ENOMEM on ptr_id() allocation failure (bsc#1071995).
- livepatch: Send a fake signal periodically (bsc#1071995 ).
- livepatch: Shuffle klp_enable_patch()/klp_disable_patch() code (bsc#1071995).
- livepatch: Simplify API by removing registration step (bsc#1071995).
- llc: do not use sk_eat_skb() (bsc#1051510).
- lockd: fix access beyond unterminated strings in prints (git-fixes).
- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).
- loop: drop caches if offset or block_size are changed (bsc#1124975).
- loop: Reintroduce lo_ctl_mutex removed by commit 310ca162d (bsc#1124974).
- LSM: Check for NULL cred-security on free (bsc#1051510).
- mac80211: Add attribute aligned(2) to struct 'action' (bsc#1051510).
- mac80211: do not initiate TDLS connection if station is not associated to AP (bsc#1051510).
- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bsc#1051510).
- mac80211: fix miscounting of ttl-dropped frames (bsc#1051510).
- mac80211: fix radiotap vendor presence bitmap handling (bsc#1051510).
- mac80211: Free mpath object when rhashtable insertion fails (bsc#1051510).
- mac80211: Restore vif beacon interval if start ap fails (bsc#1051510).
- macvlan: Only deliver one copy of the frame to the macvlan interface (bsc#1051510).
- mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush timeout issue (bsc#1051510).
- mdio_bus: Fix use-after-free on device_register fails (bsc#1051510).
- media: adv*/tc358743/ths8200: fill in min width/height/pixelclock (bsc#1051510).
- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bsc#1051510).
- media: dt-bindings: media: i2c: Fix i2c address for OV5645 camera sensor (bsc#1051510).
- media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bsc#1051510).
- media: mtk-vcodec: Release device nodes in mtk_vcodec_init_enc_pm() (bsc#1051510).
- media: s5k4ecgx: delete a bogus error message (bsc#1051510).
- media: s5p-jpeg: Check for fmt_ver_flag when doing fmt enumeration (bsc#1051510).
- media: s5p-jpeg: Correct step and max values for V4L2_CID_JPEG_RESTART_INTERVAL (bsc#1051510).
- media: s5p-mfc: fix incorrect bus assignment in virtual child device (bsc#1051510).
- media: usb: pwc: Do not use coherent DMA buffers for ISO transfer (bsc#1054610).
- media: uvcvideo: Avoid NULL pointer dereference at the end of streaming (bsc#1051510).
- media: uvcvideo: Fix 'type' check leading to overflow (bsc#1051510).
- media: v4l2: i2c: ov7670: Fix PLL bypass register values (bsc#1051510).
- media: v4l2-tpg: array index could become negative (bsc#1051510).
- media: v4l: ioctl: Validate num_planes for debug messages (bsc#1051510).
- media: vb2: be sure to unlock mutex on errors (bsc#1051510).
- media: vb2: vb2_mmap: move lock up (bsc#1051510).
- media: vivid: fix error handling of kthread_run (bsc#1051510).
- media: vivid: free bitmap_cap when updating std/timings/etc (bsc#1051510).
- media: vivid: set min width/height to a value &gt; 0 (bsc#1051510).
- memstick: Prevent memstick host from getting runtime suspended during card detection (bsc#1051510).
- mfd: ab8500-core: Return zero in get_register_interruptible() (bsc#1051510).
- mfd: db8500-prcmu: Fix some section annotations (bsc#1051510).
- mfd: mc13xxx: Fix a missing check of a register-read failure (bsc#1051510).
- mfd: mt6397: Do not call irq_domain_remove if PMIC unsupported (bsc#1051510).
- mfd: qcom_rpm: write fw_version to CTRL_REG (bsc#1051510).
- mfd: ti_am335x_tscadc: Use PLATFORM_DEVID_AUTO while registering mfd cells (bsc#1051510).
- mfd: tps65218: Use devm_regmap_add_irq_chip and clean up error path in probe() (bsc#1051510).
- mfd: tps6586x: Handle interrupts on suspend (bsc#1051510).
- mfd: twl-core: Fix section annotations on {,un}protect_pm_master (bsc#1051510).
- mfd: wm5110: Add missing ASRC rate register (bsc#1051510).
- misc: atmel-ssc: Fix section annotation on atmel_ssc_get_driver_data (bsc#1051510).
- misc: hmc6352: fix potential Spectre v1 (bsc#1051510).
- misc: hpilo: Do not claim unsupported hardware (bsc#1129330).
- misc: hpilo: Exclude unsupported device via blacklist (bsc#1129330).
- misc: mic/scif: fix copy-paste error in scif_create_remote_lookup (bsc#1051510).
- misc: mic: SCIF Fix scif_get_new_port() error handling (bsc#1051510).
- misc: sram: enable clock before registering regions (bsc#1051510).
- misc: sram: fix resource leaks in probe error path (bsc#1051510).
- misc: ti-st: Fix memory leak in the error path of probe() (bsc#1051510).
- misc: vexpress: Off by one in vexpress_syscfg_exec() (bsc#1051510).
- mISDN: fix a race in dev_expire_timer() (bsc#1051510).
- mlx4: trigger IB events needed by SMC (bnc#1117947, LTC#173662).
- mlxsw: __mlxsw_sp_port_headroom_set(): Fix a use of local variable (git-fixes).
- mlxsw: spectrum: Disable lag port TX before removing it (networking-stable-19_01_22).
- mmap: introduce sane default mmap limits (git fixes (mm/mmap)).
- mmap: relax file size limit for regular files (git fixes (mm/mmap)).
- mmc: atmel-mci: do not assume idle after atmci_request_end (bsc#1051510).
- mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1051510).
- mmc: bcm2835: Recover from MMC_SEND_EXT_CSD (bsc#1051510).
- mmc: dw_mmc-bluefield: : Fix the license information (bsc#1051510).
- mmc: Kconfig: Enable CONFIG_MMC_SDHCI_IO_ACCESSORS (bsc#1051510).
- mmc: omap: fix the maximum timeout setting (bsc#1051510).
- mmc: sdhci-brcmstb: handle mmc_of_parse() errors during probe (bsc#1051510).
- mmc: sdhci-esdhc-imx: fix HS400 timing issue (bsc#1051510).
- mmc: sdhci-iproc: handle mmc_of_parse() errors during probe (bsc#1051510).
- mmc: sdhci-of-esdhc: Fix timeout checks (bsc#1051510).
- mmc: sdhci-xenon: Fix timeout checks (bsc#1051510).
- mmc: spi: Fix card detection during probe (bsc#1051510).
- mm: do not drop unused pages when userfaultd is running (git fixes (mm/userfaultfd)).
- mm/hmm: hmm_pfns_bad() was accessing wrong struct (git fixes (mm/hmm)).
- mm: hwpoison: use do_send_sig_info() instead of force_sig() (git fixes (mm/hwpoison)).
- mm/ksm.c: ignore STABLE_FLAG of rmap_item-&gt;address in rmap_walk_ksm() (git fixes (mm/ksm)).
- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (git fixes (mm/madvise)).
- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).
- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (git fixes (mm/migrate)).
- mm: migrate: lock buffers before migrate_page_move_mapping() (bsc#1084216).
- mm: migrate: Make buffer_migrate_page_norefs() actually succeed (bsc#1084216)
- mm: migrate: provide buffer_migrate_page_norefs() (bsc#1084216).
- mm: migration: factor out code to compute expected number of page references (bsc#1084216).
- mm, oom: fix use-after-free in oom_kill_process (git fixes (mm/oom)).
- mm: use swp_offset as key in shmem_replace_page() (git fixes (mm/shmem)).
- mm,vmscan: Make unregister_shrinker() no-op if register_shrinker() failed (git fixes (mm/vmscan)).
- Moved patches.fixes/x86-add-tsx-force-abort-cpuid-msr.patch to patches.arch/ and added upstream tags (bsc#1129363) patches.arch/x86-add-tsx-force-abort-cpuid-msr
- Move the upstreamed HD-audio fix into sorted section
- mpt3sas: check sense buffer before copying sense data (bsc#1106811).
- mtd: cfi_cmdset_0002: Avoid walking all chips when unlocking (bsc#1051510).
- mtd: cfi_cmdset_0002: Change write buffer to check correct value (bsc#1051510).
- mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips (bsc#1051510).
- mtd: cfi_cmdset_0002: Fix unlocking requests crossing a chip boudary (bsc#1051510).
- mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock() (bsc#1051510).
- mtdchar: fix overflows in adjustment of `count` (bsc#1051510).
- mtdchar: fix usage of mtd_ooblayout_ecc() (bsc#1051510).
- mtd: docg3: do not set conflicting BCH_CONST_PARAMS option (bsc#1051510).
- mtd/maps: fix solutionengine.c printk format warnings (bsc#1051510).
- mtd: mtd_oobtest: Handle bitflips during reads (bsc#1051510).
- mtd: nand: atmel: fix buffer overflow in atmel_pmecc_user (bsc#1051510).
- mtd: nand: atmel: Fix get_sectorsize() function (bsc#1051510).
- mtd: nand: atmel: fix of_irq_get() error check (bsc#1051510).
- mtd: nand: brcmnand: Disable prefetch by default (bsc#1051510).
- mtd: nand: brcmnand: Zero bitflip is not an error (bsc#1051510).
- mtd: nand: denali_pci: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).
- mtd: nand: fix interpretation of NAND_CMD_NONE in nand_command[_lp]() (bsc#1051510).
- mtd: nand: Fix nand_do_read_oob() return value (bsc#1051510).
- mtd: nand: Fix writing mtdoops to nand flash (bsc#1051510).
- mtd: nand: fsl_ifc: Fix nand waitfunc return value (bsc#1051510).
- mtd: nand: gpmi: Fix failure when a erased page has a bitflip at BBM (bsc#1051510).
- mtd: nand: ifc: update bufnum mask for ver &gt;= 2.0.0 (bsc#1051510).
- mtd: nand: mtk: fix infinite ECC decode IRQ issue (bsc#1051510).
- mtd: nand: omap2: Fix subpage write (bsc#1051510).
- mtd: nand: pxa3xx: Fix READOOB implementation (bsc#1051510).
- mtd: nand: qcom: Add a NULL check for devm_kasprintf() (bsc#1051510).
- mtd: nandsim: remove debugfs entries in error path (bsc#1051510).
- mtd: nand: sunxi: Fix ECC strength choice (bsc#1051510).
- mtd: nand: sunxi: fix potential divide-by-zero error (bsc#1051510).
- mtd: nand: vf610: set correct ooblayout (bsc#1051510).
- mtd: spi-nor: cadence-quadspi: Fix page fault kernel panic (bsc#1051510).
- mtd: spi-nor: Fix Cadence QSPI page fault kernel panic (bsc#1051510).
- mtd: spi-nor: fsl-quadspi: fix read error for flash size larger than 16MB (bsc#1051510).
- mtd: spi-nor: stm32-quadspi: Fix uninitialized error return code (bsc#1051510).
- mv88e6060: disable hardware level MAC learning (bsc#1051510).
- nbd: Use set_blocksize() to set device blocksize (bsc#1124984).
- neighbour: Avoid writing before skb-&gt;head in neigh_hh_output() (networking-stable-18_12_12).
- net: 8139cp: fix a BUG triggered by changing mtu with network traffic (networking-stable-18_12_12).
- net: add uevent socket member (bsc#1122982).
- net: aquantia: driver should correctly declare vlan_features bits (bsc#1051510).
- net: aquantia: fixed instack structure overflow (git-fixes).
- net: aquantia: Fix hardware DMA stream overload on large MRRS (bsc#1051510).
- net: bcmgenet: abort suspend on error (bsc#1051510).
- net: bcmgenet: code movement (bsc#1051510).
- net: bcmgenet: fix OF child-node lookup (bsc#1051510).
- net: bcmgenet: remove HFB_CTRL access (bsc#1051510).
- net: bcmgenet: return correct value 'ret' from bcmgenet_power_down (bsc#1051510).
- net: bridge: fix a bug on using a neighbour cache entry without checking its state (networking-stable-19_01_20).
- net: bridge: Fix ethernet header pointer before check skb forwardable (networking-stable-19_01_26).
- net: core: Fix Spectre v1 vulnerability (networking-stable-19_01_04).
- net: do not call update_pmtu unconditionally (bsc#1123456).
- net: Do not default Cavium PTP driver to 'y' (bsc#1110096).
- net: dp83640: expire old TX-skb (networking-stable-19_02_10).
- net: dsa: mv88e6xxx: handle unknown duplex modes gracefully in mv88e6xxx_port_set_duplex (git-fixes).
- net: dsa: mv88x6xxx: mv88e6390 errata (networking-stable-19_01_22).
- net: dsa: slave: Do not propagate flag changes on down slave interfaces (networking-stable-19_02_10).
- net: ena: fix race between link up and device initalization (bsc#1083548).
- netfilter: nf_tables: check the result of dereferencing base_chain-&gt;stats (git-fixes).
- net: Fix usage of pskb_trim_rcsum (networking-stable-19_01_26).
- net/hamradio/6pack: use mod_timer() to rearm timers (networking-stable-19_01_04).
- net: hns3: add error handler for hns3_nic_init_vector_data() (bsc#1104353).
- net: hns3: add handling for big TX fragment (bsc#1104353 ).
- net: hns3: Fix client initialize state issue when roce client initialize failed (bsc#1104353).
- net: hns3: Fix for loopback selftest failed problem (bsc#1104353 ).
- net: hns3: fix for multiple unmapping DMA problem (bsc#1104353 ).
- net: hns3: Fix tc setup when netdev is first up (bsc#1104353 ).
- net: hns3: Fix tqp array traversal condition for vf (bsc#1104353 ).
- net: hns3: move DMA map into hns3_fill_desc (bsc#1104353 ).
- net: hns3: remove hns3_fill_desc_tso (bsc#1104353).
- net: hns3: rename hns_nic_dma_unmap (bsc#1104353).
- net: hns3: rename the interface for init_client_instance and uninit_client_instance (bsc#1104353).
- net: ipv4: Fix memory leak in network namespace dismantle (networking-stable-19_01_26).
- net: macb: restart tx after tx used bit read (networking-stable-19_01_04).
- net/mlx4_core: Add masking for a few queries on HCA caps (networking-stable-19_02_01).
- net/mlx4_core: Fix locking in SRIOV mode when switching between events and polling (git-fixes).
- net/mlx4_core: Fix qp mtt size calculation (git-fixes).
- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).
- net/mlx4_en: Change min MTU size to ETH_MIN_MTU (networking-stable-18_12_12).
- net/mlx5e: Allow MAC invalidation while spoofchk is ON (networking-stable-19_02_01).
- net/mlx5e: IPoIB, Fix RX checksum statistics update (git-fixes).
- net/mlx5e: Remove the false indication of software timestamping support (networking-stable-19_01_04).
- net/mlx5e: RX, Fix wrong early return in receive queue poll (bsc#1046305).
- net/mlx5: fix uaccess beyond 'count' in debugfs read/write handlers (git-fixes).
- net/mlx5: Release resource on error flow (git-fixes).
- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).
- net/mlx5: Typo fix in del_sw_hw_rule (networking-stable-19_01_04).
- net/mlx5: Use multi threaded workqueue for page fault handling (git-fixes).
- net: netem: fix skb length BUG_ON in __skb_to_sgvec (git-fixes).
- netns: restrict uevents (bsc#1122982).
- net: phy: do not allow __set_phy_supported to add unsupported modes (networking-stable-18_12_12).
- net: phy: Fix the issue that netif always links up after resuming (networking-stable-19_01_04).
- net: phy: marvell: Errata for mv88e6390 internal PHYs (networking-stable-19_01_26).
- net: phy: mdio_bus: add missing device_del() in mdiobus_register() error handling (networking-stable-19_01_26).
- net: phy: Micrel KSZ8061: link failure after cable connect (git-fixes).
- netrom: fix locking in nr_find_socket() (networking-stable-19_01_04).
- netrom: switch to sock timer API (bsc#1051510).
- net/rose: fix NULL ax25_cb kernel panic (networking-stable-19_02_01).
- net/sched: act_tunnel_key: fix memory leak in case of action replace (networking-stable-19_01_26).
- net_sched: refetch skb protocol for each filter (networking-stable-19_01_26).
- net: set default network namespace in init_dummy_netdev() (networking-stable-19_02_01).
- net: skb_scrub_packet(): Scrub offload_fwd_mark (networking-stable-18_12_03).
- net/smc: abort CLC connection in smc_release (bnc#1117947, LTC#173662).
- net/smc: add infrastructure to send delete rkey messages (bnc#1117947, LTC#173662).
- net/smc: add SMC-D shutdown signal (bnc#1117947, LTC#173662).
- net/smc: allow fallback after clc timeouts (bnc#1117947, LTC#173662).
- net/smc: atomic SMCD cursor handling (bnc#1117947, LTC#173662).
- net/smc: avoid a delay by waiting for nothing (bnc#1117947, LTC#173662).
- net/smc: cleanup listen worker mutex unlocking (bnc#1117947, LTC#173662).
- net/smc: cleanup tcp_listen_worker initialization (bnc#1117947, LTC#173662).
- net/smc: enable fallback for connection abort in state INIT (bnc#1117947, LTC#173662).
- net/smc: fix non-blocking connect problem (bnc#1117947, LTC#173662).
- net/smc: fix sizeof to int comparison (bnc#1117947, LTC#173662).
- net/smc: fix smc_buf_unuse to use the lgr pointer (bnc#1117947, LTC#173662).
- net/smc: fix TCP fallback socket release (networking-stable-19_01_04).
- net/smc: make smc_lgr_free() static (bnc#1117947, LTC#173662).
- net/smc: no link delete for a never active link (bnc#1117947, LTC#173662).
- net/smc: no urgent data check for listen sockets (bnc#1117947, LTC#173662).
- net/smc: remove duplicate mutex_unlock (bnc#1117947, LTC#173662).
- net/smc: remove sock_error detour in clc-functions (bnc#1117947, LTC#173662).
- net/smc: short wait for late smc_clc_wait_msg (bnc#1117947, LTC#173662).
- net/smc: unregister rkeys of unused buffer (bnc#1117947, LTC#173662).
- net/smc: use after free fix in smc_wr_tx_put_slot() (bnc#1117947, LTC#173662).
- net/smc: use queue pair number when matching link group (bnc#1117947, LTC#173662).
- net: stmmac: Fix a race in EEE enable callback (git-fixes).
- net: stmmac: fix broken dma_interrupt handling for multi-queues (git-fixes).
- net: stmmac: Fix PCI module removal leak (git-fixes).
- net: stmmac: handle endianness in dwmac4_get_timestamp (git-fixes).
- net: stmmac: Use mutex instead of spinlock (git-fixes).
- net: systemport: Fix WoL with password after deep sleep (networking-stable-19_02_10).
- net: thunderx: fix NULL pointer dereference in nic_remove (git-fixes).
- net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (networking-stable-18_12_03).
- net: thunderx: set xdp_prog to NULL if bpf_prog_add fails (networking-stable-18_12_03).
- net/wan: fix a double free in x25_asy_open_tty() (networking-stable-19_01_04).
- nfit: acpi_nfit_ctl(): Check out_obj-&gt;type in the right place (bsc#1129547).
- nfit/ars: Attempt a short-ARS whenever the ARS state is idle at boot (bsc#1051510).
- nfit/ars: Attempt short-ARS even in the no_init_ars case (bsc#1051510).
- nfp: bpf: fix ALU32 high bits clearance bug (git-fixes).
- nfs: Allow NFSv4 mounts to not share transports ().
- nfsd: COPY and CLONE operations require the saved filehandle to be set (git-fixes).
- nfsd: Fix an Oops in free_session() (git-fixes).
- nfs: Fix a missed page unlock after pg_doio() (git-fixes).
- nfs: Fix up return value on fatal errors in nfs_page_async_flush() (git-fixes).
- nfs: support 'nosharetransport' option (bnc#807502, bnc#828192, ).
- nfsv4.1: Fix the r/wsize checking (git-fixes).
- nfsv4: Do not exit the state manager without clearing NFS4CLNT_MANAGER_RUNNING (git-fixes).
- niu: fix missing checks of niu_pci_eeprom_read (bsc#1051510).
- ntb_transport: Fix bug with max_mw_size parameter (bsc#1051510).
- nvme-fc: reject reconnect if io queue count is reduced to zero (bsc#1128351).
- nvme: flush namespace scanning work just before removing namespaces (bsc#1108101).
- nvme: kABI fix for scan_lock (bsc#1123882).
- nvme: lock NS list changes while handling command effects (bsc#1123882).
- nvme-loop: fix kernel oops in case of unhandled command (bsc#1126807).
- nvme-multipath: drop optimization for static ANA group IDs (bsc#1113939).
- nvme-multipath: round-robin I/O policy (bsc#1110705).
- nvme-pci: fix out of bounds access in nvme_cqe_pending (bsc#1127595).
- of, numa: Validate some distance map rules (bsc#1051510).
- of: unittest: Disable interrupt node tests for old world MAC systems (bsc#1051510).
- omap2fb: Fix stack memory disclosure (bsc#1120902)
- openvswitch: Avoid OOB read when parsing flow nlattrs (bsc#1051510).
- openvswitch: fix the incorrect flow action alloc size (bsc#1051510).
- openvswitch: Remove padding from packet before L3+ conntrack processing (bsc#1051510).
- packet: Do not leak dev refcounts on error exit (git-fixes).
- packet: validate address length if non-zero (networking-stable-19_01_04).
- packet: validate address length (networking-stable-19_01_04).
- parport_pc: fix find_superio io compare code, should use equal test (bsc#1051510).
- Partially revert 'block: fail op_is_write() requests to (bsc#1125252).
- PCI: add USR vendor id and use it in r8169 and w6692 driver (networking-stable-19_01_22).
- PCI: Disable broken RTIT_BAR of Intel TH (bsc#1120318).
- pci: endpoint: functions: Use memcpy_fromio()/memcpy_toio() (bsc#1051510).
- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).
- pci/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1051510).
- pci: qcom: Do not deassert reset GPIO during probe (bsc#1129281).
- pcrypt: use format specifier in kobject_add (bsc#1051510).
- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).
- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).
- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).
- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).
- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).
- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).
- perf/x86/intel: Fix memory corruption (bsc#1121805).
- perf/x86/intel: Fix memory corruption (bsc#1121805).
- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).
- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).
- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).
- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).
- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).
- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).
- phonet: af_phonet: Fix Spectre v1 vulnerability (networking-stable-19_01_04).
- phy: allwinner: sun4i-usb: poll vbus changes on A23/A33 when driving VBUS (bsc#1051510).
- phy: qcom-qmp: Fix failure path in phy_init functions (bsc#1051510).
- phy: qcom-qmp: Fix phy pipe clock gating (bsc#1051510).
- phy: renesas: rcar-gen3-usb2: fix vbus_ctrl for role sysfs (bsc#1051510).
- phy: rockchip-emmc: retry calpad busy trimming (bsc#1051510).
- phy: sun4i-usb: add support for missing USB PHY index (bsc#1051510).
- phy: tegra: remove redundant self assignment of 'map' (bsc#1051510).
- phy: work around 'phys' references to usb-nop-xceiv devices (bsc#1051510).
- pinctrl: max77620: Use define directive for max77620_pinconf_param values (bsc#1051510).
- pinctrl: meson: fix pull enable register calculation (bsc#1051510).
- pinctrl: meson: meson8b: fix the GPIO function for the GPIOAO pins (bsc#1051510).
- pinctrl: meson: meson8b: fix the sdxc_a data 1..3 pins (bsc#1051510).
- pinctrl: meson: meson8: fix the GPIO function for the GPIOAO pins (bsc#1051510).
- pinctrl: msm: fix gpio-hog related boot issues (bsc#1051510).
- pinctrl: sh-pfc: emev2: Add missing pinmux functions (bsc#1051510).
- pinctrl: sh-pfc: r8a7740: Add missing LCD0 marks to lcd0_data24_1 group (bsc#1051510).
- pinctrl: sh-pfc: r8a7740: Add missing REF125CK pin to gether_gmii group (bsc#1051510).
- pinctrl: sh-pfc: r8a7778: Fix HSPI pin numbers and names (bsc#1051510).
- pinctrl: sh-pfc: r8a7791: Fix scifb2_data_c pin group (bsc#1051510).
- pinctrl: sh-pfc: r8a7791: Remove bogus ctrl marks from qspi_data4_b group (bsc#1051510).
- pinctrl: sh-pfc: r8a7791: Remove bogus marks from vin1_b_data18 group (bsc#1051510).
- pinctrl: sh-pfc: r8a7792: Fix vin1_data18_b pin group (bsc#1051510).
- pinctrl: sh-pfc: r8a7794: Remove bogus IPSR9 field (bsc#1051510).
- pinctrl: sh-pfc: sh7264: Fix PFCR3 and PFCR0 register configuration (bsc#1051510).
- pinctrl: sh-pfc: sh7269: Add missing PCIOR0 field (bsc#1051510).
- pinctrl: sh-pfc: sh73a0: Add missing TO pin to tpu4_to3 group (bsc#1051510).
- pinctrl: sh-pfc: sh73a0: Fix fsic_spdif pin groups (bsc#1051510).
- pinctrl: sh-pfc: sh7734: Add missing IPSR11 field (bsc#1051510).
- pinctrl: sh-pfc: sh7734: Fix shifted values in IPSR10 (bsc#1051510).
- pinctrl: sh-pfc: sh7734: Remove bogus IPSR10 value (bsc#1051510).
- pinctrl: sunxi: a64: Rename function csi0 to csi (bsc#1051510).
- pinctrl: sunxi: a64: Rename function ts0 to ts (bsc#1051510).
- pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11 (bsc#1051510).
- pinctrl: sx150x: handle failure case of devm_kstrdup (bsc#1051510).
- pktcdvd: Fix possible Spectre-v1 for pkt_devs (bsc#1051510).
- platform/x86: asus-nb-wmi: Drop mapping of 0x33 and 0x34 scan codes (bsc#1051510).
- platform/x86: asus-nb-wmi: Map 0x35 to KEY_SCREENLOCK (bsc#1051510).
- platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bsc#1051510).
- platform/x86: Fix unmet dependency warning for SAMSUNG_Q10 (bsc#1051510).
- powerpc/64s: Clear on-stack exception marker upon exception return (bsc#1071995).
- powerpc: Add an option to disable static PCI bus numbering (bsc#1122159).
- powerpc: Always save/restore checkpointed regs during treclaim/trecheckpoint (bsc#1118338).
- powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695).
- powerpc: Detect the presence of big-cores via 'ibm, thread-groups' (bsc#1109695).
- powerpc/livepatch: relax reliable stack tracer checks for first-frame (bsc#1071995).
- powerpc/livepatch: small cleanups in save_stack_trace_tsk_reliable() (bsc#1071995).
- powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695).
- powerpc/powernv: Clear LPCR[PECE1] via stop-api only for deep state offline (bsc#1119766, bsc#1055121).
- powerpc/powernv: Clear PECE1 in LPCR via stop-api only on Hotplug (bsc#1119766, bsc#1055121).
- powerpc/pseries: export timebase register sample in lparcfg (bsc#1127750).
- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1125728).
- powerpc: Remove facility loadups on transactional {fp, vec, vsx} unavailable (bsc#1118338).
- powerpc: Remove redundant FP/Altivec giveup code (bsc#1118338).
- powerpc/setup: Add cpu_to_phys_id array (bsc#1109695).
- powerpc/smp: Add cpu_l2_cache_map (bsc#1109695).
- powerpc/smp: Add Power9 scheduler topology (bsc#1109695).
- powerpc/smp: Rework CPU topology construction (bsc#1109695).
- powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695).
- powerpc/tm: Avoid machine crash on rt_sigreturn (bsc#1118338).
- powerpc/tm: Do not check for WARN in TM Bad Thing handling (bsc#1118338).
- powerpc/tm: Fix comment (bsc#1118338).
- powerpc/tm: Fix endianness flip on trap (bsc#1118338).
- powerpc/tm: Fix HFSCR bit for no suspend case (bsc#1118338).
- powerpc/tm: Fix HTM documentation (bsc#1118338).
- powerpc/tm: Limit TM code inside PPC_TRANSACTIONAL_MEM (bsc#1118338).
- powerpc/tm: P9 disable transactionally suspended sigcontexts (bsc#1118338).
- powerpc/tm: Print 64-bits MSR (bsc#1118338).
- powerpc/tm: Print scratch value (bsc#1118338).
- powerpc/tm: Reformat comments (bsc#1118338).
- powerpc/tm: Remove msr_tm_active() (bsc#1118338).
- powerpc/tm: Remove struct thread_info param from tm_reclaim_thread() (bsc#1118338).
- powerpc/tm: Save MSR to PACA before RFID (bsc#1118338).
- powerpc/tm: Set MSR[TS] just prior to recheckpoint (bsc#1118338, bsc#1120955).
- powerpc/tm: Unset MSR[TS] if not recheckpointing (bsc#1118338).
- powerpc/tm: Update function prototype comment (bsc#1118338).
- powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695).
- powerpc/xmon: Fix invocation inside lock region (bsc#1122885).
- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).
- proc/sysctl: do not return ENOMEM on lookup when a table is unregistering (git-fixes).
- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).
- pstore/ram: Avoid allocation and leak of platform data (bsc#1051510).
- pstore/ram: Avoid NULL deref in ftrace merging failure path (bsc#1051510).
- pstore/ram: Correctly calculate usable PRZ bytes (bsc#1051510).
- pstore/ram: Do not treat empty buffers as valid (bsc#1051510).
- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bsc#1051510).
- ptp: Fix pass zero to ERR_PTR() in ptp_clock_register (bsc#1051510).
- ptp_kvm: probe for kvm guest availability (bsc#1098382).
- ptr_ring: wrap back -&gt;producer in __ptr_ring_swap_queue() (networking-stable-19_01_04).
- Put the xhci fix patch to the right place in the sorted section
- qed: Avoid constant logical operation warning in qed_vf_pf_acquire (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Avoid implicit enum conversion in qed_iwarp_parse_rx_pkt (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Avoid implicit enum conversion in qed_roce_mode_to_flavor (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Avoid implicit enum conversion in qed_set_tunn_cls_info (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Fix an error code qed_ll2_start_xmit() (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix bitmap_weight() check (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix blocking/unlimited SPQ entries leak (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix command number mismatch between driver and the mfw (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Fix mask parameter in qed_vf_prep_tunn_req_tlv (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix memory/entry leak in qed_init_sp_request() (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix potential memory corruption (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix PTT leak in qed_drain() (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix QM getters to always return a valid pq (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix rdma_info structure allocation (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix reading wrong value in loop condition (bsc#1086314 bsc#1086313 bsc#1086301).
- qla2xxx: Fixup dual-protocol FCP connections (bsc#1108870).
- qmi_wwan: Added support for Fibocom NL668 series (networking-stable-19_01_04).
- qmi_wwan: Added support for Telit LN940 series (networking-stable-19_01_04).
- qmi_wwan: add MTU default to qmap network interface (networking-stable-19_01_22).
- qmi_wwan: Add support for Fibocom NL678 series (networking-stable-19_01_04).
- r8169: Add support for new Realtek Ethernet (networking-stable-19_01_22).
- r8169: use PCI_VDEVICE macro (networking-stable-19_01_22).
- rapidio/rionet: do not free skb before reading its length (networking-stable-18_12_03).
- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125797).
- rcu: Fix up pending cbs check in rcu_prepare_for_idle (git fixes (kernel/rcu)).
- rcu: Make need_resched() respond to urgent RCU-QS needs (git fixes (kernel/rcu)).
- rdma/core: Fix unwinding flow in case of error to register device (bsc#1046306).
- rdma/vmw_pvrdma: Support upto 64-bit PFNs (bsc#1127285).
- Refresh patches.suse/scsi-do-not-print-reservation-conflict-for-TEST-UNIT.patch (bsc#1119843)
- regulator: act8865: Fix act8600_sudcdc_voltage_ranges setting (bsc#1051510).
- regulator: pv88060: Fix array out-of-bounds access (bsc#1051510).
- regulator: pv88080: Fix array out-of-bounds access (bsc#1051510).
- regulator: pv88090: Fix array out-of-bounds access (bsc#1051510).
- regulator: s2mps11: Fix steps for buck7, buck8 and LDO35 (bsc#1051510).
- regulator: wm831x-dcdc: Fix list of wm831x_dcdc_ilim from mA to uA (bsc#1051510).
- Remove blacklist of virtio patch so we can install it (bsc#1114585)
- Revert 'drm/rockchip: Allow driver to be shutdown on reboot/kexec' (bsc#1051510).
- Revert 'input: elan_i2c - add acpi ID for touchpad in ASUS Aspire F5-573G' (bsc#1051510).
- Revert 'openvswitch: Fix template leak in error cases.' (bsc#1051510).
- Revert 'scsi: qla2xxx: Fix NVMe Target discovery' (bsc#1125252).
- Revert 'serial: 8250: Fix clearing FIFOs in RS485 mode again' (bsc#1051510).
- Revert the previous merge of drm fixes The branch was merged mistakenly and breaks the build. Revert it.
- Revert 'xhci: Reset Renesas uPD72020x USB controller for 32-bit DMA issue' (bsc#1120854).
- rocker: fix rocker_tlv_put_* functions for KASAN (bsc#1051510).
- rpm/kernel-binary.spec.in: fix initrd permissions (bsc#1123697) dracut has been using permissions 0600 for the initrd for a long time.
- rpm/kernel-source.changes.old: Really drop old changelogs (bsc#1098995)
- rt2800: enable TX_PIN_CFG_RFRX_EN only for MT7620 (bsc#1120902).
- rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices (networking-stable-18_12_12).
- rxrpc: bad unlock balance in rxrpc_recvmsg (networking-stable-19_02_10).
- s390/cio: Fix how vfio-ccw checks pinned pages (git-fixes).
- s390/cpum_cf: Reject request for sampling in event initialization (git-fixes).
- s390/early: improve machine detection (git-fixes).
- s390/ism: clear dmbe_mask bit before SMC IRQ handling (bnc#1117947, LTC#173662).
- s390/mm: always force a load of the primary ASCE on context switch (git-fixes).
- s390/mm: fix addressing exception after suspend/resume (bsc#1125252).
- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).
- s390/qeth: conclude all event processing before offlining a card (LTC#175901, bsc#1127567).
- s390/qeth: fix use-after-free in error path (bsc#1127534).
- s390/qeth: invoke softirqs after napi_schedule() (git-fixes).
- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (git-fixes).
- s390/smp: fix CPU hotplug deadlock with CPU rescan (git-fixes).
- s390/sthyi: Fix machine name validity indication (git-fixes).
- s390/zcrypt: fix specification exception on z196 during ap probe (LTC#174936, bsc#1123061).
- sata_rcar: fix deferred probing (bsc#1051510).
- sbus: char: add of_node_put() (bsc#1051510).
- sc16is7xx: Fix for multi-channel stall (bsc#1051510).
- sched: Do not re-read h_load_next during hierarchical load calculation (bnc#1120909).
- sched/wait: Fix rcuwait_wake_up() ordering (git-fixes).
- sched/wake_q: Document wake_q_add() (bsc#1050549).
- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).
- sched/wake_q: Reduce reference counting for special users (bsc#1050549).
- sch_multiq: fix double free on init failure (bsc#1051510).
- scsi: core: reset host byte in DID_NEXUS_FAILURE case (bsc#1122764).
- scsi: csiostor: remove flush_scheduled_work() (bsc#1127363).
- scsi: fix queue cleanup race before queue initialization is done (bsc#1125252).
- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- scsi: ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).
- scsi: libiscsi: Fix race between iscsi_xmit_task and iscsi_complete_task (bsc#1122192).
- scsi: lpfc: Add log messages to aid in debugging fc4type discovery issues (bsc#1121317).
- scsi: lpfc: Correct MDS loopback diagnostics support (bsc#1121317).
- scsi: lpfc: do not set queue-&gt;page_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1121317).
- scsi: lpfc: Fix discovery failure when PLOGI is defered (bsc#1121317).
- scsi: lpfc: Fix link state reporting for trunking when adapter is offline (bsc#1121317).
- scsi: lpfc: fix remoteport access (bsc#1125252).
- scsi: lpfc: remove an unnecessary NULL check (bsc#1121317).
- scsi: lpfc: update fault value on successful trunk events (bsc#1121317).
- scsi: lpfc: Update lpfc version to 12.0.0.10 (bsc#1121317).
- scsi: mpt3sas: Add ioc_&lt;level&gt; logging macros (bsc#1117108).
- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).
- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).
- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).
- scsi: mpt3sas: Convert mlsleading uses of pr_&lt;level&gt; with MPT3SAS_FMT (bsc#1117108).
- scsi: mpt3sas: Convert uses of pr_&lt;level&gt; with MPT3SAS_FMT to ioc_&lt;level&gt; (bsc#1117108).
- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).
- scsi: mpt3sas: Fix indentation (bsc#1117108).
- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).
- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).
- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).
- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).
- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).
- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).
- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).
- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).
- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).
- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).
- scsi: mptsas: Fixup device hotplug for VMWare ESXi (bsc#1129046).
- scsi: qedi: Add ep_state for login completion on un-reachable targets (bsc#1113712).
- scsi: qla2xxx: Enable FC-NVME on NPIV ports (bsc#1094555).
- scsi: qla2xxx: Fix a typo in MODULE_PARM_DESC (bsc#1094555).
- scsi: qla2xxx: Fix for FC-NVMe discovery for NPIV port (bsc#1094555).
- scsi: qla2xxx: Fix NPIV handling for FC-NVMe (bsc#1094555).
- scsi: qla2xxx: Initialize port speed to avoid setting lower speed (bsc#1094555).
- scsi: qla2xxx: Modify fall-through annotations (bsc#1094555).
- scsi: qla2xxx: Remove unnecessary self assignment (bsc#1094555).
- scsi: qla2xxx: Simplify conditional check (bsc#1094555).
- scsi: qla2xxx: Timeouts occur on surprise removal of QLogic adapter (bsc#1124985).
- scsi: qla2xxx: Update driver version to 10.00.00.12-k (bsc#1094555).
- scsi: storvsc: Fix a race in sub-channel creation that can cause panic ().
- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).
- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).
- scsi: target: make the pi_prot_format ConfigFS path readable (bsc#1123933).
- scsi: virtio_scsi: fix pi_bytes{out,in} on 4 KiB block size devices (bsc#1114585).
- sctp: add a ceiling to optlen in some sockopts (bnc#1129163).
- sctp: improve the events for sctp stream adding (networking-stable-19_02_01).
- sctp: improve the events for sctp stream reset (networking-stable-19_02_01).
- sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event (networking-stable-19_01_04).
- sctp: kfree_rcu asoc (networking-stable-18_12_12).
- sd: disable logical block provisioning if 'lbpme' is not set (bsc#1086095 bsc#1078355).
- selftests/livepatch: add DYNAMIC_DEBUG config dependency (bsc#1071995).
- selftests/livepatch: introduce tests (bsc#1071995).
- selftests/powerpc: Use snprintf to construct DSCR sysfs interface paths (bsc#1124579).
- selinux: Add __GFP_NOWARN to allocation at str_read() (bsc#1051510).
- selinux: always allow mounting submounts (bsc#1051510).
- selinux: fix GPF on invalid policy (bsc#1051510).
- seq_buf: Make seq_buf_puts() null-terminate the buffer (bsc#1051510).
- serial: 8250_pci: Fix number of ports for ACCES serial cards (bsc#1051510).
- serial: 8250_pci: Have ACCES cards that use the four port Pericom PI7C9X7954 chip use the pci_pericom_setup() (bsc#1051510).
- serial: fix race between flush_to_ldisc and tty_open (bsc#1051510).
- serial: fsl_lpuart: clear parity enable bit when disable parity (bsc#1051510).
- serial: imx: fix error handling in console_setup (bsc#1051510).
- serial: set suppress_bind_attrs flag only if builtin (bsc#1051510).
- serial/sunsu: fix refcount leak (bsc#1051510).
- serial: uartps: Fix interrupt mask issue to handle the RX interrupts properly (bsc#1051510).
- serial: uartps: Fix stuck ISR if RX disabled with non-empty FIFO (bsc#1051510).
- signal: Always deliver the kernel's SIGKILL and SIGSTOP to a pid namespace init (git-fixes).
- skge: potential memory corruption in skge_get_regs() (bsc#1051510).
- sky2: Disable MSI on Dell Inspiron 1545 and Gateway P-79 (bsc#1051510).
- sky2: Increase D3 delay again (bsc#1051510).
- slab: alien caches must not be initialized if the allocation of the alien cache failed (git fixes (mm/slab)).
- smb3.1.1 dialect is no longer experimental (bsc#1051510).
- smb311: Fix reconnect (bsc#1051510).
- smb311: Improve checking of negotiate security contexts (bsc#1051510).
- smb3: Add support for multidialect negotiate (SMB2.1 and later) (bsc#1051510).
- smb3: allow stats which track session and share reconnects to be reset (bsc#1051510).
- smb3: Backup intent flag missing for directory opens with backupuid mounts (bsc#1051510).
- smb3: check for and properly advertise directory lease support (bsc#1051510).
- smb3: directory sync should not return an error (bsc#1051510).
- smb3: do not attempt cifs operation in smb3 query info error path (bsc#1051510).
- smb3: do not request leases in symlink creation and query (bsc#1051510).
- smb3: Do not send smb3 SET_INFO if nothing changed (bsc#1051510).
- smb3: Enable encryption for SMB3.1.1 (bsc#1051510).
- smb3: enumerating snapshots was leaving part of the data off end (bsc#1051510).
- smb3: Fix 3.11 encryption to Windows and handle encrypted smb3 tcon (bsc#1051510).
- smb3: Fix length checking of SMB3.11 negotiate request (bsc#1051510).
- smb3: Fix root directory when server returns inode number of zero (bsc#1051510).
- smb3: fix various xid leaks (bsc#1051510).
- smb3: Improve security, move default dialect to smb3 from old CIFS (bsc#1051510).
- smb3: on kerberos mount if server does not specify auth type use krb5 (bsc#1051510).
- smb3: Remove ifdef since smb3 (and later) now STRONGLY preferred (bsc#1051510).
- smb3: remove noisy warning message on mount (bsc#1129664).
- smb3: simplify code by removing CONFIG_CIFS_SMB311 (bsc#1051510).
- soc: bcm: brcmstb: Do not leak device tree node reference (bsc#1051510).
- soc/tegra: Do not leak device tree node reference (bsc#1051510).
- splice: do not merge into linked buffers (git-fixes).
- staging: comedi: ni_660x: fix missing break in switch statement (bsc#1051510).
- staging:iio:ad2s90: Make probe handle spi_setup failure (bsc#1051510).
- staging: iio: ad7780: update voltage on read (bsc#1051510).
- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bsc#1051510).
- staging: iio: adt7316: allow adt751x to use internal vref for all dacs (bsc#1051510).
- staging: iio: adt7316: fix register and bit definitions (bsc#1051510).
- staging: iio: adt7316: fix the dac read calculation (bsc#1051510).
- staging: iio: adt7316: fix the dac write calculation (bsc#1051510).
- staging: rtl8188eu: Add device code for D-Link DWA-121 rev B1 (bsc#1051510).
- staging: rtl8723bs: Fix build error with Clang when inlining is disabled (bsc#1051510).
- staging: speakup: Replace strncpy with memcpy (bsc#1051510).
- staging: wilc1000: fix to set correct value for 'vif_num' (bsc#1051510).
- sunrpc: correct the computation for page_ptr when truncating (git-fixes).
- sunrpc: Fix a potential race in xprt_connect() (git-fixes).
- sunrpc: Fix leak of krb5p encode pages (git-fixes).
- sunrpc: handle ENOMEM in rpcb_getport_async (git-fixes).
- sunrpc: safely reallow resvport min/max inversion (git-fixes).
- svm: Add mutex_lock to protect apic_access_page_done on AMD systems (bsc#1129285).
- swiotlb: Add is_swiotlb_active() function (bsc#1120008).
- swiotlb: Introduce swiotlb_max_mapping_size() (bsc#1120008).
- switchtec: Fix SWITCHTEC_IOCTL_EVENT_IDX_ALL flags overwrite (bsc#1051510).
- switchtec: Remove immediate status check after submitting MRPC command (bsc#1051510).
- sysfs: Disable lockdep for driver bind/unbind files (bsc#1051510).
- tcp: batch tcp_net_metrics_exit (bsc#1122982).
- tcp: change txhash on SYN-data timeout (networking-stable-19_01_20).
- tcp: Do not underestimate rwnd_limited (networking-stable-18_12_12).
- tcp: fix a race in inet_diag_dump_icsk() (networking-stable-19_01_04).
- tcp: fix NULL ref in tail loss probe (networking-stable-18_12_12).
- tcp: handle inet_csk_reqsk_queue_add() failures (git-fixes).
- tcp: lack of available data can also cause TSO defer (git-fixes).
- team: avoid complex list operations in team_nl_cmd_options_set() (bsc#1051510).
- team: Free BPF filter when unregistering netdev (bsc#1051510).
- thermal: do not clear passive state during system sleep (bsc#1051510).
- thermal/drivers/hisi: Encapsulate register writes into helpers (bsc#1051510).
- thermal/drivers/hisi: Fix configuration register setting (bsc#1051510).
- thermal: generic-adc: Fix adc to temp interpolation (bsc#1051510).
- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bsc#1051510).
- thermal: int340x_thermal: Fix a NULL vs IS_ERR() check (bsc#1051510).
- thermal: mediatek: fix register index error (bsc#1051510).
- timekeeping: Use proper seqcount initializer (bsc#1051510).
- tipc: compare remote and local protocols in tipc_udp_enable() (networking-stable-19_01_04).
- tipc: eliminate KMSAN uninit-value in strcmp complaint (bsc#1051510).
- tipc: error path leak fixes in tipc_enable_bearer() (bsc#1051510).
- tipc: fix a double kfree_skb() (networking-stable-19_01_04).
- tipc: fix a race condition of releasing subscriber object (bsc#1051510).
- tipc: fix bug in function tipc_nl_node_dump_monitor (bsc#1051510).
- tipc: fix infinite loop when dumping link monitor summary (bsc#1051510).
- tipc: fix RDM/DGRAM connect() regression (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_doit (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_link_set (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bsc#1051510).
- tipc: use lock_sock() in tipc_sk_reinit() (networking-stable-19_01_04).
- tpm: fix kdoc for tpm2_flush_context_cmd() (bsc#1051510).
- tpm: return a TPM_RC_COMMAND_CODE response if command is not implemented (bsc#1051510).
- tpm: Return the actual size when receiving an unsupported command (bsc#1051510).
- tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated (bsc#1051510).
- tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT) (bsc#1051510).
- tpm: tpm_i2c_nuvoton: use correct command duration for TPM 2.x (bsc#1051510).
- tpm: tpm_try_transmit() refactor error flow (bsc#1051510).
- tracing: Do not free iter-&gt;trace in fail path of tracing_open_pipe() (bsc#1129581).
- tracing/uprobes: Fix output for multiple string arguments (bsc#1126495).
- tracing: Use strncpy instead of memcpy for string keys in hist triggers (bsc#1129625).
- Tree connect for smb3.1.1 must be signed for non-encrypted shares (bsc#1051510).
- tty: Handle problem if line discipline does not have receive_buf (bsc#1051510).
- tty: ipwireless: Fix potential NULL pointer dereference (bsc#1051510).
- tty/n_hdlc: fix __might_sleep warning (bsc#1051510).
- tty/serial: do not free trasnmit buffer page under port lock (bsc#1051510).
- tty: serial: samsung: Properly set flags in autoCTS mode (bsc#1051510).
- tun: forbid iface creation with rtnl ops (networking-stable-18_12_12).
- uart: Fix crash in uart_write and uart_put_char (bsc#1051510).
- ucc_geth: Reset BQL queue when stopping device (networking-stable-19_02_01).
- ucma: fix a use-after-free in ucma_resolve_ip() (bsc#1051510).
- uevent: add alloc_uevent_skb() helper (bsc#1122982).
- Update config files. Remove conditional support for smb2 and SMB3:
- Update patches.arch/s390-sles15-zcrypt-fix-specification-exception.patch (LTC#174936, bsc#1123060, bsc#1123061).
- Update patches.fixes/acpi-nfit-Block-function-zero-DSMs.patch (bsc#1051510, bsc#1121789).
- Update patches.fixes/acpi-nfit-Fix-command-supported-detection.patch (bsc#1051510, bsc#1121789). Add more detailed bugzilla reference.
- Update patches.kabi/bpf-prevent-memory-disambiguation-attack.patch (bsc#1087082).
- Update patches.kabi/bpf-properly-enforce-index-mask-to-prevent-out-of-bo.patch (bsc#1098425).
- uprobes: Fix handle_swbp() vs. unregister() + register() race once more (bsc#1051510).
- usb: Add new USB LPM helpers (bsc#1120902).
- usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bsc#1120902).
- usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bsc#1120902).
- usb: Consolidate LPM checks to avoid enabling LPM twice (bsc#1120902).
- usb: dwc3: Correct the logic for checking TRB full in __dwc3_prepare_one_trb() (bsc#1051510).
- usb: dwc3: gadget: Clear req-&gt;needs_extra_trb flag on cleanup (bsc#1120902).
- usb: dwc3: gadget: Disable CSP for stream OUT ep (bsc#1051510).
- usb: dwc3: gadget: Handle 0 xfer length for OUT EP (bsc#1051510).
- usb: dwc3: trace: add missing break statement to make compiler happy (bsc#1120902).
- usb: gadget: musb: fix short isoc packets with inventra dma (bsc#1051510).
- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bsc#1051510).
- usb: hub: delay hub autosuspend if USB3 port is still link training (bsc#1051510).
- usb: mtu3: fix the issue about SetFeature(U1/U2_Enable) (bsc#1051510).
- usb: musb: dsps: fix otg state machine (bsc#1051510).
- usb: musb: dsps: fix runtime pm for peripheral mode (bsc#1120902).
- usbnet: ipheth: fix potential recvmsg bug and recvmsg bug 2 (networking-stable-18_12_03).
- usbnet: smsc95xx: fix rx packet alignment (bsc#1051510).
- usb: phy: am335x: fix race condition in _probe (bsc#1051510).
- usb: serial: option: add Fibocom NL678 series (bsc#1120902).
- usb: serial: pl2303: add ids for Hewlett-Packard HP POS pole displays (bsc#1120902).
- usb: serial: pl2303: add new PID to support PL2303TB (bsc#1051510).
- usb: serial: simple: add Motorola Tetra TPG2200 device id (bsc#1051510).
- usb: storage: add quirk for SMI SM3350 (bsc#1120902).
- usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bsc#1120902).
- usb: xhci: fix 'broken_suspend' placement in struct xchi_hcd (bsc#1119086).
- veth: set peer GSO values (bsc#1051510).
- vfio: ccw: fix cleanup if cp_prefetch fails (git-fixes).
- vfio: ccw: process ssch with interrupts disabled (git-fixes).
- vfs: Add iomap_seek_hole and iomap_seek_data helpers (bsc#1070995).
- vfs: Add page_cache_seek_hole_data helper (bsc#1070995).
- vfs: in iomap seek_{hole,data}, return -ENXIO for negative offsets (bsc#1070995).
- vhost: correctly check the return value of translate_desc() in log_used() (bsc#1051510).
- vhost: log dirty page correctly (networking-stable-19_01_26).
- vhost: make sure used idx is seen before log in vhost_add_used_n() (networking-stable-19_01_04).
- vhost/vsock: fix uninitialized vhost_vsock-&gt;guest_cid (bsc#1051510).
- video: clps711x-fb: release disp device node in probe() (bsc#1051510).
- virtio-blk: Consider virtio_max_dma_size() for maximum segment size (bsc#1120008).
- virtio: Introduce virtio_max_dma_size() (bsc#1120008).
- virtio_net: Do not call free_old_xmit_skbs for xdp_frames (networking-stable-19_02_01).
- virtio-net: fail XDP set if guest csum is negotiated (networking-stable-18_12_03).
- virtio-net: keep vnet header zeroed after processing XDP (networking-stable-18_12_12).
- virtio/s390: avoid race on vcdev-&gt;config (git-fixes).
- virtio/s390: fix race in ccw_io_helper() (git-fixes).
- vmci: Support upto 64-bit PPNs (bsc#1127286).
- vsock: cope with memory allocation failure at socket creation time (bsc#1051510).
- vsock: Send reset control packet when socket is partially bound (networking-stable-19_01_04).
- vt: invoke notifier on screen size change (bsc#1051510).
- vxge: ensure data0 is initialized in when fetching firmware version information (bsc#1051510).
- vxlan: Fix GRO cells race condition between receive and link delete (git-fixes).
- vxlan: test dev-&gt;flags &amp; IFF_UP before calling gro_cells_receive() (git-fixes).
- vxlan: update skb dst pmtu on tx path (bsc#1123456).
- w90p910_ether: remove incorrect __init annotation (bsc#1051510).
- watchdog: docs: kernel-api: do not reference removed functions (bsc#1051510).
- watchdog: w83627hf_wdt: Add quirk for Inves system (bsc#1106434).
- writeback: do not decrement wb-&gt;refcnt if !wb-&gt;bdi (git fixes (writeback)).
- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).
- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).
- x86/amd_nb: Add PCI device IDs for family 17h, model 30h ().
- x86/amd_nb: Add support for newer PCI topologies ().
- x86/a.out: Clear the dump structure initially (bsc#1114279).
- x86/apic: Provide apic_ack_irq() (bsc#1122822).
- x86/boot/e820: Avoid overwriting e820_table_firmware (bsc#1127154).
- x86/boot/e820: Introduce the bootloader provided e820_table_firmware[] table (bsc#1127154).
- x86/boot/e820: Rename the e820_table_firmware to e820_table_kexec (bsc#1127154).
- x86/bugs: Add AMD's variant of SSB_NO (bsc#1114279).
- x86/bugs: Update when to check for the LS_CFG SSBD mitigation (bsc#1114279).
- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).
- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).
- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).
- x86/kaslr: Fix incorrect i8254 outb() parameters (bsc#1114279).
- x86/kvmclock: set pvti_cpu0_va after enabling kvmclock (bsc#1098382).
- x86/MCE: Initialize mce.bank in the case of a fatal error in mce_no_way_out() (bsc#1114279).
- x86/microcode/amd: Do not falsely trick the late loading mechanism (bsc#1114279).
- x86/mm: Drop usage of __flush_tlb_all() in kernel_physical_mapping_init() (bsc#1114279).
- x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE (bsc#1114279).
- x86/mtrr: Do not copy uninitialized gentry fields back to userspace (bsc#1114279).
- x86/pkeys: Properly copy pkey state at fork() (bsc#1129366).
- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bsc#1125614).
- x86/pvclock: add setter for pvclock_pvti_cpu0_va (bsc#1098382).
- x86/resctrl: Fix rdt_find_domain() return value and checks (bsc#1114279).
- x86: respect memory size limiting via mem= parameter (bsc#1117645).
- x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variant (bsc#1114279).
- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1114279).
- x86/vdso: Remove obsolete 'fake section table' reservation (bsc#1114279).
- x86/xen: dont add memory above max allowed allocation (bsc#1117645).
- x86/xen/time: Output xen sched_clock time from 0 (bsc#1098382).
- x86/xen/time: set pvclock flags on xen_time_init() (bsc#1098382).
- x86/xen/time: setup vcpu 0 time info page (bsc#1098382).
- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).
- xen: fix dom0 boot on huge systems (bsc#1127836).
- xen: Fix x86 sched_clock() interface for xen (bsc#1098382).
- xen/manage: do not complain about an empty value in control/sysrq node (bsc#1065600).
- xen: remove pre-xen3 fallback handlers (bsc#1065600).
- xfs: add option to mount with barrier=0 or barrier=1 (bsc#1088133).
- xfs: fix contiguous dquot chunk iteration livelock (bsc#1070995).
- xfs: remove filestream item xfs_inode reference (bsc#1127961).
- xfs: rewrite xfs_dq_get_next_id using xfs_iext_lookup_extent (bsc#1070995).
- xhci: Add quirk to zero 64bit registers on Renesas PCIe controllers (bsc#1120854).
- xhci: workaround CSS timeout on AMD SNPS 3.0 xHC (bsc#1119086).
- xprtrdma: Reset credit grant properly after a disconnect (git-fixes).
- Yama: Check for pid death before checking ancestry (bsc#1051510).
- yam: fix a missing-check bug (bsc#1051510).
- zswap: re-check zswap_is_full() after do zswap_shrink() (bsc#1051510).
- xfs: Switch to iomap for SEEK_HOLE / SEEK_DATA (bsc#1070995).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-26"/>
	<updated date="2019-03-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046305">SUSE bug 1046305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046306">SUSE bug 1046306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050252">SUSE bug 1050252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050549">SUSE bug 1050549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051510">SUSE bug 1051510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054610">SUSE bug 1054610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055121">SUSE bug 1055121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056658">SUSE bug 1056658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056662">SUSE bug 1056662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056787">SUSE bug 1056787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060463">SUSE bug 1060463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063638">SUSE bug 1063638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070995">SUSE bug 1070995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074578">SUSE bug 1074578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075006">SUSE bug 1075006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075419">SUSE bug 1075419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075748">SUSE bug 1075748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078355">SUSE bug 1078355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080039">SUSE bug 1080039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082943">SUSE bug 1082943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083548">SUSE bug 1083548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083647">SUSE bug 1083647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084216">SUSE bug 1084216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086095">SUSE bug 1086095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086282">SUSE bug 1086282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086301">SUSE bug 1086301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086313">SUSE bug 1086313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086314">SUSE bug 1086314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086323">SUSE bug 1086323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087084">SUSE bug 1087084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087092">SUSE bug 1087092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087939">SUSE bug 1087939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088133">SUSE bug 1088133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094555">SUSE bug 1094555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098382">SUSE bug 1098382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098425">SUSE bug 1098425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098995">SUSE bug 1098995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102055">SUSE bug 1102055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103429">SUSE bug 1103429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104353">SUSE bug 1104353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106105">SUSE bug 1106105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106434">SUSE bug 1106434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106811">SUSE bug 1106811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107078">SUSE bug 1107078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107665">SUSE bug 1107665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108101">SUSE bug 1108101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108870">SUSE bug 1108870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109695">SUSE bug 1109695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110096">SUSE bug 1110096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110705">SUSE bug 1110705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111666">SUSE bug 1111666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113042">SUSE bug 1113042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113712">SUSE bug 1113712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113722">SUSE bug 1113722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113769">SUSE bug 1113769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113939">SUSE bug 1113939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114279">SUSE bug 1114279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114585">SUSE bug 1114585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114893">SUSE bug 1114893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117108">SUSE bug 1117108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117155">SUSE bug 1117155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117645">SUSE bug 1117645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117947">SUSE bug 1117947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118338">SUSE bug 1118338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119019">SUSE bug 1119019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119086">SUSE bug 1119086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119766">SUSE bug 1119766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119843">SUSE bug 1119843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120008">SUSE bug 1120008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120318">SUSE bug 1120318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120601">SUSE bug 1120601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120758">SUSE bug 1120758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120854">SUSE bug 1120854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120902">SUSE bug 1120902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120909">SUSE bug 1120909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120955">SUSE bug 1120955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121317">SUSE bug 1121317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121726">SUSE bug 1121726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121789">SUSE bug 1121789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121805">SUSE bug 1121805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122019">SUSE bug 1122019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122159">SUSE bug 1122159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122192">SUSE bug 1122192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122292">SUSE bug 1122292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122324">SUSE bug 1122324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122554">SUSE bug 1122554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122662">SUSE bug 1122662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122764">SUSE bug 1122764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122779">SUSE bug 1122779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122822">SUSE bug 1122822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122885">SUSE bug 1122885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122927">SUSE bug 1122927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122944">SUSE bug 1122944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122971">SUSE bug 1122971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122982">SUSE bug 1122982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123060">SUSE bug 1123060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123061">SUSE bug 1123061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123161">SUSE bug 1123161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123317">SUSE bug 1123317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123348">SUSE bug 1123348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123357">SUSE bug 1123357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123456">SUSE bug 1123456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123538">SUSE bug 1123538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123697">SUSE bug 1123697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123882">SUSE bug 1123882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123933">SUSE bug 1123933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124055">SUSE bug 1124055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124204">SUSE bug 1124204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124235">SUSE bug 1124235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124579">SUSE bug 1124579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124589">SUSE bug 1124589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124728">SUSE bug 1124728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124732">SUSE bug 1124732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124735">SUSE bug 1124735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124969">SUSE bug 1124969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124974">SUSE bug 1124974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124975">SUSE bug 1124975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124976">SUSE bug 1124976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124978">SUSE bug 1124978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124979">SUSE bug 1124979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124980">SUSE bug 1124980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124981">SUSE bug 1124981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124982">SUSE bug 1124982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124984">SUSE bug 1124984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124985">SUSE bug 1124985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125109">SUSE bug 1125109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125125">SUSE bug 1125125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125252">SUSE bug 1125252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125315">SUSE bug 1125315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125614">SUSE bug 1125614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125728">SUSE bug 1125728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125780">SUSE bug 1125780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125797">SUSE bug 1125797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125799">SUSE bug 1125799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125800">SUSE bug 1125800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125907">SUSE bug 1125907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125947">SUSE bug 1125947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126131">SUSE bug 1126131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126209">SUSE bug 1126209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126389">SUSE bug 1126389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126393">SUSE bug 1126393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126476">SUSE bug 1126476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126480">SUSE bug 1126480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126481">SUSE bug 1126481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126488">SUSE bug 1126488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126495">SUSE bug 1126495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126555">SUSE bug 1126555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126579">SUSE bug 1126579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126789">SUSE bug 1126789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126790">SUSE bug 1126790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126802">SUSE bug 1126802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126803">SUSE bug 1126803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126804">SUSE bug 1126804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126805">SUSE bug 1126805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126806">SUSE bug 1126806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126807">SUSE bug 1126807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127042">SUSE bug 1127042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127062">SUSE bug 1127062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127082">SUSE bug 1127082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127154">SUSE bug 1127154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127285">SUSE bug 1127285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127286">SUSE bug 1127286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127307">SUSE bug 1127307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127363">SUSE bug 1127363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127493">SUSE bug 1127493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127494">SUSE bug 1127494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127495">SUSE bug 1127495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127496">SUSE bug 1127496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127497">SUSE bug 1127497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127498">SUSE bug 1127498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127534">SUSE bug 1127534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127561">SUSE bug 1127561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127567">SUSE bug 1127567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127595">SUSE bug 1127595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127603">SUSE bug 1127603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127682">SUSE bug 1127682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127731">SUSE bug 1127731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127750">SUSE bug 1127750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127836">SUSE bug 1127836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127961">SUSE bug 1127961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128094">SUSE bug 1128094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128166">SUSE bug 1128166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128351">SUSE bug 1128351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128451">SUSE bug 1128451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128895">SUSE bug 1128895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129046">SUSE bug 1129046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129080">SUSE bug 1129080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129163">SUSE bug 1129163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129179">SUSE bug 1129179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129181">SUSE bug 1129181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129182">SUSE bug 1129182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129183">SUSE bug 1129183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129184">SUSE bug 1129184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129205">SUSE bug 1129205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129281">SUSE bug 1129281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129284">SUSE bug 1129284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129285">SUSE bug 1129285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129291">SUSE bug 1129291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129292">SUSE bug 1129292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129293">SUSE bug 1129293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129294">SUSE bug 1129294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129295">SUSE bug 1129295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129296">SUSE bug 1129296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129326">SUSE bug 1129326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129327">SUSE bug 1129327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129330">SUSE bug 1129330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129363">SUSE bug 1129363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129366">SUSE bug 1129366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129497">SUSE bug 1129497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129519">SUSE bug 1129519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129543">SUSE bug 1129543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129547">SUSE bug 1129547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129551">SUSE bug 1129551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129581">SUSE bug 1129581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129625">SUSE bug 1129625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129664">SUSE bug 1129664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129739">SUSE bug 1129739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129923">SUSE bug 1129923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807502">SUSE bug 807502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824948">SUSE bug 824948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828192">SUSE bug 828192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925178">SUSE bug 925178</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20669/">CVE-2018-20669</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2024/">CVE-2019-2024</cve>
	<cve impact="moderate" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3459/">CVE-2019-3459</cve>
	<cve impact="moderate" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3460/">CVE-2019-3460</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3819/">CVE-2019-3819</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7222/">CVE-2019-7222</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7308/">CVE-2019-7308</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8912/">CVE-2019-8912</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8980/">CVE-2019-8980</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522492" comment="kernel-default-4.12.14-95.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522493" comment="kernel-default-devel-4.12.14-95.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522494" comment="kernel-default-extra-4.12.14-95.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522495" comment="kernel-devel-4.12.14-95.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522496" comment="kernel-macros-4.12.14-95.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522497" comment="kernel-source-4.12.14-95.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522498" comment="kernel-syms-4.12.14-95.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78902" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1128503" ref_url="https://bugzilla.suse.com/1128503" source="BUGZILLA"/>
		<reference ref_id="1130267" ref_url="https://bugzilla.suse.com/1130267" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12181" ref_url="https://www.suse.com/security/cve/CVE-2018-12181/" source="CVE"/>
		<reference ref_id="CVE-2019-0160" ref_url="https://www.suse.com/security/cve/CVE-2019-0160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005247.html" source="SUSE-SU"/>
		<description>
This update for ovmf fixes the following issues:

Security issues fixed: 

- CVE-2019-0160: Fixed multiple buffer overflows in UDF-related codes in MdeModulePkg\Universal\Disk\PartitionDxe\Udf.c 
  and MdeModulePkg\Universal\Disk\UdfDxe (bsc#1130267).
- CVE-2018-12181: Fixed a stack buffer overflow in the HII database when a corrupted Bitmap was used (bsc#1128503).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-27"/>
	<updated date="2019-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1128503">SUSE bug 1128503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130267">SUSE bug 1130267</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12181/">CVE-2018-12181</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0160/">CVE-2019-0160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522499" comment="qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78903" version="1" class="patch">
	<metadata>
		<title>Security update for w3m (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1077559" ref_url="https://bugzilla.suse.com/1077559" source="BUGZILLA"/>
		<reference ref_id="1077568" ref_url="https://bugzilla.suse.com/1077568" source="BUGZILLA"/>
		<reference ref_id="1077572" ref_url="https://bugzilla.suse.com/1077572" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6196" ref_url="https://www.suse.com/security/cve/CVE-2018-6196/" source="CVE"/>
		<reference ref_id="CVE-2018-6197" ref_url="https://www.suse.com/security/cve/CVE-2018-6197/" source="CVE"/>
		<reference ref_id="CVE-2018-6198" ref_url="https://www.suse.com/security/cve/CVE-2018-6198/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005254.html" source="SUSE-SU"/>
		<description>
This update for w3m fixes several issues.

These security issues were fixed:

- CVE-2018-6196: Prevent infinite recursion in HTMLlineproc0 caused by the feed_table_block_tag function which did not prevent a negative indent value (bsc#1077559)
- CVE-2018-6197: Prevent NULL pointer dereference in formUpdateBuffer (bsc#1077568)
- CVE-2018-6198: w3m did not properly handle temporary files when the ~/.w3m directory is unwritable, which allowed a local attacker to craft a symlink attack to overwrite arbitrary files (bsc#1077572)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-27"/>
	<updated date="2019-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077559">SUSE bug 1077559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077568">SUSE bug 1077568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077572">SUSE bug 1077572</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6196/">CVE-2018-6196</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6197/">CVE-2018-6197</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6198/">CVE-2018-6198</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521701" comment="w3m-0.5.3.git20161120-161.3.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78904" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1128189" ref_url="https://bugzilla.suse.com/1128189" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1543" ref_url="https://www.suse.com/security/cve/CVE-2019-1543/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005259.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 (OpenSSL Security Advisory [6 March 2019]) fixes the following issues:
	 
Security issue fixed: 	  

- CVE-2019-1543: Fixed an implementation error in ChaCha20-Poly1305 where it was allowed
  to set IV with more than 12 bytes (bsc#1128189). 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-28"/>
	<updated date="2019-03-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1128189">SUSE bug 1128189</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1543/">CVE-2019-1543</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522500" comment="libopenssl1_1-1.1.1-2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522501" comment="libopenssl1_1-32bit-1.1.1-2.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78905" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1125401" ref_url="https://bugzilla.suse.com/1125401" source="BUGZILLA"/>
		<reference ref_id="1128525" ref_url="https://bugzilla.suse.com/1128525" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8936" ref_url="https://www.suse.com/security/cve/CVE-2019-8936/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005258.html" source="SUSE-SU"/>
		<description>
This update for ntp fixes the following issues:

Security issue fixed: 	  

- CVE-2019-8936: Fixed a null pointer exception which could allow an authenticated attcker to cause 
  segmentation fault to ntpd (bsc#1128525).

Other isses addressed:

- Fixed an issue which caused openSSL mismatch (bsc#1125401)
- Fixed several bugs in the BANCOMM reclock driver.
- Fixed ntp_loopfilter.c snprintf compilation warnings.
- Fixed spurious initgroups() error message.
- Fixed STA_NANO struct timex units.
- Fixed GPS week rollover in libparse.
- Fixed incorrect poll interval in packet.
- Added a missing check for ENABLE_CMAC.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-28"/>
	<updated date="2019-03-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1125401">SUSE bug 1125401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128525">SUSE bug 1128525</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8936/">CVE-2019-8936</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521702" comment="ntp-4.2.8p13-85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521703" comment="ntp-doc-4.2.8p13-85.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78906" version="1" class="patch">
	<metadata>
		<title>Security update for bash (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1130324" ref_url="https://bugzilla.suse.com/1130324" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9924" ref_url="https://www.suse.com/security/cve/CVE-2019-9924/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005282.html" source="SUSE-SU"/>
		<description>
This update for bash fixes the following issues:
	  
Security issue fixed: 

- CVE-2019-9924: Fixed a vulnerability in which shell did not prevent user BASH_CMDS 
  allowing the user to execute any command with the permissions of the shell (bsc#1130324).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-02"/>
	<updated date="2019-04-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130324">SUSE bug 1130324</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9924/">CVE-2019-9924</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521744" comment="bash-4.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521745" comment="bash-doc-4.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521746" comment="bash-lang-4.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521747" comment="libreadline6-6.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521748" comment="libreadline6-32bit-6.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521749" comment="readline-doc-6.3-83.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78907" version="1" class="patch">
	<metadata>
		<title>Security update for file (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1096974" ref_url="https://bugzilla.suse.com/1096974" source="BUGZILLA"/>
		<reference ref_id="1096984" ref_url="https://bugzilla.suse.com/1096984" source="BUGZILLA"/>
		<reference ref_id="1126117" ref_url="https://bugzilla.suse.com/1126117" source="BUGZILLA"/>
		<reference ref_id="1126118" ref_url="https://bugzilla.suse.com/1126118" source="BUGZILLA"/>
		<reference ref_id="1126119" ref_url="https://bugzilla.suse.com/1126119" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10360" ref_url="https://www.suse.com/security/cve/CVE-2018-10360/" source="CVE"/>
		<reference ref_id="CVE-2019-8905" ref_url="https://www.suse.com/security/cve/CVE-2019-8905/" source="CVE"/>
		<reference ref_id="CVE-2019-8906" ref_url="https://www.suse.com/security/cve/CVE-2019-8906/" source="CVE"/>
		<reference ref_id="CVE-2019-8907" ref_url="https://www.suse.com/security/cve/CVE-2019-8907/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005284.html" source="SUSE-SU"/>
		<description>
This update for file fixes the following issues:

The following security vulnerabilities were addressed:

- Fixed an out-of-bounds read in the function do_core_note in readelf.c, which
  allowed remote attackers to cause a denial of service (application crash) via
  a crafted ELF file (bsc#1096974 CVE-2018-10360).
- CVE-2019-8905: Fixed a stack-based buffer over-read in do_core_note in readelf.c
  (bsc#1126118)
- CVE-2019-8906: Fixed an out-of-bounds read in do_core_note in readelf. c
  (bsc#1126119)
- CVE-2019-8907: Fixed a stack corruption in do_core_note in readelf.c
  (bsc#1126117)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-02"/>
	<updated date="2019-04-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1096974">SUSE bug 1096974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096984">SUSE bug 1096984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126117">SUSE bug 1126117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126118">SUSE bug 1126118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126119">SUSE bug 1126119</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10360/">CVE-2018-10360</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8905/">CVE-2019-8905</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8906/">CVE-2019-8906</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8907/">CVE-2019-8907</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521750" comment="file-5.22-10.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521751" comment="file-magic-5.22-10.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521752" comment="libmagic1-5.22-10.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521753" comment="libmagic1-32bit-5.22-10.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78908" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1125330" ref_url="https://bugzilla.suse.com/1125330" source="BUGZILLA"/>
		<reference ref_id="1127987" ref_url="https://bugzilla.suse.com/1127987" source="BUGZILLA"/>
		<reference ref_id="1129821" ref_url="https://bugzilla.suse.com/1129821" source="BUGZILLA"/>
		<reference ref_id="1130262" ref_url="https://bugzilla.suse.com/1130262" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18335" ref_url="https://www.suse.com/security/cve/CVE-2018-18335/" source="CVE"/>
		<reference ref_id="CVE-2018-18356" ref_url="https://www.suse.com/security/cve/CVE-2018-18356/" source="CVE"/>
		<reference ref_id="CVE-2018-18506" ref_url="https://www.suse.com/security/cve/CVE-2018-18506/" source="CVE"/>
		<reference ref_id="CVE-2019-5785" ref_url="https://www.suse.com/security/cve/CVE-2019-5785/" source="CVE"/>
		<reference ref_id="CVE-2019-9788" ref_url="https://www.suse.com/security/cve/CVE-2019-9788/" source="CVE"/>
		<reference ref_id="CVE-2019-9790" ref_url="https://www.suse.com/security/cve/CVE-2019-9790/" source="CVE"/>
		<reference ref_id="CVE-2019-9791" ref_url="https://www.suse.com/security/cve/CVE-2019-9791/" source="CVE"/>
		<reference ref_id="CVE-2019-9792" ref_url="https://www.suse.com/security/cve/CVE-2019-9792/" source="CVE"/>
		<reference ref_id="CVE-2019-9793" ref_url="https://www.suse.com/security/cve/CVE-2019-9793/" source="CVE"/>
		<reference ref_id="CVE-2019-9794" ref_url="https://www.suse.com/security/cve/CVE-2019-9794/" source="CVE"/>
		<reference ref_id="CVE-2019-9795" ref_url="https://www.suse.com/security/cve/CVE-2019-9795/" source="CVE"/>
		<reference ref_id="CVE-2019-9796" ref_url="https://www.suse.com/security/cve/CVE-2019-9796/" source="CVE"/>
		<reference ref_id="CVE-2019-9801" ref_url="https://www.suse.com/security/cve/CVE-2019-9801/" source="CVE"/>
		<reference ref_id="CVE-2019-9810" ref_url="https://www.suse.com/security/cve/CVE-2019-9810/" source="CVE"/>
		<reference ref_id="CVE-2019-9813" ref_url="https://www.suse.com/security/cve/CVE-2019-9813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issuess addressed:	  

- update to Firefox ESR 60.6.1 (bsc#1130262):

- CVE-2019-9813: Fixed Ionmonkey type confusion with __proto__ mutations
- CVE-2019-9810: Fixed IonMonkey MArraySlice incorrect alias information

- Update to Firefox ESR 60.6 (bsc#1129821):

- CVE-2018-18506: Fixed an issue with Proxy Auto-Configuration file 
- CVE-2019-9801: Fixed an issue which could allow Windows programs to be exposed to web content
- CVE-2019-9788: Fixed multiple memory safety bugs
- CVE-2019-9790: Fixed a Use-after-free vulnerability when removing in-use DOM elements
- CVE-2019-9791: Fixed an incorrect Type inference for constructors entered through on-stack replacement 
  with IonMonkey
- CVE-2019-9792: Fixed an issue where IonMonkey leaks JS_OPTIMIZED_OUT magic value to script
- CVE-2019-9793: Fixed multiple improper bounds checks when Spectre mitigations are disabled
- CVE-2019-9794: Fixed an issue where command line arguments not discarded during execution
- CVE-2019-9795: Fixed a Type-confusion vulnerability in IonMonkey JIT compiler
- CVE-2019-9796: Fixed a Use-after-free vulnerability in SMIL animation controller


- Update to Firefox ESR 60.5.1 (bsc#1125330):

- CVE-2018-18356: Fixed a use-after-free vulnerability in the Skia library which can occur when
    creating a path, leading to a potentially exploitable crash.
- CVE-2019-5785: Fixed an integer overflow vulnerability in the Skia library which can occur
  after specific transform operations, leading to a potentially exploitable crash.
- CVE-2018-18335: Fixed a buffer overflow vulnerability in the Skia library which can occur with
  Canvas 2D acceleration on macOS. This issue was addressed by disabling Canvas 2D acceleration 
  in Firefox ESR.  Note: this does not affect other versions and platforms where Canvas 2D
  acceleration is already disabled by default.

Other issue addressed: 

- Fixed an issue with MozillaFirefox-translations-common which was causing error on update (bsc#1127987).

Release notes: https://www.mozilla.org/en-US/security/advisories/mfsa2019-12/
Release notes: https://www.mozilla.org/en-US/security/advisories/mfsa2019-08/
Release notes: https://www.mozilla.org/en-US/security/advisories/mfsa2019-05/	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-03"/>
	<updated date="2019-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1125330">SUSE bug 1125330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127987">SUSE bug 1127987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130262">SUSE bug 1130262</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18335/">CVE-2018-18335</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18356/">CVE-2018-18356</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18506/">CVE-2018-18506</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5785/">CVE-2019-5785</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9788/">CVE-2019-9788</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9790/">CVE-2019-9790</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9791/">CVE-2019-9791</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9792/">CVE-2019-9792</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9793/">CVE-2019-9793</cve>
	<cve impact="important" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9794/">CVE-2019-9794</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9795/">CVE-2019-9795</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9796/">CVE-2019-9796</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-9801/">CVE-2019-9801</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9810/">CVE-2019-9810</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9813/">CVE-2019-9813</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78909" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1026236" ref_url="https://bugzilla.suse.com/1026236" source="BUGZILLA"/>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1069468" ref_url="https://bugzilla.suse.com/1069468" source="BUGZILLA"/>
		<reference ref_id="1119161" ref_url="https://bugzilla.suse.com/1119161" source="BUGZILLA"/>
		<reference ref_id="1120067" ref_url="https://bugzilla.suse.com/1120067" source="BUGZILLA"/>
		<reference ref_id="1123157" ref_url="https://bugzilla.suse.com/1123157" source="BUGZILLA"/>
		<reference ref_id="1126140" ref_url="https://bugzilla.suse.com/1126140" source="BUGZILLA"/>
		<reference ref_id="1126141" ref_url="https://bugzilla.suse.com/1126141" source="BUGZILLA"/>
		<reference ref_id="1126192" ref_url="https://bugzilla.suse.com/1126192" source="BUGZILLA"/>
		<reference ref_id="1126195" ref_url="https://bugzilla.suse.com/1126195" source="BUGZILLA"/>
		<reference ref_id="1126196" ref_url="https://bugzilla.suse.com/1126196" source="BUGZILLA"/>
		<reference ref_id="1126197" ref_url="https://bugzilla.suse.com/1126197" source="BUGZILLA"/>
		<reference ref_id="1126198" ref_url="https://bugzilla.suse.com/1126198" source="BUGZILLA"/>
		<reference ref_id="1126201" ref_url="https://bugzilla.suse.com/1126201" source="BUGZILLA"/>
		<reference ref_id="1126325" ref_url="https://bugzilla.suse.com/1126325" source="BUGZILLA"/>
		<reference ref_id="1127400" ref_url="https://bugzilla.suse.com/1127400" source="BUGZILLA"/>
		<reference ref_id="1127620" ref_url="https://bugzilla.suse.com/1127620" source="BUGZILLA"/>
		<reference ref_id="1129623" ref_url="https://bugzilla.suse.com/1129623" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005305.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed: 	  

- Fixed an issue which could allow malicious PV guests may cause a host crash or 
  gain access to data pertaining to other guests.Additionally, vulnerable configurations 
  are likely to be unstable even in the absence of an attack (bsc#1126198).
- Fixed multiple access violations introduced by XENMEM_exchange hypercall which could allow 
  a single PV guest to leak arbitrary amounts of memory, leading to a denial of service (bsc#1126192).
- Fixed an issue which could allow a malicious unprivileged guest userspace process to escalate its privilege 
  to that of other userspace processes in the same guest and potentially thereby to that 
  of the guest operating system (bsc#1126201).
- Fixed an issue which could allow malicious or buggy x86 PV guest kernels to mount a Denial of Service
  attack affecting the whole system (bsc#1126197).
- Fixed an issue which could allow an untrusted PV domain with access to a physical device to DMA into its own 
  pagetables leading to privilege escalation (bsc#1126195).
- Fixed an issue which could allow a malicious or buggy x86 PV guest kernels can mount a Denial of Service
  attack affecting the whole system (bsc#1126196).
- CVE-2019-6778: Fixed a heap buffer overflow in tcp_emu() found in slirp (bsc#1123157).
- Fixed an issue which could allow malicious 64bit PV guests to cause a host crash (bsc#1127400).
- Fixed an issue which could allow malicious or buggy guests with passed through PCI devices to  be able to 
  escalate their privileges, crash the host, or access data belonging to other guests. Additionally memory 
  leaks were also possible (bsc#1126140).
- Fixed a race condition issue which could allow malicious PV guests to escalate their privilege to that 
  of the hypervisor (bsc#1126141).
- CVE-2019-9824: Fixed an information leak in SLiRP networking implementation which could allow a user/process 
  to read uninitialised stack memory contents (bsc#1129623).

Other issues addressed: 

- Upstream bug fixes (bsc#1027519)
- Packages should no longer use /var/adm/fillup-templates (bsc#1069468). 
- Added Xen cmdline option 'suse_vtsc_tolerance' to avoid TSC emulation for HVM domUs (bsc#1026236).
- Fixed an issue where setup of grant_tables and other variables may fail (bsc#1126325).
- Fixed a building issue (bsc#1119161).
- Added a requirement for xen, xl.cfg firmware='pvgrub32|pvgrub64 (bsc#1127620).
- Fixed a segmetation fault in Libvirt when crash triggered on top of HVM guest (bsc#1120067).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-05"/>
	<updated date="2019-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1026236">SUSE bug 1026236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069468">SUSE bug 1069468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119161">SUSE bug 1119161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120067">SUSE bug 1120067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123157">SUSE bug 1123157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126197">SUSE bug 1126197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126198">SUSE bug 1126198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126201">SUSE bug 1126201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126325">SUSE bug 1126325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127400">SUSE bug 1127400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127620">SUSE bug 1127620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129623">SUSE bug 1129623</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522502" comment="xen-4.11.1_04-2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522503" comment="xen-libs-4.11.1_04-2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522504" comment="xen-libs-32bit-4.11.1_04-2.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78910" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1130721" ref_url="https://bugzilla.suse.com/1130721" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1787" ref_url="https://www.suse.com/security/cve/CVE-2019-1787/" source="CVE"/>
		<reference ref_id="CVE-2019-1788" ref_url="https://www.suse.com/security/cve/CVE-2019-1788/" source="CVE"/>
		<reference ref_id="CVE-2019-1789" ref_url="https://www.suse.com/security/cve/CVE-2019-1789/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005308.html" source="SUSE-SU"/>
		<description>
This update for clamav to version 0.100.3 fixes the following issues:

Security issues fixed (bsc#1130721): 	  

- CVE-2019-1787: Fixed an out-of-bounds heap read condition which may occur
  when scanning PDF documents.   
- CVE-2019-1789: Fixed an out-of-bounds heap read condition which may occur
  when scanning PE files (i.e. Windows EXE and DLL files).
- CVE-2019-1788: Fixed an out-of-bounds heap write condition which may occur
  when scanning OLE2 files such as Microsoft Office 97-2003 documents. 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-08"/>
	<updated date="2019-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1787/">CVE-2019-1787</cve>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-1788/">CVE-2019-1788</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1789/">CVE-2019-1789</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521756" comment="clamav-0.100.3-33.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78911" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1124799" ref_url="https://bugzilla.suse.com/1124799" source="BUGZILLA"/>
		<reference ref_id="1124800" ref_url="https://bugzilla.suse.com/1124800" source="BUGZILLA"/>
		<reference ref_id="1124802" ref_url="https://bugzilla.suse.com/1124802" source="BUGZILLA"/>
		<reference ref_id="1124803" ref_url="https://bugzilla.suse.com/1124803" source="BUGZILLA"/>
		<reference ref_id="1124805" ref_url="https://bugzilla.suse.com/1124805" source="BUGZILLA"/>
		<reference ref_id="1124806" ref_url="https://bugzilla.suse.com/1124806" source="BUGZILLA"/>
		<reference ref_id="1124824" ref_url="https://bugzilla.suse.com/1124824" source="BUGZILLA"/>
		<reference ref_id="1124825" ref_url="https://bugzilla.suse.com/1124825" source="BUGZILLA"/>
		<reference ref_id="1124826" ref_url="https://bugzilla.suse.com/1124826" source="BUGZILLA"/>
		<reference ref_id="1124827" ref_url="https://bugzilla.suse.com/1124827" source="BUGZILLA"/>
		<reference ref_id="1125099" ref_url="https://bugzilla.suse.com/1125099" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-7572" ref_url="https://www.suse.com/security/cve/CVE-2019-7572/" source="CVE"/>
		<reference ref_id="CVE-2019-7573" ref_url="https://www.suse.com/security/cve/CVE-2019-7573/" source="CVE"/>
		<reference ref_id="CVE-2019-7574" ref_url="https://www.suse.com/security/cve/CVE-2019-7574/" source="CVE"/>
		<reference ref_id="CVE-2019-7575" ref_url="https://www.suse.com/security/cve/CVE-2019-7575/" source="CVE"/>
		<reference ref_id="CVE-2019-7576" ref_url="https://www.suse.com/security/cve/CVE-2019-7576/" source="CVE"/>
		<reference ref_id="CVE-2019-7577" ref_url="https://www.suse.com/security/cve/CVE-2019-7577/" source="CVE"/>
		<reference ref_id="CVE-2019-7578" ref_url="https://www.suse.com/security/cve/CVE-2019-7578/" source="CVE"/>
		<reference ref_id="CVE-2019-7635" ref_url="https://www.suse.com/security/cve/CVE-2019-7635/" source="CVE"/>
		<reference ref_id="CVE-2019-7636" ref_url="https://www.suse.com/security/cve/CVE-2019-7636/" source="CVE"/>
		<reference ref_id="CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637/" source="CVE"/>
		<reference ref_id="CVE-2019-7638" ref_url="https://www.suse.com/security/cve/CVE-2019-7638/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005311.html" source="SUSE-SU"/>
		<description>
This update for SDL fixes the following issues:
	  
Security issues fixed:	  

- CVE-2019-7572: Fixed a buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c.(bsc#1124806).
- CVE-2019-7578: Fixed a heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c (bsc#1125099).
- CVE-2019-7576: Fixed heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (bsc#1124799).
- CVE-2019-7573: Fixed a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (bsc#1124805).
- CVE-2019-7635: Fixed a heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c. (bsc#1124827).
- CVE-2019-7636: Fixed a heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c (bsc#1124826).
- CVE-2019-7638: Fixed a heap-based buffer over-read in Map1toN in video/SDL_pixels.c (bsc#1124824).
- CVE-2019-7574: Fixed a heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c (bsc#1124803).
- CVE-2019-7575: Fixed a heap-based buffer overflow in MS_ADPCM_decode in audio/SDL_wave.c (bsc#1124802).
- CVE-2019-7637: Fixed a heap-based buffer overflow in SDL_FillRect function in SDL_surface.c (bsc#1124825).
- CVE-2019-7577: Fixed a buffer over read in SDL_LoadWAV_RW in audio/SDL_wave.c (bsc#1124800). 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-08"/>
	<updated date="2019-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124799">SUSE bug 1124799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124800">SUSE bug 1124800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124802">SUSE bug 1124802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124803">SUSE bug 1124803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124805">SUSE bug 1124805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124806">SUSE bug 1124806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124824">SUSE bug 1124824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124825">SUSE bug 1124825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124826">SUSE bug 1124826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124827">SUSE bug 1124827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125099">SUSE bug 1125099</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-7572/">CVE-2019-7572</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7573/">CVE-2019-7573</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7574/">CVE-2019-7574</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7575/">CVE-2019-7575</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7576/">CVE-2019-7576</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7577/">CVE-2019-7577</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7578/">CVE-2019-7578</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7635/">CVE-2019-7635</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7636/">CVE-2019-7636</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7638/">CVE-2019-7638</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521757" comment="libSDL-1_2-0-1.2.15-15.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78912" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1119687" ref_url="https://bugzilla.suse.com/1119687" source="BUGZILLA"/>
		<reference ref_id="1131576" ref_url="https://bugzilla.suse.com/1131576" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20346" ref_url="https://www.suse.com/security/cve/CVE-2018-20346/" source="CVE"/>
		<reference ref_id="CVE-2018-20506" ref_url="https://www.suse.com/security/cve/CVE-2018-20506/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005313.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

Security issues fixed: 

- CVE-2018-20346: Fixed a remote code execution vulnerability in FTS3 (Magellan) (bsc#1119687).
- CVE-2018-20506: Fixed an integer overflow when FTS3 extension is enabled (bsc#1131576).    
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-09"/>
	<updated date="2019-04-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1119687">SUSE bug 1119687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131576">SUSE bug 1131576</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20346/">CVE-2018-20346</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20506/">CVE-2018-20506</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521758" comment="libsqlite3-0-3.8.10.2-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521759" comment="libsqlite3-0-32bit-3.8.10.2-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521760" comment="sqlite3-3.8.10.2-9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78913" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1081516" ref_url="https://bugzilla.suse.com/1081516" source="BUGZILLA"/>
		<reference ref_id="1102604" ref_url="https://bugzilla.suse.com/1102604" source="BUGZILLA"/>
		<reference ref_id="1112182" ref_url="https://bugzilla.suse.com/1112182" source="BUGZILLA"/>
		<reference ref_id="1120813" ref_url="https://bugzilla.suse.com/1120813" source="BUGZILLA"/>
		<reference ref_id="1125665" ref_url="https://bugzilla.suse.com/1125665" source="BUGZILLA"/>
		<reference ref_id="1126325" ref_url="https://bugzilla.suse.com/1126325" source="BUGZILLA"/>
		<reference ref_id="1127458" ref_url="https://bugzilla.suse.com/1127458" source="BUGZILLA"/>
		<reference ref_id="1131595" ref_url="https://bugzilla.suse.com/1131595" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3840" ref_url="https://www.suse.com/security/cve/CVE-2019-3840/" source="CVE"/>
		<reference ref_id="CVE-2019-3886" ref_url="https://www.suse.com/security/cve/CVE-2019-3886/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005338.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Security issue fixed: 

- CVE-2019-3840: Fixed a null pointer dereference vulnerability in virJSONValueObjectHasKey function which could
  have resulted in a remote denial of service via the guest agent (bsc#1127458).
- CVE-2019-3886: Fixed an information leak which allowed to retrieve the guest
  hostname under readonly mode (bsc#1131595).

Other issues addressed: 

- libxl: support Xen's max_grant_frames setting with maxGrantFrames attribute on the xenbus controller (bsc#1126325).
- conf: added new 'xenbus' controller type
- util: skip RDMA detection for non-PCI network devices (bsc#1112182).
- qemu: don't use CAP_DAC_OVERRIDE capability if non-root (bsc#1125665).
- qemu: fix issues related to restricted permissions on /dev/sev(bsc#1102604).
- libxl: save current memory value after successful balloon (bsc#1120813).
- libxl: Add support for soft reset. (bsc#1081516)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-15"/>
	<updated date="2019-04-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081516">SUSE bug 1081516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102604">SUSE bug 1102604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112182">SUSE bug 1112182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120813">SUSE bug 1120813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125665">SUSE bug 1125665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126325">SUSE bug 1126325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127458">SUSE bug 1127458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131595">SUSE bug 1131595</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3840/">CVE-2019-3840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-3886/">CVE-2019-3886</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522505" comment="libvirt-4.0.0-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522506" comment="libvirt-admin-4.0.0-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522507" comment="libvirt-client-4.0.0-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522508" comment="libvirt-daemon-4.0.0-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522509" comment="libvirt-daemon-config-network-4.0.0-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522510" comment="libvirt-daemon-config-nwfilter-4.0.0-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522511" comment="libvirt-daemon-driver-interface-4.0.0-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522512" comment="libvirt-daemon-driver-libxl-4.0.0-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522513" comment="libvirt-daemon-driver-lxc-4.0.0-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522514" comment="libvirt-daemon-driver-network-4.0.0-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522515" comment="libvirt-daemon-driver-nodedev-4.0.0-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522516" comment="libvirt-daemon-driver-nwfilter-4.0.0-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522517" comment="libvirt-daemon-driver-qemu-4.0.0-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522518" comment="libvirt-daemon-driver-secret-4.0.0-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522519" comment="libvirt-daemon-driver-storage-4.0.0-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522520" comment="libvirt-daemon-driver-storage-core-4.0.0-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522521" comment="libvirt-daemon-driver-storage-disk-4.0.0-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522522" comment="libvirt-daemon-driver-storage-iscsi-4.0.0-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522523" comment="libvirt-daemon-driver-storage-logical-4.0.0-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522524" comment="libvirt-daemon-driver-storage-mpath-4.0.0-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522525" comment="libvirt-daemon-driver-storage-rbd-4.0.0-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522526" comment="libvirt-daemon-driver-storage-scsi-4.0.0-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522527" comment="libvirt-daemon-lxc-4.0.0-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522528" comment="libvirt-daemon-qemu-4.0.0-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522529" comment="libvirt-daemon-xen-4.0.0-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522530" comment="libvirt-doc-4.0.0-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522531" comment="libvirt-libs-4.0.0-8.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78914" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1131493" ref_url="https://bugzilla.suse.com/1131493" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5953" ref_url="https://www.suse.com/security/cve/CVE-2019-5953/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005343.html" source="SUSE-SU"/>
		<description>
This update for wget fixes the following issues:

Security issue fixed:

- CVE-2019-5953: Fixed a buffer overflow vulnerability which might cause code execution (bsc#1131493).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-16"/>
	<updated date="2019-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131493">SUSE bug 1131493</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5953/">CVE-2019-5953</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521764" comment="wget-1.14-21.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78915" version="1" class="patch">
	<metadata>
		<title>Security update for soundtouch (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1108631" ref_url="https://bugzilla.suse.com/1108631" source="BUGZILLA"/>
		<reference ref_id="1108632" ref_url="https://bugzilla.suse.com/1108632" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17097" ref_url="https://www.suse.com/security/cve/CVE-2018-17097/" source="CVE"/>
		<reference ref_id="CVE-2018-17098" ref_url="https://www.suse.com/security/cve/CVE-2018-17098/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005036.html" source="SUSE-SU"/>
		<description>
This update for soundtouch fixes the following issues:

Security issues fixed:

- CVE-2018-17098: Fixed a heap corruption from size inconsistency, which
  allowed remote attackers to cause a denial of service or possibly have
  other unspecified impact (bsc#1108632)
- CVE-2018-17097: Fixed a double free, which allowed remote attackers to cause
  a denial of service or possibly have other unspecified impact  (bsc#1108631)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-15"/>
	<updated date="2019-01-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1108631">SUSE bug 1108631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108632">SUSE bug 1108632</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-17097/">CVE-2018-17097</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-17098/">CVE-2018-17098</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521774" comment="libSoundTouch0-1.7.1-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521775" comment="libSoundTouch0-32bit-1.7.1-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521776" comment="soundtouch-1.7.1-5.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78916" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005344.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

Security issue fixed:

- CVE-2019-9636: Fixed an information disclosure because of incorrect handling of Unicode encoding during NFKC normalization (bsc#1129346).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-16"/>
	<updated date="2019-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521777" comment="libpython3_4m1_0-3.4.6-25.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521778" comment="python3-3.4.6-25.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521779" comment="python3-base-3.4.6-25.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521780" comment="python3-curses-3.4.6-25.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78917" version="1" class="patch">
	<metadata>
		<title>Security update for man (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1159105" ref_url="https://bugzilla.suse.com/1159105" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2020:0102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006348.html" source="SUSE-SU"/>
		<description>
This update for man fixes the following issues:

- Skip using 'safe-rm' in cron job below cache directory (bsc#1159105).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-14"/>
	<updated date="2020-01-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1159105">SUSE bug 1159105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522532" comment="man-2.6.6-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78918" version="1" class="patch">
	<metadata>
		<title>Security update for libssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1158095" ref_url="https://bugzilla.suse.com/1158095" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14889" ref_url="https://www.suse.com/security/cve/CVE-2019-14889/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006385.html" source="SUSE-SU"/>
		<description>
This update for libssh fixes the following issues:

- CVE-2019-14889: Fixed an unwanted command execution in scp caused by unsanitized location (bsc#1158095).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-20"/>
	<updated date="2020-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1158095">SUSE bug 1158095</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14889/">CVE-2019-14889</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522533" comment="libssh4-0.6.3-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522534" comment="libssh4-32bit-0.6.3-12.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78919" version="1" class="patch">
	<metadata>
		<title>Security update for Mesa (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1156015" ref_url="https://bugzilla.suse.com/1156015" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5068" ref_url="https://www.suse.com/security/cve/CVE-2019-5068/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006389.html" source="SUSE-SU"/>
		<description>
This update for Mesa fixes the following issues:

Security issue fixed:

- CVE-2019-5068: Fixed exploitable shared memory permissions vulnerability (bsc#1156015).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-21"/>
	<updated date="2020-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1156015">SUSE bug 1156015</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-5068/">CVE-2019-5068</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522535" comment="Mesa-18.0.2-8.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522536" comment="Mesa-32bit-18.0.2-8.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522537" comment="Mesa-dri-18.0.2-8.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522538" comment="Mesa-dri-32bit-18.0.2-8.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522539" comment="Mesa-libEGL1-18.0.2-8.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522540" comment="Mesa-libEGL1-32bit-18.0.2-8.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522541" comment="Mesa-libGL1-18.0.2-8.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522542" comment="Mesa-libGL1-32bit-18.0.2-8.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522543" comment="Mesa-libGLESv2-2-18.0.2-8.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522544" comment="Mesa-libGLESv2-2-32bit-18.0.2-8.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522545" comment="Mesa-libglapi0-18.0.2-8.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522546" comment="Mesa-libglapi0-32bit-18.0.2-8.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522547" comment="libgbm1-18.0.2-8.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522548" comment="libgbm1-32bit-18.0.2-8.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522549" comment="libxatracker2-1.0.0-8.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78920" version="1" class="patch">
	<metadata>
		<title>Security update for virglrenderer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1159478" ref_url="https://bugzilla.suse.com/1159478" source="BUGZILLA"/>
		<reference ref_id="1159479" ref_url="https://bugzilla.suse.com/1159479" source="BUGZILLA"/>
		<reference ref_id="1159482" ref_url="https://bugzilla.suse.com/1159482" source="BUGZILLA"/>
		<reference ref_id="1159486" ref_url="https://bugzilla.suse.com/1159486" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18388" ref_url="https://www.suse.com/security/cve/CVE-2019-18388/" source="CVE"/>
		<reference ref_id="CVE-2019-18389" ref_url="https://www.suse.com/security/cve/CVE-2019-18389/" source="CVE"/>
		<reference ref_id="CVE-2019-18390" ref_url="https://www.suse.com/security/cve/CVE-2019-18390/" source="CVE"/>
		<reference ref_id="CVE-2019-18391" ref_url="https://www.suse.com/security/cve/CVE-2019-18391/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006299.html" source="SUSE-SU"/>
		<description>
This update for virglrenderer fixes the following issues:

- CVE-2019-18388: Fixed a null pointer dereference which could have led
   to denial of service (bsc#1159479).
- CVE-2019-18390: Fixed an out of bound read which could have led to
  denial of service (bsc#1159478).
- CVE-2019-18389: Fixed a heap buffer overflow which could have led to
  guest escape or denial of service (bsc#1159482).
- CVE-2019-18391: Fixed a heap based buffer overflow which could have led to
  guest escape or denial of service (bsc#1159486).  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-07"/>
	<updated date="2020-01-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159478">SUSE bug 1159478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159479">SUSE bug 1159479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159482">SUSE bug 1159482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159486">SUSE bug 1159486</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18388/">CVE-2019-18388</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18389/">CVE-2019-18389</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18390/">CVE-2019-18390</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18391/">CVE-2019-18391</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522550" comment="libvirglrenderer0-0.5.0-12.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78921" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1160888" ref_url="https://bugzilla.suse.com/1160888" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14907" ref_url="https://www.suse.com/security/cve/CVE-2019-14907/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006407.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2019-14907: Fixed a Server-side crash after charset conversion failure during NTLMSSP processing (bsc#1160888).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-24"/>
	<updated date="2020-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1160888">SUSE bug 1160888</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14907/">CVE-2019-14907</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522551" comment="libdcerpc-binding0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522552" comment="libdcerpc-binding0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522553" comment="libdcerpc0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522554" comment="libdcerpc0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522555" comment="libndr-krb5pac0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522556" comment="libndr-krb5pac0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522557" comment="libndr-nbt0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522558" comment="libndr-nbt0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522559" comment="libndr-standard0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522560" comment="libndr-standard0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522561" comment="libndr0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522562" comment="libndr0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522563" comment="libnetapi0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522564" comment="libnetapi0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522565" comment="libsamba-credentials0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522566" comment="libsamba-credentials0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522567" comment="libsamba-errors0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522568" comment="libsamba-errors0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522569" comment="libsamba-hostconfig0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522570" comment="libsamba-hostconfig0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522571" comment="libsamba-passdb0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522572" comment="libsamba-passdb0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522573" comment="libsamba-util0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522574" comment="libsamba-util0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522575" comment="libsamdb0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522576" comment="libsamdb0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522577" comment="libsmbclient0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522578" comment="libsmbclient0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522579" comment="libsmbconf0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522580" comment="libsmbconf0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522581" comment="libsmbldap0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522582" comment="libsmbldap0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522583" comment="libtevent-util0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522584" comment="libtevent-util0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522585" comment="libwbclient0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522586" comment="libwbclient0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522587" comment="samba-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522588" comment="samba-client-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522589" comment="samba-client-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522590" comment="samba-doc-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522591" comment="samba-libs-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522592" comment="samba-libs-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522593" comment="samba-winbind-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522594" comment="samba-winbind-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78922" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1138529" ref_url="https://bugzilla.suse.com/1138529" source="BUGZILLA"/>
		<reference ref_id="1152856" ref_url="https://bugzilla.suse.com/1152856" source="BUGZILLA"/>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2894" ref_url="https://www.suse.com/security/cve/CVE-2019-2894/" source="CVE"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2975" ref_url="https://www.suse.com/security/cve/CVE-2019-2975/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2987" ref_url="https://www.suse.com/security/cve/CVE-2019-2987/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version jdk8u232 (icedtea 3.14.0) (October 2019 CPU, bsc#1154212)

Security issues fixed:

- CVE-2019-2933: Windows file handling redux
- CVE-2019-2945: Better socket support
- CVE-2019-2949: Better Kerberos ccache handling
- CVE-2019-2958: Build Better Processes
- CVE-2019-2964: Better support for patterns
- CVE-2019-2962: Better Glyph Images
- CVE-2019-2973: Better pattern compilation
- CVE-2019-2975: Unexpected exception in jjs
- CVE-2019-2978: Improved handling of jar files
- CVE-2019-2981: Better Path supports
- CVE-2019-2983: Better serial attributes
- CVE-2019-2987: Better rendering of native glyphs
- CVE-2019-2988: Better Graphics2D drawing
- CVE-2019-2989: Improve TLS connection support
- CVE-2019-2992: Enhance font glyph mapping
- CVE-2019-2999: Commentary on Javadoc comments
- CVE-2019-2894: Enhance ECDSA operations (bsc#1152856)

Bug fixes:

- Add patch to fix hotspot-aarch64 (bsc#1138529).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-07"/>
	<updated date="2020-01-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1138529">SUSE bug 1138529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152856">SUSE bug 1152856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2894/">CVE-2019-2894</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-2975/">CVE-2019-2975</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2987/">CVE-2019-2987</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522595" comment="java-1_8_0-openjdk-1.8.0.232-27.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522596" comment="java-1_8_0-openjdk-headless-1.8.0.232-27.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78923" version="1" class="patch">
	<metadata>
		<title>Security update for sysstat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1144923" ref_url="https://bugzilla.suse.com/1144923" source="BUGZILLA"/>
		<reference ref_id="1159104" ref_url="https://bugzilla.suse.com/1159104" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19725" ref_url="https://www.suse.com/security/cve/CVE-2019-19725/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006302.html" source="SUSE-SU"/>
		<description>
This update for sysstat fixes the following issues:

Security issue fixed:                                                                                                                                                               
                                                                                                                                                                                   
- CVE-2019-19725: Fixed double free in check_file_actlst in sa_common.c (bsc#1159104).                                                                                    

Bug fixes:

- Enable log information of starting/stoping services. (bsc#1144923, jsc#SLE-5958)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-07"/>
	<updated date="2020-01-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144923">SUSE bug 1144923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159104">SUSE bug 1159104</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19725/">CVE-2019-19725</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522597" comment="sysstat-12.0.2-10.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78924" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update java-1_8_0-openjdk to version jdk8u242 (icedtea 3.15.0) (January 2020 CPU, bsc#1160968):

- CVE-2020-2583: Unlink Set of LinkedHashSets
- CVE-2020-2590: Improve Kerberos interop capabilities
- CVE-2020-2593: Normalize normalization for all
- CVE-2020-2601: Better Ticket Granting Services
- CVE-2020-2604: Better serial filter handling
- CVE-2020-2659: Enhance datagram socket support
- CVE-2020-2654: Improve Object Identifier Processing
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-30"/>
	<updated date="2020-01-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522598" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522599" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78925" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_0_0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1158809" ref_url="https://bugzilla.suse.com/1158809" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1551" ref_url="https://www.suse.com/security/cve/CVE-2019-1551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006306.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_0_0 fixes the following issues:

Security issue fixed:

- CVE-2019-1551: Fixed an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli (bsc#1158809).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-07"/>
	<updated date="2020-01-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1158809">SUSE bug 1158809</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1551/">CVE-2019-1551</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522600" comment="libopenssl-1_0_0-devel-1.0.2p-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522601" comment="libopenssl1_0_0-1.0.2p-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522602" comment="libopenssl1_0_0-32bit-1.0.2p-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522603" comment="openssl-1_0_0-1.0.2p-3.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78926" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1118597" ref_url="https://bugzilla.suse.com/1118597" source="BUGZILLA"/>
		<reference ref_id="1130246" ref_url="https://bugzilla.suse.com/1130246" source="BUGZILLA"/>
		<reference ref_id="1161167" ref_url="https://bugzilla.suse.com/1161167" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19870" ref_url="https://www.suse.com/security/cve/CVE-2018-19870/" source="CVE"/>
		<reference ref_id="CVE-2018-19872" ref_url="https://www.suse.com/security/cve/CVE-2018-19872/" source="CVE"/>
		<reference ref_id="CVE-2020-0569" ref_url="https://www.suse.com/security/cve/CVE-2020-0569/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006448.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

Security issues fixed:	  

- CVE-2020-0569: Fixed a potential local code execution by loading plugins from CWD (bsc#1161167).
- CVE-2018-19870: Fixed an improper check in QImage allocation which could allow Denial of Service
  when opening crafted gif files (bsc#1118597).
- CVE-2018-19872: Fixed an issue which could allow a division by zero leading to crash (bsc#1130246).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-04"/>
	<updated date="2020-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118597">SUSE bug 1118597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130246">SUSE bug 1130246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161167">SUSE bug 1161167</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19870/">CVE-2018-19870</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19872/">CVE-2018-19872</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0569/">CVE-2020-0569</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522604" comment="libQt5Concurrent5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522605" comment="libQt5Core5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522606" comment="libQt5DBus5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522607" comment="libQt5Gui5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522608" comment="libQt5Network5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522609" comment="libQt5OpenGL5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522610" comment="libQt5PrintSupport5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522611" comment="libQt5Sql5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522612" comment="libQt5Sql5-mysql-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522613" comment="libQt5Sql5-postgresql-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522614" comment="libQt5Sql5-sqlite-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522615" comment="libQt5Sql5-unixODBC-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522616" comment="libQt5Test5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522617" comment="libQt5Widgets5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522618" comment="libQt5Xml5-5.6.2-6.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78927" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1106383" ref_url="https://bugzilla.suse.com/1106383" source="BUGZILLA"/>
		<reference ref_id="1133495" ref_url="https://bugzilla.suse.com/1133495" source="BUGZILLA"/>
		<reference ref_id="1139459" ref_url="https://bugzilla.suse.com/1139459" source="BUGZILLA"/>
		<reference ref_id="1151377" ref_url="https://bugzilla.suse.com/1151377" source="BUGZILLA"/>
		<reference ref_id="1151506" ref_url="https://bugzilla.suse.com/1151506" source="BUGZILLA"/>
		<reference ref_id="1154043" ref_url="https://bugzilla.suse.com/1154043" source="BUGZILLA"/>
		<reference ref_id="1155574" ref_url="https://bugzilla.suse.com/1155574" source="BUGZILLA"/>
		<reference ref_id="1156482" ref_url="https://bugzilla.suse.com/1156482" source="BUGZILLA"/>
		<reference ref_id="1159814" ref_url="https://bugzilla.suse.com/1159814" source="BUGZILLA"/>
		<reference ref_id="1162108" ref_url="https://bugzilla.suse.com/1162108" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1712" ref_url="https://www.suse.com/security/cve/CVE-2020-1712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006452.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

- CVE-2020-1712 (bsc#bsc#1162108)
  Fix a heap use-after-free vulnerability, when asynchronous
  Polkit queries were performed while handling Dbus messages. A local
  unprivileged attacker could have abused this flaw to crash systemd services or
  potentially execute code and elevate their privileges, by sending specially
  crafted Dbus messages.

- Unconfirmed fix for prevent hanging of systemctl during restart. (bsc#1139459)
- Fix warnings thrown during package installation. (bsc#1154043)
- Fix for system-udevd prevent crash within OES2018. (bsc#1151506)
- Fragments of masked units ought not be considered for 'NeedDaemonReload'. (bsc#1156482)
- Wait for workers to finish when exiting. (bsc#1106383)
- Improve log message when inotify limit is reached. (bsc#1155574)
- Mention in the man pages that alias names are only effective after command 'systemctl enable'. (bsc#1151377)
- Introduce function for reading virtual files in 'sysfs' and 'procfs'. (bsc#1133495, bsc#1159814)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-18"/>
	<updated date="2020-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1106383">SUSE bug 1106383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133495">SUSE bug 1133495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139459">SUSE bug 1139459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151377">SUSE bug 1151377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151506">SUSE bug 1151506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154043">SUSE bug 1154043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155574">SUSE bug 1155574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156482">SUSE bug 1156482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159814">SUSE bug 1159814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162108">SUSE bug 1162108</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1712/">CVE-2020-1712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522619" comment="libsystemd0-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522620" comment="libsystemd0-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522621" comment="libudev1-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522622" comment="libudev1-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522623" comment="systemd-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522624" comment="systemd-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522625" comment="systemd-bash-completion-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522626" comment="systemd-sysvinit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522627" comment="udev-228-150.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78928" version="1" class="patch">
	<metadata>
		<title>Security update for e2fsprogs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1160571" ref_url="https://bugzilla.suse.com/1160571" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5188" ref_url="https://www.suse.com/security/cve/CVE-2019-5188/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006471.html" source="SUSE-SU"/>
		<description>
This update for e2fsprogs fixes the following issues:

- CVE-2019-5188: Fixed a code execution vulnerability in the directory rehashing functionality (bsc#1160571).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-07"/>
	<updated date="2020-02-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1160571">SUSE bug 1160571</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5188/">CVE-2019-5188</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522628" comment="e2fsprogs-1.43.8-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522629" comment="libcom_err2-1.43.8-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522630" comment="libcom_err2-32bit-1.43.8-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522631" comment="libext2fs2-1.43.8-3.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78929" version="1" class="patch">
	<metadata>
		<title>Security update for wicked (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1160903" ref_url="https://bugzilla.suse.com/1160903" source="BUGZILLA"/>
		<reference ref_id="1160904" ref_url="https://bugzilla.suse.com/1160904" source="BUGZILLA"/>
		<reference ref_id="1160905" ref_url="https://bugzilla.suse.com/1160905" source="BUGZILLA"/>
		<reference ref_id="1160906" ref_url="https://bugzilla.suse.com/1160906" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18902" ref_url="https://www.suse.com/security/cve/CVE-2019-18902/" source="CVE"/>
		<reference ref_id="CVE-2019-18903" ref_url="https://www.suse.com/security/cve/CVE-2019-18903/" source="CVE"/>
		<reference ref_id="CVE-2020-7216" ref_url="https://www.suse.com/security/cve/CVE-2020-7216/" source="CVE"/>
		<reference ref_id="CVE-2020-7217" ref_url="https://www.suse.com/security/cve/CVE-2020-7217/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006473.html" source="SUSE-SU"/>
		<description>
This update for wicked fixes the following issues:

- CVE-2019-18902: Fixed a use-after-free when receiving invalid DHCP6 client options (bsc#1160903).
- CVE-2019-18903: Fixed a use-after-free when receiving invalid DHCP6 IA_PD option (bsc#1160904).
- CVE-2020-7216: Fixed a potential denial of service via a memory leak when processing packets with missing message type option in DHCP4 (bsc#1160905).
- CVE-2020-7217: Fixed a memory leak in DHCP4 fsm when processing packets for other client ids (bsc#1160906).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-07"/>
	<updated date="2020-02-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160903">SUSE bug 1160903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160904">SUSE bug 1160904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160905">SUSE bug 1160905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160906">SUSE bug 1160906</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18902/">CVE-2019-18902</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18903/">CVE-2019-18903</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7216/">CVE-2020-7216</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7217/">CVE-2020-7217</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522632" comment="wicked-0.6.60-2.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522633" comment="wicked-service-0.6.60-2.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78930" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1137832" ref_url="https://bugzilla.suse.com/1137832" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12749" ref_url="https://www.suse.com/security/cve/CVE-2019-12749/" source="CVE"/>
		<description>
This update for dbus-1 fixes the following issues:
	  
Security issue fixed:     
    
- CVE-2019-12749: Fixed an implementation flaw in DBUS_COOKIE_SHA1 which 
  could have allowed local attackers to bypass authentication (bsc#1137832).   
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-18"/>
	<updated date="2020-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137832">SUSE bug 1137832</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12749/">CVE-2019-12749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522634" comment="dbus-1-1.8.22-29.17.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522635" comment="dbus-1-x11-1.8.22-29.17.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522636" comment="libdbus-1-3-1.8.22-29.17.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522637" comment="libdbus-1-3-32bit-1.8.22-29.17.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78931" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1161799" ref_url="https://bugzilla.suse.com/1161799" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6796" ref_url="https://www.suse.com/security/cve/CVE-2020-6796/" source="CVE"/>
		<reference ref_id="CVE-2020-6797" ref_url="https://www.suse.com/security/cve/CVE-2020-6797/" source="CVE"/>
		<reference ref_id="CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798/" source="CVE"/>
		<reference ref_id="CVE-2020-6799" ref_url="https://www.suse.com/security/cve/CVE-2020-6799/" source="CVE"/>
		<reference ref_id="CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006482.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.5.0 ESR
  * CVE-2020-6796 (bmo#1610426)
    Missing bounds check on shared memory read in the parent
    process
  * CVE-2020-6797 (bmo#1596668)
    Extensions granted downloads.open permission could open
    arbitrary applications on Mac OSX
  * CVE-2020-6798 (bmo#1602944)
    Incorrect parsing of template tag could result in JavaScript
    injection
  * CVE-2020-6799 (bmo#1606596)
    Arbitrary code execution when opening pdf links from other
    applications, when Firefox is configured as default pdf
    reader
  * CVE-2020-6800 (bmo#1595786, bmo#1596706, bmo#1598543,
    bmo#1604851, bmo#1605777, bmo#1608580, bmo#1608785)
    Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5
  * Fixed: Fixed various issues opening files with spaces in
    their path (bmo#1601905, bmo#1602726)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-17"/>
	<updated date="2020-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1161799">SUSE bug 1161799</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6796/">CVE-2020-6796</cve>
	<cve impact="important" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6797/">CVE-2020-6797</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6799/">CVE-2020-6799</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522638" comment="MozillaFirefox-68.5.0-109.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522639" comment="MozillaFirefox-translations-common-68.5.0-109.106.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78932" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1162202" ref_url="https://bugzilla.suse.com/1162202" source="BUGZILLA"/>
		<reference ref_id="1162675" ref_url="https://bugzilla.suse.com/1162675" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18634" ref_url="https://www.suse.com/security/cve/CVE-2019-18634/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006491.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

Security issue fixed:

- CVE-2019-18634: Fixed a buffer overflow in the passphrase prompt that could occur when pwfeedback was enabled in /etc/sudoers (bsc#1162202).

Non-security issue fixed:

- Fixed an issue where sudo -l would ask for a password even though `listpw` was set to `never` (bsc#1162675).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-19"/>
	<updated date="2020-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162202">SUSE bug 1162202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162675">SUSE bug 1162675</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18634/">CVE-2019-18634</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522640" comment="sudo-1.8.20p2-3.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78933" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1159861" ref_url="https://bugzilla.suse.com/1159861" source="BUGZILLA"/>
		<reference ref_id="1160369" ref_url="https://bugzilla.suse.com/1160369" source="BUGZILLA"/>
		<reference ref_id="1161194" ref_url="https://bugzilla.suse.com/1161194" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19948" ref_url="https://www.suse.com/security/cve/CVE-2019-19948/" source="CVE"/>
		<reference ref_id="CVE-2019-19949" ref_url="https://www.suse.com/security/cve/CVE-2019-19949/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006496.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issue fixed:

- CVE-2019-19948: Fixed a heap-based buffer overflow in WriteSGIImage() (bsc#1159861).
- CVE-2019-19949: Fixed a heap-based buffer over-read in WritePNGImage() (bsc#1160369).

Non-security issue fixed:

- Fixed an issue where converting tiff to png would lead to unviewable files (bsc#1161194).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-19"/>
	<updated date="2020-02-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1159861">SUSE bug 1159861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160369">SUSE bug 1160369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161194">SUSE bug 1161194</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19948/">CVE-2019-19948</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19949/">CVE-2019-19949</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522641" comment="ImageMagick-6.8.8.1-71.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522642" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522643" comment="ImageMagick-config-6-upstream-6.8.8.1-71.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522644" comment="libMagick++-6_Q16-3-6.8.8.1-71.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522645" comment="libMagickCore-6_Q16-1-6.8.8.1-71.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522646" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-71.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522647" comment="libMagickWand-6_Q16-1-6.8.8.1-71.141.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78934" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1138743" ref_url="https://bugzilla.suse.com/1138743" source="BUGZILLA"/>
		<reference ref_id="1154849" ref_url="https://bugzilla.suse.com/1154849" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14834" ref_url="https://www.suse.com/security/cve/CVE-2019-14834/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006501.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

Security issue fixed:

- CVE-2019-14834: Fixed a memory leak which could have allowed to remote attackers 
  to cause denial of service via DHCP response creation (bsc#1154849)

Other issue addressed:  

- Removed cache size limit (bsc#1138743).

		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-19"/>
	<updated date="2020-02-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1138743">SUSE bug 1138743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154849">SUSE bug 1154849</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14834/">CVE-2019-14834</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522648" comment="dnsmasq-2.78-18.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78935" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1120943" ref_url="https://bugzilla.suse.com/1120943" source="BUGZILLA"/>
		<reference ref_id="1160770" ref_url="https://bugzilla.suse.com/1160770" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006521.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).
- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-25"/>
	<updated date="2020-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522649" comment="libexif12-0.6.21-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522650" comment="libexif12-32bit-0.6.21-8.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78936" version="1" class="patch">
	<metadata>
		<title>Security update for ppp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1162610" ref_url="https://bugzilla.suse.com/1162610" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8597" ref_url="https://www.suse.com/security/cve/CVE-2020-8597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006533.html" source="SUSE-SU"/>
		<description>
This update for ppp fixes the following security issue:

- CVE-2020-8597: Fixed a buffer overflow in the eap_request and eap_response functions (bsc#1162610).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-26"/>
	<updated date="2020-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162610">SUSE bug 1162610</bugzilla>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-8597/">CVE-2020-8597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522651" comment="ppp-2.4.7-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78937" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1068664" ref_url="https://bugzilla.suse.com/1068664" source="BUGZILLA"/>
		<reference ref_id="1159208" ref_url="https://bugzilla.suse.com/1159208" source="BUGZILLA"/>
		<reference ref_id="1159623" ref_url="https://bugzilla.suse.com/1159623" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<reference ref_id="CVE-2016-4472" ref_url="https://www.suse.com/security/cve/CVE-2016-4472/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2017-1000158" ref_url="https://www.suse.com/security/cve/CVE-2017-1000158/" source="CVE"/>
		<reference ref_id="CVE-2017-9233" ref_url="https://www.suse.com/security/cve/CVE-2017-9233/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006536.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

Update to 3.4.10 (jsc#SLE-9427, bsc#1159208) from 3.4.6:

Security issues fixed:

- Update expat copy from 2.1.1 to 2.2.0 to fix the following issues:
  CVE-2012-0876, CVE-2016-0718, CVE-2016-4472, CVE-2017-9233, CVE-2016-9063
- CVE-2017-1000158: Fix an integer overflow in thePyString_DecodeEscape function in stringobject.c, resulting in heap-based bufferoverflow (bsc#1068664).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-26"/>
	<updated date="2020-02-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068664">SUSE bug 1068664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159208">SUSE bug 1159208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159623">SUSE bug 1159623</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4472/">CVE-2016-4472</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000158/">CVE-2017-1000158</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9233/">CVE-2017-9233</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522652" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522653" comment="python3-3.4.10-25.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522654" comment="python3-base-3.4.10-25.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522655" comment="python3-curses-3.4.10-25.39.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78938" version="1" class="patch">
	<metadata>
		<title>Security update for libpng16 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1124211" ref_url="https://bugzilla.suse.com/1124211" source="BUGZILLA"/>
		<reference ref_id="1141493" ref_url="https://bugzilla.suse.com/1141493" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12652" ref_url="https://www.suse.com/security/cve/CVE-2017-12652/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<description>
This update for libpng16 fixes the following issues:

Security issues fixed:

- CVE-2019-7317: Fixed a use-after-free vulnerability, triggered when
  png_image_free() was called under png_safe_execute (bsc#1124211).
- CVE-2017-12652: Fixed an Input Validation Error related to the length of chunks (bsc#1141493).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-03"/>
	<updated date="2020-03-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124211">SUSE bug 1124211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141493">SUSE bug 1141493</bugzilla>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12652/">CVE-2017-12652</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522656" comment="libpng16-16-1.6.8-15.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522657" comment="libpng16-16-32bit-1.6.8-15.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78939" version="1" class="patch">
	<metadata>
		<title>Security update for gimp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1073625" ref_url="https://bugzilla.suse.com/1073625" source="BUGZILLA"/>
		<reference ref_id="1073626" ref_url="https://bugzilla.suse.com/1073626" source="BUGZILLA"/>
		<reference ref_id="1073629" ref_url="https://bugzilla.suse.com/1073629" source="BUGZILLA"/>
		<reference ref_id="1161998" ref_url="https://bugzilla.suse.com/1161998" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17785" ref_url="https://www.suse.com/security/cve/CVE-2017-17785/" source="CVE"/>
		<reference ref_id="CVE-2017-17786" ref_url="https://www.suse.com/security/cve/CVE-2017-17786/" source="CVE"/>
		<reference ref_id="CVE-2017-17788" ref_url="https://www.suse.com/security/cve/CVE-2017-17788/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006584.html" source="SUSE-SU"/>
		<description>
This update for gimp fixes the following issues:

- Fix for crashing due to segmentation fault caused by importing ghostscript files. (bsc#1161998)

Security issues fixed:

- CVE-2017-17785: Fixed an heap-based buffer overflow in FLI import (bsc#1073625)
- CVE-2017-17786: Fixed an out-of-bounds read in TGA (bsc#1073626)
- CVE-2017-17788: Fixed an out-of-bounds read in XCF (bsc#1073629)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-06"/>
	<updated date="2020-03-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1073625">SUSE bug 1073625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073626">SUSE bug 1073626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073629">SUSE bug 1073629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161998">SUSE bug 1161998</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17785/">CVE-2017-17785</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17786/">CVE-2017-17786</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17788/">CVE-2017-17788</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522658" comment="gimp-2.8.18-9.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522659" comment="gimp-lang-2.8.18-9.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522660" comment="gimp-plugins-python-2.8.18-9.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522661" comment="libgimp-2_0-0-2.8.18-9.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522662" comment="libgimpui-2_0-0-2.8.18-9.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78940" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1050241" ref_url="https://bugzilla.suse.com/1050241" source="BUGZILLA"/>
		<reference ref_id="1140120" ref_url="https://bugzilla.suse.com/1140120" source="BUGZILLA"/>
		<reference ref_id="1165471" ref_url="https://bugzilla.suse.com/1165471" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7890" ref_url="https://www.suse.com/security/cve/CVE-2017-7890/" source="CVE"/>
		<reference ref_id="CVE-2018-14553" ref_url="https://www.suse.com/security/cve/CVE-2018-14553/" source="CVE"/>
		<reference ref_id="CVE-2019-11038" ref_url="https://www.suse.com/security/cve/CVE-2019-11038/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006588.html" source="SUSE-SU"/>
		<description>
This update for gd fixes the following issues:

- CVE-2017-7890: Fixed a buffer over-read into uninitialized memory (bsc#1050241).
- CVE-2018-14553: Fixed a null pointer dereference in gdImageClone() (bsc#1165471).
- CVE-2019-11038: Fixed a information disclosure in gdImageCreateFromXbm() (bsc#1140120).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-09"/>
	<updated date="2020-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050241">SUSE bug 1050241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140120">SUSE bug 1140120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165471">SUSE bug 1165471</bugzilla>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7890/">CVE-2017-7890</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14553/">CVE-2018-14553</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11038/">CVE-2019-11038</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522663" comment="gd-2.1.0-24.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522664" comment="gd-32bit-2.1.0-24.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78941" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Update java-1_7_0-openjdk to version jdk7u251 (January 2020 CPU, bsc#1160968):

- CVE-2020-2583: Unlink Set of LinkedHashSets
- CVE-2020-2590: Improve Kerberos interop capabilities
- CVE-2020-2593: Normalize normalization for all
- CVE-2020-2601: Better Ticket Granting Services
- CVE-2020-2604: Better serial filter handling
- CVE-2020-2659: Enhance datagram socket support
- CVE-2020-2654: Improve Object Identifier Processing	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-10"/>
	<updated date="2020-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522665" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522666" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78942" version="1" class="patch">
	<metadata>
		<title>Security update for ipmitool (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1085469" ref_url="https://bugzilla.suse.com/1085469" source="BUGZILLA"/>
		<reference ref_id="1163026" ref_url="https://bugzilla.suse.com/1163026" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-5208" ref_url="https://www.suse.com/security/cve/CVE-2020-5208/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006594.html" source="SUSE-SU"/>
		<description>
This update for ipmitool fixes the following issues:

- CVE-2020-5208: Fixed multiple remote code executtion vulnerabilities (bsc#1163026).	  
- picmg discover messages are now DEBUG and not INFO messages (bsc#1085469).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-10"/>
	<updated date="2020-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085469">SUSE bug 1085469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163026">SUSE bug 1163026</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5208/">CVE-2020-5208</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522667" comment="ipmitool-1.8.18-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78943" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1160305" ref_url="https://bugzilla.suse.com/1160305" source="BUGZILLA"/>
		<reference ref_id="1160498" ref_url="https://bugzilla.suse.com/1160498" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17015" ref_url="https://www.suse.com/security/cve/CVE-2019-17015/" source="CVE"/>
		<reference ref_id="CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016/" source="CVE"/>
		<reference ref_id="CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017/" source="CVE"/>
		<reference ref_id="CVE-2019-17021" ref_url="https://www.suse.com/security/cve/CVE-2019-17021/" source="CVE"/>
		<reference ref_id="CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022/" source="CVE"/>
		<reference ref_id="CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024/" source="CVE"/>
		<reference ref_id="CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-03 (bsc#1160498)
  * CVE-2019-17026 (bmo#1607443)
    IonMonkey type confusion with StoreElementHole and
    FallibleStoreElement 

- Firefox Extended Support Release 68.4.0 ESR
  * Fixed: Various security fixes
  MFSA 2020-02 (bsc#1160305)
  * CVE-2019-17015 (bmo#1599005)
    Memory corruption in parent process during new content
    process initialization on Windows
  * CVE-2019-17016 (bmo#1599181)
    Bypass of @namespace CSS sanitization during pasting
  * CVE-2019-17017 (bmo#1603055)
    Type Confusion in XPCVariant.cpp
  * CVE-2019-17021 (bmo#1599008)
    Heap address disclosure in parent process during content
    process initialization on Windows
  * CVE-2019-17022 (bmo#1602843)
    CSS sanitization does not escape HTML tags
  * CVE-2019-17024 (bmo#1507180, bmo#1595470, bmo#1598605,
    bmo#1601826)
    Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-10"/>
	<updated date="2020-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160498">SUSE bug 1160498</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17015/">CVE-2019-17015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17021/">CVE-2019-17021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522668" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522669" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78944" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1163985" ref_url="https://bugzilla.suse.com/1163985" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006625.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

PostgreSQL was updated to version 10.12.

Security issue fixed:

- CVE-2020-1720: Fixed a missing authorization check in the ALTER ... DEPENDS ON extension (bsc#1163985).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-18"/>
	<updated date="2020-03-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1163985">SUSE bug 1163985</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522670" comment="libecpg6-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522671" comment="libpq5-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522672" comment="libpq5-32bit-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522673" comment="postgresql10-10.12-1.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78945" version="1" class="patch">
	<metadata>
		<title>Security update for libzypp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1158763" ref_url="https://bugzilla.suse.com/1158763" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18900" ref_url="https://www.suse.com/security/cve/CVE-2019-18900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006329.html" source="SUSE-SU"/>
		<description>
This update for libzypp fixes the following issues:

Security issue fixed:

- CVE-2019-18900: Fixed assert cookie file that was world readable (bsc#1158763).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-13"/>
	<updated date="2020-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1158763">SUSE bug 1158763</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18900/">CVE-2019-18900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522674" comment="libzypp-16.21.2-2.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78946" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1141322" ref_url="https://bugzilla.suse.com/1141322" source="BUGZILLA"/>
		<reference ref_id="1158527" ref_url="https://bugzilla.suse.com/1158527" source="BUGZILLA"/>
		<reference ref_id="1159819" ref_url="https://bugzilla.suse.com/1159819" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0088-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200088-1.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to NSS 3.47.1:

Security issues fixed:

- CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
- CVE-2019-11745: EncryptUpdate should use maxout, not block size (bsc#1158527).
- CVE-2019-11727: Fixed vulnerability sign CertificateVerify with PKCS#1 v1.5 signatures issue (bsc#1141322).

mozilla-nspr was updated to version 4.23:

- Whitespace in C files was cleaned up and no longer uses tab characters for indenting.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-13"/>
	<updated date="2020-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141322">SUSE bug 1141322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158527">SUSE bug 1158527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522675" comment="libfreebl3-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522676" comment="libfreebl3-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522677" comment="libsoftokn3-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522678" comment="libsoftokn3-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522679" comment="mozilla-nspr-4.23-19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522680" comment="mozilla-nspr-32bit-4.23-19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522681" comment="mozilla-nss-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522682" comment="mozilla-nss-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522683" comment="mozilla-nss-certs-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522684" comment="mozilla-nss-certs-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522685" comment="mozilla-nss-sysinit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522686" comment="mozilla-nss-sysinit-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522687" comment="mozilla-nss-tools-3.47.1-58.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78947" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 12 SP4</platform>
		</affected>
		<reference ref_id="1133925" ref_url="https://bugzilla.suse.com/1133925" source="BUGZILLA"/>
		<reference ref_id="1140277" ref_url="https://bugzilla.suse.com/1140277" source="BUGZILLA"/>
		<reference ref_id="1150003" ref_url="https://bugzilla.suse.com/1150003" source="BUGZILLA"/>
		<reference ref_id="1150247" ref_url="https://bugzilla.suse.com/1150247" source="BUGZILLA"/>
		<reference ref_id="1150250" ref_url="https://bugzilla.suse.com/1150250" source="BUGZILLA"/>
		<reference ref_id="1158809" ref_url="https://bugzilla.suse.com/1158809" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1549" ref_url="https://www.suse.com/security/cve/CVE-2019-1549/" source="CVE"/>
		<reference ref_id="CVE-2019-1551" ref_url="https://www.suse.com/security/cve/CVE-2019-1551/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006349.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:

Security issue fixed:                                                                                      
                                                                                                                                                                         
- CVE-2019-1551: Fixed an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli (bsc#1158809). 
- CVE-2019-1563: Fixed bleichenbacher attack against cms/pkcs7 encryptioon transported key (bsc#1150250).
- CVE-2019-1551: Fixed integer overflow in RSAZ modular exponentiation on x86_64 (bsc#1158809).
- CVE-2019-1549: Fixed fork problem with random generator (bsc#1150247).
- CVE-2019-1547: Fixed EC_GROUP_set_generator side channel attack avoidance (bsc#1150003).

Bug fixes:

- Ship the openssl 1.1.1 binary as openssl-1_1, and make it installable in parallel with the system openssl (bsc#1140277).
- Update to 1.1.1d (bsc#1133925, jsc#SLE-6430).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-14"/>
	<updated date="2020-01-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1133925">SUSE bug 1133925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140277">SUSE bug 1140277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150003">SUSE bug 1150003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150247">SUSE bug 1150247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150250">SUSE bug 1150250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158809">SUSE bug 1158809</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1549/">CVE-2019-1549</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1551/">CVE-2019-1551</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sled:12:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009239879" comment="SUSE Linux Enterprise Desktop 12 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522688" comment="libopenssl1_1-1.1.1d-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522689" comment="libopenssl1_1-32bit-1.1.1d-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522690" comment="openssl-1_1-1.1.1d-2.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141196" version="1" comment="ImageMagick is &lt;6.8.8.1-5.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141197" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-5.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141198" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-5.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141199" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-5.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141200" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-5.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116183" version="1" comment="sled-release is ==12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141201" version="1" comment="MozillaFirefox is &lt;31.1.0esr-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141202" version="1" comment="MozillaFirefox-translations is &lt;31.1.0esr-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141203" version="1" comment="aaa_base is &lt;13.2+git20140911.61c1681-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141204" version="1" comment="aaa_base-extras is &lt;13.2+git20140911.61c1681-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141205" version="1" comment="accountsservice is &lt;0.6.35-1.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141206" version="1" comment="accountsservice-lang is &lt;0.6.35-1.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141207" version="1" comment="libaccountsservice0 is &lt;0.6.35-1.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141208" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.35-1.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141209" version="1" comment="alsa is &lt;1.0.27.2-11.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141210" version="1" comment="libasound2 is &lt;1.0.27.2-11.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140446" version="1" comment="libasound2-32bit is &lt;1.0.27.2-11.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141211" version="1" comment="argyllcms is &lt;1.6.3-1.179" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141212" version="1" comment="avahi is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141213" version="1" comment="avahi-lang is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141214" version="1" comment="libavahi-client3 is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141215" version="1" comment="libavahi-client3-32bit is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141216" version="1" comment="libavahi-common3 is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141217" version="1" comment="libavahi-common3-32bit is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141218" version="1" comment="libavahi-core7 is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141219" version="1" comment="libdns_sd is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141220" version="1" comment="libdns_sd-32bit is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141221" version="1" comment="bash is &lt;4.2-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141222" version="1" comment="bash-doc is &lt;4.2-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141223" version="1" comment="bash-lang is &lt;4.2-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141224" version="1" comment="libreadline6 is &lt;6.2-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141225" version="1" comment="libreadline6-32bit is &lt;6.2-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141226" version="1" comment="readline-doc is &lt;6.2-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141227" version="1" comment="bind-libs is &lt;9.9.5P1-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141228" version="1" comment="bind-libs-32bit is &lt;9.9.5P1-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141229" version="1" comment="bind-utils is &lt;9.9.5P1-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141230" version="1" comment="bogofilter is &lt;1.2.4-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141231" version="1" comment="bzip2 is &lt;1.0.6-27.1129" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141232" version="1" comment="libbz2-1 is &lt;1.0.6-27.1129" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141233" version="1" comment="libbz2-1-32bit is &lt;1.0.6-27.1129" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141234" version="1" comment="cifs-utils is &lt;6.4-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141235" version="1" comment="clamav is &lt;0.98.4-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141236" version="1" comment="colord is &lt;1.1.7-2.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141237" version="1" comment="colord-gtk-lang is &lt;0.1.25-3.113" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141238" version="1" comment="colord-lang is &lt;1.1.7-2.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141239" version="1" comment="libcolord-gtk1 is &lt;0.1.25-3.113" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141240" version="1" comment="libcolord2 is &lt;1.1.7-2.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141241" version="1" comment="libcolord2-32bit is &lt;1.1.7-2.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141242" version="1" comment="libcolorhug2 is &lt;1.1.7-2.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140495" version="1" comment="coolkey is &lt;1.1.0-147.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141243" version="1" comment="coreutils is &lt;8.22-5.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141244" version="1" comment="coreutils-lang is &lt;8.22-5.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141245" version="1" comment="cpio is &lt;2.11-26.182" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141246" version="1" comment="cpio-lang is &lt;2.11-26.182" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141247" version="1" comment="tar is &lt;1.27.1-2.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141248" version="1" comment="tar-lang is &lt;1.27.1-2.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141249" version="1" comment="cpp48 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141250" version="1" comment="gcc48 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141251" version="1" comment="gcc48-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141252" version="1" comment="gcc48-c++ is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141253" version="1" comment="gcc48-gij is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141254" version="1" comment="gcc48-gij-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141255" version="1" comment="gcc48-info is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141256" version="1" comment="libasan0 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141257" version="1" comment="libasan0-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141258" version="1" comment="libatomic1 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141259" version="1" comment="libatomic1-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141260" version="1" comment="libffi4 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141261" version="1" comment="libffi4-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141262" version="1" comment="libgcc_s1 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141263" version="1" comment="libgcc_s1-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141264" version="1" comment="libgcj48 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141265" version="1" comment="libgcj48-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141266" version="1" comment="libgcj48-jar is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141267" version="1" comment="libgcj_bc1 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141268" version="1" comment="libgfortran3 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141269" version="1" comment="libgomp1 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141270" version="1" comment="libgomp1-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141271" version="1" comment="libitm1 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141272" version="1" comment="libitm1-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141273" version="1" comment="libquadmath0 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141274" version="1" comment="libstdc++48-devel is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141275" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141276" version="1" comment="libstdc++6 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141277" version="1" comment="libstdc++6-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141278" version="1" comment="libtsan0 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141279" version="1" comment="cron is &lt;4.2-55.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141280" version="1" comment="cronie is &lt;1.4.11-55.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141281" version="1" comment="cups is &lt;1.7.5-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141282" version="1" comment="cups-client is &lt;1.7.5-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141283" version="1" comment="cups-libs is &lt;1.7.5-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141284" version="1" comment="cups-libs-32bit is &lt;1.7.5-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141285" version="1" comment="cups-filters is &lt;1.0.58-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141286" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141287" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141288" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140514" version="1" comment="cups-pk-helper is &lt;0.2.5-3.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140515" version="1" comment="cups-pk-helper-lang is &lt;0.2.5-3.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141289" version="1" comment="curl is &lt;7.37.0-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141290" version="1" comment="libcurl4 is &lt;7.37.0-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141291" version="1" comment="libcurl4-32bit is &lt;7.37.0-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140516" version="1" comment="cvs is &lt;1.12.12-181.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140518" version="1" comment="cyrus-sasl is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140519" version="1" comment="cyrus-sasl-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140520" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140521" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140522" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141292" version="1" comment="cyrus-sasl-digestmd5-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140523" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140524" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140527" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140528" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140529" version="1" comment="cyrus-sasl-saslauthd is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140532" version="1" comment="libsasl2-3 is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140533" version="1" comment="libsasl2-3-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141293" version="1" comment="dbus-1 is &lt;1.8.8-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141294" version="1" comment="dbus-1-x11 is &lt;1.8.8-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141295" version="1" comment="libdbus-1-3 is &lt;1.8.8-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141296" version="1" comment="libdbus-1-3-32bit is &lt;1.8.8-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140539" version="1" comment="dbus-1-glib is &lt;0.100.2-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140540" version="1" comment="dbus-1-glib-32bit is &lt;0.100.2-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141297" version="1" comment="dhcp is &lt;4.2.6-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141298" version="1" comment="dhcp-client is &lt;4.2.6-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141299" version="1" comment="dia is &lt;0.97.2-13.253" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141300" version="1" comment="dia-lang is &lt;0.97.2-13.253" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141301" version="1" comment="dracut is &lt;037-34.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141302" version="1" comment="ecryptfs-utils is &lt;103-5.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141303" version="1" comment="ecryptfs-utils-32bit is &lt;103-5.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141304" version="1" comment="elfutils is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141305" version="1" comment="libasm1 is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141306" version="1" comment="libdw1 is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141307" version="1" comment="libdw1-32bit is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141308" version="1" comment="libebl1 is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141309" version="1" comment="libebl1-32bit is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141310" version="1" comment="libelf1 is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141311" version="1" comment="libelf1-32bit is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141312" version="1" comment="emacs is &lt;24.3-14.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141313" version="1" comment="emacs-info is &lt;24.3-14.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141314" version="1" comment="emacs-x11 is &lt;24.3-14.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141315" version="1" comment="etags is &lt;24.3-14.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141316" version="1" comment="empathy is &lt;3.10.3-1.131" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141317" version="1" comment="empathy-lang is &lt;3.10.3-1.131" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141318" version="1" comment="telepathy-mission-control-plugin-goa is &lt;3.10.3-1.131" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141319" version="1" comment="evince is &lt;3.10.3-1.213" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141320" version="1" comment="evince-lang is &lt;3.10.3-1.213" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141321" version="1" comment="libevdocument3-4 is &lt;3.10.3-1.213" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141322" version="1" comment="libevview3-3 is &lt;3.10.3-1.213" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141323" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.10.3-1.213" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141324" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.10.3-1.213" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141325" version="1" comment="expat is &lt;2.1.0-13.232" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141326" version="1" comment="libexpat1 is &lt;2.1.0-13.232" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141327" version="1" comment="libexpat1-32bit is &lt;2.1.0-13.232" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141328" version="1" comment="facter is &lt;2.0.2-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141329" version="1" comment="fetchmail is &lt;6.3.26-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141330" version="1" comment="file is &lt;5.19-2.149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141331" version="1" comment="file-magic is &lt;5.19-2.149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141332" version="1" comment="libmagic1 is &lt;5.19-2.149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141333" version="1" comment="libmagic1-32bit is &lt;5.19-2.149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141334" version="1" comment="finch is &lt;2.10.9-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141335" version="1" comment="libpurple is &lt;2.10.9-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141336" version="1" comment="libpurple-lang is &lt;2.10.9-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141337" version="1" comment="libpurple-meanwhile is &lt;2.10.9-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141338" version="1" comment="libpurple-tcl is &lt;2.10.9-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141339" version="1" comment="pidgin is &lt;2.10.9-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141340" version="1" comment="flash-player is &lt;11.2.202.406-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141341" version="1" comment="flash-player-gnome is &lt;11.2.202.406-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141342" version="1" comment="freerdp is &lt;1.0.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141343" version="1" comment="libfreerdp-1_0 is &lt;1.0.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141344" version="1" comment="libfreerdp-1_0-plugins is &lt;1.0.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141345" version="1" comment="ft2demos is &lt;2.5.3-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141346" version="1" comment="fuse is &lt;2.9.3-3.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141347" version="1" comment="libfuse2 is &lt;2.9.3-3.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141348" version="1" comment="g3utils is &lt;1.1.36-54.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141349" version="1" comment="mgetty is &lt;1.1.36-54.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141350" version="1" comment="gd is &lt;2.1.0-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141351" version="1" comment="gd-32bit is &lt;2.1.0-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141352" version="1" comment="gdk-pixbuf-lang is &lt;2.30.6-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141353" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.30.6-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141354" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.30.6-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141355" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.30.6-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141356" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.30.6-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141357" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.30.6-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141358" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.2-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141359" version="1" comment="librsvg-2-2 is &lt;2.40.2-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141360" version="1" comment="librsvg-2-2-32bit is &lt;2.40.2-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141361" version="1" comment="rsvg-view is &lt;2.40.2-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141362" version="1" comment="gdm is &lt;3.10.0.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141363" version="1" comment="gdm-branding-upstream is &lt;3.10.0.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141364" version="1" comment="gdm-lang is &lt;3.10.0.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141365" version="1" comment="gdmflexiserver is &lt;3.10.0.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141366" version="1" comment="libgdm1 is &lt;3.10.0.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141367" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141368" version="1" comment="gimp is &lt;2.8.10-1.164" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141369" version="1" comment="gimp-lang is &lt;2.8.10-1.164" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141370" version="1" comment="gimp-plugins-python is &lt;2.8.10-1.164" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141371" version="1" comment="libgimp-2_0-0 is &lt;2.8.10-1.164" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141372" version="1" comment="libgimpui-2_0-0 is &lt;2.8.10-1.164" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141373" version="1" comment="glib2-lang is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141374" version="1" comment="glib2-tools is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141375" version="1" comment="libgio-2_0-0 is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141376" version="1" comment="libgio-2_0-0-32bit is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141377" version="1" comment="libgio-fam is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141378" version="1" comment="libglib-2_0-0 is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141379" version="1" comment="libglib-2_0-0-32bit is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141380" version="1" comment="libgmodule-2_0-0 is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141381" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141382" version="1" comment="libgobject-2_0-0 is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141383" version="1" comment="libgobject-2_0-0-32bit is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141384" version="1" comment="libgthread-2_0-0 is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141385" version="1" comment="libgthread-2_0-0-32bit is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141386" version="1" comment="glibc is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141387" version="1" comment="glibc-32bit is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141388" version="1" comment="glibc-devel is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141389" version="1" comment="glibc-devel-32bit is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141390" version="1" comment="glibc-i18ndata is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141391" version="1" comment="glibc-locale is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141392" version="1" comment="glibc-locale-32bit is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141393" version="1" comment="nscd is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141394" version="1" comment="gnome-keyring is &lt;3.10.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141395" version="1" comment="gnome-keyring-32bit is &lt;3.10.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141396" version="1" comment="gnome-keyring-lang is &lt;3.10.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141397" version="1" comment="gnome-keyring-pam is &lt;3.10.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141398" version="1" comment="gnome-keyring-pam-32bit is &lt;3.10.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141399" version="1" comment="libgck-modules-gnome-keyring is &lt;3.10.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141400" version="1" comment="gnome-online-accounts is &lt;3.10.5-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141401" version="1" comment="gnome-online-accounts-lang is &lt;3.10.5-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141402" version="1" comment="libgoa-1_0-0 is &lt;3.10.5-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141403" version="1" comment="libgoa-backend-1_0-1 is &lt;3.10.5-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141404" version="1" comment="typelib-1_0-Goa-1_0 is &lt;3.10.5-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141405" version="1" comment="gnome-shell is &lt;3.10.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141406" version="1" comment="gnome-shell-browser-plugin is &lt;3.10.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141407" version="1" comment="gnome-shell-calendar is &lt;3.10.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141408" version="1" comment="gnome-shell-lang is &lt;3.10.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141409" version="1" comment="gnutls is &lt;3.2.15-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141410" version="1" comment="libgnutls28 is &lt;3.2.15-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141411" version="1" comment="libgnutls28-32bit is &lt;3.2.15-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141412" version="1" comment="gpg2 is &lt;2.0.24-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141413" version="1" comment="gpg2-lang is &lt;2.0.24-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140643" version="1" comment="gpgme is &lt;1.5.1-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140644" version="1" comment="libgpgme11 is &lt;1.5.1-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140645" version="1" comment="groff is &lt;1.22.2-5.429" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140673" version="1" comment="gvim is &lt;7.4.326-2.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140674" version="1" comment="vim is &lt;7.4.326-2.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140675" version="1" comment="vim-data is &lt;7.4.326-2.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140677" version="1" comment="gzip is &lt;1.6-7.392" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140678" version="1" comment="hardlink is &lt;1.0-6.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141414" version="1" comment="hplip is &lt;3.14.6-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141415" version="1" comment="hplip-hpijs is &lt;3.14.6-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141416" version="1" comment="hplip-sane is &lt;3.14.6-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141417" version="1" comment="ibus-chewing is &lt;1.4.10.1-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141418" version="1" comment="ibus-pinyin is &lt;1.5.0-2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140686" version="1" comment="iputils is &lt;s20121221-2.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141419" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.65-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141420" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.65-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141421" version="1" comment="java-1_7_0-openjdk-plugin is &lt;1.5.1-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141422" version="1" comment="kbd is &lt;1.15.5-7.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141423" version="1" comment="kernel-default is &lt;3.12.28-4.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141424" version="1" comment="kernel-default-devel is &lt;3.12.28-4.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141425" version="1" comment="kernel-default-extra is &lt;3.12.28-4.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141426" version="1" comment="kernel-devel is &lt;3.12.28-4.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141427" version="1" comment="kernel-macros is &lt;3.12.28-4.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141428" version="1" comment="kernel-source is &lt;3.12.28-4.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141429" version="1" comment="kernel-syms is &lt;3.12.28-4.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141430" version="1" comment="kernel-xen is &lt;3.12.28-4.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141431" version="1" comment="kernel-xen-devel is &lt;3.12.28-4.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141432" version="1" comment="krb5 is &lt;1.12.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141433" version="1" comment="krb5-32bit is &lt;1.12.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141434" version="1" comment="krb5-client is &lt;1.12.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140711" version="1" comment="krb5-appl-clients is &lt;1.0.3-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141435" version="1" comment="lcms is &lt;1.19-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140713" version="1" comment="liblcms1 is &lt;1.19-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140714" version="1" comment="liblcms1-32bit is &lt;1.19-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140717" version="1" comment="libHX28 is &lt;3.18-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140718" version="1" comment="libHX28-32bit is &lt;3.18-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140719" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141436" version="1" comment="libIlmImf-Imf_2_1-21-32bit is &lt;2.1.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140720" version="1" comment="openexr is &lt;2.1.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140739" version="1" comment="libX11-6 is &lt;1.6.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140740" version="1" comment="libX11-6-32bit is &lt;1.6.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140741" version="1" comment="libX11-data is &lt;1.6.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140742" version="1" comment="libX11-xcb1 is &lt;1.6.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140743" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140744" version="1" comment="libXRes1 is &lt;1.0.7-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140745" version="1" comment="libXRes1-32bit is &lt;1.0.7-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140746" version="1" comment="libXcursor1 is &lt;1.1.14-3.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140747" version="1" comment="libXcursor1-32bit is &lt;1.1.14-3.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140748" version="1" comment="libXext6 is &lt;1.3.2-3.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140749" version="1" comment="libXext6-32bit is &lt;1.3.2-3.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140750" version="1" comment="libXfixes3 is &lt;5.0.1-3.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140751" version="1" comment="libXfixes3-32bit is &lt;5.0.1-3.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141437" version="1" comment="libXfont1 is &lt;1.4.7-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141438" version="1" comment="libXi6 is &lt;1.7.2-3.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141439" version="1" comment="libXi6-32bit is &lt;1.7.2-3.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140755" version="1" comment="libXinerama1 is &lt;1.1.3-3.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140756" version="1" comment="libXinerama1-32bit is &lt;1.1.3-3.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140757" version="1" comment="libXp6 is &lt;1.0.2-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140758" version="1" comment="libXp6-32bit is &lt;1.0.2-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141440" version="1" comment="libXrandr2 is &lt;1.4.2-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141441" version="1" comment="libXrandr2-32bit is &lt;1.4.2-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140761" version="1" comment="libXrender1 is &lt;0.9.8-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140762" version="1" comment="libXrender1-32bit is &lt;0.9.8-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140763" version="1" comment="libXt6 is &lt;1.1.4-3.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140764" version="1" comment="libXt6-32bit is &lt;1.1.4-3.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140765" version="1" comment="libXtst6 is &lt;1.2.2-3.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140766" version="1" comment="libXtst6-32bit is &lt;1.2.2-3.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140767" version="1" comment="libXv1 is &lt;1.0.10-3.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140768" version="1" comment="libXv1-32bit is &lt;1.0.10-3.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140769" version="1" comment="libXvMC1 is &lt;1.0.8-3.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140773" version="1" comment="libXxf86dga1 is &lt;1.1.4-3.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140774" version="1" comment="libXxf86vm1 is &lt;1.1.3-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140775" version="1" comment="libXxf86vm1-32bit is &lt;1.1.3-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141442" version="1" comment="libaugeas0 is &lt;1.2.0-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141443" version="1" comment="libblkid1 is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141444" version="1" comment="libblkid1-32bit is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141445" version="1" comment="libmount1 is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141446" version="1" comment="libmount1-32bit is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141447" version="1" comment="libsmartcols1 is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141448" version="1" comment="libuuid-devel is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141449" version="1" comment="libuuid1 is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141450" version="1" comment="libuuid1-32bit is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141451" version="1" comment="python-libmount is &lt;2.25-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141452" version="1" comment="util-linux is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141453" version="1" comment="util-linux-lang is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141454" version="1" comment="util-linux-systemd is &lt;2.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141455" version="1" comment="uuidd is &lt;2.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141456" version="1" comment="libcgroup1 is &lt;0.41.rc1-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141457" version="1" comment="libdcerpc-binding0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141458" version="1" comment="libdcerpc-binding0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141459" version="1" comment="libdcerpc0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141460" version="1" comment="libdcerpc0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141461" version="1" comment="libgensec0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141462" version="1" comment="libgensec0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141463" version="1" comment="libndr-krb5pac0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141464" version="1" comment="libndr-krb5pac0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141465" version="1" comment="libndr-nbt0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141466" version="1" comment="libndr-nbt0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141467" version="1" comment="libndr-standard0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141468" version="1" comment="libndr-standard0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141469" version="1" comment="libndr0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141470" version="1" comment="libndr0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141471" version="1" comment="libnetapi0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141472" version="1" comment="libnetapi0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141473" version="1" comment="libpdb0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141474" version="1" comment="libpdb0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141475" version="1" comment="libregistry0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141476" version="1" comment="libsamba-credentials0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141477" version="1" comment="libsamba-credentials0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141478" version="1" comment="libsamba-hostconfig0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141479" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141480" version="1" comment="libsamba-util0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141481" version="1" comment="libsamba-util0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141482" version="1" comment="libsamdb0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141483" version="1" comment="libsamdb0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141484" version="1" comment="libsmbclient-raw0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141485" version="1" comment="libsmbclient-raw0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141486" version="1" comment="libsmbclient0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141487" version="1" comment="libsmbclient0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141488" version="1" comment="libsmbconf0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141489" version="1" comment="libsmbconf0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141490" version="1" comment="libsmbldap0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141491" version="1" comment="libsmbldap0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141492" version="1" comment="libtevent-util0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141493" version="1" comment="libtevent-util0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141494" version="1" comment="libwbclient0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141495" version="1" comment="libwbclient0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141496" version="1" comment="samba is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141497" version="1" comment="samba-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141498" version="1" comment="samba-client is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141499" version="1" comment="samba-client-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141500" version="1" comment="samba-doc is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141501" version="1" comment="samba-libs is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141502" version="1" comment="samba-libs-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141503" version="1" comment="samba-winbind is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141504" version="1" comment="samba-winbind-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140838" version="1" comment="libdmx1 is &lt;1.1.3-3.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141505" version="1" comment="libecpg6 is &lt;9.3.5-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141506" version="1" comment="libpq5 is &lt;9.3.5-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141507" version="1" comment="libpq5-32bit is &lt;9.3.5-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141508" version="1" comment="postgresql93 is &lt;9.3.5-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140839" version="1" comment="libevent-2_0-5 is &lt;2.0.21-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140840" version="1" comment="libexif12 is &lt;0.6.21-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140841" version="1" comment="libexif12-32bit is &lt;0.6.21-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141509" version="1" comment="libfbembed2_5 is &lt;2.5.2.26539-13.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141510" version="1" comment="libfreebl3 is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141511" version="1" comment="libfreebl3-32bit is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141512" version="1" comment="libsoftokn3 is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141513" version="1" comment="libsoftokn3-32bit is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141514" version="1" comment="mozilla-nss is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141515" version="1" comment="mozilla-nss-32bit is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141516" version="1" comment="mozilla-nss-certs is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141517" version="1" comment="mozilla-nss-certs-32bit is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141518" version="1" comment="mozilla-nss-tools is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141519" version="1" comment="libfreetype6 is &lt;2.5.3-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141520" version="1" comment="libfreetype6-32bit is &lt;2.5.3-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141521" version="1" comment="libgadu3 is &lt;1.11.4-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140590" version="1" comment="libgc1 is &lt;7.2d-3.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141522" version="1" comment="libgcrypt20 is &lt;1.6.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141523" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141524" version="1" comment="libgnomesu is &lt;1.0.0-352.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141525" version="1" comment="libgnomesu-lang is &lt;1.0.0-352.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141526" version="1" comment="libgnomesu0 is &lt;1.0.0-352.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140845" version="1" comment="libgssglue1 is &lt;0.4-3.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140846" version="1" comment="libgssglue1-32bit is &lt;0.4-3.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141527" version="1" comment="libgudev-1_0-0 is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141528" version="1" comment="libgudev-1_0-0-32bit is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141529" version="1" comment="libudev1 is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141530" version="1" comment="libudev1-32bit is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141531" version="1" comment="systemd is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141532" version="1" comment="systemd-32bit is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141533" version="1" comment="systemd-bash-completion is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141534" version="1" comment="systemd-sysvinit is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141535" version="1" comment="udev is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141536" version="1" comment="libid3tag0 is &lt;0.15.1b-182.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141537" version="1" comment="libipa_hbac0 is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141538" version="1" comment="libsss_idmap0 is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141539" version="1" comment="python-sssd-config is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141540" version="1" comment="sssd is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141541" version="1" comment="sssd-32bit is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141542" version="1" comment="sssd-ad is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141543" version="1" comment="sssd-ipa is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141544" version="1" comment="sssd-krb5 is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141545" version="1" comment="sssd-krb5-common is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141546" version="1" comment="sssd-ldap is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141547" version="1" comment="sssd-proxy is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141548" version="1" comment="sssd-tools is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141549" version="1" comment="libjavascriptcoregtk-1_0-0 is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141550" version="1" comment="libjavascriptcoregtk-1_0-0-32bit is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141551" version="1" comment="libjavascriptcoregtk-3_0-0 is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141552" version="1" comment="libwebkit2gtk-3_0-25 is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141553" version="1" comment="libwebkitgtk-1_0-0 is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141554" version="1" comment="libwebkitgtk-1_0-0-32bit is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141555" version="1" comment="libwebkitgtk-3_0-0 is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141556" version="1" comment="libwebkitgtk2-lang is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141557" version="1" comment="libwebkitgtk3-lang is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141558" version="1" comment="typelib-1_0-JavaScriptCore-3_0 is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141559" version="1" comment="typelib-1_0-WebKit-3_0 is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141560" version="1" comment="libjbig2 is &lt;2.0-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140690" version="1" comment="libjbig2-32bit is &lt;2.0-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140691" version="1" comment="libjson-c2 is &lt;0.11-2.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140692" version="1" comment="libjson-c2-32bit is &lt;0.11-2.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140875" version="1" comment="libltdl7 is &lt;2.4.2-14.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140876" version="1" comment="libltdl7-32bit is &lt;2.4.2-14.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140879" version="1" comment="liblua5_2 is &lt;5.2.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140881" version="1" comment="lua is &lt;5.2.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141561" version="1" comment="liblzo2-2 is &lt;2.08-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140883" version="1" comment="liblzo2-2-32bit is &lt;2.08-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141562" version="1" comment="libmikmod3 is &lt;3.2.0-4.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141563" version="1" comment="libmikmod3-32bit is &lt;3.2.0-4.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140884" version="1" comment="libmms0 is &lt;0.6.2-15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140885" version="1" comment="libmodplug1 is &lt;0.8.8.4-13.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141564" version="1" comment="libmspack0 is &lt;0.4-3.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140886" version="1" comment="libmusicbrainz4 is &lt;2.1.5-27.86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141565" version="1" comment="libmysqlclient18 is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141566" version="1" comment="libmysqlclient18-32bit is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141567" version="1" comment="libmysqlclient_r18 is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141568" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141569" version="1" comment="mariadb is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141570" version="1" comment="mariadb-client is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141571" version="1" comment="mariadb-errormessages is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140887" version="1" comment="libneon27 is &lt;0.30.0-3.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141572" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-59.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141573" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-59.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141574" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141575" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141576" version="1" comment="openssl is &lt;1.0.1i-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141577" version="1" comment="libpango-1_0-0 is &lt;1.36.3-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141578" version="1" comment="libpango-1_0-0-32bit is &lt;1.36.3-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141579" version="1" comment="pango-modules is &lt;1.36.3-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141580" version="1" comment="pango-modules-32bit is &lt;1.36.3-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141581" version="1" comment="typelib-1_0-Pango-1_0 is &lt;1.36.3-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140900" version="1" comment="libpcsclite1 is &lt;1.8.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141582" version="1" comment="libpcsclite1-32bit is &lt;1.8.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140901" version="1" comment="pcsc-lite is &lt;1.8.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141583" version="1" comment="libpng12-0 is &lt;1.2.50-8.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141584" version="1" comment="libpng12-0-32bit is &lt;1.2.50-8.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141585" version="1" comment="libpng16-16 is &lt;1.6.8-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141586" version="1" comment="libpng16-16-32bit is &lt;1.6.8-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141587" version="1" comment="libpolkit0 is &lt;0.112-2.189" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141588" version="1" comment="libpolkit0-32bit is &lt;0.112-2.189" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141589" version="1" comment="polkit is &lt;0.112-2.189" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141590" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.112-2.189" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141591" version="1" comment="libpoppler-glib8 is &lt;0.24.4-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141592" version="1" comment="libpoppler-qt4-4 is &lt;0.24.4-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141593" version="1" comment="libpoppler44 is &lt;0.24.4-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141594" version="1" comment="poppler-tools is &lt;0.24.4-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141595" version="1" comment="libproxy1 is &lt;0.4.11-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141596" version="1" comment="libproxy1-32bit is &lt;0.4.11-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141597" version="1" comment="libproxy1-config-gnome3 is &lt;0.4.11-11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141598" version="1" comment="libproxy1-config-gnome3-32bit is &lt;0.4.11-11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141599" version="1" comment="libproxy1-networkmanager is &lt;0.4.11-11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141600" version="1" comment="libproxy1-networkmanager-32bit is &lt;0.4.11-11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140915" version="1" comment="libpulse-mainloop-glib0 is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140916" version="1" comment="libpulse-mainloop-glib0-32bit is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140917" version="1" comment="libpulse0 is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140918" version="1" comment="libpulse0-32bit is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140919" version="1" comment="pulseaudio is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140920" version="1" comment="pulseaudio-esound-compat is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140921" version="1" comment="pulseaudio-gdm-hooks is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140922" version="1" comment="pulseaudio-lang is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141601" version="1" comment="pulseaudio-module-bluetooth is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141602" version="1" comment="pulseaudio-module-gconf is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141603" version="1" comment="pulseaudio-module-jack is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141604" version="1" comment="pulseaudio-module-lirc is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140923" version="1" comment="pulseaudio-module-x11 is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140924" version="1" comment="pulseaudio-module-zeroconf is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140925" version="1" comment="pulseaudio-utils is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141605" version="1" comment="libpython2_7-1_0 is &lt;2.7.7-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141606" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.7-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141607" version="1" comment="python-base is &lt;2.7.7-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141608" version="1" comment="python-devel is &lt;2.7.7-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141609" version="1" comment="python-xml is &lt;2.7.7-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141610" version="1" comment="libpython3_4m1_0 is &lt;3.4.1-2.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141611" version="1" comment="python3-base is &lt;3.4.1-2.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141612" version="1" comment="libqt4 is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141613" version="1" comment="libqt4-32bit is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141614" version="1" comment="libqt4-qt3support is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141615" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141616" version="1" comment="libqt4-sql is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141617" version="1" comment="libqt4-sql-32bit is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141618" version="1" comment="libqt4-sql-mysql is &lt;4.8.6-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141619" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.6-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141620" version="1" comment="libqt4-sql-postgresql is &lt;4.8.6-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141621" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.6-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141622" version="1" comment="libqt4-sql-sqlite is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141623" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141624" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.6-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141625" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.6-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141626" version="1" comment="libqt4-x11 is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141627" version="1" comment="libqt4-x11-32bit is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140928" version="1" comment="libraptor2-0 is &lt;2.0.10-3.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141628" version="1" comment="raptor is &lt;2.0.10-3.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141629" version="1" comment="libraw9 is &lt;0.15.4-3.88" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141630" version="1" comment="libreoffice is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141631" version="1" comment="libreoffice-base is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141632" version="1" comment="libreoffice-base-drivers-mysql is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141633" version="1" comment="libreoffice-base-drivers-postgresql is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141634" version="1" comment="libreoffice-calc is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141635" version="1" comment="libreoffice-calc-extensions is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141636" version="1" comment="libreoffice-draw is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141637" version="1" comment="libreoffice-filters-optional is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141638" version="1" comment="libreoffice-gnome is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141639" version="1" comment="libreoffice-icon-theme-tango is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141640" version="1" comment="libreoffice-impress is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141641" version="1" comment="libreoffice-l10n-af is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141642" version="1" comment="libreoffice-l10n-ar is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141643" version="1" comment="libreoffice-l10n-ca is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141644" version="1" comment="libreoffice-l10n-cs is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141645" version="1" comment="libreoffice-l10n-da is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141646" version="1" comment="libreoffice-l10n-de is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141647" version="1" comment="libreoffice-l10n-en is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141648" version="1" comment="libreoffice-l10n-es is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141649" version="1" comment="libreoffice-l10n-fi is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141650" version="1" comment="libreoffice-l10n-fr is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141651" version="1" comment="libreoffice-l10n-gu is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141652" version="1" comment="libreoffice-l10n-hi is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141653" version="1" comment="libreoffice-l10n-hu is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141654" version="1" comment="libreoffice-l10n-it is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141655" version="1" comment="libreoffice-l10n-ja is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141656" version="1" comment="libreoffice-l10n-ko is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141657" version="1" comment="libreoffice-l10n-nb is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141658" version="1" comment="libreoffice-l10n-nl is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141659" version="1" comment="libreoffice-l10n-nn is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141660" version="1" comment="libreoffice-l10n-pl is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141661" version="1" comment="libreoffice-l10n-pt-BR is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141662" version="1" comment="libreoffice-l10n-pt-PT is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141663" version="1" comment="libreoffice-l10n-ru is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141664" version="1" comment="libreoffice-l10n-sk is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141665" version="1" comment="libreoffice-l10n-sv is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141666" version="1" comment="libreoffice-l10n-xh is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141667" version="1" comment="libreoffice-l10n-zh-Hans is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141668" version="1" comment="libreoffice-l10n-zh-Hant is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141669" version="1" comment="libreoffice-l10n-zu is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141670" version="1" comment="libreoffice-mailmerge is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141671" version="1" comment="libreoffice-math is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141672" version="1" comment="libreoffice-officebean is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141673" version="1" comment="libreoffice-pyuno is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141674" version="1" comment="libreoffice-writer is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141675" version="1" comment="libreoffice-writer-extensions is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141676" version="1" comment="librpcsecgss3 is &lt;0.19-16.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141677" version="1" comment="libsilc-1_1-2 is &lt;1.1.10-24.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141678" version="1" comment="libsilcclient-1_1-3 is &lt;1.1.10-24.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141679" version="1" comment="silc-toolkit is &lt;1.1.10-24.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140932" version="1" comment="libsmi is &lt;0.4.8-18.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140933" version="1" comment="libsmi2 is &lt;0.4.8-18.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141680" version="1" comment="libsndfile1 is &lt;1.0.25-18.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141681" version="1" comment="libsndfile1-32bit is &lt;1.0.25-18.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141682" version="1" comment="libsnmp30 is &lt;5.7.2.1-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141683" version="1" comment="libsnmp30-32bit is &lt;5.7.2.1-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141684" version="1" comment="net-snmp is &lt;5.7.2.1-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141685" version="1" comment="perl-SNMP is &lt;5.7.2.1-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141686" version="1" comment="snmp-mibs is &lt;5.7.2.1-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141687" version="1" comment="libsoup-2_4-1 is &lt;2.44.2-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141688" version="1" comment="libsoup-2_4-1-32bit is &lt;2.44.2-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141689" version="1" comment="libsoup-lang is &lt;2.44.2-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141690" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.44.2-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141691" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.25-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141692" version="1" comment="libspice-client-gtk-2_0-4 is &lt;0.25-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141693" version="1" comment="libspice-client-gtk-3_0-4 is &lt;0.25-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141694" version="1" comment="libspice-controller0 is &lt;0.25-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141695" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.25-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141696" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.25-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141697" version="1" comment="libssh4 is &lt;0.6.3-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140963" version="1" comment="libtag1 is &lt;1.9.1-1.265" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141698" version="1" comment="libtag1-32bit is &lt;1.9.1-1.265" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140964" version="1" comment="libtag_c0 is &lt;1.9.1-1.265" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141699" version="1" comment="libtag_c0-32bit is &lt;1.9.1-1.265" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140965" version="1" comment="taglib is &lt;1.9.1-1.265" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141700" version="1" comment="libtasn1 is &lt;3.7-2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141701" version="1" comment="libtasn1-6 is &lt;3.7-2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141702" version="1" comment="libtasn1-6-32bit is &lt;3.7-2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141703" version="1" comment="libtiff5 is &lt;4.0.3-9.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141704" version="1" comment="libtiff5-32bit is &lt;4.0.3-9.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140969" version="1" comment="libudisks2-0 is &lt;2.1.3-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140970" version="1" comment="udisks2 is &lt;2.1.3-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140971" version="1" comment="udisks2-lang is &lt;2.1.3-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141705" version="1" comment="libvirt is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141706" version="1" comment="libvirt-client is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141707" version="1" comment="libvirt-client-32bit is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141708" version="1" comment="libvirt-daemon is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141709" version="1" comment="libvirt-daemon-config-network is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141710" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141711" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141712" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141713" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141714" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141715" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141716" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141717" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141718" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141719" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141720" version="1" comment="libvirt-daemon-lxc is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141721" version="1" comment="libvirt-daemon-qemu is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141722" version="1" comment="libvirt-daemon-xen is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141723" version="1" comment="libvirt-doc is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141724" version="1" comment="libvorbis0 is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140999" version="1" comment="libvorbis0-32bit is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141725" version="1" comment="libvorbisenc2 is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141001" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141726" version="1" comment="libvorbisfile3 is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141003" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141727" version="1" comment="libvte9 is &lt;0.28.2-17.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141728" version="1" comment="libxcb-dri2-0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141729" version="1" comment="libxcb-dri2-0-32bit is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141730" version="1" comment="libxcb-glx0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141731" version="1" comment="libxcb-glx0-32bit is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141732" version="1" comment="libxcb-randr0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141733" version="1" comment="libxcb-render0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141734" version="1" comment="libxcb-render0-32bit is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141735" version="1" comment="libxcb-shape0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141736" version="1" comment="libxcb-shm0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141737" version="1" comment="libxcb-shm0-32bit is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141738" version="1" comment="libxcb-sync1 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141739" version="1" comment="libxcb-xf86dri0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141740" version="1" comment="libxcb-xfixes0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141741" version="1" comment="libxcb-xfixes0-32bit is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141742" version="1" comment="libxcb-xkb1 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141743" version="1" comment="libxcb-xkb1-32bit is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141744" version="1" comment="libxcb-xv0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141745" version="1" comment="libxcb1 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141746" version="1" comment="libxcb1-32bit is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141747" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141748" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141749" version="1" comment="libxml2-2 is &lt;2.9.1-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141750" version="1" comment="libxml2-2-32bit is &lt;2.9.1-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141751" version="1" comment="libxml2-tools is &lt;2.9.1-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141752" version="1" comment="libyaml-0-2 is &lt;0.1.6-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141753" version="1" comment="libzip2 is &lt;0.11.1-4.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141754" version="1" comment="libzmq3 is &lt;4.0.4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141038" version="1" comment="logrotate is &lt;3.8.7-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140466" version="1" comment="m4 is &lt;1.4.16-15.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141042" version="1" comment="mipv6d is &lt;2.0.2.umip.0.4-19.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141755" version="1" comment="mozilla-nspr is &lt;4.10.7-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141756" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141757" version="1" comment="mutt is &lt;1.5.21-44.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141758" version="1" comment="ntp is &lt;4.2.6p5-24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141759" version="1" comment="ntp-doc is &lt;4.2.6p5-24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141044" version="1" comment="opensc is &lt;0.13.0-1.122" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141760" version="1" comment="openslp is &lt;2.0.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141761" version="1" comment="openslp-32bit is &lt;2.0.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141762" version="1" comment="openssh is &lt;6.6p1-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141763" version="1" comment="openssh-helpers is &lt;6.6p1-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141764" version="1" comment="pam is &lt;1.1.8-11.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141765" version="1" comment="pam-32bit is &lt;1.1.8-11.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141766" version="1" comment="pam-doc is &lt;1.1.8-11.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141767" version="1" comment="pam-modules is &lt;12.1-23.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141060" version="1" comment="pam-modules-32bit is &lt;12.1-23.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141061" version="1" comment="pam_krb5 is &lt;2.4.4-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141062" version="1" comment="pam_krb5-32bit is &lt;2.4.4-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141063" version="1" comment="pam_ssh is &lt;2.0-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141064" version="1" comment="pam_ssh-32bit is &lt;2.0-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141768" version="1" comment="patch is &lt;2.7.1-5.191" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141065" version="1" comment="pcsc-ccid is &lt;1.4.14-1.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141769" version="1" comment="perl is &lt;5.18.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141770" version="1" comment="perl-32bit is &lt;5.18.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141771" version="1" comment="perl-base is &lt;5.18.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141772" version="1" comment="perl-doc is &lt;5.18.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141066" version="1" comment="perl-Config-IniFiles is &lt;2.82-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141067" version="1" comment="perl-HTML-Parser is &lt;3.71-1.178" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141068" version="1" comment="perl-LWP-Protocol-https is &lt;6.04-5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141069" version="1" comment="perl-Tk is &lt;804.031-3.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141773" version="1" comment="perl-YAML-LibYAML is &lt;0.38-7.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141774" version="1" comment="pidgin-otr is &lt;4.0.0-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141072" version="1" comment="ppp is &lt;2.4.7-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141775" version="1" comment="procmail is &lt;3.22-267.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141776" version="1" comment="puppet is &lt;3.6.2-3.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141777" version="1" comment="python is &lt;2.7.7-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141778" version="1" comment="python-curses is &lt;2.7.7-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141779" version="1" comment="python-tk is &lt;2.7.7-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141780" version="1" comment="python3 is &lt;3.4.1-2.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141781" version="1" comment="python-cupshelpers is &lt;1.4.5-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141782" version="1" comment="system-config-printer is &lt;1.4.5-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141783" version="1" comment="system-config-printer-common is &lt;1.4.5-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141784" version="1" comment="system-config-printer-common-lang is &lt;1.4.5-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141785" version="1" comment="system-config-printer-dbus-service is &lt;1.4.5-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141786" version="1" comment="udev-configure-printer is &lt;1.4.5-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141787" version="1" comment="python-imaging is &lt;1.1.7-21.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141788" version="1" comment="python-libxml2 is &lt;2.9.1-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141789" version="1" comment="python-pyOpenSSL is &lt;0.14-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141085" version="1" comment="python-pywbem is &lt;0.7.0-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141790" version="1" comment="qemu is &lt;2.0.0-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141791" version="1" comment="qemu-block-curl is &lt;2.0.0-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141792" version="1" comment="qemu-ipxe is &lt;1.0.0-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141793" version="1" comment="qemu-kvm is &lt;2.0.0-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141794" version="1" comment="qemu-seabios is &lt;1.7.4-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141795" version="1" comment="qemu-sgabios is &lt;8-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141796" version="1" comment="qemu-tools is &lt;2.0.0-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141797" version="1" comment="qemu-vgabios is &lt;1.7.4-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141798" version="1" comment="qemu-x86 is &lt;2.0.0-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141103" version="1" comment="radvd is &lt;1.9.7-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141799" version="1" comment="rhythmbox is &lt;3.0.2-1.92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141800" version="1" comment="rhythmbox-lang is &lt;3.0.2-1.92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141801" version="1" comment="rsync is &lt;3.1.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141802" version="1" comment="rsyslog is &lt;8.4.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141122" version="1" comment="rtkit is &lt;0.11_git201205151338-8.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141123" version="1" comment="ruby is &lt;2.1-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141803" version="1" comment="shim is &lt;0.7-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141804" version="1" comment="socat is &lt;1.7.2.4-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141805" version="1" comment="squashfs is &lt;4.3-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141806" version="1" comment="strongswan is &lt;5.1.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141807" version="1" comment="strongswan-doc is &lt;5.1.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141808" version="1" comment="strongswan-ipsec is &lt;5.1.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141809" version="1" comment="strongswan-libs0 is &lt;5.1.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141810" version="1" comment="sudo is &lt;1.8.10p3-1.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141811" version="1" comment="sysconfig is &lt;0.83.7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141812" version="1" comment="sysconfig-netconfig is &lt;0.83.7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141134" version="1" comment="syslog-service is &lt;2.0-778.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141813" version="1" comment="sysvinit-tools is &lt;2.88+-94.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141139" version="1" comment="whois is &lt;5.1.1-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141814" version="1" comment="telepathy-gabble is &lt;0.18.1-3.268" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141815" version="1" comment="telepathy-idle is &lt;0.2.0-1.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141816" version="1" comment="tftp is &lt;5.2-8.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141817" version="1" comment="tigervnc is &lt;1.3.0-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141818" version="1" comment="xorg-x11-Xvnc is &lt;1.3.0-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141819" version="1" comment="unixODBC is &lt;2.3.1-4.95" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141820" version="1" comment="unixODBC-32bit is &lt;2.3.1-4.95" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141821" version="1" comment="vino is &lt;3.10.1-1.86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141822" version="1" comment="vino-lang is &lt;3.10.1-1.86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141823" version="1" comment="vorbis-tools is &lt;1.4.0-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141824" version="1" comment="vorbis-tools-lang is &lt;1.4.0-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141825" version="1" comment="w3m is &lt;0.5.3-153.145" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140672" version="1" comment="wdiff is &lt;1.2.1-3.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141826" version="1" comment="wget is &lt;1.14-4.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141827" version="1" comment="wireshark is &lt;1.10.9-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141828" version="1" comment="xalan-j2 is &lt;2.7.0-264.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141829" version="1" comment="xen is &lt;4.4.1_06-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141830" version="1" comment="xen-kmp-default is &lt;4.4.1_06_k3.12.28_4-2.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141831" version="1" comment="xen-libs is &lt;4.4.1_06-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141832" version="1" comment="xen-libs-32bit is &lt;4.4.1_06-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141833" version="1" comment="xf86-video-intel is &lt;2.99.914-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141167" version="1" comment="xinetd is &lt;2.3.15-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141168" version="1" comment="xlockmore is &lt;5.43-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141834" version="1" comment="xorg-x11 is &lt;7.6_1-14.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141835" version="1" comment="xorg-x11-essentials is &lt;7.6_1-14.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141171" version="1" comment="xrdb is &lt;1.1.0-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141836" version="1" comment="xorg-x11-libs is &lt;7.6-45.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141837" version="1" comment="xorg-x11-server is &lt;7.6_1.15.2-12.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141838" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.15.2-12.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141839" version="1" comment="yast2 is &lt;3.1.108-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141840" version="1" comment="yast2-core is &lt;3.1.11-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512004" version="1" comment="zoo is &lt;2.10-1020.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109224" version="1" comment="DirectFB is &lt;1.7.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109231" version="1" comment="lib++dfb-1_7-1 is &lt;1.7.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109233" version="1" comment="libdirectfb-1_7-1 is &lt;1.7.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109234" version="1" comment="libdirectfb-1_7-1-32bit is &lt;1.7.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118774" version="1" comment="sled-release is ==12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102628" version="1" comment="ImageMagick is &lt;6.8.8.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102634" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102638" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102637" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102640" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116011" version="1" comment="MozillaFirefox is &lt;38.4.0esr-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116014" version="1" comment="MozillaFirefox-translations is &lt;38.4.0esr-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141841" version="1" comment="aaa_base is &lt;13.2+git20140911.61c1681-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141842" version="1" comment="aaa_base-extras is &lt;13.2+git20140911.61c1681-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141843" version="1" comment="accountsservice is &lt;0.6.35-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141844" version="1" comment="accountsservice-lang is &lt;0.6.35-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141845" version="1" comment="libaccountsservice0 is &lt;0.6.35-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141846" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.35-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110200" version="1" comment="autofs is &lt;5.0.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141847" version="1" comment="bind-libs is &lt;9.9.6P1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141848" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141849" version="1" comment="bind-utils is &lt;9.9.6P1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141850" version="1" comment="binutils is &lt;2.25.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113975" version="1" comment="busybox is &lt;1.21.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141851" version="1" comment="cifs-utils is &lt;6.4-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109618" version="1" comment="clamav is &lt;0.98.7-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141852" version="1" comment="colord is &lt;1.1.7-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141853" version="1" comment="colord-lang is &lt;1.1.7-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141854" version="1" comment="libcolord2 is &lt;1.1.7-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141855" version="1" comment="libcolord2-32bit is &lt;1.1.7-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141856" version="1" comment="libcolorhug2 is &lt;1.1.7-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114699" version="1" comment="coreutils is &lt;8.22-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114700" version="1" comment="coreutils-lang is &lt;8.22-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102938" version="1" comment="cpio is &lt;2.11-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102939" version="1" comment="cpio-lang is &lt;2.11-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115214" version="1" comment="cpp48 is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115215" version="1" comment="gcc48 is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115258" version="1" comment="gcc48-32bit is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115217" version="1" comment="gcc48-c++ is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115239" version="1" comment="gcc48-gij is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115238" version="1" comment="gcc48-gij-32bit is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115219" version="1" comment="gcc48-info is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115224" version="1" comment="libasan0 is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115263" version="1" comment="libasan0-32bit is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115242" version="1" comment="libgcj48 is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115241" version="1" comment="libgcj48-32bit is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115245" version="1" comment="libgcj48-jar is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115246" version="1" comment="libgcj_bc1 is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115232" version="1" comment="libstdc++48-devel is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115271" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140508" version="1" comment="cron is &lt;4.2-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140509" version="1" comment="cronie is &lt;1.4.11-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110315" version="1" comment="cups is &lt;1.7.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110316" version="1" comment="cups-client is &lt;1.7.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110319" version="1" comment="cups-libs is &lt;1.7.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110320" version="1" comment="cups-libs-32bit is &lt;1.7.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113515" version="1" comment="cups-filters is &lt;1.0.58-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113516" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113518" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113519" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110168" version="1" comment="curl is &lt;7.37.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110172" version="1" comment="libcurl4 is &lt;7.37.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110171" version="1" comment="libcurl4-32bit is &lt;7.37.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107559" version="1" comment="dbus-1 is &lt;1.8.16-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107561" version="1" comment="dbus-1-x11 is &lt;1.8.16-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107564" version="1" comment="libdbus-1-3 is &lt;1.8.16-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107565" version="1" comment="libdbus-1-3-32bit is &lt;1.8.16-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141857" version="1" comment="dhcp is &lt;4.3.3-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141858" version="1" comment="dhcp-client is &lt;4.3.3-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141859" version="1" comment="dnsmasq is &lt;2.71-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138243" version="1" comment="dracut is &lt;037-66.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113256" version="1" comment="e2fsprogs is &lt;1.42.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113260" version="1" comment="libcom_err2 is &lt;1.42.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113261" version="1" comment="libcom_err2-32bit is &lt;1.42.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113264" version="1" comment="libext2fs2 is &lt;1.42.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106094" version="1" comment="elfutils is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106096" version="1" comment="libasm1 is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106099" version="1" comment="libdw1 is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106100" version="1" comment="libdw1-32bit is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106102" version="1" comment="libebl1 is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106103" version="1" comment="libebl1-32bit is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106106" version="1" comment="libelf1 is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106107" version="1" comment="libelf1-32bit is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141860" version="1" comment="facter is &lt;2.0.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103557" version="1" comment="file is &lt;5.19-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103559" version="1" comment="file-magic is &lt;5.19-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103561" version="1" comment="libmagic1 is &lt;5.19-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103560" version="1" comment="libmagic1-32bit is &lt;5.19-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102676" version="1" comment="finch is &lt;2.10.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102678" version="1" comment="libpurple is &lt;2.10.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102681" version="1" comment="libpurple-lang is &lt;2.10.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102682" version="1" comment="libpurple-meanwhile is &lt;2.10.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102683" version="1" comment="libpurple-tcl is &lt;2.10.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102684" version="1" comment="pidgin is &lt;2.10.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116120" version="1" comment="flash-player is &lt;11.2.202.548-111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116121" version="1" comment="flash-player-gnome is &lt;11.2.202.548-111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141861" version="1" comment="ft2demos is &lt;2.5.5-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110488" version="1" comment="fuse is &lt;2.9.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110491" version="1" comment="libfuse2 is &lt;2.9.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109545" version="1" comment="gd is &lt;2.1.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109546" version="1" comment="gd-32bit is &lt;2.1.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141862" version="1" comment="gdm is &lt;3.10.0.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141863" version="1" comment="gdm-branding-upstream is &lt;3.10.0.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141864" version="1" comment="gdm-lang is &lt;3.10.0.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141865" version="1" comment="gdmflexiserver is &lt;3.10.0.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141866" version="1" comment="libgdm1 is &lt;3.10.0.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141867" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141868" version="1" comment="glibc is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141869" version="1" comment="glibc-32bit is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141870" version="1" comment="glibc-devel is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141871" version="1" comment="glibc-devel-32bit is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141872" version="1" comment="glibc-i18ndata is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141873" version="1" comment="glibc-locale is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141874" version="1" comment="glibc-locale-32bit is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141875" version="1" comment="nscd is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141876" version="1" comment="gnome-keyring is &lt;3.10.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141877" version="1" comment="gnome-keyring-32bit is &lt;3.10.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141878" version="1" comment="gnome-keyring-lang is &lt;3.10.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141879" version="1" comment="gnome-keyring-pam is &lt;3.10.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141880" version="1" comment="gnome-keyring-pam-32bit is &lt;3.10.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141881" version="1" comment="libgck-modules-gnome-keyring is &lt;3.10.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107802" version="1" comment="gnome-settings-daemon is &lt;3.10.2-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107804" version="1" comment="gnome-settings-daemon-lang is &lt;3.10.2-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141882" version="1" comment="gnome-shell is &lt;3.10.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141883" version="1" comment="gnome-shell-browser-plugin is &lt;3.10.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141884" version="1" comment="gnome-shell-calendar is &lt;3.10.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141885" version="1" comment="gnome-shell-lang is &lt;3.10.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114253" version="1" comment="gnutls is &lt;3.2.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114258" version="1" comment="libgnutls28 is &lt;3.2.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114259" version="1" comment="libgnutls28-32bit is &lt;3.2.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109841" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109845" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109846" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109847" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109848" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109849" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109850" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109852" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109853" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109854" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109855" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109856" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109857" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141886" version="1" comment="hyper-v is &lt;6-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107566" version="1" comment="icu is &lt;52.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107572" version="1" comment="libicu52_1 is &lt;52.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107571" version="1" comment="libicu52_1-32bit is &lt;52.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107573" version="1" comment="libicu52_1-data is &lt;52.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115439" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.91-21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115443" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.91-21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114769" version="1" comment="java-1_7_0-openjdk-plugin is &lt;1.6.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141887" version="1" comment="java-1_8_0-openjdk-plugin is &lt;1.6.1-2.4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141888" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.65-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141889" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.65-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141890" version="1" comment="kbd is &lt;1.15.5-8.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141891" version="1" comment="kernel-default is &lt;3.12.49-11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141892" version="1" comment="kernel-default-devel is &lt;3.12.49-11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141893" version="1" comment="kernel-default-extra is &lt;3.12.49-11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141894" version="1" comment="kernel-devel is &lt;3.12.49-11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141895" version="1" comment="kernel-macros is &lt;3.12.49-11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141896" version="1" comment="kernel-source is &lt;3.12.49-11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141897" version="1" comment="kernel-syms is &lt;3.12.49-11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141898" version="1" comment="kernel-xen is &lt;3.12.49-11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141899" version="1" comment="kernel-xen-devel is &lt;3.12.49-11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115941" version="1" comment="krb5 is &lt;1.12.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115942" version="1" comment="krb5-32bit is &lt;1.12.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115943" version="1" comment="krb5-client is &lt;1.12.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102936" version="1" comment="libFLAC8 is &lt;1.3.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102937" version="1" comment="libFLAC8-32bit is &lt;1.3.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141900" version="1" comment="libQt5Core5 is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141901" version="1" comment="libQt5DBus5 is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141902" version="1" comment="libQt5Gui5 is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141903" version="1" comment="libQt5Widgets5 is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108654" version="1" comment="libXfont1 is &lt;1.4.7-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140753" version="1" comment="libXi6 is &lt;1.7.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140754" version="1" comment="libXi6-32bit is &lt;1.7.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108423" version="1" comment="libarchive13 is &lt;3.1.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111372" version="1" comment="libaugeas0 is &lt;1.2.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141904" version="1" comment="libblkid1 is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141905" version="1" comment="libblkid1-32bit is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141906" version="1" comment="libmount1 is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141907" version="1" comment="libmount1-32bit is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141908" version="1" comment="libsmartcols1 is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141909" version="1" comment="libuuid-devel is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141910" version="1" comment="libuuid1 is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141911" version="1" comment="libuuid1-32bit is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141912" version="1" comment="python-libmount is &lt;2.25-30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141913" version="1" comment="util-linux is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141914" version="1" comment="util-linux-lang is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141915" version="1" comment="util-linux-systemd is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141916" version="1" comment="uuidd is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140793" version="1" comment="libcgroup1 is &lt;0.41.rc1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141917" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141918" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141919" version="1" comment="libdcerpc0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141920" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141921" version="1" comment="libgensec0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141922" version="1" comment="libgensec0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141923" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141924" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141925" version="1" comment="libndr-nbt0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141926" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141927" version="1" comment="libndr-standard0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141928" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141929" version="1" comment="libndr0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141930" version="1" comment="libndr0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141931" version="1" comment="libnetapi0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141932" version="1" comment="libnetapi0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141933" version="1" comment="libregistry0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141934" version="1" comment="libsamba-credentials0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141935" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141936" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141937" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141938" version="1" comment="libsamba-passdb0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141939" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141940" version="1" comment="libsamba-util0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141941" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141942" version="1" comment="libsamdb0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141943" version="1" comment="libsamdb0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141944" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141945" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141946" version="1" comment="libsmbclient0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141947" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141948" version="1" comment="libsmbconf0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141949" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141950" version="1" comment="libsmbldap0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141951" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141952" version="1" comment="libtevent-util0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141953" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141954" version="1" comment="libwbclient0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141955" version="1" comment="libwbclient0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141956" version="1" comment="samba is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141957" version="1" comment="samba-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141958" version="1" comment="samba-client is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141959" version="1" comment="samba-client-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141960" version="1" comment="samba-doc is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141961" version="1" comment="samba-libs is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141962" version="1" comment="samba-libs-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141963" version="1" comment="samba-winbind is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141964" version="1" comment="samba-winbind-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141965" version="1" comment="libecpg6 is &lt;9.4.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141966" version="1" comment="libpq5 is &lt;9.4.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141967" version="1" comment="libpq5-32bit is &lt;9.4.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141968" version="1" comment="postgresql94 is &lt;9.4.5-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116018" version="1" comment="libfreebl3 is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116019" version="1" comment="libfreebl3-32bit is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116022" version="1" comment="libsoftokn3 is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116023" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116026" version="1" comment="mozilla-nss is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116027" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116029" version="1" comment="mozilla-nss-certs is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116030" version="1" comment="mozilla-nss-certs-32bit is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116032" version="1" comment="mozilla-nss-sysinit is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116033" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116034" version="1" comment="mozilla-nss-tools is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141969" version="1" comment="libfreetype6 is &lt;2.5.5-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141970" version="1" comment="libfreetype6-32bit is &lt;2.5.5-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114243" version="1" comment="libgcrypt20 is &lt;1.6.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114244" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141971" version="1" comment="libgudev-1_0-0 is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141972" version="1" comment="libgudev-1_0-0-32bit is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141973" version="1" comment="libudev1 is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141974" version="1" comment="libudev1-32bit is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141975" version="1" comment="systemd is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141976" version="1" comment="systemd-32bit is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141977" version="1" comment="systemd-bash-completion is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141978" version="1" comment="systemd-sysvinit is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141979" version="1" comment="udev is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141980" version="1" comment="libipa_hbac0 is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141981" version="1" comment="libsss_idmap0 is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141982" version="1" comment="libsss_sudo is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141983" version="1" comment="python-sssd-config is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141984" version="1" comment="sssd is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141985" version="1" comment="sssd-32bit is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141986" version="1" comment="sssd-ad is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141987" version="1" comment="sssd-ipa is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141988" version="1" comment="sssd-krb5 is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141989" version="1" comment="sssd-krb5-common is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141990" version="1" comment="sssd-ldap is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141991" version="1" comment="sssd-proxy is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141992" version="1" comment="sssd-tools is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106110" version="1" comment="libjasper1 is &lt;1.900.1-170.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106111" version="1" comment="libjasper1-32bit is &lt;1.900.1-170.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108618" version="1" comment="libjavascriptcoregtk-1_0-0 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108619" version="1" comment="libjavascriptcoregtk-1_0-0-32bit is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108628" version="1" comment="libjavascriptcoregtk-3_0-0 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108630" version="1" comment="libwebkit2gtk-3_0-25 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108620" version="1" comment="libwebkitgtk-1_0-0 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108621" version="1" comment="libwebkitgtk-1_0-0-32bit is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108631" version="1" comment="libwebkitgtk-3_0-0 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108623" version="1" comment="libwebkitgtk2-lang is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108634" version="1" comment="libwebkitgtk3-lang is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108635" version="1" comment="typelib-1_0-JavaScriptCore-3_0 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108636" version="1" comment="typelib-1_0-WebKit-3_0 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105080" version="1" comment="libjpeg-turbo is &lt;1.3.1-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105088" version="1" comment="libjpeg62 is &lt;62.1.0-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105087" version="1" comment="libjpeg62-32bit is &lt;62.1.0-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105091" version="1" comment="libjpeg62-turbo is &lt;1.3.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105082" version="1" comment="libjpeg8 is &lt;8.0.2-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105081" version="1" comment="libjpeg8-32bit is &lt;8.0.2-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105086" version="1" comment="libturbojpeg0 is &lt;8.0.2-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105094" version="1" comment="libksba8 is &lt;1.3.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105814" version="1" comment="libmpfr4 is &lt;3.1.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107709" version="1" comment="libmspack0 is &lt;0.4-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141993" version="1" comment="libmysqlclient18 is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141994" version="1" comment="libmysqlclient18-32bit is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141995" version="1" comment="libmysqlclient_r18 is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141996" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141997" version="1" comment="mariadb is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141998" version="1" comment="mariadb-client is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141999" version="1" comment="mariadb-errormessages is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142000" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142001" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142002" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142003" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142004" version="1" comment="openssl is &lt;1.0.1i-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142005" version="1" comment="libpng15-15 is &lt;1.5.22-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105438" version="1" comment="libpng16-16 is &lt;1.6.8-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105439" version="1" comment="libpng16-16-32bit is &lt;1.6.8-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115371" version="1" comment="libpolkit0 is &lt;0.113-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115372" version="1" comment="libpolkit0-32bit is &lt;0.113-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115373" version="1" comment="polkit is &lt;0.113-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115376" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142006" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142007" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142008" version="1" comment="python-base is &lt;2.7.9-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142009" version="1" comment="python-devel is &lt;2.7.9-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142010" version="1" comment="python-xml is &lt;2.7.9-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140926" version="1" comment="libpython3_4m1_0 is &lt;3.4.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140927" version="1" comment="python3-base is &lt;3.4.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113431" version="1" comment="libqt4 is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113430" version="1" comment="libqt4-32bit is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113436" version="1" comment="libqt4-qt3support is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113435" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113438" version="1" comment="libqt4-sql is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113437" version="1" comment="libqt4-sql-32bit is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113424" version="1" comment="libqt4-sql-mysql is &lt;4.8.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113423" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113427" version="1" comment="libqt4-sql-postgresql is &lt;4.8.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113426" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113440" version="1" comment="libqt4-sql-sqlite is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113439" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113429" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113428" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113442" version="1" comment="libqt4-x11 is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113441" version="1" comment="libqt4-x11-32bit is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115661" version="1" comment="libreoffice is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115662" version="1" comment="libreoffice-base is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115663" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115664" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115666" version="1" comment="libreoffice-calc is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115667" version="1" comment="libreoffice-calc-extensions is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115668" version="1" comment="libreoffice-draw is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115669" version="1" comment="libreoffice-filters-optional is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115670" version="1" comment="libreoffice-gnome is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115677" version="1" comment="libreoffice-icon-theme-tango is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115678" version="1" comment="libreoffice-impress is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115680" version="1" comment="libreoffice-l10n-af is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115681" version="1" comment="libreoffice-l10n-ar is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115686" version="1" comment="libreoffice-l10n-ca is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115687" version="1" comment="libreoffice-l10n-cs is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115689" version="1" comment="libreoffice-l10n-da is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115690" version="1" comment="libreoffice-l10n-de is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115693" version="1" comment="libreoffice-l10n-en is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115694" version="1" comment="libreoffice-l10n-es is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115698" version="1" comment="libreoffice-l10n-fi is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115699" version="1" comment="libreoffice-l10n-fr is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115702" version="1" comment="libreoffice-l10n-gu is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115704" version="1" comment="libreoffice-l10n-hi is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115706" version="1" comment="libreoffice-l10n-hu is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115707" version="1" comment="libreoffice-l10n-it is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115708" version="1" comment="libreoffice-l10n-ja is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115711" version="1" comment="libreoffice-l10n-ko is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115717" version="1" comment="libreoffice-l10n-nb is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115718" version="1" comment="libreoffice-l10n-nl is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115719" version="1" comment="libreoffice-l10n-nn is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115724" version="1" comment="libreoffice-l10n-pl is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115725" version="1" comment="libreoffice-l10n-pt-BR is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115726" version="1" comment="libreoffice-l10n-pt-PT is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115728" version="1" comment="libreoffice-l10n-ru is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115730" version="1" comment="libreoffice-l10n-sk is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115735" version="1" comment="libreoffice-l10n-sv is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115744" version="1" comment="libreoffice-l10n-xh is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115745" version="1" comment="libreoffice-l10n-zh-Hans is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115746" version="1" comment="libreoffice-l10n-zh-Hant is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115747" version="1" comment="libreoffice-l10n-zu is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115748" version="1" comment="libreoffice-mailmerge is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115749" version="1" comment="libreoffice-math is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115750" version="1" comment="libreoffice-officebean is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115751" version="1" comment="libreoffice-pyuno is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115754" version="1" comment="libreoffice-writer is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115755" version="1" comment="libreoffice-writer-extensions is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105408" version="1" comment="libruby2_1-2_1 is &lt;2.1.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105409" version="1" comment="ruby2.1 is &lt;2.1.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105414" version="1" comment="ruby2.1-stdlib is &lt;2.1.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105600" version="1" comment="libsndfile1 is &lt;1.0.25-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105601" version="1" comment="libsndfile1-32bit is &lt;1.0.25-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140934" version="1" comment="libsnmp30 is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140935" version="1" comment="libsnmp30-32bit is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140936" version="1" comment="net-snmp is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140937" version="1" comment="perl-SNMP is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140938" version="1" comment="snmp-mibs is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142011" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.29-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142012" version="1" comment="libspice-client-gtk-2_0-4 is &lt;0.29-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142013" version="1" comment="libspice-client-gtk-3_0-4 is &lt;0.29-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142014" version="1" comment="libspice-controller0 is &lt;0.29-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142015" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.29-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142016" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.29-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142017" version="1" comment="libspice-server1 is &lt;0.12.5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108425" version="1" comment="libssh2-1 is &lt;1.4.3-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108426" version="1" comment="libssh2-1-32bit is &lt;1.4.3-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114957" version="1" comment="libssh4 is &lt;0.6.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109692" version="1" comment="libtasn1 is &lt;3.7-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109693" version="1" comment="libtasn1-6 is &lt;3.7-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109694" version="1" comment="libtasn1-6-32bit is &lt;3.7-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114060" version="1" comment="libtiff5 is &lt;4.0.4-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114059" version="1" comment="libtiff5-32bit is &lt;4.0.4-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115565" version="1" comment="libvdpau1 is &lt;0.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115566" version="1" comment="libvdpau1-32bit is &lt;0.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142018" version="1" comment="libvirt is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142019" version="1" comment="libvirt-client is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142020" version="1" comment="libvirt-client-32bit is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142021" version="1" comment="libvirt-daemon is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142022" version="1" comment="libvirt-daemon-config-network is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142023" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142024" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142025" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142026" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142027" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142028" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142029" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142030" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142031" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142032" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142033" version="1" comment="libvirt-daemon-lxc is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142034" version="1" comment="libvirt-daemon-qemu is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142035" version="1" comment="libvirt-daemon-xen is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142036" version="1" comment="libvirt-doc is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114120" version="1" comment="libwmf-0_2-7 is &lt;0.2.8.4-242.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108092" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108093" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103731" version="1" comment="libxml2-2 is &lt;2.9.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103732" version="1" comment="libxml2-2-32bit is &lt;2.9.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103737" version="1" comment="libxml2-tools is &lt;2.9.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141036" version="1" comment="libyaml-0-2 is &lt;0.1.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142037" version="1" comment="libzip2 is &lt;0.11.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114236" version="1" comment="libzmq3 is &lt;4.0.4-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142038" version="1" comment="mailx is &lt;12.5-25.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116016" version="1" comment="mozilla-nspr is &lt;4.10.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116015" version="1" comment="mozilla-nspr-32bit is &lt;4.10.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105068" version="1" comment="mutt is &lt;1.5.21-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142039" version="1" comment="ntp is &lt;4.2.8p4-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142040" version="1" comment="ntp-doc is &lt;4.2.8p4-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142041" version="1" comment="openslp is &lt;2.0.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142042" version="1" comment="openslp-32bit is &lt;2.0.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114322" version="1" comment="openssh is &lt;6.6p1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114325" version="1" comment="openssh-helpers is &lt;6.6p1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142043" version="1" comment="openvpn is &lt;2.3.8-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113958" version="1" comment="p7zip is &lt;9.20.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141056" version="1" comment="pam is &lt;1.1.8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141057" version="1" comment="pam-32bit is &lt;1.1.8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141058" version="1" comment="pam-doc is &lt;1.1.8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110205" version="1" comment="patch is &lt;2.7.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113959" version="1" comment="perl-XML-LibXML is &lt;2.0019-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109959" version="1" comment="perl-YAML-LibYAML is &lt;0.38-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108432" version="1" comment="pigz is &lt;2.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142044" version="1" comment="python is &lt;2.7.9-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142045" version="1" comment="python-curses is &lt;2.7.9-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142046" version="1" comment="python-tk is &lt;2.7.9-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141074" version="1" comment="python3 is &lt;3.4.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103738" version="1" comment="python-libxml2 is &lt;2.9.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142047" version="1" comment="python-requests is &lt;2.3.0-6.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142048" version="1" comment="qemu is &lt;2.3.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142049" version="1" comment="qemu-block-curl is &lt;2.3.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142050" version="1" comment="qemu-ipxe is &lt;1.0.0-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142051" version="1" comment="qemu-kvm is &lt;2.3.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142052" version="1" comment="qemu-seabios is &lt;1.8.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142053" version="1" comment="qemu-sgabios is &lt;8-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142054" version="1" comment="qemu-tools is &lt;2.3.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142055" version="1" comment="qemu-vgabios is &lt;1.8.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142056" version="1" comment="qemu-x86 is &lt;2.3.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142057" version="1" comment="rpcbind is &lt;0.2.1_rc4-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105405" version="1" comment="rpm is &lt;4.11.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105404" version="1" comment="rpm-32bit is &lt;4.11.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105406" version="1" comment="rpm-build is &lt;4.11.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142058" version="1" comment="rsyslog is &lt;8.4.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141124" version="1" comment="sblim-sfcb is &lt;1.4.8-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142059" version="1" comment="shim is &lt;0.9-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110995" version="1" comment="strongswan is &lt;5.1.3-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110997" version="1" comment="strongswan-doc is &lt;5.1.3-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110999" version="1" comment="strongswan-ipsec is &lt;5.1.3-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111000" version="1" comment="strongswan-libs0 is &lt;5.1.3-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142060" version="1" comment="sysconfig is &lt;0.83.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142061" version="1" comment="sysconfig-netconfig is &lt;0.83.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139103" version="1" comment="tar is &lt;1.27.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139104" version="1" comment="tar-lang is &lt;1.27.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108642" version="1" comment="tcpdump is &lt;4.5.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141141" version="1" comment="tftp is &lt;5.2-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142062" version="1" comment="tigervnc is &lt;1.4.3-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142063" version="1" comment="xorg-x11-Xvnc is &lt;1.4.3-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106381" version="1" comment="unzip is &lt;6.00-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115051" version="1" comment="vorbis-tools is &lt;1.4.0-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115052" version="1" comment="vorbis-tools-lang is &lt;1.4.0-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102008" version="1" comment="wget is &lt;1.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114951" version="1" comment="wireshark is &lt;1.12.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110201" version="1" comment="wpa_supplicant is &lt;2.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106065" version="1" comment="xdg-utils is &lt;20140630-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142064" version="1" comment="xen is &lt;4.5.1_12-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142065" version="1" comment="xen-kmp-default is &lt;4.5.1_12_k3.12.49_11-2.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142066" version="1" comment="xen-libs is &lt;4.5.1_12-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142067" version="1" comment="xen-libs-32bit is &lt;4.5.1_12-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142068" version="1" comment="xf86-video-intel is &lt;2.99.914-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142069" version="1" comment="xorg-x11-server is &lt;7.6_1.15.2-36.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142070" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.15.2-36.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142071" version="1" comment="yast2 is &lt;3.1.155-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142072" version="1" comment="yast2-core is &lt;3.1.18-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140428" version="1" comment="DirectFB is &lt;1.7.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140429" version="1" comment="lib++dfb-1_7-1 is &lt;1.7.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140430" version="1" comment="libdirectfb-1_7-1 is &lt;1.7.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142073" version="1" comment="libdirectfb-1_7-1-32bit is &lt;1.7.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128016" version="1" comment="sled-release is ==12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130983" version="1" comment="ImageMagick is &lt;6.8.8.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130984" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130985" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130986" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130987" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131144" version="1" comment="MozillaFirefox is &lt;45.4.0esr-81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131145" version="1" comment="MozillaFirefox-translations is &lt;45.4.0esr-81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142074" version="1" comment="NetworkManager is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142075" version="1" comment="NetworkManager-lang is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140431" version="1" comment="libnm-glib-vpn1 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140432" version="1" comment="libnm-glib4 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140433" version="1" comment="libnm-util2 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140434" version="1" comment="libnm0 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142076" version="1" comment="typelib-1_0-NM-1_0 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140435" version="1" comment="typelib-1_0-NMClient-1_0 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140436" version="1" comment="typelib-1_0-NetworkManager-1_0 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140437" version="1" comment="aaa_base is &lt;13.2+git20140911.61c1681-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140438" version="1" comment="aaa_base-extras is &lt;13.2+git20140911.61c1681-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140439" version="1" comment="accountsservice is &lt;0.6.42-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140440" version="1" comment="accountsservice-lang is &lt;0.6.42-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140441" version="1" comment="libaccountsservice0 is &lt;0.6.42-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140442" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.42-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142077" version="1" comment="argyllcms is &lt;1.6.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131107" version="1" comment="at is &lt;3.1.14-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131109" version="1" comment="libQtWebKit4 is &lt;4.8.6+2.3.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131110" version="1" comment="libQtWebKit4-32bit is &lt;4.8.6+2.3.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131111" version="1" comment="libbonobo is &lt;2.32.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131112" version="1" comment="libbonobo-32bit is &lt;2.32.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131113" version="1" comment="libbonobo-lang is &lt;2.32.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131114" version="1" comment="libkde4 is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131115" version="1" comment="libkde4-32bit is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131116" version="1" comment="libkdecore4 is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131117" version="1" comment="libkdecore4-32bit is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131118" version="1" comment="libksuseinstall1 is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131119" version="1" comment="libksuseinstall1-32bit is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131120" version="1" comment="libnetpbm11 is &lt;10.66.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131121" version="1" comment="libnetpbm11-32bit is &lt;10.66.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131122" version="1" comment="netpbm is &lt;10.66.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140461" version="1" comment="augeas is &lt;1.2.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140462" version="1" comment="augeas-lenses is &lt;1.2.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140463" version="1" comment="libaugeas0 is &lt;1.2.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140464" version="1" comment="autofs is &lt;5.0.9-21.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140467" version="1" comment="avahi is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140468" version="1" comment="avahi-lang is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140470" version="1" comment="libavahi-client3 is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140471" version="1" comment="libavahi-client3-32bit is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140472" version="1" comment="libavahi-common3 is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140473" version="1" comment="libavahi-common3-32bit is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140474" version="1" comment="libavahi-core7 is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140475" version="1" comment="libdns_sd is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140476" version="1" comment="libdns_sd-32bit is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140477" version="1" comment="bash is &lt;4.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140478" version="1" comment="bash-doc is &lt;4.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142078" version="1" comment="bash-lang is &lt;4.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140479" version="1" comment="libreadline6 is &lt;6.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140480" version="1" comment="libreadline6-32bit is &lt;6.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140481" version="1" comment="readline-doc is &lt;6.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131136" version="1" comment="bind-libs is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131137" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131138" version="1" comment="bind-utils is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140482" version="1" comment="binutils is &lt;2.26.1-9.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131108" version="1" comment="bogofilter is &lt;1.2.4-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140483" version="1" comment="bzip2 is &lt;1.0.6-29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140485" version="1" comment="libbz2-1 is &lt;1.0.6-29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140486" version="1" comment="libbz2-1-32bit is &lt;1.0.6-29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140488" version="1" comment="cifs-utils is &lt;6.5-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140489" version="1" comment="clamav is &lt;0.99.2-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142079" version="1" comment="colord is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140490" version="1" comment="colord-gtk-lang is &lt;0.1.26-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142080" version="1" comment="colord-lang is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140491" version="1" comment="libcolord-gtk1 is &lt;0.1.26-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140492" version="1" comment="libcolord2 is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140493" version="1" comment="libcolord2-32bit is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140494" version="1" comment="libcolorhug2 is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140496" version="1" comment="coreutils is &lt;8.25-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140497" version="1" comment="coreutils-lang is &lt;8.25-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140498" version="1" comment="cpp48 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140499" version="1" comment="gcc48 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140500" version="1" comment="gcc48-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140501" version="1" comment="gcc48-c++ is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142081" version="1" comment="gcc48-gij is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142082" version="1" comment="gcc48-gij-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140502" version="1" comment="gcc48-info is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140504" version="1" comment="libasan0 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140505" version="1" comment="libasan0-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142083" version="1" comment="libgcj48 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142084" version="1" comment="libgcj48-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142085" version="1" comment="libgcj48-jar is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142086" version="1" comment="libgcj_bc1 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140506" version="1" comment="libstdc++48-devel is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140507" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130930" version="1" comment="cracklib is &lt;2.9.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131013" version="1" comment="libcrack2 is &lt;2.9.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131014" version="1" comment="libcrack2-32bit is &lt;2.9.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130995" version="1" comment="ctags is &lt;5.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140510" version="1" comment="cups is &lt;1.7.5-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140511" version="1" comment="cups-client is &lt;1.7.5-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140512" version="1" comment="cups-libs is &lt;1.7.5-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140513" version="1" comment="cups-libs-32bit is &lt;1.7.5-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119506" version="1" comment="cups-filters is &lt;1.0.58-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119507" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119508" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119509" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131101" version="1" comment="curl is &lt;7.37.0-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131102" version="1" comment="libcurl4 is &lt;7.37.0-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131103" version="1" comment="libcurl4-32bit is &lt;7.37.0-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140535" version="1" comment="dbus-1 is &lt;1.8.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140536" version="1" comment="dbus-1-x11 is &lt;1.8.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140537" version="1" comment="libdbus-1-3 is &lt;1.8.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140538" version="1" comment="libdbus-1-3-32bit is &lt;1.8.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130039" version="1" comment="dhcp is &lt;4.3.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130040" version="1" comment="dhcp-client is &lt;4.3.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142087" version="1" comment="dia is &lt;0.97.3-15.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142088" version="1" comment="dia-lang is &lt;0.97.3-15.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140541" version="1" comment="dnsmasq is &lt;2.71-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131020" version="1" comment="dosfstools is &lt;3.0.26-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140546" version="1" comment="dracut is &lt;044-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121566" version="1" comment="ecryptfs-utils is &lt;103-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121567" version="1" comment="ecryptfs-utils-32bit is &lt;103-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140549" version="1" comment="emacs is &lt;24.3-16.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140551" version="1" comment="emacs-info is &lt;24.3-16.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140553" version="1" comment="emacs-x11 is &lt;24.3-16.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140554" version="1" comment="etags is &lt;24.3-16.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142089" version="1" comment="empathy is &lt;3.12.12-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142090" version="1" comment="empathy-lang is &lt;3.12.12-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142091" version="1" comment="telepathy-mission-control-plugin-goa is &lt;3.12.12-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140555" version="1" comment="eog is &lt;3.20.4-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140556" version="1" comment="eog-lang is &lt;3.20.4-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140557" version="1" comment="evince is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140558" version="1" comment="evince-browser-plugin is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140559" version="1" comment="evince-lang is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140560" version="1" comment="evince-plugin-djvudocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140561" version="1" comment="evince-plugin-dvidocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140562" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140563" version="1" comment="evince-plugin-psdocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140564" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140565" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140566" version="1" comment="libevdocument3-4 is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140567" version="1" comment="libevview3-3 is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140568" version="1" comment="nautilus-evince is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142092" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142093" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128464" version="1" comment="expat is &lt;2.1.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128465" version="1" comment="libexpat1 is &lt;2.1.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128466" version="1" comment="libexpat1-32bit is &lt;2.1.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140569" version="1" comment="fetchmail is &lt;6.3.26-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142094" version="1" comment="finch is &lt;2.11.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142095" version="1" comment="libpurple is &lt;2.11.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142096" version="1" comment="libpurple-lang is &lt;2.11.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142097" version="1" comment="libpurple-meanwhile is &lt;2.11.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142098" version="1" comment="libpurple-tcl is &lt;2.11.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142099" version="1" comment="pidgin is &lt;2.11.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140574" version="1" comment="fontconfig is &lt;2.11.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140575" version="1" comment="fontconfig-32bit is &lt;2.11.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142100" version="1" comment="freerdp is &lt;2.0.0~git.1463131968.4e66df7-11.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142101" version="1" comment="libfreerdp2 is &lt;2.0.0~git.1463131968.4e66df7-11.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140589" version="1" comment="ft2demos is &lt;2.6.3-7.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131048" version="1" comment="gd is &lt;2.1.0-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131049" version="1" comment="gd-32bit is &lt;2.1.0-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140591" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140592" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140593" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140594" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140595" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140596" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140597" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.15-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140598" version="1" comment="librsvg-2-2 is &lt;2.40.15-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140599" version="1" comment="librsvg-2-2-32bit is &lt;2.40.15-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140600" version="1" comment="rsvg-view is &lt;2.40.15-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140601" version="1" comment="gdm is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140602" version="1" comment="gdm-lang is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140603" version="1" comment="gdmflexiserver is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140604" version="1" comment="libgdm1 is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140605" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125321" version="1" comment="ghostscript is &lt;9.15-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125322" version="1" comment="ghostscript-x11 is &lt;9.15-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142102" version="1" comment="gimp is &lt;2.8.18-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142103" version="1" comment="gimp-lang is &lt;2.8.18-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142104" version="1" comment="gimp-plugins-python is &lt;2.8.18-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142105" version="1" comment="libgimp-2_0-0 is &lt;2.8.18-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142106" version="1" comment="libgimpui-2_0-0 is &lt;2.8.18-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140606" version="1" comment="glib2-lang is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140607" version="1" comment="glib2-tools is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140608" version="1" comment="libgio-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140609" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142107" version="1" comment="libgio-fam is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140610" version="1" comment="libglib-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140611" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140612" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140613" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140614" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140615" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140616" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140617" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140618" version="1" comment="glibc is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140619" version="1" comment="glibc-32bit is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140620" version="1" comment="glibc-devel is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140621" version="1" comment="glibc-devel-32bit is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140623" version="1" comment="glibc-i18ndata is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140625" version="1" comment="glibc-locale is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140626" version="1" comment="glibc-locale-32bit is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140629" version="1" comment="nscd is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140630" version="1" comment="gnome-keyring is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140631" version="1" comment="gnome-keyring-32bit is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140632" version="1" comment="gnome-keyring-lang is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140633" version="1" comment="gnome-keyring-pam is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140634" version="1" comment="gnome-keyring-pam-32bit is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140635" version="1" comment="libgck-modules-gnome-keyring is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142108" version="1" comment="gnome-online-accounts is &lt;3.20.4-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142109" version="1" comment="gnome-online-accounts-lang is &lt;3.20.4-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140636" version="1" comment="libgoa-1_0-0 is &lt;3.20.4-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142110" version="1" comment="libgoa-1_0-0-32bit is &lt;3.20.4-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140637" version="1" comment="libgoa-backend-1_0-1 is &lt;3.20.4-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142111" version="1" comment="typelib-1_0-Goa-1_0 is &lt;3.20.4-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140638" version="1" comment="gnome-settings-daemon is &lt;3.20.1-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140639" version="1" comment="gnome-settings-daemon-lang is &lt;3.20.1-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140640" version="1" comment="gnome-shell is &lt;3.20.4-70.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140641" version="1" comment="gnome-shell-browser-plugin is &lt;3.20.4-70.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142112" version="1" comment="gnome-shell-calendar is &lt;3.20.4-70.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140642" version="1" comment="gnome-shell-lang is &lt;3.20.4-70.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119616" version="1" comment="gpg2 is &lt;2.0.24-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119617" version="1" comment="gpg2-lang is &lt;2.0.24-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140648" version="1" comment="grub2 is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140650" version="1" comment="grub2-i386-pc is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140653" version="1" comment="grub2-snapper-plugin is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140654" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140655" version="1" comment="grub2-x86_64-efi is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140656" version="1" comment="grub2-x86_64-xen is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142113" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142114" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142115" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142116" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142117" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142118" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142119" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142120" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142121" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142122" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142123" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142124" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142125" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140657" version="1" comment="gtk2-data is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140658" version="1" comment="gtk2-lang is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140659" version="1" comment="gtk2-tools is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140660" version="1" comment="gtk2-tools-32bit is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140661" version="1" comment="libgtk-2_0-0 is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140662" version="1" comment="libgtk-2_0-0-32bit is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142126" version="1" comment="typelib-1_0-Gtk-2_0 is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140682" version="1" comment="hyper-v is &lt;7-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140683" version="1" comment="ibus-chewing is &lt;1.4.14-4.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140684" version="1" comment="ibus-pinyin is &lt;1.5.0-7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142127" version="1" comment="imobiledevice-tools is &lt;1.2.0-7.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140847" version="1" comment="libimobiledevice6 is &lt;1.2.0-7.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130960" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.111-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130961" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.111-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130962" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.101-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130963" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.101-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140693" version="1" comment="kbd is &lt;1.15.5-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140694" version="1" comment="kdump is &lt;0.8.15-28.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140695" version="1" comment="kernel-default is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140697" version="1" comment="kernel-default-devel is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142128" version="1" comment="kernel-default-extra is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140699" version="1" comment="kernel-devel is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140700" version="1" comment="kernel-macros is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140701" version="1" comment="kernel-source is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140702" version="1" comment="kernel-syms is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140703" version="1" comment="krb5 is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140704" version="1" comment="krb5-32bit is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140705" version="1" comment="krb5-client is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126431" version="1" comment="lhasa is &lt;0.2.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126432" version="1" comment="liblhasa0 is &lt;0.2.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140571" version="1" comment="libFLAC++6 is &lt;1.3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142129" version="1" comment="libFLAC++6-32bit is &lt;1.3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140572" version="1" comment="libFLAC8 is &lt;1.3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140573" version="1" comment="libFLAC8-32bit is &lt;1.3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140721" version="1" comment="libQt5Concurrent5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140722" version="1" comment="libQt5Core5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140723" version="1" comment="libQt5DBus5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140724" version="1" comment="libQt5Gui5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140725" version="1" comment="libQt5Network5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140726" version="1" comment="libQt5OpenGL5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140727" version="1" comment="libQt5PrintSupport5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140728" version="1" comment="libQt5Sql5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140729" version="1" comment="libQt5Sql5-mysql is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140730" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140731" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140732" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140733" version="1" comment="libQt5Test5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140734" version="1" comment="libQt5Widgets5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140735" version="1" comment="libQt5Xml5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140736" version="1" comment="libQt5WebKit5 is &lt;5.6.1-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140737" version="1" comment="libQt5WebKit5-imports is &lt;5.6.1-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140738" version="1" comment="libQt5WebKitWidgets5 is &lt;5.6.1-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140752" version="1" comment="libXfont1 is &lt;1.5.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140759" version="1" comment="libXrandr2 is &lt;1.5.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140760" version="1" comment="libXrandr2-32bit is &lt;1.5.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140770" version="1" comment="libXvnc1 is &lt;1.6.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140771" version="1" comment="tigervnc is &lt;1.6.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140772" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130724" version="1" comment="libarchive13 is &lt;3.1.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125716" version="1" comment="libasan2 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125717" version="1" comment="libasan2-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125723" version="1" comment="libffi4 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125724" version="1" comment="libffi4-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125734" version="1" comment="libmpx0 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125735" version="1" comment="libmpx0-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125736" version="1" comment="libmpxwrappers0 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125737" version="1" comment="libmpxwrappers0-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140779" version="1" comment="libblkid1 is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140780" version="1" comment="libblkid1-32bit is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140781" version="1" comment="libfdisk1 is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140782" version="1" comment="libmount1 is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140783" version="1" comment="libmount1-32bit is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140784" version="1" comment="libsmartcols1 is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142130" version="1" comment="libuuid-devel is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140785" version="1" comment="libuuid1 is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140786" version="1" comment="libuuid1-32bit is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140787" version="1" comment="python-libmount is &lt;2.28-40.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140788" version="1" comment="util-linux is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140789" version="1" comment="util-linux-lang is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140790" version="1" comment="util-linux-systemd is &lt;2.28-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140791" version="1" comment="uuidd is &lt;2.28-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131768" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140794" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140795" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140796" version="1" comment="libdcerpc0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140797" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140798" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140799" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140800" version="1" comment="libndr-nbt0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140801" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140802" version="1" comment="libndr-standard0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140803" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140804" version="1" comment="libndr0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140805" version="1" comment="libndr0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140806" version="1" comment="libnetapi0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140807" version="1" comment="libnetapi0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140808" version="1" comment="libsamba-credentials0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140809" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140810" version="1" comment="libsamba-errors0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140811" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140812" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140813" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140814" version="1" comment="libsamba-passdb0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140815" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140816" version="1" comment="libsamba-util0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140817" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140818" version="1" comment="libsamdb0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140819" version="1" comment="libsamdb0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140820" version="1" comment="libsmbclient0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140821" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140822" version="1" comment="libsmbconf0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140823" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140824" version="1" comment="libsmbldap0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140825" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140826" version="1" comment="libtevent-util0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140827" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140828" version="1" comment="libwbclient0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140829" version="1" comment="libwbclient0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140830" version="1" comment="samba is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140831" version="1" comment="samba-client is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140832" version="1" comment="samba-client-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140833" version="1" comment="samba-doc is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140834" version="1" comment="samba-libs is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140835" version="1" comment="samba-libs-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140836" version="1" comment="samba-winbind is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140837" version="1" comment="samba-winbind-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131139" version="1" comment="libecpg6 is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131140" version="1" comment="libpq5 is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131141" version="1" comment="libpq5-32bit is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131142" version="1" comment="postgresql94 is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129282" version="1" comment="libfreebl3 is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129283" version="1" comment="libfreebl3-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129284" version="1" comment="libsoftokn3 is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129285" version="1" comment="libsoftokn3-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129288" version="1" comment="mozilla-nss is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129289" version="1" comment="mozilla-nss-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129290" version="1" comment="mozilla-nss-certs is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129291" version="1" comment="mozilla-nss-certs-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129292" version="1" comment="mozilla-nss-sysinit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129293" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129294" version="1" comment="mozilla-nss-tools is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140587" version="1" comment="libfreetype6 is &lt;2.6.3-7.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140588" version="1" comment="libfreetype6-32bit is &lt;2.6.3-7.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131105" version="1" comment="libgcrypt20 is &lt;1.6.1-16.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131106" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126709" version="1" comment="libgif6 is &lt;5.0.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126710" version="1" comment="libgif6-32bit is &lt;5.0.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140842" version="1" comment="libgnomesu is &lt;2.0.0-353.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140843" version="1" comment="libgnomesu-lang is &lt;2.0.0-353.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140844" version="1" comment="libgnomesu0 is &lt;2.0.0-353.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124729" version="1" comment="libgraphite2-3 is &lt;1.3.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124730" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140676" version="1" comment="libgypsy0 is &lt;0.9-6.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123011" version="1" comment="libhogweed2 is &lt;2.7.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123012" version="1" comment="libhogweed2-32bit is &lt;2.7.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123014" version="1" comment="libnettle4 is &lt;2.7.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123015" version="1" comment="libnettle4-32bit is &lt;2.7.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130989" version="1" comment="libidn11 is &lt;1.28-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130990" version="1" comment="libidn11-32bit is &lt;1.28-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140848" version="1" comment="libipa_hbac0 is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140849" version="1" comment="libsss_idmap0 is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140850" version="1" comment="libsss_sudo is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140851" version="1" comment="python-sssd-config is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140852" version="1" comment="sssd is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140853" version="1" comment="sssd-32bit is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140854" version="1" comment="sssd-ad is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140855" version="1" comment="sssd-ipa is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140856" version="1" comment="sssd-krb5 is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140857" version="1" comment="sssd-krb5-common is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140858" version="1" comment="sssd-ldap is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140859" version="1" comment="sssd-proxy is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140860" version="1" comment="sssd-tools is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142131" version="1" comment="libjavascriptcoregtk-1_0-0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142132" version="1" comment="libjavascriptcoregtk-1_0-0-32bit is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140862" version="1" comment="libjavascriptcoregtk-3_0-0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142133" version="1" comment="libwebkitgtk-1_0-0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142134" version="1" comment="libwebkitgtk-1_0-0-32bit is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140863" version="1" comment="libwebkitgtk-3_0-0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142135" version="1" comment="libwebkitgtk2-lang is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140864" version="1" comment="libwebkitgtk3-lang is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142136" version="1" comment="typelib-1_0-JavaScriptCore-3_0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142137" version="1" comment="typelib-1_0-WebKit-3_0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140865" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140866" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142138" version="1" comment="libwebkit2gtk3-lang is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140867" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140868" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140869" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128468" version="1" comment="libksba8 is &lt;1.3.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140870" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140871" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140874" version="1" comment="openldap2-client is &lt;2.4.41-18.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140715" version="1" comment="libldb1 is &lt;1.1.26-10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140716" version="1" comment="libldb1-32bit is &lt;1.1.26-10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118765" version="1" comment="libmspack0 is &lt;0.4-14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131128" version="1" comment="libmysqlclient18 is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131129" version="1" comment="libmysqlclient18-32bit is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131130" version="1" comment="libmysqlclient_r18 is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131131" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131132" version="1" comment="mariadb is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131133" version="1" comment="mariadb-client is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131134" version="1" comment="mariadb-errormessages is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142139" version="1" comment="libndp0 is &lt;1.6-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142140" version="1" comment="libnewt0_52 is &lt;0.52.16-1.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140890" version="1" comment="libopenssl-devel is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140891" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140892" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140895" version="1" comment="openssl is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131148" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131149" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124478" version="1" comment="libotr5 is &lt;4.0.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140897" version="1" comment="libpango-1_0-0 is &lt;1.40.1-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140898" version="1" comment="libpango-1_0-0-32bit is &lt;1.40.1-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140899" version="1" comment="typelib-1_0-Pango-1_0 is &lt;1.40.1-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119221" version="1" comment="libpng12-0 is &lt;1.2.50-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119222" version="1" comment="libpng12-0-32bit is &lt;1.2.50-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119233" version="1" comment="libpng15-15 is &lt;1.5.22-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119224" version="1" comment="libpng16-16 is &lt;1.6.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119225" version="1" comment="libpng16-16-32bit is &lt;1.6.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140902" version="1" comment="libpolkit0 is &lt;0.113-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142141" version="1" comment="libpolkit0-32bit is &lt;0.113-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140903" version="1" comment="polkit is &lt;0.113-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140904" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140905" version="1" comment="libpoppler-glib8 is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140906" version="1" comment="libpoppler-qt4-4 is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140907" version="1" comment="libpoppler60 is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140908" version="1" comment="poppler-tools is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128640" version="1" comment="libpoppler44 is &lt;0.24.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140909" version="1" comment="libproxy1 is &lt;0.4.13-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140910" version="1" comment="libproxy1-32bit is &lt;0.4.13-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140911" version="1" comment="libproxy1-config-gnome3 is &lt;0.4.13-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140912" version="1" comment="libproxy1-config-gnome3-32bit is &lt;0.4.13-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140913" version="1" comment="libproxy1-networkmanager is &lt;0.4.13-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142142" version="1" comment="libproxy1-networkmanager-32bit is &lt;0.4.13-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140914" version="1" comment="libproxy1-pacrunner-webkit is &lt;0.4.13-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130996" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130997" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130999" version="1" comment="python-base is &lt;2.7.9-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131001" version="1" comment="python-devel is &lt;2.7.9-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131003" version="1" comment="python-xml is &lt;2.7.9-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125268" version="1" comment="libqt4 is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125269" version="1" comment="libqt4-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125270" version="1" comment="libqt4-qt3support is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125271" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125272" version="1" comment="libqt4-sql is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125273" version="1" comment="libqt4-sql-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125274" version="1" comment="libqt4-sql-mysql is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125275" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125277" version="1" comment="libqt4-sql-postgresql is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125278" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125279" version="1" comment="libqt4-sql-sqlite is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125280" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125281" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125282" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125283" version="1" comment="libqt4-x11 is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125284" version="1" comment="libqt4-x11-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130948" version="1" comment="libreoffice is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131150" version="1" comment="libreoffice-base is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131151" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131152" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131153" version="1" comment="libreoffice-calc is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131154" version="1" comment="libreoffice-calc-extensions is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131155" version="1" comment="libreoffice-draw is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131156" version="1" comment="libreoffice-filters-optional is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131157" version="1" comment="libreoffice-gnome is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131158" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131159" version="1" comment="libreoffice-icon-theme-tango is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131160" version="1" comment="libreoffice-impress is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131161" version="1" comment="libreoffice-l10n-af is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131162" version="1" comment="libreoffice-l10n-ar is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131163" version="1" comment="libreoffice-l10n-ca is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131164" version="1" comment="libreoffice-l10n-cs is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131165" version="1" comment="libreoffice-l10n-da is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131166" version="1" comment="libreoffice-l10n-de is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131167" version="1" comment="libreoffice-l10n-en is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131168" version="1" comment="libreoffice-l10n-es is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131169" version="1" comment="libreoffice-l10n-fi is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131170" version="1" comment="libreoffice-l10n-fr is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131171" version="1" comment="libreoffice-l10n-gu is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131172" version="1" comment="libreoffice-l10n-hi is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131173" version="1" comment="libreoffice-l10n-hu is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131174" version="1" comment="libreoffice-l10n-it is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131175" version="1" comment="libreoffice-l10n-ja is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131176" version="1" comment="libreoffice-l10n-ko is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131177" version="1" comment="libreoffice-l10n-nb is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131178" version="1" comment="libreoffice-l10n-nl is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131179" version="1" comment="libreoffice-l10n-nn is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131180" version="1" comment="libreoffice-l10n-pl is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131181" version="1" comment="libreoffice-l10n-pt-BR is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131182" version="1" comment="libreoffice-l10n-pt-PT is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142143" version="1" comment="libreoffice-l10n-ro is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131183" version="1" comment="libreoffice-l10n-ru is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131184" version="1" comment="libreoffice-l10n-sk is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131185" version="1" comment="libreoffice-l10n-sv is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131186" version="1" comment="libreoffice-l10n-xh is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131187" version="1" comment="libreoffice-l10n-zh-Hans is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131188" version="1" comment="libreoffice-l10n-zh-Hant is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131189" version="1" comment="libreoffice-l10n-zu is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131190" version="1" comment="libreoffice-mailmerge is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131191" version="1" comment="libreoffice-math is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131192" version="1" comment="libreoffice-officebean is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131193" version="1" comment="libreoffice-pyuno is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131194" version="1" comment="libreoffice-writer is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131195" version="1" comment="libreoffice-writer-extensions is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142144" version="1" comment="libreofficekit is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140929" version="1" comment="libruby2_1-2_1 is &lt;2.1.2-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140930" version="1" comment="ruby2.1 is &lt;2.1.2-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140931" version="1" comment="ruby2.1-stdlib is &lt;2.1.2-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119271" version="1" comment="libsndfile1 is &lt;1.0.25-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119272" version="1" comment="libsndfile1-32bit is &lt;1.0.25-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140939" version="1" comment="libsoup-2_4-1 is &lt;2.54.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140940" version="1" comment="libsoup-2_4-1-32bit is &lt;2.54.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140941" version="1" comment="libsoup-lang is &lt;2.54.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140942" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.54.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140943" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140944" version="1" comment="libspice-client-glib-helper is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140945" version="1" comment="libspice-client-gtk-2_0-4 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140946" version="1" comment="libspice-client-gtk-3_0-4 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140947" version="1" comment="libspice-controller0 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140948" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140949" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140950" version="1" comment="libspice-server1 is &lt;0.12.7-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130774" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130775" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130776" version="1" comment="sqlite3 is &lt;3.8.10.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140951" version="1" comment="libsrtp1 is &lt;1.5.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140952" version="1" comment="libssh2-1 is &lt;1.4.3-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140953" version="1" comment="libssh2-1-32bit is &lt;1.4.3-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123868" version="1" comment="libssh4 is &lt;0.6.3-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140954" version="1" comment="libsystemd0 is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140955" version="1" comment="libsystemd0-32bit is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140956" version="1" comment="libudev1 is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140957" version="1" comment="libudev1-32bit is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140958" version="1" comment="systemd is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140959" version="1" comment="systemd-32bit is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140960" version="1" comment="systemd-bash-completion is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140961" version="1" comment="systemd-sysvinit is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140962" version="1" comment="udev is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128901" version="1" comment="libtasn1 is &lt;3.7-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128902" version="1" comment="libtasn1-6 is &lt;3.7-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128903" version="1" comment="libtasn1-6-32bit is &lt;3.7-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140966" version="1" comment="libthai-data is &lt;0.1.25-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140967" version="1" comment="libthai0 is &lt;0.1.25-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140968" version="1" comment="libthai0-32bit is &lt;0.1.25-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131042" version="1" comment="libtiff5 is &lt;4.0.6-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131043" version="1" comment="libtiff5-32bit is &lt;4.0.6-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140975" version="1" comment="libusbmuxd4 is &lt;1.0.10-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140976" version="1" comment="libvdpau1 is &lt;1.1.1-6.73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142145" version="1" comment="libvdpau1-32bit is &lt;1.1.1-6.73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140977" version="1" comment="libvirt is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140978" version="1" comment="libvirt-client is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142146" version="1" comment="libvirt-client-32bit is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140979" version="1" comment="libvirt-daemon is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140980" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140981" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140982" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140983" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140984" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140985" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140986" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140987" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140988" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140989" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140990" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140991" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140992" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140993" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140994" version="1" comment="libvirt-doc is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141004" version="1" comment="libvte9 is &lt;0.28.2-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141007" version="1" comment="libxcb-dri2-0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141008" version="1" comment="libxcb-dri2-0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141009" version="1" comment="libxcb-dri3-0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141010" version="1" comment="libxcb-dri3-0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141011" version="1" comment="libxcb-glx0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141012" version="1" comment="libxcb-glx0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141013" version="1" comment="libxcb-present0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141014" version="1" comment="libxcb-present0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141015" version="1" comment="libxcb-randr0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141016" version="1" comment="libxcb-render0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141017" version="1" comment="libxcb-render0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141018" version="1" comment="libxcb-shape0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141019" version="1" comment="libxcb-shm0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141020" version="1" comment="libxcb-shm0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141021" version="1" comment="libxcb-sync1 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141022" version="1" comment="libxcb-sync1-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141023" version="1" comment="libxcb-xf86dri0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141024" version="1" comment="libxcb-xfixes0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141025" version="1" comment="libxcb-xfixes0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141026" version="1" comment="libxcb-xinerama0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141027" version="1" comment="libxcb-xkb1 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141028" version="1" comment="libxcb-xkb1-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141029" version="1" comment="libxcb-xv0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141030" version="1" comment="libxcb1 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141031" version="1" comment="libxcb1-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131022" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131023" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141032" version="1" comment="libxml2-2 is &lt;2.9.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141033" version="1" comment="libxml2-2-32bit is &lt;2.9.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141035" version="1" comment="libxml2-tools is &lt;2.9.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141037" version="1" comment="libzip2 is &lt;0.11.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142147" version="1" comment="libzmq3 is &lt;4.0.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141041" version="1" comment="mailx is &lt;12.5-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129286" version="1" comment="mozilla-nspr is &lt;4.12-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129287" version="1" comment="mozilla-nspr-32bit is &lt;4.12-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141043" version="1" comment="mutt is &lt;1.6.0-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128799" version="1" comment="ntp is &lt;4.2.8p8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128800" version="1" comment="ntp-doc is &lt;4.2.8p8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131123" version="1" comment="openslp is &lt;2.0.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131124" version="1" comment="openslp-32bit is &lt;2.0.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141045" version="1" comment="openssh is &lt;7.2p2-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141047" version="1" comment="openssh-helpers is &lt;7.2p2-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141048" version="1" comment="openvpn is &lt;2.3.8-16.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128891" version="1" comment="p7zip is &lt;9.20.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131038" version="1" comment="perl is &lt;5.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131039" version="1" comment="perl-32bit is &lt;5.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131040" version="1" comment="perl-base is &lt;5.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131041" version="1" comment="perl-doc is &lt;5.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142148" version="1" comment="pidgin-otr is &lt;4.0.0-11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142149" version="1" comment="puppet is &lt;3.8.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130998" version="1" comment="python is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131000" version="1" comment="python-curses is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131002" version="1" comment="python-tk is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141075" version="1" comment="python3-curses is &lt;3.4.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141076" version="1" comment="python-cupshelpers is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141077" version="1" comment="system-config-printer is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141078" version="1" comment="system-config-printer-common is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141079" version="1" comment="system-config-printer-common-lang is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141080" version="1" comment="system-config-printer-dbus-service is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141081" version="1" comment="udev-configure-printer is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141083" version="1" comment="python-libxml2 is &lt;2.9.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141084" version="1" comment="python-pyOpenSSL is &lt;16.0.0-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141086" version="1" comment="python-requests is &lt;2.8.1-6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141087" version="1" comment="qemu is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141089" version="1" comment="qemu-block-curl is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141093" version="1" comment="qemu-ipxe is &lt;1.0.0-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141094" version="1" comment="qemu-kvm is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141098" version="1" comment="qemu-seabios is &lt;1.9.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141099" version="1" comment="qemu-sgabios is &lt;8-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141100" version="1" comment="qemu-tools is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141101" version="1" comment="qemu-vgabios is &lt;1.9.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141102" version="1" comment="qemu-x86 is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142150" version="1" comment="rhythmbox is &lt;3.4-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142151" version="1" comment="rhythmbox-lang is &lt;3.4-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141107" version="1" comment="rpcbind is &lt;0.2.3-21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141108" version="1" comment="rpm is &lt;4.11.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141109" version="1" comment="rpm-32bit is &lt;4.11.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141110" version="1" comment="rpm-build is &lt;4.11.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141111" version="1" comment="rsync is &lt;3.1.0-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141112" version="1" comment="rsyslog is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141125" version="1" comment="shim is &lt;0.9-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122758" version="1" comment="socat is &lt;1.7.2.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141126" version="1" comment="squashfs is &lt;4.3-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119278" version="1" comment="strongswan is &lt;5.1.3-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119279" version="1" comment="strongswan-doc is &lt;5.1.3-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119280" version="1" comment="strongswan-ipsec is &lt;5.1.3-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119281" version="1" comment="strongswan-libs0 is &lt;5.1.3-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141130" version="1" comment="sudo is &lt;1.8.10p3-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141131" version="1" comment="supportutils is &lt;3.0-85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141132" version="1" comment="sysconfig is &lt;0.84.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141133" version="1" comment="sysconfig-netconfig is &lt;0.84.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141138" version="1" comment="sysvinit-tools is &lt;2.88+-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136443" version="1" comment="tar is &lt;1.27.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136445" version="1" comment="tar-lang is &lt;1.27.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141140" version="1" comment="tcpdump is &lt;4.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142152" version="1" comment="telepathy-gabble is &lt;0.18.3-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141151" version="1" comment="unixODBC is &lt;2.3.4-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141152" version="1" comment="unixODBC-32bit is &lt;2.3.4-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141153" version="1" comment="update-alternatives is &lt;1.18.4-14.216" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141154" version="1" comment="vino is &lt;3.20.2-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141155" version="1" comment="vino-lang is &lt;3.20.2-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141157" version="1" comment="w3m is &lt;0.5.3-157.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131037" version="1" comment="wget is &lt;1.14-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131146" version="1" comment="wireshark is &lt;1.12.13-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131098" version="1" comment="wpa_supplicant is &lt;2.2-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141159" version="1" comment="xen is &lt;4.7.0_12-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141161" version="1" comment="xen-libs is &lt;4.7.0_12-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141162" version="1" comment="xen-libs-32bit is &lt;4.7.0_12-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141165" version="1" comment="xf86-video-intel is &lt;2.99.917.641_ge4ef6e9-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141166" version="1" comment="xfsprogs is &lt;4.3.0-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141173" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-57.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141174" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-57.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119273" version="1" comment="xscreensaver is &lt;5.22-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119274" version="1" comment="xscreensaver-data is &lt;5.22-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141175" version="1" comment="yast2 is &lt;3.1.206-37.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141176" version="1" comment="yast2-core is &lt;3.1.23-6.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141177" version="1" comment="yast2-users is &lt;3.1.57-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159517" version="1" comment="sled-release is ==12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156374" version="1" comment="ImageMagick is &lt;6.8.8.1-70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156375" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156376" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156377" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156378" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157344" version="1" comment="MozillaFirefox is &lt;52.2.0esr-108.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157346" version="1" comment="MozillaFirefox-translations is &lt;52.2.0esr-108.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159624" version="1" comment="NetworkManager is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159625" version="1" comment="NetworkManager-lang is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159169" version="1" comment="libnm-glib-vpn1 is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159170" version="1" comment="libnm-glib4 is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159171" version="1" comment="libnm-util2 is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159172" version="1" comment="libnm0 is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159626" version="1" comment="typelib-1_0-NM-1_0 is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159173" version="1" comment="typelib-1_0-NMClient-1_0 is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159174" version="1" comment="typelib-1_0-NetworkManager-1_0 is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158923" version="1" comment="aaa_base is &lt;13.2+git20140911.61c1681-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158924" version="1" comment="aaa_base-extras is &lt;13.2+git20140911.61c1681-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158925" version="1" comment="alsa is &lt;1.0.27.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158927" version="1" comment="libasound2 is &lt;1.0.27.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158928" version="1" comment="libasound2-32bit is &lt;1.0.27.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158932" version="1" comment="apparmor-docs is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158933" version="1" comment="apparmor-parser is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158934" version="1" comment="apparmor-profiles is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158935" version="1" comment="apparmor-utils is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158936" version="1" comment="libapparmor1 is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158937" version="1" comment="libapparmor1-32bit is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158938" version="1" comment="pam_apparmor is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158939" version="1" comment="pam_apparmor-32bit is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158940" version="1" comment="perl-apparmor is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150578" version="1" comment="audiofile is &lt;0.3.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150579" version="1" comment="libaudiofile1 is &lt;0.3.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150580" version="1" comment="libaudiofile1-32bit is &lt;0.3.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158941" version="1" comment="augeas is &lt;1.2.0-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158942" version="1" comment="augeas-lenses is &lt;1.2.0-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158943" version="1" comment="libaugeas0 is &lt;1.2.0-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158944" version="1" comment="autofs is &lt;5.0.9-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155546" version="1" comment="bash is &lt;4.3-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155547" version="1" comment="bash-doc is &lt;4.3-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155548" version="1" comment="bash-lang is &lt;4.3-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155549" version="1" comment="libreadline6 is &lt;6.3-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155550" version="1" comment="libreadline6-32bit is &lt;6.3-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155551" version="1" comment="readline-doc is &lt;6.3-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157662" version="1" comment="bind-libs is &lt;9.9.9P1-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157663" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157664" version="1" comment="bind-utils is &lt;9.9.9P1-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157660" version="1" comment="clamav is &lt;0.99.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159627" version="1" comment="colord is &lt;1.3.3-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159628" version="1" comment="colord-lang is &lt;1.3.3-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158945" version="1" comment="libcolord2 is &lt;1.3.3-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158946" version="1" comment="libcolord2-32bit is &lt;1.3.3-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158947" version="1" comment="libcolorhug2 is &lt;1.3.3-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158948" version="1" comment="cpio is &lt;2.11-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158949" version="1" comment="cpio-lang is &lt;2.11-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158952" version="1" comment="cups is &lt;1.7.5-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158953" version="1" comment="cups-client is &lt;1.7.5-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158954" version="1" comment="cups-libs is &lt;1.7.5-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158955" version="1" comment="cups-libs-32bit is &lt;1.7.5-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158956" version="1" comment="cups-filters is &lt;1.0.58-17.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158957" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-17.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158958" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-17.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158959" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-17.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138209" version="1" comment="cups-pk-helper is &lt;0.2.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138210" version="1" comment="cups-pk-helper-lang is &lt;0.2.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154400" version="1" comment="curl is &lt;7.37.0-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154401" version="1" comment="libcurl4 is &lt;7.37.0-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154402" version="1" comment="libcurl4-32bit is &lt;7.37.0-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158960" version="1" comment="dbus-1 is &lt;1.8.22-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158961" version="1" comment="dbus-1-x11 is &lt;1.8.22-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158962" version="1" comment="libdbus-1-3 is &lt;1.8.22-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158963" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158964" version="1" comment="dnsmasq is &lt;2.76-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158969" version="1" comment="dracut is &lt;044-113.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159629" version="1" comment="drm-kmp-default is &lt;4.9.33_k4.4.73_5-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158971" version="1" comment="e2fsprogs is &lt;1.42.11-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158972" version="1" comment="libcom_err2 is &lt;1.42.11-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158973" version="1" comment="libcom_err2-32bit is &lt;1.42.11-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158974" version="1" comment="libext2fs2 is &lt;1.42.11-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158975" version="1" comment="emacs is &lt;24.3-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158977" version="1" comment="emacs-info is &lt;24.3-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158979" version="1" comment="emacs-x11 is &lt;24.3-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158980" version="1" comment="etags is &lt;24.3-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159630" version="1" comment="empathy is &lt;3.12.12-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159631" version="1" comment="empathy-lang is &lt;3.12.12-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159632" version="1" comment="telepathy-mission-control-plugin-goa is &lt;3.12.12-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148243" version="1" comment="expat is &lt;2.1.0-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148244" version="1" comment="libexpat1 is &lt;2.1.0-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148245" version="1" comment="libexpat1-32bit is &lt;2.1.0-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159633" version="1" comment="facter is &lt;2.4.6-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159634" version="1" comment="finch is &lt;2.12.0-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159635" version="1" comment="libpurple is &lt;2.12.0-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159636" version="1" comment="libpurple-branding-upstream is &lt;2.12.0-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159637" version="1" comment="libpurple-lang is &lt;2.12.0-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159638" version="1" comment="libpurple-plugin-sametime is &lt;2.12.0-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159639" version="1" comment="libpurple-tcl is &lt;2.12.0-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159640" version="1" comment="pidgin is &lt;2.12.0-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158992" version="1" comment="ft2demos is &lt;2.6.3-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148438" version="1" comment="gd is &lt;2.1.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148439" version="1" comment="gd-32bit is &lt;2.1.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158993" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158994" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158995" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158996" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158997" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158998" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149576" version="1" comment="gegl-0_2 is &lt;0.2.0-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149577" version="1" comment="gegl-0_2-lang is &lt;0.2.0-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149578" version="1" comment="libgegl-0_2-0 is &lt;0.2.0-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155975" version="1" comment="ghostscript is &lt;9.15-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155976" version="1" comment="ghostscript-x11 is &lt;9.15-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150803" version="1" comment="gimp is &lt;2.8.18-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150804" version="1" comment="gimp-lang is &lt;2.8.18-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150805" version="1" comment="gimp-plugins-python is &lt;2.8.18-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150806" version="1" comment="libgimp-2_0-0 is &lt;2.8.18-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150807" version="1" comment="libgimpui-2_0-0 is &lt;2.8.18-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156957" version="1" comment="glibc is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156958" version="1" comment="glibc-32bit is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156959" version="1" comment="glibc-devel is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156960" version="1" comment="glibc-devel-32bit is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156961" version="1" comment="glibc-i18ndata is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156962" version="1" comment="glibc-locale is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156963" version="1" comment="glibc-locale-32bit is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156964" version="1" comment="nscd is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159641" version="1" comment="gnome-online-accounts is &lt;3.20.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159642" version="1" comment="gnome-online-accounts-lang is &lt;3.20.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159138" version="1" comment="libgoa-1_0-0 is &lt;3.20.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159643" version="1" comment="libgoa-1_0-0-32bit is &lt;3.20.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159139" version="1" comment="libgoa-backend-1_0-1 is &lt;3.20.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159644" version="1" comment="typelib-1_0-Goa-1_0 is &lt;3.20.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158999" version="1" comment="gnome-settings-daemon is &lt;3.20.1-49.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159000" version="1" comment="gnome-settings-daemon-lang is &lt;3.20.1-49.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159001" version="1" comment="gnome-shell is &lt;3.20.4-76.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159002" version="1" comment="gnome-shell-browser-plugin is &lt;3.20.4-76.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159645" version="1" comment="gnome-shell-calendar is &lt;3.20.4-76.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159003" version="1" comment="gnome-shell-lang is &lt;3.20.4-76.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159004" version="1" comment="gnutls is &lt;3.3.27-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159006" version="1" comment="libgnutls28 is &lt;3.3.27-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159007" version="1" comment="libgnutls28-32bit is &lt;3.3.27-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159008" version="1" comment="gpg2 is &lt;2.0.24-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159009" version="1" comment="gpg2-lang is &lt;2.0.24-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159010" version="1" comment="grub2 is &lt;2.02-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159012" version="1" comment="grub2-i386-pc is &lt;2.02-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159015" version="1" comment="grub2-snapper-plugin is &lt;2.02-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159016" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159017" version="1" comment="grub2-x86_64-efi is &lt;2.02-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159018" version="1" comment="grub2-x86_64-xen is &lt;2.02-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147825" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147829" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147830" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147831" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147832" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147833" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147834" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147836" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147837" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147838" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147839" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147840" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147841" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154327" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.36-17.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154328" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-17.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154329" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.36-17.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154330" version="1" comment="libgstapp-0_10-0 is &lt;0.10.36-17.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154331" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-17.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154332" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.36-17.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154333" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-17.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147371" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.31-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147372" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.31-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150843" version="1" comment="gstreamer is &lt;1.8.3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150844" version="1" comment="gstreamer-lang is &lt;1.8.3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150845" version="1" comment="gstreamer-utils is &lt;1.8.3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150846" version="1" comment="libgstreamer-1_0-0 is &lt;1.8.3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150847" version="1" comment="libgstreamer-1_0-0-32bit is &lt;1.8.3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150848" version="1" comment="typelib-1_0-Gst-1_0 is &lt;1.8.3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150831" version="1" comment="gstreamer-plugins-bad is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150832" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150833" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150834" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150835" version="1" comment="libgstbadbase-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150836" version="1" comment="libgstbadvideo-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150837" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150838" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150839" version="1" comment="libgstgl-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150840" version="1" comment="libgstmpegts-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150841" version="1" comment="libgstphotography-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150842" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154408" version="1" comment="gstreamer-plugins-base is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154409" version="1" comment="gstreamer-plugins-base-lang is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154410" version="1" comment="libgstallocators-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154411" version="1" comment="libgstapp-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154412" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154413" version="1" comment="libgstaudio-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154414" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154415" version="1" comment="libgstfft-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154416" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154417" version="1" comment="libgstpbutils-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154418" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154419" version="1" comment="libgstriff-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154420" version="1" comment="libgstrtp-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154421" version="1" comment="libgstrtsp-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154422" version="1" comment="libgstsdp-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154423" version="1" comment="libgsttag-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154424" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154425" version="1" comment="libgstvideo-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154426" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154427" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154428" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154429" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154430" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159019" version="1" comment="gstreamer-plugins-good is &lt;1.8.3-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159020" version="1" comment="gstreamer-plugins-good-lang is &lt;1.8.3-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148134" version="1" comment="guile is &lt;2.0.9-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148135" version="1" comment="guile-modules-2_0 is &lt;2.0.9-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148136" version="1" comment="libguile-2_0-22 is &lt;2.0.9-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157587" version="1" comment="gvim is &lt;7.4.326-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157588" version="1" comment="vim is &lt;7.4.326-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157589" version="1" comment="vim-data is &lt;7.4.326-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159029" version="1" comment="hplip is &lt;3.16.11-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159030" version="1" comment="hplip-hpijs is &lt;3.16.11-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159031" version="1" comment="hplip-sane is &lt;3.16.11-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159032" version="1" comment="ibus-pinyin is &lt;1.5.0-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155970" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.141-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155971" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.141-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159646" version="1" comment="java-1_7_0-openjdk-plugin is &lt;1.6.2-2.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159647" version="1" comment="java-1_8_0-openjdk-plugin is &lt;1.6.2-2.10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156235" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.131-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156236" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.131-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159034" version="1" comment="kdump is &lt;0.8.16-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159035" version="1" comment="kernel-default is &lt;4.4.73-5.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159037" version="1" comment="kernel-default-devel is &lt;4.4.73-5.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159648" version="1" comment="kernel-default-extra is &lt;4.4.73-5.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159039" version="1" comment="kernel-devel is &lt;4.4.73-5.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159040" version="1" comment="kernel-macros is &lt;4.4.73-5.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159041" version="1" comment="kernel-source is &lt;4.4.73-5.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159042" version="1" comment="kernel-syms is &lt;4.4.73-5.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159043" version="1" comment="lftp is &lt;4.7.4-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159044" version="1" comment="libQt5Concurrent5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159045" version="1" comment="libQt5Core5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159046" version="1" comment="libQt5DBus5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159047" version="1" comment="libQt5Gui5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159048" version="1" comment="libQt5Network5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159049" version="1" comment="libQt5OpenGL5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159050" version="1" comment="libQt5PrintSupport5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159051" version="1" comment="libQt5Sql5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159052" version="1" comment="libQt5Sql5-mysql is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159053" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159054" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159055" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159056" version="1" comment="libQt5Test5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159057" version="1" comment="libQt5Widgets5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159058" version="1" comment="libQt5Xml5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159059" version="1" comment="libQt5WebKit5 is &lt;5.6.2-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159060" version="1" comment="libQt5WebKit5-imports is &lt;5.6.2-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159061" version="1" comment="libQt5WebKitWidgets5 is &lt;5.6.2-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136381" version="1" comment="libX11-6 is &lt;1.6.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136382" version="1" comment="libX11-6-32bit is &lt;1.6.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136383" version="1" comment="libX11-data is &lt;1.6.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136384" version="1" comment="libX11-xcb1 is &lt;1.6.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136385" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135061" version="1" comment="libXfixes3 is &lt;5.0.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135062" version="1" comment="libXfixes3-32bit is &lt;5.0.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136640" version="1" comment="libXi6 is &lt;1.7.4-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136641" version="1" comment="libXi6-32bit is &lt;1.7.4-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148436" version="1" comment="libXpm4 is &lt;3.5.11-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148437" version="1" comment="libXpm4-32bit is &lt;3.5.11-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135553" version="1" comment="libXrender1 is &lt;0.9.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135554" version="1" comment="libXrender1-32bit is &lt;0.9.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135081" version="1" comment="libXtst6 is &lt;1.2.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135082" version="1" comment="libXtst6-32bit is &lt;1.2.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135086" version="1" comment="libXv1 is &lt;1.0.10-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135087" version="1" comment="libXv1-32bit is &lt;1.0.10-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135556" version="1" comment="libXvMC1 is &lt;1.0.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154696" version="1" comment="libXvnc1 is &lt;1.6.0-18.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154697" version="1" comment="tigervnc is &lt;1.6.0-18.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154698" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-18.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135964" version="1" comment="libarchive13 is &lt;3.1.2-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159062" version="1" comment="libasan2 is &lt;5.3.1+r233831-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159063" version="1" comment="libasan2-32bit is &lt;5.3.1+r233831-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159064" version="1" comment="libffi4 is &lt;5.3.1+r233831-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159065" version="1" comment="libffi4-32bit is &lt;5.3.1+r233831-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159066" version="1" comment="libmpx0 is &lt;5.3.1+r233831-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159067" version="1" comment="libmpx0-32bit is &lt;5.3.1+r233831-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159068" version="1" comment="libmpxwrappers0 is &lt;5.3.1+r233831-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159069" version="1" comment="libmpxwrappers0-32bit is &lt;5.3.1+r233831-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142721" version="1" comment="libass5 is &lt;0.10.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159070" version="1" comment="libblkid1 is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159071" version="1" comment="libblkid1-32bit is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159072" version="1" comment="libfdisk1 is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159073" version="1" comment="libmount1 is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159074" version="1" comment="libmount1-32bit is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159075" version="1" comment="libsmartcols1 is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159649" version="1" comment="libuuid-devel is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159076" version="1" comment="libuuid1 is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159077" version="1" comment="libuuid1-32bit is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159078" version="1" comment="python-libmount is &lt;2.29.2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159079" version="1" comment="util-linux is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159080" version="1" comment="util-linux-lang is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159081" version="1" comment="util-linux-systemd is &lt;2.29.2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159082" version="1" comment="uuidd is &lt;2.29.2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157339" version="1" comment="libcairo-gobject2 is &lt;1.15.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157340" version="1" comment="libcairo-gobject2-32bit is &lt;1.15.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157341" version="1" comment="libcairo-script-interpreter2 is &lt;1.15.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157342" version="1" comment="libcairo2 is &lt;1.15.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157343" version="1" comment="libcairo2-32bit is &lt;1.15.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146003" version="1" comment="libcares2 is &lt;1.9.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146004" version="1" comment="libcares2-32bit is &lt;1.9.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159084" version="1" comment="libcgroup1 is &lt;0.41.rc1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159085" version="1" comment="libdcerpc-binding0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159086" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159087" version="1" comment="libdcerpc0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159088" version="1" comment="libdcerpc0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159089" version="1" comment="libndr-krb5pac0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159090" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159091" version="1" comment="libndr-nbt0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159092" version="1" comment="libndr-nbt0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159093" version="1" comment="libndr-standard0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159094" version="1" comment="libndr-standard0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159095" version="1" comment="libndr0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159096" version="1" comment="libndr0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159097" version="1" comment="libnetapi0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159098" version="1" comment="libnetapi0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159099" version="1" comment="libsamba-credentials0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159100" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159101" version="1" comment="libsamba-errors0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159102" version="1" comment="libsamba-errors0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159103" version="1" comment="libsamba-hostconfig0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159104" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159105" version="1" comment="libsamba-passdb0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159106" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159107" version="1" comment="libsamba-util0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159108" version="1" comment="libsamba-util0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159109" version="1" comment="libsamdb0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159110" version="1" comment="libsamdb0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159111" version="1" comment="libsmbclient0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159112" version="1" comment="libsmbclient0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159113" version="1" comment="libsmbconf0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159114" version="1" comment="libsmbconf0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159115" version="1" comment="libsmbldap0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159116" version="1" comment="libsmbldap0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159117" version="1" comment="libtevent-util0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159118" version="1" comment="libtevent-util0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159119" version="1" comment="libwbclient0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159120" version="1" comment="libwbclient0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159121" version="1" comment="samba is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159122" version="1" comment="samba-client is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159123" version="1" comment="samba-client-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159124" version="1" comment="samba-doc is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159125" version="1" comment="samba-libs is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159126" version="1" comment="samba-libs-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159127" version="1" comment="samba-winbind is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159128" version="1" comment="samba-winbind-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159129" version="1" comment="libecpg6 is &lt;9.6.3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159130" version="1" comment="libpq5 is &lt;9.6.3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159131" version="1" comment="libpq5-32bit is &lt;9.6.3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159132" version="1" comment="postgresql96 is &lt;9.6.3-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154924" version="1" comment="libfbembed2_5 is &lt;2.5.2.26539-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155316" version="1" comment="libfreebl3 is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155317" version="1" comment="libfreebl3-32bit is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155318" version="1" comment="libsoftokn3 is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155319" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155322" version="1" comment="mozilla-nss is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155323" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155324" version="1" comment="mozilla-nss-certs is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155325" version="1" comment="mozilla-nss-certs-32bit is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155326" version="1" comment="mozilla-nss-sysinit is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155327" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155328" version="1" comment="mozilla-nss-tools is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159136" version="1" comment="libfreetype6 is &lt;2.6.3-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159137" version="1" comment="libfreetype6-32bit is &lt;2.6.3-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136646" version="1" comment="libgc1 is &lt;7.2d-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156955" version="1" comment="libgcrypt20 is &lt;1.6.1-16.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156956" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145377" version="1" comment="libgme0 is &lt;0.6.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154911" version="1" comment="libgraphite2-3 is &lt;1.3.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154912" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156348" version="1" comment="libhogweed2 is &lt;2.7.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156349" version="1" comment="libhogweed2-32bit is &lt;2.7.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156351" version="1" comment="libnettle4 is &lt;2.7.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156352" version="1" comment="libnettle4-32bit is &lt;2.7.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159140" version="1" comment="libipa_hbac0 is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159141" version="1" comment="libsss_idmap0 is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159142" version="1" comment="libsss_nss_idmap0 is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159143" version="1" comment="libsss_sudo is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159144" version="1" comment="python-sssd-config is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159145" version="1" comment="sssd is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159146" version="1" comment="sssd-32bit is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159147" version="1" comment="sssd-ad is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159148" version="1" comment="sssd-ipa is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159149" version="1" comment="sssd-krb5 is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159150" version="1" comment="sssd-krb5-common is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159151" version="1" comment="sssd-ldap is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159152" version="1" comment="sssd-proxy is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159153" version="1" comment="sssd-tools is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150812" version="1" comment="libjasper1 is &lt;1.900.14-194.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150813" version="1" comment="libjasper1-32bit is &lt;1.900.14-194.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155614" version="1" comment="libkde4 is &lt;4.12.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155615" version="1" comment="libkde4-32bit is &lt;4.12.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155616" version="1" comment="libkdecore4 is &lt;4.12.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155617" version="1" comment="libkdecore4-32bit is &lt;4.12.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155618" version="1" comment="libksuseinstall1 is &lt;4.12.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155619" version="1" comment="libksuseinstall1-32bit is &lt;4.12.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156765" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156766" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156768" version="1" comment="openldap2-client is &lt;2.4.41-18.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159154" version="1" comment="libldb1 is &lt;1.1.29-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159155" version="1" comment="libldb1-32bit is &lt;1.1.29-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159156" version="1" comment="libltdl7 is &lt;2.4.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159157" version="1" comment="libltdl7-32bit is &lt;2.4.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159160" version="1" comment="liblua5_2 is &lt;5.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159162" version="1" comment="lua is &lt;5.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159163" version="1" comment="libmysqlclient18 is &lt;10.0.30-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159164" version="1" comment="libmysqlclient18-32bit is &lt;10.0.30-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159650" version="1" comment="libmysqlclient_r18 is &lt;10.0.30-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159651" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.30-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159165" version="1" comment="mariadb is &lt;10.0.30-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159166" version="1" comment="mariadb-client is &lt;10.0.30-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159167" version="1" comment="mariadb-errormessages is &lt;10.0.30-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139268" version="1" comment="libnetpbm11 is &lt;10.66.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156953" version="1" comment="libnetpbm11-32bit is &lt;10.66.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139269" version="1" comment="netpbm is &lt;10.66.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145907" version="1" comment="libopenjp2-7 is &lt;2.1.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148318" version="1" comment="libopenssl-devel is &lt;1.0.2j-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148319" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148320" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148321" version="1" comment="openssl is &lt;1.0.2j-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149123" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149124" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148261" version="1" comment="libopus0 is &lt;1.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155050" version="1" comment="libosip2 is &lt;3.5.0-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143034" version="1" comment="libpcre1 is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143035" version="1" comment="libpcre1-32bit is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143036" version="1" comment="libpcre16-0 is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143037" version="1" comment="libpcrecpp0 is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143038" version="1" comment="libpcrecpp0-32bit is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147770" version="1" comment="libpcsclite1 is &lt;1.8.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147771" version="1" comment="libpcsclite1-32bit is &lt;1.8.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147772" version="1" comment="pcsc-lite is &lt;1.8.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155695" version="1" comment="libplist++3 is &lt;1.12-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155696" version="1" comment="libplist3 is &lt;1.12-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149999" version="1" comment="libpng12-0 is &lt;1.2.50-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150000" version="1" comment="libpng12-0-32bit is &lt;1.2.50-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150810" version="1" comment="libpng15-15 is &lt;1.5.22-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149948" version="1" comment="libpng16-16 is &lt;1.6.8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149949" version="1" comment="libpng16-16-32bit is &lt;1.6.8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159175" version="1" comment="libpulse-mainloop-glib0 is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159176" version="1" comment="libpulse-mainloop-glib0-32bit is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159177" version="1" comment="libpulse0 is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159178" version="1" comment="libpulse0-32bit is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159179" version="1" comment="pulseaudio is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159180" version="1" comment="pulseaudio-esound-compat is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159181" version="1" comment="pulseaudio-gdm-hooks is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159182" version="1" comment="pulseaudio-lang is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159652" version="1" comment="pulseaudio-module-bluetooth is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159653" version="1" comment="pulseaudio-module-gconf is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159654" version="1" comment="pulseaudio-module-jack is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159655" version="1" comment="pulseaudio-module-lirc is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159183" version="1" comment="pulseaudio-module-x11 is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159184" version="1" comment="pulseaudio-module-zeroconf is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159185" version="1" comment="pulseaudio-utils is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159186" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159187" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159188" version="1" comment="python-base is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159656" version="1" comment="python-devel is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159190" version="1" comment="python-xml is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159191" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159192" version="1" comment="python3-base is &lt;3.4.6-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149137" version="1" comment="libquicktime0 is &lt;1.2.4-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159657" version="1" comment="libreoffice is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159658" version="1" comment="libreoffice-base is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159659" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159660" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159661" version="1" comment="libreoffice-calc is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159662" version="1" comment="libreoffice-calc-extensions is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159663" version="1" comment="libreoffice-draw is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159664" version="1" comment="libreoffice-filters-optional is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159665" version="1" comment="libreoffice-gnome is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159666" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159667" version="1" comment="libreoffice-icon-theme-tango is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159668" version="1" comment="libreoffice-impress is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159669" version="1" comment="libreoffice-l10n-af is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159670" version="1" comment="libreoffice-l10n-ar is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159671" version="1" comment="libreoffice-l10n-ca is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159672" version="1" comment="libreoffice-l10n-cs is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159673" version="1" comment="libreoffice-l10n-da is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159674" version="1" comment="libreoffice-l10n-de is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159675" version="1" comment="libreoffice-l10n-en is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159676" version="1" comment="libreoffice-l10n-es is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159677" version="1" comment="libreoffice-l10n-fi is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159678" version="1" comment="libreoffice-l10n-fr is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159679" version="1" comment="libreoffice-l10n-gu is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159680" version="1" comment="libreoffice-l10n-hi is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159681" version="1" comment="libreoffice-l10n-hu is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159682" version="1" comment="libreoffice-l10n-it is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159683" version="1" comment="libreoffice-l10n-ja is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159684" version="1" comment="libreoffice-l10n-ko is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159685" version="1" comment="libreoffice-l10n-nb is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159686" version="1" comment="libreoffice-l10n-nl is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159687" version="1" comment="libreoffice-l10n-nn is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159688" version="1" comment="libreoffice-l10n-pl is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159689" version="1" comment="libreoffice-l10n-pt_BR is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159690" version="1" comment="libreoffice-l10n-pt_PT is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159691" version="1" comment="libreoffice-l10n-ro is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159692" version="1" comment="libreoffice-l10n-ru is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159693" version="1" comment="libreoffice-l10n-sk is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159694" version="1" comment="libreoffice-l10n-sv is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159695" version="1" comment="libreoffice-l10n-xh is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159696" version="1" comment="libreoffice-l10n-zh_CN is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159697" version="1" comment="libreoffice-l10n-zh_TW is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159698" version="1" comment="libreoffice-l10n-zu is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159699" version="1" comment="libreoffice-mailmerge is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159700" version="1" comment="libreoffice-math is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159701" version="1" comment="libreoffice-officebean is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159702" version="1" comment="libreoffice-pyuno is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159703" version="1" comment="libreoffice-writer is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159704" version="1" comment="libreoffice-writer-extensions is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159705" version="1" comment="libreofficekit is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159193" version="1" comment="libruby2_1-2_1 is &lt;2.1.9-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159194" version="1" comment="ruby2.1 is &lt;2.1.9-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159195" version="1" comment="ruby2.1-stdlib is &lt;2.1.9-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155684" version="1" comment="libsndfile1 is &lt;1.0.25-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155685" version="1" comment="libsndfile1-32bit is &lt;1.0.25-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159196" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.33-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159197" version="1" comment="libspice-client-glib-helper is &lt;0.33-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159198" version="1" comment="libspice-client-gtk-3_0-5 is &lt;0.33-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159199" version="1" comment="libspice-controller0 is &lt;0.33-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159200" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.33-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159201" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.33-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159202" version="1" comment="libspice-server1 is &lt;0.12.8-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159203" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159204" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159205" version="1" comment="sqlite3 is &lt;3.8.10.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159206" version="1" comment="libsystemd0 is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159207" version="1" comment="libsystemd0-32bit is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159208" version="1" comment="libudev1 is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159209" version="1" comment="libudev1-32bit is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159210" version="1" comment="systemd is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159211" version="1" comment="systemd-32bit is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159212" version="1" comment="systemd-bash-completion is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159213" version="1" comment="systemd-sysvinit is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159214" version="1" comment="udev is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159215" version="1" comment="libtasn1 is &lt;4.9-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159216" version="1" comment="libtasn1-6 is &lt;4.9-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159217" version="1" comment="libtasn1-6-32bit is &lt;4.9-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154403" version="1" comment="libtiff5 is &lt;4.0.7-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154404" version="1" comment="libtiff5-32bit is &lt;4.0.7-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155553" version="1" comment="libtirpc-netconfig is &lt;1.0.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155554" version="1" comment="libtirpc3 is &lt;1.0.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155555" version="1" comment="libtirpc3-32bit is &lt;1.0.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149816" version="1" comment="libvirglrenderer0 is &lt;0.5.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159218" version="1" comment="libvirt is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159219" version="1" comment="libvirt-admin is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159220" version="1" comment="libvirt-client is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159221" version="1" comment="libvirt-daemon is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159222" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159223" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159224" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159225" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159226" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159227" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159228" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159229" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159230" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159231" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159232" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159233" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159234" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159235" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159236" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159237" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159238" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159239" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159240" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159241" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159242" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159243" version="1" comment="libvirt-doc is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159244" version="1" comment="libvirt-libs is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159247" version="1" comment="libvmtools0 is &lt;10.1.5-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159248" version="1" comment="open-vm-tools is &lt;10.1.5-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159249" version="1" comment="open-vm-tools-desktop is &lt;10.1.5-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157263" version="1" comment="libwireshark8 is &lt;2.2.7-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157264" version="1" comment="libwiretap6 is &lt;2.2.7-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157265" version="1" comment="libwscodecs1 is &lt;2.2.7-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157266" version="1" comment="libwsutil7 is &lt;2.2.7-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157267" version="1" comment="wireshark is &lt;2.2.7-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157268" version="1" comment="wireshark-gtk is &lt;2.2.7-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157768" version="1" comment="libxml2-2 is &lt;2.9.4-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157769" version="1" comment="libxml2-2-32bit is &lt;2.9.4-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157770" version="1" comment="libxml2-tools is &lt;2.9.4-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155536" version="1" comment="libxslt-tools is &lt;1.1.28-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155537" version="1" comment="libxslt1 is &lt;1.1.28-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155538" version="1" comment="libxslt1-32bit is &lt;1.1.28-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146180" version="1" comment="libz1 is &lt;1.2.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146181" version="1" comment="libz1-32bit is &lt;1.2.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512005" version="1" comment="zlib-devel is &lt;1.2.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159706" version="1" comment="libzmq3 is &lt;4.0.4-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154700" version="1" comment="libzzip-0-13 is &lt;0.13.62-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159250" version="1" comment="logrotate is &lt;3.11.0-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154609" version="1" comment="minicom is &lt;2.7-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155320" version="1" comment="mozilla-nspr is &lt;4.13.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155321" version="1" comment="mozilla-nspr-32bit is &lt;4.13.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159252" version="1" comment="ntp is &lt;4.2.8p10-63.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159253" version="1" comment="ntp-doc is &lt;4.2.8p10-63.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131298" version="1" comment="openslp is &lt;2.0.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131299" version="1" comment="openslp-32bit is &lt;2.0.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159254" version="1" comment="openssh is &lt;7.2p2-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159256" version="1" comment="openssh-helpers is &lt;7.2p2-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157217" version="1" comment="openvpn is &lt;2.3.8-16.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155972" version="1" comment="pam is &lt;1.1.8-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155973" version="1" comment="pam-32bit is &lt;1.1.8-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155974" version="1" comment="pam-doc is &lt;1.1.8-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159258" version="1" comment="pcsc-ccid is &lt;1.4.25-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159707" version="1" comment="pidgin-plugin-otr is &lt;4.0.2-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148440" version="1" comment="ppp is &lt;2.4.7-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159708" version="1" comment="puppet is &lt;3.8.5-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159263" version="1" comment="python is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159265" version="1" comment="python-curses is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159269" version="1" comment="python-tk is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157771" version="1" comment="python-libxml2 is &lt;2.9.4-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159273" version="1" comment="python-requests is &lt;2.8.1-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159274" version="1" comment="python3 is &lt;3.4.6-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159275" version="1" comment="python3-curses is &lt;3.4.6-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159276" version="1" comment="qemu is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159278" version="1" comment="qemu-block-curl is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159282" version="1" comment="qemu-ipxe is &lt;1.0.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159283" version="1" comment="qemu-kvm is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159287" version="1" comment="qemu-seabios is &lt;1.10.2-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159288" version="1" comment="qemu-sgabios is &lt;8-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159289" version="1" comment="qemu-tools is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159290" version="1" comment="qemu-vgabios is &lt;1.10.2-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159291" version="1" comment="qemu-x86 is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155620" version="1" comment="rpcbind is &lt;0.2.3-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146857" version="1" comment="rrdtool is &lt;1.4.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146858" version="1" comment="rrdtool-cached is &lt;1.4.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159295" version="1" comment="rsyslog is &lt;8.24.0-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149621" version="1" comment="sane-backends is &lt;1.0.24-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149622" version="1" comment="sane-backends-32bit is &lt;1.0.24-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149623" version="1" comment="sane-backends-autoconfig is &lt;1.0.24-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159305" version="1" comment="sblim-sfcb is &lt;1.4.8-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159306" version="1" comment="shim is &lt;0.9-23.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156341" version="1" comment="strongswan is &lt;5.1.3-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156342" version="1" comment="strongswan-doc is &lt;5.1.3-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156343" version="1" comment="strongswan-ipsec is &lt;5.1.3-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156344" version="1" comment="strongswan-libs0 is &lt;5.1.3-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159307" version="1" comment="sudo is &lt;1.8.20p2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159308" version="1" comment="supportutils is &lt;3.0-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159312" version="1" comment="sysvinit-tools is &lt;2.88+-99.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159313" version="1" comment="tar is &lt;1.27.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159314" version="1" comment="tar-lang is &lt;1.27.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154731" version="1" comment="tcpdump is &lt;4.9.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157766" version="1" comment="unrar is &lt;5.0.14-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136644" version="1" comment="w3m is &lt;0.5.3.git20161120-160.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149815" version="1" comment="wget is &lt;1.14-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159317" version="1" comment="xen is &lt;4.9.0_08-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159319" version="1" comment="xen-libs is &lt;4.9.0_08-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159320" version="1" comment="xen-libs-32bit is &lt;4.9.0_08-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159323" version="1" comment="xf86-video-intel is &lt;2.99.917.770_gcb6ba2da-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159324" version="1" comment="xfsprogs is &lt;4.3.0-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157352" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157353" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159325" version="1" comment="yast2 is &lt;3.2.36-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159326" version="1" comment="yast2-core is &lt;3.2.2-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159327" version="1" comment="yast2-users is &lt;3.2.11-1.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239879" version="1" comment="sled-release is ==12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009066428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512006" version="1" comment="ImageMagick is &lt;6.8.8.1-71.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512007" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512008" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512009" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512010" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512011" version="1" comment="MozillaFirefox is &lt;52.9.0esr-109.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512012" version="1" comment="MozillaFirefox-translations is &lt;52.9.0esr-109.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512013" version="1" comment="NetworkManager is &lt;1.0.12-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512014" version="1" comment="NetworkManager-lang is &lt;1.0.12-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512015" version="1" comment="libnm-glib-vpn1 is &lt;1.0.12-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512016" version="1" comment="libnm-glib4 is &lt;1.0.12-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512017" version="1" comment="libnm-util2 is &lt;1.0.12-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512018" version="1" comment="libnm0 is &lt;1.0.12-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512019" version="1" comment="typelib-1_0-NM-1_0 is &lt;1.0.12-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512020" version="1" comment="typelib-1_0-NMClient-1_0 is &lt;1.0.12-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512021" version="1" comment="typelib-1_0-NetworkManager-1_0 is &lt;1.0.12-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512022" version="1" comment="SuSEfirewall2 is &lt;3.6.312.333-3.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512023" version="1" comment="aaa_base is &lt;13.2+git20140911.61c1681-38.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512024" version="1" comment="aaa_base-extras is &lt;13.2+git20140911.61c1681-38.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512025" version="1" comment="accountsservice is &lt;0.6.42-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512026" version="1" comment="accountsservice-lang is &lt;0.6.42-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512027" version="1" comment="libaccountsservice0 is &lt;0.6.42-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512028" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.42-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512029" version="1" comment="at is &lt;3.1.14-8.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512030" version="1" comment="libQtWebKit4 is &lt;4.8.7+2.3.4-4.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512031" version="1" comment="libQtWebKit4-32bit is &lt;4.8.7+2.3.4-4.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172798" version="1" comment="augeas is &lt;1.2.0-17.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172799" version="1" comment="augeas-lenses is &lt;1.2.0-17.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172800" version="1" comment="libaugeas0 is &lt;1.2.0-17.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512032" version="1" comment="autofs is &lt;5.0.9-28.3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512033" version="1" comment="bash is &lt;4.3-83.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512034" version="1" comment="bash-doc is &lt;4.3-83.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512035" version="1" comment="bash-lang is &lt;4.3-83.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512036" version="1" comment="libreadline6 is &lt;6.3-83.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512037" version="1" comment="libreadline6-32bit is &lt;6.3-83.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512038" version="1" comment="readline-doc is &lt;6.3-83.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512039" version="1" comment="bind-utils is &lt;9.11.2-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512040" version="1" comment="libbind9-160 is &lt;9.11.2-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512041" version="1" comment="libdns169 is &lt;9.11.2-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512042" version="1" comment="libirs160 is &lt;9.11.2-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512043" version="1" comment="libisc166 is &lt;9.11.2-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512044" version="1" comment="libisc166-32bit is &lt;9.11.2-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512045" version="1" comment="libisccc160 is &lt;9.11.2-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512046" version="1" comment="libisccfg160 is &lt;9.11.2-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512047" version="1" comment="liblwres160 is &lt;9.11.2-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512048" version="1" comment="python-bind is &lt;9.11.2-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512049" version="1" comment="binutils is &lt;2.31-9.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512050" version="1" comment="bluez is &lt;5.13-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512051" version="1" comment="bluez-cups is &lt;5.13-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512052" version="1" comment="libbluetooth3 is &lt;5.13-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512053" version="1" comment="ceph-common is &lt;12.2.8+git.1536505967.080f2248ff-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512054" version="1" comment="libcephfs2 is &lt;12.2.8+git.1536505967.080f2248ff-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512055" version="1" comment="librados2 is &lt;12.2.8+git.1536505967.080f2248ff-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512056" version="1" comment="libradosstriper1 is &lt;12.2.8+git.1536505967.080f2248ff-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512057" version="1" comment="librbd1 is &lt;12.2.8+git.1536505967.080f2248ff-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512058" version="1" comment="librgw2 is &lt;12.2.8+git.1536505967.080f2248ff-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512059" version="1" comment="python-cephfs is &lt;12.2.8+git.1536505967.080f2248ff-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512060" version="1" comment="python-rados is &lt;12.2.8+git.1536505967.080f2248ff-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512061" version="1" comment="python-rbd is &lt;12.2.8+git.1536505967.080f2248ff-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512062" version="1" comment="python-rgw is &lt;12.2.8+git.1536505967.080f2248ff-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512063" version="1" comment="cifs-utils is &lt;6.5-9.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512064" version="1" comment="clamav is &lt;0.100.2-33.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512065" version="1" comment="coolkey is &lt;1.1.0-148.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512066" version="1" comment="coreutils is &lt;8.25-13.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512067" version="1" comment="coreutils-lang is &lt;8.25-13.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512068" version="1" comment="cpio is &lt;2.11-36.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512069" version="1" comment="cpio-lang is &lt;2.11-36.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512070" version="1" comment="cpp48 is &lt;4.8.5-31.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512071" version="1" comment="gcc48 is &lt;4.8.5-31.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512072" version="1" comment="gcc48-32bit is &lt;4.8.5-31.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512073" version="1" comment="gcc48-c++ is &lt;4.8.5-31.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512074" version="1" comment="gcc48-gij is &lt;4.8.5-31.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512075" version="1" comment="gcc48-gij-32bit is &lt;4.8.5-31.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512076" version="1" comment="gcc48-info is &lt;4.8.5-31.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512077" version="1" comment="libasan0 is &lt;4.8.5-31.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512078" version="1" comment="libasan0-32bit is &lt;4.8.5-31.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512079" version="1" comment="libgcj48 is &lt;4.8.5-31.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512080" version="1" comment="libgcj48-32bit is &lt;4.8.5-31.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512081" version="1" comment="libgcj48-jar is &lt;4.8.5-31.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512082" version="1" comment="libgcj_bc1 is &lt;4.8.5-31.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512083" version="1" comment="libstdc++48-devel is &lt;4.8.5-31.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512084" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-31.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512085" version="1" comment="cups is &lt;1.7.5-20.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512086" version="1" comment="cups-client is &lt;1.7.5-20.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512087" version="1" comment="cups-libs is &lt;1.7.5-20.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512088" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512089" version="1" comment="cups-filters is &lt;1.0.58-19.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512090" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-19.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512091" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-19.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512092" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-19.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512093" version="1" comment="curl is &lt;7.60.0-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512094" version="1" comment="libcurl4 is &lt;7.60.0-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512095" version="1" comment="libcurl4-32bit is &lt;7.60.0-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163575" version="1" comment="cvs is &lt;1.12.12-182.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512096" version="1" comment="cyrus-sasl is &lt;2.1.26-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512097" version="1" comment="cyrus-sasl-32bit is &lt;2.1.26-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512098" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512099" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.26-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512100" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512101" version="1" comment="cyrus-sasl-digestmd5-32bit is &lt;2.1.26-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512102" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512103" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.26-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512104" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512105" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.26-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512106" version="1" comment="cyrus-sasl-saslauthd is &lt;2.1.26-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512107" version="1" comment="libsasl2-3 is &lt;2.1.26-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512108" version="1" comment="libsasl2-3-32bit is &lt;2.1.26-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512109" version="1" comment="dbus-1 is &lt;1.8.22-29.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512110" version="1" comment="dbus-1-x11 is &lt;1.8.22-29.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512111" version="1" comment="libdbus-1-3 is &lt;1.8.22-29.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512112" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-29.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173784" version="1" comment="dhcp is &lt;4.3.3-10.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173785" version="1" comment="dhcp-client is &lt;4.3.3-10.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164846" version="1" comment="dnsmasq is &lt;2.78-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512113" version="1" comment="dracut is &lt;044.1-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512114" version="1" comment="e2fsprogs is &lt;1.43.8-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512115" version="1" comment="libcom_err2 is &lt;1.43.8-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512116" version="1" comment="libcom_err2-32bit is &lt;1.43.8-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512117" version="1" comment="libext2fs2 is &lt;1.43.8-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170839" version="1" comment="ecryptfs-utils is &lt;103-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170840" version="1" comment="ecryptfs-utils-32bit is &lt;103-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106104" version="1" comment="libelf-devel is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164489" version="1" comment="emacs is &lt;24.3-25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164490" version="1" comment="emacs-info is &lt;24.3-25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164491" version="1" comment="emacs-x11 is &lt;24.3-25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164492" version="1" comment="etags is &lt;24.3-25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512118" version="1" comment="empathy is &lt;3.12.13-8.3.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512119" version="1" comment="empathy-lang is &lt;3.12.13-8.3.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512120" version="1" comment="telepathy-mission-control-plugin-goa is &lt;3.12.13-8.3.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174438" version="1" comment="evince is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174439" version="1" comment="evince-browser-plugin is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174440" version="1" comment="evince-lang is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174441" version="1" comment="evince-plugin-djvudocument is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174442" version="1" comment="evince-plugin-dvidocument is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174443" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174444" version="1" comment="evince-plugin-psdocument is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174445" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174446" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174447" version="1" comment="libevdocument3-4 is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174448" version="1" comment="libevview3-3 is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174449" version="1" comment="nautilus-evince is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174450" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174451" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162480" version="1" comment="expat is &lt;2.1.0-21.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162481" version="1" comment="libexpat1 is &lt;2.1.0-21.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162482" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512121" version="1" comment="facter is &lt;2.4.6-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512122" version="1" comment="file is &lt;5.22-10.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512123" version="1" comment="file-magic is &lt;5.22-10.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512124" version="1" comment="libmagic1 is &lt;5.22-10.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512125" version="1" comment="libmagic1-32bit is &lt;5.22-10.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512126" version="1" comment="finch is &lt;2.12.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512127" version="1" comment="libpurple is &lt;2.12.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512128" version="1" comment="libpurple-branding-upstream is &lt;2.12.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512129" version="1" comment="libpurple-lang is &lt;2.12.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512130" version="1" comment="libpurple-plugin-sametime is &lt;2.12.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512131" version="1" comment="libpurple-tcl is &lt;2.12.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512132" version="1" comment="pidgin is &lt;2.12.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162218" version="1" comment="freerdp is &lt;2.0.0~git.1463131968.4e66df7-12.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162219" version="1" comment="libfreerdp2 is &lt;2.0.0~git.1463131968.4e66df7-12.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171102" version="1" comment="ft2demos is &lt;2.6.3-7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512133" version="1" comment="fuse is &lt;2.9.3-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512134" version="1" comment="libfuse2 is &lt;2.9.3-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512135" version="1" comment="g3utils is &lt;1.1.36-58.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512136" version="1" comment="mgetty is &lt;1.1.36-58.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512137" version="1" comment="gd is &lt;2.1.0-24.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512138" version="1" comment="gd-32bit is &lt;2.1.0-24.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512139" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-19.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512140" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-19.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512141" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-19.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512142" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-19.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512143" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-19.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512144" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-19.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175785" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.20-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175787" version="1" comment="librsvg-2-2 is &lt;2.40.20-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175788" version="1" comment="librsvg-2-2-32bit is &lt;2.40.20-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175789" version="1" comment="rsvg-view is &lt;2.40.20-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512145" version="1" comment="gdm is &lt;3.10.0.1-54.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512146" version="1" comment="gdm-lang is &lt;3.10.0.1-54.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512147" version="1" comment="gdmflexiserver is &lt;3.10.0.1-54.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512148" version="1" comment="libgdm1 is &lt;3.10.0.1-54.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512149" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-54.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512150" version="1" comment="ghostscript is &lt;9.25-23.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512151" version="1" comment="ghostscript-x11 is &lt;9.25-23.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167012" version="1" comment="gimp is &lt;2.8.18-9.3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167013" version="1" comment="gimp-lang is &lt;2.8.18-9.3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167014" version="1" comment="gimp-plugins-python is &lt;2.8.18-9.3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167015" version="1" comment="libgimp-2_0-0 is &lt;2.8.18-9.3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167016" version="1" comment="libgimpui-2_0-0 is &lt;2.8.18-9.3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512152" version="1" comment="glibc is &lt;2.22-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512153" version="1" comment="glibc-32bit is &lt;2.22-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512154" version="1" comment="glibc-devel is &lt;2.22-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512155" version="1" comment="glibc-devel-32bit is &lt;2.22-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512156" version="1" comment="glibc-i18ndata is &lt;2.22-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512157" version="1" comment="glibc-locale is &lt;2.22-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512158" version="1" comment="glibc-locale-32bit is &lt;2.22-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512159" version="1" comment="nscd is &lt;2.22-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512160" version="1" comment="gnome-keyring is &lt;3.20.0-28.3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512161" version="1" comment="gnome-keyring-32bit is &lt;3.20.0-28.3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512162" version="1" comment="gnome-keyring-lang is &lt;3.20.0-28.3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512163" version="1" comment="gnome-keyring-pam is &lt;3.20.0-28.3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512164" version="1" comment="gnome-keyring-pam-32bit is &lt;3.20.0-28.3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512165" version="1" comment="libgck-modules-gnome-keyring is &lt;3.20.0-28.3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512166" version="1" comment="gnome-settings-daemon is &lt;3.20.1-50.5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512167" version="1" comment="gnome-settings-daemon-lang is &lt;3.20.1-50.5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512168" version="1" comment="gnome-shell is &lt;3.20.4-77.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512169" version="1" comment="gnome-shell-browser-plugin is &lt;3.20.4-77.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512170" version="1" comment="gnome-shell-calendar is &lt;3.20.4-77.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512171" version="1" comment="gnome-shell-lang is &lt;3.20.4-77.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512172" version="1" comment="gnome-shell-search-provider-nautilus is &lt;3.20.3-23.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512173" version="1" comment="libnautilus-extension1 is &lt;3.20.3-23.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512174" version="1" comment="libnautilus-extension1-32bit is &lt;3.20.3-23.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512175" version="1" comment="nautilus is &lt;3.20.3-23.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512176" version="1" comment="nautilus-lang is &lt;3.20.3-23.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512177" version="1" comment="gnutls is &lt;3.3.27-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512178" version="1" comment="libgnutls28 is &lt;3.3.27-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512179" version="1" comment="libgnutls28-32bit is &lt;3.3.27-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512180" version="1" comment="gpg2 is &lt;2.0.24-9.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512181" version="1" comment="gpg2-lang is &lt;2.0.24-9.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512182" version="1" comment="grub2 is &lt;2.02-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512183" version="1" comment="grub2-i386-pc is &lt;2.02-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512184" version="1" comment="grub2-snapper-plugin is &lt;2.02-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512185" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512186" version="1" comment="grub2-x86_64-efi is &lt;2.02-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512187" version="1" comment="grub2-x86_64-xen is &lt;2.02-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169499" version="1" comment="gwenhywfar-lang is &lt;4.9.0beta-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169500" version="1" comment="gwenhywfar-tools is &lt;4.9.0beta-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169501" version="1" comment="libgwengui-gtk2-0 is &lt;4.9.0beta-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169502" version="1" comment="libgwenhywfar60 is &lt;4.9.0beta-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169503" version="1" comment="libgwenhywfar60-plugins is &lt;4.9.0beta-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512188" version="1" comment="gzip is &lt;1.6-9.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512189" version="1" comment="hyper-v is &lt;7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177510" version="1" comment="icu is &lt;52.1-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177511" version="1" comment="libicu52_1 is &lt;52.1-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177512" version="1" comment="libicu52_1-32bit is &lt;52.1-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177513" version="1" comment="libicu52_1-data is &lt;52.1-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512190" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.181-43.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512191" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.181-43.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512192" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.181-27.26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512193" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.181-27.26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512194" version="1" comment="kbd is &lt;2.0.4-8.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512195" version="1" comment="kbd-legacy is &lt;2.0.4-8.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512196" version="1" comment="kdump is &lt;0.8.16-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512197" version="1" comment="kernel-default is &lt;4.12.14-94.41.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512198" version="1" comment="kernel-default-devel is &lt;4.12.14-94.41.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512199" version="1" comment="kernel-default-extra is &lt;4.12.14-94.41.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512200" version="1" comment="kernel-devel is &lt;4.12.14-94.41.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512201" version="1" comment="kernel-macros is &lt;4.12.14-94.41.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512202" version="1" comment="kernel-source is &lt;4.12.14-94.41.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512203" version="1" comment="kernel-syms is &lt;4.12.14-94.41.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512204" version="1" comment="kernel-firmware is &lt;20180525-3.11" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512205" version="1" comment="ucode-amd is &lt;20180525-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512206" version="1" comment="krb5 is &lt;1.12.5-40.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512207" version="1" comment="krb5-32bit is &lt;1.12.5-40.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512208" version="1" comment="krb5-client is &lt;1.12.5-40.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512209" version="1" comment="lcms2 is &lt;2.7-9.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512210" version="1" comment="liblcms2-2 is &lt;2.7-9.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512211" version="1" comment="liblcms2-2-32bit is &lt;2.7-9.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512212" version="1" comment="lftp is &lt;4.7.4-3.3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170845" version="1" comment="libICE6 is &lt;1.0.8-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170846" version="1" comment="libICE6-32bit is &lt;1.0.8-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172641" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172642" version="1" comment="libIlmImf-Imf_2_1-21-32bit is &lt;2.1.0-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172643" version="1" comment="openexr is &lt;2.1.0-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512213" version="1" comment="libQt5Concurrent5 is &lt;5.6.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512214" version="1" comment="libQt5Core5 is &lt;5.6.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512215" version="1" comment="libQt5DBus5 is &lt;5.6.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512216" version="1" comment="libQt5Gui5 is &lt;5.6.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512217" version="1" comment="libQt5Network5 is &lt;5.6.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512218" version="1" comment="libQt5OpenGL5 is &lt;5.6.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512219" version="1" comment="libQt5PrintSupport5 is &lt;5.6.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512220" version="1" comment="libQt5Sql5 is &lt;5.6.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512221" version="1" comment="libQt5Sql5-mysql is &lt;5.6.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512222" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512223" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512224" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512225" version="1" comment="libQt5Test5 is &lt;5.6.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512226" version="1" comment="libQt5Widgets5 is &lt;5.6.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512227" version="1" comment="libQt5Xml5 is &lt;5.6.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512228" version="1" comment="libSoundTouch0 is &lt;1.7.1-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512229" version="1" comment="libSoundTouch0-32bit is &lt;1.7.1-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512230" version="1" comment="soundtouch is &lt;1.7.1-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512231" version="1" comment="libX11-6 is &lt;1.6.2-12.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512232" version="1" comment="libX11-6-32bit is &lt;1.6.2-12.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512233" version="1" comment="libX11-data is &lt;1.6.2-12.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512234" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512235" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-12.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512236" version="1" comment="libXcursor1 is &lt;1.1.14-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512237" version="1" comment="libXcursor1-32bit is &lt;1.1.14-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170842" version="1" comment="libXdmcp6 is &lt;1.1.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170843" version="1" comment="libXdmcp6-32bit is &lt;1.1.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512238" version="1" comment="libXext6 is &lt;1.3.2-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512239" version="1" comment="libXext6-32bit is &lt;1.3.2-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170838" version="1" comment="libXfont1 is &lt;1.5.1-11.3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512240" version="1" comment="libXfont2-2 is &lt;2.0.3-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512241" version="1" comment="libXvnc1 is &lt;1.6.0-18.23.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512242" version="1" comment="tigervnc is &lt;1.6.0-18.23.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512243" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-18.23.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512244" version="1" comment="libblkid1 is &lt;2.29.2-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512245" version="1" comment="libblkid1-32bit is &lt;2.29.2-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512246" version="1" comment="libfdisk1 is &lt;2.29.2-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512247" version="1" comment="libmount1 is &lt;2.29.2-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512248" version="1" comment="libmount1-32bit is &lt;2.29.2-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512249" version="1" comment="libsmartcols1 is &lt;2.29.2-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512250" version="1" comment="libuuid-devel is &lt;2.29.2-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512251" version="1" comment="libuuid1 is &lt;2.29.2-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512252" version="1" comment="libuuid1-32bit is &lt;2.29.2-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512253" version="1" comment="python-libmount is &lt;2.29.2-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512254" version="1" comment="util-linux is &lt;2.29.2-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512255" version="1" comment="util-linux-lang is &lt;2.29.2-7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512256" version="1" comment="util-linux-systemd is &lt;2.29.2-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512257" version="1" comment="uuidd is &lt;2.29.2-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175342" version="1" comment="libcairo-gobject2 is &lt;1.15.2-25.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175343" version="1" comment="libcairo-gobject2-32bit is &lt;1.15.2-25.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175344" version="1" comment="libcairo-script-interpreter2 is &lt;1.15.2-25.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175345" version="1" comment="libcairo2 is &lt;1.15.2-25.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175346" version="1" comment="libcairo2-32bit is &lt;1.15.2-25.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512258" version="1" comment="libcares2 is &lt;1.9.1-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512259" version="1" comment="libcares2-32bit is &lt;1.9.1-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173007" version="1" comment="libcdio14 is &lt;0.90-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173008" version="1" comment="libcdio14-32bit is &lt;0.90-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173009" version="1" comment="libiso9660-8 is &lt;0.90-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512260" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512261" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512262" version="1" comment="libdcerpc0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512263" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512264" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512265" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512266" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512267" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512268" version="1" comment="libndr-standard0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512269" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512270" version="1" comment="libndr0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512271" version="1" comment="libndr0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512272" version="1" comment="libnetapi0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512273" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512274" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512275" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512276" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512277" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512278" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512279" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512280" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512281" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512282" version="1" comment="libsamba-util0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512283" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512284" version="1" comment="libsamdb0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512285" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512286" version="1" comment="libsmbclient0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512287" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512288" version="1" comment="libsmbconf0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512289" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512290" version="1" comment="libsmbldap0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512291" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512292" version="1" comment="libtevent-util0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512293" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512294" version="1" comment="libwbclient0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512295" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512296" version="1" comment="samba is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512297" version="1" comment="samba-client is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512298" version="1" comment="samba-client-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512299" version="1" comment="samba-doc is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512300" version="1" comment="samba-libs is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512301" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512302" version="1" comment="samba-winbind is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512303" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512304" version="1" comment="libecpg6 is &lt;10.5-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512305" version="1" comment="libpq5 is &lt;10.5-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512306" version="1" comment="libpq5-32bit is &lt;10.5-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512307" version="1" comment="postgresql10 is &lt;10.5-1.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170043" version="1" comment="libevent-2_0-5 is &lt;2.0.21-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512308" version="1" comment="libexempi3 is &lt;2.2.1-5.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170040" version="1" comment="libexif12 is &lt;0.6.21-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170041" version="1" comment="libexif12-32bit is &lt;0.6.21-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512309" version="1" comment="libfreebl3 is &lt;3.29.5-58.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512310" version="1" comment="libfreebl3-32bit is &lt;3.29.5-58.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512311" version="1" comment="libsoftokn3 is &lt;3.29.5-58.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512312" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-58.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512313" version="1" comment="mozilla-nss is &lt;3.29.5-58.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512314" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-58.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512315" version="1" comment="mozilla-nss-certs is &lt;3.29.5-58.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512316" version="1" comment="mozilla-nss-certs-32bit is &lt;3.29.5-58.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512317" version="1" comment="mozilla-nss-sysinit is &lt;3.29.5-58.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512318" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.29.5-58.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512319" version="1" comment="mozilla-nss-tools is &lt;3.29.5-58.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171103" version="1" comment="libfreetype6 is &lt;2.6.3-7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171104" version="1" comment="libfreetype6-32bit is &lt;2.6.3-7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512320" version="1" comment="libgcrypt20 is &lt;1.6.1-16.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512321" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174098" version="1" comment="libgraphite2-3 is &lt;1.3.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174099" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159508" version="1" comment="libical1 is &lt;1.0.1-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159509" version="1" comment="libical1-32bit is &lt;1.0.1-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173108" version="1" comment="libid3tag0 is &lt;0.15.1b-184.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174162" version="1" comment="libidn11 is &lt;1.28-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174163" version="1" comment="libidn11-32bit is &lt;1.28-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512322" version="1" comment="libipa_hbac0 is &lt;1.16.1-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512323" version="1" comment="libsss_certmap0 is &lt;1.16.1-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512324" version="1" comment="libsss_idmap0 is &lt;1.16.1-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512325" version="1" comment="libsss_nss_idmap0 is &lt;1.16.1-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512326" version="1" comment="libsss_simpleifp0 is &lt;1.16.1-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166514" version="1" comment="libsss_sudo is &lt;1.13.4-34.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512327" version="1" comment="python-sssd-config is &lt;1.16.1-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512328" version="1" comment="sssd is &lt;1.16.1-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512329" version="1" comment="sssd-32bit is &lt;1.16.1-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512330" version="1" comment="sssd-ad is &lt;1.16.1-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512331" version="1" comment="sssd-ipa is &lt;1.16.1-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512332" version="1" comment="sssd-krb5 is &lt;1.16.1-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512333" version="1" comment="sssd-krb5-common is &lt;1.16.1-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512334" version="1" comment="sssd-ldap is &lt;1.16.1-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512335" version="1" comment="sssd-proxy is &lt;1.16.1-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512336" version="1" comment="sssd-tools is &lt;1.16.1-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177649" version="1" comment="libjasper1 is &lt;1.900.14-195.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177650" version="1" comment="libjasper1-32bit is &lt;1.900.14-195.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512337" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.20.3-2.23.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512338" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.20.3-2.23.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512339" version="1" comment="libwebkit2gtk3-lang is &lt;2.20.3-2.23.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512340" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.20.3-2.23.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512341" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.20.3-2.23.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512342" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.20.3-2.23.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170911" version="1" comment="libjpeg-turbo is &lt;1.5.3-31.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170912" version="1" comment="libjpeg62 is &lt;62.2.0-31.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170913" version="1" comment="libjpeg62-32bit is &lt;62.2.0-31.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170914" version="1" comment="libjpeg62-turbo is &lt;1.5.3-31.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170915" version="1" comment="libjpeg8 is &lt;8.1.2-31.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170916" version="1" comment="libjpeg8-32bit is &lt;8.1.2-31.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170917" version="1" comment="libturbojpeg0 is &lt;8.1.2-31.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512343" version="1" comment="libkpathsea6 is &lt;6.2.0dev-22.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512344" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512345" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512346" version="1" comment="openldap2-client is &lt;2.4.41-18.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512347" version="1" comment="libldb1 is &lt;1.1.29-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512348" version="1" comment="libldb1-32bit is &lt;1.1.29-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512349" version="1" comment="liblouis-data is &lt;2.6.4-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512350" version="1" comment="liblouis9 is &lt;2.6.4-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512351" version="1" comment="python3-louis is &lt;2.6.4-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512352" version="1" comment="libltdl7 is &lt;2.4.2-17.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512353" version="1" comment="libltdl7-32bit is &lt;2.4.2-17.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177725" version="1" comment="libmodplug1 is &lt;0.8.9.0+git20170610.f6dd59a-15.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174905" version="1" comment="libmwaw-0_3-3 is &lt;0.3.13-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512354" version="1" comment="libmysqlclient18 is &lt;10.0.35-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512355" version="1" comment="libmysqlclient18-32bit is &lt;10.0.35-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512356" version="1" comment="libmysqlclient_r18 is &lt;10.0.35-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512357" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.35-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512358" version="1" comment="mariadb-100-errormessages is &lt;10.0.35-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170445" version="1" comment="libncurses5 is &lt;5.9-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170446" version="1" comment="libncurses5-32bit is &lt;5.9-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170447" version="1" comment="libncurses6 is &lt;5.9-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170448" version="1" comment="libncurses6-32bit is &lt;5.9-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170450" version="1" comment="ncurses-devel is &lt;5.9-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170451" version="1" comment="ncurses-utils is &lt;5.9-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170452" version="1" comment="tack is &lt;5.9-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170453" version="1" comment="terminfo is &lt;5.9-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170454" version="1" comment="terminfo-base is &lt;5.9-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140889" version="1" comment="libnghttp2-14 is &lt;1.7.1-1.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512359" version="1" comment="libnghttp2-14-32bit is &lt;1.7.1-1.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512360" version="1" comment="libofx is &lt;0.9.9-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512361" version="1" comment="libofx6 is &lt;0.9.9-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177330" version="1" comment="libopenjp2-7 is &lt;2.1.0-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512362" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512363" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512364" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2p-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512365" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512366" version="1" comment="libopenssl-devel is &lt;1.0.2p-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512367" version="1" comment="openssl is &lt;1.0.2p-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512368" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-106.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512369" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-106.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512370" version="1" comment="libopenssl1_1 is &lt;1.1.1-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512371" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512372" version="1" comment="libpcre1 is &lt;8.39-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512373" version="1" comment="libpcre1-32bit is &lt;8.39-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512374" version="1" comment="libpcre16-0 is &lt;8.39-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512375" version="1" comment="libpcrecpp0 is &lt;8.39-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512376" version="1" comment="libpcrecpp0-32bit is &lt;8.39-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512377" version="1" comment="libpcsclite1 is &lt;1.8.10-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512378" version="1" comment="libpcsclite1-32bit is &lt;1.8.10-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512379" version="1" comment="pcsc-lite is &lt;1.8.10-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162112" version="1" comment="libplist++3 is &lt;1.12-20.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162113" version="1" comment="libplist3 is &lt;1.12-20.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512380" version="1" comment="libpodofo0_9_2 is &lt;0.9.2-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512381" version="1" comment="libpolkit0 is &lt;0.113-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512382" version="1" comment="libpolkit0-32bit is &lt;0.113-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512383" version="1" comment="polkit is &lt;0.113-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512384" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512385" version="1" comment="libpoppler-glib8 is &lt;0.43.0-16.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512386" version="1" comment="libpoppler-qt4-4 is &lt;0.43.0-16.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512387" version="1" comment="libpoppler60 is &lt;0.43.0-16.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512388" version="1" comment="poppler-tools is &lt;0.43.0-16.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512389" version="1" comment="libprocps3 is &lt;3.3.9-11.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512390" version="1" comment="procps is &lt;3.3.9-11.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512391" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512392" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512393" version="1" comment="python-base is &lt;2.7.13-28.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512394" version="1" comment="python-devel is &lt;2.7.13-28.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512395" version="1" comment="python-xml is &lt;2.7.13-28.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512396" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512397" version="1" comment="python3-base is &lt;3.4.6-25.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512398" version="1" comment="libqpdf18 is &lt;7.1.1-3.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512399" version="1" comment="libqt4 is &lt;4.8.7-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512400" version="1" comment="libqt4-32bit is &lt;4.8.7-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512401" version="1" comment="libqt4-qt3support is &lt;4.8.7-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512402" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.7-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512403" version="1" comment="libqt4-sql is &lt;4.8.7-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512404" version="1" comment="libqt4-sql-32bit is &lt;4.8.7-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512405" version="1" comment="libqt4-sql-mysql is &lt;4.8.7-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512406" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.7-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512407" version="1" comment="libqt4-sql-postgresql is &lt;4.8.7-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512408" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.7-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512409" version="1" comment="libqt4-sql-sqlite is &lt;4.8.7-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512410" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.7-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512411" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.7-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512412" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.7-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512413" version="1" comment="libqt4-x11 is &lt;4.8.7-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512414" version="1" comment="libqt4-x11-32bit is &lt;4.8.7-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159506" version="1" comment="libquicktime0 is &lt;1.2.4-14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512415" version="1" comment="libraw9 is &lt;0.15.4-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512416" version="1" comment="libreoffice is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512417" version="1" comment="libreoffice-base is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512418" version="1" comment="libreoffice-base-drivers-mysql is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512419" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512420" version="1" comment="libreoffice-branding-upstream is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512421" version="1" comment="libreoffice-calc is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512422" version="1" comment="libreoffice-calc-extensions is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512423" version="1" comment="libreoffice-draw is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512424" version="1" comment="libreoffice-filters-optional is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512425" version="1" comment="libreoffice-gnome is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512426" version="1" comment="libreoffice-gtk2 is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512427" version="1" comment="libreoffice-icon-themes is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512428" version="1" comment="libreoffice-impress is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512429" version="1" comment="libreoffice-l10n-af is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512430" version="1" comment="libreoffice-l10n-ar is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512431" version="1" comment="libreoffice-l10n-ca is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512432" version="1" comment="libreoffice-l10n-cs is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512433" version="1" comment="libreoffice-l10n-da is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512434" version="1" comment="libreoffice-l10n-de is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512435" version="1" comment="libreoffice-l10n-en is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512436" version="1" comment="libreoffice-l10n-es is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512437" version="1" comment="libreoffice-l10n-fi is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512438" version="1" comment="libreoffice-l10n-fr is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512439" version="1" comment="libreoffice-l10n-gu is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512440" version="1" comment="libreoffice-l10n-hi is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512441" version="1" comment="libreoffice-l10n-hu is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512442" version="1" comment="libreoffice-l10n-it is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512443" version="1" comment="libreoffice-l10n-ja is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512444" version="1" comment="libreoffice-l10n-ko is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512445" version="1" comment="libreoffice-l10n-nb is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512446" version="1" comment="libreoffice-l10n-nl is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512447" version="1" comment="libreoffice-l10n-nn is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512448" version="1" comment="libreoffice-l10n-pl is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512449" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512450" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512451" version="1" comment="libreoffice-l10n-ro is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512452" version="1" comment="libreoffice-l10n-ru is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512453" version="1" comment="libreoffice-l10n-sk is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512454" version="1" comment="libreoffice-l10n-sv is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512455" version="1" comment="libreoffice-l10n-xh is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512456" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512457" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512458" version="1" comment="libreoffice-l10n-zu is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512459" version="1" comment="libreoffice-mailmerge is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512460" version="1" comment="libreoffice-math is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512461" version="1" comment="libreoffice-officebean is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512462" version="1" comment="libreoffice-pyuno is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512463" version="1" comment="libreoffice-writer is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512464" version="1" comment="libreoffice-writer-extensions is &lt;6.0.5.2-43.38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512465" version="1" comment="libsndfile1 is &lt;1.0.25-36.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512466" version="1" comment="libsndfile1-32bit is &lt;1.0.25-36.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512467" version="1" comment="libsnmp30 is &lt;5.7.3-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512468" version="1" comment="libsnmp30-32bit is &lt;5.7.3-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512469" version="1" comment="net-snmp is &lt;5.7.3-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512470" version="1" comment="perl-SNMP is &lt;5.7.3-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512471" version="1" comment="snmp-mibs is &lt;5.7.3-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512472" version="1" comment="libsoup-2_4-1 is &lt;2.62.2-5.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512473" version="1" comment="libsoup-2_4-1-32bit is &lt;2.62.2-5.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512474" version="1" comment="libsoup-lang is &lt;2.62.2-5.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512475" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.62.2-5.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512476" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.33-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512477" version="1" comment="libspice-client-glib-helper is &lt;0.33-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512478" version="1" comment="libspice-client-gtk-3_0-5 is &lt;0.33-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512479" version="1" comment="libspice-controller0 is &lt;0.33-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512480" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.33-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512481" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.33-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512482" version="1" comment="libspice-server1 is &lt;0.12.8-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512483" version="1" comment="libsrtp1 is &lt;1.5.2-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512484" version="1" comment="libssh4 is &lt;0.6.3-12.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512485" version="1" comment="libssh4-32bit is &lt;0.6.3-12.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174959" version="1" comment="libstaroffice-0_0-0 is &lt;0.0.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512486" version="1" comment="libsystemd0 is &lt;228-150.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512487" version="1" comment="libsystemd0-32bit is &lt;228-150.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512488" version="1" comment="libudev1 is &lt;228-150.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512489" version="1" comment="libudev1-32bit is &lt;228-150.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512490" version="1" comment="systemd is &lt;228-150.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512491" version="1" comment="systemd-32bit is &lt;228-150.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512492" version="1" comment="systemd-bash-completion is &lt;228-150.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512493" version="1" comment="systemd-sysvinit is &lt;228-150.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512494" version="1" comment="udev is &lt;228-150.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170495" version="1" comment="libtasn1 is &lt;4.9-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170496" version="1" comment="libtasn1-6 is &lt;4.9-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170497" version="1" comment="libtasn1-6-32bit is &lt;4.9-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512495" version="1" comment="libtiff5 is &lt;4.0.9-44.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512496" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512497" version="1" comment="libtirpc-netconfig is &lt;1.0.1-17.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512498" version="1" comment="libtirpc3 is &lt;1.0.1-17.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512499" version="1" comment="libtirpc3-32bit is &lt;1.0.1-17.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512500" version="1" comment="libvirt is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512501" version="1" comment="libvirt-admin is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512502" version="1" comment="libvirt-client is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512503" version="1" comment="libvirt-daemon is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512504" version="1" comment="libvirt-daemon-config-network is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512505" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512506" version="1" comment="libvirt-daemon-driver-interface is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512507" version="1" comment="libvirt-daemon-driver-libxl is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512508" version="1" comment="libvirt-daemon-driver-lxc is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512509" version="1" comment="libvirt-daemon-driver-network is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512510" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512511" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512512" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512513" version="1" comment="libvirt-daemon-driver-secret is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512514" version="1" comment="libvirt-daemon-driver-storage is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512515" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512516" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512517" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512518" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512519" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512520" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512521" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512522" version="1" comment="libvirt-daemon-lxc is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512523" version="1" comment="libvirt-daemon-qemu is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512524" version="1" comment="libvirt-daemon-xen is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512525" version="1" comment="libvirt-doc is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512526" version="1" comment="libvirt-libs is &lt;4.0.0-6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512527" version="1" comment="libvmtools0 is &lt;10.3.0-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512528" version="1" comment="open-vm-tools is &lt;10.3.0-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512529" version="1" comment="open-vm-tools-desktop is &lt;10.3.0-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178202" version="1" comment="libvorbis0 is &lt;1.3.3-10.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178203" version="1" comment="libvorbis0-32bit is &lt;1.3.3-10.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178204" version="1" comment="libvorbisenc2 is &lt;1.3.3-10.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178205" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-10.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178206" version="1" comment="libvorbisfile3 is &lt;1.3.3-10.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178207" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-10.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169974" version="1" comment="libvpx1 is &lt;1.3.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169975" version="1" comment="libvpx1-32bit is &lt;1.3.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169976" version="1" comment="vpx-tools is &lt;1.3.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172685" version="1" comment="libwavpack1 is &lt;4.60.99-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512530" version="1" comment="libwireshark9 is &lt;2.4.9-48.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512531" version="1" comment="libwiretap7 is &lt;2.4.9-48.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512532" version="1" comment="libwscodecs1 is &lt;2.4.9-48.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512533" version="1" comment="libwsutil8 is &lt;2.4.9-48.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512534" version="1" comment="wireshark is &lt;2.4.9-48.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512535" version="1" comment="wireshark-gtk is &lt;2.4.9-48.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166502" version="1" comment="libwpd-0_10-10 is &lt;0.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512536" version="1" comment="libxcb-dri2-0 is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512537" version="1" comment="libxcb-dri2-0-32bit is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512538" version="1" comment="libxcb-dri3-0 is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512539" version="1" comment="libxcb-dri3-0-32bit is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512540" version="1" comment="libxcb-glx0 is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512541" version="1" comment="libxcb-glx0-32bit is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512542" version="1" comment="libxcb-present0 is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512543" version="1" comment="libxcb-present0-32bit is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512544" version="1" comment="libxcb-randr0 is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512545" version="1" comment="libxcb-render0 is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512546" version="1" comment="libxcb-render0-32bit is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512547" version="1" comment="libxcb-shape0 is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512548" version="1" comment="libxcb-shm0 is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512549" version="1" comment="libxcb-shm0-32bit is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512550" version="1" comment="libxcb-sync1 is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512551" version="1" comment="libxcb-sync1-32bit is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512552" version="1" comment="libxcb-xf86dri0 is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512553" version="1" comment="libxcb-xfixes0 is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512554" version="1" comment="libxcb-xfixes0-32bit is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512555" version="1" comment="libxcb-xinerama0 is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512556" version="1" comment="libxcb-xkb1 is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512557" version="1" comment="libxcb-xkb1-32bit is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512558" version="1" comment="libxcb-xv0 is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512559" version="1" comment="libxcb1 is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512560" version="1" comment="libxcb1-32bit is &lt;1.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512561" version="1" comment="libxml2-2 is &lt;2.9.4-46.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512562" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512563" version="1" comment="libxml2-tools is &lt;2.9.4-46.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172757" version="1" comment="libyaml-cpp0_5 is &lt;0.5.3-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512564" version="1" comment="libykcs11-1 is &lt;1.5.0-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512565" version="1" comment="libykpiv1 is &lt;1.5.0-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512566" version="1" comment="yubico-piv-tool is &lt;1.5.0-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512567" version="1" comment="libz1 is &lt;1.2.11-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512568" version="1" comment="libz1-32bit is &lt;1.2.11-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512569" version="1" comment="zlib-devel is &lt;1.2.11-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164531" version="1" comment="libzip2 is &lt;0.11.1-13.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512570" version="1" comment="libzypp is &lt;16.19.0-2.36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512571" version="1" comment="libzzip-0-13 is &lt;0.13.67-10.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512572" version="1" comment="logrotate is &lt;3.11.0-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512573" version="1" comment="mariadb is &lt;10.2.18-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512574" version="1" comment="mariadb-client is &lt;10.2.18-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512575" version="1" comment="mariadb-errormessages is &lt;10.2.18-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512576" version="1" comment="mutt is &lt;1.10.1-55.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512577" version="1" comment="ntp is &lt;4.2.8p12-64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512578" version="1" comment="ntp-doc is &lt;4.2.8p12-64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512579" version="1" comment="openconnect is &lt;7.08-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512580" version="1" comment="openconnect-lang is &lt;7.08-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512581" version="1" comment="openslp is &lt;2.0.0-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512582" version="1" comment="openslp-32bit is &lt;2.0.0-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512583" version="1" comment="openssh is &lt;7.2p2-74.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512584" version="1" comment="openssh-helpers is &lt;7.2p2-74.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165998" version="1" comment="openvpn is &lt;2.3.8-16.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171463" version="1" comment="p7zip is &lt;9.20.1-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512585" version="1" comment="pam is &lt;1.1.8-24.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512586" version="1" comment="pam-32bit is &lt;1.1.8-24.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512587" version="1" comment="pam-doc is &lt;1.1.8-24.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512588" version="1" comment="pam_yubico is &lt;2.26-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175223" version="1" comment="patch is &lt;2.7.5-8.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512589" version="1" comment="perl is &lt;5.18.2-12.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512590" version="1" comment="perl-32bit is &lt;5.18.2-12.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512591" version="1" comment="perl-base is &lt;5.18.2-12.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512592" version="1" comment="perl-doc is &lt;5.18.2-12.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512593" version="1" comment="perl-Archive-Zip is &lt;1.34-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169826" version="1" comment="perl-XML-LibXML is &lt;2.0019-6.3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169961" version="1" comment="procmail is &lt;3.22-269.3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172606" version="1" comment="puppet is &lt;3.8.5-15.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512594" version="1" comment="python is &lt;2.7.13-28.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512595" version="1" comment="python-curses is &lt;2.7.13-28.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512596" version="1" comment="python-tk is &lt;2.7.13-28.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512597" version="1" comment="python-libxml2 is &lt;2.9.4-46.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512598" version="1" comment="python-pyOpenSSL is &lt;16.0.0-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512599" version="1" comment="python3-pyOpenSSL is &lt;16.0.0-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512600" version="1" comment="python-requests is &lt;2.11.1-6.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512601" version="1" comment="python3 is &lt;3.4.6-25.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512602" version="1" comment="python3-curses is &lt;3.4.6-25.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139059" version="1" comment="python3-requests is &lt;2.7.0-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512603" version="1" comment="qemu is &lt;2.11.2-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512604" version="1" comment="qemu-block-curl is &lt;2.11.2-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512605" version="1" comment="qemu-ipxe is &lt;1.0.0-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512606" version="1" comment="qemu-kvm is &lt;2.11.2-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512607" version="1" comment="qemu-seabios is &lt;1.11.0-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512608" version="1" comment="qemu-sgabios is &lt;8-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512609" version="1" comment="qemu-tools is &lt;2.11.2-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512610" version="1" comment="qemu-vgabios is &lt;1.11.0-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512611" version="1" comment="qemu-x86 is &lt;2.11.2-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512612" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1510945757.b2662641d5-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512613" version="1" comment="rpm is &lt;4.11.2-16.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512614" version="1" comment="rpm-32bit is &lt;4.11.2-16.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512615" version="1" comment="rpm-build is &lt;4.11.2-16.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512616" version="1" comment="rsync is &lt;3.1.0-13.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512617" version="1" comment="rsyslog is &lt;8.24.0-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174874" version="1" comment="rzsz is &lt;0.12.21~rc-1001.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512618" version="1" comment="sblim-sfcb is &lt;1.4.8-17.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512619" version="1" comment="shadow is &lt;4.2.1-27.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172771" version="1" comment="shotwell is &lt;0.22.0+git.20160103-15.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172772" version="1" comment="shotwell-lang is &lt;0.22.0+git.20160103-15.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170918" version="1" comment="spice-vdagent is &lt;0.16.0-8.5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161786" version="1" comment="strongswan is &lt;5.1.3-26.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161787" version="1" comment="strongswan-doc is &lt;5.1.3-26.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161788" version="1" comment="strongswan-ipsec is &lt;5.1.3-26.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161789" version="1" comment="strongswan-libs0 is &lt;5.1.3-26.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512620" version="1" comment="sudo is &lt;1.8.20p2-3.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512621" version="1" comment="supportutils is &lt;3.0-95.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512622" version="1" comment="tar is &lt;1.27.1-15.3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512623" version="1" comment="tar-lang is &lt;1.27.1-15.3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166091" version="1" comment="tcpdump is &lt;4.9.2-14.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512624" version="1" comment="tftp is &lt;5.2-11.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170244" version="1" comment="transfig is &lt;3.2.5e-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512625" version="1" comment="ucode-intel is &lt;20180807a-13.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512626" version="1" comment="unixODBC is &lt;2.3.6-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512627" version="1" comment="unixODBC-32bit is &lt;2.3.6-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512628" version="1" comment="unzip is &lt;6.00-33.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177348" version="1" comment="wget is &lt;1.14-21.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165686" version="1" comment="wpa_supplicant is &lt;2.2-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177962" version="1" comment="xdg-utils is &lt;20140630-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512629" version="1" comment="xen is &lt;4.11.0_08-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512630" version="1" comment="xen-libs is &lt;4.11.0_08-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512631" version="1" comment="xen-libs-32bit is &lt;4.11.0_08-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512632" version="1" comment="xf86-video-intel is &lt;2.99.917+git781.c8990575-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512633" version="1" comment="xfsprogs is &lt;4.15.0-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512634" version="1" comment="xinetd is &lt;2.3.15-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512635" version="1" comment="xorg-x11-server is &lt;1.19.6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512636" version="1" comment="xorg-x11-server-extra is &lt;1.19.6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512637" version="1" comment="yast2 is &lt;3.2.48-3.29.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512638" version="1" comment="yast2-core is &lt;3.3.1-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512639" version="1" comment="yast2-users is &lt;3.2.17-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512640" version="1" comment="yubikey-manager is &lt;0.6.0-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512641" version="1" comment="zsh is &lt;5.0.5-6.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512642" version="1" comment="zypper is &lt;1.13.45-21.23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512643" version="1" comment="zypper-log is &lt;1.13.45-21.23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514361" version="1" comment="tigervnc is &lt;1.3.0-22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514362" version="1" comment="xorg-x11-Xvnc is &lt;1.3.0-22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514363" version="1" comment="ImageMagick is &lt;6.8.8.1-8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514364" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514365" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514366" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514367" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514368" version="1" comment="finch is &lt;2.10.9-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514369" version="1" comment="libpurple is &lt;2.10.9-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514370" version="1" comment="libpurple-lang is &lt;2.10.9-8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514371" version="1" comment="libpurple-meanwhile is &lt;2.10.9-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514372" version="1" comment="libpurple-tcl is &lt;2.10.9-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514373" version="1" comment="pidgin is &lt;2.10.9-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514374" version="1" comment="gnutls is &lt;3.2.15-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514375" version="1" comment="libgnutls28 is &lt;3.2.15-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514376" version="1" comment="libgnutls28-32bit is &lt;3.2.15-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514377" version="1" comment="flash-player is &lt;11.2.202.425-19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514378" version="1" comment="flash-player-gnome is &lt;11.2.202.425-19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514379" version="1" comment="cpio is &lt;2.11-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514380" version="1" comment="cpio-lang is &lt;2.11-29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514381" version="1" comment="mailx is &lt;12.5-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514382" version="1" comment="libFLAC8 is &lt;1.3.0-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514383" version="1" comment="libFLAC8-32bit is &lt;1.3.0-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514384" version="1" comment="ntp is &lt;4.2.6p5-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514385" version="1" comment="ntp-doc is &lt;4.2.6p5-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514386" version="1" comment="openvpn is &lt;2.3.2-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514387" version="1" comment="dbus-1 is &lt;1.8.12-6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514388" version="1" comment="dbus-1-x11 is &lt;1.8.12-6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514389" version="1" comment="libdbus-1-3 is &lt;1.8.12-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514390" version="1" comment="libdbus-1-3-32bit is &lt;1.8.12-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514391" version="1" comment="tcpdump is &lt;4.5.1-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514392" version="1" comment="libssh4 is &lt;0.6.3-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514393" version="1" comment="libreoffice is &lt;4.3.5.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514394" version="1" comment="libreoffice-base is &lt;4.3.5.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514395" version="1" comment="libreoffice-base-drivers-mysql is &lt;4.3.5.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514396" version="1" comment="libreoffice-base-drivers-postgresql is &lt;4.3.5.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514397" version="1" comment="libreoffice-calc is &lt;4.3.5.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514398" version="1" comment="libreoffice-calc-extensions is &lt;4.3.5.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514399" version="1" comment="libreoffice-draw is &lt;4.3.5.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514400" version="1" comment="libreoffice-filters-optional is &lt;4.3.5.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514401" version="1" comment="libreoffice-gnome is &lt;4.3.5.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514402" version="1" comment="libreoffice-icon-theme-tango is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514403" version="1" comment="libreoffice-impress is &lt;4.3.5.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514404" version="1" comment="libreoffice-l10n-af is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514405" version="1" comment="libreoffice-l10n-ar is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514406" version="1" comment="libreoffice-l10n-ca is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514407" version="1" comment="libreoffice-l10n-cs is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514408" version="1" comment="libreoffice-l10n-da is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514409" version="1" comment="libreoffice-l10n-de is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514410" version="1" comment="libreoffice-l10n-en is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514411" version="1" comment="libreoffice-l10n-es is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514412" version="1" comment="libreoffice-l10n-fi is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514413" version="1" comment="libreoffice-l10n-fr is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514414" version="1" comment="libreoffice-l10n-gu is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514415" version="1" comment="libreoffice-l10n-hi is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514416" version="1" comment="libreoffice-l10n-hu is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514417" version="1" comment="libreoffice-l10n-it is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514418" version="1" comment="libreoffice-l10n-ja is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514419" version="1" comment="libreoffice-l10n-ko is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514420" version="1" comment="libreoffice-l10n-nb is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514421" version="1" comment="libreoffice-l10n-nl is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514422" version="1" comment="libreoffice-l10n-nn is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514423" version="1" comment="libreoffice-l10n-pl is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514424" version="1" comment="libreoffice-l10n-pt-BR is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514425" version="1" comment="libreoffice-l10n-pt-PT is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514426" version="1" comment="libreoffice-l10n-ru is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514427" version="1" comment="libreoffice-l10n-sk is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514428" version="1" comment="libreoffice-l10n-sv is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514429" version="1" comment="libreoffice-l10n-xh is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514430" version="1" comment="libreoffice-l10n-zh-Hans is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514431" version="1" comment="libreoffice-l10n-zh-Hant is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514432" version="1" comment="libreoffice-l10n-zu is &lt;4.3.5.2-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514433" version="1" comment="libreoffice-mailmerge is &lt;4.3.5.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514434" version="1" comment="libreoffice-math is &lt;4.3.5.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514435" version="1" comment="libreoffice-officebean is &lt;4.3.5.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514436" version="1" comment="libreoffice-pyuno is &lt;4.3.5.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514437" version="1" comment="libreoffice-writer is &lt;4.3.5.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514438" version="1" comment="libreoffice-writer-extensions is &lt;4.3.5.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514439" version="1" comment="file is &lt;5.19-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514440" version="1" comment="file-magic is &lt;5.19-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514441" version="1" comment="libmagic1 is &lt;5.19-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514442" version="1" comment="libmagic1-32bit is &lt;5.19-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514443" version="1" comment="flash-player is &lt;11.2.202.411-4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514444" version="1" comment="flash-player-gnome is &lt;11.2.202.411-4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514445" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.71-6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514446" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.71-6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514447" version="1" comment="rsyslog is &lt;8.4.0-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514448" version="1" comment="wget is &lt;1.14-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514449" version="1" comment="flash-player is &lt;11.2.202.418-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514450" version="1" comment="flash-player-gnome is &lt;11.2.202.418-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514451" version="1" comment="libreoffice is &lt;4.3.3.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514452" version="1" comment="libreoffice-base is &lt;4.3.3.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514453" version="1" comment="libreoffice-base-drivers-mysql is &lt;4.3.3.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514454" version="1" comment="libreoffice-base-drivers-postgresql is &lt;4.3.3.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514455" version="1" comment="libreoffice-calc is &lt;4.3.3.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514456" version="1" comment="libreoffice-calc-extensions is &lt;4.3.3.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514457" version="1" comment="libreoffice-draw is &lt;4.3.3.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514458" version="1" comment="libreoffice-filters-optional is &lt;4.3.3.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514459" version="1" comment="libreoffice-gnome is &lt;4.3.3.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514460" version="1" comment="libreoffice-icon-theme-tango is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514461" version="1" comment="libreoffice-impress is &lt;4.3.3.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514462" version="1" comment="libreoffice-l10n-af is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514463" version="1" comment="libreoffice-l10n-ar is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514464" version="1" comment="libreoffice-l10n-ca is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514465" version="1" comment="libreoffice-l10n-cs is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514466" version="1" comment="libreoffice-l10n-da is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514467" version="1" comment="libreoffice-l10n-de is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514468" version="1" comment="libreoffice-l10n-en is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514469" version="1" comment="libreoffice-l10n-es is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514470" version="1" comment="libreoffice-l10n-fi is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514471" version="1" comment="libreoffice-l10n-fr is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514472" version="1" comment="libreoffice-l10n-gu is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514473" version="1" comment="libreoffice-l10n-hi is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514474" version="1" comment="libreoffice-l10n-hu is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514475" version="1" comment="libreoffice-l10n-it is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514476" version="1" comment="libreoffice-l10n-ja is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514477" version="1" comment="libreoffice-l10n-ko is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514478" version="1" comment="libreoffice-l10n-nb is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514479" version="1" comment="libreoffice-l10n-nl is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514480" version="1" comment="libreoffice-l10n-nn is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514481" version="1" comment="libreoffice-l10n-pl is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514482" version="1" comment="libreoffice-l10n-pt-BR is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514483" version="1" comment="libreoffice-l10n-pt-PT is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514484" version="1" comment="libreoffice-l10n-ru is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514485" version="1" comment="libreoffice-l10n-sk is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514486" version="1" comment="libreoffice-l10n-sv is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514487" version="1" comment="libreoffice-l10n-xh is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514488" version="1" comment="libreoffice-l10n-zh-Hans is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514489" version="1" comment="libreoffice-l10n-zh-Hant is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514490" version="1" comment="libreoffice-l10n-zu is &lt;4.3.3.2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514491" version="1" comment="libreoffice-mailmerge is &lt;4.3.3.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514492" version="1" comment="libreoffice-math is &lt;4.3.3.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514493" version="1" comment="libreoffice-officebean is &lt;4.3.3.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514494" version="1" comment="libreoffice-pyuno is &lt;4.3.3.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514495" version="1" comment="libreoffice-writer is &lt;4.3.3.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514496" version="1" comment="libreoffice-writer-extensions is &lt;4.3.3.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514497" version="1" comment="MozillaFirefox is &lt;31.3.0esr-15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514498" version="1" comment="MozillaFirefox-branding-SLE is &lt;31.0-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514499" version="1" comment="MozillaFirefox-translations is &lt;31.3.0esr-15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514500" version="1" comment="libfreebl3 is &lt;3.17.2-12.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514501" version="1" comment="libfreebl3-32bit is &lt;3.17.2-12.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514502" version="1" comment="libsoftokn3 is &lt;3.17.2-12.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514503" version="1" comment="libsoftokn3-32bit is &lt;3.17.2-12.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514504" version="1" comment="mozilla-nss is &lt;3.17.2-12.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514505" version="1" comment="mozilla-nss-32bit is &lt;3.17.2-12.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514506" version="1" comment="mozilla-nss-certs is &lt;3.17.2-12.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514507" version="1" comment="mozilla-nss-certs-32bit is &lt;3.17.2-12.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514508" version="1" comment="mozilla-nss-tools is &lt;3.17.2-12.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514509" version="1" comment="libpython2_7-1_0 is &lt;2.7.7-9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514510" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.7-9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514511" version="1" comment="python is &lt;2.7.7-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514512" version="1" comment="python-base is &lt;2.7.7-9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514513" version="1" comment="python-curses is &lt;2.7.7-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514514" version="1" comment="python-devel is &lt;2.7.7-9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514515" version="1" comment="python-tk is &lt;2.7.7-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514516" version="1" comment="python-xml is &lt;2.7.7-9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514517" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-66.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514518" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-66.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514519" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514520" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514521" version="1" comment="openssl is &lt;1.0.1i-9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514522" version="1" comment="flash-player is &lt;11.2.202.424-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514523" version="1" comment="flash-player-gnome is &lt;11.2.202.424-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514524" version="1" comment="file is &lt;5.19-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514525" version="1" comment="file-magic is &lt;5.19-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514526" version="1" comment="libmagic1 is &lt;5.19-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514527" version="1" comment="libmagic1-32bit is &lt;5.19-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514528" version="1" comment="libxml2-2 is &lt;2.9.1-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514529" version="1" comment="libxml2-2-32bit is &lt;2.9.1-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514530" version="1" comment="libxml2-tools is &lt;2.9.1-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514531" version="1" comment="python-libxml2 is &lt;2.9.1-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514532" version="1" comment="xen is &lt;4.4.3_06-22.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514533" version="1" comment="xen-kmp-default is &lt;4.4.3_06_k3.12.48_52.27-22.15.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514534" version="1" comment="xen-libs is &lt;4.4.3_06-22.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514535" version="1" comment="xen-libs-32bit is &lt;4.4.3_06-22.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514536" version="1" comment="MozillaFirefox is &lt;38.5.0esr-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514537" version="1" comment="MozillaFirefox-translations is &lt;38.5.0esr-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514538" version="1" comment="bind-libs is &lt;9.9.6P1-28.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514539" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-28.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514540" version="1" comment="bind-utils is &lt;9.9.6P1-28.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514541" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514542" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514543" version="1" comment="xorg-x11-server is &lt;7.6_1.15.2-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514544" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.15.2-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514545" version="1" comment="xfsprogs is &lt;3.2.1-3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514546" version="1" comment="grub2 is &lt;2.02~beta2-56.9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514547" version="1" comment="grub2-i386-pc is &lt;2.02~beta2-56.9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514548" version="1" comment="grub2-snapper-plugin is &lt;2.02~beta2-56.9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514549" version="1" comment="grub2-x86_64-efi is &lt;2.02~beta2-56.9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514550" version="1" comment="grub2-x86_64-xen is &lt;2.02~beta2-56.9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514551" version="1" comment="flash-player is &lt;11.2.202.559-117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514552" version="1" comment="flash-player-gnome is &lt;11.2.202.559-117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514553" version="1" comment="MozillaFirefox is &lt;31.5.0esr-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514554" version="1" comment="MozillaFirefox-translations is &lt;31.5.0esr-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514555" version="1" comment="icu is &lt;52.1-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514556" version="1" comment="libicu52_1 is &lt;52.1-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514557" version="1" comment="libicu52_1-32bit is &lt;52.1-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514558" version="1" comment="libicu52_1-data is &lt;52.1-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514559" version="1" comment="ft2demos is &lt;2.5.3-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514560" version="1" comment="libfreetype6 is &lt;2.5.3-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514561" version="1" comment="libfreetype6-32bit is &lt;2.5.3-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514562" version="1" comment="dbus-1 is &lt;1.8.16-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514563" version="1" comment="dbus-1-x11 is &lt;1.8.16-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514564" version="1" comment="libdbus-1-3 is &lt;1.8.16-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514565" version="1" comment="libdbus-1-3-32bit is &lt;1.8.16-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514566" version="1" comment="cups is &lt;1.7.5-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514567" version="1" comment="cups-client is &lt;1.7.5-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514568" version="1" comment="cups-libs is &lt;1.7.5-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514569" version="1" comment="cups-libs-32bit is &lt;1.7.5-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514570" version="1" comment="libecpg6 is &lt;9.3.6-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514571" version="1" comment="libpq5 is &lt;9.3.6-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514572" version="1" comment="libpq5-32bit is &lt;9.3.6-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514573" version="1" comment="postgresql93 is &lt;9.3.6-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514574" version="1" comment="unzip is &lt;6.00-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514575" version="1" comment="flash-player is &lt;11.2.202.451-77.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514576" version="1" comment="flash-player-gnome is &lt;11.2.202.451-77.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514577" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.75-11.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514578" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.75-11.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514579" version="1" comment="libmspack0 is &lt;0.4-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514580" version="1" comment="gnome-settings-daemon is &lt;3.10.2-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514581" version="1" comment="gnome-settings-daemon-lang is &lt;3.10.2-20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514582" version="1" comment="glibc is &lt;2.19-20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514583" version="1" comment="glibc-32bit is &lt;2.19-20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514584" version="1" comment="glibc-devel is &lt;2.19-20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514585" version="1" comment="glibc-devel-32bit is &lt;2.19-20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514586" version="1" comment="glibc-i18ndata is &lt;2.19-20.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514587" version="1" comment="glibc-locale is &lt;2.19-20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514588" version="1" comment="glibc-locale-32bit is &lt;2.19-20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514589" version="1" comment="nscd is &lt;2.19-20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514590" version="1" comment="kernel-default is &lt;3.12.38-44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514591" version="1" comment="kernel-default-devel is &lt;3.12.38-44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514592" version="1" comment="kernel-default-extra is &lt;3.12.38-44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514593" version="1" comment="kernel-devel is &lt;3.12.38-44.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514594" version="1" comment="kernel-macros is &lt;3.12.38-44.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514595" version="1" comment="kernel-source is &lt;3.12.38-44.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514596" version="1" comment="kernel-syms is &lt;3.12.38-44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514597" version="1" comment="kernel-xen is &lt;3.12.38-44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514598" version="1" comment="kernel-xen-devel is &lt;3.12.38-44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514599" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514600" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514601" version="1" comment="openssl is &lt;1.0.1i-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514602" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-73.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514603" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-73.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514604" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514605" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514606" version="1" comment="xen is &lt;4.4.1_10-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514607" version="1" comment="xen-kmp-default is &lt;4.4.1_10_k3.12.36_38-9.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514608" version="1" comment="xen-libs is &lt;4.4.1_10-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514609" version="1" comment="xen-libs-32bit is &lt;4.4.1_10-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514610" version="1" comment="MozillaFirefox is &lt;31.5.3esr-27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514611" version="1" comment="MozillaFirefox-translations is &lt;31.5.3esr-27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514612" version="1" comment="libjpeg-turbo is &lt;1.3.1-30.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514613" version="1" comment="libjpeg62 is &lt;62.1.0-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514614" version="1" comment="libjpeg62-turbo is &lt;1.3.1-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514615" version="1" comment="libjpeg8 is &lt;8.0.2-30.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514616" version="1" comment="libjpeg8-32bit is &lt;8.0.2-30.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514617" version="1" comment="libturbojpeg0 is &lt;8.0.2-30.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514618" version="1" comment="wireshark is &lt;1.10.13-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514619" version="1" comment="kernel-default is &lt;3.12.39-47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514620" version="1" comment="kernel-default-devel is &lt;3.12.39-47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514621" version="1" comment="kernel-default-extra is &lt;3.12.39-47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514622" version="1" comment="kernel-devel is &lt;3.12.39-47.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514623" version="1" comment="kernel-macros is &lt;3.12.39-47.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514624" version="1" comment="kernel-source is &lt;3.12.39-47.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514625" version="1" comment="kernel-syms is &lt;3.12.39-47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514626" version="1" comment="kernel-xen is &lt;3.12.39-47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514627" version="1" comment="kernel-xen-devel is &lt;3.12.39-47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514628" version="1" comment="libzip2 is &lt;0.11.1-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514629" version="1" comment="libarchive13 is &lt;3.1.2-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514630" version="1" comment="pigz is &lt;2.3-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514631" version="1" comment="libssh2-1 is &lt;1.4.3-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514632" version="1" comment="libssh2-1-32bit is &lt;1.4.3-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514633" version="1" comment="tcpdump is &lt;4.5.1-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514634" version="1" comment="libksba8 is &lt;1.3.0-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514635" version="1" comment="libjavascriptcoregtk-1_0-0 is &lt;2.4.8-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514636" version="1" comment="libjavascriptcoregtk-1_0-0-32bit is &lt;2.4.8-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514637" version="1" comment="libjavascriptcoregtk-3_0-0 is &lt;2.4.8-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514638" version="1" comment="libwebkit2gtk-3_0-25 is &lt;2.4.8-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514639" version="1" comment="libwebkitgtk-1_0-0 is &lt;2.4.8-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514640" version="1" comment="libwebkitgtk-1_0-0-32bit is &lt;2.4.8-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514641" version="1" comment="libwebkitgtk-3_0-0 is &lt;2.4.8-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514642" version="1" comment="libwebkitgtk2-lang is &lt;2.4.8-16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514643" version="1" comment="libwebkitgtk3-lang is &lt;2.4.8-16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514644" version="1" comment="typelib-1_0-JavaScriptCore-3_0 is &lt;2.4.8-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514645" version="1" comment="typelib-1_0-WebKit-3_0 is &lt;2.4.8-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514646" version="1" comment="libXfont1 is &lt;1.4.7-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514647" version="1" comment="xen is &lt;4.4.2_02-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514648" version="1" comment="xen-kmp-default is &lt;4.4.2_02_k3.12.38_44-15.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514649" version="1" comment="xen-libs is &lt;4.4.2_02-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514650" version="1" comment="xen-libs-32bit is &lt;4.4.2_02-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514651" version="1" comment="MozillaFirefox is &lt;31.6.0esr-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514652" version="1" comment="MozillaFirefox-translations is &lt;31.6.0esr-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514653" version="1" comment="flash-player is &lt;11.2.202.457-80.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514654" version="1" comment="flash-player-gnome is &lt;11.2.202.457-80.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514655" version="1" comment="gnutls is &lt;3.2.15-7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514656" version="1" comment="libgnutls28 is &lt;3.2.15-7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514657" version="1" comment="libgnutls28-32bit is &lt;3.2.15-7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514658" version="1" comment="libmysqlclient18 is &lt;10.0.16-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514659" version="1" comment="libmysqlclient18-32bit is &lt;10.0.16-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514660" version="1" comment="libmysqlclient_r18 is &lt;10.0.16-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514661" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.16-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514662" version="1" comment="mariadb is &lt;10.0.16-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514663" version="1" comment="mariadb-client is &lt;10.0.16-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514664" version="1" comment="mariadb-errormessages is &lt;10.0.16-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514665" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.79-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514666" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.79-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514667" version="1" comment="cups-filters is &lt;1.0.58-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514668" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514669" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514670" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514671" version="1" comment="gdm is &lt;3.10.0.1-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514672" version="1" comment="gdm-branding-upstream is &lt;3.10.0.1-16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514673" version="1" comment="gdm-lang is &lt;3.10.0.1-16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514674" version="1" comment="gdmflexiserver is &lt;3.10.0.1-16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514675" version="1" comment="libgdm1 is &lt;3.10.0.1-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514676" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514677" version="1" comment="xorg-x11-server is &lt;7.6_1.15.2-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514678" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.15.2-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514679" version="1" comment="DirectFB is &lt;1.7.1-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514680" version="1" comment="lib++dfb-1_7-1 is &lt;1.7.1-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514681" version="1" comment="libdirectfb-1_7-1 is &lt;1.7.1-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514682" version="1" comment="libdirectfb-1_7-1-32bit is &lt;1.7.1-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514683" version="1" comment="flash-player is &lt;11.2.202.429-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514684" version="1" comment="flash-player-gnome is &lt;11.2.202.429-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514685" version="1" comment="ntp is &lt;4.2.6p5-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514686" version="1" comment="ntp-doc is &lt;4.2.6p5-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514687" version="1" comment="gd is &lt;2.1.0-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514688" version="1" comment="gd-32bit is &lt;2.1.0-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514689" version="1" comment="flash-player is &lt;11.2.202.460-83.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514690" version="1" comment="flash-player-gnome is &lt;11.2.202.460-83.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514691" version="1" comment="clamav is &lt;0.98.7-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514692" version="1" comment="libspice-server1 is &lt;0.12.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514693" version="1" comment="qemu is &lt;2.0.2-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514694" version="1" comment="qemu-block-curl is &lt;2.0.2-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514695" version="1" comment="qemu-ipxe is &lt;1.0.0-46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514696" version="1" comment="qemu-kvm is &lt;2.0.2-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514697" version="1" comment="qemu-seabios is &lt;1.7.4-46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514698" version="1" comment="qemu-sgabios is &lt;8-46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514699" version="1" comment="qemu-tools is &lt;2.0.2-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514700" version="1" comment="qemu-vgabios is &lt;1.7.4-46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514701" version="1" comment="qemu-x86 is &lt;2.0.2-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514702" version="1" comment="libtasn1 is &lt;3.7-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514703" version="1" comment="libtasn1-6 is &lt;3.7-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514704" version="1" comment="libtasn1-6-32bit is &lt;3.7-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514705" version="1" comment="xen is &lt;4.4.2_04-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514706" version="1" comment="xen-kmp-default is &lt;4.4.2_04_k3.12.39_47-18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514707" version="1" comment="xen-libs is &lt;4.4.2_04-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514708" version="1" comment="xen-libs-32bit is &lt;4.4.2_04-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514709" version="1" comment="kernel-default is &lt;3.12.32-33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514710" version="1" comment="kernel-default-devel is &lt;3.12.32-33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514711" version="1" comment="kernel-default-extra is &lt;3.12.32-33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514712" version="1" comment="kernel-devel is &lt;3.12.32-33.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514713" version="1" comment="kernel-macros is &lt;3.12.32-33.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514714" version="1" comment="kernel-source is &lt;3.12.32-33.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514715" version="1" comment="kernel-syms is &lt;3.12.32-33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514716" version="1" comment="kernel-xen is &lt;3.12.32-33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514717" version="1" comment="kernel-xen-devel is &lt;3.12.32-33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514718" version="1" comment="libfltk1 is &lt;1.3.2-10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514719" version="1" comment="tigervnc is &lt;1.4.1-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514720" version="1" comment="xorg-x11-Xvnc is &lt;1.4.1-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514721" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514722" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514723" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514724" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514725" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514726" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514727" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514728" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514729" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514730" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514731" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514732" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514733" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514734" version="1" comment="perl-YAML-LibYAML is &lt;0.38-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514735" version="1" comment="MozillaFirefox is &lt;31.7.0esr-34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514736" version="1" comment="MozillaFirefox-translations is &lt;31.7.0esr-34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514737" version="1" comment="dnsmasq is &lt;2.71-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514738" version="1" comment="curl is &lt;7.37.0-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514739" version="1" comment="libcurl4 is &lt;7.37.0-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514740" version="1" comment="libcurl4-32bit is &lt;7.37.0-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514741" version="1" comment="wpa_supplicant is &lt;2.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514742" version="1" comment="vorbis-tools is &lt;1.4.0-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514743" version="1" comment="vorbis-tools-lang is &lt;1.4.0-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514744" version="1" comment="patch is &lt;2.7.5-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514745" version="1" comment="autofs is &lt;5.0.9-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514746" version="1" comment="MozillaFirefox is &lt;31.4.0esr-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514747" version="1" comment="MozillaFirefox-translations is &lt;31.4.0esr-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514748" version="1" comment="libfreebl3 is &lt;3.17.3-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514749" version="1" comment="libfreebl3-32bit is &lt;3.17.3-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514750" version="1" comment="libsoftokn3 is &lt;3.17.3-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514751" version="1" comment="libsoftokn3-32bit is &lt;3.17.3-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514752" version="1" comment="mozilla-nss is &lt;3.17.3-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514753" version="1" comment="mozilla-nss-32bit is &lt;3.17.3-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514754" version="1" comment="mozilla-nss-certs is &lt;3.17.3-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514755" version="1" comment="mozilla-nss-certs-32bit is &lt;3.17.3-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514756" version="1" comment="mozilla-nss-tools is &lt;3.17.3-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514757" version="1" comment="xen is &lt;4.4.2_06-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514758" version="1" comment="xen-kmp-default is &lt;4.4.2_06_k3.12.39_47-21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514759" version="1" comment="xen-libs is &lt;4.4.2_06-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514760" version="1" comment="xen-libs-32bit is &lt;4.4.2_06-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514761" version="1" comment="flash-player is &lt;11.2.202.466-86.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514762" version="1" comment="flash-player-gnome is &lt;11.2.202.466-86.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514763" version="1" comment="cups is &lt;1.7.5-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514764" version="1" comment="cups-client is &lt;1.7.5-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514765" version="1" comment="cups-libs is &lt;1.7.5-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514766" version="1" comment="cups-libs-32bit is &lt;1.7.5-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514767" version="1" comment="wireshark is &lt;1.10.14-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514768" version="1" comment="fuse is &lt;2.9.3-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514769" version="1" comment="libfuse2 is &lt;2.9.3-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514770" version="1" comment="kernel-default is &lt;3.12.43-52.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514771" version="1" comment="kernel-default-devel is &lt;3.12.43-52.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514772" version="1" comment="kernel-default-extra is &lt;3.12.43-52.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514773" version="1" comment="kernel-devel is &lt;3.12.43-52.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514774" version="1" comment="kernel-macros is &lt;3.12.43-52.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514775" version="1" comment="kernel-source is &lt;3.12.43-52.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514776" version="1" comment="kernel-syms is &lt;3.12.43-52.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514777" version="1" comment="kernel-xen is &lt;3.12.43-52.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514778" version="1" comment="kernel-xen-devel is &lt;3.12.43-52.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514779" version="1" comment="libldap-2_4-2 is &lt;2.4.39-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514780" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.39-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514781" version="1" comment="openldap2-client is &lt;2.4.39-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514782" version="1" comment="xorg-x11-server is &lt;7.6_1.15.2-28.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514783" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.15.2-28.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514784" version="1" comment="flash-player is &lt;11.2.202.468-89.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514785" version="1" comment="flash-player-gnome is &lt;11.2.202.468-89.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514786" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514787" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514788" version="1" comment="openssl is &lt;1.0.1i-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514789" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514790" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514791" version="1" comment="curl is &lt;7.37.0-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514792" version="1" comment="libcurl4 is &lt;7.37.0-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514793" version="1" comment="libcurl4-32bit is &lt;7.37.0-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514794" version="1" comment="libgcrypt20 is &lt;1.6.1-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514795" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514796" version="1" comment="strongswan is &lt;5.1.3-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514797" version="1" comment="strongswan-doc is &lt;5.1.3-18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514798" version="1" comment="strongswan-ipsec is &lt;5.1.3-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514799" version="1" comment="strongswan-libs0 is &lt;5.1.3-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514800" version="1" comment="mutt is &lt;1.5.21-49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514801" version="1" comment="bind-libs is &lt;9.9.6P1-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514802" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514803" version="1" comment="bind-utils is &lt;9.9.6P1-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514804" version="1" comment="flash-player is &lt;11.2.202.481-93.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514805" version="1" comment="flash-player-gnome is &lt;11.2.202.481-93.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514806" version="1" comment="libaugeas0 is &lt;1.2.0-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514807" version="1" comment="flash-player is &lt;11.2.202.491-96.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514808" version="1" comment="flash-player-gnome is &lt;11.2.202.491-96.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514809" version="1" comment="libecpg6 is &lt;9.3.8-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514810" version="1" comment="libpq5 is &lt;9.3.8-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514811" version="1" comment="libpq5-32bit is &lt;9.3.8-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514812" version="1" comment="postgresql93 is &lt;9.3.8-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514813" version="1" comment="libpng16-16 is &lt;1.6.8-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514814" version="1" comment="libpng16-16-32bit is &lt;1.6.8-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514815" version="1" comment="MozillaFirefox is &lt;31.8.0esr-37.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514816" version="1" comment="MozillaFirefox-translations is &lt;31.8.0esr-37.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514817" version="1" comment="libfreebl3 is &lt;3.19.2_CKBI_1.98-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514818" version="1" comment="libfreebl3-32bit is &lt;3.19.2_CKBI_1.98-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514819" version="1" comment="libsoftokn3 is &lt;3.19.2_CKBI_1.98-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514820" version="1" comment="libsoftokn3-32bit is &lt;3.19.2_CKBI_1.98-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514821" version="1" comment="mozilla-nspr is &lt;4.10.8-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514822" version="1" comment="mozilla-nspr-32bit is &lt;4.10.8-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514823" version="1" comment="mozilla-nss is &lt;3.19.2_CKBI_1.98-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514824" version="1" comment="mozilla-nss-32bit is &lt;3.19.2_CKBI_1.98-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514825" version="1" comment="mozilla-nss-certs is &lt;3.19.2_CKBI_1.98-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514826" version="1" comment="mozilla-nss-certs-32bit is &lt;3.19.2_CKBI_1.98-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514827" version="1" comment="mozilla-nss-tools is &lt;3.19.2_CKBI_1.98-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514828" version="1" comment="libmysqlclient18 is &lt;10.0.20-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514829" version="1" comment="libmysqlclient18-32bit is &lt;10.0.20-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514830" version="1" comment="libmysqlclient_r18 is &lt;10.0.20-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514831" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.20-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514832" version="1" comment="mariadb is &lt;10.0.20-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514833" version="1" comment="mariadb-client is &lt;10.0.20-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514834" version="1" comment="mariadb-errormessages is &lt;10.0.20-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514835" version="1" comment="libruby2_1-2_1 is &lt;2.1.2-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514836" version="1" comment="ruby2.1 is &lt;2.1.2-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514837" version="1" comment="ruby2.1-stdlib is &lt;2.1.2-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514838" version="1" comment="xen is &lt;4.4.2_08-22.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514839" version="1" comment="xen-kmp-default is &lt;4.4.2_08_k3.12.43_52.6-22.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514840" version="1" comment="xen-libs is &lt;4.4.2_08-22.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514841" version="1" comment="xen-libs-32bit is &lt;4.4.2_08-22.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514842" version="1" comment="bind-libs is &lt;9.9.6P1-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514843" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514844" version="1" comment="bind-utils is &lt;9.9.6P1-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514845" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.85-18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514846" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.85-18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514847" version="1" comment="kernel-default is &lt;3.12.44-52.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514848" version="1" comment="kernel-default-devel is &lt;3.12.44-52.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514849" version="1" comment="kernel-default-extra is &lt;3.12.44-52.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514850" version="1" comment="kernel-devel is &lt;3.12.44-52.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514851" version="1" comment="kernel-macros is &lt;3.12.44-52.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514852" version="1" comment="kernel-source is &lt;3.12.44-52.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514853" version="1" comment="kernel-syms is &lt;3.12.44-52.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514854" version="1" comment="kernel-xen is &lt;3.12.44-52.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514855" version="1" comment="kernel-xen-devel is &lt;3.12.44-52.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514856" version="1" comment="bind-libs is &lt;9.9.5P1-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514857" version="1" comment="bind-libs-32bit is &lt;9.9.5P1-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514858" version="1" comment="bind-utils is &lt;9.9.5P1-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514859" version="1" comment="e2fsprogs is &lt;1.42.11-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514860" version="1" comment="libcom_err2 is &lt;1.42.11-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514861" version="1" comment="libcom_err2-32bit is &lt;1.42.11-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514862" version="1" comment="libext2fs2 is &lt;1.42.11-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514863" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514864" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514865" version="1" comment="python is &lt;2.7.9-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514866" version="1" comment="python-base is &lt;2.7.9-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514867" version="1" comment="python-curses is &lt;2.7.9-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514868" version="1" comment="python-devel is &lt;2.7.9-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514869" version="1" comment="python-tk is &lt;2.7.9-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514870" version="1" comment="python-xml is &lt;2.7.9-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514871" version="1" comment="libqt4 is &lt;4.8.6-4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514872" version="1" comment="libqt4-32bit is &lt;4.8.6-4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514873" version="1" comment="libqt4-qt3support is &lt;4.8.6-4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514874" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.6-4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514875" version="1" comment="libqt4-sql is &lt;4.8.6-4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514876" version="1" comment="libqt4-sql-32bit is &lt;4.8.6-4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514877" version="1" comment="libqt4-sql-mysql is &lt;4.8.6-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514878" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.6-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514879" version="1" comment="libqt4-sql-postgresql is &lt;4.8.6-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514880" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.6-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514881" version="1" comment="libqt4-sql-sqlite is &lt;4.8.6-4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514882" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.6-4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514883" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.6-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514884" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.6-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514885" version="1" comment="libqt4-x11 is &lt;4.8.6-4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514886" version="1" comment="libqt4-x11-32bit is &lt;4.8.6-4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514887" version="1" comment="evolution-data-server is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514888" version="1" comment="evolution-data-server-lang is &lt;3.10.4-5.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514889" version="1" comment="libcamel-1_2-45 is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514890" version="1" comment="libcamel-1_2-45-32bit is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514891" version="1" comment="libebackend-1_2-7 is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514892" version="1" comment="libebackend-1_2-7-32bit is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514893" version="1" comment="libebook-1_2-14 is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514894" version="1" comment="libebook-1_2-14-32bit is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514895" version="1" comment="libebook-contacts-1_2-0 is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514896" version="1" comment="libebook-contacts-1_2-0-32bit is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514897" version="1" comment="libecal-1_2-16 is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514898" version="1" comment="libecal-1_2-16-32bit is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514899" version="1" comment="libedata-book-1_2-20 is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514900" version="1" comment="libedata-book-1_2-20-32bit is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514901" version="1" comment="libedata-cal-1_2-23 is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514902" version="1" comment="libedata-cal-1_2-23-32bit is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514903" version="1" comment="libedataserver-1_2-18 is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514904" version="1" comment="libedataserver-1_2-18-32bit is &lt;3.10.4-5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514905" version="1" comment="flash-player is &lt;11.2.202.508-99.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514906" version="1" comment="flash-player-gnome is &lt;11.2.202.508-99.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514907" version="1" comment="cups-filters is &lt;1.0.58-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514908" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514909" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514910" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514911" version="1" comment="MozillaFirefox is &lt;31.8.0esr-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514912" version="1" comment="MozillaFirefox-translations is &lt;31.8.0esr-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514913" version="1" comment="xen is &lt;4.4.2_10-22.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514914" version="1" comment="xen-kmp-default is &lt;4.4.2_10_k3.12.44_52.10-22.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514915" version="1" comment="xen-libs is &lt;4.4.2_10-22.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514916" version="1" comment="xen-libs-32bit is &lt;4.4.2_10-22.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514917" version="1" comment="libQt5Core5 is &lt;5.3.1-4.4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514918" version="1" comment="libQt5DBus5 is &lt;5.3.1-4.4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514919" version="1" comment="libQt5Gui5 is &lt;5.3.1-4.4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514920" version="1" comment="libQt5Widgets5 is &lt;5.3.1-4.4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514921" version="1" comment="libyaml-0-2 is &lt;0.1.6-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514922" version="1" comment="rpm is &lt;4.11.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514923" version="1" comment="rpm-32bit is &lt;4.11.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514924" version="1" comment="rpm-build is &lt;4.11.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514925" version="1" comment="rpm-python is &lt;4.11.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514926" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514927" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514928" version="1" comment="openssl is &lt;1.0.1i-27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514929" version="1" comment="flash-player is &lt;11.2.202.438-27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514930" version="1" comment="flash-player-gnome is &lt;11.2.202.438-27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514931" version="1" comment="flash-player is &lt;11.2.202.440-31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514932" version="1" comment="flash-player-gnome is &lt;11.2.202.440-31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514933" version="1" comment="p7zip is &lt;9.20.1-3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514934" version="1" comment="binutils is &lt;2.24-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514935" version="1" comment="perl-XML-LibXML is &lt;2.0019-5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514936" version="1" comment="busybox is &lt;1.21.1-3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514937" version="1" comment="libsndfile1 is &lt;1.0.25-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514938" version="1" comment="libsndfile1-32bit is &lt;1.0.25-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514939" version="1" comment="MozillaFirefox is &lt;38.2.1esr-45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514940" version="1" comment="MozillaFirefox-branding-SLE is &lt;31.0-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514941" version="1" comment="MozillaFirefox-translations is &lt;38.2.1esr-45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514942" version="1" comment="libfreebl3 is &lt;3.19.2.0-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514943" version="1" comment="libfreebl3-32bit is &lt;3.19.2.0-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514944" version="1" comment="libsoftokn3 is &lt;3.19.2.0-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514945" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.0-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514946" version="1" comment="mozilla-nss is &lt;3.19.2.0-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514947" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.0-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514948" version="1" comment="mozilla-nss-certs is &lt;3.19.2.0-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514949" version="1" comment="mozilla-nss-certs-32bit is &lt;3.19.2.0-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514950" version="1" comment="mozilla-nss-tools is &lt;3.19.2.0-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514951" version="1" comment="libtiff5 is &lt;4.0.4-12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514952" version="1" comment="libtiff5-32bit is &lt;4.0.4-12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514953" version="1" comment="bind-libs is &lt;9.9.6P1-26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514954" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514955" version="1" comment="bind-utils is &lt;9.9.6P1-26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514956" version="1" comment="kernel-default is &lt;3.12.36-38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514957" version="1" comment="kernel-default-devel is &lt;3.12.36-38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514958" version="1" comment="kernel-default-extra is &lt;3.12.36-38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514959" version="1" comment="kernel-devel is &lt;3.12.36-38.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514960" version="1" comment="kernel-macros is &lt;3.12.36-38.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514961" version="1" comment="kernel-source is &lt;3.12.36-38.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514962" version="1" comment="kernel-syms is &lt;3.12.36-38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514963" version="1" comment="kernel-xen is &lt;3.12.36-38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514964" version="1" comment="kernel-xen-devel is &lt;3.12.36-38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514965" version="1" comment="libwmf-0_2-7 is &lt;0.2.8.4-242.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514966" version="1" comment="clamav is &lt;0.98.5-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514967" version="1" comment="libzmq3 is &lt;4.0.4-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514968" version="1" comment="libjasper1 is &lt;1.900.1-166.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514969" version="1" comment="libjasper1-32bit is &lt;1.900.1-166.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514970" version="1" comment="libgcrypt20 is &lt;1.6.1-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514971" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514972" version="1" comment="qemu is &lt;2.0.2-48.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514973" version="1" comment="qemu-block-curl is &lt;2.0.2-48.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514974" version="1" comment="qemu-ipxe is &lt;1.0.0-48.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514975" version="1" comment="qemu-kvm is &lt;2.0.2-48.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514976" version="1" comment="qemu-seabios is &lt;1.7.4-48.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514977" version="1" comment="qemu-sgabios is &lt;8-48.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514978" version="1" comment="qemu-tools is &lt;2.0.2-48.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514979" version="1" comment="qemu-vgabios is &lt;1.7.4-48.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514980" version="1" comment="qemu-x86 is &lt;2.0.2-48.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514981" version="1" comment="gnutls is &lt;3.2.15-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514982" version="1" comment="libgnutls28 is &lt;3.2.15-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514983" version="1" comment="libgnutls28-32bit is &lt;3.2.15-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514984" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514985" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514986" version="1" comment="openssl is &lt;1.0.1i-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514987" version="1" comment="openssh is &lt;6.6p1-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514988" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514989" version="1" comment="openssh-helpers is &lt;6.6p1-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514990" version="1" comment="libmpfr4 is &lt;3.1.2-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514991" version="1" comment="libsnmp30 is &lt;5.7.2.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514992" version="1" comment="libsnmp30-32bit is &lt;5.7.2.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514993" version="1" comment="net-snmp is &lt;5.7.2.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514994" version="1" comment="perl-SNMP is &lt;5.7.2.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514995" version="1" comment="snmp-mibs is &lt;5.7.2.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514996" version="1" comment="flash-player is &lt;11.2.202.442-67.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514997" version="1" comment="flash-player-gnome is &lt;11.2.202.442-67.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514998" version="1" comment="flash-player is &lt;11.2.202.521-102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009514999" version="1" comment="flash-player-gnome is &lt;11.2.202.521-102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515000" version="1" comment="kernel-default is &lt;3.12.44-52.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515001" version="1" comment="kernel-default-devel is &lt;3.12.44-52.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515002" version="1" comment="kernel-default-extra is &lt;3.12.44-52.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515003" version="1" comment="kernel-devel is &lt;3.12.44-52.18.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515004" version="1" comment="kernel-macros is &lt;3.12.44-52.18.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515005" version="1" comment="kernel-source is &lt;3.12.44-52.18.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515006" version="1" comment="kernel-syms is &lt;3.12.44-52.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515007" version="1" comment="kernel-xen is &lt;3.12.44-52.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515008" version="1" comment="kernel-xen-devel is &lt;3.12.44-52.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515009" version="1" comment="libvirt is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515010" version="1" comment="libvirt-client is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515011" version="1" comment="libvirt-client-32bit is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515012" version="1" comment="libvirt-daemon is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515013" version="1" comment="libvirt-daemon-config-network is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515014" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515015" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515016" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515017" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515018" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515019" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515020" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515021" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515022" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515023" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515024" version="1" comment="libvirt-daemon-lxc is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515025" version="1" comment="libvirt-daemon-qemu is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515026" version="1" comment="libvirt-daemon-xen is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515027" version="1" comment="libvirt-doc is &lt;1.2.5-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515028" version="1" comment="coreutils is &lt;8.22-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515029" version="1" comment="coreutils-lang is &lt;8.22-9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515030" version="1" comment="MozillaFirefox is &lt;38.3.0esr-48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515031" version="1" comment="MozillaFirefox-translations is &lt;38.3.0esr-48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515032" version="1" comment="mozilla-nspr is &lt;4.10.9-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515033" version="1" comment="mozilla-nspr-32bit is &lt;4.10.9-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515034" version="1" comment="java-1_7_0-openjdk-plugin is &lt;1.6.1-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515035" version="1" comment="rpcbind is &lt;0.2.1_rc4-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515036" version="1" comment="libssh4 is &lt;0.6.3-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515037" version="1" comment="wireshark is &lt;1.12.7-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515038" version="1" comment="kernel-default is &lt;3.12.48-52.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515039" version="1" comment="kernel-default-devel is &lt;3.12.48-52.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515040" version="1" comment="kernel-default-extra is &lt;3.12.48-52.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515041" version="1" comment="kernel-devel is &lt;3.12.48-52.27.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515042" version="1" comment="kernel-macros is &lt;3.12.48-52.27.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515043" version="1" comment="kernel-source is &lt;3.12.48-52.27.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515044" version="1" comment="kernel-syms is &lt;3.12.48-52.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515045" version="1" comment="kernel-xen is &lt;3.12.48-52.27.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515046" version="1" comment="kernel-xen-devel is &lt;3.12.48-52.27.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515047" version="1" comment="libblkid1 is &lt;2.25-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515048" version="1" comment="libblkid1-32bit is &lt;2.25-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515049" version="1" comment="libmount1 is &lt;2.25-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515050" version="1" comment="libmount1-32bit is &lt;2.25-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515051" version="1" comment="libsmartcols1 is &lt;2.25-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515052" version="1" comment="libuuid-devel is &lt;2.25-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515053" version="1" comment="libuuid1 is &lt;2.25-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515054" version="1" comment="libuuid1-32bit is &lt;2.25-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515055" version="1" comment="python-libmount is &lt;2.25-10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515056" version="1" comment="util-linux is &lt;2.25-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515057" version="1" comment="util-linux-lang is &lt;2.25-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515058" version="1" comment="util-linux-systemd is &lt;2.25-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515059" version="1" comment="uuidd is &lt;2.25-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515060" version="1" comment="libspice-server1 is &lt;0.12.4-8.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515061" version="1" comment="xdg-utils is &lt;20140630-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515062" version="1" comment="flash-player is &lt;11.2.202.535-105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515063" version="1" comment="flash-player-gnome is &lt;11.2.202.535-105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515064" version="1" comment="ntp is &lt;4.2.6p5-37.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515065" version="1" comment="ntp-doc is &lt;4.2.6p5-37.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515066" version="1" comment="vorbis-tools is &lt;1.4.0-26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515067" version="1" comment="vorbis-tools-lang is &lt;1.4.0-26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515068" version="1" comment="flash-player is &lt;11.2.202.540-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515069" version="1" comment="flash-player-gnome is &lt;11.2.202.540-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515070" version="1" comment="strongswan is &lt;5.1.3-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515071" version="1" comment="strongswan-doc is &lt;5.1.3-9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515072" version="1" comment="strongswan-ipsec is &lt;5.1.3-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515073" version="1" comment="strongswan-libs0 is &lt;5.1.3-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515074" version="1" comment="qemu is &lt;2.0.2-48.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515075" version="1" comment="qemu-block-curl is &lt;2.0.2-48.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515076" version="1" comment="qemu-ipxe is &lt;1.0.0-48.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515077" version="1" comment="qemu-kvm is &lt;2.0.2-48.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515078" version="1" comment="qemu-seabios is &lt;1.7.4-48.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515079" version="1" comment="qemu-sgabios is &lt;8-48.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515080" version="1" comment="qemu-tools is &lt;2.0.2-48.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515081" version="1" comment="qemu-vgabios is &lt;1.7.4-48.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515082" version="1" comment="qemu-x86 is &lt;2.0.2-48.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515083" version="1" comment="libjasper1 is &lt;1.900.1-170.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515084" version="1" comment="libjasper1-32bit is &lt;1.900.1-170.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515085" version="1" comment="krb5 is &lt;1.12.1-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515086" version="1" comment="krb5-32bit is &lt;1.12.1-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515087" version="1" comment="krb5-client is &lt;1.12.1-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515088" version="1" comment="postgresql93 is &lt;9.3.10-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515089" version="1" comment="clamav is &lt;0.98.6-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515090" version="1" comment="cpp48 is &lt;4.8.5-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515091" version="1" comment="gcc48 is &lt;4.8.5-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515092" version="1" comment="gcc48-32bit is &lt;4.8.5-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515093" version="1" comment="gcc48-c++ is &lt;4.8.5-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515094" version="1" comment="gcc48-gij is &lt;4.8.5-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515095" version="1" comment="gcc48-gij-32bit is &lt;4.8.5-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515096" version="1" comment="gcc48-info is &lt;4.8.5-24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515097" version="1" comment="libasan0 is &lt;4.8.5-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515098" version="1" comment="libasan0-32bit is &lt;4.8.5-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515099" version="1" comment="libgcj48 is &lt;4.8.5-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515100" version="1" comment="libgcj48-32bit is &lt;4.8.5-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515101" version="1" comment="libgcj48-jar is &lt;4.8.5-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515102" version="1" comment="libgcj_bc1 is &lt;4.8.5-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515103" version="1" comment="libstdc++48-devel is &lt;4.8.5-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515104" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515105" version="1" comment="libpolkit0 is &lt;0.113-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515106" version="1" comment="libpolkit0-32bit is &lt;0.113-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515107" version="1" comment="polkit is &lt;0.113-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515108" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515109" version="1" comment="elfutils is &lt;0.158-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515110" version="1" comment="libasm1 is &lt;0.158-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515111" version="1" comment="libdw1 is &lt;0.158-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515112" version="1" comment="libdw1-32bit is &lt;0.158-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515113" version="1" comment="libebl1 is &lt;0.158-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515114" version="1" comment="libebl1-32bit is &lt;0.158-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515115" version="1" comment="libelf1 is &lt;0.158-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515116" version="1" comment="libelf1-32bit is &lt;0.158-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515117" version="1" comment="glibc is &lt;2.19-22.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515118" version="1" comment="glibc-32bit is &lt;2.19-22.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515119" version="1" comment="glibc-devel is &lt;2.19-22.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515120" version="1" comment="glibc-devel-32bit is &lt;2.19-22.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515121" version="1" comment="glibc-i18ndata is &lt;2.19-22.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515122" version="1" comment="glibc-locale is &lt;2.19-22.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515123" version="1" comment="glibc-locale-32bit is &lt;2.19-22.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515124" version="1" comment="nscd is &lt;2.19-22.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515125" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-70.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515126" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-70.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515127" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.91-21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515128" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.91-21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515129" version="1" comment="libvdpau1 is &lt;0.8-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515130" version="1" comment="libvdpau1-32bit is &lt;0.8-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515131" version="1" comment="krb5 is &lt;1.12.1-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515132" version="1" comment="krb5-32bit is &lt;1.12.1-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515133" version="1" comment="krb5-client is &lt;1.12.1-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515134" version="1" comment="xen is &lt;4.4.3_02-22.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515135" version="1" comment="xen-kmp-default is &lt;4.4.3_02_k3.12.48_52.27-22.12.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515136" version="1" comment="xen-libs is &lt;4.4.3_02-22.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515137" version="1" comment="xen-libs-32bit is &lt;4.4.3_02-22.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515138" version="1" comment="apache-commons-logging is &lt;1.1.3-7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515139" version="1" comment="flute is &lt;1.3.0-4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515140" version="1" comment="libabw-0_1-1 is &lt;0.1.1-5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515141" version="1" comment="libbase is &lt;1.1.3-4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515142" version="1" comment="libcdr-0_1-1 is &lt;0.1.1-5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515143" version="1" comment="libcmis-0_5-5 is &lt;0.5.0-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515144" version="1" comment="libe-book-0_1-1 is &lt;0.1.2-4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515145" version="1" comment="libetonyek-0_1-1 is &lt;0.1.3-3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515146" version="1" comment="libfonts is &lt;1.1.3-4.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515147" version="1" comment="libformula is &lt;1.1.3-4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515148" version="1" comment="libfreehand-0_1-1 is &lt;0.1.1-4.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515149" version="1" comment="libgltf-0_0-0 is &lt;0.0.1-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515150" version="1" comment="libgraphite2-3 is &lt;1.3.1-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515151" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515152" version="1" comment="libhyphen0 is &lt;2.8.8-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515153" version="1" comment="libixion-0_10-0 is &lt;0.9.1-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515154" version="1" comment="liblangtag1 is &lt;0.5.7-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515155" version="1" comment="liblayout is &lt;0.2.10-4.8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515156" version="1" comment="libloader is &lt;1.1.3-3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515157" version="1" comment="libmspub-0_1-1 is &lt;0.1.2-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515158" version="1" comment="libmwaw-0_3-3 is &lt;0.3.6-3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515159" version="1" comment="libodfgen-0_1-1 is &lt;0.1.4-3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515160" version="1" comment="liborcus-0_8-0 is &lt;0.7.1-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515161" version="1" comment="libpagemaker-0_0-0 is &lt;0.0.2-2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515162" version="1" comment="libreoffice is &lt;5.0.2.2-13.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515163" version="1" comment="libreoffice-base is &lt;5.0.2.2-13.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515164" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.0.2.2-13.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515165" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.0.2.2-13.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515166" version="1" comment="libreoffice-calc is &lt;5.0.2.2-13.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515167" version="1" comment="libreoffice-calc-extensions is &lt;5.0.2.2-13.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515168" version="1" comment="libreoffice-draw is &lt;5.0.2.2-13.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515169" version="1" comment="libreoffice-filters-optional is &lt;5.0.2.2-13.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515170" version="1" comment="libreoffice-gnome is &lt;5.0.2.2-13.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515171" version="1" comment="libreoffice-icon-theme-tango is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515172" version="1" comment="libreoffice-impress is &lt;5.0.2.2-13.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515173" version="1" comment="libreoffice-l10n-af is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515174" version="1" comment="libreoffice-l10n-ar is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515175" version="1" comment="libreoffice-l10n-ca is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515176" version="1" comment="libreoffice-l10n-cs is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515177" version="1" comment="libreoffice-l10n-da is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515178" version="1" comment="libreoffice-l10n-de is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515179" version="1" comment="libreoffice-l10n-en is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515180" version="1" comment="libreoffice-l10n-es is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515181" version="1" comment="libreoffice-l10n-fi is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515182" version="1" comment="libreoffice-l10n-fr is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515183" version="1" comment="libreoffice-l10n-gu is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515184" version="1" comment="libreoffice-l10n-hi is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515185" version="1" comment="libreoffice-l10n-hu is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515186" version="1" comment="libreoffice-l10n-it is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515187" version="1" comment="libreoffice-l10n-ja is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515188" version="1" comment="libreoffice-l10n-ko is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515189" version="1" comment="libreoffice-l10n-nb is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515190" version="1" comment="libreoffice-l10n-nl is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515191" version="1" comment="libreoffice-l10n-nn is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515192" version="1" comment="libreoffice-l10n-pl is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515193" version="1" comment="libreoffice-l10n-pt-BR is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515194" version="1" comment="libreoffice-l10n-pt-PT is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515195" version="1" comment="libreoffice-l10n-ru is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515196" version="1" comment="libreoffice-l10n-sk is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515197" version="1" comment="libreoffice-l10n-sv is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515198" version="1" comment="libreoffice-l10n-xh is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515199" version="1" comment="libreoffice-l10n-zh-Hans is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515200" version="1" comment="libreoffice-l10n-zh-Hant is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515201" version="1" comment="libreoffice-l10n-zu is &lt;5.0.2.2-13.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515202" version="1" comment="libreoffice-mailmerge is &lt;5.0.2.2-13.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515203" version="1" comment="libreoffice-math is &lt;5.0.2.2-13.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515204" version="1" comment="libreoffice-officebean is &lt;5.0.2.2-13.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515205" version="1" comment="libreoffice-pyuno is &lt;5.0.2.2-13.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515206" version="1" comment="libreoffice-share-linker is &lt;1-2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515207" version="1" comment="libreoffice-voikko is &lt;4.1-6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009107086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515208" version="1" comment="libreoffice-writer is &lt;5.0.2.2-13.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515209" version="1" comment="libreoffice-writer-extensions is &lt;5.0.2.2-13.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515210" version="1" comment="librepository is &lt;1.1.3-4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515211" version="1" comment="librevenge-0_0-0 is &lt;0.0.2-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515212" version="1" comment="librevenge-stream-0_0-0 is &lt;0.0.2-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515213" version="1" comment="libserializer is &lt;1.1.2-4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515214" version="1" comment="libvisio-0_1-1 is &lt;0.1.3-4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515215" version="1" comment="libvoikko1 is &lt;3.7.1-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515216" version="1" comment="libwps-0_4-4 is &lt;0.4.1-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515217" version="1" comment="malaga-suomi is &lt;1.18-3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515218" version="1" comment="myspell-af_ZA is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515219" version="1" comment="myspell-ar is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515220" version="1" comment="myspell-be_BY is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515221" version="1" comment="myspell-bg_BG is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515222" version="1" comment="myspell-bn_BD is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515223" version="1" comment="myspell-bs_BA is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515224" version="1" comment="myspell-ca is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515225" version="1" comment="myspell-cs_CZ is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515226" version="1" comment="myspell-da_DK is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515227" version="1" comment="myspell-de is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515228" version="1" comment="myspell-dictionaries is &lt;20150827-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515229" version="1" comment="myspell-el_GR is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515230" version="1" comment="myspell-en is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515231" version="1" comment="myspell-es is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515232" version="1" comment="myspell-et_EE is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515233" version="1" comment="myspell-fr_FR is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515234" version="1" comment="myspell-gu_IN is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515235" version="1" comment="myspell-he_IL is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515236" version="1" comment="myspell-hi_IN is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515237" version="1" comment="myspell-hr_HR is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515238" version="1" comment="myspell-hu_HU is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515239" version="1" comment="myspell-it_IT is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515240" version="1" comment="myspell-lo_LA is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515241" version="1" comment="myspell-lt_LT is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515242" version="1" comment="myspell-lv_LV is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515243" version="1" comment="myspell-nl_NL is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515244" version="1" comment="myspell-no is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515245" version="1" comment="myspell-pl_PL is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515246" version="1" comment="myspell-pt_BR is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515247" version="1" comment="myspell-pt_PT is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515248" version="1" comment="myspell-ro is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515249" version="1" comment="myspell-ru_RU is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515250" version="1" comment="myspell-sk_SK is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515251" version="1" comment="myspell-sl_SI is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515252" version="1" comment="myspell-sr is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515253" version="1" comment="myspell-sv_SE is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515254" version="1" comment="myspell-te_IN is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515255" version="1" comment="myspell-th_TH is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515256" version="1" comment="myspell-vi is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515257" version="1" comment="myspell-zu_ZA is &lt;20150827-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515258" version="1" comment="pentaho-libxml is &lt;1.1.3-4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515259" version="1" comment="pentaho-reporting-flow-engine is &lt;0.9.4-4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515260" version="1" comment="sac is &lt;1.3-4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515261" version="1" comment="xen is &lt;4.4.1_08-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515262" version="1" comment="xen-kmp-default is &lt;4.4.1_08_k3.12.28_4-5.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515263" version="1" comment="xen-libs is &lt;4.4.1_08-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515264" version="1" comment="xen-libs-32bit is &lt;4.4.1_08-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515265" version="1" comment="MozillaFirefox is &lt;38.4.0esr-51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515266" version="1" comment="MozillaFirefox-branding-SLE is &lt;31.0-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515267" version="1" comment="MozillaFirefox-translations is &lt;38.4.0esr-51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515268" version="1" comment="libfreebl3 is &lt;3.19.2.1-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515269" version="1" comment="libfreebl3-32bit is &lt;3.19.2.1-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515270" version="1" comment="libsoftokn3 is &lt;3.19.2.1-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515271" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.1-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515272" version="1" comment="mozilla-nspr is &lt;4.10.10-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515273" version="1" comment="mozilla-nspr-32bit is &lt;4.10.10-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515274" version="1" comment="mozilla-nss is &lt;3.19.2.1-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515275" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.1-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515276" version="1" comment="mozilla-nss-certs is &lt;3.19.2.1-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515277" version="1" comment="mozilla-nss-certs-32bit is &lt;3.19.2.1-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515278" version="1" comment="mozilla-nss-tools is &lt;3.19.2.1-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515279" version="1" comment="wireshark is &lt;1.10.12-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515280" version="1" comment="flash-player is &lt;11.2.202.548-111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515281" version="1" comment="flash-player-gnome is &lt;11.2.202.548-111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515282" version="1" comment="libsndfile1 is &lt;1.0.25-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515283" version="1" comment="libsndfile1-32bit is &lt;1.0.25-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515284" version="1" comment="libpng12-0 is &lt;1.2.50-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515285" version="1" comment="libpng12-0-32bit is &lt;1.2.50-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515286" version="1" comment="libpng16-16 is &lt;1.6.8-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515287" version="1" comment="libpng16-16-32bit is &lt;1.6.8-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515288" version="1" comment="libksba8 is &lt;1.3.0-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515289" version="1" comment="xscreensaver is &lt;5.22-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515290" version="1" comment="xscreensaver-data is &lt;5.22-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515291" version="1" comment="dracut is &lt;037-51.17.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515292" version="1" comment="qemu is &lt;2.0.2-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515293" version="1" comment="qemu-block-curl is &lt;2.0.2-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515294" version="1" comment="qemu-ipxe is &lt;1.0.0-42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515295" version="1" comment="qemu-kvm is &lt;2.0.2-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515296" version="1" comment="qemu-seabios is &lt;1.7.4-42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515297" version="1" comment="qemu-sgabios is &lt;8-42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515298" version="1" comment="qemu-tools is &lt;2.0.2-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515299" version="1" comment="qemu-vgabios is &lt;1.7.4-42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515300" version="1" comment="qemu-x86 is &lt;2.0.2-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515301" version="1" comment="libvncclient0 is &lt;0.9.9-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515302" version="1" comment="libvncserver0 is &lt;0.9.9-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515303" version="1" comment="sblim-sfcb is &lt;1.4.8-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515304" version="1" comment="libdcerpc-binding0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515305" version="1" comment="libdcerpc-binding0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515306" version="1" comment="libdcerpc0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515307" version="1" comment="libdcerpc0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515308" version="1" comment="libgensec0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515309" version="1" comment="libgensec0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515310" version="1" comment="libndr-krb5pac0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515311" version="1" comment="libndr-krb5pac0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515312" version="1" comment="libndr-nbt0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515313" version="1" comment="libndr-nbt0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515314" version="1" comment="libndr-standard0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515315" version="1" comment="libndr-standard0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515316" version="1" comment="libndr0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515317" version="1" comment="libndr0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515318" version="1" comment="libnetapi0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515319" version="1" comment="libnetapi0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515320" version="1" comment="libpdb0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515321" version="1" comment="libpdb0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515322" version="1" comment="libregistry0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515323" version="1" comment="libsamba-credentials0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515324" version="1" comment="libsamba-credentials0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515325" version="1" comment="libsamba-hostconfig0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515326" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515327" version="1" comment="libsamba-util0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515328" version="1" comment="libsamba-util0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515329" version="1" comment="libsamdb0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515330" version="1" comment="libsamdb0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515331" version="1" comment="libsmbclient-raw0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515332" version="1" comment="libsmbclient-raw0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515333" version="1" comment="libsmbclient0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515334" version="1" comment="libsmbclient0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515335" version="1" comment="libsmbconf0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515336" version="1" comment="libsmbconf0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515337" version="1" comment="libsmbldap0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515338" version="1" comment="libsmbldap0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515339" version="1" comment="libtevent-util0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515340" version="1" comment="libtevent-util0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515341" version="1" comment="libwbclient0 is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515342" version="1" comment="libwbclient0-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515343" version="1" comment="samba is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515344" version="1" comment="samba-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515345" version="1" comment="samba-client is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515346" version="1" comment="samba-client-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515347" version="1" comment="samba-doc is &lt;4.1.12-16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515348" version="1" comment="samba-libs is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515349" version="1" comment="samba-libs-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515350" version="1" comment="samba-winbind is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515351" version="1" comment="samba-winbind-32bit is &lt;4.1.12-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515352" version="1" comment="unzip is &lt;6.00-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515353" version="1" comment="gpg2 is &lt;2.0.24-3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515354" version="1" comment="gpg2-lang is &lt;2.0.24-3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515355" version="1" comment="strongswan is &lt;5.1.3-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515356" version="1" comment="strongswan-doc is &lt;5.1.3-22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515357" version="1" comment="strongswan-ipsec is &lt;5.1.3-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515358" version="1" comment="strongswan-libs0 is &lt;5.1.3-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515359" version="1" comment="kernel-default is &lt;3.12.51-52.31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515360" version="1" comment="kernel-default-devel is &lt;3.12.51-52.31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515361" version="1" comment="kernel-default-extra is &lt;3.12.51-52.31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515362" version="1" comment="kernel-devel is &lt;3.12.51-52.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515363" version="1" comment="kernel-macros is &lt;3.12.51-52.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515364" version="1" comment="kernel-source is &lt;3.12.51-52.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515365" version="1" comment="kernel-syms is &lt;3.12.51-52.31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515366" version="1" comment="kernel-xen is &lt;3.12.51-52.31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515367" version="1" comment="kernel-xen-devel is &lt;3.12.51-52.31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515368" version="1" comment="gdk-pixbuf-lang is &lt;2.30.6-7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515369" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.30.6-7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515370" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.30.6-7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515371" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.30.6-7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515372" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.30.6-7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515373" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.30.6-7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515374" version="1" comment="libmspack0 is &lt;0.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515375" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-27.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515376" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-27.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515377" version="1" comment="openssl is &lt;1.0.1i-27.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515378" version="1" comment="flash-player is &lt;11.2.202.554-114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515379" version="1" comment="flash-player-gnome is &lt;11.2.202.554-114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515380" version="1" comment="vorbis-tools is &lt;1.4.0-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515381" version="1" comment="vorbis-tools-lang is &lt;1.4.0-19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515382" version="1" comment="krb5 is &lt;1.12.1-22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515383" version="1" comment="krb5-32bit is &lt;1.12.1-22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515384" version="1" comment="krb5-client is &lt;1.12.1-22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515385" version="1" comment="libdcerpc-binding0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515386" version="1" comment="libdcerpc-binding0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515387" version="1" comment="libdcerpc0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515388" version="1" comment="libdcerpc0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515389" version="1" comment="libgensec0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515390" version="1" comment="libgensec0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515391" version="1" comment="libldb1 is &lt;1.1.24-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515392" version="1" comment="libldb1-32bit is &lt;1.1.24-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515393" version="1" comment="libndr-krb5pac0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515394" version="1" comment="libndr-krb5pac0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515395" version="1" comment="libndr-nbt0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515396" version="1" comment="libndr-nbt0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515397" version="1" comment="libndr-standard0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515398" version="1" comment="libndr-standard0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515399" version="1" comment="libndr0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515400" version="1" comment="libndr0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515401" version="1" comment="libnetapi0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515402" version="1" comment="libnetapi0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515403" version="1" comment="libpdb0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515404" version="1" comment="libpdb0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515405" version="1" comment="libregistry0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515406" version="1" comment="libsamba-credentials0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515407" version="1" comment="libsamba-credentials0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515408" version="1" comment="libsamba-hostconfig0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515409" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515410" version="1" comment="libsamba-util0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515411" version="1" comment="libsamba-util0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515412" version="1" comment="libsamdb0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515413" version="1" comment="libsamdb0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515414" version="1" comment="libsmbclient-raw0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515415" version="1" comment="libsmbclient-raw0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515416" version="1" comment="libsmbclient0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515417" version="1" comment="libsmbclient0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515418" version="1" comment="libsmbconf0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515419" version="1" comment="libsmbconf0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515420" version="1" comment="libsmbldap0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515421" version="1" comment="libsmbldap0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515422" version="1" comment="libtalloc2 is &lt;2.1.5-3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515423" version="1" comment="libtalloc2-32bit is &lt;2.1.5-3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515424" version="1" comment="libtdb1 is &lt;1.3.8-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515425" version="1" comment="libtdb1-32bit is &lt;1.3.8-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515426" version="1" comment="libtevent-util0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515427" version="1" comment="libtevent-util0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515428" version="1" comment="libtevent0 is &lt;0.9.26-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515429" version="1" comment="libtevent0-32bit is &lt;0.9.26-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515430" version="1" comment="libwbclient0 is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515431" version="1" comment="libwbclient0-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515432" version="1" comment="pytalloc is &lt;2.1.5-3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515433" version="1" comment="pytalloc-32bit is &lt;2.1.5-3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515434" version="1" comment="samba is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515435" version="1" comment="samba-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515436" version="1" comment="samba-client is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515437" version="1" comment="samba-client-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515438" version="1" comment="samba-doc is &lt;4.1.12-18.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515439" version="1" comment="samba-libs is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515440" version="1" comment="samba-libs-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515441" version="1" comment="samba-winbind is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515442" version="1" comment="samba-winbind-32bit is &lt;4.1.12-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515443" version="1" comment="kernel-default is &lt;3.12.60-52.49.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515444" version="1" comment="kernel-default-devel is &lt;3.12.60-52.49.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515445" version="1" comment="kernel-default-extra is &lt;3.12.60-52.49.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515446" version="1" comment="kernel-devel is &lt;3.12.60-52.49.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515447" version="1" comment="kernel-macros is &lt;3.12.60-52.49.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515448" version="1" comment="kernel-source is &lt;3.12.60-52.49.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515449" version="1" comment="kernel-syms is &lt;3.12.60-52.49.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515450" version="1" comment="kernel-xen is &lt;3.12.60-52.49.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515451" version="1" comment="kernel-xen-devel is &lt;3.12.60-52.49.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515452" version="1" comment="dhcp is &lt;4.2.6-14.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515453" version="1" comment="dhcp-client is &lt;4.2.6-14.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515454" version="1" comment="MozillaFirefox is &lt;45.2.0esr-75.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515455" version="1" comment="MozillaFirefox-branding-SLE is &lt;45.0-28.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515456" version="1" comment="MozillaFirefox-translations is &lt;45.2.0esr-75.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515457" version="1" comment="libfreebl3 is &lt;3.21.1-46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515458" version="1" comment="libfreebl3-32bit is &lt;3.21.1-46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515459" version="1" comment="libsoftokn3 is &lt;3.21.1-46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515460" version="1" comment="libsoftokn3-32bit is &lt;3.21.1-46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515461" version="1" comment="mozilla-nspr is &lt;4.12-15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515462" version="1" comment="mozilla-nspr-32bit is &lt;4.12-15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515463" version="1" comment="mozilla-nss is &lt;3.21.1-46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515464" version="1" comment="mozilla-nss-32bit is &lt;3.21.1-46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515465" version="1" comment="mozilla-nss-certs is &lt;3.21.1-46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515466" version="1" comment="mozilla-nss-certs-32bit is &lt;3.21.1-46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515467" version="1" comment="mozilla-nss-sysinit is &lt;3.21.1-46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515468" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.21.1-46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515469" version="1" comment="mozilla-nss-tools is &lt;3.21.1-46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515470" version="1" comment="kernel-default is &lt;3.12.60-52.54.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515471" version="1" comment="kernel-default-devel is &lt;3.12.60-52.54.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515472" version="1" comment="kernel-default-extra is &lt;3.12.60-52.54.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515473" version="1" comment="kernel-devel is &lt;3.12.60-52.54.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515474" version="1" comment="kernel-macros is &lt;3.12.60-52.54.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515475" version="1" comment="kernel-source is &lt;3.12.60-52.54.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515476" version="1" comment="kernel-syms is &lt;3.12.60-52.54.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515477" version="1" comment="kernel-xen is &lt;3.12.60-52.54.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515478" version="1" comment="kernel-xen-devel is &lt;3.12.60-52.54.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515479" version="1" comment="glibc is &lt;2.19-22.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515480" version="1" comment="glibc-32bit is &lt;2.19-22.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515481" version="1" comment="glibc-devel is &lt;2.19-22.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515482" version="1" comment="glibc-devel-32bit is &lt;2.19-22.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515483" version="1" comment="glibc-i18ndata is &lt;2.19-22.16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515484" version="1" comment="glibc-locale is &lt;2.19-22.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515485" version="1" comment="glibc-locale-32bit is &lt;2.19-22.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515486" version="1" comment="nscd is &lt;2.19-22.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515487" version="1" comment="boost-license1_54_0 is &lt;1.54.0-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515488" version="1" comment="hunspell is &lt;1.3.2-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515489" version="1" comment="hunspell-32bit is &lt;1.3.2-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515490" version="1" comment="hunspell-tools is &lt;1.3.2-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515491" version="1" comment="libOpenCOLLADA0 is &lt;1_3335ac1-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515492" version="1" comment="libboost_atomic1_54_0 is &lt;1.54.0-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515493" version="1" comment="libboost_date_time1_54_0 is &lt;1.54.0-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515494" version="1" comment="libboost_filesystem1_54_0 is &lt;1.54.0-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515495" version="1" comment="libboost_iostreams1_54_0 is &lt;1.54.0-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515496" version="1" comment="libboost_program_options1_54_0 is &lt;1.54.0-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515497" version="1" comment="libboost_regex1_54_0 is &lt;1.54.0-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515498" version="1" comment="libboost_signals1_54_0 is &lt;1.54.0-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515499" version="1" comment="libboost_system1_54_0 is &lt;1.54.0-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515500" version="1" comment="libboost_thread1_54_0 is &lt;1.54.0-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515501" version="1" comment="libcmis-0_5-5 is &lt;0.5.1-8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515502" version="1" comment="libetonyek-0_1-1 is &lt;0.1.6-6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515503" version="1" comment="libhyphen0 is &lt;2.8.8-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515504" version="1" comment="libixion-0_11-0 is &lt;0.11.0-6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515505" version="1" comment="liborcus-0_11-0 is &lt;0.11.0-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515506" version="1" comment="libreoffice is &lt;5.1.3.2-22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515507" version="1" comment="libreoffice-base is &lt;5.1.3.2-22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515508" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.1.3.2-22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515509" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.1.3.2-22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515510" version="1" comment="libreoffice-calc is &lt;5.1.3.2-22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515511" version="1" comment="libreoffice-calc-extensions is &lt;5.1.3.2-22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515512" version="1" comment="libreoffice-draw is &lt;5.1.3.2-22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515513" version="1" comment="libreoffice-filters-optional is &lt;5.1.3.2-22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515514" version="1" comment="libreoffice-gnome is &lt;5.1.3.2-22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515515" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515516" version="1" comment="libreoffice-icon-theme-tango is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515517" version="1" comment="libreoffice-impress is &lt;5.1.3.2-22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515518" version="1" comment="libreoffice-l10n-af is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515519" version="1" comment="libreoffice-l10n-ar is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515520" version="1" comment="libreoffice-l10n-ca is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515521" version="1" comment="libreoffice-l10n-cs is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515522" version="1" comment="libreoffice-l10n-da is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515523" version="1" comment="libreoffice-l10n-de is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515524" version="1" comment="libreoffice-l10n-en is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515525" version="1" comment="libreoffice-l10n-es is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515526" version="1" comment="libreoffice-l10n-fi is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515527" version="1" comment="libreoffice-l10n-fr is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515528" version="1" comment="libreoffice-l10n-gu is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515529" version="1" comment="libreoffice-l10n-hi is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515530" version="1" comment="libreoffice-l10n-hu is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515531" version="1" comment="libreoffice-l10n-it is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515532" version="1" comment="libreoffice-l10n-ja is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515533" version="1" comment="libreoffice-l10n-ko is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515534" version="1" comment="libreoffice-l10n-nb is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515535" version="1" comment="libreoffice-l10n-nl is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515536" version="1" comment="libreoffice-l10n-nn is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515537" version="1" comment="libreoffice-l10n-pl is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515538" version="1" comment="libreoffice-l10n-pt-BR is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515539" version="1" comment="libreoffice-l10n-pt-PT is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515540" version="1" comment="libreoffice-l10n-ru is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515541" version="1" comment="libreoffice-l10n-sk is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515542" version="1" comment="libreoffice-l10n-sv is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515543" version="1" comment="libreoffice-l10n-xh is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515544" version="1" comment="libreoffice-l10n-zh-Hans is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515545" version="1" comment="libreoffice-l10n-zh-Hant is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515546" version="1" comment="libreoffice-l10n-zu is &lt;5.1.3.2-22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515547" version="1" comment="libreoffice-mailmerge is &lt;5.1.3.2-22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515548" version="1" comment="libreoffice-math is &lt;5.1.3.2-22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515549" version="1" comment="libreoffice-officebean is &lt;5.1.3.2-22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515550" version="1" comment="libreoffice-pyuno is &lt;5.1.3.2-22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515551" version="1" comment="libreoffice-writer is &lt;5.1.3.2-22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515552" version="1" comment="libreoffice-writer-extensions is &lt;5.1.3.2-22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515553" version="1" comment="libvisio-0_1-1 is &lt;0.1.5-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515554" version="1" comment="libwps-0_4-4 is &lt;0.4.2-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515555" version="1" comment="myspell-af_NA is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515556" version="1" comment="myspell-af_ZA is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515557" version="1" comment="myspell-ar is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515558" version="1" comment="myspell-ar_AE is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515559" version="1" comment="myspell-ar_BH is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515560" version="1" comment="myspell-ar_DZ is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515561" version="1" comment="myspell-ar_EG is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515562" version="1" comment="myspell-ar_IQ is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515563" version="1" comment="myspell-ar_JO is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515564" version="1" comment="myspell-ar_KW is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515565" version="1" comment="myspell-ar_LB is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515566" version="1" comment="myspell-ar_LY is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515567" version="1" comment="myspell-ar_MA is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515568" version="1" comment="myspell-ar_OM is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515569" version="1" comment="myspell-ar_QA is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515570" version="1" comment="myspell-ar_SA is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515571" version="1" comment="myspell-ar_SD is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515572" version="1" comment="myspell-ar_SY is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515573" version="1" comment="myspell-ar_TN is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515574" version="1" comment="myspell-ar_YE is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515575" version="1" comment="myspell-be_BY is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515576" version="1" comment="myspell-bg_BG is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515577" version="1" comment="myspell-bn_BD is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515578" version="1" comment="myspell-bn_IN is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515579" version="1" comment="myspell-bs is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515580" version="1" comment="myspell-bs_BA is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515581" version="1" comment="myspell-ca is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515582" version="1" comment="myspell-ca_AD is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515583" version="1" comment="myspell-ca_ES is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515584" version="1" comment="myspell-ca_ES_valencia is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515585" version="1" comment="myspell-ca_FR is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515586" version="1" comment="myspell-ca_IT is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515587" version="1" comment="myspell-cs_CZ is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515588" version="1" comment="myspell-da_DK is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515589" version="1" comment="myspell-de is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515590" version="1" comment="myspell-de_AT is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515591" version="1" comment="myspell-de_CH is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515592" version="1" comment="myspell-de_DE is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515593" version="1" comment="myspell-dictionaries is &lt;20160511-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515594" version="1" comment="myspell-el_GR is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515595" version="1" comment="myspell-en is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515596" version="1" comment="myspell-en_AU is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515597" version="1" comment="myspell-en_BS is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515598" version="1" comment="myspell-en_BZ is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515599" version="1" comment="myspell-en_CA is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515600" version="1" comment="myspell-en_GB is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515601" version="1" comment="myspell-en_GH is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515602" version="1" comment="myspell-en_IE is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515603" version="1" comment="myspell-en_IN is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515604" version="1" comment="myspell-en_JM is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515605" version="1" comment="myspell-en_MW is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515606" version="1" comment="myspell-en_NA is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515607" version="1" comment="myspell-en_NZ is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515608" version="1" comment="myspell-en_PH is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515609" version="1" comment="myspell-en_TT is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515610" version="1" comment="myspell-en_US is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515611" version="1" comment="myspell-en_ZA is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515612" version="1" comment="myspell-en_ZW is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515613" version="1" comment="myspell-es is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515614" version="1" comment="myspell-es_AR is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515615" version="1" comment="myspell-es_BO is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515616" version="1" comment="myspell-es_CL is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515617" version="1" comment="myspell-es_CO is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515618" version="1" comment="myspell-es_CR is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515619" version="1" comment="myspell-es_CU is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515620" version="1" comment="myspell-es_DO is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515621" version="1" comment="myspell-es_EC is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515622" version="1" comment="myspell-es_ES is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515623" version="1" comment="myspell-es_GT is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515624" version="1" comment="myspell-es_HN is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515625" version="1" comment="myspell-es_MX is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515626" version="1" comment="myspell-es_NI is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515627" version="1" comment="myspell-es_PA is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515628" version="1" comment="myspell-es_PE is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515629" version="1" comment="myspell-es_PR is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515630" version="1" comment="myspell-es_PY is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515631" version="1" comment="myspell-es_SV is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515632" version="1" comment="myspell-es_UY is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515633" version="1" comment="myspell-es_VE is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515634" version="1" comment="myspell-et_EE is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515635" version="1" comment="myspell-fr_BE is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515636" version="1" comment="myspell-fr_CA is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515637" version="1" comment="myspell-fr_CH is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515638" version="1" comment="myspell-fr_FR is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515639" version="1" comment="myspell-fr_LU is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515640" version="1" comment="myspell-fr_MC is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515641" version="1" comment="myspell-gu_IN is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515642" version="1" comment="myspell-he_IL is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515643" version="1" comment="myspell-hi_IN is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515644" version="1" comment="myspell-hr_HR is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515645" version="1" comment="myspell-hu_HU is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515646" version="1" comment="myspell-it_IT is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515647" version="1" comment="myspell-lightproof-en is &lt;20160511-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515648" version="1" comment="myspell-lightproof-hu_HU is &lt;20160511-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515649" version="1" comment="myspell-lightproof-pt_BR is &lt;20160511-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515650" version="1" comment="myspell-lightproof-ru_RU is &lt;20160511-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515651" version="1" comment="myspell-lo_LA is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515652" version="1" comment="myspell-lt_LT is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515653" version="1" comment="myspell-lv_LV is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515654" version="1" comment="myspell-nb_NO is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515655" version="1" comment="myspell-nl_BE is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515656" version="1" comment="myspell-nl_NL is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515657" version="1" comment="myspell-nn_NO is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515658" version="1" comment="myspell-no is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515659" version="1" comment="myspell-pl_PL is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515660" version="1" comment="myspell-pt_AO is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515661" version="1" comment="myspell-pt_BR is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515662" version="1" comment="myspell-pt_PT is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515663" version="1" comment="myspell-ro is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515664" version="1" comment="myspell-ro_RO is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515665" version="1" comment="myspell-ru_RU is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515666" version="1" comment="myspell-sk_SK is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515667" version="1" comment="myspell-sl_SI is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515668" version="1" comment="myspell-sr is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515669" version="1" comment="myspell-sr_CS is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515670" version="1" comment="myspell-sr_Latn_CS is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515671" version="1" comment="myspell-sr_Latn_RS is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515672" version="1" comment="myspell-sr_RS is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515673" version="1" comment="myspell-sv_FI is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515674" version="1" comment="myspell-sv_SE is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515675" version="1" comment="myspell-te is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515676" version="1" comment="myspell-te_IN is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515677" version="1" comment="myspell-th_TH is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515678" version="1" comment="myspell-vi is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515679" version="1" comment="myspell-vi_VN is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515680" version="1" comment="myspell-zu_ZA is &lt;20160511-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515681" version="1" comment="libtiff5 is &lt;4.0.6-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515682" version="1" comment="libtiff5-32bit is &lt;4.0.6-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515683" version="1" comment="kernel-default is &lt;3.12.51-52.34.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515684" version="1" comment="kernel-default-devel is &lt;3.12.51-52.34.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515685" version="1" comment="kernel-default-extra is &lt;3.12.51-52.34.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515686" version="1" comment="kernel-devel is &lt;3.12.51-52.34.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515687" version="1" comment="kernel-macros is &lt;3.12.51-52.34.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515688" version="1" comment="kernel-source is &lt;3.12.51-52.34.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515689" version="1" comment="kernel-syms is &lt;3.12.51-52.34.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515690" version="1" comment="kernel-xen is &lt;3.12.51-52.34.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515691" version="1" comment="kernel-xen-devel is &lt;3.12.51-52.34.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515692" version="1" comment="qemu is &lt;2.0.2-48.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515693" version="1" comment="qemu-block-curl is &lt;2.0.2-48.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515694" version="1" comment="qemu-ipxe is &lt;1.0.0-48.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515695" version="1" comment="qemu-kvm is &lt;2.0.2-48.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515696" version="1" comment="qemu-seabios is &lt;1.7.4-48.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515697" version="1" comment="qemu-sgabios is &lt;8-48.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515698" version="1" comment="qemu-tools is &lt;2.0.2-48.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515699" version="1" comment="qemu-vgabios is &lt;1.7.4-48.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515700" version="1" comment="qemu-x86 is &lt;2.0.2-48.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515701" version="1" comment="rsync is &lt;3.1.0-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515702" version="1" comment="libxml2-2 is &lt;2.9.1-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515703" version="1" comment="libxml2-2-32bit is &lt;2.9.1-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515704" version="1" comment="libxml2-tools is &lt;2.9.1-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515705" version="1" comment="python-libxml2 is &lt;2.9.1-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515706" version="1" comment="bind-libs is &lt;9.9.6P1-28.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515707" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-28.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515708" version="1" comment="bind-utils is &lt;9.9.6P1-28.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515709" version="1" comment="libgif6 is &lt;5.0.5-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515710" version="1" comment="libgif6-32bit is &lt;5.0.5-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515711" version="1" comment="kernel-default is &lt;3.12.51-52.39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515712" version="1" comment="kernel-default-devel is &lt;3.12.51-52.39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515713" version="1" comment="kernel-default-extra is &lt;3.12.51-52.39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515714" version="1" comment="kernel-devel is &lt;3.12.51-52.39.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515715" version="1" comment="kernel-macros is &lt;3.12.51-52.39.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515716" version="1" comment="kernel-source is &lt;3.12.51-52.39.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515717" version="1" comment="kernel-syms is &lt;3.12.51-52.39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515718" version="1" comment="kernel-xen is &lt;3.12.51-52.39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515719" version="1" comment="kernel-xen-devel is &lt;3.12.51-52.39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515720" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515721" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515722" version="1" comment="openldap2-client is &lt;2.4.41-18.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515723" version="1" comment="gdk-pixbuf-lang is &lt;2.30.6-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515724" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.30.6-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515725" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.30.6-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515726" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.30.6-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515727" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.30.6-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515728" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.30.6-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515729" version="1" comment="ecryptfs-utils is &lt;103-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515730" version="1" comment="ecryptfs-utils-32bit is &lt;103-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515731" version="1" comment="libpng16-16 is &lt;1.6.8-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515732" version="1" comment="libpng16-16-32bit is &lt;1.6.8-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515733" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.95-24.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515734" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.95-24.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515735" version="1" comment="libvirt is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515736" version="1" comment="libvirt-client is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515737" version="1" comment="libvirt-client-32bit is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515738" version="1" comment="libvirt-daemon is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515739" version="1" comment="libvirt-daemon-config-network is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515740" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515741" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515742" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515743" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515744" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515745" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515746" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515747" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515748" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515749" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515750" version="1" comment="libvirt-daemon-lxc is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515751" version="1" comment="libvirt-daemon-qemu is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515752" version="1" comment="libvirt-daemon-xen is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515753" version="1" comment="libvirt-doc is &lt;1.2.5-27.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515754" version="1" comment="MozillaFirefox is &lt;38.6.0esr-57.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515755" version="1" comment="MozillaFirefox-branding-SLE is &lt;31.0-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515756" version="1" comment="MozillaFirefox-translations is &lt;38.6.0esr-57.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515757" version="1" comment="libfreebl3 is &lt;3.20.2-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515758" version="1" comment="libfreebl3-32bit is &lt;3.20.2-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515759" version="1" comment="libsoftokn3 is &lt;3.20.2-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515760" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515761" version="1" comment="mozilla-nss is &lt;3.20.2-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515762" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515763" version="1" comment="mozilla-nss-certs is &lt;3.20.2-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515764" version="1" comment="mozilla-nss-certs-32bit is &lt;3.20.2-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515765" version="1" comment="mozilla-nss-sysinit is &lt;3.20.2-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515766" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.20.2-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515767" version="1" comment="mozilla-nss-tools is &lt;3.20.2-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515768" version="1" comment="libmspack0 is &lt;0.4-14.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515769" version="1" comment="curl is &lt;7.37.0-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515770" version="1" comment="libcurl4 is &lt;7.37.0-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515771" version="1" comment="libcurl4-32bit is &lt;7.37.0-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515772" version="1" comment="socat is &lt;1.7.2.4-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515773" version="1" comment="flash-player is &lt;11.2.202.569-120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515774" version="1" comment="flash-player-gnome is &lt;11.2.202.569-120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515775" version="1" comment="krb5 is &lt;1.12.1-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515776" version="1" comment="krb5-32bit is &lt;1.12.1-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515777" version="1" comment="krb5-client is &lt;1.12.1-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515778" version="1" comment="libhogweed2 is &lt;2.7.1-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515779" version="1" comment="libhogweed2-32bit is &lt;2.7.1-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515780" version="1" comment="libnettle4 is &lt;2.7.1-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515781" version="1" comment="libnettle4-32bit is &lt;2.7.1-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515782" version="1" comment="glibc is &lt;2.19-22.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515783" version="1" comment="glibc-32bit is &lt;2.19-22.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515784" version="1" comment="glibc-devel is &lt;2.19-22.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515785" version="1" comment="glibc-devel-32bit is &lt;2.19-22.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515786" version="1" comment="glibc-i18ndata is &lt;2.19-22.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515787" version="1" comment="glibc-locale is &lt;2.19-22.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515788" version="1" comment="glibc-locale-32bit is &lt;2.19-22.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515789" version="1" comment="nscd is &lt;2.19-22.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515790" version="1" comment="postgresql93 is &lt;9.3.11-14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515791" version="1" comment="dhcp is &lt;4.2.6-14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515792" version="1" comment="dhcp-client is &lt;4.2.6-14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515793" version="1" comment="libecpg6 is &lt;9.4.6-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515794" version="1" comment="libpq5 is &lt;9.4.6-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515795" version="1" comment="libpq5-32bit is &lt;9.4.6-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515796" version="1" comment="postgresql94 is &lt;9.4.6-7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515797" version="1" comment="MozillaFirefox is &lt;38.6.1esr-60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515798" version="1" comment="MozillaFirefox-translations is &lt;38.6.1esr-60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515799" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-27.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515800" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-27.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515801" version="1" comment="openssl is &lt;1.0.1i-27.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515802" version="1" comment="libssh4 is &lt;0.6.3-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515803" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515804" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515805" version="1" comment="libpng12-0 is &lt;1.2.50-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515806" version="1" comment="libpng12-0-32bit is &lt;1.2.50-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515807" version="1" comment="libxml2-2 is &lt;2.9.1-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515808" version="1" comment="libxml2-2-32bit is &lt;2.9.1-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515809" version="1" comment="libxml2-tools is &lt;2.9.1-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515810" version="1" comment="python-libxml2 is &lt;2.9.1-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515811" version="1" comment="libotr5 is &lt;4.0.0-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515812" version="1" comment="flash-player is &lt;11.2.202.577-123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515813" version="1" comment="flash-player-gnome is &lt;11.2.202.577-123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515814" version="1" comment="libssh2-1 is &lt;1.4.3-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515815" version="1" comment="libssh2-1-32bit is &lt;1.4.3-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515816" version="1" comment="MozillaFirefox is &lt;38.7.0esr-63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515817" version="1" comment="MozillaFirefox-translations is &lt;38.7.0esr-63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515818" version="1" comment="libfreebl3 is &lt;3.20.2-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515819" version="1" comment="libfreebl3-32bit is &lt;3.20.2-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515820" version="1" comment="libsoftokn3 is &lt;3.20.2-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515821" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515822" version="1" comment="mozilla-nspr is &lt;4.12-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515823" version="1" comment="mozilla-nspr-32bit is &lt;4.12-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515824" version="1" comment="mozilla-nss is &lt;3.20.2-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515825" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515826" version="1" comment="mozilla-nss-certs is &lt;3.20.2-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515827" version="1" comment="mozilla-nss-certs-32bit is &lt;3.20.2-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515828" version="1" comment="mozilla-nss-sysinit is &lt;3.20.2-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515829" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.20.2-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515830" version="1" comment="mozilla-nss-tools is &lt;3.20.2-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515831" version="1" comment="libgraphite2-3 is &lt;1.3.1-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515832" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515833" version="1" comment="bind-libs is &lt;9.9.6P1-28.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515834" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-28.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515835" version="1" comment="bind-utils is &lt;9.9.6P1-28.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515836" version="1" comment="kernel-default is &lt;3.12.55-52.42.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515837" version="1" comment="kernel-default-devel is &lt;3.12.55-52.42.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515838" version="1" comment="kernel-default-extra is &lt;3.12.55-52.42.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515839" version="1" comment="kernel-devel is &lt;3.12.55-52.42.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515840" version="1" comment="kernel-macros is &lt;3.12.55-52.42.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515841" version="1" comment="kernel-source is &lt;3.12.55-52.42.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515842" version="1" comment="kernel-syms is &lt;3.12.55-52.42.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515843" version="1" comment="kernel-xen is &lt;3.12.55-52.42.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515844" version="1" comment="kernel-xen-devel is &lt;3.12.55-52.42.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515845" version="1" comment="libdcerpc-binding0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515846" version="1" comment="libdcerpc-binding0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515847" version="1" comment="libdcerpc0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515848" version="1" comment="libdcerpc0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515849" version="1" comment="libgensec0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515850" version="1" comment="libgensec0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515851" version="1" comment="libndr-krb5pac0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515852" version="1" comment="libndr-krb5pac0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515853" version="1" comment="libndr-nbt0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515854" version="1" comment="libndr-nbt0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515855" version="1" comment="libndr-standard0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515856" version="1" comment="libndr-standard0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515857" version="1" comment="libndr0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515858" version="1" comment="libndr0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515859" version="1" comment="libnetapi0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515860" version="1" comment="libnetapi0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515861" version="1" comment="libpdb0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515862" version="1" comment="libpdb0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515863" version="1" comment="libregistry0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515864" version="1" comment="libsamba-credentials0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515865" version="1" comment="libsamba-credentials0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515866" version="1" comment="libsamba-hostconfig0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515867" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515868" version="1" comment="libsamba-util0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515869" version="1" comment="libsamba-util0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515870" version="1" comment="libsamdb0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515871" version="1" comment="libsamdb0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515872" version="1" comment="libsmbclient-raw0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515873" version="1" comment="libsmbclient-raw0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515874" version="1" comment="libsmbclient0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515875" version="1" comment="libsmbclient0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515876" version="1" comment="libsmbconf0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515877" version="1" comment="libsmbconf0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515878" version="1" comment="libsmbldap0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515879" version="1" comment="libsmbldap0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515880" version="1" comment="libtevent-util0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515881" version="1" comment="libtevent-util0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515882" version="1" comment="libwbclient0 is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515883" version="1" comment="libwbclient0-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515884" version="1" comment="samba is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515885" version="1" comment="samba-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515886" version="1" comment="samba-client is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515887" version="1" comment="samba-client-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515888" version="1" comment="samba-doc is &lt;4.1.12-18.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515889" version="1" comment="samba-libs is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515890" version="1" comment="samba-libs-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515891" version="1" comment="samba-winbind is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515892" version="1" comment="samba-winbind-32bit is &lt;4.1.12-18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515893" version="1" comment="libqt4 is &lt;4.8.6-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515894" version="1" comment="libqt4-32bit is &lt;4.8.6-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515895" version="1" comment="libqt4-qt3support is &lt;4.8.6-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515896" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.6-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515897" version="1" comment="libqt4-sql is &lt;4.8.6-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515898" version="1" comment="libqt4-sql-32bit is &lt;4.8.6-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515899" version="1" comment="libqt4-sql-mysql is &lt;4.8.6-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515900" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.6-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515901" version="1" comment="libqt4-sql-postgresql is &lt;4.8.6-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515902" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.6-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515903" version="1" comment="libqt4-sql-sqlite is &lt;4.8.6-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515904" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.6-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515905" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.6-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515906" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.6-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515907" version="1" comment="libqt4-x11 is &lt;4.8.6-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515908" version="1" comment="libqt4-x11-32bit is &lt;4.8.6-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515909" version="1" comment="ghostscript is &lt;9.15-6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515910" version="1" comment="ghostscript-x11 is &lt;9.15-6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515911" version="1" comment="pidgin-otr is &lt;4.0.0-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515912" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.99-27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515913" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.99-27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515914" version="1" comment="libasan2 is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515915" version="1" comment="libasan2-32bit is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515916" version="1" comment="libatomic1 is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515917" version="1" comment="libatomic1-32bit is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515918" version="1" comment="libcilkrts5 is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515919" version="1" comment="libcilkrts5-32bit is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515920" version="1" comment="libffi4 is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515921" version="1" comment="libffi4-32bit is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515922" version="1" comment="libgcc_s1 is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515923" version="1" comment="libgcc_s1-32bit is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515924" version="1" comment="libgfortran3 is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515925" version="1" comment="libgfortran3-32bit is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515926" version="1" comment="libgomp1 is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515927" version="1" comment="libgomp1-32bit is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515928" version="1" comment="libitm1 is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515929" version="1" comment="libitm1-32bit is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515930" version="1" comment="liblsan0 is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515931" version="1" comment="libmpx0 is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515932" version="1" comment="libmpx0-32bit is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515933" version="1" comment="libmpxwrappers0 is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515934" version="1" comment="libmpxwrappers0-32bit is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515935" version="1" comment="libquadmath0 is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515936" version="1" comment="libquadmath0-32bit is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515937" version="1" comment="libstdc++6 is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515938" version="1" comment="libstdc++6-32bit is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515939" version="1" comment="libstdc++6-locale is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515940" version="1" comment="libtsan0 is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515941" version="1" comment="libubsan0 is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515942" version="1" comment="libubsan0-32bit is &lt;5.3.1+r233831-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515943" version="1" comment="flash-player is &lt;11.2.202.616-126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515944" version="1" comment="flash-player-gnome is &lt;11.2.202.616-126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515945" version="1" comment="krb5 is &lt;1.12.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515946" version="1" comment="krb5-32bit is &lt;1.12.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515947" version="1" comment="krb5-client is &lt;1.12.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515948" version="1" comment="python-backports.ssl_match_hostname is &lt;3.4.0.2-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515949" version="1" comment="python-tornado is &lt;4.2.1-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515950" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515951" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515952" version="1" comment="libdcerpc0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515953" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515954" version="1" comment="libgensec0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515955" version="1" comment="libgensec0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515956" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515957" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515958" version="1" comment="libndr-nbt0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515959" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515960" version="1" comment="libndr-standard0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515961" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515962" version="1" comment="libndr0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515963" version="1" comment="libndr0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515964" version="1" comment="libnetapi0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515965" version="1" comment="libnetapi0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515966" version="1" comment="libregistry0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515967" version="1" comment="libsamba-credentials0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515968" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515969" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515970" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515971" version="1" comment="libsamba-passdb0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515972" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515973" version="1" comment="libsamba-util0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515974" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515975" version="1" comment="libsamdb0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515976" version="1" comment="libsamdb0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515977" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515978" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515979" version="1" comment="libsmbclient0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515980" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515981" version="1" comment="libsmbconf0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515982" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515983" version="1" comment="libsmbldap0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515984" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515985" version="1" comment="libtevent-util0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515986" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515987" version="1" comment="libwbclient0 is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515988" version="1" comment="libwbclient0-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515989" version="1" comment="samba is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515990" version="1" comment="samba-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515991" version="1" comment="samba-client is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515992" version="1" comment="samba-client-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515993" version="1" comment="samba-doc is &lt;4.2.4-18.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515994" version="1" comment="samba-libs is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515995" version="1" comment="samba-libs-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515996" version="1" comment="samba-winbind is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515997" version="1" comment="samba-winbind-32bit is &lt;4.2.4-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515998" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515999" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516000" version="1" comment="libgcrypt20 is &lt;1.6.1-16.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516001" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516002" version="1" comment="lhasa is &lt;0.2.0-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516003" version="1" comment="liblhasa0 is &lt;0.2.0-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516004" version="1" comment="libcairo-gobject2 is &lt;1.12.16-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516005" version="1" comment="libcairo-gobject2-32bit is &lt;1.12.16-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516006" version="1" comment="libcairo2 is &lt;1.12.16-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516007" version="1" comment="libcairo2-32bit is &lt;1.12.16-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516008" version="1" comment="cups-filters is &lt;1.0.58-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516009" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516010" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516011" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516012" version="1" comment="libgif6 is &lt;5.0.5-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516013" version="1" comment="libgif6-32bit is &lt;5.0.5-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516014" version="1" comment="libxml2-2 is &lt;2.9.1-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516015" version="1" comment="libxml2-2-32bit is &lt;2.9.1-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516016" version="1" comment="libxml2-tools is &lt;2.9.1-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516017" version="1" comment="python-libxml2 is &lt;2.9.1-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516018" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-27.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516019" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-27.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516020" version="1" comment="openssl is &lt;1.0.1i-27.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516021" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.101-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516022" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.101-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516023" version="1" comment="ntp is &lt;4.2.8p6-46.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516024" version="1" comment="ntp-doc is &lt;4.2.8p6-46.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516025" version="1" comment="yast2-ntp-client is &lt;3.1.12.4-8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516026" version="1" comment="MozillaFirefox is &lt;38.8.0esr-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516027" version="1" comment="MozillaFirefox-translations is &lt;38.8.0esr-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516028" version="1" comment="ImageMagick is &lt;6.8.8.1-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516029" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516030" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516031" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516032" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516033" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516034" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516035" version="1" comment="wireshark is &lt;1.12.9-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516036" version="1" comment="flash-player is &lt;11.2.202.621-130.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516037" version="1" comment="flash-player-gnome is &lt;11.2.202.621-130.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516038" version="1" comment="xen is &lt;4.4.4_02-22.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516039" version="1" comment="xen-kmp-default is &lt;4.4.4_02_k3.12.55_52.42-22.19.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516040" version="1" comment="xen-libs is &lt;4.4.4_02-22.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516041" version="1" comment="xen-libs-32bit is &lt;4.4.4_02-22.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516042" version="1" comment="wireshark is &lt;1.12.11-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516043" version="1" comment="libgudev-1_0-0 is &lt;210-70.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516044" version="1" comment="libgudev-1_0-0-32bit is &lt;210-70.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516045" version="1" comment="libudev1 is &lt;210-70.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516046" version="1" comment="libudev1-32bit is &lt;210-70.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516047" version="1" comment="systemd is &lt;210-70.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516048" version="1" comment="systemd-32bit is &lt;210-70.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516049" version="1" comment="systemd-bash-completion is &lt;210-70.48.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516050" version="1" comment="systemd-sysvinit is &lt;210-70.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516051" version="1" comment="udev is &lt;210-70.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516052" version="1" comment="openssh is &lt;6.6p1-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516053" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516054" version="1" comment="openssh-helpers is &lt;6.6p1-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516055" version="1" comment="openssh is &lt;6.6p1-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516056" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516057" version="1" comment="openssh-helpers is &lt;6.6p1-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516058" version="1" comment="libmysqlclient18 is &lt;10.0.22-20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516059" version="1" comment="libmysqlclient18-32bit is &lt;10.0.22-20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516060" version="1" comment="libmysqlclient_r18 is &lt;10.0.22-20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516061" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.22-20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516062" version="1" comment="mariadb is &lt;10.0.22-20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516063" version="1" comment="mariadb-client is &lt;10.0.22-20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516064" version="1" comment="mariadb-errormessages is &lt;10.0.22-20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516065" version="1" comment="supportutils is &lt;3.0-82.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516066" version="1" comment="expat is &lt;2.1.0-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516067" version="1" comment="libexpat1 is &lt;2.1.0-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516068" version="1" comment="libexpat1-32bit is &lt;2.1.0-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516069" version="1" comment="libksba8 is &lt;1.3.0-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516070" version="1" comment="libxml2-2 is &lt;2.9.1-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516071" version="1" comment="libxml2-2-32bit is &lt;2.9.1-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516072" version="1" comment="libxml2-tools is &lt;2.9.1-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516073" version="1" comment="python-libxml2 is &lt;2.9.1-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516074" version="1" comment="libpoppler-glib8 is &lt;0.24.4-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516075" version="1" comment="libpoppler-qt4-4 is &lt;0.24.4-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516076" version="1" comment="libpoppler44 is &lt;0.24.4-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516077" version="1" comment="poppler-tools is &lt;0.24.4-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516078" version="1" comment="qemu is &lt;2.0.2-48.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516079" version="1" comment="qemu-block-curl is &lt;2.0.2-48.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516080" version="1" comment="qemu-ipxe is &lt;1.0.0-48.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516081" version="1" comment="qemu-kvm is &lt;2.0.2-48.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516082" version="1" comment="qemu-seabios is &lt;1.7.4-48.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516083" version="1" comment="qemu-sgabios is &lt;8-48.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516084" version="1" comment="qemu-tools is &lt;2.0.2-48.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516085" version="1" comment="qemu-vgabios is &lt;1.7.4-48.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516086" version="1" comment="qemu-x86 is &lt;2.0.2-48.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516087" version="1" comment="libspice-server1 is &lt;0.12.4-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516088" version="1" comment="ntp is &lt;4.2.8p8-46.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516089" version="1" comment="ntp-doc is &lt;4.2.8p8-46.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516090" version="1" comment="ImageMagick is &lt;6.8.8.1-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516091" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516092" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516093" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516094" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516095" version="1" comment="libarchive13 is &lt;3.1.2-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516096" version="1" comment="p7zip is &lt;9.20.1-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516097" version="1" comment="kernel-default is &lt;3.12.55-52.45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516098" version="1" comment="kernel-default-devel is &lt;3.12.55-52.45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516099" version="1" comment="kernel-default-extra is &lt;3.12.55-52.45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516100" version="1" comment="kernel-devel is &lt;3.12.55-52.45.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516101" version="1" comment="kernel-macros is &lt;3.12.55-52.45.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516102" version="1" comment="kernel-source is &lt;3.12.55-52.45.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516103" version="1" comment="kernel-syms is &lt;3.12.55-52.45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516104" version="1" comment="kernel-xen is &lt;3.12.55-52.45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516105" version="1" comment="kernel-xen-devel is &lt;3.12.55-52.45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516106" version="1" comment="libtasn1 is &lt;3.7-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516107" version="1" comment="libtasn1-6 is &lt;3.7-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516108" version="1" comment="libtasn1-6-32bit is &lt;3.7-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516109" version="1" comment="flash-player is &lt;11.2.202.626-133.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516110" version="1" comment="flash-player-gnome is &lt;11.2.202.626-133.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516111" version="1" comment="libmysqlclient18 is &lt;10.0.25-20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516112" version="1" comment="libmysqlclient18-32bit is &lt;10.0.25-20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516113" version="1" comment="libmysqlclient_r18 is &lt;10.0.25-20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516114" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.25-20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516115" version="1" comment="mariadb is &lt;10.0.25-20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516116" version="1" comment="mariadb-client is &lt;10.0.25-20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516117" version="1" comment="mariadb-errormessages is &lt;10.0.25-20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516118" version="1" comment="libc-client2007e_suse is &lt;2007e_suse-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516119" version="1" comment="libimobiledevice-tools is &lt;1.1.5-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516120" version="1" comment="libimobiledevice4 is &lt;1.1.5-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516121" version="1" comment="libusbmuxd2 is &lt;1.0.8-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516122" version="1" comment="usbmuxd is &lt;1.0.8-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516123" version="1" comment="libfreebl3 is &lt;3.19.2.2-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516124" version="1" comment="libfreebl3-32bit is &lt;3.19.2.2-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516125" version="1" comment="libsoftokn3 is &lt;3.19.2.2-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516126" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.2-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516127" version="1" comment="mozilla-nss is &lt;3.19.2.2-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516128" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.2-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516129" version="1" comment="mozilla-nss-certs is &lt;3.19.2.2-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516130" version="1" comment="mozilla-nss-certs-32bit is &lt;3.19.2.2-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516131" version="1" comment="mozilla-nss-sysinit is &lt;3.19.2.2-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516132" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.19.2.2-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516133" version="1" comment="mozilla-nss-tools is &lt;3.19.2.2-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516134" version="1" comment="bind-libs is &lt;9.9.6P1-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516135" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516136" version="1" comment="bind-utils is &lt;9.9.6P1-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516137" version="1" comment="grub2 is &lt;2.02~beta2-73.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516138" version="1" comment="grub2-i386-pc is &lt;2.02~beta2-73.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516139" version="1" comment="grub2-snapper-plugin is &lt;2.02~beta2-73.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516140" version="1" comment="grub2-x86_64-efi is &lt;2.02~beta2-73.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516141" version="1" comment="grub2-x86_64-xen is &lt;2.02~beta2-73.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516142" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516143" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516144" version="1" comment="openssl is &lt;1.0.1i-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516145" version="1" comment="kernel-default is &lt;3.12.51-60.20.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516146" version="1" comment="kernel-default-devel is &lt;3.12.51-60.20.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516147" version="1" comment="kernel-default-extra is &lt;3.12.51-60.20.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516148" version="1" comment="kernel-devel is &lt;3.12.51-60.20.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516149" version="1" comment="kernel-macros is &lt;3.12.51-60.20.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516150" version="1" comment="kernel-source is &lt;3.12.51-60.20.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516151" version="1" comment="kernel-syms is &lt;3.12.51-60.20.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516152" version="1" comment="kernel-xen is &lt;3.12.51-60.20.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516153" version="1" comment="kernel-xen-devel is &lt;3.12.51-60.20.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516154" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516155" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516156" version="1" comment="libdcerpc0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516157" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516158" version="1" comment="libgensec0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516159" version="1" comment="libgensec0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516160" version="1" comment="libldb1 is &lt;1.1.24-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516161" version="1" comment="libldb1-32bit is &lt;1.1.24-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516162" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516163" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516164" version="1" comment="libndr-nbt0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516165" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516166" version="1" comment="libndr-standard0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516167" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516168" version="1" comment="libndr0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516169" version="1" comment="libndr0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516170" version="1" comment="libnetapi0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516171" version="1" comment="libnetapi0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516172" version="1" comment="libregistry0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516173" version="1" comment="libsamba-credentials0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516174" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516175" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516176" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516177" version="1" comment="libsamba-passdb0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516178" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516179" version="1" comment="libsamba-util0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516180" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516181" version="1" comment="libsamdb0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516182" version="1" comment="libsamdb0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516183" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516184" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516185" version="1" comment="libsmbclient0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516186" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516187" version="1" comment="libsmbconf0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516188" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516189" version="1" comment="libsmbldap0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516190" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516191" version="1" comment="libtalloc2 is &lt;2.1.5-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516192" version="1" comment="libtalloc2-32bit is &lt;2.1.5-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516193" version="1" comment="libtdb1 is &lt;1.3.8-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516194" version="1" comment="libtdb1-32bit is &lt;1.3.8-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516195" version="1" comment="libtevent-util0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516196" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516197" version="1" comment="libtevent0 is &lt;0.9.26-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516198" version="1" comment="libtevent0-32bit is &lt;0.9.26-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516199" version="1" comment="libwbclient0 is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516200" version="1" comment="libwbclient0-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516201" version="1" comment="pytalloc is &lt;2.1.5-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516202" version="1" comment="pytalloc-32bit is &lt;2.1.5-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516203" version="1" comment="samba is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516204" version="1" comment="samba-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516205" version="1" comment="samba-client is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516206" version="1" comment="samba-client-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516207" version="1" comment="samba-doc is &lt;4.2.4-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516208" version="1" comment="samba-libs is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516209" version="1" comment="samba-libs-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516210" version="1" comment="samba-winbind is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516211" version="1" comment="samba-winbind-32bit is &lt;4.2.4-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516212" version="1" comment="xen is &lt;4.5.2_02-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516213" version="1" comment="xen-kmp-default is &lt;4.5.2_02_k3.12.49_11-4.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516214" version="1" comment="xen-libs is &lt;4.5.2_02-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516215" version="1" comment="xen-libs-32bit is &lt;4.5.2_02-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516216" version="1" comment="kernel-default is &lt;3.12.59-60.41.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516217" version="1" comment="kernel-default-devel is &lt;3.12.59-60.41.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516218" version="1" comment="kernel-default-extra is &lt;3.12.59-60.41.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516219" version="1" comment="kernel-devel is &lt;3.12.59-60.41.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516220" version="1" comment="kernel-macros is &lt;3.12.59-60.41.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516221" version="1" comment="kernel-source is &lt;3.12.59-60.41.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516222" version="1" comment="kernel-syms is &lt;3.12.59-60.41.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516223" version="1" comment="kernel-xen is &lt;3.12.59-60.41.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516224" version="1" comment="kernel-xen-devel is &lt;3.12.59-60.41.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516225" version="1" comment="qemu is &lt;2.3.1-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516226" version="1" comment="qemu-block-curl is &lt;2.3.1-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516227" version="1" comment="qemu-ipxe is &lt;1.0.0-14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516228" version="1" comment="qemu-kvm is &lt;2.3.1-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516229" version="1" comment="qemu-seabios is &lt;1.8.1-14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516230" version="1" comment="qemu-sgabios is &lt;8-14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516231" version="1" comment="qemu-tools is &lt;2.3.1-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516232" version="1" comment="qemu-vgabios is &lt;1.8.1-14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516233" version="1" comment="qemu-x86 is &lt;2.3.1-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516234" version="1" comment="kernel-default is &lt;3.12.59-60.45.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516235" version="1" comment="kernel-default-devel is &lt;3.12.59-60.45.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516236" version="1" comment="kernel-default-extra is &lt;3.12.59-60.45.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516237" version="1" comment="kernel-devel is &lt;3.12.59-60.45.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516238" version="1" comment="kernel-macros is &lt;3.12.59-60.45.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516239" version="1" comment="kernel-source is &lt;3.12.59-60.45.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516240" version="1" comment="kernel-syms is &lt;3.12.59-60.45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516241" version="1" comment="kernel-xen is &lt;3.12.59-60.45.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516242" version="1" comment="kernel-xen-devel is &lt;3.12.59-60.45.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516243" version="1" comment="glibc is &lt;2.19-38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516244" version="1" comment="glibc-32bit is &lt;2.19-38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516245" version="1" comment="glibc-devel is &lt;2.19-38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516246" version="1" comment="glibc-devel-32bit is &lt;2.19-38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516247" version="1" comment="glibc-i18ndata is &lt;2.19-38.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516248" version="1" comment="glibc-locale is &lt;2.19-38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516249" version="1" comment="glibc-locale-32bit is &lt;2.19-38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516250" version="1" comment="nscd is &lt;2.19-38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516251" version="1" comment="ImageMagick is &lt;6.8.8.1-30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516252" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516253" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516254" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516255" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516256" version="1" comment="dhcp is &lt;4.3.3-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516257" version="1" comment="dhcp-client is &lt;4.3.3-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516258" version="1" comment="flash-player is &lt;11.2.202.632-137.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516259" version="1" comment="flash-player-gnome is &lt;11.2.202.632-137.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516260" version="1" comment="libarchive13 is &lt;3.1.2-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516261" version="1" comment="bind-libs is &lt;9.9.6P1-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516262" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516263" version="1" comment="bind-utils is &lt;9.9.6P1-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516264" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516265" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516266" version="1" comment="sqlite3 is &lt;3.8.10.2-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516267" version="1" comment="gimp is &lt;2.8.10-7.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516268" version="1" comment="gimp-lang is &lt;2.8.10-7.8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516269" version="1" comment="gimp-plugins-python is &lt;2.8.10-7.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516270" version="1" comment="libgimp-2_0-0 is &lt;2.8.10-7.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516271" version="1" comment="libgimpui-2_0-0 is &lt;2.8.10-7.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516272" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.111-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516273" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.111-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516274" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.101-14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516275" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.101-14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516276" version="1" comment="libvirt is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516277" version="1" comment="libvirt-client is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516278" version="1" comment="libvirt-client-32bit is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516279" version="1" comment="libvirt-daemon is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516280" version="1" comment="libvirt-daemon-config-network is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516281" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516282" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516283" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516284" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516285" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516286" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516287" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516288" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516289" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516290" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516291" version="1" comment="libvirt-daemon-lxc is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516292" version="1" comment="libvirt-daemon-qemu is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516293" version="1" comment="libvirt-daemon-xen is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516294" version="1" comment="libvirt-doc is &lt;1.2.18.4-11.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516295" version="1" comment="ImageMagick is &lt;6.8.8.1-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516296" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516297" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516298" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516299" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516300" version="1" comment="libidn11 is &lt;1.28-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516301" version="1" comment="libidn11-32bit is &lt;1.28-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516302" version="1" comment="xen is &lt;4.5.3_08-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516303" version="1" comment="xen-kmp-default is &lt;4.5.3_08_k3.12.59_60.45-17.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516304" version="1" comment="xen-libs is &lt;4.5.3_08-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516305" version="1" comment="xen-libs-32bit is &lt;4.5.3_08-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516306" version="1" comment="ctags is &lt;5.8-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516307" version="1" comment="kernel-default is &lt;3.12.51-60.25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516308" version="1" comment="kernel-default-devel is &lt;3.12.51-60.25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516309" version="1" comment="kernel-default-extra is &lt;3.12.51-60.25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516310" version="1" comment="kernel-devel is &lt;3.12.51-60.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516311" version="1" comment="kernel-macros is &lt;3.12.51-60.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516312" version="1" comment="kernel-source is &lt;3.12.51-60.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516313" version="1" comment="kernel-syms is &lt;3.12.51-60.25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516314" version="1" comment="kernel-xen is &lt;3.12.51-60.25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516315" version="1" comment="kernel-xen-devel is &lt;3.12.51-60.25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516316" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-24.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516317" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-24.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516318" version="1" comment="python is &lt;2.7.9-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516319" version="1" comment="python-base is &lt;2.7.9-24.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516320" version="1" comment="python-curses is &lt;2.7.9-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516321" version="1" comment="python-devel is &lt;2.7.9-24.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516322" version="1" comment="python-tk is &lt;2.7.9-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516323" version="1" comment="python-xml is &lt;2.7.9-24.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516324" version="1" comment="kernel-default is &lt;3.12.62-60.62.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516325" version="1" comment="kernel-default-devel is &lt;3.12.62-60.62.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516326" version="1" comment="kernel-default-extra is &lt;3.12.62-60.62.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516327" version="1" comment="kernel-devel is &lt;3.12.62-60.62.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516328" version="1" comment="kernel-macros is &lt;3.12.62-60.62.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516329" version="1" comment="kernel-source is &lt;3.12.62-60.62.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516330" version="1" comment="kernel-syms is &lt;3.12.62-60.62.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516331" version="1" comment="kernel-xen is &lt;3.12.62-60.62.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516332" version="1" comment="kernel-xen-devel is &lt;3.12.62-60.62.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516333" version="1" comment="cracklib is &lt;2.9.0-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516334" version="1" comment="libcrack2 is &lt;2.9.0-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516335" version="1" comment="libcrack2-32bit is &lt;2.9.0-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516336" version="1" comment="MozillaFirefox is &lt;45.3.0esr-78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516337" version="1" comment="MozillaFirefox-translations is &lt;45.3.0esr-78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516338" version="1" comment="krb5 is &lt;1.12.1-36.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516339" version="1" comment="krb5-32bit is &lt;1.12.1-36.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516340" version="1" comment="krb5-client is &lt;1.12.1-36.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516341" version="1" comment="dosfstools is &lt;3.0.26-6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516342" version="1" comment="rsync is &lt;3.1.0-9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516343" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-12.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516344" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-12.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516345" version="1" comment="libstorage-ruby is &lt;2.25.35.1-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516346" version="1" comment="libstorage6 is &lt;2.25.35.1-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516347" version="1" comment="fontconfig is &lt;2.11.0-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516348" version="1" comment="fontconfig-32bit is &lt;2.11.0-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516349" version="1" comment="libmysqlclient18 is &lt;10.0.26-9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516350" version="1" comment="libmysqlclient18-32bit is &lt;10.0.26-9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516351" version="1" comment="libmysqlclient_r18 is &lt;10.0.26-9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516352" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.26-9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516353" version="1" comment="mariadb is &lt;10.0.26-9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516354" version="1" comment="mariadb-client is &lt;10.0.26-9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516355" version="1" comment="mariadb-errormessages is &lt;10.0.26-9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516356" version="1" comment="wget is &lt;1.14-10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516357" version="1" comment="perl is &lt;5.18.2-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516358" version="1" comment="perl-32bit is &lt;5.18.2-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516359" version="1" comment="perl-base is &lt;5.18.2-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516360" version="1" comment="perl-doc is &lt;5.18.2-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516361" version="1" comment="libtiff5 is &lt;4.0.6-26.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516362" version="1" comment="libtiff5-32bit is &lt;4.0.6-26.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516363" version="1" comment="openssh is &lt;6.6p1-52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516364" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516365" version="1" comment="openssh-helpers is &lt;6.6p1-52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516366" version="1" comment="gd is &lt;2.1.0-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516367" version="1" comment="gd-32bit is &lt;2.1.0-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516368" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516369" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516370" version="1" comment="libdcerpc0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516371" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516372" version="1" comment="libgensec0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516373" version="1" comment="libgensec0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516374" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516375" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516376" version="1" comment="libndr-nbt0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516377" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516378" version="1" comment="libndr-standard0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516379" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516380" version="1" comment="libndr0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516381" version="1" comment="libndr0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516382" version="1" comment="libnetapi0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516383" version="1" comment="libnetapi0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516384" version="1" comment="libregistry0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516385" version="1" comment="libsamba-credentials0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516386" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516387" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516388" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516389" version="1" comment="libsamba-passdb0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516390" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516391" version="1" comment="libsamba-util0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516392" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516393" version="1" comment="libsamdb0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516394" version="1" comment="libsamdb0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516395" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516396" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516397" version="1" comment="libsmbclient0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516398" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516399" version="1" comment="libsmbconf0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516400" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516401" version="1" comment="libsmbldap0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516402" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516403" version="1" comment="libtevent-util0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516404" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516405" version="1" comment="libwbclient0 is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516406" version="1" comment="libwbclient0-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516407" version="1" comment="samba is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516408" version="1" comment="samba-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516409" version="1" comment="samba-client is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516410" version="1" comment="samba-client-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516411" version="1" comment="samba-doc is &lt;4.2.4-26.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516412" version="1" comment="samba-libs is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516413" version="1" comment="samba-libs-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516414" version="1" comment="samba-winbind is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516415" version="1" comment="samba-winbind-32bit is &lt;4.2.4-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516416" version="1" comment="wpa_supplicant is &lt;2.2-14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516417" version="1" comment="flash-player is &lt;11.2.202.635-140.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516418" version="1" comment="flash-player-gnome is &lt;11.2.202.635-140.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516419" version="1" comment="curl is &lt;7.37.0-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516420" version="1" comment="libcurl4 is &lt;7.37.0-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516421" version="1" comment="libcurl4-32bit is &lt;7.37.0-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516422" version="1" comment="libgcrypt20 is &lt;1.6.1-16.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516423" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516424" version="1" comment="at is &lt;3.1.14-7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516425" version="1" comment="bogofilter is &lt;1.2.4-5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516426" version="1" comment="libQtWebKit4 is &lt;4.8.6+2.3.3-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516427" version="1" comment="libQtWebKit4-32bit is &lt;4.8.6+2.3.3-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516428" version="1" comment="libbonobo is &lt;2.32.1-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516429" version="1" comment="libbonobo-32bit is &lt;2.32.1-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516430" version="1" comment="libbonobo-lang is &lt;2.32.1-16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516431" version="1" comment="libkde4 is &lt;4.12.0-7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516432" version="1" comment="libkde4-32bit is &lt;4.12.0-7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516433" version="1" comment="libkdecore4 is &lt;4.12.0-7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516434" version="1" comment="libkdecore4-32bit is &lt;4.12.0-7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516435" version="1" comment="libksuseinstall1 is &lt;4.12.0-7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516436" version="1" comment="libksuseinstall1-32bit is &lt;4.12.0-7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516437" version="1" comment="libnetpbm11 is &lt;10.66.3-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516438" version="1" comment="libnetpbm11-32bit is &lt;10.66.3-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516439" version="1" comment="netpbm is &lt;10.66.3-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516440" version="1" comment="openslp is &lt;2.0.0-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516441" version="1" comment="openslp-32bit is &lt;2.0.0-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516442" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516443" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516444" version="1" comment="openssl is &lt;1.0.1i-52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516445" version="1" comment="libmysqlclient18 is &lt;10.0.27-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516446" version="1" comment="libmysqlclient18-32bit is &lt;10.0.27-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516447" version="1" comment="libmysqlclient_r18 is &lt;10.0.27-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516448" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.27-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516449" version="1" comment="mariadb is &lt;10.0.27-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516450" version="1" comment="mariadb-client is &lt;10.0.27-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516451" version="1" comment="mariadb-errormessages is &lt;10.0.27-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516452" version="1" comment="bind-libs is &lt;9.9.9P1-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516453" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516454" version="1" comment="bind-utils is &lt;9.9.9P1-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516455" version="1" comment="libecpg6 is &lt;9.4.9-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516456" version="1" comment="libpq5 is &lt;9.4.9-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516457" version="1" comment="libpq5-32bit is &lt;9.4.9-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516458" version="1" comment="postgresql94 is &lt;9.4.9-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516459" version="1" comment="MozillaFirefox is &lt;45.4.0esr-81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516460" version="1" comment="MozillaFirefox-translations is &lt;45.4.0esr-81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516461" version="1" comment="wireshark is &lt;1.12.13-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516462" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516463" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516464" version="1" comment="libreoffice is &lt;5.1.5.2-29.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516465" version="1" comment="libreoffice-base is &lt;5.1.5.2-29.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516466" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.1.5.2-29.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516467" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.1.5.2-29.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516468" version="1" comment="libreoffice-calc is &lt;5.1.5.2-29.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516469" version="1" comment="libreoffice-calc-extensions is &lt;5.1.5.2-29.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516470" version="1" comment="libreoffice-draw is &lt;5.1.5.2-29.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516471" version="1" comment="libreoffice-filters-optional is &lt;5.1.5.2-29.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516472" version="1" comment="libreoffice-gnome is &lt;5.1.5.2-29.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516473" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516474" version="1" comment="libreoffice-icon-theme-tango is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516475" version="1" comment="libreoffice-impress is &lt;5.1.5.2-29.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516476" version="1" comment="libreoffice-l10n-af is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516477" version="1" comment="libreoffice-l10n-ar is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516478" version="1" comment="libreoffice-l10n-ca is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516479" version="1" comment="libreoffice-l10n-cs is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516480" version="1" comment="libreoffice-l10n-da is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516481" version="1" comment="libreoffice-l10n-de is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516482" version="1" comment="libreoffice-l10n-en is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516483" version="1" comment="libreoffice-l10n-es is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516484" version="1" comment="libreoffice-l10n-fi is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516485" version="1" comment="libreoffice-l10n-fr is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516486" version="1" comment="libreoffice-l10n-gu is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516487" version="1" comment="libreoffice-l10n-hi is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516488" version="1" comment="libreoffice-l10n-hu is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516489" version="1" comment="libreoffice-l10n-it is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516490" version="1" comment="libreoffice-l10n-ja is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516491" version="1" comment="libreoffice-l10n-ko is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516492" version="1" comment="libreoffice-l10n-nb is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516493" version="1" comment="libreoffice-l10n-nl is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516494" version="1" comment="libreoffice-l10n-nn is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516495" version="1" comment="libreoffice-l10n-pl is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516496" version="1" comment="libreoffice-l10n-pt-BR is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516497" version="1" comment="libreoffice-l10n-pt-PT is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516498" version="1" comment="libreoffice-l10n-ru is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516499" version="1" comment="libreoffice-l10n-sk is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516500" version="1" comment="libreoffice-l10n-sv is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516501" version="1" comment="libreoffice-l10n-xh is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516502" version="1" comment="libreoffice-l10n-zh-Hans is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516503" version="1" comment="libreoffice-l10n-zh-Hant is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516504" version="1" comment="libreoffice-l10n-zu is &lt;5.1.5.2-29.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516505" version="1" comment="libreoffice-mailmerge is &lt;5.1.5.2-29.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516506" version="1" comment="libreoffice-math is &lt;5.1.5.2-29.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516507" version="1" comment="libreoffice-officebean is &lt;5.1.5.2-29.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516508" version="1" comment="libreoffice-pyuno is &lt;5.1.5.2-29.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516509" version="1" comment="libreoffice-writer is &lt;5.1.5.2-29.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516510" version="1" comment="libreoffice-writer-extensions is &lt;5.1.5.2-29.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516511" version="1" comment="xen is &lt;4.5.3_10-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516512" version="1" comment="xen-kmp-default is &lt;4.5.3_10_k3.12.62_60.62-20.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516513" version="1" comment="xen-libs is &lt;4.5.3_10-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516514" version="1" comment="xen-libs-32bit is &lt;4.5.3_10-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516515" version="1" comment="libgudev-1_0-0 is &lt;210-114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516516" version="1" comment="libgudev-1_0-0-32bit is &lt;210-114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516517" version="1" comment="libudev1 is &lt;210-114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516518" version="1" comment="libudev1-32bit is &lt;210-114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516519" version="1" comment="systemd is &lt;210-114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516520" version="1" comment="systemd-32bit is &lt;210-114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516521" version="1" comment="systemd-bash-completion is &lt;210-114.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516522" version="1" comment="systemd-sysvinit is &lt;210-114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516523" version="1" comment="udev is &lt;210-114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516524" version="1" comment="ghostscript is &lt;9.15-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516525" version="1" comment="ghostscript-x11 is &lt;9.15-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516526" version="1" comment="libtiff5 is &lt;4.0.6-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516527" version="1" comment="libtiff5-32bit is &lt;4.0.6-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516528" version="1" comment="freerdp is &lt;1.0.2-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516529" version="1" comment="libfreerdp-1_0 is &lt;1.0.2-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516530" version="1" comment="libfreerdp-1_0-plugins is &lt;1.0.2-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516531" version="1" comment="libX11-6 is &lt;1.6.2-6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516532" version="1" comment="libX11-6-32bit is &lt;1.6.2-6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516533" version="1" comment="libX11-data is &lt;1.6.2-6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516534" version="1" comment="libX11-xcb1 is &lt;1.6.2-6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516535" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516536" version="1" comment="libXfixes3 is &lt;5.0.1-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516537" version="1" comment="libXfixes3-32bit is &lt;5.0.1-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516538" version="1" comment="libXi6 is &lt;1.7.4-12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516539" version="1" comment="libXi6-32bit is &lt;1.7.4-12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516540" version="1" comment="libXrandr2 is &lt;1.4.2-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516541" version="1" comment="libXrandr2-32bit is &lt;1.4.2-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516542" version="1" comment="libXrender1 is &lt;0.9.8-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516543" version="1" comment="libXrender1-32bit is &lt;0.9.8-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516544" version="1" comment="libXtst6 is &lt;1.2.2-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516545" version="1" comment="libXtst6-32bit is &lt;1.2.2-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516546" version="1" comment="libXv1 is &lt;1.0.10-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516547" version="1" comment="libXv1-32bit is &lt;1.0.10-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516548" version="1" comment="libXvMC1 is &lt;1.0.8-5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516549" version="1" comment="flash-player is &lt;11.2.202.637-143.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516550" version="1" comment="flash-player-gnome is &lt;11.2.202.637-143.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516551" version="1" comment="gtk2-lang is &lt;2.24.24-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516552" version="1" comment="gtk2-tools is &lt;2.24.24-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516553" version="1" comment="gtk2-tools-32bit is &lt;2.24.24-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516554" version="1" comment="libgtk-2_0-0 is &lt;2.24.24-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516555" version="1" comment="libgtk-2_0-0-32bit is &lt;2.24.24-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516556" version="1" comment="typelib-1_0-Gtk-2_0 is &lt;2.24.24-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516557" version="1" comment="kdump is &lt;0.8.15-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516558" version="1" comment="dbus-1 is &lt;1.8.22-22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516559" version="1" comment="dbus-1-x11 is &lt;1.8.22-22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516560" version="1" comment="libdbus-1-3 is &lt;1.8.22-22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516561" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516562" version="1" comment="libipa_hbac0 is &lt;1.11.5.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516563" version="1" comment="libsss_idmap0 is &lt;1.11.5.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516564" version="1" comment="libsss_sudo is &lt;1.11.5.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516565" version="1" comment="python-sssd-config is &lt;1.11.5.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516566" version="1" comment="sssd is &lt;1.11.5.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516567" version="1" comment="sssd-32bit is &lt;1.11.5.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516568" version="1" comment="sssd-ad is &lt;1.11.5.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516569" version="1" comment="sssd-ipa is &lt;1.11.5.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516570" version="1" comment="sssd-krb5 is &lt;1.11.5.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516571" version="1" comment="sssd-krb5-common is &lt;1.11.5.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516572" version="1" comment="sssd-ldap is &lt;1.11.5.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516573" version="1" comment="sssd-proxy is &lt;1.11.5.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516574" version="1" comment="sssd-tools is &lt;1.11.5.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516575" version="1" comment="kernel-default is &lt;3.12.62-60.64.8.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516576" version="1" comment="kernel-default-devel is &lt;3.12.62-60.64.8.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516577" version="1" comment="kernel-default-extra is &lt;3.12.62-60.64.8.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516578" version="1" comment="kernel-devel is &lt;3.12.62-60.64.8.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516579" version="1" comment="kernel-macros is &lt;3.12.62-60.64.8.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516580" version="1" comment="kernel-source is &lt;3.12.62-60.64.8.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516581" version="1" comment="kernel-syms is &lt;3.12.62-60.64.8.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516582" version="1" comment="kernel-xen is &lt;3.12.62-60.64.8.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516583" version="1" comment="kernel-xen-devel is &lt;3.12.62-60.64.8.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516584" version="1" comment="qemu is &lt;2.3.1-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516585" version="1" comment="qemu-block-curl is &lt;2.3.1-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516586" version="1" comment="qemu-ipxe is &lt;1.0.0-21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516587" version="1" comment="qemu-kvm is &lt;2.3.1-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516588" version="1" comment="qemu-seabios is &lt;1.8.1-21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516589" version="1" comment="qemu-sgabios is &lt;8-21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516590" version="1" comment="qemu-tools is &lt;2.3.1-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516591" version="1" comment="qemu-vgabios is &lt;1.8.1-21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516592" version="1" comment="qemu-x86 is &lt;2.3.1-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516593" version="1" comment="libxml2-2 is &lt;2.9.1-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516594" version="1" comment="libxml2-2-32bit is &lt;2.9.1-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516595" version="1" comment="libxml2-tools is &lt;2.9.1-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516596" version="1" comment="python-libxml2 is &lt;2.9.1-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516597" version="1" comment="ghostscript is &lt;9.15-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516598" version="1" comment="ghostscript-x11 is &lt;9.15-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516599" version="1" comment="libpython3_4m1_0 is &lt;3.4.5-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516600" version="1" comment="python3 is &lt;3.4.5-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516601" version="1" comment="python3-base is &lt;3.4.5-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516602" version="1" comment="openslp is &lt;2.0.0-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516603" version="1" comment="openslp-32bit is &lt;2.0.0-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516604" version="1" comment="flash-player is &lt;11.2.202.643-146.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516605" version="1" comment="flash-player-gnome is &lt;11.2.202.643-146.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516606" version="1" comment="gd is &lt;2.1.0-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516607" version="1" comment="gd-32bit is &lt;2.1.0-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516608" version="1" comment="ImageMagick is &lt;6.8.8.1-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516609" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516610" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516611" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516612" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516613" version="1" comment="bind-libs is &lt;9.9.9P1-49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516614" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516615" version="1" comment="bind-utils is &lt;9.9.9P1-49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516616" version="1" comment="curl is &lt;7.37.0-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516617" version="1" comment="libcurl4 is &lt;7.37.0-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516618" version="1" comment="libcurl4-32bit is &lt;7.37.0-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516619" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.72-3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516620" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.72-3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516621" version="1" comment="libblkid1 is &lt;2.25-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516622" version="1" comment="libblkid1-32bit is &lt;2.25-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516623" version="1" comment="libmount1 is &lt;2.25-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516624" version="1" comment="libmount1-32bit is &lt;2.25-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516625" version="1" comment="libsmartcols1 is &lt;2.25-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516626" version="1" comment="libuuid-devel is &lt;2.25-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516627" version="1" comment="libuuid1 is &lt;2.25-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516628" version="1" comment="libuuid1-32bit is &lt;2.25-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516629" version="1" comment="python-libmount is &lt;2.25-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516630" version="1" comment="util-linux is &lt;2.25-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516631" version="1" comment="util-linux-lang is &lt;2.25-37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516632" version="1" comment="util-linux-systemd is &lt;2.25-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516633" version="1" comment="uuidd is &lt;2.25-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516634" version="1" comment="libjasper1 is &lt;1.900.14-181.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516635" version="1" comment="libjasper1-32bit is &lt;1.900.14-181.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516636" version="1" comment="flash-player is &lt;11.2.202.644-149.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516637" version="1" comment="flash-player-gnome is &lt;11.2.202.644-149.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516638" version="1" comment="ghostscript is &lt;9.15-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516639" version="1" comment="ghostscript-x11 is &lt;9.15-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516640" version="1" comment="eog is &lt;3.10.2-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516641" version="1" comment="eog-lang is &lt;3.10.2-2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516642" version="1" comment="bash is &lt;4.2-82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516643" version="1" comment="bash-doc is &lt;4.2-82.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516644" version="1" comment="bash-lang is &lt;4.2-82.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516645" version="1" comment="libreadline6 is &lt;6.2-82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516646" version="1" comment="libreadline6-32bit is &lt;6.2-82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516647" version="1" comment="readline-doc is &lt;6.2-82.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516648" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.111-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516649" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.111-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516650" version="1" comment="tar is &lt;1.27.1-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516651" version="1" comment="tar-lang is &lt;1.27.1-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516652" version="1" comment="sudo is &lt;1.8.10p3-2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516653" version="1" comment="libarchive13 is &lt;3.1.2-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516654" version="1" comment="kernel-default is &lt;3.12.67-60.64.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516655" version="1" comment="kernel-default-devel is &lt;3.12.67-60.64.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516656" version="1" comment="kernel-default-extra is &lt;3.12.67-60.64.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516657" version="1" comment="kernel-devel is &lt;3.12.67-60.64.18.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516658" version="1" comment="kernel-macros is &lt;3.12.67-60.64.18.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516659" version="1" comment="kernel-source is &lt;3.12.67-60.64.18.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516660" version="1" comment="kernel-syms is &lt;3.12.67-60.64.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516661" version="1" comment="kernel-xen is &lt;3.12.67-60.64.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516662" version="1" comment="kernel-xen-devel is &lt;3.12.67-60.64.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516663" version="1" comment="libmysqlclient18 is &lt;10.0.28-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516664" version="1" comment="libmysqlclient18-32bit is &lt;10.0.28-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516665" version="1" comment="libmysqlclient_r18 is &lt;10.0.28-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516666" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.28-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516667" version="1" comment="mariadb is &lt;10.0.28-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516668" version="1" comment="mariadb-client is &lt;10.0.28-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516669" version="1" comment="mariadb-errormessages is &lt;10.0.28-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516670" version="1" comment="gvim is &lt;7.4.326-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516671" version="1" comment="vim is &lt;7.4.326-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516672" version="1" comment="vim-data is &lt;7.4.326-7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516673" version="1" comment="ImageMagick is &lt;6.8.8.1-47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516674" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516675" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516676" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516677" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516678" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.121-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516679" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.121-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516680" version="1" comment="libc-client2007e_suse is &lt;2007e_suse-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516681" version="1" comment="libpcre1 is &lt;8.39-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516682" version="1" comment="libpcre1-32bit is &lt;8.39-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516683" version="1" comment="libpcre16-0 is &lt;8.39-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516684" version="1" comment="libpcrecpp0 is &lt;8.39-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516685" version="1" comment="libpcrecpp0-32bit is &lt;8.39-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516686" version="1" comment="qemu is &lt;2.3.1-24.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516687" version="1" comment="qemu-block-curl is &lt;2.3.1-24.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516688" version="1" comment="qemu-ipxe is &lt;1.0.0-24.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516689" version="1" comment="qemu-kvm is &lt;2.3.1-24.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516690" version="1" comment="qemu-seabios is &lt;1.8.1-24.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516691" version="1" comment="qemu-sgabios is &lt;8-24.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516692" version="1" comment="qemu-tools is &lt;2.3.1-24.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516693" version="1" comment="qemu-vgabios is &lt;1.8.1-24.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516694" version="1" comment="qemu-x86 is &lt;2.3.1-24.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516695" version="1" comment="libX11-6 is &lt;1.6.2-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516696" version="1" comment="libX11-6-32bit is &lt;1.6.2-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516697" version="1" comment="libX11-data is &lt;1.6.2-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516698" version="1" comment="libX11-xcb1 is &lt;1.6.2-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516699" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516700" version="1" comment="MozillaFirefox is &lt;45.5.0esr-88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516701" version="1" comment="MozillaFirefox-translations is &lt;45.5.0esr-88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516702" version="1" comment="libfreebl3 is &lt;3.21.3-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516703" version="1" comment="libfreebl3-32bit is &lt;3.21.3-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516704" version="1" comment="libsoftokn3 is &lt;3.21.3-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516705" version="1" comment="libsoftokn3-32bit is &lt;3.21.3-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516706" version="1" comment="mozilla-nss is &lt;3.21.3-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516707" version="1" comment="mozilla-nss-32bit is &lt;3.21.3-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516708" version="1" comment="mozilla-nss-certs is &lt;3.21.3-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516709" version="1" comment="mozilla-nss-certs-32bit is &lt;3.21.3-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516710" version="1" comment="mozilla-nss-sysinit is &lt;3.21.3-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516711" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.21.3-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516712" version="1" comment="mozilla-nss-tools is &lt;3.21.3-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516713" version="1" comment="kernel-default is &lt;3.12.67-60.64.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516714" version="1" comment="kernel-default-devel is &lt;3.12.67-60.64.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516715" version="1" comment="kernel-default-extra is &lt;3.12.67-60.64.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516716" version="1" comment="kernel-devel is &lt;3.12.67-60.64.21.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516717" version="1" comment="kernel-macros is &lt;3.12.67-60.64.21.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516718" version="1" comment="kernel-source is &lt;3.12.67-60.64.21.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516719" version="1" comment="kernel-syms is &lt;3.12.67-60.64.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516720" version="1" comment="kernel-xen is &lt;3.12.67-60.64.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516721" version="1" comment="kernel-xen-devel is &lt;3.12.67-60.64.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516722" version="1" comment="libXi6 is &lt;1.7.4-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516723" version="1" comment="libXi6-32bit is &lt;1.7.4-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516724" version="1" comment="MozillaFirefox is &lt;45.5.1esr-93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516725" version="1" comment="MozillaFirefox-translations is &lt;45.5.1esr-93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516726" version="1" comment="w3m is &lt;0.5.3.git20161120-160.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516727" version="1" comment="libgc1 is &lt;7.2d-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516728" version="1" comment="xen is &lt;4.5.5_02-22.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516729" version="1" comment="xen-kmp-default is &lt;4.5.5_02_k3.12.67_60.64.18-22.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516730" version="1" comment="xen-libs is &lt;4.5.5_02-22.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516731" version="1" comment="xen-libs-32bit is &lt;4.5.5_02-22.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516732" version="1" comment="libass5 is &lt;0.10.2-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516733" version="1" comment="flash-player is &lt;24.0.0.186-152.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516734" version="1" comment="flash-player-gnome is &lt;24.0.0.186-152.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516735" version="1" comment="libpcre1 is &lt;8.39-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516736" version="1" comment="libpcre1-32bit is &lt;8.39-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516737" version="1" comment="libpcre16-0 is &lt;8.39-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516738" version="1" comment="libpcrecpp0 is &lt;8.39-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516739" version="1" comment="libpcrecpp0-32bit is &lt;8.39-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516740" version="1" comment="libmysqlclient18 is &lt;10.0.22-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516741" version="1" comment="libmysqlclient18-32bit is &lt;10.0.22-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516742" version="1" comment="libmysqlclient_r18 is &lt;10.0.22-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516743" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.22-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516744" version="1" comment="mariadb is &lt;10.0.22-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516745" version="1" comment="mariadb-client is &lt;10.0.22-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516746" version="1" comment="mariadb-errormessages is &lt;10.0.22-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516747" version="1" comment="kernel-default is &lt;3.12.67-60.64.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516748" version="1" comment="kernel-default-devel is &lt;3.12.67-60.64.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516749" version="1" comment="kernel-default-extra is &lt;3.12.67-60.64.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516750" version="1" comment="kernel-devel is &lt;3.12.67-60.64.24.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516751" version="1" comment="kernel-macros is &lt;3.12.67-60.64.24.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516752" version="1" comment="kernel-source is &lt;3.12.67-60.64.24.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516753" version="1" comment="kernel-syms is &lt;3.12.67-60.64.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516754" version="1" comment="kernel-xen is &lt;3.12.67-60.64.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516755" version="1" comment="kernel-xen-devel is &lt;3.12.67-60.64.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516756" version="1" comment="ntp is &lt;4.2.8p9-55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516757" version="1" comment="ntp-doc is &lt;4.2.8p9-55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516758" version="1" comment="xen is &lt;4.5.5_04-22.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516759" version="1" comment="xen-kmp-default is &lt;4.5.5_04_k3.12.67_60.64.24-22.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516760" version="1" comment="xen-libs is &lt;4.5.5_04-22.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516761" version="1" comment="xen-libs-32bit is &lt;4.5.5_04-22.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516762" version="1" comment="gd is &lt;2.1.0-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516763" version="1" comment="gd-32bit is &lt;2.1.0-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516764" version="1" comment="MozillaFirefox is &lt;45.6.0esr-96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516765" version="1" comment="MozillaFirefox-translations is &lt;45.6.0esr-96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516766" version="1" comment="libgme0 is &lt;0.6.0-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516767" version="1" comment="ImageMagick is &lt;6.8.8.1-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516768" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516769" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516770" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516771" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516772" version="1" comment="wget is &lt;1.14-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516773" version="1" comment="dnsmasq is &lt;2.71-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516774" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516775" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516776" version="1" comment="libdcerpc0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516777" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516778" version="1" comment="libgensec0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516779" version="1" comment="libgensec0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516780" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516781" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516782" version="1" comment="libndr-nbt0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516783" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516784" version="1" comment="libndr-standard0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516785" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516786" version="1" comment="libndr0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516787" version="1" comment="libndr0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516788" version="1" comment="libnetapi0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516789" version="1" comment="libnetapi0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516790" version="1" comment="libregistry0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516791" version="1" comment="libsamba-credentials0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516792" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516793" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516794" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516795" version="1" comment="libsamba-passdb0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516796" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516797" version="1" comment="libsamba-util0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516798" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516799" version="1" comment="libsamdb0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516800" version="1" comment="libsamdb0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516801" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516802" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516803" version="1" comment="libsmbclient0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516804" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516805" version="1" comment="libsmbconf0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516806" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516807" version="1" comment="libsmbldap0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516808" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516809" version="1" comment="libtevent-util0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516810" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516811" version="1" comment="libwbclient0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516812" version="1" comment="libwbclient0-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516813" version="1" comment="samba is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516814" version="1" comment="samba-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516815" version="1" comment="samba-client is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516816" version="1" comment="samba-client-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516817" version="1" comment="samba-doc is &lt;4.2.4-28.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516818" version="1" comment="samba-libs is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516819" version="1" comment="samba-libs-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516820" version="1" comment="samba-winbind is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516821" version="1" comment="samba-winbind-32bit is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516822" version="1" comment="gstreamer-plugins-good is &lt;1.2.4-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516823" version="1" comment="gstreamer-plugins-good-lang is &lt;1.2.4-2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516824" version="1" comment="libcares2 is &lt;1.9.1-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516825" version="1" comment="libcares2-32bit is &lt;1.9.1-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516826" version="1" comment="gstreamer-plugins-bad is &lt;1.2.4-3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516827" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.2.4-3.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516828" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.2.4-3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516829" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.2.4-3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516830" version="1" comment="libgstegl-1_0-0 is &lt;1.2.4-3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516831" version="1" comment="libgstmpegts-1_0-0 is &lt;1.2.4-3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516832" version="1" comment="libgstphotography-1_0-0 is &lt;1.2.4-3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516833" version="1" comment="libtiff5 is &lt;4.0.7-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516834" version="1" comment="libtiff5-32bit is &lt;4.0.7-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516835" version="1" comment="qemu is &lt;2.3.1-7.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516836" version="1" comment="qemu-block-curl is &lt;2.3.1-7.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516837" version="1" comment="qemu-ipxe is &lt;1.0.0-7.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516838" version="1" comment="qemu-kvm is &lt;2.3.1-7.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516839" version="1" comment="qemu-seabios is &lt;1.8.1-7.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516840" version="1" comment="qemu-sgabios is &lt;8-7.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516841" version="1" comment="qemu-tools is &lt;2.3.1-7.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516842" version="1" comment="qemu-vgabios is &lt;1.8.1-7.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516843" version="1" comment="qemu-x86 is &lt;2.3.1-7.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516844" version="1" comment="glibc is &lt;2.19-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516845" version="1" comment="glibc-32bit is &lt;2.19-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516846" version="1" comment="glibc-devel is &lt;2.19-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516847" version="1" comment="glibc-devel-32bit is &lt;2.19-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516848" version="1" comment="glibc-i18ndata is &lt;2.19-35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516849" version="1" comment="glibc-locale is &lt;2.19-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516850" version="1" comment="glibc-locale-32bit is &lt;2.19-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516851" version="1" comment="nscd is &lt;2.19-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516852" version="1" comment="dhcp is &lt;4.3.3-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516853" version="1" comment="dhcp-client is &lt;4.3.3-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516854" version="1" comment="kernel-default is &lt;3.12.53-60.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516855" version="1" comment="kernel-default-devel is &lt;3.12.53-60.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516856" version="1" comment="kernel-default-extra is &lt;3.12.53-60.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516857" version="1" comment="kernel-devel is &lt;3.12.53-60.30.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516858" version="1" comment="kernel-macros is &lt;3.12.53-60.30.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516859" version="1" comment="kernel-source is &lt;3.12.53-60.30.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516860" version="1" comment="kernel-syms is &lt;3.12.53-60.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516861" version="1" comment="kernel-xen is &lt;3.12.53-60.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516862" version="1" comment="kernel-xen-devel is &lt;3.12.53-60.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516863" version="1" comment="libpng15-15 is &lt;1.5.22-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516864" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516865" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516866" version="1" comment="openssl is &lt;1.0.1i-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516867" version="1" comment="bind-libs is &lt;9.9.6P1-38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516868" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516869" version="1" comment="bind-utils is &lt;9.9.6P1-38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516870" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516871" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516872" version="1" comment="libdcerpc0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516873" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516874" version="1" comment="libgensec0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516875" version="1" comment="libgensec0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516876" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516877" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516878" version="1" comment="libndr-nbt0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516879" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516880" version="1" comment="libndr-standard0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516881" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516882" version="1" comment="libndr0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516883" version="1" comment="libndr0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516884" version="1" comment="libnetapi0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516885" version="1" comment="libnetapi0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516886" version="1" comment="libregistry0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516887" version="1" comment="libsamba-credentials0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516888" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516889" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516890" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516891" version="1" comment="libsamba-passdb0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516892" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516893" version="1" comment="libsamba-util0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516894" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516895" version="1" comment="libsamdb0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516896" version="1" comment="libsamdb0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516897" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516898" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516899" version="1" comment="libsmbclient0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516900" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516901" version="1" comment="libsmbconf0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516902" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516903" version="1" comment="libsmbldap0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516904" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516905" version="1" comment="libtevent-util0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516906" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516907" version="1" comment="libwbclient0 is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516908" version="1" comment="libwbclient0-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516909" version="1" comment="samba is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516910" version="1" comment="samba-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516911" version="1" comment="samba-client is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516912" version="1" comment="samba-client-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516913" version="1" comment="samba-doc is &lt;4.2.4-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516914" version="1" comment="samba-libs is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516915" version="1" comment="samba-libs-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516916" version="1" comment="samba-winbind is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516917" version="1" comment="samba-winbind-32bit is &lt;4.2.4-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516918" version="1" comment="xen is &lt;4.5.2_06-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516919" version="1" comment="xen-kmp-default is &lt;4.5.2_06_k3.12.53_60.30-7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516920" version="1" comment="xen-libs is &lt;4.5.2_06-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516921" version="1" comment="xen-libs-32bit is &lt;4.5.2_06-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516922" version="1" comment="libvirt is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516923" version="1" comment="libvirt-client is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516924" version="1" comment="libvirt-client-32bit is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516925" version="1" comment="libvirt-daemon is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516926" version="1" comment="libvirt-daemon-config-network is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516927" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516928" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516929" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516930" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516931" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516932" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516933" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516934" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516935" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516936" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516937" version="1" comment="libvirt-daemon-lxc is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516938" version="1" comment="libvirt-daemon-qemu is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516939" version="1" comment="libvirt-daemon-xen is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516940" version="1" comment="libvirt-doc is &lt;1.2.18.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516941" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.77-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516942" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.77-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516943" version="1" comment="kernel-default is &lt;3.12.57-60.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516944" version="1" comment="kernel-default-devel is &lt;3.12.57-60.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516945" version="1" comment="kernel-default-extra is &lt;3.12.57-60.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516946" version="1" comment="kernel-devel is &lt;3.12.57-60.35.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516947" version="1" comment="kernel-macros is &lt;3.12.57-60.35.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516948" version="1" comment="kernel-source is &lt;3.12.57-60.35.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516949" version="1" comment="kernel-syms is &lt;3.12.57-60.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516950" version="1" comment="kernel-xen is &lt;3.12.57-60.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516951" version="1" comment="kernel-xen-devel is &lt;3.12.57-60.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516952" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516953" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516954" version="1" comment="libdcerpc0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516955" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516956" version="1" comment="libgensec0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516957" version="1" comment="libgensec0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516958" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516959" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516960" version="1" comment="libndr-nbt0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516961" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516962" version="1" comment="libndr-standard0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516963" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516964" version="1" comment="libndr0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516965" version="1" comment="libndr0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516966" version="1" comment="libnetapi0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516967" version="1" comment="libnetapi0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516968" version="1" comment="libregistry0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516969" version="1" comment="libsamba-credentials0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516970" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516971" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516972" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516973" version="1" comment="libsamba-passdb0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516974" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516975" version="1" comment="libsamba-util0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516976" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516977" version="1" comment="libsamdb0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516978" version="1" comment="libsamdb0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516979" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516980" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516981" version="1" comment="libsmbclient0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516982" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516983" version="1" comment="libsmbconf0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516984" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516985" version="1" comment="libsmbldap0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516986" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516987" version="1" comment="libtevent-util0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516988" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516989" version="1" comment="libwbclient0 is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516990" version="1" comment="libwbclient0-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516991" version="1" comment="samba is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516992" version="1" comment="samba-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516993" version="1" comment="samba-client is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516994" version="1" comment="samba-client-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516995" version="1" comment="samba-doc is &lt;4.2.4-16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516996" version="1" comment="samba-libs is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516997" version="1" comment="samba-libs-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516998" version="1" comment="samba-winbind is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516999" version="1" comment="samba-winbind-32bit is &lt;4.2.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517000" version="1" comment="libcairo-script-interpreter2 is &lt;1.12.16-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517001" version="1" comment="yast2-users is &lt;3.1.41.3-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517002" version="1" comment="ntp is &lt;4.2.8p6-8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517003" version="1" comment="ntp-doc is &lt;4.2.8p6-8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517004" version="1" comment="yast2-ntp-client is &lt;3.1.22-6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517005" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517006" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517007" version="1" comment="openssl is &lt;1.0.1i-47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517008" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.91-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517009" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.91-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517010" version="1" comment="ntp is &lt;4.2.8p7-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517011" version="1" comment="ntp-doc is &lt;4.2.8p7-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517012" version="1" comment="libgudev-1_0-0 is &lt;210-104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517013" version="1" comment="libgudev-1_0-0-32bit is &lt;210-104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517014" version="1" comment="libudev1 is &lt;210-104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517015" version="1" comment="libudev1-32bit is &lt;210-104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517016" version="1" comment="systemd is &lt;210-104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517017" version="1" comment="systemd-32bit is &lt;210-104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517018" version="1" comment="systemd-bash-completion is &lt;210-104.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517019" version="1" comment="systemd-sysvinit is &lt;210-104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517020" version="1" comment="udev is &lt;210-104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517021" version="1" comment="python-requests is &lt;2.8.1-6.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517022" version="1" comment="libspice-server1 is &lt;0.12.5-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517023" version="1" comment="ntp is &lt;4.2.8p8-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517024" version="1" comment="ntp-doc is &lt;4.2.8p8-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517025" version="1" comment="libmysqlclient18 is &lt;10.0.25-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517026" version="1" comment="libmysqlclient18-32bit is &lt;10.0.25-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517027" version="1" comment="libmysqlclient_r18 is &lt;10.0.25-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517028" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.25-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517029" version="1" comment="mariadb is &lt;10.0.25-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517030" version="1" comment="mariadb-client is &lt;10.0.25-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517031" version="1" comment="mariadb-errormessages is &lt;10.0.25-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517032" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.31-13.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517033" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.31-13.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517034" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.36-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517035" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517036" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.36-11.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517037" version="1" comment="libgstapp-0_10-0 is &lt;0.10.36-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517038" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517039" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.36-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517040" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517041" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-19.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517042" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-19.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517043" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-19.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517044" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-19.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517045" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-19.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517046" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-19.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517047" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-19.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517048" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-19.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517049" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-19.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517050" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-19.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517051" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-19.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517052" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-19.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517053" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-19.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517054" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517055" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-19.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517056" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517057" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517058" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517059" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517060" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517061" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517062" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517063" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517064" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517065" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517066" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517067" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.121-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517068" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.121-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517069" version="1" comment="gnutls is &lt;3.2.15-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517070" version="1" comment="libgnutls28 is &lt;3.2.15-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517071" version="1" comment="libgnutls28-32bit is &lt;3.2.15-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517072" version="1" comment="cpio is &lt;2.11-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517073" version="1" comment="cpio-lang is &lt;2.11-32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517074" version="1" comment="guile is &lt;2.0.9-8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517075" version="1" comment="guile-modules-2_0 is &lt;2.0.9-8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517076" version="1" comment="libguile-2_0-22 is &lt;2.0.9-8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517077" version="1" comment="libspice-server1 is &lt;0.12.5-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517078" version="1" comment="libmysqlclient18 is &lt;10.0.29-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517079" version="1" comment="libmysqlclient18-32bit is &lt;10.0.29-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517080" version="1" comment="libmysqlclient_r18 is &lt;10.0.29-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517081" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.29-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517082" version="1" comment="mariadb is &lt;10.0.29-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517083" version="1" comment="mariadb-client is &lt;10.0.29-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517084" version="1" comment="mariadb-errormessages is &lt;10.0.29-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517085" version="1" comment="expat is &lt;2.1.0-20.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517086" version="1" comment="libexpat1 is &lt;2.1.0-20.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517087" version="1" comment="libexpat1-32bit is &lt;2.1.0-20.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517088" version="1" comment="MozillaFirefox is &lt;45.7.0esr-99.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517089" version="1" comment="MozillaFirefox-translations is &lt;45.7.0esr-99.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517090" version="1" comment="libopus0 is &lt;1.1-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517091" version="1" comment="libtiff5 is &lt;4.0.7-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517092" version="1" comment="libtiff5-32bit is &lt;4.0.7-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517093" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-54.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517094" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-54.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517095" version="1" comment="openssl is &lt;1.0.1i-54.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517096" version="1" comment="kernel-default is &lt;3.12.69-60.64.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517097" version="1" comment="kernel-default-devel is &lt;3.12.69-60.64.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517098" version="1" comment="kernel-default-extra is &lt;3.12.69-60.64.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517099" version="1" comment="kernel-devel is &lt;3.12.69-60.64.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517100" version="1" comment="kernel-macros is &lt;3.12.69-60.64.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517101" version="1" comment="kernel-source is &lt;3.12.69-60.64.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517102" version="1" comment="kernel-syms is &lt;3.12.69-60.64.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517103" version="1" comment="kernel-xen is &lt;3.12.69-60.64.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517104" version="1" comment="kernel-xen-devel is &lt;3.12.69-60.64.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517105" version="1" comment="libXpm4 is &lt;3.5.11-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517106" version="1" comment="libXpm4-32bit is &lt;3.5.11-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517107" version="1" comment="gd is &lt;2.1.0-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517108" version="1" comment="gd-32bit is &lt;2.1.0-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517109" version="1" comment="ppp is &lt;2.4.7-3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517110" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.131-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517111" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.131-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517112" version="1" comment="tigervnc is &lt;1.4.3-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517113" version="1" comment="xorg-x11-Xvnc is &lt;1.4.3-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517114" version="1" comment="kernel-default is &lt;3.12.69-60.64.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517115" version="1" comment="kernel-default-devel is &lt;3.12.69-60.64.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517116" version="1" comment="kernel-default-extra is &lt;3.12.69-60.64.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517117" version="1" comment="kernel-devel is &lt;3.12.69-60.64.32.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517118" version="1" comment="kernel-macros is &lt;3.12.69-60.64.32.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517119" version="1" comment="kernel-source is &lt;3.12.69-60.64.32.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517120" version="1" comment="kernel-syms is &lt;3.12.69-60.64.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517121" version="1" comment="kernel-xen is &lt;3.12.69-60.64.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517122" version="1" comment="kernel-xen-devel is &lt;3.12.69-60.64.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517123" version="1" comment="flash-player is &lt;24.0.0.221-158.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517124" version="1" comment="flash-player-gnome is &lt;24.0.0.221-158.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517125" version="1" comment="libjasper1 is &lt;1.900.14-184.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517126" version="1" comment="libjasper1-32bit is &lt;1.900.14-184.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517127" version="1" comment="ImageMagick is &lt;6.8.8.1-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517128" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517129" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517130" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517131" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517132" version="1" comment="libblkid1 is &lt;2.25-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517133" version="1" comment="libblkid1-32bit is &lt;2.25-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517134" version="1" comment="libmount1 is &lt;2.25-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517135" version="1" comment="libmount1-32bit is &lt;2.25-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517136" version="1" comment="libsmartcols1 is &lt;2.25-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517137" version="1" comment="libuuid-devel is &lt;2.25-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517138" version="1" comment="libuuid1 is &lt;2.25-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517139" version="1" comment="libuuid1-32bit is &lt;2.25-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517140" version="1" comment="python-libmount is &lt;2.25-40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517141" version="1" comment="util-linux is &lt;2.25-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517142" version="1" comment="util-linux-lang is &lt;2.25-40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517143" version="1" comment="util-linux-systemd is &lt;2.25-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517144" version="1" comment="uuidd is &lt;2.25-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517145" version="1" comment="xen is &lt;4.5.5_06-22.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517146" version="1" comment="xen-kmp-default is &lt;4.5.5_06_k3.12.69_60.64.32-22.11.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517147" version="1" comment="xen-libs is &lt;4.5.5_06-22.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517148" version="1" comment="xen-libs-32bit is &lt;4.5.5_06-22.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517149" version="1" comment="libz1 is &lt;1.2.8-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517150" version="1" comment="libz1-32bit is &lt;1.2.8-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517151" version="1" comment="bind-libs is &lt;9.9.9P1-56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517152" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517153" version="1" comment="bind-utils is &lt;9.9.9P1-56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517154" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517155" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517156" version="1" comment="openssh is &lt;6.6p1-54.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517157" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-54.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517158" version="1" comment="openssh-helpers is &lt;6.6p1-54.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517159" version="1" comment="libquicktime0 is &lt;1.2.4-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517160" version="1" comment="dracut is &lt;037-91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517161" version="1" comment="dbus-1 is &lt;1.8.22-24.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517162" version="1" comment="dbus-1-x11 is &lt;1.8.22-24.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517163" version="1" comment="libdbus-1-3 is &lt;1.8.22-24.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517164" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-24.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517165" version="1" comment="gegl-0_2 is &lt;0.2.0-10.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517166" version="1" comment="gegl-0_2-lang is &lt;0.2.0-10.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517167" version="1" comment="libgegl-0_2-0 is &lt;0.2.0-10.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517168" version="1" comment="libvmtools0 is &lt;10.1.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517169" version="1" comment="open-vm-tools is &lt;10.1.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517170" version="1" comment="open-vm-tools-desktop is &lt;10.1.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517171" version="1" comment="flash-player is &lt;25.0.0.127-162.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517172" version="1" comment="flash-player-gnome is &lt;25.0.0.127-162.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517173" version="1" comment="MozillaFirefox is &lt;45.8.0esr-102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517174" version="1" comment="MozillaFirefox-translations is &lt;45.8.0esr-102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517175" version="1" comment="sane-backends is &lt;1.0.24-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517176" version="1" comment="sane-backends-32bit is &lt;1.0.24-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517177" version="1" comment="sane-backends-autoconfig is &lt;1.0.24-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517178" version="1" comment="rrdtool is &lt;1.4.7-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517179" version="1" comment="rrdtool-cached is &lt;1.4.7-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517180" version="1" comment="wget is &lt;1.14-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517181" version="1" comment="libpng16-16 is &lt;1.6.8-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517182" version="1" comment="libpng16-16-32bit is &lt;1.6.8-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517183" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517184" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517185" version="1" comment="libdcerpc0 is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517186" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517187" version="1" comment="libgensec0 is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517188" version="1" comment="libgensec0-32bit is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517189" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517190" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517191" version="1" comment="libndr-nbt0 is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517192" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517193" version="1" comment="libndr-standard0 is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517194" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517195" version="1" comment="libndr0 is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517196" version="1" comment="libndr0-32bit is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517197" version="1" comment="libnetapi0 is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517198" version="1" comment="libnetapi0-32bit is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517199" version="1" comment="libregistry0 is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517200" version="1" comment="libsamba-credentials0 is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517201" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517202" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517203" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517204" version="1" comment="libsamba-passdb0 is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517205" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517206" version="1" comment="libsamba-util0 is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517207" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517208" version="1" comment="libsamdb0 is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517209" version="1" comment="libsamdb0-32bit is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517210" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517211" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517212" version="1" comment="libsmbclient0 is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517213" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517214" version="1" comment="libsmbconf0 is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517215" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517216" version="1" comment="libsmbldap0 is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517217" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517218" version="1" comment="libtevent-util0 is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517219" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517220" version="1" comment="libwbclient0 is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517221" version="1" comment="libwbclient0-32bit is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517222" version="1" comment="samba is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517223" version="1" comment="samba-32bit is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517224" version="1" comment="samba-client is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517225" version="1" comment="samba-client-32bit is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517226" version="1" comment="samba-doc is &lt;4.2.4-28.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517227" version="1" comment="samba-libs is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517228" version="1" comment="samba-libs-32bit is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517229" version="1" comment="samba-winbind is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517230" version="1" comment="samba-winbind-32bit is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517231" version="1" comment="libpng12-0 is &lt;1.2.50-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517232" version="1" comment="libpng12-0-32bit is &lt;1.2.50-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517233" version="1" comment="kernel-default is &lt;3.12.69-60.64.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517234" version="1" comment="kernel-default-devel is &lt;3.12.69-60.64.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517235" version="1" comment="kernel-default-extra is &lt;3.12.69-60.64.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517236" version="1" comment="kernel-devel is &lt;3.12.69-60.64.35.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517237" version="1" comment="kernel-macros is &lt;3.12.69-60.64.35.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517238" version="1" comment="kernel-source is &lt;3.12.69-60.64.35.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517239" version="1" comment="kernel-syms is &lt;3.12.69-60.64.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517240" version="1" comment="kernel-xen is &lt;3.12.69-60.64.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517241" version="1" comment="kernel-xen-devel is &lt;3.12.69-60.64.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517242" version="1" comment="flash-player is &lt;24.0.0.194-155.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517243" version="1" comment="flash-player-gnome is &lt;24.0.0.194-155.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517244" version="1" comment="bind-libs is &lt;9.9.9P1-53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517245" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517246" version="1" comment="bind-utils is &lt;9.9.9P1-53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517247" version="1" comment="audiofile is &lt;0.3.6-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517248" version="1" comment="libaudiofile1 is &lt;0.3.6-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517249" version="1" comment="libaudiofile1-32bit is &lt;0.3.6-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517250" version="1" comment="libpng15-15 is &lt;1.5.22-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517251" version="1" comment="libjasper1 is &lt;1.900.14-194.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517252" version="1" comment="libjasper1-32bit is &lt;1.900.14-194.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517253" version="1" comment="gstreamer is &lt;1.2.4-2.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517254" version="1" comment="gstreamer-lang is &lt;1.2.4-2.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517255" version="1" comment="gstreamer-utils is &lt;1.2.4-2.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517256" version="1" comment="libgstreamer-1_0-0 is &lt;1.2.4-2.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517257" version="1" comment="libgstreamer-1_0-0-32bit is &lt;1.2.4-2.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517258" version="1" comment="typelib-1_0-Gst-1_0 is &lt;1.2.4-2.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517259" version="1" comment="flash-player is &lt;25.0.0.148-165.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517260" version="1" comment="flash-player-gnome is &lt;25.0.0.148-165.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517261" version="1" comment="bind-libs is &lt;9.9.9P1-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517262" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517263" version="1" comment="bind-utils is &lt;9.9.9P1-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517264" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.36-11.6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517265" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-11.6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517266" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.36-11.6.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517267" version="1" comment="libgstapp-0_10-0 is &lt;0.10.36-11.6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517268" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-11.6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517269" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.36-11.6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517270" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-11.6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517271" version="1" comment="gstreamer-plugins-good is &lt;1.2.4-2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517272" version="1" comment="gstreamer-plugins-good-lang is &lt;1.2.4-2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517273" version="1" comment="gstreamer-plugins-base is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517274" version="1" comment="gstreamer-plugins-base-lang is &lt;1.2.4-2.6.8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517275" version="1" comment="libgstallocators-1_0-0 is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517276" version="1" comment="libgstapp-1_0-0 is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517277" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517278" version="1" comment="libgstaudio-1_0-0 is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517279" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517280" version="1" comment="libgstfft-1_0-0 is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517281" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517282" version="1" comment="libgstpbutils-1_0-0 is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517283" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517284" version="1" comment="libgstriff-1_0-0 is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517285" version="1" comment="libgstrtp-1_0-0 is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517286" version="1" comment="libgstrtsp-1_0-0 is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517287" version="1" comment="libgstsdp-1_0-0 is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517288" version="1" comment="libgsttag-1_0-0 is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517289" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517290" version="1" comment="libgstvideo-1_0-0 is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517291" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517292" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517293" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517294" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517295" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.2.4-2.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517296" version="1" comment="libsndfile1 is &lt;1.0.25-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517297" version="1" comment="libsndfile1-32bit is &lt;1.0.25-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517298" version="1" comment="curl is &lt;7.37.0-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517299" version="1" comment="libcurl4 is &lt;7.37.0-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517300" version="1" comment="libcurl4-32bit is &lt;7.37.0-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517301" version="1" comment="libtiff5 is &lt;4.0.7-43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517302" version="1" comment="libtiff5-32bit is &lt;4.0.7-43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517303" version="1" comment="ntp is &lt;4.2.8p10-60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517304" version="1" comment="ntp-doc is &lt;4.2.8p10-60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517305" version="1" comment="libruby2_1-2_1 is &lt;2.1.9-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517306" version="1" comment="ruby2.1 is &lt;2.1.9-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517307" version="1" comment="ruby2.1-stdlib is &lt;2.1.9-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517308" version="1" comment="minicom is &lt;2.7-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517309" version="1" comment="tigervnc is &lt;1.4.3-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517310" version="1" comment="xorg-x11-Xvnc is &lt;1.4.3-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517311" version="1" comment="libzzip-0-13 is &lt;0.13.62-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517312" version="1" comment="update-alternatives is &lt;1.16.10-12.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517313" version="1" comment="libpcap1 is &lt;1.8.1-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517314" version="1" comment="libpcap1-32bit is &lt;1.8.1-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517315" version="1" comment="tcpdump is &lt;4.9.0-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517316" version="1" comment="ghostscript is &lt;9.15-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517317" version="1" comment="ghostscript-x11 is &lt;9.15-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517318" version="1" comment="xen is &lt;4.5.5_10-22.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517319" version="1" comment="xen-kmp-default is &lt;4.5.5_10_k3.12.69_60.64.35-22.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517320" version="1" comment="xen-libs is &lt;4.5.5_10-22.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517321" version="1" comment="xen-libs-32bit is &lt;4.5.5_10-22.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517322" version="1" comment="libgraphite2-3 is &lt;1.3.1-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517323" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517324" version="1" comment="apparmor-docs is &lt;2.8.2-54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517325" version="1" comment="apparmor-parser is &lt;2.8.2-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517326" version="1" comment="apparmor-profiles is &lt;2.8.2-54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517327" version="1" comment="apparmor-utils is &lt;2.8.2-54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517328" version="1" comment="libapparmor1 is &lt;2.8.2-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517329" version="1" comment="libapparmor1-32bit is &lt;2.8.2-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517330" version="1" comment="pam_apparmor is &lt;2.8.2-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517331" version="1" comment="pam_apparmor-32bit is &lt;2.8.2-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517332" version="1" comment="perl-apparmor is &lt;2.8.2-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517333" version="1" comment="libfbembed2_5 is &lt;2.5.2.26539-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517334" version="1" comment="libosip2 is &lt;3.5.0-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517335" version="1" comment="flash-player is &lt;25.0.0.171-168.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517336" version="1" comment="flash-player-gnome is &lt;25.0.0.171-168.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517337" version="1" comment="qemu is &lt;2.3.1-32.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517338" version="1" comment="qemu-block-curl is &lt;2.3.1-32.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517339" version="1" comment="qemu-ipxe is &lt;1.0.0-32.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517340" version="1" comment="qemu-kvm is &lt;2.3.1-32.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517341" version="1" comment="qemu-seabios is &lt;1.8.1-32.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517342" version="1" comment="qemu-sgabios is &lt;8-32.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517343" version="1" comment="qemu-tools is &lt;2.3.1-32.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517344" version="1" comment="qemu-vgabios is &lt;1.8.1-32.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517345" version="1" comment="qemu-x86 is &lt;2.3.1-32.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517346" version="1" comment="MozillaFirefox is &lt;45.9.0esr-105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517347" version="1" comment="MozillaFirefox-translations is &lt;45.9.0esr-105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517348" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.121-23.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517349" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.121-23.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517350" version="1" comment="libfreebl3 is &lt;3.29.5-57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517351" version="1" comment="libfreebl3-32bit is &lt;3.29.5-57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517352" version="1" comment="libsoftokn3 is &lt;3.29.5-57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517353" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517354" version="1" comment="mozilla-nspr is &lt;4.13.1-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517355" version="1" comment="mozilla-nspr-32bit is &lt;4.13.1-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517356" version="1" comment="mozilla-nss is &lt;3.29.5-57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517357" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517358" version="1" comment="mozilla-nss-certs is &lt;3.29.5-57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517359" version="1" comment="mozilla-nss-certs-32bit is &lt;3.29.5-57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517360" version="1" comment="mozilla-nss-sysinit is &lt;3.29.5-57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517361" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.29.5-57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517362" version="1" comment="mozilla-nss-tools is &lt;3.29.5-57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517363" version="1" comment="libtirpc1 is &lt;0.2.3-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517364" version="1" comment="libtirpc1-32bit is &lt;0.2.3-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517365" version="1" comment="libxslt-tools is &lt;1.1.28-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517366" version="1" comment="libxslt1 is &lt;1.1.28-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517367" version="1" comment="libxslt1-32bit is &lt;1.1.28-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517368" version="1" comment="libmysqlclient18 is &lt;10.0.30-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517369" version="1" comment="libmysqlclient18-32bit is &lt;10.0.30-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517370" version="1" comment="libmysqlclient_r18 is &lt;10.0.30-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517371" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.30-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517372" version="1" comment="mariadb is &lt;10.0.30-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517373" version="1" comment="mariadb-client is &lt;10.0.30-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517374" version="1" comment="mariadb-errormessages is &lt;10.0.30-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517375" version="1" comment="rpcbind is &lt;0.2.1_rc4-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517376" version="1" comment="libkde4 is &lt;4.12.0-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517377" version="1" comment="libkde4-32bit is &lt;4.12.0-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517378" version="1" comment="libkdecore4 is &lt;4.12.0-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517379" version="1" comment="libkdecore4-32bit is &lt;4.12.0-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517380" version="1" comment="libksuseinstall1 is &lt;4.12.0-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517381" version="1" comment="libksuseinstall1-32bit is &lt;4.12.0-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517382" version="1" comment="kernel-default is &lt;3.12.74-60.64.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517383" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517384" version="1" comment="kernel-default-extra is &lt;3.12.74-60.64.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517385" version="1" comment="kernel-devel is &lt;3.12.74-60.64.40.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517386" version="1" comment="kernel-macros is &lt;3.12.74-60.64.40.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517387" version="1" comment="kernel-source is &lt;3.12.74-60.64.40.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517388" version="1" comment="kernel-syms is &lt;3.12.74-60.64.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517389" version="1" comment="kernel-xen is &lt;3.12.74-60.64.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517390" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517391" version="1" comment="libxml2-2 is &lt;2.9.1-26.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517392" version="1" comment="libxml2-2-32bit is &lt;2.9.1-26.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517393" version="1" comment="libxml2-tools is &lt;2.9.1-26.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517394" version="1" comment="python-libxml2 is &lt;2.9.1-26.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517395" version="1" comment="libsndfile1 is &lt;1.0.25-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517396" version="1" comment="libsndfile1-32bit is &lt;1.0.25-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517397" version="1" comment="libplist++1 is &lt;1.8-10.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517398" version="1" comment="libplist1 is &lt;1.8-10.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517399" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517400" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517401" version="1" comment="libdcerpc0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517402" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517403" version="1" comment="libgensec0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517404" version="1" comment="libgensec0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517405" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517406" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517407" version="1" comment="libndr-nbt0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517408" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517409" version="1" comment="libndr-standard0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517410" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517411" version="1" comment="libndr0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517412" version="1" comment="libndr0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517413" version="1" comment="libnetapi0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517414" version="1" comment="libnetapi0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517415" version="1" comment="libregistry0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517416" version="1" comment="libsamba-credentials0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517417" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517418" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517419" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517420" version="1" comment="libsamba-passdb0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517421" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517422" version="1" comment="libsamba-util0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517423" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517424" version="1" comment="libsamdb0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517425" version="1" comment="libsamdb0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517426" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517427" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517428" version="1" comment="libsmbclient0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517429" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517430" version="1" comment="libsmbconf0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517431" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517432" version="1" comment="libsmbldap0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517433" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517434" version="1" comment="libtevent-util0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517435" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517436" version="1" comment="libwbclient0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517437" version="1" comment="libwbclient0-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517438" version="1" comment="samba is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517439" version="1" comment="samba-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517440" version="1" comment="samba-client is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517441" version="1" comment="samba-client-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517442" version="1" comment="samba-doc is &lt;4.2.4-28.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517443" version="1" comment="samba-libs is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517444" version="1" comment="samba-libs-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517445" version="1" comment="samba-winbind is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517446" version="1" comment="samba-winbind-32bit is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517447" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.141-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517448" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.141-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517449" version="1" comment="pam is &lt;1.1.8-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517450" version="1" comment="pam-32bit is &lt;1.1.8-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517451" version="1" comment="pam-doc is &lt;1.1.8-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517452" version="1" comment="ghostscript is &lt;9.15-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517453" version="1" comment="ghostscript-x11 is &lt;9.15-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517454" version="1" comment="libwireshark8 is &lt;2.2.6-44.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517455" version="1" comment="libwiretap6 is &lt;2.2.6-44.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517456" version="1" comment="libwscodecs1 is &lt;2.2.6-44.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517457" version="1" comment="libwsutil7 is &lt;2.2.6-44.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517458" version="1" comment="wireshark is &lt;2.2.6-44.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517459" version="1" comment="wireshark-gtk is &lt;2.2.6-44.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517460" version="1" comment="sudo is &lt;1.8.10p3-2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517461" version="1" comment="gstreamer-plugins-base is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517462" version="1" comment="gstreamer-plugins-base-lang is &lt;1.2.4-2.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517463" version="1" comment="libgstallocators-1_0-0 is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517464" version="1" comment="libgstapp-1_0-0 is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517465" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517466" version="1" comment="libgstaudio-1_0-0 is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517467" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517468" version="1" comment="libgstfft-1_0-0 is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517469" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517470" version="1" comment="libgstpbutils-1_0-0 is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517471" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517472" version="1" comment="libgstriff-1_0-0 is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517473" version="1" comment="libgstrtp-1_0-0 is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517474" version="1" comment="libgstrtsp-1_0-0 is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517475" version="1" comment="libgstsdp-1_0-0 is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517476" version="1" comment="libgsttag-1_0-0 is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517477" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517478" version="1" comment="libgstvideo-1_0-0 is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517479" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517480" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517481" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517482" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517483" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.2.4-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517484" version="1" comment="libX11-6 is &lt;1.6.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517485" version="1" comment="libX11-6-32bit is &lt;1.6.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517486" version="1" comment="libX11-data is &lt;1.6.2-8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517487" version="1" comment="libX11-xcb1 is &lt;1.6.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517488" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517489" version="1" comment="libXfixes3 is &lt;5.0.1-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517490" version="1" comment="libXfixes3-32bit is &lt;5.0.1-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517491" version="1" comment="libXi6 is &lt;1.7.4-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517492" version="1" comment="libXi6-32bit is &lt;1.7.4-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517493" version="1" comment="libXrender1 is &lt;0.9.8-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517494" version="1" comment="libXrender1-32bit is &lt;0.9.8-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517495" version="1" comment="libXtst6 is &lt;1.2.2-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517496" version="1" comment="libXtst6-32bit is &lt;1.2.2-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517497" version="1" comment="libXv1 is &lt;1.0.10-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517498" version="1" comment="libXv1-32bit is &lt;1.0.10-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517499" version="1" comment="libXvMC1 is &lt;1.0.8-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517500" version="1" comment="libpython3_4m1_0 is &lt;3.4.5-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517501" version="1" comment="python3 is &lt;3.4.5-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517502" version="1" comment="python3-base is &lt;3.4.5-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517503" version="1" comment="python3-curses is &lt;3.4.5-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517504" version="1" comment="qemu is &lt;2.6.2-31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517505" version="1" comment="qemu-block-curl is &lt;2.6.2-31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517506" version="1" comment="qemu-ipxe is &lt;1.0.0-31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517507" version="1" comment="qemu-kvm is &lt;2.6.2-31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517508" version="1" comment="qemu-seabios is &lt;1.9.1-31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517509" version="1" comment="qemu-sgabios is &lt;8-31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517510" version="1" comment="qemu-tools is &lt;2.6.2-31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517511" version="1" comment="qemu-vgabios is &lt;1.9.1-31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517512" version="1" comment="qemu-x86 is &lt;2.6.2-31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517513" version="1" comment="sudo is &lt;1.8.10p3-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517514" version="1" comment="libblkid1 is &lt;2.28-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517515" version="1" comment="libblkid1-32bit is &lt;2.28-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517516" version="1" comment="libfdisk1 is &lt;2.28-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517517" version="1" comment="libmount1 is &lt;2.28-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517518" version="1" comment="libmount1-32bit is &lt;2.28-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517519" version="1" comment="libsmartcols1 is &lt;2.28-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517520" version="1" comment="libuuid-devel is &lt;2.28-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517521" version="1" comment="libuuid1 is &lt;2.28-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517522" version="1" comment="libuuid1-32bit is &lt;2.28-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517523" version="1" comment="python-libmount is &lt;2.28-42.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517524" version="1" comment="util-linux is &lt;2.28-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517525" version="1" comment="util-linux-lang is &lt;2.28-42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517526" version="1" comment="util-linux-systemd is &lt;2.28-42.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517527" version="1" comment="uuidd is &lt;2.28-42.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517528" version="1" comment="kernel-default is &lt;4.4.21-84.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517529" version="1" comment="kernel-default-devel is &lt;4.4.21-84.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517530" version="1" comment="kernel-default-extra is &lt;4.4.21-84.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517531" version="1" comment="kernel-devel is &lt;4.4.21-84.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517532" version="1" comment="kernel-macros is &lt;4.4.21-84.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517533" version="1" comment="kernel-source is &lt;4.4.21-84.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517534" version="1" comment="kernel-syms is &lt;4.4.21-84.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517535" version="1" comment="xen is &lt;4.7.1_02-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517536" version="1" comment="xen-libs is &lt;4.7.1_02-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517537" version="1" comment="xen-libs-32bit is &lt;4.7.1_02-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517538" version="1" comment="kernel-default is &lt;4.4.21-90.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517539" version="1" comment="kernel-default-devel is &lt;4.4.21-90.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517540" version="1" comment="kernel-default-extra is &lt;4.4.21-90.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517541" version="1" comment="kernel-devel is &lt;4.4.21-90.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517542" version="1" comment="kernel-macros is &lt;4.4.21-90.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517543" version="1" comment="kernel-source is &lt;4.4.21-90.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517544" version="1" comment="kernel-syms is &lt;4.4.21-90.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517545" version="1" comment="xen is &lt;4.7.1_04-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517546" version="1" comment="xen-libs is &lt;4.7.1_04-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517547" version="1" comment="xen-libs-32bit is &lt;4.7.1_04-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517548" version="1" comment="libopenjp2-7 is &lt;2.1.0-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517549" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517550" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517551" version="1" comment="libdcerpc0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517552" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517553" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517554" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517555" version="1" comment="libndr-nbt0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517556" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517557" version="1" comment="libndr-standard0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517558" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517559" version="1" comment="libndr0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517560" version="1" comment="libndr0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517561" version="1" comment="libnetapi0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517562" version="1" comment="libnetapi0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517563" version="1" comment="libsamba-credentials0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517564" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517565" version="1" comment="libsamba-errors0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517566" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517567" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517568" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517569" version="1" comment="libsamba-passdb0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517570" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517571" version="1" comment="libsamba-util0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517572" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517573" version="1" comment="libsamdb0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517574" version="1" comment="libsamdb0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517575" version="1" comment="libsmbclient0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517576" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517577" version="1" comment="libsmbconf0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517578" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517579" version="1" comment="libsmbldap0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517580" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517581" version="1" comment="libtevent-util0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517582" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517583" version="1" comment="libwbclient0 is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517584" version="1" comment="libwbclient0-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517585" version="1" comment="samba is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517586" version="1" comment="samba-client is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517587" version="1" comment="samba-client-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517588" version="1" comment="samba-doc is &lt;4.4.2-31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517589" version="1" comment="samba-libs is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517590" version="1" comment="samba-libs-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517591" version="1" comment="samba-winbind is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517592" version="1" comment="samba-winbind-32bit is &lt;4.4.2-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517593" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517594" version="1" comment="gstreamer-plugins-bad is &lt;1.8.3-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517595" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.8.3-14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517596" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.8.3-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517597" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.8.3-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517598" version="1" comment="libgstbadbase-1_0-0 is &lt;1.8.3-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517599" version="1" comment="libgstbadvideo-1_0-0 is &lt;1.8.3-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517600" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.8.3-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517601" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.8.3-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517602" version="1" comment="libgstgl-1_0-0 is &lt;1.8.3-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517603" version="1" comment="libgstmpegts-1_0-0 is &lt;1.8.3-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517604" version="1" comment="libgstphotography-1_0-0 is &lt;1.8.3-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517605" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.8.3-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517606" version="1" comment="gstreamer-plugins-good is &lt;1.8.3-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517607" version="1" comment="gstreamer-plugins-good-lang is &lt;1.8.3-9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517608" version="1" comment="sudo is &lt;1.8.10p3-10.10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517609" version="1" comment="openvpn is &lt;2.3.8-16.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517610" version="1" comment="gstreamer-plugins-base is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517611" version="1" comment="gstreamer-plugins-base-lang is &lt;1.8.3-9.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517612" version="1" comment="libgstallocators-1_0-0 is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517613" version="1" comment="libgstapp-1_0-0 is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517614" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517615" version="1" comment="libgstaudio-1_0-0 is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517616" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517617" version="1" comment="libgstfft-1_0-0 is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517618" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517619" version="1" comment="libgstpbutils-1_0-0 is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517620" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517621" version="1" comment="libgstriff-1_0-0 is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517622" version="1" comment="libgstrtp-1_0-0 is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517623" version="1" comment="libgstrtsp-1_0-0 is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517624" version="1" comment="libgstsdp-1_0-0 is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517625" version="1" comment="libgsttag-1_0-0 is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517626" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517627" version="1" comment="libgstvideo-1_0-0 is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517628" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517629" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517630" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517631" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517632" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.8.3-9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517633" version="1" comment="libwireshark8 is &lt;2.2.7-47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517634" version="1" comment="libwiretap6 is &lt;2.2.7-47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517635" version="1" comment="libwscodecs1 is &lt;2.2.7-47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517636" version="1" comment="libwsutil7 is &lt;2.2.7-47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517637" version="1" comment="wireshark is &lt;2.2.7-47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517638" version="1" comment="wireshark-gtk is &lt;2.2.7-47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517639" version="1" comment="libcairo-gobject2 is &lt;1.15.2-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517640" version="1" comment="libcairo-gobject2-32bit is &lt;1.15.2-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517641" version="1" comment="libcairo-script-interpreter2 is &lt;1.15.2-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517642" version="1" comment="libcairo2 is &lt;1.15.2-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517643" version="1" comment="libcairo2-32bit is &lt;1.15.2-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517644" version="1" comment="MozillaFirefox is &lt;52.2.0esr-108.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517645" version="1" comment="MozillaFirefox-branding-SLE is &lt;52-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517646" version="1" comment="MozillaFirefox-translations is &lt;52.2.0esr-108.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517647" version="1" comment="libxml2-2 is &lt;2.9.4-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517648" version="1" comment="libxml2-2-32bit is &lt;2.9.4-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517649" version="1" comment="libxml2-tools is &lt;2.9.4-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517650" version="1" comment="python-libxml2 is &lt;2.9.4-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517651" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517652" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517653" version="1" comment="libpoppler44 is &lt;0.24.4-14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517654" version="1" comment="postgresql94 is &lt;9.4.12-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517655" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.31-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517656" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.31-16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517657" version="1" comment="kernel-default is &lt;4.4.59-92.24.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517658" version="1" comment="kernel-default-devel is &lt;4.4.59-92.24.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517659" version="1" comment="kernel-default-extra is &lt;4.4.59-92.24.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517660" version="1" comment="kernel-devel is &lt;4.4.59-92.24.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517661" version="1" comment="kernel-macros is &lt;4.4.59-92.24.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517662" version="1" comment="kernel-source is &lt;4.4.59-92.24.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517663" version="1" comment="kernel-syms is &lt;4.4.59-92.24.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517664" version="1" comment="gvim is &lt;7.4.326-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517665" version="1" comment="vim is &lt;7.4.326-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517666" version="1" comment="vim-data is &lt;7.4.326-16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517667" version="1" comment="clamav is &lt;0.99.2-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517668" version="1" comment="bind-libs is &lt;9.9.9P1-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517669" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517670" version="1" comment="bind-utils is &lt;9.9.9P1-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517671" version="1" comment="unrar is &lt;5.0.14-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517672" version="1" comment="libxml2-2 is &lt;2.9.4-45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517673" version="1" comment="libxml2-2-32bit is &lt;2.9.4-45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517674" version="1" comment="libxml2-tools is &lt;2.9.4-45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517675" version="1" comment="python-libxml2 is &lt;2.9.4-45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517676" version="1" comment="xen is &lt;4.7.2_06-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517677" version="1" comment="xen-libs is &lt;4.7.2_06-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517678" version="1" comment="xen-libs-32bit is &lt;4.7.2_06-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517679" version="1" comment="qemu is &lt;2.6.2-41.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517680" version="1" comment="qemu-block-curl is &lt;2.6.2-41.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517681" version="1" comment="qemu-ipxe is &lt;1.0.0-41.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517682" version="1" comment="qemu-kvm is &lt;2.6.2-41.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517683" version="1" comment="qemu-seabios is &lt;1.9.1-41.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517684" version="1" comment="qemu-sgabios is &lt;8-41.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517685" version="1" comment="qemu-tools is &lt;2.6.2-41.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517686" version="1" comment="qemu-vgabios is &lt;1.9.1-41.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517687" version="1" comment="qemu-x86 is &lt;2.6.2-41.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517688" version="1" comment="libsystemd0 is &lt;228-149.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517689" version="1" comment="libsystemd0-32bit is &lt;228-149.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517690" version="1" comment="libudev1 is &lt;228-149.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517691" version="1" comment="libudev1-32bit is &lt;228-149.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517692" version="1" comment="systemd is &lt;228-149.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517693" version="1" comment="systemd-32bit is &lt;228-149.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517694" version="1" comment="systemd-bash-completion is &lt;228-149.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517695" version="1" comment="systemd-sysvinit is &lt;228-149.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517696" version="1" comment="udev is &lt;228-149.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517697" version="1" comment="sudo is &lt;1.8.10p3-10.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517698" version="1" comment="libquicktime0 is &lt;1.2.4-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517699" version="1" comment="libgcrypt20 is &lt;1.6.1-16.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517700" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517701" version="1" comment="libcares2 is &lt;1.9.1-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517702" version="1" comment="libcares2-32bit is &lt;1.9.1-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517703" version="1" comment="libncurses5 is &lt;5.9-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517704" version="1" comment="libncurses5-32bit is &lt;5.9-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517705" version="1" comment="libncurses6 is &lt;5.9-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517706" version="1" comment="libncurses6-32bit is &lt;5.9-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517707" version="1" comment="ncurses-devel is &lt;5.9-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517708" version="1" comment="ncurses-utils is &lt;5.9-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517709" version="1" comment="tack is &lt;5.9-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517710" version="1" comment="terminfo is &lt;5.9-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517711" version="1" comment="terminfo-base is &lt;5.9-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517712" version="1" comment="libixion-0_12-0 is &lt;0.12.1-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517713" version="1" comment="libmwaw-0_3-3 is &lt;0.3.11-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517714" version="1" comment="liborcus-0_12-0 is &lt;0.12.1-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517715" version="1" comment="libreoffice is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517716" version="1" comment="libreoffice-base is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517717" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517718" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517719" version="1" comment="libreoffice-calc is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517720" version="1" comment="libreoffice-calc-extensions is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517721" version="1" comment="libreoffice-draw is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517722" version="1" comment="libreoffice-filters-optional is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517723" version="1" comment="libreoffice-gnome is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517724" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517725" version="1" comment="libreoffice-icon-theme-tango is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517726" version="1" comment="libreoffice-impress is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517727" version="1" comment="libreoffice-l10n-af is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517728" version="1" comment="libreoffice-l10n-ar is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517729" version="1" comment="libreoffice-l10n-ca is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517730" version="1" comment="libreoffice-l10n-cs is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517731" version="1" comment="libreoffice-l10n-da is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517732" version="1" comment="libreoffice-l10n-de is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517733" version="1" comment="libreoffice-l10n-en is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517734" version="1" comment="libreoffice-l10n-es is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517735" version="1" comment="libreoffice-l10n-fi is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517736" version="1" comment="libreoffice-l10n-fr is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517737" version="1" comment="libreoffice-l10n-gu is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517738" version="1" comment="libreoffice-l10n-hi is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517739" version="1" comment="libreoffice-l10n-hu is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517740" version="1" comment="libreoffice-l10n-it is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517741" version="1" comment="libreoffice-l10n-ja is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517742" version="1" comment="libreoffice-l10n-ko is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517743" version="1" comment="libreoffice-l10n-nb is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517744" version="1" comment="libreoffice-l10n-nl is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517745" version="1" comment="libreoffice-l10n-nn is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517746" version="1" comment="libreoffice-l10n-pl is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517747" version="1" comment="libreoffice-l10n-pt_BR is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517748" version="1" comment="libreoffice-l10n-pt_PT is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517749" version="1" comment="libreoffice-l10n-ro is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517750" version="1" comment="libreoffice-l10n-ru is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517751" version="1" comment="libreoffice-l10n-sk is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517752" version="1" comment="libreoffice-l10n-sv is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517753" version="1" comment="libreoffice-l10n-xh is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517754" version="1" comment="libreoffice-l10n-zh_CN is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517755" version="1" comment="libreoffice-l10n-zh_TW is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517756" version="1" comment="libreoffice-l10n-zu is &lt;5.3.3.2-40.5.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517757" version="1" comment="libreoffice-mailmerge is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517758" version="1" comment="libreoffice-math is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517759" version="1" comment="libreoffice-officebean is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517760" version="1" comment="libreoffice-pyuno is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517761" version="1" comment="libreoffice-writer is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517762" version="1" comment="libreoffice-writer-extensions is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517763" version="1" comment="libreofficekit is &lt;5.3.3.2-40.5.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517764" version="1" comment="libstaroffice-0_0-0 is &lt;0.0.3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517765" version="1" comment="libzmf-0_0-0 is &lt;0.0.1-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517766" version="1" comment="myspell-af_NA is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517767" version="1" comment="myspell-af_ZA is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517768" version="1" comment="myspell-ar is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517769" version="1" comment="myspell-ar_AE is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517770" version="1" comment="myspell-ar_BH is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517771" version="1" comment="myspell-ar_DZ is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517772" version="1" comment="myspell-ar_EG is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517773" version="1" comment="myspell-ar_IQ is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517774" version="1" comment="myspell-ar_JO is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517775" version="1" comment="myspell-ar_KW is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517776" version="1" comment="myspell-ar_LB is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517777" version="1" comment="myspell-ar_LY is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517778" version="1" comment="myspell-ar_MA is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517779" version="1" comment="myspell-ar_OM is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517780" version="1" comment="myspell-ar_QA is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517781" version="1" comment="myspell-ar_SA is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517782" version="1" comment="myspell-ar_SD is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517783" version="1" comment="myspell-ar_SY is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517784" version="1" comment="myspell-ar_TN is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517785" version="1" comment="myspell-ar_YE is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517786" version="1" comment="myspell-be_BY is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517787" version="1" comment="myspell-bg_BG is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517788" version="1" comment="myspell-bn_BD is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517789" version="1" comment="myspell-bn_IN is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517790" version="1" comment="myspell-bs is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517791" version="1" comment="myspell-bs_BA is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517792" version="1" comment="myspell-ca is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517793" version="1" comment="myspell-ca_AD is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517794" version="1" comment="myspell-ca_ES is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517795" version="1" comment="myspell-ca_ES_valencia is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517796" version="1" comment="myspell-ca_FR is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517797" version="1" comment="myspell-ca_IT is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517798" version="1" comment="myspell-cs_CZ is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517799" version="1" comment="myspell-da_DK is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517800" version="1" comment="myspell-de is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517801" version="1" comment="myspell-de_AT is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517802" version="1" comment="myspell-de_CH is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517803" version="1" comment="myspell-de_DE is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517804" version="1" comment="myspell-dictionaries is &lt;20170511-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517805" version="1" comment="myspell-el_GR is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517806" version="1" comment="myspell-en is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517807" version="1" comment="myspell-en_AU is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517808" version="1" comment="myspell-en_BS is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517809" version="1" comment="myspell-en_BZ is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517810" version="1" comment="myspell-en_CA is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517811" version="1" comment="myspell-en_GB is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517812" version="1" comment="myspell-en_GH is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517813" version="1" comment="myspell-en_IE is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517814" version="1" comment="myspell-en_IN is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517815" version="1" comment="myspell-en_JM is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517816" version="1" comment="myspell-en_MW is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517817" version="1" comment="myspell-en_NA is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517818" version="1" comment="myspell-en_NZ is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517819" version="1" comment="myspell-en_PH is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517820" version="1" comment="myspell-en_TT is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517821" version="1" comment="myspell-en_US is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517822" version="1" comment="myspell-en_ZA is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517823" version="1" comment="myspell-en_ZW is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517824" version="1" comment="myspell-es is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517825" version="1" comment="myspell-es_AR is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517826" version="1" comment="myspell-es_BO is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517827" version="1" comment="myspell-es_CL is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517828" version="1" comment="myspell-es_CO is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517829" version="1" comment="myspell-es_CR is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517830" version="1" comment="myspell-es_CU is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517831" version="1" comment="myspell-es_DO is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517832" version="1" comment="myspell-es_EC is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517833" version="1" comment="myspell-es_ES is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517834" version="1" comment="myspell-es_GT is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517835" version="1" comment="myspell-es_HN is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517836" version="1" comment="myspell-es_MX is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517837" version="1" comment="myspell-es_NI is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517838" version="1" comment="myspell-es_PA is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517839" version="1" comment="myspell-es_PE is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517840" version="1" comment="myspell-es_PR is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517841" version="1" comment="myspell-es_PY is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517842" version="1" comment="myspell-es_SV is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517843" version="1" comment="myspell-es_UY is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517844" version="1" comment="myspell-es_VE is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517845" version="1" comment="myspell-et_EE is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517846" version="1" comment="myspell-fr_BE is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517847" version="1" comment="myspell-fr_CA is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517848" version="1" comment="myspell-fr_CH is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517849" version="1" comment="myspell-fr_FR is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517850" version="1" comment="myspell-fr_LU is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517851" version="1" comment="myspell-fr_MC is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517852" version="1" comment="myspell-gu_IN is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517853" version="1" comment="myspell-he_IL is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517854" version="1" comment="myspell-hi_IN is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517855" version="1" comment="myspell-hr_HR is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517856" version="1" comment="myspell-hu_HU is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517857" version="1" comment="myspell-it_IT is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517858" version="1" comment="myspell-lightproof-en is &lt;20170511-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517859" version="1" comment="myspell-lightproof-hu_HU is &lt;20170511-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517860" version="1" comment="myspell-lightproof-pt_BR is &lt;20170511-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517861" version="1" comment="myspell-lightproof-ru_RU is &lt;20170511-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517862" version="1" comment="myspell-lo_LA is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517863" version="1" comment="myspell-lt_LT is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517864" version="1" comment="myspell-lv_LV is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517865" version="1" comment="myspell-nb_NO is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517866" version="1" comment="myspell-nl_BE is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517867" version="1" comment="myspell-nl_NL is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517868" version="1" comment="myspell-nn_NO is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517869" version="1" comment="myspell-no is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517870" version="1" comment="myspell-pl_PL is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517871" version="1" comment="myspell-pt_AO is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517872" version="1" comment="myspell-pt_BR is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517873" version="1" comment="myspell-pt_PT is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517874" version="1" comment="myspell-ro is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517875" version="1" comment="myspell-ro_RO is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517876" version="1" comment="myspell-ru_RU is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517877" version="1" comment="myspell-sk_SK is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517878" version="1" comment="myspell-sl_SI is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517879" version="1" comment="myspell-sr is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517880" version="1" comment="myspell-sr_CS is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517881" version="1" comment="myspell-sr_Latn_CS is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517882" version="1" comment="myspell-sr_Latn_RS is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517883" version="1" comment="myspell-sr_RS is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517884" version="1" comment="myspell-sv_FI is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517885" version="1" comment="myspell-sv_SE is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517886" version="1" comment="myspell-te is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517887" version="1" comment="myspell-te_IN is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517888" version="1" comment="myspell-th_TH is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517889" version="1" comment="myspell-uk_UA is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517890" version="1" comment="myspell-vi is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517891" version="1" comment="myspell-vi_VN is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517892" version="1" comment="myspell-zu_ZA is &lt;20170511-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517893" version="1" comment="gnutls is &lt;3.2.15-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517894" version="1" comment="libgnutls28 is &lt;3.2.15-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517895" version="1" comment="libgnutls28-32bit is &lt;3.2.15-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517896" version="1" comment="libICE6 is &lt;1.0.8-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517897" version="1" comment="libICE6-32bit is &lt;1.0.8-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517898" version="1" comment="libspice-server1 is &lt;0.12.7-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517899" version="1" comment="kernel-default is &lt;4.4.74-92.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517900" version="1" comment="kernel-default-devel is &lt;4.4.74-92.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517901" version="1" comment="kernel-default-extra is &lt;4.4.74-92.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517902" version="1" comment="kernel-devel is &lt;4.4.74-92.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517903" version="1" comment="kernel-macros is &lt;4.4.74-92.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517904" version="1" comment="kernel-source is &lt;4.4.74-92.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517905" version="1" comment="kernel-syms is &lt;4.4.74-92.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517906" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-74.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517907" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-74.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517908" version="1" comment="libXdmcp6 is &lt;1.1.1-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517909" version="1" comment="libXdmcp6-32bit is &lt;1.1.1-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517910" version="1" comment="evince is &lt;3.20.1-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517911" version="1" comment="evince-browser-plugin is &lt;3.20.1-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517912" version="1" comment="evince-lang is &lt;3.20.1-6.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517913" version="1" comment="evince-plugin-djvudocument is &lt;3.20.1-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517914" version="1" comment="evince-plugin-dvidocument is &lt;3.20.1-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517915" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.1-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517916" version="1" comment="evince-plugin-psdocument is &lt;3.20.1-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517917" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.1-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517918" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.1-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517919" version="1" comment="libevdocument3-4 is &lt;3.20.1-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517920" version="1" comment="libevview3-3 is &lt;3.20.1-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517921" version="1" comment="nautilus-evince is &lt;3.20.1-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517922" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.20.1-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517923" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.20.1-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517924" version="1" comment="dracut is &lt;044.1-109.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517925" version="1" comment="libsystemd0 is &lt;228-150.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517926" version="1" comment="libsystemd0-32bit is &lt;228-150.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517927" version="1" comment="libudev1 is &lt;228-150.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517928" version="1" comment="libudev1-32bit is &lt;228-150.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517929" version="1" comment="systemd is &lt;228-150.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517930" version="1" comment="systemd-32bit is &lt;228-150.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517931" version="1" comment="systemd-bash-completion is &lt;228-150.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517932" version="1" comment="systemd-sysvinit is &lt;228-150.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517933" version="1" comment="udev is &lt;228-150.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517934" version="1" comment="libjasper1 is &lt;1.900.14-195.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517935" version="1" comment="libjasper1-32bit is &lt;1.900.14-195.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517936" version="1" comment="libquicktime0 is &lt;1.2.4-14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517937" version="1" comment="libical1 is &lt;1.0.1-16.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517938" version="1" comment="libical1-32bit is &lt;1.0.1-16.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517939" version="1" comment="libpoppler44 is &lt;0.24.4-14.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517940" version="1" comment="libpoppler-glib8 is &lt;0.43.0-16.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517941" version="1" comment="libpoppler-qt4-4 is &lt;0.43.0-16.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517942" version="1" comment="libpoppler60 is &lt;0.43.0-16.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517943" version="1" comment="poppler-tools is &lt;0.43.0-16.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517944" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.36-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517945" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517946" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.36-14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517947" version="1" comment="libgstapp-0_10-0 is &lt;0.10.36-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517948" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517949" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.36-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517950" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517951" version="1" comment="libmysqlclient18 is &lt;10.0.31-29.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517952" version="1" comment="libmysqlclient18-32bit is &lt;10.0.31-29.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517953" version="1" comment="libmysqlclient_r18 is &lt;10.0.31-29.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517954" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.31-29.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517955" version="1" comment="mariadb is &lt;10.0.31-29.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517956" version="1" comment="mariadb-client is &lt;10.0.31-29.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517957" version="1" comment="mariadb-errormessages is &lt;10.0.31-29.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517958" version="1" comment="libwireshark8 is &lt;2.2.8-48.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517959" version="1" comment="libwiretap6 is &lt;2.2.8-48.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517960" version="1" comment="libwscodecs1 is &lt;2.2.8-48.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517961" version="1" comment="libwsutil7 is &lt;2.2.8-48.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517962" version="1" comment="wireshark is &lt;2.2.8-48.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517963" version="1" comment="wireshark-gtk is &lt;2.2.8-48.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517964" version="1" comment="kernel-default is &lt;4.4.74-92.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517965" version="1" comment="kernel-default-devel is &lt;4.4.74-92.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517966" version="1" comment="kernel-default-extra is &lt;4.4.74-92.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517967" version="1" comment="kernel-devel is &lt;4.4.74-92.32.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517968" version="1" comment="kernel-macros is &lt;4.4.74-92.32.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517969" version="1" comment="kernel-source is &lt;4.4.74-92.32.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517970" version="1" comment="kernel-syms is &lt;4.4.74-92.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517971" version="1" comment="libzypp is &lt;16.15.2-27.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517972" version="1" comment="zypper is &lt;1.13.30-18.13.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517973" version="1" comment="zypper-log is &lt;1.13.30-18.13.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517974" version="1" comment="libncurses5 is &lt;5.9-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517975" version="1" comment="libncurses5-32bit is &lt;5.9-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517976" version="1" comment="libncurses6 is &lt;5.9-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517977" version="1" comment="libncurses6-32bit is &lt;5.9-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517978" version="1" comment="ncurses-devel is &lt;5.9-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517979" version="1" comment="ncurses-utils is &lt;5.9-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517980" version="1" comment="tack is &lt;5.9-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517981" version="1" comment="terminfo is &lt;5.9-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517982" version="1" comment="terminfo-base is &lt;5.9-50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517983" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517984" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-22.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517985" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517986" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517987" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517988" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517989" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517990" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517991" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517992" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517993" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517994" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517995" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517996" version="1" comment="puppet is &lt;3.8.5-15.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517997" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.18-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517998" version="1" comment="librsvg-2-2 is &lt;2.40.18-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517999" version="1" comment="librsvg-2-2-32bit is &lt;2.40.18-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518000" version="1" comment="rsvg-view is &lt;2.40.18-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518001" version="1" comment="libsoup-2_4-1 is &lt;2.54.1-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518002" version="1" comment="libsoup-2_4-1-32bit is &lt;2.54.1-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518003" version="1" comment="libsoup-lang is &lt;2.54.1-5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518004" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.54.1-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518005" version="1" comment="kernel-default is &lt;4.4.74-92.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518006" version="1" comment="kernel-default-devel is &lt;4.4.74-92.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518007" version="1" comment="kernel-default-extra is &lt;4.4.74-92.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518008" version="1" comment="kernel-devel is &lt;4.4.74-92.35.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518009" version="1" comment="kernel-macros is &lt;4.4.74-92.35.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518010" version="1" comment="kernel-source is &lt;4.4.74-92.35.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518011" version="1" comment="kernel-syms is &lt;4.4.74-92.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518012" version="1" comment="strongswan is &lt;5.1.3-26.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518013" version="1" comment="strongswan-doc is &lt;5.1.3-26.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518014" version="1" comment="strongswan-ipsec is &lt;5.1.3-26.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518015" version="1" comment="strongswan-libs0 is &lt;5.1.3-26.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518016" version="1" comment="libopenjp2-7 is &lt;2.1.0-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518017" version="1" comment="libxml2-2 is &lt;2.9.4-46.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518018" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518019" version="1" comment="libxml2-tools is &lt;2.9.4-46.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518020" version="1" comment="python-libxml2 is &lt;2.9.4-46.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518021" version="1" comment="curl is &lt;7.37.0-37.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518022" version="1" comment="libcurl4 is &lt;7.37.0-37.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518023" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518024" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.144-27.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518025" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.144-27.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518026" version="1" comment="libplist++3 is &lt;1.12-20.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518027" version="1" comment="libplist3 is &lt;1.12-20.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518028" version="1" comment="ImageMagick is &lt;6.8.8.1-71.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518029" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518030" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518031" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518032" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518033" version="1" comment="gnome-shell is &lt;3.20.4-77.7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518034" version="1" comment="gnome-shell-browser-plugin is &lt;3.20.4-77.7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518035" version="1" comment="gnome-shell-calendar is &lt;3.20.4-77.7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518036" version="1" comment="gnome-shell-lang is &lt;3.20.4-77.7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518037" version="1" comment="freerdp is &lt;2.0.0~git.1463131968.4e66df7-12.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518038" version="1" comment="libfreerdp2 is &lt;2.0.0~git.1463131968.4e66df7-12.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518039" version="1" comment="openssh is &lt;7.2p2-66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518040" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-66.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518041" version="1" comment="openssh-helpers is &lt;7.2p2-66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518042" version="1" comment="libraw9 is &lt;0.15.4-9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518043" version="1" comment="expat is &lt;2.1.0-21.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518044" version="1" comment="libexpat1 is &lt;2.1.0-21.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518045" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518046" version="1" comment="icu is &lt;52.1-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518047" version="1" comment="libicu52_1 is &lt;52.1-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518048" version="1" comment="libicu52_1-32bit is &lt;52.1-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518049" version="1" comment="libicu52_1-data is &lt;52.1-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518050" version="1" comment="xen is &lt;4.7.3_03-43.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518051" version="1" comment="xen-libs is &lt;4.7.3_03-43.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518052" version="1" comment="xen-libs-32bit is &lt;4.7.3_03-43.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518053" version="1" comment="postgresql94 is &lt;9.4.13-21.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518054" version="1" comment="libecpg6 is &lt;9.6.4-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518055" version="1" comment="libpq5 is &lt;9.6.4-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518056" version="1" comment="libpq5-32bit is &lt;9.6.4-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518057" version="1" comment="postgresql96 is &lt;9.6.4-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518058" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-19.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518059" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-19.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518060" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-19.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518061" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-19.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518062" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-19.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518063" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-19.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518064" version="1" comment="evince is &lt;3.20.1-6.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518065" version="1" comment="evince-browser-plugin is &lt;3.20.1-6.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518066" version="1" comment="evince-lang is &lt;3.20.1-6.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518067" version="1" comment="evince-plugin-djvudocument is &lt;3.20.1-6.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518068" version="1" comment="evince-plugin-dvidocument is &lt;3.20.1-6.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518069" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.1-6.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518070" version="1" comment="evince-plugin-psdocument is &lt;3.20.1-6.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518071" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.1-6.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518072" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.1-6.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518073" version="1" comment="libevdocument3-4 is &lt;3.20.1-6.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518074" version="1" comment="libevview3-3 is &lt;3.20.1-6.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518075" version="1" comment="nautilus-evince is &lt;3.20.1-6.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518076" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.20.1-6.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518077" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.20.1-6.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518078" version="1" comment="libsystemd0 is &lt;228-132.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518079" version="1" comment="libsystemd0-32bit is &lt;228-132.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518080" version="1" comment="libudev1 is &lt;228-132.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518081" version="1" comment="libudev1-32bit is &lt;228-132.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518082" version="1" comment="systemd is &lt;228-132.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518083" version="1" comment="systemd-32bit is &lt;228-132.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518084" version="1" comment="systemd-bash-completion is &lt;228-132.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518085" version="1" comment="systemd-sysvinit is &lt;228-132.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518086" version="1" comment="udev is &lt;228-132.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518087" version="1" comment="cvs is &lt;1.12.12-182.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518088" version="1" comment="libpcsclite1 is &lt;1.8.10-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518089" version="1" comment="libpcsclite1-32bit is &lt;1.8.10-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518090" version="1" comment="pcsc-lite is &lt;1.8.10-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518091" version="1" comment="dbus-1 is &lt;1.8.22-24.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518092" version="1" comment="dbus-1-x11 is &lt;1.8.22-24.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518093" version="1" comment="libdbus-1-3 is &lt;1.8.22-24.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518094" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-24.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518095" version="1" comment="xen is &lt;4.7.3_04-43.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518096" version="1" comment="xen-libs is &lt;4.7.3_04-43.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518097" version="1" comment="xen-libs-32bit is &lt;4.7.3_04-43.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518098" version="1" comment="kernel-default is &lt;4.4.74-92.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518099" version="1" comment="kernel-default-devel is &lt;4.4.74-92.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518100" version="1" comment="kernel-default-extra is &lt;4.4.74-92.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518101" version="1" comment="kernel-devel is &lt;4.4.74-92.38.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518102" version="1" comment="kernel-macros is &lt;4.4.74-92.38.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518103" version="1" comment="kernel-source is &lt;4.4.74-92.38.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518104" version="1" comment="kernel-syms is &lt;4.4.74-92.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518105" version="1" comment="cpp48 is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518106" version="1" comment="gcc48 is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518107" version="1" comment="gcc48-32bit is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518108" version="1" comment="gcc48-c++ is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518109" version="1" comment="gcc48-gij is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518110" version="1" comment="gcc48-gij-32bit is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518111" version="1" comment="gcc48-info is &lt;4.8.5-31.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518112" version="1" comment="libasan0 is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518113" version="1" comment="libasan0-32bit is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518114" version="1" comment="libgcj48 is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518115" version="1" comment="libgcj48-32bit is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518116" version="1" comment="libgcj48-jar is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518117" version="1" comment="libgcj_bc1 is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518118" version="1" comment="libstdc++48-devel is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518119" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518120" version="1" comment="emacs is &lt;24.3-25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518121" version="1" comment="emacs-info is &lt;24.3-25.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518122" version="1" comment="emacs-x11 is &lt;24.3-25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518123" version="1" comment="etags is &lt;24.3-25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518124" version="1" comment="libzip2 is &lt;0.11.1-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518125" version="1" comment="libwireshark8 is &lt;2.2.9-48.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518126" version="1" comment="libwiretap6 is &lt;2.2.9-48.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518127" version="1" comment="libwscodecs1 is &lt;2.2.9-48.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518128" version="1" comment="libwsutil7 is &lt;2.2.9-48.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518129" version="1" comment="wireshark is &lt;2.2.9-48.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518130" version="1" comment="wireshark-gtk is &lt;2.2.9-48.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518131" version="1" comment="libtiff5 is &lt;4.0.8-44.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518132" version="1" comment="libtiff5-32bit is &lt;4.0.8-44.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518133" version="1" comment="liblouis-data is &lt;2.6.4-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518134" version="1" comment="liblouis9 is &lt;2.6.4-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518135" version="1" comment="python3-louis is &lt;2.6.4-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518136" version="1" comment="MozillaFirefox is &lt;52.3.0esr-109.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518137" version="1" comment="MozillaFirefox-translations is &lt;52.3.0esr-109.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518138" version="1" comment="dnsmasq is &lt;2.78-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518139" version="1" comment="libopenjp2-7 is &lt;2.1.0-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518140" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518141" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518142" version="1" comment="libdcerpc0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518143" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518144" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518145" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518146" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518147" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518148" version="1" comment="libndr-standard0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518149" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518150" version="1" comment="libndr0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518151" version="1" comment="libndr0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518152" version="1" comment="libnetapi0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518153" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518154" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518155" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518156" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518157" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518158" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518159" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518160" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518161" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518162" version="1" comment="libsamba-util0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518163" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518164" version="1" comment="libsamdb0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518165" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518166" version="1" comment="libsmbclient0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518167" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518168" version="1" comment="libsmbconf0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518169" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518170" version="1" comment="libsmbldap0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518171" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518172" version="1" comment="libtevent-util0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518173" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518174" version="1" comment="libwbclient0 is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518175" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518176" version="1" comment="samba is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518177" version="1" comment="samba-client is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518178" version="1" comment="samba-client-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518179" version="1" comment="samba-doc is &lt;4.4.2-38.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518180" version="1" comment="samba-libs is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518181" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518182" version="1" comment="samba-winbind is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518183" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518184" version="1" comment="krb5 is &lt;1.12.5-40.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518185" version="1" comment="krb5-32bit is &lt;1.12.5-40.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518186" version="1" comment="krb5-client is &lt;1.12.5-40.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518187" version="1" comment="MozillaFirefox is &lt;52.4.0esr-109.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518188" version="1" comment="MozillaFirefox-translations is &lt;52.4.0esr-109.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518189" version="1" comment="libfreebl3 is &lt;3.29.5-58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518190" version="1" comment="libfreebl3-32bit is &lt;3.29.5-58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518191" version="1" comment="libsoftokn3 is &lt;3.29.5-58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518192" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518193" version="1" comment="mozilla-nss is &lt;3.29.5-58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518194" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518195" version="1" comment="mozilla-nss-certs is &lt;3.29.5-58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518196" version="1" comment="mozilla-nss-certs-32bit is &lt;3.29.5-58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518197" version="1" comment="mozilla-nss-sysinit is &lt;3.29.5-58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518198" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.29.5-58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518199" version="1" comment="mozilla-nss-tools is &lt;3.29.5-58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518200" version="1" comment="libvirt is &lt;2.0.0-27.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518201" version="1" comment="libvirt-client is &lt;2.0.0-27.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518202" version="1" comment="libvirt-client-32bit is &lt;2.0.0-27.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518203" version="1" comment="libvirt-daemon is &lt;2.0.0-27.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518204" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518205" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518206" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518207" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518208" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518209" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518210" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518211" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518212" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518213" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518214" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518215" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518216" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518217" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518218" version="1" comment="libvirt-doc is &lt;2.0.0-27.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518219" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518220" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518221" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518222" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518223" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518224" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518225" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518226" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518227" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518228" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518229" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518230" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518231" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518232" version="1" comment="xerces-j2 is &lt;2.8.1-268.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518233" version="1" comment="wpa_supplicant is &lt;2.2-15.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518234" version="1" comment="curl is &lt;7.37.0-37.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518235" version="1" comment="libcurl4 is &lt;7.37.0-37.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518236" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518237" version="1" comment="openvpn is &lt;2.3.8-16.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518238" version="1" comment="tcpdump is &lt;4.9.2-14.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518239" version="1" comment="libwireshark8 is &lt;2.2.10-48.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518240" version="1" comment="libwiretap6 is &lt;2.2.10-48.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518241" version="1" comment="libwscodecs1 is &lt;2.2.10-48.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518242" version="1" comment="libwsutil7 is &lt;2.2.10-48.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518243" version="1" comment="wireshark is &lt;2.2.10-48.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518244" version="1" comment="wireshark-gtk is &lt;2.2.10-48.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518245" version="1" comment="xen is &lt;4.7.3_06-43.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518246" version="1" comment="xen-libs is &lt;4.7.3_06-43.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518247" version="1" comment="xen-libs-32bit is &lt;4.7.3_06-43.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518248" version="1" comment="kernel-default is &lt;4.4.90-92.45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518249" version="1" comment="kernel-default-devel is &lt;4.4.90-92.45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518250" version="1" comment="kernel-default-extra is &lt;4.4.90-92.45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518251" version="1" comment="kernel-devel is &lt;4.4.90-92.45.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518252" version="1" comment="kernel-macros is &lt;4.4.90-92.45.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518253" version="1" comment="kernel-source is &lt;4.4.90-92.45.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518254" version="1" comment="kernel-syms is &lt;4.4.90-92.45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518255" version="1" comment="wget is &lt;1.14-21.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518256" version="1" comment="SuSEfirewall2 is &lt;3.6.312-2.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518257" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.18.0-2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518258" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.18.0-2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518259" version="1" comment="libwebkit2gtk3-lang is &lt;2.18.0-2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518260" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.18.0-2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518261" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.18.0-2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518262" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.18.0-2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518263" version="1" comment="libwpd-0_10-10 is &lt;0.10.2-2.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518264" version="1" comment="qemu is &lt;2.6.2-41.22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518265" version="1" comment="qemu-block-curl is &lt;2.6.2-41.22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518266" version="1" comment="qemu-ipxe is &lt;1.0.0-41.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518267" version="1" comment="qemu-kvm is &lt;2.6.2-41.22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518268" version="1" comment="qemu-seabios is &lt;1.9.1-41.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518269" version="1" comment="qemu-sgabios is &lt;8-41.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518270" version="1" comment="qemu-tools is &lt;2.6.2-41.22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518271" version="1" comment="qemu-vgabios is &lt;1.9.1-41.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518272" version="1" comment="qemu-x86 is &lt;2.6.2-41.22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518273" version="1" comment="libipa_hbac0 is &lt;1.13.4-34.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518274" version="1" comment="libsss_idmap0 is &lt;1.13.4-34.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518275" version="1" comment="libsss_sudo is &lt;1.13.4-34.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518276" version="1" comment="python-sssd-config is &lt;1.13.4-34.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518277" version="1" comment="sssd is &lt;1.13.4-34.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518278" version="1" comment="sssd-32bit is &lt;1.13.4-34.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518279" version="1" comment="sssd-ad is &lt;1.13.4-34.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518280" version="1" comment="sssd-ipa is &lt;1.13.4-34.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518281" version="1" comment="sssd-krb5 is &lt;1.13.4-34.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518282" version="1" comment="sssd-krb5-common is &lt;1.13.4-34.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518283" version="1" comment="sssd-ldap is &lt;1.13.4-34.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518284" version="1" comment="sssd-proxy is &lt;1.13.4-34.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518285" version="1" comment="sssd-tools is &lt;1.13.4-34.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518286" version="1" comment="krb5 is &lt;1.12.5-40.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518287" version="1" comment="krb5-32bit is &lt;1.12.5-40.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518288" version="1" comment="krb5-client is &lt;1.12.5-40.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518289" version="1" comment="ImageMagick is &lt;6.8.8.1-71.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518290" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518291" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518292" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518293" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518294" version="1" comment="shadow is &lt;4.2.1-27.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518295" version="1" comment="libpoppler44 is &lt;0.24.4-14.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518296" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518297" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.151-27.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518298" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.151-27.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518299" version="1" comment="ceph-common is &lt;10.2.4+git.1481215985.12b091b-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518300" version="1" comment="libcephfs1 is &lt;10.2.4+git.1481215985.12b091b-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518301" version="1" comment="librados2 is &lt;10.2.4+git.1481215985.12b091b-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518302" version="1" comment="libradosstriper1 is &lt;10.2.4+git.1481215985.12b091b-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518303" version="1" comment="librbd1 is &lt;10.2.4+git.1481215985.12b091b-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518304" version="1" comment="python-cephfs is &lt;10.2.4+git.1481215985.12b091b-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518305" version="1" comment="python-rados is &lt;10.2.4+git.1481215985.12b091b-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518306" version="1" comment="python-rbd is &lt;10.2.4+git.1481215985.12b091b-16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518307" version="1" comment="file is &lt;5.22-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518308" version="1" comment="file-magic is &lt;5.22-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518309" version="1" comment="libmagic1 is &lt;5.22-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518310" version="1" comment="libmagic1-32bit is &lt;5.22-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518311" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518312" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518313" version="1" comment="gimp is &lt;2.8.18-9.3.26 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518314" version="1" comment="gimp-lang is &lt;2.8.18-9.3.26 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518315" version="1" comment="gimp-plugins-python is &lt;2.8.18-9.3.26 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518316" version="1" comment="libgimp-2_0-0 is &lt;2.8.18-9.3.26 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518317" version="1" comment="libgimpui-2_0-0 is &lt;2.8.18-9.3.26 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518318" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518319" version="1" comment="perl is &lt;5.18.2-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518320" version="1" comment="perl-32bit is &lt;5.18.2-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518321" version="1" comment="perl-base is &lt;5.18.2-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518322" version="1" comment="perl-doc is &lt;5.18.2-12.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518323" version="1" comment="kernel-firmware is &lt;20170530-21.13.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518324" version="1" comment="ucode-amd is &lt;20170530-21.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518325" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518326" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518327" version="1" comment="libdcerpc0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518328" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518329" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518330" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518331" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518332" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518333" version="1" comment="libndr-standard0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518334" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518335" version="1" comment="libndr0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518336" version="1" comment="libndr0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518337" version="1" comment="libnetapi0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518338" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518339" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518340" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518341" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518342" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518343" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518344" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518345" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518346" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518347" version="1" comment="libsamba-util0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518348" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518349" version="1" comment="libsamdb0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518350" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518351" version="1" comment="libsmbclient0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518352" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518353" version="1" comment="libsmbconf0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518354" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518355" version="1" comment="libsmbldap0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518356" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518357" version="1" comment="libtevent-util0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518358" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518359" version="1" comment="libwbclient0 is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518360" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518361" version="1" comment="samba is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518362" version="1" comment="samba-client is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518363" version="1" comment="samba-client-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518364" version="1" comment="samba-doc is &lt;4.4.2-38.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518365" version="1" comment="samba-libs is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518366" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518367" version="1" comment="samba-winbind is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518368" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518369" version="1" comment="libxml2-2 is &lt;2.9.4-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518370" version="1" comment="libxml2-2-32bit is &lt;2.9.4-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518371" version="1" comment="libxml2-tools is &lt;2.9.4-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518372" version="1" comment="python-libxml2 is &lt;2.9.4-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518373" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518374" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518375" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518376" version="1" comment="openssl is &lt;1.0.2j-60.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518377" version="1" comment="binutils is &lt;2.29.1-9.20.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518378" version="1" comment="xen is &lt;4.7.4_02-43.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518379" version="1" comment="xen-libs is &lt;4.7.4_02-43.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518380" version="1" comment="xen-libs-32bit is &lt;4.7.4_02-43.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518381" version="1" comment="MozillaFirefox is &lt;52.5.0esr-109.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518382" version="1" comment="MozillaFirefox-translations is &lt;52.5.0esr-109.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518383" version="1" comment="libz1 is &lt;1.2.8-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518384" version="1" comment="libz1-32bit is &lt;1.2.8-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518385" version="1" comment="zlib-devel is &lt;1.2.8-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518386" version="1" comment="libspice-server1 is &lt;0.12.7-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518387" version="1" comment="libXcursor1 is &lt;1.1.14-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518388" version="1" comment="libXcursor1-32bit is &lt;1.1.14-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518389" version="1" comment="kernel-default is &lt;4.4.90-92.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518390" version="1" comment="kernel-default-devel is &lt;4.4.90-92.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518391" version="1" comment="kernel-default-extra is &lt;4.4.90-92.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518392" version="1" comment="kernel-devel is &lt;4.4.90-92.50.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518393" version="1" comment="kernel-macros is &lt;4.4.90-92.50.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518394" version="1" comment="kernel-source is &lt;4.4.90-92.50.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518395" version="1" comment="kernel-syms is &lt;4.4.90-92.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518396" version="1" comment="openssh is &lt;7.2p2-74.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518397" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.11.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518398" version="1" comment="openssh-helpers is &lt;7.2p2-74.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518399" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.20.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518400" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.20.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518401" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.20.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518402" version="1" comment="openssl is &lt;1.0.2j-60.20.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518403" version="1" comment="ImageMagick is &lt;6.8.8.1-71.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518404" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518405" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518406" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518407" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518408" version="1" comment="libraw9 is &lt;0.15.4-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518409" version="1" comment="libecpg6 is &lt;9.6.6-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518410" version="1" comment="libpq5 is &lt;9.6.6-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518411" version="1" comment="libpq5-32bit is &lt;9.6.6-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518412" version="1" comment="postgresql96 is &lt;9.6.6-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518413" version="1" comment="kernel-default is &lt;4.4.103-92.53.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518414" version="1" comment="kernel-default-devel is &lt;4.4.103-92.53.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518415" version="1" comment="kernel-default-extra is &lt;4.4.103-92.53.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518416" version="1" comment="kernel-devel is &lt;4.4.103-92.53.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518417" version="1" comment="kernel-macros is &lt;4.4.103-92.53.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518418" version="1" comment="kernel-source is &lt;4.4.103-92.53.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518419" version="1" comment="kernel-syms is &lt;4.4.103-92.53.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518420" version="1" comment="evince is &lt;3.20.2-6.19.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518421" version="1" comment="evince-browser-plugin is &lt;3.20.2-6.19.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518422" version="1" comment="evince-lang is &lt;3.20.2-6.19.15 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518423" version="1" comment="evince-plugin-djvudocument is &lt;3.20.2-6.19.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518424" version="1" comment="evince-plugin-dvidocument is &lt;3.20.2-6.19.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518425" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.2-6.19.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518426" version="1" comment="evince-plugin-psdocument is &lt;3.20.2-6.19.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518427" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.2-6.19.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518428" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.2-6.19.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518429" version="1" comment="libevdocument3-4 is &lt;3.20.2-6.19.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518430" version="1" comment="libevview3-3 is &lt;3.20.2-6.19.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518431" version="1" comment="nautilus-evince is &lt;3.20.2-6.19.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518432" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.20.2-6.19.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518433" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.20.2-6.19.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518434" version="1" comment="libwireshark8 is &lt;2.2.11-48.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518435" version="1" comment="libwiretap6 is &lt;2.2.11-48.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518436" version="1" comment="libwscodecs1 is &lt;2.2.11-48.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518437" version="1" comment="libwsutil7 is &lt;2.2.11-48.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518438" version="1" comment="wireshark is &lt;2.2.11-48.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518439" version="1" comment="wireshark-gtk is &lt;2.2.11-48.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518440" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-19.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518441" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-19.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518442" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-19.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518443" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-19.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518444" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-19.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518445" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-19.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518446" version="1" comment="libopenssl-devel is &lt;1.0.2j-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518447" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518448" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518449" version="1" comment="openssl is &lt;1.0.2j-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518450" version="1" comment="libblkid1 is &lt;2.28-44.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518451" version="1" comment="libblkid1-32bit is &lt;2.28-44.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518452" version="1" comment="libfdisk1 is &lt;2.28-44.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518453" version="1" comment="libmount1 is &lt;2.28-44.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518454" version="1" comment="libmount1-32bit is &lt;2.28-44.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518455" version="1" comment="libsmartcols1 is &lt;2.28-44.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518456" version="1" comment="libuuid-devel is &lt;2.28-44.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518457" version="1" comment="libuuid1 is &lt;2.28-44.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518458" version="1" comment="libuuid1-32bit is &lt;2.28-44.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518459" version="1" comment="python-libmount is &lt;2.28-44.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518460" version="1" comment="util-linux is &lt;2.28-44.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518461" version="1" comment="util-linux-lang is &lt;2.28-44.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518462" version="1" comment="util-linux-systemd is &lt;2.28-44.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518463" version="1" comment="uuidd is &lt;2.28-44.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518464" version="1" comment="xen is &lt;4.7.1_06-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518465" version="1" comment="xen-libs is &lt;4.7.1_06-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518466" version="1" comment="xen-libs-32bit is &lt;4.7.1_06-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518467" version="1" comment="kernel-default is &lt;4.4.49-92.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518468" version="1" comment="kernel-default-devel is &lt;4.4.49-92.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518469" version="1" comment="kernel-default-extra is &lt;4.4.49-92.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518470" version="1" comment="kernel-devel is &lt;4.4.49-92.11.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518471" version="1" comment="kernel-macros is &lt;4.4.49-92.11.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518472" version="1" comment="kernel-source is &lt;4.4.49-92.11.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518473" version="1" comment="kernel-syms is &lt;4.4.49-92.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518474" version="1" comment="libXvnc1 is &lt;1.6.0-16.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518475" version="1" comment="tigervnc is &lt;1.6.0-16.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518476" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-16.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518477" version="1" comment="qemu is &lt;2.6.2-41.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518478" version="1" comment="qemu-block-curl is &lt;2.6.2-41.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518479" version="1" comment="qemu-ipxe is &lt;1.0.0-41.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518480" version="1" comment="qemu-kvm is &lt;2.6.2-41.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518481" version="1" comment="qemu-seabios is &lt;1.9.1-41.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518482" version="1" comment="qemu-sgabios is &lt;8-41.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518483" version="1" comment="qemu-tools is &lt;2.6.2-41.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518484" version="1" comment="qemu-vgabios is &lt;1.9.1-41.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518485" version="1" comment="qemu-x86 is &lt;2.6.2-41.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518486" version="1" comment="gegl-0_2 is &lt;0.2.0-14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518487" version="1" comment="gegl-0_2-lang is &lt;0.2.0-14.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518488" version="1" comment="libgegl-0_2-0 is &lt;0.2.0-14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518489" version="1" comment="libvmtools0 is &lt;10.1.0-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518490" version="1" comment="open-vm-tools is &lt;10.1.0-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518491" version="1" comment="open-vm-tools-desktop is &lt;10.1.0-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518492" version="1" comment="libvirglrenderer0 is &lt;0.5.0-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518493" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518494" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518495" version="1" comment="libdcerpc0 is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518496" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518497" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518498" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518499" version="1" comment="libndr-nbt0 is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518500" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518501" version="1" comment="libndr-standard0 is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518502" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518503" version="1" comment="libndr0 is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518504" version="1" comment="libndr0-32bit is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518505" version="1" comment="libnetapi0 is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518506" version="1" comment="libnetapi0-32bit is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518507" version="1" comment="libsamba-credentials0 is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518508" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518509" version="1" comment="libsamba-errors0 is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518510" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518511" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518512" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518513" version="1" comment="libsamba-passdb0 is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518514" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518515" version="1" comment="libsamba-util0 is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518516" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518517" version="1" comment="libsamdb0 is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518518" version="1" comment="libsamdb0-32bit is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518519" version="1" comment="libsmbclient0 is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518520" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518521" version="1" comment="libsmbconf0 is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518522" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518523" version="1" comment="libsmbldap0 is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518524" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518525" version="1" comment="libtevent-util0 is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518526" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518527" version="1" comment="libwbclient0 is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518528" version="1" comment="libwbclient0-32bit is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518529" version="1" comment="samba is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518530" version="1" comment="samba-client is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518531" version="1" comment="samba-client-32bit is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518532" version="1" comment="samba-doc is &lt;4.4.2-36.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518533" version="1" comment="samba-libs is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518534" version="1" comment="samba-libs-32bit is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518535" version="1" comment="samba-winbind is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518536" version="1" comment="samba-winbind-32bit is &lt;4.4.2-36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518537" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518538" version="1" comment="kernel-default is &lt;4.4.49-92.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518539" version="1" comment="kernel-default-devel is &lt;4.4.49-92.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518540" version="1" comment="kernel-default-extra is &lt;4.4.49-92.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518541" version="1" comment="kernel-devel is &lt;4.4.49-92.14.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518542" version="1" comment="kernel-macros is &lt;4.4.49-92.14.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518543" version="1" comment="kernel-source is &lt;4.4.49-92.14.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518544" version="1" comment="kernel-syms is &lt;4.4.49-92.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518545" version="1" comment="gimp is &lt;2.8.18-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518546" version="1" comment="gimp-lang is &lt;2.8.18-8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518547" version="1" comment="gimp-plugins-python is &lt;2.8.18-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518548" version="1" comment="libgimp-2_0-0 is &lt;2.8.18-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518549" version="1" comment="libgimpui-2_0-0 is &lt;2.8.18-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518550" version="1" comment="dracut is &lt;044-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518551" version="1" comment="gstreamer-plugins-bad is &lt;1.8.3-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518552" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.8.3-17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518553" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.8.3-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518554" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.8.3-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518555" version="1" comment="libgstbadbase-1_0-0 is &lt;1.8.3-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518556" version="1" comment="libgstbadvideo-1_0-0 is &lt;1.8.3-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518557" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.8.3-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518558" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.8.3-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518559" version="1" comment="libgstgl-1_0-0 is &lt;1.8.3-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518560" version="1" comment="libgstmpegts-1_0-0 is &lt;1.8.3-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518561" version="1" comment="libgstphotography-1_0-0 is &lt;1.8.3-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518562" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.8.3-17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518563" version="1" comment="gstreamer is &lt;1.8.3-9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518564" version="1" comment="gstreamer-lang is &lt;1.8.3-9.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518565" version="1" comment="gstreamer-utils is &lt;1.8.3-9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518566" version="1" comment="libgstreamer-1_0-0 is &lt;1.8.3-9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518567" version="1" comment="libgstreamer-1_0-0-32bit is &lt;1.8.3-9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518568" version="1" comment="typelib-1_0-Gst-1_0 is &lt;1.8.3-9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518569" version="1" comment="xen is &lt;4.7.2_02-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518570" version="1" comment="xen-libs is &lt;4.7.2_02-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518571" version="1" comment="xen-libs-32bit is &lt;4.7.2_02-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518572" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.36-17.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518573" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-17.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518574" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.36-17.13 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518575" version="1" comment="libgstapp-0_10-0 is &lt;0.10.36-17.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518576" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-17.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518577" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.36-17.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518578" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-17.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518579" version="1" comment="gstreamer-plugins-good is &lt;1.8.3-12.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518580" version="1" comment="gstreamer-plugins-good-lang is &lt;1.8.3-12.12 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518581" version="1" comment="gstreamer-plugins-base is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518582" version="1" comment="gstreamer-plugins-base-lang is &lt;1.8.3-12.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518583" version="1" comment="libgstallocators-1_0-0 is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518584" version="1" comment="libgstapp-1_0-0 is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518585" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518586" version="1" comment="libgstaudio-1_0-0 is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518587" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518588" version="1" comment="libgstfft-1_0-0 is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518589" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518590" version="1" comment="libgstpbutils-1_0-0 is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518591" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518592" version="1" comment="libgstriff-1_0-0 is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518593" version="1" comment="libgstrtp-1_0-0 is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518594" version="1" comment="libgstrtsp-1_0-0 is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518595" version="1" comment="libgstsdp-1_0-0 is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518596" version="1" comment="libgsttag-1_0-0 is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518597" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518598" version="1" comment="libgstvideo-1_0-0 is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518599" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518600" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518601" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518602" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518603" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.8.3-12.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518604" version="1" comment="libXvnc1 is &lt;1.6.0-18.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518605" version="1" comment="tigervnc is &lt;1.6.0-18.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518606" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-18.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518607" version="1" comment="xen is &lt;4.7.2_04-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518608" version="1" comment="xen-libs is &lt;4.7.2_04-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518609" version="1" comment="xen-libs-32bit is &lt;4.7.2_04-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518610" version="1" comment="qemu is &lt;2.6.2-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518611" version="1" comment="qemu-block-curl is &lt;2.6.2-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518612" version="1" comment="qemu-ipxe is &lt;1.0.0-39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518613" version="1" comment="qemu-kvm is &lt;2.6.2-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518614" version="1" comment="qemu-seabios is &lt;1.9.1-39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518615" version="1" comment="qemu-sgabios is &lt;8-39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518616" version="1" comment="qemu-tools is &lt;2.6.2-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518617" version="1" comment="qemu-vgabios is &lt;1.9.1-39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518618" version="1" comment="qemu-x86 is &lt;2.6.2-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518619" version="1" comment="kernel-default is &lt;4.4.59-92.17.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518620" version="1" comment="kernel-default-devel is &lt;4.4.59-92.17.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518621" version="1" comment="kernel-default-extra is &lt;4.4.59-92.17.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518622" version="1" comment="kernel-devel is &lt;4.4.59-92.17.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518623" version="1" comment="kernel-macros is &lt;4.4.59-92.17.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518624" version="1" comment="kernel-source is &lt;4.4.59-92.17.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518625" version="1" comment="kernel-syms is &lt;4.4.59-92.17.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518626" version="1" comment="bash is &lt;4.3-82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518627" version="1" comment="bash-doc is &lt;4.3-82.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518628" version="1" comment="bash-lang is &lt;4.3-82.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518629" version="1" comment="libreadline6 is &lt;6.3-82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518630" version="1" comment="libreadline6-32bit is &lt;6.3-82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518631" version="1" comment="readline-doc is &lt;6.3-82.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518632" version="1" comment="libtirpc-netconfig is &lt;1.0.1-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518633" version="1" comment="libtirpc3 is &lt;1.0.1-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518634" version="1" comment="libtirpc3-32bit is &lt;1.0.1-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518635" version="1" comment="rpcbind is &lt;0.2.3-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518636" version="1" comment="libplist++3 is &lt;1.12-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518637" version="1" comment="libplist3 is &lt;1.12-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518638" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518639" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518640" version="1" comment="libdcerpc0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518641" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518642" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518643" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518644" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518645" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518646" version="1" comment="libndr-standard0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518647" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518648" version="1" comment="libndr0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518649" version="1" comment="libndr0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518650" version="1" comment="libnetapi0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518651" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518652" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518653" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518654" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518655" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518656" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518657" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518658" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518659" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518660" version="1" comment="libsamba-util0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518661" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518662" version="1" comment="libsamdb0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518663" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518664" version="1" comment="libsmbclient0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518665" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518666" version="1" comment="libsmbconf0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518667" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518668" version="1" comment="libsmbldap0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518669" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518670" version="1" comment="libtevent-util0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518671" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518672" version="1" comment="libwbclient0 is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518673" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518674" version="1" comment="samba is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518675" version="1" comment="samba-client is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518676" version="1" comment="samba-client-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518677" version="1" comment="samba-doc is &lt;4.4.2-38.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518678" version="1" comment="samba-libs is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518679" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518680" version="1" comment="samba-winbind is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518681" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518682" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518683" version="1" comment="kernel-default is &lt;4.4.38-93.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518684" version="1" comment="kernel-default-devel is &lt;4.4.38-93.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518685" version="1" comment="kernel-default-extra is &lt;4.4.38-93.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518686" version="1" comment="kernel-devel is &lt;4.4.38-93.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518687" version="1" comment="kernel-macros is &lt;4.4.38-93.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518688" version="1" comment="kernel-source is &lt;4.4.38-93.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518689" version="1" comment="kernel-syms is &lt;4.4.38-93.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518690" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.131-26.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518691" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.131-26.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518692" version="1" comment="sudo is &lt;1.8.10p3-10.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518693" version="1" comment="libxml2-2 is &lt;2.9.4-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518694" version="1" comment="libxml2-2-32bit is &lt;2.9.4-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518695" version="1" comment="libxml2-tools is &lt;2.9.4-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518696" version="1" comment="python-libxml2 is &lt;2.9.4-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518697" version="1" comment="strongswan is &lt;5.1.3-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518698" version="1" comment="strongswan-doc is &lt;5.1.3-25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518699" version="1" comment="strongswan-ipsec is &lt;5.1.3-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518700" version="1" comment="strongswan-libs0 is &lt;5.1.3-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518701" version="1" comment="libhogweed2 is &lt;2.7.1-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518702" version="1" comment="libhogweed2-32bit is &lt;2.7.1-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518703" version="1" comment="libnettle4 is &lt;2.7.1-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518704" version="1" comment="libnettle4-32bit is &lt;2.7.1-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518705" version="1" comment="ImageMagick is &lt;6.8.8.1-70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518706" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518707" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518708" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518709" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518710" version="1" comment="libxml2-2 is &lt;2.9.4-39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518711" version="1" comment="libxml2-2-32bit is &lt;2.9.4-39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518712" version="1" comment="libxml2-tools is &lt;2.9.4-39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518713" version="1" comment="python-libxml2 is &lt;2.9.4-39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518714" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518715" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518716" version="1" comment="openldap2-client is &lt;2.4.41-18.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518717" version="1" comment="libQt5Concurrent5 is &lt;5.6.1-17.3.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518718" version="1" comment="libQt5Core5 is &lt;5.6.1-17.3.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518719" version="1" comment="libQt5DBus5 is &lt;5.6.1-17.3.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518720" version="1" comment="libQt5Gui5 is &lt;5.6.1-17.3.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518721" version="1" comment="libQt5Network5 is &lt;5.6.1-17.3.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518722" version="1" comment="libQt5OpenGL5 is &lt;5.6.1-17.3.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518723" version="1" comment="libQt5PrintSupport5 is &lt;5.6.1-17.3.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518724" version="1" comment="libQt5Sql5 is &lt;5.6.1-17.3.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518725" version="1" comment="libQt5Sql5-mysql is &lt;5.6.1-17.3.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518726" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.1-17.3.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518727" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.1-17.3.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518728" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.1-17.3.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518729" version="1" comment="libQt5Test5 is &lt;5.6.1-17.3.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518730" version="1" comment="libQt5Widgets5 is &lt;5.6.1-17.3.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518731" version="1" comment="libQt5Xml5 is &lt;5.6.1-17.3.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518732" version="1" comment="libQtQuick5 is &lt;5.6.1-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518733" version="1" comment="libnetpbm11 is &lt;10.66.3-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518734" version="1" comment="libnetpbm11-32bit is &lt;10.66.3-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518735" version="1" comment="netpbm is &lt;10.66.3-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518736" version="1" comment="libgcrypt20 is &lt;1.6.1-16.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518737" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518738" version="1" comment="glibc is &lt;2.22-61.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518739" version="1" comment="glibc-32bit is &lt;2.22-61.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518740" version="1" comment="glibc-devel is &lt;2.22-61.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518741" version="1" comment="glibc-devel-32bit is &lt;2.22-61.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518742" version="1" comment="glibc-i18ndata is &lt;2.22-61.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518743" version="1" comment="glibc-locale is &lt;2.22-61.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518744" version="1" comment="glibc-locale-32bit is &lt;2.22-61.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518745" version="1" comment="nscd is &lt;2.22-61.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518746" version="1" comment="kernel-default is &lt;4.4.59-92.20.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518747" version="1" comment="kernel-default-devel is &lt;4.4.59-92.20.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518748" version="1" comment="kernel-default-extra is &lt;4.4.59-92.20.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518749" version="1" comment="kernel-devel is &lt;4.4.59-92.20.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518750" version="1" comment="kernel-macros is &lt;4.4.59-92.20.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518751" version="1" comment="kernel-source is &lt;4.4.59-92.20.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518752" version="1" comment="kernel-syms is &lt;4.4.59-92.20.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518753" version="1" comment="openvpn is &lt;2.3.8-16.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518754" version="1" comment="gd is &lt;2.1.0-24.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518755" version="1" comment="gd-32bit is &lt;2.1.0-24.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518756" version="1" comment="kernel-default is &lt;4.4.103-92.56.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518757" version="1" comment="kernel-default-devel is &lt;4.4.103-92.56.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518758" version="1" comment="kernel-default-extra is &lt;4.4.103-92.56.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518759" version="1" comment="kernel-devel is &lt;4.4.103-92.56.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518760" version="1" comment="kernel-macros is &lt;4.4.103-92.56.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518761" version="1" comment="kernel-source is &lt;4.4.103-92.56.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518762" version="1" comment="kernel-syms is &lt;4.4.103-92.56.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518763" version="1" comment="rsync is &lt;3.1.0-13.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518764" version="1" comment="procmail is &lt;3.22-269.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518765" version="1" comment="libvpx1 is &lt;1.3.0-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518766" version="1" comment="libvpx1-32bit is &lt;1.3.0-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518767" version="1" comment="vpx-tools is &lt;1.3.0-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518768" version="1" comment="libwireshark8 is &lt;2.2.12-48.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518769" version="1" comment="libwiretap6 is &lt;2.2.12-48.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518770" version="1" comment="libwscodecs1 is &lt;2.2.12-48.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518771" version="1" comment="libwsutil7 is &lt;2.2.12-48.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518772" version="1" comment="wireshark is &lt;2.2.12-48.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518773" version="1" comment="wireshark-gtk is &lt;2.2.12-48.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518774" version="1" comment="libexif12 is &lt;0.6.21-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518775" version="1" comment="libexif12-32bit is &lt;0.6.21-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518776" version="1" comment="ImageMagick is &lt;6.8.8.1-71.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518777" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518778" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518779" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518780" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518781" version="1" comment="libevent-2_0-5 is &lt;2.0.21-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518782" version="1" comment="curl is &lt;7.37.0-37.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518783" version="1" comment="libcurl4 is &lt;7.37.0-37.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518784" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518785" version="1" comment="libvorbis0 is &lt;1.3.3-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518786" version="1" comment="libvorbis0-32bit is &lt;1.3.3-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518787" version="1" comment="libvorbisenc2 is &lt;1.3.3-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518788" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518789" version="1" comment="libvorbisfile3 is &lt;1.3.3-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518790" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518791" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.18.5-2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518792" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.18.5-2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518793" version="1" comment="libwebkit2gtk3-lang is &lt;2.18.5-2.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518794" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.18.5-2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518795" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.18.5-2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518796" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.18.5-2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518797" version="1" comment="transfig is &lt;3.2.5e-2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518798" version="1" comment="clamav is &lt;0.99.3-33.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518799" version="1" comment="gd is &lt;2.1.0-24.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518800" version="1" comment="gd-32bit is &lt;2.1.0-24.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518801" version="1" comment="libncurses5 is &lt;5.9-58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518802" version="1" comment="libncurses5-32bit is &lt;5.9-58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518803" version="1" comment="libncurses6 is &lt;5.9-58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518804" version="1" comment="libncurses6-32bit is &lt;5.9-58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518805" version="1" comment="ncurses-devel is &lt;5.9-58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518806" version="1" comment="ncurses-utils is &lt;5.9-58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518807" version="1" comment="tack is &lt;5.9-58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518808" version="1" comment="terminfo is &lt;5.9-58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518809" version="1" comment="terminfo-base is &lt;5.9-58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518810" version="1" comment="libsystemd0 is &lt;228-150.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518811" version="1" comment="libsystemd0-32bit is &lt;228-150.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518812" version="1" comment="libudev1 is &lt;228-150.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518813" version="1" comment="libudev1-32bit is &lt;228-150.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518814" version="1" comment="systemd is &lt;228-150.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518815" version="1" comment="systemd-32bit is &lt;228-150.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518816" version="1" comment="systemd-bash-completion is &lt;228-150.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518817" version="1" comment="systemd-sysvinit is &lt;228-150.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518818" version="1" comment="udev is &lt;228-150.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518819" version="1" comment="bind-libs is &lt;9.9.9P1-63.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518820" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518821" version="1" comment="bind-utils is &lt;9.9.9P1-63.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518822" version="1" comment="libXfont1 is &lt;1.5.1-11.3.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518823" version="1" comment="ecryptfs-utils is &lt;103-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518824" version="1" comment="ecryptfs-utils-32bit is &lt;103-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518825" version="1" comment="ImageMagick is &lt;6.8.8.1-71.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518826" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518827" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518828" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518829" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518830" version="1" comment="libsndfile1 is &lt;1.0.25-36.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518831" version="1" comment="libsndfile1-32bit is &lt;1.0.25-36.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518832" version="1" comment="libjpeg-turbo is &lt;1.5.3-31.7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518833" version="1" comment="libjpeg62 is &lt;62.2.0-31.7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518834" version="1" comment="libjpeg62-32bit is &lt;62.2.0-31.7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518835" version="1" comment="libjpeg62-turbo is &lt;1.5.3-31.7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518836" version="1" comment="libjpeg8 is &lt;8.1.2-31.7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518837" version="1" comment="libjpeg8-32bit is &lt;8.1.2-31.7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518838" version="1" comment="libturbojpeg0 is &lt;8.1.2-31.7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518839" version="1" comment="spice-vdagent is &lt;0.16.0-8.5.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518840" version="1" comment="MozillaFirefox is &lt;52.6.0esr-109.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518841" version="1" comment="MozillaFirefox-translations is &lt;52.6.0esr-109.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518842" version="1" comment="qemu is &lt;2.6.2-41.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518843" version="1" comment="qemu-block-curl is &lt;2.6.2-41.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518844" version="1" comment="qemu-ipxe is &lt;1.0.0-41.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518845" version="1" comment="qemu-kvm is &lt;2.6.2-41.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518846" version="1" comment="qemu-seabios is &lt;1.9.1-41.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518847" version="1" comment="qemu-sgabios is &lt;8-41.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518848" version="1" comment="qemu-tools is &lt;2.6.2-41.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518849" version="1" comment="qemu-vgabios is &lt;1.9.1-41.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518850" version="1" comment="qemu-x86 is &lt;2.6.2-41.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518851" version="1" comment="libmysqlclient18 is &lt;10.0.33-29.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518852" version="1" comment="libmysqlclient18-32bit is &lt;10.0.33-29.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518853" version="1" comment="libmysqlclient_r18 is &lt;10.0.33-29.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518854" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.33-29.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518855" version="1" comment="mariadb is &lt;10.0.33-29.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518856" version="1" comment="mariadb-client is &lt;10.0.33-29.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518857" version="1" comment="mariadb-errormessages is &lt;10.0.33-29.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518858" version="1" comment="libvirt is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518859" version="1" comment="libvirt-client is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518860" version="1" comment="libvirt-client-32bit is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518861" version="1" comment="libvirt-daemon is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518862" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518863" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518864" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518865" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518866" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518867" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518868" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518869" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518870" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518871" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518872" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518873" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518874" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518875" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518876" version="1" comment="libvirt-doc is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518877" version="1" comment="libxml2-2 is &lt;2.9.4-46.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518878" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518879" version="1" comment="libxml2-tools is &lt;2.9.4-46.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518880" version="1" comment="python-libxml2 is &lt;2.9.4-46.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518881" version="1" comment="ghostscript is &lt;9.15-23.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518882" version="1" comment="ghostscript-x11 is &lt;9.15-23.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518883" version="1" comment="kernel-default is &lt;4.4.114-92.64.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518884" version="1" comment="kernel-default-devel is &lt;4.4.114-92.64.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518885" version="1" comment="kernel-default-extra is &lt;4.4.114-92.64.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518886" version="1" comment="kernel-devel is &lt;4.4.114-92.64.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518887" version="1" comment="kernel-macros is &lt;4.4.114-92.64.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518888" version="1" comment="kernel-source is &lt;4.4.114-92.64.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518889" version="1" comment="kernel-syms is &lt;4.4.114-92.64.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518890" version="1" comment="ft2demos is &lt;2.6.3-7.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518891" version="1" comment="libfreetype6 is &lt;2.6.3-7.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518892" version="1" comment="libfreetype6-32bit is &lt;2.6.3-7.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518893" version="1" comment="libreoffice is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518894" version="1" comment="libreoffice-base is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518895" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518896" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518897" version="1" comment="libreoffice-calc is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518898" version="1" comment="libreoffice-calc-extensions is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518899" version="1" comment="libreoffice-draw is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518900" version="1" comment="libreoffice-filters-optional is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518901" version="1" comment="libreoffice-gnome is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518902" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518903" version="1" comment="libreoffice-icon-theme-tango is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518904" version="1" comment="libreoffice-impress is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518905" version="1" comment="libreoffice-l10n-af is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518906" version="1" comment="libreoffice-l10n-ar is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518907" version="1" comment="libreoffice-l10n-ca is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518908" version="1" comment="libreoffice-l10n-cs is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518909" version="1" comment="libreoffice-l10n-da is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518910" version="1" comment="libreoffice-l10n-de is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518911" version="1" comment="libreoffice-l10n-en is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518912" version="1" comment="libreoffice-l10n-es is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518913" version="1" comment="libreoffice-l10n-fi is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518914" version="1" comment="libreoffice-l10n-fr is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518915" version="1" comment="libreoffice-l10n-gu is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518916" version="1" comment="libreoffice-l10n-hi is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518917" version="1" comment="libreoffice-l10n-hu is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518918" version="1" comment="libreoffice-l10n-it is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518919" version="1" comment="libreoffice-l10n-ja is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518920" version="1" comment="libreoffice-l10n-ko is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518921" version="1" comment="libreoffice-l10n-nb is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518922" version="1" comment="libreoffice-l10n-nl is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518923" version="1" comment="libreoffice-l10n-nn is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518924" version="1" comment="libreoffice-l10n-pl is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518925" version="1" comment="libreoffice-l10n-pt_BR is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518926" version="1" comment="libreoffice-l10n-pt_PT is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518927" version="1" comment="libreoffice-l10n-ro is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518928" version="1" comment="libreoffice-l10n-ru is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518929" version="1" comment="libreoffice-l10n-sk is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518930" version="1" comment="libreoffice-l10n-sv is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518931" version="1" comment="libreoffice-l10n-xh is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518932" version="1" comment="libreoffice-l10n-zh_CN is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518933" version="1" comment="libreoffice-l10n-zh_TW is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518934" version="1" comment="libreoffice-l10n-zu is &lt;5.4.5.1-40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518935" version="1" comment="libreoffice-mailmerge is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518936" version="1" comment="libreoffice-math is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518937" version="1" comment="libreoffice-officebean is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518938" version="1" comment="libreoffice-pyuno is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518939" version="1" comment="libreoffice-writer is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518940" version="1" comment="libreoffice-writer-extensions is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518941" version="1" comment="libreofficekit is &lt;5.4.5.1-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518942" version="1" comment="glibc is &lt;2.22-62.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518943" version="1" comment="glibc-32bit is &lt;2.22-62.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518944" version="1" comment="glibc-devel is &lt;2.22-62.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518945" version="1" comment="glibc-devel-32bit is &lt;2.22-62.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518946" version="1" comment="glibc-i18ndata is &lt;2.22-62.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518947" version="1" comment="glibc-locale is &lt;2.22-62.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518948" version="1" comment="glibc-locale-32bit is &lt;2.22-62.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518949" version="1" comment="nscd is &lt;2.22-62.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518950" version="1" comment="p7zip is &lt;9.20.1-7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518951" version="1" comment="xen is &lt;4.7.4_06-43.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518952" version="1" comment="xen-libs is &lt;4.7.4_06-43.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518953" version="1" comment="xen-libs-32bit is &lt;4.7.4_06-43.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518954" version="1" comment="libecpg6 is &lt;9.6.7-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518955" version="1" comment="libpq5 is &lt;9.6.7-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518956" version="1" comment="libpq5-32bit is &lt;9.6.7-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518957" version="1" comment="postgresql96 is &lt;9.6.7-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518958" version="1" comment="db48-utils is &lt;4.8.30-29.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518959" version="1" comment="libdb-4_8 is &lt;4.8.30-29.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518960" version="1" comment="libdb-4_8-32bit is &lt;4.8.30-29.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518961" version="1" comment="dhcp is &lt;4.3.3-10.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518962" version="1" comment="dhcp-client is &lt;4.3.3-10.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518963" version="1" comment="libsystemd0 is &lt;228-150.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518964" version="1" comment="libsystemd0-32bit is &lt;228-150.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518965" version="1" comment="libudev1 is &lt;228-150.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518966" version="1" comment="libudev1-32bit is &lt;228-150.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518967" version="1" comment="systemd is &lt;228-150.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518968" version="1" comment="systemd-32bit is &lt;228-150.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518969" version="1" comment="systemd-bash-completion is &lt;228-150.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518970" version="1" comment="systemd-sysvinit is &lt;228-150.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518971" version="1" comment="udev is &lt;228-150.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518972" version="1" comment="libzzip-0-13 is &lt;0.13.67-10.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518973" version="1" comment="puppet is &lt;3.8.5-15.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518974" version="1" comment="ImageMagick is &lt;6.8.8.1-71.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518975" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518976" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518977" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518978" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518979" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518980" version="1" comment="libIlmImf-Imf_2_1-21-32bit is &lt;2.1.0-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518981" version="1" comment="openexr is &lt;2.1.0-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518982" version="1" comment="ImageMagick is &lt;6.8.8.1-71.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518983" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518984" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518985" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518986" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518987" version="1" comment="cups is &lt;1.7.5-20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518988" version="1" comment="cups-client is &lt;1.7.5-20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518989" version="1" comment="cups-libs is &lt;1.7.5-20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518990" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518991" version="1" comment="libwavpack1 is &lt;4.60.99-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518992" version="1" comment="libyaml-cpp0_5 is &lt;0.5.3-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518993" version="1" comment="shotwell is &lt;0.22.0+git.20160103-15.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518994" version="1" comment="shotwell-lang is &lt;0.22.0+git.20160103-15.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518995" version="1" comment="augeas is &lt;1.2.0-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518996" version="1" comment="augeas-lenses is &lt;1.2.0-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518997" version="1" comment="libaugeas0 is &lt;1.2.0-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518998" version="1" comment="glibc is &lt;2.22-62.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518999" version="1" comment="glibc-32bit is &lt;2.22-62.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519000" version="1" comment="glibc-devel is &lt;2.22-62.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519001" version="1" comment="glibc-devel-32bit is &lt;2.22-62.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519002" version="1" comment="glibc-i18ndata is &lt;2.22-62.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519003" version="1" comment="glibc-locale is &lt;2.22-62.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519004" version="1" comment="glibc-locale-32bit is &lt;2.22-62.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519005" version="1" comment="nscd is &lt;2.22-62.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519006" version="1" comment="shadow is &lt;4.2.1-27.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519007" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.171-43.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519008" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.171-43.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519009" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.161-27.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519010" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.161-27.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519011" version="1" comment="postgresql94 is &lt;9.4.16-21.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519012" version="1" comment="kernel-firmware is &lt;20170530-21.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519013" version="1" comment="ucode-amd is &lt;20170530-21.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519014" version="1" comment="libcdio14 is &lt;0.90-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519015" version="1" comment="libcdio14-32bit is &lt;0.90-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519016" version="1" comment="libiso9660-8 is &lt;0.90-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519017" version="1" comment="libmysqlclient18 is &lt;10.0.34-29.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519018" version="1" comment="libmysqlclient18-32bit is &lt;10.0.34-29.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519019" version="1" comment="libmysqlclient_r18 is &lt;10.0.34-29.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519020" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.34-29.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519021" version="1" comment="mariadb is &lt;10.0.34-29.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519022" version="1" comment="mariadb-client is &lt;10.0.34-29.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519023" version="1" comment="mariadb-errormessages is &lt;10.0.34-29.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519024" version="1" comment="ucode-intel is &lt;20180312-13.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519025" version="1" comment="libid3tag0 is &lt;0.15.1b-184.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519026" version="1" comment="libecpg6 is &lt;9.6.8-3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519027" version="1" comment="libpq5 is &lt;9.6.8-3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519028" version="1" comment="libpq5-32bit is &lt;9.6.8-3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519029" version="1" comment="postgresql96 is &lt;9.6.8-3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519030" version="1" comment="curl is &lt;7.37.0-37.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519031" version="1" comment="libcurl4 is &lt;7.37.0-37.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519032" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519033" version="1" comment="libvorbis0 is &lt;1.3.3-10.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519034" version="1" comment="libvorbis0-32bit is &lt;1.3.3-10.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519035" version="1" comment="libvorbisenc2 is &lt;1.3.3-10.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519036" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-10.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519037" version="1" comment="libvorbisfile3 is &lt;1.3.3-10.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519038" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-10.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519039" version="1" comment="kernel-default is &lt;4.4.120-92.70.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519040" version="1" comment="kernel-default-devel is &lt;4.4.120-92.70.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519041" version="1" comment="kernel-default-extra is &lt;4.4.120-92.70.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519042" version="1" comment="kernel-devel is &lt;4.4.120-92.70.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519043" version="1" comment="kernel-macros is &lt;4.4.120-92.70.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519044" version="1" comment="kernel-source is &lt;4.4.120-92.70.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519045" version="1" comment="kernel-syms is &lt;4.4.120-92.70.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519046" version="1" comment="clamav is &lt;0.99.4-33.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519047" version="1" comment="dhcp is &lt;4.3.3-10.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519048" version="1" comment="dhcp-client is &lt;4.3.3-10.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519049" version="1" comment="libwireshark8 is &lt;2.2.13-48.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519050" version="1" comment="libwiretap6 is &lt;2.2.13-48.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519051" version="1" comment="libwscodecs1 is &lt;2.2.13-48.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519052" version="1" comment="libwsutil7 is &lt;2.2.13-48.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519053" version="1" comment="wireshark is &lt;2.2.13-48.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519054" version="1" comment="wireshark-gtk is &lt;2.2.13-48.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519055" version="1" comment="glibc is &lt;2.22-62.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519056" version="1" comment="glibc-32bit is &lt;2.22-62.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519057" version="1" comment="glibc-devel is &lt;2.22-62.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519058" version="1" comment="glibc-devel-32bit is &lt;2.22-62.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519059" version="1" comment="glibc-i18ndata is &lt;2.22-62.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519060" version="1" comment="glibc-locale is &lt;2.22-62.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519061" version="1" comment="glibc-locale-32bit is &lt;2.22-62.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519062" version="1" comment="nscd is &lt;2.22-62.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519063" version="1" comment="qemu is &lt;2.6.2-41.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519064" version="1" comment="qemu-block-curl is &lt;2.6.2-41.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519065" version="1" comment="qemu-ipxe is &lt;1.0.0-41.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519066" version="1" comment="qemu-kvm is &lt;2.6.2-41.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519067" version="1" comment="qemu-seabios is &lt;1.9.1-41.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519068" version="1" comment="qemu-sgabios is &lt;8-41.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519069" version="1" comment="qemu-tools is &lt;2.6.2-41.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519070" version="1" comment="qemu-vgabios is &lt;1.9.1-41.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519071" version="1" comment="qemu-x86 is &lt;2.6.2-41.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519072" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519073" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519074" version="1" comment="libdcerpc0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519075" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519076" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519077" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519078" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519079" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519080" version="1" comment="libndr-standard0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519081" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519082" version="1" comment="libndr0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519083" version="1" comment="libndr0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519084" version="1" comment="libnetapi0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519085" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519086" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519087" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519088" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519089" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519090" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519091" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519092" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519093" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519094" version="1" comment="libsamba-util0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519095" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519096" version="1" comment="libsamdb0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519097" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519098" version="1" comment="libsmbclient0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519099" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519100" version="1" comment="libsmbconf0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519101" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519102" version="1" comment="libsmbldap0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519103" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519104" version="1" comment="libtevent-util0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519105" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519106" version="1" comment="libwbclient0 is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519107" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519108" version="1" comment="samba is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519109" version="1" comment="samba-client is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519110" version="1" comment="samba-client-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519111" version="1" comment="samba-doc is &lt;4.4.2-38.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519112" version="1" comment="samba-libs is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519113" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519114" version="1" comment="samba-winbind is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519115" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519116" version="1" comment="krb5 is &lt;1.12.5-40.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519117" version="1" comment="krb5-32bit is &lt;1.12.5-40.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519118" version="1" comment="krb5-client is &lt;1.12.5-40.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519119" version="1" comment="MozillaFirefox is &lt;52.7.3esr-109.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519120" version="1" comment="MozillaFirefox-translations is &lt;52.7.3esr-109.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519121" version="1" comment="ImageMagick is &lt;6.8.8.1-71.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519122" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519123" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519124" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519125" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519126" version="1" comment="libgraphite2-3 is &lt;1.3.1-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519127" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519128" version="1" comment="libvirt is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519129" version="1" comment="libvirt-client is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519130" version="1" comment="libvirt-client-32bit is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519131" version="1" comment="libvirt-daemon is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519132" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519133" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519134" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519135" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519136" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519137" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519138" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519139" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519140" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519141" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519142" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519143" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519144" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519145" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519146" version="1" comment="libvirt-doc is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519147" version="1" comment="libtiff5 is &lt;4.0.9-44.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519148" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519149" version="1" comment="postgresql94 is &lt;9.4.17-21.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519150" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.161-43.7.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519151" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.161-43.7.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519152" version="1" comment="gwenhywfar-lang is &lt;4.9.0beta-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519153" version="1" comment="gwenhywfar-tools is &lt;4.9.0beta-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519154" version="1" comment="libgwengui-gtk2-0 is &lt;4.9.0beta-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519155" version="1" comment="libgwenhywfar60 is &lt;4.9.0beta-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519156" version="1" comment="libgwenhywfar60-plugins is &lt;4.9.0beta-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519157" version="1" comment="xen is &lt;4.7.5_02-43.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519158" version="1" comment="xen-libs is &lt;4.7.5_02-43.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519159" version="1" comment="xen-libs-32bit is &lt;4.7.5_02-43.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519160" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519161" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519162" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519163" version="1" comment="openssl is &lt;1.0.2j-60.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519164" version="1" comment="postgresql94 is &lt;9.4.15-21.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519165" version="1" comment="libmysqlclient18 is &lt;10.0.32-29.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519166" version="1" comment="libmysqlclient18-32bit is &lt;10.0.32-29.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519167" version="1" comment="libmysqlclient_r18 is &lt;10.0.32-29.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519168" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.32-29.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519169" version="1" comment="mariadb is &lt;10.0.32-29.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519170" version="1" comment="mariadb-client is &lt;10.0.32-29.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519171" version="1" comment="mariadb-errormessages is &lt;10.0.32-29.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519172" version="1" comment="openslp is &lt;2.0.0-18.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519173" version="1" comment="openslp-32bit is &lt;2.0.0-18.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519174" version="1" comment="kernel-firmware is &lt;20170530-21.16.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519175" version="1" comment="ucode-amd is &lt;20170530-21.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519176" version="1" comment="rsync is &lt;3.1.0-13.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519177" version="1" comment="libncurses5 is &lt;5.9-55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519178" version="1" comment="libncurses5-32bit is &lt;5.9-55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519179" version="1" comment="libncurses6 is &lt;5.9-55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519180" version="1" comment="libncurses6-32bit is &lt;5.9-55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519181" version="1" comment="ncurses-devel is &lt;5.9-55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519182" version="1" comment="ncurses-utils is &lt;5.9-55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519183" version="1" comment="tack is &lt;5.9-55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519184" version="1" comment="terminfo is &lt;5.9-55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519185" version="1" comment="terminfo-base is &lt;5.9-55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519186" version="1" comment="curl is &lt;7.37.0-37.11.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519187" version="1" comment="libcurl4 is &lt;7.37.0-37.11.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519188" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.11.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519189" version="1" comment="perl-XML-LibXML is &lt;2.0019-6.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519190" version="1" comment="ImageMagick is &lt;6.8.8.1-71.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519191" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519192" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519193" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519194" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519195" version="1" comment="libsystemd0 is &lt;228-150.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519196" version="1" comment="libsystemd0-32bit is &lt;228-150.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519197" version="1" comment="libudev1 is &lt;228-150.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519198" version="1" comment="libudev1-32bit is &lt;228-150.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519199" version="1" comment="systemd is &lt;228-150.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519200" version="1" comment="systemd-32bit is &lt;228-150.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519201" version="1" comment="systemd-bash-completion is &lt;228-150.9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519202" version="1" comment="systemd-sysvinit is &lt;228-150.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519203" version="1" comment="udev is &lt;228-150.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519204" version="1" comment="libdcerpc-binding0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519205" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519206" version="1" comment="libdcerpc0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519207" version="1" comment="libdcerpc0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519208" version="1" comment="libndr-krb5pac0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519209" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519210" version="1" comment="libndr-nbt0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519211" version="1" comment="libndr-nbt0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519212" version="1" comment="libndr-standard0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519213" version="1" comment="libndr-standard0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519214" version="1" comment="libndr0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519215" version="1" comment="libndr0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519216" version="1" comment="libnetapi0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519217" version="1" comment="libnetapi0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519218" version="1" comment="libsamba-credentials0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519219" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519220" version="1" comment="libsamba-errors0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519221" version="1" comment="libsamba-errors0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519222" version="1" comment="libsamba-hostconfig0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519223" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519224" version="1" comment="libsamba-passdb0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519225" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519226" version="1" comment="libsamba-util0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519227" version="1" comment="libsamba-util0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519228" version="1" comment="libsamdb0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519229" version="1" comment="libsamdb0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519230" version="1" comment="libsmbclient0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519231" version="1" comment="libsmbclient0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519232" version="1" comment="libsmbconf0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519233" version="1" comment="libsmbconf0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519234" version="1" comment="libsmbldap0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519235" version="1" comment="libsmbldap0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519236" version="1" comment="libtevent-util0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519237" version="1" comment="libtevent-util0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519238" version="1" comment="libwbclient0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519239" version="1" comment="libwbclient0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519240" version="1" comment="samba is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519241" version="1" comment="samba-client is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519242" version="1" comment="samba-client-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519243" version="1" comment="samba-doc is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519244" version="1" comment="samba-libs is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519245" version="1" comment="samba-libs-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519246" version="1" comment="samba-winbind is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519247" version="1" comment="samba-winbind-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519248" version="1" comment="libzypp is &lt;16.15.3-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519249" version="1" comment="yast2-pkg-bindings is &lt;3.2.4-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519250" version="1" comment="kernel-default is &lt;4.4.82-6.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519251" version="1" comment="kernel-default-devel is &lt;4.4.82-6.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519252" version="1" comment="kernel-default-extra is &lt;4.4.82-6.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519253" version="1" comment="kernel-devel is &lt;4.4.82-6.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519254" version="1" comment="kernel-macros is &lt;4.4.82-6.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519255" version="1" comment="kernel-source is &lt;4.4.82-6.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519256" version="1" comment="kernel-syms is &lt;4.4.82-6.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519257" version="1" comment="libixion-0_12-0 is &lt;0.12.1-13.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519258" version="1" comment="libmwaw-0_3-3 is &lt;0.3.11-7.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519259" version="1" comment="liborcus-0_12-0 is &lt;0.12.1-10.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519260" version="1" comment="libreoffice is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519261" version="1" comment="libreoffice-base is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519262" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519263" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519264" version="1" comment="libreoffice-calc is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519265" version="1" comment="libreoffice-calc-extensions is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519266" version="1" comment="libreoffice-draw is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519267" version="1" comment="libreoffice-filters-optional is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519268" version="1" comment="libreoffice-gnome is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519269" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519270" version="1" comment="libreoffice-icon-theme-tango is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519271" version="1" comment="libreoffice-impress is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519272" version="1" comment="libreoffice-l10n-af is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519273" version="1" comment="libreoffice-l10n-ar is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519274" version="1" comment="libreoffice-l10n-ca is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519275" version="1" comment="libreoffice-l10n-cs is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519276" version="1" comment="libreoffice-l10n-da is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519277" version="1" comment="libreoffice-l10n-de is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519278" version="1" comment="libreoffice-l10n-en is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519279" version="1" comment="libreoffice-l10n-es is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519280" version="1" comment="libreoffice-l10n-fi is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519281" version="1" comment="libreoffice-l10n-fr is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519282" version="1" comment="libreoffice-l10n-gu is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519283" version="1" comment="libreoffice-l10n-hi is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519284" version="1" comment="libreoffice-l10n-hu is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519285" version="1" comment="libreoffice-l10n-it is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519286" version="1" comment="libreoffice-l10n-ja is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519287" version="1" comment="libreoffice-l10n-ko is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519288" version="1" comment="libreoffice-l10n-nb is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519289" version="1" comment="libreoffice-l10n-nl is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519290" version="1" comment="libreoffice-l10n-nn is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519291" version="1" comment="libreoffice-l10n-pl is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519292" version="1" comment="libreoffice-l10n-pt_BR is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519293" version="1" comment="libreoffice-l10n-pt_PT is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519294" version="1" comment="libreoffice-l10n-ro is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519295" version="1" comment="libreoffice-l10n-ru is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519296" version="1" comment="libreoffice-l10n-sk is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519297" version="1" comment="libreoffice-l10n-sv is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519298" version="1" comment="libreoffice-l10n-xh is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519299" version="1" comment="libreoffice-l10n-zh_CN is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519300" version="1" comment="libreoffice-l10n-zh_TW is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519301" version="1" comment="libreoffice-l10n-zu is &lt;5.3.5.2-43.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519302" version="1" comment="libreoffice-mailmerge is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519303" version="1" comment="libreoffice-math is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519304" version="1" comment="libreoffice-officebean is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519305" version="1" comment="libreoffice-pyuno is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519306" version="1" comment="libreoffice-writer is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519307" version="1" comment="libreoffice-writer-extensions is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519308" version="1" comment="libreofficekit is &lt;5.3.5.2-43.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519309" version="1" comment="libstaroffice-0_0-0 is &lt;0.0.3-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519310" version="1" comment="libzmf-0_0-0 is &lt;0.0.1-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519311" version="1" comment="myspell-af_NA is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519312" version="1" comment="myspell-af_ZA is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519313" version="1" comment="myspell-ar is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519314" version="1" comment="myspell-ar_AE is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519315" version="1" comment="myspell-ar_BH is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519316" version="1" comment="myspell-ar_DZ is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519317" version="1" comment="myspell-ar_EG is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519318" version="1" comment="myspell-ar_IQ is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519319" version="1" comment="myspell-ar_JO is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519320" version="1" comment="myspell-ar_KW is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519321" version="1" comment="myspell-ar_LB is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519322" version="1" comment="myspell-ar_LY is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519323" version="1" comment="myspell-ar_MA is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519324" version="1" comment="myspell-ar_OM is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519325" version="1" comment="myspell-ar_QA is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519326" version="1" comment="myspell-ar_SA is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519327" version="1" comment="myspell-ar_SD is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519328" version="1" comment="myspell-ar_SY is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519329" version="1" comment="myspell-ar_TN is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519330" version="1" comment="myspell-ar_YE is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519331" version="1" comment="myspell-be_BY is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519332" version="1" comment="myspell-bg_BG is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519333" version="1" comment="myspell-bn_BD is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519334" version="1" comment="myspell-bn_IN is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519335" version="1" comment="myspell-bs is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519336" version="1" comment="myspell-bs_BA is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519337" version="1" comment="myspell-ca is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519338" version="1" comment="myspell-ca_AD is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519339" version="1" comment="myspell-ca_ES is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519340" version="1" comment="myspell-ca_ES_valencia is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519341" version="1" comment="myspell-ca_FR is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519342" version="1" comment="myspell-ca_IT is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519343" version="1" comment="myspell-cs_CZ is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519344" version="1" comment="myspell-da_DK is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519345" version="1" comment="myspell-de is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519346" version="1" comment="myspell-de_AT is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519347" version="1" comment="myspell-de_CH is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519348" version="1" comment="myspell-de_DE is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519349" version="1" comment="myspell-dictionaries is &lt;20170511-16.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519350" version="1" comment="myspell-el_GR is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519351" version="1" comment="myspell-en is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519352" version="1" comment="myspell-en_AU is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519353" version="1" comment="myspell-en_BS is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519354" version="1" comment="myspell-en_BZ is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519355" version="1" comment="myspell-en_CA is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519356" version="1" comment="myspell-en_GB is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519357" version="1" comment="myspell-en_GH is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519358" version="1" comment="myspell-en_IE is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519359" version="1" comment="myspell-en_IN is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519360" version="1" comment="myspell-en_JM is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519361" version="1" comment="myspell-en_MW is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519362" version="1" comment="myspell-en_NA is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519363" version="1" comment="myspell-en_NZ is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519364" version="1" comment="myspell-en_PH is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519365" version="1" comment="myspell-en_TT is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519366" version="1" comment="myspell-en_US is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519367" version="1" comment="myspell-en_ZA is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519368" version="1" comment="myspell-en_ZW is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519369" version="1" comment="myspell-es is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519370" version="1" comment="myspell-es_AR is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519371" version="1" comment="myspell-es_BO is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519372" version="1" comment="myspell-es_CL is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519373" version="1" comment="myspell-es_CO is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519374" version="1" comment="myspell-es_CR is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519375" version="1" comment="myspell-es_CU is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519376" version="1" comment="myspell-es_DO is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519377" version="1" comment="myspell-es_EC is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519378" version="1" comment="myspell-es_ES is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519379" version="1" comment="myspell-es_GT is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519380" version="1" comment="myspell-es_HN is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519381" version="1" comment="myspell-es_MX is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519382" version="1" comment="myspell-es_NI is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519383" version="1" comment="myspell-es_PA is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519384" version="1" comment="myspell-es_PE is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519385" version="1" comment="myspell-es_PR is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519386" version="1" comment="myspell-es_PY is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519387" version="1" comment="myspell-es_SV is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519388" version="1" comment="myspell-es_UY is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519389" version="1" comment="myspell-es_VE is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519390" version="1" comment="myspell-et_EE is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519391" version="1" comment="myspell-fr_BE is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519392" version="1" comment="myspell-fr_CA is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519393" version="1" comment="myspell-fr_CH is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519394" version="1" comment="myspell-fr_FR is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519395" version="1" comment="myspell-fr_LU is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519396" version="1" comment="myspell-fr_MC is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519397" version="1" comment="myspell-gu_IN is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519398" version="1" comment="myspell-he_IL is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519399" version="1" comment="myspell-hi_IN is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519400" version="1" comment="myspell-hr_HR is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519401" version="1" comment="myspell-hu_HU is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519402" version="1" comment="myspell-it_IT is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519403" version="1" comment="myspell-lightproof-en is &lt;20170511-16.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519404" version="1" comment="myspell-lightproof-hu_HU is &lt;20170511-16.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519405" version="1" comment="myspell-lightproof-pt_BR is &lt;20170511-16.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519406" version="1" comment="myspell-lightproof-ru_RU is &lt;20170511-16.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519407" version="1" comment="myspell-lo_LA is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519408" version="1" comment="myspell-lt_LT is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519409" version="1" comment="myspell-lv_LV is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519410" version="1" comment="myspell-nb_NO is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519411" version="1" comment="myspell-nl_BE is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519412" version="1" comment="myspell-nl_NL is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519413" version="1" comment="myspell-nn_NO is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519414" version="1" comment="myspell-no is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519415" version="1" comment="myspell-pl_PL is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519416" version="1" comment="myspell-pt_AO is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519417" version="1" comment="myspell-pt_BR is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519418" version="1" comment="myspell-pt_PT is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519419" version="1" comment="myspell-ro is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519420" version="1" comment="myspell-ro_RO is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519421" version="1" comment="myspell-ru_RU is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519422" version="1" comment="myspell-sk_SK is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519423" version="1" comment="myspell-sl_SI is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519424" version="1" comment="myspell-sr is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519425" version="1" comment="myspell-sr_CS is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519426" version="1" comment="myspell-sr_Latn_CS is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519427" version="1" comment="myspell-sr_Latn_RS is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519428" version="1" comment="myspell-sr_RS is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519429" version="1" comment="myspell-sv_FI is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519430" version="1" comment="myspell-sv_SE is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519431" version="1" comment="myspell-te is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519432" version="1" comment="myspell-te_IN is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519433" version="1" comment="myspell-th_TH is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519434" version="1" comment="myspell-uk_UA is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519435" version="1" comment="myspell-vi is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519436" version="1" comment="myspell-vi_VN is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519437" version="1" comment="myspell-zu_ZA is &lt;20170511-16.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519438" version="1" comment="xen is &lt;4.9.0_11-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519439" version="1" comment="xen-libs is &lt;4.9.0_11-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519440" version="1" comment="xen-libs-32bit is &lt;4.9.0_11-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519441" version="1" comment="libzypp is &lt;16.15.6-2.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519442" version="1" comment="zypper is &lt;1.13.32-21.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519443" version="1" comment="zypper-log is &lt;1.13.32-21.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519444" version="1" comment="qemu is &lt;2.9.0-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519445" version="1" comment="qemu-block-curl is &lt;2.9.0-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519446" version="1" comment="qemu-ipxe is &lt;1.0.0-6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519447" version="1" comment="qemu-kvm is &lt;2.9.0-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519448" version="1" comment="qemu-seabios is &lt;1.10.2-6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519449" version="1" comment="qemu-sgabios is &lt;8-6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519450" version="1" comment="qemu-tools is &lt;2.9.0-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519451" version="1" comment="qemu-vgabios is &lt;1.10.2-6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519452" version="1" comment="qemu-x86 is &lt;2.9.0-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519453" version="1" comment="xen is &lt;4.9.0_12-3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519454" version="1" comment="xen-libs is &lt;4.9.0_12-3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519455" version="1" comment="xen-libs-32bit is &lt;4.9.0_12-3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519456" version="1" comment="kernel-default is &lt;4.4.82-6.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519457" version="1" comment="kernel-default-devel is &lt;4.4.82-6.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519458" version="1" comment="kernel-default-extra is &lt;4.4.82-6.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519459" version="1" comment="kernel-devel is &lt;4.4.82-6.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519460" version="1" comment="kernel-macros is &lt;4.4.82-6.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519461" version="1" comment="kernel-source is &lt;4.4.82-6.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519462" version="1" comment="kernel-syms is &lt;4.4.82-6.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519463" version="1" comment="libspice-server1 is &lt;0.12.8-3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519464" version="1" comment="libvirt is &lt;3.3.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519465" version="1" comment="libvirt-admin is &lt;3.3.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519466" version="1" comment="libvirt-client is &lt;3.3.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519467" version="1" comment="libvirt-daemon is &lt;3.3.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519468" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519469" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519470" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519471" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519472" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519473" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519474" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519475" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519476" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519477" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519478" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519479" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519480" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519481" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519482" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519483" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519484" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519485" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519486" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519487" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519488" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519489" version="1" comment="libvirt-doc is &lt;3.3.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519490" version="1" comment="libvirt-libs is &lt;3.3.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519491" version="1" comment="libdcerpc-binding0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519492" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519493" version="1" comment="libdcerpc0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519494" version="1" comment="libdcerpc0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519495" version="1" comment="libndr-krb5pac0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519496" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519497" version="1" comment="libndr-nbt0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519498" version="1" comment="libndr-nbt0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519499" version="1" comment="libndr-standard0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519500" version="1" comment="libndr-standard0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519501" version="1" comment="libndr0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519502" version="1" comment="libndr0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519503" version="1" comment="libnetapi0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519504" version="1" comment="libnetapi0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519505" version="1" comment="libsamba-credentials0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519506" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519507" version="1" comment="libsamba-errors0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519508" version="1" comment="libsamba-errors0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519509" version="1" comment="libsamba-hostconfig0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519510" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519511" version="1" comment="libsamba-passdb0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519512" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519513" version="1" comment="libsamba-util0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519514" version="1" comment="libsamba-util0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519515" version="1" comment="libsamdb0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519516" version="1" comment="libsamdb0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519517" version="1" comment="libsmbclient0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519518" version="1" comment="libsmbclient0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519519" version="1" comment="libsmbconf0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519520" version="1" comment="libsmbconf0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519521" version="1" comment="libsmbldap0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519522" version="1" comment="libsmbldap0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519523" version="1" comment="libtevent-util0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519524" version="1" comment="libtevent-util0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519525" version="1" comment="libwbclient0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519526" version="1" comment="libwbclient0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519527" version="1" comment="samba is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519528" version="1" comment="samba-client is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519529" version="1" comment="samba-client-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519530" version="1" comment="samba-doc is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519531" version="1" comment="samba-libs is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519532" version="1" comment="samba-libs-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519533" version="1" comment="samba-winbind is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519534" version="1" comment="samba-winbind-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519535" version="1" comment="xen is &lt;4.9.0_14-3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519536" version="1" comment="xen-libs is &lt;4.9.0_14-3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519537" version="1" comment="xen-libs-32bit is &lt;4.9.0_14-3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519538" version="1" comment="kernel-default is &lt;4.4.92-6.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519539" version="1" comment="kernel-default-devel is &lt;4.4.92-6.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519540" version="1" comment="kernel-default-extra is &lt;4.4.92-6.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519541" version="1" comment="kernel-devel is &lt;4.4.92-6.18.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519542" version="1" comment="kernel-macros is &lt;4.4.92-6.18.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519543" version="1" comment="kernel-source is &lt;4.4.92-6.18.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519544" version="1" comment="kernel-syms is &lt;4.4.92-6.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519545" version="1" comment="libvirt is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519546" version="1" comment="libvirt-admin is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519547" version="1" comment="libvirt-client is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519548" version="1" comment="libvirt-daemon is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519549" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519550" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519551" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519552" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519553" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519554" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519555" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519556" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519557" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519558" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519559" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519560" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519561" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519562" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519563" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519564" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519565" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519566" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519567" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519568" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519569" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519570" version="1" comment="libvirt-doc is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519571" version="1" comment="libvirt-libs is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519572" version="1" comment="qemu is &lt;2.9.1-6.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519573" version="1" comment="qemu-block-curl is &lt;2.9.1-6.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519574" version="1" comment="qemu-ipxe is &lt;1.0.0-6.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519575" version="1" comment="qemu-kvm is &lt;2.9.1-6.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519576" version="1" comment="qemu-seabios is &lt;1.10.2-6.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519577" version="1" comment="qemu-sgabios is &lt;8-6.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519578" version="1" comment="qemu-tools is &lt;2.9.1-6.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519579" version="1" comment="qemu-vgabios is &lt;1.10.2-6.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519580" version="1" comment="qemu-x86 is &lt;2.9.1-6.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519581" version="1" comment="SuSEfirewall2 is &lt;3.6.312.333-3.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519582" version="1" comment="libsss_nss_idmap0 is &lt;1.13.4-34.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519583" version="1" comment="xen is &lt;4.9.1_02-3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519584" version="1" comment="xen-libs is &lt;4.9.1_02-3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519585" version="1" comment="xen-libs-32bit is &lt;4.9.1_02-3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519586" version="1" comment="libdcerpc-binding0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519587" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519588" version="1" comment="libdcerpc0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519589" version="1" comment="libdcerpc0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519590" version="1" comment="libndr-krb5pac0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519591" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519592" version="1" comment="libndr-nbt0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519593" version="1" comment="libndr-nbt0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519594" version="1" comment="libndr-standard0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519595" version="1" comment="libndr-standard0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519596" version="1" comment="libndr0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519597" version="1" comment="libndr0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519598" version="1" comment="libnetapi0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519599" version="1" comment="libnetapi0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519600" version="1" comment="libsamba-credentials0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519601" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519602" version="1" comment="libsamba-errors0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519603" version="1" comment="libsamba-errors0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519604" version="1" comment="libsamba-hostconfig0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519605" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519606" version="1" comment="libsamba-passdb0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519607" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519608" version="1" comment="libsamba-util0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519609" version="1" comment="libsamba-util0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519610" version="1" comment="libsamdb0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519611" version="1" comment="libsamdb0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519612" version="1" comment="libsmbclient0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519613" version="1" comment="libsmbclient0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519614" version="1" comment="libsmbconf0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519615" version="1" comment="libsmbconf0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519616" version="1" comment="libsmbldap0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519617" version="1" comment="libsmbldap0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519618" version="1" comment="libtevent-util0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519619" version="1" comment="libtevent-util0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519620" version="1" comment="libwbclient0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519621" version="1" comment="libwbclient0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519622" version="1" comment="samba is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519623" version="1" comment="samba-client is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519624" version="1" comment="samba-client-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519625" version="1" comment="samba-doc is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519626" version="1" comment="samba-libs is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519627" version="1" comment="samba-libs-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519628" version="1" comment="samba-winbind is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519629" version="1" comment="samba-winbind-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519630" version="1" comment="kernel-default is &lt;4.4.92-6.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519631" version="1" comment="kernel-default-devel is &lt;4.4.92-6.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519632" version="1" comment="kernel-default-extra is &lt;4.4.92-6.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519633" version="1" comment="kernel-devel is &lt;4.4.92-6.30.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519634" version="1" comment="kernel-macros is &lt;4.4.92-6.30.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519635" version="1" comment="kernel-source is &lt;4.4.92-6.30.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519636" version="1" comment="kernel-syms is &lt;4.4.92-6.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519637" version="1" comment="kernel-default is &lt;4.4.103-6.33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519638" version="1" comment="kernel-default-devel is &lt;4.4.103-6.33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519639" version="1" comment="kernel-default-extra is &lt;4.4.103-6.33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519640" version="1" comment="kernel-devel is &lt;4.4.103-6.33.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519641" version="1" comment="kernel-macros is &lt;4.4.103-6.33.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519642" version="1" comment="kernel-source is &lt;4.4.103-6.33.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519643" version="1" comment="kernel-syms is &lt;4.4.103-6.33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519644" version="1" comment="xdg-utils is &lt;20140630-6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519645" version="1" comment="libzzip-0-13 is &lt;0.13.67-10.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519646" version="1" comment="glibc is &lt;2.22-62.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519647" version="1" comment="glibc-32bit is &lt;2.22-62.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519648" version="1" comment="glibc-devel is &lt;2.22-62.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519649" version="1" comment="glibc-devel-32bit is &lt;2.22-62.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519650" version="1" comment="glibc-i18ndata is &lt;2.22-62.13.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519651" version="1" comment="glibc-locale is &lt;2.22-62.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519652" version="1" comment="glibc-locale-32bit is &lt;2.22-62.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519653" version="1" comment="nscd is &lt;2.22-62.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519654" version="1" comment="libvorbis0 is &lt;1.3.3-10.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519655" version="1" comment="libvorbis0-32bit is &lt;1.3.3-10.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519656" version="1" comment="libvorbisenc2 is &lt;1.3.3-10.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519657" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-10.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519658" version="1" comment="libvorbisfile3 is &lt;1.3.3-10.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519659" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-10.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519660" version="1" comment="kernel-firmware is &lt;20170530-21.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519661" version="1" comment="ucode-amd is &lt;20170530-21.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519662" version="1" comment="libpoppler-glib8 is &lt;0.43.0-16.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519663" version="1" comment="libpoppler-qt4-4 is &lt;0.43.0-16.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519664" version="1" comment="libpoppler60 is &lt;0.43.0-16.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519665" version="1" comment="poppler-tools is &lt;0.43.0-16.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519666" version="1" comment="ucode-intel is &lt;20180425-13.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519667" version="1" comment="libdcerpc-binding0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519668" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519669" version="1" comment="libdcerpc0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519670" version="1" comment="libdcerpc0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519671" version="1" comment="libndr-krb5pac0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519672" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519673" version="1" comment="libndr-nbt0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519674" version="1" comment="libndr-nbt0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519675" version="1" comment="libndr-standard0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519676" version="1" comment="libndr-standard0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519677" version="1" comment="libndr0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519678" version="1" comment="libndr0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519679" version="1" comment="libnetapi0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519680" version="1" comment="libnetapi0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519681" version="1" comment="libsamba-credentials0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519682" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519683" version="1" comment="libsamba-errors0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519684" version="1" comment="libsamba-errors0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519685" version="1" comment="libsamba-hostconfig0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519686" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519687" version="1" comment="libsamba-passdb0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519688" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519689" version="1" comment="libsamba-util0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519690" version="1" comment="libsamba-util0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519691" version="1" comment="libsamdb0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519692" version="1" comment="libsamdb0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519693" version="1" comment="libsmbclient0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519694" version="1" comment="libsmbclient0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519695" version="1" comment="libsmbconf0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519696" version="1" comment="libsmbconf0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519697" version="1" comment="libsmbldap0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519698" version="1" comment="libsmbldap0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519699" version="1" comment="libtevent-util0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519700" version="1" comment="libtevent-util0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519701" version="1" comment="libwbclient0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519702" version="1" comment="libwbclient0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519703" version="1" comment="samba is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519704" version="1" comment="samba-client is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519705" version="1" comment="samba-client-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519706" version="1" comment="samba-doc is &lt;4.6.14+git.150.1540e575faf-3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519707" version="1" comment="samba-libs is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519708" version="1" comment="samba-libs-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519709" version="1" comment="samba-winbind is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519710" version="1" comment="samba-winbind-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519711" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.171-27.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519712" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.171-27.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519713" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.181-43.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519714" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.181-43.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519715" version="1" comment="libecpg6 is &lt;9.6.9-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519716" version="1" comment="libpq5 is &lt;9.6.9-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519717" version="1" comment="libpq5-32bit is &lt;9.6.9-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519718" version="1" comment="postgresql96 is &lt;9.6.9-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519719" version="1" comment="gpg2 is &lt;2.0.24-9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519720" version="1" comment="gpg2-lang is &lt;2.0.24-9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519721" version="1" comment="ntp is &lt;4.2.8p11-64.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519722" version="1" comment="ntp-doc is &lt;4.2.8p11-64.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519723" version="1" comment="bluez is &lt;5.13-5.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519724" version="1" comment="bluez-cups is &lt;5.13-5.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519725" version="1" comment="libbluetooth3 is &lt;5.13-5.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519726" version="1" comment="kernel-default is &lt;4.4.138-94.39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519727" version="1" comment="kernel-default-devel is &lt;4.4.138-94.39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519728" version="1" comment="kernel-default-extra is &lt;4.4.138-94.39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519729" version="1" comment="kernel-devel is &lt;4.4.138-94.39.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519730" version="1" comment="kernel-macros is &lt;4.4.138-94.39.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519731" version="1" comment="kernel-source is &lt;4.4.138-94.39.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519732" version="1" comment="kernel-syms is &lt;4.4.138-94.39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519733" version="1" comment="kernel-default is &lt;4.4.103-6.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519734" version="1" comment="kernel-default-devel is &lt;4.4.103-6.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519735" version="1" comment="kernel-default-extra is &lt;4.4.103-6.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519736" version="1" comment="kernel-devel is &lt;4.4.103-6.38.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519737" version="1" comment="kernel-macros is &lt;4.4.103-6.38.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519738" version="1" comment="kernel-source is &lt;4.4.103-6.38.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519739" version="1" comment="kernel-syms is &lt;4.4.103-6.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519740" version="1" comment="libmysqlclient18 is &lt;10.0.35-29.20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519741" version="1" comment="libmysqlclient18-32bit is &lt;10.0.35-29.20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519742" version="1" comment="libmysqlclient_r18 is &lt;10.0.35-29.20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519743" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.35-29.20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519744" version="1" comment="mariadb is &lt;10.0.35-29.20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519745" version="1" comment="mariadb-client is &lt;10.0.35-29.20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519746" version="1" comment="mariadb-errormessages is &lt;10.0.35-29.20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519747" version="1" comment="MozillaFirefox is &lt;52.8.1esr-109.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519748" version="1" comment="MozillaFirefox-translations is &lt;52.8.1esr-109.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519749" version="1" comment="libtiff5 is &lt;4.0.9-44.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519750" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519751" version="1" comment="unixODBC is &lt;2.3.6-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519752" version="1" comment="unixODBC-32bit is &lt;2.3.6-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519753" version="1" comment="libprocps3 is &lt;3.3.9-11.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519754" version="1" comment="procps is &lt;3.3.9-11.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519755" version="1" comment="ImageMagick is &lt;6.8.8.1-71.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519756" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519757" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519758" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519759" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519760" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519761" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519762" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519763" version="1" comment="openssl is &lt;1.0.2j-60.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519764" version="1" comment="libQtWebKit4 is &lt;4.8.7+2.3.4-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519765" version="1" comment="libQtWebKit4-32bit is &lt;4.8.7+2.3.4-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519766" version="1" comment="libqca2 is &lt;2.0.3-17.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519767" version="1" comment="libqca2-32bit is &lt;2.0.3-17.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519768" version="1" comment="libqt4 is &lt;4.8.7-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519769" version="1" comment="libqt4-32bit is &lt;4.8.7-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519770" version="1" comment="libqt4-qt3support is &lt;4.8.7-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519771" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.7-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519772" version="1" comment="libqt4-sql is &lt;4.8.7-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519773" version="1" comment="libqt4-sql-32bit is &lt;4.8.7-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519774" version="1" comment="libqt4-sql-mysql is &lt;4.8.7-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519775" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.7-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519776" version="1" comment="libqt4-sql-postgresql is &lt;4.8.7-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519777" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.7-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519778" version="1" comment="libqt4-sql-sqlite is &lt;4.8.7-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519779" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.7-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519780" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.7-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519781" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.7-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519782" version="1" comment="libqt4-x11 is &lt;4.8.7-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519783" version="1" comment="libqt4-x11-32bit is &lt;4.8.7-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519784" version="1" comment="qt4-qtscript is &lt;0.2.0-11.2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519785" version="1" comment="ucode-intel is &lt;20180703-13.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519786" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-19.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519787" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-19.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519788" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-19.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519789" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-19.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519790" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-19.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519791" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-19.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519792" version="1" comment="perl is &lt;5.18.2-12.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519793" version="1" comment="perl-32bit is &lt;5.18.2-12.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519794" version="1" comment="perl-base is &lt;5.18.2-12.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519795" version="1" comment="perl-doc is &lt;5.18.2-12.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519796" version="1" comment="shadow is &lt;4.2.1-27.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519797" version="1" comment="openssh is &lt;7.2p2-74.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519798" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519799" version="1" comment="openssh-helpers is &lt;7.2p2-74.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519800" version="1" comment="rsyslog is &lt;8.24.0-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519801" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519802" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519803" version="1" comment="python is &lt;2.7.13-28.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519804" version="1" comment="python-base is &lt;2.7.13-28.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519805" version="1" comment="python-curses is &lt;2.7.13-28.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519806" version="1" comment="python-devel is &lt;2.7.13-28.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519807" version="1" comment="python-tk is &lt;2.7.13-28.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519808" version="1" comment="python-xml is &lt;2.7.13-28.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519809" version="1" comment="kernel-default is &lt;4.4.140-94.42.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519810" version="1" comment="kernel-default-devel is &lt;4.4.140-94.42.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519811" version="1" comment="kernel-default-extra is &lt;4.4.140-94.42.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519812" version="1" comment="kernel-devel is &lt;4.4.140-94.42.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519813" version="1" comment="kernel-macros is &lt;4.4.140-94.42.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519814" version="1" comment="kernel-source is &lt;4.4.140-94.42.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519815" version="1" comment="kernel-syms is &lt;4.4.140-94.42.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519816" version="1" comment="gnome-shell-search-provider-nautilus is &lt;3.20.3-23.3.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519817" version="1" comment="libnautilus-extension1 is &lt;3.20.3-23.3.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519818" version="1" comment="libnautilus-extension1-32bit is &lt;3.20.3-23.3.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519819" version="1" comment="nautilus is &lt;3.20.3-23.3.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519820" version="1" comment="nautilus-lang is &lt;3.20.3-23.3.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519821" version="1" comment="xen is &lt;4.9.2_08-3.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519822" version="1" comment="xen-libs is &lt;4.9.2_08-3.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519823" version="1" comment="xen-libs-32bit is &lt;4.9.2_08-3.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519824" version="1" comment="libblkid1 is &lt;2.29.2-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519825" version="1" comment="libblkid1-32bit is &lt;2.29.2-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519826" version="1" comment="libfdisk1 is &lt;2.29.2-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519827" version="1" comment="libmount1 is &lt;2.29.2-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519828" version="1" comment="libmount1-32bit is &lt;2.29.2-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519829" version="1" comment="libsmartcols1 is &lt;2.29.2-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519830" version="1" comment="libuuid-devel is &lt;2.29.2-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519831" version="1" comment="libuuid1 is &lt;2.29.2-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519832" version="1" comment="libuuid1-32bit is &lt;2.29.2-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519833" version="1" comment="python-libmount is &lt;2.29.2-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519834" version="1" comment="util-linux is &lt;2.29.2-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519835" version="1" comment="util-linux-lang is &lt;2.29.2-3.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519836" version="1" comment="util-linux-systemd is &lt;2.29.2-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519837" version="1" comment="uuidd is &lt;2.29.2-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519838" version="1" comment="libsndfile1 is &lt;1.0.25-36.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519839" version="1" comment="libsndfile1-32bit is &lt;1.0.25-36.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519840" version="1" comment="libofx is &lt;0.9.9-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519841" version="1" comment="libofx6 is &lt;0.9.9-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519842" version="1" comment="libgcrypt20 is &lt;1.6.1-16.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519843" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519844" version="1" comment="mutt is &lt;1.10.1-55.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519845" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-19.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519846" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-19.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519847" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-19.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519848" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-19.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519849" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-19.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519850" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-19.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519851" version="1" comment="libcgroup1 is &lt;0.41.rc1-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519852" version="1" comment="libpolkit0 is &lt;0.113-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519853" version="1" comment="libpolkit0-32bit is &lt;0.113-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519854" version="1" comment="polkit is &lt;0.113-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519855" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519856" version="1" comment="cups is &lt;1.7.5-20.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519857" version="1" comment="cups-client is &lt;1.7.5-20.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519858" version="1" comment="cups-libs is &lt;1.7.5-20.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519859" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519860" version="1" comment="libtirpc-netconfig is &lt;1.0.1-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519861" version="1" comment="libtirpc3 is &lt;1.0.1-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519862" version="1" comment="libtirpc3-32bit is &lt;1.0.1-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519863" version="1" comment="ceph-common is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519864" version="1" comment="libcephfs2 is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519865" version="1" comment="librados2 is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519866" version="1" comment="libradosstriper1 is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519867" version="1" comment="librbd1 is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519868" version="1" comment="librgw2 is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519869" version="1" comment="python-cephfs is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519870" version="1" comment="python-rados is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519871" version="1" comment="python-rbd is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519872" version="1" comment="python-rgw is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519873" version="1" comment="libsoup-2_4-1 is &lt;2.62.2-5.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519874" version="1" comment="libsoup-2_4-1-32bit is &lt;2.62.2-5.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519875" version="1" comment="libsoup-lang is &lt;2.62.2-5.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519876" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.62.2-5.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519877" version="1" comment="NetworkManager-vpnc is &lt;1.0.8-8.4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519878" version="1" comment="NetworkManager-vpnc-gnome is &lt;1.0.8-8.4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519879" version="1" comment="NetworkManager-vpnc-lang is &lt;1.0.8-8.4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519880" version="1" comment="libvirt is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519881" version="1" comment="libvirt-admin is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519882" version="1" comment="libvirt-client is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519883" version="1" comment="libvirt-daemon is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519884" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519885" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519886" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519887" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519888" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519889" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519890" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519891" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519892" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519893" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519894" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519895" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519896" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519897" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519898" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519899" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519900" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519901" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519902" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519903" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519904" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519905" version="1" comment="libvirt-doc is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519906" version="1" comment="libvirt-libs is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519907" version="1" comment="libdcerpc-binding0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519908" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519909" version="1" comment="libdcerpc0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519910" version="1" comment="libdcerpc0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519911" version="1" comment="libndr-krb5pac0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519912" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519913" version="1" comment="libndr-nbt0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519914" version="1" comment="libndr-nbt0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519915" version="1" comment="libndr-standard0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519916" version="1" comment="libndr-standard0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519917" version="1" comment="libndr0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519918" version="1" comment="libndr0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519919" version="1" comment="libnetapi0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519920" version="1" comment="libnetapi0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519921" version="1" comment="libsamba-credentials0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519922" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519923" version="1" comment="libsamba-errors0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519924" version="1" comment="libsamba-errors0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519925" version="1" comment="libsamba-hostconfig0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519926" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519927" version="1" comment="libsamba-passdb0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519928" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519929" version="1" comment="libsamba-util0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519930" version="1" comment="libsamba-util0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519931" version="1" comment="libsamdb0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519932" version="1" comment="libsamdb0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519933" version="1" comment="libsmbclient0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519934" version="1" comment="libsmbclient0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519935" version="1" comment="libsmbconf0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519936" version="1" comment="libsmbconf0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519937" version="1" comment="libsmbldap0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519938" version="1" comment="libsmbldap0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519939" version="1" comment="libtevent-util0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519940" version="1" comment="libtevent-util0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519941" version="1" comment="libwbclient0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519942" version="1" comment="libwbclient0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519943" version="1" comment="samba is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519944" version="1" comment="samba-client is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519945" version="1" comment="samba-client-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519946" version="1" comment="samba-doc is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519947" version="1" comment="samba-libs is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519948" version="1" comment="samba-libs-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519949" version="1" comment="samba-winbind is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519950" version="1" comment="samba-winbind-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519951" version="1" comment="MozillaFirefox is &lt;52.9.0esr-109.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519952" version="1" comment="MozillaFirefox-translations is &lt;52.9.0esr-109.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519953" version="1" comment="clamav is &lt;0.100.1-33.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519954" version="1" comment="kernel-default is &lt;4.4.143-94.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519955" version="1" comment="kernel-default-devel is &lt;4.4.143-94.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519956" version="1" comment="kernel-default-extra is &lt;4.4.143-94.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519957" version="1" comment="kernel-devel is &lt;4.4.143-94.47.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519958" version="1" comment="kernel-macros is &lt;4.4.143-94.47.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519959" version="1" comment="kernel-source is &lt;4.4.143-94.47.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519960" version="1" comment="kernel-syms is &lt;4.4.143-94.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519961" version="1" comment="ucode-intel is &lt;20180807-13.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519962" version="1" comment="libblkid1 is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519963" version="1" comment="libblkid1-32bit is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519964" version="1" comment="libfdisk1 is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519965" version="1" comment="libmount1 is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519966" version="1" comment="libmount1-32bit is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519967" version="1" comment="libsmartcols1 is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519968" version="1" comment="libuuid-devel is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519969" version="1" comment="libuuid1 is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519970" version="1" comment="libuuid1-32bit is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519971" version="1" comment="python-libmount is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519972" version="1" comment="util-linux is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519973" version="1" comment="util-linux-lang is &lt;2.29.2-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519974" version="1" comment="util-linux-systemd is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519975" version="1" comment="uuidd is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519976" version="1" comment="perl-Archive-Zip is &lt;1.34-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519977" version="1" comment="xen is &lt;4.9.2_10-3.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519978" version="1" comment="xen-libs is &lt;4.9.2_10-3.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519979" version="1" comment="xen-libs-32bit is &lt;4.9.2_10-3.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519980" version="1" comment="libprocps3 is &lt;3.3.9-11.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519981" version="1" comment="procps is &lt;3.3.9-11.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519982" version="1" comment="libgcrypt20 is &lt;1.6.1-16.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519983" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519984" version="1" comment="libcgroup1 is &lt;0.41.rc1-10.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519985" version="1" comment="libpodofo0_9_2 is &lt;0.9.2-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519986" version="1" comment="libreoffice is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519987" version="1" comment="libreoffice-base is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519988" version="1" comment="libreoffice-base-drivers-mysql is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519989" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519990" version="1" comment="libreoffice-branding-upstream is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519991" version="1" comment="libreoffice-calc is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519992" version="1" comment="libreoffice-calc-extensions is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519993" version="1" comment="libreoffice-draw is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519994" version="1" comment="libreoffice-filters-optional is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519995" version="1" comment="libreoffice-gnome is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519996" version="1" comment="libreoffice-gtk2 is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519997" version="1" comment="libreoffice-icon-themes is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519998" version="1" comment="libreoffice-impress is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519999" version="1" comment="libreoffice-l10n-af is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520000" version="1" comment="libreoffice-l10n-ar is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520001" version="1" comment="libreoffice-l10n-ca is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520002" version="1" comment="libreoffice-l10n-cs is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520003" version="1" comment="libreoffice-l10n-da is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520004" version="1" comment="libreoffice-l10n-de is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520005" version="1" comment="libreoffice-l10n-en is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520006" version="1" comment="libreoffice-l10n-es is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520007" version="1" comment="libreoffice-l10n-fi is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520008" version="1" comment="libreoffice-l10n-fr is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520009" version="1" comment="libreoffice-l10n-gu is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520010" version="1" comment="libreoffice-l10n-hi is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520011" version="1" comment="libreoffice-l10n-hu is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520012" version="1" comment="libreoffice-l10n-it is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520013" version="1" comment="libreoffice-l10n-ja is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520014" version="1" comment="libreoffice-l10n-ko is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520015" version="1" comment="libreoffice-l10n-nb is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520016" version="1" comment="libreoffice-l10n-nl is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520017" version="1" comment="libreoffice-l10n-nn is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520018" version="1" comment="libreoffice-l10n-pl is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520019" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520020" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520021" version="1" comment="libreoffice-l10n-ro is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520022" version="1" comment="libreoffice-l10n-ru is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520023" version="1" comment="libreoffice-l10n-sk is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520024" version="1" comment="libreoffice-l10n-sv is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520025" version="1" comment="libreoffice-l10n-xh is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520026" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520027" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520028" version="1" comment="libreoffice-l10n-zu is &lt;6.0.5.2-43.38.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520029" version="1" comment="libreoffice-mailmerge is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520030" version="1" comment="libreoffice-math is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520031" version="1" comment="libreoffice-officebean is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520032" version="1" comment="libreoffice-pyuno is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520033" version="1" comment="libreoffice-writer is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520034" version="1" comment="libreoffice-writer-extensions is &lt;6.0.5.2-43.38.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520035" version="1" comment="gdm is &lt;3.10.0.1-54.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520036" version="1" comment="gdm-lang is &lt;3.10.0.1-54.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520037" version="1" comment="gdmflexiserver is &lt;3.10.0.1-54.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520038" version="1" comment="libgdm1 is &lt;3.10.0.1-54.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520039" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-54.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520040" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.33-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520041" version="1" comment="libspice-client-glib-helper is &lt;0.33-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520042" version="1" comment="libspice-client-gtk-3_0-5 is &lt;0.33-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520043" version="1" comment="libspice-controller0 is &lt;0.33-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520044" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.33-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520045" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.33-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520046" version="1" comment="libspice-server1 is &lt;0.12.8-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520047" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-106.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520048" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-106.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520049" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520050" version="1" comment="python3 is &lt;3.4.6-25.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520051" version="1" comment="python3-base is &lt;3.4.6-25.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520052" version="1" comment="python3-curses is &lt;3.4.6-25.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520053" version="1" comment="curl is &lt;7.37.0-37.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520054" version="1" comment="libcurl4 is &lt;7.37.0-37.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520055" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520056" version="1" comment="kernel-default is &lt;4.4.155-94.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520057" version="1" comment="kernel-default-devel is &lt;4.4.155-94.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520058" version="1" comment="kernel-default-extra is &lt;4.4.155-94.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520059" version="1" comment="kernel-devel is &lt;4.4.155-94.50.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520060" version="1" comment="kernel-macros is &lt;4.4.155-94.50.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520061" version="1" comment="kernel-source is &lt;4.4.155-94.50.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520062" version="1" comment="kernel-syms is &lt;4.4.155-94.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520063" version="1" comment="openslp is &lt;2.0.0-18.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520064" version="1" comment="openslp-32bit is &lt;2.0.0-18.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520065" version="1" comment="ImageMagick is &lt;6.8.8.1-71.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520066" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520067" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520068" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520069" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520070" version="1" comment="liblouis-data is &lt;2.6.4-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520071" version="1" comment="liblouis9 is &lt;2.6.4-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520072" version="1" comment="python3-louis is &lt;2.6.4-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520073" version="1" comment="libzypp is &lt;16.17.20-2.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520074" version="1" comment="zypper is &lt;1.13.45-21.21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520075" version="1" comment="zypper-log is &lt;1.13.45-21.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520076" version="1" comment="libXcursor1 is &lt;1.1.14-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520077" version="1" comment="libXcursor1-32bit is &lt;1.1.14-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520078" version="1" comment="libtiff5 is &lt;4.0.9-44.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520079" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520080" version="1" comment="gnutls is &lt;3.3.27-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520081" version="1" comment="libgnutls28 is &lt;3.3.27-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520082" version="1" comment="libgnutls28-32bit is &lt;3.3.27-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520083" version="1" comment="gd is &lt;2.1.0-24.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520084" version="1" comment="gd-32bit is &lt;2.1.0-24.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520085" version="1" comment="shadow is &lt;4.2.1-27.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520086" version="1" comment="libvirt is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520087" version="1" comment="libvirt-admin is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520088" version="1" comment="libvirt-client is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520089" version="1" comment="libvirt-daemon is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520090" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520091" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520092" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520093" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520094" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520095" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520096" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520097" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520098" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520099" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520100" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520101" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520102" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520103" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520104" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520105" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520106" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520107" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520108" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520109" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520110" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520111" version="1" comment="libvirt-doc is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520112" version="1" comment="libvirt-libs is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520113" version="1" comment="libwireshark9 is &lt;2.4.9-48.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520114" version="1" comment="libwiretap7 is &lt;2.4.9-48.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520115" version="1" comment="libwscodecs1 is &lt;2.4.9-48.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520116" version="1" comment="libwsutil8 is &lt;2.4.9-48.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520117" version="1" comment="wireshark is &lt;2.4.9-48.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520118" version="1" comment="wireshark-gtk is &lt;2.4.9-48.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520119" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520120" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520121" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520122" version="1" comment="openssl is &lt;1.0.2j-60.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520123" version="1" comment="unzip is &lt;6.00-33.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520124" version="1" comment="ghostscript is &lt;9.25-23.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520125" version="1" comment="ghostscript-x11 is &lt;9.25-23.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520126" version="1" comment="g3utils is &lt;1.1.36-58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520127" version="1" comment="mgetty is &lt;1.1.36-58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520128" version="1" comment="openslp is &lt;2.0.0-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520129" version="1" comment="openslp-32bit is &lt;2.0.0-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520130" version="1" comment="kernel-default is &lt;4.4.156-94.57.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520131" version="1" comment="kernel-default-devel is &lt;4.4.156-94.57.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520132" version="1" comment="kernel-default-extra is &lt;4.4.156-94.57.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520133" version="1" comment="kernel-devel is &lt;4.4.156-94.57.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520134" version="1" comment="kernel-macros is &lt;4.4.156-94.57.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520135" version="1" comment="kernel-source is &lt;4.4.156-94.57.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520136" version="1" comment="kernel-syms is &lt;4.4.156-94.57.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520137" version="1" comment="libtasn1 is &lt;4.9-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520138" version="1" comment="libtasn1-6 is &lt;4.9-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520139" version="1" comment="libtasn1-6-32bit is &lt;4.9-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520140" version="1" comment="libkpathsea6 is &lt;6.2.0dev-22.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520141" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.181-27.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520142" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.181-27.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520143" version="1" comment="cups-filters is &lt;1.0.58-19.2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520144" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-19.2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520145" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-19.2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520146" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-19.2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520147" version="1" comment="libqpdf18 is &lt;7.1.1-3.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520148" version="1" comment="libSoundTouch0 is &lt;1.7.1-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520149" version="1" comment="libSoundTouch0-32bit is &lt;1.7.1-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520150" version="1" comment="soundtouch is &lt;1.7.1-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520151" version="1" comment="libecpg6 is &lt;10.5-1.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520152" version="1" comment="libpq5 is &lt;10.5-1.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520153" version="1" comment="libpq5-32bit is &lt;10.5-1.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520154" version="1" comment="postgresql10 is &lt;10.5-1.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520155" version="1" comment="libxml2-2 is &lt;2.9.4-46.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520156" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520157" version="1" comment="libxml2-tools is &lt;2.9.4-46.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520158" version="1" comment="python-libxml2 is &lt;2.9.4-46.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520159" version="1" comment="ImageMagick is &lt;6.8.8.1-71.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520160" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520161" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520162" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520163" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520164" version="1" comment="libX11-6 is &lt;1.6.2-12.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520165" version="1" comment="libX11-6-32bit is &lt;1.6.2-12.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520166" version="1" comment="libX11-data is &lt;1.6.2-12.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520167" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520168" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-12.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520169" version="1" comment="libxcb-dri2-0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520170" version="1" comment="libxcb-dri2-0-32bit is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520171" version="1" comment="libxcb-dri3-0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520172" version="1" comment="libxcb-dri3-0-32bit is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520173" version="1" comment="libxcb-glx0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520174" version="1" comment="libxcb-glx0-32bit is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520175" version="1" comment="libxcb-present0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520176" version="1" comment="libxcb-present0-32bit is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520177" version="1" comment="libxcb-randr0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520178" version="1" comment="libxcb-render0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520179" version="1" comment="libxcb-render0-32bit is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520180" version="1" comment="libxcb-shape0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520181" version="1" comment="libxcb-shm0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520182" version="1" comment="libxcb-shm0-32bit is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520183" version="1" comment="libxcb-sync1 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520184" version="1" comment="libxcb-sync1-32bit is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520185" version="1" comment="libxcb-xf86dri0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520186" version="1" comment="libxcb-xfixes0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520187" version="1" comment="libxcb-xfixes0-32bit is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520188" version="1" comment="libxcb-xinerama0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520189" version="1" comment="libxcb-xkb1 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520190" version="1" comment="libxcb-xkb1-32bit is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520191" version="1" comment="libxcb-xv0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520192" version="1" comment="libxcb1 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520193" version="1" comment="libxcb1-32bit is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520194" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520195" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520196" version="1" comment="libdcerpc0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520197" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520198" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520199" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520200" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520201" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520202" version="1" comment="libndr-standard0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520203" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520204" version="1" comment="libndr0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520205" version="1" comment="libndr0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520206" version="1" comment="libnetapi0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520207" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520208" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520209" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520210" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520211" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520212" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520213" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520214" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520215" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520216" version="1" comment="libsamba-util0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520217" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520218" version="1" comment="libsamdb0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520219" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520220" version="1" comment="libsmbclient0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520221" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520222" version="1" comment="libsmbconf0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520223" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520224" version="1" comment="libsmbldap0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520225" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520226" version="1" comment="libtevent-util0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520227" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520228" version="1" comment="libwbclient0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520229" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520230" version="1" comment="samba is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520231" version="1" comment="samba-client is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520232" version="1" comment="samba-client-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520233" version="1" comment="samba-doc is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520234" version="1" comment="samba-libs is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520235" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520236" version="1" comment="samba-winbind is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520237" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520238" version="1" comment="ImageMagick is &lt;6.8.8.1-71.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520239" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520240" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520241" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520242" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520243" version="1" comment="binutils is &lt;2.31-9.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520244" version="1" comment="fuse is &lt;2.9.3-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520245" version="1" comment="libfuse2 is &lt;2.9.3-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520246" version="1" comment="libssh4 is &lt;0.6.3-12.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520247" version="1" comment="libXdmcp6 is &lt;1.1.1-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520248" version="1" comment="libXdmcp6-32bit is &lt;1.1.1-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520249" version="1" comment="libICE6 is &lt;1.0.8-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520250" version="1" comment="libICE6-32bit is &lt;1.0.8-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520251" version="1" comment="rpm is &lt;4.11.2-16.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520252" version="1" comment="rpm-32bit is &lt;4.11.2-16.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520253" version="1" comment="rpm-build is &lt;4.11.2-16.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520254" version="1" comment="rpm-python is &lt;4.11.2-16.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520255" version="1" comment="libtiff5 is &lt;4.0.9-44.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520256" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520257" version="1" comment="pam_pkcs11 is &lt;0.6.8-7.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520258" version="1" comment="pam_pkcs11-32bit is &lt;0.6.8-7.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520259" version="1" comment="libjasper1 is &lt;1.900.14-195.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520260" version="1" comment="libjasper1-32bit is &lt;1.900.14-195.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520261" version="1" comment="libraw9 is &lt;0.15.4-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520262" version="1" comment="ntp is &lt;4.2.8p12-64.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520263" version="1" comment="ntp-doc is &lt;4.2.8p12-64.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520264" version="1" comment="libzzip-0-13 is &lt;0.13.67-10.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520265" version="1" comment="postgresql96 is &lt;9.6.10-3.22.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520266" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.20.3-2.23.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520267" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.20.3-2.23.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520268" version="1" comment="libwebkit2gtk3-lang is &lt;2.20.3-2.23.8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520269" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.20.3-2.23.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520270" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.20.3-2.23.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520271" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.20.3-2.23.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520272" version="1" comment="libexempi3 is &lt;2.2.1-5.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520273" version="1" comment="clamav is &lt;0.100.2-33.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520274" version="1" comment="libsnmp30 is &lt;5.7.3-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520275" version="1" comment="libsnmp30-32bit is &lt;5.7.3-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520276" version="1" comment="net-snmp is &lt;5.7.3-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520277" version="1" comment="perl-SNMP is &lt;5.7.3-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520278" version="1" comment="snmp-mibs is &lt;5.7.3-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520279" version="1" comment="ImageMagick is &lt;6.8.8.1-71.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520280" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520281" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520282" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520283" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520284" version="1" comment="xen is &lt;4.9.3_03-3.44.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520285" version="1" comment="xen-libs is &lt;4.9.3_03-3.44.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520286" version="1" comment="xen-libs-32bit is &lt;4.9.3_03-3.44.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520287" version="1" comment="lcms2 is &lt;2.7-9.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520288" version="1" comment="liblcms2-2 is &lt;2.7-9.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520289" version="1" comment="liblcms2-2-32bit is &lt;2.7-9.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520290" version="1" comment="qemu is &lt;2.9.1-6.19.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520291" version="1" comment="qemu-block-curl is &lt;2.9.1-6.19.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520292" version="1" comment="qemu-ipxe is &lt;1.0.0-6.19.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520293" version="1" comment="qemu-kvm is &lt;2.9.1-6.19.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520294" version="1" comment="qemu-seabios is &lt;1.10.2-6.19.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520295" version="1" comment="qemu-sgabios is &lt;8-6.19.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520296" version="1" comment="qemu-tools is &lt;2.9.1-6.19.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520297" version="1" comment="qemu-vgabios is &lt;1.10.2-6.19.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520298" version="1" comment="qemu-x86 is &lt;2.9.1-6.19.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520299" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520300" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520301" version="1" comment="python is &lt;2.7.13-28.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520302" version="1" comment="python-base is &lt;2.7.13-28.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520303" version="1" comment="python-curses is &lt;2.7.13-28.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520304" version="1" comment="python-devel is &lt;2.7.13-28.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520305" version="1" comment="python-tk is &lt;2.7.13-28.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520306" version="1" comment="python-xml is &lt;2.7.13-28.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520307" version="1" comment="audiofile is &lt;0.3.6-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520308" version="1" comment="libaudiofile1 is &lt;0.3.6-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520309" version="1" comment="libaudiofile1-32bit is &lt;0.3.6-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520310" version="1" comment="libntfs-3g84 is &lt;2013.1.13-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520311" version="1" comment="ntfs-3g is &lt;2013.1.13-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520312" version="1" comment="ntfsprogs is &lt;2013.1.13-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520313" version="1" comment="libwireshark9 is &lt;2.4.10-48.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520314" version="1" comment="libwiretap7 is &lt;2.4.10-48.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520315" version="1" comment="libwscodecs1 is &lt;2.4.10-48.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520316" version="1" comment="libwsutil8 is &lt;2.4.10-48.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520317" version="1" comment="wireshark is &lt;2.4.10-48.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520318" version="1" comment="wireshark-gtk is &lt;2.4.10-48.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520319" version="1" comment="MozillaFirefox is &lt;60.2.2esr-109.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520320" version="1" comment="MozillaFirefox-branding-SLE is &lt;60-32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520321" version="1" comment="MozillaFirefox-translations-common is &lt;60.2.2esr-109.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520322" version="1" comment="libfreebl3 is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520323" version="1" comment="libfreebl3-32bit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520324" version="1" comment="libsoftokn3 is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520325" version="1" comment="libsoftokn3-32bit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520326" version="1" comment="mozilla-nspr is &lt;4.19-19.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520327" version="1" comment="mozilla-nspr-32bit is &lt;4.19-19.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520328" version="1" comment="mozilla-nss is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520329" version="1" comment="mozilla-nss-32bit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520330" version="1" comment="mozilla-nss-certs is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520331" version="1" comment="mozilla-nss-certs-32bit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520332" version="1" comment="mozilla-nss-sysinit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520333" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520334" version="1" comment="mozilla-nss-tools is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520335" version="1" comment="curl is &lt;7.37.0-37.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520336" version="1" comment="libcurl4 is &lt;7.37.0-37.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520337" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520338" version="1" comment="libSoundTouch0 is &lt;1.7.1-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520339" version="1" comment="libSoundTouch0-32bit is &lt;1.7.1-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520340" version="1" comment="soundtouch is &lt;1.7.1-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520341" version="1" comment="opensc is &lt;0.13.0-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520342" version="1" comment="libarchive13 is &lt;3.1.2-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520343" version="1" comment="kernel-default is &lt;4.4.162-94.69.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520344" version="1" comment="kernel-default-devel is &lt;4.4.162-94.69.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520345" version="1" comment="kernel-default-extra is &lt;4.4.162-94.69.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520346" version="1" comment="kernel-devel is &lt;4.4.162-94.69.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520347" version="1" comment="kernel-macros is &lt;4.4.162-94.69.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520348" version="1" comment="kernel-source is &lt;4.4.162-94.69.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520349" version="1" comment="kernel-syms is &lt;4.4.162-94.69.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520350" version="1" comment="MozillaFirefox is &lt;60.3.0-109.50.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520351" version="1" comment="MozillaFirefox-translations-common is &lt;60.3.0-109.50.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520352" version="1" comment="libsystemd0 is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520353" version="1" comment="libsystemd0-32bit is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520354" version="1" comment="libudev1 is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520355" version="1" comment="libudev1-32bit is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520356" version="1" comment="systemd is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520357" version="1" comment="systemd-32bit is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520358" version="1" comment="systemd-bash-completion is &lt;228-150.53.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520359" version="1" comment="systemd-sysvinit is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520360" version="1" comment="udev is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520361" version="1" comment="libecpg6 is &lt;10.6-1.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520362" version="1" comment="libpq5 is &lt;10.6-1.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520363" version="1" comment="libpq5-32bit is &lt;10.6-1.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520364" version="1" comment="postgresql10 is &lt;10.6-1.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520365" version="1" comment="libwpd-0_10-10 is &lt;0.10.2-2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520366" version="1" comment="kernel-default is &lt;4.4.114-94.11.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520367" version="1" comment="kernel-default-devel is &lt;4.4.114-94.11.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520368" version="1" comment="kernel-default-extra is &lt;4.4.114-94.11.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520369" version="1" comment="kernel-devel is &lt;4.4.114-94.11.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520370" version="1" comment="kernel-macros is &lt;4.4.114-94.11.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520371" version="1" comment="kernel-source is &lt;4.4.114-94.11.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520372" version="1" comment="kernel-syms is &lt;4.4.114-94.11.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520373" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520374" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520375" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520376" version="1" comment="openssl is &lt;1.0.2j-60.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520377" version="1" comment="rpm is &lt;4.11.2-16.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520378" version="1" comment="rpm-32bit is &lt;4.11.2-16.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520379" version="1" comment="rpm-build is &lt;4.11.2-16.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520380" version="1" comment="rpm-python is &lt;4.11.2-16.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520381" version="1" comment="libexiv2-12 is &lt;0.23-12.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520382" version="1" comment="libtiff5 is &lt;4.0.9-44.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520383" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520384" version="1" comment="openssh is &lt;7.2p2-74.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520385" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520386" version="1" comment="openssh-helpers is &lt;7.2p2-74.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520387" version="1" comment="libncurses5 is &lt;5.9-61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520388" version="1" comment="libncurses5-32bit is &lt;5.9-61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520389" version="1" comment="libncurses6 is &lt;5.9-61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520390" version="1" comment="libncurses6-32bit is &lt;5.9-61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520391" version="1" comment="ncurses-devel is &lt;5.9-61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520392" version="1" comment="ncurses-utils is &lt;5.9-61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520393" version="1" comment="tack is &lt;5.9-61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520394" version="1" comment="terminfo is &lt;5.9-61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520395" version="1" comment="terminfo-base is &lt;5.9-61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520396" version="1" comment="ImageMagick is &lt;6.8.8.1-71.93.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520397" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.93.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520398" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.93.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520399" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.93.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520400" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.93.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520401" version="1" comment="python-cryptography is &lt;1.3.1-7.13.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520402" version="1" comment="python-pyOpenSSL is &lt;16.0.0-4.11.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520403" version="1" comment="python-setuptools is &lt;18.0.1-4.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520404" version="1" comment="python3-setuptools is &lt;18.0.1-4.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520405" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-106.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520406" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-106.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520407" version="1" comment="xen is &lt;4.9.3_03-3.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520408" version="1" comment="xen-libs is &lt;4.9.3_03-3.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520409" version="1" comment="xen-libs-32bit is &lt;4.9.3_03-3.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520410" version="1" comment="ghostscript is &lt;9.26-23.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520411" version="1" comment="ghostscript-x11 is &lt;9.26-23.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520412" version="1" comment="libspectre1 is &lt;0.2.7-12.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520413" version="1" comment="cups is &lt;1.7.5-20.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520414" version="1" comment="cups-client is &lt;1.7.5-20.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520415" version="1" comment="cups-libs is &lt;1.7.5-20.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520416" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520417" version="1" comment="qemu is &lt;2.9.1-6.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520418" version="1" comment="qemu-block-curl is &lt;2.9.1-6.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520419" version="1" comment="qemu-ipxe is &lt;1.0.0+-6.22.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520420" version="1" comment="qemu-kvm is &lt;2.9.1-6.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520421" version="1" comment="qemu-seabios is &lt;1.10.2-6.22.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520422" version="1" comment="qemu-sgabios is &lt;8-6.22.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520423" version="1" comment="qemu-tools is &lt;2.9.1-6.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520424" version="1" comment="qemu-vgabios is &lt;1.10.2-6.22.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520425" version="1" comment="qemu-x86 is &lt;2.9.1-6.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520426" version="1" comment="tcpdump is &lt;4.9.2-14.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520427" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520428" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520429" version="1" comment="openldap2-client is &lt;2.4.41-18.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520430" version="1" comment="libQt5Concurrent5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520431" version="1" comment="libQt5Core5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520432" version="1" comment="libQt5DBus5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520433" version="1" comment="libQt5Gui5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520434" version="1" comment="libQt5Network5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520435" version="1" comment="libQt5OpenGL5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520436" version="1" comment="libQt5PrintSupport5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520437" version="1" comment="libQt5Sql5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520438" version="1" comment="libQt5Sql5-mysql is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520439" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520440" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520441" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520442" version="1" comment="libQt5Test5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520443" version="1" comment="libQt5Widgets5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520444" version="1" comment="libQt5Xml5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520445" version="1" comment="bluez is &lt;5.13-5.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520446" version="1" comment="bluez-cups is &lt;5.13-5.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520447" version="1" comment="libbluetooth3 is &lt;5.13-5.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520448" version="1" comment="libtiff5 is &lt;4.0.9-44.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520449" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520450" version="1" comment="xen is &lt;4.9.1_08-3.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520451" version="1" comment="xen-libs is &lt;4.9.1_08-3.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520452" version="1" comment="xen-libs-32bit is &lt;4.9.1_08-3.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520453" version="1" comment="libatalk12 is &lt;3.1.0-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520454" version="1" comment="netatalk is &lt;3.1.0-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520455" version="1" comment="MozillaFirefox is &lt;60.4.0esr-109.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520456" version="1" comment="MozillaFirefox-translations-common is &lt;60.4.0esr-109.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520457" version="1" comment="libfreebl3 is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520458" version="1" comment="libfreebl3-32bit is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520459" version="1" comment="libsoftokn3 is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520460" version="1" comment="libsoftokn3-32bit is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520461" version="1" comment="mozilla-nspr is &lt;4.20-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520462" version="1" comment="mozilla-nspr-32bit is &lt;4.20-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520463" version="1" comment="mozilla-nss is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520464" version="1" comment="mozilla-nss-32bit is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520465" version="1" comment="mozilla-nss-certs is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520466" version="1" comment="mozilla-nss-certs-32bit is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520467" version="1" comment="mozilla-nss-sysinit is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520468" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520469" version="1" comment="mozilla-nss-tools is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520470" version="1" comment="libreoffice is &lt;5.4.5.1-43.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520471" version="1" comment="libreoffice-base is &lt;5.4.5.1-43.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520472" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.4.5.1-43.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520473" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.4.5.1-43.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520474" version="1" comment="libreoffice-calc is &lt;5.4.5.1-43.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520475" version="1" comment="libreoffice-calc-extensions is &lt;5.4.5.1-43.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520476" version="1" comment="libreoffice-draw is &lt;5.4.5.1-43.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520477" version="1" comment="libreoffice-filters-optional is &lt;5.4.5.1-43.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520478" version="1" comment="libreoffice-gnome is &lt;5.4.5.1-43.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520479" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520480" version="1" comment="libreoffice-icon-theme-tango is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520481" version="1" comment="libreoffice-impress is &lt;5.4.5.1-43.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520482" version="1" comment="libreoffice-l10n-af is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520483" version="1" comment="libreoffice-l10n-ar is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520484" version="1" comment="libreoffice-l10n-ca is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520485" version="1" comment="libreoffice-l10n-cs is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520486" version="1" comment="libreoffice-l10n-da is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520487" version="1" comment="libreoffice-l10n-de is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520488" version="1" comment="libreoffice-l10n-en is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520489" version="1" comment="libreoffice-l10n-es is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520490" version="1" comment="libreoffice-l10n-fi is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520491" version="1" comment="libreoffice-l10n-fr is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520492" version="1" comment="libreoffice-l10n-gu is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520493" version="1" comment="libreoffice-l10n-hi is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520494" version="1" comment="libreoffice-l10n-hu is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520495" version="1" comment="libreoffice-l10n-it is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520496" version="1" comment="libreoffice-l10n-ja is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520497" version="1" comment="libreoffice-l10n-ko is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520498" version="1" comment="libreoffice-l10n-nb is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520499" version="1" comment="libreoffice-l10n-nl is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520500" version="1" comment="libreoffice-l10n-nn is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520501" version="1" comment="libreoffice-l10n-pl is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520502" version="1" comment="libreoffice-l10n-pt_BR is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520503" version="1" comment="libreoffice-l10n-pt_PT is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520504" version="1" comment="libreoffice-l10n-ro is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520505" version="1" comment="libreoffice-l10n-ru is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520506" version="1" comment="libreoffice-l10n-sk is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520507" version="1" comment="libreoffice-l10n-sv is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520508" version="1" comment="libreoffice-l10n-xh is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520509" version="1" comment="libreoffice-l10n-zh_CN is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520510" version="1" comment="libreoffice-l10n-zh_TW is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520511" version="1" comment="libreoffice-l10n-zu is &lt;5.4.5.1-43.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520512" version="1" comment="libreoffice-mailmerge is &lt;5.4.5.1-43.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520513" version="1" comment="libreoffice-math is &lt;5.4.5.1-43.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520514" version="1" comment="libreoffice-officebean is &lt;5.4.5.1-43.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520515" version="1" comment="libreoffice-pyuno is &lt;5.4.5.1-43.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520516" version="1" comment="libreoffice-writer is &lt;5.4.5.1-43.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520517" version="1" comment="libreoffice-writer-extensions is &lt;5.4.5.1-43.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520518" version="1" comment="libreofficekit is &lt;5.4.5.1-43.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520519" version="1" comment="libwireshark9 is &lt;2.4.11-48.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520520" version="1" comment="libwiretap7 is &lt;2.4.11-48.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520521" version="1" comment="libwscodecs1 is &lt;2.4.11-48.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520522" version="1" comment="libwsutil8 is &lt;2.4.11-48.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520523" version="1" comment="wireshark is &lt;2.4.11-48.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520524" version="1" comment="wireshark-gtk is &lt;2.4.11-48.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520525" version="1" comment="drm-kmp-default is &lt;4.9.33_k4.4.114_94.11-4.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520526" version="1" comment="augeas is &lt;1.2.0-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520527" version="1" comment="augeas-lenses is &lt;1.2.0-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520528" version="1" comment="libaugeas0 is &lt;1.2.0-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520529" version="1" comment="libdcerpc-binding0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520530" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520531" version="1" comment="libdcerpc0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520532" version="1" comment="libdcerpc0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520533" version="1" comment="libndr-krb5pac0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520534" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520535" version="1" comment="libndr-nbt0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520536" version="1" comment="libndr-nbt0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520537" version="1" comment="libndr-standard0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520538" version="1" comment="libndr-standard0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520539" version="1" comment="libndr0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520540" version="1" comment="libndr0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520541" version="1" comment="libnetapi0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520542" version="1" comment="libnetapi0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520543" version="1" comment="libsamba-credentials0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520544" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520545" version="1" comment="libsamba-errors0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520546" version="1" comment="libsamba-errors0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520547" version="1" comment="libsamba-hostconfig0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520548" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520549" version="1" comment="libsamba-passdb0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520550" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520551" version="1" comment="libsamba-util0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520552" version="1" comment="libsamba-util0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520553" version="1" comment="libsamdb0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520554" version="1" comment="libsamdb0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520555" version="1" comment="libsmbclient0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520556" version="1" comment="libsmbclient0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520557" version="1" comment="libsmbconf0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520558" version="1" comment="libsmbconf0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520559" version="1" comment="libsmbldap0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520560" version="1" comment="libsmbldap0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520561" version="1" comment="libtalloc2 is &lt;2.1.10-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520562" version="1" comment="libtalloc2-32bit is &lt;2.1.10-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520563" version="1" comment="libtevent-util0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520564" version="1" comment="libtevent-util0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520565" version="1" comment="libtevent0 is &lt;0.9.34-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520566" version="1" comment="libtevent0-32bit is &lt;0.9.34-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520567" version="1" comment="libwbclient0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520568" version="1" comment="libwbclient0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520569" version="1" comment="python-talloc is &lt;2.1.10-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520570" version="1" comment="python-talloc-32bit is &lt;2.1.10-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520571" version="1" comment="samba is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520572" version="1" comment="samba-client is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520573" version="1" comment="samba-client-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520574" version="1" comment="samba-doc is &lt;4.6.13+git.72.2a684235f41-3.21.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520575" version="1" comment="samba-libs is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520576" version="1" comment="samba-libs-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520577" version="1" comment="samba-winbind is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520578" version="1" comment="samba-winbind-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520579" version="1" comment="qemu is &lt;2.9.1-6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520580" version="1" comment="qemu-block-curl is &lt;2.9.1-6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520581" version="1" comment="qemu-ipxe is &lt;1.0.0-6.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520582" version="1" comment="qemu-kvm is &lt;2.9.1-6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520583" version="1" comment="qemu-seabios is &lt;1.10.2-6.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520584" version="1" comment="qemu-sgabios is &lt;8-6.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520585" version="1" comment="qemu-tools is &lt;2.9.1-6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520586" version="1" comment="qemu-vgabios is &lt;1.10.2-6.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520587" version="1" comment="qemu-x86 is &lt;2.9.1-6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520588" version="1" comment="kernel-default is &lt;4.4.120-94.17.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520589" version="1" comment="kernel-default-devel is &lt;4.4.120-94.17.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520590" version="1" comment="kernel-default-extra is &lt;4.4.120-94.17.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520591" version="1" comment="kernel-devel is &lt;4.4.120-94.17.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520592" version="1" comment="kernel-macros is &lt;4.4.120-94.17.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520593" version="1" comment="kernel-source is &lt;4.4.120-94.17.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520594" version="1" comment="kernel-syms is &lt;4.4.120-94.17.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520595" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.33-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520596" version="1" comment="libspice-client-glib-helper is &lt;0.33-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520597" version="1" comment="libspice-client-gtk-3_0-5 is &lt;0.33-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520598" version="1" comment="libspice-controller0 is &lt;0.33-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520599" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.33-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520600" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.33-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520601" version="1" comment="libidn11 is &lt;1.28-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520602" version="1" comment="libidn11-32bit is &lt;1.28-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520603" version="1" comment="libvirt is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520604" version="1" comment="libvirt-admin is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520605" version="1" comment="libvirt-client is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520606" version="1" comment="libvirt-daemon is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520607" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520608" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520609" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520610" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520611" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520612" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520613" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520614" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520615" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520616" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520617" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520618" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520619" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520620" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520621" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520622" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520623" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520624" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520625" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520626" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520627" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520628" version="1" comment="libvirt-doc is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520629" version="1" comment="libvirt-libs is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520630" version="1" comment="virt-install is &lt;1.4.1-5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520631" version="1" comment="virt-manager is &lt;1.4.1-5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520632" version="1" comment="virt-manager-common is &lt;1.4.1-5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520633" version="1" comment="libzzip-0-13 is &lt;0.13.67-10.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520634" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520635" version="1" comment="python3 is &lt;3.4.6-25.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520636" version="1" comment="python3-base is &lt;3.4.6-25.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520637" version="1" comment="python3-curses is &lt;3.4.6-25.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520638" version="1" comment="evince is &lt;3.20.2-6.22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520639" version="1" comment="evince-browser-plugin is &lt;3.20.2-6.22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520640" version="1" comment="evince-lang is &lt;3.20.2-6.22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520641" version="1" comment="evince-plugin-djvudocument is &lt;3.20.2-6.22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520642" version="1" comment="evince-plugin-dvidocument is &lt;3.20.2-6.22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520643" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.2-6.22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520644" version="1" comment="evince-plugin-psdocument is &lt;3.20.2-6.22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520645" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.2-6.22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520646" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.2-6.22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520647" version="1" comment="libevdocument3-4 is &lt;3.20.2-6.22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520648" version="1" comment="libevview3-3 is &lt;3.20.2-6.22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520649" version="1" comment="nautilus-evince is &lt;3.20.2-6.22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520650" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.20.2-6.22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520651" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.20.2-6.22.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520652" version="1" comment="ntp is &lt;4.2.8p11-64.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520653" version="1" comment="ntp-doc is &lt;4.2.8p11-64.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520654" version="1" comment="libwireshark8 is &lt;2.2.14-48.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520655" version="1" comment="libwiretap6 is &lt;2.2.14-48.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520656" version="1" comment="libwscodecs1 is &lt;2.2.14-48.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520657" version="1" comment="libwsutil7 is &lt;2.2.14-48.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520658" version="1" comment="wireshark is &lt;2.2.14-48.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520659" version="1" comment="wireshark-gtk is &lt;2.2.14-48.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520660" version="1" comment="kernel-default is &lt;4.4.126-94.22.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520661" version="1" comment="kernel-default-devel is &lt;4.4.126-94.22.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520662" version="1" comment="kernel-default-extra is &lt;4.4.126-94.22.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520663" version="1" comment="kernel-devel is &lt;4.4.126-94.22.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520664" version="1" comment="kernel-macros is &lt;4.4.126-94.22.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520665" version="1" comment="kernel-source is &lt;4.4.126-94.22.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520666" version="1" comment="kernel-syms is &lt;4.4.126-94.22.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520667" version="1" comment="PackageKit is &lt;1.1.3-24.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520668" version="1" comment="PackageKit-backend-zypp is &lt;1.1.3-24.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520669" version="1" comment="PackageKit-gstreamer-plugin is &lt;1.1.3-24.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520670" version="1" comment="PackageKit-gtk3-module is &lt;1.1.3-24.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520671" version="1" comment="PackageKit-lang is &lt;1.1.3-24.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520672" version="1" comment="libpackagekit-glib2-18 is &lt;1.1.3-24.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520673" version="1" comment="typelib-1_0-PackageKitGlib-1_0 is &lt;1.1.3-24.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520674" version="1" comment="rzsz is &lt;0.12.21~rc-1001.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520675" version="1" comment="perl is &lt;5.18.2-12.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520676" version="1" comment="perl-32bit is &lt;5.18.2-12.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520677" version="1" comment="perl-base is &lt;5.18.2-12.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520678" version="1" comment="perl-doc is &lt;5.18.2-12.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520679" version="1" comment="zsh is &lt;5.0.5-6.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520680" version="1" comment="boost-license1_54_0 is &lt;1.54.0-26.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520681" version="1" comment="gnome-documents is &lt;3.20.1-10.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520682" version="1" comment="gnome-documents-lang is &lt;3.20.1-10.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520683" version="1" comment="gnome-documents_books-common is &lt;3.20.1-10.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520684" version="1" comment="gnome-shell-search-provider-documents is &lt;3.20.1-10.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520685" version="1" comment="libboost_atomic1_54_0 is &lt;1.54.0-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520686" version="1" comment="libboost_date_time1_54_0 is &lt;1.54.0-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520687" version="1" comment="libboost_filesystem1_54_0 is &lt;1.54.0-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520688" version="1" comment="libboost_iostreams1_54_0 is &lt;1.54.0-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520689" version="1" comment="libboost_locale1_54_0 is &lt;1.54.0-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520690" version="1" comment="libboost_program_options1_54_0 is &lt;1.54.0-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520691" version="1" comment="libboost_random1_54_0 is &lt;1.54.0-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520692" version="1" comment="libboost_regex1_54_0 is &lt;1.54.0-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520693" version="1" comment="libboost_signals1_54_0 is &lt;1.54.0-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520694" version="1" comment="libboost_system1_54_0 is &lt;1.54.0-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520695" version="1" comment="libboost_thread1_54_0 is &lt;1.54.0-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520696" version="1" comment="libepubgen-0_1-1 is &lt;0.1.0-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520697" version="1" comment="libixion-0_13-0 is &lt;0.13.0-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520698" version="1" comment="libmwaw-0_3-3 is &lt;0.3.13-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520699" version="1" comment="liborcus-0_13-0 is &lt;0.13.4-10.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520700" version="1" comment="libqxp-0_0-0 is &lt;0.0.1-1.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520701" version="1" comment="libreoffice is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520702" version="1" comment="libreoffice-base is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520703" version="1" comment="libreoffice-base-drivers-mysql is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520704" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520705" version="1" comment="libreoffice-branding-upstream is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520706" version="1" comment="libreoffice-calc is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520707" version="1" comment="libreoffice-calc-extensions is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520708" version="1" comment="libreoffice-draw is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520709" version="1" comment="libreoffice-filters-optional is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520710" version="1" comment="libreoffice-gnome is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520711" version="1" comment="libreoffice-gtk2 is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520712" version="1" comment="libreoffice-icon-themes is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520713" version="1" comment="libreoffice-impress is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520714" version="1" comment="libreoffice-l10n-af is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520715" version="1" comment="libreoffice-l10n-ar is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520716" version="1" comment="libreoffice-l10n-ca is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520717" version="1" comment="libreoffice-l10n-cs is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520718" version="1" comment="libreoffice-l10n-da is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520719" version="1" comment="libreoffice-l10n-de is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520720" version="1" comment="libreoffice-l10n-en is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520721" version="1" comment="libreoffice-l10n-es is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520722" version="1" comment="libreoffice-l10n-fi is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520723" version="1" comment="libreoffice-l10n-fr is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520724" version="1" comment="libreoffice-l10n-gu is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520725" version="1" comment="libreoffice-l10n-hi is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520726" version="1" comment="libreoffice-l10n-hu is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520727" version="1" comment="libreoffice-l10n-it is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520728" version="1" comment="libreoffice-l10n-ja is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520729" version="1" comment="libreoffice-l10n-ko is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520730" version="1" comment="libreoffice-l10n-nb is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520731" version="1" comment="libreoffice-l10n-nl is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520732" version="1" comment="libreoffice-l10n-nn is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520733" version="1" comment="libreoffice-l10n-pl is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520734" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520735" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520736" version="1" comment="libreoffice-l10n-ro is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520737" version="1" comment="libreoffice-l10n-ru is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520738" version="1" comment="libreoffice-l10n-sk is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520739" version="1" comment="libreoffice-l10n-sv is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520740" version="1" comment="libreoffice-l10n-xh is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520741" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520742" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520743" version="1" comment="libreoffice-l10n-zu is &lt;6.0.3.2-43.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520744" version="1" comment="libreoffice-mailmerge is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520745" version="1" comment="libreoffice-math is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520746" version="1" comment="libreoffice-officebean is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520747" version="1" comment="libreoffice-pyuno is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520748" version="1" comment="libreoffice-writer is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520749" version="1" comment="libreoffice-writer-extensions is &lt;6.0.3.2-43.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520750" version="1" comment="libstaroffice-0_0-0 is &lt;0.0.5-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520751" version="1" comment="libwps-0_4-4 is &lt;0.4.7-10.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520752" version="1" comment="myspell-af_NA is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520753" version="1" comment="myspell-af_ZA is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520754" version="1" comment="myspell-ar is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520755" version="1" comment="myspell-ar_AE is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520756" version="1" comment="myspell-ar_BH is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520757" version="1" comment="myspell-ar_DZ is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520758" version="1" comment="myspell-ar_EG is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520759" version="1" comment="myspell-ar_IQ is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520760" version="1" comment="myspell-ar_JO is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520761" version="1" comment="myspell-ar_KW is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520762" version="1" comment="myspell-ar_LB is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520763" version="1" comment="myspell-ar_LY is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520764" version="1" comment="myspell-ar_MA is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520765" version="1" comment="myspell-ar_OM is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520766" version="1" comment="myspell-ar_QA is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520767" version="1" comment="myspell-ar_SA is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520768" version="1" comment="myspell-ar_SD is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520769" version="1" comment="myspell-ar_SY is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520770" version="1" comment="myspell-ar_TN is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520771" version="1" comment="myspell-ar_YE is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520772" version="1" comment="myspell-be_BY is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520773" version="1" comment="myspell-bg_BG is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520774" version="1" comment="myspell-bn_BD is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520775" version="1" comment="myspell-bn_IN is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520776" version="1" comment="myspell-bs is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520777" version="1" comment="myspell-bs_BA is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520778" version="1" comment="myspell-ca is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520779" version="1" comment="myspell-ca_AD is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520780" version="1" comment="myspell-ca_ES is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520781" version="1" comment="myspell-ca_ES_valencia is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520782" version="1" comment="myspell-ca_FR is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520783" version="1" comment="myspell-ca_IT is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520784" version="1" comment="myspell-cs_CZ is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520785" version="1" comment="myspell-da_DK is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520786" version="1" comment="myspell-de is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520787" version="1" comment="myspell-de_AT is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520788" version="1" comment="myspell-de_CH is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520789" version="1" comment="myspell-de_DE is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520790" version="1" comment="myspell-dictionaries is &lt;20180403-16.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520791" version="1" comment="myspell-el_GR is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520792" version="1" comment="myspell-en is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520793" version="1" comment="myspell-en_AU is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520794" version="1" comment="myspell-en_BS is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520795" version="1" comment="myspell-en_BZ is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520796" version="1" comment="myspell-en_CA is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520797" version="1" comment="myspell-en_GB is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520798" version="1" comment="myspell-en_GH is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520799" version="1" comment="myspell-en_IE is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520800" version="1" comment="myspell-en_IN is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520801" version="1" comment="myspell-en_JM is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520802" version="1" comment="myspell-en_MW is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520803" version="1" comment="myspell-en_NA is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520804" version="1" comment="myspell-en_NZ is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520805" version="1" comment="myspell-en_PH is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520806" version="1" comment="myspell-en_TT is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520807" version="1" comment="myspell-en_US is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520808" version="1" comment="myspell-en_ZA is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520809" version="1" comment="myspell-en_ZW is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520810" version="1" comment="myspell-es is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520811" version="1" comment="myspell-es_AR is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520812" version="1" comment="myspell-es_BO is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520813" version="1" comment="myspell-es_CL is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520814" version="1" comment="myspell-es_CO is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520815" version="1" comment="myspell-es_CR is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520816" version="1" comment="myspell-es_CU is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520817" version="1" comment="myspell-es_DO is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520818" version="1" comment="myspell-es_EC is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520819" version="1" comment="myspell-es_ES is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520820" version="1" comment="myspell-es_GT is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520821" version="1" comment="myspell-es_HN is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520822" version="1" comment="myspell-es_MX is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520823" version="1" comment="myspell-es_NI is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520824" version="1" comment="myspell-es_PA is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520825" version="1" comment="myspell-es_PE is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520826" version="1" comment="myspell-es_PR is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520827" version="1" comment="myspell-es_PY is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520828" version="1" comment="myspell-es_SV is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520829" version="1" comment="myspell-es_UY is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520830" version="1" comment="myspell-es_VE is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520831" version="1" comment="myspell-et_EE is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520832" version="1" comment="myspell-fr_BE is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520833" version="1" comment="myspell-fr_CA is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520834" version="1" comment="myspell-fr_CH is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520835" version="1" comment="myspell-fr_FR is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520836" version="1" comment="myspell-fr_LU is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520837" version="1" comment="myspell-fr_MC is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520838" version="1" comment="myspell-gu_IN is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520839" version="1" comment="myspell-he_IL is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520840" version="1" comment="myspell-hi_IN is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520841" version="1" comment="myspell-hr_HR is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520842" version="1" comment="myspell-hu_HU is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520843" version="1" comment="myspell-id is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520844" version="1" comment="myspell-id_ID is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520845" version="1" comment="myspell-it_IT is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520846" version="1" comment="myspell-lightproof-en is &lt;20180403-16.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520847" version="1" comment="myspell-lightproof-hu_HU is &lt;20180403-16.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520848" version="1" comment="myspell-lightproof-pt_BR is &lt;20180403-16.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520849" version="1" comment="myspell-lightproof-ru_RU is &lt;20180403-16.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520850" version="1" comment="myspell-lo_LA is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520851" version="1" comment="myspell-lt_LT is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520852" version="1" comment="myspell-lv_LV is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520853" version="1" comment="myspell-nb_NO is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520854" version="1" comment="myspell-nl_BE is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520855" version="1" comment="myspell-nl_NL is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520856" version="1" comment="myspell-nn_NO is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520857" version="1" comment="myspell-no is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520858" version="1" comment="myspell-pl_PL is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520859" version="1" comment="myspell-pt_AO is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520860" version="1" comment="myspell-pt_BR is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520861" version="1" comment="myspell-pt_PT is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520862" version="1" comment="myspell-ro is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520863" version="1" comment="myspell-ro_RO is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520864" version="1" comment="myspell-ru_RU is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520865" version="1" comment="myspell-sk_SK is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520866" version="1" comment="myspell-sl_SI is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520867" version="1" comment="myspell-sr is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520868" version="1" comment="myspell-sr_CS is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520869" version="1" comment="myspell-sr_Latn_CS is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520870" version="1" comment="myspell-sr_Latn_RS is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520871" version="1" comment="myspell-sr_RS is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520872" version="1" comment="myspell-sv_FI is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520873" version="1" comment="myspell-sv_SE is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520874" version="1" comment="myspell-te is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520875" version="1" comment="myspell-te_IN is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520876" version="1" comment="myspell-th_TH is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520877" version="1" comment="myspell-uk_UA is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520878" version="1" comment="myspell-vi is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520879" version="1" comment="myspell-vi_VN is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520880" version="1" comment="myspell-zu_ZA is &lt;20180403-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520881" version="1" comment="patch is &lt;2.7.5-8.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520882" version="1" comment="ImageMagick is &lt;6.8.8.1-71.54.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520883" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.54.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520884" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.54.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520885" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.54.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520886" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.54.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520887" version="1" comment="libtiff5 is &lt;4.0.9-44.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520888" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520889" version="1" comment="xen is &lt;4.9.2_04-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520890" version="1" comment="xen-libs is &lt;4.9.2_04-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520891" version="1" comment="xen-libs-32bit is &lt;4.9.2_04-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520892" version="1" comment="libcairo-gobject2 is &lt;1.15.2-25.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520893" version="1" comment="libcairo-gobject2-32bit is &lt;1.15.2-25.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520894" version="1" comment="libcairo-script-interpreter2 is &lt;1.15.2-25.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520895" version="1" comment="libcairo2 is &lt;1.15.2-25.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520896" version="1" comment="libcairo2-32bit is &lt;1.15.2-25.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520897" version="1" comment="qemu is &lt;2.9.1-6.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520898" version="1" comment="qemu-block-curl is &lt;2.9.1-6.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520899" version="1" comment="qemu-ipxe is &lt;1.0.0-6.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520900" version="1" comment="qemu-kvm is &lt;2.9.1-6.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520901" version="1" comment="qemu-seabios is &lt;1.10.2-6.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520902" version="1" comment="qemu-sgabios is &lt;8-6.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520903" version="1" comment="qemu-tools is &lt;2.9.1-6.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520904" version="1" comment="qemu-vgabios is &lt;1.10.2-6.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520905" version="1" comment="qemu-x86 is &lt;2.9.1-6.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520906" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.20-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520907" version="1" comment="librsvg-2-2 is &lt;2.40.20-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520908" version="1" comment="librsvg-2-2-32bit is &lt;2.40.20-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520909" version="1" comment="rsvg-view is &lt;2.40.20-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520910" version="1" comment="libreoffice is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520911" version="1" comment="libreoffice-base is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520912" version="1" comment="libreoffice-base-drivers-mysql is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520913" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520914" version="1" comment="libreoffice-branding-upstream is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520915" version="1" comment="libreoffice-calc is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520916" version="1" comment="libreoffice-calc-extensions is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520917" version="1" comment="libreoffice-draw is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520918" version="1" comment="libreoffice-filters-optional is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520919" version="1" comment="libreoffice-gnome is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520920" version="1" comment="libreoffice-gtk2 is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520921" version="1" comment="libreoffice-icon-themes is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520922" version="1" comment="libreoffice-impress is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520923" version="1" comment="libreoffice-l10n-af is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520924" version="1" comment="libreoffice-l10n-ar is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520925" version="1" comment="libreoffice-l10n-ca is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520926" version="1" comment="libreoffice-l10n-cs is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520927" version="1" comment="libreoffice-l10n-da is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520928" version="1" comment="libreoffice-l10n-de is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520929" version="1" comment="libreoffice-l10n-en is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520930" version="1" comment="libreoffice-l10n-es is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520931" version="1" comment="libreoffice-l10n-fi is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520932" version="1" comment="libreoffice-l10n-fr is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520933" version="1" comment="libreoffice-l10n-gu is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520934" version="1" comment="libreoffice-l10n-hi is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520935" version="1" comment="libreoffice-l10n-hu is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520936" version="1" comment="libreoffice-l10n-it is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520937" version="1" comment="libreoffice-l10n-ja is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520938" version="1" comment="libreoffice-l10n-ko is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520939" version="1" comment="libreoffice-l10n-nb is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520940" version="1" comment="libreoffice-l10n-nl is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520941" version="1" comment="libreoffice-l10n-nn is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520942" version="1" comment="libreoffice-l10n-pl is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520943" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520944" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520945" version="1" comment="libreoffice-l10n-ro is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520946" version="1" comment="libreoffice-l10n-ru is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520947" version="1" comment="libreoffice-l10n-sk is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520948" version="1" comment="libreoffice-l10n-sv is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520949" version="1" comment="libreoffice-l10n-xh is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520950" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520951" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520952" version="1" comment="libreoffice-l10n-zu is &lt;6.0.4.2-43.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520953" version="1" comment="libreoffice-mailmerge is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520954" version="1" comment="libreoffice-math is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520955" version="1" comment="libreoffice-officebean is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520956" version="1" comment="libreoffice-pyuno is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520957" version="1" comment="libreoffice-writer is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520958" version="1" comment="libreoffice-writer-extensions is &lt;6.0.4.2-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520959" version="1" comment="libvorbis0 is &lt;1.3.3-10.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520960" version="1" comment="libvorbis0-32bit is &lt;1.3.3-10.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520961" version="1" comment="libvorbisenc2 is &lt;1.3.3-10.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520962" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-10.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520963" version="1" comment="libvorbisfile3 is &lt;1.3.3-10.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520964" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-10.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520965" version="1" comment="curl is &lt;7.37.0-37.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520966" version="1" comment="libcurl4 is &lt;7.37.0-37.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520967" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520968" version="1" comment="ghostscript is &lt;9.15-23.10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520969" version="1" comment="ghostscript-x11 is &lt;9.15-23.10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520970" version="1" comment="MozillaFirefox is &lt;52.8.0esr-109.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520971" version="1" comment="MozillaFirefox-translations is &lt;52.8.0esr-109.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520972" version="1" comment="libopenjp2-7 is &lt;2.1.0-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520973" version="1" comment="qemu is &lt;2.9.1-6.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520974" version="1" comment="qemu-block-curl is &lt;2.9.1-6.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520975" version="1" comment="qemu-ipxe is &lt;1.0.0-6.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520976" version="1" comment="qemu-kvm is &lt;2.9.1-6.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520977" version="1" comment="qemu-seabios is &lt;1.10.2-6.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520978" version="1" comment="qemu-sgabios is &lt;8-6.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520979" version="1" comment="qemu-tools is &lt;2.9.1-6.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520980" version="1" comment="qemu-vgabios is &lt;1.10.2-6.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520981" version="1" comment="qemu-x86 is &lt;2.9.1-6.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520982" version="1" comment="kernel-default is &lt;4.4.131-94.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520983" version="1" comment="kernel-default-devel is &lt;4.4.131-94.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520984" version="1" comment="kernel-default-extra is &lt;4.4.131-94.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520985" version="1" comment="kernel-devel is &lt;4.4.131-94.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520986" version="1" comment="kernel-macros is &lt;4.4.131-94.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520987" version="1" comment="kernel-source is &lt;4.4.131-94.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520988" version="1" comment="kernel-syms is &lt;4.4.131-94.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520989" version="1" comment="wget is &lt;1.14-21.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520990" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520991" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520992" version="1" comment="python is &lt;2.7.13-28.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520993" version="1" comment="python-base is &lt;2.7.13-28.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520994" version="1" comment="python-curses is &lt;2.7.13-28.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520995" version="1" comment="python-devel is &lt;2.7.13-28.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520996" version="1" comment="python-tk is &lt;2.7.13-28.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520997" version="1" comment="python-xml is &lt;2.7.13-28.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520998" version="1" comment="bash is &lt;4.3-83.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520999" version="1" comment="bash-doc is &lt;4.3-83.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521000" version="1" comment="bash-lang is &lt;4.3-83.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521001" version="1" comment="libreadline6 is &lt;6.3-83.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521002" version="1" comment="libreadline6-32bit is &lt;6.3-83.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521003" version="1" comment="readline-doc is &lt;6.3-83.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521004" version="1" comment="icu is &lt;52.1-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521005" version="1" comment="libicu52_1 is &lt;52.1-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521006" version="1" comment="libicu52_1-32bit is &lt;52.1-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521007" version="1" comment="libicu52_1-data is &lt;52.1-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521008" version="1" comment="ceph-common is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521009" version="1" comment="libcephfs2 is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521010" version="1" comment="librados2 is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521011" version="1" comment="libradosstriper1 is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521012" version="1" comment="librbd1 is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521013" version="1" comment="librgw2 is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521014" version="1" comment="python-cephfs is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521015" version="1" comment="python-rados is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521016" version="1" comment="python-rbd is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521017" version="1" comment="python-rgw is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521018" version="1" comment="libjasper1 is &lt;1.900.14-195.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521019" version="1" comment="libjasper1-32bit is &lt;1.900.14-195.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521020" version="1" comment="libmodplug1 is &lt;0.8.9.0+git20170610.f6dd59a-15.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521021" version="1" comment="xen is &lt;4.9.2_06-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521022" version="1" comment="xen-libs is &lt;4.9.2_06-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521023" version="1" comment="xen-libs-32bit is &lt;4.9.2_06-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521024" version="1" comment="libntfs-3g84 is &lt;2013.1.13-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521025" version="1" comment="ntfs-3g is &lt;2013.1.13-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521026" version="1" comment="ntfsprogs is &lt;2013.1.13-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521027" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.0-2.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521028" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.0-2.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521029" version="1" comment="libwebkit2gtk3-lang is &lt;2.24.0-2.38.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521030" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.0-2.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521031" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.0-2.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521032" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.0-2.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521033" version="1" comment="ImageMagick is &lt;6.8.8.1-71.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521034" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521035" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521036" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521037" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521038" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521039" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521040" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521041" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521042" version="1" comment="libdcerpc0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521043" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521044" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521045" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521046" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521047" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521048" version="1" comment="libndr-standard0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521049" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521050" version="1" comment="libndr0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521051" version="1" comment="libndr0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521052" version="1" comment="libnetapi0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521053" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521054" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521055" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521056" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521057" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521058" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521059" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521060" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521061" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521062" version="1" comment="libsamba-util0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521063" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521064" version="1" comment="libsamdb0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521065" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521066" version="1" comment="libsmbclient0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521067" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521068" version="1" comment="libsmbconf0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521069" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521070" version="1" comment="libsmbldap0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521071" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521072" version="1" comment="libtevent-util0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521073" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521074" version="1" comment="libwbclient0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521075" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521076" version="1" comment="samba is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521077" version="1" comment="samba-client is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521078" version="1" comment="samba-client-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521079" version="1" comment="samba-doc is &lt;4.6.16+git.154.2998451b912-3.40.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521080" version="1" comment="samba-libs is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521081" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521082" version="1" comment="samba-winbind is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521083" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521084" version="1" comment="libwireshark9 is &lt;2.4.14-48.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521085" version="1" comment="libwiretap7 is &lt;2.4.14-48.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521086" version="1" comment="libwscodecs1 is &lt;2.4.14-48.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521087" version="1" comment="libwsutil8 is &lt;2.4.14-48.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521088" version="1" comment="wireshark is &lt;2.4.14-48.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521089" version="1" comment="wireshark-gtk is &lt;2.4.14-48.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521090" version="1" comment="libvirt is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521091" version="1" comment="libvirt-admin is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521092" version="1" comment="libvirt-client is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521093" version="1" comment="libvirt-daemon is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521094" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521095" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521096" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521097" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521098" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521099" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521100" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521101" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521102" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521103" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521104" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521105" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521106" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521107" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521108" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521109" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521110" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521111" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521112" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521113" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521114" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521115" version="1" comment="libvirt-doc is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521116" version="1" comment="libvirt-libs is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521117" version="1" comment="libssh2-1 is &lt;1.4.3-20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521118" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521119" version="1" comment="wpa_supplicant is &lt;2.6-15.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521120" version="1" comment="atftp is &lt;0.7.0-160.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521121" version="1" comment="krb5 is &lt;1.12.5-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521122" version="1" comment="krb5-32bit is &lt;1.12.5-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521123" version="1" comment="krb5-client is &lt;1.12.5-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521124" version="1" comment="libjpeg-turbo is &lt;1.5.3-31.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521125" version="1" comment="libjpeg62 is &lt;62.2.0-31.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521126" version="1" comment="libjpeg62-32bit is &lt;62.2.0-31.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521127" version="1" comment="libjpeg62-turbo is &lt;1.5.3-31.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521128" version="1" comment="libjpeg8 is &lt;8.1.2-31.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521129" version="1" comment="libjpeg8-32bit is &lt;8.1.2-31.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521130" version="1" comment="libturbojpeg0 is &lt;8.1.2-31.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521131" version="1" comment="supportutils is &lt;3.0-95.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521132" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521133" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521134" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521135" version="1" comment="openssl is &lt;1.0.2j-60.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521136" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.1-2.41.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521137" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.1-2.41.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521138" version="1" comment="libwebkit2gtk3-lang is &lt;2.24.1-2.41.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521139" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.1-2.41.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521140" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.1-2.41.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521141" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.1-2.41.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521142" version="1" comment="audit is &lt;2.8.1-8.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521143" version="1" comment="libaudit1 is &lt;2.8.1-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521144" version="1" comment="libaudit1-32bit is &lt;2.8.1-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521145" version="1" comment="libauparse0 is &lt;2.8.1-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521146" version="1" comment="mutt is &lt;1.10.1-55.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521147" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521148" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521149" version="1" comment="sqlite3 is &lt;3.8.10.2-9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521150" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.212-27.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521151" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.212-27.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521152" version="1" comment="libxslt-tools is &lt;1.1.28-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521153" version="1" comment="libxslt1 is &lt;1.1.28-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521154" version="1" comment="libxslt1-32bit is &lt;1.1.28-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521155" version="1" comment="ucode-intel is &lt;20190507-13.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521156" version="1" comment="qemu is &lt;2.9.1-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521157" version="1" comment="qemu-block-curl is &lt;2.9.1-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521158" version="1" comment="qemu-ipxe is &lt;1.0.0+-6.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521159" version="1" comment="qemu-kvm is &lt;2.9.1-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521160" version="1" comment="qemu-seabios is &lt;1.10.2-6.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521161" version="1" comment="qemu-sgabios is &lt;8-6.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521162" version="1" comment="qemu-tools is &lt;2.9.1-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521163" version="1" comment="qemu-vgabios is &lt;1.10.2-6.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521164" version="1" comment="qemu-x86 is &lt;2.9.1-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521165" version="1" comment="kernel-default is &lt;4.4.178-94.91.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521166" version="1" comment="kernel-default-devel is &lt;4.4.178-94.91.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521167" version="1" comment="kernel-default-extra is &lt;4.4.178-94.91.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521168" version="1" comment="kernel-devel is &lt;4.4.178-94.91.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521169" version="1" comment="kernel-macros is &lt;4.4.178-94.91.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521170" version="1" comment="kernel-source is &lt;4.4.178-94.91.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521171" version="1" comment="kernel-syms is &lt;4.4.178-94.91.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521172" version="1" comment="xen is &lt;4.9.4_04-3.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521173" version="1" comment="xen-libs is &lt;4.9.4_04-3.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521174" version="1" comment="xen-libs-32bit is &lt;4.9.4_04-3.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521175" version="1" comment="libsystemd0 is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521176" version="1" comment="libsystemd0-32bit is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521177" version="1" comment="libudev1 is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521178" version="1" comment="libudev1-32bit is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521179" version="1" comment="systemd is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521180" version="1" comment="systemd-32bit is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521181" version="1" comment="systemd-bash-completion is &lt;228-150.66.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521182" version="1" comment="systemd-sysvinit is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521183" version="1" comment="udev is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521184" version="1" comment="libraw9 is &lt;0.15.4-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521185" version="1" comment="PackageKit is &lt;1.1.3-24.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521186" version="1" comment="PackageKit-backend-zypp is &lt;1.1.3-24.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521187" version="1" comment="PackageKit-gstreamer-plugin is &lt;1.1.3-24.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521188" version="1" comment="PackageKit-gtk3-module is &lt;1.1.3-24.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521189" version="1" comment="PackageKit-lang is &lt;1.1.3-24.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521190" version="1" comment="libpackagekit-glib2-18 is &lt;1.1.3-24.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521191" version="1" comment="typelib-1_0-PackageKitGlib-1_0 is &lt;1.1.3-24.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521192" version="1" comment="ucode-intel is &lt;20190514-13.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521193" version="1" comment="openssh is &lt;7.2p2-74.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521194" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521195" version="1" comment="openssh-helpers is &lt;7.2p2-74.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521196" version="1" comment="sysstat is &lt;12.0.2-10.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521197" version="1" comment="bluez is &lt;5.13-5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521198" version="1" comment="bluez-cups is &lt;5.13-5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521199" version="1" comment="libbluetooth3 is &lt;5.13-5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521200" version="1" comment="freerdp is &lt;2.0.0~git.1463131968.4e66df7-12.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521201" version="1" comment="libfreerdp2 is &lt;2.0.0~git.1463131968.4e66df7-12.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521202" version="1" comment="libsystemd0 is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521203" version="1" comment="libsystemd0-32bit is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521204" version="1" comment="libudev1 is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521205" version="1" comment="libudev1-32bit is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521206" version="1" comment="systemd is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521207" version="1" comment="systemd-32bit is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521208" version="1" comment="systemd-bash-completion is &lt;228-150.58.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521209" version="1" comment="systemd-sysvinit is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521210" version="1" comment="udev is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521211" version="1" comment="screen is &lt;4.0.4-23.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521212" version="1" comment="curl is &lt;7.37.0-37.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521213" version="1" comment="libcurl4 is &lt;7.37.0-37.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521214" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521215" version="1" comment="libtasn1 is &lt;4.9-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521216" version="1" comment="libtasn1-6 is &lt;4.9-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521217" version="1" comment="libtasn1-6-32bit is &lt;4.9-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521218" version="1" comment="libwireshark9 is &lt;2.4.12-48.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521219" version="1" comment="libwiretap7 is &lt;2.4.12-48.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521220" version="1" comment="libwscodecs1 is &lt;2.4.12-48.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521221" version="1" comment="libwsutil8 is &lt;2.4.12-48.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521222" version="1" comment="wireshark is &lt;2.4.12-48.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521223" version="1" comment="wireshark-gtk is &lt;2.4.12-48.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521224" version="1" comment="MozillaFirefox is &lt;60.7.0-109.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521225" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.0-109.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521226" version="1" comment="gnome-shell is &lt;3.20.4-77.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521227" version="1" comment="gnome-shell-browser-plugin is &lt;3.20.4-77.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521228" version="1" comment="gnome-shell-calendar is &lt;3.20.4-77.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521229" version="1" comment="gnome-shell-lang is &lt;3.20.4-77.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521230" version="1" comment="evolution is &lt;3.22.6-19.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521231" version="1" comment="evolution-lang is &lt;3.22.6-19.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521232" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.221-43.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521233" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.221-43.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521234" version="1" comment="bind-libs is &lt;9.9.9P1-63.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521235" version="1" comment="bind-utils is &lt;9.9.9P1-63.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521236" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521237" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521238" version="1" comment="python is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521239" version="1" comment="python-base is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521240" version="1" comment="python-curses is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521241" version="1" comment="python-devel is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521242" version="1" comment="python-tk is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521243" version="1" comment="python-xml is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521244" version="1" comment="ghostscript is &lt;9.26a-23.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521245" version="1" comment="ghostscript-x11 is &lt;9.26a-23.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521246" version="1" comment="libspectre1 is &lt;0.2.7-12.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521247" version="1" comment="libixion-0_14-0 is &lt;0.14.1-13.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521248" version="1" comment="liborcus-0_14-0 is &lt;0.14.1-10.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521249" version="1" comment="libreoffice is &lt;6.2.3.2-43.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521250" version="1" comment="libreoffice-base is &lt;6.2.3.2-43.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521251" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.2.3.2-43.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521252" version="1" comment="libreoffice-branding-upstream is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521253" version="1" comment="libreoffice-calc is &lt;6.2.3.2-43.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521254" version="1" comment="libreoffice-calc-extensions is &lt;6.2.3.2-43.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521255" version="1" comment="libreoffice-draw is &lt;6.2.3.2-43.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521256" version="1" comment="libreoffice-filters-optional is &lt;6.2.3.2-43.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521257" version="1" comment="libreoffice-gnome is &lt;6.2.3.2-43.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521258" version="1" comment="libreoffice-gtk2 is &lt;6.2.3.2-43.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521259" version="1" comment="libreoffice-icon-themes is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521260" version="1" comment="libreoffice-impress is &lt;6.2.3.2-43.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521261" version="1" comment="libreoffice-l10n-af is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521262" version="1" comment="libreoffice-l10n-ar is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521263" version="1" comment="libreoffice-l10n-ca is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521264" version="1" comment="libreoffice-l10n-cs is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521265" version="1" comment="libreoffice-l10n-da is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521266" version="1" comment="libreoffice-l10n-de is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521267" version="1" comment="libreoffice-l10n-en is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521268" version="1" comment="libreoffice-l10n-es is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521269" version="1" comment="libreoffice-l10n-fi is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521270" version="1" comment="libreoffice-l10n-fr is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521271" version="1" comment="libreoffice-l10n-gu is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521272" version="1" comment="libreoffice-l10n-hi is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521273" version="1" comment="libreoffice-l10n-hu is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521274" version="1" comment="libreoffice-l10n-it is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521275" version="1" comment="libreoffice-l10n-ja is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521276" version="1" comment="libreoffice-l10n-ko is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521277" version="1" comment="libreoffice-l10n-nb is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521278" version="1" comment="libreoffice-l10n-nl is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521279" version="1" comment="libreoffice-l10n-nn is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521280" version="1" comment="libreoffice-l10n-pl is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521281" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521282" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521283" version="1" comment="libreoffice-l10n-ro is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521284" version="1" comment="libreoffice-l10n-ru is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521285" version="1" comment="libreoffice-l10n-sk is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521286" version="1" comment="libreoffice-l10n-sv is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521287" version="1" comment="libreoffice-l10n-xh is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521288" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521289" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521290" version="1" comment="libreoffice-l10n-zu is &lt;6.2.3.2-43.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521291" version="1" comment="libreoffice-mailmerge is &lt;6.2.3.2-43.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521292" version="1" comment="libreoffice-math is &lt;6.2.3.2-43.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521293" version="1" comment="libreoffice-officebean is &lt;6.2.3.2-43.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521294" version="1" comment="libreoffice-pyuno is &lt;6.2.3.2-43.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521295" version="1" comment="libreoffice-writer is &lt;6.2.3.2-43.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521296" version="1" comment="libreoffice-writer-extensions is &lt;6.2.3.2-43.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521297" version="1" comment="libwps-0_4-4 is &lt;0.4.10-10.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521298" version="1" comment="myspell-af_NA is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521299" version="1" comment="myspell-af_ZA is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521300" version="1" comment="myspell-ar is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521301" version="1" comment="myspell-ar_AE is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521302" version="1" comment="myspell-ar_BH is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521303" version="1" comment="myspell-ar_DZ is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521304" version="1" comment="myspell-ar_EG is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521305" version="1" comment="myspell-ar_IQ is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521306" version="1" comment="myspell-ar_JO is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521307" version="1" comment="myspell-ar_KW is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521308" version="1" comment="myspell-ar_LB is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521309" version="1" comment="myspell-ar_LY is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521310" version="1" comment="myspell-ar_MA is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521311" version="1" comment="myspell-ar_OM is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521312" version="1" comment="myspell-ar_QA is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521313" version="1" comment="myspell-ar_SA is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521314" version="1" comment="myspell-ar_SD is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521315" version="1" comment="myspell-ar_SY is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521316" version="1" comment="myspell-ar_TN is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521317" version="1" comment="myspell-ar_YE is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521318" version="1" comment="myspell-be_BY is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521319" version="1" comment="myspell-bg_BG is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521320" version="1" comment="myspell-bn_BD is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521321" version="1" comment="myspell-bn_IN is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521322" version="1" comment="myspell-bs is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521323" version="1" comment="myspell-bs_BA is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521324" version="1" comment="myspell-ca is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521325" version="1" comment="myspell-ca_AD is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521326" version="1" comment="myspell-ca_ES is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521327" version="1" comment="myspell-ca_ES_valencia is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521328" version="1" comment="myspell-ca_FR is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521329" version="1" comment="myspell-ca_IT is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521330" version="1" comment="myspell-cs_CZ is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521331" version="1" comment="myspell-da_DK is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521332" version="1" comment="myspell-de is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521333" version="1" comment="myspell-de_AT is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521334" version="1" comment="myspell-de_CH is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521335" version="1" comment="myspell-de_DE is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521336" version="1" comment="myspell-dictionaries is &lt;20190423-16.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521337" version="1" comment="myspell-el_GR is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521338" version="1" comment="myspell-en is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521339" version="1" comment="myspell-en_AU is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521340" version="1" comment="myspell-en_BS is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521341" version="1" comment="myspell-en_BZ is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521342" version="1" comment="myspell-en_CA is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521343" version="1" comment="myspell-en_GB is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521344" version="1" comment="myspell-en_GH is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521345" version="1" comment="myspell-en_IE is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521346" version="1" comment="myspell-en_IN is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521347" version="1" comment="myspell-en_JM is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521348" version="1" comment="myspell-en_MW is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521349" version="1" comment="myspell-en_NA is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521350" version="1" comment="myspell-en_NZ is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521351" version="1" comment="myspell-en_PH is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521352" version="1" comment="myspell-en_TT is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521353" version="1" comment="myspell-en_US is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521354" version="1" comment="myspell-en_ZA is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521355" version="1" comment="myspell-en_ZW is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521356" version="1" comment="myspell-es is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521357" version="1" comment="myspell-es_AR is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521358" version="1" comment="myspell-es_BO is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521359" version="1" comment="myspell-es_CL is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521360" version="1" comment="myspell-es_CO is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521361" version="1" comment="myspell-es_CR is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521362" version="1" comment="myspell-es_CU is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521363" version="1" comment="myspell-es_DO is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521364" version="1" comment="myspell-es_EC is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521365" version="1" comment="myspell-es_ES is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521366" version="1" comment="myspell-es_GT is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521367" version="1" comment="myspell-es_HN is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521368" version="1" comment="myspell-es_MX is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521369" version="1" comment="myspell-es_NI is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521370" version="1" comment="myspell-es_PA is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521371" version="1" comment="myspell-es_PE is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521372" version="1" comment="myspell-es_PR is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521373" version="1" comment="myspell-es_PY is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521374" version="1" comment="myspell-es_SV is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521375" version="1" comment="myspell-es_UY is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521376" version="1" comment="myspell-es_VE is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521377" version="1" comment="myspell-et_EE is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521378" version="1" comment="myspell-fr_BE is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521379" version="1" comment="myspell-fr_CA is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521380" version="1" comment="myspell-fr_CH is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521381" version="1" comment="myspell-fr_FR is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521382" version="1" comment="myspell-fr_LU is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521383" version="1" comment="myspell-fr_MC is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521384" version="1" comment="myspell-gu_IN is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521385" version="1" comment="myspell-he_IL is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521386" version="1" comment="myspell-hi_IN is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521387" version="1" comment="myspell-hr_HR is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521388" version="1" comment="myspell-hu_HU is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521389" version="1" comment="myspell-id is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521390" version="1" comment="myspell-id_ID is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521391" version="1" comment="myspell-it_IT is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521392" version="1" comment="myspell-lightproof-en is &lt;20190423-16.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521393" version="1" comment="myspell-lightproof-hu_HU is &lt;20190423-16.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521394" version="1" comment="myspell-lightproof-pt_BR is &lt;20190423-16.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521395" version="1" comment="myspell-lightproof-ru_RU is &lt;20190423-16.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521396" version="1" comment="myspell-lo_LA is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521397" version="1" comment="myspell-lt_LT is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521398" version="1" comment="myspell-lv_LV is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521399" version="1" comment="myspell-nb_NO is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521400" version="1" comment="myspell-nl_BE is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521401" version="1" comment="myspell-nl_NL is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521402" version="1" comment="myspell-nn_NO is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521403" version="1" comment="myspell-no is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521404" version="1" comment="myspell-pl_PL is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521405" version="1" comment="myspell-pt_AO is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521406" version="1" comment="myspell-pt_BR is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521407" version="1" comment="myspell-pt_PT is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521408" version="1" comment="myspell-ro is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521409" version="1" comment="myspell-ro_RO is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521410" version="1" comment="myspell-ru_RU is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521411" version="1" comment="myspell-sk_SK is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521412" version="1" comment="myspell-sl_SI is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521413" version="1" comment="myspell-sr is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521414" version="1" comment="myspell-sr_CS is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521415" version="1" comment="myspell-sr_Latn_CS is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521416" version="1" comment="myspell-sr_Latn_RS is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521417" version="1" comment="myspell-sr_RS is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521418" version="1" comment="myspell-sv_FI is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521419" version="1" comment="myspell-sv_SE is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521420" version="1" comment="myspell-te is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521421" version="1" comment="myspell-te_IN is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521422" version="1" comment="myspell-th_TH is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521423" version="1" comment="myspell-uk_UA is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521424" version="1" comment="myspell-vi is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521425" version="1" comment="myspell-vi_VN is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521426" version="1" comment="myspell-zu_ZA is &lt;20190423-16.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521427" version="1" comment="gvim is &lt;7.4.326-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521428" version="1" comment="vim is &lt;7.4.326-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521429" version="1" comment="vim-data is &lt;7.4.326-17.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521430" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.5-2.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521431" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.5-2.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521432" version="1" comment="libwebkit2gtk3-lang is &lt;2.22.5-2.32.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521433" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.5-2.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521434" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.5-2.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521435" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.5-2.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521436" version="1" comment="libcroco-0_6-3 is &lt;0.6.11-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521437" version="1" comment="libcroco-0_6-3-32bit is &lt;0.6.11-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521438" version="1" comment="libipa_hbac0 is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521439" version="1" comment="libsss_idmap0 is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521440" version="1" comment="libsss_nss_idmap0 is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521441" version="1" comment="libsss_sudo is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521442" version="1" comment="python-sssd-config is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521443" version="1" comment="sssd is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521444" version="1" comment="sssd-ad is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521445" version="1" comment="sssd-ipa is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521446" version="1" comment="sssd-krb5 is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521447" version="1" comment="sssd-krb5-common is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521448" version="1" comment="sssd-ldap is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521449" version="1" comment="sssd-proxy is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521450" version="1" comment="sssd-tools is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521451" version="1" comment="libecpg6 is &lt;10.8-1.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521452" version="1" comment="libpq5 is &lt;10.8-1.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521453" version="1" comment="libpq5-32bit is &lt;10.8-1.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521454" version="1" comment="postgresql10 is &lt;10.8-1.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521455" version="1" comment="openssh is &lt;7.2p2-74.42.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521456" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.42.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521457" version="1" comment="openssh-helpers is &lt;7.2p2-74.42.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521458" version="1" comment="kernel-default is &lt;4.4.180-94.97.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521459" version="1" comment="kernel-default-devel is &lt;4.4.180-94.97.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521460" version="1" comment="kernel-default-extra is &lt;4.4.180-94.97.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521461" version="1" comment="kernel-devel is &lt;4.4.180-94.97.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521462" version="1" comment="kernel-macros is &lt;4.4.180-94.97.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521463" version="1" comment="kernel-source is &lt;4.4.180-94.97.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521464" version="1" comment="kernel-syms is &lt;4.4.180-94.97.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521465" version="1" comment="libvirt is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521466" version="1" comment="libvirt-admin is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521467" version="1" comment="libvirt-client is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521468" version="1" comment="libvirt-daemon is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521469" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521470" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521471" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521472" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521473" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521474" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521475" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521476" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521477" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521478" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521479" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521480" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521481" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521482" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521483" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521484" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521485" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521486" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521487" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521488" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521489" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521490" version="1" comment="libvirt-doc is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521491" version="1" comment="libvirt-libs is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521492" version="1" comment="doxygen is &lt;1.8.6-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521493" version="1" comment="gstreamer-plugins-base is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521494" version="1" comment="gstreamer-plugins-base-lang is &lt;1.8.3-13.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521495" version="1" comment="libgstallocators-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521496" version="1" comment="libgstapp-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521497" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521498" version="1" comment="libgstaudio-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521499" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521500" version="1" comment="libgstfft-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521501" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521502" version="1" comment="libgstpbutils-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521503" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521504" version="1" comment="libgstriff-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521505" version="1" comment="libgstrtp-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521506" version="1" comment="libgstrtsp-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521507" version="1" comment="libgstsdp-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521508" version="1" comment="libgsttag-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521509" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521510" version="1" comment="libgstvideo-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521511" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521512" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521513" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521514" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521515" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521516" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521517" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521518" version="1" comment="sqlite3 is &lt;3.8.10.2-9.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521519" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.36-18.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521520" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-18.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521521" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.36-18.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521522" version="1" comment="libgstapp-0_10-0 is &lt;0.10.36-18.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521523" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-18.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521524" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.36-18.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521525" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-18.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521526" version="1" comment="libssh2-1 is &lt;1.4.3-20.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521527" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-106.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521528" version="1" comment="libwireshark9 is &lt;2.4.15-48.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521529" version="1" comment="libwiretap7 is &lt;2.4.15-48.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521530" version="1" comment="libwscodecs1 is &lt;2.4.15-48.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521531" version="1" comment="libwsutil8 is &lt;2.4.15-48.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521532" version="1" comment="wireshark is &lt;2.4.15-48.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521533" version="1" comment="wireshark-gtk is &lt;2.4.15-48.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521534" version="1" comment="libnetpbm11 is &lt;10.66.3-8.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521535" version="1" comment="libnetpbm11-32bit is &lt;10.66.3-8.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521536" version="1" comment="netpbm is &lt;10.66.3-8.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521537" version="1" comment="MozillaFirefox is &lt;60.7.2-109.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521538" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.2-109.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521539" version="1" comment="postgresql96 is &lt;9.6.13-3.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521540" version="1" comment="ImageMagick is &lt;6.8.8.1-71.123.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521541" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.123.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521542" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.123.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521543" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.123.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521544" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.123.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521545" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.123.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521546" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.123.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521547" version="1" comment="dnsmasq is &lt;2.78-18.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521548" version="1" comment="glib2-lang is &lt;2.48.2-12.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521549" version="1" comment="glib2-tools is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521550" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521551" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521552" version="1" comment="libgio-fam is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521553" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521554" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521555" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521556" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521557" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521558" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521559" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521560" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521561" version="1" comment="elfutils is &lt;0.158-7.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521562" version="1" comment="libasm1 is &lt;0.158-7.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521563" version="1" comment="libdw1 is &lt;0.158-7.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521564" version="1" comment="libdw1-32bit is &lt;0.158-7.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521565" version="1" comment="libebl1 is &lt;0.158-7.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521566" version="1" comment="libebl1-32bit is &lt;0.158-7.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521567" version="1" comment="libelf1 is &lt;0.158-7.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521568" version="1" comment="libelf1-32bit is &lt;0.158-7.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521569" version="1" comment="avahi is &lt;0.6.32-32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521570" version="1" comment="avahi-lang is &lt;0.6.32-32.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521571" version="1" comment="libavahi-client3 is &lt;0.6.32-32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521572" version="1" comment="libavahi-client3-32bit is &lt;0.6.32-32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521573" version="1" comment="libavahi-common3 is &lt;0.6.32-32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521574" version="1" comment="libavahi-common3-32bit is &lt;0.6.32-32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521575" version="1" comment="libavahi-core7 is &lt;0.6.32-32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521576" version="1" comment="libavahi-glib1 is &lt;0.6.32-32.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521577" version="1" comment="libavahi-glib1-32bit is &lt;0.6.32-32.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521578" version="1" comment="libavahi-gobject0 is &lt;0.6.32-32.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521579" version="1" comment="libavahi-ui-gtk3-0 is &lt;0.6.32-32.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521580" version="1" comment="libavahi-ui0 is &lt;0.6.32-32.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521581" version="1" comment="libdns_sd is &lt;0.6.32-32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521582" version="1" comment="libdns_sd-32bit is &lt;0.6.32-32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521583" version="1" comment="kernel-default is &lt;4.4.180-94.100.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521584" version="1" comment="kernel-default-devel is &lt;4.4.180-94.100.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521585" version="1" comment="kernel-default-extra is &lt;4.4.180-94.100.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521586" version="1" comment="kernel-devel is &lt;4.4.180-94.100.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521587" version="1" comment="kernel-macros is &lt;4.4.180-94.100.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521588" version="1" comment="kernel-source is &lt;4.4.180-94.100.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521589" version="1" comment="kernel-syms is &lt;4.4.180-94.100.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521590" version="1" comment="libpolkit0 is &lt;0.113-5.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521591" version="1" comment="libpolkit0-32bit is &lt;0.113-5.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521592" version="1" comment="polkit is &lt;0.113-5.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521593" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521594" version="1" comment="libraw9 is &lt;0.15.4-27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521595" version="1" comment="rsyslog is &lt;8.24.0-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521596" version="1" comment="libspice-server1 is &lt;0.12.8-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521597" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521598" version="1" comment="python3 is &lt;3.4.6-25.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521599" version="1" comment="python3-base is &lt;3.4.6-25.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521600" version="1" comment="python3-curses is &lt;3.4.6-25.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521601" version="1" comment="curl is &lt;7.37.0-37.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521602" version="1" comment="libcurl4 is &lt;7.37.0-37.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521603" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521604" version="1" comment="libunwind is &lt;1.1-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521605" version="1" comment="MozillaFirefox is &lt;60.5.0esr-109.58.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521606" version="1" comment="MozillaFirefox-branding-SLE is &lt;60-32.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521607" version="1" comment="MozillaFirefox-translations-common is &lt;60.5.0esr-109.58.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521608" version="1" comment="libfreebl3 is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521609" version="1" comment="libfreebl3-32bit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521610" version="1" comment="libsoftokn3 is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521611" version="1" comment="libsoftokn3-32bit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521612" version="1" comment="mozilla-nss is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521613" version="1" comment="mozilla-nss-32bit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521614" version="1" comment="mozilla-nss-certs is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521615" version="1" comment="mozilla-nss-certs-32bit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521616" version="1" comment="mozilla-nss-sysinit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521617" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521618" version="1" comment="mozilla-nss-tools is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521619" version="1" comment="libpodofo0_9_2 is &lt;0.9.2-3.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521620" version="1" comment="python-numpy is &lt;1.8.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521621" version="1" comment="libsystemd0 is &lt;228-150.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521622" version="1" comment="libsystemd0-32bit is &lt;228-150.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521623" version="1" comment="libudev1 is &lt;228-150.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521624" version="1" comment="libudev1-32bit is &lt;228-150.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521625" version="1" comment="systemd is &lt;228-150.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521626" version="1" comment="systemd-32bit is &lt;228-150.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521627" version="1" comment="systemd-bash-completion is &lt;228-150.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521628" version="1" comment="systemd-sysvinit is &lt;228-150.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521629" version="1" comment="udev is &lt;228-150.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521630" version="1" comment="libprocps3 is &lt;3.3.9-11.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521631" version="1" comment="procps is &lt;3.3.9-11.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521632" version="1" comment="kernel-firmware is &lt;20170530-21.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521633" version="1" comment="ucode-amd is &lt;20170530-21.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521634" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521635" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521636" version="1" comment="python is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521637" version="1" comment="python-base is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521638" version="1" comment="python-curses is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521639" version="1" comment="python-devel is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521640" version="1" comment="python-tk is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521641" version="1" comment="python-xml is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521642" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.201-43.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521643" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.201-43.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521644" version="1" comment="ceph-common is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521645" version="1" comment="libcephfs2 is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521646" version="1" comment="librados2 is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521647" version="1" comment="libradosstriper1 is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521648" version="1" comment="librbd1 is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521649" version="1" comment="librgw2 is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521650" version="1" comment="python-cephfs is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521651" version="1" comment="python-rados is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521652" version="1" comment="python-rbd is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521653" version="1" comment="python-rgw is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521654" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.6-2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521655" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.6-2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521656" version="1" comment="libwebkit2gtk3-lang is &lt;2.22.6-2.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521657" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.6-2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521658" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.6-2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521659" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.6-2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521660" version="1" comment="kernel-default is &lt;4.4.175-94.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521661" version="1" comment="kernel-default-devel is &lt;4.4.175-94.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521662" version="1" comment="kernel-default-extra is &lt;4.4.175-94.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521663" version="1" comment="kernel-devel is &lt;4.4.175-94.79.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521664" version="1" comment="kernel-macros is &lt;4.4.175-94.79.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521665" version="1" comment="kernel-source is &lt;4.4.175-94.79.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521666" version="1" comment="kernel-syms is &lt;4.4.175-94.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521667" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.191-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521668" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.191-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521669" version="1" comment="qemu is &lt;2.9.1-6.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521670" version="1" comment="qemu-block-curl is &lt;2.9.1-6.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521671" version="1" comment="qemu-ipxe is &lt;1.0.0+-6.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521672" version="1" comment="qemu-kvm is &lt;2.9.1-6.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521673" version="1" comment="qemu-seabios is &lt;1.10.2-6.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521674" version="1" comment="qemu-sgabios is &lt;8-6.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521675" version="1" comment="qemu-tools is &lt;2.9.1-6.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521676" version="1" comment="qemu-vgabios is &lt;1.10.2-6.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521677" version="1" comment="qemu-x86 is &lt;2.9.1-6.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521678" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.4-2.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521679" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.4-2.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521680" version="1" comment="libwebkit2gtk3-lang is &lt;2.22.4-2.29.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521681" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.4-2.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521682" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.4-2.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521683" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.4-2.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521684" version="1" comment="lftp is &lt;4.7.4-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521685" version="1" comment="libssh2-1 is &lt;1.4.3-20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521686" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521687" version="1" comment="libwsman1 is &lt;2.4.11-21.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521688" version="1" comment="libwsman_clientpp1 is &lt;2.4.11-21.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521689" version="1" comment="openwsman-server is &lt;2.4.11-21.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521690" version="1" comment="libwireshark9 is &lt;2.4.13-48.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521691" version="1" comment="libwiretap7 is &lt;2.4.13-48.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521692" version="1" comment="libwscodecs1 is &lt;2.4.13-48.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521693" version="1" comment="libwsutil8 is &lt;2.4.13-48.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521694" version="1" comment="wireshark is &lt;2.4.13-48.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521695" version="1" comment="wireshark-gtk is &lt;2.4.13-48.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521696" version="1" comment="ghostscript is &lt;9.26a-23.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521697" version="1" comment="ghostscript-x11 is &lt;9.26a-23.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521698" version="1" comment="ucode-intel is &lt;20190312-13.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521699" version="1" comment="gd is &lt;2.1.0-24.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521700" version="1" comment="gd-32bit is &lt;2.1.0-24.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521701" version="1" comment="w3m is &lt;0.5.3.git20161120-161.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521702" version="1" comment="ntp is &lt;4.2.8p13-85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521703" version="1" comment="ntp-doc is &lt;4.2.8p13-85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521704" version="1" comment="kernel-default is &lt;4.4.176-94.88.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521705" version="1" comment="kernel-default-devel is &lt;4.4.176-94.88.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521706" version="1" comment="kernel-default-extra is &lt;4.4.176-94.88.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521707" version="1" comment="kernel-devel is &lt;4.4.176-94.88.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521708" version="1" comment="kernel-macros is &lt;4.4.176-94.88.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521709" version="1" comment="kernel-source is &lt;4.4.176-94.88.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521710" version="1" comment="kernel-syms is &lt;4.4.176-94.88.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521711" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521712" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521713" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521714" version="1" comment="openssl is &lt;1.0.2j-60.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521715" version="1" comment="adcli is &lt;0.8.2-1.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521716" version="1" comment="libipa_hbac0 is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521717" version="1" comment="libsss_idmap0 is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521718" version="1" comment="libsss_nss_idmap0 is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521719" version="1" comment="libsss_sudo is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521720" version="1" comment="python-sssd-config is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521721" version="1" comment="sssd is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521722" version="1" comment="sssd-32bit is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521723" version="1" comment="sssd-ad is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521724" version="1" comment="sssd-ipa is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521725" version="1" comment="sssd-krb5 is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521726" version="1" comment="sssd-krb5-common is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521727" version="1" comment="sssd-ldap is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521728" version="1" comment="sssd-proxy is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521729" version="1" comment="sssd-tools is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521730" version="1" comment="libipa_hbac0 is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521731" version="1" comment="libsss_idmap0 is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521732" version="1" comment="libsss_nss_idmap0 is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521733" version="1" comment="libsss_sudo is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521734" version="1" comment="python-sssd-config is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521735" version="1" comment="sssd is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521736" version="1" comment="sssd-32bit is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521737" version="1" comment="sssd-ad is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521738" version="1" comment="sssd-ipa is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521739" version="1" comment="sssd-krb5 is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521740" version="1" comment="sssd-krb5-common is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521741" version="1" comment="sssd-ldap is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521742" version="1" comment="sssd-proxy is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521743" version="1" comment="sssd-tools is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521744" version="1" comment="bash is &lt;4.3-83.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521745" version="1" comment="bash-doc is &lt;4.3-83.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521746" version="1" comment="bash-lang is &lt;4.3-83.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521747" version="1" comment="libreadline6 is &lt;6.3-83.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521748" version="1" comment="libreadline6-32bit is &lt;6.3-83.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521749" version="1" comment="readline-doc is &lt;6.3-83.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521750" version="1" comment="file is &lt;5.22-10.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521751" version="1" comment="file-magic is &lt;5.22-10.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521752" version="1" comment="libmagic1 is &lt;5.22-10.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521753" version="1" comment="libmagic1-32bit is &lt;5.22-10.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521754" version="1" comment="MozillaFirefox is &lt;60.6.1esr-109.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521755" version="1" comment="MozillaFirefox-translations-common is &lt;60.6.1esr-109.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521756" version="1" comment="clamav is &lt;0.100.3-33.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521757" version="1" comment="libSDL-1_2-0 is &lt;1.2.15-15.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521758" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521759" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521760" version="1" comment="sqlite3 is &lt;3.8.10.2-9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521761" version="1" comment="xen is &lt;4.9.4_02-3.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521762" version="1" comment="xen-libs is &lt;4.9.4_02-3.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521763" version="1" comment="xen-libs-32bit is &lt;4.9.4_02-3.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521764" version="1" comment="wget is &lt;1.14-21.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521765" version="1" comment="qemu is &lt;2.9.1-6.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521766" version="1" comment="qemu-block-curl is &lt;2.9.1-6.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521767" version="1" comment="qemu-ipxe is &lt;1.0.0+-6.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521768" version="1" comment="qemu-kvm is &lt;2.9.1-6.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521769" version="1" comment="qemu-seabios is &lt;1.10.2-6.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521770" version="1" comment="qemu-sgabios is &lt;8-6.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521771" version="1" comment="qemu-tools is &lt;2.9.1-6.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521772" version="1" comment="qemu-vgabios is &lt;1.10.2-6.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521773" version="1" comment="qemu-x86 is &lt;2.9.1-6.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521774" version="1" comment="libSoundTouch0 is &lt;1.7.1-5.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521775" version="1" comment="libSoundTouch0-32bit is &lt;1.7.1-5.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521776" version="1" comment="soundtouch is &lt;1.7.1-5.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521777" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521778" version="1" comment="python3 is &lt;3.4.6-25.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521779" version="1" comment="python3-base is &lt;3.4.6-25.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521780" version="1" comment="python3-curses is &lt;3.4.6-25.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521781" version="1" comment="curl is &lt;7.37.0-37.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521782" version="1" comment="libcurl4 is &lt;7.37.0-37.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521783" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521784" version="1" comment="python3-rpm is &lt;4.11.2-16.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521785" version="1" comment="libopenssl1_1 is &lt;1.1.1-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521786" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521787" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521788" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521789" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2p-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521790" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521791" version="1" comment="python3-cryptography is &lt;1.3.1-7.13.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521792" version="1" comment="python3-pyOpenSSL is &lt;16.0.0-4.11.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521793" version="1" comment="kernel-default is &lt;4.12.14-95.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521794" version="1" comment="kernel-default-devel is &lt;4.12.14-95.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521795" version="1" comment="kernel-default-extra is &lt;4.12.14-95.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521796" version="1" comment="kernel-devel is &lt;4.12.14-95.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521797" version="1" comment="kernel-macros is &lt;4.12.14-95.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521798" version="1" comment="kernel-source is &lt;4.12.14-95.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521799" version="1" comment="kernel-syms is &lt;4.12.14-95.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521800" version="1" comment="qemu is &lt;2.11.2-5.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521801" version="1" comment="qemu-block-curl is &lt;2.11.2-5.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521802" version="1" comment="qemu-ipxe is &lt;1.0.0+-5.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521803" version="1" comment="qemu-kvm is &lt;2.11.2-5.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521804" version="1" comment="qemu-seabios is &lt;1.11.0-5.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521805" version="1" comment="qemu-sgabios is &lt;8-5.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521806" version="1" comment="qemu-tools is &lt;2.11.2-5.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521807" version="1" comment="qemu-vgabios is &lt;1.11.0-5.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521808" version="1" comment="qemu-x86 is &lt;2.11.2-5.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521809" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1510945757.b2662641d5-3.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521810" version="1" comment="libmysqlclient18 is &lt;10.0.37-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521811" version="1" comment="libmysqlclient18-32bit is &lt;10.0.37-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521812" version="1" comment="libmysqlclient_r18 is &lt;10.0.37-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521813" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.37-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521814" version="1" comment="mariadb-100-errormessages is &lt;10.0.37-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521815" version="1" comment="glibc is &lt;2.22-100.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521816" version="1" comment="glibc-32bit is &lt;2.22-100.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521817" version="1" comment="glibc-devel is &lt;2.22-100.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521818" version="1" comment="glibc-devel-32bit is &lt;2.22-100.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521819" version="1" comment="glibc-i18ndata is &lt;2.22-100.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521820" version="1" comment="glibc-locale is &lt;2.22-100.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521821" version="1" comment="glibc-locale-32bit is &lt;2.22-100.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521822" version="1" comment="nscd is &lt;2.22-100.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521823" version="1" comment="libopenssl1_1 is &lt;1.1.1b-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521824" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1b-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521825" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1510945757.b2662641d5-3.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521826" version="1" comment="mariadb is &lt;10.2.21-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521827" version="1" comment="mariadb-client is &lt;10.2.21-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521828" version="1" comment="mariadb-errormessages is &lt;10.2.21-3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521829" version="1" comment="qemu is &lt;2.11.2-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521830" version="1" comment="qemu-block-curl is &lt;2.11.2-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521831" version="1" comment="qemu-ipxe is &lt;1.0.0+-5.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521832" version="1" comment="qemu-kvm is &lt;2.11.2-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521833" version="1" comment="qemu-seabios is &lt;1.11.0-5.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521834" version="1" comment="qemu-sgabios is &lt;8-5.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521835" version="1" comment="qemu-tools is &lt;2.11.2-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521836" version="1" comment="qemu-vgabios is &lt;1.11.0-5.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521837" version="1" comment="qemu-x86 is &lt;2.11.2-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521838" version="1" comment="kernel-default is &lt;4.12.14-95.16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521839" version="1" comment="kernel-default-devel is &lt;4.12.14-95.16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521840" version="1" comment="kernel-default-extra is &lt;4.12.14-95.16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521841" version="1" comment="kernel-devel is &lt;4.12.14-95.16.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521842" version="1" comment="kernel-macros is &lt;4.12.14-95.16.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521843" version="1" comment="kernel-source is &lt;4.12.14-95.16.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521844" version="1" comment="kernel-syms is &lt;4.12.14-95.16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521845" version="1" comment="xen is &lt;4.11.1_06-2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521846" version="1" comment="xen-libs is &lt;4.11.1_06-2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521847" version="1" comment="xen-libs-32bit is &lt;4.11.1_06-2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521848" version="1" comment="libvirt is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521849" version="1" comment="libvirt-admin is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521850" version="1" comment="libvirt-client is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521851" version="1" comment="libvirt-daemon is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521852" version="1" comment="libvirt-daemon-config-network is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521853" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521854" version="1" comment="libvirt-daemon-driver-interface is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521855" version="1" comment="libvirt-daemon-driver-libxl is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521856" version="1" comment="libvirt-daemon-driver-lxc is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521857" version="1" comment="libvirt-daemon-driver-network is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521858" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521859" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521860" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521861" version="1" comment="libvirt-daemon-driver-secret is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521862" version="1" comment="libvirt-daemon-driver-storage is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521863" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521864" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521865" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521866" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521867" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521868" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521869" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521870" version="1" comment="libvirt-daemon-lxc is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521871" version="1" comment="libvirt-daemon-qemu is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521872" version="1" comment="libvirt-daemon-xen is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521873" version="1" comment="libvirt-doc is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521874" version="1" comment="libvirt-libs is &lt;4.0.0-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521875" version="1" comment="libipa_hbac0 is &lt;1.16.1-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521876" version="1" comment="libsss_certmap0 is &lt;1.16.1-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521877" version="1" comment="libsss_idmap0 is &lt;1.16.1-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521878" version="1" comment="libsss_nss_idmap0 is &lt;1.16.1-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521879" version="1" comment="libsss_simpleifp0 is &lt;1.16.1-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521880" version="1" comment="python-sssd-config is &lt;1.16.1-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521881" version="1" comment="sssd is &lt;1.16.1-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521882" version="1" comment="sssd-32bit is &lt;1.16.1-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521883" version="1" comment="sssd-ad is &lt;1.16.1-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521884" version="1" comment="sssd-ipa is &lt;1.16.1-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521885" version="1" comment="sssd-krb5 is &lt;1.16.1-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521886" version="1" comment="sssd-krb5-common is &lt;1.16.1-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521887" version="1" comment="sssd-ldap is &lt;1.16.1-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521888" version="1" comment="sssd-proxy is &lt;1.16.1-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521889" version="1" comment="sssd-tools is &lt;1.16.1-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521890" version="1" comment="kernel-default is &lt;4.12.14-95.19.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521891" version="1" comment="kernel-default-devel is &lt;4.12.14-95.19.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521892" version="1" comment="kernel-default-extra is &lt;4.12.14-95.19.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521893" version="1" comment="kernel-devel is &lt;4.12.14-95.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521894" version="1" comment="kernel-macros is &lt;4.12.14-95.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521895" version="1" comment="kernel-source is &lt;4.12.14-95.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521896" version="1" comment="kernel-syms is &lt;4.12.14-95.19.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521897" version="1" comment="libvirt is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521898" version="1" comment="libvirt-admin is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521899" version="1" comment="libvirt-client is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521900" version="1" comment="libvirt-daemon is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521901" version="1" comment="libvirt-daemon-config-network is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521902" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521903" version="1" comment="libvirt-daemon-driver-interface is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521904" version="1" comment="libvirt-daemon-driver-libxl is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521905" version="1" comment="libvirt-daemon-driver-lxc is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521906" version="1" comment="libvirt-daemon-driver-network is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521907" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521908" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521909" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521910" version="1" comment="libvirt-daemon-driver-secret is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521911" version="1" comment="libvirt-daemon-driver-storage is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521912" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521913" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521914" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521915" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521916" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521917" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521918" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521919" version="1" comment="libvirt-daemon-lxc is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521920" version="1" comment="libvirt-daemon-qemu is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521921" version="1" comment="libvirt-daemon-xen is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521922" version="1" comment="libvirt-doc is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521923" version="1" comment="libvirt-libs is &lt;4.0.0-8.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521924" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521925" version="1" comment="glibc is &lt;2.22-100.15.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521926" version="1" comment="glibc-32bit is &lt;2.22-100.15.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521927" version="1" comment="glibc-devel is &lt;2.22-100.15.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521928" version="1" comment="glibc-devel-32bit is &lt;2.22-100.15.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521929" version="1" comment="glibc-i18ndata is &lt;2.22-100.15.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521930" version="1" comment="glibc-locale is &lt;2.22-100.15.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521931" version="1" comment="glibc-locale-32bit is &lt;2.22-100.15.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521932" version="1" comment="nscd is &lt;2.22-100.15.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521933" version="1" comment="libelf-devel is &lt;0.158-7.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521934" version="1" comment="libu2f-host0 is &lt;1.1.6-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521935" version="1" comment="pam_u2f is &lt;1.0.8-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521936" version="1" comment="libecpg6 is &lt;10.9-1.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521937" version="1" comment="libpq5 is &lt;10.9-1.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521938" version="1" comment="libpq5-32bit is &lt;10.9-1.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521939" version="1" comment="postgresql10 is &lt;10.9-1.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521940" version="1" comment="libzmq3 is &lt;4.0.4-15.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521941" version="1" comment="kernel-firmware is &lt;20190618-5.8.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521942" version="1" comment="ucode-amd is &lt;20190618-5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521943" version="1" comment="glib2-lang is &lt;2.48.2-12.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521944" version="1" comment="glib2-tools is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521945" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521946" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521947" version="1" comment="libgio-fam is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521948" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521949" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521950" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521951" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521952" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521953" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521954" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521955" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521956" version="1" comment="expat is &lt;2.1.0-21.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521957" version="1" comment="libexpat1 is &lt;2.1.0-21.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521958" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521959" version="1" comment="xrdp is &lt;0.9.0~git.1456906198.f422461-21.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521960" version="1" comment="libpodofo0_9_2 is &lt;0.9.2-3.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521961" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.2-2.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521962" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.2-2.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521963" version="1" comment="libwebkit2gtk3-lang is &lt;2.24.2-2.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521964" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.2-2.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521965" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.2-2.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521966" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.2-2.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521967" version="1" comment="kernel-default is &lt;4.12.14-95.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521968" version="1" comment="kernel-default-devel is &lt;4.12.14-95.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521969" version="1" comment="kernel-default-extra is &lt;4.12.14-95.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521970" version="1" comment="kernel-devel is &lt;4.12.14-95.24.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521971" version="1" comment="kernel-macros is &lt;4.12.14-95.24.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521972" version="1" comment="kernel-source is &lt;4.12.14-95.24.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521973" version="1" comment="kernel-syms is &lt;4.12.14-95.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521974" version="1" comment="MozillaFirefox is &lt;60.8.0-109.83.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521975" version="1" comment="MozillaFirefox-translations-common is &lt;60.8.0-109.83.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521976" version="1" comment="libfreebl3 is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521977" version="1" comment="libfreebl3-32bit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521978" version="1" comment="libsoftokn3 is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521979" version="1" comment="libsoftokn3-32bit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521980" version="1" comment="mozilla-nss is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521981" version="1" comment="mozilla-nss-32bit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521982" version="1" comment="mozilla-nss-certs is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521983" version="1" comment="mozilla-nss-certs-32bit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521984" version="1" comment="mozilla-nss-sysinit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521985" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521986" version="1" comment="mozilla-nss-tools is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521987" version="1" comment="libxslt-tools is &lt;1.1.28-17.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521988" version="1" comment="libxslt1 is &lt;1.1.28-17.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521989" version="1" comment="libxslt1-32bit is &lt;1.1.28-17.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521990" version="1" comment="libxml2-2 is &lt;2.9.4-46.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521991" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521992" version="1" comment="libxml2-tools is &lt;2.9.4-46.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521993" version="1" comment="python-libxml2 is &lt;2.9.4-46.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521994" version="1" comment="ucode-intel is &lt;20190618-13.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521995" version="1" comment="bzip2 is &lt;1.0.6-30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521996" version="1" comment="libbz2-1 is &lt;1.0.6-30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521997" version="1" comment="libbz2-1-32bit is &lt;1.0.6-30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521998" version="1" comment="kernel-default is &lt;4.12.14-95.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521999" version="1" comment="kernel-default-devel is &lt;4.12.14-95.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522000" version="1" comment="kernel-default-extra is &lt;4.12.14-95.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522001" version="1" comment="kernel-devel is &lt;4.12.14-95.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522002" version="1" comment="kernel-macros is &lt;4.12.14-95.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522003" version="1" comment="kernel-source is &lt;4.12.14-95.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522004" version="1" comment="kernel-syms is &lt;4.12.14-95.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522005" version="1" comment="perl-Mail-SpamAssassin is &lt;3.4.2-44.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522006" version="1" comment="spamassassin is &lt;3.4.2-44.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522007" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522008" version="1" comment="libIlmImf-Imf_2_1-21-32bit is &lt;2.1.0-6.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522009" version="1" comment="openexr is &lt;2.1.0-6.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522010" version="1" comment="libsolv-tools is &lt;0.6.36-2.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522011" version="1" comment="libzypp is &lt;16.20.0-2.39.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522012" version="1" comment="python-solv is &lt;0.6.36-2.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522013" version="1" comment="zypper is &lt;1.13.51-21.26.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522014" version="1" comment="zypper-log is &lt;1.13.51-21.26.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522015" version="1" comment="cron is &lt;4.2-59.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522016" version="1" comment="cronie is &lt;1.4.11-59.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522017" version="1" comment="curl is &lt;7.60.0-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522018" version="1" comment="libcurl4 is &lt;7.60.0-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522019" version="1" comment="libcurl4-32bit is &lt;7.60.0-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522020" version="1" comment="ImageMagick is &lt;6.8.8.1-71.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522021" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522022" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522023" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522024" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522025" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522026" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522027" version="1" comment="bzip2 is &lt;1.0.6-30.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522028" version="1" comment="libbz2-1 is &lt;1.0.6-30.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522029" version="1" comment="libbz2-1-32bit is &lt;1.0.6-30.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522030" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522031" version="1" comment="libIlmImf-Imf_2_1-21-32bit is &lt;2.1.0-6.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522032" version="1" comment="openexr is &lt;2.1.0-6.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522033" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.231-43.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522034" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.231-43.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522035" version="1" comment="libpolkit0 is &lt;0.113-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522036" version="1" comment="libpolkit0-32bit is &lt;0.113-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522037" version="1" comment="polkit is &lt;0.113-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522038" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522039" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.222-27.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522040" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.222-27.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522041" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522042" version="1" comment="python3 is &lt;3.4.6-25.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522043" version="1" comment="python3-base is &lt;3.4.6-25.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522044" version="1" comment="python3-curses is &lt;3.4.6-25.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522045" version="1" comment="kernel-default is &lt;4.12.14-95.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522046" version="1" comment="kernel-default-devel is &lt;4.12.14-95.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522047" version="1" comment="kernel-default-extra is &lt;4.12.14-95.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522048" version="1" comment="kernel-devel is &lt;4.12.14-95.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522049" version="1" comment="kernel-macros is &lt;4.12.14-95.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522050" version="1" comment="kernel-source is &lt;4.12.14-95.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522051" version="1" comment="kernel-syms is &lt;4.12.14-95.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522052" version="1" comment="evince is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522053" version="1" comment="evince-browser-plugin is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522054" version="1" comment="evince-lang is &lt;3.20.2-6.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522055" version="1" comment="evince-plugin-djvudocument is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522056" version="1" comment="evince-plugin-dvidocument is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522057" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522058" version="1" comment="evince-plugin-psdocument is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522059" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522060" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522061" version="1" comment="libevdocument3-4 is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522062" version="1" comment="libevview3-3 is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522063" version="1" comment="nautilus-evince is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522064" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522065" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522066" version="1" comment="tcpdump is &lt;4.9.2-14.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522067" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522068" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522069" version="1" comment="python is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522070" version="1" comment="python-base is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522071" version="1" comment="python-curses is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522072" version="1" comment="python-devel is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522073" version="1" comment="python-tk is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522074" version="1" comment="python-xml is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522075" version="1" comment="libwireshark9 is &lt;2.4.16-48.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522076" version="1" comment="libwiretap7 is &lt;2.4.16-48.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522077" version="1" comment="libwscodecs1 is &lt;2.4.16-48.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522078" version="1" comment="libwsutil8 is &lt;2.4.16-48.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522079" version="1" comment="wireshark is &lt;2.4.16-48.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522080" version="1" comment="wireshark-gtk is &lt;2.4.16-48.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522081" version="1" comment="libmysqlclient18 is &lt;10.0.38-2.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522082" version="1" comment="libmysqlclient18-32bit is &lt;10.0.38-2.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522083" version="1" comment="libmysqlclient_r18 is &lt;10.0.38-2.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522084" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.38-2.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522085" version="1" comment="mariadb-100-errormessages is &lt;10.0.38-2.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522086" version="1" comment="libopenjp2-7 is &lt;2.1.0-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522087" version="1" comment="NetworkManager is &lt;1.0.12-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522088" version="1" comment="NetworkManager-lang is &lt;1.0.12-13.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522089" version="1" comment="libnm-glib-vpn1 is &lt;1.0.12-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522090" version="1" comment="libnm-glib4 is &lt;1.0.12-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522091" version="1" comment="libnm-util2 is &lt;1.0.12-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522092" version="1" comment="libnm0 is &lt;1.0.12-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522093" version="1" comment="typelib-1_0-NM-1_0 is &lt;1.0.12-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522094" version="1" comment="typelib-1_0-NMClient-1_0 is &lt;1.0.12-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522095" version="1" comment="typelib-1_0-NetworkManager-1_0 is &lt;1.0.12-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522096" version="1" comment="perl is &lt;5.18.2-12.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522097" version="1" comment="perl-32bit is &lt;5.18.2-12.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522098" version="1" comment="perl-base is &lt;5.18.2-12.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522099" version="1" comment="perl-doc is &lt;5.18.2-12.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522100" version="1" comment="libsolv-tools is &lt;0.6.36-2.27.19.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522101" version="1" comment="libzypp is &lt;16.20.2-27.60.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522102" version="1" comment="python-solv is &lt;0.6.36-2.27.19.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522103" version="1" comment="zypper is &lt;1.13.54-18.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522104" version="1" comment="zypper-log is &lt;1.13.54-18.40.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522105" version="1" comment="libecpg6 is &lt;10.10-1.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522106" version="1" comment="libpq5 is &lt;10.10-1.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522107" version="1" comment="libpq5-32bit is &lt;10.10-1.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522108" version="1" comment="postgresql10 is &lt;10.10-1.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522109" version="1" comment="libmariadb3 is &lt;3.1.2-2.6.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522110" version="1" comment="libmariadb_plugins is &lt;3.1.2-2.6.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522111" version="1" comment="mariadb is &lt;10.2.25-3.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522112" version="1" comment="mariadb-client is &lt;10.2.25-3.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522113" version="1" comment="mariadb-errormessages is &lt;10.2.25-3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522114" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.4-2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522115" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.4-2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522116" version="1" comment="libwebkit2gtk3-lang is &lt;2.24.4-2.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522117" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.4-2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522118" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.4-2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522119" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.4-2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522120" version="1" comment="ghostscript is &lt;9.26a-23.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522121" version="1" comment="ghostscript-x11 is &lt;9.26a-23.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522122" version="1" comment="qemu is &lt;2.11.2-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522123" version="1" comment="qemu-block-curl is &lt;2.11.2-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522124" version="1" comment="qemu-ipxe is &lt;1.0.0+-5.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522125" version="1" comment="qemu-kvm is &lt;2.11.2-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522126" version="1" comment="qemu-seabios is &lt;1.11.0-5.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522127" version="1" comment="qemu-sgabios is &lt;8-5.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522128" version="1" comment="qemu-tools is &lt;2.11.2-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522129" version="1" comment="qemu-vgabios is &lt;1.11.0-5.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522130" version="1" comment="qemu-x86 is &lt;2.11.2-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522131" version="1" comment="ceph-common is &lt;12.2.12+git.1568024032.02236657ca-2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522132" version="1" comment="libcephfs2 is &lt;12.2.12+git.1568024032.02236657ca-2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522133" version="1" comment="librados2 is &lt;12.2.12+git.1568024032.02236657ca-2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522134" version="1" comment="libradosstriper1 is &lt;12.2.12+git.1568024032.02236657ca-2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522135" version="1" comment="librbd1 is &lt;12.2.12+git.1568024032.02236657ca-2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522136" version="1" comment="librgw2 is &lt;12.2.12+git.1568024032.02236657ca-2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522137" version="1" comment="python-cephfs is &lt;12.2.12+git.1568024032.02236657ca-2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522138" version="1" comment="python-rados is &lt;12.2.12+git.1568024032.02236657ca-2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522139" version="1" comment="python-rbd is &lt;12.2.12+git.1568024032.02236657ca-2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522140" version="1" comment="python-rgw is &lt;12.2.12+git.1568024032.02236657ca-2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522141" version="1" comment="curl is &lt;7.60.0-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522142" version="1" comment="libcurl4 is &lt;7.60.0-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522143" version="1" comment="libcurl4-32bit is &lt;7.60.0-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522144" version="1" comment="ibus is &lt;1.5.13-15.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522145" version="1" comment="ibus-gtk is &lt;1.5.13-15.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522146" version="1" comment="ibus-gtk3 is &lt;1.5.13-15.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522147" version="1" comment="ibus-gtk3-32bit is &lt;1.5.13-15.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522148" version="1" comment="ibus-lang is &lt;1.5.13-15.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522149" version="1" comment="libibus-1_0-5 is &lt;1.5.13-15.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522150" version="1" comment="libibus-1_0-5-32bit is &lt;1.5.13-15.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522151" version="1" comment="python-ibus is &lt;1.5.13-15.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522152" version="1" comment="typelib-1_0-IBus-1_0 is &lt;1.5.13-15.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522153" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522154" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522155" version="1" comment="openldap2-client is &lt;2.4.41-18.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522156" version="1" comment="openldap2-doc is &lt;2.4.41-18.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522157" version="1" comment="libreoffice is &lt;6.2.7.1-43.56.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522158" version="1" comment="libreoffice-base is &lt;6.2.7.1-43.56.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522159" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.2.7.1-43.56.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522160" version="1" comment="libreoffice-branding-upstream is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522161" version="1" comment="libreoffice-calc is &lt;6.2.7.1-43.56.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522162" version="1" comment="libreoffice-calc-extensions is &lt;6.2.7.1-43.56.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522163" version="1" comment="libreoffice-draw is &lt;6.2.7.1-43.56.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522164" version="1" comment="libreoffice-filters-optional is &lt;6.2.7.1-43.56.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522165" version="1" comment="libreoffice-gnome is &lt;6.2.7.1-43.56.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522166" version="1" comment="libreoffice-gtk2 is &lt;6.2.7.1-43.56.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522167" version="1" comment="libreoffice-icon-themes is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522168" version="1" comment="libreoffice-impress is &lt;6.2.7.1-43.56.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522169" version="1" comment="libreoffice-l10n-af is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522170" version="1" comment="libreoffice-l10n-ar is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522171" version="1" comment="libreoffice-l10n-ca is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522172" version="1" comment="libreoffice-l10n-cs is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522173" version="1" comment="libreoffice-l10n-da is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522174" version="1" comment="libreoffice-l10n-de is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522175" version="1" comment="libreoffice-l10n-en is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522176" version="1" comment="libreoffice-l10n-es is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522177" version="1" comment="libreoffice-l10n-fi is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522178" version="1" comment="libreoffice-l10n-fr is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522179" version="1" comment="libreoffice-l10n-gu is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522180" version="1" comment="libreoffice-l10n-hi is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522181" version="1" comment="libreoffice-l10n-hu is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522182" version="1" comment="libreoffice-l10n-it is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522183" version="1" comment="libreoffice-l10n-ja is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522184" version="1" comment="libreoffice-l10n-ko is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522185" version="1" comment="libreoffice-l10n-nb is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522186" version="1" comment="libreoffice-l10n-nl is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522187" version="1" comment="libreoffice-l10n-nn is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522188" version="1" comment="libreoffice-l10n-pl is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522189" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522190" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522191" version="1" comment="libreoffice-l10n-ro is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522192" version="1" comment="libreoffice-l10n-ru is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522193" version="1" comment="libreoffice-l10n-sk is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522194" version="1" comment="libreoffice-l10n-sv is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522195" version="1" comment="libreoffice-l10n-xh is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522196" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522197" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522198" version="1" comment="libreoffice-l10n-zu is &lt;6.2.7.1-43.56.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522199" version="1" comment="libreoffice-mailmerge is &lt;6.2.7.1-43.56.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522200" version="1" comment="libreoffice-math is &lt;6.2.7.1-43.56.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522201" version="1" comment="libreoffice-officebean is &lt;6.2.7.1-43.56.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522202" version="1" comment="libreoffice-pyuno is &lt;6.2.7.1-43.56.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522203" version="1" comment="libreoffice-writer is &lt;6.2.7.1-43.56.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522204" version="1" comment="libreoffice-writer-extensions is &lt;6.2.7.1-43.56.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522205" version="1" comment="kernel-default is &lt;4.12.14-95.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522206" version="1" comment="kernel-default-devel is &lt;4.12.14-95.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522207" version="1" comment="kernel-default-extra is &lt;4.12.14-95.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522208" version="1" comment="kernel-devel is &lt;4.12.14-95.32.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522209" version="1" comment="kernel-macros is &lt;4.12.14-95.32.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522210" version="1" comment="kernel-source is &lt;4.12.14-95.32.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522211" version="1" comment="kernel-syms is &lt;4.12.14-95.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522212" version="1" comment="MozillaFirefox is &lt;60.9.0-109.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522213" version="1" comment="MozillaFirefox-translations-common is &lt;60.9.0-109.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522214" version="1" comment="expat is &lt;2.1.0-21.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522215" version="1" comment="libexpat1 is &lt;2.1.0-21.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522216" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522217" version="1" comment="libdjvulibre21 is &lt;3.5.25.3-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522218" version="1" comment="ghostscript is &lt;9.27-23.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522219" version="1" comment="ghostscript-x11 is &lt;9.27-23.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522220" version="1" comment="gpg2 is &lt;2.0.24-9.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522221" version="1" comment="gpg2-lang is &lt;2.0.24-9.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522222" version="1" comment="bind-utils is &lt;9.11.2-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522223" version="1" comment="libbind9-160 is &lt;9.11.2-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522224" version="1" comment="libdns169 is &lt;9.11.2-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522225" version="1" comment="libirs160 is &lt;9.11.2-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522226" version="1" comment="libisc166 is &lt;9.11.2-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522227" version="1" comment="libisc166-32bit is &lt;9.11.2-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522228" version="1" comment="libisccc160 is &lt;9.11.2-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522229" version="1" comment="libisccfg160 is &lt;9.11.2-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522230" version="1" comment="liblwres160 is &lt;9.11.2-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522231" version="1" comment="python-bind is &lt;9.11.2-3.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522232" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522233" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522234" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2p-3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522235" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522236" version="1" comment="libgcrypt20 is &lt;1.6.1-16.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522237" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522238" version="1" comment="libjasper1 is &lt;1.900.14-195.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522239" version="1" comment="libjasper1-32bit is &lt;1.900.14-195.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522240" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522241" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522242" version="1" comment="sqlite3 is &lt;3.8.10.2-9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522243" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-106.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522244" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-106.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522245" version="1" comment="MozillaFirefox is &lt;68.1.0-109.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522246" version="1" comment="MozillaFirefox-branding-SLE is &lt;68-32.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522247" version="1" comment="MozillaFirefox-translations-common is &lt;68.1.0-109.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522248" version="1" comment="binutils is &lt;2.32-9.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522249" version="1" comment="sudo is &lt;1.8.20p2-3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522250" version="1" comment="libpcap1 is &lt;1.8.1-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522251" version="1" comment="libpcap1-32bit is &lt;1.8.1-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522252" version="1" comment="tcpdump is &lt;4.9.2-14.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522253" version="1" comment="libmysqlclient18 is &lt;10.0.40.1-2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522254" version="1" comment="libmysqlclient18-32bit is &lt;10.0.40.1-2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522255" version="1" comment="libmysqlclient_r18 is &lt;10.0.40.1-2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522256" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.40.1-2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522257" version="1" comment="mariadb-100-errormessages is &lt;10.0.40.1-2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522258" version="1" comment="python-xdg is &lt;0.25-9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522259" version="1" comment="dhcp is &lt;4.3.3-10.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522260" version="1" comment="dhcp-client is &lt;4.3.3-10.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522261" version="1" comment="openconnect is &lt;7.08-3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522262" version="1" comment="openconnect-lang is &lt;7.08-3.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522263" version="1" comment="libcaca0 is &lt;0.99.beta18-14.3.27 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522264" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522265" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522266" version="1" comment="python is &lt;2.7.13-28.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522267" version="1" comment="python-base is &lt;2.7.13-28.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522268" version="1" comment="python-curses is &lt;2.7.13-28.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522269" version="1" comment="python-devel is &lt;2.7.13-28.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522270" version="1" comment="python-tk is &lt;2.7.13-28.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522271" version="1" comment="python-xml is &lt;2.7.13-28.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522272" version="1" comment="sysstat is &lt;12.0.2-10.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522273" version="1" comment="xen is &lt;4.11.2_02-2.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522274" version="1" comment="xen-libs is &lt;4.11.2_02-2.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522275" version="1" comment="xen-libs-32bit is &lt;4.11.2_02-2.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522276" version="1" comment="accountsservice is &lt;0.6.42-16.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522277" version="1" comment="accountsservice-lang is &lt;0.6.42-16.8.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522278" version="1" comment="libaccountsservice0 is &lt;0.6.42-16.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522279" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.42-16.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522280" version="1" comment="nfs-client is &lt;1.3.0-34.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522281" version="1" comment="nfs-kernel-server is &lt;1.3.0-34.22.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522282" version="1" comment="ImageMagick is &lt;6.8.8.1-71.131.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522283" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.131.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522284" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.131.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522285" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.131.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522286" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.131.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522287" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.131.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522288" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.131.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522289" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522290" version="1" comment="python3 is &lt;3.4.6-25.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522291" version="1" comment="python3-base is &lt;3.4.6-25.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522292" version="1" comment="python3-curses is &lt;3.4.6-25.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522293" version="1" comment="MozillaFirefox is &lt;68.2.0-109.95.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522294" version="1" comment="MozillaFirefox-translations-common is &lt;68.2.0-109.95.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522295" version="1" comment="kernel-default is &lt;4.12.14-95.37.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522296" version="1" comment="kernel-default-devel is &lt;4.12.14-95.37.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522297" version="1" comment="kernel-default-extra is &lt;4.12.14-95.37.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522298" version="1" comment="kernel-devel is &lt;4.12.14-95.37.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522299" version="1" comment="kernel-macros is &lt;4.12.14-95.37.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522300" version="1" comment="kernel-source is &lt;4.12.14-95.37.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522301" version="1" comment="kernel-syms is &lt;4.12.14-95.37.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522302" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522303" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522304" version="1" comment="libdcerpc0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522305" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522306" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522307" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522308" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522309" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522310" version="1" comment="libndr-standard0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522311" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522312" version="1" comment="libndr0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522313" version="1" comment="libndr0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522314" version="1" comment="libnetapi0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522315" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522316" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522317" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522318" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522319" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522320" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522321" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522322" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522323" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522324" version="1" comment="libsamba-util0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522325" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522326" version="1" comment="libsamdb0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522327" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522328" version="1" comment="libsmbclient0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522329" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522330" version="1" comment="libsmbconf0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522331" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522332" version="1" comment="libsmbldap0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522333" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522334" version="1" comment="libtevent-util0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522335" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522336" version="1" comment="libwbclient0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522337" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522338" version="1" comment="samba is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522339" version="1" comment="samba-client is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522340" version="1" comment="samba-client-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522341" version="1" comment="samba-doc is &lt;4.6.16+git.169.064abe062be-3.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522342" version="1" comment="samba-libs is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522343" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522344" version="1" comment="samba-winbind is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522345" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522346" version="1" comment="bluez is &lt;5.13-5.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522347" version="1" comment="bluez-cups is &lt;5.13-5.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522348" version="1" comment="libbluetooth3 is &lt;5.13-5.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522349" version="1" comment="gdb is &lt;8.3.1-2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522350" version="1" comment="libssh2-1 is &lt;1.4.3-20.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522351" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522352" version="1" comment="libseccomp2 is &lt;2.4.1-11.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522353" version="1" comment="libseccomp2-32bit is &lt;2.4.1-11.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522354" version="1" comment="kernel-default is &lt;4.12.14-95.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522355" version="1" comment="kernel-default-devel is &lt;4.12.14-95.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522356" version="1" comment="kernel-default-extra is &lt;4.12.14-95.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522357" version="1" comment="kernel-devel is &lt;4.12.14-95.40.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522358" version="1" comment="kernel-macros is &lt;4.12.14-95.40.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522359" version="1" comment="kernel-source is &lt;4.12.14-95.40.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522360" version="1" comment="kernel-syms is &lt;4.12.14-95.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522361" version="1" comment="qemu is &lt;2.11.2-5.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522362" version="1" comment="qemu-block-curl is &lt;2.11.2-5.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522363" version="1" comment="qemu-ipxe is &lt;1.0.0+-5.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522364" version="1" comment="qemu-kvm is &lt;2.11.2-5.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522365" version="1" comment="qemu-seabios is &lt;1.11.0-5.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522366" version="1" comment="qemu-sgabios is &lt;8-5.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522367" version="1" comment="qemu-tools is &lt;2.11.2-5.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522368" version="1" comment="qemu-vgabios is &lt;1.11.0-5.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522369" version="1" comment="qemu-x86 is &lt;2.11.2-5.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522370" version="1" comment="ucode-intel is &lt;20191112-13.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522371" version="1" comment="xen is &lt;4.11.2_04-2.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522372" version="1" comment="xen-libs is &lt;4.11.2_04-2.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522373" version="1" comment="xen-libs-32bit is &lt;4.11.2_04-2.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522374" version="1" comment="libjpeg-turbo is &lt;1.5.3-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522375" version="1" comment="libjpeg62 is &lt;62.2.0-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522376" version="1" comment="libjpeg62-32bit is &lt;62.2.0-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522377" version="1" comment="libjpeg62-turbo is &lt;1.5.3-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522378" version="1" comment="libjpeg8 is &lt;8.1.2-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522379" version="1" comment="libjpeg8-32bit is &lt;8.1.2-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522380" version="1" comment="libturbojpeg0 is &lt;8.1.2-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522381" version="1" comment="ghostscript is &lt;9.27-23.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522382" version="1" comment="ghostscript-x11 is &lt;9.27-23.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522383" version="1" comment="ucode-intel is &lt;20191112a-13.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522384" version="1" comment="xen is &lt;4.11.1_02-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522385" version="1" comment="xen-libs is &lt;4.11.1_02-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522386" version="1" comment="xen-libs-32bit is &lt;4.11.1_02-2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522387" version="1" comment="aspell is &lt;0.60.6.1-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522388" version="1" comment="libaspell15 is &lt;0.60.6.1-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522389" version="1" comment="libaspell15-32bit is &lt;0.60.6.1-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522390" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522391" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522392" version="1" comment="sqlite3 is &lt;3.8.10.2-9.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522393" version="1" comment="cups is &lt;1.7.5-20.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522394" version="1" comment="cups-client is &lt;1.7.5-20.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522395" version="1" comment="cups-libs is &lt;1.7.5-20.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522396" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522397" version="1" comment="libtiff5 is &lt;4.0.9-44.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522398" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522399" version="1" comment="cpio is &lt;2.11-36.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522400" version="1" comment="cpio-lang is &lt;2.11-36.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522401" version="1" comment="clamav is &lt;0.100.3-33.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522402" version="1" comment="freerdp is &lt;2.0.0~git.1463131968.4e66df7-12.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522403" version="1" comment="libfreerdp2 is &lt;2.0.0~git.1463131968.4e66df7-12.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522404" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.241-43.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522405" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.241-43.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522406" version="1" comment="libxml2-2 is &lt;2.9.4-46.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522407" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522408" version="1" comment="libxml2-tools is &lt;2.9.4-46.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522409" version="1" comment="python-libxml2 is &lt;2.9.4-46.23.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522410" version="1" comment="libarchive13 is &lt;3.1.2-26.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522411" version="1" comment="libncurses5 is &lt;5.9-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522412" version="1" comment="libncurses5-32bit is &lt;5.9-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522413" version="1" comment="libncurses6 is &lt;5.9-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522414" version="1" comment="libncurses6-32bit is &lt;5.9-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522415" version="1" comment="ncurses-devel is &lt;5.9-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522416" version="1" comment="ncurses-utils is &lt;5.9-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522417" version="1" comment="tack is &lt;5.9-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522418" version="1" comment="terminfo is &lt;5.9-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522419" version="1" comment="terminfo-base is &lt;5.9-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522420" version="1" comment="libtomcrypt0 is &lt;1.17-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522421" version="1" comment="clamav is &lt;0.100.3-33.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522422" version="1" comment="permissions is &lt;20170707-3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522423" version="1" comment="strongswan is &lt;5.1.3-26.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522424" version="1" comment="strongswan-doc is &lt;5.1.3-26.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522425" version="1" comment="strongswan-ipsec is &lt;5.1.3-26.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522426" version="1" comment="strongswan-libs0 is &lt;5.1.3-26.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522427" version="1" comment="libssh4 is &lt;0.6.3-12.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522428" version="1" comment="libssh4-32bit is &lt;0.6.3-12.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522429" version="1" comment="xen is &lt;4.11.3_02-2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522430" version="1" comment="xen-libs is &lt;4.11.3_02-2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522431" version="1" comment="xen-libs-32bit is &lt;4.11.3_02-2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522432" version="1" comment="libzzip-0-13 is &lt;0.13.67-10.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522433" version="1" comment="MozillaFirefox is &lt;68.3.0-109.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522434" version="1" comment="MozillaFirefox-translations-common is &lt;68.3.0-109.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522435" version="1" comment="mariadb is &lt;10.2.29-3.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522436" version="1" comment="mariadb-client is &lt;10.2.29-3.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522437" version="1" comment="mariadb-errormessages is &lt;10.2.29-3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522438" version="1" comment="libmysqlclient18 is &lt;10.0.40.2-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522439" version="1" comment="libmysqlclient18-32bit is &lt;10.0.40.2-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522440" version="1" comment="libmysqlclient_r18 is &lt;10.0.40.2-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522441" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.40.2-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522442" version="1" comment="mariadb-100-errormessages is &lt;10.0.40.2-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522443" version="1" comment="kernel-default is &lt;4.12.14-95.45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522444" version="1" comment="kernel-default-devel is &lt;4.12.14-95.45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522445" version="1" comment="kernel-default-extra is &lt;4.12.14-95.45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522446" version="1" comment="kernel-devel is &lt;4.12.14-95.45.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522447" version="1" comment="kernel-macros is &lt;4.12.14-95.45.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522448" version="1" comment="kernel-source is &lt;4.12.14-95.45.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522449" version="1" comment="kernel-syms is &lt;4.12.14-95.45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522450" version="1" comment="curl is &lt;7.60.0-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522451" version="1" comment="libcurl4 is &lt;7.60.0-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522452" version="1" comment="libcurl4-32bit is &lt;7.60.0-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522453" version="1" comment="dia is &lt;0.97.3-17.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522454" version="1" comment="dia-lang is &lt;0.97.3-17.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522455" version="1" comment="qemu is &lt;2.11.2-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522456" version="1" comment="qemu-block-curl is &lt;2.11.2-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522457" version="1" comment="qemu-ipxe is &lt;1.0.0+-5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522458" version="1" comment="qemu-kvm is &lt;2.11.2-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522459" version="1" comment="qemu-seabios is &lt;1.11.0-5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522460" version="1" comment="qemu-sgabios is &lt;8-5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522461" version="1" comment="qemu-tools is &lt;2.11.2-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522462" version="1" comment="qemu-vgabios is &lt;1.11.0-5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522463" version="1" comment="qemu-x86 is &lt;2.11.2-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522464" version="1" comment="libopenssl1_1 is &lt;1.1.1-2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522465" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1-2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522466" version="1" comment="libipa_hbac0 is &lt;1.16.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522467" version="1" comment="libsss_certmap0 is &lt;1.16.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522468" version="1" comment="libsss_idmap0 is &lt;1.16.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522469" version="1" comment="libsss_nss_idmap0 is &lt;1.16.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522470" version="1" comment="libsss_simpleifp0 is &lt;1.16.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522471" version="1" comment="python-sssd-config is &lt;1.16.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522472" version="1" comment="sssd is &lt;1.16.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522473" version="1" comment="sssd-32bit is &lt;1.16.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522474" version="1" comment="sssd-ad is &lt;1.16.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522475" version="1" comment="sssd-ipa is &lt;1.16.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522476" version="1" comment="sssd-krb5 is &lt;1.16.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522477" version="1" comment="sssd-krb5-common is &lt;1.16.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522478" version="1" comment="sssd-ldap is &lt;1.16.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522479" version="1" comment="sssd-proxy is &lt;1.16.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522480" version="1" comment="sssd-tools is &lt;1.16.1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522481" version="1" comment="audit is &lt;2.8.1-10.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522482" version="1" comment="libaudit1 is &lt;2.8.1-10.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522483" version="1" comment="libaudit1-32bit is &lt;2.8.1-10.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522484" version="1" comment="libauparse0 is &lt;2.8.1-10.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522485" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522486" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522487" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2p-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522488" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522489" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1510945757.b2662641d5-3.8.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522490" version="1" comment="mariadb is &lt;10.2.22-3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522491" version="1" comment="mariadb-client is &lt;10.2.22-3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499000" version="1" comment="mariadb-errormessages is &lt;10.2.22-3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522492" version="1" comment="kernel-default is &lt;4.12.14-95.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522493" version="1" comment="kernel-default-devel is &lt;4.12.14-95.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522494" version="1" comment="kernel-default-extra is &lt;4.12.14-95.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522495" version="1" comment="kernel-devel is &lt;4.12.14-95.13.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522496" version="1" comment="kernel-macros is &lt;4.12.14-95.13.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522497" version="1" comment="kernel-source is &lt;4.12.14-95.13.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522498" version="1" comment="kernel-syms is &lt;4.12.14-95.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522499" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1510945757.b2662641d5-3.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522500" version="1" comment="libopenssl1_1 is &lt;1.1.1-2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522501" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1-2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522502" version="1" comment="xen is &lt;4.11.1_04-2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522503" version="1" comment="xen-libs is &lt;4.11.1_04-2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522504" version="1" comment="xen-libs-32bit is &lt;4.11.1_04-2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522505" version="1" comment="libvirt is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522506" version="1" comment="libvirt-admin is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522507" version="1" comment="libvirt-client is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522508" version="1" comment="libvirt-daemon is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522509" version="1" comment="libvirt-daemon-config-network is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522510" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522511" version="1" comment="libvirt-daemon-driver-interface is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522512" version="1" comment="libvirt-daemon-driver-libxl is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522513" version="1" comment="libvirt-daemon-driver-lxc is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522514" version="1" comment="libvirt-daemon-driver-network is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522515" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522516" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522517" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522518" version="1" comment="libvirt-daemon-driver-secret is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522519" version="1" comment="libvirt-daemon-driver-storage is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522520" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522521" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522522" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522523" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522524" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522525" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522526" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522527" version="1" comment="libvirt-daemon-lxc is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522528" version="1" comment="libvirt-daemon-qemu is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522529" version="1" comment="libvirt-daemon-xen is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522530" version="1" comment="libvirt-doc is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522531" version="1" comment="libvirt-libs is &lt;4.0.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522532" version="1" comment="man is &lt;2.6.6-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522533" version="1" comment="libssh4 is &lt;0.6.3-12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522534" version="1" comment="libssh4-32bit is &lt;0.6.3-12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522535" version="1" comment="Mesa is &lt;18.0.2-8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522536" version="1" comment="Mesa-32bit is &lt;18.0.2-8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522537" version="1" comment="Mesa-dri is &lt;18.0.2-8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522538" version="1" comment="Mesa-dri-32bit is &lt;18.0.2-8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522539" version="1" comment="Mesa-libEGL1 is &lt;18.0.2-8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522540" version="1" comment="Mesa-libEGL1-32bit is &lt;18.0.2-8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522541" version="1" comment="Mesa-libGL1 is &lt;18.0.2-8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522542" version="1" comment="Mesa-libGL1-32bit is &lt;18.0.2-8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522543" version="1" comment="Mesa-libGLESv2-2 is &lt;18.0.2-8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522544" version="1" comment="Mesa-libGLESv2-2-32bit is &lt;18.0.2-8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522545" version="1" comment="Mesa-libglapi0 is &lt;18.0.2-8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522546" version="1" comment="Mesa-libglapi0-32bit is &lt;18.0.2-8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522547" version="1" comment="libgbm1 is &lt;18.0.2-8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522548" version="1" comment="libgbm1-32bit is &lt;18.0.2-8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522549" version="1" comment="libxatracker2 is &lt;1.0.0-8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522550" version="1" comment="libvirglrenderer0 is &lt;0.5.0-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522551" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522552" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522553" version="1" comment="libdcerpc0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522554" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522555" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522556" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522557" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522558" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522559" version="1" comment="libndr-standard0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522560" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522561" version="1" comment="libndr0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522562" version="1" comment="libndr0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522563" version="1" comment="libnetapi0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522564" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522565" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522566" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522567" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522568" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522569" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522570" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522571" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522572" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522573" version="1" comment="libsamba-util0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522574" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522575" version="1" comment="libsamdb0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522576" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522577" version="1" comment="libsmbclient0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522578" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522579" version="1" comment="libsmbconf0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522580" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522581" version="1" comment="libsmbldap0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522582" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522583" version="1" comment="libtevent-util0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522584" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522585" version="1" comment="libwbclient0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522586" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522587" version="1" comment="samba is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522588" version="1" comment="samba-client is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522589" version="1" comment="samba-client-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522590" version="1" comment="samba-doc is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522591" version="1" comment="samba-libs is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522592" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522593" version="1" comment="samba-winbind is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522594" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522595" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.232-27.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522596" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.232-27.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522597" version="1" comment="sysstat is &lt;12.0.2-10.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522598" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.242-27.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522599" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.242-27.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522600" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522601" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522602" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2p-3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522603" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522604" version="1" comment="libQt5Concurrent5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522605" version="1" comment="libQt5Core5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522606" version="1" comment="libQt5DBus5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522607" version="1" comment="libQt5Gui5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522608" version="1" comment="libQt5Network5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522609" version="1" comment="libQt5OpenGL5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522610" version="1" comment="libQt5PrintSupport5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522611" version="1" comment="libQt5Sql5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522612" version="1" comment="libQt5Sql5-mysql is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522613" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522614" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522615" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522616" version="1" comment="libQt5Test5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522617" version="1" comment="libQt5Widgets5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522618" version="1" comment="libQt5Xml5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522619" version="1" comment="libsystemd0 is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522620" version="1" comment="libsystemd0-32bit is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522621" version="1" comment="libudev1 is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522622" version="1" comment="libudev1-32bit is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522623" version="1" comment="systemd is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522624" version="1" comment="systemd-32bit is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522625" version="1" comment="systemd-bash-completion is &lt;228-150.82.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522626" version="1" comment="systemd-sysvinit is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522627" version="1" comment="udev is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522628" version="1" comment="e2fsprogs is &lt;1.43.8-3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522629" version="1" comment="libcom_err2 is &lt;1.43.8-3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522630" version="1" comment="libcom_err2-32bit is &lt;1.43.8-3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522631" version="1" comment="libext2fs2 is &lt;1.43.8-3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522632" version="1" comment="wicked is &lt;0.6.60-2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522633" version="1" comment="wicked-service is &lt;0.6.60-2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522634" version="1" comment="dbus-1 is &lt;1.8.22-29.17.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522635" version="1" comment="dbus-1-x11 is &lt;1.8.22-29.17.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522636" version="1" comment="libdbus-1-3 is &lt;1.8.22-29.17.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522637" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-29.17.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522638" version="1" comment="MozillaFirefox is &lt;68.5.0-109.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522639" version="1" comment="MozillaFirefox-translations-common is &lt;68.5.0-109.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522640" version="1" comment="sudo is &lt;1.8.20p2-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522641" version="1" comment="ImageMagick is &lt;6.8.8.1-71.141.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522642" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.141.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522643" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.141.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522644" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.141.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522645" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.141.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522646" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.141.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522647" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.141.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522648" version="1" comment="dnsmasq is &lt;2.78-18.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522649" version="1" comment="libexif12 is &lt;0.6.21-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522650" version="1" comment="libexif12-32bit is &lt;0.6.21-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522651" version="1" comment="ppp is &lt;2.4.7-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522652" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522653" version="1" comment="python3 is &lt;3.4.10-25.39.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522654" version="1" comment="python3-base is &lt;3.4.10-25.39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522655" version="1" comment="python3-curses is &lt;3.4.10-25.39.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522656" version="1" comment="libpng16-16 is &lt;1.6.8-15.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522657" version="1" comment="libpng16-16-32bit is &lt;1.6.8-15.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522658" version="1" comment="gimp is &lt;2.8.18-9.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522659" version="1" comment="gimp-lang is &lt;2.8.18-9.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522660" version="1" comment="gimp-plugins-python is &lt;2.8.18-9.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522661" version="1" comment="libgimp-2_0-0 is &lt;2.8.18-9.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522662" version="1" comment="libgimpui-2_0-0 is &lt;2.8.18-9.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522663" version="1" comment="gd is &lt;2.1.0-24.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522664" version="1" comment="gd-32bit is &lt;2.1.0-24.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522665" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.251-43.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522666" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.251-43.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522667" version="1" comment="ipmitool is &lt;1.8.18-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522668" version="1" comment="MozillaFirefox is &lt;68.4.1-109.101.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522669" version="1" comment="MozillaFirefox-translations-common is &lt;68.4.1-109.101.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522670" version="1" comment="libecpg6 is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522671" version="1" comment="libpq5 is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522672" version="1" comment="libpq5-32bit is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522673" version="1" comment="postgresql10 is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522674" version="1" comment="libzypp is &lt;16.21.2-2.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522675" version="1" comment="libfreebl3 is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522676" version="1" comment="libfreebl3-32bit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522677" version="1" comment="libsoftokn3 is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522678" version="1" comment="libsoftokn3-32bit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522679" version="1" comment="mozilla-nspr is &lt;4.23-19.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522680" version="1" comment="mozilla-nspr-32bit is &lt;4.23-19.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522681" version="1" comment="mozilla-nss is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522682" version="1" comment="mozilla-nss-32bit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522683" version="1" comment="mozilla-nss-certs is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522684" version="1" comment="mozilla-nss-certs-32bit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522685" version="1" comment="mozilla-nss-sysinit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522686" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522687" version="1" comment="mozilla-nss-tools is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522688" version="1" comment="libopenssl1_1 is &lt;1.1.1d-2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522689" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1d-2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522690" version="1" comment="openssl-1_1 is &lt;1.1.1d-2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123272"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-6_Q16-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore-6_Q16-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore-6_Q16-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand-6_Q16-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sled-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaccountsservice0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-AccountsService-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasound2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasound2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>argyllcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-core7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bogofilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-gtk-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord-gtk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolorhug2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coolkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-gij</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-gij-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcj48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcj48-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcj48-jar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcj_bc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++48-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++48-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cronie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-cups-browsed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-foomatic-rip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-ghostscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-pk-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-pk-helper-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-saslauthd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsasl2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsasl2-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dia-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>etags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>empathy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>empathy-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-mission-control-plugin-goa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevdocument3-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevview3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EvinceDocument-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EvinceView-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>facter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-magic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-meanwhile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flash-player</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flash-player-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreerdp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreerdp-1_0-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ft2demos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfuse2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>g3utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgetty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GdkPixbuf-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-rsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsvg-view</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdmflexiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gdm-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-plugins-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimp-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpui-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-fam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-i18ndata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nscd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-pam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgck-modules-gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-online-accounts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-online-accounts-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-backend-1_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Goa-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-browser-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls28-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpgme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hardlink</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-hpijs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-sane</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-chewing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-pinyin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iputils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-appl-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX28-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImf-Imf_2_1-21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImf-Imf_2_1-21-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXRes1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXRes1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaugeas0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libmount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uuidd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-binding0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-binding0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgensec0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgensec0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpdb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpdb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libregistry0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-raw0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-raw0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent-2_0-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbembed2_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgadu3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgssglue1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgssglue1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgudev-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgudev-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libid3tag0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-sssd-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-3_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-3_0-25</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk-3_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-JavaScriptCore-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmms0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmusicbrainz4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-errormessages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpango-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpango-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-modules-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Pango-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcsclite1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcsclite1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-16-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Polkit-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt4-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler44</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-config-gnome3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-config-gnome3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-networkmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-networkmanager-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-esound-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-gdm-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-bluetooth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-gconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-jack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-lirc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-zeroconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_4m1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-postgresql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-unixODBC-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraptor2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>raptor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-drivers-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-drivers-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-draw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-filters-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-tango</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-impress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-af</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt-BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt-PT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-xh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-Hans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-Hant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-mailmerge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-officebean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-pyuno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librpcsecgss3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsilc-1_1-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsilcclient-1_1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>silc-toolkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp30-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SNMP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snmp-mibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Soup-2_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-glib-2_0-8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-gtk-2_0-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-gtk-3_0-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-controller0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGlib-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGtk-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag_c0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag_c0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-interface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-libxl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nodedev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-secret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisenc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisenc2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisfile3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisfile3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvte9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-glx0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-glx0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-randr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-render0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-render0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shape0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shm0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-sync1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xf86dri0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xfixes0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xfixes0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xkb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xkb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xv0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-3_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-3_1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-0-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzmq3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logrotate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>m4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mipv6d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-helpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ssh-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>patch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-ccid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Config-IniFiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-HTML-Parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-LWP-Protocol-https</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-YAML-LibYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-otr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>puppet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cupshelpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-common-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-dbus-service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev-configure-printer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-imaging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pywbem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ipxe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-seabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-sgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-vgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>radvd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhythmbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhythmbox-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rtkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>socat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squashfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-ipsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-libs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysconfig-netconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysvinit-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>whois</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-gabble</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vorbis-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vorbis-tools-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>w3m</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xf86-video-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xinetd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xlockmore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-essentials</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zoo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>DirectFB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lib++dfb-1_7-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdirectfb-1_7-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdirectfb-1_7-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autofs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-bad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-bad-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasevideo-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasevideo-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecparsers-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsignalprocessor-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsignalprocessor-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvdp-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvdp-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyper-v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu52_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu52_1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu52_1-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libturbojpeg0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng15-15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libruby2_1-2_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-stdlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-server1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-0_2-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p7zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-XML-LibXML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pigz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpcbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sblim-sfcb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-glib-vpn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-glib4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-util2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NM-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NMClient-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NetworkManager-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>at</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksuseinstall1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksuseinstall1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netpbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-lenses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrack2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrack2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dosfstools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eog-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-browser-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-djvudocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-dvidocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-pdfdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-psdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-tiffdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-xpsdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreerdp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-pc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-snapper-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-systemd-sleep-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-tools-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gtk-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imobiledevice-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lhasa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblhasa0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKit5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKit5-imports</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKitWidgets5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvnc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpx0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpx0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpxwrappers0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpxwrappers0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-atsvc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgif6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgif6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgraphite2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgraphite2-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgypsy0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-4_0-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-4_0-37</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-JavaScriptCore-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk-4_0-injected-bundles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnewt0_52</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler60</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-pacrunner-webkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-galaxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreofficekit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-glib-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrtp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbmuxd4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-present0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-present0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-sync1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xinerama0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>supportutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>update-alternatives</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-users</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-profiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapparmor1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapparmor1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_apparmor-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudiofile1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudiofile1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drm-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-plugin-sametime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-0_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-0_2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgegl-0_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinterfaces-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinterfaces-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-good</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-good-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstreamer-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstreamer-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gst-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstadaptivedemux-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadbase-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadvideo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecparsers-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstgl-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstmpegts-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsturidownloader-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstallocators-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstfft-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstfft-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstriff-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtsp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsdp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstAudio-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstPbutils-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstTag-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstVideo-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile-modules-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguile-2_0-22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libass5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-gobject2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-gobject2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-script-interpreter2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgme0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenjp2-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopus0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre16-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcrecpp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcrecpp0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist++3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquicktime0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt_PT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh_CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh_TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-gtk-3_0-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc-netconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirglrenderer0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-admin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-logical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-scsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvmtools0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwscodecs1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzzip-0-13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minicom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-plugin-otr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool-cached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-autoconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unrar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SuSEfirewall2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbind9-160</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns169</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libirs160</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisc166</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisc166-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisccc160</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisccfg160</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblwres160</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbluetooth3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcephfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librados2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libradosstriper1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librbd1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librgw2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cephfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rados</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rgw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-search-provider-nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnautilus-extension1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnautilus-extension1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gwenhywfar-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gwenhywfar-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgwengui-gtk2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgwenhywfar60</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgwenhywfar60-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kbd-legacy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-amd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lcms2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libICE6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libICE6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSoundTouch0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSoundTouch0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>soundtouch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXdmcp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXdmcp6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio14-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiso9660-8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexempi3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_certmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_simpleifp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkpathsea6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-louis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmwaw-0_3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-100-errormessages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-14-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libofx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libofx6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-1_0_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpodofo0_9_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprocps3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqpdf18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-themes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstaroffice-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vpx-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwavpack1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd-0_10-10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-cpp0_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libykcs11-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libykpiv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yubico-piv-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_yubico</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Archive-Zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ovmf-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rzsz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shotwell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shotwell-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-vdagent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yubikey-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-SLE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfltk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcamel-1_2-45</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcamel-1_2-45-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebackend-1_2-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebackend-1_2-7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebook-1_2-14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebook-1_2-14-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebook-contacts-1_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebook-contacts-1_2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecal-1_2-16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecal-1_2-16-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedata-book-1_2-20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedata-book-1_2-20-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedata-cal-1_2-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedata-cal-1_2-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedataserver-1_2-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedataserver-1_2-18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-logging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabw-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdr-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcmis-0_5-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libe-book-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libetonyek-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libformula</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreehand-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgltf-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhyphen0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblangtag1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblayout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libloader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspub-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libodfgen-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-0_8-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpagemaker-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-share-linker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-voikko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librepository</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librevenge-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librevenge-stream-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libserializer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvisio-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvoikko1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwps-0_4-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>malaga-suomi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-af_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-be_BY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bg_BG</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bn_BD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bs_BA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-cs_CZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-da_DK</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-dictionaries</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-el_GR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-et_EE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_FR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-gu_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-he_IL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-hi_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-hr_HR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-hu_HU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-it_IT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lo_LA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lt_LT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lv_LV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nl_NL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-no</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pl_PL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pt_PT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ru_RU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sk_SK</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sl_SI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sv_SE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-te_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-th_TH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-vi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-zu_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pentaho-libxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pentaho-reporting-flow-engine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncserver0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pytalloc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pytalloc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-license1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenCOLLADA0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_atomic1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_date_time1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_filesystem1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_iostreams1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_program_options1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_regex1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_signals1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_system1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_thread1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-0_11-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-0_11-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-af_NA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_AE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_BH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_DZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_EG</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_IQ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_JO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_KW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_LB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_LY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_MA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_OM</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_QA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_SA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_SD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_SY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_TN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_YE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bn_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_AD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_ES</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_ES_valencia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_FR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_IT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de_AT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de_CH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de_DE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_AU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_BS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_BZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_CA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_GH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_IE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_JM</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_MW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_NA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_NZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_PH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_TT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_US</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_ZW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_AR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_BO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_DO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_EC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_ES</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_GT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_HN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_MX</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_NI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_SV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_UY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_VE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_BE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_CA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_CH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_LU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_MC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-hu_HU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-ru_RU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nb_NO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nl_BE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nn_NO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pt_AO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ro_RO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_CS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_Latn_CS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_Latn_RS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_RS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sv_FI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-te</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-vi_VN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcilkrts5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcilkrts5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-backports.ssl_match_hostname</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tornado</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-ntp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libc-client2007e_suse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbmuxd2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>usbmuxd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstorage-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstorage6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstegl-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist++1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-0_12-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-0_12-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzmf-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-uk_UA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcephfs1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtQuick5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>db48-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-pkg-bindings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqca2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqca2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt4-qtscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-vpnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-vpnc-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-vpnc-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_pkcs11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_pkcs11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libntfs-3g84</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntfs-3g</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntfsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspectre1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatalk12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netatalk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-talloc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-talloc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-install</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-manager-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-backend-zypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-gstreamer-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-gtk3-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-PackageKitGlib-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-documents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-documents-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-documents_books-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-search-provider-documents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_locale1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_random1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libepubgen-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-0_13-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-0_13-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqxp-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-id</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-id_ID</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-6-SUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-6-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudit1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudit1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libauparse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>screen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-0_14-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-0_14-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco-0_6-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco-0_6-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>doxygen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-gobject0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-ui-gtk3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-ui0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-numpy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman_clientpp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>adcli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL-1_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libu2f-host0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_u2f</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Mail-SpamAssassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadb3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadb_plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libibus-1_0-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libibus-1_0-5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ibus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-IBus-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdjvulibre21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xdg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaca0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-kernel-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseccomp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseccomp2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaspell15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaspell15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtomcrypt0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>permissions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-dri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-dri-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxatracker2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wicked</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wicked-service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipmitool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_1</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-5.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">12</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.1.0esr-1.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2+git20140911.61c1681-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.35-1.126</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.27.2-11.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-1.179</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.31-20.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-75.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2-75.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.5P1-1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-3.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-27.1129</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.4-1.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-2.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.25-3.113</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-147.71</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.22-5.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-26.182</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.27.1-2.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.3+r212056-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-55.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.11-55.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.5-3.75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.12-181.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.26-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.8-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.8-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.100.2-3.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.2-13.253</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:037-34.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:103-5.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.158-3.200</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.3-14.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.3-1.131</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.3-1.213</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-13.232</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.26-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19-2.149</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.9-5.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.406-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.3-2.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.3-3.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.36-54.100</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.30.6-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.40.2-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.10-1.164</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.38.2-5.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-17.72</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.5-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.4-22.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.24-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.22.2-5.429</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.326-2.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-7.392</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-6.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.6-3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.10.1-2.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-2.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:s20121221-2.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.65-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.5-7.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.28-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.19-17.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.18-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-4.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.7-3.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.14-3.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-3.61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.1-3.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.7-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2-3.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-3.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-3.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8-3.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.4-3.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-3.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-3.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-3.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-6.69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-1.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.12-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.5-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.5-2.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.21-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.21-6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.2.26539-13.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.4-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.3-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2d-3.77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-352.84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-3.83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:210-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1b-182.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.5.1-5.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.7-3.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-12.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11-2.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-14.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.2-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.08-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.0-4.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.2-15.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8.4-13.69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-3.64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.5-27.86</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.11-6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.30.0-3.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-59.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.36.3-4.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.50-8.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-2.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.112-2.189</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-3.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.11-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.11-11.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.7-2.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.1-2.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-2.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.10-3.67</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.4-3.88</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.1.2-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.19-16.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.10-24.128</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.8-18.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-18.75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.7.2.1-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.44.2-1.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.25-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-1.265</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7-2.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3-9.78</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.3-1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-8.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.28.2-17.83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10-1.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.6-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.1-4.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.7-3.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.16-15.74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2.umip.0.4-19.77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.7-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.21-44.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.0-1.122</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-11.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.1-23.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.4-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-1.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-5.191</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.14-1.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.18.2-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.82-3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.71-1.178</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.04-5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:804.031-3.82</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.38-7.61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.7-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22-267.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.2-3.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.7-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.1-2.76</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-21.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.14-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0-4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-40.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-40.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-40.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-40.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.7-2.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-1.92</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.0-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11_git201205151338-8.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2.4-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-1.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.83.7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-778.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.88+-94.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.1-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.18.1-3.268</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.0-1.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-8.84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-4.95</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.1-1.86</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0-16.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-153.145</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-3.64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-4.83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.9-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-264.133</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.1_06-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.1_06_k3.12.28_4-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.99.914-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.15-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.43-5.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1-14.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-3.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6-45.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.15.2-12.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.108-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.11-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10-1020.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">12.1</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.4.0esr-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2+git20140911.61c1681-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.35-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.9-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25.0-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.21.1-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4-6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.7-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.22-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.5-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-58.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.11-58.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.16-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.3-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:037-66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.42.11-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.158-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.9-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.548-111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.5-7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-31.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.1-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.2-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.4-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.23-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.91-21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-2.4.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.65-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.5-8.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.49-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.2-1.81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.7-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-30.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-4.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.5-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.5-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2.1-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:210-83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.5.1-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.1-170.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.8-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-30.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:62.1.0-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.2-30.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.21-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.22-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.113-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-20.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.2.2-13.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.7.3-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.29-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.4-12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.18.1-4.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-242.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.6-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.4-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.5-25.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.10-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.21-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p4-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.20.1-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0019-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.38-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.0-6.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.1_rc4-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11.2-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.0-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.8-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.83.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.27.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.7-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140630-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.1_12-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.1_12_k3.12.49_11-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.99.914-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.15.2-36.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.155-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.18-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">12.2</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.4.0esr-81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.12-8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2+git20140911.61c1681-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.42-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.14-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6+2.3.3-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.32.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.0-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.66.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.9-21.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.32-30.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-78.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3-78.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26.1-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.5-8.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.2-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.26-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.25-12.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.5-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.0-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-12.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.16-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.3-15.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.26-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:044-87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:103-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.3-16.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.12-5.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.4-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-5.66</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.26-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.0-12.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0~git.1463131968.4e66df7-11.69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.34.0-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.40.15-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-52.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.18-4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.48.2-10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22-49.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.0-27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.4-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-40.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.4-70.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.24-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-104.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.23-20.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.31-7.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.14-4.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-7.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.111-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.101-14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.5-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.15-28.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.5-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-11.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-12.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28-40.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28-40.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2-29.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.9-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.21.1-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.5-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-353.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-6.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.4-18.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.11-23.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.5-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.26-10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-14.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.27-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.52.16-1.83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2j-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.40.1-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.50-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.22-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.113-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.43.0-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.13-16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.13-16.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.5.2-29.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.54.1-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.31-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.7-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-117.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.25-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.6-26.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-6.73</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.28.2-19.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.4-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.5-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12-15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p8-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2p2-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.20.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.18.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-11.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.5-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.7-7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.0.0-2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.1-27.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-27.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-27.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-27.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4-6.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.3-21.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11.2-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.0-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.84.0-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.88+-96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.27.1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.1-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.18.3-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.4-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.18.4-14.216</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.13-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.0_12-23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.99.917.641_ge4ef6e9-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.0-8.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-57.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.22-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.206-37.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.23-6.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.57-16.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">12.3</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.2.0esr-108.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.12-12.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2+git20140911.61c1681-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.27.2-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.2-49.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.9-27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.2-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-12.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-17.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.5-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.22-28.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.22-28.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.76-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:044-113.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.33_k4.4.73_5-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.42.11-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.3-19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.12-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.6-11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.0-1.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.34.0-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.0-14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.18-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22-61.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.5-9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-49.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.4-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.27-1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.24-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.23-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.36-17.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.31-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-12.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.326-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.11-1.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.141-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-2.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-2.10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.131-26.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.16-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.73-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.4-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.2-5.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.2-1.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.11-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-18.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.29.2-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.29.2-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.2-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.5+git.27.6afd48b1083-2.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6.3-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.2.26539-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.29.5-57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2d-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.4-33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.14-194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.0-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.29-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.30-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.66.3-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2j-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.0-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.39-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.50-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.22-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.13-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.6-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.5.1-42.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.9-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.33-1.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.8-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.7-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-4.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1.5-2.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.7-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.4-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.28-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.8-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.4-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.62-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.11.0-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.13.1-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p10-63.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2p2-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.25-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.2-1.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.7-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.5-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-6.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.0-5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.3-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.7-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.24.0-1.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.24-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.8-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-23.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.20p2-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.88+-99.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.27.1-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.0-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.14-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3.git20161120-160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.0_08-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.99.917.770_gcb6ba2da-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.0-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.36-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.2-1.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.11-1.47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009066428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">12.4</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.9.0esr-109.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.12-13.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.312.333-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2+git20140911.61c1681-38.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.42-16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.14-8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.7+2.3.4-4.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.9-28.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-83.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3-83.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.11.2-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.31-9.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.13-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.2.8+git.1536505967.080f2248ff-2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.5-9.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.100.2-33.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-148.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.25-13.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-36.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.5-31.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-19.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.60.0-2.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.12-182.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.26-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.22-29.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.3-10.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.78-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:044.1-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.43.8-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:103-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.3-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.13-8.3.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.22.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.6-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.22-10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0~git.1463131968.4e66df7-12.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.3-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.36-58.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.40.20-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-54.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.25-23.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.18-9.3.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22-15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.0-28.3.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-50.5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.4-77.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.3-23.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.27-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.24-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.0beta-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.1-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.181-43.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.181-27.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4-8.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.16-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-94.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20180525-3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7-9.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.4-3.3.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.2-6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.14-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-11.3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.3-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-18.23.72</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.29.2-7.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.29.2-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.2-25.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-9.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.90-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.124.aee309c5c18-3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.5-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.5-1.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.21-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.1-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.21-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.29.5-58.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1b-184.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.1-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.20.3-2.23.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.3-31.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.0dev-22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.29-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.4-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-17.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.9.0+git20170610.f6dd59a-15.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.13-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.35-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.9-58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-1.84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.9-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2p-2.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2p-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-106.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.39-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12-20.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.113-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.43.0-16.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.9-11.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.1.1-3.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.7-8.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.4-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.5.2-43.38.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-36.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.7.3-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.62.2-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.33-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.8-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-150.49.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-17.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-6.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.3.0-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.60.99-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.9-48.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.2-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-3.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.11-1.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.1-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.19.0-2.36.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.67-10.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.11.0-2.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.2.18-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.1-55.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p12-64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.08-1.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-18.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.20.1-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-24.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26-1.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.5-8.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0019-6.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22-269.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.5-15.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.0.0-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-6.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.2-4.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-4.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.0-4.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-4.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017+git1510945757.b2662641d5-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11.2-16.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-13.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.24.0-3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.21~rc-1001.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.8-17.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.22.0+git.20160103-15.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.16.0-8.5.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.20p2-3.7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-95.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.27.1-15.3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.5e-2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20180807a-13.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.6-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-33.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-21.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140630-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11.0_08-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.99.917+git781.c8990575-1.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.15.0-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.15-8.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.19.6-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.48-3.29.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.17-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.0-1.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.5-6.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.45-21.23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.9-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.9-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.15-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.425-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.12-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.12-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5.2-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5.2-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.19-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.411-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.71-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.418-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3.2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3.2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.3.0esr-15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.2-12.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.7-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.7-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-66.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1i-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.424-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.19-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_06-22.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_06_k3.12.48_52.27-22.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.5.0esr-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-28.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.15.2-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.1-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-56.9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-56.9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.559-117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.5.0esr-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.16-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.3.6-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.3.6-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.451-77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.75-11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.2-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.2-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19-20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19-20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.38-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.38-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1i-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-73.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.1_10-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.1_10_k3.12.36_38-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.5.3esr-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-30.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.1.0-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.2-30.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.13-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.39-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.39-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.8-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.8-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.7-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_02-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_02_k3.12.38_44-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.6.0esr-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.457-80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.15-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.16-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.79-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.58-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.15.2-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.429-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.460-83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.98.7-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_04-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_04_k3.12.39_47-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.32-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.32-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.38-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.7.0esr-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.71-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.9-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.4.0esr-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.3-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_06-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_06_k3.12.39_47-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.466-86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.14-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.43-52.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.43-52.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.39-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.15.2-28.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.468-89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1i-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.21-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.481-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.491-96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.3.8-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.8.0esr-37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2_CKBI_1.98-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.8-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.20-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_08-22.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_08_k3.12.43_52.6-22.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.85-18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.44-52.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.44-52.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.5P1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.11-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.9-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.6-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.6-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.4-5.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.4-5.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.508-99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.58-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.8.0esr-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_10-22.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_10_k3.12.44_52.10-22.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1-4.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.6-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.2-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1i-27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.438-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.440-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.20.1-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0019-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.1-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.2.1esr-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.0-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.0-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.36-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.36-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-242.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.98.5-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-166.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-48.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.15-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1i-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.2.1-4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.442-67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.521-102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.44-52.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.44-52.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.22-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.22-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.3.0esr-48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.9-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1_rc4-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.3-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.7-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.48-52.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.48-52.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.48-52.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.4-8.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20140630-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.535-105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.540-108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-48.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-170.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.3.10-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.98.6-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.158-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19-22.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19-22.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-70.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.91-21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_02-22.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_02_k3.12.48_52.27-22.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.1-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.2-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.3-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-4.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.1-4.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.8-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.7-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.10-4.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.2-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.6-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.4-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.2-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2.2-13.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2.2-13.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009107086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.2-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.3-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20150827-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20150827-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.4-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.1_08-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.1_08_k3.12.28_4-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.4.0esr-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.0-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.1-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.10-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.12-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.548-111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.50-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.22-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:037-51.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.8-5.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.12-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.12-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.24-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.24-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.51-52.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.51-52.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30.6-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30.6-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1i-27.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.554-114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1-22.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.12-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.5-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.8-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.26-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.12-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.60-52.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.60-52.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6-14.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.2.0esr-75.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.0-28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.1-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.60-52.54.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.60-52.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.60-52.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19-22.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19-22.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.54.0-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1_3335ac1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.54.0-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.1-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.6-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.8-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.0-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3.2-22.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3.2-22.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20160511-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20160511-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.6-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.51-52.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.51-52.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-48.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-28.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.51-52.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.51-52.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30.6-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30.6-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:103-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.95-24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-27.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.6.0esr-57.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.0-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4-14.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.2.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.569-120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19-22.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19-22.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.3.11-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6-14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.6-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.6-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.6.1esr-60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1i-27.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.3-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.50-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.577-123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.7.0esr-63.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-28.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.55-52.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.55-52.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.12-18.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.12-18.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.6-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.15-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.99-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.616-126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0.2-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-18.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-18.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.16-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.58-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.5-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1i-27.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.101-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p6-46.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.12.4-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.8.0esr-66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.9-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.621-130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_02-22.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_02_k3.12.55_52.42-22.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.11-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:210-70.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:210-70.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.22-20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.4-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-48.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.4-8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p8-46.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.20.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.55-52.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.55-52.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.626-133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.25-20.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2007e_suse-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.2-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-73.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-73.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1i-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.5-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.8-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.26-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.2_02-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.2_02_k3.12.49_11-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19-38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19-38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.632-137.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.10-7.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.10-7.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.111-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.101-14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.18.4-11.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.3_08-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.3_08_k3.12.59_60.45-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.9-24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.9-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.0-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.3.0esr-78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1-36.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.26-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25.35.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.26-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.6-26.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.635-140.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.14-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.6+2.3.3-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.0-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.66.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1i-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.27-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.9-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.4.0esr-81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.13-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.5.2-29.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.5.2-29.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.3_10-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.3_10_k3.12.62_60.62-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:210-114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:210-114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.15-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.6-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.1-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.10-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.637-143.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.24-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.24-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.15-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.5.1-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-26.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.15-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.5-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.643-146.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.72-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-181.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.644-149.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.15-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.2-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.2-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.111-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.1-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.1-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.67-60.64.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.67-60.64.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.28-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.121-36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2007e_suse-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.39-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-24.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-24.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-24.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-24.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.5.0esr-88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.3-50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.67-60.64.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.67-60.64.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.5.1esr-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3.git20161120-160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2d-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.5_02-22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.5_02_k3.12.67_60.64.18-22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.0.186-152.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.39-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.22-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.67-60.64.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.67-60.64.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p9-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.5_04-22.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.5_04_k3.12.67_60.64.24-22.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.6.0esr-96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.71-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.7-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.53-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.53-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.22-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1i-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.2_06-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.2_06_k3.12.53_60.30-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.18.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.77-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.57-60.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.57-60.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.41.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p6-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.22-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1i-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.91-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p7-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:210-104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:210-104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.5-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p8-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.25-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.31-13.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.31-13.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.36-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.36-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-19.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-19.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.121-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.15-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.29-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.7.0esr-99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.7-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1i-54.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.69-60.64.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.69-60.64.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.11-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.7-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.131-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.69-60.64.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.69-60.64.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.0.221-158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-184.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25-40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.5_06-22.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.5_06_k3.12.69_60.64.32-22.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.8-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-54.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:037-91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-24.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-10.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-10.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.0-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.0.0.127-162.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.8.0esr-102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.24-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.7-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.50-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.69-60.64.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.69-60.64.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.0.194-155.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.6-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.22-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.0.0.148-165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.36-11.6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.36-11.6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.6.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.6.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.7-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p10-60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.9-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.62-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.10-12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.15-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.5_10-22.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.5_10_k3.12.69_60.64.35-22.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.2-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.2-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2.26539-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.0.0.171-168.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-32.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-32.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-32.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-32.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.9.0esr-105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.121-23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.3-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.30-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1_rc4-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.0-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-26.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8-10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.141-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.15-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-44.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-2.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.10-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.5-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-42.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-42.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.21-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.21-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.1_02-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.21-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.21-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.1_04-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.2-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.2.0esr-108.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.4-14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.12-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.31-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.31-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.2-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.14-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.2_06-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-149.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-149.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.11-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.3.2-40.5.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.3.2-40.5.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170511-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20170511-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.15-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.7-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-74.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.1-6.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.1-6.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:044.1-109.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.4-14.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.43.0-16.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.36-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.36-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.31-29.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.8-48.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.15.2-27.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.30-18.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.30-18.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-22.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-22.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.5-15.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.18-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.54.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.54.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.144-27.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-20.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.4-77.7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.4-77.7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0~git.1463131968.4e66df7-12.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-66.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.4-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.3_03-43.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.13-21.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.4-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.1-6.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.1-6.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-132.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-132.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.12-182.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-24.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.3_04-43.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.1-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.9-48.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.8-44.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.4-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.3.0esr-109.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.4.0esr-109.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-58.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-268.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2-15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.10-48.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.3_06-43.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.312-2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.0-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.0-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.2-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.4-14.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.151-27.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.4+git.1481215985.12b091b-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.22-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.18-9.3.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.18-9.3.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170530-21.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.29.1-9.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.4_02-43.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.5.0esr-109.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.8-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.7-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.14-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.4-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.6-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-92.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-92.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.19.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.19.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.11-48.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.1_06-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-16.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.0-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.18-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.18-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:044-108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.2_02-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.36-17.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.36-17.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-12.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-12.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-12.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-12.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-18.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.2_04-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.3-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.38-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.38-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.131-26.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-17.3.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.66.3-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-61.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-61.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-24.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-92.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-92.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-13.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22-269.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-48.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.21-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.21-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.5-2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.5-2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5e-2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.3-33.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-24.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-11.3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:103-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-36.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-31.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.0-8.5.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.6.0esr-109.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.33-29.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.15-23.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.114-92.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.114-92.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.5.1-40.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.5.1-40.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.20.1-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.4_06-43.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.7-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.30-29.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3-10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.67-10.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.5-15.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.60.99-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0+git.20160103-15.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0+git.20160103-15.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.171-43.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.161-27.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.16-21.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170530-21.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.90-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.34-29.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20180312-13.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.1b-184.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.8-3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.120-92.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.120-92.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.4-33.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3-10.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.13-48.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.7.3esr-109.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.17-21.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.161-43.7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0beta-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0beta-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.5_02-43.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.15-21.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.32-29.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-18.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170530-21.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-13.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0019-6.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.7+git.38.90b2cdb4f22-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.7+git.38.90b2cdb4f22-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.15.3-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.4-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.1-13.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.11-7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.1-10.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.5.2-43.5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.5.2-43.5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170511-16.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20170511-16.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0_11-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.15.6-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.32-21.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.32-21.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.0-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0_12-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.8-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.7+git.51.327af8d0a11-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.7+git.51.327af8d0a11-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0_14-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.312.333-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.1_02-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.9+git.59.c2cff9cea4c-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.9+git.59.c2cff9cea4c-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-6.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-6.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20140630-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.67-10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170530-21.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.43.0-16.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20180425-13.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.14+git.150.1540e575faf-3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.14+git.150.1540e575faf-3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.171-27.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.181-43.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.9-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.24-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.24-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p11-64.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.138-94.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.138-94.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-6.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-6.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.35-29.20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.1esr-109.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.6-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.9-11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7+2.3.4-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-17.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7-8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-11.2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20180703-13.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.140-94.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.140-94.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.3-23.3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.3-23.3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2_08-3.35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.29.2-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.29.2-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-36.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-55.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.7+git.1531910353.c0ef85b854-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.2-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.2-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-8.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-8.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.14+git.157.c2d53c2b191-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.14+git.157.c2d53c2b191-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.9.0esr-109.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.1-33.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.143-94.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.143-94.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20180807-13.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.29.2-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.29.2-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2_10-3.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.9-11.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.5.2-43.38.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.5.2-43.38.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-54.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-54.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.33-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.8-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-106.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.155-94.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.155-94.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-18.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.4-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.17.20-2.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.45-21.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.45-21.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.14-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.27-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.9-48.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-33.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-23.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.36-58.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-18.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.156-94.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.156-94.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0dev-22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.181-27.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.58-19.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.1-3.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5-1.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.124.aee309c5c18-3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.124.aee309c5c18-3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-9.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.3-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.3-12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.2-16.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.8-7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.4-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p12-64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.67-10.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.10-3.22.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.3-2.23.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.3-2.23.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.2-33.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.3-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.3_03-3.44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7-9.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.19.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.19.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.19.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.19.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.6-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2013.1.13-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.10-48.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.2.2esr-109.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60-32.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.4-58.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.19-19.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.0-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-26.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.162-94.69.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.162-94.69.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.3.0-109.50.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.53.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.53.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.6-1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.2-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.114-94.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.114-94.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.114-94.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.2-16.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23-12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.93.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-7.13.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.0.0-4.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.0.1-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-106.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.3_03-3.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26-23.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-6.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.2-6.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.1_08-3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.4.0esr-109.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.40.1-58.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.20-19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.5.1-43.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.5.1-43.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.11-48.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.33_k4.4.114_94.11-4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.13+git.72.2a684235f41-3.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.10-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.34-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.13+git.72.2a684235f41-3.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.120-94.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.120-94.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.33-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.67-10.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.22.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.22.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p11-64.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.14-48.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.126-94.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.126-94.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-24.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-24.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.21~rc-1001.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.5-6.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.54.0-26.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.1-10.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.1-10.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.54.0-26.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.0-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.0-13.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.13-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.4-10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.1-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.3.2-43.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.3.2-43.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.7-10.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20180403-16.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20180403-16.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-8.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.54.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2_04-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.2-25.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.20-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.4.2-43.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.4.2-43.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.15-23.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.0esr-109.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.131-94.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.131-94.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-21.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-83.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-83.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-83.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-83.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.5+git.1524775272.5e7ea8cf03-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.9.0+git20170610.f6dd59a-15.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2_06-3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2013.1.13-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-2.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-2.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.154.2998451b912-3.40.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.154.2998451b912-3.40.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.14-48.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-15.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-160.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-31.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0-95.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.1-2.41.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.1-2.41.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-8.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-55.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.212-27.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20190507-13.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-6.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.178-94.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.178-94.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.178-94.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4_04-3.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.66.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.66.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.4-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20190514-13.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.2-10.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0~git.1463131968.4e66df7-12.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-23.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.12-48.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.0-109.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.4-77.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.4-77.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.6-19.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.6-19.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.221-43.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26a-23.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.1-13.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.1-10.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.3.2-43.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.3.2-43.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.10-10.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20190423-16.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20190423-16.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-2.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-2.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.11-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.8-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.42.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.42.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-13.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-13.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.36-18.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.36-18.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-106.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.15-48.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.66.3-8.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.2-109.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.13-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.123.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.158-7.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.4-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.0-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.8-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.5.0esr-109.58.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60-32.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.41.1-58.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.2-3.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.9-11.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170530-21.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.201-43.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.10+git.1549630712.bb089269ea-2.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.6-2.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.6-2.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.175-94.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.175-94.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.191-27.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-6.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.4-2.29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.4-2.29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.4-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.11-21.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.13-48.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26a-23.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20190312-13.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-24.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3.git20161120-161.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p13-85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.176-94.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.176-94.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.2-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-83.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-83.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-83.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-83.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.22-10.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.6.1esr-109.63.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-33.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-15.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4_02-3.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-21.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-6.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.2-5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1510945757.b2662641d5-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.37-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-100.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-100.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1b-2.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1510945757.b2662641d5-3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.21-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.21-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.2-5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.1_06-2.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-4.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-8.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-100.15.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-100.15.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.6-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9-1.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20190618-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0~git.1456906198.f422461-21.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.2-3.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.2-2.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.2-2.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.8.0-109.83.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.1-58.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-17.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20190618-13.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-44.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.36-2.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.0-2.39.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.51-21.26.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.51-21.26.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2-59.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.11-59.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.60.0-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-30.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.231-43.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.222-27.35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.16-48.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.38-2.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.12-13.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.12-13.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.36-2.27.19.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-27.60.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.54-18.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.54-18.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.10-1.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-2.6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.25-3.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.25-3.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.4-2.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.4-2.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26a-23.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.2-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.12+git.1568024032.02236657ca-2.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.60.0-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.13-15.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.13-15.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.7.1-43.56.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.7.1-43.56.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.9.0-109.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.25.3-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-23.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.24-9.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.24-9.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.2-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.2-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-106.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.1.0-109.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68-32.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32-9.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.20p2-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.40.1-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.25-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3-10.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.08-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.08-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta18-14.3.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.2-10.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.2_02-2.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.42-16.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.42-16.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-34.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.2.0-109.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.169.064abe062be-3.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.169.064abe062be-3.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13-5.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.1-2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-11.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.2-5.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-5.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-5.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-5.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20191112-13.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.2_04-2.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-23.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20191112a-13.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.1_02-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.6.1-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-36.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-36.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-33.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0~git.1463131968.4e66df7-12.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.241-43.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.23.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-26.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-33.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20170707-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.3-12.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.3_02-2.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.67-10.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.3.0-109.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.29-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.29-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.40.2-2.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.60.0-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.97.3-17.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.97.3-17.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.2-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-10.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1510945757.b2662641d5-3.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.22-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.22-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1510945757.b2662641d5-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.1_04-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.6-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.3-12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.0.2-8.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-8.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.174.c2fd2e28c84-3.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.174.c2fd2e28c84-3.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.232-27.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.2-10.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.242-27.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.2-6.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.8-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.60-2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-29.17.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-29.17.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.5.0-109.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.20p2-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.141.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.21-8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.7-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.39.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-15.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.18-9.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.18-9.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-24.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.251-43.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.18-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.4.1-109.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.12-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.21.2-2.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.47.1-58.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.23-19.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-2.20.1</evr>
  </rpminfo_state>
</states>
</oval_definitions>
